<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2026-04-14T07:04:09</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:215628" version="1" class="patch">
	<metadata>
		<title>LibVNCServer-0.9.1-154.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-2450" ref_url="https://www.suse.com/security/cve/CVE-2006-2450/" source="CVE"/>
		<description>
These are all security issues fixed in the LibVNCServer-0.9.1-154.24 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2450/">CVE-2006-2450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2450">CVE-2006-2450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988310" comment="LibVNCServer-0.9.1-154.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215629" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-3.5.9-0.1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-6077" ref_url="https://www.suse.com/security/cve/CVE-2006-6077/" source="CVE"/>
		<reference ref_id="CVE-2007-0008" ref_url="https://www.suse.com/security/cve/CVE-2007-0008/" source="CVE"/>
		<reference ref_id="CVE-2007-0009" ref_url="https://www.suse.com/security/cve/CVE-2007-0009/" source="CVE"/>
		<reference ref_id="CVE-2007-0078" ref_url="https://www.suse.com/security/cve/CVE-2007-0078/" source="CVE"/>
		<reference ref_id="CVE-2007-0079" ref_url="https://www.suse.com/security/cve/CVE-2007-0079/" source="CVE"/>
		<reference ref_id="CVE-2007-0775" ref_url="https://www.suse.com/security/cve/CVE-2007-0775/" source="CVE"/>
		<reference ref_id="CVE-2007-0776" ref_url="https://www.suse.com/security/cve/CVE-2007-0776/" source="CVE"/>
		<reference ref_id="CVE-2007-0777" ref_url="https://www.suse.com/security/cve/CVE-2007-0777/" source="CVE"/>
		<reference ref_id="CVE-2007-0780" ref_url="https://www.suse.com/security/cve/CVE-2007-0780/" source="CVE"/>
		<reference ref_id="CVE-2007-0800" ref_url="https://www.suse.com/security/cve/CVE-2007-0800/" source="CVE"/>
		<reference ref_id="CVE-2007-0981" ref_url="https://www.suse.com/security/cve/CVE-2007-0981/" source="CVE"/>
		<reference ref_id="CVE-2007-0995" ref_url="https://www.suse.com/security/cve/CVE-2007-0995/" source="CVE"/>
		<reference ref_id="CVE-2007-0996" ref_url="https://www.suse.com/security/cve/CVE-2007-0996/" source="CVE"/>
		<reference ref_id="CVE-2007-3089" ref_url="https://www.suse.com/security/cve/CVE-2007-3089/" source="CVE"/>
		<reference ref_id="CVE-2007-3285" ref_url="https://www.suse.com/security/cve/CVE-2007-3285/" source="CVE"/>
		<reference ref_id="CVE-2007-3656" ref_url="https://www.suse.com/security/cve/CVE-2007-3656/" source="CVE"/>
		<reference ref_id="CVE-2007-3670" ref_url="https://www.suse.com/security/cve/CVE-2007-3670/" source="CVE"/>
		<reference ref_id="CVE-2007-3734" ref_url="https://www.suse.com/security/cve/CVE-2007-3734/" source="CVE"/>
		<reference ref_id="CVE-2007-3735" ref_url="https://www.suse.com/security/cve/CVE-2007-3735/" source="CVE"/>
		<reference ref_id="CVE-2007-3736" ref_url="https://www.suse.com/security/cve/CVE-2007-3736/" source="CVE"/>
		<reference ref_id="CVE-2007-3737" ref_url="https://www.suse.com/security/cve/CVE-2007-3737/" source="CVE"/>
		<reference ref_id="CVE-2007-3738" ref_url="https://www.suse.com/security/cve/CVE-2007-3738/" source="CVE"/>
		<reference ref_id="CVE-2008-0412" ref_url="https://www.suse.com/security/cve/CVE-2008-0412/" source="CVE"/>
		<reference ref_id="CVE-2008-0414" ref_url="https://www.suse.com/security/cve/CVE-2008-0414/" source="CVE"/>
		<reference ref_id="CVE-2008-0415" ref_url="https://www.suse.com/security/cve/CVE-2008-0415/" source="CVE"/>
		<reference ref_id="CVE-2008-0417" ref_url="https://www.suse.com/security/cve/CVE-2008-0417/" source="CVE"/>
		<reference ref_id="CVE-2008-0418" ref_url="https://www.suse.com/security/cve/CVE-2008-0418/" source="CVE"/>
		<reference ref_id="CVE-2008-0419" ref_url="https://www.suse.com/security/cve/CVE-2008-0419/" source="CVE"/>
		<reference ref_id="CVE-2008-0591" ref_url="https://www.suse.com/security/cve/CVE-2008-0591/" source="CVE"/>
		<reference ref_id="CVE-2008-0592" ref_url="https://www.suse.com/security/cve/CVE-2008-0592/" source="CVE"/>
		<reference ref_id="CVE-2008-0593" ref_url="https://www.suse.com/security/cve/CVE-2008-0593/" source="CVE"/>
		<reference ref_id="CVE-2008-0594" ref_url="https://www.suse.com/security/cve/CVE-2008-0594/" source="CVE"/>
		<reference ref_id="CVE-2008-3836" ref_url="https://www.suse.com/security/cve/CVE-2008-3836/" source="CVE"/>
		<reference ref_id="CVE-2008-4063" ref_url="https://www.suse.com/security/cve/CVE-2008-4063/" source="CVE"/>
		<reference ref_id="CVE-2008-4064" ref_url="https://www.suse.com/security/cve/CVE-2008-4064/" source="CVE"/>
		<reference ref_id="CVE-2008-4070" ref_url="https://www.suse.com/security/cve/CVE-2008-4070/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-0352" ref_url="https://www.suse.com/security/cve/CVE-2009-0352/" source="CVE"/>
		<reference ref_id="CVE-2009-0353" ref_url="https://www.suse.com/security/cve/CVE-2009-0353/" source="CVE"/>
		<reference ref_id="CVE-2009-0354" ref_url="https://www.suse.com/security/cve/CVE-2009-0354/" source="CVE"/>
		<reference ref_id="CVE-2009-0355" ref_url="https://www.suse.com/security/cve/CVE-2009-0355/" source="CVE"/>
		<reference ref_id="CVE-2009-0356" ref_url="https://www.suse.com/security/cve/CVE-2009-0356/" source="CVE"/>
		<reference ref_id="CVE-2009-0357" ref_url="https://www.suse.com/security/cve/CVE-2009-0357/" source="CVE"/>
		<reference ref_id="CVE-2009-0358" ref_url="https://www.suse.com/security/cve/CVE-2009-0358/" source="CVE"/>
		<reference ref_id="CVE-2009-0652" ref_url="https://www.suse.com/security/cve/CVE-2009-0652/" source="CVE"/>
		<reference ref_id="CVE-2009-0771" ref_url="https://www.suse.com/security/cve/CVE-2009-0771/" source="CVE"/>
		<reference ref_id="CVE-2009-0772" ref_url="https://www.suse.com/security/cve/CVE-2009-0772/" source="CVE"/>
		<reference ref_id="CVE-2009-0773" ref_url="https://www.suse.com/security/cve/CVE-2009-0773/" source="CVE"/>
		<reference ref_id="CVE-2009-0774" ref_url="https://www.suse.com/security/cve/CVE-2009-0774/" source="CVE"/>
		<reference ref_id="CVE-2009-0775" ref_url="https://www.suse.com/security/cve/CVE-2009-0775/" source="CVE"/>
		<reference ref_id="CVE-2009-0776" ref_url="https://www.suse.com/security/cve/CVE-2009-0776/" source="CVE"/>
		<reference ref_id="CVE-2009-0777" ref_url="https://www.suse.com/security/cve/CVE-2009-0777/" source="CVE"/>
		<reference ref_id="CVE-2009-1044" ref_url="https://www.suse.com/security/cve/CVE-2009-1044/" source="CVE"/>
		<reference ref_id="CVE-2009-1169" ref_url="https://www.suse.com/security/cve/CVE-2009-1169/" source="CVE"/>
		<reference ref_id="CVE-2009-1302" ref_url="https://www.suse.com/security/cve/CVE-2009-1302/" source="CVE"/>
		<reference ref_id="CVE-2009-1303" ref_url="https://www.suse.com/security/cve/CVE-2009-1303/" source="CVE"/>
		<reference ref_id="CVE-2009-1304" ref_url="https://www.suse.com/security/cve/CVE-2009-1304/" source="CVE"/>
		<reference ref_id="CVE-2009-1305" ref_url="https://www.suse.com/security/cve/CVE-2009-1305/" source="CVE"/>
		<reference ref_id="CVE-2009-1306" ref_url="https://www.suse.com/security/cve/CVE-2009-1306/" source="CVE"/>
		<reference ref_id="CVE-2009-1307" ref_url="https://www.suse.com/security/cve/CVE-2009-1307/" source="CVE"/>
		<reference ref_id="CVE-2009-1308" ref_url="https://www.suse.com/security/cve/CVE-2009-1308/" source="CVE"/>
		<reference ref_id="CVE-2009-1309" ref_url="https://www.suse.com/security/cve/CVE-2009-1309/" source="CVE"/>
		<reference ref_id="CVE-2009-1310" ref_url="https://www.suse.com/security/cve/CVE-2009-1310/" source="CVE"/>
		<reference ref_id="CVE-2009-1311" ref_url="https://www.suse.com/security/cve/CVE-2009-1311/" source="CVE"/>
		<reference ref_id="CVE-2009-1312" ref_url="https://www.suse.com/security/cve/CVE-2009-1312/" source="CVE"/>
		<reference ref_id="CVE-2009-1313" ref_url="https://www.suse.com/security/cve/CVE-2009-1313/" source="CVE"/>
		<reference ref_id="CVE-2009-1563" ref_url="https://www.suse.com/security/cve/CVE-2009-1563/" source="CVE"/>
		<reference ref_id="CVE-2009-1571" ref_url="https://www.suse.com/security/cve/CVE-2009-1571/" source="CVE"/>
		<reference ref_id="CVE-2009-2470" ref_url="https://www.suse.com/security/cve/CVE-2009-2470/" source="CVE"/>
		<reference ref_id="CVE-2009-2654" ref_url="https://www.suse.com/security/cve/CVE-2009-2654/" source="CVE"/>
		<reference ref_id="CVE-2009-3069" ref_url="https://www.suse.com/security/cve/CVE-2009-3069/" source="CVE"/>
		<reference ref_id="CVE-2009-3070" ref_url="https://www.suse.com/security/cve/CVE-2009-3070/" source="CVE"/>
		<reference ref_id="CVE-2009-3071" ref_url="https://www.suse.com/security/cve/CVE-2009-3071/" source="CVE"/>
		<reference ref_id="CVE-2009-3072" ref_url="https://www.suse.com/security/cve/CVE-2009-3072/" source="CVE"/>
		<reference ref_id="CVE-2009-3073" ref_url="https://www.suse.com/security/cve/CVE-2009-3073/" source="CVE"/>
		<reference ref_id="CVE-2009-3074" ref_url="https://www.suse.com/security/cve/CVE-2009-3074/" source="CVE"/>
		<reference ref_id="CVE-2009-3075" ref_url="https://www.suse.com/security/cve/CVE-2009-3075/" source="CVE"/>
		<reference ref_id="CVE-2009-3077" ref_url="https://www.suse.com/security/cve/CVE-2009-3077/" source="CVE"/>
		<reference ref_id="CVE-2009-3078" ref_url="https://www.suse.com/security/cve/CVE-2009-3078/" source="CVE"/>
		<reference ref_id="CVE-2009-3079" ref_url="https://www.suse.com/security/cve/CVE-2009-3079/" source="CVE"/>
		<reference ref_id="CVE-2009-3274" ref_url="https://www.suse.com/security/cve/CVE-2009-3274/" source="CVE"/>
		<reference ref_id="CVE-2009-3370" ref_url="https://www.suse.com/security/cve/CVE-2009-3370/" source="CVE"/>
		<reference ref_id="CVE-2009-3371" ref_url="https://www.suse.com/security/cve/CVE-2009-3371/" source="CVE"/>
		<reference ref_id="CVE-2009-3372" ref_url="https://www.suse.com/security/cve/CVE-2009-3372/" source="CVE"/>
		<reference ref_id="CVE-2009-3373" ref_url="https://www.suse.com/security/cve/CVE-2009-3373/" source="CVE"/>
		<reference ref_id="CVE-2009-3374" ref_url="https://www.suse.com/security/cve/CVE-2009-3374/" source="CVE"/>
		<reference ref_id="CVE-2009-3375" ref_url="https://www.suse.com/security/cve/CVE-2009-3375/" source="CVE"/>
		<reference ref_id="CVE-2009-3376" ref_url="https://www.suse.com/security/cve/CVE-2009-3376/" source="CVE"/>
		<reference ref_id="CVE-2009-3377" ref_url="https://www.suse.com/security/cve/CVE-2009-3377/" source="CVE"/>
		<reference ref_id="CVE-2009-3378" ref_url="https://www.suse.com/security/cve/CVE-2009-3378/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2009-3380" ref_url="https://www.suse.com/security/cve/CVE-2009-3380/" source="CVE"/>
		<reference ref_id="CVE-2009-3381" ref_url="https://www.suse.com/security/cve/CVE-2009-3381/" source="CVE"/>
		<reference ref_id="CVE-2009-3383" ref_url="https://www.suse.com/security/cve/CVE-2009-3383/" source="CVE"/>
		<reference ref_id="CVE-2009-3388" ref_url="https://www.suse.com/security/cve/CVE-2009-3388/" source="CVE"/>
		<reference ref_id="CVE-2009-3389" ref_url="https://www.suse.com/security/cve/CVE-2009-3389/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-3979" ref_url="https://www.suse.com/security/cve/CVE-2009-3979/" source="CVE"/>
		<reference ref_id="CVE-2009-3980" ref_url="https://www.suse.com/security/cve/CVE-2009-3980/" source="CVE"/>
		<reference ref_id="CVE-2009-3982" ref_url="https://www.suse.com/security/cve/CVE-2009-3982/" source="CVE"/>
		<reference ref_id="CVE-2009-3983" ref_url="https://www.suse.com/security/cve/CVE-2009-3983/" source="CVE"/>
		<reference ref_id="CVE-2009-3984" ref_url="https://www.suse.com/security/cve/CVE-2009-3984/" source="CVE"/>
		<reference ref_id="CVE-2009-3985" ref_url="https://www.suse.com/security/cve/CVE-2009-3985/" source="CVE"/>
		<reference ref_id="CVE-2009-3988" ref_url="https://www.suse.com/security/cve/CVE-2009-3988/" source="CVE"/>
		<reference ref_id="CVE-2010-0159" ref_url="https://www.suse.com/security/cve/CVE-2010-0159/" source="CVE"/>
		<reference ref_id="CVE-2010-0160" ref_url="https://www.suse.com/security/cve/CVE-2010-0160/" source="CVE"/>
		<reference ref_id="CVE-2010-0162" ref_url="https://www.suse.com/security/cve/CVE-2010-0162/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0175" ref_url="https://www.suse.com/security/cve/CVE-2010-0175/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-3.5.9-0.1.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6077/">CVE-2006-6077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6077">CVE-2006-6077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0008/">CVE-2007-0008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0008">CVE-2007-0008 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0009/">CVE-2007-0009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0009">CVE-2007-0009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0078/">CVE-2007-0078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0078">CVE-2007-0078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0079/">CVE-2007-0079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0079">CVE-2007-0079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0775/">CVE-2007-0775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0775">CVE-2007-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0776/">CVE-2007-0776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0776">CVE-2007-0776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0777/">CVE-2007-0777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0777">CVE-2007-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0780/">CVE-2007-0780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0780">CVE-2007-0780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0800/">CVE-2007-0800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0800">CVE-2007-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0981/">CVE-2007-0981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0981">CVE-2007-0981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0995/">CVE-2007-0995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0995">CVE-2007-0995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0996/">CVE-2007-0996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0996">CVE-2007-0996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3089/">CVE-2007-3089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3089">CVE-2007-3089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3285/">CVE-2007-3285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3285">CVE-2007-3285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3656/">CVE-2007-3656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3656">CVE-2007-3656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3670/">CVE-2007-3670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3670">CVE-2007-3670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3734/">CVE-2007-3734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3734">CVE-2007-3734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3735/">CVE-2007-3735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3735">CVE-2007-3735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3736/">CVE-2007-3736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3736">CVE-2007-3736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3737/">CVE-2007-3737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3737">CVE-2007-3737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3738/">CVE-2007-3738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3738">CVE-2007-3738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0412/">CVE-2008-0412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0412">CVE-2008-0412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0414/">CVE-2008-0414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0414">CVE-2008-0414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0415/">CVE-2008-0415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0415">CVE-2008-0415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0417/">CVE-2008-0417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0417">CVE-2008-0417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0418/">CVE-2008-0418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0418">CVE-2008-0418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0419/">CVE-2008-0419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0419">CVE-2008-0419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0591/">CVE-2008-0591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0591">CVE-2008-0591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0592/">CVE-2008-0592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0592">CVE-2008-0592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0593/">CVE-2008-0593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0593">CVE-2008-0593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0594/">CVE-2008-0594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0594">CVE-2008-0594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3836/">CVE-2008-3836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3836">CVE-2008-3836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4063/">CVE-2008-4063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4063">CVE-2008-4063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4064/">CVE-2008-4064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4064">CVE-2008-4064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4070/">CVE-2008-4070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4070">CVE-2008-4070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0040">CVE-2009-0040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0352/">CVE-2009-0352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0352">CVE-2009-0352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0353/">CVE-2009-0353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0353">CVE-2009-0353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0354/">CVE-2009-0354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0354">CVE-2009-0354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0355/">CVE-2009-0355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0355">CVE-2009-0355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0356/">CVE-2009-0356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0356">CVE-2009-0356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0357/">CVE-2009-0357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0357">CVE-2009-0357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0358/">CVE-2009-0358 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0358">CVE-2009-0358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0652/">CVE-2009-0652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0652">CVE-2009-0652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0771/">CVE-2009-0771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0771">CVE-2009-0771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0772/">CVE-2009-0772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0772">CVE-2009-0772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0773/">CVE-2009-0773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0773">CVE-2009-0773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0774/">CVE-2009-0774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0774">CVE-2009-0774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0775/">CVE-2009-0775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0775">CVE-2009-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0776/">CVE-2009-0776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0776">CVE-2009-0776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0777/">CVE-2009-0777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0777">CVE-2009-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1044/">CVE-2009-1044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1044">CVE-2009-1044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1169/">CVE-2009-1169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1169">CVE-2009-1169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1302/">CVE-2009-1302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1302">CVE-2009-1302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1303/">CVE-2009-1303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1303">CVE-2009-1303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1304/">CVE-2009-1304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1304">CVE-2009-1304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1305/">CVE-2009-1305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1305">CVE-2009-1305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1306/">CVE-2009-1306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1306">CVE-2009-1306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1307/">CVE-2009-1307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1307">CVE-2009-1307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1308/">CVE-2009-1308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1308">CVE-2009-1308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1309/">CVE-2009-1309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1309">CVE-2009-1309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1310/">CVE-2009-1310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1310">CVE-2009-1310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1311/">CVE-2009-1311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1311">CVE-2009-1311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1312/">CVE-2009-1312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1312">CVE-2009-1312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1313/">CVE-2009-1313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1313">CVE-2009-1313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1563/">CVE-2009-1563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1563">CVE-2009-1563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1571/">CVE-2009-1571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1571">CVE-2009-1571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2470/">CVE-2009-2470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2470">CVE-2009-2470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2654/">CVE-2009-2654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2654">CVE-2009-2654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3069/">CVE-2009-3069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3069">CVE-2009-3069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3070/">CVE-2009-3070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3070">CVE-2009-3070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3071/">CVE-2009-3071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3071">CVE-2009-3071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3072/">CVE-2009-3072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3072">CVE-2009-3072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3073/">CVE-2009-3073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3073">CVE-2009-3073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3074/">CVE-2009-3074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3074">CVE-2009-3074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3075/">CVE-2009-3075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3075">CVE-2009-3075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3077/">CVE-2009-3077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3077">CVE-2009-3077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3078/">CVE-2009-3078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3078">CVE-2009-3078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3079/">CVE-2009-3079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3079">CVE-2009-3079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3274/">CVE-2009-3274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3274">CVE-2009-3274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3370/">CVE-2009-3370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3370">CVE-2009-3370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3371/">CVE-2009-3371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3371">CVE-2009-3371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3372/">CVE-2009-3372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3372">CVE-2009-3372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3373/">CVE-2009-3373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3373">CVE-2009-3373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3374/">CVE-2009-3374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3374">CVE-2009-3374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3375/">CVE-2009-3375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3375">CVE-2009-3375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3376/">CVE-2009-3376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3376">CVE-2009-3376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3377/">CVE-2009-3377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3377">CVE-2009-3377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3378/">CVE-2009-3378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3378">CVE-2009-3378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3379">CVE-2009-3379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3380/">CVE-2009-3380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3380">CVE-2009-3380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3381/">CVE-2009-3381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3381">CVE-2009-3381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3383/">CVE-2009-3383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3383">CVE-2009-3383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3388/">CVE-2009-3388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3388">CVE-2009-3388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3389/">CVE-2009-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3389">CVE-2009-3389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3979/">CVE-2009-3979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3979">CVE-2009-3979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3980/">CVE-2009-3980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3980">CVE-2009-3980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3982/">CVE-2009-3982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3982">CVE-2009-3982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3983/">CVE-2009-3983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3983">CVE-2009-3983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3984/">CVE-2009-3984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3984">CVE-2009-3984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3985/">CVE-2009-3985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3985">CVE-2009-3985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3988/">CVE-2009-3988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3988">CVE-2009-3988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0159/">CVE-2010-0159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0159">CVE-2010-0159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0160/">CVE-2010-0160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0160">CVE-2010-0160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0162/">CVE-2010-0162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0162">CVE-2010-0162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0173">CVE-2010-0173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0174">CVE-2010-0174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0175/">CVE-2010-0175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0175">CVE-2010-0175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0176">CVE-2010-0176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0177">CVE-2010-0177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0178">CVE-2010-0178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0181">CVE-2010-0181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0182">CVE-2010-0182 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988311" comment="MozillaFirefox-3.5.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988312" comment="MozillaFirefox-translations-3.5.9-0.1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215630" version="1" class="patch">
	<metadata>
		<title>NetworkManager-0.7.0.r4359-15.22.49 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0365" ref_url="https://www.suse.com/security/cve/CVE-2009-0365/" source="CVE"/>
		<reference ref_id="CVE-2009-0578" ref_url="https://www.suse.com/security/cve/CVE-2009-0578/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-0.7.0.r4359-15.22.49 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0365/">CVE-2009-0365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0365">CVE-2009-0365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0578/">CVE-2009-0578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0578">CVE-2009-0578 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988313" comment="NetworkManager-0.7.0.r4359-15.22.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988314" comment="NetworkManager-glib-0.7.0.r4359-15.22.49 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215631" version="1" class="patch">
	<metadata>
		<title>NetworkManager-gnome-0.7.0.r1053-11.16.61 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0365" ref_url="https://www.suse.com/security/cve/CVE-2009-0365/" source="CVE"/>
		<reference ref_id="CVE-2009-0578" ref_url="https://www.suse.com/security/cve/CVE-2009-0578/" source="CVE"/>
		<reference ref_id="CVE-2009-4144" ref_url="https://www.suse.com/security/cve/CVE-2009-4144/" source="CVE"/>
		<reference ref_id="CVE-2009-4145" ref_url="https://www.suse.com/security/cve/CVE-2009-4145/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-gnome-0.7.0.r1053-11.16.61 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0365/">CVE-2009-0365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0365">CVE-2009-0365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0578/">CVE-2009-0578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0578">CVE-2009-0578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4144/">CVE-2009-4144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4144">CVE-2009-4144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4145/">CVE-2009-4145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4145">CVE-2009-4145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988315" comment="NetworkManager-gnome-0.7.0.r1053-11.16.61 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215632" version="1" class="patch">
	<metadata>
		<title>OpenEXR-1.6.1-83.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-1720" ref_url="https://www.suse.com/security/cve/CVE-2009-1720/" source="CVE"/>
		<reference ref_id="CVE-2009-1721" ref_url="https://www.suse.com/security/cve/CVE-2009-1721/" source="CVE"/>
		<description>
These are all security issues fixed in the OpenEXR-1.6.1-83.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1720/">CVE-2009-1720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1720">CVE-2009-1720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1721/">CVE-2009-1721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1721">CVE-2009-1721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988316" comment="OpenEXR-1.6.1-83.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988317" comment="OpenEXR-32bit-1.6.1-83.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988318" comment="OpenEXR-x86-1.6.1-83.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215633" version="1" class="patch">
	<metadata>
		<title>PackageKit-0.3.14-2.12.105 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<description>
These are all security issues fixed in the PackageKit-0.3.14-2.12.105 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4311">CVE-2008-4311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988319" comment="PackageKit-0.3.14-2.12.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988320" comment="PackageKit-lang-0.3.14-2.12.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988321" comment="hal-0.5.12-23.40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988322" comment="hal-32bit-0.5.12-23.40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988323" comment="hal-doc-0.5.12-23.40.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988324" comment="hal-x86-0.5.12-23.40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988325" comment="libpackagekit-glib10-0.3.14-2.12.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988326" comment="yast2-core-2.17.35-0.2.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215634" version="1" class="patch">
	<metadata>
		<title>PolicyKit-0.9-14.34.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-1658" ref_url="https://www.suse.com/security/cve/CVE-2008-1658/" source="CVE"/>
		<description>
These are all security issues fixed in the PolicyKit-0.9-14.34.9 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1658/">CVE-2008-1658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1658">CVE-2008-1658 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988327" comment="PolicyKit-0.9-14.34.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988328" comment="PolicyKit-32bit-0.9-14.34.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988329" comment="PolicyKit-doc-0.9-14.34.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988330" comment="PolicyKit-x86-0.9-14.34.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215635" version="1" class="patch">
	<metadata>
		<title>amavisd-new-2.6.2-1.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2005-1349" ref_url="https://www.suse.com/security/cve/CVE-2005-1349/" source="CVE"/>
		<description>
These are all security issues fixed in the amavisd-new-2.6.2-1.14 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-1349/">CVE-2005-1349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-1349">CVE-2005-1349 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988331" comment="amavisd-new-2.6.2-1.14 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215636" version="1" class="patch">
	<metadata>
		<title>apache2-2.2.10-2.24.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-3747" ref_url="https://www.suse.com/security/cve/CVE-2006-3747/" source="CVE"/>
		<reference ref_id="CVE-2006-5752" ref_url="https://www.suse.com/security/cve/CVE-2006-5752/" source="CVE"/>
		<reference ref_id="CVE-2007-1862" ref_url="https://www.suse.com/security/cve/CVE-2007-1862/" source="CVE"/>
		<reference ref_id="CVE-2007-1863" ref_url="https://www.suse.com/security/cve/CVE-2007-1863/" source="CVE"/>
		<reference ref_id="CVE-2007-3304" ref_url="https://www.suse.com/security/cve/CVE-2007-3304/" source="CVE"/>
		<reference ref_id="CVE-2007-3847" ref_url="https://www.suse.com/security/cve/CVE-2007-3847/" source="CVE"/>
		<reference ref_id="CVE-2007-4465" ref_url="https://www.suse.com/security/cve/CVE-2007-4465/" source="CVE"/>
		<reference ref_id="CVE-2007-5000" ref_url="https://www.suse.com/security/cve/CVE-2007-5000/" source="CVE"/>
		<reference ref_id="CVE-2007-6388" ref_url="https://www.suse.com/security/cve/CVE-2007-6388/" source="CVE"/>
		<reference ref_id="CVE-2007-6420" ref_url="https://www.suse.com/security/cve/CVE-2007-6420/" source="CVE"/>
		<reference ref_id="CVE-2007-6421" ref_url="https://www.suse.com/security/cve/CVE-2007-6421/" source="CVE"/>
		<reference ref_id="CVE-2007-6422" ref_url="https://www.suse.com/security/cve/CVE-2007-6422/" source="CVE"/>
		<reference ref_id="CVE-2008-0005" ref_url="https://www.suse.com/security/cve/CVE-2008-0005/" source="CVE"/>
		<reference ref_id="CVE-2008-1678" ref_url="https://www.suse.com/security/cve/CVE-2008-1678/" source="CVE"/>
		<reference ref_id="CVE-2008-2364" ref_url="https://www.suse.com/security/cve/CVE-2008-2364/" source="CVE"/>
		<reference ref_id="CVE-2008-2939" ref_url="https://www.suse.com/security/cve/CVE-2008-2939/" source="CVE"/>
		<reference ref_id="CVE-2009-1191" ref_url="https://www.suse.com/security/cve/CVE-2009-1191/" source="CVE"/>
		<reference ref_id="CVE-2009-1195" ref_url="https://www.suse.com/security/cve/CVE-2009-1195/" source="CVE"/>
		<reference ref_id="CVE-2009-1890" ref_url="https://www.suse.com/security/cve/CVE-2009-1890/" source="CVE"/>
		<reference ref_id="CVE-2009-3094" ref_url="https://www.suse.com/security/cve/CVE-2009-3094/" source="CVE"/>
		<reference ref_id="CVE-2009-3095" ref_url="https://www.suse.com/security/cve/CVE-2009-3095/" source="CVE"/>
		<reference ref_id="CVE-2010-0408" ref_url="https://www.suse.com/security/cve/CVE-2010-0408/" source="CVE"/>
		<reference ref_id="CVE-2010-0434" ref_url="https://www.suse.com/security/cve/CVE-2010-0434/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-2.2.10-2.24.5 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3747/">CVE-2006-3747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3747">CVE-2006-3747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5752/">CVE-2006-5752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5752">CVE-2006-5752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1862/">CVE-2007-1862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1862">CVE-2007-1862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1863/">CVE-2007-1863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1863">CVE-2007-1863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3304/">CVE-2007-3304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3304">CVE-2007-3304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3847/">CVE-2007-3847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3847">CVE-2007-3847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4465/">CVE-2007-4465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4465">CVE-2007-4465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5000/">CVE-2007-5000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5000">CVE-2007-5000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6388/">CVE-2007-6388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6388">CVE-2007-6388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6420/">CVE-2007-6420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6420">CVE-2007-6420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6421/">CVE-2007-6421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6421">CVE-2007-6421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6422/">CVE-2007-6422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6422">CVE-2007-6422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0005/">CVE-2008-0005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0005">CVE-2008-0005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1678/">CVE-2008-1678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1678">CVE-2008-1678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2364/">CVE-2008-2364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2364">CVE-2008-2364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2939/">CVE-2008-2939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2939">CVE-2008-2939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1191/">CVE-2009-1191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1191">CVE-2009-1191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1195/">CVE-2009-1195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1195">CVE-2009-1195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1890/">CVE-2009-1890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1890">CVE-2009-1890 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3094/">CVE-2009-3094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3094">CVE-2009-3094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3095/">CVE-2009-3095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3095">CVE-2009-3095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0408/">CVE-2010-0408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0408">CVE-2010-0408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0434/">CVE-2010-0434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0434">CVE-2010-0434 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988332" comment="apache2-2.2.10-2.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988333" comment="apache2-doc-2.2.10-2.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988334" comment="apache2-example-pages-2.2.10-2.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988335" comment="apache2-prefork-2.2.10-2.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988336" comment="apache2-utils-2.2.10-2.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988337" comment="apache2-worker-2.2.10-2.24.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215637" version="1" class="patch">
	<metadata>
		<title>apache2-mod_perl-2.0.4-40.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-1349" ref_url="https://www.suse.com/security/cve/CVE-2007-1349/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_perl-2.0.4-40.19 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1349/">CVE-2007-1349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1349">CVE-2007-1349 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988338" comment="apache2-mod_perl-2.0.4-40.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215638" version="1" class="patch">
	<metadata>
		<title>apache2-mod_php5-5.2.6-50.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-4783" ref_url="https://www.suse.com/security/cve/CVE-2007-4783/" source="CVE"/>
		<reference ref_id="CVE-2007-4840" ref_url="https://www.suse.com/security/cve/CVE-2007-4840/" source="CVE"/>
		<reference ref_id="CVE-2007-4887" ref_url="https://www.suse.com/security/cve/CVE-2007-4887/" source="CVE"/>
		<reference ref_id="CVE-2008-0599" ref_url="https://www.suse.com/security/cve/CVE-2008-0599/" source="CVE"/>
		<reference ref_id="CVE-2008-5624" ref_url="https://www.suse.com/security/cve/CVE-2008-5624/" source="CVE"/>
		<reference ref_id="CVE-2008-5625" ref_url="https://www.suse.com/security/cve/CVE-2008-5625/" source="CVE"/>
		<reference ref_id="CVE-2008-5814" ref_url="https://www.suse.com/security/cve/CVE-2008-5814/" source="CVE"/>
		<reference ref_id="CVE-2009-1271" ref_url="https://www.suse.com/security/cve/CVE-2009-1271/" source="CVE"/>
		<reference ref_id="CVE-2009-1272" ref_url="https://www.suse.com/security/cve/CVE-2009-1272/" source="CVE"/>
		<reference ref_id="CVE-2009-2626" ref_url="https://www.suse.com/security/cve/CVE-2009-2626/" source="CVE"/>
		<reference ref_id="CVE-2009-3546" ref_url="https://www.suse.com/security/cve/CVE-2009-3546/" source="CVE"/>
		<reference ref_id="CVE-2009-4017" ref_url="https://www.suse.com/security/cve/CVE-2009-4017/" source="CVE"/>
		<reference ref_id="CVE-2009-4142" ref_url="https://www.suse.com/security/cve/CVE-2009-4142/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_php5-5.2.6-50.24.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4783/">CVE-2007-4783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4783">CVE-2007-4783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4840/">CVE-2007-4840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4840">CVE-2007-4840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4887/">CVE-2007-4887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4887">CVE-2007-4887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0599/">CVE-2008-0599 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2008-0599">CVE-2008-0599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5624/">CVE-2008-5624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5624">CVE-2008-5624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5625/">CVE-2008-5625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5625">CVE-2008-5625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5814/">CVE-2008-5814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5814">CVE-2008-5814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1271/">CVE-2009-1271 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1271">CVE-2009-1271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1272/">CVE-2009-1272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1272">CVE-2009-1272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2626/">CVE-2009-2626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2626">CVE-2009-2626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3546/">CVE-2009-3546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3546">CVE-2009-3546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4017/">CVE-2009-4017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4017">CVE-2009-4017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4142/">CVE-2009-4142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4142">CVE-2009-4142 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988339" comment="apache2-mod_php5-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988340" comment="php5-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988341" comment="php5-bcmath-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988342" comment="php5-bz2-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988343" comment="php5-calendar-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988344" comment="php5-ctype-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988345" comment="php5-curl-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988346" comment="php5-dba-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988347" comment="php5-dbase-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988348" comment="php5-dom-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988349" comment="php5-exif-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988350" comment="php5-fastcgi-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988351" comment="php5-ftp-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988352" comment="php5-gd-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988353" comment="php5-gettext-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988354" comment="php5-gmp-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988355" comment="php5-hash-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988356" comment="php5-iconv-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988357" comment="php5-json-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988358" comment="php5-ldap-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988359" comment="php5-mbstring-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988360" comment="php5-mcrypt-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988361" comment="php5-mysql-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988362" comment="php5-odbc-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988363" comment="php5-openssl-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988364" comment="php5-pcntl-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988365" comment="php5-pdo-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988366" comment="php5-pear-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988367" comment="php5-pgsql-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988368" comment="php5-pspell-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988369" comment="php5-shmop-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988370" comment="php5-snmp-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988371" comment="php5-soap-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988372" comment="php5-suhosin-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988373" comment="php5-sysvmsg-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988374" comment="php5-sysvsem-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988375" comment="php5-sysvshm-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988376" comment="php5-tokenizer-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988377" comment="php5-wddx-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988378" comment="php5-xmlreader-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988379" comment="php5-xmlrpc-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988380" comment="php5-xmlwriter-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988381" comment="php5-xsl-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988382" comment="php5-zip-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988383" comment="php5-zlib-5.2.6-50.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215639" version="1" class="patch">
	<metadata>
		<title>avahi-0.6.23-11.19.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-5461" ref_url="https://www.suse.com/security/cve/CVE-2006-5461/" source="CVE"/>
		<reference ref_id="CVE-2006-6870" ref_url="https://www.suse.com/security/cve/CVE-2006-6870/" source="CVE"/>
		<reference ref_id="CVE-2007-3372" ref_url="https://www.suse.com/security/cve/CVE-2007-3372/" source="CVE"/>
		<reference ref_id="CVE-2008-5081" ref_url="https://www.suse.com/security/cve/CVE-2008-5081/" source="CVE"/>
		<reference ref_id="CVE-2009-0758" ref_url="https://www.suse.com/security/cve/CVE-2009-0758/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-0.6.23-11.19.22 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5461/">CVE-2006-5461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5461">CVE-2006-5461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6870/">CVE-2006-6870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6870">CVE-2006-6870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3372/">CVE-2007-3372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3372">CVE-2007-3372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5081/">CVE-2008-5081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5081">CVE-2008-5081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0758/">CVE-2009-0758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0758">CVE-2009-0758 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988384" comment="avahi-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988385" comment="avahi-lang-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988386" comment="avahi-utils-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988387" comment="libavahi-client3-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988388" comment="libavahi-client3-32bit-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988389" comment="libavahi-client3-x86-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988390" comment="libavahi-common3-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988391" comment="libavahi-common3-32bit-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988392" comment="libavahi-common3-x86-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988393" comment="libavahi-core5-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988394" comment="libdns_sd-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988395" comment="libdns_sd-32bit-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988396" comment="libdns_sd-x86-0.6.23-11.19.22 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215640" version="1" class="patch">
	<metadata>
		<title>bind-9.5.0P2-20.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2007-2925" ref_url="https://www.suse.com/security/cve/CVE-2007-2925/" source="CVE"/>
		<reference ref_id="CVE-2007-2926" ref_url="https://www.suse.com/security/cve/CVE-2007-2926/" source="CVE"/>
		<reference ref_id="CVE-2009-0696" ref_url="https://www.suse.com/security/cve/CVE-2009-0696/" source="CVE"/>
		<reference ref_id="CVE-2009-4022" ref_url="https://www.suse.com/security/cve/CVE-2009-4022/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.5.0P2-20.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4339">CVE-2006-4339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2925/">CVE-2007-2925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2925">CVE-2007-2925 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2926/">CVE-2007-2926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2926">CVE-2007-2926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0696/">CVE-2009-0696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0696">CVE-2009-0696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4022/">CVE-2009-4022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4022">CVE-2009-4022 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988397" comment="bind-9.5.0P2-20.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988398" comment="bind-chrootenv-9.5.0P2-20.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988399" comment="bind-doc-9.5.0P2-20.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988400" comment="bind-libs-9.5.0P2-20.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988401" comment="bind-libs-32bit-9.5.0P2-20.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988402" comment="bind-libs-x86-9.5.0P2-20.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988403" comment="bind-utils-9.5.0P2-20.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215641" version="1" class="patch">
	<metadata>
		<title>boost-license-1.36.0-11.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-0171" ref_url="https://www.suse.com/security/cve/CVE-2008-0171/" source="CVE"/>
		<description>
These are all security issues fixed in the boost-license-1.36.0-11.17 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0171/">CVE-2008-0171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0171">CVE-2008-0171 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988404" comment="boost-license-1.36.0-11.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988405" comment="libboost_program_options1_36_0-1.36.0-11.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988406" comment="libboost_regex1_36_0-1.36.0-11.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988407" comment="libboost_signals1_36_0-1.36.0-11.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215642" version="1" class="patch">
	<metadata>
		<title>bzip2-1.0.5-34.246 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-1372" ref_url="https://www.suse.com/security/cve/CVE-2008-1372/" source="CVE"/>
		<description>
These are all security issues fixed in the bzip2-1.0.5-34.246 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1372/">CVE-2008-1372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1372">CVE-2008-1372 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988408" comment="bzip2-1.0.5-34.246 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988409" comment="bzip2-doc-1.0.5-34.246 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988410" comment="libbz2-1-1.0.5-34.246 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988411" comment="libbz2-1-32bit-1.0.5-34.246 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988412" comment="libbz2-1-x86-1.0.5-34.246 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215643" version="1" class="patch">
	<metadata>
		<title>cifs-mount-3.4.3-1.17.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-3403" ref_url="https://www.suse.com/security/cve/CVE-2006-3403/" source="CVE"/>
		<reference ref_id="CVE-2007-0452" ref_url="https://www.suse.com/security/cve/CVE-2007-0452/" source="CVE"/>
		<reference ref_id="CVE-2007-2444" ref_url="https://www.suse.com/security/cve/CVE-2007-2444/" source="CVE"/>
		<reference ref_id="CVE-2007-2446" ref_url="https://www.suse.com/security/cve/CVE-2007-2446/" source="CVE"/>
		<reference ref_id="CVE-2007-2447" ref_url="https://www.suse.com/security/cve/CVE-2007-2447/" source="CVE"/>
		<reference ref_id="CVE-2007-4138" ref_url="https://www.suse.com/security/cve/CVE-2007-4138/" source="CVE"/>
		<reference ref_id="CVE-2007-4572" ref_url="https://www.suse.com/security/cve/CVE-2007-4572/" source="CVE"/>
		<reference ref_id="CVE-2007-5398" ref_url="https://www.suse.com/security/cve/CVE-2007-5398/" source="CVE"/>
		<reference ref_id="CVE-2007-6015" ref_url="https://www.suse.com/security/cve/CVE-2007-6015/" source="CVE"/>
		<reference ref_id="CVE-2008-1105" ref_url="https://www.suse.com/security/cve/CVE-2008-1105/" source="CVE"/>
		<reference ref_id="CVE-2008-3789" ref_url="https://www.suse.com/security/cve/CVE-2008-3789/" source="CVE"/>
		<reference ref_id="CVE-2008-4314" ref_url="https://www.suse.com/security/cve/CVE-2008-4314/" source="CVE"/>
		<reference ref_id="CVE-2009-0022" ref_url="https://www.suse.com/security/cve/CVE-2009-0022/" source="CVE"/>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2010-0926" ref_url="https://www.suse.com/security/cve/CVE-2010-0926/" source="CVE"/>
		<description>
These are all security issues fixed in the cifs-mount-3.4.3-1.17.2 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3403/">CVE-2006-3403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3403">CVE-2006-3403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0452/">CVE-2007-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0452">CVE-2007-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2444/">CVE-2007-2444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2444">CVE-2007-2444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2446/">CVE-2007-2446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2446">CVE-2007-2446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2447/">CVE-2007-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2447">CVE-2007-2447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4138/">CVE-2007-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4138">CVE-2007-4138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4572/">CVE-2007-4572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4572">CVE-2007-4572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5398/">CVE-2007-5398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5398">CVE-2007-5398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6015/">CVE-2007-6015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6015">CVE-2007-6015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1105/">CVE-2008-1105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1105">CVE-2008-1105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3789/">CVE-2008-3789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3789">CVE-2008-3789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4314/">CVE-2008-4314 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4314">CVE-2008-4314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0022/">CVE-2009-0022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0022">CVE-2009-0022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1886">CVE-2009-1886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1888">CVE-2009-1888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2813">CVE-2009-2813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2906">CVE-2009-2906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2948">CVE-2009-2948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0547">CVE-2010-0547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0787">CVE-2010-0787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0926/">CVE-2010-0926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0926">CVE-2010-0926 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988413" comment="cifs-mount-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988414" comment="ldapsmb-1.34b-11.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988415" comment="libsmbclient0-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988416" comment="libsmbclient0-32bit-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988417" comment="libsmbclient0-x86-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988418" comment="libtalloc1-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988419" comment="libtalloc1-32bit-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988420" comment="libtalloc1-x86-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988421" comment="libtdb1-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988422" comment="libtdb1-32bit-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988423" comment="libtdb1-x86-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988424" comment="libwbclient0-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988425" comment="libwbclient0-32bit-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988426" comment="libwbclient0-x86-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988427" comment="samba-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988428" comment="samba-32bit-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988429" comment="samba-client-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988430" comment="samba-client-32bit-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988431" comment="samba-client-x86-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988432" comment="samba-krb-printing-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988433" comment="samba-winbind-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988434" comment="samba-winbind-32bit-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988435" comment="samba-winbind-x86-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988436" comment="samba-x86-3.4.3-1.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215644" version="1" class="patch">
	<metadata>
		<title>clamav-0.96-0.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-4182" ref_url="https://www.suse.com/security/cve/CVE-2006-4182/" source="CVE"/>
		<reference ref_id="CVE-2006-5295" ref_url="https://www.suse.com/security/cve/CVE-2006-5295/" source="CVE"/>
		<reference ref_id="CVE-2006-5874" ref_url="https://www.suse.com/security/cve/CVE-2006-5874/" source="CVE"/>
		<reference ref_id="CVE-2007-0897" ref_url="https://www.suse.com/security/cve/CVE-2007-0897/" source="CVE"/>
		<reference ref_id="CVE-2007-0898" ref_url="https://www.suse.com/security/cve/CVE-2007-0898/" source="CVE"/>
		<reference ref_id="CVE-2007-1745" ref_url="https://www.suse.com/security/cve/CVE-2007-1745/" source="CVE"/>
		<reference ref_id="CVE-2007-1997" ref_url="https://www.suse.com/security/cve/CVE-2007-1997/" source="CVE"/>
		<reference ref_id="CVE-2007-6335" ref_url="https://www.suse.com/security/cve/CVE-2007-6335/" source="CVE"/>
		<reference ref_id="CVE-2007-6336" ref_url="https://www.suse.com/security/cve/CVE-2007-6336/" source="CVE"/>
		<reference ref_id="CVE-2007-6337" ref_url="https://www.suse.com/security/cve/CVE-2007-6337/" source="CVE"/>
		<reference ref_id="CVE-2007-6595" ref_url="https://www.suse.com/security/cve/CVE-2007-6595/" source="CVE"/>
		<reference ref_id="CVE-2007-6596" ref_url="https://www.suse.com/security/cve/CVE-2007-6596/" source="CVE"/>
		<reference ref_id="CVE-2008-0318" ref_url="https://www.suse.com/security/cve/CVE-2008-0318/" source="CVE"/>
		<reference ref_id="CVE-2008-0728" ref_url="https://www.suse.com/security/cve/CVE-2008-0728/" source="CVE"/>
		<reference ref_id="CVE-2008-1100" ref_url="https://www.suse.com/security/cve/CVE-2008-1100/" source="CVE"/>
		<reference ref_id="CVE-2008-2713" ref_url="https://www.suse.com/security/cve/CVE-2008-2713/" source="CVE"/>
		<description>
These are all security issues fixed in the clamav-0.96-0.12.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4182/">CVE-2006-4182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4182">CVE-2006-4182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5295/">CVE-2006-5295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5295">CVE-2006-5295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5874/">CVE-2006-5874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5874">CVE-2006-5874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0897/">CVE-2007-0897 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2007-0897">CVE-2007-0897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0898/">CVE-2007-0898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0898">CVE-2007-0898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1745/">CVE-2007-1745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1745">CVE-2007-1745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1997/">CVE-2007-1997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1997">CVE-2007-1997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6335/">CVE-2007-6335 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6335">CVE-2007-6335 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6336/">CVE-2007-6336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6336">CVE-2007-6336 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6337/">CVE-2007-6337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6337">CVE-2007-6337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6595/">CVE-2007-6595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6595">CVE-2007-6595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6596/">CVE-2007-6596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6596">CVE-2007-6596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0318/">CVE-2008-0318 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0318">CVE-2008-0318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0728/">CVE-2008-0728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0728">CVE-2008-0728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1100/">CVE-2008-1100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1100">CVE-2008-1100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2713/">CVE-2008-2713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2713">CVE-2008-2713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988437" comment="clamav-0.96-0.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215645" version="1" class="patch">
	<metadata>
		<title>coolkey-1.1.0-22.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-4129" ref_url="https://www.suse.com/security/cve/CVE-2007-4129/" source="CVE"/>
		<description>
These are all security issues fixed in the coolkey-1.1.0-22.24 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4129/">CVE-2007-4129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4129">CVE-2007-4129 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988438" comment="coolkey-1.1.0-22.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215646" version="1" class="patch">
	<metadata>
		<title>cron-4.1-194.24.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-2607" ref_url="https://www.suse.com/security/cve/CVE-2006-2607/" source="CVE"/>
		<reference ref_id="CVE-2010-0424" ref_url="https://www.suse.com/security/cve/CVE-2010-0424/" source="CVE"/>
		<description>
These are all security issues fixed in the cron-4.1-194.24.4 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2607/">CVE-2006-2607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2607">CVE-2006-2607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0424/">CVE-2010-0424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0424">CVE-2010-0424 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988439" comment="cron-4.1-194.24.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215647" version="1" class="patch">
	<metadata>
		<title>cups-1.3.9-8.30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-0104" ref_url="https://www.suse.com/security/cve/CVE-2007-0104/" source="CVE"/>
		<reference ref_id="CVE-2007-3387" ref_url="https://www.suse.com/security/cve/CVE-2007-3387/" source="CVE"/>
		<reference ref_id="CVE-2007-4351" ref_url="https://www.suse.com/security/cve/CVE-2007-4351/" source="CVE"/>
		<reference ref_id="CVE-2007-4352" ref_url="https://www.suse.com/security/cve/CVE-2007-4352/" source="CVE"/>
		<reference ref_id="CVE-2007-5392" ref_url="https://www.suse.com/security/cve/CVE-2007-5392/" source="CVE"/>
		<reference ref_id="CVE-2007-5393" ref_url="https://www.suse.com/security/cve/CVE-2007-5393/" source="CVE"/>
		<reference ref_id="CVE-2008-0047" ref_url="https://www.suse.com/security/cve/CVE-2008-0047/" source="CVE"/>
		<reference ref_id="CVE-2008-1373" ref_url="https://www.suse.com/security/cve/CVE-2008-1373/" source="CVE"/>
		<reference ref_id="CVE-2008-1693" ref_url="https://www.suse.com/security/cve/CVE-2008-1693/" source="CVE"/>
		<reference ref_id="CVE-2008-1722" ref_url="https://www.suse.com/security/cve/CVE-2008-1722/" source="CVE"/>
		<reference ref_id="CVE-2008-3641" ref_url="https://www.suse.com/security/cve/CVE-2008-3641/" source="CVE"/>
		<reference ref_id="CVE-2009-0163" ref_url="https://www.suse.com/security/cve/CVE-2009-0163/" source="CVE"/>
		<reference ref_id="CVE-2009-0949" ref_url="https://www.suse.com/security/cve/CVE-2009-0949/" source="CVE"/>
		<reference ref_id="CVE-2009-2820" ref_url="https://www.suse.com/security/cve/CVE-2009-2820/" source="CVE"/>
		<reference ref_id="CVE-2009-3553" ref_url="https://www.suse.com/security/cve/CVE-2009-3553/" source="CVE"/>
		<reference ref_id="CVE-2010-0302" ref_url="https://www.suse.com/security/cve/CVE-2010-0302/" source="CVE"/>
		<reference ref_id="CVE-2010-0393" ref_url="https://www.suse.com/security/cve/CVE-2010-0393/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-1.3.9-8.30.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0104/">CVE-2007-0104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0104">CVE-2007-0104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3387/">CVE-2007-3387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3387">CVE-2007-3387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4351/">CVE-2007-4351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4351">CVE-2007-4351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4352/">CVE-2007-4352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4352">CVE-2007-4352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5392/">CVE-2007-5392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5392">CVE-2007-5392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5393/">CVE-2007-5393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5393">CVE-2007-5393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0047/">CVE-2008-0047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0047">CVE-2008-0047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1373/">CVE-2008-1373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1373">CVE-2008-1373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1693/">CVE-2008-1693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1693">CVE-2008-1693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1722/">CVE-2008-1722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1722">CVE-2008-1722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3641/">CVE-2008-3641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3641">CVE-2008-3641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0163/">CVE-2009-0163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0163">CVE-2009-0163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0949/">CVE-2009-0949 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-0949">CVE-2009-0949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2820/">CVE-2009-2820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2820">CVE-2009-2820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3553/">CVE-2009-3553 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-3553">CVE-2009-3553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0302/">CVE-2010-0302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-0302">CVE-2010-0302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0393/">CVE-2010-0393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0393">CVE-2010-0393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988440" comment="cups-1.3.9-8.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988441" comment="cups-client-1.3.9-8.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988442" comment="cups-libs-1.3.9-8.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988443" comment="cups-libs-32bit-1.3.9-8.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988444" comment="cups-libs-x86-1.3.9-8.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215648" version="1" class="patch">
	<metadata>
		<title>curl-7.19.0-11.24.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0037" ref_url="https://www.suse.com/security/cve/CVE-2009-0037/" source="CVE"/>
		<reference ref_id="CVE-2009-2417" ref_url="https://www.suse.com/security/cve/CVE-2009-2417/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-7.19.0-11.24.25 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0037/">CVE-2009-0037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0037">CVE-2009-0037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2417/">CVE-2009-2417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2417">CVE-2009-2417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988445" comment="curl-7.19.0-11.24.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988446" comment="libcurl4-7.19.0-11.24.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988447" comment="libcurl4-32bit-7.19.0-11.24.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988448" comment="libcurl4-x86-7.19.0-11.24.25 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215649" version="1" class="patch">
	<metadata>
		<title>cyrus-imapd-2.3.11-60.21.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-3235" ref_url="https://www.suse.com/security/cve/CVE-2009-3235/" source="CVE"/>
		<description>
These are all security issues fixed in the cyrus-imapd-2.3.11-60.21.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3235/">CVE-2009-3235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3235">CVE-2009-3235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988449" comment="cyrus-imapd-2.3.11-60.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988450" comment="perl-Cyrus-IMAP-2.3.11-60.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988451" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215650" version="1" class="patch">
	<metadata>
		<title>dbus-1-1.2.10-3.11.29 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-6107" ref_url="https://www.suse.com/security/cve/CVE-2006-6107/" source="CVE"/>
		<reference ref_id="CVE-2008-0595" ref_url="https://www.suse.com/security/cve/CVE-2008-0595/" source="CVE"/>
		<reference ref_id="CVE-2008-3834" ref_url="https://www.suse.com/security/cve/CVE-2008-3834/" source="CVE"/>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-1.2.10-3.11.29 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6107/">CVE-2006-6107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6107">CVE-2006-6107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0595/">CVE-2008-0595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0595">CVE-2008-0595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3834/">CVE-2008-3834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3834">CVE-2008-3834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4311">CVE-2008-4311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988452" comment="dbus-1-1.2.10-3.11.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988453" comment="dbus-1-32bit-1.2.10-3.11.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988454" comment="dbus-1-x11-1.2.10-3.11.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988455" comment="dbus-1-x86-1.2.10-3.11.29 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215651" version="1" class="patch">
	<metadata>
		<title>dhcp-3.1.3.ESV-0.3.38 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0692" ref_url="https://www.suse.com/security/cve/CVE-2009-0692/" source="CVE"/>
		<reference ref_id="CVE-2009-1892" ref_url="https://www.suse.com/security/cve/CVE-2009-1892/" source="CVE"/>
		<description>
These are all security issues fixed in the dhcp-3.1.3.ESV-0.3.38 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0692/">CVE-2009-0692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0692">CVE-2009-0692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1892/">CVE-2009-1892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1892">CVE-2009-1892 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988456" comment="dhcp-3.1.3.ESV-0.3.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988457" comment="dhcp-client-3.1.3.ESV-0.3.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988458" comment="dhcp-relay-3.1.3.ESV-0.3.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988459" comment="dhcp-server-3.1.3.ESV-0.3.38 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215652" version="1" class="patch">
	<metadata>
		<title>e2fsprogs-1.41.9-2.1.51 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-5497" ref_url="https://www.suse.com/security/cve/CVE-2007-5497/" source="CVE"/>
		<description>
These are all security issues fixed in the e2fsprogs-1.41.9-2.1.51 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5497/">CVE-2007-5497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5497">CVE-2007-5497 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988460" comment="e2fsprogs-1.41.9-2.1.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988461" comment="libcom_err2-1.41.9-2.1.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988462" comment="libcom_err2-32bit-1.41.9-2.1.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988463" comment="libcom_err2-x86-1.41.9-2.1.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988464" comment="libext2fs2-1.41.9-2.1.51 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215653" version="1" class="patch">
	<metadata>
		<title>emacs-22.3-4.32.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-5795" ref_url="https://www.suse.com/security/cve/CVE-2007-5795/" source="CVE"/>
		<description>
These are all security issues fixed in the emacs-22.3-4.32.4 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5795/">CVE-2007-5795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5795">CVE-2007-5795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988465" comment="emacs-22.3-4.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988466" comment="emacs-el-22.3-4.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988467" comment="emacs-info-22.3-4.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988468" comment="emacs-nox-22.3-4.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988469" comment="emacs-x11-22.3-4.32.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215654" version="1" class="patch">
	<metadata>
		<title>enscript-1.6.4-152.17.55 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-3863" ref_url="https://www.suse.com/security/cve/CVE-2008-3863/" source="CVE"/>
		<reference ref_id="CVE-2008-4306" ref_url="https://www.suse.com/security/cve/CVE-2008-4306/" source="CVE"/>
		<description>
These are all security issues fixed in the enscript-1.6.4-152.17.55 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3863/">CVE-2008-3863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3863">CVE-2008-3863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4306/">CVE-2008-4306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4306">CVE-2008-4306 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988470" comment="enscript-1.6.4-152.17.55 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215655" version="1" class="patch">
	<metadata>
		<title>evince-2.28.2-0.2.68 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-5864" ref_url="https://www.suse.com/security/cve/CVE-2006-5864/" source="CVE"/>
		<description>
These are all security issues fixed in the evince-2.28.2-0.2.68 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5864/">CVE-2006-5864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5864">CVE-2006-5864 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988471" comment="evince-2.28.2-0.2.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988472" comment="evince-doc-2.28.2-0.2.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988473" comment="evince-lang-2.28.2-0.2.68 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215656" version="1" class="patch">
	<metadata>
		<title>evolution-data-server-2.28.2-0.10.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-3257" ref_url="https://www.suse.com/security/cve/CVE-2007-3257/" source="CVE"/>
		<description>
These are all security issues fixed in the evolution-data-server-2.28.2-0.10.9 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3257/">CVE-2007-3257 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3257">CVE-2007-3257 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988474" comment="evolution-data-server-2.28.2-0.10.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988475" comment="evolution-data-server-32bit-2.28.2-0.10.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988476" comment="evolution-data-server-lang-2.28.2-0.10.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988477" comment="evolution-data-server-x86-2.28.2-0.10.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215657" version="1" class="patch">
	<metadata>
		<title>expat-2.0.1-88.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-2625" ref_url="https://www.suse.com/security/cve/CVE-2009-2625/" source="CVE"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.0.1-88.26.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2625/">CVE-2009-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2625">CVE-2009-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3560">CVE-2009-3560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988478" comment="expat-2.0.1-88.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988479" comment="libexpat1-2.0.1-88.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988480" comment="libexpat1-32bit-2.0.1-88.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988481" comment="libexpat1-x86-2.0.1-88.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215658" version="1" class="patch">
	<metadata>
		<title>fetchmail-6.3.8.90-13.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-5867" ref_url="https://www.suse.com/security/cve/CVE-2006-5867/" source="CVE"/>
		<reference ref_id="CVE-2006-5974" ref_url="https://www.suse.com/security/cve/CVE-2006-5974/" source="CVE"/>
		<reference ref_id="CVE-2007-1558" ref_url="https://www.suse.com/security/cve/CVE-2007-1558/" source="CVE"/>
		<reference ref_id="CVE-2007-4565" ref_url="https://www.suse.com/security/cve/CVE-2007-4565/" source="CVE"/>
		<reference ref_id="CVE-2009-2666" ref_url="https://www.suse.com/security/cve/CVE-2009-2666/" source="CVE"/>
		<description>
These are all security issues fixed in the fetchmail-6.3.8.90-13.16.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5867/">CVE-2006-5867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5867">CVE-2006-5867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5974/">CVE-2006-5974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5974">CVE-2006-5974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1558/">CVE-2007-1558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1558">CVE-2007-1558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4565/">CVE-2007-4565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4565">CVE-2007-4565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2666/">CVE-2009-2666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2666">CVE-2009-2666 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988482" comment="fetchmail-6.3.8.90-13.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988483" comment="fetchmailconf-6.3.8.90-13.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215659" version="1" class="patch">
	<metadata>
		<title>file-32bit-4.24-43.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-1536" ref_url="https://www.suse.com/security/cve/CVE-2007-1536/" source="CVE"/>
		<reference ref_id="CVE-2007-2799" ref_url="https://www.suse.com/security/cve/CVE-2007-2799/" source="CVE"/>
		<description>
These are all security issues fixed in the file-32bit-4.24-43.17 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1536/">CVE-2007-1536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1536">CVE-2007-1536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2799/">CVE-2007-2799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2799">CVE-2007-2799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988484" comment="file-4.24-43.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988485" comment="file-32bit-4.24-43.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988486" comment="file-x86-4.24-43.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215660" version="1" class="patch">
	<metadata>
		<title>findutils-4.4.0-38.24.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-2452" ref_url="https://www.suse.com/security/cve/CVE-2007-2452/" source="CVE"/>
		<description>
These are all security issues fixed in the findutils-4.4.0-38.24.11 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2452/">CVE-2007-2452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2452">CVE-2007-2452 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988487" comment="findutils-4.4.0-38.24.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988488" comment="findutils-locate-4.4.0-38.24.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215661" version="1" class="patch">
	<metadata>
		<title>freeradius-server-2.1.1-7.7.19.77 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-4474" ref_url="https://www.suse.com/security/cve/CVE-2008-4474/" source="CVE"/>
		<description>
These are all security issues fixed in the freeradius-server-2.1.1-7.7.19.77 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4474/">CVE-2008-4474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4474">CVE-2008-4474 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988489" comment="freeradius-server-2.1.1-7.7.19.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988490" comment="freeradius-server-dialupadmin-2.1.1-7.7.19.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988491" comment="freeradius-server-doc-2.1.1-7.7.19.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988492" comment="freeradius-server-libs-2.1.1-7.7.19.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988493" comment="freeradius-server-utils-2.1.1-7.7.19.77 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215662" version="1" class="patch">
	<metadata>
		<title>freetype2-2.3.7-25.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-1351" ref_url="https://www.suse.com/security/cve/CVE-2007-1351/" source="CVE"/>
		<reference ref_id="CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946/" source="CVE"/>
		<description>
These are all security issues fixed in the freetype2-2.3.7-25.10.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1351/">CVE-2007-1351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1351">CVE-2007-1351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0946">CVE-2009-0946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988494" comment="freetype2-2.3.7-25.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988495" comment="freetype2-32bit-2.3.7-25.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988496" comment="freetype2-x86-2.3.7-25.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215663" version="1" class="patch">
	<metadata>
		<title>ft2demos-2.3.7-25.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-1351" ref_url="https://www.suse.com/security/cve/CVE-2007-1351/" source="CVE"/>
		<description>
These are all security issues fixed in the ft2demos-2.3.7-25.9 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1351/">CVE-2007-1351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1351">CVE-2007-1351 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988497" comment="ft2demos-2.3.7-25.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215664" version="1" class="patch">
	<metadata>
		<title>fuse-2.7.2-61.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-3297" ref_url="https://www.suse.com/security/cve/CVE-2009-3297/" source="CVE"/>
		<description>
These are all security issues fixed in the fuse-2.7.2-61.18.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3297/">CVE-2009-3297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3297">CVE-2009-3297 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988498" comment="fuse-2.7.2-61.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988499" comment="libfuse2-2.7.2-61.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215665" version="1" class="patch">
	<metadata>
		<title>fvwm2-2.5.26-1.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-5969" ref_url="https://www.suse.com/security/cve/CVE-2006-5969/" source="CVE"/>
		<description>
These are all security issues fixed in the fvwm2-2.5.26-1.25 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5969/">CVE-2006-5969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5969">CVE-2006-5969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988500" comment="fvwm2-2.5.26-1.25 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215666" version="1" class="patch">
	<metadata>
		<title>g3utils-1.1.36-26.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-4936" ref_url="https://www.suse.com/security/cve/CVE-2008-4936/" source="CVE"/>
		<description>
These are all security issues fixed in the g3utils-1.1.36-26.31 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4936/">CVE-2008-4936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4936">CVE-2008-4936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988501" comment="g3utils-1.1.36-26.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988502" comment="mgetty-1.1.36-26.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215667" version="1" class="patch">
	<metadata>
		<title>gd-2.0.36.RC1-52.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-2756" ref_url="https://www.suse.com/security/cve/CVE-2007-2756/" source="CVE"/>
		<description>
These are all security issues fixed in the gd-2.0.36.RC1-52.18 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2756/">CVE-2007-2756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2756">CVE-2007-2756 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988503" comment="gd-2.0.36.RC1-52.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215668" version="1" class="patch">
	<metadata>
		<title>ghostscript-fonts-other-8.62-32.27.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0196" ref_url="https://www.suse.com/security/cve/CVE-2009-0196/" source="CVE"/>
		<reference ref_id="CVE-2009-0583" ref_url="https://www.suse.com/security/cve/CVE-2009-0583/" source="CVE"/>
		<reference ref_id="CVE-2009-0584" ref_url="https://www.suse.com/security/cve/CVE-2009-0584/" source="CVE"/>
		<reference ref_id="CVE-2009-0792" ref_url="https://www.suse.com/security/cve/CVE-2009-0792/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-fonts-other-8.62-32.27.31 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0196/">CVE-2009-0196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0196">CVE-2009-0196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0583/">CVE-2009-0583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0583">CVE-2009-0583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0584/">CVE-2009-0584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0584">CVE-2009-0584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0792/">CVE-2009-0792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0792">CVE-2009-0792 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988504" comment="ghostscript-fonts-other-8.62-32.27.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988505" comment="ghostscript-fonts-rus-8.62-32.27.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988506" comment="ghostscript-fonts-std-8.62-32.27.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988507" comment="ghostscript-library-8.62-32.27.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988508" comment="ghostscript-omni-8.62-32.27.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988509" comment="ghostscript-x11-8.62-32.27.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988510" comment="libgimpprint-4.2.7-32.27.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215669" version="1" class="patch">
	<metadata>
		<title>glib2-2.22.5-0.2.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-2371" ref_url="https://www.suse.com/security/cve/CVE-2008-2371/" source="CVE"/>
		<reference ref_id="CVE-2008-4316" ref_url="https://www.suse.com/security/cve/CVE-2008-4316/" source="CVE"/>
		<description>
These are all security issues fixed in the glib2-2.22.5-0.2.23 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2371/">CVE-2008-2371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2371">CVE-2008-2371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4316/">CVE-2008-4316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4316">CVE-2008-4316 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988511" comment="glib2-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988512" comment="glib2-doc-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988513" comment="glib2-lang-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988514" comment="libgio-2_0-0-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988515" comment="libgio-2_0-0-32bit-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988516" comment="libgio-2_0-0-x86-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988517" comment="libglib-2_0-0-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988518" comment="libglib-2_0-0-32bit-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988519" comment="libglib-2_0-0-x86-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988520" comment="libgmodule-2_0-0-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988521" comment="libgmodule-2_0-0-32bit-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988522" comment="libgmodule-2_0-0-x86-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988523" comment="libgobject-2_0-0-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988524" comment="libgobject-2_0-0-32bit-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988525" comment="libgobject-2_0-0-x86-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988526" comment="libgthread-2_0-0-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988527" comment="libgthread-2_0-0-32bit-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988528" comment="libgthread-2_0-0-x86-2.22.5-0.2.23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215670" version="1" class="patch">
	<metadata>
		<title>gmime-2.2.23-1.41.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-0409" ref_url="https://www.suse.com/security/cve/CVE-2010-0409/" source="CVE"/>
		<description>
These are all security issues fixed in the gmime-2.2.23-1.41.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0409/">CVE-2010-0409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0409">CVE-2010-0409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988529" comment="gmime-2.2.23-1.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988530" comment="gmime-2_4-2.4.8-1.2.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988531" comment="gmime-doc-2.2.23-1.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988532" comment="libgmime-2_0-3-2.2.23-1.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988533" comment="libgmime-2_4-2-2.4.8-1.2.55 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215671" version="1" class="patch">
	<metadata>
		<title>gnome-screensaver-2.28.3-0.4.30 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-0887" ref_url="https://www.suse.com/security/cve/CVE-2008-0887/" source="CVE"/>
		<reference ref_id="CVE-2010-0414" ref_url="https://www.suse.com/security/cve/CVE-2010-0414/" source="CVE"/>
		<reference ref_id="CVE-2010-0422" ref_url="https://www.suse.com/security/cve/CVE-2010-0422/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-screensaver-2.28.3-0.4.30 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0887/">CVE-2008-0887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0887">CVE-2008-0887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0414/">CVE-2010-0414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0414">CVE-2010-0414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0422/">CVE-2010-0422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0422">CVE-2010-0422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988534" comment="gnome-screensaver-2.28.3-0.4.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988535" comment="gnome-screensaver-lang-2.28.3-0.4.30 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215672" version="1" class="patch">
	<metadata>
		<title>gnutls-2.4.1-24.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-4790" ref_url="https://www.suse.com/security/cve/CVE-2006-4790/" source="CVE"/>
		<reference ref_id="CVE-2008-1948" ref_url="https://www.suse.com/security/cve/CVE-2008-1948/" source="CVE"/>
		<reference ref_id="CVE-2008-1949" ref_url="https://www.suse.com/security/cve/CVE-2008-1949/" source="CVE"/>
		<reference ref_id="CVE-2008-1950" ref_url="https://www.suse.com/security/cve/CVE-2008-1950/" source="CVE"/>
		<reference ref_id="CVE-2008-4989" ref_url="https://www.suse.com/security/cve/CVE-2008-4989/" source="CVE"/>
		<reference ref_id="CVE-2009-2730" ref_url="https://www.suse.com/security/cve/CVE-2009-2730/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-2.4.1-24.19.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4790/">CVE-2006-4790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4790">CVE-2006-4790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1948/">CVE-2008-1948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1948">CVE-2008-1948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1949/">CVE-2008-1949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1949">CVE-2008-1949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1950/">CVE-2008-1950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1950">CVE-2008-1950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4989/">CVE-2008-4989 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2008-4989">CVE-2008-4989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2730/">CVE-2009-2730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2730">CVE-2009-2730 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988536" comment="gnutls-2.4.1-24.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988537" comment="libgnutls26-2.4.1-24.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988538" comment="libgnutls26-32bit-2.4.1-24.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988539" comment="libgnutls26-x86-2.4.1-24.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215673" version="1" class="patch">
	<metadata>
		<title>gpg2-2.0.9-25.25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-3746" ref_url="https://www.suse.com/security/cve/CVE-2006-3746/" source="CVE"/>
		<reference ref_id="CVE-2006-6169" ref_url="https://www.suse.com/security/cve/CVE-2006-6169/" source="CVE"/>
		<reference ref_id="CVE-2008-1530" ref_url="https://www.suse.com/security/cve/CVE-2008-1530/" source="CVE"/>
		<description>
These are all security issues fixed in the gpg2-2.0.9-25.25.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3746/">CVE-2006-3746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3746">CVE-2006-3746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6169/">CVE-2006-6169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6169">CVE-2006-6169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1530/">CVE-2008-1530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1530">CVE-2008-1530 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988540" comment="gpg2-2.0.9-25.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988541" comment="gpg2-lang-2.0.9-25.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215674" version="1" class="patch">
	<metadata>
		<title>gstreamer-0_10-plugins-base-0.10.25-1.1.133 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0586" ref_url="https://www.suse.com/security/cve/CVE-2009-0586/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-0_10-plugins-base-0.10.25-1.1.133 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0586/">CVE-2009-0586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0586">CVE-2009-0586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988542" comment="gstreamer-0_10-plugins-base-0.10.25-1.1.133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988543" comment="gstreamer-0_10-plugins-base-32bit-0.10.25-1.1.133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988544" comment="gstreamer-0_10-plugins-base-doc-0.10.25-1.1.133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988545" comment="gstreamer-0_10-plugins-base-lang-0.10.25-1.1.133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988546" comment="gstreamer-0_10-plugins-base-x86-0.10.25-1.1.133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988547" comment="libgstapp-0_10-0-0.10.25-1.1.133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988548" comment="libgstapp-0_10-0-32bit-0.10.25-1.1.133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988549" comment="libgstapp-0_10-0-x86-0.10.25-1.1.133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988550" comment="libgstinterfaces-0_10-0-0.10.25-1.1.133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988551" comment="libgstinterfaces-0_10-0-32bit-0.10.25-1.1.133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988552" comment="libgstinterfaces-0_10-0-x86-0.10.25-1.1.133 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215675" version="1" class="patch">
	<metadata>
		<title>gstreamer-0_10-plugins-good-0.10.17-1.1.126 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-1686" ref_url="https://www.suse.com/security/cve/CVE-2008-1686/" source="CVE"/>
		<reference ref_id="CVE-2009-0386" ref_url="https://www.suse.com/security/cve/CVE-2009-0386/" source="CVE"/>
		<reference ref_id="CVE-2009-0387" ref_url="https://www.suse.com/security/cve/CVE-2009-0387/" source="CVE"/>
		<reference ref_id="CVE-2009-0397" ref_url="https://www.suse.com/security/cve/CVE-2009-0397/" source="CVE"/>
		<reference ref_id="CVE-2009-1932" ref_url="https://www.suse.com/security/cve/CVE-2009-1932/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-0_10-plugins-good-0.10.17-1.1.126 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1686/">CVE-2008-1686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1686">CVE-2008-1686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0386/">CVE-2009-0386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0386">CVE-2009-0386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0387/">CVE-2009-0387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0387">CVE-2009-0387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0397/">CVE-2009-0397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0397">CVE-2009-0397 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1932/">CVE-2009-1932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1932">CVE-2009-1932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988553" comment="gstreamer-0_10-plugins-good-0.10.17-1.1.126 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988554" comment="gstreamer-0_10-plugins-good-doc-0.10.17-1.1.126 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988555" comment="gstreamer-0_10-plugins-good-lang-0.10.17-1.1.126 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215676" version="1" class="patch">
	<metadata>
		<title>gtk2-2.18.9-0.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-0010" ref_url="https://www.suse.com/security/cve/CVE-2007-0010/" source="CVE"/>
		<description>
These are all security issues fixed in the gtk2-2.18.9-0.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0010/">CVE-2007-0010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0010">CVE-2007-0010 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988556" comment="gtk2-2.18.9-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988557" comment="gtk2-32bit-2.18.9-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988558" comment="gtk2-doc-2.18.9-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988559" comment="gtk2-lang-2.18.9-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988560" comment="gtk2-x86-2.18.9-0.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215677" version="1" class="patch">
	<metadata>
		<title>gvim-7.2-8.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-2438" ref_url="https://www.suse.com/security/cve/CVE-2007-2438/" source="CVE"/>
		<reference ref_id="CVE-2007-2953" ref_url="https://www.suse.com/security/cve/CVE-2007-2953/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-7.2-8.8 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2438/">CVE-2007-2438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2438">CVE-2007-2438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2953/">CVE-2007-2953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2953">CVE-2007-2953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988561" comment="gvim-7.2-8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988562" comment="vim-7.2-8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988563" comment="vim-base-7.2-8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988564" comment="vim-data-7.2-8.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215678" version="1" class="patch">
	<metadata>
		<title>gzip-1.3.12-69.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-2624" ref_url="https://www.suse.com/security/cve/CVE-2009-2624/" source="CVE"/>
		<reference ref_id="CVE-2010-0001" ref_url="https://www.suse.com/security/cve/CVE-2010-0001/" source="CVE"/>
		<description>
These are all security issues fixed in the gzip-1.3.12-69.19.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2624/">CVE-2009-2624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2624">CVE-2009-2624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0001/">CVE-2010-0001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0001">CVE-2010-0001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988565" comment="gzip-1.3.12-69.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215679" version="1" class="patch">
	<metadata>
		<title>hplip-3.9.8-3.4.30 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-5208" ref_url="https://www.suse.com/security/cve/CVE-2007-5208/" source="CVE"/>
		<description>
These are all security issues fixed in the hplip-3.9.8-3.4.30 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5208/">CVE-2007-5208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5208">CVE-2007-5208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988566" comment="hplip-3.9.8-3.4.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988567" comment="hplip-hpijs-3.9.8-3.4.30 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215680" version="1" class="patch">
	<metadata>
		<title>ipsec-tools-0.7.3-1.1.93 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-1841" ref_url="https://www.suse.com/security/cve/CVE-2007-1841/" source="CVE"/>
		<reference ref_id="CVE-2008-3652" ref_url="https://www.suse.com/security/cve/CVE-2008-3652/" source="CVE"/>
		<description>
These are all security issues fixed in the ipsec-tools-0.7.3-1.1.93 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1841/">CVE-2007-1841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1841">CVE-2007-1841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3652/">CVE-2008-3652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3652">CVE-2008-3652 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988568" comment="ipsec-tools-0.7.3-1.1.93 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215681" version="1" class="patch">
	<metadata>
		<title>java-1_4_2-ibm-1.4.2_sr13.3-1.1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-2788" ref_url="https://www.suse.com/security/cve/CVE-2007-2788/" source="CVE"/>
		<reference ref_id="CVE-2007-2789" ref_url="https://www.suse.com/security/cve/CVE-2007-2789/" source="CVE"/>
		<reference ref_id="CVE-2007-3004" ref_url="https://www.suse.com/security/cve/CVE-2007-3004/" source="CVE"/>
		<reference ref_id="CVE-2007-3005" ref_url="https://www.suse.com/security/cve/CVE-2007-3005/" source="CVE"/>
		<reference ref_id="CVE-2007-3655" ref_url="https://www.suse.com/security/cve/CVE-2007-3655/" source="CVE"/>
		<reference ref_id="CVE-2007-3698" ref_url="https://www.suse.com/security/cve/CVE-2007-3698/" source="CVE"/>
		<reference ref_id="CVE-2007-3922" ref_url="https://www.suse.com/security/cve/CVE-2007-3922/" source="CVE"/>
		<reference ref_id="CVE-2007-4381" ref_url="https://www.suse.com/security/cve/CVE-2007-4381/" source="CVE"/>
		<reference ref_id="CVE-2007-5232" ref_url="https://www.suse.com/security/cve/CVE-2007-5232/" source="CVE"/>
		<reference ref_id="CVE-2007-5236" ref_url="https://www.suse.com/security/cve/CVE-2007-5236/" source="CVE"/>
		<reference ref_id="CVE-2007-5238" ref_url="https://www.suse.com/security/cve/CVE-2007-5238/" source="CVE"/>
		<reference ref_id="CVE-2007-5239" ref_url="https://www.suse.com/security/cve/CVE-2007-5239/" source="CVE"/>
		<reference ref_id="CVE-2007-5240" ref_url="https://www.suse.com/security/cve/CVE-2007-5240/" source="CVE"/>
		<reference ref_id="CVE-2007-5273" ref_url="https://www.suse.com/security/cve/CVE-2007-5273/" source="CVE"/>
		<reference ref_id="CVE-2007-5274" ref_url="https://www.suse.com/security/cve/CVE-2007-5274/" source="CVE"/>
		<reference ref_id="CVE-2008-1187" ref_url="https://www.suse.com/security/cve/CVE-2008-1187/" source="CVE"/>
		<reference ref_id="CVE-2008-1189" ref_url="https://www.suse.com/security/cve/CVE-2008-1189/" source="CVE"/>
		<reference ref_id="CVE-2008-1190" ref_url="https://www.suse.com/security/cve/CVE-2008-1190/" source="CVE"/>
		<reference ref_id="CVE-2008-1192" ref_url="https://www.suse.com/security/cve/CVE-2008-1192/" source="CVE"/>
		<reference ref_id="CVE-2008-1195" ref_url="https://www.suse.com/security/cve/CVE-2008-1195/" source="CVE"/>
		<reference ref_id="CVE-2008-1196" ref_url="https://www.suse.com/security/cve/CVE-2008-1196/" source="CVE"/>
		<reference ref_id="CVE-2008-3104" ref_url="https://www.suse.com/security/cve/CVE-2008-3104/" source="CVE"/>
		<reference ref_id="CVE-2008-3112" ref_url="https://www.suse.com/security/cve/CVE-2008-3112/" source="CVE"/>
		<reference ref_id="CVE-2008-3113" ref_url="https://www.suse.com/security/cve/CVE-2008-3113/" source="CVE"/>
		<reference ref_id="CVE-2008-3114" ref_url="https://www.suse.com/security/cve/CVE-2008-3114/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_4_2-ibm-1.4.2_sr13.3-1.1.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2788/">CVE-2007-2788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2788">CVE-2007-2788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2789/">CVE-2007-2789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2789">CVE-2007-2789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3004/">CVE-2007-3004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3004">CVE-2007-3004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3005/">CVE-2007-3005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3005">CVE-2007-3005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3655/">CVE-2007-3655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3655">CVE-2007-3655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3698/">CVE-2007-3698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3698">CVE-2007-3698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3922/">CVE-2007-3922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3922">CVE-2007-3922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4381/">CVE-2007-4381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4381">CVE-2007-4381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5232/">CVE-2007-5232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5232">CVE-2007-5232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5236/">CVE-2007-5236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5236">CVE-2007-5236 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5238/">CVE-2007-5238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5238">CVE-2007-5238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5239/">CVE-2007-5239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5239">CVE-2007-5239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5240/">CVE-2007-5240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5240">CVE-2007-5240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5273/">CVE-2007-5273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5273">CVE-2007-5273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5274/">CVE-2007-5274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5274">CVE-2007-5274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1187/">CVE-2008-1187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1187">CVE-2008-1187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1189/">CVE-2008-1189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1189">CVE-2008-1189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1190/">CVE-2008-1190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1190">CVE-2008-1190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1192/">CVE-2008-1192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1192">CVE-2008-1192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1195/">CVE-2008-1195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1195">CVE-2008-1195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1196/">CVE-2008-1196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1196">CVE-2008-1196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3104/">CVE-2008-3104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3104">CVE-2008-3104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3112/">CVE-2008-3112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3112">CVE-2008-3112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3113/">CVE-2008-3113 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3113">CVE-2008-3113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3114/">CVE-2008-3114 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3114">CVE-2008-3114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988569" comment="java-1_4_2-ibm-1.4.2_sr13.3-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988570" comment="java-1_4_2-ibm-jdbc-1.4.2_sr13.3-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988571" comment="java-1_4_2-ibm-plugin-1.4.2_sr13.3-1.1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215682" version="1" class="patch">
	<metadata>
		<title>java-1_6_0-ibm-1.6.0_sr7.0-1.6.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-1187" ref_url="https://www.suse.com/security/cve/CVE-2008-1187/" source="CVE"/>
		<reference ref_id="CVE-2008-1188" ref_url="https://www.suse.com/security/cve/CVE-2008-1188/" source="CVE"/>
		<reference ref_id="CVE-2008-1189" ref_url="https://www.suse.com/security/cve/CVE-2008-1189/" source="CVE"/>
		<reference ref_id="CVE-2008-1190" ref_url="https://www.suse.com/security/cve/CVE-2008-1190/" source="CVE"/>
		<reference ref_id="CVE-2008-1191" ref_url="https://www.suse.com/security/cve/CVE-2008-1191/" source="CVE"/>
		<reference ref_id="CVE-2008-1192" ref_url="https://www.suse.com/security/cve/CVE-2008-1192/" source="CVE"/>
		<reference ref_id="CVE-2008-1193" ref_url="https://www.suse.com/security/cve/CVE-2008-1193/" source="CVE"/>
		<reference ref_id="CVE-2008-1194" ref_url="https://www.suse.com/security/cve/CVE-2008-1194/" source="CVE"/>
		<reference ref_id="CVE-2008-1195" ref_url="https://www.suse.com/security/cve/CVE-2008-1195/" source="CVE"/>
		<reference ref_id="CVE-2008-1196" ref_url="https://www.suse.com/security/cve/CVE-2008-1196/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_6_0-ibm-1.6.0_sr7.0-1.6.21 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1187/">CVE-2008-1187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1187">CVE-2008-1187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1188/">CVE-2008-1188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1188">CVE-2008-1188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1189/">CVE-2008-1189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1189">CVE-2008-1189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1190/">CVE-2008-1190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1190">CVE-2008-1190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1191/">CVE-2008-1191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1191">CVE-2008-1191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1192/">CVE-2008-1192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1192">CVE-2008-1192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1193/">CVE-2008-1193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1193">CVE-2008-1193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1194/">CVE-2008-1194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1194">CVE-2008-1194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1195/">CVE-2008-1195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1195">CVE-2008-1195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1196/">CVE-2008-1196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1196">CVE-2008-1196 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988572" comment="java-1_6_0-ibm-1.6.0_sr7.0-1.6.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988573" comment="java-1_6_0-ibm-alsa-1.6.0_sr7.0-1.6.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988574" comment="java-1_6_0-ibm-fonts-1.6.0_sr7.0-1.6.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988575" comment="java-1_6_0-ibm-jdbc-1.6.0_sr7.0-1.6.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988576" comment="java-1_6_0-ibm-plugin-1.6.0_sr7.0-1.6.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215683" version="1" class="patch">
	<metadata>
		<title>kde4-kgreeter-plugins-4.3.5-0.8.35 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-0436" ref_url="https://www.suse.com/security/cve/CVE-2010-0436/" source="CVE"/>
		<description>
These are all security issues fixed in the kde4-kgreeter-plugins-4.3.5-0.8.35 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0436/">CVE-2010-0436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0436">CVE-2010-0436 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988577" comment="kde4-kgreeter-plugins-4.3.5-0.8.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988578" comment="kdebase4-wallpapers-4.3.5-0.8.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988579" comment="kdebase4-workspace-4.3.5-0.8.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988580" comment="kdebase4-workspace-ksysguardd-4.3.5-0.8.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988581" comment="kdm-4.3.5-0.8.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988582" comment="kwin-4.3.5-0.8.35 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215684" version="1" class="patch">
	<metadata>
		<title>kdebase3-runtime-3.5.10-20.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-4569" ref_url="https://www.suse.com/security/cve/CVE-2007-4569/" source="CVE"/>
		<description>
These are all security issues fixed in the kdebase3-runtime-3.5.10-20.31 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4569/">CVE-2007-4569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4569">CVE-2007-4569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988583" comment="kdebase3-runtime-3.5.10-20.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988584" comment="kdebase3-runtime-32bit-3.5.10-20.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988585" comment="kdebase3-runtime-x86-3.5.10-20.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215685" version="1" class="patch">
	<metadata>
		<title>kdelibs3-3.5.10-23.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-3820" ref_url="https://www.suse.com/security/cve/CVE-2007-3820/" source="CVE"/>
		<reference ref_id="CVE-2007-4224" ref_url="https://www.suse.com/security/cve/CVE-2007-4224/" source="CVE"/>
		<reference ref_id="CVE-2007-4225" ref_url="https://www.suse.com/security/cve/CVE-2007-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-1671" ref_url="https://www.suse.com/security/cve/CVE-2008-1671/" source="CVE"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<description>
These are all security issues fixed in the kdelibs3-3.5.10-23.27.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3820/">CVE-2007-3820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3820">CVE-2007-3820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4224/">CVE-2007-4224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4224">CVE-2007-4224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4225/">CVE-2007-4225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4225">CVE-2007-4225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1671/">CVE-2008-1671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1671">CVE-2008-1671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0689">CVE-2009-0689 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988586" comment="kdelibs3-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988587" comment="kdelibs3-32bit-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988588" comment="kdelibs3-default-style-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988589" comment="kdelibs3-default-style-32bit-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988590" comment="kdelibs3-default-style-x86-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988591" comment="kdelibs3-x86-3.5.10-23.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215686" version="1" class="patch">
	<metadata>
		<title>kdelibs4-4.3.5-0.2.46 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<description>
These are all security issues fixed in the kdelibs4-4.3.5-0.2.46 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0689">CVE-2009-0689 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988592" comment="kdelibs4-4.3.5-0.2.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988593" comment="kdelibs4-core-4.3.5-0.2.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988594" comment="kdelibs4-doc-4.3.5-0.2.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988595" comment="libkde4-4.3.5-0.2.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988596" comment="libkde4-32bit-4.3.5-0.2.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988597" comment="libkde4-x86-4.3.5-0.2.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988598" comment="libkdecore4-4.3.5-0.2.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988599" comment="libkdecore4-32bit-4.3.5-0.2.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988600" comment="libkdecore4-x86-4.3.5-0.2.46 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215687" version="1" class="patch">
	<metadata>
		<title>kernel-default-2.6.32.12-0.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-0007" ref_url="https://www.suse.com/security/cve/CVE-2008-0007/" source="CVE"/>
		<reference ref_id="CVE-2008-0009" ref_url="https://www.suse.com/security/cve/CVE-2008-0009/" source="CVE"/>
		<reference ref_id="CVE-2008-0010" ref_url="https://www.suse.com/security/cve/CVE-2008-0010/" source="CVE"/>
		<reference ref_id="CVE-2008-1375" ref_url="https://www.suse.com/security/cve/CVE-2008-1375/" source="CVE"/>
		<reference ref_id="CVE-2008-1669" ref_url="https://www.suse.com/security/cve/CVE-2008-1669/" source="CVE"/>
		<reference ref_id="CVE-2008-1673" ref_url="https://www.suse.com/security/cve/CVE-2008-1673/" source="CVE"/>
		<reference ref_id="CVE-2008-1675" ref_url="https://www.suse.com/security/cve/CVE-2008-1675/" source="CVE"/>
		<reference ref_id="CVE-2008-3528" ref_url="https://www.suse.com/security/cve/CVE-2008-3528/" source="CVE"/>
		<reference ref_id="CVE-2008-3831" ref_url="https://www.suse.com/security/cve/CVE-2008-3831/" source="CVE"/>
		<reference ref_id="CVE-2008-5079" ref_url="https://www.suse.com/security/cve/CVE-2008-5079/" source="CVE"/>
		<reference ref_id="CVE-2008-5182" ref_url="https://www.suse.com/security/cve/CVE-2008-5182/" source="CVE"/>
		<reference ref_id="CVE-2008-5300" ref_url="https://www.suse.com/security/cve/CVE-2008-5300/" source="CVE"/>
		<reference ref_id="CVE-2009-0029" ref_url="https://www.suse.com/security/cve/CVE-2009-0029/" source="CVE"/>
		<reference ref_id="CVE-2009-3939" ref_url="https://www.suse.com/security/cve/CVE-2009-3939/" source="CVE"/>
		<reference ref_id="CVE-2009-4026" ref_url="https://www.suse.com/security/cve/CVE-2009-4026/" source="CVE"/>
		<reference ref_id="CVE-2009-4027" ref_url="https://www.suse.com/security/cve/CVE-2009-4027/" source="CVE"/>
		<reference ref_id="CVE-2009-4131" ref_url="https://www.suse.com/security/cve/CVE-2009-4131/" source="CVE"/>
		<reference ref_id="CVE-2009-4138" ref_url="https://www.suse.com/security/cve/CVE-2009-4138/" source="CVE"/>
		<reference ref_id="CVE-2009-4536" ref_url="https://www.suse.com/security/cve/CVE-2009-4536/" source="CVE"/>
		<reference ref_id="CVE-2009-4537" ref_url="https://www.suse.com/security/cve/CVE-2009-4537/" source="CVE"/>
		<reference ref_id="CVE-2009-4538" ref_url="https://www.suse.com/security/cve/CVE-2009-4538/" source="CVE"/>
		<reference ref_id="CVE-2010-0415" ref_url="https://www.suse.com/security/cve/CVE-2010-0415/" source="CVE"/>
		<reference ref_id="CVE-2010-0622" ref_url="https://www.suse.com/security/cve/CVE-2010-0622/" source="CVE"/>
		<reference ref_id="CVE-2010-0623" ref_url="https://www.suse.com/security/cve/CVE-2010-0623/" source="CVE"/>
		<reference ref_id="CVE-2010-1146" ref_url="https://www.suse.com/security/cve/CVE-2010-1146/" source="CVE"/>
		<reference ref_id="CVE-2010-1437" ref_url="https://www.suse.com/security/cve/CVE-2010-1437/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-default-2.6.32.12-0.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0007/">CVE-2008-0007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0007">CVE-2008-0007 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0009/">CVE-2008-0009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0009">CVE-2008-0009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0010/">CVE-2008-0010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0010">CVE-2008-0010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1375/">CVE-2008-1375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1375">CVE-2008-1375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1669/">CVE-2008-1669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1669">CVE-2008-1669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1673/">CVE-2008-1673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1673">CVE-2008-1673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1675/">CVE-2008-1675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1675">CVE-2008-1675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3528/">CVE-2008-3528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3528">CVE-2008-3528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3831/">CVE-2008-3831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3831">CVE-2008-3831 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2008-5079/">CVE-2008-5079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5079">CVE-2008-5079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5182/">CVE-2008-5182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5182">CVE-2008-5182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5300/">CVE-2008-5300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5300">CVE-2008-5300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0029/">CVE-2009-0029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0029">CVE-2009-0029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3939/">CVE-2009-3939 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-3939">CVE-2009-3939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4026/">CVE-2009-4026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4026">CVE-2009-4026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4027/">CVE-2009-4027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4027">CVE-2009-4027 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4131/">CVE-2009-4131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4131">CVE-2009-4131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4138/">CVE-2009-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4138">CVE-2009-4138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4536/">CVE-2009-4536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4536">CVE-2009-4536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4537/">CVE-2009-4537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4537">CVE-2009-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4538/">CVE-2009-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4538">CVE-2009-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0415/">CVE-2010-0415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0415">CVE-2010-0415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0622/">CVE-2010-0622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0622">CVE-2010-0622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0623/">CVE-2010-0623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0623">CVE-2010-0623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1146/">CVE-2010-1146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1146">CVE-2010-1146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1437/">CVE-2010-1437 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1437">CVE-2010-1437 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988601" comment="kernel-default-2.6.32.12-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988602" comment="kernel-default-base-2.6.32.12-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988604" comment="kernel-default-man-2.6.32.12-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988605" comment="kernel-pae-2.6.32.12-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988606" comment="kernel-pae-base-2.6.32.12-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988608" comment="kernel-ppc64-2.6.32.12-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988609" comment="kernel-ppc64-base-2.6.32.12-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988611" comment="kernel-source-2.6.32.12-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988612" comment="kernel-syms-2.6.32.12-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988613" comment="kernel-trace-2.6.32.12-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988614" comment="kernel-trace-base-2.6.32.12-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988616" comment="kernel-xen-2.6.32.12-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988617" comment="kernel-xen-base-2.6.32.12-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215688" version="1" class="patch">
	<metadata>
		<title>krb5-1.6.3-133.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-6143" ref_url="https://www.suse.com/security/cve/CVE-2006-6143/" source="CVE"/>
		<reference ref_id="CVE-2006-6144" ref_url="https://www.suse.com/security/cve/CVE-2006-6144/" source="CVE"/>
		<reference ref_id="CVE-2007-0956" ref_url="https://www.suse.com/security/cve/CVE-2007-0956/" source="CVE"/>
		<reference ref_id="CVE-2007-0957" ref_url="https://www.suse.com/security/cve/CVE-2007-0957/" source="CVE"/>
		<reference ref_id="CVE-2007-1216" ref_url="https://www.suse.com/security/cve/CVE-2007-1216/" source="CVE"/>
		<reference ref_id="CVE-2007-2442" ref_url="https://www.suse.com/security/cve/CVE-2007-2442/" source="CVE"/>
		<reference ref_id="CVE-2007-2443" ref_url="https://www.suse.com/security/cve/CVE-2007-2443/" source="CVE"/>
		<reference ref_id="CVE-2007-2798" ref_url="https://www.suse.com/security/cve/CVE-2007-2798/" source="CVE"/>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<reference ref_id="CVE-2007-4000" ref_url="https://www.suse.com/security/cve/CVE-2007-4000/" source="CVE"/>
		<reference ref_id="CVE-2007-4743" ref_url="https://www.suse.com/security/cve/CVE-2007-4743/" source="CVE"/>
		<reference ref_id="CVE-2007-5894" ref_url="https://www.suse.com/security/cve/CVE-2007-5894/" source="CVE"/>
		<reference ref_id="CVE-2007-5902" ref_url="https://www.suse.com/security/cve/CVE-2007-5902/" source="CVE"/>
		<reference ref_id="CVE-2007-5971" ref_url="https://www.suse.com/security/cve/CVE-2007-5971/" source="CVE"/>
		<reference ref_id="CVE-2007-5972" ref_url="https://www.suse.com/security/cve/CVE-2007-5972/" source="CVE"/>
		<reference ref_id="CVE-2008-0062" ref_url="https://www.suse.com/security/cve/CVE-2008-0062/" source="CVE"/>
		<reference ref_id="CVE-2008-0063" ref_url="https://www.suse.com/security/cve/CVE-2008-0063/" source="CVE"/>
		<reference ref_id="CVE-2008-0947" ref_url="https://www.suse.com/security/cve/CVE-2008-0947/" source="CVE"/>
		<reference ref_id="CVE-2008-0948" ref_url="https://www.suse.com/security/cve/CVE-2008-0948/" source="CVE"/>
		<reference ref_id="CVE-2009-0844" ref_url="https://www.suse.com/security/cve/CVE-2009-0844/" source="CVE"/>
		<reference ref_id="CVE-2009-0845" ref_url="https://www.suse.com/security/cve/CVE-2009-0845/" source="CVE"/>
		<reference ref_id="CVE-2009-0846" ref_url="https://www.suse.com/security/cve/CVE-2009-0846/" source="CVE"/>
		<reference ref_id="CVE-2009-0847" ref_url="https://www.suse.com/security/cve/CVE-2009-0847/" source="CVE"/>
		<reference ref_id="CVE-2009-4212" ref_url="https://www.suse.com/security/cve/CVE-2009-4212/" source="CVE"/>
		<reference ref_id="CVE-2010-0629" ref_url="https://www.suse.com/security/cve/CVE-2010-0629/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-1.6.3-133.27.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6143/">CVE-2006-6143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6143">CVE-2006-6143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6144/">CVE-2006-6144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6144">CVE-2006-6144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0956/">CVE-2007-0956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0956">CVE-2007-0956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0957/">CVE-2007-0957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0957">CVE-2007-0957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1216/">CVE-2007-1216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1216">CVE-2007-1216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2442/">CVE-2007-2442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2442">CVE-2007-2442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2443/">CVE-2007-2443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2443">CVE-2007-2443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2798/">CVE-2007-2798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2798">CVE-2007-2798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3999">CVE-2007-3999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4000/">CVE-2007-4000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4000">CVE-2007-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4743/">CVE-2007-4743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4743">CVE-2007-4743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5894/">CVE-2007-5894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5894">CVE-2007-5894 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5902/">CVE-2007-5902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5902">CVE-2007-5902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5971/">CVE-2007-5971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5971">CVE-2007-5971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5972/">CVE-2007-5972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5972">CVE-2007-5972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0062/">CVE-2008-0062 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2008-0062">CVE-2008-0062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0063/">CVE-2008-0063 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2008-0063">CVE-2008-0063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0947/">CVE-2008-0947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0947">CVE-2008-0947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0948/">CVE-2008-0948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0948">CVE-2008-0948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0844/">CVE-2009-0844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0844">CVE-2009-0844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0845/">CVE-2009-0845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0845">CVE-2009-0845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0846/">CVE-2009-0846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0846">CVE-2009-0846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0847/">CVE-2009-0847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0847">CVE-2009-0847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4212/">CVE-2009-4212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4212">CVE-2009-4212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0629/">CVE-2010-0629 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-0629">CVE-2010-0629 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988619" comment="krb5-1.6.3-133.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988620" comment="krb5-32bit-1.6.3-133.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988621" comment="krb5-apps-clients-1.6.3-133.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988622" comment="krb5-apps-servers-1.6.3-133.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988623" comment="krb5-client-1.6.3-133.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988624" comment="krb5-server-1.6.3-133.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988625" comment="krb5-x86-1.6.3-133.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215689" version="1" class="patch">
	<metadata>
		<title>krb5-doc-1.6.3-133.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<reference ref_id="CVE-2007-4000" ref_url="https://www.suse.com/security/cve/CVE-2007-4000/" source="CVE"/>
		<reference ref_id="CVE-2007-4743" ref_url="https://www.suse.com/security/cve/CVE-2007-4743/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-doc-1.6.3-133.21 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3999">CVE-2007-3999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4000/">CVE-2007-4000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4000">CVE-2007-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4743/">CVE-2007-4743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4743">CVE-2007-4743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988626" comment="krb5-doc-1.6.3-133.21 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215690" version="1" class="patch">
	<metadata>
		<title>krb5-plugin-kdb-ldap-1.6.3-133.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-0956" ref_url="https://www.suse.com/security/cve/CVE-2007-0956/" source="CVE"/>
		<reference ref_id="CVE-2007-0957" ref_url="https://www.suse.com/security/cve/CVE-2007-0957/" source="CVE"/>
		<reference ref_id="CVE-2007-1216" ref_url="https://www.suse.com/security/cve/CVE-2007-1216/" source="CVE"/>
		<reference ref_id="CVE-2007-2442" ref_url="https://www.suse.com/security/cve/CVE-2007-2442/" source="CVE"/>
		<reference ref_id="CVE-2007-2443" ref_url="https://www.suse.com/security/cve/CVE-2007-2443/" source="CVE"/>
		<reference ref_id="CVE-2007-2798" ref_url="https://www.suse.com/security/cve/CVE-2007-2798/" source="CVE"/>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<reference ref_id="CVE-2007-4000" ref_url="https://www.suse.com/security/cve/CVE-2007-4000/" source="CVE"/>
		<reference ref_id="CVE-2007-4743" ref_url="https://www.suse.com/security/cve/CVE-2007-4743/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-plugin-kdb-ldap-1.6.3-133.12 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0956/">CVE-2007-0956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0956">CVE-2007-0956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0957/">CVE-2007-0957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0957">CVE-2007-0957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1216/">CVE-2007-1216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1216">CVE-2007-1216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2442/">CVE-2007-2442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2442">CVE-2007-2442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2443/">CVE-2007-2443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2443">CVE-2007-2443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2798/">CVE-2007-2798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2798">CVE-2007-2798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3999">CVE-2007-3999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4000/">CVE-2007-4000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4000">CVE-2007-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4743/">CVE-2007-4743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4743">CVE-2007-4743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988627" comment="krb5-plugin-kdb-ldap-1.6.3-133.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988628" comment="krb5-plugin-preauth-pkinit-1.6.3-133.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215691" version="1" class="patch">
	<metadata>
		<title>kvm-0.12.3-0.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-2382" ref_url="https://www.suse.com/security/cve/CVE-2008-2382/" source="CVE"/>
		<reference ref_id="CVE-2008-5714" ref_url="https://www.suse.com/security/cve/CVE-2008-5714/" source="CVE"/>
		<description>
These are all security issues fixed in the kvm-0.12.3-0.11.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2382/">CVE-2008-2382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2382">CVE-2008-2382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5714/">CVE-2008-5714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5714">CVE-2008-5714 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988629" comment="kvm-0.12.3-0.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215692" version="1" class="patch">
	<metadata>
		<title>lcms-1.17-77.14.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0581" ref_url="https://www.suse.com/security/cve/CVE-2009-0581/" source="CVE"/>
		<reference ref_id="CVE-2009-0723" ref_url="https://www.suse.com/security/cve/CVE-2009-0723/" source="CVE"/>
		<reference ref_id="CVE-2009-0733" ref_url="https://www.suse.com/security/cve/CVE-2009-0733/" source="CVE"/>
		<reference ref_id="CVE-2009-0793" ref_url="https://www.suse.com/security/cve/CVE-2009-0793/" source="CVE"/>
		<description>
These are all security issues fixed in the lcms-1.17-77.14.19 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0581/">CVE-2009-0581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0581">CVE-2009-0581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0723/">CVE-2009-0723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0723">CVE-2009-0723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0733/">CVE-2009-0733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0733">CVE-2009-0733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0793/">CVE-2009-0793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0793">CVE-2009-0793 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988630" comment="lcms-1.17-77.14.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988631" comment="liblcms1-1.17-77.14.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988632" comment="liblcms1-32bit-1.17-77.14.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988633" comment="liblcms1-x86-1.17-77.14.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215693" version="1" class="patch">
	<metadata>
		<title>libMagickCore1-32bit-6.4.3.6-7.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-5456" ref_url="https://www.suse.com/security/cve/CVE-2006-5456/" source="CVE"/>
		<reference ref_id="CVE-2007-1667" ref_url="https://www.suse.com/security/cve/CVE-2007-1667/" source="CVE"/>
		<reference ref_id="CVE-2007-1797" ref_url="https://www.suse.com/security/cve/CVE-2007-1797/" source="CVE"/>
		<reference ref_id="CVE-2007-4985" ref_url="https://www.suse.com/security/cve/CVE-2007-4985/" source="CVE"/>
		<reference ref_id="CVE-2007-4986" ref_url="https://www.suse.com/security/cve/CVE-2007-4986/" source="CVE"/>
		<reference ref_id="CVE-2007-4987" ref_url="https://www.suse.com/security/cve/CVE-2007-4987/" source="CVE"/>
		<reference ref_id="CVE-2007-4988" ref_url="https://www.suse.com/security/cve/CVE-2007-4988/" source="CVE"/>
		<description>
These are all security issues fixed in the libMagickCore1-32bit-6.4.3.6-7.20.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5456/">CVE-2006-5456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5456">CVE-2006-5456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1667/">CVE-2007-1667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1667">CVE-2007-1667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1797/">CVE-2007-1797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1797">CVE-2007-1797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4985/">CVE-2007-4985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4985">CVE-2007-4985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4986/">CVE-2007-4986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4986">CVE-2007-4986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4987/">CVE-2007-4987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4987">CVE-2007-4987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4988/">CVE-2007-4988 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2007-4988">CVE-2007-4988 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988634" comment="libMagickCore1-6.4.3.6-7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988635" comment="libMagickCore1-32bit-6.4.3.6-7.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215694" version="1" class="patch">
	<metadata>
		<title>libQtWebKit4-32bit-4.6.2-1.6.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-4811" ref_url="https://www.suse.com/security/cve/CVE-2006-4811/" source="CVE"/>
		<reference ref_id="CVE-2009-0945" ref_url="https://www.suse.com/security/cve/CVE-2009-0945/" source="CVE"/>
		<description>
These are all security issues fixed in the libQtWebKit4-32bit-4.6.2-1.6.9 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4811/">CVE-2006-4811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4811">CVE-2006-4811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0945/">CVE-2009-0945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0945">CVE-2009-0945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988636" comment="libQtWebKit4-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988637" comment="libQtWebKit4-32bit-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988638" comment="libQtWebKit4-x86-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988639" comment="libqt4-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988640" comment="libqt4-32bit-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988641" comment="libqt4-qt3support-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988642" comment="libqt4-qt3support-32bit-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988643" comment="libqt4-qt3support-x86-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988644" comment="libqt4-sql-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988645" comment="libqt4-sql-32bit-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988646" comment="libqt4-sql-mysql-4.6.2-1.6.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988647" comment="libqt4-sql-sqlite-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988648" comment="libqt4-sql-x86-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988649" comment="libqt4-x11-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988650" comment="libqt4-x11-32bit-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988651" comment="libqt4-x11-x86-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988652" comment="libqt4-x86-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988653" comment="qt4-x11-tools-4.6.2-1.6.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215695" version="1" class="patch">
	<metadata>
		<title>libadns1-1.4-73.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-1447" ref_url="https://www.suse.com/security/cve/CVE-2008-1447/" source="CVE"/>
		<reference ref_id="CVE-2008-4100" ref_url="https://www.suse.com/security/cve/CVE-2008-4100/" source="CVE"/>
		<description>
These are all security issues fixed in the libadns1-1.4-73.21 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1447/">CVE-2008-1447 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2008-1447">CVE-2008-1447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4100/">CVE-2008-4100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4100">CVE-2008-4100 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988654" comment="libadns1-1.4-73.21 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215696" version="1" class="patch">
	<metadata>
		<title>libapr-util1-1.3.4-12.20.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<description>
These are all security issues fixed in the libapr-util1-1.3.4-12.20.2 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2412">CVE-2009-2412 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988655" comment="libapr-util1-1.3.4-12.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988656" comment="libapr-util1-32bit-1.3.4-12.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988657" comment="libapr1-1.3.3-11.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988658" comment="libapr1-32bit-1.3.3-11.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215697" version="1" class="patch">
	<metadata>
		<title>libarchive2-2.5.5-5.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-5680" ref_url="https://www.suse.com/security/cve/CVE-2006-5680/" source="CVE"/>
		<reference ref_id="CVE-2007-3641" ref_url="https://www.suse.com/security/cve/CVE-2007-3641/" source="CVE"/>
		<reference ref_id="CVE-2007-3644" ref_url="https://www.suse.com/security/cve/CVE-2007-3644/" source="CVE"/>
		<reference ref_id="CVE-2007-3645" ref_url="https://www.suse.com/security/cve/CVE-2007-3645/" source="CVE"/>
		<description>
These are all security issues fixed in the libarchive2-2.5.5-5.19 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5680/">CVE-2006-5680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5680">CVE-2006-5680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3641/">CVE-2007-3641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3641">CVE-2007-3641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3644/">CVE-2007-3644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3644">CVE-2007-3644 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3645/">CVE-2007-3645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3645">CVE-2007-3645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988659" comment="libarchive2-2.5.5-5.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215698" version="1" class="patch">
	<metadata>
		<title>libdrm-2.4.17-0.3.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-3831" ref_url="https://www.suse.com/security/cve/CVE-2008-3831/" source="CVE"/>
		<description>
These are all security issues fixed in the libdrm-2.4.17-0.3.12 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3831/">CVE-2008-3831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3831">CVE-2008-3831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988660" comment="libdrm-2.4.17-0.3.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988661" comment="libdrm-32bit-2.4.17-0.3.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988662" comment="libdrm-x86-2.4.17-0.3.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215699" version="1" class="patch">
	<metadata>
		<title>libexif-0.6.17-2.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-6351" ref_url="https://www.suse.com/security/cve/CVE-2007-6351/" source="CVE"/>
		<reference ref_id="CVE-2007-6352" ref_url="https://www.suse.com/security/cve/CVE-2007-6352/" source="CVE"/>
		<description>
These are all security issues fixed in the libexif-0.6.17-2.12 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6351/">CVE-2007-6351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6351">CVE-2007-6351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6352/">CVE-2007-6352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6352">CVE-2007-6352 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988663" comment="libexif-0.6.17-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988664" comment="libexif-32bit-0.6.17-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988665" comment="libexif-x86-0.6.17-2.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215700" version="1" class="patch">
	<metadata>
		<title>libexiv2-4-0.17.1-31.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-6353" ref_url="https://www.suse.com/security/cve/CVE-2007-6353/" source="CVE"/>
		<description>
These are all security issues fixed in the libexiv2-4-0.17.1-31.20 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6353/">CVE-2007-6353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6353">CVE-2007-6353 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988666" comment="libexiv2-4-0.17.1-31.20 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215701" version="1" class="patch">
	<metadata>
		<title>libgtop-2.28.0-1.2.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-0235" ref_url="https://www.suse.com/security/cve/CVE-2007-0235/" source="CVE"/>
		<description>
These are all security issues fixed in the libgtop-2.28.0-1.2.20 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0235/">CVE-2007-0235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0235">CVE-2007-0235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988667" comment="libgtop-2.28.0-1.2.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988668" comment="libgtop-2_0-7-2.28.0-1.2.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988669" comment="libgtop-doc-2.28.0-1.2.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988670" comment="libgtop-lang-2.28.0-1.2.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215702" version="1" class="patch">
	<metadata>
		<title>libicu-32bit-4.0-7.24.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-4770" ref_url="https://www.suse.com/security/cve/CVE-2007-4770/" source="CVE"/>
		<reference ref_id="CVE-2007-4771" ref_url="https://www.suse.com/security/cve/CVE-2007-4771/" source="CVE"/>
		<reference ref_id="CVE-2008-1036" ref_url="https://www.suse.com/security/cve/CVE-2008-1036/" source="CVE"/>
		<reference ref_id="CVE-2009-0153" ref_url="https://www.suse.com/security/cve/CVE-2009-0153/" source="CVE"/>
		<description>
These are all security issues fixed in the libicu-32bit-4.0-7.24.11 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4770/">CVE-2007-4770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4770">CVE-2007-4770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4771/">CVE-2007-4771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4771">CVE-2007-4771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1036/">CVE-2008-1036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1036">CVE-2008-1036 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0153/">CVE-2009-0153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0153">CVE-2009-0153 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988671" comment="libicu-4.0-7.24.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988672" comment="libicu-32bit-4.0-7.24.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988673" comment="libicu-doc-4.0-7.24.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988674" comment="libicu-x86-4.0-7.24.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215703" version="1" class="patch">
	<metadata>
		<title>libltdl7-2.2.6-2.131.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-3736" ref_url="https://www.suse.com/security/cve/CVE-2009-3736/" source="CVE"/>
		<description>
These are all security issues fixed in the libltdl7-2.2.6-2.131.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3736/">CVE-2009-3736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3736">CVE-2009-3736 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988675" comment="libltdl7-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988676" comment="libltdl7-32bit-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988677" comment="libltdl7-x86-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988678" comment="libtool-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988679" comment="libtool-32bit-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988680" comment="libtool-x86-2.2.6-2.131.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215704" version="1" class="patch">
	<metadata>
		<title>libmusicbrainz4-2.1.5-5.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-4197" ref_url="https://www.suse.com/security/cve/CVE-2006-4197/" source="CVE"/>
		<description>
These are all security issues fixed in the libmusicbrainz4-2.1.5-5.18 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4197/">CVE-2006-4197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4197">CVE-2006-4197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988681" comment="libmusicbrainz4-2.1.5-5.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215705" version="1" class="patch">
	<metadata>
		<title>libmysqlclient15-32bit-5.0.67-13.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-0903" ref_url="https://www.suse.com/security/cve/CVE-2006-0903/" source="CVE"/>
		<reference ref_id="CVE-2006-4226" ref_url="https://www.suse.com/security/cve/CVE-2006-4226/" source="CVE"/>
		<reference ref_id="CVE-2006-4227" ref_url="https://www.suse.com/security/cve/CVE-2006-4227/" source="CVE"/>
		<reference ref_id="CVE-2007-5969" ref_url="https://www.suse.com/security/cve/CVE-2007-5969/" source="CVE"/>
		<reference ref_id="CVE-2007-6303" ref_url="https://www.suse.com/security/cve/CVE-2007-6303/" source="CVE"/>
		<reference ref_id="CVE-2007-6304" ref_url="https://www.suse.com/security/cve/CVE-2007-6304/" source="CVE"/>
		<reference ref_id="CVE-2008-2079" ref_url="https://www.suse.com/security/cve/CVE-2008-2079/" source="CVE"/>
		<reference ref_id="CVE-2008-4456" ref_url="https://www.suse.com/security/cve/CVE-2008-4456/" source="CVE"/>
		<reference ref_id="CVE-2008-7247" ref_url="https://www.suse.com/security/cve/CVE-2008-7247/" source="CVE"/>
		<reference ref_id="CVE-2009-2446" ref_url="https://www.suse.com/security/cve/CVE-2009-2446/" source="CVE"/>
		<reference ref_id="CVE-2009-4019" ref_url="https://www.suse.com/security/cve/CVE-2009-4019/" source="CVE"/>
		<reference ref_id="CVE-2009-4028" ref_url="https://www.suse.com/security/cve/CVE-2009-4028/" source="CVE"/>
		<reference ref_id="CVE-2009-4030" ref_url="https://www.suse.com/security/cve/CVE-2009-4030/" source="CVE"/>
		<reference ref_id="CVE-2009-4484" ref_url="https://www.suse.com/security/cve/CVE-2009-4484/" source="CVE"/>
		<description>
These are all security issues fixed in the libmysqlclient15-32bit-5.0.67-13.20.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0903/">CVE-2006-0903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0903">CVE-2006-0903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4226/">CVE-2006-4226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4226">CVE-2006-4226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4227/">CVE-2006-4227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4227">CVE-2006-4227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5969/">CVE-2007-5969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5969">CVE-2007-5969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6303/">CVE-2007-6303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6303">CVE-2007-6303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6304/">CVE-2007-6304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6304">CVE-2007-6304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2079/">CVE-2008-2079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2079">CVE-2008-2079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4456/">CVE-2008-4456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4456">CVE-2008-4456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-7247/">CVE-2008-7247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-7247">CVE-2008-7247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2446/">CVE-2009-2446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2446">CVE-2009-2446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4019/">CVE-2009-4019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4019">CVE-2009-4019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4028/">CVE-2009-4028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4028">CVE-2009-4028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4030/">CVE-2009-4030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4030">CVE-2009-4030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4484/">CVE-2009-4484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4484">CVE-2009-4484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988682" comment="libmysqlclient15-5.0.67-13.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988683" comment="libmysqlclient15-32bit-5.0.67-13.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988684" comment="libmysqlclient15-x86-5.0.67-13.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988685" comment="libmysqlclient_r15-5.0.67-13.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988686" comment="mysql-5.0.67-13.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988687" comment="mysql-Max-5.0.67-13.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988688" comment="mysql-client-5.0.67-13.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215706" version="1" class="patch">
	<metadata>
		<title>libneon27-0.28.3-2.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-0157" ref_url="https://www.suse.com/security/cve/CVE-2007-0157/" source="CVE"/>
		<reference ref_id="CVE-2008-3746" ref_url="https://www.suse.com/security/cve/CVE-2008-3746/" source="CVE"/>
		<reference ref_id="CVE-2009-2473" ref_url="https://www.suse.com/security/cve/CVE-2009-2473/" source="CVE"/>
		<reference ref_id="CVE-2009-2474" ref_url="https://www.suse.com/security/cve/CVE-2009-2474/" source="CVE"/>
		<description>
These are all security issues fixed in the libneon27-0.28.3-2.12.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0157/">CVE-2007-0157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0157">CVE-2007-0157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3746/">CVE-2008-3746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3746">CVE-2008-3746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2473/">CVE-2009-2473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2473">CVE-2009-2473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2474/">CVE-2009-2474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2474">CVE-2009-2474 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988689" comment="libneon27-0.28.3-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988690" comment="libneon27-32bit-0.28.3-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988691" comment="libneon27-x86-0.28.3-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988692" comment="neon-0.28.3-2.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215707" version="1" class="patch">
	<metadata>
		<title>libnetpbm10-10.26.44-101.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-4274" ref_url="https://www.suse.com/security/cve/CVE-2009-4274/" source="CVE"/>
		<description>
These are all security issues fixed in the libnetpbm10-10.26.44-101.9.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4274/">CVE-2009-4274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4274">CVE-2009-4274 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988693" comment="libnetpbm10-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988694" comment="libnetpbm10-32bit-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988695" comment="libnetpbm10-x86-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988696" comment="netpbm-10.26.44-101.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215708" version="1" class="patch">
	<metadata>
		<title>libopensc2-0.11.6-5.25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-2235" ref_url="https://www.suse.com/security/cve/CVE-2008-2235/" source="CVE"/>
		<reference ref_id="CVE-2009-0368" ref_url="https://www.suse.com/security/cve/CVE-2009-0368/" source="CVE"/>
		<description>
These are all security issues fixed in the libopensc2-0.11.6-5.25.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2235/">CVE-2008-2235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2235">CVE-2008-2235 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0368/">CVE-2009-0368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0368">CVE-2009-0368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988697" comment="libopensc2-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988698" comment="libopensc2-32bit-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988699" comment="libopensc2-x86-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988700" comment="opensc-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988701" comment="opensc-32bit-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988702" comment="opensc-x86-0.11.6-5.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215709" version="1" class="patch">
	<metadata>
		<title>libopenssl0_9_8-0.9.8h-30.27.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-2937" ref_url="https://www.suse.com/security/cve/CVE-2006-2937/" source="CVE"/>
		<reference ref_id="CVE-2006-2940" ref_url="https://www.suse.com/security/cve/CVE-2006-2940/" source="CVE"/>
		<reference ref_id="CVE-2006-3738" ref_url="https://www.suse.com/security/cve/CVE-2006-3738/" source="CVE"/>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2006-4343" ref_url="https://www.suse.com/security/cve/CVE-2006-4343/" source="CVE"/>
		<reference ref_id="CVE-2007-3108" ref_url="https://www.suse.com/security/cve/CVE-2007-3108/" source="CVE"/>
		<reference ref_id="CVE-2007-4995" ref_url="https://www.suse.com/security/cve/CVE-2007-4995/" source="CVE"/>
		<reference ref_id="CVE-2007-5135" ref_url="https://www.suse.com/security/cve/CVE-2007-5135/" source="CVE"/>
		<reference ref_id="CVE-2008-0891" ref_url="https://www.suse.com/security/cve/CVE-2008-0891/" source="CVE"/>
		<reference ref_id="CVE-2008-1672" ref_url="https://www.suse.com/security/cve/CVE-2008-1672/" source="CVE"/>
		<reference ref_id="CVE-2008-5077" ref_url="https://www.suse.com/security/cve/CVE-2008-5077/" source="CVE"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<reference ref_id="CVE-2009-3245" ref_url="https://www.suse.com/security/cve/CVE-2009-3245/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-4355" ref_url="https://www.suse.com/security/cve/CVE-2009-4355/" source="CVE"/>
		<reference ref_id="CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl0_9_8-0.9.8h-30.27.11 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2937/">CVE-2006-2937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2937">CVE-2006-2937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2940/">CVE-2006-2940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2940">CVE-2006-2940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3738/">CVE-2006-3738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3738">CVE-2006-3738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4339">CVE-2006-4339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4343/">CVE-2006-4343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4343">CVE-2006-4343 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3108/">CVE-2007-3108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3108">CVE-2007-3108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4995/">CVE-2007-4995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4995">CVE-2007-4995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5135/">CVE-2007-5135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5135">CVE-2007-5135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0891/">CVE-2008-0891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0891">CVE-2008-0891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1672/">CVE-2008-1672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1672">CVE-2008-1672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5077/">CVE-2008-5077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5077">CVE-2008-5077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0590">CVE-2009-0590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0591">CVE-2009-0591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0789">CVE-2009-0789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1377">CVE-2009-1377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1378">CVE-2009-1378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1379">CVE-2009-1379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1386">CVE-2009-1386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1387">CVE-2009-1387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3245/">CVE-2009-3245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3245">CVE-2009-3245 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4355/">CVE-2009-4355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4355">CVE-2009-4355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0740">CVE-2010-0740 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988703" comment="libopenssl0_9_8-0.9.8h-30.27.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988704" comment="libopenssl0_9_8-32bit-0.9.8h-30.27.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988705" comment="libopenssl0_9_8-x86-0.9.8h-30.27.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988706" comment="openssl-0.9.8h-30.27.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988707" comment="openssl-doc-0.9.8h-30.27.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215710" version="1" class="patch">
	<metadata>
		<title>libpng12-0-1.2.31-5.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-5793" ref_url="https://www.suse.com/security/cve/CVE-2006-5793/" source="CVE"/>
		<reference ref_id="CVE-2008-3964" ref_url="https://www.suse.com/security/cve/CVE-2008-3964/" source="CVE"/>
		<reference ref_id="CVE-2008-5907" ref_url="https://www.suse.com/security/cve/CVE-2008-5907/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-2042" ref_url="https://www.suse.com/security/cve/CVE-2009-2042/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng12-0-1.2.31-5.12.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5793/">CVE-2006-5793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5793">CVE-2006-5793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3964/">CVE-2008-3964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3964">CVE-2008-3964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5907/">CVE-2008-5907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5907">CVE-2008-5907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0040">CVE-2009-0040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2042/">CVE-2009-2042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2042">CVE-2009-2042 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988708" comment="libpng12-0-1.2.31-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988709" comment="libpng12-0-32bit-1.2.31-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988710" comment="libpng12-0-x86-1.2.31-5.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215711" version="1" class="patch">
	<metadata>
		<title>libpoppler-glib4-0.12.3-1.2.44 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-0104" ref_url="https://www.suse.com/security/cve/CVE-2007-0104/" source="CVE"/>
		<reference ref_id="CVE-2007-4352" ref_url="https://www.suse.com/security/cve/CVE-2007-4352/" source="CVE"/>
		<reference ref_id="CVE-2007-5392" ref_url="https://www.suse.com/security/cve/CVE-2007-5392/" source="CVE"/>
		<reference ref_id="CVE-2007-5393" ref_url="https://www.suse.com/security/cve/CVE-2007-5393/" source="CVE"/>
		<reference ref_id="CVE-2008-2950" ref_url="https://www.suse.com/security/cve/CVE-2008-2950/" source="CVE"/>
		<reference ref_id="CVE-2009-0755" ref_url="https://www.suse.com/security/cve/CVE-2009-0755/" source="CVE"/>
		<reference ref_id="CVE-2009-0756" ref_url="https://www.suse.com/security/cve/CVE-2009-0756/" source="CVE"/>
		<reference ref_id="CVE-2009-0791" ref_url="https://www.suse.com/security/cve/CVE-2009-0791/" source="CVE"/>
		<reference ref_id="CVE-2009-0799" ref_url="https://www.suse.com/security/cve/CVE-2009-0799/" source="CVE"/>
		<reference ref_id="CVE-2009-0800" ref_url="https://www.suse.com/security/cve/CVE-2009-0800/" source="CVE"/>
		<reference ref_id="CVE-2009-1179" ref_url="https://www.suse.com/security/cve/CVE-2009-1179/" source="CVE"/>
		<reference ref_id="CVE-2009-1180" ref_url="https://www.suse.com/security/cve/CVE-2009-1180/" source="CVE"/>
		<reference ref_id="CVE-2009-1181" ref_url="https://www.suse.com/security/cve/CVE-2009-1181/" source="CVE"/>
		<reference ref_id="CVE-2009-1182" ref_url="https://www.suse.com/security/cve/CVE-2009-1182/" source="CVE"/>
		<reference ref_id="CVE-2009-1183" ref_url="https://www.suse.com/security/cve/CVE-2009-1183/" source="CVE"/>
		<reference ref_id="CVE-2009-1187" ref_url="https://www.suse.com/security/cve/CVE-2009-1187/" source="CVE"/>
		<reference ref_id="CVE-2009-1188" ref_url="https://www.suse.com/security/cve/CVE-2009-1188/" source="CVE"/>
		<reference ref_id="CVE-2009-3607" ref_url="https://www.suse.com/security/cve/CVE-2009-3607/" source="CVE"/>
		<reference ref_id="CVE-2009-3608" ref_url="https://www.suse.com/security/cve/CVE-2009-3608/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler-glib4-0.12.3-1.2.44 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0104/">CVE-2007-0104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0104">CVE-2007-0104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4352/">CVE-2007-4352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4352">CVE-2007-4352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5392/">CVE-2007-5392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5392">CVE-2007-5392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5393/">CVE-2007-5393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5393">CVE-2007-5393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2950/">CVE-2008-2950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2950">CVE-2008-2950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0755/">CVE-2009-0755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0755">CVE-2009-0755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0756/">CVE-2009-0756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0756">CVE-2009-0756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0791/">CVE-2009-0791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0791">CVE-2009-0791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0799/">CVE-2009-0799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0799">CVE-2009-0799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0800/">CVE-2009-0800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0800">CVE-2009-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1179/">CVE-2009-1179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1179">CVE-2009-1179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1180/">CVE-2009-1180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1180">CVE-2009-1180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1181/">CVE-2009-1181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1181">CVE-2009-1181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1182/">CVE-2009-1182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1182">CVE-2009-1182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1183/">CVE-2009-1183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1183">CVE-2009-1183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1187/">CVE-2009-1187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1187">CVE-2009-1187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1188/">CVE-2009-1188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1188">CVE-2009-1188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3607/">CVE-2009-3607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3607">CVE-2009-3607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3608/">CVE-2009-3608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3608">CVE-2009-3608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988711" comment="libpoppler-glib4-0.12.3-1.2.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988712" comment="libpoppler-qt4-3-0.12.3-1.2.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988713" comment="libpoppler5-0.12.3-1.2.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988714" comment="poppler-tools-0.12.3-1.2.44 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215712" version="1" class="patch">
	<metadata>
		<title>libpulse-browse0-0.9.21-1.5.26 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-0008" ref_url="https://www.suse.com/security/cve/CVE-2008-0008/" source="CVE"/>
		<description>
These are all security issues fixed in the libpulse-browse0-0.9.21-1.5.26 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0008/">CVE-2008-0008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0008">CVE-2008-0008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988715" comment="libpulse-browse0-0.9.21-1.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988716" comment="libpulse-mainloop-glib0-0.9.21-1.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988717" comment="libpulse0-0.9.21-1.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988718" comment="libpulse0-32bit-0.9.21-1.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988719" comment="libpulse0-x86-0.9.21-1.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988720" comment="pulseaudio-0.9.21-1.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988721" comment="pulseaudio-esound-compat-0.9.21-1.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988722" comment="pulseaudio-gdm-hooks-0.9.21-1.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988723" comment="pulseaudio-lang-0.9.21-1.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988724" comment="pulseaudio-module-x11-0.9.21-1.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988725" comment="pulseaudio-module-zeroconf-0.9.21-1.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988726" comment="pulseaudio-utils-0.9.21-1.5.26 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215713" version="1" class="patch">
	<metadata>
		<title>libpython2_6-1_0-2.6.0-8.9.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython2_6-1_0-2.6.0-8.9.20 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3560">CVE-2009-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3720">CVE-2009-3720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988727" comment="libpython2_6-1_0-2.6.0-8.9.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988728" comment="libpython2_6-1_0-32bit-2.6.0-8.9.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988729" comment="libpython2_6-1_0-x86-2.6.0-8.9.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988730" comment="python-base-2.6.0-8.9.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988731" comment="python-base-32bit-2.6.0-8.9.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988732" comment="python-base-x86-2.6.0-8.9.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988733" comment="python-xml-2.6.0-8.9.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988734" comment="pyxml-0.8.4-194.23.38 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215714" version="1" class="patch">
	<metadata>
		<title>librpcsecgss-0.18-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<description>
These are all security issues fixed in the librpcsecgss-0.18-1.15 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3999">CVE-2007-3999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988735" comment="librpcsecgss-0.18-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988736" comment="libtirpc1-0.2.1-1.2.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215715" version="1" class="patch">
	<metadata>
		<title>libsamplerate-0.1.4-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-5008" ref_url="https://www.suse.com/security/cve/CVE-2008-5008/" source="CVE"/>
		<description>
These are all security issues fixed in the libsamplerate-0.1.4-1.15 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5008/">CVE-2008-5008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5008">CVE-2008-5008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988737" comment="libsamplerate-0.1.4-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988738" comment="libsamplerate-32bit-0.1.4-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988739" comment="libsamplerate-x86-0.1.4-1.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215716" version="1" class="patch">
	<metadata>
		<title>libsndfile-1.0.20-2.1.46 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-4974" ref_url="https://www.suse.com/security/cve/CVE-2007-4974/" source="CVE"/>
		<reference ref_id="CVE-2009-0186" ref_url="https://www.suse.com/security/cve/CVE-2009-0186/" source="CVE"/>
		<reference ref_id="CVE-2009-1788" ref_url="https://www.suse.com/security/cve/CVE-2009-1788/" source="CVE"/>
		<reference ref_id="CVE-2009-1791" ref_url="https://www.suse.com/security/cve/CVE-2009-1791/" source="CVE"/>
		<description>
These are all security issues fixed in the libsndfile-1.0.20-2.1.46 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4974/">CVE-2007-4974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4974">CVE-2007-4974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0186/">CVE-2009-0186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0186">CVE-2009-0186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1788/">CVE-2009-1788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1788">CVE-2009-1788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1791/">CVE-2009-1791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1791">CVE-2009-1791 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988740" comment="libsndfile-1.0.20-2.1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988741" comment="libsndfile-32bit-1.0.20-2.1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988742" comment="libsndfile-x86-1.0.20-2.1.46 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215717" version="1" class="patch">
	<metadata>
		<title>libsnmp15-32bit-5.4.2.1-8.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-4309" ref_url="https://www.suse.com/security/cve/CVE-2008-4309/" source="CVE"/>
		<reference ref_id="CVE-2008-6123" ref_url="https://www.suse.com/security/cve/CVE-2008-6123/" source="CVE"/>
		<description>
These are all security issues fixed in the libsnmp15-32bit-5.4.2.1-8.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4309/">CVE-2008-4309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4309">CVE-2008-4309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-6123/">CVE-2008-6123 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-6123">CVE-2008-6123 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988743" comment="libsnmp15-5.4.2.1-8.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988744" comment="libsnmp15-32bit-5.4.2.1-8.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988745" comment="libsnmp15-x86-5.4.2.1-8.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988746" comment="net-snmp-5.4.2.1-8.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988747" comment="perl-SNMP-5.4.2.1-8.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988748" comment="snmp-mibs-5.4.2.1-8.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215718" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.28.2-0.1.151 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-5876" ref_url="https://www.suse.com/security/cve/CVE-2006-5876/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.28.2-0.1.151 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5876/">CVE-2006-5876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5876">CVE-2006-5876 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988749" comment="libsoup-2_4-1-2.28.2-0.1.151 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988750" comment="libsoup-2_4-1-32bit-2.28.2-0.1.151 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988751" comment="libsoup-2_4-1-x86-2.28.2-0.1.151 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215719" version="1" class="patch">
	<metadata>
		<title>libtiff3-3.8.2-141.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-1586" ref_url="https://www.suse.com/security/cve/CVE-2008-1586/" source="CVE"/>
		<reference ref_id="CVE-2008-2327" ref_url="https://www.suse.com/security/cve/CVE-2008-2327/" source="CVE"/>
		<reference ref_id="CVE-2009-2285" ref_url="https://www.suse.com/security/cve/CVE-2009-2285/" source="CVE"/>
		<reference ref_id="CVE-2009-2347" ref_url="https://www.suse.com/security/cve/CVE-2009-2347/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff3-3.8.2-141.8.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1586/">CVE-2008-1586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1586">CVE-2008-1586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2327/">CVE-2008-2327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2327">CVE-2008-2327 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2285/">CVE-2009-2285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2285">CVE-2009-2285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2347/">CVE-2009-2347 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2347">CVE-2009-2347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988752" comment="libtiff3-3.8.2-141.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988753" comment="libtiff3-32bit-3.8.2-141.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988754" comment="libtiff3-x86-3.8.2-141.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988755" comment="tiff-3.8.2-141.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215720" version="1" class="patch">
	<metadata>
		<title>libvirt-0.7.6-1.9.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-5086" ref_url="https://www.suse.com/security/cve/CVE-2008-5086/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-0.7.6-1.9.8 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5086/">CVE-2008-5086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5086">CVE-2008-5086 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988756" comment="libvirt-0.7.6-1.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988757" comment="libvirt-doc-0.7.6-1.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988758" comment="libvirt-python-0.7.6-1.9.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215721" version="1" class="patch">
	<metadata>
		<title>libvorbis-1.2.0-79.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-3106" ref_url="https://www.suse.com/security/cve/CVE-2007-3106/" source="CVE"/>
		<reference ref_id="CVE-2008-1419" ref_url="https://www.suse.com/security/cve/CVE-2008-1419/" source="CVE"/>
		<reference ref_id="CVE-2008-1420" ref_url="https://www.suse.com/security/cve/CVE-2008-1420/" source="CVE"/>
		<reference ref_id="CVE-2008-1423" ref_url="https://www.suse.com/security/cve/CVE-2008-1423/" source="CVE"/>
		<description>
These are all security issues fixed in the libvorbis-1.2.0-79.12 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3106/">CVE-2007-3106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3106">CVE-2007-3106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1419/">CVE-2008-1419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1419">CVE-2008-1419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1420/">CVE-2008-1420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1420">CVE-2008-1420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1423/">CVE-2008-1423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1423">CVE-2008-1423 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988759" comment="libvorbis-1.2.0-79.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988760" comment="libvorbis-32bit-1.2.0-79.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988761" comment="libvorbis-doc-1.2.0-79.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988762" comment="libvorbis-x86-1.2.0-79.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215722" version="1" class="patch">
	<metadata>
		<title>libxml2-2.7.6-0.1.37 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-6284" ref_url="https://www.suse.com/security/cve/CVE-2007-6284/" source="CVE"/>
		<reference ref_id="CVE-2008-4225" ref_url="https://www.suse.com/security/cve/CVE-2008-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-4226" ref_url="https://www.suse.com/security/cve/CVE-2008-4226/" source="CVE"/>
		<reference ref_id="CVE-2008-4409" ref_url="https://www.suse.com/security/cve/CVE-2008-4409/" source="CVE"/>
		<reference ref_id="CVE-2009-2414" ref_url="https://www.suse.com/security/cve/CVE-2009-2414/" source="CVE"/>
		<reference ref_id="CVE-2009-2416" ref_url="https://www.suse.com/security/cve/CVE-2009-2416/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2.7.6-0.1.37 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6284/">CVE-2007-6284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6284">CVE-2007-6284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4225/">CVE-2008-4225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4225">CVE-2008-4225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4226/">CVE-2008-4226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4226">CVE-2008-4226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4409/">CVE-2008-4409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4409">CVE-2008-4409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2414/">CVE-2009-2414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2414">CVE-2009-2414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2416/">CVE-2009-2416 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-2416">CVE-2009-2416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988763" comment="libxml2-2.7.6-0.1.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988764" comment="libxml2-32bit-2.7.6-0.1.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988765" comment="libxml2-doc-2.7.6-0.1.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988766" comment="libxml2-x86-2.7.6-0.1.37 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215723" version="1" class="patch">
	<metadata>
		<title>libxslt-1.1.24-19.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-1767" ref_url="https://www.suse.com/security/cve/CVE-2008-1767/" source="CVE"/>
		<description>
These are all security issues fixed in the libxslt-1.1.24-19.15 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1767/">CVE-2008-1767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1767">CVE-2008-1767 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988767" comment="libxslt-1.1.24-19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988768" comment="libxslt-32bit-1.1.24-19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988769" comment="libxslt-x86-1.1.24-19.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215724" version="1" class="patch">
	<metadata>
		<title>log4net-1.2.10-1.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-0743" ref_url="https://www.suse.com/security/cve/CVE-2006-0743/" source="CVE"/>
		<description>
These are all security issues fixed in the log4net-1.2.10-1.36 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0743/">CVE-2006-0743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0743">CVE-2006-0743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988770" comment="log4net-1.2.10-1.36 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215725" version="1" class="patch">
	<metadata>
		<title>mailman-2.1.12-0.1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-2191" ref_url="https://www.suse.com/security/cve/CVE-2006-2191/" source="CVE"/>
		<reference ref_id="CVE-2006-2941" ref_url="https://www.suse.com/security/cve/CVE-2006-2941/" source="CVE"/>
		<reference ref_id="CVE-2006-3636" ref_url="https://www.suse.com/security/cve/CVE-2006-3636/" source="CVE"/>
		<description>
These are all security issues fixed in the mailman-2.1.12-0.1.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2191/">CVE-2006-2191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2191">CVE-2006-2191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2941/">CVE-2006-2941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2941">CVE-2006-2941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3636/">CVE-2006-3636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3636">CVE-2006-3636 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988771" comment="mailman-2.1.12-0.1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215726" version="1" class="patch">
	<metadata>
		<title>man-2.5.2-17.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-4250" ref_url="https://www.suse.com/security/cve/CVE-2006-4250/" source="CVE"/>
		<description>
These are all security issues fixed in the man-2.5.2-17.16 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4250/">CVE-2006-4250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4250">CVE-2006-4250 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988772" comment="man-2.5.2-17.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215727" version="1" class="patch">
	<metadata>
		<title>mono-core-2.0.1-1.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0217" ref_url="https://www.suse.com/security/cve/CVE-2009-0217/" source="CVE"/>
		<description>
These are all security issues fixed in the mono-core-2.0.1-1.19.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0217/">CVE-2009-0217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0217">CVE-2009-0217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988773" comment="mono-core-2.0.1-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988774" comment="mono-data-2.0.1-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988775" comment="mono-data-postgresql-2.0.1-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988776" comment="mono-data-sqlite-2.0.1-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988777" comment="mono-locale-extras-2.0.1-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988778" comment="mono-nunit-2.0.1-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988779" comment="mono-web-2.0.1-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988780" comment="mono-winforms-2.0.1-1.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215728" version="1" class="patch">
	<metadata>
		<title>mozilla-xulrunner190-1.9.0.19-0.1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-3836" ref_url="https://www.suse.com/security/cve/CVE-2008-3836/" source="CVE"/>
		<reference ref_id="CVE-2008-4063" ref_url="https://www.suse.com/security/cve/CVE-2008-4063/" source="CVE"/>
		<reference ref_id="CVE-2008-4064" ref_url="https://www.suse.com/security/cve/CVE-2008-4064/" source="CVE"/>
		<reference ref_id="CVE-2008-4070" ref_url="https://www.suse.com/security/cve/CVE-2008-4070/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-0071" ref_url="https://www.suse.com/security/cve/CVE-2009-0071/" source="CVE"/>
		<reference ref_id="CVE-2009-0352" ref_url="https://www.suse.com/security/cve/CVE-2009-0352/" source="CVE"/>
		<reference ref_id="CVE-2009-0353" ref_url="https://www.suse.com/security/cve/CVE-2009-0353/" source="CVE"/>
		<reference ref_id="CVE-2009-0354" ref_url="https://www.suse.com/security/cve/CVE-2009-0354/" source="CVE"/>
		<reference ref_id="CVE-2009-0355" ref_url="https://www.suse.com/security/cve/CVE-2009-0355/" source="CVE"/>
		<reference ref_id="CVE-2009-0356" ref_url="https://www.suse.com/security/cve/CVE-2009-0356/" source="CVE"/>
		<reference ref_id="CVE-2009-0357" ref_url="https://www.suse.com/security/cve/CVE-2009-0357/" source="CVE"/>
		<reference ref_id="CVE-2009-0358" ref_url="https://www.suse.com/security/cve/CVE-2009-0358/" source="CVE"/>
		<reference ref_id="CVE-2009-0652" ref_url="https://www.suse.com/security/cve/CVE-2009-0652/" source="CVE"/>
		<reference ref_id="CVE-2009-0771" ref_url="https://www.suse.com/security/cve/CVE-2009-0771/" source="CVE"/>
		<reference ref_id="CVE-2009-0772" ref_url="https://www.suse.com/security/cve/CVE-2009-0772/" source="CVE"/>
		<reference ref_id="CVE-2009-0773" ref_url="https://www.suse.com/security/cve/CVE-2009-0773/" source="CVE"/>
		<reference ref_id="CVE-2009-0774" ref_url="https://www.suse.com/security/cve/CVE-2009-0774/" source="CVE"/>
		<reference ref_id="CVE-2009-0775" ref_url="https://www.suse.com/security/cve/CVE-2009-0775/" source="CVE"/>
		<reference ref_id="CVE-2009-0776" ref_url="https://www.suse.com/security/cve/CVE-2009-0776/" source="CVE"/>
		<reference ref_id="CVE-2009-0777" ref_url="https://www.suse.com/security/cve/CVE-2009-0777/" source="CVE"/>
		<reference ref_id="CVE-2009-0793" ref_url="https://www.suse.com/security/cve/CVE-2009-0793/" source="CVE"/>
		<reference ref_id="CVE-2009-1044" ref_url="https://www.suse.com/security/cve/CVE-2009-1044/" source="CVE"/>
		<reference ref_id="CVE-2009-1169" ref_url="https://www.suse.com/security/cve/CVE-2009-1169/" source="CVE"/>
		<reference ref_id="CVE-2009-1194" ref_url="https://www.suse.com/security/cve/CVE-2009-1194/" source="CVE"/>
		<reference ref_id="CVE-2009-1302" ref_url="https://www.suse.com/security/cve/CVE-2009-1302/" source="CVE"/>
		<reference ref_id="CVE-2009-1303" ref_url="https://www.suse.com/security/cve/CVE-2009-1303/" source="CVE"/>
		<reference ref_id="CVE-2009-1304" ref_url="https://www.suse.com/security/cve/CVE-2009-1304/" source="CVE"/>
		<reference ref_id="CVE-2009-1305" ref_url="https://www.suse.com/security/cve/CVE-2009-1305/" source="CVE"/>
		<reference ref_id="CVE-2009-1306" ref_url="https://www.suse.com/security/cve/CVE-2009-1306/" source="CVE"/>
		<reference ref_id="CVE-2009-1307" ref_url="https://www.suse.com/security/cve/CVE-2009-1307/" source="CVE"/>
		<reference ref_id="CVE-2009-1308" ref_url="https://www.suse.com/security/cve/CVE-2009-1308/" source="CVE"/>
		<reference ref_id="CVE-2009-1309" ref_url="https://www.suse.com/security/cve/CVE-2009-1309/" source="CVE"/>
		<reference ref_id="CVE-2009-1310" ref_url="https://www.suse.com/security/cve/CVE-2009-1310/" source="CVE"/>
		<reference ref_id="CVE-2009-1311" ref_url="https://www.suse.com/security/cve/CVE-2009-1311/" source="CVE"/>
		<reference ref_id="CVE-2009-1312" ref_url="https://www.suse.com/security/cve/CVE-2009-1312/" source="CVE"/>
		<reference ref_id="CVE-2009-1313" ref_url="https://www.suse.com/security/cve/CVE-2009-1313/" source="CVE"/>
		<reference ref_id="CVE-2009-1392" ref_url="https://www.suse.com/security/cve/CVE-2009-1392/" source="CVE"/>
		<reference ref_id="CVE-2009-1563" ref_url="https://www.suse.com/security/cve/CVE-2009-1563/" source="CVE"/>
		<reference ref_id="CVE-2009-1571" ref_url="https://www.suse.com/security/cve/CVE-2009-1571/" source="CVE"/>
		<reference ref_id="CVE-2009-1832" ref_url="https://www.suse.com/security/cve/CVE-2009-1832/" source="CVE"/>
		<reference ref_id="CVE-2009-1833" ref_url="https://www.suse.com/security/cve/CVE-2009-1833/" source="CVE"/>
		<reference ref_id="CVE-2009-1834" ref_url="https://www.suse.com/security/cve/CVE-2009-1834/" source="CVE"/>
		<reference ref_id="CVE-2009-1835" ref_url="https://www.suse.com/security/cve/CVE-2009-1835/" source="CVE"/>
		<reference ref_id="CVE-2009-1836" ref_url="https://www.suse.com/security/cve/CVE-2009-1836/" source="CVE"/>
		<reference ref_id="CVE-2009-1837" ref_url="https://www.suse.com/security/cve/CVE-2009-1837/" source="CVE"/>
		<reference ref_id="CVE-2009-1838" ref_url="https://www.suse.com/security/cve/CVE-2009-1838/" source="CVE"/>
		<reference ref_id="CVE-2009-1839" ref_url="https://www.suse.com/security/cve/CVE-2009-1839/" source="CVE"/>
		<reference ref_id="CVE-2009-1840" ref_url="https://www.suse.com/security/cve/CVE-2009-1840/" source="CVE"/>
		<reference ref_id="CVE-2009-1841" ref_url="https://www.suse.com/security/cve/CVE-2009-1841/" source="CVE"/>
		<reference ref_id="CVE-2009-2462" ref_url="https://www.suse.com/security/cve/CVE-2009-2462/" source="CVE"/>
		<reference ref_id="CVE-2009-2463" ref_url="https://www.suse.com/security/cve/CVE-2009-2463/" source="CVE"/>
		<reference ref_id="CVE-2009-2464" ref_url="https://www.suse.com/security/cve/CVE-2009-2464/" source="CVE"/>
		<reference ref_id="CVE-2009-2465" ref_url="https://www.suse.com/security/cve/CVE-2009-2465/" source="CVE"/>
		<reference ref_id="CVE-2009-2466" ref_url="https://www.suse.com/security/cve/CVE-2009-2466/" source="CVE"/>
		<reference ref_id="CVE-2009-2467" ref_url="https://www.suse.com/security/cve/CVE-2009-2467/" source="CVE"/>
		<reference ref_id="CVE-2009-2469" ref_url="https://www.suse.com/security/cve/CVE-2009-2469/" source="CVE"/>
		<reference ref_id="CVE-2009-2470" ref_url="https://www.suse.com/security/cve/CVE-2009-2470/" source="CVE"/>
		<reference ref_id="CVE-2009-2471" ref_url="https://www.suse.com/security/cve/CVE-2009-2471/" source="CVE"/>
		<reference ref_id="CVE-2009-2472" ref_url="https://www.suse.com/security/cve/CVE-2009-2472/" source="CVE"/>
		<reference ref_id="CVE-2009-2654" ref_url="https://www.suse.com/security/cve/CVE-2009-2654/" source="CVE"/>
		<reference ref_id="CVE-2009-3069" ref_url="https://www.suse.com/security/cve/CVE-2009-3069/" source="CVE"/>
		<reference ref_id="CVE-2009-3070" ref_url="https://www.suse.com/security/cve/CVE-2009-3070/" source="CVE"/>
		<reference ref_id="CVE-2009-3071" ref_url="https://www.suse.com/security/cve/CVE-2009-3071/" source="CVE"/>
		<reference ref_id="CVE-2009-3072" ref_url="https://www.suse.com/security/cve/CVE-2009-3072/" source="CVE"/>
		<reference ref_id="CVE-2009-3073" ref_url="https://www.suse.com/security/cve/CVE-2009-3073/" source="CVE"/>
		<reference ref_id="CVE-2009-3074" ref_url="https://www.suse.com/security/cve/CVE-2009-3074/" source="CVE"/>
		<reference ref_id="CVE-2009-3075" ref_url="https://www.suse.com/security/cve/CVE-2009-3075/" source="CVE"/>
		<reference ref_id="CVE-2009-3076" ref_url="https://www.suse.com/security/cve/CVE-2009-3076/" source="CVE"/>
		<reference ref_id="CVE-2009-3077" ref_url="https://www.suse.com/security/cve/CVE-2009-3077/" source="CVE"/>
		<reference ref_id="CVE-2009-3078" ref_url="https://www.suse.com/security/cve/CVE-2009-3078/" source="CVE"/>
		<reference ref_id="CVE-2009-3079" ref_url="https://www.suse.com/security/cve/CVE-2009-3079/" source="CVE"/>
		<reference ref_id="CVE-2009-3274" ref_url="https://www.suse.com/security/cve/CVE-2009-3274/" source="CVE"/>
		<reference ref_id="CVE-2009-3370" ref_url="https://www.suse.com/security/cve/CVE-2009-3370/" source="CVE"/>
		<reference ref_id="CVE-2009-3372" ref_url="https://www.suse.com/security/cve/CVE-2009-3372/" source="CVE"/>
		<reference ref_id="CVE-2009-3373" ref_url="https://www.suse.com/security/cve/CVE-2009-3373/" source="CVE"/>
		<reference ref_id="CVE-2009-3374" ref_url="https://www.suse.com/security/cve/CVE-2009-3374/" source="CVE"/>
		<reference ref_id="CVE-2009-3375" ref_url="https://www.suse.com/security/cve/CVE-2009-3375/" source="CVE"/>
		<reference ref_id="CVE-2009-3376" ref_url="https://www.suse.com/security/cve/CVE-2009-3376/" source="CVE"/>
		<reference ref_id="CVE-2009-3380" ref_url="https://www.suse.com/security/cve/CVE-2009-3380/" source="CVE"/>
		<reference ref_id="CVE-2009-3382" ref_url="https://www.suse.com/security/cve/CVE-2009-3382/" source="CVE"/>
		<reference ref_id="CVE-2009-3979" ref_url="https://www.suse.com/security/cve/CVE-2009-3979/" source="CVE"/>
		<reference ref_id="CVE-2009-3981" ref_url="https://www.suse.com/security/cve/CVE-2009-3981/" source="CVE"/>
		<reference ref_id="CVE-2009-3983" ref_url="https://www.suse.com/security/cve/CVE-2009-3983/" source="CVE"/>
		<reference ref_id="CVE-2009-3984" ref_url="https://www.suse.com/security/cve/CVE-2009-3984/" source="CVE"/>
		<reference ref_id="CVE-2009-3985" ref_url="https://www.suse.com/security/cve/CVE-2009-3985/" source="CVE"/>
		<reference ref_id="CVE-2009-3986" ref_url="https://www.suse.com/security/cve/CVE-2009-3986/" source="CVE"/>
		<reference ref_id="CVE-2009-3988" ref_url="https://www.suse.com/security/cve/CVE-2009-3988/" source="CVE"/>
		<reference ref_id="CVE-2010-0159" ref_url="https://www.suse.com/security/cve/CVE-2010-0159/" source="CVE"/>
		<reference ref_id="CVE-2010-0160" ref_url="https://www.suse.com/security/cve/CVE-2010-0160/" source="CVE"/>
		<reference ref_id="CVE-2010-0162" ref_url="https://www.suse.com/security/cve/CVE-2010-0162/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0175" ref_url="https://www.suse.com/security/cve/CVE-2010-0175/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0179" ref_url="https://www.suse.com/security/cve/CVE-2010-0179/" source="CVE"/>
		<description>
These are all security issues fixed in the mozilla-xulrunner190-1.9.0.19-0.1.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3836/">CVE-2008-3836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3836">CVE-2008-3836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4063/">CVE-2008-4063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4063">CVE-2008-4063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4064/">CVE-2008-4064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4064">CVE-2008-4064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4070/">CVE-2008-4070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4070">CVE-2008-4070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0040">CVE-2009-0040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0071/">CVE-2009-0071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0071">CVE-2009-0071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0352/">CVE-2009-0352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0352">CVE-2009-0352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0353/">CVE-2009-0353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0353">CVE-2009-0353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0354/">CVE-2009-0354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0354">CVE-2009-0354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0355/">CVE-2009-0355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0355">CVE-2009-0355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0356/">CVE-2009-0356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0356">CVE-2009-0356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0357/">CVE-2009-0357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0357">CVE-2009-0357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0358/">CVE-2009-0358 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0358">CVE-2009-0358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0652/">CVE-2009-0652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0652">CVE-2009-0652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0771/">CVE-2009-0771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0771">CVE-2009-0771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0772/">CVE-2009-0772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0772">CVE-2009-0772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0773/">CVE-2009-0773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0773">CVE-2009-0773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0774/">CVE-2009-0774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0774">CVE-2009-0774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0775/">CVE-2009-0775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0775">CVE-2009-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0776/">CVE-2009-0776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0776">CVE-2009-0776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0777/">CVE-2009-0777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0777">CVE-2009-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0793/">CVE-2009-0793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0793">CVE-2009-0793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1044/">CVE-2009-1044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1044">CVE-2009-1044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1169/">CVE-2009-1169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1169">CVE-2009-1169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1194/">CVE-2009-1194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1194">CVE-2009-1194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1302/">CVE-2009-1302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1302">CVE-2009-1302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1303/">CVE-2009-1303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1303">CVE-2009-1303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1304/">CVE-2009-1304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1304">CVE-2009-1304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1305/">CVE-2009-1305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1305">CVE-2009-1305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1306/">CVE-2009-1306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1306">CVE-2009-1306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1307/">CVE-2009-1307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1307">CVE-2009-1307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1308/">CVE-2009-1308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1308">CVE-2009-1308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1309/">CVE-2009-1309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1309">CVE-2009-1309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1310/">CVE-2009-1310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1310">CVE-2009-1310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1311/">CVE-2009-1311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1311">CVE-2009-1311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1312/">CVE-2009-1312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1312">CVE-2009-1312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1313/">CVE-2009-1313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1313">CVE-2009-1313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1392/">CVE-2009-1392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1392">CVE-2009-1392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1563/">CVE-2009-1563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1563">CVE-2009-1563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1571/">CVE-2009-1571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1571">CVE-2009-1571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1832/">CVE-2009-1832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1832">CVE-2009-1832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1833/">CVE-2009-1833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1833">CVE-2009-1833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1834/">CVE-2009-1834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1834">CVE-2009-1834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1835/">CVE-2009-1835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1835">CVE-2009-1835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1836/">CVE-2009-1836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1836">CVE-2009-1836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1837/">CVE-2009-1837 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-1837">CVE-2009-1837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1838/">CVE-2009-1838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1838">CVE-2009-1838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1839/">CVE-2009-1839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1839">CVE-2009-1839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1840/">CVE-2009-1840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1840">CVE-2009-1840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1841/">CVE-2009-1841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1841">CVE-2009-1841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2462/">CVE-2009-2462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2462">CVE-2009-2462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2463/">CVE-2009-2463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2463">CVE-2009-2463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2464/">CVE-2009-2464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2464">CVE-2009-2464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2465/">CVE-2009-2465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2465">CVE-2009-2465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2466/">CVE-2009-2466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2466">CVE-2009-2466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2467/">CVE-2009-2467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2467">CVE-2009-2467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2469/">CVE-2009-2469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2469">CVE-2009-2469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2470/">CVE-2009-2470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2470">CVE-2009-2470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2471/">CVE-2009-2471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2471">CVE-2009-2471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2472/">CVE-2009-2472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2472">CVE-2009-2472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2654/">CVE-2009-2654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2654">CVE-2009-2654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3069/">CVE-2009-3069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3069">CVE-2009-3069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3070/">CVE-2009-3070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3070">CVE-2009-3070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3071/">CVE-2009-3071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3071">CVE-2009-3071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3072/">CVE-2009-3072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3072">CVE-2009-3072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3073/">CVE-2009-3073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3073">CVE-2009-3073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3074/">CVE-2009-3074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3074">CVE-2009-3074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3075/">CVE-2009-3075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3075">CVE-2009-3075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3076/">CVE-2009-3076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3076">CVE-2009-3076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3077/">CVE-2009-3077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3077">CVE-2009-3077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3078/">CVE-2009-3078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3078">CVE-2009-3078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3079/">CVE-2009-3079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3079">CVE-2009-3079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3274/">CVE-2009-3274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3274">CVE-2009-3274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3370/">CVE-2009-3370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3370">CVE-2009-3370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3372/">CVE-2009-3372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3372">CVE-2009-3372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3373/">CVE-2009-3373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3373">CVE-2009-3373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3374/">CVE-2009-3374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3374">CVE-2009-3374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3375/">CVE-2009-3375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3375">CVE-2009-3375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3376/">CVE-2009-3376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3376">CVE-2009-3376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3380/">CVE-2009-3380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3380">CVE-2009-3380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3382/">CVE-2009-3382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3382">CVE-2009-3382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3979/">CVE-2009-3979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3979">CVE-2009-3979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3981/">CVE-2009-3981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3981">CVE-2009-3981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3983/">CVE-2009-3983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3983">CVE-2009-3983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3984/">CVE-2009-3984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3984">CVE-2009-3984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3985/">CVE-2009-3985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3985">CVE-2009-3985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3986/">CVE-2009-3986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3986">CVE-2009-3986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3988/">CVE-2009-3988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3988">CVE-2009-3988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0159/">CVE-2010-0159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0159">CVE-2010-0159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0160/">CVE-2010-0160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0160">CVE-2010-0160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0162/">CVE-2010-0162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0162">CVE-2010-0162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0173">CVE-2010-0173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0174">CVE-2010-0174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0175/">CVE-2010-0175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0175">CVE-2010-0175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0176">CVE-2010-0176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0177">CVE-2010-0177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0178">CVE-2010-0178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0179/">CVE-2010-0179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0179">CVE-2010-0179 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988781" comment="mozilla-xulrunner190-1.9.0.19-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988782" comment="mozilla-xulrunner190-32bit-1.9.0.19-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988783" comment="mozilla-xulrunner190-gnomevfs-1.9.0.19-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988784" comment="mozilla-xulrunner190-translations-1.9.0.19-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988785" comment="mozilla-xulrunner190-x86-1.9.0.19-0.1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215729" version="1" class="patch">
	<metadata>
		<title>mozilla-xulrunner191-1.9.1.9-1.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-1563" ref_url="https://www.suse.com/security/cve/CVE-2009-1563/" source="CVE"/>
		<reference ref_id="CVE-2009-1571" ref_url="https://www.suse.com/security/cve/CVE-2009-1571/" source="CVE"/>
		<reference ref_id="CVE-2009-2470" ref_url="https://www.suse.com/security/cve/CVE-2009-2470/" source="CVE"/>
		<reference ref_id="CVE-2009-2654" ref_url="https://www.suse.com/security/cve/CVE-2009-2654/" source="CVE"/>
		<reference ref_id="CVE-2009-3069" ref_url="https://www.suse.com/security/cve/CVE-2009-3069/" source="CVE"/>
		<reference ref_id="CVE-2009-3070" ref_url="https://www.suse.com/security/cve/CVE-2009-3070/" source="CVE"/>
		<reference ref_id="CVE-2009-3071" ref_url="https://www.suse.com/security/cve/CVE-2009-3071/" source="CVE"/>
		<reference ref_id="CVE-2009-3072" ref_url="https://www.suse.com/security/cve/CVE-2009-3072/" source="CVE"/>
		<reference ref_id="CVE-2009-3073" ref_url="https://www.suse.com/security/cve/CVE-2009-3073/" source="CVE"/>
		<reference ref_id="CVE-2009-3074" ref_url="https://www.suse.com/security/cve/CVE-2009-3074/" source="CVE"/>
		<reference ref_id="CVE-2009-3075" ref_url="https://www.suse.com/security/cve/CVE-2009-3075/" source="CVE"/>
		<reference ref_id="CVE-2009-3077" ref_url="https://www.suse.com/security/cve/CVE-2009-3077/" source="CVE"/>
		<reference ref_id="CVE-2009-3078" ref_url="https://www.suse.com/security/cve/CVE-2009-3078/" source="CVE"/>
		<reference ref_id="CVE-2009-3079" ref_url="https://www.suse.com/security/cve/CVE-2009-3079/" source="CVE"/>
		<reference ref_id="CVE-2009-3274" ref_url="https://www.suse.com/security/cve/CVE-2009-3274/" source="CVE"/>
		<reference ref_id="CVE-2009-3370" ref_url="https://www.suse.com/security/cve/CVE-2009-3370/" source="CVE"/>
		<reference ref_id="CVE-2009-3371" ref_url="https://www.suse.com/security/cve/CVE-2009-3371/" source="CVE"/>
		<reference ref_id="CVE-2009-3372" ref_url="https://www.suse.com/security/cve/CVE-2009-3372/" source="CVE"/>
		<reference ref_id="CVE-2009-3373" ref_url="https://www.suse.com/security/cve/CVE-2009-3373/" source="CVE"/>
		<reference ref_id="CVE-2009-3374" ref_url="https://www.suse.com/security/cve/CVE-2009-3374/" source="CVE"/>
		<reference ref_id="CVE-2009-3375" ref_url="https://www.suse.com/security/cve/CVE-2009-3375/" source="CVE"/>
		<reference ref_id="CVE-2009-3376" ref_url="https://www.suse.com/security/cve/CVE-2009-3376/" source="CVE"/>
		<reference ref_id="CVE-2009-3377" ref_url="https://www.suse.com/security/cve/CVE-2009-3377/" source="CVE"/>
		<reference ref_id="CVE-2009-3378" ref_url="https://www.suse.com/security/cve/CVE-2009-3378/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2009-3380" ref_url="https://www.suse.com/security/cve/CVE-2009-3380/" source="CVE"/>
		<reference ref_id="CVE-2009-3381" ref_url="https://www.suse.com/security/cve/CVE-2009-3381/" source="CVE"/>
		<reference ref_id="CVE-2009-3383" ref_url="https://www.suse.com/security/cve/CVE-2009-3383/" source="CVE"/>
		<reference ref_id="CVE-2009-3388" ref_url="https://www.suse.com/security/cve/CVE-2009-3388/" source="CVE"/>
		<reference ref_id="CVE-2009-3389" ref_url="https://www.suse.com/security/cve/CVE-2009-3389/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-3979" ref_url="https://www.suse.com/security/cve/CVE-2009-3979/" source="CVE"/>
		<reference ref_id="CVE-2009-3980" ref_url="https://www.suse.com/security/cve/CVE-2009-3980/" source="CVE"/>
		<reference ref_id="CVE-2009-3982" ref_url="https://www.suse.com/security/cve/CVE-2009-3982/" source="CVE"/>
		<reference ref_id="CVE-2009-3983" ref_url="https://www.suse.com/security/cve/CVE-2009-3983/" source="CVE"/>
		<reference ref_id="CVE-2009-3984" ref_url="https://www.suse.com/security/cve/CVE-2009-3984/" source="CVE"/>
		<reference ref_id="CVE-2009-3985" ref_url="https://www.suse.com/security/cve/CVE-2009-3985/" source="CVE"/>
		<reference ref_id="CVE-2009-3988" ref_url="https://www.suse.com/security/cve/CVE-2009-3988/" source="CVE"/>
		<reference ref_id="CVE-2010-0159" ref_url="https://www.suse.com/security/cve/CVE-2010-0159/" source="CVE"/>
		<reference ref_id="CVE-2010-0160" ref_url="https://www.suse.com/security/cve/CVE-2010-0160/" source="CVE"/>
		<reference ref_id="CVE-2010-0162" ref_url="https://www.suse.com/security/cve/CVE-2010-0162/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0175" ref_url="https://www.suse.com/security/cve/CVE-2010-0175/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<description>
These are all security issues fixed in the mozilla-xulrunner191-1.9.1.9-1.12.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1563/">CVE-2009-1563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1563">CVE-2009-1563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1571/">CVE-2009-1571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1571">CVE-2009-1571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2470/">CVE-2009-2470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2470">CVE-2009-2470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2654/">CVE-2009-2654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2654">CVE-2009-2654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3069/">CVE-2009-3069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3069">CVE-2009-3069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3070/">CVE-2009-3070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3070">CVE-2009-3070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3071/">CVE-2009-3071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3071">CVE-2009-3071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3072/">CVE-2009-3072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3072">CVE-2009-3072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3073/">CVE-2009-3073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3073">CVE-2009-3073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3074/">CVE-2009-3074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3074">CVE-2009-3074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3075/">CVE-2009-3075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3075">CVE-2009-3075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3077/">CVE-2009-3077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3077">CVE-2009-3077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3078/">CVE-2009-3078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3078">CVE-2009-3078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3079/">CVE-2009-3079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3079">CVE-2009-3079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3274/">CVE-2009-3274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3274">CVE-2009-3274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3370/">CVE-2009-3370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3370">CVE-2009-3370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3371/">CVE-2009-3371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3371">CVE-2009-3371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3372/">CVE-2009-3372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3372">CVE-2009-3372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3373/">CVE-2009-3373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3373">CVE-2009-3373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3374/">CVE-2009-3374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3374">CVE-2009-3374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3375/">CVE-2009-3375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3375">CVE-2009-3375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3376/">CVE-2009-3376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3376">CVE-2009-3376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3377/">CVE-2009-3377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3377">CVE-2009-3377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3378/">CVE-2009-3378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3378">CVE-2009-3378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3379">CVE-2009-3379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3380/">CVE-2009-3380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3380">CVE-2009-3380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3381/">CVE-2009-3381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3381">CVE-2009-3381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3383/">CVE-2009-3383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3383">CVE-2009-3383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3388/">CVE-2009-3388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3388">CVE-2009-3388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3389/">CVE-2009-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3389">CVE-2009-3389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3979/">CVE-2009-3979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3979">CVE-2009-3979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3980/">CVE-2009-3980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3980">CVE-2009-3980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3982/">CVE-2009-3982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3982">CVE-2009-3982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3983/">CVE-2009-3983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3983">CVE-2009-3983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3984/">CVE-2009-3984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3984">CVE-2009-3984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3985/">CVE-2009-3985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3985">CVE-2009-3985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3988/">CVE-2009-3988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3988">CVE-2009-3988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0159/">CVE-2010-0159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0159">CVE-2010-0159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0160/">CVE-2010-0160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0160">CVE-2010-0160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0162/">CVE-2010-0162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0162">CVE-2010-0162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0173">CVE-2010-0173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0174">CVE-2010-0174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0175/">CVE-2010-0175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0175">CVE-2010-0175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0176">CVE-2010-0176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0177">CVE-2010-0177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0178">CVE-2010-0178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0181">CVE-2010-0181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0182">CVE-2010-0182 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988786" comment="mozilla-xulrunner191-1.9.1.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988787" comment="mozilla-xulrunner191-32bit-1.9.1.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988788" comment="mozilla-xulrunner191-gnomevfs-1.9.1.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988789" comment="mozilla-xulrunner191-translations-1.9.1.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988790" comment="mozilla-xulrunner191-x86-1.9.1.9-1.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215730" version="1" class="patch">
	<metadata>
		<title>mutt-1.5.17-42.33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-1558" ref_url="https://www.suse.com/security/cve/CVE-2007-1558/" source="CVE"/>
		<description>
These are all security issues fixed in the mutt-1.5.17-42.33.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1558/">CVE-2007-1558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1558">CVE-2007-1558 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988791" comment="mutt-1.5.17-42.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215731" version="1" class="patch">
	<metadata>
		<title>nagios-3.0.6-1.21.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-5803" ref_url="https://www.suse.com/security/cve/CVE-2007-5803/" source="CVE"/>
		<description>
These are all security issues fixed in the nagios-3.0.6-1.21.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5803/">CVE-2007-5803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5803">CVE-2007-5803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988792" comment="nagios-3.0.6-1.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988793" comment="nagios-www-3.0.6-1.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215732" version="1" class="patch">
	<metadata>
		<title>nagios-plugins-1.4.13-1.35 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-5623" ref_url="https://www.suse.com/security/cve/CVE-2007-5623/" source="CVE"/>
		<description>
These are all security issues fixed in the nagios-plugins-1.4.13-1.35 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5623/">CVE-2007-5623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5623">CVE-2007-5623 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988794" comment="nagios-plugins-1.4.13-1.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988795" comment="nagios-plugins-extras-1.4.13-1.35 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215733" version="1" class="patch">
	<metadata>
		<title>ntp-4.2.4p8-1.3.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0159" ref_url="https://www.suse.com/security/cve/CVE-2009-0159/" source="CVE"/>
		<reference ref_id="CVE-2009-1252" ref_url="https://www.suse.com/security/cve/CVE-2009-1252/" source="CVE"/>
		<description>
These are all security issues fixed in the ntp-4.2.4p8-1.3.28 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0159/">CVE-2009-0159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0159">CVE-2009-0159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1252/">CVE-2009-1252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1252">CVE-2009-1252 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988796" comment="ntp-4.2.4p8-1.3.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988797" comment="ntp-doc-4.2.4p8-1.3.28 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215734" version="1" class="patch">
	<metadata>
		<title>openssh-5.1p1-41.31.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-0225" ref_url="https://www.suse.com/security/cve/CVE-2006-0225/" source="CVE"/>
		<reference ref_id="CVE-2007-4752" ref_url="https://www.suse.com/security/cve/CVE-2007-4752/" source="CVE"/>
		<reference ref_id="CVE-2008-1483" ref_url="https://www.suse.com/security/cve/CVE-2008-1483/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-5.1p1-41.31.36 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0225/">CVE-2006-0225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0225">CVE-2006-0225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4752/">CVE-2007-4752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4752">CVE-2007-4752 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2008-1483/">CVE-2008-1483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1483">CVE-2008-1483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988798" comment="openssh-5.1p1-41.31.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988799" comment="openssh-askpass-5.1p1-41.31.36 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215735" version="1" class="patch">
	<metadata>
		<title>openswan-2.6.16-1.34.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-4190" ref_url="https://www.suse.com/security/cve/CVE-2008-4190/" source="CVE"/>
		<reference ref_id="CVE-2009-2185" ref_url="https://www.suse.com/security/cve/CVE-2009-2185/" source="CVE"/>
		<description>
These are all security issues fixed in the openswan-2.6.16-1.34.3 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4190/">CVE-2008-4190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4190">CVE-2008-4190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2185/">CVE-2009-2185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2185">CVE-2009-2185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988800" comment="openswan-2.6.16-1.34.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988801" comment="openswan-doc-2.6.16-1.34.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215736" version="1" class="patch">
	<metadata>
		<title>openvpn-2.0.9-143.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<description>
These are all security issues fixed in the openvpn-2.0.9-143.31 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4339">CVE-2006-4339 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988802" comment="openvpn-2.0.9-143.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988803" comment="openvpn-auth-pam-plugin-2.0.9-143.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215737" version="1" class="patch">
	<metadata>
		<title>pam-1.0.4-0.5.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0579" ref_url="https://www.suse.com/security/cve/CVE-2009-0579/" source="CVE"/>
		<reference ref_id="CVE-2009-0887" ref_url="https://www.suse.com/security/cve/CVE-2009-0887/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-1.0.4-0.5.12 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0579/">CVE-2009-0579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0579">CVE-2009-0579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0887/">CVE-2009-0887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0887">CVE-2009-0887 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988804" comment="pam-1.0.4-0.5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988805" comment="pam-32bit-1.0.4-0.5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988806" comment="pam-doc-1.0.4-0.5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988807" comment="pam-x86-1.0.4-0.5.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215738" version="1" class="patch">
	<metadata>
		<title>pam_krb5-2.3.1-47.10.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-3825" ref_url="https://www.suse.com/security/cve/CVE-2008-3825/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_krb5-2.3.1-47.10.15 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3825/">CVE-2008-3825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3825">CVE-2008-3825 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988808" comment="pam_krb5-2.3.1-47.10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988809" comment="pam_krb5-32bit-2.3.1-47.10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988810" comment="pam_krb5-x86-2.3.1-47.10.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215739" version="1" class="patch">
	<metadata>
		<title>pam_ldap-184-147.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-5170" ref_url="https://www.suse.com/security/cve/CVE-2006-5170/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_ldap-184-147.20 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5170/">CVE-2006-5170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5170">CVE-2006-5170 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988811" comment="pam_ldap-184-147.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988812" comment="pam_ldap-32bit-184-147.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988813" comment="pam_ldap-x86-184-147.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215740" version="1" class="patch">
	<metadata>
		<title>pam_mount-0.47-13.13.65 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-5138" ref_url="https://www.suse.com/security/cve/CVE-2008-5138/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_mount-0.47-13.13.65 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5138/">CVE-2008-5138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5138">CVE-2008-5138 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988814" comment="pam_mount-0.47-13.13.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988815" comment="pam_mount-32bit-0.47-13.13.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988816" comment="pam_mount-x86-0.47-13.13.65 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215741" version="1" class="patch">
	<metadata>
		<title>perl-32bit-5.10.0-64.47.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-5116" ref_url="https://www.suse.com/security/cve/CVE-2007-5116/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-32bit-5.10.0-64.47.8 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5116/">CVE-2007-5116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5116">CVE-2007-5116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988817" comment="perl-5.10.0-64.47.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988818" comment="perl-32bit-5.10.0-64.47.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988819" comment="perl-base-5.10.0-64.47.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988820" comment="perl-doc-5.10.0-64.47.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988821" comment="perl-x86-5.10.0-64.47.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215742" version="1" class="patch">
	<metadata>
		<title>perl-HTML-Parser-3.56-1.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-3627" ref_url="https://www.suse.com/security/cve/CVE-2009-3627/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-HTML-Parser-3.56-1.18.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3627/">CVE-2009-3627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3627">CVE-2009-3627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988822" comment="perl-HTML-Parser-3.56-1.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215743" version="1" class="patch">
	<metadata>
		<title>perl-Tk-804.028-50.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-4484" ref_url="https://www.suse.com/security/cve/CVE-2006-4484/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Tk-804.028-50.24 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4484/">CVE-2006-4484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4484">CVE-2006-4484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988823" comment="perl-Tk-804.028-50.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215744" version="1" class="patch">
	<metadata>
		<title>perl-spamassassin-3.2.5-26.22.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-0451" ref_url="https://www.suse.com/security/cve/CVE-2007-0451/" source="CVE"/>
		<reference ref_id="CVE-2007-2873" ref_url="https://www.suse.com/security/cve/CVE-2007-2873/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-spamassassin-3.2.5-26.22.18 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0451/">CVE-2007-0451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0451">CVE-2007-0451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2873/">CVE-2007-2873 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2873">CVE-2007-2873 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988824" comment="perl-spamassassin-3.2.5-26.22.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988825" comment="spamassassin-3.2.5-26.22.18 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215745" version="1" class="patch">
	<metadata>
		<title>postgresql-8.3.9-0.1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-4769" ref_url="https://www.suse.com/security/cve/CVE-2007-4769/" source="CVE"/>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2007-6067" ref_url="https://www.suse.com/security/cve/CVE-2007-6067/" source="CVE"/>
		<reference ref_id="CVE-2007-6600" ref_url="https://www.suse.com/security/cve/CVE-2007-6600/" source="CVE"/>
		<reference ref_id="CVE-2007-6601" ref_url="https://www.suse.com/security/cve/CVE-2007-6601/" source="CVE"/>
		<reference ref_id="CVE-2009-4034" ref_url="https://www.suse.com/security/cve/CVE-2009-4034/" source="CVE"/>
		<reference ref_id="CVE-2009-4136" ref_url="https://www.suse.com/security/cve/CVE-2009-4136/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql-8.3.9-0.1.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4769/">CVE-2007-4769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4769">CVE-2007-4769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4772">CVE-2007-4772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6067/">CVE-2007-6067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6067">CVE-2007-6067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6600/">CVE-2007-6600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6600">CVE-2007-6600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6601/">CVE-2007-6601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6601">CVE-2007-6601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4034/">CVE-2009-4034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4034">CVE-2009-4034 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4136/">CVE-2009-4136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4136">CVE-2009-4136 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988826" comment="postgresql-8.3.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988827" comment="postgresql-contrib-8.3.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988828" comment="postgresql-docs-8.3.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988829" comment="postgresql-libs-8.3.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988830" comment="postgresql-libs-32bit-8.3.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988831" comment="postgresql-libs-x86-8.3.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988832" comment="postgresql-server-8.3.9-0.1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215746" version="1" class="patch">
	<metadata>
		<title>puppet-0.24.8-1.3.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-0156" ref_url="https://www.suse.com/security/cve/CVE-2010-0156/" source="CVE"/>
		<description>
These are all security issues fixed in the puppet-0.24.8-1.3.5 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0156/">CVE-2010-0156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0156">CVE-2010-0156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988833" comment="puppet-0.24.8-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988834" comment="puppet-server-0.24.8-1.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215747" version="1" class="patch">
	<metadata>
		<title>python-2.6.0-8.9.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-2052" ref_url="https://www.suse.com/security/cve/CVE-2007-2052/" source="CVE"/>
		<reference ref_id="CVE-2008-1721" ref_url="https://www.suse.com/security/cve/CVE-2008-1721/" source="CVE"/>
		<reference ref_id="CVE-2008-2315" ref_url="https://www.suse.com/security/cve/CVE-2008-2315/" source="CVE"/>
		<reference ref_id="CVE-2008-2316" ref_url="https://www.suse.com/security/cve/CVE-2008-2316/" source="CVE"/>
		<reference ref_id="CVE-2008-3142" ref_url="https://www.suse.com/security/cve/CVE-2008-3142/" source="CVE"/>
		<reference ref_id="CVE-2008-3143" ref_url="https://www.suse.com/security/cve/CVE-2008-3143/" source="CVE"/>
		<reference ref_id="CVE-2008-3144" ref_url="https://www.suse.com/security/cve/CVE-2008-3144/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.6.0-8.9.28 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2052/">CVE-2007-2052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2052">CVE-2007-2052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1721/">CVE-2008-1721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1721">CVE-2008-1721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2315/">CVE-2008-2315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2315">CVE-2008-2315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2316/">CVE-2008-2316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2316">CVE-2008-2316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3142/">CVE-2008-3142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3142">CVE-2008-3142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3143/">CVE-2008-3143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3143">CVE-2008-3143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3144/">CVE-2008-3144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3144">CVE-2008-3144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988835" comment="python-2.6.0-8.9.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988836" comment="python-32bit-2.6.0-8.9.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988837" comment="python-curses-2.6.0-8.9.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988838" comment="python-demo-2.6.0-8.9.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988839" comment="python-gdbm-2.6.0-8.9.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988840" comment="python-idle-2.6.0-8.9.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988841" comment="python-tk-2.6.0-8.9.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988842" comment="python-x86-2.6.0-8.9.28 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215748" version="1" class="patch">
	<metadata>
		<title>qt3-3.3.8b-88.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-4811" ref_url="https://www.suse.com/security/cve/CVE-2006-4811/" source="CVE"/>
		<reference ref_id="CVE-2007-0242" ref_url="https://www.suse.com/security/cve/CVE-2007-0242/" source="CVE"/>
		<reference ref_id="CVE-2007-3388" ref_url="https://www.suse.com/security/cve/CVE-2007-3388/" source="CVE"/>
		<reference ref_id="CVE-2007-4137" ref_url="https://www.suse.com/security/cve/CVE-2007-4137/" source="CVE"/>
		<description>
These are all security issues fixed in the qt3-3.3.8b-88.21 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4811/">CVE-2006-4811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4811">CVE-2006-4811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0242/">CVE-2007-0242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0242">CVE-2007-0242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3388/">CVE-2007-3388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3388">CVE-2007-3388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4137/">CVE-2007-4137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4137">CVE-2007-4137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988843" comment="qt3-3.3.8b-88.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988844" comment="qt3-32bit-3.3.8b-88.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988845" comment="qt3-x86-3.3.8b-88.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215749" version="1" class="patch">
	<metadata>
		<title>quagga-0.99.15-0.1.55 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-2223" ref_url="https://www.suse.com/security/cve/CVE-2006-2223/" source="CVE"/>
		<reference ref_id="CVE-2007-1995" ref_url="https://www.suse.com/security/cve/CVE-2007-1995/" source="CVE"/>
		<description>
These are all security issues fixed in the quagga-0.99.15-0.1.55 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2223/">CVE-2006-2223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2223">CVE-2006-2223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1995/">CVE-2007-1995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1995">CVE-2007-1995 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988846" comment="quagga-0.99.15-0.1.55 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215750" version="1" class="patch">
	<metadata>
		<title>rsync-3.0.4-2.33.82 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-4091" ref_url="https://www.suse.com/security/cve/CVE-2007-4091/" source="CVE"/>
		<reference ref_id="CVE-2007-6199" ref_url="https://www.suse.com/security/cve/CVE-2007-6199/" source="CVE"/>
		<description>
These are all security issues fixed in the rsync-3.0.4-2.33.82 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4091/">CVE-2007-4091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4091">CVE-2007-4091 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6199/">CVE-2007-6199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6199">CVE-2007-6199 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988847" comment="rsync-3.0.4-2.33.82 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215751" version="1" class="patch">
	<metadata>
		<title>ruby-1.8.7.p72-5.24.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-3694" ref_url="https://www.suse.com/security/cve/CVE-2006-3694/" source="CVE"/>
		<reference ref_id="CVE-2006-5467" ref_url="https://www.suse.com/security/cve/CVE-2006-5467/" source="CVE"/>
		<reference ref_id="CVE-2006-6303" ref_url="https://www.suse.com/security/cve/CVE-2006-6303/" source="CVE"/>
		<reference ref_id="CVE-2007-5162" ref_url="https://www.suse.com/security/cve/CVE-2007-5162/" source="CVE"/>
		<reference ref_id="CVE-2007-5770" ref_url="https://www.suse.com/security/cve/CVE-2007-5770/" source="CVE"/>
		<reference ref_id="CVE-2008-1145" ref_url="https://www.suse.com/security/cve/CVE-2008-1145/" source="CVE"/>
		<reference ref_id="CVE-2008-3790" ref_url="https://www.suse.com/security/cve/CVE-2008-3790/" source="CVE"/>
		<reference ref_id="CVE-2009-0642" ref_url="https://www.suse.com/security/cve/CVE-2009-0642/" source="CVE"/>
		<reference ref_id="CVE-2009-1904" ref_url="https://www.suse.com/security/cve/CVE-2009-1904/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby-1.8.7.p72-5.24.2 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3694/">CVE-2006-3694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3694">CVE-2006-3694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5467/">CVE-2006-5467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5467">CVE-2006-5467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6303/">CVE-2006-6303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6303">CVE-2006-6303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5162/">CVE-2007-5162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5162">CVE-2007-5162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5770/">CVE-2007-5770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5770">CVE-2007-5770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1145/">CVE-2008-1145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1145">CVE-2008-1145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3790/">CVE-2008-3790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3790">CVE-2008-3790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0642/">CVE-2009-0642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0642">CVE-2009-0642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1904/">CVE-2009-1904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1904">CVE-2009-1904 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988848" comment="ruby-1.8.7.p72-5.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988849" comment="ruby-doc-html-1.8.7.p72-5.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988850" comment="ruby-tk-1.8.7.p72-5.24.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215752" version="1" class="patch">
	<metadata>
		<title>squid-2.7.STABLE5-2.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0478" ref_url="https://www.suse.com/security/cve/CVE-2009-0478/" source="CVE"/>
		<reference ref_id="CVE-2009-2855" ref_url="https://www.suse.com/security/cve/CVE-2009-2855/" source="CVE"/>
		<reference ref_id="CVE-2010-0308" ref_url="https://www.suse.com/security/cve/CVE-2010-0308/" source="CVE"/>
		<description>
These are all security issues fixed in the squid-2.7.STABLE5-2.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0478/">CVE-2009-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0478">CVE-2009-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2855/">CVE-2009-2855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2855">CVE-2009-2855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0308/">CVE-2010-0308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0308">CVE-2010-0308 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988851" comment="squid-2.7.STABLE5-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215753" version="1" class="patch">
	<metadata>
		<title>star-1.5final-28.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-4134" ref_url="https://www.suse.com/security/cve/CVE-2007-4134/" source="CVE"/>
		<description>
These are all security issues fixed in the star-1.5final-28.19 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4134/">CVE-2007-4134 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4134">CVE-2007-4134 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988852" comment="star-1.5final-28.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215754" version="1" class="patch">
	<metadata>
		<title>sudo-1.6.9p17-21.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-0426" ref_url="https://www.suse.com/security/cve/CVE-2010-0426/" source="CVE"/>
		<reference ref_id="CVE-2010-0427" ref_url="https://www.suse.com/security/cve/CVE-2010-0427/" source="CVE"/>
		<description>
These are all security issues fixed in the sudo-1.6.9p17-21.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0426/">CVE-2010-0426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0426">CVE-2010-0426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0427/">CVE-2010-0427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0427">CVE-2010-0427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988853" comment="sudo-1.6.9p17-21.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215755" version="1" class="patch">
	<metadata>
		<title>syslog-ng-2.0.9-27.27.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-5110" ref_url="https://www.suse.com/security/cve/CVE-2008-5110/" source="CVE"/>
		<description>
These are all security issues fixed in the syslog-ng-2.0.9-27.27.19 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5110/">CVE-2008-5110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5110">CVE-2008-5110 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988854" comment="syslog-ng-2.0.9-27.27.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215756" version="1" class="patch">
	<metadata>
		<title>sysstat-8.1.5-7.9.56 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-3852" ref_url="https://www.suse.com/security/cve/CVE-2007-3852/" source="CVE"/>
		<description>
These are all security issues fixed in the sysstat-8.1.5-7.9.56 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3852/">CVE-2007-3852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3852">CVE-2007-3852 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988855" comment="sysstat-8.1.5-7.9.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988856" comment="sysstat-isag-8.1.5-7.9.56 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215757" version="1" class="patch">
	<metadata>
		<title>systemtap-1.0-0.15.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-2911" ref_url="https://www.suse.com/security/cve/CVE-2009-2911/" source="CVE"/>
		<reference ref_id="CVE-2009-4273" ref_url="https://www.suse.com/security/cve/CVE-2009-4273/" source="CVE"/>
		<description>
These are all security issues fixed in the systemtap-1.0-0.15.16 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2911/">CVE-2009-2911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2911">CVE-2009-2911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4273/">CVE-2009-4273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4273">CVE-2009-4273 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988857" comment="systemtap-1.0-0.15.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988858" comment="systemtap-client-1.0-0.15.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988859" comment="systemtap-server-1.0-0.15.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215758" version="1" class="patch">
	<metadata>
		<title>tar-1.20-23.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2001-1267" ref_url="https://www.suse.com/security/cve/CVE-2001-1267/" source="CVE"/>
		<reference ref_id="CVE-2002-0399" ref_url="https://www.suse.com/security/cve/CVE-2002-0399/" source="CVE"/>
		<reference ref_id="CVE-2006-6097" ref_url="https://www.suse.com/security/cve/CVE-2006-6097/" source="CVE"/>
		<description>
These are all security issues fixed in the tar-1.20-23.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2001-1267/">CVE-2001-1267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2001-1267">CVE-2001-1267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2002-0399/">CVE-2002-0399 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2002-0399">CVE-2002-0399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6097/">CVE-2006-6097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6097">CVE-2006-6097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988860" comment="tar-1.20-23.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215759" version="1" class="patch">
	<metadata>
		<title>unrar-3.80.2-2.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-3726" ref_url="https://www.suse.com/security/cve/CVE-2007-3726/" source="CVE"/>
		<description>
These are all security issues fixed in the unrar-3.80.2-2.8 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3726/">CVE-2007-3726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3726">CVE-2007-3726 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988861" comment="unrar-3.80.2-2.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215760" version="1" class="patch">
	<metadata>
		<title>unzip-5.52-142.23.43 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2005-2475" ref_url="https://www.suse.com/security/cve/CVE-2005-2475/" source="CVE"/>
		<description>
These are all security issues fixed in the unzip-5.52-142.23.43 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-2475/">CVE-2005-2475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-2475">CVE-2005-2475 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988862" comment="unzip-5.52-142.23.43 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215761" version="1" class="patch">
	<metadata>
		<title>w3m-0.5.2-132.1.37 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-6772" ref_url="https://www.suse.com/security/cve/CVE-2006-6772/" source="CVE"/>
		<description>
These are all security issues fixed in the w3m-0.5.2-132.1.37 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6772/">CVE-2006-6772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6772">CVE-2006-6772 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988863" comment="w3m-0.5.2-132.1.37 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215762" version="1" class="patch">
	<metadata>
		<title>wget-1.11.4-1.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-6719" ref_url="https://www.suse.com/security/cve/CVE-2006-6719/" source="CVE"/>
		<description>
These are all security issues fixed in the wget-1.11.4-1.15.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6719/">CVE-2006-6719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6719">CVE-2006-6719 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988864" comment="wget-1.11.4-1.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215763" version="1" class="patch">
	<metadata>
		<title>wireshark-1.0.5-1.34.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-1932" ref_url="https://www.suse.com/security/cve/CVE-2006-1932/" source="CVE"/>
		<reference ref_id="CVE-2006-4574" ref_url="https://www.suse.com/security/cve/CVE-2006-4574/" source="CVE"/>
		<reference ref_id="CVE-2006-4805" ref_url="https://www.suse.com/security/cve/CVE-2006-4805/" source="CVE"/>
		<reference ref_id="CVE-2006-5468" ref_url="https://www.suse.com/security/cve/CVE-2006-5468/" source="CVE"/>
		<reference ref_id="CVE-2006-5469" ref_url="https://www.suse.com/security/cve/CVE-2006-5469/" source="CVE"/>
		<reference ref_id="CVE-2006-5740" ref_url="https://www.suse.com/security/cve/CVE-2006-5740/" source="CVE"/>
		<reference ref_id="CVE-2007-0456" ref_url="https://www.suse.com/security/cve/CVE-2007-0456/" source="CVE"/>
		<reference ref_id="CVE-2007-0457" ref_url="https://www.suse.com/security/cve/CVE-2007-0457/" source="CVE"/>
		<reference ref_id="CVE-2007-0458" ref_url="https://www.suse.com/security/cve/CVE-2007-0458/" source="CVE"/>
		<reference ref_id="CVE-2007-0459" ref_url="https://www.suse.com/security/cve/CVE-2007-0459/" source="CVE"/>
		<reference ref_id="CVE-2009-1210" ref_url="https://www.suse.com/security/cve/CVE-2009-1210/" source="CVE"/>
		<reference ref_id="CVE-2009-1267" ref_url="https://www.suse.com/security/cve/CVE-2009-1267/" source="CVE"/>
		<reference ref_id="CVE-2009-1268" ref_url="https://www.suse.com/security/cve/CVE-2009-1268/" source="CVE"/>
		<reference ref_id="CVE-2009-1269" ref_url="https://www.suse.com/security/cve/CVE-2009-1269/" source="CVE"/>
		<reference ref_id="CVE-2009-2560" ref_url="https://www.suse.com/security/cve/CVE-2009-2560/" source="CVE"/>
		<reference ref_id="CVE-2009-2562" ref_url="https://www.suse.com/security/cve/CVE-2009-2562/" source="CVE"/>
		<reference ref_id="CVE-2009-3549" ref_url="https://www.suse.com/security/cve/CVE-2009-3549/" source="CVE"/>
		<reference ref_id="CVE-2009-3550" ref_url="https://www.suse.com/security/cve/CVE-2009-3550/" source="CVE"/>
		<reference ref_id="CVE-2009-3829" ref_url="https://www.suse.com/security/cve/CVE-2009-3829/" source="CVE"/>
		<reference ref_id="CVE-2009-4377" ref_url="https://www.suse.com/security/cve/CVE-2009-4377/" source="CVE"/>
		<reference ref_id="CVE-2010-0304" ref_url="https://www.suse.com/security/cve/CVE-2010-0304/" source="CVE"/>
		<description>
These are all security issues fixed in the wireshark-1.0.5-1.34.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1932/">CVE-2006-1932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1932">CVE-2006-1932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4574/">CVE-2006-4574 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2006-4574">CVE-2006-4574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4805/">CVE-2006-4805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4805">CVE-2006-4805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5468/">CVE-2006-5468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5468">CVE-2006-5468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5469/">CVE-2006-5469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5469">CVE-2006-5469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5740/">CVE-2006-5740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5740">CVE-2006-5740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0456/">CVE-2007-0456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0456">CVE-2007-0456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0457/">CVE-2007-0457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0457">CVE-2007-0457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0458/">CVE-2007-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0458">CVE-2007-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0459/">CVE-2007-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0459">CVE-2007-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1210/">CVE-2009-1210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1210">CVE-2009-1210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1267/">CVE-2009-1267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1267">CVE-2009-1267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1268/">CVE-2009-1268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1268">CVE-2009-1268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1269/">CVE-2009-1269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1269">CVE-2009-1269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2560/">CVE-2009-2560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2560">CVE-2009-2560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2562/">CVE-2009-2562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2562">CVE-2009-2562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3549/">CVE-2009-3549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3549">CVE-2009-3549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3550/">CVE-2009-3550 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3550">CVE-2009-3550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3829/">CVE-2009-3829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3829">CVE-2009-3829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4377/">CVE-2009-4377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4377">CVE-2009-4377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0304/">CVE-2010-0304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0304">CVE-2010-0304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988865" comment="wireshark-1.0.5-1.34.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215764" version="1" class="patch">
	<metadata>
		<title>xdg-utils-1.0.2-36.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-0386" ref_url="https://www.suse.com/security/cve/CVE-2008-0386/" source="CVE"/>
		<description>
These are all security issues fixed in the xdg-utils-1.0.2-36.18 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0386/">CVE-2008-0386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0386">CVE-2008-0386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988866" comment="xdg-utils-1.0.2-36.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215765" version="1" class="patch">
	<metadata>
		<title>xen-4.0.0_21091_04-0.2.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-1320" ref_url="https://www.suse.com/security/cve/CVE-2007-1320/" source="CVE"/>
		<reference ref_id="CVE-2007-1321" ref_url="https://www.suse.com/security/cve/CVE-2007-1321/" source="CVE"/>
		<reference ref_id="CVE-2007-1322" ref_url="https://www.suse.com/security/cve/CVE-2007-1322/" source="CVE"/>
		<reference ref_id="CVE-2007-1323" ref_url="https://www.suse.com/security/cve/CVE-2007-1323/" source="CVE"/>
		<reference ref_id="CVE-2007-1366" ref_url="https://www.suse.com/security/cve/CVE-2007-1366/" source="CVE"/>
		<reference ref_id="CVE-2007-3919" ref_url="https://www.suse.com/security/cve/CVE-2007-3919/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.0.0_21091_04-0.2.6 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1320/">CVE-2007-1320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1320">CVE-2007-1320 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1321/">CVE-2007-1321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1321">CVE-2007-1321 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1322/">CVE-2007-1322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1322">CVE-2007-1322 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1323/">CVE-2007-1323 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1323">CVE-2007-1323 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1366/">CVE-2007-1366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1366">CVE-2007-1366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3919/">CVE-2007-3919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3919">CVE-2007-3919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988867" comment="xen-4.0.0_21091_04-0.2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988868" comment="xen-doc-html-4.0.0_21091_04-0.2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988869" comment="xen-doc-pdf-4.0.0_21091_04-0.2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988870" comment="xen-kmp-default-4.0.0_21091_04_2.6.32.12_0.7-0.2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988871" comment="xen-kmp-pae-4.0.0_21091_04_2.6.32.12_0.7-0.2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988872" comment="xen-libs-4.0.0_21091_04-0.2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988873" comment="xen-tools-4.0.0_21091_04-0.2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988874" comment="xen-tools-domU-4.0.0_21091_04-0.2.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215766" version="1" class="patch">
	<metadata>
		<title>xorg-x11-7.4-9.24.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-4568" ref_url="https://www.suse.com/security/cve/CVE-2007-4568/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-7.4-9.24.15 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4568/">CVE-2007-4568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4568">CVE-2007-4568 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988875" comment="xorg-x11-7.4-9.24.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988876" comment="xorg-x11-xauth-7.4-9.24.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215767" version="1" class="patch">
	<metadata>
		<title>xorg-x11-Xvnc-7.4-27.19.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-6101" ref_url="https://www.suse.com/security/cve/CVE-2006-6101/" source="CVE"/>
		<reference ref_id="CVE-2006-6102" ref_url="https://www.suse.com/security/cve/CVE-2006-6102/" source="CVE"/>
		<reference ref_id="CVE-2006-6103" ref_url="https://www.suse.com/security/cve/CVE-2006-6103/" source="CVE"/>
		<reference ref_id="CVE-2007-1003" ref_url="https://www.suse.com/security/cve/CVE-2007-1003/" source="CVE"/>
		<reference ref_id="CVE-2007-5760" ref_url="https://www.suse.com/security/cve/CVE-2007-5760/" source="CVE"/>
		<reference ref_id="CVE-2007-6427" ref_url="https://www.suse.com/security/cve/CVE-2007-6427/" source="CVE"/>
		<reference ref_id="CVE-2007-6428" ref_url="https://www.suse.com/security/cve/CVE-2007-6428/" source="CVE"/>
		<reference ref_id="CVE-2007-6429" ref_url="https://www.suse.com/security/cve/CVE-2007-6429/" source="CVE"/>
		<reference ref_id="CVE-2008-0006" ref_url="https://www.suse.com/security/cve/CVE-2008-0006/" source="CVE"/>
		<reference ref_id="CVE-2008-1377" ref_url="https://www.suse.com/security/cve/CVE-2008-1377/" source="CVE"/>
		<reference ref_id="CVE-2008-1379" ref_url="https://www.suse.com/security/cve/CVE-2008-1379/" source="CVE"/>
		<reference ref_id="CVE-2008-2360" ref_url="https://www.suse.com/security/cve/CVE-2008-2360/" source="CVE"/>
		<reference ref_id="CVE-2008-2361" ref_url="https://www.suse.com/security/cve/CVE-2008-2361/" source="CVE"/>
		<reference ref_id="CVE-2008-2362" ref_url="https://www.suse.com/security/cve/CVE-2008-2362/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-Xvnc-7.4-27.19.19 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6101/">CVE-2006-6101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6101">CVE-2006-6101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6102/">CVE-2006-6102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6102">CVE-2006-6102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6103/">CVE-2006-6103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6103">CVE-2006-6103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1003/">CVE-2007-1003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1003">CVE-2007-1003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5760/">CVE-2007-5760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5760">CVE-2007-5760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6427/">CVE-2007-6427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6427">CVE-2007-6427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6428/">CVE-2007-6428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6428">CVE-2007-6428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6429/">CVE-2007-6429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6429">CVE-2007-6429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0006/">CVE-2008-0006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0006">CVE-2008-0006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1377/">CVE-2008-1377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1377">CVE-2008-1377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1379/">CVE-2008-1379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1379">CVE-2008-1379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2360/">CVE-2008-2360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2360">CVE-2008-2360 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2361/">CVE-2008-2361 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2361">CVE-2008-2361 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2362/">CVE-2008-2362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2362">CVE-2008-2362 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988877" comment="xorg-x11-Xvnc-7.4-27.19.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988878" comment="xorg-x11-server-7.4-27.19.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988879" comment="xorg-x11-server-extra-7.4-27.19.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215768" version="1" class="patch">
	<metadata>
		<title>xpdf-tools-3.02-138.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-0104" ref_url="https://www.suse.com/security/cve/CVE-2007-0104/" source="CVE"/>
		<reference ref_id="CVE-2007-3387" ref_url="https://www.suse.com/security/cve/CVE-2007-3387/" source="CVE"/>
		<reference ref_id="CVE-2007-4352" ref_url="https://www.suse.com/security/cve/CVE-2007-4352/" source="CVE"/>
		<reference ref_id="CVE-2009-0146" ref_url="https://www.suse.com/security/cve/CVE-2009-0146/" source="CVE"/>
		<reference ref_id="CVE-2009-0791" ref_url="https://www.suse.com/security/cve/CVE-2009-0791/" source="CVE"/>
		<description>
These are all security issues fixed in the xpdf-tools-3.02-138.26.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0104/">CVE-2007-0104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0104">CVE-2007-0104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3387/">CVE-2007-3387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3387">CVE-2007-3387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4352/">CVE-2007-4352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4352">CVE-2007-4352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0146/">CVE-2009-0146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0146">CVE-2009-0146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0791/">CVE-2009-0791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0791">CVE-2009-0791 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988880" comment="xpdf-tools-3.02-138.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215769" version="1" class="patch">
	<metadata>
		<title>xterm-238-1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-2383" ref_url="https://www.suse.com/security/cve/CVE-2008-2383/" source="CVE"/>
		<description>
These are all security issues fixed in the xterm-238-1.16 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2383/">CVE-2008-2383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2383">CVE-2008-2383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988881" comment="xterm-238-1.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215770" version="1" class="patch">
	<metadata>
		<title>zoo-2.10-911.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-0855" ref_url="https://www.suse.com/security/cve/CVE-2006-0855/" source="CVE"/>
		<reference ref_id="CVE-2007-1669" ref_url="https://www.suse.com/security/cve/CVE-2007-1669/" source="CVE"/>
		<description>
These are all security issues fixed in the zoo-2.10-911.22 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0855/">CVE-2006-0855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0855">CVE-2006-0855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1669/">CVE-2007-1669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1669">CVE-2007-1669 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988882" comment="zoo-2.10-911.22 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215771" version="1" class="patch">
	<metadata>
		<title>LibVNCServer-0.9.1-154.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-2450" ref_url="https://www.suse.com/security/cve/CVE-2006-2450/" source="CVE"/>
		<description>
These are all security issues fixed in the LibVNCServer-0.9.1-154.24 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2450/">CVE-2006-2450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2450">CVE-2006-2450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988310" comment="LibVNCServer-0.9.1-154.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215772" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-10.0-0.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-6077" ref_url="https://www.suse.com/security/cve/CVE-2006-6077/" source="CVE"/>
		<reference ref_id="CVE-2007-0008" ref_url="https://www.suse.com/security/cve/CVE-2007-0008/" source="CVE"/>
		<reference ref_id="CVE-2007-0009" ref_url="https://www.suse.com/security/cve/CVE-2007-0009/" source="CVE"/>
		<reference ref_id="CVE-2007-0078" ref_url="https://www.suse.com/security/cve/CVE-2007-0078/" source="CVE"/>
		<reference ref_id="CVE-2007-0079" ref_url="https://www.suse.com/security/cve/CVE-2007-0079/" source="CVE"/>
		<reference ref_id="CVE-2007-0775" ref_url="https://www.suse.com/security/cve/CVE-2007-0775/" source="CVE"/>
		<reference ref_id="CVE-2007-0776" ref_url="https://www.suse.com/security/cve/CVE-2007-0776/" source="CVE"/>
		<reference ref_id="CVE-2007-0777" ref_url="https://www.suse.com/security/cve/CVE-2007-0777/" source="CVE"/>
		<reference ref_id="CVE-2007-0780" ref_url="https://www.suse.com/security/cve/CVE-2007-0780/" source="CVE"/>
		<reference ref_id="CVE-2007-0800" ref_url="https://www.suse.com/security/cve/CVE-2007-0800/" source="CVE"/>
		<reference ref_id="CVE-2007-0981" ref_url="https://www.suse.com/security/cve/CVE-2007-0981/" source="CVE"/>
		<reference ref_id="CVE-2007-0995" ref_url="https://www.suse.com/security/cve/CVE-2007-0995/" source="CVE"/>
		<reference ref_id="CVE-2007-0996" ref_url="https://www.suse.com/security/cve/CVE-2007-0996/" source="CVE"/>
		<reference ref_id="CVE-2007-3089" ref_url="https://www.suse.com/security/cve/CVE-2007-3089/" source="CVE"/>
		<reference ref_id="CVE-2007-3285" ref_url="https://www.suse.com/security/cve/CVE-2007-3285/" source="CVE"/>
		<reference ref_id="CVE-2007-3656" ref_url="https://www.suse.com/security/cve/CVE-2007-3656/" source="CVE"/>
		<reference ref_id="CVE-2007-3670" ref_url="https://www.suse.com/security/cve/CVE-2007-3670/" source="CVE"/>
		<reference ref_id="CVE-2007-3734" ref_url="https://www.suse.com/security/cve/CVE-2007-3734/" source="CVE"/>
		<reference ref_id="CVE-2007-3735" ref_url="https://www.suse.com/security/cve/CVE-2007-3735/" source="CVE"/>
		<reference ref_id="CVE-2007-3736" ref_url="https://www.suse.com/security/cve/CVE-2007-3736/" source="CVE"/>
		<reference ref_id="CVE-2007-3737" ref_url="https://www.suse.com/security/cve/CVE-2007-3737/" source="CVE"/>
		<reference ref_id="CVE-2007-3738" ref_url="https://www.suse.com/security/cve/CVE-2007-3738/" source="CVE"/>
		<reference ref_id="CVE-2008-0412" ref_url="https://www.suse.com/security/cve/CVE-2008-0412/" source="CVE"/>
		<reference ref_id="CVE-2008-0414" ref_url="https://www.suse.com/security/cve/CVE-2008-0414/" source="CVE"/>
		<reference ref_id="CVE-2008-0415" ref_url="https://www.suse.com/security/cve/CVE-2008-0415/" source="CVE"/>
		<reference ref_id="CVE-2008-0417" ref_url="https://www.suse.com/security/cve/CVE-2008-0417/" source="CVE"/>
		<reference ref_id="CVE-2008-0418" ref_url="https://www.suse.com/security/cve/CVE-2008-0418/" source="CVE"/>
		<reference ref_id="CVE-2008-0419" ref_url="https://www.suse.com/security/cve/CVE-2008-0419/" source="CVE"/>
		<reference ref_id="CVE-2008-0591" ref_url="https://www.suse.com/security/cve/CVE-2008-0591/" source="CVE"/>
		<reference ref_id="CVE-2008-0592" ref_url="https://www.suse.com/security/cve/CVE-2008-0592/" source="CVE"/>
		<reference ref_id="CVE-2008-0593" ref_url="https://www.suse.com/security/cve/CVE-2008-0593/" source="CVE"/>
		<reference ref_id="CVE-2008-0594" ref_url="https://www.suse.com/security/cve/CVE-2008-0594/" source="CVE"/>
		<reference ref_id="CVE-2008-3836" ref_url="https://www.suse.com/security/cve/CVE-2008-3836/" source="CVE"/>
		<reference ref_id="CVE-2008-4063" ref_url="https://www.suse.com/security/cve/CVE-2008-4063/" source="CVE"/>
		<reference ref_id="CVE-2008-4064" ref_url="https://www.suse.com/security/cve/CVE-2008-4064/" source="CVE"/>
		<reference ref_id="CVE-2008-4070" ref_url="https://www.suse.com/security/cve/CVE-2008-4070/" source="CVE"/>
		<reference ref_id="CVE-2008-5913" ref_url="https://www.suse.com/security/cve/CVE-2008-5913/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-0352" ref_url="https://www.suse.com/security/cve/CVE-2009-0352/" source="CVE"/>
		<reference ref_id="CVE-2009-0353" ref_url="https://www.suse.com/security/cve/CVE-2009-0353/" source="CVE"/>
		<reference ref_id="CVE-2009-0354" ref_url="https://www.suse.com/security/cve/CVE-2009-0354/" source="CVE"/>
		<reference ref_id="CVE-2009-0355" ref_url="https://www.suse.com/security/cve/CVE-2009-0355/" source="CVE"/>
		<reference ref_id="CVE-2009-0356" ref_url="https://www.suse.com/security/cve/CVE-2009-0356/" source="CVE"/>
		<reference ref_id="CVE-2009-0357" ref_url="https://www.suse.com/security/cve/CVE-2009-0357/" source="CVE"/>
		<reference ref_id="CVE-2009-0358" ref_url="https://www.suse.com/security/cve/CVE-2009-0358/" source="CVE"/>
		<reference ref_id="CVE-2009-0652" ref_url="https://www.suse.com/security/cve/CVE-2009-0652/" source="CVE"/>
		<reference ref_id="CVE-2009-0771" ref_url="https://www.suse.com/security/cve/CVE-2009-0771/" source="CVE"/>
		<reference ref_id="CVE-2009-0772" ref_url="https://www.suse.com/security/cve/CVE-2009-0772/" source="CVE"/>
		<reference ref_id="CVE-2009-0773" ref_url="https://www.suse.com/security/cve/CVE-2009-0773/" source="CVE"/>
		<reference ref_id="CVE-2009-0774" ref_url="https://www.suse.com/security/cve/CVE-2009-0774/" source="CVE"/>
		<reference ref_id="CVE-2009-0775" ref_url="https://www.suse.com/security/cve/CVE-2009-0775/" source="CVE"/>
		<reference ref_id="CVE-2009-0776" ref_url="https://www.suse.com/security/cve/CVE-2009-0776/" source="CVE"/>
		<reference ref_id="CVE-2009-0777" ref_url="https://www.suse.com/security/cve/CVE-2009-0777/" source="CVE"/>
		<reference ref_id="CVE-2009-1044" ref_url="https://www.suse.com/security/cve/CVE-2009-1044/" source="CVE"/>
		<reference ref_id="CVE-2009-1169" ref_url="https://www.suse.com/security/cve/CVE-2009-1169/" source="CVE"/>
		<reference ref_id="CVE-2009-1302" ref_url="https://www.suse.com/security/cve/CVE-2009-1302/" source="CVE"/>
		<reference ref_id="CVE-2009-1303" ref_url="https://www.suse.com/security/cve/CVE-2009-1303/" source="CVE"/>
		<reference ref_id="CVE-2009-1304" ref_url="https://www.suse.com/security/cve/CVE-2009-1304/" source="CVE"/>
		<reference ref_id="CVE-2009-1305" ref_url="https://www.suse.com/security/cve/CVE-2009-1305/" source="CVE"/>
		<reference ref_id="CVE-2009-1306" ref_url="https://www.suse.com/security/cve/CVE-2009-1306/" source="CVE"/>
		<reference ref_id="CVE-2009-1307" ref_url="https://www.suse.com/security/cve/CVE-2009-1307/" source="CVE"/>
		<reference ref_id="CVE-2009-1308" ref_url="https://www.suse.com/security/cve/CVE-2009-1308/" source="CVE"/>
		<reference ref_id="CVE-2009-1309" ref_url="https://www.suse.com/security/cve/CVE-2009-1309/" source="CVE"/>
		<reference ref_id="CVE-2009-1310" ref_url="https://www.suse.com/security/cve/CVE-2009-1310/" source="CVE"/>
		<reference ref_id="CVE-2009-1311" ref_url="https://www.suse.com/security/cve/CVE-2009-1311/" source="CVE"/>
		<reference ref_id="CVE-2009-1312" ref_url="https://www.suse.com/security/cve/CVE-2009-1312/" source="CVE"/>
		<reference ref_id="CVE-2009-1313" ref_url="https://www.suse.com/security/cve/CVE-2009-1313/" source="CVE"/>
		<reference ref_id="CVE-2009-1563" ref_url="https://www.suse.com/security/cve/CVE-2009-1563/" source="CVE"/>
		<reference ref_id="CVE-2009-1571" ref_url="https://www.suse.com/security/cve/CVE-2009-1571/" source="CVE"/>
		<reference ref_id="CVE-2009-2470" ref_url="https://www.suse.com/security/cve/CVE-2009-2470/" source="CVE"/>
		<reference ref_id="CVE-2009-2654" ref_url="https://www.suse.com/security/cve/CVE-2009-2654/" source="CVE"/>
		<reference ref_id="CVE-2009-3069" ref_url="https://www.suse.com/security/cve/CVE-2009-3069/" source="CVE"/>
		<reference ref_id="CVE-2009-3070" ref_url="https://www.suse.com/security/cve/CVE-2009-3070/" source="CVE"/>
		<reference ref_id="CVE-2009-3071" ref_url="https://www.suse.com/security/cve/CVE-2009-3071/" source="CVE"/>
		<reference ref_id="CVE-2009-3072" ref_url="https://www.suse.com/security/cve/CVE-2009-3072/" source="CVE"/>
		<reference ref_id="CVE-2009-3073" ref_url="https://www.suse.com/security/cve/CVE-2009-3073/" source="CVE"/>
		<reference ref_id="CVE-2009-3074" ref_url="https://www.suse.com/security/cve/CVE-2009-3074/" source="CVE"/>
		<reference ref_id="CVE-2009-3075" ref_url="https://www.suse.com/security/cve/CVE-2009-3075/" source="CVE"/>
		<reference ref_id="CVE-2009-3077" ref_url="https://www.suse.com/security/cve/CVE-2009-3077/" source="CVE"/>
		<reference ref_id="CVE-2009-3078" ref_url="https://www.suse.com/security/cve/CVE-2009-3078/" source="CVE"/>
		<reference ref_id="CVE-2009-3079" ref_url="https://www.suse.com/security/cve/CVE-2009-3079/" source="CVE"/>
		<reference ref_id="CVE-2009-3274" ref_url="https://www.suse.com/security/cve/CVE-2009-3274/" source="CVE"/>
		<reference ref_id="CVE-2009-3370" ref_url="https://www.suse.com/security/cve/CVE-2009-3370/" source="CVE"/>
		<reference ref_id="CVE-2009-3371" ref_url="https://www.suse.com/security/cve/CVE-2009-3371/" source="CVE"/>
		<reference ref_id="CVE-2009-3372" ref_url="https://www.suse.com/security/cve/CVE-2009-3372/" source="CVE"/>
		<reference ref_id="CVE-2009-3373" ref_url="https://www.suse.com/security/cve/CVE-2009-3373/" source="CVE"/>
		<reference ref_id="CVE-2009-3374" ref_url="https://www.suse.com/security/cve/CVE-2009-3374/" source="CVE"/>
		<reference ref_id="CVE-2009-3375" ref_url="https://www.suse.com/security/cve/CVE-2009-3375/" source="CVE"/>
		<reference ref_id="CVE-2009-3376" ref_url="https://www.suse.com/security/cve/CVE-2009-3376/" source="CVE"/>
		<reference ref_id="CVE-2009-3377" ref_url="https://www.suse.com/security/cve/CVE-2009-3377/" source="CVE"/>
		<reference ref_id="CVE-2009-3378" ref_url="https://www.suse.com/security/cve/CVE-2009-3378/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2009-3380" ref_url="https://www.suse.com/security/cve/CVE-2009-3380/" source="CVE"/>
		<reference ref_id="CVE-2009-3381" ref_url="https://www.suse.com/security/cve/CVE-2009-3381/" source="CVE"/>
		<reference ref_id="CVE-2009-3383" ref_url="https://www.suse.com/security/cve/CVE-2009-3383/" source="CVE"/>
		<reference ref_id="CVE-2009-3388" ref_url="https://www.suse.com/security/cve/CVE-2009-3388/" source="CVE"/>
		<reference ref_id="CVE-2009-3389" ref_url="https://www.suse.com/security/cve/CVE-2009-3389/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-3979" ref_url="https://www.suse.com/security/cve/CVE-2009-3979/" source="CVE"/>
		<reference ref_id="CVE-2009-3980" ref_url="https://www.suse.com/security/cve/CVE-2009-3980/" source="CVE"/>
		<reference ref_id="CVE-2009-3982" ref_url="https://www.suse.com/security/cve/CVE-2009-3982/" source="CVE"/>
		<reference ref_id="CVE-2009-3983" ref_url="https://www.suse.com/security/cve/CVE-2009-3983/" source="CVE"/>
		<reference ref_id="CVE-2009-3984" ref_url="https://www.suse.com/security/cve/CVE-2009-3984/" source="CVE"/>
		<reference ref_id="CVE-2009-3985" ref_url="https://www.suse.com/security/cve/CVE-2009-3985/" source="CVE"/>
		<reference ref_id="CVE-2009-3988" ref_url="https://www.suse.com/security/cve/CVE-2009-3988/" source="CVE"/>
		<reference ref_id="CVE-2010-0159" ref_url="https://www.suse.com/security/cve/CVE-2010-0159/" source="CVE"/>
		<reference ref_id="CVE-2010-0160" ref_url="https://www.suse.com/security/cve/CVE-2010-0160/" source="CVE"/>
		<reference ref_id="CVE-2010-0162" ref_url="https://www.suse.com/security/cve/CVE-2010-0162/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0175" ref_url="https://www.suse.com/security/cve/CVE-2010-0175/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0179" ref_url="https://www.suse.com/security/cve/CVE-2010-0179/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<reference ref_id="CVE-2010-0183" ref_url="https://www.suse.com/security/cve/CVE-2010-0183/" source="CVE"/>
		<reference ref_id="CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654/" source="CVE"/>
		<reference ref_id="CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121/" source="CVE"/>
		<reference ref_id="CVE-2010-1125" ref_url="https://www.suse.com/security/cve/CVE-2010-1125/" source="CVE"/>
		<reference ref_id="CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196/" source="CVE"/>
		<reference ref_id="CVE-2010-1197" ref_url="https://www.suse.com/security/cve/CVE-2010-1197/" source="CVE"/>
		<reference ref_id="CVE-2010-1198" ref_url="https://www.suse.com/security/cve/CVE-2010-1198/" source="CVE"/>
		<reference ref_id="CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199/" source="CVE"/>
		<reference ref_id="CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200/" source="CVE"/>
		<reference ref_id="CVE-2010-1201" ref_url="https://www.suse.com/security/cve/CVE-2010-1201/" source="CVE"/>
		<reference ref_id="CVE-2010-1202" ref_url="https://www.suse.com/security/cve/CVE-2010-1202/" source="CVE"/>
		<reference ref_id="CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-1206" ref_url="https://www.suse.com/security/cve/CVE-2010-1206/" source="CVE"/>
		<reference ref_id="CVE-2010-1208" ref_url="https://www.suse.com/security/cve/CVE-2010-1208/" source="CVE"/>
		<reference ref_id="CVE-2010-1209" ref_url="https://www.suse.com/security/cve/CVE-2010-1209/" source="CVE"/>
		<reference ref_id="CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211/" source="CVE"/>
		<reference ref_id="CVE-2010-1212" ref_url="https://www.suse.com/security/cve/CVE-2010-1212/" source="CVE"/>
		<reference ref_id="CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213/" source="CVE"/>
		<reference ref_id="CVE-2010-1214" ref_url="https://www.suse.com/security/cve/CVE-2010-1214/" source="CVE"/>
		<reference ref_id="CVE-2010-1585" ref_url="https://www.suse.com/security/cve/CVE-2010-1585/" source="CVE"/>
		<reference ref_id="CVE-2010-2751" ref_url="https://www.suse.com/security/cve/CVE-2010-2751/" source="CVE"/>
		<reference ref_id="CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752/" source="CVE"/>
		<reference ref_id="CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753/" source="CVE"/>
		<reference ref_id="CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754/" source="CVE"/>
		<reference ref_id="CVE-2010-2755" ref_url="https://www.suse.com/security/cve/CVE-2010-2755/" source="CVE"/>
		<reference ref_id="CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760/" source="CVE"/>
		<reference ref_id="CVE-2010-2762" ref_url="https://www.suse.com/security/cve/CVE-2010-2762/" source="CVE"/>
		<reference ref_id="CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764/" source="CVE"/>
		<reference ref_id="CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765/" source="CVE"/>
		<reference ref_id="CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766/" source="CVE"/>
		<reference ref_id="CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767/" source="CVE"/>
		<reference ref_id="CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768/" source="CVE"/>
		<reference ref_id="CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769/" source="CVE"/>
		<reference ref_id="CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166/" source="CVE"/>
		<reference ref_id="CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167/" source="CVE"/>
		<reference ref_id="CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168/" source="CVE"/>
		<reference ref_id="CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3173" ref_url="https://www.suse.com/security/cve/CVE-2010-3173/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<reference ref_id="CVE-2010-3766" ref_url="https://www.suse.com/security/cve/CVE-2010-3766/" source="CVE"/>
		<reference ref_id="CVE-2010-3767" ref_url="https://www.suse.com/security/cve/CVE-2010-3767/" source="CVE"/>
		<reference ref_id="CVE-2010-3768" ref_url="https://www.suse.com/security/cve/CVE-2010-3768/" source="CVE"/>
		<reference ref_id="CVE-2010-3769" ref_url="https://www.suse.com/security/cve/CVE-2010-3769/" source="CVE"/>
		<reference ref_id="CVE-2010-3770" ref_url="https://www.suse.com/security/cve/CVE-2010-3770/" source="CVE"/>
		<reference ref_id="CVE-2010-3771" ref_url="https://www.suse.com/security/cve/CVE-2010-3771/" source="CVE"/>
		<reference ref_id="CVE-2010-3772" ref_url="https://www.suse.com/security/cve/CVE-2010-3772/" source="CVE"/>
		<reference ref_id="CVE-2010-3773" ref_url="https://www.suse.com/security/cve/CVE-2010-3773/" source="CVE"/>
		<reference ref_id="CVE-2010-3775" ref_url="https://www.suse.com/security/cve/CVE-2010-3775/" source="CVE"/>
		<reference ref_id="CVE-2010-3776" ref_url="https://www.suse.com/security/cve/CVE-2010-3776/" source="CVE"/>
		<reference ref_id="CVE-2010-3777" ref_url="https://www.suse.com/security/cve/CVE-2010-3777/" source="CVE"/>
		<reference ref_id="CVE-2010-3778" ref_url="https://www.suse.com/security/cve/CVE-2010-3778/" source="CVE"/>
		<reference ref_id="CVE-2011-0051" ref_url="https://www.suse.com/security/cve/CVE-2011-0051/" source="CVE"/>
		<reference ref_id="CVE-2011-0053" ref_url="https://www.suse.com/security/cve/CVE-2011-0053/" source="CVE"/>
		<reference ref_id="CVE-2011-0054" ref_url="https://www.suse.com/security/cve/CVE-2011-0054/" source="CVE"/>
		<reference ref_id="CVE-2011-0055" ref_url="https://www.suse.com/security/cve/CVE-2011-0055/" source="CVE"/>
		<reference ref_id="CVE-2011-0056" ref_url="https://www.suse.com/security/cve/CVE-2011-0056/" source="CVE"/>
		<reference ref_id="CVE-2011-0057" ref_url="https://www.suse.com/security/cve/CVE-2011-0057/" source="CVE"/>
		<reference ref_id="CVE-2011-0059" ref_url="https://www.suse.com/security/cve/CVE-2011-0059/" source="CVE"/>
		<reference ref_id="CVE-2011-0061" ref_url="https://www.suse.com/security/cve/CVE-2011-0061/" source="CVE"/>
		<reference ref_id="CVE-2011-0062" ref_url="https://www.suse.com/security/cve/CVE-2011-0062/" source="CVE"/>
		<reference ref_id="CVE-2011-0065" ref_url="https://www.suse.com/security/cve/CVE-2011-0065/" source="CVE"/>
		<reference ref_id="CVE-2011-0066" ref_url="https://www.suse.com/security/cve/CVE-2011-0066/" source="CVE"/>
		<reference ref_id="CVE-2011-0067" ref_url="https://www.suse.com/security/cve/CVE-2011-0067/" source="CVE"/>
		<reference ref_id="CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069/" source="CVE"/>
		<reference ref_id="CVE-2011-0070" ref_url="https://www.suse.com/security/cve/CVE-2011-0070/" source="CVE"/>
		<reference ref_id="CVE-2011-0072" ref_url="https://www.suse.com/security/cve/CVE-2011-0072/" source="CVE"/>
		<reference ref_id="CVE-2011-0073" ref_url="https://www.suse.com/security/cve/CVE-2011-0073/" source="CVE"/>
		<reference ref_id="CVE-2011-0074" ref_url="https://www.suse.com/security/cve/CVE-2011-0074/" source="CVE"/>
		<reference ref_id="CVE-2011-0075" ref_url="https://www.suse.com/security/cve/CVE-2011-0075/" source="CVE"/>
		<reference ref_id="CVE-2011-0077" ref_url="https://www.suse.com/security/cve/CVE-2011-0077/" source="CVE"/>
		<reference ref_id="CVE-2011-0078" ref_url="https://www.suse.com/security/cve/CVE-2011-0078/" source="CVE"/>
		<reference ref_id="CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080/" source="CVE"/>
		<reference ref_id="CVE-2011-0081" ref_url="https://www.suse.com/security/cve/CVE-2011-0081/" source="CVE"/>
		<reference ref_id="CVE-2011-0083" ref_url="https://www.suse.com/security/cve/CVE-2011-0083/" source="CVE"/>
		<reference ref_id="CVE-2011-0084" ref_url="https://www.suse.com/security/cve/CVE-2011-0084/" source="CVE"/>
		<reference ref_id="CVE-2011-0085" ref_url="https://www.suse.com/security/cve/CVE-2011-0085/" source="CVE"/>
		<reference ref_id="CVE-2011-1202" ref_url="https://www.suse.com/security/cve/CVE-2011-1202/" source="CVE"/>
		<reference ref_id="CVE-2011-2362" ref_url="https://www.suse.com/security/cve/CVE-2011-2362/" source="CVE"/>
		<reference ref_id="CVE-2011-2363" ref_url="https://www.suse.com/security/cve/CVE-2011-2363/" source="CVE"/>
		<reference ref_id="CVE-2011-2364" ref_url="https://www.suse.com/security/cve/CVE-2011-2364/" source="CVE"/>
		<reference ref_id="CVE-2011-2365" ref_url="https://www.suse.com/security/cve/CVE-2011-2365/" source="CVE"/>
		<reference ref_id="CVE-2011-2371" ref_url="https://www.suse.com/security/cve/CVE-2011-2371/" source="CVE"/>
		<reference ref_id="CVE-2011-2372" ref_url="https://www.suse.com/security/cve/CVE-2011-2372/" source="CVE"/>
		<reference ref_id="CVE-2011-2373" ref_url="https://www.suse.com/security/cve/CVE-2011-2373/" source="CVE"/>
		<reference ref_id="CVE-2011-2374" ref_url="https://www.suse.com/security/cve/CVE-2011-2374/" source="CVE"/>
		<reference ref_id="CVE-2011-2376" ref_url="https://www.suse.com/security/cve/CVE-2011-2376/" source="CVE"/>
		<reference ref_id="CVE-2011-2377" ref_url="https://www.suse.com/security/cve/CVE-2011-2377/" source="CVE"/>
		<reference ref_id="CVE-2011-2378" ref_url="https://www.suse.com/security/cve/CVE-2011-2378/" source="CVE"/>
		<reference ref_id="CVE-2011-2980" ref_url="https://www.suse.com/security/cve/CVE-2011-2980/" source="CVE"/>
		<reference ref_id="CVE-2011-2981" ref_url="https://www.suse.com/security/cve/CVE-2011-2981/" source="CVE"/>
		<reference ref_id="CVE-2011-2982" ref_url="https://www.suse.com/security/cve/CVE-2011-2982/" source="CVE"/>
		<reference ref_id="CVE-2011-2983" ref_url="https://www.suse.com/security/cve/CVE-2011-2983/" source="CVE"/>
		<reference ref_id="CVE-2011-2995" ref_url="https://www.suse.com/security/cve/CVE-2011-2995/" source="CVE"/>
		<reference ref_id="CVE-2011-2996" ref_url="https://www.suse.com/security/cve/CVE-2011-2996/" source="CVE"/>
		<reference ref_id="CVE-2011-2997" ref_url="https://www.suse.com/security/cve/CVE-2011-2997/" source="CVE"/>
		<reference ref_id="CVE-2011-3000" ref_url="https://www.suse.com/security/cve/CVE-2011-3000/" source="CVE"/>
		<reference ref_id="CVE-2011-3001" ref_url="https://www.suse.com/security/cve/CVE-2011-3001/" source="CVE"/>
		<reference ref_id="CVE-2011-3002" ref_url="https://www.suse.com/security/cve/CVE-2011-3002/" source="CVE"/>
		<reference ref_id="CVE-2011-3003" ref_url="https://www.suse.com/security/cve/CVE-2011-3003/" source="CVE"/>
		<reference ref_id="CVE-2011-3004" ref_url="https://www.suse.com/security/cve/CVE-2011-3004/" source="CVE"/>
		<reference ref_id="CVE-2011-3005" ref_url="https://www.suse.com/security/cve/CVE-2011-3005/" source="CVE"/>
		<reference ref_id="CVE-2011-3232" ref_url="https://www.suse.com/security/cve/CVE-2011-3232/" source="CVE"/>
		<reference ref_id="CVE-2011-3658" ref_url="https://www.suse.com/security/cve/CVE-2011-3658/" source="CVE"/>
		<reference ref_id="CVE-2011-3660" ref_url="https://www.suse.com/security/cve/CVE-2011-3660/" source="CVE"/>
		<reference ref_id="CVE-2011-3661" ref_url="https://www.suse.com/security/cve/CVE-2011-3661/" source="CVE"/>
		<reference ref_id="CVE-2011-3663" ref_url="https://www.suse.com/security/cve/CVE-2011-3663/" source="CVE"/>
		<reference ref_id="CVE-2011-3665" ref_url="https://www.suse.com/security/cve/CVE-2011-3665/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-10.0-0.3.2 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6077/">CVE-2006-6077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6077">CVE-2006-6077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0008/">CVE-2007-0008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0008">CVE-2007-0008 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0009/">CVE-2007-0009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0009">CVE-2007-0009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0078/">CVE-2007-0078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0078">CVE-2007-0078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0079/">CVE-2007-0079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0079">CVE-2007-0079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0775/">CVE-2007-0775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0775">CVE-2007-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0776/">CVE-2007-0776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0776">CVE-2007-0776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0777/">CVE-2007-0777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0777">CVE-2007-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0780/">CVE-2007-0780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0780">CVE-2007-0780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0800/">CVE-2007-0800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0800">CVE-2007-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0981/">CVE-2007-0981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0981">CVE-2007-0981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0995/">CVE-2007-0995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0995">CVE-2007-0995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0996/">CVE-2007-0996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0996">CVE-2007-0996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3089/">CVE-2007-3089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3089">CVE-2007-3089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3285/">CVE-2007-3285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3285">CVE-2007-3285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3656/">CVE-2007-3656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3656">CVE-2007-3656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3670/">CVE-2007-3670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3670">CVE-2007-3670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3734/">CVE-2007-3734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3734">CVE-2007-3734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3735/">CVE-2007-3735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3735">CVE-2007-3735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3736/">CVE-2007-3736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3736">CVE-2007-3736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3737/">CVE-2007-3737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3737">CVE-2007-3737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3738/">CVE-2007-3738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3738">CVE-2007-3738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0412/">CVE-2008-0412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0412">CVE-2008-0412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0414/">CVE-2008-0414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0414">CVE-2008-0414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0415/">CVE-2008-0415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0415">CVE-2008-0415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0417/">CVE-2008-0417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0417">CVE-2008-0417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0418/">CVE-2008-0418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0418">CVE-2008-0418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0419/">CVE-2008-0419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0419">CVE-2008-0419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0591/">CVE-2008-0591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0591">CVE-2008-0591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0592/">CVE-2008-0592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0592">CVE-2008-0592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0593/">CVE-2008-0593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0593">CVE-2008-0593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0594/">CVE-2008-0594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0594">CVE-2008-0594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3836/">CVE-2008-3836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3836">CVE-2008-3836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4063/">CVE-2008-4063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4063">CVE-2008-4063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4064/">CVE-2008-4064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4064">CVE-2008-4064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4070/">CVE-2008-4070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4070">CVE-2008-4070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5913/">CVE-2008-5913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5913">CVE-2008-5913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0040">CVE-2009-0040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0352/">CVE-2009-0352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0352">CVE-2009-0352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0353/">CVE-2009-0353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0353">CVE-2009-0353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0354/">CVE-2009-0354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0354">CVE-2009-0354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0355/">CVE-2009-0355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0355">CVE-2009-0355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0356/">CVE-2009-0356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0356">CVE-2009-0356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0357/">CVE-2009-0357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0357">CVE-2009-0357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0358/">CVE-2009-0358 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0358">CVE-2009-0358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0652/">CVE-2009-0652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0652">CVE-2009-0652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0771/">CVE-2009-0771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0771">CVE-2009-0771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0772/">CVE-2009-0772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0772">CVE-2009-0772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0773/">CVE-2009-0773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0773">CVE-2009-0773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0774/">CVE-2009-0774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0774">CVE-2009-0774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0775/">CVE-2009-0775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0775">CVE-2009-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0776/">CVE-2009-0776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0776">CVE-2009-0776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0777/">CVE-2009-0777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0777">CVE-2009-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1044/">CVE-2009-1044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1044">CVE-2009-1044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1169/">CVE-2009-1169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1169">CVE-2009-1169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1302/">CVE-2009-1302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1302">CVE-2009-1302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1303/">CVE-2009-1303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1303">CVE-2009-1303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1304/">CVE-2009-1304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1304">CVE-2009-1304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1305/">CVE-2009-1305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1305">CVE-2009-1305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1306/">CVE-2009-1306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1306">CVE-2009-1306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1307/">CVE-2009-1307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1307">CVE-2009-1307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1308/">CVE-2009-1308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1308">CVE-2009-1308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1309/">CVE-2009-1309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1309">CVE-2009-1309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1310/">CVE-2009-1310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1310">CVE-2009-1310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1311/">CVE-2009-1311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1311">CVE-2009-1311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1312/">CVE-2009-1312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1312">CVE-2009-1312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1313/">CVE-2009-1313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1313">CVE-2009-1313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1563/">CVE-2009-1563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1563">CVE-2009-1563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1571/">CVE-2009-1571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1571">CVE-2009-1571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2470/">CVE-2009-2470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2470">CVE-2009-2470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2654/">CVE-2009-2654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2654">CVE-2009-2654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3069/">CVE-2009-3069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3069">CVE-2009-3069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3070/">CVE-2009-3070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3070">CVE-2009-3070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3071/">CVE-2009-3071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3071">CVE-2009-3071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3072/">CVE-2009-3072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3072">CVE-2009-3072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3073/">CVE-2009-3073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3073">CVE-2009-3073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3074/">CVE-2009-3074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3074">CVE-2009-3074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3075/">CVE-2009-3075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3075">CVE-2009-3075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3077/">CVE-2009-3077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3077">CVE-2009-3077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3078/">CVE-2009-3078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3078">CVE-2009-3078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3079/">CVE-2009-3079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3079">CVE-2009-3079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3274/">CVE-2009-3274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3274">CVE-2009-3274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3370/">CVE-2009-3370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3370">CVE-2009-3370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3371/">CVE-2009-3371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3371">CVE-2009-3371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3372/">CVE-2009-3372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3372">CVE-2009-3372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3373/">CVE-2009-3373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3373">CVE-2009-3373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3374/">CVE-2009-3374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3374">CVE-2009-3374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3375/">CVE-2009-3375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3375">CVE-2009-3375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3376/">CVE-2009-3376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3376">CVE-2009-3376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3377/">CVE-2009-3377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3377">CVE-2009-3377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3378/">CVE-2009-3378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3378">CVE-2009-3378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3379">CVE-2009-3379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3380/">CVE-2009-3380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3380">CVE-2009-3380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3381/">CVE-2009-3381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3381">CVE-2009-3381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3383/">CVE-2009-3383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3383">CVE-2009-3383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3388/">CVE-2009-3388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3388">CVE-2009-3388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3389/">CVE-2009-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3389">CVE-2009-3389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3979/">CVE-2009-3979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3979">CVE-2009-3979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3980/">CVE-2009-3980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3980">CVE-2009-3980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3982/">CVE-2009-3982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3982">CVE-2009-3982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3983/">CVE-2009-3983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3983">CVE-2009-3983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3984/">CVE-2009-3984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3984">CVE-2009-3984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3985/">CVE-2009-3985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3985">CVE-2009-3985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3988/">CVE-2009-3988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3988">CVE-2009-3988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0159/">CVE-2010-0159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0159">CVE-2010-0159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0160/">CVE-2010-0160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0160">CVE-2010-0160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0162/">CVE-2010-0162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0162">CVE-2010-0162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0173">CVE-2010-0173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0174">CVE-2010-0174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0175/">CVE-2010-0175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0175">CVE-2010-0175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0176">CVE-2010-0176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0177">CVE-2010-0177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0178">CVE-2010-0178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0179/">CVE-2010-0179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0179">CVE-2010-0179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0181">CVE-2010-0181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0182">CVE-2010-0182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0183/">CVE-2010-0183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0183">CVE-2010-0183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0654">CVE-2010-0654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1121">CVE-2010-1121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1125/">CVE-2010-1125 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1125">CVE-2010-1125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1196">CVE-2010-1196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1197/">CVE-2010-1197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1197">CVE-2010-1197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1198/">CVE-2010-1198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1198">CVE-2010-1198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1199">CVE-2010-1199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1200">CVE-2010-1200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1201/">CVE-2010-1201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1201">CVE-2010-1201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1202/">CVE-2010-1202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1202">CVE-2010-1202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1203">CVE-2010-1203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1205">CVE-2010-1205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1206/">CVE-2010-1206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1206">CVE-2010-1206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1208/">CVE-2010-1208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1208">CVE-2010-1208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1209/">CVE-2010-1209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1209">CVE-2010-1209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1211">CVE-2010-1211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1212/">CVE-2010-1212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1212">CVE-2010-1212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1213">CVE-2010-1213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1214/">CVE-2010-1214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1214">CVE-2010-1214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1585/">CVE-2010-1585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1585">CVE-2010-1585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2751/">CVE-2010-2751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2751">CVE-2010-2751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2752">CVE-2010-2752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2753">CVE-2010-2753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2754">CVE-2010-2754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2755/">CVE-2010-2755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2755">CVE-2010-2755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2760">CVE-2010-2760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2762/">CVE-2010-2762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2762">CVE-2010-2762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2764">CVE-2010-2764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2765">CVE-2010-2765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2766">CVE-2010-2766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2767">CVE-2010-2767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2768">CVE-2010-2768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2769">CVE-2010-2769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3166">CVE-2010-3166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3167">CVE-2010-3167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3168">CVE-2010-3168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3169">CVE-2010-3169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3170">CVE-2010-3170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3173/">CVE-2010-3173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3173">CVE-2010-3173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3174">CVE-2010-3174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3175">CVE-2010-3175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3176">CVE-2010-3176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3177">CVE-2010-3177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3178">CVE-2010-3178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3179">CVE-2010-3179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3180">CVE-2010-3180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3182">CVE-2010-3182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3183">CVE-2010-3183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3765">CVE-2010-3765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3766/">CVE-2010-3766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3766">CVE-2010-3766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3767/">CVE-2010-3767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3767">CVE-2010-3767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3768/">CVE-2010-3768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3768">CVE-2010-3768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3769/">CVE-2010-3769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3769">CVE-2010-3769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3770/">CVE-2010-3770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3770">CVE-2010-3770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3771/">CVE-2010-3771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3771">CVE-2010-3771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3772/">CVE-2010-3772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3772">CVE-2010-3772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3773/">CVE-2010-3773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3773">CVE-2010-3773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3775/">CVE-2010-3775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3775">CVE-2010-3775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3776/">CVE-2010-3776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3776">CVE-2010-3776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3777/">CVE-2010-3777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3777">CVE-2010-3777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3778/">CVE-2010-3778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3778">CVE-2010-3778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0051/">CVE-2011-0051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0051">CVE-2011-0051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0053/">CVE-2011-0053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0053">CVE-2011-0053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0054/">CVE-2011-0054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0054">CVE-2011-0054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0055/">CVE-2011-0055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0055">CVE-2011-0055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0056/">CVE-2011-0056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0056">CVE-2011-0056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0057/">CVE-2011-0057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0057">CVE-2011-0057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0059/">CVE-2011-0059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0059">CVE-2011-0059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0061/">CVE-2011-0061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0061">CVE-2011-0061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0062/">CVE-2011-0062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0062">CVE-2011-0062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0065/">CVE-2011-0065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0065">CVE-2011-0065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0066/">CVE-2011-0066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0066">CVE-2011-0066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0067/">CVE-2011-0067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0067">CVE-2011-0067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0069">CVE-2011-0069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0070/">CVE-2011-0070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0070">CVE-2011-0070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0072/">CVE-2011-0072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0072">CVE-2011-0072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0073/">CVE-2011-0073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0073">CVE-2011-0073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0074/">CVE-2011-0074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0074">CVE-2011-0074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0075/">CVE-2011-0075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0075">CVE-2011-0075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0077/">CVE-2011-0077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0077">CVE-2011-0077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0078/">CVE-2011-0078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0078">CVE-2011-0078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0080">CVE-2011-0080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0081/">CVE-2011-0081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0081">CVE-2011-0081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0083/">CVE-2011-0083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0083">CVE-2011-0083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0084/">CVE-2011-0084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0084">CVE-2011-0084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0085/">CVE-2011-0085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0085">CVE-2011-0085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1202/">CVE-2011-1202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1202">CVE-2011-1202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2362/">CVE-2011-2362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2362">CVE-2011-2362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2363/">CVE-2011-2363 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2363">CVE-2011-2363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2364/">CVE-2011-2364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2364">CVE-2011-2364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2365/">CVE-2011-2365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2365">CVE-2011-2365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2371/">CVE-2011-2371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2371">CVE-2011-2371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2372/">CVE-2011-2372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2372">CVE-2011-2372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2373/">CVE-2011-2373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2373">CVE-2011-2373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2374/">CVE-2011-2374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2374">CVE-2011-2374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2376/">CVE-2011-2376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2376">CVE-2011-2376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2377/">CVE-2011-2377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2377">CVE-2011-2377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2378/">CVE-2011-2378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2378">CVE-2011-2378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2980/">CVE-2011-2980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2980">CVE-2011-2980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2981/">CVE-2011-2981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2981">CVE-2011-2981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2982/">CVE-2011-2982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2982">CVE-2011-2982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2983/">CVE-2011-2983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2983">CVE-2011-2983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2995/">CVE-2011-2995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2995">CVE-2011-2995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2996/">CVE-2011-2996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2996">CVE-2011-2996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2997/">CVE-2011-2997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2997">CVE-2011-2997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3000/">CVE-2011-3000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3000">CVE-2011-3000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3001/">CVE-2011-3001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3001">CVE-2011-3001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3002/">CVE-2011-3002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3002">CVE-2011-3002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3003/">CVE-2011-3003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3003">CVE-2011-3003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3004/">CVE-2011-3004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3004">CVE-2011-3004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3005/">CVE-2011-3005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3005">CVE-2011-3005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3232/">CVE-2011-3232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3232">CVE-2011-3232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3658/">CVE-2011-3658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3658">CVE-2011-3658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3660/">CVE-2011-3660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3660">CVE-2011-3660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3661/">CVE-2011-3661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3661">CVE-2011-3661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3663/">CVE-2011-3663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3663">CVE-2011-3663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3665/">CVE-2011-3665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3665">CVE-2011-3665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988883" comment="MozillaFirefox-10.0-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988884" comment="MozillaFirefox-translations-10.0-0.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215773" version="1" class="patch">
	<metadata>
		<title>NetworkManager-0.7.1_git20090811-3.20.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0365" ref_url="https://www.suse.com/security/cve/CVE-2009-0365/" source="CVE"/>
		<reference ref_id="CVE-2009-0578" ref_url="https://www.suse.com/security/cve/CVE-2009-0578/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-0.7.1_git20090811-3.20.5 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0365/">CVE-2009-0365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0365">CVE-2009-0365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0578/">CVE-2009-0578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0578">CVE-2009-0578 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988885" comment="NetworkManager-0.7.1_git20090811-3.20.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988886" comment="NetworkManager-glib-0.7.1_git20090811-3.20.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215774" version="1" class="patch">
	<metadata>
		<title>NetworkManager-gnome-0.7.1-5.22.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0365" ref_url="https://www.suse.com/security/cve/CVE-2009-0365/" source="CVE"/>
		<reference ref_id="CVE-2009-0578" ref_url="https://www.suse.com/security/cve/CVE-2009-0578/" source="CVE"/>
		<reference ref_id="CVE-2009-4144" ref_url="https://www.suse.com/security/cve/CVE-2009-4144/" source="CVE"/>
		<reference ref_id="CVE-2009-4145" ref_url="https://www.suse.com/security/cve/CVE-2009-4145/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-gnome-0.7.1-5.22.28 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0365/">CVE-2009-0365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0365">CVE-2009-0365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0578/">CVE-2009-0578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0578">CVE-2009-0578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4144/">CVE-2009-4144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4144">CVE-2009-4144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4145/">CVE-2009-4145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4145">CVE-2009-4145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988887" comment="NetworkManager-gnome-0.7.1-5.22.28 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215775" version="1" class="patch">
	<metadata>
		<title>OpenEXR-1.6.1-83.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-1720" ref_url="https://www.suse.com/security/cve/CVE-2009-1720/" source="CVE"/>
		<reference ref_id="CVE-2009-1721" ref_url="https://www.suse.com/security/cve/CVE-2009-1721/" source="CVE"/>
		<description>
These are all security issues fixed in the OpenEXR-1.6.1-83.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1720/">CVE-2009-1720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1720">CVE-2009-1720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1721/">CVE-2009-1721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1721">CVE-2009-1721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988316" comment="OpenEXR-1.6.1-83.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988317" comment="OpenEXR-32bit-1.6.1-83.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988318" comment="OpenEXR-x86-1.6.1-83.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215776" version="1" class="patch">
	<metadata>
		<title>PackageKit-0.3.14-2.23.126 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<description>
These are all security issues fixed in the PackageKit-0.3.14-2.23.126 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4311">CVE-2008-4311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988888" comment="PackageKit-0.3.14-2.23.126 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988889" comment="PackageKit-lang-0.3.14-2.23.126 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988890" comment="hal-0.5.12-23.58.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988891" comment="hal-32bit-0.5.12-23.58.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988892" comment="hal-doc-0.5.12-23.58.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988893" comment="hal-x86-0.5.12-23.58.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988894" comment="libpackagekit-glib10-0.3.14-2.23.126 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215777" version="1" class="patch">
	<metadata>
		<title>PolicyKit-0.9-14.39.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-1658" ref_url="https://www.suse.com/security/cve/CVE-2008-1658/" source="CVE"/>
		<description>
These are all security issues fixed in the PolicyKit-0.9-14.39.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1658/">CVE-2008-1658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1658">CVE-2008-1658 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988895" comment="PolicyKit-0.9-14.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988896" comment="PolicyKit-32bit-0.9-14.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988897" comment="PolicyKit-doc-0.9-14.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988898" comment="PolicyKit-x86-0.9-14.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215778" version="1" class="patch">
	<metadata>
		<title>aaa_base-11-6.65.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0461" ref_url="https://www.suse.com/security/cve/CVE-2011-0461/" source="CVE"/>
		<description>
These are all security issues fixed in the aaa_base-11-6.65.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0461/">CVE-2011-0461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0461">CVE-2011-0461 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988899" comment="aaa_base-11-6.65.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215779" version="1" class="patch">
	<metadata>
		<title>acpid-1.0.6-91.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0798" ref_url="https://www.suse.com/security/cve/CVE-2009-0798/" source="CVE"/>
		<description>
These are all security issues fixed in the acpid-1.0.6-91.16.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0798/">CVE-2009-0798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0798">CVE-2009-0798 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988900" comment="acpid-1.0.6-91.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215780" version="1" class="patch">
	<metadata>
		<title>amavisd-new-2.7.0-18.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2005-1349" ref_url="https://www.suse.com/security/cve/CVE-2005-1349/" source="CVE"/>
		<description>
These are all security issues fixed in the amavisd-new-2.7.0-18.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-1349/">CVE-2005-1349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-1349">CVE-2005-1349 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988901" comment="amavisd-new-2.7.0-18.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215781" version="1" class="patch">
	<metadata>
		<title>apache2-2.2.12-1.28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-3747" ref_url="https://www.suse.com/security/cve/CVE-2006-3747/" source="CVE"/>
		<reference ref_id="CVE-2006-5752" ref_url="https://www.suse.com/security/cve/CVE-2006-5752/" source="CVE"/>
		<reference ref_id="CVE-2007-1862" ref_url="https://www.suse.com/security/cve/CVE-2007-1862/" source="CVE"/>
		<reference ref_id="CVE-2007-1863" ref_url="https://www.suse.com/security/cve/CVE-2007-1863/" source="CVE"/>
		<reference ref_id="CVE-2007-3304" ref_url="https://www.suse.com/security/cve/CVE-2007-3304/" source="CVE"/>
		<reference ref_id="CVE-2007-3847" ref_url="https://www.suse.com/security/cve/CVE-2007-3847/" source="CVE"/>
		<reference ref_id="CVE-2007-4465" ref_url="https://www.suse.com/security/cve/CVE-2007-4465/" source="CVE"/>
		<reference ref_id="CVE-2007-5000" ref_url="https://www.suse.com/security/cve/CVE-2007-5000/" source="CVE"/>
		<reference ref_id="CVE-2007-6388" ref_url="https://www.suse.com/security/cve/CVE-2007-6388/" source="CVE"/>
		<reference ref_id="CVE-2007-6420" ref_url="https://www.suse.com/security/cve/CVE-2007-6420/" source="CVE"/>
		<reference ref_id="CVE-2007-6421" ref_url="https://www.suse.com/security/cve/CVE-2007-6421/" source="CVE"/>
		<reference ref_id="CVE-2007-6422" ref_url="https://www.suse.com/security/cve/CVE-2007-6422/" source="CVE"/>
		<reference ref_id="CVE-2008-0005" ref_url="https://www.suse.com/security/cve/CVE-2008-0005/" source="CVE"/>
		<reference ref_id="CVE-2008-1678" ref_url="https://www.suse.com/security/cve/CVE-2008-1678/" source="CVE"/>
		<reference ref_id="CVE-2008-2364" ref_url="https://www.suse.com/security/cve/CVE-2008-2364/" source="CVE"/>
		<reference ref_id="CVE-2008-2939" ref_url="https://www.suse.com/security/cve/CVE-2008-2939/" source="CVE"/>
		<reference ref_id="CVE-2009-1191" ref_url="https://www.suse.com/security/cve/CVE-2009-1191/" source="CVE"/>
		<reference ref_id="CVE-2009-1195" ref_url="https://www.suse.com/security/cve/CVE-2009-1195/" source="CVE"/>
		<reference ref_id="CVE-2009-1890" ref_url="https://www.suse.com/security/cve/CVE-2009-1890/" source="CVE"/>
		<reference ref_id="CVE-2009-1891" ref_url="https://www.suse.com/security/cve/CVE-2009-1891/" source="CVE"/>
		<reference ref_id="CVE-2009-3094" ref_url="https://www.suse.com/security/cve/CVE-2009-3094/" source="CVE"/>
		<reference ref_id="CVE-2009-3095" ref_url="https://www.suse.com/security/cve/CVE-2009-3095/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-0408" ref_url="https://www.suse.com/security/cve/CVE-2010-0408/" source="CVE"/>
		<reference ref_id="CVE-2010-0434" ref_url="https://www.suse.com/security/cve/CVE-2010-0434/" source="CVE"/>
		<reference ref_id="CVE-2010-1452" ref_url="https://www.suse.com/security/cve/CVE-2010-1452/" source="CVE"/>
		<reference ref_id="CVE-2010-2068" ref_url="https://www.suse.com/security/cve/CVE-2010-2068/" source="CVE"/>
		<reference ref_id="CVE-2011-3192" ref_url="https://www.suse.com/security/cve/CVE-2011-3192/" source="CVE"/>
		<reference ref_id="CVE-2011-3348" ref_url="https://www.suse.com/security/cve/CVE-2011-3348/" source="CVE"/>
		<reference ref_id="CVE-2011-3368" ref_url="https://www.suse.com/security/cve/CVE-2011-3368/" source="CVE"/>
		<reference ref_id="CVE-2011-3607" ref_url="https://www.suse.com/security/cve/CVE-2011-3607/" source="CVE"/>
		<reference ref_id="CVE-2011-3639" ref_url="https://www.suse.com/security/cve/CVE-2011-3639/" source="CVE"/>
		<reference ref_id="CVE-2011-4317" ref_url="https://www.suse.com/security/cve/CVE-2011-4317/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-2.2.12-1.28.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3747/">CVE-2006-3747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3747">CVE-2006-3747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5752/">CVE-2006-5752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5752">CVE-2006-5752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1862/">CVE-2007-1862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1862">CVE-2007-1862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1863/">CVE-2007-1863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1863">CVE-2007-1863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3304/">CVE-2007-3304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3304">CVE-2007-3304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3847/">CVE-2007-3847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3847">CVE-2007-3847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4465/">CVE-2007-4465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4465">CVE-2007-4465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5000/">CVE-2007-5000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5000">CVE-2007-5000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6388/">CVE-2007-6388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6388">CVE-2007-6388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6420/">CVE-2007-6420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6420">CVE-2007-6420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6421/">CVE-2007-6421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6421">CVE-2007-6421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6422/">CVE-2007-6422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6422">CVE-2007-6422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0005/">CVE-2008-0005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0005">CVE-2008-0005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1678/">CVE-2008-1678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1678">CVE-2008-1678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2364/">CVE-2008-2364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2364">CVE-2008-2364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2939/">CVE-2008-2939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2939">CVE-2008-2939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1191/">CVE-2009-1191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1191">CVE-2009-1191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1195/">CVE-2009-1195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1195">CVE-2009-1195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1890/">CVE-2009-1890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1890">CVE-2009-1890 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1891/">CVE-2009-1891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1891">CVE-2009-1891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3094/">CVE-2009-3094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3094">CVE-2009-3094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3095/">CVE-2009-3095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3095">CVE-2009-3095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0408/">CVE-2010-0408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0408">CVE-2010-0408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0434/">CVE-2010-0434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0434">CVE-2010-0434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1452/">CVE-2010-1452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1452">CVE-2010-1452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2068/">CVE-2010-2068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2068">CVE-2010-2068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3192/">CVE-2011-3192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3192">CVE-2011-3192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3348/">CVE-2011-3348 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3348">CVE-2011-3348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3368/">CVE-2011-3368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3368">CVE-2011-3368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3607/">CVE-2011-3607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3607">CVE-2011-3607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3639/">CVE-2011-3639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3639">CVE-2011-3639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4317/">CVE-2011-4317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4317">CVE-2011-4317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988902" comment="apache2-2.2.12-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988903" comment="apache2-doc-2.2.12-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988904" comment="apache2-example-pages-2.2.12-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988905" comment="apache2-prefork-2.2.12-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988906" comment="apache2-utils-2.2.12-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988907" comment="apache2-worker-2.2.12-1.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215782" version="1" class="patch">
	<metadata>
		<title>apache2-mod_jk-1.2.26-1.30.110 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-0774" ref_url="https://www.suse.com/security/cve/CVE-2007-0774/" source="CVE"/>
		<reference ref_id="CVE-2008-5519" ref_url="https://www.suse.com/security/cve/CVE-2008-5519/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_jk-1.2.26-1.30.110 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0774/">CVE-2007-0774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0774">CVE-2007-0774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5519/">CVE-2008-5519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5519">CVE-2008-5519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988908" comment="apache2-mod_jk-1.2.26-1.30.110 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215783" version="1" class="patch">
	<metadata>
		<title>apache2-mod_perl-2.0.4-40.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-1349" ref_url="https://www.suse.com/security/cve/CVE-2007-1349/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_perl-2.0.4-40.19 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1349/">CVE-2007-1349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1349">CVE-2007-1349 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988338" comment="apache2-mod_perl-2.0.4-40.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215784" version="1" class="patch">
	<metadata>
		<title>apache2-mod_php5-5.2.14-0.7.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-4783" ref_url="https://www.suse.com/security/cve/CVE-2007-4783/" source="CVE"/>
		<reference ref_id="CVE-2007-4840" ref_url="https://www.suse.com/security/cve/CVE-2007-4840/" source="CVE"/>
		<reference ref_id="CVE-2007-4887" ref_url="https://www.suse.com/security/cve/CVE-2007-4887/" source="CVE"/>
		<reference ref_id="CVE-2008-0599" ref_url="https://www.suse.com/security/cve/CVE-2008-0599/" source="CVE"/>
		<reference ref_id="CVE-2008-2829" ref_url="https://www.suse.com/security/cve/CVE-2008-2829/" source="CVE"/>
		<reference ref_id="CVE-2008-5498" ref_url="https://www.suse.com/security/cve/CVE-2008-5498/" source="CVE"/>
		<reference ref_id="CVE-2008-5557" ref_url="https://www.suse.com/security/cve/CVE-2008-5557/" source="CVE"/>
		<reference ref_id="CVE-2008-5624" ref_url="https://www.suse.com/security/cve/CVE-2008-5624/" source="CVE"/>
		<reference ref_id="CVE-2008-5625" ref_url="https://www.suse.com/security/cve/CVE-2008-5625/" source="CVE"/>
		<reference ref_id="CVE-2008-5814" ref_url="https://www.suse.com/security/cve/CVE-2008-5814/" source="CVE"/>
		<reference ref_id="CVE-2009-0754" ref_url="https://www.suse.com/security/cve/CVE-2009-0754/" source="CVE"/>
		<reference ref_id="CVE-2009-1271" ref_url="https://www.suse.com/security/cve/CVE-2009-1271/" source="CVE"/>
		<reference ref_id="CVE-2009-1272" ref_url="https://www.suse.com/security/cve/CVE-2009-1272/" source="CVE"/>
		<reference ref_id="CVE-2009-2626" ref_url="https://www.suse.com/security/cve/CVE-2009-2626/" source="CVE"/>
		<reference ref_id="CVE-2009-2687" ref_url="https://www.suse.com/security/cve/CVE-2009-2687/" source="CVE"/>
		<reference ref_id="CVE-2009-3291" ref_url="https://www.suse.com/security/cve/CVE-2009-3291/" source="CVE"/>
		<reference ref_id="CVE-2009-3292" ref_url="https://www.suse.com/security/cve/CVE-2009-3292/" source="CVE"/>
		<reference ref_id="CVE-2009-3293" ref_url="https://www.suse.com/security/cve/CVE-2009-3293/" source="CVE"/>
		<reference ref_id="CVE-2009-3546" ref_url="https://www.suse.com/security/cve/CVE-2009-3546/" source="CVE"/>
		<reference ref_id="CVE-2009-4017" ref_url="https://www.suse.com/security/cve/CVE-2009-4017/" source="CVE"/>
		<reference ref_id="CVE-2009-4142" ref_url="https://www.suse.com/security/cve/CVE-2009-4142/" source="CVE"/>
		<reference ref_id="CVE-2010-0397" ref_url="https://www.suse.com/security/cve/CVE-2010-0397/" source="CVE"/>
		<reference ref_id="CVE-2010-2225" ref_url="https://www.suse.com/security/cve/CVE-2010-2225/" source="CVE"/>
		<reference ref_id="CVE-2010-3709" ref_url="https://www.suse.com/security/cve/CVE-2010-3709/" source="CVE"/>
		<reference ref_id="CVE-2010-3710" ref_url="https://www.suse.com/security/cve/CVE-2010-3710/" source="CVE"/>
		<reference ref_id="CVE-2010-3870" ref_url="https://www.suse.com/security/cve/CVE-2010-3870/" source="CVE"/>
		<reference ref_id="CVE-2010-4150" ref_url="https://www.suse.com/security/cve/CVE-2010-4150/" source="CVE"/>
		<reference ref_id="CVE-2010-4645" ref_url="https://www.suse.com/security/cve/CVE-2010-4645/" source="CVE"/>
		<reference ref_id="CVE-2010-4697" ref_url="https://www.suse.com/security/cve/CVE-2010-4697/" source="CVE"/>
		<reference ref_id="CVE-2010-4698" ref_url="https://www.suse.com/security/cve/CVE-2010-4698/" source="CVE"/>
		<reference ref_id="CVE-2010-4699" ref_url="https://www.suse.com/security/cve/CVE-2010-4699/" source="CVE"/>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<reference ref_id="CVE-2011-0708" ref_url="https://www.suse.com/security/cve/CVE-2011-0708/" source="CVE"/>
		<reference ref_id="CVE-2011-0752" ref_url="https://www.suse.com/security/cve/CVE-2011-0752/" source="CVE"/>
		<reference ref_id="CVE-2011-0753" ref_url="https://www.suse.com/security/cve/CVE-2011-0753/" source="CVE"/>
		<reference ref_id="CVE-2011-0755" ref_url="https://www.suse.com/security/cve/CVE-2011-0755/" source="CVE"/>
		<reference ref_id="CVE-2011-1092" ref_url="https://www.suse.com/security/cve/CVE-2011-1092/" source="CVE"/>
		<reference ref_id="CVE-2011-1148" ref_url="https://www.suse.com/security/cve/CVE-2011-1148/" source="CVE"/>
		<reference ref_id="CVE-2011-1464" ref_url="https://www.suse.com/security/cve/CVE-2011-1464/" source="CVE"/>
		<reference ref_id="CVE-2011-1469" ref_url="https://www.suse.com/security/cve/CVE-2011-1469/" source="CVE"/>
		<reference ref_id="CVE-2011-1470" ref_url="https://www.suse.com/security/cve/CVE-2011-1470/" source="CVE"/>
		<reference ref_id="CVE-2011-1471" ref_url="https://www.suse.com/security/cve/CVE-2011-1471/" source="CVE"/>
		<reference ref_id="CVE-2011-1938" ref_url="https://www.suse.com/security/cve/CVE-2011-1938/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_php5-5.2.14-0.7.24.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4783/">CVE-2007-4783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4783">CVE-2007-4783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4840/">CVE-2007-4840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4840">CVE-2007-4840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4887/">CVE-2007-4887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4887">CVE-2007-4887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0599/">CVE-2008-0599 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2008-0599">CVE-2008-0599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2829/">CVE-2008-2829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2829">CVE-2008-2829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5498/">CVE-2008-5498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5498">CVE-2008-5498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5557/">CVE-2008-5557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5557">CVE-2008-5557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5624/">CVE-2008-5624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5624">CVE-2008-5624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5625/">CVE-2008-5625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5625">CVE-2008-5625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5814/">CVE-2008-5814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5814">CVE-2008-5814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0754/">CVE-2009-0754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0754">CVE-2009-0754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1271/">CVE-2009-1271 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1271">CVE-2009-1271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1272/">CVE-2009-1272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1272">CVE-2009-1272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2626/">CVE-2009-2626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2626">CVE-2009-2626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2687/">CVE-2009-2687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2687">CVE-2009-2687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3291/">CVE-2009-3291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3291">CVE-2009-3291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3292/">CVE-2009-3292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3292">CVE-2009-3292 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3293/">CVE-2009-3293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3293">CVE-2009-3293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3546/">CVE-2009-3546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3546">CVE-2009-3546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4017/">CVE-2009-4017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4017">CVE-2009-4017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4142/">CVE-2009-4142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4142">CVE-2009-4142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0397/">CVE-2010-0397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0397">CVE-2010-0397 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2225/">CVE-2010-2225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2225">CVE-2010-2225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3709/">CVE-2010-3709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3709">CVE-2010-3709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3710/">CVE-2010-3710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3710">CVE-2010-3710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3870/">CVE-2010-3870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3870">CVE-2010-3870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4150/">CVE-2010-4150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4150">CVE-2010-4150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4645/">CVE-2010-4645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4645">CVE-2010-4645 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4697/">CVE-2010-4697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4697">CVE-2010-4697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4698/">CVE-2010-4698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4698">CVE-2010-4698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4699/">CVE-2010-4699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4699">CVE-2010-4699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0421">CVE-2011-0421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0708/">CVE-2011-0708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0708">CVE-2011-0708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0752/">CVE-2011-0752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0752">CVE-2011-0752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0753/">CVE-2011-0753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0753">CVE-2011-0753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0755/">CVE-2011-0755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0755">CVE-2011-0755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1092/">CVE-2011-1092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1092">CVE-2011-1092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1148/">CVE-2011-1148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1148">CVE-2011-1148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1464/">CVE-2011-1464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1464">CVE-2011-1464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1469/">CVE-2011-1469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1469">CVE-2011-1469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1470/">CVE-2011-1470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1470">CVE-2011-1470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1471/">CVE-2011-1471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1471">CVE-2011-1471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1938/">CVE-2011-1938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1938">CVE-2011-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988909" comment="apache2-mod_php5-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988910" comment="php5-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988911" comment="php5-bcmath-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988912" comment="php5-bz2-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988913" comment="php5-calendar-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988914" comment="php5-ctype-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988915" comment="php5-curl-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988916" comment="php5-dba-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988917" comment="php5-dbase-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988918" comment="php5-dom-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988919" comment="php5-exif-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988920" comment="php5-fastcgi-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988921" comment="php5-ftp-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988922" comment="php5-gd-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988923" comment="php5-gettext-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988924" comment="php5-gmp-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988925" comment="php5-hash-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988926" comment="php5-iconv-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988927" comment="php5-json-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988928" comment="php5-ldap-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988929" comment="php5-mbstring-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988930" comment="php5-mcrypt-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988931" comment="php5-mysql-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988932" comment="php5-odbc-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988933" comment="php5-openssl-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988934" comment="php5-pcntl-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988935" comment="php5-pdo-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988936" comment="php5-pear-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988937" comment="php5-pgsql-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988938" comment="php5-pspell-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988939" comment="php5-shmop-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988940" comment="php5-snmp-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988941" comment="php5-soap-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988942" comment="php5-suhosin-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988943" comment="php5-sysvmsg-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988944" comment="php5-sysvsem-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988945" comment="php5-sysvshm-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988946" comment="php5-tokenizer-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988947" comment="php5-wddx-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988948" comment="php5-xmlreader-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988949" comment="php5-xmlrpc-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988950" comment="php5-xmlwriter-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988951" comment="php5-xsl-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988952" comment="php5-zip-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988953" comment="php5-zlib-5.2.14-0.7.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215785" version="1" class="patch">
	<metadata>
		<title>apache2-mod_php53-5.3.8-0.19.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-7243" ref_url="https://www.suse.com/security/cve/CVE-2006-7243/" source="CVE"/>
		<reference ref_id="CVE-2007-4783" ref_url="https://www.suse.com/security/cve/CVE-2007-4783/" source="CVE"/>
		<reference ref_id="CVE-2007-4840" ref_url="https://www.suse.com/security/cve/CVE-2007-4840/" source="CVE"/>
		<reference ref_id="CVE-2007-4887" ref_url="https://www.suse.com/security/cve/CVE-2007-4887/" source="CVE"/>
		<reference ref_id="CVE-2008-0599" ref_url="https://www.suse.com/security/cve/CVE-2008-0599/" source="CVE"/>
		<reference ref_id="CVE-2010-2225" ref_url="https://www.suse.com/security/cve/CVE-2010-2225/" source="CVE"/>
		<reference ref_id="CVE-2010-2950" ref_url="https://www.suse.com/security/cve/CVE-2010-2950/" source="CVE"/>
		<reference ref_id="CVE-2010-3436" ref_url="https://www.suse.com/security/cve/CVE-2010-3436/" source="CVE"/>
		<reference ref_id="CVE-2010-3709" ref_url="https://www.suse.com/security/cve/CVE-2010-3709/" source="CVE"/>
		<reference ref_id="CVE-2010-3710" ref_url="https://www.suse.com/security/cve/CVE-2010-3710/" source="CVE"/>
		<reference ref_id="CVE-2010-4150" ref_url="https://www.suse.com/security/cve/CVE-2010-4150/" source="CVE"/>
		<reference ref_id="CVE-2010-4645" ref_url="https://www.suse.com/security/cve/CVE-2010-4645/" source="CVE"/>
		<reference ref_id="CVE-2011-0420" ref_url="https://www.suse.com/security/cve/CVE-2011-0420/" source="CVE"/>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<reference ref_id="CVE-2011-0708" ref_url="https://www.suse.com/security/cve/CVE-2011-0708/" source="CVE"/>
		<reference ref_id="CVE-2011-1092" ref_url="https://www.suse.com/security/cve/CVE-2011-1092/" source="CVE"/>
		<reference ref_id="CVE-2011-1153" ref_url="https://www.suse.com/security/cve/CVE-2011-1153/" source="CVE"/>
		<reference ref_id="CVE-2011-1466" ref_url="https://www.suse.com/security/cve/CVE-2011-1466/" source="CVE"/>
		<reference ref_id="CVE-2011-2202" ref_url="https://www.suse.com/security/cve/CVE-2011-2202/" source="CVE"/>
		<reference ref_id="CVE-2011-3379" ref_url="https://www.suse.com/security/cve/CVE-2011-3379/" source="CVE"/>
		<reference ref_id="CVE-2011-4566" ref_url="https://www.suse.com/security/cve/CVE-2011-4566/" source="CVE"/>
		<reference ref_id="CVE-2011-4885" ref_url="https://www.suse.com/security/cve/CVE-2011-4885/" source="CVE"/>
		<reference ref_id="CVE-2012-0781" ref_url="https://www.suse.com/security/cve/CVE-2012-0781/" source="CVE"/>
		<reference ref_id="CVE-2012-0788" ref_url="https://www.suse.com/security/cve/CVE-2012-0788/" source="CVE"/>
		<reference ref_id="CVE-2012-0789" ref_url="https://www.suse.com/security/cve/CVE-2012-0789/" source="CVE"/>
		<reference ref_id="CVE-2012-0830" ref_url="https://www.suse.com/security/cve/CVE-2012-0830/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_php53-5.3.8-0.19.6 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-7243/">CVE-2006-7243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-7243">CVE-2006-7243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4783/">CVE-2007-4783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4783">CVE-2007-4783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4840/">CVE-2007-4840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4840">CVE-2007-4840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4887/">CVE-2007-4887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4887">CVE-2007-4887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0599/">CVE-2008-0599 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2008-0599">CVE-2008-0599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2225/">CVE-2010-2225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2225">CVE-2010-2225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2950/">CVE-2010-2950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2950">CVE-2010-2950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3436/">CVE-2010-3436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3436">CVE-2010-3436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3709/">CVE-2010-3709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3709">CVE-2010-3709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3710/">CVE-2010-3710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3710">CVE-2010-3710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4150/">CVE-2010-4150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4150">CVE-2010-4150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4645/">CVE-2010-4645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4645">CVE-2010-4645 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0420/">CVE-2011-0420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0420">CVE-2011-0420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0421">CVE-2011-0421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0708/">CVE-2011-0708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0708">CVE-2011-0708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1092/">CVE-2011-1092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1092">CVE-2011-1092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1153/">CVE-2011-1153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1153">CVE-2011-1153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1466/">CVE-2011-1466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1466">CVE-2011-1466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2202/">CVE-2011-2202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2202">CVE-2011-2202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3379/">CVE-2011-3379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3379">CVE-2011-3379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4566/">CVE-2011-4566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4566">CVE-2011-4566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4885/">CVE-2011-4885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4885">CVE-2011-4885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0781/">CVE-2012-0781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0781">CVE-2012-0781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0788/">CVE-2012-0788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0788">CVE-2012-0788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0789/">CVE-2012-0789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0789">CVE-2012-0789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0830/">CVE-2012-0830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0830">CVE-2012-0830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988954" comment="apache2-mod_php53-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988955" comment="php53-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988956" comment="php53-bcmath-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988957" comment="php53-bz2-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988958" comment="php53-calendar-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988959" comment="php53-ctype-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988960" comment="php53-curl-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988961" comment="php53-dba-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988962" comment="php53-dom-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988963" comment="php53-exif-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988964" comment="php53-fastcgi-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988965" comment="php53-fileinfo-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988966" comment="php53-ftp-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988967" comment="php53-gd-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988968" comment="php53-gettext-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988969" comment="php53-gmp-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988970" comment="php53-iconv-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988971" comment="php53-intl-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988972" comment="php53-json-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988973" comment="php53-ldap-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988974" comment="php53-mbstring-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988975" comment="php53-mcrypt-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988976" comment="php53-mysql-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988977" comment="php53-odbc-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988978" comment="php53-openssl-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988979" comment="php53-pcntl-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988980" comment="php53-pdo-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988981" comment="php53-pear-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988982" comment="php53-pgsql-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988983" comment="php53-pspell-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988984" comment="php53-shmop-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988985" comment="php53-snmp-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988986" comment="php53-soap-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988987" comment="php53-suhosin-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988988" comment="php53-sysvmsg-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988989" comment="php53-sysvsem-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988990" comment="php53-sysvshm-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988991" comment="php53-tokenizer-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988992" comment="php53-wddx-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988993" comment="php53-xmlreader-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988994" comment="php53-xmlrpc-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988995" comment="php53-xmlwriter-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988996" comment="php53-xsl-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988997" comment="php53-zip-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988998" comment="php53-zlib-5.3.8-0.19.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215786" version="1" class="patch">
	<metadata>
		<title>avahi-0.6.23-11.19.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-5461" ref_url="https://www.suse.com/security/cve/CVE-2006-5461/" source="CVE"/>
		<reference ref_id="CVE-2006-6870" ref_url="https://www.suse.com/security/cve/CVE-2006-6870/" source="CVE"/>
		<reference ref_id="CVE-2007-3372" ref_url="https://www.suse.com/security/cve/CVE-2007-3372/" source="CVE"/>
		<reference ref_id="CVE-2008-5081" ref_url="https://www.suse.com/security/cve/CVE-2008-5081/" source="CVE"/>
		<reference ref_id="CVE-2009-0758" ref_url="https://www.suse.com/security/cve/CVE-2009-0758/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-0.6.23-11.19.22 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5461/">CVE-2006-5461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5461">CVE-2006-5461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6870/">CVE-2006-6870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6870">CVE-2006-6870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3372/">CVE-2007-3372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3372">CVE-2007-3372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5081/">CVE-2008-5081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5081">CVE-2008-5081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0758/">CVE-2009-0758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0758">CVE-2009-0758 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988384" comment="avahi-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988385" comment="avahi-lang-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988386" comment="avahi-utils-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988387" comment="libavahi-client3-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988388" comment="libavahi-client3-32bit-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988389" comment="libavahi-client3-x86-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988390" comment="libavahi-common3-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988391" comment="libavahi-common3-32bit-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988392" comment="libavahi-common3-x86-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988393" comment="libavahi-core5-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988394" comment="libdns_sd-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988395" comment="libdns_sd-32bit-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988396" comment="libdns_sd-x86-0.6.23-11.19.22 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215787" version="1" class="patch">
	<metadata>
		<title>bind-9.6ESVR5P1-0.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2007-2925" ref_url="https://www.suse.com/security/cve/CVE-2007-2925/" source="CVE"/>
		<reference ref_id="CVE-2007-2926" ref_url="https://www.suse.com/security/cve/CVE-2007-2926/" source="CVE"/>
		<reference ref_id="CVE-2009-0696" ref_url="https://www.suse.com/security/cve/CVE-2009-0696/" source="CVE"/>
		<reference ref_id="CVE-2009-4022" ref_url="https://www.suse.com/security/cve/CVE-2009-4022/" source="CVE"/>
		<reference ref_id="CVE-2011-1910" ref_url="https://www.suse.com/security/cve/CVE-2011-1910/" source="CVE"/>
		<reference ref_id="CVE-2011-2464" ref_url="https://www.suse.com/security/cve/CVE-2011-2464/" source="CVE"/>
		<reference ref_id="CVE-2011-4313" ref_url="https://www.suse.com/security/cve/CVE-2011-4313/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.6ESVR5P1-0.8.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4339">CVE-2006-4339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2925/">CVE-2007-2925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2925">CVE-2007-2925 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2926/">CVE-2007-2926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2926">CVE-2007-2926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0696/">CVE-2009-0696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0696">CVE-2009-0696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4022/">CVE-2009-4022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4022">CVE-2009-4022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1910/">CVE-2011-1910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1910">CVE-2011-1910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2464/">CVE-2011-2464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2464">CVE-2011-2464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4313/">CVE-2011-4313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4313">CVE-2011-4313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988999" comment="bind-9.6ESVR5P1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989000" comment="bind-chrootenv-9.6ESVR5P1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989001" comment="bind-doc-9.6ESVR5P1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989002" comment="bind-libs-9.6ESVR5P1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989003" comment="bind-libs-32bit-9.6ESVR5P1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989004" comment="bind-libs-x86-9.6ESVR5P1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989005" comment="bind-utils-9.6ESVR5P1-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215788" version="1" class="patch">
	<metadata>
		<title>boost-license-1.36.0-11.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-0171" ref_url="https://www.suse.com/security/cve/CVE-2008-0171/" source="CVE"/>
		<description>
These are all security issues fixed in the boost-license-1.36.0-11.17 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0171/">CVE-2008-0171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0171">CVE-2008-0171 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988404" comment="boost-license-1.36.0-11.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988405" comment="libboost_program_options1_36_0-1.36.0-11.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988406" comment="libboost_regex1_36_0-1.36.0-11.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988407" comment="libboost_signals1_36_0-1.36.0-11.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215789" version="1" class="patch">
	<metadata>
		<title>bzip2-1.0.5-34.253.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-1372" ref_url="https://www.suse.com/security/cve/CVE-2008-1372/" source="CVE"/>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<description>
These are all security issues fixed in the bzip2-1.0.5-34.253.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1372/">CVE-2008-1372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1372">CVE-2008-1372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0405">CVE-2010-0405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989006" comment="bzip2-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989007" comment="bzip2-doc-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989008" comment="libbz2-1-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989009" comment="libbz2-1-32bit-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989010" comment="libbz2-1-x86-1.0.5-34.253.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215790" version="1" class="patch">
	<metadata>
		<title>cifs-utils-5.1-0.4.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-3403" ref_url="https://www.suse.com/security/cve/CVE-2006-3403/" source="CVE"/>
		<reference ref_id="CVE-2007-0452" ref_url="https://www.suse.com/security/cve/CVE-2007-0452/" source="CVE"/>
		<reference ref_id="CVE-2007-2444" ref_url="https://www.suse.com/security/cve/CVE-2007-2444/" source="CVE"/>
		<reference ref_id="CVE-2007-2446" ref_url="https://www.suse.com/security/cve/CVE-2007-2446/" source="CVE"/>
		<reference ref_id="CVE-2007-2447" ref_url="https://www.suse.com/security/cve/CVE-2007-2447/" source="CVE"/>
		<reference ref_id="CVE-2007-4138" ref_url="https://www.suse.com/security/cve/CVE-2007-4138/" source="CVE"/>
		<reference ref_id="CVE-2007-4572" ref_url="https://www.suse.com/security/cve/CVE-2007-4572/" source="CVE"/>
		<reference ref_id="CVE-2007-5398" ref_url="https://www.suse.com/security/cve/CVE-2007-5398/" source="CVE"/>
		<reference ref_id="CVE-2007-6015" ref_url="https://www.suse.com/security/cve/CVE-2007-6015/" source="CVE"/>
		<reference ref_id="CVE-2008-1105" ref_url="https://www.suse.com/security/cve/CVE-2008-1105/" source="CVE"/>
		<reference ref_id="CVE-2008-3789" ref_url="https://www.suse.com/security/cve/CVE-2008-3789/" source="CVE"/>
		<reference ref_id="CVE-2008-4314" ref_url="https://www.suse.com/security/cve/CVE-2008-4314/" source="CVE"/>
		<reference ref_id="CVE-2009-0022" ref_url="https://www.suse.com/security/cve/CVE-2009-0022/" source="CVE"/>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2011-1678" ref_url="https://www.suse.com/security/cve/CVE-2011-1678/" source="CVE"/>
		<description>
These are all security issues fixed in the cifs-utils-5.1-0.4.9 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3403/">CVE-2006-3403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3403">CVE-2006-3403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0452/">CVE-2007-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0452">CVE-2007-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2444/">CVE-2007-2444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2444">CVE-2007-2444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2446/">CVE-2007-2446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2446">CVE-2007-2446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2447/">CVE-2007-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2447">CVE-2007-2447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4138/">CVE-2007-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4138">CVE-2007-4138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4572/">CVE-2007-4572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4572">CVE-2007-4572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5398/">CVE-2007-5398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5398">CVE-2007-5398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6015/">CVE-2007-6015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6015">CVE-2007-6015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1105/">CVE-2008-1105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1105">CVE-2008-1105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3789/">CVE-2008-3789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3789">CVE-2008-3789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4314/">CVE-2008-4314 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4314">CVE-2008-4314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0022/">CVE-2009-0022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0022">CVE-2009-0022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1886">CVE-2009-1886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1888">CVE-2009-1888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2813">CVE-2009-2813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2906">CVE-2009-2906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2948">CVE-2009-2948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0547">CVE-2010-0547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0728">CVE-2010-0728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0787">CVE-2010-0787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1678/">CVE-2011-1678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1678">CVE-2011-1678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989011" comment="cifs-utils-5.1-0.4.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215791" version="1" class="patch">
	<metadata>
		<title>clamav-0.97.3-0.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-4182" ref_url="https://www.suse.com/security/cve/CVE-2006-4182/" source="CVE"/>
		<reference ref_id="CVE-2006-5295" ref_url="https://www.suse.com/security/cve/CVE-2006-5295/" source="CVE"/>
		<reference ref_id="CVE-2006-5874" ref_url="https://www.suse.com/security/cve/CVE-2006-5874/" source="CVE"/>
		<reference ref_id="CVE-2007-0897" ref_url="https://www.suse.com/security/cve/CVE-2007-0897/" source="CVE"/>
		<reference ref_id="CVE-2007-0898" ref_url="https://www.suse.com/security/cve/CVE-2007-0898/" source="CVE"/>
		<reference ref_id="CVE-2007-1745" ref_url="https://www.suse.com/security/cve/CVE-2007-1745/" source="CVE"/>
		<reference ref_id="CVE-2007-1997" ref_url="https://www.suse.com/security/cve/CVE-2007-1997/" source="CVE"/>
		<reference ref_id="CVE-2007-6335" ref_url="https://www.suse.com/security/cve/CVE-2007-6335/" source="CVE"/>
		<reference ref_id="CVE-2007-6336" ref_url="https://www.suse.com/security/cve/CVE-2007-6336/" source="CVE"/>
		<reference ref_id="CVE-2007-6337" ref_url="https://www.suse.com/security/cve/CVE-2007-6337/" source="CVE"/>
		<reference ref_id="CVE-2007-6595" ref_url="https://www.suse.com/security/cve/CVE-2007-6595/" source="CVE"/>
		<reference ref_id="CVE-2007-6596" ref_url="https://www.suse.com/security/cve/CVE-2007-6596/" source="CVE"/>
		<reference ref_id="CVE-2008-0318" ref_url="https://www.suse.com/security/cve/CVE-2008-0318/" source="CVE"/>
		<reference ref_id="CVE-2008-0728" ref_url="https://www.suse.com/security/cve/CVE-2008-0728/" source="CVE"/>
		<reference ref_id="CVE-2008-1100" ref_url="https://www.suse.com/security/cve/CVE-2008-1100/" source="CVE"/>
		<reference ref_id="CVE-2008-2713" ref_url="https://www.suse.com/security/cve/CVE-2008-2713/" source="CVE"/>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<reference ref_id="CVE-2011-2721" ref_url="https://www.suse.com/security/cve/CVE-2011-2721/" source="CVE"/>
		<reference ref_id="CVE-2011-3627" ref_url="https://www.suse.com/security/cve/CVE-2011-3627/" source="CVE"/>
		<description>
These are all security issues fixed in the clamav-0.97.3-0.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4182/">CVE-2006-4182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4182">CVE-2006-4182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5295/">CVE-2006-5295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5295">CVE-2006-5295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5874/">CVE-2006-5874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5874">CVE-2006-5874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0897/">CVE-2007-0897 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2007-0897">CVE-2007-0897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0898/">CVE-2007-0898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0898">CVE-2007-0898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1745/">CVE-2007-1745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1745">CVE-2007-1745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1997/">CVE-2007-1997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1997">CVE-2007-1997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6335/">CVE-2007-6335 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6335">CVE-2007-6335 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6336/">CVE-2007-6336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6336">CVE-2007-6336 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6337/">CVE-2007-6337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6337">CVE-2007-6337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6595/">CVE-2007-6595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6595">CVE-2007-6595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6596/">CVE-2007-6596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6596">CVE-2007-6596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0318/">CVE-2008-0318 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0318">CVE-2008-0318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0728/">CVE-2008-0728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0728">CVE-2008-0728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1100/">CVE-2008-1100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1100">CVE-2008-1100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2713/">CVE-2008-2713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2713">CVE-2008-2713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0405">CVE-2010-0405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2721/">CVE-2011-2721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2721">CVE-2011-2721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3627/">CVE-2011-3627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3627">CVE-2011-3627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989012" comment="clamav-0.97.3-0.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215792" version="1" class="patch">
	<metadata>
		<title>coolkey-1.1.0-22.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-4129" ref_url="https://www.suse.com/security/cve/CVE-2007-4129/" source="CVE"/>
		<description>
These are all security issues fixed in the coolkey-1.1.0-22.24 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4129/">CVE-2007-4129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4129">CVE-2007-4129 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988438" comment="coolkey-1.1.0-22.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215793" version="1" class="patch">
	<metadata>
		<title>cron-4.1-194.199.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-2607" ref_url="https://www.suse.com/security/cve/CVE-2006-2607/" source="CVE"/>
		<reference ref_id="CVE-2010-0424" ref_url="https://www.suse.com/security/cve/CVE-2010-0424/" source="CVE"/>
		<description>
These are all security issues fixed in the cron-4.1-194.199.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2607/">CVE-2006-2607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2607">CVE-2006-2607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0424/">CVE-2010-0424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0424">CVE-2010-0424 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989013" comment="cron-4.1-194.199.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215794" version="1" class="patch">
	<metadata>
		<title>cups-1.3.9-8.44.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-0104" ref_url="https://www.suse.com/security/cve/CVE-2007-0104/" source="CVE"/>
		<reference ref_id="CVE-2007-3387" ref_url="https://www.suse.com/security/cve/CVE-2007-3387/" source="CVE"/>
		<reference ref_id="CVE-2007-4351" ref_url="https://www.suse.com/security/cve/CVE-2007-4351/" source="CVE"/>
		<reference ref_id="CVE-2007-4352" ref_url="https://www.suse.com/security/cve/CVE-2007-4352/" source="CVE"/>
		<reference ref_id="CVE-2007-5392" ref_url="https://www.suse.com/security/cve/CVE-2007-5392/" source="CVE"/>
		<reference ref_id="CVE-2007-5393" ref_url="https://www.suse.com/security/cve/CVE-2007-5393/" source="CVE"/>
		<reference ref_id="CVE-2008-0047" ref_url="https://www.suse.com/security/cve/CVE-2008-0047/" source="CVE"/>
		<reference ref_id="CVE-2008-1373" ref_url="https://www.suse.com/security/cve/CVE-2008-1373/" source="CVE"/>
		<reference ref_id="CVE-2008-1693" ref_url="https://www.suse.com/security/cve/CVE-2008-1693/" source="CVE"/>
		<reference ref_id="CVE-2008-1722" ref_url="https://www.suse.com/security/cve/CVE-2008-1722/" source="CVE"/>
		<reference ref_id="CVE-2008-3641" ref_url="https://www.suse.com/security/cve/CVE-2008-3641/" source="CVE"/>
		<reference ref_id="CVE-2009-0163" ref_url="https://www.suse.com/security/cve/CVE-2009-0163/" source="CVE"/>
		<reference ref_id="CVE-2009-0949" ref_url="https://www.suse.com/security/cve/CVE-2009-0949/" source="CVE"/>
		<reference ref_id="CVE-2009-2820" ref_url="https://www.suse.com/security/cve/CVE-2009-2820/" source="CVE"/>
		<reference ref_id="CVE-2009-3553" ref_url="https://www.suse.com/security/cve/CVE-2009-3553/" source="CVE"/>
		<reference ref_id="CVE-2010-0302" ref_url="https://www.suse.com/security/cve/CVE-2010-0302/" source="CVE"/>
		<reference ref_id="CVE-2010-0393" ref_url="https://www.suse.com/security/cve/CVE-2010-0393/" source="CVE"/>
		<reference ref_id="CVE-2010-0540" ref_url="https://www.suse.com/security/cve/CVE-2010-0540/" source="CVE"/>
		<reference ref_id="CVE-2010-0542" ref_url="https://www.suse.com/security/cve/CVE-2010-0542/" source="CVE"/>
		<reference ref_id="CVE-2010-1748" ref_url="https://www.suse.com/security/cve/CVE-2010-1748/" source="CVE"/>
		<reference ref_id="CVE-2010-2431" ref_url="https://www.suse.com/security/cve/CVE-2010-2431/" source="CVE"/>
		<reference ref_id="CVE-2010-2432" ref_url="https://www.suse.com/security/cve/CVE-2010-2432/" source="CVE"/>
		<reference ref_id="CVE-2010-2941" ref_url="https://www.suse.com/security/cve/CVE-2010-2941/" source="CVE"/>
		<reference ref_id="CVE-2011-2896" ref_url="https://www.suse.com/security/cve/CVE-2011-2896/" source="CVE"/>
		<reference ref_id="CVE-2011-3170" ref_url="https://www.suse.com/security/cve/CVE-2011-3170/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-1.3.9-8.44.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0104/">CVE-2007-0104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0104">CVE-2007-0104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3387/">CVE-2007-3387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3387">CVE-2007-3387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4351/">CVE-2007-4351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4351">CVE-2007-4351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4352/">CVE-2007-4352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4352">CVE-2007-4352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5392/">CVE-2007-5392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5392">CVE-2007-5392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5393/">CVE-2007-5393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5393">CVE-2007-5393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0047/">CVE-2008-0047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0047">CVE-2008-0047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1373/">CVE-2008-1373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1373">CVE-2008-1373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1693/">CVE-2008-1693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1693">CVE-2008-1693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1722/">CVE-2008-1722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1722">CVE-2008-1722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3641/">CVE-2008-3641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3641">CVE-2008-3641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0163/">CVE-2009-0163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0163">CVE-2009-0163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0949/">CVE-2009-0949 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-0949">CVE-2009-0949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2820/">CVE-2009-2820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2820">CVE-2009-2820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3553/">CVE-2009-3553 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-3553">CVE-2009-3553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0302/">CVE-2010-0302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-0302">CVE-2010-0302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0393/">CVE-2010-0393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0393">CVE-2010-0393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0540/">CVE-2010-0540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0540">CVE-2010-0540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0542/">CVE-2010-0542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0542">CVE-2010-0542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1748/">CVE-2010-1748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1748">CVE-2010-1748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2431/">CVE-2010-2431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2431">CVE-2010-2431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2432/">CVE-2010-2432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2432">CVE-2010-2432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2941/">CVE-2010-2941 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2941">CVE-2010-2941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2896/">CVE-2011-2896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2896">CVE-2011-2896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3170/">CVE-2011-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3170">CVE-2011-3170 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989014" comment="cups-1.3.9-8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989015" comment="cups-client-1.3.9-8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989016" comment="cups-libs-1.3.9-8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989017" comment="cups-libs-32bit-1.3.9-8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989018" comment="cups-libs-x86-1.3.9-8.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215795" version="1" class="patch">
	<metadata>
		<title>curl-7.19.7-1.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0037" ref_url="https://www.suse.com/security/cve/CVE-2009-0037/" source="CVE"/>
		<reference ref_id="CVE-2009-2417" ref_url="https://www.suse.com/security/cve/CVE-2009-2417/" source="CVE"/>
		<reference ref_id="CVE-2010-4180" ref_url="https://www.suse.com/security/cve/CVE-2010-4180/" source="CVE"/>
		<reference ref_id="CVE-2011-2192" ref_url="https://www.suse.com/security/cve/CVE-2011-2192/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-7.19.7-1.18.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0037/">CVE-2009-0037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0037">CVE-2009-0037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2417/">CVE-2009-2417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2417">CVE-2009-2417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4180/">CVE-2010-4180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4180">CVE-2010-4180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2192/">CVE-2011-2192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2192">CVE-2011-2192 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989019" comment="curl-7.19.7-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989020" comment="libcurl4-7.19.7-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989021" comment="libcurl4-32bit-7.19.7-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989022" comment="libcurl4-x86-7.19.7-1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215796" version="1" class="patch">
	<metadata>
		<title>cyrus-imapd-2.3.11-60.65.64.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-3235" ref_url="https://www.suse.com/security/cve/CVE-2009-3235/" source="CVE"/>
		<reference ref_id="CVE-2011-3372" ref_url="https://www.suse.com/security/cve/CVE-2011-3372/" source="CVE"/>
		<description>
These are all security issues fixed in the cyrus-imapd-2.3.11-60.65.64.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3235/">CVE-2009-3235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3235">CVE-2009-3235 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3372/">CVE-2011-3372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3372">CVE-2011-3372 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989023" comment="cyrus-imapd-2.3.11-60.65.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989024" comment="perl-Cyrus-IMAP-2.3.11-60.65.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989025" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215797" version="1" class="patch">
	<metadata>
		<title>dbus-1-1.2.10-3.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-6107" ref_url="https://www.suse.com/security/cve/CVE-2006-6107/" source="CVE"/>
		<reference ref_id="CVE-2008-0595" ref_url="https://www.suse.com/security/cve/CVE-2008-0595/" source="CVE"/>
		<reference ref_id="CVE-2008-3834" ref_url="https://www.suse.com/security/cve/CVE-2008-3834/" source="CVE"/>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<reference ref_id="CVE-2009-1189" ref_url="https://www.suse.com/security/cve/CVE-2009-1189/" source="CVE"/>
		<reference ref_id="CVE-2010-4352" ref_url="https://www.suse.com/security/cve/CVE-2010-4352/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-1.2.10-3.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6107/">CVE-2006-6107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6107">CVE-2006-6107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0595/">CVE-2008-0595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0595">CVE-2008-0595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3834/">CVE-2008-3834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3834">CVE-2008-3834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4311">CVE-2008-4311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1189/">CVE-2009-1189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1189">CVE-2009-1189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4352/">CVE-2010-4352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4352">CVE-2010-4352 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989026" comment="dbus-1-1.2.10-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989027" comment="dbus-1-32bit-1.2.10-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989028" comment="dbus-1-x11-1.2.10-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989029" comment="dbus-1-x86-1.2.10-3.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215798" version="1" class="patch">
	<metadata>
		<title>dbus-1-glib-0.76-34.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-1172" ref_url="https://www.suse.com/security/cve/CVE-2010-1172/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-glib-0.76-34.22.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1172/">CVE-2010-1172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1172">CVE-2010-1172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989030" comment="dbus-1-glib-0.76-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989031" comment="dbus-1-glib-32bit-0.76-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989032" comment="dbus-1-glib-x86-0.76-34.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215799" version="1" class="patch">
	<metadata>
		<title>dhcp-4.2.3.P2-0.7.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0692" ref_url="https://www.suse.com/security/cve/CVE-2009-0692/" source="CVE"/>
		<reference ref_id="CVE-2009-1892" ref_url="https://www.suse.com/security/cve/CVE-2009-1892/" source="CVE"/>
		<reference ref_id="CVE-2011-0997" ref_url="https://www.suse.com/security/cve/CVE-2011-0997/" source="CVE"/>
		<reference ref_id="CVE-2011-2748" ref_url="https://www.suse.com/security/cve/CVE-2011-2748/" source="CVE"/>
		<reference ref_id="CVE-2011-2749" ref_url="https://www.suse.com/security/cve/CVE-2011-2749/" source="CVE"/>
		<reference ref_id="CVE-2011-4539" ref_url="https://www.suse.com/security/cve/CVE-2011-4539/" source="CVE"/>
		<reference ref_id="CVE-2011-4868" ref_url="https://www.suse.com/security/cve/CVE-2011-4868/" source="CVE"/>
		<description>
These are all security issues fixed in the dhcp-4.2.3.P2-0.7.2 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0692/">CVE-2009-0692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0692">CVE-2009-0692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1892/">CVE-2009-1892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1892">CVE-2009-1892 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0997/">CVE-2011-0997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0997">CVE-2011-0997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2748/">CVE-2011-2748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2748">CVE-2011-2748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2749/">CVE-2011-2749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2749">CVE-2011-2749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4539/">CVE-2011-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4539">CVE-2011-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4868/">CVE-2011-4868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4868">CVE-2011-4868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989033" comment="dhcp-4.2.3.P2-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989034" comment="dhcp-client-4.2.3.P2-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989035" comment="dhcp-relay-4.2.3.P2-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989036" comment="dhcp-server-4.2.3.P2-0.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215800" version="1" class="patch">
	<metadata>
		<title>dhcpcd-3.2.3-44.28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0997" ref_url="https://www.suse.com/security/cve/CVE-2011-0997/" source="CVE"/>
		<description>
These are all security issues fixed in the dhcpcd-3.2.3-44.28.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0997/">CVE-2011-0997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0997">CVE-2011-0997 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989037" comment="dhcpcd-3.2.3-44.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989038" comment="dhcpv6-1.0.22-3.21.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215801" version="1" class="patch">
	<metadata>
		<title>e2fsprogs-1.41.9-2.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-5497" ref_url="https://www.suse.com/security/cve/CVE-2007-5497/" source="CVE"/>
		<description>
These are all security issues fixed in the e2fsprogs-1.41.9-2.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5497/">CVE-2007-5497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5497">CVE-2007-5497 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989039" comment="e2fsprogs-1.41.9-2.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989040" comment="libcom_err2-1.41.9-2.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989041" comment="libcom_err2-32bit-1.41.9-2.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989042" comment="libcom_err2-x86-1.41.9-2.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989043" comment="libext2fs2-1.41.9-2.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215802" version="1" class="patch">
	<metadata>
		<title>ecryptfs-utils-32bit-61-1.29.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1831" ref_url="https://www.suse.com/security/cve/CVE-2011-1831/" source="CVE"/>
		<reference ref_id="CVE-2011-1832" ref_url="https://www.suse.com/security/cve/CVE-2011-1832/" source="CVE"/>
		<reference ref_id="CVE-2011-1833" ref_url="https://www.suse.com/security/cve/CVE-2011-1833/" source="CVE"/>
		<reference ref_id="CVE-2011-1834" ref_url="https://www.suse.com/security/cve/CVE-2011-1834/" source="CVE"/>
		<description>
These are all security issues fixed in the ecryptfs-utils-32bit-61-1.29.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1831/">CVE-2011-1831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1831">CVE-2011-1831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1832/">CVE-2011-1832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1832">CVE-2011-1832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1833/">CVE-2011-1833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1833">CVE-2011-1833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1834/">CVE-2011-1834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1834">CVE-2011-1834 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989044" comment="ecryptfs-utils-61-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989045" comment="ecryptfs-utils-32bit-61-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989046" comment="ecryptfs-utils-x86-61-1.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215803" version="1" class="patch">
	<metadata>
		<title>ed-0.2-1001.30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-3916" ref_url="https://www.suse.com/security/cve/CVE-2008-3916/" source="CVE"/>
		<description>
These are all security issues fixed in the ed-0.2-1001.30.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3916/">CVE-2008-3916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3916">CVE-2008-3916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989047" comment="ed-0.2-1001.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215804" version="1" class="patch">
	<metadata>
		<title>emacs-22.3-4.36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-5795" ref_url="https://www.suse.com/security/cve/CVE-2007-5795/" source="CVE"/>
		<description>
These are all security issues fixed in the emacs-22.3-4.36.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5795/">CVE-2007-5795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5795">CVE-2007-5795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989048" comment="emacs-22.3-4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989049" comment="emacs-el-22.3-4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989050" comment="emacs-info-22.3-4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989051" comment="emacs-nox-22.3-4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989052" comment="emacs-x11-22.3-4.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215805" version="1" class="patch">
	<metadata>
		<title>enscript-1.6.4-152.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-3863" ref_url="https://www.suse.com/security/cve/CVE-2008-3863/" source="CVE"/>
		<reference ref_id="CVE-2008-4306" ref_url="https://www.suse.com/security/cve/CVE-2008-4306/" source="CVE"/>
		<description>
These are all security issues fixed in the enscript-1.6.4-152.22.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3863/">CVE-2008-3863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3863">CVE-2008-3863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4306/">CVE-2008-4306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4306">CVE-2008-4306 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989053" comment="enscript-1.6.4-152.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215806" version="1" class="patch">
	<metadata>
		<title>evince-2.28.2-0.7.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-5864" ref_url="https://www.suse.com/security/cve/CVE-2006-5864/" source="CVE"/>
		<reference ref_id="CVE-2010-2640" ref_url="https://www.suse.com/security/cve/CVE-2010-2640/" source="CVE"/>
		<reference ref_id="CVE-2010-2641" ref_url="https://www.suse.com/security/cve/CVE-2010-2641/" source="CVE"/>
		<reference ref_id="CVE-2010-2642" ref_url="https://www.suse.com/security/cve/CVE-2010-2642/" source="CVE"/>
		<reference ref_id="CVE-2010-2643" ref_url="https://www.suse.com/security/cve/CVE-2010-2643/" source="CVE"/>
		<description>
These are all security issues fixed in the evince-2.28.2-0.7.2 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5864/">CVE-2006-5864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5864">CVE-2006-5864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2640/">CVE-2010-2640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2640">CVE-2010-2640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2641/">CVE-2010-2641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2641">CVE-2010-2641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2642/">CVE-2010-2642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2642">CVE-2010-2642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2643/">CVE-2010-2643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2643">CVE-2010-2643 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989054" comment="evince-2.28.2-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989055" comment="evince-doc-2.28.2-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989056" comment="evince-lang-2.28.2-0.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215807" version="1" class="patch">
	<metadata>
		<title>evolution-data-server-2.28.2-0.26.33.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-3257" ref_url="https://www.suse.com/security/cve/CVE-2007-3257/" source="CVE"/>
		<description>
These are all security issues fixed in the evolution-data-server-2.28.2-0.26.33.14 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3257/">CVE-2007-3257 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3257">CVE-2007-3257 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989057" comment="evolution-data-server-2.28.2-0.26.33.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989058" comment="evolution-data-server-32bit-2.28.2-0.26.33.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989059" comment="evolution-data-server-lang-2.28.2-0.26.33.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989060" comment="evolution-data-server-x86-2.28.2-0.26.33.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215808" version="1" class="patch">
	<metadata>
		<title>expat-2.0.1-88.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-2625" ref_url="https://www.suse.com/security/cve/CVE-2009-2625/" source="CVE"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.0.1-88.26.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2625/">CVE-2009-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2625">CVE-2009-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3560">CVE-2009-3560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988478" comment="expat-2.0.1-88.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988479" comment="libexpat1-2.0.1-88.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988480" comment="libexpat1-32bit-2.0.1-88.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988481" comment="libexpat1-x86-2.0.1-88.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215809" version="1" class="patch">
	<metadata>
		<title>fetchmail-6.3.8.90-13.20.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-5867" ref_url="https://www.suse.com/security/cve/CVE-2006-5867/" source="CVE"/>
		<reference ref_id="CVE-2006-5974" ref_url="https://www.suse.com/security/cve/CVE-2006-5974/" source="CVE"/>
		<reference ref_id="CVE-2007-1558" ref_url="https://www.suse.com/security/cve/CVE-2007-1558/" source="CVE"/>
		<reference ref_id="CVE-2007-4565" ref_url="https://www.suse.com/security/cve/CVE-2007-4565/" source="CVE"/>
		<reference ref_id="CVE-2009-2666" ref_url="https://www.suse.com/security/cve/CVE-2009-2666/" source="CVE"/>
		<reference ref_id="CVE-2011-1947" ref_url="https://www.suse.com/security/cve/CVE-2011-1947/" source="CVE"/>
		<description>
These are all security issues fixed in the fetchmail-6.3.8.90-13.20.19.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5867/">CVE-2006-5867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5867">CVE-2006-5867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5974/">CVE-2006-5974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5974">CVE-2006-5974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1558/">CVE-2007-1558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1558">CVE-2007-1558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4565/">CVE-2007-4565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4565">CVE-2007-4565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2666/">CVE-2009-2666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2666">CVE-2009-2666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1947/">CVE-2011-1947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1947">CVE-2011-1947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989061" comment="fetchmail-6.3.8.90-13.20.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989062" comment="fetchmailconf-6.3.8.90-13.20.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215810" version="1" class="patch">
	<metadata>
		<title>file-32bit-4.24-43.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-1536" ref_url="https://www.suse.com/security/cve/CVE-2007-1536/" source="CVE"/>
		<reference ref_id="CVE-2007-2799" ref_url="https://www.suse.com/security/cve/CVE-2007-2799/" source="CVE"/>
		<description>
These are all security issues fixed in the file-32bit-4.24-43.19.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1536/">CVE-2007-1536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1536">CVE-2007-1536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2799/">CVE-2007-2799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2799">CVE-2007-2799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989063" comment="file-4.24-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989064" comment="file-32bit-4.24-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989065" comment="file-x86-4.24-43.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215811" version="1" class="patch">
	<metadata>
		<title>findutils-4.4.0-38.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-2452" ref_url="https://www.suse.com/security/cve/CVE-2007-2452/" source="CVE"/>
		<description>
These are all security issues fixed in the findutils-4.4.0-38.26.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2452/">CVE-2007-2452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2452">CVE-2007-2452 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989066" comment="findutils-4.4.0-38.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989067" comment="findutils-locate-4.4.0-38.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215812" version="1" class="patch">
	<metadata>
		<title>foomatic-filters-3.0.2-269.35.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2697" ref_url="https://www.suse.com/security/cve/CVE-2011-2697/" source="CVE"/>
		<description>
These are all security issues fixed in the foomatic-filters-3.0.2-269.35.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2697/">CVE-2011-2697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2697">CVE-2011-2697 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989068" comment="foomatic-filters-3.0.2-269.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215813" version="1" class="patch">
	<metadata>
		<title>freeradius-server-2.1.1-7.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-4474" ref_url="https://www.suse.com/security/cve/CVE-2008-4474/" source="CVE"/>
		<description>
These are all security issues fixed in the freeradius-server-2.1.1-7.10.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4474/">CVE-2008-4474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4474">CVE-2008-4474 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989069" comment="freeradius-server-2.1.1-7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988490" comment="freeradius-server-dialupadmin-2.1.1-7.7.19.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988491" comment="freeradius-server-doc-2.1.1-7.7.19.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988492" comment="freeradius-server-libs-2.1.1-7.7.19.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988493" comment="freeradius-server-utils-2.1.1-7.7.19.77 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215814" version="1" class="patch">
	<metadata>
		<title>freetype2-2.3.7-25.28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-1351" ref_url="https://www.suse.com/security/cve/CVE-2007-1351/" source="CVE"/>
		<reference ref_id="CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946/" source="CVE"/>
		<reference ref_id="CVE-2010-2497" ref_url="https://www.suse.com/security/cve/CVE-2010-2497/" source="CVE"/>
		<reference ref_id="CVE-2010-2805" ref_url="https://www.suse.com/security/cve/CVE-2010-2805/" source="CVE"/>
		<reference ref_id="CVE-2010-3053" ref_url="https://www.suse.com/security/cve/CVE-2010-3053/" source="CVE"/>
		<reference ref_id="CVE-2010-3054" ref_url="https://www.suse.com/security/cve/CVE-2010-3054/" source="CVE"/>
		<reference ref_id="CVE-2010-3311" ref_url="https://www.suse.com/security/cve/CVE-2010-3311/" source="CVE"/>
		<reference ref_id="CVE-2010-3814" ref_url="https://www.suse.com/security/cve/CVE-2010-3814/" source="CVE"/>
		<reference ref_id="CVE-2010-3855" ref_url="https://www.suse.com/security/cve/CVE-2010-3855/" source="CVE"/>
		<reference ref_id="CVE-2011-0226" ref_url="https://www.suse.com/security/cve/CVE-2011-0226/" source="CVE"/>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<reference ref_id="CVE-2011-3256" ref_url="https://www.suse.com/security/cve/CVE-2011-3256/" source="CVE"/>
		<reference ref_id="CVE-2011-3439" ref_url="https://www.suse.com/security/cve/CVE-2011-3439/" source="CVE"/>
		<description>
These are all security issues fixed in the freetype2-2.3.7-25.28.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1351/">CVE-2007-1351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1351">CVE-2007-1351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0946">CVE-2009-0946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2497/">CVE-2010-2497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2497">CVE-2010-2497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2805/">CVE-2010-2805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2805">CVE-2010-2805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3053/">CVE-2010-3053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3053">CVE-2010-3053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3054/">CVE-2010-3054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3054">CVE-2010-3054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3311/">CVE-2010-3311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3311">CVE-2010-3311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3814/">CVE-2010-3814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3814">CVE-2010-3814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3855/">CVE-2010-3855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3855">CVE-2010-3855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0226/">CVE-2011-0226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0226">CVE-2011-0226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2895">CVE-2011-2895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3256/">CVE-2011-3256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3256">CVE-2011-3256 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3439/">CVE-2011-3439 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3439">CVE-2011-3439 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989070" comment="freetype2-2.3.7-25.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989071" comment="freetype2-32bit-2.3.7-25.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989072" comment="freetype2-x86-2.3.7-25.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215815" version="1" class="patch">
	<metadata>
		<title>ft2demos-2.3.7-25.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-1351" ref_url="https://www.suse.com/security/cve/CVE-2007-1351/" source="CVE"/>
		<description>
These are all security issues fixed in the ft2demos-2.3.7-25.9 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1351/">CVE-2007-1351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1351">CVE-2007-1351 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988497" comment="ft2demos-2.3.7-25.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215816" version="1" class="patch">
	<metadata>
		<title>fuse-2.7.2-61.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-3297" ref_url="https://www.suse.com/security/cve/CVE-2009-3297/" source="CVE"/>
		<reference ref_id="CVE-2011-0541" ref_url="https://www.suse.com/security/cve/CVE-2011-0541/" source="CVE"/>
		<description>
These are all security issues fixed in the fuse-2.7.2-61.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3297/">CVE-2009-3297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3297">CVE-2009-3297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0541/">CVE-2011-0541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0541">CVE-2011-0541 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989073" comment="fuse-2.7.2-61.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989074" comment="libfuse2-2.7.2-61.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215817" version="1" class="patch">
	<metadata>
		<title>fvwm2-2.5.26-1.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-5969" ref_url="https://www.suse.com/security/cve/CVE-2006-5969/" source="CVE"/>
		<description>
These are all security issues fixed in the fvwm2-2.5.26-1.25 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5969/">CVE-2006-5969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5969">CVE-2006-5969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988500" comment="fvwm2-2.5.26-1.25 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215818" version="1" class="patch">
	<metadata>
		<title>g3utils-1.1.36-26.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-4936" ref_url="https://www.suse.com/security/cve/CVE-2008-4936/" source="CVE"/>
		<description>
These are all security issues fixed in the g3utils-1.1.36-26.31 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4936/">CVE-2008-4936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4936">CVE-2008-4936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988501" comment="g3utils-1.1.36-26.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988502" comment="mgetty-1.1.36-26.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215819" version="1" class="patch">
	<metadata>
		<title>gd-2.0.36.RC1-52.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-2756" ref_url="https://www.suse.com/security/cve/CVE-2007-2756/" source="CVE"/>
		<description>
These are all security issues fixed in the gd-2.0.36.RC1-52.18 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2756/">CVE-2007-2756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2756">CVE-2007-2756 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988503" comment="gd-2.0.36.RC1-52.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215820" version="1" class="patch">
	<metadata>
		<title>ghostscript-fonts-other-8.62-32.28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0196" ref_url="https://www.suse.com/security/cve/CVE-2009-0196/" source="CVE"/>
		<reference ref_id="CVE-2009-0583" ref_url="https://www.suse.com/security/cve/CVE-2009-0583/" source="CVE"/>
		<reference ref_id="CVE-2009-0584" ref_url="https://www.suse.com/security/cve/CVE-2009-0584/" source="CVE"/>
		<reference ref_id="CVE-2009-0792" ref_url="https://www.suse.com/security/cve/CVE-2009-0792/" source="CVE"/>
		<reference ref_id="CVE-2010-1869" ref_url="https://www.suse.com/security/cve/CVE-2010-1869/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-fonts-other-8.62-32.28.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0196/">CVE-2009-0196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0196">CVE-2009-0196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0583/">CVE-2009-0583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0583">CVE-2009-0583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0584/">CVE-2009-0584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0584">CVE-2009-0584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0792/">CVE-2009-0792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0792">CVE-2009-0792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1869/">CVE-2010-1869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1869">CVE-2010-1869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989075" comment="ghostscript-fonts-other-8.62-32.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989076" comment="ghostscript-fonts-rus-8.62-32.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989077" comment="ghostscript-fonts-std-8.62-32.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989078" comment="ghostscript-library-8.62-32.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989079" comment="ghostscript-omni-8.62-32.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989080" comment="ghostscript-x11-8.62-32.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989081" comment="libgimpprint-4.2.7-32.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215821" version="1" class="patch">
	<metadata>
		<title>glib2-2.22.5-0.2.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-2371" ref_url="https://www.suse.com/security/cve/CVE-2008-2371/" source="CVE"/>
		<reference ref_id="CVE-2008-4316" ref_url="https://www.suse.com/security/cve/CVE-2008-4316/" source="CVE"/>
		<description>
These are all security issues fixed in the glib2-2.22.5-0.2.23 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2371/">CVE-2008-2371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2371">CVE-2008-2371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4316/">CVE-2008-4316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4316">CVE-2008-4316 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988511" comment="glib2-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988512" comment="glib2-doc-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988513" comment="glib2-lang-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988514" comment="libgio-2_0-0-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988515" comment="libgio-2_0-0-32bit-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988516" comment="libgio-2_0-0-x86-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988517" comment="libglib-2_0-0-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988518" comment="libglib-2_0-0-32bit-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988519" comment="libglib-2_0-0-x86-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988520" comment="libgmodule-2_0-0-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988521" comment="libgmodule-2_0-0-32bit-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988522" comment="libgmodule-2_0-0-x86-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988523" comment="libgobject-2_0-0-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988524" comment="libgobject-2_0-0-32bit-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988525" comment="libgobject-2_0-0-x86-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988526" comment="libgthread-2_0-0-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988527" comment="libgthread-2_0-0-32bit-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988528" comment="libgthread-2_0-0-x86-2.22.5-0.2.23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215822" version="1" class="patch">
	<metadata>
		<title>glibc-2.11.3-17.31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-5029" ref_url="https://www.suse.com/security/cve/CVE-2009-5029/" source="CVE"/>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.11.3-17.31.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5029/">CVE-2009-5029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5029">CVE-2009-5029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2483">CVE-2011-2483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989082" comment="glibc-2.11.3-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989083" comment="glibc-32bit-2.11.3-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989084" comment="glibc-devel-2.11.3-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989085" comment="glibc-devel-32bit-2.11.3-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989086" comment="glibc-html-2.11.3-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989087" comment="glibc-i18ndata-2.11.3-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989088" comment="glibc-info-2.11.3-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989089" comment="glibc-locale-2.11.3-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989090" comment="glibc-locale-32bit-2.11.3-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989091" comment="glibc-locale-x86-2.11.3-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989092" comment="glibc-profile-2.11.3-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989093" comment="glibc-profile-32bit-2.11.3-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989094" comment="glibc-profile-x86-2.11.3-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989095" comment="glibc-x86-2.11.3-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989096" comment="nscd-2.11.3-17.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215823" version="1" class="patch">
	<metadata>
		<title>gmime-2.2.23-1.50.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-0409" ref_url="https://www.suse.com/security/cve/CVE-2010-0409/" source="CVE"/>
		<description>
These are all security issues fixed in the gmime-2.2.23-1.50.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0409/">CVE-2010-0409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0409">CVE-2010-0409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989097" comment="gmime-2.2.23-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988530" comment="gmime-2_4-2.4.8-1.2.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989098" comment="gmime-doc-2.2.23-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989099" comment="libgmime-2_0-3-2.2.23-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988533" comment="libgmime-2_4-2-2.4.8-1.2.55 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215824" version="1" class="patch">
	<metadata>
		<title>gnome-screensaver-2.28.3-0.28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-0887" ref_url="https://www.suse.com/security/cve/CVE-2008-0887/" source="CVE"/>
		<reference ref_id="CVE-2010-0414" ref_url="https://www.suse.com/security/cve/CVE-2010-0414/" source="CVE"/>
		<reference ref_id="CVE-2010-0422" ref_url="https://www.suse.com/security/cve/CVE-2010-0422/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-screensaver-2.28.3-0.28.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0887/">CVE-2008-0887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0887">CVE-2008-0887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0414/">CVE-2010-0414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0414">CVE-2010-0414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0422/">CVE-2010-0422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0422">CVE-2010-0422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989100" comment="gnome-screensaver-2.28.3-0.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989101" comment="gnome-screensaver-lang-2.28.3-0.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215825" version="1" class="patch">
	<metadata>
		<title>gnutls-2.4.1-24.39.33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-4790" ref_url="https://www.suse.com/security/cve/CVE-2006-4790/" source="CVE"/>
		<reference ref_id="CVE-2008-1948" ref_url="https://www.suse.com/security/cve/CVE-2008-1948/" source="CVE"/>
		<reference ref_id="CVE-2008-1949" ref_url="https://www.suse.com/security/cve/CVE-2008-1949/" source="CVE"/>
		<reference ref_id="CVE-2008-1950" ref_url="https://www.suse.com/security/cve/CVE-2008-1950/" source="CVE"/>
		<reference ref_id="CVE-2008-4989" ref_url="https://www.suse.com/security/cve/CVE-2008-4989/" source="CVE"/>
		<reference ref_id="CVE-2009-2730" ref_url="https://www.suse.com/security/cve/CVE-2009-2730/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2011-4128" ref_url="https://www.suse.com/security/cve/CVE-2011-4128/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-2.4.1-24.39.33.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4790/">CVE-2006-4790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4790">CVE-2006-4790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1948/">CVE-2008-1948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1948">CVE-2008-1948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1949/">CVE-2008-1949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1949">CVE-2008-1949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1950/">CVE-2008-1950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1950">CVE-2008-1950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4989/">CVE-2008-4989 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2008-4989">CVE-2008-4989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2730/">CVE-2009-2730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2730">CVE-2009-2730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4128/">CVE-2011-4128 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4128">CVE-2011-4128 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989102" comment="gnutls-2.4.1-24.39.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989103" comment="libgnutls26-2.4.1-24.39.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989104" comment="libgnutls26-32bit-2.4.1-24.39.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989105" comment="libgnutls26-x86-2.4.1-24.39.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215826" version="1" class="patch">
	<metadata>
		<title>gpg2-2.0.9-25.33.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-3746" ref_url="https://www.suse.com/security/cve/CVE-2006-3746/" source="CVE"/>
		<reference ref_id="CVE-2006-6169" ref_url="https://www.suse.com/security/cve/CVE-2006-6169/" source="CVE"/>
		<reference ref_id="CVE-2008-1530" ref_url="https://www.suse.com/security/cve/CVE-2008-1530/" source="CVE"/>
		<reference ref_id="CVE-2010-2547" ref_url="https://www.suse.com/security/cve/CVE-2010-2547/" source="CVE"/>
		<description>
These are all security issues fixed in the gpg2-2.0.9-25.33.27.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3746/">CVE-2006-3746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3746">CVE-2006-3746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6169/">CVE-2006-6169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6169">CVE-2006-6169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1530/">CVE-2008-1530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1530">CVE-2008-1530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2547/">CVE-2010-2547 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2547">CVE-2010-2547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989106" comment="gpg2-2.0.9-25.33.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989107" comment="gpg2-lang-2.0.9-25.33.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215827" version="1" class="patch">
	<metadata>
		<title>gstreamer-0_10-plugins-base-0.10.35-5.15.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0586" ref_url="https://www.suse.com/security/cve/CVE-2009-0586/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-0_10-plugins-base-0.10.35-5.15.8 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0586/">CVE-2009-0586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0586">CVE-2009-0586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989108" comment="gstreamer-0_10-plugins-base-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989109" comment="gstreamer-0_10-plugins-base-32bit-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989110" comment="gstreamer-0_10-plugins-base-doc-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989111" comment="gstreamer-0_10-plugins-base-lang-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989112" comment="gstreamer-0_10-plugins-base-x86-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989113" comment="libgstapp-0_10-0-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989114" comment="libgstapp-0_10-0-32bit-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989115" comment="libgstapp-0_10-0-x86-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989116" comment="libgstinterfaces-0_10-0-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989117" comment="libgstinterfaces-0_10-0-32bit-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989118" comment="libgstinterfaces-0_10-0-x86-0.10.35-5.15.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215828" version="1" class="patch">
	<metadata>
		<title>gstreamer-0_10-plugins-good-0.10.30-5.8.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-1686" ref_url="https://www.suse.com/security/cve/CVE-2008-1686/" source="CVE"/>
		<reference ref_id="CVE-2009-0386" ref_url="https://www.suse.com/security/cve/CVE-2009-0386/" source="CVE"/>
		<reference ref_id="CVE-2009-0387" ref_url="https://www.suse.com/security/cve/CVE-2009-0387/" source="CVE"/>
		<reference ref_id="CVE-2009-0397" ref_url="https://www.suse.com/security/cve/CVE-2009-0397/" source="CVE"/>
		<reference ref_id="CVE-2009-1932" ref_url="https://www.suse.com/security/cve/CVE-2009-1932/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-0_10-plugins-good-0.10.30-5.8.11 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1686/">CVE-2008-1686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1686">CVE-2008-1686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0386/">CVE-2009-0386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0386">CVE-2009-0386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0387/">CVE-2009-0387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0387">CVE-2009-0387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0397/">CVE-2009-0397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0397">CVE-2009-0397 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1932/">CVE-2009-1932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1932">CVE-2009-1932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989119" comment="gstreamer-0_10-plugins-good-0.10.30-5.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989120" comment="gstreamer-0_10-plugins-good-doc-0.10.30-5.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989121" comment="gstreamer-0_10-plugins-good-lang-0.10.30-5.8.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215829" version="1" class="patch">
	<metadata>
		<title>gtk2-2.18.9-0.21.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-0010" ref_url="https://www.suse.com/security/cve/CVE-2007-0010/" source="CVE"/>
		<description>
These are all security issues fixed in the gtk2-2.18.9-0.21.4 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0010/">CVE-2007-0010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0010">CVE-2007-0010 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989122" comment="gtk2-2.18.9-0.21.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989123" comment="gtk2-32bit-2.18.9-0.21.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989124" comment="gtk2-doc-2.18.9-0.21.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989125" comment="gtk2-lang-2.18.9-0.21.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989126" comment="gtk2-x86-2.18.9-0.21.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215830" version="1" class="patch">
	<metadata>
		<title>gvim-7.2-8.15.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-2438" ref_url="https://www.suse.com/security/cve/CVE-2007-2438/" source="CVE"/>
		<reference ref_id="CVE-2007-2953" ref_url="https://www.suse.com/security/cve/CVE-2007-2953/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-7.2-8.15.2 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2438/">CVE-2007-2438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2438">CVE-2007-2438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2953/">CVE-2007-2953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2953">CVE-2007-2953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989127" comment="gvim-7.2-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989128" comment="vim-7.2-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989129" comment="vim-base-7.2-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989130" comment="vim-data-7.2-8.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215831" version="1" class="patch">
	<metadata>
		<title>gzip-1.3.12-69.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-2624" ref_url="https://www.suse.com/security/cve/CVE-2009-2624/" source="CVE"/>
		<reference ref_id="CVE-2010-0001" ref_url="https://www.suse.com/security/cve/CVE-2010-0001/" source="CVE"/>
		<description>
These are all security issues fixed in the gzip-1.3.12-69.19.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2624/">CVE-2009-2624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2624">CVE-2009-2624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0001/">CVE-2010-0001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0001">CVE-2010-0001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988565" comment="gzip-1.3.12-69.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215832" version="1" class="patch">
	<metadata>
		<title>hplip-3.11.10-0.6.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2004-0801" ref_url="https://www.suse.com/security/cve/CVE-2004-0801/" source="CVE"/>
		<reference ref_id="CVE-2007-5208" ref_url="https://www.suse.com/security/cve/CVE-2007-5208/" source="CVE"/>
		<reference ref_id="CVE-2010-4267" ref_url="https://www.suse.com/security/cve/CVE-2010-4267/" source="CVE"/>
		<reference ref_id="CVE-2011-2697" ref_url="https://www.suse.com/security/cve/CVE-2011-2697/" source="CVE"/>
		<reference ref_id="CVE-2011-2722" ref_url="https://www.suse.com/security/cve/CVE-2011-2722/" source="CVE"/>
		<description>
These are all security issues fixed in the hplip-3.11.10-0.6.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2004-0801/">CVE-2004-0801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-0801">CVE-2004-0801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5208/">CVE-2007-5208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5208">CVE-2007-5208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4267/">CVE-2010-4267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4267">CVE-2010-4267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2697/">CVE-2011-2697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2697">CVE-2011-2697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2722/">CVE-2011-2722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2722">CVE-2011-2722 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989131" comment="hplip-3.11.10-0.6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989132" comment="hplip-hpijs-3.11.10-0.6.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215833" version="1" class="patch">
	<metadata>
		<title>ipsec-tools-0.7.3-1.1.93 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-1841" ref_url="https://www.suse.com/security/cve/CVE-2007-1841/" source="CVE"/>
		<reference ref_id="CVE-2008-3652" ref_url="https://www.suse.com/security/cve/CVE-2008-3652/" source="CVE"/>
		<description>
These are all security issues fixed in the ipsec-tools-0.7.3-1.1.93 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1841/">CVE-2007-1841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1841">CVE-2007-1841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3652/">CVE-2008-3652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3652">CVE-2008-3652 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988568" comment="ipsec-tools-0.7.3-1.1.93 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215834" version="1" class="patch">
	<metadata>
		<title>java-1_4_2-ibm-1.4.2_sr13.10-0.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-2788" ref_url="https://www.suse.com/security/cve/CVE-2007-2788/" source="CVE"/>
		<reference ref_id="CVE-2007-2789" ref_url="https://www.suse.com/security/cve/CVE-2007-2789/" source="CVE"/>
		<reference ref_id="CVE-2007-3004" ref_url="https://www.suse.com/security/cve/CVE-2007-3004/" source="CVE"/>
		<reference ref_id="CVE-2007-3005" ref_url="https://www.suse.com/security/cve/CVE-2007-3005/" source="CVE"/>
		<reference ref_id="CVE-2007-3655" ref_url="https://www.suse.com/security/cve/CVE-2007-3655/" source="CVE"/>
		<reference ref_id="CVE-2007-3698" ref_url="https://www.suse.com/security/cve/CVE-2007-3698/" source="CVE"/>
		<reference ref_id="CVE-2007-3922" ref_url="https://www.suse.com/security/cve/CVE-2007-3922/" source="CVE"/>
		<reference ref_id="CVE-2007-4381" ref_url="https://www.suse.com/security/cve/CVE-2007-4381/" source="CVE"/>
		<reference ref_id="CVE-2007-5232" ref_url="https://www.suse.com/security/cve/CVE-2007-5232/" source="CVE"/>
		<reference ref_id="CVE-2007-5236" ref_url="https://www.suse.com/security/cve/CVE-2007-5236/" source="CVE"/>
		<reference ref_id="CVE-2007-5238" ref_url="https://www.suse.com/security/cve/CVE-2007-5238/" source="CVE"/>
		<reference ref_id="CVE-2007-5239" ref_url="https://www.suse.com/security/cve/CVE-2007-5239/" source="CVE"/>
		<reference ref_id="CVE-2007-5240" ref_url="https://www.suse.com/security/cve/CVE-2007-5240/" source="CVE"/>
		<reference ref_id="CVE-2007-5273" ref_url="https://www.suse.com/security/cve/CVE-2007-5273/" source="CVE"/>
		<reference ref_id="CVE-2007-5274" ref_url="https://www.suse.com/security/cve/CVE-2007-5274/" source="CVE"/>
		<reference ref_id="CVE-2008-1187" ref_url="https://www.suse.com/security/cve/CVE-2008-1187/" source="CVE"/>
		<reference ref_id="CVE-2008-1189" ref_url="https://www.suse.com/security/cve/CVE-2008-1189/" source="CVE"/>
		<reference ref_id="CVE-2008-1190" ref_url="https://www.suse.com/security/cve/CVE-2008-1190/" source="CVE"/>
		<reference ref_id="CVE-2008-1192" ref_url="https://www.suse.com/security/cve/CVE-2008-1192/" source="CVE"/>
		<reference ref_id="CVE-2008-1195" ref_url="https://www.suse.com/security/cve/CVE-2008-1195/" source="CVE"/>
		<reference ref_id="CVE-2008-1196" ref_url="https://www.suse.com/security/cve/CVE-2008-1196/" source="CVE"/>
		<reference ref_id="CVE-2008-3104" ref_url="https://www.suse.com/security/cve/CVE-2008-3104/" source="CVE"/>
		<reference ref_id="CVE-2008-3112" ref_url="https://www.suse.com/security/cve/CVE-2008-3112/" source="CVE"/>
		<reference ref_id="CVE-2008-3113" ref_url="https://www.suse.com/security/cve/CVE-2008-3113/" source="CVE"/>
		<reference ref_id="CVE-2008-3114" ref_url="https://www.suse.com/security/cve/CVE-2008-3114/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-0084" ref_url="https://www.suse.com/security/cve/CVE-2010-0084/" source="CVE"/>
		<reference ref_id="CVE-2010-0085" ref_url="https://www.suse.com/security/cve/CVE-2010-0085/" source="CVE"/>
		<reference ref_id="CVE-2010-0087" ref_url="https://www.suse.com/security/cve/CVE-2010-0087/" source="CVE"/>
		<reference ref_id="CVE-2010-0088" ref_url="https://www.suse.com/security/cve/CVE-2010-0088/" source="CVE"/>
		<reference ref_id="CVE-2010-0089" ref_url="https://www.suse.com/security/cve/CVE-2010-0089/" source="CVE"/>
		<reference ref_id="CVE-2010-0091" ref_url="https://www.suse.com/security/cve/CVE-2010-0091/" source="CVE"/>
		<reference ref_id="CVE-2010-0095" ref_url="https://www.suse.com/security/cve/CVE-2010-0095/" source="CVE"/>
		<reference ref_id="CVE-2010-0839" ref_url="https://www.suse.com/security/cve/CVE-2010-0839/" source="CVE"/>
		<reference ref_id="CVE-2010-0840" ref_url="https://www.suse.com/security/cve/CVE-2010-0840/" source="CVE"/>
		<reference ref_id="CVE-2010-0841" ref_url="https://www.suse.com/security/cve/CVE-2010-0841/" source="CVE"/>
		<reference ref_id="CVE-2010-0842" ref_url="https://www.suse.com/security/cve/CVE-2010-0842/" source="CVE"/>
		<reference ref_id="CVE-2010-0843" ref_url="https://www.suse.com/security/cve/CVE-2010-0843/" source="CVE"/>
		<reference ref_id="CVE-2010-0844" ref_url="https://www.suse.com/security/cve/CVE-2010-0844/" source="CVE"/>
		<reference ref_id="CVE-2010-0846" ref_url="https://www.suse.com/security/cve/CVE-2010-0846/" source="CVE"/>
		<reference ref_id="CVE-2010-0847" ref_url="https://www.suse.com/security/cve/CVE-2010-0847/" source="CVE"/>
		<reference ref_id="CVE-2010-0848" ref_url="https://www.suse.com/security/cve/CVE-2010-0848/" source="CVE"/>
		<reference ref_id="CVE-2010-0849" ref_url="https://www.suse.com/security/cve/CVE-2010-0849/" source="CVE"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-3541" ref_url="https://www.suse.com/security/cve/CVE-2010-3541/" source="CVE"/>
		<reference ref_id="CVE-2010-3548" ref_url="https://www.suse.com/security/cve/CVE-2010-3548/" source="CVE"/>
		<reference ref_id="CVE-2010-3549" ref_url="https://www.suse.com/security/cve/CVE-2010-3549/" source="CVE"/>
		<reference ref_id="CVE-2010-3551" ref_url="https://www.suse.com/security/cve/CVE-2010-3551/" source="CVE"/>
		<reference ref_id="CVE-2010-3553" ref_url="https://www.suse.com/security/cve/CVE-2010-3553/" source="CVE"/>
		<reference ref_id="CVE-2010-3556" ref_url="https://www.suse.com/security/cve/CVE-2010-3556/" source="CVE"/>
		<reference ref_id="CVE-2010-3557" ref_url="https://www.suse.com/security/cve/CVE-2010-3557/" source="CVE"/>
		<reference ref_id="CVE-2010-3562" ref_url="https://www.suse.com/security/cve/CVE-2010-3562/" source="CVE"/>
		<reference ref_id="CVE-2010-3565" ref_url="https://www.suse.com/security/cve/CVE-2010-3565/" source="CVE"/>
		<reference ref_id="CVE-2010-3568" ref_url="https://www.suse.com/security/cve/CVE-2010-3568/" source="CVE"/>
		<reference ref_id="CVE-2010-3569" ref_url="https://www.suse.com/security/cve/CVE-2010-3569/" source="CVE"/>
		<reference ref_id="CVE-2010-3571" ref_url="https://www.suse.com/security/cve/CVE-2010-3571/" source="CVE"/>
		<reference ref_id="CVE-2010-3572" ref_url="https://www.suse.com/security/cve/CVE-2010-3572/" source="CVE"/>
		<reference ref_id="CVE-2010-3574" ref_url="https://www.suse.com/security/cve/CVE-2010-3574/" source="CVE"/>
		<reference ref_id="CVE-2010-4476" ref_url="https://www.suse.com/security/cve/CVE-2010-4476/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_4_2-ibm-1.4.2_sr13.10-0.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2788/">CVE-2007-2788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2788">CVE-2007-2788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2789/">CVE-2007-2789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2789">CVE-2007-2789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3004/">CVE-2007-3004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3004">CVE-2007-3004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3005/">CVE-2007-3005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3005">CVE-2007-3005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3655/">CVE-2007-3655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3655">CVE-2007-3655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3698/">CVE-2007-3698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3698">CVE-2007-3698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3922/">CVE-2007-3922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3922">CVE-2007-3922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4381/">CVE-2007-4381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4381">CVE-2007-4381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5232/">CVE-2007-5232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5232">CVE-2007-5232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5236/">CVE-2007-5236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5236">CVE-2007-5236 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5238/">CVE-2007-5238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5238">CVE-2007-5238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5239/">CVE-2007-5239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5239">CVE-2007-5239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5240/">CVE-2007-5240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5240">CVE-2007-5240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5273/">CVE-2007-5273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5273">CVE-2007-5273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5274/">CVE-2007-5274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5274">CVE-2007-5274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1187/">CVE-2008-1187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1187">CVE-2008-1187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1189/">CVE-2008-1189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1189">CVE-2008-1189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1190/">CVE-2008-1190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1190">CVE-2008-1190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1192/">CVE-2008-1192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1192">CVE-2008-1192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1195/">CVE-2008-1195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1195">CVE-2008-1195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1196/">CVE-2008-1196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1196">CVE-2008-1196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3104/">CVE-2008-3104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3104">CVE-2008-3104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3112/">CVE-2008-3112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3112">CVE-2008-3112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3113/">CVE-2008-3113 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3113">CVE-2008-3113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3114/">CVE-2008-3114 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3114">CVE-2008-3114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0084/">CVE-2010-0084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0084">CVE-2010-0084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0085/">CVE-2010-0085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0085">CVE-2010-0085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0087/">CVE-2010-0087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0087">CVE-2010-0087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0088/">CVE-2010-0088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0088">CVE-2010-0088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0089/">CVE-2010-0089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0089">CVE-2010-0089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0091/">CVE-2010-0091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0091">CVE-2010-0091 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0095/">CVE-2010-0095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0095">CVE-2010-0095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0839/">CVE-2010-0839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0839">CVE-2010-0839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0840/">CVE-2010-0840 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-0840">CVE-2010-0840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0841/">CVE-2010-0841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0841">CVE-2010-0841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0842/">CVE-2010-0842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0842">CVE-2010-0842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0843/">CVE-2010-0843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0843">CVE-2010-0843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0844/">CVE-2010-0844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0844">CVE-2010-0844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0846/">CVE-2010-0846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0846">CVE-2010-0846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0847/">CVE-2010-0847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0847">CVE-2010-0847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0848/">CVE-2010-0848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0848">CVE-2010-0848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0849/">CVE-2010-0849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0849">CVE-2010-0849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1321">CVE-2010-1321 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3541/">CVE-2010-3541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3541">CVE-2010-3541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3548/">CVE-2010-3548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3548">CVE-2010-3548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3549/">CVE-2010-3549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3549">CVE-2010-3549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3551/">CVE-2010-3551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3551">CVE-2010-3551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3553/">CVE-2010-3553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3553">CVE-2010-3553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3556/">CVE-2010-3556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3556">CVE-2010-3556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3557/">CVE-2010-3557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3557">CVE-2010-3557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3562/">CVE-2010-3562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3562">CVE-2010-3562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3565/">CVE-2010-3565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3565">CVE-2010-3565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3568/">CVE-2010-3568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3568">CVE-2010-3568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3569/">CVE-2010-3569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3569">CVE-2010-3569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3571/">CVE-2010-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3571">CVE-2010-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3572/">CVE-2010-3572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3572">CVE-2010-3572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3574/">CVE-2010-3574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3574">CVE-2010-3574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4476/">CVE-2010-4476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4476">CVE-2010-4476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989133" comment="java-1_4_2-ibm-1.4.2_sr13.10-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989134" comment="java-1_4_2-ibm-jdbc-1.4.2_sr13.10-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989135" comment="java-1_4_2-ibm-plugin-1.4.2_sr13.10-0.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215835" version="1" class="patch">
	<metadata>
		<title>java-1_6_0-ibm-1.6.0_sr9.3-0.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-1187" ref_url="https://www.suse.com/security/cve/CVE-2008-1187/" source="CVE"/>
		<reference ref_id="CVE-2008-1188" ref_url="https://www.suse.com/security/cve/CVE-2008-1188/" source="CVE"/>
		<reference ref_id="CVE-2008-1189" ref_url="https://www.suse.com/security/cve/CVE-2008-1189/" source="CVE"/>
		<reference ref_id="CVE-2008-1190" ref_url="https://www.suse.com/security/cve/CVE-2008-1190/" source="CVE"/>
		<reference ref_id="CVE-2008-1191" ref_url="https://www.suse.com/security/cve/CVE-2008-1191/" source="CVE"/>
		<reference ref_id="CVE-2008-1192" ref_url="https://www.suse.com/security/cve/CVE-2008-1192/" source="CVE"/>
		<reference ref_id="CVE-2008-1193" ref_url="https://www.suse.com/security/cve/CVE-2008-1193/" source="CVE"/>
		<reference ref_id="CVE-2008-1194" ref_url="https://www.suse.com/security/cve/CVE-2008-1194/" source="CVE"/>
		<reference ref_id="CVE-2008-1195" ref_url="https://www.suse.com/security/cve/CVE-2008-1195/" source="CVE"/>
		<reference ref_id="CVE-2008-1196" ref_url="https://www.suse.com/security/cve/CVE-2008-1196/" source="CVE"/>
		<reference ref_id="CVE-2008-5351" ref_url="https://www.suse.com/security/cve/CVE-2008-5351/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-0771" ref_url="https://www.suse.com/security/cve/CVE-2010-0771/" source="CVE"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-3541" ref_url="https://www.suse.com/security/cve/CVE-2010-3541/" source="CVE"/>
		<reference ref_id="CVE-2010-3548" ref_url="https://www.suse.com/security/cve/CVE-2010-3548/" source="CVE"/>
		<reference ref_id="CVE-2010-3549" ref_url="https://www.suse.com/security/cve/CVE-2010-3549/" source="CVE"/>
		<reference ref_id="CVE-2010-3550" ref_url="https://www.suse.com/security/cve/CVE-2010-3550/" source="CVE"/>
		<reference ref_id="CVE-2010-3551" ref_url="https://www.suse.com/security/cve/CVE-2010-3551/" source="CVE"/>
		<reference ref_id="CVE-2010-3553" ref_url="https://www.suse.com/security/cve/CVE-2010-3553/" source="CVE"/>
		<reference ref_id="CVE-2010-3555" ref_url="https://www.suse.com/security/cve/CVE-2010-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-3556" ref_url="https://www.suse.com/security/cve/CVE-2010-3556/" source="CVE"/>
		<reference ref_id="CVE-2010-3557" ref_url="https://www.suse.com/security/cve/CVE-2010-3557/" source="CVE"/>
		<reference ref_id="CVE-2010-3558" ref_url="https://www.suse.com/security/cve/CVE-2010-3558/" source="CVE"/>
		<reference ref_id="CVE-2010-3559" ref_url="https://www.suse.com/security/cve/CVE-2010-3559/" source="CVE"/>
		<reference ref_id="CVE-2010-3560" ref_url="https://www.suse.com/security/cve/CVE-2010-3560/" source="CVE"/>
		<reference ref_id="CVE-2010-3562" ref_url="https://www.suse.com/security/cve/CVE-2010-3562/" source="CVE"/>
		<reference ref_id="CVE-2010-3563" ref_url="https://www.suse.com/security/cve/CVE-2010-3563/" source="CVE"/>
		<reference ref_id="CVE-2010-3565" ref_url="https://www.suse.com/security/cve/CVE-2010-3565/" source="CVE"/>
		<reference ref_id="CVE-2010-3566" ref_url="https://www.suse.com/security/cve/CVE-2010-3566/" source="CVE"/>
		<reference ref_id="CVE-2010-3567" ref_url="https://www.suse.com/security/cve/CVE-2010-3567/" source="CVE"/>
		<reference ref_id="CVE-2010-3568" ref_url="https://www.suse.com/security/cve/CVE-2010-3568/" source="CVE"/>
		<reference ref_id="CVE-2010-3569" ref_url="https://www.suse.com/security/cve/CVE-2010-3569/" source="CVE"/>
		<reference ref_id="CVE-2010-3571" ref_url="https://www.suse.com/security/cve/CVE-2010-3571/" source="CVE"/>
		<reference ref_id="CVE-2010-3572" ref_url="https://www.suse.com/security/cve/CVE-2010-3572/" source="CVE"/>
		<reference ref_id="CVE-2010-3573" ref_url="https://www.suse.com/security/cve/CVE-2010-3573/" source="CVE"/>
		<reference ref_id="CVE-2010-3574" ref_url="https://www.suse.com/security/cve/CVE-2010-3574/" source="CVE"/>
		<reference ref_id="CVE-2010-4476" ref_url="https://www.suse.com/security/cve/CVE-2010-4476/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_6_0-ibm-1.6.0_sr9.3-0.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1187/">CVE-2008-1187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1187">CVE-2008-1187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1188/">CVE-2008-1188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1188">CVE-2008-1188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1189/">CVE-2008-1189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1189">CVE-2008-1189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1190/">CVE-2008-1190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1190">CVE-2008-1190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1191/">CVE-2008-1191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1191">CVE-2008-1191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1192/">CVE-2008-1192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1192">CVE-2008-1192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1193/">CVE-2008-1193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1193">CVE-2008-1193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1194/">CVE-2008-1194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1194">CVE-2008-1194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1195/">CVE-2008-1195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1195">CVE-2008-1195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1196/">CVE-2008-1196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1196">CVE-2008-1196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5351/">CVE-2008-5351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5351">CVE-2008-5351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0771/">CVE-2010-0771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0771">CVE-2010-0771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1321">CVE-2010-1321 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3541/">CVE-2010-3541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3541">CVE-2010-3541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3548/">CVE-2010-3548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3548">CVE-2010-3548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3549/">CVE-2010-3549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3549">CVE-2010-3549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3550/">CVE-2010-3550 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3550">CVE-2010-3550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3551/">CVE-2010-3551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3551">CVE-2010-3551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3553/">CVE-2010-3553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3553">CVE-2010-3553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3555/">CVE-2010-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3555">CVE-2010-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3556/">CVE-2010-3556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3556">CVE-2010-3556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3557/">CVE-2010-3557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3557">CVE-2010-3557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3558/">CVE-2010-3558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3558">CVE-2010-3558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3559/">CVE-2010-3559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3559">CVE-2010-3559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3560/">CVE-2010-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3560">CVE-2010-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3562/">CVE-2010-3562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3562">CVE-2010-3562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3563/">CVE-2010-3563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3563">CVE-2010-3563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3565/">CVE-2010-3565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3565">CVE-2010-3565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3566/">CVE-2010-3566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3566">CVE-2010-3566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3567/">CVE-2010-3567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3567">CVE-2010-3567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3568/">CVE-2010-3568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3568">CVE-2010-3568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3569/">CVE-2010-3569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3569">CVE-2010-3569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3571/">CVE-2010-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3571">CVE-2010-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3572/">CVE-2010-3572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3572">CVE-2010-3572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3573/">CVE-2010-3573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3573">CVE-2010-3573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3574/">CVE-2010-3574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3574">CVE-2010-3574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4476/">CVE-2010-4476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4476">CVE-2010-4476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989136" comment="java-1_6_0-ibm-1.6.0_sr9.3-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989137" comment="java-1_6_0-ibm-alsa-1.6.0_sr9.3-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989138" comment="java-1_6_0-ibm-fonts-1.6.0_sr9.3-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989139" comment="java-1_6_0-ibm-jdbc-1.6.0_sr9.3-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989140" comment="java-1_6_0-ibm-plugin-1.6.0_sr9.3-0.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215836" version="1" class="patch">
	<metadata>
		<title>kbd-1.14.1-16.31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0460" ref_url="https://www.suse.com/security/cve/CVE-2011-0460/" source="CVE"/>
		<description>
These are all security issues fixed in the kbd-1.14.1-16.31.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0460/">CVE-2011-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0460">CVE-2011-0460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989141" comment="kbd-1.14.1-16.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215837" version="1" class="patch">
	<metadata>
		<title>kde4-kgreeter-plugins-4.3.5-0.10.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-0436" ref_url="https://www.suse.com/security/cve/CVE-2010-0436/" source="CVE"/>
		<description>
These are all security issues fixed in the kde4-kgreeter-plugins-4.3.5-0.10.2 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0436/">CVE-2010-0436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0436">CVE-2010-0436 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989142" comment="kde4-kgreeter-plugins-4.3.5-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988578" comment="kdebase4-wallpapers-4.3.5-0.8.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989143" comment="kdebase4-workspace-4.3.5-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989144" comment="kdebase4-workspace-ksysguardd-4.3.5-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989145" comment="kdm-4.3.5-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989146" comment="kwin-4.3.5-0.10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215838" version="1" class="patch">
	<metadata>
		<title>kdebase3-runtime-3.5.10-20.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-4569" ref_url="https://www.suse.com/security/cve/CVE-2007-4569/" source="CVE"/>
		<description>
These are all security issues fixed in the kdebase3-runtime-3.5.10-20.31 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4569/">CVE-2007-4569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4569">CVE-2007-4569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988583" comment="kdebase3-runtime-3.5.10-20.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988584" comment="kdebase3-runtime-32bit-3.5.10-20.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988585" comment="kdebase3-runtime-x86-3.5.10-20.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215839" version="1" class="patch">
	<metadata>
		<title>kdelibs3-3.5.10-23.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-3820" ref_url="https://www.suse.com/security/cve/CVE-2007-3820/" source="CVE"/>
		<reference ref_id="CVE-2007-4224" ref_url="https://www.suse.com/security/cve/CVE-2007-4224/" source="CVE"/>
		<reference ref_id="CVE-2007-4225" ref_url="https://www.suse.com/security/cve/CVE-2007-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-1671" ref_url="https://www.suse.com/security/cve/CVE-2008-1671/" source="CVE"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<description>
These are all security issues fixed in the kdelibs3-3.5.10-23.27.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3820/">CVE-2007-3820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3820">CVE-2007-3820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4224/">CVE-2007-4224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4224">CVE-2007-4224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4225/">CVE-2007-4225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4225">CVE-2007-4225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1671/">CVE-2008-1671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1671">CVE-2008-1671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0689">CVE-2009-0689 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988586" comment="kdelibs3-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988587" comment="kdelibs3-32bit-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988588" comment="kdelibs3-default-style-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988589" comment="kdelibs3-default-style-32bit-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988590" comment="kdelibs3-default-style-x86-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988591" comment="kdelibs3-x86-3.5.10-23.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215840" version="1" class="patch">
	<metadata>
		<title>kdelibs4-4.3.5-0.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2011-1168" ref_url="https://www.suse.com/security/cve/CVE-2011-1168/" source="CVE"/>
		<description>
These are all security issues fixed in the kdelibs4-4.3.5-0.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0689">CVE-2009-0689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1168/">CVE-2011-1168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1168">CVE-2011-1168 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989147" comment="kdelibs4-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989148" comment="kdelibs4-core-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989149" comment="kdelibs4-doc-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989150" comment="libkde4-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989151" comment="libkde4-32bit-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989152" comment="libkde4-x86-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989153" comment="libkdecore4-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989154" comment="libkdecore4-32bit-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989155" comment="libkdecore4-x86-4.3.5-0.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215841" version="1" class="patch">
	<metadata>
		<title>kdenetwork4-filesharing-4.3.5-0.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-1000" ref_url="https://www.suse.com/security/cve/CVE-2010-1000/" source="CVE"/>
		<description>
These are all security issues fixed in the kdenetwork4-filesharing-4.3.5-0.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1000/">CVE-2010-1000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1000">CVE-2010-1000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989156" comment="kdenetwork4-filesharing-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989157" comment="kget-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989158" comment="kopete-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989159" comment="krdc-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989160" comment="krfb-4.3.5-0.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215842" version="1" class="patch">
	<metadata>
		<title>kernel-default-3.0.13-0.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-0007" ref_url="https://www.suse.com/security/cve/CVE-2008-0007/" source="CVE"/>
		<reference ref_id="CVE-2008-0009" ref_url="https://www.suse.com/security/cve/CVE-2008-0009/" source="CVE"/>
		<reference ref_id="CVE-2008-0010" ref_url="https://www.suse.com/security/cve/CVE-2008-0010/" source="CVE"/>
		<reference ref_id="CVE-2008-1375" ref_url="https://www.suse.com/security/cve/CVE-2008-1375/" source="CVE"/>
		<reference ref_id="CVE-2008-1669" ref_url="https://www.suse.com/security/cve/CVE-2008-1669/" source="CVE"/>
		<reference ref_id="CVE-2008-1673" ref_url="https://www.suse.com/security/cve/CVE-2008-1673/" source="CVE"/>
		<reference ref_id="CVE-2008-1675" ref_url="https://www.suse.com/security/cve/CVE-2008-1675/" source="CVE"/>
		<reference ref_id="CVE-2008-3528" ref_url="https://www.suse.com/security/cve/CVE-2008-3528/" source="CVE"/>
		<reference ref_id="CVE-2008-3831" ref_url="https://www.suse.com/security/cve/CVE-2008-3831/" source="CVE"/>
		<reference ref_id="CVE-2008-5079" ref_url="https://www.suse.com/security/cve/CVE-2008-5079/" source="CVE"/>
		<reference ref_id="CVE-2008-5182" ref_url="https://www.suse.com/security/cve/CVE-2008-5182/" source="CVE"/>
		<reference ref_id="CVE-2008-5300" ref_url="https://www.suse.com/security/cve/CVE-2008-5300/" source="CVE"/>
		<reference ref_id="CVE-2009-0029" ref_url="https://www.suse.com/security/cve/CVE-2009-0029/" source="CVE"/>
		<reference ref_id="CVE-2009-3939" ref_url="https://www.suse.com/security/cve/CVE-2009-3939/" source="CVE"/>
		<reference ref_id="CVE-2009-4026" ref_url="https://www.suse.com/security/cve/CVE-2009-4026/" source="CVE"/>
		<reference ref_id="CVE-2009-4027" ref_url="https://www.suse.com/security/cve/CVE-2009-4027/" source="CVE"/>
		<reference ref_id="CVE-2009-4131" ref_url="https://www.suse.com/security/cve/CVE-2009-4131/" source="CVE"/>
		<reference ref_id="CVE-2009-4138" ref_url="https://www.suse.com/security/cve/CVE-2009-4138/" source="CVE"/>
		<reference ref_id="CVE-2009-4536" ref_url="https://www.suse.com/security/cve/CVE-2009-4536/" source="CVE"/>
		<reference ref_id="CVE-2009-4537" ref_url="https://www.suse.com/security/cve/CVE-2009-4537/" source="CVE"/>
		<reference ref_id="CVE-2009-4538" ref_url="https://www.suse.com/security/cve/CVE-2009-4538/" source="CVE"/>
		<reference ref_id="CVE-2010-0415" ref_url="https://www.suse.com/security/cve/CVE-2010-0415/" source="CVE"/>
		<reference ref_id="CVE-2010-0622" ref_url="https://www.suse.com/security/cve/CVE-2010-0622/" source="CVE"/>
		<reference ref_id="CVE-2010-0623" ref_url="https://www.suse.com/security/cve/CVE-2010-0623/" source="CVE"/>
		<reference ref_id="CVE-2010-1146" ref_url="https://www.suse.com/security/cve/CVE-2010-1146/" source="CVE"/>
		<reference ref_id="CVE-2010-1173" ref_url="https://www.suse.com/security/cve/CVE-2010-1173/" source="CVE"/>
		<reference ref_id="CVE-2010-1437" ref_url="https://www.suse.com/security/cve/CVE-2010-1437/" source="CVE"/>
		<reference ref_id="CVE-2010-1641" ref_url="https://www.suse.com/security/cve/CVE-2010-1641/" source="CVE"/>
		<reference ref_id="CVE-2010-2066" ref_url="https://www.suse.com/security/cve/CVE-2010-2066/" source="CVE"/>
		<reference ref_id="CVE-2010-2798" ref_url="https://www.suse.com/security/cve/CVE-2010-2798/" source="CVE"/>
		<reference ref_id="CVE-2010-2803" ref_url="https://www.suse.com/security/cve/CVE-2010-2803/" source="CVE"/>
		<reference ref_id="CVE-2010-2942" ref_url="https://www.suse.com/security/cve/CVE-2010-2942/" source="CVE"/>
		<reference ref_id="CVE-2010-2943" ref_url="https://www.suse.com/security/cve/CVE-2010-2943/" source="CVE"/>
		<reference ref_id="CVE-2010-2946" ref_url="https://www.suse.com/security/cve/CVE-2010-2946/" source="CVE"/>
		<reference ref_id="CVE-2010-2954" ref_url="https://www.suse.com/security/cve/CVE-2010-2954/" source="CVE"/>
		<reference ref_id="CVE-2010-2955" ref_url="https://www.suse.com/security/cve/CVE-2010-2955/" source="CVE"/>
		<reference ref_id="CVE-2010-2959" ref_url="https://www.suse.com/security/cve/CVE-2010-2959/" source="CVE"/>
		<reference ref_id="CVE-2010-2960" ref_url="https://www.suse.com/security/cve/CVE-2010-2960/" source="CVE"/>
		<reference ref_id="CVE-2010-2962" ref_url="https://www.suse.com/security/cve/CVE-2010-2962/" source="CVE"/>
		<reference ref_id="CVE-2010-2963" ref_url="https://www.suse.com/security/cve/CVE-2010-2963/" source="CVE"/>
		<reference ref_id="CVE-2010-3015" ref_url="https://www.suse.com/security/cve/CVE-2010-3015/" source="CVE"/>
		<reference ref_id="CVE-2010-3078" ref_url="https://www.suse.com/security/cve/CVE-2010-3078/" source="CVE"/>
		<reference ref_id="CVE-2010-3079" ref_url="https://www.suse.com/security/cve/CVE-2010-3079/" source="CVE"/>
		<reference ref_id="CVE-2010-3080" ref_url="https://www.suse.com/security/cve/CVE-2010-3080/" source="CVE"/>
		<reference ref_id="CVE-2010-3081" ref_url="https://www.suse.com/security/cve/CVE-2010-3081/" source="CVE"/>
		<reference ref_id="CVE-2010-3084" ref_url="https://www.suse.com/security/cve/CVE-2010-3084/" source="CVE"/>
		<reference ref_id="CVE-2010-3296" ref_url="https://www.suse.com/security/cve/CVE-2010-3296/" source="CVE"/>
		<reference ref_id="CVE-2010-3297" ref_url="https://www.suse.com/security/cve/CVE-2010-3297/" source="CVE"/>
		<reference ref_id="CVE-2010-3298" ref_url="https://www.suse.com/security/cve/CVE-2010-3298/" source="CVE"/>
		<reference ref_id="CVE-2010-3301" ref_url="https://www.suse.com/security/cve/CVE-2010-3301/" source="CVE"/>
		<reference ref_id="CVE-2010-3310" ref_url="https://www.suse.com/security/cve/CVE-2010-3310/" source="CVE"/>
		<reference ref_id="CVE-2010-3437" ref_url="https://www.suse.com/security/cve/CVE-2010-3437/" source="CVE"/>
		<reference ref_id="CVE-2010-3699" ref_url="https://www.suse.com/security/cve/CVE-2010-3699/" source="CVE"/>
		<reference ref_id="CVE-2010-3705" ref_url="https://www.suse.com/security/cve/CVE-2010-3705/" source="CVE"/>
		<reference ref_id="CVE-2010-3861" ref_url="https://www.suse.com/security/cve/CVE-2010-3861/" source="CVE"/>
		<reference ref_id="CVE-2010-3873" ref_url="https://www.suse.com/security/cve/CVE-2010-3873/" source="CVE"/>
		<reference ref_id="CVE-2010-3874" ref_url="https://www.suse.com/security/cve/CVE-2010-3874/" source="CVE"/>
		<reference ref_id="CVE-2010-3875" ref_url="https://www.suse.com/security/cve/CVE-2010-3875/" source="CVE"/>
		<reference ref_id="CVE-2010-3876" ref_url="https://www.suse.com/security/cve/CVE-2010-3876/" source="CVE"/>
		<reference ref_id="CVE-2010-3877" ref_url="https://www.suse.com/security/cve/CVE-2010-3877/" source="CVE"/>
		<reference ref_id="CVE-2010-3880" ref_url="https://www.suse.com/security/cve/CVE-2010-3880/" source="CVE"/>
		<reference ref_id="CVE-2010-3881" ref_url="https://www.suse.com/security/cve/CVE-2010-3881/" source="CVE"/>
		<reference ref_id="CVE-2010-4072" ref_url="https://www.suse.com/security/cve/CVE-2010-4072/" source="CVE"/>
		<reference ref_id="CVE-2010-4073" ref_url="https://www.suse.com/security/cve/CVE-2010-4073/" source="CVE"/>
		<reference ref_id="CVE-2010-4075" ref_url="https://www.suse.com/security/cve/CVE-2010-4075/" source="CVE"/>
		<reference ref_id="CVE-2010-4076" ref_url="https://www.suse.com/security/cve/CVE-2010-4076/" source="CVE"/>
		<reference ref_id="CVE-2010-4077" ref_url="https://www.suse.com/security/cve/CVE-2010-4077/" source="CVE"/>
		<reference ref_id="CVE-2010-4082" ref_url="https://www.suse.com/security/cve/CVE-2010-4082/" source="CVE"/>
		<reference ref_id="CVE-2010-4083" ref_url="https://www.suse.com/security/cve/CVE-2010-4083/" source="CVE"/>
		<reference ref_id="CVE-2010-4157" ref_url="https://www.suse.com/security/cve/CVE-2010-4157/" source="CVE"/>
		<reference ref_id="CVE-2010-4158" ref_url="https://www.suse.com/security/cve/CVE-2010-4158/" source="CVE"/>
		<reference ref_id="CVE-2010-4160" ref_url="https://www.suse.com/security/cve/CVE-2010-4160/" source="CVE"/>
		<reference ref_id="CVE-2010-4162" ref_url="https://www.suse.com/security/cve/CVE-2010-4162/" source="CVE"/>
		<reference ref_id="CVE-2010-4163" ref_url="https://www.suse.com/security/cve/CVE-2010-4163/" source="CVE"/>
		<reference ref_id="CVE-2010-4164" ref_url="https://www.suse.com/security/cve/CVE-2010-4164/" source="CVE"/>
		<reference ref_id="CVE-2010-4165" ref_url="https://www.suse.com/security/cve/CVE-2010-4165/" source="CVE"/>
		<reference ref_id="CVE-2010-4169" ref_url="https://www.suse.com/security/cve/CVE-2010-4169/" source="CVE"/>
		<reference ref_id="CVE-2010-4175" ref_url="https://www.suse.com/security/cve/CVE-2010-4175/" source="CVE"/>
		<reference ref_id="CVE-2010-4243" ref_url="https://www.suse.com/security/cve/CVE-2010-4243/" source="CVE"/>
		<reference ref_id="CVE-2010-4251" ref_url="https://www.suse.com/security/cve/CVE-2010-4251/" source="CVE"/>
		<reference ref_id="CVE-2010-4258" ref_url="https://www.suse.com/security/cve/CVE-2010-4258/" source="CVE"/>
		<reference ref_id="CVE-2010-4342" ref_url="https://www.suse.com/security/cve/CVE-2010-4342/" source="CVE"/>
		<reference ref_id="CVE-2010-4529" ref_url="https://www.suse.com/security/cve/CVE-2010-4529/" source="CVE"/>
		<reference ref_id="CVE-2010-4656" ref_url="https://www.suse.com/security/cve/CVE-2010-4656/" source="CVE"/>
		<reference ref_id="CVE-2010-4668" ref_url="https://www.suse.com/security/cve/CVE-2010-4668/" source="CVE"/>
		<reference ref_id="CVE-2011-0521" ref_url="https://www.suse.com/security/cve/CVE-2011-0521/" source="CVE"/>
		<reference ref_id="CVE-2011-0710" ref_url="https://www.suse.com/security/cve/CVE-2011-0710/" source="CVE"/>
		<reference ref_id="CVE-2011-0711" ref_url="https://www.suse.com/security/cve/CVE-2011-0711/" source="CVE"/>
		<reference ref_id="CVE-2011-0712" ref_url="https://www.suse.com/security/cve/CVE-2011-0712/" source="CVE"/>
		<reference ref_id="CVE-2011-1016" ref_url="https://www.suse.com/security/cve/CVE-2011-1016/" source="CVE"/>
		<reference ref_id="CVE-2011-1017" ref_url="https://www.suse.com/security/cve/CVE-2011-1017/" source="CVE"/>
		<reference ref_id="CVE-2011-1020" ref_url="https://www.suse.com/security/cve/CVE-2011-1020/" source="CVE"/>
		<reference ref_id="CVE-2011-1160" ref_url="https://www.suse.com/security/cve/CVE-2011-1160/" source="CVE"/>
		<reference ref_id="CVE-2011-1180" ref_url="https://www.suse.com/security/cve/CVE-2011-1180/" source="CVE"/>
		<reference ref_id="CVE-2011-1182" ref_url="https://www.suse.com/security/cve/CVE-2011-1182/" source="CVE"/>
		<reference ref_id="CVE-2011-1478" ref_url="https://www.suse.com/security/cve/CVE-2011-1478/" source="CVE"/>
		<reference ref_id="CVE-2011-1573" ref_url="https://www.suse.com/security/cve/CVE-2011-1573/" source="CVE"/>
		<reference ref_id="CVE-2011-1577" ref_url="https://www.suse.com/security/cve/CVE-2011-1577/" source="CVE"/>
		<reference ref_id="CVE-2011-1593" ref_url="https://www.suse.com/security/cve/CVE-2011-1593/" source="CVE"/>
		<reference ref_id="CVE-2011-2182" ref_url="https://www.suse.com/security/cve/CVE-2011-2182/" source="CVE"/>
		<reference ref_id="CVE-2011-2183" ref_url="https://www.suse.com/security/cve/CVE-2011-2183/" source="CVE"/>
		<reference ref_id="CVE-2011-2203" ref_url="https://www.suse.com/security/cve/CVE-2011-2203/" source="CVE"/>
		<reference ref_id="CVE-2011-2479" ref_url="https://www.suse.com/security/cve/CVE-2011-2479/" source="CVE"/>
		<reference ref_id="CVE-2011-2491" ref_url="https://www.suse.com/security/cve/CVE-2011-2491/" source="CVE"/>
		<reference ref_id="CVE-2011-2495" ref_url="https://www.suse.com/security/cve/CVE-2011-2495/" source="CVE"/>
		<reference ref_id="CVE-2011-2496" ref_url="https://www.suse.com/security/cve/CVE-2011-2496/" source="CVE"/>
		<reference ref_id="CVE-2011-3191" ref_url="https://www.suse.com/security/cve/CVE-2011-3191/" source="CVE"/>
		<reference ref_id="CVE-2011-4097" ref_url="https://www.suse.com/security/cve/CVE-2011-4097/" source="CVE"/>
		<reference ref_id="CVE-2011-4127" ref_url="https://www.suse.com/security/cve/CVE-2011-4127/" source="CVE"/>
		<reference ref_id="CVE-2011-4131" ref_url="https://www.suse.com/security/cve/CVE-2011-4131/" source="CVE"/>
		<reference ref_id="CVE-2011-4604" ref_url="https://www.suse.com/security/cve/CVE-2011-4604/" source="CVE"/>
		<reference ref_id="CVE-2011-4622" ref_url="https://www.suse.com/security/cve/CVE-2011-4622/" source="CVE"/>
		<reference ref_id="CVE-2012-0038" ref_url="https://www.suse.com/security/cve/CVE-2012-0038/" source="CVE"/>
		<reference ref_id="CVE-2012-0045" ref_url="https://www.suse.com/security/cve/CVE-2012-0045/" source="CVE"/>
		<reference ref_id="CVE-2012-0056" ref_url="https://www.suse.com/security/cve/CVE-2012-0056/" source="CVE"/>
		<reference ref_id="CVE-2012-0207" ref_url="https://www.suse.com/security/cve/CVE-2012-0207/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-default-3.0.13-0.27.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0007/">CVE-2008-0007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0007">CVE-2008-0007 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0009/">CVE-2008-0009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0009">CVE-2008-0009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0010/">CVE-2008-0010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0010">CVE-2008-0010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1375/">CVE-2008-1375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1375">CVE-2008-1375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1669/">CVE-2008-1669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1669">CVE-2008-1669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1673/">CVE-2008-1673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1673">CVE-2008-1673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1675/">CVE-2008-1675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1675">CVE-2008-1675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3528/">CVE-2008-3528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3528">CVE-2008-3528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3831/">CVE-2008-3831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3831">CVE-2008-3831 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2008-5079/">CVE-2008-5079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5079">CVE-2008-5079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5182/">CVE-2008-5182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5182">CVE-2008-5182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5300/">CVE-2008-5300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5300">CVE-2008-5300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0029/">CVE-2009-0029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0029">CVE-2009-0029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3939/">CVE-2009-3939 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-3939">CVE-2009-3939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4026/">CVE-2009-4026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4026">CVE-2009-4026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4027/">CVE-2009-4027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4027">CVE-2009-4027 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4131/">CVE-2009-4131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4131">CVE-2009-4131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4138/">CVE-2009-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4138">CVE-2009-4138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4536/">CVE-2009-4536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4536">CVE-2009-4536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4537/">CVE-2009-4537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4537">CVE-2009-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4538/">CVE-2009-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4538">CVE-2009-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0415/">CVE-2010-0415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0415">CVE-2010-0415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0622/">CVE-2010-0622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0622">CVE-2010-0622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0623/">CVE-2010-0623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0623">CVE-2010-0623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1146/">CVE-2010-1146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1146">CVE-2010-1146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1173/">CVE-2010-1173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1173">CVE-2010-1173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1437/">CVE-2010-1437 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1437">CVE-2010-1437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1641/">CVE-2010-1641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1641">CVE-2010-1641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2066/">CVE-2010-2066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2066">CVE-2010-2066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2798/">CVE-2010-2798 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2798">CVE-2010-2798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2803/">CVE-2010-2803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2803">CVE-2010-2803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2942/">CVE-2010-2942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2942">CVE-2010-2942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2943/">CVE-2010-2943 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2943">CVE-2010-2943 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2946/">CVE-2010-2946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2946">CVE-2010-2946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2954/">CVE-2010-2954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2954">CVE-2010-2954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2955/">CVE-2010-2955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2955">CVE-2010-2955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2959/">CVE-2010-2959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2959">CVE-2010-2959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2960/">CVE-2010-2960 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2960">CVE-2010-2960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2962/">CVE-2010-2962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2962">CVE-2010-2962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2963/">CVE-2010-2963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2963">CVE-2010-2963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3015/">CVE-2010-3015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3015">CVE-2010-3015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3078/">CVE-2010-3078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-3078">CVE-2010-3078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3079/">CVE-2010-3079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-3079">CVE-2010-3079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3080/">CVE-2010-3080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3080">CVE-2010-3080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3081/">CVE-2010-3081 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-3081">CVE-2010-3081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3084/">CVE-2010-3084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3084">CVE-2010-3084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3296/">CVE-2010-3296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3296">CVE-2010-3296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3297/">CVE-2010-3297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3297">CVE-2010-3297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3298/">CVE-2010-3298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3298">CVE-2010-3298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3301/">CVE-2010-3301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3301">CVE-2010-3301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3310/">CVE-2010-3310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3310">CVE-2010-3310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3437/">CVE-2010-3437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3437">CVE-2010-3437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3699/">CVE-2010-3699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3699">CVE-2010-3699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3705/">CVE-2010-3705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3705">CVE-2010-3705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3861/">CVE-2010-3861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3861">CVE-2010-3861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3873/">CVE-2010-3873 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3873">CVE-2010-3873 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3874/">CVE-2010-3874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3874">CVE-2010-3874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3875/">CVE-2010-3875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3875">CVE-2010-3875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3876/">CVE-2010-3876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3876">CVE-2010-3876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3877/">CVE-2010-3877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3877">CVE-2010-3877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3880/">CVE-2010-3880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3880">CVE-2010-3880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3881/">CVE-2010-3881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3881">CVE-2010-3881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4072/">CVE-2010-4072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4072">CVE-2010-4072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4073/">CVE-2010-4073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4073">CVE-2010-4073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4075/">CVE-2010-4075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4075">CVE-2010-4075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4076/">CVE-2010-4076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4076">CVE-2010-4076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4077/">CVE-2010-4077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4077">CVE-2010-4077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4082/">CVE-2010-4082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4082">CVE-2010-4082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4083/">CVE-2010-4083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4083">CVE-2010-4083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4157/">CVE-2010-4157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4157">CVE-2010-4157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4158/">CVE-2010-4158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4158">CVE-2010-4158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4160/">CVE-2010-4160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4160">CVE-2010-4160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4162/">CVE-2010-4162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4162">CVE-2010-4162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4163/">CVE-2010-4163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4163">CVE-2010-4163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4164/">CVE-2010-4164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4164">CVE-2010-4164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4165/">CVE-2010-4165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4165">CVE-2010-4165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4169/">CVE-2010-4169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4169">CVE-2010-4169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4175/">CVE-2010-4175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4175">CVE-2010-4175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4243/">CVE-2010-4243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4243">CVE-2010-4243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4251/">CVE-2010-4251 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-4251">CVE-2010-4251 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4258/">CVE-2010-4258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4258">CVE-2010-4258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4342/">CVE-2010-4342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4342">CVE-2010-4342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4529/">CVE-2010-4529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4529">CVE-2010-4529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4656/">CVE-2010-4656 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-4656">CVE-2010-4656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4668/">CVE-2010-4668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4668">CVE-2010-4668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0521/">CVE-2011-0521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0521">CVE-2011-0521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0710/">CVE-2011-0710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0710">CVE-2011-0710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0711/">CVE-2011-0711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0711">CVE-2011-0711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0712/">CVE-2011-0712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0712">CVE-2011-0712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1016/">CVE-2011-1016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1016">CVE-2011-1016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1017/">CVE-2011-1017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1017">CVE-2011-1017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1020/">CVE-2011-1020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1020">CVE-2011-1020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1160/">CVE-2011-1160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1160">CVE-2011-1160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1180/">CVE-2011-1180 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-1180">CVE-2011-1180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1182/">CVE-2011-1182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1182">CVE-2011-1182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1478/">CVE-2011-1478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1478">CVE-2011-1478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1573/">CVE-2011-1573 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-1573">CVE-2011-1573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1577/">CVE-2011-1577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1577">CVE-2011-1577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1593/">CVE-2011-1593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1593">CVE-2011-1593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2182/">CVE-2011-2182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2182">CVE-2011-2182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2183/">CVE-2011-2183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2183">CVE-2011-2183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2203/">CVE-2011-2203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2203">CVE-2011-2203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2479/">CVE-2011-2479 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2479">CVE-2011-2479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2491/">CVE-2011-2491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2491">CVE-2011-2491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2495/">CVE-2011-2495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2495">CVE-2011-2495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2496/">CVE-2011-2496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2496">CVE-2011-2496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3191/">CVE-2011-3191 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3191">CVE-2011-3191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4097/">CVE-2011-4097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-4097">CVE-2011-4097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4127/">CVE-2011-4127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4127">CVE-2011-4127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4131/">CVE-2011-4131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4131">CVE-2011-4131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4604/">CVE-2011-4604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4604">CVE-2011-4604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4622/">CVE-2011-4622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4622">CVE-2011-4622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0038/">CVE-2012-0038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0038">CVE-2012-0038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0045/">CVE-2012-0045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0045">CVE-2012-0045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0056/">CVE-2012-0056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0056">CVE-2012-0056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0207/">CVE-2012-0207 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0207">CVE-2012-0207 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989161" comment="kernel-default-3.0.13-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989162" comment="kernel-default-base-3.0.13-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989164" comment="kernel-default-man-3.0.13-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989165" comment="kernel-pae-3.0.13-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989166" comment="kernel-pae-base-3.0.13-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989168" comment="kernel-ppc64-3.0.13-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989169" comment="kernel-ppc64-base-3.0.13-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989171" comment="kernel-source-3.0.13-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989172" comment="kernel-syms-3.0.13-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989173" comment="kernel-trace-3.0.13-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989174" comment="kernel-trace-base-3.0.13-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989176" comment="kernel-xen-3.0.13-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989177" comment="kernel-xen-base-3.0.13-0.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215843" version="1" class="patch">
	<metadata>
		<title>krb5-1.6.3-133.48.48.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-6143" ref_url="https://www.suse.com/security/cve/CVE-2006-6143/" source="CVE"/>
		<reference ref_id="CVE-2006-6144" ref_url="https://www.suse.com/security/cve/CVE-2006-6144/" source="CVE"/>
		<reference ref_id="CVE-2007-0956" ref_url="https://www.suse.com/security/cve/CVE-2007-0956/" source="CVE"/>
		<reference ref_id="CVE-2007-0957" ref_url="https://www.suse.com/security/cve/CVE-2007-0957/" source="CVE"/>
		<reference ref_id="CVE-2007-1216" ref_url="https://www.suse.com/security/cve/CVE-2007-1216/" source="CVE"/>
		<reference ref_id="CVE-2007-2442" ref_url="https://www.suse.com/security/cve/CVE-2007-2442/" source="CVE"/>
		<reference ref_id="CVE-2007-2443" ref_url="https://www.suse.com/security/cve/CVE-2007-2443/" source="CVE"/>
		<reference ref_id="CVE-2007-2798" ref_url="https://www.suse.com/security/cve/CVE-2007-2798/" source="CVE"/>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<reference ref_id="CVE-2007-4000" ref_url="https://www.suse.com/security/cve/CVE-2007-4000/" source="CVE"/>
		<reference ref_id="CVE-2007-4743" ref_url="https://www.suse.com/security/cve/CVE-2007-4743/" source="CVE"/>
		<reference ref_id="CVE-2007-5894" ref_url="https://www.suse.com/security/cve/CVE-2007-5894/" source="CVE"/>
		<reference ref_id="CVE-2007-5902" ref_url="https://www.suse.com/security/cve/CVE-2007-5902/" source="CVE"/>
		<reference ref_id="CVE-2007-5971" ref_url="https://www.suse.com/security/cve/CVE-2007-5971/" source="CVE"/>
		<reference ref_id="CVE-2007-5972" ref_url="https://www.suse.com/security/cve/CVE-2007-5972/" source="CVE"/>
		<reference ref_id="CVE-2008-0062" ref_url="https://www.suse.com/security/cve/CVE-2008-0062/" source="CVE"/>
		<reference ref_id="CVE-2008-0063" ref_url="https://www.suse.com/security/cve/CVE-2008-0063/" source="CVE"/>
		<reference ref_id="CVE-2008-0947" ref_url="https://www.suse.com/security/cve/CVE-2008-0947/" source="CVE"/>
		<reference ref_id="CVE-2008-0948" ref_url="https://www.suse.com/security/cve/CVE-2008-0948/" source="CVE"/>
		<reference ref_id="CVE-2009-0844" ref_url="https://www.suse.com/security/cve/CVE-2009-0844/" source="CVE"/>
		<reference ref_id="CVE-2009-0845" ref_url="https://www.suse.com/security/cve/CVE-2009-0845/" source="CVE"/>
		<reference ref_id="CVE-2009-0846" ref_url="https://www.suse.com/security/cve/CVE-2009-0846/" source="CVE"/>
		<reference ref_id="CVE-2009-0847" ref_url="https://www.suse.com/security/cve/CVE-2009-0847/" source="CVE"/>
		<reference ref_id="CVE-2009-4212" ref_url="https://www.suse.com/security/cve/CVE-2009-4212/" source="CVE"/>
		<reference ref_id="CVE-2010-0629" ref_url="https://www.suse.com/security/cve/CVE-2010-0629/" source="CVE"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-1323" ref_url="https://www.suse.com/security/cve/CVE-2010-1323/" source="CVE"/>
		<reference ref_id="CVE-2011-0281" ref_url="https://www.suse.com/security/cve/CVE-2011-0281/" source="CVE"/>
		<reference ref_id="CVE-2011-0282" ref_url="https://www.suse.com/security/cve/CVE-2011-0282/" source="CVE"/>
		<reference ref_id="CVE-2011-1526" ref_url="https://www.suse.com/security/cve/CVE-2011-1526/" source="CVE"/>
		<reference ref_id="CVE-2011-4862" ref_url="https://www.suse.com/security/cve/CVE-2011-4862/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-1.6.3-133.48.48.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6143/">CVE-2006-6143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6143">CVE-2006-6143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6144/">CVE-2006-6144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6144">CVE-2006-6144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0956/">CVE-2007-0956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0956">CVE-2007-0956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0957/">CVE-2007-0957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0957">CVE-2007-0957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1216/">CVE-2007-1216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1216">CVE-2007-1216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2442/">CVE-2007-2442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2442">CVE-2007-2442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2443/">CVE-2007-2443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2443">CVE-2007-2443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2798/">CVE-2007-2798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2798">CVE-2007-2798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3999">CVE-2007-3999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4000/">CVE-2007-4000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4000">CVE-2007-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4743/">CVE-2007-4743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4743">CVE-2007-4743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5894/">CVE-2007-5894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5894">CVE-2007-5894 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5902/">CVE-2007-5902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5902">CVE-2007-5902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5971/">CVE-2007-5971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5971">CVE-2007-5971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5972/">CVE-2007-5972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5972">CVE-2007-5972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0062/">CVE-2008-0062 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2008-0062">CVE-2008-0062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0063/">CVE-2008-0063 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2008-0063">CVE-2008-0063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0947/">CVE-2008-0947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0947">CVE-2008-0947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0948/">CVE-2008-0948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0948">CVE-2008-0948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0844/">CVE-2009-0844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0844">CVE-2009-0844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0845/">CVE-2009-0845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0845">CVE-2009-0845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0846/">CVE-2009-0846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0846">CVE-2009-0846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0847/">CVE-2009-0847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0847">CVE-2009-0847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4212/">CVE-2009-4212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4212">CVE-2009-4212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0629/">CVE-2010-0629 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-0629">CVE-2010-0629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1321">CVE-2010-1321 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1323/">CVE-2010-1323 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1323">CVE-2010-1323 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0281/">CVE-2011-0281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0281">CVE-2011-0281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0282/">CVE-2011-0282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0282">CVE-2011-0282 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1526/">CVE-2011-1526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1526">CVE-2011-1526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4862/">CVE-2011-4862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4862">CVE-2011-4862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989179" comment="krb5-1.6.3-133.48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989180" comment="krb5-32bit-1.6.3-133.48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989181" comment="krb5-apps-clients-1.6.3-133.48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989182" comment="krb5-apps-servers-1.6.3-133.48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989183" comment="krb5-client-1.6.3-133.48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989184" comment="krb5-server-1.6.3-133.48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989185" comment="krb5-x86-1.6.3-133.48.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215844" version="1" class="patch">
	<metadata>
		<title>krb5-doc-1.6.3-133.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<reference ref_id="CVE-2007-4000" ref_url="https://www.suse.com/security/cve/CVE-2007-4000/" source="CVE"/>
		<reference ref_id="CVE-2007-4743" ref_url="https://www.suse.com/security/cve/CVE-2007-4743/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-doc-1.6.3-133.21 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3999">CVE-2007-3999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4000/">CVE-2007-4000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4000">CVE-2007-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4743/">CVE-2007-4743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4743">CVE-2007-4743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988626" comment="krb5-doc-1.6.3-133.21 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215845" version="1" class="patch">
	<metadata>
		<title>krb5-plugin-kdb-ldap-1.6.3-133.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-0956" ref_url="https://www.suse.com/security/cve/CVE-2007-0956/" source="CVE"/>
		<reference ref_id="CVE-2007-0957" ref_url="https://www.suse.com/security/cve/CVE-2007-0957/" source="CVE"/>
		<reference ref_id="CVE-2007-1216" ref_url="https://www.suse.com/security/cve/CVE-2007-1216/" source="CVE"/>
		<reference ref_id="CVE-2007-2442" ref_url="https://www.suse.com/security/cve/CVE-2007-2442/" source="CVE"/>
		<reference ref_id="CVE-2007-2443" ref_url="https://www.suse.com/security/cve/CVE-2007-2443/" source="CVE"/>
		<reference ref_id="CVE-2007-2798" ref_url="https://www.suse.com/security/cve/CVE-2007-2798/" source="CVE"/>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<reference ref_id="CVE-2007-4000" ref_url="https://www.suse.com/security/cve/CVE-2007-4000/" source="CVE"/>
		<reference ref_id="CVE-2007-4743" ref_url="https://www.suse.com/security/cve/CVE-2007-4743/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-plugin-kdb-ldap-1.6.3-133.12 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0956/">CVE-2007-0956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0956">CVE-2007-0956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0957/">CVE-2007-0957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0957">CVE-2007-0957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1216/">CVE-2007-1216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1216">CVE-2007-1216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2442/">CVE-2007-2442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2442">CVE-2007-2442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2443/">CVE-2007-2443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2443">CVE-2007-2443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2798/">CVE-2007-2798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2798">CVE-2007-2798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3999">CVE-2007-3999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4000/">CVE-2007-4000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4000">CVE-2007-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4743/">CVE-2007-4743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4743">CVE-2007-4743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988627" comment="krb5-plugin-kdb-ldap-1.6.3-133.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988628" comment="krb5-plugin-preauth-pkinit-1.6.3-133.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215846" version="1" class="patch">
	<metadata>
		<title>kvm-0.15.1-0.17.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-2382" ref_url="https://www.suse.com/security/cve/CVE-2008-2382/" source="CVE"/>
		<reference ref_id="CVE-2008-5714" ref_url="https://www.suse.com/security/cve/CVE-2008-5714/" source="CVE"/>
		<description>
These are all security issues fixed in the kvm-0.15.1-0.17.3 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2382/">CVE-2008-2382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2382">CVE-2008-2382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5714/">CVE-2008-5714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5714">CVE-2008-5714 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989186" comment="kvm-0.15.1-0.17.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215847" version="1" class="patch">
	<metadata>
		<title>lcms-1.17-77.14.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0581" ref_url="https://www.suse.com/security/cve/CVE-2009-0581/" source="CVE"/>
		<reference ref_id="CVE-2009-0723" ref_url="https://www.suse.com/security/cve/CVE-2009-0723/" source="CVE"/>
		<reference ref_id="CVE-2009-0733" ref_url="https://www.suse.com/security/cve/CVE-2009-0733/" source="CVE"/>
		<reference ref_id="CVE-2009-0793" ref_url="https://www.suse.com/security/cve/CVE-2009-0793/" source="CVE"/>
		<description>
These are all security issues fixed in the lcms-1.17-77.14.19 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0581/">CVE-2009-0581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0581">CVE-2009-0581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0723/">CVE-2009-0723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0723">CVE-2009-0723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0733/">CVE-2009-0733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0733">CVE-2009-0733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0793/">CVE-2009-0793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0793">CVE-2009-0793 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988630" comment="lcms-1.17-77.14.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988631" comment="liblcms1-1.17-77.14.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988632" comment="liblcms1-32bit-1.17-77.14.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988633" comment="liblcms1-x86-1.17-77.14.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215848" version="1" class="patch">
	<metadata>
		<title>ldapsmb-1.34b-12.18.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-3403" ref_url="https://www.suse.com/security/cve/CVE-2006-3403/" source="CVE"/>
		<reference ref_id="CVE-2007-0452" ref_url="https://www.suse.com/security/cve/CVE-2007-0452/" source="CVE"/>
		<reference ref_id="CVE-2007-2444" ref_url="https://www.suse.com/security/cve/CVE-2007-2444/" source="CVE"/>
		<reference ref_id="CVE-2007-2446" ref_url="https://www.suse.com/security/cve/CVE-2007-2446/" source="CVE"/>
		<reference ref_id="CVE-2007-2447" ref_url="https://www.suse.com/security/cve/CVE-2007-2447/" source="CVE"/>
		<reference ref_id="CVE-2007-4138" ref_url="https://www.suse.com/security/cve/CVE-2007-4138/" source="CVE"/>
		<reference ref_id="CVE-2007-4572" ref_url="https://www.suse.com/security/cve/CVE-2007-4572/" source="CVE"/>
		<reference ref_id="CVE-2007-5398" ref_url="https://www.suse.com/security/cve/CVE-2007-5398/" source="CVE"/>
		<reference ref_id="CVE-2007-6015" ref_url="https://www.suse.com/security/cve/CVE-2007-6015/" source="CVE"/>
		<reference ref_id="CVE-2008-1105" ref_url="https://www.suse.com/security/cve/CVE-2008-1105/" source="CVE"/>
		<reference ref_id="CVE-2008-3789" ref_url="https://www.suse.com/security/cve/CVE-2008-3789/" source="CVE"/>
		<reference ref_id="CVE-2008-4314" ref_url="https://www.suse.com/security/cve/CVE-2008-4314/" source="CVE"/>
		<reference ref_id="CVE-2009-0022" ref_url="https://www.suse.com/security/cve/CVE-2009-0022/" source="CVE"/>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2010-0926" ref_url="https://www.suse.com/security/cve/CVE-2010-0926/" source="CVE"/>
		<reference ref_id="CVE-2010-1635" ref_url="https://www.suse.com/security/cve/CVE-2010-1635/" source="CVE"/>
		<reference ref_id="CVE-2010-1642" ref_url="https://www.suse.com/security/cve/CVE-2010-1642/" source="CVE"/>
		<reference ref_id="CVE-2010-2063" ref_url="https://www.suse.com/security/cve/CVE-2010-2063/" source="CVE"/>
		<reference ref_id="CVE-2010-3069" ref_url="https://www.suse.com/security/cve/CVE-2010-3069/" source="CVE"/>
		<reference ref_id="CVE-2011-0719" ref_url="https://www.suse.com/security/cve/CVE-2011-0719/" source="CVE"/>
		<reference ref_id="CVE-2011-2522" ref_url="https://www.suse.com/security/cve/CVE-2011-2522/" source="CVE"/>
		<reference ref_id="CVE-2011-2694" ref_url="https://www.suse.com/security/cve/CVE-2011-2694/" source="CVE"/>
		<reference ref_id="CVE-2012-0817" ref_url="https://www.suse.com/security/cve/CVE-2012-0817/" source="CVE"/>
		<description>
These are all security issues fixed in the ldapsmb-1.34b-12.18.3 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3403/">CVE-2006-3403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3403">CVE-2006-3403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0452/">CVE-2007-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0452">CVE-2007-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2444/">CVE-2007-2444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2444">CVE-2007-2444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2446/">CVE-2007-2446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2446">CVE-2007-2446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2447/">CVE-2007-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2447">CVE-2007-2447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4138/">CVE-2007-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4138">CVE-2007-4138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4572/">CVE-2007-4572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4572">CVE-2007-4572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5398/">CVE-2007-5398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5398">CVE-2007-5398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6015/">CVE-2007-6015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6015">CVE-2007-6015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1105/">CVE-2008-1105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1105">CVE-2008-1105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3789/">CVE-2008-3789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3789">CVE-2008-3789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4314/">CVE-2008-4314 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4314">CVE-2008-4314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0022/">CVE-2009-0022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0022">CVE-2009-0022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1886">CVE-2009-1886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1888">CVE-2009-1888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2813">CVE-2009-2813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2906">CVE-2009-2906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2948">CVE-2009-2948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0547">CVE-2010-0547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0728">CVE-2010-0728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0787">CVE-2010-0787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0926/">CVE-2010-0926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0926">CVE-2010-0926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1635/">CVE-2010-1635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1635">CVE-2010-1635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1642/">CVE-2010-1642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1642">CVE-2010-1642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2063/">CVE-2010-2063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2063">CVE-2010-2063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3069/">CVE-2010-3069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3069">CVE-2010-3069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0719/">CVE-2011-0719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0719">CVE-2011-0719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2522/">CVE-2011-2522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2522">CVE-2011-2522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2694/">CVE-2011-2694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2694">CVE-2011-2694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0817/">CVE-2012-0817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0817">CVE-2012-0817 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989187" comment="ldapsmb-1.34b-12.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989188" comment="libldb1-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989189" comment="libsmbclient0-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989190" comment="libsmbclient0-32bit-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989191" comment="libsmbclient0-x86-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989192" comment="libtalloc2-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989193" comment="libtalloc2-32bit-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989194" comment="libtalloc2-x86-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989195" comment="libtdb1-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989196" comment="libtdb1-32bit-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989197" comment="libtdb1-x86-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989198" comment="libtevent0-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989199" comment="libwbclient0-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989200" comment="libwbclient0-32bit-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989201" comment="libwbclient0-x86-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989202" comment="samba-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989203" comment="samba-32bit-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989204" comment="samba-client-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989205" comment="samba-client-32bit-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989206" comment="samba-client-x86-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989207" comment="samba-krb-printing-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989208" comment="samba-winbind-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989209" comment="samba-winbind-32bit-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989210" comment="samba-winbind-x86-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989211" comment="samba-x86-3.6.3-0.18.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215849" version="1" class="patch">
	<metadata>
		<title>libMagickCore1-32bit-6.4.3.6-7.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-5456" ref_url="https://www.suse.com/security/cve/CVE-2006-5456/" source="CVE"/>
		<reference ref_id="CVE-2007-1667" ref_url="https://www.suse.com/security/cve/CVE-2007-1667/" source="CVE"/>
		<reference ref_id="CVE-2007-1797" ref_url="https://www.suse.com/security/cve/CVE-2007-1797/" source="CVE"/>
		<reference ref_id="CVE-2007-4985" ref_url="https://www.suse.com/security/cve/CVE-2007-4985/" source="CVE"/>
		<reference ref_id="CVE-2007-4986" ref_url="https://www.suse.com/security/cve/CVE-2007-4986/" source="CVE"/>
		<reference ref_id="CVE-2007-4987" ref_url="https://www.suse.com/security/cve/CVE-2007-4987/" source="CVE"/>
		<reference ref_id="CVE-2007-4988" ref_url="https://www.suse.com/security/cve/CVE-2007-4988/" source="CVE"/>
		<description>
These are all security issues fixed in the libMagickCore1-32bit-6.4.3.6-7.22.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5456/">CVE-2006-5456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5456">CVE-2006-5456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1667/">CVE-2007-1667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1667">CVE-2007-1667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1797/">CVE-2007-1797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1797">CVE-2007-1797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4985/">CVE-2007-4985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4985">CVE-2007-4985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4986/">CVE-2007-4986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4986">CVE-2007-4986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4987/">CVE-2007-4987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4987">CVE-2007-4987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4988/">CVE-2007-4988 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2007-4988">CVE-2007-4988 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989212" comment="libMagickCore1-6.4.3.6-7.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989213" comment="libMagickCore1-32bit-6.4.3.6-7.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215850" version="1" class="patch">
	<metadata>
		<title>libQtWebKit4-32bit-4.6.3-5.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-4811" ref_url="https://www.suse.com/security/cve/CVE-2006-4811/" source="CVE"/>
		<reference ref_id="CVE-2009-0945" ref_url="https://www.suse.com/security/cve/CVE-2009-0945/" source="CVE"/>
		<reference ref_id="CVE-2011-3193" ref_url="https://www.suse.com/security/cve/CVE-2011-3193/" source="CVE"/>
		<reference ref_id="CVE-2011-3922" ref_url="https://www.suse.com/security/cve/CVE-2011-3922/" source="CVE"/>
		<description>
These are all security issues fixed in the libQtWebKit4-32bit-4.6.3-5.12.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4811/">CVE-2006-4811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4811">CVE-2006-4811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0945/">CVE-2009-0945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0945">CVE-2009-0945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3193/">CVE-2011-3193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3193">CVE-2011-3193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3922/">CVE-2011-3922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3922">CVE-2011-3922 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989214" comment="libQtWebKit4-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989215" comment="libQtWebKit4-32bit-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989216" comment="libQtWebKit4-x86-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989217" comment="libqt4-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989218" comment="libqt4-32bit-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989219" comment="libqt4-qt3support-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989220" comment="libqt4-qt3support-32bit-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989221" comment="libqt4-qt3support-x86-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989222" comment="libqt4-sql-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989223" comment="libqt4-sql-32bit-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989224" comment="libqt4-sql-sqlite-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989225" comment="libqt4-sql-x86-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989226" comment="libqt4-x11-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989227" comment="libqt4-x11-32bit-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989228" comment="libqt4-x11-x86-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989229" comment="libqt4-x86-4.6.3-5.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215851" version="1" class="patch">
	<metadata>
		<title>libadns1-1.4-73.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-1447" ref_url="https://www.suse.com/security/cve/CVE-2008-1447/" source="CVE"/>
		<reference ref_id="CVE-2008-4100" ref_url="https://www.suse.com/security/cve/CVE-2008-4100/" source="CVE"/>
		<description>
These are all security issues fixed in the libadns1-1.4-73.21 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1447/">CVE-2008-1447 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2008-1447">CVE-2008-1447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4100/">CVE-2008-4100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4100">CVE-2008-4100 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988654" comment="libadns1-1.4-73.21 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215852" version="1" class="patch">
	<metadata>
		<title>libapr-util1-1.3.4-12.22.21.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<reference ref_id="CVE-2010-1623" ref_url="https://www.suse.com/security/cve/CVE-2010-1623/" source="CVE"/>
		<description>
These are all security issues fixed in the libapr-util1-1.3.4-12.22.21.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2412">CVE-2009-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1623/">CVE-2010-1623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1623">CVE-2010-1623 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989230" comment="libapr-util1-1.3.4-12.22.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989231" comment="libapr-util1-32bit-1.3.4-12.22.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215853" version="1" class="patch">
	<metadata>
		<title>libapr1-1.3.3-11.18.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<reference ref_id="CVE-2011-0419" ref_url="https://www.suse.com/security/cve/CVE-2011-0419/" source="CVE"/>
		<reference ref_id="CVE-2011-1928" ref_url="https://www.suse.com/security/cve/CVE-2011-1928/" source="CVE"/>
		<description>
These are all security issues fixed in the libapr1-1.3.3-11.18.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2412">CVE-2009-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0419/">CVE-2011-0419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0419">CVE-2011-0419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1928/">CVE-2011-1928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1928">CVE-2011-1928 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989232" comment="libapr1-1.3.3-11.18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989233" comment="libapr1-32bit-1.3.3-11.18.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215854" version="1" class="patch">
	<metadata>
		<title>libarchive2-2.5.5-5.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-5680" ref_url="https://www.suse.com/security/cve/CVE-2006-5680/" source="CVE"/>
		<reference ref_id="CVE-2007-3641" ref_url="https://www.suse.com/security/cve/CVE-2007-3641/" source="CVE"/>
		<reference ref_id="CVE-2007-3644" ref_url="https://www.suse.com/security/cve/CVE-2007-3644/" source="CVE"/>
		<reference ref_id="CVE-2007-3645" ref_url="https://www.suse.com/security/cve/CVE-2007-3645/" source="CVE"/>
		<description>
These are all security issues fixed in the libarchive2-2.5.5-5.19 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5680/">CVE-2006-5680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5680">CVE-2006-5680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3641/">CVE-2007-3641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3641">CVE-2007-3641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3644/">CVE-2007-3644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3644">CVE-2007-3644 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3645/">CVE-2007-3645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3645">CVE-2007-3645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988659" comment="libarchive2-2.5.5-5.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215855" version="1" class="patch">
	<metadata>
		<title>libcap-progs-2.11-2.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-4099" ref_url="https://www.suse.com/security/cve/CVE-2011-4099/" source="CVE"/>
		<description>
These are all security issues fixed in the libcap-progs-2.11-2.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4099/">CVE-2011-4099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4099">CVE-2011-4099 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989234" comment="libcap-progs-2.11-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989235" comment="libcap2-2.11-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989236" comment="libcap2-32bit-2.11-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989237" comment="libcap2-x86-2.11-2.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215856" version="1" class="patch">
	<metadata>
		<title>libcgroup1-0.34-2.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1006" ref_url="https://www.suse.com/security/cve/CVE-2011-1006/" source="CVE"/>
		<reference ref_id="CVE-2011-1022" ref_url="https://www.suse.com/security/cve/CVE-2011-1022/" source="CVE"/>
		<description>
These are all security issues fixed in the libcgroup1-0.34-2.5.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1006/">CVE-2011-1006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1006">CVE-2011-1006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1022/">CVE-2011-1022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1022">CVE-2011-1022 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989238" comment="libcgroup1-0.34-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215857" version="1" class="patch">
	<metadata>
		<title>libdrm-2.4.27-0.6.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-3831" ref_url="https://www.suse.com/security/cve/CVE-2008-3831/" source="CVE"/>
		<description>
These are all security issues fixed in the libdrm-2.4.27-0.6.6 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3831/">CVE-2008-3831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3831">CVE-2008-3831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989239" comment="libdrm-2.4.27-0.6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989240" comment="libdrm-32bit-2.4.27-0.6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989241" comment="libdrm-x86-2.4.27-0.6.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215858" version="1" class="patch">
	<metadata>
		<title>libexif-0.6.17-2.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-6351" ref_url="https://www.suse.com/security/cve/CVE-2007-6351/" source="CVE"/>
		<reference ref_id="CVE-2007-6352" ref_url="https://www.suse.com/security/cve/CVE-2007-6352/" source="CVE"/>
		<description>
These are all security issues fixed in the libexif-0.6.17-2.12 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6351/">CVE-2007-6351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6351">CVE-2007-6351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6352/">CVE-2007-6352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6352">CVE-2007-6352 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988663" comment="libexif-0.6.17-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988664" comment="libexif-32bit-0.6.17-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988665" comment="libexif-x86-0.6.17-2.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215859" version="1" class="patch">
	<metadata>
		<title>libexiv2-4-0.17.1-31.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-6353" ref_url="https://www.suse.com/security/cve/CVE-2007-6353/" source="CVE"/>
		<description>
These are all security issues fixed in the libexiv2-4-0.17.1-31.20 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6353/">CVE-2007-6353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6353">CVE-2007-6353 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988666" comment="libexiv2-4-0.17.1-31.20 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215860" version="1" class="patch">
	<metadata>
		<title>libfreebl3-3.13.1-0.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreebl3-3.13.1-0.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3170">CVE-2010-3170 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989242" comment="libfreebl3-3.13.1-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989243" comment="libfreebl3-32bit-3.13.1-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989244" comment="libfreebl3-x86-3.13.1-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989245" comment="mozilla-nss-3.13.1-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989246" comment="mozilla-nss-32bit-3.13.1-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989247" comment="mozilla-nss-tools-3.13.1-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989248" comment="mozilla-nss-x86-3.13.1-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215861" version="1" class="patch">
	<metadata>
		<title>libgdiplus0-2.6.7-0.5.76 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-1526" ref_url="https://www.suse.com/security/cve/CVE-2010-1526/" source="CVE"/>
		<description>
These are all security issues fixed in the libgdiplus0-2.6.7-0.5.76 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1526/">CVE-2010-1526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1526">CVE-2010-1526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989249" comment="libgdiplus0-2.6.7-0.5.76 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215862" version="1" class="patch">
	<metadata>
		<title>libgnomesu-1.0.0-307.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1946" ref_url="https://www.suse.com/security/cve/CVE-2011-1946/" source="CVE"/>
		<description>
These are all security issues fixed in the libgnomesu-1.0.0-307.10.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1946/">CVE-2011-1946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1946">CVE-2011-1946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989250" comment="libgnomesu-1.0.0-307.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989251" comment="libgnomesu-lang-1.0.0-307.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989252" comment="libgnomesu0-1.0.0-307.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215863" version="1" class="patch">
	<metadata>
		<title>libgtop-2.28.0-1.2.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-0235" ref_url="https://www.suse.com/security/cve/CVE-2007-0235/" source="CVE"/>
		<description>
These are all security issues fixed in the libgtop-2.28.0-1.2.20 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0235/">CVE-2007-0235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0235">CVE-2007-0235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988667" comment="libgtop-2.28.0-1.2.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988668" comment="libgtop-2_0-7-2.28.0-1.2.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988669" comment="libgtop-doc-2.28.0-1.2.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988670" comment="libgtop-lang-2.28.0-1.2.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215864" version="1" class="patch">
	<metadata>
		<title>libicu-32bit-4.0-7.24.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-4770" ref_url="https://www.suse.com/security/cve/CVE-2007-4770/" source="CVE"/>
		<reference ref_id="CVE-2007-4771" ref_url="https://www.suse.com/security/cve/CVE-2007-4771/" source="CVE"/>
		<reference ref_id="CVE-2008-1036" ref_url="https://www.suse.com/security/cve/CVE-2008-1036/" source="CVE"/>
		<reference ref_id="CVE-2009-0153" ref_url="https://www.suse.com/security/cve/CVE-2009-0153/" source="CVE"/>
		<description>
These are all security issues fixed in the libicu-32bit-4.0-7.24.11 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4770/">CVE-2007-4770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4770">CVE-2007-4770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4771/">CVE-2007-4771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4771">CVE-2007-4771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1036/">CVE-2008-1036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1036">CVE-2008-1036 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0153/">CVE-2009-0153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0153">CVE-2009-0153 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988671" comment="libicu-4.0-7.24.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988672" comment="libicu-32bit-4.0-7.24.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988673" comment="libicu-doc-4.0-7.24.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988674" comment="libicu-x86-4.0-7.24.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215865" version="1" class="patch">
	<metadata>
		<title>libicu-32bit-4.0-7.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-4770" ref_url="https://www.suse.com/security/cve/CVE-2007-4770/" source="CVE"/>
		<reference ref_id="CVE-2007-4771" ref_url="https://www.suse.com/security/cve/CVE-2007-4771/" source="CVE"/>
		<reference ref_id="CVE-2008-1036" ref_url="https://www.suse.com/security/cve/CVE-2008-1036/" source="CVE"/>
		<reference ref_id="CVE-2009-0153" ref_url="https://www.suse.com/security/cve/CVE-2009-0153/" source="CVE"/>
		<reference ref_id="CVE-2010-4409" ref_url="https://www.suse.com/security/cve/CVE-2010-4409/" source="CVE"/>
		<description>
These are all security issues fixed in the libicu-32bit-4.0-7.26.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4770/">CVE-2007-4770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4770">CVE-2007-4770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4771/">CVE-2007-4771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4771">CVE-2007-4771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1036/">CVE-2008-1036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1036">CVE-2008-1036 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0153/">CVE-2009-0153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0153">CVE-2009-0153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4409/">CVE-2010-4409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4409">CVE-2010-4409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989253" comment="libicu-4.0-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989254" comment="libicu-32bit-4.0-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989255" comment="libicu-doc-4.0-7.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215866" version="1" class="patch">
	<metadata>
		<title>libltdl7-2.2.6-2.131.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-3736" ref_url="https://www.suse.com/security/cve/CVE-2009-3736/" source="CVE"/>
		<description>
These are all security issues fixed in the libltdl7-2.2.6-2.131.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3736/">CVE-2009-3736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3736">CVE-2009-3736 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988675" comment="libltdl7-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988676" comment="libltdl7-32bit-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988677" comment="libltdl7-x86-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988678" comment="libtool-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988679" comment="libtool-32bit-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988680" comment="libtool-x86-2.2.6-2.131.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215867" version="1" class="patch">
	<metadata>
		<title>libmusicbrainz4-2.1.5-5.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-4197" ref_url="https://www.suse.com/security/cve/CVE-2006-4197/" source="CVE"/>
		<description>
These are all security issues fixed in the libmusicbrainz4-2.1.5-5.18 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4197/">CVE-2006-4197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4197">CVE-2006-4197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988681" comment="libmusicbrainz4-2.1.5-5.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215868" version="1" class="patch">
	<metadata>
		<title>libmysqlclient15-32bit-5.0.94-0.2.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-0903" ref_url="https://www.suse.com/security/cve/CVE-2006-0903/" source="CVE"/>
		<reference ref_id="CVE-2006-4226" ref_url="https://www.suse.com/security/cve/CVE-2006-4226/" source="CVE"/>
		<reference ref_id="CVE-2006-4227" ref_url="https://www.suse.com/security/cve/CVE-2006-4227/" source="CVE"/>
		<reference ref_id="CVE-2007-5969" ref_url="https://www.suse.com/security/cve/CVE-2007-5969/" source="CVE"/>
		<reference ref_id="CVE-2007-6303" ref_url="https://www.suse.com/security/cve/CVE-2007-6303/" source="CVE"/>
		<reference ref_id="CVE-2007-6304" ref_url="https://www.suse.com/security/cve/CVE-2007-6304/" source="CVE"/>
		<reference ref_id="CVE-2008-2079" ref_url="https://www.suse.com/security/cve/CVE-2008-2079/" source="CVE"/>
		<reference ref_id="CVE-2008-4456" ref_url="https://www.suse.com/security/cve/CVE-2008-4456/" source="CVE"/>
		<reference ref_id="CVE-2008-7247" ref_url="https://www.suse.com/security/cve/CVE-2008-7247/" source="CVE"/>
		<reference ref_id="CVE-2009-2446" ref_url="https://www.suse.com/security/cve/CVE-2009-2446/" source="CVE"/>
		<reference ref_id="CVE-2009-4019" ref_url="https://www.suse.com/security/cve/CVE-2009-4019/" source="CVE"/>
		<reference ref_id="CVE-2009-4028" ref_url="https://www.suse.com/security/cve/CVE-2009-4028/" source="CVE"/>
		<reference ref_id="CVE-2009-4030" ref_url="https://www.suse.com/security/cve/CVE-2009-4030/" source="CVE"/>
		<reference ref_id="CVE-2009-4484" ref_url="https://www.suse.com/security/cve/CVE-2009-4484/" source="CVE"/>
		<reference ref_id="CVE-2010-1626" ref_url="https://www.suse.com/security/cve/CVE-2010-1626/" source="CVE"/>
		<reference ref_id="CVE-2010-1848" ref_url="https://www.suse.com/security/cve/CVE-2010-1848/" source="CVE"/>
		<reference ref_id="CVE-2010-1849" ref_url="https://www.suse.com/security/cve/CVE-2010-1849/" source="CVE"/>
		<reference ref_id="CVE-2010-1850" ref_url="https://www.suse.com/security/cve/CVE-2010-1850/" source="CVE"/>
		<reference ref_id="CVE-2010-3833" ref_url="https://www.suse.com/security/cve/CVE-2010-3833/" source="CVE"/>
		<reference ref_id="CVE-2010-3834" ref_url="https://www.suse.com/security/cve/CVE-2010-3834/" source="CVE"/>
		<reference ref_id="CVE-2010-3835" ref_url="https://www.suse.com/security/cve/CVE-2010-3835/" source="CVE"/>
		<reference ref_id="CVE-2010-3836" ref_url="https://www.suse.com/security/cve/CVE-2010-3836/" source="CVE"/>
		<reference ref_id="CVE-2010-3837" ref_url="https://www.suse.com/security/cve/CVE-2010-3837/" source="CVE"/>
		<reference ref_id="CVE-2010-3838" ref_url="https://www.suse.com/security/cve/CVE-2010-3838/" source="CVE"/>
		<reference ref_id="CVE-2010-3839" ref_url="https://www.suse.com/security/cve/CVE-2010-3839/" source="CVE"/>
		<reference ref_id="CVE-2010-3840" ref_url="https://www.suse.com/security/cve/CVE-2010-3840/" source="CVE"/>
		<description>
These are all security issues fixed in the libmysqlclient15-32bit-5.0.94-0.2.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0903/">CVE-2006-0903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0903">CVE-2006-0903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4226/">CVE-2006-4226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4226">CVE-2006-4226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4227/">CVE-2006-4227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4227">CVE-2006-4227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5969/">CVE-2007-5969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5969">CVE-2007-5969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6303/">CVE-2007-6303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6303">CVE-2007-6303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6304/">CVE-2007-6304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6304">CVE-2007-6304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2079/">CVE-2008-2079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2079">CVE-2008-2079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4456/">CVE-2008-4456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4456">CVE-2008-4456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-7247/">CVE-2008-7247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-7247">CVE-2008-7247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2446/">CVE-2009-2446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2446">CVE-2009-2446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4019/">CVE-2009-4019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4019">CVE-2009-4019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4028/">CVE-2009-4028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4028">CVE-2009-4028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4030/">CVE-2009-4030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4030">CVE-2009-4030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4484/">CVE-2009-4484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4484">CVE-2009-4484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1626/">CVE-2010-1626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1626">CVE-2010-1626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1848/">CVE-2010-1848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1848">CVE-2010-1848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1849/">CVE-2010-1849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1849">CVE-2010-1849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1850/">CVE-2010-1850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1850">CVE-2010-1850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3833/">CVE-2010-3833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3833">CVE-2010-3833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3834/">CVE-2010-3834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3834">CVE-2010-3834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3835/">CVE-2010-3835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3835">CVE-2010-3835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3836/">CVE-2010-3836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3836">CVE-2010-3836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3837/">CVE-2010-3837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3837">CVE-2010-3837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3838/">CVE-2010-3838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3838">CVE-2010-3838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3839/">CVE-2010-3839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3839">CVE-2010-3839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3840/">CVE-2010-3840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3840">CVE-2010-3840 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989256" comment="libmysqlclient15-5.0.94-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989257" comment="libmysqlclient15-32bit-5.0.94-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989258" comment="libmysqlclient15-x86-5.0.94-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989259" comment="libmysqlclient_r15-5.0.94-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989260" comment="mysql-5.0.94-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989261" comment="mysql-Max-5.0.94-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989262" comment="mysql-client-5.0.94-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989263" comment="mysql-tools-5.0.94-0.2.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215869" version="1" class="patch">
	<metadata>
		<title>libneon27-0.29.6-6.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-0157" ref_url="https://www.suse.com/security/cve/CVE-2007-0157/" source="CVE"/>
		<reference ref_id="CVE-2008-3746" ref_url="https://www.suse.com/security/cve/CVE-2008-3746/" source="CVE"/>
		<reference ref_id="CVE-2009-2473" ref_url="https://www.suse.com/security/cve/CVE-2009-2473/" source="CVE"/>
		<reference ref_id="CVE-2009-2474" ref_url="https://www.suse.com/security/cve/CVE-2009-2474/" source="CVE"/>
		<description>
These are all security issues fixed in the libneon27-0.29.6-6.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0157/">CVE-2007-0157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0157">CVE-2007-0157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3746/">CVE-2008-3746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3746">CVE-2008-3746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2473/">CVE-2009-2473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2473">CVE-2009-2473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2474/">CVE-2009-2474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2474">CVE-2009-2474 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989264" comment="libneon27-0.29.6-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989265" comment="libneon27-32bit-0.29.6-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989266" comment="libneon27-x86-0.29.6-6.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215870" version="1" class="patch">
	<metadata>
		<title>libnetpbm10-10.26.44-101.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-4274" ref_url="https://www.suse.com/security/cve/CVE-2009-4274/" source="CVE"/>
		<description>
These are all security issues fixed in the libnetpbm10-10.26.44-101.9.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4274/">CVE-2009-4274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4274">CVE-2009-4274 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988693" comment="libnetpbm10-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988694" comment="libnetpbm10-32bit-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988695" comment="libnetpbm10-x86-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988696" comment="netpbm-10.26.44-101.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215871" version="1" class="patch">
	<metadata>
		<title>libnewt0_52-0.52.10-1.35.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-2905" ref_url="https://www.suse.com/security/cve/CVE-2009-2905/" source="CVE"/>
		<description>
These are all security issues fixed in the libnewt0_52-0.52.10-1.35.7 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2905/">CVE-2009-2905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2905">CVE-2009-2905 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989267" comment="libnewt0_52-0.52.10-1.35.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989268" comment="newt-0.52.10-1.35.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989269" comment="python-newt-0.52.10-1.35.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215872" version="1" class="patch">
	<metadata>
		<title>libopensc2-0.11.6-5.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-2235" ref_url="https://www.suse.com/security/cve/CVE-2008-2235/" source="CVE"/>
		<reference ref_id="CVE-2009-0368" ref_url="https://www.suse.com/security/cve/CVE-2009-0368/" source="CVE"/>
		<description>
These are all security issues fixed in the libopensc2-0.11.6-5.27.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2235/">CVE-2008-2235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2235">CVE-2008-2235 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0368/">CVE-2009-0368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0368">CVE-2009-0368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989270" comment="libopensc2-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989271" comment="libopensc2-32bit-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989272" comment="libopensc2-x86-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989273" comment="opensc-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989274" comment="opensc-32bit-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989275" comment="opensc-x86-0.11.6-5.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215873" version="1" class="patch">
	<metadata>
		<title>libopenssl0_9_8-0.9.8j-0.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-2937" ref_url="https://www.suse.com/security/cve/CVE-2006-2937/" source="CVE"/>
		<reference ref_id="CVE-2006-2940" ref_url="https://www.suse.com/security/cve/CVE-2006-2940/" source="CVE"/>
		<reference ref_id="CVE-2006-3738" ref_url="https://www.suse.com/security/cve/CVE-2006-3738/" source="CVE"/>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2006-4343" ref_url="https://www.suse.com/security/cve/CVE-2006-4343/" source="CVE"/>
		<reference ref_id="CVE-2007-3108" ref_url="https://www.suse.com/security/cve/CVE-2007-3108/" source="CVE"/>
		<reference ref_id="CVE-2007-4995" ref_url="https://www.suse.com/security/cve/CVE-2007-4995/" source="CVE"/>
		<reference ref_id="CVE-2007-5135" ref_url="https://www.suse.com/security/cve/CVE-2007-5135/" source="CVE"/>
		<reference ref_id="CVE-2008-0891" ref_url="https://www.suse.com/security/cve/CVE-2008-0891/" source="CVE"/>
		<reference ref_id="CVE-2008-1672" ref_url="https://www.suse.com/security/cve/CVE-2008-1672/" source="CVE"/>
		<reference ref_id="CVE-2008-5077" ref_url="https://www.suse.com/security/cve/CVE-2008-5077/" source="CVE"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<reference ref_id="CVE-2009-3245" ref_url="https://www.suse.com/security/cve/CVE-2009-3245/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-4355" ref_url="https://www.suse.com/security/cve/CVE-2009-4355/" source="CVE"/>
		<reference ref_id="CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740/" source="CVE"/>
		<reference ref_id="CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939/" source="CVE"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2010-4180" ref_url="https://www.suse.com/security/cve/CVE-2010-4180/" source="CVE"/>
		<reference ref_id="CVE-2010-4252" ref_url="https://www.suse.com/security/cve/CVE-2010-4252/" source="CVE"/>
		<reference ref_id="CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014/" source="CVE"/>
		<reference ref_id="CVE-2011-3210" ref_url="https://www.suse.com/security/cve/CVE-2011-3210/" source="CVE"/>
		<reference ref_id="CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108/" source="CVE"/>
		<reference ref_id="CVE-2011-4109" ref_url="https://www.suse.com/security/cve/CVE-2011-4109/" source="CVE"/>
		<reference ref_id="CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576/" source="CVE"/>
		<reference ref_id="CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577/" source="CVE"/>
		<reference ref_id="CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl0_9_8-0.9.8j-0.26.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2937/">CVE-2006-2937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2937">CVE-2006-2937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2940/">CVE-2006-2940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2940">CVE-2006-2940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3738/">CVE-2006-3738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3738">CVE-2006-3738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4339">CVE-2006-4339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4343/">CVE-2006-4343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4343">CVE-2006-4343 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3108/">CVE-2007-3108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3108">CVE-2007-3108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4995/">CVE-2007-4995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4995">CVE-2007-4995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5135/">CVE-2007-5135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5135">CVE-2007-5135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0891/">CVE-2008-0891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0891">CVE-2008-0891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1672/">CVE-2008-1672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1672">CVE-2008-1672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5077/">CVE-2008-5077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5077">CVE-2008-5077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0590">CVE-2009-0590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0591">CVE-2009-0591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0789">CVE-2009-0789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1377">CVE-2009-1377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1378">CVE-2009-1378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1379">CVE-2009-1379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1386">CVE-2009-1386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1387">CVE-2009-1387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3245/">CVE-2009-3245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3245">CVE-2009-3245 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4355/">CVE-2009-4355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4355">CVE-2009-4355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0740">CVE-2010-0740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2939">CVE-2010-2939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3864">CVE-2010-3864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4180/">CVE-2010-4180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4180">CVE-2010-4180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4252/">CVE-2010-4252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4252">CVE-2010-4252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0014">CVE-2011-0014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3210/">CVE-2011-3210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3210">CVE-2011-3210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4108">CVE-2011-4108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4109/">CVE-2011-4109 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4109">CVE-2011-4109 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4576">CVE-2011-4576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4577">CVE-2011-4577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4619">CVE-2011-4619 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989276" comment="libopenssl0_9_8-0.9.8j-0.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989277" comment="libopenssl0_9_8-32bit-0.9.8j-0.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989278" comment="libopenssl0_9_8-x86-0.9.8j-0.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989279" comment="openssl-0.9.8j-0.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989280" comment="openssl-doc-0.9.8j-0.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215874" version="1" class="patch">
	<metadata>
		<title>libpng12-0-1.2.31-5.25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-5793" ref_url="https://www.suse.com/security/cve/CVE-2006-5793/" source="CVE"/>
		<reference ref_id="CVE-2008-3964" ref_url="https://www.suse.com/security/cve/CVE-2008-3964/" source="CVE"/>
		<reference ref_id="CVE-2008-5907" ref_url="https://www.suse.com/security/cve/CVE-2008-5907/" source="CVE"/>
		<reference ref_id="CVE-2008-6218" ref_url="https://www.suse.com/security/cve/CVE-2008-6218/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-2042" ref_url="https://www.suse.com/security/cve/CVE-2009-2042/" source="CVE"/>
		<reference ref_id="CVE-2009-5063" ref_url="https://www.suse.com/security/cve/CVE-2009-5063/" source="CVE"/>
		<reference ref_id="CVE-2010-0205" ref_url="https://www.suse.com/security/cve/CVE-2010-0205/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-2249" ref_url="https://www.suse.com/security/cve/CVE-2010-2249/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-2690" ref_url="https://www.suse.com/security/cve/CVE-2011-2690/" source="CVE"/>
		<reference ref_id="CVE-2011-2691" ref_url="https://www.suse.com/security/cve/CVE-2011-2691/" source="CVE"/>
		<reference ref_id="CVE-2011-2692" ref_url="https://www.suse.com/security/cve/CVE-2011-2692/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng12-0-1.2.31-5.25.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5793/">CVE-2006-5793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5793">CVE-2006-5793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3964/">CVE-2008-3964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3964">CVE-2008-3964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5907/">CVE-2008-5907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5907">CVE-2008-5907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-6218/">CVE-2008-6218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-6218">CVE-2008-6218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0040">CVE-2009-0040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2042/">CVE-2009-2042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2042">CVE-2009-2042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5063/">CVE-2009-5063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5063">CVE-2009-5063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0205/">CVE-2010-0205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0205">CVE-2010-0205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1205">CVE-2010-1205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2249/">CVE-2010-2249 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2249">CVE-2010-2249 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2501">CVE-2011-2501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2690/">CVE-2011-2690 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2690">CVE-2011-2690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2691/">CVE-2011-2691 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2691">CVE-2011-2691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2692/">CVE-2011-2692 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2692">CVE-2011-2692 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989281" comment="libpng12-0-1.2.31-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989282" comment="libpng12-0-32bit-1.2.31-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989283" comment="libpng12-0-x86-1.2.31-5.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215875" version="1" class="patch">
	<metadata>
		<title>libpoppler-glib4-0.12.3-1.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-0104" ref_url="https://www.suse.com/security/cve/CVE-2007-0104/" source="CVE"/>
		<reference ref_id="CVE-2007-4352" ref_url="https://www.suse.com/security/cve/CVE-2007-4352/" source="CVE"/>
		<reference ref_id="CVE-2007-5392" ref_url="https://www.suse.com/security/cve/CVE-2007-5392/" source="CVE"/>
		<reference ref_id="CVE-2007-5393" ref_url="https://www.suse.com/security/cve/CVE-2007-5393/" source="CVE"/>
		<reference ref_id="CVE-2008-2950" ref_url="https://www.suse.com/security/cve/CVE-2008-2950/" source="CVE"/>
		<reference ref_id="CVE-2009-0755" ref_url="https://www.suse.com/security/cve/CVE-2009-0755/" source="CVE"/>
		<reference ref_id="CVE-2009-0756" ref_url="https://www.suse.com/security/cve/CVE-2009-0756/" source="CVE"/>
		<reference ref_id="CVE-2009-0791" ref_url="https://www.suse.com/security/cve/CVE-2009-0791/" source="CVE"/>
		<reference ref_id="CVE-2009-0799" ref_url="https://www.suse.com/security/cve/CVE-2009-0799/" source="CVE"/>
		<reference ref_id="CVE-2009-0800" ref_url="https://www.suse.com/security/cve/CVE-2009-0800/" source="CVE"/>
		<reference ref_id="CVE-2009-1179" ref_url="https://www.suse.com/security/cve/CVE-2009-1179/" source="CVE"/>
		<reference ref_id="CVE-2009-1180" ref_url="https://www.suse.com/security/cve/CVE-2009-1180/" source="CVE"/>
		<reference ref_id="CVE-2009-1181" ref_url="https://www.suse.com/security/cve/CVE-2009-1181/" source="CVE"/>
		<reference ref_id="CVE-2009-1182" ref_url="https://www.suse.com/security/cve/CVE-2009-1182/" source="CVE"/>
		<reference ref_id="CVE-2009-1183" ref_url="https://www.suse.com/security/cve/CVE-2009-1183/" source="CVE"/>
		<reference ref_id="CVE-2009-1187" ref_url="https://www.suse.com/security/cve/CVE-2009-1187/" source="CVE"/>
		<reference ref_id="CVE-2009-1188" ref_url="https://www.suse.com/security/cve/CVE-2009-1188/" source="CVE"/>
		<reference ref_id="CVE-2009-3607" ref_url="https://www.suse.com/security/cve/CVE-2009-3607/" source="CVE"/>
		<reference ref_id="CVE-2009-3608" ref_url="https://www.suse.com/security/cve/CVE-2009-3608/" source="CVE"/>
		<reference ref_id="CVE-2010-3702" ref_url="https://www.suse.com/security/cve/CVE-2010-3702/" source="CVE"/>
		<reference ref_id="CVE-2010-3703" ref_url="https://www.suse.com/security/cve/CVE-2010-3703/" source="CVE"/>
		<reference ref_id="CVE-2010-3704" ref_url="https://www.suse.com/security/cve/CVE-2010-3704/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler-glib4-0.12.3-1.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0104/">CVE-2007-0104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0104">CVE-2007-0104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4352/">CVE-2007-4352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4352">CVE-2007-4352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5392/">CVE-2007-5392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5392">CVE-2007-5392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5393/">CVE-2007-5393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5393">CVE-2007-5393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2950/">CVE-2008-2950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2950">CVE-2008-2950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0755/">CVE-2009-0755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0755">CVE-2009-0755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0756/">CVE-2009-0756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0756">CVE-2009-0756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0791/">CVE-2009-0791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0791">CVE-2009-0791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0799/">CVE-2009-0799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0799">CVE-2009-0799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0800/">CVE-2009-0800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0800">CVE-2009-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1179/">CVE-2009-1179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1179">CVE-2009-1179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1180/">CVE-2009-1180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1180">CVE-2009-1180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1181/">CVE-2009-1181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1181">CVE-2009-1181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1182/">CVE-2009-1182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1182">CVE-2009-1182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1183/">CVE-2009-1183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1183">CVE-2009-1183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1187/">CVE-2009-1187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1187">CVE-2009-1187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1188/">CVE-2009-1188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1188">CVE-2009-1188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3607/">CVE-2009-3607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3607">CVE-2009-3607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3608/">CVE-2009-3608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3608">CVE-2009-3608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3702/">CVE-2010-3702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3702">CVE-2010-3702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3703/">CVE-2010-3703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3703">CVE-2010-3703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3704/">CVE-2010-3704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3704">CVE-2010-3704 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989284" comment="libpoppler-glib4-0.12.3-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989285" comment="libpoppler-qt4-3-0.12.3-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989286" comment="libpoppler5-0.12.3-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989287" comment="poppler-tools-0.12.3-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215876" version="1" class="patch">
	<metadata>
		<title>libpulse-browse0-0.9.23-0.7.128 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-0008" ref_url="https://www.suse.com/security/cve/CVE-2008-0008/" source="CVE"/>
		<description>
These are all security issues fixed in the libpulse-browse0-0.9.23-0.7.128 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0008/">CVE-2008-0008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0008">CVE-2008-0008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989288" comment="libpulse-browse0-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989289" comment="libpulse-mainloop-glib0-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989290" comment="libpulse0-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989291" comment="libpulse0-32bit-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989292" comment="libpulse0-x86-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989293" comment="pulseaudio-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989294" comment="pulseaudio-esound-compat-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989295" comment="pulseaudio-gdm-hooks-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989296" comment="pulseaudio-lang-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989297" comment="pulseaudio-module-x11-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989298" comment="pulseaudio-module-zeroconf-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989299" comment="pulseaudio-utils-0.9.23-0.7.128 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215877" version="1" class="patch">
	<metadata>
		<title>libpython2_6-1_0-2.6.0-8.12.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<reference ref_id="CVE-2010-3493" ref_url="https://www.suse.com/security/cve/CVE-2010-3493/" source="CVE"/>
		<reference ref_id="CVE-2011-1015" ref_url="https://www.suse.com/security/cve/CVE-2011-1015/" source="CVE"/>
		<reference ref_id="CVE-2011-1521" ref_url="https://www.suse.com/security/cve/CVE-2011-1521/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython2_6-1_0-2.6.0-8.12.2 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3560">CVE-2009-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3720">CVE-2009-3720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3493/">CVE-2010-3493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3493">CVE-2010-3493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1015/">CVE-2011-1015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1015">CVE-2011-1015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1521/">CVE-2011-1521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1521">CVE-2011-1521 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989300" comment="libpython2_6-1_0-2.6.0-8.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989301" comment="libpython2_6-1_0-32bit-2.6.0-8.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989302" comment="libpython2_6-1_0-x86-2.6.0-8.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989303" comment="python-base-2.6.0-8.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989304" comment="python-base-32bit-2.6.0-8.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989305" comment="python-base-x86-2.6.0-8.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989306" comment="python-xml-2.6.0-8.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215878" version="1" class="patch">
	<metadata>
		<title>libqt4-sql-mysql-4.6.3-5.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-4811" ref_url="https://www.suse.com/security/cve/CVE-2006-4811/" source="CVE"/>
		<reference ref_id="CVE-2009-0945" ref_url="https://www.suse.com/security/cve/CVE-2009-0945/" source="CVE"/>
		<reference ref_id="CVE-2011-3193" ref_url="https://www.suse.com/security/cve/CVE-2011-3193/" source="CVE"/>
		<description>
These are all security issues fixed in the libqt4-sql-mysql-4.6.3-5.10.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4811/">CVE-2006-4811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4811">CVE-2006-4811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0945/">CVE-2009-0945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0945">CVE-2009-0945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3193/">CVE-2011-3193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3193">CVE-2011-3193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989307" comment="libqt4-sql-mysql-4.6.3-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989308" comment="qt4-x11-tools-4.6.3-5.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215879" version="1" class="patch">
	<metadata>
		<title>librpcsecgss-0.18-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<description>
These are all security issues fixed in the librpcsecgss-0.18-1.15 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3999">CVE-2007-3999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988735" comment="librpcsecgss-0.18-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989309" comment="libtirpc1-0.2.1-1.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215880" version="1" class="patch">
	<metadata>
		<title>librsvg-2.26.0-2.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-3146" ref_url="https://www.suse.com/security/cve/CVE-2011-3146/" source="CVE"/>
		<description>
These are all security issues fixed in the librsvg-2.26.0-2.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3146/">CVE-2011-3146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3146">CVE-2011-3146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989310" comment="librsvg-2.26.0-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989311" comment="librsvg-32bit-2.26.0-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989312" comment="librsvg-x86-2.26.0-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989313" comment="rsvg-view-2.26.0-2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215881" version="1" class="patch">
	<metadata>
		<title>libsamplerate-0.1.4-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-5008" ref_url="https://www.suse.com/security/cve/CVE-2008-5008/" source="CVE"/>
		<description>
These are all security issues fixed in the libsamplerate-0.1.4-1.15 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5008/">CVE-2008-5008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5008">CVE-2008-5008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988737" comment="libsamplerate-0.1.4-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988738" comment="libsamplerate-32bit-0.1.4-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988739" comment="libsamplerate-x86-0.1.4-1.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215882" version="1" class="patch">
	<metadata>
		<title>libsndfile-1.0.20-2.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-4974" ref_url="https://www.suse.com/security/cve/CVE-2007-4974/" source="CVE"/>
		<reference ref_id="CVE-2009-0186" ref_url="https://www.suse.com/security/cve/CVE-2009-0186/" source="CVE"/>
		<reference ref_id="CVE-2009-1788" ref_url="https://www.suse.com/security/cve/CVE-2009-1788/" source="CVE"/>
		<reference ref_id="CVE-2009-1791" ref_url="https://www.suse.com/security/cve/CVE-2009-1791/" source="CVE"/>
		<reference ref_id="CVE-2009-4835" ref_url="https://www.suse.com/security/cve/CVE-2009-4835/" source="CVE"/>
		<reference ref_id="CVE-2011-2696" ref_url="https://www.suse.com/security/cve/CVE-2011-2696/" source="CVE"/>
		<description>
These are all security issues fixed in the libsndfile-1.0.20-2.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4974/">CVE-2007-4974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4974">CVE-2007-4974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0186/">CVE-2009-0186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0186">CVE-2009-0186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1788/">CVE-2009-1788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1788">CVE-2009-1788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1791/">CVE-2009-1791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1791">CVE-2009-1791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4835/">CVE-2009-4835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4835">CVE-2009-4835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2696/">CVE-2011-2696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2696">CVE-2011-2696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989314" comment="libsndfile-1.0.20-2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989315" comment="libsndfile-32bit-1.0.20-2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989316" comment="libsndfile-x86-1.0.20-2.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215883" version="1" class="patch">
	<metadata>
		<title>libsnmp15-32bit-5.4.2.1-8.12.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-4309" ref_url="https://www.suse.com/security/cve/CVE-2008-4309/" source="CVE"/>
		<reference ref_id="CVE-2008-6123" ref_url="https://www.suse.com/security/cve/CVE-2008-6123/" source="CVE"/>
		<description>
These are all security issues fixed in the libsnmp15-32bit-5.4.2.1-8.12.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4309/">CVE-2008-4309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4309">CVE-2008-4309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-6123/">CVE-2008-6123 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-6123">CVE-2008-6123 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989317" comment="libsnmp15-5.4.2.1-8.12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989318" comment="libsnmp15-32bit-5.4.2.1-8.12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989319" comment="libsnmp15-x86-5.4.2.1-8.12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989320" comment="net-snmp-5.4.2.1-8.12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989321" comment="perl-SNMP-5.4.2.1-8.12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989322" comment="snmp-mibs-5.4.2.1-8.12.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215884" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.32.2-4.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-5876" ref_url="https://www.suse.com/security/cve/CVE-2006-5876/" source="CVE"/>
		<reference ref_id="CVE-2011-2524" ref_url="https://www.suse.com/security/cve/CVE-2011-2524/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.32.2-4.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5876/">CVE-2006-5876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5876">CVE-2006-5876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2524/">CVE-2011-2524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2524">CVE-2011-2524 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989323" comment="libsoup-2_4-1-2.32.2-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989324" comment="libsoup-2_4-1-32bit-2.32.2-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989325" comment="libsoup-2_4-1-x86-2.32.2-4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215885" version="1" class="patch">
	<metadata>
		<title>libtiff3-3.8.2-141.142.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-1586" ref_url="https://www.suse.com/security/cve/CVE-2008-1586/" source="CVE"/>
		<reference ref_id="CVE-2008-2327" ref_url="https://www.suse.com/security/cve/CVE-2008-2327/" source="CVE"/>
		<reference ref_id="CVE-2009-2285" ref_url="https://www.suse.com/security/cve/CVE-2009-2285/" source="CVE"/>
		<reference ref_id="CVE-2009-2347" ref_url="https://www.suse.com/security/cve/CVE-2009-2347/" source="CVE"/>
		<reference ref_id="CVE-2010-1411" ref_url="https://www.suse.com/security/cve/CVE-2010-1411/" source="CVE"/>
		<reference ref_id="CVE-2010-4665" ref_url="https://www.suse.com/security/cve/CVE-2010-4665/" source="CVE"/>
		<reference ref_id="CVE-2011-0191" ref_url="https://www.suse.com/security/cve/CVE-2011-0191/" source="CVE"/>
		<reference ref_id="CVE-2011-0192" ref_url="https://www.suse.com/security/cve/CVE-2011-0192/" source="CVE"/>
		<reference ref_id="CVE-2011-1167" ref_url="https://www.suse.com/security/cve/CVE-2011-1167/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff3-3.8.2-141.142.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1586/">CVE-2008-1586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1586">CVE-2008-1586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2327/">CVE-2008-2327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2327">CVE-2008-2327 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2285/">CVE-2009-2285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2285">CVE-2009-2285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2347/">CVE-2009-2347 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2347">CVE-2009-2347 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1411/">CVE-2010-1411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1411">CVE-2010-1411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4665/">CVE-2010-4665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4665">CVE-2010-4665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0191/">CVE-2011-0191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0191">CVE-2011-0191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0192/">CVE-2011-0192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0192">CVE-2011-0192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1167/">CVE-2011-1167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1167">CVE-2011-1167 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989326" comment="libtiff3-3.8.2-141.142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989327" comment="libtiff3-32bit-3.8.2-141.142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989328" comment="libtiff3-x86-3.8.2-141.142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989329" comment="tiff-3.8.2-141.142.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215886" version="1" class="patch">
	<metadata>
		<title>libvirt-0.9.6-0.13.42 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-5086" ref_url="https://www.suse.com/security/cve/CVE-2008-5086/" source="CVE"/>
		<reference ref_id="CVE-2010-2242" ref_url="https://www.suse.com/security/cve/CVE-2010-2242/" source="CVE"/>
		<reference ref_id="CVE-2011-1146" ref_url="https://www.suse.com/security/cve/CVE-2011-1146/" source="CVE"/>
		<reference ref_id="CVE-2011-1486" ref_url="https://www.suse.com/security/cve/CVE-2011-1486/" source="CVE"/>
		<reference ref_id="CVE-2011-2511" ref_url="https://www.suse.com/security/cve/CVE-2011-2511/" source="CVE"/>
		<reference ref_id="CVE-2011-4600" ref_url="https://www.suse.com/security/cve/CVE-2011-4600/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-0.9.6-0.13.42 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5086/">CVE-2008-5086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5086">CVE-2008-5086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2242/">CVE-2010-2242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2242">CVE-2010-2242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1146/">CVE-2011-1146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1146">CVE-2011-1146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1486/">CVE-2011-1486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1486">CVE-2011-1486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2511/">CVE-2011-2511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2511">CVE-2011-2511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4600/">CVE-2011-4600 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2011-4600">CVE-2011-4600 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989330" comment="libvirt-0.9.6-0.13.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989331" comment="libvirt-client-0.9.6-0.13.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989332" comment="libvirt-client-32bit-0.9.6-0.13.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989333" comment="libvirt-doc-0.9.6-0.13.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989334" comment="libvirt-python-0.9.6-0.13.42 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215887" version="1" class="patch">
	<metadata>
		<title>libvorbis-1.2.0-79.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-3106" ref_url="https://www.suse.com/security/cve/CVE-2007-3106/" source="CVE"/>
		<reference ref_id="CVE-2008-1419" ref_url="https://www.suse.com/security/cve/CVE-2008-1419/" source="CVE"/>
		<reference ref_id="CVE-2008-1420" ref_url="https://www.suse.com/security/cve/CVE-2008-1420/" source="CVE"/>
		<reference ref_id="CVE-2008-1423" ref_url="https://www.suse.com/security/cve/CVE-2008-1423/" source="CVE"/>
		<reference ref_id="CVE-2009-2663" ref_url="https://www.suse.com/security/cve/CVE-2009-2663/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<description>
These are all security issues fixed in the libvorbis-1.2.0-79.13.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3106/">CVE-2007-3106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3106">CVE-2007-3106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1419/">CVE-2008-1419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1419">CVE-2008-1419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1420/">CVE-2008-1420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1420">CVE-2008-1420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1423/">CVE-2008-1423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1423">CVE-2008-1423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2663/">CVE-2009-2663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2663">CVE-2009-2663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3379">CVE-2009-3379 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989335" comment="libvorbis-1.2.0-79.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989336" comment="libvorbis-32bit-1.2.0-79.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989337" comment="libvorbis-doc-1.2.0-79.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989338" comment="libvorbis-x86-1.2.0-79.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215888" version="1" class="patch">
	<metadata>
		<title>libxcrypt-3.0.3-0.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<description>
These are all security issues fixed in the libxcrypt-3.0.3-0.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2483">CVE-2011-2483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989339" comment="libxcrypt-3.0.3-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989340" comment="libxcrypt-32bit-3.0.3-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989341" comment="libxcrypt-x86-3.0.3-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989342" comment="pam-modules-11-1.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989343" comment="pam-modules-32bit-11-1.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989344" comment="pam-modules-x86-11-1.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989345" comment="pwdutils-3.2.15-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989346" comment="pwdutils-plugin-audit-3.2.15-0.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215889" version="1" class="patch">
	<metadata>
		<title>libxml2-2.7.6-0.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-6284" ref_url="https://www.suse.com/security/cve/CVE-2007-6284/" source="CVE"/>
		<reference ref_id="CVE-2008-4225" ref_url="https://www.suse.com/security/cve/CVE-2008-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-4226" ref_url="https://www.suse.com/security/cve/CVE-2008-4226/" source="CVE"/>
		<reference ref_id="CVE-2008-4409" ref_url="https://www.suse.com/security/cve/CVE-2008-4409/" source="CVE"/>
		<reference ref_id="CVE-2009-2414" ref_url="https://www.suse.com/security/cve/CVE-2009-2414/" source="CVE"/>
		<reference ref_id="CVE-2009-2416" ref_url="https://www.suse.com/security/cve/CVE-2009-2416/" source="CVE"/>
		<reference ref_id="CVE-2010-4494" ref_url="https://www.suse.com/security/cve/CVE-2010-4494/" source="CVE"/>
		<reference ref_id="CVE-2011-1944" ref_url="https://www.suse.com/security/cve/CVE-2011-1944/" source="CVE"/>
		<reference ref_id="CVE-2011-2821" ref_url="https://www.suse.com/security/cve/CVE-2011-2821/" source="CVE"/>
		<reference ref_id="CVE-2011-3919" ref_url="https://www.suse.com/security/cve/CVE-2011-3919/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2.7.6-0.13.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6284/">CVE-2007-6284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6284">CVE-2007-6284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4225/">CVE-2008-4225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4225">CVE-2008-4225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4226/">CVE-2008-4226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4226">CVE-2008-4226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4409/">CVE-2008-4409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4409">CVE-2008-4409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2414/">CVE-2009-2414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2414">CVE-2009-2414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2416/">CVE-2009-2416 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-2416">CVE-2009-2416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4494/">CVE-2010-4494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4494">CVE-2010-4494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1944/">CVE-2011-1944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1944">CVE-2011-1944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2821/">CVE-2011-2821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2821">CVE-2011-2821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3919/">CVE-2011-3919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3919">CVE-2011-3919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989347" comment="libxml2-2.7.6-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989348" comment="libxml2-32bit-2.7.6-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989349" comment="libxml2-doc-2.7.6-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989350" comment="libxml2-x86-2.7.6-0.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215890" version="1" class="patch">
	<metadata>
		<title>libxslt-1.1.24-19.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-1767" ref_url="https://www.suse.com/security/cve/CVE-2008-1767/" source="CVE"/>
		<description>
These are all security issues fixed in the libxslt-1.1.24-19.15 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1767/">CVE-2008-1767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1767">CVE-2008-1767 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988767" comment="libxslt-1.1.24-19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988768" comment="libxslt-32bit-1.1.24-19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988769" comment="libxslt-x86-1.1.24-19.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215891" version="1" class="patch">
	<metadata>
		<title>libzip1-0.9-1.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<description>
These are all security issues fixed in the libzip1-0.9-1.24.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0421">CVE-2011-0421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989351" comment="libzip1-0.9-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215892" version="1" class="patch">
	<metadata>
		<title>log4net-1.2.10-1.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-0743" ref_url="https://www.suse.com/security/cve/CVE-2006-0743/" source="CVE"/>
		<description>
These are all security issues fixed in the log4net-1.2.10-1.36 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0743/">CVE-2006-0743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0743">CVE-2006-0743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988770" comment="log4net-1.2.10-1.36 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215893" version="1" class="patch">
	<metadata>
		<title>logrotate-3.7.7-10.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1098" ref_url="https://www.suse.com/security/cve/CVE-2011-1098/" source="CVE"/>
		<reference ref_id="CVE-2011-1154" ref_url="https://www.suse.com/security/cve/CVE-2011-1154/" source="CVE"/>
		<reference ref_id="CVE-2011-1155" ref_url="https://www.suse.com/security/cve/CVE-2011-1155/" source="CVE"/>
		<description>
These are all security issues fixed in the logrotate-3.7.7-10.24.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1098/">CVE-2011-1098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1098">CVE-2011-1098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1154/">CVE-2011-1154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1154">CVE-2011-1154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1155/">CVE-2011-1155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1155">CVE-2011-1155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989352" comment="logrotate-3.7.7-10.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215894" version="1" class="patch">
	<metadata>
		<title>logwatch-7.3.6-65.72.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1018" ref_url="https://www.suse.com/security/cve/CVE-2011-1018/" source="CVE"/>
		<description>
These are all security issues fixed in the logwatch-7.3.6-65.72.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1018/">CVE-2011-1018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1018">CVE-2011-1018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989353" comment="logwatch-7.3.6-65.72.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215895" version="1" class="patch">
	<metadata>
		<title>lvm2-2.02.84-3.25.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2526" ref_url="https://www.suse.com/security/cve/CVE-2010-2526/" source="CVE"/>
		<description>
These are all security issues fixed in the lvm2-2.02.84-3.25.5 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2526/">CVE-2010-2526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2526">CVE-2010-2526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989354" comment="lvm2-2.02.84-3.25.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215896" version="1" class="patch">
	<metadata>
		<title>mailman-2.1.14-9.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-2191" ref_url="https://www.suse.com/security/cve/CVE-2006-2191/" source="CVE"/>
		<reference ref_id="CVE-2006-2941" ref_url="https://www.suse.com/security/cve/CVE-2006-2941/" source="CVE"/>
		<reference ref_id="CVE-2006-3636" ref_url="https://www.suse.com/security/cve/CVE-2006-3636/" source="CVE"/>
		<reference ref_id="CVE-2010-3089" ref_url="https://www.suse.com/security/cve/CVE-2010-3089/" source="CVE"/>
		<reference ref_id="CVE-2010-3090" ref_url="https://www.suse.com/security/cve/CVE-2010-3090/" source="CVE"/>
		<reference ref_id="CVE-2011-0707" ref_url="https://www.suse.com/security/cve/CVE-2011-0707/" source="CVE"/>
		<description>
These are all security issues fixed in the mailman-2.1.14-9.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2191/">CVE-2006-2191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2191">CVE-2006-2191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2941/">CVE-2006-2941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2941">CVE-2006-2941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3636/">CVE-2006-3636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3636">CVE-2006-3636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3089/">CVE-2010-3089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3089">CVE-2010-3089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3090/">CVE-2010-3090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3090">CVE-2010-3090 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0707/">CVE-2011-0707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0707">CVE-2011-0707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989355" comment="mailman-2.1.14-9.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215897" version="1" class="patch">
	<metadata>
		<title>man-2.5.2-17.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-4250" ref_url="https://www.suse.com/security/cve/CVE-2006-4250/" source="CVE"/>
		<description>
These are all security issues fixed in the man-2.5.2-17.16 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4250/">CVE-2006-4250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4250">CVE-2006-4250 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988772" comment="man-2.5.2-17.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215898" version="1" class="patch">
	<metadata>
		<title>mipv6d-2.0.2.umip.0.4-8.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2522" ref_url="https://www.suse.com/security/cve/CVE-2010-2522/" source="CVE"/>
		<reference ref_id="CVE-2010-2523" ref_url="https://www.suse.com/security/cve/CVE-2010-2523/" source="CVE"/>
		<description>
These are all security issues fixed in the mipv6d-2.0.2.umip.0.4-8.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2522/">CVE-2010-2522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2522">CVE-2010-2522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2523/">CVE-2010-2523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2523">CVE-2010-2523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989356" comment="mipv6d-2.0.2.umip.0.4-8.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215899" version="1" class="patch">
	<metadata>
		<title>mono-core-2.6.7-0.7.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0217" ref_url="https://www.suse.com/security/cve/CVE-2009-0217/" source="CVE"/>
		<reference ref_id="CVE-2010-1459" ref_url="https://www.suse.com/security/cve/CVE-2010-1459/" source="CVE"/>
		<reference ref_id="CVE-2010-3332" ref_url="https://www.suse.com/security/cve/CVE-2010-3332/" source="CVE"/>
		<reference ref_id="CVE-2010-4159" ref_url="https://www.suse.com/security/cve/CVE-2010-4159/" source="CVE"/>
		<description>
These are all security issues fixed in the mono-core-2.6.7-0.7.19 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0217/">CVE-2009-0217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0217">CVE-2009-0217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1459/">CVE-2010-1459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1459">CVE-2010-1459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3332/">CVE-2010-3332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3332">CVE-2010-3332 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4159/">CVE-2010-4159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4159">CVE-2010-4159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989357" comment="mono-core-2.6.7-0.7.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989358" comment="mono-data-2.6.7-0.7.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989359" comment="mono-data-postgresql-2.6.7-0.7.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989360" comment="mono-data-sqlite-2.6.7-0.7.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989361" comment="mono-locale-extras-2.6.7-0.7.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989362" comment="mono-nunit-2.6.7-0.7.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989363" comment="mono-web-2.6.7-0.7.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989364" comment="mono-winforms-2.6.7-0.7.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215900" version="1" class="patch">
	<metadata>
		<title>mozilla-xulrunner192-1.9.2.24-0.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-5913" ref_url="https://www.suse.com/security/cve/CVE-2008-5913/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-0164" ref_url="https://www.suse.com/security/cve/CVE-2010-0164/" source="CVE"/>
		<reference ref_id="CVE-2010-0165" ref_url="https://www.suse.com/security/cve/CVE-2010-0165/" source="CVE"/>
		<reference ref_id="CVE-2010-0166" ref_url="https://www.suse.com/security/cve/CVE-2010-0166/" source="CVE"/>
		<reference ref_id="CVE-2010-0167" ref_url="https://www.suse.com/security/cve/CVE-2010-0167/" source="CVE"/>
		<reference ref_id="CVE-2010-0168" ref_url="https://www.suse.com/security/cve/CVE-2010-0168/" source="CVE"/>
		<reference ref_id="CVE-2010-0169" ref_url="https://www.suse.com/security/cve/CVE-2010-0169/" source="CVE"/>
		<reference ref_id="CVE-2010-0170" ref_url="https://www.suse.com/security/cve/CVE-2010-0170/" source="CVE"/>
		<reference ref_id="CVE-2010-0171" ref_url="https://www.suse.com/security/cve/CVE-2010-0171/" source="CVE"/>
		<reference ref_id="CVE-2010-0172" ref_url="https://www.suse.com/security/cve/CVE-2010-0172/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0179" ref_url="https://www.suse.com/security/cve/CVE-2010-0179/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<reference ref_id="CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654/" source="CVE"/>
		<reference ref_id="CVE-2010-1028" ref_url="https://www.suse.com/security/cve/CVE-2010-1028/" source="CVE"/>
		<reference ref_id="CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121/" source="CVE"/>
		<reference ref_id="CVE-2010-1125" ref_url="https://www.suse.com/security/cve/CVE-2010-1125/" source="CVE"/>
		<reference ref_id="CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196/" source="CVE"/>
		<reference ref_id="CVE-2010-1197" ref_url="https://www.suse.com/security/cve/CVE-2010-1197/" source="CVE"/>
		<reference ref_id="CVE-2010-1198" ref_url="https://www.suse.com/security/cve/CVE-2010-1198/" source="CVE"/>
		<reference ref_id="CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199/" source="CVE"/>
		<reference ref_id="CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200/" source="CVE"/>
		<reference ref_id="CVE-2010-1201" ref_url="https://www.suse.com/security/cve/CVE-2010-1201/" source="CVE"/>
		<reference ref_id="CVE-2010-1202" ref_url="https://www.suse.com/security/cve/CVE-2010-1202/" source="CVE"/>
		<reference ref_id="CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-1206" ref_url="https://www.suse.com/security/cve/CVE-2010-1206/" source="CVE"/>
		<reference ref_id="CVE-2010-1207" ref_url="https://www.suse.com/security/cve/CVE-2010-1207/" source="CVE"/>
		<reference ref_id="CVE-2010-1208" ref_url="https://www.suse.com/security/cve/CVE-2010-1208/" source="CVE"/>
		<reference ref_id="CVE-2010-1209" ref_url="https://www.suse.com/security/cve/CVE-2010-1209/" source="CVE"/>
		<reference ref_id="CVE-2010-1210" ref_url="https://www.suse.com/security/cve/CVE-2010-1210/" source="CVE"/>
		<reference ref_id="CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211/" source="CVE"/>
		<reference ref_id="CVE-2010-1212" ref_url="https://www.suse.com/security/cve/CVE-2010-1212/" source="CVE"/>
		<reference ref_id="CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213/" source="CVE"/>
		<reference ref_id="CVE-2010-1214" ref_url="https://www.suse.com/security/cve/CVE-2010-1214/" source="CVE"/>
		<reference ref_id="CVE-2010-1215" ref_url="https://www.suse.com/security/cve/CVE-2010-1215/" source="CVE"/>
		<reference ref_id="CVE-2010-1585" ref_url="https://www.suse.com/security/cve/CVE-2010-1585/" source="CVE"/>
		<reference ref_id="CVE-2010-2751" ref_url="https://www.suse.com/security/cve/CVE-2010-2751/" source="CVE"/>
		<reference ref_id="CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752/" source="CVE"/>
		<reference ref_id="CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753/" source="CVE"/>
		<reference ref_id="CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754/" source="CVE"/>
		<reference ref_id="CVE-2010-2755" ref_url="https://www.suse.com/security/cve/CVE-2010-2755/" source="CVE"/>
		<reference ref_id="CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760/" source="CVE"/>
		<reference ref_id="CVE-2010-2762" ref_url="https://www.suse.com/security/cve/CVE-2010-2762/" source="CVE"/>
		<reference ref_id="CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764/" source="CVE"/>
		<reference ref_id="CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765/" source="CVE"/>
		<reference ref_id="CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766/" source="CVE"/>
		<reference ref_id="CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767/" source="CVE"/>
		<reference ref_id="CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768/" source="CVE"/>
		<reference ref_id="CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769/" source="CVE"/>
		<reference ref_id="CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166/" source="CVE"/>
		<reference ref_id="CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167/" source="CVE"/>
		<reference ref_id="CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168/" source="CVE"/>
		<reference ref_id="CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3173" ref_url="https://www.suse.com/security/cve/CVE-2010-3173/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<reference ref_id="CVE-2010-3766" ref_url="https://www.suse.com/security/cve/CVE-2010-3766/" source="CVE"/>
		<reference ref_id="CVE-2010-3767" ref_url="https://www.suse.com/security/cve/CVE-2010-3767/" source="CVE"/>
		<reference ref_id="CVE-2010-3768" ref_url="https://www.suse.com/security/cve/CVE-2010-3768/" source="CVE"/>
		<reference ref_id="CVE-2010-3769" ref_url="https://www.suse.com/security/cve/CVE-2010-3769/" source="CVE"/>
		<reference ref_id="CVE-2010-3770" ref_url="https://www.suse.com/security/cve/CVE-2010-3770/" source="CVE"/>
		<reference ref_id="CVE-2010-3771" ref_url="https://www.suse.com/security/cve/CVE-2010-3771/" source="CVE"/>
		<reference ref_id="CVE-2010-3772" ref_url="https://www.suse.com/security/cve/CVE-2010-3772/" source="CVE"/>
		<reference ref_id="CVE-2010-3773" ref_url="https://www.suse.com/security/cve/CVE-2010-3773/" source="CVE"/>
		<reference ref_id="CVE-2010-3775" ref_url="https://www.suse.com/security/cve/CVE-2010-3775/" source="CVE"/>
		<reference ref_id="CVE-2010-3776" ref_url="https://www.suse.com/security/cve/CVE-2010-3776/" source="CVE"/>
		<reference ref_id="CVE-2010-3777" ref_url="https://www.suse.com/security/cve/CVE-2010-3777/" source="CVE"/>
		<reference ref_id="CVE-2010-3778" ref_url="https://www.suse.com/security/cve/CVE-2010-3778/" source="CVE"/>
		<reference ref_id="CVE-2011-0051" ref_url="https://www.suse.com/security/cve/CVE-2011-0051/" source="CVE"/>
		<reference ref_id="CVE-2011-0053" ref_url="https://www.suse.com/security/cve/CVE-2011-0053/" source="CVE"/>
		<reference ref_id="CVE-2011-0054" ref_url="https://www.suse.com/security/cve/CVE-2011-0054/" source="CVE"/>
		<reference ref_id="CVE-2011-0055" ref_url="https://www.suse.com/security/cve/CVE-2011-0055/" source="CVE"/>
		<reference ref_id="CVE-2011-0056" ref_url="https://www.suse.com/security/cve/CVE-2011-0056/" source="CVE"/>
		<reference ref_id="CVE-2011-0057" ref_url="https://www.suse.com/security/cve/CVE-2011-0057/" source="CVE"/>
		<reference ref_id="CVE-2011-0059" ref_url="https://www.suse.com/security/cve/CVE-2011-0059/" source="CVE"/>
		<reference ref_id="CVE-2011-0061" ref_url="https://www.suse.com/security/cve/CVE-2011-0061/" source="CVE"/>
		<reference ref_id="CVE-2011-0062" ref_url="https://www.suse.com/security/cve/CVE-2011-0062/" source="CVE"/>
		<reference ref_id="CVE-2011-0065" ref_url="https://www.suse.com/security/cve/CVE-2011-0065/" source="CVE"/>
		<reference ref_id="CVE-2011-0066" ref_url="https://www.suse.com/security/cve/CVE-2011-0066/" source="CVE"/>
		<reference ref_id="CVE-2011-0067" ref_url="https://www.suse.com/security/cve/CVE-2011-0067/" source="CVE"/>
		<reference ref_id="CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069/" source="CVE"/>
		<reference ref_id="CVE-2011-0070" ref_url="https://www.suse.com/security/cve/CVE-2011-0070/" source="CVE"/>
		<reference ref_id="CVE-2011-0072" ref_url="https://www.suse.com/security/cve/CVE-2011-0072/" source="CVE"/>
		<reference ref_id="CVE-2011-0073" ref_url="https://www.suse.com/security/cve/CVE-2011-0073/" source="CVE"/>
		<reference ref_id="CVE-2011-0074" ref_url="https://www.suse.com/security/cve/CVE-2011-0074/" source="CVE"/>
		<reference ref_id="CVE-2011-0075" ref_url="https://www.suse.com/security/cve/CVE-2011-0075/" source="CVE"/>
		<reference ref_id="CVE-2011-0077" ref_url="https://www.suse.com/security/cve/CVE-2011-0077/" source="CVE"/>
		<reference ref_id="CVE-2011-0078" ref_url="https://www.suse.com/security/cve/CVE-2011-0078/" source="CVE"/>
		<reference ref_id="CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080/" source="CVE"/>
		<reference ref_id="CVE-2011-0081" ref_url="https://www.suse.com/security/cve/CVE-2011-0081/" source="CVE"/>
		<reference ref_id="CVE-2011-0083" ref_url="https://www.suse.com/security/cve/CVE-2011-0083/" source="CVE"/>
		<reference ref_id="CVE-2011-0084" ref_url="https://www.suse.com/security/cve/CVE-2011-0084/" source="CVE"/>
		<reference ref_id="CVE-2011-0085" ref_url="https://www.suse.com/security/cve/CVE-2011-0085/" source="CVE"/>
		<reference ref_id="CVE-2011-1202" ref_url="https://www.suse.com/security/cve/CVE-2011-1202/" source="CVE"/>
		<reference ref_id="CVE-2011-2362" ref_url="https://www.suse.com/security/cve/CVE-2011-2362/" source="CVE"/>
		<reference ref_id="CVE-2011-2363" ref_url="https://www.suse.com/security/cve/CVE-2011-2363/" source="CVE"/>
		<reference ref_id="CVE-2011-2364" ref_url="https://www.suse.com/security/cve/CVE-2011-2364/" source="CVE"/>
		<reference ref_id="CVE-2011-2365" ref_url="https://www.suse.com/security/cve/CVE-2011-2365/" source="CVE"/>
		<reference ref_id="CVE-2011-2371" ref_url="https://www.suse.com/security/cve/CVE-2011-2371/" source="CVE"/>
		<reference ref_id="CVE-2011-2372" ref_url="https://www.suse.com/security/cve/CVE-2011-2372/" source="CVE"/>
		<reference ref_id="CVE-2011-2373" ref_url="https://www.suse.com/security/cve/CVE-2011-2373/" source="CVE"/>
		<reference ref_id="CVE-2011-2374" ref_url="https://www.suse.com/security/cve/CVE-2011-2374/" source="CVE"/>
		<reference ref_id="CVE-2011-2376" ref_url="https://www.suse.com/security/cve/CVE-2011-2376/" source="CVE"/>
		<reference ref_id="CVE-2011-2377" ref_url="https://www.suse.com/security/cve/CVE-2011-2377/" source="CVE"/>
		<reference ref_id="CVE-2011-2378" ref_url="https://www.suse.com/security/cve/CVE-2011-2378/" source="CVE"/>
		<reference ref_id="CVE-2011-2980" ref_url="https://www.suse.com/security/cve/CVE-2011-2980/" source="CVE"/>
		<reference ref_id="CVE-2011-2981" ref_url="https://www.suse.com/security/cve/CVE-2011-2981/" source="CVE"/>
		<reference ref_id="CVE-2011-2982" ref_url="https://www.suse.com/security/cve/CVE-2011-2982/" source="CVE"/>
		<reference ref_id="CVE-2011-2983" ref_url="https://www.suse.com/security/cve/CVE-2011-2983/" source="CVE"/>
		<reference ref_id="CVE-2011-2995" ref_url="https://www.suse.com/security/cve/CVE-2011-2995/" source="CVE"/>
		<reference ref_id="CVE-2011-2996" ref_url="https://www.suse.com/security/cve/CVE-2011-2996/" source="CVE"/>
		<reference ref_id="CVE-2011-2999" ref_url="https://www.suse.com/security/cve/CVE-2011-2999/" source="CVE"/>
		<reference ref_id="CVE-2011-3000" ref_url="https://www.suse.com/security/cve/CVE-2011-3000/" source="CVE"/>
		<reference ref_id="CVE-2011-3001" ref_url="https://www.suse.com/security/cve/CVE-2011-3001/" source="CVE"/>
		<reference ref_id="CVE-2011-3647" ref_url="https://www.suse.com/security/cve/CVE-2011-3647/" source="CVE"/>
		<reference ref_id="CVE-2011-3648" ref_url="https://www.suse.com/security/cve/CVE-2011-3648/" source="CVE"/>
		<reference ref_id="CVE-2011-3650" ref_url="https://www.suse.com/security/cve/CVE-2011-3650/" source="CVE"/>
		<description>
These are all security issues fixed in the mozilla-xulrunner192-1.9.2.24-0.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5913/">CVE-2008-5913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5913">CVE-2008-5913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0164/">CVE-2010-0164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0164">CVE-2010-0164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0165/">CVE-2010-0165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0165">CVE-2010-0165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0166/">CVE-2010-0166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0166">CVE-2010-0166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0167/">CVE-2010-0167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0167">CVE-2010-0167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0168/">CVE-2010-0168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0168">CVE-2010-0168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0169/">CVE-2010-0169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0169">CVE-2010-0169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0170/">CVE-2010-0170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0170">CVE-2010-0170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0171/">CVE-2010-0171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0171">CVE-2010-0171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0172/">CVE-2010-0172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0172">CVE-2010-0172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0173">CVE-2010-0173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0174">CVE-2010-0174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0176">CVE-2010-0176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0177">CVE-2010-0177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0178">CVE-2010-0178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0179/">CVE-2010-0179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0179">CVE-2010-0179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0181">CVE-2010-0181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0182">CVE-2010-0182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0654">CVE-2010-0654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1028/">CVE-2010-1028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1028">CVE-2010-1028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1121">CVE-2010-1121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1125/">CVE-2010-1125 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1125">CVE-2010-1125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1196">CVE-2010-1196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1197/">CVE-2010-1197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1197">CVE-2010-1197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1198/">CVE-2010-1198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1198">CVE-2010-1198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1199">CVE-2010-1199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1200">CVE-2010-1200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1201/">CVE-2010-1201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1201">CVE-2010-1201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1202/">CVE-2010-1202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1202">CVE-2010-1202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1203">CVE-2010-1203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1205">CVE-2010-1205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1206/">CVE-2010-1206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1206">CVE-2010-1206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1207/">CVE-2010-1207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1207">CVE-2010-1207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1208/">CVE-2010-1208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1208">CVE-2010-1208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1209/">CVE-2010-1209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1209">CVE-2010-1209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1210/">CVE-2010-1210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1210">CVE-2010-1210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1211">CVE-2010-1211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1212/">CVE-2010-1212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1212">CVE-2010-1212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1213">CVE-2010-1213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1214/">CVE-2010-1214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1214">CVE-2010-1214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1215/">CVE-2010-1215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1215">CVE-2010-1215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1585/">CVE-2010-1585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1585">CVE-2010-1585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2751/">CVE-2010-2751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2751">CVE-2010-2751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2752">CVE-2010-2752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2753">CVE-2010-2753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2754">CVE-2010-2754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2755/">CVE-2010-2755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2755">CVE-2010-2755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2760">CVE-2010-2760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2762/">CVE-2010-2762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2762">CVE-2010-2762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2764">CVE-2010-2764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2765">CVE-2010-2765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2766">CVE-2010-2766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2767">CVE-2010-2767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2768">CVE-2010-2768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2769">CVE-2010-2769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3166">CVE-2010-3166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3167">CVE-2010-3167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3168">CVE-2010-3168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3169">CVE-2010-3169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3170">CVE-2010-3170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3173/">CVE-2010-3173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3173">CVE-2010-3173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3174">CVE-2010-3174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3175">CVE-2010-3175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3176">CVE-2010-3176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3177">CVE-2010-3177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3178">CVE-2010-3178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3179">CVE-2010-3179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3180">CVE-2010-3180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3182">CVE-2010-3182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3183">CVE-2010-3183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3765">CVE-2010-3765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3766/">CVE-2010-3766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3766">CVE-2010-3766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3767/">CVE-2010-3767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3767">CVE-2010-3767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3768/">CVE-2010-3768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3768">CVE-2010-3768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3769/">CVE-2010-3769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3769">CVE-2010-3769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3770/">CVE-2010-3770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3770">CVE-2010-3770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3771/">CVE-2010-3771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3771">CVE-2010-3771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3772/">CVE-2010-3772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3772">CVE-2010-3772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3773/">CVE-2010-3773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3773">CVE-2010-3773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3775/">CVE-2010-3775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3775">CVE-2010-3775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3776/">CVE-2010-3776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3776">CVE-2010-3776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3777/">CVE-2010-3777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3777">CVE-2010-3777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3778/">CVE-2010-3778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3778">CVE-2010-3778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0051/">CVE-2011-0051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0051">CVE-2011-0051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0053/">CVE-2011-0053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0053">CVE-2011-0053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0054/">CVE-2011-0054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0054">CVE-2011-0054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0055/">CVE-2011-0055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0055">CVE-2011-0055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0056/">CVE-2011-0056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0056">CVE-2011-0056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0057/">CVE-2011-0057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0057">CVE-2011-0057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0059/">CVE-2011-0059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0059">CVE-2011-0059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0061/">CVE-2011-0061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0061">CVE-2011-0061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0062/">CVE-2011-0062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0062">CVE-2011-0062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0065/">CVE-2011-0065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0065">CVE-2011-0065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0066/">CVE-2011-0066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0066">CVE-2011-0066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0067/">CVE-2011-0067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0067">CVE-2011-0067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0069">CVE-2011-0069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0070/">CVE-2011-0070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0070">CVE-2011-0070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0072/">CVE-2011-0072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0072">CVE-2011-0072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0073/">CVE-2011-0073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0073">CVE-2011-0073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0074/">CVE-2011-0074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0074">CVE-2011-0074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0075/">CVE-2011-0075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0075">CVE-2011-0075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0077/">CVE-2011-0077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0077">CVE-2011-0077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0078/">CVE-2011-0078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0078">CVE-2011-0078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0080">CVE-2011-0080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0081/">CVE-2011-0081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0081">CVE-2011-0081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0083/">CVE-2011-0083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0083">CVE-2011-0083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0084/">CVE-2011-0084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0084">CVE-2011-0084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0085/">CVE-2011-0085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0085">CVE-2011-0085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1202/">CVE-2011-1202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1202">CVE-2011-1202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2362/">CVE-2011-2362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2362">CVE-2011-2362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2363/">CVE-2011-2363 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2363">CVE-2011-2363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2364/">CVE-2011-2364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2364">CVE-2011-2364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2365/">CVE-2011-2365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2365">CVE-2011-2365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2371/">CVE-2011-2371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2371">CVE-2011-2371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2372/">CVE-2011-2372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2372">CVE-2011-2372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2373/">CVE-2011-2373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2373">CVE-2011-2373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2374/">CVE-2011-2374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2374">CVE-2011-2374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2376/">CVE-2011-2376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2376">CVE-2011-2376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2377/">CVE-2011-2377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2377">CVE-2011-2377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2378/">CVE-2011-2378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2378">CVE-2011-2378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2980/">CVE-2011-2980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2980">CVE-2011-2980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2981/">CVE-2011-2981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2981">CVE-2011-2981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2982/">CVE-2011-2982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2982">CVE-2011-2982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2983/">CVE-2011-2983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2983">CVE-2011-2983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2995/">CVE-2011-2995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2995">CVE-2011-2995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2996/">CVE-2011-2996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2996">CVE-2011-2996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2999/">CVE-2011-2999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2999">CVE-2011-2999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3000/">CVE-2011-3000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3000">CVE-2011-3000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3001/">CVE-2011-3001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3001">CVE-2011-3001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3647/">CVE-2011-3647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3647">CVE-2011-3647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3648/">CVE-2011-3648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3648">CVE-2011-3648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3650/">CVE-2011-3650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3650">CVE-2011-3650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989365" comment="mozilla-xulrunner192-1.9.2.24-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989366" comment="mozilla-xulrunner192-32bit-1.9.2.24-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989367" comment="mozilla-xulrunner192-gnome-1.9.2.24-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989368" comment="mozilla-xulrunner192-translations-1.9.2.24-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989369" comment="mozilla-xulrunner192-x86-1.9.2.24-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215901" version="1" class="patch">
	<metadata>
		<title>mutt-1.5.17-42.33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-1558" ref_url="https://www.suse.com/security/cve/CVE-2007-1558/" source="CVE"/>
		<description>
These are all security issues fixed in the mutt-1.5.17-42.33.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1558/">CVE-2007-1558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1558">CVE-2007-1558 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988791" comment="mutt-1.5.17-42.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215902" version="1" class="patch">
	<metadata>
		<title>nagios-3.0.6-1.25.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-5803" ref_url="https://www.suse.com/security/cve/CVE-2007-5803/" source="CVE"/>
		<reference ref_id="CVE-2011-1523" ref_url="https://www.suse.com/security/cve/CVE-2011-1523/" source="CVE"/>
		<description>
These are all security issues fixed in the nagios-3.0.6-1.25.24.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5803/">CVE-2007-5803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5803">CVE-2007-5803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1523/">CVE-2011-1523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1523">CVE-2011-1523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989370" comment="nagios-3.0.6-1.25.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989371" comment="nagios-www-3.0.6-1.25.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215903" version="1" class="patch">
	<metadata>
		<title>nagios-plugins-1.4.13-1.35 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-5623" ref_url="https://www.suse.com/security/cve/CVE-2007-5623/" source="CVE"/>
		<description>
These are all security issues fixed in the nagios-plugins-1.4.13-1.35 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5623/">CVE-2007-5623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5623">CVE-2007-5623 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988794" comment="nagios-plugins-1.4.13-1.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988795" comment="nagios-plugins-extras-1.4.13-1.35 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215904" version="1" class="patch">
	<metadata>
		<title>ntp-4.2.4p8-1.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0159" ref_url="https://www.suse.com/security/cve/CVE-2009-0159/" source="CVE"/>
		<reference ref_id="CVE-2009-1252" ref_url="https://www.suse.com/security/cve/CVE-2009-1252/" source="CVE"/>
		<description>
These are all security issues fixed in the ntp-4.2.4p8-1.16.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0159/">CVE-2009-0159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0159">CVE-2009-0159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1252/">CVE-2009-1252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1252">CVE-2009-1252 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989372" comment="ntp-4.2.4p8-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989373" comment="ntp-doc-4.2.4p8-1.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215905" version="1" class="patch">
	<metadata>
		<title>ofed-1.5.2-0.22.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-1693" ref_url="https://www.suse.com/security/cve/CVE-2010-1693/" source="CVE"/>
		<reference ref_id="CVE-2010-3904" ref_url="https://www.suse.com/security/cve/CVE-2010-3904/" source="CVE"/>
		<reference ref_id="CVE-2010-4649" ref_url="https://www.suse.com/security/cve/CVE-2010-4649/" source="CVE"/>
		<reference ref_id="CVE-2011-3345" ref_url="https://www.suse.com/security/cve/CVE-2011-3345/" source="CVE"/>
		<description>
These are all security issues fixed in the ofed-1.5.2-0.22.23 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1693/">CVE-2010-1693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1693">CVE-2010-1693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3904/">CVE-2010-3904 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-3904">CVE-2010-3904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4649/">CVE-2010-4649 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4649">CVE-2010-4649 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3345/">CVE-2011-3345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3345">CVE-2011-3345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989374" comment="ofed-1.5.2-0.22.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989375" comment="ofed-doc-1.5.2-0.22.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989376" comment="ofed-kmp-default-1.5.2_3.0.13_0.27-0.22.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989377" comment="ofed-kmp-pae-1.5.2_3.0.13_0.27-0.22.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989378" comment="ofed-kmp-ppc64-1.5.2_3.0.13_0.27-0.22.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989379" comment="ofed-kmp-trace-1.5.2_3.0.13_0.27-0.22.23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215906" version="1" class="patch">
	<metadata>
		<title>openslp-1.2.0-172.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-3609" ref_url="https://www.suse.com/security/cve/CVE-2010-3609/" source="CVE"/>
		<description>
These are all security issues fixed in the openslp-1.2.0-172.22.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3609/">CVE-2010-3609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3609">CVE-2010-3609 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989380" comment="openslp-1.2.0-172.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989381" comment="openslp-32bit-1.2.0-172.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989382" comment="openslp-server-1.2.0-172.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989383" comment="openslp-x86-1.2.0-172.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215907" version="1" class="patch">
	<metadata>
		<title>openssh-5.1p1-41.51.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-0225" ref_url="https://www.suse.com/security/cve/CVE-2006-0225/" source="CVE"/>
		<reference ref_id="CVE-2007-4752" ref_url="https://www.suse.com/security/cve/CVE-2007-4752/" source="CVE"/>
		<reference ref_id="CVE-2008-1483" ref_url="https://www.suse.com/security/cve/CVE-2008-1483/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-5.1p1-41.51.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0225/">CVE-2006-0225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0225">CVE-2006-0225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4752/">CVE-2007-4752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4752">CVE-2007-4752 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2008-1483/">CVE-2008-1483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1483">CVE-2008-1483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989384" comment="openssh-5.1p1-41.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989385" comment="openssh-askpass-5.1p1-41.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215908" version="1" class="patch">
	<metadata>
		<title>openswan-2.6.16-1.36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-4190" ref_url="https://www.suse.com/security/cve/CVE-2008-4190/" source="CVE"/>
		<reference ref_id="CVE-2009-2185" ref_url="https://www.suse.com/security/cve/CVE-2009-2185/" source="CVE"/>
		<reference ref_id="CVE-2011-4073" ref_url="https://www.suse.com/security/cve/CVE-2011-4073/" source="CVE"/>
		<description>
These are all security issues fixed in the openswan-2.6.16-1.36.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4190/">CVE-2008-4190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4190">CVE-2008-4190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2185/">CVE-2009-2185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2185">CVE-2009-2185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4073/">CVE-2011-4073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4073">CVE-2011-4073 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989386" comment="openswan-2.6.16-1.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989387" comment="openswan-doc-2.6.16-1.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215909" version="1" class="patch">
	<metadata>
		<title>openvpn-2.0.9-143.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<description>
These are all security issues fixed in the openvpn-2.0.9-143.31 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4339">CVE-2006-4339 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988802" comment="openvpn-2.0.9-143.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988803" comment="openvpn-auth-pam-plugin-2.0.9-143.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215910" version="1" class="patch">
	<metadata>
		<title>opie-2.4-662.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2489" ref_url="https://www.suse.com/security/cve/CVE-2011-2489/" source="CVE"/>
		<reference ref_id="CVE-2011-2490" ref_url="https://www.suse.com/security/cve/CVE-2011-2490/" source="CVE"/>
		<description>
These are all security issues fixed in the opie-2.4-662.18.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2489/">CVE-2011-2489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2489">CVE-2011-2489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2490/">CVE-2011-2490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2490">CVE-2011-2490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989388" comment="opie-2.4-662.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989389" comment="opie-32bit-2.4-662.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989390" comment="opie-x86-2.4-662.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215911" version="1" class="patch">
	<metadata>
		<title>pam-1.1.5-0.10.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0579" ref_url="https://www.suse.com/security/cve/CVE-2009-0579/" source="CVE"/>
		<reference ref_id="CVE-2009-0887" ref_url="https://www.suse.com/security/cve/CVE-2009-0887/" source="CVE"/>
		<reference ref_id="CVE-2011-3148" ref_url="https://www.suse.com/security/cve/CVE-2011-3148/" source="CVE"/>
		<reference ref_id="CVE-2011-3149" ref_url="https://www.suse.com/security/cve/CVE-2011-3149/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-1.1.5-0.10.17 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0579/">CVE-2009-0579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0579">CVE-2009-0579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0887/">CVE-2009-0887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0887">CVE-2009-0887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3148/">CVE-2011-3148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3148">CVE-2011-3148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3149/">CVE-2011-3149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3149">CVE-2011-3149 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989391" comment="pam-1.1.5-0.10.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989392" comment="pam-32bit-1.1.5-0.10.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989393" comment="pam-doc-1.1.5-0.10.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989394" comment="pam-x86-1.1.5-0.10.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215912" version="1" class="patch">
	<metadata>
		<title>pam_krb5-2.3.1-47.10.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-3825" ref_url="https://www.suse.com/security/cve/CVE-2008-3825/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_krb5-2.3.1-47.10.15 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3825/">CVE-2008-3825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3825">CVE-2008-3825 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988808" comment="pam_krb5-2.3.1-47.10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988809" comment="pam_krb5-32bit-2.3.1-47.10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988810" comment="pam_krb5-x86-2.3.1-47.10.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215913" version="1" class="patch">
	<metadata>
		<title>pam_ldap-184-147.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-5170" ref_url="https://www.suse.com/security/cve/CVE-2006-5170/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_ldap-184-147.20 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5170/">CVE-2006-5170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5170">CVE-2006-5170 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988811" comment="pam_ldap-184-147.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988812" comment="pam_ldap-32bit-184-147.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988813" comment="pam_ldap-x86-184-147.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215914" version="1" class="patch">
	<metadata>
		<title>pam_mount-0.47-13.13.65 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-5138" ref_url="https://www.suse.com/security/cve/CVE-2008-5138/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_mount-0.47-13.13.65 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5138/">CVE-2008-5138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5138">CVE-2008-5138 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988814" comment="pam_mount-0.47-13.13.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988815" comment="pam_mount-32bit-0.47-13.13.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988816" comment="pam_mount-x86-0.47-13.13.65 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215915" version="1" class="patch">
	<metadata>
		<title>pango-1.26.2-1.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0020" ref_url="https://www.suse.com/security/cve/CVE-2011-0020/" source="CVE"/>
		<reference ref_id="CVE-2011-0064" ref_url="https://www.suse.com/security/cve/CVE-2011-0064/" source="CVE"/>
		<description>
These are all security issues fixed in the pango-1.26.2-1.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0020/">CVE-2011-0020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0020">CVE-2011-0020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0064/">CVE-2011-0064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0064">CVE-2011-0064 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989395" comment="pango-1.26.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989396" comment="pango-32bit-1.26.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989397" comment="pango-doc-1.26.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989398" comment="pango-x86-1.26.2-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215916" version="1" class="patch">
	<metadata>
		<title>pcsc-ccid-1.3.8-3.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-4530" ref_url="https://www.suse.com/security/cve/CVE-2010-4530/" source="CVE"/>
		<description>
These are all security issues fixed in the pcsc-ccid-1.3.8-3.15.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4530/">CVE-2010-4530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4530">CVE-2010-4530 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989399" comment="pcsc-ccid-1.3.8-3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215917" version="1" class="patch">
	<metadata>
		<title>pcsc-lite-1.4.102-1.37.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-0407" ref_url="https://www.suse.com/security/cve/CVE-2010-0407/" source="CVE"/>
		<reference ref_id="CVE-2010-4531" ref_url="https://www.suse.com/security/cve/CVE-2010-4531/" source="CVE"/>
		<description>
These are all security issues fixed in the pcsc-lite-1.4.102-1.37.3 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0407/">CVE-2010-0407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0407">CVE-2010-0407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4531/">CVE-2010-4531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4531">CVE-2010-4531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989400" comment="pcsc-lite-1.4.102-1.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989401" comment="pcsc-lite-32bit-1.4.102-1.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989402" comment="pcsc-lite-x86-1.4.102-1.37.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215918" version="1" class="patch">
	<metadata>
		<title>perl-32bit-5.10.0-64.55.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-5116" ref_url="https://www.suse.com/security/cve/CVE-2007-5116/" source="CVE"/>
		<reference ref_id="CVE-2010-1168" ref_url="https://www.suse.com/security/cve/CVE-2010-1168/" source="CVE"/>
		<reference ref_id="CVE-2010-1447" ref_url="https://www.suse.com/security/cve/CVE-2010-1447/" source="CVE"/>
		<reference ref_id="CVE-2010-2761" ref_url="https://www.suse.com/security/cve/CVE-2010-2761/" source="CVE"/>
		<reference ref_id="CVE-2010-4410" ref_url="https://www.suse.com/security/cve/CVE-2010-4410/" source="CVE"/>
		<reference ref_id="CVE-2010-4411" ref_url="https://www.suse.com/security/cve/CVE-2010-4411/" source="CVE"/>
		<reference ref_id="CVE-2010-4777" ref_url="https://www.suse.com/security/cve/CVE-2010-4777/" source="CVE"/>
		<reference ref_id="CVE-2011-1487" ref_url="https://www.suse.com/security/cve/CVE-2011-1487/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-32bit-5.10.0-64.55.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5116/">CVE-2007-5116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5116">CVE-2007-5116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1168/">CVE-2010-1168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1168">CVE-2010-1168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1447/">CVE-2010-1447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1447">CVE-2010-1447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2761/">CVE-2010-2761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2761">CVE-2010-2761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4410/">CVE-2010-4410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4410">CVE-2010-4410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4411/">CVE-2010-4411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4411">CVE-2010-4411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4777/">CVE-2010-4777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4777">CVE-2010-4777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1487/">CVE-2011-1487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1487">CVE-2011-1487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989403" comment="perl-5.10.0-64.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989404" comment="perl-32bit-5.10.0-64.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989405" comment="perl-base-5.10.0-64.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989406" comment="perl-doc-5.10.0-64.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989407" comment="perl-x86-5.10.0-64.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215919" version="1" class="patch">
	<metadata>
		<title>perl-HTML-Parser-3.56-1.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-3627" ref_url="https://www.suse.com/security/cve/CVE-2009-3627/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-HTML-Parser-3.56-1.18.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3627/">CVE-2009-3627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3627">CVE-2009-3627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988822" comment="perl-HTML-Parser-3.56-1.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215920" version="1" class="patch">
	<metadata>
		<title>perl-Tk-804.028-50.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-4484" ref_url="https://www.suse.com/security/cve/CVE-2006-4484/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Tk-804.028-50.24 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4484/">CVE-2006-4484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4484">CVE-2006-4484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988823" comment="perl-Tk-804.028-50.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215921" version="1" class="patch">
	<metadata>
		<title>perl-libwww-perl-5.816-2.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0633" ref_url="https://www.suse.com/security/cve/CVE-2011-0633/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-libwww-perl-5.816-2.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0633/">CVE-2011-0633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0633">CVE-2011-0633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989408" comment="perl-libwww-perl-5.816-2.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215922" version="1" class="patch">
	<metadata>
		<title>perl-spamassassin-3.3.1-10.8.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-0451" ref_url="https://www.suse.com/security/cve/CVE-2007-0451/" source="CVE"/>
		<reference ref_id="CVE-2007-2873" ref_url="https://www.suse.com/security/cve/CVE-2007-2873/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-spamassassin-3.3.1-10.8.3 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0451/">CVE-2007-0451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0451">CVE-2007-0451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2873/">CVE-2007-2873 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2873">CVE-2007-2873 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989409" comment="perl-spamassassin-3.3.1-10.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989410" comment="spamassassin-3.3.1-10.8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215923" version="1" class="patch">
	<metadata>
		<title>postgresql-8.3.14-0.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-4769" ref_url="https://www.suse.com/security/cve/CVE-2007-4769/" source="CVE"/>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2007-6067" ref_url="https://www.suse.com/security/cve/CVE-2007-6067/" source="CVE"/>
		<reference ref_id="CVE-2007-6600" ref_url="https://www.suse.com/security/cve/CVE-2007-6600/" source="CVE"/>
		<reference ref_id="CVE-2007-6601" ref_url="https://www.suse.com/security/cve/CVE-2007-6601/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-4034" ref_url="https://www.suse.com/security/cve/CVE-2009-4034/" source="CVE"/>
		<reference ref_id="CVE-2009-4136" ref_url="https://www.suse.com/security/cve/CVE-2009-4136/" source="CVE"/>
		<reference ref_id="CVE-2010-0442" ref_url="https://www.suse.com/security/cve/CVE-2010-0442/" source="CVE"/>
		<reference ref_id="CVE-2010-1169" ref_url="https://www.suse.com/security/cve/CVE-2010-1169/" source="CVE"/>
		<reference ref_id="CVE-2010-1170" ref_url="https://www.suse.com/security/cve/CVE-2010-1170/" source="CVE"/>
		<reference ref_id="CVE-2010-3433" ref_url="https://www.suse.com/security/cve/CVE-2010-3433/" source="CVE"/>
		<reference ref_id="CVE-2010-4014" ref_url="https://www.suse.com/security/cve/CVE-2010-4014/" source="CVE"/>
		<reference ref_id="CVE-2010-4015" ref_url="https://www.suse.com/security/cve/CVE-2010-4015/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql-8.3.14-0.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4769/">CVE-2007-4769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4769">CVE-2007-4769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4772">CVE-2007-4772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6067/">CVE-2007-6067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6067">CVE-2007-6067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6600/">CVE-2007-6600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6600">CVE-2007-6600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6601/">CVE-2007-6601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6601">CVE-2007-6601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4034/">CVE-2009-4034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4034">CVE-2009-4034 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4136/">CVE-2009-4136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4136">CVE-2009-4136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0442/">CVE-2010-0442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0442">CVE-2010-0442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1169/">CVE-2010-1169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1169">CVE-2010-1169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1170/">CVE-2010-1170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1170">CVE-2010-1170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3433/">CVE-2010-3433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3433">CVE-2010-3433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4014/">CVE-2010-4014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4014">CVE-2010-4014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4015/">CVE-2010-4015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4015">CVE-2010-4015 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989411" comment="postgresql-8.3.14-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989412" comment="postgresql-contrib-8.3.14-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989413" comment="postgresql-docs-8.3.14-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989414" comment="postgresql-libs-8.3.14-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989415" comment="postgresql-libs-32bit-8.3.14-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989416" comment="postgresql-libs-x86-8.3.14-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989417" comment="postgresql-server-8.3.14-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215924" version="1" class="patch">
	<metadata>
		<title>puppet-2.6.12-0.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-0156" ref_url="https://www.suse.com/security/cve/CVE-2010-0156/" source="CVE"/>
		<reference ref_id="CVE-2011-3848" ref_url="https://www.suse.com/security/cve/CVE-2011-3848/" source="CVE"/>
		<reference ref_id="CVE-2011-3869" ref_url="https://www.suse.com/security/cve/CVE-2011-3869/" source="CVE"/>
		<reference ref_id="CVE-2011-3870" ref_url="https://www.suse.com/security/cve/CVE-2011-3870/" source="CVE"/>
		<reference ref_id="CVE-2011-3871" ref_url="https://www.suse.com/security/cve/CVE-2011-3871/" source="CVE"/>
		<reference ref_id="CVE-2011-3872" ref_url="https://www.suse.com/security/cve/CVE-2011-3872/" source="CVE"/>
		<description>
These are all security issues fixed in the puppet-2.6.12-0.10.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0156/">CVE-2010-0156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0156">CVE-2010-0156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3848/">CVE-2011-3848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3848">CVE-2011-3848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3869/">CVE-2011-3869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3869">CVE-2011-3869 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3870/">CVE-2011-3870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3870">CVE-2011-3870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3871/">CVE-2011-3871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3871">CVE-2011-3871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3872/">CVE-2011-3872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3872">CVE-2011-3872 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989418" comment="puppet-2.6.12-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989419" comment="puppet-server-2.6.12-0.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215925" version="1" class="patch">
	<metadata>
		<title>pure-ftpd-1.0.22-3.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0411" ref_url="https://www.suse.com/security/cve/CVE-2011-0411/" source="CVE"/>
		<reference ref_id="CVE-2011-3171" ref_url="https://www.suse.com/security/cve/CVE-2011-3171/" source="CVE"/>
		<description>
These are all security issues fixed in the pure-ftpd-1.0.22-3.15.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0411/">CVE-2011-0411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0411">CVE-2011-0411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3171/">CVE-2011-3171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3171">CVE-2011-3171 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989420" comment="pure-ftpd-1.0.22-3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215926" version="1" class="patch">
	<metadata>
		<title>python-2.6.0-8.12.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-2052" ref_url="https://www.suse.com/security/cve/CVE-2007-2052/" source="CVE"/>
		<reference ref_id="CVE-2008-1721" ref_url="https://www.suse.com/security/cve/CVE-2008-1721/" source="CVE"/>
		<reference ref_id="CVE-2008-2315" ref_url="https://www.suse.com/security/cve/CVE-2008-2315/" source="CVE"/>
		<reference ref_id="CVE-2008-2316" ref_url="https://www.suse.com/security/cve/CVE-2008-2316/" source="CVE"/>
		<reference ref_id="CVE-2008-3142" ref_url="https://www.suse.com/security/cve/CVE-2008-3142/" source="CVE"/>
		<reference ref_id="CVE-2008-3143" ref_url="https://www.suse.com/security/cve/CVE-2008-3143/" source="CVE"/>
		<reference ref_id="CVE-2008-3144" ref_url="https://www.suse.com/security/cve/CVE-2008-3144/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.6.0-8.12.2 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2052/">CVE-2007-2052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2052">CVE-2007-2052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1721/">CVE-2008-1721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1721">CVE-2008-1721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2315/">CVE-2008-2315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2315">CVE-2008-2315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2316/">CVE-2008-2316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2316">CVE-2008-2316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3142/">CVE-2008-3142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3142">CVE-2008-3142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3143/">CVE-2008-3143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3143">CVE-2008-3143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3144/">CVE-2008-3144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3144">CVE-2008-3144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989421" comment="python-2.6.0-8.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989422" comment="python-32bit-2.6.0-8.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989423" comment="python-curses-2.6.0-8.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989424" comment="python-demo-2.6.0-8.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989425" comment="python-gdbm-2.6.0-8.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989426" comment="python-idle-2.6.0-8.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989427" comment="python-tk-2.6.0-8.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989428" comment="python-x86-2.6.0-8.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215927" version="1" class="patch">
	<metadata>
		<title>python-sssd-config-1.5.11-0.9.96 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-4341" ref_url="https://www.suse.com/security/cve/CVE-2010-4341/" source="CVE"/>
		<reference ref_id="CVE-2011-1758" ref_url="https://www.suse.com/security/cve/CVE-2011-1758/" source="CVE"/>
		<description>
These are all security issues fixed in the python-sssd-config-1.5.11-0.9.96 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4341/">CVE-2010-4341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4341">CVE-2010-4341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1758/">CVE-2011-1758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1758">CVE-2011-1758 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989429" comment="python-sssd-config-1.5.11-0.9.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989430" comment="sssd-1.5.11-0.9.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989431" comment="sssd-32bit-1.5.11-0.9.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989432" comment="sssd-tools-1.5.11-0.9.96 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215928" version="1" class="patch">
	<metadata>
		<title>pyxml-0.8.4-194.23.38 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<description>
These are all security issues fixed in the pyxml-0.8.4-194.23.38 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3560">CVE-2009-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3720">CVE-2009-3720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988734" comment="pyxml-0.8.4-194.23.38 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215929" version="1" class="patch">
	<metadata>
		<title>qt3-3.3.8b-88.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-4811" ref_url="https://www.suse.com/security/cve/CVE-2006-4811/" source="CVE"/>
		<reference ref_id="CVE-2007-0242" ref_url="https://www.suse.com/security/cve/CVE-2007-0242/" source="CVE"/>
		<reference ref_id="CVE-2007-3388" ref_url="https://www.suse.com/security/cve/CVE-2007-3388/" source="CVE"/>
		<reference ref_id="CVE-2007-4137" ref_url="https://www.suse.com/security/cve/CVE-2007-4137/" source="CVE"/>
		<description>
These are all security issues fixed in the qt3-3.3.8b-88.21 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4811/">CVE-2006-4811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4811">CVE-2006-4811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0242/">CVE-2007-0242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0242">CVE-2007-0242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3388/">CVE-2007-3388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3388">CVE-2007-3388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4137/">CVE-2007-4137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4137">CVE-2007-4137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988843" comment="qt3-3.3.8b-88.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988844" comment="qt3-32bit-3.3.8b-88.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988845" comment="qt3-x86-3.3.8b-88.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215930" version="1" class="patch">
	<metadata>
		<title>quagga-0.99.15-0.6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-2223" ref_url="https://www.suse.com/security/cve/CVE-2006-2223/" source="CVE"/>
		<reference ref_id="CVE-2007-1995" ref_url="https://www.suse.com/security/cve/CVE-2007-1995/" source="CVE"/>
		<reference ref_id="CVE-2010-1674" ref_url="https://www.suse.com/security/cve/CVE-2010-1674/" source="CVE"/>
		<reference ref_id="CVE-2010-1675" ref_url="https://www.suse.com/security/cve/CVE-2010-1675/" source="CVE"/>
		<reference ref_id="CVE-2010-2948" ref_url="https://www.suse.com/security/cve/CVE-2010-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-2949" ref_url="https://www.suse.com/security/cve/CVE-2010-2949/" source="CVE"/>
		<description>
These are all security issues fixed in the quagga-0.99.15-0.6.2 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2223/">CVE-2006-2223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2223">CVE-2006-2223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1995/">CVE-2007-1995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1995">CVE-2007-1995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1674/">CVE-2010-1674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1674">CVE-2010-1674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1675/">CVE-2010-1675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1675">CVE-2010-1675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2948/">CVE-2010-2948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2948">CVE-2010-2948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2949/">CVE-2010-2949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2949">CVE-2010-2949 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989433" comment="quagga-0.99.15-0.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215931" version="1" class="patch">
	<metadata>
		<title>radvd-1.1-1.24.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-3602" ref_url="https://www.suse.com/security/cve/CVE-2011-3602/" source="CVE"/>
		<reference ref_id="CVE-2011-3603" ref_url="https://www.suse.com/security/cve/CVE-2011-3603/" source="CVE"/>
		<reference ref_id="CVE-2011-3604" ref_url="https://www.suse.com/security/cve/CVE-2011-3604/" source="CVE"/>
		<reference ref_id="CVE-2011-3605" ref_url="https://www.suse.com/security/cve/CVE-2011-3605/" source="CVE"/>
		<description>
These are all security issues fixed in the radvd-1.1-1.24.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3602/">CVE-2011-3602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3602">CVE-2011-3602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3603/">CVE-2011-3603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3603">CVE-2011-3603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3604/">CVE-2011-3604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3604">CVE-2011-3604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3605/">CVE-2011-3605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3605">CVE-2011-3605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989434" comment="radvd-1.1-1.24.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215932" version="1" class="patch">
	<metadata>
		<title>rsync-3.0.4-2.38.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-4091" ref_url="https://www.suse.com/security/cve/CVE-2007-4091/" source="CVE"/>
		<reference ref_id="CVE-2007-6199" ref_url="https://www.suse.com/security/cve/CVE-2007-6199/" source="CVE"/>
		<reference ref_id="CVE-2011-1097" ref_url="https://www.suse.com/security/cve/CVE-2011-1097/" source="CVE"/>
		<description>
These are all security issues fixed in the rsync-3.0.4-2.38.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4091/">CVE-2007-4091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4091">CVE-2007-4091 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6199/">CVE-2007-6199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6199">CVE-2007-6199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1097/">CVE-2011-1097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1097">CVE-2011-1097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989435" comment="rsync-3.0.4-2.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215933" version="1" class="patch">
	<metadata>
		<title>rsyslog-5.8.7-0.5.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-3200" ref_url="https://www.suse.com/security/cve/CVE-2011-3200/" source="CVE"/>
		<description>
These are all security issues fixed in the rsyslog-5.8.7-0.5.5 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3200/">CVE-2011-3200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3200">CVE-2011-3200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989436" comment="rsyslog-5.8.7-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989437" comment="rsyslog-diag-tools-5.8.7-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989438" comment="rsyslog-doc-5.8.7-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989439" comment="rsyslog-module-gssapi-5.8.7-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989440" comment="rsyslog-module-gtls-5.8.7-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989441" comment="rsyslog-module-mysql-5.8.7-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989442" comment="rsyslog-module-pgsql-5.8.7-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989443" comment="rsyslog-module-relp-5.8.7-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989444" comment="rsyslog-module-snmp-5.8.7-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989445" comment="rsyslog-module-udpspoof-5.8.7-0.5.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215934" version="1" class="patch">
	<metadata>
		<title>ruby-1.8.7.p357-0.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-3694" ref_url="https://www.suse.com/security/cve/CVE-2006-3694/" source="CVE"/>
		<reference ref_id="CVE-2006-5467" ref_url="https://www.suse.com/security/cve/CVE-2006-5467/" source="CVE"/>
		<reference ref_id="CVE-2006-6303" ref_url="https://www.suse.com/security/cve/CVE-2006-6303/" source="CVE"/>
		<reference ref_id="CVE-2007-5162" ref_url="https://www.suse.com/security/cve/CVE-2007-5162/" source="CVE"/>
		<reference ref_id="CVE-2007-5770" ref_url="https://www.suse.com/security/cve/CVE-2007-5770/" source="CVE"/>
		<reference ref_id="CVE-2008-1145" ref_url="https://www.suse.com/security/cve/CVE-2008-1145/" source="CVE"/>
		<reference ref_id="CVE-2008-3790" ref_url="https://www.suse.com/security/cve/CVE-2008-3790/" source="CVE"/>
		<reference ref_id="CVE-2009-0642" ref_url="https://www.suse.com/security/cve/CVE-2009-0642/" source="CVE"/>
		<reference ref_id="CVE-2009-1904" ref_url="https://www.suse.com/security/cve/CVE-2009-1904/" source="CVE"/>
		<reference ref_id="CVE-2009-4492" ref_url="https://www.suse.com/security/cve/CVE-2009-4492/" source="CVE"/>
		<reference ref_id="CVE-2010-0541" ref_url="https://www.suse.com/security/cve/CVE-2010-0541/" source="CVE"/>
		<reference ref_id="CVE-2011-0188" ref_url="https://www.suse.com/security/cve/CVE-2011-0188/" source="CVE"/>
		<reference ref_id="CVE-2011-1004" ref_url="https://www.suse.com/security/cve/CVE-2011-1004/" source="CVE"/>
		<reference ref_id="CVE-2011-1005" ref_url="https://www.suse.com/security/cve/CVE-2011-1005/" source="CVE"/>
		<reference ref_id="CVE-2011-2686" ref_url="https://www.suse.com/security/cve/CVE-2011-2686/" source="CVE"/>
		<reference ref_id="CVE-2011-2705" ref_url="https://www.suse.com/security/cve/CVE-2011-2705/" source="CVE"/>
		<reference ref_id="CVE-2011-3009" ref_url="https://www.suse.com/security/cve/CVE-2011-3009/" source="CVE"/>
		<reference ref_id="CVE-2011-4815" ref_url="https://www.suse.com/security/cve/CVE-2011-4815/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby-1.8.7.p357-0.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3694/">CVE-2006-3694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3694">CVE-2006-3694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5467/">CVE-2006-5467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5467">CVE-2006-5467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6303/">CVE-2006-6303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6303">CVE-2006-6303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5162/">CVE-2007-5162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5162">CVE-2007-5162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5770/">CVE-2007-5770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5770">CVE-2007-5770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1145/">CVE-2008-1145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1145">CVE-2008-1145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3790/">CVE-2008-3790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3790">CVE-2008-3790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0642/">CVE-2009-0642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0642">CVE-2009-0642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1904/">CVE-2009-1904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1904">CVE-2009-1904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4492/">CVE-2009-4492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4492">CVE-2009-4492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0541/">CVE-2010-0541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0541">CVE-2010-0541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0188/">CVE-2011-0188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0188">CVE-2011-0188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1004/">CVE-2011-1004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1004">CVE-2011-1004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1005/">CVE-2011-1005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1005">CVE-2011-1005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2686/">CVE-2011-2686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2686">CVE-2011-2686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2705/">CVE-2011-2705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2705">CVE-2011-2705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3009/">CVE-2011-3009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3009">CVE-2011-3009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4815/">CVE-2011-4815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4815">CVE-2011-4815 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989446" comment="ruby-1.8.7.p357-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989447" comment="ruby-doc-html-1.8.7.p357-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989448" comment="ruby-tk-1.8.7.p357-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215935" version="1" class="patch">
	<metadata>
		<title>squid-2.7.STABLE5-2.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0478" ref_url="https://www.suse.com/security/cve/CVE-2009-0478/" source="CVE"/>
		<reference ref_id="CVE-2009-2855" ref_url="https://www.suse.com/security/cve/CVE-2009-2855/" source="CVE"/>
		<reference ref_id="CVE-2010-0308" ref_url="https://www.suse.com/security/cve/CVE-2010-0308/" source="CVE"/>
		<reference ref_id="CVE-2010-0639" ref_url="https://www.suse.com/security/cve/CVE-2010-0639/" source="CVE"/>
		<description>
These are all security issues fixed in the squid-2.7.STABLE5-2.10.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0478/">CVE-2009-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0478">CVE-2009-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2855/">CVE-2009-2855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2855">CVE-2009-2855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0308/">CVE-2010-0308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0308">CVE-2010-0308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0639/">CVE-2010-0639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0639">CVE-2010-0639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989449" comment="squid-2.7.STABLE5-2.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215936" version="1" class="patch">
	<metadata>
		<title>squid3-3.1.12-8.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2005-0094" ref_url="https://www.suse.com/security/cve/CVE-2005-0094/" source="CVE"/>
		<reference ref_id="CVE-2011-3205" ref_url="https://www.suse.com/security/cve/CVE-2011-3205/" source="CVE"/>
		<reference ref_id="CVE-2011-4096" ref_url="https://www.suse.com/security/cve/CVE-2011-4096/" source="CVE"/>
		<description>
These are all security issues fixed in the squid3-3.1.12-8.10.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-0094/">CVE-2005-0094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-0094">CVE-2005-0094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3205/">CVE-2011-3205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3205">CVE-2011-3205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4096/">CVE-2011-4096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4096">CVE-2011-4096 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989450" comment="squid3-3.1.12-8.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215937" version="1" class="patch">
	<metadata>
		<title>squidGuard-1.4-13.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-3700" ref_url="https://www.suse.com/security/cve/CVE-2009-3700/" source="CVE"/>
		<reference ref_id="CVE-2009-3826" ref_url="https://www.suse.com/security/cve/CVE-2009-3826/" source="CVE"/>
		<description>
These are all security issues fixed in the squidGuard-1.4-13.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3700/">CVE-2009-3700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3700">CVE-2009-3700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3826/">CVE-2009-3826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3826">CVE-2009-3826 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989451" comment="squidGuard-1.4-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989452" comment="squidGuard-doc-1.4-13.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215938" version="1" class="patch">
	<metadata>
		<title>star-1.5final-28.21.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-4134" ref_url="https://www.suse.com/security/cve/CVE-2007-4134/" source="CVE"/>
		<description>
These are all security issues fixed in the star-1.5final-28.21.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4134/">CVE-2007-4134 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4134">CVE-2007-4134 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989453" comment="star-1.5final-28.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215939" version="1" class="patch">
	<metadata>
		<title>sudo-1.7.6p2-0.2.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-0426" ref_url="https://www.suse.com/security/cve/CVE-2010-0426/" source="CVE"/>
		<reference ref_id="CVE-2010-0427" ref_url="https://www.suse.com/security/cve/CVE-2010-0427/" source="CVE"/>
		<description>
These are all security issues fixed in the sudo-1.7.6p2-0.2.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0426/">CVE-2010-0426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0426">CVE-2010-0426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0427/">CVE-2010-0427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0427">CVE-2010-0427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989454" comment="sudo-1.7.6p2-0.2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215940" version="1" class="patch">
	<metadata>
		<title>sysconfig-0.71.47-0.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-4182" ref_url="https://www.suse.com/security/cve/CVE-2011-4182/" source="CVE"/>
		<description>
These are all security issues fixed in the sysconfig-0.71.47-0.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4182/">CVE-2011-4182 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-4182">CVE-2011-4182 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989455" comment="sysconfig-0.71.47-0.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215941" version="1" class="patch">
	<metadata>
		<title>syslog-ng-2.0.9-27.32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-5110" ref_url="https://www.suse.com/security/cve/CVE-2008-5110/" source="CVE"/>
		<description>
These are all security issues fixed in the syslog-ng-2.0.9-27.32.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5110/">CVE-2008-5110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5110">CVE-2008-5110 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989456" comment="syslog-ng-2.0.9-27.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215942" version="1" class="patch">
	<metadata>
		<title>sysstat-8.1.5-7.32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-3852" ref_url="https://www.suse.com/security/cve/CVE-2007-3852/" source="CVE"/>
		<description>
These are all security issues fixed in the sysstat-8.1.5-7.32.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3852/">CVE-2007-3852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3852">CVE-2007-3852 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989457" comment="sysstat-8.1.5-7.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989458" comment="sysstat-isag-8.1.5-7.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215943" version="1" class="patch">
	<metadata>
		<title>system-config-printer-1.0.8-9.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-4405" ref_url="https://www.suse.com/security/cve/CVE-2011-4405/" source="CVE"/>
		<description>
These are all security issues fixed in the system-config-printer-1.0.8-9.16.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4405/">CVE-2011-4405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4405">CVE-2011-4405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989459" comment="system-config-printer-1.0.8-9.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989460" comment="system-config-printer-lang-1.0.8-9.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215944" version="1" class="patch">
	<metadata>
		<title>systemtap-1.5-0.7.54 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-2911" ref_url="https://www.suse.com/security/cve/CVE-2009-2911/" source="CVE"/>
		<reference ref_id="CVE-2009-4273" ref_url="https://www.suse.com/security/cve/CVE-2009-4273/" source="CVE"/>
		<description>
These are all security issues fixed in the systemtap-1.5-0.7.54 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2911/">CVE-2009-2911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2911">CVE-2009-2911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4273/">CVE-2009-4273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4273">CVE-2009-4273 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989461" comment="systemtap-1.5-0.7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989462" comment="systemtap-server-1.5-0.7.54 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215945" version="1" class="patch">
	<metadata>
		<title>t1lib-5.1.1-100.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2642" ref_url="https://www.suse.com/security/cve/CVE-2010-2642/" source="CVE"/>
		<description>
These are all security issues fixed in the t1lib-5.1.1-100.19.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2642/">CVE-2010-2642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2642">CVE-2010-2642 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989463" comment="t1lib-5.1.1-100.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215946" version="1" class="patch">
	<metadata>
		<title>tar-1.26-1.2.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2001-1267" ref_url="https://www.suse.com/security/cve/CVE-2001-1267/" source="CVE"/>
		<reference ref_id="CVE-2002-0399" ref_url="https://www.suse.com/security/cve/CVE-2002-0399/" source="CVE"/>
		<reference ref_id="CVE-2006-6097" ref_url="https://www.suse.com/security/cve/CVE-2006-6097/" source="CVE"/>
		<reference ref_id="CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624/" source="CVE"/>
		<description>
These are all security issues fixed in the tar-1.26-1.2.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2001-1267/">CVE-2001-1267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2001-1267">CVE-2001-1267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2002-0399/">CVE-2002-0399 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2002-0399">CVE-2002-0399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6097/">CVE-2006-6097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6097">CVE-2006-6097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0624">CVE-2010-0624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989464" comment="tar-1.26-1.2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215947" version="1" class="patch">
	<metadata>
		<title>tftp-0.48-101.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2199" ref_url="https://www.suse.com/security/cve/CVE-2011-2199/" source="CVE"/>
		<description>
These are all security issues fixed in the tftp-0.48-101.20.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2199/">CVE-2011-2199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2199">CVE-2011-2199 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989465" comment="tftp-0.48-101.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215948" version="1" class="patch">
	<metadata>
		<title>tgt-0.9.10-0.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0001" ref_url="https://www.suse.com/security/cve/CVE-2011-0001/" source="CVE"/>
		<description>
These are all security issues fixed in the tgt-0.9.10-0.15.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0001/">CVE-2011-0001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0001">CVE-2011-0001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989466" comment="tgt-0.9.10-0.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215949" version="1" class="patch">
	<metadata>
		<title>tomcat6-6.0.18-20.35.36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-1232" ref_url="https://www.suse.com/security/cve/CVE-2008-1232/" source="CVE"/>
		<reference ref_id="CVE-2008-1947" ref_url="https://www.suse.com/security/cve/CVE-2008-1947/" source="CVE"/>
		<reference ref_id="CVE-2008-2370" ref_url="https://www.suse.com/security/cve/CVE-2008-2370/" source="CVE"/>
		<reference ref_id="CVE-2008-2938" ref_url="https://www.suse.com/security/cve/CVE-2008-2938/" source="CVE"/>
		<reference ref_id="CVE-2008-5515" ref_url="https://www.suse.com/security/cve/CVE-2008-5515/" source="CVE"/>
		<reference ref_id="CVE-2009-0033" ref_url="https://www.suse.com/security/cve/CVE-2009-0033/" source="CVE"/>
		<reference ref_id="CVE-2009-0580" ref_url="https://www.suse.com/security/cve/CVE-2009-0580/" source="CVE"/>
		<reference ref_id="CVE-2009-0781" ref_url="https://www.suse.com/security/cve/CVE-2009-0781/" source="CVE"/>
		<reference ref_id="CVE-2009-0783" ref_url="https://www.suse.com/security/cve/CVE-2009-0783/" source="CVE"/>
		<reference ref_id="CVE-2009-2693" ref_url="https://www.suse.com/security/cve/CVE-2009-2693/" source="CVE"/>
		<reference ref_id="CVE-2009-2901" ref_url="https://www.suse.com/security/cve/CVE-2009-2901/" source="CVE"/>
		<reference ref_id="CVE-2009-2902" ref_url="https://www.suse.com/security/cve/CVE-2009-2902/" source="CVE"/>
		<reference ref_id="CVE-2010-1157" ref_url="https://www.suse.com/security/cve/CVE-2010-1157/" source="CVE"/>
		<reference ref_id="CVE-2010-2227" ref_url="https://www.suse.com/security/cve/CVE-2010-2227/" source="CVE"/>
		<reference ref_id="CVE-2010-3718" ref_url="https://www.suse.com/security/cve/CVE-2010-3718/" source="CVE"/>
		<reference ref_id="CVE-2010-4172" ref_url="https://www.suse.com/security/cve/CVE-2010-4172/" source="CVE"/>
		<reference ref_id="CVE-2011-0013" ref_url="https://www.suse.com/security/cve/CVE-2011-0013/" source="CVE"/>
		<reference ref_id="CVE-2011-0534" ref_url="https://www.suse.com/security/cve/CVE-2011-0534/" source="CVE"/>
		<reference ref_id="CVE-2011-1184" ref_url="https://www.suse.com/security/cve/CVE-2011-1184/" source="CVE"/>
		<reference ref_id="CVE-2011-2204" ref_url="https://www.suse.com/security/cve/CVE-2011-2204/" source="CVE"/>
		<reference ref_id="CVE-2011-2526" ref_url="https://www.suse.com/security/cve/CVE-2011-2526/" source="CVE"/>
		<reference ref_id="CVE-2011-3190" ref_url="https://www.suse.com/security/cve/CVE-2011-3190/" source="CVE"/>
		<reference ref_id="CVE-2011-5062" ref_url="https://www.suse.com/security/cve/CVE-2011-5062/" source="CVE"/>
		<reference ref_id="CVE-2011-5063" ref_url="https://www.suse.com/security/cve/CVE-2011-5063/" source="CVE"/>
		<reference ref_id="CVE-2011-5064" ref_url="https://www.suse.com/security/cve/CVE-2011-5064/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat6-6.0.18-20.35.36.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1232/">CVE-2008-1232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1232">CVE-2008-1232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1947/">CVE-2008-1947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1947">CVE-2008-1947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2370/">CVE-2008-2370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2370">CVE-2008-2370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2938/">CVE-2008-2938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2938">CVE-2008-2938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5515/">CVE-2008-5515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5515">CVE-2008-5515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0033/">CVE-2009-0033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0033">CVE-2009-0033 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0580/">CVE-2009-0580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0580">CVE-2009-0580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0781/">CVE-2009-0781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0781">CVE-2009-0781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0783/">CVE-2009-0783 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2009-0783">CVE-2009-0783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2693/">CVE-2009-2693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2693">CVE-2009-2693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2901/">CVE-2009-2901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2901">CVE-2009-2901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2902/">CVE-2009-2902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2902">CVE-2009-2902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1157/">CVE-2010-1157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1157">CVE-2010-1157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2227/">CVE-2010-2227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2227">CVE-2010-2227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3718/">CVE-2010-3718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3718">CVE-2010-3718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4172/">CVE-2010-4172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4172">CVE-2010-4172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0013/">CVE-2011-0013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0013">CVE-2011-0013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0534/">CVE-2011-0534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0534">CVE-2011-0534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1184/">CVE-2011-1184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1184">CVE-2011-1184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2204/">CVE-2011-2204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2204">CVE-2011-2204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2526/">CVE-2011-2526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2526">CVE-2011-2526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3190/">CVE-2011-3190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3190">CVE-2011-3190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5062/">CVE-2011-5062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-5062">CVE-2011-5062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5063/">CVE-2011-5063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-5063">CVE-2011-5063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5064/">CVE-2011-5064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-5064">CVE-2011-5064 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989467" comment="tomcat6-6.0.18-20.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989468" comment="tomcat6-admin-webapps-6.0.18-20.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989469" comment="tomcat6-docs-webapp-6.0.18-20.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989470" comment="tomcat6-javadoc-6.0.18-20.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989471" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989472" comment="tomcat6-lib-6.0.18-20.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989473" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989474" comment="tomcat6-webapps-6.0.18-20.35.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215950" version="1" class="patch">
	<metadata>
		<title>unrar-3.80.2-2.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-3726" ref_url="https://www.suse.com/security/cve/CVE-2007-3726/" source="CVE"/>
		<description>
These are all security issues fixed in the unrar-3.80.2-2.8 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3726/">CVE-2007-3726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3726">CVE-2007-3726 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988861" comment="unrar-3.80.2-2.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215951" version="1" class="patch">
	<metadata>
		<title>unzip-6.00-11.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2005-2475" ref_url="https://www.suse.com/security/cve/CVE-2005-2475/" source="CVE"/>
		<description>
These are all security issues fixed in the unzip-6.00-11.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-2475/">CVE-2005-2475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-2475">CVE-2005-2475 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989475" comment="unzip-6.00-11.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215952" version="1" class="patch">
	<metadata>
		<title>vte-0.22.5-0.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2713" ref_url="https://www.suse.com/security/cve/CVE-2010-2713/" source="CVE"/>
		<description>
These are all security issues fixed in the vte-0.22.5-0.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2713/">CVE-2010-2713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2713">CVE-2010-2713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989476" comment="vte-0.22.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989477" comment="vte-doc-0.22.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989478" comment="vte-lang-0.22.5-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215953" version="1" class="patch">
	<metadata>
		<title>w3m-0.5.2-132.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-6772" ref_url="https://www.suse.com/security/cve/CVE-2006-6772/" source="CVE"/>
		<reference ref_id="CVE-2010-2074" ref_url="https://www.suse.com/security/cve/CVE-2010-2074/" source="CVE"/>
		<description>
These are all security issues fixed in the w3m-0.5.2-132.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6772/">CVE-2006-6772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6772">CVE-2006-6772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2074/">CVE-2010-2074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2074">CVE-2010-2074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989479" comment="w3m-0.5.2-132.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215954" version="1" class="patch">
	<metadata>
		<title>wget-1.11.4-1.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-6719" ref_url="https://www.suse.com/security/cve/CVE-2006-6719/" source="CVE"/>
		<description>
These are all security issues fixed in the wget-1.11.4-1.15.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6719/">CVE-2006-6719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6719">CVE-2006-6719 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988864" comment="wget-1.11.4-1.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215955" version="1" class="patch">
	<metadata>
		<title>wireshark-1.4.10-0.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-1932" ref_url="https://www.suse.com/security/cve/CVE-2006-1932/" source="CVE"/>
		<reference ref_id="CVE-2006-4574" ref_url="https://www.suse.com/security/cve/CVE-2006-4574/" source="CVE"/>
		<reference ref_id="CVE-2006-4805" ref_url="https://www.suse.com/security/cve/CVE-2006-4805/" source="CVE"/>
		<reference ref_id="CVE-2006-5468" ref_url="https://www.suse.com/security/cve/CVE-2006-5468/" source="CVE"/>
		<reference ref_id="CVE-2006-5469" ref_url="https://www.suse.com/security/cve/CVE-2006-5469/" source="CVE"/>
		<reference ref_id="CVE-2006-5740" ref_url="https://www.suse.com/security/cve/CVE-2006-5740/" source="CVE"/>
		<reference ref_id="CVE-2007-0456" ref_url="https://www.suse.com/security/cve/CVE-2007-0456/" source="CVE"/>
		<reference ref_id="CVE-2007-0457" ref_url="https://www.suse.com/security/cve/CVE-2007-0457/" source="CVE"/>
		<reference ref_id="CVE-2007-0458" ref_url="https://www.suse.com/security/cve/CVE-2007-0458/" source="CVE"/>
		<reference ref_id="CVE-2007-0459" ref_url="https://www.suse.com/security/cve/CVE-2007-0459/" source="CVE"/>
		<reference ref_id="CVE-2009-1210" ref_url="https://www.suse.com/security/cve/CVE-2009-1210/" source="CVE"/>
		<reference ref_id="CVE-2009-1267" ref_url="https://www.suse.com/security/cve/CVE-2009-1267/" source="CVE"/>
		<reference ref_id="CVE-2009-1268" ref_url="https://www.suse.com/security/cve/CVE-2009-1268/" source="CVE"/>
		<reference ref_id="CVE-2009-1269" ref_url="https://www.suse.com/security/cve/CVE-2009-1269/" source="CVE"/>
		<reference ref_id="CVE-2009-2560" ref_url="https://www.suse.com/security/cve/CVE-2009-2560/" source="CVE"/>
		<reference ref_id="CVE-2009-2562" ref_url="https://www.suse.com/security/cve/CVE-2009-2562/" source="CVE"/>
		<reference ref_id="CVE-2009-3549" ref_url="https://www.suse.com/security/cve/CVE-2009-3549/" source="CVE"/>
		<reference ref_id="CVE-2009-3550" ref_url="https://www.suse.com/security/cve/CVE-2009-3550/" source="CVE"/>
		<reference ref_id="CVE-2009-3829" ref_url="https://www.suse.com/security/cve/CVE-2009-3829/" source="CVE"/>
		<reference ref_id="CVE-2009-4377" ref_url="https://www.suse.com/security/cve/CVE-2009-4377/" source="CVE"/>
		<reference ref_id="CVE-2010-0304" ref_url="https://www.suse.com/security/cve/CVE-2010-0304/" source="CVE"/>
		<reference ref_id="CVE-2010-1455" ref_url="https://www.suse.com/security/cve/CVE-2010-1455/" source="CVE"/>
		<reference ref_id="CVE-2010-2992" ref_url="https://www.suse.com/security/cve/CVE-2010-2992/" source="CVE"/>
		<reference ref_id="CVE-2010-2993" ref_url="https://www.suse.com/security/cve/CVE-2010-2993/" source="CVE"/>
		<reference ref_id="CVE-2010-2994" ref_url="https://www.suse.com/security/cve/CVE-2010-2994/" source="CVE"/>
		<reference ref_id="CVE-2010-2995" ref_url="https://www.suse.com/security/cve/CVE-2010-2995/" source="CVE"/>
		<reference ref_id="CVE-2010-3445" ref_url="https://www.suse.com/security/cve/CVE-2010-3445/" source="CVE"/>
		<reference ref_id="CVE-2010-4300" ref_url="https://www.suse.com/security/cve/CVE-2010-4300/" source="CVE"/>
		<reference ref_id="CVE-2010-4301" ref_url="https://www.suse.com/security/cve/CVE-2010-4301/" source="CVE"/>
		<reference ref_id="CVE-2010-4538" ref_url="https://www.suse.com/security/cve/CVE-2010-4538/" source="CVE"/>
		<reference ref_id="CVE-2011-0024" ref_url="https://www.suse.com/security/cve/CVE-2011-0024/" source="CVE"/>
		<reference ref_id="CVE-2011-0538" ref_url="https://www.suse.com/security/cve/CVE-2011-0538/" source="CVE"/>
		<reference ref_id="CVE-2011-0713" ref_url="https://www.suse.com/security/cve/CVE-2011-0713/" source="CVE"/>
		<reference ref_id="CVE-2011-1138" ref_url="https://www.suse.com/security/cve/CVE-2011-1138/" source="CVE"/>
		<reference ref_id="CVE-2011-1139" ref_url="https://www.suse.com/security/cve/CVE-2011-1139/" source="CVE"/>
		<reference ref_id="CVE-2011-1140" ref_url="https://www.suse.com/security/cve/CVE-2011-1140/" source="CVE"/>
		<reference ref_id="CVE-2011-1143" ref_url="https://www.suse.com/security/cve/CVE-2011-1143/" source="CVE"/>
		<reference ref_id="CVE-2011-1590" ref_url="https://www.suse.com/security/cve/CVE-2011-1590/" source="CVE"/>
		<reference ref_id="CVE-2011-1591" ref_url="https://www.suse.com/security/cve/CVE-2011-1591/" source="CVE"/>
		<reference ref_id="CVE-2011-1592" ref_url="https://www.suse.com/security/cve/CVE-2011-1592/" source="CVE"/>
		<reference ref_id="CVE-2011-1957" ref_url="https://www.suse.com/security/cve/CVE-2011-1957/" source="CVE"/>
		<reference ref_id="CVE-2011-1958" ref_url="https://www.suse.com/security/cve/CVE-2011-1958/" source="CVE"/>
		<reference ref_id="CVE-2011-1959" ref_url="https://www.suse.com/security/cve/CVE-2011-1959/" source="CVE"/>
		<reference ref_id="CVE-2011-2174" ref_url="https://www.suse.com/security/cve/CVE-2011-2174/" source="CVE"/>
		<reference ref_id="CVE-2011-2175" ref_url="https://www.suse.com/security/cve/CVE-2011-2175/" source="CVE"/>
		<reference ref_id="CVE-2011-2597" ref_url="https://www.suse.com/security/cve/CVE-2011-2597/" source="CVE"/>
		<reference ref_id="CVE-2011-2698" ref_url="https://www.suse.com/security/cve/CVE-2011-2698/" source="CVE"/>
		<reference ref_id="CVE-2011-3266" ref_url="https://www.suse.com/security/cve/CVE-2011-3266/" source="CVE"/>
		<reference ref_id="CVE-2011-3360" ref_url="https://www.suse.com/security/cve/CVE-2011-3360/" source="CVE"/>
		<reference ref_id="CVE-2011-3483" ref_url="https://www.suse.com/security/cve/CVE-2011-3483/" source="CVE"/>
		<description>
These are all security issues fixed in the wireshark-1.4.10-0.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1932/">CVE-2006-1932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1932">CVE-2006-1932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4574/">CVE-2006-4574 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2006-4574">CVE-2006-4574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4805/">CVE-2006-4805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4805">CVE-2006-4805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5468/">CVE-2006-5468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5468">CVE-2006-5468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5469/">CVE-2006-5469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5469">CVE-2006-5469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5740/">CVE-2006-5740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5740">CVE-2006-5740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0456/">CVE-2007-0456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0456">CVE-2007-0456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0457/">CVE-2007-0457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0457">CVE-2007-0457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0458/">CVE-2007-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0458">CVE-2007-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0459/">CVE-2007-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0459">CVE-2007-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1210/">CVE-2009-1210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1210">CVE-2009-1210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1267/">CVE-2009-1267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1267">CVE-2009-1267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1268/">CVE-2009-1268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1268">CVE-2009-1268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1269/">CVE-2009-1269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1269">CVE-2009-1269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2560/">CVE-2009-2560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2560">CVE-2009-2560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2562/">CVE-2009-2562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2562">CVE-2009-2562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3549/">CVE-2009-3549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3549">CVE-2009-3549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3550/">CVE-2009-3550 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3550">CVE-2009-3550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3829/">CVE-2009-3829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3829">CVE-2009-3829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4377/">CVE-2009-4377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4377">CVE-2009-4377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0304/">CVE-2010-0304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0304">CVE-2010-0304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1455/">CVE-2010-1455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1455">CVE-2010-1455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2992/">CVE-2010-2992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2992">CVE-2010-2992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2993/">CVE-2010-2993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2993">CVE-2010-2993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2994/">CVE-2010-2994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2994">CVE-2010-2994 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2995/">CVE-2010-2995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2995">CVE-2010-2995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3445/">CVE-2010-3445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3445">CVE-2010-3445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4300/">CVE-2010-4300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4300">CVE-2010-4300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4301/">CVE-2010-4301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4301">CVE-2010-4301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4538/">CVE-2010-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4538">CVE-2010-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0024/">CVE-2011-0024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0024">CVE-2011-0024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0538/">CVE-2011-0538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0538">CVE-2011-0538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0713/">CVE-2011-0713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0713">CVE-2011-0713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1138/">CVE-2011-1138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1138">CVE-2011-1138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1139/">CVE-2011-1139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1139">CVE-2011-1139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1140/">CVE-2011-1140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1140">CVE-2011-1140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1143/">CVE-2011-1143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1143">CVE-2011-1143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1590/">CVE-2011-1590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1590">CVE-2011-1590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1591/">CVE-2011-1591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1591">CVE-2011-1591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1592/">CVE-2011-1592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1592">CVE-2011-1592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1957/">CVE-2011-1957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1957">CVE-2011-1957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1958/">CVE-2011-1958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1958">CVE-2011-1958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1959/">CVE-2011-1959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1959">CVE-2011-1959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2174/">CVE-2011-2174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2174">CVE-2011-2174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2175/">CVE-2011-2175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2175">CVE-2011-2175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2597/">CVE-2011-2597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2597">CVE-2011-2597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2698/">CVE-2011-2698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2698">CVE-2011-2698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3266/">CVE-2011-3266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3266">CVE-2011-3266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3360/">CVE-2011-3360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3360">CVE-2011-3360 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3483/">CVE-2011-3483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3483">CVE-2011-3483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989480" comment="wireshark-1.4.10-0.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215956" version="1" class="patch">
	<metadata>
		<title>xdg-utils-1.0.2-36.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-0386" ref_url="https://www.suse.com/security/cve/CVE-2008-0386/" source="CVE"/>
		<description>
These are all security issues fixed in the xdg-utils-1.0.2-36.18 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0386/">CVE-2008-0386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0386">CVE-2008-0386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988866" comment="xdg-utils-1.0.2-36.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215957" version="1" class="patch">
	<metadata>
		<title>xen-4.1.2_14-0.5.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-1320" ref_url="https://www.suse.com/security/cve/CVE-2007-1320/" source="CVE"/>
		<reference ref_id="CVE-2007-1321" ref_url="https://www.suse.com/security/cve/CVE-2007-1321/" source="CVE"/>
		<reference ref_id="CVE-2007-1322" ref_url="https://www.suse.com/security/cve/CVE-2007-1322/" source="CVE"/>
		<reference ref_id="CVE-2007-1323" ref_url="https://www.suse.com/security/cve/CVE-2007-1323/" source="CVE"/>
		<reference ref_id="CVE-2007-1366" ref_url="https://www.suse.com/security/cve/CVE-2007-1366/" source="CVE"/>
		<reference ref_id="CVE-2007-3919" ref_url="https://www.suse.com/security/cve/CVE-2007-3919/" source="CVE"/>
		<reference ref_id="CVE-2011-1898" ref_url="https://www.suse.com/security/cve/CVE-2011-1898/" source="CVE"/>
		<reference ref_id="CVE-2012-0029" ref_url="https://www.suse.com/security/cve/CVE-2012-0029/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.1.2_14-0.5.5 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1320/">CVE-2007-1320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1320">CVE-2007-1320 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1321/">CVE-2007-1321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1321">CVE-2007-1321 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1322/">CVE-2007-1322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1322">CVE-2007-1322 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1323/">CVE-2007-1323 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1323">CVE-2007-1323 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1366/">CVE-2007-1366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1366">CVE-2007-1366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3919/">CVE-2007-3919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3919">CVE-2007-3919 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1898/">CVE-2011-1898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1898">CVE-2011-1898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0029/">CVE-2012-0029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0029">CVE-2012-0029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989481" comment="xen-4.1.2_14-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989482" comment="xen-doc-html-4.1.2_14-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989483" comment="xen-doc-pdf-4.1.2_14-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989484" comment="xen-kmp-default-4.1.2_14_3.0.13_0.27-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989485" comment="xen-kmp-pae-4.1.2_14_3.0.13_0.27-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989486" comment="xen-libs-4.1.2_14-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989487" comment="xen-libs-32bit-4.1.2_14-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989488" comment="xen-tools-4.1.2_14-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989489" comment="xen-tools-domU-4.1.2_14-0.5.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215958" version="1" class="patch">
	<metadata>
		<title>xorg-x11-7.4-9.47.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-4568" ref_url="https://www.suse.com/security/cve/CVE-2007-4568/" source="CVE"/>
		<reference ref_id="CVE-2011-0465" ref_url="https://www.suse.com/security/cve/CVE-2011-0465/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-7.4-9.47.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4568/">CVE-2007-4568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4568">CVE-2007-4568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0465/">CVE-2011-0465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0465">CVE-2011-0465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989490" comment="xorg-x11-7.4-9.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989491" comment="xorg-x11-xauth-7.4-9.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215959" version="1" class="patch">
	<metadata>
		<title>xorg-x11-Xvnc-7.4-27.60.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-6101" ref_url="https://www.suse.com/security/cve/CVE-2006-6101/" source="CVE"/>
		<reference ref_id="CVE-2006-6102" ref_url="https://www.suse.com/security/cve/CVE-2006-6102/" source="CVE"/>
		<reference ref_id="CVE-2006-6103" ref_url="https://www.suse.com/security/cve/CVE-2006-6103/" source="CVE"/>
		<reference ref_id="CVE-2007-1003" ref_url="https://www.suse.com/security/cve/CVE-2007-1003/" source="CVE"/>
		<reference ref_id="CVE-2007-5760" ref_url="https://www.suse.com/security/cve/CVE-2007-5760/" source="CVE"/>
		<reference ref_id="CVE-2007-6427" ref_url="https://www.suse.com/security/cve/CVE-2007-6427/" source="CVE"/>
		<reference ref_id="CVE-2007-6428" ref_url="https://www.suse.com/security/cve/CVE-2007-6428/" source="CVE"/>
		<reference ref_id="CVE-2007-6429" ref_url="https://www.suse.com/security/cve/CVE-2007-6429/" source="CVE"/>
		<reference ref_id="CVE-2008-0006" ref_url="https://www.suse.com/security/cve/CVE-2008-0006/" source="CVE"/>
		<reference ref_id="CVE-2008-1377" ref_url="https://www.suse.com/security/cve/CVE-2008-1377/" source="CVE"/>
		<reference ref_id="CVE-2008-1379" ref_url="https://www.suse.com/security/cve/CVE-2008-1379/" source="CVE"/>
		<reference ref_id="CVE-2008-2360" ref_url="https://www.suse.com/security/cve/CVE-2008-2360/" source="CVE"/>
		<reference ref_id="CVE-2008-2361" ref_url="https://www.suse.com/security/cve/CVE-2008-2361/" source="CVE"/>
		<reference ref_id="CVE-2008-2362" ref_url="https://www.suse.com/security/cve/CVE-2008-2362/" source="CVE"/>
		<reference ref_id="CVE-2010-2240" ref_url="https://www.suse.com/security/cve/CVE-2010-2240/" source="CVE"/>
		<reference ref_id="CVE-2010-4818" ref_url="https://www.suse.com/security/cve/CVE-2010-4818/" source="CVE"/>
		<reference ref_id="CVE-2010-4819" ref_url="https://www.suse.com/security/cve/CVE-2010-4819/" source="CVE"/>
		<reference ref_id="CVE-2011-4028" ref_url="https://www.suse.com/security/cve/CVE-2011-4028/" source="CVE"/>
		<reference ref_id="CVE-2011-4029" ref_url="https://www.suse.com/security/cve/CVE-2011-4029/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-Xvnc-7.4-27.60.5 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6101/">CVE-2006-6101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6101">CVE-2006-6101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6102/">CVE-2006-6102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6102">CVE-2006-6102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6103/">CVE-2006-6103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6103">CVE-2006-6103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1003/">CVE-2007-1003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1003">CVE-2007-1003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5760/">CVE-2007-5760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5760">CVE-2007-5760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6427/">CVE-2007-6427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6427">CVE-2007-6427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6428/">CVE-2007-6428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6428">CVE-2007-6428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6429/">CVE-2007-6429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6429">CVE-2007-6429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0006/">CVE-2008-0006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0006">CVE-2008-0006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1377/">CVE-2008-1377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1377">CVE-2008-1377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1379/">CVE-2008-1379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1379">CVE-2008-1379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2360/">CVE-2008-2360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2360">CVE-2008-2360 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2361/">CVE-2008-2361 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2361">CVE-2008-2361 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2362/">CVE-2008-2362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2362">CVE-2008-2362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2240/">CVE-2010-2240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2240">CVE-2010-2240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4818/">CVE-2010-4818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4818">CVE-2010-4818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4819/">CVE-2010-4819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4819">CVE-2010-4819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4028/">CVE-2011-4028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4028">CVE-2011-4028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4029/">CVE-2011-4029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4029">CVE-2011-4029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989492" comment="xorg-x11-Xvnc-7.4-27.60.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989493" comment="xorg-x11-server-7.4-27.60.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989494" comment="xorg-x11-server-extra-7.4-27.60.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215960" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libs-32bit-7.4-8.26.32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libs-32bit-7.4-8.26.32.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2895">CVE-2011-2895 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989495" comment="xorg-x11-libs-7.4-8.26.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989496" comment="xorg-x11-libs-32bit-7.4-8.26.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989497" comment="xorg-x11-libs-x86-7.4-8.26.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215961" version="1" class="patch">
	<metadata>
		<title>xterm-238-1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-2383" ref_url="https://www.suse.com/security/cve/CVE-2008-2383/" source="CVE"/>
		<description>
These are all security issues fixed in the xterm-238-1.16 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2383/">CVE-2008-2383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2383">CVE-2008-2383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988881" comment="xterm-238-1.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215962" version="1" class="patch">
	<metadata>
		<title>yast2-2.17.119-0.5.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-2.17.119-0.5.25 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3177">CVE-2011-3177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989498" comment="yast2-2.17.119-0.5.25 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215963" version="1" class="patch">
	<metadata>
		<title>yast2-core-2.17.44-0.5.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-core-2.17.44-0.5.3 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4311">CVE-2008-4311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2483">CVE-2011-2483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3177">CVE-2011-3177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989499" comment="yast2-core-2.17.44-0.5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215964" version="1" class="patch">
	<metadata>
		<title>zoo-2.10-911.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-0855" ref_url="https://www.suse.com/security/cve/CVE-2006-0855/" source="CVE"/>
		<reference ref_id="CVE-2007-1669" ref_url="https://www.suse.com/security/cve/CVE-2007-1669/" source="CVE"/>
		<description>
These are all security issues fixed in the zoo-2.10-911.22 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0855/">CVE-2006-0855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0855">CVE-2006-0855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1669/">CVE-2007-1669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1669">CVE-2007-1669 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988882" comment="zoo-2.10-911.22 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215965" version="1" class="patch">
	<metadata>
		<title>LibVNCServer-0.9.1-154.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-2450" ref_url="https://www.suse.com/security/cve/CVE-2006-2450/" source="CVE"/>
		<description>
These are all security issues fixed in the LibVNCServer-0.9.1-154.24 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2450/">CVE-2006-2450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2450">CVE-2006-2450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988310" comment="LibVNCServer-0.9.1-154.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215966" version="1" class="patch">
	<metadata>
		<title>Mesa-32bit-9.0.3-0.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1993" ref_url="https://www.suse.com/security/cve/CVE-2013-1993/" source="CVE"/>
		<description>
These are all security issues fixed in the Mesa-32bit-9.0.3-0.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1993/">CVE-2013-1993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1993">CVE-2013-1993 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989500" comment="Mesa-9.0.3-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989501" comment="Mesa-32bit-9.0.3-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989502" comment="Mesa-x86-9.0.3-0.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215967" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-17.0.4esr-0.10.42 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-6077" ref_url="https://www.suse.com/security/cve/CVE-2006-6077/" source="CVE"/>
		<reference ref_id="CVE-2007-0008" ref_url="https://www.suse.com/security/cve/CVE-2007-0008/" source="CVE"/>
		<reference ref_id="CVE-2007-0009" ref_url="https://www.suse.com/security/cve/CVE-2007-0009/" source="CVE"/>
		<reference ref_id="CVE-2007-0078" ref_url="https://www.suse.com/security/cve/CVE-2007-0078/" source="CVE"/>
		<reference ref_id="CVE-2007-0079" ref_url="https://www.suse.com/security/cve/CVE-2007-0079/" source="CVE"/>
		<reference ref_id="CVE-2007-0775" ref_url="https://www.suse.com/security/cve/CVE-2007-0775/" source="CVE"/>
		<reference ref_id="CVE-2007-0776" ref_url="https://www.suse.com/security/cve/CVE-2007-0776/" source="CVE"/>
		<reference ref_id="CVE-2007-0777" ref_url="https://www.suse.com/security/cve/CVE-2007-0777/" source="CVE"/>
		<reference ref_id="CVE-2007-0780" ref_url="https://www.suse.com/security/cve/CVE-2007-0780/" source="CVE"/>
		<reference ref_id="CVE-2007-0800" ref_url="https://www.suse.com/security/cve/CVE-2007-0800/" source="CVE"/>
		<reference ref_id="CVE-2007-0981" ref_url="https://www.suse.com/security/cve/CVE-2007-0981/" source="CVE"/>
		<reference ref_id="CVE-2007-0995" ref_url="https://www.suse.com/security/cve/CVE-2007-0995/" source="CVE"/>
		<reference ref_id="CVE-2007-0996" ref_url="https://www.suse.com/security/cve/CVE-2007-0996/" source="CVE"/>
		<reference ref_id="CVE-2007-3089" ref_url="https://www.suse.com/security/cve/CVE-2007-3089/" source="CVE"/>
		<reference ref_id="CVE-2007-3285" ref_url="https://www.suse.com/security/cve/CVE-2007-3285/" source="CVE"/>
		<reference ref_id="CVE-2007-3656" ref_url="https://www.suse.com/security/cve/CVE-2007-3656/" source="CVE"/>
		<reference ref_id="CVE-2007-3670" ref_url="https://www.suse.com/security/cve/CVE-2007-3670/" source="CVE"/>
		<reference ref_id="CVE-2007-3734" ref_url="https://www.suse.com/security/cve/CVE-2007-3734/" source="CVE"/>
		<reference ref_id="CVE-2007-3735" ref_url="https://www.suse.com/security/cve/CVE-2007-3735/" source="CVE"/>
		<reference ref_id="CVE-2007-3736" ref_url="https://www.suse.com/security/cve/CVE-2007-3736/" source="CVE"/>
		<reference ref_id="CVE-2007-3737" ref_url="https://www.suse.com/security/cve/CVE-2007-3737/" source="CVE"/>
		<reference ref_id="CVE-2007-3738" ref_url="https://www.suse.com/security/cve/CVE-2007-3738/" source="CVE"/>
		<reference ref_id="CVE-2008-0412" ref_url="https://www.suse.com/security/cve/CVE-2008-0412/" source="CVE"/>
		<reference ref_id="CVE-2008-0414" ref_url="https://www.suse.com/security/cve/CVE-2008-0414/" source="CVE"/>
		<reference ref_id="CVE-2008-0415" ref_url="https://www.suse.com/security/cve/CVE-2008-0415/" source="CVE"/>
		<reference ref_id="CVE-2008-0417" ref_url="https://www.suse.com/security/cve/CVE-2008-0417/" source="CVE"/>
		<reference ref_id="CVE-2008-0418" ref_url="https://www.suse.com/security/cve/CVE-2008-0418/" source="CVE"/>
		<reference ref_id="CVE-2008-0419" ref_url="https://www.suse.com/security/cve/CVE-2008-0419/" source="CVE"/>
		<reference ref_id="CVE-2008-0591" ref_url="https://www.suse.com/security/cve/CVE-2008-0591/" source="CVE"/>
		<reference ref_id="CVE-2008-0592" ref_url="https://www.suse.com/security/cve/CVE-2008-0592/" source="CVE"/>
		<reference ref_id="CVE-2008-0593" ref_url="https://www.suse.com/security/cve/CVE-2008-0593/" source="CVE"/>
		<reference ref_id="CVE-2008-0594" ref_url="https://www.suse.com/security/cve/CVE-2008-0594/" source="CVE"/>
		<reference ref_id="CVE-2008-3836" ref_url="https://www.suse.com/security/cve/CVE-2008-3836/" source="CVE"/>
		<reference ref_id="CVE-2008-4063" ref_url="https://www.suse.com/security/cve/CVE-2008-4063/" source="CVE"/>
		<reference ref_id="CVE-2008-4064" ref_url="https://www.suse.com/security/cve/CVE-2008-4064/" source="CVE"/>
		<reference ref_id="CVE-2008-4070" ref_url="https://www.suse.com/security/cve/CVE-2008-4070/" source="CVE"/>
		<reference ref_id="CVE-2008-5913" ref_url="https://www.suse.com/security/cve/CVE-2008-5913/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-0352" ref_url="https://www.suse.com/security/cve/CVE-2009-0352/" source="CVE"/>
		<reference ref_id="CVE-2009-0353" ref_url="https://www.suse.com/security/cve/CVE-2009-0353/" source="CVE"/>
		<reference ref_id="CVE-2009-0354" ref_url="https://www.suse.com/security/cve/CVE-2009-0354/" source="CVE"/>
		<reference ref_id="CVE-2009-0355" ref_url="https://www.suse.com/security/cve/CVE-2009-0355/" source="CVE"/>
		<reference ref_id="CVE-2009-0356" ref_url="https://www.suse.com/security/cve/CVE-2009-0356/" source="CVE"/>
		<reference ref_id="CVE-2009-0357" ref_url="https://www.suse.com/security/cve/CVE-2009-0357/" source="CVE"/>
		<reference ref_id="CVE-2009-0358" ref_url="https://www.suse.com/security/cve/CVE-2009-0358/" source="CVE"/>
		<reference ref_id="CVE-2009-0652" ref_url="https://www.suse.com/security/cve/CVE-2009-0652/" source="CVE"/>
		<reference ref_id="CVE-2009-0771" ref_url="https://www.suse.com/security/cve/CVE-2009-0771/" source="CVE"/>
		<reference ref_id="CVE-2009-0772" ref_url="https://www.suse.com/security/cve/CVE-2009-0772/" source="CVE"/>
		<reference ref_id="CVE-2009-0773" ref_url="https://www.suse.com/security/cve/CVE-2009-0773/" source="CVE"/>
		<reference ref_id="CVE-2009-0774" ref_url="https://www.suse.com/security/cve/CVE-2009-0774/" source="CVE"/>
		<reference ref_id="CVE-2009-0775" ref_url="https://www.suse.com/security/cve/CVE-2009-0775/" source="CVE"/>
		<reference ref_id="CVE-2009-0776" ref_url="https://www.suse.com/security/cve/CVE-2009-0776/" source="CVE"/>
		<reference ref_id="CVE-2009-0777" ref_url="https://www.suse.com/security/cve/CVE-2009-0777/" source="CVE"/>
		<reference ref_id="CVE-2009-1044" ref_url="https://www.suse.com/security/cve/CVE-2009-1044/" source="CVE"/>
		<reference ref_id="CVE-2009-1169" ref_url="https://www.suse.com/security/cve/CVE-2009-1169/" source="CVE"/>
		<reference ref_id="CVE-2009-1302" ref_url="https://www.suse.com/security/cve/CVE-2009-1302/" source="CVE"/>
		<reference ref_id="CVE-2009-1303" ref_url="https://www.suse.com/security/cve/CVE-2009-1303/" source="CVE"/>
		<reference ref_id="CVE-2009-1304" ref_url="https://www.suse.com/security/cve/CVE-2009-1304/" source="CVE"/>
		<reference ref_id="CVE-2009-1305" ref_url="https://www.suse.com/security/cve/CVE-2009-1305/" source="CVE"/>
		<reference ref_id="CVE-2009-1306" ref_url="https://www.suse.com/security/cve/CVE-2009-1306/" source="CVE"/>
		<reference ref_id="CVE-2009-1307" ref_url="https://www.suse.com/security/cve/CVE-2009-1307/" source="CVE"/>
		<reference ref_id="CVE-2009-1308" ref_url="https://www.suse.com/security/cve/CVE-2009-1308/" source="CVE"/>
		<reference ref_id="CVE-2009-1309" ref_url="https://www.suse.com/security/cve/CVE-2009-1309/" source="CVE"/>
		<reference ref_id="CVE-2009-1310" ref_url="https://www.suse.com/security/cve/CVE-2009-1310/" source="CVE"/>
		<reference ref_id="CVE-2009-1311" ref_url="https://www.suse.com/security/cve/CVE-2009-1311/" source="CVE"/>
		<reference ref_id="CVE-2009-1312" ref_url="https://www.suse.com/security/cve/CVE-2009-1312/" source="CVE"/>
		<reference ref_id="CVE-2009-1313" ref_url="https://www.suse.com/security/cve/CVE-2009-1313/" source="CVE"/>
		<reference ref_id="CVE-2009-1563" ref_url="https://www.suse.com/security/cve/CVE-2009-1563/" source="CVE"/>
		<reference ref_id="CVE-2009-1571" ref_url="https://www.suse.com/security/cve/CVE-2009-1571/" source="CVE"/>
		<reference ref_id="CVE-2009-2470" ref_url="https://www.suse.com/security/cve/CVE-2009-2470/" source="CVE"/>
		<reference ref_id="CVE-2009-2654" ref_url="https://www.suse.com/security/cve/CVE-2009-2654/" source="CVE"/>
		<reference ref_id="CVE-2009-3069" ref_url="https://www.suse.com/security/cve/CVE-2009-3069/" source="CVE"/>
		<reference ref_id="CVE-2009-3070" ref_url="https://www.suse.com/security/cve/CVE-2009-3070/" source="CVE"/>
		<reference ref_id="CVE-2009-3071" ref_url="https://www.suse.com/security/cve/CVE-2009-3071/" source="CVE"/>
		<reference ref_id="CVE-2009-3072" ref_url="https://www.suse.com/security/cve/CVE-2009-3072/" source="CVE"/>
		<reference ref_id="CVE-2009-3073" ref_url="https://www.suse.com/security/cve/CVE-2009-3073/" source="CVE"/>
		<reference ref_id="CVE-2009-3074" ref_url="https://www.suse.com/security/cve/CVE-2009-3074/" source="CVE"/>
		<reference ref_id="CVE-2009-3075" ref_url="https://www.suse.com/security/cve/CVE-2009-3075/" source="CVE"/>
		<reference ref_id="CVE-2009-3077" ref_url="https://www.suse.com/security/cve/CVE-2009-3077/" source="CVE"/>
		<reference ref_id="CVE-2009-3078" ref_url="https://www.suse.com/security/cve/CVE-2009-3078/" source="CVE"/>
		<reference ref_id="CVE-2009-3079" ref_url="https://www.suse.com/security/cve/CVE-2009-3079/" source="CVE"/>
		<reference ref_id="CVE-2009-3274" ref_url="https://www.suse.com/security/cve/CVE-2009-3274/" source="CVE"/>
		<reference ref_id="CVE-2009-3370" ref_url="https://www.suse.com/security/cve/CVE-2009-3370/" source="CVE"/>
		<reference ref_id="CVE-2009-3371" ref_url="https://www.suse.com/security/cve/CVE-2009-3371/" source="CVE"/>
		<reference ref_id="CVE-2009-3372" ref_url="https://www.suse.com/security/cve/CVE-2009-3372/" source="CVE"/>
		<reference ref_id="CVE-2009-3373" ref_url="https://www.suse.com/security/cve/CVE-2009-3373/" source="CVE"/>
		<reference ref_id="CVE-2009-3374" ref_url="https://www.suse.com/security/cve/CVE-2009-3374/" source="CVE"/>
		<reference ref_id="CVE-2009-3375" ref_url="https://www.suse.com/security/cve/CVE-2009-3375/" source="CVE"/>
		<reference ref_id="CVE-2009-3376" ref_url="https://www.suse.com/security/cve/CVE-2009-3376/" source="CVE"/>
		<reference ref_id="CVE-2009-3377" ref_url="https://www.suse.com/security/cve/CVE-2009-3377/" source="CVE"/>
		<reference ref_id="CVE-2009-3378" ref_url="https://www.suse.com/security/cve/CVE-2009-3378/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2009-3380" ref_url="https://www.suse.com/security/cve/CVE-2009-3380/" source="CVE"/>
		<reference ref_id="CVE-2009-3381" ref_url="https://www.suse.com/security/cve/CVE-2009-3381/" source="CVE"/>
		<reference ref_id="CVE-2009-3383" ref_url="https://www.suse.com/security/cve/CVE-2009-3383/" source="CVE"/>
		<reference ref_id="CVE-2009-3388" ref_url="https://www.suse.com/security/cve/CVE-2009-3388/" source="CVE"/>
		<reference ref_id="CVE-2009-3389" ref_url="https://www.suse.com/security/cve/CVE-2009-3389/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-3979" ref_url="https://www.suse.com/security/cve/CVE-2009-3979/" source="CVE"/>
		<reference ref_id="CVE-2009-3980" ref_url="https://www.suse.com/security/cve/CVE-2009-3980/" source="CVE"/>
		<reference ref_id="CVE-2009-3982" ref_url="https://www.suse.com/security/cve/CVE-2009-3982/" source="CVE"/>
		<reference ref_id="CVE-2009-3983" ref_url="https://www.suse.com/security/cve/CVE-2009-3983/" source="CVE"/>
		<reference ref_id="CVE-2009-3984" ref_url="https://www.suse.com/security/cve/CVE-2009-3984/" source="CVE"/>
		<reference ref_id="CVE-2009-3985" ref_url="https://www.suse.com/security/cve/CVE-2009-3985/" source="CVE"/>
		<reference ref_id="CVE-2009-3988" ref_url="https://www.suse.com/security/cve/CVE-2009-3988/" source="CVE"/>
		<reference ref_id="CVE-2010-0159" ref_url="https://www.suse.com/security/cve/CVE-2010-0159/" source="CVE"/>
		<reference ref_id="CVE-2010-0160" ref_url="https://www.suse.com/security/cve/CVE-2010-0160/" source="CVE"/>
		<reference ref_id="CVE-2010-0162" ref_url="https://www.suse.com/security/cve/CVE-2010-0162/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0175" ref_url="https://www.suse.com/security/cve/CVE-2010-0175/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0179" ref_url="https://www.suse.com/security/cve/CVE-2010-0179/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<reference ref_id="CVE-2010-0183" ref_url="https://www.suse.com/security/cve/CVE-2010-0183/" source="CVE"/>
		<reference ref_id="CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654/" source="CVE"/>
		<reference ref_id="CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121/" source="CVE"/>
		<reference ref_id="CVE-2010-1125" ref_url="https://www.suse.com/security/cve/CVE-2010-1125/" source="CVE"/>
		<reference ref_id="CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196/" source="CVE"/>
		<reference ref_id="CVE-2010-1197" ref_url="https://www.suse.com/security/cve/CVE-2010-1197/" source="CVE"/>
		<reference ref_id="CVE-2010-1198" ref_url="https://www.suse.com/security/cve/CVE-2010-1198/" source="CVE"/>
		<reference ref_id="CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199/" source="CVE"/>
		<reference ref_id="CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200/" source="CVE"/>
		<reference ref_id="CVE-2010-1201" ref_url="https://www.suse.com/security/cve/CVE-2010-1201/" source="CVE"/>
		<reference ref_id="CVE-2010-1202" ref_url="https://www.suse.com/security/cve/CVE-2010-1202/" source="CVE"/>
		<reference ref_id="CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-1206" ref_url="https://www.suse.com/security/cve/CVE-2010-1206/" source="CVE"/>
		<reference ref_id="CVE-2010-1208" ref_url="https://www.suse.com/security/cve/CVE-2010-1208/" source="CVE"/>
		<reference ref_id="CVE-2010-1209" ref_url="https://www.suse.com/security/cve/CVE-2010-1209/" source="CVE"/>
		<reference ref_id="CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211/" source="CVE"/>
		<reference ref_id="CVE-2010-1212" ref_url="https://www.suse.com/security/cve/CVE-2010-1212/" source="CVE"/>
		<reference ref_id="CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213/" source="CVE"/>
		<reference ref_id="CVE-2010-1214" ref_url="https://www.suse.com/security/cve/CVE-2010-1214/" source="CVE"/>
		<reference ref_id="CVE-2010-1585" ref_url="https://www.suse.com/security/cve/CVE-2010-1585/" source="CVE"/>
		<reference ref_id="CVE-2010-2751" ref_url="https://www.suse.com/security/cve/CVE-2010-2751/" source="CVE"/>
		<reference ref_id="CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752/" source="CVE"/>
		<reference ref_id="CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753/" source="CVE"/>
		<reference ref_id="CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754/" source="CVE"/>
		<reference ref_id="CVE-2010-2755" ref_url="https://www.suse.com/security/cve/CVE-2010-2755/" source="CVE"/>
		<reference ref_id="CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760/" source="CVE"/>
		<reference ref_id="CVE-2010-2762" ref_url="https://www.suse.com/security/cve/CVE-2010-2762/" source="CVE"/>
		<reference ref_id="CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764/" source="CVE"/>
		<reference ref_id="CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765/" source="CVE"/>
		<reference ref_id="CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766/" source="CVE"/>
		<reference ref_id="CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767/" source="CVE"/>
		<reference ref_id="CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768/" source="CVE"/>
		<reference ref_id="CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769/" source="CVE"/>
		<reference ref_id="CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166/" source="CVE"/>
		<reference ref_id="CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167/" source="CVE"/>
		<reference ref_id="CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168/" source="CVE"/>
		<reference ref_id="CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3173" ref_url="https://www.suse.com/security/cve/CVE-2010-3173/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<reference ref_id="CVE-2010-3766" ref_url="https://www.suse.com/security/cve/CVE-2010-3766/" source="CVE"/>
		<reference ref_id="CVE-2010-3767" ref_url="https://www.suse.com/security/cve/CVE-2010-3767/" source="CVE"/>
		<reference ref_id="CVE-2010-3768" ref_url="https://www.suse.com/security/cve/CVE-2010-3768/" source="CVE"/>
		<reference ref_id="CVE-2010-3769" ref_url="https://www.suse.com/security/cve/CVE-2010-3769/" source="CVE"/>
		<reference ref_id="CVE-2010-3770" ref_url="https://www.suse.com/security/cve/CVE-2010-3770/" source="CVE"/>
		<reference ref_id="CVE-2010-3771" ref_url="https://www.suse.com/security/cve/CVE-2010-3771/" source="CVE"/>
		<reference ref_id="CVE-2010-3772" ref_url="https://www.suse.com/security/cve/CVE-2010-3772/" source="CVE"/>
		<reference ref_id="CVE-2010-3773" ref_url="https://www.suse.com/security/cve/CVE-2010-3773/" source="CVE"/>
		<reference ref_id="CVE-2010-3775" ref_url="https://www.suse.com/security/cve/CVE-2010-3775/" source="CVE"/>
		<reference ref_id="CVE-2010-3776" ref_url="https://www.suse.com/security/cve/CVE-2010-3776/" source="CVE"/>
		<reference ref_id="CVE-2010-3777" ref_url="https://www.suse.com/security/cve/CVE-2010-3777/" source="CVE"/>
		<reference ref_id="CVE-2010-3778" ref_url="https://www.suse.com/security/cve/CVE-2010-3778/" source="CVE"/>
		<reference ref_id="CVE-2011-0051" ref_url="https://www.suse.com/security/cve/CVE-2011-0051/" source="CVE"/>
		<reference ref_id="CVE-2011-0053" ref_url="https://www.suse.com/security/cve/CVE-2011-0053/" source="CVE"/>
		<reference ref_id="CVE-2011-0054" ref_url="https://www.suse.com/security/cve/CVE-2011-0054/" source="CVE"/>
		<reference ref_id="CVE-2011-0055" ref_url="https://www.suse.com/security/cve/CVE-2011-0055/" source="CVE"/>
		<reference ref_id="CVE-2011-0056" ref_url="https://www.suse.com/security/cve/CVE-2011-0056/" source="CVE"/>
		<reference ref_id="CVE-2011-0057" ref_url="https://www.suse.com/security/cve/CVE-2011-0057/" source="CVE"/>
		<reference ref_id="CVE-2011-0059" ref_url="https://www.suse.com/security/cve/CVE-2011-0059/" source="CVE"/>
		<reference ref_id="CVE-2011-0061" ref_url="https://www.suse.com/security/cve/CVE-2011-0061/" source="CVE"/>
		<reference ref_id="CVE-2011-0062" ref_url="https://www.suse.com/security/cve/CVE-2011-0062/" source="CVE"/>
		<reference ref_id="CVE-2011-0065" ref_url="https://www.suse.com/security/cve/CVE-2011-0065/" source="CVE"/>
		<reference ref_id="CVE-2011-0066" ref_url="https://www.suse.com/security/cve/CVE-2011-0066/" source="CVE"/>
		<reference ref_id="CVE-2011-0067" ref_url="https://www.suse.com/security/cve/CVE-2011-0067/" source="CVE"/>
		<reference ref_id="CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069/" source="CVE"/>
		<reference ref_id="CVE-2011-0070" ref_url="https://www.suse.com/security/cve/CVE-2011-0070/" source="CVE"/>
		<reference ref_id="CVE-2011-0072" ref_url="https://www.suse.com/security/cve/CVE-2011-0072/" source="CVE"/>
		<reference ref_id="CVE-2011-0073" ref_url="https://www.suse.com/security/cve/CVE-2011-0073/" source="CVE"/>
		<reference ref_id="CVE-2011-0074" ref_url="https://www.suse.com/security/cve/CVE-2011-0074/" source="CVE"/>
		<reference ref_id="CVE-2011-0075" ref_url="https://www.suse.com/security/cve/CVE-2011-0075/" source="CVE"/>
		<reference ref_id="CVE-2011-0077" ref_url="https://www.suse.com/security/cve/CVE-2011-0077/" source="CVE"/>
		<reference ref_id="CVE-2011-0078" ref_url="https://www.suse.com/security/cve/CVE-2011-0078/" source="CVE"/>
		<reference ref_id="CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080/" source="CVE"/>
		<reference ref_id="CVE-2011-0081" ref_url="https://www.suse.com/security/cve/CVE-2011-0081/" source="CVE"/>
		<reference ref_id="CVE-2011-0083" ref_url="https://www.suse.com/security/cve/CVE-2011-0083/" source="CVE"/>
		<reference ref_id="CVE-2011-0084" ref_url="https://www.suse.com/security/cve/CVE-2011-0084/" source="CVE"/>
		<reference ref_id="CVE-2011-0085" ref_url="https://www.suse.com/security/cve/CVE-2011-0085/" source="CVE"/>
		<reference ref_id="CVE-2011-1202" ref_url="https://www.suse.com/security/cve/CVE-2011-1202/" source="CVE"/>
		<reference ref_id="CVE-2011-2362" ref_url="https://www.suse.com/security/cve/CVE-2011-2362/" source="CVE"/>
		<reference ref_id="CVE-2011-2363" ref_url="https://www.suse.com/security/cve/CVE-2011-2363/" source="CVE"/>
		<reference ref_id="CVE-2011-2364" ref_url="https://www.suse.com/security/cve/CVE-2011-2364/" source="CVE"/>
		<reference ref_id="CVE-2011-2365" ref_url="https://www.suse.com/security/cve/CVE-2011-2365/" source="CVE"/>
		<reference ref_id="CVE-2011-2371" ref_url="https://www.suse.com/security/cve/CVE-2011-2371/" source="CVE"/>
		<reference ref_id="CVE-2011-2372" ref_url="https://www.suse.com/security/cve/CVE-2011-2372/" source="CVE"/>
		<reference ref_id="CVE-2011-2373" ref_url="https://www.suse.com/security/cve/CVE-2011-2373/" source="CVE"/>
		<reference ref_id="CVE-2011-2374" ref_url="https://www.suse.com/security/cve/CVE-2011-2374/" source="CVE"/>
		<reference ref_id="CVE-2011-2376" ref_url="https://www.suse.com/security/cve/CVE-2011-2376/" source="CVE"/>
		<reference ref_id="CVE-2011-2377" ref_url="https://www.suse.com/security/cve/CVE-2011-2377/" source="CVE"/>
		<reference ref_id="CVE-2011-2378" ref_url="https://www.suse.com/security/cve/CVE-2011-2378/" source="CVE"/>
		<reference ref_id="CVE-2011-2980" ref_url="https://www.suse.com/security/cve/CVE-2011-2980/" source="CVE"/>
		<reference ref_id="CVE-2011-2981" ref_url="https://www.suse.com/security/cve/CVE-2011-2981/" source="CVE"/>
		<reference ref_id="CVE-2011-2982" ref_url="https://www.suse.com/security/cve/CVE-2011-2982/" source="CVE"/>
		<reference ref_id="CVE-2011-2983" ref_url="https://www.suse.com/security/cve/CVE-2011-2983/" source="CVE"/>
		<reference ref_id="CVE-2011-2995" ref_url="https://www.suse.com/security/cve/CVE-2011-2995/" source="CVE"/>
		<reference ref_id="CVE-2011-2996" ref_url="https://www.suse.com/security/cve/CVE-2011-2996/" source="CVE"/>
		<reference ref_id="CVE-2011-2997" ref_url="https://www.suse.com/security/cve/CVE-2011-2997/" source="CVE"/>
		<reference ref_id="CVE-2011-3000" ref_url="https://www.suse.com/security/cve/CVE-2011-3000/" source="CVE"/>
		<reference ref_id="CVE-2011-3001" ref_url="https://www.suse.com/security/cve/CVE-2011-3001/" source="CVE"/>
		<reference ref_id="CVE-2011-3002" ref_url="https://www.suse.com/security/cve/CVE-2011-3002/" source="CVE"/>
		<reference ref_id="CVE-2011-3003" ref_url="https://www.suse.com/security/cve/CVE-2011-3003/" source="CVE"/>
		<reference ref_id="CVE-2011-3004" ref_url="https://www.suse.com/security/cve/CVE-2011-3004/" source="CVE"/>
		<reference ref_id="CVE-2011-3005" ref_url="https://www.suse.com/security/cve/CVE-2011-3005/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3062" ref_url="https://www.suse.com/security/cve/CVE-2011-3062/" source="CVE"/>
		<reference ref_id="CVE-2011-3101" ref_url="https://www.suse.com/security/cve/CVE-2011-3101/" source="CVE"/>
		<reference ref_id="CVE-2011-3232" ref_url="https://www.suse.com/security/cve/CVE-2011-3232/" source="CVE"/>
		<reference ref_id="CVE-2011-3658" ref_url="https://www.suse.com/security/cve/CVE-2011-3658/" source="CVE"/>
		<reference ref_id="CVE-2011-3660" ref_url="https://www.suse.com/security/cve/CVE-2011-3660/" source="CVE"/>
		<reference ref_id="CVE-2011-3661" ref_url="https://www.suse.com/security/cve/CVE-2011-3661/" source="CVE"/>
		<reference ref_id="CVE-2011-3663" ref_url="https://www.suse.com/security/cve/CVE-2011-3663/" source="CVE"/>
		<reference ref_id="CVE-2011-3665" ref_url="https://www.suse.com/security/cve/CVE-2011-3665/" source="CVE"/>
		<reference ref_id="CVE-2012-0441" ref_url="https://www.suse.com/security/cve/CVE-2012-0441/" source="CVE"/>
		<reference ref_id="CVE-2012-0452" ref_url="https://www.suse.com/security/cve/CVE-2012-0452/" source="CVE"/>
		<reference ref_id="CVE-2012-0467" ref_url="https://www.suse.com/security/cve/CVE-2012-0467/" source="CVE"/>
		<reference ref_id="CVE-2012-0468" ref_url="https://www.suse.com/security/cve/CVE-2012-0468/" source="CVE"/>
		<reference ref_id="CVE-2012-0469" ref_url="https://www.suse.com/security/cve/CVE-2012-0469/" source="CVE"/>
		<reference ref_id="CVE-2012-0470" ref_url="https://www.suse.com/security/cve/CVE-2012-0470/" source="CVE"/>
		<reference ref_id="CVE-2012-0471" ref_url="https://www.suse.com/security/cve/CVE-2012-0471/" source="CVE"/>
		<reference ref_id="CVE-2012-0472" ref_url="https://www.suse.com/security/cve/CVE-2012-0472/" source="CVE"/>
		<reference ref_id="CVE-2012-0473" ref_url="https://www.suse.com/security/cve/CVE-2012-0473/" source="CVE"/>
		<reference ref_id="CVE-2012-0474" ref_url="https://www.suse.com/security/cve/CVE-2012-0474/" source="CVE"/>
		<reference ref_id="CVE-2012-0477" ref_url="https://www.suse.com/security/cve/CVE-2012-0477/" source="CVE"/>
		<reference ref_id="CVE-2012-0478" ref_url="https://www.suse.com/security/cve/CVE-2012-0478/" source="CVE"/>
		<reference ref_id="CVE-2012-0479" ref_url="https://www.suse.com/security/cve/CVE-2012-0479/" source="CVE"/>
		<reference ref_id="CVE-2012-0759" ref_url="https://www.suse.com/security/cve/CVE-2012-0759/" source="CVE"/>
		<reference ref_id="CVE-2012-1937" ref_url="https://www.suse.com/security/cve/CVE-2012-1937/" source="CVE"/>
		<reference ref_id="CVE-2012-1939" ref_url="https://www.suse.com/security/cve/CVE-2012-1939/" source="CVE"/>
		<reference ref_id="CVE-2012-1940" ref_url="https://www.suse.com/security/cve/CVE-2012-1940/" source="CVE"/>
		<reference ref_id="CVE-2012-1941" ref_url="https://www.suse.com/security/cve/CVE-2012-1941/" source="CVE"/>
		<reference ref_id="CVE-2012-1944" ref_url="https://www.suse.com/security/cve/CVE-2012-1944/" source="CVE"/>
		<reference ref_id="CVE-2012-1945" ref_url="https://www.suse.com/security/cve/CVE-2012-1945/" source="CVE"/>
		<reference ref_id="CVE-2012-1946" ref_url="https://www.suse.com/security/cve/CVE-2012-1946/" source="CVE"/>
		<reference ref_id="CVE-2012-1947" ref_url="https://www.suse.com/security/cve/CVE-2012-1947/" source="CVE"/>
		<reference ref_id="CVE-2012-1948" ref_url="https://www.suse.com/security/cve/CVE-2012-1948/" source="CVE"/>
		<reference ref_id="CVE-2012-1949" ref_url="https://www.suse.com/security/cve/CVE-2012-1949/" source="CVE"/>
		<reference ref_id="CVE-2012-1950" ref_url="https://www.suse.com/security/cve/CVE-2012-1950/" source="CVE"/>
		<reference ref_id="CVE-2012-1951" ref_url="https://www.suse.com/security/cve/CVE-2012-1951/" source="CVE"/>
		<reference ref_id="CVE-2012-1952" ref_url="https://www.suse.com/security/cve/CVE-2012-1952/" source="CVE"/>
		<reference ref_id="CVE-2012-1953" ref_url="https://www.suse.com/security/cve/CVE-2012-1953/" source="CVE"/>
		<reference ref_id="CVE-2012-1954" ref_url="https://www.suse.com/security/cve/CVE-2012-1954/" source="CVE"/>
		<reference ref_id="CVE-2012-1955" ref_url="https://www.suse.com/security/cve/CVE-2012-1955/" source="CVE"/>
		<reference ref_id="CVE-2012-1956" ref_url="https://www.suse.com/security/cve/CVE-2012-1956/" source="CVE"/>
		<reference ref_id="CVE-2012-1957" ref_url="https://www.suse.com/security/cve/CVE-2012-1957/" source="CVE"/>
		<reference ref_id="CVE-2012-1958" ref_url="https://www.suse.com/security/cve/CVE-2012-1958/" source="CVE"/>
		<reference ref_id="CVE-2012-1959" ref_url="https://www.suse.com/security/cve/CVE-2012-1959/" source="CVE"/>
		<reference ref_id="CVE-2012-1960" ref_url="https://www.suse.com/security/cve/CVE-2012-1960/" source="CVE"/>
		<reference ref_id="CVE-2012-1961" ref_url="https://www.suse.com/security/cve/CVE-2012-1961/" source="CVE"/>
		<reference ref_id="CVE-2012-1962" ref_url="https://www.suse.com/security/cve/CVE-2012-1962/" source="CVE"/>
		<reference ref_id="CVE-2012-1963" ref_url="https://www.suse.com/security/cve/CVE-2012-1963/" source="CVE"/>
		<reference ref_id="CVE-2012-1964" ref_url="https://www.suse.com/security/cve/CVE-2012-1964/" source="CVE"/>
		<reference ref_id="CVE-2012-1965" ref_url="https://www.suse.com/security/cve/CVE-2012-1965/" source="CVE"/>
		<reference ref_id="CVE-2012-1966" ref_url="https://www.suse.com/security/cve/CVE-2012-1966/" source="CVE"/>
		<reference ref_id="CVE-2012-1967" ref_url="https://www.suse.com/security/cve/CVE-2012-1967/" source="CVE"/>
		<reference ref_id="CVE-2012-1970" ref_url="https://www.suse.com/security/cve/CVE-2012-1970/" source="CVE"/>
		<reference ref_id="CVE-2012-1972" ref_url="https://www.suse.com/security/cve/CVE-2012-1972/" source="CVE"/>
		<reference ref_id="CVE-2012-1973" ref_url="https://www.suse.com/security/cve/CVE-2012-1973/" source="CVE"/>
		<reference ref_id="CVE-2012-1974" ref_url="https://www.suse.com/security/cve/CVE-2012-1974/" source="CVE"/>
		<reference ref_id="CVE-2012-1975" ref_url="https://www.suse.com/security/cve/CVE-2012-1975/" source="CVE"/>
		<reference ref_id="CVE-2012-1976" ref_url="https://www.suse.com/security/cve/CVE-2012-1976/" source="CVE"/>
		<reference ref_id="CVE-2012-3956" ref_url="https://www.suse.com/security/cve/CVE-2012-3956/" source="CVE"/>
		<reference ref_id="CVE-2012-3957" ref_url="https://www.suse.com/security/cve/CVE-2012-3957/" source="CVE"/>
		<reference ref_id="CVE-2012-3958" ref_url="https://www.suse.com/security/cve/CVE-2012-3958/" source="CVE"/>
		<reference ref_id="CVE-2012-3959" ref_url="https://www.suse.com/security/cve/CVE-2012-3959/" source="CVE"/>
		<reference ref_id="CVE-2012-3960" ref_url="https://www.suse.com/security/cve/CVE-2012-3960/" source="CVE"/>
		<reference ref_id="CVE-2012-3961" ref_url="https://www.suse.com/security/cve/CVE-2012-3961/" source="CVE"/>
		<reference ref_id="CVE-2012-3962" ref_url="https://www.suse.com/security/cve/CVE-2012-3962/" source="CVE"/>
		<reference ref_id="CVE-2012-3963" ref_url="https://www.suse.com/security/cve/CVE-2012-3963/" source="CVE"/>
		<reference ref_id="CVE-2012-3964" ref_url="https://www.suse.com/security/cve/CVE-2012-3964/" source="CVE"/>
		<reference ref_id="CVE-2012-3966" ref_url="https://www.suse.com/security/cve/CVE-2012-3966/" source="CVE"/>
		<reference ref_id="CVE-2012-3967" ref_url="https://www.suse.com/security/cve/CVE-2012-3967/" source="CVE"/>
		<reference ref_id="CVE-2012-3968" ref_url="https://www.suse.com/security/cve/CVE-2012-3968/" source="CVE"/>
		<reference ref_id="CVE-2012-3969" ref_url="https://www.suse.com/security/cve/CVE-2012-3969/" source="CVE"/>
		<reference ref_id="CVE-2012-3970" ref_url="https://www.suse.com/security/cve/CVE-2012-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-3972" ref_url="https://www.suse.com/security/cve/CVE-2012-3972/" source="CVE"/>
		<reference ref_id="CVE-2012-3976" ref_url="https://www.suse.com/security/cve/CVE-2012-3976/" source="CVE"/>
		<reference ref_id="CVE-2012-3978" ref_url="https://www.suse.com/security/cve/CVE-2012-3978/" source="CVE"/>
		<reference ref_id="CVE-2012-3980" ref_url="https://www.suse.com/security/cve/CVE-2012-3980/" source="CVE"/>
		<reference ref_id="CVE-2012-3982" ref_url="https://www.suse.com/security/cve/CVE-2012-3982/" source="CVE"/>
		<reference ref_id="CVE-2012-3986" ref_url="https://www.suse.com/security/cve/CVE-2012-3986/" source="CVE"/>
		<reference ref_id="CVE-2012-3988" ref_url="https://www.suse.com/security/cve/CVE-2012-3988/" source="CVE"/>
		<reference ref_id="CVE-2012-3990" ref_url="https://www.suse.com/security/cve/CVE-2012-3990/" source="CVE"/>
		<reference ref_id="CVE-2012-3991" ref_url="https://www.suse.com/security/cve/CVE-2012-3991/" source="CVE"/>
		<reference ref_id="CVE-2012-3992" ref_url="https://www.suse.com/security/cve/CVE-2012-3992/" source="CVE"/>
		<reference ref_id="CVE-2012-3993" ref_url="https://www.suse.com/security/cve/CVE-2012-3993/" source="CVE"/>
		<reference ref_id="CVE-2012-3994" ref_url="https://www.suse.com/security/cve/CVE-2012-3994/" source="CVE"/>
		<reference ref_id="CVE-2012-3995" ref_url="https://www.suse.com/security/cve/CVE-2012-3995/" source="CVE"/>
		<reference ref_id="CVE-2012-4179" ref_url="https://www.suse.com/security/cve/CVE-2012-4179/" source="CVE"/>
		<reference ref_id="CVE-2012-4180" ref_url="https://www.suse.com/security/cve/CVE-2012-4180/" source="CVE"/>
		<reference ref_id="CVE-2012-4181" ref_url="https://www.suse.com/security/cve/CVE-2012-4181/" source="CVE"/>
		<reference ref_id="CVE-2012-4182" ref_url="https://www.suse.com/security/cve/CVE-2012-4182/" source="CVE"/>
		<reference ref_id="CVE-2012-4183" ref_url="https://www.suse.com/security/cve/CVE-2012-4183/" source="CVE"/>
		<reference ref_id="CVE-2012-4184" ref_url="https://www.suse.com/security/cve/CVE-2012-4184/" source="CVE"/>
		<reference ref_id="CVE-2012-4185" ref_url="https://www.suse.com/security/cve/CVE-2012-4185/" source="CVE"/>
		<reference ref_id="CVE-2012-4186" ref_url="https://www.suse.com/security/cve/CVE-2012-4186/" source="CVE"/>
		<reference ref_id="CVE-2012-4187" ref_url="https://www.suse.com/security/cve/CVE-2012-4187/" source="CVE"/>
		<reference ref_id="CVE-2012-4188" ref_url="https://www.suse.com/security/cve/CVE-2012-4188/" source="CVE"/>
		<reference ref_id="CVE-2012-4192" ref_url="https://www.suse.com/security/cve/CVE-2012-4192/" source="CVE"/>
		<reference ref_id="CVE-2012-4193" ref_url="https://www.suse.com/security/cve/CVE-2012-4193/" source="CVE"/>
		<reference ref_id="CVE-2012-4194" ref_url="https://www.suse.com/security/cve/CVE-2012-4194/" source="CVE"/>
		<reference ref_id="CVE-2012-4195" ref_url="https://www.suse.com/security/cve/CVE-2012-4195/" source="CVE"/>
		<reference ref_id="CVE-2012-4196" ref_url="https://www.suse.com/security/cve/CVE-2012-4196/" source="CVE"/>
		<reference ref_id="CVE-2012-4201" ref_url="https://www.suse.com/security/cve/CVE-2012-4201/" source="CVE"/>
		<reference ref_id="CVE-2012-4202" ref_url="https://www.suse.com/security/cve/CVE-2012-4202/" source="CVE"/>
		<reference ref_id="CVE-2012-4207" ref_url="https://www.suse.com/security/cve/CVE-2012-4207/" source="CVE"/>
		<reference ref_id="CVE-2012-4209" ref_url="https://www.suse.com/security/cve/CVE-2012-4209/" source="CVE"/>
		<reference ref_id="CVE-2012-4210" ref_url="https://www.suse.com/security/cve/CVE-2012-4210/" source="CVE"/>
		<reference ref_id="CVE-2012-4212" ref_url="https://www.suse.com/security/cve/CVE-2012-4212/" source="CVE"/>
		<reference ref_id="CVE-2012-4213" ref_url="https://www.suse.com/security/cve/CVE-2012-4213/" source="CVE"/>
		<reference ref_id="CVE-2012-4214" ref_url="https://www.suse.com/security/cve/CVE-2012-4214/" source="CVE"/>
		<reference ref_id="CVE-2012-4215" ref_url="https://www.suse.com/security/cve/CVE-2012-4215/" source="CVE"/>
		<reference ref_id="CVE-2012-4216" ref_url="https://www.suse.com/security/cve/CVE-2012-4216/" source="CVE"/>
		<reference ref_id="CVE-2012-4217" ref_url="https://www.suse.com/security/cve/CVE-2012-4217/" source="CVE"/>
		<reference ref_id="CVE-2012-4218" ref_url="https://www.suse.com/security/cve/CVE-2012-4218/" source="CVE"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2012-5830" ref_url="https://www.suse.com/security/cve/CVE-2012-5830/" source="CVE"/>
		<reference ref_id="CVE-2012-5833" ref_url="https://www.suse.com/security/cve/CVE-2012-5833/" source="CVE"/>
		<reference ref_id="CVE-2012-5835" ref_url="https://www.suse.com/security/cve/CVE-2012-5835/" source="CVE"/>
		<reference ref_id="CVE-2012-5838" ref_url="https://www.suse.com/security/cve/CVE-2012-5838/" source="CVE"/>
		<reference ref_id="CVE-2012-5839" ref_url="https://www.suse.com/security/cve/CVE-2012-5839/" source="CVE"/>
		<reference ref_id="CVE-2012-5840" ref_url="https://www.suse.com/security/cve/CVE-2012-5840/" source="CVE"/>
		<reference ref_id="CVE-2012-5841" ref_url="https://www.suse.com/security/cve/CVE-2012-5841/" source="CVE"/>
		<reference ref_id="CVE-2012-5842" ref_url="https://www.suse.com/security/cve/CVE-2012-5842/" source="CVE"/>
		<reference ref_id="CVE-2012-5843" ref_url="https://www.suse.com/security/cve/CVE-2012-5843/" source="CVE"/>
		<reference ref_id="CVE-2013-0744" ref_url="https://www.suse.com/security/cve/CVE-2013-0744/" source="CVE"/>
		<reference ref_id="CVE-2013-0745" ref_url="https://www.suse.com/security/cve/CVE-2013-0745/" source="CVE"/>
		<reference ref_id="CVE-2013-0746" ref_url="https://www.suse.com/security/cve/CVE-2013-0746/" source="CVE"/>
		<reference ref_id="CVE-2013-0747" ref_url="https://www.suse.com/security/cve/CVE-2013-0747/" source="CVE"/>
		<reference ref_id="CVE-2013-0748" ref_url="https://www.suse.com/security/cve/CVE-2013-0748/" source="CVE"/>
		<reference ref_id="CVE-2013-0749" ref_url="https://www.suse.com/security/cve/CVE-2013-0749/" source="CVE"/>
		<reference ref_id="CVE-2013-0750" ref_url="https://www.suse.com/security/cve/CVE-2013-0750/" source="CVE"/>
		<reference ref_id="CVE-2013-0752" ref_url="https://www.suse.com/security/cve/CVE-2013-0752/" source="CVE"/>
		<reference ref_id="CVE-2013-0753" ref_url="https://www.suse.com/security/cve/CVE-2013-0753/" source="CVE"/>
		<reference ref_id="CVE-2013-0754" ref_url="https://www.suse.com/security/cve/CVE-2013-0754/" source="CVE"/>
		<reference ref_id="CVE-2013-0755" ref_url="https://www.suse.com/security/cve/CVE-2013-0755/" source="CVE"/>
		<reference ref_id="CVE-2013-0756" ref_url="https://www.suse.com/security/cve/CVE-2013-0756/" source="CVE"/>
		<reference ref_id="CVE-2013-0757" ref_url="https://www.suse.com/security/cve/CVE-2013-0757/" source="CVE"/>
		<reference ref_id="CVE-2013-0758" ref_url="https://www.suse.com/security/cve/CVE-2013-0758/" source="CVE"/>
		<reference ref_id="CVE-2013-0760" ref_url="https://www.suse.com/security/cve/CVE-2013-0760/" source="CVE"/>
		<reference ref_id="CVE-2013-0761" ref_url="https://www.suse.com/security/cve/CVE-2013-0761/" source="CVE"/>
		<reference ref_id="CVE-2013-0762" ref_url="https://www.suse.com/security/cve/CVE-2013-0762/" source="CVE"/>
		<reference ref_id="CVE-2013-0763" ref_url="https://www.suse.com/security/cve/CVE-2013-0763/" source="CVE"/>
		<reference ref_id="CVE-2013-0764" ref_url="https://www.suse.com/security/cve/CVE-2013-0764/" source="CVE"/>
		<reference ref_id="CVE-2013-0766" ref_url="https://www.suse.com/security/cve/CVE-2013-0766/" source="CVE"/>
		<reference ref_id="CVE-2013-0767" ref_url="https://www.suse.com/security/cve/CVE-2013-0767/" source="CVE"/>
		<reference ref_id="CVE-2013-0768" ref_url="https://www.suse.com/security/cve/CVE-2013-0768/" source="CVE"/>
		<reference ref_id="CVE-2013-0769" ref_url="https://www.suse.com/security/cve/CVE-2013-0769/" source="CVE"/>
		<reference ref_id="CVE-2013-0770" ref_url="https://www.suse.com/security/cve/CVE-2013-0770/" source="CVE"/>
		<reference ref_id="CVE-2013-0771" ref_url="https://www.suse.com/security/cve/CVE-2013-0771/" source="CVE"/>
		<reference ref_id="CVE-2013-0773" ref_url="https://www.suse.com/security/cve/CVE-2013-0773/" source="CVE"/>
		<reference ref_id="CVE-2013-0774" ref_url="https://www.suse.com/security/cve/CVE-2013-0774/" source="CVE"/>
		<reference ref_id="CVE-2013-0775" ref_url="https://www.suse.com/security/cve/CVE-2013-0775/" source="CVE"/>
		<reference ref_id="CVE-2013-0776" ref_url="https://www.suse.com/security/cve/CVE-2013-0776/" source="CVE"/>
		<reference ref_id="CVE-2013-0780" ref_url="https://www.suse.com/security/cve/CVE-2013-0780/" source="CVE"/>
		<reference ref_id="CVE-2013-0782" ref_url="https://www.suse.com/security/cve/CVE-2013-0782/" source="CVE"/>
		<reference ref_id="CVE-2013-0783" ref_url="https://www.suse.com/security/cve/CVE-2013-0783/" source="CVE"/>
		<reference ref_id="CVE-2013-0787" ref_url="https://www.suse.com/security/cve/CVE-2013-0787/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-17.0.4esr-0.10.42 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6077/">CVE-2006-6077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6077">CVE-2006-6077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0008/">CVE-2007-0008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0008">CVE-2007-0008 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0009/">CVE-2007-0009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0009">CVE-2007-0009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0078/">CVE-2007-0078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0078">CVE-2007-0078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0079/">CVE-2007-0079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0079">CVE-2007-0079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0775/">CVE-2007-0775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0775">CVE-2007-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0776/">CVE-2007-0776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0776">CVE-2007-0776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0777/">CVE-2007-0777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0777">CVE-2007-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0780/">CVE-2007-0780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0780">CVE-2007-0780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0800/">CVE-2007-0800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0800">CVE-2007-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0981/">CVE-2007-0981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0981">CVE-2007-0981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0995/">CVE-2007-0995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0995">CVE-2007-0995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0996/">CVE-2007-0996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0996">CVE-2007-0996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3089/">CVE-2007-3089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3089">CVE-2007-3089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3285/">CVE-2007-3285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3285">CVE-2007-3285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3656/">CVE-2007-3656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3656">CVE-2007-3656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3670/">CVE-2007-3670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3670">CVE-2007-3670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3734/">CVE-2007-3734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3734">CVE-2007-3734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3735/">CVE-2007-3735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3735">CVE-2007-3735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3736/">CVE-2007-3736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3736">CVE-2007-3736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3737/">CVE-2007-3737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3737">CVE-2007-3737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3738/">CVE-2007-3738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3738">CVE-2007-3738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0412/">CVE-2008-0412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0412">CVE-2008-0412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0414/">CVE-2008-0414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0414">CVE-2008-0414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0415/">CVE-2008-0415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0415">CVE-2008-0415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0417/">CVE-2008-0417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0417">CVE-2008-0417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0418/">CVE-2008-0418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0418">CVE-2008-0418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0419/">CVE-2008-0419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0419">CVE-2008-0419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0591/">CVE-2008-0591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0591">CVE-2008-0591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0592/">CVE-2008-0592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0592">CVE-2008-0592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0593/">CVE-2008-0593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0593">CVE-2008-0593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0594/">CVE-2008-0594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0594">CVE-2008-0594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3836/">CVE-2008-3836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3836">CVE-2008-3836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4063/">CVE-2008-4063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4063">CVE-2008-4063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4064/">CVE-2008-4064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4064">CVE-2008-4064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4070/">CVE-2008-4070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4070">CVE-2008-4070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5913/">CVE-2008-5913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5913">CVE-2008-5913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0040">CVE-2009-0040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0352/">CVE-2009-0352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0352">CVE-2009-0352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0353/">CVE-2009-0353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0353">CVE-2009-0353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0354/">CVE-2009-0354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0354">CVE-2009-0354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0355/">CVE-2009-0355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0355">CVE-2009-0355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0356/">CVE-2009-0356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0356">CVE-2009-0356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0357/">CVE-2009-0357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0357">CVE-2009-0357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0358/">CVE-2009-0358 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0358">CVE-2009-0358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0652/">CVE-2009-0652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0652">CVE-2009-0652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0771/">CVE-2009-0771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0771">CVE-2009-0771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0772/">CVE-2009-0772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0772">CVE-2009-0772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0773/">CVE-2009-0773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0773">CVE-2009-0773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0774/">CVE-2009-0774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0774">CVE-2009-0774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0775/">CVE-2009-0775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0775">CVE-2009-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0776/">CVE-2009-0776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0776">CVE-2009-0776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0777/">CVE-2009-0777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0777">CVE-2009-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1044/">CVE-2009-1044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1044">CVE-2009-1044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1169/">CVE-2009-1169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1169">CVE-2009-1169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1302/">CVE-2009-1302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1302">CVE-2009-1302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1303/">CVE-2009-1303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1303">CVE-2009-1303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1304/">CVE-2009-1304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1304">CVE-2009-1304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1305/">CVE-2009-1305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1305">CVE-2009-1305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1306/">CVE-2009-1306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1306">CVE-2009-1306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1307/">CVE-2009-1307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1307">CVE-2009-1307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1308/">CVE-2009-1308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1308">CVE-2009-1308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1309/">CVE-2009-1309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1309">CVE-2009-1309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1310/">CVE-2009-1310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1310">CVE-2009-1310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1311/">CVE-2009-1311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1311">CVE-2009-1311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1312/">CVE-2009-1312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1312">CVE-2009-1312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1313/">CVE-2009-1313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1313">CVE-2009-1313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1563/">CVE-2009-1563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1563">CVE-2009-1563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1571/">CVE-2009-1571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1571">CVE-2009-1571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2470/">CVE-2009-2470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2470">CVE-2009-2470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2654/">CVE-2009-2654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2654">CVE-2009-2654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3069/">CVE-2009-3069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3069">CVE-2009-3069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3070/">CVE-2009-3070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3070">CVE-2009-3070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3071/">CVE-2009-3071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3071">CVE-2009-3071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3072/">CVE-2009-3072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3072">CVE-2009-3072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3073/">CVE-2009-3073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3073">CVE-2009-3073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3074/">CVE-2009-3074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3074">CVE-2009-3074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3075/">CVE-2009-3075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3075">CVE-2009-3075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3077/">CVE-2009-3077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3077">CVE-2009-3077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3078/">CVE-2009-3078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3078">CVE-2009-3078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3079/">CVE-2009-3079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3079">CVE-2009-3079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3274/">CVE-2009-3274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3274">CVE-2009-3274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3370/">CVE-2009-3370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3370">CVE-2009-3370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3371/">CVE-2009-3371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3371">CVE-2009-3371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3372/">CVE-2009-3372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3372">CVE-2009-3372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3373/">CVE-2009-3373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3373">CVE-2009-3373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3374/">CVE-2009-3374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3374">CVE-2009-3374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3375/">CVE-2009-3375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3375">CVE-2009-3375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3376/">CVE-2009-3376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3376">CVE-2009-3376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3377/">CVE-2009-3377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3377">CVE-2009-3377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3378/">CVE-2009-3378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3378">CVE-2009-3378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3379">CVE-2009-3379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3380/">CVE-2009-3380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3380">CVE-2009-3380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3381/">CVE-2009-3381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3381">CVE-2009-3381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3383/">CVE-2009-3383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3383">CVE-2009-3383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3388/">CVE-2009-3388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3388">CVE-2009-3388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3389/">CVE-2009-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3389">CVE-2009-3389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3979/">CVE-2009-3979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3979">CVE-2009-3979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3980/">CVE-2009-3980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3980">CVE-2009-3980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3982/">CVE-2009-3982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3982">CVE-2009-3982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3983/">CVE-2009-3983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3983">CVE-2009-3983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3984/">CVE-2009-3984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3984">CVE-2009-3984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3985/">CVE-2009-3985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3985">CVE-2009-3985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3988/">CVE-2009-3988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3988">CVE-2009-3988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0159/">CVE-2010-0159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0159">CVE-2010-0159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0160/">CVE-2010-0160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0160">CVE-2010-0160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0162/">CVE-2010-0162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0162">CVE-2010-0162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0173">CVE-2010-0173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0174">CVE-2010-0174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0175/">CVE-2010-0175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0175">CVE-2010-0175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0176">CVE-2010-0176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0177">CVE-2010-0177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0178">CVE-2010-0178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0179/">CVE-2010-0179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0179">CVE-2010-0179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0181">CVE-2010-0181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0182">CVE-2010-0182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0183/">CVE-2010-0183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0183">CVE-2010-0183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0654">CVE-2010-0654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1121">CVE-2010-1121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1125/">CVE-2010-1125 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1125">CVE-2010-1125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1196">CVE-2010-1196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1197/">CVE-2010-1197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1197">CVE-2010-1197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1198/">CVE-2010-1198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1198">CVE-2010-1198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1199">CVE-2010-1199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1200">CVE-2010-1200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1201/">CVE-2010-1201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1201">CVE-2010-1201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1202/">CVE-2010-1202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1202">CVE-2010-1202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1203">CVE-2010-1203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1205">CVE-2010-1205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1206/">CVE-2010-1206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1206">CVE-2010-1206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1208/">CVE-2010-1208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1208">CVE-2010-1208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1209/">CVE-2010-1209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1209">CVE-2010-1209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1211">CVE-2010-1211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1212/">CVE-2010-1212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1212">CVE-2010-1212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1213">CVE-2010-1213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1214/">CVE-2010-1214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1214">CVE-2010-1214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1585/">CVE-2010-1585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1585">CVE-2010-1585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2751/">CVE-2010-2751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2751">CVE-2010-2751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2752">CVE-2010-2752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2753">CVE-2010-2753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2754">CVE-2010-2754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2755/">CVE-2010-2755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2755">CVE-2010-2755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2760">CVE-2010-2760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2762/">CVE-2010-2762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2762">CVE-2010-2762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2764">CVE-2010-2764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2765">CVE-2010-2765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2766">CVE-2010-2766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2767">CVE-2010-2767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2768">CVE-2010-2768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2769">CVE-2010-2769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3166">CVE-2010-3166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3167">CVE-2010-3167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3168">CVE-2010-3168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3169">CVE-2010-3169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3170">CVE-2010-3170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3173/">CVE-2010-3173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3173">CVE-2010-3173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3174">CVE-2010-3174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3175">CVE-2010-3175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3176">CVE-2010-3176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3177">CVE-2010-3177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3178">CVE-2010-3178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3179">CVE-2010-3179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3180">CVE-2010-3180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3182">CVE-2010-3182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3183">CVE-2010-3183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3765">CVE-2010-3765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3766/">CVE-2010-3766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3766">CVE-2010-3766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3767/">CVE-2010-3767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3767">CVE-2010-3767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3768/">CVE-2010-3768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3768">CVE-2010-3768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3769/">CVE-2010-3769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3769">CVE-2010-3769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3770/">CVE-2010-3770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3770">CVE-2010-3770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3771/">CVE-2010-3771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3771">CVE-2010-3771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3772/">CVE-2010-3772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3772">CVE-2010-3772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3773/">CVE-2010-3773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3773">CVE-2010-3773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3775/">CVE-2010-3775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3775">CVE-2010-3775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3776/">CVE-2010-3776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3776">CVE-2010-3776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3777/">CVE-2010-3777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3777">CVE-2010-3777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3778/">CVE-2010-3778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3778">CVE-2010-3778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0051/">CVE-2011-0051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0051">CVE-2011-0051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0053/">CVE-2011-0053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0053">CVE-2011-0053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0054/">CVE-2011-0054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0054">CVE-2011-0054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0055/">CVE-2011-0055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0055">CVE-2011-0055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0056/">CVE-2011-0056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0056">CVE-2011-0056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0057/">CVE-2011-0057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0057">CVE-2011-0057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0059/">CVE-2011-0059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0059">CVE-2011-0059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0061/">CVE-2011-0061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0061">CVE-2011-0061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0062/">CVE-2011-0062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0062">CVE-2011-0062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0065/">CVE-2011-0065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0065">CVE-2011-0065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0066/">CVE-2011-0066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0066">CVE-2011-0066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0067/">CVE-2011-0067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0067">CVE-2011-0067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0069">CVE-2011-0069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0070/">CVE-2011-0070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0070">CVE-2011-0070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0072/">CVE-2011-0072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0072">CVE-2011-0072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0073/">CVE-2011-0073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0073">CVE-2011-0073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0074/">CVE-2011-0074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0074">CVE-2011-0074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0075/">CVE-2011-0075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0075">CVE-2011-0075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0077/">CVE-2011-0077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0077">CVE-2011-0077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0078/">CVE-2011-0078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0078">CVE-2011-0078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0080">CVE-2011-0080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0081/">CVE-2011-0081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0081">CVE-2011-0081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0083/">CVE-2011-0083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0083">CVE-2011-0083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0084/">CVE-2011-0084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0084">CVE-2011-0084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0085/">CVE-2011-0085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0085">CVE-2011-0085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1202/">CVE-2011-1202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1202">CVE-2011-1202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2362/">CVE-2011-2362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2362">CVE-2011-2362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2363/">CVE-2011-2363 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2363">CVE-2011-2363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2364/">CVE-2011-2364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2364">CVE-2011-2364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2365/">CVE-2011-2365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2365">CVE-2011-2365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2371/">CVE-2011-2371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2371">CVE-2011-2371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2372/">CVE-2011-2372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2372">CVE-2011-2372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2373/">CVE-2011-2373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2373">CVE-2011-2373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2374/">CVE-2011-2374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2374">CVE-2011-2374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2376/">CVE-2011-2376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2376">CVE-2011-2376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2377/">CVE-2011-2377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2377">CVE-2011-2377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2378/">CVE-2011-2378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2378">CVE-2011-2378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2980/">CVE-2011-2980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2980">CVE-2011-2980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2981/">CVE-2011-2981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2981">CVE-2011-2981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2982/">CVE-2011-2982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2982">CVE-2011-2982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2983/">CVE-2011-2983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2983">CVE-2011-2983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2995/">CVE-2011-2995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2995">CVE-2011-2995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2996/">CVE-2011-2996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2996">CVE-2011-2996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2997/">CVE-2011-2997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2997">CVE-2011-2997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3000/">CVE-2011-3000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3000">CVE-2011-3000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3001/">CVE-2011-3001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3001">CVE-2011-3001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3002/">CVE-2011-3002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3002">CVE-2011-3002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3003/">CVE-2011-3003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3003">CVE-2011-3003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3004/">CVE-2011-3004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3004">CVE-2011-3004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3005/">CVE-2011-3005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3005">CVE-2011-3005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3026">CVE-2011-3026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3062/">CVE-2011-3062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3062">CVE-2011-3062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3101/">CVE-2011-3101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3101">CVE-2011-3101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3232/">CVE-2011-3232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3232">CVE-2011-3232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3658/">CVE-2011-3658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3658">CVE-2011-3658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3660/">CVE-2011-3660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3660">CVE-2011-3660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3661/">CVE-2011-3661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3661">CVE-2011-3661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3663/">CVE-2011-3663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3663">CVE-2011-3663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3665/">CVE-2011-3665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3665">CVE-2011-3665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0441/">CVE-2012-0441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0441">CVE-2012-0441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0452/">CVE-2012-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0452">CVE-2012-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0467/">CVE-2012-0467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0467">CVE-2012-0467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0468/">CVE-2012-0468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0468">CVE-2012-0468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0469/">CVE-2012-0469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0469">CVE-2012-0469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0470/">CVE-2012-0470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0470">CVE-2012-0470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0471/">CVE-2012-0471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0471">CVE-2012-0471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0472/">CVE-2012-0472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0472">CVE-2012-0472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0473/">CVE-2012-0473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0473">CVE-2012-0473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0474/">CVE-2012-0474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0474">CVE-2012-0474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0477/">CVE-2012-0477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0477">CVE-2012-0477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0478/">CVE-2012-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0478">CVE-2012-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0479/">CVE-2012-0479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0479">CVE-2012-0479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0759/">CVE-2012-0759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0759">CVE-2012-0759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1937/">CVE-2012-1937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1937">CVE-2012-1937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1939/">CVE-2012-1939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1939">CVE-2012-1939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1940/">CVE-2012-1940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1940">CVE-2012-1940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1941/">CVE-2012-1941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1941">CVE-2012-1941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1944/">CVE-2012-1944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1944">CVE-2012-1944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1945/">CVE-2012-1945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1945">CVE-2012-1945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1946/">CVE-2012-1946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1946">CVE-2012-1946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1947/">CVE-2012-1947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1947">CVE-2012-1947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1948/">CVE-2012-1948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1948">CVE-2012-1948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1949/">CVE-2012-1949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1949">CVE-2012-1949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1950/">CVE-2012-1950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1950">CVE-2012-1950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1951/">CVE-2012-1951 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1951">CVE-2012-1951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1952/">CVE-2012-1952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1952">CVE-2012-1952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1953/">CVE-2012-1953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1953">CVE-2012-1953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1954/">CVE-2012-1954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1954">CVE-2012-1954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1955/">CVE-2012-1955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1955">CVE-2012-1955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1956/">CVE-2012-1956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1956">CVE-2012-1956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1957/">CVE-2012-1957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1957">CVE-2012-1957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1958/">CVE-2012-1958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1958">CVE-2012-1958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1959/">CVE-2012-1959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1959">CVE-2012-1959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1960/">CVE-2012-1960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1960">CVE-2012-1960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1961/">CVE-2012-1961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1961">CVE-2012-1961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1962/">CVE-2012-1962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1962">CVE-2012-1962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1963/">CVE-2012-1963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1963">CVE-2012-1963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1964/">CVE-2012-1964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1964">CVE-2012-1964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1965/">CVE-2012-1965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1965">CVE-2012-1965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1966/">CVE-2012-1966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1966">CVE-2012-1966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1967/">CVE-2012-1967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1967">CVE-2012-1967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1970/">CVE-2012-1970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1970">CVE-2012-1970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1972/">CVE-2012-1972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1972">CVE-2012-1972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1973/">CVE-2012-1973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1973">CVE-2012-1973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1974/">CVE-2012-1974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1974">CVE-2012-1974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1975/">CVE-2012-1975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1975">CVE-2012-1975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1976/">CVE-2012-1976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1976">CVE-2012-1976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3956/">CVE-2012-3956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3956">CVE-2012-3956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3957/">CVE-2012-3957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3957">CVE-2012-3957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3958/">CVE-2012-3958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3958">CVE-2012-3958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3959/">CVE-2012-3959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3959">CVE-2012-3959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3960/">CVE-2012-3960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3960">CVE-2012-3960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3961/">CVE-2012-3961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3961">CVE-2012-3961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3962/">CVE-2012-3962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3962">CVE-2012-3962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3963/">CVE-2012-3963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3963">CVE-2012-3963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3964/">CVE-2012-3964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3964">CVE-2012-3964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3966/">CVE-2012-3966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3966">CVE-2012-3966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3967/">CVE-2012-3967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3967">CVE-2012-3967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3968/">CVE-2012-3968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3968">CVE-2012-3968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3969/">CVE-2012-3969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3969">CVE-2012-3969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3970/">CVE-2012-3970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3970">CVE-2012-3970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3972/">CVE-2012-3972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3972">CVE-2012-3972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3976/">CVE-2012-3976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3976">CVE-2012-3976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3978/">CVE-2012-3978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3978">CVE-2012-3978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3980/">CVE-2012-3980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3980">CVE-2012-3980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3982/">CVE-2012-3982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3982">CVE-2012-3982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3986/">CVE-2012-3986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3986">CVE-2012-3986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3988/">CVE-2012-3988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3988">CVE-2012-3988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3990/">CVE-2012-3990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3990">CVE-2012-3990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3991/">CVE-2012-3991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3991">CVE-2012-3991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3992/">CVE-2012-3992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3992">CVE-2012-3992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3993/">CVE-2012-3993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3993">CVE-2012-3993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3994/">CVE-2012-3994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3994">CVE-2012-3994 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3995/">CVE-2012-3995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3995">CVE-2012-3995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4179/">CVE-2012-4179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4179">CVE-2012-4179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4180/">CVE-2012-4180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4180">CVE-2012-4180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4181/">CVE-2012-4181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4181">CVE-2012-4181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4182/">CVE-2012-4182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4182">CVE-2012-4182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4183/">CVE-2012-4183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4183">CVE-2012-4183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4184/">CVE-2012-4184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4184">CVE-2012-4184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4185/">CVE-2012-4185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4185">CVE-2012-4185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4186/">CVE-2012-4186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4186">CVE-2012-4186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4187/">CVE-2012-4187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4187">CVE-2012-4187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4188/">CVE-2012-4188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4188">CVE-2012-4188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4192/">CVE-2012-4192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4192">CVE-2012-4192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4193/">CVE-2012-4193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4193">CVE-2012-4193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4194/">CVE-2012-4194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4194">CVE-2012-4194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4195/">CVE-2012-4195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4195">CVE-2012-4195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4196/">CVE-2012-4196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4196">CVE-2012-4196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4201/">CVE-2012-4201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4201">CVE-2012-4201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4202/">CVE-2012-4202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4202">CVE-2012-4202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4207/">CVE-2012-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4207">CVE-2012-4207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4209/">CVE-2012-4209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4209">CVE-2012-4209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4210/">CVE-2012-4210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4210">CVE-2012-4210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4212/">CVE-2012-4212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4212">CVE-2012-4212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4213/">CVE-2012-4213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4213">CVE-2012-4213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4214/">CVE-2012-4214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4214">CVE-2012-4214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4215/">CVE-2012-4215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4215">CVE-2012-4215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4216/">CVE-2012-4216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4216">CVE-2012-4216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4217/">CVE-2012-4217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4217">CVE-2012-4217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4218/">CVE-2012-4218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4218">CVE-2012-4218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5829">CVE-2012-5829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5830/">CVE-2012-5830 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-5830">CVE-2012-5830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5833/">CVE-2012-5833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5833">CVE-2012-5833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5835/">CVE-2012-5835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5835">CVE-2012-5835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5838/">CVE-2012-5838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5838">CVE-2012-5838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5839/">CVE-2012-5839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5839">CVE-2012-5839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5840/">CVE-2012-5840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5840">CVE-2012-5840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5841/">CVE-2012-5841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5841">CVE-2012-5841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5842/">CVE-2012-5842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5842">CVE-2012-5842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5843/">CVE-2012-5843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5843">CVE-2012-5843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0744/">CVE-2013-0744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0744">CVE-2013-0744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0745/">CVE-2013-0745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0745">CVE-2013-0745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0746/">CVE-2013-0746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0746">CVE-2013-0746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0747/">CVE-2013-0747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0747">CVE-2013-0747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0748/">CVE-2013-0748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0748">CVE-2013-0748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0749/">CVE-2013-0749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0749">CVE-2013-0749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0750/">CVE-2013-0750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0750">CVE-2013-0750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0752/">CVE-2013-0752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0752">CVE-2013-0752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0753/">CVE-2013-0753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0753">CVE-2013-0753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0754/">CVE-2013-0754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0754">CVE-2013-0754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0755/">CVE-2013-0755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0755">CVE-2013-0755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0756/">CVE-2013-0756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0756">CVE-2013-0756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0757/">CVE-2013-0757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0757">CVE-2013-0757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0758/">CVE-2013-0758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0758">CVE-2013-0758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0760/">CVE-2013-0760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0760">CVE-2013-0760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0761/">CVE-2013-0761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0761">CVE-2013-0761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0762/">CVE-2013-0762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0762">CVE-2013-0762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0763/">CVE-2013-0763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0763">CVE-2013-0763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0764/">CVE-2013-0764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0764">CVE-2013-0764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0766/">CVE-2013-0766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0766">CVE-2013-0766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0767/">CVE-2013-0767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0767">CVE-2013-0767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0768/">CVE-2013-0768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0768">CVE-2013-0768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0769/">CVE-2013-0769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0769">CVE-2013-0769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0770/">CVE-2013-0770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0770">CVE-2013-0770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0771/">CVE-2013-0771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0771">CVE-2013-0771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0773/">CVE-2013-0773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0773">CVE-2013-0773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0774/">CVE-2013-0774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0774">CVE-2013-0774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0775/">CVE-2013-0775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0775">CVE-2013-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0776/">CVE-2013-0776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0776">CVE-2013-0776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0780/">CVE-2013-0780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0780">CVE-2013-0780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0782/">CVE-2013-0782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0782">CVE-2013-0782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0783/">CVE-2013-0783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0783">CVE-2013-0783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0787/">CVE-2013-0787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0787">CVE-2013-0787 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989503" comment="MozillaFirefox-17.0.4esr-0.10.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989504" comment="MozillaFirefox-translations-17.0.4esr-0.10.42 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215968" version="1" class="patch">
	<metadata>
		<title>NetworkManager-0.7.1_git20090811-3.28.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0365" ref_url="https://www.suse.com/security/cve/CVE-2009-0365/" source="CVE"/>
		<reference ref_id="CVE-2009-0578" ref_url="https://www.suse.com/security/cve/CVE-2009-0578/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-0.7.1_git20090811-3.28.2 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0365/">CVE-2009-0365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0365">CVE-2009-0365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0578/">CVE-2009-0578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0578">CVE-2009-0578 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989505" comment="NetworkManager-0.7.1_git20090811-3.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989506" comment="NetworkManager-glib-0.7.1_git20090811-3.28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215969" version="1" class="patch">
	<metadata>
		<title>NetworkManager-gnome-0.7.1-5.22.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0365" ref_url="https://www.suse.com/security/cve/CVE-2009-0365/" source="CVE"/>
		<reference ref_id="CVE-2009-0578" ref_url="https://www.suse.com/security/cve/CVE-2009-0578/" source="CVE"/>
		<reference ref_id="CVE-2009-4144" ref_url="https://www.suse.com/security/cve/CVE-2009-4144/" source="CVE"/>
		<reference ref_id="CVE-2009-4145" ref_url="https://www.suse.com/security/cve/CVE-2009-4145/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-gnome-0.7.1-5.22.28 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0365/">CVE-2009-0365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0365">CVE-2009-0365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0578/">CVE-2009-0578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0578">CVE-2009-0578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4144/">CVE-2009-4144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4144">CVE-2009-4144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4145/">CVE-2009-4145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4145">CVE-2009-4145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988887" comment="NetworkManager-gnome-0.7.1-5.22.28 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215970" version="1" class="patch">
	<metadata>
		<title>OpenEXR-1.6.1-83.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-1720" ref_url="https://www.suse.com/security/cve/CVE-2009-1720/" source="CVE"/>
		<reference ref_id="CVE-2009-1721" ref_url="https://www.suse.com/security/cve/CVE-2009-1721/" source="CVE"/>
		<description>
These are all security issues fixed in the OpenEXR-1.6.1-83.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1720/">CVE-2009-1720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1720">CVE-2009-1720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1721/">CVE-2009-1721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1721">CVE-2009-1721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988316" comment="OpenEXR-1.6.1-83.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988317" comment="OpenEXR-32bit-1.6.1-83.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988318" comment="OpenEXR-x86-1.6.1-83.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215971" version="1" class="patch">
	<metadata>
		<title>PackageKit-0.3.14-2.28.46 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<description>
These are all security issues fixed in the PackageKit-0.3.14-2.28.46 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4311">CVE-2008-4311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989507" comment="PackageKit-0.3.14-2.28.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989508" comment="PackageKit-lang-0.3.14-2.28.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989509" comment="hal-0.5.12-23.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989510" comment="hal-32bit-0.5.12-23.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989511" comment="hal-doc-0.5.12-23.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989512" comment="hal-x86-0.5.12-23.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989513" comment="libpackagekit-glib10-0.3.14-2.28.46 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215972" version="1" class="patch">
	<metadata>
		<title>PolicyKit-0.9-14.41.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-1658" ref_url="https://www.suse.com/security/cve/CVE-2008-1658/" source="CVE"/>
		<description>
These are all security issues fixed in the PolicyKit-0.9-14.41.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1658/">CVE-2008-1658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1658">CVE-2008-1658 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989514" comment="PolicyKit-0.9-14.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989515" comment="PolicyKit-32bit-0.9-14.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988897" comment="PolicyKit-doc-0.9-14.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989516" comment="PolicyKit-x86-0.9-14.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215973" version="1" class="patch">
	<metadata>
		<title>aaa_base-11-6.90.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0461" ref_url="https://www.suse.com/security/cve/CVE-2011-0461/" source="CVE"/>
		<description>
These are all security issues fixed in the aaa_base-11-6.90.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0461/">CVE-2011-0461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0461">CVE-2011-0461 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989517" comment="aaa_base-11-6.90.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215974" version="1" class="patch">
	<metadata>
		<title>acpid-1.0.6-91.25.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0798" ref_url="https://www.suse.com/security/cve/CVE-2009-0798/" source="CVE"/>
		<reference ref_id="CVE-2011-4578" ref_url="https://www.suse.com/security/cve/CVE-2011-4578/" source="CVE"/>
		<description>
These are all security issues fixed in the acpid-1.0.6-91.25.20 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0798/">CVE-2009-0798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0798">CVE-2009-0798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4578/">CVE-2011-4578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4578">CVE-2011-4578 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989518" comment="acpid-1.0.6-91.25.20 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215975" version="1" class="patch">
	<metadata>
		<title>amavisd-new-2.7.0-18.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2005-1349" ref_url="https://www.suse.com/security/cve/CVE-2005-1349/" source="CVE"/>
		<description>
These are all security issues fixed in the amavisd-new-2.7.0-18.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-1349/">CVE-2005-1349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-1349">CVE-2005-1349 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988901" comment="amavisd-new-2.7.0-18.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215976" version="1" class="patch">
	<metadata>
		<title>ant-1.7.1-20.9.53 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-2098" ref_url="https://www.suse.com/security/cve/CVE-2012-2098/" source="CVE"/>
		<description>
These are all security issues fixed in the ant-1.7.1-20.9.53 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2098/">CVE-2012-2098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2098">CVE-2012-2098 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989519" comment="ant-1.7.1-20.9.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989520" comment="ant-trax-1.7.1-16.9.65 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215977" version="1" class="patch">
	<metadata>
		<title>apache2-2.2.12-1.38.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-3747" ref_url="https://www.suse.com/security/cve/CVE-2006-3747/" source="CVE"/>
		<reference ref_id="CVE-2006-5752" ref_url="https://www.suse.com/security/cve/CVE-2006-5752/" source="CVE"/>
		<reference ref_id="CVE-2007-1862" ref_url="https://www.suse.com/security/cve/CVE-2007-1862/" source="CVE"/>
		<reference ref_id="CVE-2007-1863" ref_url="https://www.suse.com/security/cve/CVE-2007-1863/" source="CVE"/>
		<reference ref_id="CVE-2007-3304" ref_url="https://www.suse.com/security/cve/CVE-2007-3304/" source="CVE"/>
		<reference ref_id="CVE-2007-3847" ref_url="https://www.suse.com/security/cve/CVE-2007-3847/" source="CVE"/>
		<reference ref_id="CVE-2007-4465" ref_url="https://www.suse.com/security/cve/CVE-2007-4465/" source="CVE"/>
		<reference ref_id="CVE-2007-5000" ref_url="https://www.suse.com/security/cve/CVE-2007-5000/" source="CVE"/>
		<reference ref_id="CVE-2007-6388" ref_url="https://www.suse.com/security/cve/CVE-2007-6388/" source="CVE"/>
		<reference ref_id="CVE-2007-6420" ref_url="https://www.suse.com/security/cve/CVE-2007-6420/" source="CVE"/>
		<reference ref_id="CVE-2007-6421" ref_url="https://www.suse.com/security/cve/CVE-2007-6421/" source="CVE"/>
		<reference ref_id="CVE-2007-6422" ref_url="https://www.suse.com/security/cve/CVE-2007-6422/" source="CVE"/>
		<reference ref_id="CVE-2007-6750" ref_url="https://www.suse.com/security/cve/CVE-2007-6750/" source="CVE"/>
		<reference ref_id="CVE-2008-0005" ref_url="https://www.suse.com/security/cve/CVE-2008-0005/" source="CVE"/>
		<reference ref_id="CVE-2008-1678" ref_url="https://www.suse.com/security/cve/CVE-2008-1678/" source="CVE"/>
		<reference ref_id="CVE-2008-2364" ref_url="https://www.suse.com/security/cve/CVE-2008-2364/" source="CVE"/>
		<reference ref_id="CVE-2008-2939" ref_url="https://www.suse.com/security/cve/CVE-2008-2939/" source="CVE"/>
		<reference ref_id="CVE-2009-1191" ref_url="https://www.suse.com/security/cve/CVE-2009-1191/" source="CVE"/>
		<reference ref_id="CVE-2009-1195" ref_url="https://www.suse.com/security/cve/CVE-2009-1195/" source="CVE"/>
		<reference ref_id="CVE-2009-1890" ref_url="https://www.suse.com/security/cve/CVE-2009-1890/" source="CVE"/>
		<reference ref_id="CVE-2009-1891" ref_url="https://www.suse.com/security/cve/CVE-2009-1891/" source="CVE"/>
		<reference ref_id="CVE-2009-3094" ref_url="https://www.suse.com/security/cve/CVE-2009-3094/" source="CVE"/>
		<reference ref_id="CVE-2009-3095" ref_url="https://www.suse.com/security/cve/CVE-2009-3095/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-0408" ref_url="https://www.suse.com/security/cve/CVE-2010-0408/" source="CVE"/>
		<reference ref_id="CVE-2010-0434" ref_url="https://www.suse.com/security/cve/CVE-2010-0434/" source="CVE"/>
		<reference ref_id="CVE-2010-1452" ref_url="https://www.suse.com/security/cve/CVE-2010-1452/" source="CVE"/>
		<reference ref_id="CVE-2010-2068" ref_url="https://www.suse.com/security/cve/CVE-2010-2068/" source="CVE"/>
		<reference ref_id="CVE-2011-3192" ref_url="https://www.suse.com/security/cve/CVE-2011-3192/" source="CVE"/>
		<reference ref_id="CVE-2011-3348" ref_url="https://www.suse.com/security/cve/CVE-2011-3348/" source="CVE"/>
		<reference ref_id="CVE-2011-3368" ref_url="https://www.suse.com/security/cve/CVE-2011-3368/" source="CVE"/>
		<reference ref_id="CVE-2011-3607" ref_url="https://www.suse.com/security/cve/CVE-2011-3607/" source="CVE"/>
		<reference ref_id="CVE-2011-3639" ref_url="https://www.suse.com/security/cve/CVE-2011-3639/" source="CVE"/>
		<reference ref_id="CVE-2011-4317" ref_url="https://www.suse.com/security/cve/CVE-2011-4317/" source="CVE"/>
		<reference ref_id="CVE-2012-0031" ref_url="https://www.suse.com/security/cve/CVE-2012-0031/" source="CVE"/>
		<reference ref_id="CVE-2012-0053" ref_url="https://www.suse.com/security/cve/CVE-2012-0053/" source="CVE"/>
		<reference ref_id="CVE-2012-0883" ref_url="https://www.suse.com/security/cve/CVE-2012-0883/" source="CVE"/>
		<reference ref_id="CVE-2012-2687" ref_url="https://www.suse.com/security/cve/CVE-2012-2687/" source="CVE"/>
		<reference ref_id="CVE-2012-3499" ref_url="https://www.suse.com/security/cve/CVE-2012-3499/" source="CVE"/>
		<reference ref_id="CVE-2012-4557" ref_url="https://www.suse.com/security/cve/CVE-2012-4557/" source="CVE"/>
		<reference ref_id="CVE-2012-4558" ref_url="https://www.suse.com/security/cve/CVE-2012-4558/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-2.2.12-1.38.2 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3747/">CVE-2006-3747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3747">CVE-2006-3747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5752/">CVE-2006-5752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5752">CVE-2006-5752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1862/">CVE-2007-1862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1862">CVE-2007-1862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1863/">CVE-2007-1863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1863">CVE-2007-1863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3304/">CVE-2007-3304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3304">CVE-2007-3304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3847/">CVE-2007-3847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3847">CVE-2007-3847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4465/">CVE-2007-4465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4465">CVE-2007-4465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5000/">CVE-2007-5000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5000">CVE-2007-5000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6388/">CVE-2007-6388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6388">CVE-2007-6388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6420/">CVE-2007-6420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6420">CVE-2007-6420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6421/">CVE-2007-6421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6421">CVE-2007-6421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6422/">CVE-2007-6422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6422">CVE-2007-6422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6750/">CVE-2007-6750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6750">CVE-2007-6750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0005/">CVE-2008-0005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0005">CVE-2008-0005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1678/">CVE-2008-1678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1678">CVE-2008-1678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2364/">CVE-2008-2364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2364">CVE-2008-2364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2939/">CVE-2008-2939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2939">CVE-2008-2939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1191/">CVE-2009-1191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1191">CVE-2009-1191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1195/">CVE-2009-1195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1195">CVE-2009-1195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1890/">CVE-2009-1890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1890">CVE-2009-1890 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1891/">CVE-2009-1891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1891">CVE-2009-1891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3094/">CVE-2009-3094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3094">CVE-2009-3094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3095/">CVE-2009-3095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3095">CVE-2009-3095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0408/">CVE-2010-0408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0408">CVE-2010-0408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0434/">CVE-2010-0434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0434">CVE-2010-0434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1452/">CVE-2010-1452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1452">CVE-2010-1452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2068/">CVE-2010-2068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2068">CVE-2010-2068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3192/">CVE-2011-3192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3192">CVE-2011-3192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3348/">CVE-2011-3348 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3348">CVE-2011-3348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3368/">CVE-2011-3368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3368">CVE-2011-3368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3607/">CVE-2011-3607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3607">CVE-2011-3607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3639/">CVE-2011-3639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3639">CVE-2011-3639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4317/">CVE-2011-4317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4317">CVE-2011-4317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0031/">CVE-2012-0031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0031">CVE-2012-0031 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0053/">CVE-2012-0053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0053">CVE-2012-0053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0883/">CVE-2012-0883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0883">CVE-2012-0883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2687/">CVE-2012-2687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2687">CVE-2012-2687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3499/">CVE-2012-3499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3499">CVE-2012-3499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4557/">CVE-2012-4557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4557">CVE-2012-4557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4558/">CVE-2012-4558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4558">CVE-2012-4558 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989521" comment="apache2-2.2.12-1.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989522" comment="apache2-doc-2.2.12-1.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989523" comment="apache2-example-pages-2.2.12-1.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989524" comment="apache2-prefork-2.2.12-1.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989525" comment="apache2-utils-2.2.12-1.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989526" comment="apache2-worker-2.2.12-1.38.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215978" version="1" class="patch">
	<metadata>
		<title>apache2-mod_jk-1.2.26-1.30.110 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-0774" ref_url="https://www.suse.com/security/cve/CVE-2007-0774/" source="CVE"/>
		<reference ref_id="CVE-2008-5519" ref_url="https://www.suse.com/security/cve/CVE-2008-5519/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_jk-1.2.26-1.30.110 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0774/">CVE-2007-0774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0774">CVE-2007-0774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5519/">CVE-2008-5519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5519">CVE-2008-5519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988908" comment="apache2-mod_jk-1.2.26-1.30.110 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215979" version="1" class="patch">
	<metadata>
		<title>apache2-mod_perl-2.0.4-40.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-1349" ref_url="https://www.suse.com/security/cve/CVE-2007-1349/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_perl-2.0.4-40.19 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1349/">CVE-2007-1349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1349">CVE-2007-1349 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988338" comment="apache2-mod_perl-2.0.4-40.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215980" version="1" class="patch">
	<metadata>
		<title>apache2-mod_php53-5.3.17-0.13.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-7243" ref_url="https://www.suse.com/security/cve/CVE-2006-7243/" source="CVE"/>
		<reference ref_id="CVE-2007-4783" ref_url="https://www.suse.com/security/cve/CVE-2007-4783/" source="CVE"/>
		<reference ref_id="CVE-2007-4840" ref_url="https://www.suse.com/security/cve/CVE-2007-4840/" source="CVE"/>
		<reference ref_id="CVE-2007-4887" ref_url="https://www.suse.com/security/cve/CVE-2007-4887/" source="CVE"/>
		<reference ref_id="CVE-2008-0599" ref_url="https://www.suse.com/security/cve/CVE-2008-0599/" source="CVE"/>
		<reference ref_id="CVE-2010-2225" ref_url="https://www.suse.com/security/cve/CVE-2010-2225/" source="CVE"/>
		<reference ref_id="CVE-2010-2950" ref_url="https://www.suse.com/security/cve/CVE-2010-2950/" source="CVE"/>
		<reference ref_id="CVE-2010-3436" ref_url="https://www.suse.com/security/cve/CVE-2010-3436/" source="CVE"/>
		<reference ref_id="CVE-2010-3709" ref_url="https://www.suse.com/security/cve/CVE-2010-3709/" source="CVE"/>
		<reference ref_id="CVE-2010-3710" ref_url="https://www.suse.com/security/cve/CVE-2010-3710/" source="CVE"/>
		<reference ref_id="CVE-2010-4150" ref_url="https://www.suse.com/security/cve/CVE-2010-4150/" source="CVE"/>
		<reference ref_id="CVE-2010-4645" ref_url="https://www.suse.com/security/cve/CVE-2010-4645/" source="CVE"/>
		<reference ref_id="CVE-2011-0420" ref_url="https://www.suse.com/security/cve/CVE-2011-0420/" source="CVE"/>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<reference ref_id="CVE-2011-0708" ref_url="https://www.suse.com/security/cve/CVE-2011-0708/" source="CVE"/>
		<reference ref_id="CVE-2011-1092" ref_url="https://www.suse.com/security/cve/CVE-2011-1092/" source="CVE"/>
		<reference ref_id="CVE-2011-1153" ref_url="https://www.suse.com/security/cve/CVE-2011-1153/" source="CVE"/>
		<reference ref_id="CVE-2011-1398" ref_url="https://www.suse.com/security/cve/CVE-2011-1398/" source="CVE"/>
		<reference ref_id="CVE-2011-1466" ref_url="https://www.suse.com/security/cve/CVE-2011-1466/" source="CVE"/>
		<reference ref_id="CVE-2011-2202" ref_url="https://www.suse.com/security/cve/CVE-2011-2202/" source="CVE"/>
		<reference ref_id="CVE-2011-3379" ref_url="https://www.suse.com/security/cve/CVE-2011-3379/" source="CVE"/>
		<reference ref_id="CVE-2011-4153" ref_url="https://www.suse.com/security/cve/CVE-2011-4153/" source="CVE"/>
		<reference ref_id="CVE-2011-4388" ref_url="https://www.suse.com/security/cve/CVE-2011-4388/" source="CVE"/>
		<reference ref_id="CVE-2011-4566" ref_url="https://www.suse.com/security/cve/CVE-2011-4566/" source="CVE"/>
		<reference ref_id="CVE-2011-4885" ref_url="https://www.suse.com/security/cve/CVE-2011-4885/" source="CVE"/>
		<reference ref_id="CVE-2012-0057" ref_url="https://www.suse.com/security/cve/CVE-2012-0057/" source="CVE"/>
		<reference ref_id="CVE-2012-0781" ref_url="https://www.suse.com/security/cve/CVE-2012-0781/" source="CVE"/>
		<reference ref_id="CVE-2012-0788" ref_url="https://www.suse.com/security/cve/CVE-2012-0788/" source="CVE"/>
		<reference ref_id="CVE-2012-0789" ref_url="https://www.suse.com/security/cve/CVE-2012-0789/" source="CVE"/>
		<reference ref_id="CVE-2012-0807" ref_url="https://www.suse.com/security/cve/CVE-2012-0807/" source="CVE"/>
		<reference ref_id="CVE-2012-0830" ref_url="https://www.suse.com/security/cve/CVE-2012-0830/" source="CVE"/>
		<reference ref_id="CVE-2012-0831" ref_url="https://www.suse.com/security/cve/CVE-2012-0831/" source="CVE"/>
		<reference ref_id="CVE-2012-1172" ref_url="https://www.suse.com/security/cve/CVE-2012-1172/" source="CVE"/>
		<reference ref_id="CVE-2012-1823" ref_url="https://www.suse.com/security/cve/CVE-2012-1823/" source="CVE"/>
		<reference ref_id="CVE-2012-2143" ref_url="https://www.suse.com/security/cve/CVE-2012-2143/" source="CVE"/>
		<reference ref_id="CVE-2012-2311" ref_url="https://www.suse.com/security/cve/CVE-2012-2311/" source="CVE"/>
		<reference ref_id="CVE-2012-2335" ref_url="https://www.suse.com/security/cve/CVE-2012-2335/" source="CVE"/>
		<reference ref_id="CVE-2012-2336" ref_url="https://www.suse.com/security/cve/CVE-2012-2336/" source="CVE"/>
		<reference ref_id="CVE-2012-2386" ref_url="https://www.suse.com/security/cve/CVE-2012-2386/" source="CVE"/>
		<reference ref_id="CVE-2012-2688" ref_url="https://www.suse.com/security/cve/CVE-2012-2688/" source="CVE"/>
		<reference ref_id="CVE-2012-3365" ref_url="https://www.suse.com/security/cve/CVE-2012-3365/" source="CVE"/>
		<reference ref_id="CVE-2013-1635" ref_url="https://www.suse.com/security/cve/CVE-2013-1635/" source="CVE"/>
		<reference ref_id="CVE-2013-1643" ref_url="https://www.suse.com/security/cve/CVE-2013-1643/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_php53-5.3.17-0.13.7 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-7243/">CVE-2006-7243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-7243">CVE-2006-7243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4783/">CVE-2007-4783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4783">CVE-2007-4783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4840/">CVE-2007-4840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4840">CVE-2007-4840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4887/">CVE-2007-4887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4887">CVE-2007-4887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0599/">CVE-2008-0599 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2008-0599">CVE-2008-0599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2225/">CVE-2010-2225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2225">CVE-2010-2225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2950/">CVE-2010-2950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2950">CVE-2010-2950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3436/">CVE-2010-3436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3436">CVE-2010-3436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3709/">CVE-2010-3709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3709">CVE-2010-3709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3710/">CVE-2010-3710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3710">CVE-2010-3710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4150/">CVE-2010-4150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4150">CVE-2010-4150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4645/">CVE-2010-4645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4645">CVE-2010-4645 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0420/">CVE-2011-0420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0420">CVE-2011-0420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0421">CVE-2011-0421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0708/">CVE-2011-0708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0708">CVE-2011-0708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1092/">CVE-2011-1092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1092">CVE-2011-1092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1153/">CVE-2011-1153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1153">CVE-2011-1153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1398/">CVE-2011-1398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1398">CVE-2011-1398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1466/">CVE-2011-1466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1466">CVE-2011-1466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2202/">CVE-2011-2202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2202">CVE-2011-2202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3379/">CVE-2011-3379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3379">CVE-2011-3379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4153/">CVE-2011-4153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4153">CVE-2011-4153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4388/">CVE-2011-4388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4388">CVE-2011-4388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4566/">CVE-2011-4566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4566">CVE-2011-4566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4885/">CVE-2011-4885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4885">CVE-2011-4885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0057/">CVE-2012-0057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0057">CVE-2012-0057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0781/">CVE-2012-0781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0781">CVE-2012-0781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0788/">CVE-2012-0788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0788">CVE-2012-0788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0789/">CVE-2012-0789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0789">CVE-2012-0789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0807/">CVE-2012-0807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0807">CVE-2012-0807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0830/">CVE-2012-0830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0830">CVE-2012-0830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0831/">CVE-2012-0831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0831">CVE-2012-0831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1172/">CVE-2012-1172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1172">CVE-2012-1172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1823/">CVE-2012-1823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1823">CVE-2012-1823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2143/">CVE-2012-2143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2143">CVE-2012-2143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2311/">CVE-2012-2311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2311">CVE-2012-2311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2335/">CVE-2012-2335 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2335">CVE-2012-2335 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2336/">CVE-2012-2336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2336">CVE-2012-2336 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2386/">CVE-2012-2386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2386">CVE-2012-2386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2688/">CVE-2012-2688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2688">CVE-2012-2688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3365/">CVE-2012-3365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3365">CVE-2012-3365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1635/">CVE-2013-1635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1635">CVE-2013-1635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1643/">CVE-2013-1643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1643">CVE-2013-1643 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989527" comment="apache2-mod_php53-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989528" comment="php53-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989529" comment="php53-bcmath-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989530" comment="php53-bz2-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989531" comment="php53-calendar-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989532" comment="php53-ctype-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989533" comment="php53-curl-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989534" comment="php53-dba-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989535" comment="php53-dom-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989536" comment="php53-exif-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989537" comment="php53-fastcgi-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989538" comment="php53-fileinfo-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989539" comment="php53-ftp-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989540" comment="php53-gd-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989541" comment="php53-gettext-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989542" comment="php53-gmp-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989543" comment="php53-iconv-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989544" comment="php53-intl-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989545" comment="php53-json-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989546" comment="php53-ldap-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989547" comment="php53-mbstring-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989548" comment="php53-mcrypt-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989549" comment="php53-mysql-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989550" comment="php53-odbc-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989551" comment="php53-openssl-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989552" comment="php53-pcntl-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989553" comment="php53-pdo-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989554" comment="php53-pear-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989555" comment="php53-pgsql-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989556" comment="php53-pspell-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989557" comment="php53-shmop-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989558" comment="php53-snmp-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989559" comment="php53-soap-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989560" comment="php53-suhosin-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989561" comment="php53-sysvmsg-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989562" comment="php53-sysvsem-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989563" comment="php53-sysvshm-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989564" comment="php53-tokenizer-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989565" comment="php53-wddx-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989566" comment="php53-xmlreader-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989567" comment="php53-xmlrpc-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989568" comment="php53-xmlwriter-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989569" comment="php53-xsl-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989570" comment="php53-zip-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989571" comment="php53-zlib-5.3.17-0.13.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215981" version="1" class="patch">
	<metadata>
		<title>apache2-mod_security2-2.7.1-0.2.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-5031" ref_url="https://www.suse.com/security/cve/CVE-2009-5031/" source="CVE"/>
		<reference ref_id="CVE-2012-2751" ref_url="https://www.suse.com/security/cve/CVE-2012-2751/" source="CVE"/>
		<reference ref_id="CVE-2012-4528" ref_url="https://www.suse.com/security/cve/CVE-2012-4528/" source="CVE"/>
		<reference ref_id="CVE-2013-1915" ref_url="https://www.suse.com/security/cve/CVE-2013-1915/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_security2-2.7.1-0.2.12.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5031/">CVE-2009-5031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5031">CVE-2009-5031 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2751/">CVE-2012-2751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2751">CVE-2012-2751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4528/">CVE-2012-4528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4528">CVE-2012-4528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1915/">CVE-2013-1915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1915">CVE-2013-1915 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989572" comment="apache2-mod_security2-2.7.1-0.2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215982" version="1" class="patch">
	<metadata>
		<title>ark-4.3.5-0.3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2725" ref_url="https://www.suse.com/security/cve/CVE-2011-2725/" source="CVE"/>
		<description>
These are all security issues fixed in the ark-4.3.5-0.3.3 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2725/">CVE-2011-2725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2725">CVE-2011-2725 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989573" comment="ark-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989574" comment="kcalc-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989575" comment="kcharselect-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989576" comment="kdessh-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989577" comment="kdf-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989578" comment="kfloppy-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989579" comment="kgpg-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989580" comment="ktimer-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989581" comment="kwalletmanager-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989582" comment="kwikdisk-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989583" comment="okteta-4.3.5-0.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215983" version="1" class="patch">
	<metadata>
		<title>avahi-0.6.23-11.30.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-5461" ref_url="https://www.suse.com/security/cve/CVE-2006-5461/" source="CVE"/>
		<reference ref_id="CVE-2006-6870" ref_url="https://www.suse.com/security/cve/CVE-2006-6870/" source="CVE"/>
		<reference ref_id="CVE-2007-3372" ref_url="https://www.suse.com/security/cve/CVE-2007-3372/" source="CVE"/>
		<reference ref_id="CVE-2008-5081" ref_url="https://www.suse.com/security/cve/CVE-2008-5081/" source="CVE"/>
		<reference ref_id="CVE-2009-0758" ref_url="https://www.suse.com/security/cve/CVE-2009-0758/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-0.6.23-11.30.4 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5461/">CVE-2006-5461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5461">CVE-2006-5461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6870/">CVE-2006-6870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6870">CVE-2006-6870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3372/">CVE-2007-3372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3372">CVE-2007-3372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5081/">CVE-2008-5081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5081">CVE-2008-5081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0758/">CVE-2009-0758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0758">CVE-2009-0758 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989584" comment="avahi-0.6.23-11.30.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989585" comment="avahi-lang-0.6.23-11.30.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989586" comment="avahi-utils-0.6.23-11.30.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989587" comment="libavahi-client3-0.6.23-11.30.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989588" comment="libavahi-client3-32bit-0.6.23-11.30.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989589" comment="libavahi-client3-x86-0.6.23-11.30.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989590" comment="libavahi-common3-0.6.23-11.30.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989591" comment="libavahi-common3-32bit-0.6.23-11.30.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989592" comment="libavahi-common3-x86-0.6.23-11.30.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989593" comment="libavahi-core5-0.6.23-11.30.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989594" comment="libdns_sd-0.6.23-11.30.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989595" comment="libdns_sd-32bit-0.6.23-11.30.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989596" comment="libdns_sd-x86-0.6.23-11.30.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215984" version="1" class="patch">
	<metadata>
		<title>bind-9.6ESVR7P4-0.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2007-2925" ref_url="https://www.suse.com/security/cve/CVE-2007-2925/" source="CVE"/>
		<reference ref_id="CVE-2007-2926" ref_url="https://www.suse.com/security/cve/CVE-2007-2926/" source="CVE"/>
		<reference ref_id="CVE-2009-0696" ref_url="https://www.suse.com/security/cve/CVE-2009-0696/" source="CVE"/>
		<reference ref_id="CVE-2009-4022" ref_url="https://www.suse.com/security/cve/CVE-2009-4022/" source="CVE"/>
		<reference ref_id="CVE-2011-1910" ref_url="https://www.suse.com/security/cve/CVE-2011-1910/" source="CVE"/>
		<reference ref_id="CVE-2011-2464" ref_url="https://www.suse.com/security/cve/CVE-2011-2464/" source="CVE"/>
		<reference ref_id="CVE-2011-4313" ref_url="https://www.suse.com/security/cve/CVE-2011-4313/" source="CVE"/>
		<reference ref_id="CVE-2012-1667" ref_url="https://www.suse.com/security/cve/CVE-2012-1667/" source="CVE"/>
		<reference ref_id="CVE-2012-3817" ref_url="https://www.suse.com/security/cve/CVE-2012-3817/" source="CVE"/>
		<reference ref_id="CVE-2012-4244" ref_url="https://www.suse.com/security/cve/CVE-2012-4244/" source="CVE"/>
		<reference ref_id="CVE-2012-5166" ref_url="https://www.suse.com/security/cve/CVE-2012-5166/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.6ESVR7P4-0.10.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4339">CVE-2006-4339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2925/">CVE-2007-2925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2925">CVE-2007-2925 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2926/">CVE-2007-2926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2926">CVE-2007-2926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0696/">CVE-2009-0696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0696">CVE-2009-0696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4022/">CVE-2009-4022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4022">CVE-2009-4022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1910/">CVE-2011-1910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1910">CVE-2011-1910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2464/">CVE-2011-2464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2464">CVE-2011-2464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4313/">CVE-2011-4313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4313">CVE-2011-4313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1667/">CVE-2012-1667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1667">CVE-2012-1667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3817/">CVE-2012-3817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3817">CVE-2012-3817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4244/">CVE-2012-4244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4244">CVE-2012-4244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5166/">CVE-2012-5166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5166">CVE-2012-5166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989597" comment="bind-9.6ESVR7P4-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989598" comment="bind-chrootenv-9.6ESVR7P4-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989599" comment="bind-doc-9.6ESVR7P4-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989600" comment="bind-libs-9.6ESVR7P4-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989601" comment="bind-libs-32bit-9.6ESVR7P4-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989602" comment="bind-libs-x86-9.6ESVR7P4-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989603" comment="bind-utils-9.6ESVR7P4-0.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215985" version="1" class="patch">
	<metadata>
		<title>boost-license-1.36.0-12.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-0171" ref_url="https://www.suse.com/security/cve/CVE-2008-0171/" source="CVE"/>
		<description>
These are all security issues fixed in the boost-license-1.36.0-12.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0171/">CVE-2008-0171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0171">CVE-2008-0171 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989604" comment="boost-license-1.36.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989605" comment="libboost_program_options1_36_0-1.36.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989606" comment="libboost_regex1_36_0-1.36.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989607" comment="libboost_signals1_36_0-1.36.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989608" comment="libboost_thread1_36_0-1.36.0-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215986" version="1" class="patch">
	<metadata>
		<title>bzip2-1.0.5-34.253.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-1372" ref_url="https://www.suse.com/security/cve/CVE-2008-1372/" source="CVE"/>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<description>
These are all security issues fixed in the bzip2-1.0.5-34.253.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1372/">CVE-2008-1372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1372">CVE-2008-1372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0405">CVE-2010-0405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989006" comment="bzip2-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989007" comment="bzip2-doc-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989008" comment="libbz2-1-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989009" comment="libbz2-1-32bit-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989010" comment="libbz2-1-x86-1.0.5-34.253.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215987" version="1" class="patch">
	<metadata>
		<title>cifs-utils-5.1-0.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-3403" ref_url="https://www.suse.com/security/cve/CVE-2006-3403/" source="CVE"/>
		<reference ref_id="CVE-2007-0452" ref_url="https://www.suse.com/security/cve/CVE-2007-0452/" source="CVE"/>
		<reference ref_id="CVE-2007-2444" ref_url="https://www.suse.com/security/cve/CVE-2007-2444/" source="CVE"/>
		<reference ref_id="CVE-2007-2446" ref_url="https://www.suse.com/security/cve/CVE-2007-2446/" source="CVE"/>
		<reference ref_id="CVE-2007-2447" ref_url="https://www.suse.com/security/cve/CVE-2007-2447/" source="CVE"/>
		<reference ref_id="CVE-2007-4138" ref_url="https://www.suse.com/security/cve/CVE-2007-4138/" source="CVE"/>
		<reference ref_id="CVE-2007-4572" ref_url="https://www.suse.com/security/cve/CVE-2007-4572/" source="CVE"/>
		<reference ref_id="CVE-2007-5398" ref_url="https://www.suse.com/security/cve/CVE-2007-5398/" source="CVE"/>
		<reference ref_id="CVE-2007-6015" ref_url="https://www.suse.com/security/cve/CVE-2007-6015/" source="CVE"/>
		<reference ref_id="CVE-2008-1105" ref_url="https://www.suse.com/security/cve/CVE-2008-1105/" source="CVE"/>
		<reference ref_id="CVE-2008-3789" ref_url="https://www.suse.com/security/cve/CVE-2008-3789/" source="CVE"/>
		<reference ref_id="CVE-2008-4314" ref_url="https://www.suse.com/security/cve/CVE-2008-4314/" source="CVE"/>
		<reference ref_id="CVE-2009-0022" ref_url="https://www.suse.com/security/cve/CVE-2009-0022/" source="CVE"/>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2011-1678" ref_url="https://www.suse.com/security/cve/CVE-2011-1678/" source="CVE"/>
		<reference ref_id="CVE-2012-1586" ref_url="https://www.suse.com/security/cve/CVE-2012-1586/" source="CVE"/>
		<description>
These are all security issues fixed in the cifs-utils-5.1-0.11.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3403/">CVE-2006-3403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3403">CVE-2006-3403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0452/">CVE-2007-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0452">CVE-2007-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2444/">CVE-2007-2444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2444">CVE-2007-2444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2446/">CVE-2007-2446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2446">CVE-2007-2446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2447/">CVE-2007-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2447">CVE-2007-2447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4138/">CVE-2007-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4138">CVE-2007-4138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4572/">CVE-2007-4572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4572">CVE-2007-4572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5398/">CVE-2007-5398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5398">CVE-2007-5398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6015/">CVE-2007-6015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6015">CVE-2007-6015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1105/">CVE-2008-1105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1105">CVE-2008-1105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3789/">CVE-2008-3789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3789">CVE-2008-3789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4314/">CVE-2008-4314 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4314">CVE-2008-4314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0022/">CVE-2009-0022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0022">CVE-2009-0022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1886">CVE-2009-1886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1888">CVE-2009-1888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2813">CVE-2009-2813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2906">CVE-2009-2906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2948">CVE-2009-2948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0547">CVE-2010-0547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0728">CVE-2010-0728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0787">CVE-2010-0787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1678/">CVE-2011-1678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1678">CVE-2011-1678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1586/">CVE-2012-1586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1586">CVE-2012-1586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989609" comment="cifs-utils-5.1-0.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215988" version="1" class="patch">
	<metadata>
		<title>clamav-0.97.7-0.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-4182" ref_url="https://www.suse.com/security/cve/CVE-2006-4182/" source="CVE"/>
		<reference ref_id="CVE-2006-5295" ref_url="https://www.suse.com/security/cve/CVE-2006-5295/" source="CVE"/>
		<reference ref_id="CVE-2006-5874" ref_url="https://www.suse.com/security/cve/CVE-2006-5874/" source="CVE"/>
		<reference ref_id="CVE-2007-0897" ref_url="https://www.suse.com/security/cve/CVE-2007-0897/" source="CVE"/>
		<reference ref_id="CVE-2007-0898" ref_url="https://www.suse.com/security/cve/CVE-2007-0898/" source="CVE"/>
		<reference ref_id="CVE-2007-1745" ref_url="https://www.suse.com/security/cve/CVE-2007-1745/" source="CVE"/>
		<reference ref_id="CVE-2007-1997" ref_url="https://www.suse.com/security/cve/CVE-2007-1997/" source="CVE"/>
		<reference ref_id="CVE-2007-6335" ref_url="https://www.suse.com/security/cve/CVE-2007-6335/" source="CVE"/>
		<reference ref_id="CVE-2007-6336" ref_url="https://www.suse.com/security/cve/CVE-2007-6336/" source="CVE"/>
		<reference ref_id="CVE-2007-6337" ref_url="https://www.suse.com/security/cve/CVE-2007-6337/" source="CVE"/>
		<reference ref_id="CVE-2007-6595" ref_url="https://www.suse.com/security/cve/CVE-2007-6595/" source="CVE"/>
		<reference ref_id="CVE-2007-6596" ref_url="https://www.suse.com/security/cve/CVE-2007-6596/" source="CVE"/>
		<reference ref_id="CVE-2008-0318" ref_url="https://www.suse.com/security/cve/CVE-2008-0318/" source="CVE"/>
		<reference ref_id="CVE-2008-0728" ref_url="https://www.suse.com/security/cve/CVE-2008-0728/" source="CVE"/>
		<reference ref_id="CVE-2008-1100" ref_url="https://www.suse.com/security/cve/CVE-2008-1100/" source="CVE"/>
		<reference ref_id="CVE-2008-2713" ref_url="https://www.suse.com/security/cve/CVE-2008-2713/" source="CVE"/>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<reference ref_id="CVE-2011-2721" ref_url="https://www.suse.com/security/cve/CVE-2011-2721/" source="CVE"/>
		<reference ref_id="CVE-2011-3627" ref_url="https://www.suse.com/security/cve/CVE-2011-3627/" source="CVE"/>
		<reference ref_id="CVE-2012-1457" ref_url="https://www.suse.com/security/cve/CVE-2012-1457/" source="CVE"/>
		<reference ref_id="CVE-2012-1458" ref_url="https://www.suse.com/security/cve/CVE-2012-1458/" source="CVE"/>
		<reference ref_id="CVE-2012-1459" ref_url="https://www.suse.com/security/cve/CVE-2012-1459/" source="CVE"/>
		<description>
These are all security issues fixed in the clamav-0.97.7-0.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4182/">CVE-2006-4182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4182">CVE-2006-4182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5295/">CVE-2006-5295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5295">CVE-2006-5295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5874/">CVE-2006-5874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5874">CVE-2006-5874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0897/">CVE-2007-0897 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2007-0897">CVE-2007-0897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0898/">CVE-2007-0898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0898">CVE-2007-0898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1745/">CVE-2007-1745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1745">CVE-2007-1745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1997/">CVE-2007-1997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1997">CVE-2007-1997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6335/">CVE-2007-6335 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6335">CVE-2007-6335 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6336/">CVE-2007-6336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6336">CVE-2007-6336 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6337/">CVE-2007-6337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6337">CVE-2007-6337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6595/">CVE-2007-6595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6595">CVE-2007-6595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6596/">CVE-2007-6596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6596">CVE-2007-6596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0318/">CVE-2008-0318 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0318">CVE-2008-0318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0728/">CVE-2008-0728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0728">CVE-2008-0728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1100/">CVE-2008-1100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1100">CVE-2008-1100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2713/">CVE-2008-2713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2713">CVE-2008-2713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0405">CVE-2010-0405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2721/">CVE-2011-2721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2721">CVE-2011-2721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3627/">CVE-2011-3627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3627">CVE-2011-3627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1457/">CVE-2012-1457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1457">CVE-2012-1457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1458/">CVE-2012-1458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1458">CVE-2012-1458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1459/">CVE-2012-1459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1459">CVE-2012-1459 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989610" comment="clamav-0.97.7-0.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215989" version="1" class="patch">
	<metadata>
		<title>compat-libldap-2_3-0-2.3.37-2.24.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-1164" ref_url="https://www.suse.com/security/cve/CVE-2012-1164/" source="CVE"/>
		<description>
These are all security issues fixed in the compat-libldap-2_3-0-2.3.37-2.24.36 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1164/">CVE-2012-1164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1164">CVE-2012-1164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989611" comment="compat-libldap-2_3-0-2.3.37-2.24.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989612" comment="libldap-2_4-2-2.4.26-0.24.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989613" comment="libldap-2_4-2-32bit-2.4.26-0.24.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989614" comment="libldap-2_4-2-x86-2.4.26-0.24.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989615" comment="openldap2-2.4.26-0.24.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989616" comment="openldap2-back-meta-2.4.26-0.24.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989617" comment="openldap2-client-2.4.26-0.24.36 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215990" version="1" class="patch">
	<metadata>
		<title>coolkey-1.1.0-22.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-4129" ref_url="https://www.suse.com/security/cve/CVE-2007-4129/" source="CVE"/>
		<description>
These are all security issues fixed in the coolkey-1.1.0-22.24 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4129/">CVE-2007-4129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4129">CVE-2007-4129 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988438" comment="coolkey-1.1.0-22.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215991" version="1" class="patch">
	<metadata>
		<title>cron-4.1-194.207.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-2607" ref_url="https://www.suse.com/security/cve/CVE-2006-2607/" source="CVE"/>
		<reference ref_id="CVE-2010-0424" ref_url="https://www.suse.com/security/cve/CVE-2010-0424/" source="CVE"/>
		<description>
These are all security issues fixed in the cron-4.1-194.207.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2607/">CVE-2006-2607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2607">CVE-2006-2607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0424/">CVE-2010-0424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0424">CVE-2010-0424 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989618" comment="cron-4.1-194.207.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215992" version="1" class="patch">
	<metadata>
		<title>cups-1.3.9-8.46.46.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-0104" ref_url="https://www.suse.com/security/cve/CVE-2007-0104/" source="CVE"/>
		<reference ref_id="CVE-2007-3387" ref_url="https://www.suse.com/security/cve/CVE-2007-3387/" source="CVE"/>
		<reference ref_id="CVE-2007-4351" ref_url="https://www.suse.com/security/cve/CVE-2007-4351/" source="CVE"/>
		<reference ref_id="CVE-2007-4352" ref_url="https://www.suse.com/security/cve/CVE-2007-4352/" source="CVE"/>
		<reference ref_id="CVE-2007-5392" ref_url="https://www.suse.com/security/cve/CVE-2007-5392/" source="CVE"/>
		<reference ref_id="CVE-2007-5393" ref_url="https://www.suse.com/security/cve/CVE-2007-5393/" source="CVE"/>
		<reference ref_id="CVE-2008-0047" ref_url="https://www.suse.com/security/cve/CVE-2008-0047/" source="CVE"/>
		<reference ref_id="CVE-2008-1373" ref_url="https://www.suse.com/security/cve/CVE-2008-1373/" source="CVE"/>
		<reference ref_id="CVE-2008-1693" ref_url="https://www.suse.com/security/cve/CVE-2008-1693/" source="CVE"/>
		<reference ref_id="CVE-2008-1722" ref_url="https://www.suse.com/security/cve/CVE-2008-1722/" source="CVE"/>
		<reference ref_id="CVE-2008-3641" ref_url="https://www.suse.com/security/cve/CVE-2008-3641/" source="CVE"/>
		<reference ref_id="CVE-2009-0163" ref_url="https://www.suse.com/security/cve/CVE-2009-0163/" source="CVE"/>
		<reference ref_id="CVE-2009-0949" ref_url="https://www.suse.com/security/cve/CVE-2009-0949/" source="CVE"/>
		<reference ref_id="CVE-2009-2820" ref_url="https://www.suse.com/security/cve/CVE-2009-2820/" source="CVE"/>
		<reference ref_id="CVE-2009-3553" ref_url="https://www.suse.com/security/cve/CVE-2009-3553/" source="CVE"/>
		<reference ref_id="CVE-2010-0302" ref_url="https://www.suse.com/security/cve/CVE-2010-0302/" source="CVE"/>
		<reference ref_id="CVE-2010-0393" ref_url="https://www.suse.com/security/cve/CVE-2010-0393/" source="CVE"/>
		<reference ref_id="CVE-2010-0540" ref_url="https://www.suse.com/security/cve/CVE-2010-0540/" source="CVE"/>
		<reference ref_id="CVE-2010-0542" ref_url="https://www.suse.com/security/cve/CVE-2010-0542/" source="CVE"/>
		<reference ref_id="CVE-2010-1748" ref_url="https://www.suse.com/security/cve/CVE-2010-1748/" source="CVE"/>
		<reference ref_id="CVE-2010-2431" ref_url="https://www.suse.com/security/cve/CVE-2010-2431/" source="CVE"/>
		<reference ref_id="CVE-2010-2432" ref_url="https://www.suse.com/security/cve/CVE-2010-2432/" source="CVE"/>
		<reference ref_id="CVE-2010-2941" ref_url="https://www.suse.com/security/cve/CVE-2010-2941/" source="CVE"/>
		<reference ref_id="CVE-2011-2896" ref_url="https://www.suse.com/security/cve/CVE-2011-2896/" source="CVE"/>
		<reference ref_id="CVE-2011-3170" ref_url="https://www.suse.com/security/cve/CVE-2011-3170/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-1.3.9-8.46.46.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0104/">CVE-2007-0104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0104">CVE-2007-0104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3387/">CVE-2007-3387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3387">CVE-2007-3387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4351/">CVE-2007-4351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4351">CVE-2007-4351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4352/">CVE-2007-4352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4352">CVE-2007-4352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5392/">CVE-2007-5392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5392">CVE-2007-5392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5393/">CVE-2007-5393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5393">CVE-2007-5393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0047/">CVE-2008-0047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0047">CVE-2008-0047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1373/">CVE-2008-1373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1373">CVE-2008-1373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1693/">CVE-2008-1693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1693">CVE-2008-1693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1722/">CVE-2008-1722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1722">CVE-2008-1722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3641/">CVE-2008-3641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3641">CVE-2008-3641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0163/">CVE-2009-0163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0163">CVE-2009-0163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0949/">CVE-2009-0949 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-0949">CVE-2009-0949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2820/">CVE-2009-2820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2820">CVE-2009-2820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3553/">CVE-2009-3553 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-3553">CVE-2009-3553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0302/">CVE-2010-0302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-0302">CVE-2010-0302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0393/">CVE-2010-0393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0393">CVE-2010-0393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0540/">CVE-2010-0540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0540">CVE-2010-0540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0542/">CVE-2010-0542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0542">CVE-2010-0542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1748/">CVE-2010-1748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1748">CVE-2010-1748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2431/">CVE-2010-2431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2431">CVE-2010-2431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2432/">CVE-2010-2432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2432">CVE-2010-2432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2941/">CVE-2010-2941 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2941">CVE-2010-2941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2896/">CVE-2011-2896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2896">CVE-2011-2896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3170/">CVE-2011-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3170">CVE-2011-3170 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989619" comment="cups-1.3.9-8.46.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989620" comment="cups-client-1.3.9-8.46.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989621" comment="cups-libs-1.3.9-8.46.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989622" comment="cups-libs-32bit-1.3.9-8.46.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989623" comment="cups-libs-x86-1.3.9-8.46.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215993" version="1" class="patch">
	<metadata>
		<title>curl-7.19.7-1.26.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0037" ref_url="https://www.suse.com/security/cve/CVE-2009-0037/" source="CVE"/>
		<reference ref_id="CVE-2009-2417" ref_url="https://www.suse.com/security/cve/CVE-2009-2417/" source="CVE"/>
		<reference ref_id="CVE-2010-4180" ref_url="https://www.suse.com/security/cve/CVE-2010-4180/" source="CVE"/>
		<reference ref_id="CVE-2011-2192" ref_url="https://www.suse.com/security/cve/CVE-2011-2192/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2013-1944" ref_url="https://www.suse.com/security/cve/CVE-2013-1944/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-7.19.7-1.26.8 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0037/">CVE-2009-0037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0037">CVE-2009-0037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2417/">CVE-2009-2417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2417">CVE-2009-2417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4180/">CVE-2010-4180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4180">CVE-2010-4180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2192/">CVE-2011-2192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2192">CVE-2011-2192 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1944/">CVE-2013-1944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1944">CVE-2013-1944 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989624" comment="curl-7.19.7-1.26.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989625" comment="libcurl4-7.19.7-1.26.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989626" comment="libcurl4-32bit-7.19.7-1.26.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989627" comment="libcurl4-x86-7.19.7-1.26.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215994" version="1" class="patch">
	<metadata>
		<title>cvs-1.12.12-144.23.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-0804" ref_url="https://www.suse.com/security/cve/CVE-2012-0804/" source="CVE"/>
		<description>
These are all security issues fixed in the cvs-1.12.12-144.23.5.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0804/">CVE-2012-0804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0804">CVE-2012-0804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989628" comment="cvs-1.12.12-144.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989629" comment="cvs-doc-1.12.12-144.23.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215995" version="1" class="patch">
	<metadata>
		<title>cyrus-imapd-2.3.11-60.65.64.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-3235" ref_url="https://www.suse.com/security/cve/CVE-2009-3235/" source="CVE"/>
		<reference ref_id="CVE-2011-3372" ref_url="https://www.suse.com/security/cve/CVE-2011-3372/" source="CVE"/>
		<description>
These are all security issues fixed in the cyrus-imapd-2.3.11-60.65.64.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3235/">CVE-2009-3235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3235">CVE-2009-3235 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3372/">CVE-2011-3372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3372">CVE-2011-3372 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989023" comment="cyrus-imapd-2.3.11-60.65.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989024" comment="perl-Cyrus-IMAP-2.3.11-60.65.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989025" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215996" version="1" class="patch">
	<metadata>
		<title>dbus-1-1.2.10-3.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-6107" ref_url="https://www.suse.com/security/cve/CVE-2006-6107/" source="CVE"/>
		<reference ref_id="CVE-2008-0595" ref_url="https://www.suse.com/security/cve/CVE-2008-0595/" source="CVE"/>
		<reference ref_id="CVE-2008-3834" ref_url="https://www.suse.com/security/cve/CVE-2008-3834/" source="CVE"/>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<reference ref_id="CVE-2009-1189" ref_url="https://www.suse.com/security/cve/CVE-2009-1189/" source="CVE"/>
		<reference ref_id="CVE-2010-4352" ref_url="https://www.suse.com/security/cve/CVE-2010-4352/" source="CVE"/>
		<reference ref_id="CVE-2012-3524" ref_url="https://www.suse.com/security/cve/CVE-2012-3524/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-1.2.10-3.27.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6107/">CVE-2006-6107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6107">CVE-2006-6107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0595/">CVE-2008-0595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0595">CVE-2008-0595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3834/">CVE-2008-3834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3834">CVE-2008-3834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4311">CVE-2008-4311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1189/">CVE-2009-1189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1189">CVE-2009-1189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4352/">CVE-2010-4352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4352">CVE-2010-4352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3524/">CVE-2012-3524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3524">CVE-2012-3524 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989630" comment="dbus-1-1.2.10-3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989631" comment="dbus-1-32bit-1.2.10-3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989632" comment="dbus-1-x11-1.2.10-3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989633" comment="dbus-1-x86-1.2.10-3.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215997" version="1" class="patch">
	<metadata>
		<title>dbus-1-glib-0.76-34.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-1172" ref_url="https://www.suse.com/security/cve/CVE-2010-1172/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-glib-0.76-34.22.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1172/">CVE-2010-1172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1172">CVE-2010-1172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989030" comment="dbus-1-glib-0.76-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989031" comment="dbus-1-glib-32bit-0.76-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989032" comment="dbus-1-glib-x86-0.76-34.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215998" version="1" class="patch">
	<metadata>
		<title>dhcp-4.2.4.P2-0.16.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0692" ref_url="https://www.suse.com/security/cve/CVE-2009-0692/" source="CVE"/>
		<reference ref_id="CVE-2009-1892" ref_url="https://www.suse.com/security/cve/CVE-2009-1892/" source="CVE"/>
		<reference ref_id="CVE-2011-0997" ref_url="https://www.suse.com/security/cve/CVE-2011-0997/" source="CVE"/>
		<reference ref_id="CVE-2011-2748" ref_url="https://www.suse.com/security/cve/CVE-2011-2748/" source="CVE"/>
		<reference ref_id="CVE-2011-2749" ref_url="https://www.suse.com/security/cve/CVE-2011-2749/" source="CVE"/>
		<reference ref_id="CVE-2011-4539" ref_url="https://www.suse.com/security/cve/CVE-2011-4539/" source="CVE"/>
		<reference ref_id="CVE-2011-4868" ref_url="https://www.suse.com/security/cve/CVE-2011-4868/" source="CVE"/>
		<reference ref_id="CVE-2012-3570" ref_url="https://www.suse.com/security/cve/CVE-2012-3570/" source="CVE"/>
		<reference ref_id="CVE-2012-3571" ref_url="https://www.suse.com/security/cve/CVE-2012-3571/" source="CVE"/>
		<reference ref_id="CVE-2012-3954" ref_url="https://www.suse.com/security/cve/CVE-2012-3954/" source="CVE"/>
		<reference ref_id="CVE-2012-3955" ref_url="https://www.suse.com/security/cve/CVE-2012-3955/" source="CVE"/>
		<reference ref_id="CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266/" source="CVE"/>
		<description>
These are all security issues fixed in the dhcp-4.2.4.P2-0.16.15 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0692/">CVE-2009-0692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0692">CVE-2009-0692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1892/">CVE-2009-1892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1892">CVE-2009-1892 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0997/">CVE-2011-0997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0997">CVE-2011-0997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2748/">CVE-2011-2748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2748">CVE-2011-2748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2749/">CVE-2011-2749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2749">CVE-2011-2749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4539/">CVE-2011-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4539">CVE-2011-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4868/">CVE-2011-4868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4868">CVE-2011-4868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3570/">CVE-2012-3570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3570">CVE-2012-3570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3571/">CVE-2012-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3571">CVE-2012-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3954/">CVE-2012-3954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3954">CVE-2012-3954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3955/">CVE-2012-3955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3955">CVE-2012-3955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2266">CVE-2013-2266 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989634" comment="dhcp-4.2.4.P2-0.16.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989635" comment="dhcp-client-4.2.4.P2-0.16.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989636" comment="dhcp-relay-4.2.4.P2-0.16.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989637" comment="dhcp-server-4.2.4.P2-0.16.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215999" version="1" class="patch">
	<metadata>
		<title>dhcpcd-3.2.3-44.30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0997" ref_url="https://www.suse.com/security/cve/CVE-2011-0997/" source="CVE"/>
		<description>
These are all security issues fixed in the dhcpcd-3.2.3-44.30.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0997/">CVE-2011-0997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0997">CVE-2011-0997 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989638" comment="dhcpcd-3.2.3-44.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989038" comment="dhcpv6-1.0.22-3.21.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216000" version="1" class="patch">
	<metadata>
		<title>e2fsprogs-1.41.9-2.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-5497" ref_url="https://www.suse.com/security/cve/CVE-2007-5497/" source="CVE"/>
		<description>
These are all security issues fixed in the e2fsprogs-1.41.9-2.9.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5497/">CVE-2007-5497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5497">CVE-2007-5497 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989639" comment="e2fsprogs-1.41.9-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989640" comment="libcom_err2-1.41.9-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989641" comment="libcom_err2-32bit-1.41.9-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989642" comment="libcom_err2-x86-1.41.9-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989643" comment="libext2fs2-1.41.9-2.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216001" version="1" class="patch">
	<metadata>
		<title>ecryptfs-utils-32bit-61-1.33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1831" ref_url="https://www.suse.com/security/cve/CVE-2011-1831/" source="CVE"/>
		<reference ref_id="CVE-2011-1832" ref_url="https://www.suse.com/security/cve/CVE-2011-1832/" source="CVE"/>
		<reference ref_id="CVE-2011-1833" ref_url="https://www.suse.com/security/cve/CVE-2011-1833/" source="CVE"/>
		<reference ref_id="CVE-2011-1834" ref_url="https://www.suse.com/security/cve/CVE-2011-1834/" source="CVE"/>
		<reference ref_id="CVE-2011-3145" ref_url="https://www.suse.com/security/cve/CVE-2011-3145/" source="CVE"/>
		<description>
These are all security issues fixed in the ecryptfs-utils-32bit-61-1.33.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1831/">CVE-2011-1831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1831">CVE-2011-1831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1832/">CVE-2011-1832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1832">CVE-2011-1832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1833/">CVE-2011-1833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1833">CVE-2011-1833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1834/">CVE-2011-1834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1834">CVE-2011-1834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3145/">CVE-2011-3145 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3145">CVE-2011-3145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989644" comment="ecryptfs-utils-61-1.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989645" comment="ecryptfs-utils-32bit-61-1.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989646" comment="ecryptfs-utils-x86-61-1.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216002" version="1" class="patch">
	<metadata>
		<title>ed-0.2-1001.30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-3916" ref_url="https://www.suse.com/security/cve/CVE-2008-3916/" source="CVE"/>
		<description>
These are all security issues fixed in the ed-0.2-1001.30.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3916/">CVE-2008-3916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3916">CVE-2008-3916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989047" comment="ed-0.2-1001.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216003" version="1" class="patch">
	<metadata>
		<title>emacs-22.3-4.36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-5795" ref_url="https://www.suse.com/security/cve/CVE-2007-5795/" source="CVE"/>
		<description>
These are all security issues fixed in the emacs-22.3-4.36.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5795/">CVE-2007-5795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5795">CVE-2007-5795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989048" comment="emacs-22.3-4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989049" comment="emacs-el-22.3-4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989050" comment="emacs-info-22.3-4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989051" comment="emacs-nox-22.3-4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989052" comment="emacs-x11-22.3-4.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216004" version="1" class="patch">
	<metadata>
		<title>enscript-1.6.4-152.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-3863" ref_url="https://www.suse.com/security/cve/CVE-2008-3863/" source="CVE"/>
		<reference ref_id="CVE-2008-4306" ref_url="https://www.suse.com/security/cve/CVE-2008-4306/" source="CVE"/>
		<description>
These are all security issues fixed in the enscript-1.6.4-152.22.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3863/">CVE-2008-3863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3863">CVE-2008-3863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4306/">CVE-2008-4306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4306">CVE-2008-4306 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989053" comment="enscript-1.6.4-152.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216005" version="1" class="patch">
	<metadata>
		<title>evince-2.28.2-0.7.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-5864" ref_url="https://www.suse.com/security/cve/CVE-2006-5864/" source="CVE"/>
		<reference ref_id="CVE-2010-2640" ref_url="https://www.suse.com/security/cve/CVE-2010-2640/" source="CVE"/>
		<reference ref_id="CVE-2010-2641" ref_url="https://www.suse.com/security/cve/CVE-2010-2641/" source="CVE"/>
		<reference ref_id="CVE-2010-2642" ref_url="https://www.suse.com/security/cve/CVE-2010-2642/" source="CVE"/>
		<reference ref_id="CVE-2010-2643" ref_url="https://www.suse.com/security/cve/CVE-2010-2643/" source="CVE"/>
		<description>
These are all security issues fixed in the evince-2.28.2-0.7.2 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5864/">CVE-2006-5864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5864">CVE-2006-5864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2640/">CVE-2010-2640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2640">CVE-2010-2640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2641/">CVE-2010-2641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2641">CVE-2010-2641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2642/">CVE-2010-2642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2642">CVE-2010-2642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2643/">CVE-2010-2643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2643">CVE-2010-2643 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989054" comment="evince-2.28.2-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989055" comment="evince-doc-2.28.2-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989056" comment="evince-lang-2.28.2-0.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216006" version="1" class="patch">
	<metadata>
		<title>evolution-data-server-2.28.2-0.29.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-3257" ref_url="https://www.suse.com/security/cve/CVE-2007-3257/" source="CVE"/>
		<description>
These are all security issues fixed in the evolution-data-server-2.28.2-0.29.24 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3257/">CVE-2007-3257 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3257">CVE-2007-3257 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989647" comment="evolution-data-server-2.28.2-0.29.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989648" comment="evolution-data-server-32bit-2.28.2-0.29.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989649" comment="evolution-data-server-lang-2.28.2-0.29.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989650" comment="evolution-data-server-x86-2.28.2-0.29.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216007" version="1" class="patch">
	<metadata>
		<title>expat-2.0.1-88.34.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-2625" ref_url="https://www.suse.com/security/cve/CVE-2009-2625/" source="CVE"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2012-1147" ref_url="https://www.suse.com/security/cve/CVE-2012-1147/" source="CVE"/>
		<reference ref_id="CVE-2012-1148" ref_url="https://www.suse.com/security/cve/CVE-2012-1148/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.0.1-88.34.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2625/">CVE-2009-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2625">CVE-2009-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3560">CVE-2009-3560 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0876">CVE-2012-0876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1147/">CVE-2012-1147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1147">CVE-2012-1147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1148/">CVE-2012-1148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1148">CVE-2012-1148 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989651" comment="expat-2.0.1-88.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989652" comment="libexpat1-2.0.1-88.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989653" comment="libexpat1-32bit-2.0.1-88.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989654" comment="libexpat1-x86-2.0.1-88.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216008" version="1" class="patch">
	<metadata>
		<title>fetchmail-6.3.8.90-13.20.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-5867" ref_url="https://www.suse.com/security/cve/CVE-2006-5867/" source="CVE"/>
		<reference ref_id="CVE-2006-5974" ref_url="https://www.suse.com/security/cve/CVE-2006-5974/" source="CVE"/>
		<reference ref_id="CVE-2007-1558" ref_url="https://www.suse.com/security/cve/CVE-2007-1558/" source="CVE"/>
		<reference ref_id="CVE-2007-4565" ref_url="https://www.suse.com/security/cve/CVE-2007-4565/" source="CVE"/>
		<reference ref_id="CVE-2009-2666" ref_url="https://www.suse.com/security/cve/CVE-2009-2666/" source="CVE"/>
		<reference ref_id="CVE-2011-1947" ref_url="https://www.suse.com/security/cve/CVE-2011-1947/" source="CVE"/>
		<description>
These are all security issues fixed in the fetchmail-6.3.8.90-13.20.19.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5867/">CVE-2006-5867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5867">CVE-2006-5867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5974/">CVE-2006-5974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5974">CVE-2006-5974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1558/">CVE-2007-1558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1558">CVE-2007-1558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4565/">CVE-2007-4565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4565">CVE-2007-4565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2666/">CVE-2009-2666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2666">CVE-2009-2666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1947/">CVE-2011-1947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1947">CVE-2011-1947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989061" comment="fetchmail-6.3.8.90-13.20.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989062" comment="fetchmailconf-6.3.8.90-13.20.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216009" version="1" class="patch">
	<metadata>
		<title>file-32bit-4.24-43.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-1536" ref_url="https://www.suse.com/security/cve/CVE-2007-1536/" source="CVE"/>
		<reference ref_id="CVE-2007-2799" ref_url="https://www.suse.com/security/cve/CVE-2007-2799/" source="CVE"/>
		<description>
These are all security issues fixed in the file-32bit-4.24-43.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1536/">CVE-2007-1536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1536">CVE-2007-1536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2799/">CVE-2007-2799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2799">CVE-2007-2799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989655" comment="file-4.24-43.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989656" comment="file-32bit-4.24-43.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989657" comment="file-x86-4.24-43.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216010" version="1" class="patch">
	<metadata>
		<title>findutils-4.4.0-38.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-2452" ref_url="https://www.suse.com/security/cve/CVE-2007-2452/" source="CVE"/>
		<description>
These are all security issues fixed in the findutils-4.4.0-38.26.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2452/">CVE-2007-2452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2452">CVE-2007-2452 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989066" comment="findutils-4.4.0-38.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989067" comment="findutils-locate-4.4.0-38.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216011" version="1" class="patch">
	<metadata>
		<title>foomatic-filters-3.0.2-269.35.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2697" ref_url="https://www.suse.com/security/cve/CVE-2011-2697/" source="CVE"/>
		<description>
These are all security issues fixed in the foomatic-filters-3.0.2-269.35.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2697/">CVE-2011-2697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2697">CVE-2011-2697 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989068" comment="foomatic-filters-3.0.2-269.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216012" version="1" class="patch">
	<metadata>
		<title>freeradius-server-2.1.1-7.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-4474" ref_url="https://www.suse.com/security/cve/CVE-2008-4474/" source="CVE"/>
		<reference ref_id="CVE-2011-4966" ref_url="https://www.suse.com/security/cve/CVE-2011-4966/" source="CVE"/>
		<description>
These are all security issues fixed in the freeradius-server-2.1.1-7.16.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4474/">CVE-2008-4474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4474">CVE-2008-4474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4966/">CVE-2011-4966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4966">CVE-2011-4966 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989658" comment="freeradius-server-2.1.1-7.16.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989659" comment="freeradius-server-dialupadmin-2.1.1-7.16.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989660" comment="freeradius-server-doc-2.1.1-7.16.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989661" comment="freeradius-server-libs-2.1.1-7.16.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989662" comment="freeradius-server-utils-2.1.1-7.16.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216013" version="1" class="patch">
	<metadata>
		<title>freetype2-2.3.7-25.32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-1351" ref_url="https://www.suse.com/security/cve/CVE-2007-1351/" source="CVE"/>
		<reference ref_id="CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946/" source="CVE"/>
		<reference ref_id="CVE-2010-2497" ref_url="https://www.suse.com/security/cve/CVE-2010-2497/" source="CVE"/>
		<reference ref_id="CVE-2010-2805" ref_url="https://www.suse.com/security/cve/CVE-2010-2805/" source="CVE"/>
		<reference ref_id="CVE-2010-3053" ref_url="https://www.suse.com/security/cve/CVE-2010-3053/" source="CVE"/>
		<reference ref_id="CVE-2010-3054" ref_url="https://www.suse.com/security/cve/CVE-2010-3054/" source="CVE"/>
		<reference ref_id="CVE-2010-3311" ref_url="https://www.suse.com/security/cve/CVE-2010-3311/" source="CVE"/>
		<reference ref_id="CVE-2010-3814" ref_url="https://www.suse.com/security/cve/CVE-2010-3814/" source="CVE"/>
		<reference ref_id="CVE-2010-3855" ref_url="https://www.suse.com/security/cve/CVE-2010-3855/" source="CVE"/>
		<reference ref_id="CVE-2011-0226" ref_url="https://www.suse.com/security/cve/CVE-2011-0226/" source="CVE"/>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<reference ref_id="CVE-2011-3256" ref_url="https://www.suse.com/security/cve/CVE-2011-3256/" source="CVE"/>
		<reference ref_id="CVE-2011-3439" ref_url="https://www.suse.com/security/cve/CVE-2011-3439/" source="CVE"/>
		<reference ref_id="CVE-2012-1126" ref_url="https://www.suse.com/security/cve/CVE-2012-1126/" source="CVE"/>
		<reference ref_id="CVE-2012-1127" ref_url="https://www.suse.com/security/cve/CVE-2012-1127/" source="CVE"/>
		<reference ref_id="CVE-2012-1128" ref_url="https://www.suse.com/security/cve/CVE-2012-1128/" source="CVE"/>
		<reference ref_id="CVE-2012-1129" ref_url="https://www.suse.com/security/cve/CVE-2012-1129/" source="CVE"/>
		<reference ref_id="CVE-2012-1130" ref_url="https://www.suse.com/security/cve/CVE-2012-1130/" source="CVE"/>
		<reference ref_id="CVE-2012-1131" ref_url="https://www.suse.com/security/cve/CVE-2012-1131/" source="CVE"/>
		<reference ref_id="CVE-2012-1132" ref_url="https://www.suse.com/security/cve/CVE-2012-1132/" source="CVE"/>
		<reference ref_id="CVE-2012-1133" ref_url="https://www.suse.com/security/cve/CVE-2012-1133/" source="CVE"/>
		<reference ref_id="CVE-2012-1134" ref_url="https://www.suse.com/security/cve/CVE-2012-1134/" source="CVE"/>
		<reference ref_id="CVE-2012-1135" ref_url="https://www.suse.com/security/cve/CVE-2012-1135/" source="CVE"/>
		<reference ref_id="CVE-2012-1136" ref_url="https://www.suse.com/security/cve/CVE-2012-1136/" source="CVE"/>
		<reference ref_id="CVE-2012-1137" ref_url="https://www.suse.com/security/cve/CVE-2012-1137/" source="CVE"/>
		<reference ref_id="CVE-2012-1138" ref_url="https://www.suse.com/security/cve/CVE-2012-1138/" source="CVE"/>
		<reference ref_id="CVE-2012-1139" ref_url="https://www.suse.com/security/cve/CVE-2012-1139/" source="CVE"/>
		<reference ref_id="CVE-2012-1140" ref_url="https://www.suse.com/security/cve/CVE-2012-1140/" source="CVE"/>
		<reference ref_id="CVE-2012-1141" ref_url="https://www.suse.com/security/cve/CVE-2012-1141/" source="CVE"/>
		<reference ref_id="CVE-2012-1142" ref_url="https://www.suse.com/security/cve/CVE-2012-1142/" source="CVE"/>
		<reference ref_id="CVE-2012-1143" ref_url="https://www.suse.com/security/cve/CVE-2012-1143/" source="CVE"/>
		<reference ref_id="CVE-2012-1144" ref_url="https://www.suse.com/security/cve/CVE-2012-1144/" source="CVE"/>
		<reference ref_id="CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668/" source="CVE"/>
		<reference ref_id="CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669/" source="CVE"/>
		<reference ref_id="CVE-2012-5670" ref_url="https://www.suse.com/security/cve/CVE-2012-5670/" source="CVE"/>
		<description>
These are all security issues fixed in the freetype2-2.3.7-25.32.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1351/">CVE-2007-1351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1351">CVE-2007-1351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0946">CVE-2009-0946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2497/">CVE-2010-2497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2497">CVE-2010-2497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2805/">CVE-2010-2805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2805">CVE-2010-2805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3053/">CVE-2010-3053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3053">CVE-2010-3053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3054/">CVE-2010-3054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3054">CVE-2010-3054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3311/">CVE-2010-3311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3311">CVE-2010-3311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3814/">CVE-2010-3814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3814">CVE-2010-3814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3855/">CVE-2010-3855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3855">CVE-2010-3855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0226/">CVE-2011-0226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0226">CVE-2011-0226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2895">CVE-2011-2895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3256/">CVE-2011-3256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3256">CVE-2011-3256 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3439/">CVE-2011-3439 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3439">CVE-2011-3439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1126/">CVE-2012-1126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1126">CVE-2012-1126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1127/">CVE-2012-1127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1127">CVE-2012-1127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1128/">CVE-2012-1128 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1128">CVE-2012-1128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1129/">CVE-2012-1129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1129">CVE-2012-1129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1130/">CVE-2012-1130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1130">CVE-2012-1130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1131/">CVE-2012-1131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1131">CVE-2012-1131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1132/">CVE-2012-1132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1132">CVE-2012-1132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1133/">CVE-2012-1133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1133">CVE-2012-1133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1134/">CVE-2012-1134 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1134">CVE-2012-1134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1135/">CVE-2012-1135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1135">CVE-2012-1135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1136/">CVE-2012-1136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1136">CVE-2012-1136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1137/">CVE-2012-1137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1137">CVE-2012-1137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1138/">CVE-2012-1138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1138">CVE-2012-1138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1139/">CVE-2012-1139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1139">CVE-2012-1139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1140/">CVE-2012-1140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1140">CVE-2012-1140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1141/">CVE-2012-1141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1141">CVE-2012-1141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1142/">CVE-2012-1142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1142">CVE-2012-1142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1143/">CVE-2012-1143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1143">CVE-2012-1143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1144/">CVE-2012-1144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1144">CVE-2012-1144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5668">CVE-2012-5668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5669">CVE-2012-5669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5670/">CVE-2012-5670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5670">CVE-2012-5670 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989663" comment="freetype2-2.3.7-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989664" comment="freetype2-32bit-2.3.7-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989665" comment="freetype2-x86-2.3.7-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989666" comment="ft2demos-2.3.7-25.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216014" version="1" class="patch">
	<metadata>
		<title>fuse-2.8.7-0.9.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-3297" ref_url="https://www.suse.com/security/cve/CVE-2009-3297/" source="CVE"/>
		<reference ref_id="CVE-2011-0541" ref_url="https://www.suse.com/security/cve/CVE-2011-0541/" source="CVE"/>
		<description>
These are all security issues fixed in the fuse-2.8.7-0.9.12 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3297/">CVE-2009-3297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3297">CVE-2009-3297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0541/">CVE-2011-0541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0541">CVE-2011-0541 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989667" comment="fuse-2.8.7-0.9.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989668" comment="libfuse2-2.8.7-0.9.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216015" version="1" class="patch">
	<metadata>
		<title>fvwm2-2.5.26-1.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-5969" ref_url="https://www.suse.com/security/cve/CVE-2006-5969/" source="CVE"/>
		<description>
These are all security issues fixed in the fvwm2-2.5.26-1.25 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5969/">CVE-2006-5969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5969">CVE-2006-5969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988500" comment="fvwm2-2.5.26-1.25 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216016" version="1" class="patch">
	<metadata>
		<title>g3utils-1.1.36-26.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-4936" ref_url="https://www.suse.com/security/cve/CVE-2008-4936/" source="CVE"/>
		<description>
These are all security issues fixed in the g3utils-1.1.36-26.31 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4936/">CVE-2008-4936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4936">CVE-2008-4936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988501" comment="g3utils-1.1.36-26.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988502" comment="mgetty-1.1.36-26.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216017" version="1" class="patch">
	<metadata>
		<title>gd-2.0.36.RC1-52.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-2756" ref_url="https://www.suse.com/security/cve/CVE-2007-2756/" source="CVE"/>
		<description>
These are all security issues fixed in the gd-2.0.36.RC1-52.18 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2756/">CVE-2007-2756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2756">CVE-2007-2756 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988503" comment="gd-2.0.36.RC1-52.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216018" version="1" class="patch">
	<metadata>
		<title>ghostscript-fonts-other-8.62-32.34.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0196" ref_url="https://www.suse.com/security/cve/CVE-2009-0196/" source="CVE"/>
		<reference ref_id="CVE-2009-0583" ref_url="https://www.suse.com/security/cve/CVE-2009-0583/" source="CVE"/>
		<reference ref_id="CVE-2009-0584" ref_url="https://www.suse.com/security/cve/CVE-2009-0584/" source="CVE"/>
		<reference ref_id="CVE-2009-0792" ref_url="https://www.suse.com/security/cve/CVE-2009-0792/" source="CVE"/>
		<reference ref_id="CVE-2009-3743" ref_url="https://www.suse.com/security/cve/CVE-2009-3743/" source="CVE"/>
		<reference ref_id="CVE-2010-1869" ref_url="https://www.suse.com/security/cve/CVE-2010-1869/" source="CVE"/>
		<reference ref_id="CVE-2010-4054" ref_url="https://www.suse.com/security/cve/CVE-2010-4054/" source="CVE"/>
		<reference ref_id="CVE-2012-4405" ref_url="https://www.suse.com/security/cve/CVE-2012-4405/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-fonts-other-8.62-32.34.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0196/">CVE-2009-0196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0196">CVE-2009-0196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0583/">CVE-2009-0583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0583">CVE-2009-0583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0584/">CVE-2009-0584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0584">CVE-2009-0584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0792/">CVE-2009-0792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0792">CVE-2009-0792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3743/">CVE-2009-3743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3743">CVE-2009-3743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1869/">CVE-2010-1869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1869">CVE-2010-1869 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4054/">CVE-2010-4054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4054">CVE-2010-4054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4405/">CVE-2012-4405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4405">CVE-2012-4405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989669" comment="ghostscript-fonts-other-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989670" comment="ghostscript-fonts-rus-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989671" comment="ghostscript-fonts-std-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989672" comment="ghostscript-library-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989673" comment="ghostscript-omni-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989674" comment="ghostscript-x11-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989675" comment="libgimpprint-4.2.7-32.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216019" version="1" class="patch">
	<metadata>
		<title>glib2-2.22.5-0.8.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-2371" ref_url="https://www.suse.com/security/cve/CVE-2008-2371/" source="CVE"/>
		<reference ref_id="CVE-2008-4316" ref_url="https://www.suse.com/security/cve/CVE-2008-4316/" source="CVE"/>
		<description>
These are all security issues fixed in the glib2-2.22.5-0.8.8.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2371/">CVE-2008-2371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2371">CVE-2008-2371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4316/">CVE-2008-4316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4316">CVE-2008-4316 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989676" comment="glib2-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989677" comment="glib2-doc-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989678" comment="glib2-lang-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989679" comment="libgio-2_0-0-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989680" comment="libgio-2_0-0-32bit-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989681" comment="libgio-2_0-0-x86-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989682" comment="libglib-2_0-0-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989683" comment="libglib-2_0-0-32bit-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989684" comment="libglib-2_0-0-x86-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989685" comment="libgmodule-2_0-0-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989686" comment="libgmodule-2_0-0-32bit-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989687" comment="libgmodule-2_0-0-x86-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989688" comment="libgobject-2_0-0-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989689" comment="libgobject-2_0-0-32bit-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989690" comment="libgobject-2_0-0-x86-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989691" comment="libgthread-2_0-0-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989692" comment="libgthread-2_0-0-32bit-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989693" comment="libgthread-2_0-0-x86-2.22.5-0.8.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216020" version="1" class="patch">
	<metadata>
		<title>glibc-2.11.3-17.54.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-5029" ref_url="https://www.suse.com/security/cve/CVE-2009-5029/" source="CVE"/>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.11.3-17.54.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5029/">CVE-2009-5029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5029">CVE-2009-5029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2483">CVE-2011-2483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989694" comment="glibc-2.11.3-17.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989695" comment="glibc-32bit-2.11.3-17.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989696" comment="glibc-devel-2.11.3-17.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989697" comment="glibc-devel-32bit-2.11.3-17.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989698" comment="glibc-html-2.11.3-17.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989699" comment="glibc-i18ndata-2.11.3-17.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989700" comment="glibc-info-2.11.3-17.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989701" comment="glibc-locale-2.11.3-17.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989702" comment="glibc-locale-32bit-2.11.3-17.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989703" comment="glibc-locale-x86-2.11.3-17.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989704" comment="glibc-profile-2.11.3-17.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989705" comment="glibc-profile-32bit-2.11.3-17.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989706" comment="glibc-profile-x86-2.11.3-17.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989707" comment="glibc-x86-2.11.3-17.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989708" comment="nscd-2.11.3-17.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216021" version="1" class="patch">
	<metadata>
		<title>gmime-2.2.23-1.50.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-0409" ref_url="https://www.suse.com/security/cve/CVE-2010-0409/" source="CVE"/>
		<description>
These are all security issues fixed in the gmime-2.2.23-1.50.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0409/">CVE-2010-0409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0409">CVE-2010-0409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989097" comment="gmime-2.2.23-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988530" comment="gmime-2_4-2.4.8-1.2.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989098" comment="gmime-doc-2.2.23-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989099" comment="libgmime-2_0-3-2.2.23-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988533" comment="libgmime-2_4-2-2.4.8-1.2.55 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216022" version="1" class="patch">
	<metadata>
		<title>gnome-screensaver-2.28.3-0.32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-0887" ref_url="https://www.suse.com/security/cve/CVE-2008-0887/" source="CVE"/>
		<reference ref_id="CVE-2010-0414" ref_url="https://www.suse.com/security/cve/CVE-2010-0414/" source="CVE"/>
		<reference ref_id="CVE-2010-0422" ref_url="https://www.suse.com/security/cve/CVE-2010-0422/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-screensaver-2.28.3-0.32.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0887/">CVE-2008-0887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0887">CVE-2008-0887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0414/">CVE-2010-0414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0414">CVE-2010-0414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0422/">CVE-2010-0422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0422">CVE-2010-0422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989709" comment="gnome-screensaver-2.28.3-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989710" comment="gnome-screensaver-lang-2.28.3-0.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216023" version="1" class="patch">
	<metadata>
		<title>gnutls-2.4.1-24.39.45.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-4790" ref_url="https://www.suse.com/security/cve/CVE-2006-4790/" source="CVE"/>
		<reference ref_id="CVE-2008-1948" ref_url="https://www.suse.com/security/cve/CVE-2008-1948/" source="CVE"/>
		<reference ref_id="CVE-2008-1949" ref_url="https://www.suse.com/security/cve/CVE-2008-1949/" source="CVE"/>
		<reference ref_id="CVE-2008-1950" ref_url="https://www.suse.com/security/cve/CVE-2008-1950/" source="CVE"/>
		<reference ref_id="CVE-2008-4989" ref_url="https://www.suse.com/security/cve/CVE-2008-4989/" source="CVE"/>
		<reference ref_id="CVE-2009-2730" ref_url="https://www.suse.com/security/cve/CVE-2009-2730/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2011-4128" ref_url="https://www.suse.com/security/cve/CVE-2011-4128/" source="CVE"/>
		<reference ref_id="CVE-2012-0390" ref_url="https://www.suse.com/security/cve/CVE-2012-0390/" source="CVE"/>
		<reference ref_id="CVE-2012-1569" ref_url="https://www.suse.com/security/cve/CVE-2012-1569/" source="CVE"/>
		<reference ref_id="CVE-2012-1573" ref_url="https://www.suse.com/security/cve/CVE-2012-1573/" source="CVE"/>
		<reference ref_id="CVE-2013-1619" ref_url="https://www.suse.com/security/cve/CVE-2013-1619/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-2.4.1-24.39.45.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4790/">CVE-2006-4790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4790">CVE-2006-4790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1948/">CVE-2008-1948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1948">CVE-2008-1948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1949/">CVE-2008-1949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1949">CVE-2008-1949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1950/">CVE-2008-1950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1950">CVE-2008-1950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4989/">CVE-2008-4989 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2008-4989">CVE-2008-4989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2730/">CVE-2009-2730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2730">CVE-2009-2730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4128/">CVE-2011-4128 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4128">CVE-2011-4128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0390/">CVE-2012-0390 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0390">CVE-2012-0390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1569/">CVE-2012-1569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1569">CVE-2012-1569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1573/">CVE-2012-1573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1573">CVE-2012-1573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1619/">CVE-2013-1619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1619">CVE-2013-1619 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989711" comment="gnutls-2.4.1-24.39.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989712" comment="libgnutls-extra26-2.4.1-24.39.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989713" comment="libgnutls26-2.4.1-24.39.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989714" comment="libgnutls26-32bit-2.4.1-24.39.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989715" comment="libgnutls26-x86-2.4.1-24.39.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216024" version="1" class="patch">
	<metadata>
		<title>gpg2-2.0.9-25.33.31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-3746" ref_url="https://www.suse.com/security/cve/CVE-2006-3746/" source="CVE"/>
		<reference ref_id="CVE-2006-6169" ref_url="https://www.suse.com/security/cve/CVE-2006-6169/" source="CVE"/>
		<reference ref_id="CVE-2008-1530" ref_url="https://www.suse.com/security/cve/CVE-2008-1530/" source="CVE"/>
		<reference ref_id="CVE-2010-2547" ref_url="https://www.suse.com/security/cve/CVE-2010-2547/" source="CVE"/>
		<description>
These are all security issues fixed in the gpg2-2.0.9-25.33.31.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3746/">CVE-2006-3746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3746">CVE-2006-3746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6169/">CVE-2006-6169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6169">CVE-2006-6169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1530/">CVE-2008-1530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1530">CVE-2008-1530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2547/">CVE-2010-2547 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2547">CVE-2010-2547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989716" comment="gpg2-2.0.9-25.33.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989717" comment="gpg2-lang-2.0.9-25.33.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216025" version="1" class="patch">
	<metadata>
		<title>gstreamer-0_10-plugins-base-0.10.35-5.15.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0586" ref_url="https://www.suse.com/security/cve/CVE-2009-0586/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-0_10-plugins-base-0.10.35-5.15.8 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0586/">CVE-2009-0586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0586">CVE-2009-0586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989108" comment="gstreamer-0_10-plugins-base-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989109" comment="gstreamer-0_10-plugins-base-32bit-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989110" comment="gstreamer-0_10-plugins-base-doc-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989111" comment="gstreamer-0_10-plugins-base-lang-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989112" comment="gstreamer-0_10-plugins-base-x86-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989113" comment="libgstapp-0_10-0-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989114" comment="libgstapp-0_10-0-32bit-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989115" comment="libgstapp-0_10-0-x86-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989116" comment="libgstinterfaces-0_10-0-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989117" comment="libgstinterfaces-0_10-0-32bit-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989118" comment="libgstinterfaces-0_10-0-x86-0.10.35-5.15.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216026" version="1" class="patch">
	<metadata>
		<title>gstreamer-0_10-plugins-good-0.10.30-5.8.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-1686" ref_url="https://www.suse.com/security/cve/CVE-2008-1686/" source="CVE"/>
		<reference ref_id="CVE-2009-0386" ref_url="https://www.suse.com/security/cve/CVE-2009-0386/" source="CVE"/>
		<reference ref_id="CVE-2009-0387" ref_url="https://www.suse.com/security/cve/CVE-2009-0387/" source="CVE"/>
		<reference ref_id="CVE-2009-0397" ref_url="https://www.suse.com/security/cve/CVE-2009-0397/" source="CVE"/>
		<reference ref_id="CVE-2009-1932" ref_url="https://www.suse.com/security/cve/CVE-2009-1932/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-0_10-plugins-good-0.10.30-5.8.11 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1686/">CVE-2008-1686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1686">CVE-2008-1686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0386/">CVE-2009-0386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0386">CVE-2009-0386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0387/">CVE-2009-0387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0387">CVE-2009-0387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0397/">CVE-2009-0397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0397">CVE-2009-0397 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1932/">CVE-2009-1932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1932">CVE-2009-1932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989119" comment="gstreamer-0_10-plugins-good-0.10.30-5.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989120" comment="gstreamer-0_10-plugins-good-doc-0.10.30-5.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989121" comment="gstreamer-0_10-plugins-good-lang-0.10.30-5.8.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216027" version="1" class="patch">
	<metadata>
		<title>gtk2-2.18.9-0.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-0010" ref_url="https://www.suse.com/security/cve/CVE-2007-0010/" source="CVE"/>
		<reference ref_id="CVE-2011-2485" ref_url="https://www.suse.com/security/cve/CVE-2011-2485/" source="CVE"/>
		<reference ref_id="CVE-2012-2370" ref_url="https://www.suse.com/security/cve/CVE-2012-2370/" source="CVE"/>
		<description>
These are all security issues fixed in the gtk2-2.18.9-0.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0010/">CVE-2007-0010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0010">CVE-2007-0010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2485/">CVE-2011-2485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2485">CVE-2011-2485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2370/">CVE-2012-2370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2370">CVE-2012-2370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989718" comment="gtk2-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989719" comment="gtk2-32bit-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989720" comment="gtk2-doc-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989721" comment="gtk2-lang-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989722" comment="gtk2-x86-2.18.9-0.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216028" version="1" class="patch">
	<metadata>
		<title>guestfs-data-1.20.4-0.14.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-2124" ref_url="https://www.suse.com/security/cve/CVE-2013-2124/" source="CVE"/>
		<description>
These are all security issues fixed in the guestfs-data-1.20.4-0.14.9 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2124/">CVE-2013-2124 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2124">CVE-2013-2124 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989723" comment="guestfs-data-1.20.4-0.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989724" comment="guestfs-tools-1.20.4-0.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989725" comment="guestfsd-1.20.4-0.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989726" comment="libguestfs0-1.20.4-0.14.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216029" version="1" class="patch">
	<metadata>
		<title>gvim-7.2-8.15.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-2438" ref_url="https://www.suse.com/security/cve/CVE-2007-2438/" source="CVE"/>
		<reference ref_id="CVE-2007-2953" ref_url="https://www.suse.com/security/cve/CVE-2007-2953/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-7.2-8.15.2 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2438/">CVE-2007-2438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2438">CVE-2007-2438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2953/">CVE-2007-2953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2953">CVE-2007-2953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989127" comment="gvim-7.2-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989128" comment="vim-7.2-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989129" comment="vim-base-7.2-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989130" comment="vim-data-7.2-8.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216030" version="1" class="patch">
	<metadata>
		<title>gzip-1.3.12-69.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-2624" ref_url="https://www.suse.com/security/cve/CVE-2009-2624/" source="CVE"/>
		<reference ref_id="CVE-2010-0001" ref_url="https://www.suse.com/security/cve/CVE-2010-0001/" source="CVE"/>
		<description>
These are all security issues fixed in the gzip-1.3.12-69.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2624/">CVE-2009-2624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2624">CVE-2009-2624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0001/">CVE-2010-0001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0001">CVE-2010-0001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989727" comment="gzip-1.3.12-69.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216031" version="1" class="patch">
	<metadata>
		<title>hplip-3.11.10-0.6.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2004-0801" ref_url="https://www.suse.com/security/cve/CVE-2004-0801/" source="CVE"/>
		<reference ref_id="CVE-2007-5208" ref_url="https://www.suse.com/security/cve/CVE-2007-5208/" source="CVE"/>
		<reference ref_id="CVE-2010-4267" ref_url="https://www.suse.com/security/cve/CVE-2010-4267/" source="CVE"/>
		<reference ref_id="CVE-2011-2697" ref_url="https://www.suse.com/security/cve/CVE-2011-2697/" source="CVE"/>
		<reference ref_id="CVE-2011-2722" ref_url="https://www.suse.com/security/cve/CVE-2011-2722/" source="CVE"/>
		<description>
These are all security issues fixed in the hplip-3.11.10-0.6.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2004-0801/">CVE-2004-0801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-0801">CVE-2004-0801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5208/">CVE-2007-5208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5208">CVE-2007-5208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4267/">CVE-2010-4267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4267">CVE-2010-4267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2697/">CVE-2011-2697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2697">CVE-2011-2697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2722/">CVE-2011-2722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2722">CVE-2011-2722 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989131" comment="hplip-3.11.10-0.6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989132" comment="hplip-hpijs-3.11.10-0.6.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216032" version="1" class="patch">
	<metadata>
		<title>hyper-v-5-0.7.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-2669" ref_url="https://www.suse.com/security/cve/CVE-2012-2669/" source="CVE"/>
		<reference ref_id="CVE-2012-5532" ref_url="https://www.suse.com/security/cve/CVE-2012-5532/" source="CVE"/>
		<description>
These are all security issues fixed in the hyper-v-5-0.7.10 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2669/">CVE-2012-2669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2669">CVE-2012-2669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5532/">CVE-2012-5532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5532">CVE-2012-5532 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989728" comment="hyper-v-5-0.7.10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216033" version="1" class="patch">
	<metadata>
		<title>ibutils-1.5.7-0.7.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-3277" ref_url="https://www.suse.com/security/cve/CVE-2008-3277/" source="CVE"/>
		<description>
These are all security issues fixed in the ibutils-1.5.7-0.7.31 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3277/">CVE-2008-3277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3277">CVE-2008-3277 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989729" comment="ibutils-1.5.7-0.7.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989730" comment="ibutils-32bit-1.5.7-0.7.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216034" version="1" class="patch">
	<metadata>
		<title>ipsec-tools-0.7.3-1.1.93 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-1841" ref_url="https://www.suse.com/security/cve/CVE-2007-1841/" source="CVE"/>
		<reference ref_id="CVE-2008-3652" ref_url="https://www.suse.com/security/cve/CVE-2008-3652/" source="CVE"/>
		<description>
These are all security issues fixed in the ipsec-tools-0.7.3-1.1.93 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1841/">CVE-2007-1841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1841">CVE-2007-1841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3652/">CVE-2008-3652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3652">CVE-2008-3652 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988568" comment="ipsec-tools-0.7.3-1.1.93 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216035" version="1" class="patch">
	<metadata>
		<title>jakarta-commons-httpclient3-3.0.1-253.36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-5783" ref_url="https://www.suse.com/security/cve/CVE-2012-5783/" source="CVE"/>
		<description>
These are all security issues fixed in the jakarta-commons-httpclient3-3.0.1-253.36.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2012-5783/">CVE-2012-5783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5783">CVE-2012-5783 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989731" comment="jakarta-commons-httpclient3-3.0.1-253.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216036" version="1" class="patch">
	<metadata>
		<title>java-1_6_0-ibm-1.6.0_sr13.1-0.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-1187" ref_url="https://www.suse.com/security/cve/CVE-2008-1187/" source="CVE"/>
		<reference ref_id="CVE-2008-1188" ref_url="https://www.suse.com/security/cve/CVE-2008-1188/" source="CVE"/>
		<reference ref_id="CVE-2008-1189" ref_url="https://www.suse.com/security/cve/CVE-2008-1189/" source="CVE"/>
		<reference ref_id="CVE-2008-1190" ref_url="https://www.suse.com/security/cve/CVE-2008-1190/" source="CVE"/>
		<reference ref_id="CVE-2008-1191" ref_url="https://www.suse.com/security/cve/CVE-2008-1191/" source="CVE"/>
		<reference ref_id="CVE-2008-1192" ref_url="https://www.suse.com/security/cve/CVE-2008-1192/" source="CVE"/>
		<reference ref_id="CVE-2008-1193" ref_url="https://www.suse.com/security/cve/CVE-2008-1193/" source="CVE"/>
		<reference ref_id="CVE-2008-1194" ref_url="https://www.suse.com/security/cve/CVE-2008-1194/" source="CVE"/>
		<reference ref_id="CVE-2008-1195" ref_url="https://www.suse.com/security/cve/CVE-2008-1195/" source="CVE"/>
		<reference ref_id="CVE-2008-1196" ref_url="https://www.suse.com/security/cve/CVE-2008-1196/" source="CVE"/>
		<reference ref_id="CVE-2008-5351" ref_url="https://www.suse.com/security/cve/CVE-2008-5351/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-0771" ref_url="https://www.suse.com/security/cve/CVE-2010-0771/" source="CVE"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-3541" ref_url="https://www.suse.com/security/cve/CVE-2010-3541/" source="CVE"/>
		<reference ref_id="CVE-2010-3548" ref_url="https://www.suse.com/security/cve/CVE-2010-3548/" source="CVE"/>
		<reference ref_id="CVE-2010-3549" ref_url="https://www.suse.com/security/cve/CVE-2010-3549/" source="CVE"/>
		<reference ref_id="CVE-2010-3550" ref_url="https://www.suse.com/security/cve/CVE-2010-3550/" source="CVE"/>
		<reference ref_id="CVE-2010-3551" ref_url="https://www.suse.com/security/cve/CVE-2010-3551/" source="CVE"/>
		<reference ref_id="CVE-2010-3553" ref_url="https://www.suse.com/security/cve/CVE-2010-3553/" source="CVE"/>
		<reference ref_id="CVE-2010-3555" ref_url="https://www.suse.com/security/cve/CVE-2010-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-3556" ref_url="https://www.suse.com/security/cve/CVE-2010-3556/" source="CVE"/>
		<reference ref_id="CVE-2010-3557" ref_url="https://www.suse.com/security/cve/CVE-2010-3557/" source="CVE"/>
		<reference ref_id="CVE-2010-3558" ref_url="https://www.suse.com/security/cve/CVE-2010-3558/" source="CVE"/>
		<reference ref_id="CVE-2010-3559" ref_url="https://www.suse.com/security/cve/CVE-2010-3559/" source="CVE"/>
		<reference ref_id="CVE-2010-3560" ref_url="https://www.suse.com/security/cve/CVE-2010-3560/" source="CVE"/>
		<reference ref_id="CVE-2010-3562" ref_url="https://www.suse.com/security/cve/CVE-2010-3562/" source="CVE"/>
		<reference ref_id="CVE-2010-3563" ref_url="https://www.suse.com/security/cve/CVE-2010-3563/" source="CVE"/>
		<reference ref_id="CVE-2010-3565" ref_url="https://www.suse.com/security/cve/CVE-2010-3565/" source="CVE"/>
		<reference ref_id="CVE-2010-3566" ref_url="https://www.suse.com/security/cve/CVE-2010-3566/" source="CVE"/>
		<reference ref_id="CVE-2010-3567" ref_url="https://www.suse.com/security/cve/CVE-2010-3567/" source="CVE"/>
		<reference ref_id="CVE-2010-3568" ref_url="https://www.suse.com/security/cve/CVE-2010-3568/" source="CVE"/>
		<reference ref_id="CVE-2010-3569" ref_url="https://www.suse.com/security/cve/CVE-2010-3569/" source="CVE"/>
		<reference ref_id="CVE-2010-3571" ref_url="https://www.suse.com/security/cve/CVE-2010-3571/" source="CVE"/>
		<reference ref_id="CVE-2010-3572" ref_url="https://www.suse.com/security/cve/CVE-2010-3572/" source="CVE"/>
		<reference ref_id="CVE-2010-3573" ref_url="https://www.suse.com/security/cve/CVE-2010-3573/" source="CVE"/>
		<reference ref_id="CVE-2010-3574" ref_url="https://www.suse.com/security/cve/CVE-2010-3574/" source="CVE"/>
		<reference ref_id="CVE-2010-4476" ref_url="https://www.suse.com/security/cve/CVE-2010-4476/" source="CVE"/>
		<reference ref_id="CVE-2012-0551" ref_url="https://www.suse.com/security/cve/CVE-2012-0551/" source="CVE"/>
		<reference ref_id="CVE-2012-1531" ref_url="https://www.suse.com/security/cve/CVE-2012-1531/" source="CVE"/>
		<reference ref_id="CVE-2012-1532" ref_url="https://www.suse.com/security/cve/CVE-2012-1532/" source="CVE"/>
		<reference ref_id="CVE-2012-1533" ref_url="https://www.suse.com/security/cve/CVE-2012-1533/" source="CVE"/>
		<reference ref_id="CVE-2012-1541" ref_url="https://www.suse.com/security/cve/CVE-2012-1541/" source="CVE"/>
		<reference ref_id="CVE-2012-1713" ref_url="https://www.suse.com/security/cve/CVE-2012-1713/" source="CVE"/>
		<reference ref_id="CVE-2012-1716" ref_url="https://www.suse.com/security/cve/CVE-2012-1716/" source="CVE"/>
		<reference ref_id="CVE-2012-1717" ref_url="https://www.suse.com/security/cve/CVE-2012-1717/" source="CVE"/>
		<reference ref_id="CVE-2012-1718" ref_url="https://www.suse.com/security/cve/CVE-2012-1718/" source="CVE"/>
		<reference ref_id="CVE-2012-1719" ref_url="https://www.suse.com/security/cve/CVE-2012-1719/" source="CVE"/>
		<reference ref_id="CVE-2012-1721" ref_url="https://www.suse.com/security/cve/CVE-2012-1721/" source="CVE"/>
		<reference ref_id="CVE-2012-1722" ref_url="https://www.suse.com/security/cve/CVE-2012-1722/" source="CVE"/>
		<reference ref_id="CVE-2012-1725" ref_url="https://www.suse.com/security/cve/CVE-2012-1725/" source="CVE"/>
		<reference ref_id="CVE-2012-3143" ref_url="https://www.suse.com/security/cve/CVE-2012-3143/" source="CVE"/>
		<reference ref_id="CVE-2012-3159" ref_url="https://www.suse.com/security/cve/CVE-2012-3159/" source="CVE"/>
		<reference ref_id="CVE-2012-3213" ref_url="https://www.suse.com/security/cve/CVE-2012-3213/" source="CVE"/>
		<reference ref_id="CVE-2012-3216" ref_url="https://www.suse.com/security/cve/CVE-2012-3216/" source="CVE"/>
		<reference ref_id="CVE-2012-3342" ref_url="https://www.suse.com/security/cve/CVE-2012-3342/" source="CVE"/>
		<reference ref_id="CVE-2012-5068" ref_url="https://www.suse.com/security/cve/CVE-2012-5068/" source="CVE"/>
		<reference ref_id="CVE-2012-5069" ref_url="https://www.suse.com/security/cve/CVE-2012-5069/" source="CVE"/>
		<reference ref_id="CVE-2012-5071" ref_url="https://www.suse.com/security/cve/CVE-2012-5071/" source="CVE"/>
		<reference ref_id="CVE-2012-5072" ref_url="https://www.suse.com/security/cve/CVE-2012-5072/" source="CVE"/>
		<reference ref_id="CVE-2012-5073" ref_url="https://www.suse.com/security/cve/CVE-2012-5073/" source="CVE"/>
		<reference ref_id="CVE-2012-5075" ref_url="https://www.suse.com/security/cve/CVE-2012-5075/" source="CVE"/>
		<reference ref_id="CVE-2012-5079" ref_url="https://www.suse.com/security/cve/CVE-2012-5079/" source="CVE"/>
		<reference ref_id="CVE-2012-5081" ref_url="https://www.suse.com/security/cve/CVE-2012-5081/" source="CVE"/>
		<reference ref_id="CVE-2012-5083" ref_url="https://www.suse.com/security/cve/CVE-2012-5083/" source="CVE"/>
		<reference ref_id="CVE-2012-5084" ref_url="https://www.suse.com/security/cve/CVE-2012-5084/" source="CVE"/>
		<reference ref_id="CVE-2012-5089" ref_url="https://www.suse.com/security/cve/CVE-2012-5089/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-0351" ref_url="https://www.suse.com/security/cve/CVE-2013-0351/" source="CVE"/>
		<reference ref_id="CVE-2013-0409" ref_url="https://www.suse.com/security/cve/CVE-2013-0409/" source="CVE"/>
		<reference ref_id="CVE-2013-0419" ref_url="https://www.suse.com/security/cve/CVE-2013-0419/" source="CVE"/>
		<reference ref_id="CVE-2013-0423" ref_url="https://www.suse.com/security/cve/CVE-2013-0423/" source="CVE"/>
		<reference ref_id="CVE-2013-0424" ref_url="https://www.suse.com/security/cve/CVE-2013-0424/" source="CVE"/>
		<reference ref_id="CVE-2013-0425" ref_url="https://www.suse.com/security/cve/CVE-2013-0425/" source="CVE"/>
		<reference ref_id="CVE-2013-0426" ref_url="https://www.suse.com/security/cve/CVE-2013-0426/" source="CVE"/>
		<reference ref_id="CVE-2013-0427" ref_url="https://www.suse.com/security/cve/CVE-2013-0427/" source="CVE"/>
		<reference ref_id="CVE-2013-0428" ref_url="https://www.suse.com/security/cve/CVE-2013-0428/" source="CVE"/>
		<reference ref_id="CVE-2013-0432" ref_url="https://www.suse.com/security/cve/CVE-2013-0432/" source="CVE"/>
		<reference ref_id="CVE-2013-0433" ref_url="https://www.suse.com/security/cve/CVE-2013-0433/" source="CVE"/>
		<reference ref_id="CVE-2013-0434" ref_url="https://www.suse.com/security/cve/CVE-2013-0434/" source="CVE"/>
		<reference ref_id="CVE-2013-0435" ref_url="https://www.suse.com/security/cve/CVE-2013-0435/" source="CVE"/>
		<reference ref_id="CVE-2013-0438" ref_url="https://www.suse.com/security/cve/CVE-2013-0438/" source="CVE"/>
		<reference ref_id="CVE-2013-0440" ref_url="https://www.suse.com/security/cve/CVE-2013-0440/" source="CVE"/>
		<reference ref_id="CVE-2013-0441" ref_url="https://www.suse.com/security/cve/CVE-2013-0441/" source="CVE"/>
		<reference ref_id="CVE-2013-0442" ref_url="https://www.suse.com/security/cve/CVE-2013-0442/" source="CVE"/>
		<reference ref_id="CVE-2013-0443" ref_url="https://www.suse.com/security/cve/CVE-2013-0443/" source="CVE"/>
		<reference ref_id="CVE-2013-0445" ref_url="https://www.suse.com/security/cve/CVE-2013-0445/" source="CVE"/>
		<reference ref_id="CVE-2013-0446" ref_url="https://www.suse.com/security/cve/CVE-2013-0446/" source="CVE"/>
		<reference ref_id="CVE-2013-0450" ref_url="https://www.suse.com/security/cve/CVE-2013-0450/" source="CVE"/>
		<reference ref_id="CVE-2013-0485" ref_url="https://www.suse.com/security/cve/CVE-2013-0485/" source="CVE"/>
		<reference ref_id="CVE-2013-0809" ref_url="https://www.suse.com/security/cve/CVE-2013-0809/" source="CVE"/>
		<reference ref_id="CVE-2013-1473" ref_url="https://www.suse.com/security/cve/CVE-2013-1473/" source="CVE"/>
		<reference ref_id="CVE-2013-1476" ref_url="https://www.suse.com/security/cve/CVE-2013-1476/" source="CVE"/>
		<reference ref_id="CVE-2013-1478" ref_url="https://www.suse.com/security/cve/CVE-2013-1478/" source="CVE"/>
		<reference ref_id="CVE-2013-1480" ref_url="https://www.suse.com/security/cve/CVE-2013-1480/" source="CVE"/>
		<reference ref_id="CVE-2013-1481" ref_url="https://www.suse.com/security/cve/CVE-2013-1481/" source="CVE"/>
		<reference ref_id="CVE-2013-1486" ref_url="https://www.suse.com/security/cve/CVE-2013-1486/" source="CVE"/>
		<reference ref_id="CVE-2013-1487" ref_url="https://www.suse.com/security/cve/CVE-2013-1487/" source="CVE"/>
		<reference ref_id="CVE-2013-1493" ref_url="https://www.suse.com/security/cve/CVE-2013-1493/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_6_0-ibm-1.6.0_sr13.1-0.9.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1187/">CVE-2008-1187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1187">CVE-2008-1187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1188/">CVE-2008-1188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1188">CVE-2008-1188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1189/">CVE-2008-1189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1189">CVE-2008-1189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1190/">CVE-2008-1190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1190">CVE-2008-1190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1191/">CVE-2008-1191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1191">CVE-2008-1191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1192/">CVE-2008-1192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1192">CVE-2008-1192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1193/">CVE-2008-1193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1193">CVE-2008-1193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1194/">CVE-2008-1194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1194">CVE-2008-1194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1195/">CVE-2008-1195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1195">CVE-2008-1195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1196/">CVE-2008-1196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1196">CVE-2008-1196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5351/">CVE-2008-5351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5351">CVE-2008-5351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0771/">CVE-2010-0771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0771">CVE-2010-0771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1321">CVE-2010-1321 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3541/">CVE-2010-3541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3541">CVE-2010-3541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3548/">CVE-2010-3548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3548">CVE-2010-3548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3549/">CVE-2010-3549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3549">CVE-2010-3549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3550/">CVE-2010-3550 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3550">CVE-2010-3550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3551/">CVE-2010-3551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3551">CVE-2010-3551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3553/">CVE-2010-3553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3553">CVE-2010-3553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3555/">CVE-2010-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3555">CVE-2010-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3556/">CVE-2010-3556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3556">CVE-2010-3556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3557/">CVE-2010-3557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3557">CVE-2010-3557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3558/">CVE-2010-3558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3558">CVE-2010-3558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3559/">CVE-2010-3559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3559">CVE-2010-3559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3560/">CVE-2010-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3560">CVE-2010-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3562/">CVE-2010-3562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3562">CVE-2010-3562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3563/">CVE-2010-3563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3563">CVE-2010-3563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3565/">CVE-2010-3565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3565">CVE-2010-3565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3566/">CVE-2010-3566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3566">CVE-2010-3566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3567/">CVE-2010-3567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3567">CVE-2010-3567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3568/">CVE-2010-3568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3568">CVE-2010-3568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3569/">CVE-2010-3569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3569">CVE-2010-3569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3571/">CVE-2010-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3571">CVE-2010-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3572/">CVE-2010-3572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3572">CVE-2010-3572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3573/">CVE-2010-3573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3573">CVE-2010-3573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3574/">CVE-2010-3574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3574">CVE-2010-3574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4476/">CVE-2010-4476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4476">CVE-2010-4476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0551/">CVE-2012-0551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0551">CVE-2012-0551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1531/">CVE-2012-1531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1531">CVE-2012-1531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1532/">CVE-2012-1532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1532">CVE-2012-1532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1533/">CVE-2012-1533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1533">CVE-2012-1533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1541/">CVE-2012-1541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1541">CVE-2012-1541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1713/">CVE-2012-1713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1713">CVE-2012-1713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1716/">CVE-2012-1716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1716">CVE-2012-1716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1717/">CVE-2012-1717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1717">CVE-2012-1717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1718/">CVE-2012-1718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1718">CVE-2012-1718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1719/">CVE-2012-1719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1719">CVE-2012-1719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1721/">CVE-2012-1721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1721">CVE-2012-1721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1722/">CVE-2012-1722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1722">CVE-2012-1722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1725/">CVE-2012-1725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1725">CVE-2012-1725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3143/">CVE-2012-3143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3143">CVE-2012-3143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3159/">CVE-2012-3159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3159">CVE-2012-3159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3213/">CVE-2012-3213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3213">CVE-2012-3213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3216/">CVE-2012-3216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3216">CVE-2012-3216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3342/">CVE-2012-3342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3342">CVE-2012-3342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5068/">CVE-2012-5068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5068">CVE-2012-5068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5069/">CVE-2012-5069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5069">CVE-2012-5069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5071/">CVE-2012-5071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5071">CVE-2012-5071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5072/">CVE-2012-5072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5072">CVE-2012-5072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5073/">CVE-2012-5073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5073">CVE-2012-5073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5075/">CVE-2012-5075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5075">CVE-2012-5075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5079/">CVE-2012-5079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5079">CVE-2012-5079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5081/">CVE-2012-5081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5081">CVE-2012-5081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5083/">CVE-2012-5083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5083">CVE-2012-5083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5084/">CVE-2012-5084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5084">CVE-2012-5084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5089/">CVE-2012-5089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5089">CVE-2012-5089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0169">CVE-2013-0169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0351/">CVE-2013-0351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0351">CVE-2013-0351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0409/">CVE-2013-0409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0409">CVE-2013-0409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0419/">CVE-2013-0419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0419">CVE-2013-0419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0423/">CVE-2013-0423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0423">CVE-2013-0423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0424/">CVE-2013-0424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0424">CVE-2013-0424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0425/">CVE-2013-0425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0425">CVE-2013-0425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0426/">CVE-2013-0426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0426">CVE-2013-0426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0427/">CVE-2013-0427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0427">CVE-2013-0427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0428/">CVE-2013-0428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0428">CVE-2013-0428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0432/">CVE-2013-0432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0432">CVE-2013-0432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0433/">CVE-2013-0433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0433">CVE-2013-0433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0434/">CVE-2013-0434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0434">CVE-2013-0434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0435/">CVE-2013-0435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0435">CVE-2013-0435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0438/">CVE-2013-0438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0438">CVE-2013-0438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0440/">CVE-2013-0440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0440">CVE-2013-0440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0441/">CVE-2013-0441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0441">CVE-2013-0441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0442/">CVE-2013-0442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0442">CVE-2013-0442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0443/">CVE-2013-0443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0443">CVE-2013-0443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0445/">CVE-2013-0445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0445">CVE-2013-0445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0446/">CVE-2013-0446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0446">CVE-2013-0446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0450/">CVE-2013-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0450">CVE-2013-0450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0485/">CVE-2013-0485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0485">CVE-2013-0485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0809/">CVE-2013-0809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0809">CVE-2013-0809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1473/">CVE-2013-1473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1473">CVE-2013-1473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1476/">CVE-2013-1476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1476">CVE-2013-1476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1478/">CVE-2013-1478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1478">CVE-2013-1478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1480/">CVE-2013-1480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1480">CVE-2013-1480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1481/">CVE-2013-1481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1481">CVE-2013-1481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1486/">CVE-2013-1486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1486">CVE-2013-1486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1487/">CVE-2013-1487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1487">CVE-2013-1487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1493/">CVE-2013-1493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1493">CVE-2013-1493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989732" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989733" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989734" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989735" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989736" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216037" version="1" class="patch">
	<metadata>
		<title>java-1_7_0-ibm-1.7.0_sr4.1-0.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-0547" ref_url="https://www.suse.com/security/cve/CVE-2012-0547/" source="CVE"/>
		<reference ref_id="CVE-2012-0551" ref_url="https://www.suse.com/security/cve/CVE-2012-0551/" source="CVE"/>
		<reference ref_id="CVE-2012-1531" ref_url="https://www.suse.com/security/cve/CVE-2012-1531/" source="CVE"/>
		<reference ref_id="CVE-2012-1532" ref_url="https://www.suse.com/security/cve/CVE-2012-1532/" source="CVE"/>
		<reference ref_id="CVE-2012-1533" ref_url="https://www.suse.com/security/cve/CVE-2012-1533/" source="CVE"/>
		<reference ref_id="CVE-2012-1541" ref_url="https://www.suse.com/security/cve/CVE-2012-1541/" source="CVE"/>
		<reference ref_id="CVE-2012-1682" ref_url="https://www.suse.com/security/cve/CVE-2012-1682/" source="CVE"/>
		<reference ref_id="CVE-2012-1713" ref_url="https://www.suse.com/security/cve/CVE-2012-1713/" source="CVE"/>
		<reference ref_id="CVE-2012-1716" ref_url="https://www.suse.com/security/cve/CVE-2012-1716/" source="CVE"/>
		<reference ref_id="CVE-2012-1717" ref_url="https://www.suse.com/security/cve/CVE-2012-1717/" source="CVE"/>
		<reference ref_id="CVE-2012-1718" ref_url="https://www.suse.com/security/cve/CVE-2012-1718/" source="CVE"/>
		<reference ref_id="CVE-2012-1719" ref_url="https://www.suse.com/security/cve/CVE-2012-1719/" source="CVE"/>
		<reference ref_id="CVE-2012-1721" ref_url="https://www.suse.com/security/cve/CVE-2012-1721/" source="CVE"/>
		<reference ref_id="CVE-2012-1722" ref_url="https://www.suse.com/security/cve/CVE-2012-1722/" source="CVE"/>
		<reference ref_id="CVE-2012-1725" ref_url="https://www.suse.com/security/cve/CVE-2012-1725/" source="CVE"/>
		<reference ref_id="CVE-2012-1726" ref_url="https://www.suse.com/security/cve/CVE-2012-1726/" source="CVE"/>
		<reference ref_id="CVE-2012-3136" ref_url="https://www.suse.com/security/cve/CVE-2012-3136/" source="CVE"/>
		<reference ref_id="CVE-2012-3143" ref_url="https://www.suse.com/security/cve/CVE-2012-3143/" source="CVE"/>
		<reference ref_id="CVE-2012-3159" ref_url="https://www.suse.com/security/cve/CVE-2012-3159/" source="CVE"/>
		<reference ref_id="CVE-2012-3174" ref_url="https://www.suse.com/security/cve/CVE-2012-3174/" source="CVE"/>
		<reference ref_id="CVE-2012-3213" ref_url="https://www.suse.com/security/cve/CVE-2012-3213/" source="CVE"/>
		<reference ref_id="CVE-2012-3216" ref_url="https://www.suse.com/security/cve/CVE-2012-3216/" source="CVE"/>
		<reference ref_id="CVE-2012-3342" ref_url="https://www.suse.com/security/cve/CVE-2012-3342/" source="CVE"/>
		<reference ref_id="CVE-2012-4681" ref_url="https://www.suse.com/security/cve/CVE-2012-4681/" source="CVE"/>
		<reference ref_id="CVE-2012-5067" ref_url="https://www.suse.com/security/cve/CVE-2012-5067/" source="CVE"/>
		<reference ref_id="CVE-2012-5069" ref_url="https://www.suse.com/security/cve/CVE-2012-5069/" source="CVE"/>
		<reference ref_id="CVE-2012-5070" ref_url="https://www.suse.com/security/cve/CVE-2012-5070/" source="CVE"/>
		<reference ref_id="CVE-2012-5071" ref_url="https://www.suse.com/security/cve/CVE-2012-5071/" source="CVE"/>
		<reference ref_id="CVE-2012-5072" ref_url="https://www.suse.com/security/cve/CVE-2012-5072/" source="CVE"/>
		<reference ref_id="CVE-2012-5073" ref_url="https://www.suse.com/security/cve/CVE-2012-5073/" source="CVE"/>
		<reference ref_id="CVE-2012-5074" ref_url="https://www.suse.com/security/cve/CVE-2012-5074/" source="CVE"/>
		<reference ref_id="CVE-2012-5075" ref_url="https://www.suse.com/security/cve/CVE-2012-5075/" source="CVE"/>
		<reference ref_id="CVE-2012-5076" ref_url="https://www.suse.com/security/cve/CVE-2012-5076/" source="CVE"/>
		<reference ref_id="CVE-2012-5077" ref_url="https://www.suse.com/security/cve/CVE-2012-5077/" source="CVE"/>
		<reference ref_id="CVE-2012-5079" ref_url="https://www.suse.com/security/cve/CVE-2012-5079/" source="CVE"/>
		<reference ref_id="CVE-2012-5081" ref_url="https://www.suse.com/security/cve/CVE-2012-5081/" source="CVE"/>
		<reference ref_id="CVE-2012-5083" ref_url="https://www.suse.com/security/cve/CVE-2012-5083/" source="CVE"/>
		<reference ref_id="CVE-2012-5084" ref_url="https://www.suse.com/security/cve/CVE-2012-5084/" source="CVE"/>
		<reference ref_id="CVE-2012-5086" ref_url="https://www.suse.com/security/cve/CVE-2012-5086/" source="CVE"/>
		<reference ref_id="CVE-2012-5087" ref_url="https://www.suse.com/security/cve/CVE-2012-5087/" source="CVE"/>
		<reference ref_id="CVE-2012-5088" ref_url="https://www.suse.com/security/cve/CVE-2012-5088/" source="CVE"/>
		<reference ref_id="CVE-2012-5089" ref_url="https://www.suse.com/security/cve/CVE-2012-5089/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-0351" ref_url="https://www.suse.com/security/cve/CVE-2013-0351/" source="CVE"/>
		<reference ref_id="CVE-2013-0409" ref_url="https://www.suse.com/security/cve/CVE-2013-0409/" source="CVE"/>
		<reference ref_id="CVE-2013-0419" ref_url="https://www.suse.com/security/cve/CVE-2013-0419/" source="CVE"/>
		<reference ref_id="CVE-2013-0422" ref_url="https://www.suse.com/security/cve/CVE-2013-0422/" source="CVE"/>
		<reference ref_id="CVE-2013-0423" ref_url="https://www.suse.com/security/cve/CVE-2013-0423/" source="CVE"/>
		<reference ref_id="CVE-2013-0424" ref_url="https://www.suse.com/security/cve/CVE-2013-0424/" source="CVE"/>
		<reference ref_id="CVE-2013-0425" ref_url="https://www.suse.com/security/cve/CVE-2013-0425/" source="CVE"/>
		<reference ref_id="CVE-2013-0426" ref_url="https://www.suse.com/security/cve/CVE-2013-0426/" source="CVE"/>
		<reference ref_id="CVE-2013-0427" ref_url="https://www.suse.com/security/cve/CVE-2013-0427/" source="CVE"/>
		<reference ref_id="CVE-2013-0428" ref_url="https://www.suse.com/security/cve/CVE-2013-0428/" source="CVE"/>
		<reference ref_id="CVE-2013-0431" ref_url="https://www.suse.com/security/cve/CVE-2013-0431/" source="CVE"/>
		<reference ref_id="CVE-2013-0432" ref_url="https://www.suse.com/security/cve/CVE-2013-0432/" source="CVE"/>
		<reference ref_id="CVE-2013-0433" ref_url="https://www.suse.com/security/cve/CVE-2013-0433/" source="CVE"/>
		<reference ref_id="CVE-2013-0434" ref_url="https://www.suse.com/security/cve/CVE-2013-0434/" source="CVE"/>
		<reference ref_id="CVE-2013-0435" ref_url="https://www.suse.com/security/cve/CVE-2013-0435/" source="CVE"/>
		<reference ref_id="CVE-2013-0437" ref_url="https://www.suse.com/security/cve/CVE-2013-0437/" source="CVE"/>
		<reference ref_id="CVE-2013-0438" ref_url="https://www.suse.com/security/cve/CVE-2013-0438/" source="CVE"/>
		<reference ref_id="CVE-2013-0440" ref_url="https://www.suse.com/security/cve/CVE-2013-0440/" source="CVE"/>
		<reference ref_id="CVE-2013-0441" ref_url="https://www.suse.com/security/cve/CVE-2013-0441/" source="CVE"/>
		<reference ref_id="CVE-2013-0442" ref_url="https://www.suse.com/security/cve/CVE-2013-0442/" source="CVE"/>
		<reference ref_id="CVE-2013-0443" ref_url="https://www.suse.com/security/cve/CVE-2013-0443/" source="CVE"/>
		<reference ref_id="CVE-2013-0444" ref_url="https://www.suse.com/security/cve/CVE-2013-0444/" source="CVE"/>
		<reference ref_id="CVE-2013-0445" ref_url="https://www.suse.com/security/cve/CVE-2013-0445/" source="CVE"/>
		<reference ref_id="CVE-2013-0446" ref_url="https://www.suse.com/security/cve/CVE-2013-0446/" source="CVE"/>
		<reference ref_id="CVE-2013-0449" ref_url="https://www.suse.com/security/cve/CVE-2013-0449/" source="CVE"/>
		<reference ref_id="CVE-2013-0450" ref_url="https://www.suse.com/security/cve/CVE-2013-0450/" source="CVE"/>
		<reference ref_id="CVE-2013-0485" ref_url="https://www.suse.com/security/cve/CVE-2013-0485/" source="CVE"/>
		<reference ref_id="CVE-2013-0809" ref_url="https://www.suse.com/security/cve/CVE-2013-0809/" source="CVE"/>
		<reference ref_id="CVE-2013-1473" ref_url="https://www.suse.com/security/cve/CVE-2013-1473/" source="CVE"/>
		<reference ref_id="CVE-2013-1476" ref_url="https://www.suse.com/security/cve/CVE-2013-1476/" source="CVE"/>
		<reference ref_id="CVE-2013-1478" ref_url="https://www.suse.com/security/cve/CVE-2013-1478/" source="CVE"/>
		<reference ref_id="CVE-2013-1480" ref_url="https://www.suse.com/security/cve/CVE-2013-1480/" source="CVE"/>
		<reference ref_id="CVE-2013-1484" ref_url="https://www.suse.com/security/cve/CVE-2013-1484/" source="CVE"/>
		<reference ref_id="CVE-2013-1485" ref_url="https://www.suse.com/security/cve/CVE-2013-1485/" source="CVE"/>
		<reference ref_id="CVE-2013-1486" ref_url="https://www.suse.com/security/cve/CVE-2013-1486/" source="CVE"/>
		<reference ref_id="CVE-2013-1487" ref_url="https://www.suse.com/security/cve/CVE-2013-1487/" source="CVE"/>
		<reference ref_id="CVE-2013-1493" ref_url="https://www.suse.com/security/cve/CVE-2013-1493/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_7_0-ibm-1.7.0_sr4.1-0.5.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0547/">CVE-2012-0547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0547">CVE-2012-0547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0551/">CVE-2012-0551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0551">CVE-2012-0551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1531/">CVE-2012-1531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1531">CVE-2012-1531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1532/">CVE-2012-1532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1532">CVE-2012-1532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1533/">CVE-2012-1533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1533">CVE-2012-1533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1541/">CVE-2012-1541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1541">CVE-2012-1541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1682/">CVE-2012-1682 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1682">CVE-2012-1682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1713/">CVE-2012-1713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1713">CVE-2012-1713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1716/">CVE-2012-1716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1716">CVE-2012-1716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1717/">CVE-2012-1717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1717">CVE-2012-1717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1718/">CVE-2012-1718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1718">CVE-2012-1718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1719/">CVE-2012-1719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1719">CVE-2012-1719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1721/">CVE-2012-1721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1721">CVE-2012-1721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1722/">CVE-2012-1722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1722">CVE-2012-1722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1725/">CVE-2012-1725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1725">CVE-2012-1725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1726/">CVE-2012-1726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1726">CVE-2012-1726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3136/">CVE-2012-3136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3136">CVE-2012-3136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3143/">CVE-2012-3143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3143">CVE-2012-3143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3159/">CVE-2012-3159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3159">CVE-2012-3159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3174/">CVE-2012-3174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3174">CVE-2012-3174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3213/">CVE-2012-3213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3213">CVE-2012-3213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3216/">CVE-2012-3216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3216">CVE-2012-3216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3342/">CVE-2012-3342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3342">CVE-2012-3342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4681/">CVE-2012-4681 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4681">CVE-2012-4681 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5067/">CVE-2012-5067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5067">CVE-2012-5067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5069/">CVE-2012-5069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5069">CVE-2012-5069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5070/">CVE-2012-5070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5070">CVE-2012-5070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5071/">CVE-2012-5071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5071">CVE-2012-5071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5072/">CVE-2012-5072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5072">CVE-2012-5072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5073/">CVE-2012-5073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5073">CVE-2012-5073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5074/">CVE-2012-5074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5074">CVE-2012-5074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5075/">CVE-2012-5075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5075">CVE-2012-5075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5076/">CVE-2012-5076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5076">CVE-2012-5076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5077/">CVE-2012-5077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5077">CVE-2012-5077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5079/">CVE-2012-5079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5079">CVE-2012-5079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5081/">CVE-2012-5081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5081">CVE-2012-5081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5083/">CVE-2012-5083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5083">CVE-2012-5083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5084/">CVE-2012-5084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5084">CVE-2012-5084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5086/">CVE-2012-5086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5086">CVE-2012-5086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5087/">CVE-2012-5087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5087">CVE-2012-5087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5088/">CVE-2012-5088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5088">CVE-2012-5088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5089/">CVE-2012-5089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5089">CVE-2012-5089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0169">CVE-2013-0169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0351/">CVE-2013-0351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0351">CVE-2013-0351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0409/">CVE-2013-0409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0409">CVE-2013-0409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0419/">CVE-2013-0419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0419">CVE-2013-0419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0422/">CVE-2013-0422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0422">CVE-2013-0422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0423/">CVE-2013-0423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0423">CVE-2013-0423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0424/">CVE-2013-0424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0424">CVE-2013-0424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0425/">CVE-2013-0425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0425">CVE-2013-0425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0426/">CVE-2013-0426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0426">CVE-2013-0426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0427/">CVE-2013-0427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0427">CVE-2013-0427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0428/">CVE-2013-0428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0428">CVE-2013-0428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0431/">CVE-2013-0431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0431">CVE-2013-0431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0432/">CVE-2013-0432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0432">CVE-2013-0432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0433/">CVE-2013-0433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0433">CVE-2013-0433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0434/">CVE-2013-0434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0434">CVE-2013-0434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0435/">CVE-2013-0435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0435">CVE-2013-0435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0437/">CVE-2013-0437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0437">CVE-2013-0437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0438/">CVE-2013-0438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0438">CVE-2013-0438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0440/">CVE-2013-0440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0440">CVE-2013-0440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0441/">CVE-2013-0441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0441">CVE-2013-0441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0442/">CVE-2013-0442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0442">CVE-2013-0442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0443/">CVE-2013-0443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0443">CVE-2013-0443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0444/">CVE-2013-0444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0444">CVE-2013-0444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0445/">CVE-2013-0445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0445">CVE-2013-0445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0446/">CVE-2013-0446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0446">CVE-2013-0446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0449/">CVE-2013-0449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0449">CVE-2013-0449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0450/">CVE-2013-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0450">CVE-2013-0450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0485/">CVE-2013-0485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0485">CVE-2013-0485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0809/">CVE-2013-0809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0809">CVE-2013-0809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1473/">CVE-2013-1473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1473">CVE-2013-1473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1476/">CVE-2013-1476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1476">CVE-2013-1476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1478/">CVE-2013-1478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1478">CVE-2013-1478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1480/">CVE-2013-1480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1480">CVE-2013-1480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1484/">CVE-2013-1484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1484">CVE-2013-1484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1485/">CVE-2013-1485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1485">CVE-2013-1485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1486/">CVE-2013-1486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1486">CVE-2013-1486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1487/">CVE-2013-1487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1487">CVE-2013-1487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1493/">CVE-2013-1493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1493">CVE-2013-1493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989737" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989738" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989739" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989740" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216038" version="1" class="patch">
	<metadata>
		<title>jpeg-6b-879.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-2806" ref_url="https://www.suse.com/security/cve/CVE-2012-2806/" source="CVE"/>
		<description>
These are all security issues fixed in the jpeg-6b-879.12.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2806/">CVE-2012-2806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2806">CVE-2012-2806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989741" comment="jpeg-6b-879.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989742" comment="libjpeg-6.2.0-879.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989743" comment="libjpeg-32bit-6.2.0-879.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989744" comment="libjpeg-x86-6.2.0-879.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216039" version="1" class="patch">
	<metadata>
		<title>kbd-1.14.1-16.31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0460" ref_url="https://www.suse.com/security/cve/CVE-2011-0460/" source="CVE"/>
		<description>
These are all security issues fixed in the kbd-1.14.1-16.31.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0460/">CVE-2011-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0460">CVE-2011-0460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989141" comment="kbd-1.14.1-16.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216040" version="1" class="patch">
	<metadata>
		<title>kde4-kgreeter-plugins-4.3.5-0.12.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-0436" ref_url="https://www.suse.com/security/cve/CVE-2010-0436/" source="CVE"/>
		<description>
These are all security issues fixed in the kde4-kgreeter-plugins-4.3.5-0.12.12.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0436/">CVE-2010-0436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0436">CVE-2010-0436 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989745" comment="kde4-kgreeter-plugins-4.3.5-0.12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988578" comment="kdebase4-wallpapers-4.3.5-0.8.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989746" comment="kdebase4-workspace-4.3.5-0.12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989747" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989748" comment="kdm-4.3.5-0.12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989749" comment="kwin-4.3.5-0.12.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216041" version="1" class="patch">
	<metadata>
		<title>kdebase3-runtime-3.5.10-20.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-4569" ref_url="https://www.suse.com/security/cve/CVE-2007-4569/" source="CVE"/>
		<description>
These are all security issues fixed in the kdebase3-runtime-3.5.10-20.31 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4569/">CVE-2007-4569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4569">CVE-2007-4569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988583" comment="kdebase3-runtime-3.5.10-20.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988584" comment="kdebase3-runtime-32bit-3.5.10-20.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988585" comment="kdebase3-runtime-x86-3.5.10-20.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216042" version="1" class="patch">
	<metadata>
		<title>kdelibs3-3.5.10-23.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-3820" ref_url="https://www.suse.com/security/cve/CVE-2007-3820/" source="CVE"/>
		<reference ref_id="CVE-2007-4224" ref_url="https://www.suse.com/security/cve/CVE-2007-4224/" source="CVE"/>
		<reference ref_id="CVE-2007-4225" ref_url="https://www.suse.com/security/cve/CVE-2007-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-1671" ref_url="https://www.suse.com/security/cve/CVE-2008-1671/" source="CVE"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<description>
These are all security issues fixed in the kdelibs3-3.5.10-23.27.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3820/">CVE-2007-3820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3820">CVE-2007-3820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4224/">CVE-2007-4224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4224">CVE-2007-4224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4225/">CVE-2007-4225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4225">CVE-2007-4225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1671/">CVE-2008-1671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1671">CVE-2008-1671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0689">CVE-2009-0689 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988586" comment="kdelibs3-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988587" comment="kdelibs3-32bit-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988588" comment="kdelibs3-default-style-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988589" comment="kdelibs3-default-style-32bit-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988590" comment="kdelibs3-default-style-x86-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988591" comment="kdelibs3-x86-3.5.10-23.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216043" version="1" class="patch">
	<metadata>
		<title>kdelibs4-4.3.5-0.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2011-1168" ref_url="https://www.suse.com/security/cve/CVE-2011-1168/" source="CVE"/>
		<description>
These are all security issues fixed in the kdelibs4-4.3.5-0.10.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0689">CVE-2009-0689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1168/">CVE-2011-1168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1168">CVE-2011-1168 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989750" comment="kdelibs4-4.3.5-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989751" comment="kdelibs4-core-4.3.5-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989752" comment="kdelibs4-doc-4.3.5-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989753" comment="libkde4-4.3.5-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989754" comment="libkde4-32bit-4.3.5-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989755" comment="libkde4-x86-4.3.5-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989756" comment="libkdecore4-4.3.5-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989757" comment="libkdecore4-32bit-4.3.5-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989758" comment="libkdecore4-x86-4.3.5-0.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216044" version="1" class="patch">
	<metadata>
		<title>kdenetwork4-filesharing-4.3.5-0.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-1000" ref_url="https://www.suse.com/security/cve/CVE-2010-1000/" source="CVE"/>
		<description>
These are all security issues fixed in the kdenetwork4-filesharing-4.3.5-0.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1000/">CVE-2010-1000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1000">CVE-2010-1000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989156" comment="kdenetwork4-filesharing-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989157" comment="kget-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989158" comment="kopete-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989159" comment="krdc-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989160" comment="krfb-4.3.5-0.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216045" version="1" class="patch">
	<metadata>
		<title>kernel-default-3.0.76-0.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-0007" ref_url="https://www.suse.com/security/cve/CVE-2008-0007/" source="CVE"/>
		<reference ref_id="CVE-2008-0009" ref_url="https://www.suse.com/security/cve/CVE-2008-0009/" source="CVE"/>
		<reference ref_id="CVE-2008-0010" ref_url="https://www.suse.com/security/cve/CVE-2008-0010/" source="CVE"/>
		<reference ref_id="CVE-2008-1375" ref_url="https://www.suse.com/security/cve/CVE-2008-1375/" source="CVE"/>
		<reference ref_id="CVE-2008-1669" ref_url="https://www.suse.com/security/cve/CVE-2008-1669/" source="CVE"/>
		<reference ref_id="CVE-2008-1673" ref_url="https://www.suse.com/security/cve/CVE-2008-1673/" source="CVE"/>
		<reference ref_id="CVE-2008-1675" ref_url="https://www.suse.com/security/cve/CVE-2008-1675/" source="CVE"/>
		<reference ref_id="CVE-2008-3528" ref_url="https://www.suse.com/security/cve/CVE-2008-3528/" source="CVE"/>
		<reference ref_id="CVE-2008-3831" ref_url="https://www.suse.com/security/cve/CVE-2008-3831/" source="CVE"/>
		<reference ref_id="CVE-2008-5079" ref_url="https://www.suse.com/security/cve/CVE-2008-5079/" source="CVE"/>
		<reference ref_id="CVE-2008-5182" ref_url="https://www.suse.com/security/cve/CVE-2008-5182/" source="CVE"/>
		<reference ref_id="CVE-2008-5300" ref_url="https://www.suse.com/security/cve/CVE-2008-5300/" source="CVE"/>
		<reference ref_id="CVE-2009-0029" ref_url="https://www.suse.com/security/cve/CVE-2009-0029/" source="CVE"/>
		<reference ref_id="CVE-2009-3939" ref_url="https://www.suse.com/security/cve/CVE-2009-3939/" source="CVE"/>
		<reference ref_id="CVE-2009-4026" ref_url="https://www.suse.com/security/cve/CVE-2009-4026/" source="CVE"/>
		<reference ref_id="CVE-2009-4027" ref_url="https://www.suse.com/security/cve/CVE-2009-4027/" source="CVE"/>
		<reference ref_id="CVE-2009-4131" ref_url="https://www.suse.com/security/cve/CVE-2009-4131/" source="CVE"/>
		<reference ref_id="CVE-2009-4138" ref_url="https://www.suse.com/security/cve/CVE-2009-4138/" source="CVE"/>
		<reference ref_id="CVE-2009-4536" ref_url="https://www.suse.com/security/cve/CVE-2009-4536/" source="CVE"/>
		<reference ref_id="CVE-2009-4537" ref_url="https://www.suse.com/security/cve/CVE-2009-4537/" source="CVE"/>
		<reference ref_id="CVE-2009-4538" ref_url="https://www.suse.com/security/cve/CVE-2009-4538/" source="CVE"/>
		<reference ref_id="CVE-2010-0415" ref_url="https://www.suse.com/security/cve/CVE-2010-0415/" source="CVE"/>
		<reference ref_id="CVE-2010-0622" ref_url="https://www.suse.com/security/cve/CVE-2010-0622/" source="CVE"/>
		<reference ref_id="CVE-2010-0623" ref_url="https://www.suse.com/security/cve/CVE-2010-0623/" source="CVE"/>
		<reference ref_id="CVE-2010-1146" ref_url="https://www.suse.com/security/cve/CVE-2010-1146/" source="CVE"/>
		<reference ref_id="CVE-2010-1173" ref_url="https://www.suse.com/security/cve/CVE-2010-1173/" source="CVE"/>
		<reference ref_id="CVE-2010-1437" ref_url="https://www.suse.com/security/cve/CVE-2010-1437/" source="CVE"/>
		<reference ref_id="CVE-2010-1641" ref_url="https://www.suse.com/security/cve/CVE-2010-1641/" source="CVE"/>
		<reference ref_id="CVE-2010-2066" ref_url="https://www.suse.com/security/cve/CVE-2010-2066/" source="CVE"/>
		<reference ref_id="CVE-2010-2798" ref_url="https://www.suse.com/security/cve/CVE-2010-2798/" source="CVE"/>
		<reference ref_id="CVE-2010-2803" ref_url="https://www.suse.com/security/cve/CVE-2010-2803/" source="CVE"/>
		<reference ref_id="CVE-2010-2942" ref_url="https://www.suse.com/security/cve/CVE-2010-2942/" source="CVE"/>
		<reference ref_id="CVE-2010-2943" ref_url="https://www.suse.com/security/cve/CVE-2010-2943/" source="CVE"/>
		<reference ref_id="CVE-2010-2946" ref_url="https://www.suse.com/security/cve/CVE-2010-2946/" source="CVE"/>
		<reference ref_id="CVE-2010-2954" ref_url="https://www.suse.com/security/cve/CVE-2010-2954/" source="CVE"/>
		<reference ref_id="CVE-2010-2955" ref_url="https://www.suse.com/security/cve/CVE-2010-2955/" source="CVE"/>
		<reference ref_id="CVE-2010-2959" ref_url="https://www.suse.com/security/cve/CVE-2010-2959/" source="CVE"/>
		<reference ref_id="CVE-2010-2960" ref_url="https://www.suse.com/security/cve/CVE-2010-2960/" source="CVE"/>
		<reference ref_id="CVE-2010-2962" ref_url="https://www.suse.com/security/cve/CVE-2010-2962/" source="CVE"/>
		<reference ref_id="CVE-2010-2963" ref_url="https://www.suse.com/security/cve/CVE-2010-2963/" source="CVE"/>
		<reference ref_id="CVE-2010-3015" ref_url="https://www.suse.com/security/cve/CVE-2010-3015/" source="CVE"/>
		<reference ref_id="CVE-2010-3078" ref_url="https://www.suse.com/security/cve/CVE-2010-3078/" source="CVE"/>
		<reference ref_id="CVE-2010-3079" ref_url="https://www.suse.com/security/cve/CVE-2010-3079/" source="CVE"/>
		<reference ref_id="CVE-2010-3080" ref_url="https://www.suse.com/security/cve/CVE-2010-3080/" source="CVE"/>
		<reference ref_id="CVE-2010-3081" ref_url="https://www.suse.com/security/cve/CVE-2010-3081/" source="CVE"/>
		<reference ref_id="CVE-2010-3084" ref_url="https://www.suse.com/security/cve/CVE-2010-3084/" source="CVE"/>
		<reference ref_id="CVE-2010-3296" ref_url="https://www.suse.com/security/cve/CVE-2010-3296/" source="CVE"/>
		<reference ref_id="CVE-2010-3297" ref_url="https://www.suse.com/security/cve/CVE-2010-3297/" source="CVE"/>
		<reference ref_id="CVE-2010-3298" ref_url="https://www.suse.com/security/cve/CVE-2010-3298/" source="CVE"/>
		<reference ref_id="CVE-2010-3301" ref_url="https://www.suse.com/security/cve/CVE-2010-3301/" source="CVE"/>
		<reference ref_id="CVE-2010-3310" ref_url="https://www.suse.com/security/cve/CVE-2010-3310/" source="CVE"/>
		<reference ref_id="CVE-2010-3437" ref_url="https://www.suse.com/security/cve/CVE-2010-3437/" source="CVE"/>
		<reference ref_id="CVE-2010-3699" ref_url="https://www.suse.com/security/cve/CVE-2010-3699/" source="CVE"/>
		<reference ref_id="CVE-2010-3705" ref_url="https://www.suse.com/security/cve/CVE-2010-3705/" source="CVE"/>
		<reference ref_id="CVE-2010-3861" ref_url="https://www.suse.com/security/cve/CVE-2010-3861/" source="CVE"/>
		<reference ref_id="CVE-2010-3873" ref_url="https://www.suse.com/security/cve/CVE-2010-3873/" source="CVE"/>
		<reference ref_id="CVE-2010-3874" ref_url="https://www.suse.com/security/cve/CVE-2010-3874/" source="CVE"/>
		<reference ref_id="CVE-2010-3875" ref_url="https://www.suse.com/security/cve/CVE-2010-3875/" source="CVE"/>
		<reference ref_id="CVE-2010-3876" ref_url="https://www.suse.com/security/cve/CVE-2010-3876/" source="CVE"/>
		<reference ref_id="CVE-2010-3877" ref_url="https://www.suse.com/security/cve/CVE-2010-3877/" source="CVE"/>
		<reference ref_id="CVE-2010-3880" ref_url="https://www.suse.com/security/cve/CVE-2010-3880/" source="CVE"/>
		<reference ref_id="CVE-2010-3881" ref_url="https://www.suse.com/security/cve/CVE-2010-3881/" source="CVE"/>
		<reference ref_id="CVE-2010-4072" ref_url="https://www.suse.com/security/cve/CVE-2010-4072/" source="CVE"/>
		<reference ref_id="CVE-2010-4073" ref_url="https://www.suse.com/security/cve/CVE-2010-4073/" source="CVE"/>
		<reference ref_id="CVE-2010-4075" ref_url="https://www.suse.com/security/cve/CVE-2010-4075/" source="CVE"/>
		<reference ref_id="CVE-2010-4076" ref_url="https://www.suse.com/security/cve/CVE-2010-4076/" source="CVE"/>
		<reference ref_id="CVE-2010-4077" ref_url="https://www.suse.com/security/cve/CVE-2010-4077/" source="CVE"/>
		<reference ref_id="CVE-2010-4082" ref_url="https://www.suse.com/security/cve/CVE-2010-4082/" source="CVE"/>
		<reference ref_id="CVE-2010-4083" ref_url="https://www.suse.com/security/cve/CVE-2010-4083/" source="CVE"/>
		<reference ref_id="CVE-2010-4157" ref_url="https://www.suse.com/security/cve/CVE-2010-4157/" source="CVE"/>
		<reference ref_id="CVE-2010-4158" ref_url="https://www.suse.com/security/cve/CVE-2010-4158/" source="CVE"/>
		<reference ref_id="CVE-2010-4160" ref_url="https://www.suse.com/security/cve/CVE-2010-4160/" source="CVE"/>
		<reference ref_id="CVE-2010-4162" ref_url="https://www.suse.com/security/cve/CVE-2010-4162/" source="CVE"/>
		<reference ref_id="CVE-2010-4163" ref_url="https://www.suse.com/security/cve/CVE-2010-4163/" source="CVE"/>
		<reference ref_id="CVE-2010-4164" ref_url="https://www.suse.com/security/cve/CVE-2010-4164/" source="CVE"/>
		<reference ref_id="CVE-2010-4165" ref_url="https://www.suse.com/security/cve/CVE-2010-4165/" source="CVE"/>
		<reference ref_id="CVE-2010-4169" ref_url="https://www.suse.com/security/cve/CVE-2010-4169/" source="CVE"/>
		<reference ref_id="CVE-2010-4175" ref_url="https://www.suse.com/security/cve/CVE-2010-4175/" source="CVE"/>
		<reference ref_id="CVE-2010-4243" ref_url="https://www.suse.com/security/cve/CVE-2010-4243/" source="CVE"/>
		<reference ref_id="CVE-2010-4251" ref_url="https://www.suse.com/security/cve/CVE-2010-4251/" source="CVE"/>
		<reference ref_id="CVE-2010-4258" ref_url="https://www.suse.com/security/cve/CVE-2010-4258/" source="CVE"/>
		<reference ref_id="CVE-2010-4342" ref_url="https://www.suse.com/security/cve/CVE-2010-4342/" source="CVE"/>
		<reference ref_id="CVE-2010-4529" ref_url="https://www.suse.com/security/cve/CVE-2010-4529/" source="CVE"/>
		<reference ref_id="CVE-2010-4656" ref_url="https://www.suse.com/security/cve/CVE-2010-4656/" source="CVE"/>
		<reference ref_id="CVE-2010-4668" ref_url="https://www.suse.com/security/cve/CVE-2010-4668/" source="CVE"/>
		<reference ref_id="CVE-2011-0521" ref_url="https://www.suse.com/security/cve/CVE-2011-0521/" source="CVE"/>
		<reference ref_id="CVE-2011-0710" ref_url="https://www.suse.com/security/cve/CVE-2011-0710/" source="CVE"/>
		<reference ref_id="CVE-2011-0711" ref_url="https://www.suse.com/security/cve/CVE-2011-0711/" source="CVE"/>
		<reference ref_id="CVE-2011-0712" ref_url="https://www.suse.com/security/cve/CVE-2011-0712/" source="CVE"/>
		<reference ref_id="CVE-2011-1016" ref_url="https://www.suse.com/security/cve/CVE-2011-1016/" source="CVE"/>
		<reference ref_id="CVE-2011-1017" ref_url="https://www.suse.com/security/cve/CVE-2011-1017/" source="CVE"/>
		<reference ref_id="CVE-2011-1020" ref_url="https://www.suse.com/security/cve/CVE-2011-1020/" source="CVE"/>
		<reference ref_id="CVE-2011-1083" ref_url="https://www.suse.com/security/cve/CVE-2011-1083/" source="CVE"/>
		<reference ref_id="CVE-2011-1160" ref_url="https://www.suse.com/security/cve/CVE-2011-1160/" source="CVE"/>
		<reference ref_id="CVE-2011-1180" ref_url="https://www.suse.com/security/cve/CVE-2011-1180/" source="CVE"/>
		<reference ref_id="CVE-2011-1182" ref_url="https://www.suse.com/security/cve/CVE-2011-1182/" source="CVE"/>
		<reference ref_id="CVE-2011-1478" ref_url="https://www.suse.com/security/cve/CVE-2011-1478/" source="CVE"/>
		<reference ref_id="CVE-2011-1573" ref_url="https://www.suse.com/security/cve/CVE-2011-1573/" source="CVE"/>
		<reference ref_id="CVE-2011-1577" ref_url="https://www.suse.com/security/cve/CVE-2011-1577/" source="CVE"/>
		<reference ref_id="CVE-2011-1593" ref_url="https://www.suse.com/security/cve/CVE-2011-1593/" source="CVE"/>
		<reference ref_id="CVE-2011-2182" ref_url="https://www.suse.com/security/cve/CVE-2011-2182/" source="CVE"/>
		<reference ref_id="CVE-2011-2183" ref_url="https://www.suse.com/security/cve/CVE-2011-2183/" source="CVE"/>
		<reference ref_id="CVE-2011-2203" ref_url="https://www.suse.com/security/cve/CVE-2011-2203/" source="CVE"/>
		<reference ref_id="CVE-2011-2479" ref_url="https://www.suse.com/security/cve/CVE-2011-2479/" source="CVE"/>
		<reference ref_id="CVE-2011-2491" ref_url="https://www.suse.com/security/cve/CVE-2011-2491/" source="CVE"/>
		<reference ref_id="CVE-2011-2494" ref_url="https://www.suse.com/security/cve/CVE-2011-2494/" source="CVE"/>
		<reference ref_id="CVE-2011-2495" ref_url="https://www.suse.com/security/cve/CVE-2011-2495/" source="CVE"/>
		<reference ref_id="CVE-2011-2496" ref_url="https://www.suse.com/security/cve/CVE-2011-2496/" source="CVE"/>
		<reference ref_id="CVE-2011-3191" ref_url="https://www.suse.com/security/cve/CVE-2011-3191/" source="CVE"/>
		<reference ref_id="CVE-2011-4086" ref_url="https://www.suse.com/security/cve/CVE-2011-4086/" source="CVE"/>
		<reference ref_id="CVE-2011-4097" ref_url="https://www.suse.com/security/cve/CVE-2011-4097/" source="CVE"/>
		<reference ref_id="CVE-2011-4127" ref_url="https://www.suse.com/security/cve/CVE-2011-4127/" source="CVE"/>
		<reference ref_id="CVE-2011-4131" ref_url="https://www.suse.com/security/cve/CVE-2011-4131/" source="CVE"/>
		<reference ref_id="CVE-2011-4604" ref_url="https://www.suse.com/security/cve/CVE-2011-4604/" source="CVE"/>
		<reference ref_id="CVE-2011-4622" ref_url="https://www.suse.com/security/cve/CVE-2011-4622/" source="CVE"/>
		<reference ref_id="CVE-2012-0038" ref_url="https://www.suse.com/security/cve/CVE-2012-0038/" source="CVE"/>
		<reference ref_id="CVE-2012-0045" ref_url="https://www.suse.com/security/cve/CVE-2012-0045/" source="CVE"/>
		<reference ref_id="CVE-2012-0056" ref_url="https://www.suse.com/security/cve/CVE-2012-0056/" source="CVE"/>
		<reference ref_id="CVE-2012-0207" ref_url="https://www.suse.com/security/cve/CVE-2012-0207/" source="CVE"/>
		<reference ref_id="CVE-2012-1090" ref_url="https://www.suse.com/security/cve/CVE-2012-1090/" source="CVE"/>
		<reference ref_id="CVE-2012-1097" ref_url="https://www.suse.com/security/cve/CVE-2012-1097/" source="CVE"/>
		<reference ref_id="CVE-2012-1146" ref_url="https://www.suse.com/security/cve/CVE-2012-1146/" source="CVE"/>
		<reference ref_id="CVE-2012-1179" ref_url="https://www.suse.com/security/cve/CVE-2012-1179/" source="CVE"/>
		<reference ref_id="CVE-2012-1601" ref_url="https://www.suse.com/security/cve/CVE-2012-1601/" source="CVE"/>
		<reference ref_id="CVE-2012-2119" ref_url="https://www.suse.com/security/cve/CVE-2012-2119/" source="CVE"/>
		<reference ref_id="CVE-2012-2133" ref_url="https://www.suse.com/security/cve/CVE-2012-2133/" source="CVE"/>
		<reference ref_id="CVE-2012-2136" ref_url="https://www.suse.com/security/cve/CVE-2012-2136/" source="CVE"/>
		<reference ref_id="CVE-2012-2137" ref_url="https://www.suse.com/security/cve/CVE-2012-2137/" source="CVE"/>
		<reference ref_id="CVE-2012-2372" ref_url="https://www.suse.com/security/cve/CVE-2012-2372/" source="CVE"/>
		<reference ref_id="CVE-2012-2373" ref_url="https://www.suse.com/security/cve/CVE-2012-2373/" source="CVE"/>
		<reference ref_id="CVE-2012-2390" ref_url="https://www.suse.com/security/cve/CVE-2012-2390/" source="CVE"/>
		<reference ref_id="CVE-2012-2663" ref_url="https://www.suse.com/security/cve/CVE-2012-2663/" source="CVE"/>
		<reference ref_id="CVE-2012-2745" ref_url="https://www.suse.com/security/cve/CVE-2012-2745/" source="CVE"/>
		<reference ref_id="CVE-2012-3412" ref_url="https://www.suse.com/security/cve/CVE-2012-3412/" source="CVE"/>
		<reference ref_id="CVE-2012-3430" ref_url="https://www.suse.com/security/cve/CVE-2012-3430/" source="CVE"/>
		<reference ref_id="CVE-2012-4461" ref_url="https://www.suse.com/security/cve/CVE-2012-4461/" source="CVE"/>
		<reference ref_id="CVE-2012-5517" ref_url="https://www.suse.com/security/cve/CVE-2012-5517/" source="CVE"/>
		<reference ref_id="CVE-2013-0160" ref_url="https://www.suse.com/security/cve/CVE-2013-0160/" source="CVE"/>
		<reference ref_id="CVE-2013-0216" ref_url="https://www.suse.com/security/cve/CVE-2013-0216/" source="CVE"/>
		<reference ref_id="CVE-2013-0231" ref_url="https://www.suse.com/security/cve/CVE-2013-0231/" source="CVE"/>
		<reference ref_id="CVE-2013-0871" ref_url="https://www.suse.com/security/cve/CVE-2013-0871/" source="CVE"/>
		<reference ref_id="CVE-2013-0913" ref_url="https://www.suse.com/security/cve/CVE-2013-0913/" source="CVE"/>
		<reference ref_id="CVE-2013-1767" ref_url="https://www.suse.com/security/cve/CVE-2013-1767/" source="CVE"/>
		<reference ref_id="CVE-2013-1774" ref_url="https://www.suse.com/security/cve/CVE-2013-1774/" source="CVE"/>
		<reference ref_id="CVE-2013-1796" ref_url="https://www.suse.com/security/cve/CVE-2013-1796/" source="CVE"/>
		<reference ref_id="CVE-2013-1797" ref_url="https://www.suse.com/security/cve/CVE-2013-1797/" source="CVE"/>
		<reference ref_id="CVE-2013-1798" ref_url="https://www.suse.com/security/cve/CVE-2013-1798/" source="CVE"/>
		<reference ref_id="CVE-2013-1848" ref_url="https://www.suse.com/security/cve/CVE-2013-1848/" source="CVE"/>
		<reference ref_id="CVE-2013-2094" ref_url="https://www.suse.com/security/cve/CVE-2013-2094/" source="CVE"/>
		<reference ref_id="CVE-2013-2850" ref_url="https://www.suse.com/security/cve/CVE-2013-2850/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-default-3.0.76-0.11.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0007/">CVE-2008-0007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0007">CVE-2008-0007 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0009/">CVE-2008-0009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0009">CVE-2008-0009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0010/">CVE-2008-0010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0010">CVE-2008-0010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1375/">CVE-2008-1375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1375">CVE-2008-1375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1669/">CVE-2008-1669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1669">CVE-2008-1669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1673/">CVE-2008-1673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1673">CVE-2008-1673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1675/">CVE-2008-1675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1675">CVE-2008-1675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3528/">CVE-2008-3528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3528">CVE-2008-3528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3831/">CVE-2008-3831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3831">CVE-2008-3831 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2008-5079/">CVE-2008-5079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5079">CVE-2008-5079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5182/">CVE-2008-5182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5182">CVE-2008-5182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5300/">CVE-2008-5300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5300">CVE-2008-5300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0029/">CVE-2009-0029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0029">CVE-2009-0029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3939/">CVE-2009-3939 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-3939">CVE-2009-3939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4026/">CVE-2009-4026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4026">CVE-2009-4026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4027/">CVE-2009-4027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4027">CVE-2009-4027 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4131/">CVE-2009-4131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4131">CVE-2009-4131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4138/">CVE-2009-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4138">CVE-2009-4138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4536/">CVE-2009-4536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4536">CVE-2009-4536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4537/">CVE-2009-4537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4537">CVE-2009-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4538/">CVE-2009-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4538">CVE-2009-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0415/">CVE-2010-0415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0415">CVE-2010-0415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0622/">CVE-2010-0622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0622">CVE-2010-0622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0623/">CVE-2010-0623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0623">CVE-2010-0623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1146/">CVE-2010-1146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1146">CVE-2010-1146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1173/">CVE-2010-1173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1173">CVE-2010-1173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1437/">CVE-2010-1437 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1437">CVE-2010-1437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1641/">CVE-2010-1641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1641">CVE-2010-1641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2066/">CVE-2010-2066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2066">CVE-2010-2066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2798/">CVE-2010-2798 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2798">CVE-2010-2798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2803/">CVE-2010-2803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2803">CVE-2010-2803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2942/">CVE-2010-2942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2942">CVE-2010-2942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2943/">CVE-2010-2943 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2943">CVE-2010-2943 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2946/">CVE-2010-2946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2946">CVE-2010-2946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2954/">CVE-2010-2954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2954">CVE-2010-2954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2955/">CVE-2010-2955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2955">CVE-2010-2955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2959/">CVE-2010-2959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2959">CVE-2010-2959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2960/">CVE-2010-2960 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2960">CVE-2010-2960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2962/">CVE-2010-2962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2962">CVE-2010-2962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2963/">CVE-2010-2963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2963">CVE-2010-2963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3015/">CVE-2010-3015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3015">CVE-2010-3015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3078/">CVE-2010-3078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-3078">CVE-2010-3078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3079/">CVE-2010-3079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-3079">CVE-2010-3079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3080/">CVE-2010-3080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3080">CVE-2010-3080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3081/">CVE-2010-3081 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-3081">CVE-2010-3081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3084/">CVE-2010-3084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3084">CVE-2010-3084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3296/">CVE-2010-3296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3296">CVE-2010-3296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3297/">CVE-2010-3297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3297">CVE-2010-3297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3298/">CVE-2010-3298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3298">CVE-2010-3298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3301/">CVE-2010-3301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3301">CVE-2010-3301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3310/">CVE-2010-3310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3310">CVE-2010-3310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3437/">CVE-2010-3437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3437">CVE-2010-3437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3699/">CVE-2010-3699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3699">CVE-2010-3699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3705/">CVE-2010-3705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3705">CVE-2010-3705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3861/">CVE-2010-3861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3861">CVE-2010-3861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3873/">CVE-2010-3873 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3873">CVE-2010-3873 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3874/">CVE-2010-3874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3874">CVE-2010-3874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3875/">CVE-2010-3875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3875">CVE-2010-3875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3876/">CVE-2010-3876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3876">CVE-2010-3876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3877/">CVE-2010-3877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3877">CVE-2010-3877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3880/">CVE-2010-3880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3880">CVE-2010-3880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3881/">CVE-2010-3881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3881">CVE-2010-3881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4072/">CVE-2010-4072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4072">CVE-2010-4072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4073/">CVE-2010-4073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4073">CVE-2010-4073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4075/">CVE-2010-4075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4075">CVE-2010-4075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4076/">CVE-2010-4076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4076">CVE-2010-4076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4077/">CVE-2010-4077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4077">CVE-2010-4077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4082/">CVE-2010-4082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4082">CVE-2010-4082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4083/">CVE-2010-4083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4083">CVE-2010-4083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4157/">CVE-2010-4157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4157">CVE-2010-4157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4158/">CVE-2010-4158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4158">CVE-2010-4158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4160/">CVE-2010-4160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4160">CVE-2010-4160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4162/">CVE-2010-4162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4162">CVE-2010-4162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4163/">CVE-2010-4163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4163">CVE-2010-4163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4164/">CVE-2010-4164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4164">CVE-2010-4164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4165/">CVE-2010-4165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4165">CVE-2010-4165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4169/">CVE-2010-4169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4169">CVE-2010-4169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4175/">CVE-2010-4175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4175">CVE-2010-4175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4243/">CVE-2010-4243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4243">CVE-2010-4243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4251/">CVE-2010-4251 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-4251">CVE-2010-4251 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4258/">CVE-2010-4258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4258">CVE-2010-4258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4342/">CVE-2010-4342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4342">CVE-2010-4342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4529/">CVE-2010-4529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4529">CVE-2010-4529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4656/">CVE-2010-4656 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-4656">CVE-2010-4656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4668/">CVE-2010-4668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4668">CVE-2010-4668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0521/">CVE-2011-0521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0521">CVE-2011-0521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0710/">CVE-2011-0710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0710">CVE-2011-0710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0711/">CVE-2011-0711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0711">CVE-2011-0711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0712/">CVE-2011-0712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0712">CVE-2011-0712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1016/">CVE-2011-1016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1016">CVE-2011-1016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1017/">CVE-2011-1017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1017">CVE-2011-1017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1020/">CVE-2011-1020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1020">CVE-2011-1020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1083/">CVE-2011-1083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1083">CVE-2011-1083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1160/">CVE-2011-1160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1160">CVE-2011-1160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1180/">CVE-2011-1180 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-1180">CVE-2011-1180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1182/">CVE-2011-1182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1182">CVE-2011-1182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1478/">CVE-2011-1478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1478">CVE-2011-1478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1573/">CVE-2011-1573 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-1573">CVE-2011-1573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1577/">CVE-2011-1577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1577">CVE-2011-1577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1593/">CVE-2011-1593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1593">CVE-2011-1593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2182/">CVE-2011-2182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2182">CVE-2011-2182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2183/">CVE-2011-2183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2183">CVE-2011-2183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2203/">CVE-2011-2203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2203">CVE-2011-2203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2479/">CVE-2011-2479 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2479">CVE-2011-2479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2491/">CVE-2011-2491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2491">CVE-2011-2491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2494/">CVE-2011-2494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2494">CVE-2011-2494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2495/">CVE-2011-2495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2495">CVE-2011-2495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2496/">CVE-2011-2496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2496">CVE-2011-2496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3191/">CVE-2011-3191 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3191">CVE-2011-3191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4086/">CVE-2011-4086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4086">CVE-2011-4086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4097/">CVE-2011-4097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-4097">CVE-2011-4097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4127/">CVE-2011-4127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4127">CVE-2011-4127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4131/">CVE-2011-4131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4131">CVE-2011-4131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4604/">CVE-2011-4604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4604">CVE-2011-4604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4622/">CVE-2011-4622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4622">CVE-2011-4622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0038/">CVE-2012-0038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0038">CVE-2012-0038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0045/">CVE-2012-0045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0045">CVE-2012-0045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0056/">CVE-2012-0056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0056">CVE-2012-0056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0207/">CVE-2012-0207 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0207">CVE-2012-0207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1090/">CVE-2012-1090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1090">CVE-2012-1090 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1097/">CVE-2012-1097 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1097">CVE-2012-1097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1146/">CVE-2012-1146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1146">CVE-2012-1146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1179/">CVE-2012-1179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1179">CVE-2012-1179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1601/">CVE-2012-1601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1601">CVE-2012-1601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2119/">CVE-2012-2119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2119">CVE-2012-2119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2133/">CVE-2012-2133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2133">CVE-2012-2133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2136/">CVE-2012-2136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2136">CVE-2012-2136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2137/">CVE-2012-2137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2137">CVE-2012-2137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2372/">CVE-2012-2372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2372">CVE-2012-2372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2373/">CVE-2012-2373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2373">CVE-2012-2373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2390/">CVE-2012-2390 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2390">CVE-2012-2390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2663/">CVE-2012-2663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2663">CVE-2012-2663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2745/">CVE-2012-2745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2745">CVE-2012-2745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3412/">CVE-2012-3412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3412">CVE-2012-3412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3430/">CVE-2012-3430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3430">CVE-2012-3430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4461/">CVE-2012-4461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4461">CVE-2012-4461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5517/">CVE-2012-5517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5517">CVE-2012-5517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0160/">CVE-2013-0160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0160">CVE-2013-0160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0216/">CVE-2013-0216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0216">CVE-2013-0216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0231/">CVE-2013-0231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0231">CVE-2013-0231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0871/">CVE-2013-0871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0871">CVE-2013-0871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0913/">CVE-2013-0913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0913">CVE-2013-0913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1767/">CVE-2013-1767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1767">CVE-2013-1767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1774/">CVE-2013-1774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1774">CVE-2013-1774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1796/">CVE-2013-1796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1796">CVE-2013-1796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1797/">CVE-2013-1797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1797">CVE-2013-1797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1798/">CVE-2013-1798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1798">CVE-2013-1798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1848/">CVE-2013-1848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1848">CVE-2013-1848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2094/">CVE-2013-2094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2094">CVE-2013-2094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2850/">CVE-2013-2850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2850">CVE-2013-2850 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989759" comment="kernel-default-3.0.76-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989760" comment="kernel-default-base-3.0.76-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989762" comment="kernel-default-man-3.0.76-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989763" comment="kernel-pae-3.0.76-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989764" comment="kernel-pae-base-3.0.76-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989766" comment="kernel-ppc64-3.0.76-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989767" comment="kernel-ppc64-base-3.0.76-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989769" comment="kernel-source-3.0.76-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989770" comment="kernel-syms-3.0.76-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989771" comment="kernel-trace-3.0.76-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989772" comment="kernel-trace-base-3.0.76-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989774" comment="kernel-xen-3.0.76-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989775" comment="kernel-xen-base-3.0.76-0.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216046" version="1" class="patch">
	<metadata>
		<title>krb5-1.6.3-133.49.54.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-6143" ref_url="https://www.suse.com/security/cve/CVE-2006-6143/" source="CVE"/>
		<reference ref_id="CVE-2006-6144" ref_url="https://www.suse.com/security/cve/CVE-2006-6144/" source="CVE"/>
		<reference ref_id="CVE-2007-0956" ref_url="https://www.suse.com/security/cve/CVE-2007-0956/" source="CVE"/>
		<reference ref_id="CVE-2007-0957" ref_url="https://www.suse.com/security/cve/CVE-2007-0957/" source="CVE"/>
		<reference ref_id="CVE-2007-1216" ref_url="https://www.suse.com/security/cve/CVE-2007-1216/" source="CVE"/>
		<reference ref_id="CVE-2007-2442" ref_url="https://www.suse.com/security/cve/CVE-2007-2442/" source="CVE"/>
		<reference ref_id="CVE-2007-2443" ref_url="https://www.suse.com/security/cve/CVE-2007-2443/" source="CVE"/>
		<reference ref_id="CVE-2007-2798" ref_url="https://www.suse.com/security/cve/CVE-2007-2798/" source="CVE"/>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<reference ref_id="CVE-2007-4000" ref_url="https://www.suse.com/security/cve/CVE-2007-4000/" source="CVE"/>
		<reference ref_id="CVE-2007-4743" ref_url="https://www.suse.com/security/cve/CVE-2007-4743/" source="CVE"/>
		<reference ref_id="CVE-2007-5894" ref_url="https://www.suse.com/security/cve/CVE-2007-5894/" source="CVE"/>
		<reference ref_id="CVE-2007-5902" ref_url="https://www.suse.com/security/cve/CVE-2007-5902/" source="CVE"/>
		<reference ref_id="CVE-2007-5971" ref_url="https://www.suse.com/security/cve/CVE-2007-5971/" source="CVE"/>
		<reference ref_id="CVE-2007-5972" ref_url="https://www.suse.com/security/cve/CVE-2007-5972/" source="CVE"/>
		<reference ref_id="CVE-2008-0062" ref_url="https://www.suse.com/security/cve/CVE-2008-0062/" source="CVE"/>
		<reference ref_id="CVE-2008-0063" ref_url="https://www.suse.com/security/cve/CVE-2008-0063/" source="CVE"/>
		<reference ref_id="CVE-2008-0947" ref_url="https://www.suse.com/security/cve/CVE-2008-0947/" source="CVE"/>
		<reference ref_id="CVE-2008-0948" ref_url="https://www.suse.com/security/cve/CVE-2008-0948/" source="CVE"/>
		<reference ref_id="CVE-2009-0844" ref_url="https://www.suse.com/security/cve/CVE-2009-0844/" source="CVE"/>
		<reference ref_id="CVE-2009-0845" ref_url="https://www.suse.com/security/cve/CVE-2009-0845/" source="CVE"/>
		<reference ref_id="CVE-2009-0846" ref_url="https://www.suse.com/security/cve/CVE-2009-0846/" source="CVE"/>
		<reference ref_id="CVE-2009-0847" ref_url="https://www.suse.com/security/cve/CVE-2009-0847/" source="CVE"/>
		<reference ref_id="CVE-2009-4212" ref_url="https://www.suse.com/security/cve/CVE-2009-4212/" source="CVE"/>
		<reference ref_id="CVE-2010-0629" ref_url="https://www.suse.com/security/cve/CVE-2010-0629/" source="CVE"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-1323" ref_url="https://www.suse.com/security/cve/CVE-2010-1323/" source="CVE"/>
		<reference ref_id="CVE-2011-0281" ref_url="https://www.suse.com/security/cve/CVE-2011-0281/" source="CVE"/>
		<reference ref_id="CVE-2011-0282" ref_url="https://www.suse.com/security/cve/CVE-2011-0282/" source="CVE"/>
		<reference ref_id="CVE-2011-1526" ref_url="https://www.suse.com/security/cve/CVE-2011-1526/" source="CVE"/>
		<reference ref_id="CVE-2011-4862" ref_url="https://www.suse.com/security/cve/CVE-2011-4862/" source="CVE"/>
		<reference ref_id="CVE-2013-1415" ref_url="https://www.suse.com/security/cve/CVE-2013-1415/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-1.6.3-133.49.54.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6143/">CVE-2006-6143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6143">CVE-2006-6143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6144/">CVE-2006-6144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6144">CVE-2006-6144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0956/">CVE-2007-0956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0956">CVE-2007-0956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0957/">CVE-2007-0957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0957">CVE-2007-0957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1216/">CVE-2007-1216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1216">CVE-2007-1216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2442/">CVE-2007-2442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2442">CVE-2007-2442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2443/">CVE-2007-2443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2443">CVE-2007-2443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2798/">CVE-2007-2798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2798">CVE-2007-2798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3999">CVE-2007-3999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4000/">CVE-2007-4000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4000">CVE-2007-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4743/">CVE-2007-4743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4743">CVE-2007-4743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5894/">CVE-2007-5894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5894">CVE-2007-5894 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5902/">CVE-2007-5902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5902">CVE-2007-5902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5971/">CVE-2007-5971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5971">CVE-2007-5971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5972/">CVE-2007-5972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5972">CVE-2007-5972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0062/">CVE-2008-0062 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2008-0062">CVE-2008-0062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0063/">CVE-2008-0063 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2008-0063">CVE-2008-0063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0947/">CVE-2008-0947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0947">CVE-2008-0947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0948/">CVE-2008-0948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0948">CVE-2008-0948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0844/">CVE-2009-0844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0844">CVE-2009-0844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0845/">CVE-2009-0845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0845">CVE-2009-0845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0846/">CVE-2009-0846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0846">CVE-2009-0846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0847/">CVE-2009-0847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0847">CVE-2009-0847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4212/">CVE-2009-4212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4212">CVE-2009-4212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0629/">CVE-2010-0629 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-0629">CVE-2010-0629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1321">CVE-2010-1321 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1323/">CVE-2010-1323 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1323">CVE-2010-1323 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0281/">CVE-2011-0281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0281">CVE-2011-0281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0282/">CVE-2011-0282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0282">CVE-2011-0282 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1526/">CVE-2011-1526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1526">CVE-2011-1526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4862/">CVE-2011-4862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4862">CVE-2011-4862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1415/">CVE-2013-1415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1415">CVE-2013-1415 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989777" comment="krb5-1.6.3-133.49.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989778" comment="krb5-32bit-1.6.3-133.49.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989779" comment="krb5-apps-clients-1.6.3-133.49.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989780" comment="krb5-apps-servers-1.6.3-133.49.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989781" comment="krb5-client-1.6.3-133.49.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989782" comment="krb5-server-1.6.3-133.49.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989783" comment="krb5-x86-1.6.3-133.49.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216047" version="1" class="patch">
	<metadata>
		<title>krb5-doc-1.6.3-133.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<reference ref_id="CVE-2007-4000" ref_url="https://www.suse.com/security/cve/CVE-2007-4000/" source="CVE"/>
		<reference ref_id="CVE-2007-4743" ref_url="https://www.suse.com/security/cve/CVE-2007-4743/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-doc-1.6.3-133.21 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3999">CVE-2007-3999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4000/">CVE-2007-4000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4000">CVE-2007-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4743/">CVE-2007-4743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4743">CVE-2007-4743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989784" comment="krb5-doc-1.6.3-133.49.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216048" version="1" class="patch">
	<metadata>
		<title>krb5-plugin-kdb-ldap-1.6.3-133.49.54.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-0956" ref_url="https://www.suse.com/security/cve/CVE-2007-0956/" source="CVE"/>
		<reference ref_id="CVE-2007-0957" ref_url="https://www.suse.com/security/cve/CVE-2007-0957/" source="CVE"/>
		<reference ref_id="CVE-2007-1216" ref_url="https://www.suse.com/security/cve/CVE-2007-1216/" source="CVE"/>
		<reference ref_id="CVE-2007-2442" ref_url="https://www.suse.com/security/cve/CVE-2007-2442/" source="CVE"/>
		<reference ref_id="CVE-2007-2443" ref_url="https://www.suse.com/security/cve/CVE-2007-2443/" source="CVE"/>
		<reference ref_id="CVE-2007-2798" ref_url="https://www.suse.com/security/cve/CVE-2007-2798/" source="CVE"/>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<reference ref_id="CVE-2007-4000" ref_url="https://www.suse.com/security/cve/CVE-2007-4000/" source="CVE"/>
		<reference ref_id="CVE-2007-4743" ref_url="https://www.suse.com/security/cve/CVE-2007-4743/" source="CVE"/>
		<reference ref_id="CVE-2010-0629" ref_url="https://www.suse.com/security/cve/CVE-2010-0629/" source="CVE"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-1323" ref_url="https://www.suse.com/security/cve/CVE-2010-1323/" source="CVE"/>
		<reference ref_id="CVE-2011-0281" ref_url="https://www.suse.com/security/cve/CVE-2011-0281/" source="CVE"/>
		<reference ref_id="CVE-2011-0282" ref_url="https://www.suse.com/security/cve/CVE-2011-0282/" source="CVE"/>
		<reference ref_id="CVE-2011-1526" ref_url="https://www.suse.com/security/cve/CVE-2011-1526/" source="CVE"/>
		<reference ref_id="CVE-2011-4862" ref_url="https://www.suse.com/security/cve/CVE-2011-4862/" source="CVE"/>
		<reference ref_id="CVE-2013-1415" ref_url="https://www.suse.com/security/cve/CVE-2013-1415/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-plugin-kdb-ldap-1.6.3-133.49.54.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0956/">CVE-2007-0956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0956">CVE-2007-0956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0957/">CVE-2007-0957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0957">CVE-2007-0957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1216/">CVE-2007-1216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1216">CVE-2007-1216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2442/">CVE-2007-2442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2442">CVE-2007-2442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2443/">CVE-2007-2443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2443">CVE-2007-2443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2798/">CVE-2007-2798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2798">CVE-2007-2798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3999">CVE-2007-3999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4000/">CVE-2007-4000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4000">CVE-2007-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4743/">CVE-2007-4743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4743">CVE-2007-4743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0629/">CVE-2010-0629 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-0629">CVE-2010-0629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1321">CVE-2010-1321 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1323/">CVE-2010-1323 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1323">CVE-2010-1323 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0281/">CVE-2011-0281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0281">CVE-2011-0281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0282/">CVE-2011-0282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0282">CVE-2011-0282 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1526/">CVE-2011-1526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1526">CVE-2011-1526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4862/">CVE-2011-4862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4862">CVE-2011-4862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1415/">CVE-2013-1415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1415">CVE-2013-1415 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989785" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989786" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216049" version="1" class="patch">
	<metadata>
		<title>kvm-1.4.1-0.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-2382" ref_url="https://www.suse.com/security/cve/CVE-2008-2382/" source="CVE"/>
		<reference ref_id="CVE-2008-5714" ref_url="https://www.suse.com/security/cve/CVE-2008-5714/" source="CVE"/>
		<reference ref_id="CVE-2012-2652" ref_url="https://www.suse.com/security/cve/CVE-2012-2652/" source="CVE"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<reference ref_id="CVE-2013-2007" ref_url="https://www.suse.com/security/cve/CVE-2013-2007/" source="CVE"/>
		<description>
These are all security issues fixed in the kvm-1.4.1-0.11.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2382/">CVE-2008-2382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2382">CVE-2008-2382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5714/">CVE-2008-5714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5714">CVE-2008-5714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2652/">CVE-2012-2652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2652">CVE-2012-2652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3515">CVE-2012-3515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2007/">CVE-2013-2007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2007">CVE-2013-2007 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989787" comment="kvm-1.4.1-0.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216050" version="1" class="patch">
	<metadata>
		<title>lcms-1.17-77.14.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0581" ref_url="https://www.suse.com/security/cve/CVE-2009-0581/" source="CVE"/>
		<reference ref_id="CVE-2009-0723" ref_url="https://www.suse.com/security/cve/CVE-2009-0723/" source="CVE"/>
		<reference ref_id="CVE-2009-0733" ref_url="https://www.suse.com/security/cve/CVE-2009-0733/" source="CVE"/>
		<reference ref_id="CVE-2009-0793" ref_url="https://www.suse.com/security/cve/CVE-2009-0793/" source="CVE"/>
		<description>
These are all security issues fixed in the lcms-1.17-77.14.19 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0581/">CVE-2009-0581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0581">CVE-2009-0581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0723/">CVE-2009-0723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0723">CVE-2009-0723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0733/">CVE-2009-0733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0733">CVE-2009-0733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0793/">CVE-2009-0793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0793">CVE-2009-0793 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988630" comment="lcms-1.17-77.14.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988631" comment="liblcms1-1.17-77.14.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988632" comment="liblcms1-32bit-1.17-77.14.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988633" comment="liblcms1-x86-1.17-77.14.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216051" version="1" class="patch">
	<metadata>
		<title>ldapsmb-1.34b-12.39.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-3403" ref_url="https://www.suse.com/security/cve/CVE-2006-3403/" source="CVE"/>
		<reference ref_id="CVE-2007-0452" ref_url="https://www.suse.com/security/cve/CVE-2007-0452/" source="CVE"/>
		<reference ref_id="CVE-2007-2444" ref_url="https://www.suse.com/security/cve/CVE-2007-2444/" source="CVE"/>
		<reference ref_id="CVE-2007-2446" ref_url="https://www.suse.com/security/cve/CVE-2007-2446/" source="CVE"/>
		<reference ref_id="CVE-2007-2447" ref_url="https://www.suse.com/security/cve/CVE-2007-2447/" source="CVE"/>
		<reference ref_id="CVE-2007-4138" ref_url="https://www.suse.com/security/cve/CVE-2007-4138/" source="CVE"/>
		<reference ref_id="CVE-2007-4572" ref_url="https://www.suse.com/security/cve/CVE-2007-4572/" source="CVE"/>
		<reference ref_id="CVE-2007-5398" ref_url="https://www.suse.com/security/cve/CVE-2007-5398/" source="CVE"/>
		<reference ref_id="CVE-2007-6015" ref_url="https://www.suse.com/security/cve/CVE-2007-6015/" source="CVE"/>
		<reference ref_id="CVE-2008-1105" ref_url="https://www.suse.com/security/cve/CVE-2008-1105/" source="CVE"/>
		<reference ref_id="CVE-2008-3789" ref_url="https://www.suse.com/security/cve/CVE-2008-3789/" source="CVE"/>
		<reference ref_id="CVE-2008-4314" ref_url="https://www.suse.com/security/cve/CVE-2008-4314/" source="CVE"/>
		<reference ref_id="CVE-2009-0022" ref_url="https://www.suse.com/security/cve/CVE-2009-0022/" source="CVE"/>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2010-0926" ref_url="https://www.suse.com/security/cve/CVE-2010-0926/" source="CVE"/>
		<reference ref_id="CVE-2010-1635" ref_url="https://www.suse.com/security/cve/CVE-2010-1635/" source="CVE"/>
		<reference ref_id="CVE-2010-1642" ref_url="https://www.suse.com/security/cve/CVE-2010-1642/" source="CVE"/>
		<reference ref_id="CVE-2010-2063" ref_url="https://www.suse.com/security/cve/CVE-2010-2063/" source="CVE"/>
		<reference ref_id="CVE-2010-3069" ref_url="https://www.suse.com/security/cve/CVE-2010-3069/" source="CVE"/>
		<reference ref_id="CVE-2011-0719" ref_url="https://www.suse.com/security/cve/CVE-2011-0719/" source="CVE"/>
		<reference ref_id="CVE-2011-2522" ref_url="https://www.suse.com/security/cve/CVE-2011-2522/" source="CVE"/>
		<reference ref_id="CVE-2011-2694" ref_url="https://www.suse.com/security/cve/CVE-2011-2694/" source="CVE"/>
		<reference ref_id="CVE-2012-0817" ref_url="https://www.suse.com/security/cve/CVE-2012-0817/" source="CVE"/>
		<reference ref_id="CVE-2012-0870" ref_url="https://www.suse.com/security/cve/CVE-2012-0870/" source="CVE"/>
		<reference ref_id="CVE-2012-1182" ref_url="https://www.suse.com/security/cve/CVE-2012-1182/" source="CVE"/>
		<reference ref_id="CVE-2012-2111" ref_url="https://www.suse.com/security/cve/CVE-2012-2111/" source="CVE"/>
		<reference ref_id="CVE-2013-0213" ref_url="https://www.suse.com/security/cve/CVE-2013-0213/" source="CVE"/>
		<reference ref_id="CVE-2013-0214" ref_url="https://www.suse.com/security/cve/CVE-2013-0214/" source="CVE"/>
		<reference ref_id="CVE-2013-0454" ref_url="https://www.suse.com/security/cve/CVE-2013-0454/" source="CVE"/>
		<description>
These are all security issues fixed in the ldapsmb-1.34b-12.39.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3403/">CVE-2006-3403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3403">CVE-2006-3403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0452/">CVE-2007-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0452">CVE-2007-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2444/">CVE-2007-2444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2444">CVE-2007-2444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2446/">CVE-2007-2446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2446">CVE-2007-2446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2447/">CVE-2007-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2447">CVE-2007-2447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4138/">CVE-2007-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4138">CVE-2007-4138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4572/">CVE-2007-4572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4572">CVE-2007-4572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5398/">CVE-2007-5398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5398">CVE-2007-5398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6015/">CVE-2007-6015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6015">CVE-2007-6015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1105/">CVE-2008-1105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1105">CVE-2008-1105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3789/">CVE-2008-3789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3789">CVE-2008-3789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4314/">CVE-2008-4314 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4314">CVE-2008-4314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0022/">CVE-2009-0022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0022">CVE-2009-0022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1886">CVE-2009-1886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1888">CVE-2009-1888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2813">CVE-2009-2813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2906">CVE-2009-2906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2948">CVE-2009-2948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0547">CVE-2010-0547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0728">CVE-2010-0728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0787">CVE-2010-0787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0926/">CVE-2010-0926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0926">CVE-2010-0926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1635/">CVE-2010-1635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1635">CVE-2010-1635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1642/">CVE-2010-1642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1642">CVE-2010-1642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2063/">CVE-2010-2063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2063">CVE-2010-2063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3069/">CVE-2010-3069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3069">CVE-2010-3069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0719/">CVE-2011-0719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0719">CVE-2011-0719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2522/">CVE-2011-2522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2522">CVE-2011-2522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2694/">CVE-2011-2694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2694">CVE-2011-2694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0817/">CVE-2012-0817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0817">CVE-2012-0817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0870/">CVE-2012-0870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0870">CVE-2012-0870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1182/">CVE-2012-1182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1182">CVE-2012-1182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2111/">CVE-2012-2111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2111">CVE-2012-2111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0213/">CVE-2013-0213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0213">CVE-2013-0213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0214/">CVE-2013-0214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0214">CVE-2013-0214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0454/">CVE-2013-0454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0454">CVE-2013-0454 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989788" comment="ldapsmb-1.34b-12.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989789" comment="libldb1-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989790" comment="libsmbclient0-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989791" comment="libsmbclient0-32bit-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989792" comment="libsmbclient0-x86-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989793" comment="libtalloc2-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989794" comment="libtalloc2-32bit-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989795" comment="libtalloc2-x86-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989796" comment="libtdb1-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989797" comment="libtdb1-32bit-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989798" comment="libtdb1-x86-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989799" comment="libtevent0-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989800" comment="libwbclient0-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989801" comment="libwbclient0-32bit-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989802" comment="libwbclient0-x86-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989803" comment="samba-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989804" comment="samba-32bit-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989805" comment="samba-client-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989806" comment="samba-client-32bit-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989807" comment="samba-client-x86-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989808" comment="samba-krb-printing-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989809" comment="samba-winbind-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989810" comment="samba-winbind-32bit-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989811" comment="samba-winbind-x86-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989812" comment="samba-x86-3.6.3-0.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216052" version="1" class="patch">
	<metadata>
		<title>libMagickCore1-32bit-6.4.3.6-7.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-5456" ref_url="https://www.suse.com/security/cve/CVE-2006-5456/" source="CVE"/>
		<reference ref_id="CVE-2007-1667" ref_url="https://www.suse.com/security/cve/CVE-2007-1667/" source="CVE"/>
		<reference ref_id="CVE-2007-1797" ref_url="https://www.suse.com/security/cve/CVE-2007-1797/" source="CVE"/>
		<reference ref_id="CVE-2007-4985" ref_url="https://www.suse.com/security/cve/CVE-2007-4985/" source="CVE"/>
		<reference ref_id="CVE-2007-4986" ref_url="https://www.suse.com/security/cve/CVE-2007-4986/" source="CVE"/>
		<reference ref_id="CVE-2007-4987" ref_url="https://www.suse.com/security/cve/CVE-2007-4987/" source="CVE"/>
		<reference ref_id="CVE-2007-4988" ref_url="https://www.suse.com/security/cve/CVE-2007-4988/" source="CVE"/>
		<reference ref_id="CVE-2012-0247" ref_url="https://www.suse.com/security/cve/CVE-2012-0247/" source="CVE"/>
		<reference ref_id="CVE-2012-0248" ref_url="https://www.suse.com/security/cve/CVE-2012-0248/" source="CVE"/>
		<reference ref_id="CVE-2012-0259" ref_url="https://www.suse.com/security/cve/CVE-2012-0259/" source="CVE"/>
		<reference ref_id="CVE-2012-0260" ref_url="https://www.suse.com/security/cve/CVE-2012-0260/" source="CVE"/>
		<reference ref_id="CVE-2012-1185" ref_url="https://www.suse.com/security/cve/CVE-2012-1185/" source="CVE"/>
		<reference ref_id="CVE-2012-1186" ref_url="https://www.suse.com/security/cve/CVE-2012-1186/" source="CVE"/>
		<reference ref_id="CVE-2012-1610" ref_url="https://www.suse.com/security/cve/CVE-2012-1610/" source="CVE"/>
		<reference ref_id="CVE-2012-1798" ref_url="https://www.suse.com/security/cve/CVE-2012-1798/" source="CVE"/>
		<reference ref_id="CVE-2012-3437" ref_url="https://www.suse.com/security/cve/CVE-2012-3437/" source="CVE"/>
		<description>
These are all security issues fixed in the libMagickCore1-32bit-6.4.3.6-7.26.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5456/">CVE-2006-5456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5456">CVE-2006-5456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1667/">CVE-2007-1667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1667">CVE-2007-1667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1797/">CVE-2007-1797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1797">CVE-2007-1797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4985/">CVE-2007-4985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4985">CVE-2007-4985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4986/">CVE-2007-4986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4986">CVE-2007-4986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4987/">CVE-2007-4987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4987">CVE-2007-4987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4988/">CVE-2007-4988 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2007-4988">CVE-2007-4988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0247/">CVE-2012-0247 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0247">CVE-2012-0247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0248/">CVE-2012-0248 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0248">CVE-2012-0248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0259/">CVE-2012-0259 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0259">CVE-2012-0259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0260/">CVE-2012-0260 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0260">CVE-2012-0260 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1185/">CVE-2012-1185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1185">CVE-2012-1185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1186/">CVE-2012-1186 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1186">CVE-2012-1186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1610/">CVE-2012-1610 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1610">CVE-2012-1610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1798/">CVE-2012-1798 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1798">CVE-2012-1798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3437/">CVE-2012-3437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3437">CVE-2012-3437 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989813" comment="libMagickCore1-6.4.3.6-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989814" comment="libMagickCore1-32bit-6.4.3.6-7.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216053" version="1" class="patch">
	<metadata>
		<title>libQtWebKit4-32bit-4.6.3-5.25.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-4811" ref_url="https://www.suse.com/security/cve/CVE-2006-4811/" source="CVE"/>
		<reference ref_id="CVE-2009-0945" ref_url="https://www.suse.com/security/cve/CVE-2009-0945/" source="CVE"/>
		<reference ref_id="CVE-2011-3193" ref_url="https://www.suse.com/security/cve/CVE-2011-3193/" source="CVE"/>
		<reference ref_id="CVE-2011-3922" ref_url="https://www.suse.com/security/cve/CVE-2011-3922/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2012-6093" ref_url="https://www.suse.com/security/cve/CVE-2012-6093/" source="CVE"/>
		<reference ref_id="CVE-2013-0254" ref_url="https://www.suse.com/security/cve/CVE-2013-0254/" source="CVE"/>
		<description>
These are all security issues fixed in the libQtWebKit4-32bit-4.6.3-5.25.5 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4811/">CVE-2006-4811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4811">CVE-2006-4811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0945/">CVE-2009-0945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0945">CVE-2009-0945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3193/">CVE-2011-3193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3193">CVE-2011-3193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3922/">CVE-2011-3922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3922">CVE-2011-3922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4929">CVE-2012-4929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6093/">CVE-2012-6093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6093">CVE-2012-6093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0254/">CVE-2013-0254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0254">CVE-2013-0254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989815" comment="libQtWebKit4-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989816" comment="libQtWebKit4-32bit-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989817" comment="libQtWebKit4-x86-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989818" comment="libqt4-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989819" comment="libqt4-32bit-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989820" comment="libqt4-qt3support-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989821" comment="libqt4-qt3support-32bit-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989822" comment="libqt4-qt3support-x86-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989823" comment="libqt4-sql-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989824" comment="libqt4-sql-32bit-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989825" comment="libqt4-sql-mysql-4.6.3-5.25.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989826" comment="libqt4-sql-sqlite-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989827" comment="libqt4-sql-x86-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989828" comment="libqt4-x11-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989829" comment="libqt4-x11-32bit-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989830" comment="libqt4-x11-x86-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989831" comment="libqt4-x86-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989832" comment="qt4-x11-tools-4.6.3-5.25.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216054" version="1" class="patch">
	<metadata>
		<title>libadns1-1.4-73.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-1447" ref_url="https://www.suse.com/security/cve/CVE-2008-1447/" source="CVE"/>
		<reference ref_id="CVE-2008-4100" ref_url="https://www.suse.com/security/cve/CVE-2008-4100/" source="CVE"/>
		<description>
These are all security issues fixed in the libadns1-1.4-73.21 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1447/">CVE-2008-1447 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2008-1447">CVE-2008-1447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4100/">CVE-2008-4100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4100">CVE-2008-4100 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988654" comment="libadns1-1.4-73.21 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216055" version="1" class="patch">
	<metadata>
		<title>libapr-util1-1.3.4-12.22.21.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<reference ref_id="CVE-2010-1623" ref_url="https://www.suse.com/security/cve/CVE-2010-1623/" source="CVE"/>
		<description>
These are all security issues fixed in the libapr-util1-1.3.4-12.22.21.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2412">CVE-2009-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1623/">CVE-2010-1623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1623">CVE-2010-1623 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989230" comment="libapr-util1-1.3.4-12.22.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989231" comment="libapr-util1-32bit-1.3.4-12.22.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216056" version="1" class="patch">
	<metadata>
		<title>libapr1-1.3.3-11.18.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<reference ref_id="CVE-2011-0419" ref_url="https://www.suse.com/security/cve/CVE-2011-0419/" source="CVE"/>
		<reference ref_id="CVE-2011-1928" ref_url="https://www.suse.com/security/cve/CVE-2011-1928/" source="CVE"/>
		<description>
These are all security issues fixed in the libapr1-1.3.3-11.18.19.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2412">CVE-2009-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0419/">CVE-2011-0419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0419">CVE-2011-0419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1928/">CVE-2011-1928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1928">CVE-2011-1928 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989833" comment="libapr1-1.3.3-11.18.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989834" comment="libapr1-32bit-1.3.3-11.18.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216057" version="1" class="patch">
	<metadata>
		<title>libarchive2-2.5.5-5.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-5680" ref_url="https://www.suse.com/security/cve/CVE-2006-5680/" source="CVE"/>
		<reference ref_id="CVE-2007-3641" ref_url="https://www.suse.com/security/cve/CVE-2007-3641/" source="CVE"/>
		<reference ref_id="CVE-2007-3644" ref_url="https://www.suse.com/security/cve/CVE-2007-3644/" source="CVE"/>
		<reference ref_id="CVE-2007-3645" ref_url="https://www.suse.com/security/cve/CVE-2007-3645/" source="CVE"/>
		<description>
These are all security issues fixed in the libarchive2-2.5.5-5.19 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5680/">CVE-2006-5680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5680">CVE-2006-5680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3641/">CVE-2007-3641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3641">CVE-2007-3641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3644/">CVE-2007-3644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3644">CVE-2007-3644 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3645/">CVE-2007-3645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3645">CVE-2007-3645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988659" comment="libarchive2-2.5.5-5.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216058" version="1" class="patch">
	<metadata>
		<title>libcap-progs-2.11-2.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-4099" ref_url="https://www.suse.com/security/cve/CVE-2011-4099/" source="CVE"/>
		<description>
These are all security issues fixed in the libcap-progs-2.11-2.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4099/">CVE-2011-4099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4099">CVE-2011-4099 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989234" comment="libcap-progs-2.11-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989235" comment="libcap2-2.11-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989236" comment="libcap2-32bit-2.11-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989237" comment="libcap2-x86-2.11-2.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216059" version="1" class="patch">
	<metadata>
		<title>libcgroup1-0.37.1-5.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1006" ref_url="https://www.suse.com/security/cve/CVE-2011-1006/" source="CVE"/>
		<reference ref_id="CVE-2011-1022" ref_url="https://www.suse.com/security/cve/CVE-2011-1022/" source="CVE"/>
		<description>
These are all security issues fixed in the libcgroup1-0.37.1-5.16.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1006/">CVE-2011-1006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1006">CVE-2011-1006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1022/">CVE-2011-1022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1022">CVE-2011-1022 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989835" comment="libcgroup1-0.37.1-5.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216060" version="1" class="patch">
	<metadata>
		<title>libdrm-2.4.41-0.8.46 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-3831" ref_url="https://www.suse.com/security/cve/CVE-2008-3831/" source="CVE"/>
		<description>
These are all security issues fixed in the libdrm-2.4.41-0.8.46 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3831/">CVE-2008-3831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3831">CVE-2008-3831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989836" comment="libdrm-2.4.41-0.8.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989837" comment="libdrm-32bit-2.4.41-0.8.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989838" comment="libdrm-x86-2.4.41-0.8.46 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216061" version="1" class="patch">
	<metadata>
		<title>libecpg6-9.1.9-0.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-4769" ref_url="https://www.suse.com/security/cve/CVE-2007-4769/" source="CVE"/>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2007-6067" ref_url="https://www.suse.com/security/cve/CVE-2007-6067/" source="CVE"/>
		<reference ref_id="CVE-2007-6600" ref_url="https://www.suse.com/security/cve/CVE-2007-6600/" source="CVE"/>
		<reference ref_id="CVE-2007-6601" ref_url="https://www.suse.com/security/cve/CVE-2007-6601/" source="CVE"/>
		<reference ref_id="CVE-2009-4034" ref_url="https://www.suse.com/security/cve/CVE-2009-4034/" source="CVE"/>
		<reference ref_id="CVE-2009-4136" ref_url="https://www.suse.com/security/cve/CVE-2009-4136/" source="CVE"/>
		<reference ref_id="CVE-2010-1169" ref_url="https://www.suse.com/security/cve/CVE-2010-1169/" source="CVE"/>
		<reference ref_id="CVE-2010-1170" ref_url="https://www.suse.com/security/cve/CVE-2010-1170/" source="CVE"/>
		<reference ref_id="CVE-2010-3433" ref_url="https://www.suse.com/security/cve/CVE-2010-3433/" source="CVE"/>
		<reference ref_id="CVE-2012-3488" ref_url="https://www.suse.com/security/cve/CVE-2012-3488/" source="CVE"/>
		<reference ref_id="CVE-2012-3489" ref_url="https://www.suse.com/security/cve/CVE-2012-3489/" source="CVE"/>
		<reference ref_id="CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255/" source="CVE"/>
		<reference ref_id="CVE-2013-1899" ref_url="https://www.suse.com/security/cve/CVE-2013-1899/" source="CVE"/>
		<reference ref_id="CVE-2013-1900" ref_url="https://www.suse.com/security/cve/CVE-2013-1900/" source="CVE"/>
		<reference ref_id="CVE-2013-1901" ref_url="https://www.suse.com/security/cve/CVE-2013-1901/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-9.1.9-0.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4769/">CVE-2007-4769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4769">CVE-2007-4769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4772">CVE-2007-4772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6067/">CVE-2007-6067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6067">CVE-2007-6067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6600/">CVE-2007-6600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6600">CVE-2007-6600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6601/">CVE-2007-6601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6601">CVE-2007-6601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4034/">CVE-2009-4034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4034">CVE-2009-4034 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4136/">CVE-2009-4136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4136">CVE-2009-4136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1169/">CVE-2010-1169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1169">CVE-2010-1169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1170/">CVE-2010-1170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1170">CVE-2010-1170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3433/">CVE-2010-3433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3433">CVE-2010-3433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3488/">CVE-2012-3488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3488">CVE-2012-3488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3489/">CVE-2012-3489 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2012-3489">CVE-2012-3489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0255">CVE-2013-0255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1899/">CVE-2013-1899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1899">CVE-2013-1899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1900/">CVE-2013-1900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1900">CVE-2013-1900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1901/">CVE-2013-1901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1901">CVE-2013-1901 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989839" comment="libecpg6-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989840" comment="libpq5-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989841" comment="libpq5-32bit-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989842" comment="postgresql91-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989843" comment="postgresql91-contrib-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989844" comment="postgresql91-docs-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989845" comment="postgresql91-server-9.1.9-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216062" version="1" class="patch">
	<metadata>
		<title>libexif-0.6.17-2.14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-6351" ref_url="https://www.suse.com/security/cve/CVE-2007-6351/" source="CVE"/>
		<reference ref_id="CVE-2007-6352" ref_url="https://www.suse.com/security/cve/CVE-2007-6352/" source="CVE"/>
		<reference ref_id="CVE-2012-2812" ref_url="https://www.suse.com/security/cve/CVE-2012-2812/" source="CVE"/>
		<reference ref_id="CVE-2012-2813" ref_url="https://www.suse.com/security/cve/CVE-2012-2813/" source="CVE"/>
		<reference ref_id="CVE-2012-2814" ref_url="https://www.suse.com/security/cve/CVE-2012-2814/" source="CVE"/>
		<reference ref_id="CVE-2012-2836" ref_url="https://www.suse.com/security/cve/CVE-2012-2836/" source="CVE"/>
		<reference ref_id="CVE-2012-2837" ref_url="https://www.suse.com/security/cve/CVE-2012-2837/" source="CVE"/>
		<reference ref_id="CVE-2012-2840" ref_url="https://www.suse.com/security/cve/CVE-2012-2840/" source="CVE"/>
		<reference ref_id="CVE-2012-2841" ref_url="https://www.suse.com/security/cve/CVE-2012-2841/" source="CVE"/>
		<description>
These are all security issues fixed in the libexif-0.6.17-2.14.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6351/">CVE-2007-6351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6351">CVE-2007-6351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6352/">CVE-2007-6352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6352">CVE-2007-6352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2812/">CVE-2012-2812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2812">CVE-2012-2812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2813/">CVE-2012-2813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2813">CVE-2012-2813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2814/">CVE-2012-2814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2814">CVE-2012-2814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2836/">CVE-2012-2836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2836">CVE-2012-2836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2837/">CVE-2012-2837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2837">CVE-2012-2837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2840/">CVE-2012-2840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2840">CVE-2012-2840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2841/">CVE-2012-2841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2841">CVE-2012-2841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989846" comment="libexif-0.6.17-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989847" comment="libexif-32bit-0.6.17-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989848" comment="libexif-x86-0.6.17-2.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216063" version="1" class="patch">
	<metadata>
		<title>libexiv2-4-0.17.1-31.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-6353" ref_url="https://www.suse.com/security/cve/CVE-2007-6353/" source="CVE"/>
		<description>
These are all security issues fixed in the libexiv2-4-0.17.1-31.20 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6353/">CVE-2007-6353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6353">CVE-2007-6353 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988666" comment="libexiv2-4-0.17.1-31.20 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216064" version="1" class="patch">
	<metadata>
		<title>libfreebl3-3.14.3-0.11.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreebl3-3.14.3-0.11.11 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3170">CVE-2010-3170 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0743">CVE-2013-0743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989849" comment="libfreebl3-3.14.3-0.11.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989850" comment="libfreebl3-32bit-3.14.3-0.11.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989851" comment="libfreebl3-x86-3.14.3-0.11.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989852" comment="libsoftokn3-3.14.3-0.11.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989853" comment="libsoftokn3-32bit-3.14.3-0.11.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989854" comment="libsoftokn3-x86-3.14.3-0.11.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989855" comment="mozilla-nss-3.14.3-0.11.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989856" comment="mozilla-nss-32bit-3.14.3-0.11.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989857" comment="mozilla-nss-tools-3.14.3-0.11.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989858" comment="mozilla-nss-x86-3.14.3-0.11.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216065" version="1" class="patch">
	<metadata>
		<title>libgdiplus0-2.6.7-0.5.76 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-1526" ref_url="https://www.suse.com/security/cve/CVE-2010-1526/" source="CVE"/>
		<description>
These are all security issues fixed in the libgdiplus0-2.6.7-0.5.76 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1526/">CVE-2010-1526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1526">CVE-2010-1526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989249" comment="libgdiplus0-2.6.7-0.5.76 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216066" version="1" class="patch">
	<metadata>
		<title>libgnomesu-1.0.0-307.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1946" ref_url="https://www.suse.com/security/cve/CVE-2011-1946/" source="CVE"/>
		<description>
These are all security issues fixed in the libgnomesu-1.0.0-307.10.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1946/">CVE-2011-1946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1946">CVE-2011-1946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989250" comment="libgnomesu-1.0.0-307.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989251" comment="libgnomesu-lang-1.0.0-307.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989252" comment="libgnomesu0-1.0.0-307.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216067" version="1" class="patch">
	<metadata>
		<title>libgtop-2.28.0-1.9.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-0235" ref_url="https://www.suse.com/security/cve/CVE-2007-0235/" source="CVE"/>
		<description>
These are all security issues fixed in the libgtop-2.28.0-1.9.24 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0235/">CVE-2007-0235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0235">CVE-2007-0235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989859" comment="libgtop-2.28.0-1.9.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989860" comment="libgtop-2_0-7-2.28.0-1.9.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989861" comment="libgtop-doc-2.28.0-1.9.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989862" comment="libgtop-lang-2.28.0-1.9.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216068" version="1" class="patch">
	<metadata>
		<title>libicu-32bit-4.0-7.26.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-4770" ref_url="https://www.suse.com/security/cve/CVE-2007-4770/" source="CVE"/>
		<reference ref_id="CVE-2007-4771" ref_url="https://www.suse.com/security/cve/CVE-2007-4771/" source="CVE"/>
		<reference ref_id="CVE-2008-1036" ref_url="https://www.suse.com/security/cve/CVE-2008-1036/" source="CVE"/>
		<reference ref_id="CVE-2009-0153" ref_url="https://www.suse.com/security/cve/CVE-2009-0153/" source="CVE"/>
		<reference ref_id="CVE-2010-4409" ref_url="https://www.suse.com/security/cve/CVE-2010-4409/" source="CVE"/>
		<description>
These are all security issues fixed in the libicu-32bit-4.0-7.26.15 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4770/">CVE-2007-4770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4770">CVE-2007-4770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4771/">CVE-2007-4771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4771">CVE-2007-4771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1036/">CVE-2008-1036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1036">CVE-2008-1036 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0153/">CVE-2009-0153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0153">CVE-2009-0153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4409/">CVE-2010-4409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4409">CVE-2010-4409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989863" comment="libicu-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989864" comment="libicu-32bit-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989865" comment="libicu-doc-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989866" comment="libicu-x86-4.0-7.26.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216069" version="1" class="patch">
	<metadata>
		<title>libltdl7-2.2.6-2.131.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-3736" ref_url="https://www.suse.com/security/cve/CVE-2009-3736/" source="CVE"/>
		<description>
These are all security issues fixed in the libltdl7-2.2.6-2.131.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3736/">CVE-2009-3736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3736">CVE-2009-3736 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988675" comment="libltdl7-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988676" comment="libltdl7-32bit-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988677" comment="libltdl7-x86-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988678" comment="libtool-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988679" comment="libtool-32bit-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988680" comment="libtool-x86-2.2.6-2.131.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216070" version="1" class="patch">
	<metadata>
		<title>libmusicbrainz4-2.1.5-5.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-4197" ref_url="https://www.suse.com/security/cve/CVE-2006-4197/" source="CVE"/>
		<description>
These are all security issues fixed in the libmusicbrainz4-2.1.5-5.18 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4197/">CVE-2006-4197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4197">CVE-2006-4197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988681" comment="libmusicbrainz4-2.1.5-5.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216071" version="1" class="patch">
	<metadata>
		<title>libmysqlclient15-32bit-5.0.96-0.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-0903" ref_url="https://www.suse.com/security/cve/CVE-2006-0903/" source="CVE"/>
		<reference ref_id="CVE-2006-4226" ref_url="https://www.suse.com/security/cve/CVE-2006-4226/" source="CVE"/>
		<reference ref_id="CVE-2006-4227" ref_url="https://www.suse.com/security/cve/CVE-2006-4227/" source="CVE"/>
		<reference ref_id="CVE-2007-5969" ref_url="https://www.suse.com/security/cve/CVE-2007-5969/" source="CVE"/>
		<reference ref_id="CVE-2007-6303" ref_url="https://www.suse.com/security/cve/CVE-2007-6303/" source="CVE"/>
		<reference ref_id="CVE-2007-6304" ref_url="https://www.suse.com/security/cve/CVE-2007-6304/" source="CVE"/>
		<reference ref_id="CVE-2008-2079" ref_url="https://www.suse.com/security/cve/CVE-2008-2079/" source="CVE"/>
		<reference ref_id="CVE-2008-4456" ref_url="https://www.suse.com/security/cve/CVE-2008-4456/" source="CVE"/>
		<reference ref_id="CVE-2008-7247" ref_url="https://www.suse.com/security/cve/CVE-2008-7247/" source="CVE"/>
		<reference ref_id="CVE-2009-2446" ref_url="https://www.suse.com/security/cve/CVE-2009-2446/" source="CVE"/>
		<reference ref_id="CVE-2009-4019" ref_url="https://www.suse.com/security/cve/CVE-2009-4019/" source="CVE"/>
		<reference ref_id="CVE-2009-4028" ref_url="https://www.suse.com/security/cve/CVE-2009-4028/" source="CVE"/>
		<reference ref_id="CVE-2009-4030" ref_url="https://www.suse.com/security/cve/CVE-2009-4030/" source="CVE"/>
		<reference ref_id="CVE-2009-4484" ref_url="https://www.suse.com/security/cve/CVE-2009-4484/" source="CVE"/>
		<reference ref_id="CVE-2009-5026" ref_url="https://www.suse.com/security/cve/CVE-2009-5026/" source="CVE"/>
		<reference ref_id="CVE-2010-1626" ref_url="https://www.suse.com/security/cve/CVE-2010-1626/" source="CVE"/>
		<reference ref_id="CVE-2010-1848" ref_url="https://www.suse.com/security/cve/CVE-2010-1848/" source="CVE"/>
		<reference ref_id="CVE-2010-1849" ref_url="https://www.suse.com/security/cve/CVE-2010-1849/" source="CVE"/>
		<reference ref_id="CVE-2010-1850" ref_url="https://www.suse.com/security/cve/CVE-2010-1850/" source="CVE"/>
		<reference ref_id="CVE-2010-3833" ref_url="https://www.suse.com/security/cve/CVE-2010-3833/" source="CVE"/>
		<reference ref_id="CVE-2010-3834" ref_url="https://www.suse.com/security/cve/CVE-2010-3834/" source="CVE"/>
		<reference ref_id="CVE-2010-3835" ref_url="https://www.suse.com/security/cve/CVE-2010-3835/" source="CVE"/>
		<reference ref_id="CVE-2010-3836" ref_url="https://www.suse.com/security/cve/CVE-2010-3836/" source="CVE"/>
		<reference ref_id="CVE-2010-3837" ref_url="https://www.suse.com/security/cve/CVE-2010-3837/" source="CVE"/>
		<reference ref_id="CVE-2010-3838" ref_url="https://www.suse.com/security/cve/CVE-2010-3838/" source="CVE"/>
		<reference ref_id="CVE-2010-3839" ref_url="https://www.suse.com/security/cve/CVE-2010-3839/" source="CVE"/>
		<reference ref_id="CVE-2010-3840" ref_url="https://www.suse.com/security/cve/CVE-2010-3840/" source="CVE"/>
		<reference ref_id="CVE-2012-2122" ref_url="https://www.suse.com/security/cve/CVE-2012-2122/" source="CVE"/>
		<reference ref_id="CVE-2012-5611" ref_url="https://www.suse.com/security/cve/CVE-2012-5611/" source="CVE"/>
		<description>
These are all security issues fixed in the libmysqlclient15-32bit-5.0.96-0.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0903/">CVE-2006-0903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0903">CVE-2006-0903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4226/">CVE-2006-4226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4226">CVE-2006-4226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4227/">CVE-2006-4227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4227">CVE-2006-4227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5969/">CVE-2007-5969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5969">CVE-2007-5969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6303/">CVE-2007-6303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6303">CVE-2007-6303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6304/">CVE-2007-6304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6304">CVE-2007-6304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2079/">CVE-2008-2079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2079">CVE-2008-2079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4456/">CVE-2008-4456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4456">CVE-2008-4456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-7247/">CVE-2008-7247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-7247">CVE-2008-7247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2446/">CVE-2009-2446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2446">CVE-2009-2446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4019/">CVE-2009-4019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4019">CVE-2009-4019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4028/">CVE-2009-4028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4028">CVE-2009-4028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4030/">CVE-2009-4030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4030">CVE-2009-4030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4484/">CVE-2009-4484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4484">CVE-2009-4484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5026/">CVE-2009-5026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5026">CVE-2009-5026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1626/">CVE-2010-1626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1626">CVE-2010-1626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1848/">CVE-2010-1848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1848">CVE-2010-1848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1849/">CVE-2010-1849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1849">CVE-2010-1849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1850/">CVE-2010-1850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1850">CVE-2010-1850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3833/">CVE-2010-3833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3833">CVE-2010-3833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3834/">CVE-2010-3834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3834">CVE-2010-3834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3835/">CVE-2010-3835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3835">CVE-2010-3835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3836/">CVE-2010-3836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3836">CVE-2010-3836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3837/">CVE-2010-3837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3837">CVE-2010-3837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3838/">CVE-2010-3838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3838">CVE-2010-3838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3839/">CVE-2010-3839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3839">CVE-2010-3839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3840/">CVE-2010-3840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3840">CVE-2010-3840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2122/">CVE-2012-2122 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2122">CVE-2012-2122 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5611/">CVE-2012-5611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5611">CVE-2012-5611 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989867" comment="libmysqlclient15-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989868" comment="libmysqlclient15-32bit-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989869" comment="libmysqlclient15-x86-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989870" comment="libmysqlclient_r15-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989871" comment="mysql-5.5.31-0.7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989872" comment="mysql-client-5.5.31-0.7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989873" comment="mysql-tools-5.5.31-0.7.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216072" version="1" class="patch">
	<metadata>
		<title>libneon27-0.29.6-6.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-0157" ref_url="https://www.suse.com/security/cve/CVE-2007-0157/" source="CVE"/>
		<reference ref_id="CVE-2008-3746" ref_url="https://www.suse.com/security/cve/CVE-2008-3746/" source="CVE"/>
		<reference ref_id="CVE-2009-2473" ref_url="https://www.suse.com/security/cve/CVE-2009-2473/" source="CVE"/>
		<reference ref_id="CVE-2009-2474" ref_url="https://www.suse.com/security/cve/CVE-2009-2474/" source="CVE"/>
		<description>
These are all security issues fixed in the libneon27-0.29.6-6.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0157/">CVE-2007-0157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0157">CVE-2007-0157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3746/">CVE-2008-3746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3746">CVE-2008-3746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2473/">CVE-2009-2473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2473">CVE-2009-2473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2474/">CVE-2009-2474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2474">CVE-2009-2474 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989264" comment="libneon27-0.29.6-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989265" comment="libneon27-32bit-0.29.6-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989266" comment="libneon27-x86-0.29.6-6.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216073" version="1" class="patch">
	<metadata>
		<title>libnetpbm10-10.26.44-101.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-4274" ref_url="https://www.suse.com/security/cve/CVE-2009-4274/" source="CVE"/>
		<description>
These are all security issues fixed in the libnetpbm10-10.26.44-101.9.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4274/">CVE-2009-4274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4274">CVE-2009-4274 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988693" comment="libnetpbm10-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988694" comment="libnetpbm10-32bit-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988695" comment="libnetpbm10-x86-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988696" comment="netpbm-10.26.44-101.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216074" version="1" class="patch">
	<metadata>
		<title>libnewt0_52-0.52.10-1.35.113 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-2905" ref_url="https://www.suse.com/security/cve/CVE-2009-2905/" source="CVE"/>
		<description>
These are all security issues fixed in the libnewt0_52-0.52.10-1.35.113 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2905/">CVE-2009-2905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2905">CVE-2009-2905 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989874" comment="libnewt0_52-0.52.10-1.35.113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989875" comment="newt-0.52.10-1.35.113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989876" comment="python-newt-0.52.10-1.35.113 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216075" version="1" class="patch">
	<metadata>
		<title>libopensc2-0.11.6-5.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-2235" ref_url="https://www.suse.com/security/cve/CVE-2008-2235/" source="CVE"/>
		<reference ref_id="CVE-2009-0368" ref_url="https://www.suse.com/security/cve/CVE-2009-0368/" source="CVE"/>
		<description>
These are all security issues fixed in the libopensc2-0.11.6-5.27.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2235/">CVE-2008-2235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2235">CVE-2008-2235 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0368/">CVE-2009-0368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0368">CVE-2009-0368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989270" comment="libopensc2-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989271" comment="libopensc2-32bit-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989272" comment="libopensc2-x86-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989273" comment="opensc-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989274" comment="opensc-32bit-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989275" comment="opensc-x86-0.11.6-5.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216076" version="1" class="patch">
	<metadata>
		<title>libopenssl0_9_8-0.9.8j-0.50.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-2937" ref_url="https://www.suse.com/security/cve/CVE-2006-2937/" source="CVE"/>
		<reference ref_id="CVE-2006-2940" ref_url="https://www.suse.com/security/cve/CVE-2006-2940/" source="CVE"/>
		<reference ref_id="CVE-2006-3738" ref_url="https://www.suse.com/security/cve/CVE-2006-3738/" source="CVE"/>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2006-4343" ref_url="https://www.suse.com/security/cve/CVE-2006-4343/" source="CVE"/>
		<reference ref_id="CVE-2006-7250" ref_url="https://www.suse.com/security/cve/CVE-2006-7250/" source="CVE"/>
		<reference ref_id="CVE-2007-3108" ref_url="https://www.suse.com/security/cve/CVE-2007-3108/" source="CVE"/>
		<reference ref_id="CVE-2007-4995" ref_url="https://www.suse.com/security/cve/CVE-2007-4995/" source="CVE"/>
		<reference ref_id="CVE-2007-5135" ref_url="https://www.suse.com/security/cve/CVE-2007-5135/" source="CVE"/>
		<reference ref_id="CVE-2008-0891" ref_url="https://www.suse.com/security/cve/CVE-2008-0891/" source="CVE"/>
		<reference ref_id="CVE-2008-1672" ref_url="https://www.suse.com/security/cve/CVE-2008-1672/" source="CVE"/>
		<reference ref_id="CVE-2008-5077" ref_url="https://www.suse.com/security/cve/CVE-2008-5077/" source="CVE"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<reference ref_id="CVE-2009-3245" ref_url="https://www.suse.com/security/cve/CVE-2009-3245/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-4355" ref_url="https://www.suse.com/security/cve/CVE-2009-4355/" source="CVE"/>
		<reference ref_id="CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740/" source="CVE"/>
		<reference ref_id="CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939/" source="CVE"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2010-4180" ref_url="https://www.suse.com/security/cve/CVE-2010-4180/" source="CVE"/>
		<reference ref_id="CVE-2010-4252" ref_url="https://www.suse.com/security/cve/CVE-2010-4252/" source="CVE"/>
		<reference ref_id="CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014/" source="CVE"/>
		<reference ref_id="CVE-2011-3210" ref_url="https://www.suse.com/security/cve/CVE-2011-3210/" source="CVE"/>
		<reference ref_id="CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108/" source="CVE"/>
		<reference ref_id="CVE-2011-4109" ref_url="https://www.suse.com/security/cve/CVE-2011-4109/" source="CVE"/>
		<reference ref_id="CVE-2011-4354" ref_url="https://www.suse.com/security/cve/CVE-2011-4354/" source="CVE"/>
		<reference ref_id="CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576/" source="CVE"/>
		<reference ref_id="CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577/" source="CVE"/>
		<reference ref_id="CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619/" source="CVE"/>
		<reference ref_id="CVE-2011-5095" ref_url="https://www.suse.com/security/cve/CVE-2011-5095/" source="CVE"/>
		<reference ref_id="CVE-2012-0050" ref_url="https://www.suse.com/security/cve/CVE-2012-0050/" source="CVE"/>
		<reference ref_id="CVE-2012-0884" ref_url="https://www.suse.com/security/cve/CVE-2012-0884/" source="CVE"/>
		<reference ref_id="CVE-2012-1165" ref_url="https://www.suse.com/security/cve/CVE-2012-1165/" source="CVE"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="CVE-2012-2131" ref_url="https://www.suse.com/security/cve/CVE-2012-2131/" source="CVE"/>
		<reference ref_id="CVE-2012-2333" ref_url="https://www.suse.com/security/cve/CVE-2012-2333/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl0_9_8-0.9.8j-0.50.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2937/">CVE-2006-2937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2937">CVE-2006-2937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2940/">CVE-2006-2940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2940">CVE-2006-2940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3738/">CVE-2006-3738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3738">CVE-2006-3738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4339">CVE-2006-4339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4343/">CVE-2006-4343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4343">CVE-2006-4343 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-7250/">CVE-2006-7250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-7250">CVE-2006-7250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3108/">CVE-2007-3108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3108">CVE-2007-3108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4995/">CVE-2007-4995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4995">CVE-2007-4995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5135/">CVE-2007-5135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5135">CVE-2007-5135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0891/">CVE-2008-0891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0891">CVE-2008-0891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1672/">CVE-2008-1672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1672">CVE-2008-1672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5077/">CVE-2008-5077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5077">CVE-2008-5077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0590">CVE-2009-0590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0591">CVE-2009-0591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0789">CVE-2009-0789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1377">CVE-2009-1377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1378">CVE-2009-1378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1379">CVE-2009-1379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1386">CVE-2009-1386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1387">CVE-2009-1387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3245/">CVE-2009-3245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3245">CVE-2009-3245 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4355/">CVE-2009-4355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4355">CVE-2009-4355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0740">CVE-2010-0740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2939">CVE-2010-2939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3864">CVE-2010-3864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4180/">CVE-2010-4180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4180">CVE-2010-4180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4252/">CVE-2010-4252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4252">CVE-2010-4252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0014">CVE-2011-0014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3210/">CVE-2011-3210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3210">CVE-2011-3210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4108">CVE-2011-4108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4109/">CVE-2011-4109 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4109">CVE-2011-4109 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4354/">CVE-2011-4354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4354">CVE-2011-4354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4576">CVE-2011-4576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4577">CVE-2011-4577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4619">CVE-2011-4619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5095/">CVE-2011-5095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-5095">CVE-2011-5095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0050/">CVE-2012-0050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0050">CVE-2012-0050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0884/">CVE-2012-0884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0884">CVE-2012-0884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1165/">CVE-2012-1165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1165">CVE-2012-1165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2110">CVE-2012-2110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2131/">CVE-2012-2131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2131">CVE-2012-2131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2333/">CVE-2012-2333 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2333">CVE-2012-2333 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4929">CVE-2012-4929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0166">CVE-2013-0166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0169">CVE-2013-0169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989877" comment="libopenssl0_9_8-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989878" comment="libopenssl0_9_8-32bit-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989879" comment="libopenssl0_9_8-hmac-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989880" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989881" comment="libopenssl0_9_8-x86-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989882" comment="openssl-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989883" comment="openssl-doc-0.9.8j-0.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216077" version="1" class="patch">
	<metadata>
		<title>libotr2-3.2.0-10.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-3461" ref_url="https://www.suse.com/security/cve/CVE-2012-3461/" source="CVE"/>
		<description>
These are all security issues fixed in the libotr2-3.2.0-10.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3461/">CVE-2012-3461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3461">CVE-2012-3461 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989884" comment="libotr2-3.2.0-10.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216078" version="1" class="patch">
	<metadata>
		<title>libpng12-0-1.2.31-5.31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-5793" ref_url="https://www.suse.com/security/cve/CVE-2006-5793/" source="CVE"/>
		<reference ref_id="CVE-2008-3964" ref_url="https://www.suse.com/security/cve/CVE-2008-3964/" source="CVE"/>
		<reference ref_id="CVE-2008-5907" ref_url="https://www.suse.com/security/cve/CVE-2008-5907/" source="CVE"/>
		<reference ref_id="CVE-2008-6218" ref_url="https://www.suse.com/security/cve/CVE-2008-6218/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-2042" ref_url="https://www.suse.com/security/cve/CVE-2009-2042/" source="CVE"/>
		<reference ref_id="CVE-2009-5063" ref_url="https://www.suse.com/security/cve/CVE-2009-5063/" source="CVE"/>
		<reference ref_id="CVE-2010-0205" ref_url="https://www.suse.com/security/cve/CVE-2010-0205/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-2249" ref_url="https://www.suse.com/security/cve/CVE-2010-2249/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-2690" ref_url="https://www.suse.com/security/cve/CVE-2011-2690/" source="CVE"/>
		<reference ref_id="CVE-2011-2691" ref_url="https://www.suse.com/security/cve/CVE-2011-2691/" source="CVE"/>
		<reference ref_id="CVE-2011-2692" ref_url="https://www.suse.com/security/cve/CVE-2011-2692/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3048" ref_url="https://www.suse.com/security/cve/CVE-2011-3048/" source="CVE"/>
		<reference ref_id="CVE-2012-3425" ref_url="https://www.suse.com/security/cve/CVE-2012-3425/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng12-0-1.2.31-5.31.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5793/">CVE-2006-5793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5793">CVE-2006-5793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3964/">CVE-2008-3964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3964">CVE-2008-3964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5907/">CVE-2008-5907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5907">CVE-2008-5907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-6218/">CVE-2008-6218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-6218">CVE-2008-6218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0040">CVE-2009-0040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2042/">CVE-2009-2042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2042">CVE-2009-2042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5063/">CVE-2009-5063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5063">CVE-2009-5063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0205/">CVE-2010-0205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0205">CVE-2010-0205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1205">CVE-2010-1205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2249/">CVE-2010-2249 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2249">CVE-2010-2249 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2501">CVE-2011-2501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2690/">CVE-2011-2690 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2690">CVE-2011-2690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2691/">CVE-2011-2691 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2691">CVE-2011-2691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2692/">CVE-2011-2692 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2692">CVE-2011-2692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3026">CVE-2011-3026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3048/">CVE-2011-3048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3048">CVE-2011-3048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3425/">CVE-2012-3425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3425">CVE-2012-3425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989885" comment="libpng12-0-1.2.31-5.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989886" comment="libpng12-0-32bit-1.2.31-5.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989887" comment="libpng12-0-x86-1.2.31-5.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216079" version="1" class="patch">
	<metadata>
		<title>libpoppler-glib4-0.12.3-1.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-0104" ref_url="https://www.suse.com/security/cve/CVE-2007-0104/" source="CVE"/>
		<reference ref_id="CVE-2007-4352" ref_url="https://www.suse.com/security/cve/CVE-2007-4352/" source="CVE"/>
		<reference ref_id="CVE-2007-5392" ref_url="https://www.suse.com/security/cve/CVE-2007-5392/" source="CVE"/>
		<reference ref_id="CVE-2007-5393" ref_url="https://www.suse.com/security/cve/CVE-2007-5393/" source="CVE"/>
		<reference ref_id="CVE-2008-2950" ref_url="https://www.suse.com/security/cve/CVE-2008-2950/" source="CVE"/>
		<reference ref_id="CVE-2009-0755" ref_url="https://www.suse.com/security/cve/CVE-2009-0755/" source="CVE"/>
		<reference ref_id="CVE-2009-0756" ref_url="https://www.suse.com/security/cve/CVE-2009-0756/" source="CVE"/>
		<reference ref_id="CVE-2009-0791" ref_url="https://www.suse.com/security/cve/CVE-2009-0791/" source="CVE"/>
		<reference ref_id="CVE-2009-0799" ref_url="https://www.suse.com/security/cve/CVE-2009-0799/" source="CVE"/>
		<reference ref_id="CVE-2009-0800" ref_url="https://www.suse.com/security/cve/CVE-2009-0800/" source="CVE"/>
		<reference ref_id="CVE-2009-1179" ref_url="https://www.suse.com/security/cve/CVE-2009-1179/" source="CVE"/>
		<reference ref_id="CVE-2009-1180" ref_url="https://www.suse.com/security/cve/CVE-2009-1180/" source="CVE"/>
		<reference ref_id="CVE-2009-1181" ref_url="https://www.suse.com/security/cve/CVE-2009-1181/" source="CVE"/>
		<reference ref_id="CVE-2009-1182" ref_url="https://www.suse.com/security/cve/CVE-2009-1182/" source="CVE"/>
		<reference ref_id="CVE-2009-1183" ref_url="https://www.suse.com/security/cve/CVE-2009-1183/" source="CVE"/>
		<reference ref_id="CVE-2009-1187" ref_url="https://www.suse.com/security/cve/CVE-2009-1187/" source="CVE"/>
		<reference ref_id="CVE-2009-1188" ref_url="https://www.suse.com/security/cve/CVE-2009-1188/" source="CVE"/>
		<reference ref_id="CVE-2009-3607" ref_url="https://www.suse.com/security/cve/CVE-2009-3607/" source="CVE"/>
		<reference ref_id="CVE-2009-3608" ref_url="https://www.suse.com/security/cve/CVE-2009-3608/" source="CVE"/>
		<reference ref_id="CVE-2010-3702" ref_url="https://www.suse.com/security/cve/CVE-2010-3702/" source="CVE"/>
		<reference ref_id="CVE-2010-3703" ref_url="https://www.suse.com/security/cve/CVE-2010-3703/" source="CVE"/>
		<reference ref_id="CVE-2010-3704" ref_url="https://www.suse.com/security/cve/CVE-2010-3704/" source="CVE"/>
		<reference ref_id="CVE-2013-1790" ref_url="https://www.suse.com/security/cve/CVE-2013-1790/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler-glib4-0.12.3-1.8.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0104/">CVE-2007-0104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0104">CVE-2007-0104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4352/">CVE-2007-4352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4352">CVE-2007-4352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5392/">CVE-2007-5392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5392">CVE-2007-5392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5393/">CVE-2007-5393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5393">CVE-2007-5393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2950/">CVE-2008-2950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2950">CVE-2008-2950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0755/">CVE-2009-0755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0755">CVE-2009-0755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0756/">CVE-2009-0756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0756">CVE-2009-0756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0791/">CVE-2009-0791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0791">CVE-2009-0791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0799/">CVE-2009-0799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0799">CVE-2009-0799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0800/">CVE-2009-0800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0800">CVE-2009-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1179/">CVE-2009-1179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1179">CVE-2009-1179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1180/">CVE-2009-1180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1180">CVE-2009-1180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1181/">CVE-2009-1181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1181">CVE-2009-1181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1182/">CVE-2009-1182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1182">CVE-2009-1182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1183/">CVE-2009-1183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1183">CVE-2009-1183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1187/">CVE-2009-1187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1187">CVE-2009-1187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1188/">CVE-2009-1188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1188">CVE-2009-1188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3607/">CVE-2009-3607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3607">CVE-2009-3607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3608/">CVE-2009-3608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3608">CVE-2009-3608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3702/">CVE-2010-3702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3702">CVE-2010-3702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3703/">CVE-2010-3703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3703">CVE-2010-3703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3704/">CVE-2010-3704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3704">CVE-2010-3704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1790/">CVE-2013-1790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1790">CVE-2013-1790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989888" comment="libpoppler-glib4-0.12.3-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989889" comment="libpoppler-qt4-3-0.12.3-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989890" comment="libpoppler5-0.12.3-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989891" comment="poppler-tools-0.12.3-1.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216080" version="1" class="patch">
	<metadata>
		<title>libproxy0-0.3.1-2.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-4505" ref_url="https://www.suse.com/security/cve/CVE-2012-4505/" source="CVE"/>
		<description>
These are all security issues fixed in the libproxy0-0.3.1-2.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4505/">CVE-2012-4505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4505">CVE-2012-4505 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989892" comment="libproxy0-0.3.1-2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989893" comment="libproxy0-32bit-0.3.1-2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989894" comment="libproxy0-config-gnome-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989895" comment="libproxy0-config-kde4-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989896" comment="libproxy0-networkmanager-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989897" comment="libproxy0-x86-0.3.1-2.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216081" version="1" class="patch">
	<metadata>
		<title>libpulse-browse0-0.9.23-0.7.128 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-0008" ref_url="https://www.suse.com/security/cve/CVE-2008-0008/" source="CVE"/>
		<description>
These are all security issues fixed in the libpulse-browse0-0.9.23-0.7.128 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0008/">CVE-2008-0008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0008">CVE-2008-0008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989288" comment="libpulse-browse0-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989289" comment="libpulse-mainloop-glib0-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989290" comment="libpulse0-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989291" comment="libpulse0-32bit-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989292" comment="libpulse0-x86-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989293" comment="pulseaudio-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989294" comment="pulseaudio-esound-compat-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989295" comment="pulseaudio-gdm-hooks-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989296" comment="pulseaudio-lang-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989297" comment="pulseaudio-module-x11-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989298" comment="pulseaudio-module-zeroconf-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989299" comment="pulseaudio-utils-0.9.23-0.7.128 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216082" version="1" class="patch">
	<metadata>
		<title>libpython2_6-1_0-2.6.8-0.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<reference ref_id="CVE-2010-3493" ref_url="https://www.suse.com/security/cve/CVE-2010-3493/" source="CVE"/>
		<reference ref_id="CVE-2011-1015" ref_url="https://www.suse.com/security/cve/CVE-2011-1015/" source="CVE"/>
		<reference ref_id="CVE-2011-1521" ref_url="https://www.suse.com/security/cve/CVE-2011-1521/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython2_6-1_0-2.6.8-0.15.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3560">CVE-2009-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3720">CVE-2009-3720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3493/">CVE-2010-3493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3493">CVE-2010-3493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1015/">CVE-2011-1015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1015">CVE-2011-1015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1521/">CVE-2011-1521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1521">CVE-2011-1521 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4944">CVE-2011-4944 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0845">CVE-2012-0845 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1150">CVE-2012-1150 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989898" comment="libpython2_6-1_0-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989899" comment="libpython2_6-1_0-32bit-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989900" comment="libpython2_6-1_0-x86-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989901" comment="python-base-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989902" comment="python-base-32bit-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989903" comment="python-base-x86-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989904" comment="python-xml-2.6.8-0.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216083" version="1" class="patch">
	<metadata>
		<title>librpcsecgss-0.18-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<description>
These are all security issues fixed in the librpcsecgss-0.18-1.15 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3999">CVE-2007-3999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988735" comment="librpcsecgss-0.18-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989309" comment="libtirpc1-0.2.1-1.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216084" version="1" class="patch">
	<metadata>
		<title>librsvg-2.26.0-2.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-3146" ref_url="https://www.suse.com/security/cve/CVE-2011-3146/" source="CVE"/>
		<description>
These are all security issues fixed in the librsvg-2.26.0-2.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3146/">CVE-2011-3146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3146">CVE-2011-3146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989310" comment="librsvg-2.26.0-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989311" comment="librsvg-32bit-2.26.0-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989312" comment="librsvg-x86-2.26.0-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989313" comment="rsvg-view-2.26.0-2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216085" version="1" class="patch">
	<metadata>
		<title>libsamplerate-0.1.4-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-5008" ref_url="https://www.suse.com/security/cve/CVE-2008-5008/" source="CVE"/>
		<description>
These are all security issues fixed in the libsamplerate-0.1.4-1.15 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5008/">CVE-2008-5008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5008">CVE-2008-5008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988737" comment="libsamplerate-0.1.4-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988738" comment="libsamplerate-32bit-0.1.4-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988739" comment="libsamplerate-x86-0.1.4-1.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216086" version="1" class="patch">
	<metadata>
		<title>libsndfile-1.0.20-2.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-4974" ref_url="https://www.suse.com/security/cve/CVE-2007-4974/" source="CVE"/>
		<reference ref_id="CVE-2009-0186" ref_url="https://www.suse.com/security/cve/CVE-2009-0186/" source="CVE"/>
		<reference ref_id="CVE-2009-1788" ref_url="https://www.suse.com/security/cve/CVE-2009-1788/" source="CVE"/>
		<reference ref_id="CVE-2009-1791" ref_url="https://www.suse.com/security/cve/CVE-2009-1791/" source="CVE"/>
		<reference ref_id="CVE-2009-4835" ref_url="https://www.suse.com/security/cve/CVE-2009-4835/" source="CVE"/>
		<reference ref_id="CVE-2011-2696" ref_url="https://www.suse.com/security/cve/CVE-2011-2696/" source="CVE"/>
		<description>
These are all security issues fixed in the libsndfile-1.0.20-2.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4974/">CVE-2007-4974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4974">CVE-2007-4974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0186/">CVE-2009-0186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0186">CVE-2009-0186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1788/">CVE-2009-1788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1788">CVE-2009-1788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1791/">CVE-2009-1791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1791">CVE-2009-1791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4835/">CVE-2009-4835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4835">CVE-2009-4835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2696/">CVE-2011-2696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2696">CVE-2011-2696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989314" comment="libsndfile-1.0.20-2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989315" comment="libsndfile-32bit-1.0.20-2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989316" comment="libsndfile-x86-1.0.20-2.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216087" version="1" class="patch">
	<metadata>
		<title>libsnmp15-32bit-5.4.2.1-8.12.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-4309" ref_url="https://www.suse.com/security/cve/CVE-2008-4309/" source="CVE"/>
		<reference ref_id="CVE-2008-6123" ref_url="https://www.suse.com/security/cve/CVE-2008-6123/" source="CVE"/>
		<reference ref_id="CVE-2012-2141" ref_url="https://www.suse.com/security/cve/CVE-2012-2141/" source="CVE"/>
		<description>
These are all security issues fixed in the libsnmp15-32bit-5.4.2.1-8.12.16.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4309/">CVE-2008-4309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4309">CVE-2008-4309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-6123/">CVE-2008-6123 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-6123">CVE-2008-6123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2141/">CVE-2012-2141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2141">CVE-2012-2141 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989905" comment="libsnmp15-5.4.2.1-8.12.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989906" comment="libsnmp15-32bit-5.4.2.1-8.12.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989907" comment="libsnmp15-x86-5.4.2.1-8.12.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989908" comment="net-snmp-5.4.2.1-8.12.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989909" comment="perl-SNMP-5.4.2.1-8.12.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989910" comment="snmp-mibs-5.4.2.1-8.12.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216088" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.32.2-4.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-5876" ref_url="https://www.suse.com/security/cve/CVE-2006-5876/" source="CVE"/>
		<reference ref_id="CVE-2011-2524" ref_url="https://www.suse.com/security/cve/CVE-2011-2524/" source="CVE"/>
		<reference ref_id="CVE-2012-2132" ref_url="https://www.suse.com/security/cve/CVE-2012-2132/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.32.2-4.13.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5876/">CVE-2006-5876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5876">CVE-2006-5876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2524/">CVE-2011-2524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2524">CVE-2011-2524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2132/">CVE-2012-2132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2132">CVE-2012-2132 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989911" comment="libsoup-2_4-1-2.32.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989912" comment="libsoup-2_4-1-32bit-2.32.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989913" comment="libsoup-2_4-1-x86-2.32.2-4.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216089" version="1" class="patch">
	<metadata>
		<title>libsss_idmap0-1.9.4-0.12.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-4341" ref_url="https://www.suse.com/security/cve/CVE-2010-4341/" source="CVE"/>
		<reference ref_id="CVE-2011-1758" ref_url="https://www.suse.com/security/cve/CVE-2011-1758/" source="CVE"/>
		<reference ref_id="CVE-2013-0219" ref_url="https://www.suse.com/security/cve/CVE-2013-0219/" source="CVE"/>
		<reference ref_id="CVE-2013-0220" ref_url="https://www.suse.com/security/cve/CVE-2013-0220/" source="CVE"/>
		<reference ref_id="CVE-2013-0287" ref_url="https://www.suse.com/security/cve/CVE-2013-0287/" source="CVE"/>
		<description>
These are all security issues fixed in the libsss_idmap0-1.9.4-0.12.24 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4341/">CVE-2010-4341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4341">CVE-2010-4341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1758/">CVE-2011-1758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1758">CVE-2011-1758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0219/">CVE-2013-0219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0219">CVE-2013-0219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0220/">CVE-2013-0220 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0220">CVE-2013-0220 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0287/">CVE-2013-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0287">CVE-2013-0287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989914" comment="libsss_idmap0-1.9.4-0.12.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989915" comment="python-sssd-config-1.9.4-0.12.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989916" comment="sssd-1.9.4-0.12.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989917" comment="sssd-32bit-1.9.4-0.12.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989918" comment="sssd-tools-1.9.4-0.12.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216090" version="1" class="patch">
	<metadata>
		<title>libtiff3-3.8.2-141.152.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-1586" ref_url="https://www.suse.com/security/cve/CVE-2008-1586/" source="CVE"/>
		<reference ref_id="CVE-2008-2327" ref_url="https://www.suse.com/security/cve/CVE-2008-2327/" source="CVE"/>
		<reference ref_id="CVE-2009-2285" ref_url="https://www.suse.com/security/cve/CVE-2009-2285/" source="CVE"/>
		<reference ref_id="CVE-2009-2347" ref_url="https://www.suse.com/security/cve/CVE-2009-2347/" source="CVE"/>
		<reference ref_id="CVE-2010-1411" ref_url="https://www.suse.com/security/cve/CVE-2010-1411/" source="CVE"/>
		<reference ref_id="CVE-2010-4665" ref_url="https://www.suse.com/security/cve/CVE-2010-4665/" source="CVE"/>
		<reference ref_id="CVE-2011-0191" ref_url="https://www.suse.com/security/cve/CVE-2011-0191/" source="CVE"/>
		<reference ref_id="CVE-2011-0192" ref_url="https://www.suse.com/security/cve/CVE-2011-0192/" source="CVE"/>
		<reference ref_id="CVE-2011-1167" ref_url="https://www.suse.com/security/cve/CVE-2011-1167/" source="CVE"/>
		<reference ref_id="CVE-2012-1173" ref_url="https://www.suse.com/security/cve/CVE-2012-1173/" source="CVE"/>
		<reference ref_id="CVE-2012-2088" ref_url="https://www.suse.com/security/cve/CVE-2012-2088/" source="CVE"/>
		<reference ref_id="CVE-2012-2113" ref_url="https://www.suse.com/security/cve/CVE-2012-2113/" source="CVE"/>
		<reference ref_id="CVE-2012-3401" ref_url="https://www.suse.com/security/cve/CVE-2012-3401/" source="CVE"/>
		<reference ref_id="CVE-2012-4447" ref_url="https://www.suse.com/security/cve/CVE-2012-4447/" source="CVE"/>
		<reference ref_id="CVE-2012-4564" ref_url="https://www.suse.com/security/cve/CVE-2012-4564/" source="CVE"/>
		<reference ref_id="CVE-2012-5581" ref_url="https://www.suse.com/security/cve/CVE-2012-5581/" source="CVE"/>
		<reference ref_id="CVE-2013-1960" ref_url="https://www.suse.com/security/cve/CVE-2013-1960/" source="CVE"/>
		<reference ref_id="CVE-2013-1961" ref_url="https://www.suse.com/security/cve/CVE-2013-1961/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff3-3.8.2-141.152.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1586/">CVE-2008-1586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1586">CVE-2008-1586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2327/">CVE-2008-2327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2327">CVE-2008-2327 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2285/">CVE-2009-2285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2285">CVE-2009-2285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2347/">CVE-2009-2347 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2347">CVE-2009-2347 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1411/">CVE-2010-1411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1411">CVE-2010-1411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4665/">CVE-2010-4665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4665">CVE-2010-4665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0191/">CVE-2011-0191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0191">CVE-2011-0191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0192/">CVE-2011-0192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0192">CVE-2011-0192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1167/">CVE-2011-1167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1167">CVE-2011-1167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1173/">CVE-2012-1173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1173">CVE-2012-1173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2088/">CVE-2012-2088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2088">CVE-2012-2088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2113/">CVE-2012-2113 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2113">CVE-2012-2113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3401/">CVE-2012-3401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3401">CVE-2012-3401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4447/">CVE-2012-4447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4447">CVE-2012-4447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4564/">CVE-2012-4564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4564">CVE-2012-4564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5581/">CVE-2012-5581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5581">CVE-2012-5581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1960/">CVE-2013-1960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1960">CVE-2013-1960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1961/">CVE-2013-1961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1961">CVE-2013-1961 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989919" comment="libtiff3-3.8.2-141.152.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989920" comment="libtiff3-32bit-3.8.2-141.152.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989921" comment="libtiff3-x86-3.8.2-141.152.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989922" comment="tiff-3.8.2-141.152.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216091" version="1" class="patch">
	<metadata>
		<title>libtspi1-0.3.10-0.9.50 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-0698" ref_url="https://www.suse.com/security/cve/CVE-2012-0698/" source="CVE"/>
		<description>
These are all security issues fixed in the libtspi1-0.3.10-0.9.50 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0698/">CVE-2012-0698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0698">CVE-2012-0698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989923" comment="libtspi1-0.3.10-0.9.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989924" comment="libtspi1-32bit-0.3.10-0.9.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989925" comment="libtspi1-x86-0.3.10-0.9.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989926" comment="trousers-0.3.10-0.9.50 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216092" version="1" class="patch">
	<metadata>
		<title>libupsclient1-2.6.2-0.2.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-2944" ref_url="https://www.suse.com/security/cve/CVE-2012-2944/" source="CVE"/>
		<description>
These are all security issues fixed in the libupsclient1-2.6.2-0.2.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2944/">CVE-2012-2944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2944">CVE-2012-2944 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989927" comment="libupsclient1-2.6.2-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989928" comment="nut-2.6.2-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989929" comment="nut-classic-2.6.2-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989930" comment="nut-drivers-net-2.6.2-0.2.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216093" version="1" class="patch">
	<metadata>
		<title>libvirt-1.0.5.1-0.7.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-5086" ref_url="https://www.suse.com/security/cve/CVE-2008-5086/" source="CVE"/>
		<reference ref_id="CVE-2010-2242" ref_url="https://www.suse.com/security/cve/CVE-2010-2242/" source="CVE"/>
		<reference ref_id="CVE-2011-1146" ref_url="https://www.suse.com/security/cve/CVE-2011-1146/" source="CVE"/>
		<reference ref_id="CVE-2011-1486" ref_url="https://www.suse.com/security/cve/CVE-2011-1486/" source="CVE"/>
		<reference ref_id="CVE-2011-2511" ref_url="https://www.suse.com/security/cve/CVE-2011-2511/" source="CVE"/>
		<reference ref_id="CVE-2011-4600" ref_url="https://www.suse.com/security/cve/CVE-2011-4600/" source="CVE"/>
		<reference ref_id="CVE-2012-3445" ref_url="https://www.suse.com/security/cve/CVE-2012-3445/" source="CVE"/>
		<reference ref_id="CVE-2012-4423" ref_url="https://www.suse.com/security/cve/CVE-2012-4423/" source="CVE"/>
		<reference ref_id="CVE-2013-1962" ref_url="https://www.suse.com/security/cve/CVE-2013-1962/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-1.0.5.1-0.7.10 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5086/">CVE-2008-5086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5086">CVE-2008-5086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2242/">CVE-2010-2242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2242">CVE-2010-2242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1146/">CVE-2011-1146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1146">CVE-2011-1146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1486/">CVE-2011-1486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1486">CVE-2011-1486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2511/">CVE-2011-2511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2511">CVE-2011-2511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4600/">CVE-2011-4600 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2011-4600">CVE-2011-4600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3445/">CVE-2012-3445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3445">CVE-2012-3445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4423/">CVE-2012-4423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4423">CVE-2012-4423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1962/">CVE-2013-1962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1962">CVE-2013-1962 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989931" comment="libvirt-1.0.5.1-0.7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989932" comment="libvirt-client-1.0.5.1-0.7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989933" comment="libvirt-client-32bit-1.0.5.1-0.7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989934" comment="libvirt-doc-1.0.5.1-0.7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989935" comment="libvirt-lock-sanlock-1.0.5.1-0.7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989936" comment="libvirt-python-1.0.5.1-0.7.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216094" version="1" class="patch">
	<metadata>
		<title>libvorbis-1.2.0-79.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-3106" ref_url="https://www.suse.com/security/cve/CVE-2007-3106/" source="CVE"/>
		<reference ref_id="CVE-2008-1419" ref_url="https://www.suse.com/security/cve/CVE-2008-1419/" source="CVE"/>
		<reference ref_id="CVE-2008-1420" ref_url="https://www.suse.com/security/cve/CVE-2008-1420/" source="CVE"/>
		<reference ref_id="CVE-2008-1423" ref_url="https://www.suse.com/security/cve/CVE-2008-1423/" source="CVE"/>
		<reference ref_id="CVE-2009-2663" ref_url="https://www.suse.com/security/cve/CVE-2009-2663/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<description>
These are all security issues fixed in the libvorbis-1.2.0-79.20.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3106/">CVE-2007-3106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3106">CVE-2007-3106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1419/">CVE-2008-1419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1419">CVE-2008-1419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1420/">CVE-2008-1420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1420">CVE-2008-1420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1423/">CVE-2008-1423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1423">CVE-2008-1423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2663/">CVE-2009-2663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2663">CVE-2009-2663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3379">CVE-2009-3379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0444">CVE-2012-0444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989937" comment="libvorbis-1.2.0-79.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989938" comment="libvorbis-32bit-1.2.0-79.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989939" comment="libvorbis-doc-1.2.0-79.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989940" comment="libvorbis-x86-1.2.0-79.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216095" version="1" class="patch">
	<metadata>
		<title>libxcrypt-3.0.3-0.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<description>
These are all security issues fixed in the libxcrypt-3.0.3-0.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2483">CVE-2011-2483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989339" comment="libxcrypt-3.0.3-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989340" comment="libxcrypt-32bit-3.0.3-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989341" comment="libxcrypt-x86-3.0.3-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989342" comment="pam-modules-11-1.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989343" comment="pam-modules-32bit-11-1.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989344" comment="pam-modules-x86-11-1.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989345" comment="pwdutils-3.2.15-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989346" comment="pwdutils-plugin-audit-3.2.15-0.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216096" version="1" class="patch">
	<metadata>
		<title>libxml2-2.7.6-0.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-6284" ref_url="https://www.suse.com/security/cve/CVE-2007-6284/" source="CVE"/>
		<reference ref_id="CVE-2008-4225" ref_url="https://www.suse.com/security/cve/CVE-2008-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-4226" ref_url="https://www.suse.com/security/cve/CVE-2008-4226/" source="CVE"/>
		<reference ref_id="CVE-2008-4409" ref_url="https://www.suse.com/security/cve/CVE-2008-4409/" source="CVE"/>
		<reference ref_id="CVE-2009-2414" ref_url="https://www.suse.com/security/cve/CVE-2009-2414/" source="CVE"/>
		<reference ref_id="CVE-2009-2416" ref_url="https://www.suse.com/security/cve/CVE-2009-2416/" source="CVE"/>
		<reference ref_id="CVE-2010-4494" ref_url="https://www.suse.com/security/cve/CVE-2010-4494/" source="CVE"/>
		<reference ref_id="CVE-2011-1944" ref_url="https://www.suse.com/security/cve/CVE-2011-1944/" source="CVE"/>
		<reference ref_id="CVE-2011-2821" ref_url="https://www.suse.com/security/cve/CVE-2011-2821/" source="CVE"/>
		<reference ref_id="CVE-2011-3102" ref_url="https://www.suse.com/security/cve/CVE-2011-3102/" source="CVE"/>
		<reference ref_id="CVE-2011-3919" ref_url="https://www.suse.com/security/cve/CVE-2011-3919/" source="CVE"/>
		<reference ref_id="CVE-2012-0841" ref_url="https://www.suse.com/security/cve/CVE-2012-0841/" source="CVE"/>
		<reference ref_id="CVE-2012-2807" ref_url="https://www.suse.com/security/cve/CVE-2012-2807/" source="CVE"/>
		<reference ref_id="CVE-2012-5134" ref_url="https://www.suse.com/security/cve/CVE-2012-5134/" source="CVE"/>
		<reference ref_id="CVE-2013-0338" ref_url="https://www.suse.com/security/cve/CVE-2013-0338/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2.7.6-0.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6284/">CVE-2007-6284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6284">CVE-2007-6284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4225/">CVE-2008-4225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4225">CVE-2008-4225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4226/">CVE-2008-4226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4226">CVE-2008-4226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4409/">CVE-2008-4409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4409">CVE-2008-4409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2414/">CVE-2009-2414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2414">CVE-2009-2414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2416/">CVE-2009-2416 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-2416">CVE-2009-2416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4494/">CVE-2010-4494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4494">CVE-2010-4494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1944/">CVE-2011-1944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1944">CVE-2011-1944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2821/">CVE-2011-2821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2821">CVE-2011-2821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3102/">CVE-2011-3102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3102">CVE-2011-3102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3919/">CVE-2011-3919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3919">CVE-2011-3919 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0841/">CVE-2012-0841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0841">CVE-2012-0841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2807/">CVE-2012-2807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2807">CVE-2012-2807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5134/">CVE-2012-5134 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5134">CVE-2012-5134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0338/">CVE-2013-0338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0338">CVE-2013-0338 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989941" comment="libxml2-2.7.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989942" comment="libxml2-32bit-2.7.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989943" comment="libxml2-doc-2.7.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989944" comment="libxml2-x86-2.7.6-0.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216097" version="1" class="patch">
	<metadata>
		<title>libxslt-1.1.24-19.21.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-1767" ref_url="https://www.suse.com/security/cve/CVE-2008-1767/" source="CVE"/>
		<reference ref_id="CVE-2011-3970" ref_url="https://www.suse.com/security/cve/CVE-2011-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-2825" ref_url="https://www.suse.com/security/cve/CVE-2012-2825/" source="CVE"/>
		<reference ref_id="CVE-2012-6139" ref_url="https://www.suse.com/security/cve/CVE-2012-6139/" source="CVE"/>
		<description>
These are all security issues fixed in the libxslt-1.1.24-19.21.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1767/">CVE-2008-1767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1767">CVE-2008-1767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3970/">CVE-2011-3970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3970">CVE-2011-3970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2825/">CVE-2012-2825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2825">CVE-2012-2825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6139/">CVE-2012-6139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6139">CVE-2012-6139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989945" comment="libxslt-1.1.24-19.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989946" comment="libxslt-32bit-1.1.24-19.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989947" comment="libxslt-x86-1.1.24-19.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216098" version="1" class="patch">
	<metadata>
		<title>libzip1-0.9-1.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<description>
These are all security issues fixed in the libzip1-0.9-1.24.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0421">CVE-2011-0421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989351" comment="libzip1-0.9-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216099" version="1" class="patch">
	<metadata>
		<title>log4net-1.2.10-1.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-0743" ref_url="https://www.suse.com/security/cve/CVE-2006-0743/" source="CVE"/>
		<description>
These are all security issues fixed in the log4net-1.2.10-1.36 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0743/">CVE-2006-0743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0743">CVE-2006-0743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988770" comment="log4net-1.2.10-1.36 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216100" version="1" class="patch">
	<metadata>
		<title>logrotate-3.7.7-10.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1098" ref_url="https://www.suse.com/security/cve/CVE-2011-1098/" source="CVE"/>
		<reference ref_id="CVE-2011-1154" ref_url="https://www.suse.com/security/cve/CVE-2011-1154/" source="CVE"/>
		<reference ref_id="CVE-2011-1155" ref_url="https://www.suse.com/security/cve/CVE-2011-1155/" source="CVE"/>
		<description>
These are all security issues fixed in the logrotate-3.7.7-10.26.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1098/">CVE-2011-1098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1098">CVE-2011-1098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1154/">CVE-2011-1154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1154">CVE-2011-1154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1155/">CVE-2011-1155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1155">CVE-2011-1155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989948" comment="logrotate-3.7.7-10.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216101" version="1" class="patch">
	<metadata>
		<title>logwatch-7.3.6-65.72.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1018" ref_url="https://www.suse.com/security/cve/CVE-2011-1018/" source="CVE"/>
		<description>
These are all security issues fixed in the logwatch-7.3.6-65.72.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1018/">CVE-2011-1018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1018">CVE-2011-1018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989353" comment="logwatch-7.3.6-65.72.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216102" version="1" class="patch">
	<metadata>
		<title>lvm2-2.02.98-0.25.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2526" ref_url="https://www.suse.com/security/cve/CVE-2010-2526/" source="CVE"/>
		<description>
These are all security issues fixed in the lvm2-2.02.98-0.25.3 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2526/">CVE-2010-2526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2526">CVE-2010-2526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989949" comment="lvm2-2.02.98-0.25.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216103" version="1" class="patch">
	<metadata>
		<title>mailman-2.1.14-9.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-2191" ref_url="https://www.suse.com/security/cve/CVE-2006-2191/" source="CVE"/>
		<reference ref_id="CVE-2006-2941" ref_url="https://www.suse.com/security/cve/CVE-2006-2941/" source="CVE"/>
		<reference ref_id="CVE-2006-3636" ref_url="https://www.suse.com/security/cve/CVE-2006-3636/" source="CVE"/>
		<reference ref_id="CVE-2010-3089" ref_url="https://www.suse.com/security/cve/CVE-2010-3089/" source="CVE"/>
		<reference ref_id="CVE-2010-3090" ref_url="https://www.suse.com/security/cve/CVE-2010-3090/" source="CVE"/>
		<reference ref_id="CVE-2011-0707" ref_url="https://www.suse.com/security/cve/CVE-2011-0707/" source="CVE"/>
		<description>
These are all security issues fixed in the mailman-2.1.14-9.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2191/">CVE-2006-2191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2191">CVE-2006-2191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2941/">CVE-2006-2941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2941">CVE-2006-2941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3636/">CVE-2006-3636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3636">CVE-2006-3636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3089/">CVE-2010-3089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3089">CVE-2010-3089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3090/">CVE-2010-3090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3090">CVE-2010-3090 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0707/">CVE-2011-0707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0707">CVE-2011-0707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989950" comment="mailman-2.1.14-9.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216104" version="1" class="patch">
	<metadata>
		<title>man-2.5.2-17.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-4250" ref_url="https://www.suse.com/security/cve/CVE-2006-4250/" source="CVE"/>
		<description>
These are all security issues fixed in the man-2.5.2-17.16 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4250/">CVE-2006-4250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4250">CVE-2006-4250 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988772" comment="man-2.5.2-17.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216105" version="1" class="patch">
	<metadata>
		<title>mipv6d-2.0.2.umip.0.4-8.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2522" ref_url="https://www.suse.com/security/cve/CVE-2010-2522/" source="CVE"/>
		<reference ref_id="CVE-2010-2523" ref_url="https://www.suse.com/security/cve/CVE-2010-2523/" source="CVE"/>
		<description>
These are all security issues fixed in the mipv6d-2.0.2.umip.0.4-8.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2522/">CVE-2010-2522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2522">CVE-2010-2522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2523/">CVE-2010-2523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2523">CVE-2010-2523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989356" comment="mipv6d-2.0.2.umip.0.4-8.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216106" version="1" class="patch">
	<metadata>
		<title>mono-core-2.6.7-0.7.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0217" ref_url="https://www.suse.com/security/cve/CVE-2009-0217/" source="CVE"/>
		<reference ref_id="CVE-2010-1459" ref_url="https://www.suse.com/security/cve/CVE-2010-1459/" source="CVE"/>
		<reference ref_id="CVE-2010-3332" ref_url="https://www.suse.com/security/cve/CVE-2010-3332/" source="CVE"/>
		<reference ref_id="CVE-2010-4159" ref_url="https://www.suse.com/security/cve/CVE-2010-4159/" source="CVE"/>
		<description>
These are all security issues fixed in the mono-core-2.6.7-0.7.19 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0217/">CVE-2009-0217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0217">CVE-2009-0217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1459/">CVE-2010-1459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1459">CVE-2010-1459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3332/">CVE-2010-3332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3332">CVE-2010-3332 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4159/">CVE-2010-4159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4159">CVE-2010-4159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989357" comment="mono-core-2.6.7-0.7.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989358" comment="mono-data-2.6.7-0.7.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989359" comment="mono-data-postgresql-2.6.7-0.7.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989360" comment="mono-data-sqlite-2.6.7-0.7.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989361" comment="mono-locale-extras-2.6.7-0.7.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989362" comment="mono-nunit-2.6.7-0.7.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989363" comment="mono-web-2.6.7-0.7.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989364" comment="mono-winforms-2.6.7-0.7.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216107" version="1" class="patch">
	<metadata>
		<title>mono-core-2.6.7-0.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0217" ref_url="https://www.suse.com/security/cve/CVE-2009-0217/" source="CVE"/>
		<reference ref_id="CVE-2010-1459" ref_url="https://www.suse.com/security/cve/CVE-2010-1459/" source="CVE"/>
		<reference ref_id="CVE-2010-3332" ref_url="https://www.suse.com/security/cve/CVE-2010-3332/" source="CVE"/>
		<reference ref_id="CVE-2010-4159" ref_url="https://www.suse.com/security/cve/CVE-2010-4159/" source="CVE"/>
		<reference ref_id="CVE-2012-3382" ref_url="https://www.suse.com/security/cve/CVE-2012-3382/" source="CVE"/>
		<description>
These are all security issues fixed in the mono-core-2.6.7-0.9.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0217/">CVE-2009-0217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0217">CVE-2009-0217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1459/">CVE-2010-1459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1459">CVE-2010-1459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3332/">CVE-2010-3332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3332">CVE-2010-3332 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4159/">CVE-2010-4159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4159">CVE-2010-4159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3382/">CVE-2012-3382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3382">CVE-2012-3382 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989951" comment="mono-core-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989952" comment="mono-data-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989953" comment="mono-data-postgresql-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989954" comment="mono-data-sqlite-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989955" comment="mono-locale-extras-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989956" comment="mono-nunit-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989957" comment="mono-web-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989958" comment="mono-winforms-2.6.7-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216108" version="1" class="patch">
	<metadata>
		<title>mozilla-xulrunner192-1.9.2.27-0.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-5913" ref_url="https://www.suse.com/security/cve/CVE-2008-5913/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-0164" ref_url="https://www.suse.com/security/cve/CVE-2010-0164/" source="CVE"/>
		<reference ref_id="CVE-2010-0165" ref_url="https://www.suse.com/security/cve/CVE-2010-0165/" source="CVE"/>
		<reference ref_id="CVE-2010-0166" ref_url="https://www.suse.com/security/cve/CVE-2010-0166/" source="CVE"/>
		<reference ref_id="CVE-2010-0167" ref_url="https://www.suse.com/security/cve/CVE-2010-0167/" source="CVE"/>
		<reference ref_id="CVE-2010-0168" ref_url="https://www.suse.com/security/cve/CVE-2010-0168/" source="CVE"/>
		<reference ref_id="CVE-2010-0169" ref_url="https://www.suse.com/security/cve/CVE-2010-0169/" source="CVE"/>
		<reference ref_id="CVE-2010-0170" ref_url="https://www.suse.com/security/cve/CVE-2010-0170/" source="CVE"/>
		<reference ref_id="CVE-2010-0171" ref_url="https://www.suse.com/security/cve/CVE-2010-0171/" source="CVE"/>
		<reference ref_id="CVE-2010-0172" ref_url="https://www.suse.com/security/cve/CVE-2010-0172/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0179" ref_url="https://www.suse.com/security/cve/CVE-2010-0179/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<reference ref_id="CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654/" source="CVE"/>
		<reference ref_id="CVE-2010-1028" ref_url="https://www.suse.com/security/cve/CVE-2010-1028/" source="CVE"/>
		<reference ref_id="CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121/" source="CVE"/>
		<reference ref_id="CVE-2010-1125" ref_url="https://www.suse.com/security/cve/CVE-2010-1125/" source="CVE"/>
		<reference ref_id="CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196/" source="CVE"/>
		<reference ref_id="CVE-2010-1197" ref_url="https://www.suse.com/security/cve/CVE-2010-1197/" source="CVE"/>
		<reference ref_id="CVE-2010-1198" ref_url="https://www.suse.com/security/cve/CVE-2010-1198/" source="CVE"/>
		<reference ref_id="CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199/" source="CVE"/>
		<reference ref_id="CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200/" source="CVE"/>
		<reference ref_id="CVE-2010-1201" ref_url="https://www.suse.com/security/cve/CVE-2010-1201/" source="CVE"/>
		<reference ref_id="CVE-2010-1202" ref_url="https://www.suse.com/security/cve/CVE-2010-1202/" source="CVE"/>
		<reference ref_id="CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-1206" ref_url="https://www.suse.com/security/cve/CVE-2010-1206/" source="CVE"/>
		<reference ref_id="CVE-2010-1207" ref_url="https://www.suse.com/security/cve/CVE-2010-1207/" source="CVE"/>
		<reference ref_id="CVE-2010-1208" ref_url="https://www.suse.com/security/cve/CVE-2010-1208/" source="CVE"/>
		<reference ref_id="CVE-2010-1209" ref_url="https://www.suse.com/security/cve/CVE-2010-1209/" source="CVE"/>
		<reference ref_id="CVE-2010-1210" ref_url="https://www.suse.com/security/cve/CVE-2010-1210/" source="CVE"/>
		<reference ref_id="CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211/" source="CVE"/>
		<reference ref_id="CVE-2010-1212" ref_url="https://www.suse.com/security/cve/CVE-2010-1212/" source="CVE"/>
		<reference ref_id="CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213/" source="CVE"/>
		<reference ref_id="CVE-2010-1214" ref_url="https://www.suse.com/security/cve/CVE-2010-1214/" source="CVE"/>
		<reference ref_id="CVE-2010-1215" ref_url="https://www.suse.com/security/cve/CVE-2010-1215/" source="CVE"/>
		<reference ref_id="CVE-2010-1585" ref_url="https://www.suse.com/security/cve/CVE-2010-1585/" source="CVE"/>
		<reference ref_id="CVE-2010-2751" ref_url="https://www.suse.com/security/cve/CVE-2010-2751/" source="CVE"/>
		<reference ref_id="CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752/" source="CVE"/>
		<reference ref_id="CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753/" source="CVE"/>
		<reference ref_id="CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754/" source="CVE"/>
		<reference ref_id="CVE-2010-2755" ref_url="https://www.suse.com/security/cve/CVE-2010-2755/" source="CVE"/>
		<reference ref_id="CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760/" source="CVE"/>
		<reference ref_id="CVE-2010-2762" ref_url="https://www.suse.com/security/cve/CVE-2010-2762/" source="CVE"/>
		<reference ref_id="CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764/" source="CVE"/>
		<reference ref_id="CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765/" source="CVE"/>
		<reference ref_id="CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766/" source="CVE"/>
		<reference ref_id="CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767/" source="CVE"/>
		<reference ref_id="CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768/" source="CVE"/>
		<reference ref_id="CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769/" source="CVE"/>
		<reference ref_id="CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166/" source="CVE"/>
		<reference ref_id="CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167/" source="CVE"/>
		<reference ref_id="CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168/" source="CVE"/>
		<reference ref_id="CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3173" ref_url="https://www.suse.com/security/cve/CVE-2010-3173/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<reference ref_id="CVE-2010-3766" ref_url="https://www.suse.com/security/cve/CVE-2010-3766/" source="CVE"/>
		<reference ref_id="CVE-2010-3767" ref_url="https://www.suse.com/security/cve/CVE-2010-3767/" source="CVE"/>
		<reference ref_id="CVE-2010-3768" ref_url="https://www.suse.com/security/cve/CVE-2010-3768/" source="CVE"/>
		<reference ref_id="CVE-2010-3769" ref_url="https://www.suse.com/security/cve/CVE-2010-3769/" source="CVE"/>
		<reference ref_id="CVE-2010-3770" ref_url="https://www.suse.com/security/cve/CVE-2010-3770/" source="CVE"/>
		<reference ref_id="CVE-2010-3771" ref_url="https://www.suse.com/security/cve/CVE-2010-3771/" source="CVE"/>
		<reference ref_id="CVE-2010-3772" ref_url="https://www.suse.com/security/cve/CVE-2010-3772/" source="CVE"/>
		<reference ref_id="CVE-2010-3773" ref_url="https://www.suse.com/security/cve/CVE-2010-3773/" source="CVE"/>
		<reference ref_id="CVE-2010-3775" ref_url="https://www.suse.com/security/cve/CVE-2010-3775/" source="CVE"/>
		<reference ref_id="CVE-2010-3776" ref_url="https://www.suse.com/security/cve/CVE-2010-3776/" source="CVE"/>
		<reference ref_id="CVE-2010-3777" ref_url="https://www.suse.com/security/cve/CVE-2010-3777/" source="CVE"/>
		<reference ref_id="CVE-2010-3778" ref_url="https://www.suse.com/security/cve/CVE-2010-3778/" source="CVE"/>
		<reference ref_id="CVE-2011-0051" ref_url="https://www.suse.com/security/cve/CVE-2011-0051/" source="CVE"/>
		<reference ref_id="CVE-2011-0053" ref_url="https://www.suse.com/security/cve/CVE-2011-0053/" source="CVE"/>
		<reference ref_id="CVE-2011-0054" ref_url="https://www.suse.com/security/cve/CVE-2011-0054/" source="CVE"/>
		<reference ref_id="CVE-2011-0055" ref_url="https://www.suse.com/security/cve/CVE-2011-0055/" source="CVE"/>
		<reference ref_id="CVE-2011-0056" ref_url="https://www.suse.com/security/cve/CVE-2011-0056/" source="CVE"/>
		<reference ref_id="CVE-2011-0057" ref_url="https://www.suse.com/security/cve/CVE-2011-0057/" source="CVE"/>
		<reference ref_id="CVE-2011-0059" ref_url="https://www.suse.com/security/cve/CVE-2011-0059/" source="CVE"/>
		<reference ref_id="CVE-2011-0061" ref_url="https://www.suse.com/security/cve/CVE-2011-0061/" source="CVE"/>
		<reference ref_id="CVE-2011-0062" ref_url="https://www.suse.com/security/cve/CVE-2011-0062/" source="CVE"/>
		<reference ref_id="CVE-2011-0065" ref_url="https://www.suse.com/security/cve/CVE-2011-0065/" source="CVE"/>
		<reference ref_id="CVE-2011-0066" ref_url="https://www.suse.com/security/cve/CVE-2011-0066/" source="CVE"/>
		<reference ref_id="CVE-2011-0067" ref_url="https://www.suse.com/security/cve/CVE-2011-0067/" source="CVE"/>
		<reference ref_id="CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069/" source="CVE"/>
		<reference ref_id="CVE-2011-0070" ref_url="https://www.suse.com/security/cve/CVE-2011-0070/" source="CVE"/>
		<reference ref_id="CVE-2011-0072" ref_url="https://www.suse.com/security/cve/CVE-2011-0072/" source="CVE"/>
		<reference ref_id="CVE-2011-0073" ref_url="https://www.suse.com/security/cve/CVE-2011-0073/" source="CVE"/>
		<reference ref_id="CVE-2011-0074" ref_url="https://www.suse.com/security/cve/CVE-2011-0074/" source="CVE"/>
		<reference ref_id="CVE-2011-0075" ref_url="https://www.suse.com/security/cve/CVE-2011-0075/" source="CVE"/>
		<reference ref_id="CVE-2011-0077" ref_url="https://www.suse.com/security/cve/CVE-2011-0077/" source="CVE"/>
		<reference ref_id="CVE-2011-0078" ref_url="https://www.suse.com/security/cve/CVE-2011-0078/" source="CVE"/>
		<reference ref_id="CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080/" source="CVE"/>
		<reference ref_id="CVE-2011-0081" ref_url="https://www.suse.com/security/cve/CVE-2011-0081/" source="CVE"/>
		<reference ref_id="CVE-2011-0083" ref_url="https://www.suse.com/security/cve/CVE-2011-0083/" source="CVE"/>
		<reference ref_id="CVE-2011-0084" ref_url="https://www.suse.com/security/cve/CVE-2011-0084/" source="CVE"/>
		<reference ref_id="CVE-2011-0085" ref_url="https://www.suse.com/security/cve/CVE-2011-0085/" source="CVE"/>
		<reference ref_id="CVE-2011-1202" ref_url="https://www.suse.com/security/cve/CVE-2011-1202/" source="CVE"/>
		<reference ref_id="CVE-2011-2362" ref_url="https://www.suse.com/security/cve/CVE-2011-2362/" source="CVE"/>
		<reference ref_id="CVE-2011-2363" ref_url="https://www.suse.com/security/cve/CVE-2011-2363/" source="CVE"/>
		<reference ref_id="CVE-2011-2364" ref_url="https://www.suse.com/security/cve/CVE-2011-2364/" source="CVE"/>
		<reference ref_id="CVE-2011-2365" ref_url="https://www.suse.com/security/cve/CVE-2011-2365/" source="CVE"/>
		<reference ref_id="CVE-2011-2371" ref_url="https://www.suse.com/security/cve/CVE-2011-2371/" source="CVE"/>
		<reference ref_id="CVE-2011-2372" ref_url="https://www.suse.com/security/cve/CVE-2011-2372/" source="CVE"/>
		<reference ref_id="CVE-2011-2373" ref_url="https://www.suse.com/security/cve/CVE-2011-2373/" source="CVE"/>
		<reference ref_id="CVE-2011-2374" ref_url="https://www.suse.com/security/cve/CVE-2011-2374/" source="CVE"/>
		<reference ref_id="CVE-2011-2376" ref_url="https://www.suse.com/security/cve/CVE-2011-2376/" source="CVE"/>
		<reference ref_id="CVE-2011-2377" ref_url="https://www.suse.com/security/cve/CVE-2011-2377/" source="CVE"/>
		<reference ref_id="CVE-2011-2378" ref_url="https://www.suse.com/security/cve/CVE-2011-2378/" source="CVE"/>
		<reference ref_id="CVE-2011-2980" ref_url="https://www.suse.com/security/cve/CVE-2011-2980/" source="CVE"/>
		<reference ref_id="CVE-2011-2981" ref_url="https://www.suse.com/security/cve/CVE-2011-2981/" source="CVE"/>
		<reference ref_id="CVE-2011-2982" ref_url="https://www.suse.com/security/cve/CVE-2011-2982/" source="CVE"/>
		<reference ref_id="CVE-2011-2983" ref_url="https://www.suse.com/security/cve/CVE-2011-2983/" source="CVE"/>
		<reference ref_id="CVE-2011-2995" ref_url="https://www.suse.com/security/cve/CVE-2011-2995/" source="CVE"/>
		<reference ref_id="CVE-2011-2996" ref_url="https://www.suse.com/security/cve/CVE-2011-2996/" source="CVE"/>
		<reference ref_id="CVE-2011-2999" ref_url="https://www.suse.com/security/cve/CVE-2011-2999/" source="CVE"/>
		<reference ref_id="CVE-2011-3000" ref_url="https://www.suse.com/security/cve/CVE-2011-3000/" source="CVE"/>
		<reference ref_id="CVE-2011-3001" ref_url="https://www.suse.com/security/cve/CVE-2011-3001/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3647" ref_url="https://www.suse.com/security/cve/CVE-2011-3647/" source="CVE"/>
		<reference ref_id="CVE-2011-3648" ref_url="https://www.suse.com/security/cve/CVE-2011-3648/" source="CVE"/>
		<reference ref_id="CVE-2011-3650" ref_url="https://www.suse.com/security/cve/CVE-2011-3650/" source="CVE"/>
		<reference ref_id="CVE-2011-3659" ref_url="https://www.suse.com/security/cve/CVE-2011-3659/" source="CVE"/>
		<reference ref_id="CVE-2011-3666" ref_url="https://www.suse.com/security/cve/CVE-2011-3666/" source="CVE"/>
		<reference ref_id="CVE-2011-3670" ref_url="https://www.suse.com/security/cve/CVE-2011-3670/" source="CVE"/>
		<reference ref_id="CVE-2012-0442" ref_url="https://www.suse.com/security/cve/CVE-2012-0442/" source="CVE"/>
		<reference ref_id="CVE-2012-0443" ref_url="https://www.suse.com/security/cve/CVE-2012-0443/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<reference ref_id="CVE-2012-0449" ref_url="https://www.suse.com/security/cve/CVE-2012-0449/" source="CVE"/>
		<description>
These are all security issues fixed in the mozilla-xulrunner192-1.9.2.27-0.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5913/">CVE-2008-5913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5913">CVE-2008-5913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0164/">CVE-2010-0164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0164">CVE-2010-0164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0165/">CVE-2010-0165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0165">CVE-2010-0165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0166/">CVE-2010-0166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0166">CVE-2010-0166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0167/">CVE-2010-0167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0167">CVE-2010-0167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0168/">CVE-2010-0168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0168">CVE-2010-0168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0169/">CVE-2010-0169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0169">CVE-2010-0169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0170/">CVE-2010-0170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0170">CVE-2010-0170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0171/">CVE-2010-0171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0171">CVE-2010-0171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0172/">CVE-2010-0172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0172">CVE-2010-0172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0173">CVE-2010-0173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0174">CVE-2010-0174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0176">CVE-2010-0176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0177">CVE-2010-0177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0178">CVE-2010-0178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0179/">CVE-2010-0179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0179">CVE-2010-0179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0181">CVE-2010-0181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0182">CVE-2010-0182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0654">CVE-2010-0654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1028/">CVE-2010-1028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1028">CVE-2010-1028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1121">CVE-2010-1121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1125/">CVE-2010-1125 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1125">CVE-2010-1125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1196">CVE-2010-1196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1197/">CVE-2010-1197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1197">CVE-2010-1197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1198/">CVE-2010-1198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1198">CVE-2010-1198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1199">CVE-2010-1199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1200">CVE-2010-1200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1201/">CVE-2010-1201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1201">CVE-2010-1201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1202/">CVE-2010-1202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1202">CVE-2010-1202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1203">CVE-2010-1203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1205">CVE-2010-1205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1206/">CVE-2010-1206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1206">CVE-2010-1206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1207/">CVE-2010-1207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1207">CVE-2010-1207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1208/">CVE-2010-1208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1208">CVE-2010-1208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1209/">CVE-2010-1209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1209">CVE-2010-1209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1210/">CVE-2010-1210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1210">CVE-2010-1210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1211">CVE-2010-1211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1212/">CVE-2010-1212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1212">CVE-2010-1212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1213">CVE-2010-1213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1214/">CVE-2010-1214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1214">CVE-2010-1214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1215/">CVE-2010-1215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1215">CVE-2010-1215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1585/">CVE-2010-1585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1585">CVE-2010-1585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2751/">CVE-2010-2751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2751">CVE-2010-2751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2752">CVE-2010-2752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2753">CVE-2010-2753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2754">CVE-2010-2754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2755/">CVE-2010-2755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2755">CVE-2010-2755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2760">CVE-2010-2760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2762/">CVE-2010-2762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2762">CVE-2010-2762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2764">CVE-2010-2764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2765">CVE-2010-2765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2766">CVE-2010-2766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2767">CVE-2010-2767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2768">CVE-2010-2768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2769">CVE-2010-2769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3166">CVE-2010-3166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3167">CVE-2010-3167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3168">CVE-2010-3168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3169">CVE-2010-3169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3170">CVE-2010-3170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3173/">CVE-2010-3173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3173">CVE-2010-3173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3174">CVE-2010-3174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3175">CVE-2010-3175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3176">CVE-2010-3176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3177">CVE-2010-3177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3178">CVE-2010-3178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3179">CVE-2010-3179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3180">CVE-2010-3180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3182">CVE-2010-3182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3183">CVE-2010-3183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3765">CVE-2010-3765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3766/">CVE-2010-3766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3766">CVE-2010-3766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3767/">CVE-2010-3767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3767">CVE-2010-3767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3768/">CVE-2010-3768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3768">CVE-2010-3768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3769/">CVE-2010-3769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3769">CVE-2010-3769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3770/">CVE-2010-3770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3770">CVE-2010-3770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3771/">CVE-2010-3771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3771">CVE-2010-3771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3772/">CVE-2010-3772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3772">CVE-2010-3772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3773/">CVE-2010-3773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3773">CVE-2010-3773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3775/">CVE-2010-3775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3775">CVE-2010-3775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3776/">CVE-2010-3776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3776">CVE-2010-3776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3777/">CVE-2010-3777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3777">CVE-2010-3777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3778/">CVE-2010-3778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3778">CVE-2010-3778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0051/">CVE-2011-0051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0051">CVE-2011-0051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0053/">CVE-2011-0053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0053">CVE-2011-0053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0054/">CVE-2011-0054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0054">CVE-2011-0054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0055/">CVE-2011-0055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0055">CVE-2011-0055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0056/">CVE-2011-0056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0056">CVE-2011-0056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0057/">CVE-2011-0057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0057">CVE-2011-0057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0059/">CVE-2011-0059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0059">CVE-2011-0059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0061/">CVE-2011-0061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0061">CVE-2011-0061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0062/">CVE-2011-0062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0062">CVE-2011-0062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0065/">CVE-2011-0065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0065">CVE-2011-0065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0066/">CVE-2011-0066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0066">CVE-2011-0066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0067/">CVE-2011-0067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0067">CVE-2011-0067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0069">CVE-2011-0069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0070/">CVE-2011-0070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0070">CVE-2011-0070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0072/">CVE-2011-0072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0072">CVE-2011-0072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0073/">CVE-2011-0073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0073">CVE-2011-0073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0074/">CVE-2011-0074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0074">CVE-2011-0074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0075/">CVE-2011-0075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0075">CVE-2011-0075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0077/">CVE-2011-0077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0077">CVE-2011-0077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0078/">CVE-2011-0078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0078">CVE-2011-0078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0080">CVE-2011-0080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0081/">CVE-2011-0081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0081">CVE-2011-0081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0083/">CVE-2011-0083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0083">CVE-2011-0083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0084/">CVE-2011-0084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0084">CVE-2011-0084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0085/">CVE-2011-0085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0085">CVE-2011-0085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1202/">CVE-2011-1202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1202">CVE-2011-1202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2362/">CVE-2011-2362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2362">CVE-2011-2362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2363/">CVE-2011-2363 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2363">CVE-2011-2363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2364/">CVE-2011-2364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2364">CVE-2011-2364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2365/">CVE-2011-2365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2365">CVE-2011-2365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2371/">CVE-2011-2371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2371">CVE-2011-2371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2372/">CVE-2011-2372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2372">CVE-2011-2372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2373/">CVE-2011-2373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2373">CVE-2011-2373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2374/">CVE-2011-2374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2374">CVE-2011-2374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2376/">CVE-2011-2376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2376">CVE-2011-2376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2377/">CVE-2011-2377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2377">CVE-2011-2377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2378/">CVE-2011-2378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2378">CVE-2011-2378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2980/">CVE-2011-2980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2980">CVE-2011-2980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2981/">CVE-2011-2981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2981">CVE-2011-2981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2982/">CVE-2011-2982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2982">CVE-2011-2982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2983/">CVE-2011-2983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2983">CVE-2011-2983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2995/">CVE-2011-2995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2995">CVE-2011-2995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2996/">CVE-2011-2996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2996">CVE-2011-2996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2999/">CVE-2011-2999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2999">CVE-2011-2999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3000/">CVE-2011-3000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3000">CVE-2011-3000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3001/">CVE-2011-3001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3001">CVE-2011-3001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3026">CVE-2011-3026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3647/">CVE-2011-3647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3647">CVE-2011-3647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3648/">CVE-2011-3648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3648">CVE-2011-3648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3650/">CVE-2011-3650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3650">CVE-2011-3650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3659/">CVE-2011-3659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3659">CVE-2011-3659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3666/">CVE-2011-3666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3666">CVE-2011-3666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3670/">CVE-2011-3670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3670">CVE-2011-3670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0442/">CVE-2012-0442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0442">CVE-2012-0442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0443/">CVE-2012-0443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0443">CVE-2012-0443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0444">CVE-2012-0444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0449/">CVE-2012-0449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0449">CVE-2012-0449 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989959" comment="mozilla-xulrunner192-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989960" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989961" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989962" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989963" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216109" version="1" class="patch">
	<metadata>
		<title>mutt-1.5.17-42.33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-1558" ref_url="https://www.suse.com/security/cve/CVE-2007-1558/" source="CVE"/>
		<description>
These are all security issues fixed in the mutt-1.5.17-42.33.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1558/">CVE-2007-1558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1558">CVE-2007-1558 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988791" comment="mutt-1.5.17-42.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216110" version="1" class="patch">
	<metadata>
		<title>nagios-3.0.6-1.25.28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-5803" ref_url="https://www.suse.com/security/cve/CVE-2007-5803/" source="CVE"/>
		<reference ref_id="CVE-2011-1523" ref_url="https://www.suse.com/security/cve/CVE-2011-1523/" source="CVE"/>
		<reference ref_id="CVE-2012-6096" ref_url="https://www.suse.com/security/cve/CVE-2012-6096/" source="CVE"/>
		<description>
These are all security issues fixed in the nagios-3.0.6-1.25.28.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5803/">CVE-2007-5803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5803">CVE-2007-5803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1523/">CVE-2011-1523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1523">CVE-2011-1523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6096/">CVE-2012-6096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6096">CVE-2012-6096 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989964" comment="nagios-3.0.6-1.25.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989965" comment="nagios-www-3.0.6-1.25.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216111" version="1" class="patch">
	<metadata>
		<title>nagios-plugins-1.4.16-0.11.35 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-5623" ref_url="https://www.suse.com/security/cve/CVE-2007-5623/" source="CVE"/>
		<description>
These are all security issues fixed in the nagios-plugins-1.4.16-0.11.35 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5623/">CVE-2007-5623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5623">CVE-2007-5623 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989966" comment="nagios-plugins-1.4.16-0.11.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989967" comment="nagios-plugins-extras-1.4.16-0.11.35 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216112" version="1" class="patch">
	<metadata>
		<title>nfs-client-1.2.3-18.31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1923" ref_url="https://www.suse.com/security/cve/CVE-2013-1923/" source="CVE"/>
		<description>
These are all security issues fixed in the nfs-client-1.2.3-18.31.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1923/">CVE-2013-1923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1923">CVE-2013-1923 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989968" comment="nfs-client-1.2.3-18.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216113" version="1" class="patch">
	<metadata>
		<title>ntp-4.2.4p8-1.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0159" ref_url="https://www.suse.com/security/cve/CVE-2009-0159/" source="CVE"/>
		<reference ref_id="CVE-2009-1252" ref_url="https://www.suse.com/security/cve/CVE-2009-1252/" source="CVE"/>
		<description>
These are all security issues fixed in the ntp-4.2.4p8-1.20.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0159/">CVE-2009-0159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0159">CVE-2009-0159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1252/">CVE-2009-1252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1252">CVE-2009-1252 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989969" comment="ntp-4.2.4p8-1.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989970" comment="ntp-doc-4.2.4p8-1.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216114" version="1" class="patch">
	<metadata>
		<title>ofed-1.5.4.1-0.11.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-1693" ref_url="https://www.suse.com/security/cve/CVE-2010-1693/" source="CVE"/>
		<reference ref_id="CVE-2010-3904" ref_url="https://www.suse.com/security/cve/CVE-2010-3904/" source="CVE"/>
		<reference ref_id="CVE-2010-4649" ref_url="https://www.suse.com/security/cve/CVE-2010-4649/" source="CVE"/>
		<reference ref_id="CVE-2011-3345" ref_url="https://www.suse.com/security/cve/CVE-2011-3345/" source="CVE"/>
		<description>
These are all security issues fixed in the ofed-1.5.4.1-0.11.5 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1693/">CVE-2010-1693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1693">CVE-2010-1693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3904/">CVE-2010-3904 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-3904">CVE-2010-3904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4649/">CVE-2010-4649 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4649">CVE-2010-4649 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3345/">CVE-2011-3345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3345">CVE-2011-3345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989971" comment="ofed-1.5.4.1-0.11.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989972" comment="ofed-doc-1.5.4.1-0.11.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989973" comment="ofed-kmp-default-1.5.4.1_3.0.76_0.11-0.11.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989974" comment="ofed-kmp-pae-1.5.4.1_3.0.76_0.11-0.11.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989975" comment="ofed-kmp-ppc64-1.5.4.1_3.0.76_0.11-0.11.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989976" comment="ofed-kmp-trace-1.5.4.1_3.0.76_0.11-0.11.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216115" version="1" class="patch">
	<metadata>
		<title>openCryptoki-2.4.2-0.9.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-4454" ref_url="https://www.suse.com/security/cve/CVE-2012-4454/" source="CVE"/>
		<reference ref_id="CVE-2012-4455" ref_url="https://www.suse.com/security/cve/CVE-2012-4455/" source="CVE"/>
		<description>
These are all security issues fixed in the openCryptoki-2.4.2-0.9.12 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4454/">CVE-2012-4454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4454">CVE-2012-4454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4455/">CVE-2012-4455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4455">CVE-2012-4455 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989977" comment="openCryptoki-2.4.2-0.9.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989978" comment="openCryptoki-32bit-2.4.2-0.9.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989979" comment="openCryptoki-64bit-2.4.2-0.9.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216116" version="1" class="patch">
	<metadata>
		<title>openslp-1.2.0-172.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-3609" ref_url="https://www.suse.com/security/cve/CVE-2010-3609/" source="CVE"/>
		<description>
These are all security issues fixed in the openslp-1.2.0-172.22.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3609/">CVE-2010-3609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3609">CVE-2010-3609 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989380" comment="openslp-1.2.0-172.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989381" comment="openslp-32bit-1.2.0-172.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989382" comment="openslp-server-1.2.0-172.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989383" comment="openslp-x86-1.2.0-172.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216117" version="1" class="patch">
	<metadata>
		<title>openssh-6.2p2-0.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-0225" ref_url="https://www.suse.com/security/cve/CVE-2006-0225/" source="CVE"/>
		<reference ref_id="CVE-2007-4752" ref_url="https://www.suse.com/security/cve/CVE-2007-4752/" source="CVE"/>
		<reference ref_id="CVE-2008-1483" ref_url="https://www.suse.com/security/cve/CVE-2008-1483/" source="CVE"/>
		<reference ref_id="CVE-2010-5107" ref_url="https://www.suse.com/security/cve/CVE-2010-5107/" source="CVE"/>
		<reference ref_id="CVE-2011-5000" ref_url="https://www.suse.com/security/cve/CVE-2011-5000/" source="CVE"/>
		<reference ref_id="CVE-2012-0814" ref_url="https://www.suse.com/security/cve/CVE-2012-0814/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-6.2p2-0.9.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0225/">CVE-2006-0225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0225">CVE-2006-0225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4752/">CVE-2007-4752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4752">CVE-2007-4752 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2008-1483/">CVE-2008-1483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1483">CVE-2008-1483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5107/">CVE-2010-5107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-5107">CVE-2010-5107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5000/">CVE-2011-5000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-5000">CVE-2011-5000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0814/">CVE-2012-0814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0814">CVE-2012-0814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989980" comment="openssh-6.2p2-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989981" comment="openssh-askpass-6.2p2-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216118" version="1" class="patch">
	<metadata>
		<title>openvpn-2.0.9-143.38.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<description>
These are all security issues fixed in the openvpn-2.0.9-143.38.22 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4339">CVE-2006-4339 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989982" comment="openvpn-2.0.9-143.38.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989983" comment="openvpn-auth-pam-plugin-2.0.9-143.38.22 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216119" version="1" class="patch">
	<metadata>
		<title>opie-2.4-662.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2489" ref_url="https://www.suse.com/security/cve/CVE-2011-2489/" source="CVE"/>
		<reference ref_id="CVE-2011-2490" ref_url="https://www.suse.com/security/cve/CVE-2011-2490/" source="CVE"/>
		<description>
These are all security issues fixed in the opie-2.4-662.18.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2489/">CVE-2011-2489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2489">CVE-2011-2489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2490/">CVE-2011-2490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2490">CVE-2011-2490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989388" comment="opie-2.4-662.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989389" comment="opie-32bit-2.4-662.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989390" comment="opie-x86-2.4-662.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216120" version="1" class="patch">
	<metadata>
		<title>pam-1.1.5-0.10.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0579" ref_url="https://www.suse.com/security/cve/CVE-2009-0579/" source="CVE"/>
		<reference ref_id="CVE-2009-0887" ref_url="https://www.suse.com/security/cve/CVE-2009-0887/" source="CVE"/>
		<reference ref_id="CVE-2011-3148" ref_url="https://www.suse.com/security/cve/CVE-2011-3148/" source="CVE"/>
		<reference ref_id="CVE-2011-3149" ref_url="https://www.suse.com/security/cve/CVE-2011-3149/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-1.1.5-0.10.17 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0579/">CVE-2009-0579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0579">CVE-2009-0579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0887/">CVE-2009-0887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0887">CVE-2009-0887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3148/">CVE-2011-3148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3148">CVE-2011-3148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3149/">CVE-2011-3149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3149">CVE-2011-3149 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989391" comment="pam-1.1.5-0.10.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989392" comment="pam-32bit-1.1.5-0.10.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989393" comment="pam-doc-1.1.5-0.10.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989394" comment="pam-x86-1.1.5-0.10.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216121" version="1" class="patch">
	<metadata>
		<title>pam_krb5-2.3.1-47.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-3825" ref_url="https://www.suse.com/security/cve/CVE-2008-3825/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_krb5-2.3.1-47.12.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3825/">CVE-2008-3825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3825">CVE-2008-3825 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989984" comment="pam_krb5-2.3.1-47.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989985" comment="pam_krb5-32bit-2.3.1-47.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989986" comment="pam_krb5-x86-2.3.1-47.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216122" version="1" class="patch">
	<metadata>
		<title>pam_ldap-184-147.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-5170" ref_url="https://www.suse.com/security/cve/CVE-2006-5170/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_ldap-184-147.20 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5170/">CVE-2006-5170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5170">CVE-2006-5170 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988811" comment="pam_ldap-184-147.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988812" comment="pam_ldap-32bit-184-147.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988813" comment="pam_ldap-x86-184-147.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216123" version="1" class="patch">
	<metadata>
		<title>pam_mount-0.47-13.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-5138" ref_url="https://www.suse.com/security/cve/CVE-2008-5138/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_mount-0.47-13.16.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5138/">CVE-2008-5138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5138">CVE-2008-5138 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989987" comment="pam_mount-0.47-13.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989988" comment="pam_mount-32bit-0.47-13.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989989" comment="pam_mount-x86-0.47-13.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216124" version="1" class="patch">
	<metadata>
		<title>pango-1.26.2-1.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0020" ref_url="https://www.suse.com/security/cve/CVE-2011-0020/" source="CVE"/>
		<reference ref_id="CVE-2011-0064" ref_url="https://www.suse.com/security/cve/CVE-2011-0064/" source="CVE"/>
		<description>
These are all security issues fixed in the pango-1.26.2-1.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0020/">CVE-2011-0020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0020">CVE-2011-0020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0064/">CVE-2011-0064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0064">CVE-2011-0064 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989395" comment="pango-1.26.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989396" comment="pango-32bit-1.26.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989397" comment="pango-doc-1.26.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989398" comment="pango-x86-1.26.2-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216125" version="1" class="patch">
	<metadata>
		<title>pcsc-ccid-1.3.8-3.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-4530" ref_url="https://www.suse.com/security/cve/CVE-2010-4530/" source="CVE"/>
		<description>
These are all security issues fixed in the pcsc-ccid-1.3.8-3.15.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4530/">CVE-2010-4530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4530">CVE-2010-4530 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989399" comment="pcsc-ccid-1.3.8-3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216126" version="1" class="patch">
	<metadata>
		<title>pcsc-lite-1.4.102-1.37.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-0407" ref_url="https://www.suse.com/security/cve/CVE-2010-0407/" source="CVE"/>
		<reference ref_id="CVE-2010-4531" ref_url="https://www.suse.com/security/cve/CVE-2010-4531/" source="CVE"/>
		<description>
These are all security issues fixed in the pcsc-lite-1.4.102-1.37.3 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0407/">CVE-2010-0407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0407">CVE-2010-0407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4531/">CVE-2010-4531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4531">CVE-2010-4531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989400" comment="pcsc-lite-1.4.102-1.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989401" comment="pcsc-lite-32bit-1.4.102-1.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989402" comment="pcsc-lite-x86-1.4.102-1.37.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216127" version="1" class="patch">
	<metadata>
		<title>perl-32bit-5.10.0-64.67.52 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-5116" ref_url="https://www.suse.com/security/cve/CVE-2007-5116/" source="CVE"/>
		<reference ref_id="CVE-2010-1168" ref_url="https://www.suse.com/security/cve/CVE-2010-1168/" source="CVE"/>
		<reference ref_id="CVE-2010-1447" ref_url="https://www.suse.com/security/cve/CVE-2010-1447/" source="CVE"/>
		<reference ref_id="CVE-2010-2761" ref_url="https://www.suse.com/security/cve/CVE-2010-2761/" source="CVE"/>
		<reference ref_id="CVE-2010-4410" ref_url="https://www.suse.com/security/cve/CVE-2010-4410/" source="CVE"/>
		<reference ref_id="CVE-2010-4411" ref_url="https://www.suse.com/security/cve/CVE-2010-4411/" source="CVE"/>
		<reference ref_id="CVE-2010-4777" ref_url="https://www.suse.com/security/cve/CVE-2010-4777/" source="CVE"/>
		<reference ref_id="CVE-2011-1487" ref_url="https://www.suse.com/security/cve/CVE-2011-1487/" source="CVE"/>
		<reference ref_id="CVE-2011-2728" ref_url="https://www.suse.com/security/cve/CVE-2011-2728/" source="CVE"/>
		<reference ref_id="CVE-2012-5526" ref_url="https://www.suse.com/security/cve/CVE-2012-5526/" source="CVE"/>
		<reference ref_id="CVE-2012-6329" ref_url="https://www.suse.com/security/cve/CVE-2012-6329/" source="CVE"/>
		<reference ref_id="CVE-2013-1667" ref_url="https://www.suse.com/security/cve/CVE-2013-1667/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-32bit-5.10.0-64.67.52 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5116/">CVE-2007-5116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5116">CVE-2007-5116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1168/">CVE-2010-1168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1168">CVE-2010-1168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1447/">CVE-2010-1447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1447">CVE-2010-1447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2761/">CVE-2010-2761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2761">CVE-2010-2761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4410/">CVE-2010-4410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4410">CVE-2010-4410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4411/">CVE-2010-4411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4411">CVE-2010-4411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4777/">CVE-2010-4777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4777">CVE-2010-4777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1487/">CVE-2011-1487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1487">CVE-2011-1487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2728/">CVE-2011-2728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2728">CVE-2011-2728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5526/">CVE-2012-5526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5526">CVE-2012-5526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6329/">CVE-2012-6329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6329">CVE-2012-6329 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1667/">CVE-2013-1667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1667">CVE-2013-1667 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989990" comment="perl-5.10.0-64.67.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989991" comment="perl-32bit-5.10.0-64.67.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989992" comment="perl-Module-Build-0.2808.01-0.67.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989993" comment="perl-Test-Simple-0.72-0.67.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989994" comment="perl-base-5.10.0-64.67.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989995" comment="perl-doc-5.10.0-64.67.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989996" comment="perl-x86-5.10.0-64.67.52 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216128" version="1" class="patch">
	<metadata>
		<title>perl-HTML-Parser-3.56-1.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-3627" ref_url="https://www.suse.com/security/cve/CVE-2009-3627/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-HTML-Parser-3.56-1.18.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3627/">CVE-2009-3627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3627">CVE-2009-3627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988822" comment="perl-HTML-Parser-3.56-1.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216129" version="1" class="patch">
	<metadata>
		<title>perl-Tk-804.028-50.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-4484" ref_url="https://www.suse.com/security/cve/CVE-2006-4484/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Tk-804.028-50.24 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4484/">CVE-2006-4484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4484">CVE-2006-4484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988823" comment="perl-Tk-804.028-50.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216130" version="1" class="patch">
	<metadata>
		<title>perl-libwww-perl-5.816-2.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0633" ref_url="https://www.suse.com/security/cve/CVE-2011-0633/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-libwww-perl-5.816-2.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0633/">CVE-2011-0633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0633">CVE-2011-0633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989408" comment="perl-libwww-perl-5.816-2.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216131" version="1" class="patch">
	<metadata>
		<title>perl-spamassassin-3.3.1-10.8.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-0451" ref_url="https://www.suse.com/security/cve/CVE-2007-0451/" source="CVE"/>
		<reference ref_id="CVE-2007-2873" ref_url="https://www.suse.com/security/cve/CVE-2007-2873/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-spamassassin-3.3.1-10.8.3 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0451/">CVE-2007-0451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0451">CVE-2007-0451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2873/">CVE-2007-2873 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2873">CVE-2007-2873 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989409" comment="perl-spamassassin-3.3.1-10.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989410" comment="spamassassin-3.3.1-10.8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216132" version="1" class="patch">
	<metadata>
		<title>postgresql-8.3.23-0.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-4769" ref_url="https://www.suse.com/security/cve/CVE-2007-4769/" source="CVE"/>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2007-6067" ref_url="https://www.suse.com/security/cve/CVE-2007-6067/" source="CVE"/>
		<reference ref_id="CVE-2007-6600" ref_url="https://www.suse.com/security/cve/CVE-2007-6600/" source="CVE"/>
		<reference ref_id="CVE-2007-6601" ref_url="https://www.suse.com/security/cve/CVE-2007-6601/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-4034" ref_url="https://www.suse.com/security/cve/CVE-2009-4034/" source="CVE"/>
		<reference ref_id="CVE-2009-4136" ref_url="https://www.suse.com/security/cve/CVE-2009-4136/" source="CVE"/>
		<reference ref_id="CVE-2010-0442" ref_url="https://www.suse.com/security/cve/CVE-2010-0442/" source="CVE"/>
		<reference ref_id="CVE-2010-1169" ref_url="https://www.suse.com/security/cve/CVE-2010-1169/" source="CVE"/>
		<reference ref_id="CVE-2010-1170" ref_url="https://www.suse.com/security/cve/CVE-2010-1170/" source="CVE"/>
		<reference ref_id="CVE-2010-3433" ref_url="https://www.suse.com/security/cve/CVE-2010-3433/" source="CVE"/>
		<reference ref_id="CVE-2010-4014" ref_url="https://www.suse.com/security/cve/CVE-2010-4014/" source="CVE"/>
		<reference ref_id="CVE-2010-4015" ref_url="https://www.suse.com/security/cve/CVE-2010-4015/" source="CVE"/>
		<reference ref_id="CVE-2012-0866" ref_url="https://www.suse.com/security/cve/CVE-2012-0866/" source="CVE"/>
		<reference ref_id="CVE-2012-0868" ref_url="https://www.suse.com/security/cve/CVE-2012-0868/" source="CVE"/>
		<reference ref_id="CVE-2012-2143" ref_url="https://www.suse.com/security/cve/CVE-2012-2143/" source="CVE"/>
		<reference ref_id="CVE-2012-2655" ref_url="https://www.suse.com/security/cve/CVE-2012-2655/" source="CVE"/>
		<reference ref_id="CVE-2012-3488" ref_url="https://www.suse.com/security/cve/CVE-2012-3488/" source="CVE"/>
		<reference ref_id="CVE-2012-3489" ref_url="https://www.suse.com/security/cve/CVE-2012-3489/" source="CVE"/>
		<reference ref_id="CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql-8.3.23-0.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4769/">CVE-2007-4769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4769">CVE-2007-4769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4772">CVE-2007-4772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6067/">CVE-2007-6067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6067">CVE-2007-6067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6600/">CVE-2007-6600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6600">CVE-2007-6600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6601/">CVE-2007-6601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6601">CVE-2007-6601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4034/">CVE-2009-4034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4034">CVE-2009-4034 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4136/">CVE-2009-4136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4136">CVE-2009-4136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0442/">CVE-2010-0442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0442">CVE-2010-0442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1169/">CVE-2010-1169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1169">CVE-2010-1169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1170/">CVE-2010-1170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1170">CVE-2010-1170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3433/">CVE-2010-3433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3433">CVE-2010-3433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4014/">CVE-2010-4014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4014">CVE-2010-4014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4015/">CVE-2010-4015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4015">CVE-2010-4015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0866/">CVE-2012-0866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0866">CVE-2012-0866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0868/">CVE-2012-0868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0868">CVE-2012-0868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2143/">CVE-2012-2143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2143">CVE-2012-2143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2655/">CVE-2012-2655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2655">CVE-2012-2655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3488/">CVE-2012-3488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3488">CVE-2012-3488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3489/">CVE-2012-3489 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2012-3489">CVE-2012-3489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0255">CVE-2013-0255 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989997" comment="postgresql-8.3.23-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989998" comment="postgresql-contrib-8.3.23-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989999" comment="postgresql-docs-8.3.23-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990000" comment="postgresql-server-8.3.23-0.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216133" version="1" class="patch">
	<metadata>
		<title>puppet-2.6.18-0.4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-0156" ref_url="https://www.suse.com/security/cve/CVE-2010-0156/" source="CVE"/>
		<reference ref_id="CVE-2011-1986" ref_url="https://www.suse.com/security/cve/CVE-2011-1986/" source="CVE"/>
		<reference ref_id="CVE-2011-3848" ref_url="https://www.suse.com/security/cve/CVE-2011-3848/" source="CVE"/>
		<reference ref_id="CVE-2011-3869" ref_url="https://www.suse.com/security/cve/CVE-2011-3869/" source="CVE"/>
		<reference ref_id="CVE-2011-3870" ref_url="https://www.suse.com/security/cve/CVE-2011-3870/" source="CVE"/>
		<reference ref_id="CVE-2011-3871" ref_url="https://www.suse.com/security/cve/CVE-2011-3871/" source="CVE"/>
		<reference ref_id="CVE-2011-3872" ref_url="https://www.suse.com/security/cve/CVE-2011-3872/" source="CVE"/>
		<reference ref_id="CVE-2012-1987" ref_url="https://www.suse.com/security/cve/CVE-2012-1987/" source="CVE"/>
		<reference ref_id="CVE-2012-1988" ref_url="https://www.suse.com/security/cve/CVE-2012-1988/" source="CVE"/>
		<reference ref_id="CVE-2012-1989" ref_url="https://www.suse.com/security/cve/CVE-2012-1989/" source="CVE"/>
		<reference ref_id="CVE-2012-3864" ref_url="https://www.suse.com/security/cve/CVE-2012-3864/" source="CVE"/>
		<reference ref_id="CVE-2012-3865" ref_url="https://www.suse.com/security/cve/CVE-2012-3865/" source="CVE"/>
		<reference ref_id="CVE-2012-3867" ref_url="https://www.suse.com/security/cve/CVE-2012-3867/" source="CVE"/>
		<description>
These are all security issues fixed in the puppet-2.6.18-0.4.2 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0156/">CVE-2010-0156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0156">CVE-2010-0156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1986/">CVE-2011-1986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1986">CVE-2011-1986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3848/">CVE-2011-3848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3848">CVE-2011-3848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3869/">CVE-2011-3869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3869">CVE-2011-3869 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3870/">CVE-2011-3870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3870">CVE-2011-3870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3871/">CVE-2011-3871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3871">CVE-2011-3871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3872/">CVE-2011-3872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3872">CVE-2011-3872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1987/">CVE-2012-1987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1987">CVE-2012-1987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1988/">CVE-2012-1988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1988">CVE-2012-1988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1989/">CVE-2012-1989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1989">CVE-2012-1989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3864/">CVE-2012-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3864">CVE-2012-3864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3865/">CVE-2012-3865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3865">CVE-2012-3865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3867/">CVE-2012-3867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3867">CVE-2012-3867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990001" comment="puppet-2.6.18-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990002" comment="puppet-server-2.6.18-0.4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216134" version="1" class="patch">
	<metadata>
		<title>pure-ftpd-1.0.22-3.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0411" ref_url="https://www.suse.com/security/cve/CVE-2011-0411/" source="CVE"/>
		<reference ref_id="CVE-2011-3171" ref_url="https://www.suse.com/security/cve/CVE-2011-3171/" source="CVE"/>
		<description>
These are all security issues fixed in the pure-ftpd-1.0.22-3.19.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0411/">CVE-2011-0411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0411">CVE-2011-0411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3171/">CVE-2011-3171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3171">CVE-2011-3171 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990003" comment="pure-ftpd-1.0.22-3.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216135" version="1" class="patch">
	<metadata>
		<title>python-2.6.8-0.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-2052" ref_url="https://www.suse.com/security/cve/CVE-2007-2052/" source="CVE"/>
		<reference ref_id="CVE-2008-1721" ref_url="https://www.suse.com/security/cve/CVE-2008-1721/" source="CVE"/>
		<reference ref_id="CVE-2008-2315" ref_url="https://www.suse.com/security/cve/CVE-2008-2315/" source="CVE"/>
		<reference ref_id="CVE-2008-2316" ref_url="https://www.suse.com/security/cve/CVE-2008-2316/" source="CVE"/>
		<reference ref_id="CVE-2008-3142" ref_url="https://www.suse.com/security/cve/CVE-2008-3142/" source="CVE"/>
		<reference ref_id="CVE-2008-3143" ref_url="https://www.suse.com/security/cve/CVE-2008-3143/" source="CVE"/>
		<reference ref_id="CVE-2008-3144" ref_url="https://www.suse.com/security/cve/CVE-2008-3144/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.6.8-0.15.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2052/">CVE-2007-2052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2052">CVE-2007-2052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1721/">CVE-2008-1721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1721">CVE-2008-1721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2315/">CVE-2008-2315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2315">CVE-2008-2315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2316/">CVE-2008-2316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2316">CVE-2008-2316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3142/">CVE-2008-3142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3142">CVE-2008-3142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3143/">CVE-2008-3143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3143">CVE-2008-3143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3144/">CVE-2008-3144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3144">CVE-2008-3144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990004" comment="python-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990005" comment="python-32bit-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990006" comment="python-curses-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990007" comment="python-demo-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990008" comment="python-gdbm-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990009" comment="python-idle-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990010" comment="python-tk-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990011" comment="python-x86-2.6.8-0.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216136" version="1" class="patch">
	<metadata>
		<title>python-pam-0.5.0-3.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-1502" ref_url="https://www.suse.com/security/cve/CVE-2012-1502/" source="CVE"/>
		<description>
These are all security issues fixed in the python-pam-0.5.0-3.20.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1502/">CVE-2012-1502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1502">CVE-2012-1502 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990012" comment="python-pam-0.5.0-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216137" version="1" class="patch">
	<metadata>
		<title>pyxml-0.8.4-194.23.38 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<description>
These are all security issues fixed in the pyxml-0.8.4-194.23.38 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3560">CVE-2009-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3720">CVE-2009-3720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988734" comment="pyxml-0.8.4-194.23.38 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216138" version="1" class="patch">
	<metadata>
		<title>qt3-3.3.8b-88.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-4811" ref_url="https://www.suse.com/security/cve/CVE-2006-4811/" source="CVE"/>
		<reference ref_id="CVE-2007-0242" ref_url="https://www.suse.com/security/cve/CVE-2007-0242/" source="CVE"/>
		<reference ref_id="CVE-2007-3388" ref_url="https://www.suse.com/security/cve/CVE-2007-3388/" source="CVE"/>
		<reference ref_id="CVE-2007-4137" ref_url="https://www.suse.com/security/cve/CVE-2007-4137/" source="CVE"/>
		<description>
These are all security issues fixed in the qt3-3.3.8b-88.21 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4811/">CVE-2006-4811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4811">CVE-2006-4811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0242/">CVE-2007-0242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0242">CVE-2007-0242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3388/">CVE-2007-3388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3388">CVE-2007-3388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4137/">CVE-2007-4137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4137">CVE-2007-4137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988843" comment="qt3-3.3.8b-88.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988844" comment="qt3-32bit-3.3.8b-88.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988845" comment="qt3-x86-3.3.8b-88.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216139" version="1" class="patch">
	<metadata>
		<title>quagga-0.99.15-0.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-2223" ref_url="https://www.suse.com/security/cve/CVE-2006-2223/" source="CVE"/>
		<reference ref_id="CVE-2007-1995" ref_url="https://www.suse.com/security/cve/CVE-2007-1995/" source="CVE"/>
		<reference ref_id="CVE-2010-1674" ref_url="https://www.suse.com/security/cve/CVE-2010-1674/" source="CVE"/>
		<reference ref_id="CVE-2010-1675" ref_url="https://www.suse.com/security/cve/CVE-2010-1675/" source="CVE"/>
		<reference ref_id="CVE-2010-2948" ref_url="https://www.suse.com/security/cve/CVE-2010-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-2949" ref_url="https://www.suse.com/security/cve/CVE-2010-2949/" source="CVE"/>
		<description>
These are all security issues fixed in the quagga-0.99.15-0.12.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2223/">CVE-2006-2223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2223">CVE-2006-2223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1995/">CVE-2007-1995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1995">CVE-2007-1995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1674/">CVE-2010-1674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1674">CVE-2010-1674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1675/">CVE-2010-1675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1675">CVE-2010-1675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2948/">CVE-2010-2948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2948">CVE-2010-2948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2949/">CVE-2010-2949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2949">CVE-2010-2949 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990013" comment="quagga-0.99.15-0.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216140" version="1" class="patch">
	<metadata>
		<title>radvd-1.1-1.24.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-3602" ref_url="https://www.suse.com/security/cve/CVE-2011-3602/" source="CVE"/>
		<reference ref_id="CVE-2011-3603" ref_url="https://www.suse.com/security/cve/CVE-2011-3603/" source="CVE"/>
		<reference ref_id="CVE-2011-3604" ref_url="https://www.suse.com/security/cve/CVE-2011-3604/" source="CVE"/>
		<reference ref_id="CVE-2011-3605" ref_url="https://www.suse.com/security/cve/CVE-2011-3605/" source="CVE"/>
		<description>
These are all security issues fixed in the radvd-1.1-1.24.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3602/">CVE-2011-3602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3602">CVE-2011-3602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3603/">CVE-2011-3603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3603">CVE-2011-3603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3604/">CVE-2011-3604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3604">CVE-2011-3604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3605/">CVE-2011-3605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3605">CVE-2011-3605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989434" comment="radvd-1.1-1.24.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216141" version="1" class="patch">
	<metadata>
		<title>rsync-3.0.4-2.47.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-4091" ref_url="https://www.suse.com/security/cve/CVE-2007-4091/" source="CVE"/>
		<reference ref_id="CVE-2007-6199" ref_url="https://www.suse.com/security/cve/CVE-2007-6199/" source="CVE"/>
		<reference ref_id="CVE-2011-1097" ref_url="https://www.suse.com/security/cve/CVE-2011-1097/" source="CVE"/>
		<description>
These are all security issues fixed in the rsync-3.0.4-2.47.28 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4091/">CVE-2007-4091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4091">CVE-2007-4091 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6199/">CVE-2007-6199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6199">CVE-2007-6199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1097/">CVE-2011-1097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1097">CVE-2011-1097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990014" comment="rsync-3.0.4-2.47.28 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216142" version="1" class="patch">
	<metadata>
		<title>rsyslog-5.10.1-0.7.49 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-3200" ref_url="https://www.suse.com/security/cve/CVE-2011-3200/" source="CVE"/>
		<description>
These are all security issues fixed in the rsyslog-5.10.1-0.7.49 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3200/">CVE-2011-3200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3200">CVE-2011-3200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990015" comment="rsyslog-5.10.1-0.7.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990016" comment="rsyslog-diag-tools-5.10.1-0.7.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990017" comment="rsyslog-doc-5.10.1-0.7.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990018" comment="rsyslog-module-gssapi-5.10.1-0.7.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990019" comment="rsyslog-module-gtls-5.10.1-0.7.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990020" comment="rsyslog-module-mysql-5.10.1-0.7.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990021" comment="rsyslog-module-pgsql-5.10.1-0.7.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990022" comment="rsyslog-module-relp-5.10.1-0.7.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990023" comment="rsyslog-module-snmp-5.10.1-0.7.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990024" comment="rsyslog-module-udpspoof-5.10.1-0.7.49 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216143" version="1" class="patch">
	<metadata>
		<title>ruby-1.8.7.p357-0.9.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-3694" ref_url="https://www.suse.com/security/cve/CVE-2006-3694/" source="CVE"/>
		<reference ref_id="CVE-2006-5467" ref_url="https://www.suse.com/security/cve/CVE-2006-5467/" source="CVE"/>
		<reference ref_id="CVE-2006-6303" ref_url="https://www.suse.com/security/cve/CVE-2006-6303/" source="CVE"/>
		<reference ref_id="CVE-2007-5162" ref_url="https://www.suse.com/security/cve/CVE-2007-5162/" source="CVE"/>
		<reference ref_id="CVE-2007-5770" ref_url="https://www.suse.com/security/cve/CVE-2007-5770/" source="CVE"/>
		<reference ref_id="CVE-2008-1145" ref_url="https://www.suse.com/security/cve/CVE-2008-1145/" source="CVE"/>
		<reference ref_id="CVE-2008-3790" ref_url="https://www.suse.com/security/cve/CVE-2008-3790/" source="CVE"/>
		<reference ref_id="CVE-2009-0642" ref_url="https://www.suse.com/security/cve/CVE-2009-0642/" source="CVE"/>
		<reference ref_id="CVE-2009-1904" ref_url="https://www.suse.com/security/cve/CVE-2009-1904/" source="CVE"/>
		<reference ref_id="CVE-2009-4492" ref_url="https://www.suse.com/security/cve/CVE-2009-4492/" source="CVE"/>
		<reference ref_id="CVE-2010-0541" ref_url="https://www.suse.com/security/cve/CVE-2010-0541/" source="CVE"/>
		<reference ref_id="CVE-2011-0188" ref_url="https://www.suse.com/security/cve/CVE-2011-0188/" source="CVE"/>
		<reference ref_id="CVE-2011-1004" ref_url="https://www.suse.com/security/cve/CVE-2011-1004/" source="CVE"/>
		<reference ref_id="CVE-2011-1005" ref_url="https://www.suse.com/security/cve/CVE-2011-1005/" source="CVE"/>
		<reference ref_id="CVE-2011-2686" ref_url="https://www.suse.com/security/cve/CVE-2011-2686/" source="CVE"/>
		<reference ref_id="CVE-2011-2705" ref_url="https://www.suse.com/security/cve/CVE-2011-2705/" source="CVE"/>
		<reference ref_id="CVE-2011-3009" ref_url="https://www.suse.com/security/cve/CVE-2011-3009/" source="CVE"/>
		<reference ref_id="CVE-2011-4815" ref_url="https://www.suse.com/security/cve/CVE-2011-4815/" source="CVE"/>
		<reference ref_id="CVE-2012-4466" ref_url="https://www.suse.com/security/cve/CVE-2012-4466/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby-1.8.7.p357-0.9.9.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3694/">CVE-2006-3694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3694">CVE-2006-3694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5467/">CVE-2006-5467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5467">CVE-2006-5467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6303/">CVE-2006-6303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6303">CVE-2006-6303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5162/">CVE-2007-5162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5162">CVE-2007-5162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5770/">CVE-2007-5770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5770">CVE-2007-5770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1145/">CVE-2008-1145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1145">CVE-2008-1145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3790/">CVE-2008-3790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3790">CVE-2008-3790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0642/">CVE-2009-0642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0642">CVE-2009-0642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1904/">CVE-2009-1904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1904">CVE-2009-1904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4492/">CVE-2009-4492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4492">CVE-2009-4492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0541/">CVE-2010-0541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0541">CVE-2010-0541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0188/">CVE-2011-0188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0188">CVE-2011-0188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1004/">CVE-2011-1004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1004">CVE-2011-1004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1005/">CVE-2011-1005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1005">CVE-2011-1005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2686/">CVE-2011-2686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2686">CVE-2011-2686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2705/">CVE-2011-2705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2705">CVE-2011-2705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3009/">CVE-2011-3009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3009">CVE-2011-3009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4815/">CVE-2011-4815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4815">CVE-2011-4815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4466/">CVE-2012-4466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4466">CVE-2012-4466 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990025" comment="ruby-1.8.7.p357-0.9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990026" comment="ruby-doc-html-1.8.7.p357-0.9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990027" comment="ruby-tk-1.8.7.p357-0.9.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216144" version="1" class="patch">
	<metadata>
		<title>sblim-sfcb-1.3.11-0.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-3381" ref_url="https://www.suse.com/security/cve/CVE-2012-3381/" source="CVE"/>
		<description>
These are all security issues fixed in the sblim-sfcb-1.3.11-0.19.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3381/">CVE-2012-3381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3381">CVE-2012-3381 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990028" comment="sblim-sfcb-1.3.11-0.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216145" version="1" class="patch">
	<metadata>
		<title>socat-1.7.0.0-1.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2799" ref_url="https://www.suse.com/security/cve/CVE-2010-2799/" source="CVE"/>
		<reference ref_id="CVE-2012-0219" ref_url="https://www.suse.com/security/cve/CVE-2012-0219/" source="CVE"/>
		<description>
These are all security issues fixed in the socat-1.7.0.0-1.16.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2799/">CVE-2010-2799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2799">CVE-2010-2799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0219/">CVE-2012-0219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0219">CVE-2012-0219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990029" comment="socat-1.7.0.0-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216146" version="1" class="patch">
	<metadata>
		<title>squid-2.7.STABLE5-2.12.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0478" ref_url="https://www.suse.com/security/cve/CVE-2009-0478/" source="CVE"/>
		<reference ref_id="CVE-2009-2855" ref_url="https://www.suse.com/security/cve/CVE-2009-2855/" source="CVE"/>
		<reference ref_id="CVE-2010-0308" ref_url="https://www.suse.com/security/cve/CVE-2010-0308/" source="CVE"/>
		<reference ref_id="CVE-2010-0639" ref_url="https://www.suse.com/security/cve/CVE-2010-0639/" source="CVE"/>
		<reference ref_id="CVE-2012-5643" ref_url="https://www.suse.com/security/cve/CVE-2012-5643/" source="CVE"/>
		<reference ref_id="CVE-2013-0188" ref_url="https://www.suse.com/security/cve/CVE-2013-0188/" source="CVE"/>
		<reference ref_id="CVE-2013-0189" ref_url="https://www.suse.com/security/cve/CVE-2013-0189/" source="CVE"/>
		<description>
These are all security issues fixed in the squid-2.7.STABLE5-2.12.12.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0478/">CVE-2009-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0478">CVE-2009-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2855/">CVE-2009-2855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2855">CVE-2009-2855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0308/">CVE-2010-0308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0308">CVE-2010-0308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0639/">CVE-2010-0639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0639">CVE-2010-0639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5643/">CVE-2012-5643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5643">CVE-2012-5643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0188/">CVE-2013-0188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0188">CVE-2013-0188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0189/">CVE-2013-0189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0189">CVE-2013-0189 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990030" comment="squid-2.7.STABLE5-2.12.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216147" version="1" class="patch">
	<metadata>
		<title>squid3-3.1.12-8.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2005-0094" ref_url="https://www.suse.com/security/cve/CVE-2005-0094/" source="CVE"/>
		<reference ref_id="CVE-2011-3205" ref_url="https://www.suse.com/security/cve/CVE-2011-3205/" source="CVE"/>
		<reference ref_id="CVE-2011-4096" ref_url="https://www.suse.com/security/cve/CVE-2011-4096/" source="CVE"/>
		<reference ref_id="CVE-2012-5643" ref_url="https://www.suse.com/security/cve/CVE-2012-5643/" source="CVE"/>
		<reference ref_id="CVE-2013-0188" ref_url="https://www.suse.com/security/cve/CVE-2013-0188/" source="CVE"/>
		<reference ref_id="CVE-2013-0189" ref_url="https://www.suse.com/security/cve/CVE-2013-0189/" source="CVE"/>
		<description>
These are all security issues fixed in the squid3-3.1.12-8.12.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-0094/">CVE-2005-0094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-0094">CVE-2005-0094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3205/">CVE-2011-3205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3205">CVE-2011-3205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4096/">CVE-2011-4096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4096">CVE-2011-4096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5643/">CVE-2012-5643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5643">CVE-2012-5643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0188/">CVE-2013-0188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0188">CVE-2013-0188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0189/">CVE-2013-0189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0189">CVE-2013-0189 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990031" comment="squid3-3.1.12-8.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216148" version="1" class="patch">
	<metadata>
		<title>squidGuard-1.4-13.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-3700" ref_url="https://www.suse.com/security/cve/CVE-2009-3700/" source="CVE"/>
		<reference ref_id="CVE-2009-3826" ref_url="https://www.suse.com/security/cve/CVE-2009-3826/" source="CVE"/>
		<description>
These are all security issues fixed in the squidGuard-1.4-13.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3700/">CVE-2009-3700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3700">CVE-2009-3700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3826/">CVE-2009-3826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3826">CVE-2009-3826 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989451" comment="squidGuard-1.4-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989452" comment="squidGuard-doc-1.4-13.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216149" version="1" class="patch">
	<metadata>
		<title>star-1.5final-28.23.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-4134" ref_url="https://www.suse.com/security/cve/CVE-2007-4134/" source="CVE"/>
		<description>
These are all security issues fixed in the star-1.5final-28.23.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4134/">CVE-2007-4134 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4134">CVE-2007-4134 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990032" comment="star-1.5final-28.23.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216150" version="1" class="patch">
	<metadata>
		<title>stunnel-4.54-0.9.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1762" ref_url="https://www.suse.com/security/cve/CVE-2013-1762/" source="CVE"/>
		<description>
These are all security issues fixed in the stunnel-4.54-0.9.24 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1762/">CVE-2013-1762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1762">CVE-2013-1762 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990033" comment="stunnel-4.54-0.9.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216151" version="1" class="patch">
	<metadata>
		<title>sudo-1.7.6p2-0.17.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-0426" ref_url="https://www.suse.com/security/cve/CVE-2010-0426/" source="CVE"/>
		<reference ref_id="CVE-2010-0427" ref_url="https://www.suse.com/security/cve/CVE-2010-0427/" source="CVE"/>
		<reference ref_id="CVE-2012-2337" ref_url="https://www.suse.com/security/cve/CVE-2012-2337/" source="CVE"/>
		<reference ref_id="CVE-2013-1775" ref_url="https://www.suse.com/security/cve/CVE-2013-1775/" source="CVE"/>
		<reference ref_id="CVE-2013-1776" ref_url="https://www.suse.com/security/cve/CVE-2013-1776/" source="CVE"/>
		<reference ref_id="CVE-2013-2776" ref_url="https://www.suse.com/security/cve/CVE-2013-2776/" source="CVE"/>
		<reference ref_id="CVE-2013-2777" ref_url="https://www.suse.com/security/cve/CVE-2013-2777/" source="CVE"/>
		<description>
These are all security issues fixed in the sudo-1.7.6p2-0.17.5 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0426/">CVE-2010-0426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0426">CVE-2010-0426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0427/">CVE-2010-0427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0427">CVE-2010-0427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2337/">CVE-2012-2337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2337">CVE-2012-2337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1775/">CVE-2013-1775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1775">CVE-2013-1775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1776/">CVE-2013-1776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1776">CVE-2013-1776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2776/">CVE-2013-2776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2776">CVE-2013-2776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2777/">CVE-2013-2777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2777">CVE-2013-2777 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990034" comment="sudo-1.7.6p2-0.17.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216152" version="1" class="patch">
	<metadata>
		<title>sysconfig-0.71.61-0.11.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-4182" ref_url="https://www.suse.com/security/cve/CVE-2011-4182/" source="CVE"/>
		<description>
These are all security issues fixed in the sysconfig-0.71.61-0.11.12 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4182/">CVE-2011-4182 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-4182">CVE-2011-4182 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990035" comment="sysconfig-0.71.61-0.11.12 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216153" version="1" class="patch">
	<metadata>
		<title>syslog-ng-2.0.9-27.34.36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-5110" ref_url="https://www.suse.com/security/cve/CVE-2008-5110/" source="CVE"/>
		<description>
These are all security issues fixed in the syslog-ng-2.0.9-27.34.36.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5110/">CVE-2008-5110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5110">CVE-2008-5110 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990036" comment="syslog-ng-2.0.9-27.34.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216154" version="1" class="patch">
	<metadata>
		<title>sysstat-8.1.5-7.45.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-3852" ref_url="https://www.suse.com/security/cve/CVE-2007-3852/" source="CVE"/>
		<description>
These are all security issues fixed in the sysstat-8.1.5-7.45.24 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3852/">CVE-2007-3852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3852">CVE-2007-3852 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990037" comment="sysstat-8.1.5-7.45.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990038" comment="sysstat-isag-8.1.5-7.45.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216155" version="1" class="patch">
	<metadata>
		<title>system-config-printer-1.0.8-9.23.44 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-4405" ref_url="https://www.suse.com/security/cve/CVE-2011-4405/" source="CVE"/>
		<reference ref_id="CVE-2012-4510" ref_url="https://www.suse.com/security/cve/CVE-2012-4510/" source="CVE"/>
		<description>
These are all security issues fixed in the system-config-printer-1.0.8-9.23.44 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4405/">CVE-2011-4405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4405">CVE-2011-4405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4510/">CVE-2012-4510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4510">CVE-2012-4510 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990039" comment="system-config-printer-1.0.8-9.23.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990040" comment="system-config-printer-lang-1.0.8-9.23.44 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216156" version="1" class="patch">
	<metadata>
		<title>systemtap-1.5-0.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-2911" ref_url="https://www.suse.com/security/cve/CVE-2009-2911/" source="CVE"/>
		<reference ref_id="CVE-2009-4273" ref_url="https://www.suse.com/security/cve/CVE-2009-4273/" source="CVE"/>
		<reference ref_id="CVE-2012-0875" ref_url="https://www.suse.com/security/cve/CVE-2012-0875/" source="CVE"/>
		<description>
These are all security issues fixed in the systemtap-1.5-0.9.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2911/">CVE-2009-2911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2911">CVE-2009-2911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4273/">CVE-2009-4273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4273">CVE-2009-4273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0875/">CVE-2012-0875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0875">CVE-2012-0875 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990041" comment="systemtap-1.5-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990042" comment="systemtap-server-1.5-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216157" version="1" class="patch">
	<metadata>
		<title>t1lib-5.1.1-100.21.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2642" ref_url="https://www.suse.com/security/cve/CVE-2010-2642/" source="CVE"/>
		<reference ref_id="CVE-2011-0433" ref_url="https://www.suse.com/security/cve/CVE-2011-0433/" source="CVE"/>
		<reference ref_id="CVE-2011-0764" ref_url="https://www.suse.com/security/cve/CVE-2011-0764/" source="CVE"/>
		<reference ref_id="CVE-2011-1552" ref_url="https://www.suse.com/security/cve/CVE-2011-1552/" source="CVE"/>
		<reference ref_id="CVE-2011-1553" ref_url="https://www.suse.com/security/cve/CVE-2011-1553/" source="CVE"/>
		<reference ref_id="CVE-2011-1554" ref_url="https://www.suse.com/security/cve/CVE-2011-1554/" source="CVE"/>
		<description>
These are all security issues fixed in the t1lib-5.1.1-100.21.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2642/">CVE-2010-2642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2642">CVE-2010-2642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0433/">CVE-2011-0433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0433">CVE-2011-0433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0764/">CVE-2011-0764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0764">CVE-2011-0764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1552/">CVE-2011-1552 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1552">CVE-2011-1552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1553/">CVE-2011-1553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1553">CVE-2011-1553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1554/">CVE-2011-1554 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1554">CVE-2011-1554 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990043" comment="t1lib-5.1.1-100.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216158" version="1" class="patch">
	<metadata>
		<title>taglib-1.5-19.23.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-1108" ref_url="https://www.suse.com/security/cve/CVE-2012-1108/" source="CVE"/>
		<reference ref_id="CVE-2012-1584" ref_url="https://www.suse.com/security/cve/CVE-2012-1584/" source="CVE"/>
		<description>
These are all security issues fixed in the taglib-1.5-19.23.4 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1108/">CVE-2012-1108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1108">CVE-2012-1108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1584/">CVE-2012-1584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1584">CVE-2012-1584 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990044" comment="taglib-1.5-19.23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990045" comment="taglib-32bit-1.5-19.23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990046" comment="taglib-x86-1.5-19.23.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216159" version="1" class="patch">
	<metadata>
		<title>tar-1.26-1.2.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2001-1267" ref_url="https://www.suse.com/security/cve/CVE-2001-1267/" source="CVE"/>
		<reference ref_id="CVE-2002-0399" ref_url="https://www.suse.com/security/cve/CVE-2002-0399/" source="CVE"/>
		<reference ref_id="CVE-2006-6097" ref_url="https://www.suse.com/security/cve/CVE-2006-6097/" source="CVE"/>
		<reference ref_id="CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624/" source="CVE"/>
		<description>
These are all security issues fixed in the tar-1.26-1.2.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2001-1267/">CVE-2001-1267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2001-1267">CVE-2001-1267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2002-0399/">CVE-2002-0399 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2002-0399">CVE-2002-0399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6097/">CVE-2006-6097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6097">CVE-2006-6097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0624">CVE-2010-0624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989464" comment="tar-1.26-1.2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216160" version="1" class="patch">
	<metadata>
		<title>tftp-0.48-101.31.27 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2199" ref_url="https://www.suse.com/security/cve/CVE-2011-2199/" source="CVE"/>
		<description>
These are all security issues fixed in the tftp-0.48-101.31.27 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2199/">CVE-2011-2199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2199">CVE-2011-2199 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990047" comment="tftp-0.48-101.31.27 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216161" version="1" class="patch">
	<metadata>
		<title>tgt-0.9.10-0.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0001" ref_url="https://www.suse.com/security/cve/CVE-2011-0001/" source="CVE"/>
		<description>
These are all security issues fixed in the tgt-0.9.10-0.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0001/">CVE-2011-0001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0001">CVE-2011-0001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990048" comment="tgt-0.9.10-0.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216162" version="1" class="patch">
	<metadata>
		<title>tomcat6-6.0.18-20.35.40.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-1232" ref_url="https://www.suse.com/security/cve/CVE-2008-1232/" source="CVE"/>
		<reference ref_id="CVE-2008-1947" ref_url="https://www.suse.com/security/cve/CVE-2008-1947/" source="CVE"/>
		<reference ref_id="CVE-2008-2370" ref_url="https://www.suse.com/security/cve/CVE-2008-2370/" source="CVE"/>
		<reference ref_id="CVE-2008-2938" ref_url="https://www.suse.com/security/cve/CVE-2008-2938/" source="CVE"/>
		<reference ref_id="CVE-2008-5515" ref_url="https://www.suse.com/security/cve/CVE-2008-5515/" source="CVE"/>
		<reference ref_id="CVE-2009-0033" ref_url="https://www.suse.com/security/cve/CVE-2009-0033/" source="CVE"/>
		<reference ref_id="CVE-2009-0580" ref_url="https://www.suse.com/security/cve/CVE-2009-0580/" source="CVE"/>
		<reference ref_id="CVE-2009-0781" ref_url="https://www.suse.com/security/cve/CVE-2009-0781/" source="CVE"/>
		<reference ref_id="CVE-2009-0783" ref_url="https://www.suse.com/security/cve/CVE-2009-0783/" source="CVE"/>
		<reference ref_id="CVE-2009-2693" ref_url="https://www.suse.com/security/cve/CVE-2009-2693/" source="CVE"/>
		<reference ref_id="CVE-2009-2901" ref_url="https://www.suse.com/security/cve/CVE-2009-2901/" source="CVE"/>
		<reference ref_id="CVE-2009-2902" ref_url="https://www.suse.com/security/cve/CVE-2009-2902/" source="CVE"/>
		<reference ref_id="CVE-2010-1157" ref_url="https://www.suse.com/security/cve/CVE-2010-1157/" source="CVE"/>
		<reference ref_id="CVE-2010-2227" ref_url="https://www.suse.com/security/cve/CVE-2010-2227/" source="CVE"/>
		<reference ref_id="CVE-2010-3718" ref_url="https://www.suse.com/security/cve/CVE-2010-3718/" source="CVE"/>
		<reference ref_id="CVE-2010-4172" ref_url="https://www.suse.com/security/cve/CVE-2010-4172/" source="CVE"/>
		<reference ref_id="CVE-2011-0013" ref_url="https://www.suse.com/security/cve/CVE-2011-0013/" source="CVE"/>
		<reference ref_id="CVE-2011-0534" ref_url="https://www.suse.com/security/cve/CVE-2011-0534/" source="CVE"/>
		<reference ref_id="CVE-2011-1184" ref_url="https://www.suse.com/security/cve/CVE-2011-1184/" source="CVE"/>
		<reference ref_id="CVE-2011-2204" ref_url="https://www.suse.com/security/cve/CVE-2011-2204/" source="CVE"/>
		<reference ref_id="CVE-2011-2526" ref_url="https://www.suse.com/security/cve/CVE-2011-2526/" source="CVE"/>
		<reference ref_id="CVE-2011-3190" ref_url="https://www.suse.com/security/cve/CVE-2011-3190/" source="CVE"/>
		<reference ref_id="CVE-2011-5062" ref_url="https://www.suse.com/security/cve/CVE-2011-5062/" source="CVE"/>
		<reference ref_id="CVE-2011-5063" ref_url="https://www.suse.com/security/cve/CVE-2011-5063/" source="CVE"/>
		<reference ref_id="CVE-2011-5064" ref_url="https://www.suse.com/security/cve/CVE-2011-5064/" source="CVE"/>
		<reference ref_id="CVE-2012-2733" ref_url="https://www.suse.com/security/cve/CVE-2012-2733/" source="CVE"/>
		<reference ref_id="CVE-2012-3546" ref_url="https://www.suse.com/security/cve/CVE-2012-3546/" source="CVE"/>
		<reference ref_id="CVE-2012-4431" ref_url="https://www.suse.com/security/cve/CVE-2012-4431/" source="CVE"/>
		<reference ref_id="CVE-2012-4534" ref_url="https://www.suse.com/security/cve/CVE-2012-4534/" source="CVE"/>
		<reference ref_id="CVE-2012-5568" ref_url="https://www.suse.com/security/cve/CVE-2012-5568/" source="CVE"/>
		<reference ref_id="CVE-2012-5885" ref_url="https://www.suse.com/security/cve/CVE-2012-5885/" source="CVE"/>
		<reference ref_id="CVE-2012-5886" ref_url="https://www.suse.com/security/cve/CVE-2012-5886/" source="CVE"/>
		<reference ref_id="CVE-2012-5887" ref_url="https://www.suse.com/security/cve/CVE-2012-5887/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat6-6.0.18-20.35.40.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1232/">CVE-2008-1232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1232">CVE-2008-1232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1947/">CVE-2008-1947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1947">CVE-2008-1947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2370/">CVE-2008-2370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2370">CVE-2008-2370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2938/">CVE-2008-2938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2938">CVE-2008-2938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5515/">CVE-2008-5515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5515">CVE-2008-5515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0033/">CVE-2009-0033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0033">CVE-2009-0033 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0580/">CVE-2009-0580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0580">CVE-2009-0580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0781/">CVE-2009-0781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0781">CVE-2009-0781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0783/">CVE-2009-0783 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2009-0783">CVE-2009-0783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2693/">CVE-2009-2693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2693">CVE-2009-2693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2901/">CVE-2009-2901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2901">CVE-2009-2901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2902/">CVE-2009-2902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2902">CVE-2009-2902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1157/">CVE-2010-1157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1157">CVE-2010-1157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2227/">CVE-2010-2227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2227">CVE-2010-2227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3718/">CVE-2010-3718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3718">CVE-2010-3718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4172/">CVE-2010-4172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4172">CVE-2010-4172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0013/">CVE-2011-0013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0013">CVE-2011-0013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0534/">CVE-2011-0534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0534">CVE-2011-0534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1184/">CVE-2011-1184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1184">CVE-2011-1184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2204/">CVE-2011-2204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2204">CVE-2011-2204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2526/">CVE-2011-2526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2526">CVE-2011-2526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3190/">CVE-2011-3190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3190">CVE-2011-3190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5062/">CVE-2011-5062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-5062">CVE-2011-5062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5063/">CVE-2011-5063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-5063">CVE-2011-5063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5064/">CVE-2011-5064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-5064">CVE-2011-5064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2733/">CVE-2012-2733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2733">CVE-2012-2733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3546/">CVE-2012-3546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3546">CVE-2012-3546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4431/">CVE-2012-4431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4431">CVE-2012-4431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4534/">CVE-2012-4534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4534">CVE-2012-4534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5568/">CVE-2012-5568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5568">CVE-2012-5568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5885/">CVE-2012-5885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5885">CVE-2012-5885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5886/">CVE-2012-5886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5886">CVE-2012-5886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5887/">CVE-2012-5887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5887">CVE-2012-5887 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990049" comment="tomcat6-6.0.18-20.35.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990050" comment="tomcat6-admin-webapps-6.0.18-20.35.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990051" comment="tomcat6-docs-webapp-6.0.18-20.35.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990052" comment="tomcat6-javadoc-6.0.18-20.35.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990053" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990054" comment="tomcat6-lib-6.0.18-20.35.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990055" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990056" comment="tomcat6-webapps-6.0.18-20.35.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216163" version="1" class="patch">
	<metadata>
		<title>unixODBC_23-2.3.1-0.9.40 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1145" ref_url="https://www.suse.com/security/cve/CVE-2011-1145/" source="CVE"/>
		<description>
These are all security issues fixed in the unixODBC_23-2.3.1-0.9.40 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2011-1145/">CVE-2011-1145 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-1145">CVE-2011-1145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990057" comment="unixODBC_23-2.3.1-0.9.40 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216164" version="1" class="patch">
	<metadata>
		<title>unrar-3.80.2-2.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-3726" ref_url="https://www.suse.com/security/cve/CVE-2007-3726/" source="CVE"/>
		<description>
These are all security issues fixed in the unrar-3.80.2-2.8 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3726/">CVE-2007-3726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3726">CVE-2007-3726 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988861" comment="unrar-3.80.2-2.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216165" version="1" class="patch">
	<metadata>
		<title>unzip-6.00-11.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2005-2475" ref_url="https://www.suse.com/security/cve/CVE-2005-2475/" source="CVE"/>
		<description>
These are all security issues fixed in the unzip-6.00-11.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-2475/">CVE-2005-2475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-2475">CVE-2005-2475 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989475" comment="unzip-6.00-11.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216166" version="1" class="patch">
	<metadata>
		<title>virt-utils-1.2.1-0.7.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1922" ref_url="https://www.suse.com/security/cve/CVE-2013-1922/" source="CVE"/>
		<description>
These are all security issues fixed in the virt-utils-1.2.1-0.7.19 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1922/">CVE-2013-1922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1922">CVE-2013-1922 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990058" comment="virt-utils-1.2.1-0.7.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216167" version="1" class="patch">
	<metadata>
		<title>vte-0.22.5-0.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2713" ref_url="https://www.suse.com/security/cve/CVE-2010-2713/" source="CVE"/>
		<description>
These are all security issues fixed in the vte-0.22.5-0.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2713/">CVE-2010-2713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2713">CVE-2010-2713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989476" comment="vte-0.22.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989477" comment="vte-doc-0.22.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989478" comment="vte-lang-0.22.5-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216168" version="1" class="patch">
	<metadata>
		<title>w3m-0.5.2-132.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-6772" ref_url="https://www.suse.com/security/cve/CVE-2006-6772/" source="CVE"/>
		<reference ref_id="CVE-2010-2074" ref_url="https://www.suse.com/security/cve/CVE-2010-2074/" source="CVE"/>
		<description>
These are all security issues fixed in the w3m-0.5.2-132.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6772/">CVE-2006-6772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6772">CVE-2006-6772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2074/">CVE-2010-2074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2074">CVE-2010-2074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989479" comment="w3m-0.5.2-132.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216169" version="1" class="patch">
	<metadata>
		<title>wget-1.11.4-1.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-6719" ref_url="https://www.suse.com/security/cve/CVE-2006-6719/" source="CVE"/>
		<description>
These are all security issues fixed in the wget-1.11.4-1.15.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6719/">CVE-2006-6719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6719">CVE-2006-6719 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988864" comment="wget-1.11.4-1.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216170" version="1" class="patch">
	<metadata>
		<title>wireshark-1.8.6-0.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-1932" ref_url="https://www.suse.com/security/cve/CVE-2006-1932/" source="CVE"/>
		<reference ref_id="CVE-2006-4574" ref_url="https://www.suse.com/security/cve/CVE-2006-4574/" source="CVE"/>
		<reference ref_id="CVE-2006-4805" ref_url="https://www.suse.com/security/cve/CVE-2006-4805/" source="CVE"/>
		<reference ref_id="CVE-2006-5468" ref_url="https://www.suse.com/security/cve/CVE-2006-5468/" source="CVE"/>
		<reference ref_id="CVE-2006-5469" ref_url="https://www.suse.com/security/cve/CVE-2006-5469/" source="CVE"/>
		<reference ref_id="CVE-2006-5740" ref_url="https://www.suse.com/security/cve/CVE-2006-5740/" source="CVE"/>
		<reference ref_id="CVE-2007-0456" ref_url="https://www.suse.com/security/cve/CVE-2007-0456/" source="CVE"/>
		<reference ref_id="CVE-2007-0457" ref_url="https://www.suse.com/security/cve/CVE-2007-0457/" source="CVE"/>
		<reference ref_id="CVE-2007-0458" ref_url="https://www.suse.com/security/cve/CVE-2007-0458/" source="CVE"/>
		<reference ref_id="CVE-2007-0459" ref_url="https://www.suse.com/security/cve/CVE-2007-0459/" source="CVE"/>
		<reference ref_id="CVE-2009-1210" ref_url="https://www.suse.com/security/cve/CVE-2009-1210/" source="CVE"/>
		<reference ref_id="CVE-2009-1267" ref_url="https://www.suse.com/security/cve/CVE-2009-1267/" source="CVE"/>
		<reference ref_id="CVE-2009-1268" ref_url="https://www.suse.com/security/cve/CVE-2009-1268/" source="CVE"/>
		<reference ref_id="CVE-2009-1269" ref_url="https://www.suse.com/security/cve/CVE-2009-1269/" source="CVE"/>
		<reference ref_id="CVE-2009-2560" ref_url="https://www.suse.com/security/cve/CVE-2009-2560/" source="CVE"/>
		<reference ref_id="CVE-2009-2562" ref_url="https://www.suse.com/security/cve/CVE-2009-2562/" source="CVE"/>
		<reference ref_id="CVE-2009-3549" ref_url="https://www.suse.com/security/cve/CVE-2009-3549/" source="CVE"/>
		<reference ref_id="CVE-2009-3550" ref_url="https://www.suse.com/security/cve/CVE-2009-3550/" source="CVE"/>
		<reference ref_id="CVE-2009-3829" ref_url="https://www.suse.com/security/cve/CVE-2009-3829/" source="CVE"/>
		<reference ref_id="CVE-2009-4377" ref_url="https://www.suse.com/security/cve/CVE-2009-4377/" source="CVE"/>
		<reference ref_id="CVE-2010-0304" ref_url="https://www.suse.com/security/cve/CVE-2010-0304/" source="CVE"/>
		<reference ref_id="CVE-2010-1455" ref_url="https://www.suse.com/security/cve/CVE-2010-1455/" source="CVE"/>
		<reference ref_id="CVE-2010-2992" ref_url="https://www.suse.com/security/cve/CVE-2010-2992/" source="CVE"/>
		<reference ref_id="CVE-2010-2993" ref_url="https://www.suse.com/security/cve/CVE-2010-2993/" source="CVE"/>
		<reference ref_id="CVE-2010-2994" ref_url="https://www.suse.com/security/cve/CVE-2010-2994/" source="CVE"/>
		<reference ref_id="CVE-2010-2995" ref_url="https://www.suse.com/security/cve/CVE-2010-2995/" source="CVE"/>
		<reference ref_id="CVE-2010-3445" ref_url="https://www.suse.com/security/cve/CVE-2010-3445/" source="CVE"/>
		<reference ref_id="CVE-2010-4300" ref_url="https://www.suse.com/security/cve/CVE-2010-4300/" source="CVE"/>
		<reference ref_id="CVE-2010-4301" ref_url="https://www.suse.com/security/cve/CVE-2010-4301/" source="CVE"/>
		<reference ref_id="CVE-2010-4538" ref_url="https://www.suse.com/security/cve/CVE-2010-4538/" source="CVE"/>
		<reference ref_id="CVE-2011-0024" ref_url="https://www.suse.com/security/cve/CVE-2011-0024/" source="CVE"/>
		<reference ref_id="CVE-2011-0538" ref_url="https://www.suse.com/security/cve/CVE-2011-0538/" source="CVE"/>
		<reference ref_id="CVE-2011-0713" ref_url="https://www.suse.com/security/cve/CVE-2011-0713/" source="CVE"/>
		<reference ref_id="CVE-2011-1138" ref_url="https://www.suse.com/security/cve/CVE-2011-1138/" source="CVE"/>
		<reference ref_id="CVE-2011-1139" ref_url="https://www.suse.com/security/cve/CVE-2011-1139/" source="CVE"/>
		<reference ref_id="CVE-2011-1140" ref_url="https://www.suse.com/security/cve/CVE-2011-1140/" source="CVE"/>
		<reference ref_id="CVE-2011-1143" ref_url="https://www.suse.com/security/cve/CVE-2011-1143/" source="CVE"/>
		<reference ref_id="CVE-2011-1590" ref_url="https://www.suse.com/security/cve/CVE-2011-1590/" source="CVE"/>
		<reference ref_id="CVE-2011-1591" ref_url="https://www.suse.com/security/cve/CVE-2011-1591/" source="CVE"/>
		<reference ref_id="CVE-2011-1592" ref_url="https://www.suse.com/security/cve/CVE-2011-1592/" source="CVE"/>
		<reference ref_id="CVE-2011-1957" ref_url="https://www.suse.com/security/cve/CVE-2011-1957/" source="CVE"/>
		<reference ref_id="CVE-2011-1958" ref_url="https://www.suse.com/security/cve/CVE-2011-1958/" source="CVE"/>
		<reference ref_id="CVE-2011-1959" ref_url="https://www.suse.com/security/cve/CVE-2011-1959/" source="CVE"/>
		<reference ref_id="CVE-2011-2174" ref_url="https://www.suse.com/security/cve/CVE-2011-2174/" source="CVE"/>
		<reference ref_id="CVE-2011-2175" ref_url="https://www.suse.com/security/cve/CVE-2011-2175/" source="CVE"/>
		<reference ref_id="CVE-2011-2597" ref_url="https://www.suse.com/security/cve/CVE-2011-2597/" source="CVE"/>
		<reference ref_id="CVE-2011-2698" ref_url="https://www.suse.com/security/cve/CVE-2011-2698/" source="CVE"/>
		<reference ref_id="CVE-2011-3266" ref_url="https://www.suse.com/security/cve/CVE-2011-3266/" source="CVE"/>
		<reference ref_id="CVE-2011-3360" ref_url="https://www.suse.com/security/cve/CVE-2011-3360/" source="CVE"/>
		<reference ref_id="CVE-2011-3483" ref_url="https://www.suse.com/security/cve/CVE-2011-3483/" source="CVE"/>
		<reference ref_id="CVE-2012-1593" ref_url="https://www.suse.com/security/cve/CVE-2012-1593/" source="CVE"/>
		<reference ref_id="CVE-2012-1595" ref_url="https://www.suse.com/security/cve/CVE-2012-1595/" source="CVE"/>
		<reference ref_id="CVE-2012-1596" ref_url="https://www.suse.com/security/cve/CVE-2012-1596/" source="CVE"/>
		<reference ref_id="CVE-2012-2392" ref_url="https://www.suse.com/security/cve/CVE-2012-2392/" source="CVE"/>
		<reference ref_id="CVE-2012-2393" ref_url="https://www.suse.com/security/cve/CVE-2012-2393/" source="CVE"/>
		<reference ref_id="CVE-2012-2394" ref_url="https://www.suse.com/security/cve/CVE-2012-2394/" source="CVE"/>
		<reference ref_id="CVE-2012-4048" ref_url="https://www.suse.com/security/cve/CVE-2012-4048/" source="CVE"/>
		<reference ref_id="CVE-2012-4049" ref_url="https://www.suse.com/security/cve/CVE-2012-4049/" source="CVE"/>
		<reference ref_id="CVE-2012-4285" ref_url="https://www.suse.com/security/cve/CVE-2012-4285/" source="CVE"/>
		<reference ref_id="CVE-2012-4288" ref_url="https://www.suse.com/security/cve/CVE-2012-4288/" source="CVE"/>
		<reference ref_id="CVE-2012-4289" ref_url="https://www.suse.com/security/cve/CVE-2012-4289/" source="CVE"/>
		<reference ref_id="CVE-2012-4290" ref_url="https://www.suse.com/security/cve/CVE-2012-4290/" source="CVE"/>
		<reference ref_id="CVE-2012-4291" ref_url="https://www.suse.com/security/cve/CVE-2012-4291/" source="CVE"/>
		<reference ref_id="CVE-2012-4292" ref_url="https://www.suse.com/security/cve/CVE-2012-4292/" source="CVE"/>
		<reference ref_id="CVE-2012-4293" ref_url="https://www.suse.com/security/cve/CVE-2012-4293/" source="CVE"/>
		<reference ref_id="CVE-2012-4296" ref_url="https://www.suse.com/security/cve/CVE-2012-4296/" source="CVE"/>
		<reference ref_id="CVE-2012-5592" ref_url="https://www.suse.com/security/cve/CVE-2012-5592/" source="CVE"/>
		<reference ref_id="CVE-2012-5593" ref_url="https://www.suse.com/security/cve/CVE-2012-5593/" source="CVE"/>
		<reference ref_id="CVE-2012-5594" ref_url="https://www.suse.com/security/cve/CVE-2012-5594/" source="CVE"/>
		<reference ref_id="CVE-2012-5595" ref_url="https://www.suse.com/security/cve/CVE-2012-5595/" source="CVE"/>
		<reference ref_id="CVE-2012-5596" ref_url="https://www.suse.com/security/cve/CVE-2012-5596/" source="CVE"/>
		<reference ref_id="CVE-2012-5597" ref_url="https://www.suse.com/security/cve/CVE-2012-5597/" source="CVE"/>
		<reference ref_id="CVE-2012-5598" ref_url="https://www.suse.com/security/cve/CVE-2012-5598/" source="CVE"/>
		<reference ref_id="CVE-2012-5599" ref_url="https://www.suse.com/security/cve/CVE-2012-5599/" source="CVE"/>
		<reference ref_id="CVE-2012-5600" ref_url="https://www.suse.com/security/cve/CVE-2012-5600/" source="CVE"/>
		<reference ref_id="CVE-2012-5601" ref_url="https://www.suse.com/security/cve/CVE-2012-5601/" source="CVE"/>
		<reference ref_id="CVE-2012-5602" ref_url="https://www.suse.com/security/cve/CVE-2012-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-1572" ref_url="https://www.suse.com/security/cve/CVE-2013-1572/" source="CVE"/>
		<reference ref_id="CVE-2013-1573" ref_url="https://www.suse.com/security/cve/CVE-2013-1573/" source="CVE"/>
		<reference ref_id="CVE-2013-1574" ref_url="https://www.suse.com/security/cve/CVE-2013-1574/" source="CVE"/>
		<reference ref_id="CVE-2013-1575" ref_url="https://www.suse.com/security/cve/CVE-2013-1575/" source="CVE"/>
		<reference ref_id="CVE-2013-1576" ref_url="https://www.suse.com/security/cve/CVE-2013-1576/" source="CVE"/>
		<reference ref_id="CVE-2013-1577" ref_url="https://www.suse.com/security/cve/CVE-2013-1577/" source="CVE"/>
		<reference ref_id="CVE-2013-1578" ref_url="https://www.suse.com/security/cve/CVE-2013-1578/" source="CVE"/>
		<reference ref_id="CVE-2013-1579" ref_url="https://www.suse.com/security/cve/CVE-2013-1579/" source="CVE"/>
		<reference ref_id="CVE-2013-1580" ref_url="https://www.suse.com/security/cve/CVE-2013-1580/" source="CVE"/>
		<reference ref_id="CVE-2013-1581" ref_url="https://www.suse.com/security/cve/CVE-2013-1581/" source="CVE"/>
		<reference ref_id="CVE-2013-1582" ref_url="https://www.suse.com/security/cve/CVE-2013-1582/" source="CVE"/>
		<reference ref_id="CVE-2013-1583" ref_url="https://www.suse.com/security/cve/CVE-2013-1583/" source="CVE"/>
		<reference ref_id="CVE-2013-1584" ref_url="https://www.suse.com/security/cve/CVE-2013-1584/" source="CVE"/>
		<reference ref_id="CVE-2013-1585" ref_url="https://www.suse.com/security/cve/CVE-2013-1585/" source="CVE"/>
		<reference ref_id="CVE-2013-1586" ref_url="https://www.suse.com/security/cve/CVE-2013-1586/" source="CVE"/>
		<reference ref_id="CVE-2013-1587" ref_url="https://www.suse.com/security/cve/CVE-2013-1587/" source="CVE"/>
		<reference ref_id="CVE-2013-1588" ref_url="https://www.suse.com/security/cve/CVE-2013-1588/" source="CVE"/>
		<reference ref_id="CVE-2013-1589" ref_url="https://www.suse.com/security/cve/CVE-2013-1589/" source="CVE"/>
		<reference ref_id="CVE-2013-1590" ref_url="https://www.suse.com/security/cve/CVE-2013-1590/" source="CVE"/>
		<reference ref_id="CVE-2013-2475" ref_url="https://www.suse.com/security/cve/CVE-2013-2475/" source="CVE"/>
		<reference ref_id="CVE-2013-2476" ref_url="https://www.suse.com/security/cve/CVE-2013-2476/" source="CVE"/>
		<reference ref_id="CVE-2013-2477" ref_url="https://www.suse.com/security/cve/CVE-2013-2477/" source="CVE"/>
		<reference ref_id="CVE-2013-2478" ref_url="https://www.suse.com/security/cve/CVE-2013-2478/" source="CVE"/>
		<reference ref_id="CVE-2013-2479" ref_url="https://www.suse.com/security/cve/CVE-2013-2479/" source="CVE"/>
		<reference ref_id="CVE-2013-2480" ref_url="https://www.suse.com/security/cve/CVE-2013-2480/" source="CVE"/>
		<reference ref_id="CVE-2013-2481" ref_url="https://www.suse.com/security/cve/CVE-2013-2481/" source="CVE"/>
		<reference ref_id="CVE-2013-2482" ref_url="https://www.suse.com/security/cve/CVE-2013-2482/" source="CVE"/>
		<reference ref_id="CVE-2013-2483" ref_url="https://www.suse.com/security/cve/CVE-2013-2483/" source="CVE"/>
		<reference ref_id="CVE-2013-2484" ref_url="https://www.suse.com/security/cve/CVE-2013-2484/" source="CVE"/>
		<reference ref_id="CVE-2013-2485" ref_url="https://www.suse.com/security/cve/CVE-2013-2485/" source="CVE"/>
		<reference ref_id="CVE-2013-2486" ref_url="https://www.suse.com/security/cve/CVE-2013-2486/" source="CVE"/>
		<reference ref_id="CVE-2013-2487" ref_url="https://www.suse.com/security/cve/CVE-2013-2487/" source="CVE"/>
		<reference ref_id="CVE-2013-2488" ref_url="https://www.suse.com/security/cve/CVE-2013-2488/" source="CVE"/>
		<description>
These are all security issues fixed in the wireshark-1.8.6-0.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1932/">CVE-2006-1932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1932">CVE-2006-1932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4574/">CVE-2006-4574 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2006-4574">CVE-2006-4574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4805/">CVE-2006-4805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4805">CVE-2006-4805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5468/">CVE-2006-5468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5468">CVE-2006-5468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5469/">CVE-2006-5469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5469">CVE-2006-5469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5740/">CVE-2006-5740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5740">CVE-2006-5740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0456/">CVE-2007-0456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0456">CVE-2007-0456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0457/">CVE-2007-0457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0457">CVE-2007-0457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0458/">CVE-2007-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0458">CVE-2007-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0459/">CVE-2007-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0459">CVE-2007-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1210/">CVE-2009-1210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1210">CVE-2009-1210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1267/">CVE-2009-1267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1267">CVE-2009-1267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1268/">CVE-2009-1268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1268">CVE-2009-1268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1269/">CVE-2009-1269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1269">CVE-2009-1269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2560/">CVE-2009-2560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2560">CVE-2009-2560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2562/">CVE-2009-2562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2562">CVE-2009-2562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3549/">CVE-2009-3549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3549">CVE-2009-3549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3550/">CVE-2009-3550 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3550">CVE-2009-3550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3829/">CVE-2009-3829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3829">CVE-2009-3829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4377/">CVE-2009-4377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4377">CVE-2009-4377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0304/">CVE-2010-0304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0304">CVE-2010-0304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1455/">CVE-2010-1455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1455">CVE-2010-1455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2992/">CVE-2010-2992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2992">CVE-2010-2992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2993/">CVE-2010-2993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2993">CVE-2010-2993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2994/">CVE-2010-2994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2994">CVE-2010-2994 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2995/">CVE-2010-2995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2995">CVE-2010-2995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3445/">CVE-2010-3445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3445">CVE-2010-3445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4300/">CVE-2010-4300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4300">CVE-2010-4300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4301/">CVE-2010-4301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4301">CVE-2010-4301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4538/">CVE-2010-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4538">CVE-2010-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0024/">CVE-2011-0024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0024">CVE-2011-0024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0538/">CVE-2011-0538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0538">CVE-2011-0538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0713/">CVE-2011-0713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0713">CVE-2011-0713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1138/">CVE-2011-1138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1138">CVE-2011-1138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1139/">CVE-2011-1139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1139">CVE-2011-1139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1140/">CVE-2011-1140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1140">CVE-2011-1140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1143/">CVE-2011-1143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1143">CVE-2011-1143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1590/">CVE-2011-1590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1590">CVE-2011-1590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1591/">CVE-2011-1591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1591">CVE-2011-1591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1592/">CVE-2011-1592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1592">CVE-2011-1592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1957/">CVE-2011-1957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1957">CVE-2011-1957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1958/">CVE-2011-1958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1958">CVE-2011-1958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1959/">CVE-2011-1959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1959">CVE-2011-1959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2174/">CVE-2011-2174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2174">CVE-2011-2174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2175/">CVE-2011-2175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2175">CVE-2011-2175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2597/">CVE-2011-2597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2597">CVE-2011-2597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2698/">CVE-2011-2698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2698">CVE-2011-2698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3266/">CVE-2011-3266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3266">CVE-2011-3266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3360/">CVE-2011-3360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3360">CVE-2011-3360 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3483/">CVE-2011-3483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3483">CVE-2011-3483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1593/">CVE-2012-1593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1593">CVE-2012-1593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1595/">CVE-2012-1595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1595">CVE-2012-1595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1596/">CVE-2012-1596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1596">CVE-2012-1596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2392/">CVE-2012-2392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2392">CVE-2012-2392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2393/">CVE-2012-2393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2393">CVE-2012-2393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2394/">CVE-2012-2394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2394">CVE-2012-2394 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4048/">CVE-2012-4048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4048">CVE-2012-4048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4049/">CVE-2012-4049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4049">CVE-2012-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4285/">CVE-2012-4285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4285">CVE-2012-4285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4288/">CVE-2012-4288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4288">CVE-2012-4288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4289/">CVE-2012-4289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4289">CVE-2012-4289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4290/">CVE-2012-4290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4290">CVE-2012-4290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4291/">CVE-2012-4291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4291">CVE-2012-4291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4292/">CVE-2012-4292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4292">CVE-2012-4292 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4293/">CVE-2012-4293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4293">CVE-2012-4293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4296/">CVE-2012-4296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4296">CVE-2012-4296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5592/">CVE-2012-5592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5592">CVE-2012-5592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5593/">CVE-2012-5593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5593">CVE-2012-5593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5594/">CVE-2012-5594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5594">CVE-2012-5594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5595/">CVE-2012-5595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5595">CVE-2012-5595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5596/">CVE-2012-5596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5596">CVE-2012-5596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5597/">CVE-2012-5597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5597">CVE-2012-5597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5598/">CVE-2012-5598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5598">CVE-2012-5598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5599/">CVE-2012-5599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5599">CVE-2012-5599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5600/">CVE-2012-5600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5600">CVE-2012-5600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5601/">CVE-2012-5601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5601">CVE-2012-5601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5602/">CVE-2012-5602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5602">CVE-2012-5602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1572/">CVE-2013-1572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1572">CVE-2013-1572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1573/">CVE-2013-1573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1573">CVE-2013-1573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1574/">CVE-2013-1574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1574">CVE-2013-1574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1575/">CVE-2013-1575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1575">CVE-2013-1575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1576/">CVE-2013-1576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1576">CVE-2013-1576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1577/">CVE-2013-1577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1577">CVE-2013-1577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1578/">CVE-2013-1578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1578">CVE-2013-1578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1579/">CVE-2013-1579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1579">CVE-2013-1579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1580/">CVE-2013-1580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1580">CVE-2013-1580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1581/">CVE-2013-1581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1581">CVE-2013-1581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1582/">CVE-2013-1582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1582">CVE-2013-1582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1583/">CVE-2013-1583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1583">CVE-2013-1583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1584/">CVE-2013-1584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1584">CVE-2013-1584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1585/">CVE-2013-1585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1585">CVE-2013-1585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1586/">CVE-2013-1586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1586">CVE-2013-1586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1587/">CVE-2013-1587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1587">CVE-2013-1587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1588/">CVE-2013-1588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1588">CVE-2013-1588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1589/">CVE-2013-1589 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1589">CVE-2013-1589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1590/">CVE-2013-1590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1590">CVE-2013-1590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2475/">CVE-2013-2475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2475">CVE-2013-2475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2476/">CVE-2013-2476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2476">CVE-2013-2476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2477/">CVE-2013-2477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2477">CVE-2013-2477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2478/">CVE-2013-2478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2478">CVE-2013-2478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2479/">CVE-2013-2479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2479">CVE-2013-2479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2480/">CVE-2013-2480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2480">CVE-2013-2480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2481/">CVE-2013-2481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2481">CVE-2013-2481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2482/">CVE-2013-2482 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2482">CVE-2013-2482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2483/">CVE-2013-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2483">CVE-2013-2483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2484/">CVE-2013-2484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2484">CVE-2013-2484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2485/">CVE-2013-2485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2485">CVE-2013-2485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2486/">CVE-2013-2486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2486">CVE-2013-2486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2487/">CVE-2013-2487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2487">CVE-2013-2487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2488/">CVE-2013-2488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2488">CVE-2013-2488 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990059" comment="wireshark-1.8.6-0.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216171" version="1" class="patch">
	<metadata>
		<title>x3270-3.3.12-517.12.34 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-5662" ref_url="https://www.suse.com/security/cve/CVE-2012-5662/" source="CVE"/>
		<description>
These are all security issues fixed in the x3270-3.3.12-517.12.34 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5662/">CVE-2012-5662 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5662">CVE-2012-5662 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990060" comment="x3270-3.3.12-517.12.34 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216172" version="1" class="patch">
	<metadata>
		<title>xdg-utils-1.0.2-36.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-0386" ref_url="https://www.suse.com/security/cve/CVE-2008-0386/" source="CVE"/>
		<description>
These are all security issues fixed in the xdg-utils-1.0.2-36.18 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0386/">CVE-2008-0386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0386">CVE-2008-0386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988866" comment="xdg-utils-1.0.2-36.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216173" version="1" class="patch">
	<metadata>
		<title>xen-4.2.2_04-0.7.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-1320" ref_url="https://www.suse.com/security/cve/CVE-2007-1320/" source="CVE"/>
		<reference ref_id="CVE-2007-1321" ref_url="https://www.suse.com/security/cve/CVE-2007-1321/" source="CVE"/>
		<reference ref_id="CVE-2007-1322" ref_url="https://www.suse.com/security/cve/CVE-2007-1322/" source="CVE"/>
		<reference ref_id="CVE-2007-1323" ref_url="https://www.suse.com/security/cve/CVE-2007-1323/" source="CVE"/>
		<reference ref_id="CVE-2007-1366" ref_url="https://www.suse.com/security/cve/CVE-2007-1366/" source="CVE"/>
		<reference ref_id="CVE-2007-3919" ref_url="https://www.suse.com/security/cve/CVE-2007-3919/" source="CVE"/>
		<reference ref_id="CVE-2011-1898" ref_url="https://www.suse.com/security/cve/CVE-2011-1898/" source="CVE"/>
		<reference ref_id="CVE-2012-0029" ref_url="https://www.suse.com/security/cve/CVE-2012-0029/" source="CVE"/>
		<reference ref_id="CVE-2012-0217" ref_url="https://www.suse.com/security/cve/CVE-2012-0217/" source="CVE"/>
		<reference ref_id="CVE-2012-2625" ref_url="https://www.suse.com/security/cve/CVE-2012-2625/" source="CVE"/>
		<reference ref_id="CVE-2012-3432" ref_url="https://www.suse.com/security/cve/CVE-2012-3432/" source="CVE"/>
		<reference ref_id="CVE-2012-3433" ref_url="https://www.suse.com/security/cve/CVE-2012-3433/" source="CVE"/>
		<reference ref_id="CVE-2012-3494" ref_url="https://www.suse.com/security/cve/CVE-2012-3494/" source="CVE"/>
		<reference ref_id="CVE-2012-3495" ref_url="https://www.suse.com/security/cve/CVE-2012-3495/" source="CVE"/>
		<reference ref_id="CVE-2012-3496" ref_url="https://www.suse.com/security/cve/CVE-2012-3496/" source="CVE"/>
		<reference ref_id="CVE-2012-3497" ref_url="https://www.suse.com/security/cve/CVE-2012-3497/" source="CVE"/>
		<reference ref_id="CVE-2012-3498" ref_url="https://www.suse.com/security/cve/CVE-2012-3498/" source="CVE"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<reference ref_id="CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411/" source="CVE"/>
		<reference ref_id="CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535/" source="CVE"/>
		<reference ref_id="CVE-2012-4536" ref_url="https://www.suse.com/security/cve/CVE-2012-4536/" source="CVE"/>
		<reference ref_id="CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537/" source="CVE"/>
		<reference ref_id="CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538/" source="CVE"/>
		<reference ref_id="CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544/" source="CVE"/>
		<reference ref_id="CVE-2012-5510" ref_url="https://www.suse.com/security/cve/CVE-2012-5510/" source="CVE"/>
		<reference ref_id="CVE-2012-5511" ref_url="https://www.suse.com/security/cve/CVE-2012-5511/" source="CVE"/>
		<reference ref_id="CVE-2012-5513" ref_url="https://www.suse.com/security/cve/CVE-2012-5513/" source="CVE"/>
		<reference ref_id="CVE-2012-5514" ref_url="https://www.suse.com/security/cve/CVE-2012-5514/" source="CVE"/>
		<reference ref_id="CVE-2012-5515" ref_url="https://www.suse.com/security/cve/CVE-2012-5515/" source="CVE"/>
		<reference ref_id="CVE-2012-5525" ref_url="https://www.suse.com/security/cve/CVE-2012-5525/" source="CVE"/>
		<reference ref_id="CVE-2012-5634" ref_url="https://www.suse.com/security/cve/CVE-2012-5634/" source="CVE"/>
		<reference ref_id="CVE-2012-6075" ref_url="https://www.suse.com/security/cve/CVE-2012-6075/" source="CVE"/>
		<reference ref_id="CVE-2013-0151" ref_url="https://www.suse.com/security/cve/CVE-2013-0151/" source="CVE"/>
		<reference ref_id="CVE-2013-0152" ref_url="https://www.suse.com/security/cve/CVE-2013-0152/" source="CVE"/>
		<reference ref_id="CVE-2013-0153" ref_url="https://www.suse.com/security/cve/CVE-2013-0153/" source="CVE"/>
		<reference ref_id="CVE-2013-1917" ref_url="https://www.suse.com/security/cve/CVE-2013-1917/" source="CVE"/>
		<reference ref_id="CVE-2013-1918" ref_url="https://www.suse.com/security/cve/CVE-2013-1918/" source="CVE"/>
		<reference ref_id="CVE-2013-1919" ref_url="https://www.suse.com/security/cve/CVE-2013-1919/" source="CVE"/>
		<reference ref_id="CVE-2013-1920" ref_url="https://www.suse.com/security/cve/CVE-2013-1920/" source="CVE"/>
		<reference ref_id="CVE-2013-1922" ref_url="https://www.suse.com/security/cve/CVE-2013-1922/" source="CVE"/>
		<reference ref_id="CVE-2013-1952" ref_url="https://www.suse.com/security/cve/CVE-2013-1952/" source="CVE"/>
		<reference ref_id="CVE-2013-2007" ref_url="https://www.suse.com/security/cve/CVE-2013-2007/" source="CVE"/>
		<reference ref_id="CVE-2013-2072" ref_url="https://www.suse.com/security/cve/CVE-2013-2072/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.2.2_04-0.7.5 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1320/">CVE-2007-1320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1320">CVE-2007-1320 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1321/">CVE-2007-1321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1321">CVE-2007-1321 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1322/">CVE-2007-1322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1322">CVE-2007-1322 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1323/">CVE-2007-1323 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1323">CVE-2007-1323 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1366/">CVE-2007-1366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1366">CVE-2007-1366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3919/">CVE-2007-3919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3919">CVE-2007-3919 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1898/">CVE-2011-1898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1898">CVE-2011-1898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0029/">CVE-2012-0029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0029">CVE-2012-0029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0217/">CVE-2012-0217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0217">CVE-2012-0217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2625/">CVE-2012-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2625">CVE-2012-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3432/">CVE-2012-3432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3432">CVE-2012-3432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3433/">CVE-2012-3433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3433">CVE-2012-3433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3494/">CVE-2012-3494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3494">CVE-2012-3494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3495/">CVE-2012-3495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3495">CVE-2012-3495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3496/">CVE-2012-3496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3496">CVE-2012-3496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3497/">CVE-2012-3497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3497">CVE-2012-3497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3498/">CVE-2012-3498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3498">CVE-2012-3498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3515">CVE-2012-3515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4411">CVE-2012-4411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4535">CVE-2012-4535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4536/">CVE-2012-4536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4536">CVE-2012-4536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4537">CVE-2012-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4538">CVE-2012-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4539">CVE-2012-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4544">CVE-2012-4544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5510/">CVE-2012-5510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5510">CVE-2012-5510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5511/">CVE-2012-5511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5511">CVE-2012-5511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5513/">CVE-2012-5513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5513">CVE-2012-5513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5514/">CVE-2012-5514 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5514">CVE-2012-5514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5515/">CVE-2012-5515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5515">CVE-2012-5515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5525/">CVE-2012-5525 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5525">CVE-2012-5525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5634/">CVE-2012-5634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5634">CVE-2012-5634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6075/">CVE-2012-6075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6075">CVE-2012-6075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0151/">CVE-2013-0151 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0151">CVE-2013-0151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0152/">CVE-2013-0152 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0152">CVE-2013-0152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0153/">CVE-2013-0153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0153">CVE-2013-0153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1917/">CVE-2013-1917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1917">CVE-2013-1917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1918/">CVE-2013-1918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1918">CVE-2013-1918 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1919/">CVE-2013-1919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1919">CVE-2013-1919 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1920/">CVE-2013-1920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1920">CVE-2013-1920 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1922/">CVE-2013-1922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1922">CVE-2013-1922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1952/">CVE-2013-1952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1952">CVE-2013-1952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2007/">CVE-2013-2007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2007">CVE-2013-2007 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2072/">CVE-2013-2072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2072">CVE-2013-2072 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990061" comment="xen-4.2.2_04-0.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990062" comment="xen-doc-html-4.2.2_04-0.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990063" comment="xen-doc-pdf-4.2.2_04-0.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990064" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990065" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990066" comment="xen-libs-4.2.2_04-0.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990067" comment="xen-libs-32bit-4.2.2_04-0.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990068" comment="xen-tools-4.2.2_04-0.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990069" comment="xen-tools-domU-4.2.2_04-0.7.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216174" version="1" class="patch">
	<metadata>
		<title>xorg-x11-7.4-9.62.46 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-4568" ref_url="https://www.suse.com/security/cve/CVE-2007-4568/" source="CVE"/>
		<reference ref_id="CVE-2011-0465" ref_url="https://www.suse.com/security/cve/CVE-2011-0465/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-7.4-9.62.46 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4568/">CVE-2007-4568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4568">CVE-2007-4568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0465/">CVE-2011-0465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0465">CVE-2011-0465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990070" comment="xorg-x11-7.4-9.62.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990071" comment="xorg-x11-xauth-7.4-9.62.46 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216175" version="1" class="patch">
	<metadata>
		<title>xorg-x11-Xvnc-7.4-27.81.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-6101" ref_url="https://www.suse.com/security/cve/CVE-2006-6101/" source="CVE"/>
		<reference ref_id="CVE-2006-6102" ref_url="https://www.suse.com/security/cve/CVE-2006-6102/" source="CVE"/>
		<reference ref_id="CVE-2006-6103" ref_url="https://www.suse.com/security/cve/CVE-2006-6103/" source="CVE"/>
		<reference ref_id="CVE-2007-1003" ref_url="https://www.suse.com/security/cve/CVE-2007-1003/" source="CVE"/>
		<reference ref_id="CVE-2007-5760" ref_url="https://www.suse.com/security/cve/CVE-2007-5760/" source="CVE"/>
		<reference ref_id="CVE-2007-6427" ref_url="https://www.suse.com/security/cve/CVE-2007-6427/" source="CVE"/>
		<reference ref_id="CVE-2007-6428" ref_url="https://www.suse.com/security/cve/CVE-2007-6428/" source="CVE"/>
		<reference ref_id="CVE-2007-6429" ref_url="https://www.suse.com/security/cve/CVE-2007-6429/" source="CVE"/>
		<reference ref_id="CVE-2008-0006" ref_url="https://www.suse.com/security/cve/CVE-2008-0006/" source="CVE"/>
		<reference ref_id="CVE-2008-1377" ref_url="https://www.suse.com/security/cve/CVE-2008-1377/" source="CVE"/>
		<reference ref_id="CVE-2008-1379" ref_url="https://www.suse.com/security/cve/CVE-2008-1379/" source="CVE"/>
		<reference ref_id="CVE-2008-2360" ref_url="https://www.suse.com/security/cve/CVE-2008-2360/" source="CVE"/>
		<reference ref_id="CVE-2008-2361" ref_url="https://www.suse.com/security/cve/CVE-2008-2361/" source="CVE"/>
		<reference ref_id="CVE-2008-2362" ref_url="https://www.suse.com/security/cve/CVE-2008-2362/" source="CVE"/>
		<reference ref_id="CVE-2010-2240" ref_url="https://www.suse.com/security/cve/CVE-2010-2240/" source="CVE"/>
		<reference ref_id="CVE-2010-4818" ref_url="https://www.suse.com/security/cve/CVE-2010-4818/" source="CVE"/>
		<reference ref_id="CVE-2010-4819" ref_url="https://www.suse.com/security/cve/CVE-2010-4819/" source="CVE"/>
		<reference ref_id="CVE-2011-4028" ref_url="https://www.suse.com/security/cve/CVE-2011-4028/" source="CVE"/>
		<reference ref_id="CVE-2011-4029" ref_url="https://www.suse.com/security/cve/CVE-2011-4029/" source="CVE"/>
		<reference ref_id="CVE-2013-1940" ref_url="https://www.suse.com/security/cve/CVE-2013-1940/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-Xvnc-7.4-27.81.7 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6101/">CVE-2006-6101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6101">CVE-2006-6101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6102/">CVE-2006-6102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6102">CVE-2006-6102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6103/">CVE-2006-6103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6103">CVE-2006-6103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1003/">CVE-2007-1003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1003">CVE-2007-1003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5760/">CVE-2007-5760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5760">CVE-2007-5760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6427/">CVE-2007-6427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6427">CVE-2007-6427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6428/">CVE-2007-6428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6428">CVE-2007-6428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6429/">CVE-2007-6429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6429">CVE-2007-6429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0006/">CVE-2008-0006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0006">CVE-2008-0006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1377/">CVE-2008-1377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1377">CVE-2008-1377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1379/">CVE-2008-1379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1379">CVE-2008-1379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2360/">CVE-2008-2360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2360">CVE-2008-2360 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2361/">CVE-2008-2361 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2361">CVE-2008-2361 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2362/">CVE-2008-2362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2362">CVE-2008-2362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2240/">CVE-2010-2240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2240">CVE-2010-2240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4818/">CVE-2010-4818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4818">CVE-2010-4818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4819/">CVE-2010-4819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4819">CVE-2010-4819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4028/">CVE-2011-4028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4028">CVE-2011-4028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4029/">CVE-2011-4029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4029">CVE-2011-4029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1940/">CVE-2013-1940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1940">CVE-2013-1940 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990072" comment="xorg-x11-Xvnc-7.4-27.81.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990073" comment="xorg-x11-server-7.4-27.81.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990074" comment="xorg-x11-server-extra-7.4-27.81.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216176" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libs-32bit-7.4-8.26.32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libs-32bit-7.4-8.26.32.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2895">CVE-2011-2895 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989495" comment="xorg-x11-libs-7.4-8.26.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989496" comment="xorg-x11-libs-32bit-7.4-8.26.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989497" comment="xorg-x11-libs-x86-7.4-8.26.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216177" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libxcb-32bit-7.4-1.29.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-2064" ref_url="https://www.suse.com/security/cve/CVE-2013-2064/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libxcb-32bit-7.4-1.29.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2064/">CVE-2013-2064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2064">CVE-2013-2064 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990075" comment="xorg-x11-libxcb-7.4-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990076" comment="xorg-x11-libxcb-32bit-7.4-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990077" comment="xorg-x11-libxcb-x86-7.4-1.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216178" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-dmx-7.3.99-17.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2240" ref_url="https://www.suse.com/security/cve/CVE-2010-2240/" source="CVE"/>
		<reference ref_id="CVE-2011-4028" ref_url="https://www.suse.com/security/cve/CVE-2011-4028/" source="CVE"/>
		<reference ref_id="CVE-2011-4029" ref_url="https://www.suse.com/security/cve/CVE-2011-4029/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-dmx-7.3.99-17.11.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2240/">CVE-2010-2240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2240">CVE-2010-2240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4028/">CVE-2011-4028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4028">CVE-2011-4028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4029/">CVE-2011-4029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4029">CVE-2011-4029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990078" comment="xorg-x11-server-dmx-7.3.99-17.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990079" comment="xorg-x11-server-rdp-7.3.99-3.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216179" version="1" class="patch">
	<metadata>
		<title>xterm-238-1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-2383" ref_url="https://www.suse.com/security/cve/CVE-2008-2383/" source="CVE"/>
		<description>
These are all security issues fixed in the xterm-238-1.16 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2383/">CVE-2008-2383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2383">CVE-2008-2383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988881" comment="xterm-238-1.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216180" version="1" class="patch">
	<metadata>
		<title>yast2-2.17.129-0.7.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-2.17.129-0.7.2 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3177">CVE-2011-3177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990080" comment="yast2-2.17.129-0.7.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216181" version="1" class="patch">
	<metadata>
		<title>yast2-core-2.17.45-0.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-core-2.17.45-0.5.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4311">CVE-2008-4311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2483">CVE-2011-2483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3177">CVE-2011-3177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990081" comment="yast2-core-2.17.45-0.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216182" version="1" class="patch">
	<metadata>
		<title>zoo-2.10-911.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-0855" ref_url="https://www.suse.com/security/cve/CVE-2006-0855/" source="CVE"/>
		<reference ref_id="CVE-2007-1669" ref_url="https://www.suse.com/security/cve/CVE-2007-1669/" source="CVE"/>
		<description>
These are all security issues fixed in the zoo-2.10-911.22 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0855/">CVE-2006-0855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0855">CVE-2006-0855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1669/">CVE-2007-1669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1669">CVE-2007-1669 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988882" comment="zoo-2.10-911.22 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216183" version="1" class="patch">
	<metadata>
		<title>LibVNCServer-0.9.1-154.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-2450" ref_url="https://www.suse.com/security/cve/CVE-2006-2450/" source="CVE"/>
		<description>
These are all security issues fixed in the LibVNCServer-0.9.1-154.24 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2450/">CVE-2006-2450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2450">CVE-2006-2450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988310" comment="LibVNCServer-0.9.1-154.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216184" version="1" class="patch">
	<metadata>
		<title>Mesa-32bit-9.0.3-0.28.29.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1872" ref_url="https://www.suse.com/security/cve/CVE-2013-1872/" source="CVE"/>
		<reference ref_id="CVE-2013-1993" ref_url="https://www.suse.com/security/cve/CVE-2013-1993/" source="CVE"/>
		<description>
These are all security issues fixed in the Mesa-32bit-9.0.3-0.28.29.2 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1872/">CVE-2013-1872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1872">CVE-2013-1872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1993/">CVE-2013-1993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1993">CVE-2013-1993 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990082" comment="Mesa-9.0.3-0.28.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990083" comment="Mesa-32bit-9.0.3-0.28.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990084" comment="Mesa-x86-9.0.3-0.28.29.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216185" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-31.7.0esr-0.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-6077" ref_url="https://www.suse.com/security/cve/CVE-2006-6077/" source="CVE"/>
		<reference ref_id="CVE-2007-0008" ref_url="https://www.suse.com/security/cve/CVE-2007-0008/" source="CVE"/>
		<reference ref_id="CVE-2007-0009" ref_url="https://www.suse.com/security/cve/CVE-2007-0009/" source="CVE"/>
		<reference ref_id="CVE-2007-0078" ref_url="https://www.suse.com/security/cve/CVE-2007-0078/" source="CVE"/>
		<reference ref_id="CVE-2007-0079" ref_url="https://www.suse.com/security/cve/CVE-2007-0079/" source="CVE"/>
		<reference ref_id="CVE-2007-0775" ref_url="https://www.suse.com/security/cve/CVE-2007-0775/" source="CVE"/>
		<reference ref_id="CVE-2007-0776" ref_url="https://www.suse.com/security/cve/CVE-2007-0776/" source="CVE"/>
		<reference ref_id="CVE-2007-0777" ref_url="https://www.suse.com/security/cve/CVE-2007-0777/" source="CVE"/>
		<reference ref_id="CVE-2007-0780" ref_url="https://www.suse.com/security/cve/CVE-2007-0780/" source="CVE"/>
		<reference ref_id="CVE-2007-0800" ref_url="https://www.suse.com/security/cve/CVE-2007-0800/" source="CVE"/>
		<reference ref_id="CVE-2007-0981" ref_url="https://www.suse.com/security/cve/CVE-2007-0981/" source="CVE"/>
		<reference ref_id="CVE-2007-0995" ref_url="https://www.suse.com/security/cve/CVE-2007-0995/" source="CVE"/>
		<reference ref_id="CVE-2007-0996" ref_url="https://www.suse.com/security/cve/CVE-2007-0996/" source="CVE"/>
		<reference ref_id="CVE-2007-3089" ref_url="https://www.suse.com/security/cve/CVE-2007-3089/" source="CVE"/>
		<reference ref_id="CVE-2007-3285" ref_url="https://www.suse.com/security/cve/CVE-2007-3285/" source="CVE"/>
		<reference ref_id="CVE-2007-3656" ref_url="https://www.suse.com/security/cve/CVE-2007-3656/" source="CVE"/>
		<reference ref_id="CVE-2007-3670" ref_url="https://www.suse.com/security/cve/CVE-2007-3670/" source="CVE"/>
		<reference ref_id="CVE-2007-3734" ref_url="https://www.suse.com/security/cve/CVE-2007-3734/" source="CVE"/>
		<reference ref_id="CVE-2007-3735" ref_url="https://www.suse.com/security/cve/CVE-2007-3735/" source="CVE"/>
		<reference ref_id="CVE-2007-3736" ref_url="https://www.suse.com/security/cve/CVE-2007-3736/" source="CVE"/>
		<reference ref_id="CVE-2007-3737" ref_url="https://www.suse.com/security/cve/CVE-2007-3737/" source="CVE"/>
		<reference ref_id="CVE-2007-3738" ref_url="https://www.suse.com/security/cve/CVE-2007-3738/" source="CVE"/>
		<reference ref_id="CVE-2008-0412" ref_url="https://www.suse.com/security/cve/CVE-2008-0412/" source="CVE"/>
		<reference ref_id="CVE-2008-0414" ref_url="https://www.suse.com/security/cve/CVE-2008-0414/" source="CVE"/>
		<reference ref_id="CVE-2008-0415" ref_url="https://www.suse.com/security/cve/CVE-2008-0415/" source="CVE"/>
		<reference ref_id="CVE-2008-0417" ref_url="https://www.suse.com/security/cve/CVE-2008-0417/" source="CVE"/>
		<reference ref_id="CVE-2008-0418" ref_url="https://www.suse.com/security/cve/CVE-2008-0418/" source="CVE"/>
		<reference ref_id="CVE-2008-0419" ref_url="https://www.suse.com/security/cve/CVE-2008-0419/" source="CVE"/>
		<reference ref_id="CVE-2008-0591" ref_url="https://www.suse.com/security/cve/CVE-2008-0591/" source="CVE"/>
		<reference ref_id="CVE-2008-0592" ref_url="https://www.suse.com/security/cve/CVE-2008-0592/" source="CVE"/>
		<reference ref_id="CVE-2008-0593" ref_url="https://www.suse.com/security/cve/CVE-2008-0593/" source="CVE"/>
		<reference ref_id="CVE-2008-0594" ref_url="https://www.suse.com/security/cve/CVE-2008-0594/" source="CVE"/>
		<reference ref_id="CVE-2008-3836" ref_url="https://www.suse.com/security/cve/CVE-2008-3836/" source="CVE"/>
		<reference ref_id="CVE-2008-4063" ref_url="https://www.suse.com/security/cve/CVE-2008-4063/" source="CVE"/>
		<reference ref_id="CVE-2008-4064" ref_url="https://www.suse.com/security/cve/CVE-2008-4064/" source="CVE"/>
		<reference ref_id="CVE-2008-4070" ref_url="https://www.suse.com/security/cve/CVE-2008-4070/" source="CVE"/>
		<reference ref_id="CVE-2008-5913" ref_url="https://www.suse.com/security/cve/CVE-2008-5913/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-0352" ref_url="https://www.suse.com/security/cve/CVE-2009-0352/" source="CVE"/>
		<reference ref_id="CVE-2009-0353" ref_url="https://www.suse.com/security/cve/CVE-2009-0353/" source="CVE"/>
		<reference ref_id="CVE-2009-0354" ref_url="https://www.suse.com/security/cve/CVE-2009-0354/" source="CVE"/>
		<reference ref_id="CVE-2009-0355" ref_url="https://www.suse.com/security/cve/CVE-2009-0355/" source="CVE"/>
		<reference ref_id="CVE-2009-0356" ref_url="https://www.suse.com/security/cve/CVE-2009-0356/" source="CVE"/>
		<reference ref_id="CVE-2009-0357" ref_url="https://www.suse.com/security/cve/CVE-2009-0357/" source="CVE"/>
		<reference ref_id="CVE-2009-0358" ref_url="https://www.suse.com/security/cve/CVE-2009-0358/" source="CVE"/>
		<reference ref_id="CVE-2009-0652" ref_url="https://www.suse.com/security/cve/CVE-2009-0652/" source="CVE"/>
		<reference ref_id="CVE-2009-0771" ref_url="https://www.suse.com/security/cve/CVE-2009-0771/" source="CVE"/>
		<reference ref_id="CVE-2009-0772" ref_url="https://www.suse.com/security/cve/CVE-2009-0772/" source="CVE"/>
		<reference ref_id="CVE-2009-0773" ref_url="https://www.suse.com/security/cve/CVE-2009-0773/" source="CVE"/>
		<reference ref_id="CVE-2009-0774" ref_url="https://www.suse.com/security/cve/CVE-2009-0774/" source="CVE"/>
		<reference ref_id="CVE-2009-0775" ref_url="https://www.suse.com/security/cve/CVE-2009-0775/" source="CVE"/>
		<reference ref_id="CVE-2009-0776" ref_url="https://www.suse.com/security/cve/CVE-2009-0776/" source="CVE"/>
		<reference ref_id="CVE-2009-0777" ref_url="https://www.suse.com/security/cve/CVE-2009-0777/" source="CVE"/>
		<reference ref_id="CVE-2009-1044" ref_url="https://www.suse.com/security/cve/CVE-2009-1044/" source="CVE"/>
		<reference ref_id="CVE-2009-1169" ref_url="https://www.suse.com/security/cve/CVE-2009-1169/" source="CVE"/>
		<reference ref_id="CVE-2009-1302" ref_url="https://www.suse.com/security/cve/CVE-2009-1302/" source="CVE"/>
		<reference ref_id="CVE-2009-1303" ref_url="https://www.suse.com/security/cve/CVE-2009-1303/" source="CVE"/>
		<reference ref_id="CVE-2009-1304" ref_url="https://www.suse.com/security/cve/CVE-2009-1304/" source="CVE"/>
		<reference ref_id="CVE-2009-1305" ref_url="https://www.suse.com/security/cve/CVE-2009-1305/" source="CVE"/>
		<reference ref_id="CVE-2009-1306" ref_url="https://www.suse.com/security/cve/CVE-2009-1306/" source="CVE"/>
		<reference ref_id="CVE-2009-1307" ref_url="https://www.suse.com/security/cve/CVE-2009-1307/" source="CVE"/>
		<reference ref_id="CVE-2009-1308" ref_url="https://www.suse.com/security/cve/CVE-2009-1308/" source="CVE"/>
		<reference ref_id="CVE-2009-1309" ref_url="https://www.suse.com/security/cve/CVE-2009-1309/" source="CVE"/>
		<reference ref_id="CVE-2009-1310" ref_url="https://www.suse.com/security/cve/CVE-2009-1310/" source="CVE"/>
		<reference ref_id="CVE-2009-1311" ref_url="https://www.suse.com/security/cve/CVE-2009-1311/" source="CVE"/>
		<reference ref_id="CVE-2009-1312" ref_url="https://www.suse.com/security/cve/CVE-2009-1312/" source="CVE"/>
		<reference ref_id="CVE-2009-1313" ref_url="https://www.suse.com/security/cve/CVE-2009-1313/" source="CVE"/>
		<reference ref_id="CVE-2009-1563" ref_url="https://www.suse.com/security/cve/CVE-2009-1563/" source="CVE"/>
		<reference ref_id="CVE-2009-1571" ref_url="https://www.suse.com/security/cve/CVE-2009-1571/" source="CVE"/>
		<reference ref_id="CVE-2009-2470" ref_url="https://www.suse.com/security/cve/CVE-2009-2470/" source="CVE"/>
		<reference ref_id="CVE-2009-2654" ref_url="https://www.suse.com/security/cve/CVE-2009-2654/" source="CVE"/>
		<reference ref_id="CVE-2009-3069" ref_url="https://www.suse.com/security/cve/CVE-2009-3069/" source="CVE"/>
		<reference ref_id="CVE-2009-3070" ref_url="https://www.suse.com/security/cve/CVE-2009-3070/" source="CVE"/>
		<reference ref_id="CVE-2009-3071" ref_url="https://www.suse.com/security/cve/CVE-2009-3071/" source="CVE"/>
		<reference ref_id="CVE-2009-3072" ref_url="https://www.suse.com/security/cve/CVE-2009-3072/" source="CVE"/>
		<reference ref_id="CVE-2009-3073" ref_url="https://www.suse.com/security/cve/CVE-2009-3073/" source="CVE"/>
		<reference ref_id="CVE-2009-3074" ref_url="https://www.suse.com/security/cve/CVE-2009-3074/" source="CVE"/>
		<reference ref_id="CVE-2009-3075" ref_url="https://www.suse.com/security/cve/CVE-2009-3075/" source="CVE"/>
		<reference ref_id="CVE-2009-3077" ref_url="https://www.suse.com/security/cve/CVE-2009-3077/" source="CVE"/>
		<reference ref_id="CVE-2009-3078" ref_url="https://www.suse.com/security/cve/CVE-2009-3078/" source="CVE"/>
		<reference ref_id="CVE-2009-3079" ref_url="https://www.suse.com/security/cve/CVE-2009-3079/" source="CVE"/>
		<reference ref_id="CVE-2009-3274" ref_url="https://www.suse.com/security/cve/CVE-2009-3274/" source="CVE"/>
		<reference ref_id="CVE-2009-3370" ref_url="https://www.suse.com/security/cve/CVE-2009-3370/" source="CVE"/>
		<reference ref_id="CVE-2009-3371" ref_url="https://www.suse.com/security/cve/CVE-2009-3371/" source="CVE"/>
		<reference ref_id="CVE-2009-3372" ref_url="https://www.suse.com/security/cve/CVE-2009-3372/" source="CVE"/>
		<reference ref_id="CVE-2009-3373" ref_url="https://www.suse.com/security/cve/CVE-2009-3373/" source="CVE"/>
		<reference ref_id="CVE-2009-3374" ref_url="https://www.suse.com/security/cve/CVE-2009-3374/" source="CVE"/>
		<reference ref_id="CVE-2009-3375" ref_url="https://www.suse.com/security/cve/CVE-2009-3375/" source="CVE"/>
		<reference ref_id="CVE-2009-3376" ref_url="https://www.suse.com/security/cve/CVE-2009-3376/" source="CVE"/>
		<reference ref_id="CVE-2009-3377" ref_url="https://www.suse.com/security/cve/CVE-2009-3377/" source="CVE"/>
		<reference ref_id="CVE-2009-3378" ref_url="https://www.suse.com/security/cve/CVE-2009-3378/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2009-3380" ref_url="https://www.suse.com/security/cve/CVE-2009-3380/" source="CVE"/>
		<reference ref_id="CVE-2009-3381" ref_url="https://www.suse.com/security/cve/CVE-2009-3381/" source="CVE"/>
		<reference ref_id="CVE-2009-3383" ref_url="https://www.suse.com/security/cve/CVE-2009-3383/" source="CVE"/>
		<reference ref_id="CVE-2009-3388" ref_url="https://www.suse.com/security/cve/CVE-2009-3388/" source="CVE"/>
		<reference ref_id="CVE-2009-3389" ref_url="https://www.suse.com/security/cve/CVE-2009-3389/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-3979" ref_url="https://www.suse.com/security/cve/CVE-2009-3979/" source="CVE"/>
		<reference ref_id="CVE-2009-3980" ref_url="https://www.suse.com/security/cve/CVE-2009-3980/" source="CVE"/>
		<reference ref_id="CVE-2009-3982" ref_url="https://www.suse.com/security/cve/CVE-2009-3982/" source="CVE"/>
		<reference ref_id="CVE-2009-3983" ref_url="https://www.suse.com/security/cve/CVE-2009-3983/" source="CVE"/>
		<reference ref_id="CVE-2009-3984" ref_url="https://www.suse.com/security/cve/CVE-2009-3984/" source="CVE"/>
		<reference ref_id="CVE-2009-3985" ref_url="https://www.suse.com/security/cve/CVE-2009-3985/" source="CVE"/>
		<reference ref_id="CVE-2009-3988" ref_url="https://www.suse.com/security/cve/CVE-2009-3988/" source="CVE"/>
		<reference ref_id="CVE-2010-0159" ref_url="https://www.suse.com/security/cve/CVE-2010-0159/" source="CVE"/>
		<reference ref_id="CVE-2010-0160" ref_url="https://www.suse.com/security/cve/CVE-2010-0160/" source="CVE"/>
		<reference ref_id="CVE-2010-0162" ref_url="https://www.suse.com/security/cve/CVE-2010-0162/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0175" ref_url="https://www.suse.com/security/cve/CVE-2010-0175/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0179" ref_url="https://www.suse.com/security/cve/CVE-2010-0179/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<reference ref_id="CVE-2010-0183" ref_url="https://www.suse.com/security/cve/CVE-2010-0183/" source="CVE"/>
		<reference ref_id="CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654/" source="CVE"/>
		<reference ref_id="CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121/" source="CVE"/>
		<reference ref_id="CVE-2010-1125" ref_url="https://www.suse.com/security/cve/CVE-2010-1125/" source="CVE"/>
		<reference ref_id="CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196/" source="CVE"/>
		<reference ref_id="CVE-2010-1197" ref_url="https://www.suse.com/security/cve/CVE-2010-1197/" source="CVE"/>
		<reference ref_id="CVE-2010-1198" ref_url="https://www.suse.com/security/cve/CVE-2010-1198/" source="CVE"/>
		<reference ref_id="CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199/" source="CVE"/>
		<reference ref_id="CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200/" source="CVE"/>
		<reference ref_id="CVE-2010-1201" ref_url="https://www.suse.com/security/cve/CVE-2010-1201/" source="CVE"/>
		<reference ref_id="CVE-2010-1202" ref_url="https://www.suse.com/security/cve/CVE-2010-1202/" source="CVE"/>
		<reference ref_id="CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-1206" ref_url="https://www.suse.com/security/cve/CVE-2010-1206/" source="CVE"/>
		<reference ref_id="CVE-2010-1208" ref_url="https://www.suse.com/security/cve/CVE-2010-1208/" source="CVE"/>
		<reference ref_id="CVE-2010-1209" ref_url="https://www.suse.com/security/cve/CVE-2010-1209/" source="CVE"/>
		<reference ref_id="CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211/" source="CVE"/>
		<reference ref_id="CVE-2010-1212" ref_url="https://www.suse.com/security/cve/CVE-2010-1212/" source="CVE"/>
		<reference ref_id="CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213/" source="CVE"/>
		<reference ref_id="CVE-2010-1214" ref_url="https://www.suse.com/security/cve/CVE-2010-1214/" source="CVE"/>
		<reference ref_id="CVE-2010-1585" ref_url="https://www.suse.com/security/cve/CVE-2010-1585/" source="CVE"/>
		<reference ref_id="CVE-2010-2751" ref_url="https://www.suse.com/security/cve/CVE-2010-2751/" source="CVE"/>
		<reference ref_id="CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752/" source="CVE"/>
		<reference ref_id="CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753/" source="CVE"/>
		<reference ref_id="CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754/" source="CVE"/>
		<reference ref_id="CVE-2010-2755" ref_url="https://www.suse.com/security/cve/CVE-2010-2755/" source="CVE"/>
		<reference ref_id="CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760/" source="CVE"/>
		<reference ref_id="CVE-2010-2762" ref_url="https://www.suse.com/security/cve/CVE-2010-2762/" source="CVE"/>
		<reference ref_id="CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764/" source="CVE"/>
		<reference ref_id="CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765/" source="CVE"/>
		<reference ref_id="CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766/" source="CVE"/>
		<reference ref_id="CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767/" source="CVE"/>
		<reference ref_id="CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768/" source="CVE"/>
		<reference ref_id="CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769/" source="CVE"/>
		<reference ref_id="CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166/" source="CVE"/>
		<reference ref_id="CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167/" source="CVE"/>
		<reference ref_id="CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168/" source="CVE"/>
		<reference ref_id="CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3173" ref_url="https://www.suse.com/security/cve/CVE-2010-3173/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<reference ref_id="CVE-2010-3766" ref_url="https://www.suse.com/security/cve/CVE-2010-3766/" source="CVE"/>
		<reference ref_id="CVE-2010-3767" ref_url="https://www.suse.com/security/cve/CVE-2010-3767/" source="CVE"/>
		<reference ref_id="CVE-2010-3768" ref_url="https://www.suse.com/security/cve/CVE-2010-3768/" source="CVE"/>
		<reference ref_id="CVE-2010-3769" ref_url="https://www.suse.com/security/cve/CVE-2010-3769/" source="CVE"/>
		<reference ref_id="CVE-2010-3770" ref_url="https://www.suse.com/security/cve/CVE-2010-3770/" source="CVE"/>
		<reference ref_id="CVE-2010-3771" ref_url="https://www.suse.com/security/cve/CVE-2010-3771/" source="CVE"/>
		<reference ref_id="CVE-2010-3772" ref_url="https://www.suse.com/security/cve/CVE-2010-3772/" source="CVE"/>
		<reference ref_id="CVE-2010-3773" ref_url="https://www.suse.com/security/cve/CVE-2010-3773/" source="CVE"/>
		<reference ref_id="CVE-2010-3775" ref_url="https://www.suse.com/security/cve/CVE-2010-3775/" source="CVE"/>
		<reference ref_id="CVE-2010-3776" ref_url="https://www.suse.com/security/cve/CVE-2010-3776/" source="CVE"/>
		<reference ref_id="CVE-2010-3777" ref_url="https://www.suse.com/security/cve/CVE-2010-3777/" source="CVE"/>
		<reference ref_id="CVE-2010-3778" ref_url="https://www.suse.com/security/cve/CVE-2010-3778/" source="CVE"/>
		<reference ref_id="CVE-2011-0051" ref_url="https://www.suse.com/security/cve/CVE-2011-0051/" source="CVE"/>
		<reference ref_id="CVE-2011-0053" ref_url="https://www.suse.com/security/cve/CVE-2011-0053/" source="CVE"/>
		<reference ref_id="CVE-2011-0054" ref_url="https://www.suse.com/security/cve/CVE-2011-0054/" source="CVE"/>
		<reference ref_id="CVE-2011-0055" ref_url="https://www.suse.com/security/cve/CVE-2011-0055/" source="CVE"/>
		<reference ref_id="CVE-2011-0056" ref_url="https://www.suse.com/security/cve/CVE-2011-0056/" source="CVE"/>
		<reference ref_id="CVE-2011-0057" ref_url="https://www.suse.com/security/cve/CVE-2011-0057/" source="CVE"/>
		<reference ref_id="CVE-2011-0059" ref_url="https://www.suse.com/security/cve/CVE-2011-0059/" source="CVE"/>
		<reference ref_id="CVE-2011-0061" ref_url="https://www.suse.com/security/cve/CVE-2011-0061/" source="CVE"/>
		<reference ref_id="CVE-2011-0062" ref_url="https://www.suse.com/security/cve/CVE-2011-0062/" source="CVE"/>
		<reference ref_id="CVE-2011-0065" ref_url="https://www.suse.com/security/cve/CVE-2011-0065/" source="CVE"/>
		<reference ref_id="CVE-2011-0066" ref_url="https://www.suse.com/security/cve/CVE-2011-0066/" source="CVE"/>
		<reference ref_id="CVE-2011-0067" ref_url="https://www.suse.com/security/cve/CVE-2011-0067/" source="CVE"/>
		<reference ref_id="CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069/" source="CVE"/>
		<reference ref_id="CVE-2011-0070" ref_url="https://www.suse.com/security/cve/CVE-2011-0070/" source="CVE"/>
		<reference ref_id="CVE-2011-0072" ref_url="https://www.suse.com/security/cve/CVE-2011-0072/" source="CVE"/>
		<reference ref_id="CVE-2011-0073" ref_url="https://www.suse.com/security/cve/CVE-2011-0073/" source="CVE"/>
		<reference ref_id="CVE-2011-0074" ref_url="https://www.suse.com/security/cve/CVE-2011-0074/" source="CVE"/>
		<reference ref_id="CVE-2011-0075" ref_url="https://www.suse.com/security/cve/CVE-2011-0075/" source="CVE"/>
		<reference ref_id="CVE-2011-0077" ref_url="https://www.suse.com/security/cve/CVE-2011-0077/" source="CVE"/>
		<reference ref_id="CVE-2011-0078" ref_url="https://www.suse.com/security/cve/CVE-2011-0078/" source="CVE"/>
		<reference ref_id="CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080/" source="CVE"/>
		<reference ref_id="CVE-2011-0081" ref_url="https://www.suse.com/security/cve/CVE-2011-0081/" source="CVE"/>
		<reference ref_id="CVE-2011-0083" ref_url="https://www.suse.com/security/cve/CVE-2011-0083/" source="CVE"/>
		<reference ref_id="CVE-2011-0084" ref_url="https://www.suse.com/security/cve/CVE-2011-0084/" source="CVE"/>
		<reference ref_id="CVE-2011-0085" ref_url="https://www.suse.com/security/cve/CVE-2011-0085/" source="CVE"/>
		<reference ref_id="CVE-2011-1202" ref_url="https://www.suse.com/security/cve/CVE-2011-1202/" source="CVE"/>
		<reference ref_id="CVE-2011-2362" ref_url="https://www.suse.com/security/cve/CVE-2011-2362/" source="CVE"/>
		<reference ref_id="CVE-2011-2363" ref_url="https://www.suse.com/security/cve/CVE-2011-2363/" source="CVE"/>
		<reference ref_id="CVE-2011-2364" ref_url="https://www.suse.com/security/cve/CVE-2011-2364/" source="CVE"/>
		<reference ref_id="CVE-2011-2365" ref_url="https://www.suse.com/security/cve/CVE-2011-2365/" source="CVE"/>
		<reference ref_id="CVE-2011-2371" ref_url="https://www.suse.com/security/cve/CVE-2011-2371/" source="CVE"/>
		<reference ref_id="CVE-2011-2372" ref_url="https://www.suse.com/security/cve/CVE-2011-2372/" source="CVE"/>
		<reference ref_id="CVE-2011-2373" ref_url="https://www.suse.com/security/cve/CVE-2011-2373/" source="CVE"/>
		<reference ref_id="CVE-2011-2374" ref_url="https://www.suse.com/security/cve/CVE-2011-2374/" source="CVE"/>
		<reference ref_id="CVE-2011-2376" ref_url="https://www.suse.com/security/cve/CVE-2011-2376/" source="CVE"/>
		<reference ref_id="CVE-2011-2377" ref_url="https://www.suse.com/security/cve/CVE-2011-2377/" source="CVE"/>
		<reference ref_id="CVE-2011-2378" ref_url="https://www.suse.com/security/cve/CVE-2011-2378/" source="CVE"/>
		<reference ref_id="CVE-2011-2980" ref_url="https://www.suse.com/security/cve/CVE-2011-2980/" source="CVE"/>
		<reference ref_id="CVE-2011-2981" ref_url="https://www.suse.com/security/cve/CVE-2011-2981/" source="CVE"/>
		<reference ref_id="CVE-2011-2982" ref_url="https://www.suse.com/security/cve/CVE-2011-2982/" source="CVE"/>
		<reference ref_id="CVE-2011-2983" ref_url="https://www.suse.com/security/cve/CVE-2011-2983/" source="CVE"/>
		<reference ref_id="CVE-2011-2995" ref_url="https://www.suse.com/security/cve/CVE-2011-2995/" source="CVE"/>
		<reference ref_id="CVE-2011-2996" ref_url="https://www.suse.com/security/cve/CVE-2011-2996/" source="CVE"/>
		<reference ref_id="CVE-2011-2997" ref_url="https://www.suse.com/security/cve/CVE-2011-2997/" source="CVE"/>
		<reference ref_id="CVE-2011-3000" ref_url="https://www.suse.com/security/cve/CVE-2011-3000/" source="CVE"/>
		<reference ref_id="CVE-2011-3001" ref_url="https://www.suse.com/security/cve/CVE-2011-3001/" source="CVE"/>
		<reference ref_id="CVE-2011-3002" ref_url="https://www.suse.com/security/cve/CVE-2011-3002/" source="CVE"/>
		<reference ref_id="CVE-2011-3003" ref_url="https://www.suse.com/security/cve/CVE-2011-3003/" source="CVE"/>
		<reference ref_id="CVE-2011-3004" ref_url="https://www.suse.com/security/cve/CVE-2011-3004/" source="CVE"/>
		<reference ref_id="CVE-2011-3005" ref_url="https://www.suse.com/security/cve/CVE-2011-3005/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3062" ref_url="https://www.suse.com/security/cve/CVE-2011-3062/" source="CVE"/>
		<reference ref_id="CVE-2011-3101" ref_url="https://www.suse.com/security/cve/CVE-2011-3101/" source="CVE"/>
		<reference ref_id="CVE-2011-3232" ref_url="https://www.suse.com/security/cve/CVE-2011-3232/" source="CVE"/>
		<reference ref_id="CVE-2011-3658" ref_url="https://www.suse.com/security/cve/CVE-2011-3658/" source="CVE"/>
		<reference ref_id="CVE-2011-3660" ref_url="https://www.suse.com/security/cve/CVE-2011-3660/" source="CVE"/>
		<reference ref_id="CVE-2011-3661" ref_url="https://www.suse.com/security/cve/CVE-2011-3661/" source="CVE"/>
		<reference ref_id="CVE-2011-3663" ref_url="https://www.suse.com/security/cve/CVE-2011-3663/" source="CVE"/>
		<reference ref_id="CVE-2011-3665" ref_url="https://www.suse.com/security/cve/CVE-2011-3665/" source="CVE"/>
		<reference ref_id="CVE-2012-0441" ref_url="https://www.suse.com/security/cve/CVE-2012-0441/" source="CVE"/>
		<reference ref_id="CVE-2012-0452" ref_url="https://www.suse.com/security/cve/CVE-2012-0452/" source="CVE"/>
		<reference ref_id="CVE-2012-0467" ref_url="https://www.suse.com/security/cve/CVE-2012-0467/" source="CVE"/>
		<reference ref_id="CVE-2012-0468" ref_url="https://www.suse.com/security/cve/CVE-2012-0468/" source="CVE"/>
		<reference ref_id="CVE-2012-0469" ref_url="https://www.suse.com/security/cve/CVE-2012-0469/" source="CVE"/>
		<reference ref_id="CVE-2012-0470" ref_url="https://www.suse.com/security/cve/CVE-2012-0470/" source="CVE"/>
		<reference ref_id="CVE-2012-0471" ref_url="https://www.suse.com/security/cve/CVE-2012-0471/" source="CVE"/>
		<reference ref_id="CVE-2012-0472" ref_url="https://www.suse.com/security/cve/CVE-2012-0472/" source="CVE"/>
		<reference ref_id="CVE-2012-0473" ref_url="https://www.suse.com/security/cve/CVE-2012-0473/" source="CVE"/>
		<reference ref_id="CVE-2012-0474" ref_url="https://www.suse.com/security/cve/CVE-2012-0474/" source="CVE"/>
		<reference ref_id="CVE-2012-0477" ref_url="https://www.suse.com/security/cve/CVE-2012-0477/" source="CVE"/>
		<reference ref_id="CVE-2012-0478" ref_url="https://www.suse.com/security/cve/CVE-2012-0478/" source="CVE"/>
		<reference ref_id="CVE-2012-0479" ref_url="https://www.suse.com/security/cve/CVE-2012-0479/" source="CVE"/>
		<reference ref_id="CVE-2012-0759" ref_url="https://www.suse.com/security/cve/CVE-2012-0759/" source="CVE"/>
		<reference ref_id="CVE-2012-1937" ref_url="https://www.suse.com/security/cve/CVE-2012-1937/" source="CVE"/>
		<reference ref_id="CVE-2012-1939" ref_url="https://www.suse.com/security/cve/CVE-2012-1939/" source="CVE"/>
		<reference ref_id="CVE-2012-1940" ref_url="https://www.suse.com/security/cve/CVE-2012-1940/" source="CVE"/>
		<reference ref_id="CVE-2012-1941" ref_url="https://www.suse.com/security/cve/CVE-2012-1941/" source="CVE"/>
		<reference ref_id="CVE-2012-1944" ref_url="https://www.suse.com/security/cve/CVE-2012-1944/" source="CVE"/>
		<reference ref_id="CVE-2012-1945" ref_url="https://www.suse.com/security/cve/CVE-2012-1945/" source="CVE"/>
		<reference ref_id="CVE-2012-1946" ref_url="https://www.suse.com/security/cve/CVE-2012-1946/" source="CVE"/>
		<reference ref_id="CVE-2012-1947" ref_url="https://www.suse.com/security/cve/CVE-2012-1947/" source="CVE"/>
		<reference ref_id="CVE-2012-1948" ref_url="https://www.suse.com/security/cve/CVE-2012-1948/" source="CVE"/>
		<reference ref_id="CVE-2012-1949" ref_url="https://www.suse.com/security/cve/CVE-2012-1949/" source="CVE"/>
		<reference ref_id="CVE-2012-1950" ref_url="https://www.suse.com/security/cve/CVE-2012-1950/" source="CVE"/>
		<reference ref_id="CVE-2012-1951" ref_url="https://www.suse.com/security/cve/CVE-2012-1951/" source="CVE"/>
		<reference ref_id="CVE-2012-1952" ref_url="https://www.suse.com/security/cve/CVE-2012-1952/" source="CVE"/>
		<reference ref_id="CVE-2012-1953" ref_url="https://www.suse.com/security/cve/CVE-2012-1953/" source="CVE"/>
		<reference ref_id="CVE-2012-1954" ref_url="https://www.suse.com/security/cve/CVE-2012-1954/" source="CVE"/>
		<reference ref_id="CVE-2012-1955" ref_url="https://www.suse.com/security/cve/CVE-2012-1955/" source="CVE"/>
		<reference ref_id="CVE-2012-1956" ref_url="https://www.suse.com/security/cve/CVE-2012-1956/" source="CVE"/>
		<reference ref_id="CVE-2012-1957" ref_url="https://www.suse.com/security/cve/CVE-2012-1957/" source="CVE"/>
		<reference ref_id="CVE-2012-1958" ref_url="https://www.suse.com/security/cve/CVE-2012-1958/" source="CVE"/>
		<reference ref_id="CVE-2012-1959" ref_url="https://www.suse.com/security/cve/CVE-2012-1959/" source="CVE"/>
		<reference ref_id="CVE-2012-1960" ref_url="https://www.suse.com/security/cve/CVE-2012-1960/" source="CVE"/>
		<reference ref_id="CVE-2012-1961" ref_url="https://www.suse.com/security/cve/CVE-2012-1961/" source="CVE"/>
		<reference ref_id="CVE-2012-1962" ref_url="https://www.suse.com/security/cve/CVE-2012-1962/" source="CVE"/>
		<reference ref_id="CVE-2012-1963" ref_url="https://www.suse.com/security/cve/CVE-2012-1963/" source="CVE"/>
		<reference ref_id="CVE-2012-1964" ref_url="https://www.suse.com/security/cve/CVE-2012-1964/" source="CVE"/>
		<reference ref_id="CVE-2012-1965" ref_url="https://www.suse.com/security/cve/CVE-2012-1965/" source="CVE"/>
		<reference ref_id="CVE-2012-1966" ref_url="https://www.suse.com/security/cve/CVE-2012-1966/" source="CVE"/>
		<reference ref_id="CVE-2012-1967" ref_url="https://www.suse.com/security/cve/CVE-2012-1967/" source="CVE"/>
		<reference ref_id="CVE-2012-1970" ref_url="https://www.suse.com/security/cve/CVE-2012-1970/" source="CVE"/>
		<reference ref_id="CVE-2012-1972" ref_url="https://www.suse.com/security/cve/CVE-2012-1972/" source="CVE"/>
		<reference ref_id="CVE-2012-1973" ref_url="https://www.suse.com/security/cve/CVE-2012-1973/" source="CVE"/>
		<reference ref_id="CVE-2012-1974" ref_url="https://www.suse.com/security/cve/CVE-2012-1974/" source="CVE"/>
		<reference ref_id="CVE-2012-1975" ref_url="https://www.suse.com/security/cve/CVE-2012-1975/" source="CVE"/>
		<reference ref_id="CVE-2012-1976" ref_url="https://www.suse.com/security/cve/CVE-2012-1976/" source="CVE"/>
		<reference ref_id="CVE-2012-3956" ref_url="https://www.suse.com/security/cve/CVE-2012-3956/" source="CVE"/>
		<reference ref_id="CVE-2012-3957" ref_url="https://www.suse.com/security/cve/CVE-2012-3957/" source="CVE"/>
		<reference ref_id="CVE-2012-3958" ref_url="https://www.suse.com/security/cve/CVE-2012-3958/" source="CVE"/>
		<reference ref_id="CVE-2012-3959" ref_url="https://www.suse.com/security/cve/CVE-2012-3959/" source="CVE"/>
		<reference ref_id="CVE-2012-3960" ref_url="https://www.suse.com/security/cve/CVE-2012-3960/" source="CVE"/>
		<reference ref_id="CVE-2012-3961" ref_url="https://www.suse.com/security/cve/CVE-2012-3961/" source="CVE"/>
		<reference ref_id="CVE-2012-3962" ref_url="https://www.suse.com/security/cve/CVE-2012-3962/" source="CVE"/>
		<reference ref_id="CVE-2012-3963" ref_url="https://www.suse.com/security/cve/CVE-2012-3963/" source="CVE"/>
		<reference ref_id="CVE-2012-3964" ref_url="https://www.suse.com/security/cve/CVE-2012-3964/" source="CVE"/>
		<reference ref_id="CVE-2012-3966" ref_url="https://www.suse.com/security/cve/CVE-2012-3966/" source="CVE"/>
		<reference ref_id="CVE-2012-3967" ref_url="https://www.suse.com/security/cve/CVE-2012-3967/" source="CVE"/>
		<reference ref_id="CVE-2012-3968" ref_url="https://www.suse.com/security/cve/CVE-2012-3968/" source="CVE"/>
		<reference ref_id="CVE-2012-3969" ref_url="https://www.suse.com/security/cve/CVE-2012-3969/" source="CVE"/>
		<reference ref_id="CVE-2012-3970" ref_url="https://www.suse.com/security/cve/CVE-2012-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-3972" ref_url="https://www.suse.com/security/cve/CVE-2012-3972/" source="CVE"/>
		<reference ref_id="CVE-2012-3976" ref_url="https://www.suse.com/security/cve/CVE-2012-3976/" source="CVE"/>
		<reference ref_id="CVE-2012-3978" ref_url="https://www.suse.com/security/cve/CVE-2012-3978/" source="CVE"/>
		<reference ref_id="CVE-2012-3980" ref_url="https://www.suse.com/security/cve/CVE-2012-3980/" source="CVE"/>
		<reference ref_id="CVE-2012-3982" ref_url="https://www.suse.com/security/cve/CVE-2012-3982/" source="CVE"/>
		<reference ref_id="CVE-2012-3986" ref_url="https://www.suse.com/security/cve/CVE-2012-3986/" source="CVE"/>
		<reference ref_id="CVE-2012-3988" ref_url="https://www.suse.com/security/cve/CVE-2012-3988/" source="CVE"/>
		<reference ref_id="CVE-2012-3990" ref_url="https://www.suse.com/security/cve/CVE-2012-3990/" source="CVE"/>
		<reference ref_id="CVE-2012-3991" ref_url="https://www.suse.com/security/cve/CVE-2012-3991/" source="CVE"/>
		<reference ref_id="CVE-2012-3992" ref_url="https://www.suse.com/security/cve/CVE-2012-3992/" source="CVE"/>
		<reference ref_id="CVE-2012-3993" ref_url="https://www.suse.com/security/cve/CVE-2012-3993/" source="CVE"/>
		<reference ref_id="CVE-2012-3994" ref_url="https://www.suse.com/security/cve/CVE-2012-3994/" source="CVE"/>
		<reference ref_id="CVE-2012-3995" ref_url="https://www.suse.com/security/cve/CVE-2012-3995/" source="CVE"/>
		<reference ref_id="CVE-2012-4179" ref_url="https://www.suse.com/security/cve/CVE-2012-4179/" source="CVE"/>
		<reference ref_id="CVE-2012-4180" ref_url="https://www.suse.com/security/cve/CVE-2012-4180/" source="CVE"/>
		<reference ref_id="CVE-2012-4181" ref_url="https://www.suse.com/security/cve/CVE-2012-4181/" source="CVE"/>
		<reference ref_id="CVE-2012-4182" ref_url="https://www.suse.com/security/cve/CVE-2012-4182/" source="CVE"/>
		<reference ref_id="CVE-2012-4183" ref_url="https://www.suse.com/security/cve/CVE-2012-4183/" source="CVE"/>
		<reference ref_id="CVE-2012-4184" ref_url="https://www.suse.com/security/cve/CVE-2012-4184/" source="CVE"/>
		<reference ref_id="CVE-2012-4185" ref_url="https://www.suse.com/security/cve/CVE-2012-4185/" source="CVE"/>
		<reference ref_id="CVE-2012-4186" ref_url="https://www.suse.com/security/cve/CVE-2012-4186/" source="CVE"/>
		<reference ref_id="CVE-2012-4187" ref_url="https://www.suse.com/security/cve/CVE-2012-4187/" source="CVE"/>
		<reference ref_id="CVE-2012-4188" ref_url="https://www.suse.com/security/cve/CVE-2012-4188/" source="CVE"/>
		<reference ref_id="CVE-2012-4192" ref_url="https://www.suse.com/security/cve/CVE-2012-4192/" source="CVE"/>
		<reference ref_id="CVE-2012-4193" ref_url="https://www.suse.com/security/cve/CVE-2012-4193/" source="CVE"/>
		<reference ref_id="CVE-2012-4194" ref_url="https://www.suse.com/security/cve/CVE-2012-4194/" source="CVE"/>
		<reference ref_id="CVE-2012-4195" ref_url="https://www.suse.com/security/cve/CVE-2012-4195/" source="CVE"/>
		<reference ref_id="CVE-2012-4196" ref_url="https://www.suse.com/security/cve/CVE-2012-4196/" source="CVE"/>
		<reference ref_id="CVE-2012-4201" ref_url="https://www.suse.com/security/cve/CVE-2012-4201/" source="CVE"/>
		<reference ref_id="CVE-2012-4202" ref_url="https://www.suse.com/security/cve/CVE-2012-4202/" source="CVE"/>
		<reference ref_id="CVE-2012-4207" ref_url="https://www.suse.com/security/cve/CVE-2012-4207/" source="CVE"/>
		<reference ref_id="CVE-2012-4209" ref_url="https://www.suse.com/security/cve/CVE-2012-4209/" source="CVE"/>
		<reference ref_id="CVE-2012-4210" ref_url="https://www.suse.com/security/cve/CVE-2012-4210/" source="CVE"/>
		<reference ref_id="CVE-2012-4212" ref_url="https://www.suse.com/security/cve/CVE-2012-4212/" source="CVE"/>
		<reference ref_id="CVE-2012-4213" ref_url="https://www.suse.com/security/cve/CVE-2012-4213/" source="CVE"/>
		<reference ref_id="CVE-2012-4214" ref_url="https://www.suse.com/security/cve/CVE-2012-4214/" source="CVE"/>
		<reference ref_id="CVE-2012-4215" ref_url="https://www.suse.com/security/cve/CVE-2012-4215/" source="CVE"/>
		<reference ref_id="CVE-2012-4216" ref_url="https://www.suse.com/security/cve/CVE-2012-4216/" source="CVE"/>
		<reference ref_id="CVE-2012-4217" ref_url="https://www.suse.com/security/cve/CVE-2012-4217/" source="CVE"/>
		<reference ref_id="CVE-2012-4218" ref_url="https://www.suse.com/security/cve/CVE-2012-4218/" source="CVE"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2012-5830" ref_url="https://www.suse.com/security/cve/CVE-2012-5830/" source="CVE"/>
		<reference ref_id="CVE-2012-5833" ref_url="https://www.suse.com/security/cve/CVE-2012-5833/" source="CVE"/>
		<reference ref_id="CVE-2012-5835" ref_url="https://www.suse.com/security/cve/CVE-2012-5835/" source="CVE"/>
		<reference ref_id="CVE-2012-5838" ref_url="https://www.suse.com/security/cve/CVE-2012-5838/" source="CVE"/>
		<reference ref_id="CVE-2012-5839" ref_url="https://www.suse.com/security/cve/CVE-2012-5839/" source="CVE"/>
		<reference ref_id="CVE-2012-5840" ref_url="https://www.suse.com/security/cve/CVE-2012-5840/" source="CVE"/>
		<reference ref_id="CVE-2012-5841" ref_url="https://www.suse.com/security/cve/CVE-2012-5841/" source="CVE"/>
		<reference ref_id="CVE-2012-5842" ref_url="https://www.suse.com/security/cve/CVE-2012-5842/" source="CVE"/>
		<reference ref_id="CVE-2012-5843" ref_url="https://www.suse.com/security/cve/CVE-2012-5843/" source="CVE"/>
		<reference ref_id="CVE-2013-0744" ref_url="https://www.suse.com/security/cve/CVE-2013-0744/" source="CVE"/>
		<reference ref_id="CVE-2013-0745" ref_url="https://www.suse.com/security/cve/CVE-2013-0745/" source="CVE"/>
		<reference ref_id="CVE-2013-0746" ref_url="https://www.suse.com/security/cve/CVE-2013-0746/" source="CVE"/>
		<reference ref_id="CVE-2013-0747" ref_url="https://www.suse.com/security/cve/CVE-2013-0747/" source="CVE"/>
		<reference ref_id="CVE-2013-0748" ref_url="https://www.suse.com/security/cve/CVE-2013-0748/" source="CVE"/>
		<reference ref_id="CVE-2013-0749" ref_url="https://www.suse.com/security/cve/CVE-2013-0749/" source="CVE"/>
		<reference ref_id="CVE-2013-0750" ref_url="https://www.suse.com/security/cve/CVE-2013-0750/" source="CVE"/>
		<reference ref_id="CVE-2013-0752" ref_url="https://www.suse.com/security/cve/CVE-2013-0752/" source="CVE"/>
		<reference ref_id="CVE-2013-0753" ref_url="https://www.suse.com/security/cve/CVE-2013-0753/" source="CVE"/>
		<reference ref_id="CVE-2013-0754" ref_url="https://www.suse.com/security/cve/CVE-2013-0754/" source="CVE"/>
		<reference ref_id="CVE-2013-0755" ref_url="https://www.suse.com/security/cve/CVE-2013-0755/" source="CVE"/>
		<reference ref_id="CVE-2013-0756" ref_url="https://www.suse.com/security/cve/CVE-2013-0756/" source="CVE"/>
		<reference ref_id="CVE-2013-0757" ref_url="https://www.suse.com/security/cve/CVE-2013-0757/" source="CVE"/>
		<reference ref_id="CVE-2013-0758" ref_url="https://www.suse.com/security/cve/CVE-2013-0758/" source="CVE"/>
		<reference ref_id="CVE-2013-0760" ref_url="https://www.suse.com/security/cve/CVE-2013-0760/" source="CVE"/>
		<reference ref_id="CVE-2013-0761" ref_url="https://www.suse.com/security/cve/CVE-2013-0761/" source="CVE"/>
		<reference ref_id="CVE-2013-0762" ref_url="https://www.suse.com/security/cve/CVE-2013-0762/" source="CVE"/>
		<reference ref_id="CVE-2013-0763" ref_url="https://www.suse.com/security/cve/CVE-2013-0763/" source="CVE"/>
		<reference ref_id="CVE-2013-0764" ref_url="https://www.suse.com/security/cve/CVE-2013-0764/" source="CVE"/>
		<reference ref_id="CVE-2013-0766" ref_url="https://www.suse.com/security/cve/CVE-2013-0766/" source="CVE"/>
		<reference ref_id="CVE-2013-0767" ref_url="https://www.suse.com/security/cve/CVE-2013-0767/" source="CVE"/>
		<reference ref_id="CVE-2013-0768" ref_url="https://www.suse.com/security/cve/CVE-2013-0768/" source="CVE"/>
		<reference ref_id="CVE-2013-0769" ref_url="https://www.suse.com/security/cve/CVE-2013-0769/" source="CVE"/>
		<reference ref_id="CVE-2013-0770" ref_url="https://www.suse.com/security/cve/CVE-2013-0770/" source="CVE"/>
		<reference ref_id="CVE-2013-0771" ref_url="https://www.suse.com/security/cve/CVE-2013-0771/" source="CVE"/>
		<reference ref_id="CVE-2013-0773" ref_url="https://www.suse.com/security/cve/CVE-2013-0773/" source="CVE"/>
		<reference ref_id="CVE-2013-0774" ref_url="https://www.suse.com/security/cve/CVE-2013-0774/" source="CVE"/>
		<reference ref_id="CVE-2013-0775" ref_url="https://www.suse.com/security/cve/CVE-2013-0775/" source="CVE"/>
		<reference ref_id="CVE-2013-0776" ref_url="https://www.suse.com/security/cve/CVE-2013-0776/" source="CVE"/>
		<reference ref_id="CVE-2013-0780" ref_url="https://www.suse.com/security/cve/CVE-2013-0780/" source="CVE"/>
		<reference ref_id="CVE-2013-0782" ref_url="https://www.suse.com/security/cve/CVE-2013-0782/" source="CVE"/>
		<reference ref_id="CVE-2013-0783" ref_url="https://www.suse.com/security/cve/CVE-2013-0783/" source="CVE"/>
		<reference ref_id="CVE-2013-0787" ref_url="https://www.suse.com/security/cve/CVE-2013-0787/" source="CVE"/>
		<reference ref_id="CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788/" source="CVE"/>
		<reference ref_id="CVE-2013-0793" ref_url="https://www.suse.com/security/cve/CVE-2013-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794/" source="CVE"/>
		<reference ref_id="CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795/" source="CVE"/>
		<reference ref_id="CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796/" source="CVE"/>
		<reference ref_id="CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800/" source="CVE"/>
		<reference ref_id="CVE-2013-0801" ref_url="https://www.suse.com/security/cve/CVE-2013-0801/" source="CVE"/>
		<reference ref_id="CVE-2013-1669" ref_url="https://www.suse.com/security/cve/CVE-2013-1669/" source="CVE"/>
		<reference ref_id="CVE-2013-1670" ref_url="https://www.suse.com/security/cve/CVE-2013-1670/" source="CVE"/>
		<reference ref_id="CVE-2013-1674" ref_url="https://www.suse.com/security/cve/CVE-2013-1674/" source="CVE"/>
		<reference ref_id="CVE-2013-1675" ref_url="https://www.suse.com/security/cve/CVE-2013-1675/" source="CVE"/>
		<reference ref_id="CVE-2013-1676" ref_url="https://www.suse.com/security/cve/CVE-2013-1676/" source="CVE"/>
		<reference ref_id="CVE-2013-1677" ref_url="https://www.suse.com/security/cve/CVE-2013-1677/" source="CVE"/>
		<reference ref_id="CVE-2013-1678" ref_url="https://www.suse.com/security/cve/CVE-2013-1678/" source="CVE"/>
		<reference ref_id="CVE-2013-1679" ref_url="https://www.suse.com/security/cve/CVE-2013-1679/" source="CVE"/>
		<reference ref_id="CVE-2013-1680" ref_url="https://www.suse.com/security/cve/CVE-2013-1680/" source="CVE"/>
		<reference ref_id="CVE-2013-1681" ref_url="https://www.suse.com/security/cve/CVE-2013-1681/" source="CVE"/>
		<reference ref_id="CVE-2013-1682" ref_url="https://www.suse.com/security/cve/CVE-2013-1682/" source="CVE"/>
		<reference ref_id="CVE-2013-1684" ref_url="https://www.suse.com/security/cve/CVE-2013-1684/" source="CVE"/>
		<reference ref_id="CVE-2013-1685" ref_url="https://www.suse.com/security/cve/CVE-2013-1685/" source="CVE"/>
		<reference ref_id="CVE-2013-1686" ref_url="https://www.suse.com/security/cve/CVE-2013-1686/" source="CVE"/>
		<reference ref_id="CVE-2013-1687" ref_url="https://www.suse.com/security/cve/CVE-2013-1687/" source="CVE"/>
		<reference ref_id="CVE-2013-1690" ref_url="https://www.suse.com/security/cve/CVE-2013-1690/" source="CVE"/>
		<reference ref_id="CVE-2013-1692" ref_url="https://www.suse.com/security/cve/CVE-2013-1692/" source="CVE"/>
		<reference ref_id="CVE-2013-1693" ref_url="https://www.suse.com/security/cve/CVE-2013-1693/" source="CVE"/>
		<reference ref_id="CVE-2013-1694" ref_url="https://www.suse.com/security/cve/CVE-2013-1694/" source="CVE"/>
		<reference ref_id="CVE-2013-1697" ref_url="https://www.suse.com/security/cve/CVE-2013-1697/" source="CVE"/>
		<reference ref_id="CVE-2013-1701" ref_url="https://www.suse.com/security/cve/CVE-2013-1701/" source="CVE"/>
		<reference ref_id="CVE-2013-1705" ref_url="https://www.suse.com/security/cve/CVE-2013-1705/" source="CVE"/>
		<reference ref_id="CVE-2013-1709" ref_url="https://www.suse.com/security/cve/CVE-2013-1709/" source="CVE"/>
		<reference ref_id="CVE-2013-1710" ref_url="https://www.suse.com/security/cve/CVE-2013-1710/" source="CVE"/>
		<reference ref_id="CVE-2013-1713" ref_url="https://www.suse.com/security/cve/CVE-2013-1713/" source="CVE"/>
		<reference ref_id="CVE-2013-1714" ref_url="https://www.suse.com/security/cve/CVE-2013-1714/" source="CVE"/>
		<reference ref_id="CVE-2013-1717" ref_url="https://www.suse.com/security/cve/CVE-2013-1717/" source="CVE"/>
		<reference ref_id="CVE-2013-1718" ref_url="https://www.suse.com/security/cve/CVE-2013-1718/" source="CVE"/>
		<reference ref_id="CVE-2013-1722" ref_url="https://www.suse.com/security/cve/CVE-2013-1722/" source="CVE"/>
		<reference ref_id="CVE-2013-1725" ref_url="https://www.suse.com/security/cve/CVE-2013-1725/" source="CVE"/>
		<reference ref_id="CVE-2013-1730" ref_url="https://www.suse.com/security/cve/CVE-2013-1730/" source="CVE"/>
		<reference ref_id="CVE-2013-1732" ref_url="https://www.suse.com/security/cve/CVE-2013-1732/" source="CVE"/>
		<reference ref_id="CVE-2013-1735" ref_url="https://www.suse.com/security/cve/CVE-2013-1735/" source="CVE"/>
		<reference ref_id="CVE-2013-1736" ref_url="https://www.suse.com/security/cve/CVE-2013-1736/" source="CVE"/>
		<reference ref_id="CVE-2013-1737" ref_url="https://www.suse.com/security/cve/CVE-2013-1737/" source="CVE"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<reference ref_id="CVE-2013-5590" ref_url="https://www.suse.com/security/cve/CVE-2013-5590/" source="CVE"/>
		<reference ref_id="CVE-2013-5591" ref_url="https://www.suse.com/security/cve/CVE-2013-5591/" source="CVE"/>
		<reference ref_id="CVE-2013-5592" ref_url="https://www.suse.com/security/cve/CVE-2013-5592/" source="CVE"/>
		<reference ref_id="CVE-2013-5595" ref_url="https://www.suse.com/security/cve/CVE-2013-5595/" source="CVE"/>
		<reference ref_id="CVE-2013-5597" ref_url="https://www.suse.com/security/cve/CVE-2013-5597/" source="CVE"/>
		<reference ref_id="CVE-2013-5599" ref_url="https://www.suse.com/security/cve/CVE-2013-5599/" source="CVE"/>
		<reference ref_id="CVE-2013-5600" ref_url="https://www.suse.com/security/cve/CVE-2013-5600/" source="CVE"/>
		<reference ref_id="CVE-2013-5601" ref_url="https://www.suse.com/security/cve/CVE-2013-5601/" source="CVE"/>
		<reference ref_id="CVE-2013-5602" ref_url="https://www.suse.com/security/cve/CVE-2013-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-5604" ref_url="https://www.suse.com/security/cve/CVE-2013-5604/" source="CVE"/>
		<reference ref_id="CVE-2013-5609" ref_url="https://www.suse.com/security/cve/CVE-2013-5609/" source="CVE"/>
		<reference ref_id="CVE-2013-5610" ref_url="https://www.suse.com/security/cve/CVE-2013-5610/" source="CVE"/>
		<reference ref_id="CVE-2013-5613" ref_url="https://www.suse.com/security/cve/CVE-2013-5613/" source="CVE"/>
		<reference ref_id="CVE-2013-5615" ref_url="https://www.suse.com/security/cve/CVE-2013-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-5616" ref_url="https://www.suse.com/security/cve/CVE-2013-5616/" source="CVE"/>
		<reference ref_id="CVE-2013-5618" ref_url="https://www.suse.com/security/cve/CVE-2013-5618/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6630" ref_url="https://www.suse.com/security/cve/CVE-2013-6630/" source="CVE"/>
		<reference ref_id="CVE-2013-6671" ref_url="https://www.suse.com/security/cve/CVE-2013-6671/" source="CVE"/>
		<reference ref_id="CVE-2013-6673" ref_url="https://www.suse.com/security/cve/CVE-2013-6673/" source="CVE"/>
		<reference ref_id="CVE-2014-1477" ref_url="https://www.suse.com/security/cve/CVE-2014-1477/" source="CVE"/>
		<reference ref_id="CVE-2014-1478" ref_url="https://www.suse.com/security/cve/CVE-2014-1478/" source="CVE"/>
		<reference ref_id="CVE-2014-1479" ref_url="https://www.suse.com/security/cve/CVE-2014-1479/" source="CVE"/>
		<reference ref_id="CVE-2014-1481" ref_url="https://www.suse.com/security/cve/CVE-2014-1481/" source="CVE"/>
		<reference ref_id="CVE-2014-1482" ref_url="https://www.suse.com/security/cve/CVE-2014-1482/" source="CVE"/>
		<reference ref_id="CVE-2014-1486" ref_url="https://www.suse.com/security/cve/CVE-2014-1486/" source="CVE"/>
		<reference ref_id="CVE-2014-1487" ref_url="https://www.suse.com/security/cve/CVE-2014-1487/" source="CVE"/>
		<reference ref_id="CVE-2014-1490" ref_url="https://www.suse.com/security/cve/CVE-2014-1490/" source="CVE"/>
		<reference ref_id="CVE-2014-1491" ref_url="https://www.suse.com/security/cve/CVE-2014-1491/" source="CVE"/>
		<reference ref_id="CVE-2014-1493" ref_url="https://www.suse.com/security/cve/CVE-2014-1493/" source="CVE"/>
		<reference ref_id="CVE-2014-1494" ref_url="https://www.suse.com/security/cve/CVE-2014-1494/" source="CVE"/>
		<reference ref_id="CVE-2014-1497" ref_url="https://www.suse.com/security/cve/CVE-2014-1497/" source="CVE"/>
		<reference ref_id="CVE-2014-1505" ref_url="https://www.suse.com/security/cve/CVE-2014-1505/" source="CVE"/>
		<reference ref_id="CVE-2014-1508" ref_url="https://www.suse.com/security/cve/CVE-2014-1508/" source="CVE"/>
		<reference ref_id="CVE-2014-1509" ref_url="https://www.suse.com/security/cve/CVE-2014-1509/" source="CVE"/>
		<reference ref_id="CVE-2014-1510" ref_url="https://www.suse.com/security/cve/CVE-2014-1510/" source="CVE"/>
		<reference ref_id="CVE-2014-1511" ref_url="https://www.suse.com/security/cve/CVE-2014-1511/" source="CVE"/>
		<reference ref_id="CVE-2014-1512" ref_url="https://www.suse.com/security/cve/CVE-2014-1512/" source="CVE"/>
		<reference ref_id="CVE-2014-1513" ref_url="https://www.suse.com/security/cve/CVE-2014-1513/" source="CVE"/>
		<reference ref_id="CVE-2014-1514" ref_url="https://www.suse.com/security/cve/CVE-2014-1514/" source="CVE"/>
		<reference ref_id="CVE-2014-1518" ref_url="https://www.suse.com/security/cve/CVE-2014-1518/" source="CVE"/>
		<reference ref_id="CVE-2014-1523" ref_url="https://www.suse.com/security/cve/CVE-2014-1523/" source="CVE"/>
		<reference ref_id="CVE-2014-1524" ref_url="https://www.suse.com/security/cve/CVE-2014-1524/" source="CVE"/>
		<reference ref_id="CVE-2014-1529" ref_url="https://www.suse.com/security/cve/CVE-2014-1529/" source="CVE"/>
		<reference ref_id="CVE-2014-1530" ref_url="https://www.suse.com/security/cve/CVE-2014-1530/" source="CVE"/>
		<reference ref_id="CVE-2014-1531" ref_url="https://www.suse.com/security/cve/CVE-2014-1531/" source="CVE"/>
		<reference ref_id="CVE-2014-1532" ref_url="https://www.suse.com/security/cve/CVE-2014-1532/" source="CVE"/>
		<reference ref_id="CVE-2014-1533" ref_url="https://www.suse.com/security/cve/CVE-2014-1533/" source="CVE"/>
		<reference ref_id="CVE-2014-1534" ref_url="https://www.suse.com/security/cve/CVE-2014-1534/" source="CVE"/>
		<reference ref_id="CVE-2014-1536" ref_url="https://www.suse.com/security/cve/CVE-2014-1536/" source="CVE"/>
		<reference ref_id="CVE-2014-1537" ref_url="https://www.suse.com/security/cve/CVE-2014-1537/" source="CVE"/>
		<reference ref_id="CVE-2014-1538" ref_url="https://www.suse.com/security/cve/CVE-2014-1538/" source="CVE"/>
		<reference ref_id="CVE-2014-1541" ref_url="https://www.suse.com/security/cve/CVE-2014-1541/" source="CVE"/>
		<reference ref_id="CVE-2014-1544" ref_url="https://www.suse.com/security/cve/CVE-2014-1544/" source="CVE"/>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<reference ref_id="CVE-2014-1547" ref_url="https://www.suse.com/security/cve/CVE-2014-1547/" source="CVE"/>
		<reference ref_id="CVE-2014-1548" ref_url="https://www.suse.com/security/cve/CVE-2014-1548/" source="CVE"/>
		<reference ref_id="CVE-2014-1553" ref_url="https://www.suse.com/security/cve/CVE-2014-1553/" source="CVE"/>
		<reference ref_id="CVE-2014-1554" ref_url="https://www.suse.com/security/cve/CVE-2014-1554/" source="CVE"/>
		<reference ref_id="CVE-2014-1555" ref_url="https://www.suse.com/security/cve/CVE-2014-1555/" source="CVE"/>
		<reference ref_id="CVE-2014-1556" ref_url="https://www.suse.com/security/cve/CVE-2014-1556/" source="CVE"/>
		<reference ref_id="CVE-2014-1557" ref_url="https://www.suse.com/security/cve/CVE-2014-1557/" source="CVE"/>
		<reference ref_id="CVE-2014-1562" ref_url="https://www.suse.com/security/cve/CVE-2014-1562/" source="CVE"/>
		<reference ref_id="CVE-2014-1567" ref_url="https://www.suse.com/security/cve/CVE-2014-1567/" source="CVE"/>
		<reference ref_id="CVE-2014-1574" ref_url="https://www.suse.com/security/cve/CVE-2014-1574/" source="CVE"/>
		<reference ref_id="CVE-2014-1575" ref_url="https://www.suse.com/security/cve/CVE-2014-1575/" source="CVE"/>
		<reference ref_id="CVE-2014-1576" ref_url="https://www.suse.com/security/cve/CVE-2014-1576/" source="CVE"/>
		<reference ref_id="CVE-2014-1577" ref_url="https://www.suse.com/security/cve/CVE-2014-1577/" source="CVE"/>
		<reference ref_id="CVE-2014-1578" ref_url="https://www.suse.com/security/cve/CVE-2014-1578/" source="CVE"/>
		<reference ref_id="CVE-2014-1581" ref_url="https://www.suse.com/security/cve/CVE-2014-1581/" source="CVE"/>
		<reference ref_id="CVE-2014-1583" ref_url="https://www.suse.com/security/cve/CVE-2014-1583/" source="CVE"/>
		<reference ref_id="CVE-2014-1585" ref_url="https://www.suse.com/security/cve/CVE-2014-1585/" source="CVE"/>
		<reference ref_id="CVE-2014-1586" ref_url="https://www.suse.com/security/cve/CVE-2014-1586/" source="CVE"/>
		<reference ref_id="CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587/" source="CVE"/>
		<reference ref_id="CVE-2014-1588" ref_url="https://www.suse.com/security/cve/CVE-2014-1588/" source="CVE"/>
		<reference ref_id="CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590/" source="CVE"/>
		<reference ref_id="CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592/" source="CVE"/>
		<reference ref_id="CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593/" source="CVE"/>
		<reference ref_id="CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594/" source="CVE"/>
		<reference ref_id="CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634/" source="CVE"/>
		<reference ref_id="CVE-2014-8635" ref_url="https://www.suse.com/security/cve/CVE-2014-8635/" source="CVE"/>
		<reference ref_id="CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638/" source="CVE"/>
		<reference ref_id="CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639/" source="CVE"/>
		<reference ref_id="CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641/" source="CVE"/>
		<reference ref_id="CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797/" source="CVE"/>
		<reference ref_id="CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801/" source="CVE"/>
		<reference ref_id="CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807/" source="CVE"/>
		<reference ref_id="CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813/" source="CVE"/>
		<reference ref_id="CVE-2015-0814" ref_url="https://www.suse.com/security/cve/CVE-2015-0814/" source="CVE"/>
		<reference ref_id="CVE-2015-0815" ref_url="https://www.suse.com/security/cve/CVE-2015-0815/" source="CVE"/>
		<reference ref_id="CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816/" source="CVE"/>
		<reference ref_id="CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817/" source="CVE"/>
		<reference ref_id="CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818/" source="CVE"/>
		<reference ref_id="CVE-2015-0822" ref_url="https://www.suse.com/security/cve/CVE-2015-0822/" source="CVE"/>
		<reference ref_id="CVE-2015-0827" ref_url="https://www.suse.com/security/cve/CVE-2015-0827/" source="CVE"/>
		<reference ref_id="CVE-2015-0831" ref_url="https://www.suse.com/security/cve/CVE-2015-0831/" source="CVE"/>
		<reference ref_id="CVE-2015-0835" ref_url="https://www.suse.com/security/cve/CVE-2015-0835/" source="CVE"/>
		<reference ref_id="CVE-2015-0836" ref_url="https://www.suse.com/security/cve/CVE-2015-0836/" source="CVE"/>
		<reference ref_id="CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708/" source="CVE"/>
		<reference ref_id="CVE-2015-2709" ref_url="https://www.suse.com/security/cve/CVE-2015-2709/" source="CVE"/>
		<reference ref_id="CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710/" source="CVE"/>
		<reference ref_id="CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713/" source="CVE"/>
		<reference ref_id="CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-31.7.0esr-0.8.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6077/">CVE-2006-6077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6077">CVE-2006-6077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0008/">CVE-2007-0008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0008">CVE-2007-0008 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0009/">CVE-2007-0009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0009">CVE-2007-0009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0078/">CVE-2007-0078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0078">CVE-2007-0078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0079/">CVE-2007-0079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0079">CVE-2007-0079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0775/">CVE-2007-0775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0775">CVE-2007-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0776/">CVE-2007-0776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0776">CVE-2007-0776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0777/">CVE-2007-0777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0777">CVE-2007-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0780/">CVE-2007-0780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0780">CVE-2007-0780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0800/">CVE-2007-0800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0800">CVE-2007-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0981/">CVE-2007-0981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0981">CVE-2007-0981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0995/">CVE-2007-0995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0995">CVE-2007-0995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0996/">CVE-2007-0996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0996">CVE-2007-0996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3089/">CVE-2007-3089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3089">CVE-2007-3089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3285/">CVE-2007-3285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3285">CVE-2007-3285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3656/">CVE-2007-3656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3656">CVE-2007-3656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3670/">CVE-2007-3670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3670">CVE-2007-3670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3734/">CVE-2007-3734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3734">CVE-2007-3734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3735/">CVE-2007-3735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3735">CVE-2007-3735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3736/">CVE-2007-3736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3736">CVE-2007-3736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3737/">CVE-2007-3737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3737">CVE-2007-3737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3738/">CVE-2007-3738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3738">CVE-2007-3738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0412/">CVE-2008-0412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0412">CVE-2008-0412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0414/">CVE-2008-0414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0414">CVE-2008-0414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0415/">CVE-2008-0415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0415">CVE-2008-0415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0417/">CVE-2008-0417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0417">CVE-2008-0417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0418/">CVE-2008-0418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0418">CVE-2008-0418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0419/">CVE-2008-0419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0419">CVE-2008-0419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0591/">CVE-2008-0591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0591">CVE-2008-0591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0592/">CVE-2008-0592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0592">CVE-2008-0592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0593/">CVE-2008-0593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0593">CVE-2008-0593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0594/">CVE-2008-0594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0594">CVE-2008-0594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3836/">CVE-2008-3836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3836">CVE-2008-3836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4063/">CVE-2008-4063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4063">CVE-2008-4063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4064/">CVE-2008-4064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4064">CVE-2008-4064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4070/">CVE-2008-4070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4070">CVE-2008-4070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5913/">CVE-2008-5913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5913">CVE-2008-5913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0040">CVE-2009-0040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0352/">CVE-2009-0352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0352">CVE-2009-0352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0353/">CVE-2009-0353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0353">CVE-2009-0353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0354/">CVE-2009-0354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0354">CVE-2009-0354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0355/">CVE-2009-0355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0355">CVE-2009-0355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0356/">CVE-2009-0356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0356">CVE-2009-0356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0357/">CVE-2009-0357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0357">CVE-2009-0357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0358/">CVE-2009-0358 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0358">CVE-2009-0358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0652/">CVE-2009-0652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0652">CVE-2009-0652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0771/">CVE-2009-0771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0771">CVE-2009-0771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0772/">CVE-2009-0772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0772">CVE-2009-0772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0773/">CVE-2009-0773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0773">CVE-2009-0773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0774/">CVE-2009-0774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0774">CVE-2009-0774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0775/">CVE-2009-0775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0775">CVE-2009-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0776/">CVE-2009-0776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0776">CVE-2009-0776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0777/">CVE-2009-0777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0777">CVE-2009-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1044/">CVE-2009-1044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1044">CVE-2009-1044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1169/">CVE-2009-1169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1169">CVE-2009-1169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1302/">CVE-2009-1302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1302">CVE-2009-1302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1303/">CVE-2009-1303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1303">CVE-2009-1303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1304/">CVE-2009-1304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1304">CVE-2009-1304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1305/">CVE-2009-1305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1305">CVE-2009-1305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1306/">CVE-2009-1306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1306">CVE-2009-1306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1307/">CVE-2009-1307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1307">CVE-2009-1307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1308/">CVE-2009-1308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1308">CVE-2009-1308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1309/">CVE-2009-1309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1309">CVE-2009-1309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1310/">CVE-2009-1310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1310">CVE-2009-1310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1311/">CVE-2009-1311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1311">CVE-2009-1311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1312/">CVE-2009-1312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1312">CVE-2009-1312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1313/">CVE-2009-1313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1313">CVE-2009-1313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1563/">CVE-2009-1563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1563">CVE-2009-1563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1571/">CVE-2009-1571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1571">CVE-2009-1571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2470/">CVE-2009-2470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2470">CVE-2009-2470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2654/">CVE-2009-2654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2654">CVE-2009-2654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3069/">CVE-2009-3069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3069">CVE-2009-3069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3070/">CVE-2009-3070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3070">CVE-2009-3070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3071/">CVE-2009-3071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3071">CVE-2009-3071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3072/">CVE-2009-3072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3072">CVE-2009-3072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3073/">CVE-2009-3073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3073">CVE-2009-3073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3074/">CVE-2009-3074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3074">CVE-2009-3074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3075/">CVE-2009-3075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3075">CVE-2009-3075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3077/">CVE-2009-3077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3077">CVE-2009-3077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3078/">CVE-2009-3078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3078">CVE-2009-3078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3079/">CVE-2009-3079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3079">CVE-2009-3079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3274/">CVE-2009-3274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3274">CVE-2009-3274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3370/">CVE-2009-3370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3370">CVE-2009-3370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3371/">CVE-2009-3371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3371">CVE-2009-3371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3372/">CVE-2009-3372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3372">CVE-2009-3372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3373/">CVE-2009-3373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3373">CVE-2009-3373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3374/">CVE-2009-3374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3374">CVE-2009-3374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3375/">CVE-2009-3375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3375">CVE-2009-3375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3376/">CVE-2009-3376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3376">CVE-2009-3376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3377/">CVE-2009-3377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3377">CVE-2009-3377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3378/">CVE-2009-3378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3378">CVE-2009-3378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3379">CVE-2009-3379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3380/">CVE-2009-3380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3380">CVE-2009-3380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3381/">CVE-2009-3381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3381">CVE-2009-3381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3383/">CVE-2009-3383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3383">CVE-2009-3383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3388/">CVE-2009-3388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3388">CVE-2009-3388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3389/">CVE-2009-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3389">CVE-2009-3389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3979/">CVE-2009-3979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3979">CVE-2009-3979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3980/">CVE-2009-3980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3980">CVE-2009-3980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3982/">CVE-2009-3982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3982">CVE-2009-3982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3983/">CVE-2009-3983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3983">CVE-2009-3983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3984/">CVE-2009-3984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3984">CVE-2009-3984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3985/">CVE-2009-3985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3985">CVE-2009-3985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3988/">CVE-2009-3988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3988">CVE-2009-3988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0159/">CVE-2010-0159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0159">CVE-2010-0159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0160/">CVE-2010-0160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0160">CVE-2010-0160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0162/">CVE-2010-0162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0162">CVE-2010-0162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0173">CVE-2010-0173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0174">CVE-2010-0174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0175/">CVE-2010-0175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0175">CVE-2010-0175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0176">CVE-2010-0176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0177">CVE-2010-0177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0178">CVE-2010-0178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0179/">CVE-2010-0179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0179">CVE-2010-0179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0181">CVE-2010-0181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0182">CVE-2010-0182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0183/">CVE-2010-0183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0183">CVE-2010-0183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0654">CVE-2010-0654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1121">CVE-2010-1121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1125/">CVE-2010-1125 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1125">CVE-2010-1125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1196">CVE-2010-1196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1197/">CVE-2010-1197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1197">CVE-2010-1197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1198/">CVE-2010-1198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1198">CVE-2010-1198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1199">CVE-2010-1199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1200">CVE-2010-1200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1201/">CVE-2010-1201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1201">CVE-2010-1201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1202/">CVE-2010-1202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1202">CVE-2010-1202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1203">CVE-2010-1203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1205">CVE-2010-1205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1206/">CVE-2010-1206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1206">CVE-2010-1206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1208/">CVE-2010-1208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1208">CVE-2010-1208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1209/">CVE-2010-1209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1209">CVE-2010-1209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1211">CVE-2010-1211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1212/">CVE-2010-1212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1212">CVE-2010-1212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1213">CVE-2010-1213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1214/">CVE-2010-1214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1214">CVE-2010-1214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1585/">CVE-2010-1585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1585">CVE-2010-1585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2751/">CVE-2010-2751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2751">CVE-2010-2751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2752">CVE-2010-2752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2753">CVE-2010-2753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2754">CVE-2010-2754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2755/">CVE-2010-2755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2755">CVE-2010-2755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2760">CVE-2010-2760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2762/">CVE-2010-2762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2762">CVE-2010-2762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2764">CVE-2010-2764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2765">CVE-2010-2765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2766">CVE-2010-2766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2767">CVE-2010-2767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2768">CVE-2010-2768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2769">CVE-2010-2769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3166">CVE-2010-3166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3167">CVE-2010-3167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3168">CVE-2010-3168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3169">CVE-2010-3169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3170">CVE-2010-3170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3173/">CVE-2010-3173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3173">CVE-2010-3173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3174">CVE-2010-3174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3175">CVE-2010-3175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3176">CVE-2010-3176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3177">CVE-2010-3177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3178">CVE-2010-3178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3179">CVE-2010-3179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3180">CVE-2010-3180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3182">CVE-2010-3182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3183">CVE-2010-3183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3765">CVE-2010-3765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3766/">CVE-2010-3766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3766">CVE-2010-3766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3767/">CVE-2010-3767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3767">CVE-2010-3767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3768/">CVE-2010-3768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3768">CVE-2010-3768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3769/">CVE-2010-3769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3769">CVE-2010-3769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3770/">CVE-2010-3770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3770">CVE-2010-3770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3771/">CVE-2010-3771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3771">CVE-2010-3771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3772/">CVE-2010-3772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3772">CVE-2010-3772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3773/">CVE-2010-3773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3773">CVE-2010-3773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3775/">CVE-2010-3775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3775">CVE-2010-3775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3776/">CVE-2010-3776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3776">CVE-2010-3776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3777/">CVE-2010-3777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3777">CVE-2010-3777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3778/">CVE-2010-3778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3778">CVE-2010-3778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0051/">CVE-2011-0051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0051">CVE-2011-0051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0053/">CVE-2011-0053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0053">CVE-2011-0053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0054/">CVE-2011-0054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0054">CVE-2011-0054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0055/">CVE-2011-0055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0055">CVE-2011-0055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0056/">CVE-2011-0056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0056">CVE-2011-0056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0057/">CVE-2011-0057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0057">CVE-2011-0057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0059/">CVE-2011-0059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0059">CVE-2011-0059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0061/">CVE-2011-0061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0061">CVE-2011-0061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0062/">CVE-2011-0062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0062">CVE-2011-0062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0065/">CVE-2011-0065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0065">CVE-2011-0065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0066/">CVE-2011-0066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0066">CVE-2011-0066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0067/">CVE-2011-0067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0067">CVE-2011-0067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0069">CVE-2011-0069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0070/">CVE-2011-0070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0070">CVE-2011-0070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0072/">CVE-2011-0072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0072">CVE-2011-0072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0073/">CVE-2011-0073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0073">CVE-2011-0073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0074/">CVE-2011-0074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0074">CVE-2011-0074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0075/">CVE-2011-0075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0075">CVE-2011-0075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0077/">CVE-2011-0077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0077">CVE-2011-0077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0078/">CVE-2011-0078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0078">CVE-2011-0078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0080">CVE-2011-0080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0081/">CVE-2011-0081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0081">CVE-2011-0081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0083/">CVE-2011-0083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0083">CVE-2011-0083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0084/">CVE-2011-0084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0084">CVE-2011-0084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0085/">CVE-2011-0085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0085">CVE-2011-0085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1202/">CVE-2011-1202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1202">CVE-2011-1202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2362/">CVE-2011-2362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2362">CVE-2011-2362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2363/">CVE-2011-2363 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2363">CVE-2011-2363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2364/">CVE-2011-2364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2364">CVE-2011-2364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2365/">CVE-2011-2365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2365">CVE-2011-2365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2371/">CVE-2011-2371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2371">CVE-2011-2371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2372/">CVE-2011-2372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2372">CVE-2011-2372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2373/">CVE-2011-2373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2373">CVE-2011-2373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2374/">CVE-2011-2374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2374">CVE-2011-2374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2376/">CVE-2011-2376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2376">CVE-2011-2376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2377/">CVE-2011-2377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2377">CVE-2011-2377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2378/">CVE-2011-2378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2378">CVE-2011-2378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2980/">CVE-2011-2980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2980">CVE-2011-2980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2981/">CVE-2011-2981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2981">CVE-2011-2981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2982/">CVE-2011-2982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2982">CVE-2011-2982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2983/">CVE-2011-2983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2983">CVE-2011-2983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2995/">CVE-2011-2995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2995">CVE-2011-2995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2996/">CVE-2011-2996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2996">CVE-2011-2996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2997/">CVE-2011-2997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2997">CVE-2011-2997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3000/">CVE-2011-3000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3000">CVE-2011-3000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3001/">CVE-2011-3001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3001">CVE-2011-3001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3002/">CVE-2011-3002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3002">CVE-2011-3002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3003/">CVE-2011-3003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3003">CVE-2011-3003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3004/">CVE-2011-3004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3004">CVE-2011-3004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3005/">CVE-2011-3005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3005">CVE-2011-3005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3026">CVE-2011-3026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3062/">CVE-2011-3062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3062">CVE-2011-3062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3101/">CVE-2011-3101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3101">CVE-2011-3101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3232/">CVE-2011-3232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3232">CVE-2011-3232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3658/">CVE-2011-3658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3658">CVE-2011-3658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3660/">CVE-2011-3660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3660">CVE-2011-3660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3661/">CVE-2011-3661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3661">CVE-2011-3661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3663/">CVE-2011-3663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3663">CVE-2011-3663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3665/">CVE-2011-3665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3665">CVE-2011-3665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0441/">CVE-2012-0441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0441">CVE-2012-0441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0452/">CVE-2012-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0452">CVE-2012-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0467/">CVE-2012-0467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0467">CVE-2012-0467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0468/">CVE-2012-0468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0468">CVE-2012-0468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0469/">CVE-2012-0469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0469">CVE-2012-0469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0470/">CVE-2012-0470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0470">CVE-2012-0470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0471/">CVE-2012-0471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0471">CVE-2012-0471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0472/">CVE-2012-0472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0472">CVE-2012-0472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0473/">CVE-2012-0473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0473">CVE-2012-0473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0474/">CVE-2012-0474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0474">CVE-2012-0474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0477/">CVE-2012-0477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0477">CVE-2012-0477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0478/">CVE-2012-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0478">CVE-2012-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0479/">CVE-2012-0479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0479">CVE-2012-0479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0759/">CVE-2012-0759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0759">CVE-2012-0759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1937/">CVE-2012-1937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1937">CVE-2012-1937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1939/">CVE-2012-1939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1939">CVE-2012-1939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1940/">CVE-2012-1940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1940">CVE-2012-1940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1941/">CVE-2012-1941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1941">CVE-2012-1941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1944/">CVE-2012-1944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1944">CVE-2012-1944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1945/">CVE-2012-1945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1945">CVE-2012-1945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1946/">CVE-2012-1946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1946">CVE-2012-1946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1947/">CVE-2012-1947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1947">CVE-2012-1947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1948/">CVE-2012-1948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1948">CVE-2012-1948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1949/">CVE-2012-1949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1949">CVE-2012-1949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1950/">CVE-2012-1950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1950">CVE-2012-1950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1951/">CVE-2012-1951 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1951">CVE-2012-1951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1952/">CVE-2012-1952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1952">CVE-2012-1952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1953/">CVE-2012-1953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1953">CVE-2012-1953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1954/">CVE-2012-1954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1954">CVE-2012-1954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1955/">CVE-2012-1955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1955">CVE-2012-1955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1956/">CVE-2012-1956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1956">CVE-2012-1956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1957/">CVE-2012-1957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1957">CVE-2012-1957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1958/">CVE-2012-1958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1958">CVE-2012-1958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1959/">CVE-2012-1959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1959">CVE-2012-1959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1960/">CVE-2012-1960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1960">CVE-2012-1960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1961/">CVE-2012-1961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1961">CVE-2012-1961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1962/">CVE-2012-1962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1962">CVE-2012-1962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1963/">CVE-2012-1963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1963">CVE-2012-1963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1964/">CVE-2012-1964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1964">CVE-2012-1964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1965/">CVE-2012-1965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1965">CVE-2012-1965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1966/">CVE-2012-1966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1966">CVE-2012-1966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1967/">CVE-2012-1967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1967">CVE-2012-1967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1970/">CVE-2012-1970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1970">CVE-2012-1970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1972/">CVE-2012-1972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1972">CVE-2012-1972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1973/">CVE-2012-1973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1973">CVE-2012-1973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1974/">CVE-2012-1974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1974">CVE-2012-1974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1975/">CVE-2012-1975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1975">CVE-2012-1975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1976/">CVE-2012-1976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1976">CVE-2012-1976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3956/">CVE-2012-3956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3956">CVE-2012-3956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3957/">CVE-2012-3957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3957">CVE-2012-3957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3958/">CVE-2012-3958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3958">CVE-2012-3958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3959/">CVE-2012-3959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3959">CVE-2012-3959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3960/">CVE-2012-3960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3960">CVE-2012-3960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3961/">CVE-2012-3961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3961">CVE-2012-3961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3962/">CVE-2012-3962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3962">CVE-2012-3962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3963/">CVE-2012-3963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3963">CVE-2012-3963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3964/">CVE-2012-3964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3964">CVE-2012-3964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3966/">CVE-2012-3966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3966">CVE-2012-3966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3967/">CVE-2012-3967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3967">CVE-2012-3967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3968/">CVE-2012-3968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3968">CVE-2012-3968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3969/">CVE-2012-3969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3969">CVE-2012-3969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3970/">CVE-2012-3970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3970">CVE-2012-3970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3972/">CVE-2012-3972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3972">CVE-2012-3972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3976/">CVE-2012-3976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3976">CVE-2012-3976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3978/">CVE-2012-3978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3978">CVE-2012-3978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3980/">CVE-2012-3980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3980">CVE-2012-3980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3982/">CVE-2012-3982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3982">CVE-2012-3982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3986/">CVE-2012-3986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3986">CVE-2012-3986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3988/">CVE-2012-3988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3988">CVE-2012-3988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3990/">CVE-2012-3990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3990">CVE-2012-3990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3991/">CVE-2012-3991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3991">CVE-2012-3991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3992/">CVE-2012-3992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3992">CVE-2012-3992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3993/">CVE-2012-3993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3993">CVE-2012-3993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3994/">CVE-2012-3994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3994">CVE-2012-3994 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3995/">CVE-2012-3995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3995">CVE-2012-3995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4179/">CVE-2012-4179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4179">CVE-2012-4179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4180/">CVE-2012-4180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4180">CVE-2012-4180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4181/">CVE-2012-4181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4181">CVE-2012-4181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4182/">CVE-2012-4182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4182">CVE-2012-4182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4183/">CVE-2012-4183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4183">CVE-2012-4183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4184/">CVE-2012-4184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4184">CVE-2012-4184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4185/">CVE-2012-4185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4185">CVE-2012-4185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4186/">CVE-2012-4186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4186">CVE-2012-4186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4187/">CVE-2012-4187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4187">CVE-2012-4187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4188/">CVE-2012-4188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4188">CVE-2012-4188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4192/">CVE-2012-4192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4192">CVE-2012-4192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4193/">CVE-2012-4193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4193">CVE-2012-4193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4194/">CVE-2012-4194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4194">CVE-2012-4194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4195/">CVE-2012-4195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4195">CVE-2012-4195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4196/">CVE-2012-4196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4196">CVE-2012-4196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4201/">CVE-2012-4201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4201">CVE-2012-4201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4202/">CVE-2012-4202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4202">CVE-2012-4202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4207/">CVE-2012-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4207">CVE-2012-4207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4209/">CVE-2012-4209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4209">CVE-2012-4209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4210/">CVE-2012-4210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4210">CVE-2012-4210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4212/">CVE-2012-4212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4212">CVE-2012-4212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4213/">CVE-2012-4213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4213">CVE-2012-4213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4214/">CVE-2012-4214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4214">CVE-2012-4214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4215/">CVE-2012-4215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4215">CVE-2012-4215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4216/">CVE-2012-4216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4216">CVE-2012-4216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4217/">CVE-2012-4217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4217">CVE-2012-4217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4218/">CVE-2012-4218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4218">CVE-2012-4218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5829">CVE-2012-5829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5830/">CVE-2012-5830 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-5830">CVE-2012-5830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5833/">CVE-2012-5833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5833">CVE-2012-5833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5835/">CVE-2012-5835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5835">CVE-2012-5835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5838/">CVE-2012-5838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5838">CVE-2012-5838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5839/">CVE-2012-5839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5839">CVE-2012-5839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5840/">CVE-2012-5840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5840">CVE-2012-5840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5841/">CVE-2012-5841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5841">CVE-2012-5841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5842/">CVE-2012-5842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5842">CVE-2012-5842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5843/">CVE-2012-5843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5843">CVE-2012-5843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0744/">CVE-2013-0744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0744">CVE-2013-0744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0745/">CVE-2013-0745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0745">CVE-2013-0745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0746/">CVE-2013-0746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0746">CVE-2013-0746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0747/">CVE-2013-0747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0747">CVE-2013-0747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0748/">CVE-2013-0748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0748">CVE-2013-0748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0749/">CVE-2013-0749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0749">CVE-2013-0749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0750/">CVE-2013-0750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0750">CVE-2013-0750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0752/">CVE-2013-0752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0752">CVE-2013-0752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0753/">CVE-2013-0753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0753">CVE-2013-0753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0754/">CVE-2013-0754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0754">CVE-2013-0754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0755/">CVE-2013-0755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0755">CVE-2013-0755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0756/">CVE-2013-0756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0756">CVE-2013-0756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0757/">CVE-2013-0757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0757">CVE-2013-0757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0758/">CVE-2013-0758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0758">CVE-2013-0758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0760/">CVE-2013-0760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0760">CVE-2013-0760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0761/">CVE-2013-0761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0761">CVE-2013-0761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0762/">CVE-2013-0762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0762">CVE-2013-0762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0763/">CVE-2013-0763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0763">CVE-2013-0763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0764/">CVE-2013-0764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0764">CVE-2013-0764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0766/">CVE-2013-0766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0766">CVE-2013-0766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0767/">CVE-2013-0767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0767">CVE-2013-0767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0768/">CVE-2013-0768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0768">CVE-2013-0768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0769/">CVE-2013-0769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0769">CVE-2013-0769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0770/">CVE-2013-0770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0770">CVE-2013-0770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0771/">CVE-2013-0771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0771">CVE-2013-0771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0773/">CVE-2013-0773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0773">CVE-2013-0773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0774/">CVE-2013-0774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0774">CVE-2013-0774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0775/">CVE-2013-0775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0775">CVE-2013-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0776/">CVE-2013-0776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0776">CVE-2013-0776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0780/">CVE-2013-0780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0780">CVE-2013-0780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0782/">CVE-2013-0782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0782">CVE-2013-0782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0783/">CVE-2013-0783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0783">CVE-2013-0783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0787/">CVE-2013-0787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0787">CVE-2013-0787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0788">CVE-2013-0788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0793/">CVE-2013-0793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0793">CVE-2013-0793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0794">CVE-2013-0794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0795">CVE-2013-0795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0796">CVE-2013-0796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0800">CVE-2013-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0801/">CVE-2013-0801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0801">CVE-2013-0801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1669/">CVE-2013-1669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1669">CVE-2013-1669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1670/">CVE-2013-1670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1670">CVE-2013-1670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1674/">CVE-2013-1674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1674">CVE-2013-1674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1675/">CVE-2013-1675 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-1675">CVE-2013-1675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1676/">CVE-2013-1676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1676">CVE-2013-1676 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1677/">CVE-2013-1677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1677">CVE-2013-1677 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1678/">CVE-2013-1678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1678">CVE-2013-1678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1679/">CVE-2013-1679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1679">CVE-2013-1679 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1680/">CVE-2013-1680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1680">CVE-2013-1680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1681/">CVE-2013-1681 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1681">CVE-2013-1681 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1682/">CVE-2013-1682 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1682">CVE-2013-1682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1684/">CVE-2013-1684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1684">CVE-2013-1684 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1685/">CVE-2013-1685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1685">CVE-2013-1685 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1686/">CVE-2013-1686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1686">CVE-2013-1686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1687/">CVE-2013-1687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1687">CVE-2013-1687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1690/">CVE-2013-1690 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-1690">CVE-2013-1690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1692/">CVE-2013-1692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1692">CVE-2013-1692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1693/">CVE-2013-1693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1693">CVE-2013-1693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1694/">CVE-2013-1694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1694">CVE-2013-1694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1697/">CVE-2013-1697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1697">CVE-2013-1697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1701/">CVE-2013-1701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1701">CVE-2013-1701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1705/">CVE-2013-1705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1705">CVE-2013-1705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1709/">CVE-2013-1709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1709">CVE-2013-1709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1710/">CVE-2013-1710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1710">CVE-2013-1710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1713/">CVE-2013-1713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1713">CVE-2013-1713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1714/">CVE-2013-1714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1714">CVE-2013-1714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1717/">CVE-2013-1717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1717">CVE-2013-1717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1718/">CVE-2013-1718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1718">CVE-2013-1718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1722/">CVE-2013-1722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1722">CVE-2013-1722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1725/">CVE-2013-1725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1725">CVE-2013-1725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1730/">CVE-2013-1730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1730">CVE-2013-1730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1732/">CVE-2013-1732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1732">CVE-2013-1732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1735/">CVE-2013-1735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1735">CVE-2013-1735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1736/">CVE-2013-1736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1736">CVE-2013-1736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1737/">CVE-2013-1737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1737">CVE-2013-1737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1739">CVE-2013-1739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5590/">CVE-2013-5590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5590">CVE-2013-5590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5591/">CVE-2013-5591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5591">CVE-2013-5591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5592/">CVE-2013-5592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5592">CVE-2013-5592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5595/">CVE-2013-5595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5595">CVE-2013-5595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5597/">CVE-2013-5597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5597">CVE-2013-5597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5599/">CVE-2013-5599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5599">CVE-2013-5599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5600/">CVE-2013-5600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5600">CVE-2013-5600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5601/">CVE-2013-5601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5601">CVE-2013-5601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5602/">CVE-2013-5602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5602">CVE-2013-5602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5604/">CVE-2013-5604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5604">CVE-2013-5604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5609/">CVE-2013-5609 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5609">CVE-2013-5609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5610/">CVE-2013-5610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5610">CVE-2013-5610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5613/">CVE-2013-5613 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5613">CVE-2013-5613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5615/">CVE-2013-5615 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5615">CVE-2013-5615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5616/">CVE-2013-5616 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5616">CVE-2013-5616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5618/">CVE-2013-5618 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5618">CVE-2013-5618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6629">CVE-2013-6629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6630/">CVE-2013-6630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6630">CVE-2013-6630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6671/">CVE-2013-6671 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-6671">CVE-2013-6671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6673/">CVE-2013-6673 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-6673">CVE-2013-6673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1477/">CVE-2014-1477 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1477">CVE-2014-1477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1478/">CVE-2014-1478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1478">CVE-2014-1478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1479/">CVE-2014-1479 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1479">CVE-2014-1479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1481/">CVE-2014-1481 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1481">CVE-2014-1481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1482/">CVE-2014-1482 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1482">CVE-2014-1482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1486/">CVE-2014-1486 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1486">CVE-2014-1486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1487/">CVE-2014-1487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1487">CVE-2014-1487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1490/">CVE-2014-1490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1490">CVE-2014-1490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1491/">CVE-2014-1491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1491">CVE-2014-1491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1493/">CVE-2014-1493 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1493">CVE-2014-1493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1494/">CVE-2014-1494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1494">CVE-2014-1494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1497/">CVE-2014-1497 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1497">CVE-2014-1497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1505/">CVE-2014-1505 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1505">CVE-2014-1505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1508/">CVE-2014-1508 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1508">CVE-2014-1508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1509/">CVE-2014-1509 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1509">CVE-2014-1509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1510/">CVE-2014-1510 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1510">CVE-2014-1510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1511/">CVE-2014-1511 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1511">CVE-2014-1511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1512/">CVE-2014-1512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1512">CVE-2014-1512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1513/">CVE-2014-1513 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1513">CVE-2014-1513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1514/">CVE-2014-1514 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1514">CVE-2014-1514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1518/">CVE-2014-1518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1518">CVE-2014-1518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1523/">CVE-2014-1523 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1523">CVE-2014-1523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1524/">CVE-2014-1524 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1524">CVE-2014-1524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1529/">CVE-2014-1529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1529">CVE-2014-1529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1530/">CVE-2014-1530 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1530">CVE-2014-1530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1531/">CVE-2014-1531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1531">CVE-2014-1531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1532/">CVE-2014-1532 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1532">CVE-2014-1532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1533/">CVE-2014-1533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1533">CVE-2014-1533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1534/">CVE-2014-1534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1534">CVE-2014-1534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1536/">CVE-2014-1536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1536">CVE-2014-1536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1537/">CVE-2014-1537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1537">CVE-2014-1537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1538/">CVE-2014-1538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1538">CVE-2014-1538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1541/">CVE-2014-1541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1541">CVE-2014-1541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1544/">CVE-2014-1544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1544">CVE-2014-1544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1545">CVE-2014-1545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1547/">CVE-2014-1547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1547">CVE-2014-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1548/">CVE-2014-1548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1548">CVE-2014-1548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1553/">CVE-2014-1553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1553">CVE-2014-1553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1554/">CVE-2014-1554 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1554">CVE-2014-1554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1555/">CVE-2014-1555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1555">CVE-2014-1555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1556/">CVE-2014-1556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1556">CVE-2014-1556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1557/">CVE-2014-1557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1557">CVE-2014-1557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1562/">CVE-2014-1562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1562">CVE-2014-1562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1567/">CVE-2014-1567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1567">CVE-2014-1567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1574/">CVE-2014-1574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1574">CVE-2014-1574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1575/">CVE-2014-1575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1575">CVE-2014-1575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1576/">CVE-2014-1576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1576">CVE-2014-1576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1577/">CVE-2014-1577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1577">CVE-2014-1577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1578/">CVE-2014-1578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1578">CVE-2014-1578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1581/">CVE-2014-1581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1581">CVE-2014-1581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1583/">CVE-2014-1583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1583">CVE-2014-1583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1585/">CVE-2014-1585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1585">CVE-2014-1585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1586/">CVE-2014-1586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1586">CVE-2014-1586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1587">CVE-2014-1587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1588/">CVE-2014-1588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1588">CVE-2014-1588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1590">CVE-2014-1590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1592">CVE-2014-1592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1593">CVE-2014-1593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1594">CVE-2014-1594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8634">CVE-2014-8634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8635/">CVE-2014-8635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8635">CVE-2014-8635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8638">CVE-2014-8638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8639">CVE-2014-8639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8641">CVE-2014-8641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0797">CVE-2015-0797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0801">CVE-2015-0801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0807">CVE-2015-0807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0813">CVE-2015-0813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0814/">CVE-2015-0814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0814">CVE-2015-0814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0815/">CVE-2015-0815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0815">CVE-2015-0815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0816">CVE-2015-0816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0817">CVE-2015-0817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0818">CVE-2015-0818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0822/">CVE-2015-0822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0822">CVE-2015-0822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0827/">CVE-2015-0827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0827">CVE-2015-0827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0831/">CVE-2015-0831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0831">CVE-2015-0831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0835/">CVE-2015-0835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0835">CVE-2015-0835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0836/">CVE-2015-0836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0836">CVE-2015-0836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2708">CVE-2015-2708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2709/">CVE-2015-2709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2709">CVE-2015-2709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2710">CVE-2015-2710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2713">CVE-2015-2713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2716">CVE-2015-2716 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990085" comment="MozillaFirefox-31.7.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990086" comment="MozillaFirefox-translations-31.7.0esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216186" version="1" class="patch">
	<metadata>
		<title>NetworkManager-0.7.1_git20090811-3.28.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0365" ref_url="https://www.suse.com/security/cve/CVE-2009-0365/" source="CVE"/>
		<reference ref_id="CVE-2009-0578" ref_url="https://www.suse.com/security/cve/CVE-2009-0578/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-0.7.1_git20090811-3.28.2 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0365/">CVE-2009-0365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0365">CVE-2009-0365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0578/">CVE-2009-0578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0578">CVE-2009-0578 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989505" comment="NetworkManager-0.7.1_git20090811-3.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989506" comment="NetworkManager-glib-0.7.1_git20090811-3.28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216187" version="1" class="patch">
	<metadata>
		<title>NetworkManager-gnome-0.7.1-5.22.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0365" ref_url="https://www.suse.com/security/cve/CVE-2009-0365/" source="CVE"/>
		<reference ref_id="CVE-2009-0578" ref_url="https://www.suse.com/security/cve/CVE-2009-0578/" source="CVE"/>
		<reference ref_id="CVE-2009-4144" ref_url="https://www.suse.com/security/cve/CVE-2009-4144/" source="CVE"/>
		<reference ref_id="CVE-2009-4145" ref_url="https://www.suse.com/security/cve/CVE-2009-4145/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-gnome-0.7.1-5.22.28 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0365/">CVE-2009-0365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0365">CVE-2009-0365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0578/">CVE-2009-0578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0578">CVE-2009-0578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4144/">CVE-2009-4144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4144">CVE-2009-4144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4145/">CVE-2009-4145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4145">CVE-2009-4145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988887" comment="NetworkManager-gnome-0.7.1-5.22.28 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216188" version="1" class="patch">
	<metadata>
		<title>OpenEXR-1.6.1-83.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-1720" ref_url="https://www.suse.com/security/cve/CVE-2009-1720/" source="CVE"/>
		<reference ref_id="CVE-2009-1721" ref_url="https://www.suse.com/security/cve/CVE-2009-1721/" source="CVE"/>
		<description>
These are all security issues fixed in the OpenEXR-1.6.1-83.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1720/">CVE-2009-1720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1720">CVE-2009-1720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1721/">CVE-2009-1721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1721">CVE-2009-1721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988316" comment="OpenEXR-1.6.1-83.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988317" comment="OpenEXR-32bit-1.6.1-83.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988318" comment="OpenEXR-x86-1.6.1-83.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216189" version="1" class="patch">
	<metadata>
		<title>PackageKit-0.3.14-2.30.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<description>
These are all security issues fixed in the PackageKit-0.3.14-2.30.11 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4311">CVE-2008-4311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990087" comment="PackageKit-0.3.14-2.30.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990088" comment="PackageKit-lang-0.3.14-2.30.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990089" comment="hal-0.5.12-23.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990090" comment="hal-32bit-0.5.12-23.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990091" comment="hal-doc-0.5.12-23.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990092" comment="hal-x86-0.5.12-23.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990093" comment="libpackagekit-glib10-0.3.14-2.30.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216190" version="1" class="patch">
	<metadata>
		<title>PolicyKit-0.9-14.43.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-1658" ref_url="https://www.suse.com/security/cve/CVE-2008-1658/" source="CVE"/>
		<description>
These are all security issues fixed in the PolicyKit-0.9-14.43.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1658/">CVE-2008-1658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1658">CVE-2008-1658 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990094" comment="PolicyKit-0.9-14.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990095" comment="PolicyKit-32bit-0.9-14.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990096" comment="PolicyKit-doc-0.9-14.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990097" comment="PolicyKit-x86-0.9-14.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216191" version="1" class="patch">
	<metadata>
		<title>a2ps-4.13-1326.37.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-0466" ref_url="https://www.suse.com/security/cve/CVE-2014-0466/" source="CVE"/>
		<description>
These are all security issues fixed in the a2ps-4.13-1326.37.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0466/">CVE-2014-0466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0466">CVE-2014-0466 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990098" comment="a2ps-4.13-1326.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216192" version="1" class="patch">
	<metadata>
		<title>aaa_base-11-6.105.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-0461" ref_url="https://www.suse.com/security/cve/CVE-2011-0461/" source="CVE"/>
		<description>
These are all security issues fixed in the aaa_base-11-6.105.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0461/">CVE-2011-0461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0461">CVE-2011-0461 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990099" comment="aaa_base-11-6.105.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216193" version="1" class="patch">
	<metadata>
		<title>acpid-1.0.6-91.25.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0798" ref_url="https://www.suse.com/security/cve/CVE-2009-0798/" source="CVE"/>
		<reference ref_id="CVE-2011-4578" ref_url="https://www.suse.com/security/cve/CVE-2011-4578/" source="CVE"/>
		<description>
These are all security issues fixed in the acpid-1.0.6-91.25.20 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0798/">CVE-2009-0798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0798">CVE-2009-0798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4578/">CVE-2011-4578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4578">CVE-2011-4578 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989518" comment="acpid-1.0.6-91.25.20 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216194" version="1" class="patch">
	<metadata>
		<title>amavisd-new-2.7.0-18.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2005-1349" ref_url="https://www.suse.com/security/cve/CVE-2005-1349/" source="CVE"/>
		<description>
These are all security issues fixed in the amavisd-new-2.7.0-18.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-1349/">CVE-2005-1349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-1349">CVE-2005-1349 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988901" comment="amavisd-new-2.7.0-18.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216195" version="1" class="patch">
	<metadata>
		<title>ant-1.7.1-20.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-2098" ref_url="https://www.suse.com/security/cve/CVE-2012-2098/" source="CVE"/>
		<description>
These are all security issues fixed in the ant-1.7.1-20.11.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2098/">CVE-2012-2098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2098">CVE-2012-2098 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990100" comment="ant-1.7.1-20.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990101" comment="ant-trax-1.7.1-16.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216196" version="1" class="patch">
	<metadata>
		<title>apache2-2.2.12-1.51.52.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2003-1418" ref_url="https://www.suse.com/security/cve/CVE-2003-1418/" source="CVE"/>
		<reference ref_id="CVE-2006-3747" ref_url="https://www.suse.com/security/cve/CVE-2006-3747/" source="CVE"/>
		<reference ref_id="CVE-2006-5752" ref_url="https://www.suse.com/security/cve/CVE-2006-5752/" source="CVE"/>
		<reference ref_id="CVE-2007-1862" ref_url="https://www.suse.com/security/cve/CVE-2007-1862/" source="CVE"/>
		<reference ref_id="CVE-2007-1863" ref_url="https://www.suse.com/security/cve/CVE-2007-1863/" source="CVE"/>
		<reference ref_id="CVE-2007-3304" ref_url="https://www.suse.com/security/cve/CVE-2007-3304/" source="CVE"/>
		<reference ref_id="CVE-2007-3847" ref_url="https://www.suse.com/security/cve/CVE-2007-3847/" source="CVE"/>
		<reference ref_id="CVE-2007-4465" ref_url="https://www.suse.com/security/cve/CVE-2007-4465/" source="CVE"/>
		<reference ref_id="CVE-2007-5000" ref_url="https://www.suse.com/security/cve/CVE-2007-5000/" source="CVE"/>
		<reference ref_id="CVE-2007-6388" ref_url="https://www.suse.com/security/cve/CVE-2007-6388/" source="CVE"/>
		<reference ref_id="CVE-2007-6420" ref_url="https://www.suse.com/security/cve/CVE-2007-6420/" source="CVE"/>
		<reference ref_id="CVE-2007-6421" ref_url="https://www.suse.com/security/cve/CVE-2007-6421/" source="CVE"/>
		<reference ref_id="CVE-2007-6422" ref_url="https://www.suse.com/security/cve/CVE-2007-6422/" source="CVE"/>
		<reference ref_id="CVE-2007-6750" ref_url="https://www.suse.com/security/cve/CVE-2007-6750/" source="CVE"/>
		<reference ref_id="CVE-2008-0005" ref_url="https://www.suse.com/security/cve/CVE-2008-0005/" source="CVE"/>
		<reference ref_id="CVE-2008-1678" ref_url="https://www.suse.com/security/cve/CVE-2008-1678/" source="CVE"/>
		<reference ref_id="CVE-2008-2364" ref_url="https://www.suse.com/security/cve/CVE-2008-2364/" source="CVE"/>
		<reference ref_id="CVE-2008-2939" ref_url="https://www.suse.com/security/cve/CVE-2008-2939/" source="CVE"/>
		<reference ref_id="CVE-2009-1191" ref_url="https://www.suse.com/security/cve/CVE-2009-1191/" source="CVE"/>
		<reference ref_id="CVE-2009-1195" ref_url="https://www.suse.com/security/cve/CVE-2009-1195/" source="CVE"/>
		<reference ref_id="CVE-2009-1890" ref_url="https://www.suse.com/security/cve/CVE-2009-1890/" source="CVE"/>
		<reference ref_id="CVE-2009-1891" ref_url="https://www.suse.com/security/cve/CVE-2009-1891/" source="CVE"/>
		<reference ref_id="CVE-2009-3094" ref_url="https://www.suse.com/security/cve/CVE-2009-3094/" source="CVE"/>
		<reference ref_id="CVE-2009-3095" ref_url="https://www.suse.com/security/cve/CVE-2009-3095/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-0408" ref_url="https://www.suse.com/security/cve/CVE-2010-0408/" source="CVE"/>
		<reference ref_id="CVE-2010-0434" ref_url="https://www.suse.com/security/cve/CVE-2010-0434/" source="CVE"/>
		<reference ref_id="CVE-2010-1452" ref_url="https://www.suse.com/security/cve/CVE-2010-1452/" source="CVE"/>
		<reference ref_id="CVE-2010-2068" ref_url="https://www.suse.com/security/cve/CVE-2010-2068/" source="CVE"/>
		<reference ref_id="CVE-2011-3192" ref_url="https://www.suse.com/security/cve/CVE-2011-3192/" source="CVE"/>
		<reference ref_id="CVE-2011-3348" ref_url="https://www.suse.com/security/cve/CVE-2011-3348/" source="CVE"/>
		<reference ref_id="CVE-2011-3368" ref_url="https://www.suse.com/security/cve/CVE-2011-3368/" source="CVE"/>
		<reference ref_id="CVE-2011-3607" ref_url="https://www.suse.com/security/cve/CVE-2011-3607/" source="CVE"/>
		<reference ref_id="CVE-2011-3639" ref_url="https://www.suse.com/security/cve/CVE-2011-3639/" source="CVE"/>
		<reference ref_id="CVE-2011-4317" ref_url="https://www.suse.com/security/cve/CVE-2011-4317/" source="CVE"/>
		<reference ref_id="CVE-2012-0031" ref_url="https://www.suse.com/security/cve/CVE-2012-0031/" source="CVE"/>
		<reference ref_id="CVE-2012-0053" ref_url="https://www.suse.com/security/cve/CVE-2012-0053/" source="CVE"/>
		<reference ref_id="CVE-2012-0883" ref_url="https://www.suse.com/security/cve/CVE-2012-0883/" source="CVE"/>
		<reference ref_id="CVE-2012-2687" ref_url="https://www.suse.com/security/cve/CVE-2012-2687/" source="CVE"/>
		<reference ref_id="CVE-2012-3499" ref_url="https://www.suse.com/security/cve/CVE-2012-3499/" source="CVE"/>
		<reference ref_id="CVE-2012-4557" ref_url="https://www.suse.com/security/cve/CVE-2012-4557/" source="CVE"/>
		<reference ref_id="CVE-2012-4558" ref_url="https://www.suse.com/security/cve/CVE-2012-4558/" source="CVE"/>
		<reference ref_id="CVE-2013-1862" ref_url="https://www.suse.com/security/cve/CVE-2013-1862/" source="CVE"/>
		<reference ref_id="CVE-2013-1896" ref_url="https://www.suse.com/security/cve/CVE-2013-1896/" source="CVE"/>
		<reference ref_id="CVE-2013-5704" ref_url="https://www.suse.com/security/cve/CVE-2013-5704/" source="CVE"/>
		<reference ref_id="CVE-2013-6438" ref_url="https://www.suse.com/security/cve/CVE-2013-6438/" source="CVE"/>
		<reference ref_id="CVE-2014-0098" ref_url="https://www.suse.com/security/cve/CVE-2014-0098/" source="CVE"/>
		<reference ref_id="CVE-2014-0226" ref_url="https://www.suse.com/security/cve/CVE-2014-0226/" source="CVE"/>
		<reference ref_id="CVE-2014-0231" ref_url="https://www.suse.com/security/cve/CVE-2014-0231/" source="CVE"/>
		<reference ref_id="CVE-2014-3581" ref_url="https://www.suse.com/security/cve/CVE-2014-3581/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-2.2.12-1.51.52.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2003-1418/">CVE-2003-1418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2003-1418">CVE-2003-1418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3747/">CVE-2006-3747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3747">CVE-2006-3747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5752/">CVE-2006-5752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5752">CVE-2006-5752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1862/">CVE-2007-1862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1862">CVE-2007-1862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1863/">CVE-2007-1863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1863">CVE-2007-1863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3304/">CVE-2007-3304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3304">CVE-2007-3304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3847/">CVE-2007-3847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3847">CVE-2007-3847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4465/">CVE-2007-4465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4465">CVE-2007-4465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5000/">CVE-2007-5000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5000">CVE-2007-5000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6388/">CVE-2007-6388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6388">CVE-2007-6388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6420/">CVE-2007-6420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6420">CVE-2007-6420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6421/">CVE-2007-6421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6421">CVE-2007-6421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6422/">CVE-2007-6422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6422">CVE-2007-6422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6750/">CVE-2007-6750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6750">CVE-2007-6750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0005/">CVE-2008-0005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0005">CVE-2008-0005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1678/">CVE-2008-1678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1678">CVE-2008-1678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2364/">CVE-2008-2364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2364">CVE-2008-2364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2939/">CVE-2008-2939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2939">CVE-2008-2939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1191/">CVE-2009-1191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1191">CVE-2009-1191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1195/">CVE-2009-1195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1195">CVE-2009-1195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1890/">CVE-2009-1890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1890">CVE-2009-1890 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1891/">CVE-2009-1891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1891">CVE-2009-1891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3094/">CVE-2009-3094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3094">CVE-2009-3094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3095/">CVE-2009-3095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3095">CVE-2009-3095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0408/">CVE-2010-0408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0408">CVE-2010-0408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0434/">CVE-2010-0434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0434">CVE-2010-0434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1452/">CVE-2010-1452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1452">CVE-2010-1452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2068/">CVE-2010-2068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2068">CVE-2010-2068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3192/">CVE-2011-3192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3192">CVE-2011-3192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3348/">CVE-2011-3348 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3348">CVE-2011-3348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3368/">CVE-2011-3368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3368">CVE-2011-3368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3607/">CVE-2011-3607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3607">CVE-2011-3607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3639/">CVE-2011-3639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3639">CVE-2011-3639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4317/">CVE-2011-4317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4317">CVE-2011-4317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0031/">CVE-2012-0031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0031">CVE-2012-0031 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0053/">CVE-2012-0053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0053">CVE-2012-0053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0883/">CVE-2012-0883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0883">CVE-2012-0883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2687/">CVE-2012-2687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2687">CVE-2012-2687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3499/">CVE-2012-3499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3499">CVE-2012-3499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4557/">CVE-2012-4557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4557">CVE-2012-4557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4558/">CVE-2012-4558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4558">CVE-2012-4558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1862/">CVE-2013-1862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1862">CVE-2013-1862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1896/">CVE-2013-1896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1896">CVE-2013-1896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5704/">CVE-2013-5704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5704">CVE-2013-5704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6438/">CVE-2013-6438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6438">CVE-2013-6438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0098/">CVE-2014-0098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0098">CVE-2014-0098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0226/">CVE-2014-0226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0226">CVE-2014-0226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0231/">CVE-2014-0231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0231">CVE-2014-0231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3581/">CVE-2014-3581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3581">CVE-2014-3581 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990102" comment="apache2-2.2.12-1.51.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990103" comment="apache2-doc-2.2.12-1.51.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990104" comment="apache2-example-pages-2.2.12-1.51.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990105" comment="apache2-prefork-2.2.12-1.51.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990106" comment="apache2-utils-2.2.12-1.51.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990107" comment="apache2-worker-2.2.12-1.51.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216197" version="1" class="patch">
	<metadata>
		<title>apache2-mod_jk-1.2.40-0.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-0774" ref_url="https://www.suse.com/security/cve/CVE-2007-0774/" source="CVE"/>
		<reference ref_id="CVE-2008-5519" ref_url="https://www.suse.com/security/cve/CVE-2008-5519/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_jk-1.2.40-0.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0774/">CVE-2007-0774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0774">CVE-2007-0774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5519/">CVE-2008-5519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5519">CVE-2008-5519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990108" comment="apache2-mod_jk-1.2.40-0.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216198" version="1" class="patch">
	<metadata>
		<title>apache2-mod_nss-1.0.8-0.4.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-4566" ref_url="https://www.suse.com/security/cve/CVE-2013-4566/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_nss-1.0.8-0.4.13.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4566/">CVE-2013-4566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4566">CVE-2013-4566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990109" comment="apache2-mod_nss-1.0.8-0.4.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216199" version="1" class="patch">
	<metadata>
		<title>apache2-mod_perl-2.0.4-40.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-1349" ref_url="https://www.suse.com/security/cve/CVE-2007-1349/" source="CVE"/>
		<reference ref_id="CVE-2013-1667" ref_url="https://www.suse.com/security/cve/CVE-2013-1667/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_perl-2.0.4-40.24.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1349/">CVE-2007-1349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1349">CVE-2007-1349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1667/">CVE-2013-1667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1667">CVE-2013-1667 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990110" comment="apache2-mod_perl-2.0.4-40.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216200" version="1" class="patch">
	<metadata>
		<title>apache2-mod_php53-5.3.17-0.41.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-7243" ref_url="https://www.suse.com/security/cve/CVE-2006-7243/" source="CVE"/>
		<reference ref_id="CVE-2007-4783" ref_url="https://www.suse.com/security/cve/CVE-2007-4783/" source="CVE"/>
		<reference ref_id="CVE-2007-4840" ref_url="https://www.suse.com/security/cve/CVE-2007-4840/" source="CVE"/>
		<reference ref_id="CVE-2007-4887" ref_url="https://www.suse.com/security/cve/CVE-2007-4887/" source="CVE"/>
		<reference ref_id="CVE-2008-0599" ref_url="https://www.suse.com/security/cve/CVE-2008-0599/" source="CVE"/>
		<reference ref_id="CVE-2010-2225" ref_url="https://www.suse.com/security/cve/CVE-2010-2225/" source="CVE"/>
		<reference ref_id="CVE-2010-2950" ref_url="https://www.suse.com/security/cve/CVE-2010-2950/" source="CVE"/>
		<reference ref_id="CVE-2010-3436" ref_url="https://www.suse.com/security/cve/CVE-2010-3436/" source="CVE"/>
		<reference ref_id="CVE-2010-3709" ref_url="https://www.suse.com/security/cve/CVE-2010-3709/" source="CVE"/>
		<reference ref_id="CVE-2010-3710" ref_url="https://www.suse.com/security/cve/CVE-2010-3710/" source="CVE"/>
		<reference ref_id="CVE-2010-4150" ref_url="https://www.suse.com/security/cve/CVE-2010-4150/" source="CVE"/>
		<reference ref_id="CVE-2010-4645" ref_url="https://www.suse.com/security/cve/CVE-2010-4645/" source="CVE"/>
		<reference ref_id="CVE-2011-0420" ref_url="https://www.suse.com/security/cve/CVE-2011-0420/" source="CVE"/>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<reference ref_id="CVE-2011-0708" ref_url="https://www.suse.com/security/cve/CVE-2011-0708/" source="CVE"/>
		<reference ref_id="CVE-2011-1092" ref_url="https://www.suse.com/security/cve/CVE-2011-1092/" source="CVE"/>
		<reference ref_id="CVE-2011-1153" ref_url="https://www.suse.com/security/cve/CVE-2011-1153/" source="CVE"/>
		<reference ref_id="CVE-2011-1398" ref_url="https://www.suse.com/security/cve/CVE-2011-1398/" source="CVE"/>
		<reference ref_id="CVE-2011-1466" ref_url="https://www.suse.com/security/cve/CVE-2011-1466/" source="CVE"/>
		<reference ref_id="CVE-2011-2202" ref_url="https://www.suse.com/security/cve/CVE-2011-2202/" source="CVE"/>
		<reference ref_id="CVE-2011-3379" ref_url="https://www.suse.com/security/cve/CVE-2011-3379/" source="CVE"/>
		<reference ref_id="CVE-2011-4153" ref_url="https://www.suse.com/security/cve/CVE-2011-4153/" source="CVE"/>
		<reference ref_id="CVE-2011-4388" ref_url="https://www.suse.com/security/cve/CVE-2011-4388/" source="CVE"/>
		<reference ref_id="CVE-2011-4566" ref_url="https://www.suse.com/security/cve/CVE-2011-4566/" source="CVE"/>
		<reference ref_id="CVE-2011-4885" ref_url="https://www.suse.com/security/cve/CVE-2011-4885/" source="CVE"/>
		<reference ref_id="CVE-2012-0057" ref_url="https://www.suse.com/security/cve/CVE-2012-0057/" source="CVE"/>
		<reference ref_id="CVE-2012-0781" ref_url="https://www.suse.com/security/cve/CVE-2012-0781/" source="CVE"/>
		<reference ref_id="CVE-2012-0788" ref_url="https://www.suse.com/security/cve/CVE-2012-0788/" source="CVE"/>
		<reference ref_id="CVE-2012-0789" ref_url="https://www.suse.com/security/cve/CVE-2012-0789/" source="CVE"/>
		<reference ref_id="CVE-2012-0807" ref_url="https://www.suse.com/security/cve/CVE-2012-0807/" source="CVE"/>
		<reference ref_id="CVE-2012-0830" ref_url="https://www.suse.com/security/cve/CVE-2012-0830/" source="CVE"/>
		<reference ref_id="CVE-2012-0831" ref_url="https://www.suse.com/security/cve/CVE-2012-0831/" source="CVE"/>
		<reference ref_id="CVE-2012-1172" ref_url="https://www.suse.com/security/cve/CVE-2012-1172/" source="CVE"/>
		<reference ref_id="CVE-2012-1823" ref_url="https://www.suse.com/security/cve/CVE-2012-1823/" source="CVE"/>
		<reference ref_id="CVE-2012-2143" ref_url="https://www.suse.com/security/cve/CVE-2012-2143/" source="CVE"/>
		<reference ref_id="CVE-2012-2311" ref_url="https://www.suse.com/security/cve/CVE-2012-2311/" source="CVE"/>
		<reference ref_id="CVE-2012-2335" ref_url="https://www.suse.com/security/cve/CVE-2012-2335/" source="CVE"/>
		<reference ref_id="CVE-2012-2336" ref_url="https://www.suse.com/security/cve/CVE-2012-2336/" source="CVE"/>
		<reference ref_id="CVE-2012-2386" ref_url="https://www.suse.com/security/cve/CVE-2012-2386/" source="CVE"/>
		<reference ref_id="CVE-2012-2688" ref_url="https://www.suse.com/security/cve/CVE-2012-2688/" source="CVE"/>
		<reference ref_id="CVE-2012-3365" ref_url="https://www.suse.com/security/cve/CVE-2012-3365/" source="CVE"/>
		<reference ref_id="CVE-2013-1635" ref_url="https://www.suse.com/security/cve/CVE-2013-1635/" source="CVE"/>
		<reference ref_id="CVE-2013-1643" ref_url="https://www.suse.com/security/cve/CVE-2013-1643/" source="CVE"/>
		<reference ref_id="CVE-2013-4113" ref_url="https://www.suse.com/security/cve/CVE-2013-4113/" source="CVE"/>
		<reference ref_id="CVE-2013-4248" ref_url="https://www.suse.com/security/cve/CVE-2013-4248/" source="CVE"/>
		<reference ref_id="CVE-2013-4635" ref_url="https://www.suse.com/security/cve/CVE-2013-4635/" source="CVE"/>
		<reference ref_id="CVE-2013-6420" ref_url="https://www.suse.com/security/cve/CVE-2013-6420/" source="CVE"/>
		<reference ref_id="CVE-2013-6712" ref_url="https://www.suse.com/security/cve/CVE-2013-6712/" source="CVE"/>
		<reference ref_id="CVE-2014-0207" ref_url="https://www.suse.com/security/cve/CVE-2014-0207/" source="CVE"/>
		<reference ref_id="CVE-2014-0237" ref_url="https://www.suse.com/security/cve/CVE-2014-0237/" source="CVE"/>
		<reference ref_id="CVE-2014-0238" ref_url="https://www.suse.com/security/cve/CVE-2014-0238/" source="CVE"/>
		<reference ref_id="CVE-2014-2497" ref_url="https://www.suse.com/security/cve/CVE-2014-2497/" source="CVE"/>
		<reference ref_id="CVE-2014-3478" ref_url="https://www.suse.com/security/cve/CVE-2014-3478/" source="CVE"/>
		<reference ref_id="CVE-2014-3479" ref_url="https://www.suse.com/security/cve/CVE-2014-3479/" source="CVE"/>
		<reference ref_id="CVE-2014-3480" ref_url="https://www.suse.com/security/cve/CVE-2014-3480/" source="CVE"/>
		<reference ref_id="CVE-2014-3487" ref_url="https://www.suse.com/security/cve/CVE-2014-3487/" source="CVE"/>
		<reference ref_id="CVE-2014-3515" ref_url="https://www.suse.com/security/cve/CVE-2014-3515/" source="CVE"/>
		<reference ref_id="CVE-2014-3597" ref_url="https://www.suse.com/security/cve/CVE-2014-3597/" source="CVE"/>
		<reference ref_id="CVE-2014-3668" ref_url="https://www.suse.com/security/cve/CVE-2014-3668/" source="CVE"/>
		<reference ref_id="CVE-2014-3669" ref_url="https://www.suse.com/security/cve/CVE-2014-3669/" source="CVE"/>
		<reference ref_id="CVE-2014-3670" ref_url="https://www.suse.com/security/cve/CVE-2014-3670/" source="CVE"/>
		<reference ref_id="CVE-2014-4049" ref_url="https://www.suse.com/security/cve/CVE-2014-4049/" source="CVE"/>
		<reference ref_id="CVE-2014-4670" ref_url="https://www.suse.com/security/cve/CVE-2014-4670/" source="CVE"/>
		<reference ref_id="CVE-2014-4698" ref_url="https://www.suse.com/security/cve/CVE-2014-4698/" source="CVE"/>
		<reference ref_id="CVE-2014-4721" ref_url="https://www.suse.com/security/cve/CVE-2014-4721/" source="CVE"/>
		<reference ref_id="CVE-2014-5459" ref_url="https://www.suse.com/security/cve/CVE-2014-5459/" source="CVE"/>
		<reference ref_id="CVE-2014-8142" ref_url="https://www.suse.com/security/cve/CVE-2014-8142/" source="CVE"/>
		<reference ref_id="CVE-2014-9652" ref_url="https://www.suse.com/security/cve/CVE-2014-9652/" source="CVE"/>
		<reference ref_id="CVE-2014-9705" ref_url="https://www.suse.com/security/cve/CVE-2014-9705/" source="CVE"/>
		<reference ref_id="CVE-2014-9709" ref_url="https://www.suse.com/security/cve/CVE-2014-9709/" source="CVE"/>
		<reference ref_id="CVE-2015-0231" ref_url="https://www.suse.com/security/cve/CVE-2015-0231/" source="CVE"/>
		<reference ref_id="CVE-2015-0232" ref_url="https://www.suse.com/security/cve/CVE-2015-0232/" source="CVE"/>
		<reference ref_id="CVE-2015-0273" ref_url="https://www.suse.com/security/cve/CVE-2015-0273/" source="CVE"/>
		<reference ref_id="CVE-2015-2301" ref_url="https://www.suse.com/security/cve/CVE-2015-2301/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2783" ref_url="https://www.suse.com/security/cve/CVE-2015-2783/" source="CVE"/>
		<reference ref_id="CVE-2015-2787" ref_url="https://www.suse.com/security/cve/CVE-2015-2787/" source="CVE"/>
		<reference ref_id="CVE-2015-3329" ref_url="https://www.suse.com/security/cve/CVE-2015-3329/" source="CVE"/>
		<reference ref_id="CVE-2015-4021" ref_url="https://www.suse.com/security/cve/CVE-2015-4021/" source="CVE"/>
		<reference ref_id="CVE-2015-4022" ref_url="https://www.suse.com/security/cve/CVE-2015-4022/" source="CVE"/>
		<reference ref_id="CVE-2015-4024" ref_url="https://www.suse.com/security/cve/CVE-2015-4024/" source="CVE"/>
		<reference ref_id="CVE-2015-4026" ref_url="https://www.suse.com/security/cve/CVE-2015-4026/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_php53-5.3.17-0.41.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-7243/">CVE-2006-7243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-7243">CVE-2006-7243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4783/">CVE-2007-4783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4783">CVE-2007-4783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4840/">CVE-2007-4840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4840">CVE-2007-4840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4887/">CVE-2007-4887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4887">CVE-2007-4887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0599/">CVE-2008-0599 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2008-0599">CVE-2008-0599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2225/">CVE-2010-2225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2225">CVE-2010-2225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2950/">CVE-2010-2950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2950">CVE-2010-2950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3436/">CVE-2010-3436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3436">CVE-2010-3436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3709/">CVE-2010-3709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3709">CVE-2010-3709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3710/">CVE-2010-3710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3710">CVE-2010-3710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4150/">CVE-2010-4150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4150">CVE-2010-4150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4645/">CVE-2010-4645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4645">CVE-2010-4645 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0420/">CVE-2011-0420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0420">CVE-2011-0420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0421">CVE-2011-0421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0708/">CVE-2011-0708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0708">CVE-2011-0708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1092/">CVE-2011-1092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1092">CVE-2011-1092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1153/">CVE-2011-1153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1153">CVE-2011-1153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1398/">CVE-2011-1398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1398">CVE-2011-1398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1466/">CVE-2011-1466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1466">CVE-2011-1466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2202/">CVE-2011-2202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2202">CVE-2011-2202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3379/">CVE-2011-3379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3379">CVE-2011-3379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4153/">CVE-2011-4153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4153">CVE-2011-4153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4388/">CVE-2011-4388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4388">CVE-2011-4388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4566/">CVE-2011-4566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4566">CVE-2011-4566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4885/">CVE-2011-4885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4885">CVE-2011-4885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0057/">CVE-2012-0057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0057">CVE-2012-0057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0781/">CVE-2012-0781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0781">CVE-2012-0781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0788/">CVE-2012-0788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0788">CVE-2012-0788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0789/">CVE-2012-0789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0789">CVE-2012-0789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0807/">CVE-2012-0807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0807">CVE-2012-0807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0830/">CVE-2012-0830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0830">CVE-2012-0830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0831/">CVE-2012-0831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0831">CVE-2012-0831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1172/">CVE-2012-1172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1172">CVE-2012-1172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1823/">CVE-2012-1823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1823">CVE-2012-1823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2143/">CVE-2012-2143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2143">CVE-2012-2143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2311/">CVE-2012-2311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2311">CVE-2012-2311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2335/">CVE-2012-2335 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2335">CVE-2012-2335 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2336/">CVE-2012-2336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2336">CVE-2012-2336 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2386/">CVE-2012-2386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2386">CVE-2012-2386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2688/">CVE-2012-2688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2688">CVE-2012-2688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3365/">CVE-2012-3365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3365">CVE-2012-3365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1635/">CVE-2013-1635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1635">CVE-2013-1635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1643/">CVE-2013-1643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1643">CVE-2013-1643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4113/">CVE-2013-4113 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4113">CVE-2013-4113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4248/">CVE-2013-4248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4248">CVE-2013-4248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4635/">CVE-2013-4635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4635">CVE-2013-4635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6420/">CVE-2013-6420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6420">CVE-2013-6420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6712/">CVE-2013-6712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6712">CVE-2013-6712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0207/">CVE-2014-0207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0207">CVE-2014-0207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0237/">CVE-2014-0237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0237">CVE-2014-0237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0238/">CVE-2014-0238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0238">CVE-2014-0238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2497/">CVE-2014-2497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2497">CVE-2014-2497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3478/">CVE-2014-3478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3478">CVE-2014-3478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3479/">CVE-2014-3479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3479">CVE-2014-3479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3480/">CVE-2014-3480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3480">CVE-2014-3480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3487/">CVE-2014-3487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3487">CVE-2014-3487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3515/">CVE-2014-3515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3515">CVE-2014-3515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3597/">CVE-2014-3597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3597">CVE-2014-3597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3668/">CVE-2014-3668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3668">CVE-2014-3668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3669/">CVE-2014-3669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3669">CVE-2014-3669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3670/">CVE-2014-3670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3670">CVE-2014-3670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4049/">CVE-2014-4049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4049">CVE-2014-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4670/">CVE-2014-4670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4670">CVE-2014-4670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4698/">CVE-2014-4698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4698">CVE-2014-4698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4721/">CVE-2014-4721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4721">CVE-2014-4721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5459/">CVE-2014-5459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5459">CVE-2014-5459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8142/">CVE-2014-8142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8142">CVE-2014-8142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9652/">CVE-2014-9652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9652">CVE-2014-9652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9705/">CVE-2014-9705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9705">CVE-2014-9705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9709/">CVE-2014-9709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9709">CVE-2014-9709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0231/">CVE-2015-0231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0231">CVE-2015-0231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0232/">CVE-2015-0232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0232">CVE-2015-0232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0273/">CVE-2015-0273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0273">CVE-2015-0273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2301/">CVE-2015-2301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2301">CVE-2015-2301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2305">CVE-2015-2305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2783/">CVE-2015-2783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2783">CVE-2015-2783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2787/">CVE-2015-2787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2787">CVE-2015-2787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3329/">CVE-2015-3329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3329">CVE-2015-3329 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4021/">CVE-2015-4021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4021">CVE-2015-4021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4022/">CVE-2015-4022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4022">CVE-2015-4022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4024/">CVE-2015-4024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4024">CVE-2015-4024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4026/">CVE-2015-4026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4026">CVE-2015-4026 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990111" comment="apache2-mod_php53-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990112" comment="php53-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990113" comment="php53-bcmath-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990114" comment="php53-bz2-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990115" comment="php53-calendar-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990116" comment="php53-ctype-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990117" comment="php53-curl-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990118" comment="php53-dba-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990119" comment="php53-dom-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990120" comment="php53-exif-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990121" comment="php53-fastcgi-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990122" comment="php53-fileinfo-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990123" comment="php53-ftp-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990124" comment="php53-gd-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990125" comment="php53-gettext-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990126" comment="php53-gmp-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990127" comment="php53-iconv-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990128" comment="php53-intl-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990129" comment="php53-json-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990130" comment="php53-ldap-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990131" comment="php53-mbstring-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990132" comment="php53-mcrypt-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990133" comment="php53-mysql-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990134" comment="php53-odbc-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990135" comment="php53-openssl-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990136" comment="php53-pcntl-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990137" comment="php53-pdo-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990138" comment="php53-pear-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990139" comment="php53-pgsql-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990140" comment="php53-pspell-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990141" comment="php53-shmop-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990142" comment="php53-snmp-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990143" comment="php53-soap-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990144" comment="php53-suhosin-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990145" comment="php53-sysvmsg-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990146" comment="php53-sysvsem-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990147" comment="php53-sysvshm-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990148" comment="php53-tokenizer-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990149" comment="php53-wddx-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990150" comment="php53-xmlreader-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990151" comment="php53-xmlrpc-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990152" comment="php53-xmlwriter-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990153" comment="php53-xsl-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990154" comment="php53-zip-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990155" comment="php53-zlib-5.3.17-0.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216201" version="1" class="patch">
	<metadata>
		<title>apache2-mod_security2-2.7.1-0.2.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-5031" ref_url="https://www.suse.com/security/cve/CVE-2009-5031/" source="CVE"/>
		<reference ref_id="CVE-2012-2751" ref_url="https://www.suse.com/security/cve/CVE-2012-2751/" source="CVE"/>
		<reference ref_id="CVE-2012-4528" ref_url="https://www.suse.com/security/cve/CVE-2012-4528/" source="CVE"/>
		<reference ref_id="CVE-2013-1915" ref_url="https://www.suse.com/security/cve/CVE-2013-1915/" source="CVE"/>
		<reference ref_id="CVE-2013-2765" ref_url="https://www.suse.com/security/cve/CVE-2013-2765/" source="CVE"/>
		<reference ref_id="CVE-2013-5705" ref_url="https://www.suse.com/security/cve/CVE-2013-5705/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_security2-2.7.1-0.2.18.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5031/">CVE-2009-5031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5031">CVE-2009-5031 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2751/">CVE-2012-2751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2751">CVE-2012-2751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4528/">CVE-2012-4528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4528">CVE-2012-4528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1915/">CVE-2013-1915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1915">CVE-2013-1915 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2765/">CVE-2013-2765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2765">CVE-2013-2765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5705/">CVE-2013-5705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5705">CVE-2013-5705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990156" comment="apache2-mod_security2-2.7.1-0.2.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216202" version="1" class="patch">
	<metadata>
		<title>ark-4.3.5-0.3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-2725" ref_url="https://www.suse.com/security/cve/CVE-2011-2725/" source="CVE"/>
		<description>
These are all security issues fixed in the ark-4.3.5-0.3.3 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2725/">CVE-2011-2725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2725">CVE-2011-2725 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989573" comment="ark-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989574" comment="kcalc-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989575" comment="kcharselect-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989576" comment="kdessh-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989577" comment="kdf-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989578" comment="kfloppy-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989579" comment="kgpg-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989580" comment="ktimer-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989581" comment="kwalletmanager-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989582" comment="kwikdisk-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989583" comment="okteta-4.3.5-0.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216203" version="1" class="patch">
	<metadata>
		<title>augeas-0.9.0-3.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-0786" ref_url="https://www.suse.com/security/cve/CVE-2012-0786/" source="CVE"/>
		<reference ref_id="CVE-2013-6412" ref_url="https://www.suse.com/security/cve/CVE-2013-6412/" source="CVE"/>
		<description>
These are all security issues fixed in the augeas-0.9.0-3.15.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0786/">CVE-2012-0786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0786">CVE-2012-0786 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6412/">CVE-2013-6412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6412">CVE-2013-6412 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990157" comment="augeas-0.9.0-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990158" comment="augeas-lenses-0.9.0-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990159" comment="libaugeas0-0.9.0-3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216204" version="1" class="patch">
	<metadata>
		<title>automake-1.10.1-4.131.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-4029" ref_url="https://www.suse.com/security/cve/CVE-2009-4029/" source="CVE"/>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<description>
These are all security issues fixed in the automake-1.10.1-4.131.9.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4029/">CVE-2009-4029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4029">CVE-2009-4029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3386">CVE-2012-3386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990160" comment="automake-1.10.1-4.131.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216205" version="1" class="patch">
	<metadata>
		<title>avahi-0.6.23-11.32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-5461" ref_url="https://www.suse.com/security/cve/CVE-2006-5461/" source="CVE"/>
		<reference ref_id="CVE-2006-6870" ref_url="https://www.suse.com/security/cve/CVE-2006-6870/" source="CVE"/>
		<reference ref_id="CVE-2007-3372" ref_url="https://www.suse.com/security/cve/CVE-2007-3372/" source="CVE"/>
		<reference ref_id="CVE-2008-5081" ref_url="https://www.suse.com/security/cve/CVE-2008-5081/" source="CVE"/>
		<reference ref_id="CVE-2009-0758" ref_url="https://www.suse.com/security/cve/CVE-2009-0758/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-0.6.23-11.32.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5461/">CVE-2006-5461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5461">CVE-2006-5461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6870/">CVE-2006-6870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6870">CVE-2006-6870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3372/">CVE-2007-3372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3372">CVE-2007-3372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5081/">CVE-2008-5081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5081">CVE-2008-5081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0758/">CVE-2009-0758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0758">CVE-2009-0758 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990161" comment="avahi-0.6.23-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990162" comment="avahi-lang-0.6.23-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990163" comment="avahi-utils-0.6.23-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990164" comment="libavahi-client3-0.6.23-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990165" comment="libavahi-client3-32bit-0.6.23-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990166" comment="libavahi-client3-x86-0.6.23-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990167" comment="libavahi-common3-0.6.23-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990168" comment="libavahi-common3-32bit-0.6.23-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990169" comment="libavahi-common3-x86-0.6.23-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990170" comment="libavahi-core5-0.6.23-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990171" comment="libdns_sd-0.6.23-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990172" comment="libdns_sd-32bit-0.6.23-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990173" comment="libdns_sd-x86-0.6.23-11.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216206" version="1" class="patch">
	<metadata>
		<title>bash-3.2-147.27.35 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-6271" ref_url="https://www.suse.com/security/cve/CVE-2014-6271/" source="CVE"/>
		<reference ref_id="CVE-2014-6277" ref_url="https://www.suse.com/security/cve/CVE-2014-6277/" source="CVE"/>
		<reference ref_id="CVE-2014-6278" ref_url="https://www.suse.com/security/cve/CVE-2014-6278/" source="CVE"/>
		<reference ref_id="CVE-2014-7169" ref_url="https://www.suse.com/security/cve/CVE-2014-7169/" source="CVE"/>
		<reference ref_id="CVE-2014-7186" ref_url="https://www.suse.com/security/cve/CVE-2014-7186/" source="CVE"/>
		<reference ref_id="CVE-2014-7187" ref_url="https://www.suse.com/security/cve/CVE-2014-7187/" source="CVE"/>
		<description>
These are all security issues fixed in the bash-3.2-147.27.35 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6271/">CVE-2014-6271 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-6271">CVE-2014-6271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6277/">CVE-2014-6277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6277">CVE-2014-6277 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6278/">CVE-2014-6278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6278">CVE-2014-6278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7169/">CVE-2014-7169 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7169">CVE-2014-7169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7186/">CVE-2014-7186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7186">CVE-2014-7186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7187/">CVE-2014-7187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7187">CVE-2014-7187 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990174" comment="bash-3.2-147.27.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990175" comment="bash-doc-3.2-147.27.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990176" comment="bash-x86-3.2-147.27.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990177" comment="libreadline5-5.2-147.27.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990178" comment="libreadline5-32bit-5.2-147.27.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990179" comment="libreadline5-x86-5.2-147.27.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990180" comment="readline-doc-5.2-147.27.35 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216207" version="1" class="patch">
	<metadata>
		<title>bind-9.9.6P1-0.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2007-2925" ref_url="https://www.suse.com/security/cve/CVE-2007-2925/" source="CVE"/>
		<reference ref_id="CVE-2007-2926" ref_url="https://www.suse.com/security/cve/CVE-2007-2926/" source="CVE"/>
		<reference ref_id="CVE-2009-0696" ref_url="https://www.suse.com/security/cve/CVE-2009-0696/" source="CVE"/>
		<reference ref_id="CVE-2009-4022" ref_url="https://www.suse.com/security/cve/CVE-2009-4022/" source="CVE"/>
		<reference ref_id="CVE-2011-1910" ref_url="https://www.suse.com/security/cve/CVE-2011-1910/" source="CVE"/>
		<reference ref_id="CVE-2011-2464" ref_url="https://www.suse.com/security/cve/CVE-2011-2464/" source="CVE"/>
		<reference ref_id="CVE-2011-4313" ref_url="https://www.suse.com/security/cve/CVE-2011-4313/" source="CVE"/>
		<reference ref_id="CVE-2012-1667" ref_url="https://www.suse.com/security/cve/CVE-2012-1667/" source="CVE"/>
		<reference ref_id="CVE-2012-3817" ref_url="https://www.suse.com/security/cve/CVE-2012-3817/" source="CVE"/>
		<reference ref_id="CVE-2012-4244" ref_url="https://www.suse.com/security/cve/CVE-2012-4244/" source="CVE"/>
		<reference ref_id="CVE-2012-5166" ref_url="https://www.suse.com/security/cve/CVE-2012-5166/" source="CVE"/>
		<reference ref_id="CVE-2013-4854" ref_url="https://www.suse.com/security/cve/CVE-2013-4854/" source="CVE"/>
		<reference ref_id="CVE-2014-0591" ref_url="https://www.suse.com/security/cve/CVE-2014-0591/" source="CVE"/>
		<reference ref_id="CVE-2014-8500" ref_url="https://www.suse.com/security/cve/CVE-2014-8500/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.9.6P1-0.5.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4339">CVE-2006-4339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2925/">CVE-2007-2925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2925">CVE-2007-2925 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2926/">CVE-2007-2926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2926">CVE-2007-2926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0696/">CVE-2009-0696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0696">CVE-2009-0696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4022/">CVE-2009-4022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4022">CVE-2009-4022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1910/">CVE-2011-1910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1910">CVE-2011-1910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2464/">CVE-2011-2464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2464">CVE-2011-2464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4313/">CVE-2011-4313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4313">CVE-2011-4313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1667/">CVE-2012-1667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1667">CVE-2012-1667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3817/">CVE-2012-3817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3817">CVE-2012-3817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4244/">CVE-2012-4244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4244">CVE-2012-4244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5166/">CVE-2012-5166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5166">CVE-2012-5166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4854/">CVE-2013-4854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4854">CVE-2013-4854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0591/">CVE-2014-0591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0591">CVE-2014-0591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8500/">CVE-2014-8500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8500">CVE-2014-8500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990181" comment="bind-9.9.6P1-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990182" comment="bind-chrootenv-9.9.6P1-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990183" comment="bind-doc-9.9.6P1-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990184" comment="bind-libs-9.9.6P1-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990185" comment="bind-libs-32bit-9.9.6P1-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990186" comment="bind-libs-x86-9.9.6P1-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990187" comment="bind-utils-9.9.6P1-0.5.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216208" version="1" class="patch">
	<metadata>
		<title>binutils-2.24-3.62 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-8484" ref_url="https://www.suse.com/security/cve/CVE-2014-8484/" source="CVE"/>
		<reference ref_id="CVE-2014-8485" ref_url="https://www.suse.com/security/cve/CVE-2014-8485/" source="CVE"/>
		<reference ref_id="CVE-2014-8501" ref_url="https://www.suse.com/security/cve/CVE-2014-8501/" source="CVE"/>
		<reference ref_id="CVE-2014-8502" ref_url="https://www.suse.com/security/cve/CVE-2014-8502/" source="CVE"/>
		<reference ref_id="CVE-2014-8503" ref_url="https://www.suse.com/security/cve/CVE-2014-8503/" source="CVE"/>
		<reference ref_id="CVE-2014-8504" ref_url="https://www.suse.com/security/cve/CVE-2014-8504/" source="CVE"/>
		<reference ref_id="CVE-2014-8737" ref_url="https://www.suse.com/security/cve/CVE-2014-8737/" source="CVE"/>
		<reference ref_id="CVE-2014-8738" ref_url="https://www.suse.com/security/cve/CVE-2014-8738/" source="CVE"/>
		<description>
These are all security issues fixed in the binutils-2.24-3.62 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8484/">CVE-2014-8484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8484">CVE-2014-8484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8485/">CVE-2014-8485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8485">CVE-2014-8485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8501/">CVE-2014-8501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8501">CVE-2014-8501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8502/">CVE-2014-8502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8502">CVE-2014-8502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8503/">CVE-2014-8503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8503">CVE-2014-8503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8504/">CVE-2014-8504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8504">CVE-2014-8504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8737/">CVE-2014-8737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8737">CVE-2014-8737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8738/">CVE-2014-8738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8738">CVE-2014-8738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990188" comment="binutils-2.24-3.62 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216209" version="1" class="patch">
	<metadata>
		<title>boost-license-1.36.0-12.6.49 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-0171" ref_url="https://www.suse.com/security/cve/CVE-2008-0171/" source="CVE"/>
		<description>
These are all security issues fixed in the boost-license-1.36.0-12.6.49 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0171/">CVE-2008-0171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0171">CVE-2008-0171 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990189" comment="boost-license-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990190" comment="boost-license1_49_0-1.49.0-0.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990191" comment="libboost_program_options1_36_0-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990192" comment="libboost_regex1_36_0-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990193" comment="libboost_signals1_36_0-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990194" comment="libboost_system1_49_0-1.49.0-0.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990195" comment="libboost_thread1_36_0-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990196" comment="libboost_thread1_49_0-1.49.0-0.13.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216210" version="1" class="patch">
	<metadata>
		<title>bzip2-1.0.5-34.253.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-1372" ref_url="https://www.suse.com/security/cve/CVE-2008-1372/" source="CVE"/>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<description>
These are all security issues fixed in the bzip2-1.0.5-34.253.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1372/">CVE-2008-1372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1372">CVE-2008-1372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0405">CVE-2010-0405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989006" comment="bzip2-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989007" comment="bzip2-doc-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989008" comment="libbz2-1-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989009" comment="libbz2-1-32bit-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989010" comment="libbz2-1-x86-1.0.5-34.253.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216211" version="1" class="patch">
	<metadata>
		<title>cifs-utils-5.1-0.14.46 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-3403" ref_url="https://www.suse.com/security/cve/CVE-2006-3403/" source="CVE"/>
		<reference ref_id="CVE-2007-0452" ref_url="https://www.suse.com/security/cve/CVE-2007-0452/" source="CVE"/>
		<reference ref_id="CVE-2007-2444" ref_url="https://www.suse.com/security/cve/CVE-2007-2444/" source="CVE"/>
		<reference ref_id="CVE-2007-2446" ref_url="https://www.suse.com/security/cve/CVE-2007-2446/" source="CVE"/>
		<reference ref_id="CVE-2007-2447" ref_url="https://www.suse.com/security/cve/CVE-2007-2447/" source="CVE"/>
		<reference ref_id="CVE-2007-4138" ref_url="https://www.suse.com/security/cve/CVE-2007-4138/" source="CVE"/>
		<reference ref_id="CVE-2007-4572" ref_url="https://www.suse.com/security/cve/CVE-2007-4572/" source="CVE"/>
		<reference ref_id="CVE-2007-5398" ref_url="https://www.suse.com/security/cve/CVE-2007-5398/" source="CVE"/>
		<reference ref_id="CVE-2007-6015" ref_url="https://www.suse.com/security/cve/CVE-2007-6015/" source="CVE"/>
		<reference ref_id="CVE-2008-1105" ref_url="https://www.suse.com/security/cve/CVE-2008-1105/" source="CVE"/>
		<reference ref_id="CVE-2008-3789" ref_url="https://www.suse.com/security/cve/CVE-2008-3789/" source="CVE"/>
		<reference ref_id="CVE-2008-4314" ref_url="https://www.suse.com/security/cve/CVE-2008-4314/" source="CVE"/>
		<reference ref_id="CVE-2009-0022" ref_url="https://www.suse.com/security/cve/CVE-2009-0022/" source="CVE"/>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2011-1678" ref_url="https://www.suse.com/security/cve/CVE-2011-1678/" source="CVE"/>
		<reference ref_id="CVE-2012-1586" ref_url="https://www.suse.com/security/cve/CVE-2012-1586/" source="CVE"/>
		<description>
These are all security issues fixed in the cifs-utils-5.1-0.14.46 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3403/">CVE-2006-3403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3403">CVE-2006-3403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0452/">CVE-2007-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0452">CVE-2007-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2444/">CVE-2007-2444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2444">CVE-2007-2444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2446/">CVE-2007-2446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2446">CVE-2007-2446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2447/">CVE-2007-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2447">CVE-2007-2447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4138/">CVE-2007-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4138">CVE-2007-4138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4572/">CVE-2007-4572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4572">CVE-2007-4572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5398/">CVE-2007-5398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5398">CVE-2007-5398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6015/">CVE-2007-6015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6015">CVE-2007-6015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1105/">CVE-2008-1105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1105">CVE-2008-1105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3789/">CVE-2008-3789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3789">CVE-2008-3789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4314/">CVE-2008-4314 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4314">CVE-2008-4314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0022/">CVE-2009-0022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0022">CVE-2009-0022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1886">CVE-2009-1886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1888">CVE-2009-1888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2813">CVE-2009-2813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2906">CVE-2009-2906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2948">CVE-2009-2948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0547">CVE-2010-0547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0728">CVE-2010-0728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0787">CVE-2010-0787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1678/">CVE-2011-1678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1678">CVE-2011-1678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1586/">CVE-2012-1586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1586">CVE-2012-1586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990197" comment="cifs-utils-5.1-0.14.46 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216212" version="1" class="patch">
	<metadata>
		<title>clamav-0.98.7-0.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-4182" ref_url="https://www.suse.com/security/cve/CVE-2006-4182/" source="CVE"/>
		<reference ref_id="CVE-2006-5295" ref_url="https://www.suse.com/security/cve/CVE-2006-5295/" source="CVE"/>
		<reference ref_id="CVE-2006-5874" ref_url="https://www.suse.com/security/cve/CVE-2006-5874/" source="CVE"/>
		<reference ref_id="CVE-2007-0897" ref_url="https://www.suse.com/security/cve/CVE-2007-0897/" source="CVE"/>
		<reference ref_id="CVE-2007-0898" ref_url="https://www.suse.com/security/cve/CVE-2007-0898/" source="CVE"/>
		<reference ref_id="CVE-2007-1745" ref_url="https://www.suse.com/security/cve/CVE-2007-1745/" source="CVE"/>
		<reference ref_id="CVE-2007-1997" ref_url="https://www.suse.com/security/cve/CVE-2007-1997/" source="CVE"/>
		<reference ref_id="CVE-2007-6335" ref_url="https://www.suse.com/security/cve/CVE-2007-6335/" source="CVE"/>
		<reference ref_id="CVE-2007-6336" ref_url="https://www.suse.com/security/cve/CVE-2007-6336/" source="CVE"/>
		<reference ref_id="CVE-2007-6337" ref_url="https://www.suse.com/security/cve/CVE-2007-6337/" source="CVE"/>
		<reference ref_id="CVE-2007-6595" ref_url="https://www.suse.com/security/cve/CVE-2007-6595/" source="CVE"/>
		<reference ref_id="CVE-2007-6596" ref_url="https://www.suse.com/security/cve/CVE-2007-6596/" source="CVE"/>
		<reference ref_id="CVE-2008-0318" ref_url="https://www.suse.com/security/cve/CVE-2008-0318/" source="CVE"/>
		<reference ref_id="CVE-2008-0728" ref_url="https://www.suse.com/security/cve/CVE-2008-0728/" source="CVE"/>
		<reference ref_id="CVE-2008-1100" ref_url="https://www.suse.com/security/cve/CVE-2008-1100/" source="CVE"/>
		<reference ref_id="CVE-2008-2713" ref_url="https://www.suse.com/security/cve/CVE-2008-2713/" source="CVE"/>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<reference ref_id="CVE-2011-2721" ref_url="https://www.suse.com/security/cve/CVE-2011-2721/" source="CVE"/>
		<reference ref_id="CVE-2011-3627" ref_url="https://www.suse.com/security/cve/CVE-2011-3627/" source="CVE"/>
		<reference ref_id="CVE-2012-1457" ref_url="https://www.suse.com/security/cve/CVE-2012-1457/" source="CVE"/>
		<reference ref_id="CVE-2012-1458" ref_url="https://www.suse.com/security/cve/CVE-2012-1458/" source="CVE"/>
		<reference ref_id="CVE-2012-1459" ref_url="https://www.suse.com/security/cve/CVE-2012-1459/" source="CVE"/>
		<reference ref_id="CVE-2013-2020" ref_url="https://www.suse.com/security/cve/CVE-2013-2020/" source="CVE"/>
		<reference ref_id="CVE-2013-2021" ref_url="https://www.suse.com/security/cve/CVE-2013-2021/" source="CVE"/>
		<reference ref_id="CVE-2013-6497" ref_url="https://www.suse.com/security/cve/CVE-2013-6497/" source="CVE"/>
		<reference ref_id="CVE-2014-9050" ref_url="https://www.suse.com/security/cve/CVE-2014-9050/" source="CVE"/>
		<reference ref_id="CVE-2014-9328" ref_url="https://www.suse.com/security/cve/CVE-2014-9328/" source="CVE"/>
		<reference ref_id="CVE-2015-1461" ref_url="https://www.suse.com/security/cve/CVE-2015-1461/" source="CVE"/>
		<reference ref_id="CVE-2015-1462" ref_url="https://www.suse.com/security/cve/CVE-2015-1462/" source="CVE"/>
		<reference ref_id="CVE-2015-1463" ref_url="https://www.suse.com/security/cve/CVE-2015-1463/" source="CVE"/>
		<reference ref_id="CVE-2015-2170" ref_url="https://www.suse.com/security/cve/CVE-2015-2170/" source="CVE"/>
		<reference ref_id="CVE-2015-2221" ref_url="https://www.suse.com/security/cve/CVE-2015-2221/" source="CVE"/>
		<reference ref_id="CVE-2015-2222" ref_url="https://www.suse.com/security/cve/CVE-2015-2222/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2668" ref_url="https://www.suse.com/security/cve/CVE-2015-2668/" source="CVE"/>
		<description>
These are all security issues fixed in the clamav-0.98.7-0.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4182/">CVE-2006-4182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4182">CVE-2006-4182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5295/">CVE-2006-5295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5295">CVE-2006-5295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5874/">CVE-2006-5874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5874">CVE-2006-5874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0897/">CVE-2007-0897 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2007-0897">CVE-2007-0897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0898/">CVE-2007-0898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0898">CVE-2007-0898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1745/">CVE-2007-1745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1745">CVE-2007-1745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1997/">CVE-2007-1997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1997">CVE-2007-1997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6335/">CVE-2007-6335 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6335">CVE-2007-6335 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6336/">CVE-2007-6336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6336">CVE-2007-6336 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6337/">CVE-2007-6337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6337">CVE-2007-6337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6595/">CVE-2007-6595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6595">CVE-2007-6595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6596/">CVE-2007-6596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6596">CVE-2007-6596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0318/">CVE-2008-0318 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0318">CVE-2008-0318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0728/">CVE-2008-0728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0728">CVE-2008-0728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1100/">CVE-2008-1100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1100">CVE-2008-1100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2713/">CVE-2008-2713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2713">CVE-2008-2713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0405">CVE-2010-0405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2721/">CVE-2011-2721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2721">CVE-2011-2721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3627/">CVE-2011-3627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3627">CVE-2011-3627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1457/">CVE-2012-1457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1457">CVE-2012-1457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1458/">CVE-2012-1458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1458">CVE-2012-1458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1459/">CVE-2012-1459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1459">CVE-2012-1459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2020/">CVE-2013-2020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2020">CVE-2013-2020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2021/">CVE-2013-2021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2021">CVE-2013-2021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6497/">CVE-2013-6497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6497">CVE-2013-6497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9050/">CVE-2014-9050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9050">CVE-2014-9050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9328/">CVE-2014-9328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9328">CVE-2014-9328 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1461/">CVE-2015-1461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1461">CVE-2015-1461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1462/">CVE-2015-1462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1462">CVE-2015-1462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1463/">CVE-2015-1463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1463">CVE-2015-1463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2170/">CVE-2015-2170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2170">CVE-2015-2170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2221/">CVE-2015-2221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2221">CVE-2015-2221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2222/">CVE-2015-2222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2222">CVE-2015-2222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2305">CVE-2015-2305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2668/">CVE-2015-2668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2668">CVE-2015-2668 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990198" comment="clamav-0.98.7-0.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216213" version="1" class="patch">
	<metadata>
		<title>compat-libldap-2_3-0-2.3.37-2.30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-1164" ref_url="https://www.suse.com/security/cve/CVE-2012-1164/" source="CVE"/>
		<reference ref_id="CVE-2013-4449" ref_url="https://www.suse.com/security/cve/CVE-2013-4449/" source="CVE"/>
		<reference ref_id="CVE-2015-1545" ref_url="https://www.suse.com/security/cve/CVE-2015-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-1546" ref_url="https://www.suse.com/security/cve/CVE-2015-1546/" source="CVE"/>
		<description>
These are all security issues fixed in the compat-libldap-2_3-0-2.3.37-2.30.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1164/">CVE-2012-1164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1164">CVE-2012-1164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4449/">CVE-2013-4449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4449">CVE-2013-4449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1545/">CVE-2015-1545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1545">CVE-2015-1545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1546/">CVE-2015-1546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1546">CVE-2015-1546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990199" comment="compat-libldap-2_3-0-2.3.37-2.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990200" comment="libldap-2_4-2-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990201" comment="libldap-2_4-2-32bit-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990202" comment="libldap-2_4-2-x86-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990203" comment="openldap2-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990204" comment="openldap2-back-meta-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990205" comment="openldap2-client-2.4.26-0.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216214" version="1" class="patch">
	<metadata>
		<title>coolkey-1.1.0-22.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-4129" ref_url="https://www.suse.com/security/cve/CVE-2007-4129/" source="CVE"/>
		<description>
These are all security issues fixed in the coolkey-1.1.0-22.24 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4129/">CVE-2007-4129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4129">CVE-2007-4129 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988438" comment="coolkey-1.1.0-22.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216215" version="1" class="patch">
	<metadata>
		<title>coreutils-8.12-6.25.32.33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-0221" ref_url="https://www.suse.com/security/cve/CVE-2013-0221/" source="CVE"/>
		<reference ref_id="CVE-2013-0222" ref_url="https://www.suse.com/security/cve/CVE-2013-0222/" source="CVE"/>
		<reference ref_id="CVE-2013-0223" ref_url="https://www.suse.com/security/cve/CVE-2013-0223/" source="CVE"/>
		<description>
These are all security issues fixed in the coreutils-8.12-6.25.32.33.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0221/">CVE-2013-0221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0221">CVE-2013-0221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0222/">CVE-2013-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0222">CVE-2013-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0223/">CVE-2013-0223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0223">CVE-2013-0223 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990206" comment="coreutils-8.12-6.25.32.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990207" comment="coreutils-lang-8.12-6.25.32.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990208" comment="coreutils-x86-8.12-6.25.32.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216216" version="1" class="patch">
	<metadata>
		<title>cpio-2.9-75.78.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-9112" ref_url="https://www.suse.com/security/cve/CVE-2014-9112/" source="CVE"/>
		<description>
These are all security issues fixed in the cpio-2.9-75.78.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9112/">CVE-2014-9112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9112">CVE-2014-9112 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990209" comment="cpio-2.9-75.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990210" comment="cpio-lang-2.9-75.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216217" version="1" class="patch">
	<metadata>
		<title>cron-4.1-194.211.213.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-2607" ref_url="https://www.suse.com/security/cve/CVE-2006-2607/" source="CVE"/>
		<reference ref_id="CVE-2010-0424" ref_url="https://www.suse.com/security/cve/CVE-2010-0424/" source="CVE"/>
		<description>
These are all security issues fixed in the cron-4.1-194.211.213.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2607/">CVE-2006-2607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2607">CVE-2006-2607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0424/">CVE-2010-0424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0424">CVE-2010-0424 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990211" comment="cron-4.1-194.211.213.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216218" version="1" class="patch">
	<metadata>
		<title>cups-1.3.9-8.46.56.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-0104" ref_url="https://www.suse.com/security/cve/CVE-2007-0104/" source="CVE"/>
		<reference ref_id="CVE-2007-3387" ref_url="https://www.suse.com/security/cve/CVE-2007-3387/" source="CVE"/>
		<reference ref_id="CVE-2007-4351" ref_url="https://www.suse.com/security/cve/CVE-2007-4351/" source="CVE"/>
		<reference ref_id="CVE-2007-4352" ref_url="https://www.suse.com/security/cve/CVE-2007-4352/" source="CVE"/>
		<reference ref_id="CVE-2007-5392" ref_url="https://www.suse.com/security/cve/CVE-2007-5392/" source="CVE"/>
		<reference ref_id="CVE-2007-5393" ref_url="https://www.suse.com/security/cve/CVE-2007-5393/" source="CVE"/>
		<reference ref_id="CVE-2008-0047" ref_url="https://www.suse.com/security/cve/CVE-2008-0047/" source="CVE"/>
		<reference ref_id="CVE-2008-1373" ref_url="https://www.suse.com/security/cve/CVE-2008-1373/" source="CVE"/>
		<reference ref_id="CVE-2008-1693" ref_url="https://www.suse.com/security/cve/CVE-2008-1693/" source="CVE"/>
		<reference ref_id="CVE-2008-1722" ref_url="https://www.suse.com/security/cve/CVE-2008-1722/" source="CVE"/>
		<reference ref_id="CVE-2008-3641" ref_url="https://www.suse.com/security/cve/CVE-2008-3641/" source="CVE"/>
		<reference ref_id="CVE-2009-0163" ref_url="https://www.suse.com/security/cve/CVE-2009-0163/" source="CVE"/>
		<reference ref_id="CVE-2009-0949" ref_url="https://www.suse.com/security/cve/CVE-2009-0949/" source="CVE"/>
		<reference ref_id="CVE-2009-2820" ref_url="https://www.suse.com/security/cve/CVE-2009-2820/" source="CVE"/>
		<reference ref_id="CVE-2009-3553" ref_url="https://www.suse.com/security/cve/CVE-2009-3553/" source="CVE"/>
		<reference ref_id="CVE-2010-0302" ref_url="https://www.suse.com/security/cve/CVE-2010-0302/" source="CVE"/>
		<reference ref_id="CVE-2010-0393" ref_url="https://www.suse.com/security/cve/CVE-2010-0393/" source="CVE"/>
		<reference ref_id="CVE-2010-0540" ref_url="https://www.suse.com/security/cve/CVE-2010-0540/" source="CVE"/>
		<reference ref_id="CVE-2010-0542" ref_url="https://www.suse.com/security/cve/CVE-2010-0542/" source="CVE"/>
		<reference ref_id="CVE-2010-1748" ref_url="https://www.suse.com/security/cve/CVE-2010-1748/" source="CVE"/>
		<reference ref_id="CVE-2010-2431" ref_url="https://www.suse.com/security/cve/CVE-2010-2431/" source="CVE"/>
		<reference ref_id="CVE-2010-2432" ref_url="https://www.suse.com/security/cve/CVE-2010-2432/" source="CVE"/>
		<reference ref_id="CVE-2010-2941" ref_url="https://www.suse.com/security/cve/CVE-2010-2941/" source="CVE"/>
		<reference ref_id="CVE-2011-2896" ref_url="https://www.suse.com/security/cve/CVE-2011-2896/" source="CVE"/>
		<reference ref_id="CVE-2011-3170" ref_url="https://www.suse.com/security/cve/CVE-2011-3170/" source="CVE"/>
		<reference ref_id="CVE-2012-5519" ref_url="https://www.suse.com/security/cve/CVE-2012-5519/" source="CVE"/>
		<reference ref_id="CVE-2014-3537" ref_url="https://www.suse.com/security/cve/CVE-2014-3537/" source="CVE"/>
		<reference ref_id="CVE-2014-5029" ref_url="https://www.suse.com/security/cve/CVE-2014-5029/" source="CVE"/>
		<reference ref_id="CVE-2014-5030" ref_url="https://www.suse.com/security/cve/CVE-2014-5030/" source="CVE"/>
		<reference ref_id="CVE-2014-5031" ref_url="https://www.suse.com/security/cve/CVE-2014-5031/" source="CVE"/>
		<reference ref_id="CVE-2014-9679" ref_url="https://www.suse.com/security/cve/CVE-2014-9679/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-1.3.9-8.46.56.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0104/">CVE-2007-0104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0104">CVE-2007-0104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3387/">CVE-2007-3387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3387">CVE-2007-3387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4351/">CVE-2007-4351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4351">CVE-2007-4351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4352/">CVE-2007-4352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4352">CVE-2007-4352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5392/">CVE-2007-5392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5392">CVE-2007-5392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5393/">CVE-2007-5393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5393">CVE-2007-5393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0047/">CVE-2008-0047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0047">CVE-2008-0047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1373/">CVE-2008-1373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1373">CVE-2008-1373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1693/">CVE-2008-1693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1693">CVE-2008-1693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1722/">CVE-2008-1722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1722">CVE-2008-1722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3641/">CVE-2008-3641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3641">CVE-2008-3641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0163/">CVE-2009-0163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0163">CVE-2009-0163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0949/">CVE-2009-0949 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-0949">CVE-2009-0949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2820/">CVE-2009-2820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2820">CVE-2009-2820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3553/">CVE-2009-3553 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-3553">CVE-2009-3553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0302/">CVE-2010-0302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-0302">CVE-2010-0302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0393/">CVE-2010-0393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0393">CVE-2010-0393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0540/">CVE-2010-0540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0540">CVE-2010-0540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0542/">CVE-2010-0542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0542">CVE-2010-0542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1748/">CVE-2010-1748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1748">CVE-2010-1748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2431/">CVE-2010-2431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2431">CVE-2010-2431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2432/">CVE-2010-2432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2432">CVE-2010-2432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2941/">CVE-2010-2941 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2941">CVE-2010-2941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2896/">CVE-2011-2896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2896">CVE-2011-2896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3170/">CVE-2011-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3170">CVE-2011-3170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5519/">CVE-2012-5519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5519">CVE-2012-5519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3537/">CVE-2014-3537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3537">CVE-2014-3537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5029/">CVE-2014-5029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5029">CVE-2014-5029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5030/">CVE-2014-5030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5030">CVE-2014-5030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5031/">CVE-2014-5031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5031">CVE-2014-5031 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9679/">CVE-2014-9679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9679">CVE-2014-9679 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990212" comment="cups-1.3.9-8.46.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990213" comment="cups-client-1.3.9-8.46.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990214" comment="cups-libs-1.3.9-8.46.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990215" comment="cups-libs-32bit-1.3.9-8.46.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990216" comment="cups-libs-x86-1.3.9-8.46.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216219" version="1" class="patch">
	<metadata>
		<title>curl-7.19.7-1.42.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0037" ref_url="https://www.suse.com/security/cve/CVE-2009-0037/" source="CVE"/>
		<reference ref_id="CVE-2009-2417" ref_url="https://www.suse.com/security/cve/CVE-2009-2417/" source="CVE"/>
		<reference ref_id="CVE-2010-4180" ref_url="https://www.suse.com/security/cve/CVE-2010-4180/" source="CVE"/>
		<reference ref_id="CVE-2011-2192" ref_url="https://www.suse.com/security/cve/CVE-2011-2192/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2013-1944" ref_url="https://www.suse.com/security/cve/CVE-2013-1944/" source="CVE"/>
		<reference ref_id="CVE-2013-2174" ref_url="https://www.suse.com/security/cve/CVE-2013-2174/" source="CVE"/>
		<reference ref_id="CVE-2013-4545" ref_url="https://www.suse.com/security/cve/CVE-2013-4545/" source="CVE"/>
		<reference ref_id="CVE-2014-0015" ref_url="https://www.suse.com/security/cve/CVE-2014-0015/" source="CVE"/>
		<reference ref_id="CVE-2014-0138" ref_url="https://www.suse.com/security/cve/CVE-2014-0138/" source="CVE"/>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<reference ref_id="CVE-2014-3613" ref_url="https://www.suse.com/security/cve/CVE-2014-3613/" source="CVE"/>
		<reference ref_id="CVE-2014-3707" ref_url="https://www.suse.com/security/cve/CVE-2014-3707/" source="CVE"/>
		<reference ref_id="CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150/" source="CVE"/>
		<reference ref_id="CVE-2015-3143" ref_url="https://www.suse.com/security/cve/CVE-2015-3143/" source="CVE"/>
		<reference ref_id="CVE-2015-3148" ref_url="https://www.suse.com/security/cve/CVE-2015-3148/" source="CVE"/>
		<reference ref_id="CVE-2015-3153" ref_url="https://www.suse.com/security/cve/CVE-2015-3153/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-7.19.7-1.42.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0037/">CVE-2009-0037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0037">CVE-2009-0037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2417/">CVE-2009-2417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2417">CVE-2009-2417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4180/">CVE-2010-4180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4180">CVE-2010-4180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2192/">CVE-2011-2192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2192">CVE-2011-2192 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1944/">CVE-2013-1944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1944">CVE-2013-1944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2174/">CVE-2013-2174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2174">CVE-2013-2174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4545/">CVE-2013-4545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4545">CVE-2013-4545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0015/">CVE-2014-0015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0015">CVE-2014-0015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0138/">CVE-2014-0138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0138">CVE-2014-0138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0139">CVE-2014-0139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3613/">CVE-2014-3613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3613">CVE-2014-3613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3707/">CVE-2014-3707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3707">CVE-2014-3707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8150">CVE-2014-8150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3143/">CVE-2015-3143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3143">CVE-2015-3143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3148/">CVE-2015-3148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3148">CVE-2015-3148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3153/">CVE-2015-3153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3153">CVE-2015-3153 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990217" comment="curl-7.19.7-1.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990218" comment="libcurl4-7.19.7-1.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990219" comment="libcurl4-32bit-7.19.7-1.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990220" comment="libcurl4-x86-7.19.7-1.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216220" version="1" class="patch">
	<metadata>
		<title>cvs-1.12.12-144.23.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-0804" ref_url="https://www.suse.com/security/cve/CVE-2012-0804/" source="CVE"/>
		<description>
These are all security issues fixed in the cvs-1.12.12-144.23.5.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0804/">CVE-2012-0804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0804">CVE-2012-0804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989628" comment="cvs-1.12.12-144.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989629" comment="cvs-doc-1.12.12-144.23.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216221" version="1" class="patch">
	<metadata>
		<title>cyrus-imapd-2.3.11-60.65.64.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-3235" ref_url="https://www.suse.com/security/cve/CVE-2009-3235/" source="CVE"/>
		<reference ref_id="CVE-2011-3372" ref_url="https://www.suse.com/security/cve/CVE-2011-3372/" source="CVE"/>
		<description>
These are all security issues fixed in the cyrus-imapd-2.3.11-60.65.64.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3235/">CVE-2009-3235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3235">CVE-2009-3235 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3372/">CVE-2011-3372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3372">CVE-2011-3372 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989023" comment="cyrus-imapd-2.3.11-60.65.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989024" comment="perl-Cyrus-IMAP-2.3.11-60.65.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989025" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216222" version="1" class="patch">
	<metadata>
		<title>davfs2-1.5.2-1.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-4362" ref_url="https://www.suse.com/security/cve/CVE-2014-4362/" source="CVE"/>
		<description>
These are all security issues fixed in the davfs2-1.5.2-1.36 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4362/">CVE-2014-4362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4362">CVE-2014-4362 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990221" comment="davfs2-1.5.2-1.36 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216223" version="1" class="patch">
	<metadata>
		<title>dbus-1-1.2.10-3.31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-6107" ref_url="https://www.suse.com/security/cve/CVE-2006-6107/" source="CVE"/>
		<reference ref_id="CVE-2008-0595" ref_url="https://www.suse.com/security/cve/CVE-2008-0595/" source="CVE"/>
		<reference ref_id="CVE-2008-3834" ref_url="https://www.suse.com/security/cve/CVE-2008-3834/" source="CVE"/>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<reference ref_id="CVE-2009-1189" ref_url="https://www.suse.com/security/cve/CVE-2009-1189/" source="CVE"/>
		<reference ref_id="CVE-2010-4352" ref_url="https://www.suse.com/security/cve/CVE-2010-4352/" source="CVE"/>
		<reference ref_id="CVE-2012-3524" ref_url="https://www.suse.com/security/cve/CVE-2012-3524/" source="CVE"/>
		<reference ref_id="CVE-2014-3477" ref_url="https://www.suse.com/security/cve/CVE-2014-3477/" source="CVE"/>
		<reference ref_id="CVE-2014-3638" ref_url="https://www.suse.com/security/cve/CVE-2014-3638/" source="CVE"/>
		<reference ref_id="CVE-2014-3639" ref_url="https://www.suse.com/security/cve/CVE-2014-3639/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-1.2.10-3.31.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6107/">CVE-2006-6107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6107">CVE-2006-6107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0595/">CVE-2008-0595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0595">CVE-2008-0595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3834/">CVE-2008-3834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3834">CVE-2008-3834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4311">CVE-2008-4311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1189/">CVE-2009-1189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1189">CVE-2009-1189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4352/">CVE-2010-4352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4352">CVE-2010-4352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3524/">CVE-2012-3524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3524">CVE-2012-3524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3477/">CVE-2014-3477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3477">CVE-2014-3477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3638/">CVE-2014-3638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3638">CVE-2014-3638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3639/">CVE-2014-3639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3639">CVE-2014-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990222" comment="dbus-1-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990223" comment="dbus-1-32bit-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990224" comment="dbus-1-x11-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990225" comment="dbus-1-x86-1.2.10-3.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216224" version="1" class="patch">
	<metadata>
		<title>dbus-1-glib-0.76-34.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-1172" ref_url="https://www.suse.com/security/cve/CVE-2010-1172/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-glib-0.76-34.22.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1172/">CVE-2010-1172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1172">CVE-2010-1172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989030" comment="dbus-1-glib-0.76-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989031" comment="dbus-1-glib-32bit-0.76-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989032" comment="dbus-1-glib-x86-0.76-34.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216225" version="1" class="patch">
	<metadata>
		<title>dhcp-4.2.4.P2-0.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0692" ref_url="https://www.suse.com/security/cve/CVE-2009-0692/" source="CVE"/>
		<reference ref_id="CVE-2009-1892" ref_url="https://www.suse.com/security/cve/CVE-2009-1892/" source="CVE"/>
		<reference ref_id="CVE-2011-0997" ref_url="https://www.suse.com/security/cve/CVE-2011-0997/" source="CVE"/>
		<reference ref_id="CVE-2011-2748" ref_url="https://www.suse.com/security/cve/CVE-2011-2748/" source="CVE"/>
		<reference ref_id="CVE-2011-2749" ref_url="https://www.suse.com/security/cve/CVE-2011-2749/" source="CVE"/>
		<reference ref_id="CVE-2011-4539" ref_url="https://www.suse.com/security/cve/CVE-2011-4539/" source="CVE"/>
		<reference ref_id="CVE-2011-4868" ref_url="https://www.suse.com/security/cve/CVE-2011-4868/" source="CVE"/>
		<reference ref_id="CVE-2012-3570" ref_url="https://www.suse.com/security/cve/CVE-2012-3570/" source="CVE"/>
		<reference ref_id="CVE-2012-3571" ref_url="https://www.suse.com/security/cve/CVE-2012-3571/" source="CVE"/>
		<reference ref_id="CVE-2012-3954" ref_url="https://www.suse.com/security/cve/CVE-2012-3954/" source="CVE"/>
		<reference ref_id="CVE-2012-3955" ref_url="https://www.suse.com/security/cve/CVE-2012-3955/" source="CVE"/>
		<reference ref_id="CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266/" source="CVE"/>
		<description>
These are all security issues fixed in the dhcp-4.2.4.P2-0.22.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0692/">CVE-2009-0692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0692">CVE-2009-0692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1892/">CVE-2009-1892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1892">CVE-2009-1892 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0997/">CVE-2011-0997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0997">CVE-2011-0997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2748/">CVE-2011-2748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2748">CVE-2011-2748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2749/">CVE-2011-2749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2749">CVE-2011-2749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4539/">CVE-2011-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4539">CVE-2011-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4868/">CVE-2011-4868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4868">CVE-2011-4868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3570/">CVE-2012-3570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3570">CVE-2012-3570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3571/">CVE-2012-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3571">CVE-2012-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3954/">CVE-2012-3954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3954">CVE-2012-3954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3955/">CVE-2012-3955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3955">CVE-2012-3955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2266">CVE-2013-2266 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990226" comment="dhcp-4.2.4.P2-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990227" comment="dhcp-client-4.2.4.P2-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990228" comment="dhcp-relay-4.2.4.P2-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990229" comment="dhcp-server-4.2.4.P2-0.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216226" version="1" class="patch">
	<metadata>
		<title>dhcpcd-3.2.3-44.30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-0997" ref_url="https://www.suse.com/security/cve/CVE-2011-0997/" source="CVE"/>
		<description>
These are all security issues fixed in the dhcpcd-3.2.3-44.30.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0997/">CVE-2011-0997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0997">CVE-2011-0997 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989638" comment="dhcpcd-3.2.3-44.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989038" comment="dhcpv6-1.0.22-3.21.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216227" version="1" class="patch">
	<metadata>
		<title>dnsmasq-2.71-0.14.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-3294" ref_url="https://www.suse.com/security/cve/CVE-2015-3294/" source="CVE"/>
		<description>
These are all security issues fixed in the dnsmasq-2.71-0.14.9 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3294/">CVE-2015-3294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3294">CVE-2015-3294 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990230" comment="dnsmasq-2.71-0.14.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216228" version="1" class="patch">
	<metadata>
		<title>e2fsprogs-1.41.9-2.14.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-5497" ref_url="https://www.suse.com/security/cve/CVE-2007-5497/" source="CVE"/>
		<reference ref_id="CVE-2015-0247" ref_url="https://www.suse.com/security/cve/CVE-2015-0247/" source="CVE"/>
		<reference ref_id="CVE-2015-1572" ref_url="https://www.suse.com/security/cve/CVE-2015-1572/" source="CVE"/>
		<description>
These are all security issues fixed in the e2fsprogs-1.41.9-2.14.3 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5497/">CVE-2007-5497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5497">CVE-2007-5497 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-0247/">CVE-2015-0247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0247">CVE-2015-0247 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-1572/">CVE-2015-1572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1572">CVE-2015-1572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990231" comment="e2fsprogs-1.41.9-2.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990232" comment="libcom_err2-1.41.9-2.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990233" comment="libcom_err2-32bit-1.41.9-2.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990234" comment="libcom_err2-x86-1.41.9-2.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990235" comment="libext2fs2-1.41.9-2.14.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216229" version="1" class="patch">
	<metadata>
		<title>ecryptfs-utils-32bit-61-1.33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-1831" ref_url="https://www.suse.com/security/cve/CVE-2011-1831/" source="CVE"/>
		<reference ref_id="CVE-2011-1832" ref_url="https://www.suse.com/security/cve/CVE-2011-1832/" source="CVE"/>
		<reference ref_id="CVE-2011-1833" ref_url="https://www.suse.com/security/cve/CVE-2011-1833/" source="CVE"/>
		<reference ref_id="CVE-2011-1834" ref_url="https://www.suse.com/security/cve/CVE-2011-1834/" source="CVE"/>
		<reference ref_id="CVE-2011-3145" ref_url="https://www.suse.com/security/cve/CVE-2011-3145/" source="CVE"/>
		<description>
These are all security issues fixed in the ecryptfs-utils-32bit-61-1.33.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1831/">CVE-2011-1831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1831">CVE-2011-1831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1832/">CVE-2011-1832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1832">CVE-2011-1832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1833/">CVE-2011-1833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1833">CVE-2011-1833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1834/">CVE-2011-1834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1834">CVE-2011-1834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3145/">CVE-2011-3145 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3145">CVE-2011-3145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989644" comment="ecryptfs-utils-61-1.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989645" comment="ecryptfs-utils-32bit-61-1.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989646" comment="ecryptfs-utils-x86-61-1.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216230" version="1" class="patch">
	<metadata>
		<title>ed-0.2-1001.30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-3916" ref_url="https://www.suse.com/security/cve/CVE-2008-3916/" source="CVE"/>
		<description>
These are all security issues fixed in the ed-0.2-1001.30.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3916/">CVE-2008-3916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3916">CVE-2008-3916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989047" comment="ed-0.2-1001.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216231" version="1" class="patch">
	<metadata>
		<title>elfutils-0.152-4.9.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-9447" ref_url="https://www.suse.com/security/cve/CVE-2014-9447/" source="CVE"/>
		<description>
These are all security issues fixed in the elfutils-0.152-4.9.17 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9447/">CVE-2014-9447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9447">CVE-2014-9447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990236" comment="elfutils-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990237" comment="libasm1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990238" comment="libasm1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990239" comment="libdw1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990240" comment="libdw1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990241" comment="libdw1-x86-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990242" comment="libebl1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990243" comment="libebl1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990244" comment="libebl1-x86-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990245" comment="libelf1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990246" comment="libelf1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990247" comment="libelf1-x86-0.152-4.9.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216232" version="1" class="patch">
	<metadata>
		<title>emacs-22.3-4.42.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-5795" ref_url="https://www.suse.com/security/cve/CVE-2007-5795/" source="CVE"/>
		<reference ref_id="CVE-2014-3421" ref_url="https://www.suse.com/security/cve/CVE-2014-3421/" source="CVE"/>
		<reference ref_id="CVE-2014-3422" ref_url="https://www.suse.com/security/cve/CVE-2014-3422/" source="CVE"/>
		<reference ref_id="CVE-2014-3423" ref_url="https://www.suse.com/security/cve/CVE-2014-3423/" source="CVE"/>
		<reference ref_id="CVE-2014-3424" ref_url="https://www.suse.com/security/cve/CVE-2014-3424/" source="CVE"/>
		<description>
These are all security issues fixed in the emacs-22.3-4.42.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5795/">CVE-2007-5795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5795">CVE-2007-5795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3421/">CVE-2014-3421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3421">CVE-2014-3421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3422/">CVE-2014-3422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3422">CVE-2014-3422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3423/">CVE-2014-3423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3423">CVE-2014-3423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3424/">CVE-2014-3424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3424">CVE-2014-3424 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990248" comment="emacs-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990249" comment="emacs-el-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990250" comment="emacs-info-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990251" comment="emacs-nox-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990252" comment="emacs-x11-22.3-4.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216233" version="1" class="patch">
	<metadata>
		<title>enscript-1.6.4-152.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-3863" ref_url="https://www.suse.com/security/cve/CVE-2008-3863/" source="CVE"/>
		<reference ref_id="CVE-2008-4306" ref_url="https://www.suse.com/security/cve/CVE-2008-4306/" source="CVE"/>
		<description>
These are all security issues fixed in the enscript-1.6.4-152.22.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3863/">CVE-2008-3863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3863">CVE-2008-3863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4306/">CVE-2008-4306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4306">CVE-2008-4306 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989053" comment="enscript-1.6.4-152.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216234" version="1" class="patch">
	<metadata>
		<title>evince-2.28.2-0.7.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-5864" ref_url="https://www.suse.com/security/cve/CVE-2006-5864/" source="CVE"/>
		<reference ref_id="CVE-2010-2640" ref_url="https://www.suse.com/security/cve/CVE-2010-2640/" source="CVE"/>
		<reference ref_id="CVE-2010-2641" ref_url="https://www.suse.com/security/cve/CVE-2010-2641/" source="CVE"/>
		<reference ref_id="CVE-2010-2642" ref_url="https://www.suse.com/security/cve/CVE-2010-2642/" source="CVE"/>
		<reference ref_id="CVE-2010-2643" ref_url="https://www.suse.com/security/cve/CVE-2010-2643/" source="CVE"/>
		<description>
These are all security issues fixed in the evince-2.28.2-0.7.2 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5864/">CVE-2006-5864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5864">CVE-2006-5864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2640/">CVE-2010-2640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2640">CVE-2010-2640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2641/">CVE-2010-2641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2641">CVE-2010-2641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2642/">CVE-2010-2642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2642">CVE-2010-2642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2643/">CVE-2010-2643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2643">CVE-2010-2643 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989054" comment="evince-2.28.2-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989055" comment="evince-doc-2.28.2-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989056" comment="evince-lang-2.28.2-0.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216235" version="1" class="patch">
	<metadata>
		<title>evolution-data-server-2.28.2-0.32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-3257" ref_url="https://www.suse.com/security/cve/CVE-2007-3257/" source="CVE"/>
		<description>
These are all security issues fixed in the evolution-data-server-2.28.2-0.32.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3257/">CVE-2007-3257 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3257">CVE-2007-3257 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990253" comment="evolution-data-server-2.28.2-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990254" comment="evolution-data-server-32bit-2.28.2-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990255" comment="evolution-data-server-lang-2.28.2-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990256" comment="evolution-data-server-x86-2.28.2-0.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216236" version="1" class="patch">
	<metadata>
		<title>expat-2.0.1-88.34.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-2625" ref_url="https://www.suse.com/security/cve/CVE-2009-2625/" source="CVE"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2012-1147" ref_url="https://www.suse.com/security/cve/CVE-2012-1147/" source="CVE"/>
		<reference ref_id="CVE-2012-1148" ref_url="https://www.suse.com/security/cve/CVE-2012-1148/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.0.1-88.34.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2625/">CVE-2009-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2625">CVE-2009-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3560">CVE-2009-3560 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0876">CVE-2012-0876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1147/">CVE-2012-1147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1147">CVE-2012-1147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1148/">CVE-2012-1148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1148">CVE-2012-1148 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989651" comment="expat-2.0.1-88.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989652" comment="libexpat1-2.0.1-88.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989653" comment="libexpat1-32bit-2.0.1-88.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989654" comment="libexpat1-x86-2.0.1-88.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216237" version="1" class="patch">
	<metadata>
		<title>fastjar-0.95-1.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-0831" ref_url="https://www.suse.com/security/cve/CVE-2010-0831/" source="CVE"/>
		<description>
These are all security issues fixed in the fastjar-0.95-1.24.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0831/">CVE-2010-0831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0831">CVE-2010-0831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990257" comment="fastjar-0.95-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216238" version="1" class="patch">
	<metadata>
		<title>fetchmail-6.3.8.90-13.20.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-5867" ref_url="https://www.suse.com/security/cve/CVE-2006-5867/" source="CVE"/>
		<reference ref_id="CVE-2006-5974" ref_url="https://www.suse.com/security/cve/CVE-2006-5974/" source="CVE"/>
		<reference ref_id="CVE-2007-1558" ref_url="https://www.suse.com/security/cve/CVE-2007-1558/" source="CVE"/>
		<reference ref_id="CVE-2007-4565" ref_url="https://www.suse.com/security/cve/CVE-2007-4565/" source="CVE"/>
		<reference ref_id="CVE-2009-2666" ref_url="https://www.suse.com/security/cve/CVE-2009-2666/" source="CVE"/>
		<reference ref_id="CVE-2011-1947" ref_url="https://www.suse.com/security/cve/CVE-2011-1947/" source="CVE"/>
		<description>
These are all security issues fixed in the fetchmail-6.3.8.90-13.20.19.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5867/">CVE-2006-5867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5867">CVE-2006-5867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5974/">CVE-2006-5974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5974">CVE-2006-5974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1558/">CVE-2007-1558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1558">CVE-2007-1558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4565/">CVE-2007-4565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4565">CVE-2007-4565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2666/">CVE-2009-2666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2666">CVE-2009-2666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1947/">CVE-2011-1947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1947">CVE-2011-1947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989061" comment="fetchmail-6.3.8.90-13.20.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989062" comment="fetchmailconf-6.3.8.90-13.20.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216239" version="1" class="patch">
	<metadata>
		<title>file-32bit-4.24-43.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-1536" ref_url="https://www.suse.com/security/cve/CVE-2007-1536/" source="CVE"/>
		<reference ref_id="CVE-2007-2799" ref_url="https://www.suse.com/security/cve/CVE-2007-2799/" source="CVE"/>
		<reference ref_id="CVE-2014-3710" ref_url="https://www.suse.com/security/cve/CVE-2014-3710/" source="CVE"/>
		<description>
These are all security issues fixed in the file-32bit-4.24-43.27.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1536/">CVE-2007-1536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1536">CVE-2007-1536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2799/">CVE-2007-2799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2799">CVE-2007-2799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3710/">CVE-2014-3710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3710">CVE-2014-3710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990258" comment="file-4.24-43.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990259" comment="file-32bit-4.24-43.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990260" comment="file-x86-4.24-43.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216240" version="1" class="patch">
	<metadata>
		<title>findutils-4.4.0-38.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-2452" ref_url="https://www.suse.com/security/cve/CVE-2007-2452/" source="CVE"/>
		<description>
These are all security issues fixed in the findutils-4.4.0-38.26.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2452/">CVE-2007-2452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2452">CVE-2007-2452 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989066" comment="findutils-4.4.0-38.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989067" comment="findutils-locate-4.4.0-38.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216241" version="1" class="patch">
	<metadata>
		<title>foomatic-filters-3.0.2-269.35.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-2697" ref_url="https://www.suse.com/security/cve/CVE-2011-2697/" source="CVE"/>
		<description>
These are all security issues fixed in the foomatic-filters-3.0.2-269.35.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2697/">CVE-2011-2697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2697">CVE-2011-2697 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989068" comment="foomatic-filters-3.0.2-269.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216242" version="1" class="patch">
	<metadata>
		<title>freeradius-server-2.1.1-7.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-4474" ref_url="https://www.suse.com/security/cve/CVE-2008-4474/" source="CVE"/>
		<reference ref_id="CVE-2011-4966" ref_url="https://www.suse.com/security/cve/CVE-2011-4966/" source="CVE"/>
		<reference ref_id="CVE-2014-2015" ref_url="https://www.suse.com/security/cve/CVE-2014-2015/" source="CVE"/>
		<description>
These are all security issues fixed in the freeradius-server-2.1.1-7.18.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4474/">CVE-2008-4474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4474">CVE-2008-4474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4966/">CVE-2011-4966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4966">CVE-2011-4966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2015/">CVE-2014-2015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2015">CVE-2014-2015 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990261" comment="freeradius-server-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990262" comment="freeradius-server-dialupadmin-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990263" comment="freeradius-server-doc-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990264" comment="freeradius-server-libs-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990265" comment="freeradius-server-utils-2.1.1-7.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216243" version="1" class="patch">
	<metadata>
		<title>freetype2-2.3.7-25.35.36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-1351" ref_url="https://www.suse.com/security/cve/CVE-2007-1351/" source="CVE"/>
		<reference ref_id="CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946/" source="CVE"/>
		<reference ref_id="CVE-2010-2497" ref_url="https://www.suse.com/security/cve/CVE-2010-2497/" source="CVE"/>
		<reference ref_id="CVE-2010-2805" ref_url="https://www.suse.com/security/cve/CVE-2010-2805/" source="CVE"/>
		<reference ref_id="CVE-2010-3053" ref_url="https://www.suse.com/security/cve/CVE-2010-3053/" source="CVE"/>
		<reference ref_id="CVE-2010-3054" ref_url="https://www.suse.com/security/cve/CVE-2010-3054/" source="CVE"/>
		<reference ref_id="CVE-2010-3311" ref_url="https://www.suse.com/security/cve/CVE-2010-3311/" source="CVE"/>
		<reference ref_id="CVE-2010-3814" ref_url="https://www.suse.com/security/cve/CVE-2010-3814/" source="CVE"/>
		<reference ref_id="CVE-2010-3855" ref_url="https://www.suse.com/security/cve/CVE-2010-3855/" source="CVE"/>
		<reference ref_id="CVE-2011-0226" ref_url="https://www.suse.com/security/cve/CVE-2011-0226/" source="CVE"/>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<reference ref_id="CVE-2011-3256" ref_url="https://www.suse.com/security/cve/CVE-2011-3256/" source="CVE"/>
		<reference ref_id="CVE-2011-3439" ref_url="https://www.suse.com/security/cve/CVE-2011-3439/" source="CVE"/>
		<reference ref_id="CVE-2012-1126" ref_url="https://www.suse.com/security/cve/CVE-2012-1126/" source="CVE"/>
		<reference ref_id="CVE-2012-1127" ref_url="https://www.suse.com/security/cve/CVE-2012-1127/" source="CVE"/>
		<reference ref_id="CVE-2012-1128" ref_url="https://www.suse.com/security/cve/CVE-2012-1128/" source="CVE"/>
		<reference ref_id="CVE-2012-1129" ref_url="https://www.suse.com/security/cve/CVE-2012-1129/" source="CVE"/>
		<reference ref_id="CVE-2012-1130" ref_url="https://www.suse.com/security/cve/CVE-2012-1130/" source="CVE"/>
		<reference ref_id="CVE-2012-1131" ref_url="https://www.suse.com/security/cve/CVE-2012-1131/" source="CVE"/>
		<reference ref_id="CVE-2012-1132" ref_url="https://www.suse.com/security/cve/CVE-2012-1132/" source="CVE"/>
		<reference ref_id="CVE-2012-1133" ref_url="https://www.suse.com/security/cve/CVE-2012-1133/" source="CVE"/>
		<reference ref_id="CVE-2012-1134" ref_url="https://www.suse.com/security/cve/CVE-2012-1134/" source="CVE"/>
		<reference ref_id="CVE-2012-1135" ref_url="https://www.suse.com/security/cve/CVE-2012-1135/" source="CVE"/>
		<reference ref_id="CVE-2012-1136" ref_url="https://www.suse.com/security/cve/CVE-2012-1136/" source="CVE"/>
		<reference ref_id="CVE-2012-1137" ref_url="https://www.suse.com/security/cve/CVE-2012-1137/" source="CVE"/>
		<reference ref_id="CVE-2012-1138" ref_url="https://www.suse.com/security/cve/CVE-2012-1138/" source="CVE"/>
		<reference ref_id="CVE-2012-1139" ref_url="https://www.suse.com/security/cve/CVE-2012-1139/" source="CVE"/>
		<reference ref_id="CVE-2012-1140" ref_url="https://www.suse.com/security/cve/CVE-2012-1140/" source="CVE"/>
		<reference ref_id="CVE-2012-1141" ref_url="https://www.suse.com/security/cve/CVE-2012-1141/" source="CVE"/>
		<reference ref_id="CVE-2012-1142" ref_url="https://www.suse.com/security/cve/CVE-2012-1142/" source="CVE"/>
		<reference ref_id="CVE-2012-1143" ref_url="https://www.suse.com/security/cve/CVE-2012-1143/" source="CVE"/>
		<reference ref_id="CVE-2012-1144" ref_url="https://www.suse.com/security/cve/CVE-2012-1144/" source="CVE"/>
		<reference ref_id="CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668/" source="CVE"/>
		<reference ref_id="CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669/" source="CVE"/>
		<reference ref_id="CVE-2012-5670" ref_url="https://www.suse.com/security/cve/CVE-2012-5670/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<description>
These are all security issues fixed in the freetype2-2.3.7-25.35.36.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1351/">CVE-2007-1351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1351">CVE-2007-1351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0946">CVE-2009-0946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2497/">CVE-2010-2497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2497">CVE-2010-2497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2805/">CVE-2010-2805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2805">CVE-2010-2805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3053/">CVE-2010-3053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3053">CVE-2010-3053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3054/">CVE-2010-3054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3054">CVE-2010-3054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3311/">CVE-2010-3311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3311">CVE-2010-3311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3814/">CVE-2010-3814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3814">CVE-2010-3814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3855/">CVE-2010-3855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3855">CVE-2010-3855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0226/">CVE-2011-0226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0226">CVE-2011-0226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2895">CVE-2011-2895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3256/">CVE-2011-3256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3256">CVE-2011-3256 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3439/">CVE-2011-3439 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3439">CVE-2011-3439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1126/">CVE-2012-1126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1126">CVE-2012-1126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1127/">CVE-2012-1127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1127">CVE-2012-1127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1128/">CVE-2012-1128 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1128">CVE-2012-1128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1129/">CVE-2012-1129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1129">CVE-2012-1129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1130/">CVE-2012-1130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1130">CVE-2012-1130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1131/">CVE-2012-1131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1131">CVE-2012-1131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1132/">CVE-2012-1132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1132">CVE-2012-1132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1133/">CVE-2012-1133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1133">CVE-2012-1133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1134/">CVE-2012-1134 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1134">CVE-2012-1134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1135/">CVE-2012-1135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1135">CVE-2012-1135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1136/">CVE-2012-1136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1136">CVE-2012-1136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1137/">CVE-2012-1137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1137">CVE-2012-1137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1138/">CVE-2012-1138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1138">CVE-2012-1138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1139/">CVE-2012-1139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1139">CVE-2012-1139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1140/">CVE-2012-1140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1140">CVE-2012-1140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1141/">CVE-2012-1141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1141">CVE-2012-1141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1142/">CVE-2012-1142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1142">CVE-2012-1142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1143/">CVE-2012-1143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1143">CVE-2012-1143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1144/">CVE-2012-1144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1144">CVE-2012-1144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5668">CVE-2012-5668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5669">CVE-2012-5669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5670/">CVE-2012-5670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5670">CVE-2012-5670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9657">CVE-2014-9657 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9658">CVE-2014-9658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9660">CVE-2014-9660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9661">CVE-2014-9661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9663">CVE-2014-9663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9664">CVE-2014-9664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9665">CVE-2014-9665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9667">CVE-2014-9667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9669">CVE-2014-9669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9670">CVE-2014-9670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9671">CVE-2014-9671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9672">CVE-2014-9672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9673">CVE-2014-9673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9674">CVE-2014-9674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9675">CVE-2014-9675 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990266" comment="freetype2-2.3.7-25.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990267" comment="freetype2-32bit-2.3.7-25.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990268" comment="freetype2-x86-2.3.7-25.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990269" comment="ft2demos-2.3.7-25.35.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216244" version="1" class="patch">
	<metadata>
		<title>fuse-2.8.7-0.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-3297" ref_url="https://www.suse.com/security/cve/CVE-2009-3297/" source="CVE"/>
		<reference ref_id="CVE-2011-0541" ref_url="https://www.suse.com/security/cve/CVE-2011-0541/" source="CVE"/>
		<reference ref_id="CVE-2015-3202" ref_url="https://www.suse.com/security/cve/CVE-2015-3202/" source="CVE"/>
		<description>
These are all security issues fixed in the fuse-2.8.7-0.11.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3297/">CVE-2009-3297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3297">CVE-2009-3297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0541/">CVE-2011-0541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0541">CVE-2011-0541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3202/">CVE-2015-3202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3202">CVE-2015-3202 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990270" comment="fuse-2.8.7-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990271" comment="libfuse2-2.8.7-0.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216245" version="1" class="patch">
	<metadata>
		<title>fvwm2-2.5.26-1.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-5969" ref_url="https://www.suse.com/security/cve/CVE-2006-5969/" source="CVE"/>
		<description>
These are all security issues fixed in the fvwm2-2.5.26-1.25 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5969/">CVE-2006-5969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5969">CVE-2006-5969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988500" comment="fvwm2-2.5.26-1.25 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216246" version="1" class="patch">
	<metadata>
		<title>g3utils-1.1.36-26.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-4936" ref_url="https://www.suse.com/security/cve/CVE-2008-4936/" source="CVE"/>
		<description>
These are all security issues fixed in the g3utils-1.1.36-26.31 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4936/">CVE-2008-4936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4936">CVE-2008-4936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988501" comment="g3utils-1.1.36-26.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988502" comment="mgetty-1.1.36-26.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216247" version="1" class="patch">
	<metadata>
		<title>gd-2.0.36.RC1-52.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-2756" ref_url="https://www.suse.com/security/cve/CVE-2007-2756/" source="CVE"/>
		<reference ref_id="CVE-2014-9709" ref_url="https://www.suse.com/security/cve/CVE-2014-9709/" source="CVE"/>
		<description>
These are all security issues fixed in the gd-2.0.36.RC1-52.20.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2756/">CVE-2007-2756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2756">CVE-2007-2756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9709/">CVE-2014-9709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9709">CVE-2014-9709 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990272" comment="gd-2.0.36.RC1-52.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216248" version="1" class="patch">
	<metadata>
		<title>ghostscript-fonts-other-8.62-32.34.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0196" ref_url="https://www.suse.com/security/cve/CVE-2009-0196/" source="CVE"/>
		<reference ref_id="CVE-2009-0583" ref_url="https://www.suse.com/security/cve/CVE-2009-0583/" source="CVE"/>
		<reference ref_id="CVE-2009-0584" ref_url="https://www.suse.com/security/cve/CVE-2009-0584/" source="CVE"/>
		<reference ref_id="CVE-2009-0792" ref_url="https://www.suse.com/security/cve/CVE-2009-0792/" source="CVE"/>
		<reference ref_id="CVE-2009-3743" ref_url="https://www.suse.com/security/cve/CVE-2009-3743/" source="CVE"/>
		<reference ref_id="CVE-2010-1869" ref_url="https://www.suse.com/security/cve/CVE-2010-1869/" source="CVE"/>
		<reference ref_id="CVE-2010-4054" ref_url="https://www.suse.com/security/cve/CVE-2010-4054/" source="CVE"/>
		<reference ref_id="CVE-2012-4405" ref_url="https://www.suse.com/security/cve/CVE-2012-4405/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-fonts-other-8.62-32.34.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0196/">CVE-2009-0196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0196">CVE-2009-0196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0583/">CVE-2009-0583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0583">CVE-2009-0583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0584/">CVE-2009-0584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0584">CVE-2009-0584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0792/">CVE-2009-0792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0792">CVE-2009-0792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3743/">CVE-2009-3743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3743">CVE-2009-3743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1869/">CVE-2010-1869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1869">CVE-2010-1869 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4054/">CVE-2010-4054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4054">CVE-2010-4054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4405/">CVE-2012-4405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4405">CVE-2012-4405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989669" comment="ghostscript-fonts-other-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989670" comment="ghostscript-fonts-rus-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989671" comment="ghostscript-fonts-std-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989672" comment="ghostscript-library-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989673" comment="ghostscript-omni-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989674" comment="ghostscript-x11-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989675" comment="libgimpprint-4.2.7-32.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216249" version="1" class="patch">
	<metadata>
		<title>glib2-2.22.5-0.8.14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-2371" ref_url="https://www.suse.com/security/cve/CVE-2008-2371/" source="CVE"/>
		<reference ref_id="CVE-2008-4316" ref_url="https://www.suse.com/security/cve/CVE-2008-4316/" source="CVE"/>
		<description>
These are all security issues fixed in the glib2-2.22.5-0.8.14.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2371/">CVE-2008-2371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2371">CVE-2008-2371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4316/">CVE-2008-4316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4316">CVE-2008-4316 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990273" comment="glib2-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990274" comment="glib2-doc-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990275" comment="glib2-lang-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990276" comment="libgio-2_0-0-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990277" comment="libgio-2_0-0-32bit-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990278" comment="libgio-2_0-0-x86-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990279" comment="libglib-2_0-0-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990280" comment="libglib-2_0-0-32bit-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990281" comment="libglib-2_0-0-x86-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990282" comment="libgmodule-2_0-0-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990283" comment="libgmodule-2_0-0-32bit-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990284" comment="libgmodule-2_0-0-x86-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990285" comment="libgobject-2_0-0-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990286" comment="libgobject-2_0-0-32bit-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990287" comment="libgobject-2_0-0-x86-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990288" comment="libgthread-2_0-0-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990289" comment="libgthread-2_0-0-32bit-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990290" comment="libgthread-2_0-0-x86-2.22.5-0.8.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216250" version="1" class="patch">
	<metadata>
		<title>glibc-2.11.3-17.84.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-5029" ref_url="https://www.suse.com/security/cve/CVE-2009-5029/" source="CVE"/>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<reference ref_id="CVE-2012-4412" ref_url="https://www.suse.com/security/cve/CVE-2012-4412/" source="CVE"/>
		<reference ref_id="CVE-2012-6656" ref_url="https://www.suse.com/security/cve/CVE-2012-6656/" source="CVE"/>
		<reference ref_id="CVE-2013-0242" ref_url="https://www.suse.com/security/cve/CVE-2013-0242/" source="CVE"/>
		<reference ref_id="CVE-2013-1914" ref_url="https://www.suse.com/security/cve/CVE-2013-1914/" source="CVE"/>
		<reference ref_id="CVE-2013-4237" ref_url="https://www.suse.com/security/cve/CVE-2013-4237/" source="CVE"/>
		<reference ref_id="CVE-2013-4332" ref_url="https://www.suse.com/security/cve/CVE-2013-4332/" source="CVE"/>
		<reference ref_id="CVE-2013-4357" ref_url="https://www.suse.com/security/cve/CVE-2013-4357/" source="CVE"/>
		<reference ref_id="CVE-2013-4458" ref_url="https://www.suse.com/security/cve/CVE-2013-4458/" source="CVE"/>
		<reference ref_id="CVE-2013-4788" ref_url="https://www.suse.com/security/cve/CVE-2013-4788/" source="CVE"/>
		<reference ref_id="CVE-2013-7423" ref_url="https://www.suse.com/security/cve/CVE-2013-7423/" source="CVE"/>
		<reference ref_id="CVE-2014-0475" ref_url="https://www.suse.com/security/cve/CVE-2014-0475/" source="CVE"/>
		<reference ref_id="CVE-2014-4043" ref_url="https://www.suse.com/security/cve/CVE-2014-4043/" source="CVE"/>
		<reference ref_id="CVE-2014-5119" ref_url="https://www.suse.com/security/cve/CVE-2014-5119/" source="CVE"/>
		<reference ref_id="CVE-2014-6040" ref_url="https://www.suse.com/security/cve/CVE-2014-6040/" source="CVE"/>
		<reference ref_id="CVE-2014-7817" ref_url="https://www.suse.com/security/cve/CVE-2014-7817/" source="CVE"/>
		<reference ref_id="CVE-2014-9402" ref_url="https://www.suse.com/security/cve/CVE-2014-9402/" source="CVE"/>
		<reference ref_id="CVE-2015-0235" ref_url="https://www.suse.com/security/cve/CVE-2015-0235/" source="CVE"/>
		<reference ref_id="CVE-2015-1472" ref_url="https://www.suse.com/security/cve/CVE-2015-1472/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.11.3-17.84.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5029/">CVE-2009-5029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5029">CVE-2009-5029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2483">CVE-2011-2483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4412/">CVE-2012-4412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4412">CVE-2012-4412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6656/">CVE-2012-6656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6656">CVE-2012-6656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0242/">CVE-2013-0242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0242">CVE-2013-0242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1914/">CVE-2013-1914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1914">CVE-2013-1914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4237/">CVE-2013-4237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4237">CVE-2013-4237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4332/">CVE-2013-4332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4332">CVE-2013-4332 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4357/">CVE-2013-4357 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4357">CVE-2013-4357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4458/">CVE-2013-4458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4458">CVE-2013-4458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4788/">CVE-2013-4788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4788">CVE-2013-4788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7423/">CVE-2013-7423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7423">CVE-2013-7423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0475/">CVE-2014-0475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0475">CVE-2014-0475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4043/">CVE-2014-4043 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4043">CVE-2014-4043 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5119/">CVE-2014-5119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5119">CVE-2014-5119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6040/">CVE-2014-6040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6040">CVE-2014-6040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7817/">CVE-2014-7817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7817">CVE-2014-7817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9402/">CVE-2014-9402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9402">CVE-2014-9402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0235/">CVE-2015-0235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0235">CVE-2015-0235 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1472/">CVE-2015-1472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1472">CVE-2015-1472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990291" comment="glibc-2.11.3-17.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990292" comment="glibc-32bit-2.11.3-17.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990293" comment="glibc-devel-2.11.3-17.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990294" comment="glibc-devel-32bit-2.11.3-17.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990295" comment="glibc-html-2.11.3-17.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990296" comment="glibc-i18ndata-2.11.3-17.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990297" comment="glibc-info-2.11.3-17.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990298" comment="glibc-locale-2.11.3-17.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990299" comment="glibc-locale-32bit-2.11.3-17.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990300" comment="glibc-locale-x86-2.11.3-17.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990301" comment="glibc-profile-2.11.3-17.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990302" comment="glibc-profile-32bit-2.11.3-17.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990303" comment="glibc-profile-x86-2.11.3-17.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990304" comment="glibc-x86-2.11.3-17.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990305" comment="nscd-2.11.3-17.84.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216251" version="1" class="patch">
	<metadata>
		<title>gmime-2.2.23-1.50.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-0409" ref_url="https://www.suse.com/security/cve/CVE-2010-0409/" source="CVE"/>
		<description>
These are all security issues fixed in the gmime-2.2.23-1.50.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0409/">CVE-2010-0409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0409">CVE-2010-0409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989097" comment="gmime-2.2.23-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988530" comment="gmime-2_4-2.4.8-1.2.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989098" comment="gmime-doc-2.2.23-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989099" comment="libgmime-2_0-3-2.2.23-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988533" comment="libgmime-2_4-2-2.4.8-1.2.55 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216252" version="1" class="patch">
	<metadata>
		<title>gnome-screensaver-2.28.3-0.39.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-0887" ref_url="https://www.suse.com/security/cve/CVE-2008-0887/" source="CVE"/>
		<reference ref_id="CVE-2010-0414" ref_url="https://www.suse.com/security/cve/CVE-2010-0414/" source="CVE"/>
		<reference ref_id="CVE-2010-0422" ref_url="https://www.suse.com/security/cve/CVE-2010-0422/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-screensaver-2.28.3-0.39.17 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0887/">CVE-2008-0887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0887">CVE-2008-0887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0414/">CVE-2010-0414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0414">CVE-2010-0414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0422/">CVE-2010-0422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0422">CVE-2010-0422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990306" comment="gnome-screensaver-2.28.3-0.39.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990307" comment="gnome-screensaver-lang-2.28.3-0.39.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216253" version="1" class="patch">
	<metadata>
		<title>gnutls-2.4.1-24.39.55.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-4790" ref_url="https://www.suse.com/security/cve/CVE-2006-4790/" source="CVE"/>
		<reference ref_id="CVE-2008-1948" ref_url="https://www.suse.com/security/cve/CVE-2008-1948/" source="CVE"/>
		<reference ref_id="CVE-2008-1949" ref_url="https://www.suse.com/security/cve/CVE-2008-1949/" source="CVE"/>
		<reference ref_id="CVE-2008-1950" ref_url="https://www.suse.com/security/cve/CVE-2008-1950/" source="CVE"/>
		<reference ref_id="CVE-2008-4989" ref_url="https://www.suse.com/security/cve/CVE-2008-4989/" source="CVE"/>
		<reference ref_id="CVE-2009-2730" ref_url="https://www.suse.com/security/cve/CVE-2009-2730/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-5138" ref_url="https://www.suse.com/security/cve/CVE-2009-5138/" source="CVE"/>
		<reference ref_id="CVE-2011-4128" ref_url="https://www.suse.com/security/cve/CVE-2011-4128/" source="CVE"/>
		<reference ref_id="CVE-2012-0390" ref_url="https://www.suse.com/security/cve/CVE-2012-0390/" source="CVE"/>
		<reference ref_id="CVE-2012-1569" ref_url="https://www.suse.com/security/cve/CVE-2012-1569/" source="CVE"/>
		<reference ref_id="CVE-2012-1573" ref_url="https://www.suse.com/security/cve/CVE-2012-1573/" source="CVE"/>
		<reference ref_id="CVE-2013-1619" ref_url="https://www.suse.com/security/cve/CVE-2013-1619/" source="CVE"/>
		<reference ref_id="CVE-2013-2116" ref_url="https://www.suse.com/security/cve/CVE-2013-2116/" source="CVE"/>
		<reference ref_id="CVE-2014-0092" ref_url="https://www.suse.com/security/cve/CVE-2014-0092/" source="CVE"/>
		<reference ref_id="CVE-2014-3466" ref_url="https://www.suse.com/security/cve/CVE-2014-3466/" source="CVE"/>
		<reference ref_id="CVE-2014-3467" ref_url="https://www.suse.com/security/cve/CVE-2014-3467/" source="CVE"/>
		<reference ref_id="CVE-2014-3468" ref_url="https://www.suse.com/security/cve/CVE-2014-3468/" source="CVE"/>
		<reference ref_id="CVE-2014-3469" ref_url="https://www.suse.com/security/cve/CVE-2014-3469/" source="CVE"/>
		<reference ref_id="CVE-2015-0282" ref_url="https://www.suse.com/security/cve/CVE-2015-0282/" source="CVE"/>
		<reference ref_id="CVE-2015-0294" ref_url="https://www.suse.com/security/cve/CVE-2015-0294/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-2.4.1-24.39.55.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4790/">CVE-2006-4790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4790">CVE-2006-4790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1948/">CVE-2008-1948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1948">CVE-2008-1948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1949/">CVE-2008-1949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1949">CVE-2008-1949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1950/">CVE-2008-1950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1950">CVE-2008-1950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4989/">CVE-2008-4989 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2008-4989">CVE-2008-4989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2730/">CVE-2009-2730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2730">CVE-2009-2730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5138/">CVE-2009-5138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5138">CVE-2009-5138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4128/">CVE-2011-4128 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4128">CVE-2011-4128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0390/">CVE-2012-0390 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0390">CVE-2012-0390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1569/">CVE-2012-1569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1569">CVE-2012-1569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1573/">CVE-2012-1573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1573">CVE-2012-1573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1619/">CVE-2013-1619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1619">CVE-2013-1619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2116/">CVE-2013-2116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2116">CVE-2013-2116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0092/">CVE-2014-0092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0092">CVE-2014-0092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3466/">CVE-2014-3466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3466">CVE-2014-3466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3467/">CVE-2014-3467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3467">CVE-2014-3467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3468/">CVE-2014-3468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3468">CVE-2014-3468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3469/">CVE-2014-3469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3469">CVE-2014-3469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0282/">CVE-2015-0282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0282">CVE-2015-0282 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0294/">CVE-2015-0294 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0294">CVE-2015-0294 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990308" comment="gnutls-2.4.1-24.39.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990309" comment="libgnutls-extra26-2.4.1-24.39.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990310" comment="libgnutls26-2.4.1-24.39.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990311" comment="libgnutls26-32bit-2.4.1-24.39.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990312" comment="libgnutls26-x86-2.4.1-24.39.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216254" version="1" class="patch">
	<metadata>
		<title>gpg2-2.0.9-25.33.39.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-3746" ref_url="https://www.suse.com/security/cve/CVE-2006-3746/" source="CVE"/>
		<reference ref_id="CVE-2006-6169" ref_url="https://www.suse.com/security/cve/CVE-2006-6169/" source="CVE"/>
		<reference ref_id="CVE-2008-1530" ref_url="https://www.suse.com/security/cve/CVE-2008-1530/" source="CVE"/>
		<reference ref_id="CVE-2010-2547" ref_url="https://www.suse.com/security/cve/CVE-2010-2547/" source="CVE"/>
		<reference ref_id="CVE-2012-6085" ref_url="https://www.suse.com/security/cve/CVE-2012-6085/" source="CVE"/>
		<reference ref_id="CVE-2013-4351" ref_url="https://www.suse.com/security/cve/CVE-2013-4351/" source="CVE"/>
		<reference ref_id="CVE-2013-4402" ref_url="https://www.suse.com/security/cve/CVE-2013-4402/" source="CVE"/>
		<reference ref_id="CVE-2014-4617" ref_url="https://www.suse.com/security/cve/CVE-2014-4617/" source="CVE"/>
		<description>
These are all security issues fixed in the gpg2-2.0.9-25.33.39.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3746/">CVE-2006-3746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3746">CVE-2006-3746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6169/">CVE-2006-6169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6169">CVE-2006-6169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1530/">CVE-2008-1530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1530">CVE-2008-1530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2547/">CVE-2010-2547 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2547">CVE-2010-2547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6085/">CVE-2012-6085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6085">CVE-2012-6085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4351/">CVE-2013-4351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4351">CVE-2013-4351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4402/">CVE-2013-4402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4402">CVE-2013-4402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4617/">CVE-2014-4617 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4617">CVE-2014-4617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990313" comment="gpg2-2.0.9-25.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990314" comment="gpg2-lang-2.0.9-25.33.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216255" version="1" class="patch">
	<metadata>
		<title>gpgme-1.1.6-25.32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3564" ref_url="https://www.suse.com/security/cve/CVE-2014-3564/" source="CVE"/>
		<description>
These are all security issues fixed in the gpgme-1.1.6-25.32.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3564/">CVE-2014-3564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3564">CVE-2014-3564 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990315" comment="gpgme-1.1.6-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990316" comment="libgpgme11-1.1.6-25.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216256" version="1" class="patch">
	<metadata>
		<title>gstreamer-0_10-plugins-base-0.10.35-5.15.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0586" ref_url="https://www.suse.com/security/cve/CVE-2009-0586/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-0_10-plugins-base-0.10.35-5.15.8 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0586/">CVE-2009-0586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0586">CVE-2009-0586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989108" comment="gstreamer-0_10-plugins-base-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989109" comment="gstreamer-0_10-plugins-base-32bit-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989110" comment="gstreamer-0_10-plugins-base-doc-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989111" comment="gstreamer-0_10-plugins-base-lang-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989112" comment="gstreamer-0_10-plugins-base-x86-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989113" comment="libgstapp-0_10-0-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989114" comment="libgstapp-0_10-0-32bit-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989115" comment="libgstapp-0_10-0-x86-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989116" comment="libgstinterfaces-0_10-0-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989117" comment="libgstinterfaces-0_10-0-32bit-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989118" comment="libgstinterfaces-0_10-0-x86-0.10.35-5.15.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216257" version="1" class="patch">
	<metadata>
		<title>gstreamer-0_10-plugins-good-0.10.30-5.12.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-1686" ref_url="https://www.suse.com/security/cve/CVE-2008-1686/" source="CVE"/>
		<reference ref_id="CVE-2009-0386" ref_url="https://www.suse.com/security/cve/CVE-2009-0386/" source="CVE"/>
		<reference ref_id="CVE-2009-0387" ref_url="https://www.suse.com/security/cve/CVE-2009-0387/" source="CVE"/>
		<reference ref_id="CVE-2009-0397" ref_url="https://www.suse.com/security/cve/CVE-2009-0397/" source="CVE"/>
		<reference ref_id="CVE-2009-1932" ref_url="https://www.suse.com/security/cve/CVE-2009-1932/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-0_10-plugins-good-0.10.30-5.12.15 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1686/">CVE-2008-1686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1686">CVE-2008-1686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0386/">CVE-2009-0386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0386">CVE-2009-0386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0387/">CVE-2009-0387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0387">CVE-2009-0387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0397/">CVE-2009-0397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0397">CVE-2009-0397 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1932/">CVE-2009-1932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1932">CVE-2009-1932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990317" comment="gstreamer-0_10-plugins-good-0.10.30-5.12.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990318" comment="gstreamer-0_10-plugins-good-doc-0.10.30-5.12.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990319" comment="gstreamer-0_10-plugins-good-lang-0.10.30-5.12.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216258" version="1" class="patch">
	<metadata>
		<title>gtk2-2.18.9-0.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-0010" ref_url="https://www.suse.com/security/cve/CVE-2007-0010/" source="CVE"/>
		<reference ref_id="CVE-2011-2485" ref_url="https://www.suse.com/security/cve/CVE-2011-2485/" source="CVE"/>
		<reference ref_id="CVE-2012-2370" ref_url="https://www.suse.com/security/cve/CVE-2012-2370/" source="CVE"/>
		<description>
These are all security issues fixed in the gtk2-2.18.9-0.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0010/">CVE-2007-0010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0010">CVE-2007-0010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2485/">CVE-2011-2485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2485">CVE-2011-2485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2370/">CVE-2012-2370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2370">CVE-2012-2370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989718" comment="gtk2-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989719" comment="gtk2-32bit-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989720" comment="gtk2-doc-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989721" comment="gtk2-lang-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989722" comment="gtk2-x86-2.18.9-0.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216259" version="1" class="patch">
	<metadata>
		<title>guestfs-data-1.20.12-0.18.70 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-2124" ref_url="https://www.suse.com/security/cve/CVE-2013-2124/" source="CVE"/>
		<reference ref_id="CVE-2013-4419" ref_url="https://www.suse.com/security/cve/CVE-2013-4419/" source="CVE"/>
		<description>
These are all security issues fixed in the guestfs-data-1.20.12-0.18.70 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2124/">CVE-2013-2124 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2124">CVE-2013-2124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4419/">CVE-2013-4419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4419">CVE-2013-4419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990320" comment="guestfs-data-1.20.12-0.18.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990321" comment="guestfs-tools-1.20.12-0.18.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990322" comment="guestfsd-1.20.12-0.18.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990323" comment="libguestfs0-1.20.12-0.18.70 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216260" version="1" class="patch">
	<metadata>
		<title>gvim-7.2-8.15.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-2438" ref_url="https://www.suse.com/security/cve/CVE-2007-2438/" source="CVE"/>
		<reference ref_id="CVE-2007-2953" ref_url="https://www.suse.com/security/cve/CVE-2007-2953/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-7.2-8.15.2 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2438/">CVE-2007-2438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2438">CVE-2007-2438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2953/">CVE-2007-2953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2953">CVE-2007-2953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989127" comment="gvim-7.2-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989128" comment="vim-7.2-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989129" comment="vim-base-7.2-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989130" comment="vim-data-7.2-8.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216261" version="1" class="patch">
	<metadata>
		<title>gzip-1.3.12-69.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-2624" ref_url="https://www.suse.com/security/cve/CVE-2009-2624/" source="CVE"/>
		<reference ref_id="CVE-2010-0001" ref_url="https://www.suse.com/security/cve/CVE-2010-0001/" source="CVE"/>
		<description>
These are all security issues fixed in the gzip-1.3.12-69.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2624/">CVE-2009-2624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2624">CVE-2009-2624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0001/">CVE-2010-0001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0001">CVE-2010-0001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989727" comment="gzip-1.3.12-69.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216262" version="1" class="patch">
	<metadata>
		<title>hplip-3.11.10-0.6.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2004-0801" ref_url="https://www.suse.com/security/cve/CVE-2004-0801/" source="CVE"/>
		<reference ref_id="CVE-2007-5208" ref_url="https://www.suse.com/security/cve/CVE-2007-5208/" source="CVE"/>
		<reference ref_id="CVE-2010-4267" ref_url="https://www.suse.com/security/cve/CVE-2010-4267/" source="CVE"/>
		<reference ref_id="CVE-2011-2697" ref_url="https://www.suse.com/security/cve/CVE-2011-2697/" source="CVE"/>
		<reference ref_id="CVE-2011-2722" ref_url="https://www.suse.com/security/cve/CVE-2011-2722/" source="CVE"/>
		<reference ref_id="CVE-2013-0200" ref_url="https://www.suse.com/security/cve/CVE-2013-0200/" source="CVE"/>
		<reference ref_id="CVE-2013-4288" ref_url="https://www.suse.com/security/cve/CVE-2013-4288/" source="CVE"/>
		<reference ref_id="CVE-2013-4325" ref_url="https://www.suse.com/security/cve/CVE-2013-4325/" source="CVE"/>
		<reference ref_id="CVE-2013-6402" ref_url="https://www.suse.com/security/cve/CVE-2013-6402/" source="CVE"/>
		<description>
These are all security issues fixed in the hplip-3.11.10-0.6.11.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2004-0801/">CVE-2004-0801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-0801">CVE-2004-0801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5208/">CVE-2007-5208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5208">CVE-2007-5208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4267/">CVE-2010-4267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4267">CVE-2010-4267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2697/">CVE-2011-2697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2697">CVE-2011-2697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2722/">CVE-2011-2722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2722">CVE-2011-2722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0200/">CVE-2013-0200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0200">CVE-2013-0200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4288/">CVE-2013-4288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4288">CVE-2013-4288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4325/">CVE-2013-4325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4325">CVE-2013-4325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6402/">CVE-2013-6402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6402">CVE-2013-6402 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990324" comment="hplip-3.11.10-0.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990325" comment="hplip-hpijs-3.11.10-0.6.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216263" version="1" class="patch">
	<metadata>
		<title>hyper-v-6-3.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-2669" ref_url="https://www.suse.com/security/cve/CVE-2012-2669/" source="CVE"/>
		<reference ref_id="CVE-2012-5532" ref_url="https://www.suse.com/security/cve/CVE-2012-5532/" source="CVE"/>
		<description>
These are all security issues fixed in the hyper-v-6-3.5 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2669/">CVE-2012-2669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2669">CVE-2012-2669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5532/">CVE-2012-5532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5532">CVE-2012-5532 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990326" comment="hyper-v-6-3.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216264" version="1" class="patch">
	<metadata>
		<title>ibutils-1.5.7-0.15.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-3277" ref_url="https://www.suse.com/security/cve/CVE-2008-3277/" source="CVE"/>
		<reference ref_id="CVE-2013-1894" ref_url="https://www.suse.com/security/cve/CVE-2013-1894/" source="CVE"/>
		<description>
These are all security issues fixed in the ibutils-1.5.7-0.15.22 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3277/">CVE-2008-3277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3277">CVE-2008-3277 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1894/">CVE-2013-1894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1894">CVE-2013-1894 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990327" comment="ibutils-1.5.7-0.15.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990328" comment="ibutils-32bit-1.5.7-0.15.22 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216265" version="1" class="patch">
	<metadata>
		<title>ipsec-tools-0.7.3-1.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-1841" ref_url="https://www.suse.com/security/cve/CVE-2007-1841/" source="CVE"/>
		<reference ref_id="CVE-2008-3652" ref_url="https://www.suse.com/security/cve/CVE-2008-3652/" source="CVE"/>
		<description>
These are all security issues fixed in the ipsec-tools-0.7.3-1.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1841/">CVE-2007-1841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1841">CVE-2007-1841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3652/">CVE-2008-3652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3652">CVE-2008-3652 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990329" comment="ipsec-tools-0.7.3-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216266" version="1" class="patch">
	<metadata>
		<title>jakarta-commons-fileupload-1.1.1-1.37.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-2186" ref_url="https://www.suse.com/security/cve/CVE-2013-2186/" source="CVE"/>
		<reference ref_id="CVE-2014-0050" ref_url="https://www.suse.com/security/cve/CVE-2014-0050/" source="CVE"/>
		<description>
These are all security issues fixed in the jakarta-commons-fileupload-1.1.1-1.37.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2186/">CVE-2013-2186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2186">CVE-2013-2186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0050/">CVE-2014-0050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0050">CVE-2014-0050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990330" comment="jakarta-commons-fileupload-1.1.1-1.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990331" comment="jakarta-commons-fileupload-javadoc-1.1.1-1.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216267" version="1" class="patch">
	<metadata>
		<title>jakarta-commons-httpclient3-3.0.1-253.36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-5783" ref_url="https://www.suse.com/security/cve/CVE-2012-5783/" source="CVE"/>
		<description>
These are all security issues fixed in the jakarta-commons-httpclient3-3.0.1-253.36.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2012-5783/">CVE-2012-5783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5783">CVE-2012-5783 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989731" comment="jakarta-commons-httpclient3-3.0.1-253.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216268" version="1" class="patch">
	<metadata>
		<title>java-1_7_1-ibm-1.7.1_sr3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3065" ref_url="https://www.suse.com/security/cve/CVE-2014-3065/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-4288" ref_url="https://www.suse.com/security/cve/CVE-2014-4288/" source="CVE"/>
		<reference ref_id="CVE-2014-6456" ref_url="https://www.suse.com/security/cve/CVE-2014-6456/" source="CVE"/>
		<reference ref_id="CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457/" source="CVE"/>
		<reference ref_id="CVE-2014-6458" ref_url="https://www.suse.com/security/cve/CVE-2014-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-6466" ref_url="https://www.suse.com/security/cve/CVE-2014-6466/" source="CVE"/>
		<reference ref_id="CVE-2014-6476" ref_url="https://www.suse.com/security/cve/CVE-2014-6476/" source="CVE"/>
		<reference ref_id="CVE-2014-6492" ref_url="https://www.suse.com/security/cve/CVE-2014-6492/" source="CVE"/>
		<reference ref_id="CVE-2014-6493" ref_url="https://www.suse.com/security/cve/CVE-2014-6493/" source="CVE"/>
		<reference ref_id="CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502/" source="CVE"/>
		<reference ref_id="CVE-2014-6503" ref_url="https://www.suse.com/security/cve/CVE-2014-6503/" source="CVE"/>
		<reference ref_id="CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506/" source="CVE"/>
		<reference ref_id="CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511/" source="CVE"/>
		<reference ref_id="CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512/" source="CVE"/>
		<reference ref_id="CVE-2014-6513" ref_url="https://www.suse.com/security/cve/CVE-2014-6513/" source="CVE"/>
		<reference ref_id="CVE-2014-6515" ref_url="https://www.suse.com/security/cve/CVE-2014-6515/" source="CVE"/>
		<reference ref_id="CVE-2014-6527" ref_url="https://www.suse.com/security/cve/CVE-2014-6527/" source="CVE"/>
		<reference ref_id="CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531/" source="CVE"/>
		<reference ref_id="CVE-2014-6532" ref_url="https://www.suse.com/security/cve/CVE-2014-6532/" source="CVE"/>
		<reference ref_id="CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558/" source="CVE"/>
		<reference ref_id="CVE-2014-8891" ref_url="https://www.suse.com/security/cve/CVE-2014-8891/" source="CVE"/>
		<reference ref_id="CVE-2014-8892" ref_url="https://www.suse.com/security/cve/CVE-2014-8892/" source="CVE"/>
		<reference ref_id="CVE-2015-0138" ref_url="https://www.suse.com/security/cve/CVE-2015-0138/" source="CVE"/>
		<reference ref_id="CVE-2015-0192" ref_url="https://www.suse.com/security/cve/CVE-2015-0192/" source="CVE"/>
		<reference ref_id="CVE-2015-1914" ref_url="https://www.suse.com/security/cve/CVE-2015-1914/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_7_1-ibm-1.7.1_sr3.0-1.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3065/">CVE-2014-3065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3065">CVE-2014-3065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4288/">CVE-2014-4288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4288">CVE-2014-4288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6456/">CVE-2014-6456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6456">CVE-2014-6456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6457">CVE-2014-6457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6458/">CVE-2014-6458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6458">CVE-2014-6458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6466/">CVE-2014-6466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6466">CVE-2014-6466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6476/">CVE-2014-6476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6476">CVE-2014-6476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6492/">CVE-2014-6492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6492">CVE-2014-6492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6493/">CVE-2014-6493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6493">CVE-2014-6493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6502">CVE-2014-6502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6503/">CVE-2014-6503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6503">CVE-2014-6503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6506">CVE-2014-6506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6511">CVE-2014-6511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6512">CVE-2014-6512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6513/">CVE-2014-6513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6513">CVE-2014-6513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6515/">CVE-2014-6515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6515">CVE-2014-6515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6527/">CVE-2014-6527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6527">CVE-2014-6527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6531">CVE-2014-6531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6532/">CVE-2014-6532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6532">CVE-2014-6532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6558">CVE-2014-6558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8891/">CVE-2014-8891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8891">CVE-2014-8891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8892/">CVE-2014-8892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8892">CVE-2014-8892 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0138/">CVE-2015-0138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0138">CVE-2015-0138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0192/">CVE-2015-0192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0192">CVE-2015-0192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1914/">CVE-2015-1914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1914">CVE-2015-1914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2808">CVE-2015-2808 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990332" comment="java-1_7_1-ibm-1.7.1_sr3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990333" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990334" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990335" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216269" version="1" class="patch">
	<metadata>
		<title>jpeg-6b-879.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-2806" ref_url="https://www.suse.com/security/cve/CVE-2012-2806/" source="CVE"/>
		<description>
These are all security issues fixed in the jpeg-6b-879.12.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2806/">CVE-2012-2806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2806">CVE-2012-2806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989741" comment="jpeg-6b-879.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989742" comment="libjpeg-6.2.0-879.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989743" comment="libjpeg-32bit-6.2.0-879.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989744" comment="libjpeg-x86-6.2.0-879.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216270" version="1" class="patch">
	<metadata>
		<title>kbd-1.14.1-16.33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-0460" ref_url="https://www.suse.com/security/cve/CVE-2011-0460/" source="CVE"/>
		<description>
These are all security issues fixed in the kbd-1.14.1-16.33.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0460/">CVE-2011-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0460">CVE-2011-0460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990336" comment="kbd-1.14.1-16.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216271" version="1" class="patch">
	<metadata>
		<title>kde4-kgreeter-plugins-4.3.5-0.12.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-0436" ref_url="https://www.suse.com/security/cve/CVE-2010-0436/" source="CVE"/>
		<reference ref_id="CVE-2013-4132" ref_url="https://www.suse.com/security/cve/CVE-2013-4132/" source="CVE"/>
		<reference ref_id="CVE-2013-4133" ref_url="https://www.suse.com/security/cve/CVE-2013-4133/" source="CVE"/>
		<description>
These are all security issues fixed in the kde4-kgreeter-plugins-4.3.5-0.12.18.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0436/">CVE-2010-0436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0436">CVE-2010-0436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4132/">CVE-2013-4132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4132">CVE-2013-4132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4133/">CVE-2013-4133 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4133">CVE-2013-4133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990337" comment="kde4-kgreeter-plugins-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990338" comment="kdebase4-wallpapers-4.3.5-0.11.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990339" comment="kdebase4-workspace-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990340" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990341" comment="kdm-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990342" comment="kwin-4.3.5-0.12.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216272" version="1" class="patch">
	<metadata>
		<title>kdebase3-runtime-3.5.10-20.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-4569" ref_url="https://www.suse.com/security/cve/CVE-2007-4569/" source="CVE"/>
		<description>
These are all security issues fixed in the kdebase3-runtime-3.5.10-20.31 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4569/">CVE-2007-4569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4569">CVE-2007-4569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988583" comment="kdebase3-runtime-3.5.10-20.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988584" comment="kdebase3-runtime-32bit-3.5.10-20.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988585" comment="kdebase3-runtime-x86-3.5.10-20.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216273" version="1" class="patch">
	<metadata>
		<title>kdebase4-runtime-4.3.5-0.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-7252" ref_url="https://www.suse.com/security/cve/CVE-2013-7252/" source="CVE"/>
		<description>
These are all security issues fixed in the kdebase4-runtime-4.3.5-0.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7252/">CVE-2013-7252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7252">CVE-2013-7252 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990343" comment="kdebase4-runtime-4.3.5-0.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216274" version="1" class="patch">
	<metadata>
		<title>kdelibs3-3.5.10-23.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-3820" ref_url="https://www.suse.com/security/cve/CVE-2007-3820/" source="CVE"/>
		<reference ref_id="CVE-2007-4224" ref_url="https://www.suse.com/security/cve/CVE-2007-4224/" source="CVE"/>
		<reference ref_id="CVE-2007-4225" ref_url="https://www.suse.com/security/cve/CVE-2007-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-1671" ref_url="https://www.suse.com/security/cve/CVE-2008-1671/" source="CVE"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<description>
These are all security issues fixed in the kdelibs3-3.5.10-23.27.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3820/">CVE-2007-3820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3820">CVE-2007-3820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4224/">CVE-2007-4224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4224">CVE-2007-4224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4225/">CVE-2007-4225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4225">CVE-2007-4225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1671/">CVE-2008-1671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1671">CVE-2008-1671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0689">CVE-2009-0689 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988586" comment="kdelibs3-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988587" comment="kdelibs3-32bit-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988588" comment="kdelibs3-default-style-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988589" comment="kdelibs3-default-style-32bit-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988590" comment="kdelibs3-default-style-x86-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988591" comment="kdelibs3-x86-3.5.10-23.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216275" version="1" class="patch">
	<metadata>
		<title>kdelibs4-4.3.5-0.14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2011-1168" ref_url="https://www.suse.com/security/cve/CVE-2011-1168/" source="CVE"/>
		<reference ref_id="CVE-2012-4512" ref_url="https://www.suse.com/security/cve/CVE-2012-4512/" source="CVE"/>
		<reference ref_id="CVE-2012-4513" ref_url="https://www.suse.com/security/cve/CVE-2012-4513/" source="CVE"/>
		<reference ref_id="CVE-2012-4515" ref_url="https://www.suse.com/security/cve/CVE-2012-4515/" source="CVE"/>
		<description>
These are all security issues fixed in the kdelibs4-4.3.5-0.14.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0689">CVE-2009-0689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1168/">CVE-2011-1168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1168">CVE-2011-1168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4512/">CVE-2012-4512 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-4512">CVE-2012-4512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4513/">CVE-2012-4513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4513">CVE-2012-4513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4515/">CVE-2012-4515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4515">CVE-2012-4515 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990344" comment="kdelibs4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990345" comment="kdelibs4-core-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990346" comment="kdelibs4-doc-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990347" comment="libkde4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990348" comment="libkde4-32bit-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990349" comment="libkde4-x86-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990350" comment="libkdecore4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990351" comment="libkdecore4-32bit-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990352" comment="libkdecore4-x86-4.3.5-0.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216276" version="1" class="patch">
	<metadata>
		<title>kdenetwork4-filesharing-4.3.5-0.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-1000" ref_url="https://www.suse.com/security/cve/CVE-2010-1000/" source="CVE"/>
		<description>
These are all security issues fixed in the kdenetwork4-filesharing-4.3.5-0.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1000/">CVE-2010-1000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1000">CVE-2010-1000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989156" comment="kdenetwork4-filesharing-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989157" comment="kget-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989158" comment="kopete-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989159" comment="krdc-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989160" comment="krfb-4.3.5-0.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216277" version="1" class="patch">
	<metadata>
		<title>kdirstat-2.4.4-255.28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-2528" ref_url="https://www.suse.com/security/cve/CVE-2014-2528/" source="CVE"/>
		<description>
These are all security issues fixed in the kdirstat-2.4.4-255.28.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2528/">CVE-2014-2528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2528">CVE-2014-2528 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990353" comment="kdirstat-2.4.4-255.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216278" version="1" class="patch">
	<metadata>
		<title>kernel-default-3.0.101-63.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-0007" ref_url="https://www.suse.com/security/cve/CVE-2008-0007/" source="CVE"/>
		<reference ref_id="CVE-2008-0009" ref_url="https://www.suse.com/security/cve/CVE-2008-0009/" source="CVE"/>
		<reference ref_id="CVE-2008-0010" ref_url="https://www.suse.com/security/cve/CVE-2008-0010/" source="CVE"/>
		<reference ref_id="CVE-2008-1375" ref_url="https://www.suse.com/security/cve/CVE-2008-1375/" source="CVE"/>
		<reference ref_id="CVE-2008-1669" ref_url="https://www.suse.com/security/cve/CVE-2008-1669/" source="CVE"/>
		<reference ref_id="CVE-2008-1673" ref_url="https://www.suse.com/security/cve/CVE-2008-1673/" source="CVE"/>
		<reference ref_id="CVE-2008-1675" ref_url="https://www.suse.com/security/cve/CVE-2008-1675/" source="CVE"/>
		<reference ref_id="CVE-2008-3528" ref_url="https://www.suse.com/security/cve/CVE-2008-3528/" source="CVE"/>
		<reference ref_id="CVE-2008-3831" ref_url="https://www.suse.com/security/cve/CVE-2008-3831/" source="CVE"/>
		<reference ref_id="CVE-2008-5079" ref_url="https://www.suse.com/security/cve/CVE-2008-5079/" source="CVE"/>
		<reference ref_id="CVE-2008-5182" ref_url="https://www.suse.com/security/cve/CVE-2008-5182/" source="CVE"/>
		<reference ref_id="CVE-2008-5300" ref_url="https://www.suse.com/security/cve/CVE-2008-5300/" source="CVE"/>
		<reference ref_id="CVE-2009-0029" ref_url="https://www.suse.com/security/cve/CVE-2009-0029/" source="CVE"/>
		<reference ref_id="CVE-2009-3939" ref_url="https://www.suse.com/security/cve/CVE-2009-3939/" source="CVE"/>
		<reference ref_id="CVE-2009-4026" ref_url="https://www.suse.com/security/cve/CVE-2009-4026/" source="CVE"/>
		<reference ref_id="CVE-2009-4027" ref_url="https://www.suse.com/security/cve/CVE-2009-4027/" source="CVE"/>
		<reference ref_id="CVE-2009-4131" ref_url="https://www.suse.com/security/cve/CVE-2009-4131/" source="CVE"/>
		<reference ref_id="CVE-2009-4138" ref_url="https://www.suse.com/security/cve/CVE-2009-4138/" source="CVE"/>
		<reference ref_id="CVE-2009-4536" ref_url="https://www.suse.com/security/cve/CVE-2009-4536/" source="CVE"/>
		<reference ref_id="CVE-2009-4537" ref_url="https://www.suse.com/security/cve/CVE-2009-4537/" source="CVE"/>
		<reference ref_id="CVE-2009-4538" ref_url="https://www.suse.com/security/cve/CVE-2009-4538/" source="CVE"/>
		<reference ref_id="CVE-2010-0415" ref_url="https://www.suse.com/security/cve/CVE-2010-0415/" source="CVE"/>
		<reference ref_id="CVE-2010-0622" ref_url="https://www.suse.com/security/cve/CVE-2010-0622/" source="CVE"/>
		<reference ref_id="CVE-2010-0623" ref_url="https://www.suse.com/security/cve/CVE-2010-0623/" source="CVE"/>
		<reference ref_id="CVE-2010-1146" ref_url="https://www.suse.com/security/cve/CVE-2010-1146/" source="CVE"/>
		<reference ref_id="CVE-2010-1173" ref_url="https://www.suse.com/security/cve/CVE-2010-1173/" source="CVE"/>
		<reference ref_id="CVE-2010-1437" ref_url="https://www.suse.com/security/cve/CVE-2010-1437/" source="CVE"/>
		<reference ref_id="CVE-2010-1641" ref_url="https://www.suse.com/security/cve/CVE-2010-1641/" source="CVE"/>
		<reference ref_id="CVE-2010-2066" ref_url="https://www.suse.com/security/cve/CVE-2010-2066/" source="CVE"/>
		<reference ref_id="CVE-2010-2798" ref_url="https://www.suse.com/security/cve/CVE-2010-2798/" source="CVE"/>
		<reference ref_id="CVE-2010-2803" ref_url="https://www.suse.com/security/cve/CVE-2010-2803/" source="CVE"/>
		<reference ref_id="CVE-2010-2942" ref_url="https://www.suse.com/security/cve/CVE-2010-2942/" source="CVE"/>
		<reference ref_id="CVE-2010-2943" ref_url="https://www.suse.com/security/cve/CVE-2010-2943/" source="CVE"/>
		<reference ref_id="CVE-2010-2946" ref_url="https://www.suse.com/security/cve/CVE-2010-2946/" source="CVE"/>
		<reference ref_id="CVE-2010-2954" ref_url="https://www.suse.com/security/cve/CVE-2010-2954/" source="CVE"/>
		<reference ref_id="CVE-2010-2955" ref_url="https://www.suse.com/security/cve/CVE-2010-2955/" source="CVE"/>
		<reference ref_id="CVE-2010-2959" ref_url="https://www.suse.com/security/cve/CVE-2010-2959/" source="CVE"/>
		<reference ref_id="CVE-2010-2960" ref_url="https://www.suse.com/security/cve/CVE-2010-2960/" source="CVE"/>
		<reference ref_id="CVE-2010-2962" ref_url="https://www.suse.com/security/cve/CVE-2010-2962/" source="CVE"/>
		<reference ref_id="CVE-2010-2963" ref_url="https://www.suse.com/security/cve/CVE-2010-2963/" source="CVE"/>
		<reference ref_id="CVE-2010-3015" ref_url="https://www.suse.com/security/cve/CVE-2010-3015/" source="CVE"/>
		<reference ref_id="CVE-2010-3078" ref_url="https://www.suse.com/security/cve/CVE-2010-3078/" source="CVE"/>
		<reference ref_id="CVE-2010-3079" ref_url="https://www.suse.com/security/cve/CVE-2010-3079/" source="CVE"/>
		<reference ref_id="CVE-2010-3080" ref_url="https://www.suse.com/security/cve/CVE-2010-3080/" source="CVE"/>
		<reference ref_id="CVE-2010-3081" ref_url="https://www.suse.com/security/cve/CVE-2010-3081/" source="CVE"/>
		<reference ref_id="CVE-2010-3084" ref_url="https://www.suse.com/security/cve/CVE-2010-3084/" source="CVE"/>
		<reference ref_id="CVE-2010-3296" ref_url="https://www.suse.com/security/cve/CVE-2010-3296/" source="CVE"/>
		<reference ref_id="CVE-2010-3297" ref_url="https://www.suse.com/security/cve/CVE-2010-3297/" source="CVE"/>
		<reference ref_id="CVE-2010-3298" ref_url="https://www.suse.com/security/cve/CVE-2010-3298/" source="CVE"/>
		<reference ref_id="CVE-2010-3301" ref_url="https://www.suse.com/security/cve/CVE-2010-3301/" source="CVE"/>
		<reference ref_id="CVE-2010-3310" ref_url="https://www.suse.com/security/cve/CVE-2010-3310/" source="CVE"/>
		<reference ref_id="CVE-2010-3437" ref_url="https://www.suse.com/security/cve/CVE-2010-3437/" source="CVE"/>
		<reference ref_id="CVE-2010-3699" ref_url="https://www.suse.com/security/cve/CVE-2010-3699/" source="CVE"/>
		<reference ref_id="CVE-2010-3705" ref_url="https://www.suse.com/security/cve/CVE-2010-3705/" source="CVE"/>
		<reference ref_id="CVE-2010-3861" ref_url="https://www.suse.com/security/cve/CVE-2010-3861/" source="CVE"/>
		<reference ref_id="CVE-2010-3873" ref_url="https://www.suse.com/security/cve/CVE-2010-3873/" source="CVE"/>
		<reference ref_id="CVE-2010-3874" ref_url="https://www.suse.com/security/cve/CVE-2010-3874/" source="CVE"/>
		<reference ref_id="CVE-2010-3875" ref_url="https://www.suse.com/security/cve/CVE-2010-3875/" source="CVE"/>
		<reference ref_id="CVE-2010-3876" ref_url="https://www.suse.com/security/cve/CVE-2010-3876/" source="CVE"/>
		<reference ref_id="CVE-2010-3877" ref_url="https://www.suse.com/security/cve/CVE-2010-3877/" source="CVE"/>
		<reference ref_id="CVE-2010-3880" ref_url="https://www.suse.com/security/cve/CVE-2010-3880/" source="CVE"/>
		<reference ref_id="CVE-2010-3881" ref_url="https://www.suse.com/security/cve/CVE-2010-3881/" source="CVE"/>
		<reference ref_id="CVE-2010-4072" ref_url="https://www.suse.com/security/cve/CVE-2010-4072/" source="CVE"/>
		<reference ref_id="CVE-2010-4073" ref_url="https://www.suse.com/security/cve/CVE-2010-4073/" source="CVE"/>
		<reference ref_id="CVE-2010-4075" ref_url="https://www.suse.com/security/cve/CVE-2010-4075/" source="CVE"/>
		<reference ref_id="CVE-2010-4076" ref_url="https://www.suse.com/security/cve/CVE-2010-4076/" source="CVE"/>
		<reference ref_id="CVE-2010-4077" ref_url="https://www.suse.com/security/cve/CVE-2010-4077/" source="CVE"/>
		<reference ref_id="CVE-2010-4082" ref_url="https://www.suse.com/security/cve/CVE-2010-4082/" source="CVE"/>
		<reference ref_id="CVE-2010-4083" ref_url="https://www.suse.com/security/cve/CVE-2010-4083/" source="CVE"/>
		<reference ref_id="CVE-2010-4157" ref_url="https://www.suse.com/security/cve/CVE-2010-4157/" source="CVE"/>
		<reference ref_id="CVE-2010-4158" ref_url="https://www.suse.com/security/cve/CVE-2010-4158/" source="CVE"/>
		<reference ref_id="CVE-2010-4160" ref_url="https://www.suse.com/security/cve/CVE-2010-4160/" source="CVE"/>
		<reference ref_id="CVE-2010-4162" ref_url="https://www.suse.com/security/cve/CVE-2010-4162/" source="CVE"/>
		<reference ref_id="CVE-2010-4163" ref_url="https://www.suse.com/security/cve/CVE-2010-4163/" source="CVE"/>
		<reference ref_id="CVE-2010-4164" ref_url="https://www.suse.com/security/cve/CVE-2010-4164/" source="CVE"/>
		<reference ref_id="CVE-2010-4165" ref_url="https://www.suse.com/security/cve/CVE-2010-4165/" source="CVE"/>
		<reference ref_id="CVE-2010-4169" ref_url="https://www.suse.com/security/cve/CVE-2010-4169/" source="CVE"/>
		<reference ref_id="CVE-2010-4175" ref_url="https://www.suse.com/security/cve/CVE-2010-4175/" source="CVE"/>
		<reference ref_id="CVE-2010-4243" ref_url="https://www.suse.com/security/cve/CVE-2010-4243/" source="CVE"/>
		<reference ref_id="CVE-2010-4251" ref_url="https://www.suse.com/security/cve/CVE-2010-4251/" source="CVE"/>
		<reference ref_id="CVE-2010-4258" ref_url="https://www.suse.com/security/cve/CVE-2010-4258/" source="CVE"/>
		<reference ref_id="CVE-2010-4342" ref_url="https://www.suse.com/security/cve/CVE-2010-4342/" source="CVE"/>
		<reference ref_id="CVE-2010-4529" ref_url="https://www.suse.com/security/cve/CVE-2010-4529/" source="CVE"/>
		<reference ref_id="CVE-2010-4656" ref_url="https://www.suse.com/security/cve/CVE-2010-4656/" source="CVE"/>
		<reference ref_id="CVE-2010-4668" ref_url="https://www.suse.com/security/cve/CVE-2010-4668/" source="CVE"/>
		<reference ref_id="CVE-2011-0521" ref_url="https://www.suse.com/security/cve/CVE-2011-0521/" source="CVE"/>
		<reference ref_id="CVE-2011-0710" ref_url="https://www.suse.com/security/cve/CVE-2011-0710/" source="CVE"/>
		<reference ref_id="CVE-2011-0711" ref_url="https://www.suse.com/security/cve/CVE-2011-0711/" source="CVE"/>
		<reference ref_id="CVE-2011-0712" ref_url="https://www.suse.com/security/cve/CVE-2011-0712/" source="CVE"/>
		<reference ref_id="CVE-2011-1016" ref_url="https://www.suse.com/security/cve/CVE-2011-1016/" source="CVE"/>
		<reference ref_id="CVE-2011-1017" ref_url="https://www.suse.com/security/cve/CVE-2011-1017/" source="CVE"/>
		<reference ref_id="CVE-2011-1020" ref_url="https://www.suse.com/security/cve/CVE-2011-1020/" source="CVE"/>
		<reference ref_id="CVE-2011-1083" ref_url="https://www.suse.com/security/cve/CVE-2011-1083/" source="CVE"/>
		<reference ref_id="CVE-2011-1160" ref_url="https://www.suse.com/security/cve/CVE-2011-1160/" source="CVE"/>
		<reference ref_id="CVE-2011-1180" ref_url="https://www.suse.com/security/cve/CVE-2011-1180/" source="CVE"/>
		<reference ref_id="CVE-2011-1182" ref_url="https://www.suse.com/security/cve/CVE-2011-1182/" source="CVE"/>
		<reference ref_id="CVE-2011-1478" ref_url="https://www.suse.com/security/cve/CVE-2011-1478/" source="CVE"/>
		<reference ref_id="CVE-2011-1573" ref_url="https://www.suse.com/security/cve/CVE-2011-1573/" source="CVE"/>
		<reference ref_id="CVE-2011-1577" ref_url="https://www.suse.com/security/cve/CVE-2011-1577/" source="CVE"/>
		<reference ref_id="CVE-2011-1593" ref_url="https://www.suse.com/security/cve/CVE-2011-1593/" source="CVE"/>
		<reference ref_id="CVE-2011-2182" ref_url="https://www.suse.com/security/cve/CVE-2011-2182/" source="CVE"/>
		<reference ref_id="CVE-2011-2183" ref_url="https://www.suse.com/security/cve/CVE-2011-2183/" source="CVE"/>
		<reference ref_id="CVE-2011-2203" ref_url="https://www.suse.com/security/cve/CVE-2011-2203/" source="CVE"/>
		<reference ref_id="CVE-2011-2479" ref_url="https://www.suse.com/security/cve/CVE-2011-2479/" source="CVE"/>
		<reference ref_id="CVE-2011-2491" ref_url="https://www.suse.com/security/cve/CVE-2011-2491/" source="CVE"/>
		<reference ref_id="CVE-2011-2494" ref_url="https://www.suse.com/security/cve/CVE-2011-2494/" source="CVE"/>
		<reference ref_id="CVE-2011-2495" ref_url="https://www.suse.com/security/cve/CVE-2011-2495/" source="CVE"/>
		<reference ref_id="CVE-2011-2496" ref_url="https://www.suse.com/security/cve/CVE-2011-2496/" source="CVE"/>
		<reference ref_id="CVE-2011-3191" ref_url="https://www.suse.com/security/cve/CVE-2011-3191/" source="CVE"/>
		<reference ref_id="CVE-2011-4086" ref_url="https://www.suse.com/security/cve/CVE-2011-4086/" source="CVE"/>
		<reference ref_id="CVE-2011-4097" ref_url="https://www.suse.com/security/cve/CVE-2011-4097/" source="CVE"/>
		<reference ref_id="CVE-2011-4127" ref_url="https://www.suse.com/security/cve/CVE-2011-4127/" source="CVE"/>
		<reference ref_id="CVE-2011-4131" ref_url="https://www.suse.com/security/cve/CVE-2011-4131/" source="CVE"/>
		<reference ref_id="CVE-2011-4604" ref_url="https://www.suse.com/security/cve/CVE-2011-4604/" source="CVE"/>
		<reference ref_id="CVE-2011-4622" ref_url="https://www.suse.com/security/cve/CVE-2011-4622/" source="CVE"/>
		<reference ref_id="CVE-2012-0038" ref_url="https://www.suse.com/security/cve/CVE-2012-0038/" source="CVE"/>
		<reference ref_id="CVE-2012-0045" ref_url="https://www.suse.com/security/cve/CVE-2012-0045/" source="CVE"/>
		<reference ref_id="CVE-2012-0056" ref_url="https://www.suse.com/security/cve/CVE-2012-0056/" source="CVE"/>
		<reference ref_id="CVE-2012-0207" ref_url="https://www.suse.com/security/cve/CVE-2012-0207/" source="CVE"/>
		<reference ref_id="CVE-2012-1090" ref_url="https://www.suse.com/security/cve/CVE-2012-1090/" source="CVE"/>
		<reference ref_id="CVE-2012-1097" ref_url="https://www.suse.com/security/cve/CVE-2012-1097/" source="CVE"/>
		<reference ref_id="CVE-2012-1146" ref_url="https://www.suse.com/security/cve/CVE-2012-1146/" source="CVE"/>
		<reference ref_id="CVE-2012-1179" ref_url="https://www.suse.com/security/cve/CVE-2012-1179/" source="CVE"/>
		<reference ref_id="CVE-2012-1601" ref_url="https://www.suse.com/security/cve/CVE-2012-1601/" source="CVE"/>
		<reference ref_id="CVE-2012-2119" ref_url="https://www.suse.com/security/cve/CVE-2012-2119/" source="CVE"/>
		<reference ref_id="CVE-2012-2133" ref_url="https://www.suse.com/security/cve/CVE-2012-2133/" source="CVE"/>
		<reference ref_id="CVE-2012-2136" ref_url="https://www.suse.com/security/cve/CVE-2012-2136/" source="CVE"/>
		<reference ref_id="CVE-2012-2137" ref_url="https://www.suse.com/security/cve/CVE-2012-2137/" source="CVE"/>
		<reference ref_id="CVE-2012-2372" ref_url="https://www.suse.com/security/cve/CVE-2012-2372/" source="CVE"/>
		<reference ref_id="CVE-2012-2373" ref_url="https://www.suse.com/security/cve/CVE-2012-2373/" source="CVE"/>
		<reference ref_id="CVE-2012-2390" ref_url="https://www.suse.com/security/cve/CVE-2012-2390/" source="CVE"/>
		<reference ref_id="CVE-2012-2663" ref_url="https://www.suse.com/security/cve/CVE-2012-2663/" source="CVE"/>
		<reference ref_id="CVE-2012-2745" ref_url="https://www.suse.com/security/cve/CVE-2012-2745/" source="CVE"/>
		<reference ref_id="CVE-2012-3412" ref_url="https://www.suse.com/security/cve/CVE-2012-3412/" source="CVE"/>
		<reference ref_id="CVE-2012-3430" ref_url="https://www.suse.com/security/cve/CVE-2012-3430/" source="CVE"/>
		<reference ref_id="CVE-2012-4398" ref_url="https://www.suse.com/security/cve/CVE-2012-4398/" source="CVE"/>
		<reference ref_id="CVE-2012-4461" ref_url="https://www.suse.com/security/cve/CVE-2012-4461/" source="CVE"/>
		<reference ref_id="CVE-2012-5517" ref_url="https://www.suse.com/security/cve/CVE-2012-5517/" source="CVE"/>
		<reference ref_id="CVE-2013-0160" ref_url="https://www.suse.com/security/cve/CVE-2013-0160/" source="CVE"/>
		<reference ref_id="CVE-2013-0216" ref_url="https://www.suse.com/security/cve/CVE-2013-0216/" source="CVE"/>
		<reference ref_id="CVE-2013-0231" ref_url="https://www.suse.com/security/cve/CVE-2013-0231/" source="CVE"/>
		<reference ref_id="CVE-2013-0871" ref_url="https://www.suse.com/security/cve/CVE-2013-0871/" source="CVE"/>
		<reference ref_id="CVE-2013-0913" ref_url="https://www.suse.com/security/cve/CVE-2013-0913/" source="CVE"/>
		<reference ref_id="CVE-2013-1059" ref_url="https://www.suse.com/security/cve/CVE-2013-1059/" source="CVE"/>
		<reference ref_id="CVE-2013-1767" ref_url="https://www.suse.com/security/cve/CVE-2013-1767/" source="CVE"/>
		<reference ref_id="CVE-2013-1774" ref_url="https://www.suse.com/security/cve/CVE-2013-1774/" source="CVE"/>
		<reference ref_id="CVE-2013-1796" ref_url="https://www.suse.com/security/cve/CVE-2013-1796/" source="CVE"/>
		<reference ref_id="CVE-2013-1797" ref_url="https://www.suse.com/security/cve/CVE-2013-1797/" source="CVE"/>
		<reference ref_id="CVE-2013-1798" ref_url="https://www.suse.com/security/cve/CVE-2013-1798/" source="CVE"/>
		<reference ref_id="CVE-2013-1819" ref_url="https://www.suse.com/security/cve/CVE-2013-1819/" source="CVE"/>
		<reference ref_id="CVE-2013-1848" ref_url="https://www.suse.com/security/cve/CVE-2013-1848/" source="CVE"/>
		<reference ref_id="CVE-2013-1929" ref_url="https://www.suse.com/security/cve/CVE-2013-1929/" source="CVE"/>
		<reference ref_id="CVE-2013-1979" ref_url="https://www.suse.com/security/cve/CVE-2013-1979/" source="CVE"/>
		<reference ref_id="CVE-2013-2015" ref_url="https://www.suse.com/security/cve/CVE-2013-2015/" source="CVE"/>
		<reference ref_id="CVE-2013-2094" ref_url="https://www.suse.com/security/cve/CVE-2013-2094/" source="CVE"/>
		<reference ref_id="CVE-2013-2148" ref_url="https://www.suse.com/security/cve/CVE-2013-2148/" source="CVE"/>
		<reference ref_id="CVE-2013-2164" ref_url="https://www.suse.com/security/cve/CVE-2013-2164/" source="CVE"/>
		<reference ref_id="CVE-2013-2206" ref_url="https://www.suse.com/security/cve/CVE-2013-2206/" source="CVE"/>
		<reference ref_id="CVE-2013-2232" ref_url="https://www.suse.com/security/cve/CVE-2013-2232/" source="CVE"/>
		<reference ref_id="CVE-2013-2234" ref_url="https://www.suse.com/security/cve/CVE-2013-2234/" source="CVE"/>
		<reference ref_id="CVE-2013-2237" ref_url="https://www.suse.com/security/cve/CVE-2013-2237/" source="CVE"/>
		<reference ref_id="CVE-2013-2850" ref_url="https://www.suse.com/security/cve/CVE-2013-2850/" source="CVE"/>
		<reference ref_id="CVE-2013-2851" ref_url="https://www.suse.com/security/cve/CVE-2013-2851/" source="CVE"/>
		<reference ref_id="CVE-2013-2852" ref_url="https://www.suse.com/security/cve/CVE-2013-2852/" source="CVE"/>
		<reference ref_id="CVE-2013-2893" ref_url="https://www.suse.com/security/cve/CVE-2013-2893/" source="CVE"/>
		<reference ref_id="CVE-2013-2897" ref_url="https://www.suse.com/security/cve/CVE-2013-2897/" source="CVE"/>
		<reference ref_id="CVE-2013-2899" ref_url="https://www.suse.com/security/cve/CVE-2013-2899/" source="CVE"/>
		<reference ref_id="CVE-2013-2929" ref_url="https://www.suse.com/security/cve/CVE-2013-2929/" source="CVE"/>
		<reference ref_id="CVE-2013-3301" ref_url="https://www.suse.com/security/cve/CVE-2013-3301/" source="CVE"/>
		<reference ref_id="CVE-2013-4162" ref_url="https://www.suse.com/security/cve/CVE-2013-4162/" source="CVE"/>
		<reference ref_id="CVE-2013-4163" ref_url="https://www.suse.com/security/cve/CVE-2013-4163/" source="CVE"/>
		<reference ref_id="CVE-2013-4470" ref_url="https://www.suse.com/security/cve/CVE-2013-4470/" source="CVE"/>
		<reference ref_id="CVE-2013-4483" ref_url="https://www.suse.com/security/cve/CVE-2013-4483/" source="CVE"/>
		<reference ref_id="CVE-2013-4511" ref_url="https://www.suse.com/security/cve/CVE-2013-4511/" source="CVE"/>
		<reference ref_id="CVE-2013-4514" ref_url="https://www.suse.com/security/cve/CVE-2013-4514/" source="CVE"/>
		<reference ref_id="CVE-2013-4515" ref_url="https://www.suse.com/security/cve/CVE-2013-4515/" source="CVE"/>
		<reference ref_id="CVE-2013-4579" ref_url="https://www.suse.com/security/cve/CVE-2013-4579/" source="CVE"/>
		<reference ref_id="CVE-2013-4587" ref_url="https://www.suse.com/security/cve/CVE-2013-4587/" source="CVE"/>
		<reference ref_id="CVE-2013-4592" ref_url="https://www.suse.com/security/cve/CVE-2013-4592/" source="CVE"/>
		<reference ref_id="CVE-2013-6367" ref_url="https://www.suse.com/security/cve/CVE-2013-6367/" source="CVE"/>
		<reference ref_id="CVE-2013-6368" ref_url="https://www.suse.com/security/cve/CVE-2013-6368/" source="CVE"/>
		<reference ref_id="CVE-2013-6376" ref_url="https://www.suse.com/security/cve/CVE-2013-6376/" source="CVE"/>
		<reference ref_id="CVE-2013-6378" ref_url="https://www.suse.com/security/cve/CVE-2013-6378/" source="CVE"/>
		<reference ref_id="CVE-2013-6380" ref_url="https://www.suse.com/security/cve/CVE-2013-6380/" source="CVE"/>
		<reference ref_id="CVE-2013-6382" ref_url="https://www.suse.com/security/cve/CVE-2013-6382/" source="CVE"/>
		<reference ref_id="CVE-2013-6885" ref_url="https://www.suse.com/security/cve/CVE-2013-6885/" source="CVE"/>
		<reference ref_id="CVE-2013-7027" ref_url="https://www.suse.com/security/cve/CVE-2013-7027/" source="CVE"/>
		<reference ref_id="CVE-2013-7263" ref_url="https://www.suse.com/security/cve/CVE-2013-7263/" source="CVE"/>
		<reference ref_id="CVE-2013-7264" ref_url="https://www.suse.com/security/cve/CVE-2013-7264/" source="CVE"/>
		<reference ref_id="CVE-2013-7265" ref_url="https://www.suse.com/security/cve/CVE-2013-7265/" source="CVE"/>
		<reference ref_id="CVE-2013-7339" ref_url="https://www.suse.com/security/cve/CVE-2013-7339/" source="CVE"/>
		<reference ref_id="CVE-2014-0055" ref_url="https://www.suse.com/security/cve/CVE-2014-0055/" source="CVE"/>
		<reference ref_id="CVE-2014-0077" ref_url="https://www.suse.com/security/cve/CVE-2014-0077/" source="CVE"/>
		<reference ref_id="CVE-2014-0101" ref_url="https://www.suse.com/security/cve/CVE-2014-0101/" source="CVE"/>
		<reference ref_id="CVE-2014-0131" ref_url="https://www.suse.com/security/cve/CVE-2014-0131/" source="CVE"/>
		<reference ref_id="CVE-2014-0155" ref_url="https://www.suse.com/security/cve/CVE-2014-0155/" source="CVE"/>
		<reference ref_id="CVE-2014-0181" ref_url="https://www.suse.com/security/cve/CVE-2014-0181/" source="CVE"/>
		<reference ref_id="CVE-2014-0196" ref_url="https://www.suse.com/security/cve/CVE-2014-0196/" source="CVE"/>
		<reference ref_id="CVE-2014-0691" ref_url="https://www.suse.com/security/cve/CVE-2014-0691/" source="CVE"/>
		<reference ref_id="CVE-2014-1444" ref_url="https://www.suse.com/security/cve/CVE-2014-1444/" source="CVE"/>
		<reference ref_id="CVE-2014-1445" ref_url="https://www.suse.com/security/cve/CVE-2014-1445/" source="CVE"/>
		<reference ref_id="CVE-2014-1446" ref_url="https://www.suse.com/security/cve/CVE-2014-1446/" source="CVE"/>
		<reference ref_id="CVE-2014-1737" ref_url="https://www.suse.com/security/cve/CVE-2014-1737/" source="CVE"/>
		<reference ref_id="CVE-2014-1738" ref_url="https://www.suse.com/security/cve/CVE-2014-1738/" source="CVE"/>
		<reference ref_id="CVE-2014-1739" ref_url="https://www.suse.com/security/cve/CVE-2014-1739/" source="CVE"/>
		<reference ref_id="CVE-2014-1874" ref_url="https://www.suse.com/security/cve/CVE-2014-1874/" source="CVE"/>
		<reference ref_id="CVE-2014-2309" ref_url="https://www.suse.com/security/cve/CVE-2014-2309/" source="CVE"/>
		<reference ref_id="CVE-2014-2523" ref_url="https://www.suse.com/security/cve/CVE-2014-2523/" source="CVE"/>
		<reference ref_id="CVE-2014-2678" ref_url="https://www.suse.com/security/cve/CVE-2014-2678/" source="CVE"/>
		<reference ref_id="CVE-2014-2851" ref_url="https://www.suse.com/security/cve/CVE-2014-2851/" source="CVE"/>
		<reference ref_id="CVE-2014-3122" ref_url="https://www.suse.com/security/cve/CVE-2014-3122/" source="CVE"/>
		<reference ref_id="CVE-2014-3144" ref_url="https://www.suse.com/security/cve/CVE-2014-3144/" source="CVE"/>
		<reference ref_id="CVE-2014-3145" ref_url="https://www.suse.com/security/cve/CVE-2014-3145/" source="CVE"/>
		<reference ref_id="CVE-2014-3153" ref_url="https://www.suse.com/security/cve/CVE-2014-3153/" source="CVE"/>
		<reference ref_id="CVE-2014-3181" ref_url="https://www.suse.com/security/cve/CVE-2014-3181/" source="CVE"/>
		<reference ref_id="CVE-2014-3184" ref_url="https://www.suse.com/security/cve/CVE-2014-3184/" source="CVE"/>
		<reference ref_id="CVE-2014-3185" ref_url="https://www.suse.com/security/cve/CVE-2014-3185/" source="CVE"/>
		<reference ref_id="CVE-2014-3186" ref_url="https://www.suse.com/security/cve/CVE-2014-3186/" source="CVE"/>
		<reference ref_id="CVE-2014-3601" ref_url="https://www.suse.com/security/cve/CVE-2014-3601/" source="CVE"/>
		<reference ref_id="CVE-2014-3610" ref_url="https://www.suse.com/security/cve/CVE-2014-3610/" source="CVE"/>
		<reference ref_id="CVE-2014-3611" ref_url="https://www.suse.com/security/cve/CVE-2014-3611/" source="CVE"/>
		<reference ref_id="CVE-2014-3646" ref_url="https://www.suse.com/security/cve/CVE-2014-3646/" source="CVE"/>
		<reference ref_id="CVE-2014-3647" ref_url="https://www.suse.com/security/cve/CVE-2014-3647/" source="CVE"/>
		<reference ref_id="CVE-2014-3673" ref_url="https://www.suse.com/security/cve/CVE-2014-3673/" source="CVE"/>
		<reference ref_id="CVE-2014-3687" ref_url="https://www.suse.com/security/cve/CVE-2014-3687/" source="CVE"/>
		<reference ref_id="CVE-2014-3688" ref_url="https://www.suse.com/security/cve/CVE-2014-3688/" source="CVE"/>
		<reference ref_id="CVE-2014-3690" ref_url="https://www.suse.com/security/cve/CVE-2014-3690/" source="CVE"/>
		<reference ref_id="CVE-2014-3917" ref_url="https://www.suse.com/security/cve/CVE-2014-3917/" source="CVE"/>
		<reference ref_id="CVE-2014-4171" ref_url="https://www.suse.com/security/cve/CVE-2014-4171/" source="CVE"/>
		<reference ref_id="CVE-2014-4508" ref_url="https://www.suse.com/security/cve/CVE-2014-4508/" source="CVE"/>
		<reference ref_id="CVE-2014-4608" ref_url="https://www.suse.com/security/cve/CVE-2014-4608/" source="CVE"/>
		<reference ref_id="CVE-2014-4652" ref_url="https://www.suse.com/security/cve/CVE-2014-4652/" source="CVE"/>
		<reference ref_id="CVE-2014-4653" ref_url="https://www.suse.com/security/cve/CVE-2014-4653/" source="CVE"/>
		<reference ref_id="CVE-2014-4654" ref_url="https://www.suse.com/security/cve/CVE-2014-4654/" source="CVE"/>
		<reference ref_id="CVE-2014-4655" ref_url="https://www.suse.com/security/cve/CVE-2014-4655/" source="CVE"/>
		<reference ref_id="CVE-2014-4656" ref_url="https://www.suse.com/security/cve/CVE-2014-4656/" source="CVE"/>
		<reference ref_id="CVE-2014-4667" ref_url="https://www.suse.com/security/cve/CVE-2014-4667/" source="CVE"/>
		<reference ref_id="CVE-2014-4699" ref_url="https://www.suse.com/security/cve/CVE-2014-4699/" source="CVE"/>
		<reference ref_id="CVE-2014-4943" ref_url="https://www.suse.com/security/cve/CVE-2014-4943/" source="CVE"/>
		<reference ref_id="CVE-2014-5077" ref_url="https://www.suse.com/security/cve/CVE-2014-5077/" source="CVE"/>
		<reference ref_id="CVE-2014-5471" ref_url="https://www.suse.com/security/cve/CVE-2014-5471/" source="CVE"/>
		<reference ref_id="CVE-2014-5472" ref_url="https://www.suse.com/security/cve/CVE-2014-5472/" source="CVE"/>
		<reference ref_id="CVE-2014-6410" ref_url="https://www.suse.com/security/cve/CVE-2014-6410/" source="CVE"/>
		<reference ref_id="CVE-2014-7822" ref_url="https://www.suse.com/security/cve/CVE-2014-7822/" source="CVE"/>
		<reference ref_id="CVE-2014-7826" ref_url="https://www.suse.com/security/cve/CVE-2014-7826/" source="CVE"/>
		<reference ref_id="CVE-2014-7841" ref_url="https://www.suse.com/security/cve/CVE-2014-7841/" source="CVE"/>
		<reference ref_id="CVE-2014-7842" ref_url="https://www.suse.com/security/cve/CVE-2014-7842/" source="CVE"/>
		<reference ref_id="CVE-2014-7970" ref_url="https://www.suse.com/security/cve/CVE-2014-7970/" source="CVE"/>
		<reference ref_id="CVE-2014-8086" ref_url="https://www.suse.com/security/cve/CVE-2014-8086/" source="CVE"/>
		<reference ref_id="CVE-2014-8133" ref_url="https://www.suse.com/security/cve/CVE-2014-8133/" source="CVE"/>
		<reference ref_id="CVE-2014-8134" ref_url="https://www.suse.com/security/cve/CVE-2014-8134/" source="CVE"/>
		<reference ref_id="CVE-2014-8159" ref_url="https://www.suse.com/security/cve/CVE-2014-8159/" source="CVE"/>
		<reference ref_id="CVE-2014-8160" ref_url="https://www.suse.com/security/cve/CVE-2014-8160/" source="CVE"/>
		<reference ref_id="CVE-2014-8369" ref_url="https://www.suse.com/security/cve/CVE-2014-8369/" source="CVE"/>
		<reference ref_id="CVE-2014-8559" ref_url="https://www.suse.com/security/cve/CVE-2014-8559/" source="CVE"/>
		<reference ref_id="CVE-2014-8709" ref_url="https://www.suse.com/security/cve/CVE-2014-8709/" source="CVE"/>
		<reference ref_id="CVE-2014-9090" ref_url="https://www.suse.com/security/cve/CVE-2014-9090/" source="CVE"/>
		<reference ref_id="CVE-2014-9322" ref_url="https://www.suse.com/security/cve/CVE-2014-9322/" source="CVE"/>
		<reference ref_id="CVE-2014-9419" ref_url="https://www.suse.com/security/cve/CVE-2014-9419/" source="CVE"/>
		<reference ref_id="CVE-2014-9420" ref_url="https://www.suse.com/security/cve/CVE-2014-9420/" source="CVE"/>
		<reference ref_id="CVE-2014-9529" ref_url="https://www.suse.com/security/cve/CVE-2014-9529/" source="CVE"/>
		<reference ref_id="CVE-2014-9584" ref_url="https://www.suse.com/security/cve/CVE-2014-9584/" source="CVE"/>
		<reference ref_id="CVE-2014-9585" ref_url="https://www.suse.com/security/cve/CVE-2014-9585/" source="CVE"/>
		<reference ref_id="CVE-2014-9683" ref_url="https://www.suse.com/security/cve/CVE-2014-9683/" source="CVE"/>
		<reference ref_id="CVE-2015-0777" ref_url="https://www.suse.com/security/cve/CVE-2015-0777/" source="CVE"/>
		<reference ref_id="CVE-2015-1421" ref_url="https://www.suse.com/security/cve/CVE-2015-1421/" source="CVE"/>
		<reference ref_id="CVE-2015-1593" ref_url="https://www.suse.com/security/cve/CVE-2015-1593/" source="CVE"/>
		<reference ref_id="CVE-2015-1805" ref_url="https://www.suse.com/security/cve/CVE-2015-1805/" source="CVE"/>
		<reference ref_id="CVE-2015-2041" ref_url="https://www.suse.com/security/cve/CVE-2015-2041/" source="CVE"/>
		<reference ref_id="CVE-2015-2042" ref_url="https://www.suse.com/security/cve/CVE-2015-2042/" source="CVE"/>
		<reference ref_id="CVE-2015-2150" ref_url="https://www.suse.com/security/cve/CVE-2015-2150/" source="CVE"/>
		<reference ref_id="CVE-2015-2830" ref_url="https://www.suse.com/security/cve/CVE-2015-2830/" source="CVE"/>
		<reference ref_id="CVE-2015-2922" ref_url="https://www.suse.com/security/cve/CVE-2015-2922/" source="CVE"/>
		<reference ref_id="CVE-2015-3331" ref_url="https://www.suse.com/security/cve/CVE-2015-3331/" source="CVE"/>
		<reference ref_id="CVE-2015-3339" ref_url="https://www.suse.com/security/cve/CVE-2015-3339/" source="CVE"/>
		<reference ref_id="CVE-2015-3636" ref_url="https://www.suse.com/security/cve/CVE-2015-3636/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-default-3.0.101-63.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0007/">CVE-2008-0007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0007">CVE-2008-0007 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0009/">CVE-2008-0009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0009">CVE-2008-0009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0010/">CVE-2008-0010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0010">CVE-2008-0010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1375/">CVE-2008-1375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1375">CVE-2008-1375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1669/">CVE-2008-1669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1669">CVE-2008-1669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1673/">CVE-2008-1673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1673">CVE-2008-1673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1675/">CVE-2008-1675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1675">CVE-2008-1675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3528/">CVE-2008-3528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3528">CVE-2008-3528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3831/">CVE-2008-3831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3831">CVE-2008-3831 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2008-5079/">CVE-2008-5079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5079">CVE-2008-5079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5182/">CVE-2008-5182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5182">CVE-2008-5182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5300/">CVE-2008-5300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5300">CVE-2008-5300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0029/">CVE-2009-0029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0029">CVE-2009-0029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3939/">CVE-2009-3939 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-3939">CVE-2009-3939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4026/">CVE-2009-4026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4026">CVE-2009-4026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4027/">CVE-2009-4027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4027">CVE-2009-4027 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4131/">CVE-2009-4131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4131">CVE-2009-4131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4138/">CVE-2009-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4138">CVE-2009-4138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4536/">CVE-2009-4536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4536">CVE-2009-4536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4537/">CVE-2009-4537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4537">CVE-2009-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4538/">CVE-2009-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4538">CVE-2009-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0415/">CVE-2010-0415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0415">CVE-2010-0415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0622/">CVE-2010-0622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0622">CVE-2010-0622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0623/">CVE-2010-0623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0623">CVE-2010-0623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1146/">CVE-2010-1146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1146">CVE-2010-1146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1173/">CVE-2010-1173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1173">CVE-2010-1173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1437/">CVE-2010-1437 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1437">CVE-2010-1437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1641/">CVE-2010-1641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1641">CVE-2010-1641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2066/">CVE-2010-2066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2066">CVE-2010-2066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2798/">CVE-2010-2798 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2798">CVE-2010-2798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2803/">CVE-2010-2803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2803">CVE-2010-2803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2942/">CVE-2010-2942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2942">CVE-2010-2942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2943/">CVE-2010-2943 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2943">CVE-2010-2943 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2946/">CVE-2010-2946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2946">CVE-2010-2946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2954/">CVE-2010-2954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2954">CVE-2010-2954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2955/">CVE-2010-2955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2955">CVE-2010-2955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2959/">CVE-2010-2959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2959">CVE-2010-2959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2960/">CVE-2010-2960 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2960">CVE-2010-2960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2962/">CVE-2010-2962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2962">CVE-2010-2962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2963/">CVE-2010-2963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2963">CVE-2010-2963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3015/">CVE-2010-3015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3015">CVE-2010-3015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3078/">CVE-2010-3078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-3078">CVE-2010-3078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3079/">CVE-2010-3079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-3079">CVE-2010-3079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3080/">CVE-2010-3080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3080">CVE-2010-3080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3081/">CVE-2010-3081 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-3081">CVE-2010-3081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3084/">CVE-2010-3084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3084">CVE-2010-3084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3296/">CVE-2010-3296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3296">CVE-2010-3296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3297/">CVE-2010-3297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3297">CVE-2010-3297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3298/">CVE-2010-3298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3298">CVE-2010-3298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3301/">CVE-2010-3301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3301">CVE-2010-3301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3310/">CVE-2010-3310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3310">CVE-2010-3310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3437/">CVE-2010-3437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3437">CVE-2010-3437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3699/">CVE-2010-3699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3699">CVE-2010-3699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3705/">CVE-2010-3705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3705">CVE-2010-3705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3861/">CVE-2010-3861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3861">CVE-2010-3861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3873/">CVE-2010-3873 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3873">CVE-2010-3873 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3874/">CVE-2010-3874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3874">CVE-2010-3874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3875/">CVE-2010-3875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3875">CVE-2010-3875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3876/">CVE-2010-3876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3876">CVE-2010-3876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3877/">CVE-2010-3877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3877">CVE-2010-3877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3880/">CVE-2010-3880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3880">CVE-2010-3880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3881/">CVE-2010-3881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3881">CVE-2010-3881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4072/">CVE-2010-4072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4072">CVE-2010-4072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4073/">CVE-2010-4073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4073">CVE-2010-4073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4075/">CVE-2010-4075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4075">CVE-2010-4075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4076/">CVE-2010-4076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4076">CVE-2010-4076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4077/">CVE-2010-4077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4077">CVE-2010-4077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4082/">CVE-2010-4082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4082">CVE-2010-4082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4083/">CVE-2010-4083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4083">CVE-2010-4083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4157/">CVE-2010-4157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4157">CVE-2010-4157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4158/">CVE-2010-4158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4158">CVE-2010-4158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4160/">CVE-2010-4160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4160">CVE-2010-4160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4162/">CVE-2010-4162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4162">CVE-2010-4162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4163/">CVE-2010-4163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4163">CVE-2010-4163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4164/">CVE-2010-4164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4164">CVE-2010-4164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4165/">CVE-2010-4165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4165">CVE-2010-4165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4169/">CVE-2010-4169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4169">CVE-2010-4169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4175/">CVE-2010-4175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4175">CVE-2010-4175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4243/">CVE-2010-4243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4243">CVE-2010-4243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4251/">CVE-2010-4251 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-4251">CVE-2010-4251 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4258/">CVE-2010-4258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4258">CVE-2010-4258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4342/">CVE-2010-4342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4342">CVE-2010-4342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4529/">CVE-2010-4529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4529">CVE-2010-4529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4656/">CVE-2010-4656 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-4656">CVE-2010-4656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4668/">CVE-2010-4668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4668">CVE-2010-4668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0521/">CVE-2011-0521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0521">CVE-2011-0521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0710/">CVE-2011-0710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0710">CVE-2011-0710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0711/">CVE-2011-0711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0711">CVE-2011-0711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0712/">CVE-2011-0712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0712">CVE-2011-0712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1016/">CVE-2011-1016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1016">CVE-2011-1016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1017/">CVE-2011-1017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1017">CVE-2011-1017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1020/">CVE-2011-1020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1020">CVE-2011-1020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1083/">CVE-2011-1083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1083">CVE-2011-1083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1160/">CVE-2011-1160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1160">CVE-2011-1160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1180/">CVE-2011-1180 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-1180">CVE-2011-1180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1182/">CVE-2011-1182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1182">CVE-2011-1182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1478/">CVE-2011-1478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1478">CVE-2011-1478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1573/">CVE-2011-1573 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-1573">CVE-2011-1573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1577/">CVE-2011-1577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1577">CVE-2011-1577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1593/">CVE-2011-1593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1593">CVE-2011-1593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2182/">CVE-2011-2182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2182">CVE-2011-2182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2183/">CVE-2011-2183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2183">CVE-2011-2183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2203/">CVE-2011-2203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2203">CVE-2011-2203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2479/">CVE-2011-2479 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2479">CVE-2011-2479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2491/">CVE-2011-2491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2491">CVE-2011-2491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2494/">CVE-2011-2494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2494">CVE-2011-2494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2495/">CVE-2011-2495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2495">CVE-2011-2495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2496/">CVE-2011-2496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2496">CVE-2011-2496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3191/">CVE-2011-3191 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3191">CVE-2011-3191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4086/">CVE-2011-4086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4086">CVE-2011-4086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4097/">CVE-2011-4097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-4097">CVE-2011-4097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4127/">CVE-2011-4127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4127">CVE-2011-4127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4131/">CVE-2011-4131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4131">CVE-2011-4131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4604/">CVE-2011-4604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4604">CVE-2011-4604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4622/">CVE-2011-4622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4622">CVE-2011-4622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0038/">CVE-2012-0038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0038">CVE-2012-0038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0045/">CVE-2012-0045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0045">CVE-2012-0045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0056/">CVE-2012-0056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0056">CVE-2012-0056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0207/">CVE-2012-0207 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0207">CVE-2012-0207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1090/">CVE-2012-1090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1090">CVE-2012-1090 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1097/">CVE-2012-1097 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1097">CVE-2012-1097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1146/">CVE-2012-1146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1146">CVE-2012-1146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1179/">CVE-2012-1179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1179">CVE-2012-1179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1601/">CVE-2012-1601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1601">CVE-2012-1601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2119/">CVE-2012-2119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2119">CVE-2012-2119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2133/">CVE-2012-2133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2133">CVE-2012-2133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2136/">CVE-2012-2136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2136">CVE-2012-2136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2137/">CVE-2012-2137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2137">CVE-2012-2137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2372/">CVE-2012-2372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2372">CVE-2012-2372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2373/">CVE-2012-2373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2373">CVE-2012-2373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2390/">CVE-2012-2390 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2390">CVE-2012-2390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2663/">CVE-2012-2663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2663">CVE-2012-2663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2745/">CVE-2012-2745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2745">CVE-2012-2745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3412/">CVE-2012-3412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3412">CVE-2012-3412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3430/">CVE-2012-3430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3430">CVE-2012-3430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4398/">CVE-2012-4398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4398">CVE-2012-4398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4461/">CVE-2012-4461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4461">CVE-2012-4461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5517/">CVE-2012-5517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5517">CVE-2012-5517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0160/">CVE-2013-0160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0160">CVE-2013-0160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0216/">CVE-2013-0216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0216">CVE-2013-0216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0231/">CVE-2013-0231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0231">CVE-2013-0231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0871/">CVE-2013-0871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0871">CVE-2013-0871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0913/">CVE-2013-0913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0913">CVE-2013-0913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1059/">CVE-2013-1059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1059">CVE-2013-1059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1767/">CVE-2013-1767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1767">CVE-2013-1767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1774/">CVE-2013-1774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1774">CVE-2013-1774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1796/">CVE-2013-1796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1796">CVE-2013-1796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1797/">CVE-2013-1797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1797">CVE-2013-1797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1798/">CVE-2013-1798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1798">CVE-2013-1798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1819/">CVE-2013-1819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1819">CVE-2013-1819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1848/">CVE-2013-1848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1848">CVE-2013-1848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1929/">CVE-2013-1929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1929">CVE-2013-1929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1979/">CVE-2013-1979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1979">CVE-2013-1979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2015/">CVE-2013-2015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2015">CVE-2013-2015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2094/">CVE-2013-2094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2094">CVE-2013-2094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2148/">CVE-2013-2148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2148">CVE-2013-2148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2164/">CVE-2013-2164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2164">CVE-2013-2164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2206/">CVE-2013-2206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2206">CVE-2013-2206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2232/">CVE-2013-2232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2232">CVE-2013-2232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2234/">CVE-2013-2234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2234">CVE-2013-2234 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2237/">CVE-2013-2237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2237">CVE-2013-2237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2850/">CVE-2013-2850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2850">CVE-2013-2850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2851/">CVE-2013-2851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2851">CVE-2013-2851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2852/">CVE-2013-2852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2852">CVE-2013-2852 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2893/">CVE-2013-2893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2893">CVE-2013-2893 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2013-2897/">CVE-2013-2897 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2897">CVE-2013-2897 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2013-2899/">CVE-2013-2899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2899">CVE-2013-2899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2929/">CVE-2013-2929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2929">CVE-2013-2929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3301/">CVE-2013-3301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3301">CVE-2013-3301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4162/">CVE-2013-4162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4162">CVE-2013-4162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4163/">CVE-2013-4163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4163">CVE-2013-4163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4470/">CVE-2013-4470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4470">CVE-2013-4470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4483/">CVE-2013-4483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4483">CVE-2013-4483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4511/">CVE-2013-4511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4511">CVE-2013-4511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4514/">CVE-2013-4514 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4514">CVE-2013-4514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4515/">CVE-2013-4515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4515">CVE-2013-4515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4579/">CVE-2013-4579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4579">CVE-2013-4579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4587/">CVE-2013-4587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4587">CVE-2013-4587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4592/">CVE-2013-4592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4592">CVE-2013-4592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6367/">CVE-2013-6367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6367">CVE-2013-6367 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6368/">CVE-2013-6368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6368">CVE-2013-6368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6376/">CVE-2013-6376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6376">CVE-2013-6376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6378/">CVE-2013-6378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6378">CVE-2013-6378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6380/">CVE-2013-6380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6380">CVE-2013-6380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6382/">CVE-2013-6382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6382">CVE-2013-6382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6885/">CVE-2013-6885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6885">CVE-2013-6885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7027/">CVE-2013-7027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7027">CVE-2013-7027 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7263/">CVE-2013-7263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7263">CVE-2013-7263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7264/">CVE-2013-7264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7264">CVE-2013-7264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7265/">CVE-2013-7265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7265">CVE-2013-7265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7339/">CVE-2013-7339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7339">CVE-2013-7339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0055/">CVE-2014-0055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0055">CVE-2014-0055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0077/">CVE-2014-0077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0077">CVE-2014-0077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0101/">CVE-2014-0101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0101">CVE-2014-0101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0131/">CVE-2014-0131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0131">CVE-2014-0131 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-0155/">CVE-2014-0155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0155">CVE-2014-0155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0181/">CVE-2014-0181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0181">CVE-2014-0181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0196/">CVE-2014-0196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0196">CVE-2014-0196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0691/">CVE-2014-0691 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0691">CVE-2014-0691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1444/">CVE-2014-1444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1444">CVE-2014-1444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1445/">CVE-2014-1445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1445">CVE-2014-1445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1446/">CVE-2014-1446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1446">CVE-2014-1446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1737/">CVE-2014-1737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1737">CVE-2014-1737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1738/">CVE-2014-1738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1738">CVE-2014-1738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1739/">CVE-2014-1739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1739">CVE-2014-1739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1874/">CVE-2014-1874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1874">CVE-2014-1874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2309/">CVE-2014-2309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2309">CVE-2014-2309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2523/">CVE-2014-2523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2523">CVE-2014-2523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2678/">CVE-2014-2678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2678">CVE-2014-2678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2851/">CVE-2014-2851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2851">CVE-2014-2851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3122/">CVE-2014-3122 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3122">CVE-2014-3122 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3144/">CVE-2014-3144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3144">CVE-2014-3144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3145/">CVE-2014-3145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3145">CVE-2014-3145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3153/">CVE-2014-3153 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3153">CVE-2014-3153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3181/">CVE-2014-3181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3181">CVE-2014-3181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3184/">CVE-2014-3184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3184">CVE-2014-3184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3185/">CVE-2014-3185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3185">CVE-2014-3185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3186/">CVE-2014-3186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3186">CVE-2014-3186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3601/">CVE-2014-3601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3601">CVE-2014-3601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3610/">CVE-2014-3610 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3610">CVE-2014-3610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3611/">CVE-2014-3611 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3611">CVE-2014-3611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3646/">CVE-2014-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3646">CVE-2014-3646 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-3647/">CVE-2014-3647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3647">CVE-2014-3647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3673/">CVE-2014-3673 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3673">CVE-2014-3673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3687/">CVE-2014-3687 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3687">CVE-2014-3687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3688/">CVE-2014-3688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3688">CVE-2014-3688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3690/">CVE-2014-3690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3690">CVE-2014-3690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3917/">CVE-2014-3917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3917">CVE-2014-3917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4171/">CVE-2014-4171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4171">CVE-2014-4171 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-4508/">CVE-2014-4508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4508">CVE-2014-4508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4608/">CVE-2014-4608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4608">CVE-2014-4608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4652/">CVE-2014-4652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4652">CVE-2014-4652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4653/">CVE-2014-4653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4653">CVE-2014-4653 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4654/">CVE-2014-4654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4654">CVE-2014-4654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4655/">CVE-2014-4655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4655">CVE-2014-4655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4656/">CVE-2014-4656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4656">CVE-2014-4656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4667/">CVE-2014-4667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4667">CVE-2014-4667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4699/">CVE-2014-4699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4699">CVE-2014-4699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4943/">CVE-2014-4943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4943">CVE-2014-4943 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5077/">CVE-2014-5077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5077">CVE-2014-5077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5471/">CVE-2014-5471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5471">CVE-2014-5471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5472/">CVE-2014-5472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5472">CVE-2014-5472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6410/">CVE-2014-6410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6410">CVE-2014-6410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7822/">CVE-2014-7822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7822">CVE-2014-7822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7826/">CVE-2014-7826 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7826">CVE-2014-7826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7841/">CVE-2014-7841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7841">CVE-2014-7841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7842/">CVE-2014-7842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7842">CVE-2014-7842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7970/">CVE-2014-7970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7970">CVE-2014-7970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8086/">CVE-2014-8086 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8086">CVE-2014-8086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8133/">CVE-2014-8133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8133">CVE-2014-8133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8134/">CVE-2014-8134 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8134">CVE-2014-8134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8159/">CVE-2014-8159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8159">CVE-2014-8159 at NVD</cve>
	<cve impact="high" cvss3="8.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2014-8160/">CVE-2014-8160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8160">CVE-2014-8160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8369/">CVE-2014-8369 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8369">CVE-2014-8369 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8559/">CVE-2014-8559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8559">CVE-2014-8559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8709/">CVE-2014-8709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8709">CVE-2014-8709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9090/">CVE-2014-9090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9090">CVE-2014-9090 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9322/">CVE-2014-9322 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9322">CVE-2014-9322 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9419/">CVE-2014-9419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9419">CVE-2014-9419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9420/">CVE-2014-9420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9420">CVE-2014-9420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9529/">CVE-2014-9529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9529">CVE-2014-9529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9584/">CVE-2014-9584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9584">CVE-2014-9584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9585/">CVE-2014-9585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9585">CVE-2014-9585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9683/">CVE-2014-9683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9683">CVE-2014-9683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0777/">CVE-2015-0777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0777">CVE-2015-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1421/">CVE-2015-1421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1421">CVE-2015-1421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1593/">CVE-2015-1593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1593">CVE-2015-1593 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2015-1805/">CVE-2015-1805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1805">CVE-2015-1805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2041/">CVE-2015-2041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2041">CVE-2015-2041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2042/">CVE-2015-2042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2042">CVE-2015-2042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2150/">CVE-2015-2150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2150">CVE-2015-2150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2830/">CVE-2015-2830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2830">CVE-2015-2830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2922/">CVE-2015-2922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2922">CVE-2015-2922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3331/">CVE-2015-3331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3331">CVE-2015-3331 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3339/">CVE-2015-3339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3339">CVE-2015-3339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3636/">CVE-2015-3636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3636">CVE-2015-3636 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990354" comment="kernel-default-3.0.101-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990355" comment="kernel-default-base-3.0.101-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990357" comment="kernel-default-man-3.0.101-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990358" comment="kernel-pae-3.0.101-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990359" comment="kernel-pae-base-3.0.101-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990361" comment="kernel-ppc64-3.0.101-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990362" comment="kernel-ppc64-base-3.0.101-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990364" comment="kernel-source-3.0.101-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990365" comment="kernel-syms-3.0.101-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990366" comment="kernel-trace-3.0.101-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990367" comment="kernel-trace-base-3.0.101-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990369" comment="kernel-xen-3.0.101-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990370" comment="kernel-xen-base-3.0.101-63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216279" version="1" class="patch">
	<metadata>
		<title>krb5-1.6.3-133.49.66.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2002-2443" ref_url="https://www.suse.com/security/cve/CVE-2002-2443/" source="CVE"/>
		<reference ref_id="CVE-2006-6143" ref_url="https://www.suse.com/security/cve/CVE-2006-6143/" source="CVE"/>
		<reference ref_id="CVE-2006-6144" ref_url="https://www.suse.com/security/cve/CVE-2006-6144/" source="CVE"/>
		<reference ref_id="CVE-2007-0956" ref_url="https://www.suse.com/security/cve/CVE-2007-0956/" source="CVE"/>
		<reference ref_id="CVE-2007-0957" ref_url="https://www.suse.com/security/cve/CVE-2007-0957/" source="CVE"/>
		<reference ref_id="CVE-2007-1216" ref_url="https://www.suse.com/security/cve/CVE-2007-1216/" source="CVE"/>
		<reference ref_id="CVE-2007-2442" ref_url="https://www.suse.com/security/cve/CVE-2007-2442/" source="CVE"/>
		<reference ref_id="CVE-2007-2443" ref_url="https://www.suse.com/security/cve/CVE-2007-2443/" source="CVE"/>
		<reference ref_id="CVE-2007-2798" ref_url="https://www.suse.com/security/cve/CVE-2007-2798/" source="CVE"/>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<reference ref_id="CVE-2007-4000" ref_url="https://www.suse.com/security/cve/CVE-2007-4000/" source="CVE"/>
		<reference ref_id="CVE-2007-4743" ref_url="https://www.suse.com/security/cve/CVE-2007-4743/" source="CVE"/>
		<reference ref_id="CVE-2007-5894" ref_url="https://www.suse.com/security/cve/CVE-2007-5894/" source="CVE"/>
		<reference ref_id="CVE-2007-5902" ref_url="https://www.suse.com/security/cve/CVE-2007-5902/" source="CVE"/>
		<reference ref_id="CVE-2007-5971" ref_url="https://www.suse.com/security/cve/CVE-2007-5971/" source="CVE"/>
		<reference ref_id="CVE-2007-5972" ref_url="https://www.suse.com/security/cve/CVE-2007-5972/" source="CVE"/>
		<reference ref_id="CVE-2008-0062" ref_url="https://www.suse.com/security/cve/CVE-2008-0062/" source="CVE"/>
		<reference ref_id="CVE-2008-0063" ref_url="https://www.suse.com/security/cve/CVE-2008-0063/" source="CVE"/>
		<reference ref_id="CVE-2008-0947" ref_url="https://www.suse.com/security/cve/CVE-2008-0947/" source="CVE"/>
		<reference ref_id="CVE-2008-0948" ref_url="https://www.suse.com/security/cve/CVE-2008-0948/" source="CVE"/>
		<reference ref_id="CVE-2009-0844" ref_url="https://www.suse.com/security/cve/CVE-2009-0844/" source="CVE"/>
		<reference ref_id="CVE-2009-0845" ref_url="https://www.suse.com/security/cve/CVE-2009-0845/" source="CVE"/>
		<reference ref_id="CVE-2009-0846" ref_url="https://www.suse.com/security/cve/CVE-2009-0846/" source="CVE"/>
		<reference ref_id="CVE-2009-0847" ref_url="https://www.suse.com/security/cve/CVE-2009-0847/" source="CVE"/>
		<reference ref_id="CVE-2009-4212" ref_url="https://www.suse.com/security/cve/CVE-2009-4212/" source="CVE"/>
		<reference ref_id="CVE-2010-0629" ref_url="https://www.suse.com/security/cve/CVE-2010-0629/" source="CVE"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-1323" ref_url="https://www.suse.com/security/cve/CVE-2010-1323/" source="CVE"/>
		<reference ref_id="CVE-2011-0281" ref_url="https://www.suse.com/security/cve/CVE-2011-0281/" source="CVE"/>
		<reference ref_id="CVE-2011-0282" ref_url="https://www.suse.com/security/cve/CVE-2011-0282/" source="CVE"/>
		<reference ref_id="CVE-2011-1526" ref_url="https://www.suse.com/security/cve/CVE-2011-1526/" source="CVE"/>
		<reference ref_id="CVE-2011-4862" ref_url="https://www.suse.com/security/cve/CVE-2011-4862/" source="CVE"/>
		<reference ref_id="CVE-2013-1415" ref_url="https://www.suse.com/security/cve/CVE-2013-1415/" source="CVE"/>
		<reference ref_id="CVE-2013-1418" ref_url="https://www.suse.com/security/cve/CVE-2013-1418/" source="CVE"/>
		<reference ref_id="CVE-2014-4341" ref_url="https://www.suse.com/security/cve/CVE-2014-4341/" source="CVE"/>
		<reference ref_id="CVE-2014-4344" ref_url="https://www.suse.com/security/cve/CVE-2014-4344/" source="CVE"/>
		<reference ref_id="CVE-2014-4345" ref_url="https://www.suse.com/security/cve/CVE-2014-4345/" source="CVE"/>
		<reference ref_id="CVE-2014-5351" ref_url="https://www.suse.com/security/cve/CVE-2014-5351/" source="CVE"/>
		<reference ref_id="CVE-2014-5352" ref_url="https://www.suse.com/security/cve/CVE-2014-5352/" source="CVE"/>
		<reference ref_id="CVE-2014-9421" ref_url="https://www.suse.com/security/cve/CVE-2014-9421/" source="CVE"/>
		<reference ref_id="CVE-2014-9422" ref_url="https://www.suse.com/security/cve/CVE-2014-9422/" source="CVE"/>
		<reference ref_id="CVE-2014-9423" ref_url="https://www.suse.com/security/cve/CVE-2014-9423/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-1.6.3-133.49.66.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2002-2443/">CVE-2002-2443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2002-2443">CVE-2002-2443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6143/">CVE-2006-6143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6143">CVE-2006-6143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6144/">CVE-2006-6144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6144">CVE-2006-6144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0956/">CVE-2007-0956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0956">CVE-2007-0956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0957/">CVE-2007-0957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0957">CVE-2007-0957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1216/">CVE-2007-1216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1216">CVE-2007-1216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2442/">CVE-2007-2442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2442">CVE-2007-2442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2443/">CVE-2007-2443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2443">CVE-2007-2443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2798/">CVE-2007-2798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2798">CVE-2007-2798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3999">CVE-2007-3999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4000/">CVE-2007-4000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4000">CVE-2007-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4743/">CVE-2007-4743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4743">CVE-2007-4743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5894/">CVE-2007-5894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5894">CVE-2007-5894 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5902/">CVE-2007-5902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5902">CVE-2007-5902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5971/">CVE-2007-5971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5971">CVE-2007-5971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5972/">CVE-2007-5972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5972">CVE-2007-5972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0062/">CVE-2008-0062 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2008-0062">CVE-2008-0062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0063/">CVE-2008-0063 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2008-0063">CVE-2008-0063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0947/">CVE-2008-0947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0947">CVE-2008-0947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0948/">CVE-2008-0948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0948">CVE-2008-0948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0844/">CVE-2009-0844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0844">CVE-2009-0844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0845/">CVE-2009-0845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0845">CVE-2009-0845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0846/">CVE-2009-0846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0846">CVE-2009-0846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0847/">CVE-2009-0847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0847">CVE-2009-0847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4212/">CVE-2009-4212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4212">CVE-2009-4212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0629/">CVE-2010-0629 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-0629">CVE-2010-0629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1321">CVE-2010-1321 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1323/">CVE-2010-1323 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1323">CVE-2010-1323 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0281/">CVE-2011-0281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0281">CVE-2011-0281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0282/">CVE-2011-0282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0282">CVE-2011-0282 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1526/">CVE-2011-1526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1526">CVE-2011-1526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4862/">CVE-2011-4862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4862">CVE-2011-4862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1415/">CVE-2013-1415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1415">CVE-2013-1415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1418/">CVE-2013-1418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1418">CVE-2013-1418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4341/">CVE-2014-4341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4341">CVE-2014-4341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4344/">CVE-2014-4344 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4344">CVE-2014-4344 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4345/">CVE-2014-4345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4345">CVE-2014-4345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5351/">CVE-2014-5351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5351">CVE-2014-5351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5352/">CVE-2014-5352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5352">CVE-2014-5352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9421/">CVE-2014-9421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9421">CVE-2014-9421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9422/">CVE-2014-9422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9422">CVE-2014-9422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9423/">CVE-2014-9423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9423">CVE-2014-9423 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990372" comment="krb5-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990373" comment="krb5-32bit-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990374" comment="krb5-apps-clients-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990375" comment="krb5-apps-servers-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990376" comment="krb5-client-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990377" comment="krb5-server-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990378" comment="krb5-x86-1.6.3-133.49.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216280" version="1" class="patch">
	<metadata>
		<title>krb5-doc-1.6.3-133.49.66.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<reference ref_id="CVE-2007-4000" ref_url="https://www.suse.com/security/cve/CVE-2007-4000/" source="CVE"/>
		<reference ref_id="CVE-2007-4743" ref_url="https://www.suse.com/security/cve/CVE-2007-4743/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-doc-1.6.3-133.49.66.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3999">CVE-2007-3999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4000/">CVE-2007-4000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4000">CVE-2007-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4743/">CVE-2007-4743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4743">CVE-2007-4743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990379" comment="krb5-doc-1.6.3-133.49.66.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216281" version="1" class="patch">
	<metadata>
		<title>krb5-plugin-kdb-ldap-1.6.3-133.49.66.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2002-2443" ref_url="https://www.suse.com/security/cve/CVE-2002-2443/" source="CVE"/>
		<reference ref_id="CVE-2007-0956" ref_url="https://www.suse.com/security/cve/CVE-2007-0956/" source="CVE"/>
		<reference ref_id="CVE-2007-0957" ref_url="https://www.suse.com/security/cve/CVE-2007-0957/" source="CVE"/>
		<reference ref_id="CVE-2007-1216" ref_url="https://www.suse.com/security/cve/CVE-2007-1216/" source="CVE"/>
		<reference ref_id="CVE-2007-2442" ref_url="https://www.suse.com/security/cve/CVE-2007-2442/" source="CVE"/>
		<reference ref_id="CVE-2007-2443" ref_url="https://www.suse.com/security/cve/CVE-2007-2443/" source="CVE"/>
		<reference ref_id="CVE-2007-2798" ref_url="https://www.suse.com/security/cve/CVE-2007-2798/" source="CVE"/>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<reference ref_id="CVE-2007-4000" ref_url="https://www.suse.com/security/cve/CVE-2007-4000/" source="CVE"/>
		<reference ref_id="CVE-2007-4743" ref_url="https://www.suse.com/security/cve/CVE-2007-4743/" source="CVE"/>
		<reference ref_id="CVE-2010-0629" ref_url="https://www.suse.com/security/cve/CVE-2010-0629/" source="CVE"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-1323" ref_url="https://www.suse.com/security/cve/CVE-2010-1323/" source="CVE"/>
		<reference ref_id="CVE-2011-0281" ref_url="https://www.suse.com/security/cve/CVE-2011-0281/" source="CVE"/>
		<reference ref_id="CVE-2011-0282" ref_url="https://www.suse.com/security/cve/CVE-2011-0282/" source="CVE"/>
		<reference ref_id="CVE-2011-1526" ref_url="https://www.suse.com/security/cve/CVE-2011-1526/" source="CVE"/>
		<reference ref_id="CVE-2011-4862" ref_url="https://www.suse.com/security/cve/CVE-2011-4862/" source="CVE"/>
		<reference ref_id="CVE-2013-1415" ref_url="https://www.suse.com/security/cve/CVE-2013-1415/" source="CVE"/>
		<reference ref_id="CVE-2013-1418" ref_url="https://www.suse.com/security/cve/CVE-2013-1418/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-plugin-kdb-ldap-1.6.3-133.49.66.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2002-2443/">CVE-2002-2443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2002-2443">CVE-2002-2443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0956/">CVE-2007-0956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0956">CVE-2007-0956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0957/">CVE-2007-0957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0957">CVE-2007-0957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1216/">CVE-2007-1216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1216">CVE-2007-1216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2442/">CVE-2007-2442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2442">CVE-2007-2442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2443/">CVE-2007-2443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2443">CVE-2007-2443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2798/">CVE-2007-2798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2798">CVE-2007-2798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3999">CVE-2007-3999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4000/">CVE-2007-4000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4000">CVE-2007-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4743/">CVE-2007-4743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4743">CVE-2007-4743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0629/">CVE-2010-0629 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-0629">CVE-2010-0629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1321">CVE-2010-1321 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1323/">CVE-2010-1323 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1323">CVE-2010-1323 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0281/">CVE-2011-0281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0281">CVE-2011-0281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0282/">CVE-2011-0282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0282">CVE-2011-0282 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1526/">CVE-2011-1526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1526">CVE-2011-1526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4862/">CVE-2011-4862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4862">CVE-2011-4862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1415/">CVE-2013-1415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1415">CVE-2013-1415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1418/">CVE-2013-1418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1418">CVE-2013-1418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990380" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990381" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216282" version="1" class="patch">
	<metadata>
		<title>kvm-1.4.2-30.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-2382" ref_url="https://www.suse.com/security/cve/CVE-2008-2382/" source="CVE"/>
		<reference ref_id="CVE-2008-5714" ref_url="https://www.suse.com/security/cve/CVE-2008-5714/" source="CVE"/>
		<reference ref_id="CVE-2012-2652" ref_url="https://www.suse.com/security/cve/CVE-2012-2652/" source="CVE"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<reference ref_id="CVE-2013-2007" ref_url="https://www.suse.com/security/cve/CVE-2013-2007/" source="CVE"/>
		<reference ref_id="CVE-2013-2016" ref_url="https://www.suse.com/security/cve/CVE-2013-2016/" source="CVE"/>
		<reference ref_id="CVE-2013-4148" ref_url="https://www.suse.com/security/cve/CVE-2013-4148/" source="CVE"/>
		<reference ref_id="CVE-2013-4149" ref_url="https://www.suse.com/security/cve/CVE-2013-4149/" source="CVE"/>
		<reference ref_id="CVE-2013-4150" ref_url="https://www.suse.com/security/cve/CVE-2013-4150/" source="CVE"/>
		<reference ref_id="CVE-2013-4151" ref_url="https://www.suse.com/security/cve/CVE-2013-4151/" source="CVE"/>
		<reference ref_id="CVE-2013-4344" ref_url="https://www.suse.com/security/cve/CVE-2013-4344/" source="CVE"/>
		<reference ref_id="CVE-2013-4526" ref_url="https://www.suse.com/security/cve/CVE-2013-4526/" source="CVE"/>
		<reference ref_id="CVE-2013-4527" ref_url="https://www.suse.com/security/cve/CVE-2013-4527/" source="CVE"/>
		<reference ref_id="CVE-2013-4529" ref_url="https://www.suse.com/security/cve/CVE-2013-4529/" source="CVE"/>
		<reference ref_id="CVE-2013-4530" ref_url="https://www.suse.com/security/cve/CVE-2013-4530/" source="CVE"/>
		<reference ref_id="CVE-2013-4531" ref_url="https://www.suse.com/security/cve/CVE-2013-4531/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4535" ref_url="https://www.suse.com/security/cve/CVE-2013-4535/" source="CVE"/>
		<reference ref_id="CVE-2013-4536" ref_url="https://www.suse.com/security/cve/CVE-2013-4536/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-4541" ref_url="https://www.suse.com/security/cve/CVE-2013-4541/" source="CVE"/>
		<reference ref_id="CVE-2013-4542" ref_url="https://www.suse.com/security/cve/CVE-2013-4542/" source="CVE"/>
		<reference ref_id="CVE-2013-6399" ref_url="https://www.suse.com/security/cve/CVE-2013-6399/" source="CVE"/>
		<reference ref_id="CVE-2014-0142" ref_url="https://www.suse.com/security/cve/CVE-2014-0142/" source="CVE"/>
		<reference ref_id="CVE-2014-0143" ref_url="https://www.suse.com/security/cve/CVE-2014-0143/" source="CVE"/>
		<reference ref_id="CVE-2014-0144" ref_url="https://www.suse.com/security/cve/CVE-2014-0144/" source="CVE"/>
		<reference ref_id="CVE-2014-0145" ref_url="https://www.suse.com/security/cve/CVE-2014-0145/" source="CVE"/>
		<reference ref_id="CVE-2014-0146" ref_url="https://www.suse.com/security/cve/CVE-2014-0146/" source="CVE"/>
		<reference ref_id="CVE-2014-0147" ref_url="https://www.suse.com/security/cve/CVE-2014-0147/" source="CVE"/>
		<reference ref_id="CVE-2014-0150" ref_url="https://www.suse.com/security/cve/CVE-2014-0150/" source="CVE"/>
		<reference ref_id="CVE-2014-0182" ref_url="https://www.suse.com/security/cve/CVE-2014-0182/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-0223" ref_url="https://www.suse.com/security/cve/CVE-2014-0223/" source="CVE"/>
		<reference ref_id="CVE-2014-2894" ref_url="https://www.suse.com/security/cve/CVE-2014-2894/" source="CVE"/>
		<reference ref_id="CVE-2014-3461" ref_url="https://www.suse.com/security/cve/CVE-2014-3461/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-7840" ref_url="https://www.suse.com/security/cve/CVE-2014-7840/" source="CVE"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<description>
These are all security issues fixed in the kvm-1.4.2-30.5 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2382/">CVE-2008-2382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2382">CVE-2008-2382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5714/">CVE-2008-5714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5714">CVE-2008-5714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2652/">CVE-2012-2652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2652">CVE-2012-2652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3515">CVE-2012-3515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2007/">CVE-2013-2007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2007">CVE-2013-2007 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2016/">CVE-2013-2016 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-2016">CVE-2013-2016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4148/">CVE-2013-4148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4148">CVE-2013-4148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4149/">CVE-2013-4149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4149">CVE-2013-4149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4150/">CVE-2013-4150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4150">CVE-2013-4150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4151/">CVE-2013-4151 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4151">CVE-2013-4151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4344/">CVE-2013-4344 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4344">CVE-2013-4344 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4526/">CVE-2013-4526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4526">CVE-2013-4526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4527/">CVE-2013-4527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4527">CVE-2013-4527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4529/">CVE-2013-4529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4529">CVE-2013-4529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4530/">CVE-2013-4530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4530">CVE-2013-4530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4531/">CVE-2013-4531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4531">CVE-2013-4531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4533">CVE-2013-4533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4534">CVE-2013-4534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4535/">CVE-2013-4535 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4535">CVE-2013-4535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4536/">CVE-2013-4536 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4536">CVE-2013-4536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4537">CVE-2013-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4538">CVE-2013-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4539">CVE-2013-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4540">CVE-2013-4540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4541/">CVE-2013-4541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4541">CVE-2013-4541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4542/">CVE-2013-4542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4542">CVE-2013-4542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6399/">CVE-2013-6399 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6399">CVE-2013-6399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0142/">CVE-2014-0142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0142">CVE-2014-0142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0143/">CVE-2014-0143 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0143">CVE-2014-0143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0144/">CVE-2014-0144 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0144">CVE-2014-0144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0145/">CVE-2014-0145 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0145">CVE-2014-0145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0146/">CVE-2014-0146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0146">CVE-2014-0146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0147/">CVE-2014-0147 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0147">CVE-2014-0147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0150/">CVE-2014-0150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0150">CVE-2014-0150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0182/">CVE-2014-0182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0182">CVE-2014-0182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0222">CVE-2014-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0223/">CVE-2014-0223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0223">CVE-2014-0223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2894/">CVE-2014-2894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2894">CVE-2014-2894 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3461/">CVE-2014-3461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3461">CVE-2014-3461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3640">CVE-2014-3640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7840/">CVE-2014-7840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7840">CVE-2014-7840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8106">CVE-2014-8106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1779">CVE-2015-1779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3209">CVE-2015-3209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3456">CVE-2015-3456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4037">CVE-2015-4037 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990382" comment="kvm-1.4.2-30.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216283" version="1" class="patch">
	<metadata>
		<title>lcms-1.17-77.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0581" ref_url="https://www.suse.com/security/cve/CVE-2009-0581/" source="CVE"/>
		<reference ref_id="CVE-2009-0723" ref_url="https://www.suse.com/security/cve/CVE-2009-0723/" source="CVE"/>
		<reference ref_id="CVE-2009-0733" ref_url="https://www.suse.com/security/cve/CVE-2009-0733/" source="CVE"/>
		<reference ref_id="CVE-2009-0793" ref_url="https://www.suse.com/security/cve/CVE-2009-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-4276" ref_url="https://www.suse.com/security/cve/CVE-2013-4276/" source="CVE"/>
		<description>
These are all security issues fixed in the lcms-1.17-77.16.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0581/">CVE-2009-0581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0581">CVE-2009-0581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0723/">CVE-2009-0723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0723">CVE-2009-0723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0733/">CVE-2009-0733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0733">CVE-2009-0733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0793/">CVE-2009-0793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0793">CVE-2009-0793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4276/">CVE-2013-4276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4276">CVE-2013-4276 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990383" comment="lcms-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990384" comment="liblcms1-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990385" comment="liblcms1-32bit-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990386" comment="liblcms1-x86-1.17-77.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216284" version="1" class="patch">
	<metadata>
		<title>ldapsmb-1.34b-12.58.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-3403" ref_url="https://www.suse.com/security/cve/CVE-2006-3403/" source="CVE"/>
		<reference ref_id="CVE-2007-0452" ref_url="https://www.suse.com/security/cve/CVE-2007-0452/" source="CVE"/>
		<reference ref_id="CVE-2007-2444" ref_url="https://www.suse.com/security/cve/CVE-2007-2444/" source="CVE"/>
		<reference ref_id="CVE-2007-2446" ref_url="https://www.suse.com/security/cve/CVE-2007-2446/" source="CVE"/>
		<reference ref_id="CVE-2007-2447" ref_url="https://www.suse.com/security/cve/CVE-2007-2447/" source="CVE"/>
		<reference ref_id="CVE-2007-4138" ref_url="https://www.suse.com/security/cve/CVE-2007-4138/" source="CVE"/>
		<reference ref_id="CVE-2007-4572" ref_url="https://www.suse.com/security/cve/CVE-2007-4572/" source="CVE"/>
		<reference ref_id="CVE-2007-5398" ref_url="https://www.suse.com/security/cve/CVE-2007-5398/" source="CVE"/>
		<reference ref_id="CVE-2007-6015" ref_url="https://www.suse.com/security/cve/CVE-2007-6015/" source="CVE"/>
		<reference ref_id="CVE-2008-1105" ref_url="https://www.suse.com/security/cve/CVE-2008-1105/" source="CVE"/>
		<reference ref_id="CVE-2008-3789" ref_url="https://www.suse.com/security/cve/CVE-2008-3789/" source="CVE"/>
		<reference ref_id="CVE-2008-4314" ref_url="https://www.suse.com/security/cve/CVE-2008-4314/" source="CVE"/>
		<reference ref_id="CVE-2009-0022" ref_url="https://www.suse.com/security/cve/CVE-2009-0022/" source="CVE"/>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2010-0926" ref_url="https://www.suse.com/security/cve/CVE-2010-0926/" source="CVE"/>
		<reference ref_id="CVE-2010-1635" ref_url="https://www.suse.com/security/cve/CVE-2010-1635/" source="CVE"/>
		<reference ref_id="CVE-2010-1642" ref_url="https://www.suse.com/security/cve/CVE-2010-1642/" source="CVE"/>
		<reference ref_id="CVE-2010-2063" ref_url="https://www.suse.com/security/cve/CVE-2010-2063/" source="CVE"/>
		<reference ref_id="CVE-2010-3069" ref_url="https://www.suse.com/security/cve/CVE-2010-3069/" source="CVE"/>
		<reference ref_id="CVE-2011-0719" ref_url="https://www.suse.com/security/cve/CVE-2011-0719/" source="CVE"/>
		<reference ref_id="CVE-2011-2522" ref_url="https://www.suse.com/security/cve/CVE-2011-2522/" source="CVE"/>
		<reference ref_id="CVE-2011-2694" ref_url="https://www.suse.com/security/cve/CVE-2011-2694/" source="CVE"/>
		<reference ref_id="CVE-2012-0817" ref_url="https://www.suse.com/security/cve/CVE-2012-0817/" source="CVE"/>
		<reference ref_id="CVE-2012-0870" ref_url="https://www.suse.com/security/cve/CVE-2012-0870/" source="CVE"/>
		<reference ref_id="CVE-2012-1182" ref_url="https://www.suse.com/security/cve/CVE-2012-1182/" source="CVE"/>
		<reference ref_id="CVE-2012-2111" ref_url="https://www.suse.com/security/cve/CVE-2012-2111/" source="CVE"/>
		<reference ref_id="CVE-2012-6150" ref_url="https://www.suse.com/security/cve/CVE-2012-6150/" source="CVE"/>
		<reference ref_id="CVE-2013-0213" ref_url="https://www.suse.com/security/cve/CVE-2013-0213/" source="CVE"/>
		<reference ref_id="CVE-2013-0214" ref_url="https://www.suse.com/security/cve/CVE-2013-0214/" source="CVE"/>
		<reference ref_id="CVE-2013-0454" ref_url="https://www.suse.com/security/cve/CVE-2013-0454/" source="CVE"/>
		<reference ref_id="CVE-2013-4124" ref_url="https://www.suse.com/security/cve/CVE-2013-4124/" source="CVE"/>
		<reference ref_id="CVE-2013-4408" ref_url="https://www.suse.com/security/cve/CVE-2013-4408/" source="CVE"/>
		<reference ref_id="CVE-2013-4475" ref_url="https://www.suse.com/security/cve/CVE-2013-4475/" source="CVE"/>
		<reference ref_id="CVE-2013-4496" ref_url="https://www.suse.com/security/cve/CVE-2013-4496/" source="CVE"/>
		<reference ref_id="CVE-2014-0178" ref_url="https://www.suse.com/security/cve/CVE-2014-0178/" source="CVE"/>
		<reference ref_id="CVE-2014-0244" ref_url="https://www.suse.com/security/cve/CVE-2014-0244/" source="CVE"/>
		<reference ref_id="CVE-2014-3493" ref_url="https://www.suse.com/security/cve/CVE-2014-3493/" source="CVE"/>
		<reference ref_id="CVE-2015-0240" ref_url="https://www.suse.com/security/cve/CVE-2015-0240/" source="CVE"/>
		<description>
These are all security issues fixed in the ldapsmb-1.34b-12.58.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3403/">CVE-2006-3403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3403">CVE-2006-3403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0452/">CVE-2007-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0452">CVE-2007-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2444/">CVE-2007-2444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2444">CVE-2007-2444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2446/">CVE-2007-2446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2446">CVE-2007-2446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2447/">CVE-2007-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2447">CVE-2007-2447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4138/">CVE-2007-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4138">CVE-2007-4138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4572/">CVE-2007-4572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4572">CVE-2007-4572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5398/">CVE-2007-5398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5398">CVE-2007-5398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6015/">CVE-2007-6015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6015">CVE-2007-6015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1105/">CVE-2008-1105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1105">CVE-2008-1105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3789/">CVE-2008-3789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3789">CVE-2008-3789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4314/">CVE-2008-4314 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4314">CVE-2008-4314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0022/">CVE-2009-0022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0022">CVE-2009-0022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1886">CVE-2009-1886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1888">CVE-2009-1888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2813">CVE-2009-2813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2906">CVE-2009-2906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2948">CVE-2009-2948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0547">CVE-2010-0547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0728">CVE-2010-0728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0787">CVE-2010-0787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0926/">CVE-2010-0926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0926">CVE-2010-0926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1635/">CVE-2010-1635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1635">CVE-2010-1635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1642/">CVE-2010-1642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1642">CVE-2010-1642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2063/">CVE-2010-2063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2063">CVE-2010-2063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3069/">CVE-2010-3069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3069">CVE-2010-3069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0719/">CVE-2011-0719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0719">CVE-2011-0719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2522/">CVE-2011-2522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2522">CVE-2011-2522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2694/">CVE-2011-2694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2694">CVE-2011-2694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0817/">CVE-2012-0817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0817">CVE-2012-0817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0870/">CVE-2012-0870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0870">CVE-2012-0870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1182/">CVE-2012-1182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1182">CVE-2012-1182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2111/">CVE-2012-2111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2111">CVE-2012-2111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6150/">CVE-2012-6150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6150">CVE-2012-6150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0213/">CVE-2013-0213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0213">CVE-2013-0213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0214/">CVE-2013-0214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0214">CVE-2013-0214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0454/">CVE-2013-0454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0454">CVE-2013-0454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4124/">CVE-2013-4124 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4124">CVE-2013-4124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4408/">CVE-2013-4408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4408">CVE-2013-4408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4475/">CVE-2013-4475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4475">CVE-2013-4475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4496/">CVE-2013-4496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4496">CVE-2013-4496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0178/">CVE-2014-0178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0178">CVE-2014-0178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0244/">CVE-2014-0244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0244">CVE-2014-0244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3493/">CVE-2014-3493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3493">CVE-2014-3493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0240/">CVE-2015-0240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0240">CVE-2015-0240 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990387" comment="ldapsmb-1.34b-12.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990388" comment="libldb1-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990389" comment="libsmbclient0-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990390" comment="libsmbclient0-32bit-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990391" comment="libsmbclient0-x86-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990392" comment="libtalloc2-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990393" comment="libtalloc2-32bit-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990394" comment="libtalloc2-x86-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990395" comment="libtdb1-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990396" comment="libtdb1-32bit-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990397" comment="libtdb1-x86-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990398" comment="libtevent0-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990399" comment="libtevent0-32bit-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990400" comment="libwbclient0-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990401" comment="libwbclient0-32bit-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990402" comment="libwbclient0-x86-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990403" comment="samba-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990404" comment="samba-32bit-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990405" comment="samba-client-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990406" comment="samba-client-32bit-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990407" comment="samba-client-x86-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990408" comment="samba-krb-printing-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990409" comment="samba-winbind-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990410" comment="samba-winbind-32bit-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990411" comment="samba-winbind-x86-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990412" comment="samba-x86-3.6.3-0.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216285" version="1" class="patch">
	<metadata>
		<title>libFLAC++6-1.2.1-68.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-8962" ref_url="https://www.suse.com/security/cve/CVE-2014-8962/" source="CVE"/>
		<reference ref_id="CVE-2014-9028" ref_url="https://www.suse.com/security/cve/CVE-2014-9028/" source="CVE"/>
		<description>
These are all security issues fixed in the libFLAC++6-1.2.1-68.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8962/">CVE-2014-8962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8962">CVE-2014-8962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9028/">CVE-2014-9028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9028">CVE-2014-9028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990413" comment="libFLAC++6-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990414" comment="libFLAC8-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990415" comment="libFLAC8-32bit-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990416" comment="libFLAC8-x86-1.2.1-68.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216286" version="1" class="patch">
	<metadata>
		<title>libMagickCore1-32bit-6.4.3.6-7.30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-5456" ref_url="https://www.suse.com/security/cve/CVE-2006-5456/" source="CVE"/>
		<reference ref_id="CVE-2007-1667" ref_url="https://www.suse.com/security/cve/CVE-2007-1667/" source="CVE"/>
		<reference ref_id="CVE-2007-1797" ref_url="https://www.suse.com/security/cve/CVE-2007-1797/" source="CVE"/>
		<reference ref_id="CVE-2007-4985" ref_url="https://www.suse.com/security/cve/CVE-2007-4985/" source="CVE"/>
		<reference ref_id="CVE-2007-4986" ref_url="https://www.suse.com/security/cve/CVE-2007-4986/" source="CVE"/>
		<reference ref_id="CVE-2007-4987" ref_url="https://www.suse.com/security/cve/CVE-2007-4987/" source="CVE"/>
		<reference ref_id="CVE-2007-4988" ref_url="https://www.suse.com/security/cve/CVE-2007-4988/" source="CVE"/>
		<reference ref_id="CVE-2012-0247" ref_url="https://www.suse.com/security/cve/CVE-2012-0247/" source="CVE"/>
		<reference ref_id="CVE-2012-0248" ref_url="https://www.suse.com/security/cve/CVE-2012-0248/" source="CVE"/>
		<reference ref_id="CVE-2012-0259" ref_url="https://www.suse.com/security/cve/CVE-2012-0259/" source="CVE"/>
		<reference ref_id="CVE-2012-0260" ref_url="https://www.suse.com/security/cve/CVE-2012-0260/" source="CVE"/>
		<reference ref_id="CVE-2012-1185" ref_url="https://www.suse.com/security/cve/CVE-2012-1185/" source="CVE"/>
		<reference ref_id="CVE-2012-1186" ref_url="https://www.suse.com/security/cve/CVE-2012-1186/" source="CVE"/>
		<reference ref_id="CVE-2012-1610" ref_url="https://www.suse.com/security/cve/CVE-2012-1610/" source="CVE"/>
		<reference ref_id="CVE-2012-1798" ref_url="https://www.suse.com/security/cve/CVE-2012-1798/" source="CVE"/>
		<reference ref_id="CVE-2012-3437" ref_url="https://www.suse.com/security/cve/CVE-2012-3437/" source="CVE"/>
		<reference ref_id="CVE-2014-1947" ref_url="https://www.suse.com/security/cve/CVE-2014-1947/" source="CVE"/>
		<reference ref_id="CVE-2014-8354" ref_url="https://www.suse.com/security/cve/CVE-2014-8354/" source="CVE"/>
		<reference ref_id="CVE-2014-8355" ref_url="https://www.suse.com/security/cve/CVE-2014-8355/" source="CVE"/>
		<reference ref_id="CVE-2014-8562" ref_url="https://www.suse.com/security/cve/CVE-2014-8562/" source="CVE"/>
		<reference ref_id="CVE-2014-8716" ref_url="https://www.suse.com/security/cve/CVE-2014-8716/" source="CVE"/>
		<description>
These are all security issues fixed in the libMagickCore1-32bit-6.4.3.6-7.30.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5456/">CVE-2006-5456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5456">CVE-2006-5456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1667/">CVE-2007-1667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1667">CVE-2007-1667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1797/">CVE-2007-1797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1797">CVE-2007-1797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4985/">CVE-2007-4985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4985">CVE-2007-4985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4986/">CVE-2007-4986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4986">CVE-2007-4986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4987/">CVE-2007-4987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4987">CVE-2007-4987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4988/">CVE-2007-4988 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2007-4988">CVE-2007-4988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0247/">CVE-2012-0247 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0247">CVE-2012-0247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0248/">CVE-2012-0248 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0248">CVE-2012-0248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0259/">CVE-2012-0259 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0259">CVE-2012-0259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0260/">CVE-2012-0260 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0260">CVE-2012-0260 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1185/">CVE-2012-1185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1185">CVE-2012-1185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1186/">CVE-2012-1186 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1186">CVE-2012-1186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1610/">CVE-2012-1610 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1610">CVE-2012-1610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1798/">CVE-2012-1798 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1798">CVE-2012-1798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3437/">CVE-2012-3437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3437">CVE-2012-3437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1947/">CVE-2014-1947 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1947">CVE-2014-1947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8354/">CVE-2014-8354 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8354">CVE-2014-8354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8355/">CVE-2014-8355 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8355">CVE-2014-8355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8562/">CVE-2014-8562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8562">CVE-2014-8562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8716/">CVE-2014-8716 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8716">CVE-2014-8716 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990417" comment="libMagickCore1-6.4.3.6-7.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990418" comment="libMagickCore1-32bit-6.4.3.6-7.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216287" version="1" class="patch">
	<metadata>
		<title>libQtWebKit4-32bit-4.6.3-5.34.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-4811" ref_url="https://www.suse.com/security/cve/CVE-2006-4811/" source="CVE"/>
		<reference ref_id="CVE-2009-0945" ref_url="https://www.suse.com/security/cve/CVE-2009-0945/" source="CVE"/>
		<reference ref_id="CVE-2011-3193" ref_url="https://www.suse.com/security/cve/CVE-2011-3193/" source="CVE"/>
		<reference ref_id="CVE-2011-3922" ref_url="https://www.suse.com/security/cve/CVE-2011-3922/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2012-6093" ref_url="https://www.suse.com/security/cve/CVE-2012-6093/" source="CVE"/>
		<reference ref_id="CVE-2013-0254" ref_url="https://www.suse.com/security/cve/CVE-2013-0254/" source="CVE"/>
		<reference ref_id="CVE-2013-4549" ref_url="https://www.suse.com/security/cve/CVE-2013-4549/" source="CVE"/>
		<reference ref_id="CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295/" source="CVE"/>
		<reference ref_id="CVE-2015-1858" ref_url="https://www.suse.com/security/cve/CVE-2015-1858/" source="CVE"/>
		<reference ref_id="CVE-2015-1859" ref_url="https://www.suse.com/security/cve/CVE-2015-1859/" source="CVE"/>
		<reference ref_id="CVE-2015-1860" ref_url="https://www.suse.com/security/cve/CVE-2015-1860/" source="CVE"/>
		<description>
These are all security issues fixed in the libQtWebKit4-32bit-4.6.3-5.34.2 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4811/">CVE-2006-4811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4811">CVE-2006-4811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0945/">CVE-2009-0945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0945">CVE-2009-0945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3193/">CVE-2011-3193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3193">CVE-2011-3193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3922/">CVE-2011-3922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3922">CVE-2011-3922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4929">CVE-2012-4929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6093/">CVE-2012-6093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6093">CVE-2012-6093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0254/">CVE-2013-0254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0254">CVE-2013-0254 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4549/">CVE-2013-4549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4549">CVE-2013-4549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0295">CVE-2015-0295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1858/">CVE-2015-1858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1858">CVE-2015-1858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1859/">CVE-2015-1859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1859">CVE-2015-1859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1860/">CVE-2015-1860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1860">CVE-2015-1860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990419" comment="libQtWebKit4-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990420" comment="libQtWebKit4-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990421" comment="libQtWebKit4-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990422" comment="libqt4-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990423" comment="libqt4-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990424" comment="libqt4-qt3support-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990425" comment="libqt4-qt3support-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990426" comment="libqt4-qt3support-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990427" comment="libqt4-sql-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990428" comment="libqt4-sql-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990429" comment="libqt4-sql-mysql-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990430" comment="libqt4-sql-sqlite-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990431" comment="libqt4-sql-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990432" comment="libqt4-x11-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990433" comment="libqt4-x11-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990434" comment="libqt4-x11-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990435" comment="libqt4-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990436" comment="qt4-x11-tools-4.6.3-5.34.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216288" version="1" class="patch">
	<metadata>
		<title>libadns1-1.4-73.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-1447" ref_url="https://www.suse.com/security/cve/CVE-2008-1447/" source="CVE"/>
		<reference ref_id="CVE-2008-4100" ref_url="https://www.suse.com/security/cve/CVE-2008-4100/" source="CVE"/>
		<description>
These are all security issues fixed in the libadns1-1.4-73.21 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1447/">CVE-2008-1447 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2008-1447">CVE-2008-1447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4100/">CVE-2008-4100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4100">CVE-2008-4100 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988654" comment="libadns1-1.4-73.21 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216289" version="1" class="patch">
	<metadata>
		<title>libapr-util1-1.3.4-12.22.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<reference ref_id="CVE-2010-1623" ref_url="https://www.suse.com/security/cve/CVE-2010-1623/" source="CVE"/>
		<description>
These are all security issues fixed in the libapr-util1-1.3.4-12.22.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2412">CVE-2009-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1623/">CVE-2010-1623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1623">CVE-2010-1623 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990437" comment="libapr-util1-1.3.4-12.22.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990438" comment="libapr-util1-32bit-1.3.4-12.22.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990439" comment="libapr-util1-dbd-sqlite3-1.3.4-12.22.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216290" version="1" class="patch">
	<metadata>
		<title>libapr1-1.3.3-11.18.19.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<reference ref_id="CVE-2011-0419" ref_url="https://www.suse.com/security/cve/CVE-2011-0419/" source="CVE"/>
		<reference ref_id="CVE-2011-1928" ref_url="https://www.suse.com/security/cve/CVE-2011-1928/" source="CVE"/>
		<description>
These are all security issues fixed in the libapr1-1.3.3-11.18.19.8 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2412">CVE-2009-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0419/">CVE-2011-0419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0419">CVE-2011-0419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1928/">CVE-2011-1928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1928">CVE-2011-1928 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990440" comment="libapr1-1.3.3-11.18.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990441" comment="libapr1-32bit-1.3.3-11.18.19.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216291" version="1" class="patch">
	<metadata>
		<title>libarchive2-2.5.5-5.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-5680" ref_url="https://www.suse.com/security/cve/CVE-2006-5680/" source="CVE"/>
		<reference ref_id="CVE-2007-3641" ref_url="https://www.suse.com/security/cve/CVE-2007-3641/" source="CVE"/>
		<reference ref_id="CVE-2007-3644" ref_url="https://www.suse.com/security/cve/CVE-2007-3644/" source="CVE"/>
		<reference ref_id="CVE-2007-3645" ref_url="https://www.suse.com/security/cve/CVE-2007-3645/" source="CVE"/>
		<description>
These are all security issues fixed in the libarchive2-2.5.5-5.19 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5680/">CVE-2006-5680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5680">CVE-2006-5680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3641/">CVE-2007-3641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3641">CVE-2007-3641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3644/">CVE-2007-3644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3644">CVE-2007-3644 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3645/">CVE-2007-3645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3645">CVE-2007-3645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988659" comment="libarchive2-2.5.5-5.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216292" version="1" class="patch">
	<metadata>
		<title>libblkid1-2.19.1-6.72.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-9114" ref_url="https://www.suse.com/security/cve/CVE-2014-9114/" source="CVE"/>
		<description>
These are all security issues fixed in the libblkid1-2.19.1-6.72.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9114/">CVE-2014-9114 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9114">CVE-2014-9114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990442" comment="libblkid1-2.19.1-6.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990443" comment="libblkid1-32bit-2.19.1-6.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990444" comment="libblkid1-x86-2.19.1-6.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990445" comment="libuuid1-2.19.1-6.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990446" comment="libuuid1-32bit-2.19.1-6.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990447" comment="libuuid1-x86-2.19.1-6.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990448" comment="util-linux-2.19.1-6.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990449" comment="util-linux-lang-2.19.1-6.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990450" comment="uuid-runtime-2.19.1-6.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216293" version="1" class="patch">
	<metadata>
		<title>libcap-progs-2.11-2.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-4099" ref_url="https://www.suse.com/security/cve/CVE-2011-4099/" source="CVE"/>
		<description>
These are all security issues fixed in the libcap-progs-2.11-2.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4099/">CVE-2011-4099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4099">CVE-2011-4099 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989234" comment="libcap-progs-2.11-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989235" comment="libcap2-2.11-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989236" comment="libcap2-32bit-2.11-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989237" comment="libcap2-x86-2.11-2.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216294" version="1" class="patch">
	<metadata>
		<title>libcgroup1-0.41.rc1-2.34 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-1006" ref_url="https://www.suse.com/security/cve/CVE-2011-1006/" source="CVE"/>
		<reference ref_id="CVE-2011-1022" ref_url="https://www.suse.com/security/cve/CVE-2011-1022/" source="CVE"/>
		<description>
These are all security issues fixed in the libcgroup1-0.41.rc1-2.34 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1006/">CVE-2011-1006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1006">CVE-2011-1006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1022/">CVE-2011-1022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1022">CVE-2011-1022 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990451" comment="libcgroup1-0.41.rc1-2.34 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216295" version="1" class="patch">
	<metadata>
		<title>libdrm-2.4.52-0.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-3831" ref_url="https://www.suse.com/security/cve/CVE-2008-3831/" source="CVE"/>
		<description>
These are all security issues fixed in the libdrm-2.4.52-0.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3831/">CVE-2008-3831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3831">CVE-2008-3831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990452" comment="libdrm-2.4.52-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990453" comment="libdrm-32bit-2.4.52-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990454" comment="libdrm-x86-2.4.52-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216296" version="1" class="patch">
	<metadata>
		<title>libecpg6-9.4.4-0.6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-4769" ref_url="https://www.suse.com/security/cve/CVE-2007-4769/" source="CVE"/>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2007-6067" ref_url="https://www.suse.com/security/cve/CVE-2007-6067/" source="CVE"/>
		<reference ref_id="CVE-2007-6600" ref_url="https://www.suse.com/security/cve/CVE-2007-6600/" source="CVE"/>
		<reference ref_id="CVE-2007-6601" ref_url="https://www.suse.com/security/cve/CVE-2007-6601/" source="CVE"/>
		<reference ref_id="CVE-2009-4034" ref_url="https://www.suse.com/security/cve/CVE-2009-4034/" source="CVE"/>
		<reference ref_id="CVE-2009-4136" ref_url="https://www.suse.com/security/cve/CVE-2009-4136/" source="CVE"/>
		<reference ref_id="CVE-2010-1169" ref_url="https://www.suse.com/security/cve/CVE-2010-1169/" source="CVE"/>
		<reference ref_id="CVE-2010-1170" ref_url="https://www.suse.com/security/cve/CVE-2010-1170/" source="CVE"/>
		<reference ref_id="CVE-2010-3433" ref_url="https://www.suse.com/security/cve/CVE-2010-3433/" source="CVE"/>
		<reference ref_id="CVE-2012-0866" ref_url="https://www.suse.com/security/cve/CVE-2012-0866/" source="CVE"/>
		<reference ref_id="CVE-2012-0867" ref_url="https://www.suse.com/security/cve/CVE-2012-0867/" source="CVE"/>
		<reference ref_id="CVE-2012-0868" ref_url="https://www.suse.com/security/cve/CVE-2012-0868/" source="CVE"/>
		<reference ref_id="CVE-2012-2143" ref_url="https://www.suse.com/security/cve/CVE-2012-2143/" source="CVE"/>
		<reference ref_id="CVE-2012-2655" ref_url="https://www.suse.com/security/cve/CVE-2012-2655/" source="CVE"/>
		<reference ref_id="CVE-2012-3488" ref_url="https://www.suse.com/security/cve/CVE-2012-3488/" source="CVE"/>
		<reference ref_id="CVE-2012-3489" ref_url="https://www.suse.com/security/cve/CVE-2012-3489/" source="CVE"/>
		<reference ref_id="CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255/" source="CVE"/>
		<reference ref_id="CVE-2013-1899" ref_url="https://www.suse.com/security/cve/CVE-2013-1899/" source="CVE"/>
		<reference ref_id="CVE-2013-1900" ref_url="https://www.suse.com/security/cve/CVE-2013-1900/" source="CVE"/>
		<reference ref_id="CVE-2013-1901" ref_url="https://www.suse.com/security/cve/CVE-2013-1901/" source="CVE"/>
		<reference ref_id="CVE-2014-0060" ref_url="https://www.suse.com/security/cve/CVE-2014-0060/" source="CVE"/>
		<reference ref_id="CVE-2014-0061" ref_url="https://www.suse.com/security/cve/CVE-2014-0061/" source="CVE"/>
		<reference ref_id="CVE-2014-0062" ref_url="https://www.suse.com/security/cve/CVE-2014-0062/" source="CVE"/>
		<reference ref_id="CVE-2014-0063" ref_url="https://www.suse.com/security/cve/CVE-2014-0063/" source="CVE"/>
		<reference ref_id="CVE-2014-0064" ref_url="https://www.suse.com/security/cve/CVE-2014-0064/" source="CVE"/>
		<reference ref_id="CVE-2014-0065" ref_url="https://www.suse.com/security/cve/CVE-2014-0065/" source="CVE"/>
		<reference ref_id="CVE-2014-0066" ref_url="https://www.suse.com/security/cve/CVE-2014-0066/" source="CVE"/>
		<reference ref_id="CVE-2014-0067" ref_url="https://www.suse.com/security/cve/CVE-2014-0067/" source="CVE"/>
		<reference ref_id="CVE-2015-3165" ref_url="https://www.suse.com/security/cve/CVE-2015-3165/" source="CVE"/>
		<reference ref_id="CVE-2015-3166" ref_url="https://www.suse.com/security/cve/CVE-2015-3166/" source="CVE"/>
		<reference ref_id="CVE-2015-3167" ref_url="https://www.suse.com/security/cve/CVE-2015-3167/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-9.4.4-0.6.2 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4769/">CVE-2007-4769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4769">CVE-2007-4769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4772">CVE-2007-4772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6067/">CVE-2007-6067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6067">CVE-2007-6067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6600/">CVE-2007-6600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6600">CVE-2007-6600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6601/">CVE-2007-6601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6601">CVE-2007-6601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4034/">CVE-2009-4034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4034">CVE-2009-4034 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4136/">CVE-2009-4136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4136">CVE-2009-4136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1169/">CVE-2010-1169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1169">CVE-2010-1169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1170/">CVE-2010-1170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1170">CVE-2010-1170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3433/">CVE-2010-3433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3433">CVE-2010-3433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0866/">CVE-2012-0866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0866">CVE-2012-0866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0867/">CVE-2012-0867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0867">CVE-2012-0867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0868/">CVE-2012-0868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0868">CVE-2012-0868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2143/">CVE-2012-2143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2143">CVE-2012-2143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2655/">CVE-2012-2655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2655">CVE-2012-2655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3488/">CVE-2012-3488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3488">CVE-2012-3488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3489/">CVE-2012-3489 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2012-3489">CVE-2012-3489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0255">CVE-2013-0255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1899/">CVE-2013-1899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1899">CVE-2013-1899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1900/">CVE-2013-1900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1900">CVE-2013-1900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1901/">CVE-2013-1901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1901">CVE-2013-1901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0060/">CVE-2014-0060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0060">CVE-2014-0060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0061/">CVE-2014-0061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0061">CVE-2014-0061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0062/">CVE-2014-0062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0062">CVE-2014-0062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0063/">CVE-2014-0063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0063">CVE-2014-0063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0064/">CVE-2014-0064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0064">CVE-2014-0064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0065/">CVE-2014-0065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0065">CVE-2014-0065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0066/">CVE-2014-0066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0066">CVE-2014-0066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0067/">CVE-2014-0067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0067">CVE-2014-0067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3165/">CVE-2015-3165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3165">CVE-2015-3165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3166/">CVE-2015-3166 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3166">CVE-2015-3166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3167/">CVE-2015-3167 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3167">CVE-2015-3167 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990455" comment="libecpg6-9.4.4-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990456" comment="libpq5-9.4.4-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990457" comment="libpq5-32bit-9.4.4-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990458" comment="postgresql94-9.4.4-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990459" comment="postgresql94-contrib-9.4.4-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990460" comment="postgresql94-docs-9.4.4-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990461" comment="postgresql94-server-9.4.4-0.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216297" version="1" class="patch">
	<metadata>
		<title>libevent-1_4-2-1.4.5-24.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-6272" ref_url="https://www.suse.com/security/cve/CVE-2014-6272/" source="CVE"/>
		<description>
These are all security issues fixed in the libevent-1_4-2-1.4.5-24.24.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6272/">CVE-2014-6272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6272">CVE-2014-6272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990462" comment="libevent-1_4-2-1.4.5-24.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216298" version="1" class="patch">
	<metadata>
		<title>libexif-0.6.17-2.14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-6351" ref_url="https://www.suse.com/security/cve/CVE-2007-6351/" source="CVE"/>
		<reference ref_id="CVE-2007-6352" ref_url="https://www.suse.com/security/cve/CVE-2007-6352/" source="CVE"/>
		<reference ref_id="CVE-2012-2812" ref_url="https://www.suse.com/security/cve/CVE-2012-2812/" source="CVE"/>
		<reference ref_id="CVE-2012-2813" ref_url="https://www.suse.com/security/cve/CVE-2012-2813/" source="CVE"/>
		<reference ref_id="CVE-2012-2814" ref_url="https://www.suse.com/security/cve/CVE-2012-2814/" source="CVE"/>
		<reference ref_id="CVE-2012-2836" ref_url="https://www.suse.com/security/cve/CVE-2012-2836/" source="CVE"/>
		<reference ref_id="CVE-2012-2837" ref_url="https://www.suse.com/security/cve/CVE-2012-2837/" source="CVE"/>
		<reference ref_id="CVE-2012-2840" ref_url="https://www.suse.com/security/cve/CVE-2012-2840/" source="CVE"/>
		<reference ref_id="CVE-2012-2841" ref_url="https://www.suse.com/security/cve/CVE-2012-2841/" source="CVE"/>
		<description>
These are all security issues fixed in the libexif-0.6.17-2.14.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6351/">CVE-2007-6351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6351">CVE-2007-6351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6352/">CVE-2007-6352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6352">CVE-2007-6352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2812/">CVE-2012-2812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2812">CVE-2012-2812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2813/">CVE-2012-2813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2813">CVE-2012-2813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2814/">CVE-2012-2814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2814">CVE-2012-2814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2836/">CVE-2012-2836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2836">CVE-2012-2836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2837/">CVE-2012-2837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2837">CVE-2012-2837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2840/">CVE-2012-2840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2840">CVE-2012-2840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2841/">CVE-2012-2841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2841">CVE-2012-2841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989846" comment="libexif-0.6.17-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989847" comment="libexif-32bit-0.6.17-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989848" comment="libexif-x86-0.6.17-2.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216299" version="1" class="patch">
	<metadata>
		<title>libexiv2-4-0.17.1-31.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-6353" ref_url="https://www.suse.com/security/cve/CVE-2007-6353/" source="CVE"/>
		<description>
These are all security issues fixed in the libexiv2-4-0.17.1-31.20 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6353/">CVE-2007-6353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6353">CVE-2007-6353 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988666" comment="libexiv2-4-0.17.1-31.20 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216300" version="1" class="patch">
	<metadata>
		<title>libfreebl3-3.17.3-0.8.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<reference ref_id="CVE-2013-1741" ref_url="https://www.suse.com/security/cve/CVE-2013-1741/" source="CVE"/>
		<reference ref_id="CVE-2013-2566" ref_url="https://www.suse.com/security/cve/CVE-2013-2566/" source="CVE"/>
		<reference ref_id="CVE-2013-5605" ref_url="https://www.suse.com/security/cve/CVE-2013-5605/" source="CVE"/>
		<reference ref_id="CVE-2013-5606" ref_url="https://www.suse.com/security/cve/CVE-2013-5606/" source="CVE"/>
		<reference ref_id="CVE-2014-1492" ref_url="https://www.suse.com/security/cve/CVE-2014-1492/" source="CVE"/>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<reference ref_id="CVE-2014-1568" ref_url="https://www.suse.com/security/cve/CVE-2014-1568/" source="CVE"/>
		<reference ref_id="CVE-2014-1569" ref_url="https://www.suse.com/security/cve/CVE-2014-1569/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreebl3-3.17.3-0.8.11 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3170">CVE-2010-3170 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0743">CVE-2013-0743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1739">CVE-2013-1739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1741/">CVE-2013-1741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1741">CVE-2013-1741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2566/">CVE-2013-2566 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-2566">CVE-2013-2566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5605/">CVE-2013-5605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5605">CVE-2013-5605 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5606/">CVE-2013-5606 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5606">CVE-2013-5606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1492/">CVE-2014-1492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1492">CVE-2014-1492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1545">CVE-2014-1545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1568/">CVE-2014-1568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1568">CVE-2014-1568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1569/">CVE-2014-1569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1569">CVE-2014-1569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990463" comment="libfreebl3-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990464" comment="libfreebl3-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990465" comment="libfreebl3-x86-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990466" comment="libsoftokn3-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990467" comment="libsoftokn3-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990468" comment="libsoftokn3-x86-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990469" comment="mozilla-nss-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990470" comment="mozilla-nss-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990471" comment="mozilla-nss-tools-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990472" comment="mozilla-nss-x86-3.17.3-0.8.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216301" version="1" class="patch">
	<metadata>
		<title>libgcc_s1-32bit-4.8.3+r212056-2.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-5044" ref_url="https://www.suse.com/security/cve/CVE-2014-5044/" source="CVE"/>
		<description>
These are all security issues fixed in the libgcc_s1-32bit-4.8.3+r212056-2.17 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5044/">CVE-2014-5044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5044">CVE-2014-5044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990473" comment="libgcc_s1-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990474" comment="libgcc_s1-32bit-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990475" comment="libgcc_s1-x86-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990476" comment="libgfortran3-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990477" comment="libgomp1-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990478" comment="libgomp1-32bit-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990479" comment="libquadmath0-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990480" comment="libstdc++6-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990481" comment="libstdc++6-32bit-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990482" comment="libstdc++6-x86-4.8.3+r212056-2.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216302" version="1" class="patch">
	<metadata>
		<title>libgcrypt11-1.5.0-0.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-4242" ref_url="https://www.suse.com/security/cve/CVE-2013-4242/" source="CVE"/>
		<reference ref_id="CVE-2014-5270" ref_url="https://www.suse.com/security/cve/CVE-2014-5270/" source="CVE"/>
		<description>
These are all security issues fixed in the libgcrypt11-1.5.0-0.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4242/">CVE-2013-4242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4242">CVE-2013-4242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5270/">CVE-2014-5270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5270">CVE-2014-5270 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990483" comment="libgcrypt11-1.5.0-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990484" comment="libgcrypt11-32bit-1.5.0-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990485" comment="libgcrypt11-x86-1.5.0-0.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216303" version="1" class="patch">
	<metadata>
		<title>libgdiplus0-2.6.7-0.5.76 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-1526" ref_url="https://www.suse.com/security/cve/CVE-2010-1526/" source="CVE"/>
		<description>
These are all security issues fixed in the libgdiplus0-2.6.7-0.5.76 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1526/">CVE-2010-1526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1526">CVE-2010-1526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989249" comment="libgdiplus0-2.6.7-0.5.76 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216304" version="1" class="patch">
	<metadata>
		<title>libgnomesu-1.0.0-307.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-1946" ref_url="https://www.suse.com/security/cve/CVE-2011-1946/" source="CVE"/>
		<description>
These are all security issues fixed in the libgnomesu-1.0.0-307.10.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1946/">CVE-2011-1946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1946">CVE-2011-1946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989250" comment="libgnomesu-1.0.0-307.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989251" comment="libgnomesu-lang-1.0.0-307.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989252" comment="libgnomesu0-1.0.0-307.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216305" version="1" class="patch">
	<metadata>
		<title>libgtop-2.28.0-1.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-0235" ref_url="https://www.suse.com/security/cve/CVE-2007-0235/" source="CVE"/>
		<description>
These are all security issues fixed in the libgtop-2.28.0-1.13.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0235/">CVE-2007-0235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0235">CVE-2007-0235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990486" comment="libgtop-2.28.0-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990487" comment="libgtop-2_0-7-2.28.0-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990488" comment="libgtop-doc-2.28.0-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990489" comment="libgtop-lang-2.28.0-1.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216306" version="1" class="patch">
	<metadata>
		<title>libicu-32bit-4.0-7.26.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-4770" ref_url="https://www.suse.com/security/cve/CVE-2007-4770/" source="CVE"/>
		<reference ref_id="CVE-2007-4771" ref_url="https://www.suse.com/security/cve/CVE-2007-4771/" source="CVE"/>
		<reference ref_id="CVE-2008-1036" ref_url="https://www.suse.com/security/cve/CVE-2008-1036/" source="CVE"/>
		<reference ref_id="CVE-2009-0153" ref_url="https://www.suse.com/security/cve/CVE-2009-0153/" source="CVE"/>
		<reference ref_id="CVE-2010-4409" ref_url="https://www.suse.com/security/cve/CVE-2010-4409/" source="CVE"/>
		<description>
These are all security issues fixed in the libicu-32bit-4.0-7.26.15 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4770/">CVE-2007-4770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4770">CVE-2007-4770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4771/">CVE-2007-4771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4771">CVE-2007-4771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1036/">CVE-2008-1036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1036">CVE-2008-1036 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0153/">CVE-2009-0153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0153">CVE-2009-0153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4409/">CVE-2010-4409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4409">CVE-2010-4409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989863" comment="libicu-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989864" comment="libicu-32bit-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989865" comment="libicu-doc-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989866" comment="libicu-x86-4.0-7.26.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216307" version="1" class="patch">
	<metadata>
		<title>libjasper-1.900.1-134.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-8137" ref_url="https://www.suse.com/security/cve/CVE-2014-8137/" source="CVE"/>
		<reference ref_id="CVE-2014-8138" ref_url="https://www.suse.com/security/cve/CVE-2014-8138/" source="CVE"/>
		<reference ref_id="CVE-2014-8157" ref_url="https://www.suse.com/security/cve/CVE-2014-8157/" source="CVE"/>
		<reference ref_id="CVE-2014-8158" ref_url="https://www.suse.com/security/cve/CVE-2014-8158/" source="CVE"/>
		<reference ref_id="CVE-2014-9029" ref_url="https://www.suse.com/security/cve/CVE-2014-9029/" source="CVE"/>
		<description>
These are all security issues fixed in the libjasper-1.900.1-134.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8137/">CVE-2014-8137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8137">CVE-2014-8137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8138/">CVE-2014-8138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8138">CVE-2014-8138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8157/">CVE-2014-8157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8157">CVE-2014-8157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8158/">CVE-2014-8158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8158">CVE-2014-8158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9029/">CVE-2014-9029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9029">CVE-2014-9029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990490" comment="libjasper-1.900.1-134.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990491" comment="libjasper-32bit-1.900.1-134.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990492" comment="libjasper-x86-1.900.1-134.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216308" version="1" class="patch">
	<metadata>
		<title>libksba-1.0.4-1.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-9087" ref_url="https://www.suse.com/security/cve/CVE-2014-9087/" source="CVE"/>
		<description>
These are all security issues fixed in the libksba-1.0.4-1.18.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9087/">CVE-2014-9087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9087">CVE-2014-9087 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990493" comment="libksba-1.0.4-1.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216309" version="1" class="patch">
	<metadata>
		<title>libltdl7-2.2.6-2.131.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-3736" ref_url="https://www.suse.com/security/cve/CVE-2009-3736/" source="CVE"/>
		<description>
These are all security issues fixed in the libltdl7-2.2.6-2.131.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3736/">CVE-2009-3736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3736">CVE-2009-3736 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988675" comment="libltdl7-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988676" comment="libltdl7-32bit-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988677" comment="libltdl7-x86-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988678" comment="libtool-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988679" comment="libtool-32bit-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988680" comment="libtool-x86-2.2.6-2.131.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216310" version="1" class="patch">
	<metadata>
		<title>liblzo2-2-2.03-12.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607/" source="CVE"/>
		<description>
These are all security issues fixed in the liblzo2-2-2.03-12.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4607">CVE-2014-4607 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990494" comment="liblzo2-2-2.03-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990495" comment="liblzo2-2-32bit-2.03-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990496" comment="liblzo2-2-x86-2.03-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216311" version="1" class="patch">
	<metadata>
		<title>libmpfr1-2.3.2-3.118.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-9474" ref_url="https://www.suse.com/security/cve/CVE-2014-9474/" source="CVE"/>
		<description>
These are all security issues fixed in the libmpfr1-2.3.2-3.118.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9474/">CVE-2014-9474 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9474">CVE-2014-9474 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990497" comment="libmpfr1-2.3.2-3.118.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990498" comment="libmpfr1-32bit-2.3.2-3.118.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990499" comment="libmpfr1-x86-2.3.2-3.118.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216312" version="1" class="patch">
	<metadata>
		<title>libmspack0-0.0.20060920alpha-74.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556/" source="CVE"/>
		<description>
These are all security issues fixed in the libmspack0-0.0.20060920alpha-74.5.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9556">CVE-2014-9556 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990500" comment="libmspack0-0.0.20060920alpha-74.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216313" version="1" class="patch">
	<metadata>
		<title>libmusicbrainz4-2.1.5-5.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-4197" ref_url="https://www.suse.com/security/cve/CVE-2006-4197/" source="CVE"/>
		<description>
These are all security issues fixed in the libmusicbrainz4-2.1.5-5.18 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4197/">CVE-2006-4197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4197">CVE-2006-4197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988681" comment="libmusicbrainz4-2.1.5-5.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216314" version="1" class="patch">
	<metadata>
		<title>libmysql55client18-32bit-5.5.43-0.7.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-0903" ref_url="https://www.suse.com/security/cve/CVE-2006-0903/" source="CVE"/>
		<reference ref_id="CVE-2006-4226" ref_url="https://www.suse.com/security/cve/CVE-2006-4226/" source="CVE"/>
		<reference ref_id="CVE-2006-4227" ref_url="https://www.suse.com/security/cve/CVE-2006-4227/" source="CVE"/>
		<reference ref_id="CVE-2007-5969" ref_url="https://www.suse.com/security/cve/CVE-2007-5969/" source="CVE"/>
		<reference ref_id="CVE-2007-6303" ref_url="https://www.suse.com/security/cve/CVE-2007-6303/" source="CVE"/>
		<reference ref_id="CVE-2007-6304" ref_url="https://www.suse.com/security/cve/CVE-2007-6304/" source="CVE"/>
		<reference ref_id="CVE-2008-2079" ref_url="https://www.suse.com/security/cve/CVE-2008-2079/" source="CVE"/>
		<reference ref_id="CVE-2008-4456" ref_url="https://www.suse.com/security/cve/CVE-2008-4456/" source="CVE"/>
		<reference ref_id="CVE-2008-7247" ref_url="https://www.suse.com/security/cve/CVE-2008-7247/" source="CVE"/>
		<reference ref_id="CVE-2009-2446" ref_url="https://www.suse.com/security/cve/CVE-2009-2446/" source="CVE"/>
		<reference ref_id="CVE-2009-4019" ref_url="https://www.suse.com/security/cve/CVE-2009-4019/" source="CVE"/>
		<reference ref_id="CVE-2009-4028" ref_url="https://www.suse.com/security/cve/CVE-2009-4028/" source="CVE"/>
		<reference ref_id="CVE-2009-4030" ref_url="https://www.suse.com/security/cve/CVE-2009-4030/" source="CVE"/>
		<reference ref_id="CVE-2009-4484" ref_url="https://www.suse.com/security/cve/CVE-2009-4484/" source="CVE"/>
		<reference ref_id="CVE-2009-5026" ref_url="https://www.suse.com/security/cve/CVE-2009-5026/" source="CVE"/>
		<reference ref_id="CVE-2010-1626" ref_url="https://www.suse.com/security/cve/CVE-2010-1626/" source="CVE"/>
		<reference ref_id="CVE-2010-1848" ref_url="https://www.suse.com/security/cve/CVE-2010-1848/" source="CVE"/>
		<reference ref_id="CVE-2010-1849" ref_url="https://www.suse.com/security/cve/CVE-2010-1849/" source="CVE"/>
		<reference ref_id="CVE-2010-1850" ref_url="https://www.suse.com/security/cve/CVE-2010-1850/" source="CVE"/>
		<reference ref_id="CVE-2010-3833" ref_url="https://www.suse.com/security/cve/CVE-2010-3833/" source="CVE"/>
		<reference ref_id="CVE-2010-3834" ref_url="https://www.suse.com/security/cve/CVE-2010-3834/" source="CVE"/>
		<reference ref_id="CVE-2010-3835" ref_url="https://www.suse.com/security/cve/CVE-2010-3835/" source="CVE"/>
		<reference ref_id="CVE-2010-3836" ref_url="https://www.suse.com/security/cve/CVE-2010-3836/" source="CVE"/>
		<reference ref_id="CVE-2010-3837" ref_url="https://www.suse.com/security/cve/CVE-2010-3837/" source="CVE"/>
		<reference ref_id="CVE-2010-3838" ref_url="https://www.suse.com/security/cve/CVE-2010-3838/" source="CVE"/>
		<reference ref_id="CVE-2010-3839" ref_url="https://www.suse.com/security/cve/CVE-2010-3839/" source="CVE"/>
		<reference ref_id="CVE-2010-3840" ref_url="https://www.suse.com/security/cve/CVE-2010-3840/" source="CVE"/>
		<reference ref_id="CVE-2012-2122" ref_url="https://www.suse.com/security/cve/CVE-2012-2122/" source="CVE"/>
		<reference ref_id="CVE-2012-5611" ref_url="https://www.suse.com/security/cve/CVE-2012-5611/" source="CVE"/>
		<reference ref_id="CVE-2012-5615" ref_url="https://www.suse.com/security/cve/CVE-2012-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-1861" ref_url="https://www.suse.com/security/cve/CVE-2013-1861/" source="CVE"/>
		<reference ref_id="CVE-2013-1976" ref_url="https://www.suse.com/security/cve/CVE-2013-1976/" source="CVE"/>
		<reference ref_id="CVE-2013-3783" ref_url="https://www.suse.com/security/cve/CVE-2013-3783/" source="CVE"/>
		<reference ref_id="CVE-2013-3793" ref_url="https://www.suse.com/security/cve/CVE-2013-3793/" source="CVE"/>
		<reference ref_id="CVE-2013-3794" ref_url="https://www.suse.com/security/cve/CVE-2013-3794/" source="CVE"/>
		<reference ref_id="CVE-2013-3795" ref_url="https://www.suse.com/security/cve/CVE-2013-3795/" source="CVE"/>
		<reference ref_id="CVE-2013-3796" ref_url="https://www.suse.com/security/cve/CVE-2013-3796/" source="CVE"/>
		<reference ref_id="CVE-2013-3798" ref_url="https://www.suse.com/security/cve/CVE-2013-3798/" source="CVE"/>
		<reference ref_id="CVE-2013-3801" ref_url="https://www.suse.com/security/cve/CVE-2013-3801/" source="CVE"/>
		<reference ref_id="CVE-2013-3802" ref_url="https://www.suse.com/security/cve/CVE-2013-3802/" source="CVE"/>
		<reference ref_id="CVE-2013-3804" ref_url="https://www.suse.com/security/cve/CVE-2013-3804/" source="CVE"/>
		<reference ref_id="CVE-2013-3805" ref_url="https://www.suse.com/security/cve/CVE-2013-3805/" source="CVE"/>
		<reference ref_id="CVE-2013-3806" ref_url="https://www.suse.com/security/cve/CVE-2013-3806/" source="CVE"/>
		<reference ref_id="CVE-2013-3807" ref_url="https://www.suse.com/security/cve/CVE-2013-3807/" source="CVE"/>
		<reference ref_id="CVE-2013-3808" ref_url="https://www.suse.com/security/cve/CVE-2013-3808/" source="CVE"/>
		<reference ref_id="CVE-2013-3809" ref_url="https://www.suse.com/security/cve/CVE-2013-3809/" source="CVE"/>
		<reference ref_id="CVE-2013-3810" ref_url="https://www.suse.com/security/cve/CVE-2013-3810/" source="CVE"/>
		<reference ref_id="CVE-2013-3811" ref_url="https://www.suse.com/security/cve/CVE-2013-3811/" source="CVE"/>
		<reference ref_id="CVE-2013-3812" ref_url="https://www.suse.com/security/cve/CVE-2013-3812/" source="CVE"/>
		<reference ref_id="CVE-2013-4316" ref_url="https://www.suse.com/security/cve/CVE-2013-4316/" source="CVE"/>
		<reference ref_id="CVE-2013-5860" ref_url="https://www.suse.com/security/cve/CVE-2013-5860/" source="CVE"/>
		<reference ref_id="CVE-2013-5881" ref_url="https://www.suse.com/security/cve/CVE-2013-5881/" source="CVE"/>
		<reference ref_id="CVE-2013-5882" ref_url="https://www.suse.com/security/cve/CVE-2013-5882/" source="CVE"/>
		<reference ref_id="CVE-2013-5891" ref_url="https://www.suse.com/security/cve/CVE-2013-5891/" source="CVE"/>
		<reference ref_id="CVE-2013-5894" ref_url="https://www.suse.com/security/cve/CVE-2013-5894/" source="CVE"/>
		<reference ref_id="CVE-2013-5908" ref_url="https://www.suse.com/security/cve/CVE-2013-5908/" source="CVE"/>
		<reference ref_id="CVE-2014-0001" ref_url="https://www.suse.com/security/cve/CVE-2014-0001/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-0384" ref_url="https://www.suse.com/security/cve/CVE-2014-0384/" source="CVE"/>
		<reference ref_id="CVE-2014-0386" ref_url="https://www.suse.com/security/cve/CVE-2014-0386/" source="CVE"/>
		<reference ref_id="CVE-2014-0393" ref_url="https://www.suse.com/security/cve/CVE-2014-0393/" source="CVE"/>
		<reference ref_id="CVE-2014-0401" ref_url="https://www.suse.com/security/cve/CVE-2014-0401/" source="CVE"/>
		<reference ref_id="CVE-2014-0402" ref_url="https://www.suse.com/security/cve/CVE-2014-0402/" source="CVE"/>
		<reference ref_id="CVE-2014-0412" ref_url="https://www.suse.com/security/cve/CVE-2014-0412/" source="CVE"/>
		<reference ref_id="CVE-2014-0420" ref_url="https://www.suse.com/security/cve/CVE-2014-0420/" source="CVE"/>
		<reference ref_id="CVE-2014-0427" ref_url="https://www.suse.com/security/cve/CVE-2014-0427/" source="CVE"/>
		<reference ref_id="CVE-2014-0430" ref_url="https://www.suse.com/security/cve/CVE-2014-0430/" source="CVE"/>
		<reference ref_id="CVE-2014-0431" ref_url="https://www.suse.com/security/cve/CVE-2014-0431/" source="CVE"/>
		<reference ref_id="CVE-2014-0433" ref_url="https://www.suse.com/security/cve/CVE-2014-0433/" source="CVE"/>
		<reference ref_id="CVE-2014-0437" ref_url="https://www.suse.com/security/cve/CVE-2014-0437/" source="CVE"/>
		<reference ref_id="CVE-2014-2419" ref_url="https://www.suse.com/security/cve/CVE-2014-2419/" source="CVE"/>
		<reference ref_id="CVE-2014-2430" ref_url="https://www.suse.com/security/cve/CVE-2014-2430/" source="CVE"/>
		<reference ref_id="CVE-2014-2431" ref_url="https://www.suse.com/security/cve/CVE-2014-2431/" source="CVE"/>
		<reference ref_id="CVE-2014-2432" ref_url="https://www.suse.com/security/cve/CVE-2014-2432/" source="CVE"/>
		<reference ref_id="CVE-2014-2434" ref_url="https://www.suse.com/security/cve/CVE-2014-2434/" source="CVE"/>
		<reference ref_id="CVE-2014-2435" ref_url="https://www.suse.com/security/cve/CVE-2014-2435/" source="CVE"/>
		<reference ref_id="CVE-2014-2436" ref_url="https://www.suse.com/security/cve/CVE-2014-2436/" source="CVE"/>
		<reference ref_id="CVE-2014-2438" ref_url="https://www.suse.com/security/cve/CVE-2014-2438/" source="CVE"/>
		<reference ref_id="CVE-2014-2440" ref_url="https://www.suse.com/security/cve/CVE-2014-2440/" source="CVE"/>
		<reference ref_id="CVE-2014-2442" ref_url="https://www.suse.com/security/cve/CVE-2014-2442/" source="CVE"/>
		<reference ref_id="CVE-2014-2444" ref_url="https://www.suse.com/security/cve/CVE-2014-2444/" source="CVE"/>
		<reference ref_id="CVE-2014-2450" ref_url="https://www.suse.com/security/cve/CVE-2014-2450/" source="CVE"/>
		<reference ref_id="CVE-2014-2451" ref_url="https://www.suse.com/security/cve/CVE-2014-2451/" source="CVE"/>
		<reference ref_id="CVE-2014-2484" ref_url="https://www.suse.com/security/cve/CVE-2014-2484/" source="CVE"/>
		<reference ref_id="CVE-2014-2494" ref_url="https://www.suse.com/security/cve/CVE-2014-2494/" source="CVE"/>
		<reference ref_id="CVE-2014-3569" ref_url="https://www.suse.com/security/cve/CVE-2014-3569/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-4207" ref_url="https://www.suse.com/security/cve/CVE-2014-4207/" source="CVE"/>
		<reference ref_id="CVE-2014-4214" ref_url="https://www.suse.com/security/cve/CVE-2014-4214/" source="CVE"/>
		<reference ref_id="CVE-2014-4233" ref_url="https://www.suse.com/security/cve/CVE-2014-4233/" source="CVE"/>
		<reference ref_id="CVE-2014-4238" ref_url="https://www.suse.com/security/cve/CVE-2014-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-4240" ref_url="https://www.suse.com/security/cve/CVE-2014-4240/" source="CVE"/>
		<reference ref_id="CVE-2014-4243" ref_url="https://www.suse.com/security/cve/CVE-2014-4243/" source="CVE"/>
		<reference ref_id="CVE-2014-4258" ref_url="https://www.suse.com/security/cve/CVE-2014-4258/" source="CVE"/>
		<reference ref_id="CVE-2014-4260" ref_url="https://www.suse.com/security/cve/CVE-2014-4260/" source="CVE"/>
		<reference ref_id="CVE-2014-4274" ref_url="https://www.suse.com/security/cve/CVE-2014-4274/" source="CVE"/>
		<reference ref_id="CVE-2014-4287" ref_url="https://www.suse.com/security/cve/CVE-2014-4287/" source="CVE"/>
		<reference ref_id="CVE-2014-6463" ref_url="https://www.suse.com/security/cve/CVE-2014-6463/" source="CVE"/>
		<reference ref_id="CVE-2014-6464" ref_url="https://www.suse.com/security/cve/CVE-2014-6464/" source="CVE"/>
		<reference ref_id="CVE-2014-6469" ref_url="https://www.suse.com/security/cve/CVE-2014-6469/" source="CVE"/>
		<reference ref_id="CVE-2014-6474" ref_url="https://www.suse.com/security/cve/CVE-2014-6474/" source="CVE"/>
		<reference ref_id="CVE-2014-6478" ref_url="https://www.suse.com/security/cve/CVE-2014-6478/" source="CVE"/>
		<reference ref_id="CVE-2014-6484" ref_url="https://www.suse.com/security/cve/CVE-2014-6484/" source="CVE"/>
		<reference ref_id="CVE-2014-6489" ref_url="https://www.suse.com/security/cve/CVE-2014-6489/" source="CVE"/>
		<reference ref_id="CVE-2014-6491" ref_url="https://www.suse.com/security/cve/CVE-2014-6491/" source="CVE"/>
		<reference ref_id="CVE-2014-6494" ref_url="https://www.suse.com/security/cve/CVE-2014-6494/" source="CVE"/>
		<reference ref_id="CVE-2014-6495" ref_url="https://www.suse.com/security/cve/CVE-2014-6495/" source="CVE"/>
		<reference ref_id="CVE-2014-6496" ref_url="https://www.suse.com/security/cve/CVE-2014-6496/" source="CVE"/>
		<reference ref_id="CVE-2014-6500" ref_url="https://www.suse.com/security/cve/CVE-2014-6500/" source="CVE"/>
		<reference ref_id="CVE-2014-6505" ref_url="https://www.suse.com/security/cve/CVE-2014-6505/" source="CVE"/>
		<reference ref_id="CVE-2014-6507" ref_url="https://www.suse.com/security/cve/CVE-2014-6507/" source="CVE"/>
		<reference ref_id="CVE-2014-6520" ref_url="https://www.suse.com/security/cve/CVE-2014-6520/" source="CVE"/>
		<reference ref_id="CVE-2014-6530" ref_url="https://www.suse.com/security/cve/CVE-2014-6530/" source="CVE"/>
		<reference ref_id="CVE-2014-6551" ref_url="https://www.suse.com/security/cve/CVE-2014-6551/" source="CVE"/>
		<reference ref_id="CVE-2014-6555" ref_url="https://www.suse.com/security/cve/CVE-2014-6555/" source="CVE"/>
		<reference ref_id="CVE-2014-6559" ref_url="https://www.suse.com/security/cve/CVE-2014-6559/" source="CVE"/>
		<reference ref_id="CVE-2014-6564" ref_url="https://www.suse.com/security/cve/CVE-2014-6564/" source="CVE"/>
		<reference ref_id="CVE-2014-6568" ref_url="https://www.suse.com/security/cve/CVE-2014-6568/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206/" source="CVE"/>
		<reference ref_id="CVE-2015-0374" ref_url="https://www.suse.com/security/cve/CVE-2015-0374/" source="CVE"/>
		<reference ref_id="CVE-2015-0381" ref_url="https://www.suse.com/security/cve/CVE-2015-0381/" source="CVE"/>
		<reference ref_id="CVE-2015-0382" ref_url="https://www.suse.com/security/cve/CVE-2015-0382/" source="CVE"/>
		<reference ref_id="CVE-2015-0385" ref_url="https://www.suse.com/security/cve/CVE-2015-0385/" source="CVE"/>
		<reference ref_id="CVE-2015-0391" ref_url="https://www.suse.com/security/cve/CVE-2015-0391/" source="CVE"/>
		<reference ref_id="CVE-2015-0405" ref_url="https://www.suse.com/security/cve/CVE-2015-0405/" source="CVE"/>
		<reference ref_id="CVE-2015-0409" ref_url="https://www.suse.com/security/cve/CVE-2015-0409/" source="CVE"/>
		<reference ref_id="CVE-2015-0411" ref_url="https://www.suse.com/security/cve/CVE-2015-0411/" source="CVE"/>
		<reference ref_id="CVE-2015-0423" ref_url="https://www.suse.com/security/cve/CVE-2015-0423/" source="CVE"/>
		<reference ref_id="CVE-2015-0432" ref_url="https://www.suse.com/security/cve/CVE-2015-0432/" source="CVE"/>
		<reference ref_id="CVE-2015-0433" ref_url="https://www.suse.com/security/cve/CVE-2015-0433/" source="CVE"/>
		<reference ref_id="CVE-2015-0438" ref_url="https://www.suse.com/security/cve/CVE-2015-0438/" source="CVE"/>
		<reference ref_id="CVE-2015-0439" ref_url="https://www.suse.com/security/cve/CVE-2015-0439/" source="CVE"/>
		<reference ref_id="CVE-2015-0441" ref_url="https://www.suse.com/security/cve/CVE-2015-0441/" source="CVE"/>
		<reference ref_id="CVE-2015-0498" ref_url="https://www.suse.com/security/cve/CVE-2015-0498/" source="CVE"/>
		<reference ref_id="CVE-2015-0499" ref_url="https://www.suse.com/security/cve/CVE-2015-0499/" source="CVE"/>
		<reference ref_id="CVE-2015-0500" ref_url="https://www.suse.com/security/cve/CVE-2015-0500/" source="CVE"/>
		<reference ref_id="CVE-2015-0501" ref_url="https://www.suse.com/security/cve/CVE-2015-0501/" source="CVE"/>
		<reference ref_id="CVE-2015-0503" ref_url="https://www.suse.com/security/cve/CVE-2015-0503/" source="CVE"/>
		<reference ref_id="CVE-2015-0505" ref_url="https://www.suse.com/security/cve/CVE-2015-0505/" source="CVE"/>
		<reference ref_id="CVE-2015-0506" ref_url="https://www.suse.com/security/cve/CVE-2015-0506/" source="CVE"/>
		<reference ref_id="CVE-2015-0507" ref_url="https://www.suse.com/security/cve/CVE-2015-0507/" source="CVE"/>
		<reference ref_id="CVE-2015-0508" ref_url="https://www.suse.com/security/cve/CVE-2015-0508/" source="CVE"/>
		<reference ref_id="CVE-2015-0511" ref_url="https://www.suse.com/security/cve/CVE-2015-0511/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2566" ref_url="https://www.suse.com/security/cve/CVE-2015-2566/" source="CVE"/>
		<reference ref_id="CVE-2015-2567" ref_url="https://www.suse.com/security/cve/CVE-2015-2567/" source="CVE"/>
		<reference ref_id="CVE-2015-2568" ref_url="https://www.suse.com/security/cve/CVE-2015-2568/" source="CVE"/>
		<reference ref_id="CVE-2015-2571" ref_url="https://www.suse.com/security/cve/CVE-2015-2571/" source="CVE"/>
		<reference ref_id="CVE-2015-2573" ref_url="https://www.suse.com/security/cve/CVE-2015-2573/" source="CVE"/>
		<reference ref_id="CVE-2015-2576" ref_url="https://www.suse.com/security/cve/CVE-2015-2576/" source="CVE"/>
		<description>
These are all security issues fixed in the libmysql55client18-32bit-5.5.43-0.7.3 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0903/">CVE-2006-0903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0903">CVE-2006-0903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4226/">CVE-2006-4226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4226">CVE-2006-4226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4227/">CVE-2006-4227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4227">CVE-2006-4227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5969/">CVE-2007-5969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5969">CVE-2007-5969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6303/">CVE-2007-6303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6303">CVE-2007-6303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6304/">CVE-2007-6304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6304">CVE-2007-6304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2079/">CVE-2008-2079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2079">CVE-2008-2079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4456/">CVE-2008-4456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4456">CVE-2008-4456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-7247/">CVE-2008-7247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-7247">CVE-2008-7247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2446/">CVE-2009-2446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2446">CVE-2009-2446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4019/">CVE-2009-4019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4019">CVE-2009-4019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4028/">CVE-2009-4028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4028">CVE-2009-4028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4030/">CVE-2009-4030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4030">CVE-2009-4030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4484/">CVE-2009-4484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4484">CVE-2009-4484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5026/">CVE-2009-5026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5026">CVE-2009-5026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1626/">CVE-2010-1626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1626">CVE-2010-1626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1848/">CVE-2010-1848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1848">CVE-2010-1848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1849/">CVE-2010-1849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1849">CVE-2010-1849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1850/">CVE-2010-1850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1850">CVE-2010-1850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3833/">CVE-2010-3833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3833">CVE-2010-3833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3834/">CVE-2010-3834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3834">CVE-2010-3834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3835/">CVE-2010-3835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3835">CVE-2010-3835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3836/">CVE-2010-3836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3836">CVE-2010-3836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3837/">CVE-2010-3837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3837">CVE-2010-3837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3838/">CVE-2010-3838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3838">CVE-2010-3838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3839/">CVE-2010-3839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3839">CVE-2010-3839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3840/">CVE-2010-3840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3840">CVE-2010-3840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2122/">CVE-2012-2122 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2122">CVE-2012-2122 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5611/">CVE-2012-5611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5611">CVE-2012-5611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5615/">CVE-2012-5615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5615">CVE-2012-5615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1861/">CVE-2013-1861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1861">CVE-2013-1861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1976/">CVE-2013-1976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1976">CVE-2013-1976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3783/">CVE-2013-3783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3783">CVE-2013-3783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3793/">CVE-2013-3793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3793">CVE-2013-3793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3794/">CVE-2013-3794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3794">CVE-2013-3794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3795/">CVE-2013-3795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3795">CVE-2013-3795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3796/">CVE-2013-3796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3796">CVE-2013-3796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3798/">CVE-2013-3798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3798">CVE-2013-3798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3801/">CVE-2013-3801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3801">CVE-2013-3801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3802/">CVE-2013-3802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3802">CVE-2013-3802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3804/">CVE-2013-3804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3804">CVE-2013-3804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3805/">CVE-2013-3805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3805">CVE-2013-3805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3806/">CVE-2013-3806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3806">CVE-2013-3806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3807/">CVE-2013-3807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3807">CVE-2013-3807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3808/">CVE-2013-3808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3808">CVE-2013-3808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3809/">CVE-2013-3809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3809">CVE-2013-3809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3810/">CVE-2013-3810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3810">CVE-2013-3810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3811/">CVE-2013-3811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3811">CVE-2013-3811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3812/">CVE-2013-3812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3812">CVE-2013-3812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4316/">CVE-2013-4316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4316">CVE-2013-4316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5860/">CVE-2013-5860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5860">CVE-2013-5860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5881/">CVE-2013-5881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5881">CVE-2013-5881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5882/">CVE-2013-5882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5882">CVE-2013-5882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5891/">CVE-2013-5891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5891">CVE-2013-5891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5894/">CVE-2013-5894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5894">CVE-2013-5894 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5908/">CVE-2013-5908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5908">CVE-2013-5908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0001/">CVE-2014-0001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0001">CVE-2014-0001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0224">CVE-2014-0224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0384/">CVE-2014-0384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0384">CVE-2014-0384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0386/">CVE-2014-0386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0386">CVE-2014-0386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0393/">CVE-2014-0393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0393">CVE-2014-0393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0401/">CVE-2014-0401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0401">CVE-2014-0401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0402/">CVE-2014-0402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0402">CVE-2014-0402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0412/">CVE-2014-0412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0412">CVE-2014-0412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0420/">CVE-2014-0420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0420">CVE-2014-0420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0427/">CVE-2014-0427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0427">CVE-2014-0427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0430/">CVE-2014-0430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0430">CVE-2014-0430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0431/">CVE-2014-0431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0431">CVE-2014-0431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0433/">CVE-2014-0433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0433">CVE-2014-0433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0437/">CVE-2014-0437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0437">CVE-2014-0437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2419/">CVE-2014-2419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2419">CVE-2014-2419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2430/">CVE-2014-2430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2430">CVE-2014-2430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2431/">CVE-2014-2431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2431">CVE-2014-2431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2432/">CVE-2014-2432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2432">CVE-2014-2432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2434/">CVE-2014-2434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2434">CVE-2014-2434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2435/">CVE-2014-2435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2435">CVE-2014-2435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2436/">CVE-2014-2436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2436">CVE-2014-2436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2438/">CVE-2014-2438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2438">CVE-2014-2438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2440/">CVE-2014-2440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2440">CVE-2014-2440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2442/">CVE-2014-2442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2442">CVE-2014-2442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2444/">CVE-2014-2444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2444">CVE-2014-2444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2450/">CVE-2014-2450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2450">CVE-2014-2450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2451/">CVE-2014-2451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2451">CVE-2014-2451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2484/">CVE-2014-2484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2484">CVE-2014-2484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2494/">CVE-2014-2494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2494">CVE-2014-2494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3569/">CVE-2014-3569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3569">CVE-2014-3569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3570">CVE-2014-3570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3571">CVE-2014-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3572">CVE-2014-3572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4207/">CVE-2014-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4207">CVE-2014-4207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4214/">CVE-2014-4214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4214">CVE-2014-4214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4233/">CVE-2014-4233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4233">CVE-2014-4233 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4238/">CVE-2014-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4238">CVE-2014-4238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4240/">CVE-2014-4240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4240">CVE-2014-4240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4243/">CVE-2014-4243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4243">CVE-2014-4243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4258/">CVE-2014-4258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4258">CVE-2014-4258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4260/">CVE-2014-4260 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4260">CVE-2014-4260 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4274/">CVE-2014-4274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4274">CVE-2014-4274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4287/">CVE-2014-4287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4287">CVE-2014-4287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6463/">CVE-2014-6463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6463">CVE-2014-6463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6464/">CVE-2014-6464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6464">CVE-2014-6464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6469/">CVE-2014-6469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6469">CVE-2014-6469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6474/">CVE-2014-6474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6474">CVE-2014-6474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6478/">CVE-2014-6478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6478">CVE-2014-6478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6484/">CVE-2014-6484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6484">CVE-2014-6484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6489/">CVE-2014-6489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6489">CVE-2014-6489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6491/">CVE-2014-6491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6491">CVE-2014-6491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6494/">CVE-2014-6494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6494">CVE-2014-6494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6495/">CVE-2014-6495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6495">CVE-2014-6495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6496/">CVE-2014-6496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6496">CVE-2014-6496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6500/">CVE-2014-6500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6500">CVE-2014-6500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6505/">CVE-2014-6505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6505">CVE-2014-6505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6507/">CVE-2014-6507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6507">CVE-2014-6507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6520/">CVE-2014-6520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6520">CVE-2014-6520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6530/">CVE-2014-6530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6530">CVE-2014-6530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6551/">CVE-2014-6551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6551">CVE-2014-6551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6555/">CVE-2014-6555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6555">CVE-2014-6555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6559/">CVE-2014-6559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6559">CVE-2014-6559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6564/">CVE-2014-6564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6564">CVE-2014-6564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6568/">CVE-2014-6568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6568">CVE-2014-6568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8275">CVE-2014-8275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0205">CVE-2015-0205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0206">CVE-2015-0206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0374/">CVE-2015-0374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0374">CVE-2015-0374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0381/">CVE-2015-0381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0381">CVE-2015-0381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0382/">CVE-2015-0382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0382">CVE-2015-0382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0385/">CVE-2015-0385 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0385">CVE-2015-0385 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0391/">CVE-2015-0391 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0391">CVE-2015-0391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0405/">CVE-2015-0405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0405">CVE-2015-0405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0409/">CVE-2015-0409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0409">CVE-2015-0409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0411/">CVE-2015-0411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0411">CVE-2015-0411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0423/">CVE-2015-0423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0423">CVE-2015-0423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0432/">CVE-2015-0432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0432">CVE-2015-0432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0433/">CVE-2015-0433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0433">CVE-2015-0433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0438/">CVE-2015-0438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0438">CVE-2015-0438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0439/">CVE-2015-0439 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0439">CVE-2015-0439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0441/">CVE-2015-0441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0441">CVE-2015-0441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0498/">CVE-2015-0498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0498">CVE-2015-0498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0499/">CVE-2015-0499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0499">CVE-2015-0499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0500/">CVE-2015-0500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0500">CVE-2015-0500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0501/">CVE-2015-0501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0501">CVE-2015-0501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0503/">CVE-2015-0503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0503">CVE-2015-0503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0505/">CVE-2015-0505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0505">CVE-2015-0505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0506/">CVE-2015-0506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0506">CVE-2015-0506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0507/">CVE-2015-0507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0507">CVE-2015-0507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0508/">CVE-2015-0508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0508">CVE-2015-0508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0511/">CVE-2015-0511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0511">CVE-2015-0511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2305">CVE-2015-2305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2566/">CVE-2015-2566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2566">CVE-2015-2566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2567/">CVE-2015-2567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2567">CVE-2015-2567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2568/">CVE-2015-2568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2568">CVE-2015-2568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2571/">CVE-2015-2571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2571">CVE-2015-2571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2573/">CVE-2015-2573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2573">CVE-2015-2573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2576/">CVE-2015-2576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2576">CVE-2015-2576 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990501" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990502" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990503" comment="libmysql55client18-x86-5.5.43-0.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990504" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990505" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990506" comment="libmysql55client_r18-x86-5.5.43-0.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990507" comment="mysql-5.5.43-0.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990508" comment="mysql-client-5.5.43-0.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990509" comment="mysql-tools-5.5.43-0.7.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216315" version="1" class="patch">
	<metadata>
		<title>libmysqlclient15-32bit-5.0.96-0.6.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-0903" ref_url="https://www.suse.com/security/cve/CVE-2006-0903/" source="CVE"/>
		<reference ref_id="CVE-2006-4226" ref_url="https://www.suse.com/security/cve/CVE-2006-4226/" source="CVE"/>
		<reference ref_id="CVE-2006-4227" ref_url="https://www.suse.com/security/cve/CVE-2006-4227/" source="CVE"/>
		<reference ref_id="CVE-2007-5969" ref_url="https://www.suse.com/security/cve/CVE-2007-5969/" source="CVE"/>
		<reference ref_id="CVE-2007-6303" ref_url="https://www.suse.com/security/cve/CVE-2007-6303/" source="CVE"/>
		<reference ref_id="CVE-2007-6304" ref_url="https://www.suse.com/security/cve/CVE-2007-6304/" source="CVE"/>
		<reference ref_id="CVE-2008-2079" ref_url="https://www.suse.com/security/cve/CVE-2008-2079/" source="CVE"/>
		<reference ref_id="CVE-2008-4456" ref_url="https://www.suse.com/security/cve/CVE-2008-4456/" source="CVE"/>
		<reference ref_id="CVE-2008-7247" ref_url="https://www.suse.com/security/cve/CVE-2008-7247/" source="CVE"/>
		<reference ref_id="CVE-2009-2446" ref_url="https://www.suse.com/security/cve/CVE-2009-2446/" source="CVE"/>
		<reference ref_id="CVE-2009-4019" ref_url="https://www.suse.com/security/cve/CVE-2009-4019/" source="CVE"/>
		<reference ref_id="CVE-2009-4028" ref_url="https://www.suse.com/security/cve/CVE-2009-4028/" source="CVE"/>
		<reference ref_id="CVE-2009-4030" ref_url="https://www.suse.com/security/cve/CVE-2009-4030/" source="CVE"/>
		<reference ref_id="CVE-2009-4484" ref_url="https://www.suse.com/security/cve/CVE-2009-4484/" source="CVE"/>
		<reference ref_id="CVE-2009-5026" ref_url="https://www.suse.com/security/cve/CVE-2009-5026/" source="CVE"/>
		<reference ref_id="CVE-2010-1626" ref_url="https://www.suse.com/security/cve/CVE-2010-1626/" source="CVE"/>
		<reference ref_id="CVE-2010-1848" ref_url="https://www.suse.com/security/cve/CVE-2010-1848/" source="CVE"/>
		<reference ref_id="CVE-2010-1849" ref_url="https://www.suse.com/security/cve/CVE-2010-1849/" source="CVE"/>
		<reference ref_id="CVE-2010-1850" ref_url="https://www.suse.com/security/cve/CVE-2010-1850/" source="CVE"/>
		<reference ref_id="CVE-2010-3833" ref_url="https://www.suse.com/security/cve/CVE-2010-3833/" source="CVE"/>
		<reference ref_id="CVE-2010-3834" ref_url="https://www.suse.com/security/cve/CVE-2010-3834/" source="CVE"/>
		<reference ref_id="CVE-2010-3835" ref_url="https://www.suse.com/security/cve/CVE-2010-3835/" source="CVE"/>
		<reference ref_id="CVE-2010-3836" ref_url="https://www.suse.com/security/cve/CVE-2010-3836/" source="CVE"/>
		<reference ref_id="CVE-2010-3837" ref_url="https://www.suse.com/security/cve/CVE-2010-3837/" source="CVE"/>
		<reference ref_id="CVE-2010-3838" ref_url="https://www.suse.com/security/cve/CVE-2010-3838/" source="CVE"/>
		<reference ref_id="CVE-2010-3839" ref_url="https://www.suse.com/security/cve/CVE-2010-3839/" source="CVE"/>
		<reference ref_id="CVE-2010-3840" ref_url="https://www.suse.com/security/cve/CVE-2010-3840/" source="CVE"/>
		<reference ref_id="CVE-2012-2122" ref_url="https://www.suse.com/security/cve/CVE-2012-2122/" source="CVE"/>
		<reference ref_id="CVE-2012-5611" ref_url="https://www.suse.com/security/cve/CVE-2012-5611/" source="CVE"/>
		<description>
These are all security issues fixed in the libmysqlclient15-32bit-5.0.96-0.6.20 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0903/">CVE-2006-0903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0903">CVE-2006-0903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4226/">CVE-2006-4226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4226">CVE-2006-4226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4227/">CVE-2006-4227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4227">CVE-2006-4227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5969/">CVE-2007-5969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5969">CVE-2007-5969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6303/">CVE-2007-6303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6303">CVE-2007-6303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6304/">CVE-2007-6304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6304">CVE-2007-6304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2079/">CVE-2008-2079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2079">CVE-2008-2079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4456/">CVE-2008-4456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4456">CVE-2008-4456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-7247/">CVE-2008-7247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-7247">CVE-2008-7247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2446/">CVE-2009-2446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2446">CVE-2009-2446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4019/">CVE-2009-4019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4019">CVE-2009-4019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4028/">CVE-2009-4028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4028">CVE-2009-4028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4030/">CVE-2009-4030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4030">CVE-2009-4030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4484/">CVE-2009-4484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4484">CVE-2009-4484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5026/">CVE-2009-5026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5026">CVE-2009-5026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1626/">CVE-2010-1626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1626">CVE-2010-1626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1848/">CVE-2010-1848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1848">CVE-2010-1848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1849/">CVE-2010-1849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1849">CVE-2010-1849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1850/">CVE-2010-1850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1850">CVE-2010-1850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3833/">CVE-2010-3833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3833">CVE-2010-3833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3834/">CVE-2010-3834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3834">CVE-2010-3834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3835/">CVE-2010-3835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3835">CVE-2010-3835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3836/">CVE-2010-3836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3836">CVE-2010-3836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3837/">CVE-2010-3837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3837">CVE-2010-3837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3838/">CVE-2010-3838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3838">CVE-2010-3838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3839/">CVE-2010-3839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3839">CVE-2010-3839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3840/">CVE-2010-3840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3840">CVE-2010-3840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2122/">CVE-2012-2122 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2122">CVE-2012-2122 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5611/">CVE-2012-5611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5611">CVE-2012-5611 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990510" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990511" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990512" comment="libmysqlclient15-x86-5.0.96-0.6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990513" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216316" version="1" class="patch">
	<metadata>
		<title>libneon27-0.29.6-6.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-0157" ref_url="https://www.suse.com/security/cve/CVE-2007-0157/" source="CVE"/>
		<reference ref_id="CVE-2008-3746" ref_url="https://www.suse.com/security/cve/CVE-2008-3746/" source="CVE"/>
		<reference ref_id="CVE-2009-2473" ref_url="https://www.suse.com/security/cve/CVE-2009-2473/" source="CVE"/>
		<reference ref_id="CVE-2009-2474" ref_url="https://www.suse.com/security/cve/CVE-2009-2474/" source="CVE"/>
		<description>
These are all security issues fixed in the libneon27-0.29.6-6.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0157/">CVE-2007-0157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0157">CVE-2007-0157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3746/">CVE-2008-3746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3746">CVE-2008-3746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2473/">CVE-2009-2473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2473">CVE-2009-2473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2474/">CVE-2009-2474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2474">CVE-2009-2474 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989264" comment="libneon27-0.29.6-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989265" comment="libneon27-32bit-0.29.6-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989266" comment="libneon27-x86-0.29.6-6.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216317" version="1" class="patch">
	<metadata>
		<title>libnetpbm10-10.26.44-101.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-4274" ref_url="https://www.suse.com/security/cve/CVE-2009-4274/" source="CVE"/>
		<description>
These are all security issues fixed in the libnetpbm10-10.26.44-101.9.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4274/">CVE-2009-4274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4274">CVE-2009-4274 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988693" comment="libnetpbm10-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988694" comment="libnetpbm10-32bit-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988695" comment="libnetpbm10-x86-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988696" comment="netpbm-10.26.44-101.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216318" version="1" class="patch">
	<metadata>
		<title>libnewt0_52-0.52.10-1.35.113 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-2905" ref_url="https://www.suse.com/security/cve/CVE-2009-2905/" source="CVE"/>
		<description>
These are all security issues fixed in the libnewt0_52-0.52.10-1.35.113 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2905/">CVE-2009-2905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2905">CVE-2009-2905 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989874" comment="libnewt0_52-0.52.10-1.35.113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989875" comment="newt-0.52.10-1.35.113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989876" comment="python-newt-0.52.10-1.35.113 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216319" version="1" class="patch">
	<metadata>
		<title>libopensc2-0.11.6-5.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-2235" ref_url="https://www.suse.com/security/cve/CVE-2008-2235/" source="CVE"/>
		<reference ref_id="CVE-2009-0368" ref_url="https://www.suse.com/security/cve/CVE-2009-0368/" source="CVE"/>
		<description>
These are all security issues fixed in the libopensc2-0.11.6-5.27.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2235/">CVE-2008-2235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2235">CVE-2008-2235 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0368/">CVE-2009-0368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0368">CVE-2009-0368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989270" comment="libopensc2-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989271" comment="libopensc2-32bit-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989272" comment="libopensc2-x86-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989273" comment="opensc-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989274" comment="opensc-32bit-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989275" comment="opensc-x86-0.11.6-5.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216320" version="1" class="patch">
	<metadata>
		<title>libopenssl0_9_8-0.9.8j-0.70.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-2937" ref_url="https://www.suse.com/security/cve/CVE-2006-2937/" source="CVE"/>
		<reference ref_id="CVE-2006-2940" ref_url="https://www.suse.com/security/cve/CVE-2006-2940/" source="CVE"/>
		<reference ref_id="CVE-2006-3738" ref_url="https://www.suse.com/security/cve/CVE-2006-3738/" source="CVE"/>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2006-4343" ref_url="https://www.suse.com/security/cve/CVE-2006-4343/" source="CVE"/>
		<reference ref_id="CVE-2006-7250" ref_url="https://www.suse.com/security/cve/CVE-2006-7250/" source="CVE"/>
		<reference ref_id="CVE-2007-3108" ref_url="https://www.suse.com/security/cve/CVE-2007-3108/" source="CVE"/>
		<reference ref_id="CVE-2007-4995" ref_url="https://www.suse.com/security/cve/CVE-2007-4995/" source="CVE"/>
		<reference ref_id="CVE-2007-5135" ref_url="https://www.suse.com/security/cve/CVE-2007-5135/" source="CVE"/>
		<reference ref_id="CVE-2008-0891" ref_url="https://www.suse.com/security/cve/CVE-2008-0891/" source="CVE"/>
		<reference ref_id="CVE-2008-1672" ref_url="https://www.suse.com/security/cve/CVE-2008-1672/" source="CVE"/>
		<reference ref_id="CVE-2008-5077" ref_url="https://www.suse.com/security/cve/CVE-2008-5077/" source="CVE"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<reference ref_id="CVE-2009-3245" ref_url="https://www.suse.com/security/cve/CVE-2009-3245/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-4355" ref_url="https://www.suse.com/security/cve/CVE-2009-4355/" source="CVE"/>
		<reference ref_id="CVE-2009-5146" ref_url="https://www.suse.com/security/cve/CVE-2009-5146/" source="CVE"/>
		<reference ref_id="CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740/" source="CVE"/>
		<reference ref_id="CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939/" source="CVE"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2010-4180" ref_url="https://www.suse.com/security/cve/CVE-2010-4180/" source="CVE"/>
		<reference ref_id="CVE-2010-4252" ref_url="https://www.suse.com/security/cve/CVE-2010-4252/" source="CVE"/>
		<reference ref_id="CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014/" source="CVE"/>
		<reference ref_id="CVE-2011-3210" ref_url="https://www.suse.com/security/cve/CVE-2011-3210/" source="CVE"/>
		<reference ref_id="CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108/" source="CVE"/>
		<reference ref_id="CVE-2011-4109" ref_url="https://www.suse.com/security/cve/CVE-2011-4109/" source="CVE"/>
		<reference ref_id="CVE-2011-4354" ref_url="https://www.suse.com/security/cve/CVE-2011-4354/" source="CVE"/>
		<reference ref_id="CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576/" source="CVE"/>
		<reference ref_id="CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577/" source="CVE"/>
		<reference ref_id="CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619/" source="CVE"/>
		<reference ref_id="CVE-2011-5095" ref_url="https://www.suse.com/security/cve/CVE-2011-5095/" source="CVE"/>
		<reference ref_id="CVE-2012-0050" ref_url="https://www.suse.com/security/cve/CVE-2012-0050/" source="CVE"/>
		<reference ref_id="CVE-2012-0884" ref_url="https://www.suse.com/security/cve/CVE-2012-0884/" source="CVE"/>
		<reference ref_id="CVE-2012-1165" ref_url="https://www.suse.com/security/cve/CVE-2012-1165/" source="CVE"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="CVE-2012-2131" ref_url="https://www.suse.com/security/cve/CVE-2012-2131/" source="CVE"/>
		<reference ref_id="CVE-2012-2333" ref_url="https://www.suse.com/security/cve/CVE-2012-2333/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2014-0076" ref_url="https://www.suse.com/security/cve/CVE-2014-0076/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-3505" ref_url="https://www.suse.com/security/cve/CVE-2014-3505/" source="CVE"/>
		<reference ref_id="CVE-2014-3506" ref_url="https://www.suse.com/security/cve/CVE-2014-3506/" source="CVE"/>
		<reference ref_id="CVE-2014-3507" ref_url="https://www.suse.com/security/cve/CVE-2014-3507/" source="CVE"/>
		<reference ref_id="CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508/" source="CVE"/>
		<reference ref_id="CVE-2014-3510" ref_url="https://www.suse.com/security/cve/CVE-2014-3510/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0292" ref_url="https://www.suse.com/security/cve/CVE-2015-0292/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl0_9_8-0.9.8j-0.70.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2937/">CVE-2006-2937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2937">CVE-2006-2937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2940/">CVE-2006-2940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2940">CVE-2006-2940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3738/">CVE-2006-3738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3738">CVE-2006-3738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4339">CVE-2006-4339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4343/">CVE-2006-4343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4343">CVE-2006-4343 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-7250/">CVE-2006-7250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-7250">CVE-2006-7250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3108/">CVE-2007-3108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3108">CVE-2007-3108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4995/">CVE-2007-4995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4995">CVE-2007-4995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5135/">CVE-2007-5135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5135">CVE-2007-5135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0891/">CVE-2008-0891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0891">CVE-2008-0891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1672/">CVE-2008-1672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1672">CVE-2008-1672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5077/">CVE-2008-5077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5077">CVE-2008-5077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0590">CVE-2009-0590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0591">CVE-2009-0591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0789">CVE-2009-0789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1377">CVE-2009-1377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1378">CVE-2009-1378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1379">CVE-2009-1379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1386">CVE-2009-1386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1387">CVE-2009-1387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3245/">CVE-2009-3245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3245">CVE-2009-3245 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4355/">CVE-2009-4355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4355">CVE-2009-4355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5146/">CVE-2009-5146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5146">CVE-2009-5146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0740">CVE-2010-0740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2939">CVE-2010-2939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3864">CVE-2010-3864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4180/">CVE-2010-4180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4180">CVE-2010-4180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4252/">CVE-2010-4252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4252">CVE-2010-4252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0014">CVE-2011-0014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3210/">CVE-2011-3210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3210">CVE-2011-3210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4108">CVE-2011-4108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4109/">CVE-2011-4109 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4109">CVE-2011-4109 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4354/">CVE-2011-4354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4354">CVE-2011-4354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4576">CVE-2011-4576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4577">CVE-2011-4577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4619">CVE-2011-4619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5095/">CVE-2011-5095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-5095">CVE-2011-5095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0050/">CVE-2012-0050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0050">CVE-2012-0050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0884/">CVE-2012-0884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0884">CVE-2012-0884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1165/">CVE-2012-1165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1165">CVE-2012-1165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2110">CVE-2012-2110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2131/">CVE-2012-2131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2131">CVE-2012-2131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2333/">CVE-2012-2333 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2333">CVE-2012-2333 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4929">CVE-2012-4929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0166">CVE-2013-0166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0169">CVE-2013-0169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0076/">CVE-2014-0076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0076">CVE-2014-0076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0221">CVE-2014-0221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0224">CVE-2014-0224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3470">CVE-2014-3470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3505/">CVE-2014-3505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3505">CVE-2014-3505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3506/">CVE-2014-3506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3506">CVE-2014-3506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3507/">CVE-2014-3507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3507">CVE-2014-3507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3508">CVE-2014-3508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3510/">CVE-2014-3510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3510">CVE-2014-3510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3567">CVE-2014-3567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3568">CVE-2014-3568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3570">CVE-2014-3570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3571">CVE-2014-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3572">CVE-2014-3572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8275">CVE-2014-8275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0205">CVE-2015-0205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0209">CVE-2015-0209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0286">CVE-2015-0286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0287">CVE-2015-0287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0288">CVE-2015-0288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0289">CVE-2015-0289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0292/">CVE-2015-0292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0292">CVE-2015-0292 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0293">CVE-2015-0293 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990514" comment="libopenssl0_9_8-0.9.8j-0.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990515" comment="libopenssl0_9_8-32bit-0.9.8j-0.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990516" comment="libopenssl0_9_8-hmac-0.9.8j-0.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990517" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990518" comment="libopenssl0_9_8-x86-0.9.8j-0.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990519" comment="openssl-0.9.8j-0.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990520" comment="openssl-doc-0.9.8j-0.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216321" version="1" class="patch">
	<metadata>
		<title>libotr2-3.2.0-10.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-3461" ref_url="https://www.suse.com/security/cve/CVE-2012-3461/" source="CVE"/>
		<description>
These are all security issues fixed in the libotr2-3.2.0-10.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3461/">CVE-2012-3461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3461">CVE-2012-3461 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989884" comment="libotr2-3.2.0-10.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216322" version="1" class="patch">
	<metadata>
		<title>libpixman-1-0-0.24.4-0.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1591" ref_url="https://www.suse.com/security/cve/CVE-2013-1591/" source="CVE"/>
		<reference ref_id="CVE-2013-6425" ref_url="https://www.suse.com/security/cve/CVE-2013-6425/" source="CVE"/>
		<description>
These are all security issues fixed in the libpixman-1-0-0.24.4-0.15.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1591/">CVE-2013-1591 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-1591">CVE-2013-1591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6425/">CVE-2013-6425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6425">CVE-2013-6425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990521" comment="libpixman-1-0-0.24.4-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990522" comment="libpixman-1-0-32bit-0.24.4-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990523" comment="libpixman-1-0-x86-0.24.4-0.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216323" version="1" class="patch">
	<metadata>
		<title>libpng12-0-1.2.31-5.33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-5793" ref_url="https://www.suse.com/security/cve/CVE-2006-5793/" source="CVE"/>
		<reference ref_id="CVE-2008-3964" ref_url="https://www.suse.com/security/cve/CVE-2008-3964/" source="CVE"/>
		<reference ref_id="CVE-2008-5907" ref_url="https://www.suse.com/security/cve/CVE-2008-5907/" source="CVE"/>
		<reference ref_id="CVE-2008-6218" ref_url="https://www.suse.com/security/cve/CVE-2008-6218/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-2042" ref_url="https://www.suse.com/security/cve/CVE-2009-2042/" source="CVE"/>
		<reference ref_id="CVE-2009-5063" ref_url="https://www.suse.com/security/cve/CVE-2009-5063/" source="CVE"/>
		<reference ref_id="CVE-2010-0205" ref_url="https://www.suse.com/security/cve/CVE-2010-0205/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-2249" ref_url="https://www.suse.com/security/cve/CVE-2010-2249/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-2690" ref_url="https://www.suse.com/security/cve/CVE-2011-2690/" source="CVE"/>
		<reference ref_id="CVE-2011-2691" ref_url="https://www.suse.com/security/cve/CVE-2011-2691/" source="CVE"/>
		<reference ref_id="CVE-2011-2692" ref_url="https://www.suse.com/security/cve/CVE-2011-2692/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3048" ref_url="https://www.suse.com/security/cve/CVE-2011-3048/" source="CVE"/>
		<reference ref_id="CVE-2012-3425" ref_url="https://www.suse.com/security/cve/CVE-2012-3425/" source="CVE"/>
		<reference ref_id="CVE-2013-7353" ref_url="https://www.suse.com/security/cve/CVE-2013-7353/" source="CVE"/>
		<reference ref_id="CVE-2013-7354" ref_url="https://www.suse.com/security/cve/CVE-2013-7354/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng12-0-1.2.31-5.33.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5793/">CVE-2006-5793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5793">CVE-2006-5793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3964/">CVE-2008-3964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3964">CVE-2008-3964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5907/">CVE-2008-5907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5907">CVE-2008-5907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-6218/">CVE-2008-6218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-6218">CVE-2008-6218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0040">CVE-2009-0040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2042/">CVE-2009-2042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2042">CVE-2009-2042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5063/">CVE-2009-5063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5063">CVE-2009-5063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0205/">CVE-2010-0205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0205">CVE-2010-0205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1205">CVE-2010-1205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2249/">CVE-2010-2249 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2249">CVE-2010-2249 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2501">CVE-2011-2501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2690/">CVE-2011-2690 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2690">CVE-2011-2690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2691/">CVE-2011-2691 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2691">CVE-2011-2691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2692/">CVE-2011-2692 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2692">CVE-2011-2692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3026">CVE-2011-3026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3048/">CVE-2011-3048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3048">CVE-2011-3048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3425/">CVE-2012-3425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3425">CVE-2012-3425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7353/">CVE-2013-7353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7353">CVE-2013-7353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7354/">CVE-2013-7354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7354">CVE-2013-7354 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990524" comment="libpng12-0-1.2.31-5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990525" comment="libpng12-0-32bit-1.2.31-5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990526" comment="libpng12-0-x86-1.2.31-5.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216324" version="1" class="patch">
	<metadata>
		<title>libpoppler-glib4-0.12.3-1.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-0104" ref_url="https://www.suse.com/security/cve/CVE-2007-0104/" source="CVE"/>
		<reference ref_id="CVE-2007-4352" ref_url="https://www.suse.com/security/cve/CVE-2007-4352/" source="CVE"/>
		<reference ref_id="CVE-2007-5392" ref_url="https://www.suse.com/security/cve/CVE-2007-5392/" source="CVE"/>
		<reference ref_id="CVE-2007-5393" ref_url="https://www.suse.com/security/cve/CVE-2007-5393/" source="CVE"/>
		<reference ref_id="CVE-2008-2950" ref_url="https://www.suse.com/security/cve/CVE-2008-2950/" source="CVE"/>
		<reference ref_id="CVE-2009-0755" ref_url="https://www.suse.com/security/cve/CVE-2009-0755/" source="CVE"/>
		<reference ref_id="CVE-2009-0756" ref_url="https://www.suse.com/security/cve/CVE-2009-0756/" source="CVE"/>
		<reference ref_id="CVE-2009-0791" ref_url="https://www.suse.com/security/cve/CVE-2009-0791/" source="CVE"/>
		<reference ref_id="CVE-2009-0799" ref_url="https://www.suse.com/security/cve/CVE-2009-0799/" source="CVE"/>
		<reference ref_id="CVE-2009-0800" ref_url="https://www.suse.com/security/cve/CVE-2009-0800/" source="CVE"/>
		<reference ref_id="CVE-2009-1179" ref_url="https://www.suse.com/security/cve/CVE-2009-1179/" source="CVE"/>
		<reference ref_id="CVE-2009-1180" ref_url="https://www.suse.com/security/cve/CVE-2009-1180/" source="CVE"/>
		<reference ref_id="CVE-2009-1181" ref_url="https://www.suse.com/security/cve/CVE-2009-1181/" source="CVE"/>
		<reference ref_id="CVE-2009-1182" ref_url="https://www.suse.com/security/cve/CVE-2009-1182/" source="CVE"/>
		<reference ref_id="CVE-2009-1183" ref_url="https://www.suse.com/security/cve/CVE-2009-1183/" source="CVE"/>
		<reference ref_id="CVE-2009-1187" ref_url="https://www.suse.com/security/cve/CVE-2009-1187/" source="CVE"/>
		<reference ref_id="CVE-2009-1188" ref_url="https://www.suse.com/security/cve/CVE-2009-1188/" source="CVE"/>
		<reference ref_id="CVE-2009-3607" ref_url="https://www.suse.com/security/cve/CVE-2009-3607/" source="CVE"/>
		<reference ref_id="CVE-2009-3608" ref_url="https://www.suse.com/security/cve/CVE-2009-3608/" source="CVE"/>
		<reference ref_id="CVE-2010-3702" ref_url="https://www.suse.com/security/cve/CVE-2010-3702/" source="CVE"/>
		<reference ref_id="CVE-2010-3703" ref_url="https://www.suse.com/security/cve/CVE-2010-3703/" source="CVE"/>
		<reference ref_id="CVE-2010-3704" ref_url="https://www.suse.com/security/cve/CVE-2010-3704/" source="CVE"/>
		<reference ref_id="CVE-2010-5110" ref_url="https://www.suse.com/security/cve/CVE-2010-5110/" source="CVE"/>
		<reference ref_id="CVE-2013-1790" ref_url="https://www.suse.com/security/cve/CVE-2013-1790/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler-glib4-0.12.3-1.10.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0104/">CVE-2007-0104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0104">CVE-2007-0104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4352/">CVE-2007-4352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4352">CVE-2007-4352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5392/">CVE-2007-5392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5392">CVE-2007-5392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5393/">CVE-2007-5393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5393">CVE-2007-5393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2950/">CVE-2008-2950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2950">CVE-2008-2950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0755/">CVE-2009-0755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0755">CVE-2009-0755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0756/">CVE-2009-0756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0756">CVE-2009-0756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0791/">CVE-2009-0791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0791">CVE-2009-0791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0799/">CVE-2009-0799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0799">CVE-2009-0799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0800/">CVE-2009-0800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0800">CVE-2009-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1179/">CVE-2009-1179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1179">CVE-2009-1179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1180/">CVE-2009-1180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1180">CVE-2009-1180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1181/">CVE-2009-1181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1181">CVE-2009-1181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1182/">CVE-2009-1182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1182">CVE-2009-1182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1183/">CVE-2009-1183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1183">CVE-2009-1183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1187/">CVE-2009-1187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1187">CVE-2009-1187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1188/">CVE-2009-1188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1188">CVE-2009-1188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3607/">CVE-2009-3607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3607">CVE-2009-3607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3608/">CVE-2009-3608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3608">CVE-2009-3608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3702/">CVE-2010-3702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3702">CVE-2010-3702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3703/">CVE-2010-3703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3703">CVE-2010-3703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3704/">CVE-2010-3704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3704">CVE-2010-3704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5110/">CVE-2010-5110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-5110">CVE-2010-5110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1790/">CVE-2013-1790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1790">CVE-2013-1790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990527" comment="libpoppler-glib4-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990528" comment="libpoppler-qt4-3-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990529" comment="libpoppler5-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990530" comment="poppler-tools-0.12.3-1.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216325" version="1" class="patch">
	<metadata>
		<title>libproxy0-0.3.1-2.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-4505" ref_url="https://www.suse.com/security/cve/CVE-2012-4505/" source="CVE"/>
		<description>
These are all security issues fixed in the libproxy0-0.3.1-2.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4505/">CVE-2012-4505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4505">CVE-2012-4505 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989892" comment="libproxy0-0.3.1-2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989893" comment="libproxy0-32bit-0.3.1-2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989894" comment="libproxy0-config-gnome-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989895" comment="libproxy0-config-kde4-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989896" comment="libproxy0-networkmanager-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989897" comment="libproxy0-x86-0.3.1-2.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216326" version="1" class="patch">
	<metadata>
		<title>libpulse-browse0-0.9.23-0.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-0008" ref_url="https://www.suse.com/security/cve/CVE-2008-0008/" source="CVE"/>
		<reference ref_id="CVE-2014-3970" ref_url="https://www.suse.com/security/cve/CVE-2014-3970/" source="CVE"/>
		<description>
These are all security issues fixed in the libpulse-browse0-0.9.23-0.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0008/">CVE-2008-0008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0008">CVE-2008-0008 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3970/">CVE-2014-3970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3970">CVE-2014-3970 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990531" comment="libpulse-browse0-0.9.23-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990532" comment="libpulse-mainloop-glib0-0.9.23-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990533" comment="libpulse-mainloop-glib0-32bit-0.9.23-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990534" comment="libpulse-mainloop-glib0-x86-0.9.23-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990535" comment="libpulse0-0.9.23-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990536" comment="libpulse0-32bit-0.9.23-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990537" comment="libpulse0-x86-0.9.23-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990538" comment="pulseaudio-0.9.23-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990539" comment="pulseaudio-esound-compat-0.9.23-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990540" comment="pulseaudio-gdm-hooks-0.9.23-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990541" comment="pulseaudio-lang-0.9.23-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990542" comment="pulseaudio-module-x11-0.9.23-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990543" comment="pulseaudio-module-zeroconf-0.9.23-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990544" comment="pulseaudio-utils-0.9.23-0.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216327" version="1" class="patch">
	<metadata>
		<title>libpython2_6-1_0-2.6.9-0.35.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<reference ref_id="CVE-2010-3493" ref_url="https://www.suse.com/security/cve/CVE-2010-3493/" source="CVE"/>
		<reference ref_id="CVE-2011-1015" ref_url="https://www.suse.com/security/cve/CVE-2011-1015/" source="CVE"/>
		<reference ref_id="CVE-2011-1521" ref_url="https://www.suse.com/security/cve/CVE-2011-1521/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-1912" ref_url="https://www.suse.com/security/cve/CVE-2014-1912/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2014-7185" ref_url="https://www.suse.com/security/cve/CVE-2014-7185/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython2_6-1_0-2.6.9-0.35.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3560">CVE-2009-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3720">CVE-2009-3720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3493/">CVE-2010-3493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3493">CVE-2010-3493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1015/">CVE-2011-1015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1015">CVE-2011-1015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1521/">CVE-2011-1521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1521">CVE-2011-1521 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4944">CVE-2011-4944 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0845">CVE-2012-0845 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1150">CVE-2012-1150 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1752">CVE-2013-1752 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4238">CVE-2013-4238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1912/">CVE-2014-1912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1912">CVE-2014-1912 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4650">CVE-2014-4650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7185/">CVE-2014-7185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7185">CVE-2014-7185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990545" comment="libpython2_6-1_0-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990546" comment="libpython2_6-1_0-32bit-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990547" comment="libpython2_6-1_0-x86-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990548" comment="python-base-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990549" comment="python-base-32bit-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990550" comment="python-base-x86-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990551" comment="python-xml-2.6.9-0.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216328" version="1" class="patch">
	<metadata>
		<title>librpcsecgss-0.18-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<description>
These are all security issues fixed in the librpcsecgss-0.18-1.15 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3999">CVE-2007-3999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988735" comment="librpcsecgss-0.18-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990552" comment="libtirpc1-0.2.1-1.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216329" version="1" class="patch">
	<metadata>
		<title>librsvg-2.26.0-2.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-3146" ref_url="https://www.suse.com/security/cve/CVE-2011-3146/" source="CVE"/>
		<description>
These are all security issues fixed in the librsvg-2.26.0-2.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3146/">CVE-2011-3146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3146">CVE-2011-3146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989310" comment="librsvg-2.26.0-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989311" comment="librsvg-32bit-2.26.0-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989312" comment="librsvg-x86-2.26.0-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989313" comment="rsvg-view-2.26.0-2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216330" version="1" class="patch">
	<metadata>
		<title>libsamplerate-0.1.4-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-5008" ref_url="https://www.suse.com/security/cve/CVE-2008-5008/" source="CVE"/>
		<description>
These are all security issues fixed in the libsamplerate-0.1.4-1.15 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5008/">CVE-2008-5008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5008">CVE-2008-5008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988737" comment="libsamplerate-0.1.4-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988738" comment="libsamplerate-32bit-0.1.4-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988739" comment="libsamplerate-x86-0.1.4-1.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216331" version="1" class="patch">
	<metadata>
		<title>libsndfile-1.0.20-2.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-4974" ref_url="https://www.suse.com/security/cve/CVE-2007-4974/" source="CVE"/>
		<reference ref_id="CVE-2009-0186" ref_url="https://www.suse.com/security/cve/CVE-2009-0186/" source="CVE"/>
		<reference ref_id="CVE-2009-1788" ref_url="https://www.suse.com/security/cve/CVE-2009-1788/" source="CVE"/>
		<reference ref_id="CVE-2009-1791" ref_url="https://www.suse.com/security/cve/CVE-2009-1791/" source="CVE"/>
		<reference ref_id="CVE-2009-4835" ref_url="https://www.suse.com/security/cve/CVE-2009-4835/" source="CVE"/>
		<reference ref_id="CVE-2011-2696" ref_url="https://www.suse.com/security/cve/CVE-2011-2696/" source="CVE"/>
		<reference ref_id="CVE-2014-9496" ref_url="https://www.suse.com/security/cve/CVE-2014-9496/" source="CVE"/>
		<description>
These are all security issues fixed in the libsndfile-1.0.20-2.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4974/">CVE-2007-4974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4974">CVE-2007-4974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0186/">CVE-2009-0186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0186">CVE-2009-0186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1788/">CVE-2009-1788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1788">CVE-2009-1788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1791/">CVE-2009-1791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1791">CVE-2009-1791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4835/">CVE-2009-4835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4835">CVE-2009-4835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2696/">CVE-2011-2696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2696">CVE-2011-2696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9496/">CVE-2014-9496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9496">CVE-2014-9496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990553" comment="libsndfile-1.0.20-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990554" comment="libsndfile-32bit-1.0.20-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990555" comment="libsndfile-x86-1.0.20-2.6.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216332" version="1" class="patch">
	<metadata>
		<title>libsnmp15-32bit-5.4.2.1-8.12.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-4309" ref_url="https://www.suse.com/security/cve/CVE-2008-4309/" source="CVE"/>
		<reference ref_id="CVE-2008-6123" ref_url="https://www.suse.com/security/cve/CVE-2008-6123/" source="CVE"/>
		<reference ref_id="CVE-2012-2141" ref_url="https://www.suse.com/security/cve/CVE-2012-2141/" source="CVE"/>
		<reference ref_id="CVE-2014-2284" ref_url="https://www.suse.com/security/cve/CVE-2014-2284/" source="CVE"/>
		<reference ref_id="CVE-2014-2285" ref_url="https://www.suse.com/security/cve/CVE-2014-2285/" source="CVE"/>
		<reference ref_id="CVE-2014-2310" ref_url="https://www.suse.com/security/cve/CVE-2014-2310/" source="CVE"/>
		<reference ref_id="CVE-2014-3565" ref_url="https://www.suse.com/security/cve/CVE-2014-3565/" source="CVE"/>
		<description>
These are all security issues fixed in the libsnmp15-32bit-5.4.2.1-8.12.22.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4309/">CVE-2008-4309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4309">CVE-2008-4309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-6123/">CVE-2008-6123 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-6123">CVE-2008-6123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2141/">CVE-2012-2141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2141">CVE-2012-2141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2284/">CVE-2014-2284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2284">CVE-2014-2284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2285/">CVE-2014-2285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2285">CVE-2014-2285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2310/">CVE-2014-2310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2310">CVE-2014-2310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3565/">CVE-2014-3565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3565">CVE-2014-3565 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990556" comment="libsnmp15-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990557" comment="libsnmp15-32bit-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990558" comment="libsnmp15-x86-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990559" comment="net-snmp-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990560" comment="perl-SNMP-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990561" comment="snmp-mibs-5.4.2.1-8.12.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216333" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.32.2-4.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-5876" ref_url="https://www.suse.com/security/cve/CVE-2006-5876/" source="CVE"/>
		<reference ref_id="CVE-2011-2524" ref_url="https://www.suse.com/security/cve/CVE-2011-2524/" source="CVE"/>
		<reference ref_id="CVE-2012-2132" ref_url="https://www.suse.com/security/cve/CVE-2012-2132/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.32.2-4.13.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5876/">CVE-2006-5876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5876">CVE-2006-5876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2524/">CVE-2011-2524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2524">CVE-2011-2524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2132/">CVE-2012-2132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2132">CVE-2012-2132 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989911" comment="libsoup-2_4-1-2.32.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989912" comment="libsoup-2_4-1-32bit-2.32.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989913" comment="libsoup-2_4-1-x86-2.32.2-4.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216334" version="1" class="patch">
	<metadata>
		<title>libssh2-1-1.2.9-4.2.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-1782" ref_url="https://www.suse.com/security/cve/CVE-2015-1782/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh2-1-1.2.9-4.2.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1782/">CVE-2015-1782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1782">CVE-2015-1782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990562" comment="libssh2-1-1.2.9-4.2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216335" version="1" class="patch">
	<metadata>
		<title>libsss_idmap0-1.9.4-0.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-4341" ref_url="https://www.suse.com/security/cve/CVE-2010-4341/" source="CVE"/>
		<reference ref_id="CVE-2011-1758" ref_url="https://www.suse.com/security/cve/CVE-2011-1758/" source="CVE"/>
		<reference ref_id="CVE-2013-0219" ref_url="https://www.suse.com/security/cve/CVE-2013-0219/" source="CVE"/>
		<reference ref_id="CVE-2013-0220" ref_url="https://www.suse.com/security/cve/CVE-2013-0220/" source="CVE"/>
		<reference ref_id="CVE-2013-0287" ref_url="https://www.suse.com/security/cve/CVE-2013-0287/" source="CVE"/>
		<description>
These are all security issues fixed in the libsss_idmap0-1.9.4-0.16.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4341/">CVE-2010-4341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4341">CVE-2010-4341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1758/">CVE-2011-1758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1758">CVE-2011-1758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0219/">CVE-2013-0219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0219">CVE-2013-0219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0220/">CVE-2013-0220 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0220">CVE-2013-0220 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0287/">CVE-2013-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0287">CVE-2013-0287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990563" comment="libsss_idmap0-1.9.4-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990564" comment="python-sssd-config-1.9.4-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990565" comment="sssd-1.9.4-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990566" comment="sssd-32bit-1.9.4-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990567" comment="sssd-tools-1.9.4-0.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216336" version="1" class="patch">
	<metadata>
		<title>libtasn1-1.5-1.30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3468" ref_url="https://www.suse.com/security/cve/CVE-2014-3468/" source="CVE"/>
		<reference ref_id="CVE-2014-3469" ref_url="https://www.suse.com/security/cve/CVE-2014-3469/" source="CVE"/>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<description>
These are all security issues fixed in the libtasn1-1.5-1.30.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3468/">CVE-2014-3468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3468">CVE-2014-3468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3469/">CVE-2014-3469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3469">CVE-2014-3469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2806">CVE-2015-2806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990568" comment="libtasn1-1.5-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990569" comment="libtasn1-3-1.5-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990570" comment="libtasn1-3-32bit-1.5-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990571" comment="libtasn1-3-x86-1.5-1.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216337" version="1" class="patch">
	<metadata>
		<title>libtevent0-x86-3.6.3-0.39.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-3403" ref_url="https://www.suse.com/security/cve/CVE-2006-3403/" source="CVE"/>
		<reference ref_id="CVE-2007-0452" ref_url="https://www.suse.com/security/cve/CVE-2007-0452/" source="CVE"/>
		<reference ref_id="CVE-2007-2444" ref_url="https://www.suse.com/security/cve/CVE-2007-2444/" source="CVE"/>
		<reference ref_id="CVE-2007-2446" ref_url="https://www.suse.com/security/cve/CVE-2007-2446/" source="CVE"/>
		<reference ref_id="CVE-2007-2447" ref_url="https://www.suse.com/security/cve/CVE-2007-2447/" source="CVE"/>
		<reference ref_id="CVE-2007-4138" ref_url="https://www.suse.com/security/cve/CVE-2007-4138/" source="CVE"/>
		<reference ref_id="CVE-2007-4572" ref_url="https://www.suse.com/security/cve/CVE-2007-4572/" source="CVE"/>
		<reference ref_id="CVE-2007-5398" ref_url="https://www.suse.com/security/cve/CVE-2007-5398/" source="CVE"/>
		<reference ref_id="CVE-2007-6015" ref_url="https://www.suse.com/security/cve/CVE-2007-6015/" source="CVE"/>
		<reference ref_id="CVE-2008-1105" ref_url="https://www.suse.com/security/cve/CVE-2008-1105/" source="CVE"/>
		<reference ref_id="CVE-2008-3789" ref_url="https://www.suse.com/security/cve/CVE-2008-3789/" source="CVE"/>
		<reference ref_id="CVE-2008-4314" ref_url="https://www.suse.com/security/cve/CVE-2008-4314/" source="CVE"/>
		<reference ref_id="CVE-2009-0022" ref_url="https://www.suse.com/security/cve/CVE-2009-0022/" source="CVE"/>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2010-0926" ref_url="https://www.suse.com/security/cve/CVE-2010-0926/" source="CVE"/>
		<reference ref_id="CVE-2010-1635" ref_url="https://www.suse.com/security/cve/CVE-2010-1635/" source="CVE"/>
		<reference ref_id="CVE-2010-1642" ref_url="https://www.suse.com/security/cve/CVE-2010-1642/" source="CVE"/>
		<reference ref_id="CVE-2010-2063" ref_url="https://www.suse.com/security/cve/CVE-2010-2063/" source="CVE"/>
		<reference ref_id="CVE-2010-3069" ref_url="https://www.suse.com/security/cve/CVE-2010-3069/" source="CVE"/>
		<reference ref_id="CVE-2011-0719" ref_url="https://www.suse.com/security/cve/CVE-2011-0719/" source="CVE"/>
		<reference ref_id="CVE-2011-2522" ref_url="https://www.suse.com/security/cve/CVE-2011-2522/" source="CVE"/>
		<reference ref_id="CVE-2011-2694" ref_url="https://www.suse.com/security/cve/CVE-2011-2694/" source="CVE"/>
		<reference ref_id="CVE-2012-0817" ref_url="https://www.suse.com/security/cve/CVE-2012-0817/" source="CVE"/>
		<reference ref_id="CVE-2012-0870" ref_url="https://www.suse.com/security/cve/CVE-2012-0870/" source="CVE"/>
		<reference ref_id="CVE-2012-1182" ref_url="https://www.suse.com/security/cve/CVE-2012-1182/" source="CVE"/>
		<reference ref_id="CVE-2012-2111" ref_url="https://www.suse.com/security/cve/CVE-2012-2111/" source="CVE"/>
		<reference ref_id="CVE-2013-0213" ref_url="https://www.suse.com/security/cve/CVE-2013-0213/" source="CVE"/>
		<reference ref_id="CVE-2013-0214" ref_url="https://www.suse.com/security/cve/CVE-2013-0214/" source="CVE"/>
		<reference ref_id="CVE-2013-0454" ref_url="https://www.suse.com/security/cve/CVE-2013-0454/" source="CVE"/>
		<description>
These are all security issues fixed in the libtevent0-x86-3.6.3-0.39.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3403/">CVE-2006-3403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3403">CVE-2006-3403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0452/">CVE-2007-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0452">CVE-2007-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2444/">CVE-2007-2444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2444">CVE-2007-2444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2446/">CVE-2007-2446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2446">CVE-2007-2446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2447/">CVE-2007-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2447">CVE-2007-2447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4138/">CVE-2007-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4138">CVE-2007-4138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4572/">CVE-2007-4572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4572">CVE-2007-4572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5398/">CVE-2007-5398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5398">CVE-2007-5398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6015/">CVE-2007-6015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6015">CVE-2007-6015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1105/">CVE-2008-1105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1105">CVE-2008-1105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3789/">CVE-2008-3789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3789">CVE-2008-3789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4314/">CVE-2008-4314 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4314">CVE-2008-4314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0022/">CVE-2009-0022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0022">CVE-2009-0022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1886">CVE-2009-1886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1888">CVE-2009-1888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2813">CVE-2009-2813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2906">CVE-2009-2906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2948">CVE-2009-2948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0547">CVE-2010-0547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0728">CVE-2010-0728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0787">CVE-2010-0787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0926/">CVE-2010-0926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0926">CVE-2010-0926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1635/">CVE-2010-1635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1635">CVE-2010-1635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1642/">CVE-2010-1642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1642">CVE-2010-1642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2063/">CVE-2010-2063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2063">CVE-2010-2063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3069/">CVE-2010-3069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3069">CVE-2010-3069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0719/">CVE-2011-0719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0719">CVE-2011-0719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2522/">CVE-2011-2522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2522">CVE-2011-2522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2694/">CVE-2011-2694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2694">CVE-2011-2694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0817/">CVE-2012-0817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0817">CVE-2012-0817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0870/">CVE-2012-0870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0870">CVE-2012-0870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1182/">CVE-2012-1182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1182">CVE-2012-1182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2111/">CVE-2012-2111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2111">CVE-2012-2111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0213/">CVE-2013-0213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0213">CVE-2013-0213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0214/">CVE-2013-0214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0214">CVE-2013-0214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0454/">CVE-2013-0454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0454">CVE-2013-0454 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990572" comment="libtevent0-x86-3.6.3-0.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216338" version="1" class="patch">
	<metadata>
		<title>libtiff3-3.8.2-141.154.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-1586" ref_url="https://www.suse.com/security/cve/CVE-2008-1586/" source="CVE"/>
		<reference ref_id="CVE-2008-2327" ref_url="https://www.suse.com/security/cve/CVE-2008-2327/" source="CVE"/>
		<reference ref_id="CVE-2009-2285" ref_url="https://www.suse.com/security/cve/CVE-2009-2285/" source="CVE"/>
		<reference ref_id="CVE-2009-2347" ref_url="https://www.suse.com/security/cve/CVE-2009-2347/" source="CVE"/>
		<reference ref_id="CVE-2010-1411" ref_url="https://www.suse.com/security/cve/CVE-2010-1411/" source="CVE"/>
		<reference ref_id="CVE-2010-4665" ref_url="https://www.suse.com/security/cve/CVE-2010-4665/" source="CVE"/>
		<reference ref_id="CVE-2011-0191" ref_url="https://www.suse.com/security/cve/CVE-2011-0191/" source="CVE"/>
		<reference ref_id="CVE-2011-0192" ref_url="https://www.suse.com/security/cve/CVE-2011-0192/" source="CVE"/>
		<reference ref_id="CVE-2011-1167" ref_url="https://www.suse.com/security/cve/CVE-2011-1167/" source="CVE"/>
		<reference ref_id="CVE-2012-1173" ref_url="https://www.suse.com/security/cve/CVE-2012-1173/" source="CVE"/>
		<reference ref_id="CVE-2012-2088" ref_url="https://www.suse.com/security/cve/CVE-2012-2088/" source="CVE"/>
		<reference ref_id="CVE-2012-2113" ref_url="https://www.suse.com/security/cve/CVE-2012-2113/" source="CVE"/>
		<reference ref_id="CVE-2012-3401" ref_url="https://www.suse.com/security/cve/CVE-2012-3401/" source="CVE"/>
		<reference ref_id="CVE-2012-4447" ref_url="https://www.suse.com/security/cve/CVE-2012-4447/" source="CVE"/>
		<reference ref_id="CVE-2012-4564" ref_url="https://www.suse.com/security/cve/CVE-2012-4564/" source="CVE"/>
		<reference ref_id="CVE-2012-5581" ref_url="https://www.suse.com/security/cve/CVE-2012-5581/" source="CVE"/>
		<reference ref_id="CVE-2013-1960" ref_url="https://www.suse.com/security/cve/CVE-2013-1960/" source="CVE"/>
		<reference ref_id="CVE-2013-1961" ref_url="https://www.suse.com/security/cve/CVE-2013-1961/" source="CVE"/>
		<reference ref_id="CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231/" source="CVE"/>
		<reference ref_id="CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232/" source="CVE"/>
		<reference ref_id="CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243/" source="CVE"/>
		<reference ref_id="CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff3-3.8.2-141.154.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1586/">CVE-2008-1586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1586">CVE-2008-1586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2327/">CVE-2008-2327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2327">CVE-2008-2327 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2285/">CVE-2009-2285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2285">CVE-2009-2285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2347/">CVE-2009-2347 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2347">CVE-2009-2347 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1411/">CVE-2010-1411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1411">CVE-2010-1411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4665/">CVE-2010-4665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4665">CVE-2010-4665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0191/">CVE-2011-0191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0191">CVE-2011-0191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0192/">CVE-2011-0192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0192">CVE-2011-0192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1167/">CVE-2011-1167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1167">CVE-2011-1167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1173/">CVE-2012-1173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1173">CVE-2012-1173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2088/">CVE-2012-2088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2088">CVE-2012-2088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2113/">CVE-2012-2113 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2113">CVE-2012-2113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3401/">CVE-2012-3401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3401">CVE-2012-3401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4447/">CVE-2012-4447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4447">CVE-2012-4447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4564/">CVE-2012-4564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4564">CVE-2012-4564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5581/">CVE-2012-5581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5581">CVE-2012-5581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1960/">CVE-2013-1960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1960">CVE-2013-1960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1961/">CVE-2013-1961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1961">CVE-2013-1961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4231">CVE-2013-4231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4232">CVE-2013-4232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4243">CVE-2013-4243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4244">CVE-2013-4244 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990573" comment="libtiff3-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990574" comment="libtiff3-32bit-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990575" comment="libtiff3-x86-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990576" comment="tiff-3.8.2-141.154.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216339" version="1" class="patch">
	<metadata>
		<title>libtspi1-0.3.10-0.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-0698" ref_url="https://www.suse.com/security/cve/CVE-2012-0698/" source="CVE"/>
		<description>
These are all security issues fixed in the libtspi1-0.3.10-0.11.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0698/">CVE-2012-0698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0698">CVE-2012-0698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990577" comment="libtspi1-0.3.10-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990578" comment="libtspi1-32bit-0.3.10-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990579" comment="libtspi1-x86-0.3.10-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990580" comment="trousers-0.3.10-0.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216340" version="1" class="patch">
	<metadata>
		<title>libupsclient1-2.6.2-0.2.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-2944" ref_url="https://www.suse.com/security/cve/CVE-2012-2944/" source="CVE"/>
		<description>
These are all security issues fixed in the libupsclient1-2.6.2-0.2.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2944/">CVE-2012-2944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2944">CVE-2012-2944 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989927" comment="libupsclient1-2.6.2-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989928" comment="nut-2.6.2-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989929" comment="nut-classic-2.6.2-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989930" comment="nut-drivers-net-2.6.2-0.2.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216341" version="1" class="patch">
	<metadata>
		<title>libvirt-1.2.5-3.76 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-5086" ref_url="https://www.suse.com/security/cve/CVE-2008-5086/" source="CVE"/>
		<reference ref_id="CVE-2010-2242" ref_url="https://www.suse.com/security/cve/CVE-2010-2242/" source="CVE"/>
		<reference ref_id="CVE-2011-1146" ref_url="https://www.suse.com/security/cve/CVE-2011-1146/" source="CVE"/>
		<reference ref_id="CVE-2011-1486" ref_url="https://www.suse.com/security/cve/CVE-2011-1486/" source="CVE"/>
		<reference ref_id="CVE-2011-2511" ref_url="https://www.suse.com/security/cve/CVE-2011-2511/" source="CVE"/>
		<reference ref_id="CVE-2011-4600" ref_url="https://www.suse.com/security/cve/CVE-2011-4600/" source="CVE"/>
		<reference ref_id="CVE-2012-3445" ref_url="https://www.suse.com/security/cve/CVE-2012-3445/" source="CVE"/>
		<reference ref_id="CVE-2012-4423" ref_url="https://www.suse.com/security/cve/CVE-2012-4423/" source="CVE"/>
		<reference ref_id="CVE-2013-1962" ref_url="https://www.suse.com/security/cve/CVE-2013-1962/" source="CVE"/>
		<reference ref_id="CVE-2013-4291" ref_url="https://www.suse.com/security/cve/CVE-2013-4291/" source="CVE"/>
		<reference ref_id="CVE-2013-4296" ref_url="https://www.suse.com/security/cve/CVE-2013-4296/" source="CVE"/>
		<reference ref_id="CVE-2013-4311" ref_url="https://www.suse.com/security/cve/CVE-2013-4311/" source="CVE"/>
		<reference ref_id="CVE-2013-5651" ref_url="https://www.suse.com/security/cve/CVE-2013-5651/" source="CVE"/>
		<reference ref_id="CVE-2013-6436" ref_url="https://www.suse.com/security/cve/CVE-2013-6436/" source="CVE"/>
		<reference ref_id="CVE-2013-6456" ref_url="https://www.suse.com/security/cve/CVE-2013-6456/" source="CVE"/>
		<reference ref_id="CVE-2013-6458" ref_url="https://www.suse.com/security/cve/CVE-2013-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-0179" ref_url="https://www.suse.com/security/cve/CVE-2014-0179/" source="CVE"/>
		<reference ref_id="CVE-2014-1447" ref_url="https://www.suse.com/security/cve/CVE-2014-1447/" source="CVE"/>
		<reference ref_id="CVE-2014-3633" ref_url="https://www.suse.com/security/cve/CVE-2014-3633/" source="CVE"/>
		<reference ref_id="CVE-2014-3657" ref_url="https://www.suse.com/security/cve/CVE-2014-3657/" source="CVE"/>
		<reference ref_id="CVE-2015-0236" ref_url="https://www.suse.com/security/cve/CVE-2015-0236/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-1.2.5-3.76 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5086/">CVE-2008-5086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5086">CVE-2008-5086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2242/">CVE-2010-2242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2242">CVE-2010-2242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1146/">CVE-2011-1146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1146">CVE-2011-1146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1486/">CVE-2011-1486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1486">CVE-2011-1486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2511/">CVE-2011-2511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2511">CVE-2011-2511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4600/">CVE-2011-4600 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2011-4600">CVE-2011-4600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3445/">CVE-2012-3445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3445">CVE-2012-3445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4423/">CVE-2012-4423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4423">CVE-2012-4423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1962/">CVE-2013-1962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1962">CVE-2013-1962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4291/">CVE-2013-4291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4291">CVE-2013-4291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4296/">CVE-2013-4296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4296">CVE-2013-4296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4311/">CVE-2013-4311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4311">CVE-2013-4311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5651/">CVE-2013-5651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5651">CVE-2013-5651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6436/">CVE-2013-6436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6436">CVE-2013-6436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6456/">CVE-2013-6456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6456">CVE-2013-6456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6458/">CVE-2013-6458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6458">CVE-2013-6458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0179/">CVE-2014-0179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0179">CVE-2014-0179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1447/">CVE-2014-1447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1447">CVE-2014-1447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3633/">CVE-2014-3633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3633">CVE-2014-3633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3657/">CVE-2014-3657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3657">CVE-2014-3657 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0236/">CVE-2015-0236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0236">CVE-2015-0236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990581" comment="libvirt-1.2.5-3.76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990582" comment="libvirt-client-1.2.5-3.76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990583" comment="libvirt-client-32bit-1.2.5-3.76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990584" comment="libvirt-doc-1.2.5-3.76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990585" comment="libvirt-lock-sanlock-1.2.5-3.76 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216342" version="1" class="patch">
	<metadata>
		<title>libvorbis-1.2.0-79.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-3106" ref_url="https://www.suse.com/security/cve/CVE-2007-3106/" source="CVE"/>
		<reference ref_id="CVE-2008-1419" ref_url="https://www.suse.com/security/cve/CVE-2008-1419/" source="CVE"/>
		<reference ref_id="CVE-2008-1420" ref_url="https://www.suse.com/security/cve/CVE-2008-1420/" source="CVE"/>
		<reference ref_id="CVE-2008-1423" ref_url="https://www.suse.com/security/cve/CVE-2008-1423/" source="CVE"/>
		<reference ref_id="CVE-2009-2663" ref_url="https://www.suse.com/security/cve/CVE-2009-2663/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<description>
These are all security issues fixed in the libvorbis-1.2.0-79.20.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3106/">CVE-2007-3106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3106">CVE-2007-3106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1419/">CVE-2008-1419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1419">CVE-2008-1419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1420/">CVE-2008-1420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1420">CVE-2008-1420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1423/">CVE-2008-1423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1423">CVE-2008-1423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2663/">CVE-2009-2663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2663">CVE-2009-2663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3379">CVE-2009-3379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0444">CVE-2012-0444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989937" comment="libvorbis-1.2.0-79.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989938" comment="libvorbis-32bit-1.2.0-79.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989939" comment="libvorbis-doc-1.2.0-79.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989940" comment="libvorbis-x86-1.2.0-79.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216343" version="1" class="patch">
	<metadata>
		<title>libwsman1-2.2.3-0.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<description>
These are all security issues fixed in the libwsman1-2.2.3-0.8.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990586" comment="libwsman1-2.2.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990587" comment="openwsman-client-2.2.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990588" comment="openwsman-server-2.2.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990589" comment="suseRegister-1.4-1.38.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216344" version="1" class="patch">
	<metadata>
		<title>libxcrypt-3.0.3-0.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<description>
These are all security issues fixed in the libxcrypt-3.0.3-0.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2483">CVE-2011-2483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989339" comment="libxcrypt-3.0.3-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989340" comment="libxcrypt-32bit-3.0.3-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989341" comment="libxcrypt-x86-3.0.3-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990590" comment="pam-modules-11-1.25.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990591" comment="pam-modules-32bit-11-1.25.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990592" comment="pam-modules-x86-11-1.25.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990593" comment="pwdutils-3.2.15-0.17.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990594" comment="pwdutils-plugin-audit-3.2.15-0.17.28 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216345" version="1" class="patch">
	<metadata>
		<title>libxml2-2.7.6-0.31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-6284" ref_url="https://www.suse.com/security/cve/CVE-2007-6284/" source="CVE"/>
		<reference ref_id="CVE-2008-4225" ref_url="https://www.suse.com/security/cve/CVE-2008-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-4226" ref_url="https://www.suse.com/security/cve/CVE-2008-4226/" source="CVE"/>
		<reference ref_id="CVE-2008-4409" ref_url="https://www.suse.com/security/cve/CVE-2008-4409/" source="CVE"/>
		<reference ref_id="CVE-2009-2414" ref_url="https://www.suse.com/security/cve/CVE-2009-2414/" source="CVE"/>
		<reference ref_id="CVE-2009-2416" ref_url="https://www.suse.com/security/cve/CVE-2009-2416/" source="CVE"/>
		<reference ref_id="CVE-2010-4494" ref_url="https://www.suse.com/security/cve/CVE-2010-4494/" source="CVE"/>
		<reference ref_id="CVE-2011-1944" ref_url="https://www.suse.com/security/cve/CVE-2011-1944/" source="CVE"/>
		<reference ref_id="CVE-2011-2821" ref_url="https://www.suse.com/security/cve/CVE-2011-2821/" source="CVE"/>
		<reference ref_id="CVE-2011-3102" ref_url="https://www.suse.com/security/cve/CVE-2011-3102/" source="CVE"/>
		<reference ref_id="CVE-2011-3919" ref_url="https://www.suse.com/security/cve/CVE-2011-3919/" source="CVE"/>
		<reference ref_id="CVE-2012-0841" ref_url="https://www.suse.com/security/cve/CVE-2012-0841/" source="CVE"/>
		<reference ref_id="CVE-2012-2807" ref_url="https://www.suse.com/security/cve/CVE-2012-2807/" source="CVE"/>
		<reference ref_id="CVE-2012-5134" ref_url="https://www.suse.com/security/cve/CVE-2012-5134/" source="CVE"/>
		<reference ref_id="CVE-2013-0338" ref_url="https://www.suse.com/security/cve/CVE-2013-0338/" source="CVE"/>
		<reference ref_id="CVE-2013-2877" ref_url="https://www.suse.com/security/cve/CVE-2013-2877/" source="CVE"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2014-3660" ref_url="https://www.suse.com/security/cve/CVE-2014-3660/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2.7.6-0.31.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6284/">CVE-2007-6284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6284">CVE-2007-6284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4225/">CVE-2008-4225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4225">CVE-2008-4225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4226/">CVE-2008-4226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4226">CVE-2008-4226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4409/">CVE-2008-4409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4409">CVE-2008-4409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2414/">CVE-2009-2414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2414">CVE-2009-2414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2416/">CVE-2009-2416 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-2416">CVE-2009-2416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4494/">CVE-2010-4494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4494">CVE-2010-4494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1944/">CVE-2011-1944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1944">CVE-2011-1944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2821/">CVE-2011-2821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2821">CVE-2011-2821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3102/">CVE-2011-3102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3102">CVE-2011-3102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3919/">CVE-2011-3919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3919">CVE-2011-3919 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0841/">CVE-2012-0841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0841">CVE-2012-0841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2807/">CVE-2012-2807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2807">CVE-2012-2807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5134/">CVE-2012-5134 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5134">CVE-2012-5134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0338/">CVE-2013-0338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0338">CVE-2013-0338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2877/">CVE-2013-2877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2877">CVE-2013-2877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0191">CVE-2014-0191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3660/">CVE-2014-3660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3660">CVE-2014-3660 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990595" comment="libxml2-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990596" comment="libxml2-32bit-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990597" comment="libxml2-doc-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990598" comment="libxml2-x86-2.7.6-0.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216346" version="1" class="patch">
	<metadata>
		<title>libxslt-1.1.24-19.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-1767" ref_url="https://www.suse.com/security/cve/CVE-2008-1767/" source="CVE"/>
		<reference ref_id="CVE-2011-3970" ref_url="https://www.suse.com/security/cve/CVE-2011-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-2825" ref_url="https://www.suse.com/security/cve/CVE-2012-2825/" source="CVE"/>
		<reference ref_id="CVE-2012-6139" ref_url="https://www.suse.com/security/cve/CVE-2012-6139/" source="CVE"/>
		<reference ref_id="CVE-2013-4520" ref_url="https://www.suse.com/security/cve/CVE-2013-4520/" source="CVE"/>
		<description>
These are all security issues fixed in the libxslt-1.1.24-19.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1767/">CVE-2008-1767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1767">CVE-2008-1767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3970/">CVE-2011-3970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3970">CVE-2011-3970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2825/">CVE-2012-2825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2825">CVE-2012-2825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6139/">CVE-2012-6139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6139">CVE-2012-6139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4520/">CVE-2013-4520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4520">CVE-2013-4520 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990599" comment="libxslt-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990600" comment="libxslt-32bit-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990601" comment="libxslt-x86-1.1.24-19.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216347" version="1" class="patch">
	<metadata>
		<title>libzip1-0.9-1.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<description>
These are all security issues fixed in the libzip1-0.9-1.24.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0421">CVE-2011-0421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989351" comment="libzip1-0.9-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216348" version="1" class="patch">
	<metadata>
		<title>log4net-1.2.10-1.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-0743" ref_url="https://www.suse.com/security/cve/CVE-2006-0743/" source="CVE"/>
		<description>
These are all security issues fixed in the log4net-1.2.10-1.36 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0743/">CVE-2006-0743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0743">CVE-2006-0743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988770" comment="log4net-1.2.10-1.36 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216349" version="1" class="patch">
	<metadata>
		<title>logrotate-3.7.7-10.30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-1098" ref_url="https://www.suse.com/security/cve/CVE-2011-1098/" source="CVE"/>
		<reference ref_id="CVE-2011-1154" ref_url="https://www.suse.com/security/cve/CVE-2011-1154/" source="CVE"/>
		<reference ref_id="CVE-2011-1155" ref_url="https://www.suse.com/security/cve/CVE-2011-1155/" source="CVE"/>
		<description>
These are all security issues fixed in the logrotate-3.7.7-10.30.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1098/">CVE-2011-1098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1098">CVE-2011-1098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1154/">CVE-2011-1154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1154">CVE-2011-1154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1155/">CVE-2011-1155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1155">CVE-2011-1155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990602" comment="logrotate-3.7.7-10.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216350" version="1" class="patch">
	<metadata>
		<title>logwatch-7.3.6-65.74.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-1018" ref_url="https://www.suse.com/security/cve/CVE-2011-1018/" source="CVE"/>
		<description>
These are all security issues fixed in the logwatch-7.3.6-65.74.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1018/">CVE-2011-1018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1018">CVE-2011-1018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990603" comment="logwatch-7.3.6-65.74.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216351" version="1" class="patch">
	<metadata>
		<title>lvm2-2.02.98-0.33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2526" ref_url="https://www.suse.com/security/cve/CVE-2010-2526/" source="CVE"/>
		<description>
These are all security issues fixed in the lvm2-2.02.98-0.33.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2526/">CVE-2010-2526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2526">CVE-2010-2526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990604" comment="lvm2-2.02.98-0.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216352" version="1" class="patch">
	<metadata>
		<title>lxc-0.8.0-0.23.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-6441" ref_url="https://www.suse.com/security/cve/CVE-2013-6441/" source="CVE"/>
		<description>
These are all security issues fixed in the lxc-0.8.0-0.23.2 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6441/">CVE-2013-6441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6441">CVE-2013-6441 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990605" comment="lxc-0.8.0-0.23.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216353" version="1" class="patch">
	<metadata>
		<title>mailman-2.1.14-9.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-2191" ref_url="https://www.suse.com/security/cve/CVE-2006-2191/" source="CVE"/>
		<reference ref_id="CVE-2006-2941" ref_url="https://www.suse.com/security/cve/CVE-2006-2941/" source="CVE"/>
		<reference ref_id="CVE-2006-3636" ref_url="https://www.suse.com/security/cve/CVE-2006-3636/" source="CVE"/>
		<reference ref_id="CVE-2010-3089" ref_url="https://www.suse.com/security/cve/CVE-2010-3089/" source="CVE"/>
		<reference ref_id="CVE-2010-3090" ref_url="https://www.suse.com/security/cve/CVE-2010-3090/" source="CVE"/>
		<reference ref_id="CVE-2011-0707" ref_url="https://www.suse.com/security/cve/CVE-2011-0707/" source="CVE"/>
		<description>
These are all security issues fixed in the mailman-2.1.14-9.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2191/">CVE-2006-2191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2191">CVE-2006-2191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2941/">CVE-2006-2941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2941">CVE-2006-2941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3636/">CVE-2006-3636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3636">CVE-2006-3636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3089/">CVE-2010-3089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3089">CVE-2010-3089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3090/">CVE-2010-3090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3090">CVE-2010-3090 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0707/">CVE-2011-0707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0707">CVE-2011-0707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989950" comment="mailman-2.1.14-9.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216354" version="1" class="patch">
	<metadata>
		<title>mailx-12.5-1.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2004-2771" ref_url="https://www.suse.com/security/cve/CVE-2004-2771/" source="CVE"/>
		<reference ref_id="CVE-2014-7844" ref_url="https://www.suse.com/security/cve/CVE-2014-7844/" source="CVE"/>
		<description>
These are all security issues fixed in the mailx-12.5-1.9.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2004-2771/">CVE-2004-2771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-2771">CVE-2004-2771 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-7844/">CVE-2014-7844 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7844">CVE-2014-7844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990606" comment="mailx-12.5-1.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216355" version="1" class="patch">
	<metadata>
		<title>man-2.5.2-17.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-4250" ref_url="https://www.suse.com/security/cve/CVE-2006-4250/" source="CVE"/>
		<description>
These are all security issues fixed in the man-2.5.2-17.16 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4250/">CVE-2006-4250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4250">CVE-2006-4250 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988772" comment="man-2.5.2-17.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216356" version="1" class="patch">
	<metadata>
		<title>mipv6d-2.0.2.umip.0.4-8.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2522" ref_url="https://www.suse.com/security/cve/CVE-2010-2522/" source="CVE"/>
		<reference ref_id="CVE-2010-2523" ref_url="https://www.suse.com/security/cve/CVE-2010-2523/" source="CVE"/>
		<description>
These are all security issues fixed in the mipv6d-2.0.2.umip.0.4-8.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2522/">CVE-2010-2522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2522">CVE-2010-2522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2523/">CVE-2010-2523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2523">CVE-2010-2523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989356" comment="mipv6d-2.0.2.umip.0.4-8.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216357" version="1" class="patch">
	<metadata>
		<title>mono-core-2.6.7-0.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0217" ref_url="https://www.suse.com/security/cve/CVE-2009-0217/" source="CVE"/>
		<reference ref_id="CVE-2010-1459" ref_url="https://www.suse.com/security/cve/CVE-2010-1459/" source="CVE"/>
		<reference ref_id="CVE-2010-3332" ref_url="https://www.suse.com/security/cve/CVE-2010-3332/" source="CVE"/>
		<reference ref_id="CVE-2010-4159" ref_url="https://www.suse.com/security/cve/CVE-2010-4159/" source="CVE"/>
		<reference ref_id="CVE-2012-3382" ref_url="https://www.suse.com/security/cve/CVE-2012-3382/" source="CVE"/>
		<reference ref_id="CVE-2015-2318" ref_url="https://www.suse.com/security/cve/CVE-2015-2318/" source="CVE"/>
		<reference ref_id="CVE-2015-2319" ref_url="https://www.suse.com/security/cve/CVE-2015-2319/" source="CVE"/>
		<reference ref_id="CVE-2015-2320" ref_url="https://www.suse.com/security/cve/CVE-2015-2320/" source="CVE"/>
		<description>
These are all security issues fixed in the mono-core-2.6.7-0.13.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0217/">CVE-2009-0217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0217">CVE-2009-0217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1459/">CVE-2010-1459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1459">CVE-2010-1459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3332/">CVE-2010-3332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3332">CVE-2010-3332 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4159/">CVE-2010-4159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4159">CVE-2010-4159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3382/">CVE-2012-3382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3382">CVE-2012-3382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2318/">CVE-2015-2318 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2318">CVE-2015-2318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2319/">CVE-2015-2319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2319">CVE-2015-2319 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2320/">CVE-2015-2320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2320">CVE-2015-2320 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990607" comment="mono-core-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990608" comment="mono-data-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990609" comment="mono-data-postgresql-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990610" comment="mono-data-sqlite-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990611" comment="mono-locale-extras-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990612" comment="mono-nunit-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990613" comment="mono-web-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990614" comment="mono-winforms-2.6.7-0.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216358" version="1" class="patch">
	<metadata>
		<title>mozilla-nspr-32bit-4.10.7-0.3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-5607" ref_url="https://www.suse.com/security/cve/CVE-2013-5607/" source="CVE"/>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<description>
These are all security issues fixed in the mozilla-nspr-32bit-4.10.7-0.3.3 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5607/">CVE-2013-5607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5607">CVE-2013-5607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1545">CVE-2014-1545 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990615" comment="mozilla-nspr-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990616" comment="mozilla-nspr-32bit-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990617" comment="mozilla-nspr-x86-4.10.7-0.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216359" version="1" class="patch">
	<metadata>
		<title>mozilla-xulrunner192-1.9.2.27-0.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-5913" ref_url="https://www.suse.com/security/cve/CVE-2008-5913/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-0164" ref_url="https://www.suse.com/security/cve/CVE-2010-0164/" source="CVE"/>
		<reference ref_id="CVE-2010-0165" ref_url="https://www.suse.com/security/cve/CVE-2010-0165/" source="CVE"/>
		<reference ref_id="CVE-2010-0166" ref_url="https://www.suse.com/security/cve/CVE-2010-0166/" source="CVE"/>
		<reference ref_id="CVE-2010-0167" ref_url="https://www.suse.com/security/cve/CVE-2010-0167/" source="CVE"/>
		<reference ref_id="CVE-2010-0168" ref_url="https://www.suse.com/security/cve/CVE-2010-0168/" source="CVE"/>
		<reference ref_id="CVE-2010-0169" ref_url="https://www.suse.com/security/cve/CVE-2010-0169/" source="CVE"/>
		<reference ref_id="CVE-2010-0170" ref_url="https://www.suse.com/security/cve/CVE-2010-0170/" source="CVE"/>
		<reference ref_id="CVE-2010-0171" ref_url="https://www.suse.com/security/cve/CVE-2010-0171/" source="CVE"/>
		<reference ref_id="CVE-2010-0172" ref_url="https://www.suse.com/security/cve/CVE-2010-0172/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0179" ref_url="https://www.suse.com/security/cve/CVE-2010-0179/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<reference ref_id="CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654/" source="CVE"/>
		<reference ref_id="CVE-2010-1028" ref_url="https://www.suse.com/security/cve/CVE-2010-1028/" source="CVE"/>
		<reference ref_id="CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121/" source="CVE"/>
		<reference ref_id="CVE-2010-1125" ref_url="https://www.suse.com/security/cve/CVE-2010-1125/" source="CVE"/>
		<reference ref_id="CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196/" source="CVE"/>
		<reference ref_id="CVE-2010-1197" ref_url="https://www.suse.com/security/cve/CVE-2010-1197/" source="CVE"/>
		<reference ref_id="CVE-2010-1198" ref_url="https://www.suse.com/security/cve/CVE-2010-1198/" source="CVE"/>
		<reference ref_id="CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199/" source="CVE"/>
		<reference ref_id="CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200/" source="CVE"/>
		<reference ref_id="CVE-2010-1201" ref_url="https://www.suse.com/security/cve/CVE-2010-1201/" source="CVE"/>
		<reference ref_id="CVE-2010-1202" ref_url="https://www.suse.com/security/cve/CVE-2010-1202/" source="CVE"/>
		<reference ref_id="CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-1206" ref_url="https://www.suse.com/security/cve/CVE-2010-1206/" source="CVE"/>
		<reference ref_id="CVE-2010-1207" ref_url="https://www.suse.com/security/cve/CVE-2010-1207/" source="CVE"/>
		<reference ref_id="CVE-2010-1208" ref_url="https://www.suse.com/security/cve/CVE-2010-1208/" source="CVE"/>
		<reference ref_id="CVE-2010-1209" ref_url="https://www.suse.com/security/cve/CVE-2010-1209/" source="CVE"/>
		<reference ref_id="CVE-2010-1210" ref_url="https://www.suse.com/security/cve/CVE-2010-1210/" source="CVE"/>
		<reference ref_id="CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211/" source="CVE"/>
		<reference ref_id="CVE-2010-1212" ref_url="https://www.suse.com/security/cve/CVE-2010-1212/" source="CVE"/>
		<reference ref_id="CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213/" source="CVE"/>
		<reference ref_id="CVE-2010-1214" ref_url="https://www.suse.com/security/cve/CVE-2010-1214/" source="CVE"/>
		<reference ref_id="CVE-2010-1215" ref_url="https://www.suse.com/security/cve/CVE-2010-1215/" source="CVE"/>
		<reference ref_id="CVE-2010-1585" ref_url="https://www.suse.com/security/cve/CVE-2010-1585/" source="CVE"/>
		<reference ref_id="CVE-2010-2751" ref_url="https://www.suse.com/security/cve/CVE-2010-2751/" source="CVE"/>
		<reference ref_id="CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752/" source="CVE"/>
		<reference ref_id="CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753/" source="CVE"/>
		<reference ref_id="CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754/" source="CVE"/>
		<reference ref_id="CVE-2010-2755" ref_url="https://www.suse.com/security/cve/CVE-2010-2755/" source="CVE"/>
		<reference ref_id="CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760/" source="CVE"/>
		<reference ref_id="CVE-2010-2762" ref_url="https://www.suse.com/security/cve/CVE-2010-2762/" source="CVE"/>
		<reference ref_id="CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764/" source="CVE"/>
		<reference ref_id="CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765/" source="CVE"/>
		<reference ref_id="CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766/" source="CVE"/>
		<reference ref_id="CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767/" source="CVE"/>
		<reference ref_id="CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768/" source="CVE"/>
		<reference ref_id="CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769/" source="CVE"/>
		<reference ref_id="CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166/" source="CVE"/>
		<reference ref_id="CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167/" source="CVE"/>
		<reference ref_id="CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168/" source="CVE"/>
		<reference ref_id="CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3173" ref_url="https://www.suse.com/security/cve/CVE-2010-3173/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<reference ref_id="CVE-2010-3766" ref_url="https://www.suse.com/security/cve/CVE-2010-3766/" source="CVE"/>
		<reference ref_id="CVE-2010-3767" ref_url="https://www.suse.com/security/cve/CVE-2010-3767/" source="CVE"/>
		<reference ref_id="CVE-2010-3768" ref_url="https://www.suse.com/security/cve/CVE-2010-3768/" source="CVE"/>
		<reference ref_id="CVE-2010-3769" ref_url="https://www.suse.com/security/cve/CVE-2010-3769/" source="CVE"/>
		<reference ref_id="CVE-2010-3770" ref_url="https://www.suse.com/security/cve/CVE-2010-3770/" source="CVE"/>
		<reference ref_id="CVE-2010-3771" ref_url="https://www.suse.com/security/cve/CVE-2010-3771/" source="CVE"/>
		<reference ref_id="CVE-2010-3772" ref_url="https://www.suse.com/security/cve/CVE-2010-3772/" source="CVE"/>
		<reference ref_id="CVE-2010-3773" ref_url="https://www.suse.com/security/cve/CVE-2010-3773/" source="CVE"/>
		<reference ref_id="CVE-2010-3775" ref_url="https://www.suse.com/security/cve/CVE-2010-3775/" source="CVE"/>
		<reference ref_id="CVE-2010-3776" ref_url="https://www.suse.com/security/cve/CVE-2010-3776/" source="CVE"/>
		<reference ref_id="CVE-2010-3777" ref_url="https://www.suse.com/security/cve/CVE-2010-3777/" source="CVE"/>
		<reference ref_id="CVE-2010-3778" ref_url="https://www.suse.com/security/cve/CVE-2010-3778/" source="CVE"/>
		<reference ref_id="CVE-2011-0051" ref_url="https://www.suse.com/security/cve/CVE-2011-0051/" source="CVE"/>
		<reference ref_id="CVE-2011-0053" ref_url="https://www.suse.com/security/cve/CVE-2011-0053/" source="CVE"/>
		<reference ref_id="CVE-2011-0054" ref_url="https://www.suse.com/security/cve/CVE-2011-0054/" source="CVE"/>
		<reference ref_id="CVE-2011-0055" ref_url="https://www.suse.com/security/cve/CVE-2011-0055/" source="CVE"/>
		<reference ref_id="CVE-2011-0056" ref_url="https://www.suse.com/security/cve/CVE-2011-0056/" source="CVE"/>
		<reference ref_id="CVE-2011-0057" ref_url="https://www.suse.com/security/cve/CVE-2011-0057/" source="CVE"/>
		<reference ref_id="CVE-2011-0059" ref_url="https://www.suse.com/security/cve/CVE-2011-0059/" source="CVE"/>
		<reference ref_id="CVE-2011-0061" ref_url="https://www.suse.com/security/cve/CVE-2011-0061/" source="CVE"/>
		<reference ref_id="CVE-2011-0062" ref_url="https://www.suse.com/security/cve/CVE-2011-0062/" source="CVE"/>
		<reference ref_id="CVE-2011-0065" ref_url="https://www.suse.com/security/cve/CVE-2011-0065/" source="CVE"/>
		<reference ref_id="CVE-2011-0066" ref_url="https://www.suse.com/security/cve/CVE-2011-0066/" source="CVE"/>
		<reference ref_id="CVE-2011-0067" ref_url="https://www.suse.com/security/cve/CVE-2011-0067/" source="CVE"/>
		<reference ref_id="CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069/" source="CVE"/>
		<reference ref_id="CVE-2011-0070" ref_url="https://www.suse.com/security/cve/CVE-2011-0070/" source="CVE"/>
		<reference ref_id="CVE-2011-0072" ref_url="https://www.suse.com/security/cve/CVE-2011-0072/" source="CVE"/>
		<reference ref_id="CVE-2011-0073" ref_url="https://www.suse.com/security/cve/CVE-2011-0073/" source="CVE"/>
		<reference ref_id="CVE-2011-0074" ref_url="https://www.suse.com/security/cve/CVE-2011-0074/" source="CVE"/>
		<reference ref_id="CVE-2011-0075" ref_url="https://www.suse.com/security/cve/CVE-2011-0075/" source="CVE"/>
		<reference ref_id="CVE-2011-0077" ref_url="https://www.suse.com/security/cve/CVE-2011-0077/" source="CVE"/>
		<reference ref_id="CVE-2011-0078" ref_url="https://www.suse.com/security/cve/CVE-2011-0078/" source="CVE"/>
		<reference ref_id="CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080/" source="CVE"/>
		<reference ref_id="CVE-2011-0081" ref_url="https://www.suse.com/security/cve/CVE-2011-0081/" source="CVE"/>
		<reference ref_id="CVE-2011-0083" ref_url="https://www.suse.com/security/cve/CVE-2011-0083/" source="CVE"/>
		<reference ref_id="CVE-2011-0084" ref_url="https://www.suse.com/security/cve/CVE-2011-0084/" source="CVE"/>
		<reference ref_id="CVE-2011-0085" ref_url="https://www.suse.com/security/cve/CVE-2011-0085/" source="CVE"/>
		<reference ref_id="CVE-2011-1202" ref_url="https://www.suse.com/security/cve/CVE-2011-1202/" source="CVE"/>
		<reference ref_id="CVE-2011-2362" ref_url="https://www.suse.com/security/cve/CVE-2011-2362/" source="CVE"/>
		<reference ref_id="CVE-2011-2363" ref_url="https://www.suse.com/security/cve/CVE-2011-2363/" source="CVE"/>
		<reference ref_id="CVE-2011-2364" ref_url="https://www.suse.com/security/cve/CVE-2011-2364/" source="CVE"/>
		<reference ref_id="CVE-2011-2365" ref_url="https://www.suse.com/security/cve/CVE-2011-2365/" source="CVE"/>
		<reference ref_id="CVE-2011-2371" ref_url="https://www.suse.com/security/cve/CVE-2011-2371/" source="CVE"/>
		<reference ref_id="CVE-2011-2372" ref_url="https://www.suse.com/security/cve/CVE-2011-2372/" source="CVE"/>
		<reference ref_id="CVE-2011-2373" ref_url="https://www.suse.com/security/cve/CVE-2011-2373/" source="CVE"/>
		<reference ref_id="CVE-2011-2374" ref_url="https://www.suse.com/security/cve/CVE-2011-2374/" source="CVE"/>
		<reference ref_id="CVE-2011-2376" ref_url="https://www.suse.com/security/cve/CVE-2011-2376/" source="CVE"/>
		<reference ref_id="CVE-2011-2377" ref_url="https://www.suse.com/security/cve/CVE-2011-2377/" source="CVE"/>
		<reference ref_id="CVE-2011-2378" ref_url="https://www.suse.com/security/cve/CVE-2011-2378/" source="CVE"/>
		<reference ref_id="CVE-2011-2980" ref_url="https://www.suse.com/security/cve/CVE-2011-2980/" source="CVE"/>
		<reference ref_id="CVE-2011-2981" ref_url="https://www.suse.com/security/cve/CVE-2011-2981/" source="CVE"/>
		<reference ref_id="CVE-2011-2982" ref_url="https://www.suse.com/security/cve/CVE-2011-2982/" source="CVE"/>
		<reference ref_id="CVE-2011-2983" ref_url="https://www.suse.com/security/cve/CVE-2011-2983/" source="CVE"/>
		<reference ref_id="CVE-2011-2995" ref_url="https://www.suse.com/security/cve/CVE-2011-2995/" source="CVE"/>
		<reference ref_id="CVE-2011-2996" ref_url="https://www.suse.com/security/cve/CVE-2011-2996/" source="CVE"/>
		<reference ref_id="CVE-2011-2999" ref_url="https://www.suse.com/security/cve/CVE-2011-2999/" source="CVE"/>
		<reference ref_id="CVE-2011-3000" ref_url="https://www.suse.com/security/cve/CVE-2011-3000/" source="CVE"/>
		<reference ref_id="CVE-2011-3001" ref_url="https://www.suse.com/security/cve/CVE-2011-3001/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3647" ref_url="https://www.suse.com/security/cve/CVE-2011-3647/" source="CVE"/>
		<reference ref_id="CVE-2011-3648" ref_url="https://www.suse.com/security/cve/CVE-2011-3648/" source="CVE"/>
		<reference ref_id="CVE-2011-3650" ref_url="https://www.suse.com/security/cve/CVE-2011-3650/" source="CVE"/>
		<reference ref_id="CVE-2011-3659" ref_url="https://www.suse.com/security/cve/CVE-2011-3659/" source="CVE"/>
		<reference ref_id="CVE-2011-3666" ref_url="https://www.suse.com/security/cve/CVE-2011-3666/" source="CVE"/>
		<reference ref_id="CVE-2011-3670" ref_url="https://www.suse.com/security/cve/CVE-2011-3670/" source="CVE"/>
		<reference ref_id="CVE-2012-0442" ref_url="https://www.suse.com/security/cve/CVE-2012-0442/" source="CVE"/>
		<reference ref_id="CVE-2012-0443" ref_url="https://www.suse.com/security/cve/CVE-2012-0443/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<reference ref_id="CVE-2012-0449" ref_url="https://www.suse.com/security/cve/CVE-2012-0449/" source="CVE"/>
		<description>
These are all security issues fixed in the mozilla-xulrunner192-1.9.2.27-0.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5913/">CVE-2008-5913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5913">CVE-2008-5913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0164/">CVE-2010-0164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0164">CVE-2010-0164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0165/">CVE-2010-0165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0165">CVE-2010-0165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0166/">CVE-2010-0166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0166">CVE-2010-0166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0167/">CVE-2010-0167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0167">CVE-2010-0167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0168/">CVE-2010-0168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0168">CVE-2010-0168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0169/">CVE-2010-0169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0169">CVE-2010-0169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0170/">CVE-2010-0170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0170">CVE-2010-0170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0171/">CVE-2010-0171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0171">CVE-2010-0171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0172/">CVE-2010-0172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0172">CVE-2010-0172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0173">CVE-2010-0173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0174">CVE-2010-0174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0176">CVE-2010-0176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0177">CVE-2010-0177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0178">CVE-2010-0178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0179/">CVE-2010-0179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0179">CVE-2010-0179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0181">CVE-2010-0181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0182">CVE-2010-0182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0654">CVE-2010-0654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1028/">CVE-2010-1028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1028">CVE-2010-1028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1121">CVE-2010-1121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1125/">CVE-2010-1125 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1125">CVE-2010-1125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1196">CVE-2010-1196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1197/">CVE-2010-1197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1197">CVE-2010-1197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1198/">CVE-2010-1198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1198">CVE-2010-1198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1199">CVE-2010-1199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1200">CVE-2010-1200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1201/">CVE-2010-1201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1201">CVE-2010-1201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1202/">CVE-2010-1202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1202">CVE-2010-1202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1203">CVE-2010-1203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1205">CVE-2010-1205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1206/">CVE-2010-1206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1206">CVE-2010-1206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1207/">CVE-2010-1207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1207">CVE-2010-1207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1208/">CVE-2010-1208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1208">CVE-2010-1208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1209/">CVE-2010-1209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1209">CVE-2010-1209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1210/">CVE-2010-1210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1210">CVE-2010-1210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1211">CVE-2010-1211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1212/">CVE-2010-1212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1212">CVE-2010-1212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1213">CVE-2010-1213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1214/">CVE-2010-1214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1214">CVE-2010-1214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1215/">CVE-2010-1215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1215">CVE-2010-1215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1585/">CVE-2010-1585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1585">CVE-2010-1585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2751/">CVE-2010-2751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2751">CVE-2010-2751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2752">CVE-2010-2752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2753">CVE-2010-2753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2754">CVE-2010-2754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2755/">CVE-2010-2755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2755">CVE-2010-2755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2760">CVE-2010-2760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2762/">CVE-2010-2762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2762">CVE-2010-2762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2764">CVE-2010-2764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2765">CVE-2010-2765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2766">CVE-2010-2766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2767">CVE-2010-2767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2768">CVE-2010-2768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2769">CVE-2010-2769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3166">CVE-2010-3166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3167">CVE-2010-3167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3168">CVE-2010-3168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3169">CVE-2010-3169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3170">CVE-2010-3170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3173/">CVE-2010-3173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3173">CVE-2010-3173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3174">CVE-2010-3174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3175">CVE-2010-3175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3176">CVE-2010-3176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3177">CVE-2010-3177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3178">CVE-2010-3178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3179">CVE-2010-3179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3180">CVE-2010-3180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3182">CVE-2010-3182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3183">CVE-2010-3183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3765">CVE-2010-3765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3766/">CVE-2010-3766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3766">CVE-2010-3766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3767/">CVE-2010-3767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3767">CVE-2010-3767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3768/">CVE-2010-3768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3768">CVE-2010-3768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3769/">CVE-2010-3769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3769">CVE-2010-3769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3770/">CVE-2010-3770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3770">CVE-2010-3770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3771/">CVE-2010-3771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3771">CVE-2010-3771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3772/">CVE-2010-3772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3772">CVE-2010-3772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3773/">CVE-2010-3773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3773">CVE-2010-3773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3775/">CVE-2010-3775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3775">CVE-2010-3775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3776/">CVE-2010-3776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3776">CVE-2010-3776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3777/">CVE-2010-3777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3777">CVE-2010-3777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3778/">CVE-2010-3778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3778">CVE-2010-3778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0051/">CVE-2011-0051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0051">CVE-2011-0051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0053/">CVE-2011-0053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0053">CVE-2011-0053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0054/">CVE-2011-0054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0054">CVE-2011-0054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0055/">CVE-2011-0055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0055">CVE-2011-0055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0056/">CVE-2011-0056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0056">CVE-2011-0056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0057/">CVE-2011-0057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0057">CVE-2011-0057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0059/">CVE-2011-0059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0059">CVE-2011-0059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0061/">CVE-2011-0061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0061">CVE-2011-0061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0062/">CVE-2011-0062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0062">CVE-2011-0062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0065/">CVE-2011-0065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0065">CVE-2011-0065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0066/">CVE-2011-0066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0066">CVE-2011-0066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0067/">CVE-2011-0067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0067">CVE-2011-0067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0069">CVE-2011-0069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0070/">CVE-2011-0070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0070">CVE-2011-0070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0072/">CVE-2011-0072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0072">CVE-2011-0072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0073/">CVE-2011-0073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0073">CVE-2011-0073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0074/">CVE-2011-0074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0074">CVE-2011-0074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0075/">CVE-2011-0075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0075">CVE-2011-0075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0077/">CVE-2011-0077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0077">CVE-2011-0077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0078/">CVE-2011-0078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0078">CVE-2011-0078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0080">CVE-2011-0080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0081/">CVE-2011-0081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0081">CVE-2011-0081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0083/">CVE-2011-0083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0083">CVE-2011-0083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0084/">CVE-2011-0084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0084">CVE-2011-0084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0085/">CVE-2011-0085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0085">CVE-2011-0085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1202/">CVE-2011-1202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1202">CVE-2011-1202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2362/">CVE-2011-2362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2362">CVE-2011-2362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2363/">CVE-2011-2363 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2363">CVE-2011-2363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2364/">CVE-2011-2364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2364">CVE-2011-2364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2365/">CVE-2011-2365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2365">CVE-2011-2365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2371/">CVE-2011-2371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2371">CVE-2011-2371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2372/">CVE-2011-2372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2372">CVE-2011-2372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2373/">CVE-2011-2373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2373">CVE-2011-2373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2374/">CVE-2011-2374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2374">CVE-2011-2374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2376/">CVE-2011-2376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2376">CVE-2011-2376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2377/">CVE-2011-2377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2377">CVE-2011-2377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2378/">CVE-2011-2378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2378">CVE-2011-2378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2980/">CVE-2011-2980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2980">CVE-2011-2980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2981/">CVE-2011-2981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2981">CVE-2011-2981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2982/">CVE-2011-2982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2982">CVE-2011-2982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2983/">CVE-2011-2983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2983">CVE-2011-2983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2995/">CVE-2011-2995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2995">CVE-2011-2995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2996/">CVE-2011-2996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2996">CVE-2011-2996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2999/">CVE-2011-2999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2999">CVE-2011-2999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3000/">CVE-2011-3000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3000">CVE-2011-3000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3001/">CVE-2011-3001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3001">CVE-2011-3001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3026">CVE-2011-3026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3647/">CVE-2011-3647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3647">CVE-2011-3647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3648/">CVE-2011-3648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3648">CVE-2011-3648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3650/">CVE-2011-3650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3650">CVE-2011-3650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3659/">CVE-2011-3659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3659">CVE-2011-3659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3666/">CVE-2011-3666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3666">CVE-2011-3666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3670/">CVE-2011-3670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3670">CVE-2011-3670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0442/">CVE-2012-0442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0442">CVE-2012-0442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0443/">CVE-2012-0443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0443">CVE-2012-0443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0444">CVE-2012-0444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0449/">CVE-2012-0449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0449">CVE-2012-0449 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989959" comment="mozilla-xulrunner192-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989960" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989961" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989962" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989963" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216360" version="1" class="patch">
	<metadata>
		<title>mutt-1.5.17-42.39.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-1558" ref_url="https://www.suse.com/security/cve/CVE-2007-1558/" source="CVE"/>
		<reference ref_id="CVE-2014-0467" ref_url="https://www.suse.com/security/cve/CVE-2014-0467/" source="CVE"/>
		<reference ref_id="CVE-2014-9116" ref_url="https://www.suse.com/security/cve/CVE-2014-9116/" source="CVE"/>
		<description>
These are all security issues fixed in the mutt-1.5.17-42.39.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1558/">CVE-2007-1558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1558">CVE-2007-1558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0467/">CVE-2014-0467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0467">CVE-2014-0467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9116/">CVE-2014-9116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9116">CVE-2014-9116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990618" comment="mutt-1.5.17-42.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216361" version="1" class="patch">
	<metadata>
		<title>nagios-3.0.6-1.25.36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-5803" ref_url="https://www.suse.com/security/cve/CVE-2007-5803/" source="CVE"/>
		<reference ref_id="CVE-2011-1523" ref_url="https://www.suse.com/security/cve/CVE-2011-1523/" source="CVE"/>
		<reference ref_id="CVE-2012-6096" ref_url="https://www.suse.com/security/cve/CVE-2012-6096/" source="CVE"/>
		<reference ref_id="CVE-2013-7108" ref_url="https://www.suse.com/security/cve/CVE-2013-7108/" source="CVE"/>
		<reference ref_id="CVE-2014-1878" ref_url="https://www.suse.com/security/cve/CVE-2014-1878/" source="CVE"/>
		<description>
These are all security issues fixed in the nagios-3.0.6-1.25.36.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5803/">CVE-2007-5803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5803">CVE-2007-5803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1523/">CVE-2011-1523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1523">CVE-2011-1523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6096/">CVE-2012-6096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6096">CVE-2012-6096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7108/">CVE-2013-7108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7108">CVE-2013-7108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1878/">CVE-2014-1878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1878">CVE-2014-1878 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990619" comment="nagios-3.0.6-1.25.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990620" comment="nagios-www-3.0.6-1.25.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216362" version="1" class="patch">
	<metadata>
		<title>nagios-nrpe-2.12-24.4.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1362" ref_url="https://www.suse.com/security/cve/CVE-2013-1362/" source="CVE"/>
		<reference ref_id="CVE-2014-2913" ref_url="https://www.suse.com/security/cve/CVE-2014-2913/" source="CVE"/>
		<description>
These are all security issues fixed in the nagios-nrpe-2.12-24.4.10.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1362/">CVE-2013-1362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1362">CVE-2013-1362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2913/">CVE-2014-2913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2913">CVE-2014-2913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990621" comment="nagios-nrpe-2.12-24.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990622" comment="nagios-nrpe-doc-2.12-24.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990623" comment="nagios-plugins-nrpe-2.12-24.4.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216363" version="1" class="patch">
	<metadata>
		<title>nagios-plugins-1.4.16-0.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-5623" ref_url="https://www.suse.com/security/cve/CVE-2007-5623/" source="CVE"/>
		<description>
These are all security issues fixed in the nagios-plugins-1.4.16-0.13.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5623/">CVE-2007-5623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5623">CVE-2007-5623 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990624" comment="nagios-plugins-1.4.16-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990625" comment="nagios-plugins-extras-1.4.16-0.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216364" version="1" class="patch">
	<metadata>
		<title>nfs-client-1.2.3-18.38.43.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1923" ref_url="https://www.suse.com/security/cve/CVE-2013-1923/" source="CVE"/>
		<description>
These are all security issues fixed in the nfs-client-1.2.3-18.38.43.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1923/">CVE-2013-1923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1923">CVE-2013-1923 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990626" comment="nfs-client-1.2.3-18.38.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990627" comment="nfs-doc-1.2.3-18.38.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990628" comment="nfs-kernel-server-1.2.3-18.38.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216365" version="1" class="patch">
	<metadata>
		<title>ntp-4.2.8p2-2.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0159" ref_url="https://www.suse.com/security/cve/CVE-2009-0159/" source="CVE"/>
		<reference ref_id="CVE-2009-1252" ref_url="https://www.suse.com/security/cve/CVE-2009-1252/" source="CVE"/>
		<reference ref_id="CVE-2013-5211" ref_url="https://www.suse.com/security/cve/CVE-2013-5211/" source="CVE"/>
		<reference ref_id="CVE-2014-9295" ref_url="https://www.suse.com/security/cve/CVE-2014-9295/" source="CVE"/>
		<reference ref_id="CVE-2014-9297" ref_url="https://www.suse.com/security/cve/CVE-2014-9297/" source="CVE"/>
		<reference ref_id="CVE-2014-9298" ref_url="https://www.suse.com/security/cve/CVE-2014-9298/" source="CVE"/>
		<reference ref_id="CVE-2015-1798" ref_url="https://www.suse.com/security/cve/CVE-2015-1798/" source="CVE"/>
		<reference ref_id="CVE-2015-1799" ref_url="https://www.suse.com/security/cve/CVE-2015-1799/" source="CVE"/>
		<description>
These are all security issues fixed in the ntp-4.2.8p2-2.18 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0159/">CVE-2009-0159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0159">CVE-2009-0159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1252/">CVE-2009-1252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1252">CVE-2009-1252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5211/">CVE-2013-5211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5211">CVE-2013-5211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9295/">CVE-2014-9295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9295">CVE-2014-9295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9297/">CVE-2014-9297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9297">CVE-2014-9297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9298/">CVE-2014-9298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9298">CVE-2014-9298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1798/">CVE-2015-1798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1798">CVE-2015-1798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1799/">CVE-2015-1799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1799">CVE-2015-1799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990629" comment="ntp-4.2.8p2-2.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990630" comment="ntp-doc-4.2.8p2-2.18 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216366" version="1" class="patch">
	<metadata>
		<title>ofed-1.5.4.1-20.26 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-1693" ref_url="https://www.suse.com/security/cve/CVE-2010-1693/" source="CVE"/>
		<reference ref_id="CVE-2010-3904" ref_url="https://www.suse.com/security/cve/CVE-2010-3904/" source="CVE"/>
		<reference ref_id="CVE-2010-4649" ref_url="https://www.suse.com/security/cve/CVE-2010-4649/" source="CVE"/>
		<reference ref_id="CVE-2011-3345" ref_url="https://www.suse.com/security/cve/CVE-2011-3345/" source="CVE"/>
		<description>
These are all security issues fixed in the ofed-1.5.4.1-20.26 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1693/">CVE-2010-1693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1693">CVE-2010-1693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3904/">CVE-2010-3904 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-3904">CVE-2010-3904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4649/">CVE-2010-4649 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4649">CVE-2010-4649 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3345/">CVE-2011-3345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3345">CVE-2011-3345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990631" comment="ofed-1.5.4.1-20.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990632" comment="ofed-doc-1.5.4.1-20.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990633" comment="ofed-kmp-default-1.5.4.1_3.0.101_63-20.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990634" comment="ofed-kmp-pae-1.5.4.1_3.0.101_63-20.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990635" comment="ofed-kmp-ppc64-1.5.4.1_3.0.101_63-20.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990636" comment="ofed-kmp-trace-1.5.4.1_3.0.101_63-20.26 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216367" version="1" class="patch">
	<metadata>
		<title>openCryptoki-3.2-0.11.26 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-4454" ref_url="https://www.suse.com/security/cve/CVE-2012-4454/" source="CVE"/>
		<reference ref_id="CVE-2012-4455" ref_url="https://www.suse.com/security/cve/CVE-2012-4455/" source="CVE"/>
		<description>
These are all security issues fixed in the openCryptoki-3.2-0.11.26 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4454/">CVE-2012-4454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4454">CVE-2012-4454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4455/">CVE-2012-4455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4455">CVE-2012-4455 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990637" comment="openCryptoki-3.2-0.11.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990638" comment="openCryptoki-32bit-3.2-0.11.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990639" comment="openCryptoki-64bit-3.2-0.11.26 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216368" version="1" class="patch">
	<metadata>
		<title>openslp-1.2.0-172.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-3609" ref_url="https://www.suse.com/security/cve/CVE-2010-3609/" source="CVE"/>
		<reference ref_id="CVE-2012-4428" ref_url="https://www.suse.com/security/cve/CVE-2012-4428/" source="CVE"/>
		<description>
These are all security issues fixed in the openslp-1.2.0-172.24.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3609/">CVE-2010-3609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3609">CVE-2010-3609 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2012-4428/">CVE-2012-4428 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-4428">CVE-2012-4428 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990640" comment="openslp-1.2.0-172.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990641" comment="openslp-32bit-1.2.0-172.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990642" comment="openslp-server-1.2.0-172.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990643" comment="openslp-x86-1.2.0-172.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216369" version="1" class="patch">
	<metadata>
		<title>openssh-6.6p1-4.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-0225" ref_url="https://www.suse.com/security/cve/CVE-2006-0225/" source="CVE"/>
		<reference ref_id="CVE-2007-4752" ref_url="https://www.suse.com/security/cve/CVE-2007-4752/" source="CVE"/>
		<reference ref_id="CVE-2008-1483" ref_url="https://www.suse.com/security/cve/CVE-2008-1483/" source="CVE"/>
		<reference ref_id="CVE-2010-5107" ref_url="https://www.suse.com/security/cve/CVE-2010-5107/" source="CVE"/>
		<reference ref_id="CVE-2011-5000" ref_url="https://www.suse.com/security/cve/CVE-2011-5000/" source="CVE"/>
		<reference ref_id="CVE-2012-0814" ref_url="https://www.suse.com/security/cve/CVE-2012-0814/" source="CVE"/>
		<reference ref_id="CVE-2014-2532" ref_url="https://www.suse.com/security/cve/CVE-2014-2532/" source="CVE"/>
		<reference ref_id="CVE-2014-2653" ref_url="https://www.suse.com/security/cve/CVE-2014-2653/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-6.6p1-4.7 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0225/">CVE-2006-0225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0225">CVE-2006-0225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4752/">CVE-2007-4752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4752">CVE-2007-4752 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2008-1483/">CVE-2008-1483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1483">CVE-2008-1483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5107/">CVE-2010-5107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-5107">CVE-2010-5107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5000/">CVE-2011-5000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-5000">CVE-2011-5000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0814/">CVE-2012-0814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0814">CVE-2012-0814 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-2532/">CVE-2014-2532 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-2532">CVE-2014-2532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2653/">CVE-2014-2653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2653">CVE-2014-2653 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990644" comment="openssh-6.6p1-4.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990645" comment="openssh-fips-6.6p1-4.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216370" version="1" class="patch">
	<metadata>
		<title>openvpn-2.0.9-143.44.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2013-2061" ref_url="https://www.suse.com/security/cve/CVE-2013-2061/" source="CVE"/>
		<reference ref_id="CVE-2014-8104" ref_url="https://www.suse.com/security/cve/CVE-2014-8104/" source="CVE"/>
		<description>
These are all security issues fixed in the openvpn-2.0.9-143.44.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4339">CVE-2006-4339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2061/">CVE-2013-2061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2061">CVE-2013-2061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8104/">CVE-2014-8104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8104">CVE-2014-8104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990646" comment="openvpn-2.0.9-143.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990647" comment="openvpn-auth-pam-plugin-2.0.9-143.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216371" version="1" class="patch">
	<metadata>
		<title>opie-2.4-662.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-2489" ref_url="https://www.suse.com/security/cve/CVE-2011-2489/" source="CVE"/>
		<reference ref_id="CVE-2011-2490" ref_url="https://www.suse.com/security/cve/CVE-2011-2490/" source="CVE"/>
		<description>
These are all security issues fixed in the opie-2.4-662.18.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2489/">CVE-2011-2489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2489">CVE-2011-2489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2490/">CVE-2011-2490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2490">CVE-2011-2490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989388" comment="opie-2.4-662.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989389" comment="opie-32bit-2.4-662.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989390" comment="opie-x86-2.4-662.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216372" version="1" class="patch">
	<metadata>
		<title>pam-1.1.5-0.15.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0579" ref_url="https://www.suse.com/security/cve/CVE-2009-0579/" source="CVE"/>
		<reference ref_id="CVE-2009-0887" ref_url="https://www.suse.com/security/cve/CVE-2009-0887/" source="CVE"/>
		<reference ref_id="CVE-2011-3148" ref_url="https://www.suse.com/security/cve/CVE-2011-3148/" source="CVE"/>
		<reference ref_id="CVE-2011-3149" ref_url="https://www.suse.com/security/cve/CVE-2011-3149/" source="CVE"/>
		<reference ref_id="CVE-2014-2583" ref_url="https://www.suse.com/security/cve/CVE-2014-2583/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-1.1.5-0.15.9 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0579/">CVE-2009-0579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0579">CVE-2009-0579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0887/">CVE-2009-0887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0887">CVE-2009-0887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3148/">CVE-2011-3148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3148">CVE-2011-3148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3149/">CVE-2011-3149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3149">CVE-2011-3149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2583/">CVE-2014-2583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2583">CVE-2014-2583 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990648" comment="pam-1.1.5-0.15.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990649" comment="pam-32bit-1.1.5-0.15.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990650" comment="pam-doc-1.1.5-0.15.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990651" comment="pam-x86-1.1.5-0.15.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216373" version="1" class="patch">
	<metadata>
		<title>pam_krb5-2.3.1-47.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-3825" ref_url="https://www.suse.com/security/cve/CVE-2008-3825/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_krb5-2.3.1-47.12.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3825/">CVE-2008-3825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3825">CVE-2008-3825 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989984" comment="pam_krb5-2.3.1-47.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989985" comment="pam_krb5-32bit-2.3.1-47.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989986" comment="pam_krb5-x86-2.3.1-47.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216374" version="1" class="patch">
	<metadata>
		<title>pam_ldap-184-147.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-5170" ref_url="https://www.suse.com/security/cve/CVE-2006-5170/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_ldap-184-147.20 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5170/">CVE-2006-5170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5170">CVE-2006-5170 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988811" comment="pam_ldap-184-147.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988812" comment="pam_ldap-32bit-184-147.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988813" comment="pam_ldap-x86-184-147.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216375" version="1" class="patch">
	<metadata>
		<title>pam_mount-0.47-13.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-5138" ref_url="https://www.suse.com/security/cve/CVE-2008-5138/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_mount-0.47-13.16.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5138/">CVE-2008-5138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5138">CVE-2008-5138 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989987" comment="pam_mount-0.47-13.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989988" comment="pam_mount-32bit-0.47-13.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989989" comment="pam_mount-x86-0.47-13.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216376" version="1" class="patch">
	<metadata>
		<title>pango-1.26.2-1.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-0020" ref_url="https://www.suse.com/security/cve/CVE-2011-0020/" source="CVE"/>
		<reference ref_id="CVE-2011-0064" ref_url="https://www.suse.com/security/cve/CVE-2011-0064/" source="CVE"/>
		<description>
These are all security issues fixed in the pango-1.26.2-1.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0020/">CVE-2011-0020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0020">CVE-2011-0020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0064/">CVE-2011-0064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0064">CVE-2011-0064 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989395" comment="pango-1.26.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989396" comment="pango-32bit-1.26.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989397" comment="pango-doc-1.26.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989398" comment="pango-x86-1.26.2-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216377" version="1" class="patch">
	<metadata>
		<title>pcsc-ccid-1.3.8-3.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-4530" ref_url="https://www.suse.com/security/cve/CVE-2010-4530/" source="CVE"/>
		<description>
These are all security issues fixed in the pcsc-ccid-1.3.8-3.15.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4530/">CVE-2010-4530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4530">CVE-2010-4530 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989399" comment="pcsc-ccid-1.3.8-3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216378" version="1" class="patch">
	<metadata>
		<title>pcsc-lite-1.4.102-1.37.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-0407" ref_url="https://www.suse.com/security/cve/CVE-2010-0407/" source="CVE"/>
		<reference ref_id="CVE-2010-4531" ref_url="https://www.suse.com/security/cve/CVE-2010-4531/" source="CVE"/>
		<description>
These are all security issues fixed in the pcsc-lite-1.4.102-1.37.3 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0407/">CVE-2010-0407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0407">CVE-2010-0407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4531/">CVE-2010-4531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4531">CVE-2010-4531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989400" comment="pcsc-lite-1.4.102-1.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989401" comment="pcsc-lite-32bit-1.4.102-1.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989402" comment="pcsc-lite-x86-1.4.102-1.37.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216379" version="1" class="patch">
	<metadata>
		<title>perl-32bit-5.10.0-64.72.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-5116" ref_url="https://www.suse.com/security/cve/CVE-2007-5116/" source="CVE"/>
		<reference ref_id="CVE-2010-1168" ref_url="https://www.suse.com/security/cve/CVE-2010-1168/" source="CVE"/>
		<reference ref_id="CVE-2010-1447" ref_url="https://www.suse.com/security/cve/CVE-2010-1447/" source="CVE"/>
		<reference ref_id="CVE-2010-2761" ref_url="https://www.suse.com/security/cve/CVE-2010-2761/" source="CVE"/>
		<reference ref_id="CVE-2010-4410" ref_url="https://www.suse.com/security/cve/CVE-2010-4410/" source="CVE"/>
		<reference ref_id="CVE-2010-4411" ref_url="https://www.suse.com/security/cve/CVE-2010-4411/" source="CVE"/>
		<reference ref_id="CVE-2010-4777" ref_url="https://www.suse.com/security/cve/CVE-2010-4777/" source="CVE"/>
		<reference ref_id="CVE-2011-1487" ref_url="https://www.suse.com/security/cve/CVE-2011-1487/" source="CVE"/>
		<reference ref_id="CVE-2011-2728" ref_url="https://www.suse.com/security/cve/CVE-2011-2728/" source="CVE"/>
		<reference ref_id="CVE-2012-5526" ref_url="https://www.suse.com/security/cve/CVE-2012-5526/" source="CVE"/>
		<reference ref_id="CVE-2012-6329" ref_url="https://www.suse.com/security/cve/CVE-2012-6329/" source="CVE"/>
		<reference ref_id="CVE-2013-1667" ref_url="https://www.suse.com/security/cve/CVE-2013-1667/" source="CVE"/>
		<reference ref_id="CVE-2014-4330" ref_url="https://www.suse.com/security/cve/CVE-2014-4330/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-32bit-5.10.0-64.72.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5116/">CVE-2007-5116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5116">CVE-2007-5116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1168/">CVE-2010-1168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1168">CVE-2010-1168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1447/">CVE-2010-1447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1447">CVE-2010-1447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2761/">CVE-2010-2761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2761">CVE-2010-2761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4410/">CVE-2010-4410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4410">CVE-2010-4410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4411/">CVE-2010-4411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4411">CVE-2010-4411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4777/">CVE-2010-4777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4777">CVE-2010-4777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1487/">CVE-2011-1487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1487">CVE-2011-1487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2728/">CVE-2011-2728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2728">CVE-2011-2728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5526/">CVE-2012-5526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5526">CVE-2012-5526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6329/">CVE-2012-6329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6329">CVE-2012-6329 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1667/">CVE-2013-1667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1667">CVE-2013-1667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4330/">CVE-2014-4330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4330">CVE-2014-4330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990652" comment="perl-5.10.0-64.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990653" comment="perl-32bit-5.10.0-64.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990654" comment="perl-Module-Build-0.2808.01-0.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990655" comment="perl-Test-Simple-0.72-0.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990656" comment="perl-base-5.10.0-64.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990657" comment="perl-doc-5.10.0-64.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990658" comment="perl-x86-5.10.0-64.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216380" version="1" class="patch">
	<metadata>
		<title>perl-HTML-Parser-3.56-1.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-3627" ref_url="https://www.suse.com/security/cve/CVE-2009-3627/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-HTML-Parser-3.56-1.18.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3627/">CVE-2009-3627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3627">CVE-2009-3627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988822" comment="perl-HTML-Parser-3.56-1.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216381" version="1" class="patch">
	<metadata>
		<title>perl-Tk-804.028-50.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-4484" ref_url="https://www.suse.com/security/cve/CVE-2006-4484/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Tk-804.028-50.24 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4484/">CVE-2006-4484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4484">CVE-2006-4484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988823" comment="perl-Tk-804.028-50.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216382" version="1" class="patch">
	<metadata>
		<title>perl-libwww-perl-5.816-2.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-0633" ref_url="https://www.suse.com/security/cve/CVE-2011-0633/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-libwww-perl-5.816-2.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0633/">CVE-2011-0633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0633">CVE-2011-0633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989408" comment="perl-libwww-perl-5.816-2.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216383" version="1" class="patch">
	<metadata>
		<title>perl-spamassassin-3.3.1-10.8.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-0451" ref_url="https://www.suse.com/security/cve/CVE-2007-0451/" source="CVE"/>
		<reference ref_id="CVE-2007-2873" ref_url="https://www.suse.com/security/cve/CVE-2007-2873/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-spamassassin-3.3.1-10.8.3 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0451/">CVE-2007-0451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0451">CVE-2007-0451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2873/">CVE-2007-2873 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2873">CVE-2007-2873 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989409" comment="perl-spamassassin-3.3.1-10.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989410" comment="spamassassin-3.3.1-10.8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216384" version="1" class="patch">
	<metadata>
		<title>popt-1.7-37.63.64.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-6435" ref_url="https://www.suse.com/security/cve/CVE-2013-6435/" source="CVE"/>
		<reference ref_id="CVE-2014-8118" ref_url="https://www.suse.com/security/cve/CVE-2014-8118/" source="CVE"/>
		<description>
These are all security issues fixed in the popt-1.7-37.63.64.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6435/">CVE-2013-6435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6435">CVE-2013-6435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8118/">CVE-2014-8118 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8118">CVE-2014-8118 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990659" comment="popt-1.7-37.63.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990660" comment="popt-32bit-1.7-37.63.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990661" comment="popt-x86-1.7-37.63.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990662" comment="rpm-4.4.2.3-37.63.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990663" comment="rpm-32bit-4.4.2.3-37.63.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990664" comment="rpm-x86-4.4.2.3-37.63.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216385" version="1" class="patch">
	<metadata>
		<title>postgresql-8.3.23-0.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-4769" ref_url="https://www.suse.com/security/cve/CVE-2007-4769/" source="CVE"/>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2007-6067" ref_url="https://www.suse.com/security/cve/CVE-2007-6067/" source="CVE"/>
		<reference ref_id="CVE-2007-6600" ref_url="https://www.suse.com/security/cve/CVE-2007-6600/" source="CVE"/>
		<reference ref_id="CVE-2007-6601" ref_url="https://www.suse.com/security/cve/CVE-2007-6601/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-4034" ref_url="https://www.suse.com/security/cve/CVE-2009-4034/" source="CVE"/>
		<reference ref_id="CVE-2009-4136" ref_url="https://www.suse.com/security/cve/CVE-2009-4136/" source="CVE"/>
		<reference ref_id="CVE-2010-0442" ref_url="https://www.suse.com/security/cve/CVE-2010-0442/" source="CVE"/>
		<reference ref_id="CVE-2010-1169" ref_url="https://www.suse.com/security/cve/CVE-2010-1169/" source="CVE"/>
		<reference ref_id="CVE-2010-1170" ref_url="https://www.suse.com/security/cve/CVE-2010-1170/" source="CVE"/>
		<reference ref_id="CVE-2010-3433" ref_url="https://www.suse.com/security/cve/CVE-2010-3433/" source="CVE"/>
		<reference ref_id="CVE-2010-4014" ref_url="https://www.suse.com/security/cve/CVE-2010-4014/" source="CVE"/>
		<reference ref_id="CVE-2010-4015" ref_url="https://www.suse.com/security/cve/CVE-2010-4015/" source="CVE"/>
		<reference ref_id="CVE-2012-0866" ref_url="https://www.suse.com/security/cve/CVE-2012-0866/" source="CVE"/>
		<reference ref_id="CVE-2012-0868" ref_url="https://www.suse.com/security/cve/CVE-2012-0868/" source="CVE"/>
		<reference ref_id="CVE-2012-2143" ref_url="https://www.suse.com/security/cve/CVE-2012-2143/" source="CVE"/>
		<reference ref_id="CVE-2012-2655" ref_url="https://www.suse.com/security/cve/CVE-2012-2655/" source="CVE"/>
		<reference ref_id="CVE-2012-3488" ref_url="https://www.suse.com/security/cve/CVE-2012-3488/" source="CVE"/>
		<reference ref_id="CVE-2012-3489" ref_url="https://www.suse.com/security/cve/CVE-2012-3489/" source="CVE"/>
		<reference ref_id="CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql-8.3.23-0.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4769/">CVE-2007-4769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4769">CVE-2007-4769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4772">CVE-2007-4772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6067/">CVE-2007-6067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6067">CVE-2007-6067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6600/">CVE-2007-6600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6600">CVE-2007-6600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6601/">CVE-2007-6601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6601">CVE-2007-6601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4034/">CVE-2009-4034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4034">CVE-2009-4034 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4136/">CVE-2009-4136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4136">CVE-2009-4136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0442/">CVE-2010-0442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0442">CVE-2010-0442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1169/">CVE-2010-1169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1169">CVE-2010-1169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1170/">CVE-2010-1170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1170">CVE-2010-1170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3433/">CVE-2010-3433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3433">CVE-2010-3433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4014/">CVE-2010-4014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4014">CVE-2010-4014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4015/">CVE-2010-4015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4015">CVE-2010-4015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0866/">CVE-2012-0866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0866">CVE-2012-0866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0868/">CVE-2012-0868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0868">CVE-2012-0868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2143/">CVE-2012-2143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2143">CVE-2012-2143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2655/">CVE-2012-2655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2655">CVE-2012-2655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3488/">CVE-2012-3488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3488">CVE-2012-3488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3489/">CVE-2012-3489 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2012-3489">CVE-2012-3489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0255">CVE-2013-0255 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989997" comment="postgresql-8.3.23-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989998" comment="postgresql-contrib-8.3.23-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989999" comment="postgresql-docs-8.3.23-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990000" comment="postgresql-server-8.3.23-0.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216386" version="1" class="patch">
	<metadata>
		<title>powerpc-utils-1.2.22-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-4040" ref_url="https://www.suse.com/security/cve/CVE-2014-4040/" source="CVE"/>
		<description>
These are all security issues fixed in the powerpc-utils-1.2.22-2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4040/">CVE-2014-4040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4040">CVE-2014-4040 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990665" comment="powerpc-utils-1.2.22-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216387" version="1" class="patch">
	<metadata>
		<title>ppc64-diag-2.6.7-1.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-4038" ref_url="https://www.suse.com/security/cve/CVE-2014-4038/" source="CVE"/>
		<reference ref_id="CVE-2014-4039" ref_url="https://www.suse.com/security/cve/CVE-2014-4039/" source="CVE"/>
		<description>
These are all security issues fixed in the ppc64-diag-2.6.7-1.31 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4038/">CVE-2014-4038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4038">CVE-2014-4038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4039/">CVE-2014-4039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4039">CVE-2014-4039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990666" comment="ppc64-diag-2.6.7-1.31 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216388" version="1" class="patch">
	<metadata>
		<title>ppp-2.4.5.git-2.29.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3158" ref_url="https://www.suse.com/security/cve/CVE-2014-3158/" source="CVE"/>
		<description>
These are all security issues fixed in the ppp-2.4.5.git-2.29.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3158/">CVE-2014-3158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3158">CVE-2014-3158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990667" comment="ppp-2.4.5.git-2.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216389" version="1" class="patch">
	<metadata>
		<title>procmail-3.22-240.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3618" ref_url="https://www.suse.com/security/cve/CVE-2014-3618/" source="CVE"/>
		<description>
These are all security issues fixed in the procmail-3.22-240.8.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3618/">CVE-2014-3618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3618">CVE-2014-3618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990668" comment="procmail-3.22-240.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216390" version="1" class="patch">
	<metadata>
		<title>puppet-2.7.26-0.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-0156" ref_url="https://www.suse.com/security/cve/CVE-2010-0156/" source="CVE"/>
		<reference ref_id="CVE-2011-1986" ref_url="https://www.suse.com/security/cve/CVE-2011-1986/" source="CVE"/>
		<reference ref_id="CVE-2011-3848" ref_url="https://www.suse.com/security/cve/CVE-2011-3848/" source="CVE"/>
		<reference ref_id="CVE-2011-3869" ref_url="https://www.suse.com/security/cve/CVE-2011-3869/" source="CVE"/>
		<reference ref_id="CVE-2011-3870" ref_url="https://www.suse.com/security/cve/CVE-2011-3870/" source="CVE"/>
		<reference ref_id="CVE-2011-3871" ref_url="https://www.suse.com/security/cve/CVE-2011-3871/" source="CVE"/>
		<reference ref_id="CVE-2011-3872" ref_url="https://www.suse.com/security/cve/CVE-2011-3872/" source="CVE"/>
		<reference ref_id="CVE-2012-1987" ref_url="https://www.suse.com/security/cve/CVE-2012-1987/" source="CVE"/>
		<reference ref_id="CVE-2012-1988" ref_url="https://www.suse.com/security/cve/CVE-2012-1988/" source="CVE"/>
		<reference ref_id="CVE-2012-1989" ref_url="https://www.suse.com/security/cve/CVE-2012-1989/" source="CVE"/>
		<reference ref_id="CVE-2012-3864" ref_url="https://www.suse.com/security/cve/CVE-2012-3864/" source="CVE"/>
		<reference ref_id="CVE-2012-3865" ref_url="https://www.suse.com/security/cve/CVE-2012-3865/" source="CVE"/>
		<reference ref_id="CVE-2012-3867" ref_url="https://www.suse.com/security/cve/CVE-2012-3867/" source="CVE"/>
		<reference ref_id="CVE-2013-3567" ref_url="https://www.suse.com/security/cve/CVE-2013-3567/" source="CVE"/>
		<reference ref_id="CVE-2013-4761" ref_url="https://www.suse.com/security/cve/CVE-2013-4761/" source="CVE"/>
		<reference ref_id="CVE-2013-4969" ref_url="https://www.suse.com/security/cve/CVE-2013-4969/" source="CVE"/>
		<reference ref_id="CVE-2014-3248" ref_url="https://www.suse.com/security/cve/CVE-2014-3248/" source="CVE"/>
		<reference ref_id="CVE-2014-3250" ref_url="https://www.suse.com/security/cve/CVE-2014-3250/" source="CVE"/>
		<description>
These are all security issues fixed in the puppet-2.7.26-0.5.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0156/">CVE-2010-0156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0156">CVE-2010-0156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1986/">CVE-2011-1986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1986">CVE-2011-1986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3848/">CVE-2011-3848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3848">CVE-2011-3848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3869/">CVE-2011-3869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3869">CVE-2011-3869 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3870/">CVE-2011-3870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3870">CVE-2011-3870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3871/">CVE-2011-3871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3871">CVE-2011-3871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3872/">CVE-2011-3872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3872">CVE-2011-3872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1987/">CVE-2012-1987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1987">CVE-2012-1987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1988/">CVE-2012-1988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1988">CVE-2012-1988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1989/">CVE-2012-1989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1989">CVE-2012-1989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3864/">CVE-2012-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3864">CVE-2012-3864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3865/">CVE-2012-3865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3865">CVE-2012-3865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3867/">CVE-2012-3867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3867">CVE-2012-3867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3567/">CVE-2013-3567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3567">CVE-2013-3567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4761/">CVE-2013-4761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4761">CVE-2013-4761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4969/">CVE-2013-4969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4969">CVE-2013-4969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3248/">CVE-2014-3248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3248">CVE-2014-3248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3250/">CVE-2014-3250 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3250">CVE-2014-3250 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990669" comment="puppet-2.7.26-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990670" comment="puppet-server-2.7.26-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216391" version="1" class="patch">
	<metadata>
		<title>pure-ftpd-1.0.22-3.25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-0411" ref_url="https://www.suse.com/security/cve/CVE-2011-0411/" source="CVE"/>
		<reference ref_id="CVE-2011-3171" ref_url="https://www.suse.com/security/cve/CVE-2011-3171/" source="CVE"/>
		<description>
These are all security issues fixed in the pure-ftpd-1.0.22-3.25.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0411/">CVE-2011-0411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0411">CVE-2011-0411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3171/">CVE-2011-3171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3171">CVE-2011-3171 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990671" comment="pure-ftpd-1.0.22-3.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216392" version="1" class="patch">
	<metadata>
		<title>python-2.6.9-0.35.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-2052" ref_url="https://www.suse.com/security/cve/CVE-2007-2052/" source="CVE"/>
		<reference ref_id="CVE-2008-1721" ref_url="https://www.suse.com/security/cve/CVE-2008-1721/" source="CVE"/>
		<reference ref_id="CVE-2008-2315" ref_url="https://www.suse.com/security/cve/CVE-2008-2315/" source="CVE"/>
		<reference ref_id="CVE-2008-2316" ref_url="https://www.suse.com/security/cve/CVE-2008-2316/" source="CVE"/>
		<reference ref_id="CVE-2008-3142" ref_url="https://www.suse.com/security/cve/CVE-2008-3142/" source="CVE"/>
		<reference ref_id="CVE-2008-3143" ref_url="https://www.suse.com/security/cve/CVE-2008-3143/" source="CVE"/>
		<reference ref_id="CVE-2008-3144" ref_url="https://www.suse.com/security/cve/CVE-2008-3144/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.6.9-0.35.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2052/">CVE-2007-2052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2052">CVE-2007-2052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1721/">CVE-2008-1721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1721">CVE-2008-1721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2315/">CVE-2008-2315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2315">CVE-2008-2315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2316/">CVE-2008-2316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2316">CVE-2008-2316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3142/">CVE-2008-3142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3142">CVE-2008-3142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3143/">CVE-2008-3143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3143">CVE-2008-3143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3144/">CVE-2008-3144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3144">CVE-2008-3144 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4238">CVE-2013-4238 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990672" comment="python-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990673" comment="python-32bit-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990674" comment="python-curses-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990675" comment="python-demo-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990676" comment="python-gdbm-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990677" comment="python-idle-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990678" comment="python-tk-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990679" comment="python-x86-2.6.9-0.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216393" version="1" class="patch">
	<metadata>
		<title>python-imaging-1.1.6-168.34.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-1932" ref_url="https://www.suse.com/security/cve/CVE-2014-1932/" source="CVE"/>
		<reference ref_id="CVE-2014-1933" ref_url="https://www.suse.com/security/cve/CVE-2014-1933/" source="CVE"/>
		<description>
These are all security issues fixed in the python-imaging-1.1.6-168.34.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1932/">CVE-2014-1932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1932">CVE-2014-1932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1933/">CVE-2014-1933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1933">CVE-2014-1933 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990680" comment="python-imaging-1.1.6-168.34.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216394" version="1" class="patch">
	<metadata>
		<title>python-lxml-2.3.6-0.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3146" ref_url="https://www.suse.com/security/cve/CVE-2014-3146/" source="CVE"/>
		<description>
These are all security issues fixed in the python-lxml-2.3.6-0.13.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3146/">CVE-2014-3146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3146">CVE-2014-3146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990681" comment="python-lxml-2.3.6-0.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216395" version="1" class="patch">
	<metadata>
		<title>python-pam-0.5.0-3.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-1502" ref_url="https://www.suse.com/security/cve/CVE-2012-1502/" source="CVE"/>
		<description>
These are all security issues fixed in the python-pam-0.5.0-3.20.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1502/">CVE-2012-1502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1502">CVE-2012-1502 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990012" comment="python-pam-0.5.0-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216396" version="1" class="patch">
	<metadata>
		<title>python-pywbem-0.7-6.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-6418" ref_url="https://www.suse.com/security/cve/CVE-2013-6418/" source="CVE"/>
		<description>
These are all security issues fixed in the python-pywbem-0.7-6.22.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6418/">CVE-2013-6418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6418">CVE-2013-6418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990682" comment="python-pywbem-0.7-6.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216397" version="1" class="patch">
	<metadata>
		<title>pyxml-0.8.4-194.23.38 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<description>
These are all security issues fixed in the pyxml-0.8.4-194.23.38 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3560">CVE-2009-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3720">CVE-2009-3720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988734" comment="pyxml-0.8.4-194.23.38 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216398" version="1" class="patch">
	<metadata>
		<title>qt3-3.3.8b-88.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-4811" ref_url="https://www.suse.com/security/cve/CVE-2006-4811/" source="CVE"/>
		<reference ref_id="CVE-2007-0242" ref_url="https://www.suse.com/security/cve/CVE-2007-0242/" source="CVE"/>
		<reference ref_id="CVE-2007-3388" ref_url="https://www.suse.com/security/cve/CVE-2007-3388/" source="CVE"/>
		<reference ref_id="CVE-2007-4137" ref_url="https://www.suse.com/security/cve/CVE-2007-4137/" source="CVE"/>
		<description>
These are all security issues fixed in the qt3-3.3.8b-88.21 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4811/">CVE-2006-4811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4811">CVE-2006-4811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0242/">CVE-2007-0242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0242">CVE-2007-0242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3388/">CVE-2007-3388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3388">CVE-2007-3388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4137/">CVE-2007-4137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4137">CVE-2007-4137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988843" comment="qt3-3.3.8b-88.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988844" comment="qt3-32bit-3.3.8b-88.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988845" comment="qt3-x86-3.3.8b-88.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216399" version="1" class="patch">
	<metadata>
		<title>quagga-0.99.15-0.14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-2223" ref_url="https://www.suse.com/security/cve/CVE-2006-2223/" source="CVE"/>
		<reference ref_id="CVE-2007-1995" ref_url="https://www.suse.com/security/cve/CVE-2007-1995/" source="CVE"/>
		<reference ref_id="CVE-2010-1674" ref_url="https://www.suse.com/security/cve/CVE-2010-1674/" source="CVE"/>
		<reference ref_id="CVE-2010-1675" ref_url="https://www.suse.com/security/cve/CVE-2010-1675/" source="CVE"/>
		<reference ref_id="CVE-2010-2948" ref_url="https://www.suse.com/security/cve/CVE-2010-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-2949" ref_url="https://www.suse.com/security/cve/CVE-2010-2949/" source="CVE"/>
		<reference ref_id="CVE-2013-0149" ref_url="https://www.suse.com/security/cve/CVE-2013-0149/" source="CVE"/>
		<reference ref_id="CVE-2013-2236" ref_url="https://www.suse.com/security/cve/CVE-2013-2236/" source="CVE"/>
		<description>
These are all security issues fixed in the quagga-0.99.15-0.14.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2223/">CVE-2006-2223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2223">CVE-2006-2223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1995/">CVE-2007-1995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1995">CVE-2007-1995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1674/">CVE-2010-1674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1674">CVE-2010-1674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1675/">CVE-2010-1675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1675">CVE-2010-1675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2948/">CVE-2010-2948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2948">CVE-2010-2948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2949/">CVE-2010-2949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2949">CVE-2010-2949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0149/">CVE-2013-0149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0149">CVE-2013-0149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2236/">CVE-2013-2236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2236">CVE-2013-2236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990683" comment="quagga-0.99.15-0.14.11 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216400" version="1" class="patch">
	<metadata>
		<title>radvd-1.1-1.24.8.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-3602" ref_url="https://www.suse.com/security/cve/CVE-2011-3602/" source="CVE"/>
		<reference ref_id="CVE-2011-3603" ref_url="https://www.suse.com/security/cve/CVE-2011-3603/" source="CVE"/>
		<reference ref_id="CVE-2011-3604" ref_url="https://www.suse.com/security/cve/CVE-2011-3604/" source="CVE"/>
		<reference ref_id="CVE-2011-3605" ref_url="https://www.suse.com/security/cve/CVE-2011-3605/" source="CVE"/>
		<description>
These are all security issues fixed in the radvd-1.1-1.24.8.19 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3602/">CVE-2011-3602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3602">CVE-2011-3602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3603/">CVE-2011-3603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3603">CVE-2011-3603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3604/">CVE-2011-3604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3604">CVE-2011-3604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3605/">CVE-2011-3605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3605">CVE-2011-3605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990684" comment="radvd-1.1-1.24.8.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216401" version="1" class="patch">
	<metadata>
		<title>rsync-3.0.4-2.47.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-4091" ref_url="https://www.suse.com/security/cve/CVE-2007-4091/" source="CVE"/>
		<reference ref_id="CVE-2007-6199" ref_url="https://www.suse.com/security/cve/CVE-2007-6199/" source="CVE"/>
		<reference ref_id="CVE-2011-1097" ref_url="https://www.suse.com/security/cve/CVE-2011-1097/" source="CVE"/>
		<description>
These are all security issues fixed in the rsync-3.0.4-2.47.28 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4091/">CVE-2007-4091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4091">CVE-2007-4091 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6199/">CVE-2007-6199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6199">CVE-2007-6199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1097/">CVE-2011-1097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1097">CVE-2011-1097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990014" comment="rsync-3.0.4-2.47.28 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216402" version="1" class="patch">
	<metadata>
		<title>rsyslog-5.10.1-0.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-3200" ref_url="https://www.suse.com/security/cve/CVE-2011-3200/" source="CVE"/>
		<reference ref_id="CVE-2014-3634" ref_url="https://www.suse.com/security/cve/CVE-2014-3634/" source="CVE"/>
		<reference ref_id="CVE-2014-3683" ref_url="https://www.suse.com/security/cve/CVE-2014-3683/" source="CVE"/>
		<description>
These are all security issues fixed in the rsyslog-5.10.1-0.11.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3200/">CVE-2011-3200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3200">CVE-2011-3200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3634/">CVE-2014-3634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3634">CVE-2014-3634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3683/">CVE-2014-3683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3683">CVE-2014-3683 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990685" comment="rsyslog-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990686" comment="rsyslog-diag-tools-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990687" comment="rsyslog-doc-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990688" comment="rsyslog-module-gssapi-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990689" comment="rsyslog-module-gtls-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990690" comment="rsyslog-module-mysql-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990691" comment="rsyslog-module-pgsql-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990692" comment="rsyslog-module-relp-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990693" comment="rsyslog-module-snmp-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990694" comment="rsyslog-module-udpspoof-5.10.1-0.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216403" version="1" class="patch">
	<metadata>
		<title>ruby-1.8.7.p357-0.9.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-3694" ref_url="https://www.suse.com/security/cve/CVE-2006-3694/" source="CVE"/>
		<reference ref_id="CVE-2006-5467" ref_url="https://www.suse.com/security/cve/CVE-2006-5467/" source="CVE"/>
		<reference ref_id="CVE-2006-6303" ref_url="https://www.suse.com/security/cve/CVE-2006-6303/" source="CVE"/>
		<reference ref_id="CVE-2007-5162" ref_url="https://www.suse.com/security/cve/CVE-2007-5162/" source="CVE"/>
		<reference ref_id="CVE-2007-5770" ref_url="https://www.suse.com/security/cve/CVE-2007-5770/" source="CVE"/>
		<reference ref_id="CVE-2008-1145" ref_url="https://www.suse.com/security/cve/CVE-2008-1145/" source="CVE"/>
		<reference ref_id="CVE-2008-3790" ref_url="https://www.suse.com/security/cve/CVE-2008-3790/" source="CVE"/>
		<reference ref_id="CVE-2009-0642" ref_url="https://www.suse.com/security/cve/CVE-2009-0642/" source="CVE"/>
		<reference ref_id="CVE-2009-1904" ref_url="https://www.suse.com/security/cve/CVE-2009-1904/" source="CVE"/>
		<reference ref_id="CVE-2009-4492" ref_url="https://www.suse.com/security/cve/CVE-2009-4492/" source="CVE"/>
		<reference ref_id="CVE-2010-0541" ref_url="https://www.suse.com/security/cve/CVE-2010-0541/" source="CVE"/>
		<reference ref_id="CVE-2011-0188" ref_url="https://www.suse.com/security/cve/CVE-2011-0188/" source="CVE"/>
		<reference ref_id="CVE-2011-1004" ref_url="https://www.suse.com/security/cve/CVE-2011-1004/" source="CVE"/>
		<reference ref_id="CVE-2011-1005" ref_url="https://www.suse.com/security/cve/CVE-2011-1005/" source="CVE"/>
		<reference ref_id="CVE-2011-2686" ref_url="https://www.suse.com/security/cve/CVE-2011-2686/" source="CVE"/>
		<reference ref_id="CVE-2011-2705" ref_url="https://www.suse.com/security/cve/CVE-2011-2705/" source="CVE"/>
		<reference ref_id="CVE-2011-3009" ref_url="https://www.suse.com/security/cve/CVE-2011-3009/" source="CVE"/>
		<reference ref_id="CVE-2011-4815" ref_url="https://www.suse.com/security/cve/CVE-2011-4815/" source="CVE"/>
		<reference ref_id="CVE-2012-4466" ref_url="https://www.suse.com/security/cve/CVE-2012-4466/" source="CVE"/>
		<reference ref_id="CVE-2013-1821" ref_url="https://www.suse.com/security/cve/CVE-2013-1821/" source="CVE"/>
		<reference ref_id="CVE-2013-4073" ref_url="https://www.suse.com/security/cve/CVE-2013-4073/" source="CVE"/>
		<reference ref_id="CVE-2013-4164" ref_url="https://www.suse.com/security/cve/CVE-2013-4164/" source="CVE"/>
		<reference ref_id="CVE-2014-8080" ref_url="https://www.suse.com/security/cve/CVE-2014-8080/" source="CVE"/>
		<reference ref_id="CVE-2014-8090" ref_url="https://www.suse.com/security/cve/CVE-2014-8090/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby-1.8.7.p357-0.9.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3694/">CVE-2006-3694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3694">CVE-2006-3694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5467/">CVE-2006-5467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5467">CVE-2006-5467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6303/">CVE-2006-6303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6303">CVE-2006-6303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5162/">CVE-2007-5162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5162">CVE-2007-5162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5770/">CVE-2007-5770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5770">CVE-2007-5770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1145/">CVE-2008-1145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1145">CVE-2008-1145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3790/">CVE-2008-3790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3790">CVE-2008-3790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0642/">CVE-2009-0642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0642">CVE-2009-0642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1904/">CVE-2009-1904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1904">CVE-2009-1904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4492/">CVE-2009-4492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4492">CVE-2009-4492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0541/">CVE-2010-0541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0541">CVE-2010-0541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0188/">CVE-2011-0188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0188">CVE-2011-0188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1004/">CVE-2011-1004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1004">CVE-2011-1004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1005/">CVE-2011-1005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1005">CVE-2011-1005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2686/">CVE-2011-2686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2686">CVE-2011-2686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2705/">CVE-2011-2705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2705">CVE-2011-2705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3009/">CVE-2011-3009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3009">CVE-2011-3009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4815/">CVE-2011-4815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4815">CVE-2011-4815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4466/">CVE-2012-4466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4466">CVE-2012-4466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1821/">CVE-2013-1821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1821">CVE-2013-1821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4073/">CVE-2013-4073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4073">CVE-2013-4073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4164/">CVE-2013-4164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4164">CVE-2013-4164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8080/">CVE-2014-8080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8080">CVE-2014-8080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8090/">CVE-2014-8090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8090">CVE-2014-8090 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990695" comment="ruby-1.8.7.p357-0.9.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990696" comment="ruby-doc-html-1.8.7.p357-0.9.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990697" comment="ruby-tk-1.8.7.p357-0.9.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216404" version="1" class="patch">
	<metadata>
		<title>sblim-sfcb-1.3.11-0.23.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-3381" ref_url="https://www.suse.com/security/cve/CVE-2012-3381/" source="CVE"/>
		<description>
These are all security issues fixed in the sblim-sfcb-1.3.11-0.23.2 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3381/">CVE-2012-3381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3381">CVE-2012-3381 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990698" comment="sblim-sfcb-1.3.11-0.23.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216405" version="1" class="patch">
	<metadata>
		<title>sendmail-8.14.3-50.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3956" ref_url="https://www.suse.com/security/cve/CVE-2014-3956/" source="CVE"/>
		<description>
These are all security issues fixed in the sendmail-8.14.3-50.24.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3956/">CVE-2014-3956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3956">CVE-2014-3956 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990699" comment="sendmail-8.14.3-50.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216406" version="1" class="patch">
	<metadata>
		<title>shim-0.7.318.81ee561d-0.9.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3675" ref_url="https://www.suse.com/security/cve/CVE-2014-3675/" source="CVE"/>
		<reference ref_id="CVE-2014-3676" ref_url="https://www.suse.com/security/cve/CVE-2014-3676/" source="CVE"/>
		<reference ref_id="CVE-2014-3677" ref_url="https://www.suse.com/security/cve/CVE-2014-3677/" source="CVE"/>
		<description>
These are all security issues fixed in the shim-0.7.318.81ee561d-0.9.2 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3675/">CVE-2014-3675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3675">CVE-2014-3675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3676/">CVE-2014-3676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3676">CVE-2014-3676 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3677/">CVE-2014-3677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3677">CVE-2014-3677 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990700" comment="shim-0.7.318.81ee561d-0.9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216407" version="1" class="patch">
	<metadata>
		<title>socat-1.7.0.0-1.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2799" ref_url="https://www.suse.com/security/cve/CVE-2010-2799/" source="CVE"/>
		<reference ref_id="CVE-2012-0219" ref_url="https://www.suse.com/security/cve/CVE-2012-0219/" source="CVE"/>
		<description>
These are all security issues fixed in the socat-1.7.0.0-1.16.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2799/">CVE-2010-2799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2799">CVE-2010-2799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0219/">CVE-2012-0219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0219">CVE-2012-0219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990029" comment="socat-1.7.0.0-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216408" version="1" class="patch">
	<metadata>
		<title>squid-2.7.STABLE5-2.12.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0478" ref_url="https://www.suse.com/security/cve/CVE-2009-0478/" source="CVE"/>
		<reference ref_id="CVE-2009-2855" ref_url="https://www.suse.com/security/cve/CVE-2009-2855/" source="CVE"/>
		<reference ref_id="CVE-2010-0308" ref_url="https://www.suse.com/security/cve/CVE-2010-0308/" source="CVE"/>
		<reference ref_id="CVE-2010-0639" ref_url="https://www.suse.com/security/cve/CVE-2010-0639/" source="CVE"/>
		<reference ref_id="CVE-2012-5643" ref_url="https://www.suse.com/security/cve/CVE-2012-5643/" source="CVE"/>
		<reference ref_id="CVE-2013-0188" ref_url="https://www.suse.com/security/cve/CVE-2013-0188/" source="CVE"/>
		<reference ref_id="CVE-2013-0189" ref_url="https://www.suse.com/security/cve/CVE-2013-0189/" source="CVE"/>
		<reference ref_id="CVE-2013-4115" ref_url="https://www.suse.com/security/cve/CVE-2013-4115/" source="CVE"/>
		<description>
These are all security issues fixed in the squid-2.7.STABLE5-2.12.16.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0478/">CVE-2009-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0478">CVE-2009-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2855/">CVE-2009-2855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2855">CVE-2009-2855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0308/">CVE-2010-0308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0308">CVE-2010-0308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0639/">CVE-2010-0639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0639">CVE-2010-0639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5643/">CVE-2012-5643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5643">CVE-2012-5643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0188/">CVE-2013-0188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0188">CVE-2013-0188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0189/">CVE-2013-0189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0189">CVE-2013-0189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4115/">CVE-2013-4115 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4115">CVE-2013-4115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990701" comment="squid-2.7.STABLE5-2.12.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216409" version="1" class="patch">
	<metadata>
		<title>squid3-3.1.12-8.16.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2005-0094" ref_url="https://www.suse.com/security/cve/CVE-2005-0094/" source="CVE"/>
		<reference ref_id="CVE-2011-3205" ref_url="https://www.suse.com/security/cve/CVE-2011-3205/" source="CVE"/>
		<reference ref_id="CVE-2011-4096" ref_url="https://www.suse.com/security/cve/CVE-2011-4096/" source="CVE"/>
		<reference ref_id="CVE-2012-5643" ref_url="https://www.suse.com/security/cve/CVE-2012-5643/" source="CVE"/>
		<reference ref_id="CVE-2013-0188" ref_url="https://www.suse.com/security/cve/CVE-2013-0188/" source="CVE"/>
		<reference ref_id="CVE-2013-0189" ref_url="https://www.suse.com/security/cve/CVE-2013-0189/" source="CVE"/>
		<reference ref_id="CVE-2013-4115" ref_url="https://www.suse.com/security/cve/CVE-2013-4115/" source="CVE"/>
		<reference ref_id="CVE-2014-0128" ref_url="https://www.suse.com/security/cve/CVE-2014-0128/" source="CVE"/>
		<reference ref_id="CVE-2014-3609" ref_url="https://www.suse.com/security/cve/CVE-2014-3609/" source="CVE"/>
		<description>
These are all security issues fixed in the squid3-3.1.12-8.16.20.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-0094/">CVE-2005-0094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-0094">CVE-2005-0094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3205/">CVE-2011-3205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3205">CVE-2011-3205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4096/">CVE-2011-4096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4096">CVE-2011-4096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5643/">CVE-2012-5643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5643">CVE-2012-5643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0188/">CVE-2013-0188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0188">CVE-2013-0188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0189/">CVE-2013-0189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0189">CVE-2013-0189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4115/">CVE-2013-4115 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4115">CVE-2013-4115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0128/">CVE-2014-0128 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0128">CVE-2014-0128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3609/">CVE-2014-3609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3609">CVE-2014-3609 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990702" comment="squid3-3.1.12-8.16.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216410" version="1" class="patch">
	<metadata>
		<title>squidGuard-1.4-13.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-3700" ref_url="https://www.suse.com/security/cve/CVE-2009-3700/" source="CVE"/>
		<reference ref_id="CVE-2009-3826" ref_url="https://www.suse.com/security/cve/CVE-2009-3826/" source="CVE"/>
		<description>
These are all security issues fixed in the squidGuard-1.4-13.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3700/">CVE-2009-3700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3700">CVE-2009-3700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3826/">CVE-2009-3826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3826">CVE-2009-3826 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989451" comment="squidGuard-1.4-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989452" comment="squidGuard-doc-1.4-13.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216411" version="1" class="patch">
	<metadata>
		<title>star-1.5final-28.23.25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-4134" ref_url="https://www.suse.com/security/cve/CVE-2007-4134/" source="CVE"/>
		<description>
These are all security issues fixed in the star-1.5final-28.23.25.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4134/">CVE-2007-4134 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4134">CVE-2007-4134 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990703" comment="star-1.5final-28.23.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216412" version="1" class="patch">
	<metadata>
		<title>strongswan-4.4.0-6.25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-2944" ref_url="https://www.suse.com/security/cve/CVE-2013-2944/" source="CVE"/>
		<reference ref_id="CVE-2013-5018" ref_url="https://www.suse.com/security/cve/CVE-2013-5018/" source="CVE"/>
		<reference ref_id="CVE-2013-6075" ref_url="https://www.suse.com/security/cve/CVE-2013-6075/" source="CVE"/>
		<reference ref_id="CVE-2014-2338" ref_url="https://www.suse.com/security/cve/CVE-2014-2338/" source="CVE"/>
		<reference ref_id="CVE-2014-2891" ref_url="https://www.suse.com/security/cve/CVE-2014-2891/" source="CVE"/>
		<description>
These are all security issues fixed in the strongswan-4.4.0-6.25.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2944/">CVE-2013-2944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2944">CVE-2013-2944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5018/">CVE-2013-5018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5018">CVE-2013-5018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6075/">CVE-2013-6075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6075">CVE-2013-6075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2338/">CVE-2014-2338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2338">CVE-2014-2338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2891/">CVE-2014-2891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2891">CVE-2014-2891 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990704" comment="strongswan-4.4.0-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990705" comment="strongswan-doc-4.4.0-6.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216413" version="1" class="patch">
	<metadata>
		<title>stunnel-4.54-0.9.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1762" ref_url="https://www.suse.com/security/cve/CVE-2013-1762/" source="CVE"/>
		<description>
These are all security issues fixed in the stunnel-4.54-0.9.24 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1762/">CVE-2013-1762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1762">CVE-2013-1762 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990033" comment="stunnel-4.54-0.9.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216414" version="1" class="patch">
	<metadata>
		<title>sudo-1.7.6p2-0.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-0426" ref_url="https://www.suse.com/security/cve/CVE-2010-0426/" source="CVE"/>
		<reference ref_id="CVE-2010-0427" ref_url="https://www.suse.com/security/cve/CVE-2010-0427/" source="CVE"/>
		<reference ref_id="CVE-2012-2337" ref_url="https://www.suse.com/security/cve/CVE-2012-2337/" source="CVE"/>
		<reference ref_id="CVE-2013-1775" ref_url="https://www.suse.com/security/cve/CVE-2013-1775/" source="CVE"/>
		<reference ref_id="CVE-2013-1776" ref_url="https://www.suse.com/security/cve/CVE-2013-1776/" source="CVE"/>
		<reference ref_id="CVE-2013-2776" ref_url="https://www.suse.com/security/cve/CVE-2013-2776/" source="CVE"/>
		<reference ref_id="CVE-2013-2777" ref_url="https://www.suse.com/security/cve/CVE-2013-2777/" source="CVE"/>
		<reference ref_id="CVE-2014-0106" ref_url="https://www.suse.com/security/cve/CVE-2014-0106/" source="CVE"/>
		<reference ref_id="CVE-2014-9680" ref_url="https://www.suse.com/security/cve/CVE-2014-9680/" source="CVE"/>
		<description>
These are all security issues fixed in the sudo-1.7.6p2-0.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0426/">CVE-2010-0426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0426">CVE-2010-0426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0427/">CVE-2010-0427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0427">CVE-2010-0427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2337/">CVE-2012-2337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2337">CVE-2012-2337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1775/">CVE-2013-1775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1775">CVE-2013-1775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1776/">CVE-2013-1776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1776">CVE-2013-1776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2776/">CVE-2013-2776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2776">CVE-2013-2776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2777/">CVE-2013-2777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2777">CVE-2013-2777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0106/">CVE-2014-0106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0106">CVE-2014-0106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9680/">CVE-2014-9680 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9680">CVE-2014-9680 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990706" comment="sudo-1.7.6p2-0.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216415" version="1" class="patch">
	<metadata>
		<title>sysconfig-0.71.61-0.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-4182" ref_url="https://www.suse.com/security/cve/CVE-2011-4182/" source="CVE"/>
		<description>
These are all security issues fixed in the sysconfig-0.71.61-0.13.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4182/">CVE-2011-4182 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-4182">CVE-2011-4182 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990707" comment="sysconfig-0.71.61-0.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216416" version="1" class="patch">
	<metadata>
		<title>syslog-ng-2.0.9-27.34.36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-5110" ref_url="https://www.suse.com/security/cve/CVE-2008-5110/" source="CVE"/>
		<description>
These are all security issues fixed in the syslog-ng-2.0.9-27.34.36.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5110/">CVE-2008-5110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5110">CVE-2008-5110 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990036" comment="syslog-ng-2.0.9-27.34.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216417" version="1" class="patch">
	<metadata>
		<title>sysstat-8.1.5-7.50.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-3852" ref_url="https://www.suse.com/security/cve/CVE-2007-3852/" source="CVE"/>
		<description>
These are all security issues fixed in the sysstat-8.1.5-7.50.25 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3852/">CVE-2007-3852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3852">CVE-2007-3852 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990708" comment="sysstat-8.1.5-7.50.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990709" comment="sysstat-isag-8.1.5-7.50.25 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216418" version="1" class="patch">
	<metadata>
		<title>system-config-printer-1.0.8-9.23.44 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-4405" ref_url="https://www.suse.com/security/cve/CVE-2011-4405/" source="CVE"/>
		<reference ref_id="CVE-2012-4510" ref_url="https://www.suse.com/security/cve/CVE-2012-4510/" source="CVE"/>
		<description>
These are all security issues fixed in the system-config-printer-1.0.8-9.23.44 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4405/">CVE-2011-4405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4405">CVE-2011-4405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4510/">CVE-2012-4510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4510">CVE-2012-4510 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990039" comment="system-config-printer-1.0.8-9.23.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990040" comment="system-config-printer-lang-1.0.8-9.23.44 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216419" version="1" class="patch">
	<metadata>
		<title>systemtap-1.5-0.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-2911" ref_url="https://www.suse.com/security/cve/CVE-2009-2911/" source="CVE"/>
		<reference ref_id="CVE-2009-4273" ref_url="https://www.suse.com/security/cve/CVE-2009-4273/" source="CVE"/>
		<reference ref_id="CVE-2012-0875" ref_url="https://www.suse.com/security/cve/CVE-2012-0875/" source="CVE"/>
		<description>
These are all security issues fixed in the systemtap-1.5-0.9.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2911/">CVE-2009-2911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2911">CVE-2009-2911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4273/">CVE-2009-4273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4273">CVE-2009-4273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0875/">CVE-2012-0875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0875">CVE-2012-0875 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990041" comment="systemtap-1.5-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990042" comment="systemtap-server-1.5-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216420" version="1" class="patch">
	<metadata>
		<title>t1lib-5.1.1-100.21.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2642" ref_url="https://www.suse.com/security/cve/CVE-2010-2642/" source="CVE"/>
		<reference ref_id="CVE-2011-0433" ref_url="https://www.suse.com/security/cve/CVE-2011-0433/" source="CVE"/>
		<reference ref_id="CVE-2011-0764" ref_url="https://www.suse.com/security/cve/CVE-2011-0764/" source="CVE"/>
		<reference ref_id="CVE-2011-1552" ref_url="https://www.suse.com/security/cve/CVE-2011-1552/" source="CVE"/>
		<reference ref_id="CVE-2011-1553" ref_url="https://www.suse.com/security/cve/CVE-2011-1553/" source="CVE"/>
		<reference ref_id="CVE-2011-1554" ref_url="https://www.suse.com/security/cve/CVE-2011-1554/" source="CVE"/>
		<description>
These are all security issues fixed in the t1lib-5.1.1-100.21.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2642/">CVE-2010-2642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2642">CVE-2010-2642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0433/">CVE-2011-0433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0433">CVE-2011-0433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0764/">CVE-2011-0764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0764">CVE-2011-0764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1552/">CVE-2011-1552 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1552">CVE-2011-1552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1553/">CVE-2011-1553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1553">CVE-2011-1553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1554/">CVE-2011-1554 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1554">CVE-2011-1554 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990043" comment="t1lib-5.1.1-100.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216421" version="1" class="patch">
	<metadata>
		<title>taglib-1.5-19.23.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-1108" ref_url="https://www.suse.com/security/cve/CVE-2012-1108/" source="CVE"/>
		<reference ref_id="CVE-2012-1584" ref_url="https://www.suse.com/security/cve/CVE-2012-1584/" source="CVE"/>
		<description>
These are all security issues fixed in the taglib-1.5-19.23.4 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1108/">CVE-2012-1108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1108">CVE-2012-1108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1584/">CVE-2012-1584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1584">CVE-2012-1584 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990044" comment="taglib-1.5-19.23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990045" comment="taglib-32bit-1.5-19.23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990046" comment="taglib-x86-1.5-19.23.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216422" version="1" class="patch">
	<metadata>
		<title>tar-1.26-1.2.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2001-1267" ref_url="https://www.suse.com/security/cve/CVE-2001-1267/" source="CVE"/>
		<reference ref_id="CVE-2002-0399" ref_url="https://www.suse.com/security/cve/CVE-2002-0399/" source="CVE"/>
		<reference ref_id="CVE-2006-6097" ref_url="https://www.suse.com/security/cve/CVE-2006-6097/" source="CVE"/>
		<reference ref_id="CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624/" source="CVE"/>
		<description>
These are all security issues fixed in the tar-1.26-1.2.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2001-1267/">CVE-2001-1267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2001-1267">CVE-2001-1267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2002-0399/">CVE-2002-0399 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2002-0399">CVE-2002-0399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6097/">CVE-2006-6097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6097">CVE-2006-6097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0624">CVE-2010-0624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990710" comment="tar-1.26-1.2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216423" version="1" class="patch">
	<metadata>
		<title>tcpdump-3.9.8-1.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-8767" ref_url="https://www.suse.com/security/cve/CVE-2014-8767/" source="CVE"/>
		<reference ref_id="CVE-2014-8769" ref_url="https://www.suse.com/security/cve/CVE-2014-8769/" source="CVE"/>
		<reference ref_id="CVE-2014-9140" ref_url="https://www.suse.com/security/cve/CVE-2014-9140/" source="CVE"/>
		<reference ref_id="CVE-2015-0261" ref_url="https://www.suse.com/security/cve/CVE-2015-0261/" source="CVE"/>
		<reference ref_id="CVE-2015-2153" ref_url="https://www.suse.com/security/cve/CVE-2015-2153/" source="CVE"/>
		<reference ref_id="CVE-2015-2154" ref_url="https://www.suse.com/security/cve/CVE-2015-2154/" source="CVE"/>
		<description>
These are all security issues fixed in the tcpdump-3.9.8-1.27.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8767/">CVE-2014-8767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8767">CVE-2014-8767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8769/">CVE-2014-8769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8769">CVE-2014-8769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9140/">CVE-2014-9140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9140">CVE-2014-9140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0261/">CVE-2015-0261 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0261">CVE-2015-0261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2153/">CVE-2015-2153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2153">CVE-2015-2153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2154/">CVE-2015-2154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2154">CVE-2015-2154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990711" comment="tcpdump-3.9.8-1.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216424" version="1" class="patch">
	<metadata>
		<title>tftp-0.48-101.31.27 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-2199" ref_url="https://www.suse.com/security/cve/CVE-2011-2199/" source="CVE"/>
		<description>
These are all security issues fixed in the tftp-0.48-101.31.27 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2199/">CVE-2011-2199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2199">CVE-2011-2199 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990047" comment="tftp-0.48-101.31.27 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216425" version="1" class="patch">
	<metadata>
		<title>tgt-0.9.10-0.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-0001" ref_url="https://www.suse.com/security/cve/CVE-2011-0001/" source="CVE"/>
		<description>
These are all security issues fixed in the tgt-0.9.10-0.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0001/">CVE-2011-0001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0001">CVE-2011-0001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990048" comment="tgt-0.9.10-0.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216426" version="1" class="patch">
	<metadata>
		<title>tomcat6-6.0.41-0.43.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-1232" ref_url="https://www.suse.com/security/cve/CVE-2008-1232/" source="CVE"/>
		<reference ref_id="CVE-2008-1947" ref_url="https://www.suse.com/security/cve/CVE-2008-1947/" source="CVE"/>
		<reference ref_id="CVE-2008-2370" ref_url="https://www.suse.com/security/cve/CVE-2008-2370/" source="CVE"/>
		<reference ref_id="CVE-2008-2938" ref_url="https://www.suse.com/security/cve/CVE-2008-2938/" source="CVE"/>
		<reference ref_id="CVE-2008-5515" ref_url="https://www.suse.com/security/cve/CVE-2008-5515/" source="CVE"/>
		<reference ref_id="CVE-2009-0033" ref_url="https://www.suse.com/security/cve/CVE-2009-0033/" source="CVE"/>
		<reference ref_id="CVE-2009-0580" ref_url="https://www.suse.com/security/cve/CVE-2009-0580/" source="CVE"/>
		<reference ref_id="CVE-2009-0781" ref_url="https://www.suse.com/security/cve/CVE-2009-0781/" source="CVE"/>
		<reference ref_id="CVE-2009-0783" ref_url="https://www.suse.com/security/cve/CVE-2009-0783/" source="CVE"/>
		<reference ref_id="CVE-2009-2693" ref_url="https://www.suse.com/security/cve/CVE-2009-2693/" source="CVE"/>
		<reference ref_id="CVE-2009-2901" ref_url="https://www.suse.com/security/cve/CVE-2009-2901/" source="CVE"/>
		<reference ref_id="CVE-2009-2902" ref_url="https://www.suse.com/security/cve/CVE-2009-2902/" source="CVE"/>
		<reference ref_id="CVE-2010-1157" ref_url="https://www.suse.com/security/cve/CVE-2010-1157/" source="CVE"/>
		<reference ref_id="CVE-2010-2227" ref_url="https://www.suse.com/security/cve/CVE-2010-2227/" source="CVE"/>
		<reference ref_id="CVE-2010-3718" ref_url="https://www.suse.com/security/cve/CVE-2010-3718/" source="CVE"/>
		<reference ref_id="CVE-2010-4172" ref_url="https://www.suse.com/security/cve/CVE-2010-4172/" source="CVE"/>
		<reference ref_id="CVE-2011-0013" ref_url="https://www.suse.com/security/cve/CVE-2011-0013/" source="CVE"/>
		<reference ref_id="CVE-2011-0534" ref_url="https://www.suse.com/security/cve/CVE-2011-0534/" source="CVE"/>
		<reference ref_id="CVE-2011-1184" ref_url="https://www.suse.com/security/cve/CVE-2011-1184/" source="CVE"/>
		<reference ref_id="CVE-2011-2204" ref_url="https://www.suse.com/security/cve/CVE-2011-2204/" source="CVE"/>
		<reference ref_id="CVE-2011-2526" ref_url="https://www.suse.com/security/cve/CVE-2011-2526/" source="CVE"/>
		<reference ref_id="CVE-2011-3190" ref_url="https://www.suse.com/security/cve/CVE-2011-3190/" source="CVE"/>
		<reference ref_id="CVE-2011-5062" ref_url="https://www.suse.com/security/cve/CVE-2011-5062/" source="CVE"/>
		<reference ref_id="CVE-2011-5063" ref_url="https://www.suse.com/security/cve/CVE-2011-5063/" source="CVE"/>
		<reference ref_id="CVE-2011-5064" ref_url="https://www.suse.com/security/cve/CVE-2011-5064/" source="CVE"/>
		<reference ref_id="CVE-2012-0022" ref_url="https://www.suse.com/security/cve/CVE-2012-0022/" source="CVE"/>
		<reference ref_id="CVE-2012-2733" ref_url="https://www.suse.com/security/cve/CVE-2012-2733/" source="CVE"/>
		<reference ref_id="CVE-2012-3439" ref_url="https://www.suse.com/security/cve/CVE-2012-3439/" source="CVE"/>
		<reference ref_id="CVE-2012-3544" ref_url="https://www.suse.com/security/cve/CVE-2012-3544/" source="CVE"/>
		<reference ref_id="CVE-2012-3546" ref_url="https://www.suse.com/security/cve/CVE-2012-3546/" source="CVE"/>
		<reference ref_id="CVE-2012-4431" ref_url="https://www.suse.com/security/cve/CVE-2012-4431/" source="CVE"/>
		<reference ref_id="CVE-2012-4534" ref_url="https://www.suse.com/security/cve/CVE-2012-4534/" source="CVE"/>
		<reference ref_id="CVE-2012-5568" ref_url="https://www.suse.com/security/cve/CVE-2012-5568/" source="CVE"/>
		<reference ref_id="CVE-2012-5885" ref_url="https://www.suse.com/security/cve/CVE-2012-5885/" source="CVE"/>
		<reference ref_id="CVE-2012-5886" ref_url="https://www.suse.com/security/cve/CVE-2012-5886/" source="CVE"/>
		<reference ref_id="CVE-2012-5887" ref_url="https://www.suse.com/security/cve/CVE-2012-5887/" source="CVE"/>
		<reference ref_id="CVE-2013-1976" ref_url="https://www.suse.com/security/cve/CVE-2013-1976/" source="CVE"/>
		<reference ref_id="CVE-2014-0096" ref_url="https://www.suse.com/security/cve/CVE-2014-0096/" source="CVE"/>
		<reference ref_id="CVE-2014-0099" ref_url="https://www.suse.com/security/cve/CVE-2014-0099/" source="CVE"/>
		<reference ref_id="CVE-2014-0119" ref_url="https://www.suse.com/security/cve/CVE-2014-0119/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat6-6.0.41-0.43.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1232/">CVE-2008-1232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1232">CVE-2008-1232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1947/">CVE-2008-1947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1947">CVE-2008-1947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2370/">CVE-2008-2370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2370">CVE-2008-2370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2938/">CVE-2008-2938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2938">CVE-2008-2938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5515/">CVE-2008-5515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5515">CVE-2008-5515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0033/">CVE-2009-0033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0033">CVE-2009-0033 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0580/">CVE-2009-0580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0580">CVE-2009-0580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0781/">CVE-2009-0781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0781">CVE-2009-0781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0783/">CVE-2009-0783 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2009-0783">CVE-2009-0783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2693/">CVE-2009-2693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2693">CVE-2009-2693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2901/">CVE-2009-2901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2901">CVE-2009-2901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2902/">CVE-2009-2902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2902">CVE-2009-2902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1157/">CVE-2010-1157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1157">CVE-2010-1157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2227/">CVE-2010-2227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2227">CVE-2010-2227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3718/">CVE-2010-3718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3718">CVE-2010-3718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4172/">CVE-2010-4172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4172">CVE-2010-4172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0013/">CVE-2011-0013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0013">CVE-2011-0013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0534/">CVE-2011-0534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0534">CVE-2011-0534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1184/">CVE-2011-1184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1184">CVE-2011-1184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2204/">CVE-2011-2204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2204">CVE-2011-2204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2526/">CVE-2011-2526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2526">CVE-2011-2526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3190/">CVE-2011-3190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3190">CVE-2011-3190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5062/">CVE-2011-5062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-5062">CVE-2011-5062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5063/">CVE-2011-5063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-5063">CVE-2011-5063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5064/">CVE-2011-5064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-5064">CVE-2011-5064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0022/">CVE-2012-0022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0022">CVE-2012-0022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2733/">CVE-2012-2733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2733">CVE-2012-2733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3439/">CVE-2012-3439 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3439">CVE-2012-3439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3544/">CVE-2012-3544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3544">CVE-2012-3544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3546/">CVE-2012-3546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3546">CVE-2012-3546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4431/">CVE-2012-4431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4431">CVE-2012-4431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4534/">CVE-2012-4534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4534">CVE-2012-4534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5568/">CVE-2012-5568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5568">CVE-2012-5568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5885/">CVE-2012-5885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5885">CVE-2012-5885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5886/">CVE-2012-5886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5886">CVE-2012-5886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5887/">CVE-2012-5887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5887">CVE-2012-5887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1976/">CVE-2013-1976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1976">CVE-2013-1976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0096/">CVE-2014-0096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0096">CVE-2014-0096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0099/">CVE-2014-0099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0099">CVE-2014-0099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0119/">CVE-2014-0119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0119">CVE-2014-0119 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990712" comment="tomcat6-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990713" comment="tomcat6-admin-webapps-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990714" comment="tomcat6-docs-webapp-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990715" comment="tomcat6-javadoc-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990716" comment="tomcat6-jsp-2_1-api-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990717" comment="tomcat6-lib-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990718" comment="tomcat6-servlet-2_5-api-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990719" comment="tomcat6-webapps-6.0.41-0.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216427" version="1" class="patch">
	<metadata>
		<title>unixODBC_23-2.3.1-0.9.40 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-1145" ref_url="https://www.suse.com/security/cve/CVE-2011-1145/" source="CVE"/>
		<description>
These are all security issues fixed in the unixODBC_23-2.3.1-0.9.40 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2011-1145/">CVE-2011-1145 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-1145">CVE-2011-1145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990057" comment="unixODBC_23-2.3.1-0.9.40 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216428" version="1" class="patch">
	<metadata>
		<title>unrar-3.80.2-2.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-3726" ref_url="https://www.suse.com/security/cve/CVE-2007-3726/" source="CVE"/>
		<description>
These are all security issues fixed in the unrar-3.80.2-2.8 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3726/">CVE-2007-3726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3726">CVE-2007-3726 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988861" comment="unrar-3.80.2-2.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216429" version="1" class="patch">
	<metadata>
		<title>unzip-6.00-11.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2005-2475" ref_url="https://www.suse.com/security/cve/CVE-2005-2475/" source="CVE"/>
		<reference ref_id="CVE-2014-8139" ref_url="https://www.suse.com/security/cve/CVE-2014-8139/" source="CVE"/>
		<reference ref_id="CVE-2014-8140" ref_url="https://www.suse.com/security/cve/CVE-2014-8140/" source="CVE"/>
		<reference ref_id="CVE-2014-8141" ref_url="https://www.suse.com/security/cve/CVE-2014-8141/" source="CVE"/>
		<reference ref_id="CVE-2014-9636" ref_url="https://www.suse.com/security/cve/CVE-2014-9636/" source="CVE"/>
		<description>
These are all security issues fixed in the unzip-6.00-11.13.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-2475/">CVE-2005-2475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-2475">CVE-2005-2475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8139/">CVE-2014-8139 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8139">CVE-2014-8139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8140/">CVE-2014-8140 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8140">CVE-2014-8140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8141/">CVE-2014-8141 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8141">CVE-2014-8141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9636/">CVE-2014-9636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9636">CVE-2014-9636 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990720" comment="unzip-6.00-11.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216430" version="1" class="patch">
	<metadata>
		<title>vino-2.28.1-2.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-5745" ref_url="https://www.suse.com/security/cve/CVE-2013-5745/" source="CVE"/>
		<description>
These are all security issues fixed in the vino-2.28.1-2.5.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5745/">CVE-2013-5745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5745">CVE-2013-5745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990721" comment="vino-2.28.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990722" comment="vino-lang-2.28.1-2.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216431" version="1" class="patch">
	<metadata>
		<title>virt-utils-1.2.1-10.41 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1922" ref_url="https://www.suse.com/security/cve/CVE-2013-1922/" source="CVE"/>
		<description>
These are all security issues fixed in the virt-utils-1.2.1-10.41 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1922/">CVE-2013-1922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1922">CVE-2013-1922 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990723" comment="virt-utils-1.2.1-10.41 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216432" version="1" class="patch">
	<metadata>
		<title>vsftpd-2.0.7-4.35.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-1419" ref_url="https://www.suse.com/security/cve/CVE-2015-1419/" source="CVE"/>
		<description>
These are all security issues fixed in the vsftpd-2.0.7-4.35.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1419/">CVE-2015-1419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1419">CVE-2015-1419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990724" comment="vsftpd-2.0.7-4.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216433" version="1" class="patch">
	<metadata>
		<title>vte-0.22.5-0.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2713" ref_url="https://www.suse.com/security/cve/CVE-2010-2713/" source="CVE"/>
		<description>
These are all security issues fixed in the vte-0.22.5-0.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2713/">CVE-2010-2713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2713">CVE-2010-2713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009989476" comment="vte-0.22.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989477" comment="vte-doc-0.22.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989478" comment="vte-lang-0.22.5-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216434" version="1" class="patch">
	<metadata>
		<title>w3m-0.5.2-132.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-6772" ref_url="https://www.suse.com/security/cve/CVE-2006-6772/" source="CVE"/>
		<reference ref_id="CVE-2010-2074" ref_url="https://www.suse.com/security/cve/CVE-2010-2074/" source="CVE"/>
		<description>
These are all security issues fixed in the w3m-0.5.2-132.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6772/">CVE-2006-6772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6772">CVE-2006-6772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2074/">CVE-2010-2074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2074">CVE-2010-2074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009989479" comment="w3m-0.5.2-132.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216435" version="1" class="patch">
	<metadata>
		<title>wget-1.11.4-1.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-6719" ref_url="https://www.suse.com/security/cve/CVE-2006-6719/" source="CVE"/>
		<reference ref_id="CVE-2014-4877" ref_url="https://www.suse.com/security/cve/CVE-2014-4877/" source="CVE"/>
		<description>
These are all security issues fixed in the wget-1.11.4-1.19.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6719/">CVE-2006-6719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6719">CVE-2006-6719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4877/">CVE-2014-4877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4877">CVE-2014-4877 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990725" comment="wget-1.11.4-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216436" version="1" class="patch">
	<metadata>
		<title>wireshark-1.10.13-0.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-1932" ref_url="https://www.suse.com/security/cve/CVE-2006-1932/" source="CVE"/>
		<reference ref_id="CVE-2006-4574" ref_url="https://www.suse.com/security/cve/CVE-2006-4574/" source="CVE"/>
		<reference ref_id="CVE-2006-4805" ref_url="https://www.suse.com/security/cve/CVE-2006-4805/" source="CVE"/>
		<reference ref_id="CVE-2006-5468" ref_url="https://www.suse.com/security/cve/CVE-2006-5468/" source="CVE"/>
		<reference ref_id="CVE-2006-5469" ref_url="https://www.suse.com/security/cve/CVE-2006-5469/" source="CVE"/>
		<reference ref_id="CVE-2006-5740" ref_url="https://www.suse.com/security/cve/CVE-2006-5740/" source="CVE"/>
		<reference ref_id="CVE-2007-0456" ref_url="https://www.suse.com/security/cve/CVE-2007-0456/" source="CVE"/>
		<reference ref_id="CVE-2007-0457" ref_url="https://www.suse.com/security/cve/CVE-2007-0457/" source="CVE"/>
		<reference ref_id="CVE-2007-0458" ref_url="https://www.suse.com/security/cve/CVE-2007-0458/" source="CVE"/>
		<reference ref_id="CVE-2007-0459" ref_url="https://www.suse.com/security/cve/CVE-2007-0459/" source="CVE"/>
		<reference ref_id="CVE-2009-1210" ref_url="https://www.suse.com/security/cve/CVE-2009-1210/" source="CVE"/>
		<reference ref_id="CVE-2009-1267" ref_url="https://www.suse.com/security/cve/CVE-2009-1267/" source="CVE"/>
		<reference ref_id="CVE-2009-1268" ref_url="https://www.suse.com/security/cve/CVE-2009-1268/" source="CVE"/>
		<reference ref_id="CVE-2009-1269" ref_url="https://www.suse.com/security/cve/CVE-2009-1269/" source="CVE"/>
		<reference ref_id="CVE-2009-2560" ref_url="https://www.suse.com/security/cve/CVE-2009-2560/" source="CVE"/>
		<reference ref_id="CVE-2009-2562" ref_url="https://www.suse.com/security/cve/CVE-2009-2562/" source="CVE"/>
		<reference ref_id="CVE-2009-3549" ref_url="https://www.suse.com/security/cve/CVE-2009-3549/" source="CVE"/>
		<reference ref_id="CVE-2009-3550" ref_url="https://www.suse.com/security/cve/CVE-2009-3550/" source="CVE"/>
		<reference ref_id="CVE-2009-3829" ref_url="https://www.suse.com/security/cve/CVE-2009-3829/" source="CVE"/>
		<reference ref_id="CVE-2009-4377" ref_url="https://www.suse.com/security/cve/CVE-2009-4377/" source="CVE"/>
		<reference ref_id="CVE-2010-0304" ref_url="https://www.suse.com/security/cve/CVE-2010-0304/" source="CVE"/>
		<reference ref_id="CVE-2010-1455" ref_url="https://www.suse.com/security/cve/CVE-2010-1455/" source="CVE"/>
		<reference ref_id="CVE-2010-2992" ref_url="https://www.suse.com/security/cve/CVE-2010-2992/" source="CVE"/>
		<reference ref_id="CVE-2010-2993" ref_url="https://www.suse.com/security/cve/CVE-2010-2993/" source="CVE"/>
		<reference ref_id="CVE-2010-2994" ref_url="https://www.suse.com/security/cve/CVE-2010-2994/" source="CVE"/>
		<reference ref_id="CVE-2010-2995" ref_url="https://www.suse.com/security/cve/CVE-2010-2995/" source="CVE"/>
		<reference ref_id="CVE-2010-3445" ref_url="https://www.suse.com/security/cve/CVE-2010-3445/" source="CVE"/>
		<reference ref_id="CVE-2010-4300" ref_url="https://www.suse.com/security/cve/CVE-2010-4300/" source="CVE"/>
		<reference ref_id="CVE-2010-4301" ref_url="https://www.suse.com/security/cve/CVE-2010-4301/" source="CVE"/>
		<reference ref_id="CVE-2010-4538" ref_url="https://www.suse.com/security/cve/CVE-2010-4538/" source="CVE"/>
		<reference ref_id="CVE-2011-0024" ref_url="https://www.suse.com/security/cve/CVE-2011-0024/" source="CVE"/>
		<reference ref_id="CVE-2011-0538" ref_url="https://www.suse.com/security/cve/CVE-2011-0538/" source="CVE"/>
		<reference ref_id="CVE-2011-0713" ref_url="https://www.suse.com/security/cve/CVE-2011-0713/" source="CVE"/>
		<reference ref_id="CVE-2011-1138" ref_url="https://www.suse.com/security/cve/CVE-2011-1138/" source="CVE"/>
		<reference ref_id="CVE-2011-1139" ref_url="https://www.suse.com/security/cve/CVE-2011-1139/" source="CVE"/>
		<reference ref_id="CVE-2011-1140" ref_url="https://www.suse.com/security/cve/CVE-2011-1140/" source="CVE"/>
		<reference ref_id="CVE-2011-1143" ref_url="https://www.suse.com/security/cve/CVE-2011-1143/" source="CVE"/>
		<reference ref_id="CVE-2011-1590" ref_url="https://www.suse.com/security/cve/CVE-2011-1590/" source="CVE"/>
		<reference ref_id="CVE-2011-1591" ref_url="https://www.suse.com/security/cve/CVE-2011-1591/" source="CVE"/>
		<reference ref_id="CVE-2011-1592" ref_url="https://www.suse.com/security/cve/CVE-2011-1592/" source="CVE"/>
		<reference ref_id="CVE-2011-1957" ref_url="https://www.suse.com/security/cve/CVE-2011-1957/" source="CVE"/>
		<reference ref_id="CVE-2011-1958" ref_url="https://www.suse.com/security/cve/CVE-2011-1958/" source="CVE"/>
		<reference ref_id="CVE-2011-1959" ref_url="https://www.suse.com/security/cve/CVE-2011-1959/" source="CVE"/>
		<reference ref_id="CVE-2011-2174" ref_url="https://www.suse.com/security/cve/CVE-2011-2174/" source="CVE"/>
		<reference ref_id="CVE-2011-2175" ref_url="https://www.suse.com/security/cve/CVE-2011-2175/" source="CVE"/>
		<reference ref_id="CVE-2011-2597" ref_url="https://www.suse.com/security/cve/CVE-2011-2597/" source="CVE"/>
		<reference ref_id="CVE-2011-2698" ref_url="https://www.suse.com/security/cve/CVE-2011-2698/" source="CVE"/>
		<reference ref_id="CVE-2011-3266" ref_url="https://www.suse.com/security/cve/CVE-2011-3266/" source="CVE"/>
		<reference ref_id="CVE-2011-3360" ref_url="https://www.suse.com/security/cve/CVE-2011-3360/" source="CVE"/>
		<reference ref_id="CVE-2011-3483" ref_url="https://www.suse.com/security/cve/CVE-2011-3483/" source="CVE"/>
		<reference ref_id="CVE-2012-1593" ref_url="https://www.suse.com/security/cve/CVE-2012-1593/" source="CVE"/>
		<reference ref_id="CVE-2012-1595" ref_url="https://www.suse.com/security/cve/CVE-2012-1595/" source="CVE"/>
		<reference ref_id="CVE-2012-1596" ref_url="https://www.suse.com/security/cve/CVE-2012-1596/" source="CVE"/>
		<reference ref_id="CVE-2012-2392" ref_url="https://www.suse.com/security/cve/CVE-2012-2392/" source="CVE"/>
		<reference ref_id="CVE-2012-2393" ref_url="https://www.suse.com/security/cve/CVE-2012-2393/" source="CVE"/>
		<reference ref_id="CVE-2012-2394" ref_url="https://www.suse.com/security/cve/CVE-2012-2394/" source="CVE"/>
		<reference ref_id="CVE-2012-4048" ref_url="https://www.suse.com/security/cve/CVE-2012-4048/" source="CVE"/>
		<reference ref_id="CVE-2012-4049" ref_url="https://www.suse.com/security/cve/CVE-2012-4049/" source="CVE"/>
		<reference ref_id="CVE-2012-4285" ref_url="https://www.suse.com/security/cve/CVE-2012-4285/" source="CVE"/>
		<reference ref_id="CVE-2012-4288" ref_url="https://www.suse.com/security/cve/CVE-2012-4288/" source="CVE"/>
		<reference ref_id="CVE-2012-4289" ref_url="https://www.suse.com/security/cve/CVE-2012-4289/" source="CVE"/>
		<reference ref_id="CVE-2012-4290" ref_url="https://www.suse.com/security/cve/CVE-2012-4290/" source="CVE"/>
		<reference ref_id="CVE-2012-4291" ref_url="https://www.suse.com/security/cve/CVE-2012-4291/" source="CVE"/>
		<reference ref_id="CVE-2012-4292" ref_url="https://www.suse.com/security/cve/CVE-2012-4292/" source="CVE"/>
		<reference ref_id="CVE-2012-4293" ref_url="https://www.suse.com/security/cve/CVE-2012-4293/" source="CVE"/>
		<reference ref_id="CVE-2012-4296" ref_url="https://www.suse.com/security/cve/CVE-2012-4296/" source="CVE"/>
		<reference ref_id="CVE-2012-5592" ref_url="https://www.suse.com/security/cve/CVE-2012-5592/" source="CVE"/>
		<reference ref_id="CVE-2012-5593" ref_url="https://www.suse.com/security/cve/CVE-2012-5593/" source="CVE"/>
		<reference ref_id="CVE-2012-5594" ref_url="https://www.suse.com/security/cve/CVE-2012-5594/" source="CVE"/>
		<reference ref_id="CVE-2012-5595" ref_url="https://www.suse.com/security/cve/CVE-2012-5595/" source="CVE"/>
		<reference ref_id="CVE-2012-5596" ref_url="https://www.suse.com/security/cve/CVE-2012-5596/" source="CVE"/>
		<reference ref_id="CVE-2012-5597" ref_url="https://www.suse.com/security/cve/CVE-2012-5597/" source="CVE"/>
		<reference ref_id="CVE-2012-5598" ref_url="https://www.suse.com/security/cve/CVE-2012-5598/" source="CVE"/>
		<reference ref_id="CVE-2012-5599" ref_url="https://www.suse.com/security/cve/CVE-2012-5599/" source="CVE"/>
		<reference ref_id="CVE-2012-5600" ref_url="https://www.suse.com/security/cve/CVE-2012-5600/" source="CVE"/>
		<reference ref_id="CVE-2012-5601" ref_url="https://www.suse.com/security/cve/CVE-2012-5601/" source="CVE"/>
		<reference ref_id="CVE-2012-5602" ref_url="https://www.suse.com/security/cve/CVE-2012-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-1572" ref_url="https://www.suse.com/security/cve/CVE-2013-1572/" source="CVE"/>
		<reference ref_id="CVE-2013-1573" ref_url="https://www.suse.com/security/cve/CVE-2013-1573/" source="CVE"/>
		<reference ref_id="CVE-2013-1574" ref_url="https://www.suse.com/security/cve/CVE-2013-1574/" source="CVE"/>
		<reference ref_id="CVE-2013-1575" ref_url="https://www.suse.com/security/cve/CVE-2013-1575/" source="CVE"/>
		<reference ref_id="CVE-2013-1576" ref_url="https://www.suse.com/security/cve/CVE-2013-1576/" source="CVE"/>
		<reference ref_id="CVE-2013-1577" ref_url="https://www.suse.com/security/cve/CVE-2013-1577/" source="CVE"/>
		<reference ref_id="CVE-2013-1578" ref_url="https://www.suse.com/security/cve/CVE-2013-1578/" source="CVE"/>
		<reference ref_id="CVE-2013-1579" ref_url="https://www.suse.com/security/cve/CVE-2013-1579/" source="CVE"/>
		<reference ref_id="CVE-2013-1580" ref_url="https://www.suse.com/security/cve/CVE-2013-1580/" source="CVE"/>
		<reference ref_id="CVE-2013-1581" ref_url="https://www.suse.com/security/cve/CVE-2013-1581/" source="CVE"/>
		<reference ref_id="CVE-2013-1582" ref_url="https://www.suse.com/security/cve/CVE-2013-1582/" source="CVE"/>
		<reference ref_id="CVE-2013-1583" ref_url="https://www.suse.com/security/cve/CVE-2013-1583/" source="CVE"/>
		<reference ref_id="CVE-2013-1584" ref_url="https://www.suse.com/security/cve/CVE-2013-1584/" source="CVE"/>
		<reference ref_id="CVE-2013-1585" ref_url="https://www.suse.com/security/cve/CVE-2013-1585/" source="CVE"/>
		<reference ref_id="CVE-2013-1586" ref_url="https://www.suse.com/security/cve/CVE-2013-1586/" source="CVE"/>
		<reference ref_id="CVE-2013-1587" ref_url="https://www.suse.com/security/cve/CVE-2013-1587/" source="CVE"/>
		<reference ref_id="CVE-2013-1588" ref_url="https://www.suse.com/security/cve/CVE-2013-1588/" source="CVE"/>
		<reference ref_id="CVE-2013-1589" ref_url="https://www.suse.com/security/cve/CVE-2013-1589/" source="CVE"/>
		<reference ref_id="CVE-2013-1590" ref_url="https://www.suse.com/security/cve/CVE-2013-1590/" source="CVE"/>
		<reference ref_id="CVE-2013-2475" ref_url="https://www.suse.com/security/cve/CVE-2013-2475/" source="CVE"/>
		<reference ref_id="CVE-2013-2476" ref_url="https://www.suse.com/security/cve/CVE-2013-2476/" source="CVE"/>
		<reference ref_id="CVE-2013-2477" ref_url="https://www.suse.com/security/cve/CVE-2013-2477/" source="CVE"/>
		<reference ref_id="CVE-2013-2478" ref_url="https://www.suse.com/security/cve/CVE-2013-2478/" source="CVE"/>
		<reference ref_id="CVE-2013-2479" ref_url="https://www.suse.com/security/cve/CVE-2013-2479/" source="CVE"/>
		<reference ref_id="CVE-2013-2480" ref_url="https://www.suse.com/security/cve/CVE-2013-2480/" source="CVE"/>
		<reference ref_id="CVE-2013-2481" ref_url="https://www.suse.com/security/cve/CVE-2013-2481/" source="CVE"/>
		<reference ref_id="CVE-2013-2482" ref_url="https://www.suse.com/security/cve/CVE-2013-2482/" source="CVE"/>
		<reference ref_id="CVE-2013-2483" ref_url="https://www.suse.com/security/cve/CVE-2013-2483/" source="CVE"/>
		<reference ref_id="CVE-2013-2484" ref_url="https://www.suse.com/security/cve/CVE-2013-2484/" source="CVE"/>
		<reference ref_id="CVE-2013-2485" ref_url="https://www.suse.com/security/cve/CVE-2013-2485/" source="CVE"/>
		<reference ref_id="CVE-2013-2486" ref_url="https://www.suse.com/security/cve/CVE-2013-2486/" source="CVE"/>
		<reference ref_id="CVE-2013-2487" ref_url="https://www.suse.com/security/cve/CVE-2013-2487/" source="CVE"/>
		<reference ref_id="CVE-2013-2488" ref_url="https://www.suse.com/security/cve/CVE-2013-2488/" source="CVE"/>
		<reference ref_id="CVE-2013-4074" ref_url="https://www.suse.com/security/cve/CVE-2013-4074/" source="CVE"/>
		<reference ref_id="CVE-2013-4075" ref_url="https://www.suse.com/security/cve/CVE-2013-4075/" source="CVE"/>
		<reference ref_id="CVE-2013-4076" ref_url="https://www.suse.com/security/cve/CVE-2013-4076/" source="CVE"/>
		<reference ref_id="CVE-2013-4077" ref_url="https://www.suse.com/security/cve/CVE-2013-4077/" source="CVE"/>
		<reference ref_id="CVE-2013-4078" ref_url="https://www.suse.com/security/cve/CVE-2013-4078/" source="CVE"/>
		<reference ref_id="CVE-2013-4079" ref_url="https://www.suse.com/security/cve/CVE-2013-4079/" source="CVE"/>
		<reference ref_id="CVE-2013-4080" ref_url="https://www.suse.com/security/cve/CVE-2013-4080/" source="CVE"/>
		<reference ref_id="CVE-2013-4081" ref_url="https://www.suse.com/security/cve/CVE-2013-4081/" source="CVE"/>
		<reference ref_id="CVE-2013-4082" ref_url="https://www.suse.com/security/cve/CVE-2013-4082/" source="CVE"/>
		<reference ref_id="CVE-2013-4083" ref_url="https://www.suse.com/security/cve/CVE-2013-4083/" source="CVE"/>
		<reference ref_id="CVE-2013-4927" ref_url="https://www.suse.com/security/cve/CVE-2013-4927/" source="CVE"/>
		<reference ref_id="CVE-2013-4929" ref_url="https://www.suse.com/security/cve/CVE-2013-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-4930" ref_url="https://www.suse.com/security/cve/CVE-2013-4930/" source="CVE"/>
		<reference ref_id="CVE-2013-4931" ref_url="https://www.suse.com/security/cve/CVE-2013-4931/" source="CVE"/>
		<reference ref_id="CVE-2013-4932" ref_url="https://www.suse.com/security/cve/CVE-2013-4932/" source="CVE"/>
		<reference ref_id="CVE-2013-4933" ref_url="https://www.suse.com/security/cve/CVE-2013-4933/" source="CVE"/>
		<reference ref_id="CVE-2013-4934" ref_url="https://www.suse.com/security/cve/CVE-2013-4934/" source="CVE"/>
		<reference ref_id="CVE-2013-4935" ref_url="https://www.suse.com/security/cve/CVE-2013-4935/" source="CVE"/>
		<reference ref_id="CVE-2013-5718" ref_url="https://www.suse.com/security/cve/CVE-2013-5718/" source="CVE"/>
		<reference ref_id="CVE-2013-5719" ref_url="https://www.suse.com/security/cve/CVE-2013-5719/" source="CVE"/>
		<reference ref_id="CVE-2013-5720" ref_url="https://www.suse.com/security/cve/CVE-2013-5720/" source="CVE"/>
		<reference ref_id="CVE-2013-5721" ref_url="https://www.suse.com/security/cve/CVE-2013-5721/" source="CVE"/>
		<reference ref_id="CVE-2013-5722" ref_url="https://www.suse.com/security/cve/CVE-2013-5722/" source="CVE"/>
		<reference ref_id="CVE-2013-6336" ref_url="https://www.suse.com/security/cve/CVE-2013-6336/" source="CVE"/>
		<reference ref_id="CVE-2013-6337" ref_url="https://www.suse.com/security/cve/CVE-2013-6337/" source="CVE"/>
		<reference ref_id="CVE-2013-6338" ref_url="https://www.suse.com/security/cve/CVE-2013-6338/" source="CVE"/>
		<reference ref_id="CVE-2013-6339" ref_url="https://www.suse.com/security/cve/CVE-2013-6339/" source="CVE"/>
		<reference ref_id="CVE-2013-6340" ref_url="https://www.suse.com/security/cve/CVE-2013-6340/" source="CVE"/>
		<reference ref_id="CVE-2013-7112" ref_url="https://www.suse.com/security/cve/CVE-2013-7112/" source="CVE"/>
		<reference ref_id="CVE-2013-7113" ref_url="https://www.suse.com/security/cve/CVE-2013-7113/" source="CVE"/>
		<reference ref_id="CVE-2013-7114" ref_url="https://www.suse.com/security/cve/CVE-2013-7114/" source="CVE"/>
		<reference ref_id="CVE-2014-2281" ref_url="https://www.suse.com/security/cve/CVE-2014-2281/" source="CVE"/>
		<reference ref_id="CVE-2014-2283" ref_url="https://www.suse.com/security/cve/CVE-2014-2283/" source="CVE"/>
		<reference ref_id="CVE-2014-2299" ref_url="https://www.suse.com/security/cve/CVE-2014-2299/" source="CVE"/>
		<reference ref_id="CVE-2014-5161" ref_url="https://www.suse.com/security/cve/CVE-2014-5161/" source="CVE"/>
		<reference ref_id="CVE-2014-5162" ref_url="https://www.suse.com/security/cve/CVE-2014-5162/" source="CVE"/>
		<reference ref_id="CVE-2014-5163" ref_url="https://www.suse.com/security/cve/CVE-2014-5163/" source="CVE"/>
		<reference ref_id="CVE-2014-5164" ref_url="https://www.suse.com/security/cve/CVE-2014-5164/" source="CVE"/>
		<reference ref_id="CVE-2014-5165" ref_url="https://www.suse.com/security/cve/CVE-2014-5165/" source="CVE"/>
		<reference ref_id="CVE-2014-6421" ref_url="https://www.suse.com/security/cve/CVE-2014-6421/" source="CVE"/>
		<reference ref_id="CVE-2014-6422" ref_url="https://www.suse.com/security/cve/CVE-2014-6422/" source="CVE"/>
		<reference ref_id="CVE-2014-6423" ref_url="https://www.suse.com/security/cve/CVE-2014-6423/" source="CVE"/>
		<reference ref_id="CVE-2014-6424" ref_url="https://www.suse.com/security/cve/CVE-2014-6424/" source="CVE"/>
		<reference ref_id="CVE-2014-6427" ref_url="https://www.suse.com/security/cve/CVE-2014-6427/" source="CVE"/>
		<reference ref_id="CVE-2014-6428" ref_url="https://www.suse.com/security/cve/CVE-2014-6428/" source="CVE"/>
		<reference ref_id="CVE-2014-6429" ref_url="https://www.suse.com/security/cve/CVE-2014-6429/" source="CVE"/>
		<reference ref_id="CVE-2014-6430" ref_url="https://www.suse.com/security/cve/CVE-2014-6430/" source="CVE"/>
		<reference ref_id="CVE-2014-6431" ref_url="https://www.suse.com/security/cve/CVE-2014-6431/" source="CVE"/>
		<reference ref_id="CVE-2014-6432" ref_url="https://www.suse.com/security/cve/CVE-2014-6432/" source="CVE"/>
		<reference ref_id="CVE-2014-8710" ref_url="https://www.suse.com/security/cve/CVE-2014-8710/" source="CVE"/>
		<reference ref_id="CVE-2014-8711" ref_url="https://www.suse.com/security/cve/CVE-2014-8711/" source="CVE"/>
		<reference ref_id="CVE-2014-8712" ref_url="https://www.suse.com/security/cve/CVE-2014-8712/" source="CVE"/>
		<reference ref_id="CVE-2014-8713" ref_url="https://www.suse.com/security/cve/CVE-2014-8713/" source="CVE"/>
		<reference ref_id="CVE-2014-8714" ref_url="https://www.suse.com/security/cve/CVE-2014-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-0559" ref_url="https://www.suse.com/security/cve/CVE-2015-0559/" source="CVE"/>
		<reference ref_id="CVE-2015-0560" ref_url="https://www.suse.com/security/cve/CVE-2015-0560/" source="CVE"/>
		<reference ref_id="CVE-2015-0561" ref_url="https://www.suse.com/security/cve/CVE-2015-0561/" source="CVE"/>
		<reference ref_id="CVE-2015-0562" ref_url="https://www.suse.com/security/cve/CVE-2015-0562/" source="CVE"/>
		<reference ref_id="CVE-2015-0563" ref_url="https://www.suse.com/security/cve/CVE-2015-0563/" source="CVE"/>
		<reference ref_id="CVE-2015-0564" ref_url="https://www.suse.com/security/cve/CVE-2015-0564/" source="CVE"/>
		<reference ref_id="CVE-2015-2188" ref_url="https://www.suse.com/security/cve/CVE-2015-2188/" source="CVE"/>
		<reference ref_id="CVE-2015-2189" ref_url="https://www.suse.com/security/cve/CVE-2015-2189/" source="CVE"/>
		<reference ref_id="CVE-2015-2191" ref_url="https://www.suse.com/security/cve/CVE-2015-2191/" source="CVE"/>
		<description>
These are all security issues fixed in the wireshark-1.10.13-0.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1932/">CVE-2006-1932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1932">CVE-2006-1932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4574/">CVE-2006-4574 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2006-4574">CVE-2006-4574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4805/">CVE-2006-4805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4805">CVE-2006-4805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5468/">CVE-2006-5468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5468">CVE-2006-5468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5469/">CVE-2006-5469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5469">CVE-2006-5469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5740/">CVE-2006-5740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5740">CVE-2006-5740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0456/">CVE-2007-0456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0456">CVE-2007-0456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0457/">CVE-2007-0457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0457">CVE-2007-0457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0458/">CVE-2007-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0458">CVE-2007-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0459/">CVE-2007-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0459">CVE-2007-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1210/">CVE-2009-1210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1210">CVE-2009-1210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1267/">CVE-2009-1267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1267">CVE-2009-1267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1268/">CVE-2009-1268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1268">CVE-2009-1268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1269/">CVE-2009-1269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1269">CVE-2009-1269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2560/">CVE-2009-2560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2560">CVE-2009-2560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2562/">CVE-2009-2562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2562">CVE-2009-2562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3549/">CVE-2009-3549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3549">CVE-2009-3549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3550/">CVE-2009-3550 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3550">CVE-2009-3550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3829/">CVE-2009-3829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3829">CVE-2009-3829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4377/">CVE-2009-4377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4377">CVE-2009-4377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0304/">CVE-2010-0304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0304">CVE-2010-0304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1455/">CVE-2010-1455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1455">CVE-2010-1455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2992/">CVE-2010-2992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2992">CVE-2010-2992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2993/">CVE-2010-2993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2993">CVE-2010-2993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2994/">CVE-2010-2994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2994">CVE-2010-2994 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2995/">CVE-2010-2995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2995">CVE-2010-2995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3445/">CVE-2010-3445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3445">CVE-2010-3445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4300/">CVE-2010-4300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4300">CVE-2010-4300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4301/">CVE-2010-4301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4301">CVE-2010-4301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4538/">CVE-2010-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4538">CVE-2010-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0024/">CVE-2011-0024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0024">CVE-2011-0024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0538/">CVE-2011-0538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0538">CVE-2011-0538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0713/">CVE-2011-0713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0713">CVE-2011-0713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1138/">CVE-2011-1138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1138">CVE-2011-1138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1139/">CVE-2011-1139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1139">CVE-2011-1139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1140/">CVE-2011-1140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1140">CVE-2011-1140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1143/">CVE-2011-1143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1143">CVE-2011-1143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1590/">CVE-2011-1590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1590">CVE-2011-1590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1591/">CVE-2011-1591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1591">CVE-2011-1591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1592/">CVE-2011-1592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1592">CVE-2011-1592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1957/">CVE-2011-1957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1957">CVE-2011-1957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1958/">CVE-2011-1958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1958">CVE-2011-1958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1959/">CVE-2011-1959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1959">CVE-2011-1959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2174/">CVE-2011-2174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2174">CVE-2011-2174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2175/">CVE-2011-2175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2175">CVE-2011-2175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2597/">CVE-2011-2597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2597">CVE-2011-2597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2698/">CVE-2011-2698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2698">CVE-2011-2698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3266/">CVE-2011-3266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3266">CVE-2011-3266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3360/">CVE-2011-3360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3360">CVE-2011-3360 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3483/">CVE-2011-3483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3483">CVE-2011-3483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1593/">CVE-2012-1593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1593">CVE-2012-1593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1595/">CVE-2012-1595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1595">CVE-2012-1595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1596/">CVE-2012-1596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1596">CVE-2012-1596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2392/">CVE-2012-2392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2392">CVE-2012-2392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2393/">CVE-2012-2393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2393">CVE-2012-2393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2394/">CVE-2012-2394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2394">CVE-2012-2394 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4048/">CVE-2012-4048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4048">CVE-2012-4048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4049/">CVE-2012-4049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4049">CVE-2012-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4285/">CVE-2012-4285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4285">CVE-2012-4285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4288/">CVE-2012-4288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4288">CVE-2012-4288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4289/">CVE-2012-4289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4289">CVE-2012-4289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4290/">CVE-2012-4290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4290">CVE-2012-4290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4291/">CVE-2012-4291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4291">CVE-2012-4291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4292/">CVE-2012-4292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4292">CVE-2012-4292 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4293/">CVE-2012-4293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4293">CVE-2012-4293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4296/">CVE-2012-4296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4296">CVE-2012-4296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5592/">CVE-2012-5592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5592">CVE-2012-5592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5593/">CVE-2012-5593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5593">CVE-2012-5593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5594/">CVE-2012-5594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5594">CVE-2012-5594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5595/">CVE-2012-5595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5595">CVE-2012-5595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5596/">CVE-2012-5596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5596">CVE-2012-5596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5597/">CVE-2012-5597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5597">CVE-2012-5597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5598/">CVE-2012-5598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5598">CVE-2012-5598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5599/">CVE-2012-5599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5599">CVE-2012-5599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5600/">CVE-2012-5600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5600">CVE-2012-5600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5601/">CVE-2012-5601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5601">CVE-2012-5601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5602/">CVE-2012-5602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5602">CVE-2012-5602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1572/">CVE-2013-1572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1572">CVE-2013-1572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1573/">CVE-2013-1573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1573">CVE-2013-1573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1574/">CVE-2013-1574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1574">CVE-2013-1574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1575/">CVE-2013-1575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1575">CVE-2013-1575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1576/">CVE-2013-1576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1576">CVE-2013-1576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1577/">CVE-2013-1577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1577">CVE-2013-1577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1578/">CVE-2013-1578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1578">CVE-2013-1578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1579/">CVE-2013-1579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1579">CVE-2013-1579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1580/">CVE-2013-1580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1580">CVE-2013-1580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1581/">CVE-2013-1581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1581">CVE-2013-1581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1582/">CVE-2013-1582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1582">CVE-2013-1582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1583/">CVE-2013-1583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1583">CVE-2013-1583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1584/">CVE-2013-1584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1584">CVE-2013-1584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1585/">CVE-2013-1585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1585">CVE-2013-1585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1586/">CVE-2013-1586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1586">CVE-2013-1586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1587/">CVE-2013-1587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1587">CVE-2013-1587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1588/">CVE-2013-1588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1588">CVE-2013-1588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1589/">CVE-2013-1589 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1589">CVE-2013-1589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1590/">CVE-2013-1590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1590">CVE-2013-1590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2475/">CVE-2013-2475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2475">CVE-2013-2475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2476/">CVE-2013-2476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2476">CVE-2013-2476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2477/">CVE-2013-2477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2477">CVE-2013-2477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2478/">CVE-2013-2478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2478">CVE-2013-2478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2479/">CVE-2013-2479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2479">CVE-2013-2479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2480/">CVE-2013-2480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2480">CVE-2013-2480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2481/">CVE-2013-2481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2481">CVE-2013-2481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2482/">CVE-2013-2482 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2482">CVE-2013-2482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2483/">CVE-2013-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2483">CVE-2013-2483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2484/">CVE-2013-2484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2484">CVE-2013-2484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2485/">CVE-2013-2485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2485">CVE-2013-2485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2486/">CVE-2013-2486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2486">CVE-2013-2486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2487/">CVE-2013-2487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2487">CVE-2013-2487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2488/">CVE-2013-2488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2488">CVE-2013-2488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4074/">CVE-2013-4074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4074">CVE-2013-4074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4075/">CVE-2013-4075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4075">CVE-2013-4075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4076/">CVE-2013-4076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4076">CVE-2013-4076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4077/">CVE-2013-4077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4077">CVE-2013-4077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4078/">CVE-2013-4078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4078">CVE-2013-4078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4079/">CVE-2013-4079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4079">CVE-2013-4079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4080/">CVE-2013-4080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4080">CVE-2013-4080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4081/">CVE-2013-4081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4081">CVE-2013-4081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4082/">CVE-2013-4082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4082">CVE-2013-4082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4083/">CVE-2013-4083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4083">CVE-2013-4083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4927/">CVE-2013-4927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4927">CVE-2013-4927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4929/">CVE-2013-4929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4929">CVE-2013-4929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4930/">CVE-2013-4930 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4930">CVE-2013-4930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4931/">CVE-2013-4931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4931">CVE-2013-4931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4932/">CVE-2013-4932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4932">CVE-2013-4932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4933/">CVE-2013-4933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4933">CVE-2013-4933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4934/">CVE-2013-4934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4934">CVE-2013-4934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4935/">CVE-2013-4935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4935">CVE-2013-4935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5718/">CVE-2013-5718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5718">CVE-2013-5718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5719/">CVE-2013-5719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5719">CVE-2013-5719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5720/">CVE-2013-5720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5720">CVE-2013-5720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5721/">CVE-2013-5721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5721">CVE-2013-5721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5722/">CVE-2013-5722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5722">CVE-2013-5722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6336/">CVE-2013-6336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6336">CVE-2013-6336 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6337/">CVE-2013-6337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6337">CVE-2013-6337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6338/">CVE-2013-6338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6338">CVE-2013-6338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6339/">CVE-2013-6339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6339">CVE-2013-6339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6340/">CVE-2013-6340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6340">CVE-2013-6340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7112/">CVE-2013-7112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7112">CVE-2013-7112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7113/">CVE-2013-7113 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7113">CVE-2013-7113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7114/">CVE-2013-7114 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7114">CVE-2013-7114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2281/">CVE-2014-2281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2281">CVE-2014-2281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2283/">CVE-2014-2283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2283">CVE-2014-2283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2299/">CVE-2014-2299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2299">CVE-2014-2299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5161/">CVE-2014-5161 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5161">CVE-2014-5161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5162/">CVE-2014-5162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5162">CVE-2014-5162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5163/">CVE-2014-5163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5163">CVE-2014-5163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5164/">CVE-2014-5164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5164">CVE-2014-5164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5165/">CVE-2014-5165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5165">CVE-2014-5165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6421/">CVE-2014-6421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6421">CVE-2014-6421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6422/">CVE-2014-6422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6422">CVE-2014-6422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6423/">CVE-2014-6423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6423">CVE-2014-6423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6424/">CVE-2014-6424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6424">CVE-2014-6424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6427/">CVE-2014-6427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6427">CVE-2014-6427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6428/">CVE-2014-6428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6428">CVE-2014-6428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6429/">CVE-2014-6429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6429">CVE-2014-6429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6430/">CVE-2014-6430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6430">CVE-2014-6430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6431/">CVE-2014-6431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6431">CVE-2014-6431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6432/">CVE-2014-6432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6432">CVE-2014-6432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8710/">CVE-2014-8710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8710">CVE-2014-8710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8711/">CVE-2014-8711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8711">CVE-2014-8711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8712/">CVE-2014-8712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8712">CVE-2014-8712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8713/">CVE-2014-8713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8713">CVE-2014-8713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8714/">CVE-2014-8714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8714">CVE-2014-8714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0559/">CVE-2015-0559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0559">CVE-2015-0559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0560/">CVE-2015-0560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0560">CVE-2015-0560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0561/">CVE-2015-0561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0561">CVE-2015-0561 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0562/">CVE-2015-0562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0562">CVE-2015-0562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0563/">CVE-2015-0563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0563">CVE-2015-0563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0564/">CVE-2015-0564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0564">CVE-2015-0564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2188/">CVE-2015-2188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2188">CVE-2015-2188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2189/">CVE-2015-2189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2189">CVE-2015-2189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2191/">CVE-2015-2191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2191">CVE-2015-2191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990726" comment="wireshark-1.10.13-0.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216437" version="1" class="patch">
	<metadata>
		<title>wpa_supplicant-0.7.1-6.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3686" ref_url="https://www.suse.com/security/cve/CVE-2014-3686/" source="CVE"/>
		<description>
These are all security issues fixed in the wpa_supplicant-0.7.1-6.15.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3686/">CVE-2014-3686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3686">CVE-2014-3686 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990727" comment="wpa_supplicant-0.7.1-6.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216438" version="1" class="patch">
	<metadata>
		<title>x3270-3.3.12-517.12.34 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-5662" ref_url="https://www.suse.com/security/cve/CVE-2012-5662/" source="CVE"/>
		<description>
These are all security issues fixed in the x3270-3.3.12-517.12.34 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5662/">CVE-2012-5662 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5662">CVE-2012-5662 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990060" comment="x3270-3.3.12-517.12.34 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216439" version="1" class="patch">
	<metadata>
		<title>xalan-j2-2.7.0-217.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-0107" ref_url="https://www.suse.com/security/cve/CVE-2014-0107/" source="CVE"/>
		<description>
These are all security issues fixed in the xalan-j2-2.7.0-217.26.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0107/">CVE-2014-0107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0107">CVE-2014-0107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990728" comment="xalan-j2-2.7.0-217.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216440" version="1" class="patch">
	<metadata>
		<title>xdg-utils-1.0.2-36.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-0386" ref_url="https://www.suse.com/security/cve/CVE-2008-0386/" source="CVE"/>
		<description>
These are all security issues fixed in the xdg-utils-1.0.2-36.18 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0386/">CVE-2008-0386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0386">CVE-2008-0386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988866" comment="xdg-utils-1.0.2-36.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216441" version="1" class="patch">
	<metadata>
		<title>xen-4.4.2_08-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-1320" ref_url="https://www.suse.com/security/cve/CVE-2007-1320/" source="CVE"/>
		<reference ref_id="CVE-2007-1321" ref_url="https://www.suse.com/security/cve/CVE-2007-1321/" source="CVE"/>
		<reference ref_id="CVE-2007-1322" ref_url="https://www.suse.com/security/cve/CVE-2007-1322/" source="CVE"/>
		<reference ref_id="CVE-2007-1323" ref_url="https://www.suse.com/security/cve/CVE-2007-1323/" source="CVE"/>
		<reference ref_id="CVE-2007-1366" ref_url="https://www.suse.com/security/cve/CVE-2007-1366/" source="CVE"/>
		<reference ref_id="CVE-2007-3919" ref_url="https://www.suse.com/security/cve/CVE-2007-3919/" source="CVE"/>
		<reference ref_id="CVE-2011-1898" ref_url="https://www.suse.com/security/cve/CVE-2011-1898/" source="CVE"/>
		<reference ref_id="CVE-2012-0029" ref_url="https://www.suse.com/security/cve/CVE-2012-0029/" source="CVE"/>
		<reference ref_id="CVE-2012-0217" ref_url="https://www.suse.com/security/cve/CVE-2012-0217/" source="CVE"/>
		<reference ref_id="CVE-2012-2625" ref_url="https://www.suse.com/security/cve/CVE-2012-2625/" source="CVE"/>
		<reference ref_id="CVE-2012-3432" ref_url="https://www.suse.com/security/cve/CVE-2012-3432/" source="CVE"/>
		<reference ref_id="CVE-2012-3433" ref_url="https://www.suse.com/security/cve/CVE-2012-3433/" source="CVE"/>
		<reference ref_id="CVE-2012-3494" ref_url="https://www.suse.com/security/cve/CVE-2012-3494/" source="CVE"/>
		<reference ref_id="CVE-2012-3495" ref_url="https://www.suse.com/security/cve/CVE-2012-3495/" source="CVE"/>
		<reference ref_id="CVE-2012-3496" ref_url="https://www.suse.com/security/cve/CVE-2012-3496/" source="CVE"/>
		<reference ref_id="CVE-2012-3497" ref_url="https://www.suse.com/security/cve/CVE-2012-3497/" source="CVE"/>
		<reference ref_id="CVE-2012-3498" ref_url="https://www.suse.com/security/cve/CVE-2012-3498/" source="CVE"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<reference ref_id="CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411/" source="CVE"/>
		<reference ref_id="CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535/" source="CVE"/>
		<reference ref_id="CVE-2012-4536" ref_url="https://www.suse.com/security/cve/CVE-2012-4536/" source="CVE"/>
		<reference ref_id="CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537/" source="CVE"/>
		<reference ref_id="CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538/" source="CVE"/>
		<reference ref_id="CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544/" source="CVE"/>
		<reference ref_id="CVE-2012-5510" ref_url="https://www.suse.com/security/cve/CVE-2012-5510/" source="CVE"/>
		<reference ref_id="CVE-2012-5511" ref_url="https://www.suse.com/security/cve/CVE-2012-5511/" source="CVE"/>
		<reference ref_id="CVE-2012-5513" ref_url="https://www.suse.com/security/cve/CVE-2012-5513/" source="CVE"/>
		<reference ref_id="CVE-2012-5514" ref_url="https://www.suse.com/security/cve/CVE-2012-5514/" source="CVE"/>
		<reference ref_id="CVE-2012-5515" ref_url="https://www.suse.com/security/cve/CVE-2012-5515/" source="CVE"/>
		<reference ref_id="CVE-2012-5525" ref_url="https://www.suse.com/security/cve/CVE-2012-5525/" source="CVE"/>
		<reference ref_id="CVE-2012-5634" ref_url="https://www.suse.com/security/cve/CVE-2012-5634/" source="CVE"/>
		<reference ref_id="CVE-2012-6075" ref_url="https://www.suse.com/security/cve/CVE-2012-6075/" source="CVE"/>
		<reference ref_id="CVE-2013-0151" ref_url="https://www.suse.com/security/cve/CVE-2013-0151/" source="CVE"/>
		<reference ref_id="CVE-2013-0152" ref_url="https://www.suse.com/security/cve/CVE-2013-0152/" source="CVE"/>
		<reference ref_id="CVE-2013-0153" ref_url="https://www.suse.com/security/cve/CVE-2013-0153/" source="CVE"/>
		<reference ref_id="CVE-2013-1432" ref_url="https://www.suse.com/security/cve/CVE-2013-1432/" source="CVE"/>
		<reference ref_id="CVE-2013-1442" ref_url="https://www.suse.com/security/cve/CVE-2013-1442/" source="CVE"/>
		<reference ref_id="CVE-2013-1917" ref_url="https://www.suse.com/security/cve/CVE-2013-1917/" source="CVE"/>
		<reference ref_id="CVE-2013-1918" ref_url="https://www.suse.com/security/cve/CVE-2013-1918/" source="CVE"/>
		<reference ref_id="CVE-2013-1919" ref_url="https://www.suse.com/security/cve/CVE-2013-1919/" source="CVE"/>
		<reference ref_id="CVE-2013-1920" ref_url="https://www.suse.com/security/cve/CVE-2013-1920/" source="CVE"/>
		<reference ref_id="CVE-2013-1922" ref_url="https://www.suse.com/security/cve/CVE-2013-1922/" source="CVE"/>
		<reference ref_id="CVE-2013-1952" ref_url="https://www.suse.com/security/cve/CVE-2013-1952/" source="CVE"/>
		<reference ref_id="CVE-2013-2007" ref_url="https://www.suse.com/security/cve/CVE-2013-2007/" source="CVE"/>
		<reference ref_id="CVE-2013-2072" ref_url="https://www.suse.com/security/cve/CVE-2013-2072/" source="CVE"/>
		<reference ref_id="CVE-2013-2076" ref_url="https://www.suse.com/security/cve/CVE-2013-2076/" source="CVE"/>
		<reference ref_id="CVE-2013-2077" ref_url="https://www.suse.com/security/cve/CVE-2013-2077/" source="CVE"/>
		<reference ref_id="CVE-2013-2078" ref_url="https://www.suse.com/security/cve/CVE-2013-2078/" source="CVE"/>
		<reference ref_id="CVE-2013-2212" ref_url="https://www.suse.com/security/cve/CVE-2013-2212/" source="CVE"/>
		<reference ref_id="CVE-2013-4344" ref_url="https://www.suse.com/security/cve/CVE-2013-4344/" source="CVE"/>
		<reference ref_id="CVE-2013-4355" ref_url="https://www.suse.com/security/cve/CVE-2013-4355/" source="CVE"/>
		<reference ref_id="CVE-2013-4361" ref_url="https://www.suse.com/security/cve/CVE-2013-4361/" source="CVE"/>
		<reference ref_id="CVE-2013-4368" ref_url="https://www.suse.com/security/cve/CVE-2013-4368/" source="CVE"/>
		<reference ref_id="CVE-2013-4369" ref_url="https://www.suse.com/security/cve/CVE-2013-4369/" source="CVE"/>
		<reference ref_id="CVE-2013-4370" ref_url="https://www.suse.com/security/cve/CVE-2013-4370/" source="CVE"/>
		<reference ref_id="CVE-2013-4371" ref_url="https://www.suse.com/security/cve/CVE-2013-4371/" source="CVE"/>
		<reference ref_id="CVE-2013-4375" ref_url="https://www.suse.com/security/cve/CVE-2013-4375/" source="CVE"/>
		<reference ref_id="CVE-2013-4416" ref_url="https://www.suse.com/security/cve/CVE-2013-4416/" source="CVE"/>
		<reference ref_id="CVE-2013-4494" ref_url="https://www.suse.com/security/cve/CVE-2013-4494/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-4551" ref_url="https://www.suse.com/security/cve/CVE-2013-4551/" source="CVE"/>
		<reference ref_id="CVE-2013-4553" ref_url="https://www.suse.com/security/cve/CVE-2013-4553/" source="CVE"/>
		<reference ref_id="CVE-2013-4554" ref_url="https://www.suse.com/security/cve/CVE-2013-4554/" source="CVE"/>
		<reference ref_id="CVE-2013-6400" ref_url="https://www.suse.com/security/cve/CVE-2013-6400/" source="CVE"/>
		<reference ref_id="CVE-2013-6885" ref_url="https://www.suse.com/security/cve/CVE-2013-6885/" source="CVE"/>
		<reference ref_id="CVE-2014-1666" ref_url="https://www.suse.com/security/cve/CVE-2014-1666/" source="CVE"/>
		<reference ref_id="CVE-2014-2599" ref_url="https://www.suse.com/security/cve/CVE-2014-2599/" source="CVE"/>
		<reference ref_id="CVE-2014-3615" ref_url="https://www.suse.com/security/cve/CVE-2014-3615/" source="CVE"/>
		<reference ref_id="CVE-2014-3967" ref_url="https://www.suse.com/security/cve/CVE-2014-3967/" source="CVE"/>
		<reference ref_id="CVE-2014-3968" ref_url="https://www.suse.com/security/cve/CVE-2014-3968/" source="CVE"/>
		<reference ref_id="CVE-2014-4021" ref_url="https://www.suse.com/security/cve/CVE-2014-4021/" source="CVE"/>
		<reference ref_id="CVE-2014-7154" ref_url="https://www.suse.com/security/cve/CVE-2014-7154/" source="CVE"/>
		<reference ref_id="CVE-2014-7155" ref_url="https://www.suse.com/security/cve/CVE-2014-7155/" source="CVE"/>
		<reference ref_id="CVE-2014-7156" ref_url="https://www.suse.com/security/cve/CVE-2014-7156/" source="CVE"/>
		<reference ref_id="CVE-2014-7188" ref_url="https://www.suse.com/security/cve/CVE-2014-7188/" source="CVE"/>
		<reference ref_id="CVE-2014-8594" ref_url="https://www.suse.com/security/cve/CVE-2014-8594/" source="CVE"/>
		<reference ref_id="CVE-2014-8595" ref_url="https://www.suse.com/security/cve/CVE-2014-8595/" source="CVE"/>
		<reference ref_id="CVE-2014-8866" ref_url="https://www.suse.com/security/cve/CVE-2014-8866/" source="CVE"/>
		<reference ref_id="CVE-2014-8867" ref_url="https://www.suse.com/security/cve/CVE-2014-8867/" source="CVE"/>
		<reference ref_id="CVE-2014-9030" ref_url="https://www.suse.com/security/cve/CVE-2014-9030/" source="CVE"/>
		<reference ref_id="CVE-2014-9065" ref_url="https://www.suse.com/security/cve/CVE-2014-9065/" source="CVE"/>
		<reference ref_id="CVE-2014-9066" ref_url="https://www.suse.com/security/cve/CVE-2014-9066/" source="CVE"/>
		<reference ref_id="CVE-2015-0361" ref_url="https://www.suse.com/security/cve/CVE-2015-0361/" source="CVE"/>
		<reference ref_id="CVE-2015-2044" ref_url="https://www.suse.com/security/cve/CVE-2015-2044/" source="CVE"/>
		<reference ref_id="CVE-2015-2045" ref_url="https://www.suse.com/security/cve/CVE-2015-2045/" source="CVE"/>
		<reference ref_id="CVE-2015-2751" ref_url="https://www.suse.com/security/cve/CVE-2015-2751/" source="CVE"/>
		<reference ref_id="CVE-2015-2752" ref_url="https://www.suse.com/security/cve/CVE-2015-2752/" source="CVE"/>
		<reference ref_id="CVE-2015-2756" ref_url="https://www.suse.com/security/cve/CVE-2015-2756/" source="CVE"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-3340" ref_url="https://www.suse.com/security/cve/CVE-2015-3340/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4103" ref_url="https://www.suse.com/security/cve/CVE-2015-4103/" source="CVE"/>
		<reference ref_id="CVE-2015-4104" ref_url="https://www.suse.com/security/cve/CVE-2015-4104/" source="CVE"/>
		<reference ref_id="CVE-2015-4105" ref_url="https://www.suse.com/security/cve/CVE-2015-4105/" source="CVE"/>
		<reference ref_id="CVE-2015-4106" ref_url="https://www.suse.com/security/cve/CVE-2015-4106/" source="CVE"/>
		<reference ref_id="CVE-2015-4163" ref_url="https://www.suse.com/security/cve/CVE-2015-4163/" source="CVE"/>
		<reference ref_id="CVE-2015-4164" ref_url="https://www.suse.com/security/cve/CVE-2015-4164/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.4.2_08-1.7 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1320/">CVE-2007-1320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1320">CVE-2007-1320 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1321/">CVE-2007-1321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1321">CVE-2007-1321 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1322/">CVE-2007-1322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1322">CVE-2007-1322 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1323/">CVE-2007-1323 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1323">CVE-2007-1323 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1366/">CVE-2007-1366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1366">CVE-2007-1366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3919/">CVE-2007-3919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3919">CVE-2007-3919 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1898/">CVE-2011-1898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1898">CVE-2011-1898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0029/">CVE-2012-0029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0029">CVE-2012-0029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0217/">CVE-2012-0217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0217">CVE-2012-0217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2625/">CVE-2012-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2625">CVE-2012-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3432/">CVE-2012-3432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3432">CVE-2012-3432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3433/">CVE-2012-3433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3433">CVE-2012-3433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3494/">CVE-2012-3494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3494">CVE-2012-3494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3495/">CVE-2012-3495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3495">CVE-2012-3495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3496/">CVE-2012-3496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3496">CVE-2012-3496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3497/">CVE-2012-3497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3497">CVE-2012-3497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3498/">CVE-2012-3498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3498">CVE-2012-3498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3515">CVE-2012-3515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4411">CVE-2012-4411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4535">CVE-2012-4535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4536/">CVE-2012-4536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4536">CVE-2012-4536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4537">CVE-2012-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4538">CVE-2012-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4539">CVE-2012-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4544">CVE-2012-4544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5510/">CVE-2012-5510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5510">CVE-2012-5510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5511/">CVE-2012-5511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5511">CVE-2012-5511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5513/">CVE-2012-5513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5513">CVE-2012-5513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5514/">CVE-2012-5514 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5514">CVE-2012-5514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5515/">CVE-2012-5515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5515">CVE-2012-5515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5525/">CVE-2012-5525 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5525">CVE-2012-5525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5634/">CVE-2012-5634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5634">CVE-2012-5634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6075/">CVE-2012-6075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6075">CVE-2012-6075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0151/">CVE-2013-0151 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0151">CVE-2013-0151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0152/">CVE-2013-0152 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0152">CVE-2013-0152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0153/">CVE-2013-0153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0153">CVE-2013-0153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1432/">CVE-2013-1432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1432">CVE-2013-1432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1442/">CVE-2013-1442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1442">CVE-2013-1442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1917/">CVE-2013-1917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1917">CVE-2013-1917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1918/">CVE-2013-1918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1918">CVE-2013-1918 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1919/">CVE-2013-1919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1919">CVE-2013-1919 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1920/">CVE-2013-1920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1920">CVE-2013-1920 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1922/">CVE-2013-1922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1922">CVE-2013-1922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1952/">CVE-2013-1952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1952">CVE-2013-1952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2007/">CVE-2013-2007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2007">CVE-2013-2007 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2072/">CVE-2013-2072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2072">CVE-2013-2072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2076/">CVE-2013-2076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2076">CVE-2013-2076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2077/">CVE-2013-2077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2077">CVE-2013-2077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2078/">CVE-2013-2078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2078">CVE-2013-2078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2212/">CVE-2013-2212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2212">CVE-2013-2212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4344/">CVE-2013-4344 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4344">CVE-2013-4344 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4355/">CVE-2013-4355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4355">CVE-2013-4355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4361/">CVE-2013-4361 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4361">CVE-2013-4361 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4368/">CVE-2013-4368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4368">CVE-2013-4368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4369/">CVE-2013-4369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4369">CVE-2013-4369 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4370/">CVE-2013-4370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4370">CVE-2013-4370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4371/">CVE-2013-4371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4371">CVE-2013-4371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4375/">CVE-2013-4375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4375">CVE-2013-4375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4416/">CVE-2013-4416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4416">CVE-2013-4416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4494/">CVE-2013-4494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4494">CVE-2013-4494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4540">CVE-2013-4540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4551/">CVE-2013-4551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4551">CVE-2013-4551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4553/">CVE-2013-4553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4553">CVE-2013-4553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4554/">CVE-2013-4554 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4554">CVE-2013-4554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6400/">CVE-2013-6400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6400">CVE-2013-6400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6885/">CVE-2013-6885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6885">CVE-2013-6885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1666/">CVE-2014-1666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1666">CVE-2014-1666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2599/">CVE-2014-2599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2599">CVE-2014-2599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3615/">CVE-2014-3615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3615">CVE-2014-3615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3967/">CVE-2014-3967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3967">CVE-2014-3967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3968/">CVE-2014-3968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3968">CVE-2014-3968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4021/">CVE-2014-4021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4021">CVE-2014-4021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7154/">CVE-2014-7154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7154">CVE-2014-7154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7155/">CVE-2014-7155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7155">CVE-2014-7155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7156/">CVE-2014-7156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7156">CVE-2014-7156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7188/">CVE-2014-7188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7188">CVE-2014-7188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8594/">CVE-2014-8594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8594">CVE-2014-8594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8595/">CVE-2014-8595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8595">CVE-2014-8595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8866/">CVE-2014-8866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8866">CVE-2014-8866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8867/">CVE-2014-8867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8867">CVE-2014-8867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9030/">CVE-2014-9030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9030">CVE-2014-9030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9065/">CVE-2014-9065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9065">CVE-2014-9065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9066/">CVE-2014-9066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9066">CVE-2014-9066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0361/">CVE-2015-0361 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0361">CVE-2015-0361 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2044/">CVE-2015-2044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2044">CVE-2015-2044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2045/">CVE-2015-2045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2045">CVE-2015-2045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2751/">CVE-2015-2751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2751">CVE-2015-2751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2752/">CVE-2015-2752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2752">CVE-2015-2752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2756/">CVE-2015-2756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2756">CVE-2015-2756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3209">CVE-2015-3209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3340/">CVE-2015-3340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3340">CVE-2015-3340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3456">CVE-2015-3456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4103/">CVE-2015-4103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4103">CVE-2015-4103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4104/">CVE-2015-4104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4104">CVE-2015-4104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4105/">CVE-2015-4105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4105">CVE-2015-4105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4106/">CVE-2015-4106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4106">CVE-2015-4106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4163/">CVE-2015-4163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4163">CVE-2015-4163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4164/">CVE-2015-4164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4164">CVE-2015-4164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990729" comment="xen-4.4.2_08-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990730" comment="xen-doc-html-4.4.2_08-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990731" comment="xen-kmp-default-4.4.2_08_3.0.101_63-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990732" comment="xen-kmp-pae-4.4.2_08_3.0.101_63-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990733" comment="xen-libs-4.4.2_08-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990734" comment="xen-libs-32bit-4.4.2_08-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990735" comment="xen-tools-4.4.2_08-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990736" comment="xen-tools-domU-4.4.2_08-1.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216442" version="1" class="patch">
	<metadata>
		<title>xinetd-2.3.14-130.133.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-0862" ref_url="https://www.suse.com/security/cve/CVE-2012-0862/" source="CVE"/>
		<reference ref_id="CVE-2013-4342" ref_url="https://www.suse.com/security/cve/CVE-2013-4342/" source="CVE"/>
		<description>
These are all security issues fixed in the xinetd-2.3.14-130.133.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0862/">CVE-2012-0862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0862">CVE-2012-0862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4342/">CVE-2013-4342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4342">CVE-2013-4342 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990737" comment="xinetd-2.3.14-130.133.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216443" version="1" class="patch">
	<metadata>
		<title>xorg-x11-7.4-9.65.46 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-4568" ref_url="https://www.suse.com/security/cve/CVE-2007-4568/" source="CVE"/>
		<reference ref_id="CVE-2011-0465" ref_url="https://www.suse.com/security/cve/CVE-2011-0465/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-7.4-9.65.46 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4568/">CVE-2007-4568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4568">CVE-2007-4568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0465/">CVE-2011-0465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0465">CVE-2011-0465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990738" comment="xorg-x11-7.4-9.65.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990739" comment="xorg-x11-xauth-7.4-9.65.46 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216444" version="1" class="patch">
	<metadata>
		<title>xorg-x11-Xvnc-7.4-27.105.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-6101" ref_url="https://www.suse.com/security/cve/CVE-2006-6101/" source="CVE"/>
		<reference ref_id="CVE-2006-6102" ref_url="https://www.suse.com/security/cve/CVE-2006-6102/" source="CVE"/>
		<reference ref_id="CVE-2006-6103" ref_url="https://www.suse.com/security/cve/CVE-2006-6103/" source="CVE"/>
		<reference ref_id="CVE-2007-1003" ref_url="https://www.suse.com/security/cve/CVE-2007-1003/" source="CVE"/>
		<reference ref_id="CVE-2007-5760" ref_url="https://www.suse.com/security/cve/CVE-2007-5760/" source="CVE"/>
		<reference ref_id="CVE-2007-6427" ref_url="https://www.suse.com/security/cve/CVE-2007-6427/" source="CVE"/>
		<reference ref_id="CVE-2007-6428" ref_url="https://www.suse.com/security/cve/CVE-2007-6428/" source="CVE"/>
		<reference ref_id="CVE-2007-6429" ref_url="https://www.suse.com/security/cve/CVE-2007-6429/" source="CVE"/>
		<reference ref_id="CVE-2008-0006" ref_url="https://www.suse.com/security/cve/CVE-2008-0006/" source="CVE"/>
		<reference ref_id="CVE-2008-1377" ref_url="https://www.suse.com/security/cve/CVE-2008-1377/" source="CVE"/>
		<reference ref_id="CVE-2008-1379" ref_url="https://www.suse.com/security/cve/CVE-2008-1379/" source="CVE"/>
		<reference ref_id="CVE-2008-2360" ref_url="https://www.suse.com/security/cve/CVE-2008-2360/" source="CVE"/>
		<reference ref_id="CVE-2008-2361" ref_url="https://www.suse.com/security/cve/CVE-2008-2361/" source="CVE"/>
		<reference ref_id="CVE-2008-2362" ref_url="https://www.suse.com/security/cve/CVE-2008-2362/" source="CVE"/>
		<reference ref_id="CVE-2010-2240" ref_url="https://www.suse.com/security/cve/CVE-2010-2240/" source="CVE"/>
		<reference ref_id="CVE-2010-4818" ref_url="https://www.suse.com/security/cve/CVE-2010-4818/" source="CVE"/>
		<reference ref_id="CVE-2010-4819" ref_url="https://www.suse.com/security/cve/CVE-2010-4819/" source="CVE"/>
		<reference ref_id="CVE-2011-4028" ref_url="https://www.suse.com/security/cve/CVE-2011-4028/" source="CVE"/>
		<reference ref_id="CVE-2011-4029" ref_url="https://www.suse.com/security/cve/CVE-2011-4029/" source="CVE"/>
		<reference ref_id="CVE-2013-1940" ref_url="https://www.suse.com/security/cve/CVE-2013-1940/" source="CVE"/>
		<reference ref_id="CVE-2013-4396" ref_url="https://www.suse.com/security/cve/CVE-2013-4396/" source="CVE"/>
		<reference ref_id="CVE-2013-6424" ref_url="https://www.suse.com/security/cve/CVE-2013-6424/" source="CVE"/>
		<reference ref_id="CVE-2014-8091" ref_url="https://www.suse.com/security/cve/CVE-2014-8091/" source="CVE"/>
		<reference ref_id="CVE-2014-8092" ref_url="https://www.suse.com/security/cve/CVE-2014-8092/" source="CVE"/>
		<reference ref_id="CVE-2014-8093" ref_url="https://www.suse.com/security/cve/CVE-2014-8093/" source="CVE"/>
		<reference ref_id="CVE-2014-8094" ref_url="https://www.suse.com/security/cve/CVE-2014-8094/" source="CVE"/>
		<reference ref_id="CVE-2014-8095" ref_url="https://www.suse.com/security/cve/CVE-2014-8095/" source="CVE"/>
		<reference ref_id="CVE-2014-8096" ref_url="https://www.suse.com/security/cve/CVE-2014-8096/" source="CVE"/>
		<reference ref_id="CVE-2014-8097" ref_url="https://www.suse.com/security/cve/CVE-2014-8097/" source="CVE"/>
		<reference ref_id="CVE-2014-8098" ref_url="https://www.suse.com/security/cve/CVE-2014-8098/" source="CVE"/>
		<reference ref_id="CVE-2014-8099" ref_url="https://www.suse.com/security/cve/CVE-2014-8099/" source="CVE"/>
		<reference ref_id="CVE-2014-8100" ref_url="https://www.suse.com/security/cve/CVE-2014-8100/" source="CVE"/>
		<reference ref_id="CVE-2014-8101" ref_url="https://www.suse.com/security/cve/CVE-2014-8101/" source="CVE"/>
		<reference ref_id="CVE-2014-8102" ref_url="https://www.suse.com/security/cve/CVE-2014-8102/" source="CVE"/>
		<reference ref_id="CVE-2015-0255" ref_url="https://www.suse.com/security/cve/CVE-2015-0255/" source="CVE"/>
		<reference ref_id="CVE-2015-3418" ref_url="https://www.suse.com/security/cve/CVE-2015-3418/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-Xvnc-7.4-27.105.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6101/">CVE-2006-6101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6101">CVE-2006-6101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6102/">CVE-2006-6102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6102">CVE-2006-6102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6103/">CVE-2006-6103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6103">CVE-2006-6103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1003/">CVE-2007-1003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1003">CVE-2007-1003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5760/">CVE-2007-5760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5760">CVE-2007-5760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6427/">CVE-2007-6427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6427">CVE-2007-6427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6428/">CVE-2007-6428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6428">CVE-2007-6428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6429/">CVE-2007-6429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6429">CVE-2007-6429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0006/">CVE-2008-0006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0006">CVE-2008-0006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1377/">CVE-2008-1377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1377">CVE-2008-1377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1379/">CVE-2008-1379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1379">CVE-2008-1379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2360/">CVE-2008-2360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2360">CVE-2008-2360 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2361/">CVE-2008-2361 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2361">CVE-2008-2361 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2362/">CVE-2008-2362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2362">CVE-2008-2362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2240/">CVE-2010-2240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2240">CVE-2010-2240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4818/">CVE-2010-4818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4818">CVE-2010-4818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4819/">CVE-2010-4819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4819">CVE-2010-4819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4028/">CVE-2011-4028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4028">CVE-2011-4028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4029/">CVE-2011-4029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4029">CVE-2011-4029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1940/">CVE-2013-1940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1940">CVE-2013-1940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4396/">CVE-2013-4396 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4396">CVE-2013-4396 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6424/">CVE-2013-6424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6424">CVE-2013-6424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8091/">CVE-2014-8091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8091">CVE-2014-8091 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2014-8092/">CVE-2014-8092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8092">CVE-2014-8092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8093/">CVE-2014-8093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8093">CVE-2014-8093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8094/">CVE-2014-8094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8094">CVE-2014-8094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8095/">CVE-2014-8095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8095">CVE-2014-8095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8096/">CVE-2014-8096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8096">CVE-2014-8096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8097/">CVE-2014-8097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8097">CVE-2014-8097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8098/">CVE-2014-8098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8098">CVE-2014-8098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8099/">CVE-2014-8099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8099">CVE-2014-8099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8100/">CVE-2014-8100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8100">CVE-2014-8100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8101/">CVE-2014-8101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8101">CVE-2014-8101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8102/">CVE-2014-8102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8102">CVE-2014-8102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0255/">CVE-2015-0255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0255">CVE-2015-0255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3418/">CVE-2015-3418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3418">CVE-2015-3418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990740" comment="xorg-x11-Xvnc-7.4-27.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990741" comment="xorg-x11-server-7.4-27.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990742" comment="xorg-x11-server-extra-7.4-27.105.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216445" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libX11-32bit-7.4-5.11.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1981" ref_url="https://www.suse.com/security/cve/CVE-2013-1981/" source="CVE"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<reference ref_id="CVE-2013-2004" ref_url="https://www.suse.com/security/cve/CVE-2013-2004/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libX11-32bit-7.4-5.11.11.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1981/">CVE-2013-1981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1981">CVE-2013-1981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1997">CVE-2013-1997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2004/">CVE-2013-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2004">CVE-2013-2004 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990743" comment="xorg-x11-libX11-7.4-5.11.11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990744" comment="xorg-x11-libX11-32bit-7.4-5.11.11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990745" comment="xorg-x11-libX11-x86-7.4-5.11.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216446" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libXext-32bit-7.4-1.18.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libXext-32bit-7.4-1.18.16 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1982">CVE-2013-1982 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990746" comment="xorg-x11-libXext-7.4-1.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990747" comment="xorg-x11-libXext-32bit-7.4-1.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990748" comment="xorg-x11-libXext-x86-7.4-1.18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216447" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libXfixes-32bit-7.4-1.16.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libXfixes-32bit-7.4-1.16.2 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1983">CVE-2013-1983 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990749" comment="xorg-x11-libXfixes-7.4-1.16.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990750" comment="xorg-x11-libXfixes-32bit-7.4-1.16.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990751" comment="xorg-x11-libXfixes-x86-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216448" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libXp-32bit-7.4-1.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-2062" ref_url="https://www.suse.com/security/cve/CVE-2013-2062/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libXp-32bit-7.4-1.18.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2062/">CVE-2013-2062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2062">CVE-2013-2062 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990752" comment="xorg-x11-libXp-7.4-1.18.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990753" comment="xorg-x11-libXp-32bit-7.4-1.18.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990754" comment="xorg-x11-libXp-x86-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216449" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libXrender-32bit-7.4-1.16.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libXrender-32bit-7.4-1.16.2 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1987">CVE-2013-1987 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990755" comment="xorg-x11-libXrender-7.4-1.16.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990756" comment="xorg-x11-libXrender-32bit-7.4-1.16.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990757" comment="xorg-x11-libXrender-x86-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216450" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libXt-32bit-7.4-1.19.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002/" source="CVE"/>
		<reference ref_id="CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libXt-32bit-7.4-1.19.2 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2002">CVE-2013-2002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2005">CVE-2013-2005 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990758" comment="xorg-x11-libXt-7.4-1.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990759" comment="xorg-x11-libXt-32bit-7.4-1.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990760" comment="xorg-x11-libXt-x86-7.4-1.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216451" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libXv-32bit-7.4-1.16.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989/" source="CVE"/>
		<reference ref_id="CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libXv-32bit-7.4-1.16.2 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1989">CVE-2013-1989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2066">CVE-2013-2066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990761" comment="xorg-x11-libXv-7.4-1.16.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990762" comment="xorg-x11-libXv-32bit-7.4-1.16.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990763" comment="xorg-x11-libXv-x86-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216452" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libs-32bit-7.4-8.26.44.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<reference ref_id="CVE-2013-1984" ref_url="https://www.suse.com/security/cve/CVE-2013-1984/" source="CVE"/>
		<reference ref_id="CVE-2013-1985" ref_url="https://www.suse.com/security/cve/CVE-2013-1985/" source="CVE"/>
		<reference ref_id="CVE-2013-1986" ref_url="https://www.suse.com/security/cve/CVE-2013-1986/" source="CVE"/>
		<reference ref_id="CVE-2013-1988" ref_url="https://www.suse.com/security/cve/CVE-2013-1988/" source="CVE"/>
		<reference ref_id="CVE-2013-1990" ref_url="https://www.suse.com/security/cve/CVE-2013-1990/" source="CVE"/>
		<reference ref_id="CVE-2013-1991" ref_url="https://www.suse.com/security/cve/CVE-2013-1991/" source="CVE"/>
		<reference ref_id="CVE-2013-1992" ref_url="https://www.suse.com/security/cve/CVE-2013-1992/" source="CVE"/>
		<reference ref_id="CVE-2013-1995" ref_url="https://www.suse.com/security/cve/CVE-2013-1995/" source="CVE"/>
		<reference ref_id="CVE-2013-1996" ref_url="https://www.suse.com/security/cve/CVE-2013-1996/" source="CVE"/>
		<reference ref_id="CVE-2013-1998" ref_url="https://www.suse.com/security/cve/CVE-2013-1998/" source="CVE"/>
		<reference ref_id="CVE-2013-1999" ref_url="https://www.suse.com/security/cve/CVE-2013-1999/" source="CVE"/>
		<reference ref_id="CVE-2013-2000" ref_url="https://www.suse.com/security/cve/CVE-2013-2000/" source="CVE"/>
		<reference ref_id="CVE-2013-2001" ref_url="https://www.suse.com/security/cve/CVE-2013-2001/" source="CVE"/>
		<reference ref_id="CVE-2013-2003" ref_url="https://www.suse.com/security/cve/CVE-2013-2003/" source="CVE"/>
		<reference ref_id="CVE-2013-2063" ref_url="https://www.suse.com/security/cve/CVE-2013-2063/" source="CVE"/>
		<reference ref_id="CVE-2013-6462" ref_url="https://www.suse.com/security/cve/CVE-2013-6462/" source="CVE"/>
		<reference ref_id="CVE-2014-0209" ref_url="https://www.suse.com/security/cve/CVE-2014-0209/" source="CVE"/>
		<reference ref_id="CVE-2014-0210" ref_url="https://www.suse.com/security/cve/CVE-2014-0210/" source="CVE"/>
		<reference ref_id="CVE-2014-0211" ref_url="https://www.suse.com/security/cve/CVE-2014-0211/" source="CVE"/>
		<reference ref_id="CVE-2015-1802" ref_url="https://www.suse.com/security/cve/CVE-2015-1802/" source="CVE"/>
		<reference ref_id="CVE-2015-1803" ref_url="https://www.suse.com/security/cve/CVE-2015-1803/" source="CVE"/>
		<reference ref_id="CVE-2015-1804" ref_url="https://www.suse.com/security/cve/CVE-2015-1804/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libs-32bit-7.4-8.26.44.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2895">CVE-2011-2895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1984/">CVE-2013-1984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1984">CVE-2013-1984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1985/">CVE-2013-1985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1985">CVE-2013-1985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1986/">CVE-2013-1986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1986">CVE-2013-1986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1988/">CVE-2013-1988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1988">CVE-2013-1988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1990/">CVE-2013-1990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1990">CVE-2013-1990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1991/">CVE-2013-1991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1991">CVE-2013-1991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1992/">CVE-2013-1992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1992">CVE-2013-1992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1995/">CVE-2013-1995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1995">CVE-2013-1995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1996/">CVE-2013-1996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1996">CVE-2013-1996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1998/">CVE-2013-1998 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1998">CVE-2013-1998 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1999/">CVE-2013-1999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1999">CVE-2013-1999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2000/">CVE-2013-2000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2000">CVE-2013-2000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2001/">CVE-2013-2001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2001">CVE-2013-2001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2003/">CVE-2013-2003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2003">CVE-2013-2003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2063/">CVE-2013-2063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2063">CVE-2013-2063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6462/">CVE-2013-6462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6462">CVE-2013-6462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0209/">CVE-2014-0209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0209">CVE-2014-0209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0210/">CVE-2014-0210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0210">CVE-2014-0210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0211/">CVE-2014-0211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0211">CVE-2014-0211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1802/">CVE-2015-1802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1802">CVE-2015-1802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1803/">CVE-2015-1803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1803">CVE-2015-1803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1804/">CVE-2015-1804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1804">CVE-2015-1804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990764" comment="xorg-x11-libs-7.4-8.26.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990765" comment="xorg-x11-libs-32bit-7.4-8.26.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990766" comment="xorg-x11-libs-x86-7.4-8.26.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216453" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libxcb-32bit-7.4-1.29.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-2064" ref_url="https://www.suse.com/security/cve/CVE-2013-2064/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libxcb-32bit-7.4-1.29.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2064/">CVE-2013-2064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2064">CVE-2013-2064 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990075" comment="xorg-x11-libxcb-7.4-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990076" comment="xorg-x11-libxcb-32bit-7.4-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990077" comment="xorg-x11-libxcb-x86-7.4-1.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216454" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-dmx-7.3.99-17.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2240" ref_url="https://www.suse.com/security/cve/CVE-2010-2240/" source="CVE"/>
		<reference ref_id="CVE-2011-4028" ref_url="https://www.suse.com/security/cve/CVE-2011-4028/" source="CVE"/>
		<reference ref_id="CVE-2011-4029" ref_url="https://www.suse.com/security/cve/CVE-2011-4029/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-dmx-7.3.99-17.11.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2240/">CVE-2010-2240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2240">CVE-2010-2240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4028/">CVE-2011-4028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4028">CVE-2011-4028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4029/">CVE-2011-4029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4029">CVE-2011-4029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990078" comment="xorg-x11-server-dmx-7.3.99-17.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990767" comment="xorg-x11-server-rdp-7.3.99-3.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216455" version="1" class="patch">
	<metadata>
		<title>xterm-238-1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-2383" ref_url="https://www.suse.com/security/cve/CVE-2008-2383/" source="CVE"/>
		<description>
These are all security issues fixed in the xterm-238-1.16 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2383/">CVE-2008-2383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2383">CVE-2008-2383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988881" comment="xterm-238-1.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216456" version="1" class="patch">
	<metadata>
		<title>yast2-2.17.140-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-2.17.140-1.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3177">CVE-2011-3177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990768" comment="yast2-2.17.140-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216457" version="1" class="patch">
	<metadata>
		<title>yast2-core-2.17.46-0.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-core-2.17.46-0.5.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4311">CVE-2008-4311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2483">CVE-2011-2483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3177">CVE-2011-3177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990769" comment="yast2-core-2.17.46-0.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216458" version="1" class="patch">
	<metadata>
		<title>zoo-2.10-911.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-0855" ref_url="https://www.suse.com/security/cve/CVE-2006-0855/" source="CVE"/>
		<reference ref_id="CVE-2007-1669" ref_url="https://www.suse.com/security/cve/CVE-2007-1669/" source="CVE"/>
		<description>
These are all security issues fixed in the zoo-2.10-911.22 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0855/">CVE-2006-0855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0855">CVE-2006-0855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1669/">CVE-2007-1669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1669">CVE-2007-1669 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988882" comment="zoo-2.10-911.22 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216459" version="1" class="patch">
	<metadata>
		<title>curl-openssl1-7.19.7-1.51.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="CVE-2009-0037" ref_url="https://www.suse.com/security/cve/CVE-2009-0037/" source="CVE"/>
		<reference ref_id="CVE-2009-2417" ref_url="https://www.suse.com/security/cve/CVE-2009-2417/" source="CVE"/>
		<reference ref_id="CVE-2010-4180" ref_url="https://www.suse.com/security/cve/CVE-2010-4180/" source="CVE"/>
		<reference ref_id="CVE-2011-2192" ref_url="https://www.suse.com/security/cve/CVE-2011-2192/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2013-1944" ref_url="https://www.suse.com/security/cve/CVE-2013-1944/" source="CVE"/>
		<reference ref_id="CVE-2013-2174" ref_url="https://www.suse.com/security/cve/CVE-2013-2174/" source="CVE"/>
		<reference ref_id="CVE-2013-4545" ref_url="https://www.suse.com/security/cve/CVE-2013-4545/" source="CVE"/>
		<reference ref_id="CVE-2014-0015" ref_url="https://www.suse.com/security/cve/CVE-2014-0015/" source="CVE"/>
		<reference ref_id="CVE-2014-0138" ref_url="https://www.suse.com/security/cve/CVE-2014-0138/" source="CVE"/>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<reference ref_id="CVE-2014-3613" ref_url="https://www.suse.com/security/cve/CVE-2014-3613/" source="CVE"/>
		<reference ref_id="CVE-2014-3707" ref_url="https://www.suse.com/security/cve/CVE-2014-3707/" source="CVE"/>
		<reference ref_id="CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150/" source="CVE"/>
		<reference ref_id="CVE-2015-3143" ref_url="https://www.suse.com/security/cve/CVE-2015-3143/" source="CVE"/>
		<reference ref_id="CVE-2015-3148" ref_url="https://www.suse.com/security/cve/CVE-2015-3148/" source="CVE"/>
		<reference ref_id="CVE-2015-3153" ref_url="https://www.suse.com/security/cve/CVE-2015-3153/" source="CVE"/>
		<reference ref_id="CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-openssl1-7.19.7-1.51.1 package on the GA media of SUSE Linux Enterprise Server 11-SECURITY.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0037/">CVE-2009-0037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0037">CVE-2009-0037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2417/">CVE-2009-2417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2417">CVE-2009-2417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4180/">CVE-2010-4180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4180">CVE-2010-4180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2192/">CVE-2011-2192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2192">CVE-2011-2192 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1944/">CVE-2013-1944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1944">CVE-2013-1944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2174/">CVE-2013-2174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2174">CVE-2013-2174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4545/">CVE-2013-4545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4545">CVE-2013-4545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0015/">CVE-2014-0015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0015">CVE-2014-0015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0138/">CVE-2014-0138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0138">CVE-2014-0138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0139">CVE-2014-0139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3613/">CVE-2014-3613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3613">CVE-2014-3613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3707/">CVE-2014-3707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3707">CVE-2014-3707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8150">CVE-2014-8150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3143/">CVE-2015-3143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3143">CVE-2015-3143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3148/">CVE-2015-3148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3148">CVE-2015-3148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3153/">CVE-2015-3153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3153">CVE-2015-3153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0755">CVE-2016-0755 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990770" comment="curl-openssl1-7.19.7-1.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990771" comment="libcurl4-openssl1-7.19.7-1.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990772" comment="libcurl4-openssl1-32bit-7.19.7-1.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216460" version="1" class="patch">
	<metadata>
		<title>libcurl4-openssl1-32bit-7.19.7-0.38.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="CVE-2009-0037" ref_url="https://www.suse.com/security/cve/CVE-2009-0037/" source="CVE"/>
		<reference ref_id="CVE-2009-2417" ref_url="https://www.suse.com/security/cve/CVE-2009-2417/" source="CVE"/>
		<reference ref_id="CVE-2010-4180" ref_url="https://www.suse.com/security/cve/CVE-2010-4180/" source="CVE"/>
		<reference ref_id="CVE-2011-2192" ref_url="https://www.suse.com/security/cve/CVE-2011-2192/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2013-1944" ref_url="https://www.suse.com/security/cve/CVE-2013-1944/" source="CVE"/>
		<reference ref_id="CVE-2013-2174" ref_url="https://www.suse.com/security/cve/CVE-2013-2174/" source="CVE"/>
		<reference ref_id="CVE-2013-4545" ref_url="https://www.suse.com/security/cve/CVE-2013-4545/" source="CVE"/>
		<reference ref_id="CVE-2014-0015" ref_url="https://www.suse.com/security/cve/CVE-2014-0015/" source="CVE"/>
		<reference ref_id="CVE-2014-0138" ref_url="https://www.suse.com/security/cve/CVE-2014-0138/" source="CVE"/>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<description>
These are all security issues fixed in the libcurl4-openssl1-32bit-7.19.7-0.38.1 package on the GA media of SUSE Linux Enterprise Server 11-SECURITY.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0037/">CVE-2009-0037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0037">CVE-2009-0037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2417/">CVE-2009-2417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2417">CVE-2009-2417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4180/">CVE-2010-4180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4180">CVE-2010-4180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2192/">CVE-2011-2192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2192">CVE-2011-2192 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1944/">CVE-2013-1944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1944">CVE-2013-1944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2174/">CVE-2013-2174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2174">CVE-2013-2174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4545/">CVE-2013-4545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4545">CVE-2013-4545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0015/">CVE-2014-0015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0015">CVE-2014-0015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0138/">CVE-2014-0138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0138">CVE-2014-0138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0139">CVE-2014-0139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990773" comment="libcurl4-openssl1-7.19.7-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990774" comment="libcurl4-openssl1-32bit-7.19.7-0.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216461" version="1" class="patch">
	<metadata>
		<title>libldap-openssl1-2_4-2-2.4.26-0.28.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="CVE-2012-1164" ref_url="https://www.suse.com/security/cve/CVE-2012-1164/" source="CVE"/>
		<description>
These are all security issues fixed in the libldap-openssl1-2_4-2-2.4.26-0.28.8 package on the GA media of SUSE Linux Enterprise Server 11-SECURITY.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1164/">CVE-2012-1164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1164">CVE-2012-1164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990775" comment="libldap-openssl1-2_4-2-2.4.26-0.28.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990776" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.28.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216462" version="1" class="patch">
	<metadata>
		<title>libopenssl1-devel-1.0.1g-0.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="CVE-2006-2937" ref_url="https://www.suse.com/security/cve/CVE-2006-2937/" source="CVE"/>
		<reference ref_id="CVE-2006-2940" ref_url="https://www.suse.com/security/cve/CVE-2006-2940/" source="CVE"/>
		<reference ref_id="CVE-2006-3738" ref_url="https://www.suse.com/security/cve/CVE-2006-3738/" source="CVE"/>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2006-4343" ref_url="https://www.suse.com/security/cve/CVE-2006-4343/" source="CVE"/>
		<reference ref_id="CVE-2006-7250" ref_url="https://www.suse.com/security/cve/CVE-2006-7250/" source="CVE"/>
		<reference ref_id="CVE-2007-3108" ref_url="https://www.suse.com/security/cve/CVE-2007-3108/" source="CVE"/>
		<reference ref_id="CVE-2007-4995" ref_url="https://www.suse.com/security/cve/CVE-2007-4995/" source="CVE"/>
		<reference ref_id="CVE-2007-5135" ref_url="https://www.suse.com/security/cve/CVE-2007-5135/" source="CVE"/>
		<reference ref_id="CVE-2008-0891" ref_url="https://www.suse.com/security/cve/CVE-2008-0891/" source="CVE"/>
		<reference ref_id="CVE-2008-1672" ref_url="https://www.suse.com/security/cve/CVE-2008-1672/" source="CVE"/>
		<reference ref_id="CVE-2008-5077" ref_url="https://www.suse.com/security/cve/CVE-2008-5077/" source="CVE"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<reference ref_id="CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740/" source="CVE"/>
		<reference ref_id="CVE-2010-0742" ref_url="https://www.suse.com/security/cve/CVE-2010-0742/" source="CVE"/>
		<reference ref_id="CVE-2010-1633" ref_url="https://www.suse.com/security/cve/CVE-2010-1633/" source="CVE"/>
		<reference ref_id="CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939/" source="CVE"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2010-5298" ref_url="https://www.suse.com/security/cve/CVE-2010-5298/" source="CVE"/>
		<reference ref_id="CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014/" source="CVE"/>
		<reference ref_id="CVE-2011-3207" ref_url="https://www.suse.com/security/cve/CVE-2011-3207/" source="CVE"/>
		<reference ref_id="CVE-2011-3210" ref_url="https://www.suse.com/security/cve/CVE-2011-3210/" source="CVE"/>
		<reference ref_id="CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108/" source="CVE"/>
		<reference ref_id="CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576/" source="CVE"/>
		<reference ref_id="CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577/" source="CVE"/>
		<reference ref_id="CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619/" source="CVE"/>
		<reference ref_id="CVE-2012-0027" ref_url="https://www.suse.com/security/cve/CVE-2012-0027/" source="CVE"/>
		<reference ref_id="CVE-2012-0050" ref_url="https://www.suse.com/security/cve/CVE-2012-0050/" source="CVE"/>
		<reference ref_id="CVE-2012-0884" ref_url="https://www.suse.com/security/cve/CVE-2012-0884/" source="CVE"/>
		<reference ref_id="CVE-2012-1165" ref_url="https://www.suse.com/security/cve/CVE-2012-1165/" source="CVE"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="CVE-2012-2686" ref_url="https://www.suse.com/security/cve/CVE-2012-2686/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-4353" ref_url="https://www.suse.com/security/cve/CVE-2013-4353/" source="CVE"/>
		<reference ref_id="CVE-2013-6449" ref_url="https://www.suse.com/security/cve/CVE-2013-6449/" source="CVE"/>
		<reference ref_id="CVE-2013-6450" ref_url="https://www.suse.com/security/cve/CVE-2013-6450/" source="CVE"/>
		<reference ref_id="CVE-2014-0076" ref_url="https://www.suse.com/security/cve/CVE-2014-0076/" source="CVE"/>
		<reference ref_id="CVE-2014-0160" ref_url="https://www.suse.com/security/cve/CVE-2014-0160/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl1-devel-1.0.1g-0.12.1 package on the GA media of SUSE Linux Enterprise Server 11-SECURITY.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2937/">CVE-2006-2937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2937">CVE-2006-2937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2940/">CVE-2006-2940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2940">CVE-2006-2940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3738/">CVE-2006-3738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3738">CVE-2006-3738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4339">CVE-2006-4339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4343/">CVE-2006-4343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4343">CVE-2006-4343 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-7250/">CVE-2006-7250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-7250">CVE-2006-7250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3108/">CVE-2007-3108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3108">CVE-2007-3108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4995/">CVE-2007-4995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4995">CVE-2007-4995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5135/">CVE-2007-5135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5135">CVE-2007-5135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0891/">CVE-2008-0891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0891">CVE-2008-0891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1672/">CVE-2008-1672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1672">CVE-2008-1672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5077/">CVE-2008-5077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5077">CVE-2008-5077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0590">CVE-2009-0590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0591">CVE-2009-0591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0789">CVE-2009-0789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1377">CVE-2009-1377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1378">CVE-2009-1378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1379">CVE-2009-1379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1386">CVE-2009-1386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1387">CVE-2009-1387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0740">CVE-2010-0740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0742/">CVE-2010-0742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0742">CVE-2010-0742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1633/">CVE-2010-1633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1633">CVE-2010-1633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2939">CVE-2010-2939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3864">CVE-2010-3864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5298/">CVE-2010-5298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-5298">CVE-2010-5298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0014">CVE-2011-0014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3207/">CVE-2011-3207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3207">CVE-2011-3207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3210/">CVE-2011-3210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3210">CVE-2011-3210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4108">CVE-2011-4108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4576">CVE-2011-4576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4577">CVE-2011-4577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4619">CVE-2011-4619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0027/">CVE-2012-0027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0027">CVE-2012-0027 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0050/">CVE-2012-0050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0050">CVE-2012-0050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0884/">CVE-2012-0884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0884">CVE-2012-0884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1165/">CVE-2012-1165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1165">CVE-2012-1165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2110">CVE-2012-2110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2686/">CVE-2012-2686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2686">CVE-2012-2686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4929">CVE-2012-4929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0166">CVE-2013-0166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0169">CVE-2013-0169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4353/">CVE-2013-4353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4353">CVE-2013-4353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6449/">CVE-2013-6449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6449">CVE-2013-6449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6450/">CVE-2013-6450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6450">CVE-2013-6450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0076/">CVE-2014-0076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0076">CVE-2014-0076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0160/">CVE-2014-0160 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0160">CVE-2014-0160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990777" comment="libopenssl1-devel-1.0.1g-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990778" comment="libopenssl1_0_0-1.0.1g-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990779" comment="libopenssl1_0_0-32bit-1.0.1g-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990780" comment="openssl1-1.0.1g-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990781" comment="openssl1-doc-1.0.1g-0.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216463" version="1" class="patch">
	<metadata>
		<title>libslp1-openssl1-1.2.0-172.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="CVE-2010-3609" ref_url="https://www.suse.com/security/cve/CVE-2010-3609/" source="CVE"/>
		<reference ref_id="CVE-2012-4428" ref_url="https://www.suse.com/security/cve/CVE-2012-4428/" source="CVE"/>
		<description>
These are all security issues fixed in the libslp1-openssl1-1.2.0-172.26.1 package on the GA media of SUSE Linux Enterprise Server 11-SECURITY.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3609/">CVE-2010-3609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3609">CVE-2010-3609 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2012-4428/">CVE-2012-4428 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-4428">CVE-2012-4428 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990782" comment="libslp1-openssl1-1.2.0-172.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216464" version="1" class="patch">
	<metadata>
		<title>libsnmp15-openssl1-32bit-5.4.2.1-8.12.31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="CVE-2008-4309" ref_url="https://www.suse.com/security/cve/CVE-2008-4309/" source="CVE"/>
		<reference ref_id="CVE-2008-6123" ref_url="https://www.suse.com/security/cve/CVE-2008-6123/" source="CVE"/>
		<reference ref_id="CVE-2012-2141" ref_url="https://www.suse.com/security/cve/CVE-2012-2141/" source="CVE"/>
		<reference ref_id="CVE-2014-2284" ref_url="https://www.suse.com/security/cve/CVE-2014-2284/" source="CVE"/>
		<reference ref_id="CVE-2014-2285" ref_url="https://www.suse.com/security/cve/CVE-2014-2285/" source="CVE"/>
		<reference ref_id="CVE-2014-2310" ref_url="https://www.suse.com/security/cve/CVE-2014-2310/" source="CVE"/>
		<reference ref_id="CVE-2014-3565" ref_url="https://www.suse.com/security/cve/CVE-2014-3565/" source="CVE"/>
		<reference ref_id="CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621/" source="CVE"/>
		<description>
These are all security issues fixed in the libsnmp15-openssl1-32bit-5.4.2.1-8.12.31.1 package on the GA media of SUSE Linux Enterprise Server 11-SECURITY.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4309/">CVE-2008-4309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4309">CVE-2008-4309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-6123/">CVE-2008-6123 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-6123">CVE-2008-6123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2141/">CVE-2012-2141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2141">CVE-2012-2141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2284/">CVE-2014-2284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2284">CVE-2014-2284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2285/">CVE-2014-2285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2285">CVE-2014-2285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2310/">CVE-2014-2310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2310">CVE-2014-2310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3565/">CVE-2014-3565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3565">CVE-2014-3565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5621">CVE-2015-5621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990783" comment="libsnmp15-openssl1-5.4.2.1-8.12.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990784" comment="libsnmp15-openssl1-32bit-5.4.2.1-8.12.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216465" version="1" class="patch">
	<metadata>
		<title>mailx-openssl1-12.5-1.11.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="CVE-2004-2771" ref_url="https://www.suse.com/security/cve/CVE-2004-2771/" source="CVE"/>
		<reference ref_id="CVE-2014-7844" ref_url="https://www.suse.com/security/cve/CVE-2014-7844/" source="CVE"/>
		<description>
These are all security issues fixed in the mailx-openssl1-12.5-1.11.2 package on the GA media of SUSE Linux Enterprise Server 11-SECURITY.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2004-2771/">CVE-2004-2771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-2771">CVE-2004-2771 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-7844/">CVE-2014-7844 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7844">CVE-2014-7844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990785" comment="mailx-openssl1-12.5-1.11.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216466" version="1" class="patch">
	<metadata>
		<title>openssh-openssl1-6.6p1-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="CVE-2006-0225" ref_url="https://www.suse.com/security/cve/CVE-2006-0225/" source="CVE"/>
		<reference ref_id="CVE-2007-4752" ref_url="https://www.suse.com/security/cve/CVE-2007-4752/" source="CVE"/>
		<reference ref_id="CVE-2008-1483" ref_url="https://www.suse.com/security/cve/CVE-2008-1483/" source="CVE"/>
		<reference ref_id="CVE-2010-5107" ref_url="https://www.suse.com/security/cve/CVE-2010-5107/" source="CVE"/>
		<reference ref_id="CVE-2011-5000" ref_url="https://www.suse.com/security/cve/CVE-2011-5000/" source="CVE"/>
		<reference ref_id="CVE-2012-0814" ref_url="https://www.suse.com/security/cve/CVE-2012-0814/" source="CVE"/>
		<reference ref_id="CVE-2014-2532" ref_url="https://www.suse.com/security/cve/CVE-2014-2532/" source="CVE"/>
		<reference ref_id="CVE-2014-2653" ref_url="https://www.suse.com/security/cve/CVE-2014-2653/" source="CVE"/>
		<reference ref_id="CVE-2015-5352" ref_url="https://www.suse.com/security/cve/CVE-2015-5352/" source="CVE"/>
		<reference ref_id="CVE-2015-5600" ref_url="https://www.suse.com/security/cve/CVE-2015-5600/" source="CVE"/>
		<reference ref_id="CVE-2015-6563" ref_url="https://www.suse.com/security/cve/CVE-2015-6563/" source="CVE"/>
		<reference ref_id="CVE-2015-6564" ref_url="https://www.suse.com/security/cve/CVE-2015-6564/" source="CVE"/>
		<reference ref_id="CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777/" source="CVE"/>
		<reference ref_id="CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-openssl1-6.6p1-10.1 package on the GA media of SUSE Linux Enterprise Server 11-SECURITY.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0225/">CVE-2006-0225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0225">CVE-2006-0225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4752/">CVE-2007-4752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4752">CVE-2007-4752 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2008-1483/">CVE-2008-1483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1483">CVE-2008-1483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5107/">CVE-2010-5107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-5107">CVE-2010-5107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5000/">CVE-2011-5000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-5000">CVE-2011-5000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0814/">CVE-2012-0814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0814">CVE-2012-0814 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-2532/">CVE-2014-2532 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-2532">CVE-2014-2532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2653/">CVE-2014-2653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2653">CVE-2014-2653 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5352/">CVE-2015-5352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5352">CVE-2015-5352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5600/">CVE-2015-5600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5600">CVE-2015-5600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6563/">CVE-2015-6563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6563">CVE-2015-6563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6564/">CVE-2015-6564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6564">CVE-2015-6564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0777">CVE-2016-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0778">CVE-2016-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990786" comment="openssh-openssl1-6.6p1-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990787" comment="openssh-openssl1-helpers-6.6p1-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216467" version="1" class="patch">
	<metadata>
		<title>openvpn-openssl1-2.3.2-0.10.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2013-2061" ref_url="https://www.suse.com/security/cve/CVE-2013-2061/" source="CVE"/>
		<reference ref_id="CVE-2014-8104" ref_url="https://www.suse.com/security/cve/CVE-2014-8104/" source="CVE"/>
		<reference ref_id="CVE-2017-12166" ref_url="https://www.suse.com/security/cve/CVE-2017-12166/" source="CVE"/>
		<reference ref_id="CVE-2017-7478" ref_url="https://www.suse.com/security/cve/CVE-2017-7478/" source="CVE"/>
		<reference ref_id="CVE-2017-7479" ref_url="https://www.suse.com/security/cve/CVE-2017-7479/" source="CVE"/>
		<reference ref_id="CVE-2017-7508" ref_url="https://www.suse.com/security/cve/CVE-2017-7508/" source="CVE"/>
		<reference ref_id="CVE-2017-7520" ref_url="https://www.suse.com/security/cve/CVE-2017-7520/" source="CVE"/>
		<reference ref_id="CVE-2017-7521" ref_url="https://www.suse.com/security/cve/CVE-2017-7521/" source="CVE"/>
		<description>
These are all security issues fixed in the openvpn-openssl1-2.3.2-0.10.3.1 package on the GA media of SUSE Linux Enterprise Server 11-SECURITY.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4339">CVE-2006-4339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2061/">CVE-2013-2061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2061">CVE-2013-2061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8104/">CVE-2014-8104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8104">CVE-2014-8104 at NVD</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12166/">CVE-2017-12166 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12166">CVE-2017-12166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7478/">CVE-2017-7478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7478">CVE-2017-7478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7479/">CVE-2017-7479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7479">CVE-2017-7479 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7508/">CVE-2017-7508 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7508">CVE-2017-7508 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7520/">CVE-2017-7520 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7520">CVE-2017-7520 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7521/">CVE-2017-7521 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7521">CVE-2017-7521 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990788" comment="openvpn-openssl1-2.3.2-0.10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990789" comment="openvpn-openssl1-down-root-plugin-2.3.2-0.10.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216468" version="1" class="patch">
	<metadata>
		<title>sblim-sfcb-openssl1-1.3.11-0.28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="CVE-2012-3381" ref_url="https://www.suse.com/security/cve/CVE-2012-3381/" source="CVE"/>
		<reference ref_id="CVE-2015-5185" ref_url="https://www.suse.com/security/cve/CVE-2015-5185/" source="CVE"/>
		<description>
These are all security issues fixed in the sblim-sfcb-openssl1-1.3.11-0.28.1 package on the GA media of SUSE Linux Enterprise Server 11-SECURITY.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3381/">CVE-2012-3381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3381">CVE-2012-3381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5185/">CVE-2015-5185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5185">CVE-2015-5185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990790" comment="sblim-sfcb-openssl1-1.3.11-0.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216469" version="1" class="patch">
	<metadata>
		<title>stunnel-openssl1-4.54-0.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="CVE-2013-1762" ref_url="https://www.suse.com/security/cve/CVE-2013-1762/" source="CVE"/>
		<reference ref_id="CVE-2014-0016" ref_url="https://www.suse.com/security/cve/CVE-2014-0016/" source="CVE"/>
		<description>
These are all security issues fixed in the stunnel-openssl1-4.54-0.11.1 package on the GA media of SUSE Linux Enterprise Server 11-SECURITY.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1762/">CVE-2013-1762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1762">CVE-2013-1762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0016/">CVE-2014-0016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0016">CVE-2014-0016 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990791" comment="stunnel-openssl1-4.54-0.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216470" version="1" class="patch">
	<metadata>
		<title>vsftpd-openssl1-2.0.7-4.43.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="CVE-2015-1419" ref_url="https://www.suse.com/security/cve/CVE-2015-1419/" source="CVE"/>
		<description>
These are all security issues fixed in the vsftpd-openssl1-2.0.7-4.43.1 package on the GA media of SUSE Linux Enterprise Server 11-SECURITY.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1419/">CVE-2015-1419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1419">CVE-2015-1419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990792" comment="vsftpd-openssl1-2.0.7-4.43.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216471" version="1" class="patch">
	<metadata>
		<title>wget-openssl1-1.11.4-1.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="CVE-2006-6719" ref_url="https://www.suse.com/security/cve/CVE-2006-6719/" source="CVE"/>
		<reference ref_id="CVE-2014-4877" ref_url="https://www.suse.com/security/cve/CVE-2014-4877/" source="CVE"/>
		<description>
These are all security issues fixed in the wget-openssl1-1.11.4-1.22.1 package on the GA media of SUSE Linux Enterprise Server 11-SECURITY.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6719/">CVE-2006-6719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6719">CVE-2006-6719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4877/">CVE-2014-4877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4877">CVE-2014-4877 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990793" comment="wget-openssl1-1.11.4-1.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216472" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1209624" ref_url="https://bugzilla.suse.com/1209624" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0464" ref_url="https://www.suse.com/security/cve/CVE-2023-0464/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:1754-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028619.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2023-0464: Fixed excessive Resource Usage Verifying X.509 Policy Constraints (bsc#1209624).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-04"/>
	<updated date="2023-04-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209624">SUSE bug 1209624</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0464/">CVE-2023-0464 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0464">CVE-2023-0464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990794" comment="libopenssl1-devel-1.0.1g-0.58.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990795" comment="libopenssl1_0_0-1.0.1g-0.58.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990796" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990797" comment="openssl1-1.0.1g-0.58.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990798" comment="openssl1-doc-1.0.1g-0.58.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216473" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1209624" ref_url="https://bugzilla.suse.com/1209624" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0464" ref_url="https://www.suse.com/security/cve/CVE-2023-0464/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014362.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2023-0464: Fixed excessive Resource Usage Verifying X.509 Policy Constraints (bsc#1209624).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-04"/>
	<updated date="2023-04-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209624">SUSE bug 1209624</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0464/">CVE-2023-0464 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0464">CVE-2023-0464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990799" comment="libopenssl0_9_8-0.9.8j-0.106.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990800" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990801" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990802" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990803" comment="openssl-0.9.8j-0.106.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990804" comment="openssl-doc-0.9.8j-0.106.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216474" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1209873" ref_url="https://bugzilla.suse.com/1209873" source="BUGZILLA"/>
		<reference ref_id="1209878" ref_url="https://bugzilla.suse.com/1209878" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0465" ref_url="https://www.suse.com/security/cve/CVE-2023-0465/" source="CVE"/>
		<reference ref_id="CVE-2023-0466" ref_url="https://www.suse.com/security/cve/CVE-2023-0466/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014520.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2023-0465: Invalid certificate policies in leaf certificates were silently ignored (bsc#1209878).
- CVE-2023-0466: Certificate policy check were not enabled (bsc#1209873).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-20"/>
	<updated date="2023-04-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209873">SUSE bug 1209873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209878">SUSE bug 1209878</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0465/">CVE-2023-0465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0465">CVE-2023-0465 at NVD</cve>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-0466/">CVE-2023-0466 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0466">CVE-2023-0466 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990805" comment="libopenssl1-devel-1.0.1g-0.58.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990806" comment="libopenssl1_0_0-1.0.1g-0.58.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990807" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990808" comment="openssl1-1.0.1g-0.58.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990809" comment="openssl1-doc-1.0.1g-0.58.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216475" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1209878" ref_url="https://bugzilla.suse.com/1209878" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0465" ref_url="https://www.suse.com/security/cve/CVE-2023-0465/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014557.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2023-0465: Invalid certificate policies in leaf certificates were silently ignored (bsc#1209878).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-24"/>
	<updated date="2023-04-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209878">SUSE bug 1209878</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0465/">CVE-2023-0465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0465">CVE-2023-0465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990810" comment="libopenssl0_9_8-0.9.8j-0.106.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990811" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990812" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990813" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990814" comment="openssl-0.9.8j-0.106.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990815" comment="openssl-doc-0.9.8j-0.106.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216476" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1201627" ref_url="https://bugzilla.suse.com/1201627" source="BUGZILLA"/>
		<reference ref_id="1211430" ref_url="https://bugzilla.suse.com/1211430" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2650" ref_url="https://www.suse.com/security/cve/CVE-2023-2650/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2469-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029772.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2023-2650: Fixed possible denial of service translating ASN.1 object identifiers (bsc#1211430).

- Update further expiring certificates that affect test cases (bsc#1201627).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-08"/>
	<updated date="2023-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201627">SUSE bug 1201627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211430">SUSE bug 1211430</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2650/">CVE-2023-2650 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2650">CVE-2023-2650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990816" comment="libopenssl0_9_8-0.9.8j-0.106.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990817" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990818" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990819" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990820" comment="openssl-0.9.8j-0.106.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990821" comment="openssl-doc-0.9.8j-0.106.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216477" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1201627" ref_url="https://bugzilla.suse.com/1201627" source="BUGZILLA"/>
		<reference ref_id="1211430" ref_url="https://bugzilla.suse.com/1211430" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2650" ref_url="https://www.suse.com/security/cve/CVE-2023-2650/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015115.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2023-2650: Fixed possible denial of service translating ASN.1 object identifiers (bsc#1211430).
- Update further expiring certificates that affect tests (bsc#1201627)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-08"/>
	<updated date="2023-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201627">SUSE bug 1201627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211430">SUSE bug 1211430</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2650/">CVE-2023-2650 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2650">CVE-2023-2650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990822" comment="libopenssl1-devel-1.0.1g-0.58.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990823" comment="libopenssl1_0_0-1.0.1g-0.58.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990824" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990825" comment="openssl1-1.0.1g-0.58.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990826" comment="openssl1-doc-1.0.1g-0.58.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216478" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1108488" ref_url="https://bugzilla.suse.com/1108488" source="BUGZILLA"/>
		<reference ref_id="1204414" ref_url="https://bugzilla.suse.com/1204414" source="BUGZILLA"/>
		<reference ref_id="1207036" ref_url="https://bugzilla.suse.com/1207036" source="BUGZILLA"/>
		<reference ref_id="1207051" ref_url="https://bugzilla.suse.com/1207051" source="BUGZILLA"/>
		<reference ref_id="1207125" ref_url="https://bugzilla.suse.com/1207125" source="BUGZILLA"/>
		<reference ref_id="1207795" ref_url="https://bugzilla.suse.com/1207795" source="BUGZILLA"/>
		<reference ref_id="1208837" ref_url="https://bugzilla.suse.com/1208837" source="BUGZILLA"/>
		<reference ref_id="1209008" ref_url="https://bugzilla.suse.com/1209008" source="BUGZILLA"/>
		<reference ref_id="1209256" ref_url="https://bugzilla.suse.com/1209256" source="BUGZILLA"/>
		<reference ref_id="1209291" ref_url="https://bugzilla.suse.com/1209291" source="BUGZILLA"/>
		<reference ref_id="1209532" ref_url="https://bugzilla.suse.com/1209532" source="BUGZILLA"/>
		<reference ref_id="1209871" ref_url="https://bugzilla.suse.com/1209871" source="BUGZILLA"/>
		<reference ref_id="1210336" ref_url="https://bugzilla.suse.com/1210336" source="BUGZILLA"/>
		<reference ref_id="1210647" ref_url="https://bugzilla.suse.com/1210647" source="BUGZILLA"/>
		<reference ref_id="1211186" ref_url="https://bugzilla.suse.com/1211186" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2018-9517" ref_url="https://www.suse.com/security/cve/CVE-2018-9517/" source="CVE"/>
		<reference ref_id="CVE-2022-3567" ref_url="https://www.suse.com/security/cve/CVE-2022-3567/" source="CVE"/>
		<reference ref_id="CVE-2023-0590" ref_url="https://www.suse.com/security/cve/CVE-2023-0590/" source="CVE"/>
		<reference ref_id="CVE-2023-1118" ref_url="https://www.suse.com/security/cve/CVE-2023-1118/" source="CVE"/>
		<reference ref_id="CVE-2023-1513" ref_url="https://www.suse.com/security/cve/CVE-2023-1513/" source="CVE"/>
		<reference ref_id="CVE-2023-1670" ref_url="https://www.suse.com/security/cve/CVE-2023-1670/" source="CVE"/>
		<reference ref_id="CVE-2023-1989" ref_url="https://www.suse.com/security/cve/CVE-2023-1989/" source="CVE"/>
		<reference ref_id="CVE-2023-2162" ref_url="https://www.suse.com/security/cve/CVE-2023-2162/" source="CVE"/>
		<reference ref_id="CVE-2023-23454" ref_url="https://www.suse.com/security/cve/CVE-2023-23454/" source="CVE"/>
		<reference ref_id="CVE-2023-23455" ref_url="https://www.suse.com/security/cve/CVE-2023-23455/" source="CVE"/>
		<reference ref_id="CVE-2023-23559" ref_url="https://www.suse.com/security/cve/CVE-2023-23559/" source="CVE"/>
		<reference ref_id="CVE-2023-28328" ref_url="https://www.suse.com/security/cve/CVE-2023-28328/" source="CVE"/>
		<reference ref_id="CVE-2023-32269" ref_url="https://www.suse.com/security/cve/CVE-2023-32269/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029875.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 LTSS EXTREME CORE kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210647).
- CVE-2023-32269: Fixed a use-after-free in af_netrom.c, related to the fact that accept() was also allowed for a successfully connected AF_NETROM socket (bsc#1211186).
- CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210336).
- CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256).
- CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871).
- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).
- CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291).
- CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795).
- CVE-2018-9517: Fixed possible memory corruption due to a use after free in pppol2tp_connect (bsc#1108488).
- CVE-2023-1118: Fixed a use-after-free bugs caused by ene_tx_irqsim() in media/rc (bsc#1208837).
- CVE-2023-23559: Fixed integer overflow in rndis_wlan that leads to a buffer overflow (bsc#1207051).
- CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#1207036).
- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207125).
- CVE-2022-3567: Fixed a to race condition in inet6_stream_ops()/inet6_dgram_ops() (bsc#1204414).

The following non-security bugs were fixed:

- Do not sign the vanilla kernel (bsc#1209008).
- do not fallthrough in cbq_classify and stop on TC_ACT_SHOT
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-14"/>
	<updated date="2023-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1108488">SUSE bug 1108488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204414">SUSE bug 1204414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207036">SUSE bug 1207036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207051">SUSE bug 1207051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207125">SUSE bug 1207125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207795">SUSE bug 1207795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208837">SUSE bug 1208837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209008">SUSE bug 1209008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209256">SUSE bug 1209256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209291">SUSE bug 1209291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209532">SUSE bug 1209532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209871">SUSE bug 1209871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210336">SUSE bug 1210336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210647">SUSE bug 1210647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211186">SUSE bug 1211186</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-9517/">CVE-2018-9517 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9517">CVE-2018-9517 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3567/">CVE-2022-3567 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3567">CVE-2022-3567 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0590/">CVE-2023-0590 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0590">CVE-2023-0590 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1118/">CVE-2023-1118 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1118">CVE-2023-1118 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1513/">CVE-2023-1513 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1513">CVE-2023-1513 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1670/">CVE-2023-1670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1670">CVE-2023-1670 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1989/">CVE-2023-1989 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1989">CVE-2023-1989 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2162/">CVE-2023-2162 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2162">CVE-2023-2162 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23454/">CVE-2023-23454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23454">CVE-2023-23454 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23455/">CVE-2023-23455 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23455">CVE-2023-23455 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-23559/">CVE-2023-23559 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23559">CVE-2023-23559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28328/">CVE-2023-28328 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28328">CVE-2023-28328 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32269/">CVE-2023-32269 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32269">CVE-2023-32269 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990827" comment="kernel-default-3.0.101-108.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990828" comment="kernel-default-base-3.0.101-108.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990830" comment="kernel-ec2-3.0.101-108.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990831" comment="kernel-ec2-base-3.0.101-108.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990833" comment="kernel-source-3.0.101-108.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990834" comment="kernel-syms-3.0.101-108.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990835" comment="kernel-trace-3.0.101-108.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990836" comment="kernel-trace-base-3.0.101-108.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990838" comment="kernel-xen-3.0.101-108.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990839" comment="kernel-xen-base-3.0.101-108.141.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216479" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1207534" ref_url="https://bugzilla.suse.com/1207534" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4304" ref_url="https://www.suse.com/security/cve/CVE-2022-4304/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2022-4304: Reworked the fix for the Timing-Oracle in RSA decryption.
  The previous fix for this timing side channel turned out to cause a
  severe 2-3x performance regression in the typical use case (bsc#1207534).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-26"/>
	<updated date="2023-06-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1207534">SUSE bug 1207534</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4304/">CVE-2022-4304 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4304">CVE-2022-4304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990841" comment="libopenssl1-devel-1.0.1g-0.58.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990842" comment="libopenssl1_0_0-1.0.1g-0.58.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990843" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990844" comment="openssl1-1.0.1g-0.58.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990845" comment="openssl1-doc-1.0.1g-0.58.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216480" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1207534" ref_url="https://bugzilla.suse.com/1207534" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4304" ref_url="https://www.suse.com/security/cve/CVE-2022-4304/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2022-4304: Reworked the fix for the Timing-Oracle in RSA decryption.
  The previous fix for this timing side channel turned out to cause a
  severe 2-3x performance regression in the typical use case (bsc#1207534).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-26"/>
	<updated date="2023-06-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1207534">SUSE bug 1207534</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4304/">CVE-2022-4304 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4304">CVE-2022-4304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990846" comment="libopenssl0_9_8-0.9.8j-0.106.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990847" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990848" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990849" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990850" comment="openssl-0.9.8j-0.106.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990851" comment="openssl-doc-0.9.8j-0.106.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216481" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1213487" ref_url="https://bugzilla.suse.com/1213487" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3446" ref_url="https://www.suse.com/security/cve/CVE-2023-3446/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015644.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

  - CVE-2023-3446: Fixed DH_check() excessive time with over sized modulus (bsc#1213487).

		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-26"/>
	<updated date="2023-07-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213487">SUSE bug 1213487</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3446/">CVE-2023-3446 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3446">CVE-2023-3446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990852" comment="libopenssl1-devel-1.0.1g-0.58.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990853" comment="libopenssl1_0_0-1.0.1g-0.58.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990854" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990855" comment="openssl1-1.0.1g-0.58.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990856" comment="openssl1-doc-1.0.1g-0.58.73.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216482" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1213487" ref_url="https://bugzilla.suse.com/1213487" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3446" ref_url="https://www.suse.com/security/cve/CVE-2023-3446/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015643.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2023-3446: Fixed DH_check() excessive time with over sized modulus (bsc#1213487).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-26"/>
	<updated date="2023-07-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213487">SUSE bug 1213487</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3446/">CVE-2023-3446 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3446">CVE-2023-3446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990857" comment="libopenssl0_9_8-0.9.8j-0.106.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990858" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990859" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990860" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990861" comment="openssl-0.9.8j-0.106.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990862" comment="openssl-doc-0.9.8j-0.106.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216483" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1207533" ref_url="https://bugzilla.suse.com/1207533" source="BUGZILLA"/>
		<reference ref_id="1207534" ref_url="https://bugzilla.suse.com/1207534" source="BUGZILLA"/>
		<reference ref_id="1207536" ref_url="https://bugzilla.suse.com/1207536" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4304" ref_url="https://www.suse.com/security/cve/CVE-2022-4304/" source="CVE"/>
		<reference ref_id="CVE-2023-0215" ref_url="https://www.suse.com/security/cve/CVE-2023-0215/" source="CVE"/>
		<reference ref_id="CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013656.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2023-0286: Fixed X.400 address type confusion in X.509 GENERAL_NAME_cmp for x400Address (bsc#1207533).
- CVE-2023-0215: Fixed use-after-free following BIO_new_NDEF() (bsc#1207536).
- CVE-2022-4304: Fixed timing Oracle in RSA Decryption (bsc#1207534).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-07"/>
	<updated date="2023-02-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207533">SUSE bug 1207533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207534">SUSE bug 1207534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207536">SUSE bug 1207536</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4304/">CVE-2022-4304 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4304">CVE-2022-4304 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0215/">CVE-2023-0215 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0215">CVE-2023-0215 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990863" comment="libopenssl1-devel-1.0.1g-0.58.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990864" comment="libopenssl1_0_0-1.0.1g-0.58.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990865" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990866" comment="openssl1-1.0.1g-0.58.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990867" comment="openssl1-doc-1.0.1g-0.58.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216484" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1102851" ref_url="https://bugzilla.suse.com/1102851" source="BUGZILLA"/>
		<reference ref_id="1205803" ref_url="https://bugzilla.suse.com/1205803" source="BUGZILLA"/>
		<reference ref_id="1206418" ref_url="https://bugzilla.suse.com/1206418" source="BUGZILLA"/>
		<reference ref_id="1211738" ref_url="https://bugzilla.suse.com/1211738" source="BUGZILLA"/>
		<reference ref_id="1212128" ref_url="https://bugzilla.suse.com/1212128" source="BUGZILLA"/>
		<reference ref_id="1212129" ref_url="https://bugzilla.suse.com/1212129" source="BUGZILLA"/>
		<reference ref_id="1212154" ref_url="https://bugzilla.suse.com/1212154" source="BUGZILLA"/>
		<reference ref_id="1212501" ref_url="https://bugzilla.suse.com/1212501" source="BUGZILLA"/>
		<reference ref_id="1212502" ref_url="https://bugzilla.suse.com/1212502" source="BUGZILLA"/>
		<reference ref_id="1213167" ref_url="https://bugzilla.suse.com/1213167" source="BUGZILLA"/>
		<reference ref_id="1213286" ref_url="https://bugzilla.suse.com/1213286" source="BUGZILLA"/>
		<reference ref_id="1213588" ref_url="https://bugzilla.suse.com/1213588" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18344" ref_url="https://www.suse.com/security/cve/CVE-2017-18344/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2022-40982" ref_url="https://www.suse.com/security/cve/CVE-2022-40982/" source="CVE"/>
		<reference ref_id="CVE-2022-45919" ref_url="https://www.suse.com/security/cve/CVE-2022-45919/" source="CVE"/>
		<reference ref_id="CVE-2023-0459" ref_url="https://www.suse.com/security/cve/CVE-2023-0459/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<reference ref_id="CVE-2023-3141" ref_url="https://www.suse.com/security/cve/CVE-2023-3141/" source="CVE"/>
		<reference ref_id="CVE-2023-3159" ref_url="https://www.suse.com/security/cve/CVE-2023-3159/" source="CVE"/>
		<reference ref_id="CVE-2023-3161" ref_url="https://www.suse.com/security/cve/CVE-2023-3161/" source="CVE"/>
		<reference ref_id="CVE-2023-3268" ref_url="https://www.suse.com/security/cve/CVE-2023-3268/" source="CVE"/>
		<reference ref_id="CVE-2023-3567" ref_url="https://www.suse.com/security/cve/CVE-2023-3567/" source="CVE"/>
		<reference ref_id="CVE-2023-35824" ref_url="https://www.suse.com/security/cve/CVE-2023-35824/" source="CVE"/>
		<reference ref_id="CVE-2023-3776" ref_url="https://www.suse.com/security/cve/CVE-2023-3776/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015911.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2023-3268: Fixed an out of bounds memory access flaw in relay_file_read_start_pos in the relayfs (bsc#1212502).
- CVE-2023-3776: Fixed improper refcount update in  cls_fw leads to use-after-free (bsc#1213588).
- CVE-2022-40982: Fixed transient execution attack called 'Gather Data Sampling' (bsc#1206418).
- CVE-2023-3567: Fixed a use-after-free in vcs_read in drivers/tty/vt/vc_screen.c (bsc#1213167).
- CVE-2023-0459: Fixed information leak in __uaccess_begin_nospec (bsc#1211738).
- CVE-2023-20593: Fixed a ZenBleed issue in 'Zen 2' CPUs that could allow an attacker to potentially access sensitive information (bsc#1213286).
- CVE-2018-3639: Fixed Speculative Store Bypass aka 'Memory Disambiguation' (bsc#1087082).
- CVE-2017-18344: Fixed an OOB access led by an invalid check in timer_create. (bsc#1102851).
- CVE-2022-45919: Fixed a use-after-free in dvb_ca_en50221.c that could occur if there is a disconnect after an open, because of the lack of a wait_event (bsc#1205803).
- CVE-2023-35824: Fixed a use-after-free in dm1105_remove in drivers/media/pci/dm1105/dm1105.c (bsc#1212501).
- CVE-2023-3161: Fixed shift-out-of-bounds in fbcon_set_font() (bsc#1212154).
- CVE-2023-3141: Fixed a use-after-free flaw in r592_remove in drivers/memstick/host/r592.c, that allowed local attackers to crash the system at device disconnect (bsc#1212129).
- CVE-2023-3159: Fixed use-after-free issue in driver/firewire in outbound_phy_packet_callback (bsc#1212128).

The following non-security bugs were fixed:

- fbcon: Check font dimension limits (CVE-2023-3161 bsc#1212154).
- firewire: fix potential uaf in outbound_phy_packet_callback() (CVE-2023-3159 bsc#1212128).
- kABI: restore _copy_from_user on x86_64 and copy_to_user on x86 (bsc#1211738 CVE-2023-0459).
- media: dm1105: Fix use after free bug in dm1105_remove due to race condition (bsc#1212501 CVE-2023-35824).
- media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 (CVE-2022-45919 bsc#1205803).
- memstick: r592: Fix UAF bug in r592_remove due to race condition (CVE-2023-3141 bsc#1212129 bsc#1211449).
- net/sched: cls_fw: Fix improper refcount update leads to use-after-free (CVE-2023-3776 bsc#1213588).
- pkt_sched: fix error return code in fw_change_attrs() (bsc#1213588).
- pkt_sched: fix error return code in fw_change_attrs() (bsc#1213588).
- posix-timer: Properly check sigevent-&gt;sigev_notify (CVE-2017-18344, bsc#1102851, bsc#1208715).
- relayfs: fix out-of-bounds access in relay_file_read (bsc#1212502 CVE-2023-3268).
- uaccess: Add speculation barrier to copy_from_user() (bsc#1211738 CVE-2023-0459).
- vc_screen: don't clobber return value in vcs_read (bsc#1213167 CVE-2023-3567).
- vc_screen: modify vcs_size() handling in vcs_read() (bsc#1213167 CVE-2023-3567).
- vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF (bsc#1213167 CVE-2023-3567).
- x86: Unify copy_from_user() size checking (bsc#1211738 CVE-2023-0459).
- x86/copy_user: Unify the code by removing the 64-bit asm _copy_*_user() variants (bsc#1211738 CVE-2023-0459).
- x86/cpu/amd: Add a Zenbleed fix (bsc#1213286, CVE-2023-20593).
- x86/speculation: Add Gather Data Sampling mitigation (bsc#1206418, CVE-2022-40982).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-16"/>
	<updated date="2023-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102851">SUSE bug 1102851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205803">SUSE bug 1205803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206418">SUSE bug 1206418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211738">SUSE bug 1211738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212128">SUSE bug 1212128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212129">SUSE bug 1212129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212154">SUSE bug 1212154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212501">SUSE bug 1212501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212502">SUSE bug 1212502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213167">SUSE bug 1213167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213286">SUSE bug 1213286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213588">SUSE bug 1213588</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-18344/">CVE-2017-18344 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18344">CVE-2017-18344 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40982/">CVE-2022-40982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45919/">CVE-2022-45919 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45919">CVE-2022-45919 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0459/">CVE-2023-0459 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0459">CVE-2023-0459 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-3141/">CVE-2023-3141 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3141">CVE-2023-3141 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3159/">CVE-2023-3159 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3159">CVE-2023-3159 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3161/">CVE-2023-3161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3161">CVE-2023-3161 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3268/">CVE-2023-3268 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3268">CVE-2023-3268 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3567/">CVE-2023-3567 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3567">CVE-2023-3567 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-35824/">CVE-2023-35824 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35824">CVE-2023-35824 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3776/">CVE-2023-3776 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3776">CVE-2023-3776 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990868" comment="kernel-default-3.0.101-108.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990869" comment="kernel-default-base-3.0.101-108.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990871" comment="kernel-ec2-3.0.101-108.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990872" comment="kernel-ec2-base-3.0.101-108.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990874" comment="kernel-source-3.0.101-108.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990875" comment="kernel-syms-3.0.101-108.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990876" comment="kernel-trace-3.0.101-108.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990877" comment="kernel-trace-base-3.0.101-108.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990879" comment="kernel-xen-3.0.101-108.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990880" comment="kernel-xen-base-3.0.101-108.144.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216485" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1208600" ref_url="https://bugzilla.suse.com/1208600" source="BUGZILLA"/>
		<reference ref_id="1208995" ref_url="https://bugzilla.suse.com/1208995" source="BUGZILLA"/>
		<reference ref_id="1210448" ref_url="https://bugzilla.suse.com/1210448" source="BUGZILLA"/>
		<reference ref_id="1213666" ref_url="https://bugzilla.suse.com/1213666" source="BUGZILLA"/>
		<reference ref_id="1213927" ref_url="https://bugzilla.suse.com/1213927" source="BUGZILLA"/>
		<reference ref_id="1214348" ref_url="https://bugzilla.suse.com/1214348" source="BUGZILLA"/>
		<reference ref_id="1214451" ref_url="https://bugzilla.suse.com/1214451" source="BUGZILLA"/>
		<reference ref_id="1215115" ref_url="https://bugzilla.suse.com/1215115" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1077" ref_url="https://www.suse.com/security/cve/CVE-2023-1077/" source="CVE"/>
		<reference ref_id="CVE-2023-1192" ref_url="https://www.suse.com/security/cve/CVE-2023-1192/" source="CVE"/>
		<reference ref_id="CVE-2023-2007" ref_url="https://www.suse.com/security/cve/CVE-2023-2007/" source="CVE"/>
		<reference ref_id="CVE-2023-20588" ref_url="https://www.suse.com/security/cve/CVE-2023-20588/" source="CVE"/>
		<reference ref_id="CVE-2023-3772" ref_url="https://www.suse.com/security/cve/CVE-2023-3772/" source="CVE"/>
		<reference ref_id="CVE-2023-4385" ref_url="https://www.suse.com/security/cve/CVE-2023-4385/" source="CVE"/>
		<reference ref_id="CVE-2023-4459" ref_url="https://www.suse.com/security/cve/CVE-2023-4459/" source="CVE"/>
		<reference ref_id="CVE-2023-4623" ref_url="https://www.suse.com/security/cve/CVE-2023-4623/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016622.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2023-1077: Fixed a type confusion in pick_next_rt_entity() that could cause memory corruption (bsc#1208600).
- CVE-2023-4623: Fixed a use-after-free issue in the HFSC network scheduler which could be exploited to achieve local privilege escalation (bsc#1215115).
- CVE-2023-1192: Fixed use-after-free in cifs_demultiplex_thread() (bsc#1208995).
- CVE-2023-20588: Fixed a potential data leak that could be triggered through a side channel when division by zero occurred on some AMD processors (bsc#1213927).
- CVE-2023-4459: Fixed a NULL pointer dereference flaw in the vmxnet3 driver that may have allowed a local attacker with user privileges to cause a denial of service (bsc#1214451).
- CVE-2023-3772: Fixed a flaw in the XFRM subsystem that may have allowed a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer leading to denial of service (bsc#1213666).
- CVE-2023-2007: Removed the dpt_i2o driver due to security issues (bsc#1210448, jsc#PED-4579).
- CVE-2023-4385: Fixed a NULL pointer dereference flaw in dbFree that may have allowed a local attacker to crash the system due to a missing sanity check (bsc#1214348).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-10"/>
	<updated date="2023-10-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208600">SUSE bug 1208600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208995">SUSE bug 1208995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210448">SUSE bug 1210448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213666">SUSE bug 1213666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213927">SUSE bug 1213927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214348">SUSE bug 1214348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214451">SUSE bug 1214451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215115">SUSE bug 1215115</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1077/">CVE-2023-1077 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1077">CVE-2023-1077 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1192/">CVE-2023-1192 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1192">CVE-2023-1192 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-2007/">CVE-2023-2007 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2007">CVE-2023-2007 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20588/">CVE-2023-20588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20588">CVE-2023-20588 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3772/">CVE-2023-3772 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3772">CVE-2023-3772 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4385/">CVE-2023-4385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4385">CVE-2023-4385 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4459/">CVE-2023-4459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4459">CVE-2023-4459 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4623/">CVE-2023-4623 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4623">CVE-2023-4623 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990882" comment="kernel-default-3.0.101-108.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990883" comment="kernel-default-base-3.0.101-108.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990885" comment="kernel-ec2-3.0.101-108.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990886" comment="kernel-ec2-base-3.0.101-108.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990888" comment="kernel-source-3.0.101-108.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990889" comment="kernel-syms-3.0.101-108.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990890" comment="kernel-trace-3.0.101-108.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990891" comment="kernel-trace-base-3.0.101-108.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990893" comment="kernel-xen-3.0.101-108.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990894" comment="kernel-xen-base-3.0.101-108.147.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216486" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1055710" ref_url="https://bugzilla.suse.com/1055710" source="BUGZILLA"/>
		<reference ref_id="1084513" ref_url="https://bugzilla.suse.com/1084513" source="BUGZILLA"/>
		<reference ref_id="1131430" ref_url="https://bugzilla.suse.com/1131430" source="BUGZILLA"/>
		<reference ref_id="1133374" ref_url="https://bugzilla.suse.com/1133374" source="BUGZILLA"/>
		<reference ref_id="1154848" ref_url="https://bugzilla.suse.com/1154848" source="BUGZILLA"/>
		<reference ref_id="1166098" ref_url="https://bugzilla.suse.com/1166098" source="BUGZILLA"/>
		<reference ref_id="1173514" ref_url="https://bugzilla.suse.com/1173514" source="BUGZILLA"/>
		<reference ref_id="1177471" ref_url="https://bugzilla.suse.com/1177471" source="BUGZILLA"/>
		<reference ref_id="1191961" ref_url="https://bugzilla.suse.com/1191961" source="BUGZILLA"/>
		<reference ref_id="1196973" ref_url="https://bugzilla.suse.com/1196973" source="BUGZILLA"/>
		<reference ref_id="1197331" ref_url="https://bugzilla.suse.com/1197331" source="BUGZILLA"/>
		<reference ref_id="1197343" ref_url="https://bugzilla.suse.com/1197343" source="BUGZILLA"/>
		<reference ref_id="1197366" ref_url="https://bugzilla.suse.com/1197366" source="BUGZILLA"/>
		<reference ref_id="1197391" ref_url="https://bugzilla.suse.com/1197391" source="BUGZILLA"/>
		<reference ref_id="1198516" ref_url="https://bugzilla.suse.com/1198516" source="BUGZILLA"/>
		<reference ref_id="1198829" ref_url="https://bugzilla.suse.com/1198829" source="BUGZILLA"/>
		<reference ref_id="1199063" ref_url="https://bugzilla.suse.com/1199063" source="BUGZILLA"/>
		<reference ref_id="1199426" ref_url="https://bugzilla.suse.com/1199426" source="BUGZILLA"/>
		<reference ref_id="1199487" ref_url="https://bugzilla.suse.com/1199487" source="BUGZILLA"/>
		<reference ref_id="1199650" ref_url="https://bugzilla.suse.com/1199650" source="BUGZILLA"/>
		<reference ref_id="1199657" ref_url="https://bugzilla.suse.com/1199657" source="BUGZILLA"/>
		<reference ref_id="1200598" ref_url="https://bugzilla.suse.com/1200598" source="BUGZILLA"/>
		<reference ref_id="1200619" ref_url="https://bugzilla.suse.com/1200619" source="BUGZILLA"/>
		<reference ref_id="1200692" ref_url="https://bugzilla.suse.com/1200692" source="BUGZILLA"/>
		<reference ref_id="1200910" ref_url="https://bugzilla.suse.com/1200910" source="BUGZILLA"/>
		<reference ref_id="1201050" ref_url="https://bugzilla.suse.com/1201050" source="BUGZILLA"/>
		<reference ref_id="1201251" ref_url="https://bugzilla.suse.com/1201251" source="BUGZILLA"/>
		<reference ref_id="1201429" ref_url="https://bugzilla.suse.com/1201429" source="BUGZILLA"/>
		<reference ref_id="1201635" ref_url="https://bugzilla.suse.com/1201635" source="BUGZILLA"/>
		<reference ref_id="1201636" ref_url="https://bugzilla.suse.com/1201636" source="BUGZILLA"/>
		<reference ref_id="1201940" ref_url="https://bugzilla.suse.com/1201940" source="BUGZILLA"/>
		<reference ref_id="1201948" ref_url="https://bugzilla.suse.com/1201948" source="BUGZILLA"/>
		<reference ref_id="1202097" ref_url="https://bugzilla.suse.com/1202097" source="BUGZILLA"/>
		<reference ref_id="1202346" ref_url="https://bugzilla.suse.com/1202346" source="BUGZILLA"/>
		<reference ref_id="1202347" ref_url="https://bugzilla.suse.com/1202347" source="BUGZILLA"/>
		<reference ref_id="1202393" ref_url="https://bugzilla.suse.com/1202393" source="BUGZILLA"/>
		<reference ref_id="1202500" ref_url="https://bugzilla.suse.com/1202500" source="BUGZILLA"/>
		<reference ref_id="1202897" ref_url="https://bugzilla.suse.com/1202897" source="BUGZILLA"/>
		<reference ref_id="1202898" ref_url="https://bugzilla.suse.com/1202898" source="BUGZILLA"/>
		<reference ref_id="1202960" ref_url="https://bugzilla.suse.com/1202960" source="BUGZILLA"/>
		<reference ref_id="1203107" ref_url="https://bugzilla.suse.com/1203107" source="BUGZILLA"/>
		<reference ref_id="1203271" ref_url="https://bugzilla.suse.com/1203271" source="BUGZILLA"/>
		<reference ref_id="1203514" ref_url="https://bugzilla.suse.com/1203514" source="BUGZILLA"/>
		<reference ref_id="1203769" ref_url="https://bugzilla.suse.com/1203769" source="BUGZILLA"/>
		<reference ref_id="1203960" ref_url="https://bugzilla.suse.com/1203960" source="BUGZILLA"/>
		<reference ref_id="1203987" ref_url="https://bugzilla.suse.com/1203987" source="BUGZILLA"/>
		<reference ref_id="1204166" ref_url="https://bugzilla.suse.com/1204166" source="BUGZILLA"/>
		<reference ref_id="1204354" ref_url="https://bugzilla.suse.com/1204354" source="BUGZILLA"/>
		<reference ref_id="1204405" ref_url="https://bugzilla.suse.com/1204405" source="BUGZILLA"/>
		<reference ref_id="1204431" ref_url="https://bugzilla.suse.com/1204431" source="BUGZILLA"/>
		<reference ref_id="1204439" ref_url="https://bugzilla.suse.com/1204439" source="BUGZILLA"/>
		<reference ref_id="1204574" ref_url="https://bugzilla.suse.com/1204574" source="BUGZILLA"/>
		<reference ref_id="1204631" ref_url="https://bugzilla.suse.com/1204631" source="BUGZILLA"/>
		<reference ref_id="1204646" ref_url="https://bugzilla.suse.com/1204646" source="BUGZILLA"/>
		<reference ref_id="1204647" ref_url="https://bugzilla.suse.com/1204647" source="BUGZILLA"/>
		<reference ref_id="1204653" ref_url="https://bugzilla.suse.com/1204653" source="BUGZILLA"/>
		<reference ref_id="1204894" ref_url="https://bugzilla.suse.com/1204894" source="BUGZILLA"/>
		<reference ref_id="1204922" ref_url="https://bugzilla.suse.com/1204922" source="BUGZILLA"/>
		<reference ref_id="1205220" ref_url="https://bugzilla.suse.com/1205220" source="BUGZILLA"/>
		<reference ref_id="1205514" ref_url="https://bugzilla.suse.com/1205514" source="BUGZILLA"/>
		<reference ref_id="1205671" ref_url="https://bugzilla.suse.com/1205671" source="BUGZILLA"/>
		<reference ref_id="1205796" ref_url="https://bugzilla.suse.com/1205796" source="BUGZILLA"/>
		<reference ref_id="1206677" ref_url="https://bugzilla.suse.com/1206677" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13695" ref_url="https://www.suse.com/security/cve/CVE-2017-13695/" source="CVE"/>
		<reference ref_id="CVE-2018-7755" ref_url="https://www.suse.com/security/cve/CVE-2018-7755/" source="CVE"/>
		<reference ref_id="CVE-2019-3837" ref_url="https://www.suse.com/security/cve/CVE-2019-3837/" source="CVE"/>
		<reference ref_id="CVE-2019-3900" ref_url="https://www.suse.com/security/cve/CVE-2019-3900/" source="CVE"/>
		<reference ref_id="CVE-2020-15393" ref_url="https://www.suse.com/security/cve/CVE-2020-15393/" source="CVE"/>
		<reference ref_id="CVE-2020-16119" ref_url="https://www.suse.com/security/cve/CVE-2020-16119/" source="CVE"/>
		<reference ref_id="CVE-2020-36557" ref_url="https://www.suse.com/security/cve/CVE-2020-36557/" source="CVE"/>
		<reference ref_id="CVE-2020-36558" ref_url="https://www.suse.com/security/cve/CVE-2020-36558/" source="CVE"/>
		<reference ref_id="CVE-2021-26341" ref_url="https://www.suse.com/security/cve/CVE-2021-26341/" source="CVE"/>
		<reference ref_id="CVE-2021-33655" ref_url="https://www.suse.com/security/cve/CVE-2021-33655/" source="CVE"/>
		<reference ref_id="CVE-2021-33656" ref_url="https://www.suse.com/security/cve/CVE-2021-33656/" source="CVE"/>
		<reference ref_id="CVE-2021-34981" ref_url="https://www.suse.com/security/cve/CVE-2021-34981/" source="CVE"/>
		<reference ref_id="CVE-2021-39713" ref_url="https://www.suse.com/security/cve/CVE-2021-39713/" source="CVE"/>
		<reference ref_id="CVE-2021-45868" ref_url="https://www.suse.com/security/cve/CVE-2021-45868/" source="CVE"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-1353" ref_url="https://www.suse.com/security/cve/CVE-2022-1353/" source="CVE"/>
		<reference ref_id="CVE-2022-1462" ref_url="https://www.suse.com/security/cve/CVE-2022-1462/" source="CVE"/>
		<reference ref_id="CVE-2022-1652" ref_url="https://www.suse.com/security/cve/CVE-2022-1652/" source="CVE"/>
		<reference ref_id="CVE-2022-1679" ref_url="https://www.suse.com/security/cve/CVE-2022-1679/" source="CVE"/>
		<reference ref_id="CVE-2022-20132" ref_url="https://www.suse.com/security/cve/CVE-2022-20132/" source="CVE"/>
		<reference ref_id="CVE-2022-20166" ref_url="https://www.suse.com/security/cve/CVE-2022-20166/" source="CVE"/>
		<reference ref_id="CVE-2022-20368" ref_url="https://www.suse.com/security/cve/CVE-2022-20368/" source="CVE"/>
		<reference ref_id="CVE-2022-20369" ref_url="https://www.suse.com/security/cve/CVE-2022-20369/" source="CVE"/>
		<reference ref_id="CVE-2022-21123" ref_url="https://www.suse.com/security/cve/CVE-2022-21123/" source="CVE"/>
		<reference ref_id="CVE-2022-21125" ref_url="https://www.suse.com/security/cve/CVE-2022-21125/" source="CVE"/>
		<reference ref_id="CVE-2022-21127" ref_url="https://www.suse.com/security/cve/CVE-2022-21127/" source="CVE"/>
		<reference ref_id="CVE-2022-21166" ref_url="https://www.suse.com/security/cve/CVE-2022-21166/" source="CVE"/>
		<reference ref_id="CVE-2022-21180" ref_url="https://www.suse.com/security/cve/CVE-2022-21180/" source="CVE"/>
		<reference ref_id="CVE-2022-21385" ref_url="https://www.suse.com/security/cve/CVE-2022-21385/" source="CVE"/>
		<reference ref_id="CVE-2022-21499" ref_url="https://www.suse.com/security/cve/CVE-2022-21499/" source="CVE"/>
		<reference ref_id="CVE-2022-2318" ref_url="https://www.suse.com/security/cve/CVE-2022-2318/" source="CVE"/>
		<reference ref_id="CVE-2022-2663" ref_url="https://www.suse.com/security/cve/CVE-2022-2663/" source="CVE"/>
		<reference ref_id="CVE-2022-28356" ref_url="https://www.suse.com/security/cve/CVE-2022-28356/" source="CVE"/>
		<reference ref_id="CVE-2022-29900" ref_url="https://www.suse.com/security/cve/CVE-2022-29900/" source="CVE"/>
		<reference ref_id="CVE-2022-29901" ref_url="https://www.suse.com/security/cve/CVE-2022-29901/" source="CVE"/>
		<reference ref_id="CVE-2022-3028" ref_url="https://www.suse.com/security/cve/CVE-2022-3028/" source="CVE"/>
		<reference ref_id="CVE-2022-3303" ref_url="https://www.suse.com/security/cve/CVE-2022-3303/" source="CVE"/>
		<reference ref_id="CVE-2022-33981" ref_url="https://www.suse.com/security/cve/CVE-2022-33981/" source="CVE"/>
		<reference ref_id="CVE-2022-3424" ref_url="https://www.suse.com/security/cve/CVE-2022-3424/" source="CVE"/>
		<reference ref_id="CVE-2022-3524" ref_url="https://www.suse.com/security/cve/CVE-2022-3524/" source="CVE"/>
		<reference ref_id="CVE-2022-3565" ref_url="https://www.suse.com/security/cve/CVE-2022-3565/" source="CVE"/>
		<reference ref_id="CVE-2022-3566" ref_url="https://www.suse.com/security/cve/CVE-2022-3566/" source="CVE"/>
		<reference ref_id="CVE-2022-3586" ref_url="https://www.suse.com/security/cve/CVE-2022-3586/" source="CVE"/>
		<reference ref_id="CVE-2022-3621" ref_url="https://www.suse.com/security/cve/CVE-2022-3621/" source="CVE"/>
		<reference ref_id="CVE-2022-3635" ref_url="https://www.suse.com/security/cve/CVE-2022-3635/" source="CVE"/>
		<reference ref_id="CVE-2022-3646" ref_url="https://www.suse.com/security/cve/CVE-2022-3646/" source="CVE"/>
		<reference ref_id="CVE-2022-3649" ref_url="https://www.suse.com/security/cve/CVE-2022-3649/" source="CVE"/>
		<reference ref_id="CVE-2022-36879" ref_url="https://www.suse.com/security/cve/CVE-2022-36879/" source="CVE"/>
		<reference ref_id="CVE-2022-36946" ref_url="https://www.suse.com/security/cve/CVE-2022-36946/" source="CVE"/>
		<reference ref_id="CVE-2022-3903" ref_url="https://www.suse.com/security/cve/CVE-2022-3903/" source="CVE"/>
		<reference ref_id="CVE-2022-39188" ref_url="https://www.suse.com/security/cve/CVE-2022-39188/" source="CVE"/>
		<reference ref_id="CVE-2022-40768" ref_url="https://www.suse.com/security/cve/CVE-2022-40768/" source="CVE"/>
		<reference ref_id="CVE-2022-4095" ref_url="https://www.suse.com/security/cve/CVE-2022-4095/" source="CVE"/>
		<reference ref_id="CVE-2022-41218" ref_url="https://www.suse.com/security/cve/CVE-2022-41218/" source="CVE"/>
		<reference ref_id="CVE-2022-41848" ref_url="https://www.suse.com/security/cve/CVE-2022-41848/" source="CVE"/>
		<reference ref_id="CVE-2022-41850" ref_url="https://www.suse.com/security/cve/CVE-2022-41850/" source="CVE"/>
		<reference ref_id="CVE-2022-41858" ref_url="https://www.suse.com/security/cve/CVE-2022-41858/" source="CVE"/>
		<reference ref_id="CVE-2022-43750" ref_url="https://www.suse.com/security/cve/CVE-2022-43750/" source="CVE"/>
		<reference ref_id="CVE-2022-44032" ref_url="https://www.suse.com/security/cve/CVE-2022-44032/" source="CVE"/>
		<reference ref_id="CVE-2022-44033" ref_url="https://www.suse.com/security/cve/CVE-2022-44033/" source="CVE"/>
		<reference ref_id="CVE-2022-45934" ref_url="https://www.suse.com/security/cve/CVE-2022-45934/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2017-13695: Fixed fix acpi operand cache leak in nseval.c (bsc#1055710).
- CVE-2018-7755: Fixed bypass of kernel security protections such as KASLR using fd_locked_ioctl function in drivers/block/floppy.c (bnc#1084513).
- CVE-2019-3837: Fixed memory leak due to thread-unsafe implementation of the net_dma code in tcp_recvmsg() (bnc#1131430).
- CVE-2019-3900: Fixed infinite loop while receiving packets in vhost_net (bnc#1133374).
- CVE-2020-15393: Fixed memory leak in usbtest_disconnect in drivers/usb/misc/usbtest.c (bnc#1173514).
- CVE-2020-16119: Fixed use-after-free exploitable by a local attacker due to reuse of a DCCP socket (bnc#1177471).
- CVE-2020-36557: Fixed race condition in the VT_DISALLOCATE ioctl and closing/opening of ttys which could lead to a use-after-free (bnc#1201429).
- CVE-2020-36558: Fixed race condition in VT_RESIZEX (bsc#1200910).
- CVE-2021-26341: Fixed vulnerablity where some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bnc#1201050).
- CVE-2021-33655: When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds (bnc#1201635).
- CVE-2021-33656: Fixed memory out of bounds write when setting font with malicous data by ioctl cmd PIO_FONT (bnc#1201636).
- CVE-2021-34981: Fixed file refcounter in bluetooth cmtp when cmtp_attach_device fails (bsc#1191961).
- CVE-2021-39713: Fixed race condition in the network scheduling subsystem which could lead to a use-after-free (bsc#1196973).
- CVE-2021-45868: Fixed use-after-free in fs/quota/quota_tree.c (bnc#1197366).
- CVE-2022-1011: Fixed UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (bsc#1197343).
- CVE-2022-1048: Fixed potential AB/BA lock with buffer_mutex and mmap_lock (bsc#1197331).
- CVE-2022-1353: Fixed denial of service in the pfkey_register function in net/key/af_key.c (bnc#1198516).
- CVE-2022-1462: Fixed out-of-bounds read in the TeleTYpe subsystem allowing local user to crash the system or read unauthorized random data from memory (bnc#1198829).
- CVE-2022-1652: Fixed use after free in floppy (bsc#1199063).
- CVE-2022-1679: Fixed use-after-free in the atheros wireless adapter driver (bnc#1199487).
- CVE-2022-20132: Fixed out of bounds read in lg_probe and related functions of hid-lg.c and other USB HID files (bnc#1200619).
- CVE-2022-20166: Fixed out of bounds write due to a heap buffer overflow which could lead to local escalation of privilege with System execution privileges needed (bnc#1200598).
- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bnc#1202346).
- CVE-2022-20369: Fixed out of bounds write due to improper input validation in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).
- CVE-2022-21166, CVE-2022-21127, CVE-2022-21123, CVE-2022-21125, CVE-2022-21180: Fixed stale MMIO data transient information leaks (INTEL-TA-00615) (bnc#1199650).
- CVE-2022-21385: Fixed warn in rds_message_alloc_sgs (bnc#1202897).
- CVE-2022-21499: Fixed issue where it was trivial to break out of lockdown using kgdb (bsc#1199426).
- CVE-2022-2318: Fixed use-after-free caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without any privileges (bnc#1201251).
- CVE-2022-2663: Fixed possible firewall bypass when users are using unencrypted IRC due to message handling confusion in nf_conntrack_irc (bnc#1202097).
- CVE-2022-28356: Fixed refcount leak bug in net/llc/af_llc.c (bnc#1197391).
- CVE-2022-29900: Fixed mis-trained branch predictions for return instructions that may have allowed arbitrary speculative code execution under certain microarchitecture-dependent conditions (bnc#1199657).
- CVE-2022-29901: Fixed vulnerability where an attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions (bnc#1199657).
- CVE-2022-3028: Fixed a race condition in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously (bnc#1202898).
- CVE-2022-3303: Fixed race condition in the sound subsystem due to improper locking (bnc#1203769).
- CVE-2022-33981: Fixed denial of service in drivers/block/floppy.c (bnc#1200692).
- CVE-2022-3424: Fixed use-after-free in gru_set_context_option leading to kernel panic (bnc#1204166).
- CVE-2022-3524: Fixed memory leak in ipv6_renew_options of the component IPv6 Handler (bnc#1204354).
- CVE-2022-3565: Fixed use-after-free in del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth (bnc#1204431).
- CVE-2022-3566: Fixed race condition in the TCP Handler (bnc#1204405).
- CVE-2022-3586: Fixed use-after-free in the sch_sfb enqueue function (bnc#1204439).
- CVE-2022-3621: Fixed null pointer dereference in fs/nilfs2/inode.c of the component nilfs2 (bnc#1204574).
- CVE-2022-3635: Fixed use-after-free in IPsec (bnc#1204631).
- CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF (bnc#1204646).
- CVE-2022-3649: Fixed use-after-free in nilfs_new_inode of the file fs/nilfs2/inode.c (bnc#1204647).
- CVE-2022-36879: Fixed double refcount drop in xfrm_expand_policies in net/xfrm/xfrm_policy.c (bnc#1201948).
- CVE-2022-36946: Fixed denial of service in nfqnl_mangle in net/netfilter/nfnetlink_queue.c (bnc#1201940).
- CVE-2022-3903: Fixed incorrect read request flaw in the Infrared Transceiver USB driver (bnc#1205220).
- CVE-2022-39188: Fixed TLB flush for PFNMAP mappings before unlink_file_vma() (bsc#1203107).
- CVE-2022-40768: Fixed information leak in drivers/scsi/stex.c (bnc#1203514).
- CVE-2022-4095: Fixed use-after-free in rtl8712 (bsc#1205514).
- CVE-2022-41218: Fixed use-after-free in drivers/media/dvb-core/dmxdev.c (bnc#1202960).
- CVE-2022-41848: Fixed use-after-free in drivers/char/pcmcia/synclink_cs.c (bnc#1203987).
- CVE-2022-41850: Fixed use-after-free in roccat_report_event in drivers/hid/hid-roccat.c (bnc#1203960).
- CVE-2022-41858: Fixed NULL pointer dereference in drivers/net/slip/slip.c (bnc#1205671).
- CVE-2022-43750: Fixed memory corruption in drivers/usb/mon/mon_bin.c (bnc#1204653).
- CVE-2022-44032: Fixed race condition in drivers/char/pcmcia/cm4000_cs.c (bnc#1204894).
- CVE-2022-44033: Fixed use-after-free in drivers/char/pcmcia/cm4040_cs.c (bnc#1204922).
- CVE-2022-45934: Fixed integer wraparound in net/bluetooth/l2cap_core.c (bnc#1205796).

The following non-security bugs were fixed:

- Fail if no bound addresses can be used for a given scope (bsc#1206677).
- Fixed missing check on handle in net_sched cls_route (bsc#1202393).
- Trim skb to alloc size to avoid MSG_TRUNC (bsc#1166098).
- Fixed confusing boot logging with Skylake on RETBLEED kernel (bsc#1202500).
- Fixed retbleed performance issues (bsc#1203271).

		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2023-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1055710">SUSE bug 1055710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084513">SUSE bug 1084513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131430">SUSE bug 1131430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133374">SUSE bug 1133374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154848">SUSE bug 1154848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166098">SUSE bug 1166098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173514">SUSE bug 1173514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177471">SUSE bug 1177471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191961">SUSE bug 1191961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196973">SUSE bug 1196973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197331">SUSE bug 1197331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197343">SUSE bug 1197343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197366">SUSE bug 1197366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197391">SUSE bug 1197391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198516">SUSE bug 1198516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198829">SUSE bug 1198829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199063">SUSE bug 1199063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199426">SUSE bug 1199426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199487">SUSE bug 1199487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199650">SUSE bug 1199650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199657">SUSE bug 1199657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200598">SUSE bug 1200598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200619">SUSE bug 1200619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200692">SUSE bug 1200692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200910">SUSE bug 1200910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201050">SUSE bug 1201050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201251">SUSE bug 1201251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201429">SUSE bug 1201429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201635">SUSE bug 1201635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201636">SUSE bug 1201636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201940">SUSE bug 1201940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201948">SUSE bug 1201948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202097">SUSE bug 1202097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202346">SUSE bug 1202346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202347">SUSE bug 1202347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202393">SUSE bug 1202393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202500">SUSE bug 1202500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202897">SUSE bug 1202897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202898">SUSE bug 1202898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202960">SUSE bug 1202960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203107">SUSE bug 1203107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203271">SUSE bug 1203271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203514">SUSE bug 1203514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203769">SUSE bug 1203769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203960">SUSE bug 1203960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203987">SUSE bug 1203987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204166">SUSE bug 1204166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204354">SUSE bug 1204354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204405">SUSE bug 1204405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204431">SUSE bug 1204431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204439">SUSE bug 1204439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204574">SUSE bug 1204574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204631">SUSE bug 1204631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204646">SUSE bug 1204646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204647">SUSE bug 1204647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204653">SUSE bug 1204653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204894">SUSE bug 1204894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204922">SUSE bug 1204922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205220">SUSE bug 1205220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205514">SUSE bug 1205514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205671">SUSE bug 1205671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205796">SUSE bug 1205796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206677">SUSE bug 1206677</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-13695/">CVE-2017-13695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13695">CVE-2017-13695 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7755/">CVE-2018-7755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7755">CVE-2018-7755 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-3837/">CVE-2019-3837 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3837">CVE-2019-3837 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3900/">CVE-2019-3900 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3900">CVE-2019-3900 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15393/">CVE-2020-15393 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15393">CVE-2020-15393 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16119/">CVE-2020-16119 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16119">CVE-2020-16119 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36557/">CVE-2020-36557 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36557">CVE-2020-36557 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36558/">CVE-2020-36558 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36558">CVE-2020-36558 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26341/">CVE-2021-26341 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26341">CVE-2021-26341 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33655/">CVE-2021-33655 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33655">CVE-2021-33655 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33656/">CVE-2021-33656 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33656">CVE-2021-33656 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34981/">CVE-2021-34981 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34981">CVE-2021-34981 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39713/">CVE-2021-39713 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39713">CVE-2021-39713 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45868/">CVE-2021-45868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45868">CVE-2021-45868 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011">CVE-2022-1011 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1048">CVE-2022-1048 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1353/">CVE-2022-1353 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1353">CVE-2022-1353 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1462/">CVE-2022-1462 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1462">CVE-2022-1462 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1652/">CVE-2022-1652 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1652">CVE-2022-1652 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1679/">CVE-2022-1679 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1679">CVE-2022-1679 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-20132/">CVE-2022-20132 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20132">CVE-2022-20132 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-20166/">CVE-2022-20166 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20166">CVE-2022-20166 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20368/">CVE-2022-20368 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20368">CVE-2022-20368 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20369/">CVE-2022-20369 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20369">CVE-2022-20369 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21123/">CVE-2022-21123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21123">CVE-2022-21123 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21125/">CVE-2022-21125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21125">CVE-2022-21125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21127/">CVE-2022-21127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21127">CVE-2022-21127 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21166/">CVE-2022-21166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21166">CVE-2022-21166 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21180/">CVE-2022-21180 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21180">CVE-2022-21180 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21385/">CVE-2022-21385 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21385">CVE-2022-21385 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21499/">CVE-2022-21499 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21499">CVE-2022-21499 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2318/">CVE-2022-2318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2318">CVE-2022-2318 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2663/">CVE-2022-2663 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2663">CVE-2022-2663 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28356/">CVE-2022-28356 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28356">CVE-2022-28356 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29900/">CVE-2022-29900 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29900">CVE-2022-29900 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29901/">CVE-2022-29901 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29901">CVE-2022-29901 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3028/">CVE-2022-3028 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3028">CVE-2022-3028 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3303/">CVE-2022-3303 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3303">CVE-2022-3303 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-33981/">CVE-2022-33981 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33981">CVE-2022-33981 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3424/">CVE-2022-3424 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3424">CVE-2022-3424 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3524/">CVE-2022-3524 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3524">CVE-2022-3524 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3565/">CVE-2022-3565 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3565">CVE-2022-3565 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3566/">CVE-2022-3566 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3566">CVE-2022-3566 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3586/">CVE-2022-3586 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3586">CVE-2022-3586 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3621/">CVE-2022-3621 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3621">CVE-2022-3621 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3635/">CVE-2022-3635 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3635">CVE-2022-3635 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3646/">CVE-2022-3646 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3646">CVE-2022-3646 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3649/">CVE-2022-3649 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3649">CVE-2022-3649 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36879/">CVE-2022-36879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36879">CVE-2022-36879 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36946/">CVE-2022-36946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36946">CVE-2022-36946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3903/">CVE-2022-3903 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3903">CVE-2022-3903 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-39188/">CVE-2022-39188 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39188">CVE-2022-39188 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40768/">CVE-2022-40768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40768">CVE-2022-40768 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4095/">CVE-2022-4095 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4095">CVE-2022-4095 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41218/">CVE-2022-41218 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41218">CVE-2022-41218 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41848/">CVE-2022-41848 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41848">CVE-2022-41848 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-41850/">CVE-2022-41850 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41850">CVE-2022-41850 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41858/">CVE-2022-41858 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41858">CVE-2022-41858 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43750/">CVE-2022-43750 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43750">CVE-2022-43750 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44032/">CVE-2022-44032 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44032">CVE-2022-44032 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44033/">CVE-2022-44033 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44033">CVE-2022-44033 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-45934/">CVE-2022-45934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45934">CVE-2022-45934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990896" comment="kernel-default-3.0.101-108.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990897" comment="kernel-default-base-3.0.101-108.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990899" comment="kernel-ec2-3.0.101-108.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990900" comment="kernel-ec2-base-3.0.101-108.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990902" comment="kernel-source-3.0.101-108.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990903" comment="kernel-syms-3.0.101-108.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990904" comment="kernel-trace-3.0.101-108.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990905" comment="kernel-trace-base-3.0.101-108.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990907" comment="kernel-xen-3.0.101-108.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990908" comment="kernel-xen-base-3.0.101-108.138.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216487" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1216922" ref_url="https://bugzilla.suse.com/1216922" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5678" ref_url="https://www.suse.com/security/cve/CVE-2023-5678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017123.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2023-5678: Fixed generating and checking of excessively long X9.42 DH keys that resulted in a possible Denial of Service (bsc#1216922).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-20"/>
	<updated date="2023-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216922">SUSE bug 1216922</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5678/">CVE-2023-5678 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990910" comment="libopenssl1-devel-1.0.1g-0.58.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990911" comment="libopenssl1_0_0-1.0.1g-0.58.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990912" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990913" comment="openssl1-1.0.1g-0.58.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990914" comment="openssl1-doc-1.0.1g-0.58.76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216488" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1216922" ref_url="https://bugzilla.suse.com/1216922" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5678" ref_url="https://www.suse.com/security/cve/CVE-2023-5678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017122.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2023-5678: Fixed generating and checking of excessively long X9.42 DH keys that resulted in a possible Denial of Service (bsc#1216922).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-20"/>
	<updated date="2023-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216922">SUSE bug 1216922</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5678/">CVE-2023-5678 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990915" comment="libopenssl0_9_8-0.9.8j-0.106.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990916" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990917" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990918" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990919" comment="openssl-0.9.8j-0.106.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990920" comment="openssl-doc-0.9.8j-0.106.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216489" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1207534" ref_url="https://bugzilla.suse.com/1207534" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4304" ref_url="https://www.suse.com/security/cve/CVE-2022-4304/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013952.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2022-4304: Fixed timing Oracle in RSA Decryption (bsc#1207534).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-01"/>
	<updated date="2023-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1207534">SUSE bug 1207534</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4304/">CVE-2022-4304 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4304">CVE-2022-4304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990921" comment="libopenssl0_9_8-0.9.8j-0.106.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990922" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990923" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990924" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990925" comment="openssl-0.9.8j-0.106.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990926" comment="openssl-doc-0.9.8j-0.106.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216490" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1179610" ref_url="https://bugzilla.suse.com/1179610" source="BUGZILLA"/>
		<reference ref_id="1205762" ref_url="https://bugzilla.suse.com/1205762" source="BUGZILLA"/>
		<reference ref_id="1210778" ref_url="https://bugzilla.suse.com/1210778" source="BUGZILLA"/>
		<reference ref_id="1212051" ref_url="https://bugzilla.suse.com/1212051" source="BUGZILLA"/>
		<reference ref_id="1212703" ref_url="https://bugzilla.suse.com/1212703" source="BUGZILLA"/>
		<reference ref_id="1215237" ref_url="https://bugzilla.suse.com/1215237" source="BUGZILLA"/>
		<reference ref_id="1215858" ref_url="https://bugzilla.suse.com/1215858" source="BUGZILLA"/>
		<reference ref_id="1215860" ref_url="https://bugzilla.suse.com/1215860" source="BUGZILLA"/>
		<reference ref_id="1216046" ref_url="https://bugzilla.suse.com/1216046" source="BUGZILLA"/>
		<reference ref_id="1216058" ref_url="https://bugzilla.suse.com/1216058" source="BUGZILLA"/>
		<reference ref_id="1216976" ref_url="https://bugzilla.suse.com/1216976" source="BUGZILLA"/>
		<reference ref_id="1217947" ref_url="https://bugzilla.suse.com/1217947" source="BUGZILLA"/>
		<reference ref_id="1218253" ref_url="https://bugzilla.suse.com/1218253" source="BUGZILLA"/>
		<reference ref_id="1218559" ref_url="https://bugzilla.suse.com/1218559" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26555" ref_url="https://www.suse.com/security/cve/CVE-2020-26555/" source="CVE"/>
		<reference ref_id="CVE-2022-45887" ref_url="https://www.suse.com/security/cve/CVE-2022-45887/" source="CVE"/>
		<reference ref_id="CVE-2023-1206" ref_url="https://www.suse.com/security/cve/CVE-2023-1206/" source="CVE"/>
		<reference ref_id="CVE-2023-31085" ref_url="https://www.suse.com/security/cve/CVE-2023-31085/" source="CVE"/>
		<reference ref_id="CVE-2023-3111" ref_url="https://www.suse.com/security/cve/CVE-2023-3111/" source="CVE"/>
		<reference ref_id="CVE-2023-39189" ref_url="https://www.suse.com/security/cve/CVE-2023-39189/" source="CVE"/>
		<reference ref_id="CVE-2023-39192" ref_url="https://www.suse.com/security/cve/CVE-2023-39192/" source="CVE"/>
		<reference ref_id="CVE-2023-39193" ref_url="https://www.suse.com/security/cve/CVE-2023-39193/" source="CVE"/>
		<reference ref_id="CVE-2023-39197" ref_url="https://www.suse.com/security/cve/CVE-2023-39197/" source="CVE"/>
		<reference ref_id="CVE-2023-45863" ref_url="https://www.suse.com/security/cve/CVE-2023-45863/" source="CVE"/>
		<reference ref_id="CVE-2023-51779" ref_url="https://www.suse.com/security/cve/CVE-2023-51779/" source="CVE"/>
		<reference ref_id="CVE-2023-6606" ref_url="https://www.suse.com/security/cve/CVE-2023-6606/" source="CVE"/>
		<reference ref_id="CVE-2023-6932" ref_url="https://www.suse.com/security/cve/CVE-2023-6932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-26555: Fixed Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B that may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN (bsc#1179610 bsc#1215237).
- CVE-2022-45887: Fixed a memory leak in ttusb_dec.c caused by the lack of a dvb_frontend_detach call (bsc#1205762).
- CVE-2023-1206: Fixed a hash collision flaw in the IPv6 connection lookup table which could be exploited by network adjacent attackers, increasing CPU usage by 95% (bsc#1212703).
- CVE-2023-31085: Fixed a divide-by-zero error in do_div(sz,mtd-&gt;erasesize) that could cause a local DoS (bsc#1210778).
- CVE-2023-3111: Fixed a use-after-free vulnerability in prepare_to_relocate in fs/btrfs/relocation.c (bsc#1212051).
- CVE-2023-39189: Fixed a flaw in the Netfilter subsystem that could allow a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure (bsc#1216046).
- CVE-2023-39192: Fixed an out of bounds read in the netfilter (bsc#1215858).
- CVE-2023-39193: Fixed an out of bounds read in the xtables subsystem (bsc#1215860).
- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).
- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).
- CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559).
- CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947).
- CVE-2023-6932: Fixed a use-after-free vulnerability in the Linux kernel's ipv4: igmp component that could lead to local privilege escalation (bsc#1218253).

		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-16"/>
	<updated date="2024-01-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205762">SUSE bug 1205762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210778">SUSE bug 1210778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212051">SUSE bug 1212051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212703">SUSE bug 1212703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215237">SUSE bug 1215237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215858">SUSE bug 1215858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215860">SUSE bug 1215860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216046">SUSE bug 1216046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216058">SUSE bug 1216058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216976">SUSE bug 1216976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217947">SUSE bug 1217947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218253">SUSE bug 1218253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218559">SUSE bug 1218559</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26555/">CVE-2020-26555 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26555">CVE-2020-26555 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45887/">CVE-2022-45887 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45887">CVE-2022-45887 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1206/">CVE-2023-1206 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1206">CVE-2023-1206 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31085/">CVE-2023-31085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31085">CVE-2023-31085 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3111/">CVE-2023-3111 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3111">CVE-2023-3111 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39189/">CVE-2023-39189 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39189">CVE-2023-39189 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39192/">CVE-2023-39192 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39192">CVE-2023-39192 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39193/">CVE-2023-39193 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39193">CVE-2023-39193 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39197/">CVE-2023-39197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39197">CVE-2023-39197 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-45863/">CVE-2023-45863 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45863">CVE-2023-45863 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51779/">CVE-2023-51779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51779">CVE-2023-51779 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6606/">CVE-2023-6606 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6606">CVE-2023-6606 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6932/">CVE-2023-6932 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6932">CVE-2023-6932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990927" comment="kernel-default-3.0.101-108.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990928" comment="kernel-default-base-3.0.101-108.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990930" comment="kernel-ec2-3.0.101-108.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990931" comment="kernel-ec2-base-3.0.101-108.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990933" comment="kernel-source-3.0.101-108.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990934" comment="kernel-syms-3.0.101-108.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990935" comment="kernel-trace-3.0.101-108.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990936" comment="kernel-trace-base-3.0.101-108.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990938" comment="kernel-xen-3.0.101-108.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990939" comment="kernel-xen-base-3.0.101-108.150.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216491" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1210780" ref_url="https://bugzilla.suse.com/1210780" source="BUGZILLA"/>
		<reference ref_id="1213456" ref_url="https://bugzilla.suse.com/1213456" source="BUGZILLA"/>
		<reference ref_id="1218220" ref_url="https://bugzilla.suse.com/1218220" source="BUGZILLA"/>
		<reference ref_id="1218562" ref_url="https://bugzilla.suse.com/1218562" source="BUGZILLA"/>
		<reference ref_id="1218730" ref_url="https://bugzilla.suse.com/1218730" source="BUGZILLA"/>
		<reference ref_id="1218757" ref_url="https://bugzilla.suse.com/1218757" source="BUGZILLA"/>
		<reference ref_id="1219146" ref_url="https://bugzilla.suse.com/1219146" source="BUGZILLA"/>
		<reference ref_id="1219295" ref_url="https://bugzilla.suse.com/1219295" source="BUGZILLA"/>
		<reference ref_id="1219827" ref_url="https://bugzilla.suse.com/1219827" source="BUGZILLA"/>
		<reference ref_id="1220191" ref_url="https://bugzilla.suse.com/1220191" source="BUGZILLA"/>
		<reference ref_id="1220238" ref_url="https://bugzilla.suse.com/1220238" source="BUGZILLA"/>
		<reference ref_id="1220241" ref_url="https://bugzilla.suse.com/1220241" source="BUGZILLA"/>
		<reference ref_id="1220416" ref_url="https://bugzilla.suse.com/1220416" source="BUGZILLA"/>
		<reference ref_id="1220418" ref_url="https://bugzilla.suse.com/1220418" source="BUGZILLA"/>
		<reference ref_id="1220444" ref_url="https://bugzilla.suse.com/1220444" source="BUGZILLA"/>
		<reference ref_id="1220649" ref_url="https://bugzilla.suse.com/1220649" source="BUGZILLA"/>
		<reference ref_id="1221044" ref_url="https://bugzilla.suse.com/1221044" source="BUGZILLA"/>
		<reference ref_id="1221088" ref_url="https://bugzilla.suse.com/1221088" source="BUGZILLA"/>
		<reference ref_id="1221578" ref_url="https://bugzilla.suse.com/1221578" source="BUGZILLA"/>
		<reference ref_id="1221598" ref_url="https://bugzilla.suse.com/1221598" source="BUGZILLA"/>
		<reference ref_id="1222585" ref_url="https://bugzilla.suse.com/1222585" source="BUGZILLA"/>
		<reference ref_id="1222619" ref_url="https://bugzilla.suse.com/1222619" source="BUGZILLA"/>
		<reference ref_id="1223016" ref_url="https://bugzilla.suse.com/1223016" source="BUGZILLA"/>
		<reference ref_id="1223824" ref_url="https://bugzilla.suse.com/1223824" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46904" ref_url="https://www.suse.com/security/cve/CVE-2021-46904/" source="CVE"/>
		<reference ref_id="CVE-2021-46905" ref_url="https://www.suse.com/security/cve/CVE-2021-46905/" source="CVE"/>
		<reference ref_id="CVE-2021-46932" ref_url="https://www.suse.com/security/cve/CVE-2021-46932/" source="CVE"/>
		<reference ref_id="CVE-2022-48619" ref_url="https://www.suse.com/security/cve/CVE-2022-48619/" source="CVE"/>
		<reference ref_id="CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746/" source="CVE"/>
		<reference ref_id="CVE-2023-31083" ref_url="https://www.suse.com/security/cve/CVE-2023-31083/" source="CVE"/>
		<reference ref_id="CVE-2023-51780" ref_url="https://www.suse.com/security/cve/CVE-2023-51780/" source="CVE"/>
		<reference ref_id="CVE-2023-51782" ref_url="https://www.suse.com/security/cve/CVE-2023-51782/" source="CVE"/>
		<reference ref_id="CVE-2023-52340" ref_url="https://www.suse.com/security/cve/CVE-2023-52340/" source="CVE"/>
		<reference ref_id="CVE-2023-52429" ref_url="https://www.suse.com/security/cve/CVE-2023-52429/" source="CVE"/>
		<reference ref_id="CVE-2023-52445" ref_url="https://www.suse.com/security/cve/CVE-2023-52445/" source="CVE"/>
		<reference ref_id="CVE-2023-52449" ref_url="https://www.suse.com/security/cve/CVE-2023-52449/" source="CVE"/>
		<reference ref_id="CVE-2023-52475" ref_url="https://www.suse.com/security/cve/CVE-2023-52475/" source="CVE"/>
		<reference ref_id="CVE-2023-52590" ref_url="https://www.suse.com/security/cve/CVE-2023-52590/" source="CVE"/>
		<reference ref_id="CVE-2023-52591" ref_url="https://www.suse.com/security/cve/CVE-2023-52591/" source="CVE"/>
		<reference ref_id="CVE-2023-6270" ref_url="https://www.suse.com/security/cve/CVE-2023-6270/" source="CVE"/>
		<reference ref_id="CVE-2024-23851" ref_url="https://www.suse.com/security/cve/CVE-2024-23851/" source="CVE"/>
		<reference ref_id="CVE-2024-26733" ref_url="https://www.suse.com/security/cve/CVE-2024-26733/" source="CVE"/>
		<reference ref_id="CVE-2024-26898" ref_url="https://www.suse.com/security/cve/CVE-2024-26898/" source="CVE"/>
		<reference ref_id="CVE-2024-27043" ref_url="https://www.suse.com/security/cve/CVE-2024-27043/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).
- CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).
- CVE-2022-48619: Fixed a denial-of-service issue in drivers/input/input.c (bsc#1218220).
- CVE-2021-46904: Fixed NULL pointer dereference during tty device unregistration (bsc#1220416).
- CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).
- CVE-2021-46905: Fixed NULL pointer dereference on disconnect regression (bsc#1220418).
- CVE-2023-52340: Fixed a denial of service related to ICMPv6 'Packet Too Big' packets (bsc#1219295).
- CVE-2021-46932: Initialized work before appletouch device registration (bsc#1220444).
- CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl notifier (bsc#1220238).
- CVE-2023-52475: Fixed a use-after-free in powermate_config_complete() (bsc#1220649).
- CVE-2023-52445: Fixed a use-after-free on context disconnection in pvrusb2 (bsc#1220241).
- CVE-2023-52429: Limited the number of targets and parameter size area for device mapper (bsc#1219146).
- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl() related to a vcc_recvmsg race condition (bsc#1218730).
- CVE-2023-51782: Fixed a use-after-free in rose_ioctl() related to a rose_accept race condition (bsc#1218757).
- CVE-2023-31083: Fixed a NULL pointer dereference in hci_uart_tty_ioctl() (bsc#1210780).

The following non-security bugs were fixed:

- KVM: VMX: Move VERW closer to VMentry for MDS mitigation (git-fixes).
- KVM: VMX: Use BT+JNC, i.e. EFLAGS.CF to select VMRESUME vs. VMLAUNCH (git-fixes).
- tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (bsc#1222619).
- x86/asm: Add _ASM_RIP() macro for x86-64 (%rip) suffix (git-fixes).
- x86/bugs: Add asm helpers for executing VERW (bsc#1213456).
- x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key (git-fixes).
- x86/entry_32: Add VERW just before userspace transition (git-fixes).
- x86/entry_64: Add VERW just before userspace transition (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210780">SUSE bug 1210780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213456">SUSE bug 1213456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218220">SUSE bug 1218220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218562">SUSE bug 1218562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218730">SUSE bug 1218730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218757">SUSE bug 1218757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219146">SUSE bug 1219146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219295">SUSE bug 1219295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219827">SUSE bug 1219827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220191">SUSE bug 1220191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220238">SUSE bug 1220238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220241">SUSE bug 1220241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220416">SUSE bug 1220416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220418">SUSE bug 1220418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220444">SUSE bug 1220444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220649">SUSE bug 1220649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221044">SUSE bug 1221044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221088">SUSE bug 1221088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221578">SUSE bug 1221578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221598">SUSE bug 1221598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222585">SUSE bug 1222585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222619">SUSE bug 1222619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223016">SUSE bug 1223016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223824">SUSE bug 1223824</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46904/">CVE-2021-46904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46904">CVE-2021-46904 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46905/">CVE-2021-46905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46905">CVE-2021-46905 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46932/">CVE-2021-46932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46932">CVE-2021-46932 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48619/">CVE-2022-48619 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48619">CVE-2022-48619 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31083/">CVE-2023-31083 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31083">CVE-2023-31083 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51780/">CVE-2023-51780 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51780">CVE-2023-51780 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51782/">CVE-2023-51782 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51782">CVE-2023-51782 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52340/">CVE-2023-52340 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52340">CVE-2023-52340 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52429/">CVE-2023-52429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52429">CVE-2023-52429 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52445/">CVE-2023-52445 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52445">CVE-2023-52445 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52449/">CVE-2023-52449 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52449">CVE-2023-52449 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52475/">CVE-2023-52475 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52475">CVE-2023-52475 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52590/">CVE-2023-52590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52590">CVE-2023-52590 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52591/">CVE-2023-52591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52591">CVE-2023-52591 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6270/">CVE-2023-6270 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6270">CVE-2023-6270 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23851/">CVE-2024-23851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23851">CVE-2024-23851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26733/">CVE-2024-26733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26733">CVE-2024-26733 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26898/">CVE-2024-26898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26898">CVE-2024-26898 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27043/">CVE-2024-27043 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27043">CVE-2024-27043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990941" comment="kernel-default-3.0.101-108.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990942" comment="kernel-default-base-3.0.101-108.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990944" comment="kernel-ec2-3.0.101-108.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990945" comment="kernel-ec2-base-3.0.101-108.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990947" comment="kernel-source-3.0.101-108.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990948" comment="kernel-syms-3.0.101-108.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990949" comment="kernel-trace-3.0.101-108.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990950" comment="kernel-trace-base-3.0.101-108.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990952" comment="kernel-xen-3.0.101-108.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990953" comment="kernel-xen-base-3.0.101-108.153.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216492" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1222992" ref_url="https://bugzilla.suse.com/1222992" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-2961" ref_url="https://www.suse.com/security/cve/CVE-2024-2961/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1728-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035325.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2024-2961: iconv: ISO-2022-CN-EXT: fix out-of-bound writes when writing escape sequence (bsc#1222992)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-05-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222992">SUSE bug 1222992</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-2961/">CVE-2024-2961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2961">CVE-2024-2961 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990955" comment="glibc-2.11.3-17.110.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990956" comment="glibc-32bit-2.11.3-17.110.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990957" comment="glibc-devel-2.11.3-17.110.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990958" comment="glibc-devel-32bit-2.11.3-17.110.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990959" comment="glibc-html-2.11.3-17.110.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990960" comment="glibc-i18ndata-2.11.3-17.110.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990961" comment="glibc-info-2.11.3-17.110.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990962" comment="glibc-locale-2.11.3-17.110.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990963" comment="glibc-locale-32bit-2.11.3-17.110.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990964" comment="glibc-profile-2.11.3-17.110.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990965" comment="glibc-profile-32bit-2.11.3-17.110.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990966" comment="nscd-2.11.3-17.110.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216493" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1220960" ref_url="https://bugzilla.suse.com/1220960" source="BUGZILLA"/>
		<reference ref_id="1222619" ref_url="https://bugzilla.suse.com/1222619" source="BUGZILLA"/>
		<reference ref_id="1224904" ref_url="https://bugzilla.suse.com/1224904" source="BUGZILLA"/>
		<reference ref_id="1225026" ref_url="https://bugzilla.suse.com/1225026" source="BUGZILLA"/>
		<reference ref_id="1225030" ref_url="https://bugzilla.suse.com/1225030" source="BUGZILLA"/>
		<reference ref_id="1225060" ref_url="https://bugzilla.suse.com/1225060" source="BUGZILLA"/>
		<reference ref_id="1225177" ref_url="https://bugzilla.suse.com/1225177" source="BUGZILLA"/>
		<reference ref_id="1225208" ref_url="https://bugzilla.suse.com/1225208" source="BUGZILLA"/>
		<reference ref_id="1225318" ref_url="https://bugzilla.suse.com/1225318" source="BUGZILLA"/>
		<reference ref_id="1225411" ref_url="https://bugzilla.suse.com/1225411" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-47104" ref_url="https://www.suse.com/security/cve/CVE-2021-47104/" source="CVE"/>
		<reference ref_id="CVE-2021-47321" ref_url="https://www.suse.com/security/cve/CVE-2021-47321/" source="CVE"/>
		<reference ref_id="CVE-2021-47323" ref_url="https://www.suse.com/security/cve/CVE-2021-47323/" source="CVE"/>
		<reference ref_id="CVE-2021-47324" ref_url="https://www.suse.com/security/cve/CVE-2021-47324/" source="CVE"/>
		<reference ref_id="CVE-2021-47347" ref_url="https://www.suse.com/security/cve/CVE-2021-47347/" source="CVE"/>
		<reference ref_id="CVE-2021-47383" ref_url="https://www.suse.com/security/cve/CVE-2021-47383/" source="CVE"/>
		<reference ref_id="CVE-2021-47391" ref_url="https://www.suse.com/security/cve/CVE-2021-47391/" source="CVE"/>
		<reference ref_id="CVE-2021-47485" ref_url="https://www.suse.com/security/cve/CVE-2021-47485/" source="CVE"/>
		<reference ref_id="CVE-2021-47511" ref_url="https://www.suse.com/security/cve/CVE-2021-47511/" source="CVE"/>
		<reference ref_id="CVE-2023-52880" ref_url="https://www.suse.com/security/cve/CVE-2023-52880/" source="CVE"/>
		<reference ref_id="CVE-2024-26929" ref_url="https://www.suse.com/security/cve/CVE-2024-26929/" source="CVE"/>
		<reference ref_id="CVE-2024-26930" ref_url="https://www.suse.com/security/cve/CVE-2024-26930/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2021-47104: Fixed memory leak in qib_user_sdma_queue_pkts() (bsc#1220960).
- CVE-2021-47321: Fixed possible use-after-free by calling  del_timer_sync() (bsc#1225060).
- CVE-2021-47324: Fixed possible use-after-free in wdt_startup()  (bsc#1225030).
- CVE-2021-47323: Fixed possible use-after-free in  wdt_turnoff() (bsc#1225026).
- CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit (bsc#1225208).
- CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).
- CVE-2021-47391: Ensure rdma_addr_cancel() happens before issuing more requests (bsc#1225318)
- CVE-2021-47347: Fixed possible buffer overflow in wl1251_cmd_scan  (bsc#1225177).

		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-11"/>
	<updated date="2024-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220960">SUSE bug 1220960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222619">SUSE bug 1222619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224904">SUSE bug 1224904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225026">SUSE bug 1225026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225030">SUSE bug 1225030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225060">SUSE bug 1225060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225177">SUSE bug 1225177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225208">SUSE bug 1225208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225318">SUSE bug 1225318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225411">SUSE bug 1225411</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47104/">CVE-2021-47104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47104">CVE-2021-47104 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47321/">CVE-2021-47321 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47321">CVE-2021-47321 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47323/">CVE-2021-47323 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47323">CVE-2021-47323 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47324/">CVE-2021-47324 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47324">CVE-2021-47324 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47347/">CVE-2021-47347 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47347">CVE-2021-47347 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47383/">CVE-2021-47383 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47383">CVE-2021-47383 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47391/">CVE-2021-47391 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47391">CVE-2021-47391 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47485/">CVE-2021-47485 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47485">CVE-2021-47485 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47511/">CVE-2021-47511 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47511">CVE-2021-47511 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52880/">CVE-2023-52880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52880">CVE-2023-52880 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26929/">CVE-2024-26929 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26929">CVE-2024-26929 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26930/">CVE-2024-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26930">CVE-2024-26930 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990967" comment="kernel-default-3.0.101-108.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990968" comment="kernel-default-base-3.0.101-108.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990970" comment="kernel-ec2-3.0.101-108.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990971" comment="kernel-ec2-base-3.0.101-108.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990973" comment="kernel-source-3.0.101-108.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990974" comment="kernel-syms-3.0.101-108.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990975" comment="kernel-trace-3.0.101-108.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990976" comment="kernel-trace-base-3.0.101-108.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990978" comment="kernel-xen-3.0.101-108.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990979" comment="kernel-xen-base-3.0.101-108.156.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216494" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1197439" ref_url="https://bugzilla.suse.com/1197439" source="BUGZILLA"/>
		<reference ref_id="1222824" ref_url="https://bugzilla.suse.com/1222824" source="BUGZILLA"/>
		<reference ref_id="1223384" ref_url="https://bugzilla.suse.com/1223384" source="BUGZILLA"/>
		<reference ref_id="1225431" ref_url="https://bugzilla.suse.com/1225431" source="BUGZILLA"/>
		<reference ref_id="1225487" ref_url="https://bugzilla.suse.com/1225487" source="BUGZILLA"/>
		<reference ref_id="1225611" ref_url="https://bugzilla.suse.com/1225611" source="BUGZILLA"/>
		<reference ref_id="1225866" ref_url="https://bugzilla.suse.com/1225866" source="BUGZILLA"/>
		<reference ref_id="1226550" ref_url="https://bugzilla.suse.com/1226550" source="BUGZILLA"/>
		<reference ref_id="1226575" ref_url="https://bugzilla.suse.com/1226575" source="BUGZILLA"/>
		<reference ref_id="1226670" ref_url="https://bugzilla.suse.com/1226670" source="BUGZILLA"/>
		<reference ref_id="1226848" ref_url="https://bugzilla.suse.com/1226848" source="BUGZILLA"/>
		<reference ref_id="1227154" ref_url="https://bugzilla.suse.com/1227154" source="BUGZILLA"/>
		<reference ref_id="1228743" ref_url="https://bugzilla.suse.com/1228743" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-20022" ref_url="https://www.suse.com/security/cve/CVE-2016-20022/" source="CVE"/>
		<reference ref_id="CVE-2021-43389" ref_url="https://www.suse.com/security/cve/CVE-2021-43389/" source="CVE"/>
		<reference ref_id="CVE-2021-4439" ref_url="https://www.suse.com/security/cve/CVE-2021-4439/" source="CVE"/>
		<reference ref_id="CVE-2021-47219" ref_url="https://www.suse.com/security/cve/CVE-2021-47219/" source="CVE"/>
		<reference ref_id="CVE-2021-47520" ref_url="https://www.suse.com/security/cve/CVE-2021-47520/" source="CVE"/>
		<reference ref_id="CVE-2021-47580" ref_url="https://www.suse.com/security/cve/CVE-2021-47580/" source="CVE"/>
		<reference ref_id="CVE-2021-47600" ref_url="https://www.suse.com/security/cve/CVE-2021-47600/" source="CVE"/>
		<reference ref_id="CVE-2023-52752" ref_url="https://www.suse.com/security/cve/CVE-2023-52752/" source="CVE"/>
		<reference ref_id="CVE-2023-52881" ref_url="https://www.suse.com/security/cve/CVE-2023-52881/" source="CVE"/>
		<reference ref_id="CVE-2024-26923" ref_url="https://www.suse.com/security/cve/CVE-2024-26923/" source="CVE"/>
		<reference ref_id="CVE-2024-36964" ref_url="https://www.suse.com/security/cve/CVE-2024-36964/" source="CVE"/>
		<reference ref_id="CVE-2024-38599" ref_url="https://www.suse.com/security/cve/CVE-2024-38599/" source="CVE"/>
		<reference ref_id="CVE-2024-42145" ref_url="https://www.suse.com/security/cve/CVE-2024-42145/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743)
- CVE-2021-47580: scsi: scsi_debug: Fix type in min_t to avoid stack OOB (bsc#1226550).
- CVE-2021-47219: scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs() (bsc#1222824).
- CVE-2021-47520: can: pch_can: pch_can_rx_normal: fix use after free (bsc#1225431).
- CVE-2021-47600: dm btree remove: fix use after free in rebalance_children() (bsc#1226575).
- CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611).
- CVE-2024-38599: jffs2: prevent xattr node from overflowing the eraseblock (bsc#1226848).
- CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487).
- CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1225866).
- CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384).

The following non-security bugs were fixed:

- af_unix: Do not use atomic ops for unix_sk(sk)-&gt;inflight (bsc#1223384).
- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
- af_unix: annote lockless accesses to unix_tot_inflight &amp; gc_in_progress (bsc#1223384).
- kvm: prevent kvm_clock time-warps (bsc#1197439).
- net: unix: properly re-increment inflight counter of GC discarded candidates (bsc#1223384).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-13"/>
	<updated date="2024-08-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197439">SUSE bug 1197439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222824">SUSE bug 1222824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223384">SUSE bug 1223384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225431">SUSE bug 1225431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225487">SUSE bug 1225487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225611">SUSE bug 1225611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225866">SUSE bug 1225866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226550">SUSE bug 1226550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226575">SUSE bug 1226575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226670">SUSE bug 1226670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226848">SUSE bug 1226848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227154">SUSE bug 1227154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228743">SUSE bug 1228743</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-20022/">CVE-2016-20022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-20022">CVE-2016-20022 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43389/">CVE-2021-43389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43389">CVE-2021-43389 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-4439/">CVE-2021-4439 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4439">CVE-2021-4439 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47219/">CVE-2021-47219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47219">CVE-2021-47219 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47520/">CVE-2021-47520 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47520">CVE-2021-47520 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47580/">CVE-2021-47580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47580">CVE-2021-47580 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47600/">CVE-2021-47600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47600">CVE-2021-47600 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52752/">CVE-2023-52752 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52752">CVE-2023-52752 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52881/">CVE-2023-52881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52881">CVE-2023-52881 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26923/">CVE-2024-26923 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26923">CVE-2024-26923 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36964/">CVE-2024-36964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36964">CVE-2024-36964 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38599/">CVE-2024-38599 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38599">CVE-2024-38599 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42145/">CVE-2024-42145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42145">CVE-2024-42145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990981" comment="kernel-default-3.0.101-108.159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990982" comment="kernel-default-base-3.0.101-108.159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990984" comment="kernel-ec2-3.0.101-108.159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990985" comment="kernel-ec2-base-3.0.101-108.159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990987" comment="kernel-source-3.0.101-108.159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990988" comment="kernel-syms-3.0.101-108.159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990989" comment="kernel-trace-3.0.101-108.159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990990" comment="kernel-trace-base-3.0.101-108.159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990992" comment="kernel-xen-3.0.101-108.159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990993" comment="kernel-xen-base-3.0.101-108.159.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216495" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1227138" ref_url="https://bugzilla.suse.com/1227138" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-5535" ref_url="https://www.suse.com/security/cve/CVE-2024-5535/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019295.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1227138">SUSE bug 1227138</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-5535/">CVE-2024-5535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5535">CVE-2024-5535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990995" comment="libopenssl1-devel-1.0.1g-0.58.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990996" comment="libopenssl1_0_0-1.0.1g-0.58.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990997" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990998" comment="openssl1-1.0.1g-0.58.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990999" comment="openssl1-doc-1.0.1g-0.58.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216496" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1202346" ref_url="https://bugzilla.suse.com/1202346" source="BUGZILLA"/>
		<reference ref_id="1227985" ref_url="https://bugzilla.suse.com/1227985" source="BUGZILLA"/>
		<reference ref_id="1228002" ref_url="https://bugzilla.suse.com/1228002" source="BUGZILLA"/>
		<reference ref_id="1228938" ref_url="https://bugzilla.suse.com/1228938" source="BUGZILLA"/>
		<reference ref_id="1228959" ref_url="https://bugzilla.suse.com/1228959" source="BUGZILLA"/>
		<reference ref_id="1229454" ref_url="https://bugzilla.suse.com/1229454" source="BUGZILLA"/>
		<reference ref_id="1229456" ref_url="https://bugzilla.suse.com/1229456" source="BUGZILLA"/>
		<reference ref_id="1229503" ref_url="https://bugzilla.suse.com/1229503" source="BUGZILLA"/>
		<reference ref_id="1229657" ref_url="https://bugzilla.suse.com/1229657" source="BUGZILLA"/>
		<reference ref_id="1229707" ref_url="https://bugzilla.suse.com/1229707" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20368" ref_url="https://www.suse.com/security/cve/CVE-2022-20368/" source="CVE"/>
		<reference ref_id="CVE-2022-48791" ref_url="https://www.suse.com/security/cve/CVE-2022-48791/" source="CVE"/>
		<reference ref_id="CVE-2022-48839" ref_url="https://www.suse.com/security/cve/CVE-2022-48839/" source="CVE"/>
		<reference ref_id="CVE-2022-48919" ref_url="https://www.suse.com/security/cve/CVE-2022-48919/" source="CVE"/>
		<reference ref_id="CVE-2024-42232" ref_url="https://www.suse.com/security/cve/CVE-2024-42232/" source="CVE"/>
		<reference ref_id="CVE-2024-43882" ref_url="https://www.suse.com/security/cve/CVE-2024-43882/" source="CVE"/>
		<reference ref_id="CVE-2024-43883" ref_url="https://www.suse.com/security/cve/CVE-2024-43883/" source="CVE"/>
		<reference ref_id="CVE-2024-44947" ref_url="https://www.suse.com/security/cve/CVE-2024-44947/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3467-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037088.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2022-48791: Fix use-after-free for aborted TMF sas_task (bsc#1228002)
- CVE-2022-48919: Fix double free race when mount fails in cifs_get_root() (bsc#1229657).
- CVE-2024-44947: Initialize beyond-EOF page contents before setting uptodate (bsc#1229454).
- CVE-2024-43883: Do not drop references before new references are gained (bsc#1229707).
- CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage. (bsc#1229503)
- CVE-2024-42232: Fixed a race between delayed_work() and ceph_monc_stop(). (bsc#1228959)

The following non-security bugs were fixed:

- fuse: fix SetPageUptodate() condition in STORE (bsc#1229456).
- reiserfs: fix 'new_insert_key may be used uninitialized ...' (bsc#1228938).
- scsi: pm80xx: Fix TMF task completion race condition (bsc#1228002)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-27"/>
	<updated date="2024-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202346">SUSE bug 1202346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227985">SUSE bug 1227985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228002">SUSE bug 1228002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228938">SUSE bug 1228938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228959">SUSE bug 1228959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229454">SUSE bug 1229454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229456">SUSE bug 1229456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229503">SUSE bug 1229503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229657">SUSE bug 1229657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229707">SUSE bug 1229707</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20368/">CVE-2022-20368 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20368">CVE-2022-20368 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48791/">CVE-2022-48791 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48791">CVE-2022-48791 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48839/">CVE-2022-48839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48839">CVE-2022-48839 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48919/">CVE-2022-48919 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48919">CVE-2022-48919 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42232/">CVE-2024-42232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42232">CVE-2024-42232 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-43882/">CVE-2024-43882 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43882">CVE-2024-43882 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43883/">CVE-2024-43883 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43883">CVE-2024-43883 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44947/">CVE-2024-44947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44947">CVE-2024-44947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991000" comment="kernel-default-3.0.101-108.162.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991001" comment="kernel-default-base-3.0.101-108.162.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991003" comment="kernel-ec2-3.0.101-108.162.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991004" comment="kernel-ec2-base-3.0.101-108.162.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991006" comment="kernel-source-3.0.101-108.162.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991007" comment="kernel-syms-3.0.101-108.162.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991008" comment="kernel-trace-3.0.101-108.162.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991009" comment="kernel-trace-base-3.0.101-108.162.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991011" comment="kernel-xen-3.0.101-108.162.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991012" comment="kernel-xen-base-3.0.101-108.162.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216497" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1214298" ref_url="https://bugzilla.suse.com/1214298" source="BUGZILLA"/>
		<reference ref_id="1226606" ref_url="https://bugzilla.suse.com/1226606" source="BUGZILLA"/>
		<reference ref_id="1227764" ref_url="https://bugzilla.suse.com/1227764" source="BUGZILLA"/>
		<reference ref_id="1228487" ref_url="https://bugzilla.suse.com/1228487" source="BUGZILLA"/>
		<reference ref_id="1228654" ref_url="https://bugzilla.suse.com/1228654" source="BUGZILLA"/>
		<reference ref_id="1230434" ref_url="https://bugzilla.suse.com/1230434" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-38538" ref_url="https://www.suse.com/security/cve/CVE-2024-38538/" source="CVE"/>
		<reference ref_id="CVE-2024-40902" ref_url="https://www.suse.com/security/cve/CVE-2024-40902/" source="CVE"/>
		<reference ref_id="CVE-2024-42104" ref_url="https://www.suse.com/security/cve/CVE-2024-42104/" source="CVE"/>
		<reference ref_id="CVE-2024-42148" ref_url="https://www.suse.com/security/cve/CVE-2024-42148/" source="CVE"/>
		<reference ref_id="CVE-2024-45021" ref_url="https://www.suse.com/security/cve/CVE-2024-45021/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019595.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len bytes (bsc#1226606).
- CVE-2024-40902: jfs: xattr: fix buffer overflow for invalid xattr (bsc#1227764).
- CVE-2024-42104: nilfs2: add missing check for inode numbers on directory entries  (bsc#1228654).
- CVE-2024-42148: Fix multiple UBSAN array-index-out-of-bounds (bsc#1228487).
- CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434).

The following non-security bugs were fixed:

- alarmtimer: Lock k_itimer during timer callback (bsc#1214298).
- alarmtimers: Add alarm_forward functionality (bsc#1214298).
- alarmtimers: Change alarmtimer functions to return alarmtimer_restart (bsc#1214298).
- alarmtimers: Push rearming peroidic timers down into alamrtimer (bsc#1214298).
- alarmtimers: Remove interval cap limit hack (bsc#1214298).
- kABI fix for alarmtimer_restart functionality (bsc#1214298).
- kABI fix update for alarm_forward (bsc#1214298).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-14"/>
	<updated date="2024-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214298">SUSE bug 1214298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226606">SUSE bug 1226606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227764">SUSE bug 1227764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228487">SUSE bug 1228487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228654">SUSE bug 1228654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230434">SUSE bug 1230434</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38538/">CVE-2024-38538 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38538">CVE-2024-38538 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-40902/">CVE-2024-40902 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40902">CVE-2024-40902 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42104/">CVE-2024-42104 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42104">CVE-2024-42104 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42148/">CVE-2024-42148 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42148">CVE-2024-42148 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45021/">CVE-2024-45021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45021">CVE-2024-45021 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991014" comment="kernel-default-3.0.101-108.165.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991015" comment="kernel-default-base-3.0.101-108.165.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991017" comment="kernel-ec2-3.0.101-108.165.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991018" comment="kernel-ec2-base-3.0.101-108.165.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991020" comment="kernel-source-3.0.101-108.165.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991021" comment="kernel-syms-3.0.101-108.165.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991022" comment="kernel-trace-3.0.101-108.165.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991023" comment="kernel-trace-base-3.0.101-108.165.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991025" comment="kernel-xen-3.0.101-108.165.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991026" comment="kernel-xen-base-3.0.101-108.165.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216498" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1218562" ref_url="https://bugzilla.suse.com/1218562" source="BUGZILLA"/>
		<reference ref_id="1223016" ref_url="https://bugzilla.suse.com/1223016" source="BUGZILLA"/>
		<reference ref_id="1223384" ref_url="https://bugzilla.suse.com/1223384" source="BUGZILLA"/>
		<reference ref_id="1223824" ref_url="https://bugzilla.suse.com/1223824" source="BUGZILLA"/>
		<reference ref_id="1224526" ref_url="https://bugzilla.suse.com/1224526" source="BUGZILLA"/>
		<reference ref_id="1226557" ref_url="https://bugzilla.suse.com/1226557" source="BUGZILLA"/>
		<reference ref_id="1226848" ref_url="https://bugzilla.suse.com/1226848" source="BUGZILLA"/>
		<reference ref_id="1228743" ref_url="https://bugzilla.suse.com/1228743" source="BUGZILLA"/>
		<reference ref_id="1229454" ref_url="https://bugzilla.suse.com/1229454" source="BUGZILLA"/>
		<reference ref_id="1229456" ref_url="https://bugzilla.suse.com/1229456" source="BUGZILLA"/>
		<reference ref_id="1231673" ref_url="https://bugzilla.suse.com/1231673" source="BUGZILLA"/>
		<reference ref_id="1231861" ref_url="https://bugzilla.suse.com/1231861" source="BUGZILLA"/>
		<reference ref_id="1232097" ref_url="https://bugzilla.suse.com/1232097" source="BUGZILLA"/>
		<reference ref_id="1232187" ref_url="https://bugzilla.suse.com/1232187" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-47589" ref_url="https://www.suse.com/security/cve/CVE-2021-47589/" source="CVE"/>
		<reference ref_id="CVE-2023-6270" ref_url="https://www.suse.com/security/cve/CVE-2023-6270/" source="CVE"/>
		<reference ref_id="CVE-2024-26898" ref_url="https://www.suse.com/security/cve/CVE-2024-26898/" source="CVE"/>
		<reference ref_id="CVE-2024-27043" ref_url="https://www.suse.com/security/cve/CVE-2024-27043/" source="CVE"/>
		<reference ref_id="CVE-2024-35937" ref_url="https://www.suse.com/security/cve/CVE-2024-35937/" source="CVE"/>
		<reference ref_id="CVE-2024-38599" ref_url="https://www.suse.com/security/cve/CVE-2024-38599/" source="CVE"/>
		<reference ref_id="CVE-2024-42145" ref_url="https://www.suse.com/security/cve/CVE-2024-42145/" source="CVE"/>
		<reference ref_id="CVE-2024-44947" ref_url="https://www.suse.com/security/cve/CVE-2024-44947/" source="CVE"/>
		<reference ref_id="CVE-2024-47674" ref_url="https://www.suse.com/security/cve/CVE-2024-47674/" source="CVE"/>
		<reference ref_id="CVE-2024-47757" ref_url="https://www.suse.com/security/cve/CVE-2024-47757/" source="CVE"/>
		<reference ref_id="CVE-2024-49860" ref_url="https://www.suse.com/security/cve/CVE-2024-49860/" source="CVE"/>
		<reference ref_id="CVE-2024-49982" ref_url="https://www.suse.com/security/cve/CVE-2024-49982/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2021-47589: igbvf: fix double free in `igbvf_probe` (bsc#1226557).
- CVE-2024-35937: wifi: cfg80211: check A-MSDU format more carefully (bsc#1224526).
- CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231673).
- CVE-2024-47757: nilfs2: fix potential oob read in nilfs_btree_check_delete() (bsc#1232187).
- CVE-2024-49860: ACPI: sysfs: validate return type of _STR method (bsc#1231861).

The following non-security bugs were fixed:

- config: Disable NILFS2 (bsc#1232187)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-19"/>
	<updated date="2024-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218562">SUSE bug 1218562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223016">SUSE bug 1223016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223384">SUSE bug 1223384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223824">SUSE bug 1223824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224526">SUSE bug 1224526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226557">SUSE bug 1226557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226848">SUSE bug 1226848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228743">SUSE bug 1228743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229454">SUSE bug 1229454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229456">SUSE bug 1229456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231673">SUSE bug 1231673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231861">SUSE bug 1231861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232097">SUSE bug 1232097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232187">SUSE bug 1232187</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47589/">CVE-2021-47589 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47589">CVE-2021-47589 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6270/">CVE-2023-6270 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6270">CVE-2023-6270 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26898/">CVE-2024-26898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26898">CVE-2024-26898 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27043/">CVE-2024-27043 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27043">CVE-2024-27043 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35937/">CVE-2024-35937 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35937">CVE-2024-35937 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38599/">CVE-2024-38599 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38599">CVE-2024-38599 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42145/">CVE-2024-42145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42145">CVE-2024-42145 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44947/">CVE-2024-44947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44947">CVE-2024-44947 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47674/">CVE-2024-47674 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47674">CVE-2024-47674 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47757/">CVE-2024-47757 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47757">CVE-2024-47757 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49860/">CVE-2024-49860 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49860">CVE-2024-49860 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49982/">CVE-2024-49982 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49982">CVE-2024-49982 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991028" comment="kernel-default-3.0.101-108.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991029" comment="kernel-default-base-3.0.101-108.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991031" comment="kernel-ec2-3.0.101-108.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991032" comment="kernel-ec2-base-3.0.101-108.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991034" comment="kernel-source-3.0.101-108.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991035" comment="kernel-syms-3.0.101-108.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991036" comment="kernel-trace-3.0.101-108.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991037" comment="kernel-trace-base-3.0.101-108.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991039" comment="kernel-xen-3.0.101-108.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991040" comment="kernel-xen-base-3.0.101-108.168.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216499" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1232432" ref_url="https://bugzilla.suse.com/1232432" source="BUGZILLA"/>
		<reference ref_id="1233479" ref_url="https://bugzilla.suse.com/1233479" source="BUGZILLA"/>
		<reference ref_id="1233557" ref_url="https://bugzilla.suse.com/1233557" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-49995" ref_url="https://www.suse.com/security/cve/CVE-2024-49995/" source="CVE"/>
		<reference ref_id="CVE-2024-50290" ref_url="https://www.suse.com/security/cve/CVE-2024-50290/" source="CVE"/>
		<reference ref_id="CVE-2024-53063" ref_url="https://www.suse.com/security/cve/CVE-2024-53063/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020041.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432).
- CVE-2024-50290: media: cx24116: prevent overflows on SNR calculus (bsc#1233479).
- CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access (bsc#1233557).

		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-20"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1232432">SUSE bug 1232432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233479">SUSE bug 1233479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233557">SUSE bug 1233557</bugzilla>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49995/">CVE-2024-49995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49995">CVE-2024-49995 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50290/">CVE-2024-50290 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50290">CVE-2024-50290 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53063/">CVE-2024-53063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53063">CVE-2024-53063 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991042" comment="kernel-default-3.0.101-108.171.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991043" comment="kernel-default-base-3.0.101-108.171.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991045" comment="kernel-ec2-3.0.101-108.171.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991046" comment="kernel-ec2-base-3.0.101-108.171.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991048" comment="kernel-source-3.0.101-108.171.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991049" comment="kernel-syms-3.0.101-108.171.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991050" comment="kernel-trace-3.0.101-108.171.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991051" comment="kernel-trace-base-3.0.101-108.171.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991053" comment="kernel-xen-3.0.101-108.171.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991054" comment="kernel-xen-base-3.0.101-108.171.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216500" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1018158" ref_url="https://bugzilla.suse.com/1018158" source="BUGZILLA"/>
		<reference ref_id="1178386" ref_url="https://bugzilla.suse.com/1178386" source="BUGZILLA"/>
		<reference ref_id="1179694" ref_url="https://bugzilla.suse.com/1179694" source="BUGZILLA"/>
		<reference ref_id="1179721" ref_url="https://bugzilla.suse.com/1179721" source="BUGZILLA"/>
		<reference ref_id="1181505" ref_url="https://bugzilla.suse.com/1181505" source="BUGZILLA"/>
		<reference ref_id="1182117" ref_url="https://bugzilla.suse.com/1182117" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25013" ref_url="https://www.suse.com/security/cve/CVE-2019-25013/" source="CVE"/>
		<reference ref_id="CVE-2020-27618" ref_url="https://www.suse.com/security/cve/CVE-2020-27618/" source="CVE"/>
		<reference ref_id="CVE-2020-29562" ref_url="https://www.suse.com/security/cve/CVE-2020-29562/" source="CVE"/>
		<reference ref_id="CVE-2020-29573" ref_url="https://www.suse.com/security/cve/CVE-2020-29573/" source="CVE"/>
		<reference ref_id="CVE-2021-3326" ref_url="https://www.suse.com/security/cve/CVE-2021-3326/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018088.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2020-29573: x86: printf was hardened against non-normal long double values (bsc#1179721, BZ #26649)
- CVE-2021-3326: Fix assertion failure in gconv ISO-2022-JP-3 module (bsc#1181505, BZ #27256)
- CVE-2019-25013: Fix buffer overrun in EUC-KR conversion module (bsc#1182117, BZ #24973)
- CVE-2020-27618: Accept redundant shift sequences in IBM1364 iconv (bsc#1178386, BZ #26224)
- CVE-2020-29562: Fix incorrect UCS4 inner loop bounds in iconv (bsc#1179694, BZ #26923)

- Schedule nscd cache pruning more accurately from re-added values (bsc#1018158)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-05"/>
	<updated date="2024-03-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1018158">SUSE bug 1018158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178386">SUSE bug 1178386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179694">SUSE bug 1179694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179721">SUSE bug 1179721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181505">SUSE bug 1181505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182117">SUSE bug 1182117</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-25013/">CVE-2019-25013 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">CVE-2019-25013 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27618/">CVE-2020-27618 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27618">CVE-2020-27618 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29562/">CVE-2020-29562 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29562">CVE-2020-29562 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29573/">CVE-2020-29573 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29573">CVE-2020-29573 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3326/">CVE-2021-3326 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3326">CVE-2021-3326 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991056" comment="glibc-2.11.3-17.110.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991057" comment="glibc-32bit-2.11.3-17.110.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991058" comment="glibc-devel-2.11.3-17.110.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991059" comment="glibc-devel-32bit-2.11.3-17.110.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991060" comment="glibc-html-2.11.3-17.110.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991061" comment="glibc-i18ndata-2.11.3-17.110.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991062" comment="glibc-info-2.11.3-17.110.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991063" comment="glibc-locale-2.11.3-17.110.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991064" comment="glibc-locale-32bit-2.11.3-17.110.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991065" comment="glibc-profile-2.11.3-17.110.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991066" comment="glibc-profile-32bit-2.11.3-17.110.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991067" comment="nscd-2.11.3-17.110.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216501" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1219243" ref_url="https://bugzilla.suse.com/1219243" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0727" ref_url="https://www.suse.com/security/cve/CVE-2024-0727/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018144.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2024-0727: Denial of service when processing a maliciously formatted PKCS12 file (bsc#1219243).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-12"/>
	<updated date="2024-03-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219243">SUSE bug 1219243</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-0727/">CVE-2024-0727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0727">CVE-2024-0727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991068" comment="libopenssl1-devel-1.0.1g-0.58.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991069" comment="libopenssl1_0_0-1.0.1g-0.58.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991070" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991071" comment="openssl1-1.0.1g-0.58.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991072" comment="openssl1-doc-1.0.1g-0.58.79.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216502" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1219243" ref_url="https://bugzilla.suse.com/1219243" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0727" ref_url="https://www.suse.com/security/cve/CVE-2024-0727/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018143.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2024-0727: Denial of service when processing a maliciously formatted PKCS12 file (bsc#1219243).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-12"/>
	<updated date="2024-03-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219243">SUSE bug 1219243</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-0727/">CVE-2024-0727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0727">CVE-2024-0727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991073" comment="libopenssl0_9_8-0.9.8j-0.106.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991074" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991075" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991076" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991077" comment="openssl-0.9.8j-0.106.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991078" comment="openssl-doc-0.9.8j-0.106.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216503" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1206418" ref_url="https://bugzilla.suse.com/1206418" source="BUGZILLA"/>
		<reference ref_id="1211382" ref_url="https://bugzilla.suse.com/1211382" source="BUGZILLA"/>
		<reference ref_id="1214099" ref_url="https://bugzilla.suse.com/1214099" source="BUGZILLA"/>
		<reference ref_id="1215278" ref_url="https://bugzilla.suse.com/1215278" source="BUGZILLA"/>
		<reference ref_id="1221323" ref_url="https://bugzilla.suse.com/1221323" source="BUGZILLA"/>
		<reference ref_id="1224277" ref_url="https://bugzilla.suse.com/1224277" source="BUGZILLA"/>
		<reference ref_id="1229129" ref_url="https://bugzilla.suse.com/1229129" source="BUGZILLA"/>
		<reference ref_id="1230400" ref_url="https://bugzilla.suse.com/1230400" source="BUGZILLA"/>
		<reference ref_id="1233313" ref_url="https://bugzilla.suse.com/1233313" source="BUGZILLA"/>
		<reference ref_id="1237096" ref_url="https://bugzilla.suse.com/1237096" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40982" ref_url="https://www.suse.com/security/cve/CVE-2022-40982/" source="CVE"/>
		<reference ref_id="CVE-2022-41804" ref_url="https://www.suse.com/security/cve/CVE-2022-41804/" source="CVE"/>
		<reference ref_id="CVE-2023-22655" ref_url="https://www.suse.com/security/cve/CVE-2023-22655/" source="CVE"/>
		<reference ref_id="CVE-2023-23583" ref_url="https://www.suse.com/security/cve/CVE-2023-23583/" source="CVE"/>
		<reference ref_id="CVE-2023-23908" ref_url="https://www.suse.com/security/cve/CVE-2023-23908/" source="CVE"/>
		<reference ref_id="CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746/" source="CVE"/>
		<reference ref_id="CVE-2023-38575" ref_url="https://www.suse.com/security/cve/CVE-2023-38575/" source="CVE"/>
		<reference ref_id="CVE-2023-39368" ref_url="https://www.suse.com/security/cve/CVE-2023-39368/" source="CVE"/>
		<reference ref_id="CVE-2023-42667" ref_url="https://www.suse.com/security/cve/CVE-2023-42667/" source="CVE"/>
		<reference ref_id="CVE-2023-43490" ref_url="https://www.suse.com/security/cve/CVE-2023-43490/" source="CVE"/>
		<reference ref_id="CVE-2023-45733" ref_url="https://www.suse.com/security/cve/CVE-2023-45733/" source="CVE"/>
		<reference ref_id="CVE-2023-45745" ref_url="https://www.suse.com/security/cve/CVE-2023-45745/" source="CVE"/>
		<reference ref_id="CVE-2023-46103" ref_url="https://www.suse.com/security/cve/CVE-2023-46103/" source="CVE"/>
		<reference ref_id="CVE-2023-47855" ref_url="https://www.suse.com/security/cve/CVE-2023-47855/" source="CVE"/>
		<reference ref_id="CVE-2023-49141" ref_url="https://www.suse.com/security/cve/CVE-2023-49141/" source="CVE"/>
		<reference ref_id="CVE-2024-21820" ref_url="https://www.suse.com/security/cve/CVE-2024-21820/" source="CVE"/>
		<reference ref_id="CVE-2024-21853" ref_url="https://www.suse.com/security/cve/CVE-2024-21853/" source="CVE"/>
		<reference ref_id="CVE-2024-23918" ref_url="https://www.suse.com/security/cve/CVE-2024-23918/" source="CVE"/>
		<reference ref_id="CVE-2024-23984" ref_url="https://www.suse.com/security/cve/CVE-2024-23984/" source="CVE"/>
		<reference ref_id="CVE-2024-24853" ref_url="https://www.suse.com/security/cve/CVE-2024-24853/" source="CVE"/>
		<reference ref_id="CVE-2024-24968" ref_url="https://www.suse.com/security/cve/CVE-2024-24968/" source="CVE"/>
		<reference ref_id="CVE-2024-24980" ref_url="https://www.suse.com/security/cve/CVE-2024-24980/" source="CVE"/>
		<reference ref_id="CVE-2024-25939" ref_url="https://www.suse.com/security/cve/CVE-2024-25939/" source="CVE"/>
		<reference ref_id="CVE-2024-31068" ref_url="https://www.suse.com/security/cve/CVE-2024-31068/" source="CVE"/>
		<reference ref_id="CVE-2024-36293" ref_url="https://www.suse.com/security/cve/CVE-2024-36293/" source="CVE"/>
		<reference ref_id="CVE-2024-37020" ref_url="https://www.suse.com/security/cve/CVE-2024-37020/" source="CVE"/>
		<reference ref_id="CVE-2024-39355" ref_url="https://www.suse.com/security/cve/CVE-2024-39355/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:1032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020609.html" source="SUSE-SU"/>
		<description>
This update for microcode_ctl fixes the following issues:

 - CVE-2024-31068: Improper Finite State Machines (FSMs) in Hardware
     Logic for some Intel Processors may allow privileged user to
     potentially enable denial of service via local access. (bsc#1237096)
 - CVE-2024-36293: A potential security vulnerability in some Intel
     Software Guard Extensions (Intel SGX) Platforms may allow denial
     of service. Intel is releasing microcode updates to mitigate this
     potential vulnerability. (bsc#1237096)
 - CVE-2024-39355: A potential security vulnerability in some
     13th and 14th Generation Intel Core Processors may allow denial
     of service. Intel is releasing microcode and UEFI reference code
     updates to mitigate this potential vulnerability. (bsc#1237096)
 - CVE-2024-37020: A potential security vulnerability in the Intel
     Data Streaming Accelerator (Intel DSA) for some Intel Xeon Processors
     may allow denial of service. Intel is releasing software updates to
     mitigate this potential vulnerability. (bsc#1237096)
 - CVE-2024-21853: Faulty finite state machines (FSMs) in the hardware logic
     in some 4th and 5th Generation Intel Xeon Processors may allow an
     authorized user to potentially enable denial of service via local access. (bsc#1233313) 
 - CVE-2024-23918: Improper conditions check in some Intel Xeon processor
     memory controller configurations when using Intel SGX may allow a
     privileged user to potentially enable escalation of privilege via
     local access. (bsc#1233313)
 - CVE-2024-21820: Incorrect default permissions in some Intel Xeon processor
     memory controller configurations when using Intel SGX may allow a privileged
     user to potentially enable escalation of privilege via local access. (bsc#1233313)
 - CVE-2024-24968: Improper finite state machines (FSMs) in hardware logic in
     some Intel Processors may allow an privileged user to potentially enable a
     denial of service via local access. (bsc#1230400)
 - CVE-2024-23984: Observable discrepancy in RAPL interface for some Intel
     Processors may allow a privileged user to potentially enable information
     disclosure via local access. (bsc#1230400)
 - CVE-2024-24853: Incorrect behavior order in transition between executive
     monitor and SMI transfer monitor (STM) in some Intel(R) Processor may
     allow a privileged user to potentially enable escalation of privilege
     via local access. (bsc#1229129)
 - CVE-2024-25939: Mirrored regions with different values in 3rd Generation Intel(R)
     Xeon(R) Scalable Processors may allow a privileged user to potentially enable
     denial of service via local access. (bsc#1229129)
 - CVE-2024-24980: Protection mechanism failure in some 3rd, 4th, and 5th Generation
     Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable
     escalation of privilege via local access. (bsc#1229129)
 - CVE-2023-42667: Improper isolation in the Intel(R) Core(TM) Ultra Processor stream
     cache mechanism may allow an authenticated user to potentially enable escalation
     of privilege via local access. (bsc#1229129)
 - CVE-2023-49141: Improper isolation in some Intel(R) Processors stream cache mechanism
     may allow an authenticated user to potentially enable escalation of privilege via
     local access. (bsc#1229129)
 - CVE-2023-45733: Hardware logic contains race conditions in some Intel(R) Processors
     may allow an authenticated user to potentially enable partial information disclosure
     via local access. (bsc#1224277)
 - CVE-2023-46103: Sequence of processor instructions leads to unexpected behavior in
     Intel(R) Core(TM) Ultra Processors may allow an authenticated user to potentially
     enable denial of service via local access. (bsc#1224277)
 - CVE-2023-45745: Improper input validation in some Intel(R) TDX module software before
     version 1.5.05.46.698 may allow a privileged user to potentially enable escalation
     of privilege via local access. (bsc#1224277)
 - CVE-2023-47855: Improper input validation in some Intel(R) TDX module software before
     version 1.5.05.46.698 may allow a privileged user to potentially enable escalation
     of privilege via local access. (bsc#1224277)
 - CVE-2023-39368: Protection mechanism failure of bus lock regulator
     for some Intel Processors may allow an unauthenticated user to
     potentially enable denial of service via network access. (bsc#1221323)
 - CVE-2023-38575: Non-transparent sharing of return predictor targets
     between contexts in some Intel Processors may allow an authorized
     user to potentially enable information disclosure via local access. (bsc#1221323)   
 - CVE-2023-28746: Information exposure through microarchitectural
     state after transient execution from some register files for some
     Intel Atom Processors may allow an authenticated user to potentially
     enable information disclosure via local access. (bsc#1221323)
 - CVE-2023-22655: Protection mechanism failure in some 3rd and 4th
     Generation Intel Xeon Processors when using Intel SGX or Intel TDX
     may allow a privileged user to potentially enable escalation of
     privilege via local access. (bsc#1221323)
 - CVE-2023-43490: Incorrect calculation in microcode keying mechanism
     for some Intel Xeon D Processors with Intel SGX may allow a
     privileged user to potentially enable information disclosure via
     local access.  (bsc#1221323)
 - CVE-2023-23583: Fixed potential CPU deadlocks or privilege escalation (bsc#1215278)
 - CVE-2022-40982: Information exposure through microarchitectural state after transient
     execution in certain vector execution units for some Intel(R) Processors may allow
     an authenticated user to potentially enable information disclosure via local access. (bsc#1206418) 
 - CVE-2023-23908: Improper access control in some 3rd Generation Intel(R) Xeon(R) Scalable
     processors may allow a privileged user to potentially enable information disclosure
     via local access.
 - CVE-2022-41804: Unauthorized error injection in Intel(R) SGX or Intel(R) TDX for some
     Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation
     of privilege via local access.

Other fixes:
    
- Intel CPU Microcode was updated to the 20250211 release (bsc#1237096)
  - Security updates for INTEL-SA-01166 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html
  - Security updates for INTEL-SA-01213 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html
  - Security updates for INTEL-SA-01139 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
  - Security updates for INTEL-SA-01228 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html
  - Security updates for INTEL-SA-01194 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html
  - Update for functional issues. Refer to Intel Core Ultra Processor https://cdrdv2.intel.com/v1/dl/getContent/792254 for details.
  - Update for functional issues. Refer to 13th/14th Generation Intel Core Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/740518 for details.
  - Update for functional issues. Refer to 12th Generation Intel Core Processor Family https://cdrdv2.intel.com/v1/dl/getContent/682436 for details.
  - Update for functional issues. Refer to 11th Gen Intel Core Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/631123 for details.
  - Update for functional issues. Refer to 8th and 9th Generation Intel Core Processor Family Spec Update https://cdrdv2.intel.com/v1/dl/getContent/337346 for details.
  - Update for functional issues. Refer to 5th Gen Intel Xeon Scalable Processors Specification Update https://cdrdv2.intel.com/v1/dl/getContent/793902 for details.
  - Update for functional issues. Refer to 4th Gen Intel Xeon Scalable Processors Specification Update https://cdrdv2.intel.com/v1/dl/getContent/772415 for details.
  - Update for functional issues. Refer to 3rd Generation Intel Xeon Processor Scalable Family Specification Update https://cdrdv2.intel.com/v1/dl/getContent/637780 for details.
  - Update for functional issues. Refer to Intel Xeon D-2700 Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/714071 for details.
  - Update for functional issues. Refer to Intel Xeon E-2300 Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/709192 for details.
  - Update for functional issues. Refer to Intel Xeon 6700-Series Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/820922 for details.
  - Update for functional issues. Refer to Intel Processors and Intel Core i3 N-Series https://cdrdv2.intel.com/v1/dl/getContent/764616 for details

- Intel CPU Microcode was updated to the 20241112 release (bsc#1233313)
  - Security updates for [INTEL-SA-01101](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01101.html).
  - Security updates for [INTEL-SA-01079](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html).
  - Security updates for [INTEL-SA-01079](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html).
  - Updated security updates for [INTEL-SA-01097](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01097.html).
  - Updated security updates for [INTEL-SA-01103](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01103.html).
  - Update for functional issues. Refer to [Intel Core Ultra Processor](https://cdrdv2.intel.com/v1/dl/getContent/792254) for details.
  - Update for functional issues. Refer to [14th/13th Generation Intel Core Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/740518) for details.
  - Update for functional issues. Refer to [12th Generation Intel Core Processor Family](https://cdrdv2.intel.com/v1/dl/getContent/682436) for details.
  - Update for functional issues. Refer to [5th Gen Intel Xeon Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/793902) for details.
  - Update for functional issues. Refer to [4th Gen Intel Xeon Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/772415) for details.
  - Update for functional issues. Refer to [3rd Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780) for details.
  - Update for functional issues. Refer to [Intel Xeon D-2700 Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/714071) for details.
  - Update for functional issues. Refer to [Intel Xeon D-1700 and D-1800 Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/714069) for details

- Intel CPU Microcode was updated to the 20241029 release (bsc#1230400)
  - Update for functional issues. Refer to [14th/13th Generation Intel Core Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/740518) for details.

- Intel CPU Microcode was updated to the 20240910 release (bsc#1230400)
  - Security updates for [INTEL-SA-01103](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01103.html)
  - Security updates for [INTEL-SA-01097](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01097.html)
  - Update for functional issues. Refer to [Intel Core Ultra Processor](https://cdrdv2.intel.com/v1/dl/getContent/792254) for details.
  - Update for functional issues. Refer to [13th Generation Intel Core Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/740518) for details.
  - Update for functional issues. Refer to [12th Generation Intel Core Processor Family](https://cdrdv2.intel.com/v1/dl/getContent/682436) for details.
  - Update for functional issues. Refer to [Intel Processors and Intel Core i3 N-Series](https://cdrdv2.intel.com/v1/dl/getContent/764616) for details.

- Intel CPU Microcode was updated to the 20240813 release (bsc#1229129)
  - Security updates for [INTEL-SA-01083](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01083.html)
  - Security updates for [INTEL-SA-01118](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01118.html)
  - Security updates for [INTEL-SA-01100](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01100.html)
  - Security updates for [INTEL-SA-01038](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01038.html)
  - Security updates for [INTEL-SA-01046](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01046.html)
  - Update for functional issues. Refer to [Intel Core Ultra Processor](https://cdrdv2.intel.com/v1/dl/getContent/792254) for details.
  - Update for functional issues. Refer to [3rd Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780) for details.
  - Update for functional issues. Refer to [3rd Generation Intel Xeon Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/634897) for details.
  - Update for functional issues. Refer to [2nd Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details
  - Update for functional issues. Refer to [Intel Xeon D-2700 Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/714071) for details.
  - Update for functional issues. Refer to [Intel Xeon E-2300 Processor Specification Update ](https://cdrdv2.intel.com/v1/dl/getContent/709192) for details.
  - Update for functional issues. Refer to [13th Generation Intel Core Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/740518) for details.
  - Update for functional issues. Refer to [12th Generation Intel Core Processor Family](https://cdrdv2.intel.com/v1/dl/getContent/682436) for details.
  - Update for functional issues. Refer to [11th Gen Intel Core Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/631123) for details.
  - Update for functional issues. Refer to [10th Gen Intel Core Processor Families Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/341079) for details.
  - Update for functional issues. Refer to [10th Generation Intel Core Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/615213) for details.
  - Update for functional issues. Refer to [8th and 9th Generation Intel Core Processor Family Spec Update](https://cdrdv2.intel.com/v1/dl/getContent/337346) for details.
  - Update for functional issues. Refer to [8th Generation Intel Core Processor Families Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338025) for details.
  - Update for functional issues. Refer to [7th and 8th Generation Intel Core Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/334663) for details.
  - Update for functional issues. Refer to [Intel Processors and Intel Core i3 N-Series](https://cdrdv2.intel.com/v1/dl/getContent/764616) for details.
  - Update for functional issues. Refer to [Intel Atom x6000E Series, and Intel Pentium and Celeron N and J Series Processors for Internet of Things (IoT) Applications](https://cdrdv2.intel.com/v1/dl/getContent/636674) for details.

- Intel CPU Microcode was updated to 20240531 release:
  - Update for functional issues. Refer to Intel Pentium Silver
    and Intel Celeron Processor Specification Update
  
- Intel CPU Microcode was updated to the 20240514 release (bsc#1224277)
  - Security updates for INTEL-SA-01051 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01051.html
  - Security updates for INTEL-SA-01052 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01052.html
  - Security updates for INTEL-SA-01036 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01036.html
  - Update for functional issues. Refer to 5th Gen Intel Xeon Processor Scalable Family https://cdrdv2.intel.com/v1/dl/getContent/793902 for details.
  - Update for functional issues. Refer to 4th Gen Intel Xeon Scalable Processors Specification Update https://cdrdv2.intel.com/v1/dl/getContent/772415 for details.
  - Update for functional issues. Refer to 14th 13th Generation Intel Core Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/740518 for details.
  - Update for functional issues. Refer to 12th Generation Intel Core Processor Family https://cdrdv2.intel.com/v1/dl/getContent/682436 for details.
  - Update for functional issues. Refer to Intel Processors and Intel Core i3 N-Series https://cdrdv2.intel.com/v1/dl/getContent/764616 for details.

- - Intel CPU Microcode was updated to 20240312 release. (bsc#1221323)
  - Security updates for INTEL-SA-INTEL-SA-00972 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00972.html
  - Security updates for INTEL-SA-INTEL-SA-00982 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00982.html
  - Security updates for INTEL-SA-INTEL-SA-00898 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html
  - Security updates for INTEL-SA-INTEL-SA-00960 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00960.html
  - Security updates for INTEL-SA-INTEL-SA-01045 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01045.html
  - Update for functional issues. Refer to Intel Core Ultra Processor https://cdrdv2.intel.com/v1/dl/getContent/792254 for details.
  - Update for functional issues. Refer to 13th Generation Intel Core Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/740518 for details.
  - Update for functional issues. Refer to 12th Generation Intel Core Processor Family https://cdrdv2.intel.com/v1/dl/getContent/682436 for details.
  - Update for functional issues. Refer to 11th Gen Intel Core Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/631123 for details.
  - Update for functional issues. Refer to 10th Gen Intel Core Processor Families Specification Update https://cdrdv2.intel.com/v1/dl/getContent/341079 for details.
  - Update for functional issues. Refer to 10th Generation Intel Core Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/615213 for details.
  - Update for functional issues. Refer to 8th and 9th Generation Intel Core Processor Family Spec Update https://cdrdv2.intel.com/v1/dl/getContent/337346 for details.
  - Update for functional issues. Refer to 8th Generation Intel Core Processor Families Specification Update https://cdrdv2.intel.com/v1/dl/getContent/338025 for details.
  - Update for functional issues. Refer to 7th and 8th Generation Intel Core Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/334663 for details.
  - Update for functional issues. Refer to 5th Gen Intel Xeon Scalable Processors Specification Update https://cdrdv2.intel.com/v1/dl/getContent/793902 for details.
  - Update for functional issues. Refer to 4th Gen Intel Xeon Scalable Processors Specification Update https://cdrdv2.intel.com/v1/dl/getContent/772415 for details.
  - Update for functional issues. Refer to 3rd Generation Intel Xeon Scalable Processors Specification Update https://cdrdv2.intel.com/v1/dl/getContent/634897 for details.
  - Update for functional issues. Refer to 3rd Generation Intel Xeon Processor Scalable Family Specification Update https://cdrdv2.intel.com/v1/dl/getContent/637780 for details.
  - Update for functional issues. Refer to 2nd Generation Intel Xeon Processor Scalable Family Specification Update https://cdrdv2.intel.com/v1/dl/getContent/338848 for details.
  - Update for functional issues. Refer to Intel Processors and Intel Core i3 N-Series https://cdrdv2.intel.com/v1/dl/getContent/764616 for details.
  - Update for functional issues. Refer to Intel Xeon D-2700 Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/714071 for details.
  - Update for functional issues. Refer to Intel Xeon E-2300 Processor Specification Update  https://cdrdv2.intel.com/v1/dl/getContent/709192 for details.
  - Update for functional issues. Refer to Intel Xeon Processor Scalable Family Specification Update https://cdrdv2.intel.com/v1/dl/getContent/613537 for details.
  - Update for functional issues. Refer to Intel Atom C3000 Processor Product Family Specification Update https://cdrdv2.intel.com/v1/dl/getContent/336345 for details.
  - Update for functional issues. Refer to Intel Atom x6000E Series, and Intel Pentium and Celeron N and J Series Processors for Internet of Things (IoT) Applications https://cdrdv2.intel.com/v1/dl/getContent/636674 for details.
  - Update for functional issues. Refer to Intel Pentium Silver and Intel Celeron Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/336562 for details.
  - Update for functional issues. Refer to Intel Pentium Silver and Intel Celeron Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/634542 for details.
  
- Intel CPU Microcode was updated to 20231114 release. (bsc#1215278)
  - Security updates for [INTEL-SA-00950](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00950.html)
  - Update for functional issues. Refer to [13th Generation Intel Core Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/740518) for details.
  - Update for functional issues. Refer to [12th Generation Intel Core Processor Family](https://cdrdv2.intel.com/v1/dl/getContent/682436) for details.
  - Update for functional issues. Refer to [11th Gen Intel Core Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/631123) for details.
  - Update for functional issues. Refer to [10th Gen Intel Core Processor Families Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/341079) for details.
  - Update for functional issues. Refer to [4th Gen Intel Xeon Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/772415) for details.
  - Update for functional issues. Refer to [3rd Generation Intel Xeon Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/634897) for details.
  - Update for functional issues. Refer to [Intel Processors and Intel Core i3 N-Series](https://cdrdv2.intel.com/v1/dl/getContent/764616) for details.
  - Update for functional issues. Refer to [Intel Xeon D-2700 Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/714071) for details.
  - Update for functional issues. Refer to [Intel Xeon E-2300 Processor Specification Update ](https://cdrdv2.intel.com/v1/dl/getContent/709192) for details.
 
- Intel CPU Microcode was updated to 20231114 pre-release (labeled 20231113). (bsc#1215278)

- Intel CPU Microcode was updated to 20230808 release. (bsc#1214099)
  - Security updates for [INTEL-SA-00828](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html) (bsc#1206418)
  - Security updates for [INTEL-SA-00836](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.html)
  - Security updates for [INTEL-SA-00837](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00837.html)
  - Update for functional issues. Refer to [13th Generation Intel Core Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/740518) for details.
  - Update for functional issues. Refer to [12th Generation Intel Core Processor Family](https://cdrdv2.intel.com/v1/dl/getContent/682436) for details.
  - Update for functional issues. Refer to [11th Gen Intel Core Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/631123) for details.
  - Update for functional issues. Refer to [10th Gen Intel Core Processor Families Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/341079) for details.
  - Update for functional issues. Refer to [8th and 9th Generation Intel Core Processor Family Spec Update](https://cdrdv2.intel.com/v1/dl/getContent/337346) for details.
  - Update for functional issues. Refer to [8th Generation Intel Core Processor Families Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338025) for details.
  - Update for functional issues. Refer to [7th and 8th Generation Intel Core Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/334663) for details.
  - Update for functional issues. Refer to [Intel Processors and Intel Core i3 N-Series](https://cdrdv2.intel.com/v1/dl/getContent/764616) for details.
  - Update for functional issues. Refer to [4th Gen Intel Xeon Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/772415) for details.
  - Update for functional issues. Refer to [3rd Generation Intel Xeon Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/634897) for details.
  - Update for functional issues. Refer to [2nd Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details.
  - Update for functional issues. Refer to [Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details.
  - Update for functional issues. Refer to [3rd Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780) for details.
  - Update for functional issues. Refer to [Intel Xeon E-2300 Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/709192) for details.
  - Update for functional issues. Refer to [Intel Xeon D-2700 Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/714071) for details.
  - Update for functional issues. Refer to [Intel Xeon D-2100 Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338854) for details.
  
- Intel CPU Microcode was updated to 20230613 release.
  
- Intel CPU Microcode was updated to 20230512 release.
    
- Intel CPU Microcode was updated to 20230512 release. (bsc#1211382)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-26"/>
	<updated date="2025-03-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206418">SUSE bug 1206418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211382">SUSE bug 1211382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214099">SUSE bug 1214099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215278">SUSE bug 1215278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221323">SUSE bug 1221323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224277">SUSE bug 1224277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229129">SUSE bug 1229129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230400">SUSE bug 1230400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233313">SUSE bug 1233313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237096">SUSE bug 1237096</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40982/">CVE-2022-40982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41804/">CVE-2022-41804 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41804">CVE-2022-41804 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-22655/">CVE-2023-22655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-22655">CVE-2023-22655 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23583/">CVE-2023-23583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23583">CVE-2023-23583 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-23908/">CVE-2023-23908 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23908">CVE-2023-23908 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-38575/">CVE-2023-38575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38575">CVE-2023-38575 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39368/">CVE-2023-39368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39368">CVE-2023-39368 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-42667/">CVE-2023-42667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-42667">CVE-2023-42667 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-43490/">CVE-2023-43490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-43490">CVE-2023-43490 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45733/">CVE-2023-45733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45733">CVE-2023-45733 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45745/">CVE-2023-45745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45745">CVE-2023-45745 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46103/">CVE-2023-46103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46103">CVE-2023-46103 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-47855/">CVE-2023-47855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-47855">CVE-2023-47855 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-49141/">CVE-2023-49141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-49141">CVE-2023-49141 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" cvss4="8.5/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21820/">CVE-2024-21820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21820">CVE-2024-21820 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21853/">CVE-2024-21853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21853">CVE-2024-21853 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="8.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-23918/">CVE-2024-23918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23918">CVE-2024-23918 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-23984/">CVE-2024-23984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23984">CVE-2024-23984 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-24853/">CVE-2024-24853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24853">CVE-2024-24853 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-24968/">CVE-2024-24968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24968">CVE-2024-24968 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:L/VI:H/VA:N/SC:L/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2024-24980/">CVE-2024-24980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24980">CVE-2024-24980 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-25939/">CVE-2024-25939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25939">CVE-2024-25939 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-31068/">CVE-2024-31068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31068">CVE-2024-31068 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-36293/">CVE-2024-36293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36293">CVE-2024-36293 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-37020/">CVE-2024-37020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37020">CVE-2024-37020 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-39355/">CVE-2024-39355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39355">CVE-2024-39355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991079" comment="microcode_ctl-1.17-102.83.81.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216504" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1027565" ref_url="https://bugzilla.suse.com/1027565" source="BUGZILLA"/>
		<reference ref_id="1056588" ref_url="https://bugzilla.suse.com/1056588" source="BUGZILLA"/>
		<reference ref_id="1059525" ref_url="https://bugzilla.suse.com/1059525" source="BUGZILLA"/>
		<reference ref_id="1202346" ref_url="https://bugzilla.suse.com/1202346" source="BUGZILLA"/>
		<reference ref_id="1227985" ref_url="https://bugzilla.suse.com/1227985" source="BUGZILLA"/>
		<reference ref_id="1234846" ref_url="https://bugzilla.suse.com/1234846" source="BUGZILLA"/>
		<reference ref_id="1234853" ref_url="https://bugzilla.suse.com/1234853" source="BUGZILLA"/>
		<reference ref_id="1234891" ref_url="https://bugzilla.suse.com/1234891" source="BUGZILLA"/>
		<reference ref_id="1234963" ref_url="https://bugzilla.suse.com/1234963" source="BUGZILLA"/>
		<reference ref_id="1235054" ref_url="https://bugzilla.suse.com/1235054" source="BUGZILLA"/>
		<reference ref_id="1235056" ref_url="https://bugzilla.suse.com/1235056" source="BUGZILLA"/>
		<reference ref_id="1235061" ref_url="https://bugzilla.suse.com/1235061" source="BUGZILLA"/>
		<reference ref_id="1235073" ref_url="https://bugzilla.suse.com/1235073" source="BUGZILLA"/>
		<reference ref_id="1235220" ref_url="https://bugzilla.suse.com/1235220" source="BUGZILLA"/>
		<reference ref_id="1235224" ref_url="https://bugzilla.suse.com/1235224" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000253" ref_url="https://www.suse.com/security/cve/CVE-2017-1000253/" source="CVE"/>
		<reference ref_id="CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051/" source="CVE"/>
		<reference ref_id="CVE-2017-2636" ref_url="https://www.suse.com/security/cve/CVE-2017-2636/" source="CVE"/>
		<reference ref_id="CVE-2022-20368" ref_url="https://www.suse.com/security/cve/CVE-2022-20368/" source="CVE"/>
		<reference ref_id="CVE-2022-48839" ref_url="https://www.suse.com/security/cve/CVE-2022-48839/" source="CVE"/>
		<reference ref_id="CVE-2024-53146" ref_url="https://www.suse.com/security/cve/CVE-2024-53146/" source="CVE"/>
		<reference ref_id="CVE-2024-53156" ref_url="https://www.suse.com/security/cve/CVE-2024-53156/" source="CVE"/>
		<reference ref_id="CVE-2024-53173" ref_url="https://www.suse.com/security/cve/CVE-2024-53173/" source="CVE"/>
		<reference ref_id="CVE-2024-53239" ref_url="https://www.suse.com/security/cve/CVE-2024-53239/" source="CVE"/>
		<reference ref_id="CVE-2024-56539" ref_url="https://www.suse.com/security/cve/CVE-2024-56539/" source="CVE"/>
		<reference ref_id="CVE-2024-56548" ref_url="https://www.suse.com/security/cve/CVE-2024-56548/" source="CVE"/>
		<reference ref_id="CVE-2024-56598" ref_url="https://www.suse.com/security/cve/CVE-2024-56598/" source="CVE"/>
		<reference ref_id="CVE-2024-56604" ref_url="https://www.suse.com/security/cve/CVE-2024-56604/" source="CVE"/>
		<reference ref_id="CVE-2024-56605" ref_url="https://www.suse.com/security/cve/CVE-2024-56605/" source="CVE"/>
		<reference ref_id="CVE-2024-56619" ref_url="https://www.suse.com/security/cve/CVE-2024-56619/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020152.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2017-14051: scsi/qla2xxx: Fix an integer overflow in sysfs code. (bsc#1056588)
- CVE-2024-53146: NFSD: Prevent a potential integer overflow (bsc#1234853).
- CVE-2024-53156: wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (bsc#1234846).
- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234891).
- CVE-2024-53239: ALSA: 6fire: Release resources at card release (bsc#1235054).
- CVE-2024-56539: wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (bsc#1234963).
- CVE-2024-56548: hfsplus: do not query the device logical block size multiple times (bsc#1235073).
- CVE-2024-56598: jfs: array-index-out-of-bounds fix in dtReadFirst (bsc#1235220).
- CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() (bsc#1235056).
- CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (bsc#1235061).
- CVE-2024-56619: nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() (bsc#1235224).

The following non-security bugs were fixed:

- Enable CONFIG_FIRMWARE_SIG ()
- r8169: check ALDPS bit and disable it if enabled for the 8168g (bnc#845352).
- rpm/kernel-binary.spec.in: Remove obsolete ext4-writeable. Needs to be handled differently. (bnc#830822)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-17"/>
	<updated date="2025-01-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027565">SUSE bug 1027565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056588">SUSE bug 1056588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059525">SUSE bug 1059525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202346">SUSE bug 1202346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227985">SUSE bug 1227985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234846">SUSE bug 1234846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234853">SUSE bug 1234853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234891">SUSE bug 1234891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234963">SUSE bug 1234963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235054">SUSE bug 1235054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235056">SUSE bug 1235056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235061">SUSE bug 1235061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235073">SUSE bug 1235073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235220">SUSE bug 1235220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235224">SUSE bug 1235224</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000253/">CVE-2017-1000253 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000253">CVE-2017-1000253 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14051">CVE-2017-14051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2636/">CVE-2017-2636 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2636">CVE-2017-2636 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20368/">CVE-2022-20368 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20368">CVE-2022-20368 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48839/">CVE-2022-48839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48839">CVE-2022-48839 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53146/">CVE-2024-53146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53146">CVE-2024-53146 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53156/">CVE-2024-53156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53156">CVE-2024-53156 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53173/">CVE-2024-53173 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53173">CVE-2024-53173 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53239/">CVE-2024-53239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53239">CVE-2024-53239 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56539/">CVE-2024-56539 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56539">CVE-2024-56539 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56548/">CVE-2024-56548 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56548">CVE-2024-56548 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56598/">CVE-2024-56598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56598">CVE-2024-56598 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56604/">CVE-2024-56604 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56604">CVE-2024-56604 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56605/">CVE-2024-56605 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56605">CVE-2024-56605 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56619/">CVE-2024-56619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56619">CVE-2024-56619 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991080" comment="kernel-default-3.0.101-108.174.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991081" comment="kernel-default-base-3.0.101-108.174.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991083" comment="kernel-ec2-3.0.101-108.174.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991084" comment="kernel-ec2-base-3.0.101-108.174.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991086" comment="kernel-source-3.0.101-108.174.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991087" comment="kernel-syms-3.0.101-108.174.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991088" comment="kernel-trace-3.0.101-108.174.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991089" comment="kernel-trace-base-3.0.101-108.174.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991091" comment="kernel-xen-3.0.101-108.174.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991092" comment="kernel-xen-base-3.0.101-108.174.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216505" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1243123" ref_url="https://bugzilla.suse.com/1243123" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-28956" ref_url="https://www.suse.com/security/cve/CVE-2024-28956/" source="CVE"/>
		<reference ref_id="CVE-2024-43420" ref_url="https://www.suse.com/security/cve/CVE-2024-43420/" source="CVE"/>
		<reference ref_id="CVE-2024-45332" ref_url="https://www.suse.com/security/cve/CVE-2024-45332/" source="CVE"/>
		<reference ref_id="CVE-2025-20012" ref_url="https://www.suse.com/security/cve/CVE-2025-20012/" source="CVE"/>
		<reference ref_id="CVE-2025-20054" ref_url="https://www.suse.com/security/cve/CVE-2025-20054/" source="CVE"/>
		<reference ref_id="CVE-2025-20103" ref_url="https://www.suse.com/security/cve/CVE-2025-20103/" source="CVE"/>
		<reference ref_id="CVE-2025-20623" ref_url="https://www.suse.com/security/cve/CVE-2025-20623/" source="CVE"/>
		<reference ref_id="CVE-2025-24495" ref_url="https://www.suse.com/security/cve/CVE-2025-24495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:1567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020842.html" source="SUSE-SU"/>
		<description>
This update for microcode_ctl fixes the following issues:

Intel CPU Microcode was updated to the 20250512 release (bsc#1243123)
  
- CVE-2024-28956: Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel Processors may allow an authenticated user to potentially enable information disclosure via local access.
- CVE-2025-20103: Insufficient resource pool in the core management mechanism for some Intel Processors may allow an authenticated user to potentially enable denial of service via local access.
- CVE-2025-20054: Uncaught exception in the core management mechanism for some Intel Processors may allow an authenticated user to potentially enable denial of service via local access.
- CVE-2024-43420: Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel Atom processors may allow an authenticated user to potentially enable information disclosure via local access.
- CVE-2025-20623: Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel Core processors (10th Generation) may allow an authenticated user to potentially enable information disclosure via local access.
- CVE-2024-45332: Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution in the indirect branch predictors for some Intel Processors may allow an authenticated user to potentially enable information disclosure via local access.
- CVE-2025-24495: Incorrect initialization of resource in the branch prediction unit for some Intel Core Ultra Processors may allow an authenticated user to potentially enable information disclosure via local access.
- CVE-2025-20012: Incorrect behavior order for some Intel Core Ultra Processors may allow an unauthenticated user to potentially enable information disclosure via physical access.
- Updates for functional issues.  
    
- New Platforms

  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | ARL-U          | A1       | 06-b5-00/80 |          | 0000000a | Core Ultra Processor (Series2)
  | ARL-S/HX (8P)  | B0       | 06-c6-02/82 |          | 00000118 | Core Ultra Processor (Series2)
  | ARL-H          | A1       | 06-c5-02/82 |          | 00000118 | Core Ultra Processor (Series2)
  | GNR-AP/SP      | B0       | 06-ad-01/95 |          | 010003a2 | Xeon Scalable Gen6
  | GNR-AP/SP      | H0       | 06-ad-01/20 |          | 0a0000d1 | Xeon Scalable Gen6
  | LNL            | B0       | 06-bd-01/80 |          | 0000011f | Core Ultra 200 V Series Processor

- Updated Platforms

  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | ADL            | C0       | 06-97-02/07 | 00000038 | 0000003a | Core Gen12
  | ADL            | H0       | 06-97-05/07 | 00000038 | 0000003a | Core Gen12
  | ADL            | L0       | 06-9a-03/80 | 00000436 | 00000437 | Core Gen12
  | ADL            | R0       | 06-9a-04/80 | 00000436 | 00000437 | Core Gen12 
  | ADL-N          | N0       | 06-be-00/19 | 0000001c | 0000001d | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000fc | 00000100 | Core Gen10 Mobile
  | AZB            | A0/R0    | 06-9a-04/40 | 00000009 | 0000000a | Intel(R) Atom(R) C1100
  | CFL-H          | R0       | 06-9e-0d/22 | 00000102 | 00000104 | Core Gen9 Mobile
  | CLX-SP         | B1       | 06-55-07/bf | 05003707 | 05003901 | Xeon Scalable Gen2
  | CML-H          | R1       | 06-a5-02/20 | 000000fc | 00000100 | Core Gen10 Mobile
  | CML-S102       | Q0       | 06-a5-05/22 | 000000fc | 00000100 | Core Gen10
  | CML-S62        | G1       | 06-a5-03/22 | 000000fc | 00000100 | Core Gen10
  | CML-U42        | V0       | 06-8e-0c/94 | 000000fc | 00000100 | Core Gen10 Mobile
  | CML-U62 V1     | A0       | 06-a6-00/80 | 000000fe | 00000102 | Core Gen10 Mobile
  | CML-U62 V2     | K1       | 06-a6-01/80 | 000000fc | 00000100 | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000fc | 00000100 | Core Gen10 Mobile
  | CPX-SP         | A1       | 06-55-0b/bf | 07002904 | 07002b01 | Xeon Scalable Gen3
  | EMR-SP         | A1       | 06-cf-02/87 | 21000291 | 210002a9 | Xeon Scalable Gen5
  | GLK-R          | R0       | 06-7a-08/01 | 00000024 | 00000026 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | ICL-D          | B0       | 06-6c-01/10 | 010002c0 | 010002d0 | Xeon D-17xx, D-27xx
  | ICL-U/Y        | D1       | 06-7e-05/80 | 000000c6 | 000000ca | Core Gen10 Mobile
  | ICX-SP         | Dx/M1    | 06-6a-06/87 | 0d0003f5 | 0d000404 | Xeon Scalable Gen3
  | MTL            | C0       | 06-aa-04/e6 | 00000020 | 00000024 | Core Ultra Processor
  | RKL-S          | B0       | 06-a7-01/02 | 00000063 | 00000064 | Core Gen11
  | RPL-E/HX/S     | B0       | 06-b7-01/32 | 0000012c | 0000012f | Core Gen13/Gen14
  | RPL-H/P/PX 6+8 | J0       | 06-ba-02/e0 | 00004124 | 00004128 | Core Gen13
  | RPL-HX/S       | C0       | 06-bf-02/07 | 00000038 | 0000003a | Core Gen13/Gen14
  | RPL-S          | H0       | 06-bf-05/07 | 00000038 | 0000003a | Core Gen13/Gen14
  | RPL-U 2+8      | Q0       | 06-ba-03/e0 | 00004124 | 00004128 | Core Gen13
  | SPR-HBM        | Bx       | 06-8f-08/10 | 2c0003e0 | 2c0003f7 | Xeon Max
  | SPR-SP         | E4/S2    | 06-8f-07/87 | 2b000620 | 2b000639 | Xeon Scalable Gen4
  | SPR-SP         | E5/S3    | 06-8f-08/87 | 2b000620 | 2b000639 | Xeon Scalable Gen4
  | SRF-SP         | C0       | 06-af-03/01 | 03000330 | 03000341 | Xeon 6700-Series Processors with E-Cores
  | TGL            | B0/B1    | 06-8c-01/80 | 000000b8 | 000000bc | Core Gen11 Mobile
  | TGL-H          | R0       | 06-8d-01/c2 | 00000052 | 00000056 | Core Gen11 Mobile
  | TGL-R          | C0       | 06-8c-02/c2 | 00000038 | 0000003c | Core Gen11 Mobile
  | TWL            | N0       | 06-be-00/19 | 0000001c | 0000001d | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E
  | WHL-U          | V0       | 06-8e-0c/94 | 000000fc | 00000100 | Core Gen8 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-16"/>
	<updated date="2025-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1243123">SUSE bug 1243123</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28956/">CVE-2024-28956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28956">CVE-2024-28956 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-43420/">CVE-2024-43420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43420">CVE-2024-43420 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-45332/">CVE-2024-45332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45332">CVE-2024-45332 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" cvss4="4.1/CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-20012/">CVE-2025-20012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20012">CVE-2025-20012 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-20054/">CVE-2025-20054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20054">CVE-2025-20054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-20103/">CVE-2025-20103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20103">CVE-2025-20103 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-20623/">CVE-2025-20623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20623">CVE-2025-20623 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24495/">CVE-2025-24495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24495">CVE-2025-24495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991094" comment="microcode_ctl-1.17-102.83.84.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216506" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1209547" ref_url="https://bugzilla.suse.com/1209547" source="BUGZILLA"/>
		<reference ref_id="1210647" ref_url="https://bugzilla.suse.com/1210647" source="BUGZILLA"/>
		<reference ref_id="1213167" ref_url="https://bugzilla.suse.com/1213167" source="BUGZILLA"/>
		<reference ref_id="1232649" ref_url="https://bugzilla.suse.com/1232649" source="BUGZILLA"/>
		<reference ref_id="1234381" ref_url="https://bugzilla.suse.com/1234381" source="BUGZILLA"/>
		<reference ref_id="1237159" ref_url="https://bugzilla.suse.com/1237159" source="BUGZILLA"/>
		<reference ref_id="1237312" ref_url="https://bugzilla.suse.com/1237312" source="BUGZILLA"/>
		<reference ref_id="1240213" ref_url="https://bugzilla.suse.com/1240213" source="BUGZILLA"/>
		<reference ref_id="1240218" ref_url="https://bugzilla.suse.com/1240218" source="BUGZILLA"/>
		<reference ref_id="1240227" ref_url="https://bugzilla.suse.com/1240227" source="BUGZILLA"/>
		<reference ref_id="1240835" ref_url="https://bugzilla.suse.com/1240835" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2023-2162" ref_url="https://www.suse.com/security/cve/CVE-2023-2162/" source="CVE"/>
		<reference ref_id="CVE-2023-3567" ref_url="https://www.suse.com/security/cve/CVE-2023-3567/" source="CVE"/>
		<reference ref_id="CVE-2023-52973" ref_url="https://www.suse.com/security/cve/CVE-2023-52973/" source="CVE"/>
		<reference ref_id="CVE-2023-52974" ref_url="https://www.suse.com/security/cve/CVE-2023-52974/" source="CVE"/>
		<reference ref_id="CVE-2023-53000" ref_url="https://www.suse.com/security/cve/CVE-2023-53000/" source="CVE"/>
		<reference ref_id="CVE-2024-53141" ref_url="https://www.suse.com/security/cve/CVE-2024-53141/" source="CVE"/>
		<reference ref_id="CVE-2025-21700" ref_url="https://www.suse.com/security/cve/CVE-2025-21700/" source="CVE"/>
		<reference ref_id="CVE-2025-21702" ref_url="https://www.suse.com/security/cve/CVE-2025-21702/" source="CVE"/>
		<reference ref_id="CVE-2025-22004" ref_url="https://www.suse.com/security/cve/CVE-2025-22004/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040464.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381).
- CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159).
- CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch-&gt;limit == 0 (bsc#1237312).
- CVE-2025-22004: net: atm: fix use after free in lec_send() (bsc#1240835).

The following non-security bugs were fixed:

- mtd: phram: Add the kernel lock down check (bsc#1232649).
- net_sched: sch_fifo: implement lockless __fifo_dump() (bsc#1237312)
- netfilter: ipset: Check and reject crazy /0 input parameters (git-fixes)
- netfilter: ipset: Fix overflow before widen in the bitmap_ip_create() function (git-fixes)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-25"/>
	<updated date="2025-06-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1209547">SUSE bug 1209547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210647">SUSE bug 1210647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213167">SUSE bug 1213167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232649">SUSE bug 1232649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234381">SUSE bug 1234381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237159">SUSE bug 1237159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237312">SUSE bug 1237312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240213">SUSE bug 1240213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240218">SUSE bug 1240218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240227">SUSE bug 1240227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240835">SUSE bug 1240835</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2162/">CVE-2023-2162 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2162">CVE-2023-2162 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3567/">CVE-2023-3567 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3567">CVE-2023-3567 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52973/">CVE-2023-52973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52973">CVE-2023-52973 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52974/">CVE-2023-52974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52974">CVE-2023-52974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53000/">CVE-2023-53000 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53000">CVE-2023-53000 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53141/">CVE-2024-53141 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53141">CVE-2024-53141 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21700/">CVE-2025-21700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21700">CVE-2025-21700 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21702/">CVE-2025-21702 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21702">CVE-2025-21702 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22004/">CVE-2025-22004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22004">CVE-2025-22004 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991095" comment="kernel-default-3.0.101-108.183.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991096" comment="kernel-default-base-3.0.101-108.183.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991098" comment="kernel-ec2-3.0.101-108.183.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991099" comment="kernel-ec2-base-3.0.101-108.183.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991101" comment="kernel-source-3.0.101-108.183.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991102" comment="kernel-syms-3.0.101-108.183.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991103" comment="kernel-trace-3.0.101-108.183.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991104" comment="kernel-trace-base-3.0.101-108.183.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991106" comment="kernel-xen-3.0.101-108.183.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991107" comment="kernel-xen-base-3.0.101-108.183.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216507" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1205220" ref_url="https://bugzilla.suse.com/1205220" source="BUGZILLA"/>
		<reference ref_id="1212051" ref_url="https://bugzilla.suse.com/1212051" source="BUGZILLA"/>
		<reference ref_id="1240270" ref_url="https://bugzilla.suse.com/1240270" source="BUGZILLA"/>
		<reference ref_id="1245047" ref_url="https://bugzilla.suse.com/1245047" source="BUGZILLA"/>
		<reference ref_id="1245057" ref_url="https://bugzilla.suse.com/1245057" source="BUGZILLA"/>
		<reference ref_id="1245149" ref_url="https://bugzilla.suse.com/1245149" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3903" ref_url="https://www.suse.com/security/cve/CVE-2022-3903/" source="CVE"/>
		<reference ref_id="CVE-2022-49937" ref_url="https://www.suse.com/security/cve/CVE-2022-49937/" source="CVE"/>
		<reference ref_id="CVE-2022-50067" ref_url="https://www.suse.com/security/cve/CVE-2022-50067/" source="CVE"/>
		<reference ref_id="CVE-2022-50200" ref_url="https://www.suse.com/security/cve/CVE-2022-50200/" source="CVE"/>
		<reference ref_id="CVE-2023-3111" ref_url="https://www.suse.com/security/cve/CVE-2023-3111/" source="CVE"/>
		<reference ref_id="CVE-2023-53032" ref_url="https://www.suse.com/security/cve/CVE-2023-53032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02312-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040708.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2022-50200: selinux: Add boundary check in put_entry() (bsc#1245149).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-15"/>
	<updated date="2025-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205220">SUSE bug 1205220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212051">SUSE bug 1212051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240270">SUSE bug 1240270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245047">SUSE bug 1245047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245057">SUSE bug 1245057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245149">SUSE bug 1245149</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3903/">CVE-2022-3903 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3903">CVE-2022-3903 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49937/">CVE-2022-49937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49937">CVE-2022-49937 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50067/">CVE-2022-50067 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50067">CVE-2022-50067 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50200/">CVE-2022-50200 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50200">CVE-2022-50200 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3111/">CVE-2023-3111 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3111">CVE-2023-3111 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53032/">CVE-2023-53032 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53032">CVE-2023-53032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010007709" comment="kernel-default-3.0.101-108.186.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007710" comment="kernel-default-base-3.0.101-108.186.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007712" comment="kernel-ec2-3.0.101-108.186.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007713" comment="kernel-ec2-base-3.0.101-108.186.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007715" comment="kernel-source-3.0.101-108.186.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007716" comment="kernel-syms-3.0.101-108.186.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007717" comment="kernel-trace-3.0.101-108.186.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007718" comment="kernel-trace-base-3.0.101-108.186.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007720" comment="kernel-xen-3.0.101-108.186.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007721" comment="kernel-xen-base-3.0.101-108.186.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216508" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1233551" ref_url="https://bugzilla.suse.com/1233551" source="BUGZILLA"/>
		<reference ref_id="1234863" ref_url="https://bugzilla.suse.com/1234863" source="BUGZILLA"/>
		<reference ref_id="1240799" ref_url="https://bugzilla.suse.com/1240799" source="BUGZILLA"/>
		<reference ref_id="1242780" ref_url="https://bugzilla.suse.com/1242780" source="BUGZILLA"/>
		<reference ref_id="1245140" ref_url="https://bugzilla.suse.com/1245140" source="BUGZILLA"/>
		<reference ref_id="1245217" ref_url="https://bugzilla.suse.com/1245217" source="BUGZILLA"/>
		<reference ref_id="1246037" ref_url="https://bugzilla.suse.com/1246037" source="BUGZILLA"/>
		<reference ref_id="1246045" ref_url="https://bugzilla.suse.com/1246045" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-50211" ref_url="https://www.suse.com/security/cve/CVE-2022-50211/" source="CVE"/>
		<reference ref_id="CVE-2023-53117" ref_url="https://www.suse.com/security/cve/CVE-2023-53117/" source="CVE"/>
		<reference ref_id="CVE-2024-53057" ref_url="https://www.suse.com/security/cve/CVE-2024-53057/" source="CVE"/>
		<reference ref_id="CVE-2024-53164" ref_url="https://www.suse.com/security/cve/CVE-2024-53164/" source="CVE"/>
		<reference ref_id="CVE-2025-21971" ref_url="https://www.suse.com/security/cve/CVE-2025-21971/" source="CVE"/>
		<reference ref_id="CVE-2025-38079" ref_url="https://www.suse.com/security/cve/CVE-2025-38079/" source="CVE"/>
		<reference ref_id="CVE-2025-38200" ref_url="https://www.suse.com/security/cve/CVE-2025-38200/" source="CVE"/>
		<reference ref_id="CVE-2025-38213" ref_url="https://www.suse.com/security/cve/CVE-2025-38213/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02844-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041775.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-50211: md-raid10: fix KASAN warning (bsc#1245140).
- CVE-2023-53117: fs: prevent out-of-bounds array speculation when closing a file descriptor (bsc#1242780).
- CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT (bsc#1233551).
- CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1234863).
- CVE-2025-21971: net_sched: Prevent creation of classes with TC_H_ROOT (bsc#1240799).
- CVE-2025-38079: crypto: algif_hash - fix double free in hash_accept (bsc#1245217).
- CVE-2025-38200: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (bsc#1246045).
- CVE-2025-38213: vgacon: Add check for vc_origin address range in vgacon_scroll() (bsc#1246037).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-18"/>
	<updated date="2025-09-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1233551">SUSE bug 1233551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234863">SUSE bug 1234863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240799">SUSE bug 1240799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242780">SUSE bug 1242780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245140">SUSE bug 1245140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245217">SUSE bug 1245217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246037">SUSE bug 1246037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246045">SUSE bug 1246045</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50211/">CVE-2022-50211 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50211">CVE-2022-50211 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53117/">CVE-2023-53117 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53117">CVE-2023-53117 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53057/">CVE-2024-53057 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53057">CVE-2024-53057 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53164/">CVE-2024-53164 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53164">CVE-2024-53164 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21971/">CVE-2025-21971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21971">CVE-2025-21971 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38079/">CVE-2025-38079 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38079">CVE-2025-38079 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38200/">CVE-2025-38200 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38200">CVE-2025-38200 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38213/">CVE-2025-38213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-38213">CVE-2025-38213 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014439" comment="kernel-default-3.0.101-108.189.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014440" comment="kernel-default-base-3.0.101-108.189.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018635" comment="kernel-docs-3.0.101-108.189.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014442" comment="kernel-ec2-3.0.101-108.189.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014443" comment="kernel-ec2-base-3.0.101-108.189.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014445" comment="kernel-source-3.0.101-108.189.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014446" comment="kernel-syms-3.0.101-108.189.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014447" comment="kernel-trace-3.0.101-108.189.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014448" comment="kernel-trace-base-3.0.101-108.189.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014450" comment="kernel-xen-3.0.101-108.189.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014451" comment="kernel-xen-base-3.0.101-108.189.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216509" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1248438" ref_url="https://bugzilla.suse.com/1248438" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-20053" ref_url="https://www.suse.com/security/cve/CVE-2025-20053/" source="CVE"/>
		<reference ref_id="CVE-2025-20109" ref_url="https://www.suse.com/security/cve/CVE-2025-20109/" source="CVE"/>
		<reference ref_id="CVE-2025-22839" ref_url="https://www.suse.com/security/cve/CVE-2025-22839/" source="CVE"/>
		<reference ref_id="CVE-2025-22840" ref_url="https://www.suse.com/security/cve/CVE-2025-22840/" source="CVE"/>
		<reference ref_id="CVE-2025-22889" ref_url="https://www.suse.com/security/cve/CVE-2025-22889/" source="CVE"/>
		<reference ref_id="CVE-2025-26403" ref_url="https://www.suse.com/security/cve/CVE-2025-26403/" source="CVE"/>
		<reference ref_id="CVE-2025-32086" ref_url="https://www.suse.com/security/cve/CVE-2025-32086/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:03116-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041549.html" source="SUSE-SU"/>
		<description>
This update for microcode_ctl fixes the following issues:

- Intel CPU Microcode was updated to the 20250812 release (bsc#1248438)
     - CVE-2025-20109: Improper Isolation or Compartmentalization in the stream cache mechanism for some Intel Processors may allow an authenticated user to potentially enable escalation of privilege via local access.
     - CVE-2025-22840: Sequence of processor instructions leads to unexpected behavior for some Intel Xeon 6 Scalable processors may allow an authenticated user to potentially enable escalation of privilege via local access
     - CVE-2025-22839: Insufficient granularity of access control in the OOB-MSM for some Intel Xeon 6 Scalable processors may allow a privileged user to potentially enable escalation of privilege via adjacent access.
     - CVE-2025-22889: Improper handling of overlap between protected memory ranges for some Intel Xeon 6 processor with Intel TDX may allow a privileged user to potentially enable escalation of privilege via local access.
     - CVE-2025-20053: Improper buffer restrictions for some Intel Xeon Processor firmware with SGX enabled may allow a privileged user to potentially enable escalation of privilege via local access.
     - CVE-2025-26403: Out-of-bounds write in the memory subsystem for some Intel Xeon 6 processors when using Intel SGX or Intel TDX may allow a privileged user to potentially enable escalation of privilege via local access.
     - CVE-2025-32086: Improperly implemented security check for standard in the DDRIO configuration for some Intel Xeon 6 Processors when using Intel SGX or Intel TDX may allow a privileged user to potentially enable escalation of privilege via local access.
     - Update for functional issues. 
     - Updated Platforms:

       | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
       |:---------------|:---------|:------------|:---------|:---------|:---------
       | ARL-H          | A1       | 06-c5-02/82 | 00000118 | 00000119 | Core Ultra Processor (Series 2)
       | ARL-S/HX (8P)  | B0       | 06-c6-02/82 | 00000118 | 00000119 | Core Ultra Processor (Series 2)
       | EMR-SP         | A1       | 06-cf-02/87 | 210002a9 | 210002b3 | Xeon Scalable Gen5
       | GNR-AP/SP      | B0       | 06-ad-01/95 | 010003a2 | 010003d0 | Xeon Scalable Gen6
       | GNR-AP/SP      | H0       | 06-ad-01/20 | 0a0000d1 | 0a000100 | Xeon Scalable Gen6
       | ICL-D          | B0       | 06-6c-01/10 | 010002d0 | 010002e0 | Xeon D-17xx, D-27xx
       | ICX-SP         | Dx/M1    | 06-6a-06/87 | 0d000404 | 0d000410 | Xeon Scalable Gen3
       | LNL            | B0       | 06-bd-01/80 | 0000011f | 00000123 | Core Ultra 200 V Series Processor
       | MTL            | C0       | 06-aa-04/e6 | 00000024 | 00000025 | Core™ Ultra Processor
       | RPL-H/P/PX 6+8 | J0       | 06-ba-02/e0 | 00004128 | 00004129 | Core Gen13
       | RPL-U 2+8      | Q0       | 06-ba-03/e0 | 00004128 | 00004129 | Core Gen13
       | SPR-HBM        | Bx       | 06-8f-08/10 | 2c0003f7 | 2c000401 | Xeon Max
       | SPR-SP         | E4/S2    | 06-8f-07/87 | 2b000639 | 2b000643 | Xeon Scalable Gen4
       | SPR-SP         | E5/S3    | 06-8f-08/87 | 2b000639 | 2b000643 | Xeon Scalable Gen4
       | SRF-SP         | C0       | 06-af-03/01 | 03000341 | 03000362 | Xeon 6700-Series Processors with E-Cores
  
  New Disclosures Updated in Prior Releases:
  All ADL, RPL, SPR, EMR, MTL, ARL Microcode patches previously released in May 2025.
		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-09"/>
	<updated date="2025-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1248438">SUSE bug 1248438</bugzilla>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" cvss4="7/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-20053/">CVE-2025-20053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20053">CVE-2025-20053 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-20109/">CVE-2025-20109 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20109">CVE-2025-20109 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L" cvss4="7.3/CVSS:4.0/AV:A/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-22839/">CVE-2025-22839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22839">CVE-2025-22839 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" cvss4="5.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-22840/">CVE-2025-22840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22840">CVE-2025-22840 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-22889/">CVE-2025-22889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22889">CVE-2025-22889 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" cvss4="4.5/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-26403/">CVE-2025-26403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-26403">CVE-2025-26403 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" cvss4="4.5/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-32086/">CVE-2025-32086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32086">CVE-2025-32086 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017384" comment="microcode_ctl-1.17-102.83.87.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216510" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1250232" ref_url="https://bugzilla.suse.com/1250232" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-9230" ref_url="https://www.suse.com/security/cve/CVE-2025-9230/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:03630-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042191.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2025-9230: Fixed out-of-bounds read &amp; write in RFC 3211 KEK unwrap (bsc#1250232).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-17"/>
	<updated date="2025-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1250232">SUSE bug 1250232</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9230/">CVE-2025-9230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9230">CVE-2025-9230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010022499" comment="libopenssl1-devel-1.0.1g-0.58.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022500" comment="libopenssl1_0_0-1.0.1g-0.58.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022501" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022502" comment="openssl1-1.0.1g-0.58.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022503" comment="openssl1-doc-1.0.1g-0.58.85.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216511" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1078788" ref_url="https://bugzilla.suse.com/1078788" source="BUGZILLA"/>
		<reference ref_id="1209291" ref_url="https://bugzilla.suse.com/1209291" source="BUGZILLA"/>
		<reference ref_id="1213666" ref_url="https://bugzilla.suse.com/1213666" source="BUGZILLA"/>
		<reference ref_id="1244824" ref_url="https://bugzilla.suse.com/1244824" source="BUGZILLA"/>
		<reference ref_id="1246911" ref_url="https://bugzilla.suse.com/1246911" source="BUGZILLA"/>
		<reference ref_id="1247374" ref_url="https://bugzilla.suse.com/1247374" source="BUGZILLA"/>
		<reference ref_id="1248621" ref_url="https://bugzilla.suse.com/1248621" source="BUGZILLA"/>
		<reference ref_id="1249200" ref_url="https://bugzilla.suse.com/1249200" source="BUGZILLA"/>
		<reference ref_id="1249220" ref_url="https://bugzilla.suse.com/1249220" source="BUGZILLA"/>
		<reference ref_id="1249604" ref_url="https://bugzilla.suse.com/1249604" source="BUGZILLA"/>
		<reference ref_id="1249808" ref_url="https://bugzilla.suse.com/1249808" source="BUGZILLA"/>
		<reference ref_id="1249846" ref_url="https://bugzilla.suse.com/1249846" source="BUGZILLA"/>
		<reference ref_id="1249880" ref_url="https://bugzilla.suse.com/1249880" source="BUGZILLA"/>
		<reference ref_id="1249988" ref_url="https://bugzilla.suse.com/1249988" source="BUGZILLA"/>
		<reference ref_id="1250257" ref_url="https://bugzilla.suse.com/1250257" source="BUGZILLA"/>
		<reference ref_id="1250311" ref_url="https://bugzilla.suse.com/1250311" source="BUGZILLA"/>
		<reference ref_id="1250323" ref_url="https://bugzilla.suse.com/1250323" source="BUGZILLA"/>
		<reference ref_id="1250358" ref_url="https://bugzilla.suse.com/1250358" source="BUGZILLA"/>
		<reference ref_id="1250392" ref_url="https://bugzilla.suse.com/1250392" source="BUGZILLA"/>
		<reference ref_id="1250522" ref_url="https://bugzilla.suse.com/1250522" source="BUGZILLA"/>
		<reference ref_id="1250742" ref_url="https://bugzilla.suse.com/1250742" source="BUGZILLA"/>
		<reference ref_id="1252035" ref_url="https://bugzilla.suse.com/1252035" source="BUGZILLA"/>
		<reference ref_id="1252499" ref_url="https://bugzilla.suse.com/1252499" source="BUGZILLA"/>
		<reference ref_id="1252554" ref_url="https://bugzilla.suse.com/1252554" source="BUGZILLA"/>
		<reference ref_id="963449" ref_url="https://bugzilla.suse.com/963449" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-50116" ref_url="https://www.suse.com/security/cve/CVE-2022-50116/" source="CVE"/>
		<reference ref_id="CVE-2022-50252" ref_url="https://www.suse.com/security/cve/CVE-2022-50252/" source="CVE"/>
		<reference ref_id="CVE-2022-50272" ref_url="https://www.suse.com/security/cve/CVE-2022-50272/" source="CVE"/>
		<reference ref_id="CVE-2022-50381" ref_url="https://www.suse.com/security/cve/CVE-2022-50381/" source="CVE"/>
		<reference ref_id="CVE-2022-50409" ref_url="https://www.suse.com/security/cve/CVE-2022-50409/" source="CVE"/>
		<reference ref_id="CVE-2023-28328" ref_url="https://www.suse.com/security/cve/CVE-2023-28328/" source="CVE"/>
		<reference ref_id="CVE-2023-3772" ref_url="https://www.suse.com/security/cve/CVE-2023-3772/" source="CVE"/>
		<reference ref_id="CVE-2023-53147" ref_url="https://www.suse.com/security/cve/CVE-2023-53147/" source="CVE"/>
		<reference ref_id="CVE-2023-53282" ref_url="https://www.suse.com/security/cve/CVE-2023-53282/" source="CVE"/>
		<reference ref_id="CVE-2023-53322" ref_url="https://www.suse.com/security/cve/CVE-2023-53322/" source="CVE"/>
		<reference ref_id="CVE-2023-53365" ref_url="https://www.suse.com/security/cve/CVE-2023-53365/" source="CVE"/>
		<reference ref_id="CVE-2023-53395" ref_url="https://www.suse.com/security/cve/CVE-2023-53395/" source="CVE"/>
		<reference ref_id="CVE-2023-53705" ref_url="https://www.suse.com/security/cve/CVE-2023-53705/" source="CVE"/>
		<reference ref_id="CVE-2023-53722" ref_url="https://www.suse.com/security/cve/CVE-2023-53722/" source="CVE"/>
		<reference ref_id="CVE-2025-38352" ref_url="https://www.suse.com/security/cve/CVE-2025-38352/" source="CVE"/>
		<reference ref_id="CVE-2025-38498" ref_url="https://www.suse.com/security/cve/CVE-2025-38498/" source="CVE"/>
		<reference ref_id="CVE-2025-38617" ref_url="https://www.suse.com/security/cve/CVE-2025-38617/" source="CVE"/>
		<reference ref_id="CVE-2025-38685" ref_url="https://www.suse.com/security/cve/CVE-2025-38685/" source="CVE"/>
		<reference ref_id="CVE-2025-38713" ref_url="https://www.suse.com/security/cve/CVE-2025-38713/" source="CVE"/>
		<reference ref_id="CVE-2025-39973" ref_url="https://www.suse.com/security/cve/CVE-2025-39973/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to fix various security issues

The following security issues were fixed:

- CVE-2022-50116: Update config files. Disable N_GSM (bsc#1244824 jsc#PED-8240).
- CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249846).
- CVE-2022-50381: MD: add rdev reference for super write (bsc#1250257).
- CVE-2022-50409: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory (bsc#1250392).
- CVE-2023-53282: scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write (bsc#1250311).
- CVE-2023-53322: scsi: qla2xxx: Wait for io return on terminate rport (bsc#1250323).
- CVE-2023-53365: ip6mr: Fix skb_under_panic in ip6mr_cache_report() (bsc#1249988).
- CVE-2023-53395: ACPICA: Add AML_NO_OPERAND_RESOLVE flag to Timer (bsc#1250358).
- CVE-2023-53705: ipv6: Fix out-of-bounds access in ipv6_find_tlv() (bsc#1252554).
- CVE-2023-53722: md: raid1: fix potential OOB in raid1_remove_disk() (bsc#1252499).
- CVE-2025-38352: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (bsc#1246911).
- CVE-2025-38498: do_change_type(): refuse to operate on unmounted/not ours mounts (bsc#1247374).
- CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1248621).
- CVE-2025-38685: fbdev: Fix vmalloc out-of-bounds write in fast_imageblit (bsc#1249220).
- CVE-2025-38713: hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() (bsc#1249200).
- CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-01"/>
	<updated date="2025-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1078788">SUSE bug 1078788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209291">SUSE bug 1209291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213666">SUSE bug 1213666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244824">SUSE bug 1244824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246911">SUSE bug 1246911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247374">SUSE bug 1247374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248621">SUSE bug 1248621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249200">SUSE bug 1249200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249220">SUSE bug 1249220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249604">SUSE bug 1249604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249808">SUSE bug 1249808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249846">SUSE bug 1249846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249880">SUSE bug 1249880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249988">SUSE bug 1249988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250257">SUSE bug 1250257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250311">SUSE bug 1250311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250323">SUSE bug 1250323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250358">SUSE bug 1250358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250392">SUSE bug 1250392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250522">SUSE bug 1250522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250742">SUSE bug 1250742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252035">SUSE bug 1252035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252499">SUSE bug 1252499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252554">SUSE bug 1252554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963449">SUSE bug 963449</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50116/">CVE-2022-50116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50116">CVE-2022-50116 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50252/">CVE-2022-50252 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50252">CVE-2022-50252 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50272/">CVE-2022-50272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50272">CVE-2022-50272 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50381/">CVE-2022-50381 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50381">CVE-2022-50381 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50409/">CVE-2022-50409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50409">CVE-2022-50409 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28328/">CVE-2023-28328 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28328">CVE-2023-28328 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3772/">CVE-2023-3772 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3772">CVE-2023-3772 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53147/">CVE-2023-53147 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53147">CVE-2023-53147 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53282/">CVE-2023-53282 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53282">CVE-2023-53282 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53322/">CVE-2023-53322 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53322">CVE-2023-53322 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53365/">CVE-2023-53365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53365">CVE-2023-53365 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53395/">CVE-2023-53395 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53395">CVE-2023-53395 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53705/">CVE-2023-53705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53705">CVE-2023-53705 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53722/">CVE-2023-53722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53722">CVE-2023-53722 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38352/">CVE-2025-38352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-38352">CVE-2025-38352 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38498/">CVE-2025-38498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38498">CVE-2025-38498 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38617/">CVE-2025-38617 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38617">CVE-2025-38617 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38685/">CVE-2025-38685 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38685">CVE-2025-38685 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38713/">CVE-2025-38713 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38713">CVE-2025-38713 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39973/">CVE-2025-39973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39973">CVE-2025-39973 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032349" comment="kernel-default-3.0.101-108.192.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032350" comment="kernel-default-base-3.0.101-108.192.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032352" comment="kernel-docs-3.0.101-108.192.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032353" comment="kernel-ec2-3.0.101-108.192.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032354" comment="kernel-ec2-base-3.0.101-108.192.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032356" comment="kernel-source-3.0.101-108.192.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032357" comment="kernel-syms-3.0.101-108.192.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032358" comment="kernel-trace-3.0.101-108.192.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032359" comment="kernel-trace-base-3.0.101-108.192.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032361" comment="kernel-xen-3.0.101-108.192.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032362" comment="kernel-xen-base-3.0.101-108.192.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216512" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1251786" ref_url="https://bugzilla.suse.com/1251786" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-53676" ref_url="https://www.suse.com/security/cve/CVE-2023-53676/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:4507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023638.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-22"/>
	<updated date="2025-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1251786">SUSE bug 1251786</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53676/">CVE-2023-53676 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53676">CVE-2023-53676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034906" comment="kernel-default-3.0.101-108.195.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034907" comment="kernel-default-base-3.0.101-108.195.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034909" comment="kernel-docs-3.0.101-108.195.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034910" comment="kernel-ec2-3.0.101-108.195.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034911" comment="kernel-ec2-base-3.0.101-108.195.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034913" comment="kernel-source-3.0.101-108.195.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034914" comment="kernel-syms-3.0.101-108.195.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034915" comment="kernel-trace-3.0.101-108.195.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034916" comment="kernel-trace-base-3.0.101-108.195.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034918" comment="kernel-xen-3.0.101-108.195.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034919" comment="kernel-xen-base-3.0.101-108.195.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216513" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1224763" ref_url="https://bugzilla.suse.com/1224763" source="BUGZILLA"/>
		<reference ref_id="1234025" ref_url="https://bugzilla.suse.com/1234025" source="BUGZILLA"/>
		<reference ref_id="1234853" ref_url="https://bugzilla.suse.com/1234853" source="BUGZILLA"/>
		<reference ref_id="1234891" ref_url="https://bugzilla.suse.com/1234891" source="BUGZILLA"/>
		<reference ref_id="1234963" ref_url="https://bugzilla.suse.com/1234963" source="BUGZILLA"/>
		<reference ref_id="1235054" ref_url="https://bugzilla.suse.com/1235054" source="BUGZILLA"/>
		<reference ref_id="1235061" ref_url="https://bugzilla.suse.com/1235061" source="BUGZILLA"/>
		<reference ref_id="1235073" ref_url="https://bugzilla.suse.com/1235073" source="BUGZILLA"/>
		<reference ref_id="1235217" ref_url="https://bugzilla.suse.com/1235217" source="BUGZILLA"/>
		<reference ref_id="1235230" ref_url="https://bugzilla.suse.com/1235230" source="BUGZILLA"/>
		<reference ref_id="1235430" ref_url="https://bugzilla.suse.com/1235430" source="BUGZILLA"/>
		<reference ref_id="1235645" ref_url="https://bugzilla.suse.com/1235645" source="BUGZILLA"/>
		<reference ref_id="1235812" ref_url="https://bugzilla.suse.com/1235812" source="BUGZILLA"/>
		<reference ref_id="1235920" ref_url="https://bugzilla.suse.com/1235920" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-35863" ref_url="https://www.suse.com/security/cve/CVE-2024-35863/" source="CVE"/>
		<reference ref_id="CVE-2024-53104" ref_url="https://www.suse.com/security/cve/CVE-2024-53104/" source="CVE"/>
		<reference ref_id="CVE-2024-53173" ref_url="https://www.suse.com/security/cve/CVE-2024-53173/" source="CVE"/>
		<reference ref_id="CVE-2024-53239" ref_url="https://www.suse.com/security/cve/CVE-2024-53239/" source="CVE"/>
		<reference ref_id="CVE-2024-56539" ref_url="https://www.suse.com/security/cve/CVE-2024-56539/" source="CVE"/>
		<reference ref_id="CVE-2024-56548" ref_url="https://www.suse.com/security/cve/CVE-2024-56548/" source="CVE"/>
		<reference ref_id="CVE-2024-56600" ref_url="https://www.suse.com/security/cve/CVE-2024-56600/" source="CVE"/>
		<reference ref_id="CVE-2024-56601" ref_url="https://www.suse.com/security/cve/CVE-2024-56601/" source="CVE"/>
		<reference ref_id="CVE-2024-56605" ref_url="https://www.suse.com/security/cve/CVE-2024-56605/" source="CVE"/>
		<reference ref_id="CVE-2024-56650" ref_url="https://www.suse.com/security/cve/CVE-2024-56650/" source="CVE"/>
		<reference ref_id="CVE-2024-56759" ref_url="https://www.suse.com/security/cve/CVE-2024-56759/" source="CVE"/>
		<reference ref_id="CVE-2024-57850" ref_url="https://www.suse.com/security/cve/CVE-2024-57850/" source="CVE"/>
		<reference ref_id="CVE-2024-57893" ref_url="https://www.suse.com/security/cve/CVE-2024-57893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020383.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-35863: smb: client: fix potential UAF in is_valid_oplock_break() (bsc#1224763).
- CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
- CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235217).
- CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235230).
- CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235430).
- CVE-2024-56759: btrfs: fix use-after-free when COWing tree bock and tracing is enabled (bsc#1235645).
- CVE-2024-57850: jffs2: Prevent rtime decompress memory corruption (bsc#1235812).
- CVE-2024-57893: ALSA: seq: oss: Fix races at processing SysEx messages (bsc#1235920).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-20"/>
	<updated date="2025-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1224763">SUSE bug 1224763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234025">SUSE bug 1234025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234853">SUSE bug 1234853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234891">SUSE bug 1234891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234963">SUSE bug 1234963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235054">SUSE bug 1235054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235061">SUSE bug 1235061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235073">SUSE bug 1235073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235217">SUSE bug 1235217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235230">SUSE bug 1235230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235430">SUSE bug 1235430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235645">SUSE bug 1235645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235812">SUSE bug 1235812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235920">SUSE bug 1235920</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35863/">CVE-2024-35863 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35863">CVE-2024-35863 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53104/">CVE-2024-53104 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53104">CVE-2024-53104 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53173/">CVE-2024-53173 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53173">CVE-2024-53173 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53239/">CVE-2024-53239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53239">CVE-2024-53239 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56539/">CVE-2024-56539 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56539">CVE-2024-56539 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56548/">CVE-2024-56548 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56548">CVE-2024-56548 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56600/">CVE-2024-56600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56600">CVE-2024-56600 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56601/">CVE-2024-56601 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56601">CVE-2024-56601 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56605/">CVE-2024-56605 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56605">CVE-2024-56605 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56650/">CVE-2024-56650 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56650">CVE-2024-56650 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56759/">CVE-2024-56759 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56759">CVE-2024-56759 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57850/">CVE-2024-57850 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57850">CVE-2024-57850 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57893/">CVE-2024-57893 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57893">CVE-2024-57893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991109" comment="kernel-default-3.0.101-108.177.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991110" comment="kernel-default-base-3.0.101-108.177.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991112" comment="kernel-ec2-3.0.101-108.177.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991113" comment="kernel-ec2-base-3.0.101-108.177.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991115" comment="kernel-source-3.0.101-108.177.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991116" comment="kernel-syms-3.0.101-108.177.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991117" comment="kernel-trace-3.0.101-108.177.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991118" comment="kernel-trace-base-3.0.101-108.177.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991120" comment="kernel-xen-3.0.101-108.177.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991121" comment="kernel-xen-base-3.0.101-108.177.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216514" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1221532" ref_url="https://bugzilla.suse.com/1221532" source="BUGZILLA"/>
		<reference ref_id="1238917" ref_url="https://bugzilla.suse.com/1238917" source="BUGZILLA"/>
		<reference ref_id="1257749" ref_url="https://bugzilla.suse.com/1257749" source="BUGZILLA"/>
		<reference ref_id="1257790" ref_url="https://bugzilla.suse.com/1257790" source="BUGZILLA"/>
		<reference ref_id="1258395" ref_url="https://bugzilla.suse.com/1258395" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-47110" ref_url="https://www.suse.com/security/cve/CVE-2021-47110/" source="CVE"/>
		<reference ref_id="CVE-2025-21738" ref_url="https://www.suse.com/security/cve/CVE-2025-21738/" source="CVE"/>
		<reference ref_id="CVE-2026-23074" ref_url="https://www.suse.com/security/cve/CVE-2026-23074/" source="CVE"/>
		<reference ref_id="CVE-2026-23089" ref_url="https://www.suse.com/security/cve/CVE-2026-23089/" source="CVE"/>
		<reference ref_id="CVE-2026-23191" ref_url="https://www.suse.com/security/cve/CVE-2026-23191/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025020.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2021-47110: Fixed possible memory corruption when restoring from hibernation in x86/kvm (bsc#1221532).
- CVE-2025-21738: ata: libata-sff: Ensure that we cannot write outside the allocated buffer (bsc#1238917).
- CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1257749).
- CVE-2026-23089: ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() (bsc#1257790).
- CVE-2026-23191: ALSA: aloop: Fix racy access at PCM trigger (bsc#1258395).

The following non-security bugs were fixed:

- Disable CONFIG_NET_SCH_ATM (jsc#PED-12836).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-27"/>
	<updated date="2026-03-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1221532">SUSE bug 1221532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238917">SUSE bug 1238917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257749">SUSE bug 1257749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257790">SUSE bug 1257790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258395">SUSE bug 1258395</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47110/">CVE-2021-47110 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47110">CVE-2021-47110 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21738/">CVE-2025-21738 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21738">CVE-2025-21738 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23074/">CVE-2026-23074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23074">CVE-2026-23074 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.2/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23089/">CVE-2026-23089 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23089">CVE-2026-23089 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23191/">CVE-2026-23191 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23191">CVE-2026-23191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052003" comment="kernel-default-3.0.101-108.204.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052004" comment="kernel-default-base-3.0.101-108.204.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052005" comment="kernel-docs-3.0.101-108.204.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052006" comment="kernel-ec2-3.0.101-108.204.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052007" comment="kernel-ec2-base-3.0.101-108.204.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052008" comment="kernel-source-3.0.101-108.204.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052009" comment="kernel-syms-3.0.101-108.204.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052010" comment="kernel-trace-3.0.101-108.204.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052011" comment="kernel-trace-base-3.0.101-108.204.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052012" comment="kernel-xen-3.0.101-108.204.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052013" comment="kernel-xen-base-3.0.101-108.204.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216515" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1207051" ref_url="https://bugzilla.suse.com/1207051" source="BUGZILLA"/>
		<reference ref_id="1253291" ref_url="https://bugzilla.suse.com/1253291" source="BUGZILLA"/>
		<reference ref_id="1253292" ref_url="https://bugzilla.suse.com/1253292" source="BUGZILLA"/>
		<reference ref_id="1254959" ref_url="https://bugzilla.suse.com/1254959" source="BUGZILLA"/>
		<reference ref_id="1256053" ref_url="https://bugzilla.suse.com/1256053" source="BUGZILLA"/>
		<reference ref_id="1256353" ref_url="https://bugzilla.suse.com/1256353" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-23559" ref_url="https://www.suse.com/security/cve/CVE-2023-23559/" source="CVE"/>
		<reference ref_id="CVE-2023-54110" ref_url="https://www.suse.com/security/cve/CVE-2023-54110/" source="CVE"/>
		<reference ref_id="CVE-2023-54168" ref_url="https://www.suse.com/security/cve/CVE-2023-54168/" source="CVE"/>
		<reference ref_id="CVE-2025-40018" ref_url="https://www.suse.com/security/cve/CVE-2025-40018/" source="CVE"/>
		<reference ref_id="CVE-2025-40215" ref_url="https://www.suse.com/security/cve/CVE-2025-40215/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023998.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to fix various security issues

The following security issues were fixed:

- CVE-2023-54168: RDMA/mlx4: Prevent shift wrapping in set_user_sq_size() (bsc#1256053).
- CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1253291 bsc#1253292).
- CVE-2025-40215: kABI: xfrm: delete x-&gt;tunnel as we delete x (bsc#1254959).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-01-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207051">SUSE bug 1207051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253291">SUSE bug 1253291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253292">SUSE bug 1253292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254959">SUSE bug 1254959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256053">SUSE bug 1256053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256353">SUSE bug 1256353</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-23559/">CVE-2023-23559 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23559">CVE-2023-23559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54110/">CVE-2023-54110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54110">CVE-2023-54110 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-54168/">CVE-2023-54168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54168">CVE-2023-54168 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40018/">CVE-2025-40018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40018">CVE-2025-40018 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40215/">CVE-2025-40215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40215">CVE-2025-40215 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041035" comment="kernel-default-3.0.101-108.198.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041036" comment="kernel-default-base-3.0.101-108.198.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041038" comment="kernel-docs-3.0.101-108.198.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041039" comment="kernel-ec2-3.0.101-108.198.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041040" comment="kernel-ec2-base-3.0.101-108.198.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041042" comment="kernel-source-3.0.101-108.198.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041043" comment="kernel-syms-3.0.101-108.198.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041044" comment="kernel-trace-3.0.101-108.198.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041045" comment="kernel-trace-base-3.0.101-108.198.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041047" comment="kernel-xen-3.0.101-108.198.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041048" comment="kernel-xen-base-3.0.101-108.198.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216516" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1197331" ref_url="https://bugzilla.suse.com/1197331" source="BUGZILLA"/>
		<reference ref_id="1203769" ref_url="https://bugzilla.suse.com/1203769" source="BUGZILLA"/>
		<reference ref_id="1235441" ref_url="https://bugzilla.suse.com/1235441" source="BUGZILLA"/>
		<reference ref_id="1237768" ref_url="https://bugzilla.suse.com/1237768" source="BUGZILLA"/>
		<reference ref_id="1238271" ref_url="https://bugzilla.suse.com/1238271" source="BUGZILLA"/>
		<reference ref_id="1238272" ref_url="https://bugzilla.suse.com/1238272" source="BUGZILLA"/>
		<reference ref_id="1238454" ref_url="https://bugzilla.suse.com/1238454" source="BUGZILLA"/>
		<reference ref_id="1238705" ref_url="https://bugzilla.suse.com/1238705" source="BUGZILLA"/>
		<reference ref_id="1238729" ref_url="https://bugzilla.suse.com/1238729" source="BUGZILLA"/>
		<reference ref_id="1238911" ref_url="https://bugzilla.suse.com/1238911" source="BUGZILLA"/>
		<reference ref_id="1239073" ref_url="https://bugzilla.suse.com/1239073" source="BUGZILLA"/>
		<reference ref_id="1239076" ref_url="https://bugzilla.suse.com/1239076" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-47633" ref_url="https://www.suse.com/security/cve/CVE-2021-47633/" source="CVE"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-3303" ref_url="https://www.suse.com/security/cve/CVE-2022-3303/" source="CVE"/>
		<reference ref_id="CVE-2022-49272" ref_url="https://www.suse.com/security/cve/CVE-2022-49272/" source="CVE"/>
		<reference ref_id="CVE-2022-49288" ref_url="https://www.suse.com/security/cve/CVE-2022-49288/" source="CVE"/>
		<reference ref_id="CVE-2022-49291" ref_url="https://www.suse.com/security/cve/CVE-2022-49291/" source="CVE"/>
		<reference ref_id="CVE-2022-49545" ref_url="https://www.suse.com/security/cve/CVE-2022-49545/" source="CVE"/>
		<reference ref_id="CVE-2022-49733" ref_url="https://www.suse.com/security/cve/CVE-2022-49733/" source="CVE"/>
		<reference ref_id="CVE-2024-56658" ref_url="https://www.suse.com/security/cve/CVE-2024-56658/" source="CVE"/>
		<reference ref_id="CVE-2024-57996" ref_url="https://www.suse.com/security/cve/CVE-2024-57996/" source="CVE"/>
		<reference ref_id="CVE-2025-21718" ref_url="https://www.suse.com/security/cve/CVE-2025-21718/" source="CVE"/>
		<reference ref_id="CVE-2025-21772" ref_url="https://www.suse.com/security/cve/CVE-2025-21772/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024056.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2021-47633: ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 (bsc#1237768).
- CVE-2022-49545: ALSA: usb-audio: Cancel pending work at closing a MIDI substream (bsc#1238729).
- CVE-2024-56658: net: defer final 'struct net' free in netns dismantle (bsc#1235441).
- CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076).
- CVE-2025-21718: net: rose: fix timer races against user threads (bsc#1239073).
- CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238911).

		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-04"/>
	<updated date="2026-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197331">SUSE bug 1197331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203769">SUSE bug 1203769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235441">SUSE bug 1235441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237768">SUSE bug 1237768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238271">SUSE bug 1238271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238272">SUSE bug 1238272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238454">SUSE bug 1238454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238705">SUSE bug 1238705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238729">SUSE bug 1238729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238911">SUSE bug 1238911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239073">SUSE bug 1239073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239076">SUSE bug 1239076</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47633/">CVE-2021-47633 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47633">CVE-2021-47633 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1048">CVE-2022-1048 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3303/">CVE-2022-3303 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3303">CVE-2022-3303 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49272/">CVE-2022-49272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49272">CVE-2022-49272 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49288/">CVE-2022-49288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49288">CVE-2022-49288 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49291/">CVE-2022-49291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49291">CVE-2022-49291 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49545/">CVE-2022-49545 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49545">CVE-2022-49545 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49733/">CVE-2022-49733 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49733">CVE-2022-49733 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56658/">CVE-2024-56658 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56658">CVE-2024-56658 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57996/">CVE-2024-57996 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57996">CVE-2024-57996 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21718/">CVE-2025-21718 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21718">CVE-2025-21718 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21772/">CVE-2025-21772 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21772">CVE-2025-21772 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991123" comment="kernel-default-3.0.101-108.180.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991124" comment="kernel-default-base-3.0.101-108.180.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042146" comment="kernel-docs-3.0.101-108.180.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991126" comment="kernel-ec2-3.0.101-108.180.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991127" comment="kernel-ec2-base-3.0.101-108.180.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991129" comment="kernel-source-3.0.101-108.180.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991130" comment="kernel-syms-3.0.101-108.180.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991131" comment="kernel-trace-3.0.101-108.180.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991132" comment="kernel-trace-base-3.0.101-108.180.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991134" comment="kernel-xen-3.0.101-108.180.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991135" comment="kernel-xen-base-3.0.101-108.180.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216517" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1256834" ref_url="https://bugzilla.suse.com/1256834" source="BUGZILLA"/>
		<reference ref_id="1256837" ref_url="https://bugzilla.suse.com/1256837" source="BUGZILLA"/>
		<reference ref_id="1256838" ref_url="https://bugzilla.suse.com/1256838" source="BUGZILLA"/>
		<reference ref_id="1256840" ref_url="https://bugzilla.suse.com/1256840" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-68160" ref_url="https://www.suse.com/security/cve/CVE-2025-68160/" source="CVE"/>
		<reference ref_id="CVE-2025-69420" ref_url="https://www.suse.com/security/cve/CVE-2025-69420/" source="CVE"/>
		<reference ref_id="CVE-2025-69421" ref_url="https://www.suse.com/security/cve/CVE-2025-69421/" source="CVE"/>
		<reference ref_id="CVE-2026-22796" ref_url="https://www.suse.com/security/cve/CVE-2026-22796/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024156.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2025-68160: Heap out-of-bounds write in BIO_f_linebuffer on short writes (bsc#1256834). 
- CVE-2025-69420: Missing ASN1_TYPE validation in TS_RESP_verify_response() function (bsc#1256837).
- CVE-2025-69421: NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function (bsc#1256838).
- CVE-2026-22796: ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function (bsc#1256840).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-13"/>
	<updated date="2026-02-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1256834">SUSE bug 1256834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256837">SUSE bug 1256837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256838">SUSE bug 1256838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256840">SUSE bug 1256840</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68160/">CVE-2025-68160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68160">CVE-2025-68160 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69420/">CVE-2025-69420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69420">CVE-2025-69420 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69421/">CVE-2025-69421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69421">CVE-2025-69421 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-22796/">CVE-2026-22796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22796">CVE-2026-22796 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043851" comment="libopenssl1-devel-1.0.1g-58.90.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043852" comment="libopenssl1_0_0-1.0.1g-58.90.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043853" comment="libopenssl1_0_0-32bit-1.0.1g-58.90.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043854" comment="openssl1-1.0.1g-58.90.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043855" comment="openssl1-doc-1.0.1g-58.90.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216518" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1229129" ref_url="https://bugzilla.suse.com/1229129" source="BUGZILLA"/>
		<reference ref_id="1258046" ref_url="https://bugzilla.suse.com/1258046" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-24853" ref_url="https://www.suse.com/security/cve/CVE-2024-24853/" source="CVE"/>
		<reference ref_id="CVE-2025-31648" ref_url="https://www.suse.com/security/cve/CVE-2025-31648/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024440.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Intel CPU Microcode was updated to the 20260210 release (bsc#1258046)
- CVE-2024-24853: Updated fix for incorrect behavior order in transition
  between executive monitor and SMI transfer monitor (STM) in some Intel(R)
  Processor may allow a privileged user to potentially enable escalation
  of privilege via local access. (bsc#1229129)
- CVE-2025-31648: Improper handling of values in the microcode flow for
  some Intel Processor Family may allow an escalation of privilege. (bsc#1258046)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-26"/>
	<updated date="2026-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229129">SUSE bug 1229129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258046">SUSE bug 1258046</bugzilla>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-24853/">CVE-2024-24853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24853">CVE-2024-24853 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-31648/">CVE-2025-31648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31648">CVE-2025-31648 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046019" comment="microcode_ctl-1.17-102.83.90.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216519" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</platform>
		</affected>
		<reference ref_id="1193731" ref_url="https://bugzilla.suse.com/1193731" source="BUGZILLA"/>
		<reference ref_id="1245986" ref_url="https://bugzilla.suse.com/1245986" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2025-38177" ref_url="https://www.suse.com/security/cve/CVE-2025-38177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024506.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to fix various security issues

The following security issues were fixed:

- CVE-2021-0920: net: split out functions related to registering inflight socket files (bsc#1193731).
- CVE-2025-38177: sch_hfsc: make hfsc_qlen_notify() idempotent (bsc#1245986).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-27"/>
	<updated date="2026-02-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193731">SUSE bug 1193731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245986">SUSE bug 1245986</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0920">CVE-2021-0920 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38177/">CVE-2025-38177 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38177">CVE-2025-38177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010046020" comment="kernel-default-3.0.101-108.201.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046021" comment="kernel-default-base-3.0.101-108.201.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046023" comment="kernel-docs-3.0.101-108.201.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046024" comment="kernel-ec2-3.0.101-108.201.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046025" comment="kernel-ec2-base-3.0.101-108.201.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046027" comment="kernel-source-3.0.101-108.201.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046028" comment="kernel-syms-3.0.101-108.201.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046029" comment="kernel-trace-3.0.101-108.201.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046030" comment="kernel-trace-base-3.0.101-108.201.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046032" comment="kernel-xen-3.0.101-108.201.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046033" comment="kernel-xen-base-3.0.101-108.201.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216520" version="1" class="patch">
	<metadata>
		<title>Security update for python-Jinja2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-PUBCLOUD</platform>
		</affected>
		<reference ref_id="1181944" ref_url="https://bugzilla.suse.com/1181944" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28493" ref_url="https://www.suse.com/security/cve/CVE-2020-28493/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008377.html" source="SUSE-SU"/>
		<description>
This update for python-Jinja2 fixes the following issues:

- CVE-2020-28493: Improve the speed of the 'urlize' filter by reducing regex
    backtracking. Email matching requires a word character at the start of the
    domain part, and only word characters in the TLD. (bsc#1181944)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-25"/>
	<updated date="2021-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181944">SUSE bug 1181944</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28493/">CVE-2020-28493 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28493">CVE-2020-28493 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-PUBCLOUD is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562788" comment="python-Jinja2-2.6-2.19.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216521" version="1" class="patch">
	<metadata>
		<title>Security update for python-azure-agent (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-PUBCLOUD</platform>
		</affected>
		<reference ref_id="1061584" ref_url="https://bugzilla.suse.com/1061584" source="BUGZILLA"/>
		<reference ref_id="1074865" ref_url="https://bugzilla.suse.com/1074865" source="BUGZILLA"/>
		<reference ref_id="1087764" ref_url="https://bugzilla.suse.com/1087764" source="BUGZILLA"/>
		<reference ref_id="1092831" ref_url="https://bugzilla.suse.com/1092831" source="BUGZILLA"/>
		<reference ref_id="1094420" ref_url="https://bugzilla.suse.com/1094420" source="BUGZILLA"/>
		<reference ref_id="1119542" ref_url="https://bugzilla.suse.com/1119542" source="BUGZILLA"/>
		<reference ref_id="1127838" ref_url="https://bugzilla.suse.com/1127838" source="BUGZILLA"/>
		<reference ref_id="1167601" ref_url="https://bugzilla.suse.com/1167601" source="BUGZILLA"/>
		<reference ref_id="1167602" ref_url="https://bugzilla.suse.com/1167602" source="BUGZILLA"/>
		<reference ref_id="1173866" ref_url="https://bugzilla.suse.com/1173866" source="BUGZILLA"/>
		<reference ref_id="1175130" ref_url="https://bugzilla.suse.com/1175130" source="BUGZILLA"/>
		<reference ref_id="997614" ref_url="https://bugzilla.suse.com/997614" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0804" ref_url="https://www.suse.com/security/cve/CVE-2019-0804/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007274.html" source="SUSE-SU"/>
		<description>
This update for python-azure-agent fixes the following issues:

+ Properly set the dhcp configuration to push the hostname to the DHCP
  server (bsc#1173866)
+ Do not bring the interface down to push the hostname, just use ifup
+ Set the hostname using hostnamectl to ensure setting is properly applied
  (bsc#1167601, bsc#1167602)

Update to version 2.2.45 (jsc#ECO-80)

+ Add support for Gen2 VM resource disks
+ Use alternate systemd detection
+ Fix /proc/net/route requirement that causes errors on FreeBSD
+ Add cloud-init auto-detect to prevent multiple provisioning mechanisms
  from relying on configuration for coordination
+ Disable cgroups when daemon is setup incorrectly
+ Remove upgrade extension loop for the same goal state
+ Add container id for extension telemetry events
+ Be more exact when detecting IMDS service health
+ Changing add_event to start sending missing fields

		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-18"/>
	<updated date="2020-08-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1061584">SUSE bug 1061584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074865">SUSE bug 1074865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087764">SUSE bug 1087764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092831">SUSE bug 1092831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094420">SUSE bug 1094420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119542">SUSE bug 1119542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127838">SUSE bug 1127838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167601">SUSE bug 1167601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167602">SUSE bug 1167602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173866">SUSE bug 1173866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175130">SUSE bug 1175130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997614">SUSE bug 997614</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-0804/">CVE-2019-0804 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0804">CVE-2019-0804 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-PUBCLOUD is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562789" comment="python-azure-agent-2.2.45-28.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216522" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1103032" ref_url="https://bugzilla.suse.com/1103032" source="BUGZILLA"/>
		<reference ref_id="1187509" ref_url="https://bugzilla.suse.com/1187509" source="BUGZILLA"/>
		<reference ref_id="1188284" ref_url="https://bugzilla.suse.com/1188284" source="BUGZILLA"/>
		<reference ref_id="1192346" ref_url="https://bugzilla.suse.com/1192346" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009806.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2018-14679: Fixed off-by-one issue in embedded libmspack that could lead to denial of service (bsc#1103032). 
  
- Update to 0.103.4 (bsc#1192346).
- Add documentation about max file size purpose and side effect in the 'clamscan' and 'clamdscan' manpages (bsc#1187509).
- Update to 0.103.3 (bsc#1188284).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187509">SUSE bug 1187509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188284">SUSE bug 1188284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192346">SUSE bug 1192346</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14679">CVE-2018-14679 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657130" comment="clamav-openssl1-0.103.4-0.20.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216523" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1194731" ref_url="https://bugzilla.suse.com/1194731" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20698" ref_url="https://www.suse.com/security/cve/CVE-2022-20698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010086.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2022-20698: Fixed invalid pointer read allowing denial of service crash. (bsc#1194731)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194731">SUSE bug 1194731</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20698/">CVE-2022-20698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20698">CVE-2022-20698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664011" comment="clamav-openssl1-0.103.5-0.20.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216524" version="1" class="patch">
	<metadata>
		<title>Optional OpenSSL 1.0 versions of cyrus-sasl, libcurl4 and libldap</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="843697" ref_url="https://bugzilla.suse.com/843697" source="BUGZILLA"/>
		<reference ref_id="861014" ref_url="https://bugzilla.suse.com/861014" source="BUGZILLA"/>
		<reference ref_id="862623" ref_url="https://bugzilla.suse.com/862623" source="BUGZILLA"/>
		<reference ref_id="864912" ref_url="https://bugzilla.suse.com/864912" source="BUGZILLA"/>
		<reference ref_id="868627" ref_url="https://bugzilla.suse.com/868627" source="BUGZILLA"/>
		<reference ref_id="868629" ref_url="https://bugzilla.suse.com/868629" source="BUGZILLA"/>
		<reference ref_id="870444" ref_url="https://bugzilla.suse.com/870444" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0138" ref_url="https://www.suse.com/security/cve/CVE-2014-0138/" source="CVE"/>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<description>

This update includes variants of existing libraries built against OpenSSL 
1.0.

As OpenSSL 0.8.9j and OpenSSL 1.0.1 are not binary compatible, but have the 
same function names, care must be taken that they are not loaded by the 
same program.

As some system libraries also link against libssl.so or libcrypto.so, these 
need to be available in variants linked against OpenSSL 1.0. These 
libraries are installed below the /opt/suse/ directory hierarchy.

The version and the APIs of these 'shadow' libraries are exactly the same 
as the versions in the system, and so are interchangeable.

For building your OpenSSL 1.0 enabled program, link using the linkflags 
-L/opt/suse/lib64 -Wl, -rpath, /opt/suse/lib64 (on 32bit systems, use lib 
instead of lib64).

This update provides variants for the OpenLDAP2 client, libcurl4 and 
cyrus-sasl libraries.

Additionally, two bugs have been fixed in openldap2 regarding IPv6 support:

    * tls_checkpeer does not work with IPv6 address as Subject Alternative
      Name. (bnc#862623)
    * getaddrinfo does not return if ldap is used for host lookups on IPv6
      environments. (bnc#843697)

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-15"/>
	<updated date="2014-04-15"/>
	<bugzilla href="https://bugzilla.suse.com/843697">SUSE bug 843697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861014">SUSE bug 861014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862623">SUSE bug 862623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864912">SUSE bug 864912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868627">SUSE bug 868627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868629">SUSE bug 868629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870444">SUSE bug 870444</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0138/">CVE-2014-0138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0138">CVE-2014-0138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0139">CVE-2014-0139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009592450" comment="cyrus-sasl-openssl1-2.1.22-0.27.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592451" comment="cyrus-sasl-openssl1-32bit-2.1.22-0.27.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592452" comment="cyrus-sasl-openssl1-crammd5-2.1.22-0.27.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592453" comment="cyrus-sasl-openssl1-digestmd5-2.1.22-0.27.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592454" comment="cyrus-sasl-openssl1-gssapi-2.1.22-0.27.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592455" comment="cyrus-sasl-openssl1-ntlm-2.1.22-0.27.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592456" comment="cyrus-sasl-openssl1-otp-2.1.22-0.27.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592457" comment="cyrus-sasl-openssl1-plain-2.1.22-0.27.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592458" comment="cyrus-sasl-openssl1-x86-2.1.22-0.27.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592463" comment="libcurl4-openssl1-7.19.7-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592464" comment="libcurl4-openssl1-32bit-7.19.7-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592459" comment="libcurl4-openssl1-x86-7.19.7-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592460" comment="libldap-openssl1-2_4-2-2.4.26-0.28.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592461" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.28.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592462" comment="libldap-openssl1-2_4-2-x86-2.4.26-0.28.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216525" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="991389" ref_url="https://bugzilla.suse.com/991389" source="BUGZILLA"/>
		<reference ref_id="991390" ref_url="https://bugzilla.suse.com/991390" source="BUGZILLA"/>
		<reference ref_id="997420" ref_url="https://bugzilla.suse.com/997420" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5419" ref_url="https://www.suse.com/security/cve/CVE-2016-5419/" source="CVE"/>
		<reference ref_id="CVE-2016-5420" ref_url="https://www.suse.com/security/cve/CVE-2016-5420/" source="CVE"/>
		<reference ref_id="CVE-2016-7141" ref_url="https://www.suse.com/security/cve/CVE-2016-7141/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002306.html" source="SUSE-SU"/>
		<description>

This update for curl fixes the following issues:

- CVE-2016-5419: TLS session resumption client cert bypass (bsc#991389)
- CVE-2016-5420: Re-using connections with wrong client cert (bsc#991390)
- CVE-2016-7141: Fixed incorrect reuse of client certificates (bsc#997420).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-04"/>
	<updated date="2016-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/991389">SUSE bug 991389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991390">SUSE bug 991390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997420">SUSE bug 997420</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5419/">CVE-2016-5419 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5419">CVE-2016-5419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5420/">CVE-2016-5420 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5420">CVE-2016-5420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7141/">CVE-2016-7141 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7141">CVE-2016-7141 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565590" comment="curl-openssl1-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565591" comment="libcurl4-openssl1-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565592" comment="libcurl4-openssl1-32bit-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565593" comment="libcurl4-openssl1-x86-7.19.7-1.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216526" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1005633" ref_url="https://bugzilla.suse.com/1005633" source="BUGZILLA"/>
		<reference ref_id="1005634" ref_url="https://bugzilla.suse.com/1005634" source="BUGZILLA"/>
		<reference ref_id="1005635" ref_url="https://bugzilla.suse.com/1005635" source="BUGZILLA"/>
		<reference ref_id="1005637" ref_url="https://bugzilla.suse.com/1005637" source="BUGZILLA"/>
		<reference ref_id="1005638" ref_url="https://bugzilla.suse.com/1005638" source="BUGZILLA"/>
		<reference ref_id="1005642" ref_url="https://bugzilla.suse.com/1005642" source="BUGZILLA"/>
		<reference ref_id="1005645" ref_url="https://bugzilla.suse.com/1005645" source="BUGZILLA"/>
		<reference ref_id="1005646" ref_url="https://bugzilla.suse.com/1005646" source="BUGZILLA"/>
		<reference ref_id="998760" ref_url="https://bugzilla.suse.com/998760" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7167" ref_url="https://www.suse.com/security/cve/CVE-2016-7167/" source="CVE"/>
		<reference ref_id="CVE-2016-8615" ref_url="https://www.suse.com/security/cve/CVE-2016-8615/" source="CVE"/>
		<reference ref_id="CVE-2016-8616" ref_url="https://www.suse.com/security/cve/CVE-2016-8616/" source="CVE"/>
		<reference ref_id="CVE-2016-8617" ref_url="https://www.suse.com/security/cve/CVE-2016-8617/" source="CVE"/>
		<reference ref_id="CVE-2016-8618" ref_url="https://www.suse.com/security/cve/CVE-2016-8618/" source="CVE"/>
		<reference ref_id="CVE-2016-8619" ref_url="https://www.suse.com/security/cve/CVE-2016-8619/" source="CVE"/>
		<reference ref_id="CVE-2016-8620" ref_url="https://www.suse.com/security/cve/CVE-2016-8620/" source="CVE"/>
		<reference ref_id="CVE-2016-8621" ref_url="https://www.suse.com/security/cve/CVE-2016-8621/" source="CVE"/>
		<reference ref_id="CVE-2016-8622" ref_url="https://www.suse.com/security/cve/CVE-2016-8622/" source="CVE"/>
		<reference ref_id="CVE-2016-8623" ref_url="https://www.suse.com/security/cve/CVE-2016-8623/" source="CVE"/>
		<reference ref_id="CVE-2016-8624" ref_url="https://www.suse.com/security/cve/CVE-2016-8624/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002391.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following security issues:

- CVE-2016-8624: invalid URL parsing with '#' (bsc#1005646)
- CVE-2016-8623: Use-after-free via shared cookies (bsc#1005645)
- CVE-2016-8621: curl_getdate read out of bounds (bsc#1005642)
- CVE-2016-8619: double-free in krb5 code (bsc#1005638)
- CVE-2016-8618: double-free in curl_maprintf (bsc#1005637)
- CVE-2016-8617: OOB write via unchecked multiplication (bsc#1005635)
- CVE-2016-8616: case insensitive password comparison (bsc#1005634)
- CVE-2016-8615: cookie injection for other servers (bsc#1005633)
- CVE-2016-7167: escape and unescape integer overflows (bsc#998760)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-03"/>
	<updated date="2016-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005633">SUSE bug 1005633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005634">SUSE bug 1005634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005635">SUSE bug 1005635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005637">SUSE bug 1005637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005638">SUSE bug 1005638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005642">SUSE bug 1005642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005645">SUSE bug 1005645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005646">SUSE bug 1005646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998760">SUSE bug 998760</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7167/">CVE-2016-7167 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7167">CVE-2016-7167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8615/">CVE-2016-8615 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8615">CVE-2016-8615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8616/">CVE-2016-8616 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8616">CVE-2016-8616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8617/">CVE-2016-8617 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8617">CVE-2016-8617 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-8618/">CVE-2016-8618 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8618">CVE-2016-8618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8619/">CVE-2016-8619 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8619">CVE-2016-8619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8620/">CVE-2016-8620 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8620">CVE-2016-8620 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-8621/">CVE-2016-8621 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8621">CVE-2016-8621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8622/">CVE-2016-8622 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8622">CVE-2016-8622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8623/">CVE-2016-8623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8623">CVE-2016-8623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8624/">CVE-2016-8624 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8624">CVE-2016-8624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565594" comment="curl-openssl1-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565595" comment="libcurl4-openssl1-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565596" comment="libcurl4-openssl1-32bit-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565597" comment="libcurl4-openssl1-x86-7.19.7-1.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216527" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1015332" ref_url="https://bugzilla.suse.com/1015332" source="BUGZILLA"/>
		<reference ref_id="1032309" ref_url="https://bugzilla.suse.com/1032309" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586/" source="CVE"/>
		<reference ref_id="CVE-2017-7407" ref_url="https://www.suse.com/security/cve/CVE-2017-7407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002809.html" source="SUSE-SU"/>
		<description>

This update for curl fixes the following issues:

These security issues were fixed:

- CVE-2016-9586: libcurl printf floating point buffer overflow (bsc#1015332)
- CVE-2017-7407: The ourWriteOut function in tool_writeout.c in curl might have allowed physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which lead to a heap-based buffer over-read (bsc#1032309).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015332">SUSE bug 1015332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032309">SUSE bug 1032309</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9586">CVE-2016-9586 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7407/">CVE-2017-7407 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7407">CVE-2017-7407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565598" comment="curl-openssl1-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565599" comment="libcurl4-openssl1-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565600" comment="libcurl4-openssl1-32bit-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565601" comment="libcurl4-openssl1-x86-7.19.7-1.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216528" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1015332" ref_url="https://bugzilla.suse.com/1015332" source="BUGZILLA"/>
		<reference ref_id="1032309" ref_url="https://bugzilla.suse.com/1032309" source="BUGZILLA"/>
		<reference ref_id="1051644" ref_url="https://bugzilla.suse.com/1051644" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586/" source="CVE"/>
		<reference ref_id="CVE-2017-1000100" ref_url="https://www.suse.com/security/cve/CVE-2017-1000100/" source="CVE"/>
		<reference ref_id="CVE-2017-7407" ref_url="https://www.suse.com/security/cve/CVE-2017-7407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003173.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2017-1000100: TFP sends more than buffer size and it could lead to a denial of service (bsc#1051644)

- CVE-2017-7407: ourWriteOut function problem could lead to a heap buffer over-read (bsc#1032309)

- CVE-2016-9586: libcurl printf issue could lead to buffer overflow (bsc#1015332)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-31"/>
	<updated date="2017-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015332">SUSE bug 1015332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032309">SUSE bug 1032309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051644">SUSE bug 1051644</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9586">CVE-2016-9586 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000100/">CVE-2017-1000100 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000100">CVE-2017-1000100 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7407/">CVE-2017-7407 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7407">CVE-2017-7407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565602" comment="curl-openssl1-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565603" comment="libcurl4-openssl1-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565604" comment="libcurl4-openssl1-32bit-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565605" comment="libcurl4-openssl1-x86-7.19.7-1.70.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216529" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1061876" ref_url="https://bugzilla.suse.com/1061876" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000254" ref_url="https://www.suse.com/security/cve/CVE-2017-1000254/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003464.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following security issues:

- CVE-2017-1000254: FTP PWD response parser out of bounds read (bsc#1061876)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-01"/>
	<updated date="2017-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1061876">SUSE bug 1061876</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000254/">CVE-2017-1000254 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000254">CVE-2017-1000254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565606" comment="curl-openssl1-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565607" comment="libcurl4-openssl1-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565608" comment="libcurl4-openssl1-32bit-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565609" comment="libcurl4-openssl1-x86-7.19.7-1.70.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216530" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1027712" ref_url="https://bugzilla.suse.com/1027712" source="BUGZILLA"/>
		<reference ref_id="1077001" ref_url="https://bugzilla.suse.com/1077001" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7141" ref_url="https://www.suse.com/security/cve/CVE-2016-7141/" source="CVE"/>
		<reference ref_id="CVE-2018-1000007" ref_url="https://www.suse.com/security/cve/CVE-2018-1000007/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003634.html" source="SUSE-SU"/>
		<description>
This update for curl several issues.

This security issue was fixed:

- CVE-2018-1000007: Prevent leaking authentication data to third parties when following redirects (bsc#1077001)

This non-security issue was fixed:

- Set DEFAULT_SUSE as the default cipher list (bsc#1027712]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027712">SUSE bug 1027712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077001">SUSE bug 1077001</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7141/">CVE-2016-7141 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7141">CVE-2016-7141 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000007/">CVE-2018-1000007 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000007">CVE-2018-1000007 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565610" comment="curl-openssl1-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565611" comment="libcurl4-openssl1-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565612" comment="libcurl4-openssl1-32bit-7.19.7-1.70.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216531" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1081056" ref_url="https://bugzilla.suse.com/1081056" source="BUGZILLA"/>
		<reference ref_id="1083463" ref_url="https://bugzilla.suse.com/1083463" source="BUGZILLA"/>
		<reference ref_id="1084137" ref_url="https://bugzilla.suse.com/1084137" source="BUGZILLA"/>
		<reference ref_id="1084521" ref_url="https://bugzilla.suse.com/1084521" source="BUGZILLA"/>
		<reference ref_id="1084524" ref_url="https://bugzilla.suse.com/1084524" source="BUGZILLA"/>
		<reference ref_id="1084532" ref_url="https://bugzilla.suse.com/1084532" source="BUGZILLA"/>
		<reference ref_id="1085124" ref_url="https://bugzilla.suse.com/1085124" source="BUGZILLA"/>
		<reference ref_id="1086825" ref_url="https://bugzilla.suse.com/1086825" source="BUGZILLA"/>
		<reference ref_id="1087922" ref_url="https://bugzilla.suse.com/1087922" source="BUGZILLA"/>
		<reference ref_id="1090194" ref_url="https://bugzilla.suse.com/1090194" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000120" ref_url="https://www.suse.com/security/cve/CVE-2018-1000120/" source="CVE"/>
		<reference ref_id="CVE-2018-1000121" ref_url="https://www.suse.com/security/cve/CVE-2018-1000121/" source="CVE"/>
		<reference ref_id="CVE-2018-1000122" ref_url="https://www.suse.com/security/cve/CVE-2018-1000122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004059.html" source="SUSE-SU"/>
		<description>


This update for curl fixes the following issues:

curl was updated to version 7.37.0 (fate#325339 bsc#1084137)

This update syncs the curl version to the one in SUSE Linux Enterprise 12
and is full binary compatible to the previous version.

This update is done to allow other third party software like 'R' to 
be able to be used on the SUSE Linux Enterprise 11 codebase.

Following security issues were fixed:

- CVE-2018-1000120: A buffer overflow exists in the FTP URL handling that allowed an attacker to cause a denial of service or possible code execution (bsc#1084521).
- CVE-2018-1000121: A NULL pointer dereference exists in the LDAP code that allowed an attacker to cause a denial of service (bsc#1084524).
- CVE-2018-1000122: A buffer over-read exists in the RTSP+RTP handling code that allowed an attacker to cause a denial of service or information leakage (bsc#1084532).

The package also requires a libopenssl that implements the DEFAULT_SUSE cipher list
(bsc#1081056, bsc#1083463,bsc#1086825)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081056">SUSE bug 1081056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083463">SUSE bug 1083463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084137">SUSE bug 1084137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084521">SUSE bug 1084521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084524">SUSE bug 1084524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084532">SUSE bug 1084532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085124">SUSE bug 1085124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086825">SUSE bug 1086825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087922">SUSE bug 1087922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090194">SUSE bug 1090194</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000120/">CVE-2018-1000120 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000120">CVE-2018-1000120 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000121/">CVE-2018-1000121 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000121">CVE-2018-1000121 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000122/">CVE-2018-1000122 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000122">CVE-2018-1000122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565613" comment="curl-openssl1-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565614" comment="libcurl4-openssl1-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565615" comment="libcurl4-openssl1-32bit-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565616" comment="libcurl4-openssl1-x86-7.37.0-70.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216532" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1092098" ref_url="https://bugzilla.suse.com/1092098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000301" ref_url="https://www.suse.com/security/cve/CVE-2018-1000301/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004103.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-1000301: Fixed a buffer over-read caused by bad RTSP headers (bsc#1092098)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-30"/>
	<updated date="2018-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092098">SUSE bug 1092098</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000301/">CVE-2018-1000301 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000301">CVE-2018-1000301 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565617" comment="curl-openssl1-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565618" comment="libcurl4-openssl1-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565619" comment="libcurl4-openssl1-32bit-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565620" comment="libcurl4-openssl1-x86-7.37.0-70.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216533" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1106019" ref_url="https://bugzilla.suse.com/1106019" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14618" ref_url="https://www.suse.com/security/cve/CVE-2018-14618/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004563.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-14618: Prevent integer overflow in the NTLM authentication code
  (bsc#1106019).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-14"/>
	<updated date="2018-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106019">SUSE bug 1106019</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14618/">CVE-2018-14618 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14618">CVE-2018-14618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565621" comment="curl-openssl1-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565622" comment="libcurl4-openssl1-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565623" comment="libcurl4-openssl1-32bit-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565624" comment="libcurl4-openssl1-x86-7.37.0-70.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216534" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1112758" ref_url="https://bugzilla.suse.com/1112758" source="BUGZILLA"/>
		<reference ref_id="1113660" ref_url="https://bugzilla.suse.com/1113660" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16840" ref_url="https://www.suse.com/security/cve/CVE-2018-16840/" source="CVE"/>
		<reference ref_id="CVE-2018-16842" ref_url="https://www.suse.com/security/cve/CVE-2018-16842/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004839.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-16840: A use-after-free in SASL handle close was fixed (bsc#1112758)
- CVE-2018-16842: A Out-of-bounds Read in tool_msgs.c was fixed which could lead to crashes (bsc#1113660)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-08"/>
	<updated date="2018-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113660">SUSE bug 1113660</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16840/">CVE-2018-16840 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16840">CVE-2018-16840 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16842/">CVE-2018-16842 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16842">CVE-2018-16842 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565625" comment="curl-openssl1-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565626" comment="libcurl4-openssl1-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565627" comment="libcurl4-openssl1-32bit-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565628" comment="libcurl4-openssl1-x86-7.37.0-70.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216535" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1135170" ref_url="https://bugzilla.suse.com/1135170" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5436" ref_url="https://www.suse.com/security/cve/CVE-2019-5436/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005491.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5436: Fixed a heap buffer overflow exists in tftp_receive_packet that receives data from a TFTP server (bsc#1135170).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-24"/>
	<updated date="2019-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135170">SUSE bug 1135170</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5436/">CVE-2019-5436 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5436">CVE-2019-5436 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565629" comment="curl-openssl1-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565630" comment="libcurl4-openssl1-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565631" comment="libcurl4-openssl1-32bit-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565632" comment="libcurl4-openssl1-x86-7.37.0-70.41.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216536" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1149496" ref_url="https://bugzilla.suse.com/1149496" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005920.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5482: Fixed a TFTP small blocksize heap buffer overflow (bsc#1149496).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5482">CVE-2019-5482 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565633" comment="curl-openssl1-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565634" comment="libcurl4-openssl1-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565635" comment="libcurl4-openssl1-32bit-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565636" comment="libcurl4-openssl1-x86-7.37.0-70.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216537" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1173027" ref_url="https://bugzilla.suse.com/1173027" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007019.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2020-8177: Fixed an issue where curl could have been tricked by a malicious 
  server to overwrite a local file when using the -J option (bsc#1173027). 	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-24"/>
	<updated date="2020-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173027">SUSE bug 1173027</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8177">CVE-2020-8177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565637" comment="curl-openssl1-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565638" comment="libcurl4-openssl1-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565639" comment="libcurl4-openssl1-32bit-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565640" comment="libcurl4-openssl1-x86-7.37.0-70.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216538" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1175109" ref_url="https://bugzilla.suse.com/1175109" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8231" ref_url="https://www.suse.com/security/cve/CVE-2020-8231/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007337.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- An application that performs multiple requests with libcurl's
  multi API and sets the 'CURLOPT_CONNECT_ONLY' option, might in
  rare circumstances experience that when subsequently using the
  setup connect-only transfer, libcurl will pick and use the wrong
  connection and instead pick another one the application has
  created since then. [bsc#1175109, CVE-2020-8231]
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175109">SUSE bug 1175109</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8231/">CVE-2020-8231 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8231">CVE-2020-8231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565641" comment="curl-openssl1-7.37.0-70.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565642" comment="libcurl4-openssl1-7.37.0-70.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565643" comment="libcurl4-openssl1-32bit-7.37.0-70.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565644" comment="libcurl4-openssl1-x86-7.37.0-70.52.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216539" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1179398" ref_url="https://bugzilla.suse.com/1179398" source="BUGZILLA"/>
		<reference ref_id="1179399" ref_url="https://bugzilla.suse.com/1179399" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8284" ref_url="https://www.suse.com/security/cve/CVE-2020-8284/" source="CVE"/>
		<reference ref_id="CVE-2020-8285" ref_url="https://www.suse.com/security/cve/CVE-2020-8285/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008095.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2020-8284: Fixed an issue where a malicious FTP server could make curl connect to a different IP (bsc#1179398).
- CVE-2020-8285: Fixed an FTP wildcard stack overflow (bsc#1179399).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-21"/>
	<updated date="2020-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179398">SUSE bug 1179398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179399">SUSE bug 1179399</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8284/">CVE-2020-8284 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8284">CVE-2020-8284 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8285/">CVE-2020-8285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8285">CVE-2020-8285 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565645" comment="curl-openssl1-7.37.0-70.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565646" comment="libcurl4-openssl1-7.37.0-70.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565647" comment="libcurl4-openssl1-32bit-7.37.0-70.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565648" comment="libcurl4-openssl1-x86-7.37.0-70.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216540" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1183933" ref_url="https://bugzilla.suse.com/1183933" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22876" ref_url="https://www.suse.com/security/cve/CVE-2021-22876/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008684.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22876: Fixed an issue where the automatic referer was leaking credentials (bsc#1183933).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183933">SUSE bug 1183933</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22876/">CVE-2021-22876 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22876">CVE-2021-22876 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565649" comment="curl-openssl1-7.37.0-70.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565650" comment="libcurl4-openssl1-7.37.0-70.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565651" comment="libcurl4-openssl1-32bit-7.37.0-70.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565652" comment="libcurl4-openssl1-x86-7.37.0-70.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216541" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1186114" ref_url="https://bugzilla.suse.com/1186114" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22898" ref_url="https://www.suse.com/security/cve/CVE-2021-22898/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008844.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22898: Fixed curl TELNET stack contents disclosure (bsc#1186114).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-26"/>
	<updated date="2021-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186114">SUSE bug 1186114</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22898/">CVE-2021-22898 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22898">CVE-2021-22898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565653" comment="curl-openssl1-7.37.0-70.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565654" comment="libcurl4-openssl1-7.37.0-70.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565655" comment="libcurl4-openssl1-32bit-7.37.0-70.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565656" comment="libcurl4-openssl1-x86-7.37.0-70.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216542" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1186114" ref_url="https://bugzilla.suse.com/1186114" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22898" ref_url="https://www.suse.com/security/cve/CVE-2021-22898/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009106.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22898: Fixed curl TELNET stack contents disclosure (bsc#1186114).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-30"/>
	<updated date="2021-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186114">SUSE bug 1186114</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22898/">CVE-2021-22898 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22898">CVE-2021-22898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565657" comment="curl-openssl1-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565658" comment="libcurl4-openssl1-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565659" comment="libcurl4-openssl1-32bit-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565660" comment="libcurl4-openssl1-x86-7.37.0-70.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216543" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1188217" ref_url="https://bugzilla.suse.com/1188217" source="BUGZILLA"/>
		<reference ref_id="1188218" ref_url="https://bugzilla.suse.com/1188218" source="BUGZILLA"/>
		<reference ref_id="1188219" ref_url="https://bugzilla.suse.com/1188219" source="BUGZILLA"/>
		<reference ref_id="1188220" ref_url="https://bugzilla.suse.com/1188220" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22922" ref_url="https://www.suse.com/security/cve/CVE-2021-22922/" source="CVE"/>
		<reference ref_id="CVE-2021-22923" ref_url="https://www.suse.com/security/cve/CVE-2021-22923/" source="CVE"/>
		<reference ref_id="CVE-2021-22924" ref_url="https://www.suse.com/security/cve/CVE-2021-22924/" source="CVE"/>
		<reference ref_id="CVE-2021-22925" ref_url="https://www.suse.com/security/cve/CVE-2021-22925/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009195.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22925: TELNET stack contents disclosure again. (bsc#1188220)
- CVE-2021-22924: Bad connection reuse due to flawed path name checks. (bsc#1188219)
- CVE-2021-22923: Insufficiently Protected Credentials. (bsc#1188218)
- CVE-2021-22922: Wrong content via metalink not discarded. (bsc#1188217)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188217">SUSE bug 1188217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188218">SUSE bug 1188218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188219">SUSE bug 1188219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188220">SUSE bug 1188220</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22922/">CVE-2021-22922 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22922">CVE-2021-22922 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22923/">CVE-2021-22923 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22923">CVE-2021-22923 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22924/">CVE-2021-22924 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22924">CVE-2021-22924 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22925/">CVE-2021-22925 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22925">CVE-2021-22925 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626165" comment="curl-openssl1-7.37.0-70.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626166" comment="libcurl4-openssl1-7.37.0-70.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626167" comment="libcurl4-openssl1-32bit-7.37.0-70.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626168" comment="libcurl4-openssl1-x86-7.37.0-70.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216544" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1190373" ref_url="https://bugzilla.suse.com/1190373" source="BUGZILLA"/>
		<reference ref_id="1190374" ref_url="https://bugzilla.suse.com/1190374" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22946" ref_url="https://www.suse.com/security/cve/CVE-2021-22946/" source="CVE"/>
		<reference ref_id="CVE-2021-22947" ref_url="https://www.suse.com/security/cve/CVE-2021-22947/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009504.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22947: Fixed STARTTLS protocol injection via MITM (bsc#1190374).
- CVE-2021-22946: Fixed protocol downgrade required TLS bypassed (bsc#1190373).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190373">SUSE bug 1190373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190374">SUSE bug 1190374</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22946/">CVE-2021-22946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22946">CVE-2021-22946 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22947/">CVE-2021-22947 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22947">CVE-2021-22947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633933" comment="curl-openssl1-7.37.0-70.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633934" comment="libcurl4-openssl1-7.37.0-70.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633935" comment="libcurl4-openssl1-32bit-7.37.0-70.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633936" comment="libcurl4-openssl1-x86-7.37.0-70.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216545" version="1" class="patch">
	<metadata>
		<title>Security update for curl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="870444" ref_url="https://bugzilla.suse.com/870444" source="BUGZILLA"/>
		<reference ref_id="884698" ref_url="https://bugzilla.suse.com/884698" source="BUGZILLA"/>
		<reference ref_id="885302" ref_url="https://bugzilla.suse.com/885302" source="BUGZILLA"/>
		<reference ref_id="894575" ref_url="https://bugzilla.suse.com/894575" source="BUGZILLA"/>
		<reference ref_id="897816" ref_url="https://bugzilla.suse.com/897816" source="BUGZILLA"/>
		<reference ref_id="901924" ref_url="https://bugzilla.suse.com/901924" source="BUGZILLA"/>
		<reference ref_id="911363" ref_url="https://bugzilla.suse.com/911363" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3613" ref_url="https://www.suse.com/security/cve/CVE-2014-3613/" source="CVE"/>
		<reference ref_id="CVE-2014-3707" ref_url="https://www.suse.com/security/cve/CVE-2014-3707/" source="CVE"/>
		<reference ref_id="CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150/" source="CVE"/>
		<description>

This update fixes the following security issues:

    * 

      CVE-2014-8150: URL request injection (bnc#911363)

      When libcurl sends a request to a server via a HTTP proxy, it copies
      the entire URL into the request and sends if off.

      If the given URL contains line feeds and carriage returns those will
      be sent along to the proxy too, which allows the program to for
      example send a separate HTTP request injected embedded in the URL.

    * 

      CVE-2014-3707: duphandle read out of bounds (bnc#901924)

    * 

      CVE-2014-3613: libcurl cookie leaks (bnc#894575)

Additional bug fixed:

    * curl_multi_remove_handle: don't crash on multiple removes
      (bnc#897816)

Security Issues:

    * CVE-2014-8150
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150&gt;
    * CVE-2014-3613
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613&gt;
    * CVE-2014-3707
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3707&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-13"/>
	<updated date="2015-01-13"/>
	<bugzilla href="https://bugzilla.suse.com/870444">SUSE bug 870444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884698">SUSE bug 884698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885302">SUSE bug 885302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894575">SUSE bug 894575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897816">SUSE bug 897816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901924">SUSE bug 901924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911363">SUSE bug 911363</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3613/">CVE-2014-3613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3613">CVE-2014-3613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3707/">CVE-2014-3707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3707">CVE-2014-3707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8150">CVE-2014-8150 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565661" comment="libcurl4-openssl1-7.19.7-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565662" comment="libcurl4-openssl1-32bit-7.19.7-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565663" comment="libcurl4-openssl1-x86-7.19.7-0.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216546" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1159635" ref_url="https://bugzilla.suse.com/1159635" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19906" ref_url="https://www.suse.com/security/cve/CVE-2019-19906/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008085.html" source="SUSE-SU"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2019-19906: Fixed an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet (bsc#1159635).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-17"/>
	<updated date="2020-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159635">SUSE bug 1159635</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19906/">CVE-2019-19906 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19906">CVE-2019-19906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565664" comment="cyrus-sasl-openssl1-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565665" comment="cyrus-sasl-openssl1-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565666" comment="cyrus-sasl-openssl1-crammd5-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565667" comment="cyrus-sasl-openssl1-crammd5-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565668" comment="cyrus-sasl-openssl1-crammd5-x86-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565669" comment="cyrus-sasl-openssl1-digestmd5-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565670" comment="cyrus-sasl-openssl1-digestmd5-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565671" comment="cyrus-sasl-openssl1-digestmd5-x86-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565672" comment="cyrus-sasl-openssl1-gssapi-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565673" comment="cyrus-sasl-openssl1-gssapi-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565674" comment="cyrus-sasl-openssl1-gssapi-x86-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565675" comment="cyrus-sasl-openssl1-ntlm-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565676" comment="cyrus-sasl-openssl1-otp-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565677" comment="cyrus-sasl-openssl1-otp-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565678" comment="cyrus-sasl-openssl1-otp-x86-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565679" comment="cyrus-sasl-openssl1-plain-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565680" comment="cyrus-sasl-openssl1-plain-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565681" comment="cyrus-sasl-openssl1-plain-x86-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565682" comment="cyrus-sasl-openssl1-x86-2.1.22-182.26.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216547" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1196036" ref_url="https://bugzilla.suse.com/1196036" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010287.html" source="SUSE-SU"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2022-24407: Fixed SQL injection in sql_auxprop_store in plugins/sql.c (bsc#1196036).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-23"/>
	<updated date="2022-02-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196036">SUSE bug 1196036</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24407">CVE-2022-24407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669432" comment="cyrus-sasl-openssl1-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669433" comment="cyrus-sasl-openssl1-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669434" comment="cyrus-sasl-openssl1-crammd5-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669435" comment="cyrus-sasl-openssl1-crammd5-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669436" comment="cyrus-sasl-openssl1-crammd5-x86-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669437" comment="cyrus-sasl-openssl1-digestmd5-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669438" comment="cyrus-sasl-openssl1-digestmd5-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669439" comment="cyrus-sasl-openssl1-digestmd5-x86-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669440" comment="cyrus-sasl-openssl1-gssapi-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669441" comment="cyrus-sasl-openssl1-gssapi-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669442" comment="cyrus-sasl-openssl1-gssapi-x86-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669443" comment="cyrus-sasl-openssl1-ntlm-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669444" comment="cyrus-sasl-openssl1-otp-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669445" comment="cyrus-sasl-openssl1-otp-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669446" comment="cyrus-sasl-openssl1-otp-x86-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669447" comment="cyrus-sasl-openssl1-plain-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669448" comment="cyrus-sasl-openssl1-plain-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669449" comment="cyrus-sasl-openssl1-plain-x86-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669450" comment="cyrus-sasl-openssl1-x86-2.1.22-182.26.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216548" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="860332" ref_url="https://bugzilla.suse.com/860332" source="BUGZILLA"/>
		<reference ref_id="861014" ref_url="https://bugzilla.suse.com/861014" source="BUGZILLA"/>
		<reference ref_id="864912" ref_url="https://bugzilla.suse.com/864912" source="BUGZILLA"/>
		<reference ref_id="869945" ref_url="https://bugzilla.suse.com/869945" source="BUGZILLA"/>
		<reference ref_id="872299" ref_url="https://bugzilla.suse.com/872299" source="BUGZILLA"/>
		<reference ref_id="873351" ref_url="https://bugzilla.suse.com/873351" source="BUGZILLA"/>
		<reference ref_id="876282" ref_url="https://bugzilla.suse.com/876282" source="BUGZILLA"/>
		<reference ref_id="880891" ref_url="https://bugzilla.suse.com/880891" source="BUGZILLA"/>
		<reference ref_id="889812" ref_url="https://bugzilla.suse.com/889812" source="BUGZILLA"/>
		<reference ref_id="890764" ref_url="https://bugzilla.suse.com/890764" source="BUGZILLA"/>
		<reference ref_id="890767" ref_url="https://bugzilla.suse.com/890767" source="BUGZILLA"/>
		<reference ref_id="890768" ref_url="https://bugzilla.suse.com/890768" source="BUGZILLA"/>
		<reference ref_id="890769" ref_url="https://bugzilla.suse.com/890769" source="BUGZILLA"/>
		<reference ref_id="890770" ref_url="https://bugzilla.suse.com/890770" source="BUGZILLA"/>
		<reference ref_id="901223" ref_url="https://bugzilla.suse.com/901223" source="BUGZILLA"/>
		<reference ref_id="901277" ref_url="https://bugzilla.suse.com/901277" source="BUGZILLA"/>
		<reference ref_id="906878" ref_url="https://bugzilla.suse.com/906878" source="BUGZILLA"/>
		<reference ref_id="912014" ref_url="https://bugzilla.suse.com/912014" source="BUGZILLA"/>
		<reference ref_id="912015" ref_url="https://bugzilla.suse.com/912015" source="BUGZILLA"/>
		<reference ref_id="912018" ref_url="https://bugzilla.suse.com/912018" source="BUGZILLA"/>
		<reference ref_id="912292" ref_url="https://bugzilla.suse.com/912292" source="BUGZILLA"/>
		<reference ref_id="912293" ref_url="https://bugzilla.suse.com/912293" source="BUGZILLA"/>
		<reference ref_id="912294" ref_url="https://bugzilla.suse.com/912294" source="BUGZILLA"/>
		<reference ref_id="912296" ref_url="https://bugzilla.suse.com/912296" source="BUGZILLA"/>
		<reference ref_id="919648" ref_url="https://bugzilla.suse.com/919648" source="BUGZILLA"/>
		<reference ref_id="920236" ref_url="https://bugzilla.suse.com/920236" source="BUGZILLA"/>
		<reference ref_id="922488" ref_url="https://bugzilla.suse.com/922488" source="BUGZILLA"/>
		<reference ref_id="922496" ref_url="https://bugzilla.suse.com/922496" source="BUGZILLA"/>
		<reference ref_id="922499" ref_url="https://bugzilla.suse.com/922499" source="BUGZILLA"/>
		<reference ref_id="922500" ref_url="https://bugzilla.suse.com/922500" source="BUGZILLA"/>
		<reference ref_id="922501" ref_url="https://bugzilla.suse.com/922501" source="BUGZILLA"/>
		<reference ref_id="923384" ref_url="https://bugzilla.suse.com/923384" source="BUGZILLA"/>
		<reference ref_id="929678" ref_url="https://bugzilla.suse.com/929678" source="BUGZILLA"/>
		<reference ref_id="931698" ref_url="https://bugzilla.suse.com/931698" source="BUGZILLA"/>
		<reference ref_id="933911" ref_url="https://bugzilla.suse.com/933911" source="BUGZILLA"/>
		<reference ref_id="934487" ref_url="https://bugzilla.suse.com/934487" source="BUGZILLA"/>
		<reference ref_id="934489" ref_url="https://bugzilla.suse.com/934489" source="BUGZILLA"/>
		<reference ref_id="934491" ref_url="https://bugzilla.suse.com/934491" source="BUGZILLA"/>
		<reference ref_id="934493" ref_url="https://bugzilla.suse.com/934493" source="BUGZILLA"/>
		<reference ref_id="934494" ref_url="https://bugzilla.suse.com/934494" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-5298" ref_url="https://www.suse.com/security/cve/CVE-2010-5298/" source="CVE"/>
		<reference ref_id="CVE-2014-0160" ref_url="https://www.suse.com/security/cve/CVE-2014-0160/" source="CVE"/>
		<reference ref_id="CVE-2014-0195" ref_url="https://www.suse.com/security/cve/CVE-2014-0195/" source="CVE"/>
		<reference ref_id="CVE-2014-0198" ref_url="https://www.suse.com/security/cve/CVE-2014-0198/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-3505" ref_url="https://www.suse.com/security/cve/CVE-2014-3505/" source="CVE"/>
		<reference ref_id="CVE-2014-3506" ref_url="https://www.suse.com/security/cve/CVE-2014-3506/" source="CVE"/>
		<reference ref_id="CVE-2014-3507" ref_url="https://www.suse.com/security/cve/CVE-2014-3507/" source="CVE"/>
		<reference ref_id="CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508/" source="CVE"/>
		<reference ref_id="CVE-2014-3509" ref_url="https://www.suse.com/security/cve/CVE-2014-3509/" source="CVE"/>
		<reference ref_id="CVE-2014-3510" ref_url="https://www.suse.com/security/cve/CVE-2014-3510/" source="CVE"/>
		<reference ref_id="CVE-2014-3511" ref_url="https://www.suse.com/security/cve/CVE-2014-3511/" source="CVE"/>
		<reference ref_id="CVE-2014-3512" ref_url="https://www.suse.com/security/cve/CVE-2014-3512/" source="CVE"/>
		<reference ref_id="CVE-2014-3513" ref_url="https://www.suse.com/security/cve/CVE-2014-3513/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-5139" ref_url="https://www.suse.com/security/cve/CVE-2014-5139/" source="CVE"/>
		<reference ref_id="CVE-2014-8176" ref_url="https://www.suse.com/security/cve/CVE-2014-8176/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0292" ref_url="https://www.suse.com/security/cve/CVE-2015-0292/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-RU-2015:0769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-April/002912.html" source="SUSE-SU"/>
		<description>

This OpenSSL update fixes the following issues:

    * SRTP Memory Leak (CVE-2014-3513)
    * Session Ticket Memory Leak (CVE-2014-3567)
    * Build option no-ssl3 is incomplete (CVE-2014-3568)
    * Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE)

Security Issues:

    * CVE-2014-3513
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513&gt;
    * CVE-2014-3567
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567&gt;
    * CVE-2014-3566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&gt;
    * CVE-2014-3568
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-23"/>
	<updated date="2014-10-23"/>
	<bugzilla href="https://bugzilla.suse.com/860332">SUSE bug 860332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861014">SUSE bug 861014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864912">SUSE bug 864912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869945">SUSE bug 869945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/872299">SUSE bug 872299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873351">SUSE bug 873351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876282">SUSE bug 876282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889812">SUSE bug 889812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890764">SUSE bug 890764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890767">SUSE bug 890767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890768">SUSE bug 890768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890769">SUSE bug 890769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890770">SUSE bug 890770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901223">SUSE bug 901223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906878">SUSE bug 906878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912014">SUSE bug 912014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912015">SUSE bug 912015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912018">SUSE bug 912018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912292">SUSE bug 912292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912293">SUSE bug 912293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912294">SUSE bug 912294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912296">SUSE bug 912296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920236">SUSE bug 920236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922488">SUSE bug 922488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922496">SUSE bug 922496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922499">SUSE bug 922499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922500">SUSE bug 922500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922501">SUSE bug 922501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923384">SUSE bug 923384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929678">SUSE bug 929678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931698">SUSE bug 931698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933911">SUSE bug 933911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934487">SUSE bug 934487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934489">SUSE bug 934489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934491">SUSE bug 934491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934493">SUSE bug 934493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934494">SUSE bug 934494</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5298/">CVE-2010-5298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-5298">CVE-2010-5298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0160/">CVE-2014-0160 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0160">CVE-2014-0160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0195/">CVE-2014-0195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0195">CVE-2014-0195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0198/">CVE-2014-0198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0198">CVE-2014-0198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0221">CVE-2014-0221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0224">CVE-2014-0224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3470">CVE-2014-3470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3505/">CVE-2014-3505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3505">CVE-2014-3505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3506/">CVE-2014-3506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3506">CVE-2014-3506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3507/">CVE-2014-3507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3507">CVE-2014-3507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3508">CVE-2014-3508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3509/">CVE-2014-3509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3509">CVE-2014-3509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3510/">CVE-2014-3510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3510">CVE-2014-3510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3511/">CVE-2014-3511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3511">CVE-2014-3511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3512/">CVE-2014-3512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3512">CVE-2014-3512 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-3513/">CVE-2014-3513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3513">CVE-2014-3513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3567">CVE-2014-3567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3568">CVE-2014-3568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3570">CVE-2014-3570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3571">CVE-2014-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3572">CVE-2014-3572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5139/">CVE-2014-5139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5139">CVE-2014-5139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8176/">CVE-2014-8176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8176">CVE-2014-8176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8275">CVE-2014-8275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0205">CVE-2015-0205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0206">CVE-2015-0206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0209">CVE-2015-0209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0286">CVE-2015-0286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0287">CVE-2015-0287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0288">CVE-2015-0288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0289">CVE-2015-0289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0292/">CVE-2015-0292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0292">CVE-2015-0292 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0293">CVE-2015-0293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1788">CVE-2015-1788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1789">CVE-2015-1789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1790">CVE-2015-1790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1791">CVE-2015-1791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1792">CVE-2015-1792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565683" comment="libopenssl1-devel-1.0.1g-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565684" comment="libopenssl1_0_0-1.0.1g-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565685" comment="libopenssl1_0_0-32bit-1.0.1g-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565686" comment="libopenssl1_0_0-x86-1.0.1g-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565687" comment="openssl1-1.0.1g-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565688" comment="openssl1-doc-1.0.1g-0.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216549" version="1" class="patch">
	<metadata>
		<title>Recommended update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="924496" ref_url="https://bugzilla.suse.com/924496" source="BUGZILLA"/>
		<reference ref_id="932773" ref_url="https://bugzilla.suse.com/932773" source="BUGZILLA"/>
		<reference ref_id="937766" ref_url="https://bugzilla.suse.com/937766" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001568.html" source="SUSE-SU"/>
		<description>
openldap2 was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-4000: The Logjam Attack / weakdh.org (bsc#937766).

This non-security issue was fixed:
- bsc#932773: ldapmodify failed with DOS format LDIF files containing '-' separator.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-29"/>
	<updated date="2015-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924496">SUSE bug 924496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932773">SUSE bug 932773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937766">SUSE bug 937766</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565689" comment="libldap-openssl1-2_4-2-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565690" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565691" comment="libldap-openssl1-2_4-2-x86-2.4.26-0.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216550" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1143194" ref_url="https://bugzilla.suse.com/1143194" source="BUGZILLA"/>
		<reference ref_id="1143273" ref_url="https://bugzilla.suse.com/1143273" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13057" ref_url="https://www.suse.com/security/cve/CVE-2019-13057/" source="CVE"/>
		<reference ref_id="CVE-2019-13565" ref_url="https://www.suse.com/security/cve/CVE-2019-13565/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006767.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2019-13565: Fixed an authentication bypass caused by incorrect authorization of another connection, granting excess connection rights (bsc#1143194).
- CVE-2019-13057: Fixed an issue with improper authorization with delegated database admin privileges (bsc#1143273).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-29"/>
	<updated date="2020-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1143194">SUSE bug 1143194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143273">SUSE bug 1143273</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13057/">CVE-2019-13057 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13057">CVE-2019-13057 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13565/">CVE-2019-13565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13565">CVE-2019-13565 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565692" comment="libldap-openssl1-2_4-2-2.4.26-0.74.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565693" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.74.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565694" comment="libldap-openssl1-2_4-2-x86-2.4.26-0.74.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565695" comment="openldap2-client-openssl1-2.4.26-0.74.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565696" comment="openldap2-openssl1-2.4.26-0.74.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216551" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1170771" ref_url="https://bugzilla.suse.com/1170771" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12243" ref_url="https://www.suse.com/security/cve/CVE-2020-12243/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006801.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-12243: Fixed a denial of service related to recursive filters (bsc#1170771).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170771">SUSE bug 1170771</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12243/">CVE-2020-12243 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12243">CVE-2020-12243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565697" comment="libldap-openssl1-2_4-2-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565698" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565699" comment="libldap-openssl1-2_4-2-x86-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565700" comment="openldap2-client-openssl1-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565701" comment="openldap2-openssl1-2.4.26-0.74.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216552" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1172698" ref_url="https://bugzilla.suse.com/1172698" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8023" ref_url="https://www.suse.com/security/cve/CVE-2020-8023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007083.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-8023: Fixed a potential local privilege escalation from ldap to root when OPENLDAP_CONFIG_BACKEND='ldap' was used (bsc#1172698).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172698">SUSE bug 1172698</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8023/">CVE-2020-8023 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8023">CVE-2020-8023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565702" comment="libldap-openssl1-2_4-2-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565703" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565704" comment="libldap-openssl1-2_4-2-x86-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565705" comment="openldap2-client-openssl1-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565706" comment="openldap2-openssl1-2.4.26-0.74.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216553" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1178387" ref_url="https://bugzilla.suse.com/1178387" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007759.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-25692: Fixed an unauthenticated remote denial of service due to incorrect validation of modrdn equality rules (bsc#1178387).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178387">SUSE bug 1178387</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25692">CVE-2020-25692 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565707" comment="libldap-openssl1-2_4-2-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565708" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565709" comment="libldap-openssl1-2_4-2-x86-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565710" comment="openldap2-client-openssl1-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565711" comment="openldap2-openssl1-2.4.26-0.74.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216554" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1178909" ref_url="https://bugzilla.suse.com/1178909" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25709" ref_url="https://www.suse.com/security/cve/CVE-2020-25709/" source="CVE"/>
		<reference ref_id="CVE-2020-25710" ref_url="https://www.suse.com/security/cve/CVE-2020-25710/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008207.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-25709: Fixed a crash caused by specially crafted network traffic (bsc#1178909).
- CVE-2020-25710: Fixed a crash caused by specially crafted network traffic (bsc#1178909).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-14"/>
	<updated date="2021-01-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178909">SUSE bug 1178909</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25709/">CVE-2020-25709 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25709">CVE-2020-25709 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25710/">CVE-2020-25710 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25710">CVE-2020-25710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565712" comment="libldap-openssl1-2_4-2-2.4.26-0.74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565713" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565714" comment="libldap-openssl1-2_4-2-x86-2.4.26-0.74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565715" comment="openldap2-client-openssl1-2.4.26-0.74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565716" comment="openldap2-openssl1-2.4.26-0.74.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216555" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1182279" ref_url="https://bugzilla.suse.com/1182279" source="BUGZILLA"/>
		<reference ref_id="1182408" ref_url="https://bugzilla.suse.com/1182408" source="BUGZILLA"/>
		<reference ref_id="1182411" ref_url="https://bugzilla.suse.com/1182411" source="BUGZILLA"/>
		<reference ref_id="1182412" ref_url="https://bugzilla.suse.com/1182412" source="BUGZILLA"/>
		<reference ref_id="1182413" ref_url="https://bugzilla.suse.com/1182413" source="BUGZILLA"/>
		<reference ref_id="1182415" ref_url="https://bugzilla.suse.com/1182415" source="BUGZILLA"/>
		<reference ref_id="1182416" ref_url="https://bugzilla.suse.com/1182416" source="BUGZILLA"/>
		<reference ref_id="1182417" ref_url="https://bugzilla.suse.com/1182417" source="BUGZILLA"/>
		<reference ref_id="1182418" ref_url="https://bugzilla.suse.com/1182418" source="BUGZILLA"/>
		<reference ref_id="1182419" ref_url="https://bugzilla.suse.com/1182419" source="BUGZILLA"/>
		<reference ref_id="1182420" ref_url="https://bugzilla.suse.com/1182420" source="BUGZILLA"/>
		<reference ref_id="1184020" ref_url="https://bugzilla.suse.com/1184020" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36221" ref_url="https://www.suse.com/security/cve/CVE-2020-36221/" source="CVE"/>
		<reference ref_id="CVE-2020-36222" ref_url="https://www.suse.com/security/cve/CVE-2020-36222/" source="CVE"/>
		<reference ref_id="CVE-2020-36223" ref_url="https://www.suse.com/security/cve/CVE-2020-36223/" source="CVE"/>
		<reference ref_id="CVE-2020-36224" ref_url="https://www.suse.com/security/cve/CVE-2020-36224/" source="CVE"/>
		<reference ref_id="CVE-2020-36225" ref_url="https://www.suse.com/security/cve/CVE-2020-36225/" source="CVE"/>
		<reference ref_id="CVE-2020-36226" ref_url="https://www.suse.com/security/cve/CVE-2020-36226/" source="CVE"/>
		<reference ref_id="CVE-2020-36227" ref_url="https://www.suse.com/security/cve/CVE-2020-36227/" source="CVE"/>
		<reference ref_id="CVE-2020-36228" ref_url="https://www.suse.com/security/cve/CVE-2020-36228/" source="CVE"/>
		<reference ref_id="CVE-2020-36229" ref_url="https://www.suse.com/security/cve/CVE-2020-36229/" source="CVE"/>
		<reference ref_id="CVE-2020-36230" ref_url="https://www.suse.com/security/cve/CVE-2020-36230/" source="CVE"/>
		<reference ref_id="CVE-2021-27212" ref_url="https://www.suse.com/security/cve/CVE-2021-27212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008644.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- bsc#1182408 CVE-2020-36230 - an assertion failure in slapd in the
  X.509 DN parsing in decode.c ber_next_element, resulting in denial
  of service.
- bsc#1182411 CVE-2020-36229 - ldap_X509dn2bv crash in the X.509 DN
  parsing in ad_keystring, resulting in denial of service.
- bsc#1182412 CVE-2020-36228 - integer underflow leading to crash
  in the Certificate List Exact Assertion processing, resulting in
  denial of service.
- bsc#1182413 CVE-2020-36227 - infinite loop in slapd with the
  cancel_extop Cancel operation, resulting in denial of service.
- bsc#1182416 CVE-2020-36225 - double free and slapd crash in the
  saslAuthzTo processing, resulting in denial of service.
- bsc#1182417 CVE-2020-36224 - invalid pointer free and slapd crash
  in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182415 CVE-2020-36226 - memch-&gt;bv_len miscalculation and slapd
  crash in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182419 CVE-2020-36222 - assertion failure in slapd in the
  saslAuthzTo validation, resulting in denial of service.
- bsc#1182420 CVE-2020-36221 - slapd crashes in the Certificate Exact
  Assertion processing, resulting in denial of service (schema_init.c
  serialNumberAndIssuerCheck).
- bsc#1182418 CVE-2020-36223 - slapd crash in the Values Return Filter
  control handling, resulting in denial of service (double free and
  out-of-bounds read).
- bsc#1182279 CVE-2021-27212 - an assertion failure in slapd can occur
    in the issuerAndThisUpdateCheck function via a crafted packet,
    resulting in a denial of service (daemon exit) via a short timestamp.
    This is related to schema_init.c and checkTime.
- resynchronise changelogs with subpackages (bsc#1184020).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-16"/>
	<updated date="2021-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182279">SUSE bug 1182279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182408">SUSE bug 1182408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182411">SUSE bug 1182411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182412">SUSE bug 1182412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182413">SUSE bug 1182413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182415">SUSE bug 1182415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182416">SUSE bug 1182416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182417">SUSE bug 1182417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182418">SUSE bug 1182418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182419">SUSE bug 1182419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182420">SUSE bug 1182420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184020">SUSE bug 1184020</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36221/">CVE-2020-36221 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36221">CVE-2020-36221 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36222/">CVE-2020-36222 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36222">CVE-2020-36222 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36223/">CVE-2020-36223 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36223">CVE-2020-36223 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36224/">CVE-2020-36224 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36224">CVE-2020-36224 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36225/">CVE-2020-36225 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36225">CVE-2020-36225 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36226/">CVE-2020-36226 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36226">CVE-2020-36226 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36227/">CVE-2020-36227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36227">CVE-2020-36227 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36228/">CVE-2020-36228 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36228">CVE-2020-36228 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36229/">CVE-2020-36229 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36229">CVE-2020-36229 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36230/">CVE-2020-36230 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36230">CVE-2020-36230 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27212/">CVE-2021-27212 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27212">CVE-2021-27212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565717" comment="libldap-openssl1-2_4-2-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565718" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565719" comment="libldap-openssl1-2_4-2-x86-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565720" comment="openldap2-client-openssl1-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565721" comment="openldap2-openssl1-2.4.26-0.74.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216556" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="846389" ref_url="https://bugzilla.suse.com/846389" source="BUGZILLA"/>
		<reference ref_id="905959" ref_url="https://bugzilla.suse.com/905959" source="BUGZILLA"/>
		<reference ref_id="916897" ref_url="https://bugzilla.suse.com/916897" source="BUGZILLA"/>
		<reference ref_id="916914" ref_url="https://bugzilla.suse.com/916914" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4449" ref_url="https://www.suse.com/security/cve/CVE-2013-4449/" source="CVE"/>
		<reference ref_id="CVE-2015-1545" ref_url="https://www.suse.com/security/cve/CVE-2015-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-1546" ref_url="https://www.suse.com/security/cve/CVE-2015-1546/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001389.html" source="SUSE-SU"/>
		<description>

openldap2 was updated to fix three security issues and one non-security 
bug.

The following vulnerabilities were fixed:

    * A remote attacker could cause a denial of service (slapd crash) by
      unbinding immediately after a search request. (bnc#846389,
      CVE-2013-4449)
    * A remote attacker could cause a denial of service through a NULL
      pointer dereference and crash via an empty attribute list in a deref
      control in a search request. (bnc#916897, CVE-2015-1545)
    * A remote attacker could cause a denial of service (crash) via a
      crafted search query with a matched values control. (bnc#916914,
      CVE-2015-1546)

The following non-security bug was fixed:

    * Prevent connection-0 (internal connection) from showing up in the
      monitor back-end. (bnc#905959)

Security Issues:

    * CVE-2015-1546
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1546&gt;
    * CVE-2015-1545
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1545&gt;
    * CVE-2013-4449
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4449&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-20"/>
	<updated date="2015-04-20"/>
	<bugzilla href="https://bugzilla.suse.com/846389">SUSE bug 846389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905959">SUSE bug 905959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916897">SUSE bug 916897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916914">SUSE bug 916914</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4449/">CVE-2013-4449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4449">CVE-2013-4449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1545/">CVE-2015-1545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1545">CVE-2015-1545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1546/">CVE-2015-1546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1546">CVE-2015-1546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565722" comment="libldap-openssl1-2_4-2-2.4.26-0.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565723" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565724" comment="libldap-openssl1-2_4-2-x86-2.4.26-0.30.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216557" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="945582" ref_url="https://bugzilla.suse.com/945582" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001793.html" source="SUSE-SU"/>
		<description>


This update fixes the following security issue:

- CVE-2015-6908. Passing a crafted packet to the function  ber_get_next(),
    an attacker may cause a remote denial of service, crashing the OpenLDAP server (bsc#945582).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-12"/>
	<updated date="2016-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/945582">SUSE bug 945582</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6908">CVE-2015-6908 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565725" comment="libldap-openssl1-2_4-2-2.4.26-0.62.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565726" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.62.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565727" comment="libldap-openssl1-2_4-2-x86-2.4.26-0.62.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216558" version="1" class="patch">
	<metadata>
		<title>Security update for openslp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1090638" ref_url="https://bugzilla.suse.com/1090638" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004251.html" source="SUSE-SU"/>
		<description>
This update for openslp fixes the following issues:

- CVE-2017-17833: Prevent heap-related memory corruption issue which may have
  manifested itself as a denial-of-service or a remote code-execution
  vulnerability (bsc#1090638).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-09"/>
	<updated date="2018-07-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17833">CVE-2017-17833 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565728" comment="libslp1-openssl1-1.2.0-172.27.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216559" version="1" class="patch">
	<metadata>
		<title>Security update for openssh-openssl1 (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="961642" ref_url="https://bugzilla.suse.com/961642" source="BUGZILLA"/>
		<reference ref_id="961645" ref_url="https://bugzilla.suse.com/961645" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777/" source="CVE"/>
		<reference ref_id="CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001802.html" source="SUSE-SU"/>
		<description>

This update for openssh-openssl1 fixes the following issues:

- CVE-2016-0777: A malicious or compromised server could cause the OpenSSH client to expose part or all of the client's private key through the roaming feature (bsc#961642)
- CVE-2016-0778: A malicious or compromised server could could trigger a buffer overflow in the OpenSSH client through the roaming feature (bsc#961645)

This update disables the undocumented feature supported by the OpenSSH client and a commercial SSH server.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-14"/>
	<updated date="2016-01-14"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/961642">SUSE bug 961642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961645">SUSE bug 961645</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0777">CVE-2016-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0778">CVE-2016-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565729" comment="openssh-openssl1-6.6p1-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565730" comment="openssh-openssl1-helpers-6.6p1-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216560" version="1" class="patch">
	<metadata>
		<title>Security update for openssh-openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="729190" ref_url="https://bugzilla.suse.com/729190" source="BUGZILLA"/>
		<reference ref_id="932483" ref_url="https://bugzilla.suse.com/932483" source="BUGZILLA"/>
		<reference ref_id="948902" ref_url="https://bugzilla.suse.com/948902" source="BUGZILLA"/>
		<reference ref_id="960414" ref_url="https://bugzilla.suse.com/960414" source="BUGZILLA"/>
		<reference ref_id="961368" ref_url="https://bugzilla.suse.com/961368" source="BUGZILLA"/>
		<reference ref_id="961494" ref_url="https://bugzilla.suse.com/961494" source="BUGZILLA"/>
		<reference ref_id="962313" ref_url="https://bugzilla.suse.com/962313" source="BUGZILLA"/>
		<reference ref_id="965576" ref_url="https://bugzilla.suse.com/965576" source="BUGZILLA"/>
		<reference ref_id="970632" ref_url="https://bugzilla.suse.com/970632" source="BUGZILLA"/>
		<reference ref_id="975865" ref_url="https://bugzilla.suse.com/975865" source="BUGZILLA"/>
		<reference ref_id="981654" ref_url="https://bugzilla.suse.com/981654" source="BUGZILLA"/>
		<reference ref_id="989363" ref_url="https://bugzilla.suse.com/989363" source="BUGZILLA"/>
		<reference ref_id="992533" ref_url="https://bugzilla.suse.com/992533" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8325" ref_url="https://www.suse.com/security/cve/CVE-2015-8325/" source="CVE"/>
		<reference ref_id="CVE-2016-1908" ref_url="https://www.suse.com/security/cve/CVE-2016-1908/" source="CVE"/>
		<reference ref_id="CVE-2016-3115" ref_url="https://www.suse.com/security/cve/CVE-2016-3115/" source="CVE"/>
		<reference ref_id="CVE-2016-6210" ref_url="https://www.suse.com/security/cve/CVE-2016-6210/" source="CVE"/>
		<reference ref_id="CVE-2016-6515" ref_url="https://www.suse.com/security/cve/CVE-2016-6515/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002338.html" source="SUSE-SU"/>
		<description>

This update for openssh-openssl1 fixes the following issues:

Security issues fixed:
- CVE-2016-6210: Prevent user enumeration through the timing of password
  processing (bsc#989363)
- CVE-2016-6515: limit accepted password length (prevents possible DoS)
  (bsc#992533)
- CVE-2016-3115: Sanitise input for xauth(1) (bsc#970632)
- CVE-2016-1908: prevent X11 SECURITY circumvention when forwarding X11
  connections (bsc#962313)
- CVE-2015-8325: ignore PAM environment when using login (bsc#975865)
- Disable DH parameters under 2048 bits by default and allow
  lowering the limit back to the RFC 4419 specified minimum
  through an option (bsc#932483, bsc#948902)
- Allow lowering the DH groups parameter limit in server as well
  as when GSSAPI key exchange is used (bsc#948902)

Bugs fixed:
- avoid complaining about unset DISPLAY variable (bsc#981654)
- Correctly parse GSSAPI KEX algorithms (bsc#961368)
- more verbose FIPS mode/CC related documentation in README.FIPS
  (bsc#965576, bsc#960414)
- fix PRNG re-seeding (bsc#960414, bsc#729190)
- Allow empty Match blocks (bsc#961494)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-17"/>
	<updated date="2016-10-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/729190">SUSE bug 729190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948902">SUSE bug 948902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960414">SUSE bug 960414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961368">SUSE bug 961368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961494">SUSE bug 961494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962313">SUSE bug 962313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965576">SUSE bug 965576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970632">SUSE bug 970632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975865">SUSE bug 975865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981654">SUSE bug 981654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989363">SUSE bug 989363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992533">SUSE bug 992533</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8325/">CVE-2015-8325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8325">CVE-2015-8325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1908/">CVE-2016-1908 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1908">CVE-2016-1908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3115/">CVE-2016-3115 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3115">CVE-2016-3115 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-6210/">CVE-2016-6210 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6210">CVE-2016-6210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6515/">CVE-2016-6515 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6515">CVE-2016-6515 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565731" comment="openssh-openssl1-6.6p1-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565732" comment="openssh-openssl1-helpers-6.6p1-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216561" version="1" class="patch">
	<metadata>
		<title>Security update for openssh-openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1005480" ref_url="https://bugzilla.suse.com/1005480" source="BUGZILLA"/>
		<reference ref_id="1005893" ref_url="https://bugzilla.suse.com/1005893" source="BUGZILLA"/>
		<reference ref_id="1006221" ref_url="https://bugzilla.suse.com/1006221" source="BUGZILLA"/>
		<reference ref_id="1016366" ref_url="https://bugzilla.suse.com/1016366" source="BUGZILLA"/>
		<reference ref_id="1016369" ref_url="https://bugzilla.suse.com/1016369" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10009" ref_url="https://www.suse.com/security/cve/CVE-2016-10009/" source="CVE"/>
		<reference ref_id="CVE-2016-10011" ref_url="https://www.suse.com/security/cve/CVE-2016-10011/" source="CVE"/>
		<reference ref_id="CVE-2016-8858" ref_url="https://www.suse.com/security/cve/CVE-2016-8858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002972.html" source="SUSE-SU"/>
		<description>
This update for openssh-openssl1 fixes the following issues:


- Properly verify CIDR masks in configuration (bsc#1005893)

- CVE-2016-10009: limit directories for loading PKCS11 modules (bsc#1016366)

- CVE-2016-10011: Prevent possible leaks of host private keys to low-privilege
  process handling authentication (bsc#1016369)

- CVE-2016-8858: prevent resource depletion during key exchange (bsc#1005480)

- fix suggested command for removing conflicting server keys from
  the known_hosts file (bsc#1006221)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-23"/>
	<updated date="2017-06-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005480">SUSE bug 1005480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005893">SUSE bug 1005893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006221">SUSE bug 1006221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016366">SUSE bug 1016366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016369">SUSE bug 1016369</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10009/">CVE-2016-10009 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10009">CVE-2016-10009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10011/">CVE-2016-10011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10011">CVE-2016-10011 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8858/">CVE-2016-8858 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8858">CVE-2016-8858 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565733" comment="openssh-openssl1-6.6p1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565734" comment="openssh-openssl1-helpers-6.6p1-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216562" version="1" class="patch">
	<metadata>
		<title>Security update for openssh-openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1016370" ref_url="https://bugzilla.suse.com/1016370" source="BUGZILLA"/>
		<reference ref_id="1017099" ref_url="https://bugzilla.suse.com/1017099" source="BUGZILLA"/>
		<reference ref_id="1023275" ref_url="https://bugzilla.suse.com/1023275" source="BUGZILLA"/>
		<reference ref_id="1053972" ref_url="https://bugzilla.suse.com/1053972" source="BUGZILLA"/>
		<reference ref_id="1065000" ref_url="https://bugzilla.suse.com/1065000" source="BUGZILLA"/>
		<reference ref_id="1069509" ref_url="https://bugzilla.suse.com/1069509" source="BUGZILLA"/>
		<reference ref_id="1076957" ref_url="https://bugzilla.suse.com/1076957" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-1483" ref_url="https://www.suse.com/security/cve/CVE-2008-1483/" source="CVE"/>
		<reference ref_id="CVE-2016-10012" ref_url="https://www.suse.com/security/cve/CVE-2016-10012/" source="CVE"/>
		<reference ref_id="CVE-2016-10708" ref_url="https://www.suse.com/security/cve/CVE-2016-10708/" source="CVE"/>
		<reference ref_id="CVE-2017-15906" ref_url="https://www.suse.com/security/cve/CVE-2017-15906/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004564.html" source="SUSE-SU"/>
		<description>
This update for openssh-openssl1 fixes the following issues:

These security issues were fixed:

- CVE-2016-10708: Prevent NULL pointer dereference via an out-of-sequence
  NEWKEYS message allowed remote attackers to cause a denial of service
  (bsc#1076957).
- CVE-2017-15906: The process_open function did not properly prevent write
  operations in readonly mode, which allowed attackers to create zero-length
  files (bsc#1065000).
- CVE-2016-10012: The shared memory manager (associated with pre-authentication
  compression) did not ensure that a bounds check is enforced by all compilers,
  which might have allowed local users to gain privileges by leveraging access to
  a sandboxed privilege-separation process, related to the m_zback and m_zlib
  data structures (bsc#1016370).
- CVE-2008-1483: Prevent local users from hijacking forwarded X connections by
  causing ssh to set DISPLAY to :10, even when another process is listening on
  the associated port. This problem was reontroduced by another patch and was
  previously fixed by another update (bsc#1069509).

These non-security issues were fixed:

- Remove duplicate KEX method (bsc#1053972)
- New switch for printing diagnostic messages in sftp client's batch mode (bsc#1023275)
- Enable case-insensitive hostname matching (bsc#1017099)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-14"/>
	<updated date="2018-09-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1016370">SUSE bug 1016370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017099">SUSE bug 1017099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023275">SUSE bug 1023275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053972">SUSE bug 1053972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065000">SUSE bug 1065000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069509">SUSE bug 1069509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076957">SUSE bug 1076957</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2008-1483/">CVE-2008-1483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1483">CVE-2008-1483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10012/">CVE-2016-10012 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10012">CVE-2016-10012 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10708/">CVE-2016-10708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10708">CVE-2016-10708 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15906/">CVE-2017-15906 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15906">CVE-2017-15906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565735" comment="openssh-openssl1-6.6p1-19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565736" comment="openssh-openssl1-helpers-6.6p1-19.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216563" version="1" class="patch">
	<metadata>
		<title>Security update for openssh-openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1091396" ref_url="https://bugzilla.suse.com/1091396" source="BUGZILLA"/>
		<reference ref_id="1105010" ref_url="https://bugzilla.suse.com/1105010" source="BUGZILLA"/>
		<reference ref_id="1106163" ref_url="https://bugzilla.suse.com/1106163" source="BUGZILLA"/>
		<reference ref_id="964336" ref_url="https://bugzilla.suse.com/964336" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15473" ref_url="https://www.suse.com/security/cve/CVE-2018-15473/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004850.html" source="SUSE-SU"/>
		<description>
This update for openssh-openssl1 fixes the following issues:

Security issues fixed:

- CVE-2018-15919: Remotely observable behaviour in auth-gss2.c in OpenSSH could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. OpenSSH developers do not want to treat such a username enumeration (or 'oracle') as a vulnerability. (bsc#1106163)
- CVE-2018-15473: OpenSSH was prone to a user existance oracle vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. (bsc#1105010)

Following non-security issues were fixed:

- Fix for sftp client because it returns wrong error code upon failure (bsc#1091396)
- Stop leaking File descriptors (bsc#964336)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-14"/>
	<updated date="2018-11-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091396">SUSE bug 1091396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106163">SUSE bug 1106163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964336">SUSE bug 964336</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15473/">CVE-2018-15473 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15473">CVE-2018-15473 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565737" comment="openssh-openssl1-6.6p1-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565738" comment="openssh-openssl1-helpers-6.6p1-19.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216564" version="1" class="patch">
	<metadata>
		<title>Security update for openssh-openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1190975" ref_url="https://bugzilla.suse.com/1190975" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41617" ref_url="https://www.suse.com/security/cve/CVE-2021-41617/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009937.html" source="SUSE-SU"/>
		<description>
This update for openssh-openssl1 fixes the following issues:

- CVE-2021-41617: Fixed privilege escalation when AuthorizedKeysCommand/AuthorizedPrincipalsCommand are configured (bsc#1190975).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-23"/>
	<updated date="2021-12-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190975">SUSE bug 1190975</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41617/">CVE-2021-41617 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41617">CVE-2021-41617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659156" comment="openssh-openssl1-6.6p1-19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659157" comment="openssh-openssl1-helpers-6.6p1-19.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216565" version="1" class="patch">
	<metadata>
		<title>Recommended update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="937492" ref_url="https://bugzilla.suse.com/937492" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="SUSE-RU-2015:1412-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-August/003341.html" source="SUSE-SU"/>
		<description>

This openssl update fixes a regression caused by the patch for CVE-2015-0287, which
could cause DSA keys not be correctly loaded from disk. (bsc#937492)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-07"/>
	<updated date="2015-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/937492">SUSE bug 937492</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0287">CVE-2015-0287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009593850" comment="libopenssl1-devel-1.0.1g-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593851" comment="libopenssl1_0_0-1.0.1g-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593852" comment="libopenssl1_0_0-32bit-1.0.1g-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593853" comment="libopenssl1_0_0-x86-1.0.1g-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593854" comment="openssl1-1.0.1g-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593855" comment="openssl1-doc-1.0.1g-0.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216566" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="937085" ref_url="https://bugzilla.suse.com/937085" source="BUGZILLA"/>
		<reference ref_id="954256" ref_url="https://bugzilla.suse.com/954256" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="957813" ref_url="https://bugzilla.suse.com/957813" source="BUGZILLA"/>
		<reference ref_id="957815" ref_url="https://bugzilla.suse.com/957815" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="CVE-2015-3196" ref_url="https://www.suse.com/security/cve/CVE-2015-3196/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001731.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues: 

Security fixes:
- CVE-2015-3194: The signature verification routines will crash with a
  NULL pointer dereference if presented with an ASN.1 signature using the
  RSA PSS algorithm and absent mask generation function parameter. Since
  these routines are used to verify certificate signature algorithms
  this can be used to crash any certificate verification operation and
  exploited in a DoS attack. Any application which performs certificate
  verification is vulnerable including OpenSSL clients and servers which
  enable client authentication. (bsc#957815)
- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure OpenSSL would leak
  memory. This structure is used by the PKCS#7 and CMS routines so any
  application which reads PKCS#7 or CMS data from untrusted sources is affected.
  SSL/TLS is not affected. (bsc#957812)
- CVE-2015-3196: If PSK identity hints are received by a multi-threaded client then
  the values were wrongly updated in the parent SSL_CTX structure. This could
  result in a race condition potentially leading to a double free of the
  identify hint data.  (bsc#957813)

Non security bugs fixed:
- Improve S/390 performance on IBM z196 and z13 (bsc#954256)
- Add support for 'ciphers' providing no encryption (bsc#937085)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-11"/>
	<updated date="2015-12-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/937085">SUSE bug 937085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954256">SUSE bug 954256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957813">SUSE bug 957813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957815">SUSE bug 957815</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3194">CVE-2015-3194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3195">CVE-2015-3195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3196/">CVE-2015-3196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3196">CVE-2015-3196 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565739" comment="libopenssl1-devel-1.0.1g-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565740" comment="libopenssl1_0_0-1.0.1g-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565741" comment="libopenssl1_0_0-32bit-1.0.1g-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565742" comment="libopenssl1_0_0-x86-1.0.1g-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565743" comment="openssl1-1.0.1g-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565744" comment="openssl1-doc-1.0.1g-0.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216567" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="952871" ref_url="https://bugzilla.suse.com/952871" source="BUGZILLA"/>
		<reference ref_id="963415" ref_url="https://bugzilla.suse.com/963415" source="BUGZILLA"/>
		<reference ref_id="968046" ref_url="https://bugzilla.suse.com/968046" source="BUGZILLA"/>
		<reference ref_id="968047" ref_url="https://bugzilla.suse.com/968047" source="BUGZILLA"/>
		<reference ref_id="968048" ref_url="https://bugzilla.suse.com/968048" source="BUGZILLA"/>
		<reference ref_id="968050" ref_url="https://bugzilla.suse.com/968050" source="BUGZILLA"/>
		<reference ref_id="968051" ref_url="https://bugzilla.suse.com/968051" source="BUGZILLA"/>
		<reference ref_id="968053" ref_url="https://bugzilla.suse.com/968053" source="BUGZILLA"/>
		<reference ref_id="968265" ref_url="https://bugzilla.suse.com/968265" source="BUGZILLA"/>
		<reference ref_id="968374" ref_url="https://bugzilla.suse.com/968374" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0703" ref_url="https://www.suse.com/security/cve/CVE-2016-0703/" source="CVE"/>
		<reference ref_id="CVE-2016-0704" ref_url="https://www.suse.com/security/cve/CVE-2016-0704/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0798" ref_url="https://www.suse.com/security/cve/CVE-2016-0798/" source="CVE"/>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001904.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes various security issues and bugs: 

Security issues fixed:
- CVE-2016-0800 aka the 'DROWN' attack (bsc#968046):
  OpenSSL was vulnerable to a cross-protocol attack that could lead to
  decryption of TLS sessions by using a server supporting SSLv2 and
  EXPORT cipher suites as a Bleichenbacher RSA padding oracle.

  This update changes the openssl library to:

  * Disable SSLv2 protocol support by default.

    This can be overridden by setting the environment variable
    'OPENSSL_ALLOW_SSL2' or by using SSL_CTX_clear_options using the
    SSL_OP_NO_SSLv2 flag.

    Note that various services and clients had already disabled SSL
    protocol 2 by default previously.

  * Disable all weak EXPORT ciphers by default. These can be reenabled
    if required by old legacy software using the environment variable
    'OPENSSL_ALLOW_EXPORT'.

- CVE-2016-0702 aka the 'CacheBleed' attack. (bsc#968050)
  Various changes in the modular exponentation code were added that
  make sure that it is not possible to recover RSA secret keys by
  analyzing cache-bank conflicts on the Intel Sandy-Bridge microarchitecture.

  Note that this was only exploitable if the malicious code was running
  on the same hyper threaded Intel Sandy Bridge processor as the victim
  thread performing decryptions.

- CVE-2016-0705 (bnc#968047):
  A double free() bug in the DSA ASN1 parser code was fixed that could
  be abused to facilitate a denial-of-service attack.

- CVE-2016-0797 (bnc#968048):
  The BN_hex2bn() and BN_dec2bn() functions had a bug that could result
  in an attempt to de-reference a NULL pointer leading to crashes.
  This could have security consequences if these functions were ever
  called by user applications with large untrusted hex/decimal data. Also,
  internal usage of these functions in OpenSSL uses data from config files
  or application command line arguments. If user developed applications
  generated config file data based on untrusted data, then this could
  have had security consequences as well.

- CVE-2016-0798 (bnc#968265)
  The SRP user database lookup method SRP_VBASE_get_by_user() had a memory
  leak that attackers could abuse to facility DoS attacks. To mitigate
  the issue, the seed handling in SRP_VBASE_get_by_user() was disabled
  even if the user has configured a seed. Applications are advised to
  migrate to SRP_VBASE_get1_by_user().

- CVE-2016-0799 (bnc#968374)
  On many 64 bit systems, the internal fmtstr() and doapr_outch()
  functions could miscalculate the length of a string and attempt to
  access out-of-bounds memory locations. These problems could have
  enabled attacks where large amounts of untrusted data is passed to
  the BIO_*printf functions. If applications use these functions in
  this way then they could have been vulnerable. OpenSSL itself uses
  these functions when printing out human-readable dumps of ASN.1
  data. Therefore applications that print this data could have been
  vulnerable if the data is from untrusted sources. OpenSSL command line
  applications could also have been vulnerable when they print out ASN.1
  data, or if untrusted data is passed as command line arguments. Libssl
  is not considered directly vulnerable.

- CVE-2015-3197 (bsc#963415):
  The SSLv2 protocol did not block disabled ciphers.

Note that the March 1st 2016 release also references following CVEs
that were fixed by us with CVE-2015-0293 in 2015:

- CVE-2016-0703 (bsc#968051): This issue only affected versions of
  OpenSSL prior to March 19th 2015 at which time the code was refactored
  to address vulnerability CVE-2015-0293. It would have made the above
  'DROWN' attack much easier.
- CVE-2016-0704 (bsc#968053): 'Bleichenbacher oracle in SSLv2'
  This issue only affected versions of OpenSSL prior to March 19th
  2015 at which time the code was refactored to address vulnerability
  CVE-2015-0293. It would have made the above 'DROWN' attack much easier.

Bugs fixed:
- Avoid running OPENSSL_config twice. This avoids breaking
  engine loading. (bsc#952871)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-01"/>
	<updated date="2016-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/952871">SUSE bug 952871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963415">SUSE bug 963415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968047">SUSE bug 968047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968048">SUSE bug 968048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968050">SUSE bug 968050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968053">SUSE bug 968053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968265">SUSE bug 968265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968374">SUSE bug 968374</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3197">CVE-2015-3197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0702">CVE-2016-0702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0703/">CVE-2016-0703 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0703">CVE-2016-0703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0704/">CVE-2016-0704 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0704">CVE-2016-0704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0705">CVE-2016-0705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0797">CVE-2016-0797 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-0798/">CVE-2016-0798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0798">CVE-2016-0798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0799">CVE-2016-0799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0800">CVE-2016-0800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565745" comment="libopenssl1-devel-1.0.1g-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565746" comment="libopenssl1_0_0-1.0.1g-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565747" comment="libopenssl1_0_0-32bit-1.0.1g-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565748" comment="libopenssl1_0_0-x86-1.0.1g-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565749" comment="openssl1-1.0.1g-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565750" comment="openssl1-doc-1.0.1g-0.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216568" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="889013" ref_url="https://bugzilla.suse.com/889013" source="BUGZILLA"/>
		<reference ref_id="971354" ref_url="https://bugzilla.suse.com/971354" source="BUGZILLA"/>
		<reference ref_id="976942" ref_url="https://bugzilla.suse.com/976942" source="BUGZILLA"/>
		<reference ref_id="976943" ref_url="https://bugzilla.suse.com/976943" source="BUGZILLA"/>
		<reference ref_id="977614" ref_url="https://bugzilla.suse.com/977614" source="BUGZILLA"/>
		<reference ref_id="977615" ref_url="https://bugzilla.suse.com/977615" source="BUGZILLA"/>
		<reference ref_id="977616" ref_url="https://bugzilla.suse.com/977616" source="BUGZILLA"/>
		<reference ref_id="977617" ref_url="https://bugzilla.suse.com/977617" source="BUGZILLA"/>
		<reference ref_id="977621" ref_url="https://bugzilla.suse.com/977621" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107/" source="CVE"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002038.html" source="SUSE-SU"/>
		<description>

This update for openssl1 fixes the following issues:

Security issues fixed:
- CVE-2016-2108: Memory corruption in the ASN.1 encoder (bsc#977617)
- CVE-2016-2107: Padding oracle in AES-NI CBC MAC check (bsc#977616)
- CVE-2016-2105: EVP_EncodeUpdate overflow (bsc#977614)
- CVE-2016-2106: EVP_EncryptUpdate overflow (bsc#977615)
- CVE-2016-2109: ASN.1 BIO excessive memory allocation (bsc#976942)

Bugs fixed:
- bsc#971354: libopenssl1_0_0 now Recommends: openssl1 to get correct SSL Root
  Certificate hashes
- bsc#889013: Rename README.SuSE to the new spelling README.SUSE
- bsc#976943: Fixed a buffer overrun in ASN1_parse.
- bsc#977621: Preserve negotiated digests for SNI (bsc#977621)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-03"/>
	<updated date="2016-05-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/889013">SUSE bug 889013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971354">SUSE bug 971354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976943">SUSE bug 976943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977614">SUSE bug 977614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977615">SUSE bug 977615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977616">SUSE bug 977616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977617">SUSE bug 977617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977621">SUSE bug 977621</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2105">CVE-2016-2105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2106">CVE-2016-2106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2107">CVE-2016-2107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2108">CVE-2016-2108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2109">CVE-2016-2109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565751" comment="libopenssl1-devel-1.0.1g-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565752" comment="libopenssl1_0_0-1.0.1g-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565753" comment="libopenssl1_0_0-32bit-1.0.1g-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565754" comment="libopenssl1_0_0-x86-1.0.1g-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565755" comment="openssl1-1.0.1g-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565756" comment="openssl1-doc-1.0.1g-0.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216569" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="979475" ref_url="https://bugzilla.suse.com/979475" source="BUGZILLA"/>
		<reference ref_id="982575" ref_url="https://bugzilla.suse.com/982575" source="BUGZILLA"/>
		<reference ref_id="982745" ref_url="https://bugzilla.suse.com/982745" source="BUGZILLA"/>
		<reference ref_id="983249" ref_url="https://bugzilla.suse.com/983249" source="BUGZILLA"/>
		<reference ref_id="990419" ref_url="https://bugzilla.suse.com/990419" source="BUGZILLA"/>
		<reference ref_id="993819" ref_url="https://bugzilla.suse.com/993819" source="BUGZILLA"/>
		<reference ref_id="994749" ref_url="https://bugzilla.suse.com/994749" source="BUGZILLA"/>
		<reference ref_id="994844" ref_url="https://bugzilla.suse.com/994844" source="BUGZILLA"/>
		<reference ref_id="995075" ref_url="https://bugzilla.suse.com/995075" source="BUGZILLA"/>
		<reference ref_id="995324" ref_url="https://bugzilla.suse.com/995324" source="BUGZILLA"/>
		<reference ref_id="995359" ref_url="https://bugzilla.suse.com/995359" source="BUGZILLA"/>
		<reference ref_id="995377" ref_url="https://bugzilla.suse.com/995377" source="BUGZILLA"/>
		<reference ref_id="998190" ref_url="https://bugzilla.suse.com/998190" source="BUGZILLA"/>
		<reference ref_id="999665" ref_url="https://bugzilla.suse.com/999665" source="BUGZILLA"/>
		<reference ref_id="999666" ref_url="https://bugzilla.suse.com/999666" source="BUGZILLA"/>
		<reference ref_id="999668" ref_url="https://bugzilla.suse.com/999668" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2180" ref_url="https://www.suse.com/security/cve/CVE-2016-2180/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002314.html" source="SUSE-SU"/>
		<description>

This update for openssl1 fixes the following issues:

penSSL Security Advisory [22 Sep 2016] (bsc#999665)

Severity: High
* OCSP Status Request extension unbounded memory growth (CVE-2016-6304) (bsc#999666)

Severity: Low
* Pointer arithmetic undefined behaviour (CVE-2016-2177) (bsc#982575)
* Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249)
* DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
* OOB read in TS_OBJ_print_bio() (CVE-2016-2180) (bsc#990419)
* DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
* OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
* Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359)
* Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
* OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
* Certificate message OOB reads (CVE-2016-6306) (bsc#999668)

More information can be found on: https://www.openssl.org/news/secadv/20160922.txt

Also following bugs were fixed:
* update expired S/MIME certs (bsc#979475)
* improve s390x performance (bsc#982745)
* fix crash in print_notice (bsc#998190)
* resume reading from /dev/urandom when interrupted by a signal (bsc#995075)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-06"/>
	<updated date="2016-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979475">SUSE bug 979475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982745">SUSE bug 982745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983249">SUSE bug 983249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990419">SUSE bug 990419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993819">SUSE bug 993819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994749">SUSE bug 994749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995075">SUSE bug 995075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995324">SUSE bug 995324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995359">SUSE bug 995359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995377">SUSE bug 995377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998190">SUSE bug 998190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999666">SUSE bug 999666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999668">SUSE bug 999668</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2177">CVE-2016-2177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2178">CVE-2016-2178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2179">CVE-2016-2179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2180/">CVE-2016-2180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2180">CVE-2016-2180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2181">CVE-2016-2181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2182">CVE-2016-2182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6302">CVE-2016-6302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6303">CVE-2016-6303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6304">CVE-2016-6304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6306">CVE-2016-6306 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565757" comment="libopenssl1-devel-1.0.1g-0.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565758" comment="libopenssl1_0_0-1.0.1g-0.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565759" comment="libopenssl1_0_0-32bit-1.0.1g-0.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565760" comment="libopenssl1_0_0-x86-1.0.1g-0.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565761" comment="openssl1-1.0.1g-0.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565762" comment="openssl1-doc-1.0.1g-0.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216570" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1000677" ref_url="https://bugzilla.suse.com/1000677" source="BUGZILLA"/>
		<reference ref_id="1001707" ref_url="https://bugzilla.suse.com/1001707" source="BUGZILLA"/>
		<reference ref_id="1001912" ref_url="https://bugzilla.suse.com/1001912" source="BUGZILLA"/>
		<reference ref_id="1004499" ref_url="https://bugzilla.suse.com/1004499" source="BUGZILLA"/>
		<reference ref_id="1005878" ref_url="https://bugzilla.suse.com/1005878" source="BUGZILLA"/>
		<reference ref_id="1019334" ref_url="https://bugzilla.suse.com/1019334" source="BUGZILLA"/>
		<reference ref_id="1021641" ref_url="https://bugzilla.suse.com/1021641" source="BUGZILLA"/>
		<reference ref_id="1022085" ref_url="https://bugzilla.suse.com/1022085" source="BUGZILLA"/>
		<reference ref_id="1022644" ref_url="https://bugzilla.suse.com/1022644" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002653.html" source="SUSE-SU"/>
		<description>

This update for openssl1 fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)

Security issues fixed:
- CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334)
- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)
- CVE-2017-3731: Truncated packet could crash via OOB read (bsc#1022085)
- Degrade the 3DES cipher to MEDIUM in SSLv2 (bsc#1001912)
- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)

Bugs fixed:
- fix crash in openssl speed (bsc#1000677)
- call c_rehash in %post (bsc#1001707)
- ship static libraries in the devel package (bsc#1022644)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-17"/>
	<updated date="2017-02-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000677">SUSE bug 1000677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001707">SUSE bug 1001707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001912">SUSE bug 1001912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004499">SUSE bug 1004499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019334">SUSE bug 1019334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022085">SUSE bug 1022085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022644">SUSE bug 1022644</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2108">CVE-2016-2108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7056">CVE-2016-7056 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8610">CVE-2016-8610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3731">CVE-2017-3731 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565763" comment="libopenssl1-devel-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565764" comment="libopenssl1_0_0-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565765" comment="libopenssl1_0_0-32bit-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565766" comment="libopenssl1_0_0-x86-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565767" comment="openssl1-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565768" comment="openssl1-doc-1.0.1g-0.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216571" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1027908" ref_url="https://bugzilla.suse.com/1027908" source="BUGZILLA"/>
		<reference ref_id="1032261" ref_url="https://bugzilla.suse.com/1032261" source="BUGZILLA"/>
		<reference ref_id="1055825" ref_url="https://bugzilla.suse.com/1055825" source="BUGZILLA"/>
		<reference ref_id="1056058" ref_url="https://bugzilla.suse.com/1056058" source="BUGZILLA"/>
		<reference ref_id="1057660" ref_url="https://bugzilla.suse.com/1057660" source="BUGZILLA"/>
		<reference ref_id="1065363" ref_url="https://bugzilla.suse.com/1065363" source="BUGZILLA"/>
		<reference ref_id="990592" ref_url="https://bugzilla.suse.com/990592" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003388.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

Security issues fixed:

- CVE-2017-3735: Malformed X.509 IPAdressFamily could cause OOB read (bsc#1056058)
- adjust DEFAULT_SUSE to meet 1.0.2 and current state (bsc#1027908)
- out of bounds read+crash in DES_fcrypt (bsc#1065363)
- DEFAULT_SUSE cipher list is missing ECDHE-ECDSA ciphers (bsc#1055825)
- Missing important ciphers in openssl 1.0.1i-47.1 (bsc#990592)

Bug fixes:

- support alternate root ca chains (bsc#1032261)
- Require openssl1, so c_rehash1 is available during %post to hash the certificates (bsc#1057660)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-09"/>
	<updated date="2017-11-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027908">SUSE bug 1027908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032261">SUSE bug 1032261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055825">SUSE bug 1055825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056058">SUSE bug 1056058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057660">SUSE bug 1057660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065363">SUSE bug 1065363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990592">SUSE bug 990592</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3735">CVE-2017-3735 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565769" comment="libopenssl1-devel-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565770" comment="libopenssl1_0_0-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565771" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565772" comment="libopenssl1_0_0-x86-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565773" comment="openssl1-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565774" comment="openssl1-doc-1.0.1g-0.58.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216572" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1087102" ref_url="https://bugzilla.suse.com/1087102" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003880.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

-  CVE-2018-0739: Constructed ASN.1 types with a recursive definition could exceed
    the stack. This could result in a Denial Of Service attack. (bsc#1087102)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-09"/>
	<updated date="2018-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087102">SUSE bug 1087102</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0739">CVE-2018-0739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565775" comment="libopenssl1-devel-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565776" comment="libopenssl1_0_0-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565777" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565778" comment="libopenssl1_0_0-x86-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565779" comment="openssl1-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565780" comment="openssl1-doc-1.0.1g-0.58.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216573" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1089039" ref_url="https://bugzilla.suse.com/1089039" source="BUGZILLA"/>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="1097624" ref_url="https://bugzilla.suse.com/1097624" source="BUGZILLA"/>
		<reference ref_id="1098592" ref_url="https://bugzilla.suse.com/1098592" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004505.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following security issues:

- CVE-2018-0737: The RSA Key generation algorithm has been shown to be
  vulnerable to a cache timing side channel attack. An attacker with sufficient
  access to mount cache timing attacks during the RSA key generation process
  could have recovered the private key (bsc#1089039)
- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based
  ciphersuite a malicious server could have sent a very large prime value to the
  client. This caused the client to spend an unreasonably long period of time
  generating a key for this prime resulting in a hang until the client has
  finished. This could be exploited in a Denial Of Service attack (bsc#1097158)
- Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-28"/>
	<updated date="2018-08-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089039">SUSE bug 1089039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097624">SUSE bug 1097624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098592">SUSE bug 1098592</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0732">CVE-2018-0732 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0737">CVE-2018-0737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565781" comment="libopenssl1-devel-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565782" comment="libopenssl1_0_0-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565783" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565784" comment="libopenssl1_0_0-x86-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565785" comment="openssl1-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565786" comment="openssl1-doc-1.0.1g-0.58.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216574" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1104789" ref_url="https://bugzilla.suse.com/1104789" source="BUGZILLA"/>
		<reference ref_id="1110018" ref_url="https://bugzilla.suse.com/1110018" source="BUGZILLA"/>
		<reference ref_id="1113534" ref_url="https://bugzilla.suse.com/1113534" source="BUGZILLA"/>
		<reference ref_id="1113652" ref_url="https://bugzilla.suse.com/1113652" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3964-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183964-1.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

Security issues fixed:

- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).
- Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-03"/>
	<updated date="2018-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104789">SUSE bug 1104789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110018">SUSE bug 1110018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8610">CVE-2016-8610 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0734">CVE-2018-0734 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5407">CVE-2018-5407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565787" comment="libopenssl1-devel-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565788" comment="libopenssl1_0_0-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565789" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565790" comment="libopenssl1_0_0-x86-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565791" comment="openssl1-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565792" comment="openssl1-doc-1.0.1g-0.58.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216575" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1127080" ref_url="https://bugzilla.suse.com/1127080" source="BUGZILLA"/>
		<reference ref_id="1131291" ref_url="https://bugzilla.suse.com/1131291" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005585.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following security issues:

- CVE-2019-1559: Fix 0-byte record padding oracle via SSL_shutdown (bsc#1127080)
- Reject invalid EC point coordinates (bsc#1131291)
- Fixed 'The 9 Lives of Bleichenbacher's CAT: Cache ATtacks on TLS Implementations' (bsc#1117951)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-18"/>
	<updated date="2019-06-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131291">SUSE bug 1131291</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1559">CVE-2019-1559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565793" comment="libopenssl1-devel-1.0.1g-0.58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565794" comment="libopenssl1_0_0-1.0.1g-0.58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565795" comment="openssl1-1.0.1g-0.58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565796" comment="openssl1-doc-1.0.1g-0.58.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216576" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1150003" ref_url="https://bugzilla.suse.com/1150003" source="BUGZILLA"/>
		<reference ref_id="1150250" ref_url="https://bugzilla.suse.com/1150250" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005926.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

OpenSSL Security Advisory [10 September 2019]

* CVE-2019-1547: Added EC_GROUP_set_generator side channel attack avoidance. (bsc#1150003)
* CVE-2019-1563: Fixed Bleichenbacher attack against cms/pkcs7 encryption transported key (bsc#1150250)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1547">CVE-2019-1547 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1563">CVE-2019-1563 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565797" comment="libopenssl1-devel-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565798" comment="libopenssl1_0_0-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565799" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565800" comment="libopenssl1_0_0-x86-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565801" comment="openssl1-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565802" comment="openssl1-doc-1.0.1g-0.58.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216577" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1160163" ref_url="https://bugzilla.suse.com/1160163" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2020:14291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006518.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

- Add missing commits fixing the security issue called 'The 9 Lives of Bleichenbacher's CAT'. (bsc#1117951)
- Fix a memory problem in 'BN_copy()'. (bsc#1160163)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-24"/>
	<updated date="2020-02-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160163">SUSE bug 1160163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565803" comment="libopenssl1-devel-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565804" comment="libopenssl1_0_0-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565805" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565806" comment="libopenssl1_0_0-x86-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565807" comment="openssl1-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565808" comment="openssl1-doc-1.0.1g-0.58.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216578" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1176331" ref_url="https://bugzilla.suse.com/1176331" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1968" ref_url="https://www.suse.com/security/cve/CVE-2020-1968/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007521.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2020-1968: Introduced hardening against the Raccoon attack by always generating fresh DH keys 
  and never reuse them across multiple TLS connections (bsc#1176331).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176331">SUSE bug 1176331</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1968/">CVE-2020-1968 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1968">CVE-2020-1968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565809" comment="libopenssl1-devel-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565810" comment="libopenssl1_0_0-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565811" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565812" comment="libopenssl1_0_0-x86-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565813" comment="openssl1-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565814" comment="openssl1-doc-1.0.1g-0.58.27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216579" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1179491" ref_url="https://bugzilla.suse.com/1179491" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007950.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2020-1971: Fixed a null pointer dereference in EDIPARTYNAME (bsc#1179491).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-09"/>
	<updated date="2020-12-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179491">SUSE bug 1179491</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1971">CVE-2020-1971 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565815" comment="libopenssl1-devel-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565816" comment="libopenssl1_0_0-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565817" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565818" comment="libopenssl1_0_0-x86-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565819" comment="openssl1-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565820" comment="openssl1-doc-1.0.1g-0.58.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216580" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1182331" ref_url="https://bugzilla.suse.com/1182331" source="BUGZILLA"/>
		<reference ref_id="1182333" ref_url="https://bugzilla.suse.com/1182333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008506.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2021-23840: Fixed an Integer overflow in CipherUpdate (bsc#1182333)
- CVE-2021-23841: Fixed a Null pointer dereference in X509_issuer_and_serial_hash() (bsc#1182331)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182331">SUSE bug 1182331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23840">CVE-2021-23840 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23841">CVE-2021-23841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565821" comment="libopenssl1-devel-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565822" comment="libopenssl1_0_0-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565823" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565824" comment="libopenssl1_0_0-x86-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565825" comment="openssl1-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565826" comment="openssl1-doc-1.0.1g-0.58.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216581" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009347.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following security issue:

- CVE-2021-3712: a bug in the code for printing certificate details could
  lead to a buffer overrun that a malicious actor could exploit to crash
  the application, causing a denial-of-service attack. [bsc#1189521]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631729" comment="libopenssl1-devel-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631730" comment="libopenssl1_0_0-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631731" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631732" comment="libopenssl1_0_0-x86-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631733" comment="openssl1-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631734" comment="openssl1-doc-1.0.1g-0.58.36.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216582" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009466.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2021-3712: This is an update for the incomplete fix for CVE-2021-3712.                                                                                                                   
  Read buffer overruns processing ASN.1 strings (bsc#1189521).                                                                                                                                 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-18"/>
	<updated date="2021-09-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632537" comment="libopenssl1-devel-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632538" comment="libopenssl1_0_0-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632539" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632540" comment="libopenssl1_0_0-x86-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632541" comment="openssl1-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632542" comment="openssl1-doc-1.0.1g-0.58.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216583" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010447.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2022-0778: Fixed an infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673386" comment="libopenssl1-devel-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673387" comment="libopenssl1_0_0-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673388" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673389" comment="libopenssl1_0_0-x86-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673390" comment="openssl1-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673391" comment="openssl1-doc-1.0.1g-0.58.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216584" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn-openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1038709" ref_url="https://bugzilla.suse.com/1038709" source="BUGZILLA"/>
		<reference ref_id="1038711" ref_url="https://bugzilla.suse.com/1038711" source="BUGZILLA"/>
		<reference ref_id="1038713" ref_url="https://bugzilla.suse.com/1038713" source="BUGZILLA"/>
		<reference ref_id="1044947" ref_url="https://bugzilla.suse.com/1044947" source="BUGZILLA"/>
		<reference ref_id="959511" ref_url="https://bugzilla.suse.com/959511" source="BUGZILLA"/>
		<reference ref_id="988522" ref_url="https://bugzilla.suse.com/988522" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7478" ref_url="https://www.suse.com/security/cve/CVE-2017-7478/" source="CVE"/>
		<reference ref_id="CVE-2017-7479" ref_url="https://www.suse.com/security/cve/CVE-2017-7479/" source="CVE"/>
		<reference ref_id="CVE-2017-7508" ref_url="https://www.suse.com/security/cve/CVE-2017-7508/" source="CVE"/>
		<reference ref_id="CVE-2017-7520" ref_url="https://www.suse.com/security/cve/CVE-2017-7520/" source="CVE"/>
		<reference ref_id="CVE-2017-7521" ref_url="https://www.suse.com/security/cve/CVE-2017-7521/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002995.html" source="SUSE-SU"/>
		<description>
This update for openvpn-openssl1 fixes the following issues:

- Some parts of the certificate-parsing code did not always clear all allocated
  memory. This would have allowed clients to leak a few bytes of memory for
  each connection attempt, thereby facilitating a (quite inefficient) DoS
  attack on the server. [bsc#1044947, CVE-2017-7521]

- The ASN1 parsing code contained a bug that could have resulted in some
  buffers being free()d twice, and this issue could have potentially been
  triggered remotely by a VPN peer. [bsc#1044947, CVE-2017-7521]

- If clients used a HTTP proxy with NTLM authentication, a man-in-the-middle
  attacker between client and proxy could cause the client to crash or disclose
  at most 96 bytes of stack memory. The disclosed stack memory was likely to
  contain the proxy password. If the proxy password had not been reused, this
  was unlikely to compromise the security of the OpenVPN tunnel itself. Clients
  who did not use the --http-proxy option with ntlm2 authentication were not
  affected. [bsc#1044947, CVE-2017-7520]

- It was possible to trigger an assertion by sending a malformed IPv6 packet.
  That issue could have been abused to remotely shutdown an openvpn server or
  client, if IPv6 and --mssfix were enabled and if the IPv6 networks used
  inside the VPN were known. [bsc#1044947, CVE-2017-7508]

- The installed sample configuration file was updated to comply to FIPS
  requirements. [bsc#988522]

- Remedy large latencies on the openVPN server during authentication process.
  [bsc#959511]

- Fix potential denial-of-service attacks found during independent audits.
  [bsc#1038713, bsc#1038709, CVE-2017-7478, bsc#1038711, CVE-2017-7479]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-29"/>
	<updated date="2017-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038709">SUSE bug 1038709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038711">SUSE bug 1038711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038713">SUSE bug 1038713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044947">SUSE bug 1044947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959511">SUSE bug 959511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988522">SUSE bug 988522</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7478/">CVE-2017-7478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7478">CVE-2017-7478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7479/">CVE-2017-7479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7479">CVE-2017-7479 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7508/">CVE-2017-7508 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7508">CVE-2017-7508 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7520/">CVE-2017-7520 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7520">CVE-2017-7520 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7521/">CVE-2017-7521 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7521">CVE-2017-7521 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565827" comment="openvpn-openssl1-2.3.2-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565828" comment="openvpn-openssl1-down-root-plugin-2.3.2-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216585" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn-openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1060877" ref_url="https://bugzilla.suse.com/1060877" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12166" ref_url="https://www.suse.com/security/cve/CVE-2017-12166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003465.html" source="SUSE-SU"/>
		<description>
This update for openvpn-openssl1 fixes the following issues:

Security issue fixed:

- CVE-2017-12166: Fix remote buffer overflow (bsc#1060877).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-01"/>
	<updated date="2017-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060877">SUSE bug 1060877</bugzilla>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12166/">CVE-2017-12166 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12166">CVE-2017-12166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565829" comment="openvpn-openssl1-2.3.2-0.10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565830" comment="openvpn-openssl1-down-root-plugin-2.3.2-0.10.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216586" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn-openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="959714" ref_url="https://bugzilla.suse.com/959714" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2020:14468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007310.html" source="SUSE-SU"/>
		<description>
This update for openvpn-openssl1 fixes the following issues:

- Fixed Out of bounds read on getaddrinfo() result (bsc#959714).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-27"/>
	<updated date="2020-08-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959714">SUSE bug 959714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565831" comment="openvpn-openssl1-2.3.2-0.10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565832" comment="openvpn-openssl1-down-root-plugin-2.3.2-0.10.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216587" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn-openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1085803" ref_url="https://bugzilla.suse.com/1085803" source="BUGZILLA"/>
		<reference ref_id="1185279" ref_url="https://bugzilla.suse.com/1185279" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7544" ref_url="https://www.suse.com/security/cve/CVE-2018-7544/" source="CVE"/>
		<reference ref_id="CVE-2020-15078" ref_url="https://www.suse.com/security/cve/CVE-2020-15078/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008765.html" source="SUSE-SU"/>
		<description>
This update for openvpn-openssl1 fixes the following issues:

- CVE-2020-15078: Fixed authentication bypass with deferred authentication (bsc#1185279).
- CVE-2018-7544: Fixed cross-protocol scripting issue that was discovered in the management interface (bsc#1085803).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-12"/>
	<updated date="2021-05-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085803">SUSE bug 1085803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185279">SUSE bug 1185279</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7544/">CVE-2018-7544 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7544">CVE-2018-7544 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15078/">CVE-2020-15078 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15078">CVE-2020-15078 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565833" comment="openvpn-openssl1-2.3.2-0.10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565834" comment="openvpn-openssl1-down-root-plugin-2.3.2-0.10.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216588" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn-openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1197341" ref_url="https://bugzilla.suse.com/1197341" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0547" ref_url="https://www.suse.com/security/cve/CVE-2022-0547/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010663.html" source="SUSE-SU"/>
		<description>
This update for openvpn-openssl1 fixes the following issues:

- CVE-2022-0547: Fixed possible authentication bypass in external authentication plug-in (bsc#1197341).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-06"/>
	<updated date="2022-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197341">SUSE bug 1197341</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0547/">CVE-2022-0547 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0547">CVE-2022-0547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009676886" comment="openvpn-openssl1-2.3.2-0.10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676887" comment="openvpn-openssl1-down-root-plugin-2.3.2-0.10.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216589" version="1" class="patch">
	<metadata>
		<title>Security update for sblim-sfcb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1008130" ref_url="https://bugzilla.suse.com/1008130" source="BUGZILLA"/>
		<reference ref_id="1012814" ref_url="https://bugzilla.suse.com/1012814" source="BUGZILLA"/>
		<reference ref_id="923349" ref_url="https://bugzilla.suse.com/923349" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002800.html" source="SUSE-SU"/>
		<description>

This update for sblim-sfcb fixes the following issues:

Feature enhancements:
- A seperate sblim-sfcb-openssl1 package was added to the SECURITY Module.
  (fate#322032/bsc#1012814)

  This package can be installed additionaly, and the SysV Init script will
  pick the openssl1 variant on the next start, offering TLS 1.2 support
  on the WBEM SSL socket.

Bugfixes:
-  Add sslNoSSLv3 and sslNoTLSv1 configuration options (bsc#923349, bsc#1008130)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-13"/>
	<updated date="2017-04-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1008130">SUSE bug 1008130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012814">SUSE bug 1012814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923349">SUSE bug 923349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565835" comment="sblim-sfcb-openssl1-1.3.11-0.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216590" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="958342" ref_url="https://bugzilla.suse.com/958342" source="BUGZILLA"/>
		<reference ref_id="984060" ref_url="https://bugzilla.suse.com/984060" source="BUGZILLA"/>
		<reference ref_id="995964" ref_url="https://bugzilla.suse.com/995964" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4971" ref_url="https://www.suse.com/security/cve/CVE-2016-4971/" source="CVE"/>
		<reference ref_id="CVE-2016-7098" ref_url="https://www.suse.com/security/cve/CVE-2016-7098/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002286.html" source="SUSE-SU"/>
		<description>

This update for wget fixes the following issues:

- CVE-2016-4971: A HTTP to FTP redirection file name confusion vulnerability was fixed.
  (bsc#984060).

- CVE-2016-7098: A potential race condition was fixed by creating files with .tmp ext
  and making them accessible to the current user only. (bsc#995964)

Bug fixed:
- Wget failed with basicauth: Failed writing HTTP request: Bad file descriptor
  (bsc#958342)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-23"/>
	<updated date="2016-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958342">SUSE bug 958342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984060">SUSE bug 984060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995964">SUSE bug 995964</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4971/">CVE-2016-4971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4971">CVE-2016-4971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7098/">CVE-2016-7098 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7098">CVE-2016-7098 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565836" comment="wget-openssl1-1.11.4-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216591" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1028301" ref_url="https://bugzilla.suse.com/1028301" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6508" ref_url="https://www.suse.com/security/cve/CVE-2017-6508/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002739.html" source="SUSE-SU"/>
		<description>

This update for wget fixes the following issues:

Security issue fixed:
- CVE-2017-6508: (url_parse): Reject control characters in host part of URL (bsc#1028301).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-22"/>
	<updated date="2017-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1028301">SUSE bug 1028301</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6508/">CVE-2017-6508 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6508">CVE-2017-6508 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565837" comment="wget-openssl1-1.11.4-1.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216592" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1092061" ref_url="https://bugzilla.suse.com/1092061" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0494" ref_url="https://www.suse.com/security/cve/CVE-2018-0494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004071.html" source="SUSE-SU"/>
		<description>
This update for wget fixes the following issues:

- CVE-2018-0494: Fixed Cookie injection vulnerability by checking for
  and joining continuation lines. (bsc#1092061)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092061">SUSE bug 1092061</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0494/">CVE-2018-0494 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0494">CVE-2018-0494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565838" comment="wget-openssl1-1.11.4-1.41.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216593" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP1</platform>
		</affected>
		<reference ref_id="758060" ref_url="https://bugzilla.suse.com/758060" source="BUGZILLA"/>
		<reference ref_id="802184" ref_url="https://bugzilla.suse.com/802184" source="BUGZILLA"/>
		<reference ref_id="880891" ref_url="https://bugzilla.suse.com/880891" source="BUGZILLA"/>
		<reference ref_id="890764" ref_url="https://bugzilla.suse.com/890764" source="BUGZILLA"/>
		<reference ref_id="901223" ref_url="https://bugzilla.suse.com/901223" source="BUGZILLA"/>
		<reference ref_id="901277" ref_url="https://bugzilla.suse.com/901277" source="BUGZILLA"/>
		<reference ref_id="905106" ref_url="https://bugzilla.suse.com/905106" source="BUGZILLA"/>
		<reference ref_id="912014" ref_url="https://bugzilla.suse.com/912014" source="BUGZILLA"/>
		<reference ref_id="912015" ref_url="https://bugzilla.suse.com/912015" source="BUGZILLA"/>
		<reference ref_id="912018" ref_url="https://bugzilla.suse.com/912018" source="BUGZILLA"/>
		<reference ref_id="912293" ref_url="https://bugzilla.suse.com/912293" source="BUGZILLA"/>
		<reference ref_id="912296" ref_url="https://bugzilla.suse.com/912296" source="BUGZILLA"/>
		<reference ref_id="920236" ref_url="https://bugzilla.suse.com/920236" source="BUGZILLA"/>
		<reference ref_id="922488" ref_url="https://bugzilla.suse.com/922488" source="BUGZILLA"/>
		<reference ref_id="922496" ref_url="https://bugzilla.suse.com/922496" source="BUGZILLA"/>
		<reference ref_id="922499" ref_url="https://bugzilla.suse.com/922499" source="BUGZILLA"/>
		<reference ref_id="922500" ref_url="https://bugzilla.suse.com/922500" source="BUGZILLA"/>
		<reference ref_id="922501" ref_url="https://bugzilla.suse.com/922501" source="BUGZILLA"/>
		<reference ref_id="929678" ref_url="https://bugzilla.suse.com/929678" source="BUGZILLA"/>
		<reference ref_id="931698" ref_url="https://bugzilla.suse.com/931698" source="BUGZILLA"/>
		<reference ref_id="934489" ref_url="https://bugzilla.suse.com/934489" source="BUGZILLA"/>
		<reference ref_id="934491" ref_url="https://bugzilla.suse.com/934491" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0292" ref_url="https://www.suse.com/security/cve/CVE-2015-0292/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001476.html" source="SUSE-SU"/>
		<description>

This compat-openssl097g rollup update contains various security fixes:

    * CVE-2012-2131,CVE-2012-2110: incorrect integer conversions in OpenSSL
      can result in memory corruption during buffer management operations.

Security Issue reference:

    * CVE-2012-2110
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-31"/>
	<updated date="2012-08-31"/>
	<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802184">SUSE bug 802184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890764">SUSE bug 890764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901223">SUSE bug 901223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912014">SUSE bug 912014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912015">SUSE bug 912015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912018">SUSE bug 912018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912293">SUSE bug 912293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912296">SUSE bug 912296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920236">SUSE bug 920236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922488">SUSE bug 922488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922496">SUSE bug 922496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922499">SUSE bug 922499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922500">SUSE bug 922500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922501">SUSE bug 922501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929678">SUSE bug 929678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931698">SUSE bug 931698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934489">SUSE bug 934489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934491">SUSE bug 934491</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2110">CVE-2012-2110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0166">CVE-2013-0166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0169">CVE-2013-0169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0224">CVE-2014-0224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3470">CVE-2014-3470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3508">CVE-2014-3508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3568">CVE-2014-3568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3570">CVE-2014-3570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3572">CVE-2014-3572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8275">CVE-2014-8275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0205">CVE-2015-0205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0286">CVE-2015-0286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0287">CVE-2015-0287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0288">CVE-2015-0288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0289">CVE-2015-0289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0292/">CVE-2015-0292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0292">CVE-2015-0292 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0293">CVE-2015-0293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1789">CVE-2015-1789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1790">CVE-2015-1790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258808" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565900" comment="compat-openssl097g-0.9.7g-146.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565901" comment="compat-openssl097g-32bit-0.9.7g-146.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216594" version="1" class="patch">
	<metadata>
		<title>Security update for IBM Java 1.4.2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP1</platform>
		</affected>
		<reference ref_id="663953" ref_url="https://bugzilla.suse.com/663953" source="BUGZILLA"/>
		<reference ref_id="666744" ref_url="https://bugzilla.suse.com/666744" source="BUGZILLA"/>
		<reference ref_id="673738" ref_url="https://bugzilla.suse.com/673738" source="BUGZILLA"/>
		<reference ref_id="704326" ref_url="https://bugzilla.suse.com/704326" source="BUGZILLA"/>
		<reference ref_id="714716" ref_url="https://bugzilla.suse.com/714716" source="BUGZILLA"/>
		<reference ref_id="739256" ref_url="https://bugzilla.suse.com/739256" source="BUGZILLA"/>
		<reference ref_id="768611" ref_url="https://bugzilla.suse.com/768611" source="BUGZILLA"/>
		<reference ref_id="778943" ref_url="https://bugzilla.suse.com/778943" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-3574" ref_url="https://www.suse.com/security/cve/CVE-2010-3574/" source="CVE"/>
		<reference ref_id="CVE-2010-4447" ref_url="https://www.suse.com/security/cve/CVE-2010-4447/" source="CVE"/>
		<reference ref_id="CVE-2010-4448" ref_url="https://www.suse.com/security/cve/CVE-2010-4448/" source="CVE"/>
		<reference ref_id="CVE-2010-4454" ref_url="https://www.suse.com/security/cve/CVE-2010-4454/" source="CVE"/>
		<reference ref_id="CVE-2010-4462" ref_url="https://www.suse.com/security/cve/CVE-2010-4462/" source="CVE"/>
		<reference ref_id="CVE-2010-4465" ref_url="https://www.suse.com/security/cve/CVE-2010-4465/" source="CVE"/>
		<reference ref_id="CVE-2010-4466" ref_url="https://www.suse.com/security/cve/CVE-2010-4466/" source="CVE"/>
		<reference ref_id="CVE-2010-4473" ref_url="https://www.suse.com/security/cve/CVE-2010-4473/" source="CVE"/>
		<reference ref_id="CVE-2010-4475" ref_url="https://www.suse.com/security/cve/CVE-2010-4475/" source="CVE"/>
		<reference ref_id="CVE-2010-4476" ref_url="https://www.suse.com/security/cve/CVE-2010-4476/" source="CVE"/>
		<reference ref_id="CVE-2011-0311" ref_url="https://www.suse.com/security/cve/CVE-2011-0311/" source="CVE"/>
		<reference ref_id="CVE-2011-0786" ref_url="https://www.suse.com/security/cve/CVE-2011-0786/" source="CVE"/>
		<reference ref_id="CVE-2011-0802" ref_url="https://www.suse.com/security/cve/CVE-2011-0802/" source="CVE"/>
		<reference ref_id="CVE-2011-0814" ref_url="https://www.suse.com/security/cve/CVE-2011-0814/" source="CVE"/>
		<reference ref_id="CVE-2011-0815" ref_url="https://www.suse.com/security/cve/CVE-2011-0815/" source="CVE"/>
		<reference ref_id="CVE-2011-0862" ref_url="https://www.suse.com/security/cve/CVE-2011-0862/" source="CVE"/>
		<reference ref_id="CVE-2011-0865" ref_url="https://www.suse.com/security/cve/CVE-2011-0865/" source="CVE"/>
		<reference ref_id="CVE-2011-0866" ref_url="https://www.suse.com/security/cve/CVE-2011-0866/" source="CVE"/>
		<reference ref_id="CVE-2011-0867" ref_url="https://www.suse.com/security/cve/CVE-2011-0867/" source="CVE"/>
		<reference ref_id="CVE-2011-0871" ref_url="https://www.suse.com/security/cve/CVE-2011-0871/" source="CVE"/>
		<reference ref_id="CVE-2011-0872" ref_url="https://www.suse.com/security/cve/CVE-2011-0872/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-3545" ref_url="https://www.suse.com/security/cve/CVE-2011-3545/" source="CVE"/>
		<reference ref_id="CVE-2011-3547" ref_url="https://www.suse.com/security/cve/CVE-2011-3547/" source="CVE"/>
		<reference ref_id="CVE-2011-3548" ref_url="https://www.suse.com/security/cve/CVE-2011-3548/" source="CVE"/>
		<reference ref_id="CVE-2011-3549" ref_url="https://www.suse.com/security/cve/CVE-2011-3549/" source="CVE"/>
		<reference ref_id="CVE-2011-3552" ref_url="https://www.suse.com/security/cve/CVE-2011-3552/" source="CVE"/>
		<reference ref_id="CVE-2011-3556" ref_url="https://www.suse.com/security/cve/CVE-2011-3556/" source="CVE"/>
		<reference ref_id="CVE-2011-3557" ref_url="https://www.suse.com/security/cve/CVE-2011-3557/" source="CVE"/>
		<reference ref_id="CVE-2011-3560" ref_url="https://www.suse.com/security/cve/CVE-2011-3560/" source="CVE"/>
		<reference ref_id="CVE-2011-3563" ref_url="https://www.suse.com/security/cve/CVE-2011-3563/" source="CVE"/>
		<reference ref_id="CVE-2012-0499" ref_url="https://www.suse.com/security/cve/CVE-2012-0499/" source="CVE"/>
		<reference ref_id="CVE-2012-0502" ref_url="https://www.suse.com/security/cve/CVE-2012-0502/" source="CVE"/>
		<reference ref_id="CVE-2012-0503" ref_url="https://www.suse.com/security/cve/CVE-2012-0503/" source="CVE"/>
		<reference ref_id="CVE-2012-0505" ref_url="https://www.suse.com/security/cve/CVE-2012-0505/" source="CVE"/>
		<reference ref_id="CVE-2012-0506" ref_url="https://www.suse.com/security/cve/CVE-2012-0506/" source="CVE"/>
		<reference ref_id="CVE-2012-1713" ref_url="https://www.suse.com/security/cve/CVE-2012-1713/" source="CVE"/>
		<reference ref_id="CVE-2012-1717" ref_url="https://www.suse.com/security/cve/CVE-2012-1717/" source="CVE"/>
		<reference ref_id="CVE-2012-1718" ref_url="https://www.suse.com/security/cve/CVE-2012-1718/" source="CVE"/>
		<reference ref_id="CVE-2012-1719" ref_url="https://www.suse.com/security/cve/CVE-2012-1719/" source="CVE"/>
		<description>

IBM Java 1.4.2 has been updated to SR13-FP13 that fixes bugs and security 
issues.

Please see for more information:

http://www.ibm.com/developerworks/java/jdk/alerts/
&lt;http://www.ibm.com/developerworks/java/jdk/alerts/&gt;

Additionally one bug has been fixed:

    * fix bnc#771808: create symlink /usr/bin/javaws properly

Security Issue references:

    * CVE-2012-1717
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1717&gt;
    * CVE-2012-1713
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1713&gt;
    * CVE-2012-1719
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1719&gt;
    * CVE-2012-1718
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1718&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-10-26"/>
	<updated date="2012-10-26"/>
	<bugzilla href="https://bugzilla.suse.com/663953">SUSE bug 663953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/666744">SUSE bug 666744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/673738">SUSE bug 673738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704326">SUSE bug 704326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/714716">SUSE bug 714716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/739256">SUSE bug 739256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/768611">SUSE bug 768611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778943">SUSE bug 778943</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1321">CVE-2010-1321 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3574/">CVE-2010-3574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3574">CVE-2010-3574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4447/">CVE-2010-4447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4447">CVE-2010-4447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4448/">CVE-2010-4448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4448">CVE-2010-4448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4454/">CVE-2010-4454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4454">CVE-2010-4454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4462/">CVE-2010-4462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4462">CVE-2010-4462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4465/">CVE-2010-4465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4465">CVE-2010-4465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4466/">CVE-2010-4466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4466">CVE-2010-4466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4473/">CVE-2010-4473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4473">CVE-2010-4473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4475/">CVE-2010-4475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4475">CVE-2010-4475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4476/">CVE-2010-4476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4476">CVE-2010-4476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0311/">CVE-2011-0311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0311">CVE-2011-0311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0786/">CVE-2011-0786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0786">CVE-2011-0786 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0802/">CVE-2011-0802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0802">CVE-2011-0802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0814/">CVE-2011-0814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0814">CVE-2011-0814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0815/">CVE-2011-0815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0815">CVE-2011-0815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0862/">CVE-2011-0862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0862">CVE-2011-0862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0865/">CVE-2011-0865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0865">CVE-2011-0865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0866/">CVE-2011-0866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0866">CVE-2011-0866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0867/">CVE-2011-0867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0867">CVE-2011-0867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0871/">CVE-2011-0871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0871">CVE-2011-0871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0872/">CVE-2011-0872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0872">CVE-2011-0872 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3545/">CVE-2011-3545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3545">CVE-2011-3545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3547/">CVE-2011-3547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3547">CVE-2011-3547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3548/">CVE-2011-3548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3548">CVE-2011-3548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3549/">CVE-2011-3549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3549">CVE-2011-3549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3552/">CVE-2011-3552 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3552">CVE-2011-3552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3556/">CVE-2011-3556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3556">CVE-2011-3556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3557/">CVE-2011-3557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3557">CVE-2011-3557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3560/">CVE-2011-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3560">CVE-2011-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3563/">CVE-2011-3563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3563">CVE-2011-3563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0499/">CVE-2012-0499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0499">CVE-2012-0499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0502/">CVE-2012-0502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0502">CVE-2012-0502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0503/">CVE-2012-0503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0503">CVE-2012-0503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0505/">CVE-2012-0505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0505">CVE-2012-0505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0506/">CVE-2012-0506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0506">CVE-2012-0506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1713/">CVE-2012-1713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1713">CVE-2012-1713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1717/">CVE-2012-1717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1717">CVE-2012-1717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1718/">CVE-2012-1718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1718">CVE-2012-1718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1719/">CVE-2012-1719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1719">CVE-2012-1719 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258808" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569626" comment="java-1_4_2-ibm-sap-1.4.2_sr13.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569627" comment="java-1_4_2-ibm-sap-devel-1.4.2_sr13.13-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216595" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="758060" ref_url="https://bugzilla.suse.com/758060" source="BUGZILLA"/>
		<reference ref_id="802184" ref_url="https://bugzilla.suse.com/802184" source="BUGZILLA"/>
		<reference ref_id="880891" ref_url="https://bugzilla.suse.com/880891" source="BUGZILLA"/>
		<reference ref_id="890764" ref_url="https://bugzilla.suse.com/890764" source="BUGZILLA"/>
		<reference ref_id="901223" ref_url="https://bugzilla.suse.com/901223" source="BUGZILLA"/>
		<reference ref_id="901277" ref_url="https://bugzilla.suse.com/901277" source="BUGZILLA"/>
		<reference ref_id="905106" ref_url="https://bugzilla.suse.com/905106" source="BUGZILLA"/>
		<reference ref_id="912014" ref_url="https://bugzilla.suse.com/912014" source="BUGZILLA"/>
		<reference ref_id="912015" ref_url="https://bugzilla.suse.com/912015" source="BUGZILLA"/>
		<reference ref_id="912018" ref_url="https://bugzilla.suse.com/912018" source="BUGZILLA"/>
		<reference ref_id="912293" ref_url="https://bugzilla.suse.com/912293" source="BUGZILLA"/>
		<reference ref_id="912296" ref_url="https://bugzilla.suse.com/912296" source="BUGZILLA"/>
		<reference ref_id="920236" ref_url="https://bugzilla.suse.com/920236" source="BUGZILLA"/>
		<reference ref_id="922488" ref_url="https://bugzilla.suse.com/922488" source="BUGZILLA"/>
		<reference ref_id="922496" ref_url="https://bugzilla.suse.com/922496" source="BUGZILLA"/>
		<reference ref_id="922499" ref_url="https://bugzilla.suse.com/922499" source="BUGZILLA"/>
		<reference ref_id="922500" ref_url="https://bugzilla.suse.com/922500" source="BUGZILLA"/>
		<reference ref_id="922501" ref_url="https://bugzilla.suse.com/922501" source="BUGZILLA"/>
		<reference ref_id="929678" ref_url="https://bugzilla.suse.com/929678" source="BUGZILLA"/>
		<reference ref_id="931698" ref_url="https://bugzilla.suse.com/931698" source="BUGZILLA"/>
		<reference ref_id="934489" ref_url="https://bugzilla.suse.com/934489" source="BUGZILLA"/>
		<reference ref_id="934491" ref_url="https://bugzilla.suse.com/934491" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0292" ref_url="https://www.suse.com/security/cve/CVE-2015-0292/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001476.html" source="SUSE-SU"/>
		<description>

This compat-openssl097g rollup update contains various security fixes:

    * CVE-2012-2131,CVE-2012-2110: incorrect integer conversions in OpenSSL
      could have resulted in memory corruption during buffer management
      operations.

Security Issue reference:

    * CVE-2012-2110
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-31"/>
	<updated date="2012-08-31"/>
	<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802184">SUSE bug 802184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890764">SUSE bug 890764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901223">SUSE bug 901223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912014">SUSE bug 912014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912015">SUSE bug 912015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912018">SUSE bug 912018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912293">SUSE bug 912293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912296">SUSE bug 912296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920236">SUSE bug 920236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922488">SUSE bug 922488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922496">SUSE bug 922496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922499">SUSE bug 922499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922500">SUSE bug 922500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922501">SUSE bug 922501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929678">SUSE bug 929678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931698">SUSE bug 931698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934489">SUSE bug 934489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934491">SUSE bug 934491</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2110">CVE-2012-2110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0166">CVE-2013-0166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0169">CVE-2013-0169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0224">CVE-2014-0224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3470">CVE-2014-3470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3508">CVE-2014-3508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3568">CVE-2014-3568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3570">CVE-2014-3570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3572">CVE-2014-3572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8275">CVE-2014-8275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0205">CVE-2015-0205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0286">CVE-2015-0286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0287">CVE-2015-0287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0288">CVE-2015-0288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0289">CVE-2015-0289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0292/">CVE-2015-0292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0292">CVE-2015-0292 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0293">CVE-2015-0293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1789">CVE-2015-1789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1790">CVE-2015-1790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565900" comment="compat-openssl097g-0.9.7g-146.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565901" comment="compat-openssl097g-32bit-0.9.7g-146.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216596" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="952099" ref_url="https://bugzilla.suse.com/952099" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001730.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl097g fixes the following issues: 

Security issue fixed:
- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure
  OpenSSL would leak memory. This structure is used by the PKCS#7 and CMS
  routines so any application which reads PKCS#7 or CMS data from untrusted
  sources is affected. SSL/TLS is not affected. (bsc#957812)

A non security issue fixed:
- Prevent segfault in s_client with invalid options (bsc#952099)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-10"/>
	<updated date="2015-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952099">SUSE bug 952099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3195">CVE-2015-3195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569628" comment="compat-openssl097g-0.9.7g-146.22.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566374" comment="compat-openssl097g-32bit-0.9.7g-146.22.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216597" version="1" class="patch">
	<metadata>
		<title>Security update for IBM Java 1.4.2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="666744" ref_url="https://bugzilla.suse.com/666744" source="BUGZILLA"/>
		<reference ref_id="768611" ref_url="https://bugzilla.suse.com/768611" source="BUGZILLA"/>
		<reference ref_id="778943" ref_url="https://bugzilla.suse.com/778943" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3563" ref_url="https://www.suse.com/security/cve/CVE-2011-3563/" source="CVE"/>
		<reference ref_id="CVE-2012-0499" ref_url="https://www.suse.com/security/cve/CVE-2012-0499/" source="CVE"/>
		<reference ref_id="CVE-2012-0502" ref_url="https://www.suse.com/security/cve/CVE-2012-0502/" source="CVE"/>
		<reference ref_id="CVE-2012-0503" ref_url="https://www.suse.com/security/cve/CVE-2012-0503/" source="CVE"/>
		<reference ref_id="CVE-2012-0505" ref_url="https://www.suse.com/security/cve/CVE-2012-0505/" source="CVE"/>
		<reference ref_id="CVE-2012-0506" ref_url="https://www.suse.com/security/cve/CVE-2012-0506/" source="CVE"/>
		<reference ref_id="CVE-2012-1713" ref_url="https://www.suse.com/security/cve/CVE-2012-1713/" source="CVE"/>
		<reference ref_id="CVE-2012-1717" ref_url="https://www.suse.com/security/cve/CVE-2012-1717/" source="CVE"/>
		<reference ref_id="CVE-2012-1718" ref_url="https://www.suse.com/security/cve/CVE-2012-1718/" source="CVE"/>
		<reference ref_id="CVE-2012-1719" ref_url="https://www.suse.com/security/cve/CVE-2012-1719/" source="CVE"/>
		<description>

IBM Java 1.4.2 has been updated to SR13-FP13 that fixes bugs and security 
issues.

Please see for more information:

http://www.ibm.com/developerworks/java/jdk/alerts/
&lt;http://www.ibm.com/developerworks/java/jdk/alerts/&gt;

Additionally one bug has been fixed:

    * fix bnc#771808: create symlink /usr/bin/javaws properly

Security Issue references:

    * CVE-2012-1717
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1717&gt;
    * CVE-2012-1713
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1713&gt;
    * CVE-2012-1719
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1719&gt;
    * CVE-2012-1718
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1718&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-10-26"/>
	<updated date="2012-10-26"/>
	<bugzilla href="https://bugzilla.suse.com/666744">SUSE bug 666744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/768611">SUSE bug 768611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778943">SUSE bug 778943</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3563/">CVE-2011-3563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3563">CVE-2011-3563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0499/">CVE-2012-0499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0499">CVE-2012-0499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0502/">CVE-2012-0502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0502">CVE-2012-0502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0503/">CVE-2012-0503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0503">CVE-2012-0503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0505/">CVE-2012-0505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0505">CVE-2012-0505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0506/">CVE-2012-0506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0506">CVE-2012-0506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1713/">CVE-2012-1713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1713">CVE-2012-1713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1717/">CVE-2012-1717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1717">CVE-2012-1717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1718/">CVE-2012-1718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1718">CVE-2012-1718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1719/">CVE-2012-1719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1719">CVE-2012-1719 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569626" comment="java-1_4_2-ibm-sap-1.4.2_sr13.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569627" comment="java-1_4_2-ibm-sap-devel-1.4.2_sr13.13-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216598" version="1" class="patch">
	<metadata>
		<title>Security update for sap_suse_cluster_connector</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="763793" ref_url="https://bugzilla.suse.com/763793" source="BUGZILLA"/>
		<reference ref_id="777453" ref_url="https://bugzilla.suse.com/777453" source="BUGZILLA"/>
		<reference ref_id="778273" ref_url="https://bugzilla.suse.com/778273" source="BUGZILLA"/>
		<reference ref_id="778293" ref_url="https://bugzilla.suse.com/778293" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0426" ref_url="https://www.suse.com/security/cve/CVE-2012-0426/" source="CVE"/>
		<description>

A tmp race condition was fixed in sap_suse_cluster_connector. CVE-2012-0426 
was assigned to this issue.

Additionally some minor non-security fixes are included.

Security Issue reference:

    * CVE-2012-0426
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0426&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-10-08"/>
	<updated date="2012-10-08"/>
	<bugzilla href="https://bugzilla.suse.com/763793">SUSE bug 763793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777453">SUSE bug 777453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778273">SUSE bug 778273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778293">SUSE bug 778293</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0426/">CVE-2012-0426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0426">CVE-2012-0426 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569629" comment="sap_suse_cluster_connector-1.0.0-0.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216599" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="912014" ref_url="https://bugzilla.suse.com/912014" source="BUGZILLA"/>
		<reference ref_id="912015" ref_url="https://bugzilla.suse.com/912015" source="BUGZILLA"/>
		<reference ref_id="912018" ref_url="https://bugzilla.suse.com/912018" source="BUGZILLA"/>
		<reference ref_id="912293" ref_url="https://bugzilla.suse.com/912293" source="BUGZILLA"/>
		<reference ref_id="912296" ref_url="https://bugzilla.suse.com/912296" source="BUGZILLA"/>
		<reference ref_id="922488" ref_url="https://bugzilla.suse.com/922488" source="BUGZILLA"/>
		<reference ref_id="922496" ref_url="https://bugzilla.suse.com/922496" source="BUGZILLA"/>
		<reference ref_id="922499" ref_url="https://bugzilla.suse.com/922499" source="BUGZILLA"/>
		<reference ref_id="922500" ref_url="https://bugzilla.suse.com/922500" source="BUGZILLA"/>
		<reference ref_id="922501" ref_url="https://bugzilla.suse.com/922501" source="BUGZILLA"/>
		<reference ref_id="929678" ref_url="https://bugzilla.suse.com/929678" source="BUGZILLA"/>
		<reference ref_id="931698" ref_url="https://bugzilla.suse.com/931698" source="BUGZILLA"/>
		<reference ref_id="934489" ref_url="https://bugzilla.suse.com/934489" source="BUGZILLA"/>
		<reference ref_id="934491" ref_url="https://bugzilla.suse.com/934491" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0292" ref_url="https://www.suse.com/security/cve/CVE-2015-0292/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1183-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001482.html" source="SUSE-SU"/>
		<description>

OpenSSL was updated to fix several security issues:

    * CVE-2015-4000: The Logjam Attack ( weakdh.org ) has been addressed by
      rejecting connections with DH parameters shorter than 1024 bits.
      2048-bit DH parameters are now generated by default.
    * CVE-2015-1789: An out-of-bounds read in X509_cmp_time was fixed.
    * CVE-2015-1790: A PKCS7 decoder crash with missing EnvelopedContent
      was fixed.
    * Fixed a timing side channel in RSA decryption. (bsc#929678)

Additional changes:

    * In the default SSL cipher string EXPORT ciphers are now disabled.
      This will only get active if applications get rebuilt and actually
      use this string. (bsc#931698)

Security Issues:

    * CVE-2015-1789
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789&gt;
    * CVE-2015-1790
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790&gt;
    * CVE-2015-4000
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-19"/>
	<updated date="2015-06-19"/>
	<bugzilla href="https://bugzilla.suse.com/912014">SUSE bug 912014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912015">SUSE bug 912015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912018">SUSE bug 912018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912293">SUSE bug 912293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912296">SUSE bug 912296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922488">SUSE bug 922488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922496">SUSE bug 922496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922499">SUSE bug 922499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922500">SUSE bug 922500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922501">SUSE bug 922501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929678">SUSE bug 929678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931698">SUSE bug 931698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934489">SUSE bug 934489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934491">SUSE bug 934491</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3570">CVE-2014-3570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3572">CVE-2014-3572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8275">CVE-2014-8275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0205">CVE-2015-0205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0286">CVE-2015-0286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0287">CVE-2015-0287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0288">CVE-2015-0288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0289">CVE-2015-0289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0292/">CVE-2015-0292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0292">CVE-2015-0292 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0293">CVE-2015-0293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1789">CVE-2015-1789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1790">CVE-2015-1790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569630" comment="compat-openssl097g-0.9.7g-146.22.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566372" comment="compat-openssl097g-32bit-0.9.7g-146.22.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216600" version="1" class="patch">
	<metadata>
		<title>Recommended update for compat-openssl097g (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="937492" ref_url="https://bugzilla.suse.com/937492" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="SUSE-RU-2015:1477-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-September/003394.html" source="SUSE-SU"/>
		<description>

The compat-openssl097g package was updated to fix a regression in the security
patch for CVE-2015-0287 that broke loading DSA keys from file. (bsc#937492)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-07"/>
	<updated date="2015-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/937492">SUSE bug 937492</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0287">CVE-2015-0287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009593856" comment="compat-openssl097g-0.9.7g-146.22.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593832" comment="compat-openssl097g-32bit-0.9.7g-146.22.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216601" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="952099" ref_url="https://bugzilla.suse.com/952099" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001730.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl097g fixes the following issues: 

Security issue fixed:
- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure
  OpenSSL would leak memory. This structure is used by the PKCS#7 and CMS
  routines so any application which reads PKCS#7 or CMS data from untrusted
  sources is affected. SSL/TLS is not affected. (bsc#957812)

A non security issue fixed:
- Prevent segfault in s_client with invalid options (bsc#952099)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-10"/>
	<updated date="2015-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952099">SUSE bug 952099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3195">CVE-2015-3195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569628" comment="compat-openssl097g-0.9.7g-146.22.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566374" comment="compat-openssl097g-32bit-0.9.7g-146.22.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216602" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="976942" ref_url="https://bugzilla.suse.com/976942" source="BUGZILLA"/>
		<reference ref_id="976943" ref_url="https://bugzilla.suse.com/976943" source="BUGZILLA"/>
		<reference ref_id="977615" ref_url="https://bugzilla.suse.com/977615" source="BUGZILLA"/>
		<reference ref_id="977617" ref_url="https://bugzilla.suse.com/977617" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002040.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl097g fixes the following issues: 

Security issues fixed:
- CVE-2016-2108: Memory corruption in the ASN.1 encoder (bsc#977617)
- CVE-2016-2105: EVP_EncodeUpdate overflow (bsc#977614)
- CVE-2016-2106: EVP_EncryptUpdate overflow (bsc#977615)
- CVE-2016-2109: ASN.1 BIO excessive memory allocation (bsc#976942)

Bugs fixed:
- bsc#976943: Fix buffer overrun in ASN1_parse
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-04"/>
	<updated date="2016-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976943">SUSE bug 976943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977615">SUSE bug 977615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977617">SUSE bug 977617</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2105">CVE-2016-2105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2106">CVE-2016-2106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2108">CVE-2016-2108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2109">CVE-2016-2109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569631" comment="compat-openssl097g-0.9.7g-146.22.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569632" comment="compat-openssl097g-32bit-0.9.7g-146.22.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216603" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="982575" ref_url="https://bugzilla.suse.com/982575" source="BUGZILLA"/>
		<reference ref_id="993819" ref_url="https://bugzilla.suse.com/993819" source="BUGZILLA"/>
		<reference ref_id="995359" ref_url="https://bugzilla.suse.com/995359" source="BUGZILLA"/>
		<reference ref_id="995377" ref_url="https://bugzilla.suse.com/995377" source="BUGZILLA"/>
		<reference ref_id="999665" ref_url="https://bugzilla.suse.com/999665" source="BUGZILLA"/>
		<reference ref_id="999668" ref_url="https://bugzilla.suse.com/999668" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002335.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl097g fixes the following issues:

OpenSSL Security Advisory [22 Sep 2016] (bsc#999665)

Severity: Low
* Pointer arithmetic undefined behaviour (CVE-2016-2177) (bsc#982575)
* OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
* Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359)
* OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
* Certificate message OOB reads (CVE-2016-6306) (bsc#999668)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-14"/>
	<updated date="2016-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993819">SUSE bug 993819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995359">SUSE bug 995359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995377">SUSE bug 995377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999668">SUSE bug 999668</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2177">CVE-2016-2177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2182">CVE-2016-2182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6303">CVE-2016-6303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6306">CVE-2016-6306 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569633" comment="compat-openssl097g-0.9.7g-146.22.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569634" comment="compat-openssl097g-32bit-0.9.7g-146.22.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216604" version="1" class="patch">
	<metadata>
		<title>Security update for clamsap (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="935939" ref_url="https://bugzilla.suse.com/935939" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2278" ref_url="https://www.suse.com/security/cve/CVE-2015-2278/" source="CVE"/>
		<reference ref_id="CVE-2015-2282" ref_url="https://www.suse.com/security/cve/CVE-2015-2282/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001953.html" source="SUSE-SU"/>
		<description>


This update fixes the following security issues: 

CVE-2015-2278: The LZH decompression implementation allows context-dependent attackers to cause a denial of service (out-of-bounds read) via unspecified vectors, related to look-ups of non-simple codes.

CVE-2015-2282: Stack-based buffer overflow in the LZC decompression implementation allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors

		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-17"/>
	<updated date="2016-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935939">SUSE bug 935939</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2278/">CVE-2015-2278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2278">CVE-2015-2278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2282/">CVE-2015-2282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2282">CVE-2015-2282 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569635" comment="clamsap-0.98.9-0.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216605" version="1" class="patch">
	<metadata>
		<title>Recommended update for compat-openssl097g (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="937492" ref_url="https://bugzilla.suse.com/937492" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="SUSE-RU-2015:1477-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-September/003394.html" source="SUSE-SU"/>
		<description>

The compat-openssl097g package was updated to fix a regression in the security
patch for CVE-2015-0287 that broke loading DSA keys from file. (bsc#937492)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-07"/>
	<updated date="2015-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/937492">SUSE bug 937492</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0287">CVE-2015-0287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009593857" comment="compat-openssl097g-0.9.7g-146.22.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593858" comment="compat-openssl097g-32bit-0.9.7g-146.22.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216606" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="952099" ref_url="https://bugzilla.suse.com/952099" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001730.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl097g fixes the following issues: 

Security issue fixed:
- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure
  OpenSSL would leak memory. This structure is used by the PKCS#7 and CMS
  routines so any application which reads PKCS#7 or CMS data from untrusted
  sources is affected. SSL/TLS is not affected. (bsc#957812)

A non security issue fixed:
- Prevent segfault in s_client with invalid options (bsc#952099)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-10"/>
	<updated date="2015-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952099">SUSE bug 952099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3195">CVE-2015-3195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569636" comment="compat-openssl097g-0.9.7g-146.22.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569637" comment="compat-openssl097g-32bit-0.9.7g-146.22.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216607" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="963415" ref_url="https://bugzilla.suse.com/963415" source="BUGZILLA"/>
		<reference ref_id="968046" ref_url="https://bugzilla.suse.com/968046" source="BUGZILLA"/>
		<reference ref_id="968048" ref_url="https://bugzilla.suse.com/968048" source="BUGZILLA"/>
		<reference ref_id="968051" ref_url="https://bugzilla.suse.com/968051" source="BUGZILLA"/>
		<reference ref_id="968053" ref_url="https://bugzilla.suse.com/968053" source="BUGZILLA"/>
		<reference ref_id="968374" ref_url="https://bugzilla.suse.com/968374" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0703" ref_url="https://www.suse.com/security/cve/CVE-2016-0703/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001909.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl097g fixes the following issues: 
- CVE-2016-0800 aka the 'DROWN' attack (bsc#968046):
  OpenSSL was vulnerable to a cross-protocol attack that could lead to
  decryption of TLS sessions by using a server supporting SSLv2 and
  EXPORT cipher suites as a Bleichenbacher RSA padding oracle.

  This update changes the openssl library to:

  * Disable SSLv2 protocol support by default.

    This can be overridden by setting the environment variable
    'OPENSSL_ALLOW_SSL2' or by using SSL_CTX_clear_options using the
    SSL_OP_NO_SSLv2 flag.

    Note that various services and clients had already disabled SSL
    protocol 2 by default previously.

  * Disable all weak EXPORT ciphers by default. These can be reenabled
    if required by old legacy software using the environment variable
    'OPENSSL_ALLOW_EXPORT'.

- CVE-2016-0705 (bnc#968047):
  A double free() bug in the DSA ASN1 parser code was fixed that could
  be abused to facilitate a denial-of-service attack.

- CVE-2016-0797 (bnc#968048):
  The BN_hex2bn() and BN_dec2bn() functions had a bug that could result
  in an attempt to de-reference a NULL pointer leading to crashes.
  This could have security consequences if these functions were ever
  called by user applications with large untrusted hex/decimal data. Also,
  internal usage of these functions in OpenSSL uses data from config files
  or application command line arguments. If user developed applications
  generated config file data based on untrusted data, then this could
  have had security consequences as well.

- CVE-2016-0799 (bnc#968374)
  On many 64 bit systems, the internal fmtstr() and doapr_outch()
  functions could miscalculate the length of a string and attempt to
  access out-of-bounds memory locations. These problems could have
  enabled attacks where large amounts of untrusted data is passed to
  the BIO_*printf functions. If applications use these functions in
  this way then they could have been vulnerable. OpenSSL itself uses
  these functions when printing out human-readable dumps of ASN.1
  data. Therefore applications that print this data could have been
  vulnerable if the data is from untrusted sources. OpenSSL command line
  applications could also have been vulnerable when they print out ASN.1
  data, or if untrusted data is passed as command line arguments. Libssl
  is not considered directly vulnerable.
- CVE-2016-0800 aka the 'DROWN' attack (bsc#968046):
  OpenSSL was vulnerable to a cross-protocol attack that could lead to
  decryption of TLS sessions by using a server supporting SSLv2 and
  EXPORT cipher suites as a Bleichenbacher RSA padding oracle.

  This update changes the openssl library to:

  * Disable SSLv2 protocol support by default.

    This can be overridden by setting the environment variable
    'OPENSSL_ALLOW_SSL2' or by using SSL_CTX_clear_options using the
    SSL_OP_NO_SSLv2 flag.

    Note that various services and clients had already disabled SSL
    protocol 2 by default previously.

  * Disable all weak EXPORT ciphers by default. These can be reenabled
    if required by old legacy software using the environment variable
    'OPENSSL_ALLOW_EXPORT'.

- CVE-2016-0705 (bnc#968047):
  A double free() bug in the DSA ASN1 parser code was fixed that could
  be abused to facilitate a denial-of-service attack.

- CVE-2016-0797 (bnc#968048):
  The BN_hex2bn() and BN_dec2bn() functions had a bug that could result
  in an attempt to de-reference a NULL pointer leading to crashes.
  This could have security consequences if these functions were ever
  called by user applications with large untrusted hex/decimal data. Also,
  internal usage of these functions in OpenSSL uses data from config files
  or application command line arguments. If user developed applications
  generated config file data based on untrusted data, then this could
  have had security consequences as well.

- CVE-2016-0799 (bnc#968374)
  On many 64 bit systems, the internal fmtstr() and doapr_outch()
  functions could miscalculate the length of a string and attempt to
  access out-of-bounds memory locations. These problems could have
  enabled attacks where large amounts of untrusted data is passed to
  the BIO_*printf functions. If applications use these functions in
  this way then they could have been vulnerable. OpenSSL itself uses
  these functions when printing out human-readable dumps of ASN.1
  data. Therefore applications that print this data could have been
  vulnerable if the data is from untrusted sources. OpenSSL command line
  applications could also have been vulnerable when they print out ASN.1
  data, or if untrusted data is passed as command line arguments. Libssl
  is not considered directly vulnerable.

- CVE-2015-3197 (bsc#963415):
  The SSLv2 protocol did not block disabled ciphers.

Note that the March 1st 2016 release also references following CVEs
that were fixed by us with CVE-2015-0293 in 2015:

- CVE-2016-0703 (bsc#968051): This issue only affected versions of
  OpenSSL prior to March 19th 2015 at which time the code was refactored
  to address vulnerability CVE-2015-0293. It would have made the above
  'DROWN' attack much easier.
- CVE-2016-0704 (bsc#968053): 'Bleichenbacher oracle in SSLv2'
  This issue only affected versions of OpenSSL prior to March 19th
  2015 at which time the code was refactored to address vulnerability
  CVE-2015-0293. It would have made the above 'DROWN' attack much easier.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-02"/>
	<updated date="2016-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/963415">SUSE bug 963415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968048">SUSE bug 968048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968053">SUSE bug 968053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968374">SUSE bug 968374</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3197">CVE-2015-3197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0702">CVE-2016-0702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0703/">CVE-2016-0703 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0703">CVE-2016-0703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0797">CVE-2016-0797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0799">CVE-2016-0799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0800">CVE-2016-0800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569638" comment="compat-openssl097g-0.9.7g-146.22.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569639" comment="compat-openssl097g-32bit-0.9.7g-146.22.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216608" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="976942" ref_url="https://bugzilla.suse.com/976942" source="BUGZILLA"/>
		<reference ref_id="976943" ref_url="https://bugzilla.suse.com/976943" source="BUGZILLA"/>
		<reference ref_id="977615" ref_url="https://bugzilla.suse.com/977615" source="BUGZILLA"/>
		<reference ref_id="977617" ref_url="https://bugzilla.suse.com/977617" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002040.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl097g fixes the following issues: 

Security issues fixed:
- CVE-2016-2108: Memory corruption in the ASN.1 encoder (bsc#977617)
- CVE-2016-2105: EVP_EncodeUpdate overflow (bsc#977614)
- CVE-2016-2106: EVP_EncryptUpdate overflow (bsc#977615)
- CVE-2016-2109: ASN.1 BIO excessive memory allocation (bsc#976942)

Bugs fixed:
- bsc#976943: Fix buffer overrun in ASN1_parse
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-04"/>
	<updated date="2016-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976943">SUSE bug 976943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977615">SUSE bug 977615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977617">SUSE bug 977617</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2105">CVE-2016-2105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2106">CVE-2016-2106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2108">CVE-2016-2108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2109">CVE-2016-2109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569640" comment="compat-openssl097g-0.9.7g-146.22.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569641" comment="compat-openssl097g-32bit-0.9.7g-146.22.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216609" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="982575" ref_url="https://bugzilla.suse.com/982575" source="BUGZILLA"/>
		<reference ref_id="993819" ref_url="https://bugzilla.suse.com/993819" source="BUGZILLA"/>
		<reference ref_id="995359" ref_url="https://bugzilla.suse.com/995359" source="BUGZILLA"/>
		<reference ref_id="995377" ref_url="https://bugzilla.suse.com/995377" source="BUGZILLA"/>
		<reference ref_id="999665" ref_url="https://bugzilla.suse.com/999665" source="BUGZILLA"/>
		<reference ref_id="999668" ref_url="https://bugzilla.suse.com/999668" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002335.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl097g fixes the following issues:

OpenSSL Security Advisory [22 Sep 2016] (bsc#999665)

Severity: Low
* Pointer arithmetic undefined behaviour (CVE-2016-2177) (bsc#982575)
* OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
* Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359)
* OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
* Certificate message OOB reads (CVE-2016-6306) (bsc#999668)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-14"/>
	<updated date="2016-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993819">SUSE bug 993819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995359">SUSE bug 995359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995377">SUSE bug 995377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999668">SUSE bug 999668</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2177">CVE-2016-2177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2182">CVE-2016-2182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6303">CVE-2016-6303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6306">CVE-2016-6306 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569642" comment="compat-openssl097g-0.9.7g-146.22.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569643" comment="compat-openssl097g-32bit-0.9.7g-146.22.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216610" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1000677" ref_url="https://bugzilla.suse.com/1000677" source="BUGZILLA"/>
		<reference ref_id="1001912" ref_url="https://bugzilla.suse.com/1001912" source="BUGZILLA"/>
		<reference ref_id="1004499" ref_url="https://bugzilla.suse.com/1004499" source="BUGZILLA"/>
		<reference ref_id="1005878" ref_url="https://bugzilla.suse.com/1005878" source="BUGZILLA"/>
		<reference ref_id="1021641" ref_url="https://bugzilla.suse.com/1021641" source="BUGZILLA"/>
		<reference ref_id="995075" ref_url="https://bugzilla.suse.com/995075" source="BUGZILLA"/>
		<reference ref_id="998190" ref_url="https://bugzilla.suse.com/998190" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002676.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl097g fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)

Security issues fixed:
- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)
- degrade 3DES to MEDIUM in SSL2 (bsc#1001912)
- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)

Bugs fixed:
- fix crash in openssl speed (bsc#1000677)
- resume reading from /dev/urandom when interrupted by a signal
  (bsc#995075)
- fix crash in print_notice (bsc#998190)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-03"/>
	<updated date="2017-03-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000677">SUSE bug 1000677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001912">SUSE bug 1001912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004499">SUSE bug 1004499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995075">SUSE bug 995075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998190">SUSE bug 998190</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2108">CVE-2016-2108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8610">CVE-2016-8610 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569644" comment="compat-openssl097g-0.9.7g-146.22.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569645" comment="compat-openssl097g-32bit-0.9.7g-146.22.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216611" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1065363" ref_url="https://bugzilla.suse.com/1065363" source="BUGZILLA"/>
		<reference ref_id="1087102" ref_url="https://bugzilla.suse.com/1087102" source="BUGZILLA"/>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2534-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182534-1.html" source="SUSE-SU"/>
		<description>
This update for compat-openssl097g fixes the following issues:

These security issues were fixed:

- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based
  ciphersuite a malicious server could have sent a very large prime value to the
  client. This caused the client to spend an unreasonably long period of time
  generating a key for this prime resulting in a hang until the client has
  finished. This could be exploited in a Denial Of Service attack (bsc#1097158)
- CVE-2018-0739: Constructed ASN.1 types with a recursive definition (such as
  can be found in PKCS7) could eventually exceed the stack given malicious input
  with excessive recursion. This could have resulted in DoS (bsc#1087102)

This non-security issue was fixed:

- Fixed crash in DES_fcrypt (bsc#1065363)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-28"/>
	<updated date="2018-08-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1065363">SUSE bug 1065363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087102">SUSE bug 1087102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0732">CVE-2018-0732 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0739">CVE-2018-0739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569646" comment="compat-openssl097g-0.9.7g-146.22.51.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569647" comment="compat-openssl097g-32bit-0.9.7g-146.22.51.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216612" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1110018" ref_url="https://bugzilla.suse.com/1110018" source="BUGZILLA"/>
		<reference ref_id="1113742" ref_url="https://bugzilla.suse.com/1113742" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004924.html" source="SUSE-SU"/>
		<description>
This update for compat-openssl097g fixes the following issues:

Security issue fixed:

- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).

Non-security issue fixed:

- Fixed timing vulnerability in DSA signature generation (bsc#1113742).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-06"/>
	<updated date="2018-12-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1110018">SUSE bug 1110018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113742">SUSE bug 1113742</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8610">CVE-2016-8610 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569648" comment="compat-openssl097g-0.9.7g-146.22.51.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569649" comment="compat-openssl097g-32bit-0.9.7g-146.22.51.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216613" version="1" class="patch">
	<metadata>
		<title>Security update for lighttpd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="932286" ref_url="https://bugzilla.suse.com/932286" source="BUGZILLA"/>
		<reference ref_id="981347" ref_url="https://bugzilla.suse.com/981347" source="BUGZILLA"/>
		<reference ref_id="990847" ref_url="https://bugzilla.suse.com/990847" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3200" ref_url="https://www.suse.com/security/cve/CVE-2015-3200/" source="CVE"/>
		<reference ref_id="CVE-2016-1000212" ref_url="https://www.suse.com/security/cve/CVE-2016-1000212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002711.html" source="SUSE-SU"/>
		<description>

This update for lighttpd fixes the following issues:

Security issues fixed:

- CVE-2016-1000212: Don't allow requests to set the HTTP_PROXY variable. As *CGI apps
  might pick it up and use it for outgoing requests. (bsc#990847)
- CVE-2015-3200: Log injection via malformed base64 string in Authentication header.
  (bsc#932286)

Bug fixes:

- Add su directive to logrotate file as the directory is owned by lighttpd. (bsc#981347)
- Fix out of bounds read in mod_scgi.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/932286">SUSE bug 932286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981347">SUSE bug 981347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990847">SUSE bug 990847</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3200/">CVE-2015-3200 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3200">CVE-2015-3200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000212/">CVE-2016-1000212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000212">CVE-2016-1000212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569650" comment="lighttpd-mod_cml-1.4.20-2.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569651" comment="lighttpd-mod_magnet-1.4.20-2.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569652" comment="lighttpd-mod_mysql_vhost-1.4.20-2.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569653" comment="lighttpd-mod_rrdtool-1.4.20-2.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569654" comment="lighttpd-mod_trigger_b4_dl-1.4.20-2.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569655" comment="lighttpd-mod_webdav-1.4.20-2.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216614" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager client tools</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="764532" ref_url="https://bugzilla.suse.com/764532" source="BUGZILLA"/>
		<reference ref_id="766148" ref_url="https://bugzilla.suse.com/766148" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2679" ref_url="https://www.suse.com/security/cve/CVE-2012-2679/" source="CVE"/>
		<description>

This update fixes the following issue:

    * support new function signature for image deployment.
    * fixed insecure permissions used for /var/log/rhncfg-actions file

Security Issue reference:

    * CVE-2012-2679
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2679&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-06-08"/>
	<updated date="2012-06-08"/>
	<bugzilla href="https://bugzilla.suse.com/764532">SUSE bug 764532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/766148">SUSE bug 766148</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2679/">CVE-2012-2679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2679">CVE-2012-2679 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569656" comment="rhn-virtualization-common-5.4.15-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569657" comment="rhn-virtualization-host-5.4.15-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569658" comment="rhncfg-5.9.33-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569659" comment="rhncfg-actions-5.9.33-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569660" comment="rhncfg-client-5.9.33-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569661" comment="rhncfg-management-5.9.33-0.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216615" version="1" class="patch">
	<metadata>
		<title>Security update for cobbler</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="672471" ref_url="https://bugzilla.suse.com/672471" source="BUGZILLA"/>
		<reference ref_id="678433" ref_url="https://bugzilla.suse.com/678433" source="BUGZILLA"/>
		<reference ref_id="682665" ref_url="https://bugzilla.suse.com/682665" source="BUGZILLA"/>
		<reference ref_id="687891" ref_url="https://bugzilla.suse.com/687891" source="BUGZILLA"/>
		<reference ref_id="757062" ref_url="https://bugzilla.suse.com/757062" source="BUGZILLA"/>
		<reference ref_id="763610" ref_url="https://bugzilla.suse.com/763610" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-4953" ref_url="https://www.suse.com/security/cve/CVE-2011-4953/" source="CVE"/>
		<reference ref_id="CVE-2012-2395" ref_url="https://www.suse.com/security/cve/CVE-2012-2395/" source="CVE"/>
		<description>

This update of cobbler fixes a remote code execution flaw which could have 
been exploited through cobbler's XMLRPC API (CVE-2012-2395).

Security Issue references:

    * CVE-2012-2395
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2395&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-06-04"/>
	<updated date="2012-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/672471">SUSE bug 672471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/678433">SUSE bug 678433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682665">SUSE bug 682665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/687891">SUSE bug 687891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757062">SUSE bug 757062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763610">SUSE bug 763610</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4953/">CVE-2011-4953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4953">CVE-2011-4953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2395/">CVE-2012-2395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2395">CVE-2012-2395 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569662" comment="koan-2.0.10-0.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216616" version="1" class="patch">
	<metadata>
		<title>YOU update for libzypp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="828672" ref_url="https://bugzilla.suse.com/828672" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-3704" ref_url="https://www.suse.com/security/cve/CVE-2013-3704/" source="CVE"/>
		<description>

libzypp did not handle multiple gpg pubkeys in the repomd.xml.key and 
content.key consistently and secure. Attackers could have exploited this to 
add their own keys and pretend it's from SUSE.

Security Issue reference:

    * CVE-2013-3704
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3704&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-25"/>
	<updated date="2013-09-25"/>
	<bugzilla href="https://bugzilla.suse.com/828672">SUSE bug 828672</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3704/">CVE-2013-3704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3704">CVE-2013-3704 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591535" comment="libzypp-6.39.0-0.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216617" version="1" class="patch">
	<metadata>
		<title>Security update for spacewalk</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="644072" ref_url="https://bugzilla.suse.com/644072" source="BUGZILLA"/>
		<reference ref_id="678130" ref_url="https://bugzilla.suse.com/678130" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-0718" ref_url="https://www.suse.com/security/cve/CVE-2011-0718/" source="CVE"/>
		<description>

This update adds the following two fixes:

    * Do not create ssh key in rpm %post script (bnc#678130)
    * the bootstrap script should force the installation of ORG_CA_CERT rpm
    * Set a time delay even after unsuccessful logins, which previously
      allowed a remote attacker to guess account names. CVE-2011-0718 has
      been assigned to this issue.

How to apply this update:

   1. 

      Log in as root user to the SUSE Manager server.

   2. 

      Stop the Spacewalk service:
      spacewalk-service stop

   3. 

      Apply the patch using either zypper patch or YaST Online Update.

   4. 

      Start the Spacewalk service:
      spacewalk-service start

Security Issue reference:

    * CVE-2011-0718
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0718&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-03-11"/>
	<updated date="2011-03-11"/>
	<bugzilla href="https://bugzilla.suse.com/644072">SUSE bug 644072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/678130">SUSE bug 678130</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0718/">CVE-2011-0718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0718">CVE-2011-0718 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569663" comment="rhnmd-5.3.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569664" comment="spacewalk-backend-libs-1.2.74-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569665" comment="spacewalk-certs-tools-1.2.2-0.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216618" version="1" class="patch">
	<metadata>
		<title>Security update for spacewalk</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="644072" ref_url="https://bugzilla.suse.com/644072" source="BUGZILLA"/>
		<reference ref_id="644080" ref_url="https://bugzilla.suse.com/644080" source="BUGZILLA"/>
		<reference ref_id="674315" ref_url="https://bugzilla.suse.com/674315" source="BUGZILLA"/>
		<reference ref_id="674344" ref_url="https://bugzilla.suse.com/674344" source="BUGZILLA"/>
		<reference ref_id="675021" ref_url="https://bugzilla.suse.com/675021" source="BUGZILLA"/>
		<reference ref_id="676677" ref_url="https://bugzilla.suse.com/676677" source="BUGZILLA"/>
		<reference ref_id="676699" ref_url="https://bugzilla.suse.com/676699" source="BUGZILLA"/>
		<reference ref_id="676718" ref_url="https://bugzilla.suse.com/676718" source="BUGZILLA"/>
		<reference ref_id="678126" ref_url="https://bugzilla.suse.com/678126" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-0717" ref_url="https://www.suse.com/security/cve/CVE-2011-0717/" source="CVE"/>
		<reference ref_id="CVE-2011-0718" ref_url="https://www.suse.com/security/cve/CVE-2011-0718/" source="CVE"/>
		<description>

This update fixes the following bugs in the web user interface:

    * link the local documentation instead of the online versions
    * Leave out the proxy version check
    * fix navigation on the help page
    * shorten the action name before writing them to the database
    * Fix session handling. A SUSE Manager user able to pre-set the session
      cookie in a victim's browser to a valid value could use this flaw to
      hijack the victim's session after the next log in. (CVE-2011-0717)
    * Set a time delay even after unsuccessful logins, which previously
      allowed a remote attacker to guess account names (CVE-2011-0718).
    * Add missing dependencies

How to apply this update:

   1. 

      Log in as root user to the SUSE Manager server.

   2. 

      Stop the Spacewalk service:
      spacewalk-service stop

   3. 

      Apply the patch using either zypper patch or YaST Online Update.

   4. 

      Start the Spacewalk service:
      spacewalk-service start

Security Issue reference:

    * CVE-2011-0718
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0718&gt;
    * CVE-2011-0717
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0717&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-03-22"/>
	<updated date="2011-03-22"/>
	<bugzilla href="https://bugzilla.suse.com/644072">SUSE bug 644072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/644080">SUSE bug 644080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/674315">SUSE bug 674315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/674344">SUSE bug 674344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/675021">SUSE bug 675021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/676677">SUSE bug 676677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/676699">SUSE bug 676699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/676718">SUSE bug 676718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/678126">SUSE bug 678126</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0717/">CVE-2011-0717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0717">CVE-2011-0717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0718/">CVE-2011-0718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0718">CVE-2011-0718 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569666" comment="spacewalk-backend-libs-1.2.74-0.22.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216619" version="1" class="patch">
	<metadata>
		<title>Recommended update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1008933" ref_url="https://bugzilla.suse.com/1008933" source="BUGZILLA"/>
		<reference ref_id="1009435" ref_url="https://bugzilla.suse.com/1009435" source="BUGZILLA"/>
		<reference ref_id="1009677" ref_url="https://bugzilla.suse.com/1009677" source="BUGZILLA"/>
		<reference ref_id="1012398" ref_url="https://bugzilla.suse.com/1012398" source="BUGZILLA"/>
		<reference ref_id="1013002" ref_url="https://bugzilla.suse.com/1013002" source="BUGZILLA"/>
		<reference ref_id="967818" ref_url="https://bugzilla.suse.com/967818" source="BUGZILLA"/>
		<reference ref_id="980752" ref_url="https://bugzilla.suse.com/980752" source="BUGZILLA"/>
		<reference ref_id="995764" ref_url="https://bugzilla.suse.com/995764" source="BUGZILLA"/>
		<reference ref_id="996609" ref_url="https://bugzilla.suse.com/996609" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9639" ref_url="https://www.suse.com/security/cve/CVE-2016-9639/" source="CVE"/>
		<reference ref_id="SUSE-RU-2017:0174-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2017-January/005788.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

osad:

- Fix logfile option for osa-dispatcher. (bsc#980752)

salt:

- Update to 2015.8.12
- Add pre-require to salt for minions.
- Do not restart salt-minion in salt package.
- Add try-restart to sys-v init scripts.
- Add 'Restart=on-failure' for salt-minion systemd service.
- Various fixes for signal handling.
- Successfully exit of salt-api child processes when SIGTERM is received.
- Re-introduce 'KillMode=process' for salt-minion systemd service.
- Fix setting default timezone. (bsc#1008933)
- Fix possible information leak due to revoked keys still being used. (bsc#1012398, CVE-2016-9639)

spacewalk-backend:

- Handle non-unique machine_id after migrate from 2.1. (bsc#1013002)
- Refer to scc.suse.com instead of bugzilla.novell.com in case of problem. (bsc#967818)
- Fix selection of primary interface. (bsc#1009677)
- Add link from satellite-sync to mgr-inter-sync man page. (bsc#1009435)
- Reposync: Assign orphaned vendor packages to the default org. (bsc#995764)
- Add missing reference for bsc#996609

supportutils-plugin-susemanager-client:

- Include correct configuration file in the supportconfig.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-17"/>
	<updated date="2017-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1008933">SUSE bug 1008933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009435">SUSE bug 1009435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009677">SUSE bug 1009677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012398">SUSE bug 1012398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013002">SUSE bug 1013002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967818">SUSE bug 967818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980752">SUSE bug 980752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995764">SUSE bug 995764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996609">SUSE bug 996609</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9639/">CVE-2016-9639 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9639">CVE-2016-9639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594223" comment="osa-common-5.11.64.3-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594224" comment="osad-5.11.64.3-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594225" comment="salt-2015.8.12-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594226" comment="salt-doc-2015.8.12-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594227" comment="salt-minion-2015.8.12-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594228" comment="spacewalk-backend-libs-2.5.24.7-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594229" comment="supportutils-plugin-susemanager-client-3.0.5-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216620" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1023233" ref_url="https://bugzilla.suse.com/1023233" source="BUGZILLA"/>
		<reference ref_id="1024406" ref_url="https://bugzilla.suse.com/1024406" source="BUGZILLA"/>
		<reference ref_id="1024714" ref_url="https://bugzilla.suse.com/1024714" source="BUGZILLA"/>
		<reference ref_id="1025312" ref_url="https://bugzilla.suse.com/1025312" source="BUGZILLA"/>
		<reference ref_id="1026633" ref_url="https://bugzilla.suse.com/1026633" source="BUGZILLA"/>
		<reference ref_id="1027426" ref_url="https://bugzilla.suse.com/1027426" source="BUGZILLA"/>
		<reference ref_id="1029755" ref_url="https://bugzilla.suse.com/1029755" source="BUGZILLA"/>
		<reference ref_id="1031667" ref_url="https://bugzilla.suse.com/1031667" source="BUGZILLA"/>
		<reference ref_id="1032256" ref_url="https://bugzilla.suse.com/1032256" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7470" ref_url="https://www.suse.com/security/cve/CVE-2017-7470/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002898.html" source="SUSE-SU"/>
		<description>

The following security issue in spacewalk-backend has been fixed:

- Non admin or disabled user cannot make changes to a system anymore using spacewalk-channel.
  (bsc#1026633, CVE-2017-7470)

Additionally, the following non-security issues have been fixed:

rhnlib:

- Support all TLS versions in rpclib. (bsc#1025312)

spacecmd:

- Improve output on error for listrepo. (bsc#1027426)
- Reword spacecmd removal message. (bsc#1024406)

spacewalk-backend:

- Do not fail with traceback when media.1 does not exist. (bsc#1032256)
- Create scap files directory beforehand. (bsc#1029755)
- Fix error if SPACEWALK_DEBUG_NO_REPORTS environment variable is not present.
- Don't skip 'rhnErrataPackage' cleanup during an errata update. (bsc#1023233)
- Add support for running spacewalk-debug without creating reports. (bsc#1024714)
- Set scap store directory mod to 775 and group owner to susemanager.
- incomplete_package_import: Do import rhnPackageFile as it breaks some package installations.
- Added traceback printing to the exception block.
- Change postgresql starting commands.

spacewalk-client-tools:

- Fix reboot message to use correct product name. (bsc#1031667)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-19"/>
	<updated date="2017-05-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023233">SUSE bug 1023233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024406">SUSE bug 1024406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024714">SUSE bug 1024714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025312">SUSE bug 1025312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026633">SUSE bug 1026633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027426">SUSE bug 1027426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029755">SUSE bug 1029755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031667">SUSE bug 1031667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032256">SUSE bug 1032256</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7470/">CVE-2017-7470 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7470">CVE-2017-7470 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569667" comment="rhnlib-2.5.84.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569668" comment="spacecmd-2.5.5.5-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569669" comment="spacewalk-backend-libs-2.5.24.9-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569670" comment="spacewalk-check-2.5.13.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569671" comment="spacewalk-client-setup-2.5.13.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569672" comment="spacewalk-client-tools-2.5.13.8-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216621" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1103696" ref_url="https://bugzilla.suse.com/1103696" source="BUGZILLA"/>
		<reference ref_id="1104034" ref_url="https://bugzilla.suse.com/1104034" source="BUGZILLA"/>
		<reference ref_id="1130040" ref_url="https://bugzilla.suse.com/1130040" source="BUGZILLA"/>
		<reference ref_id="1135881" ref_url="https://bugzilla.suse.com/1135881" source="BUGZILLA"/>
		<reference ref_id="1136029" ref_url="https://bugzilla.suse.com/1136029" source="BUGZILLA"/>
		<reference ref_id="1136480" ref_url="https://bugzilla.suse.com/1136480" source="BUGZILLA"/>
		<reference ref_id="1137715" ref_url="https://bugzilla.suse.com/1137715" source="BUGZILLA"/>
		<reference ref_id="1137940" ref_url="https://bugzilla.suse.com/1137940" source="BUGZILLA"/>
		<reference ref_id="1138313" ref_url="https://bugzilla.suse.com/1138313" source="BUGZILLA"/>
		<reference ref_id="1138358" ref_url="https://bugzilla.suse.com/1138358" source="BUGZILLA"/>
		<reference ref_id="1138494" ref_url="https://bugzilla.suse.com/1138494" source="BUGZILLA"/>
		<reference ref_id="1138822" ref_url="https://bugzilla.suse.com/1138822" source="BUGZILLA"/>
		<reference ref_id="1139453" ref_url="https://bugzilla.suse.com/1139453" source="BUGZILLA"/>
		<reference ref_id="1142038" ref_url="https://bugzilla.suse.com/1142038" source="BUGZILLA"/>
		<reference ref_id="1143856" ref_url="https://bugzilla.suse.com/1143856" source="BUGZILLA"/>
		<reference ref_id="1144155" ref_url="https://bugzilla.suse.com/1144155" source="BUGZILLA"/>
		<reference ref_id="1144889" ref_url="https://bugzilla.suse.com/1144889" source="BUGZILLA"/>
		<reference ref_id="1148125" ref_url="https://bugzilla.suse.com/1148125" source="BUGZILLA"/>
		<reference ref_id="1148177" ref_url="https://bugzilla.suse.com/1148177" source="BUGZILLA"/>
		<reference ref_id="1148311" ref_url="https://bugzilla.suse.com/1148311" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10136" ref_url="https://www.suse.com/security/cve/CVE-2019-10136/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005884.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

mgr-cfg:

- Ensure bytes type when using hashlib to avoid traceback (bsc#1138822)

mgr-daemon:

- Fix systemd timer configuration on SLE12 (bsc#1142038)

mgr-osad:

- Fix obsolete for old osad packages, to allow installing mgr-osad
  even by using osad at yum/zyppper install (bsc#1139453)
- Ensure bytes type when using hashlib to avoid traceback (bsc#1138822)

mgr-virtualization:

- Fix missing python 3 ugettext (bsc#1138494)
- Fix package dependencies to prevent file conflict (bsc#1143856)

rhnlib:

- Add SNI support for clients
- Fix initialize ssl connection (bsc#1144155)
- Fix bootstrapping SLE11SP4 trad client with SSL enabled (bsc#1148177)
    
python-gzipstream:

- SPEC cleanup
- add makefile and pylint configuration
- Add Uyuni URL to package
- Bump version to 4.0.0 (bsc#1104034)
- Fix copyright for the package specfile (bsc#1103696)

spacecmd:

- Bugfix: referenced variable before assignment.
- Bugfix: 'dict' object has no attribute 'iteritems' (bsc#1135881)
- Add unit tests for custominfo, snippet, scap, ssm, cryptokey and distribution
- Fix missing runtime dependencies that made spacecmd return old versions of
  packages in some cases, even if newer ones were available (bsc#1148311)


spacewalk-backend:

- Do not overwrite comps and module data with older versions
- Fix issue with 'dists' keyword in url hostname
- Import packages from all collections of a patch not just first one
- Ensure bytes type when using hashlib to avoid traceback
  on XMLRPC call to 'registration.register_osad' (bsc#1138822)
- Do not duplicate 'http://' protocol when using proxies with 'deb'
  repositories (bsc#1138313)
- Fix reposync when dealing with RedHat CDN (bsc#1138358)
- Fix for CVE-2019-10136. An attacker with a valid, but expired,
  authenticated set of headers could move some digits around,
  artificially extending the session validity without modifying
  the checksum. (bsc#1136480)
- Prevent FileNotFoundError: repomd.xml.key traceback (bsc#1137940)
- Add journalctl output to spacewalk-debug tarballs
- Prevent unnecessary triggering of channel-repodata tasks when GPG
  signing is disabled (bsc#1137715)
- Fix spacewalk-repo-sync for Ubuntu repositories in mirror case (bsc#1136029)
- Add support for ULN repositories on new Zypper based reposync.
- Don't skip Deb package tags on package import (bsc#1130040)
- For backend-libs subpackages, exclude files for the server
  (already part of spacewalk-backend) to avoid conflicts (bsc#1148125)
- prevent duplicate key violates on repo-sync with long changelog
  entries (bsc#1144889)

spacewalk-remote-utils:

- Add RHEL8

		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-05"/>
	<updated date="2019-09-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103696">SUSE bug 1103696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104034">SUSE bug 1104034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130040">SUSE bug 1130040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135881">SUSE bug 1135881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136029">SUSE bug 1136029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136480">SUSE bug 1136480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137715">SUSE bug 1137715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137940">SUSE bug 1137940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138313">SUSE bug 1138313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138358">SUSE bug 1138358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138494">SUSE bug 1138494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138822">SUSE bug 1138822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139453">SUSE bug 1139453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142038">SUSE bug 1142038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143856">SUSE bug 1143856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144155">SUSE bug 1144155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144889">SUSE bug 1144889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148125">SUSE bug 1148125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148177">SUSE bug 1148177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148311">SUSE bug 1148311</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10136/">CVE-2019-10136 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10136">CVE-2019-10136 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569673" comment="mgr-cfg-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569674" comment="mgr-cfg-actions-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569675" comment="mgr-cfg-client-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569676" comment="mgr-cfg-management-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569677" comment="mgr-daemon-4.0.7-5.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569678" comment="mgr-osad-4.0.9-5.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569679" comment="mgr-virtualization-host-4.0.8-5.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569680" comment="python2-mgr-cfg-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569681" comment="python2-mgr-cfg-actions-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569682" comment="python2-mgr-cfg-client-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569683" comment="python2-mgr-cfg-management-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569684" comment="python2-mgr-osa-common-4.0.9-5.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569685" comment="python2-mgr-osad-4.0.9-5.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569686" comment="python2-mgr-virtualization-common-4.0.8-5.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569687" comment="python2-mgr-virtualization-host-4.0.8-5.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569688" comment="python2-rhnlib-4.0.11-12.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569689" comment="spacecmd-4.0.14-18.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569690" comment="spacewalk-backend-libs-4.0.25-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569691" comment="spacewalk-remote-utils-4.0.5-6.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216622" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1167907" ref_url="https://bugzilla.suse.com/1167907" source="BUGZILLA"/>
		<reference ref_id="1169664" ref_url="https://bugzilla.suse.com/1169664" source="BUGZILLA"/>
		<reference ref_id="1176978" ref_url="https://bugzilla.suse.com/1176978" source="BUGZILLA"/>
		<reference ref_id="1178319" ref_url="https://bugzilla.suse.com/1178319" source="BUGZILLA"/>
		<reference ref_id="1178361" ref_url="https://bugzilla.suse.com/1178361" source="BUGZILLA"/>
		<reference ref_id="1178362" ref_url="https://bugzilla.suse.com/1178362" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16846" ref_url="https://www.suse.com/security/cve/CVE-2020-16846/" source="CVE"/>
		<reference ref_id="CVE-2020-17490" ref_url="https://www.suse.com/security/cve/CVE-2020-17490/" source="CVE"/>
		<reference ref_id="CVE-2020-25592" ref_url="https://www.suse.com/security/cve/CVE-2020-25592/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007715.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

cobbler:

- Fix parsing cobbler dictionary options with values containing '=', e.g. kernel params containing '=' (bsc#1176978)

mgr-daemon:

- Update translation strings

salt:

- Properly validate eauth credentials and tokens on SSH calls made by Salt API 
  (bsc#1178319, bsc#1178362, bsc#1178361, CVE-2020-25592, CVE-2020-17490, CVE-2020-16846)

spacecmd:

- Python3 fixes for errata in spacecmd (bsc#1169664)
- Added support for i18n of user-facing strings
- Python3 fix for sorted usage (bsc#1167907)

spacewalk-client-tools:

- Remove RH references in Python/Ruby localization and use the product name instead

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-06"/>
	<updated date="2020-11-06"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1167907">SUSE bug 1167907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169664">SUSE bug 1169664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176978">SUSE bug 1176978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178319">SUSE bug 1178319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178361">SUSE bug 1178361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178362">SUSE bug 1178362</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16846/">CVE-2020-16846 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16846">CVE-2020-16846 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17490/">CVE-2020-17490 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17490">CVE-2020-17490 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25592/">CVE-2020-25592 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25592">CVE-2020-25592 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569692" comment="koan-2.2.2-0.68.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569693" comment="mgr-daemon-4.1.3-5.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569694" comment="python2-spacewalk-check-4.1.7-27.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569695" comment="python2-spacewalk-client-setup-4.1.7-27.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569696" comment="python2-spacewalk-client-tools-4.1.7-27.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569697" comment="salt-2016.11.10-43.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569698" comment="salt-doc-2016.11.10-43.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569699" comment="salt-minion-2016.11.10-43.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569700" comment="spacecmd-4.1.8-18.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569701" comment="spacewalk-check-4.1.7-27.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569702" comment="spacewalk-client-setup-4.1.7-27.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569703" comment="spacewalk-client-tools-4.1.7-27.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216623" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1173557" ref_url="https://bugzilla.suse.com/1173557" source="BUGZILLA"/>
		<reference ref_id="1177884" ref_url="https://bugzilla.suse.com/1177884" source="BUGZILLA"/>
		<reference ref_id="1177928" ref_url="https://bugzilla.suse.com/1177928" source="BUGZILLA"/>
		<reference ref_id="1180583" ref_url="https://bugzilla.suse.com/1180583" source="BUGZILLA"/>
		<reference ref_id="1180584" ref_url="https://bugzilla.suse.com/1180584" source="BUGZILLA"/>
		<reference ref_id="1180585" ref_url="https://bugzilla.suse.com/1180585" source="BUGZILLA"/>
		<reference ref_id="1185178" ref_url="https://bugzilla.suse.com/1185178" source="BUGZILLA"/>
		<reference ref_id="1185281" ref_url="https://bugzilla.suse.com/1185281" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31607" ref_url="https://www.suse.com/security/cve/CVE-2021-31607/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009060.html" source="SUSE-SU"/>
		<description>
This update fixes the following issues:

golang-github-wrouesnel-postgres_exporter:

- Add support for aarch64

mgr-cfg:

- SPEC: Updated Python definitions for RHEL8 and quoted text comparisons.

mgr-custom-info:

- Update package version to 4.2.0

mgr-daemon:

- Update translation strings
- Update the translations from weblate
- Added quotes around %{_vendor} token for the if statements in spec file.
- Fix removal of mgr-deamon with selinux enabled (bsc#1177928)
- Updating translations from weblate

mgr-osad:

- Change the log file permissions as expected by logrotate (bsc#1177884)
- Change deprecated path /var/run into /run for systemd (bsc#1185178)
- Python fixes
- Removal of RHEL5

mgr-push:

- Defined __python for python2.
- Excluded RHEL8 for Python 2 build.

mgr-virtualization:

- Update package version to 4.2.0

rhnlib:

- Update package version to 4.2.0

salt:

- Prevent command injection in the snapper module (bsc#1185281) (CVE-2021-31607)

spacecmd:

- Rename system migration to system transfer
- Rename SP to product migration
- Update translation strings
- Add group_addconfigchannel and group_removeconfigchannel
- Add group_listconfigchannels and configchannel_listgroups
- Fix spacecmd compat with Python 3
- Deprecated 'Software Crashes' feature
- Document advanced package search on '--help' (bsc#1180583)
- Fixed advanced search on 'package_listinstalledsystems'
- Fixed duplicate results when using multiple search criteria (bsc#1180585)
- Fixed 'non-advanced' package search when using multiple package names (bsc#1180584)
- Update translations
- Fix: make spacecmd build on Debian
- Add Service Pack migration operations (bsc#1173557)

spacewalk-client-tools:

- Update the translations from weblate
- Drop the --noSSLServerURL option
- Updated RHEL Python requirements.
- Added quotes around %{_vendor}.

spacewalk-koan:

- Fix for spacewalk-koan test

spacewalk-oscap:

- Update package version to 4.2.0

spacewalk-remote-utils:

- Update package version to 4.2.0

supportutils-plugin-susemanager-client:

- Update package version to 4.2.0

suseRegisterInfo:

- Add support for Amazon Linux 2
- Add support for Alibaba Cloud Linux 2
- Adapted for RHEL build.

uyuni-base:
- Added Apache as prerequisite for RHEL and Fedora (due to required users).
- Removed RHEL specific folder rights from SPEC file.
- Added RHEL8 compatibility.

uyuni-common-libs:

- Cleaning up unused Python 2 build leftovers.
- Disabled debug package build.

		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-21"/>
	<updated date="2021-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173557">SUSE bug 1173557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177884">SUSE bug 1177884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177928">SUSE bug 1177928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180583">SUSE bug 1180583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180584">SUSE bug 1180584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180585">SUSE bug 1180585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185178">SUSE bug 1185178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185281">SUSE bug 1185281</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31607/">CVE-2021-31607 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31607">CVE-2021-31607 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569704" comment="golang-github-wrouesnel-postgres_exporter-0.4.7-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569705" comment="mgr-cfg-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569706" comment="mgr-cfg-actions-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569707" comment="mgr-cfg-client-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569708" comment="mgr-cfg-management-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569709" comment="mgr-custom-info-4.2.1-5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569710" comment="mgr-daemon-4.2.7-5.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569711" comment="mgr-osad-4.2.5-5.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569712" comment="mgr-push-4.2.2-5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569713" comment="mgr-virtualization-host-4.2.1-5.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569714" comment="python2-mgr-cfg-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569715" comment="python2-mgr-cfg-actions-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569716" comment="python2-mgr-cfg-client-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569717" comment="python2-mgr-cfg-management-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569718" comment="python2-mgr-osa-common-4.2.5-5.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569719" comment="python2-mgr-osad-4.2.5-5.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569720" comment="python2-mgr-push-4.2.2-5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569721" comment="python2-mgr-virtualization-common-4.2.1-5.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569722" comment="python2-mgr-virtualization-host-4.2.1-5.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569723" comment="python2-rhnlib-4.2.3-12.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569724" comment="python2-spacewalk-check-4.2.10-27.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569725" comment="python2-spacewalk-client-setup-4.2.10-27.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569726" comment="python2-spacewalk-client-tools-4.2.10-27.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569727" comment="python2-spacewalk-koan-4.2.3-9.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569728" comment="python2-spacewalk-oscap-4.2.1-6.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569729" comment="python2-suseRegisterInfo-4.2.3-6.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569730" comment="python2-uyuni-common-libs-4.2.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569731" comment="salt-2016.11.10-43.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569732" comment="salt-doc-2016.11.10-43.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569733" comment="salt-minion-2016.11.10-43.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569734" comment="spacecmd-4.2.8-18.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569735" comment="spacewalk-check-4.2.10-27.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569736" comment="spacewalk-client-setup-4.2.10-27.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569737" comment="spacewalk-client-tools-4.2.10-27.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569738" comment="spacewalk-koan-4.2.3-9.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569739" comment="spacewalk-oscap-4.2.1-6.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569740" comment="spacewalk-remote-utils-4.2.1-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569741" comment="supportutils-plugin-susemanager-client-4.2.2-9.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569742" comment="suseRegisterInfo-4.2.3-6.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216624" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1181223" ref_url="https://bugzilla.suse.com/1181223" source="BUGZILLA"/>
		<reference ref_id="1188977" ref_url="https://bugzilla.suse.com/1188977" source="BUGZILLA"/>
		<reference ref_id="1190265" ref_url="https://bugzilla.suse.com/1190265" source="BUGZILLA"/>
		<reference ref_id="1190512" ref_url="https://bugzilla.suse.com/1190512" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21996" ref_url="https://www.suse.com/security/cve/CVE-2021-21996/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009670.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

salt:

- Exclude the full path of a download URL to prevent injection of
  malicious code (bsc#1190265) (CVE-2021-21996)

spacecmd:

- Version 4.2.13-1
  * Update translation strings
  * configchannel_updatefile handles directory properly (bsc#1190512)
  * Add schedule_archivecompleted to mass archive actions (bsc#1181223)
  * Remove whoami from the list of unauthenticated commands (bsc#1188977)

spacewalk-client-tools:

- Version 4.2.14-1
  * Update translation strings

		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-27"/>
	<updated date="2021-10-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181223">SUSE bug 1181223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188977">SUSE bug 1188977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190265">SUSE bug 1190265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190512">SUSE bug 1190512</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-21996/">CVE-2021-21996 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21996">CVE-2021-21996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651453" comment="python2-spacewalk-check-4.2.14-27.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651454" comment="python2-spacewalk-client-setup-4.2.14-27.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651455" comment="python2-spacewalk-client-tools-4.2.14-27.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651456" comment="salt-2016.11.10-43.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651457" comment="salt-doc-2016.11.10-43.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651458" comment="salt-minion-2016.11.10-43.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651459" comment="spacecmd-4.2.13-18.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651460" comment="spacewalk-check-4.2.14-27.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651461" comment="spacewalk-client-setup-4.2.14-27.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651462" comment="spacewalk-client-tools-4.2.14-27.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216625" version="1" class="patch">
	<metadata>
		<title>Security update for cobbler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1074594" ref_url="https://bugzilla.suse.com/1074594" source="BUGZILLA"/>
		<reference ref_id="1090205" ref_url="https://bugzilla.suse.com/1090205" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000469" ref_url="https://www.suse.com/security/cve/CVE-2017-1000469/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004198.html" source="SUSE-SU"/>
		<description>
This update for cobbler fixes the following issues:

- CVE-2017-1000469: Escape shell parameters provided by the user for the reposync action. (bsc#1074594)
- Fix for calling koan with virt_type kvm. (bsc#1090205)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-19"/>
	<updated date="2018-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074594">SUSE bug 1074594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090205">SUSE bug 1090205</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000469/">CVE-2017-1000469 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000469">CVE-2017-1000469 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569743" comment="koan-2.2.2-0.68.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216626" version="1" class="patch">
	<metadata>
		<title>Security update for cobbler (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1104189" ref_url="https://bugzilla.suse.com/1104189" source="BUGZILLA"/>
		<reference ref_id="1104287" ref_url="https://bugzilla.suse.com/1104287" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10931" ref_url="https://www.suse.com/security/cve/CVE-2018-10931/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004506.html" source="SUSE-SU"/>
		<description>
This update for cobbler fixes the following issues:

Security issue fixed:

- CVE-2018-10931: Forbid exposure of private methods in the API (bsc#1104287, bsc#1104189)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-29"/>
	<updated date="2018-08-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104189">SUSE bug 1104189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104287">SUSE bug 1104287</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10931/">CVE-2018-10931 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10931">CVE-2018-10931 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569744" comment="koan-2.2.2-0.68.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216627" version="1" class="patch">
	<metadata>
		<title>Security update for cobbler (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1193671" ref_url="https://bugzilla.suse.com/1193671" source="BUGZILLA"/>
		<reference ref_id="1195906" ref_url="https://bugzilla.suse.com/1195906" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45083" ref_url="https://www.suse.com/security/cve/CVE-2021-45083/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010255.html" source="SUSE-SU"/>
		<description>
This update for cobbler fixes the following issues:

- CVE-2021-45083: Fixed unsafe permissions on sensitive files (bsc#1193671).

The following non-security bugs were fixed:

- Move configuration files ownership to apache (bsc#1195906)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193671">SUSE bug 1193671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195906">SUSE bug 1195906</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-45083/">CVE-2021-45083 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45083">CVE-2021-45083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668399" comment="koan-2.2.2-0.68.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216628" version="1" class="patch">
	<metadata>
		<title>Security update for python-Jinja2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1181944" ref_url="https://bugzilla.suse.com/1181944" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28493" ref_url="https://www.suse.com/security/cve/CVE-2020-28493/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008377.html" source="SUSE-SU"/>
		<description>
This update for python-Jinja2 fixes the following issues:

- CVE-2020-28493: Improve the speed of the 'urlize' filter by reducing regex
    backtracking. Email matching requires a word character at the start of the
    domain part, and only word characters in the TLD. (bsc#1181944)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-25"/>
	<updated date="2021-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181944">SUSE bug 1181944</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28493/">CVE-2020-28493 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28493">CVE-2020-28493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562788" comment="python-Jinja2-2.6-2.19.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216629" version="1" class="patch">
	<metadata>
		<title>Security update for python-pycrypto (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1017420" ref_url="https://bugzilla.suse.com/1017420" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7459" ref_url="https://www.suse.com/security/cve/CVE-2013-7459/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1744-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SKY7WCHFWKRKAW7PBKT42PXBLVRNISRR/#SKY7WCHFWKRKAW7PBKT42PXBLVRNISRR" source="SUSE-SU"/>
		<description>
This update for python-pycrypto fixes the following issues:

- CVE-2013-7459: Fixed a potential heap buffer overflow in ALGnew (bsc#1017420).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-30"/>
	<updated date="2017-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1017420">SUSE bug 1017420</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7459/">CVE-2013-7459 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7459">CVE-2013-7459 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569745" comment="python-pycrypto-2.6.1-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216630" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1051948" ref_url="https://bugzilla.suse.com/1051948" source="BUGZILLA"/>
		<reference ref_id="1052264" ref_url="https://bugzilla.suse.com/1052264" source="BUGZILLA"/>
		<reference ref_id="1053376" ref_url="https://bugzilla.suse.com/1053376" source="BUGZILLA"/>
		<reference ref_id="1053955" ref_url="https://bugzilla.suse.com/1053955" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12791" ref_url="https://www.suse.com/security/cve/CVE-2017-12791/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003279.html" source="SUSE-SU"/>
		<description>
This update for salt fixes one security issue and bugs.

The following security issue has been fixed:

- CVE-2017-12791: Directory traversal vulnerability in minion id validation
  allowed remote minions with incorrect credentials to authenticate to a master
  via a crafted minion ID (bsc#1053955).

Additionally, the following non-security issues have been fixed:

- Added support for SUSE Manager scalability features. (bsc#1052264)
- Introduced the kubernetes module. (bsc#1051948)
- Notify systemd synchronously via NOTIFY_SOCKET. (bsc#1053376)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-09"/>
	<updated date="2017-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1051948">SUSE bug 1051948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052264">SUSE bug 1052264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053376">SUSE bug 1053376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053955">SUSE bug 1053955</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12791/">CVE-2017-12791 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12791">CVE-2017-12791 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569746" comment="salt-2016.11.4-43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569747" comment="salt-doc-2016.11.4-43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569748" comment="salt-minion-2016.11.4-43.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216631" version="1" class="patch">
	<metadata>
		<title>Security update for Salt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1041993" ref_url="https://bugzilla.suse.com/1041993" source="BUGZILLA"/>
		<reference ref_id="1042749" ref_url="https://bugzilla.suse.com/1042749" source="BUGZILLA"/>
		<reference ref_id="1050003" ref_url="https://bugzilla.suse.com/1050003" source="BUGZILLA"/>
		<reference ref_id="1059291" ref_url="https://bugzilla.suse.com/1059291" source="BUGZILLA"/>
		<reference ref_id="1059758" ref_url="https://bugzilla.suse.com/1059758" source="BUGZILLA"/>
		<reference ref_id="1060230" ref_url="https://bugzilla.suse.com/1060230" source="BUGZILLA"/>
		<reference ref_id="1062462" ref_url="https://bugzilla.suse.com/1062462" source="BUGZILLA"/>
		<reference ref_id="1062464" ref_url="https://bugzilla.suse.com/1062464" source="BUGZILLA"/>
		<reference ref_id="985112" ref_url="https://bugzilla.suse.com/985112" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14695" ref_url="https://www.suse.com/security/cve/CVE-2017-14695/" source="CVE"/>
		<reference ref_id="CVE-2017-14696" ref_url="https://www.suse.com/security/cve/CVE-2017-14696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003543.html" source="SUSE-SU"/>
		<description>
This update for salt fixes one security issue and bugs.

The following security issues have been fixed:

- CVE-2017-14695: A directory traversal vulnerability in minion id validation allowed remote minions with incorrect
  credentials to authenticate to a master via a crafted minion ID. (bsc#1062462)
- CVE-2017-14696: It was possible to force a remote Denial of Service with a specially crafted authentication 
  request. (bsc#1062464)

Additionally, the following non-security issues have been fixed:

- Removed deprecation warning for beacon configuration using dictionaries. (bsc#1041993)
- Fixed beacons failure when pillar-based suppressing config-based. (bsc#1060230)
- Fixed minion resource exhaustion when many functions are being executed in parallel. (bsc#1059758)
- Remove 'TasksTask' attribute from salt-master.service in older versions of systemd. (bsc#985112)
- Fix for delete_deployment in Kubernetes module. (bsc#1059291)
- Catching error when PIDfile cannot be deleted. (bsc#1050003)
- Use $HOME to get the user home directory instead using '~' char. (bsc#1042749)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-20"/>
	<updated date="2017-12-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1041993">SUSE bug 1041993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042749">SUSE bug 1042749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050003">SUSE bug 1050003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059291">SUSE bug 1059291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059758">SUSE bug 1059758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060230">SUSE bug 1060230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062462">SUSE bug 1062462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062464">SUSE bug 1062464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985112">SUSE bug 985112</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14695/">CVE-2017-14695 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14695">CVE-2017-14695 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14696/">CVE-2017-14696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14696">CVE-2017-14696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569749" comment="salt-2016.11.4-43.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569750" comment="salt-doc-2016.11.4-43.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569751" comment="salt-minion-2016.11.4-43.10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216632" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1113698" ref_url="https://bugzilla.suse.com/1113698" source="BUGZILLA"/>
		<reference ref_id="1113699" ref_url="https://bugzilla.suse.com/1113699" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15750" ref_url="https://www.suse.com/security/cve/CVE-2018-15750/" source="CVE"/>
		<reference ref_id="CVE-2018-15751" ref_url="https://www.suse.com/security/cve/CVE-2018-15751/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004866.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

Salt was updated to version 2016.11.10 and contains the following fixes:

Security issues fixed:

- CVE-2018-15750: Fixed directory traversal vulnerability in salt-api (bsc#1113698).
- CVE-2018-15751: Fixed remote authentication bypass in salt-api(netapi) that allows to execute arbitrary commands (bsc#1113699).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-19"/>
	<updated date="2018-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1113698">SUSE bug 1113698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113699">SUSE bug 1113699</bugzilla>
	<cve impact="high" cvss3="8.7/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15750/">CVE-2018-15750 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15750">CVE-2018-15750 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15751/">CVE-2018-15751 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15751">CVE-2018-15751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569752" comment="salt-2016.11.10-43.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569753" comment="salt-doc-2016.11.10-43.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569754" comment="salt-minion-2016.11.10-43.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216633" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1181550" ref_url="https://bugzilla.suse.com/1181550" source="BUGZILLA"/>
		<reference ref_id="1181556" ref_url="https://bugzilla.suse.com/1181556" source="BUGZILLA"/>
		<reference ref_id="1181557" ref_url="https://bugzilla.suse.com/1181557" source="BUGZILLA"/>
		<reference ref_id="1181558" ref_url="https://bugzilla.suse.com/1181558" source="BUGZILLA"/>
		<reference ref_id="1181559" ref_url="https://bugzilla.suse.com/1181559" source="BUGZILLA"/>
		<reference ref_id="1181560" ref_url="https://bugzilla.suse.com/1181560" source="BUGZILLA"/>
		<reference ref_id="1181561" ref_url="https://bugzilla.suse.com/1181561" source="BUGZILLA"/>
		<reference ref_id="1181562" ref_url="https://bugzilla.suse.com/1181562" source="BUGZILLA"/>
		<reference ref_id="1181563" ref_url="https://bugzilla.suse.com/1181563" source="BUGZILLA"/>
		<reference ref_id="1181564" ref_url="https://bugzilla.suse.com/1181564" source="BUGZILLA"/>
		<reference ref_id="1181565" ref_url="https://bugzilla.suse.com/1181565" source="BUGZILLA"/>
		<reference ref_id="1182740" ref_url="https://bugzilla.suse.com/1182740" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28243" ref_url="https://www.suse.com/security/cve/CVE-2020-28243/" source="CVE"/>
		<reference ref_id="CVE-2020-28972" ref_url="https://www.suse.com/security/cve/CVE-2020-28972/" source="CVE"/>
		<reference ref_id="CVE-2020-35662" ref_url="https://www.suse.com/security/cve/CVE-2020-35662/" source="CVE"/>
		<reference ref_id="CVE-2021-25281" ref_url="https://www.suse.com/security/cve/CVE-2021-25281/" source="CVE"/>
		<reference ref_id="CVE-2021-25282" ref_url="https://www.suse.com/security/cve/CVE-2021-25282/" source="CVE"/>
		<reference ref_id="CVE-2021-25283" ref_url="https://www.suse.com/security/cve/CVE-2021-25283/" source="CVE"/>
		<reference ref_id="CVE-2021-25284" ref_url="https://www.suse.com/security/cve/CVE-2021-25284/" source="CVE"/>
		<reference ref_id="CVE-2021-3144" ref_url="https://www.suse.com/security/cve/CVE-2021-3144/" source="CVE"/>
		<reference ref_id="CVE-2021-3148" ref_url="https://www.suse.com/security/cve/CVE-2021-3148/" source="CVE"/>
		<reference ref_id="CVE-2021-3197" ref_url="https://www.suse.com/security/cve/CVE-2021-3197/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008380.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

- Fix regression on cmd.run when passing tuples as cmd (bsc#1182740)
- Allow `extra_filerefs` as sanitized `kwargs` for SSH client
- Fix for multiple for security issues
  (CVE-2020-28243) (CVE-2020-28972) (CVE-2020-35662) (CVE-2021-3148) (CVE-2021-3144)
  (CVE-2021-25281) (CVE-2021-25282) (CVE-2021-25283) (CVE-2021-25284) (CVE-2021-3197)
  (bsc#1181550) (bsc#1181556) (bsc#1181557) (bsc#1181558) (bsc#1181559) (bsc#1181560)
  (bsc#1181561) (bsc#1181562) (bsc#1181563) (bsc#1181564) (bsc#1181565) 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-26"/>
	<updated date="2021-02-26"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1181550">SUSE bug 1181550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181556">SUSE bug 1181556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181557">SUSE bug 1181557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181558">SUSE bug 1181558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181559">SUSE bug 1181559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181560">SUSE bug 1181560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181561">SUSE bug 1181561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181562">SUSE bug 1181562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181563">SUSE bug 1181563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181564">SUSE bug 1181564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181565">SUSE bug 1181565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182740">SUSE bug 1182740</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28243/">CVE-2020-28243 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28243">CVE-2020-28243 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28972/">CVE-2020-28972 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28972">CVE-2020-28972 at NVD</cve>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-35662/">CVE-2020-35662 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35662">CVE-2020-35662 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25281/">CVE-2021-25281 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25281">CVE-2021-25281 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25282/">CVE-2021-25282 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25282">CVE-2021-25282 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25283/">CVE-2021-25283 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25283">CVE-2021-25283 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-25284/">CVE-2021-25284 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25284">CVE-2021-25284 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3144/">CVE-2021-3144 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3144">CVE-2021-3144 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3148/">CVE-2021-3148 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3148">CVE-2021-3148 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3197/">CVE-2021-3197 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3197">CVE-2021-3197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569755" comment="salt-2016.11.10-43.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569756" comment="salt-doc-2016.11.10-43.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569757" comment="salt-minion-2016.11.10-43.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216634" version="1" class="patch">
	<metadata>
		<title>Security update for Salt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1011800" ref_url="https://bugzilla.suse.com/1011800" source="BUGZILLA"/>
		<reference ref_id="1012999" ref_url="https://bugzilla.suse.com/1012999" source="BUGZILLA"/>
		<reference ref_id="1017078" ref_url="https://bugzilla.suse.com/1017078" source="BUGZILLA"/>
		<reference ref_id="1020831" ref_url="https://bugzilla.suse.com/1020831" source="BUGZILLA"/>
		<reference ref_id="1022562" ref_url="https://bugzilla.suse.com/1022562" source="BUGZILLA"/>
		<reference ref_id="1025896" ref_url="https://bugzilla.suse.com/1025896" source="BUGZILLA"/>
		<reference ref_id="1027240" ref_url="https://bugzilla.suse.com/1027240" source="BUGZILLA"/>
		<reference ref_id="1027722" ref_url="https://bugzilla.suse.com/1027722" source="BUGZILLA"/>
		<reference ref_id="1030009" ref_url="https://bugzilla.suse.com/1030009" source="BUGZILLA"/>
		<reference ref_id="1030073" ref_url="https://bugzilla.suse.com/1030073" source="BUGZILLA"/>
		<reference ref_id="1032931" ref_url="https://bugzilla.suse.com/1032931" source="BUGZILLA"/>
		<reference ref_id="1035912" ref_url="https://bugzilla.suse.com/1035912" source="BUGZILLA"/>
		<reference ref_id="1035914" ref_url="https://bugzilla.suse.com/1035914" source="BUGZILLA"/>
		<reference ref_id="1036125" ref_url="https://bugzilla.suse.com/1036125" source="BUGZILLA"/>
		<reference ref_id="1038855" ref_url="https://bugzilla.suse.com/1038855" source="BUGZILLA"/>
		<reference ref_id="1039370" ref_url="https://bugzilla.suse.com/1039370" source="BUGZILLA"/>
		<reference ref_id="1040584" ref_url="https://bugzilla.suse.com/1040584" source="BUGZILLA"/>
		<reference ref_id="1040886" ref_url="https://bugzilla.suse.com/1040886" source="BUGZILLA"/>
		<reference ref_id="1043111" ref_url="https://bugzilla.suse.com/1043111" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5200" ref_url="https://www.suse.com/security/cve/CVE-2017-5200/" source="CVE"/>
		<reference ref_id="CVE-2017-8109" ref_url="https://www.suse.com/security/cve/CVE-2017-8109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002947.html" source="SUSE-SU"/>
		<description>

This update for salt provides version 2016.11.4 and brings various fixes and improvements:

- Adding a salt-minion watchdog for RHEL6 and SLES11 systems (sysV) to restart salt-minion in case of crashes during upgrade.
- Fix format error. (bsc#1043111)
- Fix ownership for whole master cache directory. (bsc#1035914)
- Disable 3rd party runtime packages to be explicitly recommended. (bsc#1040886)    
- Fix insecure permissions in salt-ssh temporary files. (bsc#1035912, CVE-2017-8109)
- Disable custom rosters for Salt SSH via Salt API. (bsc#1011800, CVE-2017-5200)
- Orchestrate and batches don't return false failed information anymore.
- Speed-up cherrypy by removing sleep call.
- Fix os_family grains on SUSE. (bsc#1038855)
- Fix setting the language on SUSE systems. (bsc#1038855)
- Use SUSE specific salt-api.service. (bsc#1039370)
- Fix using hostname for minion ID as '127'.
- Fix core grains constants for timezone. (bsc#1032931)
- Minor fixes on new pkg.list_downloaded.
- Listing all type of advisory patches for Yum module.
- Prevents zero length error on Python 2.6.
- Fixes zypper test error after backporting.
- Raet protocol is no longer supported. (bsc#1020831)
- Fix moving SSH data to the new home. (bsc#1027722)
- Fix logrotating /var/log/salt/minion. (bsc#1030009)
- Fix result of master_tops extension is mutually overwritten. (bsc#1030073)
- Allows to set 'timeout' and 'gather_job_timeout' via kwargs.
- Allows to set custom timeouts for 'manage.up' and 'manage.status'.
- Use salt's ordereddict for comparison.
- Fix scripts for salt-proxy.
- Add openscap module.
- File.get_managed regression fix.
- Fix translate variable arguments if they contain hidden keywords. (bsc#1025896)
- Added unit test for dockerng.sls_build dryrun.
- Added dryrun to dockerng.sls_build.
- Update dockerng minimal version requirements.
- Fix format error in error parsing.
- Keep fix for migrating salt home directory. (bsc#1022562)
- Fix  salt pkg.latest raises exception if package is not available. (bsc#1012999)
- Timezone should always be in UTC. (bsc#1017078)
- Fix timezone handling for rpm installtime. (bsc#1017078)
- Increasing timeouts for running integrations tests.
- Add buildargs option to dockerng.build module.
- Fix error when missing ssh-option parameter.
- Re-add yum notify plugin.
- All kwargs to dockerng.create to provide all features to sls_build as well.
- Datetime should be returned always in UTC.
- Fix possible crash  while deserialising data on infinite recursion in scheduled state. (bsc#1036125)
- Documentation refresh to 2016.11.4
- For a detailed description, please refer to:
  + https://docs.saltstack.com/en/develop/topics/releases/2016.11.4.html
  + https://docs.saltstack.com/en/develop/topics/releases/2016.11.3.html
  + https://docs.saltstack.com/en/develop/topics/releases/2016.11.2.html
  + https://docs.saltstack.com/en/develop/topics/releases/2016.11.1.html
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-16"/>
	<updated date="2017-06-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011800">SUSE bug 1011800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012999">SUSE bug 1012999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017078">SUSE bug 1017078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020831">SUSE bug 1020831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022562">SUSE bug 1022562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025896">SUSE bug 1025896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027240">SUSE bug 1027240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027722">SUSE bug 1027722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030009">SUSE bug 1030009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030073">SUSE bug 1030073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032931">SUSE bug 1032931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035912">SUSE bug 1035912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035914">SUSE bug 1035914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036125">SUSE bug 1036125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038855">SUSE bug 1038855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039370">SUSE bug 1039370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040584">SUSE bug 1040584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040886">SUSE bug 1040886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043111">SUSE bug 1043111</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5200/">CVE-2017-5200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5200">CVE-2017-5200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8109/">CVE-2017-8109 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8109">CVE-2017-8109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569758" comment="salt-2016.11.4-42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569759" comment="salt-doc-2016.11.4-42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569760" comment="salt-minion-2016.11.4-42.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216635" version="1" class="patch">
	<metadata>
		<title>Security update for zeromq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1140255" ref_url="https://bugzilla.suse.com/1140255" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13132" ref_url="https://www.suse.com/security/cve/CVE-2019-13132/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005673.html" source="SUSE-SU"/>
		<description>
This update for zeromq fixes the following issues:

- CVE-2019-13132: An unauthenticated remote attacker could have exploited
  a stack overflow vulnerability on a server that is supposed to be protected
  by encryption and authentication to potentially gain a remote code execution.
  (bsc#1140255)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-08"/>
	<updated date="2019-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140255">SUSE bug 1140255</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13132/">CVE-2019-13132 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13132">CVE-2019-13132 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569761" comment="libzmq3-4.0.4-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216636" version="1" class="patch">
	<metadata>
		<title>Recommended update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1008933" ref_url="https://bugzilla.suse.com/1008933" source="BUGZILLA"/>
		<reference ref_id="1009435" ref_url="https://bugzilla.suse.com/1009435" source="BUGZILLA"/>
		<reference ref_id="1009677" ref_url="https://bugzilla.suse.com/1009677" source="BUGZILLA"/>
		<reference ref_id="1012398" ref_url="https://bugzilla.suse.com/1012398" source="BUGZILLA"/>
		<reference ref_id="1013002" ref_url="https://bugzilla.suse.com/1013002" source="BUGZILLA"/>
		<reference ref_id="967818" ref_url="https://bugzilla.suse.com/967818" source="BUGZILLA"/>
		<reference ref_id="980752" ref_url="https://bugzilla.suse.com/980752" source="BUGZILLA"/>
		<reference ref_id="995764" ref_url="https://bugzilla.suse.com/995764" source="BUGZILLA"/>
		<reference ref_id="996609" ref_url="https://bugzilla.suse.com/996609" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9639" ref_url="https://www.suse.com/security/cve/CVE-2016-9639/" source="CVE"/>
		<reference ref_id="SUSE-RU-2017:0174-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2017-January/005788.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

osad:

- Fix logfile option for osa-dispatcher. (bsc#980752)

salt:

- Update to 2015.8.12
- Add pre-require to salt for minions.
- Do not restart salt-minion in salt package.
- Add try-restart to sys-v init scripts.
- Add 'Restart=on-failure' for salt-minion systemd service.
- Various fixes for signal handling.
- Successfully exit of salt-api child processes when SIGTERM is received.
- Re-introduce 'KillMode=process' for salt-minion systemd service.
- Fix setting default timezone. (bsc#1008933)
- Fix possible information leak due to revoked keys still being used. (bsc#1012398, CVE-2016-9639)

spacewalk-backend:

- Handle non-unique machine_id after migrate from 2.1. (bsc#1013002)
- Refer to scc.suse.com instead of bugzilla.novell.com in case of problem. (bsc#967818)
- Fix selection of primary interface. (bsc#1009677)
- Add link from satellite-sync to mgr-inter-sync man page. (bsc#1009435)
- Reposync: Assign orphaned vendor packages to the default org. (bsc#995764)
- Add missing reference for bsc#996609

supportutils-plugin-susemanager-client:

- Include correct configuration file in the supportconfig.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-17"/>
	<updated date="2017-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1008933">SUSE bug 1008933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009435">SUSE bug 1009435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009677">SUSE bug 1009677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012398">SUSE bug 1012398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013002">SUSE bug 1013002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967818">SUSE bug 967818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980752">SUSE bug 980752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995764">SUSE bug 995764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996609">SUSE bug 996609</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9639/">CVE-2016-9639 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9639">CVE-2016-9639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594223" comment="osa-common-5.11.64.3-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594224" comment="osad-5.11.64.3-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594225" comment="salt-2015.8.12-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594226" comment="salt-doc-2015.8.12-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594227" comment="salt-minion-2015.8.12-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594228" comment="spacewalk-backend-libs-2.5.24.7-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594229" comment="supportutils-plugin-susemanager-client-3.0.5-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216637" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1023233" ref_url="https://bugzilla.suse.com/1023233" source="BUGZILLA"/>
		<reference ref_id="1024406" ref_url="https://bugzilla.suse.com/1024406" source="BUGZILLA"/>
		<reference ref_id="1024714" ref_url="https://bugzilla.suse.com/1024714" source="BUGZILLA"/>
		<reference ref_id="1025312" ref_url="https://bugzilla.suse.com/1025312" source="BUGZILLA"/>
		<reference ref_id="1026633" ref_url="https://bugzilla.suse.com/1026633" source="BUGZILLA"/>
		<reference ref_id="1027426" ref_url="https://bugzilla.suse.com/1027426" source="BUGZILLA"/>
		<reference ref_id="1029755" ref_url="https://bugzilla.suse.com/1029755" source="BUGZILLA"/>
		<reference ref_id="1031667" ref_url="https://bugzilla.suse.com/1031667" source="BUGZILLA"/>
		<reference ref_id="1032256" ref_url="https://bugzilla.suse.com/1032256" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7470" ref_url="https://www.suse.com/security/cve/CVE-2017-7470/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002898.html" source="SUSE-SU"/>
		<description>

The following security issue in spacewalk-backend has been fixed:

- Non admin or disabled user cannot make changes to a system anymore using spacewalk-channel.
  (bsc#1026633, CVE-2017-7470)

Additionally, the following non-security issues have been fixed:

rhnlib:

- Support all TLS versions in rpclib. (bsc#1025312)

spacecmd:

- Improve output on error for listrepo. (bsc#1027426)
- Reword spacecmd removal message. (bsc#1024406)

spacewalk-backend:

- Do not fail with traceback when media.1 does not exist. (bsc#1032256)
- Create scap files directory beforehand. (bsc#1029755)
- Fix error if SPACEWALK_DEBUG_NO_REPORTS environment variable is not present.
- Don't skip 'rhnErrataPackage' cleanup during an errata update. (bsc#1023233)
- Add support for running spacewalk-debug without creating reports. (bsc#1024714)
- Set scap store directory mod to 775 and group owner to susemanager.
- incomplete_package_import: Do import rhnPackageFile as it breaks some package installations.
- Added traceback printing to the exception block.
- Change postgresql starting commands.

spacewalk-client-tools:

- Fix reboot message to use correct product name. (bsc#1031667)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-19"/>
	<updated date="2017-05-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023233">SUSE bug 1023233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024406">SUSE bug 1024406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024714">SUSE bug 1024714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025312">SUSE bug 1025312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026633">SUSE bug 1026633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027426">SUSE bug 1027426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029755">SUSE bug 1029755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031667">SUSE bug 1031667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032256">SUSE bug 1032256</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7470/">CVE-2017-7470 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7470">CVE-2017-7470 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569667" comment="rhnlib-2.5.84.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569668" comment="spacecmd-2.5.5.5-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569669" comment="spacewalk-backend-libs-2.5.24.9-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569670" comment="spacewalk-check-2.5.13.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569671" comment="spacewalk-client-setup-2.5.13.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569672" comment="spacewalk-client-tools-2.5.13.8-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216638" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1103696" ref_url="https://bugzilla.suse.com/1103696" source="BUGZILLA"/>
		<reference ref_id="1104034" ref_url="https://bugzilla.suse.com/1104034" source="BUGZILLA"/>
		<reference ref_id="1130040" ref_url="https://bugzilla.suse.com/1130040" source="BUGZILLA"/>
		<reference ref_id="1135881" ref_url="https://bugzilla.suse.com/1135881" source="BUGZILLA"/>
		<reference ref_id="1136029" ref_url="https://bugzilla.suse.com/1136029" source="BUGZILLA"/>
		<reference ref_id="1136480" ref_url="https://bugzilla.suse.com/1136480" source="BUGZILLA"/>
		<reference ref_id="1137715" ref_url="https://bugzilla.suse.com/1137715" source="BUGZILLA"/>
		<reference ref_id="1137940" ref_url="https://bugzilla.suse.com/1137940" source="BUGZILLA"/>
		<reference ref_id="1138313" ref_url="https://bugzilla.suse.com/1138313" source="BUGZILLA"/>
		<reference ref_id="1138358" ref_url="https://bugzilla.suse.com/1138358" source="BUGZILLA"/>
		<reference ref_id="1138494" ref_url="https://bugzilla.suse.com/1138494" source="BUGZILLA"/>
		<reference ref_id="1138822" ref_url="https://bugzilla.suse.com/1138822" source="BUGZILLA"/>
		<reference ref_id="1139453" ref_url="https://bugzilla.suse.com/1139453" source="BUGZILLA"/>
		<reference ref_id="1142038" ref_url="https://bugzilla.suse.com/1142038" source="BUGZILLA"/>
		<reference ref_id="1143856" ref_url="https://bugzilla.suse.com/1143856" source="BUGZILLA"/>
		<reference ref_id="1144155" ref_url="https://bugzilla.suse.com/1144155" source="BUGZILLA"/>
		<reference ref_id="1144889" ref_url="https://bugzilla.suse.com/1144889" source="BUGZILLA"/>
		<reference ref_id="1148125" ref_url="https://bugzilla.suse.com/1148125" source="BUGZILLA"/>
		<reference ref_id="1148177" ref_url="https://bugzilla.suse.com/1148177" source="BUGZILLA"/>
		<reference ref_id="1148311" ref_url="https://bugzilla.suse.com/1148311" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10136" ref_url="https://www.suse.com/security/cve/CVE-2019-10136/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005884.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

mgr-cfg:

- Ensure bytes type when using hashlib to avoid traceback (bsc#1138822)

mgr-daemon:

- Fix systemd timer configuration on SLE12 (bsc#1142038)

mgr-osad:

- Fix obsolete for old osad packages, to allow installing mgr-osad
  even by using osad at yum/zyppper install (bsc#1139453)
- Ensure bytes type when using hashlib to avoid traceback (bsc#1138822)

mgr-virtualization:

- Fix missing python 3 ugettext (bsc#1138494)
- Fix package dependencies to prevent file conflict (bsc#1143856)

rhnlib:

- Add SNI support for clients
- Fix initialize ssl connection (bsc#1144155)
- Fix bootstrapping SLE11SP4 trad client with SSL enabled (bsc#1148177)
    
python-gzipstream:

- SPEC cleanup
- add makefile and pylint configuration
- Add Uyuni URL to package
- Bump version to 4.0.0 (bsc#1104034)
- Fix copyright for the package specfile (bsc#1103696)

spacecmd:

- Bugfix: referenced variable before assignment.
- Bugfix: 'dict' object has no attribute 'iteritems' (bsc#1135881)
- Add unit tests for custominfo, snippet, scap, ssm, cryptokey and distribution
- Fix missing runtime dependencies that made spacecmd return old versions of
  packages in some cases, even if newer ones were available (bsc#1148311)


spacewalk-backend:

- Do not overwrite comps and module data with older versions
- Fix issue with 'dists' keyword in url hostname
- Import packages from all collections of a patch not just first one
- Ensure bytes type when using hashlib to avoid traceback
  on XMLRPC call to 'registration.register_osad' (bsc#1138822)
- Do not duplicate 'http://' protocol when using proxies with 'deb'
  repositories (bsc#1138313)
- Fix reposync when dealing with RedHat CDN (bsc#1138358)
- Fix for CVE-2019-10136. An attacker with a valid, but expired,
  authenticated set of headers could move some digits around,
  artificially extending the session validity without modifying
  the checksum. (bsc#1136480)
- Prevent FileNotFoundError: repomd.xml.key traceback (bsc#1137940)
- Add journalctl output to spacewalk-debug tarballs
- Prevent unnecessary triggering of channel-repodata tasks when GPG
  signing is disabled (bsc#1137715)
- Fix spacewalk-repo-sync for Ubuntu repositories in mirror case (bsc#1136029)
- Add support for ULN repositories on new Zypper based reposync.
- Don't skip Deb package tags on package import (bsc#1130040)
- For backend-libs subpackages, exclude files for the server
  (already part of spacewalk-backend) to avoid conflicts (bsc#1148125)
- prevent duplicate key violates on repo-sync with long changelog
  entries (bsc#1144889)

spacewalk-remote-utils:

- Add RHEL8

		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-05"/>
	<updated date="2019-09-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103696">SUSE bug 1103696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104034">SUSE bug 1104034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130040">SUSE bug 1130040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135881">SUSE bug 1135881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136029">SUSE bug 1136029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136480">SUSE bug 1136480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137715">SUSE bug 1137715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137940">SUSE bug 1137940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138313">SUSE bug 1138313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138358">SUSE bug 1138358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138494">SUSE bug 1138494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138822">SUSE bug 1138822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139453">SUSE bug 1139453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142038">SUSE bug 1142038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143856">SUSE bug 1143856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144155">SUSE bug 1144155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144889">SUSE bug 1144889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148125">SUSE bug 1148125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148177">SUSE bug 1148177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148311">SUSE bug 1148311</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10136/">CVE-2019-10136 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10136">CVE-2019-10136 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569673" comment="mgr-cfg-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569674" comment="mgr-cfg-actions-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569675" comment="mgr-cfg-client-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569676" comment="mgr-cfg-management-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569677" comment="mgr-daemon-4.0.7-5.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569678" comment="mgr-osad-4.0.9-5.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569679" comment="mgr-virtualization-host-4.0.8-5.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569680" comment="python2-mgr-cfg-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569681" comment="python2-mgr-cfg-actions-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569682" comment="python2-mgr-cfg-client-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569683" comment="python2-mgr-cfg-management-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569684" comment="python2-mgr-osa-common-4.0.9-5.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569685" comment="python2-mgr-osad-4.0.9-5.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569686" comment="python2-mgr-virtualization-common-4.0.8-5.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569687" comment="python2-mgr-virtualization-host-4.0.8-5.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569688" comment="python2-rhnlib-4.0.11-12.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569689" comment="spacecmd-4.0.14-18.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569690" comment="spacewalk-backend-libs-4.0.25-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569691" comment="spacewalk-remote-utils-4.0.5-6.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216639" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1167907" ref_url="https://bugzilla.suse.com/1167907" source="BUGZILLA"/>
		<reference ref_id="1169664" ref_url="https://bugzilla.suse.com/1169664" source="BUGZILLA"/>
		<reference ref_id="1176978" ref_url="https://bugzilla.suse.com/1176978" source="BUGZILLA"/>
		<reference ref_id="1178319" ref_url="https://bugzilla.suse.com/1178319" source="BUGZILLA"/>
		<reference ref_id="1178361" ref_url="https://bugzilla.suse.com/1178361" source="BUGZILLA"/>
		<reference ref_id="1178362" ref_url="https://bugzilla.suse.com/1178362" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16846" ref_url="https://www.suse.com/security/cve/CVE-2020-16846/" source="CVE"/>
		<reference ref_id="CVE-2020-17490" ref_url="https://www.suse.com/security/cve/CVE-2020-17490/" source="CVE"/>
		<reference ref_id="CVE-2020-25592" ref_url="https://www.suse.com/security/cve/CVE-2020-25592/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007715.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

cobbler:

- Fix parsing cobbler dictionary options with values containing '=', e.g. kernel params containing '=' (bsc#1176978)

mgr-daemon:

- Update translation strings

salt:

- Properly validate eauth credentials and tokens on SSH calls made by Salt API 
  (bsc#1178319, bsc#1178362, bsc#1178361, CVE-2020-25592, CVE-2020-17490, CVE-2020-16846)

spacecmd:

- Python3 fixes for errata in spacecmd (bsc#1169664)
- Added support for i18n of user-facing strings
- Python3 fix for sorted usage (bsc#1167907)

spacewalk-client-tools:

- Remove RH references in Python/Ruby localization and use the product name instead

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-06"/>
	<updated date="2020-11-06"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1167907">SUSE bug 1167907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169664">SUSE bug 1169664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176978">SUSE bug 1176978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178319">SUSE bug 1178319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178361">SUSE bug 1178361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178362">SUSE bug 1178362</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16846/">CVE-2020-16846 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16846">CVE-2020-16846 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17490/">CVE-2020-17490 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17490">CVE-2020-17490 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25592/">CVE-2020-25592 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25592">CVE-2020-25592 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569692" comment="koan-2.2.2-0.68.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569693" comment="mgr-daemon-4.1.3-5.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569694" comment="python2-spacewalk-check-4.1.7-27.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569695" comment="python2-spacewalk-client-setup-4.1.7-27.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569696" comment="python2-spacewalk-client-tools-4.1.7-27.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569697" comment="salt-2016.11.10-43.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569698" comment="salt-doc-2016.11.10-43.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569699" comment="salt-minion-2016.11.10-43.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569700" comment="spacecmd-4.1.8-18.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569701" comment="spacewalk-check-4.1.7-27.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569702" comment="spacewalk-client-setup-4.1.7-27.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569703" comment="spacewalk-client-tools-4.1.7-27.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216640" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1173557" ref_url="https://bugzilla.suse.com/1173557" source="BUGZILLA"/>
		<reference ref_id="1177884" ref_url="https://bugzilla.suse.com/1177884" source="BUGZILLA"/>
		<reference ref_id="1177928" ref_url="https://bugzilla.suse.com/1177928" source="BUGZILLA"/>
		<reference ref_id="1180583" ref_url="https://bugzilla.suse.com/1180583" source="BUGZILLA"/>
		<reference ref_id="1180584" ref_url="https://bugzilla.suse.com/1180584" source="BUGZILLA"/>
		<reference ref_id="1180585" ref_url="https://bugzilla.suse.com/1180585" source="BUGZILLA"/>
		<reference ref_id="1185178" ref_url="https://bugzilla.suse.com/1185178" source="BUGZILLA"/>
		<reference ref_id="1185281" ref_url="https://bugzilla.suse.com/1185281" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31607" ref_url="https://www.suse.com/security/cve/CVE-2021-31607/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009060.html" source="SUSE-SU"/>
		<description>
This update fixes the following issues:

golang-github-wrouesnel-postgres_exporter:

- Add support for aarch64

mgr-cfg:

- SPEC: Updated Python definitions for RHEL8 and quoted text comparisons.

mgr-custom-info:

- Update package version to 4.2.0

mgr-daemon:

- Update translation strings
- Update the translations from weblate
- Added quotes around %{_vendor} token for the if statements in spec file.
- Fix removal of mgr-deamon with selinux enabled (bsc#1177928)
- Updating translations from weblate

mgr-osad:

- Change the log file permissions as expected by logrotate (bsc#1177884)
- Change deprecated path /var/run into /run for systemd (bsc#1185178)
- Python fixes
- Removal of RHEL5

mgr-push:

- Defined __python for python2.
- Excluded RHEL8 for Python 2 build.

mgr-virtualization:

- Update package version to 4.2.0

rhnlib:

- Update package version to 4.2.0

salt:

- Prevent command injection in the snapper module (bsc#1185281) (CVE-2021-31607)

spacecmd:

- Rename system migration to system transfer
- Rename SP to product migration
- Update translation strings
- Add group_addconfigchannel and group_removeconfigchannel
- Add group_listconfigchannels and configchannel_listgroups
- Fix spacecmd compat with Python 3
- Deprecated 'Software Crashes' feature
- Document advanced package search on '--help' (bsc#1180583)
- Fixed advanced search on 'package_listinstalledsystems'
- Fixed duplicate results when using multiple search criteria (bsc#1180585)
- Fixed 'non-advanced' package search when using multiple package names (bsc#1180584)
- Update translations
- Fix: make spacecmd build on Debian
- Add Service Pack migration operations (bsc#1173557)

spacewalk-client-tools:

- Update the translations from weblate
- Drop the --noSSLServerURL option
- Updated RHEL Python requirements.
- Added quotes around %{_vendor}.

spacewalk-koan:

- Fix for spacewalk-koan test

spacewalk-oscap:

- Update package version to 4.2.0

spacewalk-remote-utils:

- Update package version to 4.2.0

supportutils-plugin-susemanager-client:

- Update package version to 4.2.0

suseRegisterInfo:

- Add support for Amazon Linux 2
- Add support for Alibaba Cloud Linux 2
- Adapted for RHEL build.

uyuni-base:
- Added Apache as prerequisite for RHEL and Fedora (due to required users).
- Removed RHEL specific folder rights from SPEC file.
- Added RHEL8 compatibility.

uyuni-common-libs:

- Cleaning up unused Python 2 build leftovers.
- Disabled debug package build.

		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-21"/>
	<updated date="2021-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173557">SUSE bug 1173557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177884">SUSE bug 1177884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177928">SUSE bug 1177928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180583">SUSE bug 1180583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180584">SUSE bug 1180584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180585">SUSE bug 1180585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185178">SUSE bug 1185178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185281">SUSE bug 1185281</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31607/">CVE-2021-31607 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31607">CVE-2021-31607 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569704" comment="golang-github-wrouesnel-postgres_exporter-0.4.7-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569705" comment="mgr-cfg-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569706" comment="mgr-cfg-actions-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569707" comment="mgr-cfg-client-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569708" comment="mgr-cfg-management-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569709" comment="mgr-custom-info-4.2.1-5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569710" comment="mgr-daemon-4.2.7-5.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569711" comment="mgr-osad-4.2.5-5.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569712" comment="mgr-push-4.2.2-5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569713" comment="mgr-virtualization-host-4.2.1-5.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569714" comment="python2-mgr-cfg-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569715" comment="python2-mgr-cfg-actions-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569716" comment="python2-mgr-cfg-client-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569717" comment="python2-mgr-cfg-management-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569718" comment="python2-mgr-osa-common-4.2.5-5.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569719" comment="python2-mgr-osad-4.2.5-5.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569720" comment="python2-mgr-push-4.2.2-5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569721" comment="python2-mgr-virtualization-common-4.2.1-5.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569722" comment="python2-mgr-virtualization-host-4.2.1-5.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569723" comment="python2-rhnlib-4.2.3-12.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569724" comment="python2-spacewalk-check-4.2.10-27.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569725" comment="python2-spacewalk-client-setup-4.2.10-27.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569726" comment="python2-spacewalk-client-tools-4.2.10-27.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569727" comment="python2-spacewalk-koan-4.2.3-9.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569728" comment="python2-spacewalk-oscap-4.2.1-6.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569729" comment="python2-suseRegisterInfo-4.2.3-6.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569730" comment="python2-uyuni-common-libs-4.2.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569731" comment="salt-2016.11.10-43.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569732" comment="salt-doc-2016.11.10-43.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569733" comment="salt-minion-2016.11.10-43.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569734" comment="spacecmd-4.2.8-18.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569735" comment="spacewalk-check-4.2.10-27.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569736" comment="spacewalk-client-setup-4.2.10-27.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569737" comment="spacewalk-client-tools-4.2.10-27.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569738" comment="spacewalk-koan-4.2.3-9.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569739" comment="spacewalk-oscap-4.2.1-6.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569740" comment="spacewalk-remote-utils-4.2.1-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569741" comment="supportutils-plugin-susemanager-client-4.2.2-9.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569742" comment="suseRegisterInfo-4.2.3-6.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216641" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1181223" ref_url="https://bugzilla.suse.com/1181223" source="BUGZILLA"/>
		<reference ref_id="1188977" ref_url="https://bugzilla.suse.com/1188977" source="BUGZILLA"/>
		<reference ref_id="1190265" ref_url="https://bugzilla.suse.com/1190265" source="BUGZILLA"/>
		<reference ref_id="1190512" ref_url="https://bugzilla.suse.com/1190512" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21996" ref_url="https://www.suse.com/security/cve/CVE-2021-21996/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009670.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

salt:

- Exclude the full path of a download URL to prevent injection of
  malicious code (bsc#1190265) (CVE-2021-21996)

spacecmd:

- Version 4.2.13-1
  * Update translation strings
  * configchannel_updatefile handles directory properly (bsc#1190512)
  * Add schedule_archivecompleted to mass archive actions (bsc#1181223)
  * Remove whoami from the list of unauthenticated commands (bsc#1188977)

spacewalk-client-tools:

- Version 4.2.14-1
  * Update translation strings

		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-27"/>
	<updated date="2021-10-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181223">SUSE bug 1181223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188977">SUSE bug 1188977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190265">SUSE bug 1190265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190512">SUSE bug 1190512</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-21996/">CVE-2021-21996 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21996">CVE-2021-21996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651453" comment="python2-spacewalk-check-4.2.14-27.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651454" comment="python2-spacewalk-client-setup-4.2.14-27.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651455" comment="python2-spacewalk-client-tools-4.2.14-27.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651456" comment="salt-2016.11.10-43.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651457" comment="salt-doc-2016.11.10-43.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651458" comment="salt-minion-2016.11.10-43.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651459" comment="spacecmd-4.2.13-18.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651460" comment="spacewalk-check-4.2.14-27.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651461" comment="spacewalk-client-setup-4.2.14-27.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651462" comment="spacewalk-client-tools-4.2.14-27.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216642" version="1" class="patch">
	<metadata>
		<title>Security update for cobbler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1074594" ref_url="https://bugzilla.suse.com/1074594" source="BUGZILLA"/>
		<reference ref_id="1090205" ref_url="https://bugzilla.suse.com/1090205" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000469" ref_url="https://www.suse.com/security/cve/CVE-2017-1000469/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004198.html" source="SUSE-SU"/>
		<description>
This update for cobbler fixes the following issues:

- CVE-2017-1000469: Escape shell parameters provided by the user for the reposync action. (bsc#1074594)
- Fix for calling koan with virt_type kvm. (bsc#1090205)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-19"/>
	<updated date="2018-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074594">SUSE bug 1074594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090205">SUSE bug 1090205</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000469/">CVE-2017-1000469 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000469">CVE-2017-1000469 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569743" comment="koan-2.2.2-0.68.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216643" version="1" class="patch">
	<metadata>
		<title>Security update for cobbler (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1104189" ref_url="https://bugzilla.suse.com/1104189" source="BUGZILLA"/>
		<reference ref_id="1104287" ref_url="https://bugzilla.suse.com/1104287" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10931" ref_url="https://www.suse.com/security/cve/CVE-2018-10931/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004506.html" source="SUSE-SU"/>
		<description>
This update for cobbler fixes the following issues:

Security issue fixed:

- CVE-2018-10931: Forbid exposure of private methods in the API (bsc#1104287, bsc#1104189)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-29"/>
	<updated date="2018-08-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104189">SUSE bug 1104189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104287">SUSE bug 1104287</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10931/">CVE-2018-10931 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10931">CVE-2018-10931 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569744" comment="koan-2.2.2-0.68.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216644" version="1" class="patch">
	<metadata>
		<title>Security update for cobbler (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1193671" ref_url="https://bugzilla.suse.com/1193671" source="BUGZILLA"/>
		<reference ref_id="1195906" ref_url="https://bugzilla.suse.com/1195906" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45083" ref_url="https://www.suse.com/security/cve/CVE-2021-45083/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010255.html" source="SUSE-SU"/>
		<description>
This update for cobbler fixes the following issues:

- CVE-2021-45083: Fixed unsafe permissions on sensitive files (bsc#1193671).

The following non-security bugs were fixed:

- Move configuration files ownership to apache (bsc#1195906)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193671">SUSE bug 1193671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195906">SUSE bug 1195906</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-45083/">CVE-2021-45083 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45083">CVE-2021-45083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668399" comment="koan-2.2.2-0.68.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216645" version="1" class="patch">
	<metadata>
		<title>Security update for python-Jinja2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1181944" ref_url="https://bugzilla.suse.com/1181944" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28493" ref_url="https://www.suse.com/security/cve/CVE-2020-28493/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008377.html" source="SUSE-SU"/>
		<description>
This update for python-Jinja2 fixes the following issues:

- CVE-2020-28493: Improve the speed of the 'urlize' filter by reducing regex
    backtracking. Email matching requires a word character at the start of the
    domain part, and only word characters in the TLD. (bsc#1181944)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-25"/>
	<updated date="2021-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181944">SUSE bug 1181944</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28493/">CVE-2020-28493 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28493">CVE-2020-28493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562788" comment="python-Jinja2-2.6-2.19.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216646" version="1" class="patch">
	<metadata>
		<title>Security update for python-pycrypto (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1017420" ref_url="https://bugzilla.suse.com/1017420" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7459" ref_url="https://www.suse.com/security/cve/CVE-2013-7459/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1744-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SKY7WCHFWKRKAW7PBKT42PXBLVRNISRR/#SKY7WCHFWKRKAW7PBKT42PXBLVRNISRR" source="SUSE-SU"/>
		<description>
This update for python-pycrypto fixes the following issues:

- CVE-2013-7459: Fixed a potential heap buffer overflow in ALGnew (bsc#1017420).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-30"/>
	<updated date="2017-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1017420">SUSE bug 1017420</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7459/">CVE-2013-7459 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7459">CVE-2013-7459 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569745" comment="python-pycrypto-2.6.1-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216647" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1051948" ref_url="https://bugzilla.suse.com/1051948" source="BUGZILLA"/>
		<reference ref_id="1052264" ref_url="https://bugzilla.suse.com/1052264" source="BUGZILLA"/>
		<reference ref_id="1053376" ref_url="https://bugzilla.suse.com/1053376" source="BUGZILLA"/>
		<reference ref_id="1053955" ref_url="https://bugzilla.suse.com/1053955" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12791" ref_url="https://www.suse.com/security/cve/CVE-2017-12791/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003279.html" source="SUSE-SU"/>
		<description>
This update for salt fixes one security issue and bugs.

The following security issue has been fixed:

- CVE-2017-12791: Directory traversal vulnerability in minion id validation
  allowed remote minions with incorrect credentials to authenticate to a master
  via a crafted minion ID (bsc#1053955).

Additionally, the following non-security issues have been fixed:

- Added support for SUSE Manager scalability features. (bsc#1052264)
- Introduced the kubernetes module. (bsc#1051948)
- Notify systemd synchronously via NOTIFY_SOCKET. (bsc#1053376)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-09"/>
	<updated date="2017-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1051948">SUSE bug 1051948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052264">SUSE bug 1052264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053376">SUSE bug 1053376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053955">SUSE bug 1053955</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12791/">CVE-2017-12791 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12791">CVE-2017-12791 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569746" comment="salt-2016.11.4-43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569747" comment="salt-doc-2016.11.4-43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569748" comment="salt-minion-2016.11.4-43.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216648" version="1" class="patch">
	<metadata>
		<title>Security update for Salt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1041993" ref_url="https://bugzilla.suse.com/1041993" source="BUGZILLA"/>
		<reference ref_id="1042749" ref_url="https://bugzilla.suse.com/1042749" source="BUGZILLA"/>
		<reference ref_id="1050003" ref_url="https://bugzilla.suse.com/1050003" source="BUGZILLA"/>
		<reference ref_id="1059291" ref_url="https://bugzilla.suse.com/1059291" source="BUGZILLA"/>
		<reference ref_id="1059758" ref_url="https://bugzilla.suse.com/1059758" source="BUGZILLA"/>
		<reference ref_id="1060230" ref_url="https://bugzilla.suse.com/1060230" source="BUGZILLA"/>
		<reference ref_id="1062462" ref_url="https://bugzilla.suse.com/1062462" source="BUGZILLA"/>
		<reference ref_id="1062464" ref_url="https://bugzilla.suse.com/1062464" source="BUGZILLA"/>
		<reference ref_id="985112" ref_url="https://bugzilla.suse.com/985112" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14695" ref_url="https://www.suse.com/security/cve/CVE-2017-14695/" source="CVE"/>
		<reference ref_id="CVE-2017-14696" ref_url="https://www.suse.com/security/cve/CVE-2017-14696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003543.html" source="SUSE-SU"/>
		<description>
This update for salt fixes one security issue and bugs.

The following security issues have been fixed:

- CVE-2017-14695: A directory traversal vulnerability in minion id validation allowed remote minions with incorrect
  credentials to authenticate to a master via a crafted minion ID. (bsc#1062462)
- CVE-2017-14696: It was possible to force a remote Denial of Service with a specially crafted authentication 
  request. (bsc#1062464)

Additionally, the following non-security issues have been fixed:

- Removed deprecation warning for beacon configuration using dictionaries. (bsc#1041993)
- Fixed beacons failure when pillar-based suppressing config-based. (bsc#1060230)
- Fixed minion resource exhaustion when many functions are being executed in parallel. (bsc#1059758)
- Remove 'TasksTask' attribute from salt-master.service in older versions of systemd. (bsc#985112)
- Fix for delete_deployment in Kubernetes module. (bsc#1059291)
- Catching error when PIDfile cannot be deleted. (bsc#1050003)
- Use $HOME to get the user home directory instead using '~' char. (bsc#1042749)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-20"/>
	<updated date="2017-12-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1041993">SUSE bug 1041993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042749">SUSE bug 1042749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050003">SUSE bug 1050003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059291">SUSE bug 1059291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059758">SUSE bug 1059758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060230">SUSE bug 1060230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062462">SUSE bug 1062462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062464">SUSE bug 1062464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985112">SUSE bug 985112</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14695/">CVE-2017-14695 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14695">CVE-2017-14695 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14696/">CVE-2017-14696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14696">CVE-2017-14696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569749" comment="salt-2016.11.4-43.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569750" comment="salt-doc-2016.11.4-43.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569751" comment="salt-minion-2016.11.4-43.10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216649" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1113698" ref_url="https://bugzilla.suse.com/1113698" source="BUGZILLA"/>
		<reference ref_id="1113699" ref_url="https://bugzilla.suse.com/1113699" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15750" ref_url="https://www.suse.com/security/cve/CVE-2018-15750/" source="CVE"/>
		<reference ref_id="CVE-2018-15751" ref_url="https://www.suse.com/security/cve/CVE-2018-15751/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004866.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

Salt was updated to version 2016.11.10 and contains the following fixes:

Security issues fixed:

- CVE-2018-15750: Fixed directory traversal vulnerability in salt-api (bsc#1113698).
- CVE-2018-15751: Fixed remote authentication bypass in salt-api(netapi) that allows to execute arbitrary commands (bsc#1113699).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-19"/>
	<updated date="2018-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1113698">SUSE bug 1113698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113699">SUSE bug 1113699</bugzilla>
	<cve impact="high" cvss3="8.7/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15750/">CVE-2018-15750 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15750">CVE-2018-15750 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15751/">CVE-2018-15751 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15751">CVE-2018-15751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569752" comment="salt-2016.11.10-43.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569753" comment="salt-doc-2016.11.10-43.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569754" comment="salt-minion-2016.11.10-43.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216650" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1181550" ref_url="https://bugzilla.suse.com/1181550" source="BUGZILLA"/>
		<reference ref_id="1181556" ref_url="https://bugzilla.suse.com/1181556" source="BUGZILLA"/>
		<reference ref_id="1181557" ref_url="https://bugzilla.suse.com/1181557" source="BUGZILLA"/>
		<reference ref_id="1181558" ref_url="https://bugzilla.suse.com/1181558" source="BUGZILLA"/>
		<reference ref_id="1181559" ref_url="https://bugzilla.suse.com/1181559" source="BUGZILLA"/>
		<reference ref_id="1181560" ref_url="https://bugzilla.suse.com/1181560" source="BUGZILLA"/>
		<reference ref_id="1181561" ref_url="https://bugzilla.suse.com/1181561" source="BUGZILLA"/>
		<reference ref_id="1181562" ref_url="https://bugzilla.suse.com/1181562" source="BUGZILLA"/>
		<reference ref_id="1181563" ref_url="https://bugzilla.suse.com/1181563" source="BUGZILLA"/>
		<reference ref_id="1181564" ref_url="https://bugzilla.suse.com/1181564" source="BUGZILLA"/>
		<reference ref_id="1181565" ref_url="https://bugzilla.suse.com/1181565" source="BUGZILLA"/>
		<reference ref_id="1182740" ref_url="https://bugzilla.suse.com/1182740" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28243" ref_url="https://www.suse.com/security/cve/CVE-2020-28243/" source="CVE"/>
		<reference ref_id="CVE-2020-28972" ref_url="https://www.suse.com/security/cve/CVE-2020-28972/" source="CVE"/>
		<reference ref_id="CVE-2020-35662" ref_url="https://www.suse.com/security/cve/CVE-2020-35662/" source="CVE"/>
		<reference ref_id="CVE-2021-25281" ref_url="https://www.suse.com/security/cve/CVE-2021-25281/" source="CVE"/>
		<reference ref_id="CVE-2021-25282" ref_url="https://www.suse.com/security/cve/CVE-2021-25282/" source="CVE"/>
		<reference ref_id="CVE-2021-25283" ref_url="https://www.suse.com/security/cve/CVE-2021-25283/" source="CVE"/>
		<reference ref_id="CVE-2021-25284" ref_url="https://www.suse.com/security/cve/CVE-2021-25284/" source="CVE"/>
		<reference ref_id="CVE-2021-3144" ref_url="https://www.suse.com/security/cve/CVE-2021-3144/" source="CVE"/>
		<reference ref_id="CVE-2021-3148" ref_url="https://www.suse.com/security/cve/CVE-2021-3148/" source="CVE"/>
		<reference ref_id="CVE-2021-3197" ref_url="https://www.suse.com/security/cve/CVE-2021-3197/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008380.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

- Fix regression on cmd.run when passing tuples as cmd (bsc#1182740)
- Allow `extra_filerefs` as sanitized `kwargs` for SSH client
- Fix for multiple for security issues
  (CVE-2020-28243) (CVE-2020-28972) (CVE-2020-35662) (CVE-2021-3148) (CVE-2021-3144)
  (CVE-2021-25281) (CVE-2021-25282) (CVE-2021-25283) (CVE-2021-25284) (CVE-2021-3197)
  (bsc#1181550) (bsc#1181556) (bsc#1181557) (bsc#1181558) (bsc#1181559) (bsc#1181560)
  (bsc#1181561) (bsc#1181562) (bsc#1181563) (bsc#1181564) (bsc#1181565) 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-26"/>
	<updated date="2021-02-26"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1181550">SUSE bug 1181550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181556">SUSE bug 1181556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181557">SUSE bug 1181557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181558">SUSE bug 1181558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181559">SUSE bug 1181559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181560">SUSE bug 1181560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181561">SUSE bug 1181561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181562">SUSE bug 1181562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181563">SUSE bug 1181563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181564">SUSE bug 1181564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181565">SUSE bug 1181565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182740">SUSE bug 1182740</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28243/">CVE-2020-28243 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28243">CVE-2020-28243 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28972/">CVE-2020-28972 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28972">CVE-2020-28972 at NVD</cve>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-35662/">CVE-2020-35662 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35662">CVE-2020-35662 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25281/">CVE-2021-25281 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25281">CVE-2021-25281 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25282/">CVE-2021-25282 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25282">CVE-2021-25282 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25283/">CVE-2021-25283 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25283">CVE-2021-25283 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-25284/">CVE-2021-25284 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25284">CVE-2021-25284 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3144/">CVE-2021-3144 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3144">CVE-2021-3144 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3148/">CVE-2021-3148 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3148">CVE-2021-3148 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3197/">CVE-2021-3197 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3197">CVE-2021-3197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569755" comment="salt-2016.11.10-43.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569756" comment="salt-doc-2016.11.10-43.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569757" comment="salt-minion-2016.11.10-43.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216651" version="1" class="patch">
	<metadata>
		<title>Security update for Salt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1011800" ref_url="https://bugzilla.suse.com/1011800" source="BUGZILLA"/>
		<reference ref_id="1012999" ref_url="https://bugzilla.suse.com/1012999" source="BUGZILLA"/>
		<reference ref_id="1017078" ref_url="https://bugzilla.suse.com/1017078" source="BUGZILLA"/>
		<reference ref_id="1020831" ref_url="https://bugzilla.suse.com/1020831" source="BUGZILLA"/>
		<reference ref_id="1022562" ref_url="https://bugzilla.suse.com/1022562" source="BUGZILLA"/>
		<reference ref_id="1025896" ref_url="https://bugzilla.suse.com/1025896" source="BUGZILLA"/>
		<reference ref_id="1027240" ref_url="https://bugzilla.suse.com/1027240" source="BUGZILLA"/>
		<reference ref_id="1027722" ref_url="https://bugzilla.suse.com/1027722" source="BUGZILLA"/>
		<reference ref_id="1030009" ref_url="https://bugzilla.suse.com/1030009" source="BUGZILLA"/>
		<reference ref_id="1030073" ref_url="https://bugzilla.suse.com/1030073" source="BUGZILLA"/>
		<reference ref_id="1032931" ref_url="https://bugzilla.suse.com/1032931" source="BUGZILLA"/>
		<reference ref_id="1035912" ref_url="https://bugzilla.suse.com/1035912" source="BUGZILLA"/>
		<reference ref_id="1035914" ref_url="https://bugzilla.suse.com/1035914" source="BUGZILLA"/>
		<reference ref_id="1036125" ref_url="https://bugzilla.suse.com/1036125" source="BUGZILLA"/>
		<reference ref_id="1038855" ref_url="https://bugzilla.suse.com/1038855" source="BUGZILLA"/>
		<reference ref_id="1039370" ref_url="https://bugzilla.suse.com/1039370" source="BUGZILLA"/>
		<reference ref_id="1040584" ref_url="https://bugzilla.suse.com/1040584" source="BUGZILLA"/>
		<reference ref_id="1040886" ref_url="https://bugzilla.suse.com/1040886" source="BUGZILLA"/>
		<reference ref_id="1043111" ref_url="https://bugzilla.suse.com/1043111" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5200" ref_url="https://www.suse.com/security/cve/CVE-2017-5200/" source="CVE"/>
		<reference ref_id="CVE-2017-8109" ref_url="https://www.suse.com/security/cve/CVE-2017-8109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002947.html" source="SUSE-SU"/>
		<description>

This update for salt provides version 2016.11.4 and brings various fixes and improvements:

- Adding a salt-minion watchdog for RHEL6 and SLES11 systems (sysV) to restart salt-minion in case of crashes during upgrade.
- Fix format error. (bsc#1043111)
- Fix ownership for whole master cache directory. (bsc#1035914)
- Disable 3rd party runtime packages to be explicitly recommended. (bsc#1040886)    
- Fix insecure permissions in salt-ssh temporary files. (bsc#1035912, CVE-2017-8109)
- Disable custom rosters for Salt SSH via Salt API. (bsc#1011800, CVE-2017-5200)
- Orchestrate and batches don't return false failed information anymore.
- Speed-up cherrypy by removing sleep call.
- Fix os_family grains on SUSE. (bsc#1038855)
- Fix setting the language on SUSE systems. (bsc#1038855)
- Use SUSE specific salt-api.service. (bsc#1039370)
- Fix using hostname for minion ID as '127'.
- Fix core grains constants for timezone. (bsc#1032931)
- Minor fixes on new pkg.list_downloaded.
- Listing all type of advisory patches for Yum module.
- Prevents zero length error on Python 2.6.
- Fixes zypper test error after backporting.
- Raet protocol is no longer supported. (bsc#1020831)
- Fix moving SSH data to the new home. (bsc#1027722)
- Fix logrotating /var/log/salt/minion. (bsc#1030009)
- Fix result of master_tops extension is mutually overwritten. (bsc#1030073)
- Allows to set 'timeout' and 'gather_job_timeout' via kwargs.
- Allows to set custom timeouts for 'manage.up' and 'manage.status'.
- Use salt's ordereddict for comparison.
- Fix scripts for salt-proxy.
- Add openscap module.
- File.get_managed regression fix.
- Fix translate variable arguments if they contain hidden keywords. (bsc#1025896)
- Added unit test for dockerng.sls_build dryrun.
- Added dryrun to dockerng.sls_build.
- Update dockerng minimal version requirements.
- Fix format error in error parsing.
- Keep fix for migrating salt home directory. (bsc#1022562)
- Fix  salt pkg.latest raises exception if package is not available. (bsc#1012999)
- Timezone should always be in UTC. (bsc#1017078)
- Fix timezone handling for rpm installtime. (bsc#1017078)
- Increasing timeouts for running integrations tests.
- Add buildargs option to dockerng.build module.
- Fix error when missing ssh-option parameter.
- Re-add yum notify plugin.
- All kwargs to dockerng.create to provide all features to sls_build as well.
- Datetime should be returned always in UTC.
- Fix possible crash  while deserialising data on infinite recursion in scheduled state. (bsc#1036125)
- Documentation refresh to 2016.11.4
- For a detailed description, please refer to:
  + https://docs.saltstack.com/en/develop/topics/releases/2016.11.4.html
  + https://docs.saltstack.com/en/develop/topics/releases/2016.11.3.html
  + https://docs.saltstack.com/en/develop/topics/releases/2016.11.2.html
  + https://docs.saltstack.com/en/develop/topics/releases/2016.11.1.html
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-16"/>
	<updated date="2017-06-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011800">SUSE bug 1011800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012999">SUSE bug 1012999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017078">SUSE bug 1017078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020831">SUSE bug 1020831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022562">SUSE bug 1022562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025896">SUSE bug 1025896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027240">SUSE bug 1027240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027722">SUSE bug 1027722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030009">SUSE bug 1030009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030073">SUSE bug 1030073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032931">SUSE bug 1032931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035912">SUSE bug 1035912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035914">SUSE bug 1035914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036125">SUSE bug 1036125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038855">SUSE bug 1038855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039370">SUSE bug 1039370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040584">SUSE bug 1040584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040886">SUSE bug 1040886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043111">SUSE bug 1043111</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5200/">CVE-2017-5200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5200">CVE-2017-5200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8109/">CVE-2017-8109 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8109">CVE-2017-8109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569758" comment="salt-2016.11.4-42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569759" comment="salt-doc-2016.11.4-42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569760" comment="salt-minion-2016.11.4-42.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216652" version="1" class="patch">
	<metadata>
		<title>Security update for zeromq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1140255" ref_url="https://bugzilla.suse.com/1140255" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13132" ref_url="https://www.suse.com/security/cve/CVE-2019-13132/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005673.html" source="SUSE-SU"/>
		<description>
This update for zeromq fixes the following issues:

- CVE-2019-13132: An unauthenticated remote attacker could have exploited
  a stack overflow vulnerability on a server that is supposed to be protected
  by encryption and authentication to potentially gain a remote code execution.
  (bsc#1140255)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-08"/>
	<updated date="2019-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140255">SUSE bug 1140255</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13132/">CVE-2019-13132 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13132">CVE-2019-13132 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569761" comment="libzmq3-4.0.4-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216653" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="507728" ref_url="https://bugzilla.suse.com/507728" source="BUGZILLA"/>
		<reference ref_id="517177" ref_url="https://bugzilla.suse.com/517177" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1882" ref_url="https://www.suse.com/security/cve/CVE-2009-1882/" source="CVE"/>
		<description>
This update of ImageMagick fixes an integer overflow in the
XMakeImage() function that allowed remote attackers to
cause a denial-of-service and possibly the execution of
arbitrary code via a crafted TIFF file. (CVE-2009-1882)
		</description>
<advisory from="security@suse.de">
	<issued date="2009-06-04"/>
	<updated date="2009-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/507728">SUSE bug 507728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/517177">SUSE bug 517177</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1882/">CVE-2009-1882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1882">CVE-2009-1882 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569779" comment="libMagickCore1-6.4.3.6-7.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569780" comment="libMagickCore1-32bit-6.4.3.6-7.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569779" comment="libMagickCore1-6.4.3.6-7.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569780" comment="libMagickCore1-32bit-6.4.3.6-7.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216654" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="465284" ref_url="https://bugzilla.suse.com/465284" source="BUGZILLA"/>
		<reference ref_id="478625" ref_url="https://bugzilla.suse.com/478625" source="BUGZILLA"/>
		<reference ref_id="479610" ref_url="https://bugzilla.suse.com/479610" source="BUGZILLA"/>
		<reference ref_id="488955" ref_url="https://bugzilla.suse.com/488955" source="BUGZILLA"/>
		<reference ref_id="495473" ref_url="https://bugzilla.suse.com/495473" source="BUGZILLA"/>
		<reference ref_id="500909" ref_url="https://bugzilla.suse.com/500909" source="BUGZILLA"/>
		<reference ref_id="505563" ref_url="https://bugzilla.suse.com/505563" source="BUGZILLA"/>
		<reference ref_id="522109" ref_url="https://bugzilla.suse.com/522109" source="BUGZILLA"/>
		<reference ref_id="527489" ref_url="https://bugzilla.suse.com/527489" source="BUGZILLA"/>
		<reference ref_id="534458" ref_url="https://bugzilla.suse.com/534458" source="BUGZILLA"/>
		<reference ref_id="545277" ref_url="https://bugzilla.suse.com/545277" source="BUGZILLA"/>
		<reference ref_id="553172" ref_url="https://bugzilla.suse.com/553172" source="BUGZILLA"/>
		<reference ref_id="559807" ref_url="https://bugzilla.suse.com/559807" source="BUGZILLA"/>
		<reference ref_id="568011" ref_url="https://bugzilla.suse.com/568011" source="BUGZILLA"/>
		<reference ref_id="576969" ref_url="https://bugzilla.suse.com/576969" source="BUGZILLA"/>
		<reference ref_id="586567" ref_url="https://bugzilla.suse.com/586567" source="BUGZILLA"/>
		<reference ref_id="603356" ref_url="https://bugzilla.suse.com/603356" source="BUGZILLA"/>
		<reference ref_id="622506" ref_url="https://bugzilla.suse.com/622506" source="BUGZILLA"/>
		<reference ref_id="630397" ref_url="https://bugzilla.suse.com/630397" source="BUGZILLA"/>
		<reference ref_id="637303" ref_url="https://bugzilla.suse.com/637303" source="BUGZILLA"/>
		<reference ref_id="645315" ref_url="https://bugzilla.suse.com/645315" source="BUGZILLA"/>
		<reference ref_id="649492" ref_url="https://bugzilla.suse.com/649492" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-5913" ref_url="https://www.suse.com/security/cve/CVE-2008-5913/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-0652" ref_url="https://www.suse.com/security/cve/CVE-2009-0652/" source="CVE"/>
		<reference ref_id="CVE-2009-0771" ref_url="https://www.suse.com/security/cve/CVE-2009-0771/" source="CVE"/>
		<reference ref_id="CVE-2009-0772" ref_url="https://www.suse.com/security/cve/CVE-2009-0772/" source="CVE"/>
		<reference ref_id="CVE-2009-0773" ref_url="https://www.suse.com/security/cve/CVE-2009-0773/" source="CVE"/>
		<reference ref_id="CVE-2009-0774" ref_url="https://www.suse.com/security/cve/CVE-2009-0774/" source="CVE"/>
		<reference ref_id="CVE-2009-0775" ref_url="https://www.suse.com/security/cve/CVE-2009-0775/" source="CVE"/>
		<reference ref_id="CVE-2009-0776" ref_url="https://www.suse.com/security/cve/CVE-2009-0776/" source="CVE"/>
		<reference ref_id="CVE-2009-0777" ref_url="https://www.suse.com/security/cve/CVE-2009-0777/" source="CVE"/>
		<reference ref_id="CVE-2009-1044" ref_url="https://www.suse.com/security/cve/CVE-2009-1044/" source="CVE"/>
		<reference ref_id="CVE-2009-1169" ref_url="https://www.suse.com/security/cve/CVE-2009-1169/" source="CVE"/>
		<reference ref_id="CVE-2009-1194" ref_url="https://www.suse.com/security/cve/CVE-2009-1194/" source="CVE"/>
		<reference ref_id="CVE-2009-1302" ref_url="https://www.suse.com/security/cve/CVE-2009-1302/" source="CVE"/>
		<reference ref_id="CVE-2009-1303" ref_url="https://www.suse.com/security/cve/CVE-2009-1303/" source="CVE"/>
		<reference ref_id="CVE-2009-1304" ref_url="https://www.suse.com/security/cve/CVE-2009-1304/" source="CVE"/>
		<reference ref_id="CVE-2009-1305" ref_url="https://www.suse.com/security/cve/CVE-2009-1305/" source="CVE"/>
		<reference ref_id="CVE-2009-1307" ref_url="https://www.suse.com/security/cve/CVE-2009-1307/" source="CVE"/>
		<reference ref_id="CVE-2009-1308" ref_url="https://www.suse.com/security/cve/CVE-2009-1308/" source="CVE"/>
		<reference ref_id="CVE-2009-1309" ref_url="https://www.suse.com/security/cve/CVE-2009-1309/" source="CVE"/>
		<reference ref_id="CVE-2009-1311" ref_url="https://www.suse.com/security/cve/CVE-2009-1311/" source="CVE"/>
		<reference ref_id="CVE-2009-1312" ref_url="https://www.suse.com/security/cve/CVE-2009-1312/" source="CVE"/>
		<reference ref_id="CVE-2009-1313" ref_url="https://www.suse.com/security/cve/CVE-2009-1313/" source="CVE"/>
		<reference ref_id="CVE-2009-1392" ref_url="https://www.suse.com/security/cve/CVE-2009-1392/" source="CVE"/>
		<reference ref_id="CVE-2009-1563" ref_url="https://www.suse.com/security/cve/CVE-2009-1563/" source="CVE"/>
		<reference ref_id="CVE-2009-1571" ref_url="https://www.suse.com/security/cve/CVE-2009-1571/" source="CVE"/>
		<reference ref_id="CVE-2009-1832" ref_url="https://www.suse.com/security/cve/CVE-2009-1832/" source="CVE"/>
		<reference ref_id="CVE-2009-1833" ref_url="https://www.suse.com/security/cve/CVE-2009-1833/" source="CVE"/>
		<reference ref_id="CVE-2009-1834" ref_url="https://www.suse.com/security/cve/CVE-2009-1834/" source="CVE"/>
		<reference ref_id="CVE-2009-1835" ref_url="https://www.suse.com/security/cve/CVE-2009-1835/" source="CVE"/>
		<reference ref_id="CVE-2009-1836" ref_url="https://www.suse.com/security/cve/CVE-2009-1836/" source="CVE"/>
		<reference ref_id="CVE-2009-1837" ref_url="https://www.suse.com/security/cve/CVE-2009-1837/" source="CVE"/>
		<reference ref_id="CVE-2009-1838" ref_url="https://www.suse.com/security/cve/CVE-2009-1838/" source="CVE"/>
		<reference ref_id="CVE-2009-1839" ref_url="https://www.suse.com/security/cve/CVE-2009-1839/" source="CVE"/>
		<reference ref_id="CVE-2009-1840" ref_url="https://www.suse.com/security/cve/CVE-2009-1840/" source="CVE"/>
		<reference ref_id="CVE-2009-1841" ref_url="https://www.suse.com/security/cve/CVE-2009-1841/" source="CVE"/>
		<reference ref_id="CVE-2009-2462" ref_url="https://www.suse.com/security/cve/CVE-2009-2462/" source="CVE"/>
		<reference ref_id="CVE-2009-2463" ref_url="https://www.suse.com/security/cve/CVE-2009-2463/" source="CVE"/>
		<reference ref_id="CVE-2009-2464" ref_url="https://www.suse.com/security/cve/CVE-2009-2464/" source="CVE"/>
		<reference ref_id="CVE-2009-2465" ref_url="https://www.suse.com/security/cve/CVE-2009-2465/" source="CVE"/>
		<reference ref_id="CVE-2009-2466" ref_url="https://www.suse.com/security/cve/CVE-2009-2466/" source="CVE"/>
		<reference ref_id="CVE-2009-2467" ref_url="https://www.suse.com/security/cve/CVE-2009-2467/" source="CVE"/>
		<reference ref_id="CVE-2009-2469" ref_url="https://www.suse.com/security/cve/CVE-2009-2469/" source="CVE"/>
		<reference ref_id="CVE-2009-2471" ref_url="https://www.suse.com/security/cve/CVE-2009-2471/" source="CVE"/>
		<reference ref_id="CVE-2009-2472" ref_url="https://www.suse.com/security/cve/CVE-2009-2472/" source="CVE"/>
		<reference ref_id="CVE-2009-2654" ref_url="https://www.suse.com/security/cve/CVE-2009-2654/" source="CVE"/>
		<reference ref_id="CVE-2009-2662" ref_url="https://www.suse.com/security/cve/CVE-2009-2662/" source="CVE"/>
		<reference ref_id="CVE-2009-2663" ref_url="https://www.suse.com/security/cve/CVE-2009-2663/" source="CVE"/>
		<reference ref_id="CVE-2009-2664" ref_url="https://www.suse.com/security/cve/CVE-2009-2664/" source="CVE"/>
		<reference ref_id="CVE-2009-3069" ref_url="https://www.suse.com/security/cve/CVE-2009-3069/" source="CVE"/>
		<reference ref_id="CVE-2009-3070" ref_url="https://www.suse.com/security/cve/CVE-2009-3070/" source="CVE"/>
		<reference ref_id="CVE-2009-3071" ref_url="https://www.suse.com/security/cve/CVE-2009-3071/" source="CVE"/>
		<reference ref_id="CVE-2009-3072" ref_url="https://www.suse.com/security/cve/CVE-2009-3072/" source="CVE"/>
		<reference ref_id="CVE-2009-3073" ref_url="https://www.suse.com/security/cve/CVE-2009-3073/" source="CVE"/>
		<reference ref_id="CVE-2009-3075" ref_url="https://www.suse.com/security/cve/CVE-2009-3075/" source="CVE"/>
		<reference ref_id="CVE-2009-3077" ref_url="https://www.suse.com/security/cve/CVE-2009-3077/" source="CVE"/>
		<reference ref_id="CVE-2009-3078" ref_url="https://www.suse.com/security/cve/CVE-2009-3078/" source="CVE"/>
		<reference ref_id="CVE-2009-3079" ref_url="https://www.suse.com/security/cve/CVE-2009-3079/" source="CVE"/>
		<reference ref_id="CVE-2009-3274" ref_url="https://www.suse.com/security/cve/CVE-2009-3274/" source="CVE"/>
		<reference ref_id="CVE-2009-3370" ref_url="https://www.suse.com/security/cve/CVE-2009-3370/" source="CVE"/>
		<reference ref_id="CVE-2009-3371" ref_url="https://www.suse.com/security/cve/CVE-2009-3371/" source="CVE"/>
		<reference ref_id="CVE-2009-3372" ref_url="https://www.suse.com/security/cve/CVE-2009-3372/" source="CVE"/>
		<reference ref_id="CVE-2009-3373" ref_url="https://www.suse.com/security/cve/CVE-2009-3373/" source="CVE"/>
		<reference ref_id="CVE-2009-3374" ref_url="https://www.suse.com/security/cve/CVE-2009-3374/" source="CVE"/>
		<reference ref_id="CVE-2009-3375" ref_url="https://www.suse.com/security/cve/CVE-2009-3375/" source="CVE"/>
		<reference ref_id="CVE-2009-3376" ref_url="https://www.suse.com/security/cve/CVE-2009-3376/" source="CVE"/>
		<reference ref_id="CVE-2009-3377" ref_url="https://www.suse.com/security/cve/CVE-2009-3377/" source="CVE"/>
		<reference ref_id="CVE-2009-3378" ref_url="https://www.suse.com/security/cve/CVE-2009-3378/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2009-3380" ref_url="https://www.suse.com/security/cve/CVE-2009-3380/" source="CVE"/>
		<reference ref_id="CVE-2009-3381" ref_url="https://www.suse.com/security/cve/CVE-2009-3381/" source="CVE"/>
		<reference ref_id="CVE-2009-3382" ref_url="https://www.suse.com/security/cve/CVE-2009-3382/" source="CVE"/>
		<reference ref_id="CVE-2009-3383" ref_url="https://www.suse.com/security/cve/CVE-2009-3383/" source="CVE"/>
		<reference ref_id="CVE-2009-3388" ref_url="https://www.suse.com/security/cve/CVE-2009-3388/" source="CVE"/>
		<reference ref_id="CVE-2009-3389" ref_url="https://www.suse.com/security/cve/CVE-2009-3389/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-3979" ref_url="https://www.suse.com/security/cve/CVE-2009-3979/" source="CVE"/>
		<reference ref_id="CVE-2009-3980" ref_url="https://www.suse.com/security/cve/CVE-2009-3980/" source="CVE"/>
		<reference ref_id="CVE-2009-3982" ref_url="https://www.suse.com/security/cve/CVE-2009-3982/" source="CVE"/>
		<reference ref_id="CVE-2009-3983" ref_url="https://www.suse.com/security/cve/CVE-2009-3983/" source="CVE"/>
		<reference ref_id="CVE-2009-3984" ref_url="https://www.suse.com/security/cve/CVE-2009-3984/" source="CVE"/>
		<reference ref_id="CVE-2009-3985" ref_url="https://www.suse.com/security/cve/CVE-2009-3985/" source="CVE"/>
		<reference ref_id="CVE-2009-3986" ref_url="https://www.suse.com/security/cve/CVE-2009-3986/" source="CVE"/>
		<reference ref_id="CVE-2009-3988" ref_url="https://www.suse.com/security/cve/CVE-2009-3988/" source="CVE"/>
		<reference ref_id="CVE-2010-0159" ref_url="https://www.suse.com/security/cve/CVE-2010-0159/" source="CVE"/>
		<reference ref_id="CVE-2010-0160" ref_url="https://www.suse.com/security/cve/CVE-2010-0160/" source="CVE"/>
		<reference ref_id="CVE-2010-0162" ref_url="https://www.suse.com/security/cve/CVE-2010-0162/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0175" ref_url="https://www.suse.com/security/cve/CVE-2010-0175/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0179" ref_url="https://www.suse.com/security/cve/CVE-2010-0179/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<reference ref_id="CVE-2010-0183" ref_url="https://www.suse.com/security/cve/CVE-2010-0183/" source="CVE"/>
		<reference ref_id="CVE-2010-0220" ref_url="https://www.suse.com/security/cve/CVE-2010-0220/" source="CVE"/>
		<reference ref_id="CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654/" source="CVE"/>
		<reference ref_id="CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121/" source="CVE"/>
		<reference ref_id="CVE-2010-1125" ref_url="https://www.suse.com/security/cve/CVE-2010-1125/" source="CVE"/>
		<reference ref_id="CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196/" source="CVE"/>
		<reference ref_id="CVE-2010-1197" ref_url="https://www.suse.com/security/cve/CVE-2010-1197/" source="CVE"/>
		<reference ref_id="CVE-2010-1198" ref_url="https://www.suse.com/security/cve/CVE-2010-1198/" source="CVE"/>
		<reference ref_id="CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199/" source="CVE"/>
		<reference ref_id="CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200/" source="CVE"/>
		<reference ref_id="CVE-2010-1201" ref_url="https://www.suse.com/security/cve/CVE-2010-1201/" source="CVE"/>
		<reference ref_id="CVE-2010-1202" ref_url="https://www.suse.com/security/cve/CVE-2010-1202/" source="CVE"/>
		<reference ref_id="CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-1206" ref_url="https://www.suse.com/security/cve/CVE-2010-1206/" source="CVE"/>
		<reference ref_id="CVE-2010-1208" ref_url="https://www.suse.com/security/cve/CVE-2010-1208/" source="CVE"/>
		<reference ref_id="CVE-2010-1209" ref_url="https://www.suse.com/security/cve/CVE-2010-1209/" source="CVE"/>
		<reference ref_id="CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211/" source="CVE"/>
		<reference ref_id="CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213/" source="CVE"/>
		<reference ref_id="CVE-2010-1214" ref_url="https://www.suse.com/security/cve/CVE-2010-1214/" source="CVE"/>
		<reference ref_id="CVE-2010-2751" ref_url="https://www.suse.com/security/cve/CVE-2010-2751/" source="CVE"/>
		<reference ref_id="CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752/" source="CVE"/>
		<reference ref_id="CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753/" source="CVE"/>
		<reference ref_id="CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754/" source="CVE"/>
		<reference ref_id="CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760/" source="CVE"/>
		<reference ref_id="CVE-2010-2762" ref_url="https://www.suse.com/security/cve/CVE-2010-2762/" source="CVE"/>
		<reference ref_id="CVE-2010-2763" ref_url="https://www.suse.com/security/cve/CVE-2010-2763/" source="CVE"/>
		<reference ref_id="CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764/" source="CVE"/>
		<reference ref_id="CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765/" source="CVE"/>
		<reference ref_id="CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766/" source="CVE"/>
		<reference ref_id="CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767/" source="CVE"/>
		<reference ref_id="CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768/" source="CVE"/>
		<reference ref_id="CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769/" source="CVE"/>
		<reference ref_id="CVE-2010-2770" ref_url="https://www.suse.com/security/cve/CVE-2010-2770/" source="CVE"/>
		<reference ref_id="CVE-2010-3131" ref_url="https://www.suse.com/security/cve/CVE-2010-3131/" source="CVE"/>
		<reference ref_id="CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166/" source="CVE"/>
		<reference ref_id="CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167/" source="CVE"/>
		<reference ref_id="CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168/" source="CVE"/>
		<reference ref_id="CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<description>
Firefox version upgrade to 3.0.10 to fix a crash in
nsTextFrame::ClearTextRun() (CVE-2009-1313).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-05-07"/>
	<updated date="2009-05-07"/>
	<bugzilla href="https://bugzilla.suse.com/465284">SUSE bug 465284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/478625">SUSE bug 478625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/479610">SUSE bug 479610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/488955">SUSE bug 488955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/500909">SUSE bug 500909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/505563">SUSE bug 505563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/527489">SUSE bug 527489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/553172">SUSE bug 553172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/559807">SUSE bug 559807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/568011">SUSE bug 568011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/576969">SUSE bug 576969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/586567">SUSE bug 586567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/630397">SUSE bug 630397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649492">SUSE bug 649492</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5913/">CVE-2008-5913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5913">CVE-2008-5913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0040">CVE-2009-0040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0652/">CVE-2009-0652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0652">CVE-2009-0652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0771/">CVE-2009-0771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0771">CVE-2009-0771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0772/">CVE-2009-0772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0772">CVE-2009-0772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0773/">CVE-2009-0773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0773">CVE-2009-0773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0774/">CVE-2009-0774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0774">CVE-2009-0774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0775/">CVE-2009-0775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0775">CVE-2009-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0776/">CVE-2009-0776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0776">CVE-2009-0776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0777/">CVE-2009-0777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0777">CVE-2009-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1044/">CVE-2009-1044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1044">CVE-2009-1044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1169/">CVE-2009-1169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1169">CVE-2009-1169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1194/">CVE-2009-1194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1194">CVE-2009-1194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1302/">CVE-2009-1302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1302">CVE-2009-1302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1303/">CVE-2009-1303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1303">CVE-2009-1303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1304/">CVE-2009-1304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1304">CVE-2009-1304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1305/">CVE-2009-1305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1305">CVE-2009-1305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1307/">CVE-2009-1307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1307">CVE-2009-1307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1308/">CVE-2009-1308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1308">CVE-2009-1308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1309/">CVE-2009-1309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1309">CVE-2009-1309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1311/">CVE-2009-1311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1311">CVE-2009-1311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1312/">CVE-2009-1312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1312">CVE-2009-1312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1313/">CVE-2009-1313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1313">CVE-2009-1313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1392/">CVE-2009-1392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1392">CVE-2009-1392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1563/">CVE-2009-1563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1563">CVE-2009-1563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1571/">CVE-2009-1571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1571">CVE-2009-1571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1832/">CVE-2009-1832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1832">CVE-2009-1832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1833/">CVE-2009-1833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1833">CVE-2009-1833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1834/">CVE-2009-1834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1834">CVE-2009-1834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1835/">CVE-2009-1835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1835">CVE-2009-1835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1836/">CVE-2009-1836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1836">CVE-2009-1836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1837/">CVE-2009-1837 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-1837">CVE-2009-1837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1838/">CVE-2009-1838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1838">CVE-2009-1838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1839/">CVE-2009-1839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1839">CVE-2009-1839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1840/">CVE-2009-1840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1840">CVE-2009-1840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1841/">CVE-2009-1841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1841">CVE-2009-1841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2462/">CVE-2009-2462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2462">CVE-2009-2462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2463/">CVE-2009-2463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2463">CVE-2009-2463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2464/">CVE-2009-2464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2464">CVE-2009-2464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2465/">CVE-2009-2465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2465">CVE-2009-2465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2466/">CVE-2009-2466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2466">CVE-2009-2466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2467/">CVE-2009-2467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2467">CVE-2009-2467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2469/">CVE-2009-2469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2469">CVE-2009-2469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2471/">CVE-2009-2471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2471">CVE-2009-2471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2472/">CVE-2009-2472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2472">CVE-2009-2472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2654/">CVE-2009-2654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2654">CVE-2009-2654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2662/">CVE-2009-2662 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2662">CVE-2009-2662 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2663/">CVE-2009-2663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2663">CVE-2009-2663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2664/">CVE-2009-2664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2664">CVE-2009-2664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3069/">CVE-2009-3069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3069">CVE-2009-3069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3070/">CVE-2009-3070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3070">CVE-2009-3070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3071/">CVE-2009-3071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3071">CVE-2009-3071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3072/">CVE-2009-3072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3072">CVE-2009-3072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3073/">CVE-2009-3073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3073">CVE-2009-3073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3075/">CVE-2009-3075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3075">CVE-2009-3075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3077/">CVE-2009-3077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3077">CVE-2009-3077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3078/">CVE-2009-3078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3078">CVE-2009-3078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3079/">CVE-2009-3079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3079">CVE-2009-3079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3274/">CVE-2009-3274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3274">CVE-2009-3274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3370/">CVE-2009-3370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3370">CVE-2009-3370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3371/">CVE-2009-3371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3371">CVE-2009-3371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3372/">CVE-2009-3372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3372">CVE-2009-3372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3373/">CVE-2009-3373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3373">CVE-2009-3373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3374/">CVE-2009-3374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3374">CVE-2009-3374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3375/">CVE-2009-3375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3375">CVE-2009-3375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3376/">CVE-2009-3376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3376">CVE-2009-3376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3377/">CVE-2009-3377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3377">CVE-2009-3377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3378/">CVE-2009-3378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3378">CVE-2009-3378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3379">CVE-2009-3379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3380/">CVE-2009-3380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3380">CVE-2009-3380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3381/">CVE-2009-3381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3381">CVE-2009-3381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3382/">CVE-2009-3382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3382">CVE-2009-3382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3383/">CVE-2009-3383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3383">CVE-2009-3383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3388/">CVE-2009-3388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3388">CVE-2009-3388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3389/">CVE-2009-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3389">CVE-2009-3389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3979/">CVE-2009-3979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3979">CVE-2009-3979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3980/">CVE-2009-3980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3980">CVE-2009-3980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3982/">CVE-2009-3982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3982">CVE-2009-3982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3983/">CVE-2009-3983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3983">CVE-2009-3983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3984/">CVE-2009-3984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3984">CVE-2009-3984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3985/">CVE-2009-3985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3985">CVE-2009-3985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3986/">CVE-2009-3986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3986">CVE-2009-3986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3988/">CVE-2009-3988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3988">CVE-2009-3988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0159/">CVE-2010-0159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0159">CVE-2010-0159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0160/">CVE-2010-0160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0160">CVE-2010-0160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0162/">CVE-2010-0162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0162">CVE-2010-0162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0173">CVE-2010-0173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0174">CVE-2010-0174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0175/">CVE-2010-0175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0175">CVE-2010-0175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0176">CVE-2010-0176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0177">CVE-2010-0177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0178">CVE-2010-0178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0179/">CVE-2010-0179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0179">CVE-2010-0179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0181">CVE-2010-0181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0182">CVE-2010-0182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0183/">CVE-2010-0183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0183">CVE-2010-0183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0220/">CVE-2010-0220 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0220">CVE-2010-0220 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0654">CVE-2010-0654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1121">CVE-2010-1121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1125/">CVE-2010-1125 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1125">CVE-2010-1125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1196">CVE-2010-1196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1197/">CVE-2010-1197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1197">CVE-2010-1197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1198/">CVE-2010-1198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1198">CVE-2010-1198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1199">CVE-2010-1199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1200">CVE-2010-1200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1201/">CVE-2010-1201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1201">CVE-2010-1201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1202/">CVE-2010-1202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1202">CVE-2010-1202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1203">CVE-2010-1203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1205">CVE-2010-1205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1206/">CVE-2010-1206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1206">CVE-2010-1206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1208/">CVE-2010-1208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1208">CVE-2010-1208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1209/">CVE-2010-1209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1209">CVE-2010-1209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1211">CVE-2010-1211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1213">CVE-2010-1213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1214/">CVE-2010-1214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1214">CVE-2010-1214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2751/">CVE-2010-2751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2751">CVE-2010-2751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2752">CVE-2010-2752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2753">CVE-2010-2753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2754">CVE-2010-2754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2760">CVE-2010-2760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2762/">CVE-2010-2762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2762">CVE-2010-2762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2763/">CVE-2010-2763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2763">CVE-2010-2763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2764">CVE-2010-2764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2765">CVE-2010-2765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2766">CVE-2010-2766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2767">CVE-2010-2767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2768">CVE-2010-2768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2769">CVE-2010-2769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2770/">CVE-2010-2770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2770">CVE-2010-2770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3131/">CVE-2010-3131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3131">CVE-2010-3131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3166">CVE-2010-3166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3167">CVE-2010-3167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3168">CVE-2010-3168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3169">CVE-2010-3169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3170">CVE-2010-3170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3174">CVE-2010-3174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3175">CVE-2010-3175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3176">CVE-2010-3176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3177">CVE-2010-3177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3178">CVE-2010-3178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3179">CVE-2010-3179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3180">CVE-2010-3180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3182">CVE-2010-3182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3183">CVE-2010-3183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3765">CVE-2010-3765 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569781" comment="MozillaFirefox-3.0.10-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569782" comment="MozillaFirefox-branding-SLED-3.5-1.1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569783" comment="MozillaFirefox-translations-3.0.10-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569784" comment="gconf2-2.24.0-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569785" comment="gconf2-32bit-2.24.0-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569786" comment="gconf2-x86-2.24.0-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569787" comment="libfreebl3-3.12.3.1-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569788" comment="libfreebl3-32bit-3.12.3.1-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569789" comment="libfreebl3-x86-3.12.3.1-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569790" comment="libidl-0.8.11-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569791" comment="libidl-32bit-0.8.11-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569792" comment="libidl-x86-0.8.11-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569793" comment="mozilla-nspr-4.8-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569794" comment="mozilla-nspr-32bit-4.8-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569795" comment="mozilla-nspr-x86-4.8-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569796" comment="mozilla-nss-3.12.3.1-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569797" comment="mozilla-nss-32bit-3.12.3.1-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569798" comment="mozilla-nss-tools-3.12.3.1-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569799" comment="mozilla-nss-x86-3.12.3.1-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569800" comment="mozilla-xulrunner190-1.9.0.10-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569801" comment="mozilla-xulrunner190-32bit-1.9.0.10-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569802" comment="mozilla-xulrunner190-gnomevfs-1.9.0.10-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569803" comment="mozilla-xulrunner190-translations-1.9.0.10-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569804" comment="mozilla-xulrunner190-x86-1.9.0.10-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569805" comment="mozilla-xulrunner191-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569806" comment="mozilla-xulrunner191-32bit-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569807" comment="mozilla-xulrunner191-gnomevfs-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569808" comment="mozilla-xulrunner191-translations-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569809" comment="mozilla-xulrunner191-x86-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569810" comment="mozilla-xulrunner192-1.9.2.12-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569811" comment="mozilla-xulrunner192-32bit-1.9.2.12-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569812" comment="mozilla-xulrunner192-gnome-1.9.2.12-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569813" comment="mozilla-xulrunner192-translations-1.9.2.12-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569814" comment="mozilla-xulrunner192-x86-1.9.2.12-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569815" comment="orbit2-2.14.16-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569816" comment="orbit2-32bit-2.14.16-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569817" comment="orbit2-x86-2.14.16-2.16 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569781" comment="MozillaFirefox-3.0.10-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569782" comment="MozillaFirefox-branding-SLED-3.5-1.1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569783" comment="MozillaFirefox-translations-3.0.10-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569784" comment="gconf2-2.24.0-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569785" comment="gconf2-32bit-2.24.0-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569786" comment="gconf2-x86-2.24.0-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569787" comment="libfreebl3-3.12.3.1-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569788" comment="libfreebl3-32bit-3.12.3.1-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569789" comment="libfreebl3-x86-3.12.3.1-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569790" comment="libidl-0.8.11-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569791" comment="libidl-32bit-0.8.11-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569792" comment="libidl-x86-0.8.11-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569793" comment="mozilla-nspr-4.8-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569794" comment="mozilla-nspr-32bit-4.8-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569795" comment="mozilla-nspr-x86-4.8-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569796" comment="mozilla-nss-3.12.3.1-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569797" comment="mozilla-nss-32bit-3.12.3.1-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569798" comment="mozilla-nss-tools-3.12.3.1-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569799" comment="mozilla-nss-x86-3.12.3.1-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569800" comment="mozilla-xulrunner190-1.9.0.10-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569801" comment="mozilla-xulrunner190-32bit-1.9.0.10-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569802" comment="mozilla-xulrunner190-gnomevfs-1.9.0.10-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569803" comment="mozilla-xulrunner190-translations-1.9.0.10-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569804" comment="mozilla-xulrunner190-x86-1.9.0.10-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569805" comment="mozilla-xulrunner191-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569806" comment="mozilla-xulrunner191-32bit-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569807" comment="mozilla-xulrunner191-gnomevfs-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569808" comment="mozilla-xulrunner191-translations-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569809" comment="mozilla-xulrunner191-x86-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569810" comment="mozilla-xulrunner192-1.9.2.12-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569811" comment="mozilla-xulrunner192-32bit-1.9.2.12-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569812" comment="mozilla-xulrunner192-gnome-1.9.2.12-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569813" comment="mozilla-xulrunner192-translations-1.9.2.12-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569814" comment="mozilla-xulrunner192-x86-1.9.2.12-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569815" comment="orbit2-2.14.16-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569816" comment="orbit2-32bit-2.14.16-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569817" comment="orbit2-x86-2.14.16-2.16 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216655" version="1" class="patch">
	<metadata>
		<title>Security update for NetworkManager</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="472112" ref_url="https://bugzilla.suse.com/472112" source="BUGZILLA"/>
		<reference ref_id="475851" ref_url="https://bugzilla.suse.com/475851" source="BUGZILLA"/>
		<reference ref_id="478080" ref_url="https://bugzilla.suse.com/478080" source="BUGZILLA"/>
		<reference ref_id="479566" ref_url="https://bugzilla.suse.com/479566" source="BUGZILLA"/>
		<reference ref_id="479885" ref_url="https://bugzilla.suse.com/479885" source="BUGZILLA"/>
		<reference ref_id="483576" ref_url="https://bugzilla.suse.com/483576" source="BUGZILLA"/>
		<reference ref_id="490004" ref_url="https://bugzilla.suse.com/490004" source="BUGZILLA"/>
		<reference ref_id="490574" ref_url="https://bugzilla.suse.com/490574" source="BUGZILLA"/>
		<reference ref_id="520095" ref_url="https://bugzilla.suse.com/520095" source="BUGZILLA"/>
		<reference ref_id="522742" ref_url="https://bugzilla.suse.com/522742" source="BUGZILLA"/>
		<reference ref_id="556083" ref_url="https://bugzilla.suse.com/556083" source="BUGZILLA"/>
		<reference ref_id="628607" ref_url="https://bugzilla.suse.com/628607" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0365" ref_url="https://www.suse.com/security/cve/CVE-2009-0365/" source="CVE"/>
		<reference ref_id="CVE-2009-0578" ref_url="https://www.suse.com/security/cve/CVE-2009-0578/" source="CVE"/>
		<reference ref_id="CVE-2010-1172" ref_url="https://www.suse.com/security/cve/CVE-2010-1172/" source="CVE"/>
		<description>
The NetworkManager configuration was too permissive and
allowed any user to read secrets (CVE-2009-0365) or
manipulate the configuration of other users (CVE-2009-0578).

Additionally a bug where wifi devices didn't work correctly
when the machine was booted with killswitch turned on has
been fixed. The automatic ethernet connection can now be
edited and NetworkManager can now work without ModemManager.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-02"/>
	<updated date="2009-04-02"/>
	<bugzilla href="https://bugzilla.suse.com/472112">SUSE bug 472112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/475851">SUSE bug 475851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/478080">SUSE bug 478080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/479566">SUSE bug 479566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/479885">SUSE bug 479885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/483576">SUSE bug 483576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/490004">SUSE bug 490004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/490574">SUSE bug 490574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/520095">SUSE bug 520095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/522742">SUSE bug 522742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/556083">SUSE bug 556083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/628607">SUSE bug 628607</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0365/">CVE-2009-0365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0365">CVE-2009-0365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0578/">CVE-2009-0578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0578">CVE-2009-0578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1172/">CVE-2010-1172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1172">CVE-2010-1172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569818" comment="NetworkManager-0.7.0.r4359-15.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569819" comment="NetworkManager-glib-0.7.0.r4359-15.9.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569818" comment="NetworkManager-0.7.0.r4359-15.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569819" comment="NetworkManager-glib-0.7.0.r4359-15.9.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216656" version="1" class="patch">
	<metadata>
		<title>Security update for NetworkManager-gnome</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="565549" ref_url="https://bugzilla.suse.com/565549" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-4144" ref_url="https://www.suse.com/security/cve/CVE-2009-4144/" source="CVE"/>
		<reference ref_id="CVE-2009-4145" ref_url="https://www.suse.com/security/cve/CVE-2009-4145/" source="CVE"/>
		<description>

The following bugs have been fixed:



 nm-applet connected to WPA2 Enterprise networks even if the specified CA certificate file didn't exist (CVE-2009-4144).
 When editing connections in nm-applet the connection object was exported via DBus disclosing potentially sensitive information to local users (CVE-2009-4145).


		</description>
<advisory from="security@suse.de">
	<issued date="2010-01-28"/>
	<updated date="2010-01-28"/>
	<bugzilla href="https://bugzilla.suse.com/565549">SUSE bug 565549</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4144/">CVE-2009-4144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4144">CVE-2009-4144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4145/">CVE-2009-4145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4145">CVE-2009-4145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569820" comment="NetworkManager-gnome-0.7.0.r1053-11.11.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569820" comment="NetworkManager-gnome-0.7.0.r1053-11.11.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216657" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="527539" ref_url="https://bugzilla.suse.com/527539" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1720" ref_url="https://www.suse.com/security/cve/CVE-2009-1720/" source="CVE"/>
		<reference ref_id="CVE-2009-1721" ref_url="https://www.suse.com/security/cve/CVE-2009-1721/" source="CVE"/>
		<description>
This update of OpenEXR fixes several integer overflows
(CVE-2009-1720) and a denial-of-service (probably execution
of arbitrary code) bug (CVE-2009-1721).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-08-04"/>
	<updated date="2009-08-04"/>
	<bugzilla href="https://bugzilla.suse.com/527539">SUSE bug 527539</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1720/">CVE-2009-1720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1720">CVE-2009-1720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1721/">CVE-2009-1721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1721">CVE-2009-1721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569821" comment="OpenEXR-1.6.1-83.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569822" comment="OpenEXR-32bit-1.6.1-83.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569823" comment="OpenEXR-x86-1.6.1-83.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569821" comment="OpenEXR-1.6.1-83.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569822" comment="OpenEXR-32bit-1.6.1-83.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569823" comment="OpenEXR-x86-1.6.1-83.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216658" version="1" class="patch">
	<metadata>
		<title>Security update for OpenOffice_org</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="607095" ref_url="https://bugzilla.suse.com/607095" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0395" ref_url="https://www.suse.com/security/cve/CVE-2010-0395/" source="CVE"/>
		<description>

This update of OpenOffice_org fixes the following security issue:

    * Arbitrary macros written in Python can be executed by bypassing macro
      security permissions. CVE-2010-0395
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0395&gt;

It also provides the maintenance update to OpenOffice.org-3.2.1. Details 
about all upstream changes can be found at 
http://development.openoffice.org/releases/3.2.1.html
&lt;http://development.openoffice.org/releases/3.2.1.html&gt; .

For further SUSE Linux Enterprise specific fixes please refer to the 
changelog of the OpenOffice_org RPM package.

		</description>
<advisory from="security@suse.de">
	<issued date="2009-02-21"/>
	<updated date="2009-02-21"/>
	<bugzilla href="https://bugzilla.suse.com/607095">SUSE bug 607095</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0395/">CVE-2010-0395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0395">CVE-2010-0395 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569824" comment="procps-3.2.7-151.3 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569824" comment="procps-3.2.7-151.3 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216659" version="1" class="patch">
	<metadata>
		<title>Security update for acl and libacl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="567090" ref_url="https://bugzilla.suse.com/567090" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-4411" ref_url="https://www.suse.com/security/cve/CVE-2009-4411/" source="CVE"/>
		<description>
The setfacl tool followed symbolic links in recursive (-R) mode even if the --physical (-P) option was specified (CVE-2009-4411). This has been fixed.
		</description>
<advisory from="security@suse.de">
	<issued date="2010-01-15"/>
	<updated date="2010-01-15"/>
	<bugzilla href="https://bugzilla.suse.com/567090">SUSE bug 567090</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4411/">CVE-2009-4411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4411">CVE-2009-4411 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569825" comment="acl-2.2.47-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569826" comment="libacl-2.2.47-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569827" comment="libacl-32bit-2.2.47-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569828" comment="libacl-x86-2.2.47-30.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569825" comment="acl-2.2.47-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569826" comment="libacl-2.2.47-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569827" comment="libacl-32bit-2.2.47-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569828" comment="libacl-x86-2.2.47-30.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216660" version="1" class="patch">
	<metadata>
		<title>Security update for Apache 2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="512583" ref_url="https://bugzilla.suse.com/512583" source="BUGZILLA"/>
		<reference ref_id="513080" ref_url="https://bugzilla.suse.com/513080" source="BUGZILLA"/>
		<reference ref_id="519194" ref_url="https://bugzilla.suse.com/519194" source="BUGZILLA"/>
		<reference ref_id="521906" ref_url="https://bugzilla.suse.com/521906" source="BUGZILLA"/>
		<reference ref_id="538322" ref_url="https://bugzilla.suse.com/538322" source="BUGZILLA"/>
		<reference ref_id="539571" ref_url="https://bugzilla.suse.com/539571" source="BUGZILLA"/>
		<reference ref_id="570127" ref_url="https://bugzilla.suse.com/570127" source="BUGZILLA"/>
		<reference ref_id="586572" ref_url="https://bugzilla.suse.com/586572" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1195" ref_url="https://www.suse.com/security/cve/CVE-2009-1195/" source="CVE"/>
		<reference ref_id="CVE-2009-1890" ref_url="https://www.suse.com/security/cve/CVE-2009-1890/" source="CVE"/>
		<reference ref_id="CVE-2009-1891" ref_url="https://www.suse.com/security/cve/CVE-2009-1891/" source="CVE"/>
		<reference ref_id="CVE-2009-3094" ref_url="https://www.suse.com/security/cve/CVE-2009-3094/" source="CVE"/>
		<reference ref_id="CVE-2009-3095" ref_url="https://www.suse.com/security/cve/CVE-2009-3095/" source="CVE"/>
		<reference ref_id="CVE-2010-0408" ref_url="https://www.suse.com/security/cve/CVE-2010-0408/" source="CVE"/>
		<reference ref_id="CVE-2010-0434" ref_url="https://www.suse.com/security/cve/CVE-2010-0434/" source="CVE"/>
		<description>

The following bugs have been fixed:



 When using a multithreaded MPM Apache could leak memory of requests
handled by a different thread when processing subrequests
(CVE-2010-0434).
 Specially crafted requests could crash mod_proxy_ajp (CVE-2010-0408).

		</description>
<advisory from="security@suse.de">
	<issued date="2010-04-13"/>
	<updated date="2010-04-13"/>
	<bugzilla href="https://bugzilla.suse.com/512583">SUSE bug 512583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/513080">SUSE bug 513080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/519194">SUSE bug 519194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/521906">SUSE bug 521906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/538322">SUSE bug 538322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/539571">SUSE bug 539571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/570127">SUSE bug 570127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/586572">SUSE bug 586572</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1195/">CVE-2009-1195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1195">CVE-2009-1195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1890/">CVE-2009-1890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1890">CVE-2009-1890 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1891/">CVE-2009-1891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1891">CVE-2009-1891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3094/">CVE-2009-3094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3094">CVE-2009-3094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3095/">CVE-2009-3095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3095">CVE-2009-3095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0408/">CVE-2010-0408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0408">CVE-2010-0408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0434/">CVE-2010-0434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0434">CVE-2010-0434 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569829" comment="apache2-2.2.10-2.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569830" comment="apache2-doc-2.2.10-2.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569831" comment="apache2-example-pages-2.2.10-2.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569832" comment="apache2-prefork-2.2.10-2.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569833" comment="apache2-utils-2.2.10-2.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569834" comment="apache2-worker-2.2.10-2.23.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569829" comment="apache2-2.2.10-2.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569830" comment="apache2-doc-2.2.10-2.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569831" comment="apache2-example-pages-2.2.10-2.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569832" comment="apache2-prefork-2.2.10-2.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569833" comment="apache2-utils-2.2.10-2.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569834" comment="apache2-worker-2.2.10-2.23.22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216661" version="1" class="patch">
	<metadata>
		<title>Security update for PHP5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="471419" ref_url="https://bugzilla.suse.com/471419" source="BUGZILLA"/>
		<reference ref_id="480948" ref_url="https://bugzilla.suse.com/480948" source="BUGZILLA"/>
		<reference ref_id="493122" ref_url="https://bugzilla.suse.com/493122" source="BUGZILLA"/>
		<reference ref_id="521033" ref_url="https://bugzilla.suse.com/521033" source="BUGZILLA"/>
		<reference ref_id="540242" ref_url="https://bugzilla.suse.com/540242" source="BUGZILLA"/>
		<reference ref_id="557157" ref_url="https://bugzilla.suse.com/557157" source="BUGZILLA"/>
		<reference ref_id="588975" ref_url="https://bugzilla.suse.com/588975" source="BUGZILLA"/>
		<reference ref_id="642291" ref_url="https://bugzilla.suse.com/642291" source="BUGZILLA"/>
		<reference ref_id="649210" ref_url="https://bugzilla.suse.com/649210" source="BUGZILLA"/>
		<reference ref_id="650700" ref_url="https://bugzilla.suse.com/650700" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-5498" ref_url="https://www.suse.com/security/cve/CVE-2008-5498/" source="CVE"/>
		<reference ref_id="CVE-2009-0754" ref_url="https://www.suse.com/security/cve/CVE-2009-0754/" source="CVE"/>
		<reference ref_id="CVE-2009-1271" ref_url="https://www.suse.com/security/cve/CVE-2009-1271/" source="CVE"/>
		<reference ref_id="CVE-2009-1272" ref_url="https://www.suse.com/security/cve/CVE-2009-1272/" source="CVE"/>
		<reference ref_id="CVE-2009-2687" ref_url="https://www.suse.com/security/cve/CVE-2009-2687/" source="CVE"/>
		<reference ref_id="CVE-2009-3291" ref_url="https://www.suse.com/security/cve/CVE-2009-3291/" source="CVE"/>
		<reference ref_id="CVE-2009-3292" ref_url="https://www.suse.com/security/cve/CVE-2009-3292/" source="CVE"/>
		<reference ref_id="CVE-2009-3293" ref_url="https://www.suse.com/security/cve/CVE-2009-3293/" source="CVE"/>
		<reference ref_id="CVE-2010-0397" ref_url="https://www.suse.com/security/cve/CVE-2010-0397/" source="CVE"/>
		<reference ref_id="CVE-2010-1866" ref_url="https://www.suse.com/security/cve/CVE-2010-1866/" source="CVE"/>
		<reference ref_id="CVE-2010-2094" ref_url="https://www.suse.com/security/cve/CVE-2010-2094/" source="CVE"/>
		<reference ref_id="CVE-2010-3710" ref_url="https://www.suse.com/security/cve/CVE-2010-3710/" source="CVE"/>
		<reference ref_id="CVE-2010-3870" ref_url="https://www.suse.com/security/cve/CVE-2010-3870/" source="CVE"/>
		<description>
php 5.1.9 fixes among other things some security issues:

- Missing bounds checks of an error in the imageRotate
  function of the gd extension potentially allowed
  attackers to read portions of memory (CVE-2008-5498).

- the mbstring.func_overload in .htaccess was applied to
  other virtual hosts on th same machine (CVE-2009-0754)
		</description>
<advisory from="security@suse.de">
	<issued date="2009-03-19"/>
	<updated date="2009-03-19"/>
	<bugzilla href="https://bugzilla.suse.com/471419">SUSE bug 471419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/480948">SUSE bug 480948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/493122">SUSE bug 493122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/521033">SUSE bug 521033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/540242">SUSE bug 540242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557157">SUSE bug 557157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/588975">SUSE bug 588975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/642291">SUSE bug 642291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649210">SUSE bug 649210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/650700">SUSE bug 650700</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5498/">CVE-2008-5498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5498">CVE-2008-5498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0754/">CVE-2009-0754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0754">CVE-2009-0754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1271/">CVE-2009-1271 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1271">CVE-2009-1271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1272/">CVE-2009-1272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1272">CVE-2009-1272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2687/">CVE-2009-2687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2687">CVE-2009-2687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3291/">CVE-2009-3291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3291">CVE-2009-3291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3292/">CVE-2009-3292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3292">CVE-2009-3292 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3293/">CVE-2009-3293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3293">CVE-2009-3293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0397/">CVE-2010-0397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0397">CVE-2010-0397 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1866/">CVE-2010-1866 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1866">CVE-2010-1866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2094/">CVE-2010-2094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2094">CVE-2010-2094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3710/">CVE-2010-3710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3710">CVE-2010-3710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3870/">CVE-2010-3870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3870">CVE-2010-3870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569835" comment="apache2-mod_php5-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569836" comment="php5-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569837" comment="php5-bcmath-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569838" comment="php5-bz2-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569839" comment="php5-calendar-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569840" comment="php5-ctype-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569841" comment="php5-curl-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569842" comment="php5-dba-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569843" comment="php5-dbase-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569844" comment="php5-dom-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569845" comment="php5-exif-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569846" comment="php5-fastcgi-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569847" comment="php5-ftp-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569848" comment="php5-gd-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569849" comment="php5-gettext-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569850" comment="php5-gmp-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569851" comment="php5-hash-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569852" comment="php5-iconv-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569853" comment="php5-json-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569854" comment="php5-ldap-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569855" comment="php5-mbstring-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569856" comment="php5-mcrypt-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569857" comment="php5-mysql-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569858" comment="php5-odbc-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569859" comment="php5-openssl-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569860" comment="php5-pcntl-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569861" comment="php5-pdo-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569862" comment="php5-pear-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569863" comment="php5-pgsql-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569864" comment="php5-pspell-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569865" comment="php5-shmop-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569866" comment="php5-snmp-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569867" comment="php5-soap-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569868" comment="php5-suhosin-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569869" comment="php5-sysvmsg-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569870" comment="php5-sysvsem-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569871" comment="php5-sysvshm-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569872" comment="php5-tokenizer-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569873" comment="php5-wddx-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569874" comment="php5-xmlreader-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569875" comment="php5-xmlrpc-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569876" comment="php5-xmlwriter-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569877" comment="php5-xsl-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569878" comment="php5-zip-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569879" comment="php5-zlib-5.2.6-50.18.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569835" comment="apache2-mod_php5-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569836" comment="php5-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569837" comment="php5-bcmath-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569838" comment="php5-bz2-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569839" comment="php5-calendar-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569840" comment="php5-ctype-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569841" comment="php5-curl-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569842" comment="php5-dba-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569843" comment="php5-dbase-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569844" comment="php5-dom-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569845" comment="php5-exif-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569846" comment="php5-fastcgi-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569847" comment="php5-ftp-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569848" comment="php5-gd-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569849" comment="php5-gettext-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569850" comment="php5-gmp-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569851" comment="php5-hash-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569852" comment="php5-iconv-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569853" comment="php5-json-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569854" comment="php5-ldap-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569855" comment="php5-mbstring-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569856" comment="php5-mcrypt-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569857" comment="php5-mysql-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569858" comment="php5-odbc-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569859" comment="php5-openssl-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569860" comment="php5-pcntl-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569861" comment="php5-pdo-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569862" comment="php5-pear-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569863" comment="php5-pgsql-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569864" comment="php5-pspell-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569865" comment="php5-shmop-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569866" comment="php5-snmp-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569867" comment="php5-soap-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569868" comment="php5-suhosin-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569869" comment="php5-sysvmsg-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569870" comment="php5-sysvsem-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569871" comment="php5-sysvshm-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569872" comment="php5-tokenizer-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569873" comment="php5-wddx-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569874" comment="php5-xmlreader-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569875" comment="php5-xmlrpc-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569876" comment="php5-xmlwriter-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569877" comment="php5-xsl-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569878" comment="php5-zip-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569879" comment="php5-zlib-5.2.6-50.18.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216662" version="1" class="patch">
	<metadata>
		<title>Security update for avahi</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="480865" ref_url="https://bugzilla.suse.com/480865" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0758" ref_url="https://www.suse.com/security/cve/CVE-2009-0758/" source="CVE"/>
		<description>
The avahi-daemon reflector could cause packet storms when reflecting legacy unicast mDNS traffic (CVE-2009-0758). This has been fixed.
		</description>
<advisory from="security@suse.de">
	<issued date="2010-01-19"/>
	<updated date="2010-01-19"/>
	<bugzilla href="https://bugzilla.suse.com/480865">SUSE bug 480865</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0758/">CVE-2009-0758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0758">CVE-2009-0758 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569880" comment="avahi-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569881" comment="avahi-lang-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569882" comment="libavahi-client3-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569883" comment="libavahi-client3-32bit-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569884" comment="libavahi-client3-x86-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569885" comment="libavahi-common3-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569886" comment="libavahi-common3-32bit-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569887" comment="libavahi-common3-x86-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569888" comment="libavahi-core5-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569889" comment="libdns_sd-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569890" comment="libdns_sd-32bit-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569891" comment="libdns_sd-x86-0.6.23-11.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569880" comment="avahi-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569881" comment="avahi-lang-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569882" comment="libavahi-client3-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569883" comment="libavahi-client3-32bit-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569884" comment="libavahi-client3-x86-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569885" comment="libavahi-common3-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569886" comment="libavahi-common3-32bit-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569887" comment="libavahi-common3-x86-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569888" comment="libavahi-core5-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569889" comment="libdns_sd-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569890" comment="libdns_sd-32bit-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569891" comment="libdns_sd-x86-0.6.23-11.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216663" version="1" class="patch">
	<metadata>
		<title>Recommended update for bind</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="455888" ref_url="https://bugzilla.suse.com/455888" source="BUGZILLA"/>
		<reference ref_id="459739" ref_url="https://bugzilla.suse.com/459739" source="BUGZILLA"/>
		<reference ref_id="470828" ref_url="https://bugzilla.suse.com/470828" source="BUGZILLA"/>
		<reference ref_id="480334" ref_url="https://bugzilla.suse.com/480334" source="BUGZILLA"/>
		<reference ref_id="488599" ref_url="https://bugzilla.suse.com/488599" source="BUGZILLA"/>
		<reference ref_id="526185" ref_url="https://bugzilla.suse.com/526185" source="BUGZILLA"/>
		<reference ref_id="558260" ref_url="https://bugzilla.suse.com/558260" source="BUGZILLA"/>
		<reference ref_id="570912" ref_url="https://bugzilla.suse.com/570912" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0696" ref_url="https://www.suse.com/security/cve/CVE-2009-0696/" source="CVE"/>
		<reference ref_id="CVE-2009-4022" ref_url="https://www.suse.com/security/cve/CVE-2009-4022/" source="CVE"/>
		<reference ref_id="CVE-2010-0097" ref_url="https://www.suse.com/security/cve/CVE-2010-0097/" source="CVE"/>
		<reference ref_id="CVE-2010-0290" ref_url="https://www.suse.com/security/cve/CVE-2010-0290/" source="CVE"/>
		<description>
- #488599: bind DNSSEC Lookaside Validation problem
- mount /proc into chroot environment to support multi CPU
  systems (bnc#470828)
- key names with spaces are allowed by genDDNSkey now
  (bnc#459739)
- a missing /etc/named.conf.include could lead to an error
  while 'restart' (bnc#455888)
- /etc/named.conf does not include
  /etc/named.d/forwarders.conf by default (bnc#480334)
		</description>
<advisory from="security@suse.de">
	<issued date="2009-03-30"/>
	<updated date="2009-03-30"/>
	<bugzilla href="https://bugzilla.suse.com/455888">SUSE bug 455888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/459739">SUSE bug 459739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/470828">SUSE bug 470828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/480334">SUSE bug 480334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/488599">SUSE bug 488599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/526185">SUSE bug 526185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/558260">SUSE bug 558260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/570912">SUSE bug 570912</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0696/">CVE-2009-0696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0696">CVE-2009-0696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4022/">CVE-2009-4022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4022">CVE-2009-4022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0097/">CVE-2010-0097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0097">CVE-2010-0097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0290/">CVE-2010-0290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0290">CVE-2010-0290 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991137" comment="bind-9.5.0P2-20.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991138" comment="bind-chrootenv-9.5.0P2-20.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991139" comment="bind-doc-9.5.0P2-20.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991140" comment="bind-libs-9.5.0P2-20.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991141" comment="bind-libs-32bit-9.5.0P2-20.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991142" comment="bind-libs-x86-9.5.0P2-20.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991143" comment="bind-utils-9.5.0P2-20.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991137" comment="bind-9.5.0P2-20.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991138" comment="bind-chrootenv-9.5.0P2-20.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991139" comment="bind-doc-9.5.0P2-20.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991140" comment="bind-libs-9.5.0P2-20.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991141" comment="bind-libs-32bit-9.5.0P2-20.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991142" comment="bind-libs-x86-9.5.0P2-20.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991143" comment="bind-utils-9.5.0P2-20.2.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216664" version="1" class="patch">
	<metadata>
		<title>Recommended update for Mono</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="489019" ref_url="https://bugzilla.suse.com/489019" source="BUGZILLA"/>
		<reference ref_id="521184" ref_url="https://bugzilla.suse.com/521184" source="BUGZILLA"/>
		<reference ref_id="592428" ref_url="https://bugzilla.suse.com/592428" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-1459" ref_url="https://www.suse.com/security/cve/CVE-2010-1459/" source="CVE"/>
		<description>
Fixes bnc#489019: mono throwing exception while closing
file descriptor 0
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-07"/>
	<updated date="2009-04-07"/>
	<bugzilla href="https://bugzilla.suse.com/489019">SUSE bug 489019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/521184">SUSE bug 521184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/592428">SUSE bug 592428</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1459/">CVE-2010-1459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1459">CVE-2010-1459 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991144" comment="mono-core-2.0.1-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991145" comment="mono-data-2.0.1-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991146" comment="mono-data-postgresql-2.0.1-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991147" comment="mono-data-sqlite-2.0.1-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991148" comment="mono-locale-extras-2.0.1-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991149" comment="mono-nunit-2.0.1-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991150" comment="mono-web-2.0.1-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991151" comment="mono-winforms-2.0.1-1.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991144" comment="mono-core-2.0.1-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991145" comment="mono-data-2.0.1-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991146" comment="mono-data-postgresql-2.0.1-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991147" comment="mono-data-sqlite-2.0.1-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991148" comment="mono-locale-extras-2.0.1-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991149" comment="mono-nunit-2.0.1-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991150" comment="mono-web-2.0.1-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991151" comment="mono-winforms-2.0.1-1.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216665" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="636978" ref_url="https://bugzilla.suse.com/636978" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<description>

This update fixes an integer overflow in the BZ2_decompress function of 
bzip2/libbz2. This could have been exploited via a crafted archive to cause 
a denial of service or even execute arbitrary code. (CVE-2010-0405)

Security Issue reference:

    * CVE-2010-0405
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0405&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-09-17"/>
	<updated date="2010-09-17"/>
	<bugzilla href="https://bugzilla.suse.com/636978">SUSE bug 636978</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0405">CVE-2010-0405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569892" comment="bzip2-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569893" comment="bzip2-doc-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569894" comment="libbz2-1-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569895" comment="libbz2-1-32bit-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569896" comment="libbz2-1-x86-1.0.5-34.253.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569892" comment="bzip2-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569893" comment="bzip2-doc-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569894" comment="libbz2-1-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569895" comment="libbz2-1-32bit-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569896" comment="libbz2-1-x86-1.0.5-34.253.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216666" version="1" class="patch">
	<metadata>
		<title>Security update for Samba</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="513360" ref_url="https://bugzilla.suse.com/513360" source="BUGZILLA"/>
		<reference ref_id="515479" ref_url="https://bugzilla.suse.com/515479" source="BUGZILLA"/>
		<reference ref_id="539517" ref_url="https://bugzilla.suse.com/539517" source="BUGZILLA"/>
		<reference ref_id="550002" ref_url="https://bugzilla.suse.com/550002" source="BUGZILLA"/>
		<reference ref_id="567013" ref_url="https://bugzilla.suse.com/567013" source="BUGZILLA"/>
		<reference ref_id="577868" ref_url="https://bugzilla.suse.com/577868" source="BUGZILLA"/>
		<reference ref_id="577925" ref_url="https://bugzilla.suse.com/577925" source="BUGZILLA"/>
		<reference ref_id="583535" ref_url="https://bugzilla.suse.com/583535" source="BUGZILLA"/>
		<reference ref_id="592198" ref_url="https://bugzilla.suse.com/592198" source="BUGZILLA"/>
		<reference ref_id="599873" ref_url="https://bugzilla.suse.com/599873" source="BUGZILLA"/>
		<reference ref_id="605935" ref_url="https://bugzilla.suse.com/605935" source="BUGZILLA"/>
		<reference ref_id="606947" ref_url="https://bugzilla.suse.com/606947" source="BUGZILLA"/>
		<reference ref_id="611927" ref_url="https://bugzilla.suse.com/611927" source="BUGZILLA"/>
		<reference ref_id="613459" ref_url="https://bugzilla.suse.com/613459" source="BUGZILLA"/>
		<reference ref_id="617153" ref_url="https://bugzilla.suse.com/617153" source="BUGZILLA"/>
		<reference ref_id="637218" ref_url="https://bugzilla.suse.com/637218" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0926" ref_url="https://www.suse.com/security/cve/CVE-2010-0926/" source="CVE"/>
		<reference ref_id="CVE-2010-2063" ref_url="https://www.suse.com/security/cve/CVE-2010-2063/" source="CVE"/>
		<reference ref_id="CVE-2010-3069" ref_url="https://www.suse.com/security/cve/CVE-2010-3069/" source="CVE"/>
		<description>

A buffer overflow in the sid_parse() function of samba could potentially be 
exploited by remote attackers to execute arbitrary code (CVE-2010-3069).

Additionally the update also contains fixes for the following non-security 
issues:

    * bnc#567013 - Failed to join ADS Domain
    * bnc#592198 - Samba 3.0 / 3.2 doesn't work with Windows 2008 R2
      (NTLMv2)
    * bnc#599873 - SAMBA - Problem using NTLM authentication with 2008R2
    * bnc#613459 - winbindd crashes in rpcclisettimeout
    * bnc#617153 - new printers are not seen in samba with registry

Security Issue reference:

    * CVE-2010-3069
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3069&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-09-14"/>
	<updated date="2010-09-14"/>
	<bugzilla href="https://bugzilla.suse.com/513360">SUSE bug 513360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/515479">SUSE bug 515479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/539517">SUSE bug 539517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550002">SUSE bug 550002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/567013">SUSE bug 567013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/577868">SUSE bug 577868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/577925">SUSE bug 577925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/583535">SUSE bug 583535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/592198">SUSE bug 592198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/599873">SUSE bug 599873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/605935">SUSE bug 605935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/606947">SUSE bug 606947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/611927">SUSE bug 611927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/613459">SUSE bug 613459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/617153">SUSE bug 617153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/637218">SUSE bug 637218</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1886">CVE-2009-1886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1888">CVE-2009-1888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2813">CVE-2009-2813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2906">CVE-2009-2906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2948">CVE-2009-2948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0547">CVE-2010-0547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0926/">CVE-2010-0926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0926">CVE-2010-0926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2063/">CVE-2010-2063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2063">CVE-2010-2063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3069/">CVE-2010-3069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3069">CVE-2010-3069 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569897" comment="cifs-mount-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569898" comment="ldapsmb-1.34b-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569899" comment="libsmbclient0-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569900" comment="libsmbclient0-32bit-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569901" comment="libsmbclient0-x86-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569902" comment="libtalloc1-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569903" comment="libtalloc1-32bit-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569904" comment="libtalloc1-x86-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569905" comment="libtdb1-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569906" comment="libtdb1-32bit-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569907" comment="libtdb1-x86-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569908" comment="libwbclient0-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569909" comment="libwbclient0-32bit-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569910" comment="libwbclient0-x86-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569911" comment="samba-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569912" comment="samba-32bit-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569913" comment="samba-client-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569914" comment="samba-client-32bit-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569915" comment="samba-client-x86-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569916" comment="samba-krb-printing-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569917" comment="samba-winbind-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569918" comment="samba-winbind-32bit-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569919" comment="samba-winbind-x86-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569920" comment="samba-x86-3.2.7-11.21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569897" comment="cifs-mount-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569898" comment="ldapsmb-1.34b-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569899" comment="libsmbclient0-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569900" comment="libsmbclient0-32bit-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569901" comment="libsmbclient0-x86-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569902" comment="libtalloc1-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569903" comment="libtalloc1-32bit-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569904" comment="libtalloc1-x86-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569905" comment="libtdb1-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569906" comment="libtdb1-32bit-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569907" comment="libtdb1-x86-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569908" comment="libwbclient0-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569909" comment="libwbclient0-32bit-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569910" comment="libwbclient0-x86-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569911" comment="samba-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569912" comment="samba-32bit-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569913" comment="samba-client-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569914" comment="samba-client-32bit-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569915" comment="samba-client-x86-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569916" comment="samba-krb-printing-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569917" comment="samba-winbind-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569918" comment="samba-winbind-32bit-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569919" comment="samba-winbind-x86-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569920" comment="samba-x86-3.2.7-11.21.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216667" version="1" class="patch">
	<metadata>
		<title>Security update for clamav, clamav-db, clamav-debuginfo, clamav-debugsource</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="488336" ref_url="https://bugzilla.suse.com/488336" source="BUGZILLA"/>
		<reference ref_id="493562" ref_url="https://bugzilla.suse.com/493562" source="BUGZILLA"/>
		<reference ref_id="511963" ref_url="https://bugzilla.suse.com/511963" source="BUGZILLA"/>
		<reference ref_id="550929" ref_url="https://bugzilla.suse.com/550929" source="BUGZILLA"/>
		<reference ref_id="587363" ref_url="https://bugzilla.suse.com/587363" source="BUGZILLA"/>
		<reference ref_id="608188" ref_url="https://bugzilla.suse.com/608188" source="BUGZILLA"/>
		<reference ref_id="640812" ref_url="https://bugzilla.suse.com/640812" source="BUGZILLA"/>
		<reference ref_id="649631" ref_url="https://bugzilla.suse.com/649631" source="BUGZILLA"/>
		<reference ref_id="656548" ref_url="https://bugzilla.suse.com/656548" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1241" ref_url="https://www.suse.com/security/cve/CVE-2009-1241/" source="CVE"/>
		<reference ref_id="CVE-2010-0098" ref_url="https://www.suse.com/security/cve/CVE-2010-0098/" source="CVE"/>
		<reference ref_id="CVE-2010-1639" ref_url="https://www.suse.com/security/cve/CVE-2010-1639/" source="CVE"/>
		<reference ref_id="CVE-2010-1640" ref_url="https://www.suse.com/security/cve/CVE-2010-1640/" source="CVE"/>
		<reference ref_id="CVE-2010-2077" ref_url="https://www.suse.com/security/cve/CVE-2010-2077/" source="CVE"/>
		<reference ref_id="CVE-2010-3434" ref_url="https://www.suse.com/security/cve/CVE-2010-3434/" source="CVE"/>
		<description>
This clamav version upgrade to 0.95.1 fixes a buffer
overflow error in the cli_url_canon() function and a denial
of service condition occuring while parsing malformed UPack
archives.

(cve ids missing still)
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-17"/>
	<updated date="2009-04-17"/>
	<bugzilla href="https://bugzilla.suse.com/488336">SUSE bug 488336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/493562">SUSE bug 493562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/511963">SUSE bug 511963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550929">SUSE bug 550929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/587363">SUSE bug 587363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/608188">SUSE bug 608188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/640812">SUSE bug 640812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649631">SUSE bug 649631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/656548">SUSE bug 656548</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1241/">CVE-2009-1241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1241">CVE-2009-1241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0098/">CVE-2010-0098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0098">CVE-2010-0098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1639/">CVE-2010-1639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1639">CVE-2010-1639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1640/">CVE-2010-1640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1640">CVE-2010-1640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2077/">CVE-2010-2077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2077">CVE-2010-2077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3434/">CVE-2010-3434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3434">CVE-2010-3434 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569921" comment="clamav-0.95.1-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569922" comment="libgcc43-4.3.3_20081022-11.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569923" comment="libgcc43-32bit-4.3.3_20081022-11.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569924" comment="libgcc43-x86-4.3.3_20081022-11.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569925" comment="libstdc++43-4.3.3_20081022-11.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569926" comment="libstdc++43-32bit-4.3.3_20081022-11.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569927" comment="libstdc++43-x86-4.3.3_20081022-11.18 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569921" comment="clamav-0.95.1-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569922" comment="libgcc43-4.3.3_20081022-11.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569923" comment="libgcc43-32bit-4.3.3_20081022-11.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569924" comment="libgcc43-x86-4.3.3_20081022-11.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569925" comment="libstdc++43-4.3.3_20081022-11.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569926" comment="libstdc++43-32bit-4.3.3_20081022-11.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569927" comment="libstdc++43-x86-4.3.3_20081022-11.18 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216668" version="1" class="patch">
	<metadata>
		<title>Security update for cpio</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="415166" ref_url="https://bugzilla.suse.com/415166" source="BUGZILLA"/>
		<reference ref_id="579475" ref_url="https://bugzilla.suse.com/579475" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624/" source="CVE"/>
		<description>

 This update fixes a heap-based buffer overflow flaw that can happen
while expanding specially-crafted archive files (CVE-2010-0624).
 This updates Dat160 Tape Drive density information (bnc#415166)


		</description>
<advisory from="security@suse.de">
	<issued date="2010-03-28"/>
	<updated date="2010-03-28"/>
	<bugzilla href="https://bugzilla.suse.com/415166">SUSE bug 415166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/579475">SUSE bug 579475</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0624">CVE-2010-0624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569928" comment="cpio-2.9-75.27.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569929" comment="cpio-lang-2.9-75.27.24.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569928" comment="cpio-2.9-75.27.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569929" comment="cpio-lang-2.9-75.27.24.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216669" version="1" class="patch">
	<metadata>
		<title>Security update for cron</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="580800" ref_url="https://bugzilla.suse.com/580800" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0424" ref_url="https://www.suse.com/security/cve/CVE-2010-0424/" source="CVE"/>
		<description>

This update of cron fixes a race condition in crontab that can be used to change the time-stamp of arbitrary files while editing the crontab entry.



 CVE-2010-0424: CVSS v2 Base Score: 3.6
Additionally the return value of initgroups() is verified now.


		</description>
<advisory from="security@suse.de">
	<issued date="2010-02-19"/>
	<updated date="2010-02-19"/>
	<bugzilla href="https://bugzilla.suse.com/580800">SUSE bug 580800</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0424/">CVE-2010-0424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0424">CVE-2010-0424 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569930" comment="cron-4.1-194.19.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569930" comment="cron-4.1-194.19.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216670" version="1" class="patch">
	<metadata>
		<title>Security update for CUPS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="485895" ref_url="https://bugzilla.suse.com/485895" source="BUGZILLA"/>
		<reference ref_id="548317" ref_url="https://bugzilla.suse.com/548317" source="BUGZILLA"/>
		<reference ref_id="574336" ref_url="https://bugzilla.suse.com/574336" source="BUGZILLA"/>
		<reference ref_id="576507" ref_url="https://bugzilla.suse.com/576507" source="BUGZILLA"/>
		<reference ref_id="578215" ref_url="https://bugzilla.suse.com/578215" source="BUGZILLA"/>
		<reference ref_id="649256" ref_url="https://bugzilla.suse.com/649256" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0163" ref_url="https://www.suse.com/security/cve/CVE-2009-0163/" source="CVE"/>
		<reference ref_id="CVE-2009-2820" ref_url="https://www.suse.com/security/cve/CVE-2009-2820/" source="CVE"/>
		<reference ref_id="CVE-2010-0302" ref_url="https://www.suse.com/security/cve/CVE-2010-0302/" source="CVE"/>
		<reference ref_id="CVE-2010-0393" ref_url="https://www.suse.com/security/cve/CVE-2010-0393/" source="CVE"/>
		<reference ref_id="CVE-2010-0542" ref_url="https://www.suse.com/security/cve/CVE-2010-0542/" source="CVE"/>
		<reference ref_id="CVE-2010-1748" ref_url="https://www.suse.com/security/cve/CVE-2010-1748/" source="CVE"/>
		<reference ref_id="CVE-2010-2941" ref_url="https://www.suse.com/security/cve/CVE-2010-2941/" source="CVE"/>
		<description>
Specially crafted tiff files could cause an integer
overflow in the 'imagetops' filter (CVE-2009-0163).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-17"/>
	<updated date="2009-04-17"/>
	<bugzilla href="https://bugzilla.suse.com/485895">SUSE bug 485895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/548317">SUSE bug 548317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/574336">SUSE bug 574336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/576507">SUSE bug 576507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/578215">SUSE bug 578215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649256">SUSE bug 649256</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0163/">CVE-2009-0163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0163">CVE-2009-0163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2820/">CVE-2009-2820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2820">CVE-2009-2820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0302/">CVE-2010-0302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-0302">CVE-2010-0302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0393/">CVE-2010-0393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0393">CVE-2010-0393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0542/">CVE-2010-0542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0542">CVE-2010-0542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1748/">CVE-2010-1748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1748">CVE-2010-1748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2941/">CVE-2010-2941 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2941">CVE-2010-2941 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569931" comment="cups-1.3.9-8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569932" comment="cups-client-1.3.9-8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569933" comment="cups-libs-1.3.9-8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569934" comment="cups-libs-32bit-1.3.9-8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569935" comment="cups-libs-x86-1.3.9-8.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569931" comment="cups-1.3.9-8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569932" comment="cups-client-1.3.9-8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569933" comment="cups-libs-1.3.9-8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569934" comment="cups-libs-32bit-1.3.9-8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569935" comment="cups-libs-x86-1.3.9-8.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216671" version="1" class="patch">
	<metadata>
		<title>Security update for curl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="475103" ref_url="https://bugzilla.suse.com/475103" source="BUGZILLA"/>
		<reference ref_id="527990" ref_url="https://bugzilla.suse.com/527990" source="BUGZILLA"/>
		<reference ref_id="569614" ref_url="https://bugzilla.suse.com/569614" source="BUGZILLA"/>
		<reference ref_id="620857" ref_url="https://bugzilla.suse.com/620857" source="BUGZILLA"/>
		<reference ref_id="628337" ref_url="https://bugzilla.suse.com/628337" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0037" ref_url="https://www.suse.com/security/cve/CVE-2009-0037/" source="CVE"/>
		<reference ref_id="CVE-2009-2417" ref_url="https://www.suse.com/security/cve/CVE-2009-2417/" source="CVE"/>
		<description>
Arbitrary file access via HTTP-redirect has been fixed in
curl. CVE-2009-0037 has been assigned to this issue.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-03-18"/>
	<updated date="2009-03-18"/>
	<bugzilla href="https://bugzilla.suse.com/475103">SUSE bug 475103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/527990">SUSE bug 527990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/569614">SUSE bug 569614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/620857">SUSE bug 620857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/628337">SUSE bug 628337</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0037/">CVE-2009-0037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0037">CVE-2009-0037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2417/">CVE-2009-2417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2417">CVE-2009-2417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569936" comment="curl-7.19.0-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569937" comment="keyutils-libs-1.2-107.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569938" comment="keyutils-libs-32bit-1.2-107.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569939" comment="keyutils-libs-x86-1.2-107.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569940" comment="libcurl4-7.19.0-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569941" comment="libcurl4-32bit-7.19.0-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569942" comment="libcurl4-x86-7.19.0-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569943" comment="libidn-1.10-3.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569944" comment="libidn-32bit-1.10-3.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569945" comment="libidn-x86-1.10-3.18 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569936" comment="curl-7.19.0-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569937" comment="keyutils-libs-1.2-107.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569938" comment="keyutils-libs-32bit-1.2-107.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569939" comment="keyutils-libs-x86-1.2-107.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569940" comment="libcurl4-7.19.0-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569941" comment="libcurl4-32bit-7.19.0-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569942" comment="libcurl4-x86-7.19.0-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569943" comment="libidn-1.10-3.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569944" comment="libidn-32bit-1.10-3.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569945" comment="libidn-x86-1.10-3.18 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216672" version="1" class="patch">
	<metadata>
		<title>Security update for Cyrus IMAPD</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="537128" ref_url="https://bugzilla.suse.com/537128" source="BUGZILLA"/>
		<reference ref_id="539877" ref_url="https://bugzilla.suse.com/539877" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-3235" ref_url="https://www.suse.com/security/cve/CVE-2009-3235/" source="CVE"/>
		<description>
This update fixes another buffer overflow in the Sieve code
(CVE-2009-3235). This can be exploited by users allowed to
use their own sieve scripts to execute arbitrary code
remotely. Additionally the handling of long headers was
improved.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-09-24"/>
	<updated date="2009-09-24"/>
	<bugzilla href="https://bugzilla.suse.com/537128">SUSE bug 537128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/539877">SUSE bug 539877</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3235/">CVE-2009-3235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3235">CVE-2009-3235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569946" comment="cyrus-imapd-2.3.11-60.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569947" comment="perl-Cyrus-IMAP-2.3.11-60.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569948" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569946" comment="cyrus-imapd-2.3.11-60.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569947" comment="perl-Cyrus-IMAP-2.3.11-60.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569948" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.21.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216673" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="499104" ref_url="https://bugzilla.suse.com/499104" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0688" ref_url="https://www.suse.com/security/cve/CVE-2009-0688/" source="CVE"/>
		<description>
This update of cyrus-sasl improves the output of function
sasl_encode64() by appending a 0 for string termination.
The impact depends on the application that uses
sasl_encode64(). (CVE-2009-0688)
		</description>
<advisory from="security@suse.de">
	<issued date="2009-05-14"/>
	<updated date="2009-05-14"/>
	<bugzilla href="https://bugzilla.suse.com/499104">SUSE bug 499104</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0688/">CVE-2009-0688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0688">CVE-2009-0688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569949" comment="cyrus-sasl-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569950" comment="cyrus-sasl-32bit-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569951" comment="cyrus-sasl-crammd5-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569952" comment="cyrus-sasl-crammd5-32bit-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569953" comment="cyrus-sasl-crammd5-x86-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569954" comment="cyrus-sasl-digestmd5-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569955" comment="cyrus-sasl-gssapi-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569956" comment="cyrus-sasl-gssapi-32bit-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569957" comment="cyrus-sasl-gssapi-x86-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569958" comment="cyrus-sasl-otp-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569959" comment="cyrus-sasl-otp-32bit-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569960" comment="cyrus-sasl-otp-x86-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569961" comment="cyrus-sasl-plain-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569962" comment="cyrus-sasl-plain-32bit-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569963" comment="cyrus-sasl-plain-x86-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569964" comment="cyrus-sasl-x86-2.1.22-182.20.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569949" comment="cyrus-sasl-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569950" comment="cyrus-sasl-32bit-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569951" comment="cyrus-sasl-crammd5-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569952" comment="cyrus-sasl-crammd5-32bit-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569953" comment="cyrus-sasl-crammd5-x86-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569954" comment="cyrus-sasl-digestmd5-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569955" comment="cyrus-sasl-gssapi-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569956" comment="cyrus-sasl-gssapi-32bit-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569957" comment="cyrus-sasl-gssapi-x86-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569958" comment="cyrus-sasl-otp-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569959" comment="cyrus-sasl-otp-32bit-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569960" comment="cyrus-sasl-otp-x86-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569961" comment="cyrus-sasl-plain-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569962" comment="cyrus-sasl-plain-32bit-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569963" comment="cyrus-sasl-plain-x86-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569964" comment="cyrus-sasl-x86-2.1.22-182.20.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216674" version="1" class="patch">
	<metadata>
		<title>Security update for dbus</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="443307" ref_url="https://bugzilla.suse.com/443307" source="BUGZILLA"/>
		<reference ref_id="486267" ref_url="https://bugzilla.suse.com/486267" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<description>
The dbus package used a too permissive configuration.
Therefore intended access control for some services was not
applied (CVE-2008-4311).

The new configuration denies access by default. Some dbus
services may break due to this setting and need an updated
configuration as well.

With the previous update wireless networking didn't work
anymore on some machines due to stale files in
/var/run/dbus/at_console. The dbus init script now cleans
up that directory on boot.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-02"/>
	<updated date="2009-04-02"/>
	<bugzilla href="https://bugzilla.suse.com/443307">SUSE bug 443307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/486267">SUSE bug 486267</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4311">CVE-2008-4311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569965" comment="dbus-1-1.2.10-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569966" comment="dbus-1-32bit-1.2.10-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569967" comment="dbus-1-x86-1.2.10-3.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569965" comment="dbus-1-1.2.10-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569966" comment="dbus-1-32bit-1.2.10-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569967" comment="dbus-1-x86-1.2.10-3.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216675" version="1" class="patch">
	<metadata>
		<title>Security update for dbus</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="628607" ref_url="https://bugzilla.suse.com/628607" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-1172" ref_url="https://www.suse.com/security/cve/CVE-2010-1172/" source="CVE"/>
		<description>

A flaw in dbus-glib was fixed that allowed other local programs to bypass 
the 'access' flag on properties. (CVE-2010-1172)

		</description>
<advisory from="security@suse.de">
	<issued date="2010-09-01"/>
	<updated date="2010-09-01"/>
	<bugzilla href="https://bugzilla.suse.com/628607">SUSE bug 628607</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1172/">CVE-2010-1172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1172">CVE-2010-1172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569968" comment="dbus-1-glib-0.76-34.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569969" comment="dbus-1-glib-32bit-0.76-34.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569970" comment="dbus-1-glib-x86-0.76-34.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569968" comment="dbus-1-glib-0.76-34.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569969" comment="dbus-1-glib-32bit-0.76-34.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569970" comment="dbus-1-glib-x86-0.76-34.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216676" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp-client</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="515599" ref_url="https://bugzilla.suse.com/515599" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0692" ref_url="https://www.suse.com/security/cve/CVE-2009-0692/" source="CVE"/>
		<description>
The DHCP client (dhclient) could be crashed by a malicious
DHCP server sending a overlong subnet field. (CVE-2009-0692)

In some circumstances code execution might be possible, but
might be caught by the buffer overflow checking in newer
distributions. (SLES 10 and 11).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-06-26"/>
	<updated date="2009-06-26"/>
	<bugzilla href="https://bugzilla.suse.com/515599">SUSE bug 515599</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0692/">CVE-2009-0692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0692">CVE-2009-0692 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569971" comment="dhcp-client-3.1.1-7.13.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569971" comment="dhcp-client-3.1.1-7.13.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216677" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="533710" ref_url="https://bugzilla.suse.com/533710" source="BUGZILLA"/>
		<description>
This update fixes a buffer overflow in the TFTP server code
of dnsmasq. Please note that the TFTP server is disabled by
default.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-08-25"/>
	<updated date="2009-08-25"/>
	<bugzilla href="https://bugzilla.suse.com/533710">SUSE bug 533710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569972" comment="dnsmasq-2.45-12.23.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569972" comment="dnsmasq-2.45-12.23.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216678" version="1" class="patch">
	<metadata>
		<title>Security update for ethereal and wireshark</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="523718" ref_url="https://bugzilla.suse.com/523718" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2562" ref_url="https://www.suse.com/security/cve/CVE-2009-2562/" source="CVE"/>
		<description>
Flaws in the AFS dissector allowed attackers to crash
wireshark  via specially crafted network traffic
(CVE-2009-2562).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-08-18"/>
	<updated date="2009-08-18"/>
	<bugzilla href="https://bugzilla.suse.com/523718">SUSE bug 523718</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2562/">CVE-2009-2562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2562">CVE-2009-2562 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569973" comment="wireshark-1.0.5-1.27.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569973" comment="wireshark-1.0.5-1.27.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216679" version="1" class="patch">
	<metadata>
		<title>Security update for Evolution</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="419303" ref_url="https://bugzilla.suse.com/419303" source="BUGZILLA"/>
		<reference ref_id="475541" ref_url="https://bugzilla.suse.com/475541" source="BUGZILLA"/>
		<reference ref_id="477697" ref_url="https://bugzilla.suse.com/477697" source="BUGZILLA"/>
		<reference ref_id="479908" ref_url="https://bugzilla.suse.com/479908" source="BUGZILLA"/>
		<reference ref_id="480091" ref_url="https://bugzilla.suse.com/480091" source="BUGZILLA"/>
		<reference ref_id="484213" ref_url="https://bugzilla.suse.com/484213" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0582" ref_url="https://www.suse.com/security/cve/CVE-2009-0582/" source="CVE"/>
		<description>
camel's NTLM SASL authentication mechanism as used by
evolution did not properly validate server's challenge
packets (CVE-2009-0582). 

This update also includes the following non-security fixes:

- Fixes a critical crasher in mailer component. 
- Fixes creation of recurrence monthly items in GroupWise. 
- Includes fixes for some usability issues.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-16"/>
	<updated date="2009-04-16"/>
	<bugzilla href="https://bugzilla.suse.com/419303">SUSE bug 419303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/475541">SUSE bug 475541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/477697">SUSE bug 477697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/479908">SUSE bug 479908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/480091">SUSE bug 480091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/484213">SUSE bug 484213</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0582/">CVE-2009-0582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0582">CVE-2009-0582 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569974" comment="evolution-data-server-2.24.1.1-11.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569975" comment="evolution-data-server-32bit-2.24.1.1-11.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569976" comment="evolution-data-server-lang-2.24.1.1-11.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569977" comment="evolution-data-server-x86-2.24.1.1-11.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569978" comment="gtkhtml2-3.24.1.1-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569979" comment="gtkhtml2-lang-3.24.1.1-3.23.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569974" comment="evolution-data-server-2.24.1.1-11.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569975" comment="evolution-data-server-32bit-2.24.1.1-11.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569976" comment="evolution-data-server-lang-2.24.1.1-11.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569977" comment="evolution-data-server-x86-2.24.1.1-11.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569978" comment="gtkhtml2-3.24.1.1-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569979" comment="gtkhtml2-lang-3.24.1.1-3.23.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216680" version="1" class="patch">
	<metadata>
		<title>Security update for evolution-data-server</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="184554" ref_url="https://bugzilla.suse.com/184554" source="BUGZILLA"/>
		<reference ref_id="474948" ref_url="https://bugzilla.suse.com/474948" source="BUGZILLA"/>
		<reference ref_id="475108" ref_url="https://bugzilla.suse.com/475108" source="BUGZILLA"/>
		<reference ref_id="484884" ref_url="https://bugzilla.suse.com/484884" source="BUGZILLA"/>
		<reference ref_id="485689" ref_url="https://bugzilla.suse.com/485689" source="BUGZILLA"/>
		<reference ref_id="485930" ref_url="https://bugzilla.suse.com/485930" source="BUGZILLA"/>
		<reference ref_id="488632" ref_url="https://bugzilla.suse.com/488632" source="BUGZILLA"/>
		<reference ref_id="494490" ref_url="https://bugzilla.suse.com/494490" source="BUGZILLA"/>
		<reference ref_id="498712" ref_url="https://bugzilla.suse.com/498712" source="BUGZILLA"/>
		<reference ref_id="498745" ref_url="https://bugzilla.suse.com/498745" source="BUGZILLA"/>
		<reference ref_id="499105" ref_url="https://bugzilla.suse.com/499105" source="BUGZILLA"/>
		<reference ref_id="499179" ref_url="https://bugzilla.suse.com/499179" source="BUGZILLA"/>
		<reference ref_id="500133" ref_url="https://bugzilla.suse.com/500133" source="BUGZILLA"/>
		<reference ref_id="502046" ref_url="https://bugzilla.suse.com/502046" source="BUGZILLA"/>
		<reference ref_id="506265" ref_url="https://bugzilla.suse.com/506265" source="BUGZILLA"/>
		<reference ref_id="510803" ref_url="https://bugzilla.suse.com/510803" source="BUGZILLA"/>
		<reference ref_id="568822" ref_url="https://bugzilla.suse.com/568822" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0547" ref_url="https://www.suse.com/security/cve/CVE-2009-0547/" source="CVE"/>
		<reference ref_id="CVE-2009-0587" ref_url="https://www.suse.com/security/cve/CVE-2009-0587/" source="CVE"/>
		<reference ref_id="CVE-2009-1631" ref_url="https://www.suse.com/security/cve/CVE-2009-1631/" source="CVE"/>
		<description>

This update fixes following vulnerability:



 evolution considered S/MIME signatures to be valid even for modified mails (CVE-2009-0547: CVSS v2 Base Score: 5.0).



Additionally the following bug has been fixed:



 A POP3 server sending overly long lines could crash evolution.


		</description>
<advisory from="security@suse.de">
	<issued date="2010-02-08"/>
	<updated date="2010-02-08"/>
	<bugzilla href="https://bugzilla.suse.com/184554">SUSE bug 184554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/474948">SUSE bug 474948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/475108">SUSE bug 475108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/484884">SUSE bug 484884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/485689">SUSE bug 485689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/485930">SUSE bug 485930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/488632">SUSE bug 488632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/494490">SUSE bug 494490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/498712">SUSE bug 498712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/498745">SUSE bug 498745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/499105">SUSE bug 499105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/499179">SUSE bug 499179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/500133">SUSE bug 500133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/502046">SUSE bug 502046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/506265">SUSE bug 506265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/510803">SUSE bug 510803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/568822">SUSE bug 568822</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0547/">CVE-2009-0547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0547">CVE-2009-0547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0587/">CVE-2009-0587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0587">CVE-2009-0587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1631/">CVE-2009-1631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1631">CVE-2009-1631 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569980" comment="evolution-data-server-2.24.1.1-11.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569981" comment="evolution-data-server-32bit-2.24.1.1-11.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569982" comment="evolution-data-server-lang-2.24.1.1-11.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569983" comment="evolution-data-server-x86-2.24.1.1-11.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569980" comment="evolution-data-server-2.24.1.1-11.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569981" comment="evolution-data-server-32bit-2.24.1.1-11.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569982" comment="evolution-data-server-lang-2.24.1.1-11.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569983" comment="evolution-data-server-x86-2.24.1.1-11.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216681" version="1" class="patch">
	<metadata>
		<title>Security update for expat</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="550664" ref_url="https://bugzilla.suse.com/550664" source="BUGZILLA"/>
		<reference ref_id="558892" ref_url="https://bugzilla.suse.com/558892" source="BUGZILLA"/>
		<reference ref_id="566434" ref_url="https://bugzilla.suse.com/566434" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<description>
The previous expat security update (CVE-2009-3560) caused
parse errors with some xml documents.
		</description>
<advisory from="security@suse.de">
	<issued date="2010-01-08"/>
	<updated date="2010-01-08"/>
	<bugzilla href="https://bugzilla.suse.com/550664">SUSE bug 550664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/558892">SUSE bug 558892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/566434">SUSE bug 566434</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3560">CVE-2009-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3720">CVE-2009-3720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569984" comment="expat-2.0.1-88.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569985" comment="libexpat1-2.0.1-88.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569986" comment="libexpat1-32bit-2.0.1-88.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569987" comment="libexpat1-x86-2.0.1-88.26.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569984" comment="expat-2.0.1-88.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569985" comment="libexpat1-2.0.1-88.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569986" comment="libexpat1-32bit-2.0.1-88.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569987" comment="libexpat1-x86-2.0.1-88.26.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216682" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="528746" ref_url="https://bugzilla.suse.com/528746" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2666" ref_url="https://www.suse.com/security/cve/CVE-2009-2666/" source="CVE"/>
		<description>
This update of fetchmail improves SSL certificate
validation to stop possible man-in-the-middle attacks by
inserting \0-character in the certificate's subject name.
(CVE-2009-2666)
		</description>
<advisory from="security@suse.de">
	<issued date="2009-08-07"/>
	<updated date="2009-08-07"/>
	<bugzilla href="https://bugzilla.suse.com/528746">SUSE bug 528746</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2666/">CVE-2009-2666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2666">CVE-2009-2666 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569988" comment="fetchmail-6.3.8.90-13.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569989" comment="fetchmailconf-6.3.8.90-13.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569988" comment="fetchmail-6.3.8.90-13.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569989" comment="fetchmailconf-6.3.8.90-13.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216683" version="1" class="patch">
	<metadata>
		<title>Security update for pidgin</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="535570" ref_url="https://bugzilla.suse.com/535570" source="BUGZILLA"/>
		<reference ref_id="535832" ref_url="https://bugzilla.suse.com/535832" source="BUGZILLA"/>
		<reference ref_id="536602" ref_url="https://bugzilla.suse.com/536602" source="BUGZILLA"/>
		<reference ref_id="548072" ref_url="https://bugzilla.suse.com/548072" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-3025" ref_url="https://www.suse.com/security/cve/CVE-2009-3025/" source="CVE"/>
		<reference ref_id="CVE-2009-3026" ref_url="https://www.suse.com/security/cve/CVE-2009-3026/" source="CVE"/>
		<reference ref_id="CVE-2009-3083" ref_url="https://www.suse.com/security/cve/CVE-2009-3083/" source="CVE"/>
		<reference ref_id="CVE-2009-3084" ref_url="https://www.suse.com/security/cve/CVE-2009-3084/" source="CVE"/>
		<reference ref_id="CVE-2009-3085" ref_url="https://www.suse.com/security/cve/CVE-2009-3085/" source="CVE"/>
		<reference ref_id="CVE-2009-3615" ref_url="https://www.suse.com/security/cve/CVE-2009-3615/" source="CVE"/>
		<description>
This update of pidgin fixes the following issues:
- CVE-2009-3026: CVSS v2 Base Score: 5.0 Allowed to send
  confidential data unencrypted even if SSL was chosen by
  user.
- CVE-2009-3025: CVSS v2 Base Score: 4.3 Remote denial of
  service in yahoo IM plug-in.
- CVE-2009-3083: CVSS v2 Base Score: 5.0 Remote denial of
  service in MSN plug-in.
- CVE-2009-3084: CVSS v2 Base Score: 5.0 Remote denial of
  service in MSN plug-in.
- CVE-2009-3085: CVSS v2 Base Score: 5.0 Remote denial of
  service in XMPP plug-in.
- CVE-2009-3615: CVSS v2 Base Score: 5.0 Remote denial of
  service in ICQ plug-in.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-02-21"/>
	<updated date="2009-02-21"/>
	<bugzilla href="https://bugzilla.suse.com/535570">SUSE bug 535570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/535832">SUSE bug 535832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/536602">SUSE bug 536602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/548072">SUSE bug 548072</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3025/">CVE-2009-3025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3025">CVE-2009-3025 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3026/">CVE-2009-3026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3026">CVE-2009-3026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3083/">CVE-2009-3083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3083">CVE-2009-3083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3084/">CVE-2009-3084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3084">CVE-2009-3084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3085/">CVE-2009-3085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3085">CVE-2009-3085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3615/">CVE-2009-3615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3615">CVE-2009-3615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569990" comment="cdparanoia-IIIalpha9.8-691.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569991" comment="cdparanoia-32bit-IIIalpha9.8-691.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569992" comment="cdparanoia-x86-IIIalpha9.8-691.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569993" comment="desktop-file-utils-0.15-1.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569994" comment="fam-2.7.0-130.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569995" comment="fam-32bit-2.7.0-130.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569996" comment="fam-x86-2.7.0-130.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569997" comment="gnome-vfs2-2.24.0-7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569998" comment="gnome-vfs2-32bit-2.24.0-7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569999" comment="gnome-vfs2-x86-2.24.0-7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570000" comment="gstreamer-0_10-0.10.21-3.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570001" comment="libogg0-1.1.3-87.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570002" comment="libogg0-32bit-1.1.3-87.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570003" comment="libogg0-x86-1.1.3-87.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570004" comment="liboil-0.3.15-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570005" comment="liboil-32bit-0.3.15-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570006" comment="liboil-x86-0.3.15-3.10 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569990" comment="cdparanoia-IIIalpha9.8-691.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569991" comment="cdparanoia-32bit-IIIalpha9.8-691.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569992" comment="cdparanoia-x86-IIIalpha9.8-691.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569993" comment="desktop-file-utils-0.15-1.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569994" comment="fam-2.7.0-130.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569995" comment="fam-32bit-2.7.0-130.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569996" comment="fam-x86-2.7.0-130.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569997" comment="gnome-vfs2-2.24.0-7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569998" comment="gnome-vfs2-32bit-2.24.0-7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569999" comment="gnome-vfs2-x86-2.24.0-7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570000" comment="gstreamer-0_10-0.10.21-3.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570001" comment="libogg0-1.1.3-87.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570002" comment="libogg0-32bit-1.1.3-87.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570003" comment="libogg0-x86-1.1.3-87.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570004" comment="liboil-0.3.15-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570005" comment="liboil-32bit-0.3.15-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570006" comment="liboil-x86-0.3.15-3.10 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216684" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="485889" ref_url="https://bugzilla.suse.com/485889" source="BUGZILLA"/>
		<reference ref_id="508139" ref_url="https://bugzilla.suse.com/508139" source="BUGZILLA"/>
		<reference ref_id="619562" ref_url="https://bugzilla.suse.com/619562" source="BUGZILLA"/>
		<reference ref_id="628213" ref_url="https://bugzilla.suse.com/628213" source="BUGZILLA"/>
		<reference ref_id="629447" ref_url="https://bugzilla.suse.com/629447" source="BUGZILLA"/>
		<reference ref_id="633938" ref_url="https://bugzilla.suse.com/633938" source="BUGZILLA"/>
		<reference ref_id="633943" ref_url="https://bugzilla.suse.com/633943" source="BUGZILLA"/>
		<reference ref_id="641580" ref_url="https://bugzilla.suse.com/641580" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946/" source="CVE"/>
		<reference ref_id="CVE-2010-1797" ref_url="https://www.suse.com/security/cve/CVE-2010-1797/" source="CVE"/>
		<reference ref_id="CVE-2010-2497" ref_url="https://www.suse.com/security/cve/CVE-2010-2497/" source="CVE"/>
		<reference ref_id="CVE-2010-2498" ref_url="https://www.suse.com/security/cve/CVE-2010-2498/" source="CVE"/>
		<reference ref_id="CVE-2010-2499" ref_url="https://www.suse.com/security/cve/CVE-2010-2499/" source="CVE"/>
		<reference ref_id="CVE-2010-2500" ref_url="https://www.suse.com/security/cve/CVE-2010-2500/" source="CVE"/>
		<reference ref_id="CVE-2010-2519" ref_url="https://www.suse.com/security/cve/CVE-2010-2519/" source="CVE"/>
		<reference ref_id="CVE-2010-2520" ref_url="https://www.suse.com/security/cve/CVE-2010-2520/" source="CVE"/>
		<reference ref_id="CVE-2010-2527" ref_url="https://www.suse.com/security/cve/CVE-2010-2527/" source="CVE"/>
		<reference ref_id="CVE-2010-2541" ref_url="https://www.suse.com/security/cve/CVE-2010-2541/" source="CVE"/>
		<reference ref_id="CVE-2010-2805" ref_url="https://www.suse.com/security/cve/CVE-2010-2805/" source="CVE"/>
		<reference ref_id="CVE-2010-2806" ref_url="https://www.suse.com/security/cve/CVE-2010-2806/" source="CVE"/>
		<reference ref_id="CVE-2010-2807" ref_url="https://www.suse.com/security/cve/CVE-2010-2807/" source="CVE"/>
		<reference ref_id="CVE-2010-2808" ref_url="https://www.suse.com/security/cve/CVE-2010-2808/" source="CVE"/>
		<reference ref_id="CVE-2010-3053" ref_url="https://www.suse.com/security/cve/CVE-2010-3053/" source="CVE"/>
		<reference ref_id="CVE-2010-3054" ref_url="https://www.suse.com/security/cve/CVE-2010-3054/" source="CVE"/>
		<reference ref_id="CVE-2010-3311" ref_url="https://www.suse.com/security/cve/CVE-2010-3311/" source="CVE"/>
		<description>
Freetype was updated to fix some integer overflows that can
be exploited remotely in conjunction with programs like a
web-browser. (CVE-2009-0946) Thanks to Tavis Ormandy who
found the bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-17"/>
	<updated date="2009-04-17"/>
	<bugzilla href="https://bugzilla.suse.com/485889">SUSE bug 485889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/508139">SUSE bug 508139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/619562">SUSE bug 619562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/628213">SUSE bug 628213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629447">SUSE bug 629447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633938">SUSE bug 633938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633943">SUSE bug 633943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/641580">SUSE bug 641580</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0946">CVE-2009-0946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1797/">CVE-2010-1797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1797">CVE-2010-1797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2497/">CVE-2010-2497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2497">CVE-2010-2497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2498/">CVE-2010-2498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2498">CVE-2010-2498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2499/">CVE-2010-2499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2499">CVE-2010-2499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2500/">CVE-2010-2500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2500">CVE-2010-2500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2519/">CVE-2010-2519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2519">CVE-2010-2519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2520/">CVE-2010-2520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2520">CVE-2010-2520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2527/">CVE-2010-2527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2527">CVE-2010-2527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2541/">CVE-2010-2541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2541">CVE-2010-2541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2805/">CVE-2010-2805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2805">CVE-2010-2805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2806/">CVE-2010-2806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2806">CVE-2010-2806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2807/">CVE-2010-2807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2807">CVE-2010-2807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2808/">CVE-2010-2808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2808">CVE-2010-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3053/">CVE-2010-3053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3053">CVE-2010-3053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3054/">CVE-2010-3054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3054">CVE-2010-3054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3311/">CVE-2010-3311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3311">CVE-2010-3311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570007" comment="freetype2-2.3.7-25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570008" comment="freetype2-32bit-2.3.7-25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570009" comment="freetype2-x86-2.3.7-25.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570007" comment="freetype2-2.3.7-25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570008" comment="freetype2-32bit-2.3.7-25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570009" comment="freetype2-x86-2.3.7-25.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216685" version="1" class="patch">
	<metadata>
		<title>Security update for fuse</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="550003" ref_url="https://bugzilla.suse.com/550003" source="BUGZILLA"/>
		<reference ref_id="582725" ref_url="https://bugzilla.suse.com/582725" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-3297" ref_url="https://www.suse.com/security/cve/CVE-2009-3297/" source="CVE"/>
		<description>
A race condition in fusermount allows non-privileged users to umount
any file system (CVE-2010-0789).


Note: this is a re-release of the previous update with a better patch. 

		</description>
<advisory from="security@suse.de">
	<issued date="2010-02-26"/>
	<updated date="2010-02-26"/>
	<bugzilla href="https://bugzilla.suse.com/550003">SUSE bug 550003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/582725">SUSE bug 582725</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3297/">CVE-2009-3297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3297">CVE-2009-3297 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570010" comment="fuse-2.7.2-61.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570011" comment="libfuse2-2.7.2-61.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570010" comment="fuse-2.7.2-61.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570011" comment="libfuse2-2.7.2-61.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216686" version="1" class="patch">
	<metadata>
		<title>Recommended update for GDM</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="381139" ref_url="https://bugzilla.suse.com/381139" source="BUGZILLA"/>
		<reference ref_id="439918" ref_url="https://bugzilla.suse.com/439918" source="BUGZILLA"/>
		<reference ref_id="456387" ref_url="https://bugzilla.suse.com/456387" source="BUGZILLA"/>
		<reference ref_id="479949" ref_url="https://bugzilla.suse.com/479949" source="BUGZILLA"/>
		<reference ref_id="485775" ref_url="https://bugzilla.suse.com/485775" source="BUGZILLA"/>
		<reference ref_id="489970" ref_url="https://bugzilla.suse.com/489970" source="BUGZILLA"/>
		<reference ref_id="490376" ref_url="https://bugzilla.suse.com/490376" source="BUGZILLA"/>
		<reference ref_id="490621" ref_url="https://bugzilla.suse.com/490621" source="BUGZILLA"/>
		<reference ref_id="491578" ref_url="https://bugzilla.suse.com/491578" source="BUGZILLA"/>
		<reference ref_id="492020" ref_url="https://bugzilla.suse.com/492020" source="BUGZILLA"/>
		<reference ref_id="495671" ref_url="https://bugzilla.suse.com/495671" source="BUGZILLA"/>
		<reference ref_id="499562" ref_url="https://bugzilla.suse.com/499562" source="BUGZILLA"/>
		<reference ref_id="500097" ref_url="https://bugzilla.suse.com/500097" source="BUGZILLA"/>
		<reference ref_id="506917" ref_url="https://bugzilla.suse.com/506917" source="BUGZILLA"/>
		<reference ref_id="509920" ref_url="https://bugzilla.suse.com/509920" source="BUGZILLA"/>
		<reference ref_id="510389" ref_url="https://bugzilla.suse.com/510389" source="BUGZILLA"/>
		<reference ref_id="511245" ref_url="https://bugzilla.suse.com/511245" source="BUGZILLA"/>
		<reference ref_id="511669" ref_url="https://bugzilla.suse.com/511669" source="BUGZILLA"/>
		<reference ref_id="512100" ref_url="https://bugzilla.suse.com/512100" source="BUGZILLA"/>
		<reference ref_id="526823" ref_url="https://bugzilla.suse.com/526823" source="BUGZILLA"/>
		<reference ref_id="545820" ref_url="https://bugzilla.suse.com/545820" source="BUGZILLA"/>
		<reference ref_id="583060" ref_url="https://bugzilla.suse.com/583060" source="BUGZILLA"/>
		<reference ref_id="627893" ref_url="https://bugzilla.suse.com/627893" source="BUGZILLA"/>
		<reference ref_id="628607" ref_url="https://bugzilla.suse.com/628607" source="BUGZILLA"/>
		<reference ref_id="633655" ref_url="https://bugzilla.suse.com/633655" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-1172" ref_url="https://www.suse.com/security/cve/CVE-2010-1172/" source="CVE"/>
		<description>
456387 - gdm doesn't display pam error messages 479949 -
gdm does not immediately respond to changes in
/etc/sysconfig/displaymanager
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-02"/>
	<updated date="2009-04-02"/>
	<bugzilla href="https://bugzilla.suse.com/381139">SUSE bug 381139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/439918">SUSE bug 439918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/456387">SUSE bug 456387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/479949">SUSE bug 479949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/485775">SUSE bug 485775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/489970">SUSE bug 489970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/490376">SUSE bug 490376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/490621">SUSE bug 490621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/491578">SUSE bug 491578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/492020">SUSE bug 492020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/495671">SUSE bug 495671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/499562">SUSE bug 499562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/500097">SUSE bug 500097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/506917">SUSE bug 506917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/509920">SUSE bug 509920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/510389">SUSE bug 510389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/511245">SUSE bug 511245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/511669">SUSE bug 511669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/512100">SUSE bug 512100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/526823">SUSE bug 526823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545820">SUSE bug 545820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/583060">SUSE bug 583060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/627893">SUSE bug 627893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/628607">SUSE bug 628607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633655">SUSE bug 633655</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1172/">CVE-2010-1172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1172">CVE-2010-1172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991152" comment="gdm-2.24.0-24.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991153" comment="gdm-branding-upstream-2.24.0-24.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991154" comment="gdm-lang-2.24.0-24.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991152" comment="gdm-2.24.0-24.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991153" comment="gdm-branding-upstream-2.24.0-24.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991154" comment="gdm-lang-2.24.0-24.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216687" version="1" class="patch">
	<metadata>
		<title>Security update for GhostScript</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="483303" ref_url="https://bugzilla.suse.com/483303" source="BUGZILLA"/>
		<reference ref_id="489622" ref_url="https://bugzilla.suse.com/489622" source="BUGZILLA"/>
		<reference ref_id="491897" ref_url="https://bugzilla.suse.com/491897" source="BUGZILLA"/>
		<reference ref_id="492765" ref_url="https://bugzilla.suse.com/492765" source="BUGZILLA"/>
		<reference ref_id="559122" ref_url="https://bugzilla.suse.com/559122" source="BUGZILLA"/>
		<reference ref_id="605043" ref_url="https://bugzilla.suse.com/605043" source="BUGZILLA"/>
		<reference ref_id="608071" ref_url="https://bugzilla.suse.com/608071" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-6725" ref_url="https://www.suse.com/security/cve/CVE-2007-6725/" source="CVE"/>
		<reference ref_id="CVE-2008-6679" ref_url="https://www.suse.com/security/cve/CVE-2008-6679/" source="CVE"/>
		<reference ref_id="CVE-2009-0196" ref_url="https://www.suse.com/security/cve/CVE-2009-0196/" source="CVE"/>
		<reference ref_id="CVE-2009-0583" ref_url="https://www.suse.com/security/cve/CVE-2009-0583/" source="CVE"/>
		<reference ref_id="CVE-2009-0584" ref_url="https://www.suse.com/security/cve/CVE-2009-0584/" source="CVE"/>
		<reference ref_id="CVE-2009-0792" ref_url="https://www.suse.com/security/cve/CVE-2009-0792/" source="CVE"/>
		<reference ref_id="CVE-2009-4270" ref_url="https://www.suse.com/security/cve/CVE-2009-4270/" source="CVE"/>
		<reference ref_id="CVE-2009-4897" ref_url="https://www.suse.com/security/cve/CVE-2009-4897/" source="CVE"/>
		<reference ref_id="CVE-2010-1628" ref_url="https://www.suse.com/security/cve/CVE-2010-1628/" source="CVE"/>
		<reference ref_id="CVE-2010-1869" ref_url="https://www.suse.com/security/cve/CVE-2010-1869/" source="CVE"/>
		<reference ref_id="CVE-2010-2055" ref_url="https://www.suse.com/security/cve/CVE-2010-2055/" source="CVE"/>
		<description>
Specially crafted file could cause a heap-overflow in JBIG2
decoder (CVE-2009-0196), an integer overflow in ICC library
(CVE-2009-0792), a buffer overflow in BaseFont writer
module (CVE-2008-6679) or crash the CCITTFax decoder
(CVE-2007-6725).

The previous security update introduced a regression that
broke some printer drives. This new update fixes that issue.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-05-14"/>
	<updated date="2009-05-14"/>
	<bugzilla href="https://bugzilla.suse.com/483303">SUSE bug 483303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/489622">SUSE bug 489622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/491897">SUSE bug 491897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/492765">SUSE bug 492765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/559122">SUSE bug 559122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/605043">SUSE bug 605043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/608071">SUSE bug 608071</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6725/">CVE-2007-6725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6725">CVE-2007-6725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-6679/">CVE-2008-6679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-6679">CVE-2008-6679 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0196/">CVE-2009-0196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0196">CVE-2009-0196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0583/">CVE-2009-0583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0583">CVE-2009-0583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0584/">CVE-2009-0584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0584">CVE-2009-0584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0792/">CVE-2009-0792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0792">CVE-2009-0792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4270/">CVE-2009-4270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4270">CVE-2009-4270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4897/">CVE-2009-4897 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4897">CVE-2009-4897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1628/">CVE-2010-1628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1628">CVE-2010-1628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1869/">CVE-2010-1869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1869">CVE-2010-1869 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2055/">CVE-2010-2055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2055">CVE-2010-2055 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570012" comment="ghostscript-fonts-other-8.62-32.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570013" comment="ghostscript-fonts-rus-8.62-32.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570014" comment="ghostscript-fonts-std-8.62-32.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570015" comment="ghostscript-library-8.62-32.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570016" comment="ghostscript-omni-8.62-32.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570017" comment="ghostscript-x11-8.62-32.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570018" comment="libgimpprint-4.2.7-32.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570012" comment="ghostscript-fonts-other-8.62-32.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570013" comment="ghostscript-fonts-rus-8.62-32.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570014" comment="ghostscript-fonts-std-8.62-32.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570015" comment="ghostscript-library-8.62-32.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570016" comment="ghostscript-omni-8.62-32.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570017" comment="ghostscript-x11-8.62-32.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570018" comment="libgimpprint-4.2.7-32.25.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216688" version="1" class="patch">
	<metadata>
		<title>Security update for glib2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="449927" ref_url="https://bugzilla.suse.com/449927" source="BUGZILLA"/>
		<reference ref_id="485976" ref_url="https://bugzilla.suse.com/485976" source="BUGZILLA"/>
		<reference ref_id="500520" ref_url="https://bugzilla.suse.com/500520" source="BUGZILLA"/>
		<reference ref_id="538005" ref_url="https://bugzilla.suse.com/538005" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-4316" ref_url="https://www.suse.com/security/cve/CVE-2008-4316/" source="CVE"/>
		<reference ref_id="CVE-2009-3289" ref_url="https://www.suse.com/security/cve/CVE-2009-3289/" source="CVE"/>
		<description>
Large strings could lead to a heap overflow in the base64
encoding and decoding functions. Attackers could
potentially exploit that to execute arbitrary code
(CVE-2008-4316).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-22"/>
	<updated date="2009-04-22"/>
	<bugzilla href="https://bugzilla.suse.com/449927">SUSE bug 449927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/485976">SUSE bug 485976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/500520">SUSE bug 500520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/538005">SUSE bug 538005</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4316/">CVE-2008-4316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4316">CVE-2008-4316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3289/">CVE-2009-3289 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-3289">CVE-2009-3289 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570019" comment="glib2-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570020" comment="glib2-doc-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570021" comment="glib2-lang-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570022" comment="libgio-2_0-0-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570023" comment="libgio-2_0-0-32bit-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570024" comment="libgio-2_0-0-x86-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570025" comment="libglib-2_0-0-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570026" comment="libglib-2_0-0-32bit-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570027" comment="libglib-2_0-0-x86-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570028" comment="libgmodule-2_0-0-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570029" comment="libgmodule-2_0-0-32bit-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570030" comment="libgmodule-2_0-0-x86-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570031" comment="libgobject-2_0-0-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570032" comment="libgobject-2_0-0-32bit-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570033" comment="libgobject-2_0-0-x86-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570034" comment="libgthread-2_0-0-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570035" comment="libgthread-2_0-0-32bit-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570036" comment="libgthread-2_0-0-x86-2.18.2-7.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570019" comment="glib2-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570020" comment="glib2-doc-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570021" comment="glib2-lang-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570022" comment="libgio-2_0-0-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570023" comment="libgio-2_0-0-32bit-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570024" comment="libgio-2_0-0-x86-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570025" comment="libglib-2_0-0-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570026" comment="libglib-2_0-0-32bit-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570027" comment="libglib-2_0-0-x86-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570028" comment="libgmodule-2_0-0-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570029" comment="libgmodule-2_0-0-32bit-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570030" comment="libgmodule-2_0-0-x86-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570031" comment="libgobject-2_0-0-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570032" comment="libgobject-2_0-0-32bit-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570033" comment="libgobject-2_0-0-x86-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570034" comment="libgthread-2_0-0-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570035" comment="libgthread-2_0-0-32bit-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570036" comment="libgthread-2_0-0-x86-2.18.2-7.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216689" version="1" class="patch">
	<metadata>
		<title>Security update for glibc</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="375315" ref_url="https://bugzilla.suse.com/375315" source="BUGZILLA"/>
		<reference ref_id="445636" ref_url="https://bugzilla.suse.com/445636" source="BUGZILLA"/>
		<reference ref_id="474021" ref_url="https://bugzilla.suse.com/474021" source="BUGZILLA"/>
		<reference ref_id="486631" ref_url="https://bugzilla.suse.com/486631" source="BUGZILLA"/>
		<reference ref_id="505215" ref_url="https://bugzilla.suse.com/505215" source="BUGZILLA"/>
		<reference ref_id="508081" ref_url="https://bugzilla.suse.com/508081" source="BUGZILLA"/>
		<reference ref_id="513617" ref_url="https://bugzilla.suse.com/513617" source="BUGZILLA"/>
		<reference ref_id="513961" ref_url="https://bugzilla.suse.com/513961" source="BUGZILLA"/>
		<reference ref_id="523154" ref_url="https://bugzilla.suse.com/523154" source="BUGZILLA"/>
		<reference ref_id="523170" ref_url="https://bugzilla.suse.com/523170" source="BUGZILLA"/>
		<reference ref_id="529495" ref_url="https://bugzilla.suse.com/529495" source="BUGZILLA"/>
		<reference ref_id="534828" ref_url="https://bugzilla.suse.com/534828" source="BUGZILLA"/>
		<reference ref_id="541773" ref_url="https://bugzilla.suse.com/541773" source="BUGZILLA"/>
		<reference ref_id="569091" ref_url="https://bugzilla.suse.com/569091" source="BUGZILLA"/>
		<reference ref_id="572188" ref_url="https://bugzilla.suse.com/572188" source="BUGZILLA"/>
		<reference ref_id="585879" ref_url="https://bugzilla.suse.com/585879" source="BUGZILLA"/>
		<reference ref_id="592941" ref_url="https://bugzilla.suse.com/592941" source="BUGZILLA"/>
		<reference ref_id="594263" ref_url="https://bugzilla.suse.com/594263" source="BUGZILLA"/>
		<reference ref_id="615556" ref_url="https://bugzilla.suse.com/615556" source="BUGZILLA"/>
		<reference ref_id="646960" ref_url="https://bugzilla.suse.com/646960" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-3847" ref_url="https://www.suse.com/security/cve/CVE-2010-3847/" source="CVE"/>
		<reference ref_id="CVE-2010-3856" ref_url="https://www.suse.com/security/cve/CVE-2010-3856/" source="CVE"/>
		<description>

This update of glibc fixes various bugs and security issues:

    * CVE-2010-3847: Decoding of the $ORIGIN special value in various LD_
      environment variables allowed local attackers to execute code in
      context of e.g. setuid root programs, elevating privileges.
      This issue does not affect SUSE as an assertion triggers before the
      respective code is executed. The bug was fixed nevertheless.
    * 

      CVE-2010-3856: The LD_AUDIT environment was not pruned during setuid
      root execution and could load shared libraries from standard system
      library paths. This could be used by local attackers to inject code
      into setuid root programs and so elevated privileges.

    * 

      CVE-2010-0830: Integer overflow causing arbitrary code execution in
      ld.so --verify mode could be induced by a specially crafted binary.

    * 

      CVE-2010-0296: The addmntent() function would not escape the newline
      character properly, allowing the user to insert arbitrary newlines to
      the /etc/mtab; if the addmntent() is run by a setuid mount binary
      that does not do extra input checking, this would allow custom
      entries to be inserted in /etc/mtab.

    * 

      CVE-2008-1391: The strfmon() function contains an integer overflow
      vulnerability in width specifiers handling that could be triggered by
      an attacker that can control the format string passed to strfmon().

    * 

      CVE-2010-0015: Some setups (mainly Solaris-based legacy setups)
      include shadow information (password hashes) as so-called 'adjunct
      passwd' table, mangling it with the rest of passwd columns instead of
      keeping it in the shadow table. Normally, Solaris will disclose this
      information only to clients bound to a priviledged port, but when
      nscd is deployed on the client, getpwnam() would disclose the
      password hashes to all users. New mode 'adjunct as shadow' can now be
      enabled in /etc/default/nss that will move the password hashes from
      the world-readable passwd table to emulated shadow table (that is not
      cached by nscd).

Some invalid behaviour, crashes and memory leaks were fixed:

    * statfs64() would not function properly on IA64 in ia32el emulation
      mode.
    * memcpy() and memset() on power6 would erroneously use a 64-bit
      instruction within 32-bit code in certain corner cases.
    * nscd would not load /etc/host.conf properly before performing host
      resolution - most importantly, multi on in /etc/host.conf would be
      ignored when nscd was used, breaking e.g. resolving records in
      /etc/hosts where single name would point at multiple addresses
    * Removed mapping from lowercase sharp s to uppercase sharp S;
      uppercase S is not a standardly used letter and causes problems for
      ISO encodings.

Some other minor issues were fixed:

    * glibc-locale now better coexists with sap-locale on upgrades by
      regenerating the locale/gconv indexes properly.
    * Ports 623 and 664 may not be allocated by RPC code automatically
      anymore since that may clash with ports used on some IPMI network
      cards.
    * On x86_64, backtrace of a static destructor would stop in the _fini()
      glibc pseudo-routine, making it difficult to find out what originally
      triggered the program termination. The routine now has unwind
      information attached.

Security Issue references:

    * CVE-2010-3847
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3847&gt;
    * CVE-2010-3856
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3856&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-10-25"/>
	<updated date="2010-10-25"/>
	<bugzilla href="https://bugzilla.suse.com/375315">SUSE bug 375315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/445636">SUSE bug 445636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/474021">SUSE bug 474021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/486631">SUSE bug 486631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/505215">SUSE bug 505215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/508081">SUSE bug 508081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/513617">SUSE bug 513617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/513961">SUSE bug 513961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/523154">SUSE bug 523154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/523170">SUSE bug 523170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/529495">SUSE bug 529495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/534828">SUSE bug 534828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/541773">SUSE bug 541773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/569091">SUSE bug 569091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/572188">SUSE bug 572188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/585879">SUSE bug 585879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/592941">SUSE bug 592941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/594263">SUSE bug 594263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/615556">SUSE bug 615556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/646960">SUSE bug 646960</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3847/">CVE-2010-3847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3847">CVE-2010-3847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3856/">CVE-2010-3856 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3856">CVE-2010-3856 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570037" comment="glibc-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570038" comment="glibc-32bit-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570039" comment="glibc-devel-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570040" comment="glibc-devel-32bit-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570041" comment="glibc-html-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570042" comment="glibc-i18ndata-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570043" comment="glibc-info-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570044" comment="glibc-locale-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570045" comment="glibc-locale-32bit-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570046" comment="glibc-locale-x86-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570047" comment="glibc-profile-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570048" comment="glibc-profile-32bit-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570049" comment="glibc-profile-x86-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570050" comment="glibc-x86-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570051" comment="nscd-2.9-13.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570037" comment="glibc-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570038" comment="glibc-32bit-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570039" comment="glibc-devel-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570040" comment="glibc-devel-32bit-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570041" comment="glibc-html-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570042" comment="glibc-i18ndata-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570043" comment="glibc-info-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570044" comment="glibc-locale-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570045" comment="glibc-locale-32bit-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570046" comment="glibc-locale-x86-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570047" comment="glibc-profile-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570048" comment="glibc-profile-32bit-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570049" comment="glibc-profile-x86-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570050" comment="glibc-x86-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570051" comment="nscd-2.9-13.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216690" version="1" class="patch">
	<metadata>
		<title>Security update for gmime</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="576923" ref_url="https://bugzilla.suse.com/576923" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0409" ref_url="https://www.suse.com/security/cve/CVE-2010-0409/" source="CVE"/>
		<description>
This update of gmime fixes a buffer overflow in the GMIME_UUENCODE_LEN macro which allowed possible code execution while processing uuencoded data. (CVE-2010-0409: CVSS v2 Base Score: 5.8)
		</description>
<advisory from="security@suse.de">
	<issued date="2010-02-15"/>
	<updated date="2010-02-15"/>
	<bugzilla href="https://bugzilla.suse.com/576923">SUSE bug 576923</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0409/">CVE-2010-0409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0409">CVE-2010-0409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570052" comment="gmime-2.2.23-1.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570053" comment="gmime-doc-2.2.23-1.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570054" comment="libgmime-2_0-3-2.2.23-1.41.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570052" comment="gmime-2.2.23-1.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570053" comment="gmime-doc-2.2.23-1.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570054" comment="libgmime-2_0-3-2.2.23-1.41.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216691" version="1" class="patch">
	<metadata>
		<title>Security update for GNOME screensaver</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="512308" ref_url="https://bugzilla.suse.com/512308" source="BUGZILLA"/>
		<reference ref_id="550695" ref_url="https://bugzilla.suse.com/550695" source="BUGZILLA"/>
		<reference ref_id="563991" ref_url="https://bugzilla.suse.com/563991" source="BUGZILLA"/>
		<reference ref_id="579250" ref_url="https://bugzilla.suse.com/579250" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0285" ref_url="https://www.suse.com/security/cve/CVE-2010-0285/" source="CVE"/>
		<reference ref_id="CVE-2010-0732" ref_url="https://www.suse.com/security/cve/CVE-2010-0732/" source="CVE"/>
		<description>
		</description>
<advisory from="security@suse.de">
	<issued date="2010-03-18"/>
	<updated date="2010-03-18"/>
	<bugzilla href="https://bugzilla.suse.com/512308">SUSE bug 512308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550695">SUSE bug 550695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/563991">SUSE bug 563991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/579250">SUSE bug 579250</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0285/">CVE-2010-0285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0285">CVE-2010-0285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0732/">CVE-2010-0732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0732">CVE-2010-0732 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570055" comment="gnome-screensaver-2.24.0-14.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570056" comment="gnome-screensaver-lang-2.24.0-14.27.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570055" comment="gnome-screensaver-2.24.0-14.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570056" comment="gnome-screensaver-lang-2.24.0-14.27.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216692" version="1" class="patch">
	<metadata>
		<title>Security update for GnuTLS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="457938" ref_url="https://bugzilla.suse.com/457938" source="BUGZILLA"/>
		<reference ref_id="528372" ref_url="https://bugzilla.suse.com/528372" source="BUGZILLA"/>
		<reference ref_id="554084" ref_url="https://bugzilla.suse.com/554084" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-4989" ref_url="https://www.suse.com/security/cve/CVE-2008-4989/" source="CVE"/>
		<reference ref_id="CVE-2009-2730" ref_url="https://www.suse.com/security/cve/CVE-2009-2730/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<description>
The previous security fix for gnutls (CVE-2008-4989)
introduced a regression in the X.509 validation code for
self-signed certificates. 

This update fixes this problem.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-03-18"/>
	<updated date="2009-03-18"/>
	<bugzilla href="https://bugzilla.suse.com/457938">SUSE bug 457938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/528372">SUSE bug 528372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/554084">SUSE bug 554084</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4989/">CVE-2008-4989 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2008-4989">CVE-2008-4989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2730/">CVE-2009-2730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2730">CVE-2009-2730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570057" comment="gnutls-2.4.1-24.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570058" comment="libgnutls26-2.4.1-24.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570059" comment="libgnutls26-32bit-2.4.1-24.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570060" comment="libgnutls26-x86-2.4.1-24.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570057" comment="gnutls-2.4.1-24.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570058" comment="libgnutls26-2.4.1-24.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570059" comment="libgnutls26-32bit-2.4.1-24.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570060" comment="libgnutls26-x86-2.4.1-24.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216693" version="1" class="patch">
	<metadata>
		<title>Recommended update for GPG2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="481463" ref_url="https://bugzilla.suse.com/481463" source="BUGZILLA"/>
		<reference ref_id="625947" ref_url="https://bugzilla.suse.com/625947" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2547" ref_url="https://www.suse.com/security/cve/CVE-2010-2547/" source="CVE"/>
		<description>
gpg-agent modifies SigBlk mask of all processes spawned in
the X session breaking unrelated software started in the X
session.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-03-19"/>
	<updated date="2009-03-19"/>
	<bugzilla href="https://bugzilla.suse.com/481463">SUSE bug 481463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/625947">SUSE bug 625947</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2547/">CVE-2010-2547 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2547">CVE-2010-2547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991155" comment="gpg2-2.0.9-25.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991156" comment="gpg2-lang-2.0.9-25.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587805" comment="libgcrypt11-1.4.1-6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587806" comment="libgcrypt11-32bit-1.4.1-6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587807" comment="libgcrypt11-x86-1.4.1-6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587808" comment="libgpg-error0-1.6-8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587809" comment="libgpg-error0-32bit-1.6-8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587810" comment="libgpg-error0-x86-1.6-8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587811" comment="libksba-1.0.4-1.16 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991155" comment="gpg2-2.0.9-25.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991156" comment="gpg2-lang-2.0.9-25.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587805" comment="libgcrypt11-1.4.1-6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587806" comment="libgcrypt11-32bit-1.4.1-6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587807" comment="libgcrypt11-x86-1.4.1-6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587808" comment="libgpg-error0-1.6-8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587809" comment="libgpg-error0-32bit-1.6-8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587810" comment="libgpg-error0-x86-1.6-8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587811" comment="libksba-1.0.4-1.16 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216694" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="481479" ref_url="https://bugzilla.suse.com/481479" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0586" ref_url="https://www.suse.com/security/cve/CVE-2009-0586/" source="CVE"/>
		<description>
Specially crafted cover art tags in vorbis files could
trigger a heap overflow in the base64 decoder. Attackers
could potentially exploit that to execute arbitrary code
(CVE-2009-0586).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-06"/>
	<updated date="2009-04-06"/>
	<bugzilla href="https://bugzilla.suse.com/481479">SUSE bug 481479</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0586/">CVE-2009-0586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0586">CVE-2009-0586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570061" comment="gstreamer-0_10-plugins-base-0.10.21-2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570062" comment="gstreamer-0_10-plugins-base-32bit-0.10.21-2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570063" comment="gstreamer-0_10-plugins-base-doc-0.10.21-2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570064" comment="gstreamer-0_10-plugins-base-lang-0.10.21-2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570065" comment="gstreamer-0_10-plugins-base-x86-0.10.21-2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570066" comment="libgstinterfaces-0_10-0-0.10.21-2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570067" comment="libgstinterfaces-0_10-0-32bit-0.10.21-2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570068" comment="libgstinterfaces-0_10-0-x86-0.10.21-2.36.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570061" comment="gstreamer-0_10-plugins-base-0.10.21-2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570062" comment="gstreamer-0_10-plugins-base-32bit-0.10.21-2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570063" comment="gstreamer-0_10-plugins-base-doc-0.10.21-2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570064" comment="gstreamer-0_10-plugins-base-lang-0.10.21-2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570065" comment="gstreamer-0_10-plugins-base-x86-0.10.21-2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570066" comment="libgstinterfaces-0_10-0-0.10.21-2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570067" comment="libgstinterfaces-0_10-0-32bit-0.10.21-2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570068" comment="libgstinterfaces-0_10-0-x86-0.10.21-2.36.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216695" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="510292" ref_url="https://bugzilla.suse.com/510292" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1932" ref_url="https://www.suse.com/security/cve/CVE-2009-1932/" source="CVE"/>
		<description>
Specially crafted files could cause integer overflows in
the PNG decoding module of GStreamer (CVE-2009-1932).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-06-09"/>
	<updated date="2009-06-09"/>
	<bugzilla href="https://bugzilla.suse.com/510292">SUSE bug 510292</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1932/">CVE-2009-1932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1932">CVE-2009-1932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570069" comment="gstreamer-0_10-plugins-good-0.10.10-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570070" comment="gstreamer-0_10-plugins-good-doc-0.10.10-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570071" comment="gstreamer-0_10-plugins-good-lang-0.10.10-4.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570069" comment="gstreamer-0_10-plugins-good-0.10.10-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570070" comment="gstreamer-0_10-plugins-good-doc-0.10.10-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570071" comment="gstreamer-0_10-plugins-good-lang-0.10.10-4.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216696" version="1" class="patch">
	<metadata>
		<title>Security update for gzip</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="570331" ref_url="https://bugzilla.suse.com/570331" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2624" ref_url="https://www.suse.com/security/cve/CVE-2009-2624/" source="CVE"/>
		<reference ref_id="CVE-2010-0001" ref_url="https://www.suse.com/security/cve/CVE-2010-0001/" source="CVE"/>
		<description>

The following bugs have been fixed:



 Specially crafted gzip archives could lead to gzip allocating a too small huffman table. Attackers could exploit that to crash gzip (CVE-2009-2624).

Specially crafted gzip archives could trigger integer overflows. Attackers could exploit that to crash gzip or potentially execute arbitrary code (CVE-2010-0001). Only 64bit architectures are affected by this flaw.


		</description>
<advisory from="security@suse.de">
	<issued date="2010-01-20"/>
	<updated date="2010-01-20"/>
	<bugzilla href="https://bugzilla.suse.com/570331">SUSE bug 570331</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2624/">CVE-2009-2624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2624">CVE-2009-2624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0001/">CVE-2010-0001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0001">CVE-2010-0001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570072" comment="gzip-1.3.12-69.19.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570072" comment="gzip-1.3.12-69.19.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216697" version="1" class="patch">
	<metadata>
		<title>Security update for icu</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="508070" ref_url="https://bugzilla.suse.com/508070" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0153" ref_url="https://www.suse.com/security/cve/CVE-2009-0153/" source="CVE"/>
		<description>
icu does not properly handle invalid byte sequences during
Unicode conversion. Remote attackers could potentially
exploit that to conduct conduct cross-site scripting (XSS)
attacks (CVE-2009-0153).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-06-23"/>
	<updated date="2009-06-23"/>
	<bugzilla href="https://bugzilla.suse.com/508070">SUSE bug 508070</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0153/">CVE-2009-0153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0153">CVE-2009-0153 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570073" comment="libicu-4.0-7.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570074" comment="libicu-32bit-4.0-7.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570075" comment="libicu-doc-4.0-7.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570073" comment="libicu-4.0-7.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570074" comment="libicu-32bit-4.0-7.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570075" comment="libicu-doc-4.0-7.22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216698" version="1" class="patch">
	<metadata>
		<title>Security update for ipsec-tools</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="498859" ref_url="https://bugzilla.suse.com/498859" source="BUGZILLA"/>
		<reference ref_id="504186" ref_url="https://bugzilla.suse.com/504186" source="BUGZILLA"/>
		<reference ref_id="506710" ref_url="https://bugzilla.suse.com/506710" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1574" ref_url="https://www.suse.com/security/cve/CVE-2009-1574/" source="CVE"/>
		<reference ref_id="CVE-2009-1632" ref_url="https://www.suse.com/security/cve/CVE-2009-1632/" source="CVE"/>
		<description>
This update of ipsec-tools fixes a crash of racoon in
ISAKMP's de-fragmentation code due to a NULL-pointer
dereference. (CVE-2009-1574)  Additionally multiple memory
leaks were fixed that allowed to execute a remote denial of
service attack. (CVE-2009-1632)
		</description>
<advisory from="security@suse.de">
	<issued date="2009-06-13"/>
	<updated date="2009-06-13"/>
	<bugzilla href="https://bugzilla.suse.com/498859">SUSE bug 498859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/504186">SUSE bug 504186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/506710">SUSE bug 506710</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1574/">CVE-2009-1574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1574">CVE-2009-1574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1632/">CVE-2009-1632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1632">CVE-2009-1632 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570076" comment="ipsec-tools-0.7.1-10.31.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570076" comment="ipsec-tools-0.7.1-10.31.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216699" version="1" class="patch">
	<metadata>
		<title>Security update for iSCSI</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="592928" ref_url="https://bugzilla.suse.com/592928" source="BUGZILLA"/>
		<reference ref_id="618574" ref_url="https://bugzilla.suse.com/618574" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0743" ref_url="https://www.suse.com/security/cve/CVE-2010-0743/" source="CVE"/>
		<reference ref_id="CVE-2010-2221" ref_url="https://www.suse.com/security/cve/CVE-2010-2221/" source="CVE"/>
		<description>

This update of iscscitarget/tgt fixes multiple overflows and a format 
string vulnerability:

    * CVE-2010-2221: CVSS v2 Base Score: 5.0 (MEDIUM)
      (AV:N/AC:L/Au:N/C:N/I:N/A:P): Buffer Errors (CWE-119)
    * CVE-2010-0743: CVSS v2 Base Score: 5.0 (MEDIUM)
      (AV:N/AC:L/Au:N/C:N/I:N/A:P): Format String Vulnerability (CWE-134)

		</description>
<advisory from="security@suse.de">
	<issued date="2010-08-04"/>
	<updated date="2010-08-04"/>
	<bugzilla href="https://bugzilla.suse.com/592928">SUSE bug 592928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/618574">SUSE bug 618574</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0743/">CVE-2010-0743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0743">CVE-2010-0743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2221/">CVE-2010-2221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2221">CVE-2010-2221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570077" comment="iscsitarget-0.4.15-94.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570078" comment="iscsitarget-kmp-default-0.4.15_2.6.27.48_0.6-94.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570079" comment="iscsitarget-kmp-pae-0.4.15_2.6.27.48_0.6-94.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570080" comment="iscsitarget-kmp-ppc64-0.4.15_2.6.27.48_0.6-94.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570081" comment="iscsitarget-kmp-vmi-0.4.15_2.6.27.48_0.6-94.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570082" comment="iscsitarget-kmp-xen-0.4.15_2.6.27.48_0.6-94.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570077" comment="iscsitarget-0.4.15-94.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570078" comment="iscsitarget-kmp-default-0.4.15_2.6.27.48_0.6-94.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570079" comment="iscsitarget-kmp-pae-0.4.15_2.6.27.48_0.6-94.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570080" comment="iscsitarget-kmp-ppc64-0.4.15_2.6.27.48_0.6-94.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570081" comment="iscsitarget-kmp-vmi-0.4.15_2.6.27.48_0.6-94.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570082" comment="iscsitarget-kmp-xen-0.4.15_2.6.27.48_0.6-94.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216700" version="1" class="patch">
	<metadata>
		<title>Security update for IBM Java 1.4.2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="475425" ref_url="https://bugzilla.suse.com/475425" source="BUGZILLA"/>
		<reference ref_id="489052" ref_url="https://bugzilla.suse.com/489052" source="BUGZILLA"/>
		<reference ref_id="540945" ref_url="https://bugzilla.suse.com/540945" source="BUGZILLA"/>
		<reference ref_id="551829" ref_url="https://bugzilla.suse.com/551829" source="BUGZILLA"/>
		<reference ref_id="561831" ref_url="https://bugzilla.suse.com/561831" source="BUGZILLA"/>
		<reference ref_id="590826" ref_url="https://bugzilla.suse.com/590826" source="BUGZILLA"/>
		<reference ref_id="594791" ref_url="https://bugzilla.suse.com/594791" source="BUGZILLA"/>
		<reference ref_id="603353" ref_url="https://bugzilla.suse.com/603353" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-2086" ref_url="https://www.suse.com/security/cve/CVE-2008-2086/" source="CVE"/>
		<reference ref_id="CVE-2008-5339" ref_url="https://www.suse.com/security/cve/CVE-2008-5339/" source="CVE"/>
		<reference ref_id="CVE-2008-5340" ref_url="https://www.suse.com/security/cve/CVE-2008-5340/" source="CVE"/>
		<reference ref_id="CVE-2008-5342" ref_url="https://www.suse.com/security/cve/CVE-2008-5342/" source="CVE"/>
		<reference ref_id="CVE-2008-5343" ref_url="https://www.suse.com/security/cve/CVE-2008-5343/" source="CVE"/>
		<reference ref_id="CVE-2008-5344" ref_url="https://www.suse.com/security/cve/CVE-2008-5344/" source="CVE"/>
		<reference ref_id="CVE-2008-5345" ref_url="https://www.suse.com/security/cve/CVE-2008-5345/" source="CVE"/>
		<reference ref_id="CVE-2008-5346" ref_url="https://www.suse.com/security/cve/CVE-2008-5346/" source="CVE"/>
		<reference ref_id="CVE-2008-5348" ref_url="https://www.suse.com/security/cve/CVE-2008-5348/" source="CVE"/>
		<reference ref_id="CVE-2008-5349" ref_url="https://www.suse.com/security/cve/CVE-2008-5349/" source="CVE"/>
		<reference ref_id="CVE-2008-5350" ref_url="https://www.suse.com/security/cve/CVE-2008-5350/" source="CVE"/>
		<reference ref_id="CVE-2008-5351" ref_url="https://www.suse.com/security/cve/CVE-2008-5351/" source="CVE"/>
		<reference ref_id="CVE-2008-5353" ref_url="https://www.suse.com/security/cve/CVE-2008-5353/" source="CVE"/>
		<reference ref_id="CVE-2008-5354" ref_url="https://www.suse.com/security/cve/CVE-2008-5354/" source="CVE"/>
		<reference ref_id="CVE-2008-5356" ref_url="https://www.suse.com/security/cve/CVE-2008-5356/" source="CVE"/>
		<reference ref_id="CVE-2008-5357" ref_url="https://www.suse.com/security/cve/CVE-2008-5357/" source="CVE"/>
		<reference ref_id="CVE-2008-5359" ref_url="https://www.suse.com/security/cve/CVE-2008-5359/" source="CVE"/>
		<reference ref_id="CVE-2008-5360" ref_url="https://www.suse.com/security/cve/CVE-2008-5360/" source="CVE"/>
		<reference ref_id="CVE-2009-1100" ref_url="https://www.suse.com/security/cve/CVE-2009-1100/" source="CVE"/>
		<reference ref_id="CVE-2009-2625" ref_url="https://www.suse.com/security/cve/CVE-2009-2625/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-3867" ref_url="https://www.suse.com/security/cve/CVE-2009-3867/" source="CVE"/>
		<reference ref_id="CVE-2009-3869" ref_url="https://www.suse.com/security/cve/CVE-2009-3869/" source="CVE"/>
		<reference ref_id="CVE-2009-3871" ref_url="https://www.suse.com/security/cve/CVE-2009-3871/" source="CVE"/>
		<reference ref_id="CVE-2009-3874" ref_url="https://www.suse.com/security/cve/CVE-2009-3874/" source="CVE"/>
		<reference ref_id="CVE-2009-3875" ref_url="https://www.suse.com/security/cve/CVE-2009-3875/" source="CVE"/>
		<reference ref_id="CVE-2010-0084" ref_url="https://www.suse.com/security/cve/CVE-2010-0084/" source="CVE"/>
		<reference ref_id="CVE-2010-0085" ref_url="https://www.suse.com/security/cve/CVE-2010-0085/" source="CVE"/>
		<reference ref_id="CVE-2010-0087" ref_url="https://www.suse.com/security/cve/CVE-2010-0087/" source="CVE"/>
		<reference ref_id="CVE-2010-0088" ref_url="https://www.suse.com/security/cve/CVE-2010-0088/" source="CVE"/>
		<reference ref_id="CVE-2010-0089" ref_url="https://www.suse.com/security/cve/CVE-2010-0089/" source="CVE"/>
		<reference ref_id="CVE-2010-0091" ref_url="https://www.suse.com/security/cve/CVE-2010-0091/" source="CVE"/>
		<reference ref_id="CVE-2010-0095" ref_url="https://www.suse.com/security/cve/CVE-2010-0095/" source="CVE"/>
		<reference ref_id="CVE-2010-0839" ref_url="https://www.suse.com/security/cve/CVE-2010-0839/" source="CVE"/>
		<reference ref_id="CVE-2010-0840" ref_url="https://www.suse.com/security/cve/CVE-2010-0840/" source="CVE"/>
		<reference ref_id="CVE-2010-0841" ref_url="https://www.suse.com/security/cve/CVE-2010-0841/" source="CVE"/>
		<reference ref_id="CVE-2010-0842" ref_url="https://www.suse.com/security/cve/CVE-2010-0842/" source="CVE"/>
		<reference ref_id="CVE-2010-0843" ref_url="https://www.suse.com/security/cve/CVE-2010-0843/" source="CVE"/>
		<reference ref_id="CVE-2010-0844" ref_url="https://www.suse.com/security/cve/CVE-2010-0844/" source="CVE"/>
		<reference ref_id="CVE-2010-0846" ref_url="https://www.suse.com/security/cve/CVE-2010-0846/" source="CVE"/>
		<reference ref_id="CVE-2010-0847" ref_url="https://www.suse.com/security/cve/CVE-2010-0847/" source="CVE"/>
		<reference ref_id="CVE-2010-0848" ref_url="https://www.suse.com/security/cve/CVE-2010-0848/" source="CVE"/>
		<reference ref_id="CVE-2010-0849" ref_url="https://www.suse.com/security/cve/CVE-2010-0849/" source="CVE"/>
		<description>
This update brings the IBM Java 1.4.2 JDK and JRE to
Service Release 13. It fixes lots of bugs and various
security issues:

CVE-2008-5350: A security vulnerability in the Java Runtime
Environment (JRE) may allow an untrusted applet or
application to list the contents of the home directory of
the user running the applet or application.

CVE-2008-5346: A security vulnerability in the Java Runtime
Environment (JRE) with parsing zip files may allow an
untrusted applet or application to read arbitrary memory
locations in the process that the applet or application is
running in.

CVE-2008-5343: A vulnerability in Java Web Start and Java
Plug-in may allow hidden code on a host to make network
connections to that host and to hijack HTTP sessions using
cookies stored in the browser.

CVE-2008-5344: A vulnerability in the Java Runtime
Environment (JRE) with applet classloading may allow an
untrusted applet to read arbitrary files on a system that
the applet runs on and make network connections to hosts
other than the host it was loaded from.

CVE-2008-5359: A buffer overflow vulnerability in the Java
Runtime Environment (JRE) image processing code may allow
an untrusted applet or application to escalate privileges.
For example, an untrusted applet may grant itself
permissions to read and write local files or execute local
applications that are accessible to the user running the
untrusted applet.

CVE-2008-5339: A vulnerability in the Java Runtime
Environment (JRE) may allow an untrusted Java Web Start
application to make network connections to hosts other than
the host that the application is downloaded from.

CVE-2008-5340: A vulnerability in the Java Runtime
Environment with launching Java Web Start applications may
allow an untrusted Java Web Start application to escalate
privileges. For example, an untrusted application may grant
itself permissions to read and write local files or execute
local applications that are accessible to the user running
the untrusted application.

CVE-2008-5348: A security vulnerability in the Java Runtime
Environment (JRE) with authenticating users through
Kerberos may lead to a Denial of Service (DoS) to the
system as a whole, due to excessive consumption of
operating system resources.

CVE-2008-2086: A vulnerability in Java Web Start may allow
certain trusted operations to be performed, such as
modifying system properties.

CVE-2008-5345: The Java Runtime Environment (JRE) allows
code loaded from the local filesystem to access localhost.
This may allow code that is maliciously placed on the local
filesystem and then subsequently run, to have network
access to localhost that would not otherwise be allowed if
the code were loaded from a remote host. This may be
leveraged to steal cookies and hijack sessions (for domains
that map a name to the localhost).

CVE-2008-5351: The UTF-8 (Unicode Transformation Format-8)
decoder in the Java Runtime Environment (JRE) accepts
encodings that are longer than the 'shortest' form. This
behavior is not a vulnerability in Java SE. However, it may
be leveraged to exploit systems running software that
relies on the JRE UTF-8 decoder to reject non-shortest form
sequences. For example, non-shortest form sequences may be
decoded into illegal URIs, which may then allow files that
are not otherwise accessible to be read, if the URIs are
not checked following UTF-8 decoding.

CVE-2008-5360: The Java Runtime Environment creates
temporary files with insufficiently random names. This may
be leveraged to write JAR files which may then be loaded as
untrusted applets and Java Web Start applications to access
and provide services from localhost and hence steal cookies.

CVE-2008-5353: A security vulnerability in the Java Runtime
Environment (JRE) related to deserializing calendar objects
may allow an untrusted applet or application to escalate
privileges. For example, an untrusted applet may grant
itself permissions to read and write local files or execute
local applications that are accessible to the user running
the untrusted applet.

CVE-2008-5356: A buffer vulnerability in the Java Runtime
Environment (JRE) with processing fonts may allow an
untrusted applet or Java Web Start application to escalate
privileges. For example, an untrusted applet may grant
itself permissions to read and write local files or execute
local applications that are accessible to the user running
the untrusted applet.

CVE-2008-5354: A buffer overflow vulnerability in the Java
Runtime Environment (JRE) may allow an untrusted Java
application that is launched through the command line to
escalate privileges. For example, the untrusted Java
application may grant itself permissions to read and write
local files or execute local applications that are
accessible to the user running the untrusted Java
application.

 This vulnerability cannot be exploited by an applet or
Java Web Start application.

CVE-2008-5357: A buffer vulnerability in the Java Runtime
Environment (JRE) with processing fonts may allow an
untrusted applet or Java Web Start application to escalate
privileges. For example, an untrusted applet may grant
itself permissions to read and write local files or execute
local applications that are accessible to the user running
the untrusted applet.

CVE-2008-5342: A security vulnerability in the the Java Web
Start BasicService allows untrusted applications that are
downloaded from another system to request local files to be
displayed by the browser of the user running the untrusted
application.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-05"/>
	<updated date="2009-04-05"/>
	<bugzilla href="https://bugzilla.suse.com/475425">SUSE bug 475425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/489052">SUSE bug 489052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/540945">SUSE bug 540945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/551829">SUSE bug 551829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/561831">SUSE bug 561831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/590826">SUSE bug 590826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/594791">SUSE bug 594791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/603353">SUSE bug 603353</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2086/">CVE-2008-2086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2086">CVE-2008-2086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5339/">CVE-2008-5339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5339">CVE-2008-5339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5340/">CVE-2008-5340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5340">CVE-2008-5340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5342/">CVE-2008-5342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5342">CVE-2008-5342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5343/">CVE-2008-5343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5343">CVE-2008-5343 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5344/">CVE-2008-5344 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5344">CVE-2008-5344 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5345/">CVE-2008-5345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5345">CVE-2008-5345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5346/">CVE-2008-5346 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5346">CVE-2008-5346 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5348/">CVE-2008-5348 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5348">CVE-2008-5348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5349/">CVE-2008-5349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5349">CVE-2008-5349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5350/">CVE-2008-5350 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5350">CVE-2008-5350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5351/">CVE-2008-5351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5351">CVE-2008-5351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5353/">CVE-2008-5353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5353">CVE-2008-5353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5354/">CVE-2008-5354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5354">CVE-2008-5354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5356/">CVE-2008-5356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5356">CVE-2008-5356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5357/">CVE-2008-5357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5357">CVE-2008-5357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5359/">CVE-2008-5359 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5359">CVE-2008-5359 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5360/">CVE-2008-5360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5360">CVE-2008-5360 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1100/">CVE-2009-1100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1100">CVE-2009-1100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2625/">CVE-2009-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2625">CVE-2009-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3867/">CVE-2009-3867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3867">CVE-2009-3867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3869/">CVE-2009-3869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3869">CVE-2009-3869 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3871/">CVE-2009-3871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3871">CVE-2009-3871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3874/">CVE-2009-3874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3874">CVE-2009-3874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3875/">CVE-2009-3875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3875">CVE-2009-3875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0084/">CVE-2010-0084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0084">CVE-2010-0084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0085/">CVE-2010-0085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0085">CVE-2010-0085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0087/">CVE-2010-0087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0087">CVE-2010-0087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0088/">CVE-2010-0088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0088">CVE-2010-0088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0089/">CVE-2010-0089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0089">CVE-2010-0089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0091/">CVE-2010-0091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0091">CVE-2010-0091 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0095/">CVE-2010-0095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0095">CVE-2010-0095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0839/">CVE-2010-0839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0839">CVE-2010-0839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0840/">CVE-2010-0840 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-0840">CVE-2010-0840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0841/">CVE-2010-0841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0841">CVE-2010-0841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0842/">CVE-2010-0842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0842">CVE-2010-0842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0843/">CVE-2010-0843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0843">CVE-2010-0843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0844/">CVE-2010-0844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0844">CVE-2010-0844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0846/">CVE-2010-0846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0846">CVE-2010-0846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0847/">CVE-2010-0847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0847">CVE-2010-0847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0848/">CVE-2010-0848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0848">CVE-2010-0848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0849/">CVE-2010-0849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0849">CVE-2010-0849 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570083" comment="java-1_4_2-ibm-1.4.2_sr13-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570084" comment="java-1_4_2-ibm-jdbc-1.4.2_sr13-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570085" comment="java-1_4_2-ibm-plugin-1.4.2_sr13-0.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570083" comment="java-1_4_2-ibm-1.4.2_sr13-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570084" comment="java-1_4_2-ibm-jdbc-1.4.2_sr13-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570085" comment="java-1_4_2-ibm-plugin-1.4.2_sr13-0.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216701" version="1" class="patch">
	<metadata>
		<title>Security update for BEA Java 1.5.0</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="472384" ref_url="https://bugzilla.suse.com/472384" source="BUGZILLA"/>
		<description>

BEA Java for Itanium has been updated to version 1.5.0.13.1.2.



This contains all fixes equivalent to Sun JAVA SE 1.5 Update 11.


		</description>
<advisory from="security@suse.de">
	<issued date="2010-02-19"/>
	<updated date="2010-02-19"/>
	<bugzilla href="https://bugzilla.suse.com/472384">SUSE bug 472384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570086" comment="java-1_5_0-bea-1.5.0.13.1.2-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570087" comment="java-1_5_0-bea-console-1.5.0.13.1.2-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570088" comment="java-1_5_0-bea-fonts-1.5.0.13.1.2-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570089" comment="java-1_5_0-bea-jdbc-1.5.0.13.1.2-0.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570086" comment="java-1_5_0-bea-1.5.0.13.1.2-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570087" comment="java-1_5_0-bea-console-1.5.0.13.1.2-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570088" comment="java-1_5_0-bea-fonts-1.5.0.13.1.2-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570089" comment="java-1_5_0-bea-jdbc-1.5.0.13.1.2-0.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216702" version="1" class="patch">
	<metadata>
		<title>Security update for IBM Java 1.6.0</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="489052" ref_url="https://bugzilla.suse.com/489052" source="BUGZILLA"/>
		<reference ref_id="494536" ref_url="https://bugzilla.suse.com/494536" source="BUGZILLA"/>
		<reference ref_id="516361" ref_url="https://bugzilla.suse.com/516361" source="BUGZILLA"/>
		<reference ref_id="548655" ref_url="https://bugzilla.suse.com/548655" source="BUGZILLA"/>
		<reference ref_id="558342" ref_url="https://bugzilla.suse.com/558342" source="BUGZILLA"/>
		<reference ref_id="561859" ref_url="https://bugzilla.suse.com/561859" source="BUGZILLA"/>
		<reference ref_id="603283" ref_url="https://bugzilla.suse.com/603283" source="BUGZILLA"/>
		<reference ref_id="624224" ref_url="https://bugzilla.suse.com/624224" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-5340" ref_url="https://www.suse.com/security/cve/CVE-2008-5340/" source="CVE"/>
		<reference ref_id="CVE-2008-5341" ref_url="https://www.suse.com/security/cve/CVE-2008-5341/" source="CVE"/>
		<reference ref_id="CVE-2008-5342" ref_url="https://www.suse.com/security/cve/CVE-2008-5342/" source="CVE"/>
		<reference ref_id="CVE-2008-5351" ref_url="https://www.suse.com/security/cve/CVE-2008-5351/" source="CVE"/>
		<reference ref_id="CVE-2008-5356" ref_url="https://www.suse.com/security/cve/CVE-2008-5356/" source="CVE"/>
		<reference ref_id="CVE-2008-5357" ref_url="https://www.suse.com/security/cve/CVE-2008-5357/" source="CVE"/>
		<reference ref_id="CVE-2008-5358" ref_url="https://www.suse.com/security/cve/CVE-2008-5358/" source="CVE"/>
		<reference ref_id="CVE-2009-0217" ref_url="https://www.suse.com/security/cve/CVE-2009-0217/" source="CVE"/>
		<reference ref_id="CVE-2009-1093" ref_url="https://www.suse.com/security/cve/CVE-2009-1093/" source="CVE"/>
		<reference ref_id="CVE-2009-1094" ref_url="https://www.suse.com/security/cve/CVE-2009-1094/" source="CVE"/>
		<reference ref_id="CVE-2009-1095" ref_url="https://www.suse.com/security/cve/CVE-2009-1095/" source="CVE"/>
		<reference ref_id="CVE-2009-1096" ref_url="https://www.suse.com/security/cve/CVE-2009-1096/" source="CVE"/>
		<reference ref_id="CVE-2009-1097" ref_url="https://www.suse.com/security/cve/CVE-2009-1097/" source="CVE"/>
		<reference ref_id="CVE-2009-1098" ref_url="https://www.suse.com/security/cve/CVE-2009-1098/" source="CVE"/>
		<reference ref_id="CVE-2009-1099" ref_url="https://www.suse.com/security/cve/CVE-2009-1099/" source="CVE"/>
		<reference ref_id="CVE-2009-1100" ref_url="https://www.suse.com/security/cve/CVE-2009-1100/" source="CVE"/>
		<reference ref_id="CVE-2009-1101" ref_url="https://www.suse.com/security/cve/CVE-2009-1101/" source="CVE"/>
		<reference ref_id="CVE-2009-1103" ref_url="https://www.suse.com/security/cve/CVE-2009-1103/" source="CVE"/>
		<reference ref_id="CVE-2009-1104" ref_url="https://www.suse.com/security/cve/CVE-2009-1104/" source="CVE"/>
		<reference ref_id="CVE-2009-1105" ref_url="https://www.suse.com/security/cve/CVE-2009-1105/" source="CVE"/>
		<reference ref_id="CVE-2009-1106" ref_url="https://www.suse.com/security/cve/CVE-2009-1106/" source="CVE"/>
		<reference ref_id="CVE-2009-1107" ref_url="https://www.suse.com/security/cve/CVE-2009-1107/" source="CVE"/>
		<reference ref_id="CVE-2009-2493" ref_url="https://www.suse.com/security/cve/CVE-2009-2493/" source="CVE"/>
		<reference ref_id="CVE-2009-2625" ref_url="https://www.suse.com/security/cve/CVE-2009-2625/" source="CVE"/>
		<reference ref_id="CVE-2009-2670" ref_url="https://www.suse.com/security/cve/CVE-2009-2670/" source="CVE"/>
		<reference ref_id="CVE-2009-2671" ref_url="https://www.suse.com/security/cve/CVE-2009-2671/" source="CVE"/>
		<reference ref_id="CVE-2009-2672" ref_url="https://www.suse.com/security/cve/CVE-2009-2672/" source="CVE"/>
		<reference ref_id="CVE-2009-2673" ref_url="https://www.suse.com/security/cve/CVE-2009-2673/" source="CVE"/>
		<reference ref_id="CVE-2009-2674" ref_url="https://www.suse.com/security/cve/CVE-2009-2674/" source="CVE"/>
		<reference ref_id="CVE-2009-2675" ref_url="https://www.suse.com/security/cve/CVE-2009-2675/" source="CVE"/>
		<reference ref_id="CVE-2009-2676" ref_url="https://www.suse.com/security/cve/CVE-2009-2676/" source="CVE"/>
		<reference ref_id="CVE-2009-3865" ref_url="https://www.suse.com/security/cve/CVE-2009-3865/" source="CVE"/>
		<reference ref_id="CVE-2009-3866" ref_url="https://www.suse.com/security/cve/CVE-2009-3866/" source="CVE"/>
		<reference ref_id="CVE-2009-3867" ref_url="https://www.suse.com/security/cve/CVE-2009-3867/" source="CVE"/>
		<reference ref_id="CVE-2009-3868" ref_url="https://www.suse.com/security/cve/CVE-2009-3868/" source="CVE"/>
		<reference ref_id="CVE-2009-3869" ref_url="https://www.suse.com/security/cve/CVE-2009-3869/" source="CVE"/>
		<reference ref_id="CVE-2009-3871" ref_url="https://www.suse.com/security/cve/CVE-2009-3871/" source="CVE"/>
		<reference ref_id="CVE-2009-3872" ref_url="https://www.suse.com/security/cve/CVE-2009-3872/" source="CVE"/>
		<reference ref_id="CVE-2009-3873" ref_url="https://www.suse.com/security/cve/CVE-2009-3873/" source="CVE"/>
		<reference ref_id="CVE-2009-3874" ref_url="https://www.suse.com/security/cve/CVE-2009-3874/" source="CVE"/>
		<reference ref_id="CVE-2009-3875" ref_url="https://www.suse.com/security/cve/CVE-2009-3875/" source="CVE"/>
		<reference ref_id="CVE-2009-3876" ref_url="https://www.suse.com/security/cve/CVE-2009-3876/" source="CVE"/>
		<reference ref_id="CVE-2009-3877" ref_url="https://www.suse.com/security/cve/CVE-2009-3877/" source="CVE"/>
		<reference ref_id="CVE-2010-0084" ref_url="https://www.suse.com/security/cve/CVE-2010-0084/" source="CVE"/>
		<reference ref_id="CVE-2010-0085" ref_url="https://www.suse.com/security/cve/CVE-2010-0085/" source="CVE"/>
		<reference ref_id="CVE-2010-0087" ref_url="https://www.suse.com/security/cve/CVE-2010-0087/" source="CVE"/>
		<reference ref_id="CVE-2010-0088" ref_url="https://www.suse.com/security/cve/CVE-2010-0088/" source="CVE"/>
		<reference ref_id="CVE-2010-0089" ref_url="https://www.suse.com/security/cve/CVE-2010-0089/" source="CVE"/>
		<reference ref_id="CVE-2010-0090" ref_url="https://www.suse.com/security/cve/CVE-2010-0090/" source="CVE"/>
		<reference ref_id="CVE-2010-0091" ref_url="https://www.suse.com/security/cve/CVE-2010-0091/" source="CVE"/>
		<reference ref_id="CVE-2010-0092" ref_url="https://www.suse.com/security/cve/CVE-2010-0092/" source="CVE"/>
		<reference ref_id="CVE-2010-0094" ref_url="https://www.suse.com/security/cve/CVE-2010-0094/" source="CVE"/>
		<reference ref_id="CVE-2010-0095" ref_url="https://www.suse.com/security/cve/CVE-2010-0095/" source="CVE"/>
		<reference ref_id="CVE-2010-0837" ref_url="https://www.suse.com/security/cve/CVE-2010-0837/" source="CVE"/>
		<reference ref_id="CVE-2010-0838" ref_url="https://www.suse.com/security/cve/CVE-2010-0838/" source="CVE"/>
		<reference ref_id="CVE-2010-0839" ref_url="https://www.suse.com/security/cve/CVE-2010-0839/" source="CVE"/>
		<reference ref_id="CVE-2010-0840" ref_url="https://www.suse.com/security/cve/CVE-2010-0840/" source="CVE"/>
		<reference ref_id="CVE-2010-0841" ref_url="https://www.suse.com/security/cve/CVE-2010-0841/" source="CVE"/>
		<reference ref_id="CVE-2010-0842" ref_url="https://www.suse.com/security/cve/CVE-2010-0842/" source="CVE"/>
		<reference ref_id="CVE-2010-0843" ref_url="https://www.suse.com/security/cve/CVE-2010-0843/" source="CVE"/>
		<reference ref_id="CVE-2010-0844" ref_url="https://www.suse.com/security/cve/CVE-2010-0844/" source="CVE"/>
		<reference ref_id="CVE-2010-0846" ref_url="https://www.suse.com/security/cve/CVE-2010-0846/" source="CVE"/>
		<reference ref_id="CVE-2010-0847" ref_url="https://www.suse.com/security/cve/CVE-2010-0847/" source="CVE"/>
		<reference ref_id="CVE-2010-0848" ref_url="https://www.suse.com/security/cve/CVE-2010-0848/" source="CVE"/>
		<reference ref_id="CVE-2010-0849" ref_url="https://www.suse.com/security/cve/CVE-2010-0849/" source="CVE"/>
		<description>
This update brings the IBM Java 6 JDK and JRE to Service
Release 4. It fixes lots of bugs and various security
issues:

CVE-2008-5341: A vulnerability in the Java Runtime
Environment may allow an untrusted Java Web Start
application to determine the location of the Java Web Start
cache and the username of the user running the Java Web
Start application.

CVE-2008-5340: A vulnerability in the Java Runtime
Environment with launching Java Web Start applications may
allow an untrusted Java Web Start application to escalate
privileges. For example, an untrusted application may grant
itself permissions to read and write local files or execute
local applications that are accessible to the user running
the untrusted application.

CVE-2008-5351: The UTF-8 (Unicode Transformation Format-8)
decoder in the Java Runtime Environment (JRE) accepts
encodings that are longer than the 'shortest' form. This
behavior is not a vulnerability in Java SE. However, it may
be leveraged to exploit systems running software that
relies on the JRE UTF-8 decoder to reject non-shortest form
sequences. For example, non-shortest form sequences may be
decoded into illegal URIs, which may then allow files that
are not otherwise accessible to be read, if the URIs are
not checked following UTF-8 decoding.

CVE-2008-5356: A buffer vulnerability in the Java Runtime
Environment (JRE) with processing fonts may allow an
untrusted applet or Java Web Start application to escalate
privileges. For example, an untrusted applet may grant
itself permissions to read and write local files or execute
local applications that are accessible to the user running
the untrusted applet.

CVE-2008-5357: A buffer vulnerability in the Java Runtime
Environment (JRE) with processing fonts may allow an
untrusted applet or Java Web Start application to escalate
privileges. For example, an untrusted applet may grant
itself permissions to read and write local files or execute
local applications that are accessible to the user running
the untrusted applet.

CVE-2008-5358: A buffer overflow vulnerability in the Java
Runtime Environment with processing GIF images may allow an
untrusted Java Web Start application to escalate
privileges. For example, an untrusted application may grant
itself permissions to read and write local files or execute
local applications that are accessible to the user running
the untrusted applet.

CVE-2008-5342: A security vulnerability in the the Java Web
Start BasicService allows untrusted applications that are
downloaded from another system to request local files to be
displayed by the browser of the user running the untrusted
application.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-05"/>
	<updated date="2009-04-05"/>
	<bugzilla href="https://bugzilla.suse.com/489052">SUSE bug 489052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/494536">SUSE bug 494536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/516361">SUSE bug 516361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/548655">SUSE bug 548655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/558342">SUSE bug 558342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/561859">SUSE bug 561859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/603283">SUSE bug 603283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/624224">SUSE bug 624224</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5340/">CVE-2008-5340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5340">CVE-2008-5340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5341/">CVE-2008-5341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5341">CVE-2008-5341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5342/">CVE-2008-5342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5342">CVE-2008-5342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5351/">CVE-2008-5351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5351">CVE-2008-5351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5356/">CVE-2008-5356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5356">CVE-2008-5356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5357/">CVE-2008-5357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5357">CVE-2008-5357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5358/">CVE-2008-5358 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5358">CVE-2008-5358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0217/">CVE-2009-0217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0217">CVE-2009-0217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1093/">CVE-2009-1093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1093">CVE-2009-1093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1094/">CVE-2009-1094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1094">CVE-2009-1094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1095/">CVE-2009-1095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1095">CVE-2009-1095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1096/">CVE-2009-1096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1096">CVE-2009-1096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1097/">CVE-2009-1097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1097">CVE-2009-1097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1098/">CVE-2009-1098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1098">CVE-2009-1098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1099/">CVE-2009-1099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1099">CVE-2009-1099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1100/">CVE-2009-1100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1100">CVE-2009-1100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1101/">CVE-2009-1101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1101">CVE-2009-1101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1103/">CVE-2009-1103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1103">CVE-2009-1103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1104/">CVE-2009-1104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1104">CVE-2009-1104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1105/">CVE-2009-1105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1105">CVE-2009-1105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1106/">CVE-2009-1106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1106">CVE-2009-1106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1107/">CVE-2009-1107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1107">CVE-2009-1107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2493/">CVE-2009-2493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2493">CVE-2009-2493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2625/">CVE-2009-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2625">CVE-2009-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2670/">CVE-2009-2670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2670">CVE-2009-2670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2671/">CVE-2009-2671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2671">CVE-2009-2671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2672/">CVE-2009-2672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2672">CVE-2009-2672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2673/">CVE-2009-2673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2673">CVE-2009-2673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2674/">CVE-2009-2674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2674">CVE-2009-2674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2675/">CVE-2009-2675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2675">CVE-2009-2675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2676/">CVE-2009-2676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2676">CVE-2009-2676 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3865/">CVE-2009-3865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3865">CVE-2009-3865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3866/">CVE-2009-3866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3866">CVE-2009-3866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3867/">CVE-2009-3867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3867">CVE-2009-3867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3868/">CVE-2009-3868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3868">CVE-2009-3868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3869/">CVE-2009-3869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3869">CVE-2009-3869 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3871/">CVE-2009-3871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3871">CVE-2009-3871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3872/">CVE-2009-3872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3872">CVE-2009-3872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3873/">CVE-2009-3873 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3873">CVE-2009-3873 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3874/">CVE-2009-3874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3874">CVE-2009-3874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3875/">CVE-2009-3875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3875">CVE-2009-3875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3876/">CVE-2009-3876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3876">CVE-2009-3876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3877/">CVE-2009-3877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3877">CVE-2009-3877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0084/">CVE-2010-0084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0084">CVE-2010-0084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0085/">CVE-2010-0085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0085">CVE-2010-0085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0087/">CVE-2010-0087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0087">CVE-2010-0087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0088/">CVE-2010-0088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0088">CVE-2010-0088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0089/">CVE-2010-0089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0089">CVE-2010-0089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0090/">CVE-2010-0090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0090">CVE-2010-0090 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0091/">CVE-2010-0091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0091">CVE-2010-0091 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0092/">CVE-2010-0092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0092">CVE-2010-0092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0094/">CVE-2010-0094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0094">CVE-2010-0094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0095/">CVE-2010-0095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0095">CVE-2010-0095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0837/">CVE-2010-0837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0837">CVE-2010-0837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0838/">CVE-2010-0838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0838">CVE-2010-0838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0839/">CVE-2010-0839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0839">CVE-2010-0839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0840/">CVE-2010-0840 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-0840">CVE-2010-0840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0841/">CVE-2010-0841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0841">CVE-2010-0841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0842/">CVE-2010-0842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0842">CVE-2010-0842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0843/">CVE-2010-0843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0843">CVE-2010-0843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0844/">CVE-2010-0844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0844">CVE-2010-0844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0846/">CVE-2010-0846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0846">CVE-2010-0846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0847/">CVE-2010-0847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0847">CVE-2010-0847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0848/">CVE-2010-0848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0848">CVE-2010-0848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0849/">CVE-2010-0849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0849">CVE-2010-0849 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570090" comment="java-1_6_0-ibm-1.6.0-124.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570091" comment="java-1_6_0-ibm-alsa-1.6.0-124.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570092" comment="java-1_6_0-ibm-alsa-x86-1.6.0-124.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570093" comment="java-1_6_0-ibm-fonts-1.6.0-124.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570094" comment="java-1_6_0-ibm-jdbc-1.6.0-124.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570095" comment="java-1_6_0-ibm-plugin-1.6.0-124.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570096" comment="java-1_6_0-ibm-x86-1.6.0-124.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570090" comment="java-1_6_0-ibm-1.6.0-124.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570091" comment="java-1_6_0-ibm-alsa-1.6.0-124.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570092" comment="java-1_6_0-ibm-alsa-x86-1.6.0-124.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570093" comment="java-1_6_0-ibm-fonts-1.6.0-124.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570094" comment="java-1_6_0-ibm-jdbc-1.6.0-124.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570095" comment="java-1_6_0-ibm-plugin-1.6.0-124.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570096" comment="java-1_6_0-ibm-x86-1.6.0-124.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216703" version="1" class="patch">
	<metadata>
		<title>Security update for KDE4 PIM packages</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="490696" ref_url="https://bugzilla.suse.com/490696" source="BUGZILLA"/>
		<description>
This kdepim4 and kdepimlibs4 update fixes lots of bugs and
one security issue:

KMail 4.1.x executes links in mail without confirmation.
(no cve assigned yet)

It also fixes lots of non-security bugs:

kdepim4:
  - kdepim: make sure we initially create items for
    subresources
  - kdepim: fix autocompletion shortcut error
  - kdepim: reduce linkage
  - akregator: fix copy text from article view widget
    (kde#168865)
  - akregator: fix saving articlelistview settings
    (kde#176262,bnc#430825)
  - akregator: improve prev/next unread article behavior
    when a filter is set (kde#138935)
  - gpgme: Fix persistent progress dialogs for GPG key ops
    (kde#169563)
  - kaddressbook: fix help anchors
  - kaddressbook: set department and org fields on vcard
    export
  - kaddressbook: Fix LDIF import for files with windows
    linebreaks
  - kalarm: fix translation not loaded
  - kalarm: correctly handle failure to create alarm
    resource
  - kalarm: Copying alarm to KOrganizer fails when embedded
    in Kontact (kde#176759)
  - kalarm: Fix kalarmautostart crash on logout
  - kalarm: fix click on system tray icon not showing main
    window
  - kalarm: disabled from enabled alarm colour when
    highlighted in alarm list
  - kalarm: UI fixes
  - kalarm: signal when work hours change
  - kalarm: fix command alarms (kde#175623)
  - kalarm: Fix toolbar settings being lost
  - kalarm: Fix crash if activated again while restoring
    from previous session
  - kalarm: update change log
  - kalarm: correct system tray icon parent
  - kalarm: show idle time on correct virtual desktop
    (kde#153442,kde#174346)
  - kalarm: ensure alarms shown above full-screen windows
  - kalarm: Fix invalid alarm remaining in calendar on
    failure
  - kjots: fix paste of richtext and tabs becoming spaces
    bugs (kde#160600,kde#175100)
  - kmail: fix loss of configured receiving accounts on
    exit with wallet dialog open (kde#169166)
  - kmail: do not execute executables when clicking a link,
    and solve dangling kmmsgbase pointer crash
    (kde#179765,bnc#490696)
  - kmail: fix crash when syncing imap flags (kde#106030)
  - kmail: detect urgent X-Priority correctly
  - kmail: fix opening zip attachments
  - kmail: don't show unconfigurable shortcuts in dialog
  - kmail: fix added subfolders not appearing in the folder
    selection dialog
  - kmail: configure dialog UI fixes
  - kmail: display receiving accounts correctly in config
  - kmail: unread mail layout bug (bug#174304)
  - kmail: don't force duplicate add to addressbook
    (kde#174332)
  - kmail: remove deprecated spamassassin flag (kde#140032)
  - kmail: update detected encoding on inserting file in
    composer (kde#88781)
  - kmail: fix unreactive encoding change dialog
    (kde#149309,kde#145163)
  - kmail: update detected encoding on inserting file in
    composer (kde#88781)
  - kmail: fix out of range in parsing mail bug
  - kmail: various encoding fixes (kde#64815)
  - kmail: remove spurious assert
  - kmail: sieve dialog fixes
  - kmail: missing i18n
  - kmail: Fix the 'open in addressbook' action
  - kmail: attachments check fix
  - kmail: Fix spacing in Configure
  - kmail: fix inline-forwarding of messages with
    attachments. (kde#178128,kde#146921)
  - kmail: don't allow attachment deletion/editing in
    read-only folders (kolab#3324)
  - kmail: fix crash when clicking on one of the invitation
    action links
  - kmail: fix inline forwarding of multipart/mixed messages
  - kmail: fix crashing in templates (kde#178038)
  - knode: fix rules editor crash and saving and loading of
    scoring rules (kde:170030,kde:175045)
  - knode: fix incorrect charset header (kde:169411)
  - knode: safety checks
  - knotes: various crash fixes
  - knotes: don't exit when the last window is closed
    (kde#153244)
  - kontact: fix help anchors
  - kontact: fix crash on opening configure dialog
    (kde#174707)
  - korganizer: fix task filtering (kde#171205)
  - korganizer: public holidays for Chile
  - korganizer: public holidays for Jamaica
  - korganizer: fix crash when deleting categories with
    deep subcategories (kde#153740)
  - korganizer: fix Russian holidays
  - korganizer: allow to change my status even if I'm the
    organizer of this event (kolab#3084)
  - korganizer: Fix crashes on saving new calendar
  - korganizer: correct Norwegian public holidays
  - korganizer: calendar scroll widget fixes
  - korganizer: navigator bar menu fixes
  - korganizer: navigatorbar - fix selectMonth() to emit
    the correct month index
  - korganizer: navigatorbar - layout cleanup
  - korganizer: indicate when subresources are present
  - korganizer: fix missing RTL text in monthviews
  - korganizer: potential setNoActionCursor crash fix
  - korganizer: navigatorbar - fix jumping labels
  - korganizer: navigatorbar - fix crash on exit
  - korganizer: fix alignment of day labels to main matrix
  - korganizer: make do not show to-dos in monthview work
  - korganizer: fix crash on removing attendees (kde#172354)
  - korganizer: fix cancelling imip send
  - korganizer: fix print crashing (kde#160260)
  - korganizer: fix print default year
  - korganizer: fix printing generally
  - korganizer: fix printing UTC incidences (kde)
  - korganizer: fix month view doesnt react to key and
    mouse events (kde#175814)
  - korganizer: make paste work on actual selection
    (kde#175814,kde#132863)
  - korganizer: pasting fix
 - korganizer: fix sorting todos
  - korganizer: menu fixes
  - korganizer: backports to help make Paste work
  - korganizer: type-ahead event creation ignores ctrl keys
  - korganizer: robustness work in synchronous address book
    loading
  - korganizer: paint the all-day item headers
  - korganizer: initialise special dates UI correctly
  - korganizer: disable the configuration area for
    deselected plugins
  - korganizer: hide redundant configure plugin button
  - korganizer: fix agendaview configuration
  - korganizer: ensure agendaview decoration is selected
  - korganizer: fix to-do copying
  - korganizer: todo rich text speedup
  - korganizer: fix what's next view todo links
  - korganizer: fix event duplication when moving events
    with the mouse.
  - korganizer: fix duplicate default resources (bnc#116351)
  - korganizer: fix tab order
  - korganizer: fix performance problems on updateEvents()
  - korganizer: fix new journal is set to date of the first
    day of the week/month (kde#170634)
  - korganizer: fix slow switching calendar views
    (kde#170993)
  - korganizer: maintain selected day on view change
  - korganizer: fix performance problems with month
    switching (kde#166771)
  - korganizer: don't load decoration plugins multiple times
  - korganizer: an attempt at fixing the dreaded crash in
    paintEvent().
  - korganizer: fixes in pasting
  - korganizer: don't lose last day on setting recurring
    events
  - korganizer: updated Slovenian holidays
  - korganizer: avoid assert when adding attachments
  - kresources: blog - remove non-working LiveJournal
    support
  - kresources: birthdays - complete load sequence
  - kresources: birthdays - fix alarms
  - kresources: Write subresource state changes immediately
    (kolab#3314)
  - kresources: groupwise -  fixes to warn on trying to set
    up dud local&lt;-&gt;remote id mappings
  - ktimetracker: fix crash when deleting the last task
    (kde:173543)

kdepimlibs4:
  - fixes a crash on korgac startup triggered when parsing
    the timezoneId from a null string
  - libical safety fix
  - memleak in Generic kmime header
  - test before delete[] is not needed
  - fix memleak in knode
  - fix the kio_sieve related klauncher crashes
  - return better errors for gpgme write failures and
    missing passphrases
  - Fix signing of multiple uids (!= all, though) at the
    same time
  - Print the nextState() call also in the error case
  - gpgme: Fix 'General Error' returned when trying to sign
    an already signed UID again with the same key.
  - gpgme: use better error codes
  - gpgme: Treat GPGME_STATUS_{KEY,SIG}EXPIRED as errors,
    too.
  - gpgme: Add missing gpg_error() call (to set the correct
    source of the error)
  - kblog: fix broken tagging
  - kblog: GData tagging fix
  - fix sending mail fails due to spurious newline in
    server name configuration (kde#175892)
  - fix korganizer crash with akonadi resources (kde#175971)
  - remove use of isNull in icalformat
  - properly initialize kcal::attachment ctor
  - kcal: fix spurious error on empty alarm trigger
  - kcal: inline attachment fixes
  - kcal: crash fixes
  - kldap: crash bug fix (kde#174381)
  - Fix LDAP using simple authentication (kde#163319)
  - ldap: Quote CN parameters correctly. (kolab#3281)
  - update reference test files
  - merge updated testcase runner
  - use .shell versions of tests
  - remove mistaken reference files
  - fix a backporting boo-boo
  - kcal: fix an ical date interpretation bug
  - Fix a crash when using egroupware.
  - Fix a crash in KOrganizer when the addressbook contains
    a LDAP resource.
  - Fixes an assert crash when unloading and then loading a
    vCal resource
  - Fix high traffic rss feed fetches
  - Fix for improperly formatted mailto: links in the
    KOrganizer eventviewer.
  - fixcrash if data() returns null (CID:3969)
  - Fix sieve with dovecot servers
  - Fix parsing of time string to be more conforming to ISO
    8601
  - kcal: Fix iCal export due to wrongly discarded last
    byte (porting bug) (kde#182224)
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-17"/>
	<updated date="2009-04-17"/>
	<bugzilla href="https://bugzilla.suse.com/490696">SUSE bug 490696</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991157" comment="kde4-akonadi-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991158" comment="kde4-akregator-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991159" comment="kde4-kaddressbook-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991160" comment="kde4-kalarm-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991161" comment="kde4-kjots-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991162" comment="kde4-kmail-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991163" comment="kde4-knode-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991164" comment="kde4-knotes-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991165" comment="kde4-kontact-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991166" comment="kde4-korganizer-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991167" comment="kde4-ktimetracker-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991168" comment="kde4-ktnef-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991169" comment="kdepim4-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991170" comment="kdepim4-wizards-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570111" comment="kdepimlibs4-4.1.3-9.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570112" comment="libakonadi4-4.1.3-9.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991171" comment="libkdepim4-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570114" comment="libkdepimlibs4-4.1.3-9.28.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991157" comment="kde4-akonadi-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991158" comment="kde4-akregator-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991159" comment="kde4-kaddressbook-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991160" comment="kde4-kalarm-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991161" comment="kde4-kjots-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991162" comment="kde4-kmail-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991163" comment="kde4-knode-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991164" comment="kde4-knotes-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991165" comment="kde4-kontact-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991166" comment="kde4-korganizer-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991167" comment="kde4-ktimetracker-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991168" comment="kde4-ktnef-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991169" comment="kdepim4-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991170" comment="kdepim4-wizards-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570111" comment="kdepimlibs4-4.1.3-9.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570112" comment="libakonadi4-4.1.3-9.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991171" comment="libkdepim4-4.1.3-9.14.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570114" comment="libkdepimlibs4-4.1.3-9.28.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216704" version="1" class="patch">
	<metadata>
		<title>Security update for okular.</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="634743" ref_url="https://bugzilla.suse.com/634743" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2575" ref_url="https://www.suse.com/security/cve/CVE-2010-2575/" source="CVE"/>
		<description>

This update fixes a heap-based overflow in okular. The RLE decompression in 
the TranscribePalmImageToJPEG() function can be exploited to execute 
arbitrary code with user privileges by providing a crafted PDF file. 
(CVE-2010-2575)

Security Issue reference:

    * CVE-2010-2575
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2575&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-09-02"/>
	<updated date="2010-09-02"/>
	<bugzilla href="https://bugzilla.suse.com/634743">SUSE bug 634743</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2575/">CVE-2010-2575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2575">CVE-2010-2575 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570115" comment="kde4-gwenview-4.1.3-7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570116" comment="kde4-kcolorchooser-4.1.3-7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570117" comment="kde4-kruler-4.1.3-7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570118" comment="kde4-ksnapshot-4.1.3-7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570119" comment="kde4-okular-4.1.3-7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570120" comment="libkipi5-4.1.3-7.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570115" comment="kde4-gwenview-4.1.3-7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570116" comment="kde4-kcolorchooser-4.1.3-7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570117" comment="kde4-kruler-4.1.3-7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570118" comment="kde4-ksnapshot-4.1.3-7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570119" comment="kde4-okular-4.1.3-7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570120" comment="libkipi5-4.1.3-7.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216705" version="1" class="patch">
	<metadata>
		<title>Security update for kdm</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="584223" ref_url="https://bugzilla.suse.com/584223" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0436" ref_url="https://www.suse.com/security/cve/CVE-2010-0436/" source="CVE"/>
		<description>

The KDE display manager kdm contains a race condition which allows local attackers to make arbitrary files orld writable. CVE-2010-0436 has been assigned to this issue.
		</description>
<advisory from="security@suse.de">
	<issued date="2010-03-15"/>
	<updated date="2010-03-15"/>
	<bugzilla href="https://bugzilla.suse.com/584223">SUSE bug 584223</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0436/">CVE-2010-0436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0436">CVE-2010-0436 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570121" comment="kde4-kdm-4.1.3-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570122" comment="kde4-kgreeter-plugins-4.1.3-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570123" comment="kde4-kwin-4.1.3-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570124" comment="kdebase4-workspace-4.1.3-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570125" comment="kdebase4-workspace-ksysguardd-4.1.3-18.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570121" comment="kde4-kdm-4.1.3-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570122" comment="kde4-kgreeter-plugins-4.1.3-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570123" comment="kde4-kwin-4.1.3-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570124" comment="kdebase4-workspace-4.1.3-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570125" comment="kdebase4-workspace-ksysguardd-4.1.3-18.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216706" version="1" class="patch">
	<metadata>
		<title>Security update for kdenetwork</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="516347" ref_url="https://bugzilla.suse.com/516347" source="BUGZILLA"/>
		<reference ref_id="525528" ref_url="https://bugzilla.suse.com/525528" source="BUGZILLA"/>
		<reference ref_id="604709" ref_url="https://bugzilla.suse.com/604709" source="BUGZILLA"/>
		<reference ref_id="653852" ref_url="https://bugzilla.suse.com/653852" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-4776" ref_url="https://www.suse.com/security/cve/CVE-2008-4776/" source="CVE"/>
		<reference ref_id="CVE-2010-1000" ref_url="https://www.suse.com/security/cve/CVE-2010-1000/" source="CVE"/>
		<description>

This update of kdenetwork fixes several bugs, the security related issues 
are:

    * CVE-2010-1000: CVSS v2 Base Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N):
      CWE-22

The 'name' attribute of the 'file' element of metalink files is not 
properly sanitised this can be exploited to download files to arbitrary 
directories.

    * CVE-2008-4776: CVSS v2 Base Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P):
      CWE-119

The included libgadu version allowed remote servers to cause a denial of 
service (crash) via a buffer over-read.

Non-security issues:

    * bnc#653852: kopete: ICQ login broken; login server changed
    * bnc#516347: kopete cant connect to yahoo

Security Issue references:

    * CVE-2008-4776
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4776&gt;
    * CVE-2010-1000
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1000&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-11-19"/>
	<updated date="2010-11-19"/>
	<bugzilla href="https://bugzilla.suse.com/516347">SUSE bug 516347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/525528">SUSE bug 525528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/604709">SUSE bug 604709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/653852">SUSE bug 653852</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4776/">CVE-2008-4776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4776">CVE-2008-4776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1000/">CVE-2010-1000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1000">CVE-2010-1000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570126" comment="kde4-kget-4.1.3-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570127" comment="kde4-knewsticker-4.1.3-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570128" comment="kde4-kopete-4.1.3-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570129" comment="kde4-krdc-4.1.3-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570130" comment="kde4-krfb-4.1.3-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570131" comment="kdenetwork4-filesharing-4.1.3-7.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570126" comment="kde4-kget-4.1.3-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570127" comment="kde4-knewsticker-4.1.3-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570128" comment="kde4-kopete-4.1.3-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570129" comment="kde4-krdc-4.1.3-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570130" comment="kde4-krfb-4.1.3-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570131" comment="kdenetwork4-filesharing-4.1.3-7.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216707" version="1" class="patch">
	<metadata>
		<title>Security update for kdelibs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="512559" ref_url="https://bugzilla.suse.com/512559" source="BUGZILLA"/>
		<reference ref_id="557126" ref_url="https://bugzilla.suse.com/557126" source="BUGZILLA"/>
		<reference ref_id="600469" ref_url="https://bugzilla.suse.com/600469" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2009-1725" ref_url="https://www.suse.com/security/cve/CVE-2009-1725/" source="CVE"/>
		<description>

An invalid character reference causing a buffer overflow in khtml has been 
fixed in the kdelibs package. CVE-2009-1725 has been assigned to this 
issue.

Security Issue reference:

    * CVE-2009-1725
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1725&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-11-03"/>
	<updated date="2010-11-03"/>
	<bugzilla href="https://bugzilla.suse.com/512559">SUSE bug 512559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557126">SUSE bug 557126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/600469">SUSE bug 600469</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0689">CVE-2009-0689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1725/">CVE-2009-1725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1725">CVE-2009-1725 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570132" comment="kdelibs3-3.5.10-23.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570133" comment="kdelibs3-32bit-3.5.10-23.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570134" comment="kdelibs3-default-style-3.5.10-23.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570135" comment="kdelibs3-default-style-32bit-3.5.10-23.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570136" comment="kdelibs3-default-style-x86-3.5.10-23.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570137" comment="kdelibs3-x86-3.5.10-23.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570138" comment="kdelibs4-4.1.3-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570139" comment="kdelibs4-core-4.1.3-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570140" comment="libkde4-4.1.3-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570141" comment="libkde4-32bit-4.1.3-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570142" comment="libkde4-x86-4.1.3-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570143" comment="libkdecore4-4.1.3-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570144" comment="libkdecore4-32bit-4.1.3-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570145" comment="libkdecore4-x86-4.1.3-8.21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570132" comment="kdelibs3-3.5.10-23.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570133" comment="kdelibs3-32bit-3.5.10-23.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570134" comment="kdelibs3-default-style-3.5.10-23.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570135" comment="kdelibs3-default-style-32bit-3.5.10-23.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570136" comment="kdelibs3-default-style-x86-3.5.10-23.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570137" comment="kdelibs3-x86-3.5.10-23.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570138" comment="kdelibs4-4.1.3-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570139" comment="kdelibs4-core-4.1.3-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570140" comment="libkde4-4.1.3-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570141" comment="libkde4-32bit-4.1.3-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570142" comment="libkde4-x86-4.1.3-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570143" comment="libkdecore4-4.1.3-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570144" comment="libkdecore4-32bit-4.1.3-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570145" comment="libkdecore4-x86-4.1.3-8.21.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216708" version="1" class="patch">
	<metadata>
		<title>Security update for kdelibs4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="507328" ref_url="https://bugzilla.suse.com/507328" source="BUGZILLA"/>
		<reference ref_id="557126" ref_url="https://bugzilla.suse.com/557126" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<description>
A  KDELibs Remote Array Overrun (Arbitrary code execution)
was fixed (CVE-2009-0689).
		</description>
<advisory from="security@suse.de">
	<issued date="2010-01-07"/>
	<updated date="2010-01-07"/>
	<bugzilla href="https://bugzilla.suse.com/507328">SUSE bug 507328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557126">SUSE bug 557126</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0689">CVE-2009-0689 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570146" comment="kdelibs4-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570147" comment="kdelibs4-core-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570148" comment="libkde4-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570149" comment="libkde4-32bit-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570150" comment="libkde4-x86-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570151" comment="libkdecore4-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570152" comment="libkdecore4-32bit-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570153" comment="libkdecore4-x86-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570154" comment="utempter-0.5.5-106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570155" comment="utempter-32bit-0.5.5-106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570156" comment="utempter-x86-0.5.5-106.18 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570146" comment="kdelibs4-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570147" comment="kdelibs4-core-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570148" comment="libkde4-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570149" comment="libkde4-32bit-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570150" comment="libkde4-x86-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570151" comment="libkdecore4-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570152" comment="libkdecore4-32bit-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570153" comment="libkdecore4-x86-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570154" comment="utempter-0.5.5-106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570155" comment="utempter-32bit-0.5.5-106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570156" comment="utempter-x86-0.5.5-106.18 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216709" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="185164" ref_url="https://bugzilla.suse.com/185164" source="BUGZILLA"/>
		<reference ref_id="191648" ref_url="https://bugzilla.suse.com/191648" source="BUGZILLA"/>
		<reference ref_id="395775" ref_url="https://bugzilla.suse.com/395775" source="BUGZILLA"/>
		<reference ref_id="402922" ref_url="https://bugzilla.suse.com/402922" source="BUGZILLA"/>
		<reference ref_id="408304" ref_url="https://bugzilla.suse.com/408304" source="BUGZILLA"/>
		<reference ref_id="410452" ref_url="https://bugzilla.suse.com/410452" source="BUGZILLA"/>
		<reference ref_id="417417" ref_url="https://bugzilla.suse.com/417417" source="BUGZILLA"/>
		<reference ref_id="439348" ref_url="https://bugzilla.suse.com/439348" source="BUGZILLA"/>
		<reference ref_id="439775" ref_url="https://bugzilla.suse.com/439775" source="BUGZILLA"/>
		<reference ref_id="441062" ref_url="https://bugzilla.suse.com/441062" source="BUGZILLA"/>
		<reference ref_id="441420" ref_url="https://bugzilla.suse.com/441420" source="BUGZILLA"/>
		<reference ref_id="441650" ref_url="https://bugzilla.suse.com/441650" source="BUGZILLA"/>
		<reference ref_id="448410" ref_url="https://bugzilla.suse.com/448410" source="BUGZILLA"/>
		<reference ref_id="450468" ref_url="https://bugzilla.suse.com/450468" source="BUGZILLA"/>
		<reference ref_id="450658" ref_url="https://bugzilla.suse.com/450658" source="BUGZILLA"/>
		<reference ref_id="457472" ref_url="https://bugzilla.suse.com/457472" source="BUGZILLA"/>
		<reference ref_id="458222" ref_url="https://bugzilla.suse.com/458222" source="BUGZILLA"/>
		<reference ref_id="459065" ref_url="https://bugzilla.suse.com/459065" source="BUGZILLA"/>
		<reference ref_id="459146" ref_url="https://bugzilla.suse.com/459146" source="BUGZILLA"/>
		<reference ref_id="460284" ref_url="https://bugzilla.suse.com/460284" source="BUGZILLA"/>
		<reference ref_id="462913" ref_url="https://bugzilla.suse.com/462913" source="BUGZILLA"/>
		<reference ref_id="463829" ref_url="https://bugzilla.suse.com/463829" source="BUGZILLA"/>
		<reference ref_id="464360" ref_url="https://bugzilla.suse.com/464360" source="BUGZILLA"/>
		<reference ref_id="465707" ref_url="https://bugzilla.suse.com/465707" source="BUGZILLA"/>
		<reference ref_id="465854" ref_url="https://bugzilla.suse.com/465854" source="BUGZILLA"/>
		<reference ref_id="465955" ref_url="https://bugzilla.suse.com/465955" source="BUGZILLA"/>
		<reference ref_id="466554" ref_url="https://bugzilla.suse.com/466554" source="BUGZILLA"/>
		<reference ref_id="467174" ref_url="https://bugzilla.suse.com/467174" source="BUGZILLA"/>
		<reference ref_id="467317" ref_url="https://bugzilla.suse.com/467317" source="BUGZILLA"/>
		<reference ref_id="467381" ref_url="https://bugzilla.suse.com/467381" source="BUGZILLA"/>
		<reference ref_id="467518" ref_url="https://bugzilla.suse.com/467518" source="BUGZILLA"/>
		<reference ref_id="467846" ref_url="https://bugzilla.suse.com/467846" source="BUGZILLA"/>
		<reference ref_id="469576" ref_url="https://bugzilla.suse.com/469576" source="BUGZILLA"/>
		<reference ref_id="470238" ref_url="https://bugzilla.suse.com/470238" source="BUGZILLA"/>
		<reference ref_id="471249" ref_url="https://bugzilla.suse.com/471249" source="BUGZILLA"/>
		<reference ref_id="471396" ref_url="https://bugzilla.suse.com/471396" source="BUGZILLA"/>
		<reference ref_id="472342" ref_url="https://bugzilla.suse.com/472342" source="BUGZILLA"/>
		<reference ref_id="472410" ref_url="https://bugzilla.suse.com/472410" source="BUGZILLA"/>
		<reference ref_id="472432" ref_url="https://bugzilla.suse.com/472432" source="BUGZILLA"/>
		<reference ref_id="472783" ref_url="https://bugzilla.suse.com/472783" source="BUGZILLA"/>
		<reference ref_id="473881" ref_url="https://bugzilla.suse.com/473881" source="BUGZILLA"/>
		<reference ref_id="474062" ref_url="https://bugzilla.suse.com/474062" source="BUGZILLA"/>
		<reference ref_id="474335" ref_url="https://bugzilla.suse.com/474335" source="BUGZILLA"/>
		<reference ref_id="474773" ref_url="https://bugzilla.suse.com/474773" source="BUGZILLA"/>
		<reference ref_id="475149" ref_url="https://bugzilla.suse.com/475149" source="BUGZILLA"/>
		<reference ref_id="476330" ref_url="https://bugzilla.suse.com/476330" source="BUGZILLA"/>
		<reference ref_id="476525" ref_url="https://bugzilla.suse.com/476525" source="BUGZILLA"/>
		<reference ref_id="476582" ref_url="https://bugzilla.suse.com/476582" source="BUGZILLA"/>
		<reference ref_id="476822" ref_url="https://bugzilla.suse.com/476822" source="BUGZILLA"/>
		<reference ref_id="477624" ref_url="https://bugzilla.suse.com/477624" source="BUGZILLA"/>
		<reference ref_id="477816" ref_url="https://bugzilla.suse.com/477816" source="BUGZILLA"/>
		<reference ref_id="478462" ref_url="https://bugzilla.suse.com/478462" source="BUGZILLA"/>
		<reference ref_id="478534" ref_url="https://bugzilla.suse.com/478534" source="BUGZILLA"/>
		<reference ref_id="479304" ref_url="https://bugzilla.suse.com/479304" source="BUGZILLA"/>
		<reference ref_id="479558" ref_url="https://bugzilla.suse.com/479558" source="BUGZILLA"/>
		<reference ref_id="479617" ref_url="https://bugzilla.suse.com/479617" source="BUGZILLA"/>
		<reference ref_id="479730" ref_url="https://bugzilla.suse.com/479730" source="BUGZILLA"/>
		<reference ref_id="479784" ref_url="https://bugzilla.suse.com/479784" source="BUGZILLA"/>
		<reference ref_id="480391" ref_url="https://bugzilla.suse.com/480391" source="BUGZILLA"/>
		<reference ref_id="480448" ref_url="https://bugzilla.suse.com/480448" source="BUGZILLA"/>
		<reference ref_id="480524" ref_url="https://bugzilla.suse.com/480524" source="BUGZILLA"/>
		<reference ref_id="480617" ref_url="https://bugzilla.suse.com/480617" source="BUGZILLA"/>
		<reference ref_id="480749" ref_url="https://bugzilla.suse.com/480749" source="BUGZILLA"/>
		<reference ref_id="480753" ref_url="https://bugzilla.suse.com/480753" source="BUGZILLA"/>
		<reference ref_id="480809" ref_url="https://bugzilla.suse.com/480809" source="BUGZILLA"/>
		<reference ref_id="481074" ref_url="https://bugzilla.suse.com/481074" source="BUGZILLA"/>
		<reference ref_id="481749" ref_url="https://bugzilla.suse.com/481749" source="BUGZILLA"/>
		<reference ref_id="482052" ref_url="https://bugzilla.suse.com/482052" source="BUGZILLA"/>
		<reference ref_id="482220" ref_url="https://bugzilla.suse.com/482220" source="BUGZILLA"/>
		<reference ref_id="482506" ref_url="https://bugzilla.suse.com/482506" source="BUGZILLA"/>
		<reference ref_id="482614" ref_url="https://bugzilla.suse.com/482614" source="BUGZILLA"/>
		<reference ref_id="482796" ref_url="https://bugzilla.suse.com/482796" source="BUGZILLA"/>
		<reference ref_id="482818" ref_url="https://bugzilla.suse.com/482818" source="BUGZILLA"/>
		<reference ref_id="483375" ref_url="https://bugzilla.suse.com/483375" source="BUGZILLA"/>
		<reference ref_id="483706" ref_url="https://bugzilla.suse.com/483706" source="BUGZILLA"/>
		<reference ref_id="484306" ref_url="https://bugzilla.suse.com/484306" source="BUGZILLA"/>
		<reference ref_id="484529" ref_url="https://bugzilla.suse.com/484529" source="BUGZILLA"/>
		<reference ref_id="484664" ref_url="https://bugzilla.suse.com/484664" source="BUGZILLA"/>
		<reference ref_id="484716" ref_url="https://bugzilla.suse.com/484716" source="BUGZILLA"/>
		<reference ref_id="484767" ref_url="https://bugzilla.suse.com/484767" source="BUGZILLA"/>
		<reference ref_id="484931" ref_url="https://bugzilla.suse.com/484931" source="BUGZILLA"/>
		<reference ref_id="485089" ref_url="https://bugzilla.suse.com/485089" source="BUGZILLA"/>
		<reference ref_id="485768" ref_url="https://bugzilla.suse.com/485768" source="BUGZILLA"/>
		<reference ref_id="486001" ref_url="https://bugzilla.suse.com/486001" source="BUGZILLA"/>
		<reference ref_id="486331" ref_url="https://bugzilla.suse.com/486331" source="BUGZILLA"/>
		<reference ref_id="486430" ref_url="https://bugzilla.suse.com/486430" source="BUGZILLA"/>
		<reference ref_id="486728" ref_url="https://bugzilla.suse.com/486728" source="BUGZILLA"/>
		<reference ref_id="486803" ref_url="https://bugzilla.suse.com/486803" source="BUGZILLA"/>
		<reference ref_id="487106" ref_url="https://bugzilla.suse.com/487106" source="BUGZILLA"/>
		<reference ref_id="487247" ref_url="https://bugzilla.suse.com/487247" source="BUGZILLA"/>
		<reference ref_id="487412" ref_url="https://bugzilla.suse.com/487412" source="BUGZILLA"/>
		<reference ref_id="487755" ref_url="https://bugzilla.suse.com/487755" source="BUGZILLA"/>
		<reference ref_id="487987" ref_url="https://bugzilla.suse.com/487987" source="BUGZILLA"/>
		<reference ref_id="489005" ref_url="https://bugzilla.suse.com/489005" source="BUGZILLA"/>
		<reference ref_id="489105" ref_url="https://bugzilla.suse.com/489105" source="BUGZILLA"/>
		<reference ref_id="490030" ref_url="https://bugzilla.suse.com/490030" source="BUGZILLA"/>
		<reference ref_id="490368" ref_url="https://bugzilla.suse.com/490368" source="BUGZILLA"/>
		<reference ref_id="490517" ref_url="https://bugzilla.suse.com/490517" source="BUGZILLA"/>
		<reference ref_id="490608" ref_url="https://bugzilla.suse.com/490608" source="BUGZILLA"/>
		<reference ref_id="490902" ref_url="https://bugzilla.suse.com/490902" source="BUGZILLA"/>
		<reference ref_id="491289" ref_url="https://bugzilla.suse.com/491289" source="BUGZILLA"/>
		<reference ref_id="491430" ref_url="https://bugzilla.suse.com/491430" source="BUGZILLA"/>
		<reference ref_id="491802" ref_url="https://bugzilla.suse.com/491802" source="BUGZILLA"/>
		<reference ref_id="492282" ref_url="https://bugzilla.suse.com/492282" source="BUGZILLA"/>
		<reference ref_id="492324" ref_url="https://bugzilla.suse.com/492324" source="BUGZILLA"/>
		<reference ref_id="492469" ref_url="https://bugzilla.suse.com/492469" source="BUGZILLA"/>
		<reference ref_id="492547" ref_url="https://bugzilla.suse.com/492547" source="BUGZILLA"/>
		<reference ref_id="492658" ref_url="https://bugzilla.suse.com/492658" source="BUGZILLA"/>
		<reference ref_id="492760" ref_url="https://bugzilla.suse.com/492760" source="BUGZILLA"/>
		<reference ref_id="492768" ref_url="https://bugzilla.suse.com/492768" source="BUGZILLA"/>
		<reference ref_id="492961" ref_url="https://bugzilla.suse.com/492961" source="BUGZILLA"/>
		<reference ref_id="493214" ref_url="https://bugzilla.suse.com/493214" source="BUGZILLA"/>
		<reference ref_id="493392" ref_url="https://bugzilla.suse.com/493392" source="BUGZILLA"/>
		<reference ref_id="493991" ref_url="https://bugzilla.suse.com/493991" source="BUGZILLA"/>
		<reference ref_id="494463" ref_url="https://bugzilla.suse.com/494463" source="BUGZILLA"/>
		<reference ref_id="495065" ref_url="https://bugzilla.suse.com/495065" source="BUGZILLA"/>
		<reference ref_id="495068" ref_url="https://bugzilla.suse.com/495068" source="BUGZILLA"/>
		<reference ref_id="495091" ref_url="https://bugzilla.suse.com/495091" source="BUGZILLA"/>
		<reference ref_id="495259" ref_url="https://bugzilla.suse.com/495259" source="BUGZILLA"/>
		<reference ref_id="495515" ref_url="https://bugzilla.suse.com/495515" source="BUGZILLA"/>
		<reference ref_id="495668" ref_url="https://bugzilla.suse.com/495668" source="BUGZILLA"/>
		<reference ref_id="495816" ref_url="https://bugzilla.suse.com/495816" source="BUGZILLA"/>
		<reference ref_id="496027" ref_url="https://bugzilla.suse.com/496027" source="BUGZILLA"/>
		<reference ref_id="496353" ref_url="https://bugzilla.suse.com/496353" source="BUGZILLA"/>
		<reference ref_id="496398" ref_url="https://bugzilla.suse.com/496398" source="BUGZILLA"/>
		<reference ref_id="496399" ref_url="https://bugzilla.suse.com/496399" source="BUGZILLA"/>
		<reference ref_id="496502" ref_url="https://bugzilla.suse.com/496502" source="BUGZILLA"/>
		<reference ref_id="496871" ref_url="https://bugzilla.suse.com/496871" source="BUGZILLA"/>
		<reference ref_id="496878" ref_url="https://bugzilla.suse.com/496878" source="BUGZILLA"/>
		<reference ref_id="497341" ref_url="https://bugzilla.suse.com/497341" source="BUGZILLA"/>
		<reference ref_id="497648" ref_url="https://bugzilla.suse.com/497648" source="BUGZILLA"/>
		<reference ref_id="497807" ref_url="https://bugzilla.suse.com/497807" source="BUGZILLA"/>
		<reference ref_id="498042" ref_url="https://bugzilla.suse.com/498042" source="BUGZILLA"/>
		<reference ref_id="498237" ref_url="https://bugzilla.suse.com/498237" source="BUGZILLA"/>
		<reference ref_id="498358" ref_url="https://bugzilla.suse.com/498358" source="BUGZILLA"/>
		<reference ref_id="498369" ref_url="https://bugzilla.suse.com/498369" source="BUGZILLA"/>
		<reference ref_id="498402" ref_url="https://bugzilla.suse.com/498402" source="BUGZILLA"/>
		<reference ref_id="498708" ref_url="https://bugzilla.suse.com/498708" source="BUGZILLA"/>
		<reference ref_id="499152" ref_url="https://bugzilla.suse.com/499152" source="BUGZILLA"/>
		<reference ref_id="499278" ref_url="https://bugzilla.suse.com/499278" source="BUGZILLA"/>
		<reference ref_id="499558" ref_url="https://bugzilla.suse.com/499558" source="BUGZILLA"/>
		<reference ref_id="499772" ref_url="https://bugzilla.suse.com/499772" source="BUGZILLA"/>
		<reference ref_id="499845" ref_url="https://bugzilla.suse.com/499845" source="BUGZILLA"/>
		<reference ref_id="500429" ref_url="https://bugzilla.suse.com/500429" source="BUGZILLA"/>
		<reference ref_id="500508" ref_url="https://bugzilla.suse.com/500508" source="BUGZILLA"/>
		<reference ref_id="501114" ref_url="https://bugzilla.suse.com/501114" source="BUGZILLA"/>
		<reference ref_id="501160" ref_url="https://bugzilla.suse.com/501160" source="BUGZILLA"/>
		<reference ref_id="501224" ref_url="https://bugzilla.suse.com/501224" source="BUGZILLA"/>
		<reference ref_id="501234" ref_url="https://bugzilla.suse.com/501234" source="BUGZILLA"/>
		<reference ref_id="501396" ref_url="https://bugzilla.suse.com/501396" source="BUGZILLA"/>
		<reference ref_id="501563" ref_url="https://bugzilla.suse.com/501563" source="BUGZILLA"/>
		<reference ref_id="501651" ref_url="https://bugzilla.suse.com/501651" source="BUGZILLA"/>
		<reference ref_id="501663" ref_url="https://bugzilla.suse.com/501663" source="BUGZILLA"/>
		<reference ref_id="502026" ref_url="https://bugzilla.suse.com/502026" source="BUGZILLA"/>
		<reference ref_id="502092" ref_url="https://bugzilla.suse.com/502092" source="BUGZILLA"/>
		<reference ref_id="502425" ref_url="https://bugzilla.suse.com/502425" source="BUGZILLA"/>
		<reference ref_id="502675" ref_url="https://bugzilla.suse.com/502675" source="BUGZILLA"/>
		<reference ref_id="502733" ref_url="https://bugzilla.suse.com/502733" source="BUGZILLA"/>
		<reference ref_id="502903" ref_url="https://bugzilla.suse.com/502903" source="BUGZILLA"/>
		<reference ref_id="503038" ref_url="https://bugzilla.suse.com/503038" source="BUGZILLA"/>
		<reference ref_id="503101" ref_url="https://bugzilla.suse.com/503101" source="BUGZILLA"/>
		<reference ref_id="503161" ref_url="https://bugzilla.suse.com/503161" source="BUGZILLA"/>
		<reference ref_id="503353" ref_url="https://bugzilla.suse.com/503353" source="BUGZILLA"/>
		<reference ref_id="503457" ref_url="https://bugzilla.suse.com/503457" source="BUGZILLA"/>
		<reference ref_id="503635" ref_url="https://bugzilla.suse.com/503635" source="BUGZILLA"/>
		<reference ref_id="503855" ref_url="https://bugzilla.suse.com/503855" source="BUGZILLA"/>
		<reference ref_id="504646" ref_url="https://bugzilla.suse.com/504646" source="BUGZILLA"/>
		<reference ref_id="505578" ref_url="https://bugzilla.suse.com/505578" source="BUGZILLA"/>
		<reference ref_id="505831" ref_url="https://bugzilla.suse.com/505831" source="BUGZILLA"/>
		<reference ref_id="505925" ref_url="https://bugzilla.suse.com/505925" source="BUGZILLA"/>
		<reference ref_id="506361" ref_url="https://bugzilla.suse.com/506361" source="BUGZILLA"/>
		<reference ref_id="507557" ref_url="https://bugzilla.suse.com/507557" source="BUGZILLA"/>
		<reference ref_id="509066" ref_url="https://bugzilla.suse.com/509066" source="BUGZILLA"/>
		<reference ref_id="509071" ref_url="https://bugzilla.suse.com/509071" source="BUGZILLA"/>
		<reference ref_id="509407" ref_url="https://bugzilla.suse.com/509407" source="BUGZILLA"/>
		<reference ref_id="509495" ref_url="https://bugzilla.suse.com/509495" source="BUGZILLA"/>
		<reference ref_id="509497" ref_url="https://bugzilla.suse.com/509497" source="BUGZILLA"/>
		<reference ref_id="509544" ref_url="https://bugzilla.suse.com/509544" source="BUGZILLA"/>
		<reference ref_id="509753" ref_url="https://bugzilla.suse.com/509753" source="BUGZILLA"/>
		<reference ref_id="509822" ref_url="https://bugzilla.suse.com/509822" source="BUGZILLA"/>
		<reference ref_id="510449" ref_url="https://bugzilla.suse.com/510449" source="BUGZILLA"/>
		<reference ref_id="511079" ref_url="https://bugzilla.suse.com/511079" source="BUGZILLA"/>
		<reference ref_id="511243" ref_url="https://bugzilla.suse.com/511243" source="BUGZILLA"/>
		<reference ref_id="511306" ref_url="https://bugzilla.suse.com/511306" source="BUGZILLA"/>
		<reference ref_id="512070" ref_url="https://bugzilla.suse.com/512070" source="BUGZILLA"/>
		<reference ref_id="513437" ref_url="https://bugzilla.suse.com/513437" source="BUGZILLA"/>
		<reference ref_id="513954" ref_url="https://bugzilla.suse.com/513954" source="BUGZILLA"/>
		<reference ref_id="514022" ref_url="https://bugzilla.suse.com/514022" source="BUGZILLA"/>
		<reference ref_id="514265" ref_url="https://bugzilla.suse.com/514265" source="BUGZILLA"/>
		<reference ref_id="514375" ref_url="https://bugzilla.suse.com/514375" source="BUGZILLA"/>
		<reference ref_id="514644" ref_url="https://bugzilla.suse.com/514644" source="BUGZILLA"/>
		<reference ref_id="514767" ref_url="https://bugzilla.suse.com/514767" source="BUGZILLA"/>
		<reference ref_id="515266" ref_url="https://bugzilla.suse.com/515266" source="BUGZILLA"/>
		<reference ref_id="515640" ref_url="https://bugzilla.suse.com/515640" source="BUGZILLA"/>
		<reference ref_id="515645" ref_url="https://bugzilla.suse.com/515645" source="BUGZILLA"/>
		<reference ref_id="516213" ref_url="https://bugzilla.suse.com/516213" source="BUGZILLA"/>
		<reference ref_id="516827" ref_url="https://bugzilla.suse.com/516827" source="BUGZILLA"/>
		<reference ref_id="517098" ref_url="https://bugzilla.suse.com/517098" source="BUGZILLA"/>
		<reference ref_id="518291" ref_url="https://bugzilla.suse.com/518291" source="BUGZILLA"/>
		<reference ref_id="519111" ref_url="https://bugzilla.suse.com/519111" source="BUGZILLA"/>
		<reference ref_id="519188" ref_url="https://bugzilla.suse.com/519188" source="BUGZILLA"/>
		<reference ref_id="519820" ref_url="https://bugzilla.suse.com/519820" source="BUGZILLA"/>
		<reference ref_id="520975" ref_url="https://bugzilla.suse.com/520975" source="BUGZILLA"/>
		<reference ref_id="521190" ref_url="https://bugzilla.suse.com/521190" source="BUGZILLA"/>
		<reference ref_id="521578" ref_url="https://bugzilla.suse.com/521578" source="BUGZILLA"/>
		<reference ref_id="522414" ref_url="https://bugzilla.suse.com/522414" source="BUGZILLA"/>
		<reference ref_id="522686" ref_url="https://bugzilla.suse.com/522686" source="BUGZILLA"/>
		<reference ref_id="522764" ref_url="https://bugzilla.suse.com/522764" source="BUGZILLA"/>
		<reference ref_id="522790" ref_url="https://bugzilla.suse.com/522790" source="BUGZILLA"/>
		<reference ref_id="522911" ref_url="https://bugzilla.suse.com/522911" source="BUGZILLA"/>
		<reference ref_id="522914" ref_url="https://bugzilla.suse.com/522914" source="BUGZILLA"/>
		<reference ref_id="523487" ref_url="https://bugzilla.suse.com/523487" source="BUGZILLA"/>
		<reference ref_id="523719" ref_url="https://bugzilla.suse.com/523719" source="BUGZILLA"/>
		<reference ref_id="524222" ref_url="https://bugzilla.suse.com/524222" source="BUGZILLA"/>
		<reference ref_id="524242" ref_url="https://bugzilla.suse.com/524242" source="BUGZILLA"/>
		<reference ref_id="524347" ref_url="https://bugzilla.suse.com/524347" source="BUGZILLA"/>
		<reference ref_id="524683" ref_url="https://bugzilla.suse.com/524683" source="BUGZILLA"/>
		<reference ref_id="524981" ref_url="https://bugzilla.suse.com/524981" source="BUGZILLA"/>
		<reference ref_id="525903" ref_url="https://bugzilla.suse.com/525903" source="BUGZILLA"/>
		<reference ref_id="526514" ref_url="https://bugzilla.suse.com/526514" source="BUGZILLA"/>
		<reference ref_id="526819" ref_url="https://bugzilla.suse.com/526819" source="BUGZILLA"/>
		<reference ref_id="527284" ref_url="https://bugzilla.suse.com/527284" source="BUGZILLA"/>
		<reference ref_id="527361" ref_url="https://bugzilla.suse.com/527361" source="BUGZILLA"/>
		<reference ref_id="527748" ref_url="https://bugzilla.suse.com/527748" source="BUGZILLA"/>
		<reference ref_id="527754" ref_url="https://bugzilla.suse.com/527754" source="BUGZILLA"/>
		<reference ref_id="527848" ref_url="https://bugzilla.suse.com/527848" source="BUGZILLA"/>
		<reference ref_id="528427" ref_url="https://bugzilla.suse.com/528427" source="BUGZILLA"/>
		<reference ref_id="528769" ref_url="https://bugzilla.suse.com/528769" source="BUGZILLA"/>
		<reference ref_id="528811" ref_url="https://bugzilla.suse.com/528811" source="BUGZILLA"/>
		<reference ref_id="528853" ref_url="https://bugzilla.suse.com/528853" source="BUGZILLA"/>
		<reference ref_id="529188" ref_url="https://bugzilla.suse.com/529188" source="BUGZILLA"/>
		<reference ref_id="529369" ref_url="https://bugzilla.suse.com/529369" source="BUGZILLA"/>
		<reference ref_id="529660" ref_url="https://bugzilla.suse.com/529660" source="BUGZILLA"/>
		<reference ref_id="530151" ref_url="https://bugzilla.suse.com/530151" source="BUGZILLA"/>
		<reference ref_id="530535" ref_url="https://bugzilla.suse.com/530535" source="BUGZILLA"/>
		<reference ref_id="531260" ref_url="https://bugzilla.suse.com/531260" source="BUGZILLA"/>
		<reference ref_id="531384" ref_url="https://bugzilla.suse.com/531384" source="BUGZILLA"/>
		<reference ref_id="531437" ref_url="https://bugzilla.suse.com/531437" source="BUGZILLA"/>
		<reference ref_id="531533" ref_url="https://bugzilla.suse.com/531533" source="BUGZILLA"/>
		<reference ref_id="531633" ref_url="https://bugzilla.suse.com/531633" source="BUGZILLA"/>
		<reference ref_id="531716" ref_url="https://bugzilla.suse.com/531716" source="BUGZILLA"/>
		<reference ref_id="532063" ref_url="https://bugzilla.suse.com/532063" source="BUGZILLA"/>
		<reference ref_id="532443" ref_url="https://bugzilla.suse.com/532443" source="BUGZILLA"/>
		<reference ref_id="532598" ref_url="https://bugzilla.suse.com/532598" source="BUGZILLA"/>
		<reference ref_id="533267" ref_url="https://bugzilla.suse.com/533267" source="BUGZILLA"/>
		<reference ref_id="534065" ref_url="https://bugzilla.suse.com/534065" source="BUGZILLA"/>
		<reference ref_id="534202" ref_url="https://bugzilla.suse.com/534202" source="BUGZILLA"/>
		<reference ref_id="534214" ref_url="https://bugzilla.suse.com/534214" source="BUGZILLA"/>
		<reference ref_id="534232" ref_url="https://bugzilla.suse.com/534232" source="BUGZILLA"/>
		<reference ref_id="534629" ref_url="https://bugzilla.suse.com/534629" source="BUGZILLA"/>
		<reference ref_id="534961" ref_url="https://bugzilla.suse.com/534961" source="BUGZILLA"/>
		<reference ref_id="534977" ref_url="https://bugzilla.suse.com/534977" source="BUGZILLA"/>
		<reference ref_id="535380" ref_url="https://bugzilla.suse.com/535380" source="BUGZILLA"/>
		<reference ref_id="535409" ref_url="https://bugzilla.suse.com/535409" source="BUGZILLA"/>
		<reference ref_id="535497" ref_url="https://bugzilla.suse.com/535497" source="BUGZILLA"/>
		<reference ref_id="535801" ref_url="https://bugzilla.suse.com/535801" source="BUGZILLA"/>
		<reference ref_id="535880" ref_url="https://bugzilla.suse.com/535880" source="BUGZILLA"/>
		<reference ref_id="535890" ref_url="https://bugzilla.suse.com/535890" source="BUGZILLA"/>
		<reference ref_id="535939" ref_url="https://bugzilla.suse.com/535939" source="BUGZILLA"/>
		<reference ref_id="535947" ref_url="https://bugzilla.suse.com/535947" source="BUGZILLA"/>
		<reference ref_id="536117" ref_url="https://bugzilla.suse.com/536117" source="BUGZILLA"/>
		<reference ref_id="536467" ref_url="https://bugzilla.suse.com/536467" source="BUGZILLA"/>
		<reference ref_id="536699" ref_url="https://bugzilla.suse.com/536699" source="BUGZILLA"/>
		<reference ref_id="537016" ref_url="https://bugzilla.suse.com/537016" source="BUGZILLA"/>
		<reference ref_id="537435" ref_url="https://bugzilla.suse.com/537435" source="BUGZILLA"/>
		<reference ref_id="539010" ref_url="https://bugzilla.suse.com/539010" source="BUGZILLA"/>
		<reference ref_id="539271" ref_url="https://bugzilla.suse.com/539271" source="BUGZILLA"/>
		<reference ref_id="539878" ref_url="https://bugzilla.suse.com/539878" source="BUGZILLA"/>
		<reference ref_id="540349" ref_url="https://bugzilla.suse.com/540349" source="BUGZILLA"/>
		<reference ref_id="540997" ref_url="https://bugzilla.suse.com/540997" source="BUGZILLA"/>
		<reference ref_id="541403" ref_url="https://bugzilla.suse.com/541403" source="BUGZILLA"/>
		<reference ref_id="541648" ref_url="https://bugzilla.suse.com/541648" source="BUGZILLA"/>
		<reference ref_id="542505" ref_url="https://bugzilla.suse.com/542505" source="BUGZILLA"/>
		<reference ref_id="543480" ref_url="https://bugzilla.suse.com/543480" source="BUGZILLA"/>
		<reference ref_id="544759" ref_url="https://bugzilla.suse.com/544759" source="BUGZILLA"/>
		<reference ref_id="544760" ref_url="https://bugzilla.suse.com/544760" source="BUGZILLA"/>
		<reference ref_id="544763" ref_url="https://bugzilla.suse.com/544763" source="BUGZILLA"/>
		<reference ref_id="544779" ref_url="https://bugzilla.suse.com/544779" source="BUGZILLA"/>
		<reference ref_id="545013" ref_url="https://bugzilla.suse.com/545013" source="BUGZILLA"/>
		<reference ref_id="545236" ref_url="https://bugzilla.suse.com/545236" source="BUGZILLA"/>
		<reference ref_id="545367" ref_url="https://bugzilla.suse.com/545367" source="BUGZILLA"/>
		<reference ref_id="546006" ref_url="https://bugzilla.suse.com/546006" source="BUGZILLA"/>
		<reference ref_id="546449" ref_url="https://bugzilla.suse.com/546449" source="BUGZILLA"/>
		<reference ref_id="547137" ref_url="https://bugzilla.suse.com/547137" source="BUGZILLA"/>
		<reference ref_id="547357" ref_url="https://bugzilla.suse.com/547357" source="BUGZILLA"/>
		<reference ref_id="547370" ref_url="https://bugzilla.suse.com/547370" source="BUGZILLA"/>
		<reference ref_id="547433" ref_url="https://bugzilla.suse.com/547433" source="BUGZILLA"/>
		<reference ref_id="547474" ref_url="https://bugzilla.suse.com/547474" source="BUGZILLA"/>
		<reference ref_id="548070" ref_url="https://bugzilla.suse.com/548070" source="BUGZILLA"/>
		<reference ref_id="548071" ref_url="https://bugzilla.suse.com/548071" source="BUGZILLA"/>
		<reference ref_id="548074" ref_url="https://bugzilla.suse.com/548074" source="BUGZILLA"/>
		<reference ref_id="548101" ref_url="https://bugzilla.suse.com/548101" source="BUGZILLA"/>
		<reference ref_id="548529" ref_url="https://bugzilla.suse.com/548529" source="BUGZILLA"/>
		<reference ref_id="548807" ref_url="https://bugzilla.suse.com/548807" source="BUGZILLA"/>
		<reference ref_id="549567" ref_url="https://bugzilla.suse.com/549567" source="BUGZILLA"/>
		<reference ref_id="549748" ref_url="https://bugzilla.suse.com/549748" source="BUGZILLA"/>
		<reference ref_id="549751" ref_url="https://bugzilla.suse.com/549751" source="BUGZILLA"/>
		<reference ref_id="550648" ref_url="https://bugzilla.suse.com/550648" source="BUGZILLA"/>
		<reference ref_id="551142" ref_url="https://bugzilla.suse.com/551142" source="BUGZILLA"/>
		<reference ref_id="551348" ref_url="https://bugzilla.suse.com/551348" source="BUGZILLA"/>
		<reference ref_id="551942" ref_url="https://bugzilla.suse.com/551942" source="BUGZILLA"/>
		<reference ref_id="552033" ref_url="https://bugzilla.suse.com/552033" source="BUGZILLA"/>
		<reference ref_id="552602" ref_url="https://bugzilla.suse.com/552602" source="BUGZILLA"/>
		<reference ref_id="552775" ref_url="https://bugzilla.suse.com/552775" source="BUGZILLA"/>
		<reference ref_id="553175" ref_url="https://bugzilla.suse.com/553175" source="BUGZILLA"/>
		<reference ref_id="554081" ref_url="https://bugzilla.suse.com/554081" source="BUGZILLA"/>
		<reference ref_id="554122" ref_url="https://bugzilla.suse.com/554122" source="BUGZILLA"/>
		<reference ref_id="554197" ref_url="https://bugzilla.suse.com/554197" source="BUGZILLA"/>
		<reference ref_id="554567" ref_url="https://bugzilla.suse.com/554567" source="BUGZILLA"/>
		<reference ref_id="556282" ref_url="https://bugzilla.suse.com/556282" source="BUGZILLA"/>
		<reference ref_id="556532" ref_url="https://bugzilla.suse.com/556532" source="BUGZILLA"/>
		<reference ref_id="556864" ref_url="https://bugzilla.suse.com/556864" source="BUGZILLA"/>
		<reference ref_id="557180" ref_url="https://bugzilla.suse.com/557180" source="BUGZILLA"/>
		<reference ref_id="557668" ref_url="https://bugzilla.suse.com/557668" source="BUGZILLA"/>
		<reference ref_id="557683" ref_url="https://bugzilla.suse.com/557683" source="BUGZILLA"/>
		<reference ref_id="557710" ref_url="https://bugzilla.suse.com/557710" source="BUGZILLA"/>
		<reference ref_id="559111" ref_url="https://bugzilla.suse.com/559111" source="BUGZILLA"/>
		<reference ref_id="560055" ref_url="https://bugzilla.suse.com/560055" source="BUGZILLA"/>
		<reference ref_id="561078" ref_url="https://bugzilla.suse.com/561078" source="BUGZILLA"/>
		<reference ref_id="561621" ref_url="https://bugzilla.suse.com/561621" source="BUGZILLA"/>
		<reference ref_id="564374" ref_url="https://bugzilla.suse.com/564374" source="BUGZILLA"/>
		<reference ref_id="564381" ref_url="https://bugzilla.suse.com/564381" source="BUGZILLA"/>
		<reference ref_id="564382" ref_url="https://bugzilla.suse.com/564382" source="BUGZILLA"/>
		<reference ref_id="564712" ref_url="https://bugzilla.suse.com/564712" source="BUGZILLA"/>
		<reference ref_id="565267" ref_url="https://bugzilla.suse.com/565267" source="BUGZILLA"/>
		<reference ref_id="566480" ref_url="https://bugzilla.suse.com/566480" source="BUGZILLA"/>
		<reference ref_id="566634" ref_url="https://bugzilla.suse.com/566634" source="BUGZILLA"/>
		<reference ref_id="566768" ref_url="https://bugzilla.suse.com/566768" source="BUGZILLA"/>
		<reference ref_id="566857" ref_url="https://bugzilla.suse.com/566857" source="BUGZILLA"/>
		<reference ref_id="567376" ref_url="https://bugzilla.suse.com/567376" source="BUGZILLA"/>
		<reference ref_id="567684" ref_url="https://bugzilla.suse.com/567684" source="BUGZILLA"/>
		<reference ref_id="569071" ref_url="https://bugzilla.suse.com/569071" source="BUGZILLA"/>
		<reference ref_id="569125" ref_url="https://bugzilla.suse.com/569125" source="BUGZILLA"/>
		<reference ref_id="569902" ref_url="https://bugzilla.suse.com/569902" source="BUGZILLA"/>
		<reference ref_id="569916" ref_url="https://bugzilla.suse.com/569916" source="BUGZILLA"/>
		<reference ref_id="570314" ref_url="https://bugzilla.suse.com/570314" source="BUGZILLA"/>
		<reference ref_id="570606" ref_url="https://bugzilla.suse.com/570606" source="BUGZILLA"/>
		<reference ref_id="571804" ref_url="https://bugzilla.suse.com/571804" source="BUGZILLA"/>
		<reference ref_id="573107" ref_url="https://bugzilla.suse.com/573107" source="BUGZILLA"/>
		<reference ref_id="573460" ref_url="https://bugzilla.suse.com/573460" source="BUGZILLA"/>
		<reference ref_id="573478" ref_url="https://bugzilla.suse.com/573478" source="BUGZILLA"/>
		<reference ref_id="574006" ref_url="https://bugzilla.suse.com/574006" source="BUGZILLA"/>
		<reference ref_id="574224" ref_url="https://bugzilla.suse.com/574224" source="BUGZILLA"/>
		<reference ref_id="575179" ref_url="https://bugzilla.suse.com/575179" source="BUGZILLA"/>
		<reference ref_id="575644" ref_url="https://bugzilla.suse.com/575644" source="BUGZILLA"/>
		<reference ref_id="576267" ref_url="https://bugzilla.suse.com/576267" source="BUGZILLA"/>
		<reference ref_id="576277" ref_url="https://bugzilla.suse.com/576277" source="BUGZILLA"/>
		<reference ref_id="576344" ref_url="https://bugzilla.suse.com/576344" source="BUGZILLA"/>
		<reference ref_id="576927" ref_url="https://bugzilla.suse.com/576927" source="BUGZILLA"/>
		<reference ref_id="577753" ref_url="https://bugzilla.suse.com/577753" source="BUGZILLA"/>
		<reference ref_id="577967" ref_url="https://bugzilla.suse.com/577967" source="BUGZILLA"/>
		<reference ref_id="579439" ref_url="https://bugzilla.suse.com/579439" source="BUGZILLA"/>
		<reference ref_id="580047" ref_url="https://bugzilla.suse.com/580047" source="BUGZILLA"/>
		<reference ref_id="580354" ref_url="https://bugzilla.suse.com/580354" source="BUGZILLA"/>
		<reference ref_id="580799" ref_url="https://bugzilla.suse.com/580799" source="BUGZILLA"/>
		<reference ref_id="581718" ref_url="https://bugzilla.suse.com/581718" source="BUGZILLA"/>
		<reference ref_id="583677" ref_url="https://bugzilla.suse.com/583677" source="BUGZILLA"/>
		<reference ref_id="584216" ref_url="https://bugzilla.suse.com/584216" source="BUGZILLA"/>
		<reference ref_id="590415" ref_url="https://bugzilla.suse.com/590415" source="BUGZILLA"/>
		<reference ref_id="591371" ref_url="https://bugzilla.suse.com/591371" source="BUGZILLA"/>
		<reference ref_id="591556" ref_url="https://bugzilla.suse.com/591556" source="BUGZILLA"/>
		<reference ref_id="593881" ref_url="https://bugzilla.suse.com/593881" source="BUGZILLA"/>
		<reference ref_id="596113" ref_url="https://bugzilla.suse.com/596113" source="BUGZILLA"/>
		<reference ref_id="596462" ref_url="https://bugzilla.suse.com/596462" source="BUGZILLA"/>
		<reference ref_id="597337" ref_url="https://bugzilla.suse.com/597337" source="BUGZILLA"/>
		<reference ref_id="598293" ref_url="https://bugzilla.suse.com/598293" source="BUGZILLA"/>
		<reference ref_id="599213" ref_url="https://bugzilla.suse.com/599213" source="BUGZILLA"/>
		<reference ref_id="599955" ref_url="https://bugzilla.suse.com/599955" source="BUGZILLA"/>
		<reference ref_id="600774" ref_url="https://bugzilla.suse.com/600774" source="BUGZILLA"/>
		<reference ref_id="601283" ref_url="https://bugzilla.suse.com/601283" source="BUGZILLA"/>
		<reference ref_id="602969" ref_url="https://bugzilla.suse.com/602969" source="BUGZILLA"/>
		<reference ref_id="603411" ref_url="https://bugzilla.suse.com/603411" source="BUGZILLA"/>
		<reference ref_id="604183" ref_url="https://bugzilla.suse.com/604183" source="BUGZILLA"/>
		<reference ref_id="607123" ref_url="https://bugzilla.suse.com/607123" source="BUGZILLA"/>
		<reference ref_id="608366" ref_url="https://bugzilla.suse.com/608366" source="BUGZILLA"/>
		<reference ref_id="608576" ref_url="https://bugzilla.suse.com/608576" source="BUGZILLA"/>
		<reference ref_id="608933" ref_url="https://bugzilla.suse.com/608933" source="BUGZILLA"/>
		<reference ref_id="608994" ref_url="https://bugzilla.suse.com/608994" source="BUGZILLA"/>
		<reference ref_id="609134" ref_url="https://bugzilla.suse.com/609134" source="BUGZILLA"/>
		<reference ref_id="609506" ref_url="https://bugzilla.suse.com/609506" source="BUGZILLA"/>
		<reference ref_id="610296" ref_url="https://bugzilla.suse.com/610296" source="BUGZILLA"/>
		<reference ref_id="610362" ref_url="https://bugzilla.suse.com/610362" source="BUGZILLA"/>
		<reference ref_id="612213" ref_url="https://bugzilla.suse.com/612213" source="BUGZILLA"/>
		<reference ref_id="613273" ref_url="https://bugzilla.suse.com/613273" source="BUGZILLA"/>
		<reference ref_id="615143" ref_url="https://bugzilla.suse.com/615143" source="BUGZILLA"/>
		<reference ref_id="616080" ref_url="https://bugzilla.suse.com/616080" source="BUGZILLA"/>
		<reference ref_id="619470" ref_url="https://bugzilla.suse.com/619470" source="BUGZILLA"/>
		<reference ref_id="620443" ref_url="https://bugzilla.suse.com/620443" source="BUGZILLA"/>
		<reference ref_id="624850" ref_url="https://bugzilla.suse.com/624850" source="BUGZILLA"/>
		<reference ref_id="627386" ref_url="https://bugzilla.suse.com/627386" source="BUGZILLA"/>
		<reference ref_id="627447" ref_url="https://bugzilla.suse.com/627447" source="BUGZILLA"/>
		<reference ref_id="628604" ref_url="https://bugzilla.suse.com/628604" source="BUGZILLA"/>
		<reference ref_id="631801" ref_url="https://bugzilla.suse.com/631801" source="BUGZILLA"/>
		<reference ref_id="632309" ref_url="https://bugzilla.suse.com/632309" source="BUGZILLA"/>
		<reference ref_id="632568" ref_url="https://bugzilla.suse.com/632568" source="BUGZILLA"/>
		<reference ref_id="633543" ref_url="https://bugzilla.suse.com/633543" source="BUGZILLA"/>
		<reference ref_id="633581" ref_url="https://bugzilla.suse.com/633581" source="BUGZILLA"/>
		<reference ref_id="633585" ref_url="https://bugzilla.suse.com/633585" source="BUGZILLA"/>
		<reference ref_id="633593" ref_url="https://bugzilla.suse.com/633593" source="BUGZILLA"/>
		<reference ref_id="634991" ref_url="https://bugzilla.suse.com/634991" source="BUGZILLA"/>
		<reference ref_id="635413" ref_url="https://bugzilla.suse.com/635413" source="BUGZILLA"/>
		<reference ref_id="635425" ref_url="https://bugzilla.suse.com/635425" source="BUGZILLA"/>
		<reference ref_id="636112" ref_url="https://bugzilla.suse.com/636112" source="BUGZILLA"/>
		<reference ref_id="636461" ref_url="https://bugzilla.suse.com/636461" source="BUGZILLA"/>
		<reference ref_id="636850" ref_url="https://bugzilla.suse.com/636850" source="BUGZILLA"/>
		<reference ref_id="637436" ref_url="https://bugzilla.suse.com/637436" source="BUGZILLA"/>
		<reference ref_id="638277" ref_url="https://bugzilla.suse.com/638277" source="BUGZILLA"/>
		<reference ref_id="638324" ref_url="https://bugzilla.suse.com/638324" source="BUGZILLA"/>
		<reference ref_id="639481" ref_url="https://bugzilla.suse.com/639481" source="BUGZILLA"/>
		<reference ref_id="639482" ref_url="https://bugzilla.suse.com/639482" source="BUGZILLA"/>
		<reference ref_id="639708" ref_url="https://bugzilla.suse.com/639708" source="BUGZILLA"/>
		<reference ref_id="639709" ref_url="https://bugzilla.suse.com/639709" source="BUGZILLA"/>
		<reference ref_id="640660" ref_url="https://bugzilla.suse.com/640660" source="BUGZILLA"/>
		<reference ref_id="640721" ref_url="https://bugzilla.suse.com/640721" source="BUGZILLA"/>
		<reference ref_id="CVE-2005-4881" ref_url="https://www.suse.com/security/cve/CVE-2005-4881/" source="CVE"/>
		<reference ref_id="CVE-2009-0676" ref_url="https://www.suse.com/security/cve/CVE-2009-0676/" source="CVE"/>
		<reference ref_id="CVE-2009-0835" ref_url="https://www.suse.com/security/cve/CVE-2009-0835/" source="CVE"/>
		<reference ref_id="CVE-2009-1072" ref_url="https://www.suse.com/security/cve/CVE-2009-1072/" source="CVE"/>
		<reference ref_id="CVE-2009-1192" ref_url="https://www.suse.com/security/cve/CVE-2009-1192/" source="CVE"/>
		<reference ref_id="CVE-2009-1242" ref_url="https://www.suse.com/security/cve/CVE-2009-1242/" source="CVE"/>
		<reference ref_id="CVE-2009-1265" ref_url="https://www.suse.com/security/cve/CVE-2009-1265/" source="CVE"/>
		<reference ref_id="CVE-2009-1337" ref_url="https://www.suse.com/security/cve/CVE-2009-1337/" source="CVE"/>
		<reference ref_id="CVE-2009-1360" ref_url="https://www.suse.com/security/cve/CVE-2009-1360/" source="CVE"/>
		<reference ref_id="CVE-2009-1385" ref_url="https://www.suse.com/security/cve/CVE-2009-1385/" source="CVE"/>
		<reference ref_id="CVE-2009-1389" ref_url="https://www.suse.com/security/cve/CVE-2009-1389/" source="CVE"/>
		<reference ref_id="CVE-2009-1439" ref_url="https://www.suse.com/security/cve/CVE-2009-1439/" source="CVE"/>
		<reference ref_id="CVE-2009-1630" ref_url="https://www.suse.com/security/cve/CVE-2009-1630/" source="CVE"/>
		<reference ref_id="CVE-2009-1961" ref_url="https://www.suse.com/security/cve/CVE-2009-1961/" source="CVE"/>
		<reference ref_id="CVE-2009-2406" ref_url="https://www.suse.com/security/cve/CVE-2009-2406/" source="CVE"/>
		<reference ref_id="CVE-2009-2407" ref_url="https://www.suse.com/security/cve/CVE-2009-2407/" source="CVE"/>
		<reference ref_id="CVE-2009-2692" ref_url="https://www.suse.com/security/cve/CVE-2009-2692/" source="CVE"/>
		<reference ref_id="CVE-2009-2903" ref_url="https://www.suse.com/security/cve/CVE-2009-2903/" source="CVE"/>
		<reference ref_id="CVE-2009-2909" ref_url="https://www.suse.com/security/cve/CVE-2009-2909/" source="CVE"/>
		<reference ref_id="CVE-2009-2910" ref_url="https://www.suse.com/security/cve/CVE-2009-2910/" source="CVE"/>
		<reference ref_id="CVE-2009-3002" ref_url="https://www.suse.com/security/cve/CVE-2009-3002/" source="CVE"/>
		<reference ref_id="CVE-2009-3080" ref_url="https://www.suse.com/security/cve/CVE-2009-3080/" source="CVE"/>
		<reference ref_id="CVE-2009-3286" ref_url="https://www.suse.com/security/cve/CVE-2009-3286/" source="CVE"/>
		<reference ref_id="CVE-2009-3547" ref_url="https://www.suse.com/security/cve/CVE-2009-3547/" source="CVE"/>
		<reference ref_id="CVE-2009-3612" ref_url="https://www.suse.com/security/cve/CVE-2009-3612/" source="CVE"/>
		<reference ref_id="CVE-2009-3620" ref_url="https://www.suse.com/security/cve/CVE-2009-3620/" source="CVE"/>
		<reference ref_id="CVE-2009-3621" ref_url="https://www.suse.com/security/cve/CVE-2009-3621/" source="CVE"/>
		<reference ref_id="CVE-2009-3726" ref_url="https://www.suse.com/security/cve/CVE-2009-3726/" source="CVE"/>
		<reference ref_id="CVE-2009-3939" ref_url="https://www.suse.com/security/cve/CVE-2009-3939/" source="CVE"/>
		<reference ref_id="CVE-2009-4005" ref_url="https://www.suse.com/security/cve/CVE-2009-4005/" source="CVE"/>
		<reference ref_id="CVE-2009-4020" ref_url="https://www.suse.com/security/cve/CVE-2009-4020/" source="CVE"/>
		<reference ref_id="CVE-2009-4138" ref_url="https://www.suse.com/security/cve/CVE-2009-4138/" source="CVE"/>
		<reference ref_id="CVE-2009-4307" ref_url="https://www.suse.com/security/cve/CVE-2009-4307/" source="CVE"/>
		<reference ref_id="CVE-2009-4308" ref_url="https://www.suse.com/security/cve/CVE-2009-4308/" source="CVE"/>
		<reference ref_id="CVE-2009-4536" ref_url="https://www.suse.com/security/cve/CVE-2009-4536/" source="CVE"/>
		<reference ref_id="CVE-2009-4537" ref_url="https://www.suse.com/security/cve/CVE-2009-4537/" source="CVE"/>
		<reference ref_id="CVE-2009-4538" ref_url="https://www.suse.com/security/cve/CVE-2009-4538/" source="CVE"/>
		<reference ref_id="CVE-2010-0003" ref_url="https://www.suse.com/security/cve/CVE-2010-0003/" source="CVE"/>
		<reference ref_id="CVE-2010-0007" ref_url="https://www.suse.com/security/cve/CVE-2010-0007/" source="CVE"/>
		<reference ref_id="CVE-2010-0307" ref_url="https://www.suse.com/security/cve/CVE-2010-0307/" source="CVE"/>
		<reference ref_id="CVE-2010-0410" ref_url="https://www.suse.com/security/cve/CVE-2010-0410/" source="CVE"/>
		<reference ref_id="CVE-2010-0415" ref_url="https://www.suse.com/security/cve/CVE-2010-0415/" source="CVE"/>
		<reference ref_id="CVE-2010-0622" ref_url="https://www.suse.com/security/cve/CVE-2010-0622/" source="CVE"/>
		<reference ref_id="CVE-2010-1087" ref_url="https://www.suse.com/security/cve/CVE-2010-1087/" source="CVE"/>
		<reference ref_id="CVE-2010-1162" ref_url="https://www.suse.com/security/cve/CVE-2010-1162/" source="CVE"/>
		<reference ref_id="CVE-2010-1437" ref_url="https://www.suse.com/security/cve/CVE-2010-1437/" source="CVE"/>
		<reference ref_id="CVE-2010-1446" ref_url="https://www.suse.com/security/cve/CVE-2010-1446/" source="CVE"/>
		<reference ref_id="CVE-2010-1641" ref_url="https://www.suse.com/security/cve/CVE-2010-1641/" source="CVE"/>
		<reference ref_id="CVE-2010-1643" ref_url="https://www.suse.com/security/cve/CVE-2010-1643/" source="CVE"/>
		<reference ref_id="CVE-2010-2798" ref_url="https://www.suse.com/security/cve/CVE-2010-2798/" source="CVE"/>
		<reference ref_id="CVE-2010-2803" ref_url="https://www.suse.com/security/cve/CVE-2010-2803/" source="CVE"/>
		<reference ref_id="CVE-2010-2942" ref_url="https://www.suse.com/security/cve/CVE-2010-2942/" source="CVE"/>
		<reference ref_id="CVE-2010-2946" ref_url="https://www.suse.com/security/cve/CVE-2010-2946/" source="CVE"/>
		<reference ref_id="CVE-2010-2954" ref_url="https://www.suse.com/security/cve/CVE-2010-2954/" source="CVE"/>
		<reference ref_id="CVE-2010-2955" ref_url="https://www.suse.com/security/cve/CVE-2010-2955/" source="CVE"/>
		<reference ref_id="CVE-2010-2959" ref_url="https://www.suse.com/security/cve/CVE-2010-2959/" source="CVE"/>
		<reference ref_id="CVE-2010-3015" ref_url="https://www.suse.com/security/cve/CVE-2010-3015/" source="CVE"/>
		<reference ref_id="CVE-2010-3078" ref_url="https://www.suse.com/security/cve/CVE-2010-3078/" source="CVE"/>
		<reference ref_id="CVE-2010-3080" ref_url="https://www.suse.com/security/cve/CVE-2010-3080/" source="CVE"/>
		<reference ref_id="CVE-2010-3081" ref_url="https://www.suse.com/security/cve/CVE-2010-3081/" source="CVE"/>
		<reference ref_id="CVE-2010-3296" ref_url="https://www.suse.com/security/cve/CVE-2010-3296/" source="CVE"/>
		<reference ref_id="CVE-2010-3297" ref_url="https://www.suse.com/security/cve/CVE-2010-3297/" source="CVE"/>
		<reference ref_id="CVE-2010-3301" ref_url="https://www.suse.com/security/cve/CVE-2010-3301/" source="CVE"/>
		<reference ref_id="CVE-2010-3310" ref_url="https://www.suse.com/security/cve/CVE-2010-3310/" source="CVE"/>
		<description>
The Linux kernel on SUSE Linux Enterprise 11 was updated to
2.6.27.23 and received lots of bugs and security fixes.

Following security issues have been fixed: CVE-2009-1439:
Buffer overflow in fs/cifs/connect.c in CIFS in the Linux
kernel 2.6.29 and earlier allows remote attackers to cause
a denial of service (crash) or potential code execution via
a long nativeFileSystem field in a Tree Connect response to
an SMB mount request.

This requires that kernel can be made to mount a 'cifs'
filesystem from a malicious CIFS server.

CVE-2009-1337: The exit_notify function in kernel/exit.c in
the Linux kernel did not restrict exit signals when the
CAP_KILL capability is held, which allows local users to
send an arbitrary signal to a process by running a program
that modifies the exit_signal field and then uses an exec
system call to launch a setuid application.

The GCC option -fwrapv has been added to compilation to
work around potentially removing integer overflow checks.

CVE-2009-1265: Integer overflow in rose_sendmsg
(sys/net/af_rose.c) in the Linux kernel might allow
attackers to obtain sensitive information via a large
length value, which causes 'garbage' memory to be sent.

CVE-2009-1242: The vmx_set_msr function in
arch/x86/kvm/vmx.c in the VMX implementation in the KVM
subsystem in the Linux kernel on the i386 platform allows
guest OS users to cause a denial of service (OOPS) by
setting the EFER_LME (aka 'Long mode enable') bit in the
Extended Feature Enable Register (EFER) model-specific
register, which is specific to the x86_64 platform.

CVE-2009-1360: The __inet6_check_established function in
net/ipv6/inet6_hashtables.c in the Linux kernel, when
Network Namespace Support (aka NET_NS) is enabled, allows
remote attackers to cause a denial of service (NULL pointer
dereference and system crash) via vectors involving IPv6
packets.

CVE-2009-1192: drivers/char/agp/generic.c in the agp
subsystem in the Linux kernel does not zero out pages that
may later be available to a user-space process, which
allows local users to obtain sensitive information by
reading these pages.

Additionaly a lot of bugs have been fixed and are listed in
the RPM changelog.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-05-27"/>
	<updated date="2009-05-27"/>
	<bugzilla href="https://bugzilla.suse.com/185164">SUSE bug 185164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/191648">SUSE bug 191648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/395775">SUSE bug 395775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/402922">SUSE bug 402922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/408304">SUSE bug 408304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/410452">SUSE bug 410452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/417417">SUSE bug 417417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/439348">SUSE bug 439348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/439775">SUSE bug 439775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/441062">SUSE bug 441062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/441420">SUSE bug 441420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/441650">SUSE bug 441650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/448410">SUSE bug 448410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/450468">SUSE bug 450468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/450658">SUSE bug 450658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/457472">SUSE bug 457472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/458222">SUSE bug 458222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/459065">SUSE bug 459065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/459146">SUSE bug 459146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/460284">SUSE bug 460284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/462913">SUSE bug 462913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/463829">SUSE bug 463829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/464360">SUSE bug 464360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/465707">SUSE bug 465707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/465854">SUSE bug 465854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/465955">SUSE bug 465955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/466554">SUSE bug 466554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/467174">SUSE bug 467174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/467317">SUSE bug 467317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/467381">SUSE bug 467381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/467518">SUSE bug 467518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/467846">SUSE bug 467846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/469576">SUSE bug 469576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/470238">SUSE bug 470238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/471249">SUSE bug 471249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/471396">SUSE bug 471396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/472342">SUSE bug 472342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/472410">SUSE bug 472410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/472432">SUSE bug 472432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/472783">SUSE bug 472783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/473881">SUSE bug 473881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/474062">SUSE bug 474062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/474335">SUSE bug 474335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/474773">SUSE bug 474773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/475149">SUSE bug 475149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/476330">SUSE bug 476330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/476525">SUSE bug 476525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/476582">SUSE bug 476582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/476822">SUSE bug 476822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/477624">SUSE bug 477624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/477816">SUSE bug 477816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/478462">SUSE bug 478462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/478534">SUSE bug 478534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/479304">SUSE bug 479304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/479558">SUSE bug 479558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/479617">SUSE bug 479617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/479730">SUSE bug 479730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/479784">SUSE bug 479784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/480391">SUSE bug 480391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/480448">SUSE bug 480448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/480524">SUSE bug 480524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/480617">SUSE bug 480617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/480749">SUSE bug 480749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/480753">SUSE bug 480753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/480809">SUSE bug 480809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/481074">SUSE bug 481074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/481749">SUSE bug 481749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/482052">SUSE bug 482052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/482220">SUSE bug 482220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/482506">SUSE bug 482506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/482614">SUSE bug 482614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/482796">SUSE bug 482796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/482818">SUSE bug 482818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/483375">SUSE bug 483375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/483706">SUSE bug 483706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/484306">SUSE bug 484306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/484529">SUSE bug 484529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/484664">SUSE bug 484664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/484716">SUSE bug 484716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/484767">SUSE bug 484767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/484931">SUSE bug 484931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/485089">SUSE bug 485089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/485768">SUSE bug 485768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/486001">SUSE bug 486001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/486331">SUSE bug 486331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/486430">SUSE bug 486430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/486728">SUSE bug 486728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/486803">SUSE bug 486803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/487106">SUSE bug 487106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/487247">SUSE bug 487247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/487412">SUSE bug 487412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/487755">SUSE bug 487755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/487987">SUSE bug 487987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/489005">SUSE bug 489005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/489105">SUSE bug 489105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/490030">SUSE bug 490030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/490368">SUSE bug 490368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/490517">SUSE bug 490517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/490608">SUSE bug 490608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/490902">SUSE bug 490902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/491289">SUSE bug 491289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/491430">SUSE bug 491430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/491802">SUSE bug 491802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/492282">SUSE bug 492282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/492324">SUSE bug 492324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/492469">SUSE bug 492469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/492547">SUSE bug 492547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/492658">SUSE bug 492658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/492760">SUSE bug 492760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/492768">SUSE bug 492768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/492961">SUSE bug 492961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/493214">SUSE bug 493214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/493392">SUSE bug 493392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/493991">SUSE bug 493991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/494463">SUSE bug 494463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/495065">SUSE bug 495065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/495068">SUSE bug 495068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/495091">SUSE bug 495091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/495259">SUSE bug 495259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/495515">SUSE bug 495515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/495668">SUSE bug 495668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/495816">SUSE bug 495816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/496027">SUSE bug 496027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/496353">SUSE bug 496353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/496398">SUSE bug 496398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/496399">SUSE bug 496399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/496502">SUSE bug 496502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/496871">SUSE bug 496871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/496878">SUSE bug 496878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/497341">SUSE bug 497341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/497648">SUSE bug 497648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/497807">SUSE bug 497807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/498042">SUSE bug 498042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/498237">SUSE bug 498237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/498358">SUSE bug 498358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/498369">SUSE bug 498369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/498402">SUSE bug 498402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/498708">SUSE bug 498708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/499152">SUSE bug 499152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/499278">SUSE bug 499278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/499558">SUSE bug 499558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/499772">SUSE bug 499772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/499845">SUSE bug 499845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/500429">SUSE bug 500429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/500508">SUSE bug 500508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/501114">SUSE bug 501114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/501160">SUSE bug 501160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/501224">SUSE bug 501224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/501234">SUSE bug 501234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/501396">SUSE bug 501396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/501563">SUSE bug 501563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/501651">SUSE bug 501651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/501663">SUSE bug 501663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/502026">SUSE bug 502026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/502092">SUSE bug 502092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/502425">SUSE bug 502425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/502675">SUSE bug 502675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/502733">SUSE bug 502733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/502903">SUSE bug 502903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/503038">SUSE bug 503038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/503101">SUSE bug 503101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/503161">SUSE bug 503161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/503353">SUSE bug 503353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/503457">SUSE bug 503457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/503635">SUSE bug 503635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/503855">SUSE bug 503855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/504646">SUSE bug 504646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/505578">SUSE bug 505578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/505831">SUSE bug 505831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/505925">SUSE bug 505925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/506361">SUSE bug 506361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/507557">SUSE bug 507557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/509066">SUSE bug 509066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/509071">SUSE bug 509071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/509407">SUSE bug 509407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/509495">SUSE bug 509495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/509497">SUSE bug 509497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/509544">SUSE bug 509544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/509753">SUSE bug 509753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/509822">SUSE bug 509822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/510449">SUSE bug 510449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/511079">SUSE bug 511079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/511243">SUSE bug 511243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/511306">SUSE bug 511306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/512070">SUSE bug 512070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/513437">SUSE bug 513437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/513954">SUSE bug 513954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/514022">SUSE bug 514022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/514265">SUSE bug 514265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/514375">SUSE bug 514375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/514644">SUSE bug 514644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/514767">SUSE bug 514767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/515266">SUSE bug 515266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/515640">SUSE bug 515640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/515645">SUSE bug 515645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/516213">SUSE bug 516213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/516827">SUSE bug 516827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/517098">SUSE bug 517098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/518291">SUSE bug 518291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/519111">SUSE bug 519111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/519188">SUSE bug 519188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/519820">SUSE bug 519820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/520975">SUSE bug 520975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/521190">SUSE bug 521190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/521578">SUSE bug 521578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/522414">SUSE bug 522414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/522686">SUSE bug 522686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/522764">SUSE bug 522764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/522790">SUSE bug 522790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/522911">SUSE bug 522911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/522914">SUSE bug 522914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/523487">SUSE bug 523487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/523719">SUSE bug 523719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/524222">SUSE bug 524222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/524242">SUSE bug 524242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/524347">SUSE bug 524347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/524683">SUSE bug 524683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/524981">SUSE bug 524981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/525903">SUSE bug 525903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/526514">SUSE bug 526514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/526819">SUSE bug 526819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/527284">SUSE bug 527284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/527361">SUSE bug 527361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/527748">SUSE bug 527748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/527754">SUSE bug 527754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/527848">SUSE bug 527848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/528427">SUSE bug 528427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/528769">SUSE bug 528769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/528811">SUSE bug 528811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/528853">SUSE bug 528853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/529188">SUSE bug 529188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/529369">SUSE bug 529369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/529660">SUSE bug 529660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/530151">SUSE bug 530151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/530535">SUSE bug 530535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/531260">SUSE bug 531260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/531384">SUSE bug 531384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/531437">SUSE bug 531437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/531533">SUSE bug 531533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/531633">SUSE bug 531633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/531716">SUSE bug 531716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/532063">SUSE bug 532063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/532443">SUSE bug 532443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/532598">SUSE bug 532598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/533267">SUSE bug 533267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/534065">SUSE bug 534065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/534202">SUSE bug 534202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/534214">SUSE bug 534214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/534232">SUSE bug 534232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/534629">SUSE bug 534629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/534961">SUSE bug 534961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/534977">SUSE bug 534977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/535380">SUSE bug 535380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/535409">SUSE bug 535409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/535497">SUSE bug 535497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/535801">SUSE bug 535801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/535880">SUSE bug 535880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/535890">SUSE bug 535890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/535939">SUSE bug 535939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/535947">SUSE bug 535947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/536117">SUSE bug 536117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/536467">SUSE bug 536467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/536699">SUSE bug 536699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/537016">SUSE bug 537016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/537435">SUSE bug 537435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/539010">SUSE bug 539010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/539271">SUSE bug 539271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/539878">SUSE bug 539878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/540349">SUSE bug 540349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/540997">SUSE bug 540997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/541403">SUSE bug 541403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/541648">SUSE bug 541648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/542505">SUSE bug 542505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/543480">SUSE bug 543480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/544759">SUSE bug 544759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/544760">SUSE bug 544760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/544763">SUSE bug 544763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/544779">SUSE bug 544779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545013">SUSE bug 545013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545236">SUSE bug 545236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545367">SUSE bug 545367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/546006">SUSE bug 546006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/546449">SUSE bug 546449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/547137">SUSE bug 547137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/547357">SUSE bug 547357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/547370">SUSE bug 547370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/547433">SUSE bug 547433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/547474">SUSE bug 547474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/548070">SUSE bug 548070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/548071">SUSE bug 548071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/548074">SUSE bug 548074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/548101">SUSE bug 548101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/548529">SUSE bug 548529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/548807">SUSE bug 548807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/549567">SUSE bug 549567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/549748">SUSE bug 549748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/549751">SUSE bug 549751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550648">SUSE bug 550648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/551142">SUSE bug 551142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/551348">SUSE bug 551348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/551942">SUSE bug 551942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/552033">SUSE bug 552033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/552602">SUSE bug 552602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/552775">SUSE bug 552775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/553175">SUSE bug 553175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/554081">SUSE bug 554081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/554122">SUSE bug 554122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/554197">SUSE bug 554197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/554567">SUSE bug 554567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/556282">SUSE bug 556282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/556532">SUSE bug 556532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/556864">SUSE bug 556864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557180">SUSE bug 557180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557668">SUSE bug 557668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557683">SUSE bug 557683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557710">SUSE bug 557710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/559111">SUSE bug 559111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/560055">SUSE bug 560055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/561078">SUSE bug 561078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/561621">SUSE bug 561621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/564374">SUSE bug 564374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/564381">SUSE bug 564381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/564382">SUSE bug 564382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/564712">SUSE bug 564712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/565267">SUSE bug 565267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/566480">SUSE bug 566480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/566634">SUSE bug 566634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/566768">SUSE bug 566768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/566857">SUSE bug 566857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/567376">SUSE bug 567376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/567684">SUSE bug 567684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/569071">SUSE bug 569071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/569125">SUSE bug 569125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/569902">SUSE bug 569902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/569916">SUSE bug 569916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/570314">SUSE bug 570314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/570606">SUSE bug 570606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/571804">SUSE bug 571804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/573107">SUSE bug 573107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/573460">SUSE bug 573460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/573478">SUSE bug 573478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/574006">SUSE bug 574006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/574224">SUSE bug 574224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/575179">SUSE bug 575179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/575644">SUSE bug 575644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/576267">SUSE bug 576267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/576277">SUSE bug 576277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/576344">SUSE bug 576344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/576927">SUSE bug 576927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/577753">SUSE bug 577753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/577967">SUSE bug 577967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/579439">SUSE bug 579439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/580047">SUSE bug 580047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/580354">SUSE bug 580354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/580799">SUSE bug 580799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/581718">SUSE bug 581718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/583677">SUSE bug 583677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/584216">SUSE bug 584216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/590415">SUSE bug 590415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/591371">SUSE bug 591371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/591556">SUSE bug 591556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/593881">SUSE bug 593881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/596113">SUSE bug 596113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/596462">SUSE bug 596462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/597337">SUSE bug 597337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/598293">SUSE bug 598293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/599213">SUSE bug 599213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/599955">SUSE bug 599955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/600774">SUSE bug 600774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/601283">SUSE bug 601283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/602969">SUSE bug 602969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/603411">SUSE bug 603411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/604183">SUSE bug 604183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/607123">SUSE bug 607123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/608366">SUSE bug 608366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/608576">SUSE bug 608576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/608933">SUSE bug 608933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/608994">SUSE bug 608994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/609134">SUSE bug 609134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/609506">SUSE bug 609506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/610296">SUSE bug 610296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/610362">SUSE bug 610362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/612213">SUSE bug 612213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/613273">SUSE bug 613273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/615143">SUSE bug 615143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/616080">SUSE bug 616080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/619470">SUSE bug 619470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/620443">SUSE bug 620443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/624850">SUSE bug 624850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/627386">SUSE bug 627386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/627447">SUSE bug 627447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/628604">SUSE bug 628604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/631801">SUSE bug 631801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/632309">SUSE bug 632309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/632568">SUSE bug 632568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633543">SUSE bug 633543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633581">SUSE bug 633581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633585">SUSE bug 633585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633593">SUSE bug 633593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/634991">SUSE bug 634991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/635413">SUSE bug 635413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/635425">SUSE bug 635425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/636112">SUSE bug 636112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/636461">SUSE bug 636461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/636850">SUSE bug 636850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/637436">SUSE bug 637436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638277">SUSE bug 638277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638324">SUSE bug 638324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/639481">SUSE bug 639481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/639482">SUSE bug 639482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/639708">SUSE bug 639708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/639709">SUSE bug 639709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/640660">SUSE bug 640660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/640721">SUSE bug 640721</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2005-4881/">CVE-2005-4881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-4881">CVE-2005-4881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0676/">CVE-2009-0676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0676">CVE-2009-0676 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0835/">CVE-2009-0835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0835">CVE-2009-0835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1072/">CVE-2009-1072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1072">CVE-2009-1072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1192/">CVE-2009-1192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1192">CVE-2009-1192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1242/">CVE-2009-1242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1242">CVE-2009-1242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1265/">CVE-2009-1265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1265">CVE-2009-1265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1337/">CVE-2009-1337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1337">CVE-2009-1337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1360/">CVE-2009-1360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1360">CVE-2009-1360 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1385/">CVE-2009-1385 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1385">CVE-2009-1385 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1389/">CVE-2009-1389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1389">CVE-2009-1389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1439/">CVE-2009-1439 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1439">CVE-2009-1439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1630/">CVE-2009-1630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1630">CVE-2009-1630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1961/">CVE-2009-1961 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-1961">CVE-2009-1961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2406/">CVE-2009-2406 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2406">CVE-2009-2406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2407/">CVE-2009-2407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2407">CVE-2009-2407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2692/">CVE-2009-2692 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-2692">CVE-2009-2692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2903/">CVE-2009-2903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2903">CVE-2009-2903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2909/">CVE-2009-2909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2909">CVE-2009-2909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2910/">CVE-2009-2910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2910">CVE-2009-2910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3002/">CVE-2009-3002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3002">CVE-2009-3002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3080/">CVE-2009-3080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3080">CVE-2009-3080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3286/">CVE-2009-3286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3286">CVE-2009-3286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3547/">CVE-2009-3547 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-3547">CVE-2009-3547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3612/">CVE-2009-3612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3612">CVE-2009-3612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3620/">CVE-2009-3620 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-3620">CVE-2009-3620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3621/">CVE-2009-3621 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-3621">CVE-2009-3621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3726/">CVE-2009-3726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3726">CVE-2009-3726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3939/">CVE-2009-3939 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-3939">CVE-2009-3939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4005/">CVE-2009-4005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4005">CVE-2009-4005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4020/">CVE-2009-4020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4020">CVE-2009-4020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4138/">CVE-2009-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4138">CVE-2009-4138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4307/">CVE-2009-4307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4307">CVE-2009-4307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4308/">CVE-2009-4308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4308">CVE-2009-4308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4536/">CVE-2009-4536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4536">CVE-2009-4536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4537/">CVE-2009-4537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4537">CVE-2009-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4538/">CVE-2009-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4538">CVE-2009-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0003/">CVE-2010-0003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0003">CVE-2010-0003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0007/">CVE-2010-0007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0007">CVE-2010-0007 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0307/">CVE-2010-0307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0307">CVE-2010-0307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0410/">CVE-2010-0410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0410">CVE-2010-0410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0415/">CVE-2010-0415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0415">CVE-2010-0415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0622/">CVE-2010-0622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0622">CVE-2010-0622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1087/">CVE-2010-1087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1087">CVE-2010-1087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1162/">CVE-2010-1162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1162">CVE-2010-1162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1437/">CVE-2010-1437 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1437">CVE-2010-1437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1446/">CVE-2010-1446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1446">CVE-2010-1446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1641/">CVE-2010-1641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1641">CVE-2010-1641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1643/">CVE-2010-1643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1643">CVE-2010-1643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2798/">CVE-2010-2798 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2798">CVE-2010-2798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2803/">CVE-2010-2803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2803">CVE-2010-2803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2942/">CVE-2010-2942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2942">CVE-2010-2942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2946/">CVE-2010-2946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2946">CVE-2010-2946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2954/">CVE-2010-2954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2954">CVE-2010-2954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2955/">CVE-2010-2955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2955">CVE-2010-2955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2959/">CVE-2010-2959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2959">CVE-2010-2959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3015/">CVE-2010-3015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3015">CVE-2010-3015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3078/">CVE-2010-3078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-3078">CVE-2010-3078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3080/">CVE-2010-3080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3080">CVE-2010-3080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3081/">CVE-2010-3081 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-3081">CVE-2010-3081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3296/">CVE-2010-3296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3296">CVE-2010-3296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3297/">CVE-2010-3297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3297">CVE-2010-3297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3301/">CVE-2010-3301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3301">CVE-2010-3301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3310/">CVE-2010-3310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3310">CVE-2010-3310 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570157" comment="ext4dev-kmp-default-0_2.6.27.23_0.1-7.1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570158" comment="ext4dev-kmp-pae-0_2.6.27.23_0.1-7.1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570159" comment="ext4dev-kmp-ppc64-0_2.6.27.23_0.1-7.1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570160" comment="ext4dev-kmp-vmi-0_2.6.27.23_0.1-7.1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570161" comment="ext4dev-kmp-xen-0_2.6.27.23_0.1-7.1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570162" comment="iscsitarget-kmp-default-0.4.15_2.6.27.54_0.2-94.14.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570163" comment="kernel-default-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570164" comment="kernel-default-base-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570165" comment="kernel-default-man-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570166" comment="kernel-kdump-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570167" comment="kernel-pae-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570168" comment="kernel-pae-base-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570169" comment="kernel-ppc64-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570170" comment="kernel-ppc64-base-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570171" comment="kernel-source-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570172" comment="kernel-syms-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570173" comment="kernel-vmi-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570174" comment="kernel-vmi-base-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570175" comment="kernel-xen-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570176" comment="kernel-xen-base-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570177" comment="oracleasm-kmp-default-2.0.5_2.6.27.54_0.2-7.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570157" comment="ext4dev-kmp-default-0_2.6.27.23_0.1-7.1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570158" comment="ext4dev-kmp-pae-0_2.6.27.23_0.1-7.1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570159" comment="ext4dev-kmp-ppc64-0_2.6.27.23_0.1-7.1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570160" comment="ext4dev-kmp-vmi-0_2.6.27.23_0.1-7.1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570161" comment="ext4dev-kmp-xen-0_2.6.27.23_0.1-7.1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570162" comment="iscsitarget-kmp-default-0.4.15_2.6.27.54_0.2-94.14.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570163" comment="kernel-default-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570164" comment="kernel-default-base-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570165" comment="kernel-default-man-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570166" comment="kernel-kdump-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570167" comment="kernel-pae-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570168" comment="kernel-pae-base-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570169" comment="kernel-ppc64-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570170" comment="kernel-ppc64-base-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570171" comment="kernel-source-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570172" comment="kernel-syms-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570173" comment="kernel-vmi-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570174" comment="kernel-vmi-base-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570175" comment="kernel-xen-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570176" comment="kernel-xen-base-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570177" comment="oracleasm-kmp-default-2.0.5_2.6.27.54_0.2-7.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216710" version="1" class="patch">
	<metadata>
		<title>Security update for Kerberos</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="485894" ref_url="https://bugzilla.suse.com/485894" source="BUGZILLA"/>
		<reference ref_id="486722" ref_url="https://bugzilla.suse.com/486722" source="BUGZILLA"/>
		<reference ref_id="486723" ref_url="https://bugzilla.suse.com/486723" source="BUGZILLA"/>
		<reference ref_id="561351" ref_url="https://bugzilla.suse.com/561351" source="BUGZILLA"/>
		<reference ref_id="591049" ref_url="https://bugzilla.suse.com/591049" source="BUGZILLA"/>
		<reference ref_id="596826" ref_url="https://bugzilla.suse.com/596826" source="BUGZILLA"/>
		<reference ref_id="650650" ref_url="https://bugzilla.suse.com/650650" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0844" ref_url="https://www.suse.com/security/cve/CVE-2009-0844/" source="CVE"/>
		<reference ref_id="CVE-2009-0845" ref_url="https://www.suse.com/security/cve/CVE-2009-0845/" source="CVE"/>
		<reference ref_id="CVE-2009-0846" ref_url="https://www.suse.com/security/cve/CVE-2009-0846/" source="CVE"/>
		<reference ref_id="CVE-2009-0847" ref_url="https://www.suse.com/security/cve/CVE-2009-0847/" source="CVE"/>
		<reference ref_id="CVE-2009-3295" ref_url="https://www.suse.com/security/cve/CVE-2009-3295/" source="CVE"/>
		<reference ref_id="CVE-2009-4212" ref_url="https://www.suse.com/security/cve/CVE-2009-4212/" source="CVE"/>
		<reference ref_id="CVE-2010-0629" ref_url="https://www.suse.com/security/cve/CVE-2010-0629/" source="CVE"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-1323" ref_url="https://www.suse.com/security/cve/CVE-2010-1323/" source="CVE"/>
		<reference ref_id="CVE-2010-1324" ref_url="https://www.suse.com/security/cve/CVE-2010-1324/" source="CVE"/>
		<reference ref_id="CVE-2010-4020" ref_url="https://www.suse.com/security/cve/CVE-2010-4020/" source="CVE"/>
		<reference ref_id="CVE-2010-4021" ref_url="https://www.suse.com/security/cve/CVE-2010-4021/" source="CVE"/>
		<description>
Clients sending negotiation requests with invalid flags
could crash the kerberos server (CVE-2009-0845).

GSS-API clients could crash when reading from an invalid
address space (CVE-2009-0844).

Invalid length checks could crash applications using the
kerberos ASN.1 parser (CVE-2009-0847).

Under certain circumstances the ASN.1 parser could free an
uninitialized pointer which could crash a kerberos server
or even lead to execution of arbitrary code (CVE-2009-0846).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-06"/>
	<updated date="2009-04-06"/>
	<bugzilla href="https://bugzilla.suse.com/485894">SUSE bug 485894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/486722">SUSE bug 486722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/486723">SUSE bug 486723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/561351">SUSE bug 561351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/591049">SUSE bug 591049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/596826">SUSE bug 596826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/650650">SUSE bug 650650</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0844/">CVE-2009-0844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0844">CVE-2009-0844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0845/">CVE-2009-0845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0845">CVE-2009-0845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0846/">CVE-2009-0846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0846">CVE-2009-0846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0847/">CVE-2009-0847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0847">CVE-2009-0847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3295/">CVE-2009-3295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3295">CVE-2009-3295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4212/">CVE-2009-4212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4212">CVE-2009-4212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0629/">CVE-2010-0629 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-0629">CVE-2010-0629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1321">CVE-2010-1321 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1323/">CVE-2010-1323 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1323">CVE-2010-1323 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1324/">CVE-2010-1324 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1324">CVE-2010-1324 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4020/">CVE-2010-4020 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2010-4020">CVE-2010-4020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4021/">CVE-2010-4021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4021">CVE-2010-4021 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570178" comment="krb5-1.6.3-133.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570179" comment="krb5-32bit-1.6.3-133.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570180" comment="krb5-apps-clients-1.6.3-133.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570181" comment="krb5-apps-servers-1.6.3-133.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570182" comment="krb5-client-1.6.3-133.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570183" comment="krb5-server-1.6.3-133.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570184" comment="krb5-x86-1.6.3-133.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570178" comment="krb5-1.6.3-133.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570179" comment="krb5-32bit-1.6.3-133.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570180" comment="krb5-apps-clients-1.6.3-133.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570181" comment="krb5-apps-servers-1.6.3-133.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570182" comment="krb5-client-1.6.3-133.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570183" comment="krb5-server-1.6.3-133.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570184" comment="krb5-x86-1.6.3-133.25.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216711" version="1" class="patch">
	<metadata>
		<title>Security update for KVM</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="517671" ref_url="https://bugzilla.suse.com/517671" source="BUGZILLA"/>
		<reference ref_id="540247" ref_url="https://bugzilla.suse.com/540247" source="BUGZILLA"/>
		<reference ref_id="547555" ref_url="https://bugzilla.suse.com/547555" source="BUGZILLA"/>
		<reference ref_id="547624" ref_url="https://bugzilla.suse.com/547624" source="BUGZILLA"/>
		<reference ref_id="549487" ref_url="https://bugzilla.suse.com/549487" source="BUGZILLA"/>
		<reference ref_id="550072" ref_url="https://bugzilla.suse.com/550072" source="BUGZILLA"/>
		<reference ref_id="550732" ref_url="https://bugzilla.suse.com/550732" source="BUGZILLA"/>
		<reference ref_id="550917" ref_url="https://bugzilla.suse.com/550917" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2287" ref_url="https://www.suse.com/security/cve/CVE-2009-2287/" source="CVE"/>
		<reference ref_id="CVE-2009-3616" ref_url="https://www.suse.com/security/cve/CVE-2009-3616/" source="CVE"/>
		<reference ref_id="CVE-2009-3638" ref_url="https://www.suse.com/security/cve/CVE-2009-3638/" source="CVE"/>
		<reference ref_id="CVE-2009-3640" ref_url="https://www.suse.com/security/cve/CVE-2009-3640/" source="CVE"/>
		<description>
This update of QEMU KVM fixes the following bugs:
- CVE-2009-3616: CVSS v2 Base Score: 8.5 use-after-free bug
  in VNC code which might be used to execute code on the
  host system injected from the guest system
- CVE-2009-3638: CVSS v2 Base Score: 7.2 integer overflow
  in kvm_dev_ioctl_get_supported_cpuid() 
- CVE-2009-3640: CVSS v2 Base Score: 2.1
  update_cr8_intercept() NULL pointer dereference
		</description>
<advisory from="security@suse.de">
	<issued date="2009-11-16"/>
	<updated date="2009-11-16"/>
	<bugzilla href="https://bugzilla.suse.com/517671">SUSE bug 517671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/540247">SUSE bug 540247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/547555">SUSE bug 547555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/547624">SUSE bug 547624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/549487">SUSE bug 549487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550072">SUSE bug 550072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550732">SUSE bug 550732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550917">SUSE bug 550917</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2287/">CVE-2009-2287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2287">CVE-2009-2287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3616/">CVE-2009-3616 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-3616">CVE-2009-3616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3638/">CVE-2009-3638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3638">CVE-2009-3638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3640/">CVE-2009-3640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3640">CVE-2009-3640 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570185" comment="kvm-78.0.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570186" comment="kvm-kmp-default-78.2.6.30.1_2.6.27.37_0.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570187" comment="kvm-kmp-pae-78.2.6.30.1_2.6.27.37_0.1-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570185" comment="kvm-78.0.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570186" comment="kvm-kmp-default-78.2.6.30.1_2.6.27.37_0.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570187" comment="kvm-kmp-pae-78.2.6.30.1_2.6.27.37_0.1-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216712" version="1" class="patch">
	<metadata>
		<title>Security update for lcms</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="479606" ref_url="https://bugzilla.suse.com/479606" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0581" ref_url="https://www.suse.com/security/cve/CVE-2009-0581/" source="CVE"/>
		<reference ref_id="CVE-2009-0723" ref_url="https://www.suse.com/security/cve/CVE-2009-0723/" source="CVE"/>
		<reference ref_id="CVE-2009-0733" ref_url="https://www.suse.com/security/cve/CVE-2009-0733/" source="CVE"/>
		<description>
Specially crafted image files could cause an integer
overflow in lcms. Attackers could potentially exploit that
to crash applications using lcms or even execute arbitrary
code (CVE-2009-0723, CVE-2009-0581, CVE-2009-0733).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-03-18"/>
	<updated date="2009-03-18"/>
	<bugzilla href="https://bugzilla.suse.com/479606">SUSE bug 479606</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0581/">CVE-2009-0581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0581">CVE-2009-0581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0723/">CVE-2009-0723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0723">CVE-2009-0723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0733/">CVE-2009-0733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0733">CVE-2009-0733 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570188" comment="lcms-1.17-77.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570189" comment="liblcms1-1.17-77.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570190" comment="liblcms1-32bit-1.17-77.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570191" comment="liblcms1-x86-1.17-77.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570188" comment="lcms-1.17-77.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570189" comment="liblcms1-1.17-77.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570190" comment="liblcms1-32bit-1.17-77.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570191" comment="liblcms1-x86-1.17-77.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216713" version="1" class="patch">
	<metadata>
		<title>Security update for libHX13</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="631582" ref_url="https://bugzilla.suse.com/631582" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2947" ref_url="https://www.suse.com/security/cve/CVE-2010-2947/" source="CVE"/>
		<description>

This update fixes a heap-based buffer overflow in HX_split() of libHX. 
(CVE-2010-2947)

Security Issue reference:

    * CVE-2010-2947
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2947&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-08-23"/>
	<updated date="2010-08-23"/>
	<bugzilla href="https://bugzilla.suse.com/631582">SUSE bug 631582</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2947/">CVE-2010-2947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2947">CVE-2010-2947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570192" comment="libHX13-1.23-4.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570193" comment="libHX13-32bit-1.23-4.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570194" comment="libHX13-x86-1.23-4.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570192" comment="libHX13-1.23-4.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570193" comment="libHX13-32bit-1.23-4.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570194" comment="libHX13-x86-1.23-4.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216714" version="1" class="patch">
	<metadata>
		<title>Security update for libapr-util1</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="509825" ref_url="https://bugzilla.suse.com/509825" source="BUGZILLA"/>
		<reference ref_id="529591" ref_url="https://bugzilla.suse.com/529591" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0023" ref_url="https://www.suse.com/security/cve/CVE-2009-0023/" source="CVE"/>
		<reference ref_id="CVE-2009-1955" ref_url="https://www.suse.com/security/cve/CVE-2009-1955/" source="CVE"/>
		<reference ref_id="CVE-2009-1956" ref_url="https://www.suse.com/security/cve/CVE-2009-1956/" source="CVE"/>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<description>
This update of libapr-util1 fixes a memory consumption bug
in the XML parser that can cause a remote denial-of-service
vulnerability in applications using APR (WebDAV for
example) (CVE-2009-1955). Additionally a one byte buffer
overflow in function apr_brigade_vprintf() (CVE-2009-1956)
and buffer underflow in function apr_strmatch_precompile()
(CVE-2009-0023) was fixed too. Depending on the application
using this function it can lead to remote denial of service
or information leakage.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-06-08"/>
	<updated date="2009-06-08"/>
	<bugzilla href="https://bugzilla.suse.com/509825">SUSE bug 509825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/529591">SUSE bug 529591</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0023/">CVE-2009-0023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0023">CVE-2009-0023 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1955/">CVE-2009-1955 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-1955">CVE-2009-1955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1956/">CVE-2009-1956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1956">CVE-2009-1956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2412">CVE-2009-2412 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570195" comment="libapr-util1-1.3.4-12.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570196" comment="libapr-util1-32bit-1.3.4-12.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570197" comment="libapr1-1.3.3-11.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570198" comment="libapr1-32bit-1.3.3-11.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570195" comment="libapr-util1-1.3.4-12.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570196" comment="libapr-util1-32bit-1.3.4-12.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570197" comment="libapr1-1.3.3-11.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570198" comment="libapr1-32bit-1.3.3-11.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216715" version="1" class="patch">
	<metadata>
		<title>Security update for libesmtp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="585393" ref_url="https://bugzilla.suse.com/585393" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-1192" ref_url="https://www.suse.com/security/cve/CVE-2010-1192/" source="CVE"/>
		<reference ref_id="CVE-2010-1194" ref_url="https://www.suse.com/security/cve/CVE-2010-1194/" source="CVE"/>
		<description>
libesmtp did not properly handle wildcards and embedded null
characters in the Common Name of X.509 certificates (CVE-2010-1192,
CVE-2010-1194). This has been fixed.
		</description>
<advisory from="security@suse.de">
	<issued date="2010-04-30"/>
	<updated date="2010-04-30"/>
	<bugzilla href="https://bugzilla.suse.com/585393">SUSE bug 585393</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1192/">CVE-2010-1192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1192">CVE-2010-1192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1194/">CVE-2010-1194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1194">CVE-2010-1194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570199" comment="libesmtp-1.0.4-157.15.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570199" comment="libesmtp-1.0.4-157.15.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216716" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="522602" ref_url="https://bugzilla.suse.com/522602" source="BUGZILLA"/>
		<reference ref_id="554085" ref_url="https://bugzilla.suse.com/554085" source="BUGZILLA"/>
		<reference ref_id="637290" ref_url="https://bugzilla.suse.com/637290" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2404" ref_url="https://www.suse.com/security/cve/CVE-2009-2404/" source="CVE"/>
		<reference ref_id="CVE-2009-2408" ref_url="https://www.suse.com/security/cve/CVE-2009-2408/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<description>

The Mozilla NSS Library was updated to version 3.12.8 and the Mozilla NSPR 
Library was updated to 4.8.6 to fix various bugs and one security issue:

    * CVE-2010-3170: Disallow wildcard matching in X509 certificate Common
      Names.

This update also has preparations for Firefox 4 support, and a updated Root 
Certificate Authority list.

Security Issue reference:

    * CVE-2010-3170
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3170&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-10-18"/>
	<updated date="2010-10-18"/>
	<bugzilla href="https://bugzilla.suse.com/522602">SUSE bug 522602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/554085">SUSE bug 554085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/637290">SUSE bug 637290</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2404/">CVE-2009-2404 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2404">CVE-2009-2404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2408/">CVE-2009-2408 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2009-2408">CVE-2009-2408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3170">CVE-2010-3170 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570200" comment="libfreebl3-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570201" comment="libfreebl3-32bit-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570202" comment="libfreebl3-x86-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570203" comment="mozilla-nspr-4.8.6-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570204" comment="mozilla-nspr-32bit-4.8.6-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570205" comment="mozilla-nspr-x86-4.8.6-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570206" comment="mozilla-nss-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570207" comment="mozilla-nss-32bit-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570208" comment="mozilla-nss-tools-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570209" comment="mozilla-nss-x86-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570210" comment="zlib-1.2.3-106.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570211" comment="zlib-32bit-1.2.3-106.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570212" comment="zlib-x86-1.2.3-106.34 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570200" comment="libfreebl3-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570201" comment="libfreebl3-32bit-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570202" comment="libfreebl3-x86-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570203" comment="mozilla-nspr-4.8.6-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570204" comment="mozilla-nspr-32bit-4.8.6-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570205" comment="mozilla-nspr-x86-4.8.6-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570206" comment="mozilla-nss-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570207" comment="mozilla-nss-32bit-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570208" comment="mozilla-nss-tools-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570209" comment="mozilla-nss-x86-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570210" comment="zlib-1.2.3-106.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570211" comment="zlib-32bit-1.2.3-106.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570212" comment="zlib-x86-1.2.3-106.34 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216717" version="1" class="patch">
	<metadata>
		<title>Security update for libgdiplus0</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="630756" ref_url="https://bugzilla.suse.com/630756" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-1526" ref_url="https://www.suse.com/security/cve/CVE-2010-1526/" source="CVE"/>
		<description>

This update fixes three integer overflows found by Secunia Research member 
Stefan Cornelius that could possibly be exploited to execute arbitrary 
code:

    * gdip_load_tiff_image() by processing specially crafted TIFF images
    * gdip_load_jpeg_image_internal() by processing specially crafted JPEG
      images
    * gdip_read_bmp_image() by processing specially crafted BMP image

Security Issue reference:

    * CVE-2010-1526
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1526&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-08-24"/>
	<updated date="2010-08-24"/>
	<bugzilla href="https://bugzilla.suse.com/630756">SUSE bug 630756</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1526/">CVE-2010-1526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1526">CVE-2010-1526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570213" comment="libgdiplus0-2.0-11.20.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570213" comment="libgdiplus0-2.0-11.20.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216718" version="1" class="patch">
	<metadata>
		<title>Security update for openLDAP</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="537143" ref_url="https://bugzilla.suse.com/537143" source="BUGZILLA"/>
		<reference ref_id="555725" ref_url="https://bugzilla.suse.com/555725" source="BUGZILLA"/>
		<reference ref_id="606294" ref_url="https://bugzilla.suse.com/606294" source="BUGZILLA"/>
		<reference ref_id="612430" ref_url="https://bugzilla.suse.com/612430" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2408" ref_url="https://www.suse.com/security/cve/CVE-2009-2408/" source="CVE"/>
		<reference ref_id="CVE-2010-0211" ref_url="https://www.suse.com/security/cve/CVE-2010-0211/" source="CVE"/>
		<reference ref_id="CVE-2010-0212" ref_url="https://www.suse.com/security/cve/CVE-2010-0212/" source="CVE"/>
		<description>

Several issues have been fixed in OpenLDAP:

    * specially crafted MODRDN operations can crash the OpenLDAP server
      (CVE-2010-0211 and CVE-2010-0212)
    * syncrepl might loose deletes in refreshAndPersist mode
    * DoS when handling 0-bytes

Security Issues:

    * CVE-2010-0211
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0211&gt;
    * CVE-2010-0212
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0212&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-06-15"/>
	<updated date="2010-06-15"/>
	<bugzilla href="https://bugzilla.suse.com/537143">SUSE bug 537143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/555725">SUSE bug 555725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/606294">SUSE bug 606294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/612430">SUSE bug 612430</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2408/">CVE-2009-2408 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2009-2408">CVE-2009-2408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0211/">CVE-2010-0211 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-0211">CVE-2010-0211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0212/">CVE-2010-0212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0212">CVE-2010-0212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570214" comment="libldap-2_4-2-2.4.12-7.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570215" comment="libldap-2_4-2-32bit-2.4.12-7.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570216" comment="libldap-2_4-2-x86-2.4.12-7.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570217" comment="openldap2-2.4.12-7.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570218" comment="openldap2-back-meta-2.4.12-7.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570219" comment="openldap2-client-2.4.12-7.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570214" comment="libldap-2_4-2-2.4.12-7.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570215" comment="libldap-2_4-2-32bit-2.4.12-7.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570216" comment="libldap-2_4-2-x86-2.4.12-7.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570217" comment="openldap2-2.4.12-7.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570218" comment="openldap2-back-meta-2.4.12-7.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570219" comment="openldap2-client-2.4.12-7.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216719" version="1" class="patch">
	<metadata>
		<title>Security update for libtool</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="556122" ref_url="https://bugzilla.suse.com/556122" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-3736" ref_url="https://www.suse.com/security/cve/CVE-2009-3736/" source="CVE"/>
		<description>
libtool: libltdl may load modules from the current working
directory. CVE-2009-3736 has been assigned to this issue.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-12-01"/>
	<updated date="2009-12-01"/>
	<bugzilla href="https://bugzilla.suse.com/556122">SUSE bug 556122</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3736/">CVE-2009-3736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3736">CVE-2009-3736 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570220" comment="libltdl7-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570221" comment="libltdl7-32bit-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570222" comment="libltdl7-x86-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570223" comment="libtool-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570224" comment="libtool-32bit-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570225" comment="libtool-x86-2.2.6-2.131.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570220" comment="libltdl7-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570221" comment="libltdl7-32bit-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570222" comment="libltdl7-x86-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570223" comment="libtool-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570224" comment="libtool-32bit-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570225" comment="libtool-x86-2.2.6-2.131.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216720" version="1" class="patch">
	<metadata>
		<title>Security update for MySQL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="497546" ref_url="https://bugzilla.suse.com/497546" source="BUGZILLA"/>
		<reference ref_id="520608" ref_url="https://bugzilla.suse.com/520608" source="BUGZILLA"/>
		<reference ref_id="557669" ref_url="https://bugzilla.suse.com/557669" source="BUGZILLA"/>
		<reference ref_id="607466" ref_url="https://bugzilla.suse.com/607466" source="BUGZILLA"/>
		<reference ref_id="609551" ref_url="https://bugzilla.suse.com/609551" source="BUGZILLA"/>
		<reference ref_id="637499" ref_url="https://bugzilla.suse.com/637499" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-4456" ref_url="https://www.suse.com/security/cve/CVE-2008-4456/" source="CVE"/>
		<reference ref_id="CVE-2008-7247" ref_url="https://www.suse.com/security/cve/CVE-2008-7247/" source="CVE"/>
		<reference ref_id="CVE-2009-2446" ref_url="https://www.suse.com/security/cve/CVE-2009-2446/" source="CVE"/>
		<reference ref_id="CVE-2009-4019" ref_url="https://www.suse.com/security/cve/CVE-2009-4019/" source="CVE"/>
		<reference ref_id="CVE-2009-4028" ref_url="https://www.suse.com/security/cve/CVE-2009-4028/" source="CVE"/>
		<reference ref_id="CVE-2009-4030" ref_url="https://www.suse.com/security/cve/CVE-2009-4030/" source="CVE"/>
		<reference ref_id="CVE-2010-1626" ref_url="https://www.suse.com/security/cve/CVE-2010-1626/" source="CVE"/>
		<reference ref_id="CVE-2010-1848" ref_url="https://www.suse.com/security/cve/CVE-2010-1848/" source="CVE"/>
		<reference ref_id="CVE-2010-1849" ref_url="https://www.suse.com/security/cve/CVE-2010-1849/" source="CVE"/>
		<reference ref_id="CVE-2010-1850" ref_url="https://www.suse.com/security/cve/CVE-2010-1850/" source="CVE"/>
		<reference ref_id="CVE-2010-3677" ref_url="https://www.suse.com/security/cve/CVE-2010-3677/" source="CVE"/>
		<reference ref_id="CVE-2010-3678" ref_url="https://www.suse.com/security/cve/CVE-2010-3678/" source="CVE"/>
		<reference ref_id="CVE-2010-3681" ref_url="https://www.suse.com/security/cve/CVE-2010-3681/" source="CVE"/>
		<reference ref_id="CVE-2010-3682" ref_url="https://www.suse.com/security/cve/CVE-2010-3682/" source="CVE"/>
		<reference ref_id="CVE-2010-3683" ref_url="https://www.suse.com/security/cve/CVE-2010-3683/" source="CVE"/>
		<description>

The following bugs have been fixed:

    * local users could delete data files for tables of other users
      (CVE-2010-1626).
    * authenticated users could gather information for tables they should
      not have access to (CVE-2010-1849)
    * authenticated users could crash mysqld (CVE-2010-1848)
    * authenticated users could potentially execute arbitrary code as the
      user running mysqld (CVE-2010-1850)
    * authenticated users could crash mysqld (CVE-2010-3677, CVE-2010-3678,
      CVE-2010-3681, CVE-2010-3682, CVE-2010-3683)

Security Issue references:

    * CVE-2010-1626
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1626&gt;
    * CVE-2010-1848
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1848&gt;
    * CVE-2010-1849
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1849&gt;
    * CVE-2010-1850
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1850&gt;
    * CVE-2010-3677
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3677&gt;
    * CVE-2010-3678
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3678&gt;
    * CVE-2010-3681
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3681&gt;
    * CVE-2010-3682
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3682&gt;
    * CVE-2010-3683
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3683&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-09-30"/>
	<updated date="2010-09-30"/>
	<bugzilla href="https://bugzilla.suse.com/497546">SUSE bug 497546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/520608">SUSE bug 520608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557669">SUSE bug 557669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/607466">SUSE bug 607466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/609551">SUSE bug 609551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/637499">SUSE bug 637499</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4456/">CVE-2008-4456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4456">CVE-2008-4456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-7247/">CVE-2008-7247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-7247">CVE-2008-7247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2446/">CVE-2009-2446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2446">CVE-2009-2446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4019/">CVE-2009-4019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4019">CVE-2009-4019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4028/">CVE-2009-4028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4028">CVE-2009-4028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4030/">CVE-2009-4030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4030">CVE-2009-4030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1626/">CVE-2010-1626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1626">CVE-2010-1626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1848/">CVE-2010-1848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1848">CVE-2010-1848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1849/">CVE-2010-1849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1849">CVE-2010-1849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1850/">CVE-2010-1850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1850">CVE-2010-1850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3677/">CVE-2010-3677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3677">CVE-2010-3677 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3678/">CVE-2010-3678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3678">CVE-2010-3678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3681/">CVE-2010-3681 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3681">CVE-2010-3681 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3682/">CVE-2010-3682 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3682">CVE-2010-3682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3683/">CVE-2010-3683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3683">CVE-2010-3683 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570226" comment="libmysqlclient15-5.0.67-13.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570227" comment="libmysqlclient15-32bit-5.0.67-13.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570228" comment="libmysqlclient15-x86-5.0.67-13.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570229" comment="libmysqlclient_r15-5.0.67-13.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570230" comment="mysql-5.0.67-13.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570231" comment="mysql-Max-5.0.67-13.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570232" comment="mysql-client-5.0.67-13.26.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570226" comment="libmysqlclient15-5.0.67-13.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570227" comment="libmysqlclient15-32bit-5.0.67-13.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570228" comment="libmysqlclient15-x86-5.0.67-13.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570229" comment="libmysqlclient_r15-5.0.67-13.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570230" comment="mysql-5.0.67-13.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570231" comment="mysql-Max-5.0.67-13.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570232" comment="mysql-client-5.0.67-13.26.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216721" version="1" class="patch">
	<metadata>
		<title>Security update for libneon</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="528370" ref_url="https://bugzilla.suse.com/528370" source="BUGZILLA"/>
		<reference ref_id="532345" ref_url="https://bugzilla.suse.com/532345" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2408" ref_url="https://www.suse.com/security/cve/CVE-2009-2408/" source="CVE"/>
		<reference ref_id="CVE-2009-2473" ref_url="https://www.suse.com/security/cve/CVE-2009-2473/" source="CVE"/>
		<description>
neon did not properly handle embedded NUL characters in
X.509 certificates when comparing host names. Attackers
could exploit that to spoof SSL servers (CVE-2009-2408).

Specially crafted XML documents that contain a large number
of nested entity references could cause neon to consume
large amounts of CPU and memory (CVE-2009-2473).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-10-12"/>
	<updated date="2009-10-12"/>
	<bugzilla href="https://bugzilla.suse.com/528370">SUSE bug 528370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/532345">SUSE bug 532345</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2408/">CVE-2009-2408 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2009-2408">CVE-2009-2408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2473/">CVE-2009-2473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2473">CVE-2009-2473 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570233" comment="libneon27-0.28.3-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570234" comment="libneon27-32bit-0.28.3-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570235" comment="libneon27-x86-0.28.3-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570236" comment="neon-0.28.3-2.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570233" comment="libneon27-0.28.3-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570234" comment="libneon27-32bit-0.28.3-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570235" comment="libneon27-x86-0.28.3-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570236" comment="neon-0.28.3-2.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216722" version="1" class="patch">
	<metadata>
		<title>Security update for libnetpbm</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="579903" ref_url="https://bugzilla.suse.com/579903" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-4274" ref_url="https://www.suse.com/security/cve/CVE-2009-4274/" source="CVE"/>
		<description>
This update of netpbm fxes a stack-based buffer overflow that could be triggered while processing the contents of XPM headers in image files.
(CVE-2009-4274: CVSS v2 Base Score: 5.8 (moderate) (AV:N/AC:M/Au:N/C:N/I:P/A:P): Buffer Errors (CWE-119))
		</description>
<advisory from="security@suse.de">
	<issued date="2010-02-16"/>
	<updated date="2010-02-16"/>
	<bugzilla href="https://bugzilla.suse.com/579903">SUSE bug 579903</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4274/">CVE-2009-4274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4274">CVE-2009-4274 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570237" comment="libnetpbm10-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570238" comment="libnetpbm10-32bit-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570239" comment="libnetpbm10-x86-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570240" comment="netpbm-10.26.44-101.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570237" comment="libnetpbm10-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570238" comment="libnetpbm10-32bit-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570239" comment="libnetpbm10-x86-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570240" comment="netpbm-10.26.44-101.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216723" version="1" class="patch">
	<metadata>
		<title>Security update for OpenSC</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="480262" ref_url="https://bugzilla.suse.com/480262" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0368" ref_url="https://www.suse.com/security/cve/CVE-2009-0368/" source="CVE"/>
		<description>
Private data objects on smartcards initialized with OpenSC
could be accessed without authentication (CVE-2009-0368).

Only blank cards initialized with OpenSC are affected by
this problem. Affected cards need to be manually fixed,
updating the opensc package alone is not sufficient!

Please carefully read and follow the instructions on the
following web site if you are using PIN protected private
data objects on smart cards other than Oberthur, and you
have initialized those cards using OpenSC:
http://en.opensuse.org/Smart_Cards/Advisories
		</description>
<advisory from="security@suse.de">
	<issued date="2009-03-18"/>
	<updated date="2009-03-18"/>
	<bugzilla href="https://bugzilla.suse.com/480262">SUSE bug 480262</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0368/">CVE-2009-0368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0368">CVE-2009-0368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570241" comment="libopensc2-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570242" comment="libopensc2-32bit-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570243" comment="libopensc2-x86-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570244" comment="opensc-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570245" comment="opensc-32bit-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570246" comment="opensc-x86-0.11.6-5.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570241" comment="libopensc2-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570242" comment="libopensc2-32bit-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570243" comment="libopensc2-x86-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570244" comment="opensc-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570245" comment="opensc-32bit-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570246" comment="opensc-x86-0.11.6-5.25.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216724" version="1" class="patch">
	<metadata>
		<title>Security update for OpenSSL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="489641" ref_url="https://bugzilla.suse.com/489641" source="BUGZILLA"/>
		<reference ref_id="504687" ref_url="https://bugzilla.suse.com/504687" source="BUGZILLA"/>
		<reference ref_id="553641" ref_url="https://bugzilla.suse.com/553641" source="BUGZILLA"/>
		<reference ref_id="584292" ref_url="https://bugzilla.suse.com/584292" source="BUGZILLA"/>
		<reference ref_id="608666" ref_url="https://bugzilla.suse.com/608666" source="BUGZILLA"/>
		<reference ref_id="629905" ref_url="https://bugzilla.suse.com/629905" source="BUGZILLA"/>
		<reference ref_id="651003" ref_url="https://bugzilla.suse.com/651003" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-3245" ref_url="https://www.suse.com/security/cve/CVE-2009-3245/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939/" source="CVE"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<description>
Three remote DoS vulnerabilities have been fixed in
OpenSSL: a DTLS epoch record buffer memory DoS
(CVE-2009-1377), a DTLS fragment handling memory DoS
(CVE-2009-1378) and  a DTLS fragment read after a free DoS
(CVE-2009-1379).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-05-22"/>
	<updated date="2009-05-22"/>
	<bugzilla href="https://bugzilla.suse.com/489641">SUSE bug 489641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/504687">SUSE bug 504687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/553641">SUSE bug 553641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/584292">SUSE bug 584292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/608666">SUSE bug 608666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/651003">SUSE bug 651003</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0590">CVE-2009-0590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0591">CVE-2009-0591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0789">CVE-2009-0789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1377">CVE-2009-1377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1378">CVE-2009-1378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1379">CVE-2009-1379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3245/">CVE-2009-3245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3245">CVE-2009-3245 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2939">CVE-2010-2939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3864">CVE-2010-3864 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570247" comment="libopenssl0_9_8-0.9.8h-30.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570248" comment="libopenssl0_9_8-32bit-0.9.8h-30.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570249" comment="libopenssl0_9_8-x86-0.9.8h-30.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570250" comment="openssl-0.9.8h-30.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570251" comment="openssl-doc-0.9.8h-30.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570247" comment="libopenssl0_9_8-0.9.8h-30.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570248" comment="libopenssl0_9_8-32bit-0.9.8h-30.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570249" comment="libopenssl0_9_8-x86-0.9.8h-30.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570250" comment="openssl-0.9.8h-30.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570251" comment="openssl-doc-0.9.8h-30.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216725" version="1" class="patch">
	<metadata>
		<title>Security update for libpng</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="472745" ref_url="https://bugzilla.suse.com/472745" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<description>
A allocation mistake in libpng's pngread.c has been fixed
(CVE-2009-0040).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-03-18"/>
	<updated date="2009-03-18"/>
	<bugzilla href="https://bugzilla.suse.com/472745">SUSE bug 472745</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0040">CVE-2009-0040 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570252" comment="libpng12-0-1.2.31-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570253" comment="libpng12-0-32bit-1.2.31-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570254" comment="libpng12-0-x86-1.2.31-5.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570252" comment="libpng12-0-1.2.31-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570253" comment="libpng12-0-32bit-1.2.31-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570254" comment="libpng12-0-x86-1.2.31-5.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216726" version="1" class="patch">
	<metadata>
		<title>Security update for libpng</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="514727" ref_url="https://bugzilla.suse.com/514727" source="BUGZILLA"/>
		<reference ref_id="580484" ref_url="https://bugzilla.suse.com/580484" source="BUGZILLA"/>
		<reference ref_id="617866" ref_url="https://bugzilla.suse.com/617866" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2042" ref_url="https://www.suse.com/security/cve/CVE-2009-2042/" source="CVE"/>
		<reference ref_id="CVE-2010-0205" ref_url="https://www.suse.com/security/cve/CVE-2010-0205/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-2249" ref_url="https://www.suse.com/security/cve/CVE-2010-2249/" source="CVE"/>
		<description>

Specially crafted png files could cause crashes or even execution of 
arbitrary code in applications using libpng to process such files 
(CVE-2010-1205, CVE-2010-2249).

Security Issues reference:

    * CVE-2010-1205
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1205&gt;
    * CVE-2010-2249
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2249&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-09-01"/>
	<updated date="2010-09-01"/>
	<bugzilla href="https://bugzilla.suse.com/514727">SUSE bug 514727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/580484">SUSE bug 580484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/617866">SUSE bug 617866</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2042/">CVE-2009-2042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2042">CVE-2009-2042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0205/">CVE-2010-0205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0205">CVE-2010-0205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1205">CVE-2010-1205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2249/">CVE-2010-2249 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2249">CVE-2010-2249 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570255" comment="libpng12-0-1.2.31-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570256" comment="libpng12-0-32bit-1.2.31-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570257" comment="libpng12-0-x86-1.2.31-5.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570255" comment="libpng12-0-1.2.31-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570256" comment="libpng12-0-32bit-1.2.31-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570257" comment="libpng12-0-x86-1.2.31-5.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216727" version="1" class="patch">
	<metadata>
		<title>Security update for libpoppler</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="507102" ref_url="https://bugzilla.suse.com/507102" source="BUGZILLA"/>
		<reference ref_id="537171" ref_url="https://bugzilla.suse.com/537171" source="BUGZILLA"/>
		<reference ref_id="543090" ref_url="https://bugzilla.suse.com/543090" source="BUGZILLA"/>
		<reference ref_id="546393" ref_url="https://bugzilla.suse.com/546393" source="BUGZILLA"/>
		<reference ref_id="556607" ref_url="https://bugzilla.suse.com/556607" source="BUGZILLA"/>
		<reference ref_id="556876" ref_url="https://bugzilla.suse.com/556876" source="BUGZILLA"/>
		<reference ref_id="570183" ref_url="https://bugzilla.suse.com/570183" source="BUGZILLA"/>
		<reference ref_id="642785" ref_url="https://bugzilla.suse.com/642785" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0791" ref_url="https://www.suse.com/security/cve/CVE-2009-0791/" source="CVE"/>
		<reference ref_id="CVE-2009-3607" ref_url="https://www.suse.com/security/cve/CVE-2009-3607/" source="CVE"/>
		<reference ref_id="CVE-2009-3608" ref_url="https://www.suse.com/security/cve/CVE-2009-3608/" source="CVE"/>
		<reference ref_id="CVE-2009-3938" ref_url="https://www.suse.com/security/cve/CVE-2009-3938/" source="CVE"/>
		<reference ref_id="CVE-2009-4035" ref_url="https://www.suse.com/security/cve/CVE-2009-4035/" source="CVE"/>
		<reference ref_id="CVE-2010-3702" ref_url="https://www.suse.com/security/cve/CVE-2010-3702/" source="CVE"/>
		<reference ref_id="CVE-2010-3704" ref_url="https://www.suse.com/security/cve/CVE-2010-3704/" source="CVE"/>
		<description>

Specially crafted PDF files could crash poppler or potentially even cause 
execution of arbitrary code (CVE-2010-3702, CVE-2010-3704). This has been 
fixed.

Security Issue references:

    * CVE-2010-3702
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702&gt;
    * CVE-2010-3704
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-10-16"/>
	<updated date="2010-10-16"/>
	<bugzilla href="https://bugzilla.suse.com/507102">SUSE bug 507102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/537171">SUSE bug 537171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/543090">SUSE bug 543090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/546393">SUSE bug 546393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/556607">SUSE bug 556607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/556876">SUSE bug 556876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/570183">SUSE bug 570183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/642785">SUSE bug 642785</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0791/">CVE-2009-0791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0791">CVE-2009-0791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3607/">CVE-2009-3607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3607">CVE-2009-3607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3608/">CVE-2009-3608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3608">CVE-2009-3608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3938/">CVE-2009-3938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3938">CVE-2009-3938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4035/">CVE-2009-4035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4035">CVE-2009-4035 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3702/">CVE-2010-3702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3702">CVE-2010-3702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3704/">CVE-2010-3704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3704">CVE-2010-3704 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570258" comment="libpoppler-glib4-0.10.1-1.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570259" comment="libpoppler-qt4-3-0.10.1-1.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570260" comment="libpoppler4-0.10.1-1.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570261" comment="poppler-tools-0.10.1-1.37.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570258" comment="libpoppler-glib4-0.10.1-1.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570259" comment="libpoppler-qt4-3-0.10.1-1.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570260" comment="libpoppler4-0.10.1-1.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570261" comment="poppler-tools-0.10.1-1.37.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216728" version="1" class="patch">
	<metadata>
		<title>Security update for libpoppler4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="387770" ref_url="https://bugzilla.suse.com/387770" source="BUGZILLA"/>
		<reference ref_id="481795" ref_url="https://bugzilla.suse.com/481795" source="BUGZILLA"/>
		<reference ref_id="487100" ref_url="https://bugzilla.suse.com/487100" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0146" ref_url="https://www.suse.com/security/cve/CVE-2009-0146/" source="CVE"/>
		<reference ref_id="CVE-2009-0147" ref_url="https://www.suse.com/security/cve/CVE-2009-0147/" source="CVE"/>
		<reference ref_id="CVE-2009-0165" ref_url="https://www.suse.com/security/cve/CVE-2009-0165/" source="CVE"/>
		<reference ref_id="CVE-2009-0166" ref_url="https://www.suse.com/security/cve/CVE-2009-0166/" source="CVE"/>
		<reference ref_id="CVE-2009-0755" ref_url="https://www.suse.com/security/cve/CVE-2009-0755/" source="CVE"/>
		<reference ref_id="CVE-2009-0756" ref_url="https://www.suse.com/security/cve/CVE-2009-0756/" source="CVE"/>
		<reference ref_id="CVE-2009-0799" ref_url="https://www.suse.com/security/cve/CVE-2009-0799/" source="CVE"/>
		<reference ref_id="CVE-2009-0800" ref_url="https://www.suse.com/security/cve/CVE-2009-0800/" source="CVE"/>
		<reference ref_id="CVE-2009-1179" ref_url="https://www.suse.com/security/cve/CVE-2009-1179/" source="CVE"/>
		<reference ref_id="CVE-2009-1180" ref_url="https://www.suse.com/security/cve/CVE-2009-1180/" source="CVE"/>
		<reference ref_id="CVE-2009-1181" ref_url="https://www.suse.com/security/cve/CVE-2009-1181/" source="CVE"/>
		<reference ref_id="CVE-2009-1182" ref_url="https://www.suse.com/security/cve/CVE-2009-1182/" source="CVE"/>
		<reference ref_id="CVE-2009-1183" ref_url="https://www.suse.com/security/cve/CVE-2009-1183/" source="CVE"/>
		<description>
This update of poppler: fix various security bugs that
occur while decoding JBIG2 (CVE-2009-0146, CVE-2009-0147,
CVE-2009-0165, CVE-2009-0166, CVE-2009-0799, CVE-2009-0800,
CVE-2009-1179, CVE-2009-1180, CVE-2009-1181, CVE-2009-1182,
CVE-2009-1183).

Further a denial of service bug in function
FormWidgetChoice::loadDefaults() (CVE-2009-0755) and
JBIG2Stream::readSymbolDictSeg() (CVE-2009-0756) was closed
that could be triggered via malformed PDF files.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-06-22"/>
	<updated date="2009-06-22"/>
	<bugzilla href="https://bugzilla.suse.com/387770">SUSE bug 387770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/481795">SUSE bug 481795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0146/">CVE-2009-0146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0146">CVE-2009-0146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0147/">CVE-2009-0147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0147">CVE-2009-0147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0165/">CVE-2009-0165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0165">CVE-2009-0165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0166/">CVE-2009-0166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0166">CVE-2009-0166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0755/">CVE-2009-0755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0755">CVE-2009-0755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0756/">CVE-2009-0756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0756">CVE-2009-0756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0799/">CVE-2009-0799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0799">CVE-2009-0799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0800/">CVE-2009-0800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0800">CVE-2009-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1179/">CVE-2009-1179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1179">CVE-2009-1179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1180/">CVE-2009-1180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1180">CVE-2009-1180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1181/">CVE-2009-1181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1181">CVE-2009-1181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1182/">CVE-2009-1182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1182">CVE-2009-1182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1183/">CVE-2009-1183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1183">CVE-2009-1183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570262" comment="libpoppler4-0.10.1-1.30.5 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570262" comment="libpoppler4-0.10.1-1.30.5 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216729" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="581765" ref_url="https://bugzilla.suse.com/581765" source="BUGZILLA"/>
		<reference ref_id="609759" ref_url="https://bugzilla.suse.com/609759" source="BUGZILLA"/>
		<reference ref_id="609761" ref_url="https://bugzilla.suse.com/609761" source="BUGZILLA"/>
		<reference ref_id="638233" ref_url="https://bugzilla.suse.com/638233" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2625" ref_url="https://www.suse.com/security/cve/CVE-2009-2625/" source="CVE"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<reference ref_id="CVE-2010-1634" ref_url="https://www.suse.com/security/cve/CVE-2010-1634/" source="CVE"/>
		<reference ref_id="CVE-2010-2089" ref_url="https://www.suse.com/security/cve/CVE-2010-2089/" source="CVE"/>
		<reference ref_id="CVE-2010-3493" ref_url="https://www.suse.com/security/cve/CVE-2010-3493/" source="CVE"/>
		<description>

The following issues have been fixed:

    * 

      a race condition in the accept() implementation of smtpd.py could
      lead to a denial of service (CVE-2010-3493).

    * 

      integer overflows and insufficient size checks could crash the
      audioop module (CVE-2010-2089, CVE-2010-1634).

Security Issue references:

    * CVE-2010-2089
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2089&gt;
    * CVE-2010-1634
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1634&gt;
    * CVE-2010-3493
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3493&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-10-28"/>
	<updated date="2010-10-28"/>
	<bugzilla href="https://bugzilla.suse.com/581765">SUSE bug 581765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/609759">SUSE bug 609759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/609761">SUSE bug 609761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638233">SUSE bug 638233</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2625/">CVE-2009-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2625">CVE-2009-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3560">CVE-2009-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3720">CVE-2009-3720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1634/">CVE-2010-1634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1634">CVE-2010-1634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2089/">CVE-2010-2089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2089">CVE-2010-2089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3493/">CVE-2010-3493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3493">CVE-2010-3493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570263" comment="libpython2_6-1_0-2.6.0-8.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570264" comment="libpython2_6-1_0-32bit-2.6.0-8.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570265" comment="libpython2_6-1_0-x86-2.6.0-8.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570266" comment="python-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570267" comment="python-32bit-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570268" comment="python-base-2.6.0-8.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570269" comment="python-base-32bit-2.6.0-8.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570270" comment="python-base-x86-2.6.0-8.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570271" comment="python-curses-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570272" comment="python-demo-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570273" comment="python-gdbm-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570274" comment="python-idle-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570275" comment="python-tk-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570276" comment="python-x86-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570277" comment="python-xml-2.6.0-8.8.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570263" comment="libpython2_6-1_0-2.6.0-8.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570264" comment="libpython2_6-1_0-32bit-2.6.0-8.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570265" comment="libpython2_6-1_0-x86-2.6.0-8.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570266" comment="python-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570267" comment="python-32bit-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570268" comment="python-base-2.6.0-8.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570269" comment="python-base-32bit-2.6.0-8.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570270" comment="python-base-x86-2.6.0-8.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570271" comment="python-curses-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570272" comment="python-demo-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570273" comment="python-gdbm-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570274" comment="python-idle-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570275" comment="python-tk-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570276" comment="python-x86-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570277" comment="python-xml-2.6.0-8.8.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216730" version="1" class="patch">
	<metadata>
		<title>Recommended update for libqt4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="517894" ref_url="https://bugzilla.suse.com/517894" source="BUGZILLA"/>
		<reference ref_id="534081" ref_url="https://bugzilla.suse.com/534081" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2700" ref_url="https://www.suse.com/security/cve/CVE-2009-2700/" source="CVE"/>
		<description>
This update improves stability of Qt applications when using Japanese locale with input methods enabled (bnc#517894).
		</description>
<advisory from="security@suse.de">
	<issued date="2010-04-09"/>
	<updated date="2010-04-09"/>
	<bugzilla href="https://bugzilla.suse.com/517894">SUSE bug 517894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/534081">SUSE bug 534081</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2700/">CVE-2009-2700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2700">CVE-2009-2700 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991172" comment="libqt4-4.4.3-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587134" comment="libqt4-32bit-4.4.3-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991173" comment="libqt4-qt3support-4.4.3-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587136" comment="libqt4-qt3support-32bit-4.4.3-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587137" comment="libqt4-qt3support-x86-4.4.3-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991174" comment="libqt4-sql-4.4.3-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587139" comment="libqt4-sql-32bit-4.4.3-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991175" comment="libqt4-sql-sqlite-4.4.3-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587141" comment="libqt4-sql-x86-4.4.3-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991176" comment="libqt4-x11-4.4.3-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587143" comment="libqt4-x11-32bit-4.4.3-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587144" comment="libqt4-x11-x86-4.4.3-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587145" comment="libqt4-x86-4.4.3-12.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991172" comment="libqt4-4.4.3-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587134" comment="libqt4-32bit-4.4.3-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991173" comment="libqt4-qt3support-4.4.3-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587136" comment="libqt4-qt3support-32bit-4.4.3-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587137" comment="libqt4-qt3support-x86-4.4.3-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991174" comment="libqt4-sql-4.4.3-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587139" comment="libqt4-sql-32bit-4.4.3-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991175" comment="libqt4-sql-sqlite-4.4.3-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587141" comment="libqt4-sql-x86-4.4.3-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991176" comment="libqt4-x11-4.4.3-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587143" comment="libqt4-x11-32bit-4.4.3-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587144" comment="libqt4-x11-x86-4.4.3-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587145" comment="libqt4-x86-4.4.3-12.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216731" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="481769" ref_url="https://bugzilla.suse.com/481769" source="BUGZILLA"/>
		<reference ref_id="504434" ref_url="https://bugzilla.suse.com/504434" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0186" ref_url="https://www.suse.com/security/cve/CVE-2009-0186/" source="CVE"/>
		<reference ref_id="CVE-2009-1788" ref_url="https://www.suse.com/security/cve/CVE-2009-1788/" source="CVE"/>
		<reference ref_id="CVE-2009-1791" ref_url="https://www.suse.com/security/cve/CVE-2009-1791/" source="CVE"/>
		<description>
This update of libsndfile fixes a heap-based buffer
overflow in voc_read_header() (CVE-2009-1788) and a
heap-based buffer overflow in aiff_read_header()
(CVE-2009-1791).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-05-29"/>
	<updated date="2009-05-29"/>
	<bugzilla href="https://bugzilla.suse.com/481769">SUSE bug 481769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/504434">SUSE bug 504434</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0186/">CVE-2009-0186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0186">CVE-2009-0186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1788/">CVE-2009-1788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1788">CVE-2009-1788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1791/">CVE-2009-1791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1791">CVE-2009-1791 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570278" comment="libsndfile-1.0.17-172.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570279" comment="libsndfile-32bit-1.0.17-172.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570280" comment="libsndfile-x86-1.0.17-172.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570278" comment="libsndfile-1.0.17-172.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570279" comment="libsndfile-32bit-1.0.17-172.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570280" comment="libsndfile-x86-1.0.17-172.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216732" version="1" class="patch">
	<metadata>
		<title>Security update for libtheora</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="581722" ref_url="https://bugzilla.suse.com/581722" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-3389" ref_url="https://www.suse.com/security/cve/CVE-2009-3389/" source="CVE"/>
		<description>
An integer overflow was fixed in libtheora. It could be exploited remotely to execute arbitrary code.
CVE-2009-3389: CVSS v2 Base Score: 9.3 (HIGH) (AV:N/AC:M/Au:N/C:C/I:C/A:C): Numeric Errors (CWE-189)
		</description>
<advisory from="security@suse.de">
	<issued date="2010-02-24"/>
	<updated date="2010-02-24"/>
	<bugzilla href="https://bugzilla.suse.com/581722">SUSE bug 581722</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3389/">CVE-2009-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3389">CVE-2009-3389 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570281" comment="libtheora0-1.0.beta2-6.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570282" comment="libtheora0-32bit-1.0.beta2-6.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570283" comment="libtheora0-x86-1.0.beta2-6.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570281" comment="libtheora0-1.0.beta2-6.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570282" comment="libtheora0-32bit-1.0.beta2-6.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570283" comment="libtheora0-x86-1.0.beta2-6.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216733" version="1" class="patch">
	<metadata>
		<title>Security update for libtiff</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="519796" ref_url="https://bugzilla.suse.com/519796" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2347" ref_url="https://www.suse.com/security/cve/CVE-2009-2347/" source="CVE"/>
		<description>
This update of the tiff package fixes various integer
overflows in the tools. (CVE-2009-2347)
		</description>
<advisory from="security@suse.de">
	<issued date="2009-08-07"/>
	<updated date="2009-08-07"/>
	<bugzilla href="https://bugzilla.suse.com/519796">SUSE bug 519796</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2347/">CVE-2009-2347 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2347">CVE-2009-2347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570284" comment="libtiff3-3.8.2-141.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570285" comment="libtiff3-32bit-3.8.2-141.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570286" comment="libtiff3-x86-3.8.2-141.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570287" comment="tiff-3.8.2-141.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570284" comment="libtiff3-3.8.2-141.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570285" comment="libtiff3-32bit-3.8.2-141.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570286" comment="libtiff3-x86-3.8.2-141.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570287" comment="tiff-3.8.2-141.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216734" version="1" class="patch">
	<metadata>
		<title>Security update for libtiff3</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="518698" ref_url="https://bugzilla.suse.com/518698" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2285" ref_url="https://www.suse.com/security/cve/CVE-2009-2285/" source="CVE"/>
		<description>
This update of libtiff fixes a buffer underflow in
LZWDecodeCompat (CVE-2009-2285).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-07-03"/>
	<updated date="2009-07-03"/>
	<bugzilla href="https://bugzilla.suse.com/518698">SUSE bug 518698</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2285/">CVE-2009-2285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2285">CVE-2009-2285 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570288" comment="libtiff3-3.8.2-141.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570289" comment="libtiff3-32bit-3.8.2-141.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570290" comment="libtiff3-x86-3.8.2-141.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570288" comment="libtiff3-3.8.2-141.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570289" comment="libtiff3-32bit-3.8.2-141.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570290" comment="libtiff3-x86-3.8.2-141.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216735" version="1" class="patch">
	<metadata>
		<title>Security update for udev</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="493158" ref_url="https://bugzilla.suse.com/493158" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1185" ref_url="https://www.suse.com/security/cve/CVE-2009-1185/" source="CVE"/>
		<description>
This update fixes a local privilege escalation in udev.

CVE-2009-1185: udev did not check the origin of the netlink
messages. A local attacker could fake device create events
and so gain root privileges.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-14"/>
	<updated date="2009-04-14"/>
	<bugzilla href="https://bugzilla.suse.com/493158">SUSE bug 493158</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1185/">CVE-2009-1185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1185">CVE-2009-1185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570291" comment="libvolume_id1-128-13.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570292" comment="udev-128-13.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570291" comment="libvolume_id1-128-13.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570292" comment="udev-128-13.2.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216736" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="618155" ref_url="https://bugzilla.suse.com/618155" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2242" ref_url="https://www.suse.com/security/cve/CVE-2010-2242/" source="CVE"/>
		<description>

Improperly mapped source privileged ports in guests may allow obtaining 
privileged resources on the host (CVE-2010-2242).

Security Issues:

    * CVE-2010-2242
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2242&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-07-23"/>
	<updated date="2010-07-23"/>
	<bugzilla href="https://bugzilla.suse.com/618155">SUSE bug 618155</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2242/">CVE-2010-2242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2242">CVE-2010-2242 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570293" comment="libvirt-0.4.6-14.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570294" comment="libvirt-doc-0.4.6-14.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570295" comment="libvirt-python-0.4.6-14.63.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570293" comment="libvirt-0.4.6-14.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570294" comment="libvirt-doc-0.4.6-14.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570295" comment="libvirt-python-0.4.6-14.63.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216737" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="608192" ref_url="https://bugzilla.suse.com/608192" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2663" ref_url="https://www.suse.com/security/cve/CVE-2009-2663/" source="CVE"/>
		<description>

This update of libvorbis fixes a memory corruption while parsing OGG files. 
The bug is exploitable by remote attackers to cause an application crash 
and could probably be exploited to execute arbitrary code. The issue has 
been tracked as CVE-2009-2663
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2663&gt; .

		</description>
<advisory from="security@suse.de">
	<issued date="2010-05-28"/>
	<updated date="2010-05-28"/>
	<bugzilla href="https://bugzilla.suse.com/608192">SUSE bug 608192</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2663/">CVE-2009-2663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2663">CVE-2009-2663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570296" comment="libvorbis-1.2.0-79.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570297" comment="libvorbis-32bit-1.2.0-79.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570298" comment="libvorbis-doc-1.2.0-79.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570299" comment="libvorbis-x86-1.2.0-79.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570296" comment="libvorbis-1.2.0-79.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570297" comment="libvorbis-32bit-1.2.0-79.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570298" comment="libvorbis-doc-1.2.0-79.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570299" comment="libvorbis-x86-1.2.0-79.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216738" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="528007" ref_url="https://bugzilla.suse.com/528007" source="BUGZILLA"/>
		<reference ref_id="648277" ref_url="https://bugzilla.suse.com/648277" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2416" ref_url="https://www.suse.com/security/cve/CVE-2009-2416/" source="CVE"/>
		<reference ref_id="CVE-2010-4008" ref_url="https://www.suse.com/security/cve/CVE-2010-4008/" source="CVE"/>
		<description>

libxml2: Invalid memory access in the xpath handling has been fixed. 
CVE-2010-4008 has been assigned to this issue.

Security Issue reference:

    * CVE-2010-4008
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4008&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-11-03"/>
	<updated date="2010-11-03"/>
	<bugzilla href="https://bugzilla.suse.com/528007">SUSE bug 528007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648277">SUSE bug 648277</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2416/">CVE-2009-2416 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-2416">CVE-2009-2416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4008/">CVE-2010-4008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4008">CVE-2010-4008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570300" comment="libxml2-2.7.1-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570301" comment="libxml2-32bit-2.7.1-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570302" comment="libxml2-doc-2.7.1-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570303" comment="libxml2-x86-2.7.1-10.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570300" comment="libxml2-2.7.1-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570301" comment="libxml2-32bit-2.7.1-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570302" comment="libxml2-doc-2.7.1-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570303" comment="libxml2-x86-2.7.1-10.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216739" version="1" class="patch">
	<metadata>
		<title>Security update for lvm2, lvm2-clvm, lvm2-clvm-debuginfo, lvm2-clvm-debugsource, lvm2-debuginfo, lvm2-debugsource</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="510058" ref_url="https://bugzilla.suse.com/510058" source="BUGZILLA"/>
		<reference ref_id="523944" ref_url="https://bugzilla.suse.com/523944" source="BUGZILLA"/>
		<reference ref_id="599158" ref_url="https://bugzilla.suse.com/599158" source="BUGZILLA"/>
		<reference ref_id="613065" ref_url="https://bugzilla.suse.com/613065" source="BUGZILLA"/>
		<reference ref_id="617853" ref_url="https://bugzilla.suse.com/617853" source="BUGZILLA"/>
		<reference ref_id="622537" ref_url="https://bugzilla.suse.com/622537" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2526" ref_url="https://www.suse.com/security/cve/CVE-2010-2526/" source="CVE"/>
		<description>

clvmd, when running, allowed unprivileged local users to issue arbitrary 
lvm commands (CVE-2010-2526) via incorrect permissions.

Security Issues:

    * CVE-2010-2526
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2526&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-07-30"/>
	<updated date="2010-07-30"/>
	<bugzilla href="https://bugzilla.suse.com/510058">SUSE bug 510058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/523944">SUSE bug 523944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/599158">SUSE bug 599158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/613065">SUSE bug 613065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/617853">SUSE bug 617853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/622537">SUSE bug 622537</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2526/">CVE-2010-2526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2526">CVE-2010-2526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570304" comment="lvm2-2.02.39-18.26.3 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570304" comment="lvm2-2.02.39-18.26.3 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216740" version="1" class="patch">
	<metadata>
		<title>Security update for mipv6d</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="424311" ref_url="https://bugzilla.suse.com/424311" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2522" ref_url="https://www.suse.com/security/cve/CVE-2010-2522/" source="CVE"/>
		<reference ref_id="CVE-2010-2523" ref_url="https://www.suse.com/security/cve/CVE-2010-2523/" source="CVE"/>
		<description>

The following issues have been fixed:

    * the mipv6 daemon did not check the origin of netlink messages,
      therefore allowing local users to spoof messages (CVE-2010-2522).
    * remote attackers could cause buffer overflows in mipv6d
      (CVE-2010-2523).

Security Issues reference:

    * CVE-2010-2522
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2522&gt;
    * CVE-2010-2523
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2523&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-09-01"/>
	<updated date="2010-09-01"/>
	<bugzilla href="https://bugzilla.suse.com/424311">SUSE bug 424311</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2522/">CVE-2010-2522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2522">CVE-2010-2522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2523/">CVE-2010-2523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2523">CVE-2010-2523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570305" comment="mipv6d-2.0.2-2.15.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570305" comment="mipv6d-2.0.2-2.15.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216741" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="546371" ref_url="https://bugzilla.suse.com/546371" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1563" ref_url="https://www.suse.com/security/cve/CVE-2009-1563/" source="CVE"/>
		<description>
This update fixes a bug in the Mozilla NSPR helper
libraries, which could be used by remote attackers to
potentially execute code via javascript vectors.

MFSA 2009-59 / CVE-2009-1563: Security researcher Alin Rad
Pop of Secunia Research reported a heap-based buffer
overflow in Mozilla's string to floating point number
conversion routines. Using this vulnerability an attacker
could craft some malicious JavaScript code containing a
very long string to be converted to a floating point number
which would result in improper memory allocation and the
execution of an arbitrary memory location. This
vulnerability could thus be leveraged by the attacker to
run arbitrary code on a victim's computer.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-11-03"/>
	<updated date="2009-11-03"/>
	<bugzilla href="https://bugzilla.suse.com/546371">SUSE bug 546371</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1563/">CVE-2009-1563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1563">CVE-2009-1563 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570306" comment="mozilla-nspr-4.8.2-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570307" comment="mozilla-nspr-32bit-4.8.2-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570308" comment="mozilla-nspr-x86-4.8.2-1.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570306" comment="mozilla-nspr-4.8.2-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570307" comment="mozilla-nspr-32bit-4.8.2-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570308" comment="mozilla-nspr-x86-4.8.2-1.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216742" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="495473" ref_url="https://bugzilla.suse.com/495473" source="BUGZILLA"/>
		<reference ref_id="534458" ref_url="https://bugzilla.suse.com/534458" source="BUGZILLA"/>
		<reference ref_id="545277" ref_url="https://bugzilla.suse.com/545277" source="BUGZILLA"/>
		<reference ref_id="559807" ref_url="https://bugzilla.suse.com/559807" source="BUGZILLA"/>
		<reference ref_id="568011" ref_url="https://bugzilla.suse.com/568011" source="BUGZILLA"/>
		<reference ref_id="576969" ref_url="https://bugzilla.suse.com/576969" source="BUGZILLA"/>
		<reference ref_id="586567" ref_url="https://bugzilla.suse.com/586567" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0652" ref_url="https://www.suse.com/security/cve/CVE-2009-0652/" source="CVE"/>
		<reference ref_id="CVE-2009-1302" ref_url="https://www.suse.com/security/cve/CVE-2009-1302/" source="CVE"/>
		<reference ref_id="CVE-2009-1303" ref_url="https://www.suse.com/security/cve/CVE-2009-1303/" source="CVE"/>
		<reference ref_id="CVE-2009-1304" ref_url="https://www.suse.com/security/cve/CVE-2009-1304/" source="CVE"/>
		<reference ref_id="CVE-2009-1305" ref_url="https://www.suse.com/security/cve/CVE-2009-1305/" source="CVE"/>
		<reference ref_id="CVE-2009-1307" ref_url="https://www.suse.com/security/cve/CVE-2009-1307/" source="CVE"/>
		<reference ref_id="CVE-2009-1308" ref_url="https://www.suse.com/security/cve/CVE-2009-1308/" source="CVE"/>
		<reference ref_id="CVE-2009-1309" ref_url="https://www.suse.com/security/cve/CVE-2009-1309/" source="CVE"/>
		<reference ref_id="CVE-2009-1311" ref_url="https://www.suse.com/security/cve/CVE-2009-1311/" source="CVE"/>
		<reference ref_id="CVE-2009-1312" ref_url="https://www.suse.com/security/cve/CVE-2009-1312/" source="CVE"/>
		<reference ref_id="CVE-2009-1563" ref_url="https://www.suse.com/security/cve/CVE-2009-1563/" source="CVE"/>
		<reference ref_id="CVE-2009-1571" ref_url="https://www.suse.com/security/cve/CVE-2009-1571/" source="CVE"/>
		<reference ref_id="CVE-2009-3069" ref_url="https://www.suse.com/security/cve/CVE-2009-3069/" source="CVE"/>
		<reference ref_id="CVE-2009-3070" ref_url="https://www.suse.com/security/cve/CVE-2009-3070/" source="CVE"/>
		<reference ref_id="CVE-2009-3071" ref_url="https://www.suse.com/security/cve/CVE-2009-3071/" source="CVE"/>
		<reference ref_id="CVE-2009-3072" ref_url="https://www.suse.com/security/cve/CVE-2009-3072/" source="CVE"/>
		<reference ref_id="CVE-2009-3073" ref_url="https://www.suse.com/security/cve/CVE-2009-3073/" source="CVE"/>
		<reference ref_id="CVE-2009-3075" ref_url="https://www.suse.com/security/cve/CVE-2009-3075/" source="CVE"/>
		<reference ref_id="CVE-2009-3076" ref_url="https://www.suse.com/security/cve/CVE-2009-3076/" source="CVE"/>
		<reference ref_id="CVE-2009-3077" ref_url="https://www.suse.com/security/cve/CVE-2009-3077/" source="CVE"/>
		<reference ref_id="CVE-2009-3078" ref_url="https://www.suse.com/security/cve/CVE-2009-3078/" source="CVE"/>
		<reference ref_id="CVE-2009-3079" ref_url="https://www.suse.com/security/cve/CVE-2009-3079/" source="CVE"/>
		<reference ref_id="CVE-2009-3274" ref_url="https://www.suse.com/security/cve/CVE-2009-3274/" source="CVE"/>
		<reference ref_id="CVE-2009-3370" ref_url="https://www.suse.com/security/cve/CVE-2009-3370/" source="CVE"/>
		<reference ref_id="CVE-2009-3371" ref_url="https://www.suse.com/security/cve/CVE-2009-3371/" source="CVE"/>
		<reference ref_id="CVE-2009-3372" ref_url="https://www.suse.com/security/cve/CVE-2009-3372/" source="CVE"/>
		<reference ref_id="CVE-2009-3373" ref_url="https://www.suse.com/security/cve/CVE-2009-3373/" source="CVE"/>
		<reference ref_id="CVE-2009-3374" ref_url="https://www.suse.com/security/cve/CVE-2009-3374/" source="CVE"/>
		<reference ref_id="CVE-2009-3375" ref_url="https://www.suse.com/security/cve/CVE-2009-3375/" source="CVE"/>
		<reference ref_id="CVE-2009-3376" ref_url="https://www.suse.com/security/cve/CVE-2009-3376/" source="CVE"/>
		<reference ref_id="CVE-2009-3380" ref_url="https://www.suse.com/security/cve/CVE-2009-3380/" source="CVE"/>
		<reference ref_id="CVE-2009-3381" ref_url="https://www.suse.com/security/cve/CVE-2009-3381/" source="CVE"/>
		<reference ref_id="CVE-2009-3382" ref_url="https://www.suse.com/security/cve/CVE-2009-3382/" source="CVE"/>
		<reference ref_id="CVE-2009-3383" ref_url="https://www.suse.com/security/cve/CVE-2009-3383/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-3979" ref_url="https://www.suse.com/security/cve/CVE-2009-3979/" source="CVE"/>
		<reference ref_id="CVE-2009-3981" ref_url="https://www.suse.com/security/cve/CVE-2009-3981/" source="CVE"/>
		<reference ref_id="CVE-2009-3983" ref_url="https://www.suse.com/security/cve/CVE-2009-3983/" source="CVE"/>
		<reference ref_id="CVE-2009-3984" ref_url="https://www.suse.com/security/cve/CVE-2009-3984/" source="CVE"/>
		<reference ref_id="CVE-2009-3985" ref_url="https://www.suse.com/security/cve/CVE-2009-3985/" source="CVE"/>
		<reference ref_id="CVE-2009-3986" ref_url="https://www.suse.com/security/cve/CVE-2009-3986/" source="CVE"/>
		<reference ref_id="CVE-2009-3988" ref_url="https://www.suse.com/security/cve/CVE-2009-3988/" source="CVE"/>
		<reference ref_id="CVE-2010-0159" ref_url="https://www.suse.com/security/cve/CVE-2010-0159/" source="CVE"/>
		<reference ref_id="CVE-2010-0160" ref_url="https://www.suse.com/security/cve/CVE-2010-0160/" source="CVE"/>
		<reference ref_id="CVE-2010-0162" ref_url="https://www.suse.com/security/cve/CVE-2010-0162/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0175" ref_url="https://www.suse.com/security/cve/CVE-2010-0175/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0179" ref_url="https://www.suse.com/security/cve/CVE-2010-0179/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<reference ref_id="CVE-2010-0220" ref_url="https://www.suse.com/security/cve/CVE-2010-0220/" source="CVE"/>
		<description>
Firefox version upgrade to 3.0.9 to fix various security
bugs.
(CVE-2009-1302,CVE-2009-1303,CVE-2009-1304,CVE-2009-1305,CVE
-2009-1306,CVE-2009-1307,CVE-2009-1308,CVE-2009-1309,CVE-200
9-1310,CVE-2009-1311,CVE-2009-1312,CVE-2009-0652)
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-27"/>
	<updated date="2009-04-27"/>
	<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/559807">SUSE bug 559807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/568011">SUSE bug 568011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/576969">SUSE bug 576969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/586567">SUSE bug 586567</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0652/">CVE-2009-0652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0652">CVE-2009-0652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1302/">CVE-2009-1302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1302">CVE-2009-1302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1303/">CVE-2009-1303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1303">CVE-2009-1303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1304/">CVE-2009-1304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1304">CVE-2009-1304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1305/">CVE-2009-1305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1305">CVE-2009-1305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1307/">CVE-2009-1307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1307">CVE-2009-1307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1308/">CVE-2009-1308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1308">CVE-2009-1308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1309/">CVE-2009-1309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1309">CVE-2009-1309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1311/">CVE-2009-1311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1311">CVE-2009-1311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1312/">CVE-2009-1312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1312">CVE-2009-1312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1563/">CVE-2009-1563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1563">CVE-2009-1563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1571/">CVE-2009-1571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1571">CVE-2009-1571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3069/">CVE-2009-3069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3069">CVE-2009-3069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3070/">CVE-2009-3070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3070">CVE-2009-3070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3071/">CVE-2009-3071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3071">CVE-2009-3071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3072/">CVE-2009-3072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3072">CVE-2009-3072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3073/">CVE-2009-3073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3073">CVE-2009-3073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3075/">CVE-2009-3075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3075">CVE-2009-3075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3076/">CVE-2009-3076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3076">CVE-2009-3076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3077/">CVE-2009-3077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3077">CVE-2009-3077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3078/">CVE-2009-3078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3078">CVE-2009-3078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3079/">CVE-2009-3079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3079">CVE-2009-3079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3274/">CVE-2009-3274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3274">CVE-2009-3274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3370/">CVE-2009-3370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3370">CVE-2009-3370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3371/">CVE-2009-3371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3371">CVE-2009-3371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3372/">CVE-2009-3372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3372">CVE-2009-3372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3373/">CVE-2009-3373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3373">CVE-2009-3373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3374/">CVE-2009-3374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3374">CVE-2009-3374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3375/">CVE-2009-3375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3375">CVE-2009-3375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3376/">CVE-2009-3376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3376">CVE-2009-3376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3380/">CVE-2009-3380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3380">CVE-2009-3380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3381/">CVE-2009-3381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3381">CVE-2009-3381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3382/">CVE-2009-3382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3382">CVE-2009-3382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3383/">CVE-2009-3383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3383">CVE-2009-3383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3979/">CVE-2009-3979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3979">CVE-2009-3979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3981/">CVE-2009-3981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3981">CVE-2009-3981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3983/">CVE-2009-3983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3983">CVE-2009-3983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3984/">CVE-2009-3984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3984">CVE-2009-3984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3985/">CVE-2009-3985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3985">CVE-2009-3985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3986/">CVE-2009-3986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3986">CVE-2009-3986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3988/">CVE-2009-3988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3988">CVE-2009-3988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0159/">CVE-2010-0159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0159">CVE-2010-0159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0160/">CVE-2010-0160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0160">CVE-2010-0160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0162/">CVE-2010-0162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0162">CVE-2010-0162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0173">CVE-2010-0173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0174">CVE-2010-0174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0175/">CVE-2010-0175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0175">CVE-2010-0175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0176">CVE-2010-0176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0177">CVE-2010-0177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0178">CVE-2010-0178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0179/">CVE-2010-0179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0179">CVE-2010-0179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0181">CVE-2010-0181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0182">CVE-2010-0182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0220/">CVE-2010-0220 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0220">CVE-2010-0220 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570309" comment="mozilla-xulrunner190-1.9.0.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570310" comment="mozilla-xulrunner190-32bit-1.9.0.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570311" comment="mozilla-xulrunner190-gnomevfs-1.9.0.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570312" comment="mozilla-xulrunner190-translations-1.9.0.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570313" comment="mozilla-xulrunner190-x86-1.9.0.9-0.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570309" comment="mozilla-xulrunner190-1.9.0.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570310" comment="mozilla-xulrunner190-32bit-1.9.0.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570311" comment="mozilla-xulrunner190-gnomevfs-1.9.0.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570312" comment="mozilla-xulrunner190-translations-1.9.0.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570313" comment="mozilla-xulrunner190-x86-1.9.0.9-0.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216743" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla XULrunner</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="589037" ref_url="https://bugzilla.suse.com/589037" source="BUGZILLA"/>
		<reference ref_id="645315" ref_url="https://bugzilla.suse.com/645315" source="BUGZILLA"/>
		<reference ref_id="653606" ref_url="https://bugzilla.suse.com/653606" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<description>

This update brings the Mozilla XULRunner engine to version 1.9.1.15, fixing 
various bugs and security issues.

The following security issues were fixed:

    * 

      MFSA 2010-64: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code. References

      Paul Nickerson, Jesse Ruderman, Olli Pettay, Igor Bukanov and Josh
      Soref reported memory safety problems that affected Firefox 3.6 and
      Firefox 3.5.

          o Memory safety bugs - Firefox 3.6, Firefox 3.5
          o CVE-2010-3176

      Gary Kwong, Martijn Wargers and Siddharth Agarwal reported memory
      safety problems that affected Firefox 3.6 only.

          o Memory safety bugs - Firefox 3.6
          o CVE-2010-3175
    * 

      MFSA 2010-65 / CVE-2010-3179: Security researcher Alexander Miller
      reported that passing an excessively long string to document.write
      could cause text rendering routines to end up in an inconsistent
      state with sections of stack memory being overwritten with the string
      data. An attacker could use this flaw to crash a victim's browser and
      potentially run arbitrary code on their computer.

    * 

      MFSA 2010-66 / CVE-2010-3180: Security researcher Sergey Glazunov
      reported that it was possible to access the locationbar property of a
      window object after it had been closed. Since the closed window's
      memory could have been subsequently reused by the system it was
      possible that an attempt to access the locationbar property could
      result in the execution of attacker-controlled memory.

    * 

      MFSA 2010-67 / CVE-2010-3183: Security researcher regenrecht reported
      via TippingPoint's Zero Day Initiative that when
      window.__lookupGetter__ is called with no arguments the code assumes
      the top JavaScript stack value is a property name. Since there were
      no arguments passed into the function, the top value could represent
      uninitialized memory or a pointer to a previously freed JavaScript
      object. Under such circumstances the value is passed to another
      subroutine which calls through the dangling pointer, potentially
      executing attacker-controlled memory.

    * 

      MFSA 2010-68 / CVE-2010-3177: Google security researcher Robert
      Swiecki reported that functions used by the Gopher parser to convert
      text to HTML tags could be exploited to turn text into executable
      JavaScript. If an attacker could create a file or directory on a
      Gopher server with the encoded script as part of its name the script
      would then run in a victim's browser within the context of the site.

    * 

      MFSA 2010-69 / CVE-2010-3178: Security researcher Eduardo Vela Nava
      reported that if a web page opened a new window and used a
      javascript: URL to make a modal call, such as alert(), then
      subsequently navigated the page to a different domain, once the modal
      call returned the opener of the window could get access to objects in
      the navigated window. This is a violation of the same-origin policy
      and could be used by an attacker to steal information from another
      web site.

    * 

      MFSA 2010-70 / CVE-2010-3170: Security researcher Richard Moore
      reported that when an SSL certificate was created with a common name
      containing a wildcard followed by a partial IP address a valid SSL
      connection could be established with a server whose IP address
      matched the wildcard range by browsing directly to the IP address. It
      is extremely unlikely that such a certificate would be issued by a
      Certificate Authority.

    * 

      MFSA 2010-71 / CVE-2010-3182: Dmitri Gribenko reported that the
      script used to launch Mozilla applications on Linux was effectively
      including the current working directory in the LD_LIBRARY_PATH
      environment variable. If an attacker was able to place into the
      current working directory a malicious shared library with the same
      name as a library that the bootstrapping script depends on the
      attacker could have their library loaded instead of the legitimate
      library.

    * 

      MFSA 2010-73 / CVE-2010-3765: Morten Kr??kvik of Telenor SOC reported
      an exploit targeting particular versions of Firefox 3.6 on Windows XP
      that Telenor found while investigating an intrusion attempt on a
      customer network. The underlying vulnerability, however, was present
      on both the Firefox 3.5 and Firefox 3.6 development branches and
      affected all supported platforms.

		</description>
<advisory from="security@suse.de">
	<issued date="2010-11-18"/>
	<updated date="2010-11-18"/>
	<bugzilla href="https://bugzilla.suse.com/589037">SUSE bug 589037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/653606">SUSE bug 653606</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3170">CVE-2010-3170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3174">CVE-2010-3174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3175">CVE-2010-3175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3176">CVE-2010-3176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3177">CVE-2010-3177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3178">CVE-2010-3178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3179">CVE-2010-3179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3180">CVE-2010-3180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3182">CVE-2010-3182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3183">CVE-2010-3183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3765">CVE-2010-3765 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570314" comment="mozilla-xulrunner191-1.9.1.15-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570315" comment="mozilla-xulrunner191-32bit-1.9.1.15-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570316" comment="mozilla-xulrunner191-gnomevfs-1.9.1.15-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570317" comment="mozilla-xulrunner191-translations-1.9.1.15-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570318" comment="mozilla-xulrunner191-x86-1.9.1.15-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570314" comment="mozilla-xulrunner191-1.9.1.15-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570315" comment="mozilla-xulrunner191-32bit-1.9.1.15-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570316" comment="mozilla-xulrunner191-gnomevfs-1.9.1.15-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570317" comment="mozilla-xulrunner191-translations-1.9.1.15-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570318" comment="mozilla-xulrunner191-x86-1.9.1.15-0.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216744" version="1" class="patch">
	<metadata>
		<title>Security update for mutt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="537141" ref_url="https://bugzilla.suse.com/537141" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2408" ref_url="https://www.suse.com/security/cve/CVE-2009-2408/" source="CVE"/>
		<description>
This update improves the handling of SSL certificates and
fixes a minor usability bug introduced with the last
security update.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-11-25"/>
	<updated date="2009-11-25"/>
	<bugzilla href="https://bugzilla.suse.com/537141">SUSE bug 537141</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2408/">CVE-2009-2408 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2009-2408">CVE-2009-2408 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570319" comment="mutt-1.5.17-42.33.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570319" comment="mutt-1.5.17-42.33.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216745" version="1" class="patch">
	<metadata>
		<title>Security update for nagios</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="517311" ref_url="https://bugzilla.suse.com/517311" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2288" ref_url="https://www.suse.com/security/cve/CVE-2009-2288/" source="CVE"/>
		<description>
A shell injection bug in nagios'  statuswml.cgi CGI script
has been fixed. CVE-2009-2288 has been assigned to this
issue.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-07-15"/>
	<updated date="2009-07-15"/>
	<bugzilla href="https://bugzilla.suse.com/517311">SUSE bug 517311</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2288/">CVE-2009-2288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2288">CVE-2009-2288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570320" comment="nagios-3.0.6-1.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570321" comment="nagios-www-3.0.6-1.21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570320" comment="nagios-3.0.6-1.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570321" comment="nagios-www-3.0.6-1.21.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216746" version="1" class="patch">
	<metadata>
		<title>Security update for ntp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="479341" ref_url="https://bugzilla.suse.com/479341" source="BUGZILLA"/>
		<reference ref_id="482349" ref_url="https://bugzilla.suse.com/482349" source="BUGZILLA"/>
		<reference ref_id="483897" ref_url="https://bugzilla.suse.com/483897" source="BUGZILLA"/>
		<reference ref_id="484653" ref_url="https://bugzilla.suse.com/484653" source="BUGZILLA"/>
		<reference ref_id="500065" ref_url="https://bugzilla.suse.com/500065" source="BUGZILLA"/>
		<reference ref_id="501632" ref_url="https://bugzilla.suse.com/501632" source="BUGZILLA"/>
		<reference ref_id="515629" ref_url="https://bugzilla.suse.com/515629" source="BUGZILLA"/>
		<reference ref_id="517222" ref_url="https://bugzilla.suse.com/517222" source="BUGZILLA"/>
		<reference ref_id="550316" ref_url="https://bugzilla.suse.com/550316" source="BUGZILLA"/>
		<reference ref_id="574885" ref_url="https://bugzilla.suse.com/574885" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0159" ref_url="https://www.suse.com/security/cve/CVE-2009-0159/" source="CVE"/>
		<reference ref_id="CVE-2009-1252" ref_url="https://www.suse.com/security/cve/CVE-2009-1252/" source="CVE"/>
		<reference ref_id="CVE-2009-3563" ref_url="https://www.suse.com/security/cve/CVE-2009-3563/" source="CVE"/>
		<description>
This update fixes a remote buffer overflow in xntp/ntp
which can be exploited when autokey is enabled to execute
arbitrary code. (CVE-2009-1252) This upfate fixes a buffer
overflow in ntpd that can be triggered by a malicious
server. (CVE-2009-0159)
		</description>
<advisory from="security@suse.de">
	<issued date="2009-05-08"/>
	<updated date="2009-05-08"/>
	<bugzilla href="https://bugzilla.suse.com/479341">SUSE bug 479341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/482349">SUSE bug 482349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/483897">SUSE bug 483897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/484653">SUSE bug 484653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/500065">SUSE bug 500065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/501632">SUSE bug 501632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/515629">SUSE bug 515629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/517222">SUSE bug 517222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550316">SUSE bug 550316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/574885">SUSE bug 574885</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0159/">CVE-2009-0159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0159">CVE-2009-0159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1252/">CVE-2009-1252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1252">CVE-2009-1252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3563/">CVE-2009-3563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3563">CVE-2009-3563 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570322" comment="ntp-4.2.4p6-1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570323" comment="ntp-doc-4.2.4p6-1.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570322" comment="ntp-4.2.4p6-1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570323" comment="ntp-doc-4.2.4p6-1.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216747" version="1" class="patch">
	<metadata>
		<title>Security update for open-iscsi</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="514273" ref_url="https://bugzilla.suse.com/514273" source="BUGZILLA"/>
		<reference ref_id="519402" ref_url="https://bugzilla.suse.com/519402" source="BUGZILLA"/>
		<reference ref_id="528711" ref_url="https://bugzilla.suse.com/528711" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1297" ref_url="https://www.suse.com/security/cve/CVE-2009-1297/" source="CVE"/>
		<description>
The iscsi_discovery tool created predictable temporary
files which potentially allowed attackers to overwrite
system files (CVE-2009-1297). 

Also some non-security bugs have been fixed:
- synchronize startup settings
- fix daemon segfault with CHAP
		</description>
<advisory from="security@suse.de">
	<issued date="2009-08-21"/>
	<updated date="2009-08-21"/>
	<bugzilla href="https://bugzilla.suse.com/514273">SUSE bug 514273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/519402">SUSE bug 519402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/528711">SUSE bug 528711</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1297/">CVE-2009-1297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1297">CVE-2009-1297 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570324" comment="open-iscsi-2.0.870-26.6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570324" comment="open-iscsi-2.0.870-26.6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216748" version="1" class="patch">
	<metadata>
		<title>Security update for openslp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="533432" ref_url="https://bugzilla.suse.com/533432" source="BUGZILLA"/>
		<reference ref_id="564504" ref_url="https://bugzilla.suse.com/564504" source="BUGZILLA"/>
		<reference ref_id="597215" ref_url="https://bugzilla.suse.com/597215" source="BUGZILLA"/>
		<reference ref_id="601002" ref_url="https://bugzilla.suse.com/601002" source="BUGZILLA"/>
		<reference ref_id="626444" ref_url="https://bugzilla.suse.com/626444" source="BUGZILLA"/>
		<reference ref_id="642571" ref_url="https://bugzilla.suse.com/642571" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-3609" ref_url="https://www.suse.com/security/cve/CVE-2010-3609/" source="CVE"/>
		<description>

The openslp daemon could run into an endless loop when receiving specially 
crafted packets (CVE-2010-3609).

Additionally the following non-security bugs were fixed:

    * 564504: Fix handling of DA answers if both active and passive DA
      detection is off
    * 597215: Add configuration options to openSLP: net.slp.DASyncReg makes
      slpd query statically configured DAs for registrations,
      net.slp.isDABackup enables periodic writing of remote registrations
      to a backup file which is also read on startup.
      Both options can be used to decrease the time between the start of
      the slpd daemon and slpd knowing all registrations.
    * 601002: reduce CPU usage spikes on machines with many connections by
      using the kernel netlink interface instead of reading the /proc
      filesystem.
    * 626444: Standard compliance was fixed by stripping leading and
      trailing white spaces when doing string comparisons of scopes.

Security Issue reference:

    * CVE-2010-3609
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3609&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-10-13"/>
	<updated date="2010-10-13"/>
	<bugzilla href="https://bugzilla.suse.com/533432">SUSE bug 533432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/564504">SUSE bug 564504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/597215">SUSE bug 597215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/601002">SUSE bug 601002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/626444">SUSE bug 626444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/642571">SUSE bug 642571</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3609/">CVE-2010-3609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3609">CVE-2010-3609 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570325" comment="openslp-1.2.0-172.10.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570326" comment="openslp-32bit-1.2.0-172.10.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570327" comment="openslp-server-1.2.0-172.10.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570328" comment="openslp-x86-1.2.0-172.10.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570325" comment="openslp-1.2.0-172.10.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570326" comment="openslp-32bit-1.2.0-172.10.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570327" comment="openslp-server-1.2.0-172.10.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570328" comment="openslp-x86-1.2.0-172.10.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216749" version="1" class="patch">
	<metadata>
		<title>Security update for OpenSSL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="509031" ref_url="https://bugzilla.suse.com/509031" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<description>
OpenSSL DTLS remote DoS in ChangeCipherSpec (CVE-2009-1386)
and in out-of-sequence message handling (CVE-2009-1387)
have been fixed.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-06-10"/>
	<updated date="2009-06-10"/>
	<bugzilla href="https://bugzilla.suse.com/509031">SUSE bug 509031</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1386">CVE-2009-1386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1387">CVE-2009-1387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570329" comment="libopenssl0_9_8-0.9.8h-30.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570330" comment="libopenssl0_9_8-32bit-0.9.8h-30.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570331" comment="libopenssl0_9_8-x86-0.9.8h-30.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570332" comment="openssl-0.9.8h-30.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570333" comment="openssl-doc-0.9.8h-30.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570329" comment="libopenssl0_9_8-0.9.8h-30.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570330" comment="libopenssl0_9_8-32bit-0.9.8h-30.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570331" comment="libopenssl0_9_8-x86-0.9.8h-30.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570332" comment="openssl-0.9.8h-30.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570333" comment="openssl-doc-0.9.8h-30.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216750" version="1" class="patch">
	<metadata>
		<title>Security update for OpenSSL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="566238" ref_url="https://bugzilla.suse.com/566238" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-4355" ref_url="https://www.suse.com/security/cve/CVE-2009-4355/" source="CVE"/>
		<description>
Incorrect use of an OpenSSL cleanup function can lead to memory
leaks in applications. For example an SSL enabled web server such as
Apache that uses PHP, curl and OpenSSL leaks memory if a SIGHUP
signal was sent to Apache. The OpenSSL cleanup function was made
more robust to avoid memory leaks (CVE-2009-4355).
		</description>
<advisory from="security@suse.de">
	<issued date="2010-01-15"/>
	<updated date="2010-01-15"/>
	<bugzilla href="https://bugzilla.suse.com/566238">SUSE bug 566238</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4355/">CVE-2009-4355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4355">CVE-2009-4355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570334" comment="libopenssl0_9_8-0.9.8h-30.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570335" comment="libopenssl0_9_8-32bit-0.9.8h-30.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570336" comment="libopenssl0_9_8-x86-0.9.8h-30.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570337" comment="openssl-0.9.8h-30.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570338" comment="openssl-doc-0.9.8h-30.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570334" comment="libopenssl0_9_8-0.9.8h-30.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570335" comment="libopenssl0_9_8-32bit-0.9.8h-30.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570336" comment="libopenssl0_9_8-x86-0.9.8h-30.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570337" comment="openssl-0.9.8h-30.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570338" comment="openssl-doc-0.9.8h-30.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216751" version="1" class="patch">
	<metadata>
		<title>Security update for openswan</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="487762" ref_url="https://bugzilla.suse.com/487762" source="BUGZILLA"/>
		<reference ref_id="515130" ref_url="https://bugzilla.suse.com/515130" source="BUGZILLA"/>
		<reference ref_id="525388" ref_url="https://bugzilla.suse.com/525388" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0790" ref_url="https://www.suse.com/security/cve/CVE-2009-0790/" source="CVE"/>
		<reference ref_id="CVE-2009-2185" ref_url="https://www.suse.com/security/cve/CVE-2009-2185/" source="CVE"/>
		<reference ref_id="CVE-2009-2661" ref_url="https://www.suse.com/security/cve/CVE-2009-2661/" source="CVE"/>
		<description>
By sending a specially crafted Dead Peer Detection (DPD)
packet remote attackers could crash the pluto IKE daemon
(CVE-2009-0790).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-03-24"/>
	<updated date="2009-03-24"/>
	<bugzilla href="https://bugzilla.suse.com/487762">SUSE bug 487762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/515130">SUSE bug 515130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/525388">SUSE bug 525388</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0790/">CVE-2009-0790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0790">CVE-2009-0790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2185/">CVE-2009-2185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2185">CVE-2009-2185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2661/">CVE-2009-2661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2661">CVE-2009-2661 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570339" comment="openswan-2.6.16-1.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570340" comment="openswan-doc-2.6.16-1.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570339" comment="openswan-2.6.16-1.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570340" comment="openswan-doc-2.6.16-1.32.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216752" version="1" class="patch">
	<metadata>
		<title>Security update for pango</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="492773" ref_url="https://bugzilla.suse.com/492773" source="BUGZILLA"/>
		<reference ref_id="534701" ref_url="https://bugzilla.suse.com/534701" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1194" ref_url="https://www.suse.com/security/cve/CVE-2009-1194/" source="CVE"/>
		<description>
This update of pango fixes a segfault in libpango that can
be triggered by visiting web-sites. (CVE-2009-1194)
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-28"/>
	<updated date="2009-04-28"/>
	<bugzilla href="https://bugzilla.suse.com/492773">SUSE bug 492773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/534701">SUSE bug 534701</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1194/">CVE-2009-1194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1194">CVE-2009-1194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570341" comment="pango-1.22.1-3.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570342" comment="pango-32bit-1.22.1-3.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570343" comment="pango-doc-1.22.1-3.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570344" comment="pango-x86-1.22.1-3.17.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570341" comment="pango-1.22.1-3.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570342" comment="pango-32bit-1.22.1-3.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570343" comment="pango-doc-1.22.1-3.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570344" comment="pango-x86-1.22.1-3.17.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216753" version="1" class="patch">
	<metadata>
		<title>Security update for pcsc-lite</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="609317" ref_url="https://bugzilla.suse.com/609317" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0407" ref_url="https://www.suse.com/security/cve/CVE-2010-0407/" source="CVE"/>
		<description>

This update of pcsc-lite fixes a local vulnerability (stack overflow) which 
allowed every user with write-access to '/var/run/pcscd/pcscd.comm' to gain 
root privileges. CVE-2010-0407 has been assigned to this issue.

		</description>
<advisory from="security@suse.de">
	<issued date="2010-07-05"/>
	<updated date="2010-07-05"/>
	<bugzilla href="https://bugzilla.suse.com/609317">SUSE bug 609317</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0407/">CVE-2010-0407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0407">CVE-2010-0407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570345" comment="pcsc-lite-1.4.102-1.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570346" comment="pcsc-lite-32bit-1.4.102-1.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570347" comment="pcsc-lite-x86-1.4.102-1.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570345" comment="pcsc-lite-1.4.102-1.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570346" comment="pcsc-lite-32bit-1.4.102-1.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570347" comment="pcsc-lite-x86-1.4.102-1.31.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216754" version="1" class="patch">
	<metadata>
		<title>Security update for Perl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="446098" ref_url="https://bugzilla.suse.com/446098" source="BUGZILLA"/>
		<reference ref_id="489114" ref_url="https://bugzilla.suse.com/489114" source="BUGZILLA"/>
		<reference ref_id="493978" ref_url="https://bugzilla.suse.com/493978" source="BUGZILLA"/>
		<reference ref_id="498425" ref_url="https://bugzilla.suse.com/498425" source="BUGZILLA"/>
		<reference ref_id="511241" ref_url="https://bugzilla.suse.com/511241" source="BUGZILLA"/>
		<reference ref_id="515948" ref_url="https://bugzilla.suse.com/515948" source="BUGZILLA"/>
		<reference ref_id="528423" ref_url="https://bugzilla.suse.com/528423" source="BUGZILLA"/>
		<reference ref_id="557636" ref_url="https://bugzilla.suse.com/557636" source="BUGZILLA"/>
		<reference ref_id="588338" ref_url="https://bugzilla.suse.com/588338" source="BUGZILLA"/>
		<reference ref_id="596167" ref_url="https://bugzilla.suse.com/596167" source="BUGZILLA"/>
		<reference ref_id="601242" ref_url="https://bugzilla.suse.com/601242" source="BUGZILLA"/>
		<reference ref_id="603840" ref_url="https://bugzilla.suse.com/603840" source="BUGZILLA"/>
		<reference ref_id="605918" ref_url="https://bugzilla.suse.com/605918" source="BUGZILLA"/>
		<reference ref_id="605928" ref_url="https://bugzilla.suse.com/605928" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1391" ref_url="https://www.suse.com/security/cve/CVE-2009-1391/" source="CVE"/>
		<reference ref_id="CVE-2010-1168" ref_url="https://www.suse.com/security/cve/CVE-2010-1168/" source="CVE"/>
		<reference ref_id="CVE-2010-1447" ref_url="https://www.suse.com/security/cve/CVE-2010-1447/" source="CVE"/>
		<description>
A Buffer overflow in perl, in the base Compress::Raw::Zlib
perl module has been fixed. (CVE-2009-1391)

Additionaly three non security bugs were fixed.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-06-10"/>
	<updated date="2009-06-10"/>
	<bugzilla href="https://bugzilla.suse.com/446098">SUSE bug 446098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/489114">SUSE bug 489114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/493978">SUSE bug 493978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/498425">SUSE bug 498425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/511241">SUSE bug 511241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/515948">SUSE bug 515948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/528423">SUSE bug 528423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557636">SUSE bug 557636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/588338">SUSE bug 588338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/596167">SUSE bug 596167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/601242">SUSE bug 601242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/603840">SUSE bug 603840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/605918">SUSE bug 605918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/605928">SUSE bug 605928</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1391/">CVE-2009-1391 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1391">CVE-2009-1391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1168/">CVE-2010-1168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1168">CVE-2010-1168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1447/">CVE-2010-1447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1447">CVE-2010-1447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570348" comment="perl-5.10.0-64.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570349" comment="perl-32bit-5.10.0-64.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570350" comment="perl-base-5.10.0-64.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570351" comment="perl-doc-5.10.0-64.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570352" comment="perl-x86-5.10.0-64.43.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570348" comment="perl-5.10.0-64.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570349" comment="perl-32bit-5.10.0-64.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570350" comment="perl-base-5.10.0-64.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570351" comment="perl-doc-5.10.0-64.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570352" comment="perl-x86-5.10.0-64.43.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216755" version="1" class="patch">
	<metadata>
		<title>Security update for perl-HTML-Parser</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="550076" ref_url="https://bugzilla.suse.com/550076" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-3627" ref_url="https://www.suse.com/security/cve/CVE-2009-3627/" source="CVE"/>
		<description>
Specially crafted HTML documents could cause
perl-HTML-Parser to run into an endless loop
(CVE-2009-3627).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-10-30"/>
	<updated date="2009-10-30"/>
	<bugzilla href="https://bugzilla.suse.com/550076">SUSE bug 550076</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3627/">CVE-2009-3627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3627">CVE-2009-3627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570353" comment="perl-HTML-Parser-3.56-1.18.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570353" comment="perl-HTML-Parser-3.56-1.18.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216756" version="1" class="patch">
	<metadata>
		<title>Security update for perl-IO-Socket-SSL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="535554" ref_url="https://bugzilla.suse.com/535554" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-3024" ref_url="https://www.suse.com/security/cve/CVE-2009-3024/" source="CVE"/>
		<description>
This update of perl-IO-Socket-SSL improves the hostname
checking of the SSL certificate. (CVE-2009-3024)
		</description>
<advisory from="security@suse.de">
	<issued date="2009-09-02"/>
	<updated date="2009-09-02"/>
	<bugzilla href="https://bugzilla.suse.com/535554">SUSE bug 535554</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3024/">CVE-2009-3024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3024">CVE-2009-3024 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570354" comment="perl-IO-Socket-SSL-1.16-3.2.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570354" comment="perl-IO-Socket-SSL-1.16-3.2.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216757" version="1" class="patch">
	<metadata>
		<title>Recommended update for RPM</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="490179" ref_url="https://bugzilla.suse.com/490179" source="BUGZILLA"/>
		<reference ref_id="536256" ref_url="https://bugzilla.suse.com/536256" source="BUGZILLA"/>
		<reference ref_id="552622" ref_url="https://bugzilla.suse.com/552622" source="BUGZILLA"/>
		<reference ref_id="572280" ref_url="https://bugzilla.suse.com/572280" source="BUGZILLA"/>
		<reference ref_id="592269" ref_url="https://bugzilla.suse.com/592269" source="BUGZILLA"/>
		<reference ref_id="610941" ref_url="https://bugzilla.suse.com/610941" source="BUGZILLA"/>
		<reference ref_id="615409" ref_url="https://bugzilla.suse.com/615409" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2059" ref_url="https://www.suse.com/security/cve/CVE-2010-2059/" source="CVE"/>
		<description>
This package provides the %sles_version macro set to '11'
to allow developers to differentiate on which SLES platform
they build their application on.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-28"/>
	<updated date="2009-04-28"/>
	<bugzilla href="https://bugzilla.suse.com/490179">SUSE bug 490179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/536256">SUSE bug 536256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/552622">SUSE bug 552622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/572280">SUSE bug 572280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/592269">SUSE bug 592269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/610941">SUSE bug 610941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/615409">SUSE bug 615409</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2059/">CVE-2010-2059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2059">CVE-2010-2059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991177" comment="popt-1.7-37.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991178" comment="popt-32bit-1.7-37.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991179" comment="popt-x86-1.7-37.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991180" comment="rpm-4.4.2.3-37.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991181" comment="rpm-32bit-4.4.2.3-37.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991182" comment="rpm-x86-4.4.2.3-37.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991177" comment="popt-1.7-37.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991178" comment="popt-32bit-1.7-37.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991179" comment="popt-x86-1.7-37.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991180" comment="rpm-4.4.2.3-37.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991181" comment="rpm-32bit-4.4.2.3-37.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991182" comment="rpm-x86-4.4.2.3-37.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216758" version="1" class="patch">
	<metadata>
		<title>Security update for PostgreSQL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="486347" ref_url="https://bugzilla.suse.com/486347" source="BUGZILLA"/>
		<reference ref_id="537706" ref_url="https://bugzilla.suse.com/537706" source="BUGZILLA"/>
		<reference ref_id="564360" ref_url="https://bugzilla.suse.com/564360" source="BUGZILLA"/>
		<reference ref_id="564710" ref_url="https://bugzilla.suse.com/564710" source="BUGZILLA"/>
		<reference ref_id="588996" ref_url="https://bugzilla.suse.com/588996" source="BUGZILLA"/>
		<reference ref_id="605845" ref_url="https://bugzilla.suse.com/605845" source="BUGZILLA"/>
		<reference ref_id="605926" ref_url="https://bugzilla.suse.com/605926" source="BUGZILLA"/>
		<reference ref_id="607778" ref_url="https://bugzilla.suse.com/607778" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0922" ref_url="https://www.suse.com/security/cve/CVE-2009-0922/" source="CVE"/>
		<reference ref_id="CVE-2009-3229" ref_url="https://www.suse.com/security/cve/CVE-2009-3229/" source="CVE"/>
		<reference ref_id="CVE-2009-3230" ref_url="https://www.suse.com/security/cve/CVE-2009-3230/" source="CVE"/>
		<reference ref_id="CVE-2009-3231" ref_url="https://www.suse.com/security/cve/CVE-2009-3231/" source="CVE"/>
		<reference ref_id="CVE-2009-4034" ref_url="https://www.suse.com/security/cve/CVE-2009-4034/" source="CVE"/>
		<reference ref_id="CVE-2009-4136" ref_url="https://www.suse.com/security/cve/CVE-2009-4136/" source="CVE"/>
		<reference ref_id="CVE-2010-0733" ref_url="https://www.suse.com/security/cve/CVE-2010-0733/" source="CVE"/>
		<reference ref_id="CVE-2010-1169" ref_url="https://www.suse.com/security/cve/CVE-2010-1169/" source="CVE"/>
		<reference ref_id="CVE-2010-1170" ref_url="https://www.suse.com/security/cve/CVE-2010-1170/" source="CVE"/>
		<reference ref_id="CVE-2010-1975" ref_url="https://www.suse.com/security/cve/CVE-2010-1975/" source="CVE"/>
		<description>
Remote authenticated users could crash the postgresql
server by requesting a conversion with an inappropriate
encoding (CVE-2009-0922).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-03-24"/>
	<updated date="2009-03-24"/>
	<bugzilla href="https://bugzilla.suse.com/486347">SUSE bug 486347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/537706">SUSE bug 537706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/564360">SUSE bug 564360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/564710">SUSE bug 564710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/588996">SUSE bug 588996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/605845">SUSE bug 605845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/605926">SUSE bug 605926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/607778">SUSE bug 607778</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0922/">CVE-2009-0922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0922">CVE-2009-0922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3229/">CVE-2009-3229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3229">CVE-2009-3229 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3230/">CVE-2009-3230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3230">CVE-2009-3230 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3231/">CVE-2009-3231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3231">CVE-2009-3231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4034/">CVE-2009-4034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4034">CVE-2009-4034 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4136/">CVE-2009-4136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4136">CVE-2009-4136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0733/">CVE-2010-0733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0733">CVE-2010-0733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1169/">CVE-2010-1169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1169">CVE-2010-1169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1170/">CVE-2010-1170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1170">CVE-2010-1170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1975/">CVE-2010-1975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1975">CVE-2010-1975 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570355" comment="postgresql-8.3.7-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570356" comment="postgresql-contrib-8.3.7-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570357" comment="postgresql-docs-8.3.7-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570358" comment="postgresql-libs-8.3.7-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570359" comment="postgresql-libs-32bit-8.3.7-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570360" comment="postgresql-libs-x86-8.3.7-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570361" comment="postgresql-server-8.3.7-0.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570355" comment="postgresql-8.3.7-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570356" comment="postgresql-contrib-8.3.7-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570357" comment="postgresql-docs-8.3.7-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570358" comment="postgresql-libs-8.3.7-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570359" comment="postgresql-libs-32bit-8.3.7-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570360" comment="postgresql-libs-x86-8.3.7-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570361" comment="postgresql-server-8.3.7-0.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216759" version="1" class="patch">
	<metadata>
		<title>Recommended update for puppet</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="585402" ref_url="https://bugzilla.suse.com/585402" source="BUGZILLA"/>
		<reference ref_id="620808" ref_url="https://bugzilla.suse.com/620808" source="BUGZILLA"/>
		<reference ref_id="623884" ref_url="https://bugzilla.suse.com/623884" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0156" ref_url="https://www.suse.com/security/cve/CVE-2010-0156/" source="CVE"/>
		<description>

This updates puppet to v0.24.8:

    * Deprecate the NetInfo nameservice provider. Use directoryservice
      instead
    * Add macauthorization type
    * Refactoring the thread-safety in Puppet::Util
    * Removing the included testing gems; you must now install them
      yourself
    * Refactoring of SELinux functions to use native Ruby SELinux interface
    * Replaced SELInux calls to binaries with Ruby SELinux bindings
    * Adding support to the user type for: profiles, auths, project,
      key/value pairs
    * Added a number of confines to package providers
    * lots of bugfixes

In addition, the puppet daemon user will now be created automatically upon 
package installation (bnc#623884).

		</description>
<advisory from="security@suse.de">
	<issued date="2010-08-18"/>
	<updated date="2010-08-18"/>
	<bugzilla href="https://bugzilla.suse.com/585402">SUSE bug 585402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/620808">SUSE bug 620808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/623884">SUSE bug 623884</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0156/">CVE-2010-0156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0156">CVE-2010-0156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991183" comment="puppet-0.24.8-1.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991184" comment="puppet-server-0.24.8-1.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587448" comment="pwdutils-3.2.2-2.19 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991183" comment="puppet-0.24.8-1.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991184" comment="puppet-server-0.24.8-1.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587448" comment="pwdutils-3.2.2-2.19 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216760" version="1" class="patch">
	<metadata>
		<title>Security update for pyxml</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="550666" ref_url="https://bugzilla.suse.com/550666" source="BUGZILLA"/>
		<reference ref_id="561561" ref_url="https://bugzilla.suse.com/561561" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<description>
Specially crafted XML documents could make pyxml run into
an enless loop, therefore locking up applications using
pyxml (CVE-2009-3720, CVE-2009-3560).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-12-11"/>
	<updated date="2009-12-11"/>
	<bugzilla href="https://bugzilla.suse.com/550666">SUSE bug 550666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/561561">SUSE bug 561561</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3560">CVE-2009-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3720">CVE-2009-3720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570362" comment="pyxml-0.8.4-194.19.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570362" comment="pyxml-0.8.4-194.19.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216761" version="1" class="patch">
	<metadata>
		<title>Security update for quagga</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="500540" ref_url="https://bugzilla.suse.com/500540" source="BUGZILLA"/>
		<reference ref_id="634300" ref_url="https://bugzilla.suse.com/634300" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1572" ref_url="https://www.suse.com/security/cve/CVE-2009-1572/" source="CVE"/>
		<reference ref_id="CVE-2010-2948" ref_url="https://www.suse.com/security/cve/CVE-2010-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-2949" ref_url="https://www.suse.com/security/cve/CVE-2010-2949/" source="CVE"/>
		<description>
This update fixes a remote denial of service bug in quagga
that can be triggered via an AS path containing ASN
elements whose string representation is longer than
expected. (CVE-2009-1572)
		</description>
<advisory from="security@suse.de">
	<issued date="2009-05-08"/>
	<updated date="2009-05-08"/>
	<bugzilla href="https://bugzilla.suse.com/500540">SUSE bug 500540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/634300">SUSE bug 634300</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1572/">CVE-2009-1572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1572">CVE-2009-1572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2948/">CVE-2010-2948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2948">CVE-2010-2948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2949/">CVE-2010-2949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2949">CVE-2010-2949 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570363" comment="quagga-0.99.10-17.17.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570363" comment="quagga-0.99.10-17.17.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216762" version="1" class="patch">
	<metadata>
		<title>Security update for sendmail</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="568017" ref_url="https://bugzilla.suse.com/568017" source="BUGZILLA"/>
		<description>
This update of sendmail improves the handling of special-characters in the SSL certificate.
(CVE-2009-4565: CVSS v2 Base Score: 7.5)
		</description>
<advisory from="security@suse.de">
	<issued date="2010-02-18"/>
	<updated date="2010-02-18"/>
	<bugzilla href="https://bugzilla.suse.com/568017">SUSE bug 568017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570364" comment="sendmail-8.14.3-50.20.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570364" comment="sendmail-8.14.3-50.20.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216763" version="1" class="patch">
	<metadata>
		<title>Security update for ruby</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="415678" ref_url="https://bugzilla.suse.com/415678" source="BUGZILLA"/>
		<reference ref_id="420084" ref_url="https://bugzilla.suse.com/420084" source="BUGZILLA"/>
		<reference ref_id="423234" ref_url="https://bugzilla.suse.com/423234" source="BUGZILLA"/>
		<reference ref_id="478019" ref_url="https://bugzilla.suse.com/478019" source="BUGZILLA"/>
		<reference ref_id="499253" ref_url="https://bugzilla.suse.com/499253" source="BUGZILLA"/>
		<reference ref_id="509914" ref_url="https://bugzilla.suse.com/509914" source="BUGZILLA"/>
		<reference ref_id="511568" ref_url="https://bugzilla.suse.com/511568" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-3443" ref_url="https://www.suse.com/security/cve/CVE-2008-3443/" source="CVE"/>
		<reference ref_id="CVE-2008-3655" ref_url="https://www.suse.com/security/cve/CVE-2008-3655/" source="CVE"/>
		<reference ref_id="CVE-2008-3656" ref_url="https://www.suse.com/security/cve/CVE-2008-3656/" source="CVE"/>
		<reference ref_id="CVE-2008-3657" ref_url="https://www.suse.com/security/cve/CVE-2008-3657/" source="CVE"/>
		<reference ref_id="CVE-2008-3790" ref_url="https://www.suse.com/security/cve/CVE-2008-3790/" source="CVE"/>
		<reference ref_id="CVE-2008-3905" ref_url="https://www.suse.com/security/cve/CVE-2008-3905/" source="CVE"/>
		<reference ref_id="CVE-2009-0642" ref_url="https://www.suse.com/security/cve/CVE-2009-0642/" source="CVE"/>
		<reference ref_id="CVE-2009-1904" ref_url="https://www.suse.com/security/cve/CVE-2009-1904/" source="CVE"/>
		<description>
This ruby update improves return value checks for openssl
function OCSP_basic_verify() (CVE-2009-0642) which allowed
an attacker to use revoked certificates.

The entropy of DNS identifiers was increased
(CVE-2008-3905) to avaid spoofing attacks.

The code for parsing XML data was vulnerable to a denial of
service bug (CVE-2008-3790).

An attack on algorithm complexity was possible in function
WEBrick::HTTP::DefaultFileHandler() while parsing HTTP
requests (CVE-2008-3656) as well as by using the regex
engine (CVE-2008-3443) causing high CPU load.

Ruby's access restriction code (CVE-2008-3655) as well as
safe-level handling using function DL.dlopen()
(CVE-2008-3657) and big decimal handling (CVE-2009-1904)
was improved.

Bypassing HTTP basic authentication
(authenticate_with_http_digest) is not possible anymore.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-07-03"/>
	<updated date="2009-07-03"/>
	<bugzilla href="https://bugzilla.suse.com/415678">SUSE bug 415678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/420084">SUSE bug 420084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/423234">SUSE bug 423234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/478019">SUSE bug 478019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/499253">SUSE bug 499253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/509914">SUSE bug 509914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/511568">SUSE bug 511568</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3443/">CVE-2008-3443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3443">CVE-2008-3443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3655/">CVE-2008-3655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3655">CVE-2008-3655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3656/">CVE-2008-3656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3656">CVE-2008-3656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3657/">CVE-2008-3657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3657">CVE-2008-3657 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3790/">CVE-2008-3790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3790">CVE-2008-3790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3905/">CVE-2008-3905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3905">CVE-2008-3905 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0642/">CVE-2009-0642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0642">CVE-2009-0642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1904/">CVE-2009-1904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1904">CVE-2009-1904 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570365" comment="ruby-1.8.7.p72-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570366" comment="ruby-doc-html-1.8.7.p72-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570367" comment="ruby-tk-1.8.7.p72-5.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570365" comment="ruby-1.8.7.p72-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570366" comment="ruby-doc-html-1.8.7.p72-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570367" comment="ruby-tk-1.8.7.p72-5.22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216764" version="1" class="patch">
	<metadata>
		<title>Security update for squid</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="576087" ref_url="https://bugzilla.suse.com/576087" source="BUGZILLA"/>
		<reference ref_id="577347" ref_url="https://bugzilla.suse.com/577347" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2621" ref_url="https://www.suse.com/security/cve/CVE-2009-2621/" source="CVE"/>
		<reference ref_id="CVE-2009-2622" ref_url="https://www.suse.com/security/cve/CVE-2009-2622/" source="CVE"/>
		<reference ref_id="CVE-2009-2855" ref_url="https://www.suse.com/security/cve/CVE-2009-2855/" source="CVE"/>
		<reference ref_id="CVE-2010-0308" ref_url="https://www.suse.com/security/cve/CVE-2010-0308/" source="CVE"/>
		<description>

The following vulnerabilities have been fixed in squid:



 CVE-2009-2855: DoS via special crafted auth header
 CVE-2010-0308: DoS via invalid DoS header


		</description>
<advisory from="security@suse.de">
	<issued date="2010-03-16"/>
	<updated date="2010-03-16"/>
	<bugzilla href="https://bugzilla.suse.com/576087">SUSE bug 576087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/577347">SUSE bug 577347</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2621/">CVE-2009-2621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2621">CVE-2009-2621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2622/">CVE-2009-2622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2622">CVE-2009-2622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2855/">CVE-2009-2855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2855">CVE-2009-2855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0308/">CVE-2010-0308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0308">CVE-2010-0308 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570368" comment="squid-2.7.STABLE5-2.4.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570368" comment="squid-2.7.STABLE5-2.4.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216765" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="487762" ref_url="https://bugzilla.suse.com/487762" source="BUGZILLA"/>
		<reference ref_id="507742" ref_url="https://bugzilla.suse.com/507742" source="BUGZILLA"/>
		<reference ref_id="515130" ref_url="https://bugzilla.suse.com/515130" source="BUGZILLA"/>
		<reference ref_id="520582" ref_url="https://bugzilla.suse.com/520582" source="BUGZILLA"/>
		<reference ref_id="524799" ref_url="https://bugzilla.suse.com/524799" source="BUGZILLA"/>
		<reference ref_id="525388" ref_url="https://bugzilla.suse.com/525388" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0790" ref_url="https://www.suse.com/security/cve/CVE-2009-0790/" source="CVE"/>
		<reference ref_id="CVE-2009-1957" ref_url="https://www.suse.com/security/cve/CVE-2009-1957/" source="CVE"/>
		<reference ref_id="CVE-2009-1958" ref_url="https://www.suse.com/security/cve/CVE-2009-1958/" source="CVE"/>
		<reference ref_id="CVE-2009-2185" ref_url="https://www.suse.com/security/cve/CVE-2009-2185/" source="CVE"/>
		<reference ref_id="CVE-2009-2661" ref_url="https://www.suse.com/security/cve/CVE-2009-2661/" source="CVE"/>
		<description>
This update fixes two denial of service bugs that can lead
to a remote pre-auth crash while processing a IKE_SA_INIT
or a IKE_AUTH request. CVE-2009-1957 and CVE-2009-1958 have
been assigned to this issue.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-06-08"/>
	<updated date="2009-06-08"/>
	<bugzilla href="https://bugzilla.suse.com/487762">SUSE bug 487762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/507742">SUSE bug 507742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/515130">SUSE bug 515130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/520582">SUSE bug 520582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/524799">SUSE bug 524799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/525388">SUSE bug 525388</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0790/">CVE-2009-0790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0790">CVE-2009-0790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1957/">CVE-2009-1957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1957">CVE-2009-1957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1958/">CVE-2009-1958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1958">CVE-2009-1958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2185/">CVE-2009-2185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2185">CVE-2009-2185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2661/">CVE-2009-2661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2661">CVE-2009-2661 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570369" comment="strongswan-4.2.8-1.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570370" comment="strongswan-doc-4.2.8-1.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570369" comment="strongswan-4.2.8-1.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570370" comment="strongswan-doc-4.2.8-1.23.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216766" version="1" class="patch">
	<metadata>
		<title>Security update for sudo</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="582555" ref_url="https://bugzilla.suse.com/582555" source="BUGZILLA"/>
		<reference ref_id="582556" ref_url="https://bugzilla.suse.com/582556" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0426" ref_url="https://www.suse.com/security/cve/CVE-2010-0426/" source="CVE"/>
		<reference ref_id="CVE-2010-0427" ref_url="https://www.suse.com/security/cve/CVE-2010-0427/" source="CVE"/>
		<description>

This update fixes two security issues:



 CVE-2010-0427:CVSS v2 Base Score: 6.6
    Sudo failed to properly reset group permissions, when
    'runas_default' option was used. If a local, unprivileged
    user was authorized by sudoers file to perform their
    sudo commands under default user account, it could lead
    to privilege escalation 
 CVE-2010-0426:CVSS v2 Base Score: 6.6
    A privilege escalation flaw was found in the way
    sudo used to check file paths for pseudocommands.
    If local, unprivileged user was authorized by sudoers
    file to edit one or more files, it could lead to
    execution of arbitrary code, with the privileges
    of privileged system user (root).


		</description>
<advisory from="security@suse.de">
	<issued date="2010-03-01"/>
	<updated date="2010-03-01"/>
	<bugzilla href="https://bugzilla.suse.com/582555">SUSE bug 582555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/582556">SUSE bug 582556</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0426/">CVE-2010-0426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0426">CVE-2010-0426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0427/">CVE-2010-0427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0427">CVE-2010-0427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570371" comment="sudo-1.6.9p17-21.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570371" comment="sudo-1.6.9p17-21.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216767" version="1" class="patch">
	<metadata>
		<title>Security update for systemtap</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="574243" ref_url="https://bugzilla.suse.com/574243" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-4273" ref_url="https://www.suse.com/security/cve/CVE-2009-4273/" source="CVE"/>
		<description>

This update of systemtab fixes a shell meta character injection 
vulnerability that allows remote users to execute arbitrary commands with 
the privileges of the stap-server. (CVE-2009-4273
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4273&gt; )

Additionally, a remote denial of service bug in the _getargv() function has 
been fixed. (CVE-2010-0411
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0411&gt; )

		</description>
<advisory from="security@suse.de">
	<issued date="2010-06-23"/>
	<updated date="2010-06-23"/>
	<bugzilla href="https://bugzilla.suse.com/574243">SUSE bug 574243</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4273/">CVE-2009-4273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4273">CVE-2009-4273 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570372" comment="systemtap-0.7.1-42.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570372" comment="systemtap-0.7.1-42.5.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216768" version="1" class="patch">
	<metadata>
		<title>Security update for tar</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="579475" ref_url="https://bugzilla.suse.com/579475" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624/" source="CVE"/>
		<description>
A malicious remote tape server could cause a buffer overflow in tar.
In order to exploit that an attacker would have to trick the victim
to extract a file that causes tar to open a connection to the rmt
server (CVE-2010-0624). It's advisable to always use tar's
--force-local local option to avoid such tricks.
		</description>
<advisory from="security@suse.de">
	<issued date="2010-03-12"/>
	<updated date="2010-03-12"/>
	<bugzilla href="https://bugzilla.suse.com/579475">SUSE bug 579475</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0624">CVE-2010-0624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570373" comment="tar-1.20-23.23.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570373" comment="tar-1.20-23.23.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216769" version="1" class="patch">
	<metadata>
		<title>Security update for tgt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="592928" ref_url="https://bugzilla.suse.com/592928" source="BUGZILLA"/>
		<reference ref_id="618574" ref_url="https://bugzilla.suse.com/618574" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0743" ref_url="https://www.suse.com/security/cve/CVE-2010-0743/" source="CVE"/>
		<reference ref_id="CVE-2010-2221" ref_url="https://www.suse.com/security/cve/CVE-2010-2221/" source="CVE"/>
		<description>

This update of tgt fixes multiple overflows and a format string 
vulnerability:

    * CVE-2010-2221: CVSS v2 Base Score: 5.0 (MEDIUM)
      (AV:N/AC:L/Au:N/C:N/I:N/A:P): Buffer Errors (CWE-119)
    * CVE-2010-0743: CVSS v2 Base Score: 5.0 (MEDIUM)
      (AV:N/AC:L/Au:N/C:N/I:N/A:P): Format String Vulnerability (CWE-134)

		</description>
<advisory from="security@suse.de">
	<issued date="2010-08-19"/>
	<updated date="2010-08-19"/>
	<bugzilla href="https://bugzilla.suse.com/592928">SUSE bug 592928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/618574">SUSE bug 618574</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0743/">CVE-2010-0743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0743">CVE-2010-0743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2221/">CVE-2010-2221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2221">CVE-2010-2221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570374" comment="tgt-0.9.0-1.27.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570374" comment="tgt-0.9.0-1.27.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216770" version="1" class="patch">
	<metadata>
		<title>Security update for w3m</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="609451" ref_url="https://bugzilla.suse.com/609451" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2074" ref_url="https://www.suse.com/security/cve/CVE-2010-2074/" source="CVE"/>
		<description>

w3m does not handle embedded NUL characters in the common name and in 
subject alternative names of X.509 certificates (CVE-2010-2074
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2074&gt; ). This 
update fixes the issue and also turns on verification of x509 certificates 
by default which was not the case before.

		</description>
<advisory from="security@suse.de">
	<issued date="2010-06-17"/>
	<updated date="2010-06-17"/>
	<bugzilla href="https://bugzilla.suse.com/609451">SUSE bug 609451</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2074/">CVE-2010-2074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2074">CVE-2010-2074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570375" comment="w3m-0.5.2-128.18.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570375" comment="w3m-0.5.2-128.18.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216771" version="1" class="patch">
	<metadata>
		<title>Security update for Websphere Community Edition</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="507806" ref_url="https://bugzilla.suse.com/507806" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-5518" ref_url="https://www.suse.com/security/cve/CVE-2008-5518/" source="CVE"/>
		<reference ref_id="CVE-2009-0038" ref_url="https://www.suse.com/security/cve/CVE-2009-0038/" source="CVE"/>
		<reference ref_id="CVE-2009-0039" ref_url="https://www.suse.com/security/cve/CVE-2009-0039/" source="CVE"/>
		<reference ref_id="CVE-2009-0781" ref_url="https://www.suse.com/security/cve/CVE-2009-0781/" source="CVE"/>
		<description>
This update of WebSphere fixes the following
vulnerabilities:
- GERONIMO-3838: close potential denial of service attack
- CVE-2008-5518: fix Apache Geronimo web administration
  console directory traversal vulnerabilities.
- CVE-2009-0038:  fix Apache Geronimo web administration
  console XSS vulnerabilities.
- CVE-2009-0039: fix Apache Geronimo web administration
  console XSRF vulnerabilities.
- CVE-2009-0781: Samples: Fix Apache Tomcat cross-site
  scripting vulnerability.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-06-20"/>
	<updated date="2009-06-20"/>
	<bugzilla href="https://bugzilla.suse.com/507806">SUSE bug 507806</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5518/">CVE-2008-5518 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5518">CVE-2008-5518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0038/">CVE-2009-0038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0038">CVE-2009-0038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0039/">CVE-2009-0039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0039">CVE-2009-0039 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0781/">CVE-2009-0781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0781">CVE-2009-0781 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586786" comment="websphere-as_ce-2.1.1.2-2.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586786" comment="websphere-as_ce-2.1.1.2-2.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216772" version="1" class="patch">
	<metadata>
		<title>Security update for wget</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="528298" ref_url="https://bugzilla.suse.com/528298" source="BUGZILLA"/>
		<description>
This update wget improves the handling of the  0-character
in the subject name of a SSL certificate.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-08-12"/>
	<updated date="2009-08-12"/>
	<bugzilla href="https://bugzilla.suse.com/528298">SUSE bug 528298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570377" comment="wget-1.11.4-1.15.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570377" comment="wget-1.11.4-1.15.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216773" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="493584" ref_url="https://bugzilla.suse.com/493584" source="BUGZILLA"/>
		<reference ref_id="550320" ref_url="https://bugzilla.suse.com/550320" source="BUGZILLA"/>
		<reference ref_id="553215" ref_url="https://bugzilla.suse.com/553215" source="BUGZILLA"/>
		<reference ref_id="565902" ref_url="https://bugzilla.suse.com/565902" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1210" ref_url="https://www.suse.com/security/cve/CVE-2009-1210/" source="CVE"/>
		<reference ref_id="CVE-2009-1266" ref_url="https://www.suse.com/security/cve/CVE-2009-1266/" source="CVE"/>
		<reference ref_id="CVE-2009-1267" ref_url="https://www.suse.com/security/cve/CVE-2009-1267/" source="CVE"/>
		<reference ref_id="CVE-2009-1268" ref_url="https://www.suse.com/security/cve/CVE-2009-1268/" source="CVE"/>
		<reference ref_id="CVE-2009-1269" ref_url="https://www.suse.com/security/cve/CVE-2009-1269/" source="CVE"/>
		<reference ref_id="CVE-2009-2560" ref_url="https://www.suse.com/security/cve/CVE-2009-2560/" source="CVE"/>
		<reference ref_id="CVE-2009-2563" ref_url="https://www.suse.com/security/cve/CVE-2009-2563/" source="CVE"/>
		<reference ref_id="CVE-2009-3549" ref_url="https://www.suse.com/security/cve/CVE-2009-3549/" source="CVE"/>
		<reference ref_id="CVE-2009-3550" ref_url="https://www.suse.com/security/cve/CVE-2009-3550/" source="CVE"/>
		<reference ref_id="CVE-2009-3551" ref_url="https://www.suse.com/security/cve/CVE-2009-3551/" source="CVE"/>
		<reference ref_id="CVE-2009-3829" ref_url="https://www.suse.com/security/cve/CVE-2009-3829/" source="CVE"/>
		<reference ref_id="CVE-2009-4376" ref_url="https://www.suse.com/security/cve/CVE-2009-4376/" source="CVE"/>
		<reference ref_id="CVE-2009-4377" ref_url="https://www.suse.com/security/cve/CVE-2009-4377/" source="CVE"/>
		<reference ref_id="CVE-2010-0304" ref_url="https://www.suse.com/security/cve/CVE-2010-0304/" source="CVE"/>
		<description>
Version upgrade to Wireshark 1.0.7 to fix various
vulnerabilities: CVE-2009-1269: crash while loading a
Tektronix .rf5 file CVE-2009-1268: crash in Check Point
High-Availability Protocol (CPHAP) dissector CVE-2009-1267:
LDAP dissector could crash on Windows CVE-2009-1210:
PROFINET format string bug CVE-2009-1266: additional
PROFINET  format string bugs, a crash in the PCNFSD
dissector
		</description>
<advisory from="security@suse.de">
	<issued date="2009-05-25"/>
	<updated date="2009-05-25"/>
	<bugzilla href="https://bugzilla.suse.com/493584">SUSE bug 493584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550320">SUSE bug 550320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/553215">SUSE bug 553215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/565902">SUSE bug 565902</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1210/">CVE-2009-1210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1210">CVE-2009-1210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1266/">CVE-2009-1266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1266">CVE-2009-1266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1267/">CVE-2009-1267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1267">CVE-2009-1267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1268/">CVE-2009-1268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1268">CVE-2009-1268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1269/">CVE-2009-1269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1269">CVE-2009-1269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2560/">CVE-2009-2560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2560">CVE-2009-2560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2563/">CVE-2009-2563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2563">CVE-2009-2563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3549/">CVE-2009-3549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3549">CVE-2009-3549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3550/">CVE-2009-3550 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3550">CVE-2009-3550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3551/">CVE-2009-3551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3551">CVE-2009-3551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3829/">CVE-2009-3829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3829">CVE-2009-3829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4376/">CVE-2009-4376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4376">CVE-2009-4376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4377/">CVE-2009-4377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4377">CVE-2009-4377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0304/">CVE-2010-0304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0304">CVE-2010-0304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570378" comment="wireshark-1.0.5-1.26.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570378" comment="wireshark-1.0.5-1.26.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216774" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="481592" ref_url="https://bugzilla.suse.com/481592" source="BUGZILLA"/>
		<reference ref_id="513921" ref_url="https://bugzilla.suse.com/513921" source="BUGZILLA"/>
		<reference ref_id="526855" ref_url="https://bugzilla.suse.com/526855" source="BUGZILLA"/>
		<reference ref_id="529195" ref_url="https://bugzilla.suse.com/529195" source="BUGZILLA"/>
		<reference ref_id="537370" ref_url="https://bugzilla.suse.com/537370" source="BUGZILLA"/>
		<reference ref_id="541945" ref_url="https://bugzilla.suse.com/541945" source="BUGZILLA"/>
		<reference ref_id="542525" ref_url="https://bugzilla.suse.com/542525" source="BUGZILLA"/>
		<reference ref_id="545470" ref_url="https://bugzilla.suse.com/545470" source="BUGZILLA"/>
		<reference ref_id="547590" ref_url="https://bugzilla.suse.com/547590" source="BUGZILLA"/>
		<reference ref_id="548438" ref_url="https://bugzilla.suse.com/548438" source="BUGZILLA"/>
		<reference ref_id="548443" ref_url="https://bugzilla.suse.com/548443" source="BUGZILLA"/>
		<reference ref_id="548852" ref_url="https://bugzilla.suse.com/548852" source="BUGZILLA"/>
		<reference ref_id="550397" ref_url="https://bugzilla.suse.com/550397" source="BUGZILLA"/>
		<reference ref_id="553631" ref_url="https://bugzilla.suse.com/553631" source="BUGZILLA"/>
		<reference ref_id="553633" ref_url="https://bugzilla.suse.com/553633" source="BUGZILLA"/>
		<reference ref_id="555152" ref_url="https://bugzilla.suse.com/555152" source="BUGZILLA"/>
		<reference ref_id="561912" ref_url="https://bugzilla.suse.com/561912" source="BUGZILLA"/>
		<reference ref_id="564750" ref_url="https://bugzilla.suse.com/564750" source="BUGZILLA"/>
		<reference ref_id="572691" ref_url="https://bugzilla.suse.com/572691" source="BUGZILLA"/>
		<reference ref_id="573748" ref_url="https://bugzilla.suse.com/573748" source="BUGZILLA"/>
		<reference ref_id="576832" ref_url="https://bugzilla.suse.com/576832" source="BUGZILLA"/>
		<reference ref_id="591092" ref_url="https://bugzilla.suse.com/591092" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-3525" ref_url="https://www.suse.com/security/cve/CVE-2009-3525/" source="CVE"/>
		<description>

Collective Xen/201004 Update, containing fixes for the following issues:



 bnc#576832 - pygrub, reiserfs: Fix on-disk structure definition
 bnc#537370 - Xen on SLES 11 does not boot - endless loop in ATA detection
 bnc#561912 - xend leaks memory
 bnc#564750 - Keyboard Caps Lock key works abnormal under SLES11 xen guest OS.
 bnc#548443 - keymap setting not preserved
 bnc#555152 - 'NAME' column in xentop (SLES11) output limited to 10 characters unlike SLES10
 bnc#553631 - L3: diskpart will not run on windows 2008
 bnc#548852 - DL585G2 - plug-in PCI cards fail in IO-APIC mode
 bnc#529195 - xend: disallow ! as a sxp separator
 bnc#550397 - xend: bootable flag of VBD not always of type int
 bnc#545470 - Xen vifname parameter is ignored when using type=ioemu in guest configuration file
 bnc#541945 - xm create -x command does not work in SLES 10 SP2 or SLES 11
 bnc#542525 - xen pygrub vulnerability (CVE-2009-3525)
 bnc#481592 and fate#306125 - Virtual machines are not able to boot from CD to allow upgrade to OES2SP1 (sle10 bug)
 bnc#553633 - Update breaks menu access keys in virt-viewer and still misses some key sequences. (sle10 bug)
fate#306720: xen: virt-manager cdrom handling.
 bnc#547590 - L3: virt-manager is unable of displaying VNC console on remote hosts
 bnc#572691 - libvird segfaults when trying to create a kvm guest
 bnc#573748 - L3: Virsh gives error Device 51712 not connected after updating libvirt modules
 bnc#548438 - libcmpiutil / libvirt-cim does not properly handle CIM_ prefixed
 bnc#513921: Xen doesn't work get an eror when starting the install processes or starting a pervious installed DomU
 bnc#526855: Cannot set MAC address for PV guest in vm-install


		</description>
<advisory from="security@suse.de">
	<issued date="2010-02-20"/>
	<updated date="2010-02-20"/>
	<bugzilla href="https://bugzilla.suse.com/481592">SUSE bug 481592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/513921">SUSE bug 513921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/526855">SUSE bug 526855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/529195">SUSE bug 529195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/537370">SUSE bug 537370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/541945">SUSE bug 541945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/542525">SUSE bug 542525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545470">SUSE bug 545470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/547590">SUSE bug 547590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/548438">SUSE bug 548438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/548443">SUSE bug 548443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/548852">SUSE bug 548852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550397">SUSE bug 550397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/553631">SUSE bug 553631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/553633">SUSE bug 553633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/555152">SUSE bug 555152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/561912">SUSE bug 561912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/564750">SUSE bug 564750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/572691">SUSE bug 572691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/573748">SUSE bug 573748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/576832">SUSE bug 576832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/591092">SUSE bug 591092</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3525/">CVE-2009-3525 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3525">CVE-2009-3525 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570379" comment="libcmpiutil-0.5-15.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570380" comment="libvirt-0.4.6-14.60.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570381" comment="libvirt-cim-0.5.2-8.47.85 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570382" comment="libvirt-doc-0.4.6-14.60.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570383" comment="libvirt-python-0.4.6-14.60.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570384" comment="virt-manager-0.5.3-66.42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570385" comment="virt-viewer-0.0.3-3.57.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570386" comment="vm-install-0.3.27-0.1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570387" comment="xen-3.3.1_18546_24-0.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570388" comment="xen-doc-html-3.3.1_18546_24-0.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570389" comment="xen-doc-pdf-3.3.1_18546_24-0.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570390" comment="xen-kmp-default-3.3.1_18546_24_2.6.27.45_0.3-0.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570391" comment="xen-kmp-pae-3.3.1_18546_24_2.6.27.45_0.3-0.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570392" comment="xen-libs-3.3.1_18546_24-0.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570393" comment="xen-tools-3.3.1_18546_24-0.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570394" comment="xen-tools-domU-3.3.1_18546_24-0.3.7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570379" comment="libcmpiutil-0.5-15.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570380" comment="libvirt-0.4.6-14.60.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570381" comment="libvirt-cim-0.5.2-8.47.85 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570382" comment="libvirt-doc-0.4.6-14.60.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570383" comment="libvirt-python-0.4.6-14.60.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570384" comment="virt-manager-0.5.3-66.42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570385" comment="virt-viewer-0.0.3-3.57.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570386" comment="vm-install-0.3.27-0.1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570387" comment="xen-3.3.1_18546_24-0.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570388" comment="xen-doc-html-3.3.1_18546_24-0.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570389" comment="xen-doc-pdf-3.3.1_18546_24-0.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570390" comment="xen-kmp-default-3.3.1_18546_24_2.6.27.45_0.3-0.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570391" comment="xen-kmp-pae-3.3.1_18546_24_2.6.27.45_0.3-0.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570392" comment="xen-libs-3.3.1_18546_24-0.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570393" comment="xen-tools-3.3.1_18546_24-0.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570394" comment="xen-tools-domU-3.3.1_18546_24-0.3.7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216775" version="1" class="patch">
	<metadata>
		<title>Security update for Xerces-j2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="530717" ref_url="https://bugzilla.suse.com/530717" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2625" ref_url="https://www.suse.com/security/cve/CVE-2009-2625/" source="CVE"/>
		<description>
The xerces-j2 package was vulnerable to various bugs while
parsing XML.CVE-2009-2625 has been assigned to this issue.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-08-20"/>
	<updated date="2009-08-20"/>
	<bugzilla href="https://bugzilla.suse.com/530717">SUSE bug 530717</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2625/">CVE-2009-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2625">CVE-2009-2625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570395" comment="xerces-j2-2.8.1-238.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570396" comment="xerces-j2-xml-apis-2.8.1-238.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570397" comment="xerces-j2-xml-resolver-2.8.1-238.27.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570395" comment="xerces-j2-2.8.1-238.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570396" comment="xerces-j2-xml-apis-2.8.1-238.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570397" comment="xerces-j2-xml-resolver-2.8.1-238.27.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216776" version="1" class="patch">
	<metadata>
		<title>Security update for xpdf</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="502974" ref_url="https://bugzilla.suse.com/502974" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0791" ref_url="https://www.suse.com/security/cve/CVE-2009-0791/" source="CVE"/>
		<description>
Specially crafted PDF documents could crash xpdf or
potentially even allow execution of arbitrary code
(CVE-2009-0791).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-07-27"/>
	<updated date="2009-07-27"/>
	<bugzilla href="https://bugzilla.suse.com/502974">SUSE bug 502974</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0791/">CVE-2009-0791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0791">CVE-2009-0791 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570398" comment="xpdf-tools-3.02-138.26.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570398" comment="xpdf-tools-3.02-138.26.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216777" version="1" class="patch">
	<metadata>
		<title>Security update for YaST2 LDAP module</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="492441" ref_url="https://bugzilla.suse.com/492441" source="BUGZILLA"/>
		<reference ref_id="496862" ref_url="https://bugzilla.suse.com/496862" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1648" ref_url="https://www.suse.com/security/cve/CVE-2009-1648/" source="CVE"/>
		<description>
The YaST2 LDAP module in SUSE Linux Enterprise Server 11
did not initialize the firewall configuration during second
stage installation. Therefore, if an online update required
reboot during second stage firewall settings were not
applied and the firewall turned off (CVE-2009-1648).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-05-18"/>
	<updated date="2009-05-18"/>
	<bugzilla href="https://bugzilla.suse.com/492441">SUSE bug 492441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/496862">SUSE bug 496862</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1648/">CVE-2009-1648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1648">CVE-2009-1648 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570399" comment="yast2-ldap-server-2.17.21-0.1.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570399" comment="yast2-ldap-server-2.17.21-0.1.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216778" version="1" class="patch">
	<metadata>
		<title>Security update for ConsoleKit</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="686150" ref_url="https://bugzilla.suse.com/686150" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-4664" ref_url="https://www.suse.com/security/cve/CVE-2010-4664/" source="CVE"/>
		<description>

Remote users logged in via e.g. ssh could open a consolekit session that is 
considered local and therefore gain additional privileges, e.g. via 
policykit (CVE-2010-4664).

Security Issue reference:

    * CVE-2010-4664
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4664&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-05-27"/>
	<updated date="2011-05-27"/>
	<bugzilla href="https://bugzilla.suse.com/686150">SUSE bug 686150</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4664/">CVE-2010-4664 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-4664">CVE-2010-4664 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991185" comment="ConsoleKit-0.2.10-64.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991186" comment="ConsoleKit-32bit-0.2.10-64.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991187" comment="ConsoleKit-x11-0.2.10-64.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216779" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="881874" ref_url="https://bugzilla.suse.com/881874" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1533" ref_url="https://www.suse.com/security/cve/CVE-2014-1533/" source="CVE"/>
		<reference ref_id="CVE-2014-1534" ref_url="https://www.suse.com/security/cve/CVE-2014-1534/" source="CVE"/>
		<reference ref_id="CVE-2014-1536" ref_url="https://www.suse.com/security/cve/CVE-2014-1536/" source="CVE"/>
		<reference ref_id="CVE-2014-1537" ref_url="https://www.suse.com/security/cve/CVE-2014-1537/" source="CVE"/>
		<reference ref_id="CVE-2014-1538" ref_url="https://www.suse.com/security/cve/CVE-2014-1538/" source="CVE"/>
		<reference ref_id="CVE-2014-1541" ref_url="https://www.suse.com/security/cve/CVE-2014-1541/" source="CVE"/>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<description>

MozillaFirefox was updated to version 24.6.0 to fix six security issues:

    * Miscellaneous memory safety hazards. (CVE-2014-1533, CVE-2014-1534)
    * Use-after-free and out of bounds issues found using Address
      Sanitizer. (CVE-2014-1536, CVE-2014-1537, CVE-2014-1538)
    * Use-after-free with SMIL Animation Controller. (CVE-2014-1541)

mozilla-nspr was updated to version 4.10.6 to fix one security issue:

    * Out of bounds write in NSPR. (CVE-2014-1545)

Further information can be found at 
https://www.mozilla.org/security/announce/
&lt;https://www.mozilla.org/security/announce/&gt; .

Security Issues references:

    * CVE-2014-1533
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533&gt;
    * CVE-2014-1534
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1534&gt;
    * CVE-2014-1536
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1536&gt;
    * CVE-2014-1537
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1537&gt;
    * CVE-2014-1538
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538&gt;
    * CVE-2014-1541
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541&gt;
    * CVE-2014-1545
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-12"/>
	<updated date="2014-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/881874">SUSE bug 881874</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1533/">CVE-2014-1533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1533">CVE-2014-1533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1534/">CVE-2014-1534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1534">CVE-2014-1534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1536/">CVE-2014-1536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1536">CVE-2014-1536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1537/">CVE-2014-1537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1537">CVE-2014-1537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1538/">CVE-2014-1538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1538">CVE-2014-1538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1541/">CVE-2014-1541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1541">CVE-2014-1541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1545">CVE-2014-1545 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570404" comment="MozillaFirefox-24.6.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570405" comment="MozillaFirefox-branding-SLED-24-0.4.10.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570406" comment="MozillaFirefox-translations-24.6.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570407" comment="libfreebl3-3.16.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570408" comment="libfreebl3-32bit-3.16.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570409" comment="mozilla-nspr-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570410" comment="mozilla-nspr-32bit-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570411" comment="mozilla-nss-3.16.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570412" comment="mozilla-nss-32bit-3.16.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570413" comment="mozilla-nss-tools-3.16.1-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570404" comment="MozillaFirefox-24.6.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570405" comment="MozillaFirefox-branding-SLED-24-0.4.10.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570406" comment="MozillaFirefox-translations-24.6.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570407" comment="libfreebl3-3.16.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570408" comment="libfreebl3-32bit-3.16.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570409" comment="mozilla-nspr-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570410" comment="mozilla-nspr-32bit-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570411" comment="mozilla-nss-3.16.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570412" comment="mozilla-nss-32bit-3.16.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570413" comment="mozilla-nss-tools-3.16.1-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216780" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="522077" ref_url="https://bugzilla.suse.com/522077" source="BUGZILLA"/>
		<reference ref_id="559109" ref_url="https://bugzilla.suse.com/559109" source="BUGZILLA"/>
		<reference ref_id="746880" ref_url="https://bugzilla.suse.com/746880" source="BUGZILLA"/>
		<reference ref_id="752879" ref_url="https://bugzilla.suse.com/752879" source="BUGZILLA"/>
		<reference ref_id="754749" ref_url="https://bugzilla.suse.com/754749" source="BUGZILLA"/>
		<reference ref_id="758512" ref_url="https://bugzilla.suse.com/758512" source="BUGZILLA"/>
		<reference ref_id="903204" ref_url="https://bugzilla.suse.com/903204" source="BUGZILLA"/>
		<reference ref_id="903216" ref_url="https://bugzilla.suse.com/903216" source="BUGZILLA"/>
		<reference ref_id="903638" ref_url="https://bugzilla.suse.com/903638" source="BUGZILLA"/>
		<reference ref_id="905260" ref_url="https://bugzilla.suse.com/905260" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0247" ref_url="https://www.suse.com/security/cve/CVE-2012-0247/" source="CVE"/>
		<reference ref_id="CVE-2012-0248" ref_url="https://www.suse.com/security/cve/CVE-2012-0248/" source="CVE"/>
		<reference ref_id="CVE-2012-0259" ref_url="https://www.suse.com/security/cve/CVE-2012-0259/" source="CVE"/>
		<reference ref_id="CVE-2012-0260" ref_url="https://www.suse.com/security/cve/CVE-2012-0260/" source="CVE"/>
		<reference ref_id="CVE-2012-1185" ref_url="https://www.suse.com/security/cve/CVE-2012-1185/" source="CVE"/>
		<reference ref_id="CVE-2012-1186" ref_url="https://www.suse.com/security/cve/CVE-2012-1186/" source="CVE"/>
		<reference ref_id="CVE-2012-1610" ref_url="https://www.suse.com/security/cve/CVE-2012-1610/" source="CVE"/>
		<reference ref_id="CVE-2012-1798" ref_url="https://www.suse.com/security/cve/CVE-2012-1798/" source="CVE"/>
		<reference ref_id="CVE-2014-8354" ref_url="https://www.suse.com/security/cve/CVE-2014-8354/" source="CVE"/>
		<reference ref_id="CVE-2014-8355" ref_url="https://www.suse.com/security/cve/CVE-2014-8355/" source="CVE"/>
		<reference ref_id="CVE-2014-8562" ref_url="https://www.suse.com/security/cve/CVE-2014-8562/" source="CVE"/>
		<reference ref_id="CVE-2014-8716" ref_url="https://www.suse.com/security/cve/CVE-2014-8716/" source="CVE"/>
		<description>

This update of ImageMagick fixes multiple security vulnerabilities that 
could be exploited by attackers via specially crafted image files:

    * CVE-2012-0259 / CVE-2012-1610: Integer overflow when processing EXIF
      directory entries with tags of e.g. format 5 (EXIF_FMT_URATIONAL) and
      a large components count.
    * CVE-2012-0247 / CVE-2012-1185: Integer overflows via 'number_bytes'
      and 'offset' could lead to memory corruption. CVE-2012-0248 /
      CVE-2012-1186: Denial of service via 'profile.c'.
    * CVE-2012-0260: Denial of service via JPEG restart markers (excessive
      CPU consumption).
    * CVE-2012-1798: Copying of invalid memory when reading TIFF EXIF IFD.

Security Issue references:

    * CVE-2012-0247
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0247&gt;
    * CVE-2012-0248
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0248&gt;
    * CVE-2012-1185
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1185&gt;
    * CVE-2012-1186
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1186&gt;
    * CVE-2012-0259
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0259&gt;
    * CVE-2012-0260
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0260&gt;
    * CVE-2012-1798
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1798&gt;
    * CVE-2012-1610
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1610&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-04-27"/>
	<updated date="2012-04-27"/>
	<bugzilla href="https://bugzilla.suse.com/522077">SUSE bug 522077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/559109">SUSE bug 559109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746880">SUSE bug 746880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752879">SUSE bug 752879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754749">SUSE bug 754749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758512">SUSE bug 758512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903204">SUSE bug 903204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903216">SUSE bug 903216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903638">SUSE bug 903638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905260">SUSE bug 905260</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0247/">CVE-2012-0247 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0247">CVE-2012-0247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0248/">CVE-2012-0248 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0248">CVE-2012-0248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0259/">CVE-2012-0259 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0259">CVE-2012-0259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0260/">CVE-2012-0260 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0260">CVE-2012-0260 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1185/">CVE-2012-1185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1185">CVE-2012-1185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1186/">CVE-2012-1186 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1186">CVE-2012-1186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1610/">CVE-2012-1610 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1610">CVE-2012-1610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1798/">CVE-2012-1798 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1798">CVE-2012-1798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8354/">CVE-2014-8354 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8354">CVE-2014-8354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8355/">CVE-2014-8355 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8355">CVE-2014-8355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8562/">CVE-2014-8562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8562">CVE-2014-8562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8716/">CVE-2014-8716 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8716">CVE-2014-8716 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991188" comment="libMagickCore1-6.4.3.6-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991189" comment="libMagickCore1-32bit-6.4.3.6-7.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216781" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="978061" ref_url="https://bugzilla.suse.com/978061" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="CVE-2016-3715" ref_url="https://www.suse.com/security/cve/CVE-2016-3715/" source="CVE"/>
		<reference ref_id="CVE-2016-3716" ref_url="https://www.suse.com/security/cve/CVE-2016-3716/" source="CVE"/>
		<reference ref_id="CVE-2016-3717" ref_url="https://www.suse.com/security/cve/CVE-2016-3717/" source="CVE"/>
		<reference ref_id="CVE-2016-3718" ref_url="https://www.suse.com/security/cve/CVE-2016-3718/" source="CVE"/>
		<description>

This update for ImageMagick fixes the following issues:

Security issues fixed:
- Several coders were vulnerable to remote code execution attacks,
  these coders have now been disabled. They can be re-enabled by
  exporting the following environment variable
  MAGICK_CODER_MODULE_PATH=/usr/lib64/ImageMagick-6.4.3/modules-Q16/coders/vulnerable/
  (bsc#978061)
- CVE-2016-3714: Insufficient shell characters filtering leads to
  (potentially remote) code execution
- CVE-2016-3715: Possible file deletion by using ImageMagick's
  'ephemeral' pseudo protocol which deletes files after reading.
- CVE-2016-3716: Possible file moving by using ImageMagick's 'msl'
  pseudo protocol with any extension in any folder.
- CVE-2016-3717: Possible local file read by using ImageMagick's 
  'label' pseudo protocol to get content of the files from the server.
- CVE-2016-3718: Possible Server Side Request Forgery (SSRF) to make
  HTTP GET or FTP request.

Bugs fixed:
- Use external svg loader (rsvg)		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-11"/>
	<updated date="2016-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3714">CVE-2016-3714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3715/">CVE-2016-3715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3715">CVE-2016-3715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3716/">CVE-2016-3716 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3716">CVE-2016-3716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3717/">CVE-2016-3717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3717">CVE-2016-3717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3718/">CVE-2016-3718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3718">CVE-2016-3718 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570416" comment="libMagickCore1-6.4.3.6-7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570417" comment="libMagickCore1-32bit-6.4.3.6-7.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216782" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="978061" ref_url="https://bugzilla.suse.com/978061" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- bsc#978061: A vulnerability in ImageMagick's 'https' module allowed users to
execute arbitrary shell commands on the host performing the image conversion.
The issue had the potential for remote command injection. This update mitigates
the vulnerability by disabling all access to the 'https' module in the
'delegates.xml' config file. (CVE-2016-3714)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-13"/>
	<updated date="2016-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3714">CVE-2016-3714 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570418" comment="libMagickCore1-6.4.3.6-7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570419" comment="libMagickCore1-32bit-6.4.3.6-7.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216783" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="982178" ref_url="https://bugzilla.suse.com/982178" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5118" ref_url="https://www.suse.com/security/cve/CVE-2016-5118/" source="CVE"/>
		<description>

This update for ImageMagick fixes the following issues: 

- CVE-2016-5118: popen() shell vulnerability via filenames (bsc#982178)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/982178">SUSE bug 982178</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5118/">CVE-2016-5118 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5118">CVE-2016-5118 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570420" comment="libMagickCore1-6.4.3.6-7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570421" comment="libMagickCore1-32bit-6.4.3.6-7.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216784" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="983234" ref_url="https://bugzilla.suse.com/983234" source="BUGZILLA"/>
		<reference ref_id="983253" ref_url="https://bugzilla.suse.com/983253" source="BUGZILLA"/>
		<reference ref_id="983259" ref_url="https://bugzilla.suse.com/983259" source="BUGZILLA"/>
		<reference ref_id="983292" ref_url="https://bugzilla.suse.com/983292" source="BUGZILLA"/>
		<reference ref_id="983305" ref_url="https://bugzilla.suse.com/983305" source="BUGZILLA"/>
		<reference ref_id="983308" ref_url="https://bugzilla.suse.com/983308" source="BUGZILLA"/>
		<reference ref_id="983521" ref_url="https://bugzilla.suse.com/983521" source="BUGZILLA"/>
		<reference ref_id="983523" ref_url="https://bugzilla.suse.com/983523" source="BUGZILLA"/>
		<reference ref_id="983533" ref_url="https://bugzilla.suse.com/983533" source="BUGZILLA"/>
		<reference ref_id="983739" ref_url="https://bugzilla.suse.com/983739" source="BUGZILLA"/>
		<reference ref_id="983746" ref_url="https://bugzilla.suse.com/983746" source="BUGZILLA"/>
		<reference ref_id="983752" ref_url="https://bugzilla.suse.com/983752" source="BUGZILLA"/>
		<reference ref_id="983774" ref_url="https://bugzilla.suse.com/983774" source="BUGZILLA"/>
		<reference ref_id="983794" ref_url="https://bugzilla.suse.com/983794" source="BUGZILLA"/>
		<reference ref_id="983796" ref_url="https://bugzilla.suse.com/983796" source="BUGZILLA"/>
		<reference ref_id="983799" ref_url="https://bugzilla.suse.com/983799" source="BUGZILLA"/>
		<reference ref_id="983803" ref_url="https://bugzilla.suse.com/983803" source="BUGZILLA"/>
		<reference ref_id="984018" ref_url="https://bugzilla.suse.com/984018" source="BUGZILLA"/>
		<reference ref_id="984023" ref_url="https://bugzilla.suse.com/984023" source="BUGZILLA"/>
		<reference ref_id="984028" ref_url="https://bugzilla.suse.com/984028" source="BUGZILLA"/>
		<reference ref_id="984032" ref_url="https://bugzilla.suse.com/984032" source="BUGZILLA"/>
		<reference ref_id="984035" ref_url="https://bugzilla.suse.com/984035" source="BUGZILLA"/>
		<reference ref_id="984135" ref_url="https://bugzilla.suse.com/984135" source="BUGZILLA"/>
		<reference ref_id="984137" ref_url="https://bugzilla.suse.com/984137" source="BUGZILLA"/>
		<reference ref_id="984142" ref_url="https://bugzilla.suse.com/984142" source="BUGZILLA"/>
		<reference ref_id="984144" ref_url="https://bugzilla.suse.com/984144" source="BUGZILLA"/>
		<reference ref_id="984145" ref_url="https://bugzilla.suse.com/984145" source="BUGZILLA"/>
		<reference ref_id="984150" ref_url="https://bugzilla.suse.com/984150" source="BUGZILLA"/>
		<reference ref_id="984160" ref_url="https://bugzilla.suse.com/984160" source="BUGZILLA"/>
		<reference ref_id="984166" ref_url="https://bugzilla.suse.com/984166" source="BUGZILLA"/>
		<reference ref_id="984181" ref_url="https://bugzilla.suse.com/984181" source="BUGZILLA"/>
		<reference ref_id="984184" ref_url="https://bugzilla.suse.com/984184" source="BUGZILLA"/>
		<reference ref_id="984185" ref_url="https://bugzilla.suse.com/984185" source="BUGZILLA"/>
		<reference ref_id="984186" ref_url="https://bugzilla.suse.com/984186" source="BUGZILLA"/>
		<reference ref_id="984187" ref_url="https://bugzilla.suse.com/984187" source="BUGZILLA"/>
		<reference ref_id="984193" ref_url="https://bugzilla.suse.com/984193" source="BUGZILLA"/>
		<reference ref_id="984370" ref_url="https://bugzilla.suse.com/984370" source="BUGZILLA"/>
		<reference ref_id="984372" ref_url="https://bugzilla.suse.com/984372" source="BUGZILLA"/>
		<reference ref_id="984373" ref_url="https://bugzilla.suse.com/984373" source="BUGZILLA"/>
		<reference ref_id="984374" ref_url="https://bugzilla.suse.com/984374" source="BUGZILLA"/>
		<reference ref_id="984375" ref_url="https://bugzilla.suse.com/984375" source="BUGZILLA"/>
		<reference ref_id="984379" ref_url="https://bugzilla.suse.com/984379" source="BUGZILLA"/>
		<reference ref_id="984394" ref_url="https://bugzilla.suse.com/984394" source="BUGZILLA"/>
		<reference ref_id="984398" ref_url="https://bugzilla.suse.com/984398" source="BUGZILLA"/>
		<reference ref_id="984400" ref_url="https://bugzilla.suse.com/984400" source="BUGZILLA"/>
		<reference ref_id="984401" ref_url="https://bugzilla.suse.com/984401" source="BUGZILLA"/>
		<reference ref_id="984408" ref_url="https://bugzilla.suse.com/984408" source="BUGZILLA"/>
		<reference ref_id="984409" ref_url="https://bugzilla.suse.com/984409" source="BUGZILLA"/>
		<reference ref_id="984433" ref_url="https://bugzilla.suse.com/984433" source="BUGZILLA"/>
		<reference ref_id="984436" ref_url="https://bugzilla.suse.com/984436" source="BUGZILLA"/>
		<reference ref_id="985442" ref_url="https://bugzilla.suse.com/985442" source="BUGZILLA"/>
		<reference ref_id="985448" ref_url="https://bugzilla.suse.com/985448" source="BUGZILLA"/>
		<reference ref_id="985451" ref_url="https://bugzilla.suse.com/985451" source="BUGZILLA"/>
		<reference ref_id="985456" ref_url="https://bugzilla.suse.com/985456" source="BUGZILLA"/>
		<reference ref_id="985460" ref_url="https://bugzilla.suse.com/985460" source="BUGZILLA"/>
		<reference ref_id="986608" ref_url="https://bugzilla.suse.com/986608" source="BUGZILLA"/>
		<reference ref_id="986609" ref_url="https://bugzilla.suse.com/986609" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9805" ref_url="https://www.suse.com/security/cve/CVE-2014-9805/" source="CVE"/>
		<reference ref_id="CVE-2014-9806" ref_url="https://www.suse.com/security/cve/CVE-2014-9806/" source="CVE"/>
		<reference ref_id="CVE-2014-9807" ref_url="https://www.suse.com/security/cve/CVE-2014-9807/" source="CVE"/>
		<reference ref_id="CVE-2014-9808" ref_url="https://www.suse.com/security/cve/CVE-2014-9808/" source="CVE"/>
		<reference ref_id="CVE-2014-9809" ref_url="https://www.suse.com/security/cve/CVE-2014-9809/" source="CVE"/>
		<reference ref_id="CVE-2014-9810" ref_url="https://www.suse.com/security/cve/CVE-2014-9810/" source="CVE"/>
		<reference ref_id="CVE-2014-9811" ref_url="https://www.suse.com/security/cve/CVE-2014-9811/" source="CVE"/>
		<reference ref_id="CVE-2014-9812" ref_url="https://www.suse.com/security/cve/CVE-2014-9812/" source="CVE"/>
		<reference ref_id="CVE-2014-9813" ref_url="https://www.suse.com/security/cve/CVE-2014-9813/" source="CVE"/>
		<reference ref_id="CVE-2014-9814" ref_url="https://www.suse.com/security/cve/CVE-2014-9814/" source="CVE"/>
		<reference ref_id="CVE-2014-9815" ref_url="https://www.suse.com/security/cve/CVE-2014-9815/" source="CVE"/>
		<reference ref_id="CVE-2014-9816" ref_url="https://www.suse.com/security/cve/CVE-2014-9816/" source="CVE"/>
		<reference ref_id="CVE-2014-9817" ref_url="https://www.suse.com/security/cve/CVE-2014-9817/" source="CVE"/>
		<reference ref_id="CVE-2014-9818" ref_url="https://www.suse.com/security/cve/CVE-2014-9818/" source="CVE"/>
		<reference ref_id="CVE-2014-9819" ref_url="https://www.suse.com/security/cve/CVE-2014-9819/" source="CVE"/>
		<reference ref_id="CVE-2014-9820" ref_url="https://www.suse.com/security/cve/CVE-2014-9820/" source="CVE"/>
		<reference ref_id="CVE-2014-9822" ref_url="https://www.suse.com/security/cve/CVE-2014-9822/" source="CVE"/>
		<reference ref_id="CVE-2014-9823" ref_url="https://www.suse.com/security/cve/CVE-2014-9823/" source="CVE"/>
		<reference ref_id="CVE-2014-9824" ref_url="https://www.suse.com/security/cve/CVE-2014-9824/" source="CVE"/>
		<reference ref_id="CVE-2014-9826" ref_url="https://www.suse.com/security/cve/CVE-2014-9826/" source="CVE"/>
		<reference ref_id="CVE-2014-9828" ref_url="https://www.suse.com/security/cve/CVE-2014-9828/" source="CVE"/>
		<reference ref_id="CVE-2014-9829" ref_url="https://www.suse.com/security/cve/CVE-2014-9829/" source="CVE"/>
		<reference ref_id="CVE-2014-9830" ref_url="https://www.suse.com/security/cve/CVE-2014-9830/" source="CVE"/>
		<reference ref_id="CVE-2014-9831" ref_url="https://www.suse.com/security/cve/CVE-2014-9831/" source="CVE"/>
		<reference ref_id="CVE-2014-9834" ref_url="https://www.suse.com/security/cve/CVE-2014-9834/" source="CVE"/>
		<reference ref_id="CVE-2014-9835" ref_url="https://www.suse.com/security/cve/CVE-2014-9835/" source="CVE"/>
		<reference ref_id="CVE-2014-9836" ref_url="https://www.suse.com/security/cve/CVE-2014-9836/" source="CVE"/>
		<reference ref_id="CVE-2014-9837" ref_url="https://www.suse.com/security/cve/CVE-2014-9837/" source="CVE"/>
		<reference ref_id="CVE-2014-9838" ref_url="https://www.suse.com/security/cve/CVE-2014-9838/" source="CVE"/>
		<reference ref_id="CVE-2014-9839" ref_url="https://www.suse.com/security/cve/CVE-2014-9839/" source="CVE"/>
		<reference ref_id="CVE-2014-9840" ref_url="https://www.suse.com/security/cve/CVE-2014-9840/" source="CVE"/>
		<reference ref_id="CVE-2014-9842" ref_url="https://www.suse.com/security/cve/CVE-2014-9842/" source="CVE"/>
		<reference ref_id="CVE-2014-9844" ref_url="https://www.suse.com/security/cve/CVE-2014-9844/" source="CVE"/>
		<reference ref_id="CVE-2014-9845" ref_url="https://www.suse.com/security/cve/CVE-2014-9845/" source="CVE"/>
		<reference ref_id="CVE-2014-9846" ref_url="https://www.suse.com/security/cve/CVE-2014-9846/" source="CVE"/>
		<reference ref_id="CVE-2014-9847" ref_url="https://www.suse.com/security/cve/CVE-2014-9847/" source="CVE"/>
		<reference ref_id="CVE-2014-9849" ref_url="https://www.suse.com/security/cve/CVE-2014-9849/" source="CVE"/>
		<reference ref_id="CVE-2014-9851" ref_url="https://www.suse.com/security/cve/CVE-2014-9851/" source="CVE"/>
		<reference ref_id="CVE-2014-9853" ref_url="https://www.suse.com/security/cve/CVE-2014-9853/" source="CVE"/>
		<reference ref_id="CVE-2014-9854" ref_url="https://www.suse.com/security/cve/CVE-2014-9854/" source="CVE"/>
		<reference ref_id="CVE-2015-8894" ref_url="https://www.suse.com/security/cve/CVE-2015-8894/" source="CVE"/>
		<reference ref_id="CVE-2015-8896" ref_url="https://www.suse.com/security/cve/CVE-2015-8896/" source="CVE"/>
		<reference ref_id="CVE-2015-8897" ref_url="https://www.suse.com/security/cve/CVE-2015-8897/" source="CVE"/>
		<reference ref_id="CVE-2015-8898" ref_url="https://www.suse.com/security/cve/CVE-2015-8898/" source="CVE"/>
		<reference ref_id="CVE-2015-8901" ref_url="https://www.suse.com/security/cve/CVE-2015-8901/" source="CVE"/>
		<reference ref_id="CVE-2015-8902" ref_url="https://www.suse.com/security/cve/CVE-2015-8902/" source="CVE"/>
		<reference ref_id="CVE-2015-8903" ref_url="https://www.suse.com/security/cve/CVE-2015-8903/" source="CVE"/>
		<reference ref_id="CVE-2016-4562" ref_url="https://www.suse.com/security/cve/CVE-2016-4562/" source="CVE"/>
		<reference ref_id="CVE-2016-4563" ref_url="https://www.suse.com/security/cve/CVE-2016-4563/" source="CVE"/>
		<reference ref_id="CVE-2016-4564" ref_url="https://www.suse.com/security/cve/CVE-2016-4564/" source="CVE"/>
		<reference ref_id="CVE-2016-5687" ref_url="https://www.suse.com/security/cve/CVE-2016-5687/" source="CVE"/>
		<reference ref_id="CVE-2016-5688" ref_url="https://www.suse.com/security/cve/CVE-2016-5688/" source="CVE"/>
		<reference ref_id="CVE-2016-5689" ref_url="https://www.suse.com/security/cve/CVE-2016-5689/" source="CVE"/>
		<reference ref_id="CVE-2016-5690" ref_url="https://www.suse.com/security/cve/CVE-2016-5690/" source="CVE"/>
		<reference ref_id="CVE-2016-5691" ref_url="https://www.suse.com/security/cve/CVE-2016-5691/" source="CVE"/>
		<reference ref_id="CVE-2016-5841" ref_url="https://www.suse.com/security/cve/CVE-2016-5841/" source="CVE"/>
		<reference ref_id="CVE-2016-5842" ref_url="https://www.suse.com/security/cve/CVE-2016-5842/" source="CVE"/>
		<description>
ImageMagick was updated to fix 55 security issues.

These security issues were fixed:
- CVE-2014-9810: SEGV in dpx file handler (bsc#983803).
- CVE-2014-9811: Crash in xwd file handler (bsc#984032).
- CVE-2014-9812: NULL pointer dereference in ps file handling (bsc#984137).
- CVE-2014-9813: Crash on corrupted viff file (bsc#984035).
- CVE-2014-9814: NULL pointer dereference in wpg file handling (bsc#984193).
- CVE-2014-9815: Crash on corrupted wpg file (bsc#984372).
- CVE-2014-9816: Out of bound access in viff image (bsc#984398).
- CVE-2014-9817: Heap buffer overflow in pdb file handling (bsc#984400).
- CVE-2014-9818: Out of bound access on malformed sun file (bsc#984181).
- CVE-2014-9819: Heap overflow in palm files (bsc#984142).
- CVE-2014-9830: Handling of corrupted sun file (bsc#984135).
- CVE-2014-9831: Handling of corrupted wpg file (bsc#984375).
- CVE-2014-9836: Crash in xpm file handling (bsc#984023).
- CVE-2014-9851: Crash when parsing resource block (bsc#984160).
- CVE-2016-5689: NULL ptr dereference in dcm coder (bsc#985460).
- CVE-2014-9853: Memory leak in rle file handling (bsc#984408).
- CVE-2015-8902: PDB file DoS (CPU consumption) (bsc#983253).
- CVE-2015-8903: Denial of service (cpu) in vicar (bsc#983259).
- CVE-2015-8901: MIFF file DoS (endless loop) (bsc#983234).
- CVE-2014-9834: Heap overflow in pict file (bsc#984436).
- CVE-2014-9806: Prevent file descriptr leak due to corrupted file (bsc#983774).
- CVE-2014-9838: Out of memory crash in magick/cache.c (bsc#984370).
- CVE-2014-9854: Filling memory during identification of TIFF image (bsc#984184).
- CVE-2015-8898: Prevent null pointer access in magick/constitute.c (bsc#983746).
- CVE-2015-8894: Double free in coders/tga.c:221 (bsc#983523).
- CVE-2015-8896: Double free / integer truncation issue in coders/pict.c:2000 (bsc#983533).
- CVE-2015-8897: Out of bounds error in SpliceImage (bsc#983739).
- CVE-2016-5690: Bad foor loop in DCM coder (bsc#985451).
- CVE-2016-5691: Checks for pixel.red/green/blue in dcm coder (bsc#985456).
- CVE-2014-9805: SEGV due to a corrupted pnm file. (bsc#983752).
- CVE-2014-9808: SEGV due to corrupted dpc images. (bsc#983796).
- CVE-2014-9820: heap overflow in xpm files (bsc#984150).
- CVE-2014-9823: heap overflow in palm file (bsc#984401).
- CVE-2014-9822: heap overflow in quantum file (bsc#984187).
- CVE-2014-9839: Theoretical out of bound access in magick/colormap-private.h (bsc#984379).
- CVE-2014-9824: Heap overflow in psd file (bsc#984185).
- CVE-2014-9809: Fix a SEGV due to corrupted xwd images. (bsc#983799).
- CVE-2014-9826: Incorrect error handling in sun files (bsc#984186).
- CVE-2014-9842: Memory leak in psd handling (bsc#984374).
- CVE-2016-5687: Out of bounds read in DDS coder (bsc#985448).
- CVE-2014-9840: Out of bound access in palm file (bsc#984433).
- CVE-2014-9847: Incorrect handling of 'previous' image in the JNG decoder (bsc#984144).
- CVE-2014-9846: Added checks to prevent overflow in rle file. (bsc#983521).
- CVE-2014-9845: Crash due to corrupted dib file (bsc#984394).
- CVE-2014-9844: Out of bound issue in rle file (bsc#984373).
- CVE-2014-9849: Crash in png coder (bsc#984018).
- CVE-2016-5688: Various invalid memory reads in ImageMagick WPG (bsc#985442).
- CVE-2014-9807: Fix a double free in pdb coder. (bsc#983794).
- CVE-2014-9829: Out of bound access in sun file (bsc#984409).
- CVE-2016-4564: The DrawImage function in MagickCore/draw.c in ImageMagick made an incorrect function call in attempting to locate the next token, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983308).
- CVE-2016-4563: The TraceStrokePolygon function in MagickCore/draw.c in ImageMagick mishandled the relationship between the BezierQuantum value and certain strokes data, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983305).
- CVE-2016-4562: The DrawDashPolygon function in MagickCore/draw.c in ImageMagick mishandled calculations of certain vertices integer data, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983292).
- CVE-2014-9837: Additional PNM sanity checks (bsc#984166).
- CVE-2014-9835: Heap overflow in wpf file (bsc#984145).
- CVE-2014-9828: Corrupted (too many colors) psd file (bsc#984028).
- CVE-2016-5841: Integer overflow could have read to RCE (bnc#986609).
- CVE-2016-5842: Out-of-bounds read in MagickCore/property.c:1396 could have lead to memory leak (bnc#986608).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-11"/>
	<updated date="2016-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/983234">SUSE bug 983234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983253">SUSE bug 983253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983259">SUSE bug 983259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983292">SUSE bug 983292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983305">SUSE bug 983305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983308">SUSE bug 983308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983521">SUSE bug 983521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983523">SUSE bug 983523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983533">SUSE bug 983533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983739">SUSE bug 983739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983746">SUSE bug 983746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983752">SUSE bug 983752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983774">SUSE bug 983774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983794">SUSE bug 983794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983796">SUSE bug 983796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983799">SUSE bug 983799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983803">SUSE bug 983803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984018">SUSE bug 984018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984023">SUSE bug 984023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984028">SUSE bug 984028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984032">SUSE bug 984032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984035">SUSE bug 984035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984135">SUSE bug 984135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984137">SUSE bug 984137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984142">SUSE bug 984142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984144">SUSE bug 984144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984145">SUSE bug 984145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984150">SUSE bug 984150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984160">SUSE bug 984160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984166">SUSE bug 984166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984181">SUSE bug 984181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984184">SUSE bug 984184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984185">SUSE bug 984185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984186">SUSE bug 984186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984187">SUSE bug 984187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984193">SUSE bug 984193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984370">SUSE bug 984370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984372">SUSE bug 984372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984373">SUSE bug 984373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984374">SUSE bug 984374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984375">SUSE bug 984375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984379">SUSE bug 984379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984394">SUSE bug 984394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984398">SUSE bug 984398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984400">SUSE bug 984400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984401">SUSE bug 984401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984408">SUSE bug 984408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984409">SUSE bug 984409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984433">SUSE bug 984433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984436">SUSE bug 984436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985442">SUSE bug 985442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985448">SUSE bug 985448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985451">SUSE bug 985451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985456">SUSE bug 985456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985460">SUSE bug 985460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986608">SUSE bug 986608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986609">SUSE bug 986609</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9805/">CVE-2014-9805 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9805">CVE-2014-9805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9806/">CVE-2014-9806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9806">CVE-2014-9806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9807/">CVE-2014-9807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9807">CVE-2014-9807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9808/">CVE-2014-9808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9808">CVE-2014-9808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9809/">CVE-2014-9809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9809">CVE-2014-9809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9810/">CVE-2014-9810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9810">CVE-2014-9810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9811/">CVE-2014-9811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9811">CVE-2014-9811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9812/">CVE-2014-9812 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9812">CVE-2014-9812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9813/">CVE-2014-9813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9813">CVE-2014-9813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9814/">CVE-2014-9814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9814">CVE-2014-9814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9815/">CVE-2014-9815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9815">CVE-2014-9815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9816/">CVE-2014-9816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9816">CVE-2014-9816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9817/">CVE-2014-9817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9817">CVE-2014-9817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9818/">CVE-2014-9818 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9818">CVE-2014-9818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9819/">CVE-2014-9819 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9819">CVE-2014-9819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9820/">CVE-2014-9820 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9820">CVE-2014-9820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9822/">CVE-2014-9822 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9822">CVE-2014-9822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9823/">CVE-2014-9823 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9823">CVE-2014-9823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9824/">CVE-2014-9824 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9824">CVE-2014-9824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9826/">CVE-2014-9826 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9826">CVE-2014-9826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9828/">CVE-2014-9828 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9828">CVE-2014-9828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9829/">CVE-2014-9829 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9829">CVE-2014-9829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9830/">CVE-2014-9830 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9830">CVE-2014-9830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9831/">CVE-2014-9831 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9831">CVE-2014-9831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9834/">CVE-2014-9834 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9834">CVE-2014-9834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9835/">CVE-2014-9835 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9835">CVE-2014-9835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9836/">CVE-2014-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9836">CVE-2014-9836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9837/">CVE-2014-9837 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9837">CVE-2014-9837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9838/">CVE-2014-9838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9838">CVE-2014-9838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9839/">CVE-2014-9839 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9839">CVE-2014-9839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9840/">CVE-2014-9840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9840">CVE-2014-9840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9842/">CVE-2014-9842 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9842">CVE-2014-9842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9844/">CVE-2014-9844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9844">CVE-2014-9844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9845/">CVE-2014-9845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9845">CVE-2014-9845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9846/">CVE-2014-9846 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9846">CVE-2014-9846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9847/">CVE-2014-9847 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9847">CVE-2014-9847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9849/">CVE-2014-9849 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9849">CVE-2014-9849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9851/">CVE-2014-9851 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9851">CVE-2014-9851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9853/">CVE-2014-9853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9853">CVE-2014-9853 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9854/">CVE-2014-9854 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9854">CVE-2014-9854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8894/">CVE-2015-8894 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8894">CVE-2015-8894 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8896/">CVE-2015-8896 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8896">CVE-2015-8896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8897/">CVE-2015-8897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8897">CVE-2015-8897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8898/">CVE-2015-8898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8898">CVE-2015-8898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8901/">CVE-2015-8901 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8901">CVE-2015-8901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8902/">CVE-2015-8902 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8902">CVE-2015-8902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8903/">CVE-2015-8903 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8903">CVE-2015-8903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4562/">CVE-2016-4562 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4562">CVE-2016-4562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4563/">CVE-2016-4563 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4563">CVE-2016-4563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4564/">CVE-2016-4564 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4564">CVE-2016-4564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5687/">CVE-2016-5687 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5687">CVE-2016-5687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5688/">CVE-2016-5688 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5688">CVE-2016-5688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5689/">CVE-2016-5689 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5689">CVE-2016-5689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5690/">CVE-2016-5690 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5690">CVE-2016-5690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5691/">CVE-2016-5691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5691">CVE-2016-5691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5841/">CVE-2016-5841 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5841">CVE-2016-5841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5842/">CVE-2016-5842 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5842">CVE-2016-5842 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570422" comment="libMagickCore1-6.4.3.6-7.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570423" comment="libMagickCore1-32bit-6.4.3.6-7.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216785" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="991445" ref_url="https://bugzilla.suse.com/991445" source="BUGZILLA"/>
		<reference ref_id="991872" ref_url="https://bugzilla.suse.com/991872" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6491" ref_url="https://www.suse.com/security/cve/CVE-2016-6491/" source="CVE"/>
		<reference ref_id="CVE-2016-6520" ref_url="https://www.suse.com/security/cve/CVE-2016-6520/" source="CVE"/>
		<description>

This update for ImageMagick fixes the following issues:

- security update:
  * CVE-2016-6520: buffer overflow [bsc#991872]
  * CVE-2016-6491: Out-of-bounds read in CopyMagickMemory [bsc#991445]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-15"/>
	<updated date="2016-08-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/991445">SUSE bug 991445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991872">SUSE bug 991872</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6491/">CVE-2016-6491 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6491">CVE-2016-6491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6520/">CVE-2016-6520 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6520">CVE-2016-6520 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570424" comment="libMagickCore1-6.4.3.6-7.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570425" comment="libMagickCore1-32bit-6.4.3.6-7.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216786" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1000399" ref_url="https://bugzilla.suse.com/1000399" source="BUGZILLA"/>
		<reference ref_id="1000434" ref_url="https://bugzilla.suse.com/1000434" source="BUGZILLA"/>
		<reference ref_id="1000436" ref_url="https://bugzilla.suse.com/1000436" source="BUGZILLA"/>
		<reference ref_id="1000688" ref_url="https://bugzilla.suse.com/1000688" source="BUGZILLA"/>
		<reference ref_id="1000689" ref_url="https://bugzilla.suse.com/1000689" source="BUGZILLA"/>
		<reference ref_id="1000690" ref_url="https://bugzilla.suse.com/1000690" source="BUGZILLA"/>
		<reference ref_id="1000691" ref_url="https://bugzilla.suse.com/1000691" source="BUGZILLA"/>
		<reference ref_id="1000692" ref_url="https://bugzilla.suse.com/1000692" source="BUGZILLA"/>
		<reference ref_id="1000693" ref_url="https://bugzilla.suse.com/1000693" source="BUGZILLA"/>
		<reference ref_id="1000694" ref_url="https://bugzilla.suse.com/1000694" source="BUGZILLA"/>
		<reference ref_id="1000695" ref_url="https://bugzilla.suse.com/1000695" source="BUGZILLA"/>
		<reference ref_id="1000698" ref_url="https://bugzilla.suse.com/1000698" source="BUGZILLA"/>
		<reference ref_id="1000699" ref_url="https://bugzilla.suse.com/1000699" source="BUGZILLA"/>
		<reference ref_id="1000700" ref_url="https://bugzilla.suse.com/1000700" source="BUGZILLA"/>
		<reference ref_id="1000701" ref_url="https://bugzilla.suse.com/1000701" source="BUGZILLA"/>
		<reference ref_id="1000703" ref_url="https://bugzilla.suse.com/1000703" source="BUGZILLA"/>
		<reference ref_id="1000704" ref_url="https://bugzilla.suse.com/1000704" source="BUGZILLA"/>
		<reference ref_id="1000707" ref_url="https://bugzilla.suse.com/1000707" source="BUGZILLA"/>
		<reference ref_id="1000709" ref_url="https://bugzilla.suse.com/1000709" source="BUGZILLA"/>
		<reference ref_id="1000711" ref_url="https://bugzilla.suse.com/1000711" source="BUGZILLA"/>
		<reference ref_id="1000713" ref_url="https://bugzilla.suse.com/1000713" source="BUGZILLA"/>
		<reference ref_id="1000714" ref_url="https://bugzilla.suse.com/1000714" source="BUGZILLA"/>
		<reference ref_id="1001066" ref_url="https://bugzilla.suse.com/1001066" source="BUGZILLA"/>
		<reference ref_id="1001221" ref_url="https://bugzilla.suse.com/1001221" source="BUGZILLA"/>
		<reference ref_id="1002209" ref_url="https://bugzilla.suse.com/1002209" source="BUGZILLA"/>
		<reference ref_id="1002421" ref_url="https://bugzilla.suse.com/1002421" source="BUGZILLA"/>
		<reference ref_id="1002422" ref_url="https://bugzilla.suse.com/1002422" source="BUGZILLA"/>
		<reference ref_id="1003629" ref_url="https://bugzilla.suse.com/1003629" source="BUGZILLA"/>
		<reference ref_id="1005123" ref_url="https://bugzilla.suse.com/1005123" source="BUGZILLA"/>
		<reference ref_id="1005125" ref_url="https://bugzilla.suse.com/1005125" source="BUGZILLA"/>
		<reference ref_id="1005127" ref_url="https://bugzilla.suse.com/1005127" source="BUGZILLA"/>
		<reference ref_id="1007245" ref_url="https://bugzilla.suse.com/1007245" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9907" ref_url="https://www.suse.com/security/cve/CVE-2014-9907/" source="CVE"/>
		<reference ref_id="CVE-2015-8957" ref_url="https://www.suse.com/security/cve/CVE-2015-8957/" source="CVE"/>
		<reference ref_id="CVE-2015-8958" ref_url="https://www.suse.com/security/cve/CVE-2015-8958/" source="CVE"/>
		<reference ref_id="CVE-2015-8959" ref_url="https://www.suse.com/security/cve/CVE-2015-8959/" source="CVE"/>
		<reference ref_id="CVE-2016-5687" ref_url="https://www.suse.com/security/cve/CVE-2016-5687/" source="CVE"/>
		<reference ref_id="CVE-2016-6823" ref_url="https://www.suse.com/security/cve/CVE-2016-6823/" source="CVE"/>
		<reference ref_id="CVE-2016-7101" ref_url="https://www.suse.com/security/cve/CVE-2016-7101/" source="CVE"/>
		<reference ref_id="CVE-2016-7514" ref_url="https://www.suse.com/security/cve/CVE-2016-7514/" source="CVE"/>
		<reference ref_id="CVE-2016-7515" ref_url="https://www.suse.com/security/cve/CVE-2016-7515/" source="CVE"/>
		<reference ref_id="CVE-2016-7516" ref_url="https://www.suse.com/security/cve/CVE-2016-7516/" source="CVE"/>
		<reference ref_id="CVE-2016-7517" ref_url="https://www.suse.com/security/cve/CVE-2016-7517/" source="CVE"/>
		<reference ref_id="CVE-2016-7518" ref_url="https://www.suse.com/security/cve/CVE-2016-7518/" source="CVE"/>
		<reference ref_id="CVE-2016-7519" ref_url="https://www.suse.com/security/cve/CVE-2016-7519/" source="CVE"/>
		<reference ref_id="CVE-2016-7522" ref_url="https://www.suse.com/security/cve/CVE-2016-7522/" source="CVE"/>
		<reference ref_id="CVE-2016-7523" ref_url="https://www.suse.com/security/cve/CVE-2016-7523/" source="CVE"/>
		<reference ref_id="CVE-2016-7524" ref_url="https://www.suse.com/security/cve/CVE-2016-7524/" source="CVE"/>
		<reference ref_id="CVE-2016-7525" ref_url="https://www.suse.com/security/cve/CVE-2016-7525/" source="CVE"/>
		<reference ref_id="CVE-2016-7526" ref_url="https://www.suse.com/security/cve/CVE-2016-7526/" source="CVE"/>
		<reference ref_id="CVE-2016-7527" ref_url="https://www.suse.com/security/cve/CVE-2016-7527/" source="CVE"/>
		<reference ref_id="CVE-2016-7528" ref_url="https://www.suse.com/security/cve/CVE-2016-7528/" source="CVE"/>
		<reference ref_id="CVE-2016-7529" ref_url="https://www.suse.com/security/cve/CVE-2016-7529/" source="CVE"/>
		<reference ref_id="CVE-2016-7530" ref_url="https://www.suse.com/security/cve/CVE-2016-7530/" source="CVE"/>
		<reference ref_id="CVE-2016-7531" ref_url="https://www.suse.com/security/cve/CVE-2016-7531/" source="CVE"/>
		<reference ref_id="CVE-2016-7533" ref_url="https://www.suse.com/security/cve/CVE-2016-7533/" source="CVE"/>
		<reference ref_id="CVE-2016-7535" ref_url="https://www.suse.com/security/cve/CVE-2016-7535/" source="CVE"/>
		<reference ref_id="CVE-2016-7537" ref_url="https://www.suse.com/security/cve/CVE-2016-7537/" source="CVE"/>
		<reference ref_id="CVE-2016-7799" ref_url="https://www.suse.com/security/cve/CVE-2016-7799/" source="CVE"/>
		<reference ref_id="CVE-2016-7800" ref_url="https://www.suse.com/security/cve/CVE-2016-7800/" source="CVE"/>
		<reference ref_id="CVE-2016-7996" ref_url="https://www.suse.com/security/cve/CVE-2016-7996/" source="CVE"/>
		<reference ref_id="CVE-2016-7997" ref_url="https://www.suse.com/security/cve/CVE-2016-7997/" source="CVE"/>
		<reference ref_id="CVE-2016-8682" ref_url="https://www.suse.com/security/cve/CVE-2016-8682/" source="CVE"/>
		<reference ref_id="CVE-2016-8683" ref_url="https://www.suse.com/security/cve/CVE-2016-8683/" source="CVE"/>
		<reference ref_id="CVE-2016-8684" ref_url="https://www.suse.com/security/cve/CVE-2016-8684/" source="CVE"/>
		<reference ref_id="CVE-2016-8862" ref_url="https://www.suse.com/security/cve/CVE-2016-8862/" source="CVE"/>
		<description>

This update for ImageMagick fixes the following issues:

These vulnerabilities could be triggered by processing specially crafted image files,
which could lead to a process crash or resource consumtion, or potentially have
unspecified futher impact.

- CVE-2016-8862: Memory allocation failure in AcquireMagickMemory (bsc#1007245)
- CVE-2014-9907: DOS due to corrupted DDS files (bsc#1000714)
- CVE-2015-8959: DOS due to corrupted DDS files (bsc#1000713)
- CVE-2016-7537: Out of bound access for corrupted pdb file (bsc#1000711)
- CVE-2016-6823: BMP Coder Out-Of-Bounds Write Vulnerability (bsc#1001066)
- CVE-2016-7514: Out-of-bounds read in coders/psd.c (bsc#1000688)
- CVE-2016-7515: Rle file handling for corrupted file (bsc#1000689)
- CVE-2016-7529: out of bound in quantum handling (bsc#1000399)
- CVE-2016-7101: SGI Coder Out-Of-Bounds Read Vulnerability (bsc#1001221)
- CVE-2016-7527:  out of bound access in wpg file coder: (bsc#1000436)
- CVE-2016-7996, CVE-2016-7997: WPG Reader Issues (bsc#1003629)
- CVE-2016-7528: out of bound access in xcf file coder (bsc#1000434)
- CVE-2016-8683: Check that filesize is reasonable compared to the header value (bsc#1005127)
- CVE-2016-8682: Stack-buffer read overflow while reading SCT header (bsc#1005125)
- CVE-2016-8684: Mismatch between real filesize and header values (bsc#1005123)
- Buffer overflows in SIXEL, PDB, MAP, and TIFF coders (bsc#1002209)
- CVE-2016-7525: Heap buffer overflow in psd file coder (bsc#1000701)
- CVE-2016-7524: AddressSanitizer:heap-buffer-overflow READ of size 1 in meta.c:465 (bsc#1000700)
- CVE-2016-7530: Out of bound in quantum handling (bsc#1000703)
- CVE-2016-7531: Pbd file out of bound access (bsc#1000704)
- CVE-2016-7533: Wpg file out of bound for corrupted file (bsc#1000707)
- CVE-2016-7535: Out of bound access for corrupted psd file (bsc#1000709)
- CVE-2016-7522: Out of bound access for malformed psd file (bsc#1000698)
- CVE-2016-7517: out-of-bounds read in coders/pict.c (bsc#1000693)
- CVE-2016-7516: Out of bounds problem in rle, pict, viff and sun files (bsc#1000692)
- CVE-2015-8958: Potential DOS in sun file handling due to malformed files (bsc#1000691)
- CVE-2015-8957: Buffer overflow in sun file handling (bsc#1000690)
- CVE-2016-7519: out-of-bounds read in coders/rle.c (bsc#1000695)
- CVE-2016-7518: out-of-bounds read in coders/sun.c (bsc#1000694)
- CVE-2016-7800: 8BIM/8BIMW unsigned underflow leads to heap overflow (bsc#1002422)
- CVE-2016-7523: AddressSanitizer:heap-buffer-overflow READ of size 1 meta.c:496 (bsc#1000699)
- CVE-2016-7799: mogrify global buffer overflow (bsc#1002421)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-01"/>
	<updated date="2016-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000399">SUSE bug 1000399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000434">SUSE bug 1000434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000436">SUSE bug 1000436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000688">SUSE bug 1000688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000689">SUSE bug 1000689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000690">SUSE bug 1000690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000691">SUSE bug 1000691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000692">SUSE bug 1000692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000693">SUSE bug 1000693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000694">SUSE bug 1000694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000695">SUSE bug 1000695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000698">SUSE bug 1000698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000699">SUSE bug 1000699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000700">SUSE bug 1000700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000701">SUSE bug 1000701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000703">SUSE bug 1000703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000704">SUSE bug 1000704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000707">SUSE bug 1000707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000709">SUSE bug 1000709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000711">SUSE bug 1000711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000713">SUSE bug 1000713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000714">SUSE bug 1000714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001066">SUSE bug 1001066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001221">SUSE bug 1001221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002209">SUSE bug 1002209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002421">SUSE bug 1002421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002422">SUSE bug 1002422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003629">SUSE bug 1003629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005123">SUSE bug 1005123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005125">SUSE bug 1005125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005127">SUSE bug 1005127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007245">SUSE bug 1007245</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9907/">CVE-2014-9907 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9907">CVE-2014-9907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8957/">CVE-2015-8957 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8957">CVE-2015-8957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8958/">CVE-2015-8958 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8958">CVE-2015-8958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8959/">CVE-2015-8959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8959">CVE-2015-8959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5687/">CVE-2016-5687 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5687">CVE-2016-5687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6823/">CVE-2016-6823 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6823">CVE-2016-6823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7101/">CVE-2016-7101 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7101">CVE-2016-7101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7514/">CVE-2016-7514 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7514">CVE-2016-7514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7515/">CVE-2016-7515 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7515">CVE-2016-7515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7516/">CVE-2016-7516 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7516">CVE-2016-7516 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7517/">CVE-2016-7517 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7517">CVE-2016-7517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7518/">CVE-2016-7518 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7518">CVE-2016-7518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7519/">CVE-2016-7519 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7519">CVE-2016-7519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7522/">CVE-2016-7522 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7522">CVE-2016-7522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7523/">CVE-2016-7523 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7523">CVE-2016-7523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7524/">CVE-2016-7524 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7524">CVE-2016-7524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7525/">CVE-2016-7525 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7525">CVE-2016-7525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7526/">CVE-2016-7526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7526">CVE-2016-7526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7527/">CVE-2016-7527 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7527">CVE-2016-7527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7528/">CVE-2016-7528 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7528">CVE-2016-7528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7529/">CVE-2016-7529 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7529">CVE-2016-7529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7530/">CVE-2016-7530 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7530">CVE-2016-7530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7531/">CVE-2016-7531 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7531">CVE-2016-7531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7533/">CVE-2016-7533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7533">CVE-2016-7533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7535/">CVE-2016-7535 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7535">CVE-2016-7535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7537/">CVE-2016-7537 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7537">CVE-2016-7537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7799/">CVE-2016-7799 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7799">CVE-2016-7799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7800/">CVE-2016-7800 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7800">CVE-2016-7800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7996/">CVE-2016-7996 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7996">CVE-2016-7996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7997/">CVE-2016-7997 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7997">CVE-2016-7997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8682/">CVE-2016-8682 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8682">CVE-2016-8682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8683/">CVE-2016-8683 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8683">CVE-2016-8683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8684/">CVE-2016-8684 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8684">CVE-2016-8684 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8862/">CVE-2016-8862 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8862">CVE-2016-8862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570426" comment="libMagickCore1-6.4.3.6-7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570427" comment="libMagickCore1-32bit-6.4.3.6-7.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216787" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1009318" ref_url="https://bugzilla.suse.com/1009318" source="BUGZILLA"/>
		<reference ref_id="1011130" ref_url="https://bugzilla.suse.com/1011130" source="BUGZILLA"/>
		<reference ref_id="1011136" ref_url="https://bugzilla.suse.com/1011136" source="BUGZILLA"/>
		<reference ref_id="1013376" ref_url="https://bugzilla.suse.com/1013376" source="BUGZILLA"/>
		<reference ref_id="1014159" ref_url="https://bugzilla.suse.com/1014159" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7530" ref_url="https://www.suse.com/security/cve/CVE-2016-7530/" source="CVE"/>
		<reference ref_id="CVE-2016-8707" ref_url="https://www.suse.com/security/cve/CVE-2016-8707/" source="CVE"/>
		<reference ref_id="CVE-2016-8866" ref_url="https://www.suse.com/security/cve/CVE-2016-8866/" source="CVE"/>
		<reference ref_id="CVE-2016-9556" ref_url="https://www.suse.com/security/cve/CVE-2016-9556/" source="CVE"/>
		<reference ref_id="CVE-2016-9559" ref_url="https://www.suse.com/security/cve/CVE-2016-9559/" source="CVE"/>
		<reference ref_id="CVE-2016-9773" ref_url="https://www.suse.com/security/cve/CVE-2016-9773/" source="CVE"/>
		<description>

This update for ImageMagick fixes the following issues:

* CVE-2016-9556: Possible Heap-overflow found by fuzzing [bsc#1011130]
* CVE-2016-9559: Possible Null pointer access found by fuzzing [bsc#1011136]
* CVE-2016-8707: Possible code execution in the tiff deflate convert code [bsc#1014159]
* CVE-2016-9773: Possible Heap overflow in IsPixelGray [bsc#1013376]
* CVE-2016-8866: Possible memory allocation failure in AcquireMagickMemory [bsc#1009318]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-23"/>
	<updated date="2016-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009318">SUSE bug 1009318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011130">SUSE bug 1011130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011136">SUSE bug 1011136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013376">SUSE bug 1013376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014159">SUSE bug 1014159</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7530/">CVE-2016-7530 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7530">CVE-2016-7530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8707/">CVE-2016-8707 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8707">CVE-2016-8707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8866/">CVE-2016-8866 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8866">CVE-2016-8866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9556/">CVE-2016-9556 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9556">CVE-2016-9556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9559/">CVE-2016-9559 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9559">CVE-2016-9559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9773/">CVE-2016-9773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9773">CVE-2016-9773 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570428" comment="libMagickCore1-6.4.3.6-7.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570429" comment="libMagickCore1-32bit-6.4.3.6-7.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216788" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1017308" ref_url="https://bugzilla.suse.com/1017308" source="BUGZILLA"/>
		<reference ref_id="1017310" ref_url="https://bugzilla.suse.com/1017310" source="BUGZILLA"/>
		<reference ref_id="1017311" ref_url="https://bugzilla.suse.com/1017311" source="BUGZILLA"/>
		<reference ref_id="1017312" ref_url="https://bugzilla.suse.com/1017312" source="BUGZILLA"/>
		<reference ref_id="1017313" ref_url="https://bugzilla.suse.com/1017313" source="BUGZILLA"/>
		<reference ref_id="1017314" ref_url="https://bugzilla.suse.com/1017314" source="BUGZILLA"/>
		<reference ref_id="1017318" ref_url="https://bugzilla.suse.com/1017318" source="BUGZILLA"/>
		<reference ref_id="1017319" ref_url="https://bugzilla.suse.com/1017319" source="BUGZILLA"/>
		<reference ref_id="1017320" ref_url="https://bugzilla.suse.com/1017320" source="BUGZILLA"/>
		<reference ref_id="1017321" ref_url="https://bugzilla.suse.com/1017321" source="BUGZILLA"/>
		<reference ref_id="1017322" ref_url="https://bugzilla.suse.com/1017322" source="BUGZILLA"/>
		<reference ref_id="1017324" ref_url="https://bugzilla.suse.com/1017324" source="BUGZILLA"/>
		<reference ref_id="1017326" ref_url="https://bugzilla.suse.com/1017326" source="BUGZILLA"/>
		<reference ref_id="1017421" ref_url="https://bugzilla.suse.com/1017421" source="BUGZILLA"/>
		<reference ref_id="1020433" ref_url="https://bugzilla.suse.com/1020433" source="BUGZILLA"/>
		<reference ref_id="1020435" ref_url="https://bugzilla.suse.com/1020435" source="BUGZILLA"/>
		<reference ref_id="1020436" ref_url="https://bugzilla.suse.com/1020436" source="BUGZILLA"/>
		<reference ref_id="1020439" ref_url="https://bugzilla.suse.com/1020439" source="BUGZILLA"/>
		<reference ref_id="1020441" ref_url="https://bugzilla.suse.com/1020441" source="BUGZILLA"/>
		<reference ref_id="1020443" ref_url="https://bugzilla.suse.com/1020443" source="BUGZILLA"/>
		<reference ref_id="1020448" ref_url="https://bugzilla.suse.com/1020448" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10046" ref_url="https://www.suse.com/security/cve/CVE-2016-10046/" source="CVE"/>
		<reference ref_id="CVE-2016-10048" ref_url="https://www.suse.com/security/cve/CVE-2016-10048/" source="CVE"/>
		<reference ref_id="CVE-2016-10049" ref_url="https://www.suse.com/security/cve/CVE-2016-10049/" source="CVE"/>
		<reference ref_id="CVE-2016-10050" ref_url="https://www.suse.com/security/cve/CVE-2016-10050/" source="CVE"/>
		<reference ref_id="CVE-2016-10051" ref_url="https://www.suse.com/security/cve/CVE-2016-10051/" source="CVE"/>
		<reference ref_id="CVE-2016-10052" ref_url="https://www.suse.com/security/cve/CVE-2016-10052/" source="CVE"/>
		<reference ref_id="CVE-2016-10059" ref_url="https://www.suse.com/security/cve/CVE-2016-10059/" source="CVE"/>
		<reference ref_id="CVE-2016-10060" ref_url="https://www.suse.com/security/cve/CVE-2016-10060/" source="CVE"/>
		<reference ref_id="CVE-2016-10063" ref_url="https://www.suse.com/security/cve/CVE-2016-10063/" source="CVE"/>
		<reference ref_id="CVE-2016-10064" ref_url="https://www.suse.com/security/cve/CVE-2016-10064/" source="CVE"/>
		<reference ref_id="CVE-2016-10065" ref_url="https://www.suse.com/security/cve/CVE-2016-10065/" source="CVE"/>
		<reference ref_id="CVE-2016-10068" ref_url="https://www.suse.com/security/cve/CVE-2016-10068/" source="CVE"/>
		<reference ref_id="CVE-2016-10070" ref_url="https://www.suse.com/security/cve/CVE-2016-10070/" source="CVE"/>
		<reference ref_id="CVE-2016-10071" ref_url="https://www.suse.com/security/cve/CVE-2016-10071/" source="CVE"/>
		<reference ref_id="CVE-2016-10144" ref_url="https://www.suse.com/security/cve/CVE-2016-10144/" source="CVE"/>
		<reference ref_id="CVE-2016-10145" ref_url="https://www.suse.com/security/cve/CVE-2016-10145/" source="CVE"/>
		<reference ref_id="CVE-2016-10146" ref_url="https://www.suse.com/security/cve/CVE-2016-10146/" source="CVE"/>
		<reference ref_id="CVE-2017-5506" ref_url="https://www.suse.com/security/cve/CVE-2017-5506/" source="CVE"/>
		<reference ref_id="CVE-2017-5507" ref_url="https://www.suse.com/security/cve/CVE-2017-5507/" source="CVE"/>
		<reference ref_id="CVE-2017-5508" ref_url="https://www.suse.com/security/cve/CVE-2017-5508/" source="CVE"/>
		<reference ref_id="CVE-2017-5511" ref_url="https://www.suse.com/security/cve/CVE-2017-5511/" source="CVE"/>
		<description>

This update for ImageMagick fixes the following issues:

- CVE-2016-10046: Prevent buffer overflow in draw.c caused by an incorrect length calculation (bsc#1017308)
- CVE-2016-10048: Arbitrary module could have been load because relative path were not escaped (bsc#1017310)
- CVE-2016-10049: Corrupt RLE files could have overflowed a buffer due to a incorrect length calculation (bsc#1017311)
- CVE-2016-10050: Corrupt RLE files could have overflowed a heap buffer due to a missing offset check (bsc#1017312)
- CVE-2016-10051: Fixed use after free when reading PWP files (bsc#1017313)
- CVE-2016-10052: Added bound check to exif parsing of JPEG files (bsc#1017314).
- CVE-2016-10059: Unchecked calculation when reading TIFF files could have lead to a buffer overflow (bsc#1017318)
- CVE-2016-10060: Improved error handling when writing files to not mask errors (bsc#1017319).
- CVE-2016-10063: Check validity of extend during TIFF file reading (bsc#1017320).
- CVE-2016-10064: Improved checks for buffer overflow when reading TIFF files (bsc#1017321)
- CVE-2016-10065: Unchecked calculations when reading VIFF files could have lead to out of bound reads (bsc#1017322)
- CVE-2016-10068: Prevent NULL pointer access when using the MSL interpreter (bsc#1017324)
- CVE-2016-10070: Prevent allocating the wrong amount of memory when reading mat files (bsc#1017326)
- CVE-2016-10071: Prevent allocating the wrong amount of memory when reading mat files (bsc#1017326).
- CVE-2016-10144: Added a check after allocating memory when parsing IPL files (bsc#1020433).
- CVE-2016-10145: Fixed of-by-one in string copy operation when parsing WPG files (bsc#1020435).
- CVE-2016-10146: Captions and labels were handled incorrectly, causing a memory leak that could have lead to DoS (bsc#1020443)
- CVE-2017-5506: Missing offset check leading to a double-free (bsc#1020436).
- CVE-2017-5507: Fixed a memory leak when reading MPC files allowing for DoS (bsc#1020439).
- CVE-2017-5508: Increase the amount of memory allocated for TIFF pixels to prevent a heap buffer-overflow (bsc#1020441).
- CVE-2017-5511: A missing cast when reading PSD files could have caused memory corruption by a heap overflow (bsc#1020448)

This update removes the fix for CVE-2016-9773. ImageMagick-6 was not affected by CVE-2016-9773 and it caused a regression (at least in GraphicsMagick) (bsc#1017421).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-01"/>
	<updated date="2017-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017308">SUSE bug 1017308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017310">SUSE bug 1017310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017311">SUSE bug 1017311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017312">SUSE bug 1017312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017313">SUSE bug 1017313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017314">SUSE bug 1017314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017318">SUSE bug 1017318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017319">SUSE bug 1017319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017320">SUSE bug 1017320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017321">SUSE bug 1017321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017322">SUSE bug 1017322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017324">SUSE bug 1017324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017326">SUSE bug 1017326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017421">SUSE bug 1017421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020433">SUSE bug 1020433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020435">SUSE bug 1020435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020436">SUSE bug 1020436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020439">SUSE bug 1020439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020441">SUSE bug 1020441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020443">SUSE bug 1020443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020448">SUSE bug 1020448</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10046/">CVE-2016-10046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10046">CVE-2016-10046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10048/">CVE-2016-10048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10048">CVE-2016-10048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10049/">CVE-2016-10049 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10049">CVE-2016-10049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10050/">CVE-2016-10050 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10050">CVE-2016-10050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10051/">CVE-2016-10051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10051">CVE-2016-10051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10052/">CVE-2016-10052 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10052">CVE-2016-10052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10059/">CVE-2016-10059 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10059">CVE-2016-10059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10060/">CVE-2016-10060 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10060">CVE-2016-10060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10063/">CVE-2016-10063 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10063">CVE-2016-10063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10064/">CVE-2016-10064 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10064">CVE-2016-10064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10065/">CVE-2016-10065 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10065">CVE-2016-10065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10068/">CVE-2016-10068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10068">CVE-2016-10068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10070/">CVE-2016-10070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10070">CVE-2016-10070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10071/">CVE-2016-10071 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10071">CVE-2016-10071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10144/">CVE-2016-10144 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10144">CVE-2016-10144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10145/">CVE-2016-10145 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10145">CVE-2016-10145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10146/">CVE-2016-10146 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10146">CVE-2016-10146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5506/">CVE-2017-5506 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5506">CVE-2017-5506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5507/">CVE-2017-5507 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5507">CVE-2017-5507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5508/">CVE-2017-5508 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5508">CVE-2017-5508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5511/">CVE-2017-5511 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5511">CVE-2017-5511 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570430" comment="libMagickCore1-6.4.3.6-7.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570431" comment="libMagickCore1-32bit-6.4.3.6-7.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216789" version="1" class="patch">
	<metadata>
		<title>Recommended update for ImageMagick (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1027480" ref_url="https://bugzilla.suse.com/1027480" source="BUGZILLA"/>
		<reference ref_id="1028079" ref_url="https://bugzilla.suse.com/1028079" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7518" ref_url="https://www.suse.com/security/cve/CVE-2016-7518/" source="CVE"/>
		<description>

This update for ImageMagick provides the following fixes:

- Fix segmentation fault when wrong parameter supplied to conjure command (bsc#1027480).
- Improve CVE-2016-7518 patch to fix sun coder (bsc#1028079 comment 5).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-29"/>
	<updated date="2017-03-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1027480">SUSE bug 1027480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028079">SUSE bug 1028079</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7518/">CVE-2016-7518 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7518">CVE-2016-7518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594210" comment="libMagickCore1-6.4.3.6-7.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594211" comment="libMagickCore1-32bit-6.4.3.6-7.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216790" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1033091" ref_url="https://bugzilla.suse.com/1033091" source="BUGZILLA"/>
		<reference ref_id="1034870" ref_url="https://bugzilla.suse.com/1034870" source="BUGZILLA"/>
		<reference ref_id="1034872" ref_url="https://bugzilla.suse.com/1034872" source="BUGZILLA"/>
		<reference ref_id="1034876" ref_url="https://bugzilla.suse.com/1034876" source="BUGZILLA"/>
		<reference ref_id="1036976" ref_url="https://bugzilla.suse.com/1036976" source="BUGZILLA"/>
		<reference ref_id="1036978" ref_url="https://bugzilla.suse.com/1036978" source="BUGZILLA"/>
		<reference ref_id="1036980" ref_url="https://bugzilla.suse.com/1036980" source="BUGZILLA"/>
		<reference ref_id="1036981" ref_url="https://bugzilla.suse.com/1036981" source="BUGZILLA"/>
		<reference ref_id="1036983" ref_url="https://bugzilla.suse.com/1036983" source="BUGZILLA"/>
		<reference ref_id="1036984" ref_url="https://bugzilla.suse.com/1036984" source="BUGZILLA"/>
		<reference ref_id="1036985" ref_url="https://bugzilla.suse.com/1036985" source="BUGZILLA"/>
		<reference ref_id="1036986" ref_url="https://bugzilla.suse.com/1036986" source="BUGZILLA"/>
		<reference ref_id="1036987" ref_url="https://bugzilla.suse.com/1036987" source="BUGZILLA"/>
		<reference ref_id="1036988" ref_url="https://bugzilla.suse.com/1036988" source="BUGZILLA"/>
		<reference ref_id="1036989" ref_url="https://bugzilla.suse.com/1036989" source="BUGZILLA"/>
		<reference ref_id="1036990" ref_url="https://bugzilla.suse.com/1036990" source="BUGZILLA"/>
		<reference ref_id="1037527" ref_url="https://bugzilla.suse.com/1037527" source="BUGZILLA"/>
		<reference ref_id="1038000" ref_url="https://bugzilla.suse.com/1038000" source="BUGZILLA"/>
		<reference ref_id="1040025" ref_url="https://bugzilla.suse.com/1040025" source="BUGZILLA"/>
		<reference ref_id="1040303" ref_url="https://bugzilla.suse.com/1040303" source="BUGZILLA"/>
		<reference ref_id="1040304" ref_url="https://bugzilla.suse.com/1040304" source="BUGZILLA"/>
		<reference ref_id="1040306" ref_url="https://bugzilla.suse.com/1040306" source="BUGZILLA"/>
		<reference ref_id="1040332" ref_url="https://bugzilla.suse.com/1040332" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9846" ref_url="https://www.suse.com/security/cve/CVE-2014-9846/" source="CVE"/>
		<reference ref_id="CVE-2016-10050" ref_url="https://www.suse.com/security/cve/CVE-2016-10050/" source="CVE"/>
		<reference ref_id="CVE-2017-7606" ref_url="https://www.suse.com/security/cve/CVE-2017-7606/" source="CVE"/>
		<reference ref_id="CVE-2017-7941" ref_url="https://www.suse.com/security/cve/CVE-2017-7941/" source="CVE"/>
		<reference ref_id="CVE-2017-7942" ref_url="https://www.suse.com/security/cve/CVE-2017-7942/" source="CVE"/>
		<reference ref_id="CVE-2017-7943" ref_url="https://www.suse.com/security/cve/CVE-2017-7943/" source="CVE"/>
		<reference ref_id="CVE-2017-8344" ref_url="https://www.suse.com/security/cve/CVE-2017-8344/" source="CVE"/>
		<reference ref_id="CVE-2017-8345" ref_url="https://www.suse.com/security/cve/CVE-2017-8345/" source="CVE"/>
		<reference ref_id="CVE-2017-8346" ref_url="https://www.suse.com/security/cve/CVE-2017-8346/" source="CVE"/>
		<reference ref_id="CVE-2017-8348" ref_url="https://www.suse.com/security/cve/CVE-2017-8348/" source="CVE"/>
		<reference ref_id="CVE-2017-8349" ref_url="https://www.suse.com/security/cve/CVE-2017-8349/" source="CVE"/>
		<reference ref_id="CVE-2017-8350" ref_url="https://www.suse.com/security/cve/CVE-2017-8350/" source="CVE"/>
		<reference ref_id="CVE-2017-8351" ref_url="https://www.suse.com/security/cve/CVE-2017-8351/" source="CVE"/>
		<reference ref_id="CVE-2017-8352" ref_url="https://www.suse.com/security/cve/CVE-2017-8352/" source="CVE"/>
		<reference ref_id="CVE-2017-8353" ref_url="https://www.suse.com/security/cve/CVE-2017-8353/" source="CVE"/>
		<reference ref_id="CVE-2017-8354" ref_url="https://www.suse.com/security/cve/CVE-2017-8354/" source="CVE"/>
		<reference ref_id="CVE-2017-8355" ref_url="https://www.suse.com/security/cve/CVE-2017-8355/" source="CVE"/>
		<reference ref_id="CVE-2017-8357" ref_url="https://www.suse.com/security/cve/CVE-2017-8357/" source="CVE"/>
		<reference ref_id="CVE-2017-8765" ref_url="https://www.suse.com/security/cve/CVE-2017-8765/" source="CVE"/>
		<reference ref_id="CVE-2017-8830" ref_url="https://www.suse.com/security/cve/CVE-2017-8830/" source="CVE"/>
		<reference ref_id="CVE-2017-9098" ref_url="https://www.suse.com/security/cve/CVE-2017-9098/" source="CVE"/>
		<reference ref_id="CVE-2017-9141" ref_url="https://www.suse.com/security/cve/CVE-2017-9141/" source="CVE"/>
		<reference ref_id="CVE-2017-9142" ref_url="https://www.suse.com/security/cve/CVE-2017-9142/" source="CVE"/>
		<reference ref_id="CVE-2017-9143" ref_url="https://www.suse.com/security/cve/CVE-2017-9143/" source="CVE"/>
		<reference ref_id="CVE-2017-9144" ref_url="https://www.suse.com/security/cve/CVE-2017-9144/" source="CVE"/>
		<description>

This update for ImageMagick fixes the following issues:

This security issue was fixed:

- CVE-2017-7941: The ReadSGIImage function in sgi.c allowed remote attackers to consume an
  amount of available memory via a crafted file (bsc#1034876).
- CVE-2017-8351: ImageMagick, GraphicsMagick: denial of service (memory leak) via a crafted
  file (ReadPCDImage func in pcd.c) (bsc#1036986).
- CVE-2017-8352: denial of service (memory leak) via a crafted file (ReadXWDImage func in
  xwd.c) (bsc#1036987)
- CVE-2017-8349: denial of service (memory leak) via a crafted file (ReadSFWImage func in
  sfw.c) (bsc#1036984)
- CVE-2017-8350: denial of service (memory leak) via a crafted file (ReadJNGImage function in
  png.c) (bsc#1036985)
- CVE-2017-8345: denial of service (memory leak) via a crafted file (ReadMNGImage func in
  png.c) (bsc#1036980)
- CVE-2017-8346: denial of service (memory leak) via a crafted file (ReadDCMImage func in
  dcm.c) (bsc#1036981)
- CVE-2017-8353: denial of service (memory leak) via a crafted file (ReadPICTImage func in
  pict.c) (bsc#1036988)
- CVE-2017-8830: denial of service (memory leak) via a crafted file (ReadBMPImage func in
  bmp.c:1379) (bsc#1038000)
- CVE-2017-7606: denial of service (application crash) or possibly have unspecified other
  impact via a crafted image (bsc#1033091)
- CVE-2017-8765: memory leak vulnerability via a crafted ICON file (ReadICONImage in
  coders\icon.c) (bsc#1037527)
- CVE-2017-8355: denial of service (memory leak) via a crafted file (ReadMTVImage func in
  mtv.c) (bsc#1036990)
- CVE-2017-8344: denial of service (memory leak) via a crafted file (ReadPCXImage func in
  pcx.c) (bsc#1036978)
- CVE-2017-9098: uninitialized memory usage in the  ReadRLEImage RLE decoder 
  function coders/rle.c (bsc#1040025)
- CVE-2017-9141: Missing checks in the ReadDDSImage function in
  coders/dds.c could lead to a denial of service (assertion) (bsc#1040303)
- CVE-2017-9142: Missing checks in theReadOneJNGImage function in
  coders/png.c could lead to denial of service (assertion) (bsc#1040304)
- CVE-2017-9143: A possible denial of service attack via crafted .art
  file in ReadARTImage function in coders/art.c (bsc#1040306)
- CVE-2017-9144: A crafted RLE image can trigger a crash in coders/rle.c
  could lead to a denial of service (crash) (bsc#1040332)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-19"/>
	<updated date="2017-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033091">SUSE bug 1033091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034870">SUSE bug 1034870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034872">SUSE bug 1034872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034876">SUSE bug 1034876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036976">SUSE bug 1036976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036978">SUSE bug 1036978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036980">SUSE bug 1036980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036981">SUSE bug 1036981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036983">SUSE bug 1036983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036984">SUSE bug 1036984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036985">SUSE bug 1036985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036986">SUSE bug 1036986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036987">SUSE bug 1036987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036988">SUSE bug 1036988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036989">SUSE bug 1036989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036990">SUSE bug 1036990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037527">SUSE bug 1037527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038000">SUSE bug 1038000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040025">SUSE bug 1040025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040303">SUSE bug 1040303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040304">SUSE bug 1040304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040306">SUSE bug 1040306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040332">SUSE bug 1040332</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9846/">CVE-2014-9846 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9846">CVE-2014-9846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10050/">CVE-2016-10050 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10050">CVE-2016-10050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7606/">CVE-2017-7606 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7606">CVE-2017-7606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7941/">CVE-2017-7941 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7941">CVE-2017-7941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7942/">CVE-2017-7942 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7942">CVE-2017-7942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7943/">CVE-2017-7943 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7943">CVE-2017-7943 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8344/">CVE-2017-8344 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8344">CVE-2017-8344 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8345/">CVE-2017-8345 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8345">CVE-2017-8345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8346/">CVE-2017-8346 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8346">CVE-2017-8346 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8348/">CVE-2017-8348 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8348">CVE-2017-8348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8349/">CVE-2017-8349 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8349">CVE-2017-8349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8350/">CVE-2017-8350 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8350">CVE-2017-8350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8351/">CVE-2017-8351 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8351">CVE-2017-8351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8352/">CVE-2017-8352 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8352">CVE-2017-8352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8353/">CVE-2017-8353 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8353">CVE-2017-8353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8354/">CVE-2017-8354 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8354">CVE-2017-8354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8355/">CVE-2017-8355 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8355">CVE-2017-8355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8357/">CVE-2017-8357 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8357">CVE-2017-8357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8765/">CVE-2017-8765 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8765">CVE-2017-8765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8830/">CVE-2017-8830 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8830">CVE-2017-8830 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9098/">CVE-2017-9098 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9098">CVE-2017-9098 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9141/">CVE-2017-9141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9141">CVE-2017-9141 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9142/">CVE-2017-9142 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9142">CVE-2017-9142 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9143/">CVE-2017-9143 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9143">CVE-2017-9143 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9144/">CVE-2017-9144 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9144">CVE-2017-9144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570432" comment="libMagickCore1-6.4.3.6-7.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570433" comment="libMagickCore1-32bit-6.4.3.6-7.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216791" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1042826" ref_url="https://bugzilla.suse.com/1042826" source="BUGZILLA"/>
		<reference ref_id="1043289" ref_url="https://bugzilla.suse.com/1043289" source="BUGZILLA"/>
		<reference ref_id="1049072" ref_url="https://bugzilla.suse.com/1049072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11403" ref_url="https://www.suse.com/security/cve/CVE-2017-11403/" source="CVE"/>
		<reference ref_id="CVE-2017-9439" ref_url="https://www.suse.com/security/cve/CVE-2017-9439/" source="CVE"/>
		<reference ref_id="CVE-2017-9501" ref_url="https://www.suse.com/security/cve/CVE-2017-9501/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:
- CVE-2017-9439: A memory leak was found in the function ReadPDBImage incoders/pdb.c (bsc#1042826)
- CVE-2017-9501: An assertion failure could cause a denial of service via a crafted file (bsc#1043289)
- CVE-2017-11403: ReadMNGImage function in coders/png.c has an out-of-order CloseBlob call, resulting
  in a use-after-free via acrafted file (bsc#1049072)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-16"/>
	<updated date="2017-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1042826">SUSE bug 1042826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043289">SUSE bug 1043289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049072">SUSE bug 1049072</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11403/">CVE-2017-11403 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11403">CVE-2017-11403 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9439/">CVE-2017-9439 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9439">CVE-2017-9439 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9501/">CVE-2017-9501 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9501">CVE-2017-9501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570434" comment="libMagickCore1-6.4.3.6-7.78.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570435" comment="libMagickCore1-32bit-6.4.3.6-7.78.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216792" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1050135" ref_url="https://bugzilla.suse.com/1050135" source="BUGZILLA"/>
		<reference ref_id="1055219" ref_url="https://bugzilla.suse.com/1055219" source="BUGZILLA"/>
		<reference ref_id="1055430" ref_url="https://bugzilla.suse.com/1055430" source="BUGZILLA"/>
		<reference ref_id="1061873" ref_url="https://bugzilla.suse.com/1061873" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11534" ref_url="https://www.suse.com/security/cve/CVE-2017-11534/" source="CVE"/>
		<reference ref_id="CVE-2017-13133" ref_url="https://www.suse.com/security/cve/CVE-2017-13133/" source="CVE"/>
		<reference ref_id="CVE-2017-13139" ref_url="https://www.suse.com/security/cve/CVE-2017-13139/" source="CVE"/>
		<reference ref_id="CVE-2017-15033" ref_url="https://www.suse.com/security/cve/CVE-2017-15033/" source="CVE"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2017-11534: Processing a crafted file in convert could have lead to a
  Memory Leak in the lite_font_map() function in coders/wmf.c (bsc#1050135).
- CVE-2017-13133: The load_level function in coders/xcf.c lacked offset
  validation, which allowed attackers to cause a denial of service (load_tile
  memory exhaustion) via a crafted file (bsc#1055219).
- CVE-2017-13139: The ReadOneMNGImage function in coders/png.c had an
  out-of-bounds read with the MNG CLIP chunk (bsc#1055430).
- CVE-2017-15033: Fixed a memory leak in ReadYUVImage in coders/yuv.c
  (bsc#1061873).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-30"/>
	<updated date="2017-11-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050135">SUSE bug 1050135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055219">SUSE bug 1055219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055430">SUSE bug 1055430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061873">SUSE bug 1061873</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11534/">CVE-2017-11534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11534">CVE-2017-11534 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13133/">CVE-2017-13133 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13133">CVE-2017-13133 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13139/">CVE-2017-13139 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13139">CVE-2017-13139 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15033/">CVE-2017-15033 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15033">CVE-2017-15033 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570436" comment="libMagickCore1-6.4.3.6-7.78.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570437" comment="libMagickCore1-32bit-6.4.3.6-7.78.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216793" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1048457" ref_url="https://bugzilla.suse.com/1048457" source="BUGZILLA"/>
		<reference ref_id="1049796" ref_url="https://bugzilla.suse.com/1049796" source="BUGZILLA"/>
		<reference ref_id="1050116" ref_url="https://bugzilla.suse.com/1050116" source="BUGZILLA"/>
		<reference ref_id="1050139" ref_url="https://bugzilla.suse.com/1050139" source="BUGZILLA"/>
		<reference ref_id="1050632" ref_url="https://bugzilla.suse.com/1050632" source="BUGZILLA"/>
		<reference ref_id="1051441" ref_url="https://bugzilla.suse.com/1051441" source="BUGZILLA"/>
		<reference ref_id="1051847" ref_url="https://bugzilla.suse.com/1051847" source="BUGZILLA"/>
		<reference ref_id="1052450" ref_url="https://bugzilla.suse.com/1052450" source="BUGZILLA"/>
		<reference ref_id="1052553" ref_url="https://bugzilla.suse.com/1052553" source="BUGZILLA"/>
		<reference ref_id="1052689" ref_url="https://bugzilla.suse.com/1052689" source="BUGZILLA"/>
		<reference ref_id="1052758" ref_url="https://bugzilla.suse.com/1052758" source="BUGZILLA"/>
		<reference ref_id="1052764" ref_url="https://bugzilla.suse.com/1052764" source="BUGZILLA"/>
		<reference ref_id="1054757" ref_url="https://bugzilla.suse.com/1054757" source="BUGZILLA"/>
		<reference ref_id="1055214" ref_url="https://bugzilla.suse.com/1055214" source="BUGZILLA"/>
		<reference ref_id="1056432" ref_url="https://bugzilla.suse.com/1056432" source="BUGZILLA"/>
		<reference ref_id="1057719" ref_url="https://bugzilla.suse.com/1057719" source="BUGZILLA"/>
		<reference ref_id="1057729" ref_url="https://bugzilla.suse.com/1057729" source="BUGZILLA"/>
		<reference ref_id="1057730" ref_url="https://bugzilla.suse.com/1057730" source="BUGZILLA"/>
		<reference ref_id="1058485" ref_url="https://bugzilla.suse.com/1058485" source="BUGZILLA"/>
		<reference ref_id="1058637" ref_url="https://bugzilla.suse.com/1058637" source="BUGZILLA"/>
		<reference ref_id="1059666" ref_url="https://bugzilla.suse.com/1059666" source="BUGZILLA"/>
		<reference ref_id="1059778" ref_url="https://bugzilla.suse.com/1059778" source="BUGZILLA"/>
		<reference ref_id="1060577" ref_url="https://bugzilla.suse.com/1060577" source="BUGZILLA"/>
		<reference ref_id="1066003" ref_url="https://bugzilla.suse.com/1066003" source="BUGZILLA"/>
		<reference ref_id="1067181" ref_url="https://bugzilla.suse.com/1067181" source="BUGZILLA"/>
		<reference ref_id="1067184" ref_url="https://bugzilla.suse.com/1067184" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11188" ref_url="https://www.suse.com/security/cve/CVE-2017-11188/" source="CVE"/>
		<reference ref_id="CVE-2017-11478" ref_url="https://www.suse.com/security/cve/CVE-2017-11478/" source="CVE"/>
		<reference ref_id="CVE-2017-11527" ref_url="https://www.suse.com/security/cve/CVE-2017-11527/" source="CVE"/>
		<reference ref_id="CVE-2017-11535" ref_url="https://www.suse.com/security/cve/CVE-2017-11535/" source="CVE"/>
		<reference ref_id="CVE-2017-11640" ref_url="https://www.suse.com/security/cve/CVE-2017-11640/" source="CVE"/>
		<reference ref_id="CVE-2017-11752" ref_url="https://www.suse.com/security/cve/CVE-2017-11752/" source="CVE"/>
		<reference ref_id="CVE-2017-12140" ref_url="https://www.suse.com/security/cve/CVE-2017-12140/" source="CVE"/>
		<reference ref_id="CVE-2017-12435" ref_url="https://www.suse.com/security/cve/CVE-2017-12435/" source="CVE"/>
		<reference ref_id="CVE-2017-12587" ref_url="https://www.suse.com/security/cve/CVE-2017-12587/" source="CVE"/>
		<reference ref_id="CVE-2017-12644" ref_url="https://www.suse.com/security/cve/CVE-2017-12644/" source="CVE"/>
		<reference ref_id="CVE-2017-12662" ref_url="https://www.suse.com/security/cve/CVE-2017-12662/" source="CVE"/>
		<reference ref_id="CVE-2017-12669" ref_url="https://www.suse.com/security/cve/CVE-2017-12669/" source="CVE"/>
		<reference ref_id="CVE-2017-12983" ref_url="https://www.suse.com/security/cve/CVE-2017-12983/" source="CVE"/>
		<reference ref_id="CVE-2017-13134" ref_url="https://www.suse.com/security/cve/CVE-2017-13134/" source="CVE"/>
		<reference ref_id="CVE-2017-13769" ref_url="https://www.suse.com/security/cve/CVE-2017-13769/" source="CVE"/>
		<reference ref_id="CVE-2017-14172" ref_url="https://www.suse.com/security/cve/CVE-2017-14172/" source="CVE"/>
		<reference ref_id="CVE-2017-14173" ref_url="https://www.suse.com/security/cve/CVE-2017-14173/" source="CVE"/>
		<reference ref_id="CVE-2017-14175" ref_url="https://www.suse.com/security/cve/CVE-2017-14175/" source="CVE"/>
		<reference ref_id="CVE-2017-14341" ref_url="https://www.suse.com/security/cve/CVE-2017-14341/" source="CVE"/>
		<reference ref_id="CVE-2017-14342" ref_url="https://www.suse.com/security/cve/CVE-2017-14342/" source="CVE"/>
		<reference ref_id="CVE-2017-14531" ref_url="https://www.suse.com/security/cve/CVE-2017-14531/" source="CVE"/>
		<reference ref_id="CVE-2017-14607" ref_url="https://www.suse.com/security/cve/CVE-2017-14607/" source="CVE"/>
		<reference ref_id="CVE-2017-14733" ref_url="https://www.suse.com/security/cve/CVE-2017-14733/" source="CVE"/>
		<reference ref_id="CVE-2017-15930" ref_url="https://www.suse.com/security/cve/CVE-2017-15930/" source="CVE"/>
		<reference ref_id="CVE-2017-16545" ref_url="https://www.suse.com/security/cve/CVE-2017-16545/" source="CVE"/>
		<reference ref_id="CVE-2017-16546" ref_url="https://www.suse.com/security/cve/CVE-2017-16546/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

  * CVE-2017-14607: out of bounds read flaw related to ReadTIFFImagehas  
    could possibly disclose potentially sensitive memory [bsc#1059778]
  
  * CVE-2017-11640: NULL pointer deref in WritePTIFImage() in coders/tiff.c [bsc#1050632]
  
  * CVE-2017-14342: a memory exhaustion vulnerability in ReadWPGImage 
    in coders/wpg.c could lead to denial of service [bsc#1058485]

  * CVE-2017-14341: Infinite loop in the ReadWPGImage function [bsc#1058637]

  * CVE-2017-16546: problem in the function ReadWPGImage in coders/wpg.c 
    could lead to denial of service [bsc#1067181]

  * CVE-2017-16545: The ReadWPGImage function in coders/wpg.c in  
    validation problems could lead to denial of service [bsc#1067184]

  * CVE-2017-14175: Lack of End of File check could lead to denial of service [bsc#1057719]

  * CVE-2017-13769: denial of service issue in function WriteTHUMBNAILImage in coders/thumbnail.c [bsc#1056432]

  * CVE-2017-13134: a heap-based buffer over-read was found in thefunction SFWScan 
    in coders/sfw.c, which allows attackers to cause adenial of service via a crafted file. [bsc#1055214]

  * CVE-2017-11478: ReadOneDJVUImage in coders/djvu.c in ImageMagick allows remote attackers to cause a DoS [bsc#1049796]

  * CVE-2017-15930: Null Pointer dereference  while transfering JPEG scanlines could lead to denial of service [bsc#1066003]

  * CVE-2017-12983: Heap-based buffer overflow in the ReadSFWImage function in coders/sfw.c 
    allows remote attackers to cause a denial of service [bsc#1054757]

  * CVE-2017-14531: memory exhaustion issue in ReadSUNImage incoders/sun.c. [bsc#1059666]

  * CVE-2017-12435: Memory exhaustion in ReadSUNImage in coders/sun.c, 
    which allows attackers to cause denial of service [bsc#1052553]

  * CVE-2017-12587: User controlable large loop in the ReadPWPImage in coders\pwp.c could lead to denial of service [bsc#1052450]

  * CVE-2017-14173: unction ReadTXTImage is vulnerable to a integer overflow that could lead to denial of service [bsc#1057729]
  
  * CVE-2017-11188: ImageMagick: The ReadDPXImage function in codersdpx.c in ImageMagick 7.0.6-0 has a largeloop vulnerability that can cause CPU exhaustion via a crafted DPX file, relatedto lack of an EOF check. [bnc#1048457]

  * CVE-2017-11527: ImageMagick: ReadDPXImage in coders/dpx.c allows remote attackers to cause DoS [bnc#1050116] 

  * CVE-2017-11535: GraphicsMagick, ImageMagick: Heap-based buffer over-read in WritePSImage() in coders/ps.c [bnc#1050139]

  * CVE-2017-11752: ImageMagick: ReadMAGICKImage in coders/magick.c allows to cause DoS  [bnc#1051441] 

  * CVE-2017-12140: ImageMagick: ReadDCMImage in codersdcm.c has a ninteger signedness error leading to excessive memory consumption [bnc#1051847] 

  * CVE-2017-12669: ImageMagick: Memory leak in WriteCALSImage in coders/cals.c [bnc#1052689]

  * CVE-2017-12662: GraphicsMagick, ImageMagick: Memory leak in WritePDFImage in coders/pdf.c [bnc#1052758]

  * CVE-2017-12644: ImageMagick: Memory leak in ReadDCMImage in codersdcm.c [bnc#1052764]

  * CVE-2017-14172: ImageMagick: Lack of end of file check in ReadPSImage() could lead to a denial of service [bnc#1057730]

  * CVE-2017-14733: GraphicsMagick: Heap overflow on ReadRLEImage in coders/rle.c could lead to denial of service [bnc#1060577]
  
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-20"/>
	<updated date="2017-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1048457">SUSE bug 1048457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049796">SUSE bug 1049796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050116">SUSE bug 1050116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050139">SUSE bug 1050139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050632">SUSE bug 1050632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051441">SUSE bug 1051441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051847">SUSE bug 1051847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052450">SUSE bug 1052450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052553">SUSE bug 1052553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052689">SUSE bug 1052689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052758">SUSE bug 1052758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052764">SUSE bug 1052764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054757">SUSE bug 1054757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055214">SUSE bug 1055214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056432">SUSE bug 1056432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057719">SUSE bug 1057719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057729">SUSE bug 1057729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057730">SUSE bug 1057730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058485">SUSE bug 1058485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058637">SUSE bug 1058637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059666">SUSE bug 1059666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059778">SUSE bug 1059778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060577">SUSE bug 1060577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066003">SUSE bug 1066003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067181">SUSE bug 1067181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067184">SUSE bug 1067184</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11188/">CVE-2017-11188 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11188">CVE-2017-11188 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11478/">CVE-2017-11478 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11478">CVE-2017-11478 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11527/">CVE-2017-11527 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11527">CVE-2017-11527 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11535/">CVE-2017-11535 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11535">CVE-2017-11535 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11640/">CVE-2017-11640 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11640">CVE-2017-11640 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11752/">CVE-2017-11752 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11752">CVE-2017-11752 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12140/">CVE-2017-12140 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12140">CVE-2017-12140 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12435/">CVE-2017-12435 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12435">CVE-2017-12435 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12587/">CVE-2017-12587 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12587">CVE-2017-12587 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12644/">CVE-2017-12644 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12644">CVE-2017-12644 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12662/">CVE-2017-12662 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12662">CVE-2017-12662 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12669/">CVE-2017-12669 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12669">CVE-2017-12669 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12983/">CVE-2017-12983 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12983">CVE-2017-12983 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13134/">CVE-2017-13134 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13134">CVE-2017-13134 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13769/">CVE-2017-13769 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13769">CVE-2017-13769 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14172/">CVE-2017-14172 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14172">CVE-2017-14172 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14173/">CVE-2017-14173 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14173">CVE-2017-14173 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14175/">CVE-2017-14175 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14175">CVE-2017-14175 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14341/">CVE-2017-14341 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14341">CVE-2017-14341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14342/">CVE-2017-14342 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14342">CVE-2017-14342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14531/">CVE-2017-14531 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14531">CVE-2017-14531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14607/">CVE-2017-14607 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14607">CVE-2017-14607 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14733/">CVE-2017-14733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14733">CVE-2017-14733 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15930/">CVE-2017-15930 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15930">CVE-2017-15930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16545/">CVE-2017-16545 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16545">CVE-2017-16545 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16546/">CVE-2017-16546 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16546">CVE-2017-16546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570438" comment="libMagickCore1-6.4.3.6-7.78.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570439" comment="libMagickCore1-32bit-6.4.3.6-7.78.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216794" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1052460" ref_url="https://bugzilla.suse.com/1052460" source="BUGZILLA"/>
		<reference ref_id="1055053" ref_url="https://bugzilla.suse.com/1055053" source="BUGZILLA"/>
		<reference ref_id="1055063" ref_url="https://bugzilla.suse.com/1055063" source="BUGZILLA"/>
		<reference ref_id="1056550" ref_url="https://bugzilla.suse.com/1056550" source="BUGZILLA"/>
		<reference ref_id="1057723" ref_url="https://bugzilla.suse.com/1057723" source="BUGZILLA"/>
		<reference ref_id="1058422" ref_url="https://bugzilla.suse.com/1058422" source="BUGZILLA"/>
		<reference ref_id="1063049" ref_url="https://bugzilla.suse.com/1063049" source="BUGZILLA"/>
		<reference ref_id="1063050" ref_url="https://bugzilla.suse.com/1063050" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12563" ref_url="https://www.suse.com/security/cve/CVE-2017-12563/" source="CVE"/>
		<reference ref_id="CVE-2017-12691" ref_url="https://www.suse.com/security/cve/CVE-2017-12691/" source="CVE"/>
		<reference ref_id="CVE-2017-13061" ref_url="https://www.suse.com/security/cve/CVE-2017-13061/" source="CVE"/>
		<reference ref_id="CVE-2017-13062" ref_url="https://www.suse.com/security/cve/CVE-2017-13062/" source="CVE"/>
		<reference ref_id="CVE-2017-14042" ref_url="https://www.suse.com/security/cve/CVE-2017-14042/" source="CVE"/>
		<reference ref_id="CVE-2017-14174" ref_url="https://www.suse.com/security/cve/CVE-2017-14174/" source="CVE"/>
		<reference ref_id="CVE-2017-14343" ref_url="https://www.suse.com/security/cve/CVE-2017-14343/" source="CVE"/>
		<reference ref_id="CVE-2017-15277" ref_url="https://www.suse.com/security/cve/CVE-2017-15277/" source="CVE"/>
		<reference ref_id="CVE-2017-15281" ref_url="https://www.suse.com/security/cve/CVE-2017-15281/" source="CVE"/>
		<description>
This update for ImageMagick fixes several issues.
  
These security issues were fixed:

- CVE-2017-14343: Fixed a memory leak vulnerability in ReadXCFImage in
  coders/xcf.c via a crafted xcf image file (bsc#1058422).
- CVE-2017-12691: The ReadOneLayer function in coders/xcf.c allowed remote
  attackers to cause a denial of service (memory consumption) via a crafted file
  (bsc#1058422).
- CVE-2017-14042: Prevent memory allocation failure in the ReadPNMImage
  function in coders/pnm.c. The vulnerability caused a big memory allocation,
  which may have lead to remote denial of service in the MagickRealloc function
  in magick/memory.c (bsc#1056550).
- CVE-2017-15281: ReadPSDImage in coders/psd.c allowed remote attackers to
  cause a denial of service (application crash) or possibly have unspecified
  other impact via a crafted file (bsc#1063049).
- CVE-2017-13061: A length-validation vulnerability in the function
  ReadPSDLayersInternal in coders/psd.c allowed attackers to cause a denial of
  service (ReadPSDImage memory exhaustion) via a crafted file (bsc#1055063).
- CVE-2017-12563: A memory exhaustion vulnerability in the function
  ReadPSDImage in coders/psd.c allowed attackers to cause a denial of service
  (bsc#1052460).
- CVE-2017-14174: coders/psd.c allowed for DoS in ReadPSDLayersInternal() due
  to lack of an EOF (End of File) check might have caused huge CPU consumption.
  When a crafted PSD file, which claims a large 'length' field in the header but
  did not contain sufficient backing data, is provided, the loop over 'length'
  would consume huge CPU resources, since there is no EOF check inside the loop
  (bsc#1057723).
- CVE-2017-13062: A memory leak vulnerability in the function formatIPTC in
  coders/meta.c allowed attackers to cause a denial of service (WriteMETAImage
  memory consumption) via a crafted file (bsc#1055053).
- CVE-2017-15277: ReadGIFImage in coders/gif.c left the palette uninitialized
  when processing a GIF file that has neither a global nor local palette. If this
  functionality was used as a library loaded into a process that operates on
  interesting data, this data sometimes could have been leaked via the
  uninitialized palette (bsc#1063050).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-09"/>
	<updated date="2018-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1052460">SUSE bug 1052460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055053">SUSE bug 1055053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055063">SUSE bug 1055063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056550">SUSE bug 1056550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057723">SUSE bug 1057723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058422">SUSE bug 1058422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063049">SUSE bug 1063049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063050">SUSE bug 1063050</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12563/">CVE-2017-12563 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12563">CVE-2017-12563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12691/">CVE-2017-12691 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12691">CVE-2017-12691 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13061/">CVE-2017-13061 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13061">CVE-2017-13061 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13062/">CVE-2017-13062 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13062">CVE-2017-13062 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14042/">CVE-2017-14042 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14042">CVE-2017-14042 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14174/">CVE-2017-14174 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14174">CVE-2017-14174 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14343/">CVE-2017-14343 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14343">CVE-2017-14343 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15277/">CVE-2017-15277 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15277">CVE-2017-15277 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15281/">CVE-2017-15281 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15281">CVE-2017-15281 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570440" comment="libMagickCore1-6.4.3.6-7.78.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570441" comment="libMagickCore1-32bit-6.4.3.6-7.78.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216795" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1042948" ref_url="https://bugzilla.suse.com/1042948" source="BUGZILLA"/>
		<reference ref_id="1047044" ref_url="https://bugzilla.suse.com/1047044" source="BUGZILLA"/>
		<reference ref_id="1047898" ref_url="https://bugzilla.suse.com/1047898" source="BUGZILLA"/>
		<reference ref_id="1049373" ref_url="https://bugzilla.suse.com/1049373" source="BUGZILLA"/>
		<reference ref_id="1050120" ref_url="https://bugzilla.suse.com/1050120" source="BUGZILLA"/>
		<reference ref_id="1050606" ref_url="https://bugzilla.suse.com/1050606" source="BUGZILLA"/>
		<reference ref_id="1051412" ref_url="https://bugzilla.suse.com/1051412" source="BUGZILLA"/>
		<reference ref_id="1051446" ref_url="https://bugzilla.suse.com/1051446" source="BUGZILLA"/>
		<reference ref_id="1052252" ref_url="https://bugzilla.suse.com/1052252" source="BUGZILLA"/>
		<reference ref_id="1052468" ref_url="https://bugzilla.suse.com/1052468" source="BUGZILLA"/>
		<reference ref_id="1052550" ref_url="https://bugzilla.suse.com/1052550" source="BUGZILLA"/>
		<reference ref_id="1052710" ref_url="https://bugzilla.suse.com/1052710" source="BUGZILLA"/>
		<reference ref_id="1052720" ref_url="https://bugzilla.suse.com/1052720" source="BUGZILLA"/>
		<reference ref_id="1052731" ref_url="https://bugzilla.suse.com/1052731" source="BUGZILLA"/>
		<reference ref_id="1052732" ref_url="https://bugzilla.suse.com/1052732" source="BUGZILLA"/>
		<reference ref_id="1052771" ref_url="https://bugzilla.suse.com/1052771" source="BUGZILLA"/>
		<reference ref_id="1055065" ref_url="https://bugzilla.suse.com/1055065" source="BUGZILLA"/>
		<reference ref_id="1055323" ref_url="https://bugzilla.suse.com/1055323" source="BUGZILLA"/>
		<reference ref_id="1055434" ref_url="https://bugzilla.suse.com/1055434" source="BUGZILLA"/>
		<reference ref_id="1055855" ref_url="https://bugzilla.suse.com/1055855" source="BUGZILLA"/>
		<reference ref_id="1058082" ref_url="https://bugzilla.suse.com/1058082" source="BUGZILLA"/>
		<reference ref_id="1058640" ref_url="https://bugzilla.suse.com/1058640" source="BUGZILLA"/>
		<reference ref_id="1059751" ref_url="https://bugzilla.suse.com/1059751" source="BUGZILLA"/>
		<reference ref_id="1072902" ref_url="https://bugzilla.suse.com/1072902" source="BUGZILLA"/>
		<reference ref_id="1074122" ref_url="https://bugzilla.suse.com/1074122" source="BUGZILLA"/>
		<reference ref_id="1074123" ref_url="https://bugzilla.suse.com/1074123" source="BUGZILLA"/>
		<reference ref_id="1074425" ref_url="https://bugzilla.suse.com/1074425" source="BUGZILLA"/>
		<reference ref_id="1074610" ref_url="https://bugzilla.suse.com/1074610" source="BUGZILLA"/>
		<reference ref_id="1074969" ref_url="https://bugzilla.suse.com/1074969" source="BUGZILLA"/>
		<reference ref_id="1074973" ref_url="https://bugzilla.suse.com/1074973" source="BUGZILLA"/>
		<reference ref_id="1074975" ref_url="https://bugzilla.suse.com/1074975" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000445" ref_url="https://www.suse.com/security/cve/CVE-2017-1000445/" source="CVE"/>
		<reference ref_id="CVE-2017-1000476" ref_url="https://www.suse.com/security/cve/CVE-2017-1000476/" source="CVE"/>
		<reference ref_id="CVE-2017-10800" ref_url="https://www.suse.com/security/cve/CVE-2017-10800/" source="CVE"/>
		<reference ref_id="CVE-2017-11141" ref_url="https://www.suse.com/security/cve/CVE-2017-11141/" source="CVE"/>
		<reference ref_id="CVE-2017-11449" ref_url="https://www.suse.com/security/cve/CVE-2017-11449/" source="CVE"/>
		<reference ref_id="CVE-2017-11529" ref_url="https://www.suse.com/security/cve/CVE-2017-11529/" source="CVE"/>
		<reference ref_id="CVE-2017-11644" ref_url="https://www.suse.com/security/cve/CVE-2017-11644/" source="CVE"/>
		<reference ref_id="CVE-2017-11724" ref_url="https://www.suse.com/security/cve/CVE-2017-11724/" source="CVE"/>
		<reference ref_id="CVE-2017-11751" ref_url="https://www.suse.com/security/cve/CVE-2017-11751/" source="CVE"/>
		<reference ref_id="CVE-2017-12430" ref_url="https://www.suse.com/security/cve/CVE-2017-12430/" source="CVE"/>
		<reference ref_id="CVE-2017-12434" ref_url="https://www.suse.com/security/cve/CVE-2017-12434/" source="CVE"/>
		<reference ref_id="CVE-2017-12564" ref_url="https://www.suse.com/security/cve/CVE-2017-12564/" source="CVE"/>
		<reference ref_id="CVE-2017-12642" ref_url="https://www.suse.com/security/cve/CVE-2017-12642/" source="CVE"/>
		<reference ref_id="CVE-2017-12667" ref_url="https://www.suse.com/security/cve/CVE-2017-12667/" source="CVE"/>
		<reference ref_id="CVE-2017-12670" ref_url="https://www.suse.com/security/cve/CVE-2017-12670/" source="CVE"/>
		<reference ref_id="CVE-2017-12672" ref_url="https://www.suse.com/security/cve/CVE-2017-12672/" source="CVE"/>
		<reference ref_id="CVE-2017-12675" ref_url="https://www.suse.com/security/cve/CVE-2017-12675/" source="CVE"/>
		<reference ref_id="CVE-2017-13060" ref_url="https://www.suse.com/security/cve/CVE-2017-13060/" source="CVE"/>
		<reference ref_id="CVE-2017-13146" ref_url="https://www.suse.com/security/cve/CVE-2017-13146/" source="CVE"/>
		<reference ref_id="CVE-2017-13648" ref_url="https://www.suse.com/security/cve/CVE-2017-13648/" source="CVE"/>
		<reference ref_id="CVE-2017-13658" ref_url="https://www.suse.com/security/cve/CVE-2017-13658/" source="CVE"/>
		<reference ref_id="CVE-2017-14249" ref_url="https://www.suse.com/security/cve/CVE-2017-14249/" source="CVE"/>
		<reference ref_id="CVE-2017-14326" ref_url="https://www.suse.com/security/cve/CVE-2017-14326/" source="CVE"/>
		<reference ref_id="CVE-2017-14533" ref_url="https://www.suse.com/security/cve/CVE-2017-14533/" source="CVE"/>
		<reference ref_id="CVE-2017-17680" ref_url="https://www.suse.com/security/cve/CVE-2017-17680/" source="CVE"/>
		<reference ref_id="CVE-2017-17881" ref_url="https://www.suse.com/security/cve/CVE-2017-17881/" source="CVE"/>
		<reference ref_id="CVE-2017-17882" ref_url="https://www.suse.com/security/cve/CVE-2017-17882/" source="CVE"/>
		<reference ref_id="CVE-2017-18022" ref_url="https://www.suse.com/security/cve/CVE-2017-18022/" source="CVE"/>
		<reference ref_id="CVE-2017-9409" ref_url="https://www.suse.com/security/cve/CVE-2017-9409/" source="CVE"/>
		<reference ref_id="CVE-2018-5246" ref_url="https://www.suse.com/security/cve/CVE-2018-5246/" source="CVE"/>
		<reference ref_id="CVE-2018-5247" ref_url="https://www.suse.com/security/cve/CVE-2018-5247/" source="CVE"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2017-12672: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service (bsc#1052720).
- CVE-2017-13060: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service via a crafted file (bsc#1055065).
- CVE-2017-11724: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c involving the quantum_info and clone_info data
  structures (bsc#1051446).
- CVE-2017-12670: Added validation in coders/mat.c to prevent an assertion
  failure in the function DestroyImage in MagickCore/image.c, which allowed
  attackers to cause a denial of service (bsc#1052731).
- CVE-2017-12667: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1052732).
- CVE-2017-13146: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1055323).
- CVE-2017-10800: Processing MATLAB images in coders/mat.c could have lead to a
  denial of service (OOM) in ReadMATImage() if the size specified for a MAT
  Object was larger than the actual amount of data (bsc#1047044)
- CVE-2017-13648: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1055434).
- CVE-2017-11141: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders\mat.c that could have caused memory exhaustion via a
  crafted MAT file, related to incorrect ordering of a SetImageExtent call
  (bsc#1047898).
- CVE-2017-11529: The ReadMATImage function in coders/mat.c allowed remote
  attackers to cause a denial of service (memory leak) via a crafted file
  (bsc#1050120).
- CVE-2017-12564: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service (bsc#1052468).
- CVE-2017-12434: Added a missing NULL check in the function ReadMATImage in
  coders/mat.c, which allowed attackers to cause a denial of service (assertion
  failure) in DestroyImageInfo in image.c (bsc#1052550).
- CVE-2017-12675: Added a missing check for multidimensional data coders/mat.c,
  that could have lead to a memory leak in the function ReadImage in
  MagickCore/constitute.c, which allowed attackers to cause a denial of service
  (bsc#1052710).
- CVE-2017-14326: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service via a crafted file (bsc#1058640).
- CVE-2017-11644: Processesing a crafted file in convert could have lead to a
  memory leak in the ReadMATImage() function in coders/mat.c (bsc#1050606).
- CVE-2017-13658: Added a missing NULL check in the ReadMATImage function in
  coders/mat.c, which could have lead to a denial of service (assertion failure
  and application exit) in the DestroyImageInfo function in MagickCore/image.c
  (bsc#1055855).
- CVE-2017-14533: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1059751).
- CVE-2017-17881: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service via a crafted MAT image file (bsc#1074123).
- CVE-2017-1000476: Prevent CPU exhaustion in the function ReadDDSInfo in
  coders/dds.c, which allowed attackers to cause a denial of service
  (bsc#1074610).
- CVE-2017-9409: Fixed a memory leak vulnerability in the function ReadMPCImage
  in mpc.c, which allowed attackers to cause a denial of service via a crafted
  file (bsc#1042948).
- CVE-2017-11449: coders/mpc did not enable seekable streams and thus could not
  validate blob sizes, which allowed remote attackers to cause a denial of service
  (application crash) or possibly have unspecified other impact via an image
  received from stdin (bsc#1049373)
- CVE-2017-12430: A memory exhaustion in the function ReadMPCImage in
  coders/mpc.c allowed attackers to cause DoS (bsc#1052252)
- CVE-2017-12642: Prevent a memory leak vulnerability in ReadMPCImage in
  coders\mpc.c via crafted file allowing for DoS (bsc#1052771)
- CVE-2017-14249: A mishandled EOF check in ReadMPCImage in coders/mpc.c that
  lead to a division by zero in GetPixelCacheTileSize in MagickCore/cache.c
  allowed remote attackers to cause a denial of service via a crafted file
  (bsc#1058082)
- CVE-2017-1000445: Added a NUL pointer check in the MagickCore component that
  might have lead to denial of service  (bsc#1074425).
- CVE-2017-11751: Fixed a memory leak vulnerability in the function
  WritePICONImage in coders/xpm.c that allowed remote attackers to cause a denial
  of service via a crafted file (bsc#1051412).
- CVE-2017-17680: Fixed a memory leak vulnerability in the function
  ReadXPMImage in coders/xpm.c, which allowed attackers to cause a denial of
  service via a crafted xpm image file (bsc#1072902).
- CVE-2017-17882: Fixed a memory leak vulnerability in the function
  ReadXPMImage in coders/xpm.c, which allowed attackers to cause a denial of
  service via a crafted XPM image file (bsc#1074122).
- CVE-2018-5246: Fixed memory leak vulnerability in ReadPATTERNImage in
  coders/pattern.c (bsc#1074973).
- CVE-2017-18022: Fixed memory leak vulnerability in MontageImageCommand in
  MagickWand/montage.c (bsc#1074975)
- CVE-2018-5247: Fixed memory leak vulnerability in ReadRLAImage in
  coders/rla.c (bsc#1074969)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-18"/>
	<updated date="2018-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042948">SUSE bug 1042948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047044">SUSE bug 1047044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047898">SUSE bug 1047898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049373">SUSE bug 1049373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050120">SUSE bug 1050120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050606">SUSE bug 1050606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051412">SUSE bug 1051412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051446">SUSE bug 1051446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052252">SUSE bug 1052252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052468">SUSE bug 1052468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052550">SUSE bug 1052550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052710">SUSE bug 1052710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052720">SUSE bug 1052720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052731">SUSE bug 1052731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052732">SUSE bug 1052732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052771">SUSE bug 1052771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055065">SUSE bug 1055065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055323">SUSE bug 1055323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055434">SUSE bug 1055434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055855">SUSE bug 1055855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058082">SUSE bug 1058082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058640">SUSE bug 1058640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059751">SUSE bug 1059751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072902">SUSE bug 1072902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074122">SUSE bug 1074122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074123">SUSE bug 1074123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074425">SUSE bug 1074425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074610">SUSE bug 1074610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074969">SUSE bug 1074969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074973">SUSE bug 1074973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074975">SUSE bug 1074975</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000445/">CVE-2017-1000445 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000445">CVE-2017-1000445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000476/">CVE-2017-1000476 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000476">CVE-2017-1000476 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10800/">CVE-2017-10800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10800">CVE-2017-10800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11141/">CVE-2017-11141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11141">CVE-2017-11141 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11449/">CVE-2017-11449 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11449">CVE-2017-11449 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11529/">CVE-2017-11529 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11529">CVE-2017-11529 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11644/">CVE-2017-11644 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11644">CVE-2017-11644 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11724/">CVE-2017-11724 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11724">CVE-2017-11724 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11751/">CVE-2017-11751 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11751">CVE-2017-11751 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12430/">CVE-2017-12430 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12430">CVE-2017-12430 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12434/">CVE-2017-12434 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12434">CVE-2017-12434 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12564/">CVE-2017-12564 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12564">CVE-2017-12564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12642/">CVE-2017-12642 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12642">CVE-2017-12642 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12667/">CVE-2017-12667 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12667">CVE-2017-12667 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12670/">CVE-2017-12670 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12670">CVE-2017-12670 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12672/">CVE-2017-12672 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12672">CVE-2017-12672 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12675/">CVE-2017-12675 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12675">CVE-2017-12675 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13060/">CVE-2017-13060 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13060">CVE-2017-13060 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13146/">CVE-2017-13146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13146">CVE-2017-13146 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13648/">CVE-2017-13648 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13648">CVE-2017-13648 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13658/">CVE-2017-13658 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13658">CVE-2017-13658 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14249/">CVE-2017-14249 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14249">CVE-2017-14249 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14326/">CVE-2017-14326 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14326">CVE-2017-14326 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14533/">CVE-2017-14533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14533">CVE-2017-14533 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17680/">CVE-2017-17680 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17680">CVE-2017-17680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17881/">CVE-2017-17881 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17881">CVE-2017-17881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17882/">CVE-2017-17882 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17882">CVE-2017-17882 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18022/">CVE-2017-18022 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18022">CVE-2017-18022 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9409/">CVE-2017-9409 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9409">CVE-2017-9409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5246/">CVE-2018-5246 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5246">CVE-2018-5246 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5247/">CVE-2018-5247 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5247">CVE-2018-5247 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570442" comment="libMagickCore1-6.4.3.6-7.78.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570443" comment="libMagickCore1-32bit-6.4.3.6-7.78.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216796" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1043353" ref_url="https://bugzilla.suse.com/1043353" source="BUGZILLA"/>
		<reference ref_id="1043354" ref_url="https://bugzilla.suse.com/1043354" source="BUGZILLA"/>
		<reference ref_id="1047908" ref_url="https://bugzilla.suse.com/1047908" source="BUGZILLA"/>
		<reference ref_id="1050037" ref_url="https://bugzilla.suse.com/1050037" source="BUGZILLA"/>
		<reference ref_id="1050072" ref_url="https://bugzilla.suse.com/1050072" source="BUGZILLA"/>
		<reference ref_id="1050098" ref_url="https://bugzilla.suse.com/1050098" source="BUGZILLA"/>
		<reference ref_id="1050100" ref_url="https://bugzilla.suse.com/1050100" source="BUGZILLA"/>
		<reference ref_id="1050635" ref_url="https://bugzilla.suse.com/1050635" source="BUGZILLA"/>
		<reference ref_id="1051442" ref_url="https://bugzilla.suse.com/1051442" source="BUGZILLA"/>
		<reference ref_id="1052470" ref_url="https://bugzilla.suse.com/1052470" source="BUGZILLA"/>
		<reference ref_id="1052708" ref_url="https://bugzilla.suse.com/1052708" source="BUGZILLA"/>
		<reference ref_id="1052717" ref_url="https://bugzilla.suse.com/1052717" source="BUGZILLA"/>
		<reference ref_id="1052721" ref_url="https://bugzilla.suse.com/1052721" source="BUGZILLA"/>
		<reference ref_id="1052768" ref_url="https://bugzilla.suse.com/1052768" source="BUGZILLA"/>
		<reference ref_id="1052777" ref_url="https://bugzilla.suse.com/1052777" source="BUGZILLA"/>
		<reference ref_id="1052781" ref_url="https://bugzilla.suse.com/1052781" source="BUGZILLA"/>
		<reference ref_id="1054600" ref_url="https://bugzilla.suse.com/1054600" source="BUGZILLA"/>
		<reference ref_id="1055374" ref_url="https://bugzilla.suse.com/1055374" source="BUGZILLA"/>
		<reference ref_id="1055455" ref_url="https://bugzilla.suse.com/1055455" source="BUGZILLA"/>
		<reference ref_id="1055456" ref_url="https://bugzilla.suse.com/1055456" source="BUGZILLA"/>
		<reference ref_id="1057000" ref_url="https://bugzilla.suse.com/1057000" source="BUGZILLA"/>
		<reference ref_id="1060162" ref_url="https://bugzilla.suse.com/1060162" source="BUGZILLA"/>
		<reference ref_id="1062752" ref_url="https://bugzilla.suse.com/1062752" source="BUGZILLA"/>
		<reference ref_id="1072362" ref_url="https://bugzilla.suse.com/1072362" source="BUGZILLA"/>
		<reference ref_id="1074120" ref_url="https://bugzilla.suse.com/1074120" source="BUGZILLA"/>
		<reference ref_id="1074125" ref_url="https://bugzilla.suse.com/1074125" source="BUGZILLA"/>
		<reference ref_id="1074185" ref_url="https://bugzilla.suse.com/1074185" source="BUGZILLA"/>
		<reference ref_id="1074309" ref_url="https://bugzilla.suse.com/1074309" source="BUGZILLA"/>
		<reference ref_id="1075939" ref_url="https://bugzilla.suse.com/1075939" source="BUGZILLA"/>
		<reference ref_id="1076021" ref_url="https://bugzilla.suse.com/1076021" source="BUGZILLA"/>
		<reference ref_id="1076051" ref_url="https://bugzilla.suse.com/1076051" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10995" ref_url="https://www.suse.com/security/cve/CVE-2017-10995/" source="CVE"/>
		<reference ref_id="CVE-2017-11505" ref_url="https://www.suse.com/security/cve/CVE-2017-11505/" source="CVE"/>
		<reference ref_id="CVE-2017-11525" ref_url="https://www.suse.com/security/cve/CVE-2017-11525/" source="CVE"/>
		<reference ref_id="CVE-2017-11526" ref_url="https://www.suse.com/security/cve/CVE-2017-11526/" source="CVE"/>
		<reference ref_id="CVE-2017-11539" ref_url="https://www.suse.com/security/cve/CVE-2017-11539/" source="CVE"/>
		<reference ref_id="CVE-2017-11639" ref_url="https://www.suse.com/security/cve/CVE-2017-11639/" source="CVE"/>
		<reference ref_id="CVE-2017-11750" ref_url="https://www.suse.com/security/cve/CVE-2017-11750/" source="CVE"/>
		<reference ref_id="CVE-2017-12565" ref_url="https://www.suse.com/security/cve/CVE-2017-12565/" source="CVE"/>
		<reference ref_id="CVE-2017-12640" ref_url="https://www.suse.com/security/cve/CVE-2017-12640/" source="CVE"/>
		<reference ref_id="CVE-2017-12641" ref_url="https://www.suse.com/security/cve/CVE-2017-12641/" source="CVE"/>
		<reference ref_id="CVE-2017-12643" ref_url="https://www.suse.com/security/cve/CVE-2017-12643/" source="CVE"/>
		<reference ref_id="CVE-2017-12671" ref_url="https://www.suse.com/security/cve/CVE-2017-12671/" source="CVE"/>
		<reference ref_id="CVE-2017-12673" ref_url="https://www.suse.com/security/cve/CVE-2017-12673/" source="CVE"/>
		<reference ref_id="CVE-2017-12676" ref_url="https://www.suse.com/security/cve/CVE-2017-12676/" source="CVE"/>
		<reference ref_id="CVE-2017-12935" ref_url="https://www.suse.com/security/cve/CVE-2017-12935/" source="CVE"/>
		<reference ref_id="CVE-2017-13141" ref_url="https://www.suse.com/security/cve/CVE-2017-13141/" source="CVE"/>
		<reference ref_id="CVE-2017-13142" ref_url="https://www.suse.com/security/cve/CVE-2017-13142/" source="CVE"/>
		<reference ref_id="CVE-2017-13147" ref_url="https://www.suse.com/security/cve/CVE-2017-13147/" source="CVE"/>
		<reference ref_id="CVE-2017-14103" ref_url="https://www.suse.com/security/cve/CVE-2017-14103/" source="CVE"/>
		<reference ref_id="CVE-2017-14649" ref_url="https://www.suse.com/security/cve/CVE-2017-14649/" source="CVE"/>
		<reference ref_id="CVE-2017-15218" ref_url="https://www.suse.com/security/cve/CVE-2017-15218/" source="CVE"/>
		<reference ref_id="CVE-2017-17504" ref_url="https://www.suse.com/security/cve/CVE-2017-17504/" source="CVE"/>
		<reference ref_id="CVE-2017-17879" ref_url="https://www.suse.com/security/cve/CVE-2017-17879/" source="CVE"/>
		<reference ref_id="CVE-2017-17884" ref_url="https://www.suse.com/security/cve/CVE-2017-17884/" source="CVE"/>
		<reference ref_id="CVE-2017-17914" ref_url="https://www.suse.com/security/cve/CVE-2017-17914/" source="CVE"/>
		<reference ref_id="CVE-2017-18027" ref_url="https://www.suse.com/security/cve/CVE-2017-18027/" source="CVE"/>
		<reference ref_id="CVE-2017-18029" ref_url="https://www.suse.com/security/cve/CVE-2017-18029/" source="CVE"/>
		<reference ref_id="CVE-2017-9261" ref_url="https://www.suse.com/security/cve/CVE-2017-9261/" source="CVE"/>
		<reference ref_id="CVE-2017-9262" ref_url="https://www.suse.com/security/cve/CVE-2017-9262/" source="CVE"/>
		<reference ref_id="CVE-2018-5685" ref_url="https://www.suse.com/security/cve/CVE-2018-5685/" source="CVE"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2018-5685: Prevent infinite loop and application hang in the ReadBMPImage
  function. Remote attackers could leverage this vulnerability to cause a denial
  of service via an image file with a crafted bit-field mask value (bsc#1075939)
- CVE-2017-11639: Prevent heap-based buffer over-read in the WriteCIPImage()
  function, related to the GetPixelLuma function in MagickCore/pixel-accessor.h
  (bsc#1050635).
- CVE-2017-11525: Prevent memory consumption in the ReadCINImage function that
  allowed remote attackers to cause a denial of service (bsc#1050098).
- CVE-2017-9262: The ReadJNGImage function in coders/png.c allowed attackers to
  cause a denial of service (memory leak) via a crafted file (bsc#1043353)
- CVE-2017-9261: The ReadMNGImage function in coders/png.c allowed
  attackers to cause a denial of service (memory leak) via a crafted file (bsc#1043354)
- CVE-2017-10995: The mng_get_long function in coders/png.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) via a crafted MNG image (bsc#1047908)
- CVE-2017-11539: Prevent memory leak in the ReadOnePNGImage() function in
  coders/png.c (bsc#1050037)
- CVE-2017-11505: The ReadOneJNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (large loop and CPU consumption) via
  a crafted file (bsc#1050072)
- CVE-2017-11526: The ReadOneMNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (large loop and CPU consumption) via a
  crafted file (bsc#1050100)
- CVE-2017-11750: The ReadOneJNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (NULL pointer dereference) via a crafted
  file (bsc#1051442)
- CVE-2017-12565: Prevent memory leak in the function ReadOneJNGImage in
  coders/png.c, which allowed attackers to cause a denial of service (bsc#1052470)
- CVE-2017-12676: Prevent memory leak in the function ReadOneJNGImage in
  coders/png.c, which allowed attackers to cause a denial of service (bsc#1052708)
- CVE-2017-12673: Prevent memory leak in the function ReadOneMNGImage in
  coders/png.c, which allowed attackers to cause a denial of service (bsc#1052717)
- CVE-2017-12671: Added NULL assignment in coders/png.c to prevent an invalid
  free in the function RelinquishMagickMemory in MagickCore/memory.c, which
  allowed attackers to cause a denial of service (bsc#1052721)
- CVE-2017-12643: Prevent a memory exhaustion vulnerability in ReadOneJNGImage
  in coders\png.c (bsc#1052768)
- CVE-2017-12641: Prevent a memory leak vulnerability in ReadOneJNGImage in
  coders\png.c (bsc#1052777)
- CVE-2017-12640: Prevent an out-of-bounds read vulnerability in
  ReadOneMNGImage in coders/png.c (bsc#1052781)
- CVE-2017-12935: The ReadMNGImage function in coders/png.c mishandled large
  MNG images, leading to an invalid memory read in the SetImageColorCallBack
  function in magick/image.c (bsc#1054600)
- CVE-2017-13147: Prevent allocation failure in the function ReadMNGImage in
  coders/png.c when a small MNG file has a MEND chunk with a large length value
  (bsc#1055374)
- CVE-2017-13142: Added additional checks for short files to prevent a crafted
  PNG file from triggering a crash (bsc#1055455)
- CVE-2017-13141: Prevent memory leak in ReadOnePNGImage in coders/png.c
  (bsc#1055456)
- CVE-2017-14103: The ReadJNGImage and ReadOneJNGImage functions in
  coders/png.c did not properly manage image pointers after certain error
  conditions, which allowed remote attackers to conduct use-after-free attacks
  via a crafted file, related to a ReadMNGImage out-of-order CloseBlob call
  (bsc#1057000)
- CVE-2017-14649: ReadOneJNGImage in coders/png.c did not properly validate JNG
  data, leading to a denial of service (assertion failure in
  magick/pixel_cache.c, and application crash) (bsc#1060162)
- CVE-2017-15218: Prevent memory leak in ReadOneJNGImage in coders/png.c
  (bsc#1062752)
- CVE-2017-17504: Prevent heap-based buffer over-read via a crafted file in
  Magick_png_read_raw_profile, related to ReadOneMNGImage (bsc#1072362)
- CVE-2017-17879: Prevent heap-based buffer over-read in ReadOneMNGImage in
  coders/png.c, related to length calculation and caused by an off-by-one error
  (bsc#1074125)
- CVE-2017-17914: Prevent crafted files to cause a large loop in
  ReadOneMNGImage (bsc#1074185)
- CVE-2017-17884: Prevent memory leak in the function WriteOnePNGImage in
  coders/png.c, which allowed attackers to cause a denial of service via a
  crafted PNG image file (bsc#1074120)
- Prevent memory leak in svg.c, which allowed attackers to cause a denial of
  service via a crafted SVG image file (bsc#1074120)
- Prevent small memory leak when processing PWP image files (bsc#1074309)
- CVE-2017-18029: Prevent memory leak in the function ReadMATImage which allowed
  remote attackers to cause a denial of service via a crafted file (bsc#1076021)
- CVE-2017-18027: Prevent memory leak vulnerability in the function
  ReadMATImage which allowed remote attackers to cause a denial of service via a
  crafted file (bsc#1076051)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-02"/>
	<updated date="2018-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043353">SUSE bug 1043353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043354">SUSE bug 1043354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047908">SUSE bug 1047908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050037">SUSE bug 1050037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050072">SUSE bug 1050072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050098">SUSE bug 1050098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050100">SUSE bug 1050100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050635">SUSE bug 1050635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051442">SUSE bug 1051442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052470">SUSE bug 1052470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052708">SUSE bug 1052708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052717">SUSE bug 1052717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052721">SUSE bug 1052721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052768">SUSE bug 1052768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052777">SUSE bug 1052777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052781">SUSE bug 1052781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055374">SUSE bug 1055374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055455">SUSE bug 1055455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055456">SUSE bug 1055456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057000">SUSE bug 1057000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060162">SUSE bug 1060162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062752">SUSE bug 1062752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072362">SUSE bug 1072362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074120">SUSE bug 1074120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074125">SUSE bug 1074125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074185">SUSE bug 1074185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074309">SUSE bug 1074309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075939">SUSE bug 1075939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076021">SUSE bug 1076021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076051">SUSE bug 1076051</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10995/">CVE-2017-10995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10995">CVE-2017-10995 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11505/">CVE-2017-11505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11505">CVE-2017-11505 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11525/">CVE-2017-11525 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11525">CVE-2017-11525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11526/">CVE-2017-11526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11526">CVE-2017-11526 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11539/">CVE-2017-11539 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11539">CVE-2017-11539 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11639/">CVE-2017-11639 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11639">CVE-2017-11639 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11750/">CVE-2017-11750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11750">CVE-2017-11750 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12565/">CVE-2017-12565 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12565">CVE-2017-12565 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12640/">CVE-2017-12640 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12640">CVE-2017-12640 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12641/">CVE-2017-12641 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12641">CVE-2017-12641 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12643/">CVE-2017-12643 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12643">CVE-2017-12643 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12671/">CVE-2017-12671 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12671">CVE-2017-12671 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12673/">CVE-2017-12673 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12673">CVE-2017-12673 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12676/">CVE-2017-12676 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12676">CVE-2017-12676 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12935/">CVE-2017-12935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12935">CVE-2017-12935 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13141/">CVE-2017-13141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13141">CVE-2017-13141 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13142/">CVE-2017-13142 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13142">CVE-2017-13142 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13147/">CVE-2017-13147 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13147">CVE-2017-13147 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14103/">CVE-2017-14103 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14103">CVE-2017-14103 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14649/">CVE-2017-14649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14649">CVE-2017-14649 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15218/">CVE-2017-15218 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15218">CVE-2017-15218 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17504/">CVE-2017-17504 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17504">CVE-2017-17504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17879/">CVE-2017-17879 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17879">CVE-2017-17879 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17884/">CVE-2017-17884 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17884">CVE-2017-17884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17914/">CVE-2017-17914 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17914">CVE-2017-17914 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18027/">CVE-2017-18027 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18027">CVE-2017-18027 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18029/">CVE-2017-18029 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18029">CVE-2017-18029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9261/">CVE-2017-9261 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9261">CVE-2017-9261 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9262/">CVE-2017-9262 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9262">CVE-2017-9262 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5685/">CVE-2018-5685 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5685">CVE-2018-5685 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570444" comment="libMagickCore1-6.4.3.6-7.78.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570445" comment="libMagickCore1-32bit-6.4.3.6-7.78.29.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216797" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1042824" ref_url="https://bugzilla.suse.com/1042824" source="BUGZILLA"/>
		<reference ref_id="1048110" ref_url="https://bugzilla.suse.com/1048110" source="BUGZILLA"/>
		<reference ref_id="1049374" ref_url="https://bugzilla.suse.com/1049374" source="BUGZILLA"/>
		<reference ref_id="1049375" ref_url="https://bugzilla.suse.com/1049375" source="BUGZILLA"/>
		<reference ref_id="1050048" ref_url="https://bugzilla.suse.com/1050048" source="BUGZILLA"/>
		<reference ref_id="1050617" ref_url="https://bugzilla.suse.com/1050617" source="BUGZILLA"/>
		<reference ref_id="1050669" ref_url="https://bugzilla.suse.com/1050669" source="BUGZILLA"/>
		<reference ref_id="1052207" ref_url="https://bugzilla.suse.com/1052207" source="BUGZILLA"/>
		<reference ref_id="1052248" ref_url="https://bugzilla.suse.com/1052248" source="BUGZILLA"/>
		<reference ref_id="1052251" ref_url="https://bugzilla.suse.com/1052251" source="BUGZILLA"/>
		<reference ref_id="1052254" ref_url="https://bugzilla.suse.com/1052254" source="BUGZILLA"/>
		<reference ref_id="1052472" ref_url="https://bugzilla.suse.com/1052472" source="BUGZILLA"/>
		<reference ref_id="1052688" ref_url="https://bugzilla.suse.com/1052688" source="BUGZILLA"/>
		<reference ref_id="1052711" ref_url="https://bugzilla.suse.com/1052711" source="BUGZILLA"/>
		<reference ref_id="1052747" ref_url="https://bugzilla.suse.com/1052747" source="BUGZILLA"/>
		<reference ref_id="1052750" ref_url="https://bugzilla.suse.com/1052750" source="BUGZILLA"/>
		<reference ref_id="1052761" ref_url="https://bugzilla.suse.com/1052761" source="BUGZILLA"/>
		<reference ref_id="1055069" ref_url="https://bugzilla.suse.com/1055069" source="BUGZILLA"/>
		<reference ref_id="1055229" ref_url="https://bugzilla.suse.com/1055229" source="BUGZILLA"/>
		<reference ref_id="1058009" ref_url="https://bugzilla.suse.com/1058009" source="BUGZILLA"/>
		<reference ref_id="1074119" ref_url="https://bugzilla.suse.com/1074119" source="BUGZILLA"/>
		<reference ref_id="1076182" ref_url="https://bugzilla.suse.com/1076182" source="BUGZILLA"/>
		<reference ref_id="1078433" ref_url="https://bugzilla.suse.com/1078433" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11166" ref_url="https://www.suse.com/security/cve/CVE-2017-11166/" source="CVE"/>
		<reference ref_id="CVE-2017-11448" ref_url="https://www.suse.com/security/cve/CVE-2017-11448/" source="CVE"/>
		<reference ref_id="CVE-2017-11450" ref_url="https://www.suse.com/security/cve/CVE-2017-11450/" source="CVE"/>
		<reference ref_id="CVE-2017-11537" ref_url="https://www.suse.com/security/cve/CVE-2017-11537/" source="CVE"/>
		<reference ref_id="CVE-2017-11637" ref_url="https://www.suse.com/security/cve/CVE-2017-11637/" source="CVE"/>
		<reference ref_id="CVE-2017-11638" ref_url="https://www.suse.com/security/cve/CVE-2017-11638/" source="CVE"/>
		<reference ref_id="CVE-2017-11642" ref_url="https://www.suse.com/security/cve/CVE-2017-11642/" source="CVE"/>
		<reference ref_id="CVE-2017-12418" ref_url="https://www.suse.com/security/cve/CVE-2017-12418/" source="CVE"/>
		<reference ref_id="CVE-2017-12427" ref_url="https://www.suse.com/security/cve/CVE-2017-12427/" source="CVE"/>
		<reference ref_id="CVE-2017-12429" ref_url="https://www.suse.com/security/cve/CVE-2017-12429/" source="CVE"/>
		<reference ref_id="CVE-2017-12432" ref_url="https://www.suse.com/security/cve/CVE-2017-12432/" source="CVE"/>
		<reference ref_id="CVE-2017-12566" ref_url="https://www.suse.com/security/cve/CVE-2017-12566/" source="CVE"/>
		<reference ref_id="CVE-2017-12654" ref_url="https://www.suse.com/security/cve/CVE-2017-12654/" source="CVE"/>
		<reference ref_id="CVE-2017-12664" ref_url="https://www.suse.com/security/cve/CVE-2017-12664/" source="CVE"/>
		<reference ref_id="CVE-2017-12665" ref_url="https://www.suse.com/security/cve/CVE-2017-12665/" source="CVE"/>
		<reference ref_id="CVE-2017-12668" ref_url="https://www.suse.com/security/cve/CVE-2017-12668/" source="CVE"/>
		<reference ref_id="CVE-2017-12674" ref_url="https://www.suse.com/security/cve/CVE-2017-12674/" source="CVE"/>
		<reference ref_id="CVE-2017-13058" ref_url="https://www.suse.com/security/cve/CVE-2017-13058/" source="CVE"/>
		<reference ref_id="CVE-2017-13131" ref_url="https://www.suse.com/security/cve/CVE-2017-13131/" source="CVE"/>
		<reference ref_id="CVE-2017-14224" ref_url="https://www.suse.com/security/cve/CVE-2017-14224/" source="CVE"/>
		<reference ref_id="CVE-2017-17885" ref_url="https://www.suse.com/security/cve/CVE-2017-17885/" source="CVE"/>
		<reference ref_id="CVE-2017-18028" ref_url="https://www.suse.com/security/cve/CVE-2017-18028/" source="CVE"/>
		<reference ref_id="CVE-2017-9407" ref_url="https://www.suse.com/security/cve/CVE-2017-9407/" source="CVE"/>
		<reference ref_id="CVE-2018-6405" ref_url="https://www.suse.com/security/cve/CVE-2018-6405/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2017-9407: In ImageMagick, the ReadPALMImage function in palm.c allowed attackers to cause a denial of service (memory leak) via a crafted file.  (bsc#1042824)
- CVE-2017-11448: The ReadJPEGImage function in coders/jpeg.c in ImageMagick allowed remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file.  (bsc#1049375)
- CVE-2017-11450: A remote denial of service in coders/jpeg.c was fixed (bsc#1049374)
- CVE-2017-11537: When ImageMagick processed a crafted file in convert, it can lead to a Floating Point Exception (FPE) in the WritePALMImage() function in coders/palm.c, related to an incorrect bits-per-pixel calculation.  (bsc#1050048)
- CVE-2017-12418: ImageMagick had memory leaks in the parse8BIMW and format8BIM functions in coders/meta.c, related to the WriteImage function in MagickCore/constitute.c.  (bsc#1052207)
- CVE-2017-12432: In ImageMagick, a memory exhaustion vulnerability was found in the function ReadPCXImage in coders/pcx.c, which allowed attackers to cause a denial of service.  (bsc#1052254)
- CVE-2017-12654: The ReadPICTImage function in coders/pict.c in ImageMagick allowed attackers to cause a denial of service (memory leak) via a crafted file.  (bsc#1052761)
- CVE-2017-12664: ImageMagick had a memory leak vulnerability in WritePALMImage in coders/palm.c.  (bsc#1052750)
- CVE-2017-12665: ImageMagick had a memory leak vulnerability in WritePICTImage in coders/pict.c.  (bsc#1052747)
- CVE-2017-12668: ImageMagick had a memory leak vulnerability in WritePCXImage in coders/pcx.c. (bsc#1052688)
- CVE-2017-13058: In ImageMagick, a memory leak vulnerability was found in the function WritePCXImage in coders/pcx.c, which allowed attackers to cause a denial of service via a crafted file.  (bsc#1055069)
- CVE-2017-14224: A heap-based buffer overflow in WritePCXImage in coders/pcx.c  could lead to  denial of service or code execution. (bsc#1058009)
- CVE-2017-17885: In ImageMagick, a memory leak vulnerability was found in the function ReadPICTImage in coders/pict.c, which allowed attackers to cause a denial of service via a crafted PICT image file. (bsc#1074119)
- CVE-2017-18028: A memory exhaustion in the function ReadTIFFImage in coders/tiff.c was fixed. (bsc#1076182)
- CVE-2018-6405: In the ReadDCMImage function in coders/dcm.c in ImageMagick, each redmap, greenmap, and bluemap variable can be overwritten by a new pointer. The previous pointer is lost, which leads to a memory leak. This allowed remote attackers to cause a denial of service. (bsc#1078433)
- CVE-2017-12427: ProcessMSLScript coders/msl.c allowed remote attackers to cause a DoS (bsc#1052248)
- CVE-2017-12566: A memory leak in ReadMVGImage in coders/mvg.c, could have allowed attackers to cause DoS (bsc#1052472)
- CVE-2017-11638, CVE-2017-11642: A NULL pointer dereference in theWriteMAPImage() in coders/map.c was fixed which could lead to a crash (bsc#1050617)
- CVE-2017-13131: A memory leak vulnerability was found in thefunction ReadMIFFImage in coders/miff.c, which allowed attackers tocause a denial of service (memory consumption in NewL (bsc#1055229)
- CVE-2017-11166: In ReadXWDImage in coders\xwd.c a memoryleak could have caused memory exhaustion via a crafted length (bsc#1048110)
- CVE-2017-12674: A CPU exhaustion in ReadPDBImage in coders/pdb.c was fixed, which allowed attackers to cause DoS (bsc#1052711)
- CVE-2017-12429: A memory exhaustion flaw in ReadMIFFImage in coders/miff.c was fixed, which allowed attackers to cause DoS (bsc#1052251)
- CVE-2017-11637: A NULL pointer dereference in WritePCLImage() in coders/pcl.c was fixed which could lead to a crash (bsc#1050669)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-20"/>
	<updated date="2018-02-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042824">SUSE bug 1042824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048110">SUSE bug 1048110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049374">SUSE bug 1049374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049375">SUSE bug 1049375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050048">SUSE bug 1050048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050617">SUSE bug 1050617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050669">SUSE bug 1050669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052207">SUSE bug 1052207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052248">SUSE bug 1052248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052251">SUSE bug 1052251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052254">SUSE bug 1052254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052472">SUSE bug 1052472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052688">SUSE bug 1052688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052711">SUSE bug 1052711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052747">SUSE bug 1052747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052750">SUSE bug 1052750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052761">SUSE bug 1052761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055069">SUSE bug 1055069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055229">SUSE bug 1055229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058009">SUSE bug 1058009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074119">SUSE bug 1074119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076182">SUSE bug 1076182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078433">SUSE bug 1078433</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11166/">CVE-2017-11166 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11166">CVE-2017-11166 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-11448/">CVE-2017-11448 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11448">CVE-2017-11448 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11450/">CVE-2017-11450 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11450">CVE-2017-11450 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11537/">CVE-2017-11537 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11537">CVE-2017-11537 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11637/">CVE-2017-11637 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11637">CVE-2017-11637 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11638/">CVE-2017-11638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11638">CVE-2017-11638 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11642/">CVE-2017-11642 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11642">CVE-2017-11642 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12418/">CVE-2017-12418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12418">CVE-2017-12418 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12427/">CVE-2017-12427 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12427">CVE-2017-12427 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12429/">CVE-2017-12429 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12429">CVE-2017-12429 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12432/">CVE-2017-12432 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12432">CVE-2017-12432 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12566/">CVE-2017-12566 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12566">CVE-2017-12566 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12654/">CVE-2017-12654 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12654">CVE-2017-12654 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12664/">CVE-2017-12664 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12664">CVE-2017-12664 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12665/">CVE-2017-12665 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12665">CVE-2017-12665 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12668/">CVE-2017-12668 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12668">CVE-2017-12668 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12674/">CVE-2017-12674 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12674">CVE-2017-12674 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13058/">CVE-2017-13058 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13058">CVE-2017-13058 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13131/">CVE-2017-13131 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13131">CVE-2017-13131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14224/">CVE-2017-14224 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14224">CVE-2017-14224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17885/">CVE-2017-17885 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17885">CVE-2017-17885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-18028/">CVE-2017-18028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18028">CVE-2017-18028 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9407/">CVE-2017-9407 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9407">CVE-2017-9407 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6405/">CVE-2018-6405 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6405">CVE-2018-6405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570446" comment="libMagickCore1-6.4.3.6-7.78.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570447" comment="libMagickCore1-32bit-6.4.3.6-7.78.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216798" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1042911" ref_url="https://bugzilla.suse.com/1042911" source="BUGZILLA"/>
		<reference ref_id="1050119" ref_url="https://bugzilla.suse.com/1050119" source="BUGZILLA"/>
		<reference ref_id="1050122" ref_url="https://bugzilla.suse.com/1050122" source="BUGZILLA"/>
		<reference ref_id="1050132" ref_url="https://bugzilla.suse.com/1050132" source="BUGZILLA"/>
		<reference ref_id="1052754" ref_url="https://bugzilla.suse.com/1052754" source="BUGZILLA"/>
		<reference ref_id="1072898" ref_url="https://bugzilla.suse.com/1072898" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11528" ref_url="https://www.suse.com/security/cve/CVE-2017-11528/" source="CVE"/>
		<reference ref_id="CVE-2017-11530" ref_url="https://www.suse.com/security/cve/CVE-2017-11530/" source="CVE"/>
		<reference ref_id="CVE-2017-11533" ref_url="https://www.suse.com/security/cve/CVE-2017-11533/" source="CVE"/>
		<reference ref_id="CVE-2017-12663" ref_url="https://www.suse.com/security/cve/CVE-2017-12663/" source="CVE"/>
		<reference ref_id="CVE-2017-17682" ref_url="https://www.suse.com/security/cve/CVE-2017-17682/" source="CVE"/>
		<reference ref_id="CVE-2017-9405" ref_url="https://www.suse.com/security/cve/CVE-2017-9405/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2017-9405: A memory leak in the ReadICONImage function was fixed that could lead to DoS via memory exhaustion (bsc#1042911)
- CVE-2017-11528: ReadDIBImage in coders/dib.c allows remote attackers to cause DoS via memory exhaustion (bsc#1050119)
- CVE-2017-11530: ReadEPTImage in coders/ept.c allows remote attackers to cause DoS via memory exhaustion (bsc#1050122)
- CVE-2017-11533: A information leak by 1 byte due to heap-based buffer over-read in the WriteUILImage() in coders/uil.c was fixed (bsc#1050132)
- CVE-2017-12663: A memory leak in WriteMAPImage in coders/map.c was fixed that could lead to a DoS via memory exhaustion (bsc#1052754)
- CVE-2017-17682: A large loop vulnerability was fixed in ExtractPostscript in coders/wpg.c, which allowed attackers to cause a denial of service (CPU exhaustion) (bsc#1072898)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-22"/>
	<updated date="2018-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042911">SUSE bug 1042911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050119">SUSE bug 1050119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050122">SUSE bug 1050122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050132">SUSE bug 1050132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052754">SUSE bug 1052754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072898">SUSE bug 1072898</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11528/">CVE-2017-11528 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11528">CVE-2017-11528 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11530/">CVE-2017-11530 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11530">CVE-2017-11530 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11533/">CVE-2017-11533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11533">CVE-2017-11533 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12663/">CVE-2017-12663 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12663">CVE-2017-12663 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17682/">CVE-2017-17682 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17682">CVE-2017-17682 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9405/">CVE-2017-9405 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9405">CVE-2017-9405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570448" comment="libMagickCore1-6.4.3.6-7.78.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570449" comment="libMagickCore1-32bit-6.4.3.6-7.78.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216799" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1043290" ref_url="https://bugzilla.suse.com/1043290" source="BUGZILLA"/>
		<reference ref_id="1050087" ref_url="https://bugzilla.suse.com/1050087" source="BUGZILLA"/>
		<reference ref_id="1056434" ref_url="https://bugzilla.suse.com/1056434" source="BUGZILLA"/>
		<reference ref_id="1058630" ref_url="https://bugzilla.suse.com/1058630" source="BUGZILLA"/>
		<reference ref_id="1059735" ref_url="https://bugzilla.suse.com/1059735" source="BUGZILLA"/>
		<reference ref_id="1066168" ref_url="https://bugzilla.suse.com/1066168" source="BUGZILLA"/>
		<reference ref_id="1066170" ref_url="https://bugzilla.suse.com/1066170" source="BUGZILLA"/>
		<reference ref_id="1082283" ref_url="https://bugzilla.suse.com/1082283" source="BUGZILLA"/>
		<reference ref_id="1082291" ref_url="https://bugzilla.suse.com/1082291" source="BUGZILLA"/>
		<reference ref_id="1082348" ref_url="https://bugzilla.suse.com/1082348" source="BUGZILLA"/>
		<reference ref_id="1082362" ref_url="https://bugzilla.suse.com/1082362" source="BUGZILLA"/>
		<reference ref_id="1082792" ref_url="https://bugzilla.suse.com/1082792" source="BUGZILLA"/>
		<reference ref_id="1084060" ref_url="https://bugzilla.suse.com/1084060" source="BUGZILLA"/>
		<reference ref_id="1086011" ref_url="https://bugzilla.suse.com/1086011" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11524" ref_url="https://www.suse.com/security/cve/CVE-2017-11524/" source="CVE"/>
		<reference ref_id="CVE-2017-12691" ref_url="https://www.suse.com/security/cve/CVE-2017-12691/" source="CVE"/>
		<reference ref_id="CVE-2017-12692" ref_url="https://www.suse.com/security/cve/CVE-2017-12692/" source="CVE"/>
		<reference ref_id="CVE-2017-12693" ref_url="https://www.suse.com/security/cve/CVE-2017-12693/" source="CVE"/>
		<reference ref_id="CVE-2017-13768" ref_url="https://www.suse.com/security/cve/CVE-2017-13768/" source="CVE"/>
		<reference ref_id="CVE-2017-14314" ref_url="https://www.suse.com/security/cve/CVE-2017-14314/" source="CVE"/>
		<reference ref_id="CVE-2017-14343" ref_url="https://www.suse.com/security/cve/CVE-2017-14343/" source="CVE"/>
		<reference ref_id="CVE-2017-14505" ref_url="https://www.suse.com/security/cve/CVE-2017-14505/" source="CVE"/>
		<reference ref_id="CVE-2017-15016" ref_url="https://www.suse.com/security/cve/CVE-2017-15016/" source="CVE"/>
		<reference ref_id="CVE-2017-15017" ref_url="https://www.suse.com/security/cve/CVE-2017-15017/" source="CVE"/>
		<reference ref_id="CVE-2017-16352" ref_url="https://www.suse.com/security/cve/CVE-2017-16352/" source="CVE"/>
		<reference ref_id="CVE-2017-16353" ref_url="https://www.suse.com/security/cve/CVE-2017-16353/" source="CVE"/>
		<reference ref_id="CVE-2017-18219" ref_url="https://www.suse.com/security/cve/CVE-2017-18219/" source="CVE"/>
		<reference ref_id="CVE-2017-9500" ref_url="https://www.suse.com/security/cve/CVE-2017-9500/" source="CVE"/>
		<reference ref_id="CVE-2018-7443" ref_url="https://www.suse.com/security/cve/CVE-2018-7443/" source="CVE"/>
		<reference ref_id="CVE-2018-8804" ref_url="https://www.suse.com/security/cve/CVE-2018-8804/" source="CVE"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2018-8804: The WriteEPTImage function allowed remote attackers to cause a
  denial of service (double free and application crash) or possibly have
  unspecified other impact via a crafted file (bsc#1086011)
- CVE-2017-11524: The WriteBlob function allowed remote attackers to cause a
  denial of service (assertion failure and application exit) via a crafted file
  (bsc#1050087)
- CVE-2017-18219: Prevent allocation failure in the function ReadOnePNGImage,
  which allowed attackers to cause a denial of service via a crafted file that
  triggers an attempt at a large png_pixels array allocation (bsc#1084060).
- CVE-2017-9500: Prevent assertion failure in the function
  ResetImageProfileIterator, which allowed attackers to cause a denial of service
  via a crafted file (bsc#1043290)
- CVE-2017-16353: Prevent memory information disclosure in the DescribeImage
  function caused by a heap-based buffer over-read. The portion of the code
  containing the vulnerability is responsible for printing the IPTC Profile
  information contained in the image. This vulnerability can be triggered with a
  specially crafted MIFF file. There is an out-of-bounds buffer dereference
  because certain increments were never checked (bsc#1066170)
- CVE-2017-16352: Prevent a heap-based buffer overflow in the 'Display visual
  image directory' feature of the DescribeImage() function. One possible way to
  trigger the vulnerability is to run the identify command on a specially crafted
  MIFF format file with the verbose flag (bsc#1066168)
- CVE-2017-14314: Prevent off-by-one error in the DrawImage function that
  allowed remote attackers to cause a denial of service (DrawDashPolygon
  heap-based buffer over-read and application crash) via a crafted file
  (bsc#1058630)
- CVE-2017-13768: Prevent NULL pointer dereference in the IdentifyImage
  function that allowed an attacker to perform denial of service by sending a
  crafted image file (bsc#1056434)
- CVE-2017-14505: Fixed handling of NULL arrays, which allowed attackers to
  perform Denial of Service (NULL pointer dereference and application crash in
  AcquireQuantumMemory within MagickCore/memory.c) by providing a crafted Image
  File as input (bsc#1059735)
- CVE-2018-7443: The ReadTIFFImage function did not properly validate the
  amount of image data in a file, which allowed remote attackers to cause a
  denial of service (memory allocation failure in the AcquireMagickMemory
  function in MagickCore/memory.c) (bsc#1082792)
- CVE-2017-15016: Prevent NULL pointer dereference vulnerability in
  ReadEnhMetaFile allowing for denial of service (bsc#1082291)
- CVE-2017-15017: Prevent NULL pointer dereference vulnerability in
  ReadOneMNGImage allowing for denial of service (bsc#1082283)
- CVE-2017-12692: The ReadVIFFImage function allowed remote attackers to cause
  a denial of service (memory consumption) via a crafted VIFF file (bsc#1082362)
- CVE-2017-12693: The ReadBMPImage function allowed remote attackers to cause a
  denial of service (memory consumption) via a crafted BMP file (bsc#1082348)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-05"/>
	<updated date="2018-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043290">SUSE bug 1043290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050087">SUSE bug 1050087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056434">SUSE bug 1056434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058630">SUSE bug 1058630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059735">SUSE bug 1059735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066168">SUSE bug 1066168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066170">SUSE bug 1066170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082283">SUSE bug 1082283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082291">SUSE bug 1082291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082348">SUSE bug 1082348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082362">SUSE bug 1082362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082792">SUSE bug 1082792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084060">SUSE bug 1084060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086011">SUSE bug 1086011</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11524/">CVE-2017-11524 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11524">CVE-2017-11524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12691/">CVE-2017-12691 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12691">CVE-2017-12691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12692/">CVE-2017-12692 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12692">CVE-2017-12692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12693/">CVE-2017-12693 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12693">CVE-2017-12693 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13768/">CVE-2017-13768 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13768">CVE-2017-13768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14314/">CVE-2017-14314 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14314">CVE-2017-14314 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14343/">CVE-2017-14343 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14343">CVE-2017-14343 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14505/">CVE-2017-14505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14505">CVE-2017-14505 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15016/">CVE-2017-15016 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15016">CVE-2017-15016 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15017/">CVE-2017-15017 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15017">CVE-2017-15017 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-16352/">CVE-2017-16352 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16352">CVE-2017-16352 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16353/">CVE-2017-16353 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16353">CVE-2017-16353 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18219/">CVE-2017-18219 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18219">CVE-2017-18219 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9500/">CVE-2017-9500 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9500">CVE-2017-9500 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7443/">CVE-2018-7443 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7443">CVE-2018-7443 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8804/">CVE-2018-8804 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8804">CVE-2018-8804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570450" comment="libMagickCore1-6.4.3.6-78.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570451" comment="libMagickCore1-32bit-6.4.3.6-78.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216800" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1047356" ref_url="https://bugzilla.suse.com/1047356" source="BUGZILLA"/>
		<reference ref_id="1086773" ref_url="https://bugzilla.suse.com/1086773" source="BUGZILLA"/>
		<reference ref_id="1086782" ref_url="https://bugzilla.suse.com/1086782" source="BUGZILLA"/>
		<reference ref_id="1087027" ref_url="https://bugzilla.suse.com/1087027" source="BUGZILLA"/>
		<reference ref_id="1087033" ref_url="https://bugzilla.suse.com/1087033" source="BUGZILLA"/>
		<reference ref_id="1087037" ref_url="https://bugzilla.suse.com/1087037" source="BUGZILLA"/>
		<reference ref_id="1089781" ref_url="https://bugzilla.suse.com/1089781" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000476" ref_url="https://www.suse.com/security/cve/CVE-2017-1000476/" source="CVE"/>
		<reference ref_id="CVE-2017-10928" ref_url="https://www.suse.com/security/cve/CVE-2017-10928/" source="CVE"/>
		<reference ref_id="CVE-2017-18251" ref_url="https://www.suse.com/security/cve/CVE-2017-18251/" source="CVE"/>
		<reference ref_id="CVE-2017-18252" ref_url="https://www.suse.com/security/cve/CVE-2017-18252/" source="CVE"/>
		<reference ref_id="CVE-2017-18254" ref_url="https://www.suse.com/security/cve/CVE-2017-18254/" source="CVE"/>
		<reference ref_id="CVE-2018-10177" ref_url="https://www.suse.com/security/cve/CVE-2018-10177/" source="CVE"/>
		<reference ref_id="CVE-2018-8960" ref_url="https://www.suse.com/security/cve/CVE-2018-8960/" source="CVE"/>
		<reference ref_id="CVE-2018-9018" ref_url="https://www.suse.com/security/cve/CVE-2018-9018/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:


- security update (png.c)
  * CVE-2018-9018: divide-by-zero in the ReadMNGImage function of coders/png.c. 
    Attackers could leverage this vulnerability to cause a crash and denial of service 
    via a crafted mng file. [bsc#1086773]
  * CVE-2018-10177: there is an infinite loop in the ReadOneMNGImagefunction of the coders/png.c file. Remote attackers could leverage thisvulnerability to cause a denial of service (bsc#1089781)

- security update (wand)
  * CVE-2017-18252: The MogrifyImageList function in MagickWand/mogrify.c could allow 
    attackers to cause a denial of service via a crafted file. [bsc#1087033]

- security update (gif.c)
  * CVE-2017-18254: A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, 
    which could lead to  denial of service via a crafted file. [bsc#1087027]

- security update (core)
  * CVE-2017-10928: a heap-based buffer over-read in the GetNextToken function in token.c 
    could allow attackers to obtain sensitive information from process memory or possibly have 
    unspecified other impact via a crafted SVG document that is mishandled in the 
    GetUserSpaceCoordinateValue function in coders/svg.c. [bsc#1047356]

- security update (pcd.c)
  * CVE-2017-18251: A memory leak vulnerability was found in the function ReadPCDImage in coders/pcd.c, 
    which could lead to a denial of service via a crafted file. [bsc#1087037]

- security update (gif.c)
  * CVE-2017-18254: A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, which could lead to denial of service via a crafted file. [bsc#1087027]

- security update (tiff.c)
  * CVE-2018-8960: The ReadTIFFImage function in coders/tiff.c in ImageMagick memory allocation issue could lead to denial of service (bsc#1086782)



		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-02"/>
	<updated date="2018-05-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047356">SUSE bug 1047356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086773">SUSE bug 1086773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086782">SUSE bug 1086782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087027">SUSE bug 1087027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087033">SUSE bug 1087033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087037">SUSE bug 1087037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089781">SUSE bug 1089781</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000476/">CVE-2017-1000476 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000476">CVE-2017-1000476 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10928/">CVE-2017-10928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10928">CVE-2017-10928 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18251/">CVE-2017-18251 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18251">CVE-2017-18251 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18252/">CVE-2017-18252 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18252">CVE-2017-18252 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18254/">CVE-2017-18254 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18254">CVE-2017-18254 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10177/">CVE-2018-10177 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10177">CVE-2018-10177 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8960/">CVE-2018-8960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8960">CVE-2018-8960 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9018/">CVE-2018-9018 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9018">CVE-2018-9018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570452" comment="libMagickCore1-6.4.3.6-78.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570453" comment="libMagickCore1-32bit-6.4.3.6-78.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216801" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1056277" ref_url="https://bugzilla.suse.com/1056277" source="BUGZILLA"/>
		<reference ref_id="1094204" ref_url="https://bugzilla.suse.com/1094204" source="BUGZILLA"/>
		<reference ref_id="1094237" ref_url="https://bugzilla.suse.com/1094237" source="BUGZILLA"/>
		<reference ref_id="1095812" ref_url="https://bugzilla.suse.com/1095812" source="BUGZILLA"/>
		<reference ref_id="1098545" ref_url="https://bugzilla.suse.com/1098545" source="BUGZILLA"/>
		<reference ref_id="1098546" ref_url="https://bugzilla.suse.com/1098546" source="BUGZILLA"/>
		<reference ref_id="1102003" ref_url="https://bugzilla.suse.com/1102003" source="BUGZILLA"/>
		<reference ref_id="1102004" ref_url="https://bugzilla.suse.com/1102004" source="BUGZILLA"/>
		<reference ref_id="1102005" ref_url="https://bugzilla.suse.com/1102005" source="BUGZILLA"/>
		<reference ref_id="1102007" ref_url="https://bugzilla.suse.com/1102007" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13758" ref_url="https://www.suse.com/security/cve/CVE-2017-13758/" source="CVE"/>
		<reference ref_id="CVE-2017-18271" ref_url="https://www.suse.com/security/cve/CVE-2017-18271/" source="CVE"/>
		<reference ref_id="CVE-2018-10805" ref_url="https://www.suse.com/security/cve/CVE-2018-10805/" source="CVE"/>
		<reference ref_id="CVE-2018-11251" ref_url="https://www.suse.com/security/cve/CVE-2018-11251/" source="CVE"/>
		<reference ref_id="CVE-2018-12599" ref_url="https://www.suse.com/security/cve/CVE-2018-12599/" source="CVE"/>
		<reference ref_id="CVE-2018-12600" ref_url="https://www.suse.com/security/cve/CVE-2018-12600/" source="CVE"/>
		<reference ref_id="CVE-2018-14434" ref_url="https://www.suse.com/security/cve/CVE-2018-14434/" source="CVE"/>
		<reference ref_id="CVE-2018-14435" ref_url="https://www.suse.com/security/cve/CVE-2018-14435/" source="CVE"/>
		<reference ref_id="CVE-2018-14436" ref_url="https://www.suse.com/security/cve/CVE-2018-14436/" source="CVE"/>
		<reference ref_id="CVE-2018-14437" ref_url="https://www.suse.com/security/cve/CVE-2018-14437/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2018-11251: Heap-based buffer over-read in ReadSUNImage in coders/sun.c,
  which allows attackers to cause denial of service (bsc#1094237)
- CVE-2017-18271: Infinite loop in the function ReadMIFFImage in coders/miff.c,
  which allows attackers to cause a denial of service (bsc#1094204)
- CVE-2017-13758: Heap-based buffer overflow in the TracePoint() in
  MagickCore/draw.c, which allows attackers to cause a denial of
  service(bsc#1056277)
- CVE-2018-10805: Fixed several memory leaks in rgb.c, cmyk.c, gray.c, and
  ycbcr.c (bsc#1095812)
- CVE-2018-12600: The ReadDIBImage and WriteDIBImage functions allowed
  attackers to cause an out of bounds write via a crafted file (bsc#1098545)
- CVE-2018-12599: The ReadBMPImage and WriteBMPImage fucntions allowed
  attackers to cause an out of bounds write via a crafted file (bsc#1098546)
- CVE-2018-14434: Fixed a memory leak for a colormap in WriteMPCImage in coders/mpc.c (bsc#1102003)
- CVE-2018-14435: Fixed a memory leak in DecodeImage in coders/pcd.c (bsc#1102007) 
- CVE-2018-14436: Fixed a memory leak in ReadMIFFImage in coders/miff.c (bsc#1102005)
- CVE-2018-14437: Fixed a memory leak in parse8BIM in coders/meta.c (bsc#1102004)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-21"/>
	<updated date="2018-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056277">SUSE bug 1056277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094204">SUSE bug 1094204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094237">SUSE bug 1094237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095812">SUSE bug 1095812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098545">SUSE bug 1098545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098546">SUSE bug 1098546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102003">SUSE bug 1102003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102004">SUSE bug 1102004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102005">SUSE bug 1102005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102007">SUSE bug 1102007</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13758/">CVE-2017-13758 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13758">CVE-2017-13758 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18271/">CVE-2017-18271 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18271">CVE-2017-18271 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10805/">CVE-2018-10805 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10805">CVE-2018-10805 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11251/">CVE-2018-11251 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11251">CVE-2018-11251 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12599/">CVE-2018-12599 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12599">CVE-2018-12599 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12600/">CVE-2018-12600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12600">CVE-2018-12600 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14434/">CVE-2018-14434 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14434">CVE-2018-14434 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14435/">CVE-2018-14435 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14435">CVE-2018-14435 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14436/">CVE-2018-14436 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14436">CVE-2018-14436 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14437/">CVE-2018-14437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14437">CVE-2018-14437 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570454" comment="libMagickCore1-6.4.3.6-78.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570455" comment="libMagickCore1-32bit-6.4.3.6-78.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216802" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1105592" ref_url="https://bugzilla.suse.com/1105592" source="BUGZILLA"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issue fixed:

- Hide PS, XPS and PDF coders into */vulnerable (bsc#1105592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-29"/>
	<updated date="2018-08-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570456" comment="libMagickCore1-6.4.3.6-78.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570457" comment="libMagickCore1-32bit-6.4.3.6-78.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216803" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1074170" ref_url="https://bugzilla.suse.com/1074170" source="BUGZILLA"/>
		<reference ref_id="1106855" ref_url="https://bugzilla.suse.com/1106855" source="BUGZILLA"/>
		<reference ref_id="1106989" ref_url="https://bugzilla.suse.com/1106989" source="BUGZILLA"/>
		<reference ref_id="1107604" ref_url="https://bugzilla.suse.com/1107604" source="BUGZILLA"/>
		<reference ref_id="1107609" ref_url="https://bugzilla.suse.com/1107609" source="BUGZILLA"/>
		<reference ref_id="1107612" ref_url="https://bugzilla.suse.com/1107612" source="BUGZILLA"/>
		<reference ref_id="1107616" ref_url="https://bugzilla.suse.com/1107616" source="BUGZILLA"/>
		<reference ref_id="1108282" ref_url="https://bugzilla.suse.com/1108282" source="BUGZILLA"/>
		<reference ref_id="1108283" ref_url="https://bugzilla.suse.com/1108283" source="BUGZILLA"/>
		<reference ref_id="1110746" ref_url="https://bugzilla.suse.com/1110746" source="BUGZILLA"/>
		<reference ref_id="1110747" ref_url="https://bugzilla.suse.com/1110747" source="BUGZILLA"/>
		<reference ref_id="1111069" ref_url="https://bugzilla.suse.com/1111069" source="BUGZILLA"/>
		<reference ref_id="1111072" ref_url="https://bugzilla.suse.com/1111072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17934" ref_url="https://www.suse.com/security/cve/CVE-2017-17934/" source="CVE"/>
		<reference ref_id="CVE-2018-16323" ref_url="https://www.suse.com/security/cve/CVE-2018-16323/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-16642" ref_url="https://www.suse.com/security/cve/CVE-2018-16642/" source="CVE"/>
		<reference ref_id="CVE-2018-16643" ref_url="https://www.suse.com/security/cve/CVE-2018-16643/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="CVE-2018-16645" ref_url="https://www.suse.com/security/cve/CVE-2018-16645/" source="CVE"/>
		<reference ref_id="CVE-2018-16749" ref_url="https://www.suse.com/security/cve/CVE-2018-16749/" source="CVE"/>
		<reference ref_id="CVE-2018-16750" ref_url="https://www.suse.com/security/cve/CVE-2018-16750/" source="CVE"/>
		<reference ref_id="CVE-2018-17965" ref_url="https://www.suse.com/security/cve/CVE-2018-17965/" source="CVE"/>
		<reference ref_id="CVE-2018-17966" ref_url="https://www.suse.com/security/cve/CVE-2018-17966/" source="CVE"/>
		<reference ref_id="CVE-2018-18016" ref_url="https://www.suse.com/security/cve/CVE-2018-18016/" source="CVE"/>
		<reference ref_id="CVE-2018-18024" ref_url="https://www.suse.com/security/cve/CVE-2018-18024/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following security issue:

- CVE-2017-17934: Prevent memory leaks, related to MSLPopImage and
  ProcessMSLScript, and associated with mishandling of MSLPushImage calls
  (bsc#1074170).
- CVE-2018-16750: Prevent memory leak in the formatIPTCfromBuffer function
  (bsc#1108283)
- CVE-2018-16749: Added missing NULL check in ReadOneJNGImage that allowed an
  attacker to cause a denial of service (WriteBlob assertion failure and
  application exit) via a crafted file (bsc#1108282)
- CVE-2018-16413: Prevent heap-based buffer over-read in the PushShortPixel
  function leading to DoS (bsc#1106989).
- CVE-2018-16323: ReadXBMImage left data uninitialized when processing an XBM
  file that has a negative pixel value. If the affected code was used as a
  library loaded into a process that includes sensitive information, that
  information sometimes can be leaked via the image data (bsc#1106855)
- CVE-2018-16642: The function InsertRow allowed remote attackers to cause a
  denial of service via a crafted image file due to an out-of-bounds write
  (bsc#1107616)
- CVE-2018-16643: The functions ReadDCMImage, ReadPWPImage, ReadCALSImage, and
  ReadPICTImage did check the return value of the fputc function, which allowed
  remote attackers to cause a denial of service via a crafted image file
  (bsc#1107612)
- CVE-2018-16644: Added missing check for length in the functions ReadDCMImage
  and ReadPICTImage, which allowed remote attackers to cause a denial of service
  via a crafted image (bsc#1107609)
- CVE-2018-16645: Prevent excessive memory allocation issue in the functions
  ReadBMPImage and ReadDIBImage, which allowed remote attackers to cause a denial
  of service via a crafted image file (bsc#1107604)
- CVE-2018-18024: Fixed an infinite loop in the ReadBMPImage function of
  the coders/bmp.c file. Remote attackers could leverage this vulnerability
  to cause a denial of service via a crafted bmp file (bsc#1111069)
- CVE-2018-18016: Fixed a memory leak in WritePCXImage (bsc#1111072)
- CVE-2018-17965: Fixed a memory leak in WriteSGIImage (bsc#1110747)
- CVE-2018-17966: Fixed a memory leak in WritePDBImage (bsc#1110746)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074170">SUSE bug 1074170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106855">SUSE bug 1106855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107604">SUSE bug 1107604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107612">SUSE bug 1107612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107616">SUSE bug 1107616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108282">SUSE bug 1108282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108283">SUSE bug 1108283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110746">SUSE bug 1110746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110747">SUSE bug 1110747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111069">SUSE bug 1111069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111072">SUSE bug 1111072</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17934/">CVE-2017-17934 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17934">CVE-2017-17934 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16323/">CVE-2018-16323 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16323">CVE-2018-16323 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16413">CVE-2018-16413 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16642/">CVE-2018-16642 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16642">CVE-2018-16642 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16643/">CVE-2018-16643 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16643">CVE-2018-16643 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16644">CVE-2018-16644 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16645/">CVE-2018-16645 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16645">CVE-2018-16645 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16749/">CVE-2018-16749 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16749">CVE-2018-16749 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16750/">CVE-2018-16750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16750">CVE-2018-16750 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17965/">CVE-2018-17965 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17965">CVE-2018-17965 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17966/">CVE-2018-17966 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17966">CVE-2018-17966 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18016/">CVE-2018-18016 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18016">CVE-2018-18016 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18024/">CVE-2018-18024 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18024">CVE-2018-18024 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570458" comment="libMagickCore1-6.4.3.6-78.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570459" comment="libMagickCore1-32bit-6.4.3.6-78.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216804" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1050129" ref_url="https://bugzilla.suse.com/1050129" source="BUGZILLA"/>
		<reference ref_id="1050635" ref_url="https://bugzilla.suse.com/1050635" source="BUGZILLA"/>
		<reference ref_id="1107609" ref_url="https://bugzilla.suse.com/1107609" source="BUGZILLA"/>
		<reference ref_id="1112399" ref_url="https://bugzilla.suse.com/1112399" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11532" ref_url="https://www.suse.com/security/cve/CVE-2017-11532/" source="CVE"/>
		<reference ref_id="CVE-2017-11639" ref_url="https://www.suse.com/security/cve/CVE-2017-11639/" source="CVE"/>
		<reference ref_id="CVE-2017-14997" ref_url="https://www.suse.com/security/cve/CVE-2017-14997/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:


- CVE-2017-14997: ImageMagick allowed remote attackers to cause a denial of service (excessive memory allocation) because of an integer underflow in ReadPICTImage in coders/pict.c.  (bsc#1112399)
- CVE-2018-16644: A regression in the security fix for the pict coder was fixed (bsc#1107609)
- CVE-2017-11532: When ImageMagick processed a crafted file in convert, it could lead to a Memory Leak in the WriteMPCImage() function in coders/mpc.c. (bsc#1050129)
- CVE-2017-11639: A regression in the security fix in the cip coder was fixed (bsc#1050635)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-19"/>
	<updated date="2018-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050129">SUSE bug 1050129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050635">SUSE bug 1050635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112399">SUSE bug 1112399</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11532/">CVE-2017-11532 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11532">CVE-2017-11532 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11639/">CVE-2017-11639 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11639">CVE-2017-11639 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14997/">CVE-2017-14997 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14997">CVE-2017-14997 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16644">CVE-2018-16644 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570460" comment="libMagickCore1-6.4.3.6-78.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570461" comment="libMagickCore1-32bit-6.4.3.6-78.79.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216805" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1106989" ref_url="https://bugzilla.suse.com/1106989" source="BUGZILLA"/>
		<reference ref_id="1106996" ref_url="https://bugzilla.suse.com/1106996" source="BUGZILLA"/>
		<reference ref_id="1113064" ref_url="https://bugzilla.suse.com/1113064" source="BUGZILLA"/>
		<reference ref_id="1120381" ref_url="https://bugzilla.suse.com/1120381" source="BUGZILLA"/>
		<reference ref_id="1124365" ref_url="https://bugzilla.suse.com/1124365" source="BUGZILLA"/>
		<reference ref_id="1124366" ref_url="https://bugzilla.suse.com/1124366" source="BUGZILLA"/>
		<reference ref_id="1128649" ref_url="https://bugzilla.suse.com/1128649" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16412" ref_url="https://www.suse.com/security/cve/CVE-2018-16412/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-18544" ref_url="https://www.suse.com/security/cve/CVE-2018-18544/" source="CVE"/>
		<reference ref_id="CVE-2018-20467" ref_url="https://www.suse.com/security/cve/CVE-2018-20467/" source="CVE"/>
		<reference ref_id="CVE-2019-7175" ref_url="https://www.suse.com/security/cve/CVE-2019-7175/" source="CVE"/>
		<reference ref_id="CVE-2019-7397" ref_url="https://www.suse.com/security/cve/CVE-2019-7397/" source="CVE"/>
		<reference ref_id="CVE-2019-7398" ref_url="https://www.suse.com/security/cve/CVE-2019-7398/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-7175: Fixed multiple memory leaks in DecodeImage function (bsc#1128649).
- CVE-2018-18544: Fixed memory leak in the function WriteMSLImage (bsc#1113064).
- CVE-2018-20467: Fixed infinite loop in coders/bmp.c (bsc#1120381).
- CVE-2019-7397: Fixed a memory leak in the function WritePDFImage (bsc#1124366).
- CVE-2018-16413: Prevent heap-based buffer over-read in the PushShortPixel
  function leading to DoS (bsc#1106989).
- CVE-2018-16412: Prevent heap-based buffer over-read in the ParseImageResourceBlocks
  function leading to DOS (bsc#1106996).
- CVE-2019-7398: Fixed a memory leak in the function WriteDIBImage (bsc#1124365).


		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106996">SUSE bug 1106996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113064">SUSE bug 1113064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120381">SUSE bug 1120381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124365">SUSE bug 1124365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124366">SUSE bug 1124366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128649">SUSE bug 1128649</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16412/">CVE-2018-16412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16412">CVE-2018-16412 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16413">CVE-2018-16413 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18544/">CVE-2018-18544 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18544">CVE-2018-18544 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20467/">CVE-2018-20467 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20467">CVE-2018-20467 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7175/">CVE-2019-7175 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7175">CVE-2019-7175 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7397/">CVE-2019-7397 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7397">CVE-2019-7397 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7398/">CVE-2019-7398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7398">CVE-2019-7398 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570462" comment="libMagickCore1-6.4.3.6-78.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570463" comment="libMagickCore1-32bit-6.4.3.6-78.92.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216806" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1130330" ref_url="https://bugzilla.suse.com/1130330" source="BUGZILLA"/>
		<reference ref_id="1131317" ref_url="https://bugzilla.suse.com/1131317" source="BUGZILLA"/>
		<reference ref_id="1132053" ref_url="https://bugzilla.suse.com/1132053" source="BUGZILLA"/>
		<reference ref_id="1132060" ref_url="https://bugzilla.suse.com/1132060" source="BUGZILLA"/>
		<reference ref_id="1133204" ref_url="https://bugzilla.suse.com/1133204" source="BUGZILLA"/>
		<reference ref_id="1133205" ref_url="https://bugzilla.suse.com/1133205" source="BUGZILLA"/>
		<reference ref_id="1133498" ref_url="https://bugzilla.suse.com/1133498" source="BUGZILLA"/>
		<reference ref_id="1133501" ref_url="https://bugzilla.suse.com/1133501" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10650" ref_url="https://www.suse.com/security/cve/CVE-2019-10650/" source="CVE"/>
		<reference ref_id="CVE-2019-11007" ref_url="https://www.suse.com/security/cve/CVE-2019-11007/" source="CVE"/>
		<reference ref_id="CVE-2019-11009" ref_url="https://www.suse.com/security/cve/CVE-2019-11009/" source="CVE"/>
		<reference ref_id="CVE-2019-11470" ref_url="https://www.suse.com/security/cve/CVE-2019-11470/" source="CVE"/>
		<reference ref_id="CVE-2019-11472" ref_url="https://www.suse.com/security/cve/CVE-2019-11472/" source="CVE"/>
		<reference ref_id="CVE-2019-11505" ref_url="https://www.suse.com/security/cve/CVE-2019-11505/" source="CVE"/>
		<reference ref_id="CVE-2019-11506" ref_url="https://www.suse.com/security/cve/CVE-2019-11506/" source="CVE"/>
		<reference ref_id="CVE-2019-9956" ref_url="https://www.suse.com/security/cve/CVE-2019-9956/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-9956: Fixed a stack-based buffer overflow in PopHexPixel() (bsc#1130330).
- CVE-2019-10650: Fixed a heap-based buffer over-read in WriteTIFFImage() (bsc#1131317).
- CVE-2019-11007: Fixed a heap-based buffer overflow in ReadMNGImage() (bsc#1132060).
- CVE-2019-11009: Fixed a heap-based buffer over-read in ReadXWDImage() (bsc#1132053).
- CVE-2019-11472: Fixed a denial-of-service in ReadXWDImage() (bsc#1133204).
- CVE-2019-11470: Fixed a denial-of-service in ReadCINImage() (bsc#1133205).
- CVE-2019-11506: Fixed a heap-based buffer overflow in the WriteMATLABImage() (bsc#1133498).
- CVE-2019-11505: Fixed a heap-based buffer overflow in the WritePDBImage() (bsc#1133501).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1130330">SUSE bug 1130330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131317">SUSE bug 1131317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132053">SUSE bug 1132053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132060">SUSE bug 1132060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133204">SUSE bug 1133204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133205">SUSE bug 1133205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133498">SUSE bug 1133498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133501">SUSE bug 1133501</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10650/">CVE-2019-10650 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10650">CVE-2019-10650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11007/">CVE-2019-11007 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11007">CVE-2019-11007 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11009/">CVE-2019-11009 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11009">CVE-2019-11009 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11470/">CVE-2019-11470 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11470">CVE-2019-11470 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11472/">CVE-2019-11472 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11472">CVE-2019-11472 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11505/">CVE-2019-11505 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11505">CVE-2019-11505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11506/">CVE-2019-11506 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11506">CVE-2019-11506 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9956/">CVE-2019-9956 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9956">CVE-2019-9956 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570464" comment="libMagickCore1-6.4.3.6-78.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570465" comment="libMagickCore1-32bit-6.4.3.6-78.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216807" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1134075" ref_url="https://bugzilla.suse.com/1134075" source="BUGZILLA"/>
		<reference ref_id="1135232" ref_url="https://bugzilla.suse.com/1135232" source="BUGZILLA"/>
		<reference ref_id="1135236" ref_url="https://bugzilla.suse.com/1135236" source="BUGZILLA"/>
		<reference ref_id="1136183" ref_url="https://bugzilla.suse.com/1136183" source="BUGZILLA"/>
		<reference ref_id="1136732" ref_url="https://bugzilla.suse.com/1136732" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12805" ref_url="https://www.suse.com/security/cve/CVE-2017-12805/" source="CVE"/>
		<reference ref_id="CVE-2017-12806" ref_url="https://www.suse.com/security/cve/CVE-2017-12806/" source="CVE"/>
		<reference ref_id="CVE-2019-10131" ref_url="https://www.suse.com/security/cve/CVE-2019-10131/" source="CVE"/>
		<reference ref_id="CVE-2019-11598" ref_url="https://www.suse.com/security/cve/CVE-2019-11598/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issue fixed:

- CVE-2019-10131: Fixed a off-by-one read in formatIPTCfromBuffer function in coders/meta.c (bsc#1134075).
- CVE-2017-12805: Fixed a denial of service through memory exhaustion in ReadTIFFImage() (bsc#1135236).
- CVE-2019-11598: Fixed a heap-based buffer over-read in WritePNMImage() (bsc#1136732)

We also now disable PCL in the -SUSE configuration, as it also uses ghostscript for decoding (bsc#1136183)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-17"/>
	<updated date="2019-06-17"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1134075">SUSE bug 1134075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135232">SUSE bug 1135232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135236">SUSE bug 1135236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136183">SUSE bug 1136183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136732">SUSE bug 1136732</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12805/">CVE-2017-12805 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12805">CVE-2017-12805 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12806/">CVE-2017-12806 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12806">CVE-2017-12806 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10131/">CVE-2019-10131 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10131">CVE-2019-10131 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11598/">CVE-2019-11598 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11598">CVE-2019-11598 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570466" comment="libMagickCore1-6.4.3.6-78.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570467" comment="libMagickCore1-32bit-6.4.3.6-78.106.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216808" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1138425" ref_url="https://bugzilla.suse.com/1138425" source="BUGZILLA"/>
		<reference ref_id="1138464" ref_url="https://bugzilla.suse.com/1138464" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11597" ref_url="https://www.suse.com/security/cve/CVE-2019-11597/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-11597: Fixed a heap-based buffer over-read in the WriteTIFFImage() (bsc#1138464).
- Fixed a file content disclosure via SVG and WMF decoding (bsc#1138425).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-08"/>
	<updated date="2019-07-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1138425">SUSE bug 1138425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138464">SUSE bug 1138464</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11597/">CVE-2019-11597 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11597">CVE-2019-11597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570468" comment="libMagickCore1-6.4.3.6-78.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570469" comment="libMagickCore1-32bit-6.4.3.6-78.109.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216809" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1139886" ref_url="https://bugzilla.suse.com/1139886" source="BUGZILLA"/>
		<reference ref_id="1140100" ref_url="https://bugzilla.suse.com/1140100" source="BUGZILLA"/>
		<reference ref_id="1140102" ref_url="https://bugzilla.suse.com/1140102" source="BUGZILLA"/>
		<reference ref_id="1140103" ref_url="https://bugzilla.suse.com/1140103" source="BUGZILLA"/>
		<reference ref_id="1140106" ref_url="https://bugzilla.suse.com/1140106" source="BUGZILLA"/>
		<reference ref_id="1140110" ref_url="https://bugzilla.suse.com/1140110" source="BUGZILLA"/>
		<reference ref_id="1140513" ref_url="https://bugzilla.suse.com/1140513" source="BUGZILLA"/>
		<reference ref_id="1140554" ref_url="https://bugzilla.suse.com/1140554" source="BUGZILLA"/>
		<reference ref_id="1140664" ref_url="https://bugzilla.suse.com/1140664" source="BUGZILLA"/>
		<reference ref_id="1140666" ref_url="https://bugzilla.suse.com/1140666" source="BUGZILLA"/>
		<reference ref_id="1141171" ref_url="https://bugzilla.suse.com/1141171" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12975" ref_url="https://www.suse.com/security/cve/CVE-2019-12975/" source="CVE"/>
		<reference ref_id="CVE-2019-12976" ref_url="https://www.suse.com/security/cve/CVE-2019-12976/" source="CVE"/>
		<reference ref_id="CVE-2019-12979" ref_url="https://www.suse.com/security/cve/CVE-2019-12979/" source="CVE"/>
		<reference ref_id="CVE-2019-13133" ref_url="https://www.suse.com/security/cve/CVE-2019-13133/" source="CVE"/>
		<reference ref_id="CVE-2019-13134" ref_url="https://www.suse.com/security/cve/CVE-2019-13134/" source="CVE"/>
		<reference ref_id="CVE-2019-13135" ref_url="https://www.suse.com/security/cve/CVE-2019-13135/" source="CVE"/>
		<reference ref_id="CVE-2019-13295" ref_url="https://www.suse.com/security/cve/CVE-2019-13295/" source="CVE"/>
		<reference ref_id="CVE-2019-13297" ref_url="https://www.suse.com/security/cve/CVE-2019-13297/" source="CVE"/>
		<reference ref_id="CVE-2019-13301" ref_url="https://www.suse.com/security/cve/CVE-2019-13301/" source="CVE"/>
		<reference ref_id="CVE-2019-13311" ref_url="https://www.suse.com/security/cve/CVE-2019-13311/" source="CVE"/>
		<reference ref_id="CVE-2019-13454" ref_url="https://www.suse.com/security/cve/CVE-2019-13454/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2019-13301: Fixed a memory leak in AcquireMagickMemory() (bsc#1140554).
- CVE-2019-13311: Fixed a memory leak at AcquireMagickMemory because of a wand/mogrify.c error (bsc#1140513).
- CVE-2019-13454: Fixed a division by zero in RemoveDuplicateLayers in MagickCore/layer.c (bsc#1141171).
- CVE-2019-13295: Fixed a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage (bsc#1140664).
- CVE-2019-13297: Fixed a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage (bsc#1140666).
- CVE-2019-12979: Fixed the use of uninitialized values in SyncImageSettings() (bsc#1139886).
- CVE-2019-12975: Fixed a memory leak in the WriteDPXImage() in coders/dpx.c (bsc#1140106).
- CVE-2019-13135: Fixed the use of uninitialized values in ReadCUTImage() (bsc#1140103).
- CVE-2019-13133: Fixed a memory leak in the ReadBMPImage() (bsc#1140100).
- CVE-2019-13134: Fixed a memory leak in the ReadVIFFImage() (bsc#1140102).
- CVE-2019-12976: Fixed a memory leak in the ReadPCLImage() in coders/pcl.c(bsc#1140110).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-30"/>
	<updated date="2019-07-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1139886">SUSE bug 1139886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140100">SUSE bug 1140100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140102">SUSE bug 1140102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140103">SUSE bug 1140103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140106">SUSE bug 1140106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140110">SUSE bug 1140110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140513">SUSE bug 1140513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140554">SUSE bug 1140554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140664">SUSE bug 1140664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140666">SUSE bug 1140666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141171">SUSE bug 1141171</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12975/">CVE-2019-12975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12975">CVE-2019-12975 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12976/">CVE-2019-12976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12976">CVE-2019-12976 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12979/">CVE-2019-12979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12979">CVE-2019-12979 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13133/">CVE-2019-13133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13133">CVE-2019-13133 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13134/">CVE-2019-13134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13134">CVE-2019-13134 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13135/">CVE-2019-13135 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13135">CVE-2019-13135 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13295/">CVE-2019-13295 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13295">CVE-2019-13295 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13297/">CVE-2019-13297 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13297">CVE-2019-13297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13301/">CVE-2019-13301 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13301">CVE-2019-13301 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13311/">CVE-2019-13311 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13311">CVE-2019-13311 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13454/">CVE-2019-13454 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13454">CVE-2019-13454 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570470" comment="libMagickCore1-6.4.3.6-78.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570471" comment="libMagickCore1-32bit-6.4.3.6-78.112.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216810" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1133204" ref_url="https://bugzilla.suse.com/1133204" source="BUGZILLA"/>
		<reference ref_id="1146068" ref_url="https://bugzilla.suse.com/1146068" source="BUGZILLA"/>
		<reference ref_id="1146211" ref_url="https://bugzilla.suse.com/1146211" source="BUGZILLA"/>
		<reference ref_id="1146212" ref_url="https://bugzilla.suse.com/1146212" source="BUGZILLA"/>
		<reference ref_id="1146213" ref_url="https://bugzilla.suse.com/1146213" source="BUGZILLA"/>
		<reference ref_id="1151781" ref_url="https://bugzilla.suse.com/1151781" source="BUGZILLA"/>
		<reference ref_id="1151782" ref_url="https://bugzilla.suse.com/1151782" source="BUGZILLA"/>
		<reference ref_id="1151783" ref_url="https://bugzilla.suse.com/1151783" source="BUGZILLA"/>
		<reference ref_id="1151786" ref_url="https://bugzilla.suse.com/1151786" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11472" ref_url="https://www.suse.com/security/cve/CVE-2019-11472/" source="CVE"/>
		<reference ref_id="CVE-2019-14980" ref_url="https://www.suse.com/security/cve/CVE-2019-14980/" source="CVE"/>
		<reference ref_id="CVE-2019-15139" ref_url="https://www.suse.com/security/cve/CVE-2019-15139/" source="CVE"/>
		<reference ref_id="CVE-2019-15140" ref_url="https://www.suse.com/security/cve/CVE-2019-15140/" source="CVE"/>
		<reference ref_id="CVE-2019-15141" ref_url="https://www.suse.com/security/cve/CVE-2019-15141/" source="CVE"/>
		<reference ref_id="CVE-2019-16708" ref_url="https://www.suse.com/security/cve/CVE-2019-16708/" source="CVE"/>
		<reference ref_id="CVE-2019-16709" ref_url="https://www.suse.com/security/cve/CVE-2019-16709/" source="CVE"/>
		<reference ref_id="CVE-2019-16710" ref_url="https://www.suse.com/security/cve/CVE-2019-16710/" source="CVE"/>
		<reference ref_id="CVE-2019-16713" ref_url="https://www.suse.com/security/cve/CVE-2019-16713/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-15139: Fixed a denial-of-service vulnerability in ReadXWDImage. (bsc#1146213)
- CVE-2019-15140: Fixed a use-after-free bug in the Matlab image parser. (bsc#1146212)
- CVE-2019-15141: Fixed a divide-by-zero vulnerability in the MeanShiftImage function. (bsc#1146211)
- CVE-2019-14980: Fixed an application crash resulting from a heap-based buffer over-read in WriteTIFFImage. (bsc#1146068)
- CVE-2019-16708: Fixed a memory leak in magick/xwindow.c (bsc#1151781).
- CVE-2019-16709: Fixed a memory leak in coders/dps.c (bsc#1151782).
- CVE-2019-16710: Fixed a memory leak in coders/dot.c (bsc#1151783).
- CVE-2019-16713: Fixed a memory leak in coders/dot.c (bsc#1151786).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-05"/>
	<updated date="2019-11-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1133204">SUSE bug 1133204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146068">SUSE bug 1146068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146211">SUSE bug 1146211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146212">SUSE bug 1146212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146213">SUSE bug 1146213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151781">SUSE bug 1151781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151782">SUSE bug 1151782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151783">SUSE bug 1151783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151786">SUSE bug 1151786</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11472/">CVE-2019-11472 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11472">CVE-2019-11472 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14980/">CVE-2019-14980 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14980">CVE-2019-14980 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15139/">CVE-2019-15139 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15139">CVE-2019-15139 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15140/">CVE-2019-15140 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15140">CVE-2019-15140 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15141/">CVE-2019-15141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15141">CVE-2019-15141 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16708/">CVE-2019-16708 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16708">CVE-2019-16708 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16709/">CVE-2019-16709 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16709">CVE-2019-16709 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16710/">CVE-2019-16710 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16710">CVE-2019-16710 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16713/">CVE-2019-16713 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16713">CVE-2019-16713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570472" comment="libMagickCore1-6.4.3.6-78.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570473" comment="libMagickCore1-32bit-6.4.3.6-78.117.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216811" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1159861" ref_url="https://bugzilla.suse.com/1159861" source="BUGZILLA"/>
		<reference ref_id="1160369" ref_url="https://bugzilla.suse.com/1160369" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19948" ref_url="https://www.suse.com/security/cve/CVE-2019-19948/" source="CVE"/>
		<reference ref_id="CVE-2019-19949" ref_url="https://www.suse.com/security/cve/CVE-2019-19949/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2019-19948: Fixed a heap-based buffer overflow in WriteSGIImage() (bsc#1159861).
- CVE-2019-19949: Fixed a heap-based buffer over-read in WritePNGImage() (bsc#1160369).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-24"/>
	<updated date="2020-02-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1159861">SUSE bug 1159861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160369">SUSE bug 1160369</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19948/">CVE-2019-19948 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19948">CVE-2019-19948 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19949/">CVE-2019-19949 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19949">CVE-2019-19949 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570474" comment="libMagickCore1-6.4.3.6-78.122.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570475" comment="libMagickCore1-32bit-6.4.3.6-78.122.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216812" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1047054" ref_url="https://bugzilla.suse.com/1047054" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11527" ref_url="https://www.suse.com/security/cve/CVE-2017-11527/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2017-11527: Fixed a denial of service in  inReadDPXImage() (bsc#1047054).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-30"/>
	<updated date="2020-09-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047054">SUSE bug 1047054</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11527/">CVE-2017-11527 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11527">CVE-2017-11527 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570476" comment="libMagickCore1-6.4.3.6-78.125.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570477" comment="libMagickCore1-32bit-6.4.3.6-78.125.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216813" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1178067" ref_url="https://bugzilla.suse.com/1178067" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27560" ref_url="https://www.suse.com/security/cve/CVE-2020-27560/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2020-27560: Fixed potential denial of service in OptimizeLayerFrames function in MagickCore/layer.c (bsc#1178067).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178067">SUSE bug 1178067</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27560/">CVE-2020-27560 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27560">CVE-2020-27560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570478" comment="libMagickCore1-6.4.3.6-78.128.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570479" comment="libMagickCore1-32bit-6.4.3.6-78.128.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216814" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1179103" ref_url="https://bugzilla.suse.com/1179103" source="BUGZILLA"/>
		<reference ref_id="1179202" ref_url="https://bugzilla.suse.com/1179202" source="BUGZILLA"/>
		<reference ref_id="1179212" ref_url="https://bugzilla.suse.com/1179212" source="BUGZILLA"/>
		<reference ref_id="1179269" ref_url="https://bugzilla.suse.com/1179269" source="BUGZILLA"/>
		<reference ref_id="1179281" ref_url="https://bugzilla.suse.com/1179281" source="BUGZILLA"/>
		<reference ref_id="1179311" ref_url="https://bugzilla.suse.com/1179311" source="BUGZILLA"/>
		<reference ref_id="1179312" ref_url="https://bugzilla.suse.com/1179312" source="BUGZILLA"/>
		<reference ref_id="1179313" ref_url="https://bugzilla.suse.com/1179313" source="BUGZILLA"/>
		<reference ref_id="1179315" ref_url="https://bugzilla.suse.com/1179315" source="BUGZILLA"/>
		<reference ref_id="1179321" ref_url="https://bugzilla.suse.com/1179321" source="BUGZILLA"/>
		<reference ref_id="1179322" ref_url="https://bugzilla.suse.com/1179322" source="BUGZILLA"/>
		<reference ref_id="1179327" ref_url="https://bugzilla.suse.com/1179327" source="BUGZILLA"/>
		<reference ref_id="1179336" ref_url="https://bugzilla.suse.com/1179336" source="BUGZILLA"/>
		<reference ref_id="1179338" ref_url="https://bugzilla.suse.com/1179338" source="BUGZILLA"/>
		<reference ref_id="1179339" ref_url="https://bugzilla.suse.com/1179339" source="BUGZILLA"/>
		<reference ref_id="1179345" ref_url="https://bugzilla.suse.com/1179345" source="BUGZILLA"/>
		<reference ref_id="1179346" ref_url="https://bugzilla.suse.com/1179346" source="BUGZILLA"/>
		<reference ref_id="1179347" ref_url="https://bugzilla.suse.com/1179347" source="BUGZILLA"/>
		<reference ref_id="1179397" ref_url="https://bugzilla.suse.com/1179397" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-19667" ref_url="https://www.suse.com/security/cve/CVE-2020-19667/" source="CVE"/>
		<reference ref_id="CVE-2020-25664" ref_url="https://www.suse.com/security/cve/CVE-2020-25664/" source="CVE"/>
		<reference ref_id="CVE-2020-25666" ref_url="https://www.suse.com/security/cve/CVE-2020-25666/" source="CVE"/>
		<reference ref_id="CVE-2020-27751" ref_url="https://www.suse.com/security/cve/CVE-2020-27751/" source="CVE"/>
		<reference ref_id="CVE-2020-27752" ref_url="https://www.suse.com/security/cve/CVE-2020-27752/" source="CVE"/>
		<reference ref_id="CVE-2020-27753" ref_url="https://www.suse.com/security/cve/CVE-2020-27753/" source="CVE"/>
		<reference ref_id="CVE-2020-27754" ref_url="https://www.suse.com/security/cve/CVE-2020-27754/" source="CVE"/>
		<reference ref_id="CVE-2020-27755" ref_url="https://www.suse.com/security/cve/CVE-2020-27755/" source="CVE"/>
		<reference ref_id="CVE-2020-27759" ref_url="https://www.suse.com/security/cve/CVE-2020-27759/" source="CVE"/>
		<reference ref_id="CVE-2020-27760" ref_url="https://www.suse.com/security/cve/CVE-2020-27760/" source="CVE"/>
		<reference ref_id="CVE-2020-27761" ref_url="https://www.suse.com/security/cve/CVE-2020-27761/" source="CVE"/>
		<reference ref_id="CVE-2020-27763" ref_url="https://www.suse.com/security/cve/CVE-2020-27763/" source="CVE"/>
		<reference ref_id="CVE-2020-27765" ref_url="https://www.suse.com/security/cve/CVE-2020-27765/" source="CVE"/>
		<reference ref_id="CVE-2020-27767" ref_url="https://www.suse.com/security/cve/CVE-2020-27767/" source="CVE"/>
		<reference ref_id="CVE-2020-27768" ref_url="https://www.suse.com/security/cve/CVE-2020-27768/" source="CVE"/>
		<reference ref_id="CVE-2020-27769" ref_url="https://www.suse.com/security/cve/CVE-2020-27769/" source="CVE"/>
		<reference ref_id="CVE-2020-27771" ref_url="https://www.suse.com/security/cve/CVE-2020-27771/" source="CVE"/>
		<reference ref_id="CVE-2020-27772" ref_url="https://www.suse.com/security/cve/CVE-2020-27772/" source="CVE"/>
		<reference ref_id="CVE-2020-27775" ref_url="https://www.suse.com/security/cve/CVE-2020-27775/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:
	  
- CVE-2020-19667: Fixed a stack buffer overflow in XPM coder could result in a crash (bsc#1179103).
- CVE-2020-25664: Fixed a heap-based buffer overflow in PopShortPixel (bsc#1179202).
- CVE-2020-25666: Fixed an outside the range of representable values of type 'int' and signed integer overflow (bsc#1179212).
- CVE-2020-27751: Fixed an integer overflow in MagickCore/quantum-export.c (bsc#1179269).
- CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h (bsc#1179346).
- CVE-2020-27753: Fixed memory leaks in AcquireMagickMemory function (bsc#1179397).
- CVE-2020-27754: Fixed an outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c (bsc#1179336).
- CVE-2020-27755: Fixed memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c (bsc#1179345).
- CVE-2020-27757: Fixed an outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h (bsc#1179268).
- CVE-2020-27759: Fixed an outside the range of representable values of type 'int' at MagickCore/quantize.c (bsc#1179313).
- CVE-2020-27760: Fixed a division by zero at MagickCore/enhance.c (bsc#1179281).
- CVE-2020-27761: Fixed an outside the range of representable values of type 'unsigned long' at coders/palm.c (bsc#1179315).
- CVE-2020-27763: Fixed a division by zero at MagickCore/resize.c (bsc#1179312).
- CVE-2020-27765: Fixed a division by zero at MagickCore/segment.c (bsc#1179311).
- CVE-2020-27767: Fixed an outside the range of representable values of type 'float' at MagickCore/quantum.h (bsc#1179322).
- CVE-2020-27768: Fixed an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h (bsc#1179339).
- CVE-2020-27769: Fixed an outside the range of representable values of type 'float' at MagickCore/quantize.c (bsc#1179321).
- CVE-2020-27771: Fixed an outside the range of representable values of type 'unsigned char' at coders/pdf.c (bsc#1179327).
- CVE-2020-27772: Fixed an outside the range of representable values of type 'unsigned int' at coders/bmp.c (bsc#1179347).
- CVE-2020-27775: Fixed an outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h (bsc#1179338).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-15"/>
	<updated date="2021-01-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179103">SUSE bug 1179103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179202">SUSE bug 1179202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179212">SUSE bug 1179212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179269">SUSE bug 1179269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179281">SUSE bug 1179281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179311">SUSE bug 1179311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179312">SUSE bug 1179312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179313">SUSE bug 1179313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179315">SUSE bug 1179315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179321">SUSE bug 1179321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179322">SUSE bug 1179322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179327">SUSE bug 1179327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179336">SUSE bug 1179336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179338">SUSE bug 1179338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179339">SUSE bug 1179339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179345">SUSE bug 1179345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179346">SUSE bug 1179346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179347">SUSE bug 1179347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179397">SUSE bug 1179397</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-19667/">CVE-2020-19667 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19667">CVE-2020-19667 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-25664/">CVE-2020-25664 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25664">CVE-2020-25664 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25666/">CVE-2020-25666 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25666">CVE-2020-25666 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27751/">CVE-2020-27751 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27751">CVE-2020-27751 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27752/">CVE-2020-27752 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27752">CVE-2020-27752 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27753/">CVE-2020-27753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27753">CVE-2020-27753 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27754/">CVE-2020-27754 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27754">CVE-2020-27754 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27755/">CVE-2020-27755 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27755">CVE-2020-27755 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27759/">CVE-2020-27759 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27759">CVE-2020-27759 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27760/">CVE-2020-27760 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27760">CVE-2020-27760 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27761/">CVE-2020-27761 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27761">CVE-2020-27761 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27763/">CVE-2020-27763 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27763">CVE-2020-27763 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27765/">CVE-2020-27765 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27765">CVE-2020-27765 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27767/">CVE-2020-27767 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27767">CVE-2020-27767 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27768/">CVE-2020-27768 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27768">CVE-2020-27768 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27769/">CVE-2020-27769 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27769">CVE-2020-27769 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27771/">CVE-2020-27771 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27771">CVE-2020-27771 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27772/">CVE-2020-27772 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27772">CVE-2020-27772 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27775/">CVE-2020-27775 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27775">CVE-2020-27775 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570480" comment="libMagickCore1-6.4.3.6-78.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570481" comment="libMagickCore1-32bit-6.4.3.6-78.135.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216815" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1179208" ref_url="https://bugzilla.suse.com/1179208" source="BUGZILLA"/>
		<reference ref_id="1181836" ref_url="https://bugzilla.suse.com/1181836" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25665" ref_url="https://www.suse.com/security/cve/CVE-2020-25665/" source="CVE"/>
		<reference ref_id="CVE-2021-20176" ref_url="https://www.suse.com/security/cve/CVE-2021-20176/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2021-20176: Fixed an issue where processing a crafted file could lead to division by zero (bsc#1181836).
- CVE-2020-25665: Fixed heap-based buffer overflow in WritePALMImage (bsc#1179208).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-23"/>
	<updated date="2021-02-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179208">SUSE bug 1179208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181836">SUSE bug 1181836</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25665/">CVE-2020-25665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25665">CVE-2020-25665 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20176/">CVE-2021-20176 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20176">CVE-2021-20176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570482" comment="libMagickCore1-6.4.3.6-78.140.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570483" comment="libMagickCore1-32bit-6.4.3.6-78.140.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216816" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1182325" ref_url="https://bugzilla.suse.com/1182325" source="BUGZILLA"/>
		<reference ref_id="1182336" ref_url="https://bugzilla.suse.com/1182336" source="BUGZILLA"/>
		<reference ref_id="1182337" ref_url="https://bugzilla.suse.com/1182337" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20243" ref_url="https://www.suse.com/security/cve/CVE-2021-20243/" source="CVE"/>
		<reference ref_id="CVE-2021-20244" ref_url="https://www.suse.com/security/cve/CVE-2021-20244/" source="CVE"/>
		<reference ref_id="CVE-2021-20246" ref_url="https://www.suse.com/security/cve/CVE-2021-20246/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2021-20243 [bsc#1182336]: Division by zero in GetResizeFilterWeight in MagickCore/resize.c
- CVE-2021-20244 [bsc#1182325]: Division by zero in ImplodeImage in MagickCore/visual-effects.c
- CVE-2021-20246 [bsc#1182337]: Division by zero in ScaleResampleFilter in MagickCore/resample.c
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-25"/>
	<updated date="2021-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182325">SUSE bug 1182325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182336">SUSE bug 1182336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182337">SUSE bug 1182337</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20243/">CVE-2021-20243 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20243">CVE-2021-20243 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20244/">CVE-2021-20244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20244">CVE-2021-20244 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20246/">CVE-2021-20246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20246">CVE-2021-20246 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570484" comment="libMagickCore1-6.4.3.6-78.143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570485" comment="libMagickCore1-32bit-6.4.3.6-78.143.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216817" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1184624" ref_url="https://bugzilla.suse.com/1184624" source="BUGZILLA"/>
		<reference ref_id="1184627" ref_url="https://bugzilla.suse.com/1184627" source="BUGZILLA"/>
		<reference ref_id="1184628" ref_url="https://bugzilla.suse.com/1184628" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20309" ref_url="https://www.suse.com/security/cve/CVE-2021-20309/" source="CVE"/>
		<reference ref_id="CVE-2021-20312" ref_url="https://www.suse.com/security/cve/CVE-2021-20312/" source="CVE"/>
		<reference ref_id="CVE-2021-20313" ref_url="https://www.suse.com/security/cve/CVE-2021-20313/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2021-20309: Division by zero in WaveImage() of MagickCore/visual-effects. (bsc#1184624)
- CVE-2021-20312: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c (bsc#1184627)
- CVE-2021-20313: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c (bsc#1184628)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-20"/>
	<updated date="2021-04-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184624">SUSE bug 1184624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184627">SUSE bug 1184627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184628">SUSE bug 1184628</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20309/">CVE-2021-20309 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20309">CVE-2021-20309 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20312/">CVE-2021-20312 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20312">CVE-2021-20312 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20313/">CVE-2021-20313 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20313">CVE-2021-20313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570486" comment="libMagickCore1-6.4.3.6-78.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570487" comment="libMagickCore1-32bit-6.4.3.6-78.146.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216818" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1017711" ref_url="https://bugzilla.suse.com/1017711" source="BUGZILLA"/>
		<reference ref_id="1017712" ref_url="https://bugzilla.suse.com/1017712" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9941" ref_url="https://www.suse.com/security/cve/CVE-2016-9941/" source="CVE"/>
		<reference ref_id="CVE-2016-9942" ref_url="https://www.suse.com/security/cve/CVE-2016-9942/" source="CVE"/>
		<description>

LibVNCServer was updated to fix two security issues.

These security issues were fixed:

- CVE-2016-9941: Heap-based buffer overflow in rfbproto.c allowed remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message containing a subrectangle outside of the client drawing area (bsc#1017711)
- CVE-2016-9942: Heap-based buffer overflow in ultra.c allowed remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message with the Ultra type tile, such that the LZO payload decompressed length exceeds what is specified by the tile dimensions (bsc#1017712)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1017711">SUSE bug 1017711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017712">SUSE bug 1017712</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9941/">CVE-2016-9941 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9941">CVE-2016-9941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9942/">CVE-2016-9942 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9942">CVE-2016-9942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570488" comment="LibVNCServer-0.9.1-159.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216819" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1081493" ref_url="https://bugzilla.suse.com/1081493" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7225" ref_url="https://www.suse.com/security/cve/CVE-2018-7225/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2018-7225: Missing input sanitization inside rfbserver.c rfbProcessClientNormalMessage() (bsc#1081493).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-05"/>
	<updated date="2018-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081493">SUSE bug 1081493</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7225/">CVE-2018-7225 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7225">CVE-2018-7225 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570489" comment="LibVNCServer-0.9.1-160.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216820" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1120114" ref_url="https://bugzilla.suse.com/1120114" source="BUGZILLA"/>
		<reference ref_id="1120115" ref_url="https://bugzilla.suse.com/1120115" source="BUGZILLA"/>
		<reference ref_id="1120116" ref_url="https://bugzilla.suse.com/1120116" source="BUGZILLA"/>
		<reference ref_id="1120117" ref_url="https://bugzilla.suse.com/1120117" source="BUGZILLA"/>
		<reference ref_id="1120118" ref_url="https://bugzilla.suse.com/1120118" source="BUGZILLA"/>
		<reference ref_id="1120120" ref_url="https://bugzilla.suse.com/1120120" source="BUGZILLA"/>
		<reference ref_id="1120121" ref_url="https://bugzilla.suse.com/1120121" source="BUGZILLA"/>
		<reference ref_id="1120122" ref_url="https://bugzilla.suse.com/1120122" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15126" ref_url="https://www.suse.com/security/cve/CVE-2018-15126/" source="CVE"/>
		<reference ref_id="CVE-2018-15127" ref_url="https://www.suse.com/security/cve/CVE-2018-15127/" source="CVE"/>
		<reference ref_id="CVE-2018-20019" ref_url="https://www.suse.com/security/cve/CVE-2018-20019/" source="CVE"/>
		<reference ref_id="CVE-2018-20020" ref_url="https://www.suse.com/security/cve/CVE-2018-20020/" source="CVE"/>
		<reference ref_id="CVE-2018-20021" ref_url="https://www.suse.com/security/cve/CVE-2018-20021/" source="CVE"/>
		<reference ref_id="CVE-2018-20022" ref_url="https://www.suse.com/security/cve/CVE-2018-20022/" source="CVE"/>
		<reference ref_id="CVE-2018-20024" ref_url="https://www.suse.com/security/cve/CVE-2018-20024/" source="CVE"/>
		<reference ref_id="CVE-2018-6307" ref_url="https://www.suse.com/security/cve/CVE-2018-6307/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

Security issues fixed:

- CVE-2018-15126: Fixed use-after-free in file transfer extension (bsc#1120114)
- CVE-2018-6307: Fixed use-after-free in file transfer extension server code (bsc#1120115)
- CVE-2018-20020: Fixed heap out-of-bound write inside structure in VNC client code (bsc#1120116)
- CVE-2018-15127: Fixed heap out-of-bounds write in rfbserver.c (bsc#1120117)
- CVE-2018-20019: Fixed multiple heap out-of-bound writes in VNC client code (bsc#1120118)
- CVE-2018-20022: Fixed information disclosure through improper initialization in VNC client code (bsc#1120120)
- CVE-2018-20024: Fixed NULL pointer dereference in VNC client code (bsc#1120121)
- CVE-2018-20021: Fixed infinite loop in VNC client code (bsc#1120122)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-11"/>
	<updated date="2019-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120114">SUSE bug 1120114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120115">SUSE bug 1120115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120116">SUSE bug 1120116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120117">SUSE bug 1120117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120118">SUSE bug 1120118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120120">SUSE bug 1120120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120121">SUSE bug 1120121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120122">SUSE bug 1120122</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15126/">CVE-2018-15126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15126">CVE-2018-15126 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15127/">CVE-2018-15127 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15127">CVE-2018-15127 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20019/">CVE-2018-20019 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20019">CVE-2018-20019 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20020/">CVE-2018-20020 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20020">CVE-2018-20020 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20021/">CVE-2018-20021 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20021">CVE-2018-20021 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20022/">CVE-2018-20022 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20022">CVE-2018-20022 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20024/">CVE-2018-20024 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20024">CVE-2018-20024 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6307/">CVE-2018-6307 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6307">CVE-2018-6307 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570490" comment="LibVNCServer-0.9.1-160.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216821" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1123823" ref_url="https://bugzilla.suse.com/1123823" source="BUGZILLA"/>
		<reference ref_id="1123828" ref_url="https://bugzilla.suse.com/1123828" source="BUGZILLA"/>
		<reference ref_id="1123832" ref_url="https://bugzilla.suse.com/1123832" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20748" ref_url="https://www.suse.com/security/cve/CVE-2018-20748/" source="CVE"/>
		<reference ref_id="CVE-2018-20749" ref_url="https://www.suse.com/security/cve/CVE-2018-20749/" source="CVE"/>
		<reference ref_id="CVE-2018-20750" ref_url="https://www.suse.com/security/cve/CVE-2018-20750/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

Security issues fixed:

- CVE-2018-20749: Fixed a heap out of bounds write vulnerability in rfbserver.c (bsc#1123828)
- CVE-2018-20750: Fixed a heap out of bounds write vulnerability in rfbserver.c (bsc#1123832)
- CVE-2018-20748: Fixed multiple heap out-of-bound writes in VNC client code (bsc#1123823)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-12"/>
	<updated date="2019-02-12"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1123823">SUSE bug 1123823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123828">SUSE bug 1123828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123832">SUSE bug 1123832</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20748/">CVE-2018-20748 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20748">CVE-2018-20748 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20749/">CVE-2018-20749 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20749">CVE-2018-20749 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20750/">CVE-2018-20750 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20750">CVE-2018-20750 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570491" comment="LibVNCServer-0.9.1-160.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216822" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1155419" ref_url="https://bugzilla.suse.com/1155419" source="BUGZILLA"/>
		<reference ref_id="1160471" ref_url="https://bugzilla.suse.com/1160471" source="BUGZILLA"/>
		<reference ref_id="1170441" ref_url="https://bugzilla.suse.com/1170441" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681/" source="CVE"/>
		<reference ref_id="CVE-2019-15690" ref_url="https://www.suse.com/security/cve/CVE-2019-15690/" source="CVE"/>
		<reference ref_id="CVE-2019-20788" ref_url="https://www.suse.com/security/cve/CVE-2019-20788/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2019-15690: Fixed a heap buffer overflow (bsc#1160471).
- CVE-2019-15681: Fixed a memory leak which could have allowed to a remote attacker to read stack memory (bsc#1155419).
- CVE-2019-20788: Fixed a integer overflow and heap-based buffer overflow via a large height or width value (bsc#1170441).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-04"/>
	<updated date="2020-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155419">SUSE bug 1155419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160471">SUSE bug 1160471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170441">SUSE bug 1170441</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15681">CVE-2019-15681 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15690/">CVE-2019-15690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15690">CVE-2019-15690 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20788/">CVE-2019-20788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20788">CVE-2019-20788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570492" comment="LibVNCServer-0.9.1-160.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216823" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1173691" ref_url="https://bugzilla.suse.com/1173691" source="BUGZILLA"/>
		<reference ref_id="1173694" ref_url="https://bugzilla.suse.com/1173694" source="BUGZILLA"/>
		<reference ref_id="1173700" ref_url="https://bugzilla.suse.com/1173700" source="BUGZILLA"/>
		<reference ref_id="1173701" ref_url="https://bugzilla.suse.com/1173701" source="BUGZILLA"/>
		<reference ref_id="1173743" ref_url="https://bugzilla.suse.com/1173743" source="BUGZILLA"/>
		<reference ref_id="1173880" ref_url="https://bugzilla.suse.com/1173880" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14397" ref_url="https://www.suse.com/security/cve/CVE-2020-14397/" source="CVE"/>
		<reference ref_id="CVE-2020-14398" ref_url="https://www.suse.com/security/cve/CVE-2020-14398/" source="CVE"/>
		<reference ref_id="CVE-2020-14399" ref_url="https://www.suse.com/security/cve/CVE-2020-14399/" source="CVE"/>
		<reference ref_id="CVE-2020-14400" ref_url="https://www.suse.com/security/cve/CVE-2020-14400/" source="CVE"/>
		<reference ref_id="CVE-2020-14401" ref_url="https://www.suse.com/security/cve/CVE-2020-14401/" source="CVE"/>
		<reference ref_id="CVE-2020-14402" ref_url="https://www.suse.com/security/cve/CVE-2020-14402/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

- security update
- added patches
  fix CVE-2020-14398 [bsc#1173880], improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c
  + LibVNCServer-CVE-2020-14398.patch
  fix CVE-2020-14397 [bsc#1173700], NULL pointer dereference in libvncserver/rfbregion.c
  + LibVNCServer-CVE-2020-14397.patch
  fix CVE-2020-14399 [bsc#1173743], Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c.
  + LibVNCServer-CVE-2020-14399.patch
  fix CVE-2020-14400 [bsc#1173691], Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c.
  + LibVNCServer-CVE-2020-14400.patch
  fix CVE-2020-14401 [bsc#1173694], potential integer overflows in libvncserver/scale.c
  + LibVNCServer-CVE-2020-14401.patch
  fix CVE-2020-14402 [bsc#1173701], out-of-bounds access via encodings.
  + LibVNCServer-CVE-2020-14402,14403,14404.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-17"/>
	<updated date="2020-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173691">SUSE bug 1173691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173694">SUSE bug 1173694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173700">SUSE bug 1173700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173701">SUSE bug 1173701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173743">SUSE bug 1173743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173880">SUSE bug 1173880</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14397/">CVE-2020-14397 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14397">CVE-2020-14397 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14398/">CVE-2020-14398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14398">CVE-2020-14398 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14399/">CVE-2020-14399 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14399">CVE-2020-14399 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14400/">CVE-2020-14400 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14400">CVE-2020-14400 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14401/">CVE-2020-14401 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14401">CVE-2020-14401 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14402/">CVE-2020-14402 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14402">CVE-2020-14402 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570493" comment="LibVNCServer-0.9.1-160.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216824" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1178682" ref_url="https://bugzilla.suse.com/1178682" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25708" ref_url="https://www.suse.com/security/cve/CVE-2020-25708/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2020-25708 [bsc#1178682], libvncserver/rfbserver.c has a divide by zero which could result in DoS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-26"/>
	<updated date="2020-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178682">SUSE bug 1178682</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-25708/">CVE-2020-25708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25708">CVE-2020-25708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570494" comment="LibVNCServer-0.9.1-160.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216825" version="1" class="patch">
	<metadata>
		<title>Security update for Mesa</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="724985" ref_url="https://bugzilla.suse.com/724985" source="BUGZILLA"/>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821855" ref_url="https://bugzilla.suse.com/821855" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1993" ref_url="https://www.suse.com/security/cve/CVE-2013-1993/" source="CVE"/>
		<description>

This update of Mesa fixes multiple integer overflows.

Security Issue reference:

    * CVE-2013-1993
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1993&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-31"/>
	<updated date="2013-05-31"/>
	<bugzilla href="https://bugzilla.suse.com/724985">SUSE bug 724985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821855">SUSE bug 821855</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1993/">CVE-2013-1993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1993">CVE-2013-1993 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991190" comment="Mesa-7.7-5.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991191" comment="Mesa-32bit-7.7-5.12.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991190" comment="Mesa-7.7-5.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991191" comment="Mesa-32bit-7.7-5.12.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216826" version="1" class="patch">
	<metadata>
		<title>Security update for Mesa (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1156015" ref_url="https://bugzilla.suse.com/1156015" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5068" ref_url="https://www.suse.com/security/cve/CVE-2019-5068/" source="CVE"/>
		<description>
This update for Mesa fixes the following issues:

Security issue fixed:

- CVE-2019-5068: Fixed exploitable shared memory permissions vulnerability (bsc#1156015).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-08"/>
	<updated date="2020-01-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1156015">SUSE bug 1156015</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-5068/">CVE-2019-5068 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5068">CVE-2019-5068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570495" comment="Mesa-7.7-5.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570496" comment="Mesa-32bit-7.7-5.14.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216827" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="603356" ref_url="https://bugzilla.suse.com/603356" source="BUGZILLA"/>
		<reference ref_id="622506" ref_url="https://bugzilla.suse.com/622506" source="BUGZILLA"/>
		<reference ref_id="637303" ref_url="https://bugzilla.suse.com/637303" source="BUGZILLA"/>
		<reference ref_id="645315" ref_url="https://bugzilla.suse.com/645315" source="BUGZILLA"/>
		<reference ref_id="649492" ref_url="https://bugzilla.suse.com/649492" source="BUGZILLA"/>
		<reference ref_id="657016" ref_url="https://bugzilla.suse.com/657016" source="BUGZILLA"/>
		<reference ref_id="667155" ref_url="https://bugzilla.suse.com/667155" source="BUGZILLA"/>
		<reference ref_id="680771" ref_url="https://bugzilla.suse.com/680771" source="BUGZILLA"/>
		<reference ref_id="689281" ref_url="https://bugzilla.suse.com/689281" source="BUGZILLA"/>
		<reference ref_id="701296" ref_url="https://bugzilla.suse.com/701296" source="BUGZILLA"/>
		<reference ref_id="712224" ref_url="https://bugzilla.suse.com/712224" source="BUGZILLA"/>
		<reference ref_id="720264" ref_url="https://bugzilla.suse.com/720264" source="BUGZILLA"/>
		<reference ref_id="726096" ref_url="https://bugzilla.suse.com/726096" source="BUGZILLA"/>
		<reference ref_id="728520" ref_url="https://bugzilla.suse.com/728520" source="BUGZILLA"/>
		<reference ref_id="744625" ref_url="https://bugzilla.suse.com/744625" source="BUGZILLA"/>
		<reference ref_id="744629" ref_url="https://bugzilla.suse.com/744629" source="BUGZILLA"/>
		<reference ref_id="745017" ref_url="https://bugzilla.suse.com/745017" source="BUGZILLA"/>
		<reference ref_id="746616" ref_url="https://bugzilla.suse.com/746616" source="BUGZILLA"/>
		<reference ref_id="747320" ref_url="https://bugzilla.suse.com/747320" source="BUGZILLA"/>
		<reference ref_id="747328" ref_url="https://bugzilla.suse.com/747328" source="BUGZILLA"/>
		<reference ref_id="750044" ref_url="https://bugzilla.suse.com/750044" source="BUGZILLA"/>
		<reference ref_id="765204" ref_url="https://bugzilla.suse.com/765204" source="BUGZILLA"/>
		<reference ref_id="833389" ref_url="https://bugzilla.suse.com/833389" source="BUGZILLA"/>
		<reference ref_id="840485" ref_url="https://bugzilla.suse.com/840485" source="BUGZILLA"/>
		<reference ref_id="917597" ref_url="https://bugzilla.suse.com/917597" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-5913" ref_url="https://www.suse.com/security/cve/CVE-2008-5913/" source="CVE"/>
		<reference ref_id="CVE-2010-0179" ref_url="https://www.suse.com/security/cve/CVE-2010-0179/" source="CVE"/>
		<reference ref_id="CVE-2010-0183" ref_url="https://www.suse.com/security/cve/CVE-2010-0183/" source="CVE"/>
		<reference ref_id="CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654/" source="CVE"/>
		<reference ref_id="CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121/" source="CVE"/>
		<reference ref_id="CVE-2010-1125" ref_url="https://www.suse.com/security/cve/CVE-2010-1125/" source="CVE"/>
		<reference ref_id="CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196/" source="CVE"/>
		<reference ref_id="CVE-2010-1197" ref_url="https://www.suse.com/security/cve/CVE-2010-1197/" source="CVE"/>
		<reference ref_id="CVE-2010-1198" ref_url="https://www.suse.com/security/cve/CVE-2010-1198/" source="CVE"/>
		<reference ref_id="CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199/" source="CVE"/>
		<reference ref_id="CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200/" source="CVE"/>
		<reference ref_id="CVE-2010-1201" ref_url="https://www.suse.com/security/cve/CVE-2010-1201/" source="CVE"/>
		<reference ref_id="CVE-2010-1202" ref_url="https://www.suse.com/security/cve/CVE-2010-1202/" source="CVE"/>
		<reference ref_id="CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-1206" ref_url="https://www.suse.com/security/cve/CVE-2010-1206/" source="CVE"/>
		<reference ref_id="CVE-2010-1208" ref_url="https://www.suse.com/security/cve/CVE-2010-1208/" source="CVE"/>
		<reference ref_id="CVE-2010-1209" ref_url="https://www.suse.com/security/cve/CVE-2010-1209/" source="CVE"/>
		<reference ref_id="CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211/" source="CVE"/>
		<reference ref_id="CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213/" source="CVE"/>
		<reference ref_id="CVE-2010-1214" ref_url="https://www.suse.com/security/cve/CVE-2010-1214/" source="CVE"/>
		<reference ref_id="CVE-2010-1585" ref_url="https://www.suse.com/security/cve/CVE-2010-1585/" source="CVE"/>
		<reference ref_id="CVE-2010-2751" ref_url="https://www.suse.com/security/cve/CVE-2010-2751/" source="CVE"/>
		<reference ref_id="CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752/" source="CVE"/>
		<reference ref_id="CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753/" source="CVE"/>
		<reference ref_id="CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754/" source="CVE"/>
		<reference ref_id="CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760/" source="CVE"/>
		<reference ref_id="CVE-2010-2762" ref_url="https://www.suse.com/security/cve/CVE-2010-2762/" source="CVE"/>
		<reference ref_id="CVE-2010-2763" ref_url="https://www.suse.com/security/cve/CVE-2010-2763/" source="CVE"/>
		<reference ref_id="CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764/" source="CVE"/>
		<reference ref_id="CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765/" source="CVE"/>
		<reference ref_id="CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766/" source="CVE"/>
		<reference ref_id="CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767/" source="CVE"/>
		<reference ref_id="CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768/" source="CVE"/>
		<reference ref_id="CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769/" source="CVE"/>
		<reference ref_id="CVE-2010-2770" ref_url="https://www.suse.com/security/cve/CVE-2010-2770/" source="CVE"/>
		<reference ref_id="CVE-2010-3131" ref_url="https://www.suse.com/security/cve/CVE-2010-3131/" source="CVE"/>
		<reference ref_id="CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166/" source="CVE"/>
		<reference ref_id="CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167/" source="CVE"/>
		<reference ref_id="CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168/" source="CVE"/>
		<reference ref_id="CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<reference ref_id="CVE-2010-3766" ref_url="https://www.suse.com/security/cve/CVE-2010-3766/" source="CVE"/>
		<reference ref_id="CVE-2010-3767" ref_url="https://www.suse.com/security/cve/CVE-2010-3767/" source="CVE"/>
		<reference ref_id="CVE-2010-3768" ref_url="https://www.suse.com/security/cve/CVE-2010-3768/" source="CVE"/>
		<reference ref_id="CVE-2010-3769" ref_url="https://www.suse.com/security/cve/CVE-2010-3769/" source="CVE"/>
		<reference ref_id="CVE-2010-3770" ref_url="https://www.suse.com/security/cve/CVE-2010-3770/" source="CVE"/>
		<reference ref_id="CVE-2010-3771" ref_url="https://www.suse.com/security/cve/CVE-2010-3771/" source="CVE"/>
		<reference ref_id="CVE-2010-3772" ref_url="https://www.suse.com/security/cve/CVE-2010-3772/" source="CVE"/>
		<reference ref_id="CVE-2010-3773" ref_url="https://www.suse.com/security/cve/CVE-2010-3773/" source="CVE"/>
		<reference ref_id="CVE-2010-3774" ref_url="https://www.suse.com/security/cve/CVE-2010-3774/" source="CVE"/>
		<reference ref_id="CVE-2010-3775" ref_url="https://www.suse.com/security/cve/CVE-2010-3775/" source="CVE"/>
		<reference ref_id="CVE-2010-3776" ref_url="https://www.suse.com/security/cve/CVE-2010-3776/" source="CVE"/>
		<reference ref_id="CVE-2010-3777" ref_url="https://www.suse.com/security/cve/CVE-2010-3777/" source="CVE"/>
		<reference ref_id="CVE-2010-3778" ref_url="https://www.suse.com/security/cve/CVE-2010-3778/" source="CVE"/>
		<reference ref_id="CVE-2011-0051" ref_url="https://www.suse.com/security/cve/CVE-2011-0051/" source="CVE"/>
		<reference ref_id="CVE-2011-0053" ref_url="https://www.suse.com/security/cve/CVE-2011-0053/" source="CVE"/>
		<reference ref_id="CVE-2011-0054" ref_url="https://www.suse.com/security/cve/CVE-2011-0054/" source="CVE"/>
		<reference ref_id="CVE-2011-0055" ref_url="https://www.suse.com/security/cve/CVE-2011-0055/" source="CVE"/>
		<reference ref_id="CVE-2011-0056" ref_url="https://www.suse.com/security/cve/CVE-2011-0056/" source="CVE"/>
		<reference ref_id="CVE-2011-0057" ref_url="https://www.suse.com/security/cve/CVE-2011-0057/" source="CVE"/>
		<reference ref_id="CVE-2011-0058" ref_url="https://www.suse.com/security/cve/CVE-2011-0058/" source="CVE"/>
		<reference ref_id="CVE-2011-0059" ref_url="https://www.suse.com/security/cve/CVE-2011-0059/" source="CVE"/>
		<reference ref_id="CVE-2011-0061" ref_url="https://www.suse.com/security/cve/CVE-2011-0061/" source="CVE"/>
		<reference ref_id="CVE-2011-0062" ref_url="https://www.suse.com/security/cve/CVE-2011-0062/" source="CVE"/>
		<reference ref_id="CVE-2011-0065" ref_url="https://www.suse.com/security/cve/CVE-2011-0065/" source="CVE"/>
		<reference ref_id="CVE-2011-0066" ref_url="https://www.suse.com/security/cve/CVE-2011-0066/" source="CVE"/>
		<reference ref_id="CVE-2011-0067" ref_url="https://www.suse.com/security/cve/CVE-2011-0067/" source="CVE"/>
		<reference ref_id="CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069/" source="CVE"/>
		<reference ref_id="CVE-2011-0070" ref_url="https://www.suse.com/security/cve/CVE-2011-0070/" source="CVE"/>
		<reference ref_id="CVE-2011-0071" ref_url="https://www.suse.com/security/cve/CVE-2011-0071/" source="CVE"/>
		<reference ref_id="CVE-2011-0072" ref_url="https://www.suse.com/security/cve/CVE-2011-0072/" source="CVE"/>
		<reference ref_id="CVE-2011-0073" ref_url="https://www.suse.com/security/cve/CVE-2011-0073/" source="CVE"/>
		<reference ref_id="CVE-2011-0074" ref_url="https://www.suse.com/security/cve/CVE-2011-0074/" source="CVE"/>
		<reference ref_id="CVE-2011-0075" ref_url="https://www.suse.com/security/cve/CVE-2011-0075/" source="CVE"/>
		<reference ref_id="CVE-2011-0076" ref_url="https://www.suse.com/security/cve/CVE-2011-0076/" source="CVE"/>
		<reference ref_id="CVE-2011-0077" ref_url="https://www.suse.com/security/cve/CVE-2011-0077/" source="CVE"/>
		<reference ref_id="CVE-2011-0078" ref_url="https://www.suse.com/security/cve/CVE-2011-0078/" source="CVE"/>
		<reference ref_id="CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080/" source="CVE"/>
		<reference ref_id="CVE-2011-0081" ref_url="https://www.suse.com/security/cve/CVE-2011-0081/" source="CVE"/>
		<reference ref_id="CVE-2011-0083" ref_url="https://www.suse.com/security/cve/CVE-2011-0083/" source="CVE"/>
		<reference ref_id="CVE-2011-0084" ref_url="https://www.suse.com/security/cve/CVE-2011-0084/" source="CVE"/>
		<reference ref_id="CVE-2011-0085" ref_url="https://www.suse.com/security/cve/CVE-2011-0085/" source="CVE"/>
		<reference ref_id="CVE-2011-1202" ref_url="https://www.suse.com/security/cve/CVE-2011-1202/" source="CVE"/>
		<reference ref_id="CVE-2011-2362" ref_url="https://www.suse.com/security/cve/CVE-2011-2362/" source="CVE"/>
		<reference ref_id="CVE-2011-2363" ref_url="https://www.suse.com/security/cve/CVE-2011-2363/" source="CVE"/>
		<reference ref_id="CVE-2011-2364" ref_url="https://www.suse.com/security/cve/CVE-2011-2364/" source="CVE"/>
		<reference ref_id="CVE-2011-2365" ref_url="https://www.suse.com/security/cve/CVE-2011-2365/" source="CVE"/>
		<reference ref_id="CVE-2011-2371" ref_url="https://www.suse.com/security/cve/CVE-2011-2371/" source="CVE"/>
		<reference ref_id="CVE-2011-2372" ref_url="https://www.suse.com/security/cve/CVE-2011-2372/" source="CVE"/>
		<reference ref_id="CVE-2011-2373" ref_url="https://www.suse.com/security/cve/CVE-2011-2373/" source="CVE"/>
		<reference ref_id="CVE-2011-2374" ref_url="https://www.suse.com/security/cve/CVE-2011-2374/" source="CVE"/>
		<reference ref_id="CVE-2011-2376" ref_url="https://www.suse.com/security/cve/CVE-2011-2376/" source="CVE"/>
		<reference ref_id="CVE-2011-2377" ref_url="https://www.suse.com/security/cve/CVE-2011-2377/" source="CVE"/>
		<reference ref_id="CVE-2011-2378" ref_url="https://www.suse.com/security/cve/CVE-2011-2378/" source="CVE"/>
		<reference ref_id="CVE-2011-2980" ref_url="https://www.suse.com/security/cve/CVE-2011-2980/" source="CVE"/>
		<reference ref_id="CVE-2011-2981" ref_url="https://www.suse.com/security/cve/CVE-2011-2981/" source="CVE"/>
		<reference ref_id="CVE-2011-2982" ref_url="https://www.suse.com/security/cve/CVE-2011-2982/" source="CVE"/>
		<reference ref_id="CVE-2011-2983" ref_url="https://www.suse.com/security/cve/CVE-2011-2983/" source="CVE"/>
		<reference ref_id="CVE-2011-2984" ref_url="https://www.suse.com/security/cve/CVE-2011-2984/" source="CVE"/>
		<reference ref_id="CVE-2011-2995" ref_url="https://www.suse.com/security/cve/CVE-2011-2995/" source="CVE"/>
		<reference ref_id="CVE-2011-2996" ref_url="https://www.suse.com/security/cve/CVE-2011-2996/" source="CVE"/>
		<reference ref_id="CVE-2011-2998" ref_url="https://www.suse.com/security/cve/CVE-2011-2998/" source="CVE"/>
		<reference ref_id="CVE-2011-2999" ref_url="https://www.suse.com/security/cve/CVE-2011-2999/" source="CVE"/>
		<reference ref_id="CVE-2011-3000" ref_url="https://www.suse.com/security/cve/CVE-2011-3000/" source="CVE"/>
		<reference ref_id="CVE-2011-3001" ref_url="https://www.suse.com/security/cve/CVE-2011-3001/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3101" ref_url="https://www.suse.com/security/cve/CVE-2011-3101/" source="CVE"/>
		<reference ref_id="CVE-2011-3647" ref_url="https://www.suse.com/security/cve/CVE-2011-3647/" source="CVE"/>
		<reference ref_id="CVE-2011-3648" ref_url="https://www.suse.com/security/cve/CVE-2011-3648/" source="CVE"/>
		<reference ref_id="CVE-2011-3649" ref_url="https://www.suse.com/security/cve/CVE-2011-3649/" source="CVE"/>
		<reference ref_id="CVE-2011-3650" ref_url="https://www.suse.com/security/cve/CVE-2011-3650/" source="CVE"/>
		<reference ref_id="CVE-2011-3651" ref_url="https://www.suse.com/security/cve/CVE-2011-3651/" source="CVE"/>
		<reference ref_id="CVE-2011-3653" ref_url="https://www.suse.com/security/cve/CVE-2011-3653/" source="CVE"/>
		<reference ref_id="CVE-2011-3655" ref_url="https://www.suse.com/security/cve/CVE-2011-3655/" source="CVE"/>
		<reference ref_id="CVE-2012-0441" ref_url="https://www.suse.com/security/cve/CVE-2012-0441/" source="CVE"/>
		<reference ref_id="CVE-2012-0451" ref_url="https://www.suse.com/security/cve/CVE-2012-0451/" source="CVE"/>
		<reference ref_id="CVE-2012-0452" ref_url="https://www.suse.com/security/cve/CVE-2012-0452/" source="CVE"/>
		<reference ref_id="CVE-2012-0454" ref_url="https://www.suse.com/security/cve/CVE-2012-0454/" source="CVE"/>
		<reference ref_id="CVE-2012-0455" ref_url="https://www.suse.com/security/cve/CVE-2012-0455/" source="CVE"/>
		<reference ref_id="CVE-2012-0456" ref_url="https://www.suse.com/security/cve/CVE-2012-0456/" source="CVE"/>
		<reference ref_id="CVE-2012-0457" ref_url="https://www.suse.com/security/cve/CVE-2012-0457/" source="CVE"/>
		<reference ref_id="CVE-2012-0458" ref_url="https://www.suse.com/security/cve/CVE-2012-0458/" source="CVE"/>
		<reference ref_id="CVE-2012-0459" ref_url="https://www.suse.com/security/cve/CVE-2012-0459/" source="CVE"/>
		<reference ref_id="CVE-2012-0460" ref_url="https://www.suse.com/security/cve/CVE-2012-0460/" source="CVE"/>
		<reference ref_id="CVE-2012-0461" ref_url="https://www.suse.com/security/cve/CVE-2012-0461/" source="CVE"/>
		<reference ref_id="CVE-2012-0462" ref_url="https://www.suse.com/security/cve/CVE-2012-0462/" source="CVE"/>
		<reference ref_id="CVE-2012-0463" ref_url="https://www.suse.com/security/cve/CVE-2012-0463/" source="CVE"/>
		<reference ref_id="CVE-2012-0464" ref_url="https://www.suse.com/security/cve/CVE-2012-0464/" source="CVE"/>
		<reference ref_id="CVE-2012-1937" ref_url="https://www.suse.com/security/cve/CVE-2012-1937/" source="CVE"/>
		<reference ref_id="CVE-2012-1938" ref_url="https://www.suse.com/security/cve/CVE-2012-1938/" source="CVE"/>
		<reference ref_id="CVE-2012-1939" ref_url="https://www.suse.com/security/cve/CVE-2012-1939/" source="CVE"/>
		<reference ref_id="CVE-2012-1940" ref_url="https://www.suse.com/security/cve/CVE-2012-1940/" source="CVE"/>
		<reference ref_id="CVE-2012-1941" ref_url="https://www.suse.com/security/cve/CVE-2012-1941/" source="CVE"/>
		<reference ref_id="CVE-2012-1942" ref_url="https://www.suse.com/security/cve/CVE-2012-1942/" source="CVE"/>
		<reference ref_id="CVE-2012-1943" ref_url="https://www.suse.com/security/cve/CVE-2012-1943/" source="CVE"/>
		<reference ref_id="CVE-2012-1944" ref_url="https://www.suse.com/security/cve/CVE-2012-1944/" source="CVE"/>
		<reference ref_id="CVE-2012-1945" ref_url="https://www.suse.com/security/cve/CVE-2012-1945/" source="CVE"/>
		<reference ref_id="CVE-2012-1946" ref_url="https://www.suse.com/security/cve/CVE-2012-1946/" source="CVE"/>
		<reference ref_id="CVE-2012-1947" ref_url="https://www.suse.com/security/cve/CVE-2012-1947/" source="CVE"/>
		<reference ref_id="CVE-2013-1701" ref_url="https://www.suse.com/security/cve/CVE-2013-1701/" source="CVE"/>
		<reference ref_id="CVE-2013-1702" ref_url="https://www.suse.com/security/cve/CVE-2013-1702/" source="CVE"/>
		<reference ref_id="CVE-2013-1705" ref_url="https://www.suse.com/security/cve/CVE-2013-1705/" source="CVE"/>
		<reference ref_id="CVE-2013-1706" ref_url="https://www.suse.com/security/cve/CVE-2013-1706/" source="CVE"/>
		<reference ref_id="CVE-2013-1707" ref_url="https://www.suse.com/security/cve/CVE-2013-1707/" source="CVE"/>
		<reference ref_id="CVE-2013-1709" ref_url="https://www.suse.com/security/cve/CVE-2013-1709/" source="CVE"/>
		<reference ref_id="CVE-2013-1710" ref_url="https://www.suse.com/security/cve/CVE-2013-1710/" source="CVE"/>
		<reference ref_id="CVE-2013-1712" ref_url="https://www.suse.com/security/cve/CVE-2013-1712/" source="CVE"/>
		<reference ref_id="CVE-2013-1713" ref_url="https://www.suse.com/security/cve/CVE-2013-1713/" source="CVE"/>
		<reference ref_id="CVE-2013-1714" ref_url="https://www.suse.com/security/cve/CVE-2013-1714/" source="CVE"/>
		<reference ref_id="CVE-2013-1717" ref_url="https://www.suse.com/security/cve/CVE-2013-1717/" source="CVE"/>
		<reference ref_id="CVE-2013-1718" ref_url="https://www.suse.com/security/cve/CVE-2013-1718/" source="CVE"/>
		<reference ref_id="CVE-2013-1722" ref_url="https://www.suse.com/security/cve/CVE-2013-1722/" source="CVE"/>
		<reference ref_id="CVE-2013-1725" ref_url="https://www.suse.com/security/cve/CVE-2013-1725/" source="CVE"/>
		<reference ref_id="CVE-2013-1726" ref_url="https://www.suse.com/security/cve/CVE-2013-1726/" source="CVE"/>
		<reference ref_id="CVE-2013-1730" ref_url="https://www.suse.com/security/cve/CVE-2013-1730/" source="CVE"/>
		<reference ref_id="CVE-2013-1732" ref_url="https://www.suse.com/security/cve/CVE-2013-1732/" source="CVE"/>
		<reference ref_id="CVE-2013-1735" ref_url="https://www.suse.com/security/cve/CVE-2013-1735/" source="CVE"/>
		<reference ref_id="CVE-2013-1736" ref_url="https://www.suse.com/security/cve/CVE-2013-1736/" source="CVE"/>
		<reference ref_id="CVE-2013-1737" ref_url="https://www.suse.com/security/cve/CVE-2013-1737/" source="CVE"/>
		<reference ref_id="CVE-2015-0822" ref_url="https://www.suse.com/security/cve/CVE-2015-0822/" source="CVE"/>
		<reference ref_id="CVE-2015-0827" ref_url="https://www.suse.com/security/cve/CVE-2015-0827/" source="CVE"/>
		<reference ref_id="CVE-2015-0831" ref_url="https://www.suse.com/security/cve/CVE-2015-0831/" source="CVE"/>
		<reference ref_id="CVE-2015-0836" ref_url="https://www.suse.com/security/cve/CVE-2015-0836/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001273.html" source="SUSE-SU"/>
		<description>

This update to Firefox 17.0.9esr (bnc#840485) addresses:

    * MFSA 2013-91 User-defined properties on DOM proxies get the wrong
      'this' object
          o (CVE-2013-1737)
    * MFSA 2013-90 Memory corruption involving scrolling
          o use-after-free in mozilla::layout::ScrollbarActivity
            (CVE-2013-1735)
          o Memory corruption in nsGfxScrollFrameInner::IsLTR()
            (CVE-2013-1736)
    * MFSA 2013-89 Buffer overflow with multi-column, lists, and floats
          o buffer overflow at nsFloatManager::GetFlowArea() with multicol,
            list, floats (CVE-2013-1732)
    * MFSA 2013-88 compartment mismatch re-attaching XBL-backed nodes
          o compartment mismatch in nsXBLBinding::DoInitJSClass
            (CVE-2013-1730)
    * MFSA 2013-83 Mozilla Updater does not lock MAR file after signature
      verification
          o MAR signature bypass in Updater could lead to downgrade
            (CVE-2013-1726)
    * MFSA 2013-82 Calling scope for new Javascript objects can lead to
      memory corruption
          o ABORT: bad scope for new JSObjects: ReparentWrapper /
            document.open (CVE-2013-1725)
    * MFSA 2013-79 Use-after-free in Animation Manager during stylesheet
      cloning
          o Heap-use-after-free in nsAnimationManager::BuildAnimations
            (CVE-2013-1722)
    * MFSA 2013-76 Miscellaneous memory safety hazards (rv:24.0 /
      rv:17.0.9)
          o Memory safety bugs fixed in Firefox 17.0.9 and Firefox 24.0
            (CVE-2013-1718)
    * MFSA 2013-65 Buffer underflow when generating CRMF requests
          o ASAN heap-buffer-overflow (read 1) in
            cryptojs_interpret_key_gen_type (CVE-2013-1705)

Security Issue references:

    * CVE-2013-1737
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737&gt;
    * CVE-2013-1735
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735&gt;
    * CVE-2013-1736
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736&gt;
    * CVE-2013-1732
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732&gt;
    * CVE-2013-1730
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730&gt;
    * CVE-2013-1726
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1726&gt;
    * CVE-2013-1725
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725&gt;
    * CVE-2013-1722
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722&gt;
    * CVE-2013-1718
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718&gt;
    * CVE-2013-1705
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1705&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-19"/>
	<updated date="2013-09-19"/>
	<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649492">SUSE bug 649492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/657016">SUSE bug 657016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/667155">SUSE bug 667155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/680771">SUSE bug 680771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/712224">SUSE bug 712224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/726096">SUSE bug 726096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/728520">SUSE bug 728520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744625">SUSE bug 744625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744629">SUSE bug 744629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745017">SUSE bug 745017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746616">SUSE bug 746616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747320">SUSE bug 747320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747328">SUSE bug 747328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750044">SUSE bug 750044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5913/">CVE-2008-5913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5913">CVE-2008-5913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0179/">CVE-2010-0179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0179">CVE-2010-0179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0183/">CVE-2010-0183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0183">CVE-2010-0183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0654">CVE-2010-0654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1121">CVE-2010-1121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1125/">CVE-2010-1125 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1125">CVE-2010-1125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1196">CVE-2010-1196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1197/">CVE-2010-1197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1197">CVE-2010-1197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1198/">CVE-2010-1198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1198">CVE-2010-1198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1199">CVE-2010-1199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1200">CVE-2010-1200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1201/">CVE-2010-1201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1201">CVE-2010-1201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1202/">CVE-2010-1202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1202">CVE-2010-1202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1203">CVE-2010-1203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1205">CVE-2010-1205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1206/">CVE-2010-1206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1206">CVE-2010-1206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1208/">CVE-2010-1208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1208">CVE-2010-1208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1209/">CVE-2010-1209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1209">CVE-2010-1209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1211">CVE-2010-1211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1213">CVE-2010-1213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1214/">CVE-2010-1214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1214">CVE-2010-1214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1585/">CVE-2010-1585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1585">CVE-2010-1585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2751/">CVE-2010-2751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2751">CVE-2010-2751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2752">CVE-2010-2752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2753">CVE-2010-2753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2754">CVE-2010-2754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2760">CVE-2010-2760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2762/">CVE-2010-2762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2762">CVE-2010-2762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2763/">CVE-2010-2763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2763">CVE-2010-2763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2764">CVE-2010-2764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2765">CVE-2010-2765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2766">CVE-2010-2766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2767">CVE-2010-2767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2768">CVE-2010-2768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2769">CVE-2010-2769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2770/">CVE-2010-2770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2770">CVE-2010-2770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3131/">CVE-2010-3131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3131">CVE-2010-3131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3166">CVE-2010-3166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3167">CVE-2010-3167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3168">CVE-2010-3168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3169">CVE-2010-3169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3170">CVE-2010-3170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3174">CVE-2010-3174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3175">CVE-2010-3175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3176">CVE-2010-3176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3177">CVE-2010-3177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3178">CVE-2010-3178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3179">CVE-2010-3179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3180">CVE-2010-3180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3182">CVE-2010-3182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3183">CVE-2010-3183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3765">CVE-2010-3765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3766/">CVE-2010-3766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3766">CVE-2010-3766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3767/">CVE-2010-3767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3767">CVE-2010-3767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3768/">CVE-2010-3768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3768">CVE-2010-3768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3769/">CVE-2010-3769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3769">CVE-2010-3769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3770/">CVE-2010-3770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3770">CVE-2010-3770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3771/">CVE-2010-3771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3771">CVE-2010-3771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3772/">CVE-2010-3772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3772">CVE-2010-3772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3773/">CVE-2010-3773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3773">CVE-2010-3773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3774/">CVE-2010-3774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3774">CVE-2010-3774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3775/">CVE-2010-3775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3775">CVE-2010-3775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3776/">CVE-2010-3776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3776">CVE-2010-3776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3777/">CVE-2010-3777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3777">CVE-2010-3777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3778/">CVE-2010-3778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3778">CVE-2010-3778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0051/">CVE-2011-0051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0051">CVE-2011-0051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0053/">CVE-2011-0053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0053">CVE-2011-0053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0054/">CVE-2011-0054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0054">CVE-2011-0054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0055/">CVE-2011-0055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0055">CVE-2011-0055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0056/">CVE-2011-0056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0056">CVE-2011-0056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0057/">CVE-2011-0057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0057">CVE-2011-0057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0058/">CVE-2011-0058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0058">CVE-2011-0058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0059/">CVE-2011-0059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0059">CVE-2011-0059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0061/">CVE-2011-0061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0061">CVE-2011-0061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0062/">CVE-2011-0062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0062">CVE-2011-0062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0065/">CVE-2011-0065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0065">CVE-2011-0065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0066/">CVE-2011-0066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0066">CVE-2011-0066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0067/">CVE-2011-0067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0067">CVE-2011-0067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0069">CVE-2011-0069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0070/">CVE-2011-0070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0070">CVE-2011-0070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0071/">CVE-2011-0071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0071">CVE-2011-0071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0072/">CVE-2011-0072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0072">CVE-2011-0072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0073/">CVE-2011-0073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0073">CVE-2011-0073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0074/">CVE-2011-0074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0074">CVE-2011-0074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0075/">CVE-2011-0075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0075">CVE-2011-0075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0076/">CVE-2011-0076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0076">CVE-2011-0076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0077/">CVE-2011-0077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0077">CVE-2011-0077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0078/">CVE-2011-0078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0078">CVE-2011-0078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0080">CVE-2011-0080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0081/">CVE-2011-0081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0081">CVE-2011-0081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0083/">CVE-2011-0083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0083">CVE-2011-0083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0084/">CVE-2011-0084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0084">CVE-2011-0084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0085/">CVE-2011-0085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0085">CVE-2011-0085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1202/">CVE-2011-1202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1202">CVE-2011-1202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2362/">CVE-2011-2362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2362">CVE-2011-2362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2363/">CVE-2011-2363 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2363">CVE-2011-2363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2364/">CVE-2011-2364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2364">CVE-2011-2364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2365/">CVE-2011-2365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2365">CVE-2011-2365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2371/">CVE-2011-2371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2371">CVE-2011-2371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2372/">CVE-2011-2372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2372">CVE-2011-2372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2373/">CVE-2011-2373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2373">CVE-2011-2373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2374/">CVE-2011-2374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2374">CVE-2011-2374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2376/">CVE-2011-2376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2376">CVE-2011-2376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2377/">CVE-2011-2377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2377">CVE-2011-2377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2378/">CVE-2011-2378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2378">CVE-2011-2378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2980/">CVE-2011-2980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2980">CVE-2011-2980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2981/">CVE-2011-2981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2981">CVE-2011-2981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2982/">CVE-2011-2982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2982">CVE-2011-2982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2983/">CVE-2011-2983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2983">CVE-2011-2983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2984/">CVE-2011-2984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2984">CVE-2011-2984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2995/">CVE-2011-2995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2995">CVE-2011-2995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2996/">CVE-2011-2996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2996">CVE-2011-2996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2998/">CVE-2011-2998 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2998">CVE-2011-2998 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2999/">CVE-2011-2999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2999">CVE-2011-2999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3000/">CVE-2011-3000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3000">CVE-2011-3000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3001/">CVE-2011-3001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3001">CVE-2011-3001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3026">CVE-2011-3026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3101/">CVE-2011-3101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3101">CVE-2011-3101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3647/">CVE-2011-3647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3647">CVE-2011-3647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3648/">CVE-2011-3648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3648">CVE-2011-3648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3649/">CVE-2011-3649 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3649">CVE-2011-3649 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3650/">CVE-2011-3650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3650">CVE-2011-3650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3651/">CVE-2011-3651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3651">CVE-2011-3651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3653/">CVE-2011-3653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3653">CVE-2011-3653 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3655/">CVE-2011-3655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3655">CVE-2011-3655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0441/">CVE-2012-0441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0441">CVE-2012-0441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0451/">CVE-2012-0451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0451">CVE-2012-0451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0452/">CVE-2012-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0452">CVE-2012-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0454/">CVE-2012-0454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0454">CVE-2012-0454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0455/">CVE-2012-0455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0455">CVE-2012-0455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0456/">CVE-2012-0456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0456">CVE-2012-0456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0457/">CVE-2012-0457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0457">CVE-2012-0457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0458/">CVE-2012-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0458">CVE-2012-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0459/">CVE-2012-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0459">CVE-2012-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0460/">CVE-2012-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0460">CVE-2012-0460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0461/">CVE-2012-0461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0461">CVE-2012-0461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0462/">CVE-2012-0462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0462">CVE-2012-0462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0463/">CVE-2012-0463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0463">CVE-2012-0463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0464/">CVE-2012-0464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0464">CVE-2012-0464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1937/">CVE-2012-1937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1937">CVE-2012-1937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1938/">CVE-2012-1938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1938">CVE-2012-1938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1939/">CVE-2012-1939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1939">CVE-2012-1939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1940/">CVE-2012-1940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1940">CVE-2012-1940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1941/">CVE-2012-1941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1941">CVE-2012-1941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1942/">CVE-2012-1942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1942">CVE-2012-1942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1943/">CVE-2012-1943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1943">CVE-2012-1943 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1944/">CVE-2012-1944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1944">CVE-2012-1944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1945/">CVE-2012-1945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1945">CVE-2012-1945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1946/">CVE-2012-1946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1946">CVE-2012-1946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1947/">CVE-2012-1947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1947">CVE-2012-1947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1701/">CVE-2013-1701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1701">CVE-2013-1701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1702/">CVE-2013-1702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1702">CVE-2013-1702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1705/">CVE-2013-1705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1705">CVE-2013-1705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1706/">CVE-2013-1706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1706">CVE-2013-1706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1707/">CVE-2013-1707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1707">CVE-2013-1707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1709/">CVE-2013-1709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1709">CVE-2013-1709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1710/">CVE-2013-1710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1710">CVE-2013-1710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1712/">CVE-2013-1712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1712">CVE-2013-1712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1713/">CVE-2013-1713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1713">CVE-2013-1713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1714/">CVE-2013-1714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1714">CVE-2013-1714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1717/">CVE-2013-1717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1717">CVE-2013-1717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1718/">CVE-2013-1718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1718">CVE-2013-1718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1722/">CVE-2013-1722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1722">CVE-2013-1722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1725/">CVE-2013-1725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1725">CVE-2013-1725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1726/">CVE-2013-1726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1726">CVE-2013-1726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1730/">CVE-2013-1730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1730">CVE-2013-1730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1732/">CVE-2013-1732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1732">CVE-2013-1732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1735/">CVE-2013-1735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1735">CVE-2013-1735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1736/">CVE-2013-1736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1736">CVE-2013-1736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1737/">CVE-2013-1737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1737">CVE-2013-1737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0822/">CVE-2015-0822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0822">CVE-2015-0822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0827/">CVE-2015-0827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0827">CVE-2015-0827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0831/">CVE-2015-0831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0831">CVE-2015-0831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0836/">CVE-2015-0836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0836">CVE-2015-0836 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991192" comment="MozillaFirefox-17.0.9esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991193" comment="MozillaFirefox-translations-17.0.9esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991194" comment="libfreebl3-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991195" comment="libfreebl3-32bit-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991196" comment="mozilla-nspr-4.9.1-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991197" comment="mozilla-nspr-32bit-4.9.1-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991198" comment="mozilla-nss-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991199" comment="mozilla-nss-32bit-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991200" comment="mozilla-nss-tools-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991201" comment="mozilla-xulrunner191-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991202" comment="mozilla-xulrunner191-32bit-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991203" comment="mozilla-xulrunner191-gnomevfs-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991204" comment="mozilla-xulrunner191-translations-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991205" comment="mozilla-xulrunner192-1.9.2.24-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991206" comment="mozilla-xulrunner192-32bit-1.9.2.24-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991207" comment="mozilla-xulrunner192-gnome-1.9.2.24-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991208" comment="mozilla-xulrunner192-translations-1.9.2.24-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991192" comment="MozillaFirefox-17.0.9esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991193" comment="MozillaFirefox-translations-17.0.9esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991194" comment="libfreebl3-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991195" comment="libfreebl3-32bit-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991196" comment="mozilla-nspr-4.9.1-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991197" comment="mozilla-nspr-32bit-4.9.1-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991198" comment="mozilla-nss-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991199" comment="mozilla-nss-32bit-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991200" comment="mozilla-nss-tools-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991201" comment="mozilla-xulrunner191-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991202" comment="mozilla-xulrunner191-32bit-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991203" comment="mozilla-xulrunner191-gnomevfs-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991204" comment="mozilla-xulrunner191-translations-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991205" comment="mozilla-xulrunner192-1.9.2.24-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991206" comment="mozilla-xulrunner192-32bit-1.9.2.24-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991207" comment="mozilla-xulrunner192-gnome-1.9.2.24-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991208" comment="mozilla-xulrunner192-translations-1.9.2.24-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216828" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="959277" ref_url="https://bugzilla.suse.com/959277" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7202" ref_url="https://www.suse.com/security/cve/CVE-2015-7202/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<description>

MozillaFirefox was updated to version 38.5.0 ESR.

It fixes the following security issues:

* MFSA 2015-134/CVE-2015-7201/CVE-2015-7202
  Miscellaneous memory safety hazards (rv:43.0 / rv:38.5)
* MFSA 2015-138/CVE-2015-7210
  Use-after-free in WebRTC when datachannel is used after being
  destroyed
* MFSA 2015-139/CVE-2015-7212
  Integer overflow allocating extremely large textures
* MFSA 2015-145/CVE-2015-7205
  Underflow through code inspection
* MFSA 2015-146/CVE-2015-7213
  Integer overflow in MP4 playback in 64-bit versions
* MFSA 2015-147/CVE-2015-7222
  Integer underflow and buffer overflow processing MP4 metadata
  in libstagefright
* MFSA 2015-149/CVE-2015-7214
  Cross-site reading attack through data and view-source URIs
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-21"/>
	<updated date="2015-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7201">CVE-2015-7201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7202/">CVE-2015-7202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7202">CVE-2015-7202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7205">CVE-2015-7205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7210">CVE-2015-7210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7212">CVE-2015-7212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7213">CVE-2015-7213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7214">CVE-2015-7214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7222">CVE-2015-7222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570514" comment="MozillaFirefox-38.5.0esr-28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570515" comment="MozillaFirefox-translations-38.5.0esr-28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216829" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="977333" ref_url="https://bugzilla.suse.com/977333" source="BUGZILLA"/>
		<reference ref_id="977374" ref_url="https://bugzilla.suse.com/977374" source="BUGZILLA"/>
		<reference ref_id="977376" ref_url="https://bugzilla.suse.com/977376" source="BUGZILLA"/>
		<reference ref_id="977381" ref_url="https://bugzilla.suse.com/977381" source="BUGZILLA"/>
		<reference ref_id="977386" ref_url="https://bugzilla.suse.com/977386" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2805" ref_url="https://www.suse.com/security/cve/CVE-2016-2805/" source="CVE"/>
		<reference ref_id="CVE-2016-2807" ref_url="https://www.suse.com/security/cve/CVE-2016-2807/" source="CVE"/>
		<reference ref_id="CVE-2016-2808" ref_url="https://www.suse.com/security/cve/CVE-2016-2808/" source="CVE"/>
		<reference ref_id="CVE-2016-2814" ref_url="https://www.suse.com/security/cve/CVE-2016-2814/" source="CVE"/>
		<description>
This update to MozillaFirefox 38.8.0 ESR fixes the following security issues (bsc#977333):

- CVE-2016-2805: Miscellaneous memory safety hazards - MFSA 2016-39 (bsc#977374)
- CVE-2016-2807: Miscellaneous memory safety hazards - MFSA 2016-39 (bsc#977376)
- CVE-2016-2808: Write to invalid HashMap entry through JavaScript.watch() - MFSA 2016-47 (bsc#977386)
- CVE-2016-2814: Buffer overflow in libstagefright with CENC offsets - MFSA 2016-44 (bsc#977381)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-18"/>
	<updated date="2016-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977374">SUSE bug 977374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977376">SUSE bug 977376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977381">SUSE bug 977381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977386">SUSE bug 977386</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2805/">CVE-2016-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2805">CVE-2016-2805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2807/">CVE-2016-2807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2807">CVE-2016-2807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2808/">CVE-2016-2808 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2808">CVE-2016-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2814/">CVE-2016-2814 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2814">CVE-2016-2814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570516" comment="MozillaFirefox-38.8.0esr-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570517" comment="MozillaFirefox-translations-38.8.0esr-40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216830" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLED, mozilla-nspr and mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="983549" ref_url="https://bugzilla.suse.com/983549" source="BUGZILLA"/>
		<reference ref_id="983638" ref_url="https://bugzilla.suse.com/983638" source="BUGZILLA"/>
		<reference ref_id="983639" ref_url="https://bugzilla.suse.com/983639" source="BUGZILLA"/>
		<reference ref_id="983643" ref_url="https://bugzilla.suse.com/983643" source="BUGZILLA"/>
		<reference ref_id="983646" ref_url="https://bugzilla.suse.com/983646" source="BUGZILLA"/>
		<reference ref_id="983651" ref_url="https://bugzilla.suse.com/983651" source="BUGZILLA"/>
		<reference ref_id="983652" ref_url="https://bugzilla.suse.com/983652" source="BUGZILLA"/>
		<reference ref_id="983653" ref_url="https://bugzilla.suse.com/983653" source="BUGZILLA"/>
		<reference ref_id="983655" ref_url="https://bugzilla.suse.com/983655" source="BUGZILLA"/>
		<reference ref_id="984006" ref_url="https://bugzilla.suse.com/984006" source="BUGZILLA"/>
		<reference ref_id="985659" ref_url="https://bugzilla.suse.com/985659" source="BUGZILLA"/>
		<reference ref_id="989196" ref_url="https://bugzilla.suse.com/989196" source="BUGZILLA"/>
		<reference ref_id="990628" ref_url="https://bugzilla.suse.com/990628" source="BUGZILLA"/>
		<reference ref_id="990856" ref_url="https://bugzilla.suse.com/990856" source="BUGZILLA"/>
		<reference ref_id="991809" ref_url="https://bugzilla.suse.com/991809" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2815" ref_url="https://www.suse.com/security/cve/CVE-2016-2815/" source="CVE"/>
		<reference ref_id="CVE-2016-2818" ref_url="https://www.suse.com/security/cve/CVE-2016-2818/" source="CVE"/>
		<reference ref_id="CVE-2016-2819" ref_url="https://www.suse.com/security/cve/CVE-2016-2819/" source="CVE"/>
		<reference ref_id="CVE-2016-2821" ref_url="https://www.suse.com/security/cve/CVE-2016-2821/" source="CVE"/>
		<reference ref_id="CVE-2016-2822" ref_url="https://www.suse.com/security/cve/CVE-2016-2822/" source="CVE"/>
		<reference ref_id="CVE-2016-2824" ref_url="https://www.suse.com/security/cve/CVE-2016-2824/" source="CVE"/>
		<reference ref_id="CVE-2016-2828" ref_url="https://www.suse.com/security/cve/CVE-2016-2828/" source="CVE"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-2831" ref_url="https://www.suse.com/security/cve/CVE-2016-2831/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="CVE-2016-2835" ref_url="https://www.suse.com/security/cve/CVE-2016-2835/" source="CVE"/>
		<reference ref_id="CVE-2016-2836" ref_url="https://www.suse.com/security/cve/CVE-2016-2836/" source="CVE"/>
		<reference ref_id="CVE-2016-2837" ref_url="https://www.suse.com/security/cve/CVE-2016-2837/" source="CVE"/>
		<reference ref_id="CVE-2016-2838" ref_url="https://www.suse.com/security/cve/CVE-2016-2838/" source="CVE"/>
		<reference ref_id="CVE-2016-2839" ref_url="https://www.suse.com/security/cve/CVE-2016-2839/" source="CVE"/>
		<reference ref_id="CVE-2016-5252" ref_url="https://www.suse.com/security/cve/CVE-2016-5252/" source="CVE"/>
		<reference ref_id="CVE-2016-5254" ref_url="https://www.suse.com/security/cve/CVE-2016-5254/" source="CVE"/>
		<reference ref_id="CVE-2016-5258" ref_url="https://www.suse.com/security/cve/CVE-2016-5258/" source="CVE"/>
		<reference ref_id="CVE-2016-5259" ref_url="https://www.suse.com/security/cve/CVE-2016-5259/" source="CVE"/>
		<reference ref_id="CVE-2016-5262" ref_url="https://www.suse.com/security/cve/CVE-2016-5262/" source="CVE"/>
		<reference ref_id="CVE-2016-5263" ref_url="https://www.suse.com/security/cve/CVE-2016-5263/" source="CVE"/>
		<reference ref_id="CVE-2016-5264" ref_url="https://www.suse.com/security/cve/CVE-2016-5264/" source="CVE"/>
		<reference ref_id="CVE-2016-5265" ref_url="https://www.suse.com/security/cve/CVE-2016-5265/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<description>
MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nspr and  mozilla-nss were updated to fix nine security issues.

MozillaFirefox was updated to version 45.3.0 ESR. mozilla-nss was updated to version 3.21.1, mozilla-nspr to version 4.12.

These security issues were fixed in 45.3.0ESR:
- CVE-2016-2835/CVE-2016-2836: Miscellaneous memory safety hazards (rv:48.0 / rv:45.3) (MFSA 2016-62)
- CVE-2016-2830: Favicon network connection can persist when page is closed (MFSA 2016-63)
- CVE-2016-2838: Buffer overflow rendering SVG with bidirectional content (MFSA 2016-64)
- CVE-2016-2839: Cairo rendering crash due to memory allocation issue with FFmpeg 0.10 (MFSA 2016-65)
- CVE-2016-5252: Stack underflow during 2D graphics rendering (MFSA 2016-67)
- CVE-2016-5254: Use-after-free when using alt key and toplevel menus (MFSA 2016-70)
- CVE-2016-5258: Use-after-free in DTLS during WebRTC session shutdown (MFSA 2016-72)
- CVE-2016-5259: Use-after-free in service workers with nested sync events (MFSA 2016-73)
- CVE-2016-5262: Scripts on marquee tag can execute in sandboxed iframes (MFSA 2016-76)
- CVE-2016-2837: Buffer overflow in ClearKey Content Decryption Module (CDM) during video playback (MFSA 2016-77)
- CVE-2016-5263: Type confusion in display transformation (MFSA 2016-78)
- CVE-2016-5264: Use-after-free when applying SVG effects (MFSA 2016-79)
- CVE-2016-5265: Same-origin policy violation using local HTML file and saved shortcut file (MFSA 2016-80)
- CVE-2016-6354: Fix for possible buffer overrun (bsc#990856)

Security issues fixed in 45.2.0.ESR:
- CVE-2016-2834: Memory safety bugs in NSS (MFSA 2016-61) (bsc#983639).
- CVE-2016-2824: Out-of-bounds write with WebGL shader (MFSA 2016-53) (bsc#983651).
- CVE-2016-2822: Addressbar spoofing though the SELECT element (MFSA 2016-52) (bsc#983652).
- CVE-2016-2821: Use-after-free deleting tables from a contenteditable document (MFSA 2016-51) (bsc#983653).
- CVE-2016-2819: Buffer overflow parsing HTML5 fragments (MFSA 2016-50) (bsc#983655).
- CVE-2016-2828: Use-after-free when textures are used in WebGL operations after recycle pool destruction (MFSA 2016-56) (bsc#983646).
- CVE-2016-2831: Entering fullscreen and persistent pointerlock without user permission (MFSA 2016-58) (bsc#983643).
- CVE-2016-2815, CVE-2016-2818: Miscellaneous memory safety hazards (MFSA 2016-49) (bsc#983638)

These non-security issues were fixed:
- Fix crashes on aarch64
  * Determine page size at runtime (bsc#984006)
  * Allow aarch64 to work in safe mode (bsc#985659)
- Fix crashes on mainframes
- Temporarily bind Firefox to the first CPU as a hotfix
  for an apparent race condition (bsc#989196, bsc#990628)

All extensions must now be signed by addons.mozilla.org. Please read README.SUSE for more details.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-12"/>
	<updated date="2016-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983638">SUSE bug 983638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983639">SUSE bug 983639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983643">SUSE bug 983643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983646">SUSE bug 983646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983651">SUSE bug 983651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983652">SUSE bug 983652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983653">SUSE bug 983653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983655">SUSE bug 983655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984006">SUSE bug 984006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985659">SUSE bug 985659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989196">SUSE bug 989196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990628">SUSE bug 990628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990856">SUSE bug 990856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2815/">CVE-2016-2815 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2815">CVE-2016-2815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2818/">CVE-2016-2818 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2818">CVE-2016-2818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2819/">CVE-2016-2819 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2819">CVE-2016-2819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2821/">CVE-2016-2821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2821">CVE-2016-2821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2822/">CVE-2016-2822 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2822">CVE-2016-2822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2824/">CVE-2016-2824 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2824">CVE-2016-2824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2828/">CVE-2016-2828 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2828">CVE-2016-2828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2830">CVE-2016-2830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2831/">CVE-2016-2831 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2831">CVE-2016-2831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2834">CVE-2016-2834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2835/">CVE-2016-2835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2835">CVE-2016-2835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2836/">CVE-2016-2836 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2836">CVE-2016-2836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2837/">CVE-2016-2837 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2837">CVE-2016-2837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2838/">CVE-2016-2838 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2838">CVE-2016-2838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2839/">CVE-2016-2839 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2839">CVE-2016-2839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5252/">CVE-2016-5252 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5252">CVE-2016-5252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5254/">CVE-2016-5254 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5254">CVE-2016-5254 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5258/">CVE-2016-5258 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5258">CVE-2016-5258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5259/">CVE-2016-5259 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5259">CVE-2016-5259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5262/">CVE-2016-5262 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5262">CVE-2016-5262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5263/">CVE-2016-5263 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5263">CVE-2016-5263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5264/">CVE-2016-5264 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5264">CVE-2016-5264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5265/">CVE-2016-5265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5265">CVE-2016-5265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6354">CVE-2016-6354 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570518" comment="MozillaFirefox-45.3.0esr-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570519" comment="MozillaFirefox-branding-SLED-45.0-20.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570520" comment="MozillaFirefox-translations-45.3.0esr-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570521" comment="firefox-fontconfig-2.11.0-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570522" comment="libfreebl3-3.21.1-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570523" comment="libfreebl3-32bit-3.21.1-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570524" comment="mozilla-nspr-4.12-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570525" comment="mozilla-nspr-32bit-4.12-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570526" comment="mozilla-nss-3.21.1-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570527" comment="mozilla-nss-32bit-3.21.1-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570528" comment="mozilla-nss-tools-3.21.1-26.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216831" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="999701" ref_url="https://bugzilla.suse.com/999701" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5250" ref_url="https://www.suse.com/security/cve/CVE-2016-5250/" source="CVE"/>
		<reference ref_id="CVE-2016-5257" ref_url="https://www.suse.com/security/cve/CVE-2016-5257/" source="CVE"/>
		<reference ref_id="CVE-2016-5261" ref_url="https://www.suse.com/security/cve/CVE-2016-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-5270" ref_url="https://www.suse.com/security/cve/CVE-2016-5270/" source="CVE"/>
		<reference ref_id="CVE-2016-5272" ref_url="https://www.suse.com/security/cve/CVE-2016-5272/" source="CVE"/>
		<reference ref_id="CVE-2016-5274" ref_url="https://www.suse.com/security/cve/CVE-2016-5274/" source="CVE"/>
		<reference ref_id="CVE-2016-5276" ref_url="https://www.suse.com/security/cve/CVE-2016-5276/" source="CVE"/>
		<reference ref_id="CVE-2016-5277" ref_url="https://www.suse.com/security/cve/CVE-2016-5277/" source="CVE"/>
		<reference ref_id="CVE-2016-5278" ref_url="https://www.suse.com/security/cve/CVE-2016-5278/" source="CVE"/>
		<reference ref_id="CVE-2016-5280" ref_url="https://www.suse.com/security/cve/CVE-2016-5280/" source="CVE"/>
		<reference ref_id="CVE-2016-5281" ref_url="https://www.suse.com/security/cve/CVE-2016-5281/" source="CVE"/>
		<reference ref_id="CVE-2016-5284" ref_url="https://www.suse.com/security/cve/CVE-2016-5284/" source="CVE"/>
		<description>

MozillaFirefox was updated to 45.4.0 ESR to fix the following issues (bsc#999701):

The following security issue were fixed:
* MFSA 2016-86/CVE-2016-5270: Heap-buffer-overflow in nsCaseTransformTextRunFactory::TransformString
* MFSA 2016-86/CVE-2016-5272: Bad cast in nsImageGeometryMixin
* MFSA 2016-86/CVE-2016-5276: Heap-use-after-free in mozilla::a11y::DocAccessible::ProcessInvalidationList
* MFSA 2016-86/CVE-2016-5274: use-after-free in nsFrameManager::CaptureFrameState
* MFSA 2016-86/CVE-2016-5277: Heap-use-after-free in nsRefreshDriver::Tick
* MFSA 2016-86/CVE-2016-5278: Heap-buffer-overflow in nsBMPEncoder::AddImageFrame
* MFSA 2016-86/CVE-2016-5280: Use-after-free in mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap
* MFSA 2016-86/CVE-2016-5281: use-after-free in DOMSVGLength
* MFSA 2016-86/CVE-2016-5284: Add-on update site certificate pin expiration
* MFSA 2016-86/CVE-2016-5250: Resource Timing API is storing resources sent by the previous page
* MFSA 2016-86/CVE-2016-5261: Integer overflow and memory corruption in WebSocketChannel
* MFSA 2016-86/CVE-2016-5257: Various memory safety bugs fixed in Firefox 49 and Firefox ESR 45.4
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-04"/>
	<updated date="2016-10-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5250/">CVE-2016-5250 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5250">CVE-2016-5250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5257/">CVE-2016-5257 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5257">CVE-2016-5257 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5261/">CVE-2016-5261 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5261">CVE-2016-5261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5270/">CVE-2016-5270 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5270">CVE-2016-5270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5272/">CVE-2016-5272 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5272">CVE-2016-5272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5274/">CVE-2016-5274 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5274">CVE-2016-5274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5276/">CVE-2016-5276 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5276">CVE-2016-5276 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5277/">CVE-2016-5277 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5277">CVE-2016-5277 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5278/">CVE-2016-5278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5278">CVE-2016-5278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5280/">CVE-2016-5280 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5280">CVE-2016-5280 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5281/">CVE-2016-5281 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5281">CVE-2016-5281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5284/">CVE-2016-5284 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5284">CVE-2016-5284 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570529" comment="MozillaFirefox-45.4.0esr-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570530" comment="MozillaFirefox-translations-45.4.0esr-52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216832" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1000751" ref_url="https://bugzilla.suse.com/1000751" source="BUGZILLA"/>
		<reference ref_id="1015422" ref_url="https://bugzilla.suse.com/1015422" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9893" ref_url="https://www.suse.com/security/cve/CVE-2016-9893/" source="CVE"/>
		<reference ref_id="CVE-2016-9895" ref_url="https://www.suse.com/security/cve/CVE-2016-9895/" source="CVE"/>
		<reference ref_id="CVE-2016-9897" ref_url="https://www.suse.com/security/cve/CVE-2016-9897/" source="CVE"/>
		<reference ref_id="CVE-2016-9898" ref_url="https://www.suse.com/security/cve/CVE-2016-9898/" source="CVE"/>
		<reference ref_id="CVE-2016-9899" ref_url="https://www.suse.com/security/cve/CVE-2016-9899/" source="CVE"/>
		<reference ref_id="CVE-2016-9900" ref_url="https://www.suse.com/security/cve/CVE-2016-9900/" source="CVE"/>
		<reference ref_id="CVE-2016-9901" ref_url="https://www.suse.com/security/cve/CVE-2016-9901/" source="CVE"/>
		<reference ref_id="CVE-2016-9902" ref_url="https://www.suse.com/security/cve/CVE-2016-9902/" source="CVE"/>
		<reference ref_id="CVE-2016-9904" ref_url="https://www.suse.com/security/cve/CVE-2016-9904/" source="CVE"/>
		<reference ref_id="CVE-2016-9905" ref_url="https://www.suse.com/security/cve/CVE-2016-9905/" source="CVE"/>
		<description>

MozillaFirefox 45 ESR was updated to 45.6 to fix the following issues:

* MFSA 2016-95/CVE-2016-9897: Memory corruption in libGLES
* MFSA 2016-95/CVE-2016-9901: Data from Pocket server improperly sanitized before execution
* MFSA 2016-95/CVE-2016-9898: Use-after-free in Editor while manipulating DOM subtrees
* MFSA 2016-95/CVE-2016-9899: Use-after-free while manipulating DOM events and audio elements
* MFSA 2016-95/CVE-2016-9904: Cross-origin information leak in shared atoms
* MFSA 2016-95/CVE-2016-9905: Crash in EnumerateSubDocuments
* MFSA 2016-95/CVE-2016-9895: CSP bypass using marquee tag
* MFSA 2016-95/CVE-2016-9900: Restricted external resources can be loaded by SVG images through data URLs
* MFSA 2016-95/CVE-2016-9893: Memory safety bugs fixed in Firefox 50.1 and Firefox ESR 45.6
* MFSA 2016-95/CVE-2016-9902: Pocket extension does not validate the origin of events

Please see https://www.mozilla.org/en-US/security/advisories/mfsa2016-95/
for more information.

- Fix fontconfig issue (bsc#1000751) on 32bit systems as well.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-21"/>
	<updated date="2016-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000751">SUSE bug 1000751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9893/">CVE-2016-9893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9893">CVE-2016-9893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9895/">CVE-2016-9895 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9895">CVE-2016-9895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9897/">CVE-2016-9897 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9897">CVE-2016-9897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9898/">CVE-2016-9898 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9898">CVE-2016-9898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9899/">CVE-2016-9899 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9899">CVE-2016-9899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9900/">CVE-2016-9900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9900">CVE-2016-9900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9901/">CVE-2016-9901 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9901">CVE-2016-9901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9902/">CVE-2016-9902 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9902">CVE-2016-9902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9904/">CVE-2016-9904 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9904">CVE-2016-9904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9905/">CVE-2016-9905 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9905">CVE-2016-9905 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570531" comment="MozillaFirefox-45.6.0esr-66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570532" comment="MozillaFirefox-translations-45.6.0esr-66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216833" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1021814" ref_url="https://bugzilla.suse.com/1021814" source="BUGZILLA"/>
		<reference ref_id="1021817" ref_url="https://bugzilla.suse.com/1021817" source="BUGZILLA"/>
		<reference ref_id="1021818" ref_url="https://bugzilla.suse.com/1021818" source="BUGZILLA"/>
		<reference ref_id="1021819" ref_url="https://bugzilla.suse.com/1021819" source="BUGZILLA"/>
		<reference ref_id="1021820" ref_url="https://bugzilla.suse.com/1021820" source="BUGZILLA"/>
		<reference ref_id="1021821" ref_url="https://bugzilla.suse.com/1021821" source="BUGZILLA"/>
		<reference ref_id="1021822" ref_url="https://bugzilla.suse.com/1021822" source="BUGZILLA"/>
		<reference ref_id="1021823" ref_url="https://bugzilla.suse.com/1021823" source="BUGZILLA"/>
		<reference ref_id="1021824" ref_url="https://bugzilla.suse.com/1021824" source="BUGZILLA"/>
		<reference ref_id="1021991" ref_url="https://bugzilla.suse.com/1021991" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5373" ref_url="https://www.suse.com/security/cve/CVE-2017-5373/" source="CVE"/>
		<reference ref_id="CVE-2017-5375" ref_url="https://www.suse.com/security/cve/CVE-2017-5375/" source="CVE"/>
		<reference ref_id="CVE-2017-5376" ref_url="https://www.suse.com/security/cve/CVE-2017-5376/" source="CVE"/>
		<reference ref_id="CVE-2017-5378" ref_url="https://www.suse.com/security/cve/CVE-2017-5378/" source="CVE"/>
		<reference ref_id="CVE-2017-5380" ref_url="https://www.suse.com/security/cve/CVE-2017-5380/" source="CVE"/>
		<reference ref_id="CVE-2017-5383" ref_url="https://www.suse.com/security/cve/CVE-2017-5383/" source="CVE"/>
		<reference ref_id="CVE-2017-5386" ref_url="https://www.suse.com/security/cve/CVE-2017-5386/" source="CVE"/>
		<reference ref_id="CVE-2017-5390" ref_url="https://www.suse.com/security/cve/CVE-2017-5390/" source="CVE"/>
		<reference ref_id="CVE-2017-5396" ref_url="https://www.suse.com/security/cve/CVE-2017-5396/" source="CVE"/>
		<description>

MozillaFirefox 45 ESR was updated to 45.7 to fix the following issues (bsc#1021991):

* MFSA 2017-02/CVE-2017-5378: Pointer and frame data leakage of Javascript objects (bsc#1021818)
* MFSA 2017-02/CVE-2017-5396: Use-after-free with Media Decoder (bsc#1021821)
* MFSA 2017-02/CVE-2017-5386: WebExtensions can use data: protocol to affect other extensions (bsc#1021823)
* MFSA 2017-02/CVE-2017-5380: Potential use-after-free during DOM manipulations (bsc#1021819)
* MFSA 2017-02/CVE-2017-5390: Insecure communication methods in Developer Tools JSON viewer (bsc#1021820)
* MFSA 2017-02/CVE-2017-5373: Memory safety bugs fixed in Firefox 51 and Firefox ESR 45.7 (bsc#1021824)
* MFSA 2017-02/CVE-2017-5375: Excessive JIT code allocation allows bypass of ASLR and DEP (bsc#1021814)
* MFSA 2017-02/CVE-2017-5376: Use-after-free in XSL (bsc#1021817)
* MFSA 2017-02/CVE-2017-5383: Location bar spoofing with unicode characters (bsc#1021822)

Please see https://www.mozilla.org/en-US/security/advisories/mfsa2017-02/
for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-10"/>
	<updated date="2017-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021814">SUSE bug 1021814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021817">SUSE bug 1021817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021818">SUSE bug 1021818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021819">SUSE bug 1021819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021820">SUSE bug 1021820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021821">SUSE bug 1021821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021822">SUSE bug 1021822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021823">SUSE bug 1021823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021824">SUSE bug 1021824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5373/">CVE-2017-5373 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5373">CVE-2017-5373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5375/">CVE-2017-5375 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5375">CVE-2017-5375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5376/">CVE-2017-5376 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5376">CVE-2017-5376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5378/">CVE-2017-5378 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5378">CVE-2017-5378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5380/">CVE-2017-5380 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5380">CVE-2017-5380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5383/">CVE-2017-5383 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5383">CVE-2017-5383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5386/">CVE-2017-5386 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5386">CVE-2017-5386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5390/">CVE-2017-5390 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5390">CVE-2017-5390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5396/">CVE-2017-5396 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5396">CVE-2017-5396 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570533" comment="MozillaFirefox-45.7.0esr-69.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570534" comment="MozillaFirefox-translations-45.7.0esr-69.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216834" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1027527" ref_url="https://bugzilla.suse.com/1027527" source="BUGZILLA"/>
		<reference ref_id="1028391" ref_url="https://bugzilla.suse.com/1028391" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5398" ref_url="https://www.suse.com/security/cve/CVE-2017-5398/" source="CVE"/>
		<reference ref_id="CVE-2017-5400" ref_url="https://www.suse.com/security/cve/CVE-2017-5400/" source="CVE"/>
		<reference ref_id="CVE-2017-5401" ref_url="https://www.suse.com/security/cve/CVE-2017-5401/" source="CVE"/>
		<reference ref_id="CVE-2017-5402" ref_url="https://www.suse.com/security/cve/CVE-2017-5402/" source="CVE"/>
		<reference ref_id="CVE-2017-5404" ref_url="https://www.suse.com/security/cve/CVE-2017-5404/" source="CVE"/>
		<reference ref_id="CVE-2017-5405" ref_url="https://www.suse.com/security/cve/CVE-2017-5405/" source="CVE"/>
		<reference ref_id="CVE-2017-5407" ref_url="https://www.suse.com/security/cve/CVE-2017-5407/" source="CVE"/>
		<reference ref_id="CVE-2017-5408" ref_url="https://www.suse.com/security/cve/CVE-2017-5408/" source="CVE"/>
		<reference ref_id="CVE-2017-5409" ref_url="https://www.suse.com/security/cve/CVE-2017-5409/" source="CVE"/>
		<reference ref_id="CVE-2017-5410" ref_url="https://www.suse.com/security/cve/CVE-2017-5410/" source="CVE"/>
		<description>

This update for MozillaFirefox to ESR 45.8 fixes the following issues:

Security issues fixed (bsc#1028391):
- CVE-2017-5402: Use-after-free working with events in FontFace objects
- CVE-2017-5410: Memory corruption during JavaScript garbage collection incremental sweeping
- CVE-2017-5400: asm.js JIT-spray bypass of ASLR and DEP
- CVE-2017-5401: Memory Corruption when handling ErrorResult
- CVE-2017-5407: Pixel and history stealing via floating-point timing side channel with SVG filters
- CVE-2017-5404: Use-after-free working with ranges in selections
- CVE-2017-5405: FTP response codes can cause use of uninitialized values for ports
- CVE-2017-5408: Cross-origin reading of video captions in violation of CORS
- CVE-2017-5409: File deletion via callback parameter in Mozilla Windows Updater and Maintenance Service
- CVE-2017-5398: Memory safety bugs fixed in Firefox 52 and Firefox ESR 45.8

Bugfixes:
- fix crashes on Itanium (bsc#1027527)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-21"/>
	<updated date="2017-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027527">SUSE bug 1027527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5398/">CVE-2017-5398 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5398">CVE-2017-5398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5400/">CVE-2017-5400 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5400">CVE-2017-5400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5401/">CVE-2017-5401 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5401">CVE-2017-5401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5402/">CVE-2017-5402 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5402">CVE-2017-5402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5404/">CVE-2017-5404 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5404">CVE-2017-5404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5405/">CVE-2017-5405 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5405">CVE-2017-5405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5407/">CVE-2017-5407 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5407">CVE-2017-5407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5408/">CVE-2017-5408 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5408">CVE-2017-5408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5409/">CVE-2017-5409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5409">CVE-2017-5409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5410/">CVE-2017-5410 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5410">CVE-2017-5410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570535" comment="MozillaFirefox-45.8.0esr-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570536" comment="MozillaFirefox-translations-45.8.0esr-74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216835" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss, mozilla-nspr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1015499" ref_url="https://bugzilla.suse.com/1015499" source="BUGZILLA"/>
		<reference ref_id="1015547" ref_url="https://bugzilla.suse.com/1015547" source="BUGZILLA"/>
		<reference ref_id="1021636" ref_url="https://bugzilla.suse.com/1021636" source="BUGZILLA"/>
		<reference ref_id="1030071" ref_url="https://bugzilla.suse.com/1030071" source="BUGZILLA"/>
		<reference ref_id="1035082" ref_url="https://bugzilla.suse.com/1035082" source="BUGZILLA"/>
		<reference ref_id="983639" ref_url="https://bugzilla.suse.com/983639" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="CVE-2016-8635" ref_url="https://www.suse.com/security/cve/CVE-2016-8635/" source="CVE"/>
		<reference ref_id="CVE-2016-9574" ref_url="https://www.suse.com/security/cve/CVE-2016-9574/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5437" ref_url="https://www.suse.com/security/cve/CVE-2017-5437/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<description>

Mozilla Firefox was updated to the Firefox ESR release 45.9.

Mozilla NSS was updated to support TLS 1.3 (close to release draft) and various new 
ciphers, PRFs, Diffie Hellman key agreement and support for more hashes.

Security issues fixed in Firefox (bsc#1035082)

- MFSA 2017-11/CVE-2017-5469: Potential Buffer overflow in flex-generated code
- MFSA 2017-11/CVE-2017-5429: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and Firefox ESR 52.1
- MFSA 2017-11/CVE-2017-5439: Use-after-free in nsTArray Length() during XSLT processing
- MFSA 2017-11/CVE-2017-5438: Use-after-free in nsAutoPtr during XSLT processing
- MFSA 2017-11/CVE-2017-5437: Vulnerabilities in Libevent library
- MFSA 2017-11/CVE-2017-5436: Out-of-bounds write with malicious font in Graphite 2
- MFSA 2017-11/CVE-2017-5435: Use-after-free during transaction processing in the editor
- MFSA 2017-11/CVE-2017-5434: Use-after-free during focus handling
- MFSA 2017-11/CVE-2017-5433: Use-after-free in SMIL animation functions
- MFSA 2017-11/CVE-2017-5432: Use-after-free in text input selection
- MFSA 2017-11/CVE-2017-5464: Memory corruption with accessibility and DOM manipulation
- MFSA 2017-11/CVE-2017-5465: Out-of-bounds read in ConvolvePixel
- MFSA 2017-11/CVE-2017-5460: Use-after-free in frame selection
- MFSA 2017-11/CVE-2017-5448: Out-of-bounds write in ClearKeyDecryptor
- MFSA 2017-11/CVE-2017-5446: Out-of-bounds read when HTTP/2 DATA frames are sent with incorrect data
- MFSA 2017-11/CVE-2017-5447: Out-of-bounds read during glyph processing
- MFSA 2017-11/CVE-2017-5444: Buffer overflow while parsing application/http-index-format content
- MFSA 2017-11/CVE-2017-5445: Uninitialized values used while parsing application/http-index-format content
- MFSA 2017-11/CVE-2017-5442: Use-after-free during style changes
- MFSA 2017-11/CVE-2017-5443: Out-of-bounds write during BinHex decoding
- MFSA 2017-11/CVE-2017-5440: Use-after-free in txExecutionState destructor during XSLT processing
- MFSA 2017-11/CVE-2017-5441: Use-after-free with selection during scroll events
- MFSA 2017-11/CVE-2017-5459: Buffer overflow in WebGL

Mozilla NSS was updated to 3.29.5, bringing new features and fixing bugs:

- Update to NSS 3.29.5:
  * MFSA 2017-11/CVE-2017-5461: Rare crashes in the base 64 decoder and encoder were fixed.
  * MFSA 2017-11/CVE-2017-5462: A carry over bug in the RNG was fixed.
  * CVE-2016-9574: Remote DoS during session handshake when using SessionTicket extention and ECDHE-ECDSA (bsc#1015499).
  * requires NSPR &gt;= 4.13.1

- Update to NSS 3.29.3

  * enables TLS 1.3 by default

- Fixed a bug in hash computation (and build with
  GCC 7 which complains about shifts of boolean values).
  (bsc#1030071, bmo#1348767)

- Update to NSS 3.28.3

  This is a patch release to fix binary compatibility issues.

- Update to NSS 3.28.1

  This is a patch release to update the list of root CA certificates.

  * The following CA certificates were Removed

    CN = Buypass Class 2 CA 1
    CN = Root CA Generalitat Valenciana
    OU = RSA Security 2048 V3

  * The following CA certificates were Added

    OU = AC RAIZ FNMT-RCM
    CN = Amazon Root CA 1
    CN = Amazon Root CA 2
    CN = Amazon Root CA 3
    CN = Amazon Root CA 4
    CN = LuxTrust Global Root 2
    CN = Symantec Class 1 Public Primary Certification Authority - G4
    CN = Symantec Class 1 Public Primary Certification Authority - G6
    CN = Symantec Class 2 Public Primary Certification Authority - G4
    CN = Symantec Class 2 Public Primary Certification Authority - G6

  * The version number of the updated root CA list has been set to 2.11

- Update to NSS 3.28

  New functionality:

  * NSS includes support for TLS 1.3 draft -18. This includes a number
    of improvements to TLS 1.3:

    - The signed certificate timestamp, used in certificate
      transparency, is supported in TLS 1.3.
    - Key exporters for TLS 1.3 are supported. This includes the early
      key exporter, which can be used if 0-RTT is enabled. Note that
      there is a difference between TLS 1.3 and key exporters in older
      versions of TLS. TLS 1.3 does not distinguish between an empty
      context and no context.
    - The TLS 1.3 (draft) protocol can be enabled, by defining
      NSS_ENABLE_TLS_1_3=1 when building NSS.
    - NSS includes support for the X25519 key exchange algorithm,
      which is supported and enabled by default in all versions of TLS.

  Notable Changes:

  * NSS can no longer be compiled with support for additional elliptic curves.
    This was previously possible by replacing certain NSS source files.
  * NSS will now detect the presence of tokens that support additional
    elliptic curves and enable those curves for use in TLS.
    Note that this detection has a one-off performance cost, which can be
    avoided by using the SSL_NamedGroupConfig function to limit supported
    groups to those that NSS provides.
  * PKCS#11 bypass for TLS is no longer supported and has been removed.
  * Support for 'export' grade SSL/TLS cipher suites has been removed.
  * NSS now uses the signature schemes definition in TLS 1.3.
    This also affects TLS 1.2. NSS will now only generate signatures with the
    combinations of hash and signature scheme that are defined in TLS 1.3,
    even when negotiating TLS 1.2.

    - This means that SHA-256 will only be used with P-256 ECDSA certificates,
      SHA-384 with P-384 certificates, and SHA-512 with P-521 certificates.
      SHA-1 is permitted (in TLS 1.2 only) with any certificate for backward
      compatibility reasons.
    - NSS will now no longer assume that default signature schemes are
      supported by a peer if there was no commonly supported signature scheme.

  * NSS will now check if RSA-PSS signing is supported by the token that holds
    the private key prior to using it for TLS.
  * The certificate validation code contains checks to no longer trust
    certificates that are issued by old WoSign and StartCom CAs after
    October 21, 2016. This is equivalent to the behavior that Mozilla will
    release with Firefox 51.

- Update to NSS 3.27.2
  * Fixed SSL_SetTrustAnchors leaks (bmo#1318561)

  - raised the minimum softokn/freebl version to 3.28 as reported in (boo#1021636)

- Update to NSS 3.26.2

  New Functionality:

  * the selfserv test utility has been enhanced to support ALPN
    (HTTP/1.1) and 0-RTT
  * added support for the System-wide crypto policy available on
    Fedora Linux see http://fedoraproject.org/wiki/Changes/CryptoPolicy
  * introduced build flag NSS_DISABLE_LIBPKIX that allows compilation
    of NSS without the libpkix library

  Notable Changes:

  * The following CA certificate was Added
    CN = ISRG Root X1
  * NPN is disabled and ALPN is enabled by default
  * the NSS test suite now completes with the experimental TLS 1.3
    code enabled
  * several test improvements and additions, including a NIST known answer test

  Changes in 3.26.2
  * MD5 signature algorithms sent by the server in CertificateRequest
    messages are now properly ignored. Previously, with rare server
    configurations, an MD5 signature algorithm might have been selected
    for client authentication and caused the client to abort the
    connection soon after.

- Update to NSS 3.25

  New functionality:

  * Implemented DHE key agreement for TLS 1.3
  * Added support for ChaCha with TLS 1.3
  * Added support for TLS 1.2 ciphersuites that use SHA384 as the PRF
  * In previous versions, when using client authentication with TLS 1.2,
    NSS only supported certificate_verify messages that used the same
    signature hash algorithm as used by the PRF. This limitation has
    been removed.

  Notable changes:

  * An SSL socket can no longer be configured to allow both TLS 1.3 and SSLv3
  * Regression fix: NSS no longer reports a failure if an application
    attempts to disable the SSLv2 protocol.
  * The list of trusted CA certificates has been updated to version 2.8
  * The following CA certificate was Removed
    Sonera Class1 CA
  * The following CA certificates were Added
    Hellenic Academic and Research Institutions RootCA 2015
    Hellenic Academic and Research Institutions ECC RootCA 2015
    Certplus Root CA G1
    Certplus Root CA G2
    OpenTrust Root CA G1
    OpenTrust Root CA G2
    OpenTrust Root CA G3

- Update to NSS 3.24

  New functionality:

  * NSS softoken has been updated with the latest National Institute
    of Standards and Technology (NIST) guidance (as of 2015):
    - Software integrity checks and POST functions are executed on
      shared library load. These checks have been disabled by default,
      as they can cause a performance regression. To enable these
      checks, you must define symbol NSS_FORCE_FIPS when building NSS.
    - Counter mode and Galois/Counter Mode (GCM) have checks to
      prevent counter overflow.
    - Additional CSPs are zeroed in the code.
    - NSS softoken uses new guidance for how many Rabin-Miller tests
      are needed to verify a prime based on prime size.
  * NSS softoken has also been updated to allow NSS to run in FIPS
    Level 1 (no password). This mode is triggered by setting the
    database password to the empty string. In FIPS mode, you may move
    from Level 1 to Level 2 (by setting an appropriate password),
    but not the reverse.
  * A SSL_ConfigServerCert function has been added for configuring
    SSL/TLS server sockets with a certificate and private key. Use
    this new function in place of SSL_ConfigSecureServer,
    SSL_ConfigSecureServerWithCertChain, SSL_SetStapledOCSPResponses,
    and SSL_SetSignedCertTimestamps. SSL_ConfigServerCert automatically
    determines the certificate type from the certificate and private key.
    The caller is no longer required to use SSLKEAType explicitly to
    select a 'slot' into which the certificate is configured (which
    incorrectly identifies a key agreement type rather than a certificate).
    Separate functions for configuring Online Certificate Status Protocol
    (OCSP) responses or Signed Certificate Timestamps are not needed,
    since these can be added to the optional SSLExtraServerCertData struct
    provided to SSL_ConfigServerCert.  Also, partial support for RSA
    Probabilistic Signature Scheme (RSA-PSS) certificates has been added.
    Although these certificates can be configured, they will not be
    used by NSS in this version.
  * Deprecate the member attribute authAlgorithm of type SSLCipherSuiteInfo.
    Instead, applications should use the newly added attribute authType.
  * Add a shared library (libfreeblpriv3) on Linux platforms that
    define FREEBL_LOWHASH.
  * Remove most code related to SSL v2, including the ability to actively
    send a SSLv2-compatible client hello. However, the server-side
    implementation of the SSL/TLS protocol still supports processing
    of received v2-compatible client hello messages.
  * Disable (by default) NSS support in optimized builds for logging SSL/TLS
    key material to a logfile if the SSLKEYLOGFILE environment variable
    is set. To enable the functionality in optimized builds, you must define
    the symbol NSS_ALLOW_SSLKEYLOGFILE when building NSS.
  * Update NSS to protect it against the Cachebleed attack.
  * Disable support for DTLS compression.
  * Improve support for TLS 1.3. This includes support for DTLS 1.3.
    Note that TLS 1.3 support is experimental and not suitable for
    production use.

- Update to NSS 3.23

  New functionality:

  * ChaCha20/Poly1305 cipher and TLS cipher suites now supported
  * Experimental-only support TLS 1.3 1-RTT mode (draft-11).
    This code is not ready for production use.

  Notable changes:

  * The list of TLS extensions sent in the TLS handshake has been
    reordered to increase compatibility of the Extended Master Secret
    with with servers
  * The build time environment variable NSS_ENABLE_ZLIB has been
    renamed to NSS_SSL_ENABLE_ZLIB
  * The build time environment variable NSS_DISABLE_CHACHAPOLY was
    added, which can be used to prevent compilation of the
    ChaCha20/Poly1305 code.
  * The following CA certificates were Removed

    - Staat der Nederlanden Root CA
    - NetLock Minositett Kozjegyzoi (Class QA) Tanusitvanykiado
    - NetLock Kozjegyzoi (Class A) Tanusitvanykiado
    - NetLock Uzleti (Class B) Tanusitvanykiado
    - NetLock Expressz (Class C) Tanusitvanykiado
    - VeriSign Class 1 Public PCA - G2
    - VeriSign Class 3 Public PCA
    - VeriSign Class 3 Public PCA - G2
    - CA Disig

  * The following CA certificates were Added

    + SZAFIR ROOT CA2
    + Certum Trusted Network CA 2

  * The following CA certificate had the Email trust bit turned on

    + Actalis Authentication Root CA

  Security fixes:
  * CVE-2016-2834: Memory safety bugs (boo#983639)
    MFSA-2016-61 bmo#1206283 bmo#1221620 bmo#1241034 bmo#1241037

- Update to NSS 3.22.3
  * Increase compatibility of TLS extended master secret,
    don't send an empty TLS extension last in the handshake
    (bmo#1243641)
  * Fixed a heap-based buffer overflow related to the parsing of
    certain ASN.1 structures. An attacker could create a specially-crafted
    certificate which, when parsed by NSS, would cause a crash or
    execution of arbitrary code with the permissions of the user.
    (CVE-2016-1950, bmo#1245528)

- Update to NSS 3.22.2

  New functionality:

  * RSA-PSS signatures are now supported (bmo#1215295)
  * Pseudorandom functions based on hashes other than SHA-1 are now supported
  * Enforce an External Policy on NSS from a config file (bmo#1009429)

- CVE-2016-8635: Fix for DH small subgroup confinement attack (bsc#1015547)

Mozilla NSPR was updated to version 4.13.1:

  The previously released version 4.13 had changed pipes to be
  nonblocking by default, and as a consequence, PollEvent was
  changed to not block on clear.
  The NSPR development team received reports that these changes
  caused regressions in some applications that use NSPR, and it
  has been decided to revert the changes made in NSPR 4.13.
  NSPR 4.13.1 restores the traditional behavior of pipes and
  PollEvent.

Mozilla NSPR update to version 4.13 had these changes:

- PL_strcmp (and others) were fixed to return consistent results
    when one of the arguments is NULL.
- PollEvent was fixed to not block on clear.
- Pipes are always nonblocking.
- PR_GetNameForIdentity: added thread safety lock and bound checks.
- Removed the PLArena freelist.
- Avoid some integer overflows.
- fixed several comments.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-05"/>
	<updated date="2017-05-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1015499">SUSE bug 1015499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015547">SUSE bug 1015547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021636">SUSE bug 1021636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030071">SUSE bug 1030071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983639">SUSE bug 983639</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1950">CVE-2016-1950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2834">CVE-2016-2834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8635/">CVE-2016-8635 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8635">CVE-2016-8635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9574/">CVE-2016-9574 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9574">CVE-2016-9574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5429">CVE-2017-5429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5432">CVE-2017-5432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5433">CVE-2017-5433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5434">CVE-2017-5434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5435">CVE-2017-5435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5436">CVE-2017-5436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5437/">CVE-2017-5437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5437">CVE-2017-5437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5438">CVE-2017-5438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5439">CVE-2017-5439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5440">CVE-2017-5440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5441">CVE-2017-5441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5442">CVE-2017-5442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5443">CVE-2017-5443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5444">CVE-2017-5444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5445">CVE-2017-5445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5446">CVE-2017-5446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5447">CVE-2017-5447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5448">CVE-2017-5448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5459">CVE-2017-5459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5460">CVE-2017-5460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5461">CVE-2017-5461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5462">CVE-2017-5462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5464">CVE-2017-5464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5465">CVE-2017-5465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5469">CVE-2017-5469 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570537" comment="MozillaFirefox-45.9.0esr-77.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570538" comment="MozillaFirefox-translations-45.9.0esr-77.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570539" comment="libfreebl3-3.29.5-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570540" comment="libfreebl3-32bit-3.29.5-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570541" comment="mozilla-nspr-4.13.1-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570542" comment="mozilla-nspr-32bit-4.13.1-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570543" comment="mozilla-nss-3.29.5-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570544" comment="mozilla-nss-32bit-3.29.5-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570545" comment="mozilla-nss-tools-3.29.5-37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216836" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1031485" ref_url="https://bugzilla.suse.com/1031485" source="BUGZILLA"/>
		<reference ref_id="1052829" ref_url="https://bugzilla.suse.com/1052829" source="BUGZILLA"/>
		<reference ref_id="930392" ref_url="https://bugzilla.suse.com/930392" source="BUGZILLA"/>
		<reference ref_id="930496" ref_url="https://bugzilla.suse.com/930496" source="BUGZILLA"/>
		<reference ref_id="935510" ref_url="https://bugzilla.suse.com/935510" source="BUGZILLA"/>
		<reference ref_id="939460" ref_url="https://bugzilla.suse.com/939460" source="BUGZILLA"/>
		<reference ref_id="945842" ref_url="https://bugzilla.suse.com/945842" source="BUGZILLA"/>
		<reference ref_id="953831" ref_url="https://bugzilla.suse.com/953831" source="BUGZILLA"/>
		<reference ref_id="954002" ref_url="https://bugzilla.suse.com/954002" source="BUGZILLA"/>
		<reference ref_id="955382" ref_url="https://bugzilla.suse.com/955382" source="BUGZILLA"/>
		<reference ref_id="962765" ref_url="https://bugzilla.suse.com/962765" source="BUGZILLA"/>
		<reference ref_id="964468" ref_url="https://bugzilla.suse.com/964468" source="BUGZILLA"/>
		<reference ref_id="966220" ref_url="https://bugzilla.suse.com/966220" source="BUGZILLA"/>
		<reference ref_id="968771" ref_url="https://bugzilla.suse.com/968771" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<reference ref_id="CVE-2017-7753" ref_url="https://www.suse.com/security/cve/CVE-2017-7753/" source="CVE"/>
		<reference ref_id="CVE-2017-7779" ref_url="https://www.suse.com/security/cve/CVE-2017-7779/" source="CVE"/>
		<reference ref_id="CVE-2017-7782" ref_url="https://www.suse.com/security/cve/CVE-2017-7782/" source="CVE"/>
		<reference ref_id="CVE-2017-7784" ref_url="https://www.suse.com/security/cve/CVE-2017-7784/" source="CVE"/>
		<reference ref_id="CVE-2017-7785" ref_url="https://www.suse.com/security/cve/CVE-2017-7785/" source="CVE"/>
		<reference ref_id="CVE-2017-7786" ref_url="https://www.suse.com/security/cve/CVE-2017-7786/" source="CVE"/>
		<reference ref_id="CVE-2017-7787" ref_url="https://www.suse.com/security/cve/CVE-2017-7787/" source="CVE"/>
		<reference ref_id="CVE-2017-7791" ref_url="https://www.suse.com/security/cve/CVE-2017-7791/" source="CVE"/>
		<reference ref_id="CVE-2017-7792" ref_url="https://www.suse.com/security/cve/CVE-2017-7792/" source="CVE"/>
		<reference ref_id="CVE-2017-7798" ref_url="https://www.suse.com/security/cve/CVE-2017-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-7800" ref_url="https://www.suse.com/security/cve/CVE-2017-7800/" source="CVE"/>
		<reference ref_id="CVE-2017-7801" ref_url="https://www.suse.com/security/cve/CVE-2017-7801/" source="CVE"/>
		<reference ref_id="CVE-2017-7802" ref_url="https://www.suse.com/security/cve/CVE-2017-7802/" source="CVE"/>
		<reference ref_id="CVE-2017-7803" ref_url="https://www.suse.com/security/cve/CVE-2017-7803/" source="CVE"/>
		<reference ref_id="CVE-2017-7804" ref_url="https://www.suse.com/security/cve/CVE-2017-7804/" source="CVE"/>
		<reference ref_id="CVE-2017-7807" ref_url="https://www.suse.com/security/cve/CVE-2017-7807/" source="CVE"/>
		<description>
This update for MozillaFirefox to version 52.3 ESR fixes several issues.

These security issues were fixed:

- CVE-2017-7807: Domain hijacking through AppCache fallback (bsc#1052829)
- CVE-2017-7791: Spoofing following page navigation with data: protocol and modal alerts (bsc#1052829)
- CVE-2017-7792: Buffer overflow viewing certificates with an extremely long OID (bsc#1052829)
- CVE-2017-7782: WindowsDllDetourPatcher allocates memory without DEP protections (bsc#1052829)
- CVE-2017-7787: Same-origin policy bypass with iframes through page reloads (bsc#1052829)
- CVE-2017-7786: Buffer overflow while painting non-displayable SVG (bsc#1052829)
- CVE-2017-7785: Buffer overflow manipulating ARIA attributes in DOM (bsc#1052829)
- CVE-2017-7784: Use-after-free with image observers (bsc#1052829)
- CVE-2017-7753: Out-of-bounds read with cached style data and pseudo-elements (bsc#1052829)
- CVE-2017-7798: XUL injection in the style editor in devtools (bsc#1052829)
- CVE-2017-7804: Memory protection bypass through WindowsDllDetourPatcher (bsc#1052829)
- CVE-2017-7779: Various memory safety bugs (bsc#1052829)
- CVE-2017-7800: Use-after-free in WebSockets during disconnection (bsc#1052829)
- CVE-2017-7801: Use-after-free with marquee during window resizing (bsc#1052829)
- CVE-2017-7802: Use-after-free resizing image elements (bsc#1052829)
- CVE-2017-7803: CSP containing 'sandbox' improperly applied (bsc#1052829)

This non-security issue was fixed:

- bsc#1031485: Prevent firefox from hanging after a while in FUTEX_WAIT_PRIVATE if cgroups are enabled 
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-07"/>
	<updated date="2017-09-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1031485">SUSE bug 1031485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930392">SUSE bug 930392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930496">SUSE bug 930496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935510">SUSE bug 935510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939460">SUSE bug 939460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945842">SUSE bug 945842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953831">SUSE bug 953831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954002">SUSE bug 954002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955382">SUSE bug 955382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962765">SUSE bug 962765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964468">SUSE bug 964468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966220">SUSE bug 966220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968771">SUSE bug 968771</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5276">CVE-2015-5276 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7753/">CVE-2017-7753 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7753">CVE-2017-7753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7779/">CVE-2017-7779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7779">CVE-2017-7779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7782/">CVE-2017-7782 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7782">CVE-2017-7782 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7784/">CVE-2017-7784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7784">CVE-2017-7784 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7785/">CVE-2017-7785 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7785">CVE-2017-7785 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7786/">CVE-2017-7786 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7786">CVE-2017-7786 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7787/">CVE-2017-7787 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7787">CVE-2017-7787 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7791/">CVE-2017-7791 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7791">CVE-2017-7791 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7792/">CVE-2017-7792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7792">CVE-2017-7792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7798/">CVE-2017-7798 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7798">CVE-2017-7798 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7800/">CVE-2017-7800 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7800">CVE-2017-7800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7801/">CVE-2017-7801 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7801">CVE-2017-7801 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7802/">CVE-2017-7802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7802">CVE-2017-7802 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7803/">CVE-2017-7803 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7803">CVE-2017-7803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7804/">CVE-2017-7804 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7804">CVE-2017-7804 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7807/">CVE-2017-7807 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7807">CVE-2017-7807 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570546" comment="MozillaFirefox-52.3.0esr-78.4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570547" comment="MozillaFirefox-branding-SLED-52-21.3.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570548" comment="MozillaFirefox-translations-52.3.0esr-78.4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570549" comment="firefox-libffi4-5.3.1+r233831-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570550" comment="firefox-libgcc_s1-5.3.1+r233831-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570551" comment="firefox-libstdc++6-5.3.1+r233831-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216837" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1068101" ref_url="https://bugzilla.suse.com/1068101" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7826" ref_url="https://www.suse.com/security/cve/CVE-2017-7826/" source="CVE"/>
		<reference ref_id="CVE-2017-7828" ref_url="https://www.suse.com/security/cve/CVE-2017-7828/" source="CVE"/>
		<reference ref_id="CVE-2017-7830" ref_url="https://www.suse.com/security/cve/CVE-2017-7830/" source="CVE"/>
		<description>
This update for MozillaFirefox ESR 52.5 fixes the following issues:

Security issues fixed:
- CVE-2017-7826: Memory safety bugs fixed (bsc#1068101).
- CVE-2017-7828: Use-after-free of PressShell while restyling layout (bsc#1068101).
- CVE-2017-7830: Cross-origin URL information leak through Resource Timing API (bsc#1068101).

Mozilla Foundation Security Advisory (MFSA 2017-25):
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-25/
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-01"/>
	<updated date="2017-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068101">SUSE bug 1068101</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7826/">CVE-2017-7826 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7826">CVE-2017-7826 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7828/">CVE-2017-7828 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7828">CVE-2017-7828 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7830/">CVE-2017-7830 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7830">CVE-2017-7830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570552" comment="MozillaFirefox-52.5.0esr-78.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570553" comment="MozillaFirefox-translations-52.5.0esr-78.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216838" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1077291" ref_url="https://bugzilla.suse.com/1077291" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5089" ref_url="https://www.suse.com/security/cve/CVE-2018-5089/" source="CVE"/>
		<reference ref_id="CVE-2018-5091" ref_url="https://www.suse.com/security/cve/CVE-2018-5091/" source="CVE"/>
		<reference ref_id="CVE-2018-5095" ref_url="https://www.suse.com/security/cve/CVE-2018-5095/" source="CVE"/>
		<reference ref_id="CVE-2018-5096" ref_url="https://www.suse.com/security/cve/CVE-2018-5096/" source="CVE"/>
		<reference ref_id="CVE-2018-5097" ref_url="https://www.suse.com/security/cve/CVE-2018-5097/" source="CVE"/>
		<reference ref_id="CVE-2018-5098" ref_url="https://www.suse.com/security/cve/CVE-2018-5098/" source="CVE"/>
		<reference ref_id="CVE-2018-5099" ref_url="https://www.suse.com/security/cve/CVE-2018-5099/" source="CVE"/>
		<reference ref_id="CVE-2018-5102" ref_url="https://www.suse.com/security/cve/CVE-2018-5102/" source="CVE"/>
		<reference ref_id="CVE-2018-5103" ref_url="https://www.suse.com/security/cve/CVE-2018-5103/" source="CVE"/>
		<reference ref_id="CVE-2018-5104" ref_url="https://www.suse.com/security/cve/CVE-2018-5104/" source="CVE"/>
		<reference ref_id="CVE-2018-5117" ref_url="https://www.suse.com/security/cve/CVE-2018-5117/" source="CVE"/>
		<description>
This update for MozillaFirefox to version ESR 52.6 fixes several issues.

These security issues were fixed:

- CVE-2018-5091: Use-after-free with DTMF timers (bsc#1077291).
- CVE-2018-5095: Integer overflow in Skia library during edge builder allocation (bsc#1077291).
- CVE-2018-5096: Use-after-free while editing form elements (bsc#1077291).
- CVE-2018-5097: Use-after-free when source document is manipulated during XSLT (bsc#1077291).
- CVE-2018-5098: Use-after-free while manipulating form input elements (bsc#1077291).
- CVE-2018-5099: Use-after-free with widget listener (bsc#1077291).
- CVE-2018-5102: Use-after-free in HTML media elements (bsc#1077291).
- CVE-2018-5103: Use-after-free during mouse event handling (bsc#1077291).
- CVE-2018-5104: Use-after-free during font face manipulation (bsc#1077291).
- CVE-2018-5117: URL spoofing with right-to-left text aligned left-to-right (bsc#1077291).
- CVE-2018-5089: Various memory safety bugs (bsc#1077291).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5089/">CVE-2018-5089 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5089">CVE-2018-5089 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5091/">CVE-2018-5091 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5091">CVE-2018-5091 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5095/">CVE-2018-5095 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5095">CVE-2018-5095 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5096/">CVE-2018-5096 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5096">CVE-2018-5096 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5097/">CVE-2018-5097 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5097">CVE-2018-5097 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5098/">CVE-2018-5098 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5098">CVE-2018-5098 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5099/">CVE-2018-5099 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5099">CVE-2018-5099 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5102/">CVE-2018-5102 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5102">CVE-2018-5102 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5103/">CVE-2018-5103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5103">CVE-2018-5103 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5104/">CVE-2018-5104 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5104">CVE-2018-5104 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5117/">CVE-2018-5117 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5117">CVE-2018-5117 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570554" comment="MozillaFirefox-52.6.0esr-78.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570555" comment="MozillaFirefox-translations-52.6.0esr-78.13.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216839" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1085130" ref_url="https://bugzilla.suse.com/1085130" source="BUGZILLA"/>
		<reference ref_id="1085671" ref_url="https://bugzilla.suse.com/1085671" source="BUGZILLA"/>
		<reference ref_id="1087059" ref_url="https://bugzilla.suse.com/1087059" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5125" ref_url="https://www.suse.com/security/cve/CVE-2018-5125/" source="CVE"/>
		<reference ref_id="CVE-2018-5127" ref_url="https://www.suse.com/security/cve/CVE-2018-5127/" source="CVE"/>
		<reference ref_id="CVE-2018-5129" ref_url="https://www.suse.com/security/cve/CVE-2018-5129/" source="CVE"/>
		<reference ref_id="CVE-2018-5130" ref_url="https://www.suse.com/security/cve/CVE-2018-5130/" source="CVE"/>
		<reference ref_id="CVE-2018-5131" ref_url="https://www.suse.com/security/cve/CVE-2018-5131/" source="CVE"/>
		<reference ref_id="CVE-2018-5144" ref_url="https://www.suse.com/security/cve/CVE-2018-5144/" source="CVE"/>
		<reference ref_id="CVE-2018-5145" ref_url="https://www.suse.com/security/cve/CVE-2018-5145/" source="CVE"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<reference ref_id="CVE-2018-5147" ref_url="https://www.suse.com/security/cve/CVE-2018-5147/" source="CVE"/>
		<reference ref_id="CVE-2018-5148" ref_url="https://www.suse.com/security/cve/CVE-2018-5148/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed in Firefox ESR 52.7.2 (bsc#1085130):

- CVE-2018-5125: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7
- CVE-2018-5127: Buffer overflow manipulating SVG animatedPathSegList
- CVE-2018-5129: Out-of-bounds write with malformed IPC messages
- CVE-2018-5130: Mismatched RTP payload type can trigger memory corruption
- CVE-2018-5131: Fetch API improperly returns cached copies of no-store/no-cache resources
- CVE-2018-5144: Integer overflow during Unicode conversion
- CVE-2018-5145: Memory safety bugs fixed in Firefox ESR 52.7
- CVE-2018-5146: Out of bounds memory write in libvorbis (bsc#1085671)
- CVE-2018-5147: Out of bounds memory write in libtremor (bsc#1085671)
- CVE-2018-5148: Use-after-free in compositor (MFSA 2018-10) (bsc#1087059)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085671">SUSE bug 1085671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087059">SUSE bug 1087059</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5125/">CVE-2018-5125 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5125">CVE-2018-5125 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5127/">CVE-2018-5127 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5127">CVE-2018-5127 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5129/">CVE-2018-5129 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5129">CVE-2018-5129 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5130/">CVE-2018-5130 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5130">CVE-2018-5130 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5131/">CVE-2018-5131 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5131">CVE-2018-5131 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5144/">CVE-2018-5144 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5144">CVE-2018-5144 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5145/">CVE-2018-5145 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5145">CVE-2018-5145 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5146">CVE-2018-5146 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5147/">CVE-2018-5147 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5147">CVE-2018-5147 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5148/">CVE-2018-5148 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5148">CVE-2018-5148 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570556" comment="MozillaFirefox-52.7.3esr-78.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570557" comment="MozillaFirefox-translations-52.7.3esr-78.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216840" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1092548" ref_url="https://bugzilla.suse.com/1092548" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<description>
This update for MozillaFirefox to ESR 52.8 fixes the following issues:

Update to Firefox ESR 52.8 (bsc#1092548)

Security issues fixed:

- MFSA 2018-12/CVE-2018-5159: Integer overflow and out-of-bounds write in Skia
- MFSA 2018-12/CVE-2018-5158: Malicious PDF can inject JavaScript into PDF Viewer
- MFSA 2018-12/CVE-2018-5168: Lightweight themes can be installed without user interaction
- MFSA 2018-12/CVE-2018-5150: Memory safety bugs fixed in Firefox 60 and Firefox ESR 52.8
- MFSA 2018-12/CVE-2018-5155: Use-after-free with SVG animations and text paths
- MFSA 2018-12/CVE-2018-5183: Backport critical security fixes in Skia
- MFSA 2018-12/CVE-2018-5157: Same-origin bypass of PDF Viewer to view protected PDF files
- MFSA 2018-12/CVE-2018-5154: Use-after-free with SVG animations and clip paths
- MFSA 2018-12/CVE-2018-5178: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5150">CVE-2018-5150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5154">CVE-2018-5154 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5155">CVE-2018-5155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5157">CVE-2018-5157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5158">CVE-2018-5158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5159">CVE-2018-5159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5168">CVE-2018-5168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5174">CVE-2018-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5178">CVE-2018-5178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5183">CVE-2018-5183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570558" comment="MozillaFirefox-52.8.0esr-78.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570559" comment="MozillaFirefox-translations-52.8.0esr-78.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216841" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1096449" ref_url="https://bugzilla.suse.com/1096449" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6126" ref_url="https://www.suse.com/security/cve/CVE-2018-6126/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following security issue:

- CVE-2018-6126: Prevent heap buffer overflow in rasterizing paths in SVG with Skia (bsc#1096449).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-13"/>
	<updated date="2018-06-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096449">SUSE bug 1096449</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6126/">CVE-2018-6126 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6126">CVE-2018-6126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570560" comment="MozillaFirefox-52.8.1esr-78.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570561" comment="MozillaFirefox-translations-52.8.1esr-78.29.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216842" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1098998" ref_url="https://bugzilla.suse.com/1098998" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359/" source="CVE"/>
		<reference ref_id="CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360/" source="CVE"/>
		<reference ref_id="CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362/" source="CVE"/>
		<reference ref_id="CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363/" source="CVE"/>
		<reference ref_id="CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364/" source="CVE"/>
		<reference ref_id="CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365/" source="CVE"/>
		<reference ref_id="CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366/" source="CVE"/>
		<reference ref_id="CVE-2018-12368" ref_url="https://www.suse.com/security/cve/CVE-2018-12368/" source="CVE"/>
		<reference ref_id="CVE-2018-5156" ref_url="https://www.suse.com/security/cve/CVE-2018-5156/" source="CVE"/>
		<reference ref_id="CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188/" source="CVE"/>
		<description>
This update for MozillaFirefox to version ESR 52.9 fixes the following issues:

- CVE-2018-5188: Various memory safety bugs (bsc#1098998)
- CVE-2018-12368: No warning when opening executable SettingContent-ms files
- CVE-2018-12366: Invalid data handling during QCMS transformations
- CVE-2018-12365: Compromised IPC child process can list local filenames
- CVE-2018-12364: CSRF attacks through 307 redirects and NPAPI plugins
- CVE-2018-12363: Use-after-free when appending DOM nodes
- CVE-2018-12362: Integer overflow in SSSE3 scaler
- CVE-2018-12360: Use-after-free when using focus()
- CVE-2018-5156: Media recorder segmentation fault when track type is changed during capture
- CVE-2018-12359: Buffer overflow using computed size of canvas element
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12359">CVE-2018-12359 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12360">CVE-2018-12360 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12362">CVE-2018-12362 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12363">CVE-2018-12363 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12364">CVE-2018-12364 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12365">CVE-2018-12365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12366">CVE-2018-12366 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12368/">CVE-2018-12368 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12368">CVE-2018-12368 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5156/">CVE-2018-5156 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5156">CVE-2018-5156 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5188">CVE-2018-5188 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570562" comment="MozillaFirefox-52.9.0esr-78.32.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570563" comment="MozillaFirefox-translations-52.9.0esr-78.32.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216843" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1137792" ref_url="https://bugzilla.suse.com/1137792" source="BUGZILLA"/>
		<reference ref_id="1138614" ref_url="https://bugzilla.suse.com/1138614" source="BUGZILLA"/>
		<reference ref_id="1138872" ref_url="https://bugzilla.suse.com/1138872" source="BUGZILLA"/>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11707" ref_url="https://www.suse.com/security/cve/CVE-2019-11707/" source="CVE"/>
		<reference ref_id="CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708/" source="CVE"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<description>
This update for MozillaFirefox to version ESR 60.8 fixes the following issues:

Security issues fixed:

- CVE-2019-9811: Sandbox escape via installation of malicious language pack (bsc#1140868).
- CVE-2019-11711: Script injection within domain through inner window reuse (bsc#1140868).
- CVE-2019-11712: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects (bsc#1140868).
- CVE-2019-11713: Use-after-free with HTTP/2 cached stream (bsc#1140868).
- CVE-2019-11729: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (bsc#1140868).
- CVE-2019-11715: HTML parsing error can contribute to content XSS (bsc#1140868).
- CVE-2019-11717: Caret character improperly escaped in origins (bsc#1140868).
- CVE-2019-11719: Out-of-bounds read when importing curve25519 private key (bsc#1140868).
- CVE-2019-11730: Same-origin policy treats all files in a directory as having the same-origin (bsc#1140868).
- CVE-2019-11709: Multiple Memory safety bugs fixed (bsc#1140868).
- CVE-2019-11708: Fix sandbox escape using Prompt:Open (bsc#1138872).
- CVE-2019-11707: Fixed a type confusion vulnerability in Arrary.pop (bsc#1138614)    

Non-security issues fixed:

- Fix broken language plugins (bsc#1137792)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-17"/>
	<updated date="2019-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137792">SUSE bug 1137792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138614">SUSE bug 1138614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138872">SUSE bug 1138872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11707/">CVE-2019-11707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11707">CVE-2019-11707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11708">CVE-2019-11708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11709">CVE-2019-11709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11711">CVE-2019-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11712">CVE-2019-11712 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11713">CVE-2019-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11715">CVE-2019-11715 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11717">CVE-2019-11717 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11719">CVE-2019-11719 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11729">CVE-2019-11729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11730">CVE-2019-11730 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9811">CVE-2019-9811 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570564" comment="MozillaFirefox-60.8.0esr-78.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570565" comment="MozillaFirefox-translations-common-60.8.0esr-78.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570566" comment="MozillaFirefox-translations-other-60.8.0esr-78.43.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216844" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1158328" ref_url="https://bugzilla.suse.com/1158328" source="BUGZILLA"/>
		<reference ref_id="1158527" ref_url="https://bugzilla.suse.com/1158527" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-13722" ref_url="https://www.suse.com/security/cve/CVE-2019-13722/" source="CVE"/>
		<reference ref_id="CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005/" source="CVE"/>
		<reference ref_id="CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008/" source="CVE"/>
		<reference ref_id="CVE-2019-17009" ref_url="https://www.suse.com/security/cve/CVE-2019-17009/" source="CVE"/>
		<reference ref_id="CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010/" source="CVE"/>
		<reference ref_id="CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011/" source="CVE"/>
		<reference ref_id="CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012/" source="CVE"/>
		<description>
This update for MozillaFirefox, mozilla-nspr, mozilla-nss fixes the following issues:

Update Firefox Extended Support Release to 68.3.0 ESR (MFSA 2019-37 / bsc#1158328)

Security issues fixed:

- CVE-2019-17008: Use-after-free in worker destruction (bmo#1546331).
- CVE-2019-13722: Stack corruption due to incorrect number of arguments in WebRTC code (bmo#1580156).
- CVE-2019-11745: Out of bounds write in NSS when encrypting with a block cipher (bmo#1586176).
- CVE-2019-17009: Updater temporary files accessible to unprivileged processes (bmo#1510494).
- CVE-2019-17010: Use-after-free when performing device orientation checks (bmo#1581084).
- CVE-2019-17005: Buffer overflow in plain text serializer (bmo#1584170).
- CVE-2019-17011: Use-after-free when retrieving a document in antitracking (bmo#1591334).
- CVE-2019-17012: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3 (bmo#1449736, bmo#1533957, bmo#1560667, bmo#1567209, bmo#1580288, bmo#1585760, bmo#1592502).

Update mozilla-nss to version 3.47.1 (bsc#1158527):

Security issues fixed:

- CVE-2019-11745: EncryptUpdate should use maxout, not block size.

Bug fixes:

- Fix a crash that could be caused by client certificates during startup (bmo#1590495, bsc#1158527)
- Fix compile-time warnings from uninitialized variables in a perl script (bmo#1589810)
- Support AES HW acceleration on ARMv8 (bmo#1152625)
- Allow per-socket run-time ordering of the cipher suites presented in ClientHello (bmo#1267894)
- Add CMAC to FreeBL and PKCS #11 libraries (bmo#1570501)
- Remove arbitrary HKDF output limit by allocating space as needed (bmo#1577953)

Update mozilla-nspr to version 4.23:

Bug fixes:

- fixed a build failure that was introduced in 4.22
- correctness fix for Win64 socket polling
- whitespace in C files was cleaned up and no longer uses tab characters for indenting
- added support for the ARC architecture
- removed support for the following platforms: OSF1/Tru64, DGUX, IRIX, Symbian, BeOS
- correctness and build fixes
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-20"/>
	<updated date="2019-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158527">SUSE bug 1158527</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11745">CVE-2019-11745 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13722/">CVE-2019-13722 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13722">CVE-2019-13722 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17005">CVE-2019-17005 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17008">CVE-2019-17008 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17009/">CVE-2019-17009 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17009">CVE-2019-17009 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17010">CVE-2019-17010 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17011">CVE-2019-17011 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17012">CVE-2019-17012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570567" comment="MozillaFirefox-68.3.0-78.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570568" comment="MozillaFirefox-translations-common-68.3.0-78.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570569" comment="MozillaFirefox-translations-other-68.3.0-78.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570570" comment="libfreebl3-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570571" comment="libfreebl3-32bit-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570572" comment="libsoftokn3-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570573" comment="libsoftokn3-32bit-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570574" comment="mozilla-nspr-4.23-29.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570575" comment="mozilla-nspr-32bit-4.23-29.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570576" comment="mozilla-nss-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570577" comment="mozilla-nss-32bit-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570578" comment="mozilla-nss-certs-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570579" comment="mozilla-nss-certs-32bit-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570580" comment="mozilla-nss-tools-3.47.1-38.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216845" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1160305" ref_url="https://bugzilla.suse.com/1160305" source="BUGZILLA"/>
		<reference ref_id="1160498" ref_url="https://bugzilla.suse.com/1160498" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17015" ref_url="https://www.suse.com/security/cve/CVE-2019-17015/" source="CVE"/>
		<reference ref_id="CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016/" source="CVE"/>
		<reference ref_id="CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017/" source="CVE"/>
		<reference ref_id="CVE-2019-17021" ref_url="https://www.suse.com/security/cve/CVE-2019-17021/" source="CVE"/>
		<reference ref_id="CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022/" source="CVE"/>
		<reference ref_id="CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024/" source="CVE"/>
		<reference ref_id="CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-03 (bsc#1160498)
  * CVE-2019-17026 (bmo#1607443)
    IonMonkey type confusion with StoreElementHole and
    FallibleStoreElement 

- Firefox Extended Support Release 68.4.0 ESR
  * Fixed: Various security fixes
  MFSA 2020-02 (bsc#1160305)
  * CVE-2019-17015 (bmo#1599005)
    Memory corruption in parent process during new content
    process initialization on Windows
  * CVE-2019-17016 (bmo#1599181)
    Bypass of @namespace CSS sanitization during pasting
  * CVE-2019-17017 (bmo#1603055)
    Type Confusion in XPCVariant.cpp
  * CVE-2019-17021 (bmo#1599008)
    Heap address disclosure in parent process during content
    process initialization on Windows
  * CVE-2019-17022 (bmo#1602843)
    CSS sanitization does not escape HTML tags
  * CVE-2019-17024 (bmo#1507180, bmo#1595470, bmo#1598605,
    bmo#1601826)
    Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-10"/>
	<updated date="2020-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160498">SUSE bug 1160498</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17015/">CVE-2019-17015 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17015">CVE-2019-17015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17016">CVE-2019-17016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17017">CVE-2019-17017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17021/">CVE-2019-17021 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17021">CVE-2019-17021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17022">CVE-2019-17022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17024">CVE-2019-17024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17026">CVE-2019-17026 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570581" comment="MozillaFirefox-68.4.1-78.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570582" comment="MozillaFirefox-translations-common-68.4.1-78.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570583" comment="MozillaFirefox-translations-other-68.4.1-78.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216846" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1161799" ref_url="https://bugzilla.suse.com/1161799" source="BUGZILLA"/>
		<reference ref_id="1163368" ref_url="https://bugzilla.suse.com/1163368" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6796" ref_url="https://www.suse.com/security/cve/CVE-2020-6796/" source="CVE"/>
		<reference ref_id="CVE-2020-6797" ref_url="https://www.suse.com/security/cve/CVE-2020-6797/" source="CVE"/>
		<reference ref_id="CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798/" source="CVE"/>
		<reference ref_id="CVE-2020-6799" ref_url="https://www.suse.com/security/cve/CVE-2020-6799/" source="CVE"/>
		<reference ref_id="CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox was updated to version 68.5.0 ESR (bsc#1163368).


Security issues fixed:

- CVE-2020-6796: Fixed a missing bounds check on shared memory in the parent process (bsc#1163368).
- CVE-2020-6798: Fixed a JavaScript code injection issue caused by the incorrect parsing of template tags (bsc#1163368).
- CVE-2020-6799: Fixed a local arbitrary code execution issue when handling PDF links from other applications (bsc#1163368).
- CVE-2020-6800: Fixed several memory safety bugs (bsc#1163368).


Non-security issues fixed:

- Fixed various issues opening files with spaces in their path (bmo#1601905, bmo#1602726).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-24"/>
	<updated date="2020-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1161799">SUSE bug 1161799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6796/">CVE-2020-6796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6796">CVE-2020-6796 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6797/">CVE-2020-6797 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6797">CVE-2020-6797 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6798">CVE-2020-6798 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6799/">CVE-2020-6799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6799">CVE-2020-6799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6800">CVE-2020-6800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570584" comment="MozillaFirefox-68.5.0-78.61.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570585" comment="MozillaFirefox-translations-common-68.5.0-78.61.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570586" comment="MozillaFirefox-translations-other-68.5.0-78.61.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216847" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1132665" ref_url="https://bugzilla.suse.com/1132665" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805/" source="CVE"/>
		<reference ref_id="CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806/" source="CVE"/>
		<reference ref_id="CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807/" source="CVE"/>
		<reference ref_id="CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811/" source="CVE"/>
		<reference ref_id="CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812/" source="CVE"/>
		<reference ref_id="CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

MozillaFirefox was updated to 68.6.0 ESR (MFSA 2020-09 bsc#1132665)

- CVE-2020-6805: Fixed a use-after-free when removing data about origins
- CVE-2020-6806: Fixed improper protections against state confusion
- CVE-2020-6807: Fixed a use-after-free in cubeb during stream destruction
- CVE-2020-6811: Fixed an issue where copy as cURL' feature did not fully
  escape website-controlled data potentially leading to command injection
- CVE-2019-20503: Fixed out of bounds reads in sctp_load_addresses_from_init
- CVE-2020-6812: Fixed an issue where the names of AirPods with personally
  identifiable information were exposed to websites with camera or microphone
  permission
- CVE-2020-6814: Fixed multiple memory safety bugs
- Fixed an issue with minimizing a window (bsc#1132665).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-12"/>
	<updated date="2020-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132665">SUSE bug 1132665</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20503">CVE-2019-20503 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6805">CVE-2020-6805 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6806">CVE-2020-6806 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6807">CVE-2020-6807 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6811">CVE-2020-6811 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6812">CVE-2020-6812 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6814">CVE-2020-6814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570587" comment="MozillaFirefox-68.6.0-78.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570588" comment="MozillaFirefox-translations-common-68.6.0-78.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570589" comment="MozillaFirefox-translations-other-68.6.0-78.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216848" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1168630" ref_url="https://bugzilla.suse.com/1168630" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819/" source="CVE"/>
		<reference ref_id="CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.6.1 ESR
  MFSA 2020-11 (bsc#1168630)
  * CVE-2020-6819 (bmo#1620818)
    Use-after-free while running the nsDocShell destructor
  * CVE-2020-6820 (bmo#1626728)
    Use-after-free when handling a ReadableStream
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-07"/>
	<updated date="2020-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6819">CVE-2020-6819 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6820">CVE-2020-6820 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570590" comment="MozillaFirefox-68.6.1-78.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570591" comment="MozillaFirefox-translations-common-68.6.1-78.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570592" comment="MozillaFirefox-translations-other-68.6.1-78.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216849" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1168874" ref_url="https://bugzilla.suse.com/1168874" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821/" source="CVE"/>
		<reference ref_id="CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822/" source="CVE"/>
		<reference ref_id="CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825/" source="CVE"/>
		<reference ref_id="CVE-2020-6827" ref_url="https://www.suse.com/security/cve/CVE-2020-6827/" source="CVE"/>
		<reference ref_id="CVE-2020-6828" ref_url="https://www.suse.com/security/cve/CVE-2020-6828/" source="CVE"/>
		<description>
This update for MozillaFirefox to version 68.7.0 ESR fixes the following issues:

- CVE-2020-6821: Uninitialized memory could be read when using the WebGL copyTexSubImage method (bsc#1168874).
- CVE-2020-6822: Fixed out of bounds write in GMPDecodeData when processing large images (bsc#1168874).
- CVE-2020-6825: Fixed Memory safety bugs (bsc#1168874).
- CVE-2020-6827: Custom Tabs could have the URI spoofed (bsc#1168874).
- CVE-2020-6828: Preference overwrite via crafted Intent (bsc#1168874).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-09"/>
	<updated date="2020-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6821">CVE-2020-6821 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6822">CVE-2020-6822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6825">CVE-2020-6825 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6827/">CVE-2020-6827 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6827">CVE-2020-6827 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6828/">CVE-2020-6828 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6828">CVE-2020-6828 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570593" comment="MozillaFirefox-68.7.0-78.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570594" comment="MozillaFirefox-translations-common-68.7.0-78.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570595" comment="MozillaFirefox-translations-other-68.7.0-78.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216850" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1162828" ref_url="https://bugzilla.suse.com/1162828" source="BUGZILLA"/>
		<reference ref_id="1171186" ref_url="https://bugzilla.suse.com/1171186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-12388" ref_url="https://www.suse.com/security/cve/CVE-2020-12388/" source="CVE"/>
		<reference ref_id="CVE-2020-12389" ref_url="https://www.suse.com/security/cve/CVE-2020-12389/" source="CVE"/>
		<reference ref_id="CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392/" source="CVE"/>
		<reference ref_id="CVE-2020-12393" ref_url="https://www.suse.com/security/cve/CVE-2020-12393/" source="CVE"/>
		<reference ref_id="CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:


- Firefox Extended Support Release 68.8.0 ESR
  MFSA 2020-17 (bsc#1171186)
  * CVE-2020-12387 (bmo#1545345)
    Use-after-free during worker shutdown
  * CVE-2020-12388 (bmo#1618911)
    Sandbox escape with improperly guarded Access Tokens
  * CVE-2020-12389 (bmo#1554110)
    Sandbox escape with improperly separated process types
  * CVE-2020-6831 (bmo#1632241)
    Buffer overflow in SCTP chunk input validation
  * CVE-2020-12392 (bmo#1614468)
    Arbitrary local file access with 'Copy as cURL'
  * CVE-2020-12393 (bmo#1615471)
    Devtools' 'Copy as cURL' feature did not fully escape
    website-controlled data, potentially leading to command
    injection
  * CVE-2020-12395 (bmo#1595886, bmo#1611482, bmo#1614704,
    bmo#1624098, bmo#1625749, bmo#1626382, bmo#1628076,
    bmo#1631508)
    Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8

- Since firefox-gcc8 now has disabled autoreqprov for firefox-libstdc++6
  and firefox-libgcc_s1, those packages don't provide some capabilities,
  we have to disable AutoReqProv in MozillaFirefox too so they're not added as
  automatic requirements. (bsc#1162828)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-08"/>
	<updated date="2020-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162828">SUSE bug 1162828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12387">CVE-2020-12387 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12388/">CVE-2020-12388 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12388">CVE-2020-12388 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12389/">CVE-2020-12389 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12389">CVE-2020-12389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12392">CVE-2020-12392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12393/">CVE-2020-12393 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12393">CVE-2020-12393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12395">CVE-2020-12395 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6831">CVE-2020-6831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570596" comment="MozillaFirefox-68.8.0-78.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570597" comment="MozillaFirefox-translations-common-68.8.0-78.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570598" comment="MozillaFirefox-translations-other-68.8.0-78.73.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216851" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1172402" ref_url="https://bugzilla.suse.com/1172402" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405/" source="CVE"/>
		<reference ref_id="CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406/" source="CVE"/>
		<reference ref_id="CVE-2020-12410" ref_url="https://www.suse.com/security/cve/CVE-2020-12410/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- MozillaFirefox was updated to version 68.9.0 Extended Support Release (bsc#1172402).

- CVE-2020-12405: Fixed a use-after-free in SharedWorkerService. 
- CVE-2020-12406: Fixed a JavaScript Type confusion with NativeTypes.
- CVE-2020-12410: Fixed multiple memory safety bugs.	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12405">CVE-2020-12405 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12406">CVE-2020-12406 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12410/">CVE-2020-12410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12410">CVE-2020-12410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570599" comment="MozillaFirefox-68.9.0-78.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570600" comment="MozillaFirefox-translations-common-68.9.0-78.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570601" comment="MozillaFirefox-translations-other-68.9.0-78.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216852" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1166238" ref_url="https://bugzilla.suse.com/1166238" source="BUGZILLA"/>
		<reference ref_id="1167231" ref_url="https://bugzilla.suse.com/1167231" source="BUGZILLA"/>
		<reference ref_id="1173576" ref_url="https://bugzilla.suse.com/1173576" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="CVE-2020-12415" ref_url="https://www.suse.com/security/cve/CVE-2020-12415/" source="CVE"/>
		<reference ref_id="CVE-2020-12416" ref_url="https://www.suse.com/security/cve/CVE-2020-12416/" source="CVE"/>
		<reference ref_id="CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417/" source="CVE"/>
		<reference ref_id="CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419/" source="CVE"/>
		<reference ref_id="CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421/" source="CVE"/>
		<reference ref_id="CVE-2020-12422" ref_url="https://www.suse.com/security/cve/CVE-2020-12422/" source="CVE"/>
		<reference ref_id="CVE-2020-12423" ref_url="https://www.suse.com/security/cve/CVE-2020-12423/" source="CVE"/>
		<reference ref_id="CVE-2020-12424" ref_url="https://www.suse.com/security/cve/CVE-2020-12424/" source="CVE"/>
		<reference ref_id="CVE-2020-12425" ref_url="https://www.suse.com/security/cve/CVE-2020-12425/" source="CVE"/>
		<reference ref_id="CVE-2020-12426" ref_url="https://www.suse.com/security/cve/CVE-2020-12426/" source="CVE"/>
		<description>
This update for MozillaFirefox to version 78.0.1 ESR fixes the following issues:

Security issues fixed:

- CVE-2020-12415: AppCache manifest poisoning due to url encoded character processing (bsc#1173576).
- CVE-2020-12416: Use-after-free in WebRTC VideoBroadcaster (bsc#1173576).
- CVE-2020-12417: Memory corruption due to missing sign-extension for ValueTags on ARM64 (bsc#1173576).
- CVE-2020-12418: Information disclosure due to manipulated URL object (bsc#1173576).
- CVE-2020-12419: Use-after-free in nsGlobalWindowInner (bsc#1173576).
- CVE-2020-12420: Use-After-Free when trying to connect to a STUN server (bsc#1173576).
- CVE-2020-12402: RSA Key Generation vulnerable to side-channel attack (bsc#1173576).
- CVE-2020-12421: Add-On updates did not respect the same certificate trust rules as software updates (bsc#1173576).
- CVE-2020-12422: Integer overflow in nsJPEGEncoder::emptyOutputBuffer (bsc#1173576).
- CVE-2020-12423: DLL Hijacking due to searching %PATH% for a library (bsc#1173576).
- CVE-2020-12424: WebRTC permission prompt could have been bypassed by a compromised content process (bsc#1173576).
- CVE-2020-12425: Out of bound read in Date.parse() (bsc#1173576).
- CVE-2020-12426: Memory safety bugs fixed in Firefox 78 (bsc#1173576).
- FIPS: MozillaFirefox: allow /proc/sys/crypto/fips_enabled (bsc#1167231).

Non-security issues fixed:

- Fixed interaction with freetype6 (bsc#1173613).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-08"/>
	<updated date="2020-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167231">SUSE bug 1167231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12402">CVE-2020-12402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12415/">CVE-2020-12415 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12415">CVE-2020-12415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12416/">CVE-2020-12416 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12416">CVE-2020-12416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12417">CVE-2020-12417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12418">CVE-2020-12418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12419">CVE-2020-12419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12420">CVE-2020-12420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12421">CVE-2020-12421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12422/">CVE-2020-12422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12422">CVE-2020-12422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12423/">CVE-2020-12423 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12423">CVE-2020-12423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12424/">CVE-2020-12424 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12424">CVE-2020-12424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12425/">CVE-2020-12425 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12425">CVE-2020-12425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12426/">CVE-2020-12426 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12426">CVE-2020-12426 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570602" comment="MozillaFirefox-78.0.1-78.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570603" comment="MozillaFirefox-branding-SLED-78-21.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570604" comment="MozillaFirefox-translations-common-78.0.1-78.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570605" comment="MozillaFirefox-translations-other-78.0.1-78.80.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216853" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1173948" ref_url="https://bugzilla.suse.com/1173948" source="BUGZILLA"/>
		<reference ref_id="1173991" ref_url="https://bugzilla.suse.com/1173991" source="BUGZILLA"/>
		<reference ref_id="1174538" ref_url="https://bugzilla.suse.com/1174538" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652/" source="CVE"/>
		<reference ref_id="CVE-2020-15653" ref_url="https://www.suse.com/security/cve/CVE-2020-15653/" source="CVE"/>
		<reference ref_id="CVE-2020-15654" ref_url="https://www.suse.com/security/cve/CVE-2020-15654/" source="CVE"/>
		<reference ref_id="CVE-2020-15655" ref_url="https://www.suse.com/security/cve/CVE-2020-15655/" source="CVE"/>
		<reference ref_id="CVE-2020-15656" ref_url="https://www.suse.com/security/cve/CVE-2020-15656/" source="CVE"/>
		<reference ref_id="CVE-2020-15657" ref_url="https://www.suse.com/security/cve/CVE-2020-15657/" source="CVE"/>
		<reference ref_id="CVE-2020-15658" ref_url="https://www.suse.com/security/cve/CVE-2020-15658/" source="CVE"/>
		<reference ref_id="CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Fix broken translation-loading (boo#1173991) 
  * allow addon sideloading
  * mark signatures for langpacks non-mandatory
  * do not autodisable user profile scopes
- Google API key is not usable for geolocation service any more

- Mozilla Firefox 78.1 ESR
  * Fixed: Various stability, functionality, and security fixe
    (MFSA 2020-32) (bsc#1174538).
  * CVE-2020-15652 (bmo#1634872)
    Potential leak of redirect targets when loading scripts in a
    worker
  * CVE-2020-6514 (bmo#1642792)
    WebRTC data channel leaks internal address to peer
  * CVE-2020-15655 (bmo#1645204)
    Extension APIs could be used to bypass Same-Origin Policy
  * CVE-2020-15653 (bmo#1521542)
    Bypassing iframe sandbox when allowing popups
  * CVE-2020-6463 (bmo#1635293)
    Use-after-free in ANGLE gl::Texture::onUnbindAsSamplerTexture
  * CVE-2020-15656 (bmo#1647293)
    Type confusion for special arguments in IonMonkey
  * CVE-2020-15658 (bmo#1637745)
    Overriding file type when saving to disk
  * CVE-2020-15657 (bmo#1644954)
    DLL hijacking due to incorrect loading path
  * CVE-2020-15654 (bmo#1648333)
    Custom cursor can overlay user interface
  * CVE-2020-15659 (bmo#1550133, bmo#1633880, bmo#1643613,
    bmo#1644839, bmo#1645835, bmo#1646006, bmo#1646787,
    bmo#1649347, bmo#1650811, bmo#1651678)
    Memory safety bugs fixed in Firefox 79 and Firefox ESR 78.1

- Add sle11-icu-generation-python3.patch to fix icu-generation
  on big endian platforms 

- Mozilla Firefox 78.0.2 ESR
  * MFSA 2020-28 (bsc#1173948)
  * MFSA-2020-0003 (bmo#1644076)
    X-Frame-Options bypass using object or embed tags
  * Fixed: Fixed an accessibility regression in reader mode
    (bmo#1650922)
  * Fixed: Made the address bar more resilient to data corruption
    in the user profile (bmo#1649981)
  * Fixed: Fixed a regression opening certain external
    applications (bmo#1650162)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-18"/>
	<updated date="2020-08-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173948">SUSE bug 1173948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173991">SUSE bug 1173991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15652">CVE-2020-15652 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15653/">CVE-2020-15653 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15653">CVE-2020-15653 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15654/">CVE-2020-15654 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15654">CVE-2020-15654 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15655/">CVE-2020-15655 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15655">CVE-2020-15655 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15656/">CVE-2020-15656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15656">CVE-2020-15656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15657/">CVE-2020-15657 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15657">CVE-2020-15657 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15658/">CVE-2020-15658 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15658">CVE-2020-15658 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15659">CVE-2020-15659 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6463">CVE-2020-6463 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6514">CVE-2020-6514 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570606" comment="MozillaFirefox-78.1.0-78.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570607" comment="MozillaFirefox-translations-common-78.1.0-78.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570608" comment="MozillaFirefox-translations-other-78.1.0-78.87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216854" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1174284" ref_url="https://bugzilla.suse.com/1174284" source="BUGZILLA"/>
		<reference ref_id="1175686" ref_url="https://bugzilla.suse.com/1175686" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15663" ref_url="https://www.suse.com/security/cve/CVE-2020-15663/" source="CVE"/>
		<reference ref_id="CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664/" source="CVE"/>
		<reference ref_id="CVE-2020-15670" ref_url="https://www.suse.com/security/cve/CVE-2020-15670/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.2.0 ESR
  * Fixed: Various stability, functionality, and security fixes
- Mozilla Firefox ESR 78.2
  MFSA 2020-38 (bsc#1175686)
  * CVE-2020-15663 (bmo#1643199)
    Downgrade attack on the Mozilla Maintenance Service could
    have resulted in escalation of privilege
  * CVE-2020-15664 (bmo#1658214)
    Attacker-induced prompt for extension installation
  * CVE-2020-15670 (bmo#1651001, bmo#1651449, bmo#1653626,
    bmo#1656957)
    Memory safety bugs fixed in Firefox 80 and Firefox ESR 78.2

- Fixed Firefox tab crash in FIPS mode (bsc#1174284).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-14"/>
	<updated date="2020-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174284">SUSE bug 1174284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15663/">CVE-2020-15663 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15663">CVE-2020-15663 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15664">CVE-2020-15664 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15670/">CVE-2020-15670 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15670">CVE-2020-15670 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570609" comment="MozillaFirefox-78.2.0-78.90.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570610" comment="MozillaFirefox-translations-common-78.2.0-78.90.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570611" comment="MozillaFirefox-translations-other-78.2.0-78.90.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216855" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1167976" ref_url="https://bugzilla.suse.com/1167976" source="BUGZILLA"/>
		<reference ref_id="1173986" ref_url="https://bugzilla.suse.com/1173986" source="BUGZILLA"/>
		<reference ref_id="1175046" ref_url="https://bugzilla.suse.com/1175046" source="BUGZILLA"/>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673/" source="CVE"/>
		<reference ref_id="CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676/" source="CVE"/>
		<reference ref_id="CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677/" source="CVE"/>
		<reference ref_id="CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.3.0 ESR (bsc#1176756, MFSA 2020-43)
   - CVE-2020-15677: Download origin spoofing via redirect
   - CVE-2020-15676: Fixed an XSS when pasting attacker-controlled data into a
     contenteditable element 
   - CVE-2020-15678: When recursing through layers while scrolling, an iterator
     may have become invalid, resulting in a potential use-after-free scenario
   - CVE-2020-15673: Fixed memory safety bugs 
- Attempt to fix langpack-parallelization by introducing separate
  obj-dirs for each lang (bsc#1173986, bsc#1167976)
- Fixed problems with compiler builtins on SLE-11 (bsc#1175046)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-28"/>
	<updated date="2020-09-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167976">SUSE bug 1167976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173986">SUSE bug 1173986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175046">SUSE bug 1175046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15673">CVE-2020-15673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15676">CVE-2020-15676 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15677">CVE-2020-15677 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15678">CVE-2020-15678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570612" comment="MozillaFirefox-78.3.0-78.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570613" comment="MozillaFirefox-translations-common-78.3.0-78.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570614" comment="MozillaFirefox-translations-other-78.3.0-78.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216856" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1177872" ref_url="https://bugzilla.suse.com/1177872" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.0 ESR
  * Fixed: Various stability, functionality, and security fixes MFSA 2020-46 (bsc#1177872)
  * CVE-2020-15969 Use-after-free in usersctp
  * CVE-2020-15683 Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4
  * Fixed: Fixed legacy preferences not being properly applied when set via GPO
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-26"/>
	<updated date="2020-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15683">CVE-2020-15683 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15969">CVE-2020-15969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570615" comment="MozillaFirefox-78.4.0-78.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570616" comment="MozillaFirefox-translations-common-78.4.0-78.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570617" comment="MozillaFirefox-translations-other-78.4.0-78.99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216857" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1178588" ref_url="https://bugzilla.suse.com/1178588" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-49 (bsc#1178588)
  * CVE-2020-26950 (bmo#1675905)
    Write side effects in MCallGetProperty opcode not accounted
    for
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178588">SUSE bug 1178588</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26950">CVE-2020-26950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570618" comment="MozillaFirefox-78.4.1-78.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570619" comment="MozillaFirefox-translations-common-78.4.1-78.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570620" comment="MozillaFirefox-translations-other-78.4.1-78.102.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216858" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1178824" ref_url="https://bugzilla.suse.com/1178824" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951/" source="CVE"/>
		<reference ref_id="CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953/" source="CVE"/>
		<reference ref_id="CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956/" source="CVE"/>
		<reference ref_id="CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958/" source="CVE"/>
		<reference ref_id="CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959/" source="CVE"/>
		<reference ref_id="CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960/" source="CVE"/>
		<reference ref_id="CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961/" source="CVE"/>
		<reference ref_id="CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965/" source="CVE"/>
		<reference ref_id="CVE-2020-26966" ref_url="https://www.suse.com/security/cve/CVE-2020-26966/" source="CVE"/>
		<reference ref_id="CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.5.0 ESR (bsc#1178824)
  * CVE-2020-26951: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code
  * CVE-2020-16012: Variable time processing of cross-origin images during drawImage calls
  * CVE-2020-26953: Fullscreen could be enabled without displaying the security UI
  * CVE-2020-26956: XSS through paste (manual and clipboard API)
  * CVE-2020-26958: Requests intercepted through ServiceWorkers lacked MIME type restrictions
  * CVE-2020-26959: Use-after-free in WebRequestService
  * CVE-2020-26960: Potential use-after-free in uses of nsTArray
  * CVE-2020-15999: Heap buffer overflow in freetype
  * CVE-2020-26961: DoH did not filter IPv4 mapped IP Addresses
  * CVE-2020-26965: Software keyboards may have remembered typed passwords
  * CVE-2020-26966: Single-word search queries were also broadcast to local network
  * CVE-2020-26968: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-20"/>
	<updated date="2020-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16012">CVE-2020-16012 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26951">CVE-2020-26951 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26953">CVE-2020-26953 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26956">CVE-2020-26956 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26958">CVE-2020-26958 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26959">CVE-2020-26959 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26960">CVE-2020-26960 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26961">CVE-2020-26961 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26965">CVE-2020-26965 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26966/">CVE-2020-26966 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26966">CVE-2020-26966 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26968">CVE-2020-26968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570621" comment="MozillaFirefox-78.5.0-78.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570622" comment="MozillaFirefox-translations-common-78.5.0-78.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570623" comment="MozillaFirefox-translations-other-78.5.0-78.105.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216859" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1180039" ref_url="https://bugzilla.suse.com/1180039" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971/" source="CVE"/>
		<reference ref_id="CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973/" source="CVE"/>
		<reference ref_id="CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974/" source="CVE"/>
		<reference ref_id="CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978/" source="CVE"/>
		<reference ref_id="CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111/" source="CVE"/>
		<reference ref_id="CVE-2020-35112" ref_url="https://www.suse.com/security/cve/CVE-2020-35112/" source="CVE"/>
		<reference ref_id="CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2020-55 (bsc#1180039)
  * CVE-2020-16042 (bmo#1679003)
    Operations on a BigInt could have caused uninitialized memory
    to be exposed
  * CVE-2020-26971 (bmo#1663466)
    Heap buffer overflow in WebGL
  * CVE-2020-26973 (bmo#1680084)
    CSS Sanitizer performed incorrect sanitization
  * CVE-2020-26974 (bmo#1681022)
    Incorrect cast of StyleGenericFlexBasis resulted in a heap
    use-after-free
  * CVE-2020-26978 (bmo#1677047)
    Internal network hosts could have been probed by a malicious
    webpage
  * CVE-2020-35111 (bmo#1657916)
    The proxy.onRequest API did not catch view-source URLs
  * CVE-2020-35112 (bmo#1661365)
    Opening an extension-less download may have inadvertently
    launched an executable instead
  * CVE-2020-35113 (bmo#1664831, bmo#1673589)
    Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-21"/>
	<updated date="2020-12-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16042">CVE-2020-16042 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26971">CVE-2020-26971 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26973">CVE-2020-26973 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26974">CVE-2020-26974 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26978">CVE-2020-26978 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35111">CVE-2020-35111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35112/">CVE-2020-35112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35112">CVE-2020-35112 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35113">CVE-2020-35113 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570624" comment="MozillaFirefox-78.6.0-78.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570625" comment="MozillaFirefox-translations-common-78.6.0-78.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570626" comment="MozillaFirefox-translations-other-78.6.0-78.108.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216860" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1180623" ref_url="https://bugzilla.suse.com/1180623" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.1 ESR
  * Fixed: Critical security issue MFSA 2021-01 (bsc#1180623)
  * CVE-2020-16044
    Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-12"/>
	<updated date="2021-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180623">SUSE bug 1180623</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16044">CVE-2020-16044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570627" comment="MozillaFirefox-78.6.1-78.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570628" comment="MozillaFirefox-translations-common-78.6.1-78.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570629" comment="MozillaFirefox-translations-other-78.6.1-78.111.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216861" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1181414" ref_url="https://bugzilla.suse.com/1181414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976/" source="CVE"/>
		<reference ref_id="CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953/" source="CVE"/>
		<reference ref_id="CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954/" source="CVE"/>
		<reference ref_id="CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960/" source="CVE"/>
		<reference ref_id="CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.7.0 ESR  (MFSA 2021-04, bsc#1181414)
  * CVE-2021-23953: Fixed a Cross-origin information leakage via redirected PDF requests
  * CVE-2021-23954: Fixed a type confusion when using logical assignment operators in JavaScript switch statements
  * CVE-2020-26976: Fixed an issue where HTTPS pages could have been intercepted by a registered service worker when they should not have been
  * CVE-2021-23960: Fixed a use-after-poison for incorrectly redeclared JavaScript variables during GC
  * CVE-2021-23964: Fixed Memory safety bugs 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-29"/>
	<updated date="2021-01-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26976">CVE-2020-26976 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23953">CVE-2021-23953 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23954">CVE-2021-23954 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23960">CVE-2021-23960 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23964">CVE-2021-23964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570630" comment="MozillaFirefox-78.7.0-78.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570631" comment="MozillaFirefox-translations-common-78.7.0-78.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570632" comment="MozillaFirefox-translations-other-78.7.0-78.114.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216862" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1181848" ref_url="https://bugzilla.suse.com/1181848" source="BUGZILLA"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.7.1 ESR (bsc#1181848)

- Fixed: Prevent access to NTFS special paths that could lead to filesystem corruption. 
- Buffer overflow in depth pitch calculations for compressed textures 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1181848">SUSE bug 1181848</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570633" comment="MozillaFirefox-78.7.1-78.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570634" comment="MozillaFirefox-translations-common-78.7.1-78.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570635" comment="MozillaFirefox-translations-other-78.7.1-78.117.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216863" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1182357" ref_url="https://bugzilla.suse.com/1182357" source="BUGZILLA"/>
		<reference ref_id="1182614" ref_url="https://bugzilla.suse.com/1182614" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968/" source="CVE"/>
		<reference ref_id="CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969/" source="CVE"/>
		<reference ref_id="CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973/" source="CVE"/>
		<reference ref_id="CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.8.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2021-08 (bsc#1182614)
  * CVE-2021-23969: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23968: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23973: MediaError message property could have leaked information about cross-origin resources
  * CVE-2021-23978: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182357">SUSE bug 1182357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23968">CVE-2021-23968 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23969">CVE-2021-23969 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23973">CVE-2021-23973 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23978">CVE-2021-23978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570636" comment="MozillaFirefox-78.8.0-78.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570637" comment="MozillaFirefox-translations-common-78.8.0-78.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570638" comment="MozillaFirefox-translations-other-78.8.0-78.120.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216864" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1183942" ref_url="https://bugzilla.suse.com/1183942" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981/" source="CVE"/>
		<reference ref_id="CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982/" source="CVE"/>
		<reference ref_id="CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984/" source="CVE"/>
		<reference ref_id="CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.9.0 ESR  (MFSA 2021-11, bsc#1183942)
  * CVE-2021-23981: Texture upload into an unbound backing buffer resulted in an out-of-bound read
  * CVE-2021-23982: Internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23984: Malicious extensions could have spoofed popup information
  * CVE-2021-23987: Memory safety bugs
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-01"/>
	<updated date="2021-04-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23981">CVE-2021-23981 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23982">CVE-2021-23982 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23984">CVE-2021-23984 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23987">CVE-2021-23987 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570639" comment="MozillaFirefox-78.9.0-78.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570640" comment="MozillaFirefox-translations-common-78.9.0-78.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570641" comment="MozillaFirefox-translations-other-78.9.0-78.123.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216865" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1184960" ref_url="https://bugzilla.suse.com/1184960" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23961" ref_url="https://www.suse.com/security/cve/CVE-2021-23961/" source="CVE"/>
		<reference ref_id="CVE-2021-23994" ref_url="https://www.suse.com/security/cve/CVE-2021-23994/" source="CVE"/>
		<reference ref_id="CVE-2021-23995" ref_url="https://www.suse.com/security/cve/CVE-2021-23995/" source="CVE"/>
		<reference ref_id="CVE-2021-23998" ref_url="https://www.suse.com/security/cve/CVE-2021-23998/" source="CVE"/>
		<reference ref_id="CVE-2021-23999" ref_url="https://www.suse.com/security/cve/CVE-2021-23999/" source="CVE"/>
		<reference ref_id="CVE-2021-24002" ref_url="https://www.suse.com/security/cve/CVE-2021-24002/" source="CVE"/>
		<reference ref_id="CVE-2021-29945" ref_url="https://www.suse.com/security/cve/CVE-2021-29945/" source="CVE"/>
		<reference ref_id="CVE-2021-29946" ref_url="https://www.suse.com/security/cve/CVE-2021-29946/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.10.0 ESR (bsc#1184960)
  * CVE-2021-23994: Out of bound write due to lazy initialization
  * CVE-2021-23995: Use-after-free in Responsive Design Mode
  * CVE-2021-23998: Secure Lock icon could have been spoofed
  * CVE-2021-23961: More internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23999: Blob URLs may have been granted additional privileges
  * CVE-2021-24002: Arbitrary FTP command execution on FTP servers using an encoded URL
  * CVE-2021-29945: Incorrect size computation in WebAssembly JIT could lead to null-reads
  * CVE-2021-29946: Port blocking could be bypassed
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23961/">CVE-2021-23961 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23961">CVE-2021-23961 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23994/">CVE-2021-23994 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23994">CVE-2021-23994 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23995/">CVE-2021-23995 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23995">CVE-2021-23995 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23998/">CVE-2021-23998 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23998">CVE-2021-23998 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23999/">CVE-2021-23999 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23999">CVE-2021-23999 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-24002/">CVE-2021-24002 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24002">CVE-2021-24002 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29945/">CVE-2021-29945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29945">CVE-2021-29945 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29946/">CVE-2021-29946 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29946">CVE-2021-29946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570642" comment="MozillaFirefox-78.10.0-78.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570643" comment="MozillaFirefox-translations-common-78.10.0-78.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570644" comment="MozillaFirefox-translations-other-78.10.0-78.126.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216866" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1185633" ref_url="https://bugzilla.suse.com/1185633" source="BUGZILLA"/>
		<reference ref_id="1186696" ref_url="https://bugzilla.suse.com/1186696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29951" ref_url="https://www.suse.com/security/cve/CVE-2021-29951/" source="CVE"/>
		<reference ref_id="CVE-2021-29964" ref_url="https://www.suse.com/security/cve/CVE-2021-29964/" source="CVE"/>
		<reference ref_id="CVE-2021-29967" ref_url="https://www.suse.com/security/cve/CVE-2021-29967/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.11.0 ESR (bsc#1186696)

  * CVE-2021-29964: Out of bounds-read when parsing a `WM_COPYDATA` message
  * CVE-2021-29967: Memory safety bugs fixed in Firefox
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185633">SUSE bug 1185633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186696">SUSE bug 1186696</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29951/">CVE-2021-29951 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29951">CVE-2021-29951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29964/">CVE-2021-29964 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29964">CVE-2021-29964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29967/">CVE-2021-29967 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29967">CVE-2021-29967 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570645" comment="MozillaFirefox-78.11.0-78.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570646" comment="MozillaFirefox-translations-common-78.11.0-78.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570647" comment="MozillaFirefox-translations-other-78.11.0-78.131.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216867" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1188275" ref_url="https://bugzilla.suse.com/1188275" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29970" ref_url="https://www.suse.com/security/cve/CVE-2021-29970/" source="CVE"/>
		<reference ref_id="CVE-2021-29976" ref_url="https://www.suse.com/security/cve/CVE-2021-29976/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.12.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-29 (bsc#1188275)

* CVE-2021-29970: Use-after-free in accessibility features of a document
* CVE-2021-30547: Out of bounds write in ANGLE
* CVE-2021-29976: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-16"/>
	<updated date="2021-07-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188275">SUSE bug 1188275</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29970/">CVE-2021-29970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29970">CVE-2021-29970 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29976/">CVE-2021-29976 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29976">CVE-2021-29976 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30547">CVE-2021-30547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625243" comment="MozillaFirefox-78.12.0-78.134.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625244" comment="MozillaFirefox-translations-common-78.12.0-78.134.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625245" comment="MozillaFirefox-translations-other-78.12.0-78.134.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216868" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.13.0 ESR (MFSA 2021-34, bsc#1188891):

- CVE-2021-29986: Race condition when resolving DNS names could have led to memory corruption
- CVE-2021-29988: Memory corruption as a result of incorrect style treatment
- CVE-2021-29984: Incorrect instruction reordering during JIT optimization
- CVE-2021-29980: Uninitialized memory in a canvas object could have led to memory corruption
- CVE-2021-29985: Use-after-free media channels
- CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-12"/>
	<updated date="2021-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630646" comment="MozillaFirefox-78.13.0-78.137.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630647" comment="MozillaFirefox-translations-common-78.13.0-78.137.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630648" comment="MozillaFirefox-translations-other-78.13.0-78.137.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216869" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1190274" ref_url="https://bugzilla.suse.com/1190274" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

This update contains the Firefox Extended Support Release 91.1.0 ESR.

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274):

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Firefox 91.0.1esr ESR

* Fixed: Fixed an issue causing buttons on the tab bar to be
  resized when loading certain websites (bug 1704404)
* Fixed: Fixed an issue which caused tabs from private windows
  to be visible in non-private windows when viewing switch-to-
  tab results in the address bar panel (bug 1720369)
* Fixed: Various stability fixes
* Fixed: Security fix MFSA 2021-37 (bsc#1189547)
* CVE-2021-29991 (bmo#1724896)
  Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

* New: Some of the highlights of the new Extended Support Release are:

  - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
  - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
  - On Windows, updates can now be applied in the background
    while Firefox is not running.
  - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
  - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
  - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
  - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
  - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
  - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
  - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
  - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
  - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
  - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
  - We’ve improved functionality and design for a number of
    Firefox search features:
    * Selecting a search engine at the bottom of the search
      panel now enters search mode for that engine, allowing you to
      see suggestions (if available) for your search terms. The old
      behavior (immediately performing a search) is available with
      a shift-click.
    * When Firefox autocompletes the URL of one of your search
      engines, you can now search with that engine directly in the
      address bar by selecting the shortcut in the address bar
      results.
    * We’ve added buttons at the bottom of the search panel to
      allow you to search your bookmarks, open tabs, and history.
  - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
  - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
  - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
* Changed: Firefox no longer supports Adobe Flash. There is no
  setting available to re-enable Flash support.
* Enterprise: Various bug fixes and new policies have been
  implemented in the latest version of Firefox. See more
  details in the Firefox for Enterprise 91 Release Notes.

  MFSA 2021-33 (bsc#1188891):

* CVE-2021-29986: Race condition when resolving DNS names could have led to
  memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting
  assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to
  memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted
  permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and
  type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-01"/>
	<updated date="2021-10-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190274">SUSE bug 1190274</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29981">CVE-2021-29981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29982">CVE-2021-29982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29983">CVE-2021-29983 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29987">CVE-2021-29987 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29990">CVE-2021-29990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29991">CVE-2021-29991 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38492">CVE-2021-38492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38495">CVE-2021-38495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634730" comment="MozillaFirefox-78.14.0-78.140.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634731" comment="MozillaFirefox-translations-common-78.14.0-78.140.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634732" comment="MozillaFirefox-translations-other-78.14.0-78.140.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216870" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1192250" ref_url="https://bugzilla.suse.com/1192250" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38503" ref_url="https://www.suse.com/security/cve/CVE-2021-38503/" source="CVE"/>
		<reference ref_id="CVE-2021-38504" ref_url="https://www.suse.com/security/cve/CVE-2021-38504/" source="CVE"/>
		<reference ref_id="CVE-2021-38505" ref_url="https://www.suse.com/security/cve/CVE-2021-38505/" source="CVE"/>
		<reference ref_id="CVE-2021-38506" ref_url="https://www.suse.com/security/cve/CVE-2021-38506/" source="CVE"/>
		<reference ref_id="CVE-2021-38507" ref_url="https://www.suse.com/security/cve/CVE-2021-38507/" source="CVE"/>
		<reference ref_id="CVE-2021-38508" ref_url="https://www.suse.com/security/cve/CVE-2021-38508/" source="CVE"/>
		<reference ref_id="CVE-2021-38509" ref_url="https://www.suse.com/security/cve/CVE-2021-38509/" source="CVE"/>
		<reference ref_id="CVE-2021-38510" ref_url="https://www.suse.com/security/cve/CVE-2021-38510/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:
	  
MozillaFirefox was updated to Extended Support Release 91.3.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-49 (bsc#1192250)

  * CVE-2021-38503: iframe sandbox rules did not apply to XSLT stylesheets
  * CVE-2021-38504: Use-after-free in file picker dialog
  * CVE-2021-38505: Windows 10 Cloud Clipboard may have recorded sensitive user data
  * CVE-2021-38506: Firefox could be coaxed into going into fullscreen mode without notification or warning
  * CVE-2021-38507: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports
  * CVE-2021-38508: Permission Prompt could be overlaid, resulting in user confusion and potential spoofing
  * CVE-2021-38509: Javascript alert box could have been spoofed onto an arbitrary domain
  * CVE-2021-38510: Download Protections were bypassed by .inetloc files on Mac OS
  * MOZ-2021-0008: Use-after-free in HTTP2 Session object
  * MOZ-2021-0007: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-09"/>
	<updated date="2021-11-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38503/">CVE-2021-38503 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38503">CVE-2021-38503 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38504/">CVE-2021-38504 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38504">CVE-2021-38504 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38505/">CVE-2021-38505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38505">CVE-2021-38505 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38506/">CVE-2021-38506 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38506">CVE-2021-38506 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38507/">CVE-2021-38507 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38507">CVE-2021-38507 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38508/">CVE-2021-38508 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38508">CVE-2021-38508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38509/">CVE-2021-38509 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38509">CVE-2021-38509 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38510/">CVE-2021-38510 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38510">CVE-2021-38510 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654421" comment="MozillaFirefox-91.3.0-78.151.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654422" comment="MozillaFirefox-translations-common-91.3.0-78.151.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654423" comment="MozillaFirefox-translations-other-91.3.0-78.151.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216871" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1193321" ref_url="https://bugzilla.suse.com/1193321" source="BUGZILLA"/>
		<reference ref_id="1193485" ref_url="https://bugzilla.suse.com/1193485" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43536" ref_url="https://www.suse.com/security/cve/CVE-2021-43536/" source="CVE"/>
		<reference ref_id="CVE-2021-43537" ref_url="https://www.suse.com/security/cve/CVE-2021-43537/" source="CVE"/>
		<reference ref_id="CVE-2021-43538" ref_url="https://www.suse.com/security/cve/CVE-2021-43538/" source="CVE"/>
		<reference ref_id="CVE-2021-43539" ref_url="https://www.suse.com/security/cve/CVE-2021-43539/" source="CVE"/>
		<reference ref_id="CVE-2021-43541" ref_url="https://www.suse.com/security/cve/CVE-2021-43541/" source="CVE"/>
		<reference ref_id="CVE-2021-43542" ref_url="https://www.suse.com/security/cve/CVE-2021-43542/" source="CVE"/>
		<reference ref_id="CVE-2021-43543" ref_url="https://www.suse.com/security/cve/CVE-2021-43543/" source="CVE"/>
		<reference ref_id="CVE-2021-43545" ref_url="https://www.suse.com/security/cve/CVE-2021-43545/" source="CVE"/>
		<reference ref_id="CVE-2021-43546" ref_url="https://www.suse.com/security/cve/CVE-2021-43546/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Extended Support Release 91.4.0 (bsc#1193485):

- CVE-2021-43536: URL leakage when navigating while executing asynchronous function
- CVE-2021-43537: Heap buffer overflow when using structured clone
- CVE-2021-43538: Missing fullscreen and pointer lock notification when requesting both
- CVE-2021-43539: GC rooting failure when calling wasm instance methods
- CVE-2021-43541: External protocol handler parameters were unescaped
- CVE-2021-43542: XMLHttpRequest error codes could have leaked the existence of an external protocol handler
- CVE-2021-43543: Bypass of CSP sandbox directive when embedding
- CVE-2021-43545: Denial of Service when using the Location API in a loop
- CVE-2021-43546: Cursor spoofing could overlay user interface when native cursor is zoomed
- Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4
- Removed x-scheme-handler/ftp from MozillaFirefox.desktop (bsc#1193321)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-10"/>
	<updated date="2021-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193321">SUSE bug 1193321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43536/">CVE-2021-43536 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43536">CVE-2021-43536 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43537/">CVE-2021-43537 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43537">CVE-2021-43537 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43538/">CVE-2021-43538 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43538">CVE-2021-43538 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43539/">CVE-2021-43539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43539">CVE-2021-43539 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43541/">CVE-2021-43541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43541">CVE-2021-43541 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43542/">CVE-2021-43542 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43542">CVE-2021-43542 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43543/">CVE-2021-43543 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43543">CVE-2021-43543 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43545/">CVE-2021-43545 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43545">CVE-2021-43545 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43546/">CVE-2021-43546 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43546">CVE-2021-43546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659367" comment="MozillaFirefox-91.4.0-78.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659368" comment="MozillaFirefox-translations-common-91.4.0-78.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659369" comment="MozillaFirefox-translations-other-91.4.0-78.154.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216872" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1194547" ref_url="https://bugzilla.suse.com/1194547" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140/" source="CVE"/>
		<reference ref_id="CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737/" source="CVE"/>
		<reference ref_id="CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738/" source="CVE"/>
		<reference ref_id="CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739/" source="CVE"/>
		<reference ref_id="CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740/" source="CVE"/>
		<reference ref_id="CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741/" source="CVE"/>
		<reference ref_id="CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742/" source="CVE"/>
		<reference ref_id="CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743/" source="CVE"/>
		<reference ref_id="CVE-2022-22744" ref_url="https://www.suse.com/security/cve/CVE-2022-22744/" source="CVE"/>
		<reference ref_id="CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745/" source="CVE"/>
		<reference ref_id="CVE-2022-22746" ref_url="https://www.suse.com/security/cve/CVE-2022-22746/" source="CVE"/>
		<reference ref_id="CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747/" source="CVE"/>
		<reference ref_id="CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748/" source="CVE"/>
		<reference ref_id="CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- CVE-2021-4140: Fixed iframe sandbox bypass with XSLT (bsc#1194547).
- CVE-2022-22737: Fixed race condition when playing audio files (bsc#1194547).
- CVE-2022-22738: Fixed heap-buffer-overflow in blendGaussianBlur (bsc#1194547).
- CVE-2022-22739: Fixed missing throttling on external protocol launch dialog (bsc#1194547).
- CVE-2022-22740: Fixed use-after-free of ChannelEventQueue::mOwner (bsc#1194547).
- CVE-2022-22741: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22742: Fixed out-of-bounds memory access when inserting text in edit mode (bsc#1194547).
- CVE-2022-22743: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22744: Fixed possible command injection via the 'Copy as curl' feature in DevTools (bsc#1194547).
- CVE-2022-22745: Fixed leaking cross-origin URLs through securitypolicyviolation event (bsc#1194547).
- CVE-2022-22746: Fixed calling into reportValidity could have lead to fullscreen window spoof (bsc#1194547).
- CVE-2022-22747: Fixed crash when handling empty pkcs7 sequence(bsc#1194547).
- CVE-2022-22748: Fixed spoofed origin on external protocol launch dialog (bsc#1194547).
- CVE-2022-22751: Fixed memory safety bugs (bsc#1194547).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4140">CVE-2021-4140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22737">CVE-2022-22737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22738">CVE-2022-22738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22739">CVE-2022-22739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22740">CVE-2022-22740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22741">CVE-2022-22741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22742">CVE-2022-22742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22743">CVE-2022-22743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22744/">CVE-2022-22744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22744">CVE-2022-22744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22745">CVE-2022-22745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22746/">CVE-2022-22746 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22746">CVE-2022-22746 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22747">CVE-2022-22747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22748">CVE-2022-22748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22751">CVE-2022-22751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663814" comment="MozillaFirefox-91.5.0-78.159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663815" comment="MozillaFirefox-translations-common-91.5.0-78.159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663816" comment="MozillaFirefox-translations-other-91.5.0-78.159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663817" comment="libfreebl3-3.68.2-38.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663818" comment="libfreebl3-32bit-3.68.2-38.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663819" comment="libsoftokn3-3.68.2-38.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663820" comment="libsoftokn3-32bit-3.68.2-38.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663821" comment="mozilla-nss-3.68.2-38.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663822" comment="mozilla-nss-32bit-3.68.2-38.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663823" comment="mozilla-nss-certs-3.68.2-38.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663824" comment="mozilla-nss-certs-32bit-3.68.2-38.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663825" comment="mozilla-nss-tools-3.68.2-38.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216873" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1195230" ref_url="https://bugzilla.suse.com/1195230" source="BUGZILLA"/>
		<reference ref_id="1195682" ref_url="https://bugzilla.suse.com/1195682" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22753" ref_url="https://www.suse.com/security/cve/CVE-2022-22753/" source="CVE"/>
		<reference ref_id="CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754/" source="CVE"/>
		<reference ref_id="CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756/" source="CVE"/>
		<reference ref_id="CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759/" source="CVE"/>
		<reference ref_id="CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760/" source="CVE"/>
		<reference ref_id="CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761/" source="CVE"/>
		<reference ref_id="CVE-2022-22763" ref_url="https://www.suse.com/security/cve/CVE-2022-22763/" source="CVE"/>
		<reference ref_id="CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.0 ESR / MFSA 2022-05 (bsc#1195682)

- CVE-2022-22753: Privilege Escalation to SYSTEM on Windows via Maintenance Service
- CVE-2022-22754: Extensions could have bypassed permission confirmation during update
- CVE-2022-22756: Drag and dropping an image could have resulted in the dropped object being an executable
- CVE-2022-22759: Sandboxed iframes could have executed script if the parent appended elements
- CVE-2022-22760: Cross-Origin responses could be distinguished between script and non-script content-types
- CVE-2022-22761: frame-ancestors Content Security Policy directive was not enforced for framed extension pages
- CVE-2022-22763: Script Execution during invalid object state
- CVE-2022-22764: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6


Firefox Extended Support Release 91.5.1 ESR (bsc#1195230)

- Fixed an issue that allowed unexpected data to be submitted in some of our search telemetry
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-24"/>
	<updated date="2022-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195230">SUSE bug 1195230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22753/">CVE-2022-22753 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22753">CVE-2022-22753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22754">CVE-2022-22754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22756">CVE-2022-22756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22759">CVE-2022-22759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22760">CVE-2022-22760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22761">CVE-2022-22761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22763/">CVE-2022-22763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22763">CVE-2022-22763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22764">CVE-2022-22764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668898" comment="MozillaFirefox-91.6.0-78.162.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668899" comment="MozillaFirefox-translations-common-91.6.0-78.162.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668900" comment="MozillaFirefox-translations-other-91.6.0-78.162.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216874" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1196809" ref_url="https://bugzilla.suse.com/1196809" source="BUGZILLA"/>
		<reference ref_id="1196900" ref_url="https://bugzilla.suse.com/1196900" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381/" source="CVE"/>
		<reference ref_id="CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383/" source="CVE"/>
		<reference ref_id="CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384/" source="CVE"/>
		<reference ref_id="CVE-2022-26386" ref_url="https://www.suse.com/security/cve/CVE-2022-26386/" source="CVE"/>
		<reference ref_id="CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387/" source="CVE"/>
		<reference ref_id="CVE-2022-26485" ref_url="https://www.suse.com/security/cve/CVE-2022-26485/" source="CVE"/>
		<reference ref_id="CVE-2022-26486" ref_url="https://www.suse.com/security/cve/CVE-2022-26486/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.7.0 ESR (bsc#1196900):

- CVE-2022-26383: Browser window spoof using fullscreen mode
- CVE-2022-26384: iframe allow-scripts sandbox bypass
- CVE-2022-26387: Time-of-check time-of-use bug when verifying add-on signatures
- CVE-2022-26381: Use-after-free in text reflows
- CVE-2022-26386: Temporary files downloaded to /tmp and accessible by other local users

Firefox Extended Support Release 91.6.1 ESR (bsc#1196809):

- CVE-2022-26485: Use-after-free in XSLT parameter processing
- CVE-2022-26486: Use-after-free in WebGPU IPC Framework
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-11"/>
	<updated date="2022-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196809">SUSE bug 1196809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26381">CVE-2022-26381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26383">CVE-2022-26383 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26384">CVE-2022-26384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26386/">CVE-2022-26386 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26386">CVE-2022-26386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26387">CVE-2022-26387 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26485/">CVE-2022-26485 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26485">CVE-2022-26485 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26486/">CVE-2022-26486 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26486">CVE-2022-26486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672457" comment="MozillaFirefox-91.7.0-78.167.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672458" comment="MozillaFirefox-translations-common-91.7.0-78.167.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672459" comment="MozillaFirefox-translations-other-91.7.0-78.167.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216875" version="1" class="patch">
	<metadata>
		<title>Recommended update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="CVE-2022-1196" ref_url="https://www.suse.com/security/cve/CVE-2022-1196/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2022-28281" ref_url="https://www.suse.com/security/cve/CVE-2022-28281/" source="CVE"/>
		<reference ref_id="CVE-2022-28282" ref_url="https://www.suse.com/security/cve/CVE-2022-28282/" source="CVE"/>
		<reference ref_id="CVE-2022-28285" ref_url="https://www.suse.com/security/cve/CVE-2022-28285/" source="CVE"/>
		<reference ref_id="CVE-2022-28286" ref_url="https://www.suse.com/security/cve/CVE-2022-28286/" source="CVE"/>
		<reference ref_id="CVE-2022-28289" ref_url="https://www.suse.com/security/cve/CVE-2022-28289/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.8.0 ESR (bsc#1197903):

MFSA 2022-14 (bsc#1197903)

* CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11 tokens are removed while in use
* CVE-2022-28281: Fixed an out of bounds write due to unexpected WebAuthN Extensions
* CVE-2022-1196: Fixed a use-after-free after VR Process destruction
* CVE-2022-28282: Fixed a use-after-free in DocumentL10n::TranslateDocument
* CVE-2022-28285: Fixed incorrect AliasSet used in JIT Codegen
* CVE-2022-28286: Fixed that iframe contents could be rendered outside the border
* CVE-2022-24713: Fixed a denial of service via complex regular expressions
* CVE-2022-28289: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-05"/>
	<updated date="2022-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1097">CVE-2022-1097 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1196/">CVE-2022-1196 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1196">CVE-2022-1196 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28281/">CVE-2022-28281 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28281">CVE-2022-28281 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28282/">CVE-2022-28282 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28282">CVE-2022-28282 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28285/">CVE-2022-28285 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28285">CVE-2022-28285 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28286/">CVE-2022-28286 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28286">CVE-2022-28286 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28289/">CVE-2022-28289 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28289">CVE-2022-28289 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678509" comment="MozillaFirefox-91.8.0-78.170.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678510" comment="MozillaFirefox-translations-common-91.8.0-78.170.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678511" comment="MozillaFirefox-translations-other-91.8.0-78.170.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216876" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="865539" ref_url="https://bugzilla.suse.com/865539" source="BUGZILLA"/>
		<reference ref_id="869827" ref_url="https://bugzilla.suse.com/869827" source="BUGZILLA"/>
		<reference ref_id="875378" ref_url="https://bugzilla.suse.com/875378" source="BUGZILLA"/>
		<reference ref_id="875803" ref_url="https://bugzilla.suse.com/875803" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1492" ref_url="https://www.suse.com/security/cve/CVE-2014-1492/" source="CVE"/>
		<reference ref_id="CVE-2014-1518" ref_url="https://www.suse.com/security/cve/CVE-2014-1518/" source="CVE"/>
		<reference ref_id="CVE-2014-1520" ref_url="https://www.suse.com/security/cve/CVE-2014-1520/" source="CVE"/>
		<reference ref_id="CVE-2014-1523" ref_url="https://www.suse.com/security/cve/CVE-2014-1523/" source="CVE"/>
		<reference ref_id="CVE-2014-1524" ref_url="https://www.suse.com/security/cve/CVE-2014-1524/" source="CVE"/>
		<reference ref_id="CVE-2014-1529" ref_url="https://www.suse.com/security/cve/CVE-2014-1529/" source="CVE"/>
		<reference ref_id="CVE-2014-1530" ref_url="https://www.suse.com/security/cve/CVE-2014-1530/" source="CVE"/>
		<reference ref_id="CVE-2014-1531" ref_url="https://www.suse.com/security/cve/CVE-2014-1531/" source="CVE"/>
		<reference ref_id="CVE-2014-1532" ref_url="https://www.suse.com/security/cve/CVE-2014-1532/" source="CVE"/>
		<description>

This MozillaFirefox and Mozilla NSS update fixes several security and 
non-security issues.

MozillaFirefox has been updated to 24.5.0esr which fixes following issues:

    * MFSA 2014-34/CVE-2014-1518
      Miscellaneous memory safety hazards
    * MFSA 2014-37/CVE-2014-1523
      Out of bounds read while decoding JPG images
    * MFSA 2014-38/CVE-2014-1524
      Buffer overflow when using non-XBL object as XBL
    * MFSA 2014-42/CVE-2014-1529
      Privilege escalation through Web Notification API
    * MFSA 2014-43/CVE-2014-1530
      Cross-site scripting (XSS) using history navigations
    * MFSA 2014-44/CVE-2014-1531
      Use-after-free in imgLoader while resizing images
    * MFSA 2014-46/CVE-2014-1532
      Use-after-free in nsHostResolver

Mozilla NSS has been updated to version 3.16

    * required for Firefox 29
    * CVE-2014-1492_ In a wildcard certificate, the wildcard character
      should not be embedded within the U-label of an internationalized
      domain name. See the last bullet point in RFC 6125, Section 7.2.
    * Update of root certificates.

Security Issue references:

    * CVE-2014-1532
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532&gt;
    * CVE-2014-1531
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531&gt;
    * CVE-2014-1530
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530&gt;
    * CVE-2014-1529
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529&gt;
    * CVE-2014-1524
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524&gt;
    * CVE-2014-1523
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523&gt;
    * CVE-2014-1520
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1520&gt;
    * CVE-2014-1518
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-01"/>
	<updated date="2014-05-01"/>
	<bugzilla href="https://bugzilla.suse.com/865539">SUSE bug 865539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869827">SUSE bug 869827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875378">SUSE bug 875378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875803">SUSE bug 875803</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1492/">CVE-2014-1492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1492">CVE-2014-1492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1518/">CVE-2014-1518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1518">CVE-2014-1518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1520/">CVE-2014-1520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1520">CVE-2014-1520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1523/">CVE-2014-1523 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1523">CVE-2014-1523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1524/">CVE-2014-1524 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1524">CVE-2014-1524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1529/">CVE-2014-1529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1529">CVE-2014-1529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1530/">CVE-2014-1530 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1530">CVE-2014-1530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1531/">CVE-2014-1531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1531">CVE-2014-1531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1532/">CVE-2014-1532 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1532">CVE-2014-1532 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570648" comment="MozillaFirefox-24.5.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570649" comment="MozillaFirefox-branding-SLED-24-0.4.10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570650" comment="MozillaFirefox-translations-24.5.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570651" comment="libfreebl3-3.16-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570652" comment="libfreebl3-32bit-3.16-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570653" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570654" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570655" comment="mozilla-nss-3.16-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570656" comment="mozilla-nss-32bit-3.16-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570657" comment="mozilla-nss-tools-3.16-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570648" comment="MozillaFirefox-24.5.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570649" comment="MozillaFirefox-branding-SLED-24-0.4.10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570650" comment="MozillaFirefox-translations-24.5.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570651" comment="libfreebl3-3.16-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570652" comment="libfreebl3-32bit-3.16-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570653" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570654" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570655" comment="mozilla-nss-3.16-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570656" comment="mozilla-nss-32bit-3.16-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570657" comment="mozilla-nss-tools-3.16-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216877" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="925368" ref_url="https://bugzilla.suse.com/925368" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801/" source="CVE"/>
		<reference ref_id="CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807/" source="CVE"/>
		<reference ref_id="CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813/" source="CVE"/>
		<reference ref_id="CVE-2015-0814" ref_url="https://www.suse.com/security/cve/CVE-2015-0814/" source="CVE"/>
		<reference ref_id="CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816/" source="CVE"/>
		<description>

Mozilla Firefox was updated to 31.6.0 ESR to fix five security issues:

    * Miscellaneous memory safety hazards (MFSA
      2015-30/CVE-2015-0814/CVE-2015-0815)
    * Use-after-free when using the Fluendo MP3 GStreamer plugin (MFSA
      2015-31/CVE-2015-0813)
    * resource:// documents can load privileged pages (MFSA
      2015-33/CVE-2015-0816)
    * CORS requests should not follow 30x redirections after preflight
      (MFSA 2015-37/CVE-2015-0807)
    * Same-origin bypass through anchor navigation (MFSA
      2015-40/CVE-2015-0801)

Security Issues:

    * CVE-2015-0801
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801&gt;
    * CVE-2015-0807
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807&gt;
    * CVE-2015-0813
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813&gt;
    * CVE-2015-0814
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0814&gt;
    * CVE-2015-0816
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-02"/>
	<updated date="2015-04-02"/>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0801">CVE-2015-0801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0807">CVE-2015-0807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0813">CVE-2015-0813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0814/">CVE-2015-0814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0814">CVE-2015-0814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0816">CVE-2015-0816 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570658" comment="MozillaFirefox-31.6.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570659" comment="MozillaFirefox-translations-31.6.0esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216878" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="908275" ref_url="https://bugzilla.suse.com/908275" source="BUGZILLA"/>
		<reference ref_id="935033" ref_url="https://bugzilla.suse.com/935033" source="BUGZILLA"/>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>
MozillaFirefox, mozilla-nspr and mozilla-nss were updated to fix 17 security issues.

For more details please check the changelogs.

These security issues were fixed:
- CVE-2015-2724/CVE-2015-2725/CVE-2015-2726: Miscellaneous memory safety hazards (bsc#935979).
- CVE-2015-2728: Type confusion in Indexed Database Manager (bsc#935979).
- CVE-2015-2730: ECDSA signature validation fails to handle some signatures correctly (bsc#935979).
- CVE-2015-2722/CVE-2015-2733: Use-after-free in workers while using XMLHttpRequest (bsc#935979).
- CVE-2015-2734/CVE-2015-2735/CVE-2015-2736/CVE-2015-2737/CVE-2015-2738/CVE-2015-2739/CVE-2015-2740: Vulnerabilities found through code inspection (bsc#935979).
- CVE-2015-2743: Privilege escalation in PDF.js (bsc#935979).
- CVE-2015-4000: NSS accepts export-length DHE keys with regular DHE cipher suites (bsc#935033).
- CVE-2015-2721: NSS incorrectly permits skipping of ServerKeyExchange (bsc#935979).

This non-security issue was fixed:
- bsc#908275: Firefox did not print in landscape orientation.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-15"/>
	<updated date="2015-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/908275">SUSE bug 908275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935033">SUSE bug 935033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2721">CVE-2015-2721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2722">CVE-2015-2722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2724">CVE-2015-2724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2725">CVE-2015-2725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2726">CVE-2015-2726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2728">CVE-2015-2728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2730">CVE-2015-2730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2733">CVE-2015-2733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2734">CVE-2015-2734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2735">CVE-2015-2735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2736">CVE-2015-2736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2737">CVE-2015-2737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2738">CVE-2015-2738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2739">CVE-2015-2739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2740">CVE-2015-2740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2743">CVE-2015-2743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570660" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566345" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216879" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, rust-cbindgen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1190274" ref_url="https://bugzilla.suse.com/1190274" source="BUGZILLA"/>
		<reference ref_id="1190710" ref_url="https://bugzilla.suse.com/1190710" source="BUGZILLA"/>
		<reference ref_id="1191332" ref_url="https://bugzilla.suse.com/1191332" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-32810" ref_url="https://www.suse.com/security/cve/CVE-2021-32810/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<reference ref_id="CVE-2021-38496" ref_url="https://www.suse.com/security/cve/CVE-2021-38496/" source="CVE"/>
		<reference ref_id="CVE-2021-38497" ref_url="https://www.suse.com/security/cve/CVE-2021-38497/" source="CVE"/>
		<reference ref_id="CVE-2021-38498" ref_url="https://www.suse.com/security/cve/CVE-2021-38498/" source="CVE"/>
		<reference ref_id="CVE-2021-38500" ref_url="https://www.suse.com/security/cve/CVE-2021-38500/" source="CVE"/>
		<reference ref_id="CVE-2021-38501" ref_url="https://www.suse.com/security/cve/CVE-2021-38501/" source="CVE"/>
		<description>
This update for MozillaFirefox, rust-cbindgen fixes the following issues:

MozillaFirefox was updated to Extended Support Release 91.2.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-45 (bsc#1191332)

  * CVE-2021-38496: Use-after-free in MessageTask
  * CVE-2021-38497: Validation message could have been overlaid on another origin
  * CVE-2021-38498: Use-after-free of nsLanguageAtomService object
  * CVE-2021-32810: Data race in crossbeam-deque
  * CVE-2021-38500: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2
  * CVE-2021-38501: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2

- Fixed crash in FIPS mode (bsc#1190710)

Firefox Extended Support Release 91.1.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274)

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Firefox 91.0.1esr ESR

  * Fixed: Fixed an issue causing buttons on the tab bar to be
    resized when loading certain websites (bug 1704404)
    (bmo#1704404)
  * Fixed: Fixed an issue which caused tabs from private windows
    to be visible in non-private windows when viewing switch-to-
    tab results in the address bar panel (bug 1720369)
    (bmo#1720369)
  * Fixed: Various stability fixes
  * Fixed: Security fix
  MFSA 2021-37 (bsc#1189547)
  * CVE-2021-29991 (bmo#1724896)
    Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

  * New: Some of the highlights of the new Extended Support
    Release are:
    - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
    - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
    - On Windows, updates can now be applied in the background
    while Firefox is not running.
    - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
    - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
    - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
    - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
    - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
    - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
    - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
    - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
    - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
    - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
    - We’ve improved functionality and design for a number of
    Firefox search features:
      * Selecting a search engine at the bottom of the search
    panel now enters search mode for that engine, allowing you to
    see suggestions (if available) for your search terms. The old
    behavior (immediately performing a search) is available with
    a shift-click.
      * When Firefox autocompletes the URL of one of your search
    engines, you can now search with that engine directly in the
    address bar by selecting the shortcut in the address bar
    results.
      * We’ve added buttons at the bottom of the search panel to
    allow you to search your bookmarks, open tabs, and history.
    - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
    - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
    - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
  * Changed: Firefox no longer supports Adobe Flash. There is no
    setting available to re-enable Flash support.
  * Enterprise: Various bug fixes and new policies have been
    implemented in the latest version of Firefox. See more
    details in the Firefox for Enterprise 91 Release Notes.

MFSA 2021-33 (bsc#1188891)

* CVE-2021-29986: Race condition when resolving DNS names could have led to memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91

rust-cbindgen was updated to 0.19.0.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-18"/>
	<updated date="2021-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190274">SUSE bug 1190274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190710">SUSE bug 1190710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29981">CVE-2021-29981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29982">CVE-2021-29982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29983">CVE-2021-29983 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29987">CVE-2021-29987 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29990">CVE-2021-29990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29991">CVE-2021-29991 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32810/">CVE-2021-32810 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32810">CVE-2021-32810 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38492">CVE-2021-38492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38495">CVE-2021-38495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38496/">CVE-2021-38496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38496">CVE-2021-38496 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38497/">CVE-2021-38497 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38497">CVE-2021-38497 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38498/">CVE-2021-38498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38498">CVE-2021-38498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38500/">CVE-2021-38500 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38500">CVE-2021-38500 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38501/">CVE-2021-38501 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38501">CVE-2021-38501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652557" comment="MozillaFirefox-91.2.0-78.143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652558" comment="MozillaFirefox-branding-SLED-91-21.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652559" comment="MozillaFirefox-translations-common-91.2.0-78.143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652560" comment="MozillaFirefox-translations-other-91.2.0-78.143.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216880" version="1" class="patch">
	<metadata>
		<title>Security update for NetworkManager</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="574266" ref_url="https://bugzilla.suse.com/574266" source="BUGZILLA"/>
		<reference ref_id="628607" ref_url="https://bugzilla.suse.com/628607" source="BUGZILLA"/>
		<reference ref_id="686093" ref_url="https://bugzilla.suse.com/686093" source="BUGZILLA"/>
		<reference ref_id="694218" ref_url="https://bugzilla.suse.com/694218" source="BUGZILLA"/>
		<reference ref_id="CVE-2006-7246" ref_url="https://www.suse.com/security/cve/CVE-2006-7246/" source="CVE"/>
		<reference ref_id="CVE-2010-1172" ref_url="https://www.suse.com/security/cve/CVE-2010-1172/" source="CVE"/>
		<description>

NetworkManager did not pin a certificate's subject to an ESSID. A rogue 
access point could therefore be used to conduct MITM attacks by using any 
other valid certificate issued by same CA as used in the original network 
(CVE-2006-7246). This has been fixed.

Please note that existing WPA2 Enterprise connections need to be deleted 
and re-created to take advantage of the new security checks.

Security Issue reference:

    * CVE-2006-7246
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7246&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-11-04"/>
	<updated date="2011-11-04"/>
	<bugzilla href="https://bugzilla.suse.com/574266">SUSE bug 574266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/628607">SUSE bug 628607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/686093">SUSE bug 686093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/694218">SUSE bug 694218</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2006-7246/">CVE-2006-7246 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2006-7246">CVE-2006-7246 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1172/">CVE-2010-1172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1172">CVE-2010-1172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991209" comment="NetworkManager-0.7.1_git20090811-3.9.9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991210" comment="NetworkManager-glib-0.7.1_git20090811-3.9.9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991211" comment="NetworkManager-gnome-0.7.1-5.15.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991212" comment="wpa_supplicant-0.6.9-4.5.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216881" version="1" class="patch">
	<metadata>
		<title>Security update for NetworkManager-gnome</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="574266" ref_url="https://bugzilla.suse.com/574266" source="BUGZILLA"/>
		<reference ref_id="732700" ref_url="https://bugzilla.suse.com/732700" source="BUGZILLA"/>
		<reference ref_id="CVE-2006-7246" ref_url="https://www.suse.com/security/cve/CVE-2006-7246/" source="CVE"/>
		<description>

NetworkManager did not pin a certificate's subject to an ESSID. A rogue 
access point could therefore be used to conduct MITM attacks by using any 
other valid certificate issued by same CA as used in the original network 
(CVE-2006-7246).

Please note that existing WPA2 Enterprise connections need to be deleted 
and re-created to take advantage of the new security checks.

This is a re-release of the previous update to also enable the checks for 
EAP-TLS.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-01-10"/>
	<updated date="2012-01-10"/>
	<bugzilla href="https://bugzilla.suse.com/574266">SUSE bug 574266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/732700">SUSE bug 732700</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2006-7246/">CVE-2006-7246 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2006-7246">CVE-2006-7246 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991213" comment="NetworkManager-gnome-0.7.1-5.15.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216882" version="1" class="patch">
	<metadata>
		<title>Recommended update for NetworkManager-kde4 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="663413" ref_url="https://bugzilla.suse.com/663413" source="BUGZILLA"/>
		<reference ref_id="726349" ref_url="https://bugzilla.suse.com/726349" source="BUGZILLA"/>
		<description>
This NetworkManager-kde4 update fixes the following security and non security issues: 

- Fixed a long standing security issue. This makes knetworkmanager probe the RADIUS server for a CA certificate subject and hash if no CA certificate is specified. knetworkmanager then stores this data and send it to NetworkManager for it to do a network validation in the absence of a real certificate (bsc#726349)

- Disabled the loading by default of the NetworkManager plasma applet since it doesn't work.
- Fixed a crash due to the use of an uninitialized variable in the plasma applet in case someone runs it manually (bsc#663413)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-01"/>
	<updated date="2016-06-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/663413">SUSE bug 663413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/726349">SUSE bug 726349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570666" comment="NetworkManager-kde4-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570667" comment="NetworkManager-kde4-lang-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570668" comment="NetworkManager-kde4-libs-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570669" comment="NetworkManager-openvpn-kde4-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570670" comment="NetworkManager-pptp-kde4-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570671" comment="plasmoid-networkmanagement-0.9.svn1043876-1.3.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216883" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1040107" ref_url="https://bugzilla.suse.com/1040107" source="BUGZILLA"/>
		<reference ref_id="1040114" ref_url="https://bugzilla.suse.com/1040114" source="BUGZILLA"/>
		<reference ref_id="1052522" ref_url="https://bugzilla.suse.com/1052522" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12596" ref_url="https://www.suse.com/security/cve/CVE-2017-12596/" source="CVE"/>
		<reference ref_id="CVE-2017-9110" ref_url="https://www.suse.com/security/cve/CVE-2017-9110/" source="CVE"/>
		<reference ref_id="CVE-2017-9114" ref_url="https://www.suse.com/security/cve/CVE-2017-9114/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

* CVE-2017-9110: In OpenEXR, an invalid read of size 2 in the hufDecode function in ImfHuf.cpp could cause the application to crash. (bsc#1040107)
* CVE-2017-9114: In OpenEXR, an invalid read of size 1 in the refill function in ImfFastHuf.cpp could cause the application to crash.  (bsc#1040114)
* CVE-2017-12596: In OpenEXR, a crafted image causes a heap-based buffer over-read in the hufDecode function in IlmImf/ImfHuf.cpp during exrmaketiled execution; it could have resulted in denial of service or possibly unspecified other impact.  (bsc#1052522)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-02"/>
	<updated date="2018-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040107">SUSE bug 1040107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040114">SUSE bug 1040114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052522">SUSE bug 1052522</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12596/">CVE-2017-12596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12596">CVE-2017-12596 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9110/">CVE-2017-9110 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9110">CVE-2017-9110 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9114/">CVE-2017-9114 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9114">CVE-2017-9114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570672" comment="OpenEXR-1.6.1-83.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564202" comment="OpenEXR-32bit-1.6.1-83.17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216884" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1040109" ref_url="https://bugzilla.suse.com/1040109" source="BUGZILLA"/>
		<reference ref_id="1040112" ref_url="https://bugzilla.suse.com/1040112" source="BUGZILLA"/>
		<reference ref_id="1040113" ref_url="https://bugzilla.suse.com/1040113" source="BUGZILLA"/>
		<reference ref_id="1040115" ref_url="https://bugzilla.suse.com/1040115" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9111" ref_url="https://www.suse.com/security/cve/CVE-2017-9111/" source="CVE"/>
		<reference ref_id="CVE-2017-9112" ref_url="https://www.suse.com/security/cve/CVE-2017-9112/" source="CVE"/>
		<reference ref_id="CVE-2017-9113" ref_url="https://www.suse.com/security/cve/CVE-2017-9113/" source="CVE"/>
		<reference ref_id="CVE-2017-9115" ref_url="https://www.suse.com/security/cve/CVE-2017-9115/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

Security issues fixed:

- CVE-2017-9111: Fixed an invalid write of size 8 in the storeSSE function in ImfOptimizedPixelReading.h (bsc#1040109).
- CVE-2017-9113: Fixed an invalid write of size 1 in the bufferedReadPixels function in ImfInputFile.cpp (bsc#1040113).
- CVE-2017-9115: Fixed an invalid write of size 2 in the = operator function inhalf.h (bsc#1040115).    
- CVE-2017-9112: Fixed invalid read of size 1 in the getBits function in ImfHuf.cpp. (This was already fixed by the previous update bug not referenced.) (bsc#1040112)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-24"/>
	<updated date="2019-07-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040109">SUSE bug 1040109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040112">SUSE bug 1040112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040113">SUSE bug 1040113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040115">SUSE bug 1040115</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9111/">CVE-2017-9111 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9111">CVE-2017-9111 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9112/">CVE-2017-9112 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9112">CVE-2017-9112 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9113/">CVE-2017-9113 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9113">CVE-2017-9113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9115/">CVE-2017-9115 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9115">CVE-2017-9115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570673" comment="OpenEXR-1.6.1-83.17.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570674" comment="OpenEXR-32bit-1.6.1-83.17.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216885" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1061305" ref_url="https://bugzilla.suse.com/1061305" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9110" ref_url="https://www.suse.com/security/cve/CVE-2017-9110/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

- CVE-2017-14988: Fixed a denial of service in Header::readfrom() (bsc#1061305).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-09"/>
	<updated date="2019-08-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1061305">SUSE bug 1061305</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9110/">CVE-2017-9110 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9110">CVE-2017-9110 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570675" comment="OpenEXR-1.6.1-83.17.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570676" comment="OpenEXR-32bit-1.6.1-83.17.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216886" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1169574" ref_url="https://bugzilla.suse.com/1169574" source="BUGZILLA"/>
		<reference ref_id="1169576" ref_url="https://bugzilla.suse.com/1169576" source="BUGZILLA"/>
		<reference ref_id="1169578" ref_url="https://bugzilla.suse.com/1169578" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11761" ref_url="https://www.suse.com/security/cve/CVE-2020-11761/" source="CVE"/>
		<reference ref_id="CVE-2020-11763" ref_url="https://www.suse.com/security/cve/CVE-2020-11763/" source="CVE"/>
		<reference ref_id="CVE-2020-11764" ref_url="https://www.suse.com/security/cve/CVE-2020-11764/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

- CVE-2020-11764: Fixed an out-of-bounds write in copyIntoFrameBuffer in ImfMisc.cpp (bsc#1169574).
- CVE-2020-11763: Fixed an out-of-bounds read and write, as demonstrated by ImfTileOffsets.cpp (bsc#1169576).
- CVE-2020-11761: Fixed an out-of-bounds read during Huffman uncompression, as demonstrated by FastHufDecoder:refill in ImfFastHuf.cpp (bsc#1169578).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-13"/>
	<updated date="2020-05-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169574">SUSE bug 1169574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169576">SUSE bug 1169576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169578">SUSE bug 1169578</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11761/">CVE-2020-11761 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11761">CVE-2020-11761 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11763/">CVE-2020-11763 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11763">CVE-2020-11763 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11764/">CVE-2020-11764 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11764">CVE-2020-11764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570677" comment="OpenEXR-1.6.1-83.17.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570678" comment="OpenEXR-32bit-1.6.1-83.17.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216887" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1179879" ref_url="https://bugzilla.suse.com/1179879" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16588" ref_url="https://www.suse.com/security/cve/CVE-2020-16588/" source="CVE"/>
		<reference ref_id="CVE-2020-16589" ref_url="https://www.suse.com/security/cve/CVE-2020-16589/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

Security issues fixed:

- CVE-2020-16588: Fixed a null pointer deference in generatePreview (bsc#1179879).
- CVE-2020-16589: Fixed a heap-based buffer overflow in writeTileData in ImfTiledOutputFile.cpp (bsc#1179879).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-21"/>
	<updated date="2020-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179879">SUSE bug 1179879</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16588/">CVE-2020-16588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16588">CVE-2020-16588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16589/">CVE-2020-16589 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16589">CVE-2020-16589 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570679" comment="OpenEXR-1.6.1-83.17.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570680" comment="OpenEXR-32bit-1.6.1-83.17.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216888" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1184172" ref_url="https://bugzilla.suse.com/1184172" source="BUGZILLA"/>
		<reference ref_id="1184173" ref_url="https://bugzilla.suse.com/1184173" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3475" ref_url="https://www.suse.com/security/cve/CVE-2021-3475/" source="CVE"/>
		<reference ref_id="CVE-2021-3476" ref_url="https://www.suse.com/security/cve/CVE-2021-3476/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

- CVE-2021-3475: Integer-overflow in Imf_2_5::calculateNumTiles (bsc#1184173)
- CVE-2021-3476: Undefined-shift in Imf_2_5::unpack14 (bsc#1184172)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184172">SUSE bug 1184172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184173">SUSE bug 1184173</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3475/">CVE-2021-3475 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3475">CVE-2021-3475 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3476/">CVE-2021-3476 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3476">CVE-2021-3476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570681" comment="OpenEXR-1.6.1-83.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570682" comment="OpenEXR-32bit-1.6.1-83.17.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216889" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1184354" ref_url="https://bugzilla.suse.com/1184354" source="BUGZILLA"/>
		<reference ref_id="1187395" ref_url="https://bugzilla.suse.com/1187395" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3479" ref_url="https://www.suse.com/security/cve/CVE-2021-3479/" source="CVE"/>
		<reference ref_id="CVE-2021-3605" ref_url="https://www.suse.com/security/cve/CVE-2021-3605/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

- Fixed CVE-2021-3479 [bsc#1184354]: Out-of-memory caused by allocation of a very large buffer
- Fixed CVE-2021-3605 [bsc#1187395]: Heap buffer overflow in the rleUncompress function
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-22"/>
	<updated date="2021-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184354">SUSE bug 1184354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187395">SUSE bug 1187395</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3479/">CVE-2021-3479 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3479">CVE-2021-3479 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3605/">CVE-2021-3605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3605">CVE-2021-3605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570683" comment="OpenEXR-1.6.1-83.17.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570684" comment="OpenEXR-32bit-1.6.1-83.17.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216890" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1188457" ref_url="https://bugzilla.suse.com/1188457" source="BUGZILLA"/>
		<reference ref_id="1188458" ref_url="https://bugzilla.suse.com/1188458" source="BUGZILLA"/>
		<reference ref_id="1188460" ref_url="https://bugzilla.suse.com/1188460" source="BUGZILLA"/>
		<reference ref_id="1188461" ref_url="https://bugzilla.suse.com/1188461" source="BUGZILLA"/>
		<reference ref_id="1192556" ref_url="https://bugzilla.suse.com/1192556" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20298" ref_url="https://www.suse.com/security/cve/CVE-2021-20298/" source="CVE"/>
		<reference ref_id="CVE-2021-20300" ref_url="https://www.suse.com/security/cve/CVE-2021-20300/" source="CVE"/>
		<reference ref_id="CVE-2021-20303" ref_url="https://www.suse.com/security/cve/CVE-2021-20303/" source="CVE"/>
		<reference ref_id="CVE-2021-20304" ref_url="https://www.suse.com/security/cve/CVE-2021-20304/" source="CVE"/>
		<reference ref_id="CVE-2021-3941" ref_url="https://www.suse.com/security/cve/CVE-2021-3941/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

- CVE-2021-20298: Fixed out-of-memory in B44Compressor (bsc#1188460).
- CVE-2021-20300: Fixed integer-overflow in Imf_2_5:hufUncompress (bsc#1188458).
- CVE-2021-20303: Fixed heap-buffer-overflow in Imf_2_5::copyIntoFrameBuffe (bsc#1188457).
- CVE-2021-20304: Fixed undefined-shift in Imf_2_5:hufDecode (bsc#1188461).
- CVE-2021-3941: Fixed divide-by-zero in Imf_3_1:RGBtoXYZ (bsc#1192556).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188457">SUSE bug 1188457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188458">SUSE bug 1188458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188460">SUSE bug 1188460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188461">SUSE bug 1188461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192556">SUSE bug 1192556</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20298/">CVE-2021-20298 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20298">CVE-2021-20298 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20300/">CVE-2021-20300 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20300">CVE-2021-20300 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-20303/">CVE-2021-20303 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20303">CVE-2021-20303 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20304/">CVE-2021-20304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20304">CVE-2021-20304 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3941/">CVE-2021-3941 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3941">CVE-2021-3941 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657133" comment="OpenEXR-1.6.1-83.17.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657134" comment="OpenEXR-32bit-1.6.1-83.17.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216891" version="1" class="patch">
	<metadata>
		<title>Security update for OpenOffice_org</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="607095" ref_url="https://bugzilla.suse.com/607095" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0395" ref_url="https://www.suse.com/security/cve/CVE-2010-0395/" source="CVE"/>
		<description>

This update of OpenOffice_org fixes the following security issue:

    * Arbitrary macros written in Python can be executed by bypassing macro
      security permissions. CVE-2010-0395
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0395&gt;

It also provides the maintenance update to OpenOffice.org-3.2.1. Details 
about all upstream changes can be found at 
http://development.openoffice.org/releases/3.2.1.html
&lt;http://development.openoffice.org/releases/3.2.1.html&gt; .

For further SUSE Linux Enterprise specific fixes please refer to the 
changelog of the OpenOffice_org RPM package.

		</description>
<advisory from="security@suse.de">
	<issued date="2010-05-05"/>
	<updated date="2010-05-05"/>
	<bugzilla href="https://bugzilla.suse.com/607095">SUSE bug 607095</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0395/">CVE-2010-0395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0395">CVE-2010-0395 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991214" comment="libpython2_6-1_0-2.6.0-8.9.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570686" comment="libpython2_6-1_0-32bit-2.6.0-8.9.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216892" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1124799" ref_url="https://bugzilla.suse.com/1124799" source="BUGZILLA"/>
		<reference ref_id="1124800" ref_url="https://bugzilla.suse.com/1124800" source="BUGZILLA"/>
		<reference ref_id="1124802" ref_url="https://bugzilla.suse.com/1124802" source="BUGZILLA"/>
		<reference ref_id="1124803" ref_url="https://bugzilla.suse.com/1124803" source="BUGZILLA"/>
		<reference ref_id="1124805" ref_url="https://bugzilla.suse.com/1124805" source="BUGZILLA"/>
		<reference ref_id="1124806" ref_url="https://bugzilla.suse.com/1124806" source="BUGZILLA"/>
		<reference ref_id="1124824" ref_url="https://bugzilla.suse.com/1124824" source="BUGZILLA"/>
		<reference ref_id="1124825" ref_url="https://bugzilla.suse.com/1124825" source="BUGZILLA"/>
		<reference ref_id="1124826" ref_url="https://bugzilla.suse.com/1124826" source="BUGZILLA"/>
		<reference ref_id="1124827" ref_url="https://bugzilla.suse.com/1124827" source="BUGZILLA"/>
		<reference ref_id="1125099" ref_url="https://bugzilla.suse.com/1125099" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-7572" ref_url="https://www.suse.com/security/cve/CVE-2019-7572/" source="CVE"/>
		<reference ref_id="CVE-2019-7573" ref_url="https://www.suse.com/security/cve/CVE-2019-7573/" source="CVE"/>
		<reference ref_id="CVE-2019-7574" ref_url="https://www.suse.com/security/cve/CVE-2019-7574/" source="CVE"/>
		<reference ref_id="CVE-2019-7575" ref_url="https://www.suse.com/security/cve/CVE-2019-7575/" source="CVE"/>
		<reference ref_id="CVE-2019-7576" ref_url="https://www.suse.com/security/cve/CVE-2019-7576/" source="CVE"/>
		<reference ref_id="CVE-2019-7577" ref_url="https://www.suse.com/security/cve/CVE-2019-7577/" source="CVE"/>
		<reference ref_id="CVE-2019-7578" ref_url="https://www.suse.com/security/cve/CVE-2019-7578/" source="CVE"/>
		<reference ref_id="CVE-2019-7635" ref_url="https://www.suse.com/security/cve/CVE-2019-7635/" source="CVE"/>
		<reference ref_id="CVE-2019-7636" ref_url="https://www.suse.com/security/cve/CVE-2019-7636/" source="CVE"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2019-7638" ref_url="https://www.suse.com/security/cve/CVE-2019-7638/" source="CVE"/>
		<description>
This update for SDL fixes the following issues:

Security issues fixed:	  

- CVE-2019-7572: Fixed a buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c.(bsc#1124806).
- CVE-2019-7578: Fixed a heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c (bsc#1125099).
- CVE-2019-7576: Fixed heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (bsc#1124799).
- CVE-2019-7573: Fixed a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (bsc#1124805).
- CVE-2019-7635: Fixed a heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c. (bsc#1124827).
- CVE-2019-7636: Fixed a heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c (bsc#1124826).
- CVE-2019-7638: Fixed a heap-based buffer over-read in Map1toN in video/SDL_pixels.c (bsc#1124824).
- CVE-2019-7574: Fixed a heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c (bsc#1124803).
- CVE-2019-7575: Fixed a heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c (bsc#1124802).
- CVE-2019-7637: Fixed a heap-based buffer overflow in SDL_FillRect function in SDL_surface.c (bsc#1124825).	  
- CVE-2019-7577: Fixed a buffer over read in SDL_LoadWAV_RW in audio/SDL_wave.c (bsc#1124800).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124799">SUSE bug 1124799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124800">SUSE bug 1124800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124802">SUSE bug 1124802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124803">SUSE bug 1124803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124805">SUSE bug 1124805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124806">SUSE bug 1124806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124824">SUSE bug 1124824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124825">SUSE bug 1124825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124826">SUSE bug 1124826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124827">SUSE bug 1124827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125099">SUSE bug 1125099</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7572/">CVE-2019-7572 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7572">CVE-2019-7572 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7573/">CVE-2019-7573 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7573">CVE-2019-7573 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7574/">CVE-2019-7574 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7574">CVE-2019-7574 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7575/">CVE-2019-7575 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7575">CVE-2019-7575 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7576/">CVE-2019-7576 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7576">CVE-2019-7576 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7577/">CVE-2019-7577 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7577">CVE-2019-7577 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7578/">CVE-2019-7578 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7578">CVE-2019-7578 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7635/">CVE-2019-7635 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7635">CVE-2019-7635 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7636/">CVE-2019-7636 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7636">CVE-2019-7636 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7637">CVE-2019-7637 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7638/">CVE-2019-7638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7638">CVE-2019-7638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570687" comment="SDL-1.2.13-106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564204" comment="SDL-32bit-1.2.13-106.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216893" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1141844" ref_url="https://bugzilla.suse.com/1141844" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13616" ref_url="https://www.suse.com/security/cve/CVE-2019-13616/" source="CVE"/>
		<description>
This update for SDL fixes the following issues:

Secuirty issue fixed:

- CVE-2019-13616: Fixed heap-based buffer over-read in BlitNtoN in video/SDL_blit_N.c when called from SDL_SoftBlit (bsc#1141844).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141844">SUSE bug 1141844</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13616/">CVE-2019-13616 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13616">CVE-2019-13616 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570688" comment="SDL-1.2.13-106.14.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570689" comment="SDL-32bit-1.2.13-106.14.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216894" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1124825" ref_url="https://bugzilla.suse.com/1124825" source="BUGZILLA"/>
		<reference ref_id="1181201" ref_url="https://bugzilla.suse.com/1181201" source="BUGZILLA"/>
		<reference ref_id="1181202" ref_url="https://bugzilla.suse.com/1181202" source="BUGZILLA"/>
		<reference ref_id="1198001" ref_url="https://bugzilla.suse.com/1198001" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<description>
This update for SDL fixes the following issues:

- CVE-2020-14410: Fixed a heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c (bsc#1181201).
- CVE-2019-7637: Fixed a heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c (bsc#1124825).
- CVE-2021-33657: Fix a buffer overflow when parsing a crafted BMP image (bsc#1198001).
- CVE-2020-14409: Fixed an integer overflow (and resultant SDL_memcpy heap corruption) in SDL_BlitCopy in video/SDL_blit_copy.c (bsc#1181202).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124825">SUSE bug 1124825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181201">SUSE bug 1181201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181202">SUSE bug 1181202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198001">SUSE bug 1198001</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7637">CVE-2019-7637 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14409">CVE-2020-14409 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14410">CVE-2020-14410 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33657">CVE-2021-33657 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679743" comment="SDL-1.2.13-106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679744" comment="SDL-32bit-1.2.13-106.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216895" version="1" class="patch">
	<metadata>
		<title>Security update for SuSEfirewall2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1064127" ref_url="https://bugzilla.suse.com/1064127" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15638" ref_url="https://www.suse.com/security/cve/CVE-2017-15638/" source="CVE"/>
		<description>
This update for SuSEfirewall2 fixes the following issues:

- CVE-2017-15638: Fixed a security issue with too open implicit portmapper rules
  (bsc#1064127): A source net restriction for _rpc_ services
  was not taken into account for the implicitly added rules for port 111,
  making the portmap service accessible to everyone in the affected zone.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-02"/>
	<updated date="2017-11-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064127">SUSE bug 1064127</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15638/">CVE-2017-15638 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15638">CVE-2017-15638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570690" comment="SuSEfirewall2-3.6_SVNr208-2.18.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216896" version="1" class="patch">
	<metadata>
		<title>Security update for a2ps</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="725806" ref_url="https://bugzilla.suse.com/725806" source="BUGZILLA"/>
		<reference ref_id="871097" ref_url="https://bugzilla.suse.com/871097" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0466" ref_url="https://www.suse.com/security/cve/CVE-2014-0466/" source="CVE"/>
		<description>

The text to postscript converter a2ps received a security update.

The fixps script did not call ghostscript with the -DSAFER option, allowing 
command execution by attacker supplied postscript files.

Security Issue reference:

    * CVE-2014-0466
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0466&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-31"/>
	<updated date="2014-03-31"/>
	<bugzilla href="https://bugzilla.suse.com/725806">SUSE bug 725806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871097">SUSE bug 871097</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0466/">CVE-2014-0466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0466">CVE-2014-0466 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991215" comment="a2ps-4.13-1326.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216897" version="1" class="patch">
	<metadata>
		<title>Recommended update for aaa_base</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="622203" ref_url="https://bugzilla.suse.com/622203" source="BUGZILLA"/>
		<reference ref_id="624052" ref_url="https://bugzilla.suse.com/624052" source="BUGZILLA"/>
		<reference ref_id="631916" ref_url="https://bugzilla.suse.com/631916" source="BUGZILLA"/>
		<reference ref_id="641150" ref_url="https://bugzilla.suse.com/641150" source="BUGZILLA"/>
		<reference ref_id="650719" ref_url="https://bugzilla.suse.com/650719" source="BUGZILLA"/>
		<reference ref_id="653034" ref_url="https://bugzilla.suse.com/653034" source="BUGZILLA"/>
		<reference ref_id="661596" ref_url="https://bugzilla.suse.com/661596" source="BUGZILLA"/>
		<reference ref_id="665479" ref_url="https://bugzilla.suse.com/665479" source="BUGZILLA"/>
		<reference ref_id="696964" ref_url="https://bugzilla.suse.com/696964" source="BUGZILLA"/>
		<reference ref_id="710119" ref_url="https://bugzilla.suse.com/710119" source="BUGZILLA"/>
		<reference ref_id="752298" ref_url="https://bugzilla.suse.com/752298" source="BUGZILLA"/>
		<reference ref_id="762535" ref_url="https://bugzilla.suse.com/762535" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-0461" ref_url="https://www.suse.com/security/cve/CVE-2011-0461/" source="CVE"/>
		<description>

This update to aaa_base resolves the following issues:

    * The file system type of /dev was incorrectly listed as 'devtmpfs' in
      /etc/mtab
    * NIS/YP domain name is set as FQDN hostname

		</description>
<advisory from="security@suse.de">
	<issued date="2012-06-08"/>
	<updated date="2012-06-08"/>
	<bugzilla href="https://bugzilla.suse.com/622203">SUSE bug 622203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/624052">SUSE bug 624052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/631916">SUSE bug 631916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/641150">SUSE bug 641150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/650719">SUSE bug 650719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/653034">SUSE bug 653034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/661596">SUSE bug 661596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/665479">SUSE bug 665479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/696964">SUSE bug 696964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/710119">SUSE bug 710119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752298">SUSE bug 752298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762535">SUSE bug 762535</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0461/">CVE-2011-0461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0461">CVE-2011-0461 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991216" comment="aaa_base-11-6.46.46.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216898" version="1" class="patch">
	<metadata>
		<title>Security update for adns (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1172265" ref_url="https://bugzilla.suse.com/1172265" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9103" ref_url="https://www.suse.com/security/cve/CVE-2017-9103/" source="CVE"/>
		<reference ref_id="CVE-2017-9104" ref_url="https://www.suse.com/security/cve/CVE-2017-9104/" source="CVE"/>
		<reference ref_id="CVE-2017-9105" ref_url="https://www.suse.com/security/cve/CVE-2017-9105/" source="CVE"/>
		<reference ref_id="CVE-2017-9106" ref_url="https://www.suse.com/security/cve/CVE-2017-9106/" source="CVE"/>
		<reference ref_id="CVE-2017-9107" ref_url="https://www.suse.com/security/cve/CVE-2017-9107/" source="CVE"/>
		<reference ref_id="CVE-2017-9108" ref_url="https://www.suse.com/security/cve/CVE-2017-9108/" source="CVE"/>
		<reference ref_id="CVE-2017-9109" ref_url="https://www.suse.com/security/cve/CVE-2017-9109/" source="CVE"/>
		<description>
This update for adns fixes the following issues:

- CVE-2017-9103,CVE-2017-9104,CVE-2017-9105,CVE-2017-9109: Fixed an issue in local recursive resolver
  which could have led to remote code execution (bsc#1172265).
- CVE-2017-9106: Fixed an issue with upstream DNS data sources which could have led to denial of 
  service (bsc#1172265).
- CVE-2017-9107: Fixed an issue when quering domain names which could have led to denial of service (bsc#1172265).
- CVE-2017-9108: Fixed an issue which could have led to denial of service (bsc#1172265).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-18"/>
	<updated date="2020-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9103/">CVE-2017-9103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9103">CVE-2017-9103 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9104/">CVE-2017-9104 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9104">CVE-2017-9104 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9105/">CVE-2017-9105 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9105">CVE-2017-9105 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9106/">CVE-2017-9106 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9106">CVE-2017-9106 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9107/">CVE-2017-9107 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9107">CVE-2017-9107 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9108/">CVE-2017-9108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9108">CVE-2017-9108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9109/">CVE-2017-9109 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9109">CVE-2017-9109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570691" comment="libadns1-1.4-75.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216899" version="1" class="patch">
	<metadata>
		<title>Security update for aide (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1194735" ref_url="https://bugzilla.suse.com/1194735" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45417" ref_url="https://www.suse.com/security/cve/CVE-2021-45417/" source="CVE"/>
		<description>
This update for aide fixes the following issues:

- CVE-2021-45417: Fix a bufferoverflow in base64 functions (bsc#1194735)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194735">SUSE bug 1194735</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45417/">CVE-2021-45417 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45417">CVE-2021-45417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664250" comment="aide-0.13.1-40.16.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216900" version="1" class="patch">
	<metadata>
		<title>Security update for amanda (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1112916" ref_url="https://bugzilla.suse.com/1112916" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10729" ref_url="https://www.suse.com/security/cve/CVE-2016-10729/" source="CVE"/>
		<description>
This update for amanda fixes the following issues:

Security issue fixed:

- CVE-2016-10729: Fixed a local privilege escalation from amanda to root via unsafe tar command options (bsc#1112916).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1112916">SUSE bug 1112916</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10729/">CVE-2016-10729 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10729">CVE-2016-10729 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570692" comment="amanda-2.5.2.1-188.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216901" version="1" class="patch">
	<metadata>
		<title>Security update for ant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1100053" ref_url="https://bugzilla.suse.com/1100053" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10886" ref_url="https://www.suse.com/security/cve/CVE-2018-10886/" source="CVE"/>
		<description>
This update for ant fixes the following security issue:

- CVE-2018-10886: Prevent arbitrary file write with specially crafted zip files
  (bsc#1100053).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-21"/>
	<updated date="2018-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100053">SUSE bug 1100053</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10886/">CVE-2018-10886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-10886">CVE-2018-10886 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570693" comment="ant-1.7.0-200.26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570694" comment="ant-trax-1.7.0-200.26.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216902" version="1" class="patch">
	<metadata>
		<title>Security update for the Apache Web Server</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="627030" ref_url="https://bugzilla.suse.com/627030" source="BUGZILLA"/>
		<reference ref_id="670027" ref_url="https://bugzilla.suse.com/670027" source="BUGZILLA"/>
		<reference ref_id="688472" ref_url="https://bugzilla.suse.com/688472" source="BUGZILLA"/>
		<reference ref_id="690734" ref_url="https://bugzilla.suse.com/690734" source="BUGZILLA"/>
		<reference ref_id="693479" ref_url="https://bugzilla.suse.com/693479" source="BUGZILLA"/>
		<reference ref_id="696251" ref_url="https://bugzilla.suse.com/696251" source="BUGZILLA"/>
		<reference ref_id="713966" ref_url="https://bugzilla.suse.com/713966" source="BUGZILLA"/>
		<reference ref_id="713970" ref_url="https://bugzilla.suse.com/713970" source="BUGZILLA"/>
		<reference ref_id="719236" ref_url="https://bugzilla.suse.com/719236" source="BUGZILLA"/>
		<reference ref_id="722545" ref_url="https://bugzilla.suse.com/722545" source="BUGZILLA"/>
		<reference ref_id="727071" ref_url="https://bugzilla.suse.com/727071" source="BUGZILLA"/>
		<reference ref_id="728533" ref_url="https://bugzilla.suse.com/728533" source="BUGZILLA"/>
		<reference ref_id="728876" ref_url="https://bugzilla.suse.com/728876" source="BUGZILLA"/>
		<reference ref_id="729181" ref_url="https://bugzilla.suse.com/729181" source="BUGZILLA"/>
		<reference ref_id="757710" ref_url="https://bugzilla.suse.com/757710" source="BUGZILLA"/>
		<reference ref_id="774045" ref_url="https://bugzilla.suse.com/774045" source="BUGZILLA"/>
		<reference ref_id="777260" ref_url="https://bugzilla.suse.com/777260" source="BUGZILLA"/>
		<reference ref_id="782956" ref_url="https://bugzilla.suse.com/782956" source="BUGZILLA"/>
		<reference ref_id="788121" ref_url="https://bugzilla.suse.com/788121" source="BUGZILLA"/>
		<reference ref_id="791794" ref_url="https://bugzilla.suse.com/791794" source="BUGZILLA"/>
		<reference ref_id="793004" ref_url="https://bugzilla.suse.com/793004" source="BUGZILLA"/>
		<reference ref_id="798733" ref_url="https://bugzilla.suse.com/798733" source="BUGZILLA"/>
		<reference ref_id="806458" ref_url="https://bugzilla.suse.com/806458" source="BUGZILLA"/>
		<reference ref_id="807152" ref_url="https://bugzilla.suse.com/807152" source="BUGZILLA"/>
		<reference ref_id="815621" ref_url="https://bugzilla.suse.com/815621" source="BUGZILLA"/>
		<reference ref_id="829056" ref_url="https://bugzilla.suse.com/829056" source="BUGZILLA"/>
		<reference ref_id="829057" ref_url="https://bugzilla.suse.com/829057" source="BUGZILLA"/>
		<reference ref_id="844212" ref_url="https://bugzilla.suse.com/844212" source="BUGZILLA"/>
		<reference ref_id="852401" ref_url="https://bugzilla.suse.com/852401" source="BUGZILLA"/>
		<reference ref_id="859916" ref_url="https://bugzilla.suse.com/859916" source="BUGZILLA"/>
		<reference ref_id="869105" ref_url="https://bugzilla.suse.com/869105" source="BUGZILLA"/>
		<reference ref_id="869106" ref_url="https://bugzilla.suse.com/869106" source="BUGZILLA"/>
		<reference ref_id="871310" ref_url="https://bugzilla.suse.com/871310" source="BUGZILLA"/>
		<reference ref_id="887765" ref_url="https://bugzilla.suse.com/887765" source="BUGZILLA"/>
		<reference ref_id="887768" ref_url="https://bugzilla.suse.com/887768" source="BUGZILLA"/>
		<reference ref_id="899836" ref_url="https://bugzilla.suse.com/899836" source="BUGZILLA"/>
		<reference ref_id="904427" ref_url="https://bugzilla.suse.com/904427" source="BUGZILLA"/>
		<reference ref_id="907339" ref_url="https://bugzilla.suse.com/907339" source="BUGZILLA"/>
		<reference ref_id="907477" ref_url="https://bugzilla.suse.com/907477" source="BUGZILLA"/>
		<reference ref_id="CVE-2003-1418" ref_url="https://www.suse.com/security/cve/CVE-2003-1418/" source="CVE"/>
		<reference ref_id="CVE-2010-1452" ref_url="https://www.suse.com/security/cve/CVE-2010-1452/" source="CVE"/>
		<reference ref_id="CVE-2011-1473" ref_url="https://www.suse.com/security/cve/CVE-2011-1473/" source="CVE"/>
		<reference ref_id="CVE-2011-3192" ref_url="https://www.suse.com/security/cve/CVE-2011-3192/" source="CVE"/>
		<reference ref_id="CVE-2011-3368" ref_url="https://www.suse.com/security/cve/CVE-2011-3368/" source="CVE"/>
		<reference ref_id="CVE-2011-3607" ref_url="https://www.suse.com/security/cve/CVE-2011-3607/" source="CVE"/>
		<reference ref_id="CVE-2011-3639" ref_url="https://www.suse.com/security/cve/CVE-2011-3639/" source="CVE"/>
		<reference ref_id="CVE-2011-4317" ref_url="https://www.suse.com/security/cve/CVE-2011-4317/" source="CVE"/>
		<reference ref_id="CVE-2012-0021" ref_url="https://www.suse.com/security/cve/CVE-2012-0021/" source="CVE"/>
		<reference ref_id="CVE-2012-0883" ref_url="https://www.suse.com/security/cve/CVE-2012-0883/" source="CVE"/>
		<reference ref_id="CVE-2012-2687" ref_url="https://www.suse.com/security/cve/CVE-2012-2687/" source="CVE"/>
		<reference ref_id="CVE-2012-3499" ref_url="https://www.suse.com/security/cve/CVE-2012-3499/" source="CVE"/>
		<reference ref_id="CVE-2012-4557" ref_url="https://www.suse.com/security/cve/CVE-2012-4557/" source="CVE"/>
		<reference ref_id="CVE-2012-4558" ref_url="https://www.suse.com/security/cve/CVE-2012-4558/" source="CVE"/>
		<reference ref_id="CVE-2013-1862" ref_url="https://www.suse.com/security/cve/CVE-2013-1862/" source="CVE"/>
		<reference ref_id="CVE-2013-1896" ref_url="https://www.suse.com/security/cve/CVE-2013-1896/" source="CVE"/>
		<reference ref_id="CVE-2013-5704" ref_url="https://www.suse.com/security/cve/CVE-2013-5704/" source="CVE"/>
		<reference ref_id="CVE-2013-6438" ref_url="https://www.suse.com/security/cve/CVE-2013-6438/" source="CVE"/>
		<reference ref_id="CVE-2014-0098" ref_url="https://www.suse.com/security/cve/CVE-2014-0098/" source="CVE"/>
		<reference ref_id="CVE-2014-0226" ref_url="https://www.suse.com/security/cve/CVE-2014-0226/" source="CVE"/>
		<reference ref_id="CVE-2014-0231" ref_url="https://www.suse.com/security/cve/CVE-2014-0231/" source="CVE"/>
		<reference ref_id="CVE-2014-3581" ref_url="https://www.suse.com/security/cve/CVE-2014-3581/" source="CVE"/>
		<description>

This update for the Apache Web Server provides the following fixes:

    * Fixed a heap-based buffer overflow on apache module mod_status.
      (bnc#887765, CVE-2014-0226)
    * Properly remove whitespace characters from CDATA sections to avoid
      remote denial of service by crashing the Apache Server process.
      (bnc#869105, CVE-2013-6438)
    * Correction to parsing of cookie content; this can lead to a crash
      with a specially designed cookie sent to the server. (bnc#869106,
      CVE-2014-0098)
    * ECC support should not be missing. (bnc#859916)

This update also introduces a new configuration parameter 
CGIDScriptTimeout, which defaults to the value of parameter Timeout. 
CGIDScriptTimeout is set to 60s if mod_cgid is loaded/active, via 
/etc/apache2/conf.d/cgid-timeout.conf. The new directive and its effect 
prevent request workers to be eaten until starvation if cgi programs do not 
send output back to the server within the timeout set by CGIDScriptTimeout. 
(bnc#887768, CVE-2014-0231)

Security Issues references:

    * CVE-2014-0226
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226&gt;
    * CVE-2013-6438
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438&gt;
    * CVE-2014-0098
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098&gt;
    * CVE-2014-0231
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-21"/>
	<updated date="2014-07-21"/>
	<bugzilla href="https://bugzilla.suse.com/627030">SUSE bug 627030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/670027">SUSE bug 670027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/688472">SUSE bug 688472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/690734">SUSE bug 690734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693479">SUSE bug 693479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/696251">SUSE bug 696251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/713966">SUSE bug 713966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/713970">SUSE bug 713970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/719236">SUSE bug 719236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/722545">SUSE bug 722545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/727071">SUSE bug 727071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/728533">SUSE bug 728533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/728876">SUSE bug 728876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/729181">SUSE bug 729181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757710">SUSE bug 757710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774045">SUSE bug 774045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777260">SUSE bug 777260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/782956">SUSE bug 782956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788121">SUSE bug 788121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791794">SUSE bug 791794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/793004">SUSE bug 793004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798733">SUSE bug 798733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806458">SUSE bug 806458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807152">SUSE bug 807152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815621">SUSE bug 815621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829056">SUSE bug 829056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829057">SUSE bug 829057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844212">SUSE bug 844212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852401">SUSE bug 852401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859916">SUSE bug 859916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869105">SUSE bug 869105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869106">SUSE bug 869106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871310">SUSE bug 871310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887765">SUSE bug 887765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887768">SUSE bug 887768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899836">SUSE bug 899836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904427">SUSE bug 904427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907339">SUSE bug 907339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907477">SUSE bug 907477</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2003-1418/">CVE-2003-1418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2003-1418">CVE-2003-1418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1452/">CVE-2010-1452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1452">CVE-2010-1452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1473/">CVE-2011-1473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1473">CVE-2011-1473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3192/">CVE-2011-3192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3192">CVE-2011-3192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3368/">CVE-2011-3368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3368">CVE-2011-3368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3607/">CVE-2011-3607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3607">CVE-2011-3607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3639/">CVE-2011-3639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3639">CVE-2011-3639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4317/">CVE-2011-4317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4317">CVE-2011-4317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0021/">CVE-2012-0021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0021">CVE-2012-0021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0883/">CVE-2012-0883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0883">CVE-2012-0883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2687/">CVE-2012-2687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2687">CVE-2012-2687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3499/">CVE-2012-3499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3499">CVE-2012-3499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4557/">CVE-2012-4557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4557">CVE-2012-4557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4558/">CVE-2012-4558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4558">CVE-2012-4558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1862/">CVE-2013-1862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1862">CVE-2013-1862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1896/">CVE-2013-1896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1896">CVE-2013-1896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5704/">CVE-2013-5704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5704">CVE-2013-5704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6438/">CVE-2013-6438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6438">CVE-2013-6438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0098/">CVE-2014-0098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0098">CVE-2014-0098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0226/">CVE-2014-0226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0226">CVE-2014-0226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0231/">CVE-2014-0231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0231">CVE-2014-0231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3581/">CVE-2014-3581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3581">CVE-2014-3581 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991217" comment="apache2-2.2.12-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991218" comment="apache2-doc-2.2.12-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991219" comment="apache2-example-pages-2.2.12-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991220" comment="apache2-prefork-2.2.12-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991221" comment="apache2-utils-2.2.12-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991222" comment="apache2-worker-2.2.12-1.46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991217" comment="apache2-2.2.12-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991218" comment="apache2-doc-2.2.12-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991219" comment="apache2-example-pages-2.2.12-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991220" comment="apache2-prefork-2.2.12-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991221" comment="apache2-utils-2.2.12-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991222" comment="apache2-worker-2.2.12-1.46.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216903" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="444878" ref_url="https://bugzilla.suse.com/444878" source="BUGZILLA"/>
		<reference ref_id="931002" ref_url="https://bugzilla.suse.com/931002" source="BUGZILLA"/>
		<reference ref_id="938728" ref_url="https://bugzilla.suse.com/938728" source="BUGZILLA"/>
		<reference ref_id="941676" ref_url="https://bugzilla.suse.com/941676" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3183" ref_url="https://www.suse.com/security/cve/CVE-2015-3183/" source="CVE"/>
		<description>
Apache was updated to fix one security vulnerability and two bugs.

Following security issue was fixed.
- Fix the chunked transfer coding implementation in the Apache (bsc#938728, CVE-2015-3183)

Bugs fixed:
- add SSLSessionTickets directive (bsc#941676)
- hardcode modules %files (bsc#444878)
- only enable the port 443 for TCP protocol, not UDP. (bsc#931002)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-01"/>
	<updated date="2015-10-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/444878">SUSE bug 444878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931002">SUSE bug 931002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938728">SUSE bug 938728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941676">SUSE bug 941676</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3183/">CVE-2015-3183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3183">CVE-2015-3183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570701" comment="apache2-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570702" comment="apache2-doc-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570703" comment="apache2-example-pages-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570704" comment="apache2-prefork-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570705" comment="apache2-utils-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570706" comment="apache2-worker-2.2.12-59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216904" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="988488" ref_url="https://bugzilla.suse.com/988488" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5387" ref_url="https://www.suse.com/security/cve/CVE-2016-5387/" source="CVE"/>
		<description>

This update for apache2 fixes the following issues:

* It used to be possible to set an arbitrary $HTTP_PROXY environment variable
  for request handlers -- like CGI scripts -- by including a specially crafted
  HTTP header in the request (CVE-2016-5387). As a result, these server
  components would potentially direct all their outgoing HTTP traffic through a
  malicious proxy server. This patch fixes the issue: the updated Apache server
  ignores such HTTP headers and never sets $HTTP_PROXY for sub-processes
  (unless a value has been explicitly configured by the administrator in the
  configuration file). (bsc#988488)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-18"/>
	<updated date="2016-07-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/988488">SUSE bug 988488</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5387/">CVE-2016-5387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5387">CVE-2016-5387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570707" comment="apache2-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570708" comment="apache2-doc-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570709" comment="apache2-example-pages-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570710" comment="apache2-prefork-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570711" comment="apache2-utils-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570712" comment="apache2-worker-2.2.12-64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216905" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1016714" ref_url="https://bugzilla.suse.com/1016714" source="BUGZILLA"/>
		<reference ref_id="1016715" ref_url="https://bugzilla.suse.com/1016715" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2161" ref_url="https://www.suse.com/security/cve/CVE-2016-2161/" source="CVE"/>
		<reference ref_id="CVE-2016-8743" ref_url="https://www.suse.com/security/cve/CVE-2016-8743/" source="CVE"/>
		<description>

This update for apache2 fixes the following issues:

Security issues fixed:
- CVE-2016-2161: Malicious input to mod_auth_digest could have caused the server to crash,
  resulting in DoS (bsc#1016714).
- CVE-2016-8743: Added new directive 'HttpProtocolOptions Strict' to avoid proxy chain
  misinterpretation (bsc#1016715).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1016714">SUSE bug 1016714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016715">SUSE bug 1016715</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2161/">CVE-2016-2161 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2161">CVE-2016-2161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8743/">CVE-2016-8743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8743">CVE-2016-8743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570713" comment="apache2-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570714" comment="apache2-doc-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570715" comment="apache2-example-pages-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570716" comment="apache2-prefork-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570717" comment="apache2-utils-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570718" comment="apache2-worker-2.2.12-69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216906" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1041830" ref_url="https://bugzilla.suse.com/1041830" source="BUGZILLA"/>
		<reference ref_id="1048576" ref_url="https://bugzilla.suse.com/1048576" source="BUGZILLA"/>
		<reference ref_id="951692" ref_url="https://bugzilla.suse.com/951692" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9788" ref_url="https://www.suse.com/security/cve/CVE-2017-9788/" source="CVE"/>
		<description>
This update provides apache2 2.2.34, which brings many fixes and enhancements:

Security issues fixed:

- CVE-2017-9788: Uninitialized memory reflection in mod_auth_digest. (bsc#1048576)

Bug fixes:

- Remove /usr/bin/http2 link only during package uninstall, not upgrade. (bsc#1041830)
- Don't put the backend in error state (by default) when 500/503 error code is overridden. (bsc#951692)
- Allow single-char field names inadvertently disallowed in 2.2.32.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-28"/>
	<updated date="2017-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1041830">SUSE bug 1041830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048576">SUSE bug 1048576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951692">SUSE bug 951692</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9788/">CVE-2017-9788 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9788">CVE-2017-9788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570719" comment="apache2-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570720" comment="apache2-doc-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570721" comment="apache2-example-pages-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570722" comment="apache2-prefork-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570723" comment="apache2-utils-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570724" comment="apache2-worker-2.2.34-70.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216907" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1045060" ref_url="https://bugzilla.suse.com/1045060" source="BUGZILLA"/>
		<reference ref_id="1045061" ref_url="https://bugzilla.suse.com/1045061" source="BUGZILLA"/>
		<reference ref_id="1045062" ref_url="https://bugzilla.suse.com/1045062" source="BUGZILLA"/>
		<reference ref_id="1045065" ref_url="https://bugzilla.suse.com/1045065" source="BUGZILLA"/>
		<reference ref_id="1052830" ref_url="https://bugzilla.suse.com/1052830" source="BUGZILLA"/>
		<reference ref_id="1058058" ref_url="https://bugzilla.suse.com/1058058" source="BUGZILLA"/>
		<reference ref_id="1064561" ref_url="https://bugzilla.suse.com/1064561" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2699" ref_url="https://www.suse.com/security/cve/CVE-2009-2699/" source="CVE"/>
		<reference ref_id="CVE-2010-0425" ref_url="https://www.suse.com/security/cve/CVE-2010-0425/" source="CVE"/>
		<reference ref_id="CVE-2012-0021" ref_url="https://www.suse.com/security/cve/CVE-2012-0021/" source="CVE"/>
		<reference ref_id="CVE-2014-0118" ref_url="https://www.suse.com/security/cve/CVE-2014-0118/" source="CVE"/>
		<reference ref_id="CVE-2017-3167" ref_url="https://www.suse.com/security/cve/CVE-2017-3167/" source="CVE"/>
		<reference ref_id="CVE-2017-3169" ref_url="https://www.suse.com/security/cve/CVE-2017-3169/" source="CVE"/>
		<reference ref_id="CVE-2017-7668" ref_url="https://www.suse.com/security/cve/CVE-2017-7668/" source="CVE"/>
		<reference ref_id="CVE-2017-7679" ref_url="https://www.suse.com/security/cve/CVE-2017-7679/" source="CVE"/>
		<reference ref_id="CVE-2017-9798" ref_url="https://www.suse.com/security/cve/CVE-2017-9798/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- Allow disabling SNI on proxy connections using 'SetEnv proxy-disable-sni 1' in the configuration files. (bsc#1052830)
- Allow ECDH again in mod_ssl, it had been incorrectly disabled with the 2.2.34 update. (bsc#1064561)

Following security issue has been fixed:

- CVE-2017-9798: A use-after-free in the OPTIONS command could be used by attackers to disclose memory of the apache server process, when htaccess uses incorrect Limit statement. (bsc#1058058)

Additionally, references to the following security issues, fixed by the previous version-update of apache2
to Apache HTTPD 2.2.34 have been added:

- CVE-2017-7668: The HTTP strict parsing introduced a bug in token list parsing, which allowed ap_find_token() to
  search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may
  have be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value. (bsc#1045061)
- CVE-2017-3169: mod_ssl may have de-referenced a NULL pointer when third-party modules call 
  ap_hook_process_connection() during an HTTP request to an HTTPS port allowing for DoS. (bsc#1045062)
- CVE-2017-3167: Use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may have
  lead to authentication requirements being bypassed. (bsc#1045065)
- CVE-2017-7679: mod_mime could have read one byte past the end of a buffer when sending a malicious Content-Type
  response header. (bsc#1045060)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-30"/>
	<updated date="2017-10-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1045060">SUSE bug 1045060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045061">SUSE bug 1045061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045062">SUSE bug 1045062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045065">SUSE bug 1045065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052830">SUSE bug 1052830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058058">SUSE bug 1058058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064561">SUSE bug 1064561</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2699/">CVE-2009-2699 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-2699">CVE-2009-2699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0425/">CVE-2010-0425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0425">CVE-2010-0425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0021/">CVE-2012-0021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0021">CVE-2012-0021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0118/">CVE-2014-0118 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0118">CVE-2014-0118 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3167/">CVE-2017-3167 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3167">CVE-2017-3167 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3169/">CVE-2017-3169 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3169">CVE-2017-3169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7668/">CVE-2017-7668 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7668">CVE-2017-7668 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7679/">CVE-2017-7679 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7679">CVE-2017-7679 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9798/">CVE-2017-9798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9798">CVE-2017-9798 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570725" comment="apache2-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570726" comment="apache2-doc-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570727" comment="apache2-example-pages-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570728" comment="apache2-prefork-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570729" comment="apache2-utils-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570730" comment="apache2-worker-2.2.34-70.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216908" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1086775" ref_url="https://bugzilla.suse.com/1086775" source="BUGZILLA"/>
		<reference ref_id="1086776" ref_url="https://bugzilla.suse.com/1086776" source="BUGZILLA"/>
		<reference ref_id="1086817" ref_url="https://bugzilla.suse.com/1086817" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15710" ref_url="https://www.suse.com/security/cve/CVE-2017-15710/" source="CVE"/>
		<reference ref_id="CVE-2018-1301" ref_url="https://www.suse.com/security/cve/CVE-2018-1301/" source="CVE"/>
		<reference ref_id="CVE-2018-1312" ref_url="https://www.suse.com/security/cve/CVE-2018-1312/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- security update:
  * CVE-2018-1301: Specially crafted requests, in debug mode, could lead to denial of service. [bsc#1086817]
  * CVE-2017-15710: failure in the language fallback handling could lead to denial of service.  [bsc#1086776]
  * CVE-2018-1312: Seed wrongly generated could lead to replay attack in cluster environments. [bsc#1086775]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-25"/>
	<updated date="2018-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086775">SUSE bug 1086775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086776">SUSE bug 1086776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086817">SUSE bug 1086817</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15710/">CVE-2017-15710 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15710">CVE-2017-15710 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1301/">CVE-2018-1301 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1301">CVE-2018-1301 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1312/">CVE-2018-1312 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1312">CVE-2018-1312 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570731" comment="apache2-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570732" comment="apache2-doc-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570733" comment="apache2-example-pages-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570734" comment="apache2-prefork-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570735" comment="apache2-utils-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570736" comment="apache2-worker-2.2.34-70.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216909" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1131239" ref_url="https://bugzilla.suse.com/1131239" source="BUGZILLA"/>
		<reference ref_id="1131241" ref_url="https://bugzilla.suse.com/1131241" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0217" ref_url="https://www.suse.com/security/cve/CVE-2019-0217/" source="CVE"/>
		<reference ref_id="CVE-2019-0220" ref_url="https://www.suse.com/security/cve/CVE-2019-0220/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

* CVE-2019-0220: The Apache HTTP server did not use a consistent strategy for
  URL normalization throughout all of its components. In particular,
  consecutive slashes were not always collapsed. Attackers could potentially
  abuse these inconsistencies to by-pass access control mechanisms and thus
  gain unauthorized access to protected parts of the service. [bsc#1131241]

* CVE-2019-0217: A race condition in Apache's 'mod_auth_digest' when running in
  a threaded server could have allowed users with valid credentials to
  authenticate using another username, bypassing configured access control
  restrictions. [bsc#1131239]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-04"/>
	<updated date="2019-04-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131239">SUSE bug 1131239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131241">SUSE bug 1131241</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-0217/">CVE-2019-0217 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0217">CVE-2019-0217 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-0220/">CVE-2019-0220 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0220">CVE-2019-0220 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570737" comment="apache2-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570738" comment="apache2-doc-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570739" comment="apache2-example-pages-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570740" comment="apache2-prefork-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570741" comment="apache2-utils-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570742" comment="apache2-worker-2.2.34-70.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216910" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1145738" ref_url="https://bugzilla.suse.com/1145738" source="BUGZILLA"/>
		<reference ref_id="1145740" ref_url="https://bugzilla.suse.com/1145740" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10092" ref_url="https://www.suse.com/security/cve/CVE-2019-10092/" source="CVE"/>
		<reference ref_id="CVE-2019-10098" ref_url="https://www.suse.com/security/cve/CVE-2019-10098/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

Security issues fixed:

- CVE-2019-10092: Fixed limited cross-site scripting in mod_proxy (bsc#1145740).
- CVE-2019-10098: Fixed mod_rewrite configuration vulnerablility to open redirect (bsc#1145738).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-16"/>
	<updated date="2019-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1145738">SUSE bug 1145738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145740">SUSE bug 1145740</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10092/">CVE-2019-10092 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10092">CVE-2019-10092 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10098/">CVE-2019-10098 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10098">CVE-2019-10098 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570743" comment="apache2-2.2.34-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570744" comment="apache2-doc-2.2.34-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570745" comment="apache2-example-pages-2.2.34-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570746" comment="apache2-prefork-2.2.34-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570747" comment="apache2-utils-2.2.34-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570748" comment="apache2-worker-2.2.34-70.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216911" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1168404" ref_url="https://bugzilla.suse.com/1168404" source="BUGZILLA"/>
		<reference ref_id="1169066" ref_url="https://bugzilla.suse.com/1169066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1934" ref_url="https://www.suse.com/security/cve/CVE-2020-1934/" source="CVE"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2020-1934: mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server (bsc#1168404).
- CVE-2020-1938: mod_proxy_ajp: Add 'secret' parameter to proxy workers to implement legacy AJP13 authentication (bsc#1169066).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-21"/>
	<updated date="2020-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168404">SUSE bug 1168404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169066">SUSE bug 1169066</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1934/">CVE-2020-1934 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1934">CVE-2020-1934 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1938">CVE-2020-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570749" comment="apache2-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570750" comment="apache2-doc-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570751" comment="apache2-example-pages-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570752" comment="apache2-prefork-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570753" comment="apache2-utils-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570754" comment="apache2-worker-2.2.34-70.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216912" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1145740" ref_url="https://bugzilla.suse.com/1145740" source="BUGZILLA"/>
		<reference ref_id="1182703" ref_url="https://bugzilla.suse.com/1182703" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10092" ref_url="https://www.suse.com/security/cve/CVE-2019-10092/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- Fixed potential content spoofing with default error pages(bsc#118270)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-12"/>
	<updated date="2021-03-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1145740">SUSE bug 1145740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182703">SUSE bug 1182703</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10092/">CVE-2019-10092 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10092">CVE-2019-10092 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570755" comment="apache2-2.2.34-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570756" comment="apache2-doc-2.2.34-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570757" comment="apache2-example-pages-2.2.34-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570758" comment="apache2-prefork-2.2.34-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570759" comment="apache2-utils-2.2.34-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570760" comment="apache2-worker-2.2.34-70.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216913" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1186922" ref_url="https://bugzilla.suse.com/1186922" source="BUGZILLA"/>
		<reference ref_id="1187174" ref_url="https://bugzilla.suse.com/1187174" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35452" ref_url="https://www.suse.com/security/cve/CVE-2020-35452/" source="CVE"/>
		<reference ref_id="CVE-2021-30641" ref_url="https://www.suse.com/security/cve/CVE-2021-30641/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- fixed CVE-2021-30641 [bsc#1187174]: MergeSlashes regression
- fixed CVE-2020-35452 [bsc#1186922]: Single zero byte stack overflow in mod_auth_digest
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186922">SUSE bug 1186922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187174">SUSE bug 1187174</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35452/">CVE-2020-35452 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35452">CVE-2020-35452 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30641/">CVE-2021-30641 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30641">CVE-2021-30641 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570761" comment="apache2-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570762" comment="apache2-doc-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570763" comment="apache2-example-pages-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570764" comment="apache2-prefork-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570765" comment="apache2-utils-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570766" comment="apache2-worker-2.2.34-70.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216914" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1190666" ref_url="https://bugzilla.suse.com/1190666" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39275" ref_url="https://www.suse.com/security/cve/CVE-2021-39275/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2021-39275: Fixed an out-of-bounds write in ap_escape_quotes() via malicious input. (bsc#1190666)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-27"/>
	<updated date="2021-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190666">SUSE bug 1190666</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39275/">CVE-2021-39275 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39275">CVE-2021-39275 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633944" comment="apache2-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633945" comment="apache2-doc-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633946" comment="apache2-example-pages-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633947" comment="apache2-prefork-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633948" comment="apache2-utils-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633949" comment="apache2-worker-2.2.34-70.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216915" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1197095" ref_url="https://bugzilla.suse.com/1197095" source="BUGZILLA"/>
		<reference ref_id="1197096" ref_url="https://bugzilla.suse.com/1197096" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22720" ref_url="https://www.suse.com/security/cve/CVE-2022-22720/" source="CVE"/>
		<reference ref_id="CVE-2022-22721" ref_url="https://www.suse.com/security/cve/CVE-2022-22721/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-22720: HTTP request smuggling due to incorrect error handling (bsc#1197095).
- CVE-2022-22721: possible buffer overflow with very large or unlimited LimitXMLRequestBody (bsc#1197096).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197095">SUSE bug 1197095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197096">SUSE bug 1197096</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22720/">CVE-2022-22720 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22720">CVE-2022-22720 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22721/">CVE-2022-22721 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22721">CVE-2022-22721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673620" comment="apache2-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673621" comment="apache2-doc-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673622" comment="apache2-example-pages-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673623" comment="apache2-prefork-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673624" comment="apache2-utils-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673625" comment="apache2-worker-2.2.34-70.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216916" version="1" class="patch">
	<metadata>
		<title>Security update for Apache2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="728876" ref_url="https://bugzilla.suse.com/728876" source="BUGZILLA"/>
		<reference ref_id="738067" ref_url="https://bugzilla.suse.com/738067" source="BUGZILLA"/>
		<reference ref_id="738855" ref_url="https://bugzilla.suse.com/738855" source="BUGZILLA"/>
		<reference ref_id="739783" ref_url="https://bugzilla.suse.com/739783" source="BUGZILLA"/>
		<reference ref_id="741243" ref_url="https://bugzilla.suse.com/741243" source="BUGZILLA"/>
		<reference ref_id="741874" ref_url="https://bugzilla.suse.com/741874" source="BUGZILLA"/>
		<reference ref_id="743743" ref_url="https://bugzilla.suse.com/743743" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-6750" ref_url="https://www.suse.com/security/cve/CVE-2007-6750/" source="CVE"/>
		<reference ref_id="CVE-2012-0031" ref_url="https://www.suse.com/security/cve/CVE-2012-0031/" source="CVE"/>
		<reference ref_id="CVE-2012-0053" ref_url="https://www.suse.com/security/cve/CVE-2012-0053/" source="CVE"/>
		<description>

This update of apache2 and libapr1 fixes regressions and several security 
problems.

    * CVE-2012-0031: Fixed a scoreboard corruption (shared mem segment) by
      child causes crash of privileged parent (invalid free()) during
      shutdown.
    * CVE-2012-0053: Fixed an issue in error responses that could expose
      'httpOnly' cookies when no custom ErrorDocument is specified for
      status code 400'.
    * CVE-2007-6750: The 'mod_reqtimeout' module was backported from Apache
      2.2.21 to help mitigate the 'Slowloris' Denial of Service attack.

You need to enable the 'mod_reqtimeout' module in your existing apache 
configuration to make it effective, e.g. in the APACHE_MODULES line in 
/etc/sysconfig/apache2.
For more detailed information, check also the README file.

Also the following bugs have been fixed:

    * Fixed init script action 'check-reload' to avoid potential crashes.
      bnc#728876
    * An overlapping memcpy() was replaced by memmove() to make this work
      with newer glibcs. bnc#738067 bnc#741874
    * libapr1: reset errno to zero to not return previous value despite
      good status of new operation. bnc#739783

Security Issue references:

    * CVE-2007-6750
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750&gt;
    * CVE-2012-0031
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0031&gt;
    * CVE-2012-0053
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0053&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-03"/>
	<updated date="2012-02-03"/>
	<bugzilla href="https://bugzilla.suse.com/728876">SUSE bug 728876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/738067">SUSE bug 738067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/738855">SUSE bug 738855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/739783">SUSE bug 739783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/741243">SUSE bug 741243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/741874">SUSE bug 741874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/743743">SUSE bug 743743</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6750/">CVE-2007-6750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6750">CVE-2007-6750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0031/">CVE-2012-0031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0031">CVE-2012-0031 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0053/">CVE-2012-0053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0053">CVE-2012-0053 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991223" comment="apache2-2.2.12-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991224" comment="apache2-doc-2.2.12-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991225" comment="apache2-example-pages-2.2.12-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991226" comment="apache2-prefork-2.2.12-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991227" comment="apache2-utils-2.2.12-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991228" comment="apache2-worker-2.2.12-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991229" comment="libapr1-1.3.3-11.18.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216917" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_jk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1114612" ref_url="https://bugzilla.suse.com/1114612" source="BUGZILLA"/>
		<reference ref_id="927845" ref_url="https://bugzilla.suse.com/927845" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8111" ref_url="https://www.suse.com/security/cve/CVE-2014-8111/" source="CVE"/>
		<reference ref_id="CVE-2018-11759" ref_url="https://www.suse.com/security/cve/CVE-2018-11759/" source="CVE"/>
		<description>

This update for apache2-mod_jk fixes the following issues:

Security issues fixed:

- CVE-2018-11759: Fixed connector path traversal due to mishandled HTTP requests in httpd (bsc#1114612).
- CVE-2014-8111: Apache Tomcat Connectors (mod_jk) ignored JkUnmount rules for subtrees of previous JkMount rules, which allowed remote attackers to access otherwise restricted artifacts via unspecified vectors (bsc#927845).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-03"/>
	<updated date="2018-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1114612">SUSE bug 1114612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927845">SUSE bug 927845</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8111/">CVE-2014-8111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8111">CVE-2014-8111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11759/">CVE-2018-11759 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11759">CVE-2018-11759 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570775" comment="apache2-mod_jk-1.2.40-0.2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216918" version="1" class="patch">
	<metadata>
		<title>Recommended update for apache2-mod_nss</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="847216" ref_url="https://bugzilla.suse.com/847216" source="BUGZILLA"/>
		<reference ref_id="853039" ref_url="https://bugzilla.suse.com/853039" source="BUGZILLA"/>
		<reference ref_id="863035" ref_url="https://bugzilla.suse.com/863035" source="BUGZILLA"/>
		<reference ref_id="863518" ref_url="https://bugzilla.suse.com/863518" source="BUGZILLA"/>
		<reference ref_id="864929" ref_url="https://bugzilla.suse.com/864929" source="BUGZILLA"/>
		<reference ref_id="878681" ref_url="https://bugzilla.suse.com/878681" source="BUGZILLA"/>
		<reference ref_id="897712" ref_url="https://bugzilla.suse.com/897712" source="BUGZILLA"/>
		<reference ref_id="902068" ref_url="https://bugzilla.suse.com/902068" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4566" ref_url="https://www.suse.com/security/cve/CVE-2013-4566/" source="CVE"/>
		<description>

This update brings several improvements to apache2-mod_nss.

    * 

      More TLS 1.2 ciphers have been added, including AES-GCM and Camelia
      ciphers. These can be selected by their tags:

          o rsa_aes_128_sha256
          o rsa_aes_128_gcm_sha
          o rsa_aes_256_sha256
          o rsa_camellia_128_sha
          o rsa_camellia_256_sha
          o ecdh_ecdsa_aes_128_gcm_sha
          o ecdhe_ecdsa_aes_128_sha256
          o ecdhe_ecdsa_aes_128_gcm_sha
          o ecdh_rsa_aes_128_gcm_sha
          o ecdhe_rsa_aes_128_sha256
    * 

      The mod_nss.conf.in template was updated to include those ciphers.
      (bnc#863035)

    * 

      VirtualHost settings in /etc/apache2/conf.d/mod_nss.conf is now
      externalized to /etc/apache2/vhosts.d/vhost-nss.template and not
      activated/read by default. (bnc#878681)

    * 

      The Server Name Indication (SNI) extension was implemented.

    * 

      Reading the pass phrase during start-up was improved. (bnc#863518)

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-22"/>
	<updated date="2014-08-22"/>
	<bugzilla href="https://bugzilla.suse.com/847216">SUSE bug 847216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853039">SUSE bug 853039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863035">SUSE bug 863035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863518">SUSE bug 863518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864929">SUSE bug 864929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878681">SUSE bug 878681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897712">SUSE bug 897712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902068">SUSE bug 902068</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4566/">CVE-2013-4566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4566">CVE-2013-4566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991230" comment="apache2-mod_nss-1.0.8-0.4.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216919" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="975394" ref_url="https://bugzilla.suse.com/975394" source="BUGZILLA"/>
		<reference ref_id="979688" ref_url="https://bugzilla.suse.com/979688" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4566" ref_url="https://www.suse.com/security/cve/CVE-2013-4566/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<description>

This update provides apache2-mod_nss 1.0.14, which brings several fixes and
enhancements:

- SHA256 cipher names change spelling from *_sha256 to *_sha_256.
- Drop mod_nss_migrate.pl and use upstream migrate script instead.
- Check for Apache user owner/group read permissions of NSS database at startup.
- Update default ciphers to something more modern and secure.
- Check for host and netstat commands in gencert before trying to use them.
- Don't ignore NSSProtocol when NSSFIPS is enabled.
- Use proper shell syntax to avoid creating /0 in gencert.
- Add server support for DHE ciphers.
- Extract SAN from server/client certificates into env.
- Fix memory leaks and other coding issues caught by clang analyzer.
- Add support for Server Name Indication (SNI)
- Add support for SNI for reverse proxy connections.
- Add RenegBufferSize? option.
- Add support for TLS Session Tickets (RFC 5077).
- Implement a slew more OpenSSL cipher macros.
- Fix a number of illegal memory accesses and memory leaks.
- Support for SHA384 ciphers if they are available in the version of NSS mod_nss is built against.
- Add the SECURE_RENEG environment variable.
- Add some hints when NSS database cannot be initialized.
- Code cleanup including trailing whitespace and compiler warnings.
- Modernize autotools configuration slightly, add config.h.
- Add small test suite for SNI.
- Add compatibility for mod_ssl-style cipher definitions.
- Add Camelia ciphers.
- Remove Fortezza ciphers.
- Add TLSv1.2-specific ciphers.
- Initialize cipher list when re-negotiating handshake.
- Completely remove support for SSLv2.
- Add support for sqlite NSS databases.
- Compare subject CN and VS hostname during server start up.
- Add support for enabling TLS v1.2.
- Don't enable SSL 3 by default. (CVE-2014-3566)
- Improve protocol testing.
- Add nss_pcache man page.
- Fix argument handling in nss_pcache.
- Support httpd 2.4+.
- Allow users to configure a helper to ask for certificate passphrases via
  NSSPassPhraseDialog. (bsc#975394)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-16"/>
	<updated date="2016-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/975394">SUSE bug 975394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979688">SUSE bug 979688</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4566/">CVE-2013-4566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4566">CVE-2013-4566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570776" comment="apache2-mod_nss-1.0.14-0.4.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216920" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1156944" ref_url="https://bugzilla.suse.com/1156944" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2767" ref_url="https://www.suse.com/security/cve/CVE-2011-2767/" source="CVE"/>
		<description>
This update for apache2-mod_perl fixes the following issues:

- CVE-2011-2767: Fixed a vulnerability which could have allowed 
  perl code execution in the context of user account (bsc#1156944).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1156944">SUSE bug 1156944</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2011-2767/">CVE-2011-2767 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2767">CVE-2011-2767 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570777" comment="apache2-mod_perl-2.0.4-40.63.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216921" version="1" class="patch">
	<metadata>
		<title>Security update for php5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="588975" ref_url="https://bugzilla.suse.com/588975" source="BUGZILLA"/>
		<reference ref_id="642291" ref_url="https://bugzilla.suse.com/642291" source="BUGZILLA"/>
		<reference ref_id="649210" ref_url="https://bugzilla.suse.com/649210" source="BUGZILLA"/>
		<reference ref_id="650700" ref_url="https://bugzilla.suse.com/650700" source="BUGZILLA"/>
		<reference ref_id="655968" ref_url="https://bugzilla.suse.com/655968" source="BUGZILLA"/>
		<reference ref_id="656523" ref_url="https://bugzilla.suse.com/656523" source="BUGZILLA"/>
		<reference ref_id="662932" ref_url="https://bugzilla.suse.com/662932" source="BUGZILLA"/>
		<reference ref_id="666512" ref_url="https://bugzilla.suse.com/666512" source="BUGZILLA"/>
		<reference ref_id="669162" ref_url="https://bugzilla.suse.com/669162" source="BUGZILLA"/>
		<reference ref_id="669188" ref_url="https://bugzilla.suse.com/669188" source="BUGZILLA"/>
		<reference ref_id="669189" ref_url="https://bugzilla.suse.com/669189" source="BUGZILLA"/>
		<reference ref_id="671710" ref_url="https://bugzilla.suse.com/671710" source="BUGZILLA"/>
		<reference ref_id="677782" ref_url="https://bugzilla.suse.com/677782" source="BUGZILLA"/>
		<reference ref_id="679278" ref_url="https://bugzilla.suse.com/679278" source="BUGZILLA"/>
		<reference ref_id="681194" ref_url="https://bugzilla.suse.com/681194" source="BUGZILLA"/>
		<reference ref_id="681210" ref_url="https://bugzilla.suse.com/681210" source="BUGZILLA"/>
		<reference ref_id="681214" ref_url="https://bugzilla.suse.com/681214" source="BUGZILLA"/>
		<reference ref_id="681291" ref_url="https://bugzilla.suse.com/681291" source="BUGZILLA"/>
		<reference ref_id="695689" ref_url="https://bugzilla.suse.com/695689" source="BUGZILLA"/>
		<reference ref_id="699711" ref_url="https://bugzilla.suse.com/699711" source="BUGZILLA"/>
		<reference ref_id="709549" ref_url="https://bugzilla.suse.com/709549" source="BUGZILLA"/>
		<reference ref_id="713652" ref_url="https://bugzilla.suse.com/713652" source="BUGZILLA"/>
		<reference ref_id="728671" ref_url="https://bugzilla.suse.com/728671" source="BUGZILLA"/>
		<reference ref_id="733590" ref_url="https://bugzilla.suse.com/733590" source="BUGZILLA"/>
		<reference ref_id="735613" ref_url="https://bugzilla.suse.com/735613" source="BUGZILLA"/>
		<reference ref_id="736169" ref_url="https://bugzilla.suse.com/736169" source="BUGZILLA"/>
		<reference ref_id="738221" ref_url="https://bugzilla.suse.com/738221" source="BUGZILLA"/>
		<reference ref_id="741520" ref_url="https://bugzilla.suse.com/741520" source="BUGZILLA"/>
		<reference ref_id="741859" ref_url="https://bugzilla.suse.com/741859" source="BUGZILLA"/>
		<reference ref_id="742273" ref_url="https://bugzilla.suse.com/742273" source="BUGZILLA"/>
		<reference ref_id="742806" ref_url="https://bugzilla.suse.com/742806" source="BUGZILLA"/>
		<reference ref_id="743308" ref_url="https://bugzilla.suse.com/743308" source="BUGZILLA"/>
		<reference ref_id="744966" ref_url="https://bugzilla.suse.com/744966" source="BUGZILLA"/>
		<reference ref_id="746661" ref_url="https://bugzilla.suse.com/746661" source="BUGZILLA"/>
		<reference ref_id="749111" ref_url="https://bugzilla.suse.com/749111" source="BUGZILLA"/>
		<reference ref_id="752030" ref_url="https://bugzilla.suse.com/752030" source="BUGZILLA"/>
		<reference ref_id="753778" ref_url="https://bugzilla.suse.com/753778" source="BUGZILLA"/>
		<reference ref_id="760536" ref_url="https://bugzilla.suse.com/760536" source="BUGZILLA"/>
		<reference ref_id="761631" ref_url="https://bugzilla.suse.com/761631" source="BUGZILLA"/>
		<reference ref_id="772580" ref_url="https://bugzilla.suse.com/772580" source="BUGZILLA"/>
		<reference ref_id="772582" ref_url="https://bugzilla.suse.com/772582" source="BUGZILLA"/>
		<reference ref_id="775852" ref_url="https://bugzilla.suse.com/775852" source="BUGZILLA"/>
		<reference ref_id="778003" ref_url="https://bugzilla.suse.com/778003" source="BUGZILLA"/>
		<reference ref_id="783239" ref_url="https://bugzilla.suse.com/783239" source="BUGZILLA"/>
		<reference ref_id="807707" ref_url="https://bugzilla.suse.com/807707" source="BUGZILLA"/>
		<reference ref_id="828020" ref_url="https://bugzilla.suse.com/828020" source="BUGZILLA"/>
		<reference ref_id="829207" ref_url="https://bugzilla.suse.com/829207" source="BUGZILLA"/>
		<reference ref_id="837746" ref_url="https://bugzilla.suse.com/837746" source="BUGZILLA"/>
		<reference ref_id="854880" ref_url="https://bugzilla.suse.com/854880" source="BUGZILLA"/>
		<reference ref_id="868624" ref_url="https://bugzilla.suse.com/868624" source="BUGZILLA"/>
		<reference ref_id="882992" ref_url="https://bugzilla.suse.com/882992" source="BUGZILLA"/>
		<reference ref_id="884992" ref_url="https://bugzilla.suse.com/884992" source="BUGZILLA"/>
		<reference ref_id="885961" ref_url="https://bugzilla.suse.com/885961" source="BUGZILLA"/>
		<reference ref_id="893849" ref_url="https://bugzilla.suse.com/893849" source="BUGZILLA"/>
		<reference ref_id="893853" ref_url="https://bugzilla.suse.com/893853" source="BUGZILLA"/>
		<reference ref_id="902357" ref_url="https://bugzilla.suse.com/902357" source="BUGZILLA"/>
		<reference ref_id="902360" ref_url="https://bugzilla.suse.com/902360" source="BUGZILLA"/>
		<reference ref_id="902368" ref_url="https://bugzilla.suse.com/902368" source="BUGZILLA"/>
		<reference ref_id="910659" ref_url="https://bugzilla.suse.com/910659" source="BUGZILLA"/>
		<reference ref_id="914690" ref_url="https://bugzilla.suse.com/914690" source="BUGZILLA"/>
		<reference ref_id="922452" ref_url="https://bugzilla.suse.com/922452" source="BUGZILLA"/>
		<reference ref_id="923946" ref_url="https://bugzilla.suse.com/923946" source="BUGZILLA"/>
		<reference ref_id="924972" ref_url="https://bugzilla.suse.com/924972" source="BUGZILLA"/>
		<reference ref_id="925109" ref_url="https://bugzilla.suse.com/925109" source="BUGZILLA"/>
		<reference ref_id="931421" ref_url="https://bugzilla.suse.com/931421" source="BUGZILLA"/>
		<reference ref_id="931772" ref_url="https://bugzilla.suse.com/931772" source="BUGZILLA"/>
		<reference ref_id="931776" ref_url="https://bugzilla.suse.com/931776" source="BUGZILLA"/>
		<reference ref_id="933227" ref_url="https://bugzilla.suse.com/933227" source="BUGZILLA"/>
		<reference ref_id="935224" ref_url="https://bugzilla.suse.com/935224" source="BUGZILLA"/>
		<reference ref_id="935226" ref_url="https://bugzilla.suse.com/935226" source="BUGZILLA"/>
		<reference ref_id="935227" ref_url="https://bugzilla.suse.com/935227" source="BUGZILLA"/>
		<reference ref_id="935232" ref_url="https://bugzilla.suse.com/935232" source="BUGZILLA"/>
		<reference ref_id="935234" ref_url="https://bugzilla.suse.com/935234" source="BUGZILLA"/>
		<reference ref_id="935274" ref_url="https://bugzilla.suse.com/935274" source="BUGZILLA"/>
		<reference ref_id="935275" ref_url="https://bugzilla.suse.com/935275" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0397" ref_url="https://www.suse.com/security/cve/CVE-2010-0397/" source="CVE"/>
		<reference ref_id="CVE-2010-1866" ref_url="https://www.suse.com/security/cve/CVE-2010-1866/" source="CVE"/>
		<reference ref_id="CVE-2010-2094" ref_url="https://www.suse.com/security/cve/CVE-2010-2094/" source="CVE"/>
		<reference ref_id="CVE-2010-3710" ref_url="https://www.suse.com/security/cve/CVE-2010-3710/" source="CVE"/>
		<reference ref_id="CVE-2010-3870" ref_url="https://www.suse.com/security/cve/CVE-2010-3870/" source="CVE"/>
		<reference ref_id="CVE-2010-4150" ref_url="https://www.suse.com/security/cve/CVE-2010-4150/" source="CVE"/>
		<reference ref_id="CVE-2010-4645" ref_url="https://www.suse.com/security/cve/CVE-2010-4645/" source="CVE"/>
		<reference ref_id="CVE-2010-4697" ref_url="https://www.suse.com/security/cve/CVE-2010-4697/" source="CVE"/>
		<reference ref_id="CVE-2010-4698" ref_url="https://www.suse.com/security/cve/CVE-2010-4698/" source="CVE"/>
		<reference ref_id="CVE-2010-4699" ref_url="https://www.suse.com/security/cve/CVE-2010-4699/" source="CVE"/>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<reference ref_id="CVE-2011-0708" ref_url="https://www.suse.com/security/cve/CVE-2011-0708/" source="CVE"/>
		<reference ref_id="CVE-2011-0752" ref_url="https://www.suse.com/security/cve/CVE-2011-0752/" source="CVE"/>
		<reference ref_id="CVE-2011-0753" ref_url="https://www.suse.com/security/cve/CVE-2011-0753/" source="CVE"/>
		<reference ref_id="CVE-2011-0755" ref_url="https://www.suse.com/security/cve/CVE-2011-0755/" source="CVE"/>
		<reference ref_id="CVE-2011-1072" ref_url="https://www.suse.com/security/cve/CVE-2011-1072/" source="CVE"/>
		<reference ref_id="CVE-2011-1092" ref_url="https://www.suse.com/security/cve/CVE-2011-1092/" source="CVE"/>
		<reference ref_id="CVE-2011-1148" ref_url="https://www.suse.com/security/cve/CVE-2011-1148/" source="CVE"/>
		<reference ref_id="CVE-2011-1398" ref_url="https://www.suse.com/security/cve/CVE-2011-1398/" source="CVE"/>
		<reference ref_id="CVE-2011-1464" ref_url="https://www.suse.com/security/cve/CVE-2011-1464/" source="CVE"/>
		<reference ref_id="CVE-2011-1466" ref_url="https://www.suse.com/security/cve/CVE-2011-1466/" source="CVE"/>
		<reference ref_id="CVE-2011-1467" ref_url="https://www.suse.com/security/cve/CVE-2011-1467/" source="CVE"/>
		<reference ref_id="CVE-2011-1468" ref_url="https://www.suse.com/security/cve/CVE-2011-1468/" source="CVE"/>
		<reference ref_id="CVE-2011-1469" ref_url="https://www.suse.com/security/cve/CVE-2011-1469/" source="CVE"/>
		<reference ref_id="CVE-2011-1470" ref_url="https://www.suse.com/security/cve/CVE-2011-1470/" source="CVE"/>
		<reference ref_id="CVE-2011-1471" ref_url="https://www.suse.com/security/cve/CVE-2011-1471/" source="CVE"/>
		<reference ref_id="CVE-2011-1938" ref_url="https://www.suse.com/security/cve/CVE-2011-1938/" source="CVE"/>
		<reference ref_id="CVE-2011-2202" ref_url="https://www.suse.com/security/cve/CVE-2011-2202/" source="CVE"/>
		<reference ref_id="CVE-2011-3182" ref_url="https://www.suse.com/security/cve/CVE-2011-3182/" source="CVE"/>
		<reference ref_id="CVE-2011-4153" ref_url="https://www.suse.com/security/cve/CVE-2011-4153/" source="CVE"/>
		<reference ref_id="CVE-2011-4388" ref_url="https://www.suse.com/security/cve/CVE-2011-4388/" source="CVE"/>
		<reference ref_id="CVE-2011-4566" ref_url="https://www.suse.com/security/cve/CVE-2011-4566/" source="CVE"/>
		<reference ref_id="CVE-2011-4885" ref_url="https://www.suse.com/security/cve/CVE-2011-4885/" source="CVE"/>
		<reference ref_id="CVE-2012-0057" ref_url="https://www.suse.com/security/cve/CVE-2012-0057/" source="CVE"/>
		<reference ref_id="CVE-2012-0781" ref_url="https://www.suse.com/security/cve/CVE-2012-0781/" source="CVE"/>
		<reference ref_id="CVE-2012-0788" ref_url="https://www.suse.com/security/cve/CVE-2012-0788/" source="CVE"/>
		<reference ref_id="CVE-2012-0789" ref_url="https://www.suse.com/security/cve/CVE-2012-0789/" source="CVE"/>
		<reference ref_id="CVE-2012-0807" ref_url="https://www.suse.com/security/cve/CVE-2012-0807/" source="CVE"/>
		<reference ref_id="CVE-2012-0830" ref_url="https://www.suse.com/security/cve/CVE-2012-0830/" source="CVE"/>
		<reference ref_id="CVE-2012-0831" ref_url="https://www.suse.com/security/cve/CVE-2012-0831/" source="CVE"/>
		<reference ref_id="CVE-2012-1172" ref_url="https://www.suse.com/security/cve/CVE-2012-1172/" source="CVE"/>
		<reference ref_id="CVE-2012-1823" ref_url="https://www.suse.com/security/cve/CVE-2012-1823/" source="CVE"/>
		<reference ref_id="CVE-2012-2311" ref_url="https://www.suse.com/security/cve/CVE-2012-2311/" source="CVE"/>
		<reference ref_id="CVE-2012-2335" ref_url="https://www.suse.com/security/cve/CVE-2012-2335/" source="CVE"/>
		<reference ref_id="CVE-2012-2336" ref_url="https://www.suse.com/security/cve/CVE-2012-2336/" source="CVE"/>
		<reference ref_id="CVE-2012-2688" ref_url="https://www.suse.com/security/cve/CVE-2012-2688/" source="CVE"/>
		<reference ref_id="CVE-2012-3365" ref_url="https://www.suse.com/security/cve/CVE-2012-3365/" source="CVE"/>
		<reference ref_id="CVE-2013-4113" ref_url="https://www.suse.com/security/cve/CVE-2013-4113/" source="CVE"/>
		<reference ref_id="CVE-2013-4248" ref_url="https://www.suse.com/security/cve/CVE-2013-4248/" source="CVE"/>
		<reference ref_id="CVE-2013-6420" ref_url="https://www.suse.com/security/cve/CVE-2013-6420/" source="CVE"/>
		<reference ref_id="CVE-2013-6712" ref_url="https://www.suse.com/security/cve/CVE-2013-6712/" source="CVE"/>
		<reference ref_id="CVE-2014-2497" ref_url="https://www.suse.com/security/cve/CVE-2014-2497/" source="CVE"/>
		<reference ref_id="CVE-2014-3515" ref_url="https://www.suse.com/security/cve/CVE-2014-3515/" source="CVE"/>
		<reference ref_id="CVE-2014-3668" ref_url="https://www.suse.com/security/cve/CVE-2014-3668/" source="CVE"/>
		<reference ref_id="CVE-2014-3669" ref_url="https://www.suse.com/security/cve/CVE-2014-3669/" source="CVE"/>
		<reference ref_id="CVE-2014-3670" ref_url="https://www.suse.com/security/cve/CVE-2014-3670/" source="CVE"/>
		<reference ref_id="CVE-2014-4049" ref_url="https://www.suse.com/security/cve/CVE-2014-4049/" source="CVE"/>
		<reference ref_id="CVE-2014-4721" ref_url="https://www.suse.com/security/cve/CVE-2014-4721/" source="CVE"/>
		<reference ref_id="CVE-2014-5459" ref_url="https://www.suse.com/security/cve/CVE-2014-5459/" source="CVE"/>
		<reference ref_id="CVE-2014-8142" ref_url="https://www.suse.com/security/cve/CVE-2014-8142/" source="CVE"/>
		<reference ref_id="CVE-2014-9709" ref_url="https://www.suse.com/security/cve/CVE-2014-9709/" source="CVE"/>
		<reference ref_id="CVE-2015-0231" ref_url="https://www.suse.com/security/cve/CVE-2015-0231/" source="CVE"/>
		<reference ref_id="CVE-2015-0232" ref_url="https://www.suse.com/security/cve/CVE-2015-0232/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2787" ref_url="https://www.suse.com/security/cve/CVE-2015-2787/" source="CVE"/>
		<reference ref_id="CVE-2015-3411" ref_url="https://www.suse.com/security/cve/CVE-2015-3411/" source="CVE"/>
		<reference ref_id="CVE-2015-3412" ref_url="https://www.suse.com/security/cve/CVE-2015-3412/" source="CVE"/>
		<reference ref_id="CVE-2015-4022" ref_url="https://www.suse.com/security/cve/CVE-2015-4022/" source="CVE"/>
		<reference ref_id="CVE-2015-4024" ref_url="https://www.suse.com/security/cve/CVE-2015-4024/" source="CVE"/>
		<reference ref_id="CVE-2015-4026" ref_url="https://www.suse.com/security/cve/CVE-2015-4026/" source="CVE"/>
		<reference ref_id="CVE-2015-4148" ref_url="https://www.suse.com/security/cve/CVE-2015-4148/" source="CVE"/>
		<reference ref_id="CVE-2015-4598" ref_url="https://www.suse.com/security/cve/CVE-2015-4598/" source="CVE"/>
		<reference ref_id="CVE-2015-4599" ref_url="https://www.suse.com/security/cve/CVE-2015-4599/" source="CVE"/>
		<reference ref_id="CVE-2015-4600" ref_url="https://www.suse.com/security/cve/CVE-2015-4600/" source="CVE"/>
		<reference ref_id="CVE-2015-4601" ref_url="https://www.suse.com/security/cve/CVE-2015-4601/" source="CVE"/>
		<reference ref_id="CVE-2015-4602" ref_url="https://www.suse.com/security/cve/CVE-2015-4602/" source="CVE"/>
		<reference ref_id="CVE-2015-4603" ref_url="https://www.suse.com/security/cve/CVE-2015-4603/" source="CVE"/>
		<reference ref_id="CVE-2015-4643" ref_url="https://www.suse.com/security/cve/CVE-2015-4643/" source="CVE"/>
		<reference ref_id="CVE-2015-4644" ref_url="https://www.suse.com/security/cve/CVE-2015-4644/" source="CVE"/>
		<description>

This update fixes the following vulnerabilities in php:

    * Heap corruption issue in exif_thumbnail(). (CVE-2014-3670)
    * Integer overflow in unserialize(). (CVE-2014-3669)
    * Xmlrpc ISO8601 date format parsing out-of-bounds read in mkgmtime().
      (CVE-2014-3668)

Security Issues:

    * CVE-2014-3669
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3669&gt;
    * CVE-2014-3670
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3670&gt;
    * CVE-2014-3668
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3668&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-04"/>
	<updated date="2014-11-04"/>
	<bugzilla href="https://bugzilla.suse.com/588975">SUSE bug 588975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/642291">SUSE bug 642291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649210">SUSE bug 649210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/650700">SUSE bug 650700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/655968">SUSE bug 655968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/656523">SUSE bug 656523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662932">SUSE bug 662932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/666512">SUSE bug 666512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/669162">SUSE bug 669162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/669188">SUSE bug 669188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/669189">SUSE bug 669189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/671710">SUSE bug 671710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/677782">SUSE bug 677782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/679278">SUSE bug 679278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/681194">SUSE bug 681194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/681210">SUSE bug 681210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/681214">SUSE bug 681214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/681291">SUSE bug 681291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/695689">SUSE bug 695689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/699711">SUSE bug 699711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/709549">SUSE bug 709549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/713652">SUSE bug 713652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/728671">SUSE bug 728671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/733590">SUSE bug 733590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/735613">SUSE bug 735613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/736169">SUSE bug 736169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/738221">SUSE bug 738221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/741520">SUSE bug 741520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/741859">SUSE bug 741859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742273">SUSE bug 742273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742806">SUSE bug 742806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/743308">SUSE bug 743308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744966">SUSE bug 744966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746661">SUSE bug 746661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749111">SUSE bug 749111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752030">SUSE bug 752030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/753778">SUSE bug 753778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760536">SUSE bug 760536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761631">SUSE bug 761631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772580">SUSE bug 772580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772582">SUSE bug 772582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775852">SUSE bug 775852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778003">SUSE bug 778003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/783239">SUSE bug 783239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807707">SUSE bug 807707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828020">SUSE bug 828020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829207">SUSE bug 829207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/837746">SUSE bug 837746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854880">SUSE bug 854880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868624">SUSE bug 868624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882992">SUSE bug 882992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884992">SUSE bug 884992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885961">SUSE bug 885961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893849">SUSE bug 893849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893853">SUSE bug 893853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902357">SUSE bug 902357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902360">SUSE bug 902360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902368">SUSE bug 902368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910659">SUSE bug 910659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914690">SUSE bug 914690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922452">SUSE bug 922452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923946">SUSE bug 923946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924972">SUSE bug 924972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925109">SUSE bug 925109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931421">SUSE bug 931421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931772">SUSE bug 931772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931776">SUSE bug 931776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933227">SUSE bug 933227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935224">SUSE bug 935224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935226">SUSE bug 935226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935227">SUSE bug 935227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935232">SUSE bug 935232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935234">SUSE bug 935234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935274">SUSE bug 935274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935275">SUSE bug 935275</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0397/">CVE-2010-0397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0397">CVE-2010-0397 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1866/">CVE-2010-1866 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1866">CVE-2010-1866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2094/">CVE-2010-2094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2094">CVE-2010-2094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3710/">CVE-2010-3710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3710">CVE-2010-3710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3870/">CVE-2010-3870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3870">CVE-2010-3870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4150/">CVE-2010-4150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4150">CVE-2010-4150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4645/">CVE-2010-4645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4645">CVE-2010-4645 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4697/">CVE-2010-4697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4697">CVE-2010-4697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4698/">CVE-2010-4698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4698">CVE-2010-4698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4699/">CVE-2010-4699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4699">CVE-2010-4699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0421">CVE-2011-0421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0708/">CVE-2011-0708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0708">CVE-2011-0708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0752/">CVE-2011-0752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0752">CVE-2011-0752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0753/">CVE-2011-0753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0753">CVE-2011-0753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0755/">CVE-2011-0755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0755">CVE-2011-0755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1072/">CVE-2011-1072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1072">CVE-2011-1072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1092/">CVE-2011-1092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1092">CVE-2011-1092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1148/">CVE-2011-1148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1148">CVE-2011-1148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1398/">CVE-2011-1398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1398">CVE-2011-1398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1464/">CVE-2011-1464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1464">CVE-2011-1464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1466/">CVE-2011-1466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1466">CVE-2011-1466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1467/">CVE-2011-1467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1467">CVE-2011-1467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1468/">CVE-2011-1468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1468">CVE-2011-1468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1469/">CVE-2011-1469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1469">CVE-2011-1469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1470/">CVE-2011-1470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1470">CVE-2011-1470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1471/">CVE-2011-1471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1471">CVE-2011-1471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1938/">CVE-2011-1938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1938">CVE-2011-1938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2202/">CVE-2011-2202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2202">CVE-2011-2202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3182/">CVE-2011-3182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3182">CVE-2011-3182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4153/">CVE-2011-4153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4153">CVE-2011-4153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4388/">CVE-2011-4388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4388">CVE-2011-4388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4566/">CVE-2011-4566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4566">CVE-2011-4566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4885/">CVE-2011-4885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4885">CVE-2011-4885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0057/">CVE-2012-0057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0057">CVE-2012-0057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0781/">CVE-2012-0781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0781">CVE-2012-0781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0788/">CVE-2012-0788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0788">CVE-2012-0788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0789/">CVE-2012-0789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0789">CVE-2012-0789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0807/">CVE-2012-0807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0807">CVE-2012-0807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0830/">CVE-2012-0830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0830">CVE-2012-0830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0831/">CVE-2012-0831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0831">CVE-2012-0831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1172/">CVE-2012-1172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1172">CVE-2012-1172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1823/">CVE-2012-1823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1823">CVE-2012-1823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2311/">CVE-2012-2311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2311">CVE-2012-2311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2335/">CVE-2012-2335 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2335">CVE-2012-2335 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2336/">CVE-2012-2336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2336">CVE-2012-2336 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2688/">CVE-2012-2688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2688">CVE-2012-2688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3365/">CVE-2012-3365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3365">CVE-2012-3365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4113/">CVE-2013-4113 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4113">CVE-2013-4113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4248/">CVE-2013-4248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4248">CVE-2013-4248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6420/">CVE-2013-6420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6420">CVE-2013-6420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6712/">CVE-2013-6712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6712">CVE-2013-6712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2497/">CVE-2014-2497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2497">CVE-2014-2497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3515/">CVE-2014-3515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3515">CVE-2014-3515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3668/">CVE-2014-3668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3668">CVE-2014-3668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3669/">CVE-2014-3669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3669">CVE-2014-3669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3670/">CVE-2014-3670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3670">CVE-2014-3670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4049/">CVE-2014-4049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4049">CVE-2014-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4721/">CVE-2014-4721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4721">CVE-2014-4721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5459/">CVE-2014-5459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5459">CVE-2014-5459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8142/">CVE-2014-8142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8142">CVE-2014-8142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9709/">CVE-2014-9709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9709">CVE-2014-9709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0231/">CVE-2015-0231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0231">CVE-2015-0231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0232/">CVE-2015-0232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0232">CVE-2015-0232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2305">CVE-2015-2305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2787/">CVE-2015-2787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2787">CVE-2015-2787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3411/">CVE-2015-3411 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3411">CVE-2015-3411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3412/">CVE-2015-3412 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3412">CVE-2015-3412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4022/">CVE-2015-4022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4022">CVE-2015-4022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4024/">CVE-2015-4024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4024">CVE-2015-4024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4026/">CVE-2015-4026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4026">CVE-2015-4026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4148/">CVE-2015-4148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4148">CVE-2015-4148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4598/">CVE-2015-4598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4598">CVE-2015-4598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4599/">CVE-2015-4599 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4599">CVE-2015-4599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4600/">CVE-2015-4600 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4600">CVE-2015-4600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4601/">CVE-2015-4601 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4601">CVE-2015-4601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4602/">CVE-2015-4602 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4602">CVE-2015-4602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4603/">CVE-2015-4603 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4603">CVE-2015-4603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4643/">CVE-2015-4643 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4643">CVE-2015-4643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4644/">CVE-2015-4644 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4644">CVE-2015-4644 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991231" comment="apache2-mod_php5-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991232" comment="php5-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991233" comment="php5-bcmath-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991234" comment="php5-bz2-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991235" comment="php5-calendar-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991236" comment="php5-ctype-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991237" comment="php5-curl-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991238" comment="php5-dba-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991239" comment="php5-dbase-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991240" comment="php5-dom-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991241" comment="php5-exif-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991242" comment="php5-fastcgi-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991243" comment="php5-ftp-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991244" comment="php5-gd-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991245" comment="php5-gettext-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991246" comment="php5-gmp-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991247" comment="php5-hash-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991248" comment="php5-iconv-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991249" comment="php5-json-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991250" comment="php5-ldap-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991251" comment="php5-mbstring-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991252" comment="php5-mcrypt-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991253" comment="php5-mysql-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991254" comment="php5-odbc-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991255" comment="php5-openssl-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991256" comment="php5-pcntl-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991257" comment="php5-pdo-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991258" comment="php5-pear-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991259" comment="php5-pgsql-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991260" comment="php5-pspell-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991261" comment="php5-shmop-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991262" comment="php5-snmp-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991263" comment="php5-soap-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991264" comment="php5-suhosin-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991265" comment="php5-sysvmsg-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991266" comment="php5-sysvsem-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991267" comment="php5-sysvshm-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991268" comment="php5-tokenizer-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991269" comment="php5-wddx-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991270" comment="php5-xmlreader-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991271" comment="php5-xmlrpc-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991272" comment="php5-xmlwriter-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991273" comment="php5-xsl-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991274" comment="php5-zip-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991275" comment="php5-zlib-5.2.14-0.7.30.62.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991231" comment="apache2-mod_php5-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991232" comment="php5-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991233" comment="php5-bcmath-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991234" comment="php5-bz2-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991235" comment="php5-calendar-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991236" comment="php5-ctype-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991237" comment="php5-curl-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991238" comment="php5-dba-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991239" comment="php5-dbase-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991240" comment="php5-dom-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991241" comment="php5-exif-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991242" comment="php5-fastcgi-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991243" comment="php5-ftp-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991244" comment="php5-gd-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991245" comment="php5-gettext-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991246" comment="php5-gmp-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991247" comment="php5-hash-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991248" comment="php5-iconv-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991249" comment="php5-json-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991250" comment="php5-ldap-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991251" comment="php5-mbstring-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991252" comment="php5-mcrypt-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991253" comment="php5-mysql-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991254" comment="php5-odbc-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991255" comment="php5-openssl-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991256" comment="php5-pcntl-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991257" comment="php5-pdo-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991258" comment="php5-pear-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991259" comment="php5-pgsql-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991260" comment="php5-pspell-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991261" comment="php5-shmop-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991262" comment="php5-snmp-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991263" comment="php5-soap-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991264" comment="php5-suhosin-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991265" comment="php5-sysvmsg-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991266" comment="php5-sysvsem-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991267" comment="php5-sysvshm-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991268" comment="php5-tokenizer-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991269" comment="php5-wddx-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991270" comment="php5-xmlreader-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991271" comment="php5-xmlrpc-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991272" comment="php5-xmlwriter-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991273" comment="php5-xsl-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991274" comment="php5-zip-5.2.14-0.7.30.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991275" comment="php5-zlib-5.2.14-0.7.30.62.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216922" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="757549" ref_url="https://bugzilla.suse.com/757549" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<description>

Apache2 mod_python has been changed to enable randomized hashes to help 
fixing denial of service problems by injecting prepared values into Python 
hash functions. (CVE-2012-1150)

As some Python scripts might need a known hashing order, the old behaviour 
can be restored using a newly introduced module option called

PythonRandomizeHashes

The option is default on, but can be disabled if necessary for 
compatibility with above scripts.

Security Issue reference:

    * CVE-2012-1150
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1150&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-05-03"/>
	<updated date="2012-05-03"/>
	<bugzilla href="https://bugzilla.suse.com/757549">SUSE bug 757549</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1150">CVE-2012-1150 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991276" comment="apache2-mod_python-3.3.1-147.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216923" version="1" class="patch">
	<metadata>
		<title>Security update for apport (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="947731" ref_url="https://bugzilla.suse.com/947731" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1338" ref_url="https://www.suse.com/security/cve/CVE-2015-1338/" source="CVE"/>
		<description>
This update for apport fixes the following issues:

Security issue fixed:
- CVE-2015-1338: Insecurely created crash dumps could lead to a DoS or privilege escalation through
  malicious symlinks. (bsc#947731)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-24"/>
	<updated date="2017-07-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/947731">SUSE bug 947731</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1338/">CVE-2015-1338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1338">CVE-2015-1338 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570824" comment="apport-0.114-12.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570825" comment="apport-crashdb-sle-0.114-0.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570826" comment="apport-gtk-0.114-12.8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216924" version="1" class="patch">
	<metadata>
		<title>Security update for apport (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1140986" ref_url="https://bugzilla.suse.com/1140986" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-7307" ref_url="https://www.suse.com/security/cve/CVE-2019-7307/" source="CVE"/>
		<description>
This update for apport fixes the following issues:

Security issues fixed:

- CVE-2019-7307: Fixed a TOCTOU issue, which allows local users to read arbitrary files. (bsc#1140986)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-18"/>
	<updated date="2019-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1140986">SUSE bug 1140986</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7307/">CVE-2019-7307 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7307">CVE-2019-7307 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570827" comment="apport-0.114-12.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570828" comment="apport-crashdb-sle-0.114-0.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570829" comment="apport-gtk-0.114-12.8.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216925" version="1" class="patch">
	<metadata>
		<title>Security update for apport (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1155479" ref_url="https://bugzilla.suse.com/1155479" source="BUGZILLA"/>
		<reference ref_id="1155481" ref_url="https://bugzilla.suse.com/1155481" source="BUGZILLA"/>
		<reference ref_id="1155482" ref_url="https://bugzilla.suse.com/1155482" source="BUGZILLA"/>
		<reference ref_id="1174108" ref_url="https://bugzilla.suse.com/1174108" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11482" ref_url="https://www.suse.com/security/cve/CVE-2019-11482/" source="CVE"/>
		<reference ref_id="CVE-2019-11485" ref_url="https://www.suse.com/security/cve/CVE-2019-11485/" source="CVE"/>
		<reference ref_id="CVE-2019-15790" ref_url="https://www.suse.com/security/cve/CVE-2019-15790/" source="CVE"/>
		<reference ref_id="CVE-2020-15701" ref_url="https://www.suse.com/security/cve/CVE-2020-15701/" source="CVE"/>
		<description>
This update for apport fixes the following issues:

- CVE-2019-11482: Fixed TOCTTOU race conditions when creating a core file (bsc#1155479).
- CVE-2019-11485: Fixed a permission issue with the directory of lock files (bsc#1155481)
- CVE-2019-15790: Fixed the privilleges that reads /proc/$PID/ files to avoid potential information disclosure (bsc#1155482).
- CVE-2020-15701: Fixed a denial of service while parsing apport-ignore.xml (bsc#1174108).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-21"/>
	<updated date="2020-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155479">SUSE bug 1155479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155481">SUSE bug 1155481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155482">SUSE bug 1155482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174108">SUSE bug 1174108</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11482/">CVE-2019-11482 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11482">CVE-2019-11482 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11485/">CVE-2019-11485 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11485">CVE-2019-11485 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15790/">CVE-2019-15790 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15790">CVE-2019-15790 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15701/">CVE-2020-15701 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15701">CVE-2020-15701 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570830" comment="apport-0.114-12.8.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570831" comment="apport-crashdb-sle-0.114-0.8.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570832" comment="apport-gtk-0.114-12.8.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216926" version="1" class="patch">
	<metadata>
		<title>Security update for ark</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="708268" ref_url="https://bugzilla.suse.com/708268" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2725" ref_url="https://www.suse.com/security/cve/CVE-2011-2725/" source="CVE"/>
		<description>

Ark was prone to a path traversal vulnerability allowing a 
maliciously-crafted zip file to allow for an arbitrary file to be displayed 
and, if the user has appropriate credentials, removed (CVE-2011-2725).

Security Issue reference:

    * CVE-2011-2725
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2725&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-29"/>
	<updated date="2012-02-29"/>
	<bugzilla href="https://bugzilla.suse.com/708268">SUSE bug 708268</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2725/">CVE-2011-2725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2725">CVE-2011-2725 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991277" comment="ark-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991278" comment="kcalc-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991279" comment="kcharselect-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991280" comment="kdessh-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991281" comment="kdf-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991282" comment="kfloppy-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991283" comment="kgpg-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991284" comment="ktimer-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991285" comment="kwalletmanager-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991286" comment="kwikdisk-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991287" comment="okteta-4.3.5-0.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216927" version="1" class="patch">
	<metadata>
		<title>Security update for arpwatch</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="764521" ref_url="https://bugzilla.suse.com/764521" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2653" ref_url="https://www.suse.com/security/cve/CVE-2012-2653/" source="CVE"/>
		<description>

arpwatch was improperly dropping its privileges. This has been fixed.

Security Issue reference:

    * CVE-2012-2653
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2653&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-18"/>
	<updated date="2012-07-18"/>
	<bugzilla href="https://bugzilla.suse.com/764521">SUSE bug 764521</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2653/">CVE-2012-2653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2653">CVE-2012-2653 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991288" comment="arpwatch-2.1a15-131.23.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216928" version="1" class="patch">
	<metadata>
		<title>Security update for arpwatch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1186240" ref_url="https://bugzilla.suse.com/1186240" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25321" ref_url="https://www.suse.com/security/cve/CVE-2021-25321/" source="CVE"/>
		<description>
This update for arpwatch fixes the following issues:

- CVE-2021-25321: Fixed local privilege escalation from runtime user to root (bsc#1186240).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186240">SUSE bug 1186240</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25321/">CVE-2021-25321 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25321">CVE-2021-25321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616451" comment="arpwatch-2.1a15-131.23.2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216929" version="1" class="patch">
	<metadata>
		<title>Security update for aspell (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1153892" ref_url="https://bugzilla.suse.com/1153892" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17544" ref_url="https://www.suse.com/security/cve/CVE-2019-17544/" source="CVE"/>
		<description>
This update for aspell fixes the following issues:

- CVE-2019-17544: Fixed a stack-based buffer over-read in acommon:unescape in common/getdata.cpp via an isolated backslash (bsc#1153892).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-21"/>
	<updated date="2019-11-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1153892">SUSE bug 1153892</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-17544/">CVE-2019-17544 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17544">CVE-2019-17544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570845" comment="aspell-0.60.6-26.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570846" comment="aspell-32bit-0.60.6-26.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570847" comment="aspell-ispell-0.60.6-26.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216930" version="1" class="patch">
	<metadata>
		<title>Security update for aspell (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1161982" ref_url="https://bugzilla.suse.com/1161982" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20433" ref_url="https://www.suse.com/security/cve/CVE-2019-20433/" source="CVE"/>
		<description>
This update for aspell fixes the following security issue:

- CVE-2019-20433: Fixed a buffer over-read when processing strings ending with a single '\0' byte with ucs-2 and ucs-4 encoding (bsc#1161982).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-22"/>
	<updated date="2020-07-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1161982">SUSE bug 1161982</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20433/">CVE-2019-20433 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20433">CVE-2019-20433 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570848" comment="aspell-0.60.6-26.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570849" comment="aspell-32bit-0.60.6-26.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570850" comment="aspell-ispell-0.60.6-26.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216931" version="1" class="patch">
	<metadata>
		<title>Security update for aspell (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1188576" ref_url="https://bugzilla.suse.com/1188576" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25051" ref_url="https://www.suse.com/security/cve/CVE-2019-25051/" source="CVE"/>
		<description>
This update for aspell fixes the following issues:

- CVE-2019-25051: Fixed heap-buffer-overflow in acommon:ObjStack:dup_top (bsc#1188576).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-12"/>
	<updated date="2021-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188576">SUSE bug 1188576</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25051/">CVE-2019-25051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25051">CVE-2019-25051 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627833" comment="aspell-0.60.6-26.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627834" comment="aspell-32bit-0.60.6-26.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627835" comment="aspell-ispell-0.60.6-26.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216932" version="1" class="patch">
	<metadata>
		<title>Security update for atftp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1133114" ref_url="https://bugzilla.suse.com/1133114" source="BUGZILLA"/>
		<reference ref_id="1133145" ref_url="https://bugzilla.suse.com/1133145" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11365" ref_url="https://www.suse.com/security/cve/CVE-2019-11365/" source="CVE"/>
		<reference ref_id="CVE-2019-11366" ref_url="https://www.suse.com/security/cve/CVE-2019-11366/" source="CVE"/>
		<description>
This update for atftp fixes the following issues:

Security issues fixed:

- CVE-2019-11366: Fixed a denial of service caused by a NULL pointer dereference because thread_list_mutex was not locked (bsc#1133145).
- CVE-2019-11365: Fixed a buffer overflow which could lead to remote code execution caused by an insecure use of strncpy() (bsc#1133114).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-30"/>
	<updated date="2019-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133114">SUSE bug 1133114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133145">SUSE bug 1133145</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11365/">CVE-2019-11365 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11365">CVE-2019-11365 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11366/">CVE-2019-11366 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11366">CVE-2019-11366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570851" comment="atftp-0.7.0-135.16.16.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216933" version="1" class="patch">
	<metadata>
		<title>Security update for atftp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1190522" ref_url="https://bugzilla.suse.com/1190522" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41054" ref_url="https://www.suse.com/security/cve/CVE-2021-41054/" source="CVE"/>
		<description>
This update for atftp fixes the following issues:

- CVE-2021-41054: Fixed buffer overflow caused by combination of data, OACK, and other options (bsc#1190522).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-29"/>
	<updated date="2021-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190522">SUSE bug 1190522</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41054/">CVE-2021-41054 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41054">CVE-2021-41054 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633873" comment="atftp-0.7.0-135.16.16.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216934" version="1" class="patch">
	<metadata>
		<title>Security update for atftp (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1195619" ref_url="https://bugzilla.suse.com/1195619" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46671" ref_url="https://www.suse.com/security/cve/CVE-2021-46671/" source="CVE"/>
		<description>
This update for atftp fixes the following issues:

-  CVE-2021-46671: Fixed a potential information leak in atftpd (bsc#1195619). 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1195619">SUSE bug 1195619</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46671/">CVE-2021-46671 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46671">CVE-2021-46671 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667670" comment="atftp-0.7.0-135.16.16.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216935" version="1" class="patch">
	<metadata>
		<title>Security update for audiofile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1026978" ref_url="https://bugzilla.suse.com/1026978" source="BUGZILLA"/>
		<reference ref_id="1026979" ref_url="https://bugzilla.suse.com/1026979" source="BUGZILLA"/>
		<reference ref_id="1026980" ref_url="https://bugzilla.suse.com/1026980" source="BUGZILLA"/>
		<reference ref_id="1026981" ref_url="https://bugzilla.suse.com/1026981" source="BUGZILLA"/>
		<reference ref_id="1026982" ref_url="https://bugzilla.suse.com/1026982" source="BUGZILLA"/>
		<reference ref_id="1026983" ref_url="https://bugzilla.suse.com/1026983" source="BUGZILLA"/>
		<reference ref_id="1026984" ref_url="https://bugzilla.suse.com/1026984" source="BUGZILLA"/>
		<reference ref_id="1026985" ref_url="https://bugzilla.suse.com/1026985" source="BUGZILLA"/>
		<reference ref_id="1026986" ref_url="https://bugzilla.suse.com/1026986" source="BUGZILLA"/>
		<reference ref_id="1026987" ref_url="https://bugzilla.suse.com/1026987" source="BUGZILLA"/>
		<reference ref_id="1026988" ref_url="https://bugzilla.suse.com/1026988" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6827" ref_url="https://www.suse.com/security/cve/CVE-2017-6827/" source="CVE"/>
		<reference ref_id="CVE-2017-6828" ref_url="https://www.suse.com/security/cve/CVE-2017-6828/" source="CVE"/>
		<reference ref_id="CVE-2017-6829" ref_url="https://www.suse.com/security/cve/CVE-2017-6829/" source="CVE"/>
		<reference ref_id="CVE-2017-6830" ref_url="https://www.suse.com/security/cve/CVE-2017-6830/" source="CVE"/>
		<reference ref_id="CVE-2017-6831" ref_url="https://www.suse.com/security/cve/CVE-2017-6831/" source="CVE"/>
		<reference ref_id="CVE-2017-6832" ref_url="https://www.suse.com/security/cve/CVE-2017-6832/" source="CVE"/>
		<reference ref_id="CVE-2017-6833" ref_url="https://www.suse.com/security/cve/CVE-2017-6833/" source="CVE"/>
		<reference ref_id="CVE-2017-6834" ref_url="https://www.suse.com/security/cve/CVE-2017-6834/" source="CVE"/>
		<reference ref_id="CVE-2017-6835" ref_url="https://www.suse.com/security/cve/CVE-2017-6835/" source="CVE"/>
		<reference ref_id="CVE-2017-6836" ref_url="https://www.suse.com/security/cve/CVE-2017-6836/" source="CVE"/>
		<reference ref_id="CVE-2017-6837" ref_url="https://www.suse.com/security/cve/CVE-2017-6837/" source="CVE"/>
		<reference ref_id="CVE-2017-6838" ref_url="https://www.suse.com/security/cve/CVE-2017-6838/" source="CVE"/>
		<reference ref_id="CVE-2017-6839" ref_url="https://www.suse.com/security/cve/CVE-2017-6839/" source="CVE"/>
		<description>

This update for audiofile fixes the following issues:

Security issues fixed:
- CVE-2017-6827: heap-based buffer overflow in MSADPCM::initializeCoefficients (MSADPCM.cpp) (bsc#1026979)
- CVE-2017-6828: heap-based buffer overflow in readValue (FileHandle.cpp) (bsc#1026980)
- CVE-2017-6829: global buffer overflow in decodeSample (IMA.cpp) (bsc#1026981)
- CVE-2017-6830: heap-based buffer overflow in alaw2linear_buf (G711.cpp) (bsc#1026982)
- CVE-2017-6831: heap-based buffer overflow in IMA::decodeBlockWAVE (IMA.cpp) (bsc#1026983)
- CVE-2017-6832: heap-based buffer overflow in MSADPCM::decodeBlock (MSADPCM.cpp) (bsc#1026984)
- CVE-2017-6833: divide-by-zero in BlockCodec::runPull (BlockCodec.cpp) (bsc#1026985)
- CVE-2017-6834: heap-based buffer overflow in ulaw2linear_buf (G711.cpp) (bsc#1026986)
- CVE-2017-6835: divide-by-zero in BlockCodec::reset1 (BlockCodec.cpp) (bsc#1026988)
- CVE-2017-6836: heap-based buffer overflow in Expand3To4Module::run (SimpleModule.h) (bsc#1026987)
- CVE-2017-6837, CVE-2017-6838, CVE-2017-6839: multiple ubsan crashes (bsc#1026978)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-05"/>
	<updated date="2017-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1026978">SUSE bug 1026978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026979">SUSE bug 1026979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026980">SUSE bug 1026980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026981">SUSE bug 1026981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026982">SUSE bug 1026982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026983">SUSE bug 1026983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026984">SUSE bug 1026984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026985">SUSE bug 1026985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026986">SUSE bug 1026986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026987">SUSE bug 1026987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026988">SUSE bug 1026988</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6827/">CVE-2017-6827 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6827">CVE-2017-6827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6828/">CVE-2017-6828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6828">CVE-2017-6828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6829/">CVE-2017-6829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6829">CVE-2017-6829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6830/">CVE-2017-6830 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6830">CVE-2017-6830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6831/">CVE-2017-6831 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6831">CVE-2017-6831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6832/">CVE-2017-6832 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6832">CVE-2017-6832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6833/">CVE-2017-6833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6833">CVE-2017-6833 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6834/">CVE-2017-6834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6834">CVE-2017-6834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6835/">CVE-2017-6835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6835">CVE-2017-6835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6836/">CVE-2017-6836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6836">CVE-2017-6836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6837/">CVE-2017-6837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6837">CVE-2017-6837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6838/">CVE-2017-6838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6838">CVE-2017-6838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6839/">CVE-2017-6839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6839">CVE-2017-6839 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570852" comment="audiofile-0.2.6-142.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570853" comment="audiofile-32bit-0.2.6-142.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216936" version="1" class="patch">
	<metadata>
		<title>Security update for augeas</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="716632" ref_url="https://bugzilla.suse.com/716632" source="BUGZILLA"/>
		<reference ref_id="719199" ref_url="https://bugzilla.suse.com/719199" source="BUGZILLA"/>
		<reference ref_id="729491" ref_url="https://bugzilla.suse.com/729491" source="BUGZILLA"/>
		<reference ref_id="753624" ref_url="https://bugzilla.suse.com/753624" source="BUGZILLA"/>
		<reference ref_id="871323" ref_url="https://bugzilla.suse.com/871323" source="BUGZILLA"/>
		<reference ref_id="885003" ref_url="https://bugzilla.suse.com/885003" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0786" ref_url="https://www.suse.com/security/cve/CVE-2012-0786/" source="CVE"/>
		<description>

Augeas has been updated to fix symlink overwrite problem. (CVE-2012-0786, 
CVE-2013-6412)

Additionally, parsing the multipath configuration has been fixed. 
(bnc#871323)

Security Issues:

    * CVE-2012-0786
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0786&gt;
    * CVE-2013-6412
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6412&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-30"/>
	<updated date="2014-07-30"/>
	<bugzilla href="https://bugzilla.suse.com/716632">SUSE bug 716632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/719199">SUSE bug 719199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/729491">SUSE bug 729491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/753624">SUSE bug 753624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871323">SUSE bug 871323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885003">SUSE bug 885003</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0786/">CVE-2012-0786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0786">CVE-2012-0786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991289" comment="augeas-0.8.1-7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991290" comment="augeas-lenses-0.8.1-7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991291" comment="libaugeas0-0.8.1-7.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216937" version="1" class="patch">
	<metadata>
		<title>Security update for augeas (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="925225" ref_url="https://bugzilla.suse.com/925225" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<description>
The augeas package was updated to fix the following security issue:

- CVE-2014-8119: backported path escaping patch (bsc#925225)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-15"/>
	<updated date="2015-12-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/925225">SUSE bug 925225</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8119">CVE-2014-8119 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570854" comment="augeas-0.8.1-7.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570855" comment="augeas-lenses-0.8.1-7.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570856" comment="libaugeas0-0.8.1-7.22.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216938" version="1" class="patch">
	<metadata>
		<title>Security update for augeas (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1054171" ref_url="https://bugzilla.suse.com/1054171" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7555" ref_url="https://www.suse.com/security/cve/CVE-2017-7555/" source="CVE"/>
		<description>
This update for augeas fixes the following issues:

Security issue fixed:

- CVE-2017-7555: Fix a memory corruption bug could have lead to arbitrary code execution
   by passing crafted strings that would be mis-handled by parse_name() (bsc#1054171).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-19"/>
	<updated date="2018-03-19"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1054171">SUSE bug 1054171</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7555/">CVE-2017-7555 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7555">CVE-2017-7555 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570857" comment="augeas-0.8.1-7.23.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570858" comment="augeas-lenses-0.8.1-7.23.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570859" comment="libaugeas0-0.8.1-7.23.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216939" version="1" class="patch">
	<metadata>
		<title>Security update for automake</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="559815" ref_url="https://bugzilla.suse.com/559815" source="BUGZILLA"/>
		<reference ref_id="770618" ref_url="https://bugzilla.suse.com/770618" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<description>

This update of automake fixes a race condition in 'distcheck' 
(CVE-2012-3386).

Also a bug where world writeable tarballs were generated during 'make dist' 
has been fixed (CVE-2009-4029).

Security Issue references:

    * CVE-2012-3386
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3386&gt;
    * CVE-2009-4029
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4029&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-12"/>
	<updated date="2013-08-12"/>
	<bugzilla href="https://bugzilla.suse.com/559815">SUSE bug 559815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770618">SUSE bug 770618</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3386">CVE-2012-3386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570860" comment="automake-1.10.1-4.131.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216940" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1120281" ref_url="https://bugzilla.suse.com/1120281" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000845" ref_url="https://www.suse.com/security/cve/CVE-2018-1000845/" source="CVE"/>
		<description>
This update for avahi fixes the following issues:

Security issue fixed:

- CVE-2018-1000845: Fixed DNS amplification and reflection to spoofed addresses (DOS) (bsc#1120281)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-18"/>
	<updated date="2019-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120281">SUSE bug 1120281</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000845/">CVE-2018-1000845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000845">CVE-2018-1000845 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570861" comment="avahi-0.6.23-11.25.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570862" comment="avahi-lang-0.6.23-11.25.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570863" comment="avahi-utils-0.6.23-11.25.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570864" comment="libavahi-client3-0.6.23-11.25.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570865" comment="libavahi-client3-32bit-0.6.23-11.25.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570866" comment="libavahi-common3-0.6.23-11.25.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570867" comment="libavahi-common3-32bit-0.6.23-11.25.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570868" comment="libavahi-core5-0.6.23-11.25.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570869" comment="libdns_sd-0.6.23-11.25.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570870" comment="libdns_sd-32bit-0.6.23-11.25.25.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216941" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1085255" ref_url="https://bugzilla.suse.com/1085255" source="BUGZILLA"/>
		<description>
This update for avahi fixes the following issues:

- Increase data and stack limits (bsc#1085255). 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-18"/>
	<updated date="2021-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085255">SUSE bug 1085255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570871" comment="avahi-0.6.23-11.25.25.6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570872" comment="avahi-lang-0.6.23-11.25.25.6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570873" comment="avahi-utils-0.6.23-11.25.25.6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570874" comment="libavahi-client3-0.6.23-11.25.25.6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570875" comment="libavahi-client3-32bit-0.6.23-11.25.25.6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570876" comment="libavahi-common3-0.6.23-11.25.25.6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570877" comment="libavahi-common3-32bit-0.6.23-11.25.25.6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570878" comment="libavahi-core5-0.6.23-11.25.25.6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570879" comment="libdns_sd-0.6.23-11.25.25.6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570880" comment="libdns_sd-32bit-0.6.23-11.25.25.6.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216942" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1184521" ref_url="https://bugzilla.suse.com/1184521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3468" ref_url="https://www.suse.com/security/cve/CVE-2021-3468/" source="CVE"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2021-3468: avoid infinite loop by handling  HUP event in client_work (bsc#1184521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184521">SUSE bug 1184521</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3468/">CVE-2021-3468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3468">CVE-2021-3468 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570881" comment="avahi-0.6.23-11.25.25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570882" comment="avahi-lang-0.6.23-11.25.25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570883" comment="avahi-utils-0.6.23-11.25.25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570884" comment="libavahi-client3-0.6.23-11.25.25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570885" comment="libavahi-client3-32bit-0.6.23-11.25.25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570886" comment="libavahi-common3-0.6.23-11.25.25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570887" comment="libavahi-common3-32bit-0.6.23-11.25.25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570888" comment="libavahi-core5-0.6.23-11.25.25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570889" comment="libdns_sd-0.6.23-11.25.25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570890" comment="libdns_sd-32bit-0.6.23-11.25.25.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216943" version="1" class="patch">
	<metadata>
		<title>Security update for axis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1103658" ref_url="https://bugzilla.suse.com/1103658" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8032" ref_url="https://www.suse.com/security/cve/CVE-2018-8032/" source="CVE"/>
		<description>
This update for axis fixes the following security issue:

- CVE-2018-8032: Prevent cross-site scripting (XSS) attack in the default
  servlet/services (bsc#1103658).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-04"/>
	<updated date="2018-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103658">SUSE bug 1103658</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8032/">CVE-2018-8032 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8032">CVE-2018-8032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570891" comment="axis-1.4-236.38.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216944" version="1" class="patch">
	<metadata>
		<title>Security update for axis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1134598" ref_url="https://bugzilla.suse.com/1134598" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5784" ref_url="https://www.suse.com/security/cve/CVE-2012-5784/" source="CVE"/>
		<reference ref_id="CVE-2014-3596" ref_url="https://www.suse.com/security/cve/CVE-2014-3596/" source="CVE"/>
		<description>
This update for axis fixes the following issues:

Security issue fixed:

- CVE-2012-5784, CVE-2014-3596: Fixed missing connection hostname check against X.509 certificate name (bsc#1134598).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-13"/>
	<updated date="2019-05-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1134598">SUSE bug 1134598</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2012-5784/">CVE-2012-5784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5784">CVE-2012-5784 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-3596/">CVE-2014-3596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3596">CVE-2014-3596 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570892" comment="axis-1.4-236.38.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216945" version="1" class="patch">
	<metadata>
		<title>Security update for bash</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="770795" ref_url="https://bugzilla.suse.com/770795" source="BUGZILLA"/>
		<reference ref_id="776694" ref_url="https://bugzilla.suse.com/776694" source="BUGZILLA"/>
		<reference ref_id="819783" ref_url="https://bugzilla.suse.com/819783" source="BUGZILLA"/>
		<reference ref_id="820149" ref_url="https://bugzilla.suse.com/820149" source="BUGZILLA"/>
		<reference ref_id="844550" ref_url="https://bugzilla.suse.com/844550" source="BUGZILLA"/>
		<reference ref_id="896776" ref_url="https://bugzilla.suse.com/896776" source="BUGZILLA"/>
		<reference ref_id="898346" ref_url="https://bugzilla.suse.com/898346" source="BUGZILLA"/>
		<reference ref_id="898603" ref_url="https://bugzilla.suse.com/898603" source="BUGZILLA"/>
		<reference ref_id="898604" ref_url="https://bugzilla.suse.com/898604" source="BUGZILLA"/>
		<reference ref_id="898884" ref_url="https://bugzilla.suse.com/898884" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3410" ref_url="https://www.suse.com/security/cve/CVE-2012-3410/" source="CVE"/>
		<reference ref_id="CVE-2014-0475" ref_url="https://www.suse.com/security/cve/CVE-2014-0475/" source="CVE"/>
		<reference ref_id="CVE-2014-6271" ref_url="https://www.suse.com/security/cve/CVE-2014-6271/" source="CVE"/>
		<reference ref_id="CVE-2014-7169" ref_url="https://www.suse.com/security/cve/CVE-2014-7169/" source="CVE"/>
		<reference ref_id="CVE-2014-7186" ref_url="https://www.suse.com/security/cve/CVE-2014-7186/" source="CVE"/>
		<reference ref_id="CVE-2014-7187" ref_url="https://www.suse.com/security/cve/CVE-2014-7187/" source="CVE"/>
		<description>

The command-line shell 'bash' evaluates environment variables, which allows 
the injection of characters and might be used to access files on the system 
in some circumstances (CVE-2014-7169).

Please note that this issue is different from a previously fixed 
vulnerability tracked under CVE-2014-6271 and is less serious due to the 
special, non-default system configuration that is needed to create an 
exploitable situation.

To remove further exploitation potential we now limit the 
function-in-environment variable to variables prefixed with BASH_FUNC_. 
This hardening feature is work in progress and might be improved in later 
updates.

Additionally, two more security issues have been fixed:

    * CVE-2014-7186: Nested HERE documents could lead to a crash of bash.
    * CVE-2014-7187: Nesting of for loops could lead to a crash of bash.

Security Issues:

    * CVE-2014-7169
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169&gt;
    * CVE-2014-7186
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186&gt;
    * CVE-2014-7187
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-26"/>
	<updated date="2014-09-26"/>
	<bugzilla href="https://bugzilla.suse.com/770795">SUSE bug 770795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776694">SUSE bug 776694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819783">SUSE bug 819783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820149">SUSE bug 820149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844550">SUSE bug 844550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896776">SUSE bug 896776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898346">SUSE bug 898346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898603">SUSE bug 898603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898604">SUSE bug 898604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898884">SUSE bug 898884</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3410/">CVE-2012-3410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3410">CVE-2012-3410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0475/">CVE-2014-0475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0475">CVE-2014-0475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6271/">CVE-2014-6271 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-6271">CVE-2014-6271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7169/">CVE-2014-7169 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7169">CVE-2014-7169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7186/">CVE-2014-7186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7186">CVE-2014-7186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7187/">CVE-2014-7187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7187">CVE-2014-7187 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991292" comment="bash-3.2-147.14.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991293" comment="bash-doc-3.2-147.14.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991294" comment="libreadline5-5.2-147.14.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991295" comment="libreadline5-32bit-5.2-147.14.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991296" comment="readline-doc-5.2-147.14.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991292" comment="bash-3.2-147.14.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991293" comment="bash-doc-3.2-147.14.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991294" comment="libreadline5-5.2-147.14.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991295" comment="libreadline5-32bit-5.2-147.14.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991296" comment="readline-doc-5.2-147.14.22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216946" version="1" class="patch">
	<metadata>
		<title>Security update for bash (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1010845" ref_url="https://bugzilla.suse.com/1010845" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9401" ref_url="https://www.suse.com/security/cve/CVE-2016-9401/" source="CVE"/>
		<description>
This update for bash fixes the following issues:

Security issue fixed:

- CVE-2016-9401: Fixed a denial of service with popd, where a user supplied address would be free'd (bsc#1010845).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-17"/>
	<updated date="2020-09-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010845">SUSE bug 1010845</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9401/">CVE-2016-9401 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9401">CVE-2016-9401 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570900" comment="bash-3.2-148.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570901" comment="bash-doc-3.2-148.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570902" comment="libreadline5-5.2-148.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570903" comment="libreadline5-32bit-5.2-148.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570904" comment="readline-doc-5.2-148.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216947" version="1" class="patch">
	<metadata>
		<title>Security update for bind</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="684163" ref_url="https://bugzilla.suse.com/684163" source="BUGZILLA"/>
		<reference ref_id="696585" ref_url="https://bugzilla.suse.com/696585" source="BUGZILLA"/>
		<reference ref_id="703907" ref_url="https://bugzilla.suse.com/703907" source="BUGZILLA"/>
		<reference ref_id="715180" ref_url="https://bugzilla.suse.com/715180" source="BUGZILLA"/>
		<reference ref_id="718441" ref_url="https://bugzilla.suse.com/718441" source="BUGZILLA"/>
		<reference ref_id="727495" ref_url="https://bugzilla.suse.com/727495" source="BUGZILLA"/>
		<reference ref_id="730995" ref_url="https://bugzilla.suse.com/730995" source="BUGZILLA"/>
		<reference ref_id="743758" ref_url="https://bugzilla.suse.com/743758" source="BUGZILLA"/>
		<reference ref_id="765315" ref_url="https://bugzilla.suse.com/765315" source="BUGZILLA"/>
		<reference ref_id="772945" ref_url="https://bugzilla.suse.com/772945" source="BUGZILLA"/>
		<reference ref_id="780157" ref_url="https://bugzilla.suse.com/780157" source="BUGZILLA"/>
		<reference ref_id="784602" ref_url="https://bugzilla.suse.com/784602" source="BUGZILLA"/>
		<reference ref_id="796112" ref_url="https://bugzilla.suse.com/796112" source="BUGZILLA"/>
		<reference ref_id="858639" ref_url="https://bugzilla.suse.com/858639" source="BUGZILLA"/>
		<reference ref_id="908994" ref_url="https://bugzilla.suse.com/908994" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1910" ref_url="https://www.suse.com/security/cve/CVE-2011-1910/" source="CVE"/>
		<reference ref_id="CVE-2011-2464" ref_url="https://www.suse.com/security/cve/CVE-2011-2464/" source="CVE"/>
		<reference ref_id="CVE-2011-4313" ref_url="https://www.suse.com/security/cve/CVE-2011-4313/" source="CVE"/>
		<reference ref_id="CVE-2012-1667" ref_url="https://www.suse.com/security/cve/CVE-2012-1667/" source="CVE"/>
		<reference ref_id="CVE-2012-3817" ref_url="https://www.suse.com/security/cve/CVE-2012-3817/" source="CVE"/>
		<reference ref_id="CVE-2012-4244" ref_url="https://www.suse.com/security/cve/CVE-2012-4244/" source="CVE"/>
		<reference ref_id="CVE-2012-5166" ref_url="https://www.suse.com/security/cve/CVE-2012-5166/" source="CVE"/>
		<reference ref_id="CVE-2014-0591" ref_url="https://www.suse.com/security/cve/CVE-2014-0591/" source="CVE"/>
		<reference ref_id="CVE-2014-8500" ref_url="https://www.suse.com/security/cve/CVE-2014-8500/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001281.html" source="SUSE-SU"/>
		<description>

This update fixes a DoS vulnerability in bind when handling malformed 
NSEC3-signed zones. CVE-2014-0591 has been assigned to this issue.

Security Issue references:

    * CVE-2014-0591
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-27"/>
	<updated date="2014-01-27"/>
	<bugzilla href="https://bugzilla.suse.com/684163">SUSE bug 684163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/696585">SUSE bug 696585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703907">SUSE bug 703907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/715180">SUSE bug 715180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/718441">SUSE bug 718441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/727495">SUSE bug 727495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/730995">SUSE bug 730995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/743758">SUSE bug 743758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/765315">SUSE bug 765315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772945">SUSE bug 772945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780157">SUSE bug 780157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784602">SUSE bug 784602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796112">SUSE bug 796112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858639">SUSE bug 858639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908994">SUSE bug 908994</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1910/">CVE-2011-1910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1910">CVE-2011-1910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2464/">CVE-2011-2464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2464">CVE-2011-2464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4313/">CVE-2011-4313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4313">CVE-2011-4313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1667/">CVE-2012-1667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1667">CVE-2012-1667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3817/">CVE-2012-3817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3817">CVE-2012-3817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4244/">CVE-2012-4244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4244">CVE-2012-4244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5166/">CVE-2012-5166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5166">CVE-2012-5166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0591/">CVE-2014-0591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0591">CVE-2014-0591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8500/">CVE-2014-8500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8500">CVE-2014-8500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991297" comment="bind-9.6ESVR10P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991298" comment="bind-chrootenv-9.6ESVR10P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991299" comment="bind-doc-9.6ESVR10P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991300" comment="bind-libs-9.6ESVR10P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991301" comment="bind-libs-32bit-9.6ESVR10P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991302" comment="bind-utils-9.6ESVR10P2-0.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991297" comment="bind-9.6ESVR10P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991298" comment="bind-chrootenv-9.6ESVR10P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991299" comment="bind-doc-9.6ESVR10P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991300" comment="bind-libs-9.6ESVR10P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991301" comment="bind-libs-32bit-9.6ESVR10P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991302" comment="bind-utils-9.6ESVR10P2-0.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216948" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="939567" ref_url="https://bugzilla.suse.com/939567" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001514.html" source="SUSE-SU"/>
		<description>
bind was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-5477: Remote DoS via TKEY queries (bsc#939567)

Exposure to this issue can not be prevented by either ACLs or configuration options limiting or denying service because the exploitable code occurs early in the packet handling.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-28"/>
	<updated date="2015-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/939567">SUSE bug 939567</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5477">CVE-2015-5477 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570912" comment="bind-9.6ESVR11W1-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570913" comment="bind-chrootenv-9.6ESVR11W1-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570914" comment="bind-devel-9.6ESVR11W1-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570915" comment="bind-doc-9.6ESVR11W1-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570916" comment="bind-libs-9.6ESVR11W1-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570917" comment="bind-libs-32bit-9.6ESVR11W1-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570918" comment="bind-utils-9.6ESVR11W1-0.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570912" comment="bind-9.6ESVR11W1-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570913" comment="bind-chrootenv-9.6ESVR11W1-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570914" comment="bind-devel-9.6ESVR11W1-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570915" comment="bind-doc-9.6ESVR11W1-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570916" comment="bind-libs-9.6ESVR11W1-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570917" comment="bind-libs-32bit-9.6ESVR11W1-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570918" comment="bind-utils-9.6ESVR11W1-0.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216949" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="944066" ref_url="https://bugzilla.suse.com/944066" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001575.html" source="SUSE-SU"/>
		<description>

The nameserver bind was updated to fix a remote denial of service (crash) attack against 
bind nameservers doing validation on DNSSEC signed records. (CVE-2015-5722, bsc#944066).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-02"/>
	<updated date="2015-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/944066">SUSE bug 944066</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5722">CVE-2015-5722 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570919" comment="bind-9.6ESVR11W1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570920" comment="bind-chrootenv-9.6ESVR11W1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570921" comment="bind-devel-9.6ESVR11W1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570922" comment="bind-doc-9.6ESVR11W1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570923" comment="bind-libs-9.6ESVR11W1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570924" comment="bind-libs-32bit-9.6ESVR11W1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570925" comment="bind-utils-9.6ESVR11W1-0.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570919" comment="bind-9.6ESVR11W1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570920" comment="bind-chrootenv-9.6ESVR11W1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570921" comment="bind-devel-9.6ESVR11W1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570922" comment="bind-doc-9.6ESVR11W1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570923" comment="bind-libs-9.6ESVR11W1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570924" comment="bind-libs-32bit-9.6ESVR11W1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570925" comment="bind-utils-9.6ESVR11W1-0.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216950" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="923281" ref_url="https://bugzilla.suse.com/923281" source="BUGZILLA"/>
		<reference ref_id="958861" ref_url="https://bugzilla.suse.com/958861" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000/" source="CVE"/>
		<description>

This update for bind fixes the following issues: 

- Fix remote denial of service by misparsing incoming responses
  (CVE-2015-8000, bsc#958861).

A non security issues was also fixed:
- Fix a regression in caching entries with a ttl of 0 (bsc#923281).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-22"/>
	<updated date="2015-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/923281">SUSE bug 923281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958861">SUSE bug 958861</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8000">CVE-2015-8000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570926" comment="bind-9.6ESVR11W1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570927" comment="bind-chrootenv-9.6ESVR11W1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570928" comment="bind-doc-9.6ESVR11W1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570929" comment="bind-libs-9.6ESVR11W1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570930" comment="bind-libs-32bit-9.6ESVR11W1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570931" comment="bind-utils-9.6ESVR11W1-0.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216951" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="962189" ref_url="https://bugzilla.suse.com/962189" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704/" source="CVE"/>
		<description>

This update for bind fixes the following issues:

- CVE-2015-8704: Specific APL data allowed remote attacker to trigger a crash in certain configurations (bsc#962189)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/962189">SUSE bug 962189</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8704">CVE-2015-8704 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570932" comment="bind-9.6ESVR11W1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570933" comment="bind-chrootenv-9.6ESVR11W1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570934" comment="bind-doc-9.6ESVR11W1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570935" comment="bind-libs-9.6ESVR11W1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570936" comment="bind-utils-9.6ESVR11W1-0.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216952" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="970072" ref_url="https://bugzilla.suse.com/970072" source="BUGZILLA"/>
		<reference ref_id="970073" ref_url="https://bugzilla.suse.com/970073" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1285" ref_url="https://www.suse.com/security/cve/CVE-2016-1285/" source="CVE"/>
		<reference ref_id="CVE-2016-1286" ref_url="https://www.suse.com/security/cve/CVE-2016-1286/" source="CVE"/>
		<description>

This update for bind fixes the following issues:

Fix two assertion failures that can lead to a remote denial of service attack:
* CVE-2016-1285: An error when parsing signature records for DNAME can lead to named exiting due to an assertion failure. (bsc#970072)
* CVE-2016-1286: An error when parsing signature records for DNAME records having specific properties can lead to named exiting due to an assertion failure in resolver.c or db.c. (bsc#970073)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-07"/>
	<updated date="2016-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/970072">SUSE bug 970072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970073">SUSE bug 970073</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1285/">CVE-2016-1285 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1285">CVE-2016-1285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1286/">CVE-2016-1286 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1286">CVE-2016-1286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570937" comment="bind-9.6ESVR11W1-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570938" comment="bind-chrootenv-9.6ESVR11W1-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570939" comment="bind-doc-9.6ESVR11W1-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570940" comment="bind-libs-9.6ESVR11W1-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570941" comment="bind-libs-32bit-9.6ESVR11W1-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570942" comment="bind-utils-9.6ESVR11W1-0.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216953" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1000362" ref_url="https://bugzilla.suse.com/1000362" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2776" ref_url="https://www.suse.com/security/cve/CVE-2016-2776/" source="CVE"/>
		<description>

The nameserver bind was updated to fix a remote denial of service
vulnerability, where a crafted packet could cause the nameserver to abort. (CVE-2016-2776, bsc#1000362)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-27"/>
	<updated date="2016-09-27"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1000362">SUSE bug 1000362</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2776/">CVE-2016-2776 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2776">CVE-2016-2776 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570943" comment="bind-9.6ESVR11W1-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570944" comment="bind-chrootenv-9.6ESVR11W1-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570945" comment="bind-doc-9.6ESVR11W1-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570946" comment="bind-libs-9.6ESVR11W1-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570947" comment="bind-libs-32bit-9.6ESVR11W1-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570948" comment="bind-utils-9.6ESVR11W1-0.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216954" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1007829" ref_url="https://bugzilla.suse.com/1007829" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8864" ref_url="https://www.suse.com/security/cve/CVE-2016-8864/" source="CVE"/>
		<description>

This update for bind fixes the following issue:

- A defect in BIND's handling of responses containing a DNAME answer had
the potential to trigger assertion errors in the server remotely,
thereby facilitating a denial-of-service attack. (CVE-2016-8864, bsc#1007829).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-03"/>
	<updated date="2016-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1007829">SUSE bug 1007829</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8864/">CVE-2016-8864 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8864">CVE-2016-8864 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570949" comment="bind-9.6ESVR11W1-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570950" comment="bind-chrootenv-9.6ESVR11W1-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570951" comment="bind-doc-9.6ESVR11W1-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570952" comment="bind-libs-9.6ESVR11W1-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570953" comment="bind-libs-32bit-9.6ESVR11W1-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570954" comment="bind-utils-9.6ESVR11W1-0.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216955" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1018699" ref_url="https://bugzilla.suse.com/1018699" source="BUGZILLA"/>
		<reference ref_id="1018700" ref_url="https://bugzilla.suse.com/1018700" source="BUGZILLA"/>
		<reference ref_id="1018701" ref_url="https://bugzilla.suse.com/1018701" source="BUGZILLA"/>
		<reference ref_id="1018702" ref_url="https://bugzilla.suse.com/1018702" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9131" ref_url="https://www.suse.com/security/cve/CVE-2016-9131/" source="CVE"/>
		<reference ref_id="CVE-2016-9147" ref_url="https://www.suse.com/security/cve/CVE-2016-9147/" source="CVE"/>
		<reference ref_id="CVE-2016-9444" ref_url="https://www.suse.com/security/cve/CVE-2016-9444/" source="CVE"/>
		<description>

This update for bind fixes the following issues:

- Fix a potential assertion failure that could have been triggered by a
  malformed response to an ANY query, thereby facilitating a denial-of-service
  attack. [CVE-2016-9131, bsc#1018700, bsc#1018699]

- Fix a potential assertion failure that could have been triggered by
  responding to a query with inconsistent DNSSEC information, thereby
  facilitating a denial-of-service attack. [CVE-2016-9147, bsc#1018701,
  bsc#1018699]

- Fix potential assertion failure that could have been triggered by DNS
  responses that contain unusually-formed DS resource records, facilitating a
  denial-of-service attack. [CVE-2016-9444, bsc#1018702, bsc#1018699]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1018699">SUSE bug 1018699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9131/">CVE-2016-9131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9131">CVE-2016-9131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9147/">CVE-2016-9147 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9147">CVE-2016-9147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9444/">CVE-2016-9444 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9444">CVE-2016-9444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570955" comment="bind-9.6ESVR11W1-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570956" comment="bind-chrootenv-9.6ESVR11W1-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570957" comment="bind-doc-9.6ESVR11W1-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570958" comment="bind-libs-9.6ESVR11W1-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570959" comment="bind-libs-32bit-9.6ESVR11W1-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570960" comment="bind-utils-9.6ESVR11W1-0.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216956" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1046554" ref_url="https://bugzilla.suse.com/1046554" source="BUGZILLA"/>
		<reference ref_id="1046555" ref_url="https://bugzilla.suse.com/1046555" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3142" ref_url="https://www.suse.com/security/cve/CVE-2017-3142/" source="CVE"/>
		<reference ref_id="CVE-2017-3143" ref_url="https://www.suse.com/security/cve/CVE-2017-3143/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- An attacker with the ability to send and receive messages to an authoritative
  DNS server was able to circumvent TSIG authentication of AXFR requests. A
  server that relied solely on TSIG keys for protection could be manipulated
  into (1) providing an AXFR of a zone to an unauthorized recipient and (2)
  accepting bogus Notify packets. [bsc#1046554, CVE-2017-3142]

- An attacker who with the ability to send and receive messages to an
  authoritative DNS server and who had knowledge of a valid TSIG key name for
  the zone and service being targeted was able to manipulate BIND into
  accepting an unauthorized dynamic update. [bsc#1046555, CVE-2017-3143]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-29"/>
	<updated date="2017-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046554">SUSE bug 1046554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046555">SUSE bug 1046555</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3142/">CVE-2017-3142 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3142">CVE-2017-3142 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3143/">CVE-2017-3143 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3143">CVE-2017-3143 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570961" comment="bind-9.6ESVR11W1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570962" comment="bind-chrootenv-9.6ESVR11W1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570963" comment="bind-doc-9.6ESVR11W1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570964" comment="bind-libs-9.6ESVR11W1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570965" comment="bind-libs-32bit-9.6ESVR11W1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570966" comment="bind-utils-9.6ESVR11W1-0.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216957" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1040039" ref_url="https://bugzilla.suse.com/1040039" source="BUGZILLA"/>
		<reference ref_id="1047184" ref_url="https://bugzilla.suse.com/1047184" source="BUGZILLA"/>
		<reference ref_id="1076118" ref_url="https://bugzilla.suse.com/1076118" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3145" ref_url="https://www.suse.com/security/cve/CVE-2017-3145/" source="CVE"/>
		<description>
This update for bind fixes several issues.

This security issue was fixed:

- CVE-2017-3145: Improper sequencing during cleanup could have lead to a
  use-after-free error that triggered an assertion failure and crash in named
  (bsc#1076118).

These non-security issues were fixed:

- Updated named.root file (bsc#1040039)
- Update bind.keys for DNSSEC root KSK rollover (bsc#1047184)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-29"/>
	<updated date="2018-01-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040039">SUSE bug 1040039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047184">SUSE bug 1047184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076118">SUSE bug 1076118</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3145/">CVE-2017-3145 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3145">CVE-2017-3145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570967" comment="bind-9.6ESVR11W1-0.31.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570968" comment="bind-chrootenv-9.6ESVR11W1-0.31.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570969" comment="bind-doc-9.6ESVR11W1-0.31.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570970" comment="bind-libs-9.6ESVR11W1-0.31.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570971" comment="bind-libs-32bit-9.6ESVR11W1-0.31.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570972" comment="bind-utils-9.6ESVR11W1-0.31.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216958" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1133185" ref_url="https://bugzilla.suse.com/1133185" source="BUGZILLA"/>
		<reference ref_id="989528" ref_url="https://bugzilla.suse.com/989528" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2775" ref_url="https://www.suse.com/security/cve/CVE-2016-2775/" source="CVE"/>
		<reference ref_id="CVE-2018-5743" ref_url="https://www.suse.com/security/cve/CVE-2018-5743/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

Security issue fixed:

- CVE-2016-2775: Fixed a denial of service vulnerability related to very long query names (bsc#989528).
- CVE-2018-5743: Limiting simultaneous TCP clients is ineffective. (bsc#1133185)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-06"/>
	<updated date="2019-06-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133185">SUSE bug 1133185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989528">SUSE bug 989528</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2775/">CVE-2016-2775 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2775">CVE-2016-2775 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5743/">CVE-2018-5743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5743">CVE-2018-5743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570973" comment="bind-9.6ESVR11W1-0.31.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570974" comment="bind-chrootenv-9.6ESVR11W1-0.31.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570975" comment="bind-doc-9.6ESVR11W1-0.31.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570976" comment="bind-libs-9.6ESVR11W1-0.31.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570977" comment="bind-libs-32bit-9.6ESVR11W1-0.31.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570978" comment="bind-utils-9.6ESVR11W1-0.31.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216959" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1109160" ref_url="https://bugzilla.suse.com/1109160" source="BUGZILLA"/>
		<reference ref_id="1171740" ref_url="https://bugzilla.suse.com/1171740" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5741" ref_url="https://www.suse.com/security/cve/CVE-2018-5741/" source="CVE"/>
		<reference ref_id="CVE-2020-8616" ref_url="https://www.suse.com/security/cve/CVE-2020-8616/" source="CVE"/>
		<reference ref_id="CVE-2020-8617" ref_url="https://www.suse.com/security/cve/CVE-2020-8617/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8616: Fixed the insufficient limit on the number of fetches performed when processing referrals (bsc#1171740).
- CVE-2020-8617: Fixed a logic error in code which checks TSIG validity (bsc#1171740).
- CVE-2018-5741: Fixed the documentation (bsc#1109160).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-11"/>
	<updated date="2020-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5741/">CVE-2018-5741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5741">CVE-2018-5741 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8616/">CVE-2020-8616 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8616">CVE-2020-8616 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8617/">CVE-2020-8617 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8617">CVE-2020-8617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570979" comment="bind-9.6ESVR11W1-0.31.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570980" comment="bind-chrootenv-9.6ESVR11W1-0.31.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570981" comment="bind-doc-9.6ESVR11W1-0.31.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570982" comment="bind-libs-9.6ESVR11W1-0.31.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570983" comment="bind-libs-32bit-9.6ESVR11W1-0.31.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570984" comment="bind-utils-9.6ESVR11W1-0.31.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216960" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1182246" ref_url="https://bugzilla.suse.com/1182246" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8625" ref_url="https://www.suse.com/security/cve/CVE-2020-8625/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8625: A vulnerability in BIND's GSSAPI security policy
  negotiation can be targeted by a buffer overflow attack [bsc#1182246, CVE-2020-8625]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182246">SUSE bug 1182246</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8625/">CVE-2020-8625 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8625">CVE-2020-8625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570985" comment="bind-9.6ESVR11W1-0.31.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570986" comment="bind-chrootenv-9.6ESVR11W1-0.31.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570987" comment="bind-doc-9.6ESVR11W1-0.31.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570988" comment="bind-libs-9.6ESVR11W1-0.31.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570989" comment="bind-libs-32bit-9.6ESVR11W1-0.31.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570990" comment="bind-utils-9.6ESVR11W1-0.31.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216961" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1185345" ref_url="https://bugzilla.suse.com/1185345" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25214" ref_url="https://www.suse.com/security/cve/CVE-2021-25214/" source="CVE"/>
		<reference ref_id="CVE-2021-25215" ref_url="https://www.suse.com/security/cve/CVE-2021-25215/" source="CVE"/>
		<reference ref_id="CVE-2021-25216" ref_url="https://www.suse.com/security/cve/CVE-2021-25216/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25214: Fixed a broken inbound incremental zone update (IXFR) which could have caused named to terminate unexpectedly (bsc#1185345).
- CVE-2021-25215: Fixed an assertion check which could have failed while answering queries for DNAME records that required the DNAME to be processed to resolve itself (bsc#1185345).
- CVE-2021-25216: Fixed an issue where policy negotiation can be targeted by a buffer overflow attack (bsc#1185345).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185345">SUSE bug 1185345</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25214/">CVE-2021-25214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25214">CVE-2021-25214 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25215/">CVE-2021-25215 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25215">CVE-2021-25215 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25216/">CVE-2021-25216 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25216">CVE-2021-25216 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570991" comment="bind-9.6ESVR11W1-0.31.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570992" comment="bind-chrootenv-9.6ESVR11W1-0.31.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570993" comment="bind-doc-9.6ESVR11W1-0.31.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570994" comment="bind-libs-9.6ESVR11W1-0.31.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570995" comment="bind-libs-32bit-9.6ESVR11W1-0.31.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570996" comment="bind-utils-9.6ESVR11W1-0.31.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216962" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1192146" ref_url="https://bugzilla.suse.com/1192146" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25219" ref_url="https://www.suse.com/security/cve/CVE-2021-25219/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25219: Fixed lame cache that could have been abused to severely degrade resolver performance (bsc#1192146).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-09"/>
	<updated date="2021-11-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192146">SUSE bug 1192146</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-25219/">CVE-2021-25219 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25219">CVE-2021-25219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654149" comment="bind-9.6ESVR11W1-0.31.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654150" comment="bind-chrootenv-9.6ESVR11W1-0.31.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654151" comment="bind-doc-9.6ESVR11W1-0.31.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654152" comment="bind-libs-9.6ESVR11W1-0.31.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654153" comment="bind-libs-32bit-9.6ESVR11W1-0.31.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654154" comment="bind-utils-9.6ESVR11W1-0.31.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216963" version="1" class="patch">
	<metadata>
		<title>Recommended update for binutils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="921737" ref_url="https://bugzilla.suse.com/921737" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8484" ref_url="https://www.suse.com/security/cve/CVE-2014-8484/" source="CVE"/>
		<reference ref_id="CVE-2014-8485" ref_url="https://www.suse.com/security/cve/CVE-2014-8485/" source="CVE"/>
		<reference ref_id="CVE-2014-8501" ref_url="https://www.suse.com/security/cve/CVE-2014-8501/" source="CVE"/>
		<reference ref_id="CVE-2014-8502" ref_url="https://www.suse.com/security/cve/CVE-2014-8502/" source="CVE"/>
		<reference ref_id="CVE-2014-8503" ref_url="https://www.suse.com/security/cve/CVE-2014-8503/" source="CVE"/>
		<reference ref_id="CVE-2014-8504" ref_url="https://www.suse.com/security/cve/CVE-2014-8504/" source="CVE"/>
		<reference ref_id="CVE-2014-8737" ref_url="https://www.suse.com/security/cve/CVE-2014-8737/" source="CVE"/>
		<reference ref_id="CVE-2014-8738" ref_url="https://www.suse.com/security/cve/CVE-2014-8738/" source="CVE"/>
		<description>

binutils has been updated to version 2.24, from SLE 11-SP4:

    * Update to SLE 11-SP4 version of binutils (2.24 based). (bsc#921737)
    * Fix for several CVEs found when feeding fuzzed binary files into
      various binutils programs like strings, objdump or readelf. [bnc
      #902676, #902677, #903655, #905735, #905736] [CVE-2014-8485,
      CVE-2014-8484, CVE-2014-8501, CVE-2014-8502, CVE-2014-8503,
      CVE-2014-8504, CVE-2014-8738, CVE-2014-8737] [PR17510, PR17512,
      PR17521, PR17531, PR17533, PR17552, PR17597, PR17605]

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-18"/>
	<updated date="2015-03-18"/>
	<bugzilla href="https://bugzilla.suse.com/921737">SUSE bug 921737</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8484/">CVE-2014-8484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8484">CVE-2014-8484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8485/">CVE-2014-8485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8485">CVE-2014-8485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8501/">CVE-2014-8501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8501">CVE-2014-8501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8502/">CVE-2014-8502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8502">CVE-2014-8502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8503/">CVE-2014-8503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8503">CVE-2014-8503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8504/">CVE-2014-8504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8504">CVE-2014-8504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8737/">CVE-2014-8737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8737">CVE-2014-8737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8738/">CVE-2014-8738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8738">CVE-2014-8738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593493" comment="binutils-2.24-0.3.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216964" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1057342" ref_url="https://bugzilla.suse.com/1057342" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000250" ref_url="https://www.suse.com/security/cve/CVE-2017-1000250/" source="CVE"/>
		<description>
This update for bluez fixes the following issues:

Security issue fixed:

- CVE-2017-1000250: Fixed Out-of-bounds heap read in service_search_attr_req check if there is enough data to continue otherwise return an error (bsc#1057342).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1057342">SUSE bug 1057342</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000250/">CVE-2017-1000250 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000250">CVE-2017-1000250 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570997" comment="bluez-4.51-1.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570998" comment="libbluetooth3-4.51-1.5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216965" version="1" class="patch">
	<metadata>
		<title>Security update for boost</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="765443" ref_url="https://bugzilla.suse.com/765443" source="BUGZILLA"/>
		<reference ref_id="767949" ref_url="https://bugzilla.suse.com/767949" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2677" ref_url="https://www.suse.com/security/cve/CVE-2012-2677/" source="CVE"/>
		<description>

The following issue has been fixed:

    * boost::pool's ordered_malloc could have overflowed when calculating
      the allocation size (CVE-2012-2677).

Security Issue reference:

    * CVE-2012-2677
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2677&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-05"/>
	<updated date="2012-07-05"/>
	<bugzilla href="https://bugzilla.suse.com/765443">SUSE bug 765443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767949">SUSE bug 767949</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2677/">CVE-2012-2677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2677">CVE-2012-2677 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991303" comment="boost-license-1.36.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991304" comment="libboost_program_options1_36_0-1.36.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991305" comment="libboost_regex1_36_0-1.36.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991306" comment="libboost_signals1_36_0-1.36.0-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216966" version="1" class="patch">
	<metadata>
		<title>Security update for bsdtar (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="920870" ref_url="https://bugzilla.suse.com/920870" source="BUGZILLA"/>
		<reference ref_id="984990" ref_url="https://bugzilla.suse.com/984990" source="BUGZILLA"/>
		<reference ref_id="985609" ref_url="https://bugzilla.suse.com/985609" source="BUGZILLA"/>
		<reference ref_id="985669" ref_url="https://bugzilla.suse.com/985669" source="BUGZILLA"/>
		<reference ref_id="985675" ref_url="https://bugzilla.suse.com/985675" source="BUGZILLA"/>
		<reference ref_id="985682" ref_url="https://bugzilla.suse.com/985682" source="BUGZILLA"/>
		<reference ref_id="985698" ref_url="https://bugzilla.suse.com/985698" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2304" ref_url="https://www.suse.com/security/cve/CVE-2015-2304/" source="CVE"/>
		<reference ref_id="CVE-2015-8918" ref_url="https://www.suse.com/security/cve/CVE-2015-8918/" source="CVE"/>
		<reference ref_id="CVE-2015-8920" ref_url="https://www.suse.com/security/cve/CVE-2015-8920/" source="CVE"/>
		<reference ref_id="CVE-2015-8921" ref_url="https://www.suse.com/security/cve/CVE-2015-8921/" source="CVE"/>
		<reference ref_id="CVE-2015-8924" ref_url="https://www.suse.com/security/cve/CVE-2015-8924/" source="CVE"/>
		<reference ref_id="CVE-2015-8929" ref_url="https://www.suse.com/security/cve/CVE-2015-8929/" source="CVE"/>
		<reference ref_id="CVE-2016-4809" ref_url="https://www.suse.com/security/cve/CVE-2016-4809/" source="CVE"/>
		<description>
bsdtar was updated to fix seven security issues.

These security issues were fixed:
- CVE-2015-8929: Memory leak in tar parser (bsc#985669).
- CVE-2016-4809: Memory allocate error with symbolic links in cpio archives (bsc#984990).
- CVE-2015-8920: Stack out of bounds read in ar parser (bsc#985675).
- CVE-2015-8921: Global out of bounds read in mtree parser (bsc#985682).
- CVE-2015-8924: Heap buffer read overflow in tar (bsc#985609).
- CVE-2015-8918: Overlapping memcpy in CAB parser (bsc#985698).
- CVE-2015-2304: Reject absolute paths in input mode of bsdcpio exactly when '..' is rejected (bsc#920870).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-02"/>
	<updated date="2016-08-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/920870">SUSE bug 920870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984990">SUSE bug 984990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985609">SUSE bug 985609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985669">SUSE bug 985669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985675">SUSE bug 985675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985682">SUSE bug 985682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985698">SUSE bug 985698</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2304/">CVE-2015-2304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2304">CVE-2015-2304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8918/">CVE-2015-8918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8918">CVE-2015-8918 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8920/">CVE-2015-8920 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8920">CVE-2015-8920 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8921/">CVE-2015-8921 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8921">CVE-2015-8921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8924/">CVE-2015-8924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8924">CVE-2015-8924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8929/">CVE-2015-8929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8929">CVE-2015-8929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4809/">CVE-2016-4809 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4809">CVE-2016-4809 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571003" comment="libarchive2-2.5.5-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216967" version="1" class="patch">
	<metadata>
		<title>Security update for bsdtar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1005070" ref_url="https://bugzilla.suse.com/1005070" source="BUGZILLA"/>
		<reference ref_id="1059139" ref_url="https://bugzilla.suse.com/1059139" source="BUGZILLA"/>
		<reference ref_id="985601" ref_url="https://bugzilla.suse.com/985601" source="BUGZILLA"/>
		<reference ref_id="985706" ref_url="https://bugzilla.suse.com/985706" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8915" ref_url="https://www.suse.com/security/cve/CVE-2015-8915/" source="CVE"/>
		<reference ref_id="CVE-2015-8925" ref_url="https://www.suse.com/security/cve/CVE-2015-8925/" source="CVE"/>
		<reference ref_id="CVE-2016-8687" ref_url="https://www.suse.com/security/cve/CVE-2016-8687/" source="CVE"/>
		<reference ref_id="CVE-2017-14503" ref_url="https://www.suse.com/security/cve/CVE-2017-14503/" source="CVE"/>
		<description>
This update for bsdtar fixes the following issues:

- CVE-2015-8915: Fixed an invalid read which could have allowed 
  remote attackers to cause a denial of service (bsc#985601).
- CVE-2015-8925: Fixed an invalid read which could have allowed 
  remote attackers to cause a denial of service (bsc#985706).
- CVE-2017-14503: Fixed an out of bounds read within lha_read_data_none() 
  in archive_read_support_format_lha.c (bsc#1059139).
- CVE-2016-8687: Fixed a buffer overflow when printing a filename (bsc#1005070).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-27"/>
	<updated date="2019-11-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005070">SUSE bug 1005070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059139">SUSE bug 1059139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985601">SUSE bug 985601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985706">SUSE bug 985706</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8915/">CVE-2015-8915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8915">CVE-2015-8915 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8925/">CVE-2015-8925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8925">CVE-2015-8925 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8687/">CVE-2016-8687 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8687">CVE-2016-8687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14503/">CVE-2017-14503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14503">CVE-2017-14503 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571004" comment="libarchive2-2.5.5-10.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216968" version="1" class="patch">
	<metadata>
		<title>Security update for Mono</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="592428" ref_url="https://bugzilla.suse.com/592428" source="BUGZILLA"/>
		<reference ref_id="648080" ref_url="https://bugzilla.suse.com/648080" source="BUGZILLA"/>
		<reference ref_id="648086" ref_url="https://bugzilla.suse.com/648086" source="BUGZILLA"/>
		<reference ref_id="921312" ref_url="https://bugzilla.suse.com/921312" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-1459" ref_url="https://www.suse.com/security/cve/CVE-2010-1459/" source="CVE"/>
		<reference ref_id="CVE-2010-3332" ref_url="https://www.suse.com/security/cve/CVE-2010-3332/" source="CVE"/>
		<reference ref_id="CVE-2010-4159" ref_url="https://www.suse.com/security/cve/CVE-2010-4159/" source="CVE"/>
		<reference ref_id="CVE-2015-2318" ref_url="https://www.suse.com/security/cve/CVE-2015-2318/" source="CVE"/>
		<reference ref_id="CVE-2015-2319" ref_url="https://www.suse.com/security/cve/CVE-2015-2319/" source="CVE"/>
		<reference ref_id="CVE-2015-2320" ref_url="https://www.suse.com/security/cve/CVE-2015-2320/" source="CVE"/>
		<description>

The following security bugs have been fixed:

    * Mono was vulnerable to a padding oracle attack (CVE-2010-3332).
    * Mono loaded shared libraries from the current directory
      (CVE-2010-4159).

Security Issue references:

    * CVE-2010-3332
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3332&gt;
    * CVE-2010-4159
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4159&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-03-31"/>
	<updated date="2011-03-31"/>
	<bugzilla href="https://bugzilla.suse.com/592428">SUSE bug 592428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648080">SUSE bug 648080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648086">SUSE bug 648086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921312">SUSE bug 921312</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1459/">CVE-2010-1459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1459">CVE-2010-1459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3332/">CVE-2010-3332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3332">CVE-2010-3332 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4159/">CVE-2010-4159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4159">CVE-2010-4159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2318/">CVE-2015-2318 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2318">CVE-2015-2318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2319/">CVE-2015-2319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2319">CVE-2015-2319 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2320/">CVE-2015-2320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2320">CVE-2015-2320 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991307" comment="mono-core-2.0.1-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991308" comment="mono-data-2.0.1-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991309" comment="mono-data-postgresql-2.0.1-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991310" comment="mono-data-sqlite-2.0.1-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991311" comment="mono-locale-extras-2.0.1-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991312" comment="mono-nunit-2.0.1-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991313" comment="mono-web-2.0.1-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991314" comment="mono-winforms-2.0.1-1.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216969" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="636978" ref_url="https://bugzilla.suse.com/636978" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<description>

This update fixes an integer overflow in the BZ2_decompress function of 
bzip2/libbz2. This could have been exploited via a crafted archive to cause 
a denial of service or even execute arbitrary code. (CVE-2010-0405)

Security Issue reference:

    * CVE-2010-0405
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0405&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-09-17"/>
	<updated date="2010-09-17"/>
	<bugzilla href="https://bugzilla.suse.com/636978">SUSE bug 636978</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0405">CVE-2010-0405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991315" comment="bzip2-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991316" comment="bzip2-doc-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991317" comment="libbz2-1-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991318" comment="libbz2-1-32bit-1.0.5-34.253.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216970" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="985657" ref_url="https://bugzilla.suse.com/985657" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3189" ref_url="https://www.suse.com/security/cve/CVE-2016-3189/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<description>
This update for bzip2 fixes the following issues:

Security issue fixed:

- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1139083).
- CVE-2016-3189: Fixed a use-after-free in bzip2recover (bsc#985657).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-15"/>
	<updated date="2019-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985657">SUSE bug 985657</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3189/">CVE-2016-3189 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3189">CVE-2016-3189 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571013" comment="bzip2-1.0.5-34.256.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571014" comment="bzip2-doc-1.0.5-34.256.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571015" comment="libbz2-1-1.0.5-34.256.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571016" comment="libbz2-1-32bit-1.0.5-34.256.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216971" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<description>
This update for bzip2 fixes the following issues:

- Fixed a regression with the fix for CVE-2019-12900, which caused incompatibilities
  with files that used many selectors (bsc#1139083).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-06"/>
	<updated date="2019-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571017" comment="bzip2-1.0.5-34.256.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571018" comment="bzip2-doc-1.0.5-34.256.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571019" comment="libbz2-1-1.0.5-34.256.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571020" comment="libbz2-1-32bit-1.0.5-34.256.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216972" version="1" class="patch">
	<metadata>
		<title>Security update for cairo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1007255" ref_url="https://bugzilla.suse.com/1007255" source="BUGZILLA"/>
		<reference ref_id="1036789" ref_url="https://bugzilla.suse.com/1036789" source="BUGZILLA"/>
		<reference ref_id="1049092" ref_url="https://bugzilla.suse.com/1049092" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9082" ref_url="https://www.suse.com/security/cve/CVE-2016-9082/" source="CVE"/>
		<reference ref_id="CVE-2017-7475" ref_url="https://www.suse.com/security/cve/CVE-2017-7475/" source="CVE"/>
		<reference ref_id="CVE-2017-9814" ref_url="https://www.suse.com/security/cve/CVE-2017-9814/" source="CVE"/>
		<description>
This update for cairo fixes the following issues:

- CVE-2016-9082: Fixed a segfault when using &gt;4GB images since int values were used
  for pointer operations (bsc#1007255).
- CVE-2017-9814: Replace malloc with _cairo_malloc and check cmap size before
  allocating to prevent DoS (bsc#1049092).
- CVE-2017-7475: Fix a segfault in get_bitmap_surface due to malformed font (bsc#1036789).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-28"/>
	<updated date="2018-05-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007255">SUSE bug 1007255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036789">SUSE bug 1036789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049092">SUSE bug 1049092</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9082/">CVE-2016-9082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9082">CVE-2016-9082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7475/">CVE-2017-7475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7475">CVE-2017-7475 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9814/">CVE-2017-9814 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9814">CVE-2017-9814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571021" comment="cairo-1.8.8-2.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571022" comment="cairo-32bit-1.8.8-2.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571023" comment="cairo-doc-1.8.8-2.3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216973" version="1" class="patch">
	<metadata>
		<title>Security update for cairo (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1122321" ref_url="https://bugzilla.suse.com/1122321" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6462" ref_url="https://www.suse.com/security/cve/CVE-2019-6462/" source="CVE"/>
		<description>
This update for cairo fixes the following issues:

- CVE-2019-6462: Fixed a potentially infinite loop (bsc#1122321).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-30"/>
	<updated date="2021-09-30"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1122321">SUSE bug 1122321</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6462/">CVE-2019-6462 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6462">CVE-2019-6462 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633398" comment="cairo-1.8.8-2.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633399" comment="cairo-32bit-1.8.8-2.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633400" comment="cairo-doc-1.8.8-2.3.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216974" version="1" class="patch">
	<metadata>
		<title>Security update for Samba</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="499233" ref_url="https://bugzilla.suse.com/499233" source="BUGZILLA"/>
		<reference ref_id="573246" ref_url="https://bugzilla.suse.com/573246" source="BUGZILLA"/>
		<reference ref_id="583535" ref_url="https://bugzilla.suse.com/583535" source="BUGZILLA"/>
		<reference ref_id="617153" ref_url="https://bugzilla.suse.com/617153" source="BUGZILLA"/>
		<reference ref_id="630812" ref_url="https://bugzilla.suse.com/630812" source="BUGZILLA"/>
		<reference ref_id="632055" ref_url="https://bugzilla.suse.com/632055" source="BUGZILLA"/>
		<reference ref_id="632852" ref_url="https://bugzilla.suse.com/632852" source="BUGZILLA"/>
		<reference ref_id="637218" ref_url="https://bugzilla.suse.com/637218" source="BUGZILLA"/>
		<reference ref_id="643119" ref_url="https://bugzilla.suse.com/643119" source="BUGZILLA"/>
		<reference ref_id="643787" ref_url="https://bugzilla.suse.com/643787" source="BUGZILLA"/>
		<reference ref_id="649526" ref_url="https://bugzilla.suse.com/649526" source="BUGZILLA"/>
		<reference ref_id="649636" ref_url="https://bugzilla.suse.com/649636" source="BUGZILLA"/>
		<reference ref_id="668773" ref_url="https://bugzilla.suse.com/668773" source="BUGZILLA"/>
		<reference ref_id="670431" ref_url="https://bugzilla.suse.com/670431" source="BUGZILLA"/>
		<reference ref_id="675978" ref_url="https://bugzilla.suse.com/675978" source="BUGZILLA"/>
		<reference ref_id="693945" ref_url="https://bugzilla.suse.com/693945" source="BUGZILLA"/>
		<reference ref_id="705170" ref_url="https://bugzilla.suse.com/705170" source="BUGZILLA"/>
		<reference ref_id="705241" ref_url="https://bugzilla.suse.com/705241" source="BUGZILLA"/>
		<reference ref_id="708503" ref_url="https://bugzilla.suse.com/708503" source="BUGZILLA"/>
		<reference ref_id="710791" ref_url="https://bugzilla.suse.com/710791" source="BUGZILLA"/>
		<reference ref_id="722663" ref_url="https://bugzilla.suse.com/722663" source="BUGZILLA"/>
		<reference ref_id="732572" ref_url="https://bugzilla.suse.com/732572" source="BUGZILLA"/>
		<reference ref_id="741623" ref_url="https://bugzilla.suse.com/741623" source="BUGZILLA"/>
		<reference ref_id="742885" ref_url="https://bugzilla.suse.com/742885" source="BUGZILLA"/>
		<reference ref_id="747906" ref_url="https://bugzilla.suse.com/747906" source="BUGZILLA"/>
		<reference ref_id="752797" ref_url="https://bugzilla.suse.com/752797" source="BUGZILLA"/>
		<reference ref_id="754443" ref_url="https://bugzilla.suse.com/754443" source="BUGZILLA"/>
		<reference ref_id="755663" ref_url="https://bugzilla.suse.com/755663" source="BUGZILLA"/>
		<reference ref_id="757080" ref_url="https://bugzilla.suse.com/757080" source="BUGZILLA"/>
		<reference ref_id="757576" ref_url="https://bugzilla.suse.com/757576" source="BUGZILLA"/>
		<reference ref_id="759731" ref_url="https://bugzilla.suse.com/759731" source="BUGZILLA"/>
		<reference ref_id="764577" ref_url="https://bugzilla.suse.com/764577" source="BUGZILLA"/>
		<reference ref_id="783384" ref_url="https://bugzilla.suse.com/783384" source="BUGZILLA"/>
		<reference ref_id="799641" ref_url="https://bugzilla.suse.com/799641" source="BUGZILLA"/>
		<reference ref_id="800982" ref_url="https://bugzilla.suse.com/800982" source="BUGZILLA"/>
		<reference ref_id="829969" ref_url="https://bugzilla.suse.com/829969" source="BUGZILLA"/>
		<reference ref_id="844720" ref_url="https://bugzilla.suse.com/844720" source="BUGZILLA"/>
		<reference ref_id="848101" ref_url="https://bugzilla.suse.com/848101" source="BUGZILLA"/>
		<reference ref_id="849224" ref_url="https://bugzilla.suse.com/849224" source="BUGZILLA"/>
		<reference ref_id="853021" ref_url="https://bugzilla.suse.com/853021" source="BUGZILLA"/>
		<reference ref_id="853347" ref_url="https://bugzilla.suse.com/853347" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-3069" ref_url="https://www.suse.com/security/cve/CVE-2010-3069/" source="CVE"/>
		<reference ref_id="CVE-2011-0719" ref_url="https://www.suse.com/security/cve/CVE-2011-0719/" source="CVE"/>
		<reference ref_id="CVE-2011-2522" ref_url="https://www.suse.com/security/cve/CVE-2011-2522/" source="CVE"/>
		<reference ref_id="CVE-2011-2694" ref_url="https://www.suse.com/security/cve/CVE-2011-2694/" source="CVE"/>
		<reference ref_id="CVE-2012-1182" ref_url="https://www.suse.com/security/cve/CVE-2012-1182/" source="CVE"/>
		<reference ref_id="CVE-2012-2111" ref_url="https://www.suse.com/security/cve/CVE-2012-2111/" source="CVE"/>
		<reference ref_id="CVE-2012-6150" ref_url="https://www.suse.com/security/cve/CVE-2012-6150/" source="CVE"/>
		<reference ref_id="CVE-2013-0213" ref_url="https://www.suse.com/security/cve/CVE-2013-0213/" source="CVE"/>
		<reference ref_id="CVE-2013-0214" ref_url="https://www.suse.com/security/cve/CVE-2013-0214/" source="CVE"/>
		<reference ref_id="CVE-2013-4124" ref_url="https://www.suse.com/security/cve/CVE-2013-4124/" source="CVE"/>
		<reference ref_id="CVE-2013-4408" ref_url="https://www.suse.com/security/cve/CVE-2013-4408/" source="CVE"/>
		<reference ref_id="CVE-2013-4475" ref_url="https://www.suse.com/security/cve/CVE-2013-4475/" source="CVE"/>
		<reference ref_id="CVE-2013-4496" ref_url="https://www.suse.com/security/cve/CVE-2013-4496/" source="CVE"/>
		<description>

Samba was updated to fix a security issue:

Samba, when vfs_streams_depot or vfs_streams_xattr is enabled, allows 
remote attackers to bypass intended file restrictions by leveraging ACL 
differences between a file and an associated alternate data stream (ADS). 
(CVE-2013-4475)

Security Issue reference:

    * CVE-2013-4475
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-02"/>
	<updated date="2014-06-02"/>
	<bugzilla href="https://bugzilla.suse.com/499233">SUSE bug 499233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/573246">SUSE bug 573246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/583535">SUSE bug 583535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/617153">SUSE bug 617153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/630812">SUSE bug 630812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/632055">SUSE bug 632055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/632852">SUSE bug 632852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/637218">SUSE bug 637218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/643119">SUSE bug 643119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/643787">SUSE bug 643787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649526">SUSE bug 649526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649636">SUSE bug 649636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/668773">SUSE bug 668773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/670431">SUSE bug 670431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/675978">SUSE bug 675978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693945">SUSE bug 693945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/705170">SUSE bug 705170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/705241">SUSE bug 705241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/708503">SUSE bug 708503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/710791">SUSE bug 710791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/722663">SUSE bug 722663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/732572">SUSE bug 732572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/741623">SUSE bug 741623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742885">SUSE bug 742885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747906">SUSE bug 747906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752797">SUSE bug 752797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754443">SUSE bug 754443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/755663">SUSE bug 755663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757080">SUSE bug 757080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757576">SUSE bug 757576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759731">SUSE bug 759731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/764577">SUSE bug 764577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/783384">SUSE bug 783384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799641">SUSE bug 799641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800982">SUSE bug 800982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829969">SUSE bug 829969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844720">SUSE bug 844720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848101">SUSE bug 848101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849224">SUSE bug 849224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853021">SUSE bug 853021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853347">SUSE bug 853347</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3069/">CVE-2010-3069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3069">CVE-2010-3069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0719/">CVE-2011-0719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0719">CVE-2011-0719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2522/">CVE-2011-2522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2522">CVE-2011-2522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2694/">CVE-2011-2694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2694">CVE-2011-2694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1182/">CVE-2012-1182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1182">CVE-2012-1182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2111/">CVE-2012-2111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2111">CVE-2012-2111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6150/">CVE-2012-6150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6150">CVE-2012-6150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0213/">CVE-2013-0213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0213">CVE-2013-0213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0214/">CVE-2013-0214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0214">CVE-2013-0214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4124/">CVE-2013-4124 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4124">CVE-2013-4124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4408/">CVE-2013-4408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4408">CVE-2013-4408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4475/">CVE-2013-4475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4475">CVE-2013-4475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4496/">CVE-2013-4496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4496">CVE-2013-4496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991319" comment="cifs-mount-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991320" comment="ldapsmb-1.34b-11.28.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991321" comment="libsmbclient0-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991322" comment="libsmbclient0-32bit-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991323" comment="libtalloc1-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991324" comment="libtalloc1-32bit-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991325" comment="libtdb1-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991326" comment="libtdb1-32bit-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991327" comment="libwbclient0-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991328" comment="libwbclient0-32bit-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991329" comment="samba-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991330" comment="samba-32bit-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991331" comment="samba-client-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991332" comment="samba-client-32bit-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587980" comment="samba-doc-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991333" comment="samba-krb-printing-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991334" comment="samba-winbind-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991335" comment="samba-winbind-32bit-3.4.3-1.54.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991319" comment="cifs-mount-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991320" comment="ldapsmb-1.34b-11.28.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991321" comment="libsmbclient0-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991322" comment="libsmbclient0-32bit-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991323" comment="libtalloc1-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991324" comment="libtalloc1-32bit-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991325" comment="libtdb1-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991326" comment="libtdb1-32bit-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991327" comment="libwbclient0-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991328" comment="libwbclient0-32bit-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991329" comment="samba-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991330" comment="samba-32bit-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991331" comment="samba-client-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991332" comment="samba-client-32bit-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587980" comment="samba-doc-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991333" comment="samba-krb-printing-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991334" comment="samba-winbind-3.4.3-1.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991335" comment="samba-winbind-32bit-3.4.3-1.54.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216975" version="1" class="patch">
	<metadata>
		<title>Recommended update for clamav</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="608188" ref_url="https://bugzilla.suse.com/608188" source="BUGZILLA"/>
		<reference ref_id="640812" ref_url="https://bugzilla.suse.com/640812" source="BUGZILLA"/>
		<reference ref_id="649631" ref_url="https://bugzilla.suse.com/649631" source="BUGZILLA"/>
		<reference ref_id="656548" ref_url="https://bugzilla.suse.com/656548" source="BUGZILLA"/>
		<reference ref_id="673753" ref_url="https://bugzilla.suse.com/673753" source="BUGZILLA"/>
		<reference ref_id="698999" ref_url="https://bugzilla.suse.com/698999" source="BUGZILLA"/>
		<reference ref_id="708263" ref_url="https://bugzilla.suse.com/708263" source="BUGZILLA"/>
		<reference ref_id="724856" ref_url="https://bugzilla.suse.com/724856" source="BUGZILLA"/>
		<reference ref_id="753610" ref_url="https://bugzilla.suse.com/753610" source="BUGZILLA"/>
		<reference ref_id="753611" ref_url="https://bugzilla.suse.com/753611" source="BUGZILLA"/>
		<reference ref_id="753613" ref_url="https://bugzilla.suse.com/753613" source="BUGZILLA"/>
		<reference ref_id="767574" ref_url="https://bugzilla.suse.com/767574" source="BUGZILLA"/>
		<reference ref_id="780181" ref_url="https://bugzilla.suse.com/780181" source="BUGZILLA"/>
		<reference ref_id="809945" ref_url="https://bugzilla.suse.com/809945" source="BUGZILLA"/>
		<reference ref_id="816865" ref_url="https://bugzilla.suse.com/816865" source="BUGZILLA"/>
		<reference ref_id="841815" ref_url="https://bugzilla.suse.com/841815" source="BUGZILLA"/>
		<reference ref_id="865883" ref_url="https://bugzilla.suse.com/865883" source="BUGZILLA"/>
		<reference ref_id="877475" ref_url="https://bugzilla.suse.com/877475" source="BUGZILLA"/>
		<reference ref_id="899395" ref_url="https://bugzilla.suse.com/899395" source="BUGZILLA"/>
		<reference ref_id="903489" ref_url="https://bugzilla.suse.com/903489" source="BUGZILLA"/>
		<reference ref_id="903719" ref_url="https://bugzilla.suse.com/903719" source="BUGZILLA"/>
		<reference ref_id="904207" ref_url="https://bugzilla.suse.com/904207" source="BUGZILLA"/>
		<reference ref_id="906077" ref_url="https://bugzilla.suse.com/906077" source="BUGZILLA"/>
		<reference ref_id="906770" ref_url="https://bugzilla.suse.com/906770" source="BUGZILLA"/>
		<reference ref_id="915512" ref_url="https://bugzilla.suse.com/915512" source="BUGZILLA"/>
		<reference ref_id="916214" ref_url="https://bugzilla.suse.com/916214" source="BUGZILLA"/>
		<reference ref_id="916215" ref_url="https://bugzilla.suse.com/916215" source="BUGZILLA"/>
		<reference ref_id="916217" ref_url="https://bugzilla.suse.com/916217" source="BUGZILLA"/>
		<reference ref_id="929192" ref_url="https://bugzilla.suse.com/929192" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-1639" ref_url="https://www.suse.com/security/cve/CVE-2010-1639/" source="CVE"/>
		<reference ref_id="CVE-2010-1640" ref_url="https://www.suse.com/security/cve/CVE-2010-1640/" source="CVE"/>
		<reference ref_id="CVE-2010-2077" ref_url="https://www.suse.com/security/cve/CVE-2010-2077/" source="CVE"/>
		<reference ref_id="CVE-2010-3434" ref_url="https://www.suse.com/security/cve/CVE-2010-3434/" source="CVE"/>
		<reference ref_id="CVE-2011-1003" ref_url="https://www.suse.com/security/cve/CVE-2011-1003/" source="CVE"/>
		<reference ref_id="CVE-2011-2721" ref_url="https://www.suse.com/security/cve/CVE-2011-2721/" source="CVE"/>
		<reference ref_id="CVE-2011-3627" ref_url="https://www.suse.com/security/cve/CVE-2011-3627/" source="CVE"/>
		<reference ref_id="CVE-2012-1457" ref_url="https://www.suse.com/security/cve/CVE-2012-1457/" source="CVE"/>
		<reference ref_id="CVE-2012-1458" ref_url="https://www.suse.com/security/cve/CVE-2012-1458/" source="CVE"/>
		<reference ref_id="CVE-2012-1459" ref_url="https://www.suse.com/security/cve/CVE-2012-1459/" source="CVE"/>
		<reference ref_id="CVE-2013-2020" ref_url="https://www.suse.com/security/cve/CVE-2013-2020/" source="CVE"/>
		<reference ref_id="CVE-2013-2021" ref_url="https://www.suse.com/security/cve/CVE-2013-2021/" source="CVE"/>
		<reference ref_id="CVE-2013-6497" ref_url="https://www.suse.com/security/cve/CVE-2013-6497/" source="CVE"/>
		<reference ref_id="CVE-2014-9050" ref_url="https://www.suse.com/security/cve/CVE-2014-9050/" source="CVE"/>
		<reference ref_id="CVE-2014-9328" ref_url="https://www.suse.com/security/cve/CVE-2014-9328/" source="CVE"/>
		<reference ref_id="CVE-2015-1461" ref_url="https://www.suse.com/security/cve/CVE-2015-1461/" source="CVE"/>
		<reference ref_id="CVE-2015-1462" ref_url="https://www.suse.com/security/cve/CVE-2015-1462/" source="CVE"/>
		<reference ref_id="CVE-2015-1463" ref_url="https://www.suse.com/security/cve/CVE-2015-1463/" source="CVE"/>
		<reference ref_id="CVE-2015-2170" ref_url="https://www.suse.com/security/cve/CVE-2015-2170/" source="CVE"/>
		<reference ref_id="CVE-2015-2221" ref_url="https://www.suse.com/security/cve/CVE-2015-2221/" source="CVE"/>
		<reference ref_id="CVE-2015-2222" ref_url="https://www.suse.com/security/cve/CVE-2015-2222/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2668" ref_url="https://www.suse.com/security/cve/CVE-2015-2668/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001230.html" source="SUSE-SU"/>
		<description>

The antivirus scanner ClamAV has been updated to version 0.98.3, which 
includes the following fixes and enhancements:

    * Support for common raw disk image formats using 512 byte sectors,
      specifically GPT, APM, and MBR partitioning.
    * All ClamAV sockets (clamd, freshclam, clamav-milter, clamdscan,
      clamdtop) now support IPV6 addresses and configuration parameters.
    * Use OpenSSL file hash functions for improved performance.
    * Improved detection of malware scripts within image files.
    * Miscellaneous bug fixes and documentation improvements.

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-28"/>
	<updated date="2014-05-28"/>
	<bugzilla href="https://bugzilla.suse.com/608188">SUSE bug 608188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/640812">SUSE bug 640812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649631">SUSE bug 649631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/656548">SUSE bug 656548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/673753">SUSE bug 673753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698999">SUSE bug 698999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/708263">SUSE bug 708263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/724856">SUSE bug 724856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/753610">SUSE bug 753610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/753611">SUSE bug 753611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/753613">SUSE bug 753613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767574">SUSE bug 767574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780181">SUSE bug 780181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809945">SUSE bug 809945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816865">SUSE bug 816865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841815">SUSE bug 841815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865883">SUSE bug 865883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877475">SUSE bug 877475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899395">SUSE bug 899395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903489">SUSE bug 903489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903719">SUSE bug 903719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904207">SUSE bug 904207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906077">SUSE bug 906077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906770">SUSE bug 906770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915512">SUSE bug 915512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916214">SUSE bug 916214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916215">SUSE bug 916215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916217">SUSE bug 916217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929192">SUSE bug 929192</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1639/">CVE-2010-1639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1639">CVE-2010-1639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1640/">CVE-2010-1640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1640">CVE-2010-1640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2077/">CVE-2010-2077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2077">CVE-2010-2077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3434/">CVE-2010-3434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3434">CVE-2010-3434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1003/">CVE-2011-1003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1003">CVE-2011-1003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2721/">CVE-2011-2721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2721">CVE-2011-2721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3627/">CVE-2011-3627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3627">CVE-2011-3627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1457/">CVE-2012-1457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1457">CVE-2012-1457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1458/">CVE-2012-1458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1458">CVE-2012-1458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1459/">CVE-2012-1459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1459">CVE-2012-1459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2020/">CVE-2013-2020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2020">CVE-2013-2020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2021/">CVE-2013-2021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2021">CVE-2013-2021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6497/">CVE-2013-6497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6497">CVE-2013-6497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9050/">CVE-2014-9050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9050">CVE-2014-9050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9328/">CVE-2014-9328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9328">CVE-2014-9328 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1461/">CVE-2015-1461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1461">CVE-2015-1461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1462/">CVE-2015-1462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1462">CVE-2015-1462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1463/">CVE-2015-1463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1463">CVE-2015-1463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2170/">CVE-2015-2170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2170">CVE-2015-2170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2221/">CVE-2015-2221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2221">CVE-2015-2221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2222/">CVE-2015-2222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2222">CVE-2015-2222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2305">CVE-2015-2305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2668/">CVE-2015-2668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2668">CVE-2015-2668 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991336" comment="clamav-0.98.3-0.11.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991336" comment="clamav-0.98.3-0.11.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216976" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1045490" ref_url="https://bugzilla.suse.com/1045490" source="BUGZILLA"/>
		<reference ref_id="815106" ref_url="https://bugzilla.suse.com/815106" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<description>

This update for clamav fixes the following issues:

Security issue fixed:

- CVE-2012-6706: Fixed an arbitrary memory write in VMSF_DELTA filter in libclamunrar (bsc#1045490)

Non security issue fixed:

- Fix permissions of /var/spool/amavis. (bsc#815106)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-03"/>
	<updated date="2017-07-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045490">SUSE bug 1045490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815106">SUSE bug 815106</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6706">CVE-2012-6706 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571025" comment="clamav-0.99.2-0.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216977" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1049423" ref_url="https://bugzilla.suse.com/1049423" source="BUGZILLA"/>
		<reference ref_id="1052448" ref_url="https://bugzilla.suse.com/1052448" source="BUGZILLA"/>
		<reference ref_id="1052449" ref_url="https://bugzilla.suse.com/1052449" source="BUGZILLA"/>
		<reference ref_id="1052466" ref_url="https://bugzilla.suse.com/1052466" source="BUGZILLA"/>
		<reference ref_id="1077732" ref_url="https://bugzilla.suse.com/1077732" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-12374" ref_url="https://www.suse.com/security/cve/CVE-2017-12374/" source="CVE"/>
		<reference ref_id="CVE-2017-12375" ref_url="https://www.suse.com/security/cve/CVE-2017-12375/" source="CVE"/>
		<reference ref_id="CVE-2017-12376" ref_url="https://www.suse.com/security/cve/CVE-2017-12376/" source="CVE"/>
		<reference ref_id="CVE-2017-12377" ref_url="https://www.suse.com/security/cve/CVE-2017-12377/" source="CVE"/>
		<reference ref_id="CVE-2017-12378" ref_url="https://www.suse.com/security/cve/CVE-2017-12378/" source="CVE"/>
		<reference ref_id="CVE-2017-12379" ref_url="https://www.suse.com/security/cve/CVE-2017-12379/" source="CVE"/>
		<reference ref_id="CVE-2017-12380" ref_url="https://www.suse.com/security/cve/CVE-2017-12380/" source="CVE"/>
		<reference ref_id="CVE-2017-6418" ref_url="https://www.suse.com/security/cve/CVE-2017-6418/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2017-6420" ref_url="https://www.suse.com/security/cve/CVE-2017-6420/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- Update to security release 0.99.3 (bsc#1077732)
  * CVE-2017-12376 (ClamAV Buffer Overflow in handle_pdfname Vulnerability)
  * CVE-2017-12377 (ClamAV Mew Packet Heap Overflow Vulnerability)
  * CVE-2017-12379 (ClamAV Buffer Overflow in messageAddArgument Vulnerability)
    - these vulnerabilities could have allowed an unauthenticated,
      remote attacker to cause a denial of service (DoS) condition
      or potentially execute arbitrary code on an affected device.
  * CVE-2017-12374 (ClamAV use-after-free Vulnerabilities)
  * CVE-2017-12375 (ClamAV Buffer Overflow Vulnerability)
  * CVE-2017-12378 (ClamAV Buffer Over Read Vulnerability)
  * CVE-2017-12380 (ClamAV Null Dereference Vulnerability)
    - these vulnerabilities could have allowed an unauthenticated,
      remote attacker to cause a denial of service (DoS) condition on an affected device.
  * CVE-2017-6420 (bsc#1052448)
    - this vulnerability could have allowed remote attackers to cause a denial of service
      (use-after-free) via a crafted PE file with WWPack compression.
  * CVE-2017-6419 (bsc#1052449)
    - ClamAV could have allowed remote attackers to cause a denial of service
      (heap-based buffer overflow and application crash) or possibly
      have unspecified other impact via a crafted CHM file.
  * CVE-2017-11423 (bsc#1049423)
    - ClamAV could have allowed remote attackers to cause a denial of service
      (stack-based buffer over-read and application crash) via a crafted CAB file.
  * CVE-2017-6418 (bsc#1052466)
    - ClamAV could have allowed remote attackers to cause a denial
      of service (out-of-bounds read) via a crafted e-mail message.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-27"/>
	<updated date="2018-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1049423">SUSE bug 1049423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052448">SUSE bug 1052448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052449">SUSE bug 1052449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052466">SUSE bug 1052466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11423">CVE-2017-11423 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12374/">CVE-2017-12374 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12374">CVE-2017-12374 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12375/">CVE-2017-12375 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12375">CVE-2017-12375 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12376/">CVE-2017-12376 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12376">CVE-2017-12376 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12377/">CVE-2017-12377 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12377">CVE-2017-12377 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12378/">CVE-2017-12378 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12378">CVE-2017-12378 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12379/">CVE-2017-12379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12379">CVE-2017-12379 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12380/">CVE-2017-12380 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12380">CVE-2017-12380 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6418/">CVE-2017-6418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6418">CVE-2017-6418 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6419">CVE-2017-6419 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6420/">CVE-2017-6420 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6420">CVE-2017-6420 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571026" comment="clamav-0.99.3-0.20.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216978" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1045315" ref_url="https://bugzilla.suse.com/1045315" source="BUGZILLA"/>
		<reference ref_id="1049423" ref_url="https://bugzilla.suse.com/1049423" source="BUGZILLA"/>
		<reference ref_id="1052449" ref_url="https://bugzilla.suse.com/1052449" source="BUGZILLA"/>
		<reference ref_id="1082858" ref_url="https://bugzilla.suse.com/1082858" source="BUGZILLA"/>
		<reference ref_id="1083915" ref_url="https://bugzilla.suse.com/1083915" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2018-0202" ref_url="https://www.suse.com/security/cve/CVE-2018-0202/" source="CVE"/>
		<reference ref_id="CVE-2018-1000085" ref_url="https://www.suse.com/security/cve/CVE-2018-1000085/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

Security issues fixed:

- CVE-2012-6706: VMSF_DELTA filter inside the unrar implementation allows an arbitrary memory write (bsc#1045315).
- CVE-2017-6419: A heap-based buffer overflow that can lead to a denial of service in libmspack via a crafted CHM file (bsc#1052449).
- CVE-2017-11423: A stack-based buffer over-read that can lead to a denial of service in mspack via a crafted CAB file (bsc#1049423).
- CVE-2018-1000085: An out-of-bounds heap read vulnerability was found in XAR parser that can lead to a denial of service (bsc#1082858).
- CVE-2018-0202: Fixed two vulnerabilities in the PDF parsing code (bsc#1083915).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045315">SUSE bug 1045315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049423">SUSE bug 1049423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052449">SUSE bug 1052449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082858">SUSE bug 1082858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083915">SUSE bug 1083915</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6706">CVE-2012-6706 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11423">CVE-2017-11423 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6419">CVE-2017-6419 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0202/">CVE-2018-0202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0202">CVE-2018-0202 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000085/">CVE-2018-1000085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000085">CVE-2018-1000085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571027" comment="clamav-0.99.4-0.20.7.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216979" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1101410" ref_url="https://bugzilla.suse.com/1101410" source="BUGZILLA"/>
		<reference ref_id="1101412" ref_url="https://bugzilla.suse.com/1101412" source="BUGZILLA"/>
		<reference ref_id="1101654" ref_url="https://bugzilla.suse.com/1101654" source="BUGZILLA"/>
		<reference ref_id="1103040" ref_url="https://bugzilla.suse.com/1103040" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0360" ref_url="https://www.suse.com/security/cve/CVE-2018-0360/" source="CVE"/>
		<reference ref_id="CVE-2018-0361" ref_url="https://www.suse.com/security/cve/CVE-2018-0361/" source="CVE"/>
		<description>
This update for clamav to version 0.100.1 fixes the following issues:

The following security vulnerabilities were addressed:

- CVE-2018-0360: HWP integer overflow, infinite loop vulnerability
  (bsc#1101410)
- CVE-2018-0361: PDF object length check, unreasonably long time to parse
  relatively small file (bsc#1101412)
- Buffer over-read in unRAR code due to missing max value checks in table
  initialization
- Libmspack heap buffer over-read in CHM parser (bsc#1103040)
- PDF parser bugs

The following other changes were made:

- Disable YARA support for licensing reasons (bsc#1101654).
- Add HTTPS support for clamsubmit
- Fix for DNS resolution for users on IPv4-only machines where IPv6 is not
  available or is link-local only
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-07"/>
	<updated date="2018-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101410">SUSE bug 1101410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101412">SUSE bug 1101412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101654">SUSE bug 1101654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0360/">CVE-2018-0360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0360">CVE-2018-0360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0361/">CVE-2018-0361 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0361">CVE-2018-0361 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571028" comment="clamav-0.100.1-0.20.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216980" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1103040" ref_url="https://bugzilla.suse.com/1103040" source="BUGZILLA"/>
		<reference ref_id="1104457" ref_url="https://bugzilla.suse.com/1104457" source="BUGZILLA"/>
		<reference ref_id="1110723" ref_url="https://bugzilla.suse.com/1110723" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14680" ref_url="https://www.suse.com/security/cve/CVE-2018-14680/" source="CVE"/>
		<reference ref_id="CVE-2018-14681" ref_url="https://www.suse.com/security/cve/CVE-2018-14681/" source="CVE"/>
		<reference ref_id="CVE-2018-14682" ref_url="https://www.suse.com/security/cve/CVE-2018-14682/" source="CVE"/>
		<reference ref_id="CVE-2018-15378" ref_url="https://www.suse.com/security/cve/CVE-2018-15378/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

Clamav was updated to version 0.100.2:

- CVE-2018-15378: Vulnerability in ClamAV's MEW
  unpacking feature that could allow an unauthenticated, remote
  attacker to cause a denial of service (DoS) condition on an
  affected device. (bsc#1110723)
- CVE-2018-14680, CVE-2018-14681, CVE-2018-14682:
  more fixes for embedded libmspack. (bsc#1103040)

* Make freshclam more robust against lagging signature mirrors.
* On-Access 'Extra Scanning', an opt-in minor feature of
  OnAccess scanning on Linux systems, has been disabled due to a
  known issue with resource cleanup OnAccessExtraScanning will
  be re-enabled in a future release when the issue is
  resolved. In the mean-time, users who enabled the feature in
  clamd.conf will see a warning informing them that the feature
  is not active. For details, see:
  https://bugzilla.clamav.net/show_bug.cgi?id=12048

- Restore exit code compatibility of freshclam with versions before
  0.100.0 when the virus database is already up to date
  (bsc#1104457).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104457">SUSE bug 1104457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110723">SUSE bug 1110723</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14680/">CVE-2018-14680 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14680">CVE-2018-14680 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14681/">CVE-2018-14681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14681">CVE-2018-14681 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14682/">CVE-2018-14682 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14682">CVE-2018-14682 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15378/">CVE-2018-15378 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15378">CVE-2018-15378 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571029" comment="clamav-0.100.2-0.20.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216981" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1130721" ref_url="https://bugzilla.suse.com/1130721" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1787" ref_url="https://www.suse.com/security/cve/CVE-2019-1787/" source="CVE"/>
		<reference ref_id="CVE-2019-1788" ref_url="https://www.suse.com/security/cve/CVE-2019-1788/" source="CVE"/>
		<reference ref_id="CVE-2019-1789" ref_url="https://www.suse.com/security/cve/CVE-2019-1789/" source="CVE"/>
		<description>
This update for clamav to version 0.100.3 fixes the following issues:

Security issues fixed (bsc#1130721): 	  

- CVE-2019-1787: Fixed an out-of-bounds heap read condition which may occur
  when scanning PDF documents.   
- CVE-2019-1789: Fixed an out-of-bounds heap read condition which may occur
  when scanning PE files (i.e. Windows EXE and DLL files).
- CVE-2019-1788: Fixed an out-of-bounds heap write condition which may occur
  when scanning OLE2 files such as Microsoft Office 97-2003 documents. 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-09"/>
	<updated date="2019-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1787/">CVE-2019-1787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1787">CVE-2019-1787 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-1788/">CVE-2019-1788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1788">CVE-2019-1788 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1789/">CVE-2019-1789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1789">CVE-2019-1789 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571030" comment="clamav-0.100.3-0.20.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216982" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1144504" ref_url="https://bugzilla.suse.com/1144504" source="BUGZILLA"/>
		<reference ref_id="1149458" ref_url="https://bugzilla.suse.com/1149458" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12625" ref_url="https://www.suse.com/security/cve/CVE-2019-12625/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

Security issues fixed:

- CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and heuristics for zips with overlapping files (bsc#1144504).
- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1149458).

Non-security issue fixed:

- Added the --max-scantime clamscan option and MaxScanTime clamd configuration option.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12625/">CVE-2019-12625 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12625">CVE-2019-12625 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571031" comment="clamav-0.100.3-0.20.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216983" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1157763" ref_url="https://bugzilla.suse.com/1157763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2019-15961: Fixed a denial of service which might occur when 
  scanning a specially crafted email file as (bsc#1157763).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15961">CVE-2019-15961 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571032" comment="clamav-0.100.3-0.20.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216984" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1118459" ref_url="https://bugzilla.suse.com/1118459" source="BUGZILLA"/>
		<reference ref_id="1171981" ref_url="https://bugzilla.suse.com/1171981" source="BUGZILLA"/>
		<reference ref_id="1174250" ref_url="https://bugzilla.suse.com/1174250" source="BUGZILLA"/>
		<reference ref_id="1174255" ref_url="https://bugzilla.suse.com/1174255" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3123" ref_url="https://www.suse.com/security/cve/CVE-2020-3123/" source="CVE"/>
		<reference ref_id="CVE-2020-3327" ref_url="https://www.suse.com/security/cve/CVE-2020-3327/" source="CVE"/>
		<reference ref_id="CVE-2020-3341" ref_url="https://www.suse.com/security/cve/CVE-2020-3341/" source="CVE"/>
		<reference ref_id="CVE-2020-3350" ref_url="https://www.suse.com/security/cve/CVE-2020-3350/" source="CVE"/>
		<reference ref_id="CVE-2020-3481" ref_url="https://www.suse.com/security/cve/CVE-2020-3481/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- Update to 0.103.0 to implement jsc#ECO-3010 and bsc#1118459
- This update incorporates incompatible changes that were introduced
  in version 0.101.0.
- Accumulated security fixes:
  * CVE-2020-3350: Fix a vulnerability wherein a malicious user could
    replace a scan target's directory with a symlink to another path
    to trick clamscan, clamdscan, or clamonacc into removing or moving
    a different file (eg. a critical system file). The issue would
    affect users that use the --move or --remove options for clamscan,
    clamdscan, and clamonacc. (bsc#1174255)
  * CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing
    module in ClamAV 0.102.3 that could cause a Denial-of-Service
    (DoS) condition. Improper bounds checking results in an
    out-of-bounds read which could cause a crash. The previous fix for
    this CVE in 0.102.3 was incomplete. This fix correctly resolves
    the issue.
  * CVE-2020-3481: Fix a vulnerability in the EGG archive module in
    ClamAV 0.102.0 - 0.102.3 could cause a Denial-of-Service (DoS)
    condition. Improper error handling may result in a crash due to a
    NULL pointer dereference. This vulnerability is mitigated for
    those using the official ClamAV signature databases because the
    file type signatures in daily.cvd will not enable the EGG archive
    parser in versions affected by the vulnerability. (bsc#1174250)
  * CVE-2020-3341: Fix a vulnerability in the PDF parsing module in
    ClamAV 0.101 - 0.102.2 that could cause a Denial-of-Service (DoS)
    condition. Improper size checking of a buffer used to initialize AES
    decryption routines results in an out-of-bounds read which may cause
    a crash. (bsc#1171981)
  * CVE-2020-3123: A denial-of-service (DoS) condition may occur when
    using the optional credit card data-loss-prevention (DLP) feature.
    Improper bounds checking of an unsigned variable resulted in an
    out-of-bounds read, which causes a crash.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118459">SUSE bug 1118459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171981">SUSE bug 1171981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174250">SUSE bug 1174250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174255">SUSE bug 1174255</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3123/">CVE-2020-3123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3123">CVE-2020-3123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3327/">CVE-2020-3327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3327">CVE-2020-3327 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3341/">CVE-2020-3341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3341">CVE-2020-3341 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3350/">CVE-2020-3350 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3350">CVE-2020-3350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3481/">CVE-2020-3481 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3481">CVE-2020-3481 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571033" comment="clamav-0.103.0-0.20.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216985" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1181256" ref_url="https://bugzilla.suse.com/1181256" source="BUGZILLA"/>
		<reference ref_id="1184532" ref_url="https://bugzilla.suse.com/1184532" source="BUGZILLA"/>
		<reference ref_id="1184533" ref_url="https://bugzilla.suse.com/1184533" source="BUGZILLA"/>
		<reference ref_id="1184534" ref_url="https://bugzilla.suse.com/1184534" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-1252" ref_url="https://www.suse.com/security/cve/CVE-2021-1252/" source="CVE"/>
		<reference ref_id="CVE-2021-1404" ref_url="https://www.suse.com/security/cve/CVE-2021-1404/" source="CVE"/>
		<reference ref_id="CVE-2021-1405" ref_url="https://www.suse.com/security/cve/CVE-2021-1405/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2021-1252: Fix for Excel XLM parser infinite loop. (bsc#1184532)
- CVE-2021-1404: Fix for PDF parser buffer over-read; possible crash. (bsc#1184533)
- CVE-2021-1405: Fix for mail parser NULL-dereference crash. (bsc#1184534)
- Fix errors when scanning files &gt; 4G (bsc#1181256)
- Update clamav.keyring
- Update to 0.103.2
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-14"/>
	<updated date="2021-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181256">SUSE bug 1181256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184532">SUSE bug 1184532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184533">SUSE bug 1184533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184534">SUSE bug 1184534</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1252/">CVE-2021-1252 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1252">CVE-2021-1252 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1404/">CVE-2021-1404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1404">CVE-2021-1404 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1405/">CVE-2021-1405 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1405">CVE-2021-1405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571034" comment="clamav-0.103.2-0.20.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216986" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1103032" ref_url="https://bugzilla.suse.com/1103032" source="BUGZILLA"/>
		<reference ref_id="1187509" ref_url="https://bugzilla.suse.com/1187509" source="BUGZILLA"/>
		<reference ref_id="1188284" ref_url="https://bugzilla.suse.com/1188284" source="BUGZILLA"/>
		<reference ref_id="1192346" ref_url="https://bugzilla.suse.com/1192346" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2018-14679: Fixed off-by-one issue in embedded libmspack that could lead to denial of service (bsc#1103032). 
  
- Update to 0.103.4 (bsc#1192346).
- Add documentation about max file size purpose and side effect in the 'clamscan' and 'clamdscan' manpages (bsc#1187509).
- Update to 0.103.3 (bsc#1188284).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187509">SUSE bug 1187509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188284">SUSE bug 1188284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192346">SUSE bug 1192346</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14679">CVE-2018-14679 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657135" comment="clamav-0.103.4-0.20.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657136" comment="clamav-openssl1-0.103.4-0.20.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216987" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1194731" ref_url="https://bugzilla.suse.com/1194731" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20698" ref_url="https://www.suse.com/security/cve/CVE-2022-20698/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2022-20698: Fixed invalid pointer read allowing denial of service crash. (bsc#1194731)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194731">SUSE bug 1194731</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20698/">CVE-2022-20698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20698">CVE-2022-20698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664013" comment="clamav-0.103.5-0.20.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664014" comment="clamav-openssl1-0.103.5-0.20.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216988" version="1" class="patch">
	<metadata>
		<title>Recommended update for OpenLDAP</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="620389" ref_url="https://bugzilla.suse.com/620389" source="BUGZILLA"/>
		<reference ref_id="648479" ref_url="https://bugzilla.suse.com/648479" source="BUGZILLA"/>
		<reference ref_id="650953" ref_url="https://bugzilla.suse.com/650953" source="BUGZILLA"/>
		<reference ref_id="656143" ref_url="https://bugzilla.suse.com/656143" source="BUGZILLA"/>
		<reference ref_id="674985" ref_url="https://bugzilla.suse.com/674985" source="BUGZILLA"/>
		<reference ref_id="750466" ref_url="https://bugzilla.suse.com/750466" source="BUGZILLA"/>
		<reference ref_id="751945" ref_url="https://bugzilla.suse.com/751945" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1024" ref_url="https://www.suse.com/security/cve/CVE-2011-1024/" source="CVE"/>
		<reference ref_id="CVE-2011-1081" ref_url="https://www.suse.com/security/cve/CVE-2011-1081/" source="CVE"/>
		<reference ref_id="CVE-2012-1164" ref_url="https://www.suse.com/security/cve/CVE-2012-1164/" source="CVE"/>
		<description>

This update to OpenLDAP fixes multiple replication issues which could lead 
to delete operation not being propagated to the slave servers correctly.

Additionally a vulnerability (CVE-2012-1164) was fixed that could cause 
certain OpenLDAP proxy configurations to crash while processing LDAP search 
requests with the 'attrsOnly' option enabled.

Security Issues:

    * CVE-2012-1164
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1164&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-04-04"/>
	<updated date="2012-04-04"/>
	<bugzilla href="https://bugzilla.suse.com/620389">SUSE bug 620389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648479">SUSE bug 648479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/650953">SUSE bug 650953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/656143">SUSE bug 656143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/674985">SUSE bug 674985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750466">SUSE bug 750466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751945">SUSE bug 751945</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1024/">CVE-2011-1024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1024">CVE-2011-1024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1081/">CVE-2011-1081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1081">CVE-2011-1081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1164/">CVE-2012-1164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1164">CVE-2012-1164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991337" comment="compat-libldap-2_3-0-2.3.37-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991338" comment="libldap-2_4-2-2.4.26-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991339" comment="libldap-2_4-2-32bit-2.4.26-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991340" comment="openldap2-2.4.26-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991341" comment="openldap2-back-meta-2.4.26-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991342" comment="openldap2-client-2.4.26-0.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216989" version="1" class="patch">
	<metadata>
		<title>Security update for coreutils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="609913" ref_url="https://bugzilla.suse.com/609913" source="BUGZILLA"/>
		<reference ref_id="627278" ref_url="https://bugzilla.suse.com/627278" source="BUGZILLA"/>
		<reference ref_id="697897" ref_url="https://bugzilla.suse.com/697897" source="BUGZILLA"/>
		<reference ref_id="702995" ref_url="https://bugzilla.suse.com/702995" source="BUGZILLA"/>
		<reference ref_id="717808" ref_url="https://bugzilla.suse.com/717808" source="BUGZILLA"/>
		<reference ref_id="721961" ref_url="https://bugzilla.suse.com/721961" source="BUGZILLA"/>
		<reference ref_id="752943" ref_url="https://bugzilla.suse.com/752943" source="BUGZILLA"/>
		<reference ref_id="754559" ref_url="https://bugzilla.suse.com/754559" source="BUGZILLA"/>
		<reference ref_id="757636" ref_url="https://bugzilla.suse.com/757636" source="BUGZILLA"/>
		<reference ref_id="763536" ref_url="https://bugzilla.suse.com/763536" source="BUGZILLA"/>
		<reference ref_id="796243" ref_url="https://bugzilla.suse.com/796243" source="BUGZILLA"/>
		<reference ref_id="798538" ref_url="https://bugzilla.suse.com/798538" source="BUGZILLA"/>
		<reference ref_id="798541" ref_url="https://bugzilla.suse.com/798541" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0221" ref_url="https://www.suse.com/security/cve/CVE-2013-0221/" source="CVE"/>
		<reference ref_id="CVE-2013-0222" ref_url="https://www.suse.com/security/cve/CVE-2013-0222/" source="CVE"/>
		<reference ref_id="CVE-2013-0223" ref_url="https://www.suse.com/security/cve/CVE-2013-0223/" source="CVE"/>
		<description>

This coreutils update fixes three minor security issues.

    * #798538 - VUL-1: CVE-2013-0221: coreutils: segmentation fault in
      'sort -d' and 'sort -M' with long line input
    * #796243 - VUL-1: CVE-2013-0222: coreutils: segmentation fault in
      'uniq' with long line input
    * #798541 - VUL-1: CVE-2013-0223: coreutils: segmentation fault in
      'join -i' with long line input

Security Issues:

    * CVE-2013-0221
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0221&gt;
    * CVE-2013-0222
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0222&gt;
    * CVE-2013-0223
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0223&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-17"/>
	<updated date="2013-09-17"/>
	<bugzilla href="https://bugzilla.suse.com/609913">SUSE bug 609913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/627278">SUSE bug 627278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/697897">SUSE bug 697897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/702995">SUSE bug 702995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/717808">SUSE bug 717808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/721961">SUSE bug 721961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752943">SUSE bug 752943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754559">SUSE bug 754559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757636">SUSE bug 757636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763536">SUSE bug 763536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796243">SUSE bug 796243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798538">SUSE bug 798538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798541">SUSE bug 798541</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0221/">CVE-2013-0221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0221">CVE-2013-0221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0222/">CVE-2013-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0222">CVE-2013-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0223/">CVE-2013-0223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0223">CVE-2013-0223 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991343" comment="coreutils-6.12-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991344" comment="coreutils-lang-6.12-32.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216990" version="1" class="patch">
	<metadata>
		<title>Security update for coreutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1023041" ref_url="https://bugzilla.suse.com/1023041" source="BUGZILLA"/>
		<reference ref_id="927949" ref_url="https://bugzilla.suse.com/927949" source="BUGZILLA"/>
		<reference ref_id="928749" ref_url="https://bugzilla.suse.com/928749" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1865" ref_url="https://www.suse.com/security/cve/CVE-2015-1865/" source="CVE"/>
		<reference ref_id="CVE-2015-4041" ref_url="https://www.suse.com/security/cve/CVE-2015-4041/" source="CVE"/>
		<reference ref_id="CVE-2015-4042" ref_url="https://www.suse.com/security/cve/CVE-2015-4042/" source="CVE"/>
		<reference ref_id="CVE-2017-2616" ref_url="https://www.suse.com/security/cve/CVE-2017-2616/" source="CVE"/>
		<description>
This update for coreutils fixes the following issues:

Security issues fixed:

- CVE-2015-1865: Fixed an arbitrary file deletion (bsc#927949).
- CVE-2015-4041, CVE-2015-4042: Fixed a buffer overflow related to case conversion (bsc#928749).
- CVE-2017-2616: Fixed su PAM local SIGKILL denial of service (bsc#1023041).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-27"/>
	<updated date="2019-08-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023041">SUSE bug 1023041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927949">SUSE bug 927949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928749">SUSE bug 928749</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1865/">CVE-2015-1865 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1865">CVE-2015-1865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4041/">CVE-2015-4041 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4041">CVE-2015-4041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4042/">CVE-2015-4042 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4042">CVE-2015-4042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2616/">CVE-2017-2616 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2616">CVE-2017-2616 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571035" comment="coreutils-6.12-32.41.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571036" comment="coreutils-lang-6.12-32.41.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216991" version="1" class="patch">
	<metadata>
		<title>Recommended update for cpio</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="629860" ref_url="https://bugzilla.suse.com/629860" source="BUGZILLA"/>
		<reference ref_id="658031" ref_url="https://bugzilla.suse.com/658031" source="BUGZILLA"/>
		<reference ref_id="704942" ref_url="https://bugzilla.suse.com/704942" source="BUGZILLA"/>
		<reference ref_id="907456" ref_url="https://bugzilla.suse.com/907456" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9112" ref_url="https://www.suse.com/security/cve/CVE-2014-9112/" source="CVE"/>
		<description>

This update fixes an error in cpio that prevents user archive hardlinked 
files if inode number was bigger than 2 ** 31.

		</description>
<advisory from="security@suse.de">
	<issued date="2011-07-18"/>
	<updated date="2011-07-18"/>
	<bugzilla href="https://bugzilla.suse.com/629860">SUSE bug 629860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/658031">SUSE bug 658031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704942">SUSE bug 704942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907456">SUSE bug 907456</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9112/">CVE-2014-9112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9112">CVE-2014-9112 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991345" comment="cpio-2.9-75.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991346" comment="cpio-lang-2.9-75.76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216992" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1155199" ref_url="https://bugzilla.suse.com/1155199" source="BUGZILLA"/>
		<reference ref_id="963448" ref_url="https://bugzilla.suse.com/963448" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2037" ref_url="https://www.suse.com/security/cve/CVE-2016-2037/" source="CVE"/>
		<reference ref_id="CVE-2019-14866" ref_url="https://www.suse.com/security/cve/CVE-2019-14866/" source="CVE"/>
		<description>
This update for cpio fixes the following issues:

- CVE-2019-14866: Fixed an improper validation of the values written 
  in the header of a TAR file through the to_oct() function which could 
  have led to unexpected TAR generation (bsc#1155199).	  
- CVE-2016-2037: Fixed an out-of-bounds write in the way cpio parses 
  certain cpio files (bsc#963448).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-21"/>
	<updated date="2019-11-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155199">SUSE bug 1155199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963448">SUSE bug 963448</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-2037/">CVE-2016-2037 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2037">CVE-2016-2037 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14866/">CVE-2019-14866 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14866">CVE-2019-14866 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571037" comment="cpio-2.9-75.81.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571038" comment="cpio-lang-2.9-75.81.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216993" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1189206" ref_url="https://bugzilla.suse.com/1189206" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<description>
This update for cpio fixes the following issues:

  It was possible to trigger Remote code execution due to a integer overflow (CVE-2021-38185, bsc#1189206)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-12"/>
	<updated date="2021-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189206">SUSE bug 1189206</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630756" comment="cpio-2.9-75.81.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630757" comment="cpio-lang-2.9-75.81.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216994" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1189465" ref_url="https://bugzilla.suse.com/1189465" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<description>
This update for cpio fixes the following issues:

- A patch previously applied to remedy CVE-2021-38185 introduced a regression
  that had the potential to cause a segmentation fault in cpio. [bsc#1189465]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-23"/>
	<updated date="2021-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189465">SUSE bug 1189465</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631548" comment="cpio-2.9-75.81.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631549" comment="cpio-lang-2.9-75.81.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216995" version="1" class="patch">
	<metadata>
		<title>Security update for cracklib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="928923" ref_url="https://bugzilla.suse.com/928923" source="BUGZILLA"/>
		<reference ref_id="992966" ref_url="https://bugzilla.suse.com/992966" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6318" ref_url="https://www.suse.com/security/cve/CVE-2016-6318/" source="CVE"/>
		<description>

This update for cracklib fixes a security issue and a bug:

Security issue fixed:
- Add patch to fix a stack buffer overflow in GECOS parser (bsc#992966 CVE-2016-6318)

The following non security issue was fixed:
- Call textdomain in cracklib-check main function so that program
  output is translated accordingly. (bsc#928923)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-02"/>
	<updated date="2016-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/928923">SUSE bug 928923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992966">SUSE bug 992966</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6318/">CVE-2016-6318 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6318">CVE-2016-6318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571039" comment="cracklib-2.8.12-56.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571040" comment="cracklib-32bit-2.8.12-56.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216996" version="1" class="patch">
	<metadata>
		<title>Security update for cron (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1046229" ref_url="https://bugzilla.suse.com/1046229" source="BUGZILLA"/>
		<reference ref_id="1128935" ref_url="https://bugzilla.suse.com/1128935" source="BUGZILLA"/>
		<reference ref_id="1128937" ref_url="https://bugzilla.suse.com/1128937" source="BUGZILLA"/>
		<reference ref_id="932499" ref_url="https://bugzilla.suse.com/932499" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9704" ref_url="https://www.suse.com/security/cve/CVE-2019-9704/" source="CVE"/>
		<reference ref_id="CVE-2019-9705" ref_url="https://www.suse.com/security/cve/CVE-2019-9705/" source="CVE"/>
		<description>
This update for cron fixes the following issues:

Security issues fixed: 	  

- CVE-2019-9704: Fixed an insufficient check in the return value of calloc which
  could allow a local user to create Denial of Service by crashing the deamon (bsc#1128937).
- CVE-2019-9705: Fixed an implementation vulnerability which could allow a local user to
  exhaust the memory resulting in Denial of Service (bsc#1128935).

Other issues addressed: 

- Fixed an issue with SElinux where cron jobs were bocked when [permisive mode is selected (bsc#1046229).
- Removed a duplicate sprintf and made some monepage changes (bsc#932499). 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1046229">SUSE bug 1046229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128935">SUSE bug 1128935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128937">SUSE bug 1128937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932499">SUSE bug 932499</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9704/">CVE-2019-9704 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9704">CVE-2019-9704 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9705/">CVE-2019-9705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9705">CVE-2019-9705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571041" comment="cron-4.1-194.211.213.3.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216997" version="1" class="patch">
	<metadata>
		<title>Security update for ctags (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="899486" ref_url="https://bugzilla.suse.com/899486" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-7204" ref_url="https://www.suse.com/security/cve/CVE-2014-7204/" source="CVE"/>
		<description>
This update for ctags fixes the following issues:

- CVE-2014-7204: Fixes a potential denial of service caused by an endless loop in javascript parser (bsc#899486).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/899486">SUSE bug 899486</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7204/">CVE-2014-7204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7204">CVE-2014-7204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571042" comment="ctags-2013.10.2-0.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216998" version="1" class="patch">
	<metadata>
		<title>Security update for CUPS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="601830" ref_url="https://bugzilla.suse.com/601830" source="BUGZILLA"/>
		<reference ref_id="649256" ref_url="https://bugzilla.suse.com/649256" source="BUGZILLA"/>
		<reference ref_id="680210" ref_url="https://bugzilla.suse.com/680210" source="BUGZILLA"/>
		<reference ref_id="680212" ref_url="https://bugzilla.suse.com/680212" source="BUGZILLA"/>
		<reference ref_id="700987" ref_url="https://bugzilla.suse.com/700987" source="BUGZILLA"/>
		<reference ref_id="711490" ref_url="https://bugzilla.suse.com/711490" source="BUGZILLA"/>
		<reference ref_id="715643" ref_url="https://bugzilla.suse.com/715643" source="BUGZILLA"/>
		<reference ref_id="789566" ref_url="https://bugzilla.suse.com/789566" source="BUGZILLA"/>
		<reference ref_id="802408" ref_url="https://bugzilla.suse.com/802408" source="BUGZILLA"/>
		<reference ref_id="827109" ref_url="https://bugzilla.suse.com/827109" source="BUGZILLA"/>
		<reference ref_id="887240" ref_url="https://bugzilla.suse.com/887240" source="BUGZILLA"/>
		<reference ref_id="917799" ref_url="https://bugzilla.suse.com/917799" source="BUGZILLA"/>
		<reference ref_id="924208" ref_url="https://bugzilla.suse.com/924208" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0540" ref_url="https://www.suse.com/security/cve/CVE-2010-0540/" source="CVE"/>
		<reference ref_id="CVE-2010-0542" ref_url="https://www.suse.com/security/cve/CVE-2010-0542/" source="CVE"/>
		<reference ref_id="CVE-2010-1748" ref_url="https://www.suse.com/security/cve/CVE-2010-1748/" source="CVE"/>
		<reference ref_id="CVE-2010-2431" ref_url="https://www.suse.com/security/cve/CVE-2010-2431/" source="CVE"/>
		<reference ref_id="CVE-2010-2432" ref_url="https://www.suse.com/security/cve/CVE-2010-2432/" source="CVE"/>
		<reference ref_id="CVE-2010-2941" ref_url="https://www.suse.com/security/cve/CVE-2010-2941/" source="CVE"/>
		<reference ref_id="CVE-2011-2896" ref_url="https://www.suse.com/security/cve/CVE-2011-2896/" source="CVE"/>
		<reference ref_id="CVE-2011-3170" ref_url="https://www.suse.com/security/cve/CVE-2011-3170/" source="CVE"/>
		<reference ref_id="CVE-2012-5519" ref_url="https://www.suse.com/security/cve/CVE-2012-5519/" source="CVE"/>
		<reference ref_id="CVE-2014-3537" ref_url="https://www.suse.com/security/cve/CVE-2014-3537/" source="CVE"/>
		<reference ref_id="CVE-2014-5029" ref_url="https://www.suse.com/security/cve/CVE-2014-5029/" source="CVE"/>
		<reference ref_id="CVE-2014-5030" ref_url="https://www.suse.com/security/cve/CVE-2014-5030/" source="CVE"/>
		<reference ref_id="CVE-2014-5031" ref_url="https://www.suse.com/security/cve/CVE-2014-5031/" source="CVE"/>
		<reference ref_id="CVE-2014-9679" ref_url="https://www.suse.com/security/cve/CVE-2014-9679/" source="CVE"/>
		<description>

This update fixes various issues in CUPS.

    * CVE-2014-3537 CVE-2014-5029 CVE-2014-5030 CVE-2014-5031: Various
      insufficient symbolic link checking could have lead to privilege
      escalation from the lp user to root.

Security Issues:

    * CVE-2014-3537
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537&gt;
    * CVE-2014-5029
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029&gt;
    * CVE-2014-5030
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030&gt;
    * CVE-2014-5031
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-29"/>
	<updated date="2014-07-29"/>
	<bugzilla href="https://bugzilla.suse.com/601830">SUSE bug 601830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649256">SUSE bug 649256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/680210">SUSE bug 680210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/680212">SUSE bug 680212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/700987">SUSE bug 700987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711490">SUSE bug 711490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/715643">SUSE bug 715643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789566">SUSE bug 789566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802408">SUSE bug 802408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827109">SUSE bug 827109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887240">SUSE bug 887240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917799">SUSE bug 917799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924208">SUSE bug 924208</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0540/">CVE-2010-0540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0540">CVE-2010-0540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0542/">CVE-2010-0542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0542">CVE-2010-0542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1748/">CVE-2010-1748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1748">CVE-2010-1748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2431/">CVE-2010-2431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2431">CVE-2010-2431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2432/">CVE-2010-2432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2432">CVE-2010-2432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2941/">CVE-2010-2941 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2941">CVE-2010-2941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2896/">CVE-2011-2896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2896">CVE-2011-2896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3170/">CVE-2011-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3170">CVE-2011-3170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5519/">CVE-2012-5519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5519">CVE-2012-5519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3537/">CVE-2014-3537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3537">CVE-2014-3537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5029/">CVE-2014-5029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5029">CVE-2014-5029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5030/">CVE-2014-5030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5030">CVE-2014-5030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5031/">CVE-2014-5031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5031">CVE-2014-5031 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9679/">CVE-2014-9679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9679">CVE-2014-9679 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991347" comment="cups-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991348" comment="cups-client-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991349" comment="cups-libs-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991350" comment="cups-libs-32bit-1.3.9-8.46.52.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991347" comment="cups-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991348" comment="cups-client-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991349" comment="cups-libs-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991350" comment="cups-libs-32bit-1.3.9-8.46.52.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216999" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1096405" ref_url="https://bugzilla.suse.com/1096405" source="BUGZILLA"/>
		<reference ref_id="1096406" ref_url="https://bugzilla.suse.com/1096406" source="BUGZILLA"/>
		<reference ref_id="1096407" ref_url="https://bugzilla.suse.com/1096407" source="BUGZILLA"/>
		<reference ref_id="1096408" ref_url="https://bugzilla.suse.com/1096408" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-4180" ref_url="https://www.suse.com/security/cve/CVE-2018-4180/" source="CVE"/>
		<reference ref_id="CVE-2018-4181" ref_url="https://www.suse.com/security/cve/CVE-2018-4181/" source="CVE"/>
		<reference ref_id="CVE-2018-4182" ref_url="https://www.suse.com/security/cve/CVE-2018-4182/" source="CVE"/>
		<reference ref_id="CVE-2018-4183" ref_url="https://www.suse.com/security/cve/CVE-2018-4183/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

Security issues fixed:

- CVE-2018-4180: Fix local privilege escalation to root in dnssd backend (bsc#1096405).
- CVE-2018-4181: Limited local file reads as root via cupsd.conf include directive (bsc#1096406).
- CVE-2018-4182: Fix cups-exec sandbox bypass due to insecure error handling (bsc#1096407).
- CVE-2018-4183: Fix cups-exec sandbox bypass due to profile misconfiguration (bsc#1096408).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-07"/>
	<updated date="2018-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1096405">SUSE bug 1096405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096406">SUSE bug 1096406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096407">SUSE bug 1096407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096408">SUSE bug 1096408</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4180/">CVE-2018-4180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4180">CVE-2018-4180 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4181/">CVE-2018-4181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4181">CVE-2018-4181 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4182/">CVE-2018-4182 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4182">CVE-2018-4182 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4183/">CVE-2018-4183 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4183">CVE-2018-4183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571048" comment="cups-1.3.9-8.46.56.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571049" comment="cups-client-1.3.9-8.46.56.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571050" comment="cups-libs-1.3.9-8.46.56.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571051" comment="cups-libs-32bit-1.3.9-8.46.56.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217000" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1146358" ref_url="https://bugzilla.suse.com/1146358" source="BUGZILLA"/>
		<reference ref_id="1146359" ref_url="https://bugzilla.suse.com/1146359" source="BUGZILLA"/>
		<reference ref_id="959478" ref_url="https://bugzilla.suse.com/959478" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8675" ref_url="https://www.suse.com/security/cve/CVE-2019-8675/" source="CVE"/>
		<reference ref_id="CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

- CVE-2019-8675: Fixed a stack buffer overflow in libcups's asn1_get_type function(bsc#1146358). 
- CVE-2019-8696: Fixed a stack buffer overflow in libcups's asn1_get_packed function (bsc#1146359).	  
- Fixed a double free which was triggered by Java application (bsc#959478).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146358">SUSE bug 1146358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146359">SUSE bug 1146359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959478">SUSE bug 959478</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8675/">CVE-2019-8675 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8675">CVE-2019-8675 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8696">CVE-2019-8696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571052" comment="cups-1.3.9-8.46.56.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571053" comment="cups-client-1.3.9-8.46.56.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571054" comment="cups-libs-1.3.9-8.46.56.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571055" comment="cups-libs-32bit-1.3.9-8.46.56.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217001" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1168422" ref_url="https://bugzilla.suse.com/1168422" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3898" ref_url="https://www.suse.com/security/cve/CVE-2020-3898/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

- CVE-2020-3898: Fixed heap buffer overflow in libcups ppdFindOption() function (bsc#1168422).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-23"/>
	<updated date="2020-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168422">SUSE bug 1168422</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3898/">CVE-2020-3898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3898">CVE-2020-3898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571056" comment="cups-1.3.9-8.46.56.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571057" comment="cups-client-1.3.9-8.46.56.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571058" comment="cups-libs-1.3.9-8.46.56.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571059" comment="cups-libs-32bit-1.3.9-8.46.56.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217002" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1180520" ref_url="https://bugzilla.suse.com/1180520" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10001" ref_url="https://www.suse.com/security/cve/CVE-2020-10001/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

- CVE-2020-10001: Fixed an out-of-bounds read in the ippReadIO function (bsc#1180520).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-02"/>
	<updated date="2021-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180520">SUSE bug 1180520</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10001/">CVE-2020-10001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10001">CVE-2020-10001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571060" comment="cups-1.3.9-8.46.56.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571061" comment="cups-client-1.3.9-8.46.56.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571062" comment="cups-libs-1.3.9-8.46.56.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571063" comment="cups-libs-32bit-1.3.9-8.46.56.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217003" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1184161" ref_url="https://bugzilla.suse.com/1184161" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25317" ref_url="https://www.suse.com/security/cve/CVE-2021-25317/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

- CVE-2021-25317: ownership of /var/log/cups could allow privilege escalation from lp user to root via symlink attacks (bsc#1184161)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184161">SUSE bug 1184161</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-25317/">CVE-2021-25317 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25317">CVE-2021-25317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571064" comment="cups-1.3.9-8.46.56.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571065" comment="cups-client-1.3.9-8.46.56.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571066" comment="cups-libs-1.3.9-8.46.56.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571067" comment="cups-libs-32bit-1.3.9-8.46.56.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217004" version="1" class="patch">
	<metadata>
		<title>Security update for curl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="620857" ref_url="https://bugzilla.suse.com/620857" source="BUGZILLA"/>
		<reference ref_id="628337" ref_url="https://bugzilla.suse.com/628337" source="BUGZILLA"/>
		<reference ref_id="755908" ref_url="https://bugzilla.suse.com/755908" source="BUGZILLA"/>
		<reference ref_id="765342" ref_url="https://bugzilla.suse.com/765342" source="BUGZILLA"/>
		<reference ref_id="769247" ref_url="https://bugzilla.suse.com/769247" source="BUGZILLA"/>
		<reference ref_id="814655" ref_url="https://bugzilla.suse.com/814655" source="BUGZILLA"/>
		<reference ref_id="824517" ref_url="https://bugzilla.suse.com/824517" source="BUGZILLA"/>
		<reference ref_id="849596" ref_url="https://bugzilla.suse.com/849596" source="BUGZILLA"/>
		<reference ref_id="858673" ref_url="https://bugzilla.suse.com/858673" source="BUGZILLA"/>
		<reference ref_id="868627" ref_url="https://bugzilla.suse.com/868627" source="BUGZILLA"/>
		<reference ref_id="868629" ref_url="https://bugzilla.suse.com/868629" source="BUGZILLA"/>
		<reference ref_id="870444" ref_url="https://bugzilla.suse.com/870444" source="BUGZILLA"/>
		<reference ref_id="884698" ref_url="https://bugzilla.suse.com/884698" source="BUGZILLA"/>
		<reference ref_id="885302" ref_url="https://bugzilla.suse.com/885302" source="BUGZILLA"/>
		<reference ref_id="894575" ref_url="https://bugzilla.suse.com/894575" source="BUGZILLA"/>
		<reference ref_id="897816" ref_url="https://bugzilla.suse.com/897816" source="BUGZILLA"/>
		<reference ref_id="901924" ref_url="https://bugzilla.suse.com/901924" source="BUGZILLA"/>
		<reference ref_id="927174" ref_url="https://bugzilla.suse.com/927174" source="BUGZILLA"/>
		<reference ref_id="927556" ref_url="https://bugzilla.suse.com/927556" source="BUGZILLA"/>
		<reference ref_id="927746" ref_url="https://bugzilla.suse.com/927746" source="BUGZILLA"/>
		<reference ref_id="928533" ref_url="https://bugzilla.suse.com/928533" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1944" ref_url="https://www.suse.com/security/cve/CVE-2013-1944/" source="CVE"/>
		<reference ref_id="CVE-2013-2174" ref_url="https://www.suse.com/security/cve/CVE-2013-2174/" source="CVE"/>
		<reference ref_id="CVE-2013-4545" ref_url="https://www.suse.com/security/cve/CVE-2013-4545/" source="CVE"/>
		<reference ref_id="CVE-2014-0015" ref_url="https://www.suse.com/security/cve/CVE-2014-0015/" source="CVE"/>
		<reference ref_id="CVE-2014-0138" ref_url="https://www.suse.com/security/cve/CVE-2014-0138/" source="CVE"/>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<reference ref_id="CVE-2014-3613" ref_url="https://www.suse.com/security/cve/CVE-2014-3613/" source="CVE"/>
		<reference ref_id="CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150/" source="CVE"/>
		<reference ref_id="CVE-2015-3143" ref_url="https://www.suse.com/security/cve/CVE-2015-3143/" source="CVE"/>
		<reference ref_id="CVE-2015-3148" ref_url="https://www.suse.com/security/cve/CVE-2015-3148/" source="CVE"/>
		<reference ref_id="CVE-2015-3153" ref_url="https://www.suse.com/security/cve/CVE-2015-3153/" source="CVE"/>
		<description>

This curl update fixes the following security issues:

    * bnc#868627: wrong re-use of connections (CVE-2014-0138).
    * bnc#868629: IP address wildcard certificate validation
      (CVE-2014-0139).
    * bnc#862144: testsuite test172 failure.

Security Issue references:

    * CVE-2014-0138
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138&gt;
    * CVE-2014-0139
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-15"/>
	<updated date="2014-04-15"/>
	<bugzilla href="https://bugzilla.suse.com/620857">SUSE bug 620857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/628337">SUSE bug 628337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/755908">SUSE bug 755908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/765342">SUSE bug 765342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769247">SUSE bug 769247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814655">SUSE bug 814655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824517">SUSE bug 824517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849596">SUSE bug 849596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858673">SUSE bug 858673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868627">SUSE bug 868627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868629">SUSE bug 868629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870444">SUSE bug 870444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884698">SUSE bug 884698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885302">SUSE bug 885302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894575">SUSE bug 894575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897816">SUSE bug 897816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901924">SUSE bug 901924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927174">SUSE bug 927174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927556">SUSE bug 927556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927746">SUSE bug 927746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928533">SUSE bug 928533</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1944/">CVE-2013-1944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1944">CVE-2013-1944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2174/">CVE-2013-2174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2174">CVE-2013-2174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4545/">CVE-2013-4545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4545">CVE-2013-4545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0015/">CVE-2014-0015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0015">CVE-2014-0015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0138/">CVE-2014-0138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0138">CVE-2014-0138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0139">CVE-2014-0139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3613/">CVE-2014-3613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3613">CVE-2014-3613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8150">CVE-2014-8150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3143/">CVE-2015-3143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3143">CVE-2015-3143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3148/">CVE-2015-3148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3148">CVE-2015-3148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3153/">CVE-2015-3153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3153">CVE-2015-3153 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991351" comment="curl-7.19.7-1.20.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991352" comment="libcurl4-7.19.7-1.20.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991353" comment="libcurl4-32bit-7.19.7-1.20.33.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991351" comment="curl-7.19.7-1.20.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991352" comment="libcurl4-7.19.7-1.20.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991353" comment="libcurl4-32bit-7.19.7-1.20.33.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217005" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="926511" ref_url="https://bugzilla.suse.com/926511" source="BUGZILLA"/>
		<reference ref_id="962983" ref_url="https://bugzilla.suse.com/962983" source="BUGZILLA"/>
		<reference ref_id="962996" ref_url="https://bugzilla.suse.com/962996" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755/" source="CVE"/>
		<description>

This update for curl fixes the following issues:

- CVE-2016-0755: libcurl would reuse NTLM-authenticated proxy connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer (bsc#962983)

The following non-security bugs were fixed:

- bsc#926511: Check for errors on the control connection during FTP transfers

The following tracked bugs only affect the test suite:

- bsc#962996: Expired cookie in test 46 caused test failures
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-26"/>
	<updated date="2016-02-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926511">SUSE bug 926511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962983">SUSE bug 962983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962996">SUSE bug 962996</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0755">CVE-2016-0755 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571068" comment="curl-7.19.7-1.20.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571069" comment="libcurl4-7.19.7-1.20.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571070" comment="libcurl4-32bit-7.19.7-1.20.39.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217006" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="991389" ref_url="https://bugzilla.suse.com/991389" source="BUGZILLA"/>
		<reference ref_id="991390" ref_url="https://bugzilla.suse.com/991390" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5419" ref_url="https://www.suse.com/security/cve/CVE-2016-5419/" source="CVE"/>
		<reference ref_id="CVE-2016-5420" ref_url="https://www.suse.com/security/cve/CVE-2016-5420/" source="CVE"/>
		<description>

This update for curl fixes the following issues:

- CVE-2016-5419: TLS session resumption client cert bypass (bsc#991389)
- CVE-2016-5420: Re-using connections with wrong client cert (bsc#991390)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-25"/>
	<updated date="2016-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/991389">SUSE bug 991389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991390">SUSE bug 991390</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5419/">CVE-2016-5419 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5419">CVE-2016-5419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5420/">CVE-2016-5420 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5420">CVE-2016-5420 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571071" comment="curl-7.19.7-1.20.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571072" comment="libcurl4-7.19.7-1.20.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571073" comment="libcurl4-32bit-7.19.7-1.20.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217007" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="991389" ref_url="https://bugzilla.suse.com/991389" source="BUGZILLA"/>
		<reference ref_id="991390" ref_url="https://bugzilla.suse.com/991390" source="BUGZILLA"/>
		<reference ref_id="997420" ref_url="https://bugzilla.suse.com/997420" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5419" ref_url="https://www.suse.com/security/cve/CVE-2016-5419/" source="CVE"/>
		<reference ref_id="CVE-2016-5420" ref_url="https://www.suse.com/security/cve/CVE-2016-5420/" source="CVE"/>
		<reference ref_id="CVE-2016-7141" ref_url="https://www.suse.com/security/cve/CVE-2016-7141/" source="CVE"/>
		<description>

This update for curl fixes the following issues:

- CVE-2016-5419: TLS session resumption client cert bypass (bsc#991389)
- CVE-2016-5420: Re-using connections with wrong client cert (bsc#991390)
- CVE-2016-7141: Fixed incorrect reuse of client certificates (bsc#997420).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-04"/>
	<updated date="2016-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/991389">SUSE bug 991389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991390">SUSE bug 991390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997420">SUSE bug 997420</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5419/">CVE-2016-5419 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5419">CVE-2016-5419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5420/">CVE-2016-5420 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5420">CVE-2016-5420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7141/">CVE-2016-7141 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7141">CVE-2016-7141 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571074" comment="curl-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571075" comment="curl-openssl1-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571076" comment="libcurl4-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571077" comment="libcurl4-32bit-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571078" comment="libcurl4-openssl1-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571079" comment="libcurl4-openssl1-32bit-7.19.7-1.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217008" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1005633" ref_url="https://bugzilla.suse.com/1005633" source="BUGZILLA"/>
		<reference ref_id="1005634" ref_url="https://bugzilla.suse.com/1005634" source="BUGZILLA"/>
		<reference ref_id="1005635" ref_url="https://bugzilla.suse.com/1005635" source="BUGZILLA"/>
		<reference ref_id="1005637" ref_url="https://bugzilla.suse.com/1005637" source="BUGZILLA"/>
		<reference ref_id="1005638" ref_url="https://bugzilla.suse.com/1005638" source="BUGZILLA"/>
		<reference ref_id="1005642" ref_url="https://bugzilla.suse.com/1005642" source="BUGZILLA"/>
		<reference ref_id="1005645" ref_url="https://bugzilla.suse.com/1005645" source="BUGZILLA"/>
		<reference ref_id="1005646" ref_url="https://bugzilla.suse.com/1005646" source="BUGZILLA"/>
		<reference ref_id="998760" ref_url="https://bugzilla.suse.com/998760" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7167" ref_url="https://www.suse.com/security/cve/CVE-2016-7167/" source="CVE"/>
		<reference ref_id="CVE-2016-8615" ref_url="https://www.suse.com/security/cve/CVE-2016-8615/" source="CVE"/>
		<reference ref_id="CVE-2016-8616" ref_url="https://www.suse.com/security/cve/CVE-2016-8616/" source="CVE"/>
		<reference ref_id="CVE-2016-8617" ref_url="https://www.suse.com/security/cve/CVE-2016-8617/" source="CVE"/>
		<reference ref_id="CVE-2016-8618" ref_url="https://www.suse.com/security/cve/CVE-2016-8618/" source="CVE"/>
		<reference ref_id="CVE-2016-8619" ref_url="https://www.suse.com/security/cve/CVE-2016-8619/" source="CVE"/>
		<reference ref_id="CVE-2016-8620" ref_url="https://www.suse.com/security/cve/CVE-2016-8620/" source="CVE"/>
		<reference ref_id="CVE-2016-8621" ref_url="https://www.suse.com/security/cve/CVE-2016-8621/" source="CVE"/>
		<reference ref_id="CVE-2016-8622" ref_url="https://www.suse.com/security/cve/CVE-2016-8622/" source="CVE"/>
		<reference ref_id="CVE-2016-8623" ref_url="https://www.suse.com/security/cve/CVE-2016-8623/" source="CVE"/>
		<reference ref_id="CVE-2016-8624" ref_url="https://www.suse.com/security/cve/CVE-2016-8624/" source="CVE"/>
		<description>
This update for curl fixes the following security issues:

- CVE-2016-8624: invalid URL parsing with '#' (bsc#1005646)
- CVE-2016-8623: Use-after-free via shared cookies (bsc#1005645)
- CVE-2016-8621: curl_getdate read out of bounds (bsc#1005642)
- CVE-2016-8619: double-free in krb5 code (bsc#1005638)
- CVE-2016-8618: double-free in curl_maprintf (bsc#1005637)
- CVE-2016-8617: OOB write via unchecked multiplication (bsc#1005635)
- CVE-2016-8616: case insensitive password comparison (bsc#1005634)
- CVE-2016-8615: cookie injection for other servers (bsc#1005633)
- CVE-2016-7167: escape and unescape integer overflows (bsc#998760)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-03"/>
	<updated date="2016-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005633">SUSE bug 1005633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005634">SUSE bug 1005634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005635">SUSE bug 1005635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005637">SUSE bug 1005637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005638">SUSE bug 1005638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005642">SUSE bug 1005642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005645">SUSE bug 1005645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005646">SUSE bug 1005646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998760">SUSE bug 998760</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7167/">CVE-2016-7167 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7167">CVE-2016-7167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8615/">CVE-2016-8615 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8615">CVE-2016-8615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8616/">CVE-2016-8616 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8616">CVE-2016-8616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8617/">CVE-2016-8617 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8617">CVE-2016-8617 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-8618/">CVE-2016-8618 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8618">CVE-2016-8618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8619/">CVE-2016-8619 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8619">CVE-2016-8619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8620/">CVE-2016-8620 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8620">CVE-2016-8620 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-8621/">CVE-2016-8621 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8621">CVE-2016-8621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8622/">CVE-2016-8622 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8622">CVE-2016-8622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8623/">CVE-2016-8623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8623">CVE-2016-8623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8624/">CVE-2016-8624 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8624">CVE-2016-8624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571080" comment="curl-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571081" comment="curl-openssl1-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571082" comment="libcurl4-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571083" comment="libcurl4-32bit-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571084" comment="libcurl4-openssl1-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571085" comment="libcurl4-openssl1-32bit-7.19.7-1.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217009" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1015332" ref_url="https://bugzilla.suse.com/1015332" source="BUGZILLA"/>
		<reference ref_id="1032309" ref_url="https://bugzilla.suse.com/1032309" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586/" source="CVE"/>
		<reference ref_id="CVE-2017-7407" ref_url="https://www.suse.com/security/cve/CVE-2017-7407/" source="CVE"/>
		<description>

This update for curl fixes the following issues:

These security issues were fixed:

- CVE-2016-9586: libcurl printf floating point buffer overflow (bsc#1015332)
- CVE-2017-7407: The ourWriteOut function in tool_writeout.c in curl might have allowed physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which lead to a heap-based buffer over-read (bsc#1032309).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015332">SUSE bug 1015332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032309">SUSE bug 1032309</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9586">CVE-2016-9586 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7407/">CVE-2017-7407 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7407">CVE-2017-7407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571086" comment="curl-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571087" comment="curl-openssl1-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571088" comment="libcurl4-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571089" comment="libcurl4-32bit-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571090" comment="libcurl4-openssl1-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571091" comment="libcurl4-openssl1-32bit-7.19.7-1.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217010" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1015332" ref_url="https://bugzilla.suse.com/1015332" source="BUGZILLA"/>
		<reference ref_id="1032309" ref_url="https://bugzilla.suse.com/1032309" source="BUGZILLA"/>
		<reference ref_id="1051644" ref_url="https://bugzilla.suse.com/1051644" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586/" source="CVE"/>
		<reference ref_id="CVE-2017-1000100" ref_url="https://www.suse.com/security/cve/CVE-2017-1000100/" source="CVE"/>
		<reference ref_id="CVE-2017-7407" ref_url="https://www.suse.com/security/cve/CVE-2017-7407/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2017-1000100: TFP sends more than buffer size and it could lead to a denial of service (bsc#1051644)

- CVE-2017-7407: ourWriteOut function problem could lead to a heap buffer over-read (bsc#1032309)

- CVE-2016-9586: libcurl printf issue could lead to buffer overflow (bsc#1015332)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-31"/>
	<updated date="2017-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015332">SUSE bug 1015332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032309">SUSE bug 1032309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051644">SUSE bug 1051644</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9586">CVE-2016-9586 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000100/">CVE-2017-1000100 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000100">CVE-2017-1000100 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7407/">CVE-2017-7407 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7407">CVE-2017-7407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571092" comment="curl-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571093" comment="curl-openssl1-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571094" comment="libcurl4-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571095" comment="libcurl4-32bit-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571096" comment="libcurl4-openssl1-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571097" comment="libcurl4-openssl1-32bit-7.19.7-1.70.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217011" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1061876" ref_url="https://bugzilla.suse.com/1061876" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000254" ref_url="https://www.suse.com/security/cve/CVE-2017-1000254/" source="CVE"/>
		<description>
This update for curl fixes the following security issues:

- CVE-2017-1000254: FTP PWD response parser out of bounds read (bsc#1061876)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-01"/>
	<updated date="2017-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1061876">SUSE bug 1061876</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000254/">CVE-2017-1000254 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000254">CVE-2017-1000254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571098" comment="curl-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571099" comment="curl-openssl1-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571100" comment="libcurl4-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571101" comment="libcurl4-32bit-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571102" comment="libcurl4-openssl1-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571103" comment="libcurl4-openssl1-32bit-7.19.7-1.70.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217012" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1027712" ref_url="https://bugzilla.suse.com/1027712" source="BUGZILLA"/>
		<reference ref_id="1077001" ref_url="https://bugzilla.suse.com/1077001" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7141" ref_url="https://www.suse.com/security/cve/CVE-2016-7141/" source="CVE"/>
		<reference ref_id="CVE-2018-1000007" ref_url="https://www.suse.com/security/cve/CVE-2018-1000007/" source="CVE"/>
		<description>
This update for curl several issues.

This security issue was fixed:

- CVE-2018-1000007: Prevent leaking authentication data to third parties when following redirects (bsc#1077001)

This non-security issue was fixed:

- Set DEFAULT_SUSE as the default cipher list (bsc#1027712]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027712">SUSE bug 1027712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077001">SUSE bug 1077001</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7141/">CVE-2016-7141 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7141">CVE-2016-7141 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000007/">CVE-2018-1000007 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000007">CVE-2018-1000007 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571104" comment="curl-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571105" comment="curl-openssl1-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571106" comment="libcurl4-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571107" comment="libcurl4-32bit-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571108" comment="libcurl4-openssl1-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571109" comment="libcurl4-openssl1-32bit-7.19.7-1.70.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217013" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1081056" ref_url="https://bugzilla.suse.com/1081056" source="BUGZILLA"/>
		<reference ref_id="1083463" ref_url="https://bugzilla.suse.com/1083463" source="BUGZILLA"/>
		<reference ref_id="1084137" ref_url="https://bugzilla.suse.com/1084137" source="BUGZILLA"/>
		<reference ref_id="1084521" ref_url="https://bugzilla.suse.com/1084521" source="BUGZILLA"/>
		<reference ref_id="1084524" ref_url="https://bugzilla.suse.com/1084524" source="BUGZILLA"/>
		<reference ref_id="1084532" ref_url="https://bugzilla.suse.com/1084532" source="BUGZILLA"/>
		<reference ref_id="1085124" ref_url="https://bugzilla.suse.com/1085124" source="BUGZILLA"/>
		<reference ref_id="1086825" ref_url="https://bugzilla.suse.com/1086825" source="BUGZILLA"/>
		<reference ref_id="1087922" ref_url="https://bugzilla.suse.com/1087922" source="BUGZILLA"/>
		<reference ref_id="1090194" ref_url="https://bugzilla.suse.com/1090194" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000120" ref_url="https://www.suse.com/security/cve/CVE-2018-1000120/" source="CVE"/>
		<reference ref_id="CVE-2018-1000121" ref_url="https://www.suse.com/security/cve/CVE-2018-1000121/" source="CVE"/>
		<reference ref_id="CVE-2018-1000122" ref_url="https://www.suse.com/security/cve/CVE-2018-1000122/" source="CVE"/>
		<description>


This update for curl fixes the following issues:

curl was updated to version 7.37.0 (fate#325339 bsc#1084137)

This update syncs the curl version to the one in SUSE Linux Enterprise 12
and is full binary compatible to the previous version.

This update is done to allow other third party software like 'R' to 
be able to be used on the SUSE Linux Enterprise 11 codebase.

Following security issues were fixed:

- CVE-2018-1000120: A buffer overflow exists in the FTP URL handling that allowed an attacker to cause a denial of service or possible code execution (bsc#1084521).
- CVE-2018-1000121: A NULL pointer dereference exists in the LDAP code that allowed an attacker to cause a denial of service (bsc#1084524).
- CVE-2018-1000122: A buffer over-read exists in the RTSP+RTP handling code that allowed an attacker to cause a denial of service or information leakage (bsc#1084532).

The package also requires a libopenssl that implements the DEFAULT_SUSE cipher list
(bsc#1081056, bsc#1083463,bsc#1086825)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081056">SUSE bug 1081056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083463">SUSE bug 1083463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084137">SUSE bug 1084137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084521">SUSE bug 1084521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084524">SUSE bug 1084524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084532">SUSE bug 1084532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085124">SUSE bug 1085124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086825">SUSE bug 1086825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087922">SUSE bug 1087922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090194">SUSE bug 1090194</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000120/">CVE-2018-1000120 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000120">CVE-2018-1000120 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000121/">CVE-2018-1000121 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000121">CVE-2018-1000121 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000122/">CVE-2018-1000122 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000122">CVE-2018-1000122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571110" comment="curl-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571111" comment="curl-openssl1-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571112" comment="libcurl4-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571113" comment="libcurl4-32bit-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571114" comment="libcurl4-openssl1-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571115" comment="libcurl4-openssl1-32bit-7.37.0-70.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217014" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1092098" ref_url="https://bugzilla.suse.com/1092098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000301" ref_url="https://www.suse.com/security/cve/CVE-2018-1000301/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-1000301: Fixed a buffer over-read caused by bad RTSP headers (bsc#1092098)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-30"/>
	<updated date="2018-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092098">SUSE bug 1092098</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000301/">CVE-2018-1000301 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000301">CVE-2018-1000301 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571116" comment="curl-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571117" comment="curl-openssl1-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571118" comment="libcurl4-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571119" comment="libcurl4-32bit-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571120" comment="libcurl4-openssl1-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571121" comment="libcurl4-openssl1-32bit-7.37.0-70.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217015" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1106019" ref_url="https://bugzilla.suse.com/1106019" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14618" ref_url="https://www.suse.com/security/cve/CVE-2018-14618/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-14618: Prevent integer overflow in the NTLM authentication code
  (bsc#1106019).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-14"/>
	<updated date="2018-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106019">SUSE bug 1106019</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14618/">CVE-2018-14618 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14618">CVE-2018-14618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571122" comment="curl-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571123" comment="curl-openssl1-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571124" comment="libcurl4-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571125" comment="libcurl4-32bit-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571126" comment="libcurl4-openssl1-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571127" comment="libcurl4-openssl1-32bit-7.37.0-70.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217016" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1112758" ref_url="https://bugzilla.suse.com/1112758" source="BUGZILLA"/>
		<reference ref_id="1113660" ref_url="https://bugzilla.suse.com/1113660" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16840" ref_url="https://www.suse.com/security/cve/CVE-2018-16840/" source="CVE"/>
		<reference ref_id="CVE-2018-16842" ref_url="https://www.suse.com/security/cve/CVE-2018-16842/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-16840: A use-after-free in SASL handle close was fixed (bsc#1112758)
- CVE-2018-16842: A Out-of-bounds Read in tool_msgs.c was fixed which could lead to crashes (bsc#1113660)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-08"/>
	<updated date="2018-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113660">SUSE bug 1113660</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16840/">CVE-2018-16840 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16840">CVE-2018-16840 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16842/">CVE-2018-16842 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16842">CVE-2018-16842 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571128" comment="curl-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571129" comment="curl-openssl1-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571130" comment="libcurl4-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571131" comment="libcurl4-32bit-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571132" comment="libcurl4-openssl1-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571133" comment="libcurl4-openssl1-32bit-7.37.0-70.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217017" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1135170" ref_url="https://bugzilla.suse.com/1135170" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5436" ref_url="https://www.suse.com/security/cve/CVE-2019-5436/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5436: Fixed a heap buffer overflow exists in tftp_receive_packet that receives data from a TFTP server (bsc#1135170).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-24"/>
	<updated date="2019-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135170">SUSE bug 1135170</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5436/">CVE-2019-5436 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5436">CVE-2019-5436 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571134" comment="curl-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571135" comment="curl-openssl1-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571136" comment="libcurl4-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571137" comment="libcurl4-32bit-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571138" comment="libcurl4-openssl1-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571139" comment="libcurl4-openssl1-32bit-7.37.0-70.41.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217018" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1149496" ref_url="https://bugzilla.suse.com/1149496" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5482: Fixed a TFTP small blocksize heap buffer overflow (bsc#1149496).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5482">CVE-2019-5482 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571140" comment="curl-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571141" comment="curl-openssl1-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571142" comment="libcurl4-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571143" comment="libcurl4-32bit-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571144" comment="libcurl4-openssl1-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571145" comment="libcurl4-openssl1-32bit-7.37.0-70.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217019" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1173027" ref_url="https://bugzilla.suse.com/1173027" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2020-8177: Fixed an issue where curl could have been tricked by a malicious 
  server to overwrite a local file when using the -J option (bsc#1173027). 	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-24"/>
	<updated date="2020-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173027">SUSE bug 1173027</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8177">CVE-2020-8177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571146" comment="curl-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571147" comment="curl-openssl1-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571148" comment="libcurl4-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571149" comment="libcurl4-32bit-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571150" comment="libcurl4-openssl1-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571151" comment="libcurl4-openssl1-32bit-7.37.0-70.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217020" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1175109" ref_url="https://bugzilla.suse.com/1175109" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8231" ref_url="https://www.suse.com/security/cve/CVE-2020-8231/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- An application that performs multiple requests with libcurl's
  multi API and sets the 'CURLOPT_CONNECT_ONLY' option, might in
  rare circumstances experience that when subsequently using the
  setup connect-only transfer, libcurl will pick and use the wrong
  connection and instead pick another one the application has
  created since then. [bsc#1175109, CVE-2020-8231]
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175109">SUSE bug 1175109</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8231/">CVE-2020-8231 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8231">CVE-2020-8231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571152" comment="curl-7.37.0-70.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571153" comment="curl-openssl1-7.37.0-70.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571154" comment="libcurl4-7.37.0-70.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571155" comment="libcurl4-32bit-7.37.0-70.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571156" comment="libcurl4-openssl1-7.37.0-70.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571157" comment="libcurl4-openssl1-32bit-7.37.0-70.52.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217021" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1179398" ref_url="https://bugzilla.suse.com/1179398" source="BUGZILLA"/>
		<reference ref_id="1179399" ref_url="https://bugzilla.suse.com/1179399" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8284" ref_url="https://www.suse.com/security/cve/CVE-2020-8284/" source="CVE"/>
		<reference ref_id="CVE-2020-8285" ref_url="https://www.suse.com/security/cve/CVE-2020-8285/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2020-8284: Fixed an issue where a malicious FTP server could make curl connect to a different IP (bsc#1179398).
- CVE-2020-8285: Fixed an FTP wildcard stack overflow (bsc#1179399).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-21"/>
	<updated date="2020-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179398">SUSE bug 1179398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179399">SUSE bug 1179399</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8284/">CVE-2020-8284 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8284">CVE-2020-8284 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8285/">CVE-2020-8285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8285">CVE-2020-8285 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571158" comment="curl-7.37.0-70.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571159" comment="curl-openssl1-7.37.0-70.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571160" comment="libcurl4-7.37.0-70.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571161" comment="libcurl4-32bit-7.37.0-70.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571162" comment="libcurl4-openssl1-7.37.0-70.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571163" comment="libcurl4-openssl1-32bit-7.37.0-70.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217022" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1183933" ref_url="https://bugzilla.suse.com/1183933" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22876" ref_url="https://www.suse.com/security/cve/CVE-2021-22876/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22876: Fixed an issue where the automatic referer was leaking credentials (bsc#1183933).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183933">SUSE bug 1183933</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22876/">CVE-2021-22876 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22876">CVE-2021-22876 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571164" comment="curl-7.37.0-70.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571165" comment="curl-openssl1-7.37.0-70.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571166" comment="libcurl4-7.37.0-70.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571167" comment="libcurl4-32bit-7.37.0-70.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571168" comment="libcurl4-openssl1-7.37.0-70.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571169" comment="libcurl4-openssl1-32bit-7.37.0-70.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217023" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1186114" ref_url="https://bugzilla.suse.com/1186114" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22898" ref_url="https://www.suse.com/security/cve/CVE-2021-22898/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22898: Fixed curl TELNET stack contents disclosure (bsc#1186114).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-26"/>
	<updated date="2021-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186114">SUSE bug 1186114</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22898/">CVE-2021-22898 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22898">CVE-2021-22898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571170" comment="curl-7.37.0-70.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571171" comment="curl-openssl1-7.37.0-70.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571172" comment="libcurl4-7.37.0-70.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571173" comment="libcurl4-32bit-7.37.0-70.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571174" comment="libcurl4-openssl1-7.37.0-70.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571175" comment="libcurl4-openssl1-32bit-7.37.0-70.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217024" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1186114" ref_url="https://bugzilla.suse.com/1186114" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22898" ref_url="https://www.suse.com/security/cve/CVE-2021-22898/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22898: Fixed curl TELNET stack contents disclosure (bsc#1186114).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-30"/>
	<updated date="2021-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186114">SUSE bug 1186114</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22898/">CVE-2021-22898 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22898">CVE-2021-22898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571176" comment="curl-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571177" comment="curl-openssl1-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571178" comment="libcurl4-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571179" comment="libcurl4-32bit-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571180" comment="libcurl4-openssl1-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571181" comment="libcurl4-openssl1-32bit-7.37.0-70.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217025" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1188217" ref_url="https://bugzilla.suse.com/1188217" source="BUGZILLA"/>
		<reference ref_id="1188218" ref_url="https://bugzilla.suse.com/1188218" source="BUGZILLA"/>
		<reference ref_id="1188219" ref_url="https://bugzilla.suse.com/1188219" source="BUGZILLA"/>
		<reference ref_id="1188220" ref_url="https://bugzilla.suse.com/1188220" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22922" ref_url="https://www.suse.com/security/cve/CVE-2021-22922/" source="CVE"/>
		<reference ref_id="CVE-2021-22923" ref_url="https://www.suse.com/security/cve/CVE-2021-22923/" source="CVE"/>
		<reference ref_id="CVE-2021-22924" ref_url="https://www.suse.com/security/cve/CVE-2021-22924/" source="CVE"/>
		<reference ref_id="CVE-2021-22925" ref_url="https://www.suse.com/security/cve/CVE-2021-22925/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22925: TELNET stack contents disclosure again. (bsc#1188220)
- CVE-2021-22924: Bad connection reuse due to flawed path name checks. (bsc#1188219)
- CVE-2021-22923: Insufficiently Protected Credentials. (bsc#1188218)
- CVE-2021-22922: Wrong content via metalink not discarded. (bsc#1188217)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188217">SUSE bug 1188217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188218">SUSE bug 1188218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188219">SUSE bug 1188219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188220">SUSE bug 1188220</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22922/">CVE-2021-22922 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22922">CVE-2021-22922 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22923/">CVE-2021-22923 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22923">CVE-2021-22923 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22924/">CVE-2021-22924 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22924">CVE-2021-22924 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22925/">CVE-2021-22925 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22925">CVE-2021-22925 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626169" comment="curl-7.37.0-70.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626170" comment="curl-openssl1-7.37.0-70.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626171" comment="libcurl4-7.37.0-70.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626172" comment="libcurl4-32bit-7.37.0-70.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626173" comment="libcurl4-openssl1-7.37.0-70.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626174" comment="libcurl4-openssl1-32bit-7.37.0-70.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217026" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1190373" ref_url="https://bugzilla.suse.com/1190373" source="BUGZILLA"/>
		<reference ref_id="1190374" ref_url="https://bugzilla.suse.com/1190374" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22946" ref_url="https://www.suse.com/security/cve/CVE-2021-22946/" source="CVE"/>
		<reference ref_id="CVE-2021-22947" ref_url="https://www.suse.com/security/cve/CVE-2021-22947/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22947: Fixed STARTTLS protocol injection via MITM (bsc#1190374).
- CVE-2021-22946: Fixed protocol downgrade required TLS bypassed (bsc#1190373).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190373">SUSE bug 1190373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190374">SUSE bug 1190374</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22946/">CVE-2021-22946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22946">CVE-2021-22946 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22947/">CVE-2021-22947 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22947">CVE-2021-22947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633950" comment="curl-7.37.0-70.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633951" comment="curl-openssl1-7.37.0-70.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633952" comment="libcurl4-7.37.0-70.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633953" comment="libcurl4-32bit-7.37.0-70.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633954" comment="libcurl4-openssl1-7.37.0-70.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633955" comment="libcurl4-openssl1-32bit-7.37.0-70.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217027" version="1" class="patch">
	<metadata>
		<title>Security update for CVS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="744059" ref_url="https://bugzilla.suse.com/744059" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0804" ref_url="https://www.suse.com/security/cve/CVE-2012-0804/" source="CVE"/>
		<description>

A heap-based buffer overflow flaw was found in the way CVS read proxy 
connection HTTP responses. An attacker could exploit this to cause the 
application to crash or, potentially, execute arbitrary code in the context 
of the user running the application (CVE-2012-0804).

Security Issue reference:

    * CVE-2012-0804
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0804&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-22"/>
	<updated date="2012-02-22"/>
	<bugzilla href="https://bugzilla.suse.com/744059">SUSE bug 744059</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0804/">CVE-2012-0804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0804">CVE-2012-0804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991354" comment="cvs-1.12.12-144.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991355" comment="cvs-doc-1.12.12-144.23.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217028" version="1" class="patch">
	<metadata>
		<title>Security update for cvs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1053364" ref_url="https://bugzilla.suse.com/1053364" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12836" ref_url="https://www.suse.com/security/cve/CVE-2017-12836/" source="CVE"/>
		<description>
This update for cvs fixes the following issues:

  - CVE-2017-12836: A leading dash in the argument of the '-d' option could lead to argument injection (bsc#1053364)

  		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-12"/>
	<updated date="2017-09-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1053364">SUSE bug 1053364</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12836/">CVE-2017-12836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12836">CVE-2017-12836 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571184" comment="cvs-1.12.12-144.23.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571185" comment="cvs-doc-1.12.12-144.23.5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217029" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-imapd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="606710" ref_url="https://bugzilla.suse.com/606710" source="BUGZILLA"/>
		<reference ref_id="694247" ref_url="https://bugzilla.suse.com/694247" source="BUGZILLA"/>
		<reference ref_id="715251" ref_url="https://bugzilla.suse.com/715251" source="BUGZILLA"/>
		<reference ref_id="718428" ref_url="https://bugzilla.suse.com/718428" source="BUGZILLA"/>
		<reference ref_id="719998" ref_url="https://bugzilla.suse.com/719998" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1926" ref_url="https://www.suse.com/security/cve/CVE-2011-1926/" source="CVE"/>
		<reference ref_id="CVE-2011-3208" ref_url="https://www.suse.com/security/cve/CVE-2011-3208/" source="CVE"/>
		<reference ref_id="CVE-2011-3372" ref_url="https://www.suse.com/security/cve/CVE-2011-3372/" source="CVE"/>
		<reference ref_id="CVE-2011-3481" ref_url="https://www.suse.com/security/cve/CVE-2011-3481/" source="CVE"/>
		<description>

An authentication bypass (CVE-2011-3372) and a DoS vulnerability 
(CVE-2011-3481) have been fixed in the Cyrus IMAPd nntpd.

Security Issue references:

    * CVE-2011-3372
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3372&gt;
    * CVE-2011-3481
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3481&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-10-05"/>
	<updated date="2011-10-05"/>
	<bugzilla href="https://bugzilla.suse.com/606710">SUSE bug 606710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/694247">SUSE bug 694247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/715251">SUSE bug 715251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/718428">SUSE bug 718428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/719998">SUSE bug 719998</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1926/">CVE-2011-1926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1926">CVE-2011-1926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3208/">CVE-2011-3208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3208">CVE-2011-3208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3372/">CVE-2011-3372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3372">CVE-2011-3372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3481/">CVE-2011-3481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3481">CVE-2011-3481 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991356" comment="cyrus-imapd-2.3.11-60.65.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991357" comment="perl-Cyrus-IMAP-2.3.11-60.65.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991358" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217030" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-imapd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="860611" ref_url="https://bugzilla.suse.com/860611" source="BUGZILLA"/>
		<reference ref_id="901748" ref_url="https://bugzilla.suse.com/901748" source="BUGZILLA"/>
		<reference ref_id="954200" ref_url="https://bugzilla.suse.com/954200" source="BUGZILLA"/>
		<reference ref_id="954201" ref_url="https://bugzilla.suse.com/954201" source="BUGZILLA"/>
		<reference ref_id="981670" ref_url="https://bugzilla.suse.com/981670" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2015-8076" ref_url="https://www.suse.com/security/cve/CVE-2015-8076/" source="CVE"/>
		<reference ref_id="CVE-2015-8077" ref_url="https://www.suse.com/security/cve/CVE-2015-8077/" source="CVE"/>
		<reference ref_id="CVE-2015-8078" ref_url="https://www.suse.com/security/cve/CVE-2015-8078/" source="CVE"/>
		<description>

This update for cyrus-imapd fixes the following issues:

- Previous versions of cyrus-imapd would not allow its users to disable old SSL
  variants that are vulnerable to attacks like BEAST and POODLE. This patch
  adds the configuration option 'tls_versions' to remedy that issue. Note that
  users who upgrade an existing installation will *not* have their imapd.conf
  file overwritten, i.e. their IMAP server will continue to support SSLv2 and
  SSLv3 like before. To disable support for those protocols, edit imapd.conf
  manually to include 'tls_versions: tls1_0 tls1_1 tls1_2'. New installations,
  however, will have an imapd.conf file that contains these settings already,
  i.e. newly installed IMAP servers do *not* support unsafe versions of SSL
  unless that support is explicitly enabled by the user. (bsc#901748)

- An integer overflow vulnerability in cyrus-imapd's urlfetch range checking
  code was fixed. (CVE-2015-8076, CVE-2015-8077, CVE-2015-8078, bsc#981670,
  bsc#954200, bsc#954201)

- Support for Elliptic Curve Diffie–Hellman (ECDH) has been added to
  cyrus-imapd. (bsc#860611)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-01"/>
	<updated date="2016-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/860611">SUSE bug 860611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901748">SUSE bug 901748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954200">SUSE bug 954200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954201">SUSE bug 954201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981670">SUSE bug 981670</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8076/">CVE-2015-8076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8076">CVE-2015-8076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8077/">CVE-2015-8077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8077">CVE-2015-8077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8078/">CVE-2015-8078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8078">CVE-2015-8078 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571189" comment="cyrus-imapd-2.3.11-60.65.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571190" comment="perl-Cyrus-IMAP-2.3.11-60.65.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571191" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217031" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-imapd (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1058021" ref_url="https://bugzilla.suse.com/1058021" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14230" ref_url="https://www.suse.com/security/cve/CVE-2017-14230/" source="CVE"/>
		<description>
This update for cyrus-imapd fixes the following issues:

Security issue fixed:

- CVE-2017-14230: Fixed a off-by-one error in prefix calculation for the LIST command that could cause use of uninitialized memory (bsc#1058021).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-05"/>
	<updated date="2020-11-05"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1058021">SUSE bug 1058021</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14230/">CVE-2017-14230 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14230">CVE-2017-14230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571192" comment="cyrus-imapd-2.3.11-60.65.71.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571193" comment="perl-Cyrus-IMAP-2.3.11-60.65.71.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571194" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.71.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217032" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-imapd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1189313" ref_url="https://bugzilla.suse.com/1189313" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33582" ref_url="https://www.suse.com/security/cve/CVE-2021-33582/" source="CVE"/>
		<description>
This update for cyrus-imapd fixes the following issues:

- CVE-2021-33582: Fixed possible hash denial of service (bsc#1189313).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-09"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189313">SUSE bug 1189313</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33582/">CVE-2021-33582 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33582">CVE-2021-33582 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632634" comment="cyrus-imapd-2.3.11-60.65.71.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632635" comment="perl-Cyrus-IMAP-2.3.11-60.65.71.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632636" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.71.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217033" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1159635" ref_url="https://bugzilla.suse.com/1159635" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19906" ref_url="https://www.suse.com/security/cve/CVE-2019-19906/" source="CVE"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2019-19906: Fixed an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet (bsc#1159635).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-17"/>
	<updated date="2020-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159635">SUSE bug 1159635</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19906/">CVE-2019-19906 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19906">CVE-2019-19906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571195" comment="cyrus-sasl-openssl1-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571196" comment="cyrus-sasl-openssl1-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571197" comment="cyrus-sasl-openssl1-crammd5-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571198" comment="cyrus-sasl-openssl1-crammd5-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571199" comment="cyrus-sasl-openssl1-digestmd5-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571200" comment="cyrus-sasl-openssl1-digestmd5-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571201" comment="cyrus-sasl-openssl1-gssapi-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571202" comment="cyrus-sasl-openssl1-gssapi-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571203" comment="cyrus-sasl-openssl1-ntlm-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571204" comment="cyrus-sasl-openssl1-otp-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571205" comment="cyrus-sasl-openssl1-otp-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571206" comment="cyrus-sasl-openssl1-plain-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571207" comment="cyrus-sasl-openssl1-plain-32bit-2.1.22-182.26.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217034" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1159635" ref_url="https://bugzilla.suse.com/1159635" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19906" ref_url="https://www.suse.com/security/cve/CVE-2019-19906/" source="CVE"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2019-19906: Fixed an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet (bsc#1159635).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-18"/>
	<updated date="2020-12-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159635">SUSE bug 1159635</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19906/">CVE-2019-19906 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19906">CVE-2019-19906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571208" comment="cyrus-sasl-2.1.22-182.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571209" comment="cyrus-sasl-32bit-2.1.22-182.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571210" comment="cyrus-sasl-crammd5-2.1.22-182.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571211" comment="cyrus-sasl-crammd5-32bit-2.1.22-182.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571212" comment="cyrus-sasl-digestmd5-2.1.22-182.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571213" comment="cyrus-sasl-gssapi-2.1.22-182.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571214" comment="cyrus-sasl-gssapi-32bit-2.1.22-182.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571215" comment="cyrus-sasl-otp-2.1.22-182.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571216" comment="cyrus-sasl-otp-32bit-2.1.22-182.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571217" comment="cyrus-sasl-plain-2.1.22-182.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571218" comment="cyrus-sasl-plain-32bit-2.1.22-182.20.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217035" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1196036" ref_url="https://bugzilla.suse.com/1196036" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2022-24407: Fixed SQL injection in sql_auxprop_store in plugins/sql.c (bsc#1196036).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-23"/>
	<updated date="2022-02-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196036">SUSE bug 1196036</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24407">CVE-2022-24407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669459" comment="cyrus-sasl-2.1.22-182.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669460" comment="cyrus-sasl-32bit-2.1.22-182.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669461" comment="cyrus-sasl-crammd5-2.1.22-182.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669462" comment="cyrus-sasl-crammd5-32bit-2.1.22-182.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669463" comment="cyrus-sasl-digestmd5-2.1.22-182.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669464" comment="cyrus-sasl-gssapi-2.1.22-182.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669465" comment="cyrus-sasl-gssapi-32bit-2.1.22-182.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669466" comment="cyrus-sasl-otp-2.1.22-182.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669467" comment="cyrus-sasl-otp-32bit-2.1.22-182.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669468" comment="cyrus-sasl-plain-2.1.22-182.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669469" comment="cyrus-sasl-plain-32bit-2.1.22-182.20.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217036" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1196036" ref_url="https://bugzilla.suse.com/1196036" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2022-24407: Fixed SQL injection in sql_auxprop_store in plugins/sql.c (bsc#1196036).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-23"/>
	<updated date="2022-02-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196036">SUSE bug 1196036</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24407">CVE-2022-24407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669470" comment="cyrus-sasl-openssl1-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669471" comment="cyrus-sasl-openssl1-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669472" comment="cyrus-sasl-openssl1-crammd5-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669473" comment="cyrus-sasl-openssl1-crammd5-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669474" comment="cyrus-sasl-openssl1-digestmd5-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669475" comment="cyrus-sasl-openssl1-digestmd5-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669476" comment="cyrus-sasl-openssl1-gssapi-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669477" comment="cyrus-sasl-openssl1-gssapi-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669478" comment="cyrus-sasl-openssl1-ntlm-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669479" comment="cyrus-sasl-openssl1-otp-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669480" comment="cyrus-sasl-openssl1-otp-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669481" comment="cyrus-sasl-openssl1-plain-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669482" comment="cyrus-sasl-openssl1-plain-32bit-2.1.22-182.26.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217037" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="495804" ref_url="https://bugzilla.suse.com/495804" source="BUGZILLA"/>
		<reference ref_id="595681" ref_url="https://bugzilla.suse.com/595681" source="BUGZILLA"/>
		<reference ref_id="659934" ref_url="https://bugzilla.suse.com/659934" source="BUGZILLA"/>
		<reference ref_id="697105" ref_url="https://bugzilla.suse.com/697105" source="BUGZILLA"/>
		<reference ref_id="699712" ref_url="https://bugzilla.suse.com/699712" source="BUGZILLA"/>
		<reference ref_id="739743" ref_url="https://bugzilla.suse.com/739743" source="BUGZILLA"/>
		<reference ref_id="764047" ref_url="https://bugzilla.suse.com/764047" source="BUGZILLA"/>
		<reference ref_id="896453" ref_url="https://bugzilla.suse.com/896453" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-4352" ref_url="https://www.suse.com/security/cve/CVE-2010-4352/" source="CVE"/>
		<reference ref_id="CVE-2011-2200" ref_url="https://www.suse.com/security/cve/CVE-2011-2200/" source="CVE"/>
		<reference ref_id="CVE-2012-3524" ref_url="https://www.suse.com/security/cve/CVE-2012-3524/" source="CVE"/>
		<reference ref_id="CVE-2014-3638" ref_url="https://www.suse.com/security/cve/CVE-2014-3638/" source="CVE"/>
		<reference ref_id="CVE-2014-3639" ref_url="https://www.suse.com/security/cve/CVE-2014-3639/" source="CVE"/>
		<description>

Various denial of service issues were fixed in the DBUS service.

    * CVE-2014-3638: dbus-daemon tracks whether method call messages expect
      a reply, so that unsolicited replies can be dropped. As currently
      implemented, if there are n parallel method calls in progress, each
      method reply takes O(n) CPU time. A malicious user could exploit this
      by opening the maximum allowed number of parallel connections and
      sending the maximum number of parallel method calls on each one,
      causing subsequent method calls to be unreasonably slow, a denial of
      service.
    * CVE-2014-3639: dbus-daemon allows a small number of 'incomplete'
      connections (64 by default) whose identity has not yet been
      confirmed. When this limit has been reached, subsequent connections
      are dropped. Alban's testing indicates that one malicious process
      that makes repeated connection attempts, but never completes the
      authentication handshake and instead waits for dbus-daemon to time
      out and disconnect it, can cause the majority of legitimate
      connection attempts to fail.

Security Issues:

    * CVE-2014-3638
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638&gt;
    * CVE-2014-3639
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-16"/>
	<updated date="2014-09-16"/>
	<bugzilla href="https://bugzilla.suse.com/495804">SUSE bug 495804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/595681">SUSE bug 595681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/659934">SUSE bug 659934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/697105">SUSE bug 697105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/699712">SUSE bug 699712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/739743">SUSE bug 739743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/764047">SUSE bug 764047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896453">SUSE bug 896453</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4352/">CVE-2010-4352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4352">CVE-2010-4352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2200/">CVE-2011-2200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2200">CVE-2011-2200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3524/">CVE-2012-3524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3524">CVE-2012-3524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3638/">CVE-2014-3638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3638">CVE-2014-3638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3639/">CVE-2014-3639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3639">CVE-2014-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991359" comment="dbus-1-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991360" comment="dbus-1-32bit-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991361" comment="dbus-1-x11-1.2.10-3.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991359" comment="dbus-1-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991360" comment="dbus-1-32bit-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991361" comment="dbus-1-x11-1.2.10-3.31.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217038" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1137832" ref_url="https://bugzilla.suse.com/1137832" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749/" source="CVE"/>
		<description>
This update for dbus-1 fixes the following issues:

Security issue fixed: 	  

- CVE-2019-12749: Fixed an implementation flaw in DBUS_COOKIE_SHA1 which
  could have allowed local attackers to bypass authentication (bsc#1137832).

		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-02"/>
	<updated date="2019-07-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137832">SUSE bug 1137832</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12749">CVE-2019-12749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571219" comment="dbus-1-1.2.10-3.34.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571220" comment="dbus-1-32bit-1.2.10-3.34.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571221" comment="dbus-1-x11-1.2.10-3.34.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217039" version="1" class="patch">
	<metadata>
		<title>Recommended update for dbus-1</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="628607" ref_url="https://bugzilla.suse.com/628607" source="BUGZILLA"/>
		<reference ref_id="662487" ref_url="https://bugzilla.suse.com/662487" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-1172" ref_url="https://www.suse.com/security/cve/CVE-2010-1172/" source="CVE"/>
		<description>

This update fixes the dbus-1 Method 'GetAll', which did not work on 
multi-interface objects (bnc#662487).

		</description>
<advisory from="security@suse.de">
	<issued date="2011-10-04"/>
	<updated date="2011-10-04"/>
	<bugzilla href="https://bugzilla.suse.com/628607">SUSE bug 628607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662487">SUSE bug 662487</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1172/">CVE-2010-1172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1172">CVE-2010-1172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991362" comment="dbus-1-glib-0.76-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991363" comment="dbus-1-glib-32bit-0.76-34.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217040" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="597825" ref_url="https://bugzilla.suse.com/597825" source="BUGZILLA"/>
		<reference ref_id="627617" ref_url="https://bugzilla.suse.com/627617" source="BUGZILLA"/>
		<reference ref_id="640336" ref_url="https://bugzilla.suse.com/640336" source="BUGZILLA"/>
		<reference ref_id="648580" ref_url="https://bugzilla.suse.com/648580" source="BUGZILLA"/>
		<reference ref_id="668194" ref_url="https://bugzilla.suse.com/668194" source="BUGZILLA"/>
		<reference ref_id="673792" ref_url="https://bugzilla.suse.com/673792" source="BUGZILLA"/>
		<reference ref_id="675052" ref_url="https://bugzilla.suse.com/675052" source="BUGZILLA"/>
		<reference ref_id="678858" ref_url="https://bugzilla.suse.com/678858" source="BUGZILLA"/>
		<reference ref_id="700771" ref_url="https://bugzilla.suse.com/700771" source="BUGZILLA"/>
		<reference ref_id="712653" ref_url="https://bugzilla.suse.com/712653" source="BUGZILLA"/>
		<reference ref_id="739696" ref_url="https://bugzilla.suse.com/739696" source="BUGZILLA"/>
		<reference ref_id="762108" ref_url="https://bugzilla.suse.com/762108" source="BUGZILLA"/>
		<reference ref_id="772924" ref_url="https://bugzilla.suse.com/772924" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-0997" ref_url="https://www.suse.com/security/cve/CVE-2011-0997/" source="CVE"/>
		<reference ref_id="CVE-2011-2748" ref_url="https://www.suse.com/security/cve/CVE-2011-2748/" source="CVE"/>
		<reference ref_id="CVE-2011-2749" ref_url="https://www.suse.com/security/cve/CVE-2011-2749/" source="CVE"/>
		<reference ref_id="CVE-2012-3571" ref_url="https://www.suse.com/security/cve/CVE-2012-3571/" source="CVE"/>
		<reference ref_id="CVE-2012-3954" ref_url="https://www.suse.com/security/cve/CVE-2012-3954/" source="CVE"/>
		<description>

This update of dhcp fixes two security vulnerabilities:

    * Malformed client identifiers could cause a Denial of Service
      (excessive CPU consumption), effectively causing further client
      requests to not be processed anymore. (CVE-2012-3571
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3571&gt; )
    * Two unspecified memory leaks. (CVE-2012-3954
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3954&gt; )

Additionally, the following issues were fixed:

    * The init script of dhcp-server was fixed to check syntax and fail on
      force-reload and restart to avoid stopping of running daemon followed
      by start failure
    * Added libgcc_s.so to chroot, so the server can report an assert/crash
      line.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-13"/>
	<updated date="2012-08-13"/>
	<bugzilla href="https://bugzilla.suse.com/597825">SUSE bug 597825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/627617">SUSE bug 627617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/640336">SUSE bug 640336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648580">SUSE bug 648580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/668194">SUSE bug 668194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/673792">SUSE bug 673792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/675052">SUSE bug 675052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/678858">SUSE bug 678858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/700771">SUSE bug 700771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/712653">SUSE bug 712653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/739696">SUSE bug 739696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762108">SUSE bug 762108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772924">SUSE bug 772924</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0997/">CVE-2011-0997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0997">CVE-2011-0997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2748/">CVE-2011-2748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2748">CVE-2011-2748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2749/">CVE-2011-2749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2749">CVE-2011-2749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3571/">CVE-2012-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3571">CVE-2012-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3954/">CVE-2012-3954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3954">CVE-2012-3954 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991364" comment="dhcp-3.1.3.ESV-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991365" comment="dhcp-client-3.1.3.ESV-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991366" comment="dhcp-relay-3.1.3.ESV-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991367" comment="dhcp-server-3.1.3.ESV-0.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217041" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="880984" ref_url="https://bugzilla.suse.com/880984" source="BUGZILLA"/>
		<reference ref_id="936923" ref_url="https://bugzilla.suse.com/936923" source="BUGZILLA"/>
		<reference ref_id="961305" ref_url="https://bugzilla.suse.com/961305" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8605" ref_url="https://www.suse.com/security/cve/CVE-2015-8605/" source="CVE"/>
		<description>

This update for dhcp fixes the following issues:

- CVE-2015-8605: A remote attacker could have used badly formed packets with an invalid IPv4 UDP length field to cause a DHCP server, client, or relay program to terminate abnormally (bsc#961305)

The following bugs were fixed:

- bsc#936923: Improper lease duration checking
- bsc#880984: Integer overflows in the date and time handling code
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-26"/>
	<updated date="2016-02-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/880984">SUSE bug 880984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936923">SUSE bug 936923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961305">SUSE bug 961305</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8605/">CVE-2015-8605 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8605">CVE-2015-8605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571226" comment="dhcp-3.1.3.ESV-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571227" comment="dhcp-client-3.1.3.ESV-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571228" comment="dhcp-relay-3.1.3.ESV-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571229" comment="dhcp-server-3.1.3.ESV-0.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217042" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="969820" ref_url="https://bugzilla.suse.com/969820" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2774" ref_url="https://www.suse.com/security/cve/CVE-2016-2774/" source="CVE"/>
		<description>

This update for dhcp fixes the following issues:

- CVE-2016-2774: Fixed a denial of service attack against the DHCP server over the OMAPI TCP socket, which could be used
  by network adjacent attackers to make the DHCP server non-functional (bsc#969820).
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-10"/>
	<updated date="2017-02-10"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/969820">SUSE bug 969820</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2774/">CVE-2016-2774 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2774">CVE-2016-2774 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571230" comment="dhcp-3.1.3.ESV-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571231" comment="dhcp-client-3.1.3.ESV-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571232" comment="dhcp-relay-3.1.3.ESV-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571233" comment="dhcp-server-3.1.3.ESV-0.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217043" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1076119" ref_url="https://bugzilla.suse.com/1076119" source="BUGZILLA"/>
		<reference ref_id="1186382" ref_url="https://bugzilla.suse.com/1186382" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3144" ref_url="https://www.suse.com/security/cve/CVE-2017-3144/" source="CVE"/>
		<reference ref_id="CVE-2021-25217" ref_url="https://www.suse.com/security/cve/CVE-2021-25217/" source="CVE"/>
		<description>
This update for dhcp fixes the following issues:

- CVE-2017-3144: Plugs a socket descriptor leak in OMAPI (bsc#1076119)
- CVE-2021-25217: A buffer overrun in lease file parsing code can be used to exploit a common vulnerability shared by dhcpd and dhclient (bsc#1186382)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-01"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076119">SUSE bug 1076119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186382">SUSE bug 1186382</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3144/">CVE-2017-3144 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3144">CVE-2017-3144 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25217/">CVE-2021-25217 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25217">CVE-2021-25217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571234" comment="dhcp-3.1.3.ESV-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571235" comment="dhcp-client-3.1.3.ESV-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571236" comment="dhcp-relay-3.1.3.ESV-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571237" comment="dhcp-server-3.1.3.ESV-0.23.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217044" version="1" class="patch">
	<metadata>
		<title>Security update for dhcpcd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="564441" ref_url="https://bugzilla.suse.com/564441" source="BUGZILLA"/>
		<reference ref_id="579438" ref_url="https://bugzilla.suse.com/579438" source="BUGZILLA"/>
		<reference ref_id="654649" ref_url="https://bugzilla.suse.com/654649" source="BUGZILLA"/>
		<reference ref_id="657402" ref_url="https://bugzilla.suse.com/657402" source="BUGZILLA"/>
		<reference ref_id="668194" ref_url="https://bugzilla.suse.com/668194" source="BUGZILLA"/>
		<reference ref_id="672038" ref_url="https://bugzilla.suse.com/672038" source="BUGZILLA"/>
		<reference ref_id="675052" ref_url="https://bugzilla.suse.com/675052" source="BUGZILLA"/>
		<reference ref_id="687850" ref_url="https://bugzilla.suse.com/687850" source="BUGZILLA"/>
		<reference ref_id="710758" ref_url="https://bugzilla.suse.com/710758" source="BUGZILLA"/>
		<reference ref_id="725856" ref_url="https://bugzilla.suse.com/725856" source="BUGZILLA"/>
		<reference ref_id="758227" ref_url="https://bugzilla.suse.com/758227" source="BUGZILLA"/>
		<reference ref_id="760334" ref_url="https://bugzilla.suse.com/760334" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-0996" ref_url="https://www.suse.com/security/cve/CVE-2011-0996/" source="CVE"/>
		<reference ref_id="CVE-2012-2152" ref_url="https://www.suse.com/security/cve/CVE-2012-2152/" source="CVE"/>
		<description>

A stack overflow in dhcpcd was fixed which could be used by network local 
attackers to crash the dhcpcd and so causing loss of DHCP functionality. 
(CVE-2012-2152)

Security Issue references:

    * CVE-2012-2152
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2152&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-05-18"/>
	<updated date="2012-05-18"/>
	<bugzilla href="https://bugzilla.suse.com/564441">SUSE bug 564441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/579438">SUSE bug 579438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/654649">SUSE bug 654649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/657402">SUSE bug 657402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/668194">SUSE bug 668194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/672038">SUSE bug 672038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/675052">SUSE bug 675052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/687850">SUSE bug 687850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/710758">SUSE bug 710758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/725856">SUSE bug 725856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758227">SUSE bug 758227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760334">SUSE bug 760334</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0996/">CVE-2011-0996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0996">CVE-2011-0996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2152/">CVE-2012-2152 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2152">CVE-2012-2152 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991368" comment="dhcpcd-3.2.3-44.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217045" version="1" class="patch">
	<metadata>
		<title>Security update for dhcpcd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="955762" ref_url="https://bugzilla.suse.com/955762" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6698" ref_url="https://www.suse.com/security/cve/CVE-2012-6698/" source="CVE"/>
		<reference ref_id="CVE-2012-6699" ref_url="https://www.suse.com/security/cve/CVE-2012-6699/" source="CVE"/>
		<reference ref_id="CVE-2012-6700" ref_url="https://www.suse.com/security/cve/CVE-2012-6700/" source="CVE"/>
		<description>
dhcpcd was updated to fix three security issues.

These security issues were fixed:
- CVE-2012-6698: A potential out of bounds write was fixed, which could lead to memory corruption, triggerable by network local attackers.
- CVE-2012-6699: A loop error was fixed that could lead out of bound reads, triggerable by network local attackers.
- CVE-2012-6700: An incorrect free could lead to crashes, triggerable by network local attackers.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/955762">SUSE bug 955762</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6698/">CVE-2012-6698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6698">CVE-2012-6698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6699/">CVE-2012-6699 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6699">CVE-2012-6699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6700/">CVE-2012-6700 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6700">CVE-2012-6700 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571239" comment="dhcpcd-3.2.3-45.5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217046" version="1" class="patch">
	<metadata>
		<title>Security update for dhcpv6</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="675052" ref_url="https://bugzilla.suse.com/675052" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-0997" ref_url="https://www.suse.com/security/cve/CVE-2011-0997/" source="CVE"/>
		<description>

A rogue DHCP server could instruct clients to use a host name that contains 
shell meta characters. Since many scripts in the system do not expect 
unusal characters in the system's host name the DHCP client needs to 
sanitize the host name offered by the server (CVE-2011-0997).

Security Issue reference:

    * CVE-2011-0997
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0997&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-04-01"/>
	<updated date="2011-04-01"/>
	<bugzilla href="https://bugzilla.suse.com/675052">SUSE bug 675052</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0997/">CVE-2011-0997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0997">CVE-2011-0997 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991369" comment="dhcpv6-1.0.22-3.21.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217047" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1146569" ref_url="https://bugzilla.suse.com/1146569" source="BUGZILLA"/>
		<reference ref_id="1146571" ref_url="https://bugzilla.suse.com/1146571" source="BUGZILLA"/>
		<reference ref_id="1146572" ref_url="https://bugzilla.suse.com/1146572" source="BUGZILLA"/>
		<reference ref_id="1146702" ref_url="https://bugzilla.suse.com/1146702" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15142" ref_url="https://www.suse.com/security/cve/CVE-2019-15142/" source="CVE"/>
		<reference ref_id="CVE-2019-15143" ref_url="https://www.suse.com/security/cve/CVE-2019-15143/" source="CVE"/>
		<reference ref_id="CVE-2019-15144" ref_url="https://www.suse.com/security/cve/CVE-2019-15144/" source="CVE"/>
		<reference ref_id="CVE-2019-15145" ref_url="https://www.suse.com/security/cve/CVE-2019-15145/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:

Security issues fixed:

- CVE-2019-15142: Fixed heap-based buffer over-read (bsc#1146702).
- CVE-2019-15143: Fixed resource exhaustion caused by corrupted image files (bsc#1146569).
- CVE-2019-15144: Fixed denial-of-service caused by crafted PBM image files (bsc#1146571).
- CVE-2019-15145: Fixed out-of-bounds read caused by corrupted JB2 image files (bsc#1146572).
- Fixed segfault when libtiff encounters corrupted TIFF (upstream issue #295).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1146569">SUSE bug 1146569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146571">SUSE bug 1146571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146572">SUSE bug 1146572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146702">SUSE bug 1146702</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15142/">CVE-2019-15142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15142">CVE-2019-15142 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15143/">CVE-2019-15143 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15143">CVE-2019-15143 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15144/">CVE-2019-15144 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15144">CVE-2019-15144 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15145/">CVE-2019-15145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15145">CVE-2019-15145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571241" comment="libdjvulibre21-3.5.21-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217048" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1156188" ref_url="https://bugzilla.suse.com/1156188" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18804" ref_url="https://www.suse.com/security/cve/CVE-2019-18804/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:
- CVE-2019-18804: Fixed a null pointer dereference (bsc#1156188).

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1156188">SUSE bug 1156188</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18804/">CVE-2019-18804 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18804">CVE-2019-18804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571242" comment="libdjvulibre21-3.5.21-3.6.10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217049" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1185900" ref_url="https://bugzilla.suse.com/1185900" source="BUGZILLA"/>
		<reference ref_id="1185904" ref_url="https://bugzilla.suse.com/1185904" source="BUGZILLA"/>
		<reference ref_id="1185905" ref_url="https://bugzilla.suse.com/1185905" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32491" ref_url="https://www.suse.com/security/cve/CVE-2021-32491/" source="CVE"/>
		<reference ref_id="CVE-2021-32492" ref_url="https://www.suse.com/security/cve/CVE-2021-32492/" source="CVE"/>
		<reference ref_id="CVE-2021-32493" ref_url="https://www.suse.com/security/cve/CVE-2021-32493/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:

Security issues fixed:

- CVE-2021-32491 [bsc#1185900]: Integer overflow in function render() in tools/ddjvu via crafted djvu file
- CVE-2021-32492 [bsc#1185904]: Out of bounds read in function DJVU:DataPool:has_data() via crafted djvu file
- CVE-2021-32493 [bsc#1185905]: Heap buffer overflow in function DJVU:GBitmap:decode() via crafted djvu file
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185900">SUSE bug 1185900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185904">SUSE bug 1185904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185905">SUSE bug 1185905</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32491/">CVE-2021-32491 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32491">CVE-2021-32491 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32492/">CVE-2021-32492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32492">CVE-2021-32492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32493/">CVE-2021-32493 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32493">CVE-2021-32493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571243" comment="libdjvulibre21-3.5.21-3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217050" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1186253" ref_url="https://bugzilla.suse.com/1186253" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3500" ref_url="https://www.suse.com/security/cve/CVE-2021-3500/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3500: Stack overflow in function DJVU:DjVuDocument:get_djvu_file() via crafted djvu file (bsc#1186253)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-31"/>
	<updated date="2021-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186253">SUSE bug 1186253</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3500/">CVE-2021-3500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3500">CVE-2021-3500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571244" comment="libdjvulibre21-3.5.21-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217051" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1187869" ref_url="https://bugzilla.suse.com/1187869" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3630" ref_url="https://www.suse.com/security/cve/CVE-2021-3630/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3630: out-of-bounds write in DJVU:DjVuTXT:decode() in DjVuText.cpp (bsc#1187869)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-02"/>
	<updated date="2021-07-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187869">SUSE bug 1187869</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3630/">CVE-2021-3630 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3630">CVE-2021-3630 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624088" comment="libdjvulibre21-3.5.21-3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217052" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1187869" ref_url="https://bugzilla.suse.com/1187869" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3630" ref_url="https://www.suse.com/security/cve/CVE-2021-3630/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:

- Extend CVE-2021-3630 fix (bsc#1187869).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-04"/>
	<updated date="2021-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187869">SUSE bug 1187869</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3630/">CVE-2021-3630 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3630">CVE-2021-3630 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627836" comment="libdjvulibre21-3.5.21-3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217053" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="928867" ref_url="https://bugzilla.suse.com/928867" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3294" ref_url="https://www.suse.com/security/cve/CVE-2015-3294/" source="CVE"/>
		<description>

The DNS server dnsmasq was updated to fix one security issue:

    * CVE-2015-3294: A remote unauthenticated attacker could have caused a
      denial of service (DoS) or read memory from the heap, potentially
      disclosing information such as performed DNS queries or encryption
      keys. (bsc#928867)

Security Issues:

    * CVE-2015-3294
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3294&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-01"/>
	<updated date="2015-05-01"/>
	<bugzilla href="https://bugzilla.suse.com/928867">SUSE bug 928867</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3294/">CVE-2015-3294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3294">CVE-2015-3294 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571245" comment="dnsmasq-2.45-12.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217054" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1060354" ref_url="https://bugzilla.suse.com/1060354" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14491" ref_url="https://www.suse.com/security/cve/CVE-2017-14491/" source="CVE"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2017-14491: DNS - 2 byte heap based overflow. [bsc#1060354]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-02"/>
	<updated date="2017-10-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060354">SUSE bug 1060354</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14491/">CVE-2017-14491 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14491">CVE-2017-14491 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571246" comment="dnsmasq-2.45-12.27.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217055" version="1" class="patch">
	<metadata>
		<title>Security update for e2fsprogs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="708243" ref_url="https://bugzilla.suse.com/708243" source="BUGZILLA"/>
		<reference ref_id="769256" ref_url="https://bugzilla.suse.com/769256" source="BUGZILLA"/>
		<reference ref_id="915402" ref_url="https://bugzilla.suse.com/915402" source="BUGZILLA"/>
		<reference ref_id="918346" ref_url="https://bugzilla.suse.com/918346" source="BUGZILLA"/>
		<reference ref_id="932539" ref_url="https://bugzilla.suse.com/932539" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0247" ref_url="https://www.suse.com/security/cve/CVE-2015-0247/" source="CVE"/>
		<reference ref_id="CVE-2015-1572" ref_url="https://www.suse.com/security/cve/CVE-2015-1572/" source="CVE"/>
		<description>

Two security issues were fixed in e2fsprogs:

    * CVE-2015-0247: Various heap overflows were fixed in e2fsprogs (fsck,
      dumpe2fs, e2image).
    * CVE-2015-1572: Fixed a potential buffer overflow in closefs().
      (bsc#918346)

Additionally, the following bugs were fixed:

    * badblocks was enhanced to work with very large partitions.
      (bsc#932539)
    * e2fsck was fixed to mark sparse journals as invalid. (bnc#769256)
    * dumpe2fs usage on mounted filesystems was clarified. (bnc#708243)

Security Issues:

    * CVE-2015-0247
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0247&gt;
    * CVE-2015-1572
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1572&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-29"/>
	<updated date="2015-06-29"/>
	<bugzilla href="https://bugzilla.suse.com/708243">SUSE bug 708243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769256">SUSE bug 769256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915402">SUSE bug 915402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918346">SUSE bug 918346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932539">SUSE bug 932539</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-0247/">CVE-2015-0247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0247">CVE-2015-0247 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-1572/">CVE-2015-1572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1572">CVE-2015-1572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571247" comment="e2fsprogs-1.41.9-2.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571248" comment="libblkid1-2.16-6.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571249" comment="libcom_err2-1.41.9-2.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571250" comment="libcom_err2-32bit-1.41.9-2.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571251" comment="libext2fs2-1.41.9-2.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571252" comment="libuuid1-2.16-6.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571253" comment="libuuid1-32bit-2.16-6.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571254" comment="uuid-runtime-2.16-6.21.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217056" version="1" class="patch">
	<metadata>
		<title>Security update for e2fsprogs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1160571" ref_url="https://bugzilla.suse.com/1160571" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5188" ref_url="https://www.suse.com/security/cve/CVE-2019-5188/" source="CVE"/>
		<description>
This update for e2fsprogs fixes the following issues:

- CVE-2019-5188: Fixed a code execution vulnerability in the directory rehashing functionality (bsc#1160571).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-05"/>
	<updated date="2020-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1160571">SUSE bug 1160571</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5188/">CVE-2019-5188 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5188">CVE-2019-5188 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571255" comment="e2fsprogs-1.41.9-2.6.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571256" comment="libcom_err2-1.41.9-2.6.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571257" comment="libcom_err2-32bit-1.41.9-2.6.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571258" comment="libext2fs2-1.41.9-2.6.4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217057" version="1" class="patch">
	<metadata>
		<title>Security update for ecryptfs-utils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="709771" ref_url="https://bugzilla.suse.com/709771" source="BUGZILLA"/>
		<reference ref_id="735342" ref_url="https://bugzilla.suse.com/735342" source="BUGZILLA"/>
		<reference ref_id="745372" ref_url="https://bugzilla.suse.com/745372" source="BUGZILLA"/>
		<reference ref_id="745581" ref_url="https://bugzilla.suse.com/745581" source="BUGZILLA"/>
		<reference ref_id="745584" ref_url="https://bugzilla.suse.com/745584" source="BUGZILLA"/>
		<reference ref_id="745825" ref_url="https://bugzilla.suse.com/745825" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1831" ref_url="https://www.suse.com/security/cve/CVE-2011-1831/" source="CVE"/>
		<reference ref_id="CVE-2011-1832" ref_url="https://www.suse.com/security/cve/CVE-2011-1832/" source="CVE"/>
		<reference ref_id="CVE-2011-1833" ref_url="https://www.suse.com/security/cve/CVE-2011-1833/" source="CVE"/>
		<reference ref_id="CVE-2011-1834" ref_url="https://www.suse.com/security/cve/CVE-2011-1834/" source="CVE"/>
		<reference ref_id="CVE-2011-1835" ref_url="https://www.suse.com/security/cve/CVE-2011-1835/" source="CVE"/>
		<reference ref_id="CVE-2011-1836" ref_url="https://www.suse.com/security/cve/CVE-2011-1836/" source="CVE"/>
		<reference ref_id="CVE-2011-1837" ref_url="https://www.suse.com/security/cve/CVE-2011-1837/" source="CVE"/>
		<reference ref_id="CVE-2011-3145" ref_url="https://www.suse.com/security/cve/CVE-2011-3145/" source="CVE"/>
		<description>

ecryptfs-utils was updated to fix a security issue and some bugs.

Security issue fixed: mount.ecryptfs_private did not set correct group 
ownerships when it modifies mtab (CVE-2011-3145).

Also some bugs that made this set of tools non-working were fixed.

You need to manually hand setuid root permissions to 
/sbin/mount.ecryptfs_private if you want to use it as a non-root user.

Security Issues:

    * CVE-2011-3145
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3145&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-04-20"/>
	<updated date="2012-04-20"/>
	<bugzilla href="https://bugzilla.suse.com/709771">SUSE bug 709771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/735342">SUSE bug 735342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745372">SUSE bug 745372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745581">SUSE bug 745581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745584">SUSE bug 745584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745825">SUSE bug 745825</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1831/">CVE-2011-1831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1831">CVE-2011-1831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1832/">CVE-2011-1832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1832">CVE-2011-1832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1833/">CVE-2011-1833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1833">CVE-2011-1833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1834/">CVE-2011-1834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1834">CVE-2011-1834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1835/">CVE-2011-1835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1835">CVE-2011-1835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1836/">CVE-2011-1836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1836">CVE-2011-1836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1837/">CVE-2011-1837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1837">CVE-2011-1837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3145/">CVE-2011-3145 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3145">CVE-2011-3145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991370" comment="ecryptfs-utils-61-1.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991371" comment="ecryptfs-utils-32bit-61-1.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217058" version="1" class="patch">
	<metadata>
		<title>Security update for ecryptfs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="920160" ref_url="https://bugzilla.suse.com/920160" source="BUGZILLA"/>
		<reference ref_id="962052" ref_url="https://bugzilla.suse.com/962052" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9687" ref_url="https://www.suse.com/security/cve/CVE-2014-9687/" source="CVE"/>
		<reference ref_id="CVE-2016-1572" ref_url="https://www.suse.com/security/cve/CVE-2016-1572/" source="CVE"/>
		<description>

This update for ecryptfs-utils fixes the following issues:

- CVE-2016-1572: A local user could have escalated privileges by mounting over special filesystems (bsc#962052)
- CVE-2014-9687: A default salt value reduced complexity of offline precomputation attacks (bsc#920160)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-30"/>
	<updated date="2016-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/920160">SUSE bug 920160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962052">SUSE bug 962052</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9687/">CVE-2014-9687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9687">CVE-2014-9687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1572/">CVE-2016-1572 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1572">CVE-2016-1572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571262" comment="ecryptfs-utils-61-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566408" comment="ecryptfs-utils-32bit-61-1.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217059" version="1" class="patch">
	<metadata>
		<title>Security update for ed</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="474587" ref_url="https://bugzilla.suse.com/474587" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-3916" ref_url="https://www.suse.com/security/cve/CVE-2008-3916/" source="CVE"/>
		<description>

This update fixes a heap-based buffer overflow in ed which can be exploited 
remotely only with user-assistance. CVE-2008-3916: CVSS v2 Base Score: 9.3 
(HIGH) (AV:N/AC:M/Au:N/C:C/I:C/A:C): Buffer Errors (CWE-119)

Security Issue reference:

    * CVE-2008-3916
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3916&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-01-11"/>
	<updated date="2011-01-11"/>
	<bugzilla href="https://bugzilla.suse.com/474587">SUSE bug 474587</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3916/">CVE-2008-3916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3916">CVE-2008-3916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991372" comment="ed-0.2-1001.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217060" version="1" class="patch">
	<metadata>
		<title>Security update for ed (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1019807" ref_url="https://bugzilla.suse.com/1019807" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5357" ref_url="https://www.suse.com/security/cve/CVE-2017-5357/" source="CVE"/>
		<description>

This update for ed fixes the following security issues:

- CVE-2017-5357: An invalid free in the regular expression handling
  of the 'ed' command processing could allow local users to crash ed. (bsc#1019807)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1019807">SUSE bug 1019807</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5357/">CVE-2017-5357 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5357">CVE-2017-5357 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571264" comment="ed-0.2-1001.30.3.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217061" version="1" class="patch">
	<metadata>
		<title>Security update for elfutils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="911662" ref_url="https://bugzilla.suse.com/911662" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9447" ref_url="https://www.suse.com/security/cve/CVE-2014-9447/" source="CVE"/>
		<description>

elfutils has been updated to fix one security issue:

    * CVE-2014-9447: Directory traversal vulnerability in the
      read_long_names function in libelf/elf_begin.c in elfutils 0.152 and
      0.161 allowed remote attackers to write to arbitrary files to the
      root directory via a / (slash) in a crafted archive, as demonstrated
      using the ar program (bnc#911662).

Security Issues:

    * CVE-2014-9447
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9447&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-18"/>
	<updated date="2015-02-18"/>
	<bugzilla href="https://bugzilla.suse.com/911662">SUSE bug 911662</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9447/">CVE-2014-9447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9447">CVE-2014-9447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009430164" comment="elfutils-0.137-8.24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009430165" comment="libasm1-0.137-8.24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009430166" comment="libasm1-32bit-0.137-8.24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009430167" comment="libdw1-0.137-8.24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009430168" comment="libdw1-32bit-0.137-8.24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009430169" comment="libebl1-0.137-8.24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009430170" comment="libebl1-32bit-0.137-8.24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009430171" comment="libelf1-0.137-8.24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009430172" comment="libelf1-32bit-0.137-8.24.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217062" version="1" class="patch">
	<metadata>
		<title>Security update for elfutils (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1030472" ref_url="https://bugzilla.suse.com/1030472" source="BUGZILLA"/>
		<reference ref_id="1030476" ref_url="https://bugzilla.suse.com/1030476" source="BUGZILLA"/>
		<reference ref_id="1033084" ref_url="https://bugzilla.suse.com/1033084" source="BUGZILLA"/>
		<reference ref_id="1033087" ref_url="https://bugzilla.suse.com/1033087" source="BUGZILLA"/>
		<reference ref_id="1033088" ref_url="https://bugzilla.suse.com/1033088" source="BUGZILLA"/>
		<reference ref_id="1033089" ref_url="https://bugzilla.suse.com/1033089" source="BUGZILLA"/>
		<reference ref_id="1106390" ref_url="https://bugzilla.suse.com/1106390" source="BUGZILLA"/>
		<reference ref_id="1107067" ref_url="https://bugzilla.suse.com/1107067" source="BUGZILLA"/>
		<reference ref_id="1111973" ref_url="https://bugzilla.suse.com/1111973" source="BUGZILLA"/>
		<reference ref_id="1112723" ref_url="https://bugzilla.suse.com/1112723" source="BUGZILLA"/>
		<reference ref_id="1112726" ref_url="https://bugzilla.suse.com/1112726" source="BUGZILLA"/>
		<reference ref_id="1123685" ref_url="https://bugzilla.suse.com/1123685" source="BUGZILLA"/>
		<reference ref_id="1125007" ref_url="https://bugzilla.suse.com/1125007" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10254" ref_url="https://www.suse.com/security/cve/CVE-2016-10254/" source="CVE"/>
		<reference ref_id="CVE-2016-10255" ref_url="https://www.suse.com/security/cve/CVE-2016-10255/" source="CVE"/>
		<reference ref_id="CVE-2017-7607" ref_url="https://www.suse.com/security/cve/CVE-2017-7607/" source="CVE"/>
		<reference ref_id="CVE-2017-7610" ref_url="https://www.suse.com/security/cve/CVE-2017-7610/" source="CVE"/>
		<reference ref_id="CVE-2017-7611" ref_url="https://www.suse.com/security/cve/CVE-2017-7611/" source="CVE"/>
		<reference ref_id="CVE-2017-7612" ref_url="https://www.suse.com/security/cve/CVE-2017-7612/" source="CVE"/>
		<reference ref_id="CVE-2018-16062" ref_url="https://www.suse.com/security/cve/CVE-2018-16062/" source="CVE"/>
		<reference ref_id="CVE-2018-16403" ref_url="https://www.suse.com/security/cve/CVE-2018-16403/" source="CVE"/>
		<reference ref_id="CVE-2018-18310" ref_url="https://www.suse.com/security/cve/CVE-2018-18310/" source="CVE"/>
		<reference ref_id="CVE-2018-18520" ref_url="https://www.suse.com/security/cve/CVE-2018-18520/" source="CVE"/>
		<reference ref_id="CVE-2018-18521" ref_url="https://www.suse.com/security/cve/CVE-2018-18521/" source="CVE"/>
		<reference ref_id="CVE-2019-7150" ref_url="https://www.suse.com/security/cve/CVE-2019-7150/" source="CVE"/>
		<reference ref_id="CVE-2019-7665" ref_url="https://www.suse.com/security/cve/CVE-2019-7665/" source="CVE"/>
		<description>
This update for elfutils fixes the following issues:

Security issues fixed:

- CVE-2018-16403:Fixed a heap-based buffer over-read in in libdw/dwarf_getabbrev.c 
  and libwd/dwarf_hasattr.c which could have lead to denial of service (bsc#1107067).
- CVE-2016-10254: Fixed a memory allocation failure in alloxate_elf (bsc#1030472). 
- CVE-2016-10255: Fixed a memory allocation failure in libelf_set_rawdata_wrlock (bsc#1030476).
- CVE-2019-7665: NT_PLATFORM core file note should be a zero terminated string (bsc#1125007).
- CVE-2019-7150: Added a missing check in dwfl_segment_report_module which could have allowed truncated files
  to be read (bsc#1123685).
- CVE-2018-16062: Fixed a heap-buffer-overflow (bsc#1106390).
- CVE-2017-7611: Fixed a heap-based buffer over-read that could have led to Denial of Service (bsc#1033088).
- CVE-2017-7607: Fixed a heap-based buffer overflow in handle_gnu_hash (bsc#1033084).
- CVE-2017-7610: Fixed a heap-based buffer overflow in check_group (bsc#1033087).
- CVE-2018-18521: Fixed multiple divide-by-zero vulnerabilities in function arlib_add_symbols() (bsc#1112723).
- CVE-2017-7612: Fixed a denial of service in check_sysv_hash() via a crafted ELF file (bsc#1033089).
- CVE-2018-18310: Fixed an invalid address read in dwfl_segment_report_module.c (bsc#1111973).
- CVE-2018-18520: Fixed bad handling of ar files inside are files (bsc#1112726).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-11"/>
	<updated date="2019-06-11"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1030472">SUSE bug 1030472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030476">SUSE bug 1030476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033084">SUSE bug 1033084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033087">SUSE bug 1033087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033088">SUSE bug 1033088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033089">SUSE bug 1033089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106390">SUSE bug 1106390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107067">SUSE bug 1107067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111973">SUSE bug 1111973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112723">SUSE bug 1112723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112726">SUSE bug 1112726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123685">SUSE bug 1123685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125007">SUSE bug 1125007</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10254/">CVE-2016-10254 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10254">CVE-2016-10254 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10255/">CVE-2016-10255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10255">CVE-2016-10255 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7607/">CVE-2017-7607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7607">CVE-2017-7607 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7610/">CVE-2017-7610 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7610">CVE-2017-7610 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7611/">CVE-2017-7611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7611">CVE-2017-7611 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7612/">CVE-2017-7612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7612">CVE-2017-7612 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16062/">CVE-2018-16062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16062">CVE-2018-16062 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16403/">CVE-2018-16403 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16403">CVE-2018-16403 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18310/">CVE-2018-18310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18310">CVE-2018-18310 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18520/">CVE-2018-18520 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18520">CVE-2018-18520 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18521/">CVE-2018-18521 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18521">CVE-2018-18521 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7150/">CVE-2019-7150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7150">CVE-2019-7150 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7665/">CVE-2019-7665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7665">CVE-2019-7665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571265" comment="elfutils-0.137-8.24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571266" comment="libasm1-0.137-8.24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571267" comment="libasm1-32bit-0.137-8.24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571268" comment="libdw1-0.137-8.24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571269" comment="libdw1-32bit-0.137-8.24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571270" comment="libebl1-0.137-8.24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571271" comment="libebl1-32bit-0.137-8.24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571272" comment="libelf1-0.137-8.24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571273" comment="libelf1-32bit-0.137-8.24.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217063" version="1" class="patch">
	<metadata>
		<title>Recommended update for Emacs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="632425" ref_url="https://bugzilla.suse.com/632425" source="BUGZILLA"/>
		<reference ref_id="854683" ref_url="https://bugzilla.suse.com/854683" source="BUGZILLA"/>
		<reference ref_id="876847" ref_url="https://bugzilla.suse.com/876847" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3421" ref_url="https://www.suse.com/security/cve/CVE-2014-3421/" source="CVE"/>
		<reference ref_id="CVE-2014-3422" ref_url="https://www.suse.com/security/cve/CVE-2014-3422/" source="CVE"/>
		<reference ref_id="CVE-2014-3423" ref_url="https://www.suse.com/security/cve/CVE-2014-3423/" source="CVE"/>
		<reference ref_id="CVE-2014-3424" ref_url="https://www.suse.com/security/cve/CVE-2014-3424/" source="CVE"/>
		<description>

This update fixes an issue in Emacs where it doesn't show all menu items 
properly when using the mouse for selecting the menus from the menu bar 
(bnc#643425).

		</description>
<advisory from="security@suse.de">
	<issued date="2011-09-20"/>
	<updated date="2011-09-20"/>
	<bugzilla href="https://bugzilla.suse.com/632425">SUSE bug 632425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854683">SUSE bug 854683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876847">SUSE bug 876847</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3421/">CVE-2014-3421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3421">CVE-2014-3421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3422/">CVE-2014-3422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3422">CVE-2014-3422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3423/">CVE-2014-3423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3423">CVE-2014-3423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3424/">CVE-2014-3424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3424">CVE-2014-3424 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991373" comment="emacs-22.3-4.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991374" comment="emacs-el-22.3-4.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991375" comment="emacs-info-22.3-4.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991376" comment="emacs-nox-22.3-4.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991377" comment="emacs-x11-22.3-4.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217064" version="1" class="patch">
	<metadata>
		<title>Security update for emacs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1058425" ref_url="https://bugzilla.suse.com/1058425" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14482" ref_url="https://www.suse.com/security/cve/CVE-2017-14482/" source="CVE"/>
		<description>
This update for emacs fixes one issues.

This security issue was fixed:

- CVE-2017-14482: Remote code execution via mails with 'Content-Type: text/enriched' (bsc#1058425)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-20"/>
	<updated date="2017-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1058425">SUSE bug 1058425</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14482/">CVE-2017-14482 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14482">CVE-2017-14482 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571274" comment="emacs-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571275" comment="emacs-el-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571276" comment="emacs-info-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571277" comment="emacs-nox-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571278" comment="emacs-x11-22.3-42.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217065" version="1" class="patch">
	<metadata>
		<title>Security update for evince</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="660558" ref_url="https://bugzilla.suse.com/660558" source="BUGZILLA"/>
		<reference ref_id="671064" ref_url="https://bugzilla.suse.com/671064" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2640" ref_url="https://www.suse.com/security/cve/CVE-2010-2640/" source="CVE"/>
		<reference ref_id="CVE-2010-2641" ref_url="https://www.suse.com/security/cve/CVE-2010-2641/" source="CVE"/>
		<reference ref_id="CVE-2010-2642" ref_url="https://www.suse.com/security/cve/CVE-2010-2642/" source="CVE"/>
		<reference ref_id="CVE-2010-2643" ref_url="https://www.suse.com/security/cve/CVE-2010-2643/" source="CVE"/>
		<reference ref_id="CVE-2011-0433" ref_url="https://www.suse.com/security/cve/CVE-2011-0433/" source="CVE"/>
		<description>

This update of evince fixes a buffer overflow in linetoken(). 
(CVE-2011-0433)

Security Issue reference:

    * CVE-2011-0433
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0433&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-03-17"/>
	<updated date="2011-03-17"/>
	<bugzilla href="https://bugzilla.suse.com/660558">SUSE bug 660558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/671064">SUSE bug 671064</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2640/">CVE-2010-2640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2640">CVE-2010-2640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2641/">CVE-2010-2641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2641">CVE-2010-2641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2642/">CVE-2010-2642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2642">CVE-2010-2642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2643/">CVE-2010-2643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2643">CVE-2010-2643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0433/">CVE-2011-0433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0433">CVE-2011-0433 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991378" comment="evince-2.28.2-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991379" comment="evince-doc-2.28.2-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991380" comment="evince-lang-2.28.2-0.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217066" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1070046" ref_url="https://bugzilla.suse.com/1070046" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000159" ref_url="https://www.suse.com/security/cve/CVE-2017-1000159/" source="CVE"/>
		<description>
This update for evince provides the following fix:

- CVE-2017-1000159: Prevent command line injections via filenames when printing to a file. (bsc#1070046)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-08"/>
	<updated date="2018-03-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1070046">SUSE bug 1070046</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000159/">CVE-2017-1000159 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000159">CVE-2017-1000159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571282" comment="evince-2.28.2-0.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571283" comment="evince-doc-2.28.2-0.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571284" comment="evince-lang-2.28.2-0.7.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217067" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1133037" ref_url="https://bugzilla.suse.com/1133037" source="BUGZILLA"/>
		<reference ref_id="1141619" ref_url="https://bugzilla.suse.com/1141619" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010006" ref_url="https://www.suse.com/security/cve/CVE-2019-1010006/" source="CVE"/>
		<reference ref_id="CVE-2019-11459" ref_url="https://www.suse.com/security/cve/CVE-2019-11459/" source="CVE"/>
		<description>
This update for evince fixes the following issues:

Security issues fixed: 	  

- CVE-2019-11459: Fixed an improper error handling in which could have led to use of uninitialized use of memory (bsc#1133037).	  
- CVE-2019-1010006: Fixed a buffer overflow in backend/tiff/tiff-document.c (bsc#1141619).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-07"/>
	<updated date="2019-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133037">SUSE bug 1133037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141619">SUSE bug 1141619</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010006/">CVE-2019-1010006 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010006">CVE-2019-1010006 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11459/">CVE-2019-11459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11459">CVE-2019-11459 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571285" comment="evince-2.28.2-0.7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571286" comment="evince-doc-2.28.2-0.7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571287" comment="evince-lang-2.28.2-0.7.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217068" version="1" class="patch">
	<metadata>
		<title>Security update for exempi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1085295" ref_url="https://bugzilla.suse.com/1085295" source="BUGZILLA"/>
		<reference ref_id="1085585" ref_url="https://bugzilla.suse.com/1085585" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18234" ref_url="https://www.suse.com/security/cve/CVE-2017-18234/" source="CVE"/>
		<reference ref_id="CVE-2018-7730" ref_url="https://www.suse.com/security/cve/CVE-2018-7730/" source="CVE"/>
		<description>
This update for exempi fixes the following issues:

Security issue fixed:

- CVE-2018-7730: Fix heap-based buffer overflow in XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp (bsc#1085295).
- CVE-2017-18234: Fix use-after-free issue that allows remote attackers to cause a denial of service via a .pdf file (bsc#1085585).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-26"/>
	<updated date="2018-07-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085295">SUSE bug 1085295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18234/">CVE-2017-18234 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18234">CVE-2017-18234 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7730/">CVE-2018-7730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7730">CVE-2018-7730 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571288" comment="libexempi3-2.0.2-4.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217069" version="1" class="patch">
	<metadata>
		<title>Security update for expat</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="750914" ref_url="https://bugzilla.suse.com/750914" source="BUGZILLA"/>
		<reference ref_id="751464" ref_url="https://bugzilla.suse.com/751464" source="BUGZILLA"/>
		<reference ref_id="751465" ref_url="https://bugzilla.suse.com/751465" source="BUGZILLA"/>
		<reference ref_id="755377" ref_url="https://bugzilla.suse.com/755377" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2012-1147" ref_url="https://www.suse.com/security/cve/CVE-2012-1147/" source="CVE"/>
		<reference ref_id="CVE-2012-1148" ref_url="https://www.suse.com/security/cve/CVE-2012-1148/" source="CVE"/>
		<description>

This update of expat fixes the following bugs:

    * hash collision attack that could lead to exessive CPU usage
      (CVE-2012-0876)
    * expat didn't close file descriptors in some cases (CVE-2012-1147)
    * specially crafted xml files could lead to a memory leak
      (CVE-2012-1148)

Security Issue references:

    * CVE-2012-0876
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0876&gt;
    * CVE-2012-1147
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1147&gt;
    * CVE-2012-1148
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1148&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-04-24"/>
	<updated date="2012-04-24"/>
	<bugzilla href="https://bugzilla.suse.com/750914">SUSE bug 750914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751464">SUSE bug 751464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751465">SUSE bug 751465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/755377">SUSE bug 755377</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0876">CVE-2012-0876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1147/">CVE-2012-1147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1147">CVE-2012-1147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1148/">CVE-2012-1148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1148">CVE-2012-1148 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991381" comment="expat-2.0.1-88.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991382" comment="libexpat1-2.0.1-88.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991383" comment="libexpat1-32bit-2.0.1-88.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217070" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="979441" ref_url="https://bugzilla.suse.com/979441" source="BUGZILLA"/>
		<reference ref_id="980391" ref_url="https://bugzilla.suse.com/980391" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1283" ref_url="https://www.suse.com/security/cve/CVE-2015-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<description>

This update for expat fixes the following issues: 

Security issue fixed:
- CVE-2016-0718: Fix Expat XML parser that mishandles certain kinds of malformed input documents. (bsc#979441)
- CVE-2015-1283: Fix multiple integer overflows. (bnc#980391)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-07"/>
	<updated date="2016-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979441">SUSE bug 979441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980391">SUSE bug 980391</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1283/">CVE-2015-1283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1283">CVE-2015-1283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0718">CVE-2016-0718 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571293" comment="expat-2.0.1-88.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571294" comment="libexpat1-2.0.1-88.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571295" comment="libexpat1-32bit-2.0.1-88.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217071" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1022037" ref_url="https://bugzilla.suse.com/1022037" source="BUGZILLA"/>
		<reference ref_id="983215" ref_url="https://bugzilla.suse.com/983215" source="BUGZILLA"/>
		<reference ref_id="983216" ref_url="https://bugzilla.suse.com/983216" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6702" ref_url="https://www.suse.com/security/cve/CVE-2012-6702/" source="CVE"/>
		<reference ref_id="CVE-2016-5300" ref_url="https://www.suse.com/security/cve/CVE-2016-5300/" source="CVE"/>
		<description>

This update for expat fixes the following security issues:

- CVE-2012-6702: Expat, when used in a parser that has not
  called XML_SetHashSalt or passed it a seed of 0, made it easier for
  context-dependent attackers to defeat cryptographic protection mechanisms
  via vectors involving use of the srand function.  (bsc#983215)
- CVE-2016-5300: The XML parser in Expat did not use sufficient entropy
  for hash initialization, which allowed context-dependent attackers to
  cause a denial of service (CPU consumption) via crafted identifiers in
  an XML document. NOTE: this vulnerability exists because of an incomplete
  fix for CVE-2012-0876.  (bsc#983216)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-07"/>
	<updated date="2017-02-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022037">SUSE bug 1022037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983215">SUSE bug 983215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983216">SUSE bug 983216</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6702/">CVE-2012-6702 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6702">CVE-2012-6702 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5300/">CVE-2016-5300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5300">CVE-2016-5300 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571296" comment="expat-2.0.1-88.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571297" comment="libexpat1-2.0.1-88.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571298" comment="libexpat1-32bit-2.0.1-88.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217072" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1047236" ref_url="https://bugzilla.suse.com/1047236" source="BUGZILLA"/>
		<reference ref_id="1047240" ref_url="https://bugzilla.suse.com/1047240" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- CVE-2016-9063: Possible integer overflow to fix inside XML_Parse leading to unexpected behaviour (bsc#1047240)
- CVE-2017-9233: External Entity Vulnerability could lead to denial of service (bsc#1047236)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-06"/>
	<updated date="2017-09-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047236">SUSE bug 1047236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047240">SUSE bug 1047240</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9063">CVE-2016-9063 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9233">CVE-2017-9233 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571299" comment="expat-2.0.1-88.42.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571300" comment="libexpat1-2.0.1-88.42.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571301" comment="libexpat1-32bit-2.0.1-88.42.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217073" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1139937" ref_url="https://bugzilla.suse.com/1139937" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20843" ref_url="https://www.suse.com/security/cve/CVE-2018-20843/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

Security issue fixed:

- CVE-2018-20843: Fixed a denial of service triggered by high resource consumption 
  in the XML parser when XML names contain a large amount of colons (bsc#1139937).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-12"/>
	<updated date="2019-07-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1139937">SUSE bug 1139937</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20843/">CVE-2018-20843 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20843">CVE-2018-20843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571302" comment="expat-2.0.1-88.42.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571303" comment="libexpat1-2.0.1-88.42.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571304" comment="libexpat1-32bit-2.0.1-88.42.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217074" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1149429" ref_url="https://bugzilla.suse.com/1149429" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

Security issue fixed:

- CVE-2019-15903: Fixed a heap-based buffer over-read caused by crafted XML documents. (bsc#1149429)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149429">SUSE bug 1149429</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571305" comment="expat-2.0.1-88.42.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571306" comment="libexpat1-2.0.1-88.42.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571307" comment="libexpat1-32bit-2.0.1-88.42.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217075" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1194251" ref_url="https://bugzilla.suse.com/1194251" source="BUGZILLA"/>
		<reference ref_id="1194362" ref_url="https://bugzilla.suse.com/1194362" source="BUGZILLA"/>
		<reference ref_id="1194474" ref_url="https://bugzilla.suse.com/1194474" source="BUGZILLA"/>
		<reference ref_id="1194476" ref_url="https://bugzilla.suse.com/1194476" source="BUGZILLA"/>
		<reference ref_id="1194477" ref_url="https://bugzilla.suse.com/1194477" source="BUGZILLA"/>
		<reference ref_id="1194478" ref_url="https://bugzilla.suse.com/1194478" source="BUGZILLA"/>
		<reference ref_id="1194479" ref_url="https://bugzilla.suse.com/1194479" source="BUGZILLA"/>
		<reference ref_id="1194480" ref_url="https://bugzilla.suse.com/1194480" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45960" ref_url="https://www.suse.com/security/cve/CVE-2021-45960/" source="CVE"/>
		<reference ref_id="CVE-2021-46143" ref_url="https://www.suse.com/security/cve/CVE-2021-46143/" source="CVE"/>
		<reference ref_id="CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822/" source="CVE"/>
		<reference ref_id="CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823/" source="CVE"/>
		<reference ref_id="CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824/" source="CVE"/>
		<reference ref_id="CVE-2022-22825" ref_url="https://www.suse.com/security/cve/CVE-2022-22825/" source="CVE"/>
		<reference ref_id="CVE-2022-22826" ref_url="https://www.suse.com/security/cve/CVE-2022-22826/" source="CVE"/>
		<reference ref_id="CVE-2022-22827" ref_url="https://www.suse.com/security/cve/CVE-2022-22827/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- CVE-2021-45960: Fixed left shift in the storeAtts function in xmlparse.c that can lead to realloc misbehavior (bsc#1194251).
- CVE-2021-46143: Fixed integer overflow in m_groupSize in doProlog (bsc#1194362).
- CVE-2022-22822: Fixed integer overflow in addBinding in xmlparse.c (bsc#1194474).
- CVE-2022-22823: Fixed integer overflow in build_model in xmlparse.c (bsc#1194476).
- CVE-2022-22824: Fixed integer overflow in defineAttribute in xmlparse.c (bsc#1194477).
- CVE-2022-22825: Fixed integer overflow in lookup in xmlparse.c (bsc#1194478).
- CVE-2022-22826: Fixed integer overflow in nextScaffoldPart in xmlparse.c (bsc#1194479).
- CVE-2022-22827: Fixed integer overflow in storeAtts in xmlparse.c (bsc#1194480).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194251">SUSE bug 1194251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194362">SUSE bug 1194362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194474">SUSE bug 1194474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194476">SUSE bug 1194476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194477">SUSE bug 1194477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194478">SUSE bug 1194478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194479">SUSE bug 1194479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194480">SUSE bug 1194480</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45960/">CVE-2021-45960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45960">CVE-2021-45960 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46143/">CVE-2021-46143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46143">CVE-2021-46143 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22822">CVE-2022-22822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22823">CVE-2022-22823 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22824">CVE-2022-22824 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22825/">CVE-2022-22825 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22825">CVE-2022-22825 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22826/">CVE-2022-22826 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22826">CVE-2022-22826 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22827/">CVE-2022-22827 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22827">CVE-2022-22827 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664120" comment="expat-2.0.1-88.42.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664121" comment="libexpat1-2.0.1-88.42.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664122" comment="libexpat1-32bit-2.0.1-88.42.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217076" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1195054" ref_url="https://bugzilla.suse.com/1195054" source="BUGZILLA"/>
		<reference ref_id="1195217" ref_url="https://bugzilla.suse.com/1195217" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852/" source="CVE"/>
		<reference ref_id="CVE-2022-23990" ref_url="https://www.suse.com/security/cve/CVE-2022-23990/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-23852: Fixed signed integer overflow in XML_GetBuffer (bsc#1195054).
- CVE-2022-23990: Fixed integer overflow in the doProlog function (bsc#1195217).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-09"/>
	<updated date="2022-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195054">SUSE bug 1195054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195217">SUSE bug 1195217</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23852">CVE-2022-23852 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23990/">CVE-2022-23990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23990">CVE-2022-23990 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666458" comment="expat-2.0.1-88.42.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666459" comment="libexpat1-2.0.1-88.42.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666460" comment="libexpat1-32bit-2.0.1-88.42.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217077" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196026" ref_url="https://bugzilla.suse.com/1196026" source="BUGZILLA"/>
		<reference ref_id="1196168" ref_url="https://bugzilla.suse.com/1196168" source="BUGZILLA"/>
		<reference ref_id="1196169" ref_url="https://bugzilla.suse.com/1196169" source="BUGZILLA"/>
		<reference ref_id="1196171" ref_url="https://bugzilla.suse.com/1196171" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313/" source="CVE"/>
		<reference ref_id="CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-25236: Fixed possible namespace-separator characters insertion into namespace URIs (bsc#1196025).
- CVE-2022-25235: Fixed UTF-8 character validation in a certain context (bsc#1196026).
- CVE-2022-25313: Fixed stack exhaustion in build_model() via uncontrolled recursion (bsc#1196168).
- CVE-2022-25314: Fixed integer overflow in copyString (bsc#1196169).
- CVE-2022-25315: Fixed integer overflow in storeRawNames (bsc#1196171).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196026">SUSE bug 1196026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196168">SUSE bug 1196168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196169">SUSE bug 1196169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196171">SUSE bug 1196171</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">CVE-2022-25235 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25313">CVE-2022-25313 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25314">CVE-2022-25314 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25315">CVE-2022-25315 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669483" comment="expat-2.0.1-88.42.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669484" comment="libexpat1-2.0.1-88.42.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669485" comment="libexpat1-32bit-2.0.1-88.42.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217078" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196784" ref_url="https://bugzilla.suse.com/1196784" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- Fixed a regression caused by the patch for CVE-2022-25236 (bsc#1196784).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-31"/>
	<updated date="2022-03-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196784">SUSE bug 1196784</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671290" comment="expat-2.0.1-88.42.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671291" comment="libexpat1-2.0.1-88.42.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671292" comment="libexpat1-32bit-2.0.1-88.42.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217079" version="1" class="patch">
	<metadata>
		<title>Security update for facter (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="917383" ref_url="https://bugzilla.suse.com/917383" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1426" ref_url="https://www.suse.com/security/cve/CVE-2015-1426/" source="CVE"/>
		<description>
This update for facter fixes the following issues:

- CVE-2015-1426: Prevent the EC2 metadata fact from collecting security credentials (bsc#917383).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-28"/>
	<updated date="2020-05-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/917383">SUSE bug 917383</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1426/">CVE-2015-1426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1426">CVE-2015-1426 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571308" comment="facter-1.6.18-0.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217080" version="1" class="patch">
	<metadata>
		<title>Security update for fastjar</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="607043" ref_url="https://bugzilla.suse.com/607043" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0831" ref_url="https://www.suse.com/security/cve/CVE-2010-0831/" source="CVE"/>
		<description>

This fastjar update fixes a directory traversal issue (bnc#607043).

Security Issue reference:

    * CVE-2010-0831
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0831&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/607043">SUSE bug 607043</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0831/">CVE-2010-0831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0831">CVE-2010-0831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571309" comment="fastjar-0.95-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217081" version="1" class="patch">
	<metadata>
		<title>Recommended update for fetchmail</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="669557" ref_url="https://bugzilla.suse.com/669557" source="BUGZILLA"/>
		<reference ref_id="697368" ref_url="https://bugzilla.suse.com/697368" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1947" ref_url="https://www.suse.com/security/cve/CVE-2011-1947/" source="CVE"/>
		<description>

This update fixes a hang in fetchmail when the remote server acknowledges 
the STARTTLS command but does not actually start the TLS connection or 
sends any additional packages, which can cause fetchmail to get stuck in 
very rare cases (CVE-2011-1947).

		</description>
<advisory from="security@suse.de">
	<issued date="2011-10-14"/>
	<updated date="2011-10-14"/>
	<bugzilla href="https://bugzilla.suse.com/669557">SUSE bug 669557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/697368">SUSE bug 697368</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1947/">CVE-2011-1947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1947">CVE-2011-1947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991384" comment="fetchmail-6.3.8.90-13.20.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991385" comment="fetchmailconf-6.3.8.90-13.20.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217082" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="775988" ref_url="https://bugzilla.suse.com/775988" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3482" ref_url="https://www.suse.com/security/cve/CVE-2012-3482/" source="CVE"/>
		<description>

This update for fetchmail fixes the following issues:

- CVE-2012-3482: A denial of service vulnerability in the base64 decoder during processing server NTLM protocol exchange was fixed (bsc#775988).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-24"/>
	<updated date="2016-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/775988">SUSE bug 775988</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3482/">CVE-2012-3482 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3482">CVE-2012-3482 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571310" comment="fetchmail-6.3.8.90-13.20.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571311" comment="fetchmailconf-6.3.8.90-13.20.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217083" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1188875" ref_url="https://bugzilla.suse.com/1188875" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36386" ref_url="https://www.suse.com/security/cve/CVE-2021-36386/" source="CVE"/>
		<description>
This update for fetchmail fixes the following issues:

- CVE-2021-36386: Fixed a missing variable initialization that can cause read from bad memory locations. (bsc#1188875)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-31"/>
	<updated date="2021-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188875">SUSE bug 1188875</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-36386/">CVE-2021-36386 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36386">CVE-2021-36386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627042" comment="fetchmail-6.3.8.90-13.20.22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627043" comment="fetchmailconf-6.3.8.90-13.20.22.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217084" version="1" class="patch">
	<metadata>
		<title>Security update for file</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="654696" ref_url="https://bugzilla.suse.com/654696" source="BUGZILLA"/>
		<reference ref_id="863450" ref_url="https://bugzilla.suse.com/863450" source="BUGZILLA"/>
		<reference ref_id="866750" ref_url="https://bugzilla.suse.com/866750" source="BUGZILLA"/>
		<reference ref_id="902367" ref_url="https://bugzilla.suse.com/902367" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2270" ref_url="https://www.suse.com/security/cve/CVE-2014-2270/" source="CVE"/>
		<reference ref_id="CVE-2014-3710" ref_url="https://www.suse.com/security/cve/CVE-2014-3710/" source="CVE"/>
		<description>

file was updated to fix one security issue.

    * An out-of-bounds read flaw file's donote() function. This could
      possibly lead to file executable crash (CVE-2014-3710).

Security Issues:

    * CVE-2014-3710
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3710&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-18"/>
	<updated date="2014-11-18"/>
	<bugzilla href="https://bugzilla.suse.com/654696">SUSE bug 654696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863450">SUSE bug 863450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866750">SUSE bug 866750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902367">SUSE bug 902367</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2270/">CVE-2014-2270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2270">CVE-2014-2270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3710/">CVE-2014-3710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3710">CVE-2014-3710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991386" comment="file-4.24-43.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566423" comment="file-32bit-4.24-43.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217085" version="1" class="patch">
	<metadata>
		<title>Security update for file-roller (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="937635" ref_url="https://bugzilla.suse.com/937635" source="BUGZILLA"/>
		<description>
This update for file-roller fixes the following issues:

- Fixed a potential denial of service when extracting a zip files (bsc#937635).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-14"/>
	<updated date="2020-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/937635">SUSE bug 937635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571312" comment="file-roller-2.28.2-0.3.3.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571313" comment="file-roller-lang-2.28.2-0.3.3.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217086" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="742826" ref_url="https://bugzilla.suse.com/742826" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3659" ref_url="https://www.suse.com/security/cve/CVE-2011-3659/" source="CVE"/>
		<reference ref_id="CVE-2012-0442" ref_url="https://www.suse.com/security/cve/CVE-2012-0442/" source="CVE"/>
		<reference ref_id="CVE-2012-0443" ref_url="https://www.suse.com/security/cve/CVE-2012-0443/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<reference ref_id="CVE-2012-0445" ref_url="https://www.suse.com/security/cve/CVE-2012-0445/" source="CVE"/>
		<reference ref_id="CVE-2012-0446" ref_url="https://www.suse.com/security/cve/CVE-2012-0446/" source="CVE"/>
		<reference ref_id="CVE-2012-0447" ref_url="https://www.suse.com/security/cve/CVE-2012-0447/" source="CVE"/>
		<reference ref_id="CVE-2012-0449" ref_url="https://www.suse.com/security/cve/CVE-2012-0449/" source="CVE"/>
		<reference ref_id="CVE-2012-0450" ref_url="https://www.suse.com/security/cve/CVE-2012-0450/" source="CVE"/>
		<description>

This update provides Mozilla Firefox 10, which provides many fixes, 
security and feature enhancements.

For a detailed list, please have a look at

http://www.mozilla.org/en-US/firefox/10.0/releasenotes/
&lt;http://www.mozilla.org/en-US/firefox/10.0/releasenotes/&gt;

and

http://www.mozilla.org/de/firefox/features/
&lt;http://www.mozilla.org/de/firefox/features/&gt;

The following security issues have been fixed in this update:

    * 

      Mozilla developers identified and fixed several memory safety bugs in
      the browser engine used in Firefox and other Mozilla-based products.
      Some of these bugs showed evidence of memory corruption under certain
      circumstances, and we presume that with enough effort at least some
      of these could be exploited to run arbitrary code. (MFSA 2012-01
      &lt;http://www.mozilla.org/security/announce/2012/mfsa2012-01.html&gt; , 
      CVE-2012-0442
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0442&gt; , 
      CVE-2012-0443
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0443&gt; )

    * 

      Alex Dvorov reported that an attacker could replace a sub-frame in
      another domain's document by using the name attribute of the
      sub-frame as a form submission target. This can potentially allow for
      phishing attacks against users and violates the HTML5 frame
      navigation policy. (MFSA 2012-03
      &lt;http://www.mozilla.org/security/announce/2012/mfsa2012-03.html&gt; , 
      CVE-2012-0445
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0445&gt; )

    * 

      Security researcher regenrecht reported via TippingPoint's Zero Day
      Initiative that removed child nodes of nsDOMAttribute can be accessed
      under certain circumstances because of a premature notification of
      AttributeChildRemoved. This use-after-free of the child nodes could
      possibly allow for for remote code execution. (MFSA 2012-04
      &lt;http://www.mozilla.org/security/announce/2012/mfsa2012-04.html&gt; , 
      CVE-2011-3659
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3659&gt; )

    * 

      Mozilla security researcher moz_bug_r_a4 reported that frame scripts
      bypass XPConnect security checks when calling untrusted objects. This
      allows for cross-site scripting (XSS) attacks through web pages and
      Firefox extensions. The fix enables the Script Security Manager (SSM)
      to force security checks on all frame scripts. (MFSA 2012-05
      &lt;http://www.mozilla.org/security/announce/2012/mfsa2012-05.html&gt; , 
      CVE-2012-0446
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0446&gt; )

    * 

      Mozilla developer Tim Abraldes reported that when encoding images as
      image/vnd.microsoft.icon the resulting data was always a fixed size,
      with uninitialized memory appended as padding beyond the size of the
      actual image. This is the result of mImageBufferSize in the encoder
      being initialized with a value different than the size of the source
      image. There is the possibility of sensitive data from uninitialized
      memory being appended to a PNG image when converted fron an ICO
      format image. This sensitive data may then be disclosed in the
      resulting image. ((MFSA 2012-06)
      http://www.mozilla.org/security/announce/2012/mfsa2012-06.html],
      [CVE-2012-0447
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0447&gt; )

    * 

      Security researcher regenrecht reported via TippingPoint's Zero Day
      Initiative the possibility of memory corruption during the decoding
      of Ogg Vorbis files. This can cause a crash during decoding and has
      the potential for remote code execution. (MFSA 2012-07
      &lt;http://www.mozilla.org/security/announce/2012/mfsa2012-07.html&gt; , 
      CVE-2012-0444
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0444&gt; )

    * 

      Security researchers Nicolas Gregoire and Aki Helin independently
      reported that when processing a malformed embedded XSLT stylesheet,
      Firefox can crash due to a memory corruption. While there is no
      evidence that this is directly exploitable, there is a possibility of
      remote code execution. (MFSA 2012-08
      &lt;http://www.mozilla.org/security/announce/2012/mfsa2012-08.html&gt; , 
      CVE-2012-0449
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0449&gt; )

    * 

      magicant starmen reported that if a user chooses to export their
      Firefox Sync key the 'Firefox Recovery Key.html' file is saved with
      incorrect permissions, making the file contents potentially readable
      by other users on Linux and OS X systems. (MFSA 2012-09
      &lt;http://www.mozilla.org/security/announce/2012/mfsa2012-09.html&gt; , 
      CVE-2012-0450
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0450&gt; )

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-03"/>
	<updated date="2012-02-03"/>
	<bugzilla href="https://bugzilla.suse.com/742826">SUSE bug 742826</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3659/">CVE-2011-3659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3659">CVE-2011-3659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0442/">CVE-2012-0442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0442">CVE-2012-0442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0443/">CVE-2012-0443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0443">CVE-2012-0443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0444">CVE-2012-0444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0445/">CVE-2012-0445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0445">CVE-2012-0445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0446/">CVE-2012-0446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0446">CVE-2012-0446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0447/">CVE-2012-0447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0447">CVE-2012-0447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0449/">CVE-2012-0449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0449">CVE-2012-0449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0450/">CVE-2012-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0450">CVE-2012-0450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991387" comment="MozillaFirefox-10.0-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991388" comment="MozillaFirefox-branding-SLED-7-0.6.7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991389" comment="MozillaFirefox-translations-10.0-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991390" comment="mozilla-kde4-integration-0.6.3-5.6.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217087" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="758408" ref_url="https://bugzilla.suse.com/758408" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3062" ref_url="https://www.suse.com/security/cve/CVE-2011-3062/" source="CVE"/>
		<reference ref_id="CVE-2012-0468" ref_url="https://www.suse.com/security/cve/CVE-2012-0468/" source="CVE"/>
		<reference ref_id="CVE-2012-0469" ref_url="https://www.suse.com/security/cve/CVE-2012-0469/" source="CVE"/>
		<reference ref_id="CVE-2012-0470" ref_url="https://www.suse.com/security/cve/CVE-2012-0470/" source="CVE"/>
		<reference ref_id="CVE-2012-0471" ref_url="https://www.suse.com/security/cve/CVE-2012-0471/" source="CVE"/>
		<reference ref_id="CVE-2012-0472" ref_url="https://www.suse.com/security/cve/CVE-2012-0472/" source="CVE"/>
		<reference ref_id="CVE-2012-0473" ref_url="https://www.suse.com/security/cve/CVE-2012-0473/" source="CVE"/>
		<reference ref_id="CVE-2012-0474" ref_url="https://www.suse.com/security/cve/CVE-2012-0474/" source="CVE"/>
		<reference ref_id="CVE-2012-0477" ref_url="https://www.suse.com/security/cve/CVE-2012-0477/" source="CVE"/>
		<reference ref_id="CVE-2012-0478" ref_url="https://www.suse.com/security/cve/CVE-2012-0478/" source="CVE"/>
		<reference ref_id="CVE-2012-0479" ref_url="https://www.suse.com/security/cve/CVE-2012-0479/" source="CVE"/>
		<description>

MozillaFirefox was updated to the 10.0.4 ESR release to fix various bugs 
and security issues.

    * 

      MFSA 2012-20: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

      Christian Holler a reported memory safety and security problem
      affecting Firefox 11. (CVE-2012-0468)

      Bob Clary, Christian Holler, Brian Hackett, Bobby Holley, Gary Kwong,
      Hilary Hall, Honza Bambas, Jesse Ruderman, Julian Seward, and Olli
      Pettay reported memory safety problems and crashes that affect
      Firefox ESR and Firefox 11. (CVE-2012-0467)

    * 

      MFSA 2012-22 / CVE-2012-0469: Using the Address Sanitizer tool,
      security researcher Aki Helin from OUSPG found that IDBKeyRange of
      indexedDB remains in the XPConnect hashtable instead of being
      unlinked before being destroyed. When it is destroyed, this causes a
      use-after-free, which is potentially exploitable.

    * 

      MFSA 2012-23 / CVE-2012-0470: Using the Address Sanitizer tool,
      security researcher Atte Kettunen from OUSPG found a heap corruption
      in gfxImageSurface which allows for invalid frees and possible remote
      code execution. This happens due to float error, resulting from
      graphics values being passed through different number systems.

    * 

      MFSA 2012-24 / CVE-2012-0471: Anne van Kesteren of Opera Software
      found a multi-octet encoding issue where certain octets will destroy
      the following octets in the processing of some multibyte character
      sets. This can leave users vulnerable to cross-site scripting (XSS)
      attacks on maliciously crafted web pages.

    * 

      MFSA 2012-25 / CVE-2012-0472: Security research firm iDefense
      reported that researcher wushi of team509 discovered a memory
      corruption on Windows Vista and Windows 7 systems with hardware
      acceleration disabled or using incompatible video drivers. This is
      created by using cairo-dwrite to attempt to render fonts on an
      unsupported code path. This corruption causes a potentially
      exploitable crash on affected systems.

    * 

      MFSA 2012-26 / CVE-2012-0473: Mozilla community member Matias
      Juntunen discovered an error in WebGLBuffer where
      FindMaxElementInSubArray receives wrong template arguments from
      FindMaxUshortElement. This bug causes maximum index to be computed
      incorrectly within WebGL.drawElements, allowing the reading of
      illegal video memory.

    * 

      MFSA 2012-27 / CVE-2012-0474: Security researchers Jordi Chancel and
      Eddy Bordi reported that they could short-circuit page loads to show
      the address of a different site than what is loaded in the window in
      the addressbar. Security researcher Chris McGowen independently
      reported the same flaw, and further demonstrated that this could lead
      to loading scripts from the attacker's site, leaving users vulnerable
      to cross-site scripting (XSS) attacks.

    * 

      MFSA 2012-28 / CVE-2012-0475: Security researcher Simone Fabiano
      reported that if a cross-site XHR or WebSocket is opened on a web
      server on a non-standard port for web traffic while using an IPv6
      address, the browser will send an ambiguous origin headers if the
      IPv6 address contains at least 2 consecutive 16-bit fields of zeroes.
      If there is an origin access control list that uses IPv6 literals,
      this issue could be used to bypass these access controls on the
      server.

    * 

      MFSA 2012-29 / CVE-2012-0477: Security researcher Masato Kinugawa
      found that during the decoding of ISO-2022-KR and ISO-2022-CN
      character sets, characters near 1024 bytes are treated incorrectly,
      either doubling or deleting bytes. On certain pages it might be
      possible for an attacker to pad the output of the page such that
      these errors fall in the right place to affect the structure of the
      page, allowing for cross-site script (XSS) injection.

    * 

      MFSA 2012-30 / CVE-2012-0478: Mozilla community member Ms2ger found
      an image rendering issue with WebGL when texImage2D uses use
      JSVAL_TO_OBJECT on arbitrary objects. This can lead to a crash on a
      maliciously crafted web page. While there is no evidence that this is
      directly exploitable, there is a possibility of remote code
      execution.

    * 

      MFSA 2012-31 / CVE-2011-3062: Mateusz Jurczyk of the Google Security
      Team discovered an off-by-one error in the OpenType Sanitizer using
      the Address Sanitizer tool. This can lead to an out-of-bounds read
      and execution of an uninitialized function pointer during parsing and
      possible remote code execution.

    * 

      MFSA 2012-32 / CVE-2011-1187: Security researcher Daniel Divricean
      reported that a defect in the error handling of javascript errors can
      leak the file names and location of javascript files on a server,
      leading to inadvertent information disclosure and a vector for
      further attacks.

    * 

      MFSA 2012-33 / CVE-2012-0479: Security researcher Jeroen van der Gun
      reported that if RSS or Atom XML invalid content is loaded over
      HTTPS, the addressbar updates to display the new location of the
      loaded resource, including SSL indicators, while the main window
      still displays the previously loaded content. This allows for
      phishing attacks where a malicious page can spoof the identify of
      another seemingly secure site.

Security Issue references:

    * CVE-2012-0468
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0468&gt;
    * CVE-2012-0469
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0469&gt;
    * CVE-2012-0470
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0470&gt;
    * CVE-2012-0471
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0471&gt;
    * CVE-2012-0472
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0472&gt;
    * CVE-2012-0473
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0473&gt;
    * CVE-2012-0474
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0474&gt;
    * CVE-2012-0477
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0477&gt;
    * CVE-2012-0478
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0478&gt;
    * CVE-2011-3062
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3062&gt;
    * CVE-2012-0479
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0479&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-04-26"/>
	<updated date="2012-04-26"/>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3062/">CVE-2011-3062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3062">CVE-2011-3062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0468/">CVE-2012-0468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0468">CVE-2012-0468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0469/">CVE-2012-0469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0469">CVE-2012-0469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0470/">CVE-2012-0470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0470">CVE-2012-0470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0471/">CVE-2012-0471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0471">CVE-2012-0471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0472/">CVE-2012-0472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0472">CVE-2012-0472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0473/">CVE-2012-0473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0473">CVE-2012-0473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0474/">CVE-2012-0474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0474">CVE-2012-0474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0477/">CVE-2012-0477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0477">CVE-2012-0477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0478/">CVE-2012-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0478">CVE-2012-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0479/">CVE-2012-0479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0479">CVE-2012-0479 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991391" comment="MozillaFirefox-10.0.4-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991392" comment="MozillaFirefox-translations-10.0.4-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991393" comment="libfreebl3-3.13.4-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991394" comment="libfreebl3-32bit-3.13.4-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991395" comment="mozilla-nss-3.13.4-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991396" comment="mozilla-nss-32bit-3.13.4-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991397" comment="mozilla-nss-tools-3.13.4-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217088" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="771583" ref_url="https://bugzilla.suse.com/771583" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-1948" ref_url="https://www.suse.com/security/cve/CVE-2012-1948/" source="CVE"/>
		<reference ref_id="CVE-2012-1949" ref_url="https://www.suse.com/security/cve/CVE-2012-1949/" source="CVE"/>
		<reference ref_id="CVE-2012-1950" ref_url="https://www.suse.com/security/cve/CVE-2012-1950/" source="CVE"/>
		<reference ref_id="CVE-2012-1951" ref_url="https://www.suse.com/security/cve/CVE-2012-1951/" source="CVE"/>
		<reference ref_id="CVE-2012-1952" ref_url="https://www.suse.com/security/cve/CVE-2012-1952/" source="CVE"/>
		<reference ref_id="CVE-2012-1953" ref_url="https://www.suse.com/security/cve/CVE-2012-1953/" source="CVE"/>
		<reference ref_id="CVE-2012-1954" ref_url="https://www.suse.com/security/cve/CVE-2012-1954/" source="CVE"/>
		<reference ref_id="CVE-2012-1955" ref_url="https://www.suse.com/security/cve/CVE-2012-1955/" source="CVE"/>
		<reference ref_id="CVE-2012-1957" ref_url="https://www.suse.com/security/cve/CVE-2012-1957/" source="CVE"/>
		<reference ref_id="CVE-2012-1958" ref_url="https://www.suse.com/security/cve/CVE-2012-1958/" source="CVE"/>
		<reference ref_id="CVE-2012-1959" ref_url="https://www.suse.com/security/cve/CVE-2012-1959/" source="CVE"/>
		<reference ref_id="CVE-2012-1961" ref_url="https://www.suse.com/security/cve/CVE-2012-1961/" source="CVE"/>
		<reference ref_id="CVE-2012-1962" ref_url="https://www.suse.com/security/cve/CVE-2012-1962/" source="CVE"/>
		<reference ref_id="CVE-2012-1963" ref_url="https://www.suse.com/security/cve/CVE-2012-1963/" source="CVE"/>
		<reference ref_id="CVE-2012-1964" ref_url="https://www.suse.com/security/cve/CVE-2012-1964/" source="CVE"/>
		<reference ref_id="CVE-2012-1965" ref_url="https://www.suse.com/security/cve/CVE-2012-1965/" source="CVE"/>
		<reference ref_id="CVE-2012-1966" ref_url="https://www.suse.com/security/cve/CVE-2012-1966/" source="CVE"/>
		<reference ref_id="CVE-2012-1967" ref_url="https://www.suse.com/security/cve/CVE-2012-1967/" source="CVE"/>
		<description>

MozillaFirefox has been updated to the 10.0.6ESR security release fixing 
various bugs and several security issues, some critical.

The following security issues have been fixed:

    * 

      MFSA 2012-42: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

    * 

      CVE-2012-1948: Benoit Jacob, Jesse Ruderman, Christian Holler, and
      Bill McCloskey reported memory safety problems and crashes that
      affect Firefox ESR 10 and Firefox 13.

    * 

      MFSA 2012-43 / CVE-2012-1950: Security researcher Mario Gomes
      andresearch firm Code Audit Labs reported a mechanism to
      short-circuit page loads through drag and drop to the addressbar by
      canceling the page load. This causes the address of the previously
      site entered to be displayed in the addressbar instead of the
      currently loaded page. This could lead to potential phishing attacks
      on users.

    * 

      MFSA 2012-44 Google security researcher Abhishek Arya used the
      Address Sanitizer tool to uncover four issues: two use-after-free
      problems, one out of bounds read bug, and a bad cast. The first
      use-afte.r-free problem is caused when an array of
      nsSMILTimeValueSpec objects is destroyed but attempts are made to
      call into objects in this array later. The second use-after-free
      problem is in nsDocument::AdoptNode when it adopts into an empty
      document and then adopts into another document, emptying the first
      one. The heap buffer overflow is in ElementAnimations when data is
      read off of end of an array and then pointers are dereferenced. The
      bad cast happens when nsTableFrame::InsertFrames is called with
      frames in aFrameList that are a mix of row group frames and column
      group frames. AppendFrames is not able to handle this mix.

      All four of these issues are potentially exploitable.

          o CVE-2012-1951: Heap-use-after-free in
            nsSMILTimeValueSpec::IsEventBased
          o CVE-2012-1954: Heap-use-after-free in nsDocument::AdoptNode
          o CVE-2012-1953: Out of bounds read in
            ElementAnimations::EnsureStyleRuleFor
          o CVE-2012-1952: Bad cast in nsTableFrame::InsertFrames
    * 

      MFSA 2012-45 / CVE-2012-1955: Security researcher Mariusz Mlynski
      reported an issue with spoofing of the location property. In this
      issue, calls to history.forward and history.back are used to navigate
      to a site while displaying the previous site in the addressbar but
      changing the baseURI to the newer site. This can be used for phishing
      by allowing the user input form or other data on the newer,
      attacking, site while appearing to be on the older, displayed site.

    * 

      MFSA 2012-46 / CVE-2012-1966: Mozilla security researcher
      moz_bug_r_a4 reported a cross-site scripting (XSS) attack through the
      context menu using a data: URL. In this issue, context menu
      functionality ('View Image', 'Show only this frame', and 'View
      background image') are disallowed in a javascript: URL but allowed in
      a data: URL, allowing for XSS. This can lead to arbitrary code
      execution.

    * 

      MFSA 2012-47 / CVE-2012-1957: Security researcher Mario Heiderich
      reported that javascript could be executed in the HTML feed-view
      using tag within the RSS . This problem is due to tags not being
      filtered out during parsing and can lead to a potential cross-site
      scripting (XSS) attack. The flaw existed in a parser utility class
      and could affect other parts of the browser or add-ons which rely on
      that class to sanitize untrusted input.

    * 

      MFSA 2012-48 / CVE-2012-1958: Security researcher Arthur Gerkis used
      the Address Sanitizer tool to find a use-after-free in
      nsGlobalWindow::PageHidden when mFocusedContent is released and
      oldFocusedContent is used afterwards. This use-after-free could
      possibly allow for remote code execution.

    * 

      MFSA 2012-49 / CVE-2012-1959: Mozilla developer Bobby Holley found
      that same-compartment security wrappers (SCSW) can be bypassed by
      passing them to another compartment. Cross-compartment wrappers often
      do not go through SCSW, but have a filtering policy built into them.
      When an object is wrapped cross-compartment, the SCSW is stripped off
      and, when the object is read read back, it is not known that SCSW was
      previously present, resulting in a bypassing of SCSW. This could
      result in untrusted content having access to the XBL that implements
      browser functionality.

    * 

      MFSA 2012-50 / CVE-2012-1960: Google developer Tony Payne reported an
      out of bounds (OOB) read in QCMS, Mozilla's color management library.
      With a carefully crafted color profile portions of a user's memory
      could be incorporated into a transformed image and possibly
      deciphered.

    * 

      MFSA 2012-51 / CVE-2012-1961: Bugzilla developer Frederic Buclin
      reported that the 'X-Frame-Options header is ignored when the value
      is duplicated, for example X-Frame-Options: SAMEORIGIN, SAMEORIGIN.
      This duplication occurs for unknown reasons on some websites and when
      it occurs results in Mozilla browsers not being protected against
      possible clickjacking attacks on those pages.

    * 

      MFSA 2012-52 / CVE-2012-1962: Security researcher Bill Keese reported
      a memory corruption. This is caused by JSDependentString::undepend
      changing a dependent string into a fixed string when there are
      additional dependent strings relying on the same base. When the
      undepend occurs during conversion, the base data is freed, leaving
      other dependent strings with dangling pointers. This can lead to a
      potentially exploitable crash.

    * 

      MFSA 2012-53 / CVE-2012-1963: Security researcher Karthikeyan
      Bhargavan of Prosecco at INRIA reported Content Security Policy (CSP)
      1.0 implementation errors. CSP violation reports generated by Firefox
      and sent to the 'report-uri' location include sensitive data within
      the 'blocked-uri' parameter. These include fragment components and
      query strings even if the 'blocked-uri' parameter has a different
      origin than the protected resource. This can be used to retrieve a
      user's OAuth 2.0 access tokens and OpenID credentials by malicious
      sites.

    * 

      MFSA 2012-54 / CVE-2012-1964: Security Researcher Matt McCutchen
      reported that a clickjacking attack using the certificate warning
      page. A man-in-the-middle (MITM) attacker can use an iframe to
      display its own certificate error warning page (about:certerror) with
      the 'Add Exception' button of a real warning page from a malicious
      site. This can mislead users to adding a certificate exception for a
      different site than the perceived one. This can lead to compromised
      communications with the user perceived site through the MITM attack
      once the certificate exception has been added.

    * 

      MFSA 2012-55 / CVE-2012-1965: Security researchers Mario Gomes and
      Soroush Dalili reported that since Mozilla allows the pseudo-protocol
      feed: to prefix any valid URL, it is possible to construct
      feed:javascript: URLs that will execute scripts in some contexts. On
      some sites it may be possible to use this to evade output filtering
      that would otherwise strip javascript: URLs and thus contribute to
      cross-site scripting (XSS) problems on these sites.

    * 

      MFSA 2012-56 / CVE-2012-1967: Mozilla security researcher
      moz_bug_r_a4 reported a arbitrary code execution attack using a
      javascript: URL. The Gecko engine features a JavaScript sandbox
      utility that allows the browser or add-ons to safely execute script
      in the context of a web page. In certain cases, javascript: URLs are
      executed in such a sandbox with insufficient context that can allow
      those scripts to escape from the sandbox and run with elevated
      privilege. This can lead to arbitrary code execution.

Security Issue references:

    * CVE-2012-1967
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1967&gt;
    * CVE-2012-1948
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1948&gt;
    * CVE-2012-1949
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1949&gt;
    * CVE-2012-1951
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1951&gt;
    * CVE-2012-1952
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1952&gt;
    * CVE-2012-1953
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1953&gt;
    * CVE-2012-1954
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1954&gt;
    * CVE-2012-1966
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1966&gt;
    * CVE-2012-1958
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1958&gt;
    * CVE-2012-1959
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1959&gt;
    * CVE-2012-1962
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1962&gt;
    * CVE-2012-1950
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1950&gt;
    * CVE-2012-1955
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1955&gt;
    * CVE-2012-1957
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1957&gt;
    * CVE-2012-1961
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1961&gt;
    * CVE-2012-1963
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1963&gt;
    * CVE-2012-1964
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1964&gt;
    * CVE-2012-1965
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1965&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-19"/>
	<updated date="2012-07-19"/>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1948/">CVE-2012-1948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1948">CVE-2012-1948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1949/">CVE-2012-1949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1949">CVE-2012-1949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1950/">CVE-2012-1950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1950">CVE-2012-1950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1951/">CVE-2012-1951 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1951">CVE-2012-1951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1952/">CVE-2012-1952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1952">CVE-2012-1952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1953/">CVE-2012-1953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1953">CVE-2012-1953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1954/">CVE-2012-1954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1954">CVE-2012-1954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1955/">CVE-2012-1955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1955">CVE-2012-1955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1957/">CVE-2012-1957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1957">CVE-2012-1957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1958/">CVE-2012-1958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1958">CVE-2012-1958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1959/">CVE-2012-1959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1959">CVE-2012-1959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1961/">CVE-2012-1961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1961">CVE-2012-1961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1962/">CVE-2012-1962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1962">CVE-2012-1962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1963/">CVE-2012-1963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1963">CVE-2012-1963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1964/">CVE-2012-1964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1964">CVE-2012-1964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1965/">CVE-2012-1965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1965">CVE-2012-1965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1966/">CVE-2012-1966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1966">CVE-2012-1966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1967/">CVE-2012-1967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1967">CVE-2012-1967 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991398" comment="MozillaFirefox-10.0.6-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991399" comment="MozillaFirefox-branding-SLED-7-0.6.7.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991400" comment="MozillaFirefox-translations-10.0.6-0.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217089" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="777588" ref_url="https://bugzilla.suse.com/777588" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-1956" ref_url="https://www.suse.com/security/cve/CVE-2012-1956/" source="CVE"/>
		<reference ref_id="CVE-2012-1970" ref_url="https://www.suse.com/security/cve/CVE-2012-1970/" source="CVE"/>
		<reference ref_id="CVE-2012-1971" ref_url="https://www.suse.com/security/cve/CVE-2012-1971/" source="CVE"/>
		<reference ref_id="CVE-2012-1972" ref_url="https://www.suse.com/security/cve/CVE-2012-1972/" source="CVE"/>
		<reference ref_id="CVE-2012-1973" ref_url="https://www.suse.com/security/cve/CVE-2012-1973/" source="CVE"/>
		<reference ref_id="CVE-2012-1974" ref_url="https://www.suse.com/security/cve/CVE-2012-1974/" source="CVE"/>
		<reference ref_id="CVE-2012-1975" ref_url="https://www.suse.com/security/cve/CVE-2012-1975/" source="CVE"/>
		<reference ref_id="CVE-2012-1976" ref_url="https://www.suse.com/security/cve/CVE-2012-1976/" source="CVE"/>
		<reference ref_id="CVE-2012-3956" ref_url="https://www.suse.com/security/cve/CVE-2012-3956/" source="CVE"/>
		<reference ref_id="CVE-2012-3957" ref_url="https://www.suse.com/security/cve/CVE-2012-3957/" source="CVE"/>
		<reference ref_id="CVE-2012-3958" ref_url="https://www.suse.com/security/cve/CVE-2012-3958/" source="CVE"/>
		<reference ref_id="CVE-2012-3959" ref_url="https://www.suse.com/security/cve/CVE-2012-3959/" source="CVE"/>
		<reference ref_id="CVE-2012-3960" ref_url="https://www.suse.com/security/cve/CVE-2012-3960/" source="CVE"/>
		<reference ref_id="CVE-2012-3961" ref_url="https://www.suse.com/security/cve/CVE-2012-3961/" source="CVE"/>
		<reference ref_id="CVE-2012-3962" ref_url="https://www.suse.com/security/cve/CVE-2012-3962/" source="CVE"/>
		<reference ref_id="CVE-2012-3963" ref_url="https://www.suse.com/security/cve/CVE-2012-3963/" source="CVE"/>
		<reference ref_id="CVE-2012-3964" ref_url="https://www.suse.com/security/cve/CVE-2012-3964/" source="CVE"/>
		<reference ref_id="CVE-2012-3965" ref_url="https://www.suse.com/security/cve/CVE-2012-3965/" source="CVE"/>
		<reference ref_id="CVE-2012-3966" ref_url="https://www.suse.com/security/cve/CVE-2012-3966/" source="CVE"/>
		<reference ref_id="CVE-2012-3967" ref_url="https://www.suse.com/security/cve/CVE-2012-3967/" source="CVE"/>
		<reference ref_id="CVE-2012-3968" ref_url="https://www.suse.com/security/cve/CVE-2012-3968/" source="CVE"/>
		<reference ref_id="CVE-2012-3969" ref_url="https://www.suse.com/security/cve/CVE-2012-3969/" source="CVE"/>
		<reference ref_id="CVE-2012-3970" ref_url="https://www.suse.com/security/cve/CVE-2012-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-3971" ref_url="https://www.suse.com/security/cve/CVE-2012-3971/" source="CVE"/>
		<reference ref_id="CVE-2012-3972" ref_url="https://www.suse.com/security/cve/CVE-2012-3972/" source="CVE"/>
		<reference ref_id="CVE-2012-3973" ref_url="https://www.suse.com/security/cve/CVE-2012-3973/" source="CVE"/>
		<reference ref_id="CVE-2012-3974" ref_url="https://www.suse.com/security/cve/CVE-2012-3974/" source="CVE"/>
		<reference ref_id="CVE-2012-3975" ref_url="https://www.suse.com/security/cve/CVE-2012-3975/" source="CVE"/>
		<reference ref_id="CVE-2012-3976" ref_url="https://www.suse.com/security/cve/CVE-2012-3976/" source="CVE"/>
		<reference ref_id="CVE-2012-3978" ref_url="https://www.suse.com/security/cve/CVE-2012-3978/" source="CVE"/>
		<reference ref_id="CVE-2012-3979" ref_url="https://www.suse.com/security/cve/CVE-2012-3979/" source="CVE"/>
		<reference ref_id="CVE-2012-3980" ref_url="https://www.suse.com/security/cve/CVE-2012-3980/" source="CVE"/>
		<description>

MozillaFirefox was updated to 10.0.7ESR release, fixing a lot of bugs and 
security problems.

The following security issues have been addressed:

    * 

      MFSA 2012-57: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      CVE-2012-1971: Gary Kwong, Christian Holler, Jesse Ruderman, Steve
      Fink, Bob Clary, Andrew Sutherland, and Jason Smith reported memory
      safety problems and crashes that affect Firefox 14.

    * 

      CVE-2012-1970: Gary Kwong, Christian Holler, Jesse Ruderman, John
      Schoenick, Vladimir Vukicevic and Daniel Holbert reported memory
      safety problems and crashes that affect Firefox ESR 10 and Firefox
      14.

    * 

      MFSA 2012-58: Security researcher Abhishek Arya (Inferno) of Google
      Chrome Security Team discovered a series of use-after-free issues
      using the Address Sanitizer tool. Many of these issues are
      potentially exploitable, allowing for remote code execution.

          o Heap-use-after-free in nsHTMLEditor::CollapseAdjacentTextNodes
            CVE-2012-1972
          o Heap-use-after-free in nsObjectLoadingContent::LoadObject
            CVE-2012-1973
          o Heap-use-after-free in gfxTextRun::CanBreakLineBefore
            CVE-2012-1974
          o Heap-use-after-free in PresShell::CompleteMove CVE-2012-1975
          o Heap-use-after-free in nsHTMLSelectElement::SubmitNamesValues
            CVE-2012-1976
          o Heap-use-after-free in MediaStreamGraphThreadRunnable::Run()
            CVE-2012-3956
          o Heap-buffer-overflow in nsBlockFrame::MarkLineDirty
            CVE-2012-3957
          o Heap-use-after-free in nsHTMLEditRules::DeleteNonTableElements
            CVE-2012-3958
          o Heap-use-after-free in nsRangeUpdater::SelAdjDeleteNode
            CVE-2012-3959
          o Heap-use-after-free in mozSpellChecker::SetCurrentDictionary
            CVE-2012-3960
          o Heap-use-after-free in RangeData::~RangeData CVE-2012-3961
          o Bad iterator in text runs CVE-2012-3962
          o use after free in js::gc::MapAllocToTraceKind CVE-2012-3963
          o Heap-use-after-free READ 8 in gfxTextRun::GetUserData
            CVE-2012-3964
    * 

      MFSA 2012-59 / CVE-2012-1956: Security researcher Mariusz Mlynski
      reported that it is possible to shadow the location object using
      Object.defineProperty. This could be used to confuse the current
      location to plugins, allowing for possible cross-site scripting (XSS)
      attacks.

    * 

      MFSA 2012-60 / CVE-2012-3965: Security researcher Mariusz Mlynski
      reported that when a page opens a new tab, a subsequent window can
      then be opened that can be navigated to about:newtab, a chrome
      privileged page. Once about:newtab is loaded, the special context can
      potentially be used to escalate privilege, allowing for arbitrary
      code execution on the local system in a maliciously crafted attack.

    * 

      MFSA 2012-61 / CVE-2012-3966: Security researcher Frederic Hoguin
      reported two related issues with the decoding of bitmap (.BMP) format
      images embedded in icon (.ICO) format files. When processing a
      negative 'height' header value for the bitmap image, a memory
      corruption can be induced, allowing an attacker to write random
      memory and cause a crash. This crash may be potentially exploitable.

    * 

      MFSA 2012-62: Security researcher miaubiz used the Address Sanitizer
      tool to discover two WebGL issues. The first issue is a
      use-after-free when WebGL shaders are called after being destroyed.
      The second issue exposes a problem with Mesa drivers on Linux,
      leading to a potentially exploitable crash.

          o 

            use after free, webgl fragment shader deleted by accessor
            CVE-2012-3968

          o 

            stack scribbling with 4-byte values choosable among a few
            values, when using more than 16 sampler uniforms, on Mesa, with
            all drivers CVE-2012-3967

    * 

      MFSA 2012-63: Security researcher Arthur Gerkis used the Address
      Sanitizer tool to find two issues involving Scalable Vector Graphics
      (SVG) files. The first issue is a buffer overflow in Gecko's SVG
      filter code when the sum of two values is too large to be stored as a
      signed 32-bit integer, causing the function to write past the end of
      an array. The second issue is a use-after-free when an element with a
      'requiredFeatures' attribute is moved between documents. In that
      situation, the internal representation of the 'requiredFeatures'
      value could be freed prematurely. Both issues are potentially
      exploitable.

          o 

            Heap-buffer-overflow in nsSVGFEMorphologyElement::Filter
            CVE-2012-3969

          o 

            Heap-use-after-free in nsTArray_base::Length() CVE-2012-3970

    * 

      MFSA 2012-64 / CVE-2012-3971: Using the Address Sanitizer tool,
      Mozilla security researcher Christoph Diehl discovered two memory
      corruption issues involving the Graphite 2 library used in Mozilla
      products. Both of these issues can cause a potentially exploitable
      crash. These problems were fixed in the Graphite 2 library, which has
      been updated for Mozilla products.

    * 

      MFSA 2012-65 / CVE-2012-3972: Security research Nicolas Gregoire used
      the Address Sanitizer tool to discover an out-of-bounds read in the
      format-number feature of XSLT, which can cause inaccurate formatting
      of numbers and information leakage. This is not directly exploitable.

    * 

      MFSA 2012-66 / CVE-2012-3973: Mozilla security researcher Mark
      Goodwin discovered an issue with the Firefox developer tools'
      debugger. If remote debugging is disabled, but the experimental
      HTTPMonitor extension has been installed and enabled, a remote user
      can connect to and use the remote debugging service through the port
      used by HTTPMonitor. A remote-enabled flag has been added to resolve
      this problem and close the port unless debugging is explicitly
      enabled.

    * 

      MFSA 2012-67 / CVE-2012-3974: Security researcher Masato Kinugawa
      reported that if a crafted executable is placed in the root partition
      on a Windows file system, the Firefox and Thunderbird installer will
      launch this program after a standard installation instead of Firefox
      or Thunderbird, running this program with the user's privileges.

    * 

      MFSA 2012-68 / CVE-2012-3975: Security researcher vsemozhetbyt
      reported that when the DOMParser is used to parse text/html data in a
      Firefox extension, linked resources within this HTML data will be
      loaded. If the data being parsed in the extension is untrusted, it
      could lead to information leakage and can potentially be combined
      with other attacks to become exploitable.

    * 

      MFSA 2012-69 / CVE-2012-3976: Security researcher Mark Poticha
      reported an issue where incorrect SSL certificate information can be
      displayed on the addressbar, showing the SSL data for a previous site
      while another has been loaded. This is caused by two onLocationChange
      events being fired out of the expected order, leading to the
      displayed certificate data to not be updated. This can be used for
      phishing attacks by allowing the user to input form or other data on
      a newer, attacking, site while the credentials of an older site
      appear on the addressbar.

    * 

      MFSA 2012-70 / CVE-2012-3978: Mozilla security researcher
      moz_bug_r_a4 reported that certain security checks in the location
      object can be bypassed if chrome code is called content in a specific
      manner. This allowed for the loading of restricted content. This can
      be combined with other issues to become potentially exploitable.

    * 

      MFSA 2012-71 / CVE-2012-3979: Mozilla developer Blake Kaplan reported
      that __android_log_print is called insecurely in places. If a
      malicious web page used a dump() statement with a specially crafted
      string, it can trigger a potentially exploitable crash.

      This vulnerability only affects Firefox for Android.

    * 

      MFSA 2012-72 / CVE-2012-3980: Security researcher Colby Russell
      discovered that eval in the web console can execute injected code
      with chrome privileges, leading to the running of malicious code in a
      privileged context. This allows for arbitrary code execution through
      a malicious web page if the web console is invoked by the user.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-31"/>
	<updated date="2012-08-31"/>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1956/">CVE-2012-1956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1956">CVE-2012-1956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1970/">CVE-2012-1970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1970">CVE-2012-1970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1971/">CVE-2012-1971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1971">CVE-2012-1971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1972/">CVE-2012-1972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1972">CVE-2012-1972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1973/">CVE-2012-1973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1973">CVE-2012-1973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1974/">CVE-2012-1974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1974">CVE-2012-1974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1975/">CVE-2012-1975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1975">CVE-2012-1975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1976/">CVE-2012-1976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1976">CVE-2012-1976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3956/">CVE-2012-3956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3956">CVE-2012-3956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3957/">CVE-2012-3957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3957">CVE-2012-3957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3958/">CVE-2012-3958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3958">CVE-2012-3958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3959/">CVE-2012-3959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3959">CVE-2012-3959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3960/">CVE-2012-3960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3960">CVE-2012-3960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3961/">CVE-2012-3961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3961">CVE-2012-3961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3962/">CVE-2012-3962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3962">CVE-2012-3962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3963/">CVE-2012-3963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3963">CVE-2012-3963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3964/">CVE-2012-3964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3964">CVE-2012-3964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3965/">CVE-2012-3965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3965">CVE-2012-3965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3966/">CVE-2012-3966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3966">CVE-2012-3966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3967/">CVE-2012-3967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3967">CVE-2012-3967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3968/">CVE-2012-3968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3968">CVE-2012-3968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3969/">CVE-2012-3969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3969">CVE-2012-3969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3970/">CVE-2012-3970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3970">CVE-2012-3970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3971/">CVE-2012-3971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3971">CVE-2012-3971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3972/">CVE-2012-3972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3972">CVE-2012-3972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3973/">CVE-2012-3973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3973">CVE-2012-3973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3974/">CVE-2012-3974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3974">CVE-2012-3974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3975/">CVE-2012-3975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3975">CVE-2012-3975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3976/">CVE-2012-3976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3976">CVE-2012-3976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3978/">CVE-2012-3978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3978">CVE-2012-3978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3979/">CVE-2012-3979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3979">CVE-2012-3979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3980/">CVE-2012-3980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3980">CVE-2012-3980 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571330" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571331" comment="MozillaFirefox-branding-SLED-7-0.6.7.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571332" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571333" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571334" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571335" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571336" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217090" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="783533" ref_url="https://bugzilla.suse.com/783533" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3977" ref_url="https://www.suse.com/security/cve/CVE-2012-3977/" source="CVE"/>
		<reference ref_id="CVE-2012-3982" ref_url="https://www.suse.com/security/cve/CVE-2012-3982/" source="CVE"/>
		<reference ref_id="CVE-2012-3983" ref_url="https://www.suse.com/security/cve/CVE-2012-3983/" source="CVE"/>
		<reference ref_id="CVE-2012-3984" ref_url="https://www.suse.com/security/cve/CVE-2012-3984/" source="CVE"/>
		<reference ref_id="CVE-2012-3985" ref_url="https://www.suse.com/security/cve/CVE-2012-3985/" source="CVE"/>
		<reference ref_id="CVE-2012-3986" ref_url="https://www.suse.com/security/cve/CVE-2012-3986/" source="CVE"/>
		<reference ref_id="CVE-2012-3987" ref_url="https://www.suse.com/security/cve/CVE-2012-3987/" source="CVE"/>
		<reference ref_id="CVE-2012-3988" ref_url="https://www.suse.com/security/cve/CVE-2012-3988/" source="CVE"/>
		<reference ref_id="CVE-2012-3989" ref_url="https://www.suse.com/security/cve/CVE-2012-3989/" source="CVE"/>
		<reference ref_id="CVE-2012-3990" ref_url="https://www.suse.com/security/cve/CVE-2012-3990/" source="CVE"/>
		<reference ref_id="CVE-2012-3991" ref_url="https://www.suse.com/security/cve/CVE-2012-3991/" source="CVE"/>
		<reference ref_id="CVE-2012-3992" ref_url="https://www.suse.com/security/cve/CVE-2012-3992/" source="CVE"/>
		<reference ref_id="CVE-2012-3993" ref_url="https://www.suse.com/security/cve/CVE-2012-3993/" source="CVE"/>
		<reference ref_id="CVE-2012-3994" ref_url="https://www.suse.com/security/cve/CVE-2012-3994/" source="CVE"/>
		<reference ref_id="CVE-2012-3995" ref_url="https://www.suse.com/security/cve/CVE-2012-3995/" source="CVE"/>
		<reference ref_id="CVE-2012-4179" ref_url="https://www.suse.com/security/cve/CVE-2012-4179/" source="CVE"/>
		<reference ref_id="CVE-2012-4180" ref_url="https://www.suse.com/security/cve/CVE-2012-4180/" source="CVE"/>
		<reference ref_id="CVE-2012-4181" ref_url="https://www.suse.com/security/cve/CVE-2012-4181/" source="CVE"/>
		<reference ref_id="CVE-2012-4182" ref_url="https://www.suse.com/security/cve/CVE-2012-4182/" source="CVE"/>
		<reference ref_id="CVE-2012-4183" ref_url="https://www.suse.com/security/cve/CVE-2012-4183/" source="CVE"/>
		<reference ref_id="CVE-2012-4184" ref_url="https://www.suse.com/security/cve/CVE-2012-4184/" source="CVE"/>
		<reference ref_id="CVE-2012-4185" ref_url="https://www.suse.com/security/cve/CVE-2012-4185/" source="CVE"/>
		<reference ref_id="CVE-2012-4186" ref_url="https://www.suse.com/security/cve/CVE-2012-4186/" source="CVE"/>
		<reference ref_id="CVE-2012-4187" ref_url="https://www.suse.com/security/cve/CVE-2012-4187/" source="CVE"/>
		<reference ref_id="CVE-2012-4188" ref_url="https://www.suse.com/security/cve/CVE-2012-4188/" source="CVE"/>
		<reference ref_id="CVE-2012-4192" ref_url="https://www.suse.com/security/cve/CVE-2012-4192/" source="CVE"/>
		<reference ref_id="CVE-2012-4193" ref_url="https://www.suse.com/security/cve/CVE-2012-4193/" source="CVE"/>
		<description>

MozillaFirefox was updated to the 10.0.9ESR security release which fixes 
bugs and security issues:

    * 

      MFSA 2012-73 / CVE-2012-3977: Security researchers Thai Duong and
      Juliano Rizzo reported that SPDY's request header compression leads
      to information leakage, which can allow the extraction of private
      data such as session cookies, even over an encrypted SSL connection.
      (This does not affect Firefox 10 as it does not feature the SPDY
      extension. It was silently fixed for Firefox 15.)

    * 

      MFSA 2012-74: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      CVE-2012-3983: Henrik Skupin, Jesse Ruderman and moz_bug_r_a4
      reported memory safety problems and crashes that affect Firefox 15.

    * 

      CVE-2012-3982: Christian Holler and Jesse Ruderman reported memory
      safety problems and crashes that affect Firefox ESR 10 and Firefox
      15.

    * 

      MFSA 2012-75 / CVE-2012-3984: Security researcher David Bloom of Cue
      discovered that 'select' elements are always-on-top chromeless
      windows and that navigation away from a page with an active 'select'
      menu does not remove this window.When another menu is opened
      programmatically on a new page, the original 'select' menu can be
      retained and arbitrary HTML content within it rendered, allowing an
      attacker to cover arbitrary portions of the new page through absolute
      positioning/scrolling, leading to spoofing attacks. Security
      researcher Jordi Chancel found a variation that would allow for
      click-jacking attacks was well.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products. References

      Navigation away from a page with an active 'select' dropdown menu can
      be used for URL spoofing, other evil

      Firefox 10.0.1 : Navigation away from a page with multiple active
      'select' dropdown menu can be used for Spoofing And ClickJacking with
      XPI using window.open and geolocalisation

    * 

      MFSA 2012-76 / CVE-2012-3985: Security researcher Collin Jackson
      reported a violation of the HTML5 specifications for document.domain
      behavior. Specified behavior requires pages to only have access to
      windows in a new document.domain but the observed violation allowed
      pages to retain access to windows from the page's initial origin in
      addition to the new document.domain. This could potentially lead to
      cross-site scripting (XSS) attacks.

    * 

      MFSA 2012-77 / CVE-2012-3986: Mozilla developer Johnny Stenback
      discovered that several methods of a feature used for testing
      (DOMWindowUtils) are not protected by existing security checks,
      allowing these methods to be called through script by web pages. This
      was addressed by adding the existing security checks to these
      methods.

    * 

      MFSA 2012-78 / CVE-2012-3987: Security researcher Warren He reported
      that when a page is transitioned into Reader Mode in Firefox for
      Android, the resulting page has chrome privileges and its content is
      not thoroughly sanitized. A successful attack requires user enabling
      of reader mode for a malicious page, which could then perform an
      attack similar to cross-site scripting (XSS) to gain the privileges
      allowed to Firefox on an Android device. This has been fixed by
      changing the Reader Mode page into an unprivileged page.

      This vulnerability only affects Firefox for Android.

    * 

      MFSA 2012-79 / CVE-2012-3988: Security researcher Soroush Dalili
      reported that a combination of invoking full screen mode and
      navigating backwards in history could, in some circumstances, cause a
      hang or crash due to a timing dependent use-after-free pointer
      reference. This crash may be potentially exploitable.

    * 

      MFSA 2012-80 / CVE-2012-3989: Mozilla community member Ms2ger
      reported a crash due to an invalid cast when using the instanceof
      operator on certain types of JavaScript objects. This can lead to a
      potentially exploitable crash.

    * 

      MFSA 2012-81 / CVE-2012-3991: Mozilla community member Alice White
      reported that when the GetProperty function is invoked through JSAPI,
      security checking can be bypassed when getting cross-origin
      properties. This potentially allowed for arbitrary code execution.

    * 

      MFSA 2012-82 / CVE-2012-3994: Security researcher Mariusz Mlynski
      reported that the location property can be accessed by binary plugins
      through top.location and top can be shadowed by Object.defineProperty
      as well. This can allow for possible cross-site scripting (XSS)
      attacks through plugins.

    * 

      MFSA 2012-83: Security researcher Mariusz Mlynski reported that when
      InstallTrigger fails, it throws an error wrapped in a Chrome Object
      Wrapper (COW) that fails to specify exposed properties. These can
      then be added to the resulting object by an attacker, allowing access
      to chrome privileged functions through script.

      While investigating this issue, Mozilla security researcher
      moz_bug_r_a4 found that COW did not disallow accessing of properties
      from a standard prototype in some situations, even when the original
      issue had been fixed.

      These issues could allow for a cross-site scripting (XSS) attack or
      arbitrary code execution.

    * 

      CVE-2012-3993: XrayWrapper pollution via unsafe COW

    * 

      CVE-2012-4184: ChromeObjectWrapper is not implemented as intended

    * 

      MFSA 2012-84 / CVE-2012-3992: Security researcher Mariusz Mlynski
      reported an issue with spoofing of the location property. In this
      issue, writes to location.hash can be used in concert with scripted
      history navigation to cause a specific website to be loaded into the
      history object. The baseURI can then be changed to this stored site,
      allowing an attacker to inject a script or intercept posted data
      posted to a location specified with a relative path.

    * 

      MFSA 2012-85: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team discovered a series of use-after-free,
      buffer overflow, and out of bounds read issues using the Address
      Sanitizer tool in shipped software. These issues are potentially
      exploitable, allowing for remote code execution. We would also like
      to thank Abhishek for reporting two additional use-after-free flaws
      introduced during Firefox 16 development and fixed before general
      release.

    * 

      CVE-2012-3995: Out of bounds read in IsCSSWordSpacingSpace

    * 

      CVE-2012-4179: Heap-use-after-free in
      nsHTMLCSSUtils::CreateCSSPropertyTxn

    * 

      CVE-2012-4180: Heap-buffer-overflow in
      nsHTMLEditor::IsPrevCharInNodeWhitespace

    * 

      CVE-2012-4181: Heap-use-after-free in
      nsSMILAnimationController::DoSample

    * 

      CVE-2012-4182: Heap-use-after-free in nsTextEditRules::WillInsert

    * 

      CVE-2012-4183: Heap-use-after-free in
      DOMSVGTests::GetRequiredFeatures

    * 

      MFSA 2012-86: Security researcher Atte Kettunen from OUSPG reported
      several heap memory corruption issues found using the Address
      Sanitizer tool. These issues are potentially exploitable, allowing
      for remote code execution.

    * 

      CVE-2012-4185: Global-buffer-overflow in nsCharTraits::length

    * 

      CVE-2012-4186: Heap-buffer-overflow in nsWaveReader::DecodeAudioData

    * 

      CVE-2012-4187: Crash with ASSERTION: insPos too small

    * 

      CVE-2012-4188: Heap-buffer-overflow in Convolve3x3

    * 

      MFSA 2012-87 / CVE-2012-3990: Security researcher miaubiz used the
      Address Sanitizer tool to discover a use-after-free in the IME State
      Manager code. This could lead to a potentially exploitable crash.

    * 

      MFSA 2012-89 / CVE-2012-4192 / CVE-2012-4193: Mozilla security
      researcher moz_bug_r_a4 reported a regression where security wrappers
      are unwrapped without doing a security check in defaultValue(). This
      can allow for improper access access to the Location object. In
      versions 15 and earlier of affected products, there was also the
      potential for arbitrary code execution.

Security Issue reference:

    * CVE-2012-3977
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3977&gt;
    * CVE-2012-3982
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3982&gt;
    * CVE-2012-3983
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3983&gt;
    * CVE-2012-3984
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3984&gt;
    * CVE-2012-3985
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3985&gt;
    * CVE-2012-3986
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3986&gt;
    * CVE-2012-3987
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3987&gt;
    * CVE-2012-3988
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3988&gt;
    * CVE-2012-3989
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3989&gt;
    * CVE-2012-3990
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3990&gt;
    * CVE-2012-3991
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3991&gt;
    * CVE-2012-3992
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3992&gt;
    * CVE-2012-3993
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3993&gt;
    * CVE-2012-3994
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3994&gt;
    * CVE-2012-3995
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3995&gt;
    * CVE-2012-4179
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4179&gt;
    * CVE-2012-4180
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4180&gt;
    * CVE-2012-4181
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4181&gt;
    * CVE-2012-4182
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4182&gt;
    * CVE-2012-4183
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4183&gt;
    * CVE-2012-4184
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4184&gt;
    * CVE-2012-4185
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4185&gt;
    * CVE-2012-4186
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4186&gt;
    * CVE-2012-4187
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4187&gt;
    * CVE-2012-4188
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4188&gt;
    * CVE-2012-4192
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4192&gt;
    * CVE-2012-4193
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4193&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-10-15"/>
	<updated date="2012-10-15"/>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3977/">CVE-2012-3977 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3977">CVE-2012-3977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3982/">CVE-2012-3982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3982">CVE-2012-3982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3983/">CVE-2012-3983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3983">CVE-2012-3983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3984/">CVE-2012-3984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3984">CVE-2012-3984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3985/">CVE-2012-3985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3985">CVE-2012-3985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3986/">CVE-2012-3986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3986">CVE-2012-3986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3987/">CVE-2012-3987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3987">CVE-2012-3987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3988/">CVE-2012-3988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3988">CVE-2012-3988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3989/">CVE-2012-3989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3989">CVE-2012-3989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3990/">CVE-2012-3990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3990">CVE-2012-3990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3991/">CVE-2012-3991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3991">CVE-2012-3991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3992/">CVE-2012-3992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3992">CVE-2012-3992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3993/">CVE-2012-3993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3993">CVE-2012-3993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3994/">CVE-2012-3994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3994">CVE-2012-3994 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3995/">CVE-2012-3995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3995">CVE-2012-3995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4179/">CVE-2012-4179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4179">CVE-2012-4179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4180/">CVE-2012-4180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4180">CVE-2012-4180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4181/">CVE-2012-4181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4181">CVE-2012-4181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4182/">CVE-2012-4182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4182">CVE-2012-4182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4183/">CVE-2012-4183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4183">CVE-2012-4183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4184/">CVE-2012-4184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4184">CVE-2012-4184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4185/">CVE-2012-4185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4185">CVE-2012-4185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4186/">CVE-2012-4186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4186">CVE-2012-4186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4187/">CVE-2012-4187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4187">CVE-2012-4187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4188/">CVE-2012-4188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4188">CVE-2012-4188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4192/">CVE-2012-4192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4192">CVE-2012-4192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4193/">CVE-2012-4193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4193">CVE-2012-4193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571337" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571338" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217091" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="786522" ref_url="https://bugzilla.suse.com/786522" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4194" ref_url="https://www.suse.com/security/cve/CVE-2012-4194/" source="CVE"/>
		<reference ref_id="CVE-2012-4195" ref_url="https://www.suse.com/security/cve/CVE-2012-4195/" source="CVE"/>
		<reference ref_id="CVE-2012-4196" ref_url="https://www.suse.com/security/cve/CVE-2012-4196/" source="CVE"/>
		<description>

MozillaFirefox was updated to the 10.0.10ESR security release.

The following issues have been fixed:

    * 

      MFSA 2012-90: Mozilla has fixed a number of issues related to the
      Location object in order to enhance overall security. Details for
      each of the current fixed issues are below.

      Thunderbird is only affected by window.location issues through RSS
      feeds and extensions that load web content.

    * 

      CVE-2012-4194: Security researcher Mariusz Mlynski reported that the
      true value of window.location could be shadowed by user content
      through the use of the valueOf method, which can be combined with
      some plugins to perform a cross-site scripting (XSS) attack on users.

    * 

      CVE-2012-4195: Mozilla security researcher moz_bug_r_a4 discovered
      that the CheckURL function in window.location can be forced to return
      the wrong calling document and principal, allowing a cross-site
      scripting (XSS) attack. There is also the possibility of gaining
      arbitrary code execution if the attacker can take advantage of an
      add-on that interacts with the page content.

    * 

      CVE-2012-4196: Security researcher Antoine Delignat-Lavaud of the
      PROSECCO research team at INRIA Paris reported the ability to use
      property injection by prototype to bypass security wrapper
      protections on the Location object, allowing the cross-origin reading
      of the Location object.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-10-29"/>
	<updated date="2012-10-29"/>
	<bugzilla href="https://bugzilla.suse.com/786522">SUSE bug 786522</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4194/">CVE-2012-4194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4194">CVE-2012-4194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4195/">CVE-2012-4195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4195">CVE-2012-4195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4196/">CVE-2012-4196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4196">CVE-2012-4196 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571339" comment="MozillaFirefox-10.0.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571340" comment="MozillaFirefox-translations-10.0.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571341" comment="mozilla-nspr-4.9.3-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565935" comment="mozilla-nspr-32bit-4.9.3-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217092" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="790140" ref_url="https://bugzilla.suse.com/790140" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4201" ref_url="https://www.suse.com/security/cve/CVE-2012-4201/" source="CVE"/>
		<reference ref_id="CVE-2012-4202" ref_url="https://www.suse.com/security/cve/CVE-2012-4202/" source="CVE"/>
		<reference ref_id="CVE-2012-4203" ref_url="https://www.suse.com/security/cve/CVE-2012-4203/" source="CVE"/>
		<reference ref_id="CVE-2012-4204" ref_url="https://www.suse.com/security/cve/CVE-2012-4204/" source="CVE"/>
		<reference ref_id="CVE-2012-4205" ref_url="https://www.suse.com/security/cve/CVE-2012-4205/" source="CVE"/>
		<reference ref_id="CVE-2012-4206" ref_url="https://www.suse.com/security/cve/CVE-2012-4206/" source="CVE"/>
		<reference ref_id="CVE-2012-4207" ref_url="https://www.suse.com/security/cve/CVE-2012-4207/" source="CVE"/>
		<reference ref_id="CVE-2012-4208" ref_url="https://www.suse.com/security/cve/CVE-2012-4208/" source="CVE"/>
		<reference ref_id="CVE-2012-4209" ref_url="https://www.suse.com/security/cve/CVE-2012-4209/" source="CVE"/>
		<reference ref_id="CVE-2012-4210" ref_url="https://www.suse.com/security/cve/CVE-2012-4210/" source="CVE"/>
		<reference ref_id="CVE-2012-4212" ref_url="https://www.suse.com/security/cve/CVE-2012-4212/" source="CVE"/>
		<reference ref_id="CVE-2012-4213" ref_url="https://www.suse.com/security/cve/CVE-2012-4213/" source="CVE"/>
		<reference ref_id="CVE-2012-4214" ref_url="https://www.suse.com/security/cve/CVE-2012-4214/" source="CVE"/>
		<reference ref_id="CVE-2012-4215" ref_url="https://www.suse.com/security/cve/CVE-2012-4215/" source="CVE"/>
		<reference ref_id="CVE-2012-4216" ref_url="https://www.suse.com/security/cve/CVE-2012-4216/" source="CVE"/>
		<reference ref_id="CVE-2012-4217" ref_url="https://www.suse.com/security/cve/CVE-2012-4217/" source="CVE"/>
		<reference ref_id="CVE-2012-4218" ref_url="https://www.suse.com/security/cve/CVE-2012-4218/" source="CVE"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2012-5830" ref_url="https://www.suse.com/security/cve/CVE-2012-5830/" source="CVE"/>
		<reference ref_id="CVE-2012-5833" ref_url="https://www.suse.com/security/cve/CVE-2012-5833/" source="CVE"/>
		<reference ref_id="CVE-2012-5835" ref_url="https://www.suse.com/security/cve/CVE-2012-5835/" source="CVE"/>
		<reference ref_id="CVE-2012-5836" ref_url="https://www.suse.com/security/cve/CVE-2012-5836/" source="CVE"/>
		<reference ref_id="CVE-2012-5837" ref_url="https://www.suse.com/security/cve/CVE-2012-5837/" source="CVE"/>
		<reference ref_id="CVE-2012-5838" ref_url="https://www.suse.com/security/cve/CVE-2012-5838/" source="CVE"/>
		<reference ref_id="CVE-2012-5839" ref_url="https://www.suse.com/security/cve/CVE-2012-5839/" source="CVE"/>
		<reference ref_id="CVE-2012-5840" ref_url="https://www.suse.com/security/cve/CVE-2012-5840/" source="CVE"/>
		<reference ref_id="CVE-2012-5841" ref_url="https://www.suse.com/security/cve/CVE-2012-5841/" source="CVE"/>
		<reference ref_id="CVE-2012-5842" ref_url="https://www.suse.com/security/cve/CVE-2012-5842/" source="CVE"/>
		<reference ref_id="CVE-2012-5843" ref_url="https://www.suse.com/security/cve/CVE-2012-5843/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 10.0.11 ESR security release, which 
fixes various bugs and security issues.

    * 

      MFSA 2012-106: Security researcher miaubiz used the Address Sanitizer
      tool to discover a series critically rated of use-after-free, buffer
      overflow, and memory corruption issues in shipped software. These
      issues are potentially exploitable, allowing for remote code
      execution. We would also like to thank miaubiz for reporting two
      additional use-after-free and memory corruption issues introduced
      during Firefox development that have been fixed before general
      release.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products. References

      The following issues have been fixed in Firefox 17 and ESR 10.0.11:

          o use-after-free when loading html file on osx (CVE-2012-5830)
          o Mesa crashes on certain texImage2D calls involving level&gt;0
            (CVE-2012-5833)
          o integer overflow, invalid write w/webgl bufferdata
            (CVE-2012-5835)

      The following issues have been fixed in Firefox 17:

          o crash in copyTexImage2D with image dimensions too large for
            given level (CVE-2012-5838)
    * 

      MFSA 2012-105: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team discovered a series critically rated of
      use-after-free and buffer overflow issues using the Address Sanitizer
      tool in shipped software. These issues are potentially exploitable,
      allowing for remote code execution. We would also like to thank
      Abhishek for reporting five additional use-after-free, out of bounds
      read, and buffer overflow flaws introduced during Firefox development
      that have been fixed before general release.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products. References

      The following issues have been fixed in Firefox 17 and ESR 10.0.11:

          o Heap-use-after-free in nsTextEditorState::PrepareEditor
            (CVE-2012-4214)
          o Heap-use-after-free in nsPlaintextEditor::FireClipboardEvent
            (CVE-2012-4215)
          o Heap-use-after-free in gfxFont::GetFontEntry (CVE-2012-4216)
          o Heap-buffer-overflow in nsWindow::OnExposeEvent (CVE-2012-5829)
          o heap-buffer-overflow in
            gfxShapedWord::CompressedGlyph::IsClusterStart
          o CVE-2012-5839
          o Heap-use-after-free in nsTextEditorState::PrepareEditor
            (CVE-2012-5840)

      The following issues have been fixed in Firefox 17:

          o Heap-use-after-free in XPCWrappedNative::Mark (CVE-2012-4212)
          o Heap-use-after-free in nsEditor::FindNextLeafNode
            (CVE-2012-4213)
          o Heap-use-after-free in nsViewManager::ProcessPendingUpdates
            (CVE-2012-4217)
          o Heap-use-after-free BuildTextRunsScanner::BreakSink::SetBreaks
            (CVE-2012-4218)
    * 

      MFSA 2012-104 / CVE-2012-4210: Security researcher Mariusz Mlynski
      reported that when a maliciously crafted stylesheet is inspected in
      the Style Inspector, HTML and CSS can run in a chrome privileged
      context without being properly sanitized first. This can lead to
      arbitrary code execution.

    * 

      MFSA 2012-103 / CVE-2012-4209: Security researcher Mariusz Mlynski
      reported that the location property can be accessed by binary plugins
      through top.location with a frame whose name attribute's value is set
      to 'top'. This can allow for possible cross-site scripting (XSS)
      attacks through plugins.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      MFSA 2012-102 / CVE-2012-5837: Security researcher Masato Kinugawa
      reported that when script is entered into the Developer Toolbar, it
      runs in a chrome privileged context. This allows for arbitrary code
      execution or cross-site scripting (XSS) if a user can be convinced to
      paste malicious code into the Developer Toolbar.

    * 

      MFSA 2012-101 / CVE-2012-4207: Security researcher Masato Kinugawa
      found when HZ-GB-2312 charset encoding is used for text, the '~'
      character will destroy another character near the chunk delimiter.
      This can lead to a cross-site scripting (XSS) attack in pages encoded
      in HZ-GB-2312.

    * 

      MFSA 2012-100 / CVE-2012-5841: Mozilla developer Bobby Holley
      reported that security wrappers filter at the time of property
      access, but once a function is returned, the caller can use this
      function without further security checks. This affects cross-origin
      wrappers, allowing for write actions on objects when only read
      actions should be properly allowed. This can lead to cross-site
      scripting (XSS) attacks.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      MFSA 2012-99 / CVE-2012-4208: Mozilla developer Peter Van der Beken
      discovered that same-origin XrayWrappers expose chrome-only
      properties even when not in a chrome compartment. This can allow web
      content to get properties of DOM objects that are intended to be
      chrome-only.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      MFSA 2012-98 / CVE-2012-4206: Security researcher Robert Kugler
      reported that when a specifically named DLL file on a Windows
      computer is placed in the default downloads directory with the
      Firefox installer, the Firefox installer will load this DLL when it
      is launched. In circumstances where the installer is run by an
      administrator privileged account, this allows for the downloaded DLL
      file to be run with administrator privileges. This can lead to
      arbitrary code execution from a privileged account.

    * 

      MFSA 2012-97 / CVE-2012-4205: Mozilla developer Gabor Krizsanits
      discovered that XMLHttpRequest objects created within sandboxes have
      the system principal instead of the sandbox principal. This can lead
      to cross-site request forgery (CSRF) or information theft via an
      add-on running untrusted code in a sandbox.

    * 

      MFSA 2012-96 / CVE-2012-4204: Security researcher Scott Bell of
      Security-Assessment.com used the Address Sanitizer tool to discover a
      memory corruption in str_unescape in the Javascript engine. This
      could potentially lead to arbitrary code execution.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      MFSA 2012-95 / CVE-2012-4203: Security researcher kakzz.ng@gmail.com
      reported that if a javascript: URL is selected from the list of
      Firefox 'new tab' page, the script will inherit the privileges of the
      privileged 'new tab' page. This allows for the execution of locally
      installed programs if a user can be convinced to save a bookmark of a
      malicious javascript: URL.

    * 

      MFSA 2012-94 / CVE-2012-5836: Security researcher Jonathan Stephens
      discovered that combining SVG text on a path with the setting of CSS
      properties could lead to a potentially exploitable crash.

    * 

      MFSA 2012-93 / CVE-2012-4201: Mozilla security researcher
      moz_bug_r_a4 reported that if code executed by the evalInSandbox
      function sets location.href, it can get the wrong subject principal
      for the URL check, ignoring the sandbox's Javascript context and
      gaining the context of evalInSandbox object. This can lead to
      malicious web content being able to perform a cross-site scripting
      (XSS) attack or stealing a copy of a local file if the user has
      installed an add-on vulnerable to this attack.

    * 

      MFSA 2012-92 / CVE-2012-4202: Security researcher Atte Kettunen from
      OUSPG used the Address Sanitizer tool to discover a buffer overflow
      while rendering GIF format images. This issue is potentially
      exploitable and could lead to arbitrary code execution.

    * 

      MFSA 2012-91: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products. References

      Gary Kwong, Jesse Ruderman, Christian Holler, Bob Clary, Kyle Huey,
      Ed Morley, Chris Lord, Boris Zbarsky, Julian Seward, and Bill
      McCloskey reported memory safety problems and crashes that affect
      Firefox 16. (CVE-2012-5843)

      Jesse Ruderman, Andrew McCreight, Bob Clary, and Kyle Huey reported
      memory safety problems and crashes that affect Firefox ESR 10 and
      Firefox 16. (CVE-2012-5842)

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-23"/>
	<updated date="2012-11-23"/>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4201/">CVE-2012-4201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4201">CVE-2012-4201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4202/">CVE-2012-4202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4202">CVE-2012-4202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4203/">CVE-2012-4203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4203">CVE-2012-4203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4204/">CVE-2012-4204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4204">CVE-2012-4204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4205/">CVE-2012-4205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4205">CVE-2012-4205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4206/">CVE-2012-4206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4206">CVE-2012-4206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4207/">CVE-2012-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4207">CVE-2012-4207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4208/">CVE-2012-4208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4208">CVE-2012-4208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4209/">CVE-2012-4209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4209">CVE-2012-4209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4210/">CVE-2012-4210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4210">CVE-2012-4210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4212/">CVE-2012-4212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4212">CVE-2012-4212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4213/">CVE-2012-4213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4213">CVE-2012-4213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4214/">CVE-2012-4214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4214">CVE-2012-4214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4215/">CVE-2012-4215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4215">CVE-2012-4215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4216/">CVE-2012-4216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4216">CVE-2012-4216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4217/">CVE-2012-4217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4217">CVE-2012-4217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4218/">CVE-2012-4218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4218">CVE-2012-4218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5829">CVE-2012-5829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5830/">CVE-2012-5830 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-5830">CVE-2012-5830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5833/">CVE-2012-5833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5833">CVE-2012-5833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5835/">CVE-2012-5835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5835">CVE-2012-5835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5836/">CVE-2012-5836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5836">CVE-2012-5836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5837/">CVE-2012-5837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5837">CVE-2012-5837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5838/">CVE-2012-5838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5838">CVE-2012-5838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5839/">CVE-2012-5839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5839">CVE-2012-5839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5840/">CVE-2012-5840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5840">CVE-2012-5840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5841/">CVE-2012-5841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5841">CVE-2012-5841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5842/">CVE-2012-5842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5842">CVE-2012-5842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5843/">CVE-2012-5843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5843">CVE-2012-5843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571342" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571343" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571344" comment="libfreebl3-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571345" comment="mozilla-nss-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571346" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217093" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="796628" ref_url="https://bugzilla.suse.com/796628" source="BUGZILLA"/>
		<reference ref_id="796895" ref_url="https://bugzilla.suse.com/796895" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-0744" ref_url="https://www.suse.com/security/cve/CVE-2013-0744/" source="CVE"/>
		<reference ref_id="CVE-2013-0745" ref_url="https://www.suse.com/security/cve/CVE-2013-0745/" source="CVE"/>
		<reference ref_id="CVE-2013-0746" ref_url="https://www.suse.com/security/cve/CVE-2013-0746/" source="CVE"/>
		<reference ref_id="CVE-2013-0747" ref_url="https://www.suse.com/security/cve/CVE-2013-0747/" source="CVE"/>
		<reference ref_id="CVE-2013-0748" ref_url="https://www.suse.com/security/cve/CVE-2013-0748/" source="CVE"/>
		<reference ref_id="CVE-2013-0749" ref_url="https://www.suse.com/security/cve/CVE-2013-0749/" source="CVE"/>
		<reference ref_id="CVE-2013-0750" ref_url="https://www.suse.com/security/cve/CVE-2013-0750/" source="CVE"/>
		<reference ref_id="CVE-2013-0751" ref_url="https://www.suse.com/security/cve/CVE-2013-0751/" source="CVE"/>
		<reference ref_id="CVE-2013-0752" ref_url="https://www.suse.com/security/cve/CVE-2013-0752/" source="CVE"/>
		<reference ref_id="CVE-2013-0753" ref_url="https://www.suse.com/security/cve/CVE-2013-0753/" source="CVE"/>
		<reference ref_id="CVE-2013-0754" ref_url="https://www.suse.com/security/cve/CVE-2013-0754/" source="CVE"/>
		<reference ref_id="CVE-2013-0755" ref_url="https://www.suse.com/security/cve/CVE-2013-0755/" source="CVE"/>
		<reference ref_id="CVE-2013-0756" ref_url="https://www.suse.com/security/cve/CVE-2013-0756/" source="CVE"/>
		<reference ref_id="CVE-2013-0757" ref_url="https://www.suse.com/security/cve/CVE-2013-0757/" source="CVE"/>
		<reference ref_id="CVE-2013-0758" ref_url="https://www.suse.com/security/cve/CVE-2013-0758/" source="CVE"/>
		<reference ref_id="CVE-2013-0759" ref_url="https://www.suse.com/security/cve/CVE-2013-0759/" source="CVE"/>
		<reference ref_id="CVE-2013-0760" ref_url="https://www.suse.com/security/cve/CVE-2013-0760/" source="CVE"/>
		<reference ref_id="CVE-2013-0761" ref_url="https://www.suse.com/security/cve/CVE-2013-0761/" source="CVE"/>
		<reference ref_id="CVE-2013-0762" ref_url="https://www.suse.com/security/cve/CVE-2013-0762/" source="CVE"/>
		<reference ref_id="CVE-2013-0763" ref_url="https://www.suse.com/security/cve/CVE-2013-0763/" source="CVE"/>
		<reference ref_id="CVE-2013-0764" ref_url="https://www.suse.com/security/cve/CVE-2013-0764/" source="CVE"/>
		<reference ref_id="CVE-2013-0766" ref_url="https://www.suse.com/security/cve/CVE-2013-0766/" source="CVE"/>
		<reference ref_id="CVE-2013-0767" ref_url="https://www.suse.com/security/cve/CVE-2013-0767/" source="CVE"/>
		<reference ref_id="CVE-2013-0768" ref_url="https://www.suse.com/security/cve/CVE-2013-0768/" source="CVE"/>
		<reference ref_id="CVE-2013-0769" ref_url="https://www.suse.com/security/cve/CVE-2013-0769/" source="CVE"/>
		<reference ref_id="CVE-2013-0770" ref_url="https://www.suse.com/security/cve/CVE-2013-0770/" source="CVE"/>
		<reference ref_id="CVE-2013-0771" ref_url="https://www.suse.com/security/cve/CVE-2013-0771/" source="CVE"/>
		<description>

Mozilla Firefox was updated to the 10.0.12ESR release.

    * 

      MFSA 2013-01: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

          o Christoph Diehl, Christian Holler, Mats Palmgren, and Chiaki
            Ishikawa reported memory safety problems and crashes that
            affect Firefox ESR 10, Firefox ESR 17, and Firefox 17. (
            CVE-2013-0769
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769&gt; 
            )
          o Bill Gianopoulos, Benoit Jacob, Christoph Diehl, Christian
            Holler, Gary Kwong, Robert O'Callahan, and Scoobidiver reported
            memory safety problems and crashes that affect Firefox ESR 17
            and Firefox 17. (CVE-2013-0749
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0749&gt; 
            )
          o Jesse Ruderman, Christian Holler, Julian Seward, and
            Scoobidiver reported memory safety problems and crashes that
            affect Firefox 17. (CVE-2013-0770
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0770&gt; 
            )
    * 

      MFSA 2013-02: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team discovered a series critically rated of
      use-after-free, out of bounds read, and buffer overflow issues using
      the Address Sanitizer tool in shipped software. These issues are
      potentially exploitable, allowing for remote code execution. We would
      also like to thank Abhishek for reporting three additional
      user-after-free and out of bounds read flaws introduced during
      Firefox development that were fixed before general release.

      The following issue was fixed in Firefox 18:

          o Global-buffer-overflow in
            CharDistributionAnalysis::HandleOneChar (CVE-2013-0760
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0760&gt; 
            )

      The following issues were fixed in Firefox 18, ESR 17.0.1, and ESR
      10.0.12:

          o Heap-use-after-free in imgRequest::OnStopFrame (CVE-2013-0762
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762&gt; 
            )
          o Heap-use-after-free in ~nsHTMLEditRules (CVE-2013-0766
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766&gt; 
            )
          o Out of bounds read in nsSVGPathElement::GetPathLengthScale (
            CVE-2013-0767
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767&gt; 
            )

      The following issues were fixed in Firefox 18 and ESR 17.0.1:

          o Heap-use-after-free in mozilla::TrackUnionStream::EndTrack (
            CVE-2013-0761
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0761&gt; 
            )
          o Heap-use-after-free in Mesa, triggerable by resizing a WebGL
            canvas (CVE-2013-0763
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0763&gt; 
            )
          o Heap-buffer-overflow in gfxTextRun::ShrinkToLigatureBoundaries
            (CVE-2013-0771
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0771&gt; 
            )

      The following issue was fixed in Firefox 18 and in the earlier ESR
      10.0.11 release:

          o Heap-buffer-overflow in nsWindow::OnExposeEvent (CVE-2012-5829
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5829&gt; 
            )
    * 

      MFSA 2013-03: Security researcher miaubiz used the Address Sanitizer
      tool to discover a buffer overflow in Canvas when specific bad height
      and width values were given through HTML. This could lead to a
      potentially exploitable crash. (CVE-2013-0768
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0768&gt; )

      Miaubiz also found a potentially exploitable crash when 2D and 3D
      content was mixed which was introduced during Firefox development and
      fixed before general release.

    * 

      MFSA 2013-04: Security researcher Masato Kinugawa found a flaw in
      which the displayed URL values within the addressbar can be spoofed
      by a page during loading. This allows for phishing attacks where a
      malicious page can spoof the identify of another site. (
      CVE-2013-0759
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0759&gt; )

    * 

      MFSA 2013-05: Using the Address Sanitizer tool, security researcher
      Atte Kettunen from OUSPG discovered that the combination of large
      numbers of columns and column groups in a table could cause the array
      containing the columns during rendering to overwrite itself. This can
      lead to a user-after-free causing a potentially exploitable crash. (
      CVE-2013-0744
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744&gt; )

    * 

      MFSA 2013-06: Mozilla developer Wesley Johnston reported that when
      there are two or more iframes on the same HTML page, an iframe is
      able to see the touch events and their targets that occur within the
      other iframes on the page. If the iframes are from the same origin,
      they can also access the properties and methods of the targets of
      other iframes but same-origin policy (SOP) restricts access across
      domains. This allows for information leakage and possibilities for
      cross-site scripting (XSS) if another vulnerability can be used to
      get around SOP restrictions. (CVE-2013-0751
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0751&gt; )

    * 

      MFSA 2013-07: Mozilla community member Jerry Baker reported a
      crashing issue found through Thunderbird when downloading messages
      over a Secure Sockets Layer (SSL) connection. This was caused by a
      bug in the networking code assuming that secure connections were
      entirely handled on the socket transport thread when they can occur
      on a variety of threads. The resulting crash was potentially
      exploitable. (CVE-2013-0764
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0764&gt; )

    * 

      MFSA 2013-08: Mozilla developer Olli Pettay discovered that the
      AutoWrapperChanger class fails to keep some javascript objects alive
      during garbage collection. This can lead to an exploitable crash
      allowing for arbitrary code execution. (CVE-2013-0745
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0745&gt; )

    * 

      MFSA 2013-09: Mozilla developer Boris Zbarsky reported reported a
      problem where jsval-returning quickstubs fail to wrap their return
      values, causing a compartment mismatch. This mismatch can cause
      garbage collection to occur incorrectly and lead to a potentially
      exploitable crash. (CVE-2013-0746
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746&gt; )

    * 

      MFSA 2013-10: Mozilla security researcher Jesse Ruderman reported
      that events in the plugin handler can be manipulated by web content
      to bypass same-origin policy (SOP) restrictions. This can allow for
      clickjacking on malicious web pages. (CVE-2013-0747
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0747&gt; )

    * 

      MFSA 2013-11: Mozilla security researcher Jesse Ruderman discovered
      that using the toString function of XBL objects can lead to
      inappropriate information leakage by revealing the address space
      layout instead of just the ID of the object. This layout information
      could potentially be used to bypass ASLR and other security
      protections. (CVE-2013-0748
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748&gt; )

    * 

      MFSA 2013-12: Security researcher pa_kt reported a flaw via
      TippingPoint's Zero Day Initiative that an integer overflow is
      possible when calculating the length for a Javascript string
      concatenation, which is then used for memory allocation. This results
      in a buffer overflow, leading to a potentially exploitable memory
      corruption. (CVE-2013-0750
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750&gt; )

    * 

      MFSA 2013-13: Security researcher Sviatoslav Chagaev reported that
      when using an XBL file containing multiple XML bindings with SVG
      content, a memory corruption can occur. In concern with remote XUL,
      this can lead to an exploitable crash. (CVE-2013-0752
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0752&gt; )

    * 

      MFSA 2013-14: Security researcher Mariusz Mlynski reported that it is
      possible to change the prototype of an object and bypass Chrome
      Object Wrappers (COW) to gain access to chrome privileged functions.
      This could allow for arbitrary code execution. (CVE-2013-0757
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0757&gt; )

    * 

      MFSA 2013-15: Security researcher Mariusz Mlynski reported that it is
      possible to open a chrome privileged web page through plugin objects
      through interaction with SVG elements. This could allow for arbitrary
      code execution. (CVE-2013-0758
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758&gt; )

    * 

      MFSA 2013-16: Security researcher regenrecht reported, via
      TippingPoint's Zero Day Initiative, a use-after-free in XMLSerializer
      by the exposing of serializeToStream to web content. This can lead to
      arbitrary code execution when exploited. (CVE-2013-0753
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753&gt; )

    * 

      MFSA 2013-17: Security researcher regenrecht reported, via
      TippingPoint's Zero Day Initiative, a use-after-free within the
      ListenerManager when garbage collection is forced after data in
      listener objects have been allocated in some circumstances. This
      results in a use-after-free which can lead to arbitrary code
      execution. (CVE-2013-0754
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754&gt; )

    * 

      MFSA 2013-18: Security researcher regenrecht reported, via
      TippingPoint's Zero Day Initiative, a use-after-free using the domDoc
      pointer within Vibrate library. This can lead to arbitrary code
      execution when exploited. (CVE-2013-0755
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0755&gt; )

    * 

      MFSA 2013-19: Security researcher regenrecht reported, via
      TippingPoint's Zero Day Initiative, a garbage collection flaw in
      Javascript Proxy objects. This can lead to a use-after-free leading
      to arbitrary code execution. (CVE-2013-0756
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0756&gt; )

    * 

      MFSA 2013-20: Google reported to Mozilla that TURKTRUST, a
      certificate authority in Mozilla's root program, had mis-issued two
      intermediate certificates to customers. The issue was not specific to
      Firefox but there was evidence that one of the certificates was used
      for man-in-the-middle (MITM) traffic management of domain names that
      the customer did not legitimately own or control. This issue was
      resolved by revoking the trust for these specific mis-issued
      certificates. (CVE-2013-0743
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743&gt; )

		</description>
<advisory from="security@suse.de">
	<issued date="2013-01-10"/>
	<updated date="2013-01-10"/>
	<bugzilla href="https://bugzilla.suse.com/796628">SUSE bug 796628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5829">CVE-2012-5829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0743">CVE-2013-0743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0744/">CVE-2013-0744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0744">CVE-2013-0744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0745/">CVE-2013-0745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0745">CVE-2013-0745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0746/">CVE-2013-0746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0746">CVE-2013-0746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0747/">CVE-2013-0747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0747">CVE-2013-0747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0748/">CVE-2013-0748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0748">CVE-2013-0748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0749/">CVE-2013-0749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0749">CVE-2013-0749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0750/">CVE-2013-0750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0750">CVE-2013-0750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0751/">CVE-2013-0751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0751">CVE-2013-0751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0752/">CVE-2013-0752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0752">CVE-2013-0752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0753/">CVE-2013-0753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0753">CVE-2013-0753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0754/">CVE-2013-0754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0754">CVE-2013-0754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0755/">CVE-2013-0755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0755">CVE-2013-0755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0756/">CVE-2013-0756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0756">CVE-2013-0756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0757/">CVE-2013-0757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0757">CVE-2013-0757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0758/">CVE-2013-0758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0758">CVE-2013-0758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0759/">CVE-2013-0759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0759">CVE-2013-0759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0760/">CVE-2013-0760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0760">CVE-2013-0760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0761/">CVE-2013-0761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0761">CVE-2013-0761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0762/">CVE-2013-0762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0762">CVE-2013-0762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0763/">CVE-2013-0763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0763">CVE-2013-0763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0764/">CVE-2013-0764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0764">CVE-2013-0764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0766/">CVE-2013-0766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0766">CVE-2013-0766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0767/">CVE-2013-0767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0767">CVE-2013-0767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0768/">CVE-2013-0768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0768">CVE-2013-0768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0769/">CVE-2013-0769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0769">CVE-2013-0769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0770/">CVE-2013-0770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0770">CVE-2013-0770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0771/">CVE-2013-0771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0771">CVE-2013-0771 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571347" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571348" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571349" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571350" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571351" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571352" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217094" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="796895" ref_url="https://bugzilla.suse.com/796895" source="BUGZILLA"/>
		<reference ref_id="803326" ref_url="https://bugzilla.suse.com/803326" source="BUGZILLA"/>
		<reference ref_id="804248" ref_url="https://bugzilla.suse.com/804248" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-0744" ref_url="https://www.suse.com/security/cve/CVE-2013-0744/" source="CVE"/>
		<reference ref_id="CVE-2013-0745" ref_url="https://www.suse.com/security/cve/CVE-2013-0745/" source="CVE"/>
		<reference ref_id="CVE-2013-0746" ref_url="https://www.suse.com/security/cve/CVE-2013-0746/" source="CVE"/>
		<reference ref_id="CVE-2013-0747" ref_url="https://www.suse.com/security/cve/CVE-2013-0747/" source="CVE"/>
		<reference ref_id="CVE-2013-0748" ref_url="https://www.suse.com/security/cve/CVE-2013-0748/" source="CVE"/>
		<reference ref_id="CVE-2013-0749" ref_url="https://www.suse.com/security/cve/CVE-2013-0749/" source="CVE"/>
		<reference ref_id="CVE-2013-0750" ref_url="https://www.suse.com/security/cve/CVE-2013-0750/" source="CVE"/>
		<reference ref_id="CVE-2013-0751" ref_url="https://www.suse.com/security/cve/CVE-2013-0751/" source="CVE"/>
		<reference ref_id="CVE-2013-0752" ref_url="https://www.suse.com/security/cve/CVE-2013-0752/" source="CVE"/>
		<reference ref_id="CVE-2013-0753" ref_url="https://www.suse.com/security/cve/CVE-2013-0753/" source="CVE"/>
		<reference ref_id="CVE-2013-0754" ref_url="https://www.suse.com/security/cve/CVE-2013-0754/" source="CVE"/>
		<reference ref_id="CVE-2013-0755" ref_url="https://www.suse.com/security/cve/CVE-2013-0755/" source="CVE"/>
		<reference ref_id="CVE-2013-0756" ref_url="https://www.suse.com/security/cve/CVE-2013-0756/" source="CVE"/>
		<reference ref_id="CVE-2013-0757" ref_url="https://www.suse.com/security/cve/CVE-2013-0757/" source="CVE"/>
		<reference ref_id="CVE-2013-0758" ref_url="https://www.suse.com/security/cve/CVE-2013-0758/" source="CVE"/>
		<reference ref_id="CVE-2013-0759" ref_url="https://www.suse.com/security/cve/CVE-2013-0759/" source="CVE"/>
		<reference ref_id="CVE-2013-0760" ref_url="https://www.suse.com/security/cve/CVE-2013-0760/" source="CVE"/>
		<reference ref_id="CVE-2013-0761" ref_url="https://www.suse.com/security/cve/CVE-2013-0761/" source="CVE"/>
		<reference ref_id="CVE-2013-0762" ref_url="https://www.suse.com/security/cve/CVE-2013-0762/" source="CVE"/>
		<reference ref_id="CVE-2013-0763" ref_url="https://www.suse.com/security/cve/CVE-2013-0763/" source="CVE"/>
		<reference ref_id="CVE-2013-0764" ref_url="https://www.suse.com/security/cve/CVE-2013-0764/" source="CVE"/>
		<reference ref_id="CVE-2013-0765" ref_url="https://www.suse.com/security/cve/CVE-2013-0765/" source="CVE"/>
		<reference ref_id="CVE-2013-0766" ref_url="https://www.suse.com/security/cve/CVE-2013-0766/" source="CVE"/>
		<reference ref_id="CVE-2013-0767" ref_url="https://www.suse.com/security/cve/CVE-2013-0767/" source="CVE"/>
		<reference ref_id="CVE-2013-0768" ref_url="https://www.suse.com/security/cve/CVE-2013-0768/" source="CVE"/>
		<reference ref_id="CVE-2013-0769" ref_url="https://www.suse.com/security/cve/CVE-2013-0769/" source="CVE"/>
		<reference ref_id="CVE-2013-0770" ref_url="https://www.suse.com/security/cve/CVE-2013-0770/" source="CVE"/>
		<reference ref_id="CVE-2013-0771" ref_url="https://www.suse.com/security/cve/CVE-2013-0771/" source="CVE"/>
		<reference ref_id="CVE-2013-0772" ref_url="https://www.suse.com/security/cve/CVE-2013-0772/" source="CVE"/>
		<reference ref_id="CVE-2013-0773" ref_url="https://www.suse.com/security/cve/CVE-2013-0773/" source="CVE"/>
		<reference ref_id="CVE-2013-0774" ref_url="https://www.suse.com/security/cve/CVE-2013-0774/" source="CVE"/>
		<reference ref_id="CVE-2013-0775" ref_url="https://www.suse.com/security/cve/CVE-2013-0775/" source="CVE"/>
		<reference ref_id="CVE-2013-0776" ref_url="https://www.suse.com/security/cve/CVE-2013-0776/" source="CVE"/>
		<reference ref_id="CVE-2013-0780" ref_url="https://www.suse.com/security/cve/CVE-2013-0780/" source="CVE"/>
		<reference ref_id="CVE-2013-0782" ref_url="https://www.suse.com/security/cve/CVE-2013-0782/" source="CVE"/>
		<reference ref_id="CVE-2013-0783" ref_url="https://www.suse.com/security/cve/CVE-2013-0783/" source="CVE"/>
		<description>

MozillaFirefox has been updated to the 17.0.3ESR release.

Besides the major version update from the 10ESR stable release line to the 
17ESR stable release line, this update brings critical security and 
bugfixes:

    * 

      MFSA 2013-28: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team used the Address Sanitizer tool to
      discover a series of use-after-free, out of bounds read, and buffer
      overflow problems rated as low to critical security issues in shipped
      software. Some of these issues are potentially exploitable, allowing
      for remote code execution. We would also like to thank Abhishek for
      reporting four additional use-after-free and out of bounds write
      flaws introduced during Firefox development that were fixed before
      general release.

    * 

      The following issues have been fixed in Firefox 19 and ESR 17.0.3:

          o Heap-use-after-free in nsOverflowContinuationTracker::Finish,
            with -moz-columns (CVE-2013-0780)
          o Heap-buffer-overflow WRITE in
            nsSaveAsCharset::DoCharsetConversion (CVE-2013-0782)
    * 

      MFSA 2013-27 / CVE-2013-0776: Google security researcher Michal
      Zalewski reported an issue where the browser displayed the content of
      a proxy's 407 response if a user canceled the proxy's authentication
      prompt. In this circumstance, the addressbar will continue to show
      the requested site's address, including HTTPS addresses that appear
      to be secure. This spoofing of addresses can be used for phishing
      attacks by fooling users into entering credentials, for example.

    * 

      MFSA 2013-26 / CVE-2013-0775: Security researcher Nils reported a
      use-after-free in nsImageLoadingContent when content script is
      executed. This could allow for arbitrary code execution.

    * 

      MFSA 2013-25 / CVE-2013-0774: Mozilla security researcher Frederik
      Braun discovered that since Firefox 15 the file system location of
      the active browser profile was available to JavaScript workers. While
      not dangerous by itself, this could potentially be combined with
      other vulnerabilities to target the profile in an attack.

    * 

      MFSA 2013-24 / CVE-2013-0773: Mozilla developer Bobby Holley
      discovered that it was possible to bypass some protections in Chrome
      Object Wrappers (COW) and System Only Wrappers (SOW), making their
      prototypes mutable by web content. This could be used leak
      information from chrome objects and possibly allow for arbitrary code
      execution.

    * 

      MFSA 2013-23 / CVE-2013-0765: Mozilla developer Boris Zbarsky
      reported that in some circumstances a wrapped WebIDL object can be
      wrapped multiple times, overwriting the existing wrapped state. This
      could lead to an exploitable condition in rare cases.

    * 

      MFSA 2013-22 / CVE-2013-0772: Using the Address Sanitizer tool,
      security researcher Atte Kettunen from OUSPG found an out-of-bounds
      read while rendering GIF format images. This could cause a
      non-exploitable crash and could also attempt to render normally
      inaccesible data as part of the image.

    * 

      MFSA 2013-21: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Olli Pettay, Christoph Diehl, Gary Kwong, Jesse Ruderman, Andrew
      McCreight, Joe Drew, and Wayne Mery reported memory safety problems
      and crashes that affect Firefox ESR 17, and Firefox 18.

    * 

      Memory safety bugs fixed in Firefox ESR 17.0.3, and Firefox 19
      (CVE-2013-0783)

		</description>
<advisory from="security@suse.de">
	<issued date="2013-02-25"/>
	<updated date="2013-02-25"/>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803326">SUSE bug 803326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5829">CVE-2012-5829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0743">CVE-2013-0743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0744/">CVE-2013-0744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0744">CVE-2013-0744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0745/">CVE-2013-0745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0745">CVE-2013-0745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0746/">CVE-2013-0746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0746">CVE-2013-0746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0747/">CVE-2013-0747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0747">CVE-2013-0747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0748/">CVE-2013-0748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0748">CVE-2013-0748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0749/">CVE-2013-0749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0749">CVE-2013-0749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0750/">CVE-2013-0750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0750">CVE-2013-0750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0751/">CVE-2013-0751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0751">CVE-2013-0751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0752/">CVE-2013-0752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0752">CVE-2013-0752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0753/">CVE-2013-0753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0753">CVE-2013-0753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0754/">CVE-2013-0754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0754">CVE-2013-0754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0755/">CVE-2013-0755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0755">CVE-2013-0755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0756/">CVE-2013-0756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0756">CVE-2013-0756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0757/">CVE-2013-0757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0757">CVE-2013-0757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0758/">CVE-2013-0758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0758">CVE-2013-0758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0759/">CVE-2013-0759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0759">CVE-2013-0759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0760/">CVE-2013-0760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0760">CVE-2013-0760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0761/">CVE-2013-0761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0761">CVE-2013-0761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0762/">CVE-2013-0762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0762">CVE-2013-0762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0763/">CVE-2013-0763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0763">CVE-2013-0763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0764/">CVE-2013-0764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0764">CVE-2013-0764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0765/">CVE-2013-0765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0765">CVE-2013-0765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0766/">CVE-2013-0766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0766">CVE-2013-0766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0767/">CVE-2013-0767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0767">CVE-2013-0767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0768/">CVE-2013-0768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0768">CVE-2013-0768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0769/">CVE-2013-0769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0769">CVE-2013-0769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0770/">CVE-2013-0770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0770">CVE-2013-0770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0771/">CVE-2013-0771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0771">CVE-2013-0771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0772/">CVE-2013-0772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0772">CVE-2013-0772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0773/">CVE-2013-0773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0773">CVE-2013-0773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0774/">CVE-2013-0774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0774">CVE-2013-0774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0775/">CVE-2013-0775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0775">CVE-2013-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0776/">CVE-2013-0776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0776">CVE-2013-0776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0780/">CVE-2013-0780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0780">CVE-2013-0780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0782/">CVE-2013-0782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0782">CVE-2013-0782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0783/">CVE-2013-0783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0783">CVE-2013-0783 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009590759" comment="MozillaFirefox-17.0.3esr-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590760" comment="MozillaFirefox-branding-SLED-7-0.6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590761" comment="MozillaFirefox-translations-17.0.3esr-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571356" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571357" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590762" comment="mozilla-nspr-4.9.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590325" comment="mozilla-nspr-32bit-4.9.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590763" comment="mozilla-nss-3.14.2-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590326" comment="mozilla-nss-32bit-3.14.2-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590764" comment="mozilla-nss-tools-3.14.2-0.4.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009590759" comment="MozillaFirefox-17.0.3esr-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590760" comment="MozillaFirefox-branding-SLED-7-0.6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590761" comment="MozillaFirefox-translations-17.0.3esr-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571356" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571357" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590762" comment="mozilla-nspr-4.9.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590325" comment="mozilla-nspr-32bit-4.9.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590763" comment="mozilla-nss-3.14.2-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590326" comment="mozilla-nss-32bit-3.14.2-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590764" comment="mozilla-nss-tools-3.14.2-0.4.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217095" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="808243" ref_url="https://bugzilla.suse.com/808243" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0787" ref_url="https://www.suse.com/security/cve/CVE-2013-0787/" source="CVE"/>
		<description>

MozillaFirefox has been updated to the 17.0.4ESR release which fixes one 
important security issue:

    * MFSA 2013-29 / CVE-2013-0787: VUPEN Security, via TippingPoint's Zero
      Day Initiative, reported a use-after-free within the HTML editor when
      content script is run by the document.execCommand() function while
      internal editor operations are occurring. This could allow for
      arbitrary code execution.

Security Issue reference:

    * CVE-2013-0787
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0787&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-11"/>
	<updated date="2013-03-11"/>
	<bugzilla href="https://bugzilla.suse.com/808243">SUSE bug 808243</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0787/">CVE-2013-0787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0787">CVE-2013-0787 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571363" comment="MozillaFirefox-17.0.4esr-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571364" comment="MozillaFirefox-translations-17.0.4esr-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217096" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="813026" ref_url="https://bugzilla.suse.com/813026" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788/" source="CVE"/>
		<reference ref_id="CVE-2013-0789" ref_url="https://www.suse.com/security/cve/CVE-2013-0789/" source="CVE"/>
		<reference ref_id="CVE-2013-0790" ref_url="https://www.suse.com/security/cve/CVE-2013-0790/" source="CVE"/>
		<reference ref_id="CVE-2013-0791" ref_url="https://www.suse.com/security/cve/CVE-2013-0791/" source="CVE"/>
		<reference ref_id="CVE-2013-0792" ref_url="https://www.suse.com/security/cve/CVE-2013-0792/" source="CVE"/>
		<reference ref_id="CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794/" source="CVE"/>
		<reference ref_id="CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795/" source="CVE"/>
		<reference ref_id="CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796/" source="CVE"/>
		<reference ref_id="CVE-2013-0797" ref_url="https://www.suse.com/security/cve/CVE-2013-0797/" source="CVE"/>
		<reference ref_id="CVE-2013-0798" ref_url="https://www.suse.com/security/cve/CVE-2013-0798/" source="CVE"/>
		<reference ref_id="CVE-2013-0799" ref_url="https://www.suse.com/security/cve/CVE-2013-0799/" source="CVE"/>
		<reference ref_id="CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800/" source="CVE"/>
		<description>

MozillaFirefox has been updated to the 17.0.5ESR release fixing bugs and 
security issues.

Also Mozilla NSS has been updated to version 3.14.3 and Mozilla NSPR to 
4.9.6.

    * 

      MFSA 2013-30: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan
      Sreckovic, and Joe Drew reported memory safety problems and crashes
      that affect Firefox ESR 17, and Firefox 19. (CVE-2013-0788)

      Andrew McCreight, Randell Jesup, Gary Kwong, Jesse Ruderman,
      Christian Holler, and Mats Palmgren reported memory safety problems
      and crashes that affect Firefox 19. (CVE-2013-0789)

      Jim Chen reported a memory safety problem that affects Firefox for
      Android 19. (CVE-2013-0790)

    * 

      MFSA 2013-31 / CVE-2013-0800: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover an out-of-bounds write in Cairo graphics
      library. When certain values are passed to it during rendering, Cairo
      attempts to use negative boundaries or sizes for boxes, leading to a
      potentially exploitable crash in some instances.

    * 

      MFSA 2013-32 / CVE-2013-0799: Security researcher Frederic Hoguin
      discovered that the Mozilla Maintenance Service on Windows was
      vulnerable to a buffer overflow. This system is used to update
      software without invoking the User Account Control (UAC) prompt. The
      Mozilla Maintenance Service is configured to allow unprivileged users
      to start it with arbitrary arguments. By manipulating the data passed
      in these arguments, an attacker can execute arbitrary code with the
      system privileges used by the service. This issue requires local file
      system access to be exploitable.

    * 

      MFSA 2013-33 / CVE-2013-0798: Security researcher Shuichiro Suzuki of
      the Fourteenforty Research Institute reported the app_tmp directory
      is set to be world readable and writeable by Firefox for Android.
      This potentially allows for third party applications to replace or
      alter Firefox add-ons when downloaded because they are temporarily
      stored in the app_tmp directory before installation.

      This vulnerability only affects Firefox for Android.

    * 

      MFSA 2013-34 / CVE-2013-0797: Security researcher Ash reported an
      issue with the Mozilla Updater. The Mozilla Updater can be made to
      load a malicious local DLL file in a privileged context through
      either the Mozilla Maintenance Service or independently on systems
      that do not use the service. This occurs when the DLL file is placed
      in a specific location on the local system before the Mozilla Updater
      is run. Local file system access is necessary in order for this issue
      to be exploitable.

    * 

      MFSA 2013-35 / CVE-2013-0796: Security researcher miaubiz used the
      Address Sanitizer tool to discover a crash in WebGL rendering when
      memory is freed that has not previously been allocated. This issue
      only affects Linux users who have Intel Mesa graphics drivers. The
      resulting crash could be potentially exploitable.

    * 

      MFSA 2013-36 / CVE-2013-0795: Security researcher Cody Crews reported
      a mechanism to use the cloneNode method to bypass System Only
      Wrappers (SOW) and clone a protected node. This allows violation of
      the browser's same origin policy and could also lead to privilege
      escalation and the execution of arbitrary code.

    * 

      MFSA 2013-37 / CVE-2013-0794: Security researcher shutdown reported a
      method for removing the origin indication on tab-modal dialog boxes
      in combination with browser navigation. This could allow an
      attacker's dialog to overlay a page and show another site's content.
      This can be used for phishing by allowing users to enter data into a
      modal prompt dialog on an attacking, site while appearing to be from
      the displayed site.

    * 

      MFSA 2013-38 / CVE-2013-079: Security researcher Mariusz Mlynski
      reported a method to use browser navigations through history to load
      an arbitrary website with that page's baseURI property pointing to
      another site instead of the seemingly loaded one. The user will
      continue to see the incorrect site in the addressbar of the browser.
      This allows for a cross-site scripting (XSS) attack or the theft of
      data through a phishing attack.

    * 

      MFSA 2013-39 / CVE-2013-0792: Mozilla community member Tobias Schula
      reported that if gfx.color_management.enablev4 preference is enabled
      manually in about:config, some grayscale PNG images will be rendered
      incorrectly and cause memory corruption during PNG decoding when
      certain color profiles are in use. A crafted PNG image could use this
      flaw to leak data through rendered images drawing from random memory.
      By default, this preference is not enabled.

    * 

      MFSA 2013-40 / CVE-2013-0791: Mozilla community member Ambroz Bizjak
      reported an out-of-bounds array read in the CERT_DecodeCertPackage
      function of the Network Security Services (NSS) libary when decoding
      a certificate. When this occurs, it will lead to memory corruption
      and a non-exploitable crash.

Security Issue references:

    * CVE-2013-0788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788&gt;
    * CVE-2013-0789
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0789&gt;
    * CVE-2013-0790
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0790&gt;
    * CVE-2013-0791
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791&gt;
    * CVE-2013-0792
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0792&gt;
    * CVE-2013-0794
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0794&gt;
    * CVE-2013-0795
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795&gt;
    * CVE-2013-0796
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796&gt;
    * CVE-2013-0797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0797&gt;
    * CVE-2013-0798
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0798&gt;
    * CVE-2013-0799
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0799&gt;
    * CVE-2013-0800
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-04-04"/>
	<updated date="2013-04-04"/>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0788">CVE-2013-0788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0789/">CVE-2013-0789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0789">CVE-2013-0789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0790/">CVE-2013-0790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0790">CVE-2013-0790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0791/">CVE-2013-0791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0791">CVE-2013-0791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0792/">CVE-2013-0792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0792">CVE-2013-0792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0794">CVE-2013-0794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0795">CVE-2013-0795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0796">CVE-2013-0796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0797/">CVE-2013-0797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0797">CVE-2013-0797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0798/">CVE-2013-0798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0798">CVE-2013-0798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0799/">CVE-2013-0799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0799">CVE-2013-0799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0800">CVE-2013-0800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571365" comment="MozillaFirefox-17.0.5esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571366" comment="MozillaFirefox-branding-SLED-7-0.6.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571367" comment="MozillaFirefox-translations-17.0.5esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571368" comment="libfreebl3-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565972" comment="libfreebl3-32bit-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571369" comment="mozilla-nspr-4.9.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565974" comment="mozilla-nspr-32bit-4.9.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571370" comment="mozilla-nss-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565976" comment="mozilla-nss-32bit-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571371" comment="mozilla-nss-tools-3.14.3-0.4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217097" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="792432" ref_url="https://bugzilla.suse.com/792432" source="BUGZILLA"/>
		<reference ref_id="819204" ref_url="https://bugzilla.suse.com/819204" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788/" source="CVE"/>
		<reference ref_id="CVE-2013-0791" ref_url="https://www.suse.com/security/cve/CVE-2013-0791/" source="CVE"/>
		<reference ref_id="CVE-2013-0792" ref_url="https://www.suse.com/security/cve/CVE-2013-0792/" source="CVE"/>
		<reference ref_id="CVE-2013-0793" ref_url="https://www.suse.com/security/cve/CVE-2013-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794/" source="CVE"/>
		<reference ref_id="CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795/" source="CVE"/>
		<reference ref_id="CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796/" source="CVE"/>
		<reference ref_id="CVE-2013-0797" ref_url="https://www.suse.com/security/cve/CVE-2013-0797/" source="CVE"/>
		<reference ref_id="CVE-2013-0799" ref_url="https://www.suse.com/security/cve/CVE-2013-0799/" source="CVE"/>
		<reference ref_id="CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 17.0.6ESR security release.

    * 

      MFSA 2013-30: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan
      Sreckovic, and Joe Drew reported memory safety problems and crashes
      that affect Firefox ESR 17, and Firefox 19. (CVE-2013-0788)

    * 

      MFSA 2013-31 / CVE-2013-0800: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover an out-of-bounds write in Cairo graphics
      library. When certain values are passed to it during rendering, Cairo
      attempts to use negative boundaries or sizes for boxes, leading to a
      potentially exploitable crash in some instances.

    * 

      MFSA 2013-32 / CVE-2013-0799: Security researcher Frederic Hoguin
      discovered that the Mozilla Maintenance Service on Windows was
      vulnerable to a buffer overflow. This system is used to update
      software without invoking the User Account Control (UAC) prompt. The
      Mozilla Maintenance Service is configured to allow unprivileged users
      to start it with arbitrary arguments. By manipulating the data passed
      in these arguments, an attacker can execute arbitrary code with the
      system privileges used by the service. This issue requires local file
      system access to be exploitable.

    * 

      MFSA 2013-34 / CVE-2013-0797: Security researcher Ash reported an
      issue with the Mozilla Updater. The Mozilla Updater can be made to
      load a malicious local DLL file in a privileged context through
      either the Mozilla Maintenance Service or independently on systems
      that do not use the service. This occurs when the DLL file is placed
      in a specific location on the local system before the Mozilla Updater
      is run. Local file system access is necessary in order for this issue
      to be exploitable.

    * 

      MFSA 2013-35 / CVE-2013-0796: Security researcher miaubiz used the
      Address Sanitizer tool to discover a crash in WebGL rendering when
      memory is freed that has not previously been allocated. This issue
      only affects Linux users who have Intel Mesa graphics drivers. The
      resulting crash could be potentially exploitable.

    * 

      MFSA 2013-36 / CVE-2013-0795: Security researcher Cody Crews reported
      a mechanism to use the cloneNode method to bypass System Only
      Wrappers (SOW) and clone a protected node. This allows violation of
      the browser's same origin policy and could also lead to privilege
      escalation and the execution of arbitrary code.

    * 

      MFSA 2013-37 / CVE-2013-0794: Security researcher shutdown reported a
      method for removing the origin indication on tab-modal dialog boxes
      in combination with browser navigation. This could allow an
      attacker's dialog to overlay a page and show another site's content.
      This can be used for phishing by allowing users to enter data into a
      modal prompt dialog on an attacking, site while appearing to be from
      the displayed site.

    * 

      MFSA 2013-38 / CVE-2013-0793: Security researcher Mariusz Mlynski
      reported a method to use browser navigations through history to load
      an arbitrary website with that page's baseURI property pointing to
      another site instead of the seemingly loaded one. The user will
      continue to see the incorrect site in the addressbar of the browser.
      This allows for a cross-site scripting (XSS) attack or the theft of
      data through a phishing attack.

    * 

      MFSA 2013-39 / CVE-2013-0792: Mozilla community member Tobias Schula
      reported that if gfx.color_management.enablev4 preference is enabled
      manually in about:config, some grayscale PNG images will be rendered
      incorrectly and cause memory corruption during PNG decoding when
      certain color profiles are in use. A crafted PNG image could use this
      flaw to leak data through rendered images drawing from random memory.
      By default, this preference is not enabled.

    * 

      MFSA 2013-40 / CVE-2013-0791: Mozilla community member Ambroz Bizjak
      reported an out-of-bounds array read in the CERT_DecodeCertPackage
      function of the Network Security Services (NSS) libary when decoding
      a certificate. When this occurs, it will lead to memory corruption
      and a non-exploitable crash.

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-17"/>
	<updated date="2013-05-17"/>
	<bugzilla href="https://bugzilla.suse.com/792432">SUSE bug 792432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0788">CVE-2013-0788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0791/">CVE-2013-0791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0791">CVE-2013-0791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0792/">CVE-2013-0792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0792">CVE-2013-0792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0793/">CVE-2013-0793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0793">CVE-2013-0793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0794">CVE-2013-0794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0795">CVE-2013-0795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0796">CVE-2013-0796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0797/">CVE-2013-0797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0797">CVE-2013-0797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0799/">CVE-2013-0799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0799">CVE-2013-0799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0800">CVE-2013-0800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571372" comment="MozillaFirefox-17.0.6esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571373" comment="MozillaFirefox-branding-SLED-7-0.6.9.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571374" comment="MozillaFirefox-translations-17.0.6esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571375" comment="libfreebl3-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571376" comment="libfreebl3-32bit-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571377" comment="mozilla-nspr-4.9.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571378" comment="mozilla-nspr-32bit-4.9.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571379" comment="mozilla-nss-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571380" comment="mozilla-nss-32bit-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571381" comment="mozilla-nss-tools-3.14.3-0.4.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571372" comment="MozillaFirefox-17.0.6esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571373" comment="MozillaFirefox-branding-SLED-7-0.6.9.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571374" comment="MozillaFirefox-translations-17.0.6esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571375" comment="libfreebl3-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571376" comment="libfreebl3-32bit-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571377" comment="mozilla-nspr-4.9.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571378" comment="mozilla-nspr-32bit-4.9.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571379" comment="mozilla-nss-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571380" comment="mozilla-nss-32bit-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571381" comment="mozilla-nss-tools-3.14.3-0.4.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217098" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="825935" ref_url="https://bugzilla.suse.com/825935" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1682" ref_url="https://www.suse.com/security/cve/CVE-2013-1682/" source="CVE"/>
		<reference ref_id="CVE-2013-1684" ref_url="https://www.suse.com/security/cve/CVE-2013-1684/" source="CVE"/>
		<reference ref_id="CVE-2013-1685" ref_url="https://www.suse.com/security/cve/CVE-2013-1685/" source="CVE"/>
		<reference ref_id="CVE-2013-1686" ref_url="https://www.suse.com/security/cve/CVE-2013-1686/" source="CVE"/>
		<reference ref_id="CVE-2013-1687" ref_url="https://www.suse.com/security/cve/CVE-2013-1687/" source="CVE"/>
		<reference ref_id="CVE-2013-1690" ref_url="https://www.suse.com/security/cve/CVE-2013-1690/" source="CVE"/>
		<reference ref_id="CVE-2013-1692" ref_url="https://www.suse.com/security/cve/CVE-2013-1692/" source="CVE"/>
		<reference ref_id="CVE-2013-1693" ref_url="https://www.suse.com/security/cve/CVE-2013-1693/" source="CVE"/>
		<reference ref_id="CVE-2013-1697" ref_url="https://www.suse.com/security/cve/CVE-2013-1697/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 17.0.7 ESR version, which fixes 
bugs and security issues:

    * 

      MFSA 2013-49: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Gary Kwong, Jesse Ruderman, and Andrew McCreight reported memory
      safety problems and crashes that affect Firefox ESR 17, and Firefox
      21. (CVE-2013-1682)

    * 

      MFSA 2013-50: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team used the Address Sanitizer tool to
      discover a series of use-after-free problems rated critical as
      security issues in shipped software. Some of these issues are
      potentially exploitable, allowing for remote code execution. We would
      also like to thank Abhishek for reporting additional use-after-free
      and buffer overflow flaws in code introduced during Firefox
      development. These were fixed before general release.

          o Heap-use-after-free in
            mozilla::dom::HTMLMediaElement::LookupMediaElementURITable
            (CVE-2013-1684)
          o Heap-use-after-free in nsIDocument::GetRootElement
            (CVE-2013-1685)
          o Heap-use-after-free in mozilla::ResetDir (CVE-2013-1686)
    * 

      MFSA 2013-51 / CVE-2013-1687: Security researcher Mariusz Mlynski
      reported that it is possible to compile a user-defined function in
      the XBL scope of a specific element and then trigger an event within
      this scope to run code. In some circumstances, when this code is run,
      it can access content protected by System Only Wrappers (SOW) and
      chrome-privileged pages. This could potentially lead to arbitrary
      code execution. Additionally, Chrome Object Wrappers (COW) can be
      bypassed by web content to access privileged methods, leading to a
      cross-site scripting (XSS) attack from privileged pages.

    * 

      MFSA 2013-53 / CVE-2013-1690: Security researcher Nils reported that
      specially crafted web content using the onreadystatechange event and
      reloading of pages could sometimes cause a crash when unmapped memory
      is executed. This crash is potentially exploitable.

    * 

      MFSA 2013-54 / CVE-2013-1692: Security researcher Johnathan Kuskos
      reported that Firefox is sending data in the body of XMLHttpRequest
      (XHR) HEAD requests, which goes agains the XHR specification. This
      can potentially be used for Cross-Site Request Forgery (CSRF) attacks
      against sites which do not distinguish between HEAD and POST
      requests.

    * 

      MFSA 2013-55 / CVE-2013-1693: Security researcher Paul Stone of
      Context Information Security discovered that timing differences in
      the processing of SVG format images with filters could allow for
      pixel values to be read. This could potentially allow for text values
      to be read across domains, leading to information disclosure.

    * 

      MFSA 2013-59 / CVE-2013-1697: Mozilla security researcher
      moz_bug_r_a4 reported that XrayWrappers can be bypassed to call
      content-defined toString and valueOf methods through DefaultValue.
      This can lead to unexpected behavior when privileged code acts on the
      incorrect values.

Security Issue references:

    * CVE-2013-1682
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1682&gt;
    * CVE-2013-1684
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1684&gt;
    * CVE-2013-1685
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1685&gt;
    * CVE-2013-1686
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1686&gt;
    * CVE-2013-1687
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1687&gt;
    * CVE-2013-1690
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1690&gt;
    * CVE-2013-1692
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1692&gt;
    * CVE-2013-1693
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1693&gt;
    * CVE-2013-1697
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1697&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-28"/>
	<updated date="2013-06-28"/>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1682/">CVE-2013-1682 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1682">CVE-2013-1682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1684/">CVE-2013-1684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1684">CVE-2013-1684 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1685/">CVE-2013-1685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1685">CVE-2013-1685 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1686/">CVE-2013-1686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1686">CVE-2013-1686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1687/">CVE-2013-1687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1687">CVE-2013-1687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1690/">CVE-2013-1690 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-1690">CVE-2013-1690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1692/">CVE-2013-1692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1692">CVE-2013-1692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1693/">CVE-2013-1693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1693">CVE-2013-1693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1697/">CVE-2013-1697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1697">CVE-2013-1697 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571382" comment="MozillaFirefox-17.0.7esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571383" comment="MozillaFirefox-branding-SLED-7-0.6.9.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571384" comment="MozillaFirefox-translations-17.0.7esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571382" comment="MozillaFirefox-17.0.7esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571383" comment="MozillaFirefox-branding-SLED-7-0.6.9.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571384" comment="MozillaFirefox-translations-17.0.7esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217099" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="847708" ref_url="https://bugzilla.suse.com/847708" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 17.0.10ESR release, which fixes 
various bugs and security issues:

    * 

      MFSA 2013-93: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Jesse Ruderman and Christoph Diehl reported memory safety problems
      and crashes that affect Firefox ESR 17, Firefox ESR 24, and Firefox
      24. (CVE-2013-5590)

      Carsten Book reported a crash fixed in the NSS library used by
      Mozilla-based products fixed in Firefox 25, Firefox ESR 24.1, and
      Firefox ESR 17.0.10.(CVE-2013-1739)

    * 

      MFSA 2013-95 / CVE-2013-5604: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover an access violation due to uninitialized
      data during Extensible Stylesheet Language Transformation (XSLT)
      processing. This leads to a potentially exploitable crash.

    * 

      MFSA 2013-96 / CVE-2013-5595: Compiler Engineer Dan Gohman of Google
      discovered a flaw in the JavaScript engine where memory was being
      incorrectly allocated for some functions and the calls for
      allocations were not always properly checked for overflow, leading to
      potential buffer overflows. When combined with other vulnerabilities,
      these flaws could be potentially exploitable.

    * 

      MFSA 2013-98 / CVE-2013-5597: Security researcher Byoungyoung Lee of
      Georgia Tech Information Security Center (GTISC) used the Address
      Sanitizer tool to discover a use-after-free during state change
      events while updating the offline cache. This leads to a potentially
      exploitable crash.

    * 

      MFSA 2013-100: Security researcher Nils used the Address Sanitizer
      tool while fuzzing to discover missing strong references in browsing
      engine leading to use-after-frees. This can lead to a potentially
      exploitable crash.

          o ASAN heap-use-after-free in nsIPresShell::GetPresContext() with
            canvas, onresize and mozTextStyle (CVE-2013-5599)
          o ASAN use-after-free in
            nsIOService::NewChannelFromURIWithProxyFlags with Blob URL
            (CVE-2013-5600)
          o ASAN use-after free in GC allocation in
            nsEventListenerManager::SetEventHandler (CVE-2013-5601)
    * 

      MFSA 2013-101 / CVE-2013-5602: Security researcher Nils used the
      Address Sanitizer tool while fuzzing to discover a memory corruption
      issue with the JavaScript engine when using workers with direct
      proxies. This results in a potentially exploitable crash.

Security Issue reference:

    * CVE-2013-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-02"/>
	<updated date="2013-11-02"/>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1739">CVE-2013-1739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571385" comment="MozillaFirefox-17.0.10esr-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571386" comment="MozillaFirefox-branding-SLED-7-0.6.9.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571387" comment="MozillaFirefox-translations-17.0.10esr-0.4.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571385" comment="MozillaFirefox-17.0.10esr-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571386" comment="MozillaFirefox-branding-SLED-7-0.6.9.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571387" comment="MozillaFirefox-translations-17.0.10esr-0.4.2.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217100" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="859055" ref_url="https://bugzilla.suse.com/859055" source="BUGZILLA"/>
		<reference ref_id="861847" ref_url="https://bugzilla.suse.com/861847" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1477" ref_url="https://www.suse.com/security/cve/CVE-2014-1477/" source="CVE"/>
		<reference ref_id="CVE-2014-1479" ref_url="https://www.suse.com/security/cve/CVE-2014-1479/" source="CVE"/>
		<reference ref_id="CVE-2014-1480" ref_url="https://www.suse.com/security/cve/CVE-2014-1480/" source="CVE"/>
		<reference ref_id="CVE-2014-1481" ref_url="https://www.suse.com/security/cve/CVE-2014-1481/" source="CVE"/>
		<reference ref_id="CVE-2014-1482" ref_url="https://www.suse.com/security/cve/CVE-2014-1482/" source="CVE"/>
		<reference ref_id="CVE-2014-1483" ref_url="https://www.suse.com/security/cve/CVE-2014-1483/" source="CVE"/>
		<reference ref_id="CVE-2014-1484" ref_url="https://www.suse.com/security/cve/CVE-2014-1484/" source="CVE"/>
		<reference ref_id="CVE-2014-1485" ref_url="https://www.suse.com/security/cve/CVE-2014-1485/" source="CVE"/>
		<reference ref_id="CVE-2014-1486" ref_url="https://www.suse.com/security/cve/CVE-2014-1486/" source="CVE"/>
		<reference ref_id="CVE-2014-1487" ref_url="https://www.suse.com/security/cve/CVE-2014-1487/" source="CVE"/>
		<reference ref_id="CVE-2014-1488" ref_url="https://www.suse.com/security/cve/CVE-2014-1488/" source="CVE"/>
		<reference ref_id="CVE-2014-1489" ref_url="https://www.suse.com/security/cve/CVE-2014-1489/" source="CVE"/>
		<reference ref_id="CVE-2014-1490" ref_url="https://www.suse.com/security/cve/CVE-2014-1490/" source="CVE"/>
		<reference ref_id="CVE-2014-1491" ref_url="https://www.suse.com/security/cve/CVE-2014-1491/" source="CVE"/>
		<description>

Mozilla Firefox was updated to the 24.3.0ESR security release.

The Following security issues have been fixed:

    * 

      MFSA 2014-01: Memory safety bugs fixed in Firefox ESR 24.3 and
      Firefox 27.0 (CVE-2014-1477)(bnc#862345)

    * 

      MFSA 2014-02: Using XBL scopes its possible to steal(clone) native
      anonymous content (CVE-2014-1479)(bnc#862348)

    * 

      MFSA 2014-03: Download 'open file' dialog delay is too quick, doesn't
      prevent clickjacking (CVE-2014-1480)

    * 

      MFSA 2014-04: Image decoding causing FireFox to crash with Goo Create
      (CVE-2014-1482)(bnc#862356)

    * 

      MFSA 2014-05: caretPositionFromPoint and elementFromPoint leak
      information about iframe contents via timing information
      (CVE-2014-1483)(bnc#862360)

    * 

      MFSA 2014-06: Fennec leaks profile path to logcat (CVE-2014-1484)

    * 

      MFSA 2014-07: CSP should block XSLT as script, not as style
      (CVE-2014-1485)

    * 

      MFSA 2014-08: imgRequestProxy Use-After-Free Remote Code Execution
      Vulnerability (CVE-2014-1486)

    * 

      MFSA 2014-09: Cross-origin information disclosure with error message
      of Web Workers (CVE-2014-1487)

    * 

      MFSA 2014-10: settings &amp; history ID bug (CVE-2014-1489)

    * 

      MFSA 2014-11: Firefox reproducibly crashes when using asm.js code in
      workers and transferable objects (CVE-2014-1488)

    * 

      MFSA 2014-12: TOCTOU, potential use-after-free in libssl's session
      ticket processing (CVE-2014-1490)(bnc#862300) Do not allow p-1 as a
      public DH value (CVE-2014-1491)(bnc#862289)

    * 

      MFSA 2014-13: Inconsistent this value when invoking getters on window
      (CVE-2014-1481)(bnc#862309)

Also Mozilla NSS was updated to the 3.15.4 release.

    * required for Firefox 27
    * regular CA root store update (1.96)
    * some OSCP improvments
    * other bugfixes

Security Issue references:

    * CVE-2014-1477
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477&gt;
    * CVE-2014-1479
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479&gt;
    * CVE-2014-1480
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1480&gt;
    * CVE-2014-1481
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481&gt;
    * CVE-2014-1482
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482&gt;
    * CVE-2014-1483
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1483&gt;
    * CVE-2014-1484
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1484&gt;
    * CVE-2014-1485
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1485&gt;
    * CVE-2014-1486
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486&gt;
    * CVE-2014-1487
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487&gt;
    * CVE-2014-1488
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1488&gt;
    * CVE-2014-1489
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1489&gt;
    * CVE-2014-1490
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490&gt;
    * CVE-2014-1491
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-13"/>
	<updated date="2014-02-13"/>
	<bugzilla href="https://bugzilla.suse.com/859055">SUSE bug 859055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1477/">CVE-2014-1477 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1477">CVE-2014-1477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1479/">CVE-2014-1479 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1479">CVE-2014-1479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1480/">CVE-2014-1480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1480">CVE-2014-1480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1481/">CVE-2014-1481 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1481">CVE-2014-1481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1482/">CVE-2014-1482 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1482">CVE-2014-1482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1483/">CVE-2014-1483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1483">CVE-2014-1483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1484/">CVE-2014-1484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1484">CVE-2014-1484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1485/">CVE-2014-1485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1485">CVE-2014-1485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1486/">CVE-2014-1486 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1486">CVE-2014-1486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1487/">CVE-2014-1487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1487">CVE-2014-1487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1488/">CVE-2014-1488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1488">CVE-2014-1488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1489/">CVE-2014-1489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1489">CVE-2014-1489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1490/">CVE-2014-1490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1490">CVE-2014-1490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1491/">CVE-2014-1491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1491">CVE-2014-1491 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009592823" comment="MozillaFirefox-24.3.0esr-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592824" comment="MozillaFirefox-branding-SLED-24-0.4.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592825" comment="MozillaFirefox-translations-24.3.0esr-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571391" comment="firefox-libgcc_s1-4.7.2_20130108-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571392" comment="firefox-libstdc++6-4.7.2_20130108-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571393" comment="libfreebl3-3.15.4-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571394" comment="libfreebl3-32bit-3.15.4-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571395" comment="mozilla-nspr-4.10.2-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571396" comment="mozilla-nspr-32bit-4.10.2-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571397" comment="mozilla-nss-3.15.4-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571398" comment="mozilla-nss-32bit-3.15.4-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571399" comment="mozilla-nss-tools-3.15.4-0.4.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009592823" comment="MozillaFirefox-24.3.0esr-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592824" comment="MozillaFirefox-branding-SLED-24-0.4.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592825" comment="MozillaFirefox-translations-24.3.0esr-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571391" comment="firefox-libgcc_s1-4.7.2_20130108-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571392" comment="firefox-libstdc++6-4.7.2_20130108-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571393" comment="libfreebl3-3.15.4-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571394" comment="libfreebl3-32bit-3.15.4-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571395" comment="mozilla-nspr-4.10.2-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571396" comment="mozilla-nspr-32bit-4.10.2-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571397" comment="mozilla-nss-3.15.4-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571398" comment="mozilla-nss-32bit-3.15.4-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571399" comment="mozilla-nss-tools-3.15.4-0.4.2.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217101" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="868603" ref_url="https://bugzilla.suse.com/868603" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1493" ref_url="https://www.suse.com/security/cve/CVE-2014-1493/" source="CVE"/>
		<reference ref_id="CVE-2014-1494" ref_url="https://www.suse.com/security/cve/CVE-2014-1494/" source="CVE"/>
		<reference ref_id="CVE-2014-1496" ref_url="https://www.suse.com/security/cve/CVE-2014-1496/" source="CVE"/>
		<reference ref_id="CVE-2014-1497" ref_url="https://www.suse.com/security/cve/CVE-2014-1497/" source="CVE"/>
		<reference ref_id="CVE-2014-1498" ref_url="https://www.suse.com/security/cve/CVE-2014-1498/" source="CVE"/>
		<reference ref_id="CVE-2014-1499" ref_url="https://www.suse.com/security/cve/CVE-2014-1499/" source="CVE"/>
		<reference ref_id="CVE-2014-1500" ref_url="https://www.suse.com/security/cve/CVE-2014-1500/" source="CVE"/>
		<reference ref_id="CVE-2014-1501" ref_url="https://www.suse.com/security/cve/CVE-2014-1501/" source="CVE"/>
		<reference ref_id="CVE-2014-1502" ref_url="https://www.suse.com/security/cve/CVE-2014-1502/" source="CVE"/>
		<reference ref_id="CVE-2014-1504" ref_url="https://www.suse.com/security/cve/CVE-2014-1504/" source="CVE"/>
		<reference ref_id="CVE-2014-1505" ref_url="https://www.suse.com/security/cve/CVE-2014-1505/" source="CVE"/>
		<reference ref_id="CVE-2014-1508" ref_url="https://www.suse.com/security/cve/CVE-2014-1508/" source="CVE"/>
		<reference ref_id="CVE-2014-1509" ref_url="https://www.suse.com/security/cve/CVE-2014-1509/" source="CVE"/>
		<reference ref_id="CVE-2014-1510" ref_url="https://www.suse.com/security/cve/CVE-2014-1510/" source="CVE"/>
		<reference ref_id="CVE-2014-1511" ref_url="https://www.suse.com/security/cve/CVE-2014-1511/" source="CVE"/>
		<reference ref_id="CVE-2014-1512" ref_url="https://www.suse.com/security/cve/CVE-2014-1512/" source="CVE"/>
		<reference ref_id="CVE-2014-1513" ref_url="https://www.suse.com/security/cve/CVE-2014-1513/" source="CVE"/>
		<reference ref_id="CVE-2014-1514" ref_url="https://www.suse.com/security/cve/CVE-2014-1514/" source="CVE"/>
		<description>

Mozilla Firefox was updated to 24.4.0ESR release, fixing various security 
issues and bugs:

    * 

      MFSA 2014-15: Mozilla developers and community identified identified
      and fixed several memory safety bugs in the browser engine used in
      Firefox and other Mozilla-based products. Some of these bugs showed
      evidence of memory corruption under certain circumstances, and we
      presume that with enough effort at least some of these could be
      exploited to run arbitrary code.

    * 

      Benoit Jacob, Olli Pettay, Jan Varga, Jan de Mooij, Jesse Ruderman,
      Dan Gohman, and Christoph Diehl reported memory safety problems and
      crashes that affect Firefox ESR 24.3 and Firefox 27. (CVE-2014-1493)

    * 

      Gregor Wagner, Olli Pettay, Gary Kwong, Jesse Ruderman, Luke Wagner,
      Rob Fletcher, and Makoto Kato reported memory safety problems and
      crashes that affect Firefox 27. (CVE-2014-1494)

    * 

      MFSA 2014-16 / CVE-2014-1496: Security researcher Ash reported an
      issue where the extracted files for updates to existing files are not
      read only during the update process. This allows for the potential
      replacement or modification of these files during the update process
      if a malicious application is present on the local system.

    * 

      MFSA 2014-17 / CVE-2014-1497: Security researcher Atte Kettunen from
      OUSPG reported an out of bounds read during the decoding of WAV
      format audio files for playback. This could allow web content access
      to heap data as well as causing a crash.

    * 

      MFSA 2014-18 / CVE-2014-1498: Mozilla developer David Keeler reported
      that the crypto.generateCRFMRequest method did not correctly validate
      the key type of the KeyParams argument when generating ec-dual-use
      requests. This could lead to a crash and a denial of service (DOS)
      attack.

    * 

      MFSA 2014-19 / CVE-2014-1499: Mozilla developer Ehsan Akhgari
      reported a spoofing attack where the permission prompt for a WebRTC
      session can appear to be from a different site than its actual
      originating site if a timed navigation occurs during the prompt
      generation. This allows an attacker to potentially gain access to the
      webcam or microphone by masquerading as another site and gaining user
      permission through spoofing.

    * 

      MFSA 2014-20 / CVE-2014-1500: Security researchers Tim Philipp
      Schaefers and Sebastian Neef, the team of Internetwache.org, reported
      a mechanism using JavaScript onbeforeunload events with page
      navigation to prevent users from closing a malicious page's tab and
      causing the browser to become unresponsive. This allows for a denial
      of service (DOS) attack due to resource consumption and blocks the
      ability of users to exit the application.

    * 

      MFSA 2014-21 / CVE-2014-1501: Security researcher Alex Infuehr
      reported that on Firefox for Android it is possible to open links to
      local files from web content by selecting 'Open Link in New Tab' from
      the context menu using the file: protocol. The web content would have
      to know the precise location of a malicious local file in order to
      exploit this issue. This issue does not affect Firefox on non-Android
      systems.

    * 

      MFSA 2014-22 / CVE-2014-1502: Mozilla developer Jeff Gilbert
      discovered a mechanism where a malicious site with WebGL content
      could inject content from its context to that of another site's WebGL
      context, causing the second site to replace textures and similar
      content. This cannot be used to steal data but could be used to
      render arbitrary content in these limited circumstances.

    * 

      MFSA 2014-23 / CVE-2014-1504: Security researcher Nicolas Golubovic
      reported that the Content Security Policy (CSP) of data: documents
      was not saved as part of session restore. If an attacker convinced a
      victim to open a document from a data: URL injected onto a page, this
      can lead to a Cross-Site Scripting (XSS) attack. The target page may
      have a strict CSP that protects against this XSS attack, but if the
      attacker induces a browser crash with another bug, an XSS attack
      would occur during session restoration, bypassing the CSP on the
      site.

    * 

      MFSA 2014-26 / CVE-2014-1508: Security researcher Tyson Smith and
      Jesse Schwartzentruber of the BlackBerry Security Automated Analysis
      Team used the Address Sanitizer tool while fuzzing to discover an
      out-of-bounds read during polygon rendering in MathML. This can allow
      web content to potentially read protected memory addresses. In
      combination with previous techniques used for SVG timing attacks,
      this could allow for text values to be read across domains, leading
      to information disclosure.

    * 

      MFSA 2014-27 / CVE-2014-1509: Security researcher John Thomson
      discovered a memory corruption in the Cairo graphics library during
      font rendering of a PDF file for display. This memory corruption
      leads to a potentially exploitable crash and to a denial of service
      (DOS). This issues is not able to be triggered in a default
      configuration and would require a malicious extension to be
      installed.

    * 

      MFSA 2014-28 / CVE-2014-1505: Mozilla developer Robert O'Callahan
      reported a mechanism for timing attacks involving SVG filters and
      displacements input to feDisplacementMap. This allows displacements
      to potentially be correlated with values derived from content. This
      is similar to the previously reported techniques used for SVG timing
      attacks and could allow for text values to be read across domains,
      leading to information disclosure.

    * 

      MFSA 2014-29 / CVE-2014-1510 / CVE-2014-1511: Security researcher
      Mariusz Mlynski, via TippingPoint's Pwn2Own contest, reported that it
      is possible for untrusted web content to load a chrome-privileged
      page by getting JavaScript-implemented WebIDL to call window.open().
      A second bug allowed the bypassing of the popup-blocker without user
      interaction. Combined these two bugs allow an attacker to load a
      JavaScript URL that is executed with the full privileges of the
      browser, which allows arbitrary code execution.

    * 

      MFSA 2014-30 / CVE-2014-1512: Security research firm VUPEN, via
      TippingPoint's Pwn2Own contest, reported that memory pressure during
      Garbage Collection could lead to memory corruption of TypeObjects in
      the JS engine, resulting in an exploitable use-after-free condition.

    * 

      MFSA 2014-31 / CVE-2014-1513: Security researcher Jueri Aedla, via
      TippingPoint's Pwn2Own contest, reported that TypedArrayObject does
      not handle the case where ArrayBuffer objects are neutered, setting
      their length to zero while still in use. This leads to out-of-bounds
      reads and writes into the JavaScript heap, allowing for arbitrary
      code execution.

    * 

      MFSA 2014-32 / CVE-2014-1514: Security researcher George Hotz, via
      TippingPoint's Pwn2Own contest, discovered an issue where values are
      copied from an array into a second, neutered array. This allows for
      an out-of-bounds write into memory, causing an exploitable crash
      leading to arbitrary code execution.

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-20"/>
	<updated date="2014-03-20"/>
	<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1493/">CVE-2014-1493 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1493">CVE-2014-1493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1494/">CVE-2014-1494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1494">CVE-2014-1494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1496/">CVE-2014-1496 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1496">CVE-2014-1496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1497/">CVE-2014-1497 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1497">CVE-2014-1497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1498/">CVE-2014-1498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1498">CVE-2014-1498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1499/">CVE-2014-1499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1499">CVE-2014-1499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1500/">CVE-2014-1500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1500">CVE-2014-1500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1501/">CVE-2014-1501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1501">CVE-2014-1501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1502/">CVE-2014-1502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1502">CVE-2014-1502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1504/">CVE-2014-1504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1504">CVE-2014-1504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1505/">CVE-2014-1505 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1505">CVE-2014-1505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1508/">CVE-2014-1508 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1508">CVE-2014-1508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1509/">CVE-2014-1509 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1509">CVE-2014-1509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1510/">CVE-2014-1510 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1510">CVE-2014-1510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1511/">CVE-2014-1511 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1511">CVE-2014-1511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1512/">CVE-2014-1512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1512">CVE-2014-1512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1513/">CVE-2014-1513 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1513">CVE-2014-1513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1514/">CVE-2014-1514 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1514">CVE-2014-1514 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571400" comment="MozillaFirefox-24.4.0esr-0.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571401" comment="MozillaFirefox-branding-SLED-24-0.4.10.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571402" comment="MozillaFirefox-translations-24.4.0esr-0.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571403" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217102" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="887746" ref_url="https://bugzilla.suse.com/887746" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1544" ref_url="https://www.suse.com/security/cve/CVE-2014-1544/" source="CVE"/>
		<reference ref_id="CVE-2014-1547" ref_url="https://www.suse.com/security/cve/CVE-2014-1547/" source="CVE"/>
		<reference ref_id="CVE-2014-1548" ref_url="https://www.suse.com/security/cve/CVE-2014-1548/" source="CVE"/>
		<reference ref_id="CVE-2014-1555" ref_url="https://www.suse.com/security/cve/CVE-2014-1555/" source="CVE"/>
		<reference ref_id="CVE-2014-1556" ref_url="https://www.suse.com/security/cve/CVE-2014-1556/" source="CVE"/>
		<reference ref_id="CVE-2014-1557" ref_url="https://www.suse.com/security/cve/CVE-2014-1557/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 24.7ESR security release.

Security issues fixed in this release:

    * CVE-2014-1544 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-63.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-63.html&gt;
    * CVE-2014-1548 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-56.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-56.html&gt;
    * CVE-2014-1549 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-57.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-57.html&gt;
    * CVE-2014-1550 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-58.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-58.html&gt;
    * CVE-2014-1551 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-59.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-59.html&gt;
    * CVE-2014-1552 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-66.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-66.html&gt;
    * CVE-2014-1555 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-61.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-61.html&gt;
    * CVE-2014-1556 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-62.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-62.html&gt;
    * CVE-2014-1557 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-64.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-64.html&gt;
    * CVE-2014-1558, CVE-2014-1559, CVE-2014-1560 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-65.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-65.html&gt;
    * CVE-2014-1561 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-60.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-60.html&gt;

Security Issues:

    * CVE-2014-1557
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557&gt;
    * CVE-2014-1547
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547&gt;
    * CVE-2014-1548
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1548&gt;
    * CVE-2014-1556
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556&gt;
    * CVE-2014-1544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544&gt;
    * CVE-2014-1555
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-28"/>
	<updated date="2014-07-28"/>
	<bugzilla href="https://bugzilla.suse.com/887746">SUSE bug 887746</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1544/">CVE-2014-1544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1544">CVE-2014-1544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1547/">CVE-2014-1547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1547">CVE-2014-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1548/">CVE-2014-1548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1548">CVE-2014-1548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1555/">CVE-2014-1555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1555">CVE-2014-1555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1556/">CVE-2014-1556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1556">CVE-2014-1556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1557/">CVE-2014-1557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1557">CVE-2014-1557 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571404" comment="MozillaFirefox-24.7.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571405" comment="MozillaFirefox-translations-24.7.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571406" comment="libfreebl3-3.16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571407" comment="libfreebl3-32bit-3.16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571408" comment="mozilla-nss-3.16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571409" comment="mozilla-nss-32bit-3.16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571410" comment="mozilla-nss-tools-3.16.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571404" comment="MozillaFirefox-24.7.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571405" comment="MozillaFirefox-translations-24.7.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571406" comment="libfreebl3-3.16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571407" comment="libfreebl3-32bit-3.16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571408" comment="mozilla-nss-3.16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571409" comment="mozilla-nss-32bit-3.16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571410" comment="mozilla-nss-tools-3.16.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217103" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="894370" ref_url="https://bugzilla.suse.com/894370" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1562" ref_url="https://www.suse.com/security/cve/CVE-2014-1562/" source="CVE"/>
		<reference ref_id="CVE-2014-1567" ref_url="https://www.suse.com/security/cve/CVE-2014-1567/" source="CVE"/>
		<description>

Mozilla Firefox was updated to the 24.8.0ESR release, fixing security 
issues and bugs.

Only some of the published security advisories affect the Mozilla Firefox 
24ESR codestream:

    * MFSA 2014-72 / CVE-2014-1567: Security researcher regenrecht
      reported, via TippingPoint's Zero Day Initiative, a use-after-free
      during text layout when interacting with the setting of text
      direction. This results in a use-after-free which can lead to
      arbitrary code execution.
    * MFSA 2014-67: Mozilla developers and community identified and fixed
      several memory safety bugs in the browser engine used in Firefox and
      other Mozilla-based products. Some of these bugs showed evidence of
      memory corruption under certain circumstances, and we presume that
      with enough effort at least some of these could be exploited to run
      arbitrary code.
    * Jan de Mooij reported a memory safety problem that affects Firefox
      ESR 24.7, ESR 31 and Firefox 31. (CVE-2014-1562)

More information is referenced on: 
https://www.mozilla.org/security/announce/
&lt;https://www.mozilla.org/security/announce/&gt; .

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-03"/>
	<updated date="2014-09-03"/>
	<bugzilla href="https://bugzilla.suse.com/894370">SUSE bug 894370</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1562/">CVE-2014-1562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1562">CVE-2014-1562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1567/">CVE-2014-1567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1567">CVE-2014-1567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571411" comment="MozillaFirefox-24.8.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571412" comment="MozillaFirefox-translations-24.8.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571413" comment="libfreebl3-3.16.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571414" comment="libfreebl3-32bit-3.16.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571415" comment="mozilla-nspr-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571416" comment="mozilla-nspr-32bit-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571417" comment="mozilla-nss-3.16.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571418" comment="mozilla-nss-32bit-3.16.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571419" comment="mozilla-nss-tools-3.16.4-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571411" comment="MozillaFirefox-24.8.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571412" comment="MozillaFirefox-translations-24.8.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571413" comment="libfreebl3-3.16.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571414" comment="libfreebl3-32bit-3.16.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571415" comment="mozilla-nspr-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571416" comment="mozilla-nspr-32bit-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571417" comment="mozilla-nss-3.16.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571418" comment="mozilla-nss-32bit-3.16.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571419" comment="mozilla-nss-tools-3.16.4-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217104" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="908009" ref_url="https://bugzilla.suse.com/908009" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587/" source="CVE"/>
		<reference ref_id="CVE-2014-1588" ref_url="https://www.suse.com/security/cve/CVE-2014-1588/" source="CVE"/>
		<reference ref_id="CVE-2014-1589" ref_url="https://www.suse.com/security/cve/CVE-2014-1589/" source="CVE"/>
		<reference ref_id="CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590/" source="CVE"/>
		<reference ref_id="CVE-2014-1591" ref_url="https://www.suse.com/security/cve/CVE-2014-1591/" source="CVE"/>
		<reference ref_id="CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592/" source="CVE"/>
		<reference ref_id="CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593/" source="CVE"/>
		<reference ref_id="CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594/" source="CVE"/>
		<reference ref_id="CVE-2014-1595" ref_url="https://www.suse.com/security/cve/CVE-2014-1595/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 31.3ESR release fixing bugs and 
security issues.

    * 

      MFSA 2014-83 / CVE-2014-1588 / CVE-2014-1587: Mozilla developers and
      community identified and fixed several memory safety bugs in the
      browser engine used in Firefox and other Mozilla-based products. Some
      of these bugs showed evidence of memory corruption under certain
      circumstances, and we presume that with enough effort at least some
      of these could be exploited to run arbitrary code.

    * 

      MFSA 2014-85 / CVE-2014-1590: Security researcher Joe Vennix from
      Rapid7 reported that passing a JavaScript object to XMLHttpRequest
      that mimics an input stream will a crash. This crash is not
      exploitable and can only be used for denial of service attacks.

    * 

      MFSA 2014-87 / CVE-2014-1592: Security researcher Berend-Jan Wever
      reported a use-after-free created by triggering the creation of a
      second root element while parsing HTML written to a document created
      with document.open(). This leads to a potentially exploitable crash.

    * 

      MFSA 2014-88 / CVE-2014-1593: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover a buffer overflow during the parsing of
      media content. This leads to a potentially exploitable crash.

    * 

      MFSA 2014-89 / CVE-2014-1594: Security researchers Byoungyoung Lee,
      Chengyu Song, and Taesoo Kim at the Georgia Tech Information Security
      Center (GTISC) reported a bad casting from the BasicThebesLayer to
      BasicContainerLayer, resulting in undefined behavior. This behavior
      is potentially exploitable with some compilers but no clear mechanism
      to trigger it through web content was identified.

    * 

      MFSA 2014-90 / CVE-2014-1595: Security researcher Kent Howard
      reported an Apple issue present in OS X 10.10 (Yosemite) where log
      files are created by the CoreGraphics framework of OS X in the /tmp
      local directory. These log files contain a record of all inputs into
      Mozilla programs during their operation. In versions of OS X from
      versions 10.6 through 10.9, the CoreGraphics had this logging ability
      but it was turned off by default. In OS X 10.10, this logging was
      turned on by default for some applications that use a custom memory
      allocator, such as jemalloc, because of an initialization bug in the
      framework. This issue has been addressed in Mozilla products by
      explicitly turning off the framework's logging of input events. On
      vulnerable systems, this issue can result in private data such as
      usernames, passwords, and other inputed data being saved to a log
      file on the local system.

Security Issues:

    * CVE-2014-1587
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587&gt;
    * CVE-2014-1588
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1588&gt;
    * CVE-2014-1589
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1589&gt;
    * CVE-2014-1590
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590&gt;
    * CVE-2014-1591
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1591&gt;
    * CVE-2014-1592
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592&gt;
    * CVE-2014-1593
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593&gt;
    * CVE-2014-1594
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594&gt;
    * CVE-2014-1595
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1595&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-08"/>
	<updated date="2014-12-08"/>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1587">CVE-2014-1587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1588/">CVE-2014-1588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1588">CVE-2014-1588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1589/">CVE-2014-1589 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1589">CVE-2014-1589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1590">CVE-2014-1590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1591/">CVE-2014-1591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1591">CVE-2014-1591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1592">CVE-2014-1592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1593">CVE-2014-1593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1594">CVE-2014-1594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1595/">CVE-2014-1595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1595">CVE-2014-1595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571420" comment="MozillaFirefox-31.3.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571421" comment="MozillaFirefox-translations-31.3.0esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571420" comment="MozillaFirefox-31.3.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571421" comment="MozillaFirefox-translations-31.3.0esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217105" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="906111" ref_url="https://bugzilla.suse.com/906111" source="BUGZILLA"/>
		<reference ref_id="909563" ref_url="https://bugzilla.suse.com/909563" source="BUGZILLA"/>
		<reference ref_id="910647" ref_url="https://bugzilla.suse.com/910647" source="BUGZILLA"/>
		<reference ref_id="910669" ref_url="https://bugzilla.suse.com/910669" source="BUGZILLA"/>
		<reference ref_id="913064" ref_url="https://bugzilla.suse.com/913064" source="BUGZILLA"/>
		<reference ref_id="913066" ref_url="https://bugzilla.suse.com/913066" source="BUGZILLA"/>
		<reference ref_id="913067" ref_url="https://bugzilla.suse.com/913067" source="BUGZILLA"/>
		<reference ref_id="913068" ref_url="https://bugzilla.suse.com/913068" source="BUGZILLA"/>
		<reference ref_id="913102" ref_url="https://bugzilla.suse.com/913102" source="BUGZILLA"/>
		<reference ref_id="913103" ref_url="https://bugzilla.suse.com/913103" source="BUGZILLA"/>
		<reference ref_id="913104" ref_url="https://bugzilla.suse.com/913104" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1569" ref_url="https://www.suse.com/security/cve/CVE-2014-1569/" source="CVE"/>
		<reference ref_id="CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634/" source="CVE"/>
		<reference ref_id="CVE-2014-8636" ref_url="https://www.suse.com/security/cve/CVE-2014-8636/" source="CVE"/>
		<reference ref_id="CVE-2014-8637" ref_url="https://www.suse.com/security/cve/CVE-2014-8637/" source="CVE"/>
		<reference ref_id="CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638/" source="CVE"/>
		<reference ref_id="CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639/" source="CVE"/>
		<reference ref_id="CVE-2014-8640" ref_url="https://www.suse.com/security/cve/CVE-2014-8640/" source="CVE"/>
		<reference ref_id="CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 31.4.0ESR release, fixing bugs and 
security issues.

Mozilla NSS has been updated to 3.17.3, fixing a security issue and 
updating the root certificates list.

For more information, please refer to 
https://www.mozilla.org/en-US/security/advisories/
&lt;https://www.mozilla.org/en-US/security/advisories/&gt; .

Security Issues:

    * CVE-2014-1569
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1569&gt;
    * CVE-2014-8634
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634&gt;
    * CVE-2014-8639
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639&gt;
    * CVE-2014-8641
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641&gt;
    * CVE-2014-8638
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638&gt;
    * CVE-2014-8636
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8636&gt;
    * CVE-2014-8637
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8637&gt;
    * CVE-2014-8640
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8640&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-15"/>
	<updated date="2015-01-15"/>
	<bugzilla href="https://bugzilla.suse.com/906111">SUSE bug 906111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909563">SUSE bug 909563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910647">SUSE bug 910647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913064">SUSE bug 913064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913066">SUSE bug 913066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913067">SUSE bug 913067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913068">SUSE bug 913068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913102">SUSE bug 913102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913103">SUSE bug 913103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913104">SUSE bug 913104</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1569/">CVE-2014-1569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1569">CVE-2014-1569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8634">CVE-2014-8634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8636/">CVE-2014-8636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8636">CVE-2014-8636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8637/">CVE-2014-8637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8637">CVE-2014-8637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8638">CVE-2014-8638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8639">CVE-2014-8639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8640/">CVE-2014-8640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8640">CVE-2014-8640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8641">CVE-2014-8641 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571422" comment="MozillaFirefox-31.4.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571423" comment="MozillaFirefox-translations-31.4.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571424" comment="libfreebl3-3.17.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571425" comment="libfreebl3-32bit-3.17.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571426" comment="mozilla-nss-3.17.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571427" comment="mozilla-nss-32bit-3.17.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571428" comment="mozilla-nss-tools-3.17.3-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571422" comment="MozillaFirefox-31.4.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571423" comment="MozillaFirefox-translations-31.4.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571424" comment="libfreebl3-3.17.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571425" comment="libfreebl3-32bit-3.17.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571426" comment="mozilla-nss-3.17.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571427" comment="mozilla-nss-32bit-3.17.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571428" comment="mozilla-nss-tools-3.17.3-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217106" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="923534" ref_url="https://bugzilla.suse.com/923534" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817/" source="CVE"/>
		<reference ref_id="CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0593-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001319.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to the 31.5.3ESR release to fix two security 
vulnerabilities:

MFSA 2015-29 / CVE-2015-0817: Security researcher ilxu1a reported, through 
HP Zero Day Initiative's Pwn2Own contest, a flaw in Mozilla's 
implementation of typed array bounds checking in JavaScript just-in-time 
compilation (JIT) and its management of bounds checking for heap access. 
This flaw can be leveraged into the reading and writing of memory allowing 
for arbitrary code execution on the local system.

    * MFSA 2015-28 / CVE-2015-0818: Security researcher Mariusz Mlynski
      reported, through HP Zero Day Initiative's Pwn2Own contest, a method
      to run arbitrary scripts in a privileged context. This bypassed the
      same-origin policy protections by using a flaw in the processing of
      SVG format content navigation.

Security Issues:

    * CVE-2015-0817
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817&gt;
    * CVE-2015-0818
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-24"/>
	<updated date="2015-03-24"/>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0817">CVE-2015-0817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0818">CVE-2015-0818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571429" comment="MozillaFirefox-31.5.3esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571430" comment="MozillaFirefox-translations-31.5.3esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571429" comment="MozillaFirefox-31.5.3esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571430" comment="MozillaFirefox-translations-31.5.3esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217107" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="930622" ref_url="https://bugzilla.suse.com/930622" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797/" source="CVE"/>
		<reference ref_id="CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708/" source="CVE"/>
		<reference ref_id="CVE-2015-2709" ref_url="https://www.suse.com/security/cve/CVE-2015-2709/" source="CVE"/>
		<reference ref_id="CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710/" source="CVE"/>
		<reference ref_id="CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713/" source="CVE"/>
		<reference ref_id="CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716/" source="CVE"/>
		<description>

This update to Firefox 31.7.0 ESR fixes the following issues:

    * 

      MFSA 2015-46 (CVE-2015-2708, CVE-2015-2709): Miscellaneous memory
      safety hazards (rv:38.0 / rv:31.7). Upstream references: bmo#1120655,
      bmo#1143299, bmo#1151139, bmo#1152177, bmo#1111251, bmo#1117977,
      bmo#1128064, bmo#1135066, bmo#1143194, bmo#1146101, bmo#1149526,
      bmo#1153688, bmo#1155474.

    * 

      MFSA 2015-47 (CVE-2015-0797): Buffer overflow parsing H.264 video
      with Linux Gstreamer. Upstream references: bmo#1080995.

    * 

      MFSA 2015-48 (CVE-2015-2710): Buffer overflow with SVG content and
      CSS. Upstream references: bmo#1149542.

    * 

      MFSA 2015-51 (CVE-2015-2713): Use-after-free during text processing
      with vertical text enabled. Upstream references: bmo#1153478.

    * 

      MFSA 2015-54 (CVE-2015-2716): Buffer overflow when parsing compressed
      XML. Upstream references: bmo#1140537.

Security Issues:

    * CVE-2015-0797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797&gt;
    * CVE-2015-2708
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708&gt;
    * CVE-2015-2709
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2709&gt;
    * CVE-2015-2710
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710&gt;
    * CVE-2015-2713
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713&gt;
    * CVE-2015-2716
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-19"/>
	<updated date="2015-05-19"/>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0797">CVE-2015-0797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2708">CVE-2015-2708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2709/">CVE-2015-2709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2709">CVE-2015-2709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2710">CVE-2015-2710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2713">CVE-2015-2713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2716">CVE-2015-2716 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571431" comment="MozillaFirefox-31.7.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571432" comment="MozillaFirefox-translations-31.7.0esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217108" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="943557" ref_url="https://bugzilla.suse.com/943557" source="BUGZILLA"/>
		<reference ref_id="943558" ref_url="https://bugzilla.suse.com/943558" source="BUGZILLA"/>
		<reference ref_id="943608" ref_url="https://bugzilla.suse.com/943608" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4497" ref_url="https://www.suse.com/security/cve/CVE-2015-4497/" source="CVE"/>
		<reference ref_id="CVE-2015-4498" ref_url="https://www.suse.com/security/cve/CVE-2015-4498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001576.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to 38.2.1 ESR, fixing two severe security bugs. (bsc#943608)

* MFSA 2015-94/CVE-2015-4497 (bsc#943557): Use-after-free when resizing canvas element during restyling
* MFSA 2015-95/CVE-2015-4498 (bsc#943558): Add-on notification bypass through data URLs
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-04"/>
	<updated date="2015-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/943557">SUSE bug 943557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943558">SUSE bug 943558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943608">SUSE bug 943608</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4497/">CVE-2015-4497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4497">CVE-2015-4497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4498/">CVE-2015-4498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4498">CVE-2015-4498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571433" comment="MozillaFirefox-38.2.1esr-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571434" comment="MozillaFirefox-translations-38.2.1esr-17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571433" comment="MozillaFirefox-38.2.1esr-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571434" comment="MozillaFirefox-translations-38.2.1esr-17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217109" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="947003" ref_url="https://bugzilla.suse.com/947003" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<description>

Mozilla Firefox was updated to version 38.3.0 ESR (bsc#947003),
fixing bugs and security issues.

* MFSA 2015-96/CVE-2015-4500/CVE-2015-4501
  Miscellaneous memory safety hazards (rv:41.0 / rv:38.3)
* MFSA 2015-101/CVE-2015-4506
  Buffer overflow in libvpx while parsing vp9 format video
* MFSA 2015-105/CVE-2015-4511
  Buffer overflow while decoding WebM video
* MFSA 2015-106/CVE-2015-4509
  Use-after-free while manipulating HTML media content
* MFSA 2015-110/CVE-2015-4519
  Dragging and dropping images exposes final URL after
  redirects
* MFSA 2015-111/CVE-2015-4520
  Errors in the handling of CORS preflight request headers
* MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522
  CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177
  CVE-2015-7180
  Vulnerabilities found through code inspection

More details can be found on
        https://www.mozilla.org/en-US/security/advisories/

The Mozilla NSPR library was updated to version 4.10.9, fixing various bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-23"/>
	<updated date="2015-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4500">CVE-2015-4500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4501">CVE-2015-4501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4506">CVE-2015-4506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4509">CVE-2015-4509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4511">CVE-2015-4511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4517">CVE-2015-4517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4519">CVE-2015-4519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4520">CVE-2015-4520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4521">CVE-2015-4521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4522">CVE-2015-4522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7174">CVE-2015-7174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7175">CVE-2015-7175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7176">CVE-2015-7176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7177">CVE-2015-7177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7180">CVE-2015-7180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571435" comment="MozillaFirefox-38.3.0esr-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571436" comment="MozillaFirefox-translations-38.3.0esr-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571437" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566485" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217110" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="908275" ref_url="https://bugzilla.suse.com/908275" source="BUGZILLA"/>
		<reference ref_id="952810" ref_url="https://bugzilla.suse.com/952810" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<description>

This Mozilla Firefox, NSS and NSPR update fixes the following security
and non security issues.

- mozilla-nspr was updated to version 4.10.10 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7183
    (bmo#1205157)
    NSPR memory corruption issues

- mozilla-nss was updated to 3.19.2.1 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182
    (bmo#1192028, bmo#1202868)
    NSS and NSPR memory corruption issues

- MozillaFirefox was updated to 38.4.0 ESR (bsc#952810)
  * MFSA 2015-116/CVE-2015-4513
    (bmo#1107011, bmo#1191942, bmo#1193038, bmo#1204580,
     bmo#1204669, bmo#1204700, bmo#1205707, bmo#1206564,
     bmo#1208665, bmo#1209471, bmo#1213979)
    Miscellaneous memory safety hazards (rv:42.0 / rv:38.4)
  * MFSA 2015-122/CVE-2015-7188
    (bmo#1199430)
    Trailing whitespace in IP address hostnames can bypass
    same-origin policy
  * MFSA 2015-123/CVE-2015-7189
    (bmo#1205900)
    Buffer overflow during image interactions in canvas
  * MFSA 2015-127/CVE-2015-7193
    (bmo#1210302)
    CORS preflight is bypassed when non-standard Content-Type
    headers are received
  * MFSA 2015-128/CVE-2015-7194
    (bmo#1211262)
    Memory corruption in libjar through zip files
  * MFSA 2015-130/CVE-2015-7196
    (bmo#1140616)
    JavaScript garbage collection crash with Java applet
  * MFSA 2015-131/CVE-2015-7198/CVE-2015-7199/CVE-2015-7200
    (bmo#1204061, bmo#1188010, bmo#1204155)
    Vulnerabilities found through code inspection
  * MFSA 2015-132/CVE-2015-7197
    (bmo#1204269)
    Mixed content WebSocket policy bypass through workers
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182/CVE-2015-7183
    (bmo#1202868, bmo#1192028, bmo#1205157)
    NSS and NSPR memory corruption issues
- fix printing on landscape media (bsc#908275)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-12"/>
	<updated date="2015-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/908275">SUSE bug 908275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4513">CVE-2015-4513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7181">CVE-2015-7181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7182">CVE-2015-7182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7183">CVE-2015-7183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7188">CVE-2015-7188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7189">CVE-2015-7189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7193">CVE-2015-7193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7194">CVE-2015-7194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7196">CVE-2015-7196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7197">CVE-2015-7197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7198">CVE-2015-7198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7199">CVE-2015-7199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7200">CVE-2015-7200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571438" comment="MozillaFirefox-38.4.0esr-25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571439" comment="MozillaFirefox-branding-SLED-38-12.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571440" comment="MozillaFirefox-translations-38.4.0esr-25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571441" comment="libfreebl3-3.19.2.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571442" comment="libfreebl3-32bit-3.19.2.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571443" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566496" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571444" comment="mozilla-nss-3.19.2.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571445" comment="mozilla-nss-32bit-3.19.2.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571446" comment="mozilla-nss-tools-3.19.2.1-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217111" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="969894" ref_url="https://bugzilla.suse.com/969894" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952/" source="CVE"/>
		<reference ref_id="CVE-2016-1953" ref_url="https://www.suse.com/security/cve/CVE-2016-1953/" source="CVE"/>
		<reference ref_id="CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954/" source="CVE"/>
		<reference ref_id="CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957/" source="CVE"/>
		<reference ref_id="CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958/" source="CVE"/>
		<reference ref_id="CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960/" source="CVE"/>
		<reference ref_id="CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961/" source="CVE"/>
		<reference ref_id="CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962/" source="CVE"/>
		<reference ref_id="CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964/" source="CVE"/>
		<reference ref_id="CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965/" source="CVE"/>
		<reference ref_id="CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966/" source="CVE"/>
		<reference ref_id="CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974/" source="CVE"/>
		<reference ref_id="CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977/" source="CVE"/>
		<reference ref_id="CVE-2016-1978" ref_url="https://www.suse.com/security/cve/CVE-2016-1978/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790/" source="CVE"/>
		<reference ref_id="CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791/" source="CVE"/>
		<reference ref_id="CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792/" source="CVE"/>
		<reference ref_id="CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793/" source="CVE"/>
		<reference ref_id="CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794/" source="CVE"/>
		<reference ref_id="CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795/" source="CVE"/>
		<reference ref_id="CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796/" source="CVE"/>
		<reference ref_id="CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797/" source="CVE"/>
		<reference ref_id="CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798/" source="CVE"/>
		<reference ref_id="CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799/" source="CVE"/>
		<reference ref_id="CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800/" source="CVE"/>
		<reference ref_id="CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801/" source="CVE"/>
		<reference ref_id="CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802/" source="CVE"/>
		<description>

This update for MozillaFirefox, mozilla-nspr, mozilla-nss fixes the following issues:

Mozilla Firefox was updated to 38.7.0 ESR (bsc#969894), fixing
following security issues:
* MFSA 2016-16/CVE-2016-1952/CVE-2016-1953
  Miscellaneous memory safety hazards (rv:45.0 / rv:38.7)
* MFSA 2016-17/CVE-2016-1954
  Local file overwriting and potential privilege escalation
  through CSP reports
* MFSA 2016-20/CVE-2016-1957
  Memory leak in libstagefright when deleting an array during
  MP4 processing
* MFSA 2016-21/CVE-2016-1958
  Displayed page address can be overridden
* MFSA 2016-23/CVE-2016-1960
  Use-after-free in HTML5 string parser
* MFSA 2016-24/CVE-2016-1961
  Use-after-free in SetBody
* MFSA 2016-25/CVE-2016-1962
  Use-after-free when using multiple WebRTC data channels
* MFSA 2016-27/CVE-2016-1964
  Use-after-free during XML transformations
* MFSA 2016-28/CVE-2016-1965
  Addressbar spoofing though history navigation and Location
  protocol property
* MFSA 2016-31/CVE-2016-1966
  Memory corruption with malicious NPAPI plugin
* MFSA 2016-34/CVE-2016-1974
  Out-of-bounds read in HTML parser following a failed
  allocation
* MFSA 2016-35/CVE-2016-1950
  Buffer overflow during ASN.1 decoding in NSS
* MFSA 2016-37/CVE-2016-1977/CVE-2016-2790/CVE-2016-2791/
  CVE-2016-2792/CVE-2016-2793/CVE-2016-2794/CVE-2016-2795/
  CVE-2016-2796/CVE-2016-2797/CVE-2016-2798/CVE-2016-2799/
  CVE-2016-2800/CVE-2016-2801/CVE-2016-2802
  Font vulnerabilities in the Graphite 2 library

Mozilla NSPR was updated to version 4.12 (bsc#969894), fixing following bugs:
* added a PR_GetEnvSecure function, which attempts to detect if
  the program is being executed with elevated privileges, and
  returns NULL if detected. It is recommended to use this function
  in general purpose library code.
* fixed a memory allocation bug related to the PR_*printf functions
* exported API PR_DuplicateEnvironment, which had already been
  added in NSPR 4.10.9
* added support for FreeBSD aarch64
* several minor correctness and compatibility fixes

Mozilla NSS was updated to fix security issues (bsc#969894):
* MFSA 2016-15/CVE-2016-1978
  Use-after-free in NSS during SSL connections in low memory
* MFSA 2016-35/CVE-2016-1950
  Buffer overflow during ASN.1 decoding in NSS
* MFSA 2016-36/CVE-2016-1979
  Use-after-free during processing of DER encoded keys in NSS
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-30"/>
	<updated date="2016-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1950">CVE-2016-1950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1952">CVE-2016-1952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1953/">CVE-2016-1953 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1953">CVE-2016-1953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1954">CVE-2016-1954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1957">CVE-2016-1957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1958">CVE-2016-1958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1960">CVE-2016-1960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1961">CVE-2016-1961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1962">CVE-2016-1962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1964">CVE-2016-1964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1965">CVE-2016-1965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1966">CVE-2016-1966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1974">CVE-2016-1974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1977">CVE-2016-1977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1978/">CVE-2016-1978 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1978">CVE-2016-1978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1979">CVE-2016-1979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2790">CVE-2016-2790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2791">CVE-2016-2791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2792">CVE-2016-2792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2793">CVE-2016-2793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2794">CVE-2016-2794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2795">CVE-2016-2795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2796">CVE-2016-2796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2797">CVE-2016-2797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2798">CVE-2016-2798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2799">CVE-2016-2799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2800">CVE-2016-2800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2801">CVE-2016-2801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2802">CVE-2016-2802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571447" comment="MozillaFirefox-38.7.0esr-36.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571448" comment="MozillaFirefox-translations-38.7.0esr-36.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571449" comment="libfreebl3-3.20.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571450" comment="libfreebl3-32bit-3.20.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571451" comment="mozilla-nspr-4.12-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571452" comment="mozilla-nspr-32bit-4.12-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571453" comment="mozilla-nss-3.20.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571454" comment="mozilla-nss-32bit-3.20.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571455" comment="mozilla-nss-tools-3.20.2-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217112" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1060445" ref_url="https://bugzilla.suse.com/1060445" source="BUGZILLA"/>
		<reference ref_id="1061005" ref_url="https://bugzilla.suse.com/1061005" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7793" ref_url="https://www.suse.com/security/cve/CVE-2017-7793/" source="CVE"/>
		<reference ref_id="CVE-2017-7805" ref_url="https://www.suse.com/security/cve/CVE-2017-7805/" source="CVE"/>
		<reference ref_id="CVE-2017-7810" ref_url="https://www.suse.com/security/cve/CVE-2017-7810/" source="CVE"/>
		<reference ref_id="CVE-2017-7814" ref_url="https://www.suse.com/security/cve/CVE-2017-7814/" source="CVE"/>
		<reference ref_id="CVE-2017-7818" ref_url="https://www.suse.com/security/cve/CVE-2017-7818/" source="CVE"/>
		<reference ref_id="CVE-2017-7819" ref_url="https://www.suse.com/security/cve/CVE-2017-7819/" source="CVE"/>
		<reference ref_id="CVE-2017-7823" ref_url="https://www.suse.com/security/cve/CVE-2017-7823/" source="CVE"/>
		<reference ref_id="CVE-2017-7824" ref_url="https://www.suse.com/security/cve/CVE-2017-7824/" source="CVE"/>
		<reference ref_id="CVE-2017-7825" ref_url="https://www.suse.com/security/cve/CVE-2017-7825/" source="CVE"/>
		<description>


This update for MozillaFirefox and mozilla-nss fixes the following issues:

Mozilla Firefox was updated to ESR 52.4 (bsc#1060445)

* MFSA 2017-22/CVE-2017-7825: OS X fonts render some Tibetan and Arabic unicode characters as spaces
* MFSA 2017-22/CVE-2017-7805: Use-after-free in TLS 1.2 generating handshake hashes
* MFSA 2017-22/CVE-2017-7819: Use-after-free while resizing images in design mode
* MFSA 2017-22/CVE-2017-7818: Use-after-free during ARIA array manipulation
* MFSA 2017-22/CVE-2017-7793: Use-after-free with Fetch API
* MFSA 2017-22/CVE-2017-7824: Buffer overflow when drawing and validating elements with ANGLE
* MFSA 2017-22/CVE-2017-7810: Memory safety bugs fixed in Firefox 56 and Firefox ESR 52.4
* MFSA 2017-22/CVE-2017-7823: CSP sandbox directive did not create a unique origin
* MFSA 2017-22/CVE-2017-7814: Blob and data URLs bypass phishing and malware protection warnings

Mozilla Network Security Services (Mozilla NSS) received a security fix:

* MFSA 2017-22/CVE-2017-7805: Use-after-free in TLS 1.2 generating handshake hashes (bsc#1061005, bsc#1060445)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-27"/>
	<updated date="2017-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061005">SUSE bug 1061005</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7793/">CVE-2017-7793 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7793">CVE-2017-7793 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7805/">CVE-2017-7805 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7805">CVE-2017-7805 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7810/">CVE-2017-7810 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7810">CVE-2017-7810 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7814/">CVE-2017-7814 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7814">CVE-2017-7814 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7818/">CVE-2017-7818 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7818">CVE-2017-7818 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7819/">CVE-2017-7819 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7819">CVE-2017-7819 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7823/">CVE-2017-7823 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7823">CVE-2017-7823 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7824/">CVE-2017-7824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7824">CVE-2017-7824 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7825/">CVE-2017-7825 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7825">CVE-2017-7825 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571456" comment="MozillaFirefox-52.4.0esr-78.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571457" comment="MozillaFirefox-translations-52.4.0esr-78.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571458" comment="libfreebl3-3.29.5-38.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571459" comment="libfreebl3-32bit-3.29.5-38.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571460" comment="mozilla-nss-3.29.5-38.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571461" comment="mozilla-nss-32bit-3.29.5-38.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571462" comment="mozilla-nss-tools-3.29.5-38.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217113" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, firefox-glib2, firefox-gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1145550" ref_url="https://bugzilla.suse.com/1145550" source="BUGZILLA"/>
		<reference ref_id="1149294" ref_url="https://bugzilla.suse.com/1149294" source="BUGZILLA"/>
		<reference ref_id="1149295" ref_url="https://bugzilla.suse.com/1149295" source="BUGZILLA"/>
		<reference ref_id="1149296" ref_url="https://bugzilla.suse.com/1149296" source="BUGZILLA"/>
		<reference ref_id="1149297" ref_url="https://bugzilla.suse.com/1149297" source="BUGZILLA"/>
		<reference ref_id="1149298" ref_url="https://bugzilla.suse.com/1149298" source="BUGZILLA"/>
		<reference ref_id="1149299" ref_url="https://bugzilla.suse.com/1149299" source="BUGZILLA"/>
		<reference ref_id="1149303" ref_url="https://bugzilla.suse.com/1149303" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<description>
This update for MozillaFirefox, firefox-glib2, firefox-gtk3 fixes the following issues:

Mozilla Firefox was updated to the 60.9.0esr release:

Security Advisory MFSA 2019-27:

* Use-after-free while manipulating video
  CVE-2019-11746 (bmo#1564449, bsc#1149297)
* XSS by breaking out of title and textarea elements using innerHTML
  CVE-2019-11744 (bmo#1562033, bsc#1149297)
* Same-origin policy violation with SVG filters and canvas to steal
  cross-origin images
  CVE-2019-11742 (bmo#1559715, bsc#1149303)
* Privilege escalation with Mozilla Maintenance Service in custom
  Firefox installation location
  CVE-2019-11753 (bmo#1574980, bsc#1149295)
* Use-after-free while extracting a key value in IndexedDB
  CVE-2019-11752 (bmo#1501152, bsc#1149296)
* Sandbox escape through Firefox Sync
  CVE-2019-9812 (bmo#1538008, bmo#1538015, bsc#1149294)
* Cross-origin access to unload event attributes
  CVE-2019-11743 (bmo#1560495, bsc#1149298)
  Navigation-Timing Level 2 specification
* Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, and Firefox ESR 60.9
  CVE-2019-11740 (bmo#1563133, bmo#1573160, bsc#1149299)

- Rebuild glib2 schemas on SLE-11 (bsc#1145550)

Changes in firefox-glib2:

- Fix the rpm macros %glib2_gsettings_schema_* which were replaced with
  %nil in Factory because they're no longer needed, but we still need
  them in SLE11 (bsc#1145550)

Changes in firefox-gtk3:

- Rebuild so %glib2_gsettings_schema_post gets called with fixed 
  rpm macros %glib2_gsettings_schema_* in firefox-glib2 package
  which were replaced with %nil in Factory because they're no 
  longer needed, but we still need them in SLE11 (bsc#1145550)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145550">SUSE bug 1145550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149294">SUSE bug 1149294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149295">SUSE bug 1149295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149296">SUSE bug 1149296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149297">SUSE bug 1149297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149298">SUSE bug 1149298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149299">SUSE bug 1149299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149303">SUSE bug 1149303</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11753">CVE-2019-11753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9812">CVE-2019-9812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571463" comment="MozillaFirefox-60.9.0esr-78.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571464" comment="MozillaFirefox-translations-common-60.9.0esr-78.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571465" comment="MozillaFirefox-translations-other-60.9.0esr-78.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571466" comment="firefox-gio-branding-upstream-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571467" comment="firefox-glib2-lang-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571468" comment="firefox-glib2-tools-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571469" comment="firefox-gtk3-branding-upstream-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571470" comment="firefox-gtk3-data-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571471" comment="firefox-gtk3-immodule-amharic-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571472" comment="firefox-gtk3-immodule-inuktitut-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571473" comment="firefox-gtk3-immodule-multipress-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571474" comment="firefox-gtk3-immodule-thai-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571475" comment="firefox-gtk3-immodule-vietnamese-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571476" comment="firefox-gtk3-immodule-xim-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571477" comment="firefox-gtk3-immodules-tigrigna-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571478" comment="firefox-gtk3-lang-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571479" comment="firefox-gtk3-tools-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571480" comment="firefox-libgtk-3-0-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571481" comment="libfirefox-gio-2_0-0-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571482" comment="libfirefox-glib-2_0-0-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571483" comment="libfirefox-gmodule-2_0-0-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571484" comment="libfirefox-gobject-2_0-0-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571485" comment="libfirefox-gthread-2_0-0-2.54.3-2.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217114" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1000036" ref_url="https://bugzilla.suse.com/1000036" source="BUGZILLA"/>
		<reference ref_id="1001652" ref_url="https://bugzilla.suse.com/1001652" source="BUGZILLA"/>
		<reference ref_id="1025108" ref_url="https://bugzilla.suse.com/1025108" source="BUGZILLA"/>
		<reference ref_id="1029377" ref_url="https://bugzilla.suse.com/1029377" source="BUGZILLA"/>
		<reference ref_id="1029902" ref_url="https://bugzilla.suse.com/1029902" source="BUGZILLA"/>
		<reference ref_id="1040164" ref_url="https://bugzilla.suse.com/1040164" source="BUGZILLA"/>
		<reference ref_id="104105" ref_url="https://bugzilla.suse.com/104105" source="BUGZILLA"/>
		<reference ref_id="1042670" ref_url="https://bugzilla.suse.com/1042670" source="BUGZILLA"/>
		<reference ref_id="1043008" ref_url="https://bugzilla.suse.com/1043008" source="BUGZILLA"/>
		<reference ref_id="1044946" ref_url="https://bugzilla.suse.com/1044946" source="BUGZILLA"/>
		<reference ref_id="1047925" ref_url="https://bugzilla.suse.com/1047925" source="BUGZILLA"/>
		<reference ref_id="1047936" ref_url="https://bugzilla.suse.com/1047936" source="BUGZILLA"/>
		<reference ref_id="1048299" ref_url="https://bugzilla.suse.com/1048299" source="BUGZILLA"/>
		<reference ref_id="1049186" ref_url="https://bugzilla.suse.com/1049186" source="BUGZILLA"/>
		<reference ref_id="1050653" ref_url="https://bugzilla.suse.com/1050653" source="BUGZILLA"/>
		<reference ref_id="1056058" ref_url="https://bugzilla.suse.com/1056058" source="BUGZILLA"/>
		<reference ref_id="1058013" ref_url="https://bugzilla.suse.com/1058013" source="BUGZILLA"/>
		<reference ref_id="1066242" ref_url="https://bugzilla.suse.com/1066242" source="BUGZILLA"/>
		<reference ref_id="1066953" ref_url="https://bugzilla.suse.com/1066953" source="BUGZILLA"/>
		<reference ref_id="1070738" ref_url="https://bugzilla.suse.com/1070738" source="BUGZILLA"/>
		<reference ref_id="1070853" ref_url="https://bugzilla.suse.com/1070853" source="BUGZILLA"/>
		<reference ref_id="1072320" ref_url="https://bugzilla.suse.com/1072320" source="BUGZILLA"/>
		<reference ref_id="1072322" ref_url="https://bugzilla.suse.com/1072322" source="BUGZILLA"/>
		<reference ref_id="1073796" ref_url="https://bugzilla.suse.com/1073796" source="BUGZILLA"/>
		<reference ref_id="1073798" ref_url="https://bugzilla.suse.com/1073798" source="BUGZILLA"/>
		<reference ref_id="1073799" ref_url="https://bugzilla.suse.com/1073799" source="BUGZILLA"/>
		<reference ref_id="1073803" ref_url="https://bugzilla.suse.com/1073803" source="BUGZILLA"/>
		<reference ref_id="1073808" ref_url="https://bugzilla.suse.com/1073808" source="BUGZILLA"/>
		<reference ref_id="1073818" ref_url="https://bugzilla.suse.com/1073818" source="BUGZILLA"/>
		<reference ref_id="1073823" ref_url="https://bugzilla.suse.com/1073823" source="BUGZILLA"/>
		<reference ref_id="1073829" ref_url="https://bugzilla.suse.com/1073829" source="BUGZILLA"/>
		<reference ref_id="1073830" ref_url="https://bugzilla.suse.com/1073830" source="BUGZILLA"/>
		<reference ref_id="1073832" ref_url="https://bugzilla.suse.com/1073832" source="BUGZILLA"/>
		<reference ref_id="1073846" ref_url="https://bugzilla.suse.com/1073846" source="BUGZILLA"/>
		<reference ref_id="1074235" ref_url="https://bugzilla.suse.com/1074235" source="BUGZILLA"/>
		<reference ref_id="1077230" ref_url="https://bugzilla.suse.com/1077230" source="BUGZILLA"/>
		<reference ref_id="1079761" ref_url="https://bugzilla.suse.com/1079761" source="BUGZILLA"/>
		<reference ref_id="1081750" ref_url="https://bugzilla.suse.com/1081750" source="BUGZILLA"/>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1087453" ref_url="https://bugzilla.suse.com/1087453" source="BUGZILLA"/>
		<reference ref_id="1087459" ref_url="https://bugzilla.suse.com/1087459" source="BUGZILLA"/>
		<reference ref_id="1087463" ref_url="https://bugzilla.suse.com/1087463" source="BUGZILLA"/>
		<reference ref_id="1088573" ref_url="https://bugzilla.suse.com/1088573" source="BUGZILLA"/>
		<reference ref_id="1091764" ref_url="https://bugzilla.suse.com/1091764" source="BUGZILLA"/>
		<reference ref_id="1094814" ref_url="https://bugzilla.suse.com/1094814" source="BUGZILLA"/>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="1097375" ref_url="https://bugzilla.suse.com/1097375" source="BUGZILLA"/>
		<reference ref_id="1097401" ref_url="https://bugzilla.suse.com/1097401" source="BUGZILLA"/>
		<reference ref_id="1097404" ref_url="https://bugzilla.suse.com/1097404" source="BUGZILLA"/>
		<reference ref_id="1097748" ref_url="https://bugzilla.suse.com/1097748" source="BUGZILLA"/>
		<reference ref_id="1104841" ref_url="https://bugzilla.suse.com/1104841" source="BUGZILLA"/>
		<reference ref_id="1105019" ref_url="https://bugzilla.suse.com/1105019" source="BUGZILLA"/>
		<reference ref_id="1107030" ref_url="https://bugzilla.suse.com/1107030" source="BUGZILLA"/>
		<reference ref_id="1109465" ref_url="https://bugzilla.suse.com/1109465" source="BUGZILLA"/>
		<reference ref_id="1117473" ref_url="https://bugzilla.suse.com/1117473" source="BUGZILLA"/>
		<reference ref_id="1117626" ref_url="https://bugzilla.suse.com/1117626" source="BUGZILLA"/>
		<reference ref_id="1117627" ref_url="https://bugzilla.suse.com/1117627" source="BUGZILLA"/>
		<reference ref_id="1117629" ref_url="https://bugzilla.suse.com/1117629" source="BUGZILLA"/>
		<reference ref_id="1117630" ref_url="https://bugzilla.suse.com/1117630" source="BUGZILLA"/>
		<reference ref_id="1120644" ref_url="https://bugzilla.suse.com/1120644" source="BUGZILLA"/>
		<reference ref_id="1122191" ref_url="https://bugzilla.suse.com/1122191" source="BUGZILLA"/>
		<reference ref_id="1123482" ref_url="https://bugzilla.suse.com/1123482" source="BUGZILLA"/>
		<reference ref_id="1124525" ref_url="https://bugzilla.suse.com/1124525" source="BUGZILLA"/>
		<reference ref_id="1127532" ref_url="https://bugzilla.suse.com/1127532" source="BUGZILLA"/>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="1130694" ref_url="https://bugzilla.suse.com/1130694" source="BUGZILLA"/>
		<reference ref_id="1130840" ref_url="https://bugzilla.suse.com/1130840" source="BUGZILLA"/>
		<reference ref_id="1133452" ref_url="https://bugzilla.suse.com/1133452" source="BUGZILLA"/>
		<reference ref_id="1133810" ref_url="https://bugzilla.suse.com/1133810" source="BUGZILLA"/>
		<reference ref_id="1134209" ref_url="https://bugzilla.suse.com/1134209" source="BUGZILLA"/>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="1140290" ref_url="https://bugzilla.suse.com/1140290" source="BUGZILLA"/>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="1144919" ref_url="https://bugzilla.suse.com/1144919" source="BUGZILLA"/>
		<reference ref_id="1145665" ref_url="https://bugzilla.suse.com/1145665" source="BUGZILLA"/>
		<reference ref_id="1146090" ref_url="https://bugzilla.suse.com/1146090" source="BUGZILLA"/>
		<reference ref_id="1146091" ref_url="https://bugzilla.suse.com/1146091" source="BUGZILLA"/>
		<reference ref_id="1146093" ref_url="https://bugzilla.suse.com/1146093" source="BUGZILLA"/>
		<reference ref_id="1146094" ref_url="https://bugzilla.suse.com/1146094" source="BUGZILLA"/>
		<reference ref_id="1146095" ref_url="https://bugzilla.suse.com/1146095" source="BUGZILLA"/>
		<reference ref_id="1146097" ref_url="https://bugzilla.suse.com/1146097" source="BUGZILLA"/>
		<reference ref_id="1146099" ref_url="https://bugzilla.suse.com/1146099" source="BUGZILLA"/>
		<reference ref_id="1146100" ref_url="https://bugzilla.suse.com/1146100" source="BUGZILLA"/>
		<reference ref_id="1149323" ref_url="https://bugzilla.suse.com/1149323" source="BUGZILLA"/>
		<reference ref_id="1153423" ref_url="https://bugzilla.suse.com/1153423" source="BUGZILLA"/>
		<reference ref_id="1154738" ref_url="https://bugzilla.suse.com/1154738" source="BUGZILLA"/>
		<reference ref_id="1447070" ref_url="https://bugzilla.suse.com/1447070" source="BUGZILLA"/>
		<reference ref_id="1447409" ref_url="https://bugzilla.suse.com/1447409" source="BUGZILLA"/>
		<reference ref_id="744625" ref_url="https://bugzilla.suse.com/744625" source="BUGZILLA"/>
		<reference ref_id="744629" ref_url="https://bugzilla.suse.com/744629" source="BUGZILLA"/>
		<reference ref_id="845955" ref_url="https://bugzilla.suse.com/845955" source="BUGZILLA"/>
		<reference ref_id="865853" ref_url="https://bugzilla.suse.com/865853" source="BUGZILLA"/>
		<reference ref_id="905528" ref_url="https://bugzilla.suse.com/905528" source="BUGZILLA"/>
		<reference ref_id="917607" ref_url="https://bugzilla.suse.com/917607" source="BUGZILLA"/>
		<reference ref_id="935856" ref_url="https://bugzilla.suse.com/935856" source="BUGZILLA"/>
		<reference ref_id="937414" ref_url="https://bugzilla.suse.com/937414" source="BUGZILLA"/>
		<reference ref_id="947747" ref_url="https://bugzilla.suse.com/947747" source="BUGZILLA"/>
		<reference ref_id="948045" ref_url="https://bugzilla.suse.com/948045" source="BUGZILLA"/>
		<reference ref_id="948602" ref_url="https://bugzilla.suse.com/948602" source="BUGZILLA"/>
		<reference ref_id="955142" ref_url="https://bugzilla.suse.com/955142" source="BUGZILLA"/>
		<reference ref_id="957814" ref_url="https://bugzilla.suse.com/957814" source="BUGZILLA"/>
		<reference ref_id="957815" ref_url="https://bugzilla.suse.com/957815" source="BUGZILLA"/>
		<reference ref_id="961254" ref_url="https://bugzilla.suse.com/961254" source="BUGZILLA"/>
		<reference ref_id="962297" ref_url="https://bugzilla.suse.com/962297" source="BUGZILLA"/>
		<reference ref_id="966076" ref_url="https://bugzilla.suse.com/966076" source="BUGZILLA"/>
		<reference ref_id="966077" ref_url="https://bugzilla.suse.com/966077" source="BUGZILLA"/>
		<reference ref_id="985201" ref_url="https://bugzilla.suse.com/985201" source="BUGZILLA"/>
		<reference ref_id="986541" ref_url="https://bugzilla.suse.com/986541" source="BUGZILLA"/>
		<reference ref_id="991344" ref_url="https://bugzilla.suse.com/991344" source="BUGZILLA"/>
		<reference ref_id="998743" ref_url="https://bugzilla.suse.com/998743" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2882" ref_url="https://www.suse.com/security/cve/CVE-2013-2882/" source="CVE"/>
		<reference ref_id="CVE-2013-6639" ref_url="https://www.suse.com/security/cve/CVE-2013-6639/" source="CVE"/>
		<reference ref_id="CVE-2013-6640" ref_url="https://www.suse.com/security/cve/CVE-2013-6640/" source="CVE"/>
		<reference ref_id="CVE-2013-6668" ref_url="https://www.suse.com/security/cve/CVE-2013-6668/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2015-3193" ref_url="https://www.suse.com/security/cve/CVE-2015-3193/" source="CVE"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-5380" ref_url="https://www.suse.com/security/cve/CVE-2015-5380/" source="CVE"/>
		<reference ref_id="CVE-2015-7384" ref_url="https://www.suse.com/security/cve/CVE-2015-7384/" source="CVE"/>
		<reference ref_id="CVE-2016-2086" ref_url="https://www.suse.com/security/cve/CVE-2016-2086/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-2216" ref_url="https://www.suse.com/security/cve/CVE-2016-2216/" source="CVE"/>
		<reference ref_id="CVE-2016-5172" ref_url="https://www.suse.com/security/cve/CVE-2016-5172/" source="CVE"/>
		<reference ref_id="CVE-2016-5325" ref_url="https://www.suse.com/security/cve/CVE-2016-5325/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="CVE-2016-7052" ref_url="https://www.suse.com/security/cve/CVE-2016-7052/" source="CVE"/>
		<reference ref_id="CVE-2016-7099" ref_url="https://www.suse.com/security/cve/CVE-2016-7099/" source="CVE"/>
		<reference ref_id="CVE-2017-1000381" ref_url="https://www.suse.com/security/cve/CVE-2017-1000381/" source="CVE"/>
		<reference ref_id="CVE-2017-10686" ref_url="https://www.suse.com/security/cve/CVE-2017-10686/" source="CVE"/>
		<reference ref_id="CVE-2017-11111" ref_url="https://www.suse.com/security/cve/CVE-2017-11111/" source="CVE"/>
		<reference ref_id="CVE-2017-11499" ref_url="https://www.suse.com/security/cve/CVE-2017-11499/" source="CVE"/>
		<reference ref_id="CVE-2017-14228" ref_url="https://www.suse.com/security/cve/CVE-2017-14228/" source="CVE"/>
		<reference ref_id="CVE-2017-14849" ref_url="https://www.suse.com/security/cve/CVE-2017-14849/" source="CVE"/>
		<reference ref_id="CVE-2017-14919" ref_url="https://www.suse.com/security/cve/CVE-2017-14919/" source="CVE"/>
		<reference ref_id="CVE-2017-15896" ref_url="https://www.suse.com/security/cve/CVE-2017-15896/" source="CVE"/>
		<reference ref_id="CVE-2017-15897" ref_url="https://www.suse.com/security/cve/CVE-2017-15897/" source="CVE"/>
		<reference ref_id="CVE-2017-17810" ref_url="https://www.suse.com/security/cve/CVE-2017-17810/" source="CVE"/>
		<reference ref_id="CVE-2017-17811" ref_url="https://www.suse.com/security/cve/CVE-2017-17811/" source="CVE"/>
		<reference ref_id="CVE-2017-17812" ref_url="https://www.suse.com/security/cve/CVE-2017-17812/" source="CVE"/>
		<reference ref_id="CVE-2017-17813" ref_url="https://www.suse.com/security/cve/CVE-2017-17813/" source="CVE"/>
		<reference ref_id="CVE-2017-17814" ref_url="https://www.suse.com/security/cve/CVE-2017-17814/" source="CVE"/>
		<reference ref_id="CVE-2017-17815" ref_url="https://www.suse.com/security/cve/CVE-2017-17815/" source="CVE"/>
		<reference ref_id="CVE-2017-17816" ref_url="https://www.suse.com/security/cve/CVE-2017-17816/" source="CVE"/>
		<reference ref_id="CVE-2017-17817" ref_url="https://www.suse.com/security/cve/CVE-2017-17817/" source="CVE"/>
		<reference ref_id="CVE-2017-17818" ref_url="https://www.suse.com/security/cve/CVE-2017-17818/" source="CVE"/>
		<reference ref_id="CVE-2017-17819" ref_url="https://www.suse.com/security/cve/CVE-2017-17819/" source="CVE"/>
		<reference ref_id="CVE-2017-17820" ref_url="https://www.suse.com/security/cve/CVE-2017-17820/" source="CVE"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<reference ref_id="CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735/" source="CVE"/>
		<reference ref_id="CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736/" source="CVE"/>
		<reference ref_id="CVE-2017-3738" ref_url="https://www.suse.com/security/cve/CVE-2017-3738/" source="CVE"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-1000168" ref_url="https://www.suse.com/security/cve/CVE-2018-1000168/" source="CVE"/>
		<reference ref_id="CVE-2018-12115" ref_url="https://www.suse.com/security/cve/CVE-2018-12115/" source="CVE"/>
		<reference ref_id="CVE-2018-12116" ref_url="https://www.suse.com/security/cve/CVE-2018-12116/" source="CVE"/>
		<reference ref_id="CVE-2018-12121" ref_url="https://www.suse.com/security/cve/CVE-2018-12121/" source="CVE"/>
		<reference ref_id="CVE-2018-12122" ref_url="https://www.suse.com/security/cve/CVE-2018-12122/" source="CVE"/>
		<reference ref_id="CVE-2018-12123" ref_url="https://www.suse.com/security/cve/CVE-2018-12123/" source="CVE"/>
		<reference ref_id="CVE-2018-20406" ref_url="https://www.suse.com/security/cve/CVE-2018-20406/" source="CVE"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2018-7158" ref_url="https://www.suse.com/security/cve/CVE-2018-7158/" source="CVE"/>
		<reference ref_id="CVE-2018-7159" ref_url="https://www.suse.com/security/cve/CVE-2018-7159/" source="CVE"/>
		<reference ref_id="CVE-2018-7160" ref_url="https://www.suse.com/security/cve/CVE-2018-7160/" source="CVE"/>
		<reference ref_id="CVE-2018-7161" ref_url="https://www.suse.com/security/cve/CVE-2018-7161/" source="CVE"/>
		<reference ref_id="CVE-2018-7167" ref_url="https://www.suse.com/security/cve/CVE-2018-7167/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11710" ref_url="https://www.suse.com/security/cve/CVE-2019-11710/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11714" ref_url="https://www.suse.com/security/cve/CVE-2019-11714/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11716" ref_url="https://www.suse.com/security/cve/CVE-2019-11716/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11718" ref_url="https://www.suse.com/security/cve/CVE-2019-11718/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11720" ref_url="https://www.suse.com/security/cve/CVE-2019-11720/" source="CVE"/>
		<reference ref_id="CVE-2019-11721" ref_url="https://www.suse.com/security/cve/CVE-2019-11721/" source="CVE"/>
		<reference ref_id="CVE-2019-11723" ref_url="https://www.suse.com/security/cve/CVE-2019-11723/" source="CVE"/>
		<reference ref_id="CVE-2019-11724" ref_url="https://www.suse.com/security/cve/CVE-2019-11724/" source="CVE"/>
		<reference ref_id="CVE-2019-11725" ref_url="https://www.suse.com/security/cve/CVE-2019-11725/" source="CVE"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11728" ref_url="https://www.suse.com/security/cve/CVE-2019-11728/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-11733" ref_url="https://www.suse.com/security/cve/CVE-2019-11733/" source="CVE"/>
		<reference ref_id="CVE-2019-11735" ref_url="https://www.suse.com/security/cve/CVE-2019-11735/" source="CVE"/>
		<reference ref_id="CVE-2019-11736" ref_url="https://www.suse.com/security/cve/CVE-2019-11736/" source="CVE"/>
		<reference ref_id="CVE-2019-11738" ref_url="https://www.suse.com/security/cve/CVE-2019-11738/" source="CVE"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11747" ref_url="https://www.suse.com/security/cve/CVE-2019-11747/" source="CVE"/>
		<reference ref_id="CVE-2019-11748" ref_url="https://www.suse.com/security/cve/CVE-2019-11748/" source="CVE"/>
		<reference ref_id="CVE-2019-11749" ref_url="https://www.suse.com/security/cve/CVE-2019-11749/" source="CVE"/>
		<reference ref_id="CVE-2019-11750" ref_url="https://www.suse.com/security/cve/CVE-2019-11750/" source="CVE"/>
		<reference ref_id="CVE-2019-11751" ref_url="https://www.suse.com/security/cve/CVE-2019-11751/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757/" source="CVE"/>
		<reference ref_id="CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758/" source="CVE"/>
		<reference ref_id="CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759/" source="CVE"/>
		<reference ref_id="CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760/" source="CVE"/>
		<reference ref_id="CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761/" source="CVE"/>
		<reference ref_id="CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762/" source="CVE"/>
		<reference ref_id="CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763/" source="CVE"/>
		<reference ref_id="CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764/" source="CVE"/>
		<reference ref_id="CVE-2019-13173" ref_url="https://www.suse.com/security/cve/CVE-2019-13173/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="CVE-2019-5737" ref_url="https://www.suse.com/security/cve/CVE-2019-5737/" source="CVE"/>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2019-9512" ref_url="https://www.suse.com/security/cve/CVE-2019-9512/" source="CVE"/>
		<reference ref_id="CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513/" source="CVE"/>
		<reference ref_id="CVE-2019-9514" ref_url="https://www.suse.com/security/cve/CVE-2019-9514/" source="CVE"/>
		<reference ref_id="CVE-2019-9515" ref_url="https://www.suse.com/security/cve/CVE-2019-9515/" source="CVE"/>
		<reference ref_id="CVE-2019-9516" ref_url="https://www.suse.com/security/cve/CVE-2019-9516/" source="CVE"/>
		<reference ref_id="CVE-2019-9517" ref_url="https://www.suse.com/security/cve/CVE-2019-9517/" source="CVE"/>
		<reference ref_id="CVE-2019-9518" ref_url="https://www.suse.com/security/cve/CVE-2019-9518/" source="CVE"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<description>

This update contains the Mozilla Firefox ESR 68.2 release.

Mozilla Firefox was updated to ESR 68.2 release:

* Enterprise: New administrative policies were added. More
  information and templates are available at the Policy
  Templates page.

* Various security fixes:
  MFSA 2019-33 (bsc#1154738)
  * CVE-2019-15903: Heap overflow in expat library in XML_GetCurrentLineNumber
  * CVE-2019-11757: Use-after-free when creating index updates in IndexedDB
  * CVE-2019-11758: Potentially exploitable crash due to 360 Total Security
  * CVE-2019-11759: Stack buffer overflow in HKDF output
  * CVE-2019-11760: Stack buffer overflow in WebRTC networking
  * CVE-2019-11761: Unintended access to a privileged JSONView object
  * CVE-2019-11762: document.domain-based origin isolation has same-origin- property violation
  * CVE-2019-11763: Incorrect HTML parsing results in XSS bypass technique
  * CVE-2019-11764: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2

Other Issues resolved:

* [bsc#1104841] Newer versions of firefox have a dependency on
                GLIBCXX_3.4.20
* [bsc#1074235] MozillaFirefox: background tab crash reports sent
                inadvertently without user opt-in
* [bsc#1043008] Firefox hangs randomly when browsing and
                scrolling
* [bsc#1025108] Firefox stops loading page until mouse is moved
* [bsc#905528]  Firefox malfunctions due to broken omni.ja
                archives

		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-17"/>
	<updated date="2020-01-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000036">SUSE bug 1000036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001652">SUSE bug 1001652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025108">SUSE bug 1025108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029377">SUSE bug 1029377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029902">SUSE bug 1029902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040164">SUSE bug 1040164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/104105">SUSE bug 104105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042670">SUSE bug 1042670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043008">SUSE bug 1043008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044946">SUSE bug 1044946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047925">SUSE bug 1047925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047936">SUSE bug 1047936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048299">SUSE bug 1048299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049186">SUSE bug 1049186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050653">SUSE bug 1050653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056058">SUSE bug 1056058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058013">SUSE bug 1058013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066242">SUSE bug 1066242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066953">SUSE bug 1066953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070738">SUSE bug 1070738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070853">SUSE bug 1070853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072320">SUSE bug 1072320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072322">SUSE bug 1072322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073796">SUSE bug 1073796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073798">SUSE bug 1073798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073799">SUSE bug 1073799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073803">SUSE bug 1073803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073808">SUSE bug 1073808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073818">SUSE bug 1073818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073823">SUSE bug 1073823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073829">SUSE bug 1073829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073830">SUSE bug 1073830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073832">SUSE bug 1073832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073846">SUSE bug 1073846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074235">SUSE bug 1074235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077230">SUSE bug 1077230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079761">SUSE bug 1079761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081750">SUSE bug 1081750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087453">SUSE bug 1087453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087459">SUSE bug 1087459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087463">SUSE bug 1087463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088573">SUSE bug 1088573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091764">SUSE bug 1091764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094814">SUSE bug 1094814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097375">SUSE bug 1097375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097401">SUSE bug 1097401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097404">SUSE bug 1097404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097748">SUSE bug 1097748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104841">SUSE bug 1104841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105019">SUSE bug 1105019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107030">SUSE bug 1107030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109465">SUSE bug 1109465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117473">SUSE bug 1117473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117626">SUSE bug 1117626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117627">SUSE bug 1117627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117629">SUSE bug 1117629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117630">SUSE bug 1117630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120644">SUSE bug 1120644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123482">SUSE bug 1123482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124525">SUSE bug 1124525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127532">SUSE bug 1127532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130694">SUSE bug 1130694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133452">SUSE bug 1133452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133810">SUSE bug 1133810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134209">SUSE bug 1134209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140290">SUSE bug 1140290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144919">SUSE bug 1144919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145665">SUSE bug 1145665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146090">SUSE bug 1146090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146091">SUSE bug 1146091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146093">SUSE bug 1146093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146094">SUSE bug 1146094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146095">SUSE bug 1146095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146097">SUSE bug 1146097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146099">SUSE bug 1146099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146100">SUSE bug 1146100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153423">SUSE bug 1153423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1447070">SUSE bug 1447070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1447409">SUSE bug 1447409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744625">SUSE bug 744625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744629">SUSE bug 744629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845955">SUSE bug 845955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865853">SUSE bug 865853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905528">SUSE bug 905528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917607">SUSE bug 917607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935856">SUSE bug 935856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937414">SUSE bug 937414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947747">SUSE bug 947747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948045">SUSE bug 948045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948602">SUSE bug 948602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955142">SUSE bug 955142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957814">SUSE bug 957814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957815">SUSE bug 957815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961254">SUSE bug 961254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962297">SUSE bug 962297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966076">SUSE bug 966076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966077">SUSE bug 966077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985201">SUSE bug 985201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986541">SUSE bug 986541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991344">SUSE bug 991344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998743">SUSE bug 998743</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2882/">CVE-2013-2882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2882">CVE-2013-2882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6639/">CVE-2013-6639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6639">CVE-2013-6639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6640/">CVE-2013-6640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6640">CVE-2013-6640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6668/">CVE-2013-6668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6668">CVE-2013-6668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0224">CVE-2014-0224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3193/">CVE-2015-3193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3193">CVE-2015-3193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3194">CVE-2015-3194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5380/">CVE-2015-5380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5380">CVE-2015-5380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7384/">CVE-2015-7384 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7384">CVE-2015-7384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2086/">CVE-2016-2086 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2086">CVE-2016-2086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2178">CVE-2016-2178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2216/">CVE-2016-2216 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2216">CVE-2016-2216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5172/">CVE-2016-5172 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5172">CVE-2016-5172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5325/">CVE-2016-5325 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5325">CVE-2016-5325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6304">CVE-2016-6304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6306">CVE-2016-6306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7052/">CVE-2016-7052 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7052">CVE-2016-7052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7099/">CVE-2016-7099 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7099">CVE-2016-7099 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000381/">CVE-2017-1000381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000381">CVE-2017-1000381 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10686/">CVE-2017-10686 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10686">CVE-2017-10686 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11111/">CVE-2017-11111 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11111">CVE-2017-11111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11499/">CVE-2017-11499 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11499">CVE-2017-11499 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14228/">CVE-2017-14228 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14228">CVE-2017-14228 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14849/">CVE-2017-14849 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14849">CVE-2017-14849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14919/">CVE-2017-14919 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14919">CVE-2017-14919 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15896/">CVE-2017-15896 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15896">CVE-2017-15896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15897/">CVE-2017-15897 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15897">CVE-2017-15897 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17810/">CVE-2017-17810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17810">CVE-2017-17810 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17811/">CVE-2017-17811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17811">CVE-2017-17811 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17812/">CVE-2017-17812 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17812">CVE-2017-17812 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17813/">CVE-2017-17813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17813">CVE-2017-17813 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17814/">CVE-2017-17814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17814">CVE-2017-17814 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17815/">CVE-2017-17815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17815">CVE-2017-17815 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17816/">CVE-2017-17816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17816">CVE-2017-17816 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17817/">CVE-2017-17817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17817">CVE-2017-17817 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17818/">CVE-2017-17818 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17818">CVE-2017-17818 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17819/">CVE-2017-17819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17819">CVE-2017-17819 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17820/">CVE-2017-17820 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17820">CVE-2017-17820 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18207">CVE-2017-18207 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3735">CVE-2017-3735 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3736">CVE-2017-3736 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3738/">CVE-2017-3738 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3738">CVE-2017-3738 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0732">CVE-2018-0732 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000168/">CVE-2018-1000168 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000168">CVE-2018-1000168 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12115/">CVE-2018-12115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12115">CVE-2018-12115 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12116/">CVE-2018-12116 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12116">CVE-2018-12116 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12121/">CVE-2018-12121 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12121">CVE-2018-12121 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12122/">CVE-2018-12122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12122">CVE-2018-12122 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12123/">CVE-2018-12123 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12123">CVE-2018-12123 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20406/">CVE-2018-20406 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20406">CVE-2018-20406 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20852">CVE-2018-20852 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7158/">CVE-2018-7158 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7158">CVE-2018-7158 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7159/">CVE-2018-7159 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7159">CVE-2018-7159 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7160/">CVE-2018-7160 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7160">CVE-2018-7160 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7161/">CVE-2018-7161 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7161">CVE-2018-7161 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7167/">CVE-2018-7167 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7167">CVE-2018-7167 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10160">CVE-2019-10160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11709">CVE-2019-11709 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11710/">CVE-2019-11710 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11710">CVE-2019-11710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11711">CVE-2019-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11712">CVE-2019-11712 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11713">CVE-2019-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11714/">CVE-2019-11714 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11714">CVE-2019-11714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11715">CVE-2019-11715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11716/">CVE-2019-11716 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11716">CVE-2019-11716 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11717">CVE-2019-11717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11718/">CVE-2019-11718 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11718">CVE-2019-11718 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11719">CVE-2019-11719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11720/">CVE-2019-11720 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11720">CVE-2019-11720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11721/">CVE-2019-11721 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11721">CVE-2019-11721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11723/">CVE-2019-11723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11723">CVE-2019-11723 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11724/">CVE-2019-11724 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11724">CVE-2019-11724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11725/">CVE-2019-11725 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11725">CVE-2019-11725 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11727">CVE-2019-11727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11728/">CVE-2019-11728 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11728">CVE-2019-11728 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11729">CVE-2019-11729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11730">CVE-2019-11730 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11733/">CVE-2019-11733 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11733">CVE-2019-11733 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11735/">CVE-2019-11735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11735">CVE-2019-11735 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11736/">CVE-2019-11736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11736">CVE-2019-11736 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11738/">CVE-2019-11738 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11738">CVE-2019-11738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11747/">CVE-2019-11747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11747">CVE-2019-11747 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11748/">CVE-2019-11748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11748">CVE-2019-11748 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11749/">CVE-2019-11749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11749">CVE-2019-11749 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11750/">CVE-2019-11750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11750">CVE-2019-11750 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11751/">CVE-2019-11751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11751">CVE-2019-11751 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11753">CVE-2019-11753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11757">CVE-2019-11757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11758">CVE-2019-11758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11759">CVE-2019-11759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11760">CVE-2019-11760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11761">CVE-2019-11761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11762">CVE-2019-11762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11763">CVE-2019-11763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11764">CVE-2019-11764 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13173/">CVE-2019-13173 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13173">CVE-2019-13173 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5010">CVE-2019-5010 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5737/">CVE-2019-5737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5737">CVE-2019-5737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9511">CVE-2019-9511 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9512/">CVE-2019-9512 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9512">CVE-2019-9512 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9513">CVE-2019-9513 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9514/">CVE-2019-9514 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9514">CVE-2019-9514 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9515/">CVE-2019-9515 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9515">CVE-2019-9515 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9516/">CVE-2019-9516 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9516">CVE-2019-9516 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9517/">CVE-2019-9517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9517">CVE-2019-9517 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9518/">CVE-2019-9518 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9518">CVE-2019-9518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9636">CVE-2019-9636 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9811">CVE-2019-9811 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9812">CVE-2019-9812 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571486" comment="MozillaFirefox-68.2.0-78.51.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571487" comment="MozillaFirefox-branding-SLED-68-21.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571488" comment="MozillaFirefox-translations-common-68.2.0-78.51.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571489" comment="MozillaFirefox-translations-other-68.2.0-78.51.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571490" comment="firefox-atk-lang-2.26.1-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571491" comment="firefox-gdk-pixbuf-lang-2.36.11-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571492" comment="firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571493" comment="firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571494" comment="firefox-gio-branding-upstream-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571495" comment="firefox-glib2-lang-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571496" comment="firefox-glib2-tools-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571497" comment="firefox-gtk3-branding-upstream-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571498" comment="firefox-gtk3-data-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571499" comment="firefox-gtk3-immodule-amharic-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571500" comment="firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571501" comment="firefox-gtk3-immodule-multipress-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571502" comment="firefox-gtk3-immodule-thai-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571503" comment="firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571504" comment="firefox-gtk3-immodule-xim-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571505" comment="firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571506" comment="firefox-gtk3-lang-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571507" comment="firefox-gtk3-tools-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571508" comment="firefox-libatk-1_0-0-2.26.1-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571509" comment="firefox-libcairo-gobject2-1.15.10-2.13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571510" comment="firefox-libcairo2-1.15.10-2.13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571511" comment="firefox-libffi4-5.3.1+r233831-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571512" comment="firefox-libffi7-3.2.1.git259-2.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571513" comment="firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571514" comment="firefox-libgtk-3-0-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571515" comment="firefox-libharfbuzz0-1.7.5-2.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571516" comment="firefox-libpango-1_0-0-1.40.14-2.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571517" comment="libfirefox-gio-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571518" comment="libfirefox-glib-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571519" comment="libfirefox-gmodule-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571520" comment="libfirefox-gobject-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571521" comment="libfirefox-gthread-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571522" comment="libfreebl3-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571523" comment="libfreebl3-32bit-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571524" comment="libsoftokn3-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571525" comment="libsoftokn3-32bit-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571526" comment="mozilla-nspr-4.21-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571527" comment="mozilla-nspr-32bit-4.21-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571528" comment="mozilla-nss-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571529" comment="mozilla-nss-32bit-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571530" comment="mozilla-nss-certs-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571531" comment="mozilla-nss-certs-32bit-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571532" comment="mozilla-nss-tools-3.45-38.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217115" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss, mozilla-nspr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1137338" ref_url="https://bugzilla.suse.com/1137338" source="BUGZILLA"/>
		<description>

This update contains Mozilla Firefox 60.7ESR.

It brings lots of security fixes and other improvements.

It also includes new additional helper libraries to allow Firefox to run on SUSE Linux Enterprise 11.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1137338">SUSE bug 1137338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571533" comment="MozillaFirefox-60.7.0esr-78.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571534" comment="MozillaFirefox-branding-SLED-60-21.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571535" comment="MozillaFirefox-translations-common-60.7.0esr-78.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571536" comment="MozillaFirefox-translations-other-60.7.0esr-78.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571537" comment="firefox-at-spi2-core-2.10.2-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571538" comment="firefox-at-spi2-core-lang-2.10.2-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571539" comment="firefox-atk-lang-2.26.1-2.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571540" comment="firefox-dbus-1-glib-0.76-34.2.4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571541" comment="firefox-gdk-pixbuf-lang-2.36.11-2.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571542" comment="firefox-gdk-pixbuf-query-loaders-2.36.11-2.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571543" comment="firefox-gdk-pixbuf-thumbnailer-2.36.11-2.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571544" comment="firefox-gio-branding-upstream-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571545" comment="firefox-glib2-lang-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571546" comment="firefox-glib2-tools-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571547" comment="firefox-gtk3-branding-upstream-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571548" comment="firefox-gtk3-data-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571549" comment="firefox-gtk3-immodule-amharic-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571550" comment="firefox-gtk3-immodule-inuktitut-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571551" comment="firefox-gtk3-immodule-multipress-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571552" comment="firefox-gtk3-immodule-thai-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571553" comment="firefox-gtk3-immodule-vietnamese-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571554" comment="firefox-gtk3-immodule-xim-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571555" comment="firefox-gtk3-immodules-tigrigna-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571556" comment="firefox-gtk3-lang-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571557" comment="firefox-gtk3-tools-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571558" comment="firefox-libatk-1_0-0-2.26.1-2.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571559" comment="firefox-libatk-bridge-2_0-0-2.10.2-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571560" comment="firefox-libatspi0-2.10.2-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571561" comment="firefox-libcairo-gobject2-1.15.10-2.8.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571562" comment="firefox-libcairo2-1.15.10-2.8.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571563" comment="firefox-libfreetype6-2.9-2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571564" comment="firefox-libgdk_pixbuf-2_0-0-2.36.11-2.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571565" comment="firefox-libgtk-3-0-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571566" comment="firefox-libharfbuzz0-1.7.5-2.4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571567" comment="firefox-libpango-1_0-0-1.40.14-2.4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571568" comment="firefox-libpixman-1-0-0.34.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571569" comment="libfirefox-gio-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571570" comment="libfirefox-glib-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571571" comment="libfirefox-gmodule-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571572" comment="libfirefox-gobject-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571573" comment="libfirefox-gthread-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571574" comment="libfreebl3-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571575" comment="libfreebl3-32bit-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571576" comment="libsoftokn3-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571577" comment="libsoftokn3-32bit-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571578" comment="mozilla-nspr-4.20-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571579" comment="mozilla-nspr-32bit-4.20-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571580" comment="mozilla-nss-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571581" comment="mozilla-nss-32bit-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571582" comment="mozilla-nss-certs-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571583" comment="mozilla-nss-certs-32bit-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571584" comment="mozilla-nss-tools-3.41.1-38.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217116" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="900941" ref_url="https://bugzilla.suse.com/900941" source="BUGZILLA"/>
		<reference ref_id="905056" ref_url="https://bugzilla.suse.com/905056" source="BUGZILLA"/>
		<reference ref_id="905528" ref_url="https://bugzilla.suse.com/905528" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1574" ref_url="https://www.suse.com/security/cve/CVE-2014-1574/" source="CVE"/>
		<reference ref_id="CVE-2014-1575" ref_url="https://www.suse.com/security/cve/CVE-2014-1575/" source="CVE"/>
		<reference ref_id="CVE-2014-1576" ref_url="https://www.suse.com/security/cve/CVE-2014-1576/" source="CVE"/>
		<reference ref_id="CVE-2014-1577" ref_url="https://www.suse.com/security/cve/CVE-2014-1577/" source="CVE"/>
		<reference ref_id="CVE-2014-1578" ref_url="https://www.suse.com/security/cve/CVE-2014-1578/" source="CVE"/>
		<reference ref_id="CVE-2014-1581" ref_url="https://www.suse.com/security/cve/CVE-2014-1581/" source="CVE"/>
		<reference ref_id="CVE-2014-1583" ref_url="https://www.suse.com/security/cve/CVE-2014-1583/" source="CVE"/>
		<reference ref_id="CVE-2014-1585" ref_url="https://www.suse.com/security/cve/CVE-2014-1585/" source="CVE"/>
		<reference ref_id="CVE-2014-1586" ref_url="https://www.suse.com/security/cve/CVE-2014-1586/" source="CVE"/>
		<description>

This version update of Mozilla Firefox to 31.2.0ESR brings improvements, 
stability fixes and also security fixes for the following CVEs:

CVE-2014-1574, CVE-2014-1575, CVE-2014-1576 ,CVE-2014-1577, CVE-2014-1578, 
CVE-2014-1581, CVE-2014-1583, CVE-2014-1585, CVE-2014-1586

It also disables SSLv3 by default to mitigate the protocol downgrade attack 
known as POODLE.

Security Issues:

    * CVE-2014-1574
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574&gt;
    * CVE-2014-1575
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1575&gt;
    * CVE-2014-1576
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576&gt;
    * CVE-2014-1577
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577&gt;
    * CVE-2014-1578
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578&gt;
    * CVE-2014-1581
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581&gt;
    * CVE-2014-1583
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583&gt;
    * CVE-2014-1585
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585&gt;
    * CVE-2014-1586
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-15"/>
	<updated date="2014-11-15"/>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905056">SUSE bug 905056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905528">SUSE bug 905528</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1574/">CVE-2014-1574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1574">CVE-2014-1574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1575/">CVE-2014-1575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1575">CVE-2014-1575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1576/">CVE-2014-1576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1576">CVE-2014-1576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1577/">CVE-2014-1577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1577">CVE-2014-1577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1578/">CVE-2014-1578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1578">CVE-2014-1578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1581/">CVE-2014-1581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1581">CVE-2014-1581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1583/">CVE-2014-1583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1583">CVE-2014-1583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1585/">CVE-2014-1585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1585">CVE-2014-1585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1586/">CVE-2014-1586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1586">CVE-2014-1586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571585" comment="MozillaFirefox-31.2.0esr-0.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571586" comment="MozillaFirefox-branding-SLED-31.0-0.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571587" comment="MozillaFirefox-translations-31.2.0esr-0.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571588" comment="libfreebl3-3.17.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571589" comment="libfreebl3-32bit-3.17.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571590" comment="mozilla-nspr-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571591" comment="mozilla-nspr-32bit-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571592" comment="mozilla-nss-3.17.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571593" comment="mozilla-nss-32bit-3.17.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571594" comment="mozilla-nss-tools-3.17.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571585" comment="MozillaFirefox-31.2.0esr-0.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571586" comment="MozillaFirefox-branding-SLED-31.0-0.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571587" comment="MozillaFirefox-translations-31.2.0esr-0.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571588" comment="libfreebl3-3.17.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571589" comment="libfreebl3-32bit-3.17.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571590" comment="mozilla-nspr-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571591" comment="mozilla-nspr-32bit-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571592" comment="mozilla-nss-3.17.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571593" comment="mozilla-nss-32bit-3.17.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571594" comment="mozilla-nss-tools-3.17.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217117" version="1" class="patch">
	<metadata>
		<title>Security update for flac</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="906831" ref_url="https://bugzilla.suse.com/906831" source="BUGZILLA"/>
		<reference ref_id="907016" ref_url="https://bugzilla.suse.com/907016" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8962" ref_url="https://www.suse.com/security/cve/CVE-2014-8962/" source="CVE"/>
		<reference ref_id="CVE-2014-9028" ref_url="https://www.suse.com/security/cve/CVE-2014-9028/" source="CVE"/>
		<description>

flac was updated to fix two security issues:

    * Stack overflow may result in arbitrary code execution
      (CVE-2014-8962).
    * Heap overflow via specially crafted .flac files (CVE-2014-9028).

Security Issues:

    * CVE-2014-8962
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8962&gt;
    * CVE-2014-9028
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9028&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-01"/>
	<updated date="2014-12-01"/>
	<bugzilla href="https://bugzilla.suse.com/906831">SUSE bug 906831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907016">SUSE bug 907016</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8962/">CVE-2014-8962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8962">CVE-2014-8962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9028/">CVE-2014-9028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9028">CVE-2014-9028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571595" comment="libFLAC++6-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571596" comment="libFLAC8-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566534" comment="libFLAC8-32bit-1.2.1-68.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217118" version="1" class="patch">
	<metadata>
		<title>Security update for flac (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1196660" ref_url="https://bugzilla.suse.com/1196660" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0561" ref_url="https://www.suse.com/security/cve/CVE-2021-0561/" source="CVE"/>
		<description>
This update for flac fixes the following issues:

- CVE-2021-0561: Fixed out of bound write in append_to_verify_fifo_interleaved_ (bsc#1196660).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196660">SUSE bug 1196660</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0561/">CVE-2021-0561 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0561">CVE-2021-0561 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671852" comment="libFLAC++6-1.2.1-68.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671853" comment="libFLAC8-1.2.1-68.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671854" comment="libFLAC8-32bit-1.2.1-68.17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217119" version="1" class="patch">
	<metadata>
		<title>Security update for foomatic-filters</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="698451" ref_url="https://bugzilla.suse.com/698451" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2697" ref_url="https://www.suse.com/security/cve/CVE-2011-2697/" source="CVE"/>
		<reference ref_id="CVE-2011-2964" ref_url="https://www.suse.com/security/cve/CVE-2011-2964/" source="CVE"/>
		<description>

The foomatic print filters of the hplip package contained a remote code 
execution vulnerability. Remote users, if allowed to access a print server 
such as CUPS, could execute arbitrary commands as lp system user.

CVE-2011-2697: CVSS v2 Base Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P): Input 
Validation (CWE-20)

Security Issue references:

    * CVE-2011-2697
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2697&gt;
    * CVE-2011-2964
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2964&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-08-08"/>
	<updated date="2011-08-08"/>
	<bugzilla href="https://bugzilla.suse.com/698451">SUSE bug 698451</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2697/">CVE-2011-2697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2697">CVE-2011-2697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2964/">CVE-2011-2964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2964">CVE-2011-2964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991401" comment="foomatic-filters-3.0.2-269.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217120" version="1" class="patch">
	<metadata>
		<title>Security update for foomatic-filters (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="957531" ref_url="https://bugzilla.suse.com/957531" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8327" ref_url="https://www.suse.com/security/cve/CVE-2015-8327/" source="CVE"/>
		<reference ref_id="CVE-2015-8560" ref_url="https://www.suse.com/security/cve/CVE-2015-8560/" source="CVE"/>
		<description>

This update fixes the following security issues:

CVE-2015-8327: adds backtick and semicolon to the list of illegal shell escape characters (bsc#957531).
CVE-2015-8560: fixed code execution via improper escaping of ;  (bsc#957531).   
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-13"/>
	<updated date="2016-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/957531">SUSE bug 957531</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8327/">CVE-2015-8327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8327">CVE-2015-8327 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8560/">CVE-2015-8560 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8560">CVE-2015-8560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571598" comment="foomatic-filters-3.0.2-269.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217121" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="677335" ref_url="https://bugzilla.suse.com/677335" source="BUGZILLA"/>
		<reference ref_id="691783" ref_url="https://bugzilla.suse.com/691783" source="BUGZILLA"/>
		<reference ref_id="720144" ref_url="https://bugzilla.suse.com/720144" source="BUGZILLA"/>
		<reference ref_id="752873" ref_url="https://bugzilla.suse.com/752873" source="BUGZILLA"/>
		<reference ref_id="791666" ref_url="https://bugzilla.suse.com/791666" source="BUGZILLA"/>
		<reference ref_id="797313" ref_url="https://bugzilla.suse.com/797313" source="BUGZILLA"/>
		<reference ref_id="797515" ref_url="https://bugzilla.suse.com/797515" source="BUGZILLA"/>
		<reference ref_id="864576" ref_url="https://bugzilla.suse.com/864576" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-4966" ref_url="https://www.suse.com/security/cve/CVE-2011-4966/" source="CVE"/>
		<reference ref_id="CVE-2014-2015" ref_url="https://www.suse.com/security/cve/CVE-2014-2015/" source="CVE"/>
		<description>

This update fixes a denial of service (crash) security issue in the rlm_pap 
hash processing in FreeRadius, which could have been caused by special 
passwords fed into the RLM-PAP password checking method via LDAP by remote 
attackers.

Security Issue reference:

    * CVE-2014-2015
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2015&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-01"/>
	<updated date="2014-03-01"/>
	<bugzilla href="https://bugzilla.suse.com/677335">SUSE bug 677335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/691783">SUSE bug 691783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/720144">SUSE bug 720144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752873">SUSE bug 752873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791666">SUSE bug 791666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797313">SUSE bug 797313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797515">SUSE bug 797515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864576">SUSE bug 864576</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4966/">CVE-2011-4966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4966">CVE-2011-4966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2015/">CVE-2014-2015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2015">CVE-2014-2015 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991402" comment="freeradius-server-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991403" comment="freeradius-server-dialupadmin-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991404" comment="freeradius-server-doc-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991405" comment="freeradius-server-libs-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991406" comment="freeradius-server-utils-2.1.1-7.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217122" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1041445" ref_url="https://bugzilla.suse.com/1041445" source="BUGZILLA"/>
		<reference ref_id="912873" ref_url="https://bugzilla.suse.com/912873" source="BUGZILLA"/>
		<reference ref_id="935573" ref_url="https://bugzilla.suse.com/935573" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4680" ref_url="https://www.suse.com/security/cve/CVE-2015-4680/" source="CVE"/>
		<reference ref_id="CVE-2017-9148" ref_url="https://www.suse.com/security/cve/CVE-2017-9148/" source="CVE"/>
		<description>
This update for freeradius-server fixes the following issues:

- CVE-2017-9148: Disable OpenSSL's internal session cache to mitigate
  authentication bypass. (bnc#1041445)
- CVE-2015-4680: Add a configuration option to allow checking of all
  intermediate certificates for revocations. (bnc#935573)

The following non security issue was fixed:

- Cannot create table radpostauth because of deprecated TIMESTAMP(14) syntax. (bsc#912873)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-04"/>
	<updated date="2017-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1041445">SUSE bug 1041445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912873">SUSE bug 912873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935573">SUSE bug 935573</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4680/">CVE-2015-4680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4680">CVE-2015-4680 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-9148/">CVE-2017-9148 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9148">CVE-2017-9148 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571599" comment="freeradius-server-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571600" comment="freeradius-server-dialupadmin-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571601" comment="freeradius-server-doc-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571602" comment="freeradius-server-libs-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571603" comment="freeradius-server-utils-2.1.1-7.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217123" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1049086" ref_url="https://bugzilla.suse.com/1049086" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10978" ref_url="https://www.suse.com/security/cve/CVE-2017-10978/" source="CVE"/>
		<reference ref_id="CVE-2017-10979" ref_url="https://www.suse.com/security/cve/CVE-2017-10979/" source="CVE"/>
		<reference ref_id="CVE-2017-10981" ref_url="https://www.suse.com/security/cve/CVE-2017-10981/" source="CVE"/>
		<reference ref_id="CVE-2017-10982" ref_url="https://www.suse.com/security/cve/CVE-2017-10982/" source="CVE"/>
		<reference ref_id="CVE-2017-10983" ref_url="https://www.suse.com/security/cve/CVE-2017-10983/" source="CVE"/>
		<description>
This update for freeradius-server fixes the following issues:

Security issues fixed:
- CVE-2017-10981: DHCP - Fix memory leak in fr_dhcp_decode(). (bnc#1049086)
- CVE-2017-10982: Fix buffer over-read in fr_dhcp_decode_options(). (bsc#1049086)
- CVE-2017-10983: Fix read overflow when decoding option 63. (bnc#1049086)
- CVE-2017-10978: Fix read / write overflow in make_secret(). (bnc#1049086)
- CVE-2017-10979: Fix write overflow in rad_coalesce(). (bsc#1049086)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-23"/>
	<updated date="2017-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049086">SUSE bug 1049086</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10978/">CVE-2017-10978 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10978">CVE-2017-10978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10979/">CVE-2017-10979 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10979">CVE-2017-10979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10981/">CVE-2017-10981 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10981">CVE-2017-10981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10982/">CVE-2017-10982 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10982">CVE-2017-10982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10983/">CVE-2017-10983 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10983">CVE-2017-10983 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571604" comment="freeradius-server-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571605" comment="freeradius-server-dialupadmin-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571606" comment="freeradius-server-doc-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571607" comment="freeradius-server-libs-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571608" comment="freeradius-server-utils-2.1.1-7.25.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217124" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1180525" ref_url="https://bugzilla.suse.com/1180525" source="BUGZILLA"/>
		<description>
This update for freeradius-server fixes the following issues:

- Moved logrotate options into specific parts for each config as 'global' options
  will persist past and clobber global options in the main logrotate config (bsc#1180525)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180525">SUSE bug 1180525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571609" comment="freeradius-server-2.1.1-7.25.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571610" comment="freeradius-server-dialupadmin-2.1.1-7.25.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571611" comment="freeradius-server-doc-2.1.1-7.25.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571612" comment="freeradius-server-libs-2.1.1-7.25.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571613" comment="freeradius-server-utils-2.1.1-7.25.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217125" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="619562" ref_url="https://bugzilla.suse.com/619562" source="BUGZILLA"/>
		<reference ref_id="628213" ref_url="https://bugzilla.suse.com/628213" source="BUGZILLA"/>
		<reference ref_id="629447" ref_url="https://bugzilla.suse.com/629447" source="BUGZILLA"/>
		<reference ref_id="633938" ref_url="https://bugzilla.suse.com/633938" source="BUGZILLA"/>
		<reference ref_id="633943" ref_url="https://bugzilla.suse.com/633943" source="BUGZILLA"/>
		<reference ref_id="641580" ref_url="https://bugzilla.suse.com/641580" source="BUGZILLA"/>
		<reference ref_id="647375" ref_url="https://bugzilla.suse.com/647375" source="BUGZILLA"/>
		<reference ref_id="704612" ref_url="https://bugzilla.suse.com/704612" source="BUGZILLA"/>
		<reference ref_id="730124" ref_url="https://bugzilla.suse.com/730124" source="BUGZILLA"/>
		<reference ref_id="750937" ref_url="https://bugzilla.suse.com/750937" source="BUGZILLA"/>
		<reference ref_id="750938" ref_url="https://bugzilla.suse.com/750938" source="BUGZILLA"/>
		<reference ref_id="750939" ref_url="https://bugzilla.suse.com/750939" source="BUGZILLA"/>
		<reference ref_id="750940" ref_url="https://bugzilla.suse.com/750940" source="BUGZILLA"/>
		<reference ref_id="750941" ref_url="https://bugzilla.suse.com/750941" source="BUGZILLA"/>
		<reference ref_id="750942" ref_url="https://bugzilla.suse.com/750942" source="BUGZILLA"/>
		<reference ref_id="750943" ref_url="https://bugzilla.suse.com/750943" source="BUGZILLA"/>
		<reference ref_id="750944" ref_url="https://bugzilla.suse.com/750944" source="BUGZILLA"/>
		<reference ref_id="750945" ref_url="https://bugzilla.suse.com/750945" source="BUGZILLA"/>
		<reference ref_id="750946" ref_url="https://bugzilla.suse.com/750946" source="BUGZILLA"/>
		<reference ref_id="750947" ref_url="https://bugzilla.suse.com/750947" source="BUGZILLA"/>
		<reference ref_id="750948" ref_url="https://bugzilla.suse.com/750948" source="BUGZILLA"/>
		<reference ref_id="750949" ref_url="https://bugzilla.suse.com/750949" source="BUGZILLA"/>
		<reference ref_id="750950" ref_url="https://bugzilla.suse.com/750950" source="BUGZILLA"/>
		<reference ref_id="750951" ref_url="https://bugzilla.suse.com/750951" source="BUGZILLA"/>
		<reference ref_id="750952" ref_url="https://bugzilla.suse.com/750952" source="BUGZILLA"/>
		<reference ref_id="750953" ref_url="https://bugzilla.suse.com/750953" source="BUGZILLA"/>
		<reference ref_id="750954" ref_url="https://bugzilla.suse.com/750954" source="BUGZILLA"/>
		<reference ref_id="750955" ref_url="https://bugzilla.suse.com/750955" source="BUGZILLA"/>
		<reference ref_id="795826" ref_url="https://bugzilla.suse.com/795826" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-1797" ref_url="https://www.suse.com/security/cve/CVE-2010-1797/" source="CVE"/>
		<reference ref_id="CVE-2010-2497" ref_url="https://www.suse.com/security/cve/CVE-2010-2497/" source="CVE"/>
		<reference ref_id="CVE-2010-2498" ref_url="https://www.suse.com/security/cve/CVE-2010-2498/" source="CVE"/>
		<reference ref_id="CVE-2010-2499" ref_url="https://www.suse.com/security/cve/CVE-2010-2499/" source="CVE"/>
		<reference ref_id="CVE-2010-2500" ref_url="https://www.suse.com/security/cve/CVE-2010-2500/" source="CVE"/>
		<reference ref_id="CVE-2010-2519" ref_url="https://www.suse.com/security/cve/CVE-2010-2519/" source="CVE"/>
		<reference ref_id="CVE-2010-2520" ref_url="https://www.suse.com/security/cve/CVE-2010-2520/" source="CVE"/>
		<reference ref_id="CVE-2010-2527" ref_url="https://www.suse.com/security/cve/CVE-2010-2527/" source="CVE"/>
		<reference ref_id="CVE-2010-2541" ref_url="https://www.suse.com/security/cve/CVE-2010-2541/" source="CVE"/>
		<reference ref_id="CVE-2010-2805" ref_url="https://www.suse.com/security/cve/CVE-2010-2805/" source="CVE"/>
		<reference ref_id="CVE-2010-2806" ref_url="https://www.suse.com/security/cve/CVE-2010-2806/" source="CVE"/>
		<reference ref_id="CVE-2010-2807" ref_url="https://www.suse.com/security/cve/CVE-2010-2807/" source="CVE"/>
		<reference ref_id="CVE-2010-2808" ref_url="https://www.suse.com/security/cve/CVE-2010-2808/" source="CVE"/>
		<reference ref_id="CVE-2010-3053" ref_url="https://www.suse.com/security/cve/CVE-2010-3053/" source="CVE"/>
		<reference ref_id="CVE-2010-3054" ref_url="https://www.suse.com/security/cve/CVE-2010-3054/" source="CVE"/>
		<reference ref_id="CVE-2010-3311" ref_url="https://www.suse.com/security/cve/CVE-2010-3311/" source="CVE"/>
		<reference ref_id="CVE-2010-3814" ref_url="https://www.suse.com/security/cve/CVE-2010-3814/" source="CVE"/>
		<reference ref_id="CVE-2010-3855" ref_url="https://www.suse.com/security/cve/CVE-2010-3855/" source="CVE"/>
		<reference ref_id="CVE-2011-0226" ref_url="https://www.suse.com/security/cve/CVE-2011-0226/" source="CVE"/>
		<reference ref_id="CVE-2011-3256" ref_url="https://www.suse.com/security/cve/CVE-2011-3256/" source="CVE"/>
		<reference ref_id="CVE-2011-3439" ref_url="https://www.suse.com/security/cve/CVE-2011-3439/" source="CVE"/>
		<reference ref_id="CVE-2012-1126" ref_url="https://www.suse.com/security/cve/CVE-2012-1126/" source="CVE"/>
		<reference ref_id="CVE-2012-1127" ref_url="https://www.suse.com/security/cve/CVE-2012-1127/" source="CVE"/>
		<reference ref_id="CVE-2012-1128" ref_url="https://www.suse.com/security/cve/CVE-2012-1128/" source="CVE"/>
		<reference ref_id="CVE-2012-1129" ref_url="https://www.suse.com/security/cve/CVE-2012-1129/" source="CVE"/>
		<reference ref_id="CVE-2012-1130" ref_url="https://www.suse.com/security/cve/CVE-2012-1130/" source="CVE"/>
		<reference ref_id="CVE-2012-1131" ref_url="https://www.suse.com/security/cve/CVE-2012-1131/" source="CVE"/>
		<reference ref_id="CVE-2012-1132" ref_url="https://www.suse.com/security/cve/CVE-2012-1132/" source="CVE"/>
		<reference ref_id="CVE-2012-1133" ref_url="https://www.suse.com/security/cve/CVE-2012-1133/" source="CVE"/>
		<reference ref_id="CVE-2012-1134" ref_url="https://www.suse.com/security/cve/CVE-2012-1134/" source="CVE"/>
		<reference ref_id="CVE-2012-1135" ref_url="https://www.suse.com/security/cve/CVE-2012-1135/" source="CVE"/>
		<reference ref_id="CVE-2012-1136" ref_url="https://www.suse.com/security/cve/CVE-2012-1136/" source="CVE"/>
		<reference ref_id="CVE-2012-1137" ref_url="https://www.suse.com/security/cve/CVE-2012-1137/" source="CVE"/>
		<reference ref_id="CVE-2012-1138" ref_url="https://www.suse.com/security/cve/CVE-2012-1138/" source="CVE"/>
		<reference ref_id="CVE-2012-1139" ref_url="https://www.suse.com/security/cve/CVE-2012-1139/" source="CVE"/>
		<reference ref_id="CVE-2012-1140" ref_url="https://www.suse.com/security/cve/CVE-2012-1140/" source="CVE"/>
		<reference ref_id="CVE-2012-1141" ref_url="https://www.suse.com/security/cve/CVE-2012-1141/" source="CVE"/>
		<reference ref_id="CVE-2012-1142" ref_url="https://www.suse.com/security/cve/CVE-2012-1142/" source="CVE"/>
		<reference ref_id="CVE-2012-1143" ref_url="https://www.suse.com/security/cve/CVE-2012-1143/" source="CVE"/>
		<reference ref_id="CVE-2012-1144" ref_url="https://www.suse.com/security/cve/CVE-2012-1144/" source="CVE"/>
		<reference ref_id="CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668/" source="CVE"/>
		<reference ref_id="CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669/" source="CVE"/>
		<description>

This update fixes:

    * OOB access in bdf_free_font() and _bdf_parse_glyphs() (CVE-2012-5668
      and CVE-2012-5669)

As well as these non-security bugs:

    * [bdf] Savannah bug #37905.
          o src/bdf/bdflib.c (_bdf_parse_start): Reset `props_size' to zero
            in case of allocation error; this value gets used in a loop in
    * [bdf] Fix Savannah bug #37906.
          o src/bdf/bdflib.c (_bdf_parse_glyphs): Use correct array size
            for checking `glyph_enc'.

Security Issue references:

    * CVE-2012-5668
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668&gt;
    * CVE-2012-5669
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-01-15"/>
	<updated date="2013-01-15"/>
	<bugzilla href="https://bugzilla.suse.com/619562">SUSE bug 619562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/628213">SUSE bug 628213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629447">SUSE bug 629447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633938">SUSE bug 633938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633943">SUSE bug 633943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/641580">SUSE bug 641580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/647375">SUSE bug 647375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704612">SUSE bug 704612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/730124">SUSE bug 730124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750937">SUSE bug 750937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750938">SUSE bug 750938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750939">SUSE bug 750939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750940">SUSE bug 750940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750941">SUSE bug 750941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750942">SUSE bug 750942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750943">SUSE bug 750943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750944">SUSE bug 750944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750945">SUSE bug 750945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750946">SUSE bug 750946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750947">SUSE bug 750947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750948">SUSE bug 750948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750949">SUSE bug 750949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750950">SUSE bug 750950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750951">SUSE bug 750951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750952">SUSE bug 750952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750953">SUSE bug 750953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750954">SUSE bug 750954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750955">SUSE bug 750955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795826">SUSE bug 795826</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1797/">CVE-2010-1797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1797">CVE-2010-1797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2497/">CVE-2010-2497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2497">CVE-2010-2497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2498/">CVE-2010-2498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2498">CVE-2010-2498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2499/">CVE-2010-2499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2499">CVE-2010-2499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2500/">CVE-2010-2500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2500">CVE-2010-2500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2519/">CVE-2010-2519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2519">CVE-2010-2519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2520/">CVE-2010-2520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2520">CVE-2010-2520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2527/">CVE-2010-2527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2527">CVE-2010-2527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2541/">CVE-2010-2541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2541">CVE-2010-2541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2805/">CVE-2010-2805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2805">CVE-2010-2805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2806/">CVE-2010-2806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2806">CVE-2010-2806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2807/">CVE-2010-2807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2807">CVE-2010-2807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2808/">CVE-2010-2808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2808">CVE-2010-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3053/">CVE-2010-3053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3053">CVE-2010-3053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3054/">CVE-2010-3054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3054">CVE-2010-3054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3311/">CVE-2010-3311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3311">CVE-2010-3311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3814/">CVE-2010-3814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3814">CVE-2010-3814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3855/">CVE-2010-3855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3855">CVE-2010-3855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0226/">CVE-2011-0226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0226">CVE-2011-0226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3256/">CVE-2011-3256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3256">CVE-2011-3256 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3439/">CVE-2011-3439 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3439">CVE-2011-3439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1126/">CVE-2012-1126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1126">CVE-2012-1126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1127/">CVE-2012-1127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1127">CVE-2012-1127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1128/">CVE-2012-1128 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1128">CVE-2012-1128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1129/">CVE-2012-1129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1129">CVE-2012-1129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1130/">CVE-2012-1130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1130">CVE-2012-1130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1131/">CVE-2012-1131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1131">CVE-2012-1131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1132/">CVE-2012-1132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1132">CVE-2012-1132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1133/">CVE-2012-1133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1133">CVE-2012-1133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1134/">CVE-2012-1134 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1134">CVE-2012-1134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1135/">CVE-2012-1135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1135">CVE-2012-1135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1136/">CVE-2012-1136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1136">CVE-2012-1136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1137/">CVE-2012-1137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1137">CVE-2012-1137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1138/">CVE-2012-1138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1138">CVE-2012-1138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1139/">CVE-2012-1139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1139">CVE-2012-1139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1140/">CVE-2012-1140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1140">CVE-2012-1140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1141/">CVE-2012-1141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1141">CVE-2012-1141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1142/">CVE-2012-1142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1142">CVE-2012-1142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1143/">CVE-2012-1143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1143">CVE-2012-1143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1144/">CVE-2012-1144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1144">CVE-2012-1144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5668">CVE-2012-5668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5669">CVE-2012-5669 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991407" comment="freetype2-2.3.7-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565990" comment="freetype2-32bit-2.3.7-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991408" comment="ft2demos-2.3.7-25.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217126" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="945849" ref_url="https://bugzilla.suse.com/945849" source="BUGZILLA"/>
		<reference ref_id="947966" ref_url="https://bugzilla.suse.com/947966" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9745" ref_url="https://www.suse.com/security/cve/CVE-2014-9745/" source="CVE"/>
		<reference ref_id="CVE-2014-9747" ref_url="https://www.suse.com/security/cve/CVE-2014-9747/" source="CVE"/>
		<description>

This update of the freetype2 library fixes two security issues:

- An infinite loop in parse_encoding in t1load.c (CVE-2014-9745, bsc#945849)
- Use of uninitialized memory in ps_parser_load_field, t42_parse_font_matrix and t1_parse_font_matrix (CVE-2014-9747, bsc#947966)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-25"/>
	<updated date="2016-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/945849">SUSE bug 945849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947966">SUSE bug 947966</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9745/">CVE-2014-9745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9745">CVE-2014-9745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9747/">CVE-2014-9747 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9747">CVE-2014-9747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571618" comment="freetype2-2.3.7-25.41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571619" comment="freetype2-32bit-2.3.7-25.41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571620" comment="ft2demos-2.3.7-25.41.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217127" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1028103" ref_url="https://bugzilla.suse.com/1028103" source="BUGZILLA"/>
		<reference ref_id="1035807" ref_url="https://bugzilla.suse.com/1035807" source="BUGZILLA"/>
		<reference ref_id="1036457" ref_url="https://bugzilla.suse.com/1036457" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10244" ref_url="https://www.suse.com/security/cve/CVE-2016-10244/" source="CVE"/>
		<reference ref_id="CVE-2017-8105" ref_url="https://www.suse.com/security/cve/CVE-2017-8105/" source="CVE"/>
		<reference ref_id="CVE-2017-8287" ref_url="https://www.suse.com/security/cve/CVE-2017-8287/" source="CVE"/>
		<description>

This update for freetype2 fixes the following issues:

Security issue fixed:
- CVE-2016-10244: The parse_charstrings function in type1/t1load.c did not
  ensure that a font contains a glyph name, which allowed remote attackers
  to cause a denial of service (heap-based buffer over-read) or possibly
  have unspecified other impact via a crafted file (bsc#1028103).

- CVE-2017-8105: Fixed an out-of-bounds write caused by a heap-based
  buffer overflow related to the t1_decoder_parse_charstrings function in
  psaux/t1decode.ca (bsc#1035807)
- CVE-2017-8287: an out-of-bounds write caused by a heap-based buffer
  overflow related to the t1_builder_close_contour function in psaux/psobjs.c
  (bsc#1036457)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1028103">SUSE bug 1028103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035807">SUSE bug 1035807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036457">SUSE bug 1036457</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10244/">CVE-2016-10244 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10244">CVE-2016-10244 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8105/">CVE-2017-8105 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8105">CVE-2017-8105 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8287/">CVE-2017-8287 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8287">CVE-2017-8287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571621" comment="freetype2-2.3.7-25.45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571622" comment="freetype2-32bit-2.3.7-25.45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571623" comment="ft2demos-2.3.7-25.45.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217128" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1034191" ref_url="https://bugzilla.suse.com/1034191" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10328" ref_url="https://www.suse.com/security/cve/CVE-2016-10328/" source="CVE"/>
		<description>
This update for freetype2 fixes the following issues:

Security issue fixed:

- CVE-2016-10328: Fixed heap-based buffer overflow in cff_parser_run function in cff/cffparse.c (bsc#1034191).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-29"/>
	<updated date="2018-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034191">SUSE bug 1034191</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10328/">CVE-2016-10328 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10328">CVE-2016-10328 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571624" comment="freetype2-2.3.7-25.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571625" comment="freetype2-32bit-2.3.7-25.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571626" comment="ft2demos-2.3.7-25.45.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217129" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="916856" ref_url="https://bugzilla.suse.com/916856" source="BUGZILLA"/>
		<reference ref_id="916857" ref_url="https://bugzilla.suse.com/916857" source="BUGZILLA"/>
		<reference ref_id="916858" ref_url="https://bugzilla.suse.com/916858" source="BUGZILLA"/>
		<reference ref_id="916859" ref_url="https://bugzilla.suse.com/916859" source="BUGZILLA"/>
		<reference ref_id="916861" ref_url="https://bugzilla.suse.com/916861" source="BUGZILLA"/>
		<reference ref_id="916863" ref_url="https://bugzilla.suse.com/916863" source="BUGZILLA"/>
		<reference ref_id="916864" ref_url="https://bugzilla.suse.com/916864" source="BUGZILLA"/>
		<reference ref_id="916865" ref_url="https://bugzilla.suse.com/916865" source="BUGZILLA"/>
		<reference ref_id="916870" ref_url="https://bugzilla.suse.com/916870" source="BUGZILLA"/>
		<reference ref_id="916871" ref_url="https://bugzilla.suse.com/916871" source="BUGZILLA"/>
		<reference ref_id="916872" ref_url="https://bugzilla.suse.com/916872" source="BUGZILLA"/>
		<reference ref_id="916873" ref_url="https://bugzilla.suse.com/916873" source="BUGZILLA"/>
		<reference ref_id="916874" ref_url="https://bugzilla.suse.com/916874" source="BUGZILLA"/>
		<reference ref_id="916879" ref_url="https://bugzilla.suse.com/916879" source="BUGZILLA"/>
		<reference ref_id="916881" ref_url="https://bugzilla.suse.com/916881" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<description>

The font rendering library freetype2 has been updated to fix various 
security issues.

Security Issues:

    * CVE-2014-9656
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656&gt;
    * CVE-2014-9657
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657&gt;
    * CVE-2014-9658
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658&gt;
    * CVE-2014-9660
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660&gt;
    * CVE-2014-9661
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661&gt;
    * CVE-2014-9662
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662&gt;
    * CVE-2014-9667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667&gt;
    * CVE-2014-9666
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666&gt;
    * CVE-2014-9665
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665&gt;
    * CVE-2014-9664
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664&gt;
    * CVE-2014-9663
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663&gt;
    * CVE-2014-9659
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659&gt;
    * CVE-2014-9668
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668&gt;
    * CVE-2014-9669
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669&gt;
    * CVE-2014-9670
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670&gt;
    * CVE-2014-9671
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671&gt;
    * CVE-2014-9672
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672&gt;
    * CVE-2014-9673
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673&gt;
    * CVE-2014-9674
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674&gt;
    * CVE-2014-9675
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-02"/>
	<updated date="2015-03-02"/>
	<bugzilla href="https://bugzilla.suse.com/916856">SUSE bug 916856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916857">SUSE bug 916857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916858">SUSE bug 916858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916859">SUSE bug 916859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916861">SUSE bug 916861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916863">SUSE bug 916863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916864">SUSE bug 916864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916865">SUSE bug 916865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916870">SUSE bug 916870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916871">SUSE bug 916871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916872">SUSE bug 916872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916873">SUSE bug 916873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916874">SUSE bug 916874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916879">SUSE bug 916879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916881">SUSE bug 916881</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9656">CVE-2014-9656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9657">CVE-2014-9657 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9658">CVE-2014-9658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9659">CVE-2014-9659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9660">CVE-2014-9660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9661">CVE-2014-9661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9662">CVE-2014-9662 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9663">CVE-2014-9663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9664">CVE-2014-9664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9665">CVE-2014-9665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9666">CVE-2014-9666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9667">CVE-2014-9667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9668">CVE-2014-9668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9669">CVE-2014-9669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9670">CVE-2014-9670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9671">CVE-2014-9671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9672">CVE-2014-9672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9673">CVE-2014-9673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9674">CVE-2014-9674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9675">CVE-2014-9675 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571627" comment="freetype2-2.3.7-25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566567" comment="freetype2-32bit-2.3.7-25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571628" comment="ft2demos-2.3.7-25.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217130" version="1" class="patch">
	<metadata>
		<title>Recommended update for freetype2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="930711" ref_url="https://bugzilla.suse.com/930711" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<description>

This update for freetype2 adjusts the patch that fixed CVE-2014-9671 for 
better backwards compatibility.

As the PCF format doesn't have an official specification, we have to 
exactly follow X11's pcfWriteFont and pcfReadFont functions' behavior.

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-09"/>
	<updated date="2015-06-09"/>
	<bugzilla href="https://bugzilla.suse.com/930711">SUSE bug 930711</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9671">CVE-2014-9671 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009593597" comment="freetype2-2.3.7-25.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593595" comment="freetype2-32bit-2.3.7-25.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593598" comment="ft2demos-2.3.7-25.35.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217131" version="1" class="patch">
	<metadata>
		<title>Recommended update for FUSE</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="807672" ref_url="https://bugzilla.suse.com/807672" source="BUGZILLA"/>
		<reference ref_id="931452" ref_url="https://bugzilla.suse.com/931452" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3202" ref_url="https://www.suse.com/security/cve/CVE-2015-3202/" source="CVE"/>
		<description>

This update for FUSE provides the following fix:

libfuse: In fuse_session_loop_mt() don't pause when exiting the worker 
threads. The pause() was added in 2.2.1 to prevent a segmentation fault on 
pthread_cancel() on an exited, detached thread. Now that worker threads are 
no longer detached, pthread_cancel() should work fine even after the thread 
exited.

		</description>
<advisory from="security@suse.de">
	<issued date="2013-04-15"/>
	<updated date="2013-04-15"/>
	<bugzilla href="https://bugzilla.suse.com/807672">SUSE bug 807672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931452">SUSE bug 931452</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3202/">CVE-2015-3202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3202">CVE-2015-3202 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991409" comment="fuse-2.7.2-61.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991410" comment="libfuse2-2.7.2-61.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217132" version="1" class="patch">
	<metadata>
		<title>Security update for fuse (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1101797" ref_url="https://bugzilla.suse.com/1101797" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10906" ref_url="https://www.suse.com/security/cve/CVE-2018-10906/" source="CVE"/>
		<description>
This update for fuse fixes the following security issue:

- CVE-2018-10906: fusermount was vulnerable to a restriction bypass when
  SELinux is active. This allowed non-root users to mount a FUSE file system with
  the 'allow_other' mount option regardless of whether 'user_allow_other' is set
  in the fuse configuration. An attacker may use this flaw to mount a FUSE file
  system, accessible by other users, and trick them into accessing files on that
  file system, possibly causing Denial of Service or other unspecified effects
  (bsc#1101797).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-04"/>
	<updated date="2018-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101797">SUSE bug 1101797</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10906/">CVE-2018-10906 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10906">CVE-2018-10906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571629" comment="fuse-2.7.2-61.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571630" comment="libfuse2-2.7.2-61.27.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217133" version="1" class="patch">
	<metadata>
		<title>Security update for gcc43 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1039513" ref_url="https://bugzilla.suse.com/1039513" source="BUGZILLA"/>
		<reference ref_id="1045091" ref_url="https://bugzilla.suse.com/1045091" source="BUGZILLA"/>
		<reference ref_id="1059075" ref_url="https://bugzilla.suse.com/1059075" source="BUGZILLA"/>
		<reference ref_id="1074621" ref_url="https://bugzilla.suse.com/1074621" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000376" ref_url="https://www.suse.com/security/cve/CVE-2017-1000376/" source="CVE"/>
		<description>
This update for gcc43 fixes the following issues:

Security issues fixed:

- CVE-2017-1000376: Don't request excutable stack from libffi.  [bnc#1045091]

Support for new security mitigations added:

- Add support for retpolines to mitigate the Spectre Variant 2 attack. [bnc#1074621]
- Add support for zero-sized VLAs and allocas with -fstack-clash-protection.  [bnc#1059075]
- Add support for -fstack-clash-protection.  [bnc#1039513]

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1039513">SUSE bug 1039513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045091">SUSE bug 1045091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059075">SUSE bug 1059075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074621">SUSE bug 1074621</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000376/">CVE-2017-1000376 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000376">CVE-2017-1000376 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571631" comment="cpp43-4.3.4_20091019-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571632" comment="gcc43-4.3.4_20091019-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571633" comment="gcc43-32bit-4.3.4_20091019-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571634" comment="gcc43-c++-4.3.4_20091019-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571635" comment="gcc43-fortran-4.3.4_20091019-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571636" comment="gcc43-fortran-32bit-4.3.4_20091019-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571637" comment="gcc43-info-4.3.4_20091019-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571638" comment="gcc43-locale-4.3.4_20091019-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571639" comment="libstdc++43-devel-4.3.4_20091019-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571640" comment="libstdc++43-devel-32bit-4.3.4_20091019-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571641" comment="libstdc++43-doc-4.3.4_20091019-7.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217134" version="1" class="patch">
	<metadata>
		<title>Security update for gcc43 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1086069" ref_url="https://bugzilla.suse.com/1086069" source="BUGZILLA"/>
		<reference ref_id="1092807" ref_url="https://bugzilla.suse.com/1092807" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<description>
This update for gcc43 fixes the following issues:

This update adds support for 'expolines' on s390x, allowing fixing CVE-2017-5715 in a more lightweight fashion. (bsc#1086069)

The option flags are the same as for the x86 retpolines.

A compiler crash when building userland packages with x86 retpolines was fixed. (bsc#1092807)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-08"/>
	<updated date="2018-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086069">SUSE bug 1086069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092807">SUSE bug 1092807</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571642" comment="cpp43-4.3.4_20091019-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571643" comment="gcc43-4.3.4_20091019-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571644" comment="gcc43-32bit-4.3.4_20091019-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571645" comment="gcc43-c++-4.3.4_20091019-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571646" comment="gcc43-fortran-4.3.4_20091019-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571647" comment="gcc43-fortran-32bit-4.3.4_20091019-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571648" comment="gcc43-info-4.3.4_20091019-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571649" comment="gcc43-locale-4.3.4_20091019-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571650" comment="libstdc++43-devel-4.3.4_20091019-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571651" comment="libstdc++43-devel-32bit-4.3.4_20091019-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571652" comment="libstdc++43-doc-4.3.4_20091019-7.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217135" version="1" class="patch">
	<metadata>
		<title>Security update for gcc48 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1011348" ref_url="https://bugzilla.suse.com/1011348" source="BUGZILLA"/>
		<reference ref_id="1022062" ref_url="https://bugzilla.suse.com/1022062" source="BUGZILLA"/>
		<reference ref_id="1028744" ref_url="https://bugzilla.suse.com/1028744" source="BUGZILLA"/>
		<reference ref_id="1039513" ref_url="https://bugzilla.suse.com/1039513" source="BUGZILLA"/>
		<reference ref_id="1044016" ref_url="https://bugzilla.suse.com/1044016" source="BUGZILLA"/>
		<reference ref_id="1050947" ref_url="https://bugzilla.suse.com/1050947" source="BUGZILLA"/>
		<reference ref_id="878067" ref_url="https://bugzilla.suse.com/878067" source="BUGZILLA"/>
		<reference ref_id="889990" ref_url="https://bugzilla.suse.com/889990" source="BUGZILLA"/>
		<reference ref_id="899871" ref_url="https://bugzilla.suse.com/899871" source="BUGZILLA"/>
		<reference ref_id="917169" ref_url="https://bugzilla.suse.com/917169" source="BUGZILLA"/>
		<reference ref_id="919274" ref_url="https://bugzilla.suse.com/919274" source="BUGZILLA"/>
		<reference ref_id="922534" ref_url="https://bugzilla.suse.com/922534" source="BUGZILLA"/>
		<reference ref_id="924525" ref_url="https://bugzilla.suse.com/924525" source="BUGZILLA"/>
		<reference ref_id="924687" ref_url="https://bugzilla.suse.com/924687" source="BUGZILLA"/>
		<reference ref_id="927993" ref_url="https://bugzilla.suse.com/927993" source="BUGZILLA"/>
		<reference ref_id="930176" ref_url="https://bugzilla.suse.com/930176" source="BUGZILLA"/>
		<reference ref_id="934689" ref_url="https://bugzilla.suse.com/934689" source="BUGZILLA"/>
		<reference ref_id="945842" ref_url="https://bugzilla.suse.com/945842" source="BUGZILLA"/>
		<reference ref_id="947772" ref_url="https://bugzilla.suse.com/947772" source="BUGZILLA"/>
		<reference ref_id="947791" ref_url="https://bugzilla.suse.com/947791" source="BUGZILLA"/>
		<reference ref_id="948168" ref_url="https://bugzilla.suse.com/948168" source="BUGZILLA"/>
		<reference ref_id="949000" ref_url="https://bugzilla.suse.com/949000" source="BUGZILLA"/>
		<reference ref_id="951644" ref_url="https://bugzilla.suse.com/951644" source="BUGZILLA"/>
		<reference ref_id="955382" ref_url="https://bugzilla.suse.com/955382" source="BUGZILLA"/>
		<reference ref_id="970009" ref_url="https://bugzilla.suse.com/970009" source="BUGZILLA"/>
		<reference ref_id="976627" ref_url="https://bugzilla.suse.com/976627" source="BUGZILLA"/>
		<reference ref_id="977654" ref_url="https://bugzilla.suse.com/977654" source="BUGZILLA"/>
		<reference ref_id="981311" ref_url="https://bugzilla.suse.com/981311" source="BUGZILLA"/>
		<reference ref_id="988274" ref_url="https://bugzilla.suse.com/988274" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5044" ref_url="https://www.suse.com/security/cve/CVE-2014-5044/" source="CVE"/>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<reference ref_id="CVE-2017-11671" ref_url="https://www.suse.com/security/cve/CVE-2017-11671/" source="CVE"/>
		<description>
This update for gcc48 fixes the following issues:

Security issues fixed:

- A new option -fstack-clash-protection is now offered, which mitigates the stack clash type of attacks. [bnc#1039513]
- CVE-2017-11671: Fixed rdrand/rdseed code generation issue [bsc#1050947]

Bugs fixed:

- Enable LFS support in 32bit libgcov.a.  [bsc#1044016]
- Bump libffi version in libffi.pc to 3.0.11.
- Properly diagnose missing -fsanitize=address support on ppc64le.  [bsc#1028744]
- Backport patch for PR65612. [bsc#1022062]
- Re-spin to provide missing libasan0-32bit and other multilibs via the updated product description.  [bsc#951644]
- Fixed for DR#1288.  [bsc#1011348]
- Fix libffi issue for armv7l.  [bsc#988274]
- Fixed a kernel miscompile on aarch64.  [bnc #981311]
- Fixed a ppc64le internal compiler error. [bnc #976627]
- Fixed issue with using gcov and #pragma pack.  [bsc#977654]
- Fixed samba build on AARCH64.  [bsc#970009]
- Build without GRAPHITE where cloog-isl is not available.
- Fixed HTM builtins on powerpc.  [bsc#955382]
- Fixed build of SLOF.  [bsc#949000]
- Fixed C++11 std::random_device short reads, CVE-2015-5276.  [bsc#945842]
- Fixed libffi issues on aarch64.  [bsc#948168]
- Fixed no_instrument_function attribute handling on PPC64 with -mprofile-kernel.  [bsc#947791]
- Enable 32bit code generation for ppc64le but do not build 32bit
  target libraries.  Fixes ppc64le kernel compile.
- Update to GCC 4.8.5 release. 
  * Fixes bogus integer overflow in constant expression.  [bsc#934689]
  * Fixes ICE with atomics on aarch64.  [bsc#930176]
- Fixed reload issue on S390.
- Add patch to keep functions leaf when they are instrumented for
  profiling on s390[x].  [bsc#899871]
- Avoid accessing invalid memory when passing aggregates by value.  [bsc#922534]
- Build s390[x] with --with-tune=z9-109 --with-arch=z900 on SLE11
  again.  [bsc#927993]
- Update to gcc-4_8-branch head (r221715).
  * Includes GCC 4.8.4 release.
  * Includes fix for -imacros bug.  [bsc#917169]
  * Includes fix for incorrect -Warray-bounds warnings.  [bsc#919274]
  * Includes updated -mhotpatch for s390x.  [bsc#924525]
  * Includes fix for ppc64le issue with doubleword vector extract.
    [bsc#924687]
- Backport rework of the memory allocator for C++ exceptions used in OOM situations.  [bsc#889990]
- Remove invalid use of glibc internals in TSAN.
- Update to gcc-4_8-branch head (r218481).
  * Includes patches to allow building against ISL 0.14.
- Disable all languages but C, C++, Fortran and Ada.  [fate#316860]
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-06"/>
	<updated date="2017-09-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011348">SUSE bug 1011348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022062">SUSE bug 1022062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028744">SUSE bug 1028744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039513">SUSE bug 1039513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044016">SUSE bug 1044016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050947">SUSE bug 1050947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878067">SUSE bug 878067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889990">SUSE bug 889990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899871">SUSE bug 899871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917169">SUSE bug 917169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919274">SUSE bug 919274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922534">SUSE bug 922534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924525">SUSE bug 924525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924687">SUSE bug 924687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927993">SUSE bug 927993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930176">SUSE bug 930176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934689">SUSE bug 934689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945842">SUSE bug 945842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947772">SUSE bug 947772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947791">SUSE bug 947791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948168">SUSE bug 948168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949000">SUSE bug 949000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951644">SUSE bug 951644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955382">SUSE bug 955382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970009">SUSE bug 970009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976627">SUSE bug 976627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977654">SUSE bug 977654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981311">SUSE bug 981311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988274">SUSE bug 988274</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5044/">CVE-2014-5044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5044">CVE-2014-5044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5276">CVE-2015-5276 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-11671/">CVE-2017-11671 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11671">CVE-2017-11671 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571653" comment="cpp48-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571654" comment="gcc48-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571655" comment="gcc48-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571656" comment="gcc48-c++-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571657" comment="gcc48-fortran-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571658" comment="gcc48-fortran-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571659" comment="gcc48-info-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571660" comment="gcc48-locale-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571661" comment="libasan0-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571662" comment="libasan0-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571663" comment="libatomic1-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571664" comment="libatomic1-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571665" comment="libgcc_s1-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571666" comment="libgcc_s1-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571667" comment="libgfortran3-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571668" comment="libgfortran3-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571669" comment="libgomp1-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571670" comment="libgomp1-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571671" comment="libitm1-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571672" comment="libitm1-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571673" comment="libmpfr4-3.1.2-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571674" comment="libquadmath0-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571675" comment="libquadmath0-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571676" comment="libstdc++48-devel-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571677" comment="libstdc++48-devel-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571678" comment="libstdc++6-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571679" comment="libstdc++6-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571680" comment="libtsan0-4.8.5-5.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217136" version="1" class="patch">
	<metadata>
		<title>Security update for gcc48 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1082130" ref_url="https://bugzilla.suse.com/1082130" source="BUGZILLA"/>
		<reference ref_id="1083945" ref_url="https://bugzilla.suse.com/1083945" source="BUGZILLA"/>
		<reference ref_id="1087932" ref_url="https://bugzilla.suse.com/1087932" source="BUGZILLA"/>
		<reference ref_id="1093797" ref_url="https://bugzilla.suse.com/1093797" source="BUGZILLA"/>
		<reference ref_id="1131264" ref_url="https://bugzilla.suse.com/1131264" source="BUGZILLA"/>
		<reference ref_id="1142649" ref_url="https://bugzilla.suse.com/1142649" source="BUGZILLA"/>
		<reference ref_id="1161913" ref_url="https://bugzilla.suse.com/1161913" source="BUGZILLA"/>
		<reference ref_id="1177947" ref_url="https://bugzilla.suse.com/1177947" source="BUGZILLA"/>
		<reference ref_id="1178675" ref_url="https://bugzilla.suse.com/1178675" source="BUGZILLA"/>
		<reference ref_id="1185395" ref_url="https://bugzilla.suse.com/1185395" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<description>
This update for gcc48 fixes the following issues:

- CVE-2019-14250: Fixed an integer overflow that could lead to an invalid memory
  access (bsc#1142649).

Non-security fixes:
- Fixed an issue with manual page builds (bsc#1185395).
- Fixed an issue with static initializers (bsc#1177947).
- Fixed an issue with exception handling on s390x (bsc#1161913).
- Fixed a reload bug on aarch64 (bsc#1093797).
- Added a Spectre V2 mitigation for s390x (bsc#1083945).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082130">SUSE bug 1082130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083945">SUSE bug 1083945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087932">SUSE bug 1087932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093797">SUSE bug 1093797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131264">SUSE bug 1131264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142649">SUSE bug 1142649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161913">SUSE bug 1161913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177947">SUSE bug 1177947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178675">SUSE bug 1178675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185395">SUSE bug 1185395</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14250">CVE-2019-14250 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678381" comment="cpp48-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678382" comment="gcc48-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678383" comment="gcc48-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678384" comment="gcc48-c++-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678385" comment="gcc48-fortran-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678386" comment="gcc48-fortran-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678387" comment="gcc48-info-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678388" comment="gcc48-locale-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678389" comment="libasan0-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678390" comment="libasan0-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678391" comment="libatomic1-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678392" comment="libatomic1-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678393" comment="libgcc_s1-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678394" comment="libgcc_s1-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678395" comment="libgfortran3-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678396" comment="libgfortran3-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678397" comment="libgomp1-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678398" comment="libgomp1-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678399" comment="libitm1-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678400" comment="libitm1-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678401" comment="libquadmath0-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678402" comment="libquadmath0-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678403" comment="libstdc++48-devel-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678404" comment="libstdc++48-devel-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678405" comment="libstdc++6-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678406" comment="libstdc++6-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678407" comment="libtsan0-4.8.5-5.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217137" version="1" class="patch">
	<metadata>
		<title>Security update for gd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="923945" ref_url="https://bugzilla.suse.com/923945" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9709" ref_url="https://www.suse.com/security/cve/CVE-2014-9709/" source="CVE"/>
		<description>

The graphics drawing library gd has been updated to fix one security issue:

    * possible buffer read overflow (CVE-2014-9709)

Security Issues:

    * CVE-2014-9709
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-24"/>
	<updated date="2015-03-24"/>
	<bugzilla href="https://bugzilla.suse.com/923945">SUSE bug 923945</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9709/">CVE-2014-9709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9709">CVE-2014-9709 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571681" comment="gd-2.0.36.RC1-52.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217138" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="988032" ref_url="https://bugzilla.suse.com/988032" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6161" ref_url="https://www.suse.com/security/cve/CVE-2016-6161/" source="CVE"/>
		<description>

This update for gd fixes the following issues:

- security update:
  * CVE-2016-6161: global out of bounds read when encoding gif from malformed input withgd2togif [bsc#988032]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-14"/>
	<updated date="2016-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/988032">SUSE bug 988032</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6161/">CVE-2016-6161 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6161">CVE-2016-6161 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571682" comment="gd-2.0.36.RC1-52.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217139" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1004924" ref_url="https://bugzilla.suse.com/1004924" source="BUGZILLA"/>
		<reference ref_id="1005274" ref_url="https://bugzilla.suse.com/1005274" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6911" ref_url="https://www.suse.com/security/cve/CVE-2016-6911/" source="CVE"/>
		<reference ref_id="CVE-2016-8670" ref_url="https://www.suse.com/security/cve/CVE-2016-8670/" source="CVE"/>
		<description>

This update for gd fixes the following issues:

- CVE-2016-8670: Stack Buffer Overflow in GD dynamicGetbuf (bsc#1004924)
- CVE-2016-6911: Check for out-of-bound read in dynamicGetbuf() (bsc#1005274)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-28"/>
	<updated date="2016-10-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1004924">SUSE bug 1004924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005274">SUSE bug 1005274</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6911/">CVE-2016-6911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6911">CVE-2016-6911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8670/">CVE-2016-8670 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8670">CVE-2016-8670 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571683" comment="gd-2.0.36.RC1-52.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217140" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1015187" ref_url="https://bugzilla.suse.com/1015187" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9933" ref_url="https://www.suse.com/security/cve/CVE-2016-9933/" source="CVE"/>
		<description>

This update for gd fixes the following issues:

  * CVE-2016-9933 possible stackoverflow on malicious truecolor images [bsc#1015187]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-22"/>
	<updated date="2016-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015187">SUSE bug 1015187</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9933/">CVE-2016-9933 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9933">CVE-2016-9933 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571684" comment="gd-2.0.36.RC1-52.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217141" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1022264" ref_url="https://bugzilla.suse.com/1022264" source="BUGZILLA"/>
		<reference ref_id="1022265" ref_url="https://bugzilla.suse.com/1022265" source="BUGZILLA"/>
		<reference ref_id="1022283" ref_url="https://bugzilla.suse.com/1022283" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167/" source="CVE"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-9317" ref_url="https://www.suse.com/security/cve/CVE-2016-9317/" source="CVE"/>
		<description>

This update for gd fixes the following security issues:

- CVE-2016-9317: The gdImageCreate function in the GD Graphics Library
  (aka libgd) allowed remote attackers to cause a denial of service
  (system hang) via an oversized image.  (bsc#1022283)
- CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx()
  could lead to libgd running out of memory even on small files. (bsc#1022264)
- CVE-2016-10168: A signed integer overflow in the GD Graphics Library (aka libgd) could lead
  to memory corruption (bsc#1022265)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-14"/>
	<updated date="2017-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022264">SUSE bug 1022264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022265">SUSE bug 1022265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022283">SUSE bug 1022283</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10167">CVE-2016-10167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10168">CVE-2016-10168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9317/">CVE-2016-9317 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9317">CVE-2016-9317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571685" comment="gd-2.0.36.RC1-52.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217142" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1025223" ref_url="https://bugzilla.suse.com/1025223" source="BUGZILLA"/>
		<reference ref_id="1076391" ref_url="https://bugzilla.suse.com/1076391" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5711" ref_url="https://www.suse.com/security/cve/CVE-2018-5711/" source="CVE"/>
		<description>
This update for gd fixes several issues.

This security issue was fixed:

- CVE-2018-5711: Prevent integer signedness error that could have lead to an
  infinite loop via a crafted GIF file allowing for DoS (bsc#1076391)

This non-security issue was fixed:

- Fixed gd2togif error message (bsc#1025223)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025223">SUSE bug 1025223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5711/">CVE-2018-5711 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5711">CVE-2018-5711 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571686" comment="gd-2.0.36.RC1-52.33.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217143" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1050241" ref_url="https://bugzilla.suse.com/1050241" source="BUGZILLA"/>
		<reference ref_id="1123522" ref_url="https://bugzilla.suse.com/1123522" source="BUGZILLA"/>
		<reference ref_id="1140120" ref_url="https://bugzilla.suse.com/1140120" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7890" ref_url="https://www.suse.com/security/cve/CVE-2017-7890/" source="CVE"/>
		<reference ref_id="CVE-2019-11038" ref_url="https://www.suse.com/security/cve/CVE-2019-11038/" source="CVE"/>
		<reference ref_id="CVE-2019-6978" ref_url="https://www.suse.com/security/cve/CVE-2019-6978/" source="CVE"/>
		<description>
This update for gd fixes the following issues:

Security vulnerability addressed:

- CVE-2017-7890: Fixed a buffer over-read into uninitialized memory (bsc#1050241).
- CVE-2019-6978: Fixed a double free in the GD graphics library (bsc#1123522).
- CVE-2019-11038: Fixed a information disclosure in gdImageCreateFromXbm() (bsc#1140120).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-09"/>
	<updated date="2020-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050241">SUSE bug 1050241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123522">SUSE bug 1123522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140120">SUSE bug 1140120</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7890/">CVE-2017-7890 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7890">CVE-2017-7890 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11038/">CVE-2019-11038 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11038">CVE-2019-11038 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6978/">CVE-2019-6978 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6978">CVE-2019-6978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571687" comment="gd-2.0.36.RC1-52.33.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217144" version="1" class="patch">
	<metadata>
		<title>Recommended update for GDM</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="490621" ref_url="https://bugzilla.suse.com/490621" source="BUGZILLA"/>
		<reference ref_id="506917" ref_url="https://bugzilla.suse.com/506917" source="BUGZILLA"/>
		<reference ref_id="583060" ref_url="https://bugzilla.suse.com/583060" source="BUGZILLA"/>
		<reference ref_id="617428" ref_url="https://bugzilla.suse.com/617428" source="BUGZILLA"/>
		<reference ref_id="624608" ref_url="https://bugzilla.suse.com/624608" source="BUGZILLA"/>
		<reference ref_id="627893" ref_url="https://bugzilla.suse.com/627893" source="BUGZILLA"/>
		<reference ref_id="628607" ref_url="https://bugzilla.suse.com/628607" source="BUGZILLA"/>
		<reference ref_id="633655" ref_url="https://bugzilla.suse.com/633655" source="BUGZILLA"/>
		<reference ref_id="633861" ref_url="https://bugzilla.suse.com/633861" source="BUGZILLA"/>
		<reference ref_id="652905" ref_url="https://bugzilla.suse.com/652905" source="BUGZILLA"/>
		<reference ref_id="659463" ref_url="https://bugzilla.suse.com/659463" source="BUGZILLA"/>
		<reference ref_id="662458" ref_url="https://bugzilla.suse.com/662458" source="BUGZILLA"/>
		<reference ref_id="665078" ref_url="https://bugzilla.suse.com/665078" source="BUGZILLA"/>
		<reference ref_id="667577" ref_url="https://bugzilla.suse.com/667577" source="BUGZILLA"/>
		<reference ref_id="668214" ref_url="https://bugzilla.suse.com/668214" source="BUGZILLA"/>
		<reference ref_id="670121" ref_url="https://bugzilla.suse.com/670121" source="BUGZILLA"/>
		<reference ref_id="677611" ref_url="https://bugzilla.suse.com/677611" source="BUGZILLA"/>
		<reference ref_id="678632" ref_url="https://bugzilla.suse.com/678632" source="BUGZILLA"/>
		<reference ref_id="690872" ref_url="https://bugzilla.suse.com/690872" source="BUGZILLA"/>
		<reference ref_id="698485" ref_url="https://bugzilla.suse.com/698485" source="BUGZILLA"/>
		<reference ref_id="726489" ref_url="https://bugzilla.suse.com/726489" source="BUGZILLA"/>
		<reference ref_id="727346" ref_url="https://bugzilla.suse.com/727346" source="BUGZILLA"/>
		<reference ref_id="747434" ref_url="https://bugzilla.suse.com/747434" source="BUGZILLA"/>
		<reference ref_id="749965" ref_url="https://bugzilla.suse.com/749965" source="BUGZILLA"/>
		<reference ref_id="751325" ref_url="https://bugzilla.suse.com/751325" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-1172" ref_url="https://www.suse.com/security/cve/CVE-2010-1172/" source="CVE"/>
		<description>

This update to Gnome Display Manager (gdm) resolves a problem in the way 
Xauth cookies are handled internally by the application. In some specific 
circumstances, this problem could cause the session to be restarted 
immediately after the user logged in.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-20"/>
	<updated date="2012-08-20"/>
	<bugzilla href="https://bugzilla.suse.com/490621">SUSE bug 490621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/506917">SUSE bug 506917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/583060">SUSE bug 583060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/617428">SUSE bug 617428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/624608">SUSE bug 624608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/627893">SUSE bug 627893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/628607">SUSE bug 628607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633655">SUSE bug 633655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633861">SUSE bug 633861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652905">SUSE bug 652905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/659463">SUSE bug 659463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662458">SUSE bug 662458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/665078">SUSE bug 665078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/667577">SUSE bug 667577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/668214">SUSE bug 668214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/670121">SUSE bug 670121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/677611">SUSE bug 677611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/678632">SUSE bug 678632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/690872">SUSE bug 690872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698485">SUSE bug 698485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/726489">SUSE bug 726489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/727346">SUSE bug 727346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747434">SUSE bug 747434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749965">SUSE bug 749965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751325">SUSE bug 751325</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1172/">CVE-2010-1172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1172">CVE-2010-1172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991411" comment="gdm-2.24.0-24.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991412" comment="gdm-branding-upstream-2.24.0-24.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991413" comment="gdm-lang-2.24.0-24.85.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217145" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1004237" ref_url="https://bugzilla.suse.com/1004237" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8602" ref_url="https://www.suse.com/security/cve/CVE-2016-8602/" source="CVE"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2016-8602: Insufficient parameter check in .sethalftone5 (bsc#1004237)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-04"/>
	<updated date="2016-11-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1004237">SUSE bug 1004237</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8602/">CVE-2016-8602 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8602">CVE-2016-8602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571688" comment="ghostscript-fonts-other-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571689" comment="ghostscript-fonts-rus-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571690" comment="ghostscript-fonts-std-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571691" comment="ghostscript-library-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571692" comment="ghostscript-omni-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571693" comment="ghostscript-x11-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571694" comment="libgimpprint-4.2.7-32.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217146" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="559122" ref_url="https://bugzilla.suse.com/559122" source="BUGZILLA"/>
		<reference ref_id="605043" ref_url="https://bugzilla.suse.com/605043" source="BUGZILLA"/>
		<reference ref_id="608071" ref_url="https://bugzilla.suse.com/608071" source="BUGZILLA"/>
		<reference ref_id="635004" ref_url="https://bugzilla.suse.com/635004" source="BUGZILLA"/>
		<reference ref_id="649207" ref_url="https://bugzilla.suse.com/649207" source="BUGZILLA"/>
		<reference ref_id="726092" ref_url="https://bugzilla.suse.com/726092" source="BUGZILLA"/>
		<reference ref_id="779700" ref_url="https://bugzilla.suse.com/779700" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-3743" ref_url="https://www.suse.com/security/cve/CVE-2009-3743/" source="CVE"/>
		<reference ref_id="CVE-2009-4270" ref_url="https://www.suse.com/security/cve/CVE-2009-4270/" source="CVE"/>
		<reference ref_id="CVE-2009-4897" ref_url="https://www.suse.com/security/cve/CVE-2009-4897/" source="CVE"/>
		<reference ref_id="CVE-2010-1628" ref_url="https://www.suse.com/security/cve/CVE-2010-1628/" source="CVE"/>
		<reference ref_id="CVE-2010-1869" ref_url="https://www.suse.com/security/cve/CVE-2010-1869/" source="CVE"/>
		<reference ref_id="CVE-2010-2055" ref_url="https://www.suse.com/security/cve/CVE-2010-2055/" source="CVE"/>
		<reference ref_id="CVE-2010-4054" ref_url="https://www.suse.com/security/cve/CVE-2010-4054/" source="CVE"/>
		<reference ref_id="CVE-2012-4405" ref_url="https://www.suse.com/security/cve/CVE-2012-4405/" source="CVE"/>
		<description>

This update fixes an array index error which could have lead to a 
heap-based buffer overflow in ghostscript-library. CVE-2012-4405 has been 
assigned to this issue.

Security Issue reference:

    * CVE-2012-4405
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4405&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-09-12"/>
	<updated date="2012-09-12"/>
	<bugzilla href="https://bugzilla.suse.com/559122">SUSE bug 559122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/605043">SUSE bug 605043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/608071">SUSE bug 608071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/635004">SUSE bug 635004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649207">SUSE bug 649207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/726092">SUSE bug 726092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779700">SUSE bug 779700</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3743/">CVE-2009-3743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3743">CVE-2009-3743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4270/">CVE-2009-4270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4270">CVE-2009-4270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4897/">CVE-2009-4897 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4897">CVE-2009-4897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1628/">CVE-2010-1628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1628">CVE-2010-1628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1869/">CVE-2010-1869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1869">CVE-2010-1869 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2055/">CVE-2010-2055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2055">CVE-2010-2055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4054/">CVE-2010-4054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4054">CVE-2010-4054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4405/">CVE-2012-4405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4405">CVE-2012-4405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991414" comment="ghostscript-fonts-other-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991415" comment="ghostscript-fonts-rus-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991416" comment="ghostscript-fonts-std-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991417" comment="ghostscript-library-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991418" comment="ghostscript-omni-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991419" comment="ghostscript-x11-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991420" comment="libgimpprint-4.2.7-32.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217147" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1001951" ref_url="https://bugzilla.suse.com/1001951" source="BUGZILLA"/>
		<reference ref_id="939342" ref_url="https://bugzilla.suse.com/939342" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5653" ref_url="https://www.suse.com/security/cve/CVE-2013-5653/" source="CVE"/>
		<reference ref_id="CVE-2015-3228" ref_url="https://www.suse.com/security/cve/CVE-2015-3228/" source="CVE"/>
		<reference ref_id="CVE-2016-7977" ref_url="https://www.suse.com/security/cve/CVE-2016-7977/" source="CVE"/>
		<reference ref_id="CVE-2016-7979" ref_url="https://www.suse.com/security/cve/CVE-2016-7979/" source="CVE"/>
		<description>

This update for ghostscript-library fixes the following issues:

- Multiple security vulnerabilities have been discovered where ghostscript's
  '-dsafer' flag did not provide sufficient protection against unintended
  access to the file system. Thus, a machine that would process a specially
  crafted Postscript file would potentially leak sensitive information to an
  attacker. (CVE-2013-5653, CVE-2016-7977, bsc#1001951)

- Insufficient validation of the type of input in .initialize_dsc_parser used
  to allow remote code execution. (CVE-2016-7979, bsc#1001951)

- An integer overflow in the gs_heap_alloc_bytes function used to allow remote
  attackers to cause a denial of service (crash) via specially  crafted
  Postscript files. (CVE-2015-3228, boo#939342)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-11"/>
	<updated date="2016-10-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1001951">SUSE bug 1001951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939342">SUSE bug 939342</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5653/">CVE-2013-5653 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5653">CVE-2013-5653 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3228/">CVE-2015-3228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3228">CVE-2015-3228 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7977/">CVE-2016-7977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7977">CVE-2016-7977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7979/">CVE-2016-7979 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7979">CVE-2016-7979 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571695" comment="ghostscript-fonts-other-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571696" comment="ghostscript-fonts-rus-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571697" comment="ghostscript-fonts-std-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571698" comment="ghostscript-library-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571699" comment="ghostscript-omni-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571700" comment="ghostscript-x11-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571701" comment="libgimpprint-4.2.7-32.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217148" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1036453" ref_url="https://bugzilla.suse.com/1036453" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291/" source="CVE"/>
		<description>

This update for ghostscript fixes the following security vulnerability:

CVE-2017-8291: A remote command execution and a -dSAFER bypass via a crafted .eps document were
exploited in the wild. (bsc#1036453)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-03"/>
	<updated date="2017-05-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8291">CVE-2017-8291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571702" comment="ghostscript-fonts-other-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571703" comment="ghostscript-fonts-rus-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571704" comment="ghostscript-fonts-std-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571705" comment="ghostscript-library-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571706" comment="ghostscript-omni-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571707" comment="ghostscript-x11-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571708" comment="libgimpprint-4.2.7-32.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217149" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1036453" ref_url="https://bugzilla.suse.com/1036453" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291/" source="CVE"/>
		<description>

This update for ghostscript fixes the following security vulnerability:

CVE-2017-8291: A remote command execution and a -dSAFER bypass via a crafted .eps document were
exploited in the wild. (bsc#1036453)

This update is a reissue including the SUSE Linux Enterprise 11 SP3 product.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-17"/>
	<updated date="2017-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8291">CVE-2017-8291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571709" comment="ghostscript-fonts-other-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571710" comment="ghostscript-fonts-rus-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571711" comment="ghostscript-fonts-std-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571712" comment="ghostscript-library-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571713" comment="ghostscript-omni-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571714" comment="ghostscript-x11-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571715" comment="libgimpprint-4.2.7-32.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217150" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1018128" ref_url="https://bugzilla.suse.com/1018128" source="BUGZILLA"/>
		<reference ref_id="1030263" ref_url="https://bugzilla.suse.com/1030263" source="BUGZILLA"/>
		<reference ref_id="1032138" ref_url="https://bugzilla.suse.com/1032138" source="BUGZILLA"/>
		<reference ref_id="1032230" ref_url="https://bugzilla.suse.com/1032230" source="BUGZILLA"/>
		<reference ref_id="1040643" ref_url="https://bugzilla.suse.com/1040643" source="BUGZILLA"/>
		<reference ref_id="1050879" ref_url="https://bugzilla.suse.com/1050879" source="BUGZILLA"/>
		<reference ref_id="1050887" ref_url="https://bugzilla.suse.com/1050887" source="BUGZILLA"/>
		<reference ref_id="1050888" ref_url="https://bugzilla.suse.com/1050888" source="BUGZILLA"/>
		<reference ref_id="1050889" ref_url="https://bugzilla.suse.com/1050889" source="BUGZILLA"/>
		<reference ref_id="1050891" ref_url="https://bugzilla.suse.com/1050891" source="BUGZILLA"/>
		<reference ref_id="1051184" ref_url="https://bugzilla.suse.com/1051184" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10219" ref_url="https://www.suse.com/security/cve/CVE-2016-10219/" source="CVE"/>
		<reference ref_id="CVE-2016-9601" ref_url="https://www.suse.com/security/cve/CVE-2016-9601/" source="CVE"/>
		<reference ref_id="CVE-2017-11714" ref_url="https://www.suse.com/security/cve/CVE-2017-11714/" source="CVE"/>
		<reference ref_id="CVE-2017-7207" ref_url="https://www.suse.com/security/cve/CVE-2017-7207/" source="CVE"/>
		<reference ref_id="CVE-2017-9216" ref_url="https://www.suse.com/security/cve/CVE-2017-9216/" source="CVE"/>
		<reference ref_id="CVE-2017-9612" ref_url="https://www.suse.com/security/cve/CVE-2017-9612/" source="CVE"/>
		<reference ref_id="CVE-2017-9726" ref_url="https://www.suse.com/security/cve/CVE-2017-9726/" source="CVE"/>
		<reference ref_id="CVE-2017-9727" ref_url="https://www.suse.com/security/cve/CVE-2017-9727/" source="CVE"/>
		<reference ref_id="CVE-2017-9739" ref_url="https://www.suse.com/security/cve/CVE-2017-9739/" source="CVE"/>
		<reference ref_id="CVE-2017-9835" ref_url="https://www.suse.com/security/cve/CVE-2017-9835/" source="CVE"/>
		<description>
This update for ghostscript-library fixes several issues.
 
These security issues were fixed:

- CVE-2017-7207: The mem_get_bits_rectangle function allowed remote attackers
  to cause a denial of service (NULL pointer dereference) via a crafted
  PostScript document (bsc#1030263).
- CVE-2016-9601: Prevent heap-buffer overflow by checking for an integer
  overflow in jbig2_image_new function (bsc#1018128).
- CVE-2017-9612: The Ins_IP function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (use-after-free and application crash)
  or possibly have unspecified other impact via a crafted document (bsc#1050891)
- CVE-2017-9726: The Ins_MDRP function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050889)
- CVE-2017-9727: The gx_ttfReader__Read function in base/gxttfb.c allowed
  remote attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050888)
- CVE-2017-9739: The Ins_JMPR function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050887)
- CVE-2017-11714: psi/ztoken.c mishandled references to the scanner state
  structure, which allowed remote attackers to cause a denial of service
  (application crash) or possibly have unspecified other impact via a crafted
  PostScript document, related to an out-of-bounds read in the
  igc_reloc_struct_ptr function in psi/igc.c (bsc#1051184)
- CVE-2017-9835: The gs_alloc_ref_array function allowed remote attackers to
  cause a denial of service (heap-based buffer overflow and application crash) or
  possibly have unspecified other impact via a crafted PostScript document
  (bsc#1050879)
- CVE-2016-10219: The intersect function in base/gxfill.c allowed remote
  attackers to cause a denial of service (divide-by-zero error and application
  crash) via a crafted file (bsc#1032138)
- CVE-2017-9216: Prevent NULL pointer dereference in the jbig2_huffman_get
  function in jbig2_huffman.c which allowed for DoS (bsc#1040643)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-03"/>
	<updated date="2018-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1018128">SUSE bug 1018128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030263">SUSE bug 1030263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032138">SUSE bug 1032138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032230">SUSE bug 1032230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040643">SUSE bug 1040643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050879">SUSE bug 1050879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050887">SUSE bug 1050887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050888">SUSE bug 1050888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050889">SUSE bug 1050889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050891">SUSE bug 1050891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051184">SUSE bug 1051184</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10219/">CVE-2016-10219 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10219">CVE-2016-10219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9601/">CVE-2016-9601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9601">CVE-2016-9601 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11714/">CVE-2017-11714 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11714">CVE-2017-11714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7207/">CVE-2017-7207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7207">CVE-2017-7207 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9216/">CVE-2017-9216 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9216">CVE-2017-9216 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9612/">CVE-2017-9612 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9612">CVE-2017-9612 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9726/">CVE-2017-9726 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9726">CVE-2017-9726 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9727/">CVE-2017-9727 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9727">CVE-2017-9727 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9739/">CVE-2017-9739 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9739">CVE-2017-9739 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9835/">CVE-2017-9835 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9835">CVE-2017-9835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571716" comment="ghostscript-fonts-other-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571717" comment="ghostscript-fonts-rus-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571718" comment="ghostscript-fonts-std-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571719" comment="ghostscript-library-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571720" comment="ghostscript-omni-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571721" comment="ghostscript-x11-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571722" comment="libgimpprint-4.2.7-32.47.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217151" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1090099" ref_url="https://bugzilla.suse.com/1090099" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9601" ref_url="https://www.suse.com/security/cve/CVE-2016-9601/" source="CVE"/>
		<reference ref_id="CVE-2018-10194" ref_url="https://www.suse.com/security/cve/CVE-2018-10194/" source="CVE"/>
		<description>
This update for ghostscript-library fixes the following issues:

- CVE-2018-10194: Fixed a stack-based buffer overflow in gdevpdts.c (bsc#1090099)
- Fixed a crash in the fix for CVE-2016-9601.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1090099">SUSE bug 1090099</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9601/">CVE-2016-9601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9601">CVE-2016-9601 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10194/">CVE-2018-10194 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10194">CVE-2018-10194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571723" comment="ghostscript-fonts-other-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571724" comment="ghostscript-fonts-rus-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571725" comment="ghostscript-fonts-std-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571726" comment="ghostscript-library-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571727" comment="ghostscript-omni-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571728" comment="ghostscript-x11-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571729" comment="libgimpprint-4.2.7-32.47.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217152" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1050893" ref_url="https://bugzilla.suse.com/1050893" source="BUGZILLA"/>
		<reference ref_id="1106173" ref_url="https://bugzilla.suse.com/1106173" source="BUGZILLA"/>
		<reference ref_id="1107410" ref_url="https://bugzilla.suse.com/1107410" source="BUGZILLA"/>
		<reference ref_id="1107412" ref_url="https://bugzilla.suse.com/1107412" source="BUGZILLA"/>
		<reference ref_id="1107413" ref_url="https://bugzilla.suse.com/1107413" source="BUGZILLA"/>
		<reference ref_id="1107420" ref_url="https://bugzilla.suse.com/1107420" source="BUGZILLA"/>
		<reference ref_id="1107421" ref_url="https://bugzilla.suse.com/1107421" source="BUGZILLA"/>
		<reference ref_id="1107426" ref_url="https://bugzilla.suse.com/1107426" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9611" ref_url="https://www.suse.com/security/cve/CVE-2017-9611/" source="CVE"/>
		<reference ref_id="CVE-2018-15910" ref_url="https://www.suse.com/security/cve/CVE-2018-15910/" source="CVE"/>
		<reference ref_id="CVE-2018-16509" ref_url="https://www.suse.com/security/cve/CVE-2018-16509/" source="CVE"/>
		<reference ref_id="CVE-2018-16511" ref_url="https://www.suse.com/security/cve/CVE-2018-16511/" source="CVE"/>
		<reference ref_id="CVE-2018-16513" ref_url="https://www.suse.com/security/cve/CVE-2018-16513/" source="CVE"/>
		<reference ref_id="CVE-2018-16540" ref_url="https://www.suse.com/security/cve/CVE-2018-16540/" source="CVE"/>
		<reference ref_id="CVE-2018-16541" ref_url="https://www.suse.com/security/cve/CVE-2018-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-16542" ref_url="https://www.suse.com/security/cve/CVE-2018-16542/" source="CVE"/>
		<description>
This update for ghostscript-library fixes the following issues:

- CVE-2018-16511: A type confusion in 'ztype' could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact. (bsc#1107426)
- CVE-2018-16540: Attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact. (bsc#1107420)
- CVE-2018-16541: Attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. (bsc#1107421)
- CVE-2018-16542: Attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter. (bsc#1107413)
- CVE-2018-16509: Incorrect 'restoration of privilege' checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the 'pipe' instruction. (bsc#1107410
- CVE-2018-16513: Attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. (bsc#1107412)
- CVE-2018-15910: Attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code. (bsc#1106173)
- CVE-2017-9611: The Ins_MIRP function allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. (bsc#1050893)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1050893">SUSE bug 1050893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106173">SUSE bug 1106173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107410">SUSE bug 1107410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107412">SUSE bug 1107412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107413">SUSE bug 1107413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107420">SUSE bug 1107420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107421">SUSE bug 1107421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107426">SUSE bug 1107426</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9611/">CVE-2017-9611 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9611">CVE-2017-9611 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15910/">CVE-2018-15910 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15910">CVE-2018-15910 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16509/">CVE-2018-16509 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16509">CVE-2018-16509 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16511/">CVE-2018-16511 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16511">CVE-2018-16511 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16513/">CVE-2018-16513 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16513">CVE-2018-16513 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16540/">CVE-2018-16540 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16540">CVE-2018-16540 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16541/">CVE-2018-16541 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16541">CVE-2018-16541 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16542/">CVE-2018-16542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16542">CVE-2018-16542 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571730" comment="ghostscript-fonts-other-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571731" comment="ghostscript-fonts-rus-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571732" comment="ghostscript-fonts-std-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571733" comment="ghostscript-library-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571734" comment="ghostscript-omni-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571735" comment="ghostscript-x11-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571736" comment="libgimpprint-4.2.7-32.47.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217153" version="1" class="patch">
	<metadata>
		<title>Recommended update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1129186" ref_url="https://bugzilla.suse.com/1129186" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3838" ref_url="https://www.suse.com/security/cve/CVE-2019-3838/" source="CVE"/>
		<description>
This update for ghostscript-library fixes the following issues:

Security issue fixed:

- CVE-2019-3838: Fixed various bugs which allows to reenable and misuse system Postscript operators to read files from within Postscript files and send them with the help of e.g. the %pipe% to the attacker (bsc#1129186).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-28"/>
	<updated date="2019-08-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129186">SUSE bug 1129186</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3838/">CVE-2019-3838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3838">CVE-2019-3838 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571737" comment="ghostscript-fonts-other-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571738" comment="ghostscript-fonts-rus-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571739" comment="ghostscript-fonts-std-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571740" comment="ghostscript-library-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571741" comment="ghostscript-omni-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571742" comment="ghostscript-x11-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571743" comment="libgimpprint-4.2.7-47.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217154" version="1" class="patch">
	<metadata>
		<title>Security update for giflib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="960319" ref_url="https://bugzilla.suse.com/960319" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7555" ref_url="https://www.suse.com/security/cve/CVE-2015-7555/" source="CVE"/>
		<description>

This update for giflib fixes the following issues:

- CVE-2015-7555: Heap overflow in giffix (bsc#960319)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960319">SUSE bug 960319</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7555/">CVE-2015-7555 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7555">CVE-2015-7555 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571744" comment="giflib-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566573" comment="giflib-32bit-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571745" comment="giflib-progs-4.1.6-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217155" version="1" class="patch">
	<metadata>
		<title>Security update for giflib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="974847" ref_url="https://bugzilla.suse.com/974847" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3977" ref_url="https://www.suse.com/security/cve/CVE-2016-3977/" source="CVE"/>
		<description>
giflib was updated to fix one security issue.

This security issue was fixed:
- CVE-2016-3977: Heap buffer overflow in gif2rgb (bsc#974847).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-25"/>
	<updated date="2016-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/974847">SUSE bug 974847</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3977/">CVE-2016-3977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3977">CVE-2016-3977 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571746" comment="giflib-4.1.6-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571747" comment="giflib-32bit-4.1.6-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571748" comment="giflib-progs-4.1.6-21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217156" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1107116" ref_url="https://bugzilla.suse.com/1107116" source="BUGZILLA"/>
		<reference ref_id="1111499" ref_url="https://bugzilla.suse.com/1111499" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16429" ref_url="https://www.suse.com/security/cve/CVE-2018-16429/" source="CVE"/>
		<description>
This update for glib2 fixes the following issues:

Security issues fixed:

- CVE-2018-16429: Fixed out-of-bounds read vulnerability ing_markup_parse_context_parse() (bsc#1107116).
- Fixing potentially exploitable bugs in UTF-8 validation in Variant and DBUS message parsing (bsc#1111499).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-03"/>
	<updated date="2018-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1107116">SUSE bug 1107116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111499">SUSE bug 1111499</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16429/">CVE-2018-16429 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16429">CVE-2018-16429 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571749" comment="glib2-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571750" comment="glib2-doc-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571751" comment="glib2-lang-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571752" comment="libgio-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571753" comment="libgio-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571754" comment="libglib-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571755" comment="libglib-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571756" comment="libgmodule-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571757" comment="libgmodule-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571758" comment="libgobject-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571759" comment="libgobject-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571760" comment="libgthread-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571761" comment="libgthread-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217157" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1137001" ref_url="https://bugzilla.suse.com/1137001" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12450" ref_url="https://www.suse.com/security/cve/CVE-2019-12450/" source="CVE"/>
		<description>
This update for glib2 fixes the following issues:

Security issue fixed: 	  

- CVE-2019-12450: Fixed an improper file permission when copy operation
  takes place (bsc#1137001).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-24"/>
	<updated date="2019-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137001">SUSE bug 1137001</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12450/">CVE-2019-12450 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12450">CVE-2019-12450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571762" comment="glib2-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571763" comment="glib2-doc-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571764" comment="glib2-lang-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571765" comment="libgio-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571766" comment="libgio-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571767" comment="libglib-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571768" comment="libglib-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571769" comment="libgmodule-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571770" comment="libgmodule-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571771" comment="libgobject-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571772" comment="libgobject-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571773" comment="libgthread-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571774" comment="libgthread-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217158" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1107121" ref_url="https://bugzilla.suse.com/1107121" source="BUGZILLA"/>
		<reference ref_id="1191489" ref_url="https://bugzilla.suse.com/1191489" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16428" ref_url="https://www.suse.com/security/cve/CVE-2018-16428/" source="CVE"/>
		<reference ref_id="CVE-2021-3800" ref_url="https://www.suse.com/security/cve/CVE-2021-3800/" source="CVE"/>
		<description>
This update for glib2 fixes the following issues:


- CVE-2021-3800: Fixed a file content leak in pkexec due to charset aliases (bsc#1191489).
- CVE-2018-16428: Fixed a NULL pointer dereference in g_markup_parse_context_end_parse() (bsc#1107121).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-22"/>
	<updated date="2022-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1107121">SUSE bug 1107121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191489">SUSE bug 1191489</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16428/">CVE-2018-16428 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16428">CVE-2018-16428 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3800/">CVE-2021-3800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3800">CVE-2021-3800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672765" comment="glib2-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672766" comment="glib2-doc-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672767" comment="glib2-lang-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672768" comment="libgio-2_0-0-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672769" comment="libgio-2_0-0-32bit-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672770" comment="libglib-2_0-0-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672771" comment="libglib-2_0-0-32bit-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672772" comment="libgmodule-2_0-0-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672773" comment="libgmodule-2_0-0-32bit-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672774" comment="libgobject-2_0-0-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672775" comment="libgobject-2_0-0-32bit-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672776" comment="libgthread-2_0-0-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672777" comment="libgthread-2_0-0-32bit-2.22.5-0.8.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217159" version="1" class="patch">
	<metadata>
		<title>Security update for glibc</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="569091" ref_url="https://bugzilla.suse.com/569091" source="BUGZILLA"/>
		<reference ref_id="572188" ref_url="https://bugzilla.suse.com/572188" source="BUGZILLA"/>
		<reference ref_id="585879" ref_url="https://bugzilla.suse.com/585879" source="BUGZILLA"/>
		<reference ref_id="592941" ref_url="https://bugzilla.suse.com/592941" source="BUGZILLA"/>
		<reference ref_id="594263" ref_url="https://bugzilla.suse.com/594263" source="BUGZILLA"/>
		<reference ref_id="607064" ref_url="https://bugzilla.suse.com/607064" source="BUGZILLA"/>
		<reference ref_id="625591" ref_url="https://bugzilla.suse.com/625591" source="BUGZILLA"/>
		<reference ref_id="625835" ref_url="https://bugzilla.suse.com/625835" source="BUGZILLA"/>
		<reference ref_id="645140" ref_url="https://bugzilla.suse.com/645140" source="BUGZILLA"/>
		<reference ref_id="645303" ref_url="https://bugzilla.suse.com/645303" source="BUGZILLA"/>
		<reference ref_id="646960" ref_url="https://bugzilla.suse.com/646960" source="BUGZILLA"/>
		<reference ref_id="647965" ref_url="https://bugzilla.suse.com/647965" source="BUGZILLA"/>
		<reference ref_id="649634" ref_url="https://bugzilla.suse.com/649634" source="BUGZILLA"/>
		<reference ref_id="659090" ref_url="https://bugzilla.suse.com/659090" source="BUGZILLA"/>
		<reference ref_id="664541" ref_url="https://bugzilla.suse.com/664541" source="BUGZILLA"/>
		<reference ref_id="666179" ref_url="https://bugzilla.suse.com/666179" source="BUGZILLA"/>
		<reference ref_id="673111" ref_url="https://bugzilla.suse.com/673111" source="BUGZILLA"/>
		<reference ref_id="676178" ref_url="https://bugzilla.suse.com/676178" source="BUGZILLA"/>
		<reference ref_id="677787" ref_url="https://bugzilla.suse.com/677787" source="BUGZILLA"/>
		<reference ref_id="678031" ref_url="https://bugzilla.suse.com/678031" source="BUGZILLA"/>
		<reference ref_id="678195" ref_url="https://bugzilla.suse.com/678195" source="BUGZILLA"/>
		<reference ref_id="680833" ref_url="https://bugzilla.suse.com/680833" source="BUGZILLA"/>
		<reference ref_id="685405" ref_url="https://bugzilla.suse.com/685405" source="BUGZILLA"/>
		<reference ref_id="687510" ref_url="https://bugzilla.suse.com/687510" source="BUGZILLA"/>
		<reference ref_id="691365" ref_url="https://bugzilla.suse.com/691365" source="BUGZILLA"/>
		<reference ref_id="700876" ref_url="https://bugzilla.suse.com/700876" source="BUGZILLA"/>
		<reference ref_id="735850" ref_url="https://bugzilla.suse.com/735850" source="BUGZILLA"/>
		<reference ref_id="741345" ref_url="https://bugzilla.suse.com/741345" source="BUGZILLA"/>
		<reference ref_id="743689" ref_url="https://bugzilla.suse.com/743689" source="BUGZILLA"/>
		<reference ref_id="746824" ref_url="https://bugzilla.suse.com/746824" source="BUGZILLA"/>
		<reference ref_id="747768" ref_url="https://bugzilla.suse.com/747768" source="BUGZILLA"/>
		<reference ref_id="747932" ref_url="https://bugzilla.suse.com/747932" source="BUGZILLA"/>
		<reference ref_id="748032" ref_url="https://bugzilla.suse.com/748032" source="BUGZILLA"/>
		<reference ref_id="750741" ref_url="https://bugzilla.suse.com/750741" source="BUGZILLA"/>
		<reference ref_id="767266" ref_url="https://bugzilla.suse.com/767266" source="BUGZILLA"/>
		<reference ref_id="770891" ref_url="https://bugzilla.suse.com/770891" source="BUGZILLA"/>
		<reference ref_id="775690" ref_url="https://bugzilla.suse.com/775690" source="BUGZILLA"/>
		<reference ref_id="779320" ref_url="https://bugzilla.suse.com/779320" source="BUGZILLA"/>
		<reference ref_id="796982" ref_url="https://bugzilla.suse.com/796982" source="BUGZILLA"/>
		<reference ref_id="801246" ref_url="https://bugzilla.suse.com/801246" source="BUGZILLA"/>
		<reference ref_id="813121" ref_url="https://bugzilla.suse.com/813121" source="BUGZILLA"/>
		<reference ref_id="828637" ref_url="https://bugzilla.suse.com/828637" source="BUGZILLA"/>
		<reference ref_id="830268" ref_url="https://bugzilla.suse.com/830268" source="BUGZILLA"/>
		<reference ref_id="834594" ref_url="https://bugzilla.suse.com/834594" source="BUGZILLA"/>
		<reference ref_id="836746" ref_url="https://bugzilla.suse.com/836746" source="BUGZILLA"/>
		<reference ref_id="839870" ref_url="https://bugzilla.suse.com/839870" source="BUGZILLA"/>
		<reference ref_id="843735" ref_url="https://bugzilla.suse.com/843735" source="BUGZILLA"/>
		<reference ref_id="844309" ref_url="https://bugzilla.suse.com/844309" source="BUGZILLA"/>
		<reference ref_id="864081" ref_url="https://bugzilla.suse.com/864081" source="BUGZILLA"/>
		<reference ref_id="882600" ref_url="https://bugzilla.suse.com/882600" source="BUGZILLA"/>
		<reference ref_id="883022" ref_url="https://bugzilla.suse.com/883022" source="BUGZILLA"/>
		<reference ref_id="886416" ref_url="https://bugzilla.suse.com/886416" source="BUGZILLA"/>
		<reference ref_id="887022" ref_url="https://bugzilla.suse.com/887022" source="BUGZILLA"/>
		<reference ref_id="888860" ref_url="https://bugzilla.suse.com/888860" source="BUGZILLA"/>
		<reference ref_id="892073" ref_url="https://bugzilla.suse.com/892073" source="BUGZILLA"/>
		<reference ref_id="894553" ref_url="https://bugzilla.suse.com/894553" source="BUGZILLA"/>
		<reference ref_id="894556" ref_url="https://bugzilla.suse.com/894556" source="BUGZILLA"/>
		<reference ref_id="906371" ref_url="https://bugzilla.suse.com/906371" source="BUGZILLA"/>
		<reference ref_id="909053" ref_url="https://bugzilla.suse.com/909053" source="BUGZILLA"/>
		<reference ref_id="910599" ref_url="https://bugzilla.suse.com/910599" source="BUGZILLA"/>
		<reference ref_id="913646" ref_url="https://bugzilla.suse.com/913646" source="BUGZILLA"/>
		<reference ref_id="915526" ref_url="https://bugzilla.suse.com/915526" source="BUGZILLA"/>
		<reference ref_id="916222" ref_url="https://bugzilla.suse.com/916222" source="BUGZILLA"/>
		<reference ref_id="918233" ref_url="https://bugzilla.suse.com/918233" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-5029" ref_url="https://www.suse.com/security/cve/CVE-2009-5029/" source="CVE"/>
		<reference ref_id="CVE-2010-0015" ref_url="https://www.suse.com/security/cve/CVE-2010-0015/" source="CVE"/>
		<reference ref_id="CVE-2010-0296" ref_url="https://www.suse.com/security/cve/CVE-2010-0296/" source="CVE"/>
		<reference ref_id="CVE-2010-0830" ref_url="https://www.suse.com/security/cve/CVE-2010-0830/" source="CVE"/>
		<reference ref_id="CVE-2010-3847" ref_url="https://www.suse.com/security/cve/CVE-2010-3847/" source="CVE"/>
		<reference ref_id="CVE-2010-3856" ref_url="https://www.suse.com/security/cve/CVE-2010-3856/" source="CVE"/>
		<reference ref_id="CVE-2010-4756" ref_url="https://www.suse.com/security/cve/CVE-2010-4756/" source="CVE"/>
		<reference ref_id="CVE-2011-0536" ref_url="https://www.suse.com/security/cve/CVE-2011-0536/" source="CVE"/>
		<reference ref_id="CVE-2011-1071" ref_url="https://www.suse.com/security/cve/CVE-2011-1071/" source="CVE"/>
		<reference ref_id="CVE-2011-1089" ref_url="https://www.suse.com/security/cve/CVE-2011-1089/" source="CVE"/>
		<reference ref_id="CVE-2011-1095" ref_url="https://www.suse.com/security/cve/CVE-2011-1095/" source="CVE"/>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<reference ref_id="CVE-2012-0864" ref_url="https://www.suse.com/security/cve/CVE-2012-0864/" source="CVE"/>
		<reference ref_id="CVE-2012-3405" ref_url="https://www.suse.com/security/cve/CVE-2012-3405/" source="CVE"/>
		<reference ref_id="CVE-2012-3406" ref_url="https://www.suse.com/security/cve/CVE-2012-3406/" source="CVE"/>
		<reference ref_id="CVE-2012-3480" ref_url="https://www.suse.com/security/cve/CVE-2012-3480/" source="CVE"/>
		<reference ref_id="CVE-2012-4412" ref_url="https://www.suse.com/security/cve/CVE-2012-4412/" source="CVE"/>
		<reference ref_id="CVE-2012-6656" ref_url="https://www.suse.com/security/cve/CVE-2012-6656/" source="CVE"/>
		<reference ref_id="CVE-2013-0242" ref_url="https://www.suse.com/security/cve/CVE-2013-0242/" source="CVE"/>
		<reference ref_id="CVE-2013-1914" ref_url="https://www.suse.com/security/cve/CVE-2013-1914/" source="CVE"/>
		<reference ref_id="CVE-2013-4237" ref_url="https://www.suse.com/security/cve/CVE-2013-4237/" source="CVE"/>
		<reference ref_id="CVE-2013-4332" ref_url="https://www.suse.com/security/cve/CVE-2013-4332/" source="CVE"/>
		<reference ref_id="CVE-2013-4357" ref_url="https://www.suse.com/security/cve/CVE-2013-4357/" source="CVE"/>
		<reference ref_id="CVE-2013-4788" ref_url="https://www.suse.com/security/cve/CVE-2013-4788/" source="CVE"/>
		<reference ref_id="CVE-2013-7423" ref_url="https://www.suse.com/security/cve/CVE-2013-7423/" source="CVE"/>
		<reference ref_id="CVE-2014-4043" ref_url="https://www.suse.com/security/cve/CVE-2014-4043/" source="CVE"/>
		<reference ref_id="CVE-2014-5119" ref_url="https://www.suse.com/security/cve/CVE-2014-5119/" source="CVE"/>
		<reference ref_id="CVE-2014-6040" ref_url="https://www.suse.com/security/cve/CVE-2014-6040/" source="CVE"/>
		<reference ref_id="CVE-2014-7817" ref_url="https://www.suse.com/security/cve/CVE-2014-7817/" source="CVE"/>
		<reference ref_id="CVE-2014-9402" ref_url="https://www.suse.com/security/cve/CVE-2014-9402/" source="CVE"/>
		<reference ref_id="CVE-2015-0235" ref_url="https://www.suse.com/security/cve/CVE-2015-0235/" source="CVE"/>
		<reference ref_id="CVE-2015-1472" ref_url="https://www.suse.com/security/cve/CVE-2015-1472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001305.html" source="SUSE-SU"/>
		<description>

This glibc update fixes a critical privilege escalation problem and the 
following non-security issues:

    * bnc#892073: An off-by-one error leading to a heap-based buffer
      overflow was found in __gconv_translit_find(). An exploit that
      targets the problem is publicly available. (CVE-2014-5119)
    * bnc#886416: Avoid redundant shift character in iconv output at block
      boundary.
    * bnc#864081: Take lock in pthread_cond_wait cleanup handler only when
      needed.
    * bnc#843735: Don't crash on unresolved weak symbol reference.
    * bnc#836746: Avoid race between {,__de}allocate_stack and
      __reclaim_stacks during fork.
    * bnc#750741: Use absolute timeout in x86 pthread_cond_timedwait.

Security Issues:

    * CVE-2014-5119
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-28"/>
	<updated date="2014-08-28"/>
	<bugzilla href="https://bugzilla.suse.com/569091">SUSE bug 569091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/572188">SUSE bug 572188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/585879">SUSE bug 585879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/592941">SUSE bug 592941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/594263">SUSE bug 594263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/607064">SUSE bug 607064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/625591">SUSE bug 625591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/625835">SUSE bug 625835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/645140">SUSE bug 645140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/645303">SUSE bug 645303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/646960">SUSE bug 646960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/647965">SUSE bug 647965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649634">SUSE bug 649634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/659090">SUSE bug 659090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/664541">SUSE bug 664541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/666179">SUSE bug 666179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/673111">SUSE bug 673111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/676178">SUSE bug 676178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/677787">SUSE bug 677787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/678031">SUSE bug 678031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/678195">SUSE bug 678195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/680833">SUSE bug 680833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/685405">SUSE bug 685405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/687510">SUSE bug 687510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/691365">SUSE bug 691365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/700876">SUSE bug 700876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/735850">SUSE bug 735850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/741345">SUSE bug 741345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/743689">SUSE bug 743689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746824">SUSE bug 746824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747768">SUSE bug 747768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747932">SUSE bug 747932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748032">SUSE bug 748032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750741">SUSE bug 750741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767266">SUSE bug 767266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770891">SUSE bug 770891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775690">SUSE bug 775690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779320">SUSE bug 779320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796982">SUSE bug 796982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801246">SUSE bug 801246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813121">SUSE bug 813121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828637">SUSE bug 828637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/830268">SUSE bug 830268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834594">SUSE bug 834594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836746">SUSE bug 836746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839870">SUSE bug 839870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843735">SUSE bug 843735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844309">SUSE bug 844309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864081">SUSE bug 864081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882600">SUSE bug 882600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883022">SUSE bug 883022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886416">SUSE bug 886416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887022">SUSE bug 887022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888860">SUSE bug 888860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892073">SUSE bug 892073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894553">SUSE bug 894553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894556">SUSE bug 894556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906371">SUSE bug 906371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909053">SUSE bug 909053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910599">SUSE bug 910599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913646">SUSE bug 913646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915526">SUSE bug 915526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916222">SUSE bug 916222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918233">SUSE bug 918233</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5029/">CVE-2009-5029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5029">CVE-2009-5029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0015/">CVE-2010-0015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0015">CVE-2010-0015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0296/">CVE-2010-0296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0296">CVE-2010-0296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0830/">CVE-2010-0830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0830">CVE-2010-0830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3847/">CVE-2010-3847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3847">CVE-2010-3847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3856/">CVE-2010-3856 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3856">CVE-2010-3856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4756/">CVE-2010-4756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4756">CVE-2010-4756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0536/">CVE-2011-0536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0536">CVE-2011-0536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1071/">CVE-2011-1071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1071">CVE-2011-1071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1089/">CVE-2011-1089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1089">CVE-2011-1089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1095/">CVE-2011-1095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1095">CVE-2011-1095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2483">CVE-2011-2483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0864/">CVE-2012-0864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0864">CVE-2012-0864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3405/">CVE-2012-3405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3405">CVE-2012-3405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3406/">CVE-2012-3406 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3406">CVE-2012-3406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3480/">CVE-2012-3480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3480">CVE-2012-3480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4412/">CVE-2012-4412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4412">CVE-2012-4412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6656/">CVE-2012-6656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6656">CVE-2012-6656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0242/">CVE-2013-0242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0242">CVE-2013-0242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1914/">CVE-2013-1914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1914">CVE-2013-1914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4237/">CVE-2013-4237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4237">CVE-2013-4237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4332/">CVE-2013-4332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4332">CVE-2013-4332 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4357/">CVE-2013-4357 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4357">CVE-2013-4357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4788/">CVE-2013-4788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4788">CVE-2013-4788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7423/">CVE-2013-7423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7423">CVE-2013-7423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4043/">CVE-2014-4043 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4043">CVE-2014-4043 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5119/">CVE-2014-5119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5119">CVE-2014-5119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6040/">CVE-2014-6040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6040">CVE-2014-6040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7817/">CVE-2014-7817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7817">CVE-2014-7817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9402/">CVE-2014-9402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9402">CVE-2014-9402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0235/">CVE-2015-0235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0235">CVE-2015-0235 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1472/">CVE-2015-1472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1472">CVE-2015-1472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991421" comment="glibc-2.11.1-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991422" comment="glibc-32bit-2.11.1-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991423" comment="glibc-devel-2.11.1-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991424" comment="glibc-devel-32bit-2.11.1-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991425" comment="glibc-html-2.11.1-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991426" comment="glibc-i18ndata-2.11.1-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991427" comment="glibc-info-2.11.1-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991428" comment="glibc-locale-2.11.1-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991429" comment="glibc-locale-32bit-2.11.1-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991430" comment="glibc-profile-2.11.1-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991431" comment="glibc-profile-32bit-2.11.1-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587382" comment="libxcrypt-3.0.3-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587383" comment="libxcrypt-32bit-3.0.3-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991432" comment="nscd-2.11.1-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587385" comment="pam-modules-11-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587386" comment="pam-modules-32bit-11-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587387" comment="pwdutils-3.2.8-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587388" comment="pwdutils-plugin-audit-3.2.8-0.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991421" comment="glibc-2.11.1-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991422" comment="glibc-32bit-2.11.1-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991423" comment="glibc-devel-2.11.1-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991424" comment="glibc-devel-32bit-2.11.1-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991425" comment="glibc-html-2.11.1-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991426" comment="glibc-i18ndata-2.11.1-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991427" comment="glibc-info-2.11.1-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991428" comment="glibc-locale-2.11.1-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991429" comment="glibc-locale-32bit-2.11.1-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991430" comment="glibc-profile-2.11.1-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991431" comment="glibc-profile-32bit-2.11.1-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587382" comment="libxcrypt-3.0.3-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587383" comment="libxcrypt-32bit-3.0.3-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991432" comment="nscd-2.11.1-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587385" comment="pam-modules-11-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587386" comment="pam-modules-32bit-11-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587387" comment="pwdutils-3.2.8-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587388" comment="pwdutils-plugin-audit-3.2.8-0.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217160" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="830257" ref_url="https://bugzilla.suse.com/830257" source="BUGZILLA"/>
		<reference ref_id="847227" ref_url="https://bugzilla.suse.com/847227" source="BUGZILLA"/>
		<reference ref_id="863499" ref_url="https://bugzilla.suse.com/863499" source="BUGZILLA"/>
		<reference ref_id="892065" ref_url="https://bugzilla.suse.com/892065" source="BUGZILLA"/>
		<reference ref_id="918187" ref_url="https://bugzilla.suse.com/918187" source="BUGZILLA"/>
		<reference ref_id="920338" ref_url="https://bugzilla.suse.com/920338" source="BUGZILLA"/>
		<reference ref_id="927080" ref_url="https://bugzilla.suse.com/927080" source="BUGZILLA"/>
		<reference ref_id="945779" ref_url="https://bugzilla.suse.com/945779" source="BUGZILLA"/>
		<reference ref_id="950944" ref_url="https://bugzilla.suse.com/950944" source="BUGZILLA"/>
		<reference ref_id="961721" ref_url="https://bugzilla.suse.com/961721" source="BUGZILLA"/>
		<reference ref_id="962736" ref_url="https://bugzilla.suse.com/962736" source="BUGZILLA"/>
		<reference ref_id="962737" ref_url="https://bugzilla.suse.com/962737" source="BUGZILLA"/>
		<reference ref_id="962738" ref_url="https://bugzilla.suse.com/962738" source="BUGZILLA"/>
		<reference ref_id="962739" ref_url="https://bugzilla.suse.com/962739" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207/" source="CVE"/>
		<reference ref_id="CVE-2013-4458" ref_url="https://www.suse.com/security/cve/CVE-2013-4458/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<description>

This update for glibc fixes the following issues:

- CVE-2015-7547: A stack-based buffer overflow in getaddrinfo allowed remote attackers to cause a crash or execute arbitrary code via crafted and timed DNS responses (bsc#961721)
- CVE-2015-8777: Insufficient checking of LD_POINTER_GUARD environment variable allowed local attackers to bypass the pointer guarding protection of the dynamic loader on set-user-ID and set-group-ID programs (bsc#950944)
- CVE-2015-8776: Out-of-range time values passed to the strftime function may cause it to crash, leading to a denial of service, or potentially disclosure information (bsc#962736)
- CVE-2015-8778: Integer overflow in hcreate and hcreate_r could have caused an out-of-bound memory access. leading to application crashes or, potentially, arbitrary code execution (bsc#962737)
- CVE-2014-9761: A stack overflow (unbounded alloca) could have caused applications which process long strings with the nan function to crash or, potentially, execute arbitrary code. (bsc#962738)
- CVE-2015-8779: A stack overflow (unbounded alloca) in the catopen function could have caused applications which pass long strings to the catopen function to crash or, potentially execute arbitrary code. (bsc#962739)
- CVE-2013-2207: pt_chown tricked into granting access to another users pseudo-terminal (bsc#830257)
- CVE-2013-4458: Stack (frame) overflow in getaddrinfo() when called with AF_INET6 (bsc#847227)
- CVE-2014-8121: denial of service issue in the NSS backends (bsc#918187)
- bsc#920338: Read past end of pattern in fnmatch
- CVE-2015-1781: buffer overflow in nss_dns (bsc#927080)

The following non-security bugs were fixed:

- bnc#892065: SIGSEV tst-setlocale3 in glibc-2.11.3-17.68.1
- bnc#863499: Memory leak in getaddrinfo when many RRs are returned
- bsc#892065: Avoid unbound alloca in setenv
- bsc#945779: Properly reread entry after failure in nss_files getent function
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/830257">SUSE bug 830257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847227">SUSE bug 847227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863499">SUSE bug 863499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892065">SUSE bug 892065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918187">SUSE bug 918187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920338">SUSE bug 920338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927080">SUSE bug 927080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945779">SUSE bug 945779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950944">SUSE bug 950944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961721">SUSE bug 961721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962736">SUSE bug 962736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962737">SUSE bug 962737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962738">SUSE bug 962738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962739">SUSE bug 962739</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2207">CVE-2013-2207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4458/">CVE-2013-4458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4458">CVE-2013-4458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8121">CVE-2014-8121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9761">CVE-2014-9761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1781">CVE-2015-1781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7547">CVE-2015-7547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8776">CVE-2015-8776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8777">CVE-2015-8777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8778">CVE-2015-8778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8779">CVE-2015-8779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571775" comment="glibc-2.11.1-0.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571776" comment="glibc-32bit-2.11.1-0.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571777" comment="glibc-devel-2.11.1-0.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571778" comment="glibc-devel-32bit-2.11.1-0.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571779" comment="glibc-html-2.11.1-0.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571780" comment="glibc-i18ndata-2.11.1-0.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571781" comment="glibc-info-2.11.1-0.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571782" comment="glibc-locale-2.11.1-0.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571783" comment="glibc-locale-32bit-2.11.1-0.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571784" comment="glibc-profile-2.11.1-0.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571785" comment="glibc-profile-32bit-2.11.1-0.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571786" comment="nscd-2.11.1-0.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217161" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="864081" ref_url="https://bugzilla.suse.com/864081" source="BUGZILLA"/>
		<reference ref_id="969727" ref_url="https://bugzilla.suse.com/969727" source="BUGZILLA"/>
		<reference ref_id="973010" ref_url="https://bugzilla.suse.com/973010" source="BUGZILLA"/>
		<reference ref_id="973164" ref_url="https://bugzilla.suse.com/973164" source="BUGZILLA"/>
		<reference ref_id="980483" ref_url="https://bugzilla.suse.com/980483" source="BUGZILLA"/>
		<reference ref_id="980854" ref_url="https://bugzilla.suse.com/980854" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1234" ref_url="https://www.suse.com/security/cve/CVE-2016-1234/" source="CVE"/>
		<reference ref_id="CVE-2016-3075" ref_url="https://www.suse.com/security/cve/CVE-2016-3075/" source="CVE"/>
		<reference ref_id="CVE-2016-3706" ref_url="https://www.suse.com/security/cve/CVE-2016-3706/" source="CVE"/>
		<reference ref_id="CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429/" source="CVE"/>
		<description>

This update for glibc fixes the following issues:

Security issues fixed:
- CVE-2016-1234: Fixed a buffer overflow with glob() with GLOB_ALTDIRFUNC and crafted directory (bsc#969727).
- CVE-2016-3075: Fixed a stack overflow in _nss_dns_getnetbyname_r (bsc#973164)
- CVE-2016-3706: Fixed a getaddrinfo stack overflow in hostent conversion (bsc#980483)
- CVE-2016-4429: Avoid a stack overflow due to alloca usage in clntudp_call (bsc#980854)

Also fixed some bugs:
- Don't touch user-controlled stdio locks in forked child (bsc#864081)
- Fix memory leak in _nss_dns_gethostbyname4_r (bsc#973010)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-25"/>
	<updated date="2016-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/864081">SUSE bug 864081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969727">SUSE bug 969727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973010">SUSE bug 973010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973164">SUSE bug 973164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980483">SUSE bug 980483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980854">SUSE bug 980854</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1234/">CVE-2016-1234 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1234">CVE-2016-1234 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3075/">CVE-2016-3075 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3075">CVE-2016-3075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3706/">CVE-2016-3706 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3706">CVE-2016-3706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4429">CVE-2016-4429 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571787" comment="glibc-2.11.1-0.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571788" comment="glibc-32bit-2.11.1-0.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571789" comment="glibc-devel-2.11.1-0.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571790" comment="glibc-devel-32bit-2.11.1-0.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571791" comment="glibc-html-2.11.1-0.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571792" comment="glibc-i18ndata-2.11.1-0.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571793" comment="glibc-info-2.11.1-0.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571794" comment="glibc-locale-2.11.1-0.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571795" comment="glibc-locale-32bit-2.11.1-0.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571796" comment="glibc-profile-2.11.1-0.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571797" comment="glibc-profile-32bit-2.11.1-0.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571798" comment="nscd-2.11.1-0.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217162" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1039357" ref_url="https://bugzilla.suse.com/1039357" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000366" ref_url="https://www.suse.com/security/cve/CVE-2017-1000366/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2017-1000366: Fix a potential privilege escalation vulnerability that
  allowed unprivileged system users to manipulate the stack of setuid binaries
  to gain special privileges. [bsc#1039357]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-19"/>
	<updated date="2017-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1039357">SUSE bug 1039357</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000366/">CVE-2017-1000366 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000366">CVE-2017-1000366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571799" comment="glibc-2.11.1-0.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571800" comment="glibc-32bit-2.11.1-0.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571801" comment="glibc-devel-2.11.1-0.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571802" comment="glibc-devel-32bit-2.11.1-0.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571803" comment="glibc-html-2.11.1-0.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571804" comment="glibc-i18ndata-2.11.1-0.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571805" comment="glibc-info-2.11.1-0.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571806" comment="glibc-locale-2.11.1-0.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571807" comment="glibc-locale-32bit-2.11.1-0.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571808" comment="glibc-profile-2.11.1-0.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571809" comment="glibc-profile-32bit-2.11.1-0.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571810" comment="nscd-2.11.1-0.79.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217163" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1074293" ref_url="https://bugzilla.suse.com/1074293" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

- A privilege escalation bug in the realpath() function has been fixed.
  [CVE-2018-1000001, bsc#1074293]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1074293">SUSE bug 1074293</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000001">CVE-2018-1000001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571811" comment="glibc-2.11.1-0.80.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571812" comment="glibc-32bit-2.11.1-0.80.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571813" comment="glibc-devel-2.11.1-0.80.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571814" comment="glibc-devel-32bit-2.11.1-0.80.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571815" comment="glibc-html-2.11.1-0.80.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571816" comment="glibc-i18ndata-2.11.1-0.80.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571817" comment="glibc-info-2.11.1-0.80.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571818" comment="glibc-locale-2.11.1-0.80.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571819" comment="glibc-locale-32bit-2.11.1-0.80.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571820" comment="glibc-profile-2.11.1-0.80.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571821" comment="glibc-profile-32bit-2.11.1-0.80.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571822" comment="nscd-2.11.1-0.80.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217164" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1037930" ref_url="https://bugzilla.suse.com/1037930" source="BUGZILLA"/>
		<reference ref_id="1051791" ref_url="https://bugzilla.suse.com/1051791" source="BUGZILLA"/>
		<reference ref_id="1074293" ref_url="https://bugzilla.suse.com/1074293" source="BUGZILLA"/>
		<reference ref_id="1079036" ref_url="https://bugzilla.suse.com/1079036" source="BUGZILLA"/>
		<reference ref_id="978209" ref_url="https://bugzilla.suse.com/978209" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12132" ref_url="https://www.suse.com/security/cve/CVE-2017-12132/" source="CVE"/>
		<reference ref_id="CVE-2017-8804" ref_url="https://www.suse.com/security/cve/CVE-2017-8804/" source="CVE"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="CVE-2018-6485" ref_url="https://www.suse.com/security/cve/CVE-2018-6485/" source="CVE"/>
		<reference ref_id="CVE-2018-6551" ref_url="https://www.suse.com/security/cve/CVE-2018-6551/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2017-8804: Fix memory leak after deserialization failure in xdr_bytes, xdr_string (bsc#1037930)
- CVE-2017-12132: Reduce EDNS payload size to 1200 bytes (bsc#1051791)
- CVE-2018-6485,CVE-2018-6551:  Fix integer overflows in internal memalign and malloc functions (bsc#1079036)
- CVE-2018-1000001: Avoid underflow of malloced area in realpath (bsc#1074293)

Also a non security issue was fixed:

- Do not fail if one of the two responses to AF_UNSPEC fails (bsc#978209)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037930">SUSE bug 1037930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051791">SUSE bug 1051791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074293">SUSE bug 1074293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079036">SUSE bug 1079036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978209">SUSE bug 978209</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12132/">CVE-2017-12132 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12132">CVE-2017-12132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8804/">CVE-2017-8804 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8804">CVE-2017-8804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000001">CVE-2018-1000001 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6485/">CVE-2018-6485 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6485">CVE-2018-6485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6551/">CVE-2018-6551 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6551">CVE-2018-6551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571823" comment="glibc-2.11.1-0.80.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571824" comment="glibc-32bit-2.11.1-0.80.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571825" comment="glibc-devel-2.11.1-0.80.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571826" comment="glibc-devel-32bit-2.11.1-0.80.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571827" comment="glibc-html-2.11.1-0.80.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571828" comment="glibc-i18ndata-2.11.1-0.80.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571829" comment="glibc-info-2.11.1-0.80.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571830" comment="glibc-locale-2.11.1-0.80.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571831" comment="glibc-locale-32bit-2.11.1-0.80.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571832" comment="glibc-profile-2.11.1-0.80.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571833" comment="glibc-profile-32bit-2.11.1-0.80.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571834" comment="nscd-2.11.1-0.80.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217165" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1081556" ref_url="https://bugzilla.suse.com/1081556" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12133" ref_url="https://www.suse.com/security/cve/CVE-2017-12133/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2017-12133: Avoid use-after-free read access in clntudp_call (bsc#1081556)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-22"/>
	<updated date="2018-02-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081556">SUSE bug 1081556</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12133/">CVE-2017-12133 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12133">CVE-2017-12133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571835" comment="glibc-2.11.1-0.80.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571836" comment="glibc-32bit-2.11.1-0.80.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571837" comment="glibc-devel-2.11.1-0.80.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571838" comment="glibc-devel-32bit-2.11.1-0.80.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571839" comment="glibc-html-2.11.1-0.80.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571840" comment="glibc-i18ndata-2.11.1-0.80.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571841" comment="glibc-info-2.11.1-0.80.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571842" comment="glibc-locale-2.11.1-0.80.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571843" comment="glibc-locale-32bit-2.11.1-0.80.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571844" comment="glibc-profile-2.11.1-0.80.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571845" comment="glibc-profile-32bit-2.11.1-0.80.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571846" comment="nscd-2.11.1-0.80.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217166" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1094161" ref_url="https://bugzilla.suse.com/1094161" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11236" ref_url="https://www.suse.com/security/cve/CVE-2018-11236/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

Security issue fixed:

- CVE-2018-11236: Fix overflow in path length computation (bsc#1094161).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-27"/>
	<updated date="2018-07-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094161">SUSE bug 1094161</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11236/">CVE-2018-11236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11236">CVE-2018-11236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571847" comment="glibc-2.11.1-0.80.12.846 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571848" comment="glibc-32bit-2.11.1-0.80.12.846 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571849" comment="glibc-devel-2.11.1-0.80.12.846 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571850" comment="glibc-devel-32bit-2.11.1-0.80.12.846 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571851" comment="glibc-html-2.11.1-0.80.12.846 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571852" comment="glibc-i18ndata-2.11.1-0.80.12.846 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571853" comment="glibc-info-2.11.1-0.80.12.846 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571854" comment="glibc-locale-2.11.1-0.80.12.846 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571855" comment="glibc-locale-32bit-2.11.1-0.80.12.846 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571856" comment="glibc-profile-2.11.1-0.80.12.846 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571857" comment="glibc-profile-32bit-2.11.1-0.80.12.846 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571858" comment="nscd-2.11.1-0.80.12.846 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217167" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1064580" ref_url="https://bugzilla.suse.com/1064580" source="BUGZILLA"/>
		<reference ref_id="1064583" ref_url="https://bugzilla.suse.com/1064583" source="BUGZILLA"/>
		<reference ref_id="941234" ref_url="https://bugzilla.suse.com/941234" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5180" ref_url="https://www.suse.com/security/cve/CVE-2015-5180/" source="CVE"/>
		<reference ref_id="CVE-2017-15670" ref_url="https://www.suse.com/security/cve/CVE-2017-15670/" source="CVE"/>
		<reference ref_id="CVE-2017-15804" ref_url="https://www.suse.com/security/cve/CVE-2017-15804/" source="CVE"/>
		<description>
This update for glibc fixes the following security issues:

- CVE-2017-15670: Prevent off-by-one error that lead to a heap-based buffer
  overflow in the glob function, related to the processing of home directories
  using the ~ operator followed by a long string (bsc#1064583).
- CVE-2017-15804: The glob function contained a buffer overflow during
  unescaping of user names with the ~ operator (bsc#1064580).
- CVE-2015-5180: res_query in libresolv allowed remote attackers to cause a
  denial of service (NULL pointer dereference and process crash) (bsc#941234)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-20"/>
	<updated date="2018-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1064580">SUSE bug 1064580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064583">SUSE bug 1064583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941234">SUSE bug 941234</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5180/">CVE-2015-5180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5180">CVE-2015-5180 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15670/">CVE-2017-15670 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15670">CVE-2017-15670 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15804/">CVE-2017-15804 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15804">CVE-2017-15804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571859" comment="glibc-2.11.1-0.80.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571860" comment="glibc-32bit-2.11.1-0.80.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571861" comment="glibc-devel-2.11.1-0.80.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571862" comment="glibc-devel-32bit-2.11.1-0.80.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571863" comment="glibc-html-2.11.1-0.80.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571864" comment="glibc-i18ndata-2.11.1-0.80.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571865" comment="glibc-info-2.11.1-0.80.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571866" comment="glibc-locale-2.11.1-0.80.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571867" comment="glibc-locale-32bit-2.11.1-0.80.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571868" comment="glibc-profile-2.11.1-0.80.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571869" comment="glibc-profile-32bit-2.11.1-0.80.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571870" comment="nscd-2.11.1-0.80.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217168" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1127223" ref_url="https://bugzilla.suse.com/1127223" source="BUGZILLA"/>
		<reference ref_id="1127308" ref_url="https://bugzilla.suse.com/1127308" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-5155" ref_url="https://www.suse.com/security/cve/CVE-2009-5155/" source="CVE"/>
		<reference ref_id="CVE-2019-9169" ref_url="https://www.suse.com/security/cve/CVE-2019-9169/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2019-9169: Fixed a heap-based buffer over-read via an attempted case-insensitive regular-expression match (bsc#1127308).
- CVE-2009-5155: Fixed a denial of service in parse_reg_exp() (bsc#1127223).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1127223">SUSE bug 1127223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127308">SUSE bug 1127308</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2009-5155/">CVE-2009-5155 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-5155">CVE-2009-5155 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9169/">CVE-2019-9169 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9169">CVE-2019-9169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571871" comment="glibc-2.11.1-0.80.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571872" comment="glibc-32bit-2.11.1-0.80.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571873" comment="glibc-devel-2.11.1-0.80.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571874" comment="glibc-devel-32bit-2.11.1-0.80.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571875" comment="glibc-html-2.11.1-0.80.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571876" comment="glibc-i18ndata-2.11.1-0.80.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571877" comment="glibc-info-2.11.1-0.80.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571878" comment="glibc-locale-2.11.1-0.80.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571879" comment="glibc-locale-32bit-2.11.1-0.80.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571880" comment="glibc-profile-2.11.1-0.80.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571881" comment="glibc-profile-32bit-2.11.1-0.80.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571882" comment="nscd-2.11.1-0.80.23.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217169" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1186489" ref_url="https://bugzilla.suse.com/1186489" source="BUGZILLA"/>
		<reference ref_id="1187911" ref_url="https://bugzilla.suse.com/1187911" source="BUGZILLA"/>
		<reference ref_id="1193615" ref_url="https://bugzilla.suse.com/1193615" source="BUGZILLA"/>
		<reference ref_id="1193616" ref_url="https://bugzilla.suse.com/1193616" source="BUGZILLA"/>
		<reference ref_id="1194640" ref_url="https://bugzilla.suse.com/1194640" source="BUGZILLA"/>
		<reference ref_id="1194768" ref_url="https://bugzilla.suse.com/1194768" source="BUGZILLA"/>
		<reference ref_id="1194770" ref_url="https://bugzilla.suse.com/1194770" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8982" ref_url="https://www.suse.com/security/cve/CVE-2015-8982/" source="CVE"/>
		<reference ref_id="CVE-2015-8983" ref_url="https://www.suse.com/security/cve/CVE-2015-8983/" source="CVE"/>
		<reference ref_id="CVE-2021-33574" ref_url="https://www.suse.com/security/cve/CVE-2021-33574/" source="CVE"/>
		<reference ref_id="CVE-2021-35942" ref_url="https://www.suse.com/security/cve/CVE-2021-35942/" source="CVE"/>
		<reference ref_id="CVE-2021-3999" ref_url="https://www.suse.com/security/cve/CVE-2021-3999/" source="CVE"/>
		<reference ref_id="CVE-2022-23218" ref_url="https://www.suse.com/security/cve/CVE-2022-23218/" source="CVE"/>
		<reference ref_id="CVE-2022-23219" ref_url="https://www.suse.com/security/cve/CVE-2022-23219/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2015-8983: Fixed _IO_wstr_overflow integer overflow (bsc#1193615, BZ #17269)
- CVE-2015-8982: Fixed memory handling in strxfrm_l (bsc#1193616, BZ #16009)
- CVE-2022-23219: Fixed buffer overflow in sunrpc clnt_create for 'unix' (bsc#1194768, BZ #22542)
- CVE-2022-23218: Fixed buffer overflow in sunrpc svcunix_create (bsc#1194770, BZ #28768)
- CVE-2021-3999: Fixed getcwd to set errno to ERANGE for size == 1 (bsc#1194640, BZ #28769)
- CVE-2021-33574: Use __pthread_attr_copy in mq_notify (bsc#1186489, BZ #27896)
- CVE-2021-35942: Fixed handle overflow in wordexp positional parameter number (bsc#1187911, BZ #28011)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-18"/>
	<updated date="2022-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186489">SUSE bug 1186489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187911">SUSE bug 1187911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193615">SUSE bug 1193615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193616">SUSE bug 1193616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194640">SUSE bug 1194640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194768">SUSE bug 1194768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194770">SUSE bug 1194770</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8982/">CVE-2015-8982 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8982">CVE-2015-8982 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2015-8983/">CVE-2015-8983 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8983">CVE-2015-8983 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33574/">CVE-2021-33574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">CVE-2021-33574 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35942/">CVE-2021-35942 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">CVE-2021-35942 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3999/">CVE-2021-3999 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3999">CVE-2021-3999 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23218/">CVE-2022-23218 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">CVE-2022-23218 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23219/">CVE-2022-23219 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">CVE-2022-23219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673626" comment="glibc-2.11.1-0.80.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673627" comment="glibc-32bit-2.11.1-0.80.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673628" comment="glibc-devel-2.11.1-0.80.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673629" comment="glibc-devel-32bit-2.11.1-0.80.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673630" comment="glibc-html-2.11.1-0.80.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673631" comment="glibc-i18ndata-2.11.1-0.80.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673632" comment="glibc-info-2.11.1-0.80.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673633" comment="glibc-locale-2.11.1-0.80.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673634" comment="glibc-locale-32bit-2.11.1-0.80.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673635" comment="glibc-profile-2.11.1-0.80.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673636" comment="glibc-profile-32bit-2.11.1-0.80.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673637" comment="nscd-2.11.1-0.80.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217170" version="1" class="patch">
	<metadata>
		<title>Security update for gmp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1192717" ref_url="https://bugzilla.suse.com/1192717" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43618" ref_url="https://www.suse.com/security/cve/CVE-2021-43618/" source="CVE"/>
		<description>
This update for gmp fixes the following issues:

- CVE-2021-43618: Fixed buffer overflow on malformed input to mpz_inp_raw (bsc#1192717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192717">SUSE bug 1192717</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43618/">CVE-2021-43618 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43618">CVE-2021-43618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658238" comment="gmp-4.2.3-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658239" comment="gmp-32bit-4.2.3-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217171" version="1" class="patch">
	<metadata>
		<title>Security update for gnome-session (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1048274" ref_url="https://bugzilla.suse.com/1048274" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11171" ref_url="https://www.suse.com/security/cve/CVE-2017-11171/" source="CVE"/>
		<description>


This update for gnome-session fixes the following issues:

- CVE-2017-11171: Fix a denial of service condition. an unauthenticated local user
  can create ICE connections, causing a file descriptor leak in
  gnome-session (bsc#1048274).

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-16"/>
	<updated date="2017-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1048274">SUSE bug 1048274</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11171/">CVE-2017-11171 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11171">CVE-2017-11171 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571906" comment="gnome-session-2.28.0-3.11.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571907" comment="gnome-session-lang-2.28.0-3.11.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217172" version="1" class="patch">
	<metadata>
		<title>Security update for gnuplot (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1044638" ref_url="https://bugzilla.suse.com/1044638" source="BUGZILLA"/>
		<reference ref_id="1117463" ref_url="https://bugzilla.suse.com/1117463" source="BUGZILLA"/>
		<reference ref_id="1117464" ref_url="https://bugzilla.suse.com/1117464" source="BUGZILLA"/>
		<reference ref_id="1117465" ref_url="https://bugzilla.suse.com/1117465" source="BUGZILLA"/>
		<reference ref_id="375175" ref_url="https://bugzilla.suse.com/375175" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9670" ref_url="https://www.suse.com/security/cve/CVE-2017-9670/" source="CVE"/>
		<reference ref_id="CVE-2018-19490" ref_url="https://www.suse.com/security/cve/CVE-2018-19490/" source="CVE"/>
		<reference ref_id="CVE-2018-19491" ref_url="https://www.suse.com/security/cve/CVE-2018-19491/" source="CVE"/>
		<reference ref_id="CVE-2018-19492" ref_url="https://www.suse.com/security/cve/CVE-2018-19492/" source="CVE"/>
		<description>
This update for gnuplot fixes the following issues:

Security issues fixed:

- CVE-2018-19492: Fixed a buffer overflow in cairotrm_options function (bsc#1117463)
- CVE-2018-19491: Fixed a buffer overflow in the PS_options function (bsc#1117464)
- CVE-2018-19490: Fixed a heap-based buffer overflow in the df_generate_ascii_array_entry function (bsc#1117465)
- CVE-2017-9670: Fixed a uninitialized stack variable vulnerability which could lead to a
  Denial of Service (bsc#1044638)

Non-security issues fixed:

- postscript output does not show any German 'umlauts' (bsc#375175)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1044638">SUSE bug 1044638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117464">SUSE bug 1117464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117465">SUSE bug 1117465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/375175">SUSE bug 375175</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9670/">CVE-2017-9670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9670">CVE-2017-9670 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19490/">CVE-2018-19490 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19490">CVE-2018-19490 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19491/">CVE-2018-19491 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19491">CVE-2018-19491 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19492/">CVE-2018-19492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19492">CVE-2018-19492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571908" comment="gnuplot-4.2.3-7.3.22 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217173" version="1" class="patch">
	<metadata>
		<title>Security update for GnuTLS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="554084" ref_url="https://bugzilla.suse.com/554084" source="BUGZILLA"/>
		<reference ref_id="659907" ref_url="https://bugzilla.suse.com/659907" source="BUGZILLA"/>
		<reference ref_id="729486" ref_url="https://bugzilla.suse.com/729486" source="BUGZILLA"/>
		<reference ref_id="739898" ref_url="https://bugzilla.suse.com/739898" source="BUGZILLA"/>
		<reference ref_id="753301" ref_url="https://bugzilla.suse.com/753301" source="BUGZILLA"/>
		<reference ref_id="754223" ref_url="https://bugzilla.suse.com/754223" source="BUGZILLA"/>
		<reference ref_id="754953" ref_url="https://bugzilla.suse.com/754953" source="BUGZILLA"/>
		<reference ref_id="760265" ref_url="https://bugzilla.suse.com/760265" source="BUGZILLA"/>
		<reference ref_id="802651" ref_url="https://bugzilla.suse.com/802651" source="BUGZILLA"/>
		<reference ref_id="821818" ref_url="https://bugzilla.suse.com/821818" source="BUGZILLA"/>
		<reference ref_id="835760" ref_url="https://bugzilla.suse.com/835760" source="BUGZILLA"/>
		<reference ref_id="865804" ref_url="https://bugzilla.suse.com/865804" source="BUGZILLA"/>
		<reference ref_id="865993" ref_url="https://bugzilla.suse.com/865993" source="BUGZILLA"/>
		<reference ref_id="880730" ref_url="https://bugzilla.suse.com/880730" source="BUGZILLA"/>
		<reference ref_id="880910" ref_url="https://bugzilla.suse.com/880910" source="BUGZILLA"/>
		<reference ref_id="919938" ref_url="https://bugzilla.suse.com/919938" source="BUGZILLA"/>
		<reference ref_id="921684" ref_url="https://bugzilla.suse.com/921684" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-5138" ref_url="https://www.suse.com/security/cve/CVE-2009-5138/" source="CVE"/>
		<reference ref_id="CVE-2011-4128" ref_url="https://www.suse.com/security/cve/CVE-2011-4128/" source="CVE"/>
		<reference ref_id="CVE-2012-0390" ref_url="https://www.suse.com/security/cve/CVE-2012-0390/" source="CVE"/>
		<reference ref_id="CVE-2013-1619" ref_url="https://www.suse.com/security/cve/CVE-2013-1619/" source="CVE"/>
		<reference ref_id="CVE-2013-2116" ref_url="https://www.suse.com/security/cve/CVE-2013-2116/" source="CVE"/>
		<reference ref_id="CVE-2014-0092" ref_url="https://www.suse.com/security/cve/CVE-2014-0092/" source="CVE"/>
		<reference ref_id="CVE-2014-3466" ref_url="https://www.suse.com/security/cve/CVE-2014-3466/" source="CVE"/>
		<reference ref_id="CVE-2014-3467" ref_url="https://www.suse.com/security/cve/CVE-2014-3467/" source="CVE"/>
		<reference ref_id="CVE-2014-3468" ref_url="https://www.suse.com/security/cve/CVE-2014-3468/" source="CVE"/>
		<reference ref_id="CVE-2014-3469" ref_url="https://www.suse.com/security/cve/CVE-2014-3469/" source="CVE"/>
		<reference ref_id="CVE-2014-8155" ref_url="https://www.suse.com/security/cve/CVE-2014-8155/" source="CVE"/>
		<reference ref_id="CVE-2015-0282" ref_url="https://www.suse.com/security/cve/CVE-2015-0282/" source="CVE"/>
		<reference ref_id="CVE-2015-0294" ref_url="https://www.suse.com/security/cve/CVE-2015-0294/" source="CVE"/>
		<description>

GnuTLS has been patched to ensure proper parsing of session ids during the 
TLS/SSL handshake. Additionally three issues inherited from libtasn1 have 
been fixed.

Further information is available at
http://www.gnutls.org/security.html#GNUTLS-SA-2014-3
&lt;http://www.gnutls.org/security.html#GNUTLS-SA-2014-3&gt;

These security issues have been fixed:

    * Possible memory corruption during connect (CVE-2014-3466)
    * Multiple boundary check issues could allow DoS (CVE-2014-3467)
    * asn1_get_bit_der() can return negative bit length (CVE-2014-3468)
    * Possible DoS by NULL pointer dereference (CVE-2014-3469)

Security Issue references:

    * CVE-2014-3466
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-03"/>
	<updated date="2014-06-03"/>
	<bugzilla href="https://bugzilla.suse.com/554084">SUSE bug 554084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/659907">SUSE bug 659907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/729486">SUSE bug 729486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/739898">SUSE bug 739898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/753301">SUSE bug 753301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754223">SUSE bug 754223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754953">SUSE bug 754953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760265">SUSE bug 760265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802651">SUSE bug 802651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821818">SUSE bug 821818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835760">SUSE bug 835760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865804">SUSE bug 865804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865993">SUSE bug 865993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880730">SUSE bug 880730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880910">SUSE bug 880910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919938">SUSE bug 919938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921684">SUSE bug 921684</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5138/">CVE-2009-5138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5138">CVE-2009-5138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4128/">CVE-2011-4128 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4128">CVE-2011-4128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0390/">CVE-2012-0390 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0390">CVE-2012-0390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1619/">CVE-2013-1619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1619">CVE-2013-1619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2116/">CVE-2013-2116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2116">CVE-2013-2116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0092/">CVE-2014-0092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0092">CVE-2014-0092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3466/">CVE-2014-3466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3466">CVE-2014-3466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3467/">CVE-2014-3467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3467">CVE-2014-3467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3468/">CVE-2014-3468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3468">CVE-2014-3468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3469/">CVE-2014-3469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3469">CVE-2014-3469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8155/">CVE-2014-8155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8155">CVE-2014-8155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0282/">CVE-2015-0282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0282">CVE-2015-0282 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0294/">CVE-2015-0294 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0294">CVE-2015-0294 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991433" comment="gnutls-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991434" comment="libgnutls-extra26-2.4.1-24.39.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991435" comment="libgnutls26-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991436" comment="libgnutls26-32bit-2.4.1-24.39.51.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991433" comment="gnutls-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991434" comment="libgnutls-extra26-2.4.1-24.39.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991435" comment="libgnutls26-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991436" comment="libgnutls26-32bit-2.4.1-24.39.51.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217174" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="925499" ref_url="https://bugzilla.suse.com/925499" source="BUGZILLA"/>
		<reference ref_id="932026" ref_url="https://bugzilla.suse.com/932026" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>


This security update of gnutls fixes the following issues:

- use minimal padding for CBC, the default random length padding
  causes problems with some servers (bsc#925499)
  * added gnutls-use_minimal_cbc_padding.patch
- use the default DH minimum for gnutls-cli instead of hardcoding 512
  * CVE-2015-4000 (Logjam) (bsc#932026)
  * added gnutls-CVE-2015-4000-logjam-use_the_default_DH_min_for_cli.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-14"/>
	<updated date="2015-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/925499">SUSE bug 925499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932026">SUSE bug 932026</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571914" comment="gnutls-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571915" comment="libgnutls26-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566606" comment="libgnutls26-32bit-2.4.1-24.39.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217175" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="924828" ref_url="https://bugzilla.suse.com/924828" source="BUGZILLA"/>
		<reference ref_id="947271" ref_url="https://bugzilla.suse.com/947271" source="BUGZILLA"/>
		<reference ref_id="957568" ref_url="https://bugzilla.suse.com/957568" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<reference ref_id="CVE-2015-8313" ref_url="https://www.suse.com/security/cve/CVE-2015-8313/" source="CVE"/>
		<description>

This update for gnutls fixes the following security issues:

- CVE-2015-8313: First byte of the padding in CBC mode is not checked (bsc#957568)
- CVE-2015-2806: Two-byte stack overflow in asn1_der_decoding (bsc#924828)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-11"/>
	<updated date="2016-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924828">SUSE bug 924828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947271">SUSE bug 947271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957568">SUSE bug 957568</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2806">CVE-2015-2806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8313/">CVE-2015-8313 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8313">CVE-2015-8313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571916" comment="gnutls-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571917" comment="libgnutls26-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566609" comment="libgnutls26-32bit-2.4.1-24.39.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217176" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1005879" ref_url="https://bugzilla.suse.com/1005879" source="BUGZILLA"/>
		<reference ref_id="1018832" ref_url="https://bugzilla.suse.com/1018832" source="BUGZILLA"/>
		<reference ref_id="961491" ref_url="https://bugzilla.suse.com/961491" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2017-5335" ref_url="https://www.suse.com/security/cve/CVE-2017-5335/" source="CVE"/>
		<reference ref_id="CVE-2017-5336" ref_url="https://www.suse.com/security/cve/CVE-2017-5336/" source="CVE"/>
		<reference ref_id="CVE-2017-5337" ref_url="https://www.suse.com/security/cve/CVE-2017-5337/" source="CVE"/>
		<description>

This update for gnutls fixes the following issues:

- Malformed asn1 definitions could cause a segmentation fault in the asn1 definition parser (bsc#961491).
- CVE-2016-8610: Remote denial of service in SSL alert handling (bsc#1005879).
- CVE-2017-5335: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).
- CVE-2017-5336: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).
- CVE-2017-5337: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-27"/>
	<updated date="2017-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005879">SUSE bug 1005879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018832">SUSE bug 1018832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961491">SUSE bug 961491</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8610">CVE-2016-8610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5335/">CVE-2017-5335 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5335">CVE-2017-5335 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5336/">CVE-2017-5336 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5336">CVE-2017-5336 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5337/">CVE-2017-5337 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5337">CVE-2017-5337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571918" comment="gnutls-2.4.1-24.39.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571919" comment="libgnutls26-2.4.1-24.39.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571920" comment="libgnutls26-32bit-2.4.1-24.39.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217177" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1034173" ref_url="https://bugzilla.suse.com/1034173" source="BUGZILLA"/>
		<reference ref_id="1038337" ref_url="https://bugzilla.suse.com/1038337" source="BUGZILLA"/>
		<reference ref_id="1040621" ref_url="https://bugzilla.suse.com/1040621" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6891" ref_url="https://www.suse.com/security/cve/CVE-2017-6891/" source="CVE"/>
		<reference ref_id="CVE-2017-7869" ref_url="https://www.suse.com/security/cve/CVE-2017-7869/" source="CVE"/>
		<description>
This update for gnutls fixes the following issues:

- GNUTLS-SA-2017-3 / CVE-2017-7869: An out-of-bounds write in OpenPGP certificate decoding was fixed (bsc#1034173)
- CVE-2017-6891: A potential stack buffer overflow in the bundled libtasn1 was fixed (bsc#1040621)
- An address read of 4 bytes past the end of buffer in OpenPGP certificate parsing was fixed (bsc#1038337)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-15"/>
	<updated date="2017-07-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034173">SUSE bug 1034173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038337">SUSE bug 1038337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040621">SUSE bug 1040621</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6891/">CVE-2017-6891 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6891">CVE-2017-6891 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7869/">CVE-2017-7869 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7869">CVE-2017-7869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571921" comment="gnutls-2.4.1-24.39.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571922" comment="libgnutls26-2.4.1-24.39.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571923" comment="libgnutls26-32bit-2.4.1-24.39.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217178" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1047002" ref_url="https://bugzilla.suse.com/1047002" source="BUGZILLA"/>
		<reference ref_id="1105460" ref_url="https://bugzilla.suse.com/1105460" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10790" ref_url="https://www.suse.com/security/cve/CVE-2017-10790/" source="CVE"/>
		<reference ref_id="CVE-2018-10846" ref_url="https://www.suse.com/security/cve/CVE-2018-10846/" source="CVE"/>
		<description>
This update for gnutls fixes the following issues:

Security issues fixed:

- CVE-2018-10846: Improve mitigations against Lucky 13 class of attacks (PRIME + PROBE) (bsc#1105460).
- CVE-2017-10790: Fixed a denial of service in the _asn1_check_identifier() function (bsc#1047002).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-21"/>
	<updated date="2019-05-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047002">SUSE bug 1047002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105460">SUSE bug 1105460</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10790/">CVE-2017-10790 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10790">CVE-2017-10790 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10846/">CVE-2018-10846 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10846">CVE-2018-10846 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571924" comment="gnutls-2.4.1-24.39.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571925" comment="libgnutls26-2.4.1-24.39.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571926" comment="libgnutls26-32bit-2.4.1-24.39.76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217179" version="1" class="patch">
	<metadata>
		<title>Security update for GPG2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="625947" ref_url="https://bugzilla.suse.com/625947" source="BUGZILLA"/>
		<reference ref_id="718937" ref_url="https://bugzilla.suse.com/718937" source="BUGZILLA"/>
		<reference ref_id="741352" ref_url="https://bugzilla.suse.com/741352" source="BUGZILLA"/>
		<reference ref_id="778723" ref_url="https://bugzilla.suse.com/778723" source="BUGZILLA"/>
		<reference ref_id="780943" ref_url="https://bugzilla.suse.com/780943" source="BUGZILLA"/>
		<reference ref_id="798465" ref_url="https://bugzilla.suse.com/798465" source="BUGZILLA"/>
		<reference ref_id="808958" ref_url="https://bugzilla.suse.com/808958" source="BUGZILLA"/>
		<reference ref_id="840510" ref_url="https://bugzilla.suse.com/840510" source="BUGZILLA"/>
		<reference ref_id="844175" ref_url="https://bugzilla.suse.com/844175" source="BUGZILLA"/>
		<reference ref_id="884130" ref_url="https://bugzilla.suse.com/884130" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2547" ref_url="https://www.suse.com/security/cve/CVE-2010-2547/" source="CVE"/>
		<reference ref_id="CVE-2012-6085" ref_url="https://www.suse.com/security/cve/CVE-2012-6085/" source="CVE"/>
		<reference ref_id="CVE-2013-4351" ref_url="https://www.suse.com/security/cve/CVE-2013-4351/" source="CVE"/>
		<reference ref_id="CVE-2013-4402" ref_url="https://www.suse.com/security/cve/CVE-2013-4402/" source="CVE"/>
		<reference ref_id="CVE-2014-4617" ref_url="https://www.suse.com/security/cve/CVE-2014-4617/" source="CVE"/>
		<description>

GPG2 has been updated to fix a possible denial of service.

This security issue has been fixed:

    * Denial of service through infinite loop with garbled compressed data
      packets (CVE-2014-4617)

Security Issues:

    * CVE-2014-4617
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-26"/>
	<updated date="2014-06-26"/>
	<bugzilla href="https://bugzilla.suse.com/625947">SUSE bug 625947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/718937">SUSE bug 718937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/741352">SUSE bug 741352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778723">SUSE bug 778723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780943">SUSE bug 780943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798465">SUSE bug 798465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808958">SUSE bug 808958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840510">SUSE bug 840510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844175">SUSE bug 844175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884130">SUSE bug 884130</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2547/">CVE-2010-2547 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2547">CVE-2010-2547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6085/">CVE-2012-6085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6085">CVE-2012-6085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4351/">CVE-2013-4351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4351">CVE-2013-4351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4402/">CVE-2013-4402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4402">CVE-2013-4402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4617/">CVE-2014-4617 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4617">CVE-2014-4617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991437" comment="gpg2-2.0.9-25.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991438" comment="gpg2-lang-2.0.9-25.33.39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991437" comment="gpg2-2.0.9-25.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991438" comment="gpg2-lang-2.0.9-25.33.39.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217180" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="918089" ref_url="https://bugzilla.suse.com/918089" source="BUGZILLA"/>
		<reference ref_id="918090" ref_url="https://bugzilla.suse.com/918090" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1606" ref_url="https://www.suse.com/security/cve/CVE-2015-1606/" source="CVE"/>
		<reference ref_id="CVE-2015-1607" ref_url="https://www.suse.com/security/cve/CVE-2015-1607/" source="CVE"/>
		<description>

This update for gpg2 fixes the following issues: 

- Fix cve-2015-1606 (bsc#918089)
  * Invalid memory read using a garbled keyring
  * 0001-Gpg-prevent-an-invalid-memory-read-using-a-garbled-k.patch
- Fix cve-2015-1607 (bsc#918090)
  * Memcpy with overlapping ranges
  * 0001-Use-inline-functions-to-convert-buffer-data-to-scala.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-02"/>
	<updated date="2015-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/918089">SUSE bug 918089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918090">SUSE bug 918090</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1606/">CVE-2015-1606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1606">CVE-2015-1606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1607/">CVE-2015-1607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1607">CVE-2015-1607 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571927" comment="gpg2-2.0.9-25.33.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571928" comment="gpg2-lang-2.0.9-25.33.41.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217181" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1096745" ref_url="https://bugzilla.suse.com/1096745" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12020" ref_url="https://www.suse.com/security/cve/CVE-2018-12020/" source="CVE"/>
		<description>
This update for gpg2 fixes the following issues:

- CVE-2018-12020: GnuPG mishandled the original filename during decryption and
  verification actions, which allowed remote attackers to spoof the output that
  GnuPG sends on file descriptor 2 to other programs that use the '--status-fd 2'
  option (bsc#1096745)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-15"/>
	<updated date="2018-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096745">SUSE bug 1096745</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12020/">CVE-2018-12020 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12020">CVE-2018-12020 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571929" comment="gpg2-2.0.9-25.33.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571930" comment="gpg2-lang-2.0.9-25.33.42.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217182" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1124847" ref_url="https://bugzilla.suse.com/1124847" source="BUGZILLA"/>
		<reference ref_id="1141093" ref_url="https://bugzilla.suse.com/1141093" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13050" ref_url="https://www.suse.com/security/cve/CVE-2019-13050/" source="CVE"/>
		<description>
This update for gpg2 fixes the following issues:

Security issue fixed:

- CVE-2019-13050: Fixed denial-of-service attacks via big keys. (bsc#1141093)

Non-security issue fixed:

- Allow coredumps in X11 desktop sessions (bsc#1124847).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-26"/>
	<updated date="2019-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124847">SUSE bug 1124847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141093">SUSE bug 1141093</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13050/">CVE-2019-13050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13050">CVE-2019-13050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571931" comment="gpg2-2.0.9-25.33.42.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571932" comment="gpg2-lang-2.0.9-25.33.42.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217183" version="1" class="patch">
	<metadata>
		<title>Security update for gpgme</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="890123" ref_url="https://bugzilla.suse.com/890123" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3564" ref_url="https://www.suse.com/security/cve/CVE-2014-3564/" source="CVE"/>
		<description>

This gpgme update fixes the following security issue:

    * bnc#890123: Fix possible overflow in gpgsm and uiserver engines
      (CVE-2014-3564)

Security Issues:

    * CVE-2014-3564
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3564&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-22"/>
	<updated date="2014-08-22"/>
	<bugzilla href="https://bugzilla.suse.com/890123">SUSE bug 890123</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3564/">CVE-2014-3564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3564">CVE-2014-3564 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571933" comment="gpgme-1.1.6-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571934" comment="libgpgme11-1.1.6-25.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217184" version="1" class="patch">
	<metadata>
		<title>Security update for graphviz (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1093447" ref_url="https://bugzilla.suse.com/1093447" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10196" ref_url="https://www.suse.com/security/cve/CVE-2018-10196/" source="CVE"/>
		<description>
This update for graphviz fixes the following issues:

- CVE-2018-10196: Fixed a null dereference in rebuild_vlis (bsc#1093447).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-30"/>
	<updated date="2020-10-30"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1093447">SUSE bug 1093447</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10196/">CVE-2018-10196 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10196">CVE-2018-10196 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571935" comment="graphviz-2.20.2-8.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571936" comment="graphviz-gd-2.20.2-8.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571937" comment="graphviz-gnome-2.20.2-8.3.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217185" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1024076" ref_url="https://bugzilla.suse.com/1024076" source="BUGZILLA"/>
		<reference ref_id="1024079" ref_url="https://bugzilla.suse.com/1024079" source="BUGZILLA"/>
		<reference ref_id="1133375" ref_url="https://bugzilla.suse.com/1133375" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5837" ref_url="https://www.suse.com/security/cve/CVE-2017-5837/" source="CVE"/>
		<reference ref_id="CVE-2017-5844" ref_url="https://www.suse.com/security/cve/CVE-2017-5844/" source="CVE"/>
		<reference ref_id="CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928/" source="CVE"/>
		<description>
This update for gstreamer-0_10-plugins-base fixes the following issues:

Security issues fixed:

- CVE-2017-5837: Fixed a floating point exception in gst_riff_create_audio_caps (bsc#1024076).
- CVE-2017-5844: Fixed a floating point exception in gst_riff_create_audio_caps (bsc#1024079).
- CVE-2019-9928: Fixed a heap-based overflow in the rtsp connection parser (bsc#1133375).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-19"/>
	<updated date="2019-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1024076">SUSE bug 1024076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024079">SUSE bug 1024079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133375">SUSE bug 1133375</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5837/">CVE-2017-5837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5837">CVE-2017-5837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5844/">CVE-2017-5844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5844">CVE-2017-5844 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9928">CVE-2019-9928 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571938" comment="gstreamer-0_10-plugins-base-0.10.25-1.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571939" comment="gstreamer-0_10-plugins-base-32bit-0.10.25-1.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571940" comment="gstreamer-0_10-plugins-base-doc-0.10.25-1.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571941" comment="gstreamer-0_10-plugins-base-lang-0.10.25-1.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571942" comment="libgstapp-0_10-0-0.10.25-1.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571943" comment="libgstapp-0_10-0-32bit-0.10.25-1.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571944" comment="libgstinterfaces-0_10-0-0.10.25-1.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571945" comment="libgstinterfaces-0_10-0-32bit-0.10.25-1.3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217186" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="603034" ref_url="https://bugzilla.suse.com/603034" source="BUGZILLA"/>
		<reference ref_id="615300" ref_url="https://bugzilla.suse.com/615300" source="BUGZILLA"/>
		<reference ref_id="636530" ref_url="https://bugzilla.suse.com/636530" source="BUGZILLA"/>
		<reference ref_id="637693" ref_url="https://bugzilla.suse.com/637693" source="BUGZILLA"/>
		<reference ref_id="687562" ref_url="https://bugzilla.suse.com/687562" source="BUGZILLA"/>
		<reference ref_id="702028" ref_url="https://bugzilla.suse.com/702028" source="BUGZILLA"/>
		<reference ref_id="762735" ref_url="https://bugzilla.suse.com/762735" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2485" ref_url="https://www.suse.com/security/cve/CVE-2011-2485/" source="CVE"/>
		<reference ref_id="CVE-2012-2370" ref_url="https://www.suse.com/security/cve/CVE-2012-2370/" source="CVE"/>
		<description>

The following issue has been fixed:

    * Specially crafted GIF and XBM files could have crashed gtk2
      (CVE-2012-2370,CVE-2011-2485)

Security Issue references:

    * CVE-2012-2370
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2370&gt;
    * CVE-2011-2485
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2485&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-06-05"/>
	<updated date="2012-06-05"/>
	<bugzilla href="https://bugzilla.suse.com/603034">SUSE bug 603034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/615300">SUSE bug 615300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/636530">SUSE bug 636530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/637693">SUSE bug 637693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/687562">SUSE bug 687562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/702028">SUSE bug 702028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762735">SUSE bug 762735</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2485/">CVE-2011-2485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2485">CVE-2011-2485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2370/">CVE-2012-2370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2370">CVE-2012-2370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991439" comment="gtk2-2.18.9-0.20.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991440" comment="gtk2-32bit-2.18.9-0.20.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991441" comment="gtk2-doc-2.18.9-0.20.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991442" comment="gtk2-lang-2.18.9-0.20.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217187" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="942801" ref_url="https://bugzilla.suse.com/942801" source="BUGZILLA"/>
		<reference ref_id="948791" ref_url="https://bugzilla.suse.com/948791" source="BUGZILLA"/>
		<reference ref_id="958963" ref_url="https://bugzilla.suse.com/958963" source="BUGZILLA"/>
		<reference ref_id="960155" ref_url="https://bugzilla.suse.com/960155" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-7552" ref_url="https://www.suse.com/security/cve/CVE-2015-7552/" source="CVE"/>
		<reference ref_id="CVE-2015-7674" ref_url="https://www.suse.com/security/cve/CVE-2015-7674/" source="CVE"/>
		<description>
This update for gtk2 fixes the following security issues:

- CVE-2015-4491: Check for overflow before allocating memory when scaling (bsc#942801)
- CVE-2015-7674: overflow when scaling GIF files (bsc#948791)
- CVE-2015-7552: various overflows, including heap overflow in flipping bmp files (bsc#958963)

The following non-security issue was fixed:

- bsc#960155: fix a possible divide by zero		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-26"/>
	<updated date="2016-02-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/942801">SUSE bug 942801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948791">SUSE bug 948791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958963">SUSE bug 958963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960155">SUSE bug 960155</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4491">CVE-2015-4491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7552/">CVE-2015-7552 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7552">CVE-2015-7552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7674/">CVE-2015-7674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7674">CVE-2015-7674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571951" comment="gtk2-2.18.9-0.20.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571952" comment="gtk2-32bit-2.18.9-0.20.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571953" comment="gtk2-doc-2.18.9-0.20.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571954" comment="gtk2-lang-2.18.9-0.20.21.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217188" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="966682" ref_url="https://bugzilla.suse.com/966682" source="BUGZILLA"/>
		<reference ref_id="988745" ref_url="https://bugzilla.suse.com/988745" source="BUGZILLA"/>
		<reference ref_id="991450" ref_url="https://bugzilla.suse.com/991450" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447/" source="CVE"/>
		<reference ref_id="CVE-2016-6352" ref_url="https://www.suse.com/security/cve/CVE-2016-6352/" source="CVE"/>
		<description>

This update for gtk2 fixes the following issues:

- CVE-2016-6352: Some crashes were fixed, including a out of bounds
  write in the OneLine32() function that could be used by attackers to
  crash GTK/GDK programs.
- CVE-2013-7447: Avoid overflow when allocating a cairo pixbuf (bsc#966682).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-14"/>
	<updated date="2016-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/966682">SUSE bug 966682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988745">SUSE bug 988745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991450">SUSE bug 991450</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7447">CVE-2013-7447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6352/">CVE-2016-6352 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6352">CVE-2016-6352 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571955" comment="gtk2-2.18.9-0.20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571956" comment="gtk2-32bit-2.18.9-0.20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571957" comment="gtk2-doc-2.18.9-0.20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571958" comment="gtk2-lang-2.18.9-0.20.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217189" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1027024" ref_url="https://bugzilla.suse.com/1027024" source="BUGZILLA"/>
		<reference ref_id="1027025" ref_url="https://bugzilla.suse.com/1027025" source="BUGZILLA"/>
		<reference ref_id="1027026" ref_url="https://bugzilla.suse.com/1027026" source="BUGZILLA"/>
		<reference ref_id="1053417" ref_url="https://bugzilla.suse.com/1053417" source="BUGZILLA"/>
		<reference ref_id="1074462" ref_url="https://bugzilla.suse.com/1074462" source="BUGZILLA"/>
		<reference ref_id="726376" ref_url="https://bugzilla.suse.com/726376" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000422" ref_url="https://www.suse.com/security/cve/CVE-2017-1000422/" source="CVE"/>
		<reference ref_id="CVE-2017-6312" ref_url="https://www.suse.com/security/cve/CVE-2017-6312/" source="CVE"/>
		<reference ref_id="CVE-2017-6313" ref_url="https://www.suse.com/security/cve/CVE-2017-6313/" source="CVE"/>
		<reference ref_id="CVE-2017-6314" ref_url="https://www.suse.com/security/cve/CVE-2017-6314/" source="CVE"/>
		<description>
This update for gtk2 fixes the following issues:

This security issue was fixed:

- Add checks for multiplications at several locations to avoid mishandling
  memory. This allowed attackers to cause DoS or potentially RCE (bsc#1053417).
- CVE-2017-6312: Integer overflow in io-ico.c in gdk-pixbuf allowed context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted image entry offset in an ICO file, which triggers an out-of-bounds read, related to compiler optimizations (boo#1027026).
- Protect against access to negative array indexes (BGO#778584).
- CVE-2017-6314: The make_available_at_least function in io-tiff.c in gdk-pixbuf allowed context-dependent attackers to cause a denial of service (infinite loop) via a large TIFF file (boo#1027025).
- CVE-2017-6313: Integer underflow in the load_resources function in io-icns.c in gdk-pixbuf allowed context-dependent attackers to cause a denial of service (out-of-bounds read and program crash) via a crafted image entry size in an ICO file (boo#1027024).
- CVE-2017-1000422: Gnome gdk-pixbuf older was vulnerable to several integer overflows in the gif_get_lzw function resulting in memory corruption and potential code execution (boo#1074462).

This non-security issue was fixed:

- Prevent endless loop when listing a directory that may not be listed (bnc#726376).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-14"/>
	<updated date="2018-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027024">SUSE bug 1027024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027025">SUSE bug 1027025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027026">SUSE bug 1027026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053417">SUSE bug 1053417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074462">SUSE bug 1074462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/726376">SUSE bug 726376</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000422/">CVE-2017-1000422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000422">CVE-2017-1000422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6312/">CVE-2017-6312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6312">CVE-2017-6312 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6313/">CVE-2017-6313 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6313">CVE-2017-6313 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6314/">CVE-2017-6314 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6314">CVE-2017-6314 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571959" comment="gtk2-2.18.9-0.20.27.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571960" comment="gtk2-32bit-2.18.9-0.20.27.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571961" comment="gtk2-doc-2.18.9-0.20.27.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571962" comment="gtk2-lang-2.18.9-0.20.27.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217190" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1048289" ref_url="https://bugzilla.suse.com/1048289" source="BUGZILLA"/>
		<reference ref_id="1048544" ref_url="https://bugzilla.suse.com/1048544" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2862" ref_url="https://www.suse.com/security/cve/CVE-2017-2862/" source="CVE"/>
		<reference ref_id="CVE-2017-2870" ref_url="https://www.suse.com/security/cve/CVE-2017-2870/" source="CVE"/>
		<description>
This update for gtk2 fixes the following security issues:

- CVE-2017-2862: Prevent heap overflow in the
  gdk_pixbuf__jpeg_image_load_increment function. A specially crafted jpeg file
  could have caused a heap overflow resulting in remote code execution
  (bsc#1048289)
- CVE-2017-2870: Prevent integer overflow in the tiff_image_parse
  functionality. A specially crafted tiff file could have caused a heap-overflow
  resulting in remote code execution (bsc#1048544)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1048289">SUSE bug 1048289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048544">SUSE bug 1048544</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2862/">CVE-2017-2862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2862">CVE-2017-2862 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-2870/">CVE-2017-2870 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2870">CVE-2017-2870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571963" comment="gtk2-2.18.9-0.20.27.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571964" comment="gtk2-32bit-2.18.9-0.20.27.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571965" comment="gtk2-doc-2.18.9-0.20.27.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571966" comment="gtk2-lang-2.18.9-0.20.27.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217191" version="1" class="patch">
	<metadata>
		<title>Security update for guile (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1004221" ref_url="https://bugzilla.suse.com/1004221" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8605" ref_url="https://www.suse.com/security/cve/CVE-2016-8605/" source="CVE"/>
		<description>

This update for guile fixes the following issues:

- CVE-2016-8605: Fixed thread-unsafe umask modification (bsc#1004221).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-06"/>
	<updated date="2017-02-06"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1004221">SUSE bug 1004221</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8605/">CVE-2016-8605 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8605">CVE-2016-8605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571967" comment="guile-1.8.5-24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217192" version="1" class="patch">
	<metadata>
		<title>Security update for okular</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="634743" ref_url="https://bugzilla.suse.com/634743" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2575" ref_url="https://www.suse.com/security/cve/CVE-2010-2575/" source="CVE"/>
		<description>

This update fixes a heap-based overflow in okular. The RLE decompression in 
the TranscribePalmImageToJPEG() function can be exploited to execute 
arbitrary code with user privileges by providing a crafted PDF file. 
(CVE-2010-2575)

Security Issue reference:

    * CVE-2010-2575
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2575&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-09-02"/>
	<updated date="2010-09-02"/>
	<bugzilla href="https://bugzilla.suse.com/634743">SUSE bug 634743</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2575/">CVE-2010-2575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2575">CVE-2010-2575 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991443" comment="gwenview-4.3.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991444" comment="kcolorchooser-4.3.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991445" comment="kruler-4.3.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991446" comment="ksnapshot-4.3.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991447" comment="libkexiv2-7-4.3.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991448" comment="libkipi6-4.3.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991449" comment="okular-4.3.5-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217193" version="1" class="patch">
	<metadata>
		<title>Security update for hplip</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="336658" ref_url="https://bugzilla.suse.com/336658" source="BUGZILLA"/>
		<reference ref_id="59233" ref_url="https://bugzilla.suse.com/59233" source="BUGZILLA"/>
		<reference ref_id="704608" ref_url="https://bugzilla.suse.com/704608" source="BUGZILLA"/>
		<reference ref_id="808355" ref_url="https://bugzilla.suse.com/808355" source="BUGZILLA"/>
		<reference ref_id="835827" ref_url="https://bugzilla.suse.com/835827" source="BUGZILLA"/>
		<reference ref_id="836937" ref_url="https://bugzilla.suse.com/836937" source="BUGZILLA"/>
		<reference ref_id="852368" ref_url="https://bugzilla.suse.com/852368" source="BUGZILLA"/>
		<reference ref_id="CVE-2004-0801" ref_url="https://www.suse.com/security/cve/CVE-2004-0801/" source="CVE"/>
		<reference ref_id="CVE-2010-4267" ref_url="https://www.suse.com/security/cve/CVE-2010-4267/" source="CVE"/>
		<reference ref_id="CVE-2011-2722" ref_url="https://www.suse.com/security/cve/CVE-2011-2722/" source="CVE"/>
		<reference ref_id="CVE-2013-0200" ref_url="https://www.suse.com/security/cve/CVE-2013-0200/" source="CVE"/>
		<reference ref_id="CVE-2013-4325" ref_url="https://www.suse.com/security/cve/CVE-2013-4325/" source="CVE"/>
		<reference ref_id="CVE-2013-6402" ref_url="https://www.suse.com/security/cve/CVE-2013-6402/" source="CVE"/>
		<description>

hplip was updated to fix three security issues:

    * 

      CVE-2013-0200: Some local file overwrite problems via predictable
      /tmp filenames were fixed.

    * 

      CVE-2013-4325: hplip used an insecure polkit DBUS API (polkit-process
      subject race condition) which could lead to local privilege
      escalation.

    * 

      CVE-2013-6402: hplip uses arbitrary file creation/overwrite (via
      hardcoded file name /tmp/hp-pkservice.log)

Security Issue references:

    * CVE-2013-4325
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325&gt;
    * CVE-2013-0200
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200&gt;
    * CVE-2013-6402
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-17"/>
	<updated date="2014-01-17"/>
	<bugzilla href="https://bugzilla.suse.com/336658">SUSE bug 336658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/59233">SUSE bug 59233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704608">SUSE bug 704608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808355">SUSE bug 808355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835827">SUSE bug 835827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836937">SUSE bug 836937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2004-0801/">CVE-2004-0801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-0801">CVE-2004-0801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4267/">CVE-2010-4267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4267">CVE-2010-4267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2722/">CVE-2011-2722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2722">CVE-2011-2722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0200/">CVE-2013-0200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0200">CVE-2013-0200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4325/">CVE-2013-4325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4325">CVE-2013-4325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6402/">CVE-2013-6402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6402">CVE-2013-6402 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991450" comment="hplip-3.11.10-0.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991451" comment="hplip-hpijs-3.11.10-0.6.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217194" version="1" class="patch">
	<metadata>
		<title>Security update for hunspell (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1151867" ref_url="https://bugzilla.suse.com/1151867" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16707" ref_url="https://www.suse.com/security/cve/CVE-2019-16707/" source="CVE"/>
		<description>
This update for hunspell fixes the following issues:

- CVE-2019-16707: Fixed an invalid read in SuggestMgr:leftcommonsubstring (bsc#1151867).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-04"/>
	<updated date="2020-11-04"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1151867">SUSE bug 1151867</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16707/">CVE-2019-16707 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16707">CVE-2019-16707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571977" comment="hunspell-1.2.7-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571978" comment="hunspell-32bit-1.2.7-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571979" comment="hunspell-tools-1.2.7-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217195" version="1" class="patch">
	<metadata>
		<title>Recommended update for ibutils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="811660" ref_url="https://bugzilla.suse.com/811660" source="BUGZILLA"/>
		<reference ref_id="832643" ref_url="https://bugzilla.suse.com/832643" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1894" ref_url="https://www.suse.com/security/cve/CVE-2013-1894/" source="CVE"/>
		<description>

This update for InfiniBand Diagnostic Tools (ibutils) fixes a syntax error 
that affected ibdiagnet, ibdiagpath and ibdiagui utilities.

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-14"/>
	<updated date="2013-08-14"/>
	<bugzilla href="https://bugzilla.suse.com/811660">SUSE bug 811660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/832643">SUSE bug 832643</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1894/">CVE-2013-1894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1894">CVE-2013-1894 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991452" comment="ibutils-1.5.4-0.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991453" comment="ibutils-32bit-1.5.4-0.7.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217196" version="1" class="patch">
	<metadata>
		<title>Security update for icu</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="657910" ref_url="https://bugzilla.suse.com/657910" source="BUGZILLA"/>
		<reference ref_id="736146" ref_url="https://bugzilla.suse.com/736146" source="BUGZILLA"/>
		<reference ref_id="917129" ref_url="https://bugzilla.suse.com/917129" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-4409" ref_url="https://www.suse.com/security/cve/CVE-2010-4409/" source="CVE"/>
		<reference ref_id="CVE-2011-4599" ref_url="https://www.suse.com/security/cve/CVE-2011-4599/" source="CVE"/>
		<reference ref_id="CVE-2014-9654" ref_url="https://www.suse.com/security/cve/CVE-2014-9654/" source="CVE"/>
		<description>

The following bugs have been fixed:

    * Specially crafted strings could cause a buffer overflow in icu
      (CVE-2011-4599).
    * An integer overflow in the getSymbol() function could crash
      applications using icu (CVE-2010-4409)

Security Issue references:

    * CVE-2011-4599
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4599&gt;
    * CVE-2010-4409
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4409&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-01-16"/>
	<updated date="2012-01-16"/>
	<bugzilla href="https://bugzilla.suse.com/657910">SUSE bug 657910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/736146">SUSE bug 736146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917129">SUSE bug 917129</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4409/">CVE-2010-4409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4409">CVE-2010-4409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4599/">CVE-2011-4599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4599">CVE-2011-4599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9654/">CVE-2014-9654 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9654">CVE-2014-9654 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991454" comment="libicu-4.0-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571981" comment="libicu-32bit-4.0-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991455" comment="libicu-doc-4.0-7.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217197" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1012224" ref_url="https://bugzilla.suse.com/1012224" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9911" ref_url="https://www.suse.com/security/cve/CVE-2014-9911/" source="CVE"/>
		<description>

This update for icu fixes the following security issues:

- Passing a locale string longer than 255 characters to uloc_getDisplayName()
  could have caused a buffer overflow resulting in denial of service or
  possible code execution (bsc#1012224, CVE-2014-9911).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-23"/>
	<updated date="2017-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1012224">SUSE bug 1012224</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9911/">CVE-2014-9911 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9911">CVE-2014-9911 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571983" comment="libicu-4.0-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564562" comment="libicu-32bit-4.0-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571984" comment="libicu-doc-4.0-43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217198" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1023033" ref_url="https://bugzilla.suse.com/1023033" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9911" ref_url="https://www.suse.com/security/cve/CVE-2014-9911/" source="CVE"/>
		<description>

This update for icu fixes the following issues:

- CVE-2014-9911: The fix was updated to not crash (NULL ptr deref) when resPath is NULL (bsc#1023033). 
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023033">SUSE bug 1023033</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9911/">CVE-2014-9911 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9911">CVE-2014-9911 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571985" comment="libicu-4.0-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564566" comment="libicu-32bit-4.0-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571986" comment="libicu-doc-4.0-46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217199" version="1" class="patch">
	<metadata>
		<title>Recommended update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1037416" ref_url="https://bugzilla.suse.com/1037416" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9911" ref_url="https://www.suse.com/security/cve/CVE-2014-9911/" source="CVE"/>
		<description>

This update for icu fixes the following issue:

- Fix international date/time format output (a regression caused by the fix for CVE-2014-9911) (bsc#1037416).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-05"/>
	<updated date="2018-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1037416">SUSE bug 1037416</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9911/">CVE-2014-9911 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9911">CVE-2014-9911 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009593714" comment="libicu-4.0-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593715" comment="libicu-32bit-4.0-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593716" comment="libicu-doc-4.0-47.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217200" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1034674" ref_url="https://bugzilla.suse.com/1034674" source="BUGZILLA"/>
		<reference ref_id="1034678" ref_url="https://bugzilla.suse.com/1034678" source="BUGZILLA"/>
		<reference ref_id="1067203" ref_url="https://bugzilla.suse.com/1067203" source="BUGZILLA"/>
		<reference ref_id="1072193" ref_url="https://bugzilla.suse.com/1072193" source="BUGZILLA"/>
		<reference ref_id="1077999" ref_url="https://bugzilla.suse.com/1077999" source="BUGZILLA"/>
		<reference ref_id="990636" ref_url="https://bugzilla.suse.com/990636" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6293" ref_url="https://www.suse.com/security/cve/CVE-2016-6293/" source="CVE"/>
		<reference ref_id="CVE-2017-14952" ref_url="https://www.suse.com/security/cve/CVE-2017-14952/" source="CVE"/>
		<reference ref_id="CVE-2017-15422" ref_url="https://www.suse.com/security/cve/CVE-2017-15422/" source="CVE"/>
		<reference ref_id="CVE-2017-17484" ref_url="https://www.suse.com/security/cve/CVE-2017-17484/" source="CVE"/>
		<reference ref_id="CVE-2017-7867" ref_url="https://www.suse.com/security/cve/CVE-2017-7867/" source="CVE"/>
		<reference ref_id="CVE-2017-7868" ref_url="https://www.suse.com/security/cve/CVE-2017-7868/" source="CVE"/>
		<description>
This update for icu fixes the following issues:

- CVE-2016-6293: The uloc_acceptLanguageFromHTTP function in common/uloc.cpp did not ensure that there is a '\0' character at the end of a certain temporary array, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long httpAcceptLanguage argument. (bsc#990636)
- CVE-2017-7868: ICU had an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_moveIndex32* function. (bsc#1034674)
- CVE-2017-7867: ICU had an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_setNativeIndex* function. (bsc#1034678)
- CVE-2017-14952: Double free in i18n/zonemeta.cpp allowed remote attackers to execute arbitrary code via a crafted string, aka a 'redundant UVector entry clean up function call' issue. (bsc#1067203)
- CVE-2017-17484:The ucnv_UTF8FromUTF8 function in ucnv_u8.cpp mishandled ucnv_convertEx calls for UTF-8 to UTF-8 conversion, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted string, as demonstrated by ZNC. (bsc#1072193)
- CVE-2017-15422: An integer overflow in persian calendar calculation was fixed, which could show wrong years. (bsc#1077999)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-08"/>
	<updated date="2018-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1034674">SUSE bug 1034674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034678">SUSE bug 1034678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067203">SUSE bug 1067203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072193">SUSE bug 1072193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077999">SUSE bug 1077999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990636">SUSE bug 990636</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6293/">CVE-2016-6293 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6293">CVE-2016-6293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14952/">CVE-2017-14952 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14952">CVE-2017-14952 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15422/">CVE-2017-15422 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15422">CVE-2017-15422 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17484/">CVE-2017-17484 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17484">CVE-2017-17484 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7867/">CVE-2017-7867 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7867">CVE-2017-7867 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7868/">CVE-2017-7868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7868">CVE-2017-7868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571987" comment="libicu-4.0-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564570" comment="libicu-32bit-4.0-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571988" comment="libicu-doc-4.0-47.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217201" version="1" class="patch">
	<metadata>
		<title>Security update for inn</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="776967" ref_url="https://bugzilla.suse.com/776967" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3523" ref_url="https://www.suse.com/security/cve/CVE-2012-3523/" source="CVE"/>
		<description>

A STARTTLS injection issue has been fixed in inn. CVE-2012-3523 has been 
assigned to this issue.

Security Issue reference:

    * CVE-2012-3523
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3523&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-09-05"/>
	<updated date="2012-09-05"/>
	<bugzilla href="https://bugzilla.suse.com/776967">SUSE bug 776967</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3523/">CVE-2012-3523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3523">CVE-2012-3523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571989" comment="inn-2.4.2-170.21.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217202" version="1" class="patch">
	<metadata>
		<title>Security update for inn (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1154302" ref_url="https://bugzilla.suse.com/1154302" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3692" ref_url="https://www.suse.com/security/cve/CVE-2019-3692/" source="CVE"/>
		<description>
This update for inn fixes the following issues:

- CVE-2019-3692: Fixed a local privilege escalation from any user to 'news' (bsc#1154302).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-20"/>
	<updated date="2020-02-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154302">SUSE bug 1154302</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3692/">CVE-2019-3692 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3692">CVE-2019-3692 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571990" comment="inn-2.4.2-170.21.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217203" version="1" class="patch">
	<metadata>
		<title>Security update for inn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1182321" ref_url="https://bugzilla.suse.com/1182321" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31998" ref_url="https://www.suse.com/security/cve/CVE-2021-31998/" source="CVE"/>
		<description>
This update for inn fixes the following issues:

- CVE-2021-31998: Fixed locale privialge escalation during the update of inn (bsc#1182321).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182321">SUSE bug 1182321</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31998/">CVE-2021-31998 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31998">CVE-2021-31998 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571991" comment="inn-2.4.2-170.21.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217204" version="1" class="patch">
	<metadata>
		<title>Security update for inst-source-utils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="604730" ref_url="https://bugzilla.suse.com/604730" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0427" ref_url="https://www.suse.com/security/cve/CVE-2012-0427/" source="CVE"/>
		<description>

Multiple code execution flaws have been fixed that could have been 
exploited via specially crafted file names / directory path names.

Security Issue reference:

    * CVE-2012-0427
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0427&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-10-04"/>
	<updated date="2012-10-04"/>
	<bugzilla href="https://bugzilla.suse.com/604730">SUSE bug 604730</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0427/">CVE-2012-0427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0427">CVE-2012-0427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571992" comment="inst-source-utils-2012.10.4-0.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217205" version="1" class="patch">
	<metadata>
		<title>Security update for ipsec-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="931989" ref_url="https://bugzilla.suse.com/931989" source="BUGZILLA"/>
		<reference ref_id="939810" ref_url="https://bugzilla.suse.com/939810" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4047" ref_url="https://www.suse.com/security/cve/CVE-2015-4047/" source="CVE"/>
		<description>
ipsec-tools was updated to fix one security issue and a bug.

This security issue was fixed:

- CVE-2015-4047: racoon/gssapi.c in ipsec-tools allowed remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a series of crafted UDP requests (bsc#931989).

Due to a packaging error, the racoonf.conf config file was symlinked to /usr/share/doc/packages/ipsec-tools/examples/racoon/samples/racoon.conf
on some processor platforms, edits might have happened only in this example file.

Before upgrading, please check if /etc/racoon/racoon.conf is a symlink to this example file and backup the content. (bsc#939810)
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-06"/>
	<updated date="2015-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/931989">SUSE bug 931989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939810">SUSE bug 939810</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4047/">CVE-2015-4047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4047">CVE-2015-4047 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571993" comment="ipsec-tools-0.7.3-1.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217206" version="1" class="patch">
	<metadata>
		<title>Security update for ipsec-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1047443" ref_url="https://bugzilla.suse.com/1047443" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10396" ref_url="https://www.suse.com/security/cve/CVE-2016-10396/" source="CVE"/>
		<description>
This update for ipsec-tools fixes one issue.

This security issue was fixed:

- CVE-2016-10396: The racoon daemon contained a remotely exploitable
  computational-complexity attack when parsing and storing ISAKMP fragments that
  allowed a remote attacker to exhaust computational resources on the remote
  endpoint by repeatedly sending ISAKMP fragment packets in a particular order
  (bsc#1047443).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-12"/>
	<updated date="2018-02-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047443">SUSE bug 1047443</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10396/">CVE-2016-10396 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10396">CVE-2016-10396 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571994" comment="ipsec-tools-0.7.3-1.38.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217207" version="1" class="patch">
	<metadata>
		<title>Recommended update for iscsitarget</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="592928" ref_url="https://bugzilla.suse.com/592928" source="BUGZILLA"/>
		<reference ref_id="618574" ref_url="https://bugzilla.suse.com/618574" source="BUGZILLA"/>
		<reference ref_id="710353" ref_url="https://bugzilla.suse.com/710353" source="BUGZILLA"/>
		<reference ref_id="732751" ref_url="https://bugzilla.suse.com/732751" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0743" ref_url="https://www.suse.com/security/cve/CVE-2010-0743/" source="CVE"/>
		<reference ref_id="CVE-2010-2221" ref_url="https://www.suse.com/security/cve/CVE-2010-2221/" source="CVE"/>
		<description>

This update for iscsitarget provides the following fixes:

    * Add obsoletes on old tgt versions that unconditionally obsoleted
      iscsitarget versions (bnc#732751)
    * Install the correct services file for the firewall (bnc#710353)
    * Define _GNU_SOURCE to get correct prototypes from glibc.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-03-06"/>
	<updated date="2012-03-06"/>
	<bugzilla href="https://bugzilla.suse.com/592928">SUSE bug 592928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/618574">SUSE bug 618574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/710353">SUSE bug 710353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/732751">SUSE bug 732751</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0743/">CVE-2010-0743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0743">CVE-2010-0743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2221/">CVE-2010-2221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2221">CVE-2010-2221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991456" comment="iscsitarget-1.4.19-0.9.11.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991457" comment="iscsitarget-kmp-default-1.4.19_2.6.32.54_0.3-0.9.11.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991458" comment="iscsitarget-kmp-trace-1.4.19_2.6.32.54_0.3-0.9.11.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991459" comment="iscsitarget-kmp-xen-1.4.19_2.6.32.54_0.3-0.9.11.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217208" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-commons-collections (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="954102" ref_url="https://bugzilla.suse.com/954102" source="BUGZILLA"/>
		<description>

This update to jakarta-commons-collections 3.2.2 fixes the following security issues:

* bsc#954102 code-execution by unserialization
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-25"/>
	<updated date="2016-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954102">SUSE bug 954102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571995" comment="jakarta-commons-collections-3.2.2-88.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571996" comment="jakarta-commons-collections-javadoc-3.2.2-88.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571997" comment="jakarta-commons-collections-tomcat5-3.2.2-88.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217209" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-commons-fileupload</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="846174" ref_url="https://bugzilla.suse.com/846174" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2186" ref_url="https://www.suse.com/security/cve/CVE-2013-2186/" source="CVE"/>
		<description>

jakarta-commons-fileupload received the following security fix:

A poison null byte flaw was found in the implementation of the DiskFileItem 
class. A remote attacker would have been able to supply a serialized 
instance of the DiskFileItem class, which if deserialized on a server, 
could have used this flaw to write arbitrary content to any location on the 
server that has been permitted by the user running the application server 
process. (CVE-2013-2186)

Security Issue reference:

    * CVE-2013-2186
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2186&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-17"/>
	<updated date="2013-10-17"/>
	<bugzilla href="https://bugzilla.suse.com/846174">SUSE bug 846174</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2186/">CVE-2013-2186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2186">CVE-2013-2186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571998" comment="jakarta-commons-fileupload-1.1.1-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571999" comment="jakarta-commons-fileupload-javadoc-1.1.1-1.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217210" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-commons-fileupload (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1128829" ref_url="https://bugzilla.suse.com/1128829" source="BUGZILLA"/>
		<reference ref_id="1128963" ref_url="https://bugzilla.suse.com/1128963" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1000031" ref_url="https://www.suse.com/security/cve/CVE-2016-1000031/" source="CVE"/>
		<description>
This update for jakarta-commons-fileupload fixes the following issue:

Security issue fixed:

- CVE-2016-1000031: Fixed remote execution (bsc#1128963, bsc#1128829).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1128829">SUSE bug 1128829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128963">SUSE bug 1128963</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1000031/">CVE-2016-1000031 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000031">CVE-2016-1000031 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567995" comment="jakarta-commons-fileupload-1.1.1-1.37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567996" comment="jakarta-commons-fileupload-javadoc-1.1.1-1.37.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217211" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="803332" ref_url="https://bugzilla.suse.com/803332" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5783" ref_url="https://www.suse.com/security/cve/CVE-2012-5783/" source="CVE"/>
		<description>

The following issue has been fixed:

    * SSL certificate hostname verification was not done and is fixed by
      this update. (CVE-2012-5783)

Security Issue reference:

    * CVE-2012-5783
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5783&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-28"/>
	<updated date="2013-03-28"/>
	<bugzilla href="https://bugzilla.suse.com/803332">SUSE bug 803332</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2012-5783/">CVE-2012-5783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5783">CVE-2012-5783 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572000" comment="jakarta-commons-httpclient3-3.0.1-253.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217212" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-taglibs-standard (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="920813" ref_url="https://bugzilla.suse.com/920813" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0254" ref_url="https://www.suse.com/security/cve/CVE-2015-0254/" source="CVE"/>
		<description>
This update for jakarta-taglibs-standard fixes the following issues:

- CVE-2015-0254: Apache Standard Taglibs allowed remote attackers to execute arbitrary code or conduct external XML entity (XXE) attacks via a crafted XSLT extension in a (1) x:parse or (2) x:transform JSTL XML tag. (bsc#920813)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-26"/>
	<updated date="2017-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/920813">SUSE bug 920813</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0254/">CVE-2015-0254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0254">CVE-2015-0254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572001" comment="jakarta-taglibs-standard-1.1.1-234.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572002" comment="jakarta-taglibs-standard-javadoc-1.1.1-234.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217213" version="1" class="patch">
	<metadata>
		<title>Security update for jasper</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="725758" ref_url="https://bugzilla.suse.com/725758" source="BUGZILLA"/>
		<reference ref_id="909474" ref_url="https://bugzilla.suse.com/909474" source="BUGZILLA"/>
		<reference ref_id="909475" ref_url="https://bugzilla.suse.com/909475" source="BUGZILLA"/>
		<reference ref_id="911837" ref_url="https://bugzilla.suse.com/911837" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-4516" ref_url="https://www.suse.com/security/cve/CVE-2011-4516/" source="CVE"/>
		<reference ref_id="CVE-2011-4517" ref_url="https://www.suse.com/security/cve/CVE-2011-4517/" source="CVE"/>
		<reference ref_id="CVE-2014-8137" ref_url="https://www.suse.com/security/cve/CVE-2014-8137/" source="CVE"/>
		<reference ref_id="CVE-2014-8138" ref_url="https://www.suse.com/security/cve/CVE-2014-8138/" source="CVE"/>
		<description>

The following issue has been fixed:

    * Specially crafted JPEG2000 files could cause a heap buffer overflow
      in jasper (CVE-2011-4516, CVE-2011-4517)

Security Issue references:

    * CVE-2011-4516
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4516&gt;
    * CVE-2011-4517
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4517&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-12-07"/>
	<updated date="2011-12-07"/>
	<bugzilla href="https://bugzilla.suse.com/725758">SUSE bug 725758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909474">SUSE bug 909474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909475">SUSE bug 909475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911837">SUSE bug 911837</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4516/">CVE-2011-4516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4516">CVE-2011-4516 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4517/">CVE-2011-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4517">CVE-2011-4517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8137/">CVE-2014-8137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8137">CVE-2014-8137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8138/">CVE-2014-8138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8138">CVE-2014-8138 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991460" comment="libjasper-1.900.1-134.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991461" comment="libjasper-32bit-1.900.1-134.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217214" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1005084" ref_url="https://bugzilla.suse.com/1005084" source="BUGZILLA"/>
		<reference ref_id="1005090" ref_url="https://bugzilla.suse.com/1005090" source="BUGZILLA"/>
		<reference ref_id="1005242" ref_url="https://bugzilla.suse.com/1005242" source="BUGZILLA"/>
		<reference ref_id="1006591" ref_url="https://bugzilla.suse.com/1006591" source="BUGZILLA"/>
		<reference ref_id="1006593" ref_url="https://bugzilla.suse.com/1006593" source="BUGZILLA"/>
		<reference ref_id="1006597" ref_url="https://bugzilla.suse.com/1006597" source="BUGZILLA"/>
		<reference ref_id="1006598" ref_url="https://bugzilla.suse.com/1006598" source="BUGZILLA"/>
		<reference ref_id="1006599" ref_url="https://bugzilla.suse.com/1006599" source="BUGZILLA"/>
		<reference ref_id="1006836" ref_url="https://bugzilla.suse.com/1006836" source="BUGZILLA"/>
		<reference ref_id="1006839" ref_url="https://bugzilla.suse.com/1006839" source="BUGZILLA"/>
		<reference ref_id="1007009" ref_url="https://bugzilla.suse.com/1007009" source="BUGZILLA"/>
		<reference ref_id="392410" ref_url="https://bugzilla.suse.com/392410" source="BUGZILLA"/>
		<reference ref_id="941919" ref_url="https://bugzilla.suse.com/941919" source="BUGZILLA"/>
		<reference ref_id="942553" ref_url="https://bugzilla.suse.com/942553" source="BUGZILLA"/>
		<reference ref_id="961886" ref_url="https://bugzilla.suse.com/961886" source="BUGZILLA"/>
		<reference ref_id="963983" ref_url="https://bugzilla.suse.com/963983" source="BUGZILLA"/>
		<reference ref_id="968373" ref_url="https://bugzilla.suse.com/968373" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-3522" ref_url="https://www.suse.com/security/cve/CVE-2008-3522/" source="CVE"/>
		<reference ref_id="CVE-2015-5203" ref_url="https://www.suse.com/security/cve/CVE-2015-5203/" source="CVE"/>
		<reference ref_id="CVE-2015-5221" ref_url="https://www.suse.com/security/cve/CVE-2015-5221/" source="CVE"/>
		<reference ref_id="CVE-2016-1577" ref_url="https://www.suse.com/security/cve/CVE-2016-1577/" source="CVE"/>
		<reference ref_id="CVE-2016-1867" ref_url="https://www.suse.com/security/cve/CVE-2016-1867/" source="CVE"/>
		<reference ref_id="CVE-2016-2089" ref_url="https://www.suse.com/security/cve/CVE-2016-2089/" source="CVE"/>
		<reference ref_id="CVE-2016-2116" ref_url="https://www.suse.com/security/cve/CVE-2016-2116/" source="CVE"/>
		<reference ref_id="CVE-2016-8690" ref_url="https://www.suse.com/security/cve/CVE-2016-8690/" source="CVE"/>
		<reference ref_id="CVE-2016-8691" ref_url="https://www.suse.com/security/cve/CVE-2016-8691/" source="CVE"/>
		<reference ref_id="CVE-2016-8692" ref_url="https://www.suse.com/security/cve/CVE-2016-8692/" source="CVE"/>
		<reference ref_id="CVE-2016-8693" ref_url="https://www.suse.com/security/cve/CVE-2016-8693/" source="CVE"/>
		<reference ref_id="CVE-2016-8880" ref_url="https://www.suse.com/security/cve/CVE-2016-8880/" source="CVE"/>
		<reference ref_id="CVE-2016-8881" ref_url="https://www.suse.com/security/cve/CVE-2016-8881/" source="CVE"/>
		<reference ref_id="CVE-2016-8882" ref_url="https://www.suse.com/security/cve/CVE-2016-8882/" source="CVE"/>
		<reference ref_id="CVE-2016-8883" ref_url="https://www.suse.com/security/cve/CVE-2016-8883/" source="CVE"/>
		<reference ref_id="CVE-2016-8884" ref_url="https://www.suse.com/security/cve/CVE-2016-8884/" source="CVE"/>
		<reference ref_id="CVE-2016-8885" ref_url="https://www.suse.com/security/cve/CVE-2016-8885/" source="CVE"/>
		<reference ref_id="CVE-2016-8886" ref_url="https://www.suse.com/security/cve/CVE-2016-8886/" source="CVE"/>
		<reference ref_id="CVE-2016-8887" ref_url="https://www.suse.com/security/cve/CVE-2016-8887/" source="CVE"/>
		<description>

This update for jasper fixes the following issues:

Security fixes:
- CVE-2016-8887: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c) (bsc#1006836)
- CVE-2016-8886: memory allocation failure in jas_malloc (jas_malloc.c) (bsc#1006599)
- CVE-2016-8884,CVE-2016-8885: two null pointer dereferences in bmp_getdata (incomplete fix for CVE-2016-8690) (bsc#1007009)
- CVE-2016-8883: assert in jpc_dec_tiledecode() (bsc#1006598)
- CVE-2016-8882: segfault / null pointer access in jpc_pi_destroy (bsc#1006597)
- CVE-2016-8881: Heap overflow in jpc_getuint16() (bsc#1006593)
- CVE-2016-8880: Heap overflow in jpc_dec_cp_setfromcox() (bsc#1006591)
- CVE-2016-8693: Double free vulnerability in mem_close (bsc#1005242)
- CVE-2016-8691, CVE-2016-8692: Divide by zero in jpc_dec_process_siz (bsc#1005090)
- CVE-2016-8690: Null pointer dereference in bmp_getdata triggered by crafted BMP image (bsc#1005084)
- CVE-2016-2089: invalid read in the JasPer's jas_matrix_clip() function (bsc#963983)
- CVE-2016-1867: Out-of-bounds Read in the JasPer's jpc_pi_nextcprl() function (bsc#961886)
- CVE-2016-1577, CVE-2016-2116: double free vulnerability in the jas_iccattrval_destroy function (bsc#968373)
- CVE-2015-5221: Use-after-free (and double-free) in Jasper JPEG-200 (bsc#942553)
- CVE-2015-5203: Double free corruption in JasPer JPEG-2000 implementation (bsc#941919)
- CVE-2008-3522: multiple integer overflows (bsc#392410)
- bsc#1006839: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c) (incomplete fix for CVE-2016-8887)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-10"/>
	<updated date="2016-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005084">SUSE bug 1005084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005090">SUSE bug 1005090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005242">SUSE bug 1005242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006591">SUSE bug 1006591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006593">SUSE bug 1006593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006597">SUSE bug 1006597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006598">SUSE bug 1006598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006599">SUSE bug 1006599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006836">SUSE bug 1006836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006839">SUSE bug 1006839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007009">SUSE bug 1007009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/392410">SUSE bug 392410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941919">SUSE bug 941919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942553">SUSE bug 942553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961886">SUSE bug 961886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963983">SUSE bug 963983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968373">SUSE bug 968373</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3522/">CVE-2008-3522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3522">CVE-2008-3522 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5203/">CVE-2015-5203 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5203">CVE-2015-5203 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5221/">CVE-2015-5221 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5221">CVE-2015-5221 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1577/">CVE-2016-1577 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1577">CVE-2016-1577 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1867/">CVE-2016-1867 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1867">CVE-2016-1867 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2089/">CVE-2016-2089 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2089">CVE-2016-2089 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-2116/">CVE-2016-2116 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2116">CVE-2016-2116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8690/">CVE-2016-8690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8690">CVE-2016-8690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8691/">CVE-2016-8691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8691">CVE-2016-8691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8692/">CVE-2016-8692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8692">CVE-2016-8692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8693/">CVE-2016-8693 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8693">CVE-2016-8693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8880/">CVE-2016-8880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-8880">CVE-2016-8880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8881/">CVE-2016-8881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-8881">CVE-2016-8881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8882/">CVE-2016-8882 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8882">CVE-2016-8882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8883/">CVE-2016-8883 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8883">CVE-2016-8883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8884/">CVE-2016-8884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8884">CVE-2016-8884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8885/">CVE-2016-8885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8885">CVE-2016-8885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8886/">CVE-2016-8886 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8886">CVE-2016-8886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8887/">CVE-2016-8887 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8887">CVE-2016-8887 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572006" comment="libjasper-1.900.14-134.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572007" comment="libjasper-32bit-1.900.14-134.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217215" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1010977" ref_url="https://bugzilla.suse.com/1010977" source="BUGZILLA"/>
		<reference ref_id="1010979" ref_url="https://bugzilla.suse.com/1010979" source="BUGZILLA"/>
		<reference ref_id="1011830" ref_url="https://bugzilla.suse.com/1011830" source="BUGZILLA"/>
		<reference ref_id="1012530" ref_url="https://bugzilla.suse.com/1012530" source="BUGZILLA"/>
		<reference ref_id="1015400" ref_url="https://bugzilla.suse.com/1015400" source="BUGZILLA"/>
		<reference ref_id="1015993" ref_url="https://bugzilla.suse.com/1015993" source="BUGZILLA"/>
		<reference ref_id="1018088" ref_url="https://bugzilla.suse.com/1018088" source="BUGZILLA"/>
		<reference ref_id="1020353" ref_url="https://bugzilla.suse.com/1020353" source="BUGZILLA"/>
		<reference ref_id="1021868" ref_url="https://bugzilla.suse.com/1021868" source="BUGZILLA"/>
		<reference ref_id="1029497" ref_url="https://bugzilla.suse.com/1029497" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10251" ref_url="https://www.suse.com/security/cve/CVE-2016-10251/" source="CVE"/>
		<reference ref_id="CVE-2016-8654" ref_url="https://www.suse.com/security/cve/CVE-2016-8654/" source="CVE"/>
		<reference ref_id="CVE-2016-9395" ref_url="https://www.suse.com/security/cve/CVE-2016-9395/" source="CVE"/>
		<reference ref_id="CVE-2016-9398" ref_url="https://www.suse.com/security/cve/CVE-2016-9398/" source="CVE"/>
		<reference ref_id="CVE-2016-9560" ref_url="https://www.suse.com/security/cve/CVE-2016-9560/" source="CVE"/>
		<reference ref_id="CVE-2016-9583" ref_url="https://www.suse.com/security/cve/CVE-2016-9583/" source="CVE"/>
		<reference ref_id="CVE-2016-9591" ref_url="https://www.suse.com/security/cve/CVE-2016-9591/" source="CVE"/>
		<reference ref_id="CVE-2016-9600" ref_url="https://www.suse.com/security/cve/CVE-2016-9600/" source="CVE"/>
		<reference ref_id="CVE-2017-5498" ref_url="https://www.suse.com/security/cve/CVE-2017-5498/" source="CVE"/>
		<reference ref_id="CVE-2017-6850" ref_url="https://www.suse.com/security/cve/CVE-2017-6850/" source="CVE"/>
		<description>

This update for jasper fixes the following issues:

Security issues fixed:
- CVE-2016-8654: Heap-based buffer overflow in QMFB code in JPC codec (bsc#1012530)
- CVE-2016-9395: Missing sanity checks on the data in a SIZ marker segment (bsc#1010977).
- CVE-2016-9398: jpc_math.c:94: int jpc_floorlog2(int): Assertion 'x &gt; 0' failed. (bsc#1010979)
- CVE-2016-9560: stack-based buffer overflow in jpc_tsfb_getbands2 (jpc_tsfb.c) (bsc#1011830)
- CVE-2016-9583: Out of bounds heap read in jpc_pi_nextpcrl() (bsc#1015400)
- CVE-2016-9591: Use-after-free on heap in jas_matrix_destroy (bsc#1015993)
- CVE-2016-9600: Null Pointer Dereference due to missing check for UNKNOWN color space in JP2 encoder (bsc#1018088)
- CVE-2016-10251: Use of uninitialized value in jpc_pi_nextcprl (jpc_t2cod.c) (bsc#1029497)
- CVE-2017-5498: left-shift undefined behaviour (bsc#1020353)
- CVE-2017-6850: NULL pointer dereference in jp2_cdef_destroy (jp2_cod.c) (bsc#1021868)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-05"/>
	<updated date="2017-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010977">SUSE bug 1010977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010979">SUSE bug 1010979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011830">SUSE bug 1011830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012530">SUSE bug 1012530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015400">SUSE bug 1015400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015993">SUSE bug 1015993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018088">SUSE bug 1018088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020353">SUSE bug 1020353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021868">SUSE bug 1021868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029497">SUSE bug 1029497</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10251/">CVE-2016-10251 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10251">CVE-2016-10251 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8654/">CVE-2016-8654 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8654">CVE-2016-8654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9395/">CVE-2016-9395 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9395">CVE-2016-9395 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9398/">CVE-2016-9398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9398">CVE-2016-9398 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9560/">CVE-2016-9560 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9560">CVE-2016-9560 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9583/">CVE-2016-9583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9583">CVE-2016-9583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9591/">CVE-2016-9591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9591">CVE-2016-9591 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9600/">CVE-2016-9600 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9600">CVE-2016-9600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5498/">CVE-2017-5498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5498">CVE-2017-5498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6850/">CVE-2017-6850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6850">CVE-2017-6850 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572008" comment="libjasper-1.900.14-134.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572009" comment="libjasper-32bit-1.900.14-134.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217216" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1009994" ref_url="https://bugzilla.suse.com/1009994" source="BUGZILLA"/>
		<reference ref_id="1010756" ref_url="https://bugzilla.suse.com/1010756" source="BUGZILLA"/>
		<reference ref_id="1010757" ref_url="https://bugzilla.suse.com/1010757" source="BUGZILLA"/>
		<reference ref_id="1010766" ref_url="https://bugzilla.suse.com/1010766" source="BUGZILLA"/>
		<reference ref_id="1010774" ref_url="https://bugzilla.suse.com/1010774" source="BUGZILLA"/>
		<reference ref_id="1010782" ref_url="https://bugzilla.suse.com/1010782" source="BUGZILLA"/>
		<reference ref_id="1010968" ref_url="https://bugzilla.suse.com/1010968" source="BUGZILLA"/>
		<reference ref_id="1010975" ref_url="https://bugzilla.suse.com/1010975" source="BUGZILLA"/>
		<reference ref_id="1047958" ref_url="https://bugzilla.suse.com/1047958" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9262" ref_url="https://www.suse.com/security/cve/CVE-2016-9262/" source="CVE"/>
		<reference ref_id="CVE-2016-9388" ref_url="https://www.suse.com/security/cve/CVE-2016-9388/" source="CVE"/>
		<reference ref_id="CVE-2016-9389" ref_url="https://www.suse.com/security/cve/CVE-2016-9389/" source="CVE"/>
		<reference ref_id="CVE-2016-9390" ref_url="https://www.suse.com/security/cve/CVE-2016-9390/" source="CVE"/>
		<reference ref_id="CVE-2016-9391" ref_url="https://www.suse.com/security/cve/CVE-2016-9391/" source="CVE"/>
		<reference ref_id="CVE-2016-9392" ref_url="https://www.suse.com/security/cve/CVE-2016-9392/" source="CVE"/>
		<reference ref_id="CVE-2016-9393" ref_url="https://www.suse.com/security/cve/CVE-2016-9393/" source="CVE"/>
		<reference ref_id="CVE-2016-9394" ref_url="https://www.suse.com/security/cve/CVE-2016-9394/" source="CVE"/>
		<reference ref_id="CVE-2017-1000050" ref_url="https://www.suse.com/security/cve/CVE-2017-1000050/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

Security issues fixed:
- CVE-2016-9262: Multiple integer overflows in the jas_realloc function in base/jas_malloc.c and
  mem_resize function in base/jas_stream.c allow remote attackers to cause a denial of service via
  a crafted image, which triggers use after free vulnerabilities. (bsc#1009994)
- CVE-2016-9388: The ras_getcmap function in ras_dec.c allows remote attackers to cause a denial
  of service (assertion failure) via a crafted image file. (bsc#1010975)
- CVE-2016-9389: The jpc_irct and jpc_iict functions in jpc_mct.c allow remote attackers to cause a
  denial of service (assertion failure). (bsc#1010968)
- CVE-2016-9390: The jas_seq2d_create function in jas_seq.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted image file. (bsc#1010774)
- CVE-2016-9391: The jpc_bitstream_getbits function in jpc_bs.c allows remote attackers to cause a
  denial of service (assertion failure) via a very large integer. (bsc#1010782)
- CVE-2017-1000050: The jp2_encode function in jp2_enc.c allows remote attackers to cause a denial
  of service. (bsc#1047958)

CVEs already fixed with previous update:
- CVE-2016-9392: The calcstepsizes function in jpc_dec.c allows remote attackers to cause a denial
  of service (assertion failure) via a crafted file. (bsc#1010757)
- CVE-2016-9393: The jpc_pi_nextrpcl function in jpc_t2cod.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted file. (bsc#1010766)
- CVE-2016-9394: The jas_seq2d_create function in jas_seq.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted file. (bsc#1010756)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-19"/>
	<updated date="2017-07-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009994">SUSE bug 1009994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010756">SUSE bug 1010756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010757">SUSE bug 1010757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010766">SUSE bug 1010766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010774">SUSE bug 1010774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010782">SUSE bug 1010782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010968">SUSE bug 1010968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010975">SUSE bug 1010975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047958">SUSE bug 1047958</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9262/">CVE-2016-9262 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9262">CVE-2016-9262 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9388/">CVE-2016-9388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9388">CVE-2016-9388 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9389/">CVE-2016-9389 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9389">CVE-2016-9389 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9390/">CVE-2016-9390 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9390">CVE-2016-9390 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9391/">CVE-2016-9391 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9391">CVE-2016-9391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9392/">CVE-2016-9392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9392">CVE-2016-9392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9393/">CVE-2016-9393 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9393">CVE-2016-9393 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9394/">CVE-2016-9394 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9394">CVE-2016-9394 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000050/">CVE-2017-1000050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000050">CVE-2017-1000050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572010" comment="libjasper-1.900.14-134.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572011" comment="libjasper-32bit-1.900.14-134.33.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217217" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1010783" ref_url="https://bugzilla.suse.com/1010783" source="BUGZILLA"/>
		<reference ref_id="1087020" ref_url="https://bugzilla.suse.com/1087020" source="BUGZILLA"/>
		<reference ref_id="1117505" ref_url="https://bugzilla.suse.com/1117505" source="BUGZILLA"/>
		<reference ref_id="1117507" ref_url="https://bugzilla.suse.com/1117507" source="BUGZILLA"/>
		<reference ref_id="1117508" ref_url="https://bugzilla.suse.com/1117508" source="BUGZILLA"/>
		<reference ref_id="1117511" ref_url="https://bugzilla.suse.com/1117511" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9396" ref_url="https://www.suse.com/security/cve/CVE-2016-9396/" source="CVE"/>
		<reference ref_id="CVE-2018-19539" ref_url="https://www.suse.com/security/cve/CVE-2018-19539/" source="CVE"/>
		<reference ref_id="CVE-2018-19540" ref_url="https://www.suse.com/security/cve/CVE-2018-19540/" source="CVE"/>
		<reference ref_id="CVE-2018-19541" ref_url="https://www.suse.com/security/cve/CVE-2018-19541/" source="CVE"/>
		<reference ref_id="CVE-2018-19542" ref_url="https://www.suse.com/security/cve/CVE-2018-19542/" source="CVE"/>
		<reference ref_id="CVE-2018-9055" ref_url="https://www.suse.com/security/cve/CVE-2018-9055/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

Security issues fixed:

- CVE-2018-19540: Fixed  a heap based overflow in jas_icctxtdesc_input (bsc#1117508).
- CVE-2018-19541: Fix heap based overread in jas_image_depalettize (bsc#1117507).    
- CVE-2018-19542: Fixed a denial of service in jp2_decode (bsc#1117505).
- CVE-2018-19539: Fixed a denial of service in jas_image_readcmpt (bsc#1117511).
- CVE-2018-9055: Fixed a denial of service in jpc_firstone (bsc#1087020).
- CVE-2016-9396: Fixed a denial of service in jpc_cox_getcompparms (bsc#1010783).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-01"/>
	<updated date="2019-10-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010783">SUSE bug 1010783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087020">SUSE bug 1087020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117505">SUSE bug 1117505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117507">SUSE bug 1117507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117508">SUSE bug 1117508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117511">SUSE bug 1117511</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9396/">CVE-2016-9396 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9396">CVE-2016-9396 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19539/">CVE-2018-19539 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19539">CVE-2018-19539 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19540/">CVE-2018-19540 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19540">CVE-2018-19540 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19541/">CVE-2018-19541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19541">CVE-2018-19541 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19542/">CVE-2018-19542 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19542">CVE-2018-19542 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9055/">CVE-2018-9055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9055">CVE-2018-9055 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572012" comment="libjasper-1.900.14-134.33.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572013" comment="libjasper-32bit-1.900.14-134.33.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217218" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1010786" ref_url="https://bugzilla.suse.com/1010786" source="BUGZILLA"/>
		<reference ref_id="1010979" ref_url="https://bugzilla.suse.com/1010979" source="BUGZILLA"/>
		<reference ref_id="1010980" ref_url="https://bugzilla.suse.com/1010980" source="BUGZILLA"/>
		<reference ref_id="1011829" ref_url="https://bugzilla.suse.com/1011829" source="BUGZILLA"/>
		<reference ref_id="1020451" ref_url="https://bugzilla.suse.com/1020451" source="BUGZILLA"/>
		<reference ref_id="1020456" ref_url="https://bugzilla.suse.com/1020456" source="BUGZILLA"/>
		<reference ref_id="1020458" ref_url="https://bugzilla.suse.com/1020458" source="BUGZILLA"/>
		<reference ref_id="1020460" ref_url="https://bugzilla.suse.com/1020460" source="BUGZILLA"/>
		<reference ref_id="1045450" ref_url="https://bugzilla.suse.com/1045450" source="BUGZILLA"/>
		<reference ref_id="1057152" ref_url="https://bugzilla.suse.com/1057152" source="BUGZILLA"/>
		<reference ref_id="1088278" ref_url="https://bugzilla.suse.com/1088278" source="BUGZILLA"/>
		<reference ref_id="1092115" ref_url="https://bugzilla.suse.com/1092115" source="BUGZILLA"/>
		<reference ref_id="1114498" ref_url="https://bugzilla.suse.com/1114498" source="BUGZILLA"/>
		<reference ref_id="1115637" ref_url="https://bugzilla.suse.com/1115637" source="BUGZILLA"/>
		<reference ref_id="1117328" ref_url="https://bugzilla.suse.com/1117328" source="BUGZILLA"/>
		<reference ref_id="1120805" ref_url="https://bugzilla.suse.com/1120805" source="BUGZILLA"/>
		<reference ref_id="1120807" ref_url="https://bugzilla.suse.com/1120807" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9397" ref_url="https://www.suse.com/security/cve/CVE-2016-9397/" source="CVE"/>
		<reference ref_id="CVE-2016-9398" ref_url="https://www.suse.com/security/cve/CVE-2016-9398/" source="CVE"/>
		<reference ref_id="CVE-2016-9399" ref_url="https://www.suse.com/security/cve/CVE-2016-9399/" source="CVE"/>
		<reference ref_id="CVE-2016-9557" ref_url="https://www.suse.com/security/cve/CVE-2016-9557/" source="CVE"/>
		<reference ref_id="CVE-2017-14132" ref_url="https://www.suse.com/security/cve/CVE-2017-14132/" source="CVE"/>
		<reference ref_id="CVE-2017-5499" ref_url="https://www.suse.com/security/cve/CVE-2017-5499/" source="CVE"/>
		<reference ref_id="CVE-2017-5503" ref_url="https://www.suse.com/security/cve/CVE-2017-5503/" source="CVE"/>
		<reference ref_id="CVE-2017-5504" ref_url="https://www.suse.com/security/cve/CVE-2017-5504/" source="CVE"/>
		<reference ref_id="CVE-2017-5505" ref_url="https://www.suse.com/security/cve/CVE-2017-5505/" source="CVE"/>
		<reference ref_id="CVE-2017-9782" ref_url="https://www.suse.com/security/cve/CVE-2017-9782/" source="CVE"/>
		<reference ref_id="CVE-2018-18873" ref_url="https://www.suse.com/security/cve/CVE-2018-18873/" source="CVE"/>
		<reference ref_id="CVE-2018-19139" ref_url="https://www.suse.com/security/cve/CVE-2018-19139/" source="CVE"/>
		<reference ref_id="CVE-2018-19543" ref_url="https://www.suse.com/security/cve/CVE-2018-19543/" source="CVE"/>
		<reference ref_id="CVE-2018-20570" ref_url="https://www.suse.com/security/cve/CVE-2018-20570/" source="CVE"/>
		<reference ref_id="CVE-2018-20622" ref_url="https://www.suse.com/security/cve/CVE-2018-20622/" source="CVE"/>
		<reference ref_id="CVE-2018-9154" ref_url="https://www.suse.com/security/cve/CVE-2018-9154/" source="CVE"/>
		<reference ref_id="CVE-2018-9252" ref_url="https://www.suse.com/security/cve/CVE-2018-9252/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

- CVE-2016-9398: Improved patch for already fixed issue (bsc#1010979).
- CVE-2016-9399: Fix assert in calcstepsizes (bsc#1010980).
- CVE-2016-9397: Fix assert in jpc_dequantize (bsc#1010786).
- CVE-2016-9557: Fix signed integer overflow (bsc#1011829).
- CVE-2017-5499: Validate component depth bit (bsc#1020451).
- CVE-2017-5503: Check bounds in jas_seq2d_bindsub() (bsc#1020456).
- CVE-2017-5504: Check bounds in jas_seq2d_bindsub() (bsc#1020458).
- CVE-2017-5505: Check bounds in jas_seq2d_bindsub() (bsc#1020460).
- CVE-2017-14132: Fix heap base overflow in by checking components (bsc#1057152).
- CVE-2018-9154: Fixed a potential denial of service in jpc_dec_process_sot() (bsc#1092115).
- CVE-2018-9252: Fix reachable assertion in jpc_abstorelstepsize (bsc#1088278).
- CVE-2018-18873: Fix null pointer deref in ras_putdatastd (bsc#1114498).
- CVE-2018-19139: Fix mem leaks by registering jpc_unk_destroyparms (bsc#1115637).
- CVE-2018-19543, bsc#1045450 CVE-2017-9782: Fix numchans mixup (bsc#1117328).
- CVE-2018-20570: Fix heap based buffer over-read in jp2_encode (bsc#1120807).
- CVE-2018-20622: Fix memory leak in jas_malloc.c (bsc#1120805).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-01"/>
	<updated date="2020-09-01"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1010786">SUSE bug 1010786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010979">SUSE bug 1010979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010980">SUSE bug 1010980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011829">SUSE bug 1011829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020451">SUSE bug 1020451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020456">SUSE bug 1020456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020458">SUSE bug 1020458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020460">SUSE bug 1020460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045450">SUSE bug 1045450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057152">SUSE bug 1057152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088278">SUSE bug 1088278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092115">SUSE bug 1092115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114498">SUSE bug 1114498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115637">SUSE bug 1115637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117328">SUSE bug 1117328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120805">SUSE bug 1120805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120807">SUSE bug 1120807</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9397/">CVE-2016-9397 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9397">CVE-2016-9397 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9398/">CVE-2016-9398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9398">CVE-2016-9398 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9399/">CVE-2016-9399 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9399">CVE-2016-9399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9557/">CVE-2016-9557 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9557">CVE-2016-9557 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14132/">CVE-2017-14132 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14132">CVE-2017-14132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5499/">CVE-2017-5499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5499">CVE-2017-5499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5503/">CVE-2017-5503 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5503">CVE-2017-5503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5504/">CVE-2017-5504 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5504">CVE-2017-5504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5505/">CVE-2017-5505 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5505">CVE-2017-5505 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9782/">CVE-2017-9782 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9782">CVE-2017-9782 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18873/">CVE-2018-18873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18873">CVE-2018-18873 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19139/">CVE-2018-19139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19139">CVE-2018-19139 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19543/">CVE-2018-19543 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19543">CVE-2018-19543 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20570/">CVE-2018-20570 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20570">CVE-2018-20570 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20622/">CVE-2018-20622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20622">CVE-2018-20622 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9154/">CVE-2018-9154 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9154">CVE-2018-9154 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9252/">CVE-2018-9252 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9252">CVE-2018-9252 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572014" comment="libjasper-1.900.14-134.33.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572015" comment="libjasper-32bit-1.900.14-134.33.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217219" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1179748" ref_url="https://bugzilla.suse.com/1179748" source="BUGZILLA"/>
		<reference ref_id="1181483" ref_url="https://bugzilla.suse.com/1181483" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27828" ref_url="https://www.suse.com/security/cve/CVE-2020-27828/" source="CVE"/>
		<reference ref_id="CVE-2021-3272" ref_url="https://www.suse.com/security/cve/CVE-2021-3272/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

- bsc#1179748 CVE-2020-27828: Fix heap overflow by checking maxrlvls
- bsc#1181483 CVE-2021-3272: Fix buffer over-read in jp2_decode
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179748">SUSE bug 1179748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181483">SUSE bug 1181483</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27828/">CVE-2020-27828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27828">CVE-2020-27828 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3272/">CVE-2021-3272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3272">CVE-2021-3272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572016" comment="libjasper-1.900.14-134.33.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572017" comment="libjasper-32bit-1.900.14-134.33.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217220" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1188437" ref_url="https://bugzilla.suse.com/1188437" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27845" ref_url="https://www.suse.com/security/cve/CVE-2021-27845/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

- CVE-2021-27845: Fixed divide-by-zery issue in cp_create() (bsc#1188437).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-24"/>
	<updated date="2022-02-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188437">SUSE bug 1188437</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-27845/">CVE-2021-27845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27845">CVE-2021-27845 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668400" comment="libjasper-1.900.14-134.33.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668401" comment="libjasper-32bit-1.900.14-134.33.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217221" version="1" class="patch">
	<metadata>
		<title>Security update for IBM Java 1.4.2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="494536" ref_url="https://bugzilla.suse.com/494536" source="BUGZILLA"/>
		<reference ref_id="590826" ref_url="https://bugzilla.suse.com/590826" source="BUGZILLA"/>
		<reference ref_id="592934" ref_url="https://bugzilla.suse.com/592934" source="BUGZILLA"/>
		<reference ref_id="594791" ref_url="https://bugzilla.suse.com/594791" source="BUGZILLA"/>
		<reference ref_id="603353" ref_url="https://bugzilla.suse.com/603353" source="BUGZILLA"/>
		<reference ref_id="646906" ref_url="https://bugzilla.suse.com/646906" source="BUGZILLA"/>
		<reference ref_id="663953" ref_url="https://bugzilla.suse.com/663953" source="BUGZILLA"/>
		<reference ref_id="666744" ref_url="https://bugzilla.suse.com/666744" source="BUGZILLA"/>
		<reference ref_id="673738" ref_url="https://bugzilla.suse.com/673738" source="BUGZILLA"/>
		<reference ref_id="690583" ref_url="https://bugzilla.suse.com/690583" source="BUGZILLA"/>
		<reference ref_id="711195" ref_url="https://bugzilla.suse.com/711195" source="BUGZILLA"/>
		<reference ref_id="739256" ref_url="https://bugzilla.suse.com/739256" source="BUGZILLA"/>
		<reference ref_id="758651" ref_url="https://bugzilla.suse.com/758651" source="BUGZILLA"/>
		<reference ref_id="763805" ref_url="https://bugzilla.suse.com/763805" source="BUGZILLA"/>
		<reference ref_id="778629" ref_url="https://bugzilla.suse.com/778629" source="BUGZILLA"/>
		<reference ref_id="788750" ref_url="https://bugzilla.suse.com/788750" source="BUGZILLA"/>
		<reference ref_id="798535" ref_url="https://bugzilla.suse.com/798535" source="BUGZILLA"/>
		<reference ref_id="809321" ref_url="https://bugzilla.suse.com/809321" source="BUGZILLA"/>
		<reference ref_id="813939" ref_url="https://bugzilla.suse.com/813939" source="BUGZILLA"/>
		<reference ref_id="819288" ref_url="https://bugzilla.suse.com/819288" source="BUGZILLA"/>
		<reference ref_id="823034" ref_url="https://bugzilla.suse.com/823034" source="BUGZILLA"/>
		<reference ref_id="829212" ref_url="https://bugzilla.suse.com/829212" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-0084" ref_url="https://www.suse.com/security/cve/CVE-2010-0084/" source="CVE"/>
		<reference ref_id="CVE-2010-0085" ref_url="https://www.suse.com/security/cve/CVE-2010-0085/" source="CVE"/>
		<reference ref_id="CVE-2010-0087" ref_url="https://www.suse.com/security/cve/CVE-2010-0087/" source="CVE"/>
		<reference ref_id="CVE-2010-0088" ref_url="https://www.suse.com/security/cve/CVE-2010-0088/" source="CVE"/>
		<reference ref_id="CVE-2010-0089" ref_url="https://www.suse.com/security/cve/CVE-2010-0089/" source="CVE"/>
		<reference ref_id="CVE-2010-0091" ref_url="https://www.suse.com/security/cve/CVE-2010-0091/" source="CVE"/>
		<reference ref_id="CVE-2010-0095" ref_url="https://www.suse.com/security/cve/CVE-2010-0095/" source="CVE"/>
		<reference ref_id="CVE-2010-0839" ref_url="https://www.suse.com/security/cve/CVE-2010-0839/" source="CVE"/>
		<reference ref_id="CVE-2010-0840" ref_url="https://www.suse.com/security/cve/CVE-2010-0840/" source="CVE"/>
		<reference ref_id="CVE-2010-0841" ref_url="https://www.suse.com/security/cve/CVE-2010-0841/" source="CVE"/>
		<reference ref_id="CVE-2010-0842" ref_url="https://www.suse.com/security/cve/CVE-2010-0842/" source="CVE"/>
		<reference ref_id="CVE-2010-0843" ref_url="https://www.suse.com/security/cve/CVE-2010-0843/" source="CVE"/>
		<reference ref_id="CVE-2010-0844" ref_url="https://www.suse.com/security/cve/CVE-2010-0844/" source="CVE"/>
		<reference ref_id="CVE-2010-0846" ref_url="https://www.suse.com/security/cve/CVE-2010-0846/" source="CVE"/>
		<reference ref_id="CVE-2010-0847" ref_url="https://www.suse.com/security/cve/CVE-2010-0847/" source="CVE"/>
		<reference ref_id="CVE-2010-0848" ref_url="https://www.suse.com/security/cve/CVE-2010-0848/" source="CVE"/>
		<reference ref_id="CVE-2010-0849" ref_url="https://www.suse.com/security/cve/CVE-2010-0849/" source="CVE"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-3541" ref_url="https://www.suse.com/security/cve/CVE-2010-3541/" source="CVE"/>
		<reference ref_id="CVE-2010-3548" ref_url="https://www.suse.com/security/cve/CVE-2010-3548/" source="CVE"/>
		<reference ref_id="CVE-2010-3549" ref_url="https://www.suse.com/security/cve/CVE-2010-3549/" source="CVE"/>
		<reference ref_id="CVE-2010-3551" ref_url="https://www.suse.com/security/cve/CVE-2010-3551/" source="CVE"/>
		<reference ref_id="CVE-2010-3553" ref_url="https://www.suse.com/security/cve/CVE-2010-3553/" source="CVE"/>
		<reference ref_id="CVE-2010-3556" ref_url="https://www.suse.com/security/cve/CVE-2010-3556/" source="CVE"/>
		<reference ref_id="CVE-2010-3557" ref_url="https://www.suse.com/security/cve/CVE-2010-3557/" source="CVE"/>
		<reference ref_id="CVE-2010-3562" ref_url="https://www.suse.com/security/cve/CVE-2010-3562/" source="CVE"/>
		<reference ref_id="CVE-2010-3565" ref_url="https://www.suse.com/security/cve/CVE-2010-3565/" source="CVE"/>
		<reference ref_id="CVE-2010-3568" ref_url="https://www.suse.com/security/cve/CVE-2010-3568/" source="CVE"/>
		<reference ref_id="CVE-2010-3569" ref_url="https://www.suse.com/security/cve/CVE-2010-3569/" source="CVE"/>
		<reference ref_id="CVE-2010-3571" ref_url="https://www.suse.com/security/cve/CVE-2010-3571/" source="CVE"/>
		<reference ref_id="CVE-2010-3572" ref_url="https://www.suse.com/security/cve/CVE-2010-3572/" source="CVE"/>
		<reference ref_id="CVE-2010-3574" ref_url="https://www.suse.com/security/cve/CVE-2010-3574/" source="CVE"/>
		<reference ref_id="CVE-2010-4447" ref_url="https://www.suse.com/security/cve/CVE-2010-4447/" source="CVE"/>
		<reference ref_id="CVE-2010-4448" ref_url="https://www.suse.com/security/cve/CVE-2010-4448/" source="CVE"/>
		<reference ref_id="CVE-2010-4454" ref_url="https://www.suse.com/security/cve/CVE-2010-4454/" source="CVE"/>
		<reference ref_id="CVE-2010-4462" ref_url="https://www.suse.com/security/cve/CVE-2010-4462/" source="CVE"/>
		<reference ref_id="CVE-2010-4465" ref_url="https://www.suse.com/security/cve/CVE-2010-4465/" source="CVE"/>
		<reference ref_id="CVE-2010-4466" ref_url="https://www.suse.com/security/cve/CVE-2010-4466/" source="CVE"/>
		<reference ref_id="CVE-2010-4473" ref_url="https://www.suse.com/security/cve/CVE-2010-4473/" source="CVE"/>
		<reference ref_id="CVE-2010-4475" ref_url="https://www.suse.com/security/cve/CVE-2010-4475/" source="CVE"/>
		<reference ref_id="CVE-2010-4476" ref_url="https://www.suse.com/security/cve/CVE-2010-4476/" source="CVE"/>
		<reference ref_id="CVE-2011-0311" ref_url="https://www.suse.com/security/cve/CVE-2011-0311/" source="CVE"/>
		<reference ref_id="CVE-2011-0802" ref_url="https://www.suse.com/security/cve/CVE-2011-0802/" source="CVE"/>
		<reference ref_id="CVE-2011-0814" ref_url="https://www.suse.com/security/cve/CVE-2011-0814/" source="CVE"/>
		<reference ref_id="CVE-2011-0815" ref_url="https://www.suse.com/security/cve/CVE-2011-0815/" source="CVE"/>
		<reference ref_id="CVE-2011-0862" ref_url="https://www.suse.com/security/cve/CVE-2011-0862/" source="CVE"/>
		<reference ref_id="CVE-2011-0865" ref_url="https://www.suse.com/security/cve/CVE-2011-0865/" source="CVE"/>
		<reference ref_id="CVE-2011-0866" ref_url="https://www.suse.com/security/cve/CVE-2011-0866/" source="CVE"/>
		<reference ref_id="CVE-2011-0867" ref_url="https://www.suse.com/security/cve/CVE-2011-0867/" source="CVE"/>
		<reference ref_id="CVE-2011-0871" ref_url="https://www.suse.com/security/cve/CVE-2011-0871/" source="CVE"/>
		<reference ref_id="CVE-2011-0872" ref_url="https://www.suse.com/security/cve/CVE-2011-0872/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-3545" ref_url="https://www.suse.com/security/cve/CVE-2011-3545/" source="CVE"/>
		<reference ref_id="CVE-2011-3547" ref_url="https://www.suse.com/security/cve/CVE-2011-3547/" source="CVE"/>
		<reference ref_id="CVE-2011-3548" ref_url="https://www.suse.com/security/cve/CVE-2011-3548/" source="CVE"/>
		<reference ref_id="CVE-2011-3549" ref_url="https://www.suse.com/security/cve/CVE-2011-3549/" source="CVE"/>
		<reference ref_id="CVE-2011-3552" ref_url="https://www.suse.com/security/cve/CVE-2011-3552/" source="CVE"/>
		<reference ref_id="CVE-2011-3556" ref_url="https://www.suse.com/security/cve/CVE-2011-3556/" source="CVE"/>
		<reference ref_id="CVE-2011-3557" ref_url="https://www.suse.com/security/cve/CVE-2011-3557/" source="CVE"/>
		<reference ref_id="CVE-2011-3560" ref_url="https://www.suse.com/security/cve/CVE-2011-3560/" source="CVE"/>
		<reference ref_id="CVE-2011-3563" ref_url="https://www.suse.com/security/cve/CVE-2011-3563/" source="CVE"/>
		<reference ref_id="CVE-2012-0499" ref_url="https://www.suse.com/security/cve/CVE-2012-0499/" source="CVE"/>
		<reference ref_id="CVE-2012-0502" ref_url="https://www.suse.com/security/cve/CVE-2012-0502/" source="CVE"/>
		<reference ref_id="CVE-2012-0503" ref_url="https://www.suse.com/security/cve/CVE-2012-0503/" source="CVE"/>
		<reference ref_id="CVE-2012-0505" ref_url="https://www.suse.com/security/cve/CVE-2012-0505/" source="CVE"/>
		<reference ref_id="CVE-2012-0506" ref_url="https://www.suse.com/security/cve/CVE-2012-0506/" source="CVE"/>
		<reference ref_id="CVE-2012-1531" ref_url="https://www.suse.com/security/cve/CVE-2012-1531/" source="CVE"/>
		<reference ref_id="CVE-2012-1713" ref_url="https://www.suse.com/security/cve/CVE-2012-1713/" source="CVE"/>
		<reference ref_id="CVE-2012-1717" ref_url="https://www.suse.com/security/cve/CVE-2012-1717/" source="CVE"/>
		<reference ref_id="CVE-2012-1718" ref_url="https://www.suse.com/security/cve/CVE-2012-1718/" source="CVE"/>
		<reference ref_id="CVE-2012-1719" ref_url="https://www.suse.com/security/cve/CVE-2012-1719/" source="CVE"/>
		<reference ref_id="CVE-2012-3216" ref_url="https://www.suse.com/security/cve/CVE-2012-3216/" source="CVE"/>
		<reference ref_id="CVE-2012-5073" ref_url="https://www.suse.com/security/cve/CVE-2012-5073/" source="CVE"/>
		<reference ref_id="CVE-2012-5079" ref_url="https://www.suse.com/security/cve/CVE-2012-5079/" source="CVE"/>
		<reference ref_id="CVE-2012-5081" ref_url="https://www.suse.com/security/cve/CVE-2012-5081/" source="CVE"/>
		<reference ref_id="CVE-2012-5083" ref_url="https://www.suse.com/security/cve/CVE-2012-5083/" source="CVE"/>
		<reference ref_id="CVE-2012-5084" ref_url="https://www.suse.com/security/cve/CVE-2012-5084/" source="CVE"/>
		<reference ref_id="CVE-2013-0424" ref_url="https://www.suse.com/security/cve/CVE-2013-0424/" source="CVE"/>
		<reference ref_id="CVE-2013-0425" ref_url="https://www.suse.com/security/cve/CVE-2013-0425/" source="CVE"/>
		<reference ref_id="CVE-2013-0426" ref_url="https://www.suse.com/security/cve/CVE-2013-0426/" source="CVE"/>
		<reference ref_id="CVE-2013-0428" ref_url="https://www.suse.com/security/cve/CVE-2013-0428/" source="CVE"/>
		<reference ref_id="CVE-2013-0432" ref_url="https://www.suse.com/security/cve/CVE-2013-0432/" source="CVE"/>
		<reference ref_id="CVE-2013-0434" ref_url="https://www.suse.com/security/cve/CVE-2013-0434/" source="CVE"/>
		<reference ref_id="CVE-2013-0440" ref_url="https://www.suse.com/security/cve/CVE-2013-0440/" source="CVE"/>
		<reference ref_id="CVE-2013-0442" ref_url="https://www.suse.com/security/cve/CVE-2013-0442/" source="CVE"/>
		<reference ref_id="CVE-2013-0443" ref_url="https://www.suse.com/security/cve/CVE-2013-0443/" source="CVE"/>
		<reference ref_id="CVE-2013-0485" ref_url="https://www.suse.com/security/cve/CVE-2013-0485/" source="CVE"/>
		<reference ref_id="CVE-2013-0809" ref_url="https://www.suse.com/security/cve/CVE-2013-0809/" source="CVE"/>
		<reference ref_id="CVE-2013-1476" ref_url="https://www.suse.com/security/cve/CVE-2013-1476/" source="CVE"/>
		<reference ref_id="CVE-2013-1478" ref_url="https://www.suse.com/security/cve/CVE-2013-1478/" source="CVE"/>
		<reference ref_id="CVE-2013-1480" ref_url="https://www.suse.com/security/cve/CVE-2013-1480/" source="CVE"/>
		<reference ref_id="CVE-2013-1481" ref_url="https://www.suse.com/security/cve/CVE-2013-1481/" source="CVE"/>
		<reference ref_id="CVE-2013-1491" ref_url="https://www.suse.com/security/cve/CVE-2013-1491/" source="CVE"/>
		<reference ref_id="CVE-2013-1493" ref_url="https://www.suse.com/security/cve/CVE-2013-1493/" source="CVE"/>
		<reference ref_id="CVE-2013-1500" ref_url="https://www.suse.com/security/cve/CVE-2013-1500/" source="CVE"/>
		<reference ref_id="CVE-2013-1537" ref_url="https://www.suse.com/security/cve/CVE-2013-1537/" source="CVE"/>
		<reference ref_id="CVE-2013-1557" ref_url="https://www.suse.com/security/cve/CVE-2013-1557/" source="CVE"/>
		<reference ref_id="CVE-2013-1569" ref_url="https://www.suse.com/security/cve/CVE-2013-1569/" source="CVE"/>
		<reference ref_id="CVE-2013-2383" ref_url="https://www.suse.com/security/cve/CVE-2013-2383/" source="CVE"/>
		<reference ref_id="CVE-2013-2384" ref_url="https://www.suse.com/security/cve/CVE-2013-2384/" source="CVE"/>
		<reference ref_id="CVE-2013-2394" ref_url="https://www.suse.com/security/cve/CVE-2013-2394/" source="CVE"/>
		<reference ref_id="CVE-2013-2417" ref_url="https://www.suse.com/security/cve/CVE-2013-2417/" source="CVE"/>
		<reference ref_id="CVE-2013-2419" ref_url="https://www.suse.com/security/cve/CVE-2013-2419/" source="CVE"/>
		<reference ref_id="CVE-2013-2420" ref_url="https://www.suse.com/security/cve/CVE-2013-2420/" source="CVE"/>
		<reference ref_id="CVE-2013-2429" ref_url="https://www.suse.com/security/cve/CVE-2013-2429/" source="CVE"/>
		<reference ref_id="CVE-2013-2430" ref_url="https://www.suse.com/security/cve/CVE-2013-2430/" source="CVE"/>
		<reference ref_id="CVE-2013-2432" ref_url="https://www.suse.com/security/cve/CVE-2013-2432/" source="CVE"/>
		<reference ref_id="CVE-2013-2446" ref_url="https://www.suse.com/security/cve/CVE-2013-2446/" source="CVE"/>
		<reference ref_id="CVE-2013-2447" ref_url="https://www.suse.com/security/cve/CVE-2013-2447/" source="CVE"/>
		<reference ref_id="CVE-2013-2450" ref_url="https://www.suse.com/security/cve/CVE-2013-2450/" source="CVE"/>
		<reference ref_id="CVE-2013-2452" ref_url="https://www.suse.com/security/cve/CVE-2013-2452/" source="CVE"/>
		<reference ref_id="CVE-2013-2456" ref_url="https://www.suse.com/security/cve/CVE-2013-2456/" source="CVE"/>
		<reference ref_id="CVE-2013-2459" ref_url="https://www.suse.com/security/cve/CVE-2013-2459/" source="CVE"/>
		<reference ref_id="CVE-2013-2463" ref_url="https://www.suse.com/security/cve/CVE-2013-2463/" source="CVE"/>
		<reference ref_id="CVE-2013-2464" ref_url="https://www.suse.com/security/cve/CVE-2013-2464/" source="CVE"/>
		<reference ref_id="CVE-2013-2465" ref_url="https://www.suse.com/security/cve/CVE-2013-2465/" source="CVE"/>
		<reference ref_id="CVE-2013-2469" ref_url="https://www.suse.com/security/cve/CVE-2013-2469/" source="CVE"/>
		<reference ref_id="CVE-2013-2470" ref_url="https://www.suse.com/security/cve/CVE-2013-2470/" source="CVE"/>
		<reference ref_id="CVE-2013-2471" ref_url="https://www.suse.com/security/cve/CVE-2013-2471/" source="CVE"/>
		<reference ref_id="CVE-2013-2472" ref_url="https://www.suse.com/security/cve/CVE-2013-2472/" source="CVE"/>
		<reference ref_id="CVE-2013-2473" ref_url="https://www.suse.com/security/cve/CVE-2013-2473/" source="CVE"/>
		<reference ref_id="CVE-2013-3009" ref_url="https://www.suse.com/security/cve/CVE-2013-3009/" source="CVE"/>
		<reference ref_id="CVE-2013-3011" ref_url="https://www.suse.com/security/cve/CVE-2013-3011/" source="CVE"/>
		<reference ref_id="CVE-2013-3012" ref_url="https://www.suse.com/security/cve/CVE-2013-3012/" source="CVE"/>
		<description>

IBM Java 1.4.2 has been updated to SR13-FP18 to fix bugs and security 
issues.

Please see also
http://www.ibm.com/developerworks/java/jdk/alerts/
&lt;http://www.ibm.com/developerworks/java/jdk/alerts/&gt;

Also the following bug has been fixed:

    * mark files in jre/bin and bin/ as executable (bnc#823034)

Security Issue references:

    * CVE-2013-3009
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3009&gt;
    * CVE-2013-3011
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3011&gt;
    * CVE-2013-3012
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3012&gt;
    * CVE-2013-2469
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2469&gt;
    * CVE-2013-2465
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2465&gt;
    * CVE-2013-2464
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2464&gt;
    * CVE-2013-2463
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2463&gt;
    * CVE-2013-2473
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2473&gt;
    * CVE-2013-2472
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2472&gt;
    * CVE-2013-2471
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2471&gt;
    * CVE-2013-2470
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2470&gt;
    * CVE-2013-2459
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2459&gt;
    * CVE-2013-2456
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2456&gt;
    * CVE-2013-2447
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2447&gt;
    * CVE-2013-2452
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2452&gt;
    * CVE-2013-2446
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2446&gt;
    * CVE-2013-2450
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2450&gt;
    * CVE-2013-1500
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1500&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-07-23"/>
	<updated date="2013-07-23"/>
	<bugzilla href="https://bugzilla.suse.com/494536">SUSE bug 494536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/590826">SUSE bug 590826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/592934">SUSE bug 592934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/594791">SUSE bug 594791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/603353">SUSE bug 603353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/646906">SUSE bug 646906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/663953">SUSE bug 663953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/666744">SUSE bug 666744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/673738">SUSE bug 673738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/690583">SUSE bug 690583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711195">SUSE bug 711195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/739256">SUSE bug 739256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758651">SUSE bug 758651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763805">SUSE bug 763805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778629">SUSE bug 778629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809321">SUSE bug 809321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813939">SUSE bug 813939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823034">SUSE bug 823034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0084/">CVE-2010-0084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0084">CVE-2010-0084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0085/">CVE-2010-0085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0085">CVE-2010-0085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0087/">CVE-2010-0087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0087">CVE-2010-0087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0088/">CVE-2010-0088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0088">CVE-2010-0088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0089/">CVE-2010-0089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0089">CVE-2010-0089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0091/">CVE-2010-0091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0091">CVE-2010-0091 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0095/">CVE-2010-0095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0095">CVE-2010-0095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0839/">CVE-2010-0839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0839">CVE-2010-0839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0840/">CVE-2010-0840 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-0840">CVE-2010-0840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0841/">CVE-2010-0841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0841">CVE-2010-0841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0842/">CVE-2010-0842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0842">CVE-2010-0842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0843/">CVE-2010-0843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0843">CVE-2010-0843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0844/">CVE-2010-0844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0844">CVE-2010-0844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0846/">CVE-2010-0846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0846">CVE-2010-0846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0847/">CVE-2010-0847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0847">CVE-2010-0847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0848/">CVE-2010-0848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0848">CVE-2010-0848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0849/">CVE-2010-0849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0849">CVE-2010-0849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1321">CVE-2010-1321 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3541/">CVE-2010-3541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3541">CVE-2010-3541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3548/">CVE-2010-3548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3548">CVE-2010-3548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3549/">CVE-2010-3549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3549">CVE-2010-3549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3551/">CVE-2010-3551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3551">CVE-2010-3551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3553/">CVE-2010-3553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3553">CVE-2010-3553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3556/">CVE-2010-3556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3556">CVE-2010-3556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3557/">CVE-2010-3557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3557">CVE-2010-3557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3562/">CVE-2010-3562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3562">CVE-2010-3562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3565/">CVE-2010-3565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3565">CVE-2010-3565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3568/">CVE-2010-3568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3568">CVE-2010-3568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3569/">CVE-2010-3569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3569">CVE-2010-3569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3571/">CVE-2010-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3571">CVE-2010-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3572/">CVE-2010-3572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3572">CVE-2010-3572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3574/">CVE-2010-3574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3574">CVE-2010-3574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4447/">CVE-2010-4447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4447">CVE-2010-4447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4448/">CVE-2010-4448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4448">CVE-2010-4448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4454/">CVE-2010-4454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4454">CVE-2010-4454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4462/">CVE-2010-4462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4462">CVE-2010-4462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4465/">CVE-2010-4465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4465">CVE-2010-4465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4466/">CVE-2010-4466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4466">CVE-2010-4466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4473/">CVE-2010-4473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4473">CVE-2010-4473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4475/">CVE-2010-4475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4475">CVE-2010-4475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4476/">CVE-2010-4476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4476">CVE-2010-4476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0311/">CVE-2011-0311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0311">CVE-2011-0311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0802/">CVE-2011-0802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0802">CVE-2011-0802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0814/">CVE-2011-0814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0814">CVE-2011-0814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0815/">CVE-2011-0815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0815">CVE-2011-0815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0862/">CVE-2011-0862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0862">CVE-2011-0862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0865/">CVE-2011-0865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0865">CVE-2011-0865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0866/">CVE-2011-0866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0866">CVE-2011-0866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0867/">CVE-2011-0867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0867">CVE-2011-0867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0871/">CVE-2011-0871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0871">CVE-2011-0871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0872/">CVE-2011-0872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0872">CVE-2011-0872 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3545/">CVE-2011-3545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3545">CVE-2011-3545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3547/">CVE-2011-3547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3547">CVE-2011-3547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3548/">CVE-2011-3548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3548">CVE-2011-3548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3549/">CVE-2011-3549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3549">CVE-2011-3549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3552/">CVE-2011-3552 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3552">CVE-2011-3552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3556/">CVE-2011-3556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3556">CVE-2011-3556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3557/">CVE-2011-3557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3557">CVE-2011-3557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3560/">CVE-2011-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3560">CVE-2011-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3563/">CVE-2011-3563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3563">CVE-2011-3563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0499/">CVE-2012-0499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0499">CVE-2012-0499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0502/">CVE-2012-0502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0502">CVE-2012-0502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0503/">CVE-2012-0503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0503">CVE-2012-0503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0505/">CVE-2012-0505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0505">CVE-2012-0505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0506/">CVE-2012-0506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0506">CVE-2012-0506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1531/">CVE-2012-1531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1531">CVE-2012-1531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1713/">CVE-2012-1713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1713">CVE-2012-1713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1717/">CVE-2012-1717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1717">CVE-2012-1717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1718/">CVE-2012-1718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1718">CVE-2012-1718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1719/">CVE-2012-1719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1719">CVE-2012-1719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3216/">CVE-2012-3216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3216">CVE-2012-3216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5073/">CVE-2012-5073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5073">CVE-2012-5073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5079/">CVE-2012-5079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5079">CVE-2012-5079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5081/">CVE-2012-5081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5081">CVE-2012-5081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5083/">CVE-2012-5083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5083">CVE-2012-5083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5084/">CVE-2012-5084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5084">CVE-2012-5084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0424/">CVE-2013-0424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0424">CVE-2013-0424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0425/">CVE-2013-0425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0425">CVE-2013-0425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0426/">CVE-2013-0426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0426">CVE-2013-0426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0428/">CVE-2013-0428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0428">CVE-2013-0428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0432/">CVE-2013-0432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0432">CVE-2013-0432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0434/">CVE-2013-0434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0434">CVE-2013-0434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0440/">CVE-2013-0440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0440">CVE-2013-0440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0442/">CVE-2013-0442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0442">CVE-2013-0442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0443/">CVE-2013-0443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0443">CVE-2013-0443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0485/">CVE-2013-0485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0485">CVE-2013-0485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0809/">CVE-2013-0809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0809">CVE-2013-0809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1476/">CVE-2013-1476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1476">CVE-2013-1476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1478/">CVE-2013-1478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1478">CVE-2013-1478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1480/">CVE-2013-1480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1480">CVE-2013-1480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1481/">CVE-2013-1481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1481">CVE-2013-1481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1491/">CVE-2013-1491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1491">CVE-2013-1491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1493/">CVE-2013-1493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1493">CVE-2013-1493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1500/">CVE-2013-1500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1500">CVE-2013-1500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1537/">CVE-2013-1537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1537">CVE-2013-1537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1557/">CVE-2013-1557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1557">CVE-2013-1557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1569/">CVE-2013-1569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1569">CVE-2013-1569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2383/">CVE-2013-2383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2383">CVE-2013-2383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2384/">CVE-2013-2384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2384">CVE-2013-2384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2394/">CVE-2013-2394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2394">CVE-2013-2394 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2417/">CVE-2013-2417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2417">CVE-2013-2417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2419/">CVE-2013-2419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2419">CVE-2013-2419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2420/">CVE-2013-2420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2420">CVE-2013-2420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2429/">CVE-2013-2429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2429">CVE-2013-2429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2430/">CVE-2013-2430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2430">CVE-2013-2430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2432/">CVE-2013-2432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2432">CVE-2013-2432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2446/">CVE-2013-2446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2446">CVE-2013-2446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2447/">CVE-2013-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2447">CVE-2013-2447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2450/">CVE-2013-2450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2450">CVE-2013-2450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2452/">CVE-2013-2452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2452">CVE-2013-2452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2456/">CVE-2013-2456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2456">CVE-2013-2456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2459/">CVE-2013-2459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2459">CVE-2013-2459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2463/">CVE-2013-2463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2463">CVE-2013-2463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2464/">CVE-2013-2464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2464">CVE-2013-2464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2465/">CVE-2013-2465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2465">CVE-2013-2465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2469/">CVE-2013-2469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2469">CVE-2013-2469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2470/">CVE-2013-2470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2470">CVE-2013-2470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2471/">CVE-2013-2471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2471">CVE-2013-2471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2472/">CVE-2013-2472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2472">CVE-2013-2472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2473/">CVE-2013-2473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2473">CVE-2013-2473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3009/">CVE-2013-3009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3009">CVE-2013-3009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3011/">CVE-2013-3011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3011">CVE-2013-3011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3012/">CVE-2013-3012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3012">CVE-2013-3012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991462" comment="java-1_4_2-ibm-1.4.2_sr13.18-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576217" comment="java-1_4_2-ibm-jdbc-1.4.2_sr13.18-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576218" comment="java-1_4_2-ibm-plugin-1.4.2_sr13.18-0.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991462" comment="java-1_4_2-ibm-1.4.2_sr13.18-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576217" comment="java-1_4_2-ibm-jdbc-1.4.2_sr13.18-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576218" comment="java-1_4_2-ibm-plugin-1.4.2_sr13.18-0.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217222" version="1" class="patch">
	<metadata>
		<title>Security update for IBM Java</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="592934" ref_url="https://bugzilla.suse.com/592934" source="BUGZILLA"/>
		<reference ref_id="603283" ref_url="https://bugzilla.suse.com/603283" source="BUGZILLA"/>
		<reference ref_id="624224" ref_url="https://bugzilla.suse.com/624224" source="BUGZILLA"/>
		<reference ref_id="659926" ref_url="https://bugzilla.suse.com/659926" source="BUGZILLA"/>
		<reference ref_id="666744" ref_url="https://bugzilla.suse.com/666744" source="BUGZILLA"/>
		<reference ref_id="673738" ref_url="https://bugzilla.suse.com/673738" source="BUGZILLA"/>
		<reference ref_id="673798" ref_url="https://bugzilla.suse.com/673798" source="BUGZILLA"/>
		<reference ref_id="705423" ref_url="https://bugzilla.suse.com/705423" source="BUGZILLA"/>
		<reference ref_id="735637" ref_url="https://bugzilla.suse.com/735637" source="BUGZILLA"/>
		<reference ref_id="739248" ref_url="https://bugzilla.suse.com/739248" source="BUGZILLA"/>
		<reference ref_id="752306" ref_url="https://bugzilla.suse.com/752306" source="BUGZILLA"/>
		<reference ref_id="758470" ref_url="https://bugzilla.suse.com/758470" source="BUGZILLA"/>
		<reference ref_id="771808" ref_url="https://bugzilla.suse.com/771808" source="BUGZILLA"/>
		<reference ref_id="773021" ref_url="https://bugzilla.suse.com/773021" source="BUGZILLA"/>
		<reference ref_id="778629" ref_url="https://bugzilla.suse.com/778629" source="BUGZILLA"/>
		<reference ref_id="785631" ref_url="https://bugzilla.suse.com/785631" source="BUGZILLA"/>
		<reference ref_id="788750" ref_url="https://bugzilla.suse.com/788750" source="BUGZILLA"/>
		<reference ref_id="798535" ref_url="https://bugzilla.suse.com/798535" source="BUGZILLA"/>
		<reference ref_id="808625" ref_url="https://bugzilla.suse.com/808625" source="BUGZILLA"/>
		<reference ref_id="813939" ref_url="https://bugzilla.suse.com/813939" source="BUGZILLA"/>
		<reference ref_id="817062" ref_url="https://bugzilla.suse.com/817062" source="BUGZILLA"/>
		<reference ref_id="819288" ref_url="https://bugzilla.suse.com/819288" source="BUGZILLA"/>
		<reference ref_id="823034" ref_url="https://bugzilla.suse.com/823034" source="BUGZILLA"/>
		<reference ref_id="829212" ref_url="https://bugzilla.suse.com/829212" source="BUGZILLA"/>
		<reference ref_id="849212" ref_url="https://bugzilla.suse.com/849212" source="BUGZILLA"/>
		<reference ref_id="862064" ref_url="https://bugzilla.suse.com/862064" source="BUGZILLA"/>
		<reference ref_id="877430" ref_url="https://bugzilla.suse.com/877430" source="BUGZILLA"/>
		<reference ref_id="891700" ref_url="https://bugzilla.suse.com/891700" source="BUGZILLA"/>
		<reference ref_id="901223" ref_url="https://bugzilla.suse.com/901223" source="BUGZILLA"/>
		<reference ref_id="904889" ref_url="https://bugzilla.suse.com/904889" source="BUGZILLA"/>
		<reference ref_id="912434" ref_url="https://bugzilla.suse.com/912434" source="BUGZILLA"/>
		<reference ref_id="912447" ref_url="https://bugzilla.suse.com/912447" source="BUGZILLA"/>
		<reference ref_id="916265" ref_url="https://bugzilla.suse.com/916265" source="BUGZILLA"/>
		<reference ref_id="916266" ref_url="https://bugzilla.suse.com/916266" source="BUGZILLA"/>
		<reference ref_id="930365" ref_url="https://bugzilla.suse.com/930365" source="BUGZILLA"/>
		<reference ref_id="931702" ref_url="https://bugzilla.suse.com/931702" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-0084" ref_url="https://www.suse.com/security/cve/CVE-2010-0084/" source="CVE"/>
		<reference ref_id="CVE-2010-0085" ref_url="https://www.suse.com/security/cve/CVE-2010-0085/" source="CVE"/>
		<reference ref_id="CVE-2010-0087" ref_url="https://www.suse.com/security/cve/CVE-2010-0087/" source="CVE"/>
		<reference ref_id="CVE-2010-0088" ref_url="https://www.suse.com/security/cve/CVE-2010-0088/" source="CVE"/>
		<reference ref_id="CVE-2010-0089" ref_url="https://www.suse.com/security/cve/CVE-2010-0089/" source="CVE"/>
		<reference ref_id="CVE-2010-0090" ref_url="https://www.suse.com/security/cve/CVE-2010-0090/" source="CVE"/>
		<reference ref_id="CVE-2010-0091" ref_url="https://www.suse.com/security/cve/CVE-2010-0091/" source="CVE"/>
		<reference ref_id="CVE-2010-0092" ref_url="https://www.suse.com/security/cve/CVE-2010-0092/" source="CVE"/>
		<reference ref_id="CVE-2010-0094" ref_url="https://www.suse.com/security/cve/CVE-2010-0094/" source="CVE"/>
		<reference ref_id="CVE-2010-0095" ref_url="https://www.suse.com/security/cve/CVE-2010-0095/" source="CVE"/>
		<reference ref_id="CVE-2010-0771" ref_url="https://www.suse.com/security/cve/CVE-2010-0771/" source="CVE"/>
		<reference ref_id="CVE-2010-0837" ref_url="https://www.suse.com/security/cve/CVE-2010-0837/" source="CVE"/>
		<reference ref_id="CVE-2010-0838" ref_url="https://www.suse.com/security/cve/CVE-2010-0838/" source="CVE"/>
		<reference ref_id="CVE-2010-0839" ref_url="https://www.suse.com/security/cve/CVE-2010-0839/" source="CVE"/>
		<reference ref_id="CVE-2010-0840" ref_url="https://www.suse.com/security/cve/CVE-2010-0840/" source="CVE"/>
		<reference ref_id="CVE-2010-0841" ref_url="https://www.suse.com/security/cve/CVE-2010-0841/" source="CVE"/>
		<reference ref_id="CVE-2010-0842" ref_url="https://www.suse.com/security/cve/CVE-2010-0842/" source="CVE"/>
		<reference ref_id="CVE-2010-0843" ref_url="https://www.suse.com/security/cve/CVE-2010-0843/" source="CVE"/>
		<reference ref_id="CVE-2010-0844" ref_url="https://www.suse.com/security/cve/CVE-2010-0844/" source="CVE"/>
		<reference ref_id="CVE-2010-0846" ref_url="https://www.suse.com/security/cve/CVE-2010-0846/" source="CVE"/>
		<reference ref_id="CVE-2010-0847" ref_url="https://www.suse.com/security/cve/CVE-2010-0847/" source="CVE"/>
		<reference ref_id="CVE-2010-0848" ref_url="https://www.suse.com/security/cve/CVE-2010-0848/" source="CVE"/>
		<reference ref_id="CVE-2010-0849" ref_url="https://www.suse.com/security/cve/CVE-2010-0849/" source="CVE"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-3541" ref_url="https://www.suse.com/security/cve/CVE-2010-3541/" source="CVE"/>
		<reference ref_id="CVE-2010-3548" ref_url="https://www.suse.com/security/cve/CVE-2010-3548/" source="CVE"/>
		<reference ref_id="CVE-2010-3549" ref_url="https://www.suse.com/security/cve/CVE-2010-3549/" source="CVE"/>
		<reference ref_id="CVE-2010-3550" ref_url="https://www.suse.com/security/cve/CVE-2010-3550/" source="CVE"/>
		<reference ref_id="CVE-2010-3551" ref_url="https://www.suse.com/security/cve/CVE-2010-3551/" source="CVE"/>
		<reference ref_id="CVE-2010-3553" ref_url="https://www.suse.com/security/cve/CVE-2010-3553/" source="CVE"/>
		<reference ref_id="CVE-2010-3555" ref_url="https://www.suse.com/security/cve/CVE-2010-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-3556" ref_url="https://www.suse.com/security/cve/CVE-2010-3556/" source="CVE"/>
		<reference ref_id="CVE-2010-3557" ref_url="https://www.suse.com/security/cve/CVE-2010-3557/" source="CVE"/>
		<reference ref_id="CVE-2010-3558" ref_url="https://www.suse.com/security/cve/CVE-2010-3558/" source="CVE"/>
		<reference ref_id="CVE-2010-3559" ref_url="https://www.suse.com/security/cve/CVE-2010-3559/" source="CVE"/>
		<reference ref_id="CVE-2010-3560" ref_url="https://www.suse.com/security/cve/CVE-2010-3560/" source="CVE"/>
		<reference ref_id="CVE-2010-3562" ref_url="https://www.suse.com/security/cve/CVE-2010-3562/" source="CVE"/>
		<reference ref_id="CVE-2010-3563" ref_url="https://www.suse.com/security/cve/CVE-2010-3563/" source="CVE"/>
		<reference ref_id="CVE-2010-3565" ref_url="https://www.suse.com/security/cve/CVE-2010-3565/" source="CVE"/>
		<reference ref_id="CVE-2010-3566" ref_url="https://www.suse.com/security/cve/CVE-2010-3566/" source="CVE"/>
		<reference ref_id="CVE-2010-3567" ref_url="https://www.suse.com/security/cve/CVE-2010-3567/" source="CVE"/>
		<reference ref_id="CVE-2010-3568" ref_url="https://www.suse.com/security/cve/CVE-2010-3568/" source="CVE"/>
		<reference ref_id="CVE-2010-3569" ref_url="https://www.suse.com/security/cve/CVE-2010-3569/" source="CVE"/>
		<reference ref_id="CVE-2010-3571" ref_url="https://www.suse.com/security/cve/CVE-2010-3571/" source="CVE"/>
		<reference ref_id="CVE-2010-3572" ref_url="https://www.suse.com/security/cve/CVE-2010-3572/" source="CVE"/>
		<reference ref_id="CVE-2010-3573" ref_url="https://www.suse.com/security/cve/CVE-2010-3573/" source="CVE"/>
		<reference ref_id="CVE-2010-3574" ref_url="https://www.suse.com/security/cve/CVE-2010-3574/" source="CVE"/>
		<reference ref_id="CVE-2010-4422" ref_url="https://www.suse.com/security/cve/CVE-2010-4422/" source="CVE"/>
		<reference ref_id="CVE-2010-4447" ref_url="https://www.suse.com/security/cve/CVE-2010-4447/" source="CVE"/>
		<reference ref_id="CVE-2010-4448" ref_url="https://www.suse.com/security/cve/CVE-2010-4448/" source="CVE"/>
		<reference ref_id="CVE-2010-4452" ref_url="https://www.suse.com/security/cve/CVE-2010-4452/" source="CVE"/>
		<reference ref_id="CVE-2010-4454" ref_url="https://www.suse.com/security/cve/CVE-2010-4454/" source="CVE"/>
		<reference ref_id="CVE-2010-4462" ref_url="https://www.suse.com/security/cve/CVE-2010-4462/" source="CVE"/>
		<reference ref_id="CVE-2010-4463" ref_url="https://www.suse.com/security/cve/CVE-2010-4463/" source="CVE"/>
		<reference ref_id="CVE-2010-4465" ref_url="https://www.suse.com/security/cve/CVE-2010-4465/" source="CVE"/>
		<reference ref_id="CVE-2010-4466" ref_url="https://www.suse.com/security/cve/CVE-2010-4466/" source="CVE"/>
		<reference ref_id="CVE-2010-4467" ref_url="https://www.suse.com/security/cve/CVE-2010-4467/" source="CVE"/>
		<reference ref_id="CVE-2010-4468" ref_url="https://www.suse.com/security/cve/CVE-2010-4468/" source="CVE"/>
		<reference ref_id="CVE-2010-4471" ref_url="https://www.suse.com/security/cve/CVE-2010-4471/" source="CVE"/>
		<reference ref_id="CVE-2010-4473" ref_url="https://www.suse.com/security/cve/CVE-2010-4473/" source="CVE"/>
		<reference ref_id="CVE-2010-4475" ref_url="https://www.suse.com/security/cve/CVE-2010-4475/" source="CVE"/>
		<reference ref_id="CVE-2010-4476" ref_url="https://www.suse.com/security/cve/CVE-2010-4476/" source="CVE"/>
		<reference ref_id="CVE-2011-0786" ref_url="https://www.suse.com/security/cve/CVE-2011-0786/" source="CVE"/>
		<reference ref_id="CVE-2011-0788" ref_url="https://www.suse.com/security/cve/CVE-2011-0788/" source="CVE"/>
		<reference ref_id="CVE-2011-0802" ref_url="https://www.suse.com/security/cve/CVE-2011-0802/" source="CVE"/>
		<reference ref_id="CVE-2011-0814" ref_url="https://www.suse.com/security/cve/CVE-2011-0814/" source="CVE"/>
		<reference ref_id="CVE-2011-0815" ref_url="https://www.suse.com/security/cve/CVE-2011-0815/" source="CVE"/>
		<reference ref_id="CVE-2011-0817" ref_url="https://www.suse.com/security/cve/CVE-2011-0817/" source="CVE"/>
		<reference ref_id="CVE-2011-0862" ref_url="https://www.suse.com/security/cve/CVE-2011-0862/" source="CVE"/>
		<reference ref_id="CVE-2011-0863" ref_url="https://www.suse.com/security/cve/CVE-2011-0863/" source="CVE"/>
		<reference ref_id="CVE-2011-0865" ref_url="https://www.suse.com/security/cve/CVE-2011-0865/" source="CVE"/>
		<reference ref_id="CVE-2011-0866" ref_url="https://www.suse.com/security/cve/CVE-2011-0866/" source="CVE"/>
		<reference ref_id="CVE-2011-0867" ref_url="https://www.suse.com/security/cve/CVE-2011-0867/" source="CVE"/>
		<reference ref_id="CVE-2011-0868" ref_url="https://www.suse.com/security/cve/CVE-2011-0868/" source="CVE"/>
		<reference ref_id="CVE-2011-0869" ref_url="https://www.suse.com/security/cve/CVE-2011-0869/" source="CVE"/>
		<reference ref_id="CVE-2011-0871" ref_url="https://www.suse.com/security/cve/CVE-2011-0871/" source="CVE"/>
		<reference ref_id="CVE-2011-0872" ref_url="https://www.suse.com/security/cve/CVE-2011-0872/" source="CVE"/>
		<reference ref_id="CVE-2011-0873" ref_url="https://www.suse.com/security/cve/CVE-2011-0873/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-3516" ref_url="https://www.suse.com/security/cve/CVE-2011-3516/" source="CVE"/>
		<reference ref_id="CVE-2011-3521" ref_url="https://www.suse.com/security/cve/CVE-2011-3521/" source="CVE"/>
		<reference ref_id="CVE-2011-3544" ref_url="https://www.suse.com/security/cve/CVE-2011-3544/" source="CVE"/>
		<reference ref_id="CVE-2011-3545" ref_url="https://www.suse.com/security/cve/CVE-2011-3545/" source="CVE"/>
		<reference ref_id="CVE-2011-3546" ref_url="https://www.suse.com/security/cve/CVE-2011-3546/" source="CVE"/>
		<reference ref_id="CVE-2011-3547" ref_url="https://www.suse.com/security/cve/CVE-2011-3547/" source="CVE"/>
		<reference ref_id="CVE-2011-3548" ref_url="https://www.suse.com/security/cve/CVE-2011-3548/" source="CVE"/>
		<reference ref_id="CVE-2011-3549" ref_url="https://www.suse.com/security/cve/CVE-2011-3549/" source="CVE"/>
		<reference ref_id="CVE-2011-3550" ref_url="https://www.suse.com/security/cve/CVE-2011-3550/" source="CVE"/>
		<reference ref_id="CVE-2011-3551" ref_url="https://www.suse.com/security/cve/CVE-2011-3551/" source="CVE"/>
		<reference ref_id="CVE-2011-3552" ref_url="https://www.suse.com/security/cve/CVE-2011-3552/" source="CVE"/>
		<reference ref_id="CVE-2011-3553" ref_url="https://www.suse.com/security/cve/CVE-2011-3553/" source="CVE"/>
		<reference ref_id="CVE-2011-3554" ref_url="https://www.suse.com/security/cve/CVE-2011-3554/" source="CVE"/>
		<reference ref_id="CVE-2011-3556" ref_url="https://www.suse.com/security/cve/CVE-2011-3556/" source="CVE"/>
		<reference ref_id="CVE-2011-3557" ref_url="https://www.suse.com/security/cve/CVE-2011-3557/" source="CVE"/>
		<reference ref_id="CVE-2011-3560" ref_url="https://www.suse.com/security/cve/CVE-2011-3560/" source="CVE"/>
		<reference ref_id="CVE-2011-3561" ref_url="https://www.suse.com/security/cve/CVE-2011-3561/" source="CVE"/>
		<reference ref_id="CVE-2011-3563" ref_url="https://www.suse.com/security/cve/CVE-2011-3563/" source="CVE"/>
		<reference ref_id="CVE-2011-5035" ref_url="https://www.suse.com/security/cve/CVE-2011-5035/" source="CVE"/>
		<reference ref_id="CVE-2012-0497" ref_url="https://www.suse.com/security/cve/CVE-2012-0497/" source="CVE"/>
		<reference ref_id="CVE-2012-0498" ref_url="https://www.suse.com/security/cve/CVE-2012-0498/" source="CVE"/>
		<reference ref_id="CVE-2012-0499" ref_url="https://www.suse.com/security/cve/CVE-2012-0499/" source="CVE"/>
		<reference ref_id="CVE-2012-0500" ref_url="https://www.suse.com/security/cve/CVE-2012-0500/" source="CVE"/>
		<reference ref_id="CVE-2012-0501" ref_url="https://www.suse.com/security/cve/CVE-2012-0501/" source="CVE"/>
		<reference ref_id="CVE-2012-0502" ref_url="https://www.suse.com/security/cve/CVE-2012-0502/" source="CVE"/>
		<reference ref_id="CVE-2012-0503" ref_url="https://www.suse.com/security/cve/CVE-2012-0503/" source="CVE"/>
		<reference ref_id="CVE-2012-0505" ref_url="https://www.suse.com/security/cve/CVE-2012-0505/" source="CVE"/>
		<reference ref_id="CVE-2012-0506" ref_url="https://www.suse.com/security/cve/CVE-2012-0506/" source="CVE"/>
		<reference ref_id="CVE-2012-0507" ref_url="https://www.suse.com/security/cve/CVE-2012-0507/" source="CVE"/>
		<reference ref_id="CVE-2012-1531" ref_url="https://www.suse.com/security/cve/CVE-2012-1531/" source="CVE"/>
		<reference ref_id="CVE-2012-1532" ref_url="https://www.suse.com/security/cve/CVE-2012-1532/" source="CVE"/>
		<reference ref_id="CVE-2012-1533" ref_url="https://www.suse.com/security/cve/CVE-2012-1533/" source="CVE"/>
		<reference ref_id="CVE-2012-1541" ref_url="https://www.suse.com/security/cve/CVE-2012-1541/" source="CVE"/>
		<reference ref_id="CVE-2012-3143" ref_url="https://www.suse.com/security/cve/CVE-2012-3143/" source="CVE"/>
		<reference ref_id="CVE-2012-3159" ref_url="https://www.suse.com/security/cve/CVE-2012-3159/" source="CVE"/>
		<reference ref_id="CVE-2012-3213" ref_url="https://www.suse.com/security/cve/CVE-2012-3213/" source="CVE"/>
		<reference ref_id="CVE-2012-3216" ref_url="https://www.suse.com/security/cve/CVE-2012-3216/" source="CVE"/>
		<reference ref_id="CVE-2012-3342" ref_url="https://www.suse.com/security/cve/CVE-2012-3342/" source="CVE"/>
		<reference ref_id="CVE-2012-5068" ref_url="https://www.suse.com/security/cve/CVE-2012-5068/" source="CVE"/>
		<reference ref_id="CVE-2012-5069" ref_url="https://www.suse.com/security/cve/CVE-2012-5069/" source="CVE"/>
		<reference ref_id="CVE-2012-5071" ref_url="https://www.suse.com/security/cve/CVE-2012-5071/" source="CVE"/>
		<reference ref_id="CVE-2012-5072" ref_url="https://www.suse.com/security/cve/CVE-2012-5072/" source="CVE"/>
		<reference ref_id="CVE-2012-5073" ref_url="https://www.suse.com/security/cve/CVE-2012-5073/" source="CVE"/>
		<reference ref_id="CVE-2012-5075" ref_url="https://www.suse.com/security/cve/CVE-2012-5075/" source="CVE"/>
		<reference ref_id="CVE-2012-5079" ref_url="https://www.suse.com/security/cve/CVE-2012-5079/" source="CVE"/>
		<reference ref_id="CVE-2012-5081" ref_url="https://www.suse.com/security/cve/CVE-2012-5081/" source="CVE"/>
		<reference ref_id="CVE-2012-5083" ref_url="https://www.suse.com/security/cve/CVE-2012-5083/" source="CVE"/>
		<reference ref_id="CVE-2012-5084" ref_url="https://www.suse.com/security/cve/CVE-2012-5084/" source="CVE"/>
		<reference ref_id="CVE-2012-5089" ref_url="https://www.suse.com/security/cve/CVE-2012-5089/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-0351" ref_url="https://www.suse.com/security/cve/CVE-2013-0351/" source="CVE"/>
		<reference ref_id="CVE-2013-0401" ref_url="https://www.suse.com/security/cve/CVE-2013-0401/" source="CVE"/>
		<reference ref_id="CVE-2013-0409" ref_url="https://www.suse.com/security/cve/CVE-2013-0409/" source="CVE"/>
		<reference ref_id="CVE-2013-0419" ref_url="https://www.suse.com/security/cve/CVE-2013-0419/" source="CVE"/>
		<reference ref_id="CVE-2013-0423" ref_url="https://www.suse.com/security/cve/CVE-2013-0423/" source="CVE"/>
		<reference ref_id="CVE-2013-0424" ref_url="https://www.suse.com/security/cve/CVE-2013-0424/" source="CVE"/>
		<reference ref_id="CVE-2013-0425" ref_url="https://www.suse.com/security/cve/CVE-2013-0425/" source="CVE"/>
		<reference ref_id="CVE-2013-0426" ref_url="https://www.suse.com/security/cve/CVE-2013-0426/" source="CVE"/>
		<reference ref_id="CVE-2013-0427" ref_url="https://www.suse.com/security/cve/CVE-2013-0427/" source="CVE"/>
		<reference ref_id="CVE-2013-0428" ref_url="https://www.suse.com/security/cve/CVE-2013-0428/" source="CVE"/>
		<reference ref_id="CVE-2013-0432" ref_url="https://www.suse.com/security/cve/CVE-2013-0432/" source="CVE"/>
		<reference ref_id="CVE-2013-0433" ref_url="https://www.suse.com/security/cve/CVE-2013-0433/" source="CVE"/>
		<reference ref_id="CVE-2013-0434" ref_url="https://www.suse.com/security/cve/CVE-2013-0434/" source="CVE"/>
		<reference ref_id="CVE-2013-0435" ref_url="https://www.suse.com/security/cve/CVE-2013-0435/" source="CVE"/>
		<reference ref_id="CVE-2013-0438" ref_url="https://www.suse.com/security/cve/CVE-2013-0438/" source="CVE"/>
		<reference ref_id="CVE-2013-0440" ref_url="https://www.suse.com/security/cve/CVE-2013-0440/" source="CVE"/>
		<reference ref_id="CVE-2013-0441" ref_url="https://www.suse.com/security/cve/CVE-2013-0441/" source="CVE"/>
		<reference ref_id="CVE-2013-0442" ref_url="https://www.suse.com/security/cve/CVE-2013-0442/" source="CVE"/>
		<reference ref_id="CVE-2013-0443" ref_url="https://www.suse.com/security/cve/CVE-2013-0443/" source="CVE"/>
		<reference ref_id="CVE-2013-0445" ref_url="https://www.suse.com/security/cve/CVE-2013-0445/" source="CVE"/>
		<reference ref_id="CVE-2013-0446" ref_url="https://www.suse.com/security/cve/CVE-2013-0446/" source="CVE"/>
		<reference ref_id="CVE-2013-0450" ref_url="https://www.suse.com/security/cve/CVE-2013-0450/" source="CVE"/>
		<reference ref_id="CVE-2013-0485" ref_url="https://www.suse.com/security/cve/CVE-2013-0485/" source="CVE"/>
		<reference ref_id="CVE-2013-0809" ref_url="https://www.suse.com/security/cve/CVE-2013-0809/" source="CVE"/>
		<reference ref_id="CVE-2013-1473" ref_url="https://www.suse.com/security/cve/CVE-2013-1473/" source="CVE"/>
		<reference ref_id="CVE-2013-1476" ref_url="https://www.suse.com/security/cve/CVE-2013-1476/" source="CVE"/>
		<reference ref_id="CVE-2013-1478" ref_url="https://www.suse.com/security/cve/CVE-2013-1478/" source="CVE"/>
		<reference ref_id="CVE-2013-1480" ref_url="https://www.suse.com/security/cve/CVE-2013-1480/" source="CVE"/>
		<reference ref_id="CVE-2013-1481" ref_url="https://www.suse.com/security/cve/CVE-2013-1481/" source="CVE"/>
		<reference ref_id="CVE-2013-1486" ref_url="https://www.suse.com/security/cve/CVE-2013-1486/" source="CVE"/>
		<reference ref_id="CVE-2013-1487" ref_url="https://www.suse.com/security/cve/CVE-2013-1487/" source="CVE"/>
		<reference ref_id="CVE-2013-1491" ref_url="https://www.suse.com/security/cve/CVE-2013-1491/" source="CVE"/>
		<reference ref_id="CVE-2013-1493" ref_url="https://www.suse.com/security/cve/CVE-2013-1493/" source="CVE"/>
		<reference ref_id="CVE-2013-1500" ref_url="https://www.suse.com/security/cve/CVE-2013-1500/" source="CVE"/>
		<reference ref_id="CVE-2013-1537" ref_url="https://www.suse.com/security/cve/CVE-2013-1537/" source="CVE"/>
		<reference ref_id="CVE-2013-1540" ref_url="https://www.suse.com/security/cve/CVE-2013-1540/" source="CVE"/>
		<reference ref_id="CVE-2013-1557" ref_url="https://www.suse.com/security/cve/CVE-2013-1557/" source="CVE"/>
		<reference ref_id="CVE-2013-1563" ref_url="https://www.suse.com/security/cve/CVE-2013-1563/" source="CVE"/>
		<reference ref_id="CVE-2013-1569" ref_url="https://www.suse.com/security/cve/CVE-2013-1569/" source="CVE"/>
		<reference ref_id="CVE-2013-1571" ref_url="https://www.suse.com/security/cve/CVE-2013-1571/" source="CVE"/>
		<reference ref_id="CVE-2013-2383" ref_url="https://www.suse.com/security/cve/CVE-2013-2383/" source="CVE"/>
		<reference ref_id="CVE-2013-2384" ref_url="https://www.suse.com/security/cve/CVE-2013-2384/" source="CVE"/>
		<reference ref_id="CVE-2013-2394" ref_url="https://www.suse.com/security/cve/CVE-2013-2394/" source="CVE"/>
		<reference ref_id="CVE-2013-2407" ref_url="https://www.suse.com/security/cve/CVE-2013-2407/" source="CVE"/>
		<reference ref_id="CVE-2013-2412" ref_url="https://www.suse.com/security/cve/CVE-2013-2412/" source="CVE"/>
		<reference ref_id="CVE-2013-2417" ref_url="https://www.suse.com/security/cve/CVE-2013-2417/" source="CVE"/>
		<reference ref_id="CVE-2013-2418" ref_url="https://www.suse.com/security/cve/CVE-2013-2418/" source="CVE"/>
		<reference ref_id="CVE-2013-2419" ref_url="https://www.suse.com/security/cve/CVE-2013-2419/" source="CVE"/>
		<reference ref_id="CVE-2013-2420" ref_url="https://www.suse.com/security/cve/CVE-2013-2420/" source="CVE"/>
		<reference ref_id="CVE-2013-2422" ref_url="https://www.suse.com/security/cve/CVE-2013-2422/" source="CVE"/>
		<reference ref_id="CVE-2013-2424" ref_url="https://www.suse.com/security/cve/CVE-2013-2424/" source="CVE"/>
		<reference ref_id="CVE-2013-2429" ref_url="https://www.suse.com/security/cve/CVE-2013-2429/" source="CVE"/>
		<reference ref_id="CVE-2013-2430" ref_url="https://www.suse.com/security/cve/CVE-2013-2430/" source="CVE"/>
		<reference ref_id="CVE-2013-2432" ref_url="https://www.suse.com/security/cve/CVE-2013-2432/" source="CVE"/>
		<reference ref_id="CVE-2013-2433" ref_url="https://www.suse.com/security/cve/CVE-2013-2433/" source="CVE"/>
		<reference ref_id="CVE-2013-2435" ref_url="https://www.suse.com/security/cve/CVE-2013-2435/" source="CVE"/>
		<reference ref_id="CVE-2013-2437" ref_url="https://www.suse.com/security/cve/CVE-2013-2437/" source="CVE"/>
		<reference ref_id="CVE-2013-2440" ref_url="https://www.suse.com/security/cve/CVE-2013-2440/" source="CVE"/>
		<reference ref_id="CVE-2013-2442" ref_url="https://www.suse.com/security/cve/CVE-2013-2442/" source="CVE"/>
		<reference ref_id="CVE-2013-2443" ref_url="https://www.suse.com/security/cve/CVE-2013-2443/" source="CVE"/>
		<reference ref_id="CVE-2013-2444" ref_url="https://www.suse.com/security/cve/CVE-2013-2444/" source="CVE"/>
		<reference ref_id="CVE-2013-2446" ref_url="https://www.suse.com/security/cve/CVE-2013-2446/" source="CVE"/>
		<reference ref_id="CVE-2013-2447" ref_url="https://www.suse.com/security/cve/CVE-2013-2447/" source="CVE"/>
		<reference ref_id="CVE-2013-2448" ref_url="https://www.suse.com/security/cve/CVE-2013-2448/" source="CVE"/>
		<reference ref_id="CVE-2013-2450" ref_url="https://www.suse.com/security/cve/CVE-2013-2450/" source="CVE"/>
		<reference ref_id="CVE-2013-2451" ref_url="https://www.suse.com/security/cve/CVE-2013-2451/" source="CVE"/>
		<reference ref_id="CVE-2013-2452" ref_url="https://www.suse.com/security/cve/CVE-2013-2452/" source="CVE"/>
		<reference ref_id="CVE-2013-2453" ref_url="https://www.suse.com/security/cve/CVE-2013-2453/" source="CVE"/>
		<reference ref_id="CVE-2013-2454" ref_url="https://www.suse.com/security/cve/CVE-2013-2454/" source="CVE"/>
		<reference ref_id="CVE-2013-2455" ref_url="https://www.suse.com/security/cve/CVE-2013-2455/" source="CVE"/>
		<reference ref_id="CVE-2013-2456" ref_url="https://www.suse.com/security/cve/CVE-2013-2456/" source="CVE"/>
		<reference ref_id="CVE-2013-2457" ref_url="https://www.suse.com/security/cve/CVE-2013-2457/" source="CVE"/>
		<reference ref_id="CVE-2013-2459" ref_url="https://www.suse.com/security/cve/CVE-2013-2459/" source="CVE"/>
		<reference ref_id="CVE-2013-2463" ref_url="https://www.suse.com/security/cve/CVE-2013-2463/" source="CVE"/>
		<reference ref_id="CVE-2013-2464" ref_url="https://www.suse.com/security/cve/CVE-2013-2464/" source="CVE"/>
		<reference ref_id="CVE-2013-2465" ref_url="https://www.suse.com/security/cve/CVE-2013-2465/" source="CVE"/>
		<reference ref_id="CVE-2013-2466" ref_url="https://www.suse.com/security/cve/CVE-2013-2466/" source="CVE"/>
		<reference ref_id="CVE-2013-2468" ref_url="https://www.suse.com/security/cve/CVE-2013-2468/" source="CVE"/>
		<reference ref_id="CVE-2013-2469" ref_url="https://www.suse.com/security/cve/CVE-2013-2469/" source="CVE"/>
		<reference ref_id="CVE-2013-2470" ref_url="https://www.suse.com/security/cve/CVE-2013-2470/" source="CVE"/>
		<reference ref_id="CVE-2013-2471" ref_url="https://www.suse.com/security/cve/CVE-2013-2471/" source="CVE"/>
		<reference ref_id="CVE-2013-2472" ref_url="https://www.suse.com/security/cve/CVE-2013-2472/" source="CVE"/>
		<reference ref_id="CVE-2013-2473" ref_url="https://www.suse.com/security/cve/CVE-2013-2473/" source="CVE"/>
		<reference ref_id="CVE-2013-3009" ref_url="https://www.suse.com/security/cve/CVE-2013-3009/" source="CVE"/>
		<reference ref_id="CVE-2013-3011" ref_url="https://www.suse.com/security/cve/CVE-2013-3011/" source="CVE"/>
		<reference ref_id="CVE-2013-3012" ref_url="https://www.suse.com/security/cve/CVE-2013-3012/" source="CVE"/>
		<reference ref_id="CVE-2013-3743" ref_url="https://www.suse.com/security/cve/CVE-2013-3743/" source="CVE"/>
		<reference ref_id="CVE-2013-3829" ref_url="https://www.suse.com/security/cve/CVE-2013-3829/" source="CVE"/>
		<reference ref_id="CVE-2013-4002" ref_url="https://www.suse.com/security/cve/CVE-2013-4002/" source="CVE"/>
		<reference ref_id="CVE-2013-4041" ref_url="https://www.suse.com/security/cve/CVE-2013-4041/" source="CVE"/>
		<reference ref_id="CVE-2013-5372" ref_url="https://www.suse.com/security/cve/CVE-2013-5372/" source="CVE"/>
		<reference ref_id="CVE-2013-5375" ref_url="https://www.suse.com/security/cve/CVE-2013-5375/" source="CVE"/>
		<reference ref_id="CVE-2013-5456" ref_url="https://www.suse.com/security/cve/CVE-2013-5456/" source="CVE"/>
		<reference ref_id="CVE-2013-5457" ref_url="https://www.suse.com/security/cve/CVE-2013-5457/" source="CVE"/>
		<reference ref_id="CVE-2013-5458" ref_url="https://www.suse.com/security/cve/CVE-2013-5458/" source="CVE"/>
		<reference ref_id="CVE-2013-5772" ref_url="https://www.suse.com/security/cve/CVE-2013-5772/" source="CVE"/>
		<reference ref_id="CVE-2013-5774" ref_url="https://www.suse.com/security/cve/CVE-2013-5774/" source="CVE"/>
		<reference ref_id="CVE-2013-5776" ref_url="https://www.suse.com/security/cve/CVE-2013-5776/" source="CVE"/>
		<reference ref_id="CVE-2013-5778" ref_url="https://www.suse.com/security/cve/CVE-2013-5778/" source="CVE"/>
		<reference ref_id="CVE-2013-5780" ref_url="https://www.suse.com/security/cve/CVE-2013-5780/" source="CVE"/>
		<reference ref_id="CVE-2013-5782" ref_url="https://www.suse.com/security/cve/CVE-2013-5782/" source="CVE"/>
		<reference ref_id="CVE-2013-5783" ref_url="https://www.suse.com/security/cve/CVE-2013-5783/" source="CVE"/>
		<reference ref_id="CVE-2013-5784" ref_url="https://www.suse.com/security/cve/CVE-2013-5784/" source="CVE"/>
		<reference ref_id="CVE-2013-5787" ref_url="https://www.suse.com/security/cve/CVE-2013-5787/" source="CVE"/>
		<reference ref_id="CVE-2013-5788" ref_url="https://www.suse.com/security/cve/CVE-2013-5788/" source="CVE"/>
		<reference ref_id="CVE-2013-5789" ref_url="https://www.suse.com/security/cve/CVE-2013-5789/" source="CVE"/>
		<reference ref_id="CVE-2013-5790" ref_url="https://www.suse.com/security/cve/CVE-2013-5790/" source="CVE"/>
		<reference ref_id="CVE-2013-5797" ref_url="https://www.suse.com/security/cve/CVE-2013-5797/" source="CVE"/>
		<reference ref_id="CVE-2013-5800" ref_url="https://www.suse.com/security/cve/CVE-2013-5800/" source="CVE"/>
		<reference ref_id="CVE-2013-5801" ref_url="https://www.suse.com/security/cve/CVE-2013-5801/" source="CVE"/>
		<reference ref_id="CVE-2013-5802" ref_url="https://www.suse.com/security/cve/CVE-2013-5802/" source="CVE"/>
		<reference ref_id="CVE-2013-5803" ref_url="https://www.suse.com/security/cve/CVE-2013-5803/" source="CVE"/>
		<reference ref_id="CVE-2013-5804" ref_url="https://www.suse.com/security/cve/CVE-2013-5804/" source="CVE"/>
		<reference ref_id="CVE-2013-5809" ref_url="https://www.suse.com/security/cve/CVE-2013-5809/" source="CVE"/>
		<reference ref_id="CVE-2013-5812" ref_url="https://www.suse.com/security/cve/CVE-2013-5812/" source="CVE"/>
		<reference ref_id="CVE-2013-5814" ref_url="https://www.suse.com/security/cve/CVE-2013-5814/" source="CVE"/>
		<reference ref_id="CVE-2013-5817" ref_url="https://www.suse.com/security/cve/CVE-2013-5817/" source="CVE"/>
		<reference ref_id="CVE-2013-5818" ref_url="https://www.suse.com/security/cve/CVE-2013-5818/" source="CVE"/>
		<reference ref_id="CVE-2013-5819" ref_url="https://www.suse.com/security/cve/CVE-2013-5819/" source="CVE"/>
		<reference ref_id="CVE-2013-5820" ref_url="https://www.suse.com/security/cve/CVE-2013-5820/" source="CVE"/>
		<reference ref_id="CVE-2013-5823" ref_url="https://www.suse.com/security/cve/CVE-2013-5823/" source="CVE"/>
		<reference ref_id="CVE-2013-5824" ref_url="https://www.suse.com/security/cve/CVE-2013-5824/" source="CVE"/>
		<reference ref_id="CVE-2013-5825" ref_url="https://www.suse.com/security/cve/CVE-2013-5825/" source="CVE"/>
		<reference ref_id="CVE-2013-5829" ref_url="https://www.suse.com/security/cve/CVE-2013-5829/" source="CVE"/>
		<reference ref_id="CVE-2013-5830" ref_url="https://www.suse.com/security/cve/CVE-2013-5830/" source="CVE"/>
		<reference ref_id="CVE-2013-5831" ref_url="https://www.suse.com/security/cve/CVE-2013-5831/" source="CVE"/>
		<reference ref_id="CVE-2013-5832" ref_url="https://www.suse.com/security/cve/CVE-2013-5832/" source="CVE"/>
		<reference ref_id="CVE-2013-5838" ref_url="https://www.suse.com/security/cve/CVE-2013-5838/" source="CVE"/>
		<reference ref_id="CVE-2013-5840" ref_url="https://www.suse.com/security/cve/CVE-2013-5840/" source="CVE"/>
		<reference ref_id="CVE-2013-5842" ref_url="https://www.suse.com/security/cve/CVE-2013-5842/" source="CVE"/>
		<reference ref_id="CVE-2013-5843" ref_url="https://www.suse.com/security/cve/CVE-2013-5843/" source="CVE"/>
		<reference ref_id="CVE-2013-5848" ref_url="https://www.suse.com/security/cve/CVE-2013-5848/" source="CVE"/>
		<reference ref_id="CVE-2013-5849" ref_url="https://www.suse.com/security/cve/CVE-2013-5849/" source="CVE"/>
		<reference ref_id="CVE-2013-5850" ref_url="https://www.suse.com/security/cve/CVE-2013-5850/" source="CVE"/>
		<reference ref_id="CVE-2013-5851" ref_url="https://www.suse.com/security/cve/CVE-2013-5851/" source="CVE"/>
		<reference ref_id="CVE-2013-5878" ref_url="https://www.suse.com/security/cve/CVE-2013-5878/" source="CVE"/>
		<reference ref_id="CVE-2013-5884" ref_url="https://www.suse.com/security/cve/CVE-2013-5884/" source="CVE"/>
		<reference ref_id="CVE-2013-5887" ref_url="https://www.suse.com/security/cve/CVE-2013-5887/" source="CVE"/>
		<reference ref_id="CVE-2013-5888" ref_url="https://www.suse.com/security/cve/CVE-2013-5888/" source="CVE"/>
		<reference ref_id="CVE-2013-5889" ref_url="https://www.suse.com/security/cve/CVE-2013-5889/" source="CVE"/>
		<reference ref_id="CVE-2013-5896" ref_url="https://www.suse.com/security/cve/CVE-2013-5896/" source="CVE"/>
		<reference ref_id="CVE-2013-5898" ref_url="https://www.suse.com/security/cve/CVE-2013-5898/" source="CVE"/>
		<reference ref_id="CVE-2013-5899" ref_url="https://www.suse.com/security/cve/CVE-2013-5899/" source="CVE"/>
		<reference ref_id="CVE-2013-5907" ref_url="https://www.suse.com/security/cve/CVE-2013-5907/" source="CVE"/>
		<reference ref_id="CVE-2013-5910" ref_url="https://www.suse.com/security/cve/CVE-2013-5910/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6954" ref_url="https://www.suse.com/security/cve/CVE-2013-6954/" source="CVE"/>
		<reference ref_id="CVE-2014-0368" ref_url="https://www.suse.com/security/cve/CVE-2014-0368/" source="CVE"/>
		<reference ref_id="CVE-2014-0373" ref_url="https://www.suse.com/security/cve/CVE-2014-0373/" source="CVE"/>
		<reference ref_id="CVE-2014-0375" ref_url="https://www.suse.com/security/cve/CVE-2014-0375/" source="CVE"/>
		<reference ref_id="CVE-2014-0376" ref_url="https://www.suse.com/security/cve/CVE-2014-0376/" source="CVE"/>
		<reference ref_id="CVE-2014-0387" ref_url="https://www.suse.com/security/cve/CVE-2014-0387/" source="CVE"/>
		<reference ref_id="CVE-2014-0403" ref_url="https://www.suse.com/security/cve/CVE-2014-0403/" source="CVE"/>
		<reference ref_id="CVE-2014-0410" ref_url="https://www.suse.com/security/cve/CVE-2014-0410/" source="CVE"/>
		<reference ref_id="CVE-2014-0411" ref_url="https://www.suse.com/security/cve/CVE-2014-0411/" source="CVE"/>
		<reference ref_id="CVE-2014-0415" ref_url="https://www.suse.com/security/cve/CVE-2014-0415/" source="CVE"/>
		<reference ref_id="CVE-2014-0416" ref_url="https://www.suse.com/security/cve/CVE-2014-0416/" source="CVE"/>
		<reference ref_id="CVE-2014-0417" ref_url="https://www.suse.com/security/cve/CVE-2014-0417/" source="CVE"/>
		<reference ref_id="CVE-2014-0422" ref_url="https://www.suse.com/security/cve/CVE-2014-0422/" source="CVE"/>
		<reference ref_id="CVE-2014-0423" ref_url="https://www.suse.com/security/cve/CVE-2014-0423/" source="CVE"/>
		<reference ref_id="CVE-2014-0424" ref_url="https://www.suse.com/security/cve/CVE-2014-0424/" source="CVE"/>
		<reference ref_id="CVE-2014-0428" ref_url="https://www.suse.com/security/cve/CVE-2014-0428/" source="CVE"/>
		<reference ref_id="CVE-2014-0429" ref_url="https://www.suse.com/security/cve/CVE-2014-0429/" source="CVE"/>
		<reference ref_id="CVE-2014-0446" ref_url="https://www.suse.com/security/cve/CVE-2014-0446/" source="CVE"/>
		<reference ref_id="CVE-2014-0449" ref_url="https://www.suse.com/security/cve/CVE-2014-0449/" source="CVE"/>
		<reference ref_id="CVE-2014-0451" ref_url="https://www.suse.com/security/cve/CVE-2014-0451/" source="CVE"/>
		<reference ref_id="CVE-2014-0452" ref_url="https://www.suse.com/security/cve/CVE-2014-0452/" source="CVE"/>
		<reference ref_id="CVE-2014-0453" ref_url="https://www.suse.com/security/cve/CVE-2014-0453/" source="CVE"/>
		<reference ref_id="CVE-2014-0457" ref_url="https://www.suse.com/security/cve/CVE-2014-0457/" source="CVE"/>
		<reference ref_id="CVE-2014-0458" ref_url="https://www.suse.com/security/cve/CVE-2014-0458/" source="CVE"/>
		<reference ref_id="CVE-2014-0459" ref_url="https://www.suse.com/security/cve/CVE-2014-0459/" source="CVE"/>
		<reference ref_id="CVE-2014-0460" ref_url="https://www.suse.com/security/cve/CVE-2014-0460/" source="CVE"/>
		<reference ref_id="CVE-2014-0461" ref_url="https://www.suse.com/security/cve/CVE-2014-0461/" source="CVE"/>
		<reference ref_id="CVE-2014-0878" ref_url="https://www.suse.com/security/cve/CVE-2014-0878/" source="CVE"/>
		<reference ref_id="CVE-2014-1876" ref_url="https://www.suse.com/security/cve/CVE-2014-1876/" source="CVE"/>
		<reference ref_id="CVE-2014-2398" ref_url="https://www.suse.com/security/cve/CVE-2014-2398/" source="CVE"/>
		<reference ref_id="CVE-2014-2401" ref_url="https://www.suse.com/security/cve/CVE-2014-2401/" source="CVE"/>
		<reference ref_id="CVE-2014-2409" ref_url="https://www.suse.com/security/cve/CVE-2014-2409/" source="CVE"/>
		<reference ref_id="CVE-2014-2412" ref_url="https://www.suse.com/security/cve/CVE-2014-2412/" source="CVE"/>
		<reference ref_id="CVE-2014-2414" ref_url="https://www.suse.com/security/cve/CVE-2014-2414/" source="CVE"/>
		<reference ref_id="CVE-2014-2420" ref_url="https://www.suse.com/security/cve/CVE-2014-2420/" source="CVE"/>
		<reference ref_id="CVE-2014-2421" ref_url="https://www.suse.com/security/cve/CVE-2014-2421/" source="CVE"/>
		<reference ref_id="CVE-2014-2423" ref_url="https://www.suse.com/security/cve/CVE-2014-2423/" source="CVE"/>
		<reference ref_id="CVE-2014-2427" ref_url="https://www.suse.com/security/cve/CVE-2014-2427/" source="CVE"/>
		<reference ref_id="CVE-2014-2428" ref_url="https://www.suse.com/security/cve/CVE-2014-2428/" source="CVE"/>
		<reference ref_id="CVE-2014-3065" ref_url="https://www.suse.com/security/cve/CVE-2014-3065/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-4209" ref_url="https://www.suse.com/security/cve/CVE-2014-4209/" source="CVE"/>
		<reference ref_id="CVE-2014-4218" ref_url="https://www.suse.com/security/cve/CVE-2014-4218/" source="CVE"/>
		<reference ref_id="CVE-2014-4219" ref_url="https://www.suse.com/security/cve/CVE-2014-4219/" source="CVE"/>
		<reference ref_id="CVE-2014-4227" ref_url="https://www.suse.com/security/cve/CVE-2014-4227/" source="CVE"/>
		<reference ref_id="CVE-2014-4244" ref_url="https://www.suse.com/security/cve/CVE-2014-4244/" source="CVE"/>
		<reference ref_id="CVE-2014-4252" ref_url="https://www.suse.com/security/cve/CVE-2014-4252/" source="CVE"/>
		<reference ref_id="CVE-2014-4262" ref_url="https://www.suse.com/security/cve/CVE-2014-4262/" source="CVE"/>
		<reference ref_id="CVE-2014-4263" ref_url="https://www.suse.com/security/cve/CVE-2014-4263/" source="CVE"/>
		<reference ref_id="CVE-2014-4265" ref_url="https://www.suse.com/security/cve/CVE-2014-4265/" source="CVE"/>
		<reference ref_id="CVE-2014-4268" ref_url="https://www.suse.com/security/cve/CVE-2014-4268/" source="CVE"/>
		<reference ref_id="CVE-2014-4288" ref_url="https://www.suse.com/security/cve/CVE-2014-4288/" source="CVE"/>
		<reference ref_id="CVE-2014-6456" ref_url="https://www.suse.com/security/cve/CVE-2014-6456/" source="CVE"/>
		<reference ref_id="CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457/" source="CVE"/>
		<reference ref_id="CVE-2014-6458" ref_url="https://www.suse.com/security/cve/CVE-2014-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-6466" ref_url="https://www.suse.com/security/cve/CVE-2014-6466/" source="CVE"/>
		<reference ref_id="CVE-2014-6476" ref_url="https://www.suse.com/security/cve/CVE-2014-6476/" source="CVE"/>
		<reference ref_id="CVE-2014-6492" ref_url="https://www.suse.com/security/cve/CVE-2014-6492/" source="CVE"/>
		<reference ref_id="CVE-2014-6493" ref_url="https://www.suse.com/security/cve/CVE-2014-6493/" source="CVE"/>
		<reference ref_id="CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502/" source="CVE"/>
		<reference ref_id="CVE-2014-6503" ref_url="https://www.suse.com/security/cve/CVE-2014-6503/" source="CVE"/>
		<reference ref_id="CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506/" source="CVE"/>
		<reference ref_id="CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511/" source="CVE"/>
		<reference ref_id="CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512/" source="CVE"/>
		<reference ref_id="CVE-2014-6513" ref_url="https://www.suse.com/security/cve/CVE-2014-6513/" source="CVE"/>
		<reference ref_id="CVE-2014-6515" ref_url="https://www.suse.com/security/cve/CVE-2014-6515/" source="CVE"/>
		<reference ref_id="CVE-2014-6527" ref_url="https://www.suse.com/security/cve/CVE-2014-6527/" source="CVE"/>
		<reference ref_id="CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531/" source="CVE"/>
		<reference ref_id="CVE-2014-6532" ref_url="https://www.suse.com/security/cve/CVE-2014-6532/" source="CVE"/>
		<reference ref_id="CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558/" source="CVE"/>
		<reference ref_id="CVE-2014-8891" ref_url="https://www.suse.com/security/cve/CVE-2014-8891/" source="CVE"/>
		<reference ref_id="CVE-2014-8892" ref_url="https://www.suse.com/security/cve/CVE-2014-8892/" source="CVE"/>
		<reference ref_id="CVE-2015-0138" ref_url="https://www.suse.com/security/cve/CVE-2015-0138/" source="CVE"/>
		<reference ref_id="CVE-2015-0192" ref_url="https://www.suse.com/security/cve/CVE-2015-0192/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0458" ref_url="https://www.suse.com/security/cve/CVE-2015-0458/" source="CVE"/>
		<reference ref_id="CVE-2015-0459" ref_url="https://www.suse.com/security/cve/CVE-2015-0459/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-0491" ref_url="https://www.suse.com/security/cve/CVE-2015-0491/" source="CVE"/>
		<reference ref_id="CVE-2015-1914" ref_url="https://www.suse.com/security/cve/CVE-2015-1914/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001445.html" source="SUSE-SU"/>
		<description>

java-1_6_0-ibm has been updated to version 1.6.0_sr16.2 to fix 18 security 
issues.

These security issues have been fixed:

    * Unspecified vulnerability in Oracle Java SE 6u81 (CVE-2014-3065).
    * The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other
      products, uses nondeterministic CBC padding, which makes it easier
      for man-in-the-middle attackers to obtain cleartext data via a
      padding-oracle attack, aka the 'POODLE' issue (CVE-2014-3566).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20, and
      Java SE Embedded 7u60, allows remote attackers to affect
      confidentiality, integrity, and availability via vectors related to
      AWT (CVE-2014-6513).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment, a different
      vulnerability than CVE-2014-4288, CVE-2014-6493, and CVE-2014-6532
      (CVE-2014-6503).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment, a different
      vulnerability than CVE-2014-4288, CVE-2014-6493, and CVE-2014-6503
      (CVE-2014-6532).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment, a different
      vulnerability than CVE-2014-6493, CVE-2014-6503, and CVE-2014-6532
      (CVE-2014-4288).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment, a different
      vulnerability than CVE-2014-4288, CVE-2014-6503, and CVE-2014-6532
      (CVE-2014-6493).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20,
      when running on Firefox, allows remote attackers to affect
      confidentiality, integrity, and availability via unknown vectors
      related to Deployment (CVE-2014-6492).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows local users to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment
      (CVE-2014-6458).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20,
      when running on Internet Explorer, allows local users to affect
      confidentiality, integrity, and availability via unknown vectors
      related to Deployment (CVE-2014-6466).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20, and Java SE Embedded 7u60, allows remote attackers to affect
      confidentiality, integrity, and availability via unknown vectors
      related to Libraries (CVE-2014-6506).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect integrity via unknown vectors
      related to Deployment (CVE-2014-6515).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20 allows remote attackers to affect confidentiality via unknown
      vectors related to 2D (CVE-2014-6511).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20, and Java SE Embedded 7u60, allows remote attackers to affect
      confidentiality via unknown vectors related to Libraries
      (CVE-2014-6531).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and R28.3.3 allows
      remote attackers to affect integrity via unknown vectors related to
      Libraries (CVE-2014-6512).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20; Java SE Embedded 7u60; and JRockit R27.8.3, and R28.3.3 allows
      remote attackers to affect confidentiality and integrity via vectors
      related to JSSE (CVE-2014-6457).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20, and Java SE Embedded 7u60, allows remote attackers to affect
      integrity via unknown vectors related to Libraries (CVE-2014-6502).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and JRockit R28.3.3
      allows remote attackers to affect integrity via unknown vectors
      related to Security (CVE-2014-6558).

More information can be found at 
http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_November_2014
&lt;http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_November_2014&gt;

Security Issues:

    * CVE-2014-3065
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3065&gt;
    * CVE-2014-3566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&gt;
    * CVE-2014-6506
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6506&gt;
    * CVE-2014-6511
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6511&gt;
    * CVE-2014-6531
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6531&gt;
    * CVE-2014-6512
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6512&gt;
    * CVE-2014-6457
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6457&gt;
    * CVE-2014-6502
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6502&gt;
    * CVE-2014-6558
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6558&gt;
    * CVE-2014-6513
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6513&gt;
    * CVE-2014-6503
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6503&gt;
    * CVE-2014-4288
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4288&gt;
    * CVE-2014-6493
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6493&gt;
    * CVE-2014-6532
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6532&gt;
    * CVE-2014-6492
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6492&gt;
    * CVE-2014-6458
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6458&gt;
    * CVE-2014-6466
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6466&gt;
    * CVE-2014-6515
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6515&gt;
    * CVE-2014-6456
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6456&gt;
    * CVE-2014-6476
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6476&gt;
    * CVE-2014-6527
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6527&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-19"/>
	<updated date="2014-11-19"/>
	<bugzilla href="https://bugzilla.suse.com/592934">SUSE bug 592934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/603283">SUSE bug 603283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/624224">SUSE bug 624224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/666744">SUSE bug 666744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/673738">SUSE bug 673738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/673798">SUSE bug 673798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/705423">SUSE bug 705423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/735637">SUSE bug 735637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/739248">SUSE bug 739248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752306">SUSE bug 752306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758470">SUSE bug 758470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/771808">SUSE bug 771808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773021">SUSE bug 773021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778629">SUSE bug 778629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785631">SUSE bug 785631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808625">SUSE bug 808625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813939">SUSE bug 813939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817062">SUSE bug 817062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823034">SUSE bug 823034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901223">SUSE bug 901223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912434">SUSE bug 912434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912447">SUSE bug 912447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916265">SUSE bug 916265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916266">SUSE bug 916266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930365">SUSE bug 930365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931702">SUSE bug 931702</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0084/">CVE-2010-0084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0084">CVE-2010-0084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0085/">CVE-2010-0085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0085">CVE-2010-0085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0087/">CVE-2010-0087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0087">CVE-2010-0087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0088/">CVE-2010-0088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0088">CVE-2010-0088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0089/">CVE-2010-0089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0089">CVE-2010-0089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0090/">CVE-2010-0090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0090">CVE-2010-0090 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0091/">CVE-2010-0091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0091">CVE-2010-0091 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0092/">CVE-2010-0092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0092">CVE-2010-0092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0094/">CVE-2010-0094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0094">CVE-2010-0094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0095/">CVE-2010-0095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0095">CVE-2010-0095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0771/">CVE-2010-0771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0771">CVE-2010-0771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0837/">CVE-2010-0837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0837">CVE-2010-0837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0838/">CVE-2010-0838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0838">CVE-2010-0838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0839/">CVE-2010-0839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0839">CVE-2010-0839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0840/">CVE-2010-0840 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-0840">CVE-2010-0840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0841/">CVE-2010-0841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0841">CVE-2010-0841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0842/">CVE-2010-0842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0842">CVE-2010-0842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0843/">CVE-2010-0843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0843">CVE-2010-0843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0844/">CVE-2010-0844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0844">CVE-2010-0844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0846/">CVE-2010-0846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0846">CVE-2010-0846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0847/">CVE-2010-0847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0847">CVE-2010-0847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0848/">CVE-2010-0848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0848">CVE-2010-0848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0849/">CVE-2010-0849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0849">CVE-2010-0849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1321">CVE-2010-1321 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3541/">CVE-2010-3541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3541">CVE-2010-3541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3548/">CVE-2010-3548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3548">CVE-2010-3548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3549/">CVE-2010-3549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3549">CVE-2010-3549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3550/">CVE-2010-3550 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3550">CVE-2010-3550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3551/">CVE-2010-3551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3551">CVE-2010-3551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3553/">CVE-2010-3553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3553">CVE-2010-3553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3555/">CVE-2010-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3555">CVE-2010-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3556/">CVE-2010-3556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3556">CVE-2010-3556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3557/">CVE-2010-3557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3557">CVE-2010-3557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3558/">CVE-2010-3558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3558">CVE-2010-3558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3559/">CVE-2010-3559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3559">CVE-2010-3559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3560/">CVE-2010-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3560">CVE-2010-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3562/">CVE-2010-3562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3562">CVE-2010-3562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3563/">CVE-2010-3563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3563">CVE-2010-3563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3565/">CVE-2010-3565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3565">CVE-2010-3565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3566/">CVE-2010-3566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3566">CVE-2010-3566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3567/">CVE-2010-3567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3567">CVE-2010-3567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3568/">CVE-2010-3568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3568">CVE-2010-3568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3569/">CVE-2010-3569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3569">CVE-2010-3569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3571/">CVE-2010-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3571">CVE-2010-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3572/">CVE-2010-3572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3572">CVE-2010-3572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3573/">CVE-2010-3573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3573">CVE-2010-3573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3574/">CVE-2010-3574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3574">CVE-2010-3574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4422/">CVE-2010-4422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4422">CVE-2010-4422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4447/">CVE-2010-4447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4447">CVE-2010-4447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4448/">CVE-2010-4448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4448">CVE-2010-4448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4452/">CVE-2010-4452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4452">CVE-2010-4452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4454/">CVE-2010-4454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4454">CVE-2010-4454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4462/">CVE-2010-4462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4462">CVE-2010-4462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4463/">CVE-2010-4463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4463">CVE-2010-4463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4465/">CVE-2010-4465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4465">CVE-2010-4465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4466/">CVE-2010-4466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4466">CVE-2010-4466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4467/">CVE-2010-4467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4467">CVE-2010-4467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4468/">CVE-2010-4468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4468">CVE-2010-4468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4471/">CVE-2010-4471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4471">CVE-2010-4471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4473/">CVE-2010-4473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4473">CVE-2010-4473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4475/">CVE-2010-4475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4475">CVE-2010-4475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4476/">CVE-2010-4476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4476">CVE-2010-4476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0786/">CVE-2011-0786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0786">CVE-2011-0786 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0788/">CVE-2011-0788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0788">CVE-2011-0788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0802/">CVE-2011-0802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0802">CVE-2011-0802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0814/">CVE-2011-0814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0814">CVE-2011-0814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0815/">CVE-2011-0815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0815">CVE-2011-0815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0817/">CVE-2011-0817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0817">CVE-2011-0817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0862/">CVE-2011-0862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0862">CVE-2011-0862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0863/">CVE-2011-0863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0863">CVE-2011-0863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0865/">CVE-2011-0865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0865">CVE-2011-0865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0866/">CVE-2011-0866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0866">CVE-2011-0866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0867/">CVE-2011-0867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0867">CVE-2011-0867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0868/">CVE-2011-0868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0868">CVE-2011-0868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0869/">CVE-2011-0869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0869">CVE-2011-0869 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0871/">CVE-2011-0871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0871">CVE-2011-0871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0872/">CVE-2011-0872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0872">CVE-2011-0872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0873/">CVE-2011-0873 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0873">CVE-2011-0873 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3516/">CVE-2011-3516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3516">CVE-2011-3516 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3521/">CVE-2011-3521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3521">CVE-2011-3521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3544/">CVE-2011-3544 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3544">CVE-2011-3544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3545/">CVE-2011-3545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3545">CVE-2011-3545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3546/">CVE-2011-3546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3546">CVE-2011-3546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3547/">CVE-2011-3547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3547">CVE-2011-3547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3548/">CVE-2011-3548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3548">CVE-2011-3548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3549/">CVE-2011-3549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3549">CVE-2011-3549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3550/">CVE-2011-3550 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3550">CVE-2011-3550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3551/">CVE-2011-3551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3551">CVE-2011-3551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3552/">CVE-2011-3552 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3552">CVE-2011-3552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3553/">CVE-2011-3553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3553">CVE-2011-3553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3554/">CVE-2011-3554 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3554">CVE-2011-3554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3556/">CVE-2011-3556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3556">CVE-2011-3556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3557/">CVE-2011-3557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3557">CVE-2011-3557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3560/">CVE-2011-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3560">CVE-2011-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3561/">CVE-2011-3561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3561">CVE-2011-3561 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3563/">CVE-2011-3563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3563">CVE-2011-3563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5035/">CVE-2011-5035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-5035">CVE-2011-5035 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0497/">CVE-2012-0497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0497">CVE-2012-0497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0498/">CVE-2012-0498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0498">CVE-2012-0498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0499/">CVE-2012-0499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0499">CVE-2012-0499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0500/">CVE-2012-0500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0500">CVE-2012-0500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0501/">CVE-2012-0501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0501">CVE-2012-0501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0502/">CVE-2012-0502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0502">CVE-2012-0502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0503/">CVE-2012-0503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0503">CVE-2012-0503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0505/">CVE-2012-0505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0505">CVE-2012-0505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0506/">CVE-2012-0506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0506">CVE-2012-0506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0507/">CVE-2012-0507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0507">CVE-2012-0507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1531/">CVE-2012-1531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1531">CVE-2012-1531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1532/">CVE-2012-1532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1532">CVE-2012-1532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1533/">CVE-2012-1533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1533">CVE-2012-1533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1541/">CVE-2012-1541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1541">CVE-2012-1541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3143/">CVE-2012-3143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3143">CVE-2012-3143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3159/">CVE-2012-3159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3159">CVE-2012-3159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3213/">CVE-2012-3213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3213">CVE-2012-3213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3216/">CVE-2012-3216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3216">CVE-2012-3216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3342/">CVE-2012-3342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3342">CVE-2012-3342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5068/">CVE-2012-5068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5068">CVE-2012-5068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5069/">CVE-2012-5069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5069">CVE-2012-5069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5071/">CVE-2012-5071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5071">CVE-2012-5071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5072/">CVE-2012-5072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5072">CVE-2012-5072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5073/">CVE-2012-5073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5073">CVE-2012-5073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5075/">CVE-2012-5075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5075">CVE-2012-5075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5079/">CVE-2012-5079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5079">CVE-2012-5079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5081/">CVE-2012-5081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5081">CVE-2012-5081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5083/">CVE-2012-5083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5083">CVE-2012-5083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5084/">CVE-2012-5084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5084">CVE-2012-5084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5089/">CVE-2012-5089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5089">CVE-2012-5089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0169">CVE-2013-0169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0351/">CVE-2013-0351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0351">CVE-2013-0351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0401/">CVE-2013-0401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0401">CVE-2013-0401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0409/">CVE-2013-0409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0409">CVE-2013-0409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0419/">CVE-2013-0419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0419">CVE-2013-0419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0423/">CVE-2013-0423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0423">CVE-2013-0423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0424/">CVE-2013-0424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0424">CVE-2013-0424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0425/">CVE-2013-0425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0425">CVE-2013-0425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0426/">CVE-2013-0426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0426">CVE-2013-0426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0427/">CVE-2013-0427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0427">CVE-2013-0427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0428/">CVE-2013-0428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0428">CVE-2013-0428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0432/">CVE-2013-0432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0432">CVE-2013-0432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0433/">CVE-2013-0433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0433">CVE-2013-0433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0434/">CVE-2013-0434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0434">CVE-2013-0434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0435/">CVE-2013-0435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0435">CVE-2013-0435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0438/">CVE-2013-0438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0438">CVE-2013-0438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0440/">CVE-2013-0440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0440">CVE-2013-0440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0441/">CVE-2013-0441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0441">CVE-2013-0441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0442/">CVE-2013-0442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0442">CVE-2013-0442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0443/">CVE-2013-0443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0443">CVE-2013-0443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0445/">CVE-2013-0445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0445">CVE-2013-0445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0446/">CVE-2013-0446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0446">CVE-2013-0446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0450/">CVE-2013-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0450">CVE-2013-0450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0485/">CVE-2013-0485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0485">CVE-2013-0485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0809/">CVE-2013-0809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0809">CVE-2013-0809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1473/">CVE-2013-1473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1473">CVE-2013-1473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1476/">CVE-2013-1476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1476">CVE-2013-1476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1478/">CVE-2013-1478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1478">CVE-2013-1478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1480/">CVE-2013-1480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1480">CVE-2013-1480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1481/">CVE-2013-1481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1481">CVE-2013-1481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1486/">CVE-2013-1486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1486">CVE-2013-1486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1487/">CVE-2013-1487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1487">CVE-2013-1487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1491/">CVE-2013-1491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1491">CVE-2013-1491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1493/">CVE-2013-1493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1493">CVE-2013-1493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1500/">CVE-2013-1500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1500">CVE-2013-1500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1537/">CVE-2013-1537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1537">CVE-2013-1537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1540/">CVE-2013-1540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1540">CVE-2013-1540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1557/">CVE-2013-1557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1557">CVE-2013-1557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1563/">CVE-2013-1563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1563">CVE-2013-1563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1569/">CVE-2013-1569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1569">CVE-2013-1569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1571/">CVE-2013-1571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1571">CVE-2013-1571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2383/">CVE-2013-2383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2383">CVE-2013-2383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2384/">CVE-2013-2384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2384">CVE-2013-2384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2394/">CVE-2013-2394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2394">CVE-2013-2394 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2407/">CVE-2013-2407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2407">CVE-2013-2407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2412/">CVE-2013-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2412">CVE-2013-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2417/">CVE-2013-2417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2417">CVE-2013-2417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2418/">CVE-2013-2418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2418">CVE-2013-2418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2419/">CVE-2013-2419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2419">CVE-2013-2419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2420/">CVE-2013-2420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2420">CVE-2013-2420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2422/">CVE-2013-2422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2422">CVE-2013-2422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2424/">CVE-2013-2424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2424">CVE-2013-2424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2429/">CVE-2013-2429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2429">CVE-2013-2429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2430/">CVE-2013-2430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2430">CVE-2013-2430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2432/">CVE-2013-2432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2432">CVE-2013-2432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2433/">CVE-2013-2433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2433">CVE-2013-2433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2435/">CVE-2013-2435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2435">CVE-2013-2435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2437/">CVE-2013-2437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2437">CVE-2013-2437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2440/">CVE-2013-2440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2440">CVE-2013-2440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2442/">CVE-2013-2442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2442">CVE-2013-2442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2443/">CVE-2013-2443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2443">CVE-2013-2443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2444/">CVE-2013-2444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2444">CVE-2013-2444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2446/">CVE-2013-2446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2446">CVE-2013-2446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2447/">CVE-2013-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2447">CVE-2013-2447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2448/">CVE-2013-2448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2448">CVE-2013-2448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2450/">CVE-2013-2450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2450">CVE-2013-2450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2451/">CVE-2013-2451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2451">CVE-2013-2451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2452/">CVE-2013-2452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2452">CVE-2013-2452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2453/">CVE-2013-2453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2453">CVE-2013-2453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2454/">CVE-2013-2454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2454">CVE-2013-2454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2455/">CVE-2013-2455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2455">CVE-2013-2455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2456/">CVE-2013-2456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2456">CVE-2013-2456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2457/">CVE-2013-2457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2457">CVE-2013-2457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2459/">CVE-2013-2459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2459">CVE-2013-2459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2463/">CVE-2013-2463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2463">CVE-2013-2463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2464/">CVE-2013-2464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2464">CVE-2013-2464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2465/">CVE-2013-2465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2465">CVE-2013-2465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2466/">CVE-2013-2466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2466">CVE-2013-2466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2468/">CVE-2013-2468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2468">CVE-2013-2468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2469/">CVE-2013-2469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2469">CVE-2013-2469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2470/">CVE-2013-2470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2470">CVE-2013-2470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2471/">CVE-2013-2471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2471">CVE-2013-2471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2472/">CVE-2013-2472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2472">CVE-2013-2472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2473/">CVE-2013-2473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2473">CVE-2013-2473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3009/">CVE-2013-3009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3009">CVE-2013-3009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3011/">CVE-2013-3011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3011">CVE-2013-3011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3012/">CVE-2013-3012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3012">CVE-2013-3012 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3743/">CVE-2013-3743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3743">CVE-2013-3743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3829/">CVE-2013-3829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3829">CVE-2013-3829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4002/">CVE-2013-4002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4002">CVE-2013-4002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4041/">CVE-2013-4041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4041">CVE-2013-4041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5372/">CVE-2013-5372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5372">CVE-2013-5372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5375/">CVE-2013-5375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5375">CVE-2013-5375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5456/">CVE-2013-5456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5456">CVE-2013-5456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5457/">CVE-2013-5457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5457">CVE-2013-5457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5458/">CVE-2013-5458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5458">CVE-2013-5458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5772/">CVE-2013-5772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5772">CVE-2013-5772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5774/">CVE-2013-5774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5774">CVE-2013-5774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5776/">CVE-2013-5776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5776">CVE-2013-5776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5778/">CVE-2013-5778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5778">CVE-2013-5778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5780/">CVE-2013-5780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5780">CVE-2013-5780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5782/">CVE-2013-5782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5782">CVE-2013-5782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5783/">CVE-2013-5783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5783">CVE-2013-5783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5784/">CVE-2013-5784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5784">CVE-2013-5784 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5787/">CVE-2013-5787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5787">CVE-2013-5787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5788/">CVE-2013-5788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5788">CVE-2013-5788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5789/">CVE-2013-5789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5789">CVE-2013-5789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5790/">CVE-2013-5790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5790">CVE-2013-5790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5797/">CVE-2013-5797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5797">CVE-2013-5797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5800/">CVE-2013-5800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5800">CVE-2013-5800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5801/">CVE-2013-5801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5801">CVE-2013-5801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5802/">CVE-2013-5802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5802">CVE-2013-5802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5803/">CVE-2013-5803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5803">CVE-2013-5803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5804/">CVE-2013-5804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5804">CVE-2013-5804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5809/">CVE-2013-5809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5809">CVE-2013-5809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5812/">CVE-2013-5812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5812">CVE-2013-5812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5814/">CVE-2013-5814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5814">CVE-2013-5814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5817/">CVE-2013-5817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5817">CVE-2013-5817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5818/">CVE-2013-5818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5818">CVE-2013-5818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5819/">CVE-2013-5819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5819">CVE-2013-5819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5820/">CVE-2013-5820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5820">CVE-2013-5820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5823/">CVE-2013-5823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5823">CVE-2013-5823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5824/">CVE-2013-5824 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5824">CVE-2013-5824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5825/">CVE-2013-5825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5825">CVE-2013-5825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5829/">CVE-2013-5829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5829">CVE-2013-5829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5830/">CVE-2013-5830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5830">CVE-2013-5830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5831/">CVE-2013-5831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5831">CVE-2013-5831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5832/">CVE-2013-5832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5832">CVE-2013-5832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5838/">CVE-2013-5838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5838">CVE-2013-5838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5840/">CVE-2013-5840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5840">CVE-2013-5840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5842/">CVE-2013-5842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5842">CVE-2013-5842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5843/">CVE-2013-5843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5843">CVE-2013-5843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5848/">CVE-2013-5848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5848">CVE-2013-5848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5849/">CVE-2013-5849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5849">CVE-2013-5849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5850/">CVE-2013-5850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5850">CVE-2013-5850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5851/">CVE-2013-5851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5851">CVE-2013-5851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5878/">CVE-2013-5878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5878">CVE-2013-5878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5884/">CVE-2013-5884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5884">CVE-2013-5884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5887/">CVE-2013-5887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5887">CVE-2013-5887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5888/">CVE-2013-5888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5888">CVE-2013-5888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5889/">CVE-2013-5889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5889">CVE-2013-5889 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5896/">CVE-2013-5896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5896">CVE-2013-5896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5898/">CVE-2013-5898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5898">CVE-2013-5898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5899/">CVE-2013-5899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5899">CVE-2013-5899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5907/">CVE-2013-5907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5907">CVE-2013-5907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5910/">CVE-2013-5910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5910">CVE-2013-5910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6629">CVE-2013-6629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6954/">CVE-2013-6954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6954">CVE-2013-6954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0368/">CVE-2014-0368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0368">CVE-2014-0368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0373/">CVE-2014-0373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0373">CVE-2014-0373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0375/">CVE-2014-0375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0375">CVE-2014-0375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0376/">CVE-2014-0376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0376">CVE-2014-0376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0387/">CVE-2014-0387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0387">CVE-2014-0387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0403/">CVE-2014-0403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0403">CVE-2014-0403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0410/">CVE-2014-0410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0410">CVE-2014-0410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0411/">CVE-2014-0411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0411">CVE-2014-0411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0415/">CVE-2014-0415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0415">CVE-2014-0415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0416/">CVE-2014-0416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0416">CVE-2014-0416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0417/">CVE-2014-0417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0417">CVE-2014-0417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0422/">CVE-2014-0422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0422">CVE-2014-0422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0423/">CVE-2014-0423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0423">CVE-2014-0423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0424/">CVE-2014-0424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0424">CVE-2014-0424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0428/">CVE-2014-0428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0428">CVE-2014-0428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0429/">CVE-2014-0429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0429">CVE-2014-0429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0446/">CVE-2014-0446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0446">CVE-2014-0446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0449/">CVE-2014-0449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0449">CVE-2014-0449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0451/">CVE-2014-0451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0451">CVE-2014-0451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0452/">CVE-2014-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0452">CVE-2014-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0453/">CVE-2014-0453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0453">CVE-2014-0453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0457/">CVE-2014-0457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0457">CVE-2014-0457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0458/">CVE-2014-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0458">CVE-2014-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0459/">CVE-2014-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0459">CVE-2014-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0460/">CVE-2014-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0460">CVE-2014-0460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0461/">CVE-2014-0461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0461">CVE-2014-0461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0878/">CVE-2014-0878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0878">CVE-2014-0878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1876/">CVE-2014-1876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1876">CVE-2014-1876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2398/">CVE-2014-2398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2398">CVE-2014-2398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2401/">CVE-2014-2401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2401">CVE-2014-2401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2409/">CVE-2014-2409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2409">CVE-2014-2409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2412/">CVE-2014-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2412">CVE-2014-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2414/">CVE-2014-2414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2414">CVE-2014-2414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2420/">CVE-2014-2420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2420">CVE-2014-2420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2421/">CVE-2014-2421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2421">CVE-2014-2421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2423/">CVE-2014-2423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2423">CVE-2014-2423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2427/">CVE-2014-2427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2427">CVE-2014-2427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2428/">CVE-2014-2428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2428">CVE-2014-2428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3065/">CVE-2014-3065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3065">CVE-2014-3065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4209/">CVE-2014-4209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4209">CVE-2014-4209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4218/">CVE-2014-4218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4218">CVE-2014-4218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4219/">CVE-2014-4219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4219">CVE-2014-4219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4227/">CVE-2014-4227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4227">CVE-2014-4227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4244/">CVE-2014-4244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4244">CVE-2014-4244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4252/">CVE-2014-4252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4252">CVE-2014-4252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4262/">CVE-2014-4262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4262">CVE-2014-4262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4263/">CVE-2014-4263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4263">CVE-2014-4263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4265/">CVE-2014-4265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4265">CVE-2014-4265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4268/">CVE-2014-4268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4268">CVE-2014-4268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4288/">CVE-2014-4288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4288">CVE-2014-4288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6456/">CVE-2014-6456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6456">CVE-2014-6456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6457">CVE-2014-6457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6458/">CVE-2014-6458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6458">CVE-2014-6458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6466/">CVE-2014-6466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6466">CVE-2014-6466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6476/">CVE-2014-6476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6476">CVE-2014-6476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6492/">CVE-2014-6492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6492">CVE-2014-6492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6493/">CVE-2014-6493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6493">CVE-2014-6493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6502">CVE-2014-6502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6503/">CVE-2014-6503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6503">CVE-2014-6503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6506">CVE-2014-6506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6511">CVE-2014-6511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6512">CVE-2014-6512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6513/">CVE-2014-6513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6513">CVE-2014-6513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6515/">CVE-2014-6515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6515">CVE-2014-6515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6527/">CVE-2014-6527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6527">CVE-2014-6527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6531">CVE-2014-6531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6532/">CVE-2014-6532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6532">CVE-2014-6532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6558">CVE-2014-6558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8891/">CVE-2014-8891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8891">CVE-2014-8891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8892/">CVE-2014-8892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8892">CVE-2014-8892 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0138/">CVE-2015-0138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0138">CVE-2015-0138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0192/">CVE-2015-0192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0192">CVE-2015-0192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0458/">CVE-2015-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0458">CVE-2015-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0459/">CVE-2015-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0459">CVE-2015-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0469">CVE-2015-0469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0477">CVE-2015-0477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0478">CVE-2015-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0480">CVE-2015-0480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0488">CVE-2015-0488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0491/">CVE-2015-0491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0491">CVE-2015-0491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1914/">CVE-2015-1914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1914">CVE-2015-1914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2808">CVE-2015-2808 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991463" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589396" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.0-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991464" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991465" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578118" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991463" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589396" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.0-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991464" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991465" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578118" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217223" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="935540" ref_url="https://bugzilla.suse.com/935540" source="BUGZILLA"/>
		<reference ref_id="936844" ref_url="https://bugzilla.suse.com/936844" source="BUGZILLA"/>
		<reference ref_id="938895" ref_url="https://bugzilla.suse.com/938895" source="BUGZILLA"/>
		<reference ref_id="941939" ref_url="https://bugzilla.suse.com/941939" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1931" ref_url="https://www.suse.com/security/cve/CVE-2015-1931/" source="CVE"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001577.html" source="SUSE-SU"/>
		<description>
IBM Java was updated to version 6 SR16 FP7 (6.0-16.7) to fix several security issues and bugs.

The following vulnerabilities were fixed:

* CVE-2015-1931: IBM Java Security Components store plain text data in memory dumps, which could allow a local attacker to obtain information to aid in further attacks against the system.
* CVE-2015-2590: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2601: Easily exploitable vulnerability in the JCE component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2621: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2625: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2632: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2637: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2638: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2664: Difficult to exploit vulnerability in the Deployment component requiring logon to Operating System. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2808: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java accessible data.
* CVE-2015-4000: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java Embedded accessible data. (bnc#935540)
* CVE-2015-4731: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4732: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4733: Easily exploitable vulnerability in the RMI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4748: Very difficult to exploit vulnerability in the Security component allowed successful unauthenticated network attacks via OCSP. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4749: Difficult to exploit vulnerability in the JNDI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized ability to cause a partial denial of service (partial DOS).
* CVE-2015-4760: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.

The following non-security bugs were fixed:

* bsc#936844: misconfigured update-alternative entries
* bsc#941939: provide %{name} instead of %{sdklnk} only in _jvmprivdir
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-21"/>
	<updated date="2015-08-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/935540">SUSE bug 935540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936844">SUSE bug 936844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941939">SUSE bug 941939</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1931/">CVE-2015-1931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1931">CVE-2015-1931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2590">CVE-2015-2590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2601">CVE-2015-2601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2621">CVE-2015-2621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2625">CVE-2015-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2632">CVE-2015-2632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2637">CVE-2015-2637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2638">CVE-2015-2638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2664">CVE-2015-2664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2808">CVE-2015-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4731">CVE-2015-4731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4732">CVE-2015-4732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4733">CVE-2015-4733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4748">CVE-2015-4748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4749">CVE-2015-4749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4760">CVE-2015-4760 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572026" comment="java-1_6_0-ibm-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572027" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572028" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572029" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572030" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572026" comment="java-1_6_0-ibm-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572027" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572028" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572029" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572030" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217224" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="960286" ref_url="https://bugzilla.suse.com/960286" source="BUGZILLA"/>
		<reference ref_id="960402" ref_url="https://bugzilla.suse.com/960402" source="BUGZILLA"/>
		<reference ref_id="963937" ref_url="https://bugzilla.suse.com/963937" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5041" ref_url="https://www.suse.com/security/cve/CVE-2015-5041/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<description>

This update for java-1_6_0-ibm fixes the following issues by updating to 6.0-16.20 (bsc#963937)

- CVE-2015-5041: Could could have invoked non-public interface methods under certain circumstances
- CVE-2015-7575: The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials
- CVE-2015-7981: libpng could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read in the png_convert_to_rfc1123 function. An attacker could exploit this vulnerability to obtain sensitive information
- CVE-2015-8126: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8472: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8540: libpng is vulnerable to a buffer overflow, caused by a read underflow in png_check_keyword in pngwutil.c. By sending an overly long argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
- CVE-2016-0402: An unspecified vulnerability related to the Networking component has no confidentiality impact, partial integrity impact, and no availability impact
- CVE-2016-0448: An unspecified vulnerability related to the JMX component could allow a remote attacker to obtain sensitive information
- CVE-2016-0466: An unspecified vulnerability related to the JAXP component could allow a remote attacker to cause a denial of service
- CVE-2016-0483: An unspecified vulnerability related to the AWT component has complete confidentiality impact, complete integrity impact, and complete availability impact
- CVE-2016-0494: An unspecified vulnerability related to the 2D component has complete confidentiality impact, complete integrity impact, and complete availability impact

The following bugs were fixed:

- bsc#960402: resolve package conflicts in devel package
- bsc#960286: resolve package conflicts in the fonts subpackage
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-11"/>
	<updated date="2016-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/960286">SUSE bug 960286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5041/">CVE-2015-5041 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5041">CVE-2015-5041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7981">CVE-2015-7981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8472">CVE-2015-8472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8540">CVE-2015-8540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0402">CVE-2016-0402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0448">CVE-2016-0448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0466">CVE-2016-0466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0483">CVE-2016-0483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0494">CVE-2016-0494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572031" comment="java-1_6_0-ibm-1.6.0_sr16.20-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572032" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572033" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572034" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217225" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="977646" ref_url="https://bugzilla.suse.com/977646" source="BUGZILLA"/>
		<reference ref_id="977648" ref_url="https://bugzilla.suse.com/977648" source="BUGZILLA"/>
		<reference ref_id="977650" ref_url="https://bugzilla.suse.com/977650" source="BUGZILLA"/>
		<reference ref_id="979252" ref_url="https://bugzilla.suse.com/979252" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0264" ref_url="https://www.suse.com/security/cve/CVE-2016-0264/" source="CVE"/>
		<reference ref_id="CVE-2016-0363" ref_url="https://www.suse.com/security/cve/CVE-2016-0363/" source="CVE"/>
		<reference ref_id="CVE-2016-0376" ref_url="https://www.suse.com/security/cve/CVE-2016-0376/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-3422" ref_url="https://www.suse.com/security/cve/CVE-2016-3422/" source="CVE"/>
		<reference ref_id="CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3443" ref_url="https://www.suse.com/security/cve/CVE-2016-3443/" source="CVE"/>
		<reference ref_id="CVE-2016-3449" ref_url="https://www.suse.com/security/cve/CVE-2016-3449/" source="CVE"/>
		<description>

This IBM Java 1.6.0 SR16 FP25 release fixes the following issues:

Security issues fixed:
- CVE-2016-0264: buffer overflow vulnerability in the IBM JVM (bsc#977648)
- CVE-2016-0363: insecure use of invoke method in CORBA component, incorrect CVE-2013-3009 fix (bsc#977650)
- CVE-2016-0376: insecure deserialization in CORBA, incorrect CVE-2013-5456 fix (bsc#977646)
- The following CVEs got also fixed during this update. (bsc#979252)
  CVE-2016-3443, CVE-2016-0687, CVE-2016-0686, CVE-2016-3427, CVE-2016-3449, CVE-2016-3422, CVE-2016-3426
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-20"/>
	<updated date="2016-05-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/977646">SUSE bug 977646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977648">SUSE bug 977648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977650">SUSE bug 977650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0264/">CVE-2016-0264 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0264">CVE-2016-0264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0363/">CVE-2016-0363 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0363">CVE-2016-0363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0376/">CVE-2016-0376 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0376">CVE-2016-0376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0686">CVE-2016-0686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0687">CVE-2016-0687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3422/">CVE-2016-3422 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3422">CVE-2016-3422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3426">CVE-2016-3426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3427">CVE-2016-3427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3443/">CVE-2016-3443 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3443">CVE-2016-3443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3449/">CVE-2016-3449 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3449">CVE-2016-3449 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572035" comment="java-1_6_0-ibm-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572036" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572037" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572038" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217226" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="992537" ref_url="https://bugzilla.suse.com/992537" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<description>

IBM Java 6 was updated to version 6.0-16.30.

Following security issue was fixed: CVE-2016-3485

Please see https://www.ibm.com/developerworks/java/jdk/alerts/ for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-21"/>
	<updated date="2016-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/992537">SUSE bug 992537</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485 at SUSE</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3485">CVE-2016-3485 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572039" comment="java-1_6_0-ibm-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572040" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572041" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572042" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.30-75.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217227" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1009280" ref_url="https://bugzilla.suse.com/1009280" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<description>

This update for java-1_6_0-ibm fixes the following issues:

- Version update to 6.0-16.35 (bsc#1009280) fixing the following CVE's:
  CVE-2016-5568, CVE-2016-5556, CVE-2016-5573, CVE-2016-5597, CVE-2016-5554,
  CVE-2016-5542
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-07"/>
	<updated date="2016-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5542">CVE-2016-5542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5554">CVE-2016-5554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5556">CVE-2016-5556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5568">CVE-2016-5568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5573">CVE-2016-5573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5597">CVE-2016-5597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572043" comment="java-1_6_0-ibm-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572044" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572045" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572046" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.35-78.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217228" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1027038" ref_url="https://bugzilla.suse.com/1027038" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<description>

This update for java-1_6_0-ibm to 8.0-4.1 fixes the following issues:

Security issue fixed:
- CVE-2016-2183: The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and
  other protocols and products, have a birthday bound of approximately four billion blocks, which
  makes it easier for remote attackers to obtain cleartext data via a birthday attack against a
  long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode,
  aka a 'Sweet32' attack. (bsc#1027038)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-07"/>
	<updated date="2017-04-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027038">SUSE bug 1027038</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572047" comment="java-1_6_0-ibm-1.6.0_sr16.41-81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572048" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.41-81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572049" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.41-81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572050" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.41-81.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217229" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1027038" ref_url="https://bugzilla.suse.com/1027038" source="BUGZILLA"/>
		<reference ref_id="1038505" ref_url="https://bugzilla.suse.com/1038505" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-1289" ref_url="https://www.suse.com/security/cve/CVE-2017-1289/" source="CVE"/>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3514" ref_url="https://www.suse.com/security/cve/CVE-2017-3514/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<description>

This update for java-1_6_0-ibm fixes the following issues:


  - CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in inftrees.c
  - CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in inffast.c
  - CVE-2016-9842: zlib: Undefined left shift of negative number
  - CVE-2016-9843: zlib: Big-endian out-of-bounds pointer
  - CVE-2017-1289: IBM JDK: XML External Entity Injection (XXE) error when processing XML data
  - CVE-2017-3509: OpenJDK: improper re-use of NTLM authenticated connections 
  - CVE-2017-3539: OpenJDK: MD5 allowed for jar verification 
  - CVE-2017-3533: OpenJDK: newline injection in the FTP client
  - CVE-2017-3544: OpenJDK: newline injection in the SMTP client

- Version update to 6.0-16.40 bsc#1027038 CVE-2016-2183		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-30"/>
	<updated date="2017-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027038">SUSE bug 1027038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9840">CVE-2016-9840 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9841">CVE-2016-9841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9842">CVE-2016-9842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9843">CVE-2016-9843 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1289/">CVE-2017-1289 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1289">CVE-2017-1289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3509">CVE-2017-3509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3514/">CVE-2017-3514 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3514">CVE-2017-3514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3533">CVE-2017-3533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3539">CVE-2017-3539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3544">CVE-2017-3544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572051" comment="java-1_6_0-ibm-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572052" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572053" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572054" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.45-84.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217230" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1070162" ref_url="https://bugzilla.suse.com/1070162" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10293" ref_url="https://www.suse.com/security/cve/CVE-2017-10293/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<description>
This update for java-1_6_0-ibm fixes the following issues:

Security issues fixed:

- Security update to version 6.0.16.50 (bsc#1070162)
  * CVE-2017-10346 CVE-2017-10285 CVE-2017-10388 CVE-2017-10356
    CVE-2017-10293 CVE-2016-9841  CVE-2017-10355 CVE-2017-10357
    CVE-2017-10348 CVE-2017-10349 CVE-2017-10347 CVE-2017-10350
    CVE-2017-10281 CVE-2017-10295 CVE-2017-10345
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-19"/>
	<updated date="2017-12-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9841">CVE-2016-9841 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10281">CVE-2017-10281 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10285">CVE-2017-10285 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10293/">CVE-2017-10293 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10293">CVE-2017-10293 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10295">CVE-2017-10295 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10345">CVE-2017-10345 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10346">CVE-2017-10346 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10347">CVE-2017-10347 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10348">CVE-2017-10348 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10349">CVE-2017-10349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10350">CVE-2017-10350 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10355">CVE-2017-10355 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10356">CVE-2017-10356 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10357">CVE-2017-10357 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10388">CVE-2017-10388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572055" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572056" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572057" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572058" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217231" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="955131" ref_url="https://bugzilla.suse.com/955131" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0458" ref_url="https://www.suse.com/security/cve/CVE-2015-0458/" source="CVE"/>
		<reference ref_id="CVE-2015-0459" ref_url="https://www.suse.com/security/cve/CVE-2015-0459/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-0491" ref_url="https://www.suse.com/security/cve/CVE-2015-0491/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-5006" ref_url="https://www.suse.com/security/cve/CVE-2015-5006/" source="CVE"/>
		<description>

This update for java-1_6_0-ibm fixes the following issues: 

- Version update to 6.0-16.15 bsc#955131:
  CVE-2015-4734 CVE-2015-4803 CVE-2015-4805 CVE-2015-4806 CVE-2015-4810
  CVE-2015-4835 CVE-2015-4840 CVE-2015-4842 CVE-2015-4843 CVE-2015-4844
  CVE-2015-4860 CVE-2015-4871 CVE-2015-4872 CVE-2015-4882 CVE-2015-4883
  CVE-2015-4893 CVE-2015-4902 CVE-2015-4903 CVE-2015-4911 CVE-2015-5006

  CVE-2015-2808 CVE-2015-2625 CVE-2015-0491 CVE-2015-0459 CVE-2015-0469
  CVE-2015-0458 CVE-2015-0480 CVE-2015-0488 CVE-2015-0478 CVE-2015-0477
  CVE-2015-0204		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-26"/>
	<updated date="2015-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0458/">CVE-2015-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0458">CVE-2015-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0459/">CVE-2015-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0459">CVE-2015-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0469">CVE-2015-0469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0477">CVE-2015-0477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0478">CVE-2015-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0480">CVE-2015-0480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0488">CVE-2015-0488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0491/">CVE-2015-0491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0491">CVE-2015-0491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2625">CVE-2015-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2808">CVE-2015-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4734">CVE-2015-4734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4803">CVE-2015-4803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4805">CVE-2015-4805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4806">CVE-2015-4806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4810">CVE-2015-4810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4835">CVE-2015-4835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4840">CVE-2015-4840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4842">CVE-2015-4842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4843">CVE-2015-4843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4844">CVE-2015-4844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4860">CVE-2015-4860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4871">CVE-2015-4871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4872">CVE-2015-4872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4882">CVE-2015-4882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4883">CVE-2015-4883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4893">CVE-2015-4893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4902">CVE-2015-4902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4903">CVE-2015-4903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4911">CVE-2015-4911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5006/">CVE-2015-5006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5006">CVE-2015-5006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572059" comment="java-1_6_0-ibm-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572060" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572061" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572062" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217232" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="771791" ref_url="https://bugzilla.suse.com/771791" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2806" ref_url="https://www.suse.com/security/cve/CVE-2012-2806/" source="CVE"/>
		<description>

This update to libjpeg fixes a heap overflow in the JPEG decompression 
functions. (CVE-2012-2806
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2806&gt; )

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-24"/>
	<updated date="2012-07-24"/>
	<bugzilla href="https://bugzilla.suse.com/771791">SUSE bug 771791</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2806/">CVE-2012-2806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2806">CVE-2012-2806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991466" comment="jpeg-6b-879.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991467" comment="libjpeg-6.2.0-879.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991468" comment="libjpeg-32bit-6.2.0-879.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217233" version="1" class="patch">
	<metadata>
		<title>Security update for jpeg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1062937" ref_url="https://bugzilla.suse.com/1062937" source="BUGZILLA"/>
		<reference ref_id="1096209" ref_url="https://bugzilla.suse.com/1096209" source="BUGZILLA"/>
		<reference ref_id="1098155" ref_url="https://bugzilla.suse.com/1098155" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15232" ref_url="https://www.suse.com/security/cve/CVE-2017-15232/" source="CVE"/>
		<reference ref_id="CVE-2018-1152" ref_url="https://www.suse.com/security/cve/CVE-2018-1152/" source="CVE"/>
		<reference ref_id="CVE-2018-11813" ref_url="https://www.suse.com/security/cve/CVE-2018-11813/" source="CVE"/>
		<description>
This update for jpeg fixes the following issues:

* CVE-2017-15232: NULL pointer dereferences in jdpostct.c and jquant1.c could
  lead to denial of service (crash) when processing images [bsc#1062937]
* CVE-2018-11813: Fixed the end-of-file mishandling in read_pixel in rdtarga.c,
  which allowed remote attackers to cause a denial-of-service via crafted JPG
  files due to a large loop [bsc#1096209]
* CVE-2018-1152: Fixed a denial of service in start_input_bmp() rdbmp.c caused
  by a divide by zero when processing a crafted BMP image [bsc#1098155]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-27"/>
	<updated date="2018-06-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062937">SUSE bug 1062937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096209">SUSE bug 1096209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098155">SUSE bug 1098155</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15232/">CVE-2017-15232 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15232">CVE-2017-15232 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1152/">CVE-2018-1152 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1152">CVE-2018-1152 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11813/">CVE-2018-11813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11813">CVE-2018-11813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572067" comment="jpeg-6b-879.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572068" comment="libjpeg-6.2.0-879.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572069" comment="libjpeg-32bit-6.2.0-879.12.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217234" version="1" class="patch">
	<metadata>
		<title>Security update for jpeg (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1128712" ref_url="https://bugzilla.suse.com/1128712" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2018-14498" ref_url="https://www.suse.com/security/cve/CVE-2018-14498/" source="CVE"/>
		<description>
This update for jpeg fixes the following issue:

Security issue fixed: 

- CVE-2018-14498: Fixed a heap-based buffer over read in get_8bit_row function
  which could allow to an attacker to cause denial of service (bsc#1128712).
- CVE-2018-11212: Fixed divide by zero in alloc_sarray function in jmemmgr.c (bsc#1122299).
- CVE-2018-14498: Fixed denial of service in get_8bit_row in rdbmp.c (bsc#1128712).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128712">SUSE bug 1128712</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11212">CVE-2018-11212 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14498/">CVE-2018-14498 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14498">CVE-2018-14498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572070" comment="jpeg-6b-879.12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572071" comment="libjpeg-6.2.0-879.12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572072" comment="libjpeg-32bit-6.2.0-879.12.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217235" version="1" class="patch">
	<metadata>
		<title>Security update for jpeg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1172491" ref_url="https://bugzilla.suse.com/1172491" source="BUGZILLA"/>
		<reference ref_id="1172995" ref_url="https://bugzilla.suse.com/1172995" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13790" ref_url="https://www.suse.com/security/cve/CVE-2020-13790/" source="CVE"/>
		<reference ref_id="CVE-2020-14152" ref_url="https://www.suse.com/security/cve/CVE-2020-14152/" source="CVE"/>
		<description>
This update for jpeg fixes the following issues:

- CVE-2020-14152: Fixed an improper implementation which vould have potentially exhausted the memory (bsc#1172995).
- CVE-2020-13790: Fixed a heap-based buffer over-read via a malformed PPM input file (bsc#1172491).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-25"/>
	<updated date="2020-06-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172491">SUSE bug 1172491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172995">SUSE bug 1172995</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13790/">CVE-2020-13790 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13790">CVE-2020-13790 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14152/">CVE-2020-14152 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14152">CVE-2020-14152 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572073" comment="jpeg-6b-879.12.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572074" comment="libjpeg-6.2.0-879.12.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572075" comment="libjpeg-32bit-6.2.0-879.12.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217236" version="1" class="patch">
	<metadata>
		<title>Recommended update for kbd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="463801" ref_url="https://bugzilla.suse.com/463801" source="BUGZILLA"/>
		<reference ref_id="603950" ref_url="https://bugzilla.suse.com/603950" source="BUGZILLA"/>
		<reference ref_id="663898" ref_url="https://bugzilla.suse.com/663898" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-0460" ref_url="https://www.suse.com/security/cve/CVE-2011-0460/" source="CVE"/>
		<description>

This update avoids that /etc/init.d/kbd stop accesses the system more than 
necessary to allow shut down to succeed even if filesystem mounts are 
hanging (bnc#463801).

		</description>
<advisory from="security@suse.de">
	<issued date="2011-10-05"/>
	<updated date="2011-10-05"/>
	<bugzilla href="https://bugzilla.suse.com/463801">SUSE bug 463801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/603950">SUSE bug 603950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/663898">SUSE bug 663898</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0460/">CVE-2011-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0460">CVE-2011-0460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991469" comment="kbd-1.14.1-16.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217237" version="1" class="patch">
	<metadata>
		<title>Security update for kdebase4-workspace</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="829857" ref_url="https://bugzilla.suse.com/829857" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4132" ref_url="https://www.suse.com/security/cve/CVE-2013-4132/" source="CVE"/>
		<reference ref_id="CVE-2013-4133" ref_url="https://www.suse.com/security/cve/CVE-2013-4133/" source="CVE"/>
		<description>

This kdebase4-workspace update fixes two security issues:

    * NULL pointer dereference in KDM and KCheckPass. (CVE-2013-4132)
    * Memory leak that could lead to a denial of service. (CVE-2013-4133)

Security Issues references:

    * CVE-2013-4132
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4132&gt;
    * CVE-2013-4133
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4133&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-30"/>
	<updated date="2014-06-30"/>
	<bugzilla href="https://bugzilla.suse.com/829857">SUSE bug 829857</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4132/">CVE-2013-4132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4132">CVE-2013-4132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4133/">CVE-2013-4133 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4133">CVE-2013-4133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572076" comment="kde4-kgreeter-plugins-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566653" comment="kdebase4-wallpapers-4.3.5-0.11.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572077" comment="kdebase4-workspace-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572078" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572079" comment="kdm-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572080" comment="kwin-4.3.5-0.12.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217238" version="1" class="patch">
	<metadata>
		<title>Security update for kdenetwork</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="604709" ref_url="https://bugzilla.suse.com/604709" source="BUGZILLA"/>
		<reference ref_id="653852" ref_url="https://bugzilla.suse.com/653852" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-4776" ref_url="https://www.suse.com/security/cve/CVE-2008-4776/" source="CVE"/>
		<reference ref_id="CVE-2010-1000" ref_url="https://www.suse.com/security/cve/CVE-2010-1000/" source="CVE"/>
		<description>

This update of kdenetwork fixes several bugs, the security related issues 
are:

    * CVE-2010-1000: CVSS v2 Base Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N):
      CWE-22

The 'name' attribute of the 'file' element of metalink files is not 
properly sanitised this can be exploited to download files to arbitrary 
directories.

Non-security issues:

    * bnc#653852: kopete: ICQ login broken; login server changed

Security Issue references:

    * CVE-2008-4776
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4776&gt;
    * CVE-2010-1000
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1000&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-11-19"/>
	<updated date="2010-11-19"/>
	<bugzilla href="https://bugzilla.suse.com/604709">SUSE bug 604709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/653852">SUSE bug 653852</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4776/">CVE-2008-4776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4776">CVE-2008-4776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1000/">CVE-2010-1000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1000">CVE-2010-1000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991470" comment="kdenetwork4-filesharing-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991471" comment="kget-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991472" comment="kopete-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991473" comment="krdc-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991474" comment="krfb-4.3.5-0.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217239" version="1" class="patch">
	<metadata>
		<title>Security update for kdebase4-runtime</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="857200" ref_url="https://bugzilla.suse.com/857200" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7252" ref_url="https://www.suse.com/security/cve/CVE-2013-7252/" source="CVE"/>
		<description>

kdebase4-runtime has been updated to fix one security issue:

    * CVE-2013-7252: Added gpg based encryption support to kwallet
      (bnc#857200).

Security Issues:

    * CVE-2013-7252
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7252&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-05"/>
	<updated date="2015-03-05"/>
	<bugzilla href="https://bugzilla.suse.com/857200">SUSE bug 857200</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7252/">CVE-2013-7252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7252">CVE-2013-7252 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566658" comment="kde4-l10n-ar-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572086" comment="kde4-l10n-bg-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572087" comment="kde4-l10n-ca-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566659" comment="kde4-l10n-cs-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572088" comment="kde4-l10n-csb-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566660" comment="kde4-l10n-da-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566663" comment="kde4-l10n-de-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572089" comment="kde4-l10n-el-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566664" comment="kde4-l10n-en_GB-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566665" comment="kde4-l10n-es-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572090" comment="kde4-l10n-et-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572091" comment="kde4-l10n-eu-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572092" comment="kde4-l10n-fi-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566668" comment="kde4-l10n-fr-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572093" comment="kde4-l10n-ga-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572094" comment="kde4-l10n-gl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572095" comment="kde4-l10n-hi-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566671" comment="kde4-l10n-hu-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572096" comment="kde4-l10n-is-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566672" comment="kde4-l10n-it-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566675" comment="kde4-l10n-ja-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572097" comment="kde4-l10n-kk-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572098" comment="kde4-l10n-km-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566676" comment="kde4-l10n-ko-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572099" comment="kde4-l10n-ku-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572100" comment="kde4-l10n-lt-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572101" comment="kde4-l10n-lv-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572102" comment="kde4-l10n-mk-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572103" comment="kde4-l10n-ml-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566677" comment="kde4-l10n-nb-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572104" comment="kde4-l10n-nds-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566678" comment="kde4-l10n-nl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572105" comment="kde4-l10n-nn-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572106" comment="kde4-l10n-pa-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566681" comment="kde4-l10n-pl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566684" comment="kde4-l10n-pt-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566685" comment="kde4-l10n-pt_BR-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572107" comment="kde4-l10n-ro-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566688" comment="kde4-l10n-ru-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572108" comment="kde4-l10n-sl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566691" comment="kde4-l10n-sv-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572109" comment="kde4-l10n-th-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572110" comment="kde4-l10n-tr-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572111" comment="kde4-l10n-uk-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572112" comment="kde4-l10n-wa-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566694" comment="kde4-l10n-zh_CN-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566695" comment="kde4-l10n-zh_TW-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572113" comment="kdebase4-runtime-4.3.5-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217240" version="1" class="patch">
	<metadata>
		<title>Security update for kdebase4-workspace (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="904625" ref_url="https://bugzilla.suse.com/904625" source="BUGZILLA"/>
		<reference ref_id="929718" ref_url="https://bugzilla.suse.com/929718" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8651" ref_url="https://www.suse.com/security/cve/CVE-2014-8651/" source="CVE"/>
		<description>

This update for kdebase4-workspace fixes the following issues:

- CVE-2014-8651: Privilege escalation via KDE Clock KCM helper when non-default polkit settings are used (bsc#904625)

The following non-security bugs were fixed:

- bsc#929718: Make kdm recognize an IPv6 localhost address as localhost

		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-01"/>
	<updated date="2016-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/904625">SUSE bug 904625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929718">SUSE bug 929718</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8651/">CVE-2014-8651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8651">CVE-2014-8651 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572114" comment="kde4-kgreeter-plugins-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566699" comment="kdebase4-wallpapers-4.3.5-0.11.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572115" comment="kdebase4-workspace-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572116" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572117" comment="kdm-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572118" comment="kwin-4.3.5-0.12.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217241" version="1" class="patch">
	<metadata>
		<title>Security update for kdelibs3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="958347" ref_url="https://bugzilla.suse.com/958347" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7543" ref_url="https://www.suse.com/security/cve/CVE-2015-7543/" source="CVE"/>
		<description>
This update for kdelibs3 fixes the following issues:

- CVE-2015-7543: Insecure creation of temporary directories allowed local users
  to hijack the IPC by pre-creating the temporary directory (bsc#958347).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-26"/>
	<updated date="2018-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958347">SUSE bug 958347</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7543/">CVE-2015-7543 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7543">CVE-2015-7543 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572119" comment="kdelibs3-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564597" comment="kdelibs3-32bit-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572120" comment="kdelibs3-default-style-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564601" comment="kdelibs3-default-style-32bit-3.5.10-23.30.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217242" version="1" class="patch">
	<metadata>
		<title>Security update for kdelibs4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="622304" ref_url="https://bugzilla.suse.com/622304" source="BUGZILLA"/>
		<reference ref_id="669222" ref_url="https://bugzilla.suse.com/669222" source="BUGZILLA"/>
		<reference ref_id="686652" ref_url="https://bugzilla.suse.com/686652" source="BUGZILLA"/>
		<reference ref_id="787520" ref_url="https://bugzilla.suse.com/787520" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1094" ref_url="https://www.suse.com/security/cve/CVE-2011-1094/" source="CVE"/>
		<reference ref_id="CVE-2011-1168" ref_url="https://www.suse.com/security/cve/CVE-2011-1168/" source="CVE"/>
		<reference ref_id="CVE-2012-4512" ref_url="https://www.suse.com/security/cve/CVE-2012-4512/" source="CVE"/>
		<reference ref_id="CVE-2012-4513" ref_url="https://www.suse.com/security/cve/CVE-2012-4513/" source="CVE"/>
		<reference ref_id="CVE-2012-4515" ref_url="https://www.suse.com/security/cve/CVE-2012-4515/" source="CVE"/>
		<description>

This kdelibs4 update fixes several security issues related to 
khtml/konqueror.

    * Fix security issues and null pointer references in khtml/konqueror
      (bnc#787520) (CVE-2012-4512, CVE-2012-4513, CVE-2012-4515)

Security Issue references:

    * CVE-2012-4512
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4512&gt;
    * CVE-2012-4513
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4513&gt;
    * CVE-2012-4515
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4515&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-01"/>
	<updated date="2013-10-01"/>
	<bugzilla href="https://bugzilla.suse.com/622304">SUSE bug 622304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/669222">SUSE bug 669222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/686652">SUSE bug 686652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787520">SUSE bug 787520</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1094/">CVE-2011-1094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1094">CVE-2011-1094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1168/">CVE-2011-1168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1168">CVE-2011-1168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4512/">CVE-2012-4512 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-4512">CVE-2012-4512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4513/">CVE-2012-4513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4513">CVE-2012-4513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4515/">CVE-2012-4515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4515">CVE-2012-4515 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991475" comment="kdelibs4-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991476" comment="kdelibs4-core-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991477" comment="kdelibs4-doc-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991478" comment="libkde4-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562953" comment="libkde4-32bit-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991479" comment="libkdecore4-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562955" comment="libkdecore4-32bit-4.3.5-0.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217243" version="1" class="patch">
	<metadata>
		<title>Security update for kdirstat</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="868682" ref_url="https://bugzilla.suse.com/868682" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2527" ref_url="https://www.suse.com/security/cve/CVE-2014-2527/" source="CVE"/>
		<reference ref_id="CVE-2014-2528" ref_url="https://www.suse.com/security/cve/CVE-2014-2528/" source="CVE"/>
		<description>

The following security issue has been fixed:

    * #868682: CVE-2014-2527 CVE-2014-2528: kdirstat: command injection in
      kcleanup

Security Issues:

    * CVE-2014-2527
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2527&gt;
    * CVE-2014-2528
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2528&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-06"/>
	<updated date="2014-07-06"/>
	<bugzilla href="https://bugzilla.suse.com/868682">SUSE bug 868682</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2527/">CVE-2014-2527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2527">CVE-2014-2527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2528/">CVE-2014-2528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2528">CVE-2014-2528 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572130" comment="kdirstat-2.4.4-255.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217244" version="1" class="patch">
	<metadata>
		<title>Recommended update for kdump</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="609143" ref_url="https://bugzilla.suse.com/609143" source="BUGZILLA"/>
		<reference ref_id="655743" ref_url="https://bugzilla.suse.com/655743" source="BUGZILLA"/>
		<reference ref_id="667142" ref_url="https://bugzilla.suse.com/667142" source="BUGZILLA"/>
		<reference ref_id="699659" ref_url="https://bugzilla.suse.com/699659" source="BUGZILLA"/>
		<reference ref_id="706059" ref_url="https://bugzilla.suse.com/706059" source="BUGZILLA"/>
		<reference ref_id="706936" ref_url="https://bugzilla.suse.com/706936" source="BUGZILLA"/>
		<reference ref_id="717263" ref_url="https://bugzilla.suse.com/717263" source="BUGZILLA"/>
		<reference ref_id="718684" ref_url="https://bugzilla.suse.com/718684" source="BUGZILLA"/>
		<reference ref_id="722440" ref_url="https://bugzilla.suse.com/722440" source="BUGZILLA"/>
		<reference ref_id="732768" ref_url="https://bugzilla.suse.com/732768" source="BUGZILLA"/>
		<reference ref_id="742884" ref_url="https://bugzilla.suse.com/742884" source="BUGZILLA"/>
		<reference ref_id="765175" ref_url="https://bugzilla.suse.com/765175" source="BUGZILLA"/>
		<reference ref_id="783592" ref_url="https://bugzilla.suse.com/783592" source="BUGZILLA"/>
		<reference ref_id="804800" ref_url="https://bugzilla.suse.com/804800" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-4190" ref_url="https://www.suse.com/security/cve/CVE-2011-4190/" source="CVE"/>
		<description>

This update for Kdump provides the following fixes and enhancements:

    * Add a new configuration option to set the number of CPUs that will be
      available in the Kdump environment. On SMP systems, makedumpfile will
      then enable the split mode to dump data to multiple DUMPFILEs in
      parallel. (bnc#783592)
    * Close a race condition between creating the kdump initrd and
      restricting its file permissions to avoid leaking sensitive
      information, such as private keys or passwords needed to save a dump
      to a remote system. (bnc#742884)
    * Do not set up iommu pass-through for the kdump kernel. (bnc#804800)

		</description>
<advisory from="security@suse.de">
	<issued date="2013-04-03"/>
	<updated date="2013-04-03"/>
	<bugzilla href="https://bugzilla.suse.com/609143">SUSE bug 609143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/655743">SUSE bug 655743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/667142">SUSE bug 667142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/699659">SUSE bug 699659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/706059">SUSE bug 706059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/706936">SUSE bug 706936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/717263">SUSE bug 717263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/718684">SUSE bug 718684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/722440">SUSE bug 722440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/732768">SUSE bug 732768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742884">SUSE bug 742884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/765175">SUSE bug 765175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/783592">SUSE bug 783592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804800">SUSE bug 804800</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4190/">CVE-2011-4190 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2011-4190">CVE-2011-4190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991480" comment="kdump-0.7.8-1.33.35.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217245" version="1" class="patch">
	<metadata>
		<title>Security update for Kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="466279" ref_url="https://bugzilla.suse.com/466279" source="BUGZILLA"/>
		<reference ref_id="468397" ref_url="https://bugzilla.suse.com/468397" source="BUGZILLA"/>
		<reference ref_id="501563" ref_url="https://bugzilla.suse.com/501563" source="BUGZILLA"/>
		<reference ref_id="529535" ref_url="https://bugzilla.suse.com/529535" source="BUGZILLA"/>
		<reference ref_id="552250" ref_url="https://bugzilla.suse.com/552250" source="BUGZILLA"/>
		<reference ref_id="557710" ref_url="https://bugzilla.suse.com/557710" source="BUGZILLA"/>
		<reference ref_id="558740" ref_url="https://bugzilla.suse.com/558740" source="BUGZILLA"/>
		<reference ref_id="564324" ref_url="https://bugzilla.suse.com/564324" source="BUGZILLA"/>
		<reference ref_id="564423" ref_url="https://bugzilla.suse.com/564423" source="BUGZILLA"/>
		<reference ref_id="566768" ref_url="https://bugzilla.suse.com/566768" source="BUGZILLA"/>
		<reference ref_id="573330" ref_url="https://bugzilla.suse.com/573330" source="BUGZILLA"/>
		<reference ref_id="574006" ref_url="https://bugzilla.suse.com/574006" source="BUGZILLA"/>
		<reference ref_id="577967" ref_url="https://bugzilla.suse.com/577967" source="BUGZILLA"/>
		<reference ref_id="578572" ref_url="https://bugzilla.suse.com/578572" source="BUGZILLA"/>
		<reference ref_id="580373" ref_url="https://bugzilla.suse.com/580373" source="BUGZILLA"/>
		<reference ref_id="582730" ref_url="https://bugzilla.suse.com/582730" source="BUGZILLA"/>
		<reference ref_id="584493" ref_url="https://bugzilla.suse.com/584493" source="BUGZILLA"/>
		<reference ref_id="585385" ref_url="https://bugzilla.suse.com/585385" source="BUGZILLA"/>
		<reference ref_id="588929" ref_url="https://bugzilla.suse.com/588929" source="BUGZILLA"/>
		<reference ref_id="594362" ref_url="https://bugzilla.suse.com/594362" source="BUGZILLA"/>
		<reference ref_id="595215" ref_url="https://bugzilla.suse.com/595215" source="BUGZILLA"/>
		<reference ref_id="596113" ref_url="https://bugzilla.suse.com/596113" source="BUGZILLA"/>
		<reference ref_id="596646" ref_url="https://bugzilla.suse.com/596646" source="BUGZILLA"/>
		<reference ref_id="598308" ref_url="https://bugzilla.suse.com/598308" source="BUGZILLA"/>
		<reference ref_id="598493" ref_url="https://bugzilla.suse.com/598493" source="BUGZILLA"/>
		<reference ref_id="598677" ref_url="https://bugzilla.suse.com/598677" source="BUGZILLA"/>
		<reference ref_id="599508" ref_url="https://bugzilla.suse.com/599508" source="BUGZILLA"/>
		<reference ref_id="599671" ref_url="https://bugzilla.suse.com/599671" source="BUGZILLA"/>
		<reference ref_id="600043" ref_url="https://bugzilla.suse.com/600043" source="BUGZILLA"/>
		<reference ref_id="600256" ref_url="https://bugzilla.suse.com/600256" source="BUGZILLA"/>
		<reference ref_id="600375" ref_url="https://bugzilla.suse.com/600375" source="BUGZILLA"/>
		<reference ref_id="600579" ref_url="https://bugzilla.suse.com/600579" source="BUGZILLA"/>
		<reference ref_id="601520" ref_url="https://bugzilla.suse.com/601520" source="BUGZILLA"/>
		<reference ref_id="602150" ref_url="https://bugzilla.suse.com/602150" source="BUGZILLA"/>
		<reference ref_id="602232" ref_url="https://bugzilla.suse.com/602232" source="BUGZILLA"/>
		<reference ref_id="602838" ref_url="https://bugzilla.suse.com/602838" source="BUGZILLA"/>
		<reference ref_id="602969" ref_url="https://bugzilla.suse.com/602969" source="BUGZILLA"/>
		<reference ref_id="603387" ref_url="https://bugzilla.suse.com/603387" source="BUGZILLA"/>
		<reference ref_id="603411" ref_url="https://bugzilla.suse.com/603411" source="BUGZILLA"/>
		<reference ref_id="603464" ref_url="https://bugzilla.suse.com/603464" source="BUGZILLA"/>
		<reference ref_id="603510" ref_url="https://bugzilla.suse.com/603510" source="BUGZILLA"/>
		<reference ref_id="603528" ref_url="https://bugzilla.suse.com/603528" source="BUGZILLA"/>
		<reference ref_id="603738" ref_url="https://bugzilla.suse.com/603738" source="BUGZILLA"/>
		<reference ref_id="605001" ref_url="https://bugzilla.suse.com/605001" source="BUGZILLA"/>
		<reference ref_id="605321" ref_url="https://bugzilla.suse.com/605321" source="BUGZILLA"/>
		<reference ref_id="605947" ref_url="https://bugzilla.suse.com/605947" source="BUGZILLA"/>
		<reference ref_id="606575" ref_url="https://bugzilla.suse.com/606575" source="BUGZILLA"/>
		<reference ref_id="606743" ref_url="https://bugzilla.suse.com/606743" source="BUGZILLA"/>
		<reference ref_id="606778" ref_url="https://bugzilla.suse.com/606778" source="BUGZILLA"/>
		<reference ref_id="606797" ref_url="https://bugzilla.suse.com/606797" source="BUGZILLA"/>
		<reference ref_id="607123" ref_url="https://bugzilla.suse.com/607123" source="BUGZILLA"/>
		<reference ref_id="607448" ref_url="https://bugzilla.suse.com/607448" source="BUGZILLA"/>
		<reference ref_id="607628" ref_url="https://bugzilla.suse.com/607628" source="BUGZILLA"/>
		<reference ref_id="607890" ref_url="https://bugzilla.suse.com/607890" source="BUGZILLA"/>
		<reference ref_id="608435" ref_url="https://bugzilla.suse.com/608435" source="BUGZILLA"/>
		<reference ref_id="608478" ref_url="https://bugzilla.suse.com/608478" source="BUGZILLA"/>
		<reference ref_id="608576" ref_url="https://bugzilla.suse.com/608576" source="BUGZILLA"/>
		<reference ref_id="609172" ref_url="https://bugzilla.suse.com/609172" source="BUGZILLA"/>
		<reference ref_id="609196" ref_url="https://bugzilla.suse.com/609196" source="BUGZILLA"/>
		<reference ref_id="609281" ref_url="https://bugzilla.suse.com/609281" source="BUGZILLA"/>
		<reference ref_id="609506" ref_url="https://bugzilla.suse.com/609506" source="BUGZILLA"/>
		<reference ref_id="610362" ref_url="https://bugzilla.suse.com/610362" source="BUGZILLA"/>
		<reference ref_id="610598" ref_url="https://bugzilla.suse.com/610598" source="BUGZILLA"/>
		<reference ref_id="610783" ref_url="https://bugzilla.suse.com/610783" source="BUGZILLA"/>
		<reference ref_id="610828" ref_url="https://bugzilla.suse.com/610828" source="BUGZILLA"/>
		<reference ref_id="611094" ref_url="https://bugzilla.suse.com/611094" source="BUGZILLA"/>
		<reference ref_id="611104" ref_url="https://bugzilla.suse.com/611104" source="BUGZILLA"/>
		<reference ref_id="611760" ref_url="https://bugzilla.suse.com/611760" source="BUGZILLA"/>
		<reference ref_id="612009" ref_url="https://bugzilla.suse.com/612009" source="BUGZILLA"/>
		<reference ref_id="612457" ref_url="https://bugzilla.suse.com/612457" source="BUGZILLA"/>
		<reference ref_id="612729" ref_url="https://bugzilla.suse.com/612729" source="BUGZILLA"/>
		<reference ref_id="613171" ref_url="https://bugzilla.suse.com/613171" source="BUGZILLA"/>
		<reference ref_id="613273" ref_url="https://bugzilla.suse.com/613273" source="BUGZILLA"/>
		<reference ref_id="613330" ref_url="https://bugzilla.suse.com/613330" source="BUGZILLA"/>
		<reference ref_id="613542" ref_url="https://bugzilla.suse.com/613542" source="BUGZILLA"/>
		<reference ref_id="613906" ref_url="https://bugzilla.suse.com/613906" source="BUGZILLA"/>
		<reference ref_id="614226" ref_url="https://bugzilla.suse.com/614226" source="BUGZILLA"/>
		<reference ref_id="614332" ref_url="https://bugzilla.suse.com/614332" source="BUGZILLA"/>
		<reference ref_id="614793" ref_url="https://bugzilla.suse.com/614793" source="BUGZILLA"/>
		<reference ref_id="615003" ref_url="https://bugzilla.suse.com/615003" source="BUGZILLA"/>
		<reference ref_id="615557" ref_url="https://bugzilla.suse.com/615557" source="BUGZILLA"/>
		<reference ref_id="615630" ref_url="https://bugzilla.suse.com/615630" source="BUGZILLA"/>
		<reference ref_id="616080" ref_url="https://bugzilla.suse.com/616080" source="BUGZILLA"/>
		<reference ref_id="616088" ref_url="https://bugzilla.suse.com/616088" source="BUGZILLA"/>
		<reference ref_id="616369" ref_url="https://bugzilla.suse.com/616369" source="BUGZILLA"/>
		<reference ref_id="616464" ref_url="https://bugzilla.suse.com/616464" source="BUGZILLA"/>
		<reference ref_id="616612" ref_url="https://bugzilla.suse.com/616612" source="BUGZILLA"/>
		<reference ref_id="617248" ref_url="https://bugzilla.suse.com/617248" source="BUGZILLA"/>
		<reference ref_id="617464" ref_url="https://bugzilla.suse.com/617464" source="BUGZILLA"/>
		<reference ref_id="618059" ref_url="https://bugzilla.suse.com/618059" source="BUGZILLA"/>
		<reference ref_id="618072" ref_url="https://bugzilla.suse.com/618072" source="BUGZILLA"/>
		<reference ref_id="618157" ref_url="https://bugzilla.suse.com/618157" source="BUGZILLA"/>
		<reference ref_id="618379" ref_url="https://bugzilla.suse.com/618379" source="BUGZILLA"/>
		<reference ref_id="618424" ref_url="https://bugzilla.suse.com/618424" source="BUGZILLA"/>
		<reference ref_id="618444" ref_url="https://bugzilla.suse.com/618444" source="BUGZILLA"/>
		<reference ref_id="618767" ref_url="https://bugzilla.suse.com/618767" source="BUGZILLA"/>
		<reference ref_id="619002" ref_url="https://bugzilla.suse.com/619002" source="BUGZILLA"/>
		<reference ref_id="619007" ref_url="https://bugzilla.suse.com/619007" source="BUGZILLA"/>
		<reference ref_id="619416" ref_url="https://bugzilla.suse.com/619416" source="BUGZILLA"/>
		<reference ref_id="619525" ref_url="https://bugzilla.suse.com/619525" source="BUGZILLA"/>
		<reference ref_id="619536" ref_url="https://bugzilla.suse.com/619536" source="BUGZILLA"/>
		<reference ref_id="619840" ref_url="https://bugzilla.suse.com/619840" source="BUGZILLA"/>
		<reference ref_id="620020" ref_url="https://bugzilla.suse.com/620020" source="BUGZILLA"/>
		<reference ref_id="620021" ref_url="https://bugzilla.suse.com/620021" source="BUGZILLA"/>
		<reference ref_id="620372" ref_url="https://bugzilla.suse.com/620372" source="BUGZILLA"/>
		<reference ref_id="620443" ref_url="https://bugzilla.suse.com/620443" source="BUGZILLA"/>
		<reference ref_id="620654" ref_url="https://bugzilla.suse.com/620654" source="BUGZILLA"/>
		<reference ref_id="620904" ref_url="https://bugzilla.suse.com/620904" source="BUGZILLA"/>
		<reference ref_id="620929" ref_url="https://bugzilla.suse.com/620929" source="BUGZILLA"/>
		<reference ref_id="621111" ref_url="https://bugzilla.suse.com/621111" source="BUGZILLA"/>
		<reference ref_id="621598" ref_url="https://bugzilla.suse.com/621598" source="BUGZILLA"/>
		<reference ref_id="621715" ref_url="https://bugzilla.suse.com/621715" source="BUGZILLA"/>
		<reference ref_id="622597" ref_url="https://bugzilla.suse.com/622597" source="BUGZILLA"/>
		<reference ref_id="622635" ref_url="https://bugzilla.suse.com/622635" source="BUGZILLA"/>
		<reference ref_id="622727" ref_url="https://bugzilla.suse.com/622727" source="BUGZILLA"/>
		<reference ref_id="622868" ref_url="https://bugzilla.suse.com/622868" source="BUGZILLA"/>
		<reference ref_id="623307" ref_url="https://bugzilla.suse.com/623307" source="BUGZILLA"/>
		<reference ref_id="623393" ref_url="https://bugzilla.suse.com/623393" source="BUGZILLA"/>
		<reference ref_id="623472" ref_url="https://bugzilla.suse.com/623472" source="BUGZILLA"/>
		<reference ref_id="624020" ref_url="https://bugzilla.suse.com/624020" source="BUGZILLA"/>
		<reference ref_id="624340" ref_url="https://bugzilla.suse.com/624340" source="BUGZILLA"/>
		<reference ref_id="624436" ref_url="https://bugzilla.suse.com/624436" source="BUGZILLA"/>
		<reference ref_id="624587" ref_url="https://bugzilla.suse.com/624587" source="BUGZILLA"/>
		<reference ref_id="624606" ref_url="https://bugzilla.suse.com/624606" source="BUGZILLA"/>
		<reference ref_id="624814" ref_url="https://bugzilla.suse.com/624814" source="BUGZILLA"/>
		<reference ref_id="624850" ref_url="https://bugzilla.suse.com/624850" source="BUGZILLA"/>
		<reference ref_id="625167" ref_url="https://bugzilla.suse.com/625167" source="BUGZILLA"/>
		<reference ref_id="625666" ref_url="https://bugzilla.suse.com/625666" source="BUGZILLA"/>
		<reference ref_id="625674" ref_url="https://bugzilla.suse.com/625674" source="BUGZILLA"/>
		<reference ref_id="625965" ref_url="https://bugzilla.suse.com/625965" source="BUGZILLA"/>
		<reference ref_id="626119" ref_url="https://bugzilla.suse.com/626119" source="BUGZILLA"/>
		<reference ref_id="626321" ref_url="https://bugzilla.suse.com/626321" source="BUGZILLA"/>
		<reference ref_id="626880" ref_url="https://bugzilla.suse.com/626880" source="BUGZILLA"/>
		<reference ref_id="627060" ref_url="https://bugzilla.suse.com/627060" source="BUGZILLA"/>
		<reference ref_id="627386" ref_url="https://bugzilla.suse.com/627386" source="BUGZILLA"/>
		<reference ref_id="627447" ref_url="https://bugzilla.suse.com/627447" source="BUGZILLA"/>
		<reference ref_id="627518" ref_url="https://bugzilla.suse.com/627518" source="BUGZILLA"/>
		<reference ref_id="628180" ref_url="https://bugzilla.suse.com/628180" source="BUGZILLA"/>
		<reference ref_id="628604" ref_url="https://bugzilla.suse.com/628604" source="BUGZILLA"/>
		<reference ref_id="629170" ref_url="https://bugzilla.suse.com/629170" source="BUGZILLA"/>
		<reference ref_id="629263" ref_url="https://bugzilla.suse.com/629263" source="BUGZILLA"/>
		<reference ref_id="629552" ref_url="https://bugzilla.suse.com/629552" source="BUGZILLA"/>
		<reference ref_id="629901" ref_url="https://bugzilla.suse.com/629901" source="BUGZILLA"/>
		<reference ref_id="629908" ref_url="https://bugzilla.suse.com/629908" source="BUGZILLA"/>
		<reference ref_id="630068" ref_url="https://bugzilla.suse.com/630068" source="BUGZILLA"/>
		<reference ref_id="630121" ref_url="https://bugzilla.suse.com/630121" source="BUGZILLA"/>
		<reference ref_id="630132" ref_url="https://bugzilla.suse.com/630132" source="BUGZILLA"/>
		<reference ref_id="630970" ref_url="https://bugzilla.suse.com/630970" source="BUGZILLA"/>
		<reference ref_id="631075" ref_url="https://bugzilla.suse.com/631075" source="BUGZILLA"/>
		<reference ref_id="631801" ref_url="https://bugzilla.suse.com/631801" source="BUGZILLA"/>
		<reference ref_id="632309" ref_url="https://bugzilla.suse.com/632309" source="BUGZILLA"/>
		<reference ref_id="632317" ref_url="https://bugzilla.suse.com/632317" source="BUGZILLA"/>
		<reference ref_id="632568" ref_url="https://bugzilla.suse.com/632568" source="BUGZILLA"/>
		<reference ref_id="632974" ref_url="https://bugzilla.suse.com/632974" source="BUGZILLA"/>
		<reference ref_id="632975" ref_url="https://bugzilla.suse.com/632975" source="BUGZILLA"/>
		<reference ref_id="633026" ref_url="https://bugzilla.suse.com/633026" source="BUGZILLA"/>
		<reference ref_id="633268" ref_url="https://bugzilla.suse.com/633268" source="BUGZILLA"/>
		<reference ref_id="633543" ref_url="https://bugzilla.suse.com/633543" source="BUGZILLA"/>
		<reference ref_id="633581" ref_url="https://bugzilla.suse.com/633581" source="BUGZILLA"/>
		<reference ref_id="633585" ref_url="https://bugzilla.suse.com/633585" source="BUGZILLA"/>
		<reference ref_id="633593" ref_url="https://bugzilla.suse.com/633593" source="BUGZILLA"/>
		<reference ref_id="633733" ref_url="https://bugzilla.suse.com/633733" source="BUGZILLA"/>
		<reference ref_id="634637" ref_url="https://bugzilla.suse.com/634637" source="BUGZILLA"/>
		<reference ref_id="635413" ref_url="https://bugzilla.suse.com/635413" source="BUGZILLA"/>
		<reference ref_id="635425" ref_url="https://bugzilla.suse.com/635425" source="BUGZILLA"/>
		<reference ref_id="635515" ref_url="https://bugzilla.suse.com/635515" source="BUGZILLA"/>
		<reference ref_id="636112" ref_url="https://bugzilla.suse.com/636112" source="BUGZILLA"/>
		<reference ref_id="636435" ref_url="https://bugzilla.suse.com/636435" source="BUGZILLA"/>
		<reference ref_id="636461" ref_url="https://bugzilla.suse.com/636461" source="BUGZILLA"/>
		<reference ref_id="636561" ref_url="https://bugzilla.suse.com/636561" source="BUGZILLA"/>
		<reference ref_id="636672" ref_url="https://bugzilla.suse.com/636672" source="BUGZILLA"/>
		<reference ref_id="636850" ref_url="https://bugzilla.suse.com/636850" source="BUGZILLA"/>
		<reference ref_id="637377" ref_url="https://bugzilla.suse.com/637377" source="BUGZILLA"/>
		<reference ref_id="637436" ref_url="https://bugzilla.suse.com/637436" source="BUGZILLA"/>
		<reference ref_id="637502" ref_url="https://bugzilla.suse.com/637502" source="BUGZILLA"/>
		<reference ref_id="637542" ref_url="https://bugzilla.suse.com/637542" source="BUGZILLA"/>
		<reference ref_id="637639" ref_url="https://bugzilla.suse.com/637639" source="BUGZILLA"/>
		<reference ref_id="637944" ref_url="https://bugzilla.suse.com/637944" source="BUGZILLA"/>
		<reference ref_id="638258" ref_url="https://bugzilla.suse.com/638258" source="BUGZILLA"/>
		<reference ref_id="638274" ref_url="https://bugzilla.suse.com/638274" source="BUGZILLA"/>
		<reference ref_id="638277" ref_url="https://bugzilla.suse.com/638277" source="BUGZILLA"/>
		<reference ref_id="638400" ref_url="https://bugzilla.suse.com/638400" source="BUGZILLA"/>
		<reference ref_id="638613" ref_url="https://bugzilla.suse.com/638613" source="BUGZILLA"/>
		<reference ref_id="638618" ref_url="https://bugzilla.suse.com/638618" source="BUGZILLA"/>
		<reference ref_id="638807" ref_url="https://bugzilla.suse.com/638807" source="BUGZILLA"/>
		<reference ref_id="638860" ref_url="https://bugzilla.suse.com/638860" source="BUGZILLA"/>
		<reference ref_id="638985" ref_url="https://bugzilla.suse.com/638985" source="BUGZILLA"/>
		<reference ref_id="639161" ref_url="https://bugzilla.suse.com/639161" source="BUGZILLA"/>
		<reference ref_id="639197" ref_url="https://bugzilla.suse.com/639197" source="BUGZILLA"/>
		<reference ref_id="639261" ref_url="https://bugzilla.suse.com/639261" source="BUGZILLA"/>
		<reference ref_id="639481" ref_url="https://bugzilla.suse.com/639481" source="BUGZILLA"/>
		<reference ref_id="639482" ref_url="https://bugzilla.suse.com/639482" source="BUGZILLA"/>
		<reference ref_id="639483" ref_url="https://bugzilla.suse.com/639483" source="BUGZILLA"/>
		<reference ref_id="639708" ref_url="https://bugzilla.suse.com/639708" source="BUGZILLA"/>
		<reference ref_id="639709" ref_url="https://bugzilla.suse.com/639709" source="BUGZILLA"/>
		<reference ref_id="639728" ref_url="https://bugzilla.suse.com/639728" source="BUGZILLA"/>
		<reference ref_id="639803" ref_url="https://bugzilla.suse.com/639803" source="BUGZILLA"/>
		<reference ref_id="639944" ref_url="https://bugzilla.suse.com/639944" source="BUGZILLA"/>
		<reference ref_id="640276" ref_url="https://bugzilla.suse.com/640276" source="BUGZILLA"/>
		<reference ref_id="640278" ref_url="https://bugzilla.suse.com/640278" source="BUGZILLA"/>
		<reference ref_id="640721" ref_url="https://bugzilla.suse.com/640721" source="BUGZILLA"/>
		<reference ref_id="640850" ref_url="https://bugzilla.suse.com/640850" source="BUGZILLA"/>
		<reference ref_id="640878" ref_url="https://bugzilla.suse.com/640878" source="BUGZILLA"/>
		<reference ref_id="641105" ref_url="https://bugzilla.suse.com/641105" source="BUGZILLA"/>
		<reference ref_id="641247" ref_url="https://bugzilla.suse.com/641247" source="BUGZILLA"/>
		<reference ref_id="641811" ref_url="https://bugzilla.suse.com/641811" source="BUGZILLA"/>
		<reference ref_id="642009" ref_url="https://bugzilla.suse.com/642009" source="BUGZILLA"/>
		<reference ref_id="642043" ref_url="https://bugzilla.suse.com/642043" source="BUGZILLA"/>
		<reference ref_id="642309" ref_url="https://bugzilla.suse.com/642309" source="BUGZILLA"/>
		<reference ref_id="642313" ref_url="https://bugzilla.suse.com/642313" source="BUGZILLA"/>
		<reference ref_id="642314" ref_url="https://bugzilla.suse.com/642314" source="BUGZILLA"/>
		<reference ref_id="642449" ref_url="https://bugzilla.suse.com/642449" source="BUGZILLA"/>
		<reference ref_id="642486" ref_url="https://bugzilla.suse.com/642486" source="BUGZILLA"/>
		<reference ref_id="643173" ref_url="https://bugzilla.suse.com/643173" source="BUGZILLA"/>
		<reference ref_id="643249" ref_url="https://bugzilla.suse.com/643249" source="BUGZILLA"/>
		<reference ref_id="643266" ref_url="https://bugzilla.suse.com/643266" source="BUGZILLA"/>
		<reference ref_id="643477" ref_url="https://bugzilla.suse.com/643477" source="BUGZILLA"/>
		<reference ref_id="643513" ref_url="https://bugzilla.suse.com/643513" source="BUGZILLA"/>
		<reference ref_id="643909" ref_url="https://bugzilla.suse.com/643909" source="BUGZILLA"/>
		<reference ref_id="643914" ref_url="https://bugzilla.suse.com/643914" source="BUGZILLA"/>
		<reference ref_id="643922" ref_url="https://bugzilla.suse.com/643922" source="BUGZILLA"/>
		<reference ref_id="644219" ref_url="https://bugzilla.suse.com/644219" source="BUGZILLA"/>
		<reference ref_id="644350" ref_url="https://bugzilla.suse.com/644350" source="BUGZILLA"/>
		<reference ref_id="644373" ref_url="https://bugzilla.suse.com/644373" source="BUGZILLA"/>
		<reference ref_id="644630" ref_url="https://bugzilla.suse.com/644630" source="BUGZILLA"/>
		<reference ref_id="645659" ref_url="https://bugzilla.suse.com/645659" source="BUGZILLA"/>
		<reference ref_id="646045" ref_url="https://bugzilla.suse.com/646045" source="BUGZILLA"/>
		<reference ref_id="646226" ref_url="https://bugzilla.suse.com/646226" source="BUGZILLA"/>
		<reference ref_id="646542" ref_url="https://bugzilla.suse.com/646542" source="BUGZILLA"/>
		<reference ref_id="646702" ref_url="https://bugzilla.suse.com/646702" source="BUGZILLA"/>
		<reference ref_id="646908" ref_url="https://bugzilla.suse.com/646908" source="BUGZILLA"/>
		<reference ref_id="647392" ref_url="https://bugzilla.suse.com/647392" source="BUGZILLA"/>
		<reference ref_id="647497" ref_url="https://bugzilla.suse.com/647497" source="BUGZILLA"/>
		<reference ref_id="647567" ref_url="https://bugzilla.suse.com/647567" source="BUGZILLA"/>
		<reference ref_id="647775" ref_url="https://bugzilla.suse.com/647775" source="BUGZILLA"/>
		<reference ref_id="648112" ref_url="https://bugzilla.suse.com/648112" source="BUGZILLA"/>
		<reference ref_id="648308" ref_url="https://bugzilla.suse.com/648308" source="BUGZILLA"/>
		<reference ref_id="648647" ref_url="https://bugzilla.suse.com/648647" source="BUGZILLA"/>
		<reference ref_id="648701" ref_url="https://bugzilla.suse.com/648701" source="BUGZILLA"/>
		<reference ref_id="648916" ref_url="https://bugzilla.suse.com/648916" source="BUGZILLA"/>
		<reference ref_id="649000" ref_url="https://bugzilla.suse.com/649000" source="BUGZILLA"/>
		<reference ref_id="649187" ref_url="https://bugzilla.suse.com/649187" source="BUGZILLA"/>
		<reference ref_id="649231" ref_url="https://bugzilla.suse.com/649231" source="BUGZILLA"/>
		<reference ref_id="649257" ref_url="https://bugzilla.suse.com/649257" source="BUGZILLA"/>
		<reference ref_id="649473" ref_url="https://bugzilla.suse.com/649473" source="BUGZILLA"/>
		<reference ref_id="649548" ref_url="https://bugzilla.suse.com/649548" source="BUGZILLA"/>
		<reference ref_id="649820" ref_url="https://bugzilla.suse.com/649820" source="BUGZILLA"/>
		<reference ref_id="650067" ref_url="https://bugzilla.suse.com/650067" source="BUGZILLA"/>
		<reference ref_id="650109" ref_url="https://bugzilla.suse.com/650109" source="BUGZILLA"/>
		<reference ref_id="650111" ref_url="https://bugzilla.suse.com/650111" source="BUGZILLA"/>
		<reference ref_id="650113" ref_url="https://bugzilla.suse.com/650113" source="BUGZILLA"/>
		<reference ref_id="650116" ref_url="https://bugzilla.suse.com/650116" source="BUGZILLA"/>
		<reference ref_id="650128" ref_url="https://bugzilla.suse.com/650128" source="BUGZILLA"/>
		<reference ref_id="650185" ref_url="https://bugzilla.suse.com/650185" source="BUGZILLA"/>
		<reference ref_id="650366" ref_url="https://bugzilla.suse.com/650366" source="BUGZILLA"/>
		<reference ref_id="650487" ref_url="https://bugzilla.suse.com/650487" source="BUGZILLA"/>
		<reference ref_id="650545" ref_url="https://bugzilla.suse.com/650545" source="BUGZILLA"/>
		<reference ref_id="650748" ref_url="https://bugzilla.suse.com/650748" source="BUGZILLA"/>
		<reference ref_id="651066" ref_url="https://bugzilla.suse.com/651066" source="BUGZILLA"/>
		<reference ref_id="651152" ref_url="https://bugzilla.suse.com/651152" source="BUGZILLA"/>
		<reference ref_id="651218" ref_url="https://bugzilla.suse.com/651218" source="BUGZILLA"/>
		<reference ref_id="651219" ref_url="https://bugzilla.suse.com/651219" source="BUGZILLA"/>
		<reference ref_id="651596" ref_url="https://bugzilla.suse.com/651596" source="BUGZILLA"/>
		<reference ref_id="651599" ref_url="https://bugzilla.suse.com/651599" source="BUGZILLA"/>
		<reference ref_id="652024" ref_url="https://bugzilla.suse.com/652024" source="BUGZILLA"/>
		<reference ref_id="652293" ref_url="https://bugzilla.suse.com/652293" source="BUGZILLA"/>
		<reference ref_id="652391" ref_url="https://bugzilla.suse.com/652391" source="BUGZILLA"/>
		<reference ref_id="652563" ref_url="https://bugzilla.suse.com/652563" source="BUGZILLA"/>
		<reference ref_id="652603" ref_url="https://bugzilla.suse.com/652603" source="BUGZILLA"/>
		<reference ref_id="652842" ref_url="https://bugzilla.suse.com/652842" source="BUGZILLA"/>
		<reference ref_id="652939" ref_url="https://bugzilla.suse.com/652939" source="BUGZILLA"/>
		<reference ref_id="652940" ref_url="https://bugzilla.suse.com/652940" source="BUGZILLA"/>
		<reference ref_id="652945" ref_url="https://bugzilla.suse.com/652945" source="BUGZILLA"/>
		<reference ref_id="653148" ref_url="https://bugzilla.suse.com/653148" source="BUGZILLA"/>
		<reference ref_id="653258" ref_url="https://bugzilla.suse.com/653258" source="BUGZILLA"/>
		<reference ref_id="653260" ref_url="https://bugzilla.suse.com/653260" source="BUGZILLA"/>
		<reference ref_id="653266" ref_url="https://bugzilla.suse.com/653266" source="BUGZILLA"/>
		<reference ref_id="653800" ref_url="https://bugzilla.suse.com/653800" source="BUGZILLA"/>
		<reference ref_id="653850" ref_url="https://bugzilla.suse.com/653850" source="BUGZILLA"/>
		<reference ref_id="653930" ref_url="https://bugzilla.suse.com/653930" source="BUGZILLA"/>
		<reference ref_id="654150" ref_url="https://bugzilla.suse.com/654150" source="BUGZILLA"/>
		<reference ref_id="654169" ref_url="https://bugzilla.suse.com/654169" source="BUGZILLA"/>
		<reference ref_id="654501" ref_url="https://bugzilla.suse.com/654501" source="BUGZILLA"/>
		<reference ref_id="654530" ref_url="https://bugzilla.suse.com/654530" source="BUGZILLA"/>
		<reference ref_id="654581" ref_url="https://bugzilla.suse.com/654581" source="BUGZILLA"/>
		<reference ref_id="654701" ref_url="https://bugzilla.suse.com/654701" source="BUGZILLA"/>
		<reference ref_id="654837" ref_url="https://bugzilla.suse.com/654837" source="BUGZILLA"/>
		<reference ref_id="654967" ref_url="https://bugzilla.suse.com/654967" source="BUGZILLA"/>
		<reference ref_id="655027" ref_url="https://bugzilla.suse.com/655027" source="BUGZILLA"/>
		<reference ref_id="655220" ref_url="https://bugzilla.suse.com/655220" source="BUGZILLA"/>
		<reference ref_id="655278" ref_url="https://bugzilla.suse.com/655278" source="BUGZILLA"/>
		<reference ref_id="655964" ref_url="https://bugzilla.suse.com/655964" source="BUGZILLA"/>
		<reference ref_id="655973" ref_url="https://bugzilla.suse.com/655973" source="BUGZILLA"/>
		<reference ref_id="656219" ref_url="https://bugzilla.suse.com/656219" source="BUGZILLA"/>
		<reference ref_id="656471" ref_url="https://bugzilla.suse.com/656471" source="BUGZILLA"/>
		<reference ref_id="656587" ref_url="https://bugzilla.suse.com/656587" source="BUGZILLA"/>
		<reference ref_id="657248" ref_url="https://bugzilla.suse.com/657248" source="BUGZILLA"/>
		<reference ref_id="657324" ref_url="https://bugzilla.suse.com/657324" source="BUGZILLA"/>
		<reference ref_id="657350" ref_url="https://bugzilla.suse.com/657350" source="BUGZILLA"/>
		<reference ref_id="657412" ref_url="https://bugzilla.suse.com/657412" source="BUGZILLA"/>
		<reference ref_id="657415" ref_url="https://bugzilla.suse.com/657415" source="BUGZILLA"/>
		<reference ref_id="657763" ref_url="https://bugzilla.suse.com/657763" source="BUGZILLA"/>
		<reference ref_id="657976" ref_url="https://bugzilla.suse.com/657976" source="BUGZILLA"/>
		<reference ref_id="658037" ref_url="https://bugzilla.suse.com/658037" source="BUGZILLA"/>
		<reference ref_id="658254" ref_url="https://bugzilla.suse.com/658254" source="BUGZILLA"/>
		<reference ref_id="658337" ref_url="https://bugzilla.suse.com/658337" source="BUGZILLA"/>
		<reference ref_id="658353" ref_url="https://bugzilla.suse.com/658353" source="BUGZILLA"/>
		<reference ref_id="658413" ref_url="https://bugzilla.suse.com/658413" source="BUGZILLA"/>
		<reference ref_id="658461" ref_url="https://bugzilla.suse.com/658461" source="BUGZILLA"/>
		<reference ref_id="658464" ref_url="https://bugzilla.suse.com/658464" source="BUGZILLA"/>
		<reference ref_id="658551" ref_url="https://bugzilla.suse.com/658551" source="BUGZILLA"/>
		<reference ref_id="658720" ref_url="https://bugzilla.suse.com/658720" source="BUGZILLA"/>
		<reference ref_id="658829" ref_url="https://bugzilla.suse.com/658829" source="BUGZILLA"/>
		<reference ref_id="659101" ref_url="https://bugzilla.suse.com/659101" source="BUGZILLA"/>
		<reference ref_id="659144" ref_url="https://bugzilla.suse.com/659144" source="BUGZILLA"/>
		<reference ref_id="659394" ref_url="https://bugzilla.suse.com/659394" source="BUGZILLA"/>
		<reference ref_id="659419" ref_url="https://bugzilla.suse.com/659419" source="BUGZILLA"/>
		<reference ref_id="660507" ref_url="https://bugzilla.suse.com/660507" source="BUGZILLA"/>
		<reference ref_id="660546" ref_url="https://bugzilla.suse.com/660546" source="BUGZILLA"/>
		<reference ref_id="661605" ref_url="https://bugzilla.suse.com/661605" source="BUGZILLA"/>
		<reference ref_id="661945" ref_url="https://bugzilla.suse.com/661945" source="BUGZILLA"/>
		<reference ref_id="662031" ref_url="https://bugzilla.suse.com/662031" source="BUGZILLA"/>
		<reference ref_id="662192" ref_url="https://bugzilla.suse.com/662192" source="BUGZILLA"/>
		<reference ref_id="662202" ref_url="https://bugzilla.suse.com/662202" source="BUGZILLA"/>
		<reference ref_id="662212" ref_url="https://bugzilla.suse.com/662212" source="BUGZILLA"/>
		<reference ref_id="662335" ref_url="https://bugzilla.suse.com/662335" source="BUGZILLA"/>
		<reference ref_id="662340" ref_url="https://bugzilla.suse.com/662340" source="BUGZILLA"/>
		<reference ref_id="662360" ref_url="https://bugzilla.suse.com/662360" source="BUGZILLA"/>
		<reference ref_id="662432" ref_url="https://bugzilla.suse.com/662432" source="BUGZILLA"/>
		<reference ref_id="662673" ref_url="https://bugzilla.suse.com/662673" source="BUGZILLA"/>
		<reference ref_id="662722" ref_url="https://bugzilla.suse.com/662722" source="BUGZILLA"/>
		<reference ref_id="662800" ref_url="https://bugzilla.suse.com/662800" source="BUGZILLA"/>
		<reference ref_id="662931" ref_url="https://bugzilla.suse.com/662931" source="BUGZILLA"/>
		<reference ref_id="662945" ref_url="https://bugzilla.suse.com/662945" source="BUGZILLA"/>
		<reference ref_id="663313" ref_url="https://bugzilla.suse.com/663313" source="BUGZILLA"/>
		<reference ref_id="663513" ref_url="https://bugzilla.suse.com/663513" source="BUGZILLA"/>
		<reference ref_id="663516" ref_url="https://bugzilla.suse.com/663516" source="BUGZILLA"/>
		<reference ref_id="663537" ref_url="https://bugzilla.suse.com/663537" source="BUGZILLA"/>
		<reference ref_id="663582" ref_url="https://bugzilla.suse.com/663582" source="BUGZILLA"/>
		<reference ref_id="663706" ref_url="https://bugzilla.suse.com/663706" source="BUGZILLA"/>
		<reference ref_id="664149" ref_url="https://bugzilla.suse.com/664149" source="BUGZILLA"/>
		<reference ref_id="664463" ref_url="https://bugzilla.suse.com/664463" source="BUGZILLA"/>
		<reference ref_id="665480" ref_url="https://bugzilla.suse.com/665480" source="BUGZILLA"/>
		<reference ref_id="665499" ref_url="https://bugzilla.suse.com/665499" source="BUGZILLA"/>
		<reference ref_id="665524" ref_url="https://bugzilla.suse.com/665524" source="BUGZILLA"/>
		<reference ref_id="665663" ref_url="https://bugzilla.suse.com/665663" source="BUGZILLA"/>
		<reference ref_id="666012" ref_url="https://bugzilla.suse.com/666012" source="BUGZILLA"/>
		<reference ref_id="666423" ref_url="https://bugzilla.suse.com/666423" source="BUGZILLA"/>
		<reference ref_id="666836" ref_url="https://bugzilla.suse.com/666836" source="BUGZILLA"/>
		<reference ref_id="666842" ref_url="https://bugzilla.suse.com/666842" source="BUGZILLA"/>
		<reference ref_id="666893" ref_url="https://bugzilla.suse.com/666893" source="BUGZILLA"/>
		<reference ref_id="667226" ref_url="https://bugzilla.suse.com/667226" source="BUGZILLA"/>
		<reference ref_id="667766" ref_url="https://bugzilla.suse.com/667766" source="BUGZILLA"/>
		<reference ref_id="668101" ref_url="https://bugzilla.suse.com/668101" source="BUGZILLA"/>
		<reference ref_id="668483" ref_url="https://bugzilla.suse.com/668483" source="BUGZILLA"/>
		<reference ref_id="668545" ref_url="https://bugzilla.suse.com/668545" source="BUGZILLA"/>
		<reference ref_id="668633" ref_url="https://bugzilla.suse.com/668633" source="BUGZILLA"/>
		<reference ref_id="668872" ref_url="https://bugzilla.suse.com/668872" source="BUGZILLA"/>
		<reference ref_id="668895" ref_url="https://bugzilla.suse.com/668895" source="BUGZILLA"/>
		<reference ref_id="668896" ref_url="https://bugzilla.suse.com/668896" source="BUGZILLA"/>
		<reference ref_id="668898" ref_url="https://bugzilla.suse.com/668898" source="BUGZILLA"/>
		<reference ref_id="668927" ref_url="https://bugzilla.suse.com/668927" source="BUGZILLA"/>
		<reference ref_id="668929" ref_url="https://bugzilla.suse.com/668929" source="BUGZILLA"/>
		<reference ref_id="669058" ref_url="https://bugzilla.suse.com/669058" source="BUGZILLA"/>
		<reference ref_id="669571" ref_url="https://bugzilla.suse.com/669571" source="BUGZILLA"/>
		<reference ref_id="669889" ref_url="https://bugzilla.suse.com/669889" source="BUGZILLA"/>
		<reference ref_id="670129" ref_url="https://bugzilla.suse.com/670129" source="BUGZILLA"/>
		<reference ref_id="670154" ref_url="https://bugzilla.suse.com/670154" source="BUGZILLA"/>
		<reference ref_id="670465" ref_url="https://bugzilla.suse.com/670465" source="BUGZILLA"/>
		<reference ref_id="670577" ref_url="https://bugzilla.suse.com/670577" source="BUGZILLA"/>
		<reference ref_id="670615" ref_url="https://bugzilla.suse.com/670615" source="BUGZILLA"/>
		<reference ref_id="670816" ref_url="https://bugzilla.suse.com/670816" source="BUGZILLA"/>
		<reference ref_id="670864" ref_url="https://bugzilla.suse.com/670864" source="BUGZILLA"/>
		<reference ref_id="670868" ref_url="https://bugzilla.suse.com/670868" source="BUGZILLA"/>
		<reference ref_id="670979" ref_url="https://bugzilla.suse.com/670979" source="BUGZILLA"/>
		<reference ref_id="671256" ref_url="https://bugzilla.suse.com/671256" source="BUGZILLA"/>
		<reference ref_id="671274" ref_url="https://bugzilla.suse.com/671274" source="BUGZILLA"/>
		<reference ref_id="671296" ref_url="https://bugzilla.suse.com/671296" source="BUGZILLA"/>
		<reference ref_id="671479" ref_url="https://bugzilla.suse.com/671479" source="BUGZILLA"/>
		<reference ref_id="671483" ref_url="https://bugzilla.suse.com/671483" source="BUGZILLA"/>
		<reference ref_id="671943" ref_url="https://bugzilla.suse.com/671943" source="BUGZILLA"/>
		<reference ref_id="672292" ref_url="https://bugzilla.suse.com/672292" source="BUGZILLA"/>
		<reference ref_id="672453" ref_url="https://bugzilla.suse.com/672453" source="BUGZILLA"/>
		<reference ref_id="672492" ref_url="https://bugzilla.suse.com/672492" source="BUGZILLA"/>
		<reference ref_id="672499" ref_url="https://bugzilla.suse.com/672499" source="BUGZILLA"/>
		<reference ref_id="672505" ref_url="https://bugzilla.suse.com/672505" source="BUGZILLA"/>
		<reference ref_id="672524" ref_url="https://bugzilla.suse.com/672524" source="BUGZILLA"/>
		<reference ref_id="673516" ref_url="https://bugzilla.suse.com/673516" source="BUGZILLA"/>
		<reference ref_id="673934" ref_url="https://bugzilla.suse.com/673934" source="BUGZILLA"/>
		<reference ref_id="674549" ref_url="https://bugzilla.suse.com/674549" source="BUGZILLA"/>
		<reference ref_id="674648" ref_url="https://bugzilla.suse.com/674648" source="BUGZILLA"/>
		<reference ref_id="674691" ref_url="https://bugzilla.suse.com/674691" source="BUGZILLA"/>
		<reference ref_id="674693" ref_url="https://bugzilla.suse.com/674693" source="BUGZILLA"/>
		<reference ref_id="674735" ref_url="https://bugzilla.suse.com/674735" source="BUGZILLA"/>
		<reference ref_id="674982" ref_url="https://bugzilla.suse.com/674982" source="BUGZILLA"/>
		<reference ref_id="675115" ref_url="https://bugzilla.suse.com/675115" source="BUGZILLA"/>
		<reference ref_id="675127" ref_url="https://bugzilla.suse.com/675127" source="BUGZILLA"/>
		<reference ref_id="675963" ref_url="https://bugzilla.suse.com/675963" source="BUGZILLA"/>
		<reference ref_id="676202" ref_url="https://bugzilla.suse.com/676202" source="BUGZILLA"/>
		<reference ref_id="676204" ref_url="https://bugzilla.suse.com/676204" source="BUGZILLA"/>
		<reference ref_id="676419" ref_url="https://bugzilla.suse.com/676419" source="BUGZILLA"/>
		<reference ref_id="676601" ref_url="https://bugzilla.suse.com/676601" source="BUGZILLA"/>
		<reference ref_id="676602" ref_url="https://bugzilla.suse.com/676602" source="BUGZILLA"/>
		<reference ref_id="677286" ref_url="https://bugzilla.suse.com/677286" source="BUGZILLA"/>
		<reference ref_id="677391" ref_url="https://bugzilla.suse.com/677391" source="BUGZILLA"/>
		<reference ref_id="677398" ref_url="https://bugzilla.suse.com/677398" source="BUGZILLA"/>
		<reference ref_id="677443" ref_url="https://bugzilla.suse.com/677443" source="BUGZILLA"/>
		<reference ref_id="677563" ref_url="https://bugzilla.suse.com/677563" source="BUGZILLA"/>
		<reference ref_id="677676" ref_url="https://bugzilla.suse.com/677676" source="BUGZILLA"/>
		<reference ref_id="677783" ref_url="https://bugzilla.suse.com/677783" source="BUGZILLA"/>
		<reference ref_id="678466" ref_url="https://bugzilla.suse.com/678466" source="BUGZILLA"/>
		<reference ref_id="678728" ref_url="https://bugzilla.suse.com/678728" source="BUGZILLA"/>
		<reference ref_id="679545" ref_url="https://bugzilla.suse.com/679545" source="BUGZILLA"/>
		<reference ref_id="679588" ref_url="https://bugzilla.suse.com/679588" source="BUGZILLA"/>
		<reference ref_id="679812" ref_url="https://bugzilla.suse.com/679812" source="BUGZILLA"/>
		<reference ref_id="680040" ref_url="https://bugzilla.suse.com/680040" source="BUGZILLA"/>
		<reference ref_id="680845" ref_url="https://bugzilla.suse.com/680845" source="BUGZILLA"/>
		<reference ref_id="681175" ref_url="https://bugzilla.suse.com/681175" source="BUGZILLA"/>
		<reference ref_id="681180" ref_url="https://bugzilla.suse.com/681180" source="BUGZILLA"/>
		<reference ref_id="681181" ref_url="https://bugzilla.suse.com/681181" source="BUGZILLA"/>
		<reference ref_id="681182" ref_url="https://bugzilla.suse.com/681182" source="BUGZILLA"/>
		<reference ref_id="681185" ref_url="https://bugzilla.suse.com/681185" source="BUGZILLA"/>
		<reference ref_id="681186" ref_url="https://bugzilla.suse.com/681186" source="BUGZILLA"/>
		<reference ref_id="681497" ref_url="https://bugzilla.suse.com/681497" source="BUGZILLA"/>
		<reference ref_id="681639" ref_url="https://bugzilla.suse.com/681639" source="BUGZILLA"/>
		<reference ref_id="681826" ref_url="https://bugzilla.suse.com/681826" source="BUGZILLA"/>
		<reference ref_id="68199" ref_url="https://bugzilla.suse.com/68199" source="BUGZILLA"/>
		<reference ref_id="682076" ref_url="https://bugzilla.suse.com/682076" source="BUGZILLA"/>
		<reference ref_id="682251" ref_url="https://bugzilla.suse.com/682251" source="BUGZILLA"/>
		<reference ref_id="682319" ref_url="https://bugzilla.suse.com/682319" source="BUGZILLA"/>
		<reference ref_id="682333" ref_url="https://bugzilla.suse.com/682333" source="BUGZILLA"/>
		<reference ref_id="682482" ref_url="https://bugzilla.suse.com/682482" source="BUGZILLA"/>
		<reference ref_id="682567" ref_url="https://bugzilla.suse.com/682567" source="BUGZILLA"/>
		<reference ref_id="682940" ref_url="https://bugzilla.suse.com/682940" source="BUGZILLA"/>
		<reference ref_id="682941" ref_url="https://bugzilla.suse.com/682941" source="BUGZILLA"/>
		<reference ref_id="682965" ref_url="https://bugzilla.suse.com/682965" source="BUGZILLA"/>
		<reference ref_id="683107" ref_url="https://bugzilla.suse.com/683107" source="BUGZILLA"/>
		<reference ref_id="683282" ref_url="https://bugzilla.suse.com/683282" source="BUGZILLA"/>
		<reference ref_id="683569" ref_url="https://bugzilla.suse.com/683569" source="BUGZILLA"/>
		<reference ref_id="684085" ref_url="https://bugzilla.suse.com/684085" source="BUGZILLA"/>
		<reference ref_id="684248" ref_url="https://bugzilla.suse.com/684248" source="BUGZILLA"/>
		<reference ref_id="684297" ref_url="https://bugzilla.suse.com/684297" source="BUGZILLA"/>
		<reference ref_id="684472" ref_url="https://bugzilla.suse.com/684472" source="BUGZILLA"/>
		<reference ref_id="684852" ref_url="https://bugzilla.suse.com/684852" source="BUGZILLA"/>
		<reference ref_id="684927" ref_url="https://bugzilla.suse.com/684927" source="BUGZILLA"/>
		<reference ref_id="685226" ref_url="https://bugzilla.suse.com/685226" source="BUGZILLA"/>
		<reference ref_id="685276" ref_url="https://bugzilla.suse.com/685276" source="BUGZILLA"/>
		<reference ref_id="686325" ref_url="https://bugzilla.suse.com/686325" source="BUGZILLA"/>
		<reference ref_id="686404" ref_url="https://bugzilla.suse.com/686404" source="BUGZILLA"/>
		<reference ref_id="686412" ref_url="https://bugzilla.suse.com/686412" source="BUGZILLA"/>
		<reference ref_id="686813" ref_url="https://bugzilla.suse.com/686813" source="BUGZILLA"/>
		<reference ref_id="686921" ref_url="https://bugzilla.suse.com/686921" source="BUGZILLA"/>
		<reference ref_id="686980" ref_url="https://bugzilla.suse.com/686980" source="BUGZILLA"/>
		<reference ref_id="687049" ref_url="https://bugzilla.suse.com/687049" source="BUGZILLA"/>
		<reference ref_id="687113" ref_url="https://bugzilla.suse.com/687113" source="BUGZILLA"/>
		<reference ref_id="687478" ref_url="https://bugzilla.suse.com/687478" source="BUGZILLA"/>
		<reference ref_id="687759" ref_url="https://bugzilla.suse.com/687759" source="BUGZILLA"/>
		<reference ref_id="687760" ref_url="https://bugzilla.suse.com/687760" source="BUGZILLA"/>
		<reference ref_id="687789" ref_url="https://bugzilla.suse.com/687789" source="BUGZILLA"/>
		<reference ref_id="688326" ref_url="https://bugzilla.suse.com/688326" source="BUGZILLA"/>
		<reference ref_id="688432" ref_url="https://bugzilla.suse.com/688432" source="BUGZILLA"/>
		<reference ref_id="688685" ref_url="https://bugzilla.suse.com/688685" source="BUGZILLA"/>
		<reference ref_id="688996" ref_url="https://bugzilla.suse.com/688996" source="BUGZILLA"/>
		<reference ref_id="689041" ref_url="https://bugzilla.suse.com/689041" source="BUGZILLA"/>
		<reference ref_id="689290" ref_url="https://bugzilla.suse.com/689290" source="BUGZILLA"/>
		<reference ref_id="689596" ref_url="https://bugzilla.suse.com/689596" source="BUGZILLA"/>
		<reference ref_id="689746" ref_url="https://bugzilla.suse.com/689746" source="BUGZILLA"/>
		<reference ref_id="689797" ref_url="https://bugzilla.suse.com/689797" source="BUGZILLA"/>
		<reference ref_id="690683" ref_url="https://bugzilla.suse.com/690683" source="BUGZILLA"/>
		<reference ref_id="691216" ref_url="https://bugzilla.suse.com/691216" source="BUGZILLA"/>
		<reference ref_id="691269" ref_url="https://bugzilla.suse.com/691269" source="BUGZILLA"/>
		<reference ref_id="691408" ref_url="https://bugzilla.suse.com/691408" source="BUGZILLA"/>
		<reference ref_id="691440" ref_url="https://bugzilla.suse.com/691440" source="BUGZILLA"/>
		<reference ref_id="691536" ref_url="https://bugzilla.suse.com/691536" source="BUGZILLA"/>
		<reference ref_id="691538" ref_url="https://bugzilla.suse.com/691538" source="BUGZILLA"/>
		<reference ref_id="691632" ref_url="https://bugzilla.suse.com/691632" source="BUGZILLA"/>
		<reference ref_id="691633" ref_url="https://bugzilla.suse.com/691633" source="BUGZILLA"/>
		<reference ref_id="691693" ref_url="https://bugzilla.suse.com/691693" source="BUGZILLA"/>
		<reference ref_id="691829" ref_url="https://bugzilla.suse.com/691829" source="BUGZILLA"/>
		<reference ref_id="692343" ref_url="https://bugzilla.suse.com/692343" source="BUGZILLA"/>
		<reference ref_id="692454" ref_url="https://bugzilla.suse.com/692454" source="BUGZILLA"/>
		<reference ref_id="692459" ref_url="https://bugzilla.suse.com/692459" source="BUGZILLA"/>
		<reference ref_id="692460" ref_url="https://bugzilla.suse.com/692460" source="BUGZILLA"/>
		<reference ref_id="692502" ref_url="https://bugzilla.suse.com/692502" source="BUGZILLA"/>
		<reference ref_id="693013" ref_url="https://bugzilla.suse.com/693013" source="BUGZILLA"/>
		<reference ref_id="693149" ref_url="https://bugzilla.suse.com/693149" source="BUGZILLA"/>
		<reference ref_id="693374" ref_url="https://bugzilla.suse.com/693374" source="BUGZILLA"/>
		<reference ref_id="693382" ref_url="https://bugzilla.suse.com/693382" source="BUGZILLA"/>
		<reference ref_id="693636" ref_url="https://bugzilla.suse.com/693636" source="BUGZILLA"/>
		<reference ref_id="694863" ref_url="https://bugzilla.suse.com/694863" source="BUGZILLA"/>
		<reference ref_id="694945" ref_url="https://bugzilla.suse.com/694945" source="BUGZILLA"/>
		<reference ref_id="695898" ref_url="https://bugzilla.suse.com/695898" source="BUGZILLA"/>
		<reference ref_id="696107" ref_url="https://bugzilla.suse.com/696107" source="BUGZILLA"/>
		<reference ref_id="696586" ref_url="https://bugzilla.suse.com/696586" source="BUGZILLA"/>
		<reference ref_id="697181" ref_url="https://bugzilla.suse.com/697181" source="BUGZILLA"/>
		<reference ref_id="697901" ref_url="https://bugzilla.suse.com/697901" source="BUGZILLA"/>
		<reference ref_id="697920" ref_url="https://bugzilla.suse.com/697920" source="BUGZILLA"/>
		<reference ref_id="698221" ref_url="https://bugzilla.suse.com/698221" source="BUGZILLA"/>
		<reference ref_id="698247" ref_url="https://bugzilla.suse.com/698247" source="BUGZILLA"/>
		<reference ref_id="698450" ref_url="https://bugzilla.suse.com/698450" source="BUGZILLA"/>
		<reference ref_id="698604" ref_url="https://bugzilla.suse.com/698604" source="BUGZILLA"/>
		<reference ref_id="699709" ref_url="https://bugzilla.suse.com/699709" source="BUGZILLA"/>
		<reference ref_id="699946" ref_url="https://bugzilla.suse.com/699946" source="BUGZILLA"/>
		<reference ref_id="700401" ref_url="https://bugzilla.suse.com/700401" source="BUGZILLA"/>
		<reference ref_id="700879" ref_url="https://bugzilla.suse.com/700879" source="BUGZILLA"/>
		<reference ref_id="701170" ref_url="https://bugzilla.suse.com/701170" source="BUGZILLA"/>
		<reference ref_id="701183" ref_url="https://bugzilla.suse.com/701183" source="BUGZILLA"/>
		<reference ref_id="701622" ref_url="https://bugzilla.suse.com/701622" source="BUGZILLA"/>
		<reference ref_id="701977" ref_url="https://bugzilla.suse.com/701977" source="BUGZILLA"/>
		<reference ref_id="702013" ref_url="https://bugzilla.suse.com/702013" source="BUGZILLA"/>
		<reference ref_id="702285" ref_url="https://bugzilla.suse.com/702285" source="BUGZILLA"/>
		<reference ref_id="703013" ref_url="https://bugzilla.suse.com/703013" source="BUGZILLA"/>
		<reference ref_id="703156" ref_url="https://bugzilla.suse.com/703156" source="BUGZILLA"/>
		<reference ref_id="703410" ref_url="https://bugzilla.suse.com/703410" source="BUGZILLA"/>
		<reference ref_id="703490" ref_url="https://bugzilla.suse.com/703490" source="BUGZILLA"/>
		<reference ref_id="703786" ref_url="https://bugzilla.suse.com/703786" source="BUGZILLA"/>
		<reference ref_id="706374" ref_url="https://bugzilla.suse.com/706374" source="BUGZILLA"/>
		<reference ref_id="706973" ref_url="https://bugzilla.suse.com/706973" source="BUGZILLA"/>
		<reference ref_id="707288" ref_url="https://bugzilla.suse.com/707288" source="BUGZILLA"/>
		<reference ref_id="708625" ref_url="https://bugzilla.suse.com/708625" source="BUGZILLA"/>
		<reference ref_id="709671" ref_url="https://bugzilla.suse.com/709671" source="BUGZILLA"/>
		<reference ref_id="711378" ref_url="https://bugzilla.suse.com/711378" source="BUGZILLA"/>
		<reference ref_id="711501" ref_url="https://bugzilla.suse.com/711501" source="BUGZILLA"/>
		<reference ref_id="711539" ref_url="https://bugzilla.suse.com/711539" source="BUGZILLA"/>
		<reference ref_id="712002" ref_url="https://bugzilla.suse.com/712002" source="BUGZILLA"/>
		<reference ref_id="712404" ref_url="https://bugzilla.suse.com/712404" source="BUGZILLA"/>
		<reference ref_id="712405" ref_url="https://bugzilla.suse.com/712405" source="BUGZILLA"/>
		<reference ref_id="713229" ref_url="https://bugzilla.suse.com/713229" source="BUGZILLA"/>
		<reference ref_id="713650" ref_url="https://bugzilla.suse.com/713650" source="BUGZILLA"/>
		<reference ref_id="714744" ref_url="https://bugzilla.suse.com/714744" source="BUGZILLA"/>
		<reference ref_id="714906" ref_url="https://bugzilla.suse.com/714906" source="BUGZILLA"/>
		<reference ref_id="715250" ref_url="https://bugzilla.suse.com/715250" source="BUGZILLA"/>
		<reference ref_id="716023" ref_url="https://bugzilla.suse.com/716023" source="BUGZILLA"/>
		<reference ref_id="717263" ref_url="https://bugzilla.suse.com/717263" source="BUGZILLA"/>
		<reference ref_id="717690" ref_url="https://bugzilla.suse.com/717690" source="BUGZILLA"/>
		<reference ref_id="717884" ref_url="https://bugzilla.suse.com/717884" source="BUGZILLA"/>
		<reference ref_id="719450" ref_url="https://bugzilla.suse.com/719450" source="BUGZILLA"/>
		<reference ref_id="719786" ref_url="https://bugzilla.suse.com/719786" source="BUGZILLA"/>
		<reference ref_id="719916" ref_url="https://bugzilla.suse.com/719916" source="BUGZILLA"/>
		<reference ref_id="720536" ref_url="https://bugzilla.suse.com/720536" source="BUGZILLA"/>
		<reference ref_id="721299" ref_url="https://bugzilla.suse.com/721299" source="BUGZILLA"/>
		<reference ref_id="721337" ref_url="https://bugzilla.suse.com/721337" source="BUGZILLA"/>
		<reference ref_id="721464" ref_url="https://bugzilla.suse.com/721464" source="BUGZILLA"/>
		<reference ref_id="721830" ref_url="https://bugzilla.suse.com/721830" source="BUGZILLA"/>
		<reference ref_id="721840" ref_url="https://bugzilla.suse.com/721840" source="BUGZILLA"/>
		<reference ref_id="722429" ref_url="https://bugzilla.suse.com/722429" source="BUGZILLA"/>
		<reference ref_id="722504" ref_url="https://bugzilla.suse.com/722504" source="BUGZILLA"/>
		<reference ref_id="722910" ref_url="https://bugzilla.suse.com/722910" source="BUGZILLA"/>
		<reference ref_id="723542" ref_url="https://bugzilla.suse.com/723542" source="BUGZILLA"/>
		<reference ref_id="723815" ref_url="https://bugzilla.suse.com/723815" source="BUGZILLA"/>
		<reference ref_id="724365" ref_url="https://bugzilla.suse.com/724365" source="BUGZILLA"/>
		<reference ref_id="724734" ref_url="https://bugzilla.suse.com/724734" source="BUGZILLA"/>
		<reference ref_id="724800" ref_url="https://bugzilla.suse.com/724800" source="BUGZILLA"/>
		<reference ref_id="724989" ref_url="https://bugzilla.suse.com/724989" source="BUGZILLA"/>
		<reference ref_id="725453" ref_url="https://bugzilla.suse.com/725453" source="BUGZILLA"/>
		<reference ref_id="725502" ref_url="https://bugzilla.suse.com/725502" source="BUGZILLA"/>
		<reference ref_id="725709" ref_url="https://bugzilla.suse.com/725709" source="BUGZILLA"/>
		<reference ref_id="725878" ref_url="https://bugzilla.suse.com/725878" source="BUGZILLA"/>
		<reference ref_id="726600" ref_url="https://bugzilla.suse.com/726600" source="BUGZILLA"/>
		<reference ref_id="726788" ref_url="https://bugzilla.suse.com/726788" source="BUGZILLA"/>
		<reference ref_id="728339" ref_url="https://bugzilla.suse.com/728339" source="BUGZILLA"/>
		<reference ref_id="728626" ref_url="https://bugzilla.suse.com/728626" source="BUGZILLA"/>
		<reference ref_id="729111" ref_url="https://bugzilla.suse.com/729111" source="BUGZILLA"/>
		<reference ref_id="729721" ref_url="https://bugzilla.suse.com/729721" source="BUGZILLA"/>
		<reference ref_id="729854" ref_url="https://bugzilla.suse.com/729854" source="BUGZILLA"/>
		<reference ref_id="730118" ref_url="https://bugzilla.suse.com/730118" source="BUGZILLA"/>
		<reference ref_id="731004" ref_url="https://bugzilla.suse.com/731004" source="BUGZILLA"/>
		<reference ref_id="731035" ref_url="https://bugzilla.suse.com/731035" source="BUGZILLA"/>
		<reference ref_id="731229" ref_url="https://bugzilla.suse.com/731229" source="BUGZILLA"/>
		<reference ref_id="731673" ref_url="https://bugzilla.suse.com/731673" source="BUGZILLA"/>
		<reference ref_id="731770" ref_url="https://bugzilla.suse.com/731770" source="BUGZILLA"/>
		<reference ref_id="731981" ref_url="https://bugzilla.suse.com/731981" source="BUGZILLA"/>
		<reference ref_id="732021" ref_url="https://bugzilla.suse.com/732021" source="BUGZILLA"/>
		<reference ref_id="732296" ref_url="https://bugzilla.suse.com/732296" source="BUGZILLA"/>
		<reference ref_id="732535" ref_url="https://bugzilla.suse.com/732535" source="BUGZILLA"/>
		<reference ref_id="732677" ref_url="https://bugzilla.suse.com/732677" source="BUGZILLA"/>
		<reference ref_id="733146" ref_url="https://bugzilla.suse.com/733146" source="BUGZILLA"/>
		<reference ref_id="733863" ref_url="https://bugzilla.suse.com/733863" source="BUGZILLA"/>
		<reference ref_id="734056" ref_url="https://bugzilla.suse.com/734056" source="BUGZILLA"/>
		<reference ref_id="734300" ref_url="https://bugzilla.suse.com/734300" source="BUGZILLA"/>
		<reference ref_id="735216" ref_url="https://bugzilla.suse.com/735216" source="BUGZILLA"/>
		<reference ref_id="735347" ref_url="https://bugzilla.suse.com/735347" source="BUGZILLA"/>
		<reference ref_id="735446" ref_url="https://bugzilla.suse.com/735446" source="BUGZILLA"/>
		<reference ref_id="735453" ref_url="https://bugzilla.suse.com/735453" source="BUGZILLA"/>
		<reference ref_id="735635" ref_url="https://bugzilla.suse.com/735635" source="BUGZILLA"/>
		<reference ref_id="736018" ref_url="https://bugzilla.suse.com/736018" source="BUGZILLA"/>
		<reference ref_id="736813" ref_url="https://bugzilla.suse.com/736813" source="BUGZILLA"/>
		<reference ref_id="738210" ref_url="https://bugzilla.suse.com/738210" source="BUGZILLA"/>
		<reference ref_id="738400" ref_url="https://bugzilla.suse.com/738400" source="BUGZILLA"/>
		<reference ref_id="740535" ref_url="https://bugzilla.suse.com/740535" source="BUGZILLA"/>
		<reference ref_id="740703" ref_url="https://bugzilla.suse.com/740703" source="BUGZILLA"/>
		<reference ref_id="740867" ref_url="https://bugzilla.suse.com/740867" source="BUGZILLA"/>
		<reference ref_id="740969" ref_url="https://bugzilla.suse.com/740969" source="BUGZILLA"/>
		<reference ref_id="742270" ref_url="https://bugzilla.suse.com/742270" source="BUGZILLA"/>
		<reference ref_id="743870" ref_url="https://bugzilla.suse.com/743870" source="BUGZILLA"/>
		<reference ref_id="744955" ref_url="https://bugzilla.suse.com/744955" source="BUGZILLA"/>
		<reference ref_id="745640" ref_url="https://bugzilla.suse.com/745640" source="BUGZILLA"/>
		<reference ref_id="745832" ref_url="https://bugzilla.suse.com/745832" source="BUGZILLA"/>
		<reference ref_id="745929" ref_url="https://bugzilla.suse.com/745929" source="BUGZILLA"/>
		<reference ref_id="748812" ref_url="https://bugzilla.suse.com/748812" source="BUGZILLA"/>
		<reference ref_id="748896" ref_url="https://bugzilla.suse.com/748896" source="BUGZILLA"/>
		<reference ref_id="749569" ref_url="https://bugzilla.suse.com/749569" source="BUGZILLA"/>
		<reference ref_id="750079" ref_url="https://bugzilla.suse.com/750079" source="BUGZILLA"/>
		<reference ref_id="752544" ref_url="https://bugzilla.suse.com/752544" source="BUGZILLA"/>
		<reference ref_id="752972" ref_url="https://bugzilla.suse.com/752972" source="BUGZILLA"/>
		<reference ref_id="754898" ref_url="https://bugzilla.suse.com/754898" source="BUGZILLA"/>
		<reference ref_id="760596" ref_url="https://bugzilla.suse.com/760596" source="BUGZILLA"/>
		<reference ref_id="761774" ref_url="https://bugzilla.suse.com/761774" source="BUGZILLA"/>
		<reference ref_id="762099" ref_url="https://bugzilla.suse.com/762099" source="BUGZILLA"/>
		<reference ref_id="762366" ref_url="https://bugzilla.suse.com/762366" source="BUGZILLA"/>
		<reference ref_id="763463" ref_url="https://bugzilla.suse.com/763463" source="BUGZILLA"/>
		<reference ref_id="763654" ref_url="https://bugzilla.suse.com/763654" source="BUGZILLA"/>
		<reference ref_id="767610" ref_url="https://bugzilla.suse.com/767610" source="BUGZILLA"/>
		<reference ref_id="767612" ref_url="https://bugzilla.suse.com/767612" source="BUGZILLA"/>
		<reference ref_id="768668" ref_url="https://bugzilla.suse.com/768668" source="BUGZILLA"/>
		<reference ref_id="769644" ref_url="https://bugzilla.suse.com/769644" source="BUGZILLA"/>
		<reference ref_id="769896" ref_url="https://bugzilla.suse.com/769896" source="BUGZILLA"/>
		<reference ref_id="770695" ref_url="https://bugzilla.suse.com/770695" source="BUGZILLA"/>
		<reference ref_id="771619" ref_url="https://bugzilla.suse.com/771619" source="BUGZILLA"/>
		<reference ref_id="771706" ref_url="https://bugzilla.suse.com/771706" source="BUGZILLA"/>
		<reference ref_id="771992" ref_url="https://bugzilla.suse.com/771992" source="BUGZILLA"/>
		<reference ref_id="772849" ref_url="https://bugzilla.suse.com/772849" source="BUGZILLA"/>
		<reference ref_id="773320" ref_url="https://bugzilla.suse.com/773320" source="BUGZILLA"/>
		<reference ref_id="773383" ref_url="https://bugzilla.suse.com/773383" source="BUGZILLA"/>
		<reference ref_id="773577" ref_url="https://bugzilla.suse.com/773577" source="BUGZILLA"/>
		<reference ref_id="773640" ref_url="https://bugzilla.suse.com/773640" source="BUGZILLA"/>
		<reference ref_id="773831" ref_url="https://bugzilla.suse.com/773831" source="BUGZILLA"/>
		<reference ref_id="774523" ref_url="https://bugzilla.suse.com/774523" source="BUGZILLA"/>
		<reference ref_id="775182" ref_url="https://bugzilla.suse.com/775182" source="BUGZILLA"/>
		<reference ref_id="776024" ref_url="https://bugzilla.suse.com/776024" source="BUGZILLA"/>
		<reference ref_id="776144" ref_url="https://bugzilla.suse.com/776144" source="BUGZILLA"/>
		<reference ref_id="776885" ref_url="https://bugzilla.suse.com/776885" source="BUGZILLA"/>
		<reference ref_id="777473" ref_url="https://bugzilla.suse.com/777473" source="BUGZILLA"/>
		<reference ref_id="780004" ref_url="https://bugzilla.suse.com/780004" source="BUGZILLA"/>
		<reference ref_id="780008" ref_url="https://bugzilla.suse.com/780008" source="BUGZILLA"/>
		<reference ref_id="780572" ref_url="https://bugzilla.suse.com/780572" source="BUGZILLA"/>
		<reference ref_id="782178" ref_url="https://bugzilla.suse.com/782178" source="BUGZILLA"/>
		<reference ref_id="785016" ref_url="https://bugzilla.suse.com/785016" source="BUGZILLA"/>
		<reference ref_id="786013" ref_url="https://bugzilla.suse.com/786013" source="BUGZILLA"/>
		<reference ref_id="787573" ref_url="https://bugzilla.suse.com/787573" source="BUGZILLA"/>
		<reference ref_id="787576" ref_url="https://bugzilla.suse.com/787576" source="BUGZILLA"/>
		<reference ref_id="789648" ref_url="https://bugzilla.suse.com/789648" source="BUGZILLA"/>
		<reference ref_id="789831" ref_url="https://bugzilla.suse.com/789831" source="BUGZILLA"/>
		<reference ref_id="792407" ref_url="https://bugzilla.suse.com/792407" source="BUGZILLA"/>
		<reference ref_id="794824" ref_url="https://bugzilla.suse.com/794824" source="BUGZILLA"/>
		<reference ref_id="795354" ref_url="https://bugzilla.suse.com/795354" source="BUGZILLA"/>
		<reference ref_id="797175" ref_url="https://bugzilla.suse.com/797175" source="BUGZILLA"/>
		<reference ref_id="798050" ref_url="https://bugzilla.suse.com/798050" source="BUGZILLA"/>
		<reference ref_id="800280" ref_url="https://bugzilla.suse.com/800280" source="BUGZILLA"/>
		<reference ref_id="801178" ref_url="https://bugzilla.suse.com/801178" source="BUGZILLA"/>
		<reference ref_id="802642" ref_url="https://bugzilla.suse.com/802642" source="BUGZILLA"/>
		<reference ref_id="803320" ref_url="https://bugzilla.suse.com/803320" source="BUGZILLA"/>
		<reference ref_id="804154" ref_url="https://bugzilla.suse.com/804154" source="BUGZILLA"/>
		<reference ref_id="804653" ref_url="https://bugzilla.suse.com/804653" source="BUGZILLA"/>
		<reference ref_id="805226" ref_url="https://bugzilla.suse.com/805226" source="BUGZILLA"/>
		<reference ref_id="805227" ref_url="https://bugzilla.suse.com/805227" source="BUGZILLA"/>
		<reference ref_id="805945" ref_url="https://bugzilla.suse.com/805945" source="BUGZILLA"/>
		<reference ref_id="806138" ref_url="https://bugzilla.suse.com/806138" source="BUGZILLA"/>
		<reference ref_id="806431" ref_url="https://bugzilla.suse.com/806431" source="BUGZILLA"/>
		<reference ref_id="806976" ref_url="https://bugzilla.suse.com/806976" source="BUGZILLA"/>
		<reference ref_id="806977" ref_url="https://bugzilla.suse.com/806977" source="BUGZILLA"/>
		<reference ref_id="806980" ref_url="https://bugzilla.suse.com/806980" source="BUGZILLA"/>
		<reference ref_id="807320" ref_url="https://bugzilla.suse.com/807320" source="BUGZILLA"/>
		<reference ref_id="808358" ref_url="https://bugzilla.suse.com/808358" source="BUGZILLA"/>
		<reference ref_id="808827" ref_url="https://bugzilla.suse.com/808827" source="BUGZILLA"/>
		<reference ref_id="809889" ref_url="https://bugzilla.suse.com/809889" source="BUGZILLA"/>
		<reference ref_id="809891" ref_url="https://bugzilla.suse.com/809891" source="BUGZILLA"/>
		<reference ref_id="809892" ref_url="https://bugzilla.suse.com/809892" source="BUGZILLA"/>
		<reference ref_id="809893" ref_url="https://bugzilla.suse.com/809893" source="BUGZILLA"/>
		<reference ref_id="809894" ref_url="https://bugzilla.suse.com/809894" source="BUGZILLA"/>
		<reference ref_id="809898" ref_url="https://bugzilla.suse.com/809898" source="BUGZILLA"/>
		<reference ref_id="809899" ref_url="https://bugzilla.suse.com/809899" source="BUGZILLA"/>
		<reference ref_id="809900" ref_url="https://bugzilla.suse.com/809900" source="BUGZILLA"/>
		<reference ref_id="809901" ref_url="https://bugzilla.suse.com/809901" source="BUGZILLA"/>
		<reference ref_id="809902" ref_url="https://bugzilla.suse.com/809902" source="BUGZILLA"/>
		<reference ref_id="809903" ref_url="https://bugzilla.suse.com/809903" source="BUGZILLA"/>
		<reference ref_id="810045" ref_url="https://bugzilla.suse.com/810045" source="BUGZILLA"/>
		<reference ref_id="810473" ref_url="https://bugzilla.suse.com/810473" source="BUGZILLA"/>
		<reference ref_id="811354" ref_url="https://bugzilla.suse.com/811354" source="BUGZILLA"/>
		<reference ref_id="812364" ref_url="https://bugzilla.suse.com/812364" source="BUGZILLA"/>
		<reference ref_id="813276" ref_url="https://bugzilla.suse.com/813276" source="BUGZILLA"/>
		<reference ref_id="813735" ref_url="https://bugzilla.suse.com/813735" source="BUGZILLA"/>
		<reference ref_id="814363" ref_url="https://bugzilla.suse.com/814363" source="BUGZILLA"/>
		<reference ref_id="814716" ref_url="https://bugzilla.suse.com/814716" source="BUGZILLA"/>
		<reference ref_id="815352" ref_url="https://bugzilla.suse.com/815352" source="BUGZILLA"/>
		<reference ref_id="815745" ref_url="https://bugzilla.suse.com/815745" source="BUGZILLA"/>
		<reference ref_id="816668" ref_url="https://bugzilla.suse.com/816668" source="BUGZILLA"/>
		<reference ref_id="817377" ref_url="https://bugzilla.suse.com/817377" source="BUGZILLA"/>
		<reference ref_id="818337" ref_url="https://bugzilla.suse.com/818337" source="BUGZILLA"/>
		<reference ref_id="818371" ref_url="https://bugzilla.suse.com/818371" source="BUGZILLA"/>
		<reference ref_id="820338" ref_url="https://bugzilla.suse.com/820338" source="BUGZILLA"/>
		<reference ref_id="822575" ref_url="https://bugzilla.suse.com/822575" source="BUGZILLA"/>
		<reference ref_id="822579" ref_url="https://bugzilla.suse.com/822579" source="BUGZILLA"/>
		<reference ref_id="823260" ref_url="https://bugzilla.suse.com/823260" source="BUGZILLA"/>
		<reference ref_id="823267" ref_url="https://bugzilla.suse.com/823267" source="BUGZILLA"/>
		<reference ref_id="823618" ref_url="https://bugzilla.suse.com/823618" source="BUGZILLA"/>
		<reference ref_id="824159" ref_url="https://bugzilla.suse.com/824159" source="BUGZILLA"/>
		<reference ref_id="824295" ref_url="https://bugzilla.suse.com/824295" source="BUGZILLA"/>
		<reference ref_id="825227" ref_url="https://bugzilla.suse.com/825227" source="BUGZILLA"/>
		<reference ref_id="826707" ref_url="https://bugzilla.suse.com/826707" source="BUGZILLA"/>
		<reference ref_id="827416" ref_url="https://bugzilla.suse.com/827416" source="BUGZILLA"/>
		<reference ref_id="827749" ref_url="https://bugzilla.suse.com/827749" source="BUGZILLA"/>
		<reference ref_id="827750" ref_url="https://bugzilla.suse.com/827750" source="BUGZILLA"/>
		<reference ref_id="828012" ref_url="https://bugzilla.suse.com/828012" source="BUGZILLA"/>
		<reference ref_id="828119" ref_url="https://bugzilla.suse.com/828119" source="BUGZILLA"/>
		<reference ref_id="831058" ref_url="https://bugzilla.suse.com/831058" source="BUGZILLA"/>
		<reference ref_id="833820" ref_url="https://bugzilla.suse.com/833820" source="BUGZILLA"/>
		<reference ref_id="835094" ref_url="https://bugzilla.suse.com/835094" source="BUGZILLA"/>
		<reference ref_id="835481" ref_url="https://bugzilla.suse.com/835481" source="BUGZILLA"/>
		<reference ref_id="835839" ref_url="https://bugzilla.suse.com/835839" source="BUGZILLA"/>
		<reference ref_id="840226" ref_url="https://bugzilla.suse.com/840226" source="BUGZILLA"/>
		<reference ref_id="840858" ref_url="https://bugzilla.suse.com/840858" source="BUGZILLA"/>
		<reference ref_id="845028" ref_url="https://bugzilla.suse.com/845028" source="BUGZILLA"/>
		<reference ref_id="846404" ref_url="https://bugzilla.suse.com/846404" source="BUGZILLA"/>
		<reference ref_id="847652" ref_url="https://bugzilla.suse.com/847652" source="BUGZILLA"/>
		<reference ref_id="847672" ref_url="https://bugzilla.suse.com/847672" source="BUGZILLA"/>
		<reference ref_id="848321" ref_url="https://bugzilla.suse.com/848321" source="BUGZILLA"/>
		<reference ref_id="849021" ref_url="https://bugzilla.suse.com/849021" source="BUGZILLA"/>
		<reference ref_id="851095" ref_url="https://bugzilla.suse.com/851095" source="BUGZILLA"/>
		<reference ref_id="851103" ref_url="https://bugzilla.suse.com/851103" source="BUGZILLA"/>
		<reference ref_id="852553" ref_url="https://bugzilla.suse.com/852553" source="BUGZILLA"/>
		<reference ref_id="852558" ref_url="https://bugzilla.suse.com/852558" source="BUGZILLA"/>
		<reference ref_id="852559" ref_url="https://bugzilla.suse.com/852559" source="BUGZILLA"/>
		<reference ref_id="852967" ref_url="https://bugzilla.suse.com/852967" source="BUGZILLA"/>
		<reference ref_id="853050" ref_url="https://bugzilla.suse.com/853050" source="BUGZILLA"/>
		<reference ref_id="853051" ref_url="https://bugzilla.suse.com/853051" source="BUGZILLA"/>
		<reference ref_id="853052" ref_url="https://bugzilla.suse.com/853052" source="BUGZILLA"/>
		<reference ref_id="854634" ref_url="https://bugzilla.suse.com/854634" source="BUGZILLA"/>
		<reference ref_id="854722" ref_url="https://bugzilla.suse.com/854722" source="BUGZILLA"/>
		<reference ref_id="854743" ref_url="https://bugzilla.suse.com/854743" source="BUGZILLA"/>
		<reference ref_id="856756" ref_url="https://bugzilla.suse.com/856756" source="BUGZILLA"/>
		<reference ref_id="856917" ref_url="https://bugzilla.suse.com/856917" source="BUGZILLA"/>
		<reference ref_id="857643" ref_url="https://bugzilla.suse.com/857643" source="BUGZILLA"/>
		<reference ref_id="858869" ref_url="https://bugzilla.suse.com/858869" source="BUGZILLA"/>
		<reference ref_id="858870" ref_url="https://bugzilla.suse.com/858870" source="BUGZILLA"/>
		<reference ref_id="858872" ref_url="https://bugzilla.suse.com/858872" source="BUGZILLA"/>
		<reference ref_id="863335" ref_url="https://bugzilla.suse.com/863335" source="BUGZILLA"/>
		<reference ref_id="865310" ref_url="https://bugzilla.suse.com/865310" source="BUGZILLA"/>
		<reference ref_id="866102" ref_url="https://bugzilla.suse.com/866102" source="BUGZILLA"/>
		<reference ref_id="868049" ref_url="https://bugzilla.suse.com/868049" source="BUGZILLA"/>
		<reference ref_id="868488" ref_url="https://bugzilla.suse.com/868488" source="BUGZILLA"/>
		<reference ref_id="868653" ref_url="https://bugzilla.suse.com/868653" source="BUGZILLA"/>
		<reference ref_id="869563" ref_url="https://bugzilla.suse.com/869563" source="BUGZILLA"/>
		<reference ref_id="871561" ref_url="https://bugzilla.suse.com/871561" source="BUGZILLA"/>
		<reference ref_id="871797" ref_url="https://bugzilla.suse.com/871797" source="BUGZILLA"/>
		<reference ref_id="873070" ref_url="https://bugzilla.suse.com/873070" source="BUGZILLA"/>
		<reference ref_id="874108" ref_url="https://bugzilla.suse.com/874108" source="BUGZILLA"/>
		<reference ref_id="875051" ref_url="https://bugzilla.suse.com/875051" source="BUGZILLA"/>
		<reference ref_id="875690" ref_url="https://bugzilla.suse.com/875690" source="BUGZILLA"/>
		<reference ref_id="875798" ref_url="https://bugzilla.suse.com/875798" source="BUGZILLA"/>
		<reference ref_id="876102" ref_url="https://bugzilla.suse.com/876102" source="BUGZILLA"/>
		<reference ref_id="877257" ref_url="https://bugzilla.suse.com/877257" source="BUGZILLA"/>
		<reference ref_id="878289" ref_url="https://bugzilla.suse.com/878289" source="BUGZILLA"/>
		<reference ref_id="879921" ref_url="https://bugzilla.suse.com/879921" source="BUGZILLA"/>
		<reference ref_id="880484" ref_url="https://bugzilla.suse.com/880484" source="BUGZILLA"/>
		<reference ref_id="880892" ref_url="https://bugzilla.suse.com/880892" source="BUGZILLA"/>
		<reference ref_id="881051" ref_url="https://bugzilla.suse.com/881051" source="BUGZILLA"/>
		<reference ref_id="882809" ref_url="https://bugzilla.suse.com/882809" source="BUGZILLA"/>
		<reference ref_id="883526" ref_url="https://bugzilla.suse.com/883526" source="BUGZILLA"/>
		<reference ref_id="883724" ref_url="https://bugzilla.suse.com/883724" source="BUGZILLA"/>
		<reference ref_id="883795" ref_url="https://bugzilla.suse.com/883795" source="BUGZILLA"/>
		<reference ref_id="884530" ref_url="https://bugzilla.suse.com/884530" source="BUGZILLA"/>
		<reference ref_id="885077" ref_url="https://bugzilla.suse.com/885077" source="BUGZILLA"/>
		<reference ref_id="885422" ref_url="https://bugzilla.suse.com/885422" source="BUGZILLA"/>
		<reference ref_id="885725" ref_url="https://bugzilla.suse.com/885725" source="BUGZILLA"/>
		<reference ref_id="887082" ref_url="https://bugzilla.suse.com/887082" source="BUGZILLA"/>
		<reference ref_id="889173" ref_url="https://bugzilla.suse.com/889173" source="BUGZILLA"/>
		<reference ref_id="891211" ref_url="https://bugzilla.suse.com/891211" source="BUGZILLA"/>
		<reference ref_id="892235" ref_url="https://bugzilla.suse.com/892235" source="BUGZILLA"/>
		<reference ref_id="892490" ref_url="https://bugzilla.suse.com/892490" source="BUGZILLA"/>
		<reference ref_id="896390" ref_url="https://bugzilla.suse.com/896390" source="BUGZILLA"/>
		<reference ref_id="896391" ref_url="https://bugzilla.suse.com/896391" source="BUGZILLA"/>
		<reference ref_id="896779" ref_url="https://bugzilla.suse.com/896779" source="BUGZILLA"/>
		<reference ref_id="899338" ref_url="https://bugzilla.suse.com/899338" source="BUGZILLA"/>
		<reference ref_id="902346" ref_url="https://bugzilla.suse.com/902346" source="BUGZILLA"/>
		<reference ref_id="902349" ref_url="https://bugzilla.suse.com/902349" source="BUGZILLA"/>
		<reference ref_id="902351" ref_url="https://bugzilla.suse.com/902351" source="BUGZILLA"/>
		<reference ref_id="904700" ref_url="https://bugzilla.suse.com/904700" source="BUGZILLA"/>
		<reference ref_id="905100" ref_url="https://bugzilla.suse.com/905100" source="BUGZILLA"/>
		<reference ref_id="905312" ref_url="https://bugzilla.suse.com/905312" source="BUGZILLA"/>
		<reference ref_id="907818" ref_url="https://bugzilla.suse.com/907818" source="BUGZILLA"/>
		<reference ref_id="907822" ref_url="https://bugzilla.suse.com/907822" source="BUGZILLA"/>
		<reference ref_id="908870" ref_url="https://bugzilla.suse.com/908870" source="BUGZILLA"/>
		<reference ref_id="909077" ref_url="https://bugzilla.suse.com/909077" source="BUGZILLA"/>
		<reference ref_id="910251" ref_url="https://bugzilla.suse.com/910251" source="BUGZILLA"/>
		<reference ref_id="911325" ref_url="https://bugzilla.suse.com/911325" source="BUGZILLA"/>
		<reference ref_id="912654" ref_url="https://bugzilla.suse.com/912654" source="BUGZILLA"/>
		<reference ref_id="912705" ref_url="https://bugzilla.suse.com/912705" source="BUGZILLA"/>
		<reference ref_id="912916" ref_url="https://bugzilla.suse.com/912916" source="BUGZILLA"/>
		<reference ref_id="913059" ref_url="https://bugzilla.suse.com/913059" source="BUGZILLA"/>
		<reference ref_id="915335" ref_url="https://bugzilla.suse.com/915335" source="BUGZILLA"/>
		<reference ref_id="915826" ref_url="https://bugzilla.suse.com/915826" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-1173" ref_url="https://www.suse.com/security/cve/CVE-2010-1173/" source="CVE"/>
		<reference ref_id="CVE-2010-1641" ref_url="https://www.suse.com/security/cve/CVE-2010-1641/" source="CVE"/>
		<reference ref_id="CVE-2010-2066" ref_url="https://www.suse.com/security/cve/CVE-2010-2066/" source="CVE"/>
		<reference ref_id="CVE-2010-2478" ref_url="https://www.suse.com/security/cve/CVE-2010-2478/" source="CVE"/>
		<reference ref_id="CVE-2010-2495" ref_url="https://www.suse.com/security/cve/CVE-2010-2495/" source="CVE"/>
		<reference ref_id="CVE-2010-2521" ref_url="https://www.suse.com/security/cve/CVE-2010-2521/" source="CVE"/>
		<reference ref_id="CVE-2010-2524" ref_url="https://www.suse.com/security/cve/CVE-2010-2524/" source="CVE"/>
		<reference ref_id="CVE-2010-2537" ref_url="https://www.suse.com/security/cve/CVE-2010-2537/" source="CVE"/>
		<reference ref_id="CVE-2010-2538" ref_url="https://www.suse.com/security/cve/CVE-2010-2538/" source="CVE"/>
		<reference ref_id="CVE-2010-2798" ref_url="https://www.suse.com/security/cve/CVE-2010-2798/" source="CVE"/>
		<reference ref_id="CVE-2010-2803" ref_url="https://www.suse.com/security/cve/CVE-2010-2803/" source="CVE"/>
		<reference ref_id="CVE-2010-2942" ref_url="https://www.suse.com/security/cve/CVE-2010-2942/" source="CVE"/>
		<reference ref_id="CVE-2010-2943" ref_url="https://www.suse.com/security/cve/CVE-2010-2943/" source="CVE"/>
		<reference ref_id="CVE-2010-2946" ref_url="https://www.suse.com/security/cve/CVE-2010-2946/" source="CVE"/>
		<reference ref_id="CVE-2010-2954" ref_url="https://www.suse.com/security/cve/CVE-2010-2954/" source="CVE"/>
		<reference ref_id="CVE-2010-2955" ref_url="https://www.suse.com/security/cve/CVE-2010-2955/" source="CVE"/>
		<reference ref_id="CVE-2010-2959" ref_url="https://www.suse.com/security/cve/CVE-2010-2959/" source="CVE"/>
		<reference ref_id="CVE-2010-2960" ref_url="https://www.suse.com/security/cve/CVE-2010-2960/" source="CVE"/>
		<reference ref_id="CVE-2010-2962" ref_url="https://www.suse.com/security/cve/CVE-2010-2962/" source="CVE"/>
		<reference ref_id="CVE-2010-2963" ref_url="https://www.suse.com/security/cve/CVE-2010-2963/" source="CVE"/>
		<reference ref_id="CVE-2010-3015" ref_url="https://www.suse.com/security/cve/CVE-2010-3015/" source="CVE"/>
		<reference ref_id="CVE-2010-3078" ref_url="https://www.suse.com/security/cve/CVE-2010-3078/" source="CVE"/>
		<reference ref_id="CVE-2010-3079" ref_url="https://www.suse.com/security/cve/CVE-2010-3079/" source="CVE"/>
		<reference ref_id="CVE-2010-3080" ref_url="https://www.suse.com/security/cve/CVE-2010-3080/" source="CVE"/>
		<reference ref_id="CVE-2010-3081" ref_url="https://www.suse.com/security/cve/CVE-2010-3081/" source="CVE"/>
		<reference ref_id="CVE-2010-3084" ref_url="https://www.suse.com/security/cve/CVE-2010-3084/" source="CVE"/>
		<reference ref_id="CVE-2010-3296" ref_url="https://www.suse.com/security/cve/CVE-2010-3296/" source="CVE"/>
		<reference ref_id="CVE-2010-3297" ref_url="https://www.suse.com/security/cve/CVE-2010-3297/" source="CVE"/>
		<reference ref_id="CVE-2010-3298" ref_url="https://www.suse.com/security/cve/CVE-2010-3298/" source="CVE"/>
		<reference ref_id="CVE-2010-3301" ref_url="https://www.suse.com/security/cve/CVE-2010-3301/" source="CVE"/>
		<reference ref_id="CVE-2010-3310" ref_url="https://www.suse.com/security/cve/CVE-2010-3310/" source="CVE"/>
		<reference ref_id="CVE-2010-3437" ref_url="https://www.suse.com/security/cve/CVE-2010-3437/" source="CVE"/>
		<reference ref_id="CVE-2010-3699" ref_url="https://www.suse.com/security/cve/CVE-2010-3699/" source="CVE"/>
		<reference ref_id="CVE-2010-3705" ref_url="https://www.suse.com/security/cve/CVE-2010-3705/" source="CVE"/>
		<reference ref_id="CVE-2010-3858" ref_url="https://www.suse.com/security/cve/CVE-2010-3858/" source="CVE"/>
		<reference ref_id="CVE-2010-3861" ref_url="https://www.suse.com/security/cve/CVE-2010-3861/" source="CVE"/>
		<reference ref_id="CVE-2010-3865" ref_url="https://www.suse.com/security/cve/CVE-2010-3865/" source="CVE"/>
		<reference ref_id="CVE-2010-3873" ref_url="https://www.suse.com/security/cve/CVE-2010-3873/" source="CVE"/>
		<reference ref_id="CVE-2010-3874" ref_url="https://www.suse.com/security/cve/CVE-2010-3874/" source="CVE"/>
		<reference ref_id="CVE-2010-3875" ref_url="https://www.suse.com/security/cve/CVE-2010-3875/" source="CVE"/>
		<reference ref_id="CVE-2010-3876" ref_url="https://www.suse.com/security/cve/CVE-2010-3876/" source="CVE"/>
		<reference ref_id="CVE-2010-3877" ref_url="https://www.suse.com/security/cve/CVE-2010-3877/" source="CVE"/>
		<reference ref_id="CVE-2010-3880" ref_url="https://www.suse.com/security/cve/CVE-2010-3880/" source="CVE"/>
		<reference ref_id="CVE-2010-3881" ref_url="https://www.suse.com/security/cve/CVE-2010-3881/" source="CVE"/>
		<reference ref_id="CVE-2010-3904" ref_url="https://www.suse.com/security/cve/CVE-2010-3904/" source="CVE"/>
		<reference ref_id="CVE-2010-4072" ref_url="https://www.suse.com/security/cve/CVE-2010-4072/" source="CVE"/>
		<reference ref_id="CVE-2010-4073" ref_url="https://www.suse.com/security/cve/CVE-2010-4073/" source="CVE"/>
		<reference ref_id="CVE-2010-4075" ref_url="https://www.suse.com/security/cve/CVE-2010-4075/" source="CVE"/>
		<reference ref_id="CVE-2010-4076" ref_url="https://www.suse.com/security/cve/CVE-2010-4076/" source="CVE"/>
		<reference ref_id="CVE-2010-4077" ref_url="https://www.suse.com/security/cve/CVE-2010-4077/" source="CVE"/>
		<reference ref_id="CVE-2010-4082" ref_url="https://www.suse.com/security/cve/CVE-2010-4082/" source="CVE"/>
		<reference ref_id="CVE-2010-4083" ref_url="https://www.suse.com/security/cve/CVE-2010-4083/" source="CVE"/>
		<reference ref_id="CVE-2010-4157" ref_url="https://www.suse.com/security/cve/CVE-2010-4157/" source="CVE"/>
		<reference ref_id="CVE-2010-4158" ref_url="https://www.suse.com/security/cve/CVE-2010-4158/" source="CVE"/>
		<reference ref_id="CVE-2010-4160" ref_url="https://www.suse.com/security/cve/CVE-2010-4160/" source="CVE"/>
		<reference ref_id="CVE-2010-4162" ref_url="https://www.suse.com/security/cve/CVE-2010-4162/" source="CVE"/>
		<reference ref_id="CVE-2010-4163" ref_url="https://www.suse.com/security/cve/CVE-2010-4163/" source="CVE"/>
		<reference ref_id="CVE-2010-4164" ref_url="https://www.suse.com/security/cve/CVE-2010-4164/" source="CVE"/>
		<reference ref_id="CVE-2010-4165" ref_url="https://www.suse.com/security/cve/CVE-2010-4165/" source="CVE"/>
		<reference ref_id="CVE-2010-4169" ref_url="https://www.suse.com/security/cve/CVE-2010-4169/" source="CVE"/>
		<reference ref_id="CVE-2010-4175" ref_url="https://www.suse.com/security/cve/CVE-2010-4175/" source="CVE"/>
		<reference ref_id="CVE-2010-4243" ref_url="https://www.suse.com/security/cve/CVE-2010-4243/" source="CVE"/>
		<reference ref_id="CVE-2010-4251" ref_url="https://www.suse.com/security/cve/CVE-2010-4251/" source="CVE"/>
		<reference ref_id="CVE-2010-4258" ref_url="https://www.suse.com/security/cve/CVE-2010-4258/" source="CVE"/>
		<reference ref_id="CVE-2010-4342" ref_url="https://www.suse.com/security/cve/CVE-2010-4342/" source="CVE"/>
		<reference ref_id="CVE-2010-4346" ref_url="https://www.suse.com/security/cve/CVE-2010-4346/" source="CVE"/>
		<reference ref_id="CVE-2010-4526" ref_url="https://www.suse.com/security/cve/CVE-2010-4526/" source="CVE"/>
		<reference ref_id="CVE-2010-4527" ref_url="https://www.suse.com/security/cve/CVE-2010-4527/" source="CVE"/>
		<reference ref_id="CVE-2010-4529" ref_url="https://www.suse.com/security/cve/CVE-2010-4529/" source="CVE"/>
		<reference ref_id="CVE-2010-4650" ref_url="https://www.suse.com/security/cve/CVE-2010-4650/" source="CVE"/>
		<reference ref_id="CVE-2010-4656" ref_url="https://www.suse.com/security/cve/CVE-2010-4656/" source="CVE"/>
		<reference ref_id="CVE-2010-4668" ref_url="https://www.suse.com/security/cve/CVE-2010-4668/" source="CVE"/>
		<reference ref_id="CVE-2010-5313" ref_url="https://www.suse.com/security/cve/CVE-2010-5313/" source="CVE"/>
		<reference ref_id="CVE-2011-0006" ref_url="https://www.suse.com/security/cve/CVE-2011-0006/" source="CVE"/>
		<reference ref_id="CVE-2011-0191" ref_url="https://www.suse.com/security/cve/CVE-2011-0191/" source="CVE"/>
		<reference ref_id="CVE-2011-0521" ref_url="https://www.suse.com/security/cve/CVE-2011-0521/" source="CVE"/>
		<reference ref_id="CVE-2011-0710" ref_url="https://www.suse.com/security/cve/CVE-2011-0710/" source="CVE"/>
		<reference ref_id="CVE-2011-0711" ref_url="https://www.suse.com/security/cve/CVE-2011-0711/" source="CVE"/>
		<reference ref_id="CVE-2011-0712" ref_url="https://www.suse.com/security/cve/CVE-2011-0712/" source="CVE"/>
		<reference ref_id="CVE-2011-1012" ref_url="https://www.suse.com/security/cve/CVE-2011-1012/" source="CVE"/>
		<reference ref_id="CVE-2011-1013" ref_url="https://www.suse.com/security/cve/CVE-2011-1013/" source="CVE"/>
		<reference ref_id="CVE-2011-1016" ref_url="https://www.suse.com/security/cve/CVE-2011-1016/" source="CVE"/>
		<reference ref_id="CVE-2011-1017" ref_url="https://www.suse.com/security/cve/CVE-2011-1017/" source="CVE"/>
		<reference ref_id="CVE-2011-1020" ref_url="https://www.suse.com/security/cve/CVE-2011-1020/" source="CVE"/>
		<reference ref_id="CVE-2011-1078" ref_url="https://www.suse.com/security/cve/CVE-2011-1078/" source="CVE"/>
		<reference ref_id="CVE-2011-1079" ref_url="https://www.suse.com/security/cve/CVE-2011-1079/" source="CVE"/>
		<reference ref_id="CVE-2011-1080" ref_url="https://www.suse.com/security/cve/CVE-2011-1080/" source="CVE"/>
		<reference ref_id="CVE-2011-1082" ref_url="https://www.suse.com/security/cve/CVE-2011-1082/" source="CVE"/>
		<reference ref_id="CVE-2011-1083" ref_url="https://www.suse.com/security/cve/CVE-2011-1083/" source="CVE"/>
		<reference ref_id="CVE-2011-1090" ref_url="https://www.suse.com/security/cve/CVE-2011-1090/" source="CVE"/>
		<reference ref_id="CVE-2011-1093" ref_url="https://www.suse.com/security/cve/CVE-2011-1093/" source="CVE"/>
		<reference ref_id="CVE-2011-1160" ref_url="https://www.suse.com/security/cve/CVE-2011-1160/" source="CVE"/>
		<reference ref_id="CVE-2011-1163" ref_url="https://www.suse.com/security/cve/CVE-2011-1163/" source="CVE"/>
		<reference ref_id="CVE-2011-1170" ref_url="https://www.suse.com/security/cve/CVE-2011-1170/" source="CVE"/>
		<reference ref_id="CVE-2011-1171" ref_url="https://www.suse.com/security/cve/CVE-2011-1171/" source="CVE"/>
		<reference ref_id="CVE-2011-1172" ref_url="https://www.suse.com/security/cve/CVE-2011-1172/" source="CVE"/>
		<reference ref_id="CVE-2011-1173" ref_url="https://www.suse.com/security/cve/CVE-2011-1173/" source="CVE"/>
		<reference ref_id="CVE-2011-1180" ref_url="https://www.suse.com/security/cve/CVE-2011-1180/" source="CVE"/>
		<reference ref_id="CVE-2011-1182" ref_url="https://www.suse.com/security/cve/CVE-2011-1182/" source="CVE"/>
		<reference ref_id="CVE-2011-1476" ref_url="https://www.suse.com/security/cve/CVE-2011-1476/" source="CVE"/>
		<reference ref_id="CVE-2011-1477" ref_url="https://www.suse.com/security/cve/CVE-2011-1477/" source="CVE"/>
		<reference ref_id="CVE-2011-1478" ref_url="https://www.suse.com/security/cve/CVE-2011-1478/" source="CVE"/>
		<reference ref_id="CVE-2011-1573" ref_url="https://www.suse.com/security/cve/CVE-2011-1573/" source="CVE"/>
		<reference ref_id="CVE-2011-1576" ref_url="https://www.suse.com/security/cve/CVE-2011-1576/" source="CVE"/>
		<reference ref_id="CVE-2011-1577" ref_url="https://www.suse.com/security/cve/CVE-2011-1577/" source="CVE"/>
		<reference ref_id="CVE-2011-1585" ref_url="https://www.suse.com/security/cve/CVE-2011-1585/" source="CVE"/>
		<reference ref_id="CVE-2011-1593" ref_url="https://www.suse.com/security/cve/CVE-2011-1593/" source="CVE"/>
		<reference ref_id="CVE-2011-1598" ref_url="https://www.suse.com/security/cve/CVE-2011-1598/" source="CVE"/>
		<reference ref_id="CVE-2011-1745" ref_url="https://www.suse.com/security/cve/CVE-2011-1745/" source="CVE"/>
		<reference ref_id="CVE-2011-1746" ref_url="https://www.suse.com/security/cve/CVE-2011-1746/" source="CVE"/>
		<reference ref_id="CVE-2011-1748" ref_url="https://www.suse.com/security/cve/CVE-2011-1748/" source="CVE"/>
		<reference ref_id="CVE-2011-1833" ref_url="https://www.suse.com/security/cve/CVE-2011-1833/" source="CVE"/>
		<reference ref_id="CVE-2011-2182" ref_url="https://www.suse.com/security/cve/CVE-2011-2182/" source="CVE"/>
		<reference ref_id="CVE-2011-2183" ref_url="https://www.suse.com/security/cve/CVE-2011-2183/" source="CVE"/>
		<reference ref_id="CVE-2011-2203" ref_url="https://www.suse.com/security/cve/CVE-2011-2203/" source="CVE"/>
		<reference ref_id="CVE-2011-2213" ref_url="https://www.suse.com/security/cve/CVE-2011-2213/" source="CVE"/>
		<reference ref_id="CVE-2011-2491" ref_url="https://www.suse.com/security/cve/CVE-2011-2491/" source="CVE"/>
		<reference ref_id="CVE-2011-2494" ref_url="https://www.suse.com/security/cve/CVE-2011-2494/" source="CVE"/>
		<reference ref_id="CVE-2011-2496" ref_url="https://www.suse.com/security/cve/CVE-2011-2496/" source="CVE"/>
		<reference ref_id="CVE-2011-2517" ref_url="https://www.suse.com/security/cve/CVE-2011-2517/" source="CVE"/>
		<reference ref_id="CVE-2011-2699" ref_url="https://www.suse.com/security/cve/CVE-2011-2699/" source="CVE"/>
		<reference ref_id="CVE-2011-3188" ref_url="https://www.suse.com/security/cve/CVE-2011-3188/" source="CVE"/>
		<reference ref_id="CVE-2011-3593" ref_url="https://www.suse.com/security/cve/CVE-2011-3593/" source="CVE"/>
		<reference ref_id="CVE-2011-4077" ref_url="https://www.suse.com/security/cve/CVE-2011-4077/" source="CVE"/>
		<reference ref_id="CVE-2011-4081" ref_url="https://www.suse.com/security/cve/CVE-2011-4081/" source="CVE"/>
		<reference ref_id="CVE-2011-4086" ref_url="https://www.suse.com/security/cve/CVE-2011-4086/" source="CVE"/>
		<reference ref_id="CVE-2011-4110" ref_url="https://www.suse.com/security/cve/CVE-2011-4110/" source="CVE"/>
		<reference ref_id="CVE-2011-4127" ref_url="https://www.suse.com/security/cve/CVE-2011-4127/" source="CVE"/>
		<reference ref_id="CVE-2011-4132" ref_url="https://www.suse.com/security/cve/CVE-2011-4132/" source="CVE"/>
		<reference ref_id="CVE-2011-4326" ref_url="https://www.suse.com/security/cve/CVE-2011-4326/" source="CVE"/>
		<reference ref_id="CVE-2011-4330" ref_url="https://www.suse.com/security/cve/CVE-2011-4330/" source="CVE"/>
		<reference ref_id="CVE-2011-4622" ref_url="https://www.suse.com/security/cve/CVE-2011-4622/" source="CVE"/>
		<reference ref_id="CVE-2012-0038" ref_url="https://www.suse.com/security/cve/CVE-2012-0038/" source="CVE"/>
		<reference ref_id="CVE-2012-0045" ref_url="https://www.suse.com/security/cve/CVE-2012-0045/" source="CVE"/>
		<reference ref_id="CVE-2012-0879" ref_url="https://www.suse.com/security/cve/CVE-2012-0879/" source="CVE"/>
		<reference ref_id="CVE-2012-1090" ref_url="https://www.suse.com/security/cve/CVE-2012-1090/" source="CVE"/>
		<reference ref_id="CVE-2012-1097" ref_url="https://www.suse.com/security/cve/CVE-2012-1097/" source="CVE"/>
		<reference ref_id="CVE-2012-1601" ref_url="https://www.suse.com/security/cve/CVE-2012-1601/" source="CVE"/>
		<reference ref_id="CVE-2012-2137" ref_url="https://www.suse.com/security/cve/CVE-2012-2137/" source="CVE"/>
		<reference ref_id="CVE-2012-2372" ref_url="https://www.suse.com/security/cve/CVE-2012-2372/" source="CVE"/>
		<reference ref_id="CVE-2012-2745" ref_url="https://www.suse.com/security/cve/CVE-2012-2745/" source="CVE"/>
		<reference ref_id="CVE-2012-3375" ref_url="https://www.suse.com/security/cve/CVE-2012-3375/" source="CVE"/>
		<reference ref_id="CVE-2012-3412" ref_url="https://www.suse.com/security/cve/CVE-2012-3412/" source="CVE"/>
		<reference ref_id="CVE-2012-3430" ref_url="https://www.suse.com/security/cve/CVE-2012-3430/" source="CVE"/>
		<reference ref_id="CVE-2012-3511" ref_url="https://www.suse.com/security/cve/CVE-2012-3511/" source="CVE"/>
		<reference ref_id="CVE-2012-4444" ref_url="https://www.suse.com/security/cve/CVE-2012-4444/" source="CVE"/>
		<reference ref_id="CVE-2012-4530" ref_url="https://www.suse.com/security/cve/CVE-2012-4530/" source="CVE"/>
		<reference ref_id="CVE-2012-4565" ref_url="https://www.suse.com/security/cve/CVE-2012-4565/" source="CVE"/>
		<reference ref_id="CVE-2012-6537" ref_url="https://www.suse.com/security/cve/CVE-2012-6537/" source="CVE"/>
		<reference ref_id="CVE-2012-6538" ref_url="https://www.suse.com/security/cve/CVE-2012-6538/" source="CVE"/>
		<reference ref_id="CVE-2012-6539" ref_url="https://www.suse.com/security/cve/CVE-2012-6539/" source="CVE"/>
		<reference ref_id="CVE-2012-6540" ref_url="https://www.suse.com/security/cve/CVE-2012-6540/" source="CVE"/>
		<reference ref_id="CVE-2012-6541" ref_url="https://www.suse.com/security/cve/CVE-2012-6541/" source="CVE"/>
		<reference ref_id="CVE-2012-6542" ref_url="https://www.suse.com/security/cve/CVE-2012-6542/" source="CVE"/>
		<reference ref_id="CVE-2012-6544" ref_url="https://www.suse.com/security/cve/CVE-2012-6544/" source="CVE"/>
		<reference ref_id="CVE-2012-6545" ref_url="https://www.suse.com/security/cve/CVE-2012-6545/" source="CVE"/>
		<reference ref_id="CVE-2012-6546" ref_url="https://www.suse.com/security/cve/CVE-2012-6546/" source="CVE"/>
		<reference ref_id="CVE-2012-6547" ref_url="https://www.suse.com/security/cve/CVE-2012-6547/" source="CVE"/>
		<reference ref_id="CVE-2012-6548" ref_url="https://www.suse.com/security/cve/CVE-2012-6548/" source="CVE"/>
		<reference ref_id="CVE-2012-6549" ref_url="https://www.suse.com/security/cve/CVE-2012-6549/" source="CVE"/>
		<reference ref_id="CVE-2012-6647" ref_url="https://www.suse.com/security/cve/CVE-2012-6647/" source="CVE"/>
		<reference ref_id="CVE-2012-6657" ref_url="https://www.suse.com/security/cve/CVE-2012-6657/" source="CVE"/>
		<reference ref_id="CVE-2013-0160" ref_url="https://www.suse.com/security/cve/CVE-2013-0160/" source="CVE"/>
		<reference ref_id="CVE-2013-0216" ref_url="https://www.suse.com/security/cve/CVE-2013-0216/" source="CVE"/>
		<reference ref_id="CVE-2013-0231" ref_url="https://www.suse.com/security/cve/CVE-2013-0231/" source="CVE"/>
		<reference ref_id="CVE-2013-0268" ref_url="https://www.suse.com/security/cve/CVE-2013-0268/" source="CVE"/>
		<reference ref_id="CVE-2013-0310" ref_url="https://www.suse.com/security/cve/CVE-2013-0310/" source="CVE"/>
		<reference ref_id="CVE-2013-0343" ref_url="https://www.suse.com/security/cve/CVE-2013-0343/" source="CVE"/>
		<reference ref_id="CVE-2013-0349" ref_url="https://www.suse.com/security/cve/CVE-2013-0349/" source="CVE"/>
		<reference ref_id="CVE-2013-0871" ref_url="https://www.suse.com/security/cve/CVE-2013-0871/" source="CVE"/>
		<reference ref_id="CVE-2013-0914" ref_url="https://www.suse.com/security/cve/CVE-2013-0914/" source="CVE"/>
		<reference ref_id="CVE-2013-1767" ref_url="https://www.suse.com/security/cve/CVE-2013-1767/" source="CVE"/>
		<reference ref_id="CVE-2013-1773" ref_url="https://www.suse.com/security/cve/CVE-2013-1773/" source="CVE"/>
		<reference ref_id="CVE-2013-1774" ref_url="https://www.suse.com/security/cve/CVE-2013-1774/" source="CVE"/>
		<reference ref_id="CVE-2013-1792" ref_url="https://www.suse.com/security/cve/CVE-2013-1792/" source="CVE"/>
		<reference ref_id="CVE-2013-1796" ref_url="https://www.suse.com/security/cve/CVE-2013-1796/" source="CVE"/>
		<reference ref_id="CVE-2013-1797" ref_url="https://www.suse.com/security/cve/CVE-2013-1797/" source="CVE"/>
		<reference ref_id="CVE-2013-1798" ref_url="https://www.suse.com/security/cve/CVE-2013-1798/" source="CVE"/>
		<reference ref_id="CVE-2013-1827" ref_url="https://www.suse.com/security/cve/CVE-2013-1827/" source="CVE"/>
		<reference ref_id="CVE-2013-1860" ref_url="https://www.suse.com/security/cve/CVE-2013-1860/" source="CVE"/>
		<reference ref_id="CVE-2013-1928" ref_url="https://www.suse.com/security/cve/CVE-2013-1928/" source="CVE"/>
		<reference ref_id="CVE-2013-1943" ref_url="https://www.suse.com/security/cve/CVE-2013-1943/" source="CVE"/>
		<reference ref_id="CVE-2013-2015" ref_url="https://www.suse.com/security/cve/CVE-2013-2015/" source="CVE"/>
		<reference ref_id="CVE-2013-2141" ref_url="https://www.suse.com/security/cve/CVE-2013-2141/" source="CVE"/>
		<reference ref_id="CVE-2013-2147" ref_url="https://www.suse.com/security/cve/CVE-2013-2147/" source="CVE"/>
		<reference ref_id="CVE-2013-2164" ref_url="https://www.suse.com/security/cve/CVE-2013-2164/" source="CVE"/>
		<reference ref_id="CVE-2013-2232" ref_url="https://www.suse.com/security/cve/CVE-2013-2232/" source="CVE"/>
		<reference ref_id="CVE-2013-2234" ref_url="https://www.suse.com/security/cve/CVE-2013-2234/" source="CVE"/>
		<reference ref_id="CVE-2013-2237" ref_url="https://www.suse.com/security/cve/CVE-2013-2237/" source="CVE"/>
		<reference ref_id="CVE-2013-2634" ref_url="https://www.suse.com/security/cve/CVE-2013-2634/" source="CVE"/>
		<reference ref_id="CVE-2013-2851" ref_url="https://www.suse.com/security/cve/CVE-2013-2851/" source="CVE"/>
		<reference ref_id="CVE-2013-2852" ref_url="https://www.suse.com/security/cve/CVE-2013-2852/" source="CVE"/>
		<reference ref_id="CVE-2013-2888" ref_url="https://www.suse.com/security/cve/CVE-2013-2888/" source="CVE"/>
		<reference ref_id="CVE-2013-2889" ref_url="https://www.suse.com/security/cve/CVE-2013-2889/" source="CVE"/>
		<reference ref_id="CVE-2013-2892" ref_url="https://www.suse.com/security/cve/CVE-2013-2892/" source="CVE"/>
		<reference ref_id="CVE-2013-2893" ref_url="https://www.suse.com/security/cve/CVE-2013-2893/" source="CVE"/>
		<reference ref_id="CVE-2013-2897" ref_url="https://www.suse.com/security/cve/CVE-2013-2897/" source="CVE"/>
		<reference ref_id="CVE-2013-2929" ref_url="https://www.suse.com/security/cve/CVE-2013-2929/" source="CVE"/>
		<reference ref_id="CVE-2013-3222" ref_url="https://www.suse.com/security/cve/CVE-2013-3222/" source="CVE"/>
		<reference ref_id="CVE-2013-3223" ref_url="https://www.suse.com/security/cve/CVE-2013-3223/" source="CVE"/>
		<reference ref_id="CVE-2013-3224" ref_url="https://www.suse.com/security/cve/CVE-2013-3224/" source="CVE"/>
		<reference ref_id="CVE-2013-3225" ref_url="https://www.suse.com/security/cve/CVE-2013-3225/" source="CVE"/>
		<reference ref_id="CVE-2013-3228" ref_url="https://www.suse.com/security/cve/CVE-2013-3228/" source="CVE"/>
		<reference ref_id="CVE-2013-3229" ref_url="https://www.suse.com/security/cve/CVE-2013-3229/" source="CVE"/>
		<reference ref_id="CVE-2013-3231" ref_url="https://www.suse.com/security/cve/CVE-2013-3231/" source="CVE"/>
		<reference ref_id="CVE-2013-3232" ref_url="https://www.suse.com/security/cve/CVE-2013-3232/" source="CVE"/>
		<reference ref_id="CVE-2013-3234" ref_url="https://www.suse.com/security/cve/CVE-2013-3234/" source="CVE"/>
		<reference ref_id="CVE-2013-3235" ref_url="https://www.suse.com/security/cve/CVE-2013-3235/" source="CVE"/>
		<reference ref_id="CVE-2013-4162" ref_url="https://www.suse.com/security/cve/CVE-2013-4162/" source="CVE"/>
		<reference ref_id="CVE-2013-4299" ref_url="https://www.suse.com/security/cve/CVE-2013-4299/" source="CVE"/>
		<reference ref_id="CVE-2013-4345" ref_url="https://www.suse.com/security/cve/CVE-2013-4345/" source="CVE"/>
		<reference ref_id="CVE-2013-4470" ref_url="https://www.suse.com/security/cve/CVE-2013-4470/" source="CVE"/>
		<reference ref_id="CVE-2013-4483" ref_url="https://www.suse.com/security/cve/CVE-2013-4483/" source="CVE"/>
		<reference ref_id="CVE-2013-4511" ref_url="https://www.suse.com/security/cve/CVE-2013-4511/" source="CVE"/>
		<reference ref_id="CVE-2013-4587" ref_url="https://www.suse.com/security/cve/CVE-2013-4587/" source="CVE"/>
		<reference ref_id="CVE-2013-4588" ref_url="https://www.suse.com/security/cve/CVE-2013-4588/" source="CVE"/>
		<reference ref_id="CVE-2013-4591" ref_url="https://www.suse.com/security/cve/CVE-2013-4591/" source="CVE"/>
		<reference ref_id="CVE-2013-6367" ref_url="https://www.suse.com/security/cve/CVE-2013-6367/" source="CVE"/>
		<reference ref_id="CVE-2013-6368" ref_url="https://www.suse.com/security/cve/CVE-2013-6368/" source="CVE"/>
		<reference ref_id="CVE-2013-6378" ref_url="https://www.suse.com/security/cve/CVE-2013-6378/" source="CVE"/>
		<reference ref_id="CVE-2013-6382" ref_url="https://www.suse.com/security/cve/CVE-2013-6382/" source="CVE"/>
		<reference ref_id="CVE-2013-6383" ref_url="https://www.suse.com/security/cve/CVE-2013-6383/" source="CVE"/>
		<reference ref_id="CVE-2013-6885" ref_url="https://www.suse.com/security/cve/CVE-2013-6885/" source="CVE"/>
		<reference ref_id="CVE-2013-7027" ref_url="https://www.suse.com/security/cve/CVE-2013-7027/" source="CVE"/>
		<reference ref_id="CVE-2013-7263" ref_url="https://www.suse.com/security/cve/CVE-2013-7263/" source="CVE"/>
		<reference ref_id="CVE-2013-7264" ref_url="https://www.suse.com/security/cve/CVE-2013-7264/" source="CVE"/>
		<reference ref_id="CVE-2013-7265" ref_url="https://www.suse.com/security/cve/CVE-2013-7265/" source="CVE"/>
		<reference ref_id="CVE-2013-7266" ref_url="https://www.suse.com/security/cve/CVE-2013-7266/" source="CVE"/>
		<reference ref_id="CVE-2013-7267" ref_url="https://www.suse.com/security/cve/CVE-2013-7267/" source="CVE"/>
		<reference ref_id="CVE-2013-7268" ref_url="https://www.suse.com/security/cve/CVE-2013-7268/" source="CVE"/>
		<reference ref_id="CVE-2013-7269" ref_url="https://www.suse.com/security/cve/CVE-2013-7269/" source="CVE"/>
		<reference ref_id="CVE-2013-7270" ref_url="https://www.suse.com/security/cve/CVE-2013-7270/" source="CVE"/>
		<reference ref_id="CVE-2013-7271" ref_url="https://www.suse.com/security/cve/CVE-2013-7271/" source="CVE"/>
		<reference ref_id="CVE-2013-7339" ref_url="https://www.suse.com/security/cve/CVE-2013-7339/" source="CVE"/>
		<reference ref_id="CVE-2014-0101" ref_url="https://www.suse.com/security/cve/CVE-2014-0101/" source="CVE"/>
		<reference ref_id="CVE-2014-0181" ref_url="https://www.suse.com/security/cve/CVE-2014-0181/" source="CVE"/>
		<reference ref_id="CVE-2014-0196" ref_url="https://www.suse.com/security/cve/CVE-2014-0196/" source="CVE"/>
		<reference ref_id="CVE-2014-0203" ref_url="https://www.suse.com/security/cve/CVE-2014-0203/" source="CVE"/>
		<reference ref_id="CVE-2014-1444" ref_url="https://www.suse.com/security/cve/CVE-2014-1444/" source="CVE"/>
		<reference ref_id="CVE-2014-1445" ref_url="https://www.suse.com/security/cve/CVE-2014-1445/" source="CVE"/>
		<reference ref_id="CVE-2014-1446" ref_url="https://www.suse.com/security/cve/CVE-2014-1446/" source="CVE"/>
		<reference ref_id="CVE-2014-1737" ref_url="https://www.suse.com/security/cve/CVE-2014-1737/" source="CVE"/>
		<reference ref_id="CVE-2014-1738" ref_url="https://www.suse.com/security/cve/CVE-2014-1738/" source="CVE"/>
		<reference ref_id="CVE-2014-1874" ref_url="https://www.suse.com/security/cve/CVE-2014-1874/" source="CVE"/>
		<reference ref_id="CVE-2014-2523" ref_url="https://www.suse.com/security/cve/CVE-2014-2523/" source="CVE"/>
		<reference ref_id="CVE-2014-2678" ref_url="https://www.suse.com/security/cve/CVE-2014-2678/" source="CVE"/>
		<reference ref_id="CVE-2014-3122" ref_url="https://www.suse.com/security/cve/CVE-2014-3122/" source="CVE"/>
		<reference ref_id="CVE-2014-3144" ref_url="https://www.suse.com/security/cve/CVE-2014-3144/" source="CVE"/>
		<reference ref_id="CVE-2014-3145" ref_url="https://www.suse.com/security/cve/CVE-2014-3145/" source="CVE"/>
		<reference ref_id="CVE-2014-3153" ref_url="https://www.suse.com/security/cve/CVE-2014-3153/" source="CVE"/>
		<reference ref_id="CVE-2014-3184" ref_url="https://www.suse.com/security/cve/CVE-2014-3184/" source="CVE"/>
		<reference ref_id="CVE-2014-3185" ref_url="https://www.suse.com/security/cve/CVE-2014-3185/" source="CVE"/>
		<reference ref_id="CVE-2014-3673" ref_url="https://www.suse.com/security/cve/CVE-2014-3673/" source="CVE"/>
		<reference ref_id="CVE-2014-3687" ref_url="https://www.suse.com/security/cve/CVE-2014-3687/" source="CVE"/>
		<reference ref_id="CVE-2014-3688" ref_url="https://www.suse.com/security/cve/CVE-2014-3688/" source="CVE"/>
		<reference ref_id="CVE-2014-3917" ref_url="https://www.suse.com/security/cve/CVE-2014-3917/" source="CVE"/>
		<reference ref_id="CVE-2014-4508" ref_url="https://www.suse.com/security/cve/CVE-2014-4508/" source="CVE"/>
		<reference ref_id="CVE-2014-4652" ref_url="https://www.suse.com/security/cve/CVE-2014-4652/" source="CVE"/>
		<reference ref_id="CVE-2014-4653" ref_url="https://www.suse.com/security/cve/CVE-2014-4653/" source="CVE"/>
		<reference ref_id="CVE-2014-4654" ref_url="https://www.suse.com/security/cve/CVE-2014-4654/" source="CVE"/>
		<reference ref_id="CVE-2014-4655" ref_url="https://www.suse.com/security/cve/CVE-2014-4655/" source="CVE"/>
		<reference ref_id="CVE-2014-4656" ref_url="https://www.suse.com/security/cve/CVE-2014-4656/" source="CVE"/>
		<reference ref_id="CVE-2014-4667" ref_url="https://www.suse.com/security/cve/CVE-2014-4667/" source="CVE"/>
		<reference ref_id="CVE-2014-4699" ref_url="https://www.suse.com/security/cve/CVE-2014-4699/" source="CVE"/>
		<reference ref_id="CVE-2014-4943" ref_url="https://www.suse.com/security/cve/CVE-2014-4943/" source="CVE"/>
		<reference ref_id="CVE-2014-5077" ref_url="https://www.suse.com/security/cve/CVE-2014-5077/" source="CVE"/>
		<reference ref_id="CVE-2014-7841" ref_url="https://www.suse.com/security/cve/CVE-2014-7841/" source="CVE"/>
		<reference ref_id="CVE-2014-7842" ref_url="https://www.suse.com/security/cve/CVE-2014-7842/" source="CVE"/>
		<reference ref_id="CVE-2014-8133" ref_url="https://www.suse.com/security/cve/CVE-2014-8133/" source="CVE"/>
		<reference ref_id="CVE-2014-8160" ref_url="https://www.suse.com/security/cve/CVE-2014-8160/" source="CVE"/>
		<reference ref_id="CVE-2014-8709" ref_url="https://www.suse.com/security/cve/CVE-2014-8709/" source="CVE"/>
		<reference ref_id="CVE-2014-9090" ref_url="https://www.suse.com/security/cve/CVE-2014-9090/" source="CVE"/>
		<reference ref_id="CVE-2014-9322" ref_url="https://www.suse.com/security/cve/CVE-2014-9322/" source="CVE"/>
		<reference ref_id="CVE-2014-9420" ref_url="https://www.suse.com/security/cve/CVE-2014-9420/" source="CVE"/>
		<reference ref_id="CVE-2014-9584" ref_url="https://www.suse.com/security/cve/CVE-2014-9584/" source="CVE"/>
		<reference ref_id="CVE-2014-9585" ref_url="https://www.suse.com/security/cve/CVE-2014-9585/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to fix bugs 
and security issues.

Following security issues were fixed:

CVE-2011-1083: Limit the path length users can build using epoll() to avoid 
local attackers consuming lots of kernel CPU time.

CVE-2011-4086: Fixed a oops in jbd/jbd2 that could be caused by specific 
filesystem access patterns.

CVE-2011-4622: KVM: Prevent starting PIT timers in the absence of irqchip 
support.

CVE-2012-0045: KVM: Extend 'struct x86_emulate_ops' with 'get_cpuid' and 
fix missing checks in syscall emulation.

CVE-2012-0879: Fix io_context leak after clone with CLONE_IO.

CVE-2012-1090: Fixed a dentry refcount leak in the CIFS file system that 
could lead to a crash on unmount.

CVE-2012-1097: The regset common infrastructure assumed that regsets would 
always have .get and .set methods, but necessarily .active methods. 
Unfortunately people have since written regsets without .set method, so 
NULL pointer dereference attacks were possible.

Following non-security issues were fixed:

    * SCSI inquiry doesn't return data on SLES 11-SP1 Xen VMs (bnc#745929).
    * FC transport driver killing off the timers/work queues (bnc#734300).
    * The driver ixgbevf doesn't work on newer SLES 11-SP1 kernels
      (bnc#752972).
    * Pack sparsemem memmap sections closer together and in higher zones
      (bnc#743870).

Following feature was implemented:

    * The megaraid_sas driver update to version 5.40-LSI (bnc#736813).

Security Issues:

    * CVE-2011-1083
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1083&gt;
    * CVE-2011-4086
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4086&gt;
    * CVE-2011-4622
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4622&gt;
    * CVE-2012-0045
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0045&gt;
    * CVE-2012-0879
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0879&gt;
    * CVE-2012-1090
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1090&gt;
    * CVE-2012-1097
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1097&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-04-24"/>
	<updated date="2012-04-24"/>
	<bugzilla href="https://bugzilla.suse.com/466279">SUSE bug 466279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/468397">SUSE bug 468397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/501563">SUSE bug 501563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/529535">SUSE bug 529535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/552250">SUSE bug 552250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557710">SUSE bug 557710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/558740">SUSE bug 558740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/564324">SUSE bug 564324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/564423">SUSE bug 564423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/566768">SUSE bug 566768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/573330">SUSE bug 573330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/574006">SUSE bug 574006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/577967">SUSE bug 577967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/578572">SUSE bug 578572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/580373">SUSE bug 580373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/582730">SUSE bug 582730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/584493">SUSE bug 584493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/585385">SUSE bug 585385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/588929">SUSE bug 588929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/594362">SUSE bug 594362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/595215">SUSE bug 595215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/596113">SUSE bug 596113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/596646">SUSE bug 596646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/598308">SUSE bug 598308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/598493">SUSE bug 598493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/598677">SUSE bug 598677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/599508">SUSE bug 599508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/599671">SUSE bug 599671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/600043">SUSE bug 600043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/600256">SUSE bug 600256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/600375">SUSE bug 600375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/600579">SUSE bug 600579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/601520">SUSE bug 601520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/602150">SUSE bug 602150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/602232">SUSE bug 602232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/602838">SUSE bug 602838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/602969">SUSE bug 602969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/603387">SUSE bug 603387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/603411">SUSE bug 603411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/603464">SUSE bug 603464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/603510">SUSE bug 603510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/603528">SUSE bug 603528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/603738">SUSE bug 603738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/605001">SUSE bug 605001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/605321">SUSE bug 605321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/605947">SUSE bug 605947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/606575">SUSE bug 606575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/606743">SUSE bug 606743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/606778">SUSE bug 606778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/606797">SUSE bug 606797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/607123">SUSE bug 607123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/607448">SUSE bug 607448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/607628">SUSE bug 607628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/607890">SUSE bug 607890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/608435">SUSE bug 608435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/608478">SUSE bug 608478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/608576">SUSE bug 608576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/609172">SUSE bug 609172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/609196">SUSE bug 609196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/609281">SUSE bug 609281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/609506">SUSE bug 609506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/610362">SUSE bug 610362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/610598">SUSE bug 610598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/610783">SUSE bug 610783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/610828">SUSE bug 610828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/611094">SUSE bug 611094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/611104">SUSE bug 611104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/611760">SUSE bug 611760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/612009">SUSE bug 612009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/612457">SUSE bug 612457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/612729">SUSE bug 612729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/613171">SUSE bug 613171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/613273">SUSE bug 613273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/613330">SUSE bug 613330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/613542">SUSE bug 613542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/613906">SUSE bug 613906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/614226">SUSE bug 614226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/614332">SUSE bug 614332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/614793">SUSE bug 614793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/615003">SUSE bug 615003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/615557">SUSE bug 615557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/615630">SUSE bug 615630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/616080">SUSE bug 616080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/616088">SUSE bug 616088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/616369">SUSE bug 616369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/616464">SUSE bug 616464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/616612">SUSE bug 616612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/617248">SUSE bug 617248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/617464">SUSE bug 617464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/618059">SUSE bug 618059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/618072">SUSE bug 618072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/618157">SUSE bug 618157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/618379">SUSE bug 618379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/618424">SUSE bug 618424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/618444">SUSE bug 618444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/618767">SUSE bug 618767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/619002">SUSE bug 619002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/619007">SUSE bug 619007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/619416">SUSE bug 619416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/619525">SUSE bug 619525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/619536">SUSE bug 619536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/619840">SUSE bug 619840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/620020">SUSE bug 620020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/620021">SUSE bug 620021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/620372">SUSE bug 620372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/620443">SUSE bug 620443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/620654">SUSE bug 620654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/620904">SUSE bug 620904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/620929">SUSE bug 620929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/621111">SUSE bug 621111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/621598">SUSE bug 621598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/621715">SUSE bug 621715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/622597">SUSE bug 622597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/622635">SUSE bug 622635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/622727">SUSE bug 622727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/622868">SUSE bug 622868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/623307">SUSE bug 623307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/623393">SUSE bug 623393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/623472">SUSE bug 623472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/624020">SUSE bug 624020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/624340">SUSE bug 624340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/624436">SUSE bug 624436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/624587">SUSE bug 624587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/624606">SUSE bug 624606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/624814">SUSE bug 624814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/624850">SUSE bug 624850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/625167">SUSE bug 625167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/625666">SUSE bug 625666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/625674">SUSE bug 625674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/625965">SUSE bug 625965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/626119">SUSE bug 626119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/626321">SUSE bug 626321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/626880">SUSE bug 626880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/627060">SUSE bug 627060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/627386">SUSE bug 627386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/627447">SUSE bug 627447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/627518">SUSE bug 627518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/628180">SUSE bug 628180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/628604">SUSE bug 628604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629170">SUSE bug 629170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629263">SUSE bug 629263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629552">SUSE bug 629552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629901">SUSE bug 629901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629908">SUSE bug 629908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/630068">SUSE bug 630068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/630121">SUSE bug 630121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/630132">SUSE bug 630132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/630970">SUSE bug 630970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/631075">SUSE bug 631075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/631801">SUSE bug 631801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/632309">SUSE bug 632309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/632317">SUSE bug 632317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/632568">SUSE bug 632568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/632974">SUSE bug 632974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/632975">SUSE bug 632975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633026">SUSE bug 633026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633268">SUSE bug 633268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633543">SUSE bug 633543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633581">SUSE bug 633581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633585">SUSE bug 633585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633593">SUSE bug 633593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633733">SUSE bug 633733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/634637">SUSE bug 634637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/635413">SUSE bug 635413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/635425">SUSE bug 635425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/635515">SUSE bug 635515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/636112">SUSE bug 636112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/636435">SUSE bug 636435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/636461">SUSE bug 636461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/636561">SUSE bug 636561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/636672">SUSE bug 636672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/636850">SUSE bug 636850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/637377">SUSE bug 637377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/637436">SUSE bug 637436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/637502">SUSE bug 637502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/637542">SUSE bug 637542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/637639">SUSE bug 637639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/637944">SUSE bug 637944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638258">SUSE bug 638258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638274">SUSE bug 638274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638277">SUSE bug 638277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638400">SUSE bug 638400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638613">SUSE bug 638613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638618">SUSE bug 638618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638807">SUSE bug 638807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638860">SUSE bug 638860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638985">SUSE bug 638985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/639161">SUSE bug 639161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/639197">SUSE bug 639197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/639261">SUSE bug 639261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/639481">SUSE bug 639481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/639482">SUSE bug 639482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/639483">SUSE bug 639483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/639708">SUSE bug 639708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/639709">SUSE bug 639709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/639728">SUSE bug 639728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/639803">SUSE bug 639803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/639944">SUSE bug 639944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/640276">SUSE bug 640276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/640278">SUSE bug 640278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/640721">SUSE bug 640721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/640850">SUSE bug 640850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/640878">SUSE bug 640878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/641105">SUSE bug 641105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/641247">SUSE bug 641247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/641811">SUSE bug 641811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/642009">SUSE bug 642009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/642043">SUSE bug 642043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/642309">SUSE bug 642309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/642313">SUSE bug 642313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/642314">SUSE bug 642314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/642449">SUSE bug 642449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/642486">SUSE bug 642486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/643173">SUSE bug 643173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/643249">SUSE bug 643249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/643266">SUSE bug 643266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/643477">SUSE bug 643477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/643513">SUSE bug 643513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/643909">SUSE bug 643909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/643914">SUSE bug 643914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/643922">SUSE bug 643922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/644219">SUSE bug 644219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/644350">SUSE bug 644350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/644373">SUSE bug 644373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/644630">SUSE bug 644630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/645659">SUSE bug 645659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/646045">SUSE bug 646045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/646226">SUSE bug 646226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/646542">SUSE bug 646542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/646702">SUSE bug 646702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/646908">SUSE bug 646908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/647392">SUSE bug 647392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/647497">SUSE bug 647497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/647567">SUSE bug 647567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/647775">SUSE bug 647775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648112">SUSE bug 648112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648308">SUSE bug 648308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648647">SUSE bug 648647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648701">SUSE bug 648701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648916">SUSE bug 648916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649000">SUSE bug 649000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649187">SUSE bug 649187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649231">SUSE bug 649231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649257">SUSE bug 649257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649473">SUSE bug 649473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649548">SUSE bug 649548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649820">SUSE bug 649820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/650067">SUSE bug 650067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/650109">SUSE bug 650109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/650111">SUSE bug 650111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/650113">SUSE bug 650113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/650116">SUSE bug 650116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/650128">SUSE bug 650128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/650185">SUSE bug 650185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/650366">SUSE bug 650366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/650487">SUSE bug 650487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/650545">SUSE bug 650545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/650748">SUSE bug 650748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/651066">SUSE bug 651066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/651152">SUSE bug 651152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/651218">SUSE bug 651218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/651219">SUSE bug 651219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/651596">SUSE bug 651596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/651599">SUSE bug 651599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652024">SUSE bug 652024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652293">SUSE bug 652293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652391">SUSE bug 652391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652563">SUSE bug 652563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652603">SUSE bug 652603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652842">SUSE bug 652842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652939">SUSE bug 652939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652940">SUSE bug 652940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652945">SUSE bug 652945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/653258">SUSE bug 653258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/653260">SUSE bug 653260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/653266">SUSE bug 653266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/653800">SUSE bug 653800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/653850">SUSE bug 653850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/653930">SUSE bug 653930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/654150">SUSE bug 654150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/654169">SUSE bug 654169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/654501">SUSE bug 654501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/654530">SUSE bug 654530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/654581">SUSE bug 654581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/654701">SUSE bug 654701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/654837">SUSE bug 654837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/654967">SUSE bug 654967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/655027">SUSE bug 655027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/655220">SUSE bug 655220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/655278">SUSE bug 655278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/655964">SUSE bug 655964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/655973">SUSE bug 655973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/656219">SUSE bug 656219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/656471">SUSE bug 656471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/656587">SUSE bug 656587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/657248">SUSE bug 657248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/657324">SUSE bug 657324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/657350">SUSE bug 657350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/657412">SUSE bug 657412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/657415">SUSE bug 657415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/657763">SUSE bug 657763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/657976">SUSE bug 657976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/658037">SUSE bug 658037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/658254">SUSE bug 658254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/658337">SUSE bug 658337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/658353">SUSE bug 658353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/658413">SUSE bug 658413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/658461">SUSE bug 658461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/658464">SUSE bug 658464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/658551">SUSE bug 658551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/658720">SUSE bug 658720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/658829">SUSE bug 658829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/659101">SUSE bug 659101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/659144">SUSE bug 659144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/659394">SUSE bug 659394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/659419">SUSE bug 659419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/660507">SUSE bug 660507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/660546">SUSE bug 660546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/661605">SUSE bug 661605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/661945">SUSE bug 661945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662031">SUSE bug 662031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662192">SUSE bug 662192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662202">SUSE bug 662202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662212">SUSE bug 662212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662335">SUSE bug 662335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662340">SUSE bug 662340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662360">SUSE bug 662360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662432">SUSE bug 662432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662673">SUSE bug 662673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662722">SUSE bug 662722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662800">SUSE bug 662800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662931">SUSE bug 662931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662945">SUSE bug 662945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/663313">SUSE bug 663313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/663513">SUSE bug 663513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/663516">SUSE bug 663516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/663537">SUSE bug 663537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/663582">SUSE bug 663582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/663706">SUSE bug 663706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/664149">SUSE bug 664149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/664463">SUSE bug 664463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/665480">SUSE bug 665480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/665499">SUSE bug 665499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/665524">SUSE bug 665524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/665663">SUSE bug 665663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/666012">SUSE bug 666012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/666423">SUSE bug 666423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/666836">SUSE bug 666836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/666842">SUSE bug 666842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/666893">SUSE bug 666893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/667226">SUSE bug 667226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/667766">SUSE bug 667766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/668101">SUSE bug 668101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/668483">SUSE bug 668483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/668545">SUSE bug 668545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/668633">SUSE bug 668633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/668872">SUSE bug 668872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/668895">SUSE bug 668895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/668896">SUSE bug 668896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/668898">SUSE bug 668898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/668927">SUSE bug 668927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/668929">SUSE bug 668929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/669058">SUSE bug 669058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/669571">SUSE bug 669571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/669889">SUSE bug 669889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/670129">SUSE bug 670129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/670154">SUSE bug 670154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/670465">SUSE bug 670465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/670577">SUSE bug 670577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/670615">SUSE bug 670615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/670816">SUSE bug 670816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/670864">SUSE bug 670864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/670868">SUSE bug 670868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/670979">SUSE bug 670979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/671256">SUSE bug 671256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/671274">SUSE bug 671274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/671296">SUSE bug 671296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/671479">SUSE bug 671479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/671483">SUSE bug 671483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/671943">SUSE bug 671943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/672292">SUSE bug 672292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/672453">SUSE bug 672453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/672492">SUSE bug 672492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/672499">SUSE bug 672499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/672505">SUSE bug 672505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/672524">SUSE bug 672524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/673516">SUSE bug 673516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/673934">SUSE bug 673934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/674549">SUSE bug 674549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/674648">SUSE bug 674648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/674691">SUSE bug 674691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/674693">SUSE bug 674693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/674735">SUSE bug 674735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/674982">SUSE bug 674982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/675115">SUSE bug 675115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/675127">SUSE bug 675127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/675963">SUSE bug 675963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/676202">SUSE bug 676202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/676204">SUSE bug 676204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/676419">SUSE bug 676419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/676601">SUSE bug 676601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/676602">SUSE bug 676602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/677286">SUSE bug 677286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/677391">SUSE bug 677391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/677398">SUSE bug 677398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/677443">SUSE bug 677443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/677563">SUSE bug 677563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/677676">SUSE bug 677676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/677783">SUSE bug 677783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/678466">SUSE bug 678466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/678728">SUSE bug 678728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/679545">SUSE bug 679545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/679588">SUSE bug 679588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/679812">SUSE bug 679812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/680040">SUSE bug 680040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/680845">SUSE bug 680845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/681175">SUSE bug 681175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/681180">SUSE bug 681180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/681181">SUSE bug 681181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/681182">SUSE bug 681182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/681185">SUSE bug 681185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/681186">SUSE bug 681186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/681497">SUSE bug 681497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/681639">SUSE bug 681639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/681826">SUSE bug 681826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/68199">SUSE bug 68199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682076">SUSE bug 682076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682251">SUSE bug 682251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682319">SUSE bug 682319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682333">SUSE bug 682333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682482">SUSE bug 682482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682567">SUSE bug 682567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682940">SUSE bug 682940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682941">SUSE bug 682941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682965">SUSE bug 682965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/683107">SUSE bug 683107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/683282">SUSE bug 683282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/683569">SUSE bug 683569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/684085">SUSE bug 684085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/684248">SUSE bug 684248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/684297">SUSE bug 684297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/684472">SUSE bug 684472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/684852">SUSE bug 684852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/684927">SUSE bug 684927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/685226">SUSE bug 685226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/685276">SUSE bug 685276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/686325">SUSE bug 686325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/686404">SUSE bug 686404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/686412">SUSE bug 686412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/686813">SUSE bug 686813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/686921">SUSE bug 686921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/686980">SUSE bug 686980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/687049">SUSE bug 687049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/687113">SUSE bug 687113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/687478">SUSE bug 687478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/687759">SUSE bug 687759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/687760">SUSE bug 687760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/687789">SUSE bug 687789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/688326">SUSE bug 688326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/688432">SUSE bug 688432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/688685">SUSE bug 688685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/688996">SUSE bug 688996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/689041">SUSE bug 689041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/689290">SUSE bug 689290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/689596">SUSE bug 689596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/689746">SUSE bug 689746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/689797">SUSE bug 689797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/690683">SUSE bug 690683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/691216">SUSE bug 691216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/691269">SUSE bug 691269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/691408">SUSE bug 691408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/691440">SUSE bug 691440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/691536">SUSE bug 691536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/691538">SUSE bug 691538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/691632">SUSE bug 691632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/691633">SUSE bug 691633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/691693">SUSE bug 691693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/691829">SUSE bug 691829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/692343">SUSE bug 692343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/692454">SUSE bug 692454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/692459">SUSE bug 692459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/692460">SUSE bug 692460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/692502">SUSE bug 692502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693013">SUSE bug 693013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693149">SUSE bug 693149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693374">SUSE bug 693374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693382">SUSE bug 693382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693636">SUSE bug 693636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/694863">SUSE bug 694863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/694945">SUSE bug 694945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/695898">SUSE bug 695898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/696107">SUSE bug 696107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/696586">SUSE bug 696586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/697181">SUSE bug 697181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/697901">SUSE bug 697901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/697920">SUSE bug 697920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698221">SUSE bug 698221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698247">SUSE bug 698247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698450">SUSE bug 698450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698604">SUSE bug 698604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/699709">SUSE bug 699709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/699946">SUSE bug 699946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/700401">SUSE bug 700401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/700879">SUSE bug 700879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/701170">SUSE bug 701170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/701183">SUSE bug 701183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/701622">SUSE bug 701622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/701977">SUSE bug 701977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/702013">SUSE bug 702013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/702285">SUSE bug 702285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703013">SUSE bug 703013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703156">SUSE bug 703156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703410">SUSE bug 703410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703490">SUSE bug 703490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703786">SUSE bug 703786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/706374">SUSE bug 706374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/706973">SUSE bug 706973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/707288">SUSE bug 707288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/708625">SUSE bug 708625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/709671">SUSE bug 709671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711378">SUSE bug 711378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711501">SUSE bug 711501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711539">SUSE bug 711539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/712002">SUSE bug 712002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/712404">SUSE bug 712404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/712405">SUSE bug 712405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/713229">SUSE bug 713229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/713650">SUSE bug 713650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/714744">SUSE bug 714744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/714906">SUSE bug 714906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/715250">SUSE bug 715250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/716023">SUSE bug 716023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/717263">SUSE bug 717263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/717690">SUSE bug 717690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/717884">SUSE bug 717884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/719450">SUSE bug 719450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/719786">SUSE bug 719786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/719916">SUSE bug 719916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/720536">SUSE bug 720536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/721299">SUSE bug 721299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/721337">SUSE bug 721337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/721464">SUSE bug 721464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/721830">SUSE bug 721830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/721840">SUSE bug 721840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/722429">SUSE bug 722429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/722504">SUSE bug 722504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/722910">SUSE bug 722910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/723542">SUSE bug 723542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/723815">SUSE bug 723815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/724365">SUSE bug 724365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/724734">SUSE bug 724734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/724800">SUSE bug 724800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/724989">SUSE bug 724989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/725453">SUSE bug 725453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/725502">SUSE bug 725502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/725709">SUSE bug 725709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/725878">SUSE bug 725878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/726600">SUSE bug 726600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/726788">SUSE bug 726788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/728339">SUSE bug 728339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/728626">SUSE bug 728626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/729111">SUSE bug 729111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/729721">SUSE bug 729721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/729854">SUSE bug 729854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/730118">SUSE bug 730118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/731004">SUSE bug 731004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/731035">SUSE bug 731035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/731229">SUSE bug 731229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/731673">SUSE bug 731673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/731770">SUSE bug 731770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/731981">SUSE bug 731981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/732021">SUSE bug 732021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/732296">SUSE bug 732296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/732535">SUSE bug 732535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/732677">SUSE bug 732677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/733146">SUSE bug 733146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/733863">SUSE bug 733863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/734056">SUSE bug 734056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/734300">SUSE bug 734300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/735216">SUSE bug 735216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/735347">SUSE bug 735347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/735446">SUSE bug 735446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/735453">SUSE bug 735453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/735635">SUSE bug 735635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/736018">SUSE bug 736018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/736813">SUSE bug 736813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/738210">SUSE bug 738210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/738400">SUSE bug 738400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/740535">SUSE bug 740535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/740703">SUSE bug 740703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/740867">SUSE bug 740867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/740969">SUSE bug 740969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742270">SUSE bug 742270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/743870">SUSE bug 743870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744955">SUSE bug 744955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745640">SUSE bug 745640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745832">SUSE bug 745832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745929">SUSE bug 745929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748812">SUSE bug 748812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748896">SUSE bug 748896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749569">SUSE bug 749569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750079">SUSE bug 750079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752544">SUSE bug 752544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752972">SUSE bug 752972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754898">SUSE bug 754898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760596">SUSE bug 760596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761774">SUSE bug 761774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762099">SUSE bug 762099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762366">SUSE bug 762366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763463">SUSE bug 763463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763654">SUSE bug 763654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767610">SUSE bug 767610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767612">SUSE bug 767612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/768668">SUSE bug 768668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769644">SUSE bug 769644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769896">SUSE bug 769896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770695">SUSE bug 770695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/771619">SUSE bug 771619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/771706">SUSE bug 771706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/771992">SUSE bug 771992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772849">SUSE bug 772849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773320">SUSE bug 773320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773383">SUSE bug 773383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773577">SUSE bug 773577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773640">SUSE bug 773640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773831">SUSE bug 773831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774523">SUSE bug 774523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775182">SUSE bug 775182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776024">SUSE bug 776024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776144">SUSE bug 776144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776885">SUSE bug 776885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777473">SUSE bug 777473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780004">SUSE bug 780004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780008">SUSE bug 780008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780572">SUSE bug 780572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/782178">SUSE bug 782178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785016">SUSE bug 785016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786013">SUSE bug 786013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787573">SUSE bug 787573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787576">SUSE bug 787576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789648">SUSE bug 789648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789831">SUSE bug 789831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792407">SUSE bug 792407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/794824">SUSE bug 794824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795354">SUSE bug 795354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797175">SUSE bug 797175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798050">SUSE bug 798050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800280">SUSE bug 800280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801178">SUSE bug 801178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802642">SUSE bug 802642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803320">SUSE bug 803320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804154">SUSE bug 804154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804653">SUSE bug 804653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/805226">SUSE bug 805226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/805227">SUSE bug 805227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/805945">SUSE bug 805945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806138">SUSE bug 806138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806431">SUSE bug 806431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806976">SUSE bug 806976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806977">SUSE bug 806977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806980">SUSE bug 806980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807320">SUSE bug 807320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808358">SUSE bug 808358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808827">SUSE bug 808827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809889">SUSE bug 809889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809891">SUSE bug 809891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809892">SUSE bug 809892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809893">SUSE bug 809893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809894">SUSE bug 809894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809898">SUSE bug 809898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809899">SUSE bug 809899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809900">SUSE bug 809900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809901">SUSE bug 809901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809902">SUSE bug 809902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809903">SUSE bug 809903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/810045">SUSE bug 810045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/810473">SUSE bug 810473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/811354">SUSE bug 811354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/812364">SUSE bug 812364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813276">SUSE bug 813276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813735">SUSE bug 813735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814363">SUSE bug 814363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814716">SUSE bug 814716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815352">SUSE bug 815352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815745">SUSE bug 815745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817377">SUSE bug 817377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818337">SUSE bug 818337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818371">SUSE bug 818371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820338">SUSE bug 820338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822575">SUSE bug 822575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822579">SUSE bug 822579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823260">SUSE bug 823260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823267">SUSE bug 823267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823618">SUSE bug 823618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824159">SUSE bug 824159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825227">SUSE bug 825227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826707">SUSE bug 826707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827416">SUSE bug 827416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827749">SUSE bug 827749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827750">SUSE bug 827750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828012">SUSE bug 828012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828119">SUSE bug 828119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831058">SUSE bug 831058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833820">SUSE bug 833820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835094">SUSE bug 835094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835481">SUSE bug 835481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840226">SUSE bug 840226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840858">SUSE bug 840858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845028">SUSE bug 845028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846404">SUSE bug 846404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847652">SUSE bug 847652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847672">SUSE bug 847672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848321">SUSE bug 848321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849021">SUSE bug 849021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851095">SUSE bug 851095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851103">SUSE bug 851103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852553">SUSE bug 852553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852558">SUSE bug 852558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852559">SUSE bug 852559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852967">SUSE bug 852967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853050">SUSE bug 853050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853051">SUSE bug 853051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853052">SUSE bug 853052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854634">SUSE bug 854634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854722">SUSE bug 854722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854743">SUSE bug 854743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856756">SUSE bug 856756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856917">SUSE bug 856917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857643">SUSE bug 857643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858869">SUSE bug 858869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858870">SUSE bug 858870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858872">SUSE bug 858872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863335">SUSE bug 863335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865310">SUSE bug 865310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866102">SUSE bug 866102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868049">SUSE bug 868049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868488">SUSE bug 868488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868653">SUSE bug 868653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869563">SUSE bug 869563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871561">SUSE bug 871561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871797">SUSE bug 871797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873070">SUSE bug 873070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/874108">SUSE bug 874108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875051">SUSE bug 875051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875690">SUSE bug 875690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875798">SUSE bug 875798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876102">SUSE bug 876102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877257">SUSE bug 877257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878289">SUSE bug 878289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879921">SUSE bug 879921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880484">SUSE bug 880484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880892">SUSE bug 880892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881051">SUSE bug 881051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882809">SUSE bug 882809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883526">SUSE bug 883526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883724">SUSE bug 883724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883795">SUSE bug 883795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884530">SUSE bug 884530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885077">SUSE bug 885077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885422">SUSE bug 885422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885725">SUSE bug 885725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887082">SUSE bug 887082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889173">SUSE bug 889173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891211">SUSE bug 891211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892235">SUSE bug 892235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892490">SUSE bug 892490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896390">SUSE bug 896390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896391">SUSE bug 896391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896779">SUSE bug 896779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899338">SUSE bug 899338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902346">SUSE bug 902346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902349">SUSE bug 902349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902351">SUSE bug 902351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904700">SUSE bug 904700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905100">SUSE bug 905100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905312">SUSE bug 905312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907818">SUSE bug 907818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907822">SUSE bug 907822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908870">SUSE bug 908870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909077">SUSE bug 909077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910251">SUSE bug 910251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911325">SUSE bug 911325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912654">SUSE bug 912654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912705">SUSE bug 912705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912916">SUSE bug 912916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913059">SUSE bug 913059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915335">SUSE bug 915335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915826">SUSE bug 915826</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1173/">CVE-2010-1173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1173">CVE-2010-1173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1641/">CVE-2010-1641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1641">CVE-2010-1641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2066/">CVE-2010-2066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2066">CVE-2010-2066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2478/">CVE-2010-2478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2478">CVE-2010-2478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2495/">CVE-2010-2495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2495">CVE-2010-2495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2521/">CVE-2010-2521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2521">CVE-2010-2521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2524/">CVE-2010-2524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2524">CVE-2010-2524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2537/">CVE-2010-2537 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2537">CVE-2010-2537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2538/">CVE-2010-2538 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2538">CVE-2010-2538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2798/">CVE-2010-2798 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2798">CVE-2010-2798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2803/">CVE-2010-2803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2803">CVE-2010-2803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2942/">CVE-2010-2942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2942">CVE-2010-2942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2943/">CVE-2010-2943 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2943">CVE-2010-2943 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2946/">CVE-2010-2946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2946">CVE-2010-2946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2954/">CVE-2010-2954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2954">CVE-2010-2954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2955/">CVE-2010-2955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2955">CVE-2010-2955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2959/">CVE-2010-2959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2959">CVE-2010-2959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2960/">CVE-2010-2960 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2960">CVE-2010-2960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2962/">CVE-2010-2962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2962">CVE-2010-2962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2963/">CVE-2010-2963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2963">CVE-2010-2963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3015/">CVE-2010-3015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3015">CVE-2010-3015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3078/">CVE-2010-3078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-3078">CVE-2010-3078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3079/">CVE-2010-3079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-3079">CVE-2010-3079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3080/">CVE-2010-3080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3080">CVE-2010-3080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3081/">CVE-2010-3081 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-3081">CVE-2010-3081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3084/">CVE-2010-3084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3084">CVE-2010-3084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3296/">CVE-2010-3296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3296">CVE-2010-3296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3297/">CVE-2010-3297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3297">CVE-2010-3297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3298/">CVE-2010-3298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3298">CVE-2010-3298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3301/">CVE-2010-3301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3301">CVE-2010-3301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3310/">CVE-2010-3310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3310">CVE-2010-3310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3437/">CVE-2010-3437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3437">CVE-2010-3437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3699/">CVE-2010-3699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3699">CVE-2010-3699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3705/">CVE-2010-3705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3705">CVE-2010-3705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3858/">CVE-2010-3858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3858">CVE-2010-3858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3861/">CVE-2010-3861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3861">CVE-2010-3861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3865/">CVE-2010-3865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3865">CVE-2010-3865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3873/">CVE-2010-3873 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3873">CVE-2010-3873 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3874/">CVE-2010-3874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3874">CVE-2010-3874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3875/">CVE-2010-3875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3875">CVE-2010-3875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3876/">CVE-2010-3876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3876">CVE-2010-3876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3877/">CVE-2010-3877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3877">CVE-2010-3877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3880/">CVE-2010-3880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3880">CVE-2010-3880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3881/">CVE-2010-3881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3881">CVE-2010-3881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3904/">CVE-2010-3904 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-3904">CVE-2010-3904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4072/">CVE-2010-4072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4072">CVE-2010-4072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4073/">CVE-2010-4073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4073">CVE-2010-4073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4075/">CVE-2010-4075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4075">CVE-2010-4075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4076/">CVE-2010-4076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4076">CVE-2010-4076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4077/">CVE-2010-4077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4077">CVE-2010-4077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4082/">CVE-2010-4082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4082">CVE-2010-4082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4083/">CVE-2010-4083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4083">CVE-2010-4083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4157/">CVE-2010-4157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4157">CVE-2010-4157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4158/">CVE-2010-4158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4158">CVE-2010-4158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4160/">CVE-2010-4160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4160">CVE-2010-4160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4162/">CVE-2010-4162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4162">CVE-2010-4162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4163/">CVE-2010-4163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4163">CVE-2010-4163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4164/">CVE-2010-4164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4164">CVE-2010-4164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4165/">CVE-2010-4165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4165">CVE-2010-4165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4169/">CVE-2010-4169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4169">CVE-2010-4169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4175/">CVE-2010-4175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4175">CVE-2010-4175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4243/">CVE-2010-4243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4243">CVE-2010-4243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4251/">CVE-2010-4251 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-4251">CVE-2010-4251 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4258/">CVE-2010-4258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4258">CVE-2010-4258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4342/">CVE-2010-4342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4342">CVE-2010-4342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4346/">CVE-2010-4346 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4346">CVE-2010-4346 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4526/">CVE-2010-4526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4526">CVE-2010-4526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4527/">CVE-2010-4527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4527">CVE-2010-4527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4529/">CVE-2010-4529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4529">CVE-2010-4529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4650/">CVE-2010-4650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4650">CVE-2010-4650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4656/">CVE-2010-4656 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-4656">CVE-2010-4656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4668/">CVE-2010-4668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4668">CVE-2010-4668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5313/">CVE-2010-5313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-5313">CVE-2010-5313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0006/">CVE-2011-0006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0006">CVE-2011-0006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0191/">CVE-2011-0191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0191">CVE-2011-0191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0521/">CVE-2011-0521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0521">CVE-2011-0521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0710/">CVE-2011-0710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0710">CVE-2011-0710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0711/">CVE-2011-0711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0711">CVE-2011-0711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0712/">CVE-2011-0712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0712">CVE-2011-0712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1012/">CVE-2011-1012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1012">CVE-2011-1012 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1013/">CVE-2011-1013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1013">CVE-2011-1013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1016/">CVE-2011-1016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1016">CVE-2011-1016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1017/">CVE-2011-1017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1017">CVE-2011-1017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1020/">CVE-2011-1020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1020">CVE-2011-1020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1078/">CVE-2011-1078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1078">CVE-2011-1078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1079/">CVE-2011-1079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1079">CVE-2011-1079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1080/">CVE-2011-1080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1080">CVE-2011-1080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1082/">CVE-2011-1082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1082">CVE-2011-1082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1083/">CVE-2011-1083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1083">CVE-2011-1083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1090/">CVE-2011-1090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1090">CVE-2011-1090 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1093/">CVE-2011-1093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1093">CVE-2011-1093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1160/">CVE-2011-1160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1160">CVE-2011-1160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1163/">CVE-2011-1163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1163">CVE-2011-1163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1170/">CVE-2011-1170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1170">CVE-2011-1170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1171/">CVE-2011-1171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1171">CVE-2011-1171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1172/">CVE-2011-1172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1172">CVE-2011-1172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1173/">CVE-2011-1173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1173">CVE-2011-1173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1180/">CVE-2011-1180 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-1180">CVE-2011-1180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1182/">CVE-2011-1182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1182">CVE-2011-1182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1476/">CVE-2011-1476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1476">CVE-2011-1476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1477/">CVE-2011-1477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1477">CVE-2011-1477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1478/">CVE-2011-1478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1478">CVE-2011-1478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1573/">CVE-2011-1573 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-1573">CVE-2011-1573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1576/">CVE-2011-1576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1576">CVE-2011-1576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1577/">CVE-2011-1577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1577">CVE-2011-1577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1585/">CVE-2011-1585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1585">CVE-2011-1585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1593/">CVE-2011-1593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1593">CVE-2011-1593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1598/">CVE-2011-1598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1598">CVE-2011-1598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1745/">CVE-2011-1745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1745">CVE-2011-1745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1746/">CVE-2011-1746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1746">CVE-2011-1746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1748/">CVE-2011-1748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1748">CVE-2011-1748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1833/">CVE-2011-1833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1833">CVE-2011-1833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2182/">CVE-2011-2182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2182">CVE-2011-2182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2183/">CVE-2011-2183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2183">CVE-2011-2183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2203/">CVE-2011-2203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2203">CVE-2011-2203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2213/">CVE-2011-2213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2213">CVE-2011-2213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2491/">CVE-2011-2491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2491">CVE-2011-2491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2494/">CVE-2011-2494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2494">CVE-2011-2494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2496/">CVE-2011-2496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2496">CVE-2011-2496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2517/">CVE-2011-2517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2517">CVE-2011-2517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2699/">CVE-2011-2699 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2699">CVE-2011-2699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3188/">CVE-2011-3188 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3188">CVE-2011-3188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3593/">CVE-2011-3593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3593">CVE-2011-3593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4077/">CVE-2011-4077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4077">CVE-2011-4077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4081/">CVE-2011-4081 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-4081">CVE-2011-4081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4086/">CVE-2011-4086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4086">CVE-2011-4086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4110/">CVE-2011-4110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4110">CVE-2011-4110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4127/">CVE-2011-4127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4127">CVE-2011-4127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4132/">CVE-2011-4132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4132">CVE-2011-4132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4326/">CVE-2011-4326 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4326">CVE-2011-4326 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4330/">CVE-2011-4330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4330">CVE-2011-4330 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4622/">CVE-2011-4622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4622">CVE-2011-4622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0038/">CVE-2012-0038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0038">CVE-2012-0038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0045/">CVE-2012-0045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0045">CVE-2012-0045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0879/">CVE-2012-0879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0879">CVE-2012-0879 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1090/">CVE-2012-1090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1090">CVE-2012-1090 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1097/">CVE-2012-1097 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1097">CVE-2012-1097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1601/">CVE-2012-1601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1601">CVE-2012-1601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2137/">CVE-2012-2137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2137">CVE-2012-2137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2372/">CVE-2012-2372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2372">CVE-2012-2372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2745/">CVE-2012-2745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2745">CVE-2012-2745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3375/">CVE-2012-3375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3375">CVE-2012-3375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3412/">CVE-2012-3412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3412">CVE-2012-3412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3430/">CVE-2012-3430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3430">CVE-2012-3430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3511/">CVE-2012-3511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3511">CVE-2012-3511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4444/">CVE-2012-4444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4444">CVE-2012-4444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4530/">CVE-2012-4530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4530">CVE-2012-4530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4565/">CVE-2012-4565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4565">CVE-2012-4565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6537/">CVE-2012-6537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6537">CVE-2012-6537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6538/">CVE-2012-6538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6538">CVE-2012-6538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6539/">CVE-2012-6539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6539">CVE-2012-6539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6540/">CVE-2012-6540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6540">CVE-2012-6540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6541/">CVE-2012-6541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6541">CVE-2012-6541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6542/">CVE-2012-6542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6542">CVE-2012-6542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6544/">CVE-2012-6544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6544">CVE-2012-6544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6545/">CVE-2012-6545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6545">CVE-2012-6545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6546/">CVE-2012-6546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6546">CVE-2012-6546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6547/">CVE-2012-6547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6547">CVE-2012-6547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6548/">CVE-2012-6548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6548">CVE-2012-6548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6549/">CVE-2012-6549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6549">CVE-2012-6549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6647/">CVE-2012-6647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6647">CVE-2012-6647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6657/">CVE-2012-6657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6657">CVE-2012-6657 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0160/">CVE-2013-0160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0160">CVE-2013-0160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0216/">CVE-2013-0216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0216">CVE-2013-0216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0231/">CVE-2013-0231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0231">CVE-2013-0231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0268/">CVE-2013-0268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0268">CVE-2013-0268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0310/">CVE-2013-0310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0310">CVE-2013-0310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0343/">CVE-2013-0343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0343">CVE-2013-0343 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0349/">CVE-2013-0349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0349">CVE-2013-0349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0871/">CVE-2013-0871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0871">CVE-2013-0871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0914/">CVE-2013-0914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0914">CVE-2013-0914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1767/">CVE-2013-1767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1767">CVE-2013-1767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1773/">CVE-2013-1773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1773">CVE-2013-1773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1774/">CVE-2013-1774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1774">CVE-2013-1774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1792/">CVE-2013-1792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1792">CVE-2013-1792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1796/">CVE-2013-1796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1796">CVE-2013-1796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1797/">CVE-2013-1797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1797">CVE-2013-1797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1798/">CVE-2013-1798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1798">CVE-2013-1798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1827/">CVE-2013-1827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1827">CVE-2013-1827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1860/">CVE-2013-1860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1860">CVE-2013-1860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1928/">CVE-2013-1928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1928">CVE-2013-1928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1943/">CVE-2013-1943 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-1943">CVE-2013-1943 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2015/">CVE-2013-2015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2015">CVE-2013-2015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2141/">CVE-2013-2141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2141">CVE-2013-2141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2147/">CVE-2013-2147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2147">CVE-2013-2147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2164/">CVE-2013-2164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2164">CVE-2013-2164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2232/">CVE-2013-2232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2232">CVE-2013-2232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2234/">CVE-2013-2234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2234">CVE-2013-2234 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2237/">CVE-2013-2237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2237">CVE-2013-2237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2634/">CVE-2013-2634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2634">CVE-2013-2634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2851/">CVE-2013-2851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2851">CVE-2013-2851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2852/">CVE-2013-2852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2852">CVE-2013-2852 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2888/">CVE-2013-2888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2888">CVE-2013-2888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2889/">CVE-2013-2889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2889">CVE-2013-2889 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2892/">CVE-2013-2892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2892">CVE-2013-2892 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2893/">CVE-2013-2893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2893">CVE-2013-2893 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2013-2897/">CVE-2013-2897 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2897">CVE-2013-2897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2929/">CVE-2013-2929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2929">CVE-2013-2929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3222/">CVE-2013-3222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3222">CVE-2013-3222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3223/">CVE-2013-3223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3223">CVE-2013-3223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3224/">CVE-2013-3224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3224">CVE-2013-3224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3225/">CVE-2013-3225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3225">CVE-2013-3225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3228/">CVE-2013-3228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3228">CVE-2013-3228 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3229/">CVE-2013-3229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3229">CVE-2013-3229 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3231/">CVE-2013-3231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3231">CVE-2013-3231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3232/">CVE-2013-3232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3232">CVE-2013-3232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3234/">CVE-2013-3234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3234">CVE-2013-3234 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3235/">CVE-2013-3235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3235">CVE-2013-3235 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4162/">CVE-2013-4162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4162">CVE-2013-4162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4299/">CVE-2013-4299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4299">CVE-2013-4299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4345/">CVE-2013-4345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4345">CVE-2013-4345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4470/">CVE-2013-4470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4470">CVE-2013-4470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4483/">CVE-2013-4483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4483">CVE-2013-4483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4511/">CVE-2013-4511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4511">CVE-2013-4511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4587/">CVE-2013-4587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4587">CVE-2013-4587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4588/">CVE-2013-4588 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4588">CVE-2013-4588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4591/">CVE-2013-4591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4591">CVE-2013-4591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6367/">CVE-2013-6367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6367">CVE-2013-6367 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6368/">CVE-2013-6368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6368">CVE-2013-6368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6378/">CVE-2013-6378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6378">CVE-2013-6378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6382/">CVE-2013-6382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6382">CVE-2013-6382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6383/">CVE-2013-6383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6383">CVE-2013-6383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6885/">CVE-2013-6885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6885">CVE-2013-6885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7027/">CVE-2013-7027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7027">CVE-2013-7027 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7263/">CVE-2013-7263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7263">CVE-2013-7263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7264/">CVE-2013-7264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7264">CVE-2013-7264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7265/">CVE-2013-7265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7265">CVE-2013-7265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7266/">CVE-2013-7266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7266">CVE-2013-7266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7267/">CVE-2013-7267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7267">CVE-2013-7267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7268/">CVE-2013-7268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7268">CVE-2013-7268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7269/">CVE-2013-7269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7269">CVE-2013-7269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7270/">CVE-2013-7270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7270">CVE-2013-7270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7271/">CVE-2013-7271 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7271">CVE-2013-7271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7339/">CVE-2013-7339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7339">CVE-2013-7339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0101/">CVE-2014-0101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0101">CVE-2014-0101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0181/">CVE-2014-0181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0181">CVE-2014-0181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0196/">CVE-2014-0196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0196">CVE-2014-0196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0203/">CVE-2014-0203 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0203">CVE-2014-0203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1444/">CVE-2014-1444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1444">CVE-2014-1444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1445/">CVE-2014-1445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1445">CVE-2014-1445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1446/">CVE-2014-1446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1446">CVE-2014-1446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1737/">CVE-2014-1737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1737">CVE-2014-1737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1738/">CVE-2014-1738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1738">CVE-2014-1738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1874/">CVE-2014-1874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1874">CVE-2014-1874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2523/">CVE-2014-2523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2523">CVE-2014-2523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2678/">CVE-2014-2678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2678">CVE-2014-2678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3122/">CVE-2014-3122 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3122">CVE-2014-3122 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3144/">CVE-2014-3144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3144">CVE-2014-3144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3145/">CVE-2014-3145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3145">CVE-2014-3145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3153/">CVE-2014-3153 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3153">CVE-2014-3153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3184/">CVE-2014-3184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3184">CVE-2014-3184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3185/">CVE-2014-3185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3185">CVE-2014-3185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3673/">CVE-2014-3673 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3673">CVE-2014-3673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3687/">CVE-2014-3687 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3687">CVE-2014-3687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3688/">CVE-2014-3688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3688">CVE-2014-3688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3917/">CVE-2014-3917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3917">CVE-2014-3917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-4508/">CVE-2014-4508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4508">CVE-2014-4508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4652/">CVE-2014-4652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4652">CVE-2014-4652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4653/">CVE-2014-4653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4653">CVE-2014-4653 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4654/">CVE-2014-4654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4654">CVE-2014-4654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4655/">CVE-2014-4655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4655">CVE-2014-4655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4656/">CVE-2014-4656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4656">CVE-2014-4656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4667/">CVE-2014-4667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4667">CVE-2014-4667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4699/">CVE-2014-4699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4699">CVE-2014-4699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4943/">CVE-2014-4943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4943">CVE-2014-4943 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5077/">CVE-2014-5077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5077">CVE-2014-5077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7841/">CVE-2014-7841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7841">CVE-2014-7841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7842/">CVE-2014-7842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7842">CVE-2014-7842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8133/">CVE-2014-8133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8133">CVE-2014-8133 at NVD</cve>
	<cve impact="high" cvss3="8.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2014-8160/">CVE-2014-8160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8160">CVE-2014-8160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8709/">CVE-2014-8709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8709">CVE-2014-8709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9090/">CVE-2014-9090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9090">CVE-2014-9090 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9322/">CVE-2014-9322 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9322">CVE-2014-9322 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9420/">CVE-2014-9420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9420">CVE-2014-9420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9584/">CVE-2014-9584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9584">CVE-2014-9584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9585/">CVE-2014-9585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9585">CVE-2014-9585 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991481" comment="btrfs-kmp-default-0_2.6.32.54_0.3-0.3.73 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009588296" comment="btrfs-kmp-pae-0_2.6.32.59_0.13-0.3.163 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991482" comment="btrfs-kmp-xen-0_2.6.32.54_0.3-0.3.73 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991483" comment="ext4dev-kmp-default-0_2.6.32.54_0.3-7.9.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009588299" comment="ext4dev-kmp-pae-0_2.6.32.59_0.13-7.9.130 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991484" comment="ext4dev-kmp-trace-0_2.6.32.54_0.3-7.9.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991485" comment="ext4dev-kmp-xen-0_2.6.32.54_0.3-7.9.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991486" comment="hyper-v-kmp-default-0_2.6.32.54_0.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009588302" comment="hyper-v-kmp-pae-0_2.6.32.59_0.13-0.18.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991487" comment="hyper-v-kmp-trace-0_2.6.32.54_0.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991488" comment="kernel-default-2.6.32.54-0.7.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991489" comment="kernel-default-base-2.6.32.54-0.7.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587617" comment="kernel-default-man-2.6.32.59-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991491" comment="kernel-ec2-2.6.32.54-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991492" comment="kernel-ec2-base-2.6.32.54-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009588546" comment="kernel-pae-2.6.32.59-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009588547" comment="kernel-pae-base-2.6.32.59-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991493" comment="kernel-source-2.6.32.54-0.7.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991494" comment="kernel-syms-2.6.32.54-0.7.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991495" comment="kernel-trace-2.6.32.54-0.7.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991496" comment="kernel-trace-base-2.6.32.54-0.7.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991498" comment="kernel-xen-2.6.32.54-0.7.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991499" comment="kernel-xen-base-2.6.32.54-0.7.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572165" comment="xen-kmp-default-4.0.3_21548_16_2.6.32.59_0.15-0.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572166" comment="xen-kmp-pae-4.0.3_21548_16_2.6.32.59_0.15-0.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572167" comment="xen-kmp-trace-4.0.3_21548_16_2.6.32.59_0.15-0.5.26 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991481" comment="btrfs-kmp-default-0_2.6.32.54_0.3-0.3.73 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009588296" comment="btrfs-kmp-pae-0_2.6.32.59_0.13-0.3.163 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991482" comment="btrfs-kmp-xen-0_2.6.32.54_0.3-0.3.73 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991483" comment="ext4dev-kmp-default-0_2.6.32.54_0.3-7.9.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009588299" comment="ext4dev-kmp-pae-0_2.6.32.59_0.13-7.9.130 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991484" comment="ext4dev-kmp-trace-0_2.6.32.54_0.3-7.9.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991485" comment="ext4dev-kmp-xen-0_2.6.32.54_0.3-7.9.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991486" comment="hyper-v-kmp-default-0_2.6.32.54_0.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009588302" comment="hyper-v-kmp-pae-0_2.6.32.59_0.13-0.18.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991487" comment="hyper-v-kmp-trace-0_2.6.32.54_0.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991488" comment="kernel-default-2.6.32.54-0.7.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991489" comment="kernel-default-base-2.6.32.54-0.7.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009587617" comment="kernel-default-man-2.6.32.59-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991491" comment="kernel-ec2-2.6.32.54-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991492" comment="kernel-ec2-base-2.6.32.54-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009588546" comment="kernel-pae-2.6.32.59-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009588547" comment="kernel-pae-base-2.6.32.59-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991493" comment="kernel-source-2.6.32.54-0.7.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991494" comment="kernel-syms-2.6.32.54-0.7.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991495" comment="kernel-trace-2.6.32.54-0.7.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991496" comment="kernel-trace-base-2.6.32.54-0.7.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991498" comment="kernel-xen-2.6.32.54-0.7.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991499" comment="kernel-xen-base-2.6.32.54-0.7.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572165" comment="xen-kmp-default-4.0.3_21548_16_2.6.32.59_0.15-0.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572166" comment="xen-kmp-pae-4.0.3_21548_16_2.6.32.59_0.15-0.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572167" comment="xen-kmp-trace-4.0.3_21548_16_2.6.32.59_0.15-0.5.26 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217246" version="1" class="patch">
	<metadata>
		<title>Security update for Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="857358" ref_url="https://bugzilla.suse.com/857358" source="BUGZILLA"/>
		<reference ref_id="906512" ref_url="https://bugzilla.suse.com/906512" source="BUGZILLA"/>
		<reference ref_id="906545" ref_url="https://bugzilla.suse.com/906545" source="BUGZILLA"/>
		<reference ref_id="913059" ref_url="https://bugzilla.suse.com/913059" source="BUGZILLA"/>
		<reference ref_id="915322" ref_url="https://bugzilla.suse.com/915322" source="BUGZILLA"/>
		<reference ref_id="915577" ref_url="https://bugzilla.suse.com/915577" source="BUGZILLA"/>
		<reference ref_id="917830" ref_url="https://bugzilla.suse.com/917830" source="BUGZILLA"/>
		<reference ref_id="917839" ref_url="https://bugzilla.suse.com/917839" source="BUGZILLA"/>
		<reference ref_id="918333" ref_url="https://bugzilla.suse.com/918333" source="BUGZILLA"/>
		<reference ref_id="919007" ref_url="https://bugzilla.suse.com/919007" source="BUGZILLA"/>
		<reference ref_id="919018" ref_url="https://bugzilla.suse.com/919018" source="BUGZILLA"/>
		<reference ref_id="919463" ref_url="https://bugzilla.suse.com/919463" source="BUGZILLA"/>
		<reference ref_id="920250" ref_url="https://bugzilla.suse.com/920250" source="BUGZILLA"/>
		<reference ref_id="922447" ref_url="https://bugzilla.suse.com/922447" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-5321" ref_url="https://www.suse.com/security/cve/CVE-2011-5321/" source="CVE"/>
		<reference ref_id="CVE-2014-7822" ref_url="https://www.suse.com/security/cve/CVE-2014-7822/" source="CVE"/>
		<reference ref_id="CVE-2014-8160" ref_url="https://www.suse.com/security/cve/CVE-2014-8160/" source="CVE"/>
		<reference ref_id="CVE-2014-9683" ref_url="https://www.suse.com/security/cve/CVE-2014-9683/" source="CVE"/>
		<reference ref_id="CVE-2015-0777" ref_url="https://www.suse.com/security/cve/CVE-2015-0777/" source="CVE"/>
		<reference ref_id="CVE-2015-1421" ref_url="https://www.suse.com/security/cve/CVE-2015-1421/" source="CVE"/>
		<reference ref_id="CVE-2015-1593" ref_url="https://www.suse.com/security/cve/CVE-2015-1593/" source="CVE"/>
		<reference ref_id="CVE-2015-2041" ref_url="https://www.suse.com/security/cve/CVE-2015-2041/" source="CVE"/>
		<reference ref_id="CVE-2015-2042" ref_url="https://www.suse.com/security/cve/CVE-2015-2042/" source="CVE"/>
		<reference ref_id="CVE-2015-2150" ref_url="https://www.suse.com/security/cve/CVE-2015-2150/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel has been updated to fix 
bugs and security issues.

ATTENTION: This update introduces a kABI-change (disabled CONFIG_USER_NS), 
please consider to rebuild your custom-kmps, requiring 
kernel_user_namespace, against the current Kernel.

The following security issues have been fixed:

    * net: sctp: fix slab corruption from use after free on INIT collisions
      (bsc#915577, CVE-2015-1421).
    * TTY: drop driver reference in tty_open fail path (bsc#922447,
      CVE-2011-5321).
    * usbback: copy only filled buffers to guest (bsc#917830,
      CVE-2015-0777).
    * xen-pciback: limit guest control of command register (bsc#919463,
      CVE-2015-2150, XSA-120).
    * net: rds: use correct size for max unacked packets and bytes
      (bsc#919018, CVE-2015-2042).
    * net: llc: use correct size for sysctl timeout entries (bsc#919007,
      CVE-2015-2041).
    * x86, mm/ASLR: Fix stack randomization on 64-bit systems (bsc#917839,
      CVE-2015-1593).
    * eCryptfs: Remove buggy and unnecessary write in file name decode
      routine (bsc#918333, CVE-2014-9683).
    * splice: add generic_write_checks() (bsc#915322, CVE-2014-7822).
    * netfilter: conntrack: disable generic tracking for known protocols
      (bsc#913059, CVE-2014-8160).

The following non-security issues have been fixed:

    * x86, tls, ldt: Stop checking lm in LDT_empty (bsc#920250).
    * x86, tls: Interpret an all-zero struct user_desc as 'no segment'
      (bsc#920250).
    * xen: x86, tls: Interpret an all-zero struct user_desc as 'no segment'
      (bsc#920250).
    * Update reference module symbol versions
    * Disable CONFIG_USER_NS (bsc#906545).
    * kabi fixup in
      patches.fixes/audit-dynamically-allocate-audit_names-when-not-enough-space-is-in-the-names-array.patch
      (bsc#906512).
    * audit: dynamically allocate audit_names when not enough space is in
      the names array (bsc#857358, bsc#906512).
    * audit: make filetype matching consistent with other filters
      (bsc#857358, bsc#906512).

Security Issues:

    * CVE-2015-2150
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2150&gt;
    * CVE-2015-2042
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2042&gt;
    * CVE-2015-2041
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2041&gt;
    * CVE-2015-1593
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1593&gt;
    * CVE-2015-1421
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1421&gt;
    * CVE-2015-0777
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0777&gt;
    * CVE-2014-9683
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9683&gt;
    * CVE-2014-8160
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8160&gt;
    * CVE-2014-7822
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7822&gt;
    * CVE-2011-5321
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5321&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-25"/>
	<updated date="2015-03-25"/>
	<bugzilla href="https://bugzilla.suse.com/857358">SUSE bug 857358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906512">SUSE bug 906512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906545">SUSE bug 906545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913059">SUSE bug 913059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915322">SUSE bug 915322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915577">SUSE bug 915577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917830">SUSE bug 917830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917839">SUSE bug 917839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918333">SUSE bug 918333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919007">SUSE bug 919007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919018">SUSE bug 919018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919463">SUSE bug 919463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920250">SUSE bug 920250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922447">SUSE bug 922447</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5321/">CVE-2011-5321 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-5321">CVE-2011-5321 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7822/">CVE-2014-7822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7822">CVE-2014-7822 at NVD</cve>
	<cve impact="high" cvss3="8.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2014-8160/">CVE-2014-8160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8160">CVE-2014-8160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9683/">CVE-2014-9683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9683">CVE-2014-9683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0777/">CVE-2015-0777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0777">CVE-2015-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1421/">CVE-2015-1421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1421">CVE-2015-1421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1593/">CVE-2015-1593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1593">CVE-2015-1593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2041/">CVE-2015-2041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2041">CVE-2015-2041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2042/">CVE-2015-2042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2042">CVE-2015-2042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2150/">CVE-2015-2150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2150">CVE-2015-2150 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991501" comment="kernel-default-2.6.32.54-0.55.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991502" comment="kernel-default-base-2.6.32.54-0.55.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991504" comment="kernel-source-2.6.32.54-0.55.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991505" comment="kernel-syms-2.6.32.54-0.55.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991506" comment="kernel-trace-2.6.32.54-0.55.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991507" comment="kernel-trace-base-2.6.32.54-0.55.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991509" comment="kernel-xen-2.6.32.54-0.55.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991510" comment="kernel-xen-base-2.6.32.54-0.55.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217247" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="900881" ref_url="https://bugzilla.suse.com/900881" source="BUGZILLA"/>
		<reference ref_id="922583" ref_url="https://bugzilla.suse.com/922583" source="BUGZILLA"/>
		<reference ref_id="931891" ref_url="https://bugzilla.suse.com/931891" source="BUGZILLA"/>
		<reference ref_id="933429" ref_url="https://bugzilla.suse.com/933429" source="BUGZILLA"/>
		<reference ref_id="933896" ref_url="https://bugzilla.suse.com/933896" source="BUGZILLA"/>
		<reference ref_id="933904" ref_url="https://bugzilla.suse.com/933904" source="BUGZILLA"/>
		<reference ref_id="933907" ref_url="https://bugzilla.suse.com/933907" source="BUGZILLA"/>
		<reference ref_id="936831" ref_url="https://bugzilla.suse.com/936831" source="BUGZILLA"/>
		<reference ref_id="937159" ref_url="https://bugzilla.suse.com/937159" source="BUGZILLA"/>
		<reference ref_id="938627" ref_url="https://bugzilla.suse.com/938627" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8086" ref_url="https://www.suse.com/security/cve/CVE-2014-8086/" source="CVE"/>
		<reference ref_id="CVE-2014-9728" ref_url="https://www.suse.com/security/cve/CVE-2014-9728/" source="CVE"/>
		<reference ref_id="CVE-2014-9729" ref_url="https://www.suse.com/security/cve/CVE-2014-9729/" source="CVE"/>
		<reference ref_id="CVE-2014-9730" ref_url="https://www.suse.com/security/cve/CVE-2014-9730/" source="CVE"/>
		<reference ref_id="CVE-2014-9731" ref_url="https://www.suse.com/security/cve/CVE-2014-9731/" source="CVE"/>
		<reference ref_id="CVE-2015-1805" ref_url="https://www.suse.com/security/cve/CVE-2015-1805/" source="CVE"/>
		<reference ref_id="CVE-2015-2922" ref_url="https://www.suse.com/security/cve/CVE-2015-2922/" source="CVE"/>
		<reference ref_id="CVE-2015-4167" ref_url="https://www.suse.com/security/cve/CVE-2015-4167/" source="CVE"/>
		<reference ref_id="CVE-2015-5364" ref_url="https://www.suse.com/security/cve/CVE-2015-5364/" source="CVE"/>
		<reference ref_id="CVE-2015-5366" ref_url="https://www.suse.com/security/cve/CVE-2015-5366/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to fix the following security issues:

- x86/mm: Check if PUD is large when validating a kernel address (bnc#937159).
- Update references (bsc#936831, CVE-2015-5364, CVE-2015-5366).
- udp: fix behavior of wrong checksums (bsc#936831, CVE-2015-5364).
- udf: Check component length before reading it (bsc#933904, CVE-2014-9728, CVE-2014-9730).
- udf: Verify i_size when loading inode (bsc#933904, CVE-2014-9728, CVE-2014-9729).
- udf: Verify symlink size before loading it (bsc#933904, CVE-2014-9728).
- udf: Check length of extended attributes and allocation descriptors (bsc#933907, CVE-2015-4167).
- udf: Remove repeated loads blocksize (bsc#933907).
- udf: Check path length when reading symlink (bsc#933896, CVE-2014-9731).
- pipe: fix iov overrun for failed atomic copy (bsc#933429, CVE-2015-1805).
- Revert 'pipe: fix iov overrun for failed atomic copy (bsc#933429')
- pipe: fix iov overrun for failed atomic copy (bsc#933429, CVE-2015-1805).
- Fix for bug 931891 backported from SLE11-SP1-LTSS branch
- Fixup build warning and kABI false positive.
- vfs: Fix race between fcntl() and file-&gt;f_flags checks (bnc#900881, CVE-2014-8086).		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-31"/>
	<updated date="2015-07-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/900881">SUSE bug 900881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922583">SUSE bug 922583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931891">SUSE bug 931891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933429">SUSE bug 933429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933896">SUSE bug 933896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933904">SUSE bug 933904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933907">SUSE bug 933907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936831">SUSE bug 936831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937159">SUSE bug 937159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938627">SUSE bug 938627</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8086/">CVE-2014-8086 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8086">CVE-2014-8086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9728/">CVE-2014-9728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9728">CVE-2014-9728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9729/">CVE-2014-9729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9729">CVE-2014-9729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9730/">CVE-2014-9730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9730">CVE-2014-9730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2014-9731/">CVE-2014-9731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9731">CVE-2014-9731 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2015-1805/">CVE-2015-1805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1805">CVE-2015-1805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2922/">CVE-2015-2922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2922">CVE-2015-2922 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2015-4167/">CVE-2015-4167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4167">CVE-2015-4167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5364/">CVE-2015-5364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5364">CVE-2015-5364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5366/">CVE-2015-5366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5366">CVE-2015-5366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991512" comment="kernel-default-2.6.32.54-0.65.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991513" comment="kernel-default-base-2.6.32.54-0.65.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991515" comment="kernel-source-2.6.32.54-0.65.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991516" comment="kernel-syms-2.6.32.54-0.65.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991517" comment="kernel-trace-2.6.32.54-0.65.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991518" comment="kernel-trace-base-2.6.32.54-0.65.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991520" comment="kernel-xen-2.6.32.54-0.65.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991521" comment="kernel-xen-base-2.6.32.54-0.65.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217248" version="1" class="patch">
	<metadata>
		<title>Security update for Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="698102" ref_url="https://bugzilla.suse.com/698102" source="BUGZILLA"/>
		<reference ref_id="721366" ref_url="https://bugzilla.suse.com/721366" source="BUGZILLA"/>
		<reference ref_id="734300" ref_url="https://bugzilla.suse.com/734300" source="BUGZILLA"/>
		<reference ref_id="755513" ref_url="https://bugzilla.suse.com/755513" source="BUGZILLA"/>
		<reference ref_id="757278" ref_url="https://bugzilla.suse.com/757278" source="BUGZILLA"/>
		<reference ref_id="758260" ref_url="https://bugzilla.suse.com/758260" source="BUGZILLA"/>
		<reference ref_id="758532" ref_url="https://bugzilla.suse.com/758532" source="BUGZILLA"/>
		<reference ref_id="760902" ref_url="https://bugzilla.suse.com/760902" source="BUGZILLA"/>
		<reference ref_id="761414" ref_url="https://bugzilla.suse.com/761414" source="BUGZILLA"/>
		<reference ref_id="763194" ref_url="https://bugzilla.suse.com/763194" source="BUGZILLA"/>
		<reference ref_id="764150" ref_url="https://bugzilla.suse.com/764150" source="BUGZILLA"/>
		<reference ref_id="765102" ref_url="https://bugzilla.suse.com/765102" source="BUGZILLA"/>
		<reference ref_id="765320" ref_url="https://bugzilla.suse.com/765320" source="BUGZILLA"/>
		<reference ref_id="767684" ref_url="https://bugzilla.suse.com/767684" source="BUGZILLA"/>
		<reference ref_id="768632" ref_url="https://bugzilla.suse.com/768632" source="BUGZILLA"/>
		<reference ref_id="769685" ref_url="https://bugzilla.suse.com/769685" source="BUGZILLA"/>
		<reference ref_id="769896" ref_url="https://bugzilla.suse.com/769896" source="BUGZILLA"/>
		<reference ref_id="771619" ref_url="https://bugzilla.suse.com/771619" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-4307" ref_url="https://www.suse.com/security/cve/CVE-2009-4307/" source="CVE"/>
		<reference ref_id="CVE-2012-2123" ref_url="https://www.suse.com/security/cve/CVE-2012-2123/" source="CVE"/>
		<reference ref_id="CVE-2012-2133" ref_url="https://www.suse.com/security/cve/CVE-2012-2133/" source="CVE"/>
		<reference ref_id="CVE-2012-2136" ref_url="https://www.suse.com/security/cve/CVE-2012-2136/" source="CVE"/>
		<reference ref_id="CVE-2012-2319" ref_url="https://www.suse.com/security/cve/CVE-2012-2319/" source="CVE"/>
		<reference ref_id="CVE-2012-2383" ref_url="https://www.suse.com/security/cve/CVE-2012-2383/" source="CVE"/>
		<reference ref_id="CVE-2012-2384" ref_url="https://www.suse.com/security/cve/CVE-2012-2384/" source="CVE"/>
		<reference ref_id="CVE-2012-2390" ref_url="https://www.suse.com/security/cve/CVE-2012-2390/" source="CVE"/>
		<reference ref_id="CVE-2012-2663" ref_url="https://www.suse.com/security/cve/CVE-2012-2663/" source="CVE"/>
		<reference ref_id="CVE-2012-3375" ref_url="https://www.suse.com/security/cve/CVE-2012-3375/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 kernel has been updated to fix bugs and 
security issues.

The following security issues have been fixed:

    * 

      CVE-2009-4307: The ext4_fill_flex_info function in fs/ext4/super.c in
      the Linux kernel allowed user-assisted remote attackers to cause a
      denial of service (divide-by-zero error and panic) via a malformed
      ext4 filesystem containing a super block with a large FLEX_BG group
      size (aka s_log_groups_per_flex value).

    * 

      CVE-2012-2123: The cap_bprm_set_creds function in
      security/commoncap.c in the Linux kernel did not properly handle the
      use of file system capabilities (fcaps) for implementing a privileged
      executable file, which allowed local users to bypass intended
      personality restrictions via a crafted application.

    * 

      CVE-2012-2133: A use after free bug in hugetlb support could be used
      by local attackers to crash the system.

    * 

      CVE-2012-2136: Local attackers could trigger an overflow in
      sock_alloc_send_pksb(), potentially crashing the machine or
      escalating privileges.

    * 

      CVE-2012-2319: A memory corruption when mounting a hfsplus file
      system was fixed that could be used by local attackers able to mount
      file system to crash the system.

    * 

      CVE-2012-2383: An integer overflow in the i915_gem_execbuffer2
      function in drivers/gpu/drm/i915/i915_gem.c in the Direct Rendering
      Manager (DRM) subsystem in the Linux kernel on 32-bit platforms
      allowed local users to cause a denial of service (out-of-bounds
      write) or possibly have unspecified other impact via a crafted ioctl
      call.

    * 

      CVE-2012-2384: An integer overflow in the i915_gem_do_execbuffer
      function in drivers/gpu/drm/i915/i915_gem.c in the Direct Rendering
      Manager (DRM) subsystem in the Linux kernel on 32-bit platforms
      allowed local users to cause a denial of service (out-of-bounds
      write) or possibly have unspecified other impact via a crafted ioctl
      call.

    * 

      CVE-2012-2390: A memory leak in transparent hugepages on mmap failure
      could be used by local attacker to run the machine out of memory
      (local denial of service).

    * 

      CVE-2012-2663: A denial of service via specially forged TCP packets
      with SYN+FIN flags set was fixed.

    * 

      CVE-2012-3375: A local denial of service in the last epoll fix was
      fixed.

The following non-security issues have been fixed:

    * hrtimer: Provide clock_was_set_delayed() (bnc#771619).
    * time: Fix leapsecond triggered hrtimer/futex load spike issue
      (bnc#771619).
    * audit: Do not send uninitialized data for AUDIT_TTY_GET (bnc#755513).
    * tty_audit: Fix tty_audit_add_data live lock on audit disabled
      (bnc#721366, bnc#755513).
    * sched: Make sure to not re-read variables after validation
      (bnc#769685).
    * ntp: Fix leap second hrtimer deadlock (bnc#768632).
    * ntp: Avoid printk under xtime_lock (bnc#767684).
    * Fix boot hang-ups while LD is offline (bnc#698102).
    * scsi_transport_fc: Fix blocked BSG request when FC object deleted
      (bnc#761414, bnc#734300).
    * Revert list_head definition move to types.h.

Security Issue references:

    * CVE-2009-4307
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4307&gt;
    * CVE-2012-2123
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2123&gt;
    * CVE-2012-2133
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2133&gt;
    * CVE-2012-2136
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2136&gt;
    * CVE-2012-2319
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2319&gt;
    * CVE-2012-2383
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2383&gt;
    * CVE-2012-2384
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2384&gt;
    * CVE-2012-2390
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2390&gt;
    * CVE-2012-2663
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2663&gt;
    * CVE-2012-3375
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3375&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-17"/>
	<updated date="2012-07-17"/>
	<bugzilla href="https://bugzilla.suse.com/698102">SUSE bug 698102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/721366">SUSE bug 721366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/734300">SUSE bug 734300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/755513">SUSE bug 755513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757278">SUSE bug 757278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758260">SUSE bug 758260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758532">SUSE bug 758532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760902">SUSE bug 760902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761414">SUSE bug 761414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763194">SUSE bug 763194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/764150">SUSE bug 764150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/765102">SUSE bug 765102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/765320">SUSE bug 765320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767684">SUSE bug 767684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/768632">SUSE bug 768632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769685">SUSE bug 769685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769896">SUSE bug 769896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/771619">SUSE bug 771619</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4307/">CVE-2009-4307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4307">CVE-2009-4307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2123/">CVE-2012-2123 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2123">CVE-2012-2123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2133/">CVE-2012-2133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2133">CVE-2012-2133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2136/">CVE-2012-2136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2136">CVE-2012-2136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2319/">CVE-2012-2319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2319">CVE-2012-2319 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2383/">CVE-2012-2383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2383">CVE-2012-2383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2384/">CVE-2012-2384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2384">CVE-2012-2384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2390/">CVE-2012-2390 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2390">CVE-2012-2390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2663/">CVE-2012-2663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2663">CVE-2012-2663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3375/">CVE-2012-3375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3375">CVE-2012-3375 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991523" comment="kernel-default-2.6.32.54-0.9.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991524" comment="kernel-default-base-2.6.32.54-0.9.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991526" comment="kernel-source-2.6.32.54-0.9.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991527" comment="kernel-syms-2.6.32.54-0.9.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991528" comment="kernel-trace-2.6.32.54-0.9.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991529" comment="kernel-trace-base-2.6.32.54-0.9.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991531" comment="kernel-xen-2.6.32.54-0.9.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991532" comment="kernel-xen-base-2.6.32.54-0.9.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217249" version="1" class="patch">
	<metadata>
		<title>Security update for Kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="718684" ref_url="https://bugzilla.suse.com/718684" source="BUGZILLA"/>
		<reference ref_id="735347" ref_url="https://bugzilla.suse.com/735347" source="BUGZILLA"/>
		<reference ref_id="735498" ref_url="https://bugzilla.suse.com/735498" source="BUGZILLA"/>
		<reference ref_id="738284" ref_url="https://bugzilla.suse.com/738284" source="BUGZILLA"/>
		<reference ref_id="770695" ref_url="https://bugzilla.suse.com/770695" source="BUGZILLA"/>
		<reference ref_id="773383" ref_url="https://bugzilla.suse.com/773383" source="BUGZILLA"/>
		<reference ref_id="774523" ref_url="https://bugzilla.suse.com/774523" source="BUGZILLA"/>
		<reference ref_id="776885" ref_url="https://bugzilla.suse.com/776885" source="BUGZILLA"/>
		<reference ref_id="781018" ref_url="https://bugzilla.suse.com/781018" source="BUGZILLA"/>
		<reference ref_id="783058" ref_url="https://bugzilla.suse.com/783058" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3593" ref_url="https://www.suse.com/security/cve/CVE-2011-3593/" source="CVE"/>
		<reference ref_id="CVE-2012-2745" ref_url="https://www.suse.com/security/cve/CVE-2012-2745/" source="CVE"/>
		<reference ref_id="CVE-2012-3412" ref_url="https://www.suse.com/security/cve/CVE-2012-3412/" source="CVE"/>
		<reference ref_id="CVE-2012-3430" ref_url="https://www.suse.com/security/cve/CVE-2012-3430/" source="CVE"/>
		<reference ref_id="CVE-2012-3511" ref_url="https://www.suse.com/security/cve/CVE-2012-3511/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to fix bugs 
and security issues.

The following security issues were fixed:

CVE-2012-3430: The rds_recvmsg function in net/rds/recv.c in the Linux 
kernel did not initialize a certain structure member, which allowed local 
users to obtain potentially sensitive information from kernel stack memory 
via a (1) recvfrom or (2) recvmsg system call on an RDS socket.

CVE-2012-3412: The sfc (aka Solarflare Solarstorm) driver in the Linux 
kernel allowed remote attackers to cause a denial of service (DMA 
descriptor consumption and network-controller outage) via crafted TCP 
packets that trigger a small MSS value.

CVE-2011-3593: The VLAN implementation of the Linux kernel handled VLAN 0 
frames with the priority tag set incorrectly and, when specific network 
drivers were used, allowed local users to trigger a denial of service.

CVE-2012-3511: Multiple race conditions in the madvise_remove function in 
mm/madvise.c in the Linux kernel allowed local users to cause a denial of 
service (use-after-free and system crash) via vectors involving a (1) 
munmap or (2) close system call.

CVE-2012-2745: The copy_creds function in kernel/cred.c in the Linux kernel 
provided an invalid replacement session keyring to a child process, which 
allowed local users to cause a denial of service (panic) via a crafted 
application that uses the fork system call.

The following non-security issues were fixed:

    * aic94xx: correct the size argument to kmalloc (bnc#783058).
    * sched: fix ancient race condition in do_exit() (bnc#781018).
    * block: add blk_queue_dead() (bnc#738284, bnc#735498).
    * block: add missing blk_queue_dead() checks (bnc#738284, bnc#735498).
    * block: fix race on request.end_io invocations (bnc#738284,
      bnc#735498).
    * fc class: fix scanning when devs are offline (bnc#738284,
      bnc#735498).
    * scsi: fix device removal NULL pointer dereference (bnc#738284,
      bnc#735498).
    * x86: improve the unknown NMI message (bnc#718684).

Security Issues:

    * CVE-2012-3430
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3430&gt;
    * CVE-2012-3412
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3412&gt;
    * CVE-2011-3593
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3593&gt;
    * CVE-2012-3511
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3511&gt;
    * CVE-2012-2745
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2745&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-10-08"/>
	<updated date="2012-10-08"/>
	<bugzilla href="https://bugzilla.suse.com/718684">SUSE bug 718684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/735347">SUSE bug 735347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/735498">SUSE bug 735498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/738284">SUSE bug 738284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770695">SUSE bug 770695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773383">SUSE bug 773383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774523">SUSE bug 774523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776885">SUSE bug 776885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/781018">SUSE bug 781018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/783058">SUSE bug 783058</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3593/">CVE-2011-3593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3593">CVE-2011-3593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2745/">CVE-2012-2745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2745">CVE-2012-2745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3412/">CVE-2012-3412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3412">CVE-2012-3412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3430/">CVE-2012-3430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3430">CVE-2012-3430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3511/">CVE-2012-3511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3511">CVE-2012-3511 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991534" comment="kernel-default-2.6.32.54-0.11.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991535" comment="kernel-default-base-2.6.32.54-0.11.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991537" comment="kernel-source-2.6.32.54-0.11.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991538" comment="kernel-syms-2.6.32.54-0.11.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991539" comment="kernel-trace-2.6.32.54-0.11.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991540" comment="kernel-trace-base-2.6.32.54-0.11.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991542" comment="kernel-xen-2.6.32.54-0.11.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991543" comment="kernel-xen-base-2.6.32.54-0.11.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991545" comment="xen-kmp-default-4.0.3_21548_10_2.6.32.54_0.11.TDC-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991546" comment="xen-kmp-trace-4.0.3_21548_10_2.6.32.54_0.11.TDC-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217250" version="1" class="patch">
	<metadata>
		<title>Security update for Kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="718684" ref_url="https://bugzilla.suse.com/718684" source="BUGZILLA"/>
		<reference ref_id="767610" ref_url="https://bugzilla.suse.com/767610" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2372" ref_url="https://www.suse.com/security/cve/CVE-2012-2372/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to fix bugs 
and security issues.

The following security issue was fixed:

CVE-2012-2372: Attempting an rds connection from the IP address of an IPoIB 
interface to itself causes a kernel panic due to a BUG_ON() being 
triggered. Making the test less strict allows rds-ping to work without 
crashing the machine. A local unprivileged user could use this flaw to 
crash the sytem.

The following non-security issues were fixed:

    * x86: reverse the condition to print the 'unknown NMI' message in
      Kdump kernel (bnc#718684).
    * Update x86_64 kabi files to match the 2.6.32.54-0.3 SP1 kernel.

Security Issues:

    * CVE-2012-2372
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2372&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-30"/>
	<updated date="2012-11-30"/>
	<bugzilla href="https://bugzilla.suse.com/718684">SUSE bug 718684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767610">SUSE bug 767610</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2372/">CVE-2012-2372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2372">CVE-2012-2372 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991547" comment="kernel-default-2.6.32.54-0.13.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991548" comment="kernel-default-base-2.6.32.54-0.13.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991550" comment="kernel-source-2.6.32.54-0.13.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991551" comment="kernel-syms-2.6.32.54-0.13.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991552" comment="kernel-trace-2.6.32.54-0.13.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991553" comment="kernel-trace-base-2.6.32.54-0.13.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991555" comment="kernel-xen-2.6.32.54-0.13.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991556" comment="kernel-xen-base-2.6.32.54-0.13.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991558" comment="xen-kmp-default-4.0.3_21548_12_2.6.32.54_0.13.TDC-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991559" comment="xen-kmp-trace-4.0.3_21548_12_2.6.32.54_0.13.TDC-0.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217251" version="1" class="patch">
	<metadata>
		<title>Security update for Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="754898" ref_url="https://bugzilla.suse.com/754898" source="BUGZILLA"/>
		<reference ref_id="767612" ref_url="https://bugzilla.suse.com/767612" source="BUGZILLA"/>
		<reference ref_id="769685" ref_url="https://bugzilla.suse.com/769685" source="BUGZILLA"/>
		<reference ref_id="786013" ref_url="https://bugzilla.suse.com/786013" source="BUGZILLA"/>
		<reference ref_id="787573" ref_url="https://bugzilla.suse.com/787573" source="BUGZILLA"/>
		<reference ref_id="788590" ref_url="https://bugzilla.suse.com/788590" source="BUGZILLA"/>
		<reference ref_id="797175" ref_url="https://bugzilla.suse.com/797175" source="BUGZILLA"/>
		<reference ref_id="799688" ref_url="https://bugzilla.suse.com/799688" source="BUGZILLA"/>
		<reference ref_id="802642" ref_url="https://bugzilla.suse.com/802642" source="BUGZILLA"/>
		<reference ref_id="804154" ref_url="https://bugzilla.suse.com/804154" source="BUGZILLA"/>
		<reference ref_id="804653" ref_url="https://bugzilla.suse.com/804653" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-1601" ref_url="https://www.suse.com/security/cve/CVE-2012-1601/" source="CVE"/>
		<reference ref_id="CVE-2012-2137" ref_url="https://www.suse.com/security/cve/CVE-2012-2137/" source="CVE"/>
		<reference ref_id="CVE-2012-4530" ref_url="https://www.suse.com/security/cve/CVE-2012-4530/" source="CVE"/>
		<reference ref_id="CVE-2013-0160" ref_url="https://www.suse.com/security/cve/CVE-2013-0160/" source="CVE"/>
		<reference ref_id="CVE-2013-0268" ref_url="https://www.suse.com/security/cve/CVE-2013-0268/" source="CVE"/>
		<reference ref_id="CVE-2013-0310" ref_url="https://www.suse.com/security/cve/CVE-2013-0310/" source="CVE"/>
		<reference ref_id="CVE-2013-0871" ref_url="https://www.suse.com/security/cve/CVE-2013-0871/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel has been updated to fix 
bugs and security issues.

The following security issues have been fixed:

    * tty: do not update atime/mtime on read/write (bnc#797175,
      CVE-2013-0160)
    * cipso: don't follow a NULL pointer when setsockopt() is called
      (bnc#804653, CVE-2013-0310)
    * ptrace: ensure arch_ptrace/ptrace_request can never race with SIGKILL
      (bnc#804154, CVE-2013-0871)
    * ptrace: introduce signal_wake_up_state() and ptrace_signal_wake_up()
      (bnc#804154, CVE-2013-0871)
    * wake_up_process() should be never used to wakeup a
      TASK_STOPPED/TRACED task (bnc#804154, CVE-2013-0871)
    * x86/msr: add capabilities check (bnc#802642, CVE-2013-0268)
    * exec: do not leave bprm-&gt;interp on stack (bnc#786013, CVE-2012-4530)
    * kvm: Fix buffer overflow in kvm_set_irq() (bnc#767612, CVE-2012-2137)
    * kvm: Clean up error handling during VCPU creation (bnc#754898,
      CVE-2012-1601)
    * kvm: Ensure all vcpus are consistent with in-kernel irqchip settings
      (bnc#754898, CVE-2012-1601).

The following non-security issues have been fixed:

    * sched: harden rq rt usage accounting (bnc#769685, bnc#788590)
    * proc: fix pagemap_read() error case (bnc#787573, bnc#799688).

Security Issue references:

    * CVE-2013-0310
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0310&gt;
    * CVE-2013-0871
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0871&gt;
    * CVE-2013-0268
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0268&gt;
    * CVE-2012-4530
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4530&gt;
    * CVE-2012-2137
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2137&gt;
    * CVE-2012-1601
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1601&gt;
    * CVE-2013-0160
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0160&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-02-26"/>
	<updated date="2013-02-26"/>
	<bugzilla href="https://bugzilla.suse.com/754898">SUSE bug 754898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767612">SUSE bug 767612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769685">SUSE bug 769685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786013">SUSE bug 786013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787573">SUSE bug 787573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788590">SUSE bug 788590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797175">SUSE bug 797175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799688">SUSE bug 799688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802642">SUSE bug 802642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804154">SUSE bug 804154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804653">SUSE bug 804653</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1601/">CVE-2012-1601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1601">CVE-2012-1601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2137/">CVE-2012-2137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2137">CVE-2012-2137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4530/">CVE-2012-4530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4530">CVE-2012-4530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0160/">CVE-2013-0160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0160">CVE-2013-0160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0268/">CVE-2013-0268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0268">CVE-2013-0268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0310/">CVE-2013-0310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0310">CVE-2013-0310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0871/">CVE-2013-0871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0871">CVE-2013-0871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991560" comment="kernel-default-2.6.32.54-0.21.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991561" comment="kernel-default-base-2.6.32.54-0.21.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991563" comment="kernel-source-2.6.32.54-0.21.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991564" comment="kernel-syms-2.6.32.54-0.21.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991565" comment="kernel-trace-2.6.32.54-0.21.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991566" comment="kernel-trace-base-2.6.32.54-0.21.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991568" comment="kernel-xen-2.6.32.54-0.21.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991569" comment="kernel-xen-base-2.6.32.54-0.21.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991571" comment="xen-kmp-default-4.0.3_21548_12_2.6.32.54_0.21.TDC-0.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991572" comment="xen-kmp-trace-4.0.3_21548_12_2.6.32.54_0.21.TDC-0.3.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217252" version="1" class="patch">
	<metadata>
		<title>Security update for Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="804154" ref_url="https://bugzilla.suse.com/804154" source="BUGZILLA"/>
		<reference ref_id="806138" ref_url="https://bugzilla.suse.com/806138" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1767" ref_url="https://www.suse.com/security/cve/CVE-2013-1767/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel has been updated to fix 
one bug and a security issue.

The following security issue has been fixed:

    * tmpfs: fix use-after-free of mempolicy object (bnc#806138,
      CVE-2013-1767).

The following non-security issue has been fixed:

    * ptrace: ptrace_resume() shouldn't wake up !TASK_TRACED thread
      (bnc#804154).

Security Issue reference:

    * CVE-2013-1767
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1767&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-13"/>
	<updated date="2013-03-13"/>
	<bugzilla href="https://bugzilla.suse.com/804154">SUSE bug 804154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806138">SUSE bug 806138</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1767/">CVE-2013-1767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1767">CVE-2013-1767 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991573" comment="kernel-default-2.6.32.54-0.23.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991574" comment="kernel-default-base-2.6.32.54-0.23.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991576" comment="kernel-source-2.6.32.54-0.23.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991577" comment="kernel-syms-2.6.32.54-0.23.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991578" comment="kernel-trace-2.6.32.54-0.23.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991579" comment="kernel-trace-base-2.6.32.54-0.23.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991581" comment="kernel-xen-2.6.32.54-0.23.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991582" comment="kernel-xen-base-2.6.32.54-0.23.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991584" comment="xen-kmp-default-4.0.3_21548_12_2.6.32.54_0.23.TDC-0.3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991585" comment="xen-kmp-trace-4.0.3_21548_12_2.6.32.54_0.23.TDC-0.3.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217253" version="1" class="patch">
	<metadata>
		<title>Security update for Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="787576" ref_url="https://bugzilla.suse.com/787576" source="BUGZILLA"/>
		<reference ref_id="789831" ref_url="https://bugzilla.suse.com/789831" source="BUGZILLA"/>
		<reference ref_id="800280" ref_url="https://bugzilla.suse.com/800280" source="BUGZILLA"/>
		<reference ref_id="801178" ref_url="https://bugzilla.suse.com/801178" source="BUGZILLA"/>
		<reference ref_id="804553" ref_url="https://bugzilla.suse.com/804553" source="BUGZILLA"/>
		<reference ref_id="805227" ref_url="https://bugzilla.suse.com/805227" source="BUGZILLA"/>
		<reference ref_id="806976" ref_url="https://bugzilla.suse.com/806976" source="BUGZILLA"/>
		<reference ref_id="806977" ref_url="https://bugzilla.suse.com/806977" source="BUGZILLA"/>
		<reference ref_id="806980" ref_url="https://bugzilla.suse.com/806980" source="BUGZILLA"/>
		<reference ref_id="808358" ref_url="https://bugzilla.suse.com/808358" source="BUGZILLA"/>
		<reference ref_id="808778" ref_url="https://bugzilla.suse.com/808778" source="BUGZILLA"/>
		<reference ref_id="808827" ref_url="https://bugzilla.suse.com/808827" source="BUGZILLA"/>
		<reference ref_id="809014" ref_url="https://bugzilla.suse.com/809014" source="BUGZILLA"/>
		<reference ref_id="809889" ref_url="https://bugzilla.suse.com/809889" source="BUGZILLA"/>
		<reference ref_id="809891" ref_url="https://bugzilla.suse.com/809891" source="BUGZILLA"/>
		<reference ref_id="809892" ref_url="https://bugzilla.suse.com/809892" source="BUGZILLA"/>
		<reference ref_id="809893" ref_url="https://bugzilla.suse.com/809893" source="BUGZILLA"/>
		<reference ref_id="809894" ref_url="https://bugzilla.suse.com/809894" source="BUGZILLA"/>
		<reference ref_id="809898" ref_url="https://bugzilla.suse.com/809898" source="BUGZILLA"/>
		<reference ref_id="809899" ref_url="https://bugzilla.suse.com/809899" source="BUGZILLA"/>
		<reference ref_id="809900" ref_url="https://bugzilla.suse.com/809900" source="BUGZILLA"/>
		<reference ref_id="809901" ref_url="https://bugzilla.suse.com/809901" source="BUGZILLA"/>
		<reference ref_id="809902" ref_url="https://bugzilla.suse.com/809902" source="BUGZILLA"/>
		<reference ref_id="809903" ref_url="https://bugzilla.suse.com/809903" source="BUGZILLA"/>
		<reference ref_id="810473" ref_url="https://bugzilla.suse.com/810473" source="BUGZILLA"/>
		<reference ref_id="811354" ref_url="https://bugzilla.suse.com/811354" source="BUGZILLA"/>
		<reference ref_id="813735" ref_url="https://bugzilla.suse.com/813735" source="BUGZILLA"/>
		<reference ref_id="816668" ref_url="https://bugzilla.suse.com/816668" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4444" ref_url="https://www.suse.com/security/cve/CVE-2012-4444/" source="CVE"/>
		<reference ref_id="CVE-2012-4565" ref_url="https://www.suse.com/security/cve/CVE-2012-4565/" source="CVE"/>
		<reference ref_id="CVE-2012-6537" ref_url="https://www.suse.com/security/cve/CVE-2012-6537/" source="CVE"/>
		<reference ref_id="CVE-2012-6538" ref_url="https://www.suse.com/security/cve/CVE-2012-6538/" source="CVE"/>
		<reference ref_id="CVE-2012-6539" ref_url="https://www.suse.com/security/cve/CVE-2012-6539/" source="CVE"/>
		<reference ref_id="CVE-2012-6540" ref_url="https://www.suse.com/security/cve/CVE-2012-6540/" source="CVE"/>
		<reference ref_id="CVE-2012-6541" ref_url="https://www.suse.com/security/cve/CVE-2012-6541/" source="CVE"/>
		<reference ref_id="CVE-2012-6542" ref_url="https://www.suse.com/security/cve/CVE-2012-6542/" source="CVE"/>
		<reference ref_id="CVE-2012-6544" ref_url="https://www.suse.com/security/cve/CVE-2012-6544/" source="CVE"/>
		<reference ref_id="CVE-2012-6545" ref_url="https://www.suse.com/security/cve/CVE-2012-6545/" source="CVE"/>
		<reference ref_id="CVE-2012-6546" ref_url="https://www.suse.com/security/cve/CVE-2012-6546/" source="CVE"/>
		<reference ref_id="CVE-2012-6547" ref_url="https://www.suse.com/security/cve/CVE-2012-6547/" source="CVE"/>
		<reference ref_id="CVE-2012-6548" ref_url="https://www.suse.com/security/cve/CVE-2012-6548/" source="CVE"/>
		<reference ref_id="CVE-2012-6549" ref_url="https://www.suse.com/security/cve/CVE-2012-6549/" source="CVE"/>
		<reference ref_id="CVE-2013-0216" ref_url="https://www.suse.com/security/cve/CVE-2013-0216/" source="CVE"/>
		<reference ref_id="CVE-2013-0231" ref_url="https://www.suse.com/security/cve/CVE-2013-0231/" source="CVE"/>
		<reference ref_id="CVE-2013-0349" ref_url="https://www.suse.com/security/cve/CVE-2013-0349/" source="CVE"/>
		<reference ref_id="CVE-2013-0914" ref_url="https://www.suse.com/security/cve/CVE-2013-0914/" source="CVE"/>
		<reference ref_id="CVE-2013-1767" ref_url="https://www.suse.com/security/cve/CVE-2013-1767/" source="CVE"/>
		<reference ref_id="CVE-2013-1773" ref_url="https://www.suse.com/security/cve/CVE-2013-1773/" source="CVE"/>
		<reference ref_id="CVE-2013-1774" ref_url="https://www.suse.com/security/cve/CVE-2013-1774/" source="CVE"/>
		<reference ref_id="CVE-2013-1792" ref_url="https://www.suse.com/security/cve/CVE-2013-1792/" source="CVE"/>
		<reference ref_id="CVE-2013-1796" ref_url="https://www.suse.com/security/cve/CVE-2013-1796/" source="CVE"/>
		<reference ref_id="CVE-2013-1797" ref_url="https://www.suse.com/security/cve/CVE-2013-1797/" source="CVE"/>
		<reference ref_id="CVE-2013-1798" ref_url="https://www.suse.com/security/cve/CVE-2013-1798/" source="CVE"/>
		<reference ref_id="CVE-2013-1827" ref_url="https://www.suse.com/security/cve/CVE-2013-1827/" source="CVE"/>
		<reference ref_id="CVE-2013-1928" ref_url="https://www.suse.com/security/cve/CVE-2013-1928/" source="CVE"/>
		<reference ref_id="CVE-2013-2634" ref_url="https://www.suse.com/security/cve/CVE-2013-2634/" source="CVE"/>
		<reference ref_id="CVE-2013-3222" ref_url="https://www.suse.com/security/cve/CVE-2013-3222/" source="CVE"/>
		<reference ref_id="CVE-2013-3223" ref_url="https://www.suse.com/security/cve/CVE-2013-3223/" source="CVE"/>
		<reference ref_id="CVE-2013-3224" ref_url="https://www.suse.com/security/cve/CVE-2013-3224/" source="CVE"/>
		<reference ref_id="CVE-2013-3225" ref_url="https://www.suse.com/security/cve/CVE-2013-3225/" source="CVE"/>
		<reference ref_id="CVE-2013-3228" ref_url="https://www.suse.com/security/cve/CVE-2013-3228/" source="CVE"/>
		<reference ref_id="CVE-2013-3229" ref_url="https://www.suse.com/security/cve/CVE-2013-3229/" source="CVE"/>
		<reference ref_id="CVE-2013-3231" ref_url="https://www.suse.com/security/cve/CVE-2013-3231/" source="CVE"/>
		<reference ref_id="CVE-2013-3232" ref_url="https://www.suse.com/security/cve/CVE-2013-3232/" source="CVE"/>
		<reference ref_id="CVE-2013-3234" ref_url="https://www.suse.com/security/cve/CVE-2013-3234/" source="CVE"/>
		<reference ref_id="CVE-2013-3235" ref_url="https://www.suse.com/security/cve/CVE-2013-3235/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel has been updated to fix 
bugs and security issues.

The following security issues have been fixed:

    * xfrm_user: fix info leak in copy_to_user_auth() (CVE-2012-6538,
      bnc#809889).
    * xfrm_user: fix info leak in copy_to_user_policy() (CVE-2012-6537,
      bnc#809889).
    * xfrm_user: fix info leak in copy_to_user_state() (CVE-2012-6537,
      bnc#809889).
    * xfrm_user: fix info leak in copy_to_user_tmpl() (CVE-2012-6537,
      bnc#809889).
    * bluetooth: RFCOMM - Fix missing msg_namelen update in
      rfcomm_sock_recvmsg() (CVE-2013-3225, bnc#816668).
    * bluetooth: fix possible info leak in bt_sock_recvmsg()
      (CVE-2013-3224, bnc#816668).
    * atm: update msg_namelen in vcc_recvmsg() (CVE-2013-3222, bnc#816668).
    * ax25: fix info leak via msg_name in ax25_recvmsg() (CVE-2013-3223,
      bnc#816668).
    * irda: Fix missing msg_namelen update in irda_recvmsg_dgram()
      (CVE-2013-3228, bnc#816668).
    * iucv: Fix missing msg_namelen update in iucv_sock_recvmsg()
      (CVE-2013-3229, bnc#816668).
    * llc: Fix missing msg_namelen update in llc_ui_recvmsg()
      (CVE-2013-3231, bnc#816668).
    * netrom: fix info leak via msg_name in nr_recvmsg() (CVE-2013-3232,
      bnc#816668).
    * netrom: fix invalid use of sizeof in nr_recvmsg() (CVE-2013-3232,
      bnc#816668).
    * rose: fix info leak via msg_name in rose_recvmsg() (CVE-2013-3234,
      bnc#816668).
    * tipc: fix info leaks via msg_name in recv_msg/recv_stream
      (CVE-2013-3235, bnc#816668).
    * dccp: check ccid before dereferencing (CVE-2013-1827, bnc#811354).
    * dcbnl: fix various netlink info leaks (CVE-2013-2634, bnc#810473).
    * isofs: avoid info leak on export (CVE-2012-6549, bnc#809903).
    * udf: avoid info leak on export (CVE-2012-6548, bnc#809902).
    * net/tun: fix ioctl() based info leaks (CVE-2012-6547, bnc#809901).
    * atm: fix info leak in getsockopt(SO_ATMPVC) (CVE-2012-6546,
      bnc#809900).
    * atm: fix info leak via getsockname() (CVE-2012-6546, bnc#809900).
    * bluetooth: RFCOMM - Fix info leak in ioctl(RFCOMMGETDEVLIST)
      (CVE-2012-6545, bnc#809899).
    * bluetooth: RFCOMM - Fix info leak via getsockname() (CVE-2012-6545,
      bnc#809899).
    * bluetooth: HCI - Fix info leak in getsockopt(HCI_FILTER)
      (CVE-2012-6544, bnc#809898).
    * bluetooth: L2CAP - Fix info leak via getsockname() (CVE-2012-6544,
      bnc#809898).
    * llc: fix info leak via getsockname() (CVE-2012-6542, bnc#809894).
    * dccp: fix info leak via getsockopt(DCCP_SOCKOPT_CCID_TX_INFO)
      (CVE-2012-6541, bnc#809893).
    * ipvs: fix info leak in getsockopt(IP_VS_SO_GET_TIMEOUT)
      (CVE-2012-6540, bnc#809892).
    * net: fix info leak in compat dev_ifconf() (CVE-2012-6539,
      bnc#809891).
    * signal: always clear sa_restorer on execve (CVE-2013-0914,
      bnc#808827).
    * bluetooth: Fix incorrect strncpy() in hidp_setup_hid()
      (CVE-2013-0349, bnc#805227).
    * ipv6: discard overlapping fragment (CVE-2012-4444, bnc#789831).
    * net: fix divide by zero in tcp algorithm illinois (CVE-2012-4565,
      bnc#787576).
    * fs/compat_ioctl: VIDEO_SET_SPU_PALETTE missing error check
      (bnc#813735, CVE-2013-1928).
    * keys: fix race with concurrent install_user_keyrings() (bnc#808358,
      CVE-2013-1792).
    * xenbus: fix overflow check in xenbus_dev_write().
    * x86: don't corrupt %eip when returning from a signal handler.
    * netback: shutdown the ring if it contains garbage (CVE-2013-0216
      XSA-39 bnc#800280).
    * netback: correct netbk_tx_err() to handle wrap around (CVE-2013-0216
      XSA-39 bnc#800280).
    * pciback: rate limit error message from pciback_enable_msi()
      (CVE-2013-0231 XSA-43 bnc#801178).
    * scsiback/usbback: move cond_resched() invocations to proper place.
    * netback: fix netbk_count_requests().
    * USB: io_ti: Fix NULL dereference in chase_port() (bnc#806976,
      CVE-2013-1774).
    * KVM: Add memory slot versioning and use it to provide fast guest
      write interface (bnc#806980 CVE-2013-1797).
    * KVM: Convert MSR_KVM_SYSTEM_TIME to use gfn_to_hva_cache_init
      (bnc#806980 CVE-2013-1797).
    * KVM: Fix bounds checking in ioapic indirect register read (bnc#806980
      CVE-2013-1798).
    * KVM: Fix for buffer overflow in handling of MSR_KVM_SYSTEM_TIME
      (bnc#806980 CVE-2013-1796).
    * KVM: introduce kvm_read_guest_cached (bnc#806980 CVE-2013-1797).
    * KVM: MMU: introduce gfn_to_page_many_atomic() function (bnc#806980
      CVE-2013-1797).
    * KVM: use the correct RCU API for PROVE_RCU=y (bnc#806980
      CVE-2013-1797).
    * NLS: improve UTF8 -&gt; UTF16 string conversion routine (bnc#806977
      CVE-2013-1773).

The following non-security issue have been fixed:

    * harden update_stats_wait_end() against microscopic rq-&gt;clock
      aberations (bnc#808778).
    * net-2.6: SYN retransmits: Add new parameter to
      retransmits_timed_out() (bnc#809014).
    * mm: cond_resched per PMD during unmapping a VMA (bnc#804553).

Additionally, the patch TTY-do-not-update-atime-mtime-on-read-write.patch 
has been dropped because it broke userspace applications.

Security Issue references:

    * CVE-2012-4444
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4444&gt;
    * CVE-2012-4565
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4565&gt;
    * CVE-2012-6537
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6537&gt;
    * CVE-2012-6538
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6538&gt;
    * CVE-2012-6539
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6539&gt;
    * CVE-2012-6540
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6540&gt;
    * CVE-2012-6541
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6541&gt;
    * CVE-2012-6542
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6542&gt;
    * CVE-2012-6544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6544&gt;
    * CVE-2012-6545
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6545&gt;
    * CVE-2012-6546
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6546&gt;
    * CVE-2012-6547
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6547&gt;
    * CVE-2012-6548
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6548&gt;
    * CVE-2012-6549
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6549&gt;
    * CVE-2013-0216
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0216&gt;
    * CVE-2013-0231
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0231&gt;
    * CVE-2013-0349
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0349&gt;
    * CVE-2013-0914
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0914&gt;
    * CVE-2013-1767
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1767&gt;
    * CVE-2013-1773
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1773&gt;
    * CVE-2013-1774
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1774&gt;
    * CVE-2013-1792
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1792&gt;
    * CVE-2013-1796
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1796&gt;
    * CVE-2013-1797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1797&gt;
    * CVE-2013-1798
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1798&gt;
    * CVE-2013-1827
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1827&gt;
    * CVE-2013-1928
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1928&gt;
    * CVE-2013-2634
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2634&gt;
    * CVE-2013-3222
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3222&gt;
    * CVE-2013-3223
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3223&gt;
    * CVE-2013-3224
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3224&gt;
    * CVE-2013-3225
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3225&gt;
    * CVE-2013-3228
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3228&gt;
    * CVE-2013-3229
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3229&gt;
    * CVE-2013-3231
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3231&gt;
    * CVE-2013-3232
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3232&gt;
    * CVE-2013-3234
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3234&gt;
    * CVE-2013-3235
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3235&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-04-28"/>
	<updated date="2013-04-28"/>
	<bugzilla href="https://bugzilla.suse.com/787576">SUSE bug 787576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789831">SUSE bug 789831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800280">SUSE bug 800280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801178">SUSE bug 801178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804553">SUSE bug 804553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/805227">SUSE bug 805227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806976">SUSE bug 806976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806977">SUSE bug 806977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806980">SUSE bug 806980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808358">SUSE bug 808358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808778">SUSE bug 808778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808827">SUSE bug 808827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809014">SUSE bug 809014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809889">SUSE bug 809889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809891">SUSE bug 809891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809892">SUSE bug 809892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809893">SUSE bug 809893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809894">SUSE bug 809894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809898">SUSE bug 809898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809899">SUSE bug 809899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809900">SUSE bug 809900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809901">SUSE bug 809901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809902">SUSE bug 809902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809903">SUSE bug 809903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/810473">SUSE bug 810473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/811354">SUSE bug 811354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813735">SUSE bug 813735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4444/">CVE-2012-4444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4444">CVE-2012-4444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4565/">CVE-2012-4565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4565">CVE-2012-4565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6537/">CVE-2012-6537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6537">CVE-2012-6537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6538/">CVE-2012-6538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6538">CVE-2012-6538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6539/">CVE-2012-6539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6539">CVE-2012-6539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6540/">CVE-2012-6540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6540">CVE-2012-6540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6541/">CVE-2012-6541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6541">CVE-2012-6541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6542/">CVE-2012-6542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6542">CVE-2012-6542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6544/">CVE-2012-6544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6544">CVE-2012-6544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6545/">CVE-2012-6545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6545">CVE-2012-6545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6546/">CVE-2012-6546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6546">CVE-2012-6546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6547/">CVE-2012-6547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6547">CVE-2012-6547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6548/">CVE-2012-6548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6548">CVE-2012-6548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6549/">CVE-2012-6549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6549">CVE-2012-6549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0216/">CVE-2013-0216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0216">CVE-2013-0216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0231/">CVE-2013-0231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0231">CVE-2013-0231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0349/">CVE-2013-0349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0349">CVE-2013-0349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0914/">CVE-2013-0914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0914">CVE-2013-0914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1767/">CVE-2013-1767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1767">CVE-2013-1767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1773/">CVE-2013-1773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1773">CVE-2013-1773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1774/">CVE-2013-1774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1774">CVE-2013-1774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1792/">CVE-2013-1792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1792">CVE-2013-1792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1796/">CVE-2013-1796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1796">CVE-2013-1796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1797/">CVE-2013-1797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1797">CVE-2013-1797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1798/">CVE-2013-1798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1798">CVE-2013-1798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1827/">CVE-2013-1827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1827">CVE-2013-1827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1928/">CVE-2013-1928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1928">CVE-2013-1928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2634/">CVE-2013-2634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2634">CVE-2013-2634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3222/">CVE-2013-3222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3222">CVE-2013-3222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3223/">CVE-2013-3223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3223">CVE-2013-3223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3224/">CVE-2013-3224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3224">CVE-2013-3224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3225/">CVE-2013-3225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3225">CVE-2013-3225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3228/">CVE-2013-3228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3228">CVE-2013-3228 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3229/">CVE-2013-3229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3229">CVE-2013-3229 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3231/">CVE-2013-3231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3231">CVE-2013-3231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3232/">CVE-2013-3232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3232">CVE-2013-3232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3234/">CVE-2013-3234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3234">CVE-2013-3234 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3235/">CVE-2013-3235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3235">CVE-2013-3235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991586" comment="kernel-default-2.6.32.54-0.25.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991587" comment="kernel-default-base-2.6.32.54-0.25.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991589" comment="kernel-source-2.6.32.54-0.25.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991590" comment="kernel-syms-2.6.32.54-0.25.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991591" comment="kernel-trace-2.6.32.54-0.25.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991592" comment="kernel-trace-base-2.6.32.54-0.25.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991594" comment="kernel-xen-2.6.32.54-0.25.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991595" comment="kernel-xen-base-2.6.32.54-0.25.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991597" comment="xen-kmp-default-4.0.3_21548_12_2.6.32.54_0.25.TDC-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991598" comment="xen-kmp-trace-4.0.3_21548_12_2.6.32.54_0.25.TDC-0.5.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217254" version="1" class="patch">
	<metadata>
		<title>Security update for Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="797175" ref_url="https://bugzilla.suse.com/797175" source="BUGZILLA"/>
		<reference ref_id="812364" ref_url="https://bugzilla.suse.com/812364" source="BUGZILLA"/>
		<reference ref_id="813276" ref_url="https://bugzilla.suse.com/813276" source="BUGZILLA"/>
		<reference ref_id="815352" ref_url="https://bugzilla.suse.com/815352" source="BUGZILLA"/>
		<reference ref_id="815745" ref_url="https://bugzilla.suse.com/815745" source="BUGZILLA"/>
		<reference ref_id="816796" ref_url="https://bugzilla.suse.com/816796" source="BUGZILLA"/>
		<reference ref_id="817377" ref_url="https://bugzilla.suse.com/817377" source="BUGZILLA"/>
		<reference ref_id="822575" ref_url="https://bugzilla.suse.com/822575" source="BUGZILLA"/>
		<reference ref_id="822579" ref_url="https://bugzilla.suse.com/822579" source="BUGZILLA"/>
		<reference ref_id="823267" ref_url="https://bugzilla.suse.com/823267" source="BUGZILLA"/>
		<reference ref_id="827749" ref_url="https://bugzilla.suse.com/827749" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0160" ref_url="https://www.suse.com/security/cve/CVE-2013-0160/" source="CVE"/>
		<reference ref_id="CVE-2013-2141" ref_url="https://www.suse.com/security/cve/CVE-2013-2141/" source="CVE"/>
		<reference ref_id="CVE-2013-2234" ref_url="https://www.suse.com/security/cve/CVE-2013-2234/" source="CVE"/>
		<reference ref_id="CVE-2013-2851" ref_url="https://www.suse.com/security/cve/CVE-2013-2851/" source="CVE"/>
		<reference ref_id="CVE-2013-2852" ref_url="https://www.suse.com/security/cve/CVE-2013-2852/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel has been updated to fix 
bugs and security issues.

The following security issues have been fixed:

    * b43: stop format string leaking into error msgs (bnc#822579,
      CVE-2013-2852).
    * kernel/signal.c: stop info leak via the tkill and the tgkill syscalls
      (bnc#823267, CVE-2013-2141).
    * tty: do not update atime/mtime on read/write (bnc#797175,
      CVE-2013-0160).
    * block: do not pass disk names as format strings (bnc#822575,
      CVE-2013-2851).
    * af_key: fix info leaks in notify messages (bnc#827749,
      CVE-2013-2234).

The following non-security issue have been fixed:

    * make nfsiod a multi-thread queue (bnc#815352).
    * ext4: avoid hang when mounting non-journal filesystems with orphan
      list (bnc#817377).
    * tty: fix up atime/mtime mess, take three (bnc#797175).
    * tty: fix atime/mtime regression (bnc#815745).
    * cgroup: introduce cancel_attach() (bnc#777157).
    * cgroup: introduce coalesce css_get() and css_put() (bnc#777157).
    * memcg: add interface to move charge at task migration (bnc#777157).
    * memcg: add mem_cgroup_cancel_charge() (bnc#777157).
    * memcg: avoid oom during moving charge (bnc#777157).
    * memcg: clean up move charge (bnc#777157).
    * memcg: cleanup mem_cgroup_move_parent() (bnc#777157).
    * memcg: improve performance in moving charge (bnc#777157).
    * memcg: improve performance in moving swap charge (bnc#777157).
    * memcg: move charge of file pages (bnc#777157).
    * memcg: move charges of anonymous page (bnc#777157).
    * memcg: move charges of anonymous swap (bnc#777157).
    * memcg: remove memcg_tasklist (bnc#777157).
    * CONFIG_NO_HZ disabled in all supported kernel flavors except for XEN
      (bnc#816796).
    * rwsem: Test for no active locks in __rwsem_do_wake undo code
      (bnc#813276).
    * cpumask: Partition_sched_domains takes array of cpumask_var_t
      (bnc#812364).
    * cpumask: Simplify sched_rt.c (bnc#812364).
    * af_key: initialize satype in key_notify_policy_flush() (bnc#827749).

Security Issues:

    * CVE-2013-2852
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2852&gt;
    * CVE-2013-2141
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2141&gt;
    * CVE-2013-0160
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0160&gt;
    * CVE-2013-2851
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2851&gt;
    * CVE-2013-2234
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2234&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-07-04"/>
	<updated date="2013-07-04"/>
	<bugzilla href="https://bugzilla.suse.com/797175">SUSE bug 797175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/812364">SUSE bug 812364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813276">SUSE bug 813276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815352">SUSE bug 815352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815745">SUSE bug 815745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816796">SUSE bug 816796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817377">SUSE bug 817377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822575">SUSE bug 822575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822579">SUSE bug 822579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823267">SUSE bug 823267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827749">SUSE bug 827749</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0160/">CVE-2013-0160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0160">CVE-2013-0160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2141/">CVE-2013-2141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2141">CVE-2013-2141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2234/">CVE-2013-2234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2234">CVE-2013-2234 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2851/">CVE-2013-2851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2851">CVE-2013-2851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2852/">CVE-2013-2852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2852">CVE-2013-2852 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991599" comment="kernel-default-2.6.32.54-0.29.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991600" comment="kernel-default-base-2.6.32.54-0.29.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991602" comment="kernel-source-2.6.32.54-0.29.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991603" comment="kernel-syms-2.6.32.54-0.29.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991604" comment="kernel-trace-2.6.32.54-0.29.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991605" comment="kernel-trace-base-2.6.32.54-0.29.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991607" comment="kernel-xen-2.6.32.54-0.29.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991608" comment="kernel-xen-base-2.6.32.54-0.29.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991610" comment="xen-kmp-default-4.0.3_21548_12_2.6.32.54_0.29.TDC-0.5.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991611" comment="xen-kmp-trace-4.0.3_21548_12_2.6.32.54_0.29.TDC-0.5.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217255" version="1" class="patch">
	<metadata>
		<title>Security update for Linux Kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="630970" ref_url="https://bugzilla.suse.com/630970" source="BUGZILLA"/>
		<reference ref_id="661605" ref_url="https://bugzilla.suse.com/661605" source="BUGZILLA"/>
		<reference ref_id="763463" ref_url="https://bugzilla.suse.com/763463" source="BUGZILLA"/>
		<reference ref_id="823260" ref_url="https://bugzilla.suse.com/823260" source="BUGZILLA"/>
		<reference ref_id="824295" ref_url="https://bugzilla.suse.com/824295" source="BUGZILLA"/>
		<reference ref_id="827749" ref_url="https://bugzilla.suse.com/827749" source="BUGZILLA"/>
		<reference ref_id="827750" ref_url="https://bugzilla.suse.com/827750" source="BUGZILLA"/>
		<reference ref_id="828012" ref_url="https://bugzilla.suse.com/828012" source="BUGZILLA"/>
		<reference ref_id="828119" ref_url="https://bugzilla.suse.com/828119" source="BUGZILLA"/>
		<reference ref_id="835481" ref_url="https://bugzilla.suse.com/835481" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1943" ref_url="https://www.suse.com/security/cve/CVE-2013-1943/" source="CVE"/>
		<reference ref_id="CVE-2013-2147" ref_url="https://www.suse.com/security/cve/CVE-2013-2147/" source="CVE"/>
		<reference ref_id="CVE-2013-2164" ref_url="https://www.suse.com/security/cve/CVE-2013-2164/" source="CVE"/>
		<reference ref_id="CVE-2013-2232" ref_url="https://www.suse.com/security/cve/CVE-2013-2232/" source="CVE"/>
		<reference ref_id="CVE-2013-2237" ref_url="https://www.suse.com/security/cve/CVE-2013-2237/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel has been updated to fix 
bugs and security issues.

The following security issues have been fixed:

    * cciss: info leak in cciss_ioctl32_passthru() (bnc#823260,
      CVE-2013-2147).
    * cpqarray: info leak in ida_locked_ioctl() (bnc#823260,
      CVE-2013-2147).
    * ipv6: ip6_sk_dst_check() must not assume ipv6 dst (bnc#827750,
      CVE-2013-2232).
    * drivers/cdrom/cdrom.c: use kzalloc() for failing hardware
      (bnc#824295, CVE-2013-2164).
    * KVM: Validate userspace_addr of memslot when registered (bnc#828012,
      CVE-2013-1943).
    * KVM: add missing void __user * cast to access_ok() call (bnc#828012,
      CVE-2013-1943).

The following non-security issues have been fixed:

    * lib/radix-tree.c: make radix_tree_node_alloc() work correctly within
      interrupt (bnc#763463).
    * memcg: fix init_section_page_cgroup pfn alignment (bnc#835481).
    * sched/x86: Fix overflow in cyc2ns_offset (bnc#630970, bnc#661605).

Refreshed patches 
patches.fixes/bug769685_sched-harden-rq-rt-usage-accounting.patch and 
patches.fixes/sched-divide-by-zero-workaround-and-diag.diff:

Security Issues:

    * CVE-2013-2237
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2237&gt;
    * CVE-2013-2232
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2232&gt;
    * CVE-2013-2164
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2164&gt;
    * CVE-2013-2147
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2147&gt;
    * CVE-2013-1943
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1943&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-20"/>
	<updated date="2013-09-20"/>
	<bugzilla href="https://bugzilla.suse.com/630970">SUSE bug 630970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/661605">SUSE bug 661605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763463">SUSE bug 763463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823260">SUSE bug 823260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827749">SUSE bug 827749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827750">SUSE bug 827750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828012">SUSE bug 828012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828119">SUSE bug 828119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835481">SUSE bug 835481</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1943/">CVE-2013-1943 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-1943">CVE-2013-1943 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2147/">CVE-2013-2147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2147">CVE-2013-2147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2164/">CVE-2013-2164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2164">CVE-2013-2164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2232/">CVE-2013-2232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2232">CVE-2013-2232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2237/">CVE-2013-2237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2237">CVE-2013-2237 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991612" comment="kernel-default-2.6.32.54-0.31.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991613" comment="kernel-default-base-2.6.32.54-0.31.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991615" comment="kernel-source-2.6.32.54-0.31.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991616" comment="kernel-syms-2.6.32.54-0.31.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991617" comment="kernel-trace-2.6.32.54-0.31.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991618" comment="kernel-trace-base-2.6.32.54-0.31.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991620" comment="kernel-xen-2.6.32.54-0.31.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991621" comment="kernel-xen-base-2.6.32.54-0.31.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217256" version="1" class="patch">
	<metadata>
		<title>Security update for Linux Kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="805226" ref_url="https://bugzilla.suse.com/805226" source="BUGZILLA"/>
		<reference ref_id="835839" ref_url="https://bugzilla.suse.com/835839" source="BUGZILLA"/>
		<reference ref_id="840226" ref_url="https://bugzilla.suse.com/840226" source="BUGZILLA"/>
		<reference ref_id="847652" ref_url="https://bugzilla.suse.com/847652" source="BUGZILLA"/>
		<reference ref_id="848321" ref_url="https://bugzilla.suse.com/848321" source="BUGZILLA"/>
		<reference ref_id="849021" ref_url="https://bugzilla.suse.com/849021" source="BUGZILLA"/>
		<reference ref_id="851095" ref_url="https://bugzilla.suse.com/851095" source="BUGZILLA"/>
		<reference ref_id="851103" ref_url="https://bugzilla.suse.com/851103" source="BUGZILLA"/>
		<reference ref_id="852558" ref_url="https://bugzilla.suse.com/852558" source="BUGZILLA"/>
		<reference ref_id="852559" ref_url="https://bugzilla.suse.com/852559" source="BUGZILLA"/>
		<reference ref_id="853050" ref_url="https://bugzilla.suse.com/853050" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0343" ref_url="https://www.suse.com/security/cve/CVE-2013-0343/" source="CVE"/>
		<reference ref_id="CVE-2013-2888" ref_url="https://www.suse.com/security/cve/CVE-2013-2888/" source="CVE"/>
		<reference ref_id="CVE-2013-2889" ref_url="https://www.suse.com/security/cve/CVE-2013-2889/" source="CVE"/>
		<reference ref_id="CVE-2013-2892" ref_url="https://www.suse.com/security/cve/CVE-2013-2892/" source="CVE"/>
		<reference ref_id="CVE-2013-2893" ref_url="https://www.suse.com/security/cve/CVE-2013-2893/" source="CVE"/>
		<reference ref_id="CVE-2013-2897" ref_url="https://www.suse.com/security/cve/CVE-2013-2897/" source="CVE"/>
		<reference ref_id="CVE-2013-2929" ref_url="https://www.suse.com/security/cve/CVE-2013-2929/" source="CVE"/>
		<reference ref_id="CVE-2013-4345" ref_url="https://www.suse.com/security/cve/CVE-2013-4345/" source="CVE"/>
		<reference ref_id="CVE-2013-4483" ref_url="https://www.suse.com/security/cve/CVE-2013-4483/" source="CVE"/>
		<reference ref_id="CVE-2013-4511" ref_url="https://www.suse.com/security/cve/CVE-2013-4511/" source="CVE"/>
		<reference ref_id="CVE-2013-4587" ref_url="https://www.suse.com/security/cve/CVE-2013-4587/" source="CVE"/>
		<reference ref_id="CVE-2013-4588" ref_url="https://www.suse.com/security/cve/CVE-2013-4588/" source="CVE"/>
		<reference ref_id="CVE-2013-4591" ref_url="https://www.suse.com/security/cve/CVE-2013-4591/" source="CVE"/>
		<reference ref_id="CVE-2013-6378" ref_url="https://www.suse.com/security/cve/CVE-2013-6378/" source="CVE"/>
		<reference ref_id="CVE-2013-6383" ref_url="https://www.suse.com/security/cve/CVE-2013-6383/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to fix bugs 
and security issues.

The following security issues have been fixed:

    * KVM: Improve create VCPU parameter (bnc#853050, CVE-2013-4587).
    * exec/ptrace: fix get_dumpable() incorrect tests (bnc#847652,
      CVE-2013-2929).
    * crypto: ansi_cprng - Fix off by one error in non-block size request
      (bnc#840226, CVE-2013-4345).
    * wireless: radiotap: fix parsing buffer overrun (bnc#851103,
      CVE-2013-4591).
    * ipv6: remove max_addresses check from ipv6_create_tempaddr
      (bnc#805226, CVE-2013-0343).
    * aacraid: missing capable() check in compat ioctl (bnc#852558,
      CVE-2013-6383).
    * libertas: potential oops in debugfs (bnc#852559, CVE-2013-6378).
    * ipvs: Add boundary check on ioctl arguments (bnc#851095,
      CVE-2013-4588).
    * HID: LG: validate HID output report details (CVE-2013-2893,
      bnc#835839).
    * HID: pantherlord: validate output report details (CVE-2013-2892,
      bnc#835839).
    * HID: validate HID report id size (CVE-2013-2888, bnc#835839).
    * HID: validate feature and input report details (CVE-2013-2897,
      bnc#835839).
    * HID: zeroplus: validate output report details (CVE-2013-2889,
      bnc#835839).
    * Fix ipc_rcu_{get,put}ref during destruction (bnc#848321,
      CVE-2013-4483).
    * Fix a few incorrectly checked [io_]remap_pfn_range() calls
      (bnc#849021, CVE-2013-4511).

The following non-security issues have been fixed:

    * HID: check for NULL field when setting values (bnc#835839).
    * HID: provide a helper for validating hid reports (bnc#835839).

Security Issues:

    * CVE-2013-0343
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0343&gt;
    * CVE-2013-2888
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2888&gt;
    * CVE-2013-2889
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2889&gt;
    * CVE-2013-2892
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2892&gt;
    * CVE-2013-2893
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2893&gt;
    * CVE-2013-2897
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2897&gt;
    * CVE-2013-2929
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2929&gt;
    * CVE-2013-4345
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4345&gt;
    * CVE-2013-4483
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4483&gt;
    * CVE-2013-4511
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4511&gt;
    * CVE-2013-4587
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4587&gt;
    * CVE-2013-4588
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4588&gt;
    * CVE-2013-4591
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4591&gt;
    * CVE-2013-6378
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6378&gt;
    * CVE-2013-6383
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6383&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-20"/>
	<updated date="2013-12-20"/>
	<bugzilla href="https://bugzilla.suse.com/805226">SUSE bug 805226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840226">SUSE bug 840226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847652">SUSE bug 847652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848321">SUSE bug 848321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849021">SUSE bug 849021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851095">SUSE bug 851095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851103">SUSE bug 851103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852558">SUSE bug 852558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852559">SUSE bug 852559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853050">SUSE bug 853050</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0343/">CVE-2013-0343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0343">CVE-2013-0343 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2888/">CVE-2013-2888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2888">CVE-2013-2888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2889/">CVE-2013-2889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2889">CVE-2013-2889 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2892/">CVE-2013-2892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2892">CVE-2013-2892 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2893/">CVE-2013-2893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2893">CVE-2013-2893 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2013-2897/">CVE-2013-2897 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2897">CVE-2013-2897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2929/">CVE-2013-2929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2929">CVE-2013-2929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4345/">CVE-2013-4345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4345">CVE-2013-4345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4483/">CVE-2013-4483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4483">CVE-2013-4483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4511/">CVE-2013-4511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4511">CVE-2013-4511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4587/">CVE-2013-4587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4587">CVE-2013-4587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4588/">CVE-2013-4588 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4588">CVE-2013-4588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4591/">CVE-2013-4591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4591">CVE-2013-4591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6378/">CVE-2013-6378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6378">CVE-2013-6378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6383/">CVE-2013-6383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6383">CVE-2013-6383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991623" comment="kernel-default-2.6.32.54-0.33.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991624" comment="kernel-default-base-2.6.32.54-0.33.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991626" comment="kernel-source-2.6.32.54-0.33.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991627" comment="kernel-syms-2.6.32.54-0.33.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991628" comment="kernel-trace-2.6.32.54-0.33.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991629" comment="kernel-trace-base-2.6.32.54-0.33.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991631" comment="kernel-xen-2.6.32.54-0.33.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991632" comment="kernel-xen-base-2.6.32.54-0.33.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217257" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="758813" ref_url="https://bugzilla.suse.com/758813" source="BUGZILLA"/>
		<reference ref_id="769784" ref_url="https://bugzilla.suse.com/769784" source="BUGZILLA"/>
		<reference ref_id="814140" ref_url="https://bugzilla.suse.com/814140" source="BUGZILLA"/>
		<reference ref_id="847672" ref_url="https://bugzilla.suse.com/847672" source="BUGZILLA"/>
		<reference ref_id="852553" ref_url="https://bugzilla.suse.com/852553" source="BUGZILLA"/>
		<reference ref_id="852967" ref_url="https://bugzilla.suse.com/852967" source="BUGZILLA"/>
		<reference ref_id="853051" ref_url="https://bugzilla.suse.com/853051" source="BUGZILLA"/>
		<reference ref_id="853052" ref_url="https://bugzilla.suse.com/853052" source="BUGZILLA"/>
		<reference ref_id="858869" ref_url="https://bugzilla.suse.com/858869" source="BUGZILLA"/>
		<reference ref_id="858870" ref_url="https://bugzilla.suse.com/858870" source="BUGZILLA"/>
		<reference ref_id="858872" ref_url="https://bugzilla.suse.com/858872" source="BUGZILLA"/>
		<reference ref_id="863335" ref_url="https://bugzilla.suse.com/863335" source="BUGZILLA"/>
		<reference ref_id="866102" ref_url="https://bugzilla.suse.com/866102" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2313" ref_url="https://www.suse.com/security/cve/CVE-2012-2313/" source="CVE"/>
		<reference ref_id="CVE-2012-3400" ref_url="https://www.suse.com/security/cve/CVE-2012-3400/" source="CVE"/>
		<reference ref_id="CVE-2013-4470" ref_url="https://www.suse.com/security/cve/CVE-2013-4470/" source="CVE"/>
		<reference ref_id="CVE-2013-6367" ref_url="https://www.suse.com/security/cve/CVE-2013-6367/" source="CVE"/>
		<reference ref_id="CVE-2013-6368" ref_url="https://www.suse.com/security/cve/CVE-2013-6368/" source="CVE"/>
		<reference ref_id="CVE-2013-6382" ref_url="https://www.suse.com/security/cve/CVE-2013-6382/" source="CVE"/>
		<reference ref_id="CVE-2013-6885" ref_url="https://www.suse.com/security/cve/CVE-2013-6885/" source="CVE"/>
		<reference ref_id="CVE-2014-0101" ref_url="https://www.suse.com/security/cve/CVE-2014-0101/" source="CVE"/>
		<reference ref_id="CVE-2014-1444" ref_url="https://www.suse.com/security/cve/CVE-2014-1444/" source="CVE"/>
		<reference ref_id="CVE-2014-1445" ref_url="https://www.suse.com/security/cve/CVE-2014-1445/" source="CVE"/>
		<reference ref_id="CVE-2014-1446" ref_url="https://www.suse.com/security/cve/CVE-2014-1446/" source="CVE"/>
		<reference ref_id="CVE-2014-1874" ref_url="https://www.suse.com/security/cve/CVE-2014-1874/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to fix bugs 
and security issues.

The following security issues have been fixed:

    * net: sctp: fix sctp_sf_do_5_1D_ce to verify if peer is AUTH capable
      (bnc#866102, CVE-2014-0101).
    * x86, cpu, amd: Add workaround for family 16h, erratum 793
      (bnc#852967, CVE-2013-6885).
    * xfs: underflow bug in xfs_attrlist_by_handle() (bnc#852553,
      CVE-2013-6382).
    * SELinux: Fix kernel BUG on empty security contexts (bnc#863335,
      CVE-2014-1874).
    * udf: Avoid run away loop when partition table length is corrupted
      (bnc#769784, CVE-2012-3400).
    * udf: Fortify loading of sparing table (bnc#769784, CVE-2012-3400).
    * udf: Use 'ret' instead of abusing 'i' in udf_load_logicalvol()
      (bnc#769784, CVE-2012-3400).
    * dl2k: Tighten ioctl permissions (bnc#758813, CVE-2012-2313).
    * inet: fix possible memory corruption with UDP_CORK and UFO
      (bnc#847672, CVE-2013-4470).
    * ipv6: udp packets following an UFO enqueued packet need also be
      handled by UFO (bnc#847672, CVE-2013-4470).
    * hamradio/yam: fix info leak in ioctl (bnc#858872, CVE-2014-1446).
    * wanxl: fix info leak in ioctl (bnc#858870, CVE-2014-1445).
    * farsync: fix info leak in ioctl (bnc#858869, CVE-2014-1444).
    * KVM: x86: Convert vapic synchronization to _cached functions
      (bnc#853052, CVE-2013-6368).
    * KVM: x86: Fix potential divide by 0 in lapic (bnc#853051,
      CVE-2013-6367).

The following non-security issues have been fixed:

    * x86, apic: Add boot_cpu_is_bsp() to check if boot cpu is BSP
      (bnc#814140).
    * x86, apic: Disable BSP if boot cpu is AP (bnc#814140).
    * Refreshed patches.xen/xen3-patch-2.6.26

Security Issues:

    * CVE-2014-1874
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1874&gt;
    * CVE-2014-1446
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1446&gt;
    * CVE-2014-1445
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1445&gt;
    * CVE-2014-1444
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1444&gt;
    * CVE-2014-0101
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0101&gt;
    * CVE-2013-6885
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6885&gt;
    * CVE-2013-6382
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6382&gt;
    * CVE-2013-6368
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6368&gt;
    * CVE-2013-6367
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6367&gt;
    * CVE-2013-4470
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4470&gt;
    * CVE-2012-3400
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3400&gt;
    * CVE-2012-2313
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2313&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-04"/>
	<updated date="2014-03-04"/>
	<bugzilla href="https://bugzilla.suse.com/758813">SUSE bug 758813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769784">SUSE bug 769784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814140">SUSE bug 814140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847672">SUSE bug 847672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852553">SUSE bug 852553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852967">SUSE bug 852967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853051">SUSE bug 853051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853052">SUSE bug 853052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858869">SUSE bug 858869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858870">SUSE bug 858870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858872">SUSE bug 858872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863335">SUSE bug 863335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866102">SUSE bug 866102</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2313/">CVE-2012-2313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2313">CVE-2012-2313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3400/">CVE-2012-3400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3400">CVE-2012-3400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4470/">CVE-2013-4470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4470">CVE-2013-4470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6367/">CVE-2013-6367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6367">CVE-2013-6367 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6368/">CVE-2013-6368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6368">CVE-2013-6368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6382/">CVE-2013-6382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6382">CVE-2013-6382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6885/">CVE-2013-6885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6885">CVE-2013-6885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0101/">CVE-2014-0101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0101">CVE-2014-0101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1444/">CVE-2014-1444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1444">CVE-2014-1444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1445/">CVE-2014-1445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1445">CVE-2014-1445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1446/">CVE-2014-1446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1446">CVE-2014-1446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1874/">CVE-2014-1874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1874">CVE-2014-1874 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991634" comment="kernel-default-2.6.32.54-0.35.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991635" comment="kernel-default-base-2.6.32.54-0.35.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991637" comment="kernel-source-2.6.32.54-0.35.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991638" comment="kernel-syms-2.6.32.54-0.35.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991639" comment="kernel-trace-2.6.32.54-0.35.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991640" comment="kernel-trace-base-2.6.32.54-0.35.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991642" comment="kernel-xen-2.6.32.54-0.35.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991643" comment="kernel-xen-base-2.6.32.54-0.35.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217258" version="1" class="patch">
	<metadata>
		<title>Security update for Linux Kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="833968" ref_url="https://bugzilla.suse.com/833968" source="BUGZILLA"/>
		<reference ref_id="849021" ref_url="https://bugzilla.suse.com/849021" source="BUGZILLA"/>
		<reference ref_id="850263" ref_url="https://bugzilla.suse.com/850263" source="BUGZILLA"/>
		<reference ref_id="857643" ref_url="https://bugzilla.suse.com/857643" source="BUGZILLA"/>
		<reference ref_id="867645" ref_url="https://bugzilla.suse.com/867645" source="BUGZILLA"/>
		<reference ref_id="868653" ref_url="https://bugzilla.suse.com/868653" source="BUGZILLA"/>
		<reference ref_id="869563" ref_url="https://bugzilla.suse.com/869563" source="BUGZILLA"/>
		<reference ref_id="871252" ref_url="https://bugzilla.suse.com/871252" source="BUGZILLA"/>
		<reference ref_id="871561" ref_url="https://bugzilla.suse.com/871561" source="BUGZILLA"/>
		<reference ref_id="875690" ref_url="https://bugzilla.suse.com/875690" source="BUGZILLA"/>
		<reference ref_id="875798" ref_url="https://bugzilla.suse.com/875798" source="BUGZILLA"/>
		<reference ref_id="876102" ref_url="https://bugzilla.suse.com/876102" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4511" ref_url="https://www.suse.com/security/cve/CVE-2013-4511/" source="CVE"/>
		<reference ref_id="CVE-2013-6763" ref_url="https://www.suse.com/security/cve/CVE-2013-6763/" source="CVE"/>
		<reference ref_id="CVE-2013-7263" ref_url="https://www.suse.com/security/cve/CVE-2013-7263/" source="CVE"/>
		<reference ref_id="CVE-2013-7264" ref_url="https://www.suse.com/security/cve/CVE-2013-7264/" source="CVE"/>
		<reference ref_id="CVE-2013-7265" ref_url="https://www.suse.com/security/cve/CVE-2013-7265/" source="CVE"/>
		<reference ref_id="CVE-2013-7339" ref_url="https://www.suse.com/security/cve/CVE-2013-7339/" source="CVE"/>
		<reference ref_id="CVE-2014-0196" ref_url="https://www.suse.com/security/cve/CVE-2014-0196/" source="CVE"/>
		<reference ref_id="CVE-2014-1737" ref_url="https://www.suse.com/security/cve/CVE-2014-1737/" source="CVE"/>
		<reference ref_id="CVE-2014-1738" ref_url="https://www.suse.com/security/cve/CVE-2014-1738/" source="CVE"/>
		<reference ref_id="CVE-2014-2523" ref_url="https://www.suse.com/security/cve/CVE-2014-2523/" source="CVE"/>
		<reference ref_id="CVE-2014-2678" ref_url="https://www.suse.com/security/cve/CVE-2014-2678/" source="CVE"/>
		<reference ref_id="CVE-2014-3122" ref_url="https://www.suse.com/security/cve/CVE-2014-3122/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to fix bugs 
and security issues.

The following security issues have been fixed:

    * floppy: don't write kernel-only members to FDRAWCMD ioctl output
      (bnc#875798, CVE-2014-1737, CVE-2014-1738).
    * floppy: ignore kernel-only members in FDRAWCMD ioctl input
      (bnc#875798, CVE-2014-1737, CVE-2014-1738).
    * Update references (bnc#849021, bnc#850263, CVE-2013-4511,
      CVE-2013-6763).
    * mm: try_to_unmap_cluster() should lock_page() before mlocking
      (bnc#876102, CVE-2014-3122).
    * n_tty: Fix n_tty_write crash when echoing in raw mode (bnc#871252,
      bnc#875690, CVE-2014-0196).
    * netfilter: nf_conntrack_dccp: fix skb_header_pointer API usages
      (bnc#868653, CVE-2014-2523).
    * rds: prevent dereference of a NULL device in rds_iw_laddr_check
      (bnc#871561, CVE-2014-2678).
    * rds: prevent dereference of a NULL device (bnc#869563,
      CVE-2013-7339).
    * inet: fix addr_len/msg-&gt;msg_namelen assignment in recv_error and
      rxpmtu functions (bnc#857643, CVE-2013-7263, CVE-2013-7264,
      CVE-2013-7265).
    * inet: prevent leakage of uninitialized memory to user in recv
      syscalls (bnc#857643, CVE-2013-7263, CVE-2013-7264, CVE-2013-7265).

The following non-security issues have been fixed:

    * tms380tr: Use mdelay() in tms380tr_wait() (compile fix).
    * tcp: syncookies: reduce cookie lifetime to 128 seconds (bnc#833968).
    * tcp: syncookies: reduce mss table to four values (bnc#833968).
    * supported.conf: make arch/x86/crypto/fpu supported (bnc#867645)

Security Issues:

    * CVE-2014-3122
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3122&gt;
    * CVE-2014-2678
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2678&gt;
    * CVE-2014-2523
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2523&gt;
    * CVE-2014-1738
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1738&gt;
    * CVE-2014-1737
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1737&gt;
    * CVE-2014-0196
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0196&gt;
    * CVE-2013-7339
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7339&gt;
    * CVE-2013-7265
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7265&gt;
    * CVE-2013-7264
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7264&gt;
    * CVE-2013-7263
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7263&gt;
    * CVE-2013-6763
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6763&gt;
    * CVE-2013-4511
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4511&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-07"/>
	<updated date="2014-05-07"/>
	<bugzilla href="https://bugzilla.suse.com/833968">SUSE bug 833968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849021">SUSE bug 849021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/850263">SUSE bug 850263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857643">SUSE bug 857643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867645">SUSE bug 867645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868653">SUSE bug 868653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869563">SUSE bug 869563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871252">SUSE bug 871252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871561">SUSE bug 871561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875690">SUSE bug 875690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875798">SUSE bug 875798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876102">SUSE bug 876102</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4511/">CVE-2013-4511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4511">CVE-2013-4511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6763/">CVE-2013-6763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6763">CVE-2013-6763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7263/">CVE-2013-7263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7263">CVE-2013-7263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7264/">CVE-2013-7264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7264">CVE-2013-7264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7265/">CVE-2013-7265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7265">CVE-2013-7265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7339/">CVE-2013-7339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7339">CVE-2013-7339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0196/">CVE-2014-0196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0196">CVE-2014-0196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1737/">CVE-2014-1737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1737">CVE-2014-1737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1738/">CVE-2014-1738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1738">CVE-2014-1738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2523/">CVE-2014-2523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2523">CVE-2014-2523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2678/">CVE-2014-2678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2678">CVE-2014-2678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3122/">CVE-2014-3122 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3122">CVE-2014-3122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991645" comment="kernel-default-2.6.32.54-0.37.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991646" comment="kernel-default-base-2.6.32.54-0.37.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991648" comment="kernel-source-2.6.32.54-0.37.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991649" comment="kernel-syms-2.6.32.54-0.37.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991650" comment="kernel-trace-2.6.32.54-0.37.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991651" comment="kernel-trace-base-2.6.32.54-0.37.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991653" comment="kernel-xen-2.6.32.54-0.37.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991654" comment="kernel-xen-base-2.6.32.54-0.37.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217259" version="1" class="patch">
	<metadata>
		<title>Security update for Linux Kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="846404" ref_url="https://bugzilla.suse.com/846404" source="BUGZILLA"/>
		<reference ref_id="854634" ref_url="https://bugzilla.suse.com/854634" source="BUGZILLA"/>
		<reference ref_id="871224" ref_url="https://bugzilla.suse.com/871224" source="BUGZILLA"/>
		<reference ref_id="878289" ref_url="https://bugzilla.suse.com/878289" source="BUGZILLA"/>
		<reference ref_id="880892" ref_url="https://bugzilla.suse.com/880892" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6647" ref_url="https://www.suse.com/security/cve/CVE-2012-6647/" source="CVE"/>
		<reference ref_id="CVE-2013-4299" ref_url="https://www.suse.com/security/cve/CVE-2013-4299/" source="CVE"/>
		<reference ref_id="CVE-2013-7027" ref_url="https://www.suse.com/security/cve/CVE-2013-7027/" source="CVE"/>
		<reference ref_id="CVE-2014-3153" ref_url="https://www.suse.com/security/cve/CVE-2014-3153/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to fix a 
critical privilege escalation security issue and other bugs:

    * CVE-2014-3153: The futex acquisition code in kernel/futex.c can be
      used to gain ring0 access via the futex syscall. This could be used
      for privilege escalation by non-root users. (bnc#880892)
    * CVE-2013-4299: DM snapshot: Fix data corruption. (bnc#846404)
    * CVE-2013-7027: Fix references. (bnc#854634)
    * CVE-2012-6647: Futex: Forbid uaddr == uaddr2 in
      futex_wait_requeue_pi(). (bnc#878289)

Additionally, the 'tcp_westwood' module was marked as supported. 
(bnc#871224)

Security Issues references:

    * CVE-2014-3153
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153&gt;
    * CVE-2013-4299
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4299&gt;
    * CVE-2013-7027
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7027&gt;
    * CVE-2012-6647
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6647&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-04"/>
	<updated date="2014-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/846404">SUSE bug 846404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854634">SUSE bug 854634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871224">SUSE bug 871224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878289">SUSE bug 878289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880892">SUSE bug 880892</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6647/">CVE-2012-6647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6647">CVE-2012-6647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4299/">CVE-2013-4299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4299">CVE-2013-4299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7027/">CVE-2013-7027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7027">CVE-2013-7027 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3153/">CVE-2014-3153 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3153">CVE-2014-3153 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991656" comment="kernel-default-2.6.32.54-0.39.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991657" comment="kernel-default-base-2.6.32.54-0.39.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991659" comment="kernel-source-2.6.32.54-0.39.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991660" comment="kernel-syms-2.6.32.54-0.39.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991661" comment="kernel-trace-2.6.32.54-0.39.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991662" comment="kernel-trace-base-2.6.32.54-0.39.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991664" comment="kernel-xen-2.6.32.54-0.39.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991665" comment="kernel-xen-base-2.6.32.54-0.39.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217260" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="806431" ref_url="https://bugzilla.suse.com/806431" source="BUGZILLA"/>
		<reference ref_id="831058" ref_url="https://bugzilla.suse.com/831058" source="BUGZILLA"/>
		<reference ref_id="871797" ref_url="https://bugzilla.suse.com/871797" source="BUGZILLA"/>
		<reference ref_id="871850" ref_url="https://bugzilla.suse.com/871850" source="BUGZILLA"/>
		<reference ref_id="877257" ref_url="https://bugzilla.suse.com/877257" source="BUGZILLA"/>
		<reference ref_id="880484" ref_url="https://bugzilla.suse.com/880484" source="BUGZILLA"/>
		<reference ref_id="883526" ref_url="https://bugzilla.suse.com/883526" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1860" ref_url="https://www.suse.com/security/cve/CVE-2013-1860/" source="CVE"/>
		<reference ref_id="CVE-2013-4162" ref_url="https://www.suse.com/security/cve/CVE-2013-4162/" source="CVE"/>
		<reference ref_id="CVE-2014-0203" ref_url="https://www.suse.com/security/cve/CVE-2014-0203/" source="CVE"/>
		<reference ref_id="CVE-2014-2706" ref_url="https://www.suse.com/security/cve/CVE-2014-2706/" source="CVE"/>
		<reference ref_id="CVE-2014-3144" ref_url="https://www.suse.com/security/cve/CVE-2014-3144/" source="CVE"/>
		<reference ref_id="CVE-2014-3145" ref_url="https://www.suse.com/security/cve/CVE-2014-3145/" source="CVE"/>
		<reference ref_id="CVE-2014-3917" ref_url="https://www.suse.com/security/cve/CVE-2014-3917/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to fix bugs 
and security issues.

The following security issues have been fixed:

    * auditsc: audit_krule mask accesses need bounds checking (bnc#880484,
      CVE-2014-3917).
    * fix autofs/afs/etc. magic mountpoint breakage (bnc#883526,
      CVE-2014-0203).
    * ipv6: call udp_push_pending_frames when uncorking a socket with
      (bnc#831058, CVE-2013-4162).
    * filter: prevent nla extensions to peek beyond the end of the message
      (bnc#877257, CVE-2014-3144, CVE-2014-3145).
    * cdc-wdm: fix buffer overflow (bnc#806431, CVE-2013-1860).
    * mac80211: fix AP powersave TX vs. wakeup race (bnc#871797,
      CVE-2014-2706).

The following non-security issues have been fixed:

    * megaraid_sas: Update to 00.00.05.38-SL1 (bnc#871850).
    * [SCSI] megaraid: remove a spurious IRQ enable (bnc#871850).
    * megaraid_sas: Increase default cmds per lun to 256 (bnc#871850).
    * megaraid_sas: Clear FUSION_IN_RESET before enabling interrupts
      (bnc#871850).
    * megaraid_sas: Add support for MegaRAID 9360/9380 12GB/s controllers
      (bnc#871850).
    * megaraid_sas: Add multiple MSI-X vector/multiple reply queue support
      (bnc#871850).
    * megaraid_sas: remove poll_mode_io code (bnc#871850).
    * megaraid_sas: Add throttlequeuedepth module parameter (bnc#871850).
    * megaraid_sas: Add resetwaittime module parameter (bnc#871850).
    * megaraid_sas: Add module param for configurable MSI-X vector count
      (bnc#871850).
    * megaraid_sas: Version, Changelog, Copyright update (bnc#871850).
    * megaraid_sas: Version and Changelog update (bnc#871850).
    * Fix common misspellings (bnc#871850).
    * scsi: Push down BKL into ioctl functions (bnc#871850).
    * scsi: autoconvert trivial BKL users to private mutex (bnc#871850).
    * scsi: remove cmd-&gt;serial_number litter (bnc#871850).

Security Issues:

    * CVE-2014-3917
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3917&gt;
    * CVE-2014-3145
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3145&gt;
    * CVE-2014-3144
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3144&gt;
    * CVE-2014-2706
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706&gt;
    * CVE-2014-0203
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0203&gt;
    * CVE-2013-4162
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4162&gt;
    * CVE-2013-1860
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1860&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-01"/>
	<updated date="2014-07-01"/>
	<bugzilla href="https://bugzilla.suse.com/806431">SUSE bug 806431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831058">SUSE bug 831058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871797">SUSE bug 871797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871850">SUSE bug 871850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877257">SUSE bug 877257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880484">SUSE bug 880484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883526">SUSE bug 883526</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1860/">CVE-2013-1860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1860">CVE-2013-1860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4162/">CVE-2013-4162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4162">CVE-2013-4162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0203/">CVE-2014-0203 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0203">CVE-2014-0203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2706/">CVE-2014-2706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2706">CVE-2014-2706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3144/">CVE-2014-3144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3144">CVE-2014-3144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3145/">CVE-2014-3145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3145">CVE-2014-3145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3917/">CVE-2014-3917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3917">CVE-2014-3917 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991667" comment="kernel-default-2.6.32.54-0.41.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991668" comment="kernel-default-base-2.6.32.54-0.41.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991670" comment="kernel-source-2.6.32.54-0.41.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991671" comment="kernel-syms-2.6.32.54-0.41.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991672" comment="kernel-trace-2.6.32.54-0.41.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991673" comment="kernel-trace-base-2.6.32.54-0.41.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991675" comment="kernel-xen-2.6.32.54-0.41.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991676" comment="kernel-xen-base-2.6.32.54-0.41.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217261" version="1" class="patch">
	<metadata>
		<title>Security update for Linux Kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="854722" ref_url="https://bugzilla.suse.com/854722" source="BUGZILLA"/>
		<reference ref_id="883795" ref_url="https://bugzilla.suse.com/883795" source="BUGZILLA"/>
		<reference ref_id="885422" ref_url="https://bugzilla.suse.com/885422" source="BUGZILLA"/>
		<reference ref_id="885725" ref_url="https://bugzilla.suse.com/885725" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6463" ref_url="https://www.suse.com/security/cve/CVE-2013-6463/" source="CVE"/>
		<reference ref_id="CVE-2014-4652" ref_url="https://www.suse.com/security/cve/CVE-2014-4652/" source="CVE"/>
		<reference ref_id="CVE-2014-4653" ref_url="https://www.suse.com/security/cve/CVE-2014-4653/" source="CVE"/>
		<reference ref_id="CVE-2014-4654" ref_url="https://www.suse.com/security/cve/CVE-2014-4654/" source="CVE"/>
		<reference ref_id="CVE-2014-4655" ref_url="https://www.suse.com/security/cve/CVE-2014-4655/" source="CVE"/>
		<reference ref_id="CVE-2014-4656" ref_url="https://www.suse.com/security/cve/CVE-2014-4656/" source="CVE"/>
		<reference ref_id="CVE-2014-4667" ref_url="https://www.suse.com/security/cve/CVE-2014-4667/" source="CVE"/>
		<reference ref_id="CVE-2014-4699" ref_url="https://www.suse.com/security/cve/CVE-2014-4699/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to fix bugs 
and security issues.

The following security issues have been fixed:

    * Fix information leaks in recvmsg handlers (bnc#854722,
      CVE-2013-6463).
    * sctp: Fix sk_ack_backlog wrap-around problem (bnc#885422,
      CVE-2014-4667).
    * ptrace/x86: Force IRET path after a ptrace_stop() (bnc#885725,
      CVE-2014-4699).
    * alsa/control: Protect user controls against concurrent access
      (bnc#883795, CVE-2014-4652).
    * alsa/control: Fix replacing user controls (bnc#883795, CVE-2014-4654,
      CVE-2014-4655).
    * alsa/control: Don't access controls outside of protected regions
      (bnc#883795, CVE-2014-4653).
    * alsa/control: Handle numid overflow (bnc#883795, CVE-2014-4656).
    * alsa/control: Make sure that id-&gt;index does not overflow (bnc#883795,
      CVE-2014-4656).

The following non-security issues have been fixed:

    * Fix kABI breakage due to addition of user_ctl_lock (bnc#883795).

Security Issues:

    * CVE-2014-4699
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4699&gt;
    * CVE-2014-4667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667&gt;
    * CVE-2014-4656
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4656&gt;
    * CVE-2014-4655
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4655&gt;
    * CVE-2014-4654
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4654&gt;
    * CVE-2014-4653
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4653&gt;
    * CVE-2014-4652
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4652&gt;
    * CVE-2013-6463
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6463&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-10"/>
	<updated date="2014-07-10"/>
	<bugzilla href="https://bugzilla.suse.com/854722">SUSE bug 854722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883795">SUSE bug 883795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885422">SUSE bug 885422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885725">SUSE bug 885725</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6463/">CVE-2013-6463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6463">CVE-2013-6463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4652/">CVE-2014-4652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4652">CVE-2014-4652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4653/">CVE-2014-4653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4653">CVE-2014-4653 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4654/">CVE-2014-4654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4654">CVE-2014-4654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4655/">CVE-2014-4655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4655">CVE-2014-4655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4656/">CVE-2014-4656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4656">CVE-2014-4656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4667/">CVE-2014-4667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4667">CVE-2014-4667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4699/">CVE-2014-4699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4699">CVE-2014-4699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991678" comment="kernel-default-2.6.32.54-0.43.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991679" comment="kernel-default-base-2.6.32.54-0.43.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991681" comment="kernel-source-2.6.32.54-0.43.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991682" comment="kernel-syms-2.6.32.54-0.43.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991683" comment="kernel-trace-2.6.32.54-0.43.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991684" comment="kernel-trace-base-2.6.32.54-0.43.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991686" comment="kernel-xen-2.6.32.54-0.43.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991687" comment="kernel-xen-base-2.6.32.54-0.43.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217262" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="880892" ref_url="https://bugzilla.suse.com/880892" source="BUGZILLA"/>
		<reference ref_id="885550" ref_url="https://bugzilla.suse.com/885550" source="BUGZILLA"/>
		<reference ref_id="887082" ref_url="https://bugzilla.suse.com/887082" source="BUGZILLA"/>
		<reference ref_id="889173" ref_url="https://bugzilla.suse.com/889173" source="BUGZILLA"/>
		<reference ref_id="889842" ref_url="https://bugzilla.suse.com/889842" source="BUGZILLA"/>
		<reference ref_id="892235" ref_url="https://bugzilla.suse.com/892235" source="BUGZILLA"/>
		<reference ref_id="892490" ref_url="https://bugzilla.suse.com/892490" source="BUGZILLA"/>
		<reference ref_id="896390" ref_url="https://bugzilla.suse.com/896390" source="BUGZILLA"/>
		<reference ref_id="896391" ref_url="https://bugzilla.suse.com/896391" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3184" ref_url="https://www.suse.com/security/cve/CVE-2014-3184/" source="CVE"/>
		<reference ref_id="CVE-2014-3185" ref_url="https://www.suse.com/security/cve/CVE-2014-3185/" source="CVE"/>
		<reference ref_id="CVE-2014-4943" ref_url="https://www.suse.com/security/cve/CVE-2014-4943/" source="CVE"/>
		<reference ref_id="CVE-2014-5077" ref_url="https://www.suse.com/security/cve/CVE-2014-5077/" source="CVE"/>
		<reference ref_id="CVE-2014-5471" ref_url="https://www.suse.com/security/cve/CVE-2014-5471/" source="CVE"/>
		<reference ref_id="CVE-2014-5472" ref_url="https://www.suse.com/security/cve/CVE-2014-5472/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to fix bugs 
and security issues.

The following security issues have been fixed:

    * usb/whiteheat: Added bounds checking for bulk command response
      (bnc#896391, CVE-2014-3185).
    * hid: fix a couple of off-by-ones (bnc#896390, CVE-2014-3184).
    * isofs: Fix unbounded recursion when processing relocated directories
      (bnc#892490, CVE-2014-5471, CVE-2014-5472).
    * net/l2tp: don't fall back on UDP [get|set]sockopt (bnc#887082,
      CVE-2014-4943).
    * net/sctp: inherit auth_capable on INIT collisions (bnc#889173,
      CVE-2014-5077).

The following non-security issues have been fixed:

    * megaraid_sas: Follow up fix for hangs. (bnc#889842)
    * xfs: Avoid blocking on inode flush in background inode reclaim
      (bnc#892235).
    * bonding: move slave MTU handling from sysfs V2 (bnc#885550).
    * futex: Unlock hb-&gt;lock in futex_wait_requeue_pi() error path
      (bnc#880892).

Security Issues:

    * CVE-2014-5472
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472&gt;
    * CVE-2014-5471
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471&gt;
    * CVE-2014-5077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077&gt;
    * CVE-2014-4943
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943&gt;
    * CVE-2014-3185
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3185&gt;
    * CVE-2014-3184
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3184&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-15"/>
	<updated date="2014-09-15"/>
	<bugzilla href="https://bugzilla.suse.com/880892">SUSE bug 880892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885550">SUSE bug 885550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887082">SUSE bug 887082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889173">SUSE bug 889173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889842">SUSE bug 889842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892235">SUSE bug 892235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892490">SUSE bug 892490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896390">SUSE bug 896390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896391">SUSE bug 896391</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3184/">CVE-2014-3184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3184">CVE-2014-3184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3185/">CVE-2014-3185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3185">CVE-2014-3185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4943/">CVE-2014-4943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4943">CVE-2014-4943 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5077/">CVE-2014-5077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5077">CVE-2014-5077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5471/">CVE-2014-5471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5471">CVE-2014-5471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5472/">CVE-2014-5472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5472">CVE-2014-5472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991689" comment="kernel-default-2.6.32.54-0.45.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991690" comment="kernel-default-base-2.6.32.54-0.45.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991692" comment="kernel-source-2.6.32.54-0.45.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991693" comment="kernel-syms-2.6.32.54-0.45.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991694" comment="kernel-trace-2.6.32.54-0.45.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991695" comment="kernel-trace-base-2.6.32.54-0.45.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991697" comment="kernel-xen-2.6.32.54-0.45.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991698" comment="kernel-xen-base-2.6.32.54-0.45.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217263" version="1" class="patch">
	<metadata>
		<title>Security update for Linux Kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="896689" ref_url="https://bugzilla.suse.com/896689" source="BUGZILLA"/>
		<reference ref_id="896779" ref_url="https://bugzilla.suse.com/896779" source="BUGZILLA"/>
		<reference ref_id="900997" ref_url="https://bugzilla.suse.com/900997" source="BUGZILLA"/>
		<reference ref_id="902346" ref_url="https://bugzilla.suse.com/902346" source="BUGZILLA"/>
		<reference ref_id="902349" ref_url="https://bugzilla.suse.com/902349" source="BUGZILLA"/>
		<reference ref_id="902351" ref_url="https://bugzilla.suse.com/902351" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6657" ref_url="https://www.suse.com/security/cve/CVE-2012-6657/" source="CVE"/>
		<reference ref_id="CVE-2014-3673" ref_url="https://www.suse.com/security/cve/CVE-2014-3673/" source="CVE"/>
		<reference ref_id="CVE-2014-3687" ref_url="https://www.suse.com/security/cve/CVE-2014-3687/" source="CVE"/>
		<reference ref_id="CVE-2014-3688" ref_url="https://www.suse.com/security/cve/CVE-2014-3688/" source="CVE"/>
		<reference ref_id="CVE-2014-6410" ref_url="https://www.suse.com/security/cve/CVE-2014-6410/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel has been updated to fix 
bugs and security issues.

The following security issues have been fixed:

    * net: sctp: fix remote memory pressure from excessive queueing
      (bnc#902351, CVE-2014-3688).
    * net: sctp: fix panic on duplicate ASCONF chunks (bnc#902349,
      CVE-2014-3687).
    * net: sctp: fix skb_over_panic when receiving malformed ASCONF chunks
      (bnc#902346, CVE-2014-3673).
    * net: guard tcp_set_keepalive() to tcp sockets (bnc#896779,
      CVE-2012-6657).
    * udf: Avoid infinite loop when processing indirect ICBs (bnc#896689
      CVE-2014-6410).

The following non-security issue has been fixed:

    * block: Fix computation of merged request priority (bnc#900997).

Security Issues:

    * CVE-2014-6410
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410&gt;
    * CVE-2014-3688
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3688&gt;
    * CVE-2014-3687
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3687&gt;
    * CVE-2014-3673
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3673&gt;
    * CVE-2012-6657
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6657&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-07"/>
	<updated date="2014-11-07"/>
	<bugzilla href="https://bugzilla.suse.com/896689">SUSE bug 896689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896779">SUSE bug 896779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900997">SUSE bug 900997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902346">SUSE bug 902346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902349">SUSE bug 902349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902351">SUSE bug 902351</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6657/">CVE-2012-6657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6657">CVE-2012-6657 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3673/">CVE-2014-3673 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3673">CVE-2014-3673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3687/">CVE-2014-3687 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3687">CVE-2014-3687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3688/">CVE-2014-3688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3688">CVE-2014-3688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6410/">CVE-2014-6410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6410">CVE-2014-6410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991700" comment="kernel-default-2.6.32.54-0.47.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991701" comment="kernel-default-base-2.6.32.54-0.47.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991703" comment="kernel-source-2.6.32.54-0.47.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991704" comment="kernel-syms-2.6.32.54-0.47.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991705" comment="kernel-trace-2.6.32.54-0.47.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991706" comment="kernel-trace-base-2.6.32.54-0.47.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991708" comment="kernel-xen-2.6.32.54-0.47.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991709" comment="kernel-xen-base-2.6.32.54-0.47.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217264" version="1" class="patch">
	<metadata>
		<title>Security update for Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="853040" ref_url="https://bugzilla.suse.com/853040" source="BUGZILLA"/>
		<reference ref_id="875051" ref_url="https://bugzilla.suse.com/875051" source="BUGZILLA"/>
		<reference ref_id="885077" ref_url="https://bugzilla.suse.com/885077" source="BUGZILLA"/>
		<reference ref_id="889654" ref_url="https://bugzilla.suse.com/889654" source="BUGZILLA"/>
		<reference ref_id="891211" ref_url="https://bugzilla.suse.com/891211" source="BUGZILLA"/>
		<reference ref_id="904700" ref_url="https://bugzilla.suse.com/904700" source="BUGZILLA"/>
		<reference ref_id="905100" ref_url="https://bugzilla.suse.com/905100" source="BUGZILLA"/>
		<reference ref_id="905312" ref_url="https://bugzilla.suse.com/905312" source="BUGZILLA"/>
		<reference ref_id="907818" ref_url="https://bugzilla.suse.com/907818" source="BUGZILLA"/>
		<reference ref_id="907822" ref_url="https://bugzilla.suse.com/907822" source="BUGZILLA"/>
		<reference ref_id="909077" ref_url="https://bugzilla.suse.com/909077" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-5313" ref_url="https://www.suse.com/security/cve/CVE-2010-5313/" source="CVE"/>
		<reference ref_id="CVE-2013-6405" ref_url="https://www.suse.com/security/cve/CVE-2013-6405/" source="CVE"/>
		<reference ref_id="CVE-2014-0181" ref_url="https://www.suse.com/security/cve/CVE-2014-0181/" source="CVE"/>
		<reference ref_id="CVE-2014-7841" ref_url="https://www.suse.com/security/cve/CVE-2014-7841/" source="CVE"/>
		<reference ref_id="CVE-2014-7842" ref_url="https://www.suse.com/security/cve/CVE-2014-7842/" source="CVE"/>
		<reference ref_id="CVE-2014-8133" ref_url="https://www.suse.com/security/cve/CVE-2014-8133/" source="CVE"/>
		<reference ref_id="CVE-2014-8134" ref_url="https://www.suse.com/security/cve/CVE-2014-8134/" source="CVE"/>
		<reference ref_id="CVE-2014-8709" ref_url="https://www.suse.com/security/cve/CVE-2014-8709/" source="CVE"/>
		<reference ref_id="CVE-2014-9090" ref_url="https://www.suse.com/security/cve/CVE-2014-9090/" source="CVE"/>
		<reference ref_id="CVE-2014-9322" ref_url="https://www.suse.com/security/cve/CVE-2014-9322/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel has been updated to fix 
bugs and security issues.

The following security issues have been fixed:

    * 

      CVE-2014-9322: A local privilege escalation in the x86_64 32bit
      compatibility signal handling was fixed, which could be used by local
      attackers to crash the machine or execute code.

    * 

      CVE-2014-9090: Various issues in stack register mangling on the
      x86_64 platform were fixed, where local attackers could crash the
      machine.

    * 

      CVE-2014-8133: Insufficient validation of TLS register usage could
      leak information from the kernel stack to userspace.

    * 

      CVE-2014-8134: The espfix funcionality did not work for 32-bit KVM
      paravirt guests, allowing information leaks from kernel to userland.

    * 

      CVE-2010-5313: Race condition in arch/x86/kvm/x86.c in the Linux
      kernel allowed L2 guest OS users to cause a denial of service (L1
      guest OS crash) via a crafted instruction that triggers an L2
      emulation failure report, a similar issue to CVE-2014-7842.

    * 

      CVE-2014-0181: The Netlink implementation in the Linux kernel did not
      provide a mechanism for authorizing socket operations based on the
      opener of a socket, which allowed local users to bypass intended
      access restrictions and modify network configurations by using a
      Netlink socket for the (1) stdout or (2) stderr of a setuid program.

    * 

      CVE-2014-7842: Race condition in arch/x86/kvm/x86.c in the Linux
      kernel allowed guest OS users to cause a denial of service (guest OS
      crash) via a crafted application that performs an MMIO transaction or
      a PIO transaction to trigger a guest userspace emulation error
      report, a similar issue to CVE-2010-5313.

    * 

      CVE-2014-7841: The sctp_process_param function in
      net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux
      kernel, when ASCONF is used, allowed remote attackers to cause a
      denial of service (NULL pointer dereference and system crash) via a
      malformed INIT chunk.

    * 

      CVE-2014-8709: The ieee80211_fragment function in net/mac80211/tx.c
      in the Linux kernel did not properly maintain a certain tail pointer,
      which allowed remote attackers to obtain sensitive cleartext
      information by reading packets.

    * 

      CVE-2013-7263: The Linux kernel updated certain length values before
      ensuring that associated data structures have been initialized, which
      allows local users to obtain sensitive information from kernel stack
      memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call,
      related to net/ipv4/ping.c, net/ipv4/raw.c, net/ipv4/udp.c,
      net/ipv6/raw.c, and net/ipv6/udp.c. This update fixes the leak of the
      port number when using ipv6 sockets.

The following non-security issues have been fixed:

    * block: Fix bogus partition statistics reports (bnc#885077
      bnc#891211).
    * ptrace: Add support for generic PTRACE_GETREGSET/PTRACE_SETREGSET
      (bnc#889654).
    * x86, ptrace: regset extensions to support xstate (bnc#889654).

Note: These changes enable usage of the AVX register set in the ptrace 
interface.

Security Issues:

    * CVE-2010-5313
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5313&gt;
    * CVE-2013-6405
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6405&gt;
    * CVE-2014-0181
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0181&gt;
    * CVE-2014-7841
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7841&gt;
    * CVE-2014-7842
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7842&gt;
    * CVE-2014-8133
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8133&gt;
    * CVE-2014-8134
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8134&gt;
    * CVE-2014-8709
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8709&gt;
    * CVE-2014-9090
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9090&gt;
    * CVE-2014-9322
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9322&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-17"/>
	<updated date="2014-12-17"/>
	<bugzilla href="https://bugzilla.suse.com/853040">SUSE bug 853040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875051">SUSE bug 875051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885077">SUSE bug 885077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889654">SUSE bug 889654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891211">SUSE bug 891211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904700">SUSE bug 904700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905100">SUSE bug 905100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905312">SUSE bug 905312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907818">SUSE bug 907818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907822">SUSE bug 907822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909077">SUSE bug 909077</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5313/">CVE-2010-5313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-5313">CVE-2010-5313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6405/">CVE-2013-6405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6405">CVE-2013-6405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0181/">CVE-2014-0181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0181">CVE-2014-0181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7841/">CVE-2014-7841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7841">CVE-2014-7841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7842/">CVE-2014-7842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7842">CVE-2014-7842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8133/">CVE-2014-8133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8133">CVE-2014-8133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8134/">CVE-2014-8134 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8134">CVE-2014-8134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8709/">CVE-2014-8709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8709">CVE-2014-8709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9090/">CVE-2014-9090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9090">CVE-2014-9090 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9322/">CVE-2014-9322 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9322">CVE-2014-9322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991711" comment="kernel-default-2.6.32.54-0.49.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991712" comment="kernel-default-base-2.6.32.54-0.49.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991714" comment="kernel-source-2.6.32.54-0.49.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991715" comment="kernel-syms-2.6.32.54-0.49.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991716" comment="kernel-trace-2.6.32.54-0.49.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991717" comment="kernel-trace-base-2.6.32.54-0.49.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991719" comment="kernel-xen-2.6.32.54-0.49.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991720" comment="kernel-xen-base-2.6.32.54-0.49.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217265" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="663516" ref_url="https://bugzilla.suse.com/663516" source="BUGZILLA"/>
		<reference ref_id="771619" ref_url="https://bugzilla.suse.com/771619" source="BUGZILLA"/>
		<reference ref_id="821259" ref_url="https://bugzilla.suse.com/821259" source="BUGZILLA"/>
		<reference ref_id="911325" ref_url="https://bugzilla.suse.com/911325" source="BUGZILLA"/>
		<reference ref_id="911876" ref_url="https://bugzilla.suse.com/911876" source="BUGZILLA"/>
		<reference ref_id="912654" ref_url="https://bugzilla.suse.com/912654" source="BUGZILLA"/>
		<reference ref_id="912705" ref_url="https://bugzilla.suse.com/912705" source="BUGZILLA"/>
		<reference ref_id="912978" ref_url="https://bugzilla.suse.com/912978" source="BUGZILLA"/>
		<reference ref_id="915335" ref_url="https://bugzilla.suse.com/915335" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9420" ref_url="https://www.suse.com/security/cve/CVE-2014-9420/" source="CVE"/>
		<reference ref_id="CVE-2014-9584" ref_url="https://www.suse.com/security/cve/CVE-2014-9584/" source="CVE"/>
		<reference ref_id="CVE-2014-9585" ref_url="https://www.suse.com/security/cve/CVE-2014-9585/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to fix bugs 
and security issues.

The following security issues have been fixed:

    * x86_64, vdso: Fix the vdso address randomization algorithm
      (bsc#912705, CVE-2014-9585).
    * isofs: Fix unchecked printing of ER records (bsc#912654,
      CVE-2014-9584).
    * isofs: Fix infinite looping over CE entries (bsc#911325,
      CVE-2014-9420).

The following non-security issues have been fixed:

    * Fix do_add_mount()/umount -l races (bsc#663516, bsc#912978).
    * mm: Do not walk all of system memory during show_mem (bsc#821259,
      bsc#911876).
    * timekeeping: Avoid possible deadlock from clock_was_set_delayed
      (bsc#771619, bsc#915335).

Security Issues:

    * CVE-2014-9585
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9585&gt;
    * CVE-2014-9584
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9584&gt;
    * CVE-2014-9420
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9420&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-30"/>
	<updated date="2015-01-30"/>
	<bugzilla href="https://bugzilla.suse.com/663516">SUSE bug 663516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/771619">SUSE bug 771619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821259">SUSE bug 821259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911325">SUSE bug 911325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911876">SUSE bug 911876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912654">SUSE bug 912654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912705">SUSE bug 912705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912978">SUSE bug 912978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915335">SUSE bug 915335</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9420/">CVE-2014-9420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9420">CVE-2014-9420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9584/">CVE-2014-9584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9584">CVE-2014-9584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9585/">CVE-2014-9585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9585">CVE-2014-9585 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991722" comment="kernel-default-2.6.32.54-0.53.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991723" comment="kernel-default-base-2.6.32.54-0.53.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991725" comment="kernel-source-2.6.32.54-0.53.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991726" comment="kernel-syms-2.6.32.54-0.53.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991727" comment="kernel-trace-2.6.32.54-0.53.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991728" comment="kernel-trace-base-2.6.32.54-0.53.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991730" comment="kernel-xen-2.6.32.54-0.53.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991731" comment="kernel-xen-base-2.6.32.54-0.53.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217266" version="1" class="patch">
	<metadata>
		<title>Security update for Linux Kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="899192" ref_url="https://bugzilla.suse.com/899192" source="BUGZILLA"/>
		<reference ref_id="914742" ref_url="https://bugzilla.suse.com/914742" source="BUGZILLA"/>
		<reference ref_id="926240" ref_url="https://bugzilla.suse.com/926240" source="BUGZILLA"/>
		<reference ref_id="928130" ref_url="https://bugzilla.suse.com/928130" source="BUGZILLA"/>
		<reference ref_id="929533" ref_url="https://bugzilla.suse.com/929533" source="BUGZILLA"/>
		<reference ref_id="929571" ref_url="https://bugzilla.suse.com/929571" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3610" ref_url="https://www.suse.com/security/cve/CVE-2014-3610/" source="CVE"/>
		<reference ref_id="CVE-2014-3646" ref_url="https://www.suse.com/security/cve/CVE-2014-3646/" source="CVE"/>
		<reference ref_id="CVE-2014-3647" ref_url="https://www.suse.com/security/cve/CVE-2014-3647/" source="CVE"/>
		<reference ref_id="CVE-2014-8159" ref_url="https://www.suse.com/security/cve/CVE-2014-8159/" source="CVE"/>
		<reference ref_id="CVE-2015-2830" ref_url="https://www.suse.com/security/cve/CVE-2015-2830/" source="CVE"/>
		<reference ref_id="CVE-2015-3339" ref_url="https://www.suse.com/security/cve/CVE-2015-3339/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel has been updated to fix 
bugs and security issues.

The following security issues have been fixed:

    * fs: Take i_mutex during prepare_binprm for setid executables
      (CVE-2015-3339 bnc#928130).
    * ib/uverbs: Prevent integer overflow in ib_umem_get address arithmetic
      (bsc#914742, CVE-2014-8159).
    * x86: Remove a bogus 'ret_from_fork' optimization (bsc#926240,
      CVE-2015-2830).
    * kvm/vmx: Handle invvpid vm exit gracefully (CVE-2014-3646
      bnc#899192).
    * kvm/vmx: Inject #GP on invalid PAT CR (CVE-2014-3647 bnc#899192).
    * kvm/x86: Check non-canonical addresses upon WRMSR (CVE-2014-3610
      bnc#899192).
    * kvm/x86: Distinguish between stack operation and near branches
      (CVE-2014-3647 bnc#899192).
    * kvm/x86: Emulating descriptor load misses long-mode case
      (CVE-2014-3647 bnc#899192).
    * kvm/x86: Emulator fixes for eip canonical checks on near branches
      (CVE-2014-3647 bnc#899192).
    * kvm/x86 emulator: Make jmp far emulation into a separate function
      (CVE-2014-3647 bnc#899192).
    * kvm/x86 emulator: Provide more callbacks for x86 emulator
      (CVE-2014-3647 bnc#899192).
    * kvm/x86: Fix wrong masking on relative jump/call (CVE-2014-3647
      bnc#899192).
    * kvm/x86: Handle errors when RIP is set during far jumps
      (CVE-2014-3647 bnc#899192).
    * kvm/x86: Improve thread safety in pit (CVE-2014-3647 bnc#899192).
    * kvm/x86: Sysexit emulation does not mask RIP/RSP (CVE-2014-3647
      bnc#899192).
    * kvm/x86: Warn if guest virtual address space is not 48-bits
      (CVE-2014-3647 bnc#899192).

The following non-security issues have been fixed:

    * mm: vmalloc: Check for page allocation failure before vmlist
      insertion (bnc#929533).
    * ntp: Fix leap second hrtimer BUG() (bsc#929571).

Security Issues:

    * CVE-2014-3610
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3610&gt;
    * CVE-2014-3646
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3646&gt;
    * CVE-2014-3647
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3647&gt;
    * CVE-2014-8159
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8159&gt;
    * CVE-2015-2830
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2830&gt;
    * CVE-2015-3339
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3339&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-06"/>
	<updated date="2015-05-06"/>
	<bugzilla href="https://bugzilla.suse.com/899192">SUSE bug 899192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914742">SUSE bug 914742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926240">SUSE bug 926240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928130">SUSE bug 928130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929533">SUSE bug 929533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929571">SUSE bug 929571</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3610/">CVE-2014-3610 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3610">CVE-2014-3610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3646/">CVE-2014-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3646">CVE-2014-3646 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-3647/">CVE-2014-3647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3647">CVE-2014-3647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8159/">CVE-2014-8159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8159">CVE-2014-8159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2830/">CVE-2015-2830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2830">CVE-2015-2830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3339/">CVE-2015-3339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3339">CVE-2015-3339 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991733" comment="kernel-default-2.6.32.54-0.59.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991734" comment="kernel-default-base-2.6.32.54-0.59.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991736" comment="kernel-source-2.6.32.54-0.59.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991737" comment="kernel-syms-2.6.32.54-0.59.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991738" comment="kernel-trace-2.6.32.54-0.59.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991739" comment="kernel-trace-base-2.6.32.54-0.59.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991741" comment="kernel-xen-2.6.32.54-0.59.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991742" comment="kernel-xen-base-2.6.32.54-0.59.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217267" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="940338" ref_url="https://bugzilla.suse.com/940338" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5707" ref_url="https://www.suse.com/security/cve/CVE-2015-5707/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to fix the following security issue.

- g_start_req(): make sure that there's not too many elements in iovec (bsc#940338, CVE-2015-5707)
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-21"/>
	<updated date="2015-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/940338">SUSE bug 940338</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5707/">CVE-2015-5707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5707">CVE-2015-5707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991744" comment="kernel-default-2.6.32.54-0.68.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991745" comment="kernel-default-base-2.6.32.54-0.68.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991747" comment="kernel-source-2.6.32.54-0.68.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991748" comment="kernel-syms-2.6.32.54-0.68.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991749" comment="kernel-trace-2.6.32.54-0.68.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991750" comment="kernel-trace-base-2.6.32.54-0.68.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991752" comment="kernel-xen-2.6.32.54-0.68.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991753" comment="kernel-xen-base-2.6.32.54-0.68.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217268" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="944296" ref_url="https://bugzilla.suse.com/944296" source="BUGZILLA"/>
		<reference ref_id="945825" ref_url="https://bugzilla.suse.com/945825" source="BUGZILLA"/>
		<reference ref_id="948347" ref_url="https://bugzilla.suse.com/948347" source="BUGZILLA"/>
		<reference ref_id="949100" ref_url="https://bugzilla.suse.com/949100" source="BUGZILLA"/>
		<reference ref_id="953527" ref_url="https://bugzilla.suse.com/953527" source="BUGZILLA"/>
		<reference ref_id="954404" ref_url="https://bugzilla.suse.com/954404" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0272" ref_url="https://www.suse.com/security/cve/CVE-2015-0272/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6937" ref_url="https://www.suse.com/security/cve/CVE-2015-6937/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to fix bugs and
security issues.

The following security issues have been fixed:

- ipv6/addrconf: Validate new MTU before applying it (bsc#944296, CVE-2015-0272).
- rds: Verify the underlying transport exists before creating a connection (bsc#945825, CVE-2015-6937).
- kvm/svm: unconditionally intercept #DB (bsc#954404, CVE-2015-8104).
- kvm/x86: work around infinite loop in microcode when #AC is delivered (bsc#953527, CVE-2015-5307).
- kvm/vmx: Report unexpected simultaneous exceptions as internal errors (bsc#953527, bsc#954404).
- kvm/x86: make double/triple fault promotion generic to all exceptions (bsc#953527, bsc#954404).

The following non-security issues have been fixed:

- Add strategy handler needed for pre-2.6.33 kernels.
- ipv6: Fix bad free of addrconf_init_net (bsc#944296).
- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bsc#949100).
- sched: Add enqueue/dequeue flags (bsc#949100).
- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-17"/>
	<updated date="2015-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/944296">SUSE bug 944296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945825">SUSE bug 945825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948347">SUSE bug 948347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949100">SUSE bug 949100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0272/">CVE-2015-0272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0272">CVE-2015-0272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5307">CVE-2015-5307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6937/">CVE-2015-6937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6937">CVE-2015-6937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8104">CVE-2015-8104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991755" comment="kernel-default-2.6.32.54-0.73.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991756" comment="kernel-default-base-2.6.32.54-0.73.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991758" comment="kernel-source-2.6.32.54-0.73.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991759" comment="kernel-syms-2.6.32.54-0.73.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991760" comment="kernel-trace-2.6.32.54-0.73.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991761" comment="kernel-trace-base-2.6.32.54-0.73.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991763" comment="kernel-xen-2.6.32.54-0.73.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991764" comment="kernel-xen-base-2.6.32.54-0.73.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217269" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="778460" ref_url="https://bugzilla.suse.com/778460" source="BUGZILLA"/>
		<reference ref_id="817377" ref_url="https://bugzilla.suse.com/817377" source="BUGZILLA"/>
		<reference ref_id="949744" ref_url="https://bugzilla.suse.com/949744" source="BUGZILLA"/>
		<reference ref_id="955354" ref_url="https://bugzilla.suse.com/955354" source="BUGZILLA"/>
		<reference ref_id="956709" ref_url="https://bugzilla.suse.com/956709" source="BUGZILLA"/>
		<reference ref_id="958886" ref_url="https://bugzilla.suse.com/958886" source="BUGZILLA"/>
		<reference ref_id="959399" ref_url="https://bugzilla.suse.com/959399" source="BUGZILLA"/>
		<reference ref_id="960404" ref_url="https://bugzilla.suse.com/960404" source="BUGZILLA"/>
		<reference ref_id="960637" ref_url="https://bugzilla.suse.com/960637" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3552" ref_url="https://www.suse.com/security/cve/CVE-2012-3552/" source="CVE"/>
		<reference ref_id="CVE-2013-2206" ref_url="https://www.suse.com/security/cve/CVE-2013-2206/" source="CVE"/>
		<reference ref_id="CVE-2015-7509" ref_url="https://www.suse.com/security/cve/CVE-2015-7509/" source="CVE"/>
		<reference ref_id="CVE-2015-8215" ref_url="https://www.suse.com/security/cve/CVE-2015-8215/" source="CVE"/>
		<reference ref_id="CVE-2015-8539" ref_url="https://www.suse.com/security/cve/CVE-2015-8539/" source="CVE"/>
		<reference ref_id="CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543/" source="CVE"/>
		<reference ref_id="CVE-2015-8575" ref_url="https://www.suse.com/security/cve/CVE-2015-8575/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to fix bugs and
security issues.

The following security issues have been fixed:

- keys: Fix handling of stored error in a negatively instantiated user key (bsc#960637, CVE-2015-8539).
- sctp: Use correct sideffect command in duplicate cookie handling (bsc#960404, CVE-2013-2206).
- sctp: Deal with multiple COOKIE_ECHO chunks (bsc#960404, CVE-2013-2206).
- bluetooth: Validate socket address length in sco_sock_bind() (bsc#959399, CVE-2015-8575).
- net: Add validation for the socket syscall protocol argument (bsc#958886, CVE-2015-8543).
- xen/pciback: Don't allow MSI-X ops if PCI_COMMAND_MEMORY is not set (bsc#957990, CVE-2015-8551, CVE-2015-8552, XSA-157).
- xen/pciback: For XEN_PCI_OP_disable_msi[|x] only disable if device has MSI(X) enabled (bsc#957990, CVE-2015-8551, CVE-2015-8552, XSA-157).
- xen/pciback: Return error on XEN_PCI_OP_enable_msix when device has MSI or MSI-X enabled (bsc#957990, CVE-2015-8551, CVE-2015-8552, XSA-157).
- xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled (bsc#957990, CVE-2015-8551, CVE-2015-8552 XSA-157).
- ext4: Make orphan functions be no-op in no-journal mode (bsc#956709, CVE-2015-7509).
- inet: Add RCU protection to inet-&gt;opt (bsc#778460, CVE-2012-3552).

The following non-security issue has been fixed:

- xfs: Fix lost direct IO write in the last block (bsc#949744).

The following missing references have been added to the changelog and patches:

- bsc#817377, bsc#956709, CVE-2015-7509, bsc#955354 and CVE-2015-8215
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-19"/>
	<updated date="2016-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/778460">SUSE bug 778460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817377">SUSE bug 817377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949744">SUSE bug 949744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955354">SUSE bug 955354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956709">SUSE bug 956709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958886">SUSE bug 958886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959399">SUSE bug 959399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960404">SUSE bug 960404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960637">SUSE bug 960637</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3552/">CVE-2012-3552 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-3552">CVE-2012-3552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2206/">CVE-2013-2206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2206">CVE-2013-2206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7509/">CVE-2015-7509 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7509">CVE-2015-7509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8215/">CVE-2015-8215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8215">CVE-2015-8215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8539/">CVE-2015-8539 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8539">CVE-2015-8539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8543">CVE-2015-8543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8575/">CVE-2015-8575 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8575">CVE-2015-8575 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991766" comment="kernel-default-2.6.32.54-0.76.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991767" comment="kernel-default-base-2.6.32.54-0.76.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991769" comment="kernel-source-2.6.32.54-0.76.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991770" comment="kernel-syms-2.6.32.54-0.76.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991771" comment="kernel-trace-2.6.32.54-0.76.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991772" comment="kernel-trace-base-2.6.32.54-0.76.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991774" comment="kernel-xen-2.6.32.54-0.76.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991775" comment="kernel-xen-base-2.6.32.54-0.76.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217270" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="834473" ref_url="https://bugzilla.suse.com/834473" source="BUGZILLA"/>
		<reference ref_id="961509" ref_url="https://bugzilla.suse.com/961509" source="BUGZILLA"/>
		<reference ref_id="961512" ref_url="https://bugzilla.suse.com/961512" source="BUGZILLA"/>
		<reference ref_id="963765" ref_url="https://bugzilla.suse.com/963765" source="BUGZILLA"/>
		<reference ref_id="965006" ref_url="https://bugzilla.suse.com/965006" source="BUGZILLA"/>
		<reference ref_id="965947" ref_url="https://bugzilla.suse.com/965947" source="BUGZILLA"/>
		<reference ref_id="966102" ref_url="https://bugzilla.suse.com/966102" source="BUGZILLA"/>
		<reference ref_id="966437" ref_url="https://bugzilla.suse.com/966437" source="BUGZILLA"/>
		<reference ref_id="966693" ref_url="https://bugzilla.suse.com/966693" source="BUGZILLA"/>
		<reference ref_id="967972" ref_url="https://bugzilla.suse.com/967972" source="BUGZILLA"/>
		<reference ref_id="967973" ref_url="https://bugzilla.suse.com/967973" source="BUGZILLA"/>
		<reference ref_id="967974" ref_url="https://bugzilla.suse.com/967974" source="BUGZILLA"/>
		<reference ref_id="967975" ref_url="https://bugzilla.suse.com/967975" source="BUGZILLA"/>
		<reference ref_id="968010" ref_url="https://bugzilla.suse.com/968010" source="BUGZILLA"/>
		<reference ref_id="968011" ref_url="https://bugzilla.suse.com/968011" source="BUGZILLA"/>
		<reference ref_id="968012" ref_url="https://bugzilla.suse.com/968012" source="BUGZILLA"/>
		<reference ref_id="968013" ref_url="https://bugzilla.suse.com/968013" source="BUGZILLA"/>
		<reference ref_id="968670" ref_url="https://bugzilla.suse.com/968670" source="BUGZILLA"/>
		<reference ref_id="970909" ref_url="https://bugzilla.suse.com/970909" source="BUGZILLA"/>
		<reference ref_id="971125" ref_url="https://bugzilla.suse.com/971125" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7566" ref_url="https://www.suse.com/security/cve/CVE-2015-7566/" source="CVE"/>
		<reference ref_id="CVE-2015-8767" ref_url="https://www.suse.com/security/cve/CVE-2015-8767/" source="CVE"/>
		<reference ref_id="CVE-2015-8785" ref_url="https://www.suse.com/security/cve/CVE-2015-8785/" source="CVE"/>
		<reference ref_id="CVE-2015-8812" ref_url="https://www.suse.com/security/cve/CVE-2015-8812/" source="CVE"/>
		<reference ref_id="CVE-2015-8816" ref_url="https://www.suse.com/security/cve/CVE-2015-8816/" source="CVE"/>
		<reference ref_id="CVE-2016-2184" ref_url="https://www.suse.com/security/cve/CVE-2016-2184/" source="CVE"/>
		<reference ref_id="CVE-2016-2384" ref_url="https://www.suse.com/security/cve/CVE-2016-2384/" source="CVE"/>
		<reference ref_id="CVE-2016-2543" ref_url="https://www.suse.com/security/cve/CVE-2016-2543/" source="CVE"/>
		<reference ref_id="CVE-2016-2544" ref_url="https://www.suse.com/security/cve/CVE-2016-2544/" source="CVE"/>
		<reference ref_id="CVE-2016-2545" ref_url="https://www.suse.com/security/cve/CVE-2016-2545/" source="CVE"/>
		<reference ref_id="CVE-2016-2546" ref_url="https://www.suse.com/security/cve/CVE-2016-2546/" source="CVE"/>
		<reference ref_id="CVE-2016-2547" ref_url="https://www.suse.com/security/cve/CVE-2016-2547/" source="CVE"/>
		<reference ref_id="CVE-2016-2548" ref_url="https://www.suse.com/security/cve/CVE-2016-2548/" source="CVE"/>
		<reference ref_id="CVE-2016-2549" ref_url="https://www.suse.com/security/cve/CVE-2016-2549/" source="CVE"/>
		<reference ref_id="CVE-2016-2782" ref_url="https://www.suse.com/security/cve/CVE-2016-2782/" source="CVE"/>
		<reference ref_id="CVE-2016-3139" ref_url="https://www.suse.com/security/cve/CVE-2016-3139/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to fix bugs and
security issues.

The following security issues have been fixed:

- alsa/hrtimer: Fix stall by hrtimer_cancel() (CVE-2016-2549, bsc#968013).
- alsa/seq: Fix missing NULL check at remove_events ioctl (CVE-2016-2543, bsc#967972).
- alsa/seq: Fix race at timer setup and close (CVE-2016-2544, bsc#967973).
- alsa/timer: Fix double unlink of active_list (CVE-2016-2545, bsc#967974).
- alsa/timer: Fix race among timer ioctls (CVE-2016-2546, bsc#967975).
- alsa/timer: Harden slave timer list handling (CVE-2016-2547, CVE-2016-2548, bsc#968011, bsc#968012).
- alsa/usb-audio: Add sanity checks for endpoint accesses (CVE-2016-2184, bsc#971125).
- alsa/usb-audio: Avoid freeing umidi object twice (CVE-2016-2384, bsc#966693).
- alsa/usb-audio: Fix NULL dereference in create_fixed_stream_quirk() (CVE-2016-2184, bsc#971125).
- dcache: Avoid softlockup in shrink_dcache_for_umount_subtree (bsc#834473, bsc#965947).
- fuse: Break infinite loop in fuse_fill_write_pages() (bsc#963765, CVE-2015-8785).
- iw_cxgb3: Fix incorrectly returning error on success (bsc#966437, CVE-2015-8812).
- sctp: Prevent soft lockup when sctp_accept() is called during a timeout event (CVE-2015-8767, bsc#961509).
- usb: Fix invalid memory access in hub_activate() (bsc#968010, CVE-2015-8816).
- usb/serial/visor: Fix crash on detecting device without write_urbs (bsc#961512, CVE-2015-7566).
- usb/visor: Fix null-deref at probe (bsc#968670, CVE-2016-2782).
- wacom: Fix crash due to missing endpoint (bsc#970909, CVE-2016-3139).

The following non-security issues have been fixed:

- audit: Limit expansion of names_list (bsc#966102).
- hugetlb: Abort a hugepage pool resize if a signal is pending (bsc#965006).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-25"/>
	<updated date="2016-03-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/834473">SUSE bug 834473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961509">SUSE bug 961509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961512">SUSE bug 961512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963765">SUSE bug 963765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965006">SUSE bug 965006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965947">SUSE bug 965947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966102">SUSE bug 966102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966437">SUSE bug 966437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966693">SUSE bug 966693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967972">SUSE bug 967972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967973">SUSE bug 967973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967974">SUSE bug 967974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967975">SUSE bug 967975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968010">SUSE bug 968010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968011">SUSE bug 968011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968012">SUSE bug 968012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968013">SUSE bug 968013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968670">SUSE bug 968670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970909">SUSE bug 970909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971125">SUSE bug 971125</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7566/">CVE-2015-7566 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7566">CVE-2015-7566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8767/">CVE-2015-8767 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8767">CVE-2015-8767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8785/">CVE-2015-8785 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8785">CVE-2015-8785 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8812/">CVE-2015-8812 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8812">CVE-2015-8812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8816/">CVE-2015-8816 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8816">CVE-2015-8816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2184/">CVE-2016-2184 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2184">CVE-2016-2184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2384/">CVE-2016-2384 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2384">CVE-2016-2384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2543/">CVE-2016-2543 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2543">CVE-2016-2543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2544/">CVE-2016-2544 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2544">CVE-2016-2544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2545/">CVE-2016-2545 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2545">CVE-2016-2545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2546/">CVE-2016-2546 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2546">CVE-2016-2546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2547/">CVE-2016-2547 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2547">CVE-2016-2547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2548/">CVE-2016-2548 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2548">CVE-2016-2548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2549/">CVE-2016-2549 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2549">CVE-2016-2549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2782/">CVE-2016-2782 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2782">CVE-2016-2782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3139/">CVE-2016-3139 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3139">CVE-2016-3139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991777" comment="kernel-default-2.6.32.54-0.79.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991778" comment="kernel-default-base-2.6.32.54-0.79.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991780" comment="kernel-source-2.6.32.54-0.79.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991781" comment="kernel-syms-2.6.32.54-0.79.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991782" comment="kernel-trace-2.6.32.54-0.79.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991783" comment="kernel-trace-base-2.6.32.54-0.79.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991785" comment="kernel-xen-2.6.32.54-0.79.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991786" comment="kernel-xen-base-2.6.32.54-0.79.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217271" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="970892" ref_url="https://bugzilla.suse.com/970892" source="BUGZILLA"/>
		<reference ref_id="970911" ref_url="https://bugzilla.suse.com/970911" source="BUGZILLA"/>
		<reference ref_id="970956" ref_url="https://bugzilla.suse.com/970956" source="BUGZILLA"/>
		<reference ref_id="970958" ref_url="https://bugzilla.suse.com/970958" source="BUGZILLA"/>
		<reference ref_id="970970" ref_url="https://bugzilla.suse.com/970970" source="BUGZILLA"/>
		<reference ref_id="971124" ref_url="https://bugzilla.suse.com/971124" source="BUGZILLA"/>
		<reference ref_id="971126" ref_url="https://bugzilla.suse.com/971126" source="BUGZILLA"/>
		<reference ref_id="971944" ref_url="https://bugzilla.suse.com/971944" source="BUGZILLA"/>
		<reference ref_id="975945" ref_url="https://bugzilla.suse.com/975945" source="BUGZILLA"/>
		<reference ref_id="978401" ref_url="https://bugzilla.suse.com/978401" source="BUGZILLA"/>
		<reference ref_id="978822" ref_url="https://bugzilla.suse.com/978822" source="BUGZILLA"/>
		<reference ref_id="979213" ref_url="https://bugzilla.suse.com/979213" source="BUGZILLA"/>
		<reference ref_id="979548" ref_url="https://bugzilla.suse.com/979548" source="BUGZILLA"/>
		<reference ref_id="979879" ref_url="https://bugzilla.suse.com/979879" source="BUGZILLA"/>
		<reference ref_id="980371" ref_url="https://bugzilla.suse.com/980371" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2185" ref_url="https://www.suse.com/security/cve/CVE-2016-2185/" source="CVE"/>
		<reference ref_id="CVE-2016-2186" ref_url="https://www.suse.com/security/cve/CVE-2016-2186/" source="CVE"/>
		<reference ref_id="CVE-2016-2187" ref_url="https://www.suse.com/security/cve/CVE-2016-2187/" source="CVE"/>
		<reference ref_id="CVE-2016-2188" ref_url="https://www.suse.com/security/cve/CVE-2016-2188/" source="CVE"/>
		<reference ref_id="CVE-2016-3134" ref_url="https://www.suse.com/security/cve/CVE-2016-3134/" source="CVE"/>
		<reference ref_id="CVE-2016-3137" ref_url="https://www.suse.com/security/cve/CVE-2016-3137/" source="CVE"/>
		<reference ref_id="CVE-2016-3138" ref_url="https://www.suse.com/security/cve/CVE-2016-3138/" source="CVE"/>
		<reference ref_id="CVE-2016-3140" ref_url="https://www.suse.com/security/cve/CVE-2016-3140/" source="CVE"/>
		<reference ref_id="CVE-2016-4482" ref_url="https://www.suse.com/security/cve/CVE-2016-4482/" source="CVE"/>
		<reference ref_id="CVE-2016-4486" ref_url="https://www.suse.com/security/cve/CVE-2016-4486/" source="CVE"/>
		<reference ref_id="CVE-2016-4565" ref_url="https://www.suse.com/security/cve/CVE-2016-4565/" source="CVE"/>
		<reference ref_id="CVE-2016-4569" ref_url="https://www.suse.com/security/cve/CVE-2016-4569/" source="CVE"/>
		<reference ref_id="CVE-2016-4578" ref_url="https://www.suse.com/security/cve/CVE-2016-4578/" source="CVE"/>
		<reference ref_id="CVE-2016-4805" ref_url="https://www.suse.com/security/cve/CVE-2016-4805/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata Kernel was updated to fix bugs and security issues.

The following security issues have been fixed:

- ppp: Take reference on channels netns (bsc#980371, CVE-2016-4805).
- net: Fix infoleak in rtnetlink (bsc#978822, CVE-2016-4486).
- netfilter: x_tables: Validate e-&gt;target_offset early (bsc#971126, CVE-2016-3134).
- netfilter: x_tables: Make sure e-&gt;next_offset covers remaining blob size (bsc#971126, CVE-2016-3134).
- netfilter: x_tables: Fix unconditional helper (bsc#971126, CVE-2016-3134).
- Input: gtco: Fix crash on detecting device without endpoints (bsc#971944, CVE-2016-2187).
- Input: gtco: Fix usb_dev leak (bsc#971944, CVE-2016-2187).
- IB/security: Restrict use of the write() interface (bsc#979548, CVE-2016-4565).
- ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS (bsc#979213, CVE-2016-4569).
- ALSA: timer: Fix leak in events via snd_timer_user_ccallback (bsc#979213, CVE-2016-4569).
- ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt (bsc#979213, CVE-2016-4569).
- USB: usbfs: Fix potential infoleak in devio (bsc#978401, CVE-2016-4482).
- USB: iowarrior: Fix oops with malicious USB descriptors (bsc#970956, CVE-2016-2188).
- USB: cdc-acm: More sanity checking (bsc#970911, CVE-2016-3138).
- USB: cypress_m8: Add endpoint sanity check (bsc#970970, CVE-2016-3137).
- USB: digi_acceleport: Do sanity checking for the number of ports (bsc#970892, CVE-2016-3140).
- Input: powermate: Fix oops with malicious USB descriptors (bsc#970958, CVE-2016-2186).
- USB: usb_driver_claim_interface: Add sanity checking (bsc#971124, CVE-2016-2185).

The following bugs have been fixed:

- USB: usbip: Fix potential out-of-bounds write (bsc#975945).
- xen: sfc: Drop -Werror (compilation fix).
- Update tags in two patches for CVE-2016-4578 and bsc#979879.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-27"/>
	<updated date="2016-05-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/970892">SUSE bug 970892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970911">SUSE bug 970911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970956">SUSE bug 970956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970958">SUSE bug 970958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970970">SUSE bug 970970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971124">SUSE bug 971124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971126">SUSE bug 971126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971944">SUSE bug 971944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975945">SUSE bug 975945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978401">SUSE bug 978401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978822">SUSE bug 978822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979213">SUSE bug 979213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979548">SUSE bug 979548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979879">SUSE bug 979879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980371">SUSE bug 980371</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2185/">CVE-2016-2185 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2185">CVE-2016-2185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2186/">CVE-2016-2186 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2186">CVE-2016-2186 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2187/">CVE-2016-2187 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2187">CVE-2016-2187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2188/">CVE-2016-2188 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2188">CVE-2016-2188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3134/">CVE-2016-3134 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3134">CVE-2016-3134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3137/">CVE-2016-3137 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3137">CVE-2016-3137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3138/">CVE-2016-3138 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3138">CVE-2016-3138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3140/">CVE-2016-3140 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3140">CVE-2016-3140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4482/">CVE-2016-4482 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4482">CVE-2016-4482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4486/">CVE-2016-4486 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4486">CVE-2016-4486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4565/">CVE-2016-4565 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4565">CVE-2016-4565 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4569/">CVE-2016-4569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4569">CVE-2016-4569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4578/">CVE-2016-4578 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4578">CVE-2016-4578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4805/">CVE-2016-4805 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4805">CVE-2016-4805 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991788" comment="kernel-default-2.6.32.54-0.82.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991789" comment="kernel-default-base-2.6.32.54-0.82.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991791" comment="kernel-source-2.6.32.54-0.82.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991792" comment="kernel-syms-2.6.32.54-0.82.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991793" comment="kernel-trace-2.6.32.54-0.82.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991794" comment="kernel-trace-base-2.6.32.54-0.82.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991796" comment="kernel-xen-2.6.32.54-0.82.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991797" comment="kernel-xen-base-2.6.32.54-0.82.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217272" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="950998" ref_url="https://bugzilla.suse.com/950998" source="BUGZILLA"/>
		<reference ref_id="956708" ref_url="https://bugzilla.suse.com/956708" source="BUGZILLA"/>
		<reference ref_id="980371" ref_url="https://bugzilla.suse.com/980371" source="BUGZILLA"/>
		<reference ref_id="981267" ref_url="https://bugzilla.suse.com/981267" source="BUGZILLA"/>
		<reference ref_id="981431" ref_url="https://bugzilla.suse.com/981431" source="BUGZILLA"/>
		<reference ref_id="983213" ref_url="https://bugzilla.suse.com/983213" source="BUGZILLA"/>
		<reference ref_id="986572" ref_url="https://bugzilla.suse.com/986572" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7515" ref_url="https://www.suse.com/security/cve/CVE-2015-7515/" source="CVE"/>
		<reference ref_id="CVE-2015-7833" ref_url="https://www.suse.com/security/cve/CVE-2015-7833/" source="CVE"/>
		<reference ref_id="CVE-2016-4580" ref_url="https://www.suse.com/security/cve/CVE-2016-4580/" source="CVE"/>
		<reference ref_id="CVE-2016-5244" ref_url="https://www.suse.com/security/cve/CVE-2016-5244/" source="CVE"/>
		<reference ref_id="CVE-2016-5829" ref_url="https://www.suse.com/security/cve/CVE-2016-5829/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to fix bugs and
security issues.

The following security issues have been fixed:

- hid/hiddev: Validate num_values for HIDIOCGUSAGES, HIDIOCSUSAGES commands (bsc#986572, CVE-2016-5829).
- rds: Fix an infoleak in rds_inc_info_copy (bsc#983213, CVE-2016-5244).
- input/aiptek: Fix crash on detecting device without endpoints (bsc#956708, CVE-2015-7515).
- net: Fix a kernel infoleak in x25 module (bsc#981267, CVE-2016-4580).
- usbvision: Fix crash on detecting device with invalid configuration (bsc#950998, CVE-2015-7833).

The following non-security issues have been fixed:

- ppp: Defer netns reference release for ppp channel (bsc#980371).
- hrtimer: Prevent hrtimer_enqueue_reprogram race (bsc#981431).
- hrtimer: Remove HRTIMER_STATE_MIGRATE (bsc#981431).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-15"/>
	<updated date="2016-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/950998">SUSE bug 950998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956708">SUSE bug 956708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980371">SUSE bug 980371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981267">SUSE bug 981267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981431">SUSE bug 981431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983213">SUSE bug 983213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986572">SUSE bug 986572</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7515/">CVE-2015-7515 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7515">CVE-2015-7515 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-7833/">CVE-2015-7833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7833">CVE-2015-7833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4580/">CVE-2016-4580 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4580">CVE-2016-4580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5244/">CVE-2016-5244 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5244">CVE-2016-5244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5829/">CVE-2016-5829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5829">CVE-2016-5829 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991799" comment="kernel-default-2.6.32.54-0.85.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991800" comment="kernel-default-base-2.6.32.54-0.85.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991802" comment="kernel-source-2.6.32.54-0.85.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991803" comment="kernel-syms-2.6.32.54-0.85.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991804" comment="kernel-trace-2.6.32.54-0.85.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991805" comment="kernel-trace-base-2.6.32.54-0.85.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991807" comment="kernel-xen-2.6.32.54-0.85.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991808" comment="kernel-xen-base-2.6.32.54-0.85.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217273" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="827416" ref_url="https://bugzilla.suse.com/827416" source="BUGZILLA"/>
		<reference ref_id="839104" ref_url="https://bugzilla.suse.com/839104" source="BUGZILLA"/>
		<reference ref_id="960689" ref_url="https://bugzilla.suse.com/960689" source="BUGZILLA"/>
		<reference ref_id="991608" ref_url="https://bugzilla.suse.com/991608" source="BUGZILLA"/>
		<reference ref_id="991665" ref_url="https://bugzilla.suse.com/991665" source="BUGZILLA"/>
		<reference ref_id="993890" ref_url="https://bugzilla.suse.com/993890" source="BUGZILLA"/>
		<reference ref_id="994296" ref_url="https://bugzilla.suse.com/994296" source="BUGZILLA"/>
		<reference ref_id="996962" ref_url="https://bugzilla.suse.com/996962" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4312" ref_url="https://www.suse.com/security/cve/CVE-2013-4312/" source="CVE"/>
		<reference ref_id="CVE-2015-7513" ref_url="https://www.suse.com/security/cve/CVE-2015-7513/" source="CVE"/>
		<reference ref_id="CVE-2016-6480" ref_url="https://www.suse.com/security/cve/CVE-2016-6480/" source="CVE"/>
		<reference ref_id="CVE-2016-6828" ref_url="https://www.suse.com/security/cve/CVE-2016-6828/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to fix bugs and
security issues.

The following security issues have been fixed:

- tcp: Fix use after free in tcp_xmit_retransmit_queue() (bsc#994296, CVE-2016-6828).
- aacraid: Check size values after double-fetch from user (bsc#991608, CVE-2016-6480).
- KVM: x86: Reload pit counters for all channels when restoring state (bsc#960689, CVE-2015-7513).
- unix: Properly account for FDs passed over unix sockets(bsc#839104, CVE-2013-4312).

The following non-security issues have been fixed:

- USB: Fix typo in wMaxPacketSize validation (bsc#991665).
- netfilter: Use RCU safe kfree for conntrack extensions (bsc#827416, bsc#996962).
- kaweth: Fix firmware download (bsc#993890).
- kaweth: Fix oops upon failed memory allocation (bsc#993890).
- USB: Validate wMaxPacketValue entries in endpoint descriptors (bsc#991665).
- kabi, unix: properly account for FDs passed over unix sockets (bsc#839104).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-14"/>
	<updated date="2016-09-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/827416">SUSE bug 827416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839104">SUSE bug 839104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960689">SUSE bug 960689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991608">SUSE bug 991608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991665">SUSE bug 991665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993890">SUSE bug 993890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994296">SUSE bug 994296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996962">SUSE bug 996962</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4312/">CVE-2013-4312 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4312">CVE-2013-4312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7513/">CVE-2015-7513 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7513">CVE-2015-7513 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6480/">CVE-2016-6480 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6480">CVE-2016-6480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6828/">CVE-2016-6828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6828">CVE-2016-6828 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991810" comment="kernel-default-2.6.32.54-0.88.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991811" comment="kernel-default-base-2.6.32.54-0.88.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991813" comment="kernel-source-2.6.32.54-0.88.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991814" comment="kernel-syms-2.6.32.54-0.88.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991815" comment="kernel-trace-2.6.32.54-0.88.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991816" comment="kernel-trace-base-2.6.32.54-0.88.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991818" comment="kernel-xen-2.6.32.54-0.88.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991819" comment="kernel-xen-base-2.6.32.54-0.88.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217274" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1003925" ref_url="https://bugzilla.suse.com/1003925" source="BUGZILLA"/>
		<reference ref_id="1004517" ref_url="https://bugzilla.suse.com/1004517" source="BUGZILLA"/>
		<reference ref_id="993891" ref_url="https://bugzilla.suse.com/993891" source="BUGZILLA"/>
		<reference ref_id="994759" ref_url="https://bugzilla.suse.com/994759" source="BUGZILLA"/>
		<reference ref_id="999932" ref_url="https://bugzilla.suse.com/999932" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8956" ref_url="https://www.suse.com/security/cve/CVE-2015-8956/" source="CVE"/>
		<reference ref_id="CVE-2016-0823" ref_url="https://www.suse.com/security/cve/CVE-2016-0823/" source="CVE"/>
		<reference ref_id="CVE-2016-7042" ref_url="https://www.suse.com/security/cve/CVE-2016-7042/" source="CVE"/>
		<reference ref_id="CVE-2016-7425" ref_url="https://www.suse.com/security/cve/CVE-2016-7425/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to fix bugs and
security issues.

The following security issues have been fixed:

- KEYS: Fix short sprintf buffer in /proc/keys show function. (bsc#1004517, CVE-2016-7042)
- Bluetooth: Fix potential NULL dereference in RFCOMM bind callback. (bsc#1003925, CVE-2015-8956)
- Pagemap: Do not leak physical addresses to non-privileged userspace. (bsc#994759, CVE-2016-0823)
- SCSI: arcmsr: Buffer overflow in arcmsr_iop_message_xfer(). (bsc#999932, CVE-2016-7425)

The following non-security issue has been fixed:

- cdc-acm: Added sanity checking for probe(). (bsc#993891)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-18"/>
	<updated date="2016-11-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1003925">SUSE bug 1003925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004517">SUSE bug 1004517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993891">SUSE bug 993891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994759">SUSE bug 994759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999932">SUSE bug 999932</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8956/">CVE-2015-8956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8956">CVE-2015-8956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0823/">CVE-2016-0823 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0823">CVE-2016-0823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7042/">CVE-2016-7042 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7042">CVE-2016-7042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7425/">CVE-2016-7425 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7425">CVE-2016-7425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991821" comment="kernel-default-2.6.32.54-0.94.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991822" comment="kernel-default-base-2.6.32.54-0.94.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991824" comment="kernel-source-2.6.32.54-0.94.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991825" comment="kernel-syms-2.6.32.54-0.94.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991826" comment="kernel-trace-2.6.32.54-0.94.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991827" comment="kernel-trace-base-2.6.32.54-0.94.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991829" comment="kernel-xen-2.6.32.54-0.94.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991830" comment="kernel-xen-base-2.6.32.54-0.94.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217275" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1017710" ref_url="https://bugzilla.suse.com/1017710" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10088" ref_url="https://www.suse.com/security/cve/CVE-2016-10088/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to fix bugs and
security issues.

- sg_write()/bsg_write() is not fit to be called under KERNEL_DS. (CVE-2016-10088 bsc#1017710)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-13"/>
	<updated date="2017-01-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1017710">SUSE bug 1017710</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10088/">CVE-2016-10088 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10088">CVE-2016-10088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991832" comment="kernel-default-2.6.32.54-0.100.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991833" comment="kernel-default-base-2.6.32.54-0.100.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991835" comment="kernel-source-2.6.32.54-0.100.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991836" comment="kernel-syms-2.6.32.54-0.100.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991837" comment="kernel-trace-2.6.32.54-0.100.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991838" comment="kernel-trace-base-2.6.32.54-0.100.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991840" comment="kernel-xen-2.6.32.54-0.100.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991841" comment="kernel-xen-base-2.6.32.54-0.100.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217276" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1025235" ref_url="https://bugzilla.suse.com/1025235" source="BUGZILLA"/>
		<reference ref_id="1026024" ref_url="https://bugzilla.suse.com/1026024" source="BUGZILLA"/>
		<reference ref_id="1026722" ref_url="https://bugzilla.suse.com/1026722" source="BUGZILLA"/>
		<reference ref_id="1027066" ref_url="https://bugzilla.suse.com/1027066" source="BUGZILLA"/>
		<reference ref_id="992566" ref_url="https://bugzilla.suse.com/992566" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3841" ref_url="https://www.suse.com/security/cve/CVE-2016-3841/" source="CVE"/>
		<reference ref_id="CVE-2017-5986" ref_url="https://www.suse.com/security/cve/CVE-2017-5986/" source="CVE"/>
		<reference ref_id="CVE-2017-6074" ref_url="https://www.suse.com/security/cve/CVE-2017-6074/" source="CVE"/>
		<reference ref_id="CVE-2017-6214" ref_url="https://www.suse.com/security/cve/CVE-2017-6214/" source="CVE"/>
		<reference ref_id="CVE-2017-6353" ref_url="https://www.suse.com/security/cve/CVE-2017-6353/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to fix several security issues.

- sctp: Deny peeloff operation on asocs with threads sleeping on it. (bsc#1027066, CVE-2017-6353)
- tcp: Avoid infinite loop in tcp_splice_read(). (bsc#1026722, CVE-2017-6214)
- dccp: Fix freeing skb too early for IPV6_RECVPKTINFO. (bsc#1026024, CVE-2017-6074)
- sctp: Avoid BUG_ON on sctp_wait_for_sndbuf. (bsc#1025235, CVE-2017-5986)
- ipv6: Add complete rcu protection around np-&gt;opt. (bsc#992566, CVE-2016-3841)
- ipv6/sctp: Clone options to avoid use after free. (bsc#992566, CVE-2016-3841)
- ipv6/tcp: Add rcu locking in tcp_v6_send_synack(). (bsc#992566, CVE-2016-3841)
- KABI workaround for ipv6: Add complete rcu protection around np-&gt;opt. (bsc#992566, CVE-2016-3841)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-10"/>
	<updated date="2017-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1025235">SUSE bug 1025235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026024">SUSE bug 1026024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026722">SUSE bug 1026722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027066">SUSE bug 1027066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992566">SUSE bug 992566</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3841/">CVE-2016-3841 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3841">CVE-2016-3841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5986/">CVE-2017-5986 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5986">CVE-2017-5986 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6074/">CVE-2017-6074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6074">CVE-2017-6074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6214/">CVE-2017-6214 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6214">CVE-2017-6214 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6353/">CVE-2017-6353 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6353">CVE-2017-6353 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991843" comment="kernel-default-2.6.32.54-0.103.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991844" comment="kernel-default-base-2.6.32.54-0.103.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991846" comment="kernel-source-2.6.32.54-0.103.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991847" comment="kernel-syms-2.6.32.54-0.103.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991848" comment="kernel-trace-2.6.32.54-0.103.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991849" comment="kernel-trace-base-2.6.32.54-0.103.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991851" comment="kernel-xen-2.6.32.54-0.103.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991852" comment="kernel-xen-base-2.6.32.54-0.103.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217277" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1021256" ref_url="https://bugzilla.suse.com/1021256" source="BUGZILLA"/>
		<reference ref_id="1026914" ref_url="https://bugzilla.suse.com/1026914" source="BUGZILLA"/>
		<reference ref_id="1027178" ref_url="https://bugzilla.suse.com/1027178" source="BUGZILLA"/>
		<reference ref_id="1027565" ref_url="https://bugzilla.suse.com/1027565" source="BUGZILLA"/>
		<reference ref_id="1030213" ref_url="https://bugzilla.suse.com/1030213" source="BUGZILLA"/>
		<reference ref_id="1031579" ref_url="https://bugzilla.suse.com/1031579" source="BUGZILLA"/>
		<reference ref_id="1033336" ref_url="https://bugzilla.suse.com/1033336" source="BUGZILLA"/>
		<reference ref_id="1034670" ref_url="https://bugzilla.suse.com/1034670" source="BUGZILLA"/>
		<reference ref_id="1035719" ref_url="https://bugzilla.suse.com/1035719" source="BUGZILLA"/>
		<reference ref_id="970956" ref_url="https://bugzilla.suse.com/970956" source="BUGZILLA"/>
		<reference ref_id="979021" ref_url="https://bugzilla.suse.com/979021" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-5329" ref_url="https://www.suse.com/security/cve/CVE-2010-5329/" source="CVE"/>
		<reference ref_id="CVE-2015-3288" ref_url="https://www.suse.com/security/cve/CVE-2015-3288/" source="CVE"/>
		<reference ref_id="CVE-2016-2188" ref_url="https://www.suse.com/security/cve/CVE-2016-2188/" source="CVE"/>
		<reference ref_id="CVE-2017-2636" ref_url="https://www.suse.com/security/cve/CVE-2017-2636/" source="CVE"/>
		<reference ref_id="CVE-2017-5669" ref_url="https://www.suse.com/security/cve/CVE-2017-5669/" source="CVE"/>
		<reference ref_id="CVE-2017-6348" ref_url="https://www.suse.com/security/cve/CVE-2017-6348/" source="CVE"/>
		<reference ref_id="CVE-2017-7187" ref_url="https://www.suse.com/security/cve/CVE-2017-7187/" source="CVE"/>
		<reference ref_id="CVE-2017-7308" ref_url="https://www.suse.com/security/cve/CVE-2017-7308/" source="CVE"/>
		<reference ref_id="CVE-2017-7616" ref_url="https://www.suse.com/security/cve/CVE-2017-7616/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to fix bugs and security issues.

The following security issues have been fixed:

- v4l: Share code between video_usercopy and video_ioctl2. (bsc#1035719, CVE-2010-5329)
- net/packet: Fix overflow in check for tp_frame_nr and tp_reserve. (bsc#1031579, CVE-2017-7308)
- mm/mempolicy.c: Fix error handling in set_mempolicy and mbind. (bsc#1033336, CVE-2017-7616)
- usb/iowarrior: Fix NULL-deref at probe. (bsc#970956, CVE-2016-2188)
- scsi/sg: Check length passed to SG_NEXT_CMD_LEN. (bsc#1030213, CVE-2017-7187)
- irda: Fix lockdep annotations in hashbin_delete(). (bsc#1027178, CVE-2017-6348)
- ipc/shm: Fix shmat mmap nil-page protection. (bsc#1026914, CVE-2017-5669)
- mm: Avoid setting up anonymous pages into file mapping. (bsc#979021, CVE-2015-3288)
- tty/n_hdlc: Get rid of racy n_hdlc.tbuf. (bsc#1027565, CVE-2017-2636)
- list: Introduce list_first_entry_or_null. (bsc#1027565, CVE-2017-2636)

The following non-security issues have been fixed:

- firmware: Fix directory creation rule matching with make 3.80 and 3.82. (bsc#1012422)
- nfsd: Check for oversized NFSv2/v3 arguments. (bsc#1034670)
- nfsd4: Minor NFSv2/v3 write decoding cleanup. (bsc#1034670)
- nfsd: Stricter decoding of write-like NFSv2/v3 ops. (bsc#1034670)
- usb/serial/kl5kusb105: Fix line-state error handling. (bsc#1021256)
- Update mainline reference.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-12"/>
	<updated date="2017-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021256">SUSE bug 1021256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026914">SUSE bug 1026914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027178">SUSE bug 1027178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027565">SUSE bug 1027565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030213">SUSE bug 1030213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031579">SUSE bug 1031579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033336">SUSE bug 1033336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034670">SUSE bug 1034670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035719">SUSE bug 1035719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970956">SUSE bug 970956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979021">SUSE bug 979021</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5329/">CVE-2010-5329 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-5329">CVE-2010-5329 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3288/">CVE-2015-3288 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3288">CVE-2015-3288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2188/">CVE-2016-2188 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2188">CVE-2016-2188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2636/">CVE-2017-2636 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2636">CVE-2017-2636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5669/">CVE-2017-5669 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5669">CVE-2017-5669 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6348/">CVE-2017-6348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6348">CVE-2017-6348 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7187/">CVE-2017-7187 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7187">CVE-2017-7187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7308/">CVE-2017-7308 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7308">CVE-2017-7308 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7616/">CVE-2017-7616 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7616">CVE-2017-7616 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991854" comment="kernel-default-2.6.32.54-0.106.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991855" comment="kernel-default-base-2.6.32.54-0.106.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991857" comment="kernel-source-2.6.32.54-0.106.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991858" comment="kernel-syms-2.6.32.54-0.106.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991859" comment="kernel-trace-2.6.32.54-0.106.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991860" comment="kernel-trace-base-2.6.32.54-0.106.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991862" comment="kernel-xen-2.6.32.54-0.106.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991863" comment="kernel-xen-base-2.6.32.54-0.106.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217278" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-source (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1038544" ref_url="https://bugzilla.suse.com/1038544" source="BUGZILLA"/>
		<reference ref_id="1038879" ref_url="https://bugzilla.suse.com/1038879" source="BUGZILLA"/>
		<reference ref_id="1038981" ref_url="https://bugzilla.suse.com/1038981" source="BUGZILLA"/>
		<reference ref_id="1038982" ref_url="https://bugzilla.suse.com/1038982" source="BUGZILLA"/>
		<reference ref_id="1039348" ref_url="https://bugzilla.suse.com/1039348" source="BUGZILLA"/>
		<reference ref_id="1039456" ref_url="https://bugzilla.suse.com/1039456" source="BUGZILLA"/>
		<reference ref_id="1039882" ref_url="https://bugzilla.suse.com/1039882" source="BUGZILLA"/>
		<reference ref_id="1039883" ref_url="https://bugzilla.suse.com/1039883" source="BUGZILLA"/>
		<reference ref_id="1039885" ref_url="https://bugzilla.suse.com/1039885" source="BUGZILLA"/>
		<reference ref_id="1040069" ref_url="https://bugzilla.suse.com/1040069" source="BUGZILLA"/>
		<reference ref_id="1041431" ref_url="https://bugzilla.suse.com/1041431" source="BUGZILLA"/>
		<reference ref_id="1042921" ref_url="https://bugzilla.suse.com/1042921" source="BUGZILLA"/>
		<reference ref_id="1044125" ref_url="https://bugzilla.suse.com/1044125" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000363" ref_url="https://www.suse.com/security/cve/CVE-2017-1000363/" source="CVE"/>
		<reference ref_id="CVE-2017-1000364" ref_url="https://www.suse.com/security/cve/CVE-2017-1000364/" source="CVE"/>
		<reference ref_id="CVE-2017-1000380" ref_url="https://www.suse.com/security/cve/CVE-2017-1000380/" source="CVE"/>
		<reference ref_id="CVE-2017-7487" ref_url="https://www.suse.com/security/cve/CVE-2017-7487/" source="CVE"/>
		<reference ref_id="CVE-2017-8890" ref_url="https://www.suse.com/security/cve/CVE-2017-8890/" source="CVE"/>
		<reference ref_id="CVE-2017-8924" ref_url="https://www.suse.com/security/cve/CVE-2017-8924/" source="CVE"/>
		<reference ref_id="CVE-2017-8925" ref_url="https://www.suse.com/security/cve/CVE-2017-8925/" source="CVE"/>
		<reference ref_id="CVE-2017-9074" ref_url="https://www.suse.com/security/cve/CVE-2017-9074/" source="CVE"/>
		<reference ref_id="CVE-2017-9075" ref_url="https://www.suse.com/security/cve/CVE-2017-9075/" source="CVE"/>
		<reference ref_id="CVE-2017-9076" ref_url="https://www.suse.com/security/cve/CVE-2017-9076/" source="CVE"/>
		<reference ref_id="CVE-2017-9077" ref_url="https://www.suse.com/security/cve/CVE-2017-9077/" source="CVE"/>
		<reference ref_id="CVE-2017-9242" ref_url="https://www.suse.com/security/cve/CVE-2017-9242/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to fix the following security issues:

- alsa/timer: Fix missing queue indices reset at SNDRV_TIMER_IOCTL_SELECT. (bsc#1044125, CVE-2017-1000380)
- alsa/timer: Fix race between read and ioctl. (bsc#1044125, CVE-2017-1000380)
- char/lp: Fix possible integer overflow in lp_setup(). (bsc#1039456, CVE-2017-1000363)
- dccp/tcp: Do not inherit mc_list from parent. (bsc#1038544, CVE-2017-8890)
- ipv6: Check ip6_find_1stfragopt() return value properly. (bsc#1039882, CVE-2017-9074)
- ipv6/dccp: Do not inherit ipv6_mc_list from parent. (bsc#1039885, bsc#1040069, CVE-2017-9076 CVE-2017-9077)
- ipv6: Fix out of bound writes in __ip6_append_data(). (bsc#1041431, CVE-2017-9242)
- ipv6: Prevent overrun when parsing v6 header options. (bsc#1039882, CVE-2017-9074)
- ipx: Call ipxitf_put() in ioctl error path. (bsc#1038879, CVE-2017-7487)
- mm: Enlarge stack guard gap. (bsc#1039348, bsc#1042921, CVE-2017-1000364)
- sctp: Do not inherit ipv6_{mc|ac|fl}_list from parent. (bsc#1039883, CVE-2017-9075)
- usb/serial/io_ti: Fix information leak in completion handler. (bsc#1038982, CVE-2017-8924)
- usb/serial/omninet: Fix reference leaks at open. (bsc#1038981, CVE-2017-8925)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-21"/>
	<updated date="2017-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038879">SUSE bug 1038879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038981">SUSE bug 1038981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038982">SUSE bug 1038982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039456">SUSE bug 1039456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039882">SUSE bug 1039882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039883">SUSE bug 1039883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039885">SUSE bug 1039885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040069">SUSE bug 1040069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041431">SUSE bug 1041431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042921">SUSE bug 1042921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044125">SUSE bug 1044125</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000363/">CVE-2017-1000363 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000363">CVE-2017-1000363 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000364/">CVE-2017-1000364 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000364">CVE-2017-1000364 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000380/">CVE-2017-1000380 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000380">CVE-2017-1000380 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7487/">CVE-2017-7487 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7487">CVE-2017-7487 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8890/">CVE-2017-8890 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8890">CVE-2017-8890 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-8924/">CVE-2017-8924 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8924">CVE-2017-8924 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8925/">CVE-2017-8925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8925">CVE-2017-8925 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9074/">CVE-2017-9074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9074">CVE-2017-9074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9075/">CVE-2017-9075 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9075">CVE-2017-9075 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9076/">CVE-2017-9076 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9076">CVE-2017-9076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9077/">CVE-2017-9077 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9077">CVE-2017-9077 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9242/">CVE-2017-9242 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9242">CVE-2017-9242 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991865" comment="kernel-default-2.6.32.54-0.109.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991866" comment="kernel-default-base-2.6.32.54-0.109.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991868" comment="kernel-source-2.6.32.54-0.109.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991869" comment="kernel-syms-2.6.32.54-0.109.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991870" comment="kernel-trace-2.6.32.54-0.109.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991871" comment="kernel-trace-base-2.6.32.54-0.109.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991873" comment="kernel-xen-2.6.32.54-0.109.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991874" comment="kernel-xen-base-2.6.32.54-0.109.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217279" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1039348" ref_url="https://bugzilla.suse.com/1039348" source="BUGZILLA"/>
		<reference ref_id="1045340" ref_url="https://bugzilla.suse.com/1045340" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000364" ref_url="https://www.suse.com/security/cve/CVE-2017-1000364/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to fix one regression.

A previous security update to address CVE-2017-1000364 caused unintended side-effects in several other tools, most
notably Java. The following patches have been removed to remedied the issue:

- patches.fixes/0001-mm-enlarge-stack-guard-gap.patch
- patches.fixes/0001-mm-enlarge-stack-guard-gap.patch-fix		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-27"/>
	<updated date="2017-06-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045340">SUSE bug 1045340</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000364/">CVE-2017-1000364 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000364">CVE-2017-1000364 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991876" comment="kernel-default-2.6.32.54-0.112.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991877" comment="kernel-default-base-2.6.32.54-0.112.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991879" comment="kernel-source-2.6.32.54-0.112.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991880" comment="kernel-syms-2.6.32.54-0.112.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991881" comment="kernel-trace-2.6.32.54-0.112.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991882" comment="kernel-trace-base-2.6.32.54-0.112.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991884" comment="kernel-xen-2.6.32.54-0.112.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991885" comment="kernel-xen-base-2.6.32.54-0.112.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217280" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1037994" ref_url="https://bugzilla.suse.com/1037994" source="BUGZILLA"/>
		<reference ref_id="1039354" ref_url="https://bugzilla.suse.com/1039354" source="BUGZILLA"/>
		<reference ref_id="1045487" ref_url="https://bugzilla.suse.com/1045487" source="BUGZILLA"/>
		<reference ref_id="1046107" ref_url="https://bugzilla.suse.com/1046107" source="BUGZILLA"/>
		<reference ref_id="1049483" ref_url="https://bugzilla.suse.com/1049483" source="BUGZILLA"/>
		<reference ref_id="1049882" ref_url="https://bugzilla.suse.com/1049882" source="BUGZILLA"/>
		<reference ref_id="1053148" ref_url="https://bugzilla.suse.com/1053148" source="BUGZILLA"/>
		<reference ref_id="1056588" ref_url="https://bugzilla.suse.com/1056588" source="BUGZILLA"/>
		<reference ref_id="1057179" ref_url="https://bugzilla.suse.com/1057179" source="BUGZILLA"/>
		<reference ref_id="1058524" ref_url="https://bugzilla.suse.com/1058524" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000365" ref_url="https://www.suse.com/security/cve/CVE-2017-1000365/" source="CVE"/>
		<reference ref_id="CVE-2017-12762" ref_url="https://www.suse.com/security/cve/CVE-2017-12762/" source="CVE"/>
		<reference ref_id="CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051/" source="CVE"/>
		<reference ref_id="CVE-2017-14140" ref_url="https://www.suse.com/security/cve/CVE-2017-14140/" source="CVE"/>
		<reference ref_id="CVE-2017-14340" ref_url="https://www.suse.com/security/cve/CVE-2017-14340/" source="CVE"/>
		<reference ref_id="CVE-2017-7482" ref_url="https://www.suse.com/security/cve/CVE-2017-7482/" source="CVE"/>
		<reference ref_id="CVE-2017-7533" ref_url="https://www.suse.com/security/cve/CVE-2017-7533/" source="CVE"/>
		<reference ref_id="CVE-2017-7542" ref_url="https://www.suse.com/security/cve/CVE-2017-7542/" source="CVE"/>
		<reference ref_id="CVE-2017-8831" ref_url="https://www.suse.com/security/cve/CVE-2017-8831/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to fix security issues and one bug.

The following security issues have been fixed:

- CVE-2017-14340: xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present. (bsc#1058524)
- CVE-2017-14140: Sanitize 'move_pages()' permission checks. (bsc#1057179)
- CVE-2017-14051: scsi/qla2xxx: Fix an integer overflow in sysfs code. (bsc#1056588)
- CVE-2017-12762: isdn/i4l: Fix an buffer overflow. (bsc#1053148)
- CVE-2017-8831: saa7164: Fix double fetch PCIe access condition. (bsc#1037994)
- CVE-2017-7542: ipv6: Avoid overflow of offset in ip6_find_1stfragopt. (bsc#1049882)
- CVE-2017-7482: rxrpc: Fix several cases where a padded len isn't checked in ticket decode. (bsc#1046107)
- CVE-2017-7533: Fix privilege escalation in inotify. (bsc#1049483)
- CVE-2017-1000365: fs/exec.c: Account for argv/envp pointers. (bsc#1039354)

Additionally, the following non-security issue has been fixed:

- usb/wusbcore: Fix NULL-deref at probe. (bsc#1045487)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-29"/>
	<updated date="2017-09-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037994">SUSE bug 1037994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039354">SUSE bug 1039354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045487">SUSE bug 1045487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046107">SUSE bug 1046107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049483">SUSE bug 1049483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049882">SUSE bug 1049882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053148">SUSE bug 1053148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056588">SUSE bug 1056588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057179">SUSE bug 1057179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058524">SUSE bug 1058524</bugzilla>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000365/">CVE-2017-1000365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000365">CVE-2017-1000365 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12762/">CVE-2017-12762 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12762">CVE-2017-12762 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14051">CVE-2017-14051 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14140/">CVE-2017-14140 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14140">CVE-2017-14140 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14340/">CVE-2017-14340 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14340">CVE-2017-14340 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7482/">CVE-2017-7482 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7482">CVE-2017-7482 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7533/">CVE-2017-7533 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7533">CVE-2017-7533 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7542/">CVE-2017-7542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7542">CVE-2017-7542 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8831/">CVE-2017-8831 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8831">CVE-2017-8831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991887" comment="kernel-default-2.6.32.54-0.116.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991888" comment="kernel-default-base-2.6.32.54-0.116.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991890" comment="kernel-source-2.6.32.54-0.116.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991891" comment="kernel-syms-2.6.32.54-0.116.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991892" comment="kernel-trace-2.6.32.54-0.116.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991893" comment="kernel-trace-base-2.6.32.54-0.116.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991895" comment="kernel-xen-2.6.32.54-0.116.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991896" comment="kernel-xen-base-2.6.32.54-0.116.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217281" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1045327" ref_url="https://bugzilla.suse.com/1045327" source="BUGZILLA"/>
		<reference ref_id="1054302" ref_url="https://bugzilla.suse.com/1054302" source="BUGZILLA"/>
		<reference ref_id="1059525" ref_url="https://bugzilla.suse.com/1059525" source="BUGZILLA"/>
		<reference ref_id="1062471" ref_url="https://bugzilla.suse.com/1062471" source="BUGZILLA"/>
		<reference ref_id="1062520" ref_url="https://bugzilla.suse.com/1062520" source="BUGZILLA"/>
		<reference ref_id="1063667" ref_url="https://bugzilla.suse.com/1063667" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000253" ref_url="https://www.suse.com/security/cve/CVE-2017-1000253/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-15265" ref_url="https://www.suse.com/security/cve/CVE-2017-15265/" source="CVE"/>
		<reference ref_id="CVE-2017-15274" ref_url="https://www.suse.com/security/cve/CVE-2017-15274/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to fix bugs and security issues.

The following security issues have been fixed:

- CVE-2017-13080: mac80211: Accept key reinstall without changing anything. (bsc#1063667)
- CVE-2017-15274: keys: Fix dereferencing NULL payload with nonzero length. (bsc#1045327, bsc#1062471)
- CVE-2017-15265: alsa: Fix use-after-free at creating a port. (bsc#1062520)
- CVE-2017-1000253: fs/binfmt: Fix bug in loading of PIE binaries. (bsc#1059525)

Additionally, the following non-security issue has been fixed:

- fs/binfmt_elf: Return -EINVAL on zero-length mappings. (bsc#1059525)
- coredump: Only SIGKILL should interrupt the coredumping task. (bsc#1054302)
- coredump: Ensure that SIGKILL always kills the dumping thread. (bsc#1054302)
- coredump: Sanitize the setting of signal-&gt;group_exit_code. (bsc#1054302)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-24"/>
	<updated date="2017-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045327">SUSE bug 1045327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054302">SUSE bug 1054302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059525">SUSE bug 1059525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062471">SUSE bug 1062471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062520">SUSE bug 1062520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000253/">CVE-2017-1000253 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000253">CVE-2017-1000253 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15265/">CVE-2017-15265 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15265">CVE-2017-15265 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15274/">CVE-2017-15274 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15274">CVE-2017-15274 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991898" comment="kernel-default-2.6.32.54-0.119.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991899" comment="kernel-default-base-2.6.32.54-0.119.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991901" comment="kernel-source-2.6.32.54-0.119.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991902" comment="kernel-syms-2.6.32.54-0.119.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991903" comment="kernel-trace-2.6.32.54-0.119.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991904" comment="kernel-trace-base-2.6.32.54-0.119.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991906" comment="kernel-xen-2.6.32.54-0.119.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991907" comment="kernel-xen-base-2.6.32.54-0.119.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217282" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1049603" ref_url="https://bugzilla.suse.com/1049603" source="BUGZILLA"/>
		<reference ref_id="1066472" ref_url="https://bugzilla.suse.com/1066472" source="BUGZILLA"/>
		<reference ref_id="1066606" ref_url="https://bugzilla.suse.com/1066606" source="BUGZILLA"/>
		<reference ref_id="1066618" ref_url="https://bugzilla.suse.com/1066618" source="BUGZILLA"/>
		<reference ref_id="1066625" ref_url="https://bugzilla.suse.com/1066625" source="BUGZILLA"/>
		<reference ref_id="1066671" ref_url="https://bugzilla.suse.com/1066671" source="BUGZILLA"/>
		<reference ref_id="1066705" ref_url="https://bugzilla.suse.com/1066705" source="BUGZILLA"/>
		<reference ref_id="1067085" ref_url="https://bugzilla.suse.com/1067085" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11473" ref_url="https://www.suse.com/security/cve/CVE-2017-11473/" source="CVE"/>
		<reference ref_id="CVE-2017-15102" ref_url="https://www.suse.com/security/cve/CVE-2017-15102/" source="CVE"/>
		<reference ref_id="CVE-2017-16525" ref_url="https://www.suse.com/security/cve/CVE-2017-16525/" source="CVE"/>
		<reference ref_id="CVE-2017-16527" ref_url="https://www.suse.com/security/cve/CVE-2017-16527/" source="CVE"/>
		<reference ref_id="CVE-2017-16531" ref_url="https://www.suse.com/security/cve/CVE-2017-16531/" source="CVE"/>
		<reference ref_id="CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536/" source="CVE"/>
		<reference ref_id="CVE-2017-16649" ref_url="https://www.suse.com/security/cve/CVE-2017-16649/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to fix bugs and security issues.

The following security issues have been fixed:

- CVE-2017-16649: input/gtco: Fix potential out-of-bound access. (bsc#1067085)
- CVE-2017-15102: usb/misc/legousbtower: Fix NULL pointer deference. (bsc#1066705)
- CVE-2017-16531: usb: Fix out-of-bounds in usb_set_configuration. (bsc#1066671)
- CVE-2017-16525: usb/serial/console: Fix use-after-free after failed setup. (bsc#1066618)
- CVE-2017-16536: cx231xx-cards: Fix dereferencing NULL on missing association descriptor. (bsc#1066606)
- CVE-2017-16527: alsa/usb-audio: Kill stray URB at exiting. (bsc#1066625)
- CVE-2017-11473: x86/acpi: Prevent out of bound access caused by broken ACPI tables. (bsc#1049603)

Additionally, the following non-security issue has been fixed:

- mac80211: Don't compare TKIP TX MIC key in reinstall prevention. (bsc#1066472)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-24"/>
	<updated date="2017-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1049603">SUSE bug 1049603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066472">SUSE bug 1066472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066606">SUSE bug 1066606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066618">SUSE bug 1066618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066625">SUSE bug 1066625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066671">SUSE bug 1066671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066705">SUSE bug 1066705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067085">SUSE bug 1067085</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11473/">CVE-2017-11473 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11473">CVE-2017-11473 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15102/">CVE-2017-15102 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15102">CVE-2017-15102 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16525/">CVE-2017-16525 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16525">CVE-2017-16525 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16527/">CVE-2017-16527 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16527">CVE-2017-16527 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16531/">CVE-2017-16531 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16531">CVE-2017-16531 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16536">CVE-2017-16536 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16649/">CVE-2017-16649 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16649">CVE-2017-16649 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991909" comment="kernel-default-2.6.32.54-0.122.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991910" comment="kernel-default-base-2.6.32.54-0.122.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991912" comment="kernel-source-2.6.32.54-0.122.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991913" comment="kernel-syms-2.6.32.54-0.122.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991914" comment="kernel-trace-2.6.32.54-0.122.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991915" comment="kernel-trace-base-2.6.32.54-0.122.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991917" comment="kernel-xen-2.6.32.54-0.122.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991918" comment="kernel-xen-base-2.6.32.54-0.122.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217283" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1049603" ref_url="https://bugzilla.suse.com/1049603" source="BUGZILLA"/>
		<reference ref_id="1050231" ref_url="https://bugzilla.suse.com/1050231" source="BUGZILLA"/>
		<reference ref_id="1056982" ref_url="https://bugzilla.suse.com/1056982" source="BUGZILLA"/>
		<reference ref_id="1066693" ref_url="https://bugzilla.suse.com/1066693" source="BUGZILLA"/>
		<reference ref_id="1067085" ref_url="https://bugzilla.suse.com/1067085" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068671" ref_url="https://bugzilla.suse.com/1068671" source="BUGZILLA"/>
		<reference ref_id="1069702" ref_url="https://bugzilla.suse.com/1069702" source="BUGZILLA"/>
		<reference ref_id="1070771" ref_url="https://bugzilla.suse.com/1070771" source="BUGZILLA"/>
		<reference ref_id="1071695" ref_url="https://bugzilla.suse.com/1071695" source="BUGZILLA"/>
		<reference ref_id="1072230" ref_url="https://bugzilla.suse.com/1072230" source="BUGZILLA"/>
		<reference ref_id="1072561" ref_url="https://bugzilla.suse.com/1072561" source="BUGZILLA"/>
		<reference ref_id="1072876" ref_url="https://bugzilla.suse.com/1072876" source="BUGZILLA"/>
		<reference ref_id="1073792" ref_url="https://bugzilla.suse.com/1073792" source="BUGZILLA"/>
		<reference ref_id="1073874" ref_url="https://bugzilla.suse.com/1073874" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1076017" ref_url="https://bugzilla.suse.com/1076017" source="BUGZILLA"/>
		<reference ref_id="1076154" ref_url="https://bugzilla.suse.com/1076154" source="BUGZILLA"/>
		<reference ref_id="912202" ref_url="https://bugzilla.suse.com/912202" source="BUGZILLA"/>
		<reference ref_id="951440" ref_url="https://bugzilla.suse.com/951440" source="BUGZILLA"/>
		<reference ref_id="951638" ref_url="https://bugzilla.suse.com/951638" source="BUGZILLA"/>
		<reference ref_id="958463" ref_url="https://bugzilla.suse.com/958463" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9529" ref_url="https://www.suse.com/security/cve/CVE-2014-9529/" source="CVE"/>
		<reference ref_id="CVE-2015-7872" ref_url="https://www.suse.com/security/cve/CVE-2015-7872/" source="CVE"/>
		<reference ref_id="CVE-2017-11473" ref_url="https://www.suse.com/security/cve/CVE-2017-11473/" source="CVE"/>
		<reference ref_id="CVE-2017-11600" ref_url="https://www.suse.com/security/cve/CVE-2017-11600/" source="CVE"/>
		<reference ref_id="CVE-2017-13167" ref_url="https://www.suse.com/security/cve/CVE-2017-13167/" source="CVE"/>
		<reference ref_id="CVE-2017-14106" ref_url="https://www.suse.com/security/cve/CVE-2017-14106/" source="CVE"/>
		<reference ref_id="CVE-2017-15115" ref_url="https://www.suse.com/security/cve/CVE-2017-15115/" source="CVE"/>
		<reference ref_id="CVE-2017-16534" ref_url="https://www.suse.com/security/cve/CVE-2017-16534/" source="CVE"/>
		<reference ref_id="CVE-2017-16649" ref_url="https://www.suse.com/security/cve/CVE-2017-16649/" source="CVE"/>
		<reference ref_id="CVE-2017-16939" ref_url="https://www.suse.com/security/cve/CVE-2017-16939/" source="CVE"/>
		<reference ref_id="CVE-2017-17450" ref_url="https://www.suse.com/security/cve/CVE-2017-17450/" source="CVE"/>
		<reference ref_id="CVE-2017-17558" ref_url="https://www.suse.com/security/cve/CVE-2017-17558/" source="CVE"/>
		<reference ref_id="CVE-2017-17805" ref_url="https://www.suse.com/security/cve/CVE-2017-17805/" source="CVE"/>
		<reference ref_id="CVE-2017-17806" ref_url="https://www.suse.com/security/cve/CVE-2017-17806/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2017-8824" ref_url="https://www.suse.com/security/cve/CVE-2017-8824/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to receive various security and bugfixes.

This update adds mitigations for various side channel attacks against
modern CPUs that could disclose content of otherwise unreadable memory
(bsc#1068032).

- CVE-2017-5753: Local attackers on systems with modern CPUs featuring
  deep instruction pipelining could use attacker controllable speculative
  execution over code patterns in the Linux Kernel to leak content from
  otherwise not readable memory in the same address space, allowing
  retrieval of passwords, cryptographic keys and other secrets.

  This problem is mitigated by adding speculative fencing on affected
  code paths throughout the Linux kernel.

- CVE-2017-5715: Local attackers on systems with modern CPUs featuring
  branch prediction could use mispredicted branches to speculatively execute
  code patterns that in turn could be made to leak other non-readable
  content in the same address space, an attack similar to CVE-2017-5753.

  This problem is mitigated by disabling predictive branches, depending
  on CPU architecture either by firmware updates and/or fixes in the
  user-kernel privilege boundaries.

  Please also check with your CPU / Hardware vendor on updated CPU
  microcode or BIOS packages regarding this issue.

  As this feature can have a performance impact, it can be disabled using
  the 'nospec' kernel commandline option.

- CVE-2017-5754: Local attackers on systems with modern CPUs featuring
  deep instruction pipelining could use code patterns in userspace to
  speculative executive code that would read otherwise read protected
  memory, an attack similar to CVE-2017-5753.

  This problem is mitigated by unmapping the Linux Kernel from the user
  address space during user code execution, following a approach called
  'KAISER'. The terms used here are 'KAISER' / 'Kernel Address Isolation'
  and 'PTI' / 'Page Table Isolation'.

  This feature can be enabled / disabled by the 'pti=[on|off|auto]' or
  'nopti' commandline options.


The fix for bsc#1049603, CVE-201711473 has been reverted, after there is no evidence that it affects Kernel 2.6.32
and the fix causes a regression.

The following security bugs were fixed:

- CVE-2017-17806: The HMAC implementation (crypto/hmac.c) in the Linux kernel did not validate that the underlying
  cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface
  (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer
  overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization (bsc#1073874).
- CVE-2017-17805: The Salsa20 encryption algorithm in the Linux kernel did not correctly handle zero-length inputs,
  allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause
  a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a
  crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation
  (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable
  (bsc#1073792).
- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel allowed local users to cause
  a denial of service (OOPS) via crafted keyctl commands (bsc#951440 951638 958463).
- CVE-2014-9529: Race condition in the key_gc_unused_keys function in security/keys/gc.c in the Linux kernel allowed
  local users to cause a denial of service (memory corruption or panic) or possibly have unspecified other impact via
  keyctl commands that trigger access to a key structure member during garbage collection of a key (bsc#912202).
- CVE-2017-13167: An elevation of privilege vulnerability in the kernel sound timer. (bsc#1072876).
- CVE-2017-17558: The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the
  Linux kernel did not consider the maximum number of configurations and interfaces before attempting to release
  resources, which allowed local users to cause a denial of service (out-of-bounds write access) or possibly have
  unspecified other impact via a crafted USB device (bsc#1072561).
- CVE-2017-17450: net/netfilter/xt_osf.c in the Linux kernel did not require the CAP_NET_ADMIN capability for
  add_callback and remove_callback operations, which allowed local users to bypass intended access restrictions because
  the xt_osf_fingers data structure is shared across all net namespaces (bsc#1071695).
- CVE-2017-8824: The dccp_disconnect function in net/dccp/proto.c in the Linux kernel allowed local users to gain
  privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN
  state (bsc#1070771).
- CVE-2017-16939: The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel allowed local users
  to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in
  conjunction with XFRM_MSG_GETPOLICY Netlink messages (bsc#1069702).
- CVE-2017-15115: The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel did not check whether the
  intended netns is used in a peel-off action, which allowed local users to cause a denial of service (use-after-free
  and system crash) or possibly have unspecified other impact via crafted system calls (bsc#1068671).
- CVE-2017-14106: The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel allowed local users to cause a
  denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a
  certain tcp_recvmsg code path (bsc#1056982).
- CVE-2017-11600: net/xfrm/xfrm_policy.c in the Linux kernel did not ensure that the dir value of xfrm_userpolicy_id is
  XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly
  have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bsc#1050231).
- CVE-2017-16534: The cdc_parse_cdc_header function in drivers/usb/core/message.c in the Linux kernel allowed local
  users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via
  a crafted USB device (bsc#1066693).
- CVE-2018-1000004: alsa/seq: Make ioctls race-free (bsc#1076017).

The following non-security bugs were fixed:

- x86/cpu: Factor out application of forced CPU caps (bsc#1075994, bsc#1075091).
- x86/cpu: Sync CPU feature flags late (bsc#1075994, bsc#1075091).
- x86/microcode: Rescan feature flags upon late loading (bsc#1075994, bsc#1075091).
- x86/spectre_v2: Fix ordering in IBRS initialization (bsc#1075994, bsc#1075091).
- x86/spec_ctrl: handle late setting of X86_FEATURE_SPEC_CTRL properly (bsc#1075994, bsc#1075091).
- x86/paravirt: Dont patch flush_tlb_single (bsc#1012382, bsc#1076154).
- x86: increase robusteness of bad_iret fixup handler.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049603">SUSE bug 1049603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050231">SUSE bug 1050231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056982">SUSE bug 1056982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066693">SUSE bug 1066693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067085">SUSE bug 1067085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068671">SUSE bug 1068671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069702">SUSE bug 1069702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070771">SUSE bug 1070771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071695">SUSE bug 1071695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072230">SUSE bug 1072230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072561">SUSE bug 1072561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072876">SUSE bug 1072876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073792">SUSE bug 1073792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073874">SUSE bug 1073874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076154">SUSE bug 1076154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912202">SUSE bug 912202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951440">SUSE bug 951440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951638">SUSE bug 951638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958463">SUSE bug 958463</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9529/">CVE-2014-9529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9529">CVE-2014-9529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7872/">CVE-2015-7872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7872">CVE-2015-7872 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11473/">CVE-2017-11473 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11473">CVE-2017-11473 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11600/">CVE-2017-11600 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11600">CVE-2017-11600 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13167/">CVE-2017-13167 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13167">CVE-2017-13167 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14106/">CVE-2017-14106 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14106">CVE-2017-14106 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15115/">CVE-2017-15115 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15115">CVE-2017-15115 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16534/">CVE-2017-16534 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16534">CVE-2017-16534 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16649/">CVE-2017-16649 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16649">CVE-2017-16649 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16939/">CVE-2017-16939 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16939">CVE-2017-16939 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17450/">CVE-2017-17450 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17450">CVE-2017-17450 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17558/">CVE-2017-17558 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17558">CVE-2017-17558 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17805/">CVE-2017-17805 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17805">CVE-2017-17805 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17806/">CVE-2017-17806 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17806">CVE-2017-17806 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5754">CVE-2017-5754 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8824/">CVE-2017-8824 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8824">CVE-2017-8824 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000004">CVE-2018-1000004 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991920" comment="kernel-default-2.6.32.54-0.130.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991921" comment="kernel-default-base-2.6.32.54-0.130.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991923" comment="kernel-source-2.6.32.54-0.130.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991924" comment="kernel-syms-2.6.32.54-0.130.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991925" comment="kernel-trace-2.6.32.54-0.130.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991926" comment="kernel-trace-base-2.6.32.54-0.130.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991928" comment="kernel-xen-2.6.32.54-0.130.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991929" comment="kernel-xen-base-2.6.32.54-0.130.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991931" comment="xen-4.0.3_21548_18-53.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991932" comment="xen-doc-html-4.0.3_21548_18-53.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991933" comment="xen-doc-pdf-4.0.3_21548_18-53.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991934" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.130.TDC-53.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991935" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.130.TDC-53.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991936" comment="xen-libs-4.0.3_21548_18-53.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991937" comment="xen-tools-4.0.3_21548_18-53.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991938" comment="xen-tools-domU-4.0.3_21548_18-53.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217284" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1010470" ref_url="https://bugzilla.suse.com/1010470" source="BUGZILLA"/>
		<reference ref_id="1062568" ref_url="https://bugzilla.suse.com/1062568" source="BUGZILLA"/>
		<reference ref_id="1062840" ref_url="https://bugzilla.suse.com/1062840" source="BUGZILLA"/>
		<reference ref_id="1067118" ref_url="https://bugzilla.suse.com/1067118" source="BUGZILLA"/>
		<reference ref_id="1074488" ref_url="https://bugzilla.suse.com/1074488" source="BUGZILLA"/>
		<reference ref_id="1075621" ref_url="https://bugzilla.suse.com/1075621" source="BUGZILLA"/>
		<reference ref_id="1075867" ref_url="https://bugzilla.suse.com/1075867" source="BUGZILLA"/>
		<reference ref_id="1077922" ref_url="https://bugzilla.suse.com/1077922" source="BUGZILLA"/>
		<reference ref_id="1078669" ref_url="https://bugzilla.suse.com/1078669" source="BUGZILLA"/>
		<reference ref_id="1078672" ref_url="https://bugzilla.suse.com/1078672" source="BUGZILLA"/>
		<reference ref_id="1078673" ref_url="https://bugzilla.suse.com/1078673" source="BUGZILLA"/>
		<reference ref_id="1078674" ref_url="https://bugzilla.suse.com/1078674" source="BUGZILLA"/>
		<reference ref_id="1080757" ref_url="https://bugzilla.suse.com/1080757" source="BUGZILLA"/>
		<reference ref_id="1083242" ref_url="https://bugzilla.suse.com/1083242" source="BUGZILLA"/>
		<reference ref_id="1083483" ref_url="https://bugzilla.suse.com/1083483" source="BUGZILLA"/>
		<reference ref_id="1083494" ref_url="https://bugzilla.suse.com/1083494" source="BUGZILLA"/>
		<reference ref_id="1086162" ref_url="https://bugzilla.suse.com/1086162" source="BUGZILLA"/>
		<reference ref_id="940776" ref_url="https://bugzilla.suse.com/940776" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5156" ref_url="https://www.suse.com/security/cve/CVE-2015-5156/" source="CVE"/>
		<reference ref_id="CVE-2016-7915" ref_url="https://www.suse.com/security/cve/CVE-2016-7915/" source="CVE"/>
		<reference ref_id="CVE-2017-12190" ref_url="https://www.suse.com/security/cve/CVE-2017-12190/" source="CVE"/>
		<reference ref_id="CVE-2017-12192" ref_url="https://www.suse.com/security/cve/CVE-2017-12192/" source="CVE"/>
		<reference ref_id="CVE-2017-16644" ref_url="https://www.suse.com/security/cve/CVE-2017-16644/" source="CVE"/>
		<reference ref_id="CVE-2017-16911" ref_url="https://www.suse.com/security/cve/CVE-2017-16911/" source="CVE"/>
		<reference ref_id="CVE-2017-16912" ref_url="https://www.suse.com/security/cve/CVE-2017-16912/" source="CVE"/>
		<reference ref_id="CVE-2017-16913" ref_url="https://www.suse.com/security/cve/CVE-2017-16913/" source="CVE"/>
		<reference ref_id="CVE-2017-16914" ref_url="https://www.suse.com/security/cve/CVE-2017-16914/" source="CVE"/>
		<reference ref_id="CVE-2017-18017" ref_url="https://www.suse.com/security/cve/CVE-2017-18017/" source="CVE"/>
		<reference ref_id="CVE-2017-18079" ref_url="https://www.suse.com/security/cve/CVE-2017-18079/" source="CVE"/>
		<reference ref_id="CVE-2017-18203" ref_url="https://www.suse.com/security/cve/CVE-2017-18203/" source="CVE"/>
		<reference ref_id="CVE-2017-18208" ref_url="https://www.suse.com/security/cve/CVE-2017-18208/" source="CVE"/>
		<reference ref_id="CVE-2018-5332" ref_url="https://www.suse.com/security/cve/CVE-2018-5332/" source="CVE"/>
		<reference ref_id="CVE-2018-6927" ref_url="https://www.suse.com/security/cve/CVE-2018-6927/" source="CVE"/>
		<reference ref_id="CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566/" source="CVE"/>
		<reference ref_id="CVE-2018-8822" ref_url="https://www.suse.com/security/cve/CVE-2018-8822/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to receive various security and bugfixes.

The following security issues have been fixed:

- CVE-2017-18203: The dm_get_from_kobject function in drivers/md/dm.c in the Linux kernel
  allowed local users to cause a denial of service by leveraging a race condition with 
  __dm_destroy during creation and removal of DM devices. (bsc#1083242)
- CVE-2017-18203: Fix a race between dm_get_from_kobject() and __dm_destroy(). (bsc#1083242)
- CVE-2017-18208: The madvise_willneed function in mm/madvise.c allowed local users to cause
  a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping
  (bsc#1083494).
- CVE-2018-7566: The ALSA sequencer core initializes the event pool on demand
  by invoking snd_seq_pool_init() when the first write happens and the pool is
  empty. A user could have reset the pool size manually via ioctl concurrently,
  which may have lead UAF or out-of-bound access (bsc#1083483).
- CVE-2017-16644: The hdpvr_probe function allowed local users to cause a
  denial of service (improper error handling and system crash) or possibly have
  unspecified other impact via a crafted USB device (bsc#1067118).
- CVE-2017-16914: The 'stub_send_ret_submit()' function allowed attackers to
  cause a denial of service (NULL pointer dereference) via a specially crafted
  USB over IP packet (bsc#1078669).
- CVE-2018-6927: The futex_requeue function allowed attackers to cause a denial
  of service (integer overflow) or possibly have unspecified other impact by
  triggering a negative wake or requeue value (bsc#1080757).
- CVE-2017-16911: The vhci_hcd driver allowed local attackers to disclose
  kernel memory addresses. Successful exploitation required that a USB device was
  attached over IP (bnc#1078674).
- CVE-2016-7915: The hid_input_field function allowed physically proximate
  attackers to obtain sensitive information from kernel memory or cause a denial
  of service (out-of-bounds read) by connecting a device (bnc#1010470).
- CVE-2015-5156: The virtnet_probe function in drivers/net/virtio_net.c in
  the Linux kernel attempted to support a FRAGLIST feature without proper
  memory allocation, which allowed guest OS users to cause a denial of
  service (buffer overflow and memory corruption) via a crafted sequence
  of fragmented packets (bsc#940776).
- CVE-2017-12192: keys: Prevent KEYCTL_READ on negative key. (bsc#1062840)
- CVE-2017-12190: The bio_map_user_iov and bio_unmap_user functions did
  unbalanced refcounting when a SCSI I/O vector had small consecutive buffers
  belonging to the same page. The bio_add_pc_page function merged them into one,
  but the page reference was never dropped. This caused a memory leak and
  possible system lockup (exploitable against the host OS by a guest OS user, if
  a SCSI disk is passed through to a virtual machine) due to an out-of-memory
  condition (bnc#1062568).
- CVE-2017-16912: The 'get_pipe()' function (drivers/usb/usbip/stub_rx.c) in the 
  Linux Kernel allowed attackers to cause a denial of service (out-of-bounds read)
  via a specially crafted USB over IP packet (bnc#1078673).
- CVE-2017-16913: The 'stub_recv_cmd_submit()' function (drivers/usb/usbip/stub_rx.c)
  in the Linux Kernel when handling CMD_SUBMIT packets allowed attackers to cause a 
  denial of service (arbitrary memory allocation) via a specially crafted USB over IP
  packet (bnc#1078672).
- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function
  did not validate a value that is used during DMA page allocation, leading
  to a heap-based out-of-bounds write (related to the rds_rdma_extra_size
  function in net/rds/rdma.c) (bnc#1075621).
- CVE-2017-18017: The tcpmss_mangle_packet function in
  net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers
  to cause a denial of service (use-after-free and memory corruption)
  or possibly have unspecified other impact by leveraging the presence of
  xt_TCPMSS in an iptables action (bnc#1074488).
- CVE-2017-18079: drivers/input/serio/i8042.c in the Linux kernel allowed
  attackers to cause a denial of service (NULL pointer dereference and
  system crash) or possibly have unspecified other impact because the
  port-&gt;exists value can change after it is validated (bnc#1077922).

Additionally, the following non-security issue has been fixed:

- audit: Move the tree pruning to a dedicated thread. (bsc#1075867)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-09"/>
	<updated date="2018-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010470">SUSE bug 1010470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062568">SUSE bug 1062568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062840">SUSE bug 1062840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067118">SUSE bug 1067118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074488">SUSE bug 1074488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075621">SUSE bug 1075621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075867">SUSE bug 1075867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077922">SUSE bug 1077922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078669">SUSE bug 1078669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078672">SUSE bug 1078672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078673">SUSE bug 1078673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078674">SUSE bug 1078674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080757">SUSE bug 1080757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083242">SUSE bug 1083242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083483">SUSE bug 1083483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083494">SUSE bug 1083494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086162">SUSE bug 1086162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940776">SUSE bug 940776</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5156/">CVE-2015-5156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5156">CVE-2015-5156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7915/">CVE-2016-7915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7915">CVE-2016-7915 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12190/">CVE-2017-12190 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12190">CVE-2017-12190 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12192/">CVE-2017-12192 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12192">CVE-2017-12192 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16644/">CVE-2017-16644 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16644">CVE-2017-16644 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16911/">CVE-2017-16911 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16911">CVE-2017-16911 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16912/">CVE-2017-16912 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16912">CVE-2017-16912 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16913/">CVE-2017-16913 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16913">CVE-2017-16913 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16914/">CVE-2017-16914 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16914">CVE-2017-16914 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18017/">CVE-2017-18017 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18017">CVE-2017-18017 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18079/">CVE-2017-18079 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18079">CVE-2017-18079 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18203/">CVE-2017-18203 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18203">CVE-2017-18203 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18208/">CVE-2017-18208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18208">CVE-2017-18208 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5332/">CVE-2018-5332 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5332">CVE-2018-5332 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6927/">CVE-2018-6927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6927">CVE-2018-6927 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7566">CVE-2018-7566 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8822/">CVE-2018-8822 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8822">CVE-2018-8822 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991939" comment="kernel-default-2.6.32.54-0.133.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991940" comment="kernel-default-base-2.6.32.54-0.133.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991942" comment="kernel-source-2.6.32.54-0.133.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991943" comment="kernel-syms-2.6.32.54-0.133.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991944" comment="kernel-trace-2.6.32.54-0.133.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991945" comment="kernel-trace-base-2.6.32.54-0.133.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991947" comment="kernel-xen-2.6.32.54-0.133.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991948" comment="kernel-xen-base-2.6.32.54-0.133.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217285" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1046610" ref_url="https://bugzilla.suse.com/1046610" source="BUGZILLA"/>
		<reference ref_id="1083483" ref_url="https://bugzilla.suse.com/1083483" source="BUGZILLA"/>
		<reference ref_id="1084536" ref_url="https://bugzilla.suse.com/1084536" source="BUGZILLA"/>
		<reference ref_id="1087088" ref_url="https://bugzilla.suse.com/1087088" source="BUGZILLA"/>
		<reference ref_id="1088260" ref_url="https://bugzilla.suse.com/1088260" source="BUGZILLA"/>
		<reference ref_id="1089608" ref_url="https://bugzilla.suse.com/1089608" source="BUGZILLA"/>
		<reference ref_id="1089752" ref_url="https://bugzilla.suse.com/1089752" source="BUGZILLA"/>
		<reference ref_id="1091755" ref_url="https://bugzilla.suse.com/1091755" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0861" ref_url="https://www.suse.com/security/cve/CVE-2017-0861/" source="CVE"/>
		<reference ref_id="CVE-2018-10087" ref_url="https://www.suse.com/security/cve/CVE-2018-10087/" source="CVE"/>
		<reference ref_id="CVE-2018-10124" ref_url="https://www.suse.com/security/cve/CVE-2018-10124/" source="CVE"/>
		<reference ref_id="CVE-2018-10675" ref_url="https://www.suse.com/security/cve/CVE-2018-10675/" source="CVE"/>
		<reference ref_id="CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566/" source="CVE"/>
		<reference ref_id="CVE-2018-7757" ref_url="https://www.suse.com/security/cve/CVE-2018-7757/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to receive various security and bugfixes.

The following security issues have been fixed:

- CVE-2018-8897: An unprivileged system user could use incorrect set up interrupt stacks to crash the Linux kernel
  resulting in DoS issue. (bsc#1087088)
- CVE-2018-10675: mm/mempolicy: Fix use after free when calling get_mempolicy. (bsc#1091755)
- CVE-2018-10124: The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13,
  when an unspecified architecture and compiler is used, might allow local users to cause a denial of
  service via an INT_MIN argument (bsc#1089752).
- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might have allowed
  local users to cause a denial of service by triggering an attempted use of the
  -INT_MIN value (bsc#1089608).
- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in
  drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of
  service (memory consumption) via many read accesses to files in the
  /sys/class/sas_phy directory, as demonstrated by the
  /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bsc#1084536).
- CVE-2018-7566: Buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl
  write operation to /dev/snd/seq by a local user potentially allowing for code
  execution (bnc#1083483).
- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in
  the ALSA subsystem allowed attackers to gain privileges via unspecified vectors
  (bnc#1088260).

Additionally, the following non-security issues have been fixed:

- xen-netfront: Fix req_prod check to avoid RX hang when index wraps (bsc#1046610).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-18"/>
	<updated date="2018-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046610">SUSE bug 1046610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083483">SUSE bug 1083483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084536">SUSE bug 1084536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088260">SUSE bug 1088260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089608">SUSE bug 1089608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089752">SUSE bug 1089752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091755">SUSE bug 1091755</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0861/">CVE-2017-0861 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0861">CVE-2017-0861 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10087/">CVE-2018-10087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10087">CVE-2018-10087 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10124/">CVE-2018-10124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10124">CVE-2018-10124 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10675/">CVE-2018-10675 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10675">CVE-2018-10675 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7566">CVE-2018-7566 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7757/">CVE-2018-7757 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7757">CVE-2018-7757 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8897">CVE-2018-8897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991950" comment="kernel-default-2.6.32.54-0.136.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991951" comment="kernel-default-base-2.6.32.54-0.136.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991953" comment="kernel-source-2.6.32.54-0.136.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991954" comment="kernel-syms-2.6.32.54-0.136.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991955" comment="kernel-trace-2.6.32.54-0.136.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991956" comment="kernel-trace-base-2.6.32.54-0.136.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991958" comment="kernel-xen-2.6.32.54-0.136.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991959" comment="kernel-xen-base-2.6.32.54-0.136.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217286" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1074621" ref_url="https://bugzilla.suse.com/1074621" source="BUGZILLA"/>
		<reference ref_id="1074701" ref_url="https://bugzilla.suse.com/1074701" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1082962" ref_url="https://bugzilla.suse.com/1082962" source="BUGZILLA"/>
		<reference ref_id="1083900" ref_url="https://bugzilla.suse.com/1083900" source="BUGZILLA"/>
		<reference ref_id="1085331" ref_url="https://bugzilla.suse.com/1085331" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1092497" ref_url="https://bugzilla.suse.com/1092497" source="BUGZILLA"/>
		<reference ref_id="1092904" ref_url="https://bugzilla.suse.com/1092904" source="BUGZILLA"/>
		<reference ref_id="1096140" ref_url="https://bugzilla.suse.com/1096140" source="BUGZILLA"/>
		<reference ref_id="1096242" ref_url="https://bugzilla.suse.com/1096242" source="BUGZILLA"/>
		<reference ref_id="1096281" ref_url="https://bugzilla.suse.com/1096281" source="BUGZILLA"/>
		<reference ref_id="1096480" ref_url="https://bugzilla.suse.com/1096480" source="BUGZILLA"/>
		<reference ref_id="1096728" ref_url="https://bugzilla.suse.com/1096728" source="BUGZILLA"/>
		<reference ref_id="1097551" ref_url="https://bugzilla.suse.com/1097551" source="BUGZILLA"/>
		<reference ref_id="1098016" ref_url="https://bugzilla.suse.com/1098016" source="BUGZILLA"/>
		<reference ref_id="1099942" ref_url="https://bugzilla.suse.com/1099942" source="BUGZILLA"/>
		<reference ref_id="1100089" ref_url="https://bugzilla.suse.com/1100089" source="BUGZILLA"/>
		<reference ref_id="1100418" ref_url="https://bugzilla.suse.com/1100418" source="BUGZILLA"/>
		<reference ref_id="883724" ref_url="https://bugzilla.suse.com/883724" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4508" ref_url="https://www.suse.com/security/cve/CVE-2014-4508/" source="CVE"/>
		<reference ref_id="CVE-2016-8405" ref_url="https://www.suse.com/security/cve/CVE-2016-8405/" source="CVE"/>
		<reference ref_id="CVE-2018-1000204" ref_url="https://www.suse.com/security/cve/CVE-2018-1000204/" source="CVE"/>
		<reference ref_id="CVE-2018-1130" ref_url="https://www.suse.com/security/cve/CVE-2018-1130/" source="CVE"/>
		<reference ref_id="CVE-2018-13406" ref_url="https://www.suse.com/security/cve/CVE-2018-13406/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-5803" ref_url="https://www.suse.com/security/cve/CVE-2018-5803/" source="CVE"/>
		<reference ref_id="CVE-2018-5814" ref_url="https://www.suse.com/security/cve/CVE-2018-5814/" source="CVE"/>
		<reference ref_id="CVE-2018-7492" ref_url="https://www.suse.com/security/cve/CVE-2018-7492/" source="CVE"/>
		<description>


The SUSE Linux Enterprise 11 SP1 Teradata kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c in the Linux kernel could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 bnc#1100418).
- CVE-2016-8405: An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. (bnc#1099942).
- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).
- CVE-2018-3639: Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bnc#1087082).
- CVE-2014-4508: arch/x86/kernel/entry_32.S on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allowed local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000. (bnc#883724)
- CVE-2018-1000204: **  (bnc#1096728).
- CVE-2018-1130: Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allowed a local user to cause a denial of service by a number of certain crafted system calls (bnc#1092904).
- CVE-2018-5803: An error in the '_sctp_make_chunk()' function (net/sctp/sm_make_chunk.c) when handling SCTP packets length could be exploited to cause a kernel crash (bnc#1083900).
- CVE-2018-7492: A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST (bnc#1082962).

The following non-security bugs were fixed:

- KVM: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).Shuffle X86_FEATURE_KAISER declaration to reduce conflicts when backportingfurther changes
- modpost: Fix modpost license checking of vmlinux.o.
- modpost: Fix modpost's license checking V3.
- modpost: support objects with more than 64k sections.
- module: Sort exported symbols.
- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621 bsc#1068032).
- x86/retpoline: do not perform thunk calls in ring3 vsyscall code (bsc#1085331).
- Introduce retpolines.
- KVM: Mask function7 ebx against host capability word9
- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140). Fix for bsc#1092497
- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1092497).
- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).
- x86/retpolines: Work around kABI.
- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).
- sysfs/cpu: Add vulnerability folder (bnc#1012382).
- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).
- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).
- x86-cpu-Implement-CPU-vulnerabilites-sysfs-fu.patch: x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).
- kaiser: Set kaiser cpu feature bit (bsc#1074701).
- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).
- x86/pti: do not report XenPV as vulnerable (bsc#1097551).Update xen stuff
- xen/x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).
- xen/x86/CPU: Sync CPU feature flags late (bsc#1075994 bsc#1075091).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-03"/>
	<updated date="2018-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074621">SUSE bug 1074621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082962">SUSE bug 1082962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083900">SUSE bug 1083900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085331">SUSE bug 1085331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092497">SUSE bug 1092497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092904">SUSE bug 1092904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096140">SUSE bug 1096140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096242">SUSE bug 1096242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096281">SUSE bug 1096281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096480">SUSE bug 1096480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096728">SUSE bug 1096728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097551">SUSE bug 1097551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098016">SUSE bug 1098016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099942">SUSE bug 1099942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100089">SUSE bug 1100089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100418">SUSE bug 1100418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883724">SUSE bug 883724</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-4508/">CVE-2014-4508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4508">CVE-2014-4508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8405/">CVE-2016-8405 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8405">CVE-2016-8405 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000204/">CVE-2018-1000204 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000204">CVE-2018-1000204 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1130/">CVE-2018-1130 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1130">CVE-2018-1130 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13406/">CVE-2018-13406 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13406">CVE-2018-13406 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5803/">CVE-2018-5803 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5803">CVE-2018-5803 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5814/">CVE-2018-5814 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5814">CVE-2018-5814 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7492/">CVE-2018-7492 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7492">CVE-2018-7492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991961" comment="kernel-default-2.6.32.54-0.139.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991962" comment="kernel-default-base-2.6.32.54-0.139.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991964" comment="kernel-source-2.6.32.54-0.139.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991965" comment="kernel-syms-2.6.32.54-0.139.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991966" comment="kernel-trace-2.6.32.54-0.139.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991967" comment="kernel-trace-base-2.6.32.54-0.139.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991969" comment="kernel-xen-2.6.32.54-0.139.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991970" comment="kernel-xen-base-2.6.32.54-0.139.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217287" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1092903" ref_url="https://bugzilla.suse.com/1092903" source="BUGZILLA"/>
		<reference ref_id="1107689" ref_url="https://bugzilla.suse.com/1107689" source="BUGZILLA"/>
		<reference ref_id="1108912" ref_url="https://bugzilla.suse.com/1108912" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10940" ref_url="https://www.suse.com/security/cve/CVE-2018-10940/" source="CVE"/>
		<reference ref_id="CVE-2018-14634" ref_url="https://www.suse.com/security/cve/CVE-2018-14634/" source="CVE"/>
		<reference ref_id="CVE-2018-16658" ref_url="https://www.suse.com/security/cve/CVE-2018-16658/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP1 TD kernel was updated to receive various security fixes.

- CVE-2018-14634: Prevent integer overflow in create_elf_tables that allowed a
  local attacker to exploit this vulnerability via a SUID-root binary and obtain
  full root privileges (bsc#1108912).
- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local
  attackers to use a incorrect bounds check in the CDROM driver
  CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)
- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that
  could have been used by local attackers to read kernel memory (bsc#1107689)		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-26"/>
	<updated date="2018-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092903">SUSE bug 1092903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107689">SUSE bug 1107689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108912">SUSE bug 1108912</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10940/">CVE-2018-10940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10940">CVE-2018-10940 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14634/">CVE-2018-14634 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14634">CVE-2018-14634 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16658/">CVE-2018-16658 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16658">CVE-2018-16658 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991972" comment="kernel-default-2.6.32.54-0.145.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991973" comment="kernel-default-base-2.6.32.54-0.145.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991975" comment="kernel-source-2.6.32.54-0.145.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991976" comment="kernel-syms-2.6.32.54-0.145.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991977" comment="kernel-trace-2.6.32.54-0.145.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991978" comment="kernel-trace-base-2.6.32.54-0.145.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991980" comment="kernel-xen-2.6.32.54-0.145.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991981" comment="kernel-xen-base-2.6.32.54-0.145.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217288" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="564324" ref_url="https://bugzilla.suse.com/564324" source="BUGZILLA"/>
		<reference ref_id="573330" ref_url="https://bugzilla.suse.com/573330" source="BUGZILLA"/>
		<reference ref_id="603738" ref_url="https://bugzilla.suse.com/603738" source="BUGZILLA"/>
		<reference ref_id="609196" ref_url="https://bugzilla.suse.com/609196" source="BUGZILLA"/>
		<reference ref_id="612729" ref_url="https://bugzilla.suse.com/612729" source="BUGZILLA"/>
		<reference ref_id="623307" ref_url="https://bugzilla.suse.com/623307" source="BUGZILLA"/>
		<reference ref_id="624850" ref_url="https://bugzilla.suse.com/624850" source="BUGZILLA"/>
		<reference ref_id="629901" ref_url="https://bugzilla.suse.com/629901" source="BUGZILLA"/>
		<reference ref_id="629908" ref_url="https://bugzilla.suse.com/629908" source="BUGZILLA"/>
		<reference ref_id="638860" ref_url="https://bugzilla.suse.com/638860" source="BUGZILLA"/>
		<reference ref_id="639261" ref_url="https://bugzilla.suse.com/639261" source="BUGZILLA"/>
		<reference ref_id="640278" ref_url="https://bugzilla.suse.com/640278" source="BUGZILLA"/>
		<reference ref_id="643249" ref_url="https://bugzilla.suse.com/643249" source="BUGZILLA"/>
		<reference ref_id="644219" ref_url="https://bugzilla.suse.com/644219" source="BUGZILLA"/>
		<reference ref_id="644350" ref_url="https://bugzilla.suse.com/644350" source="BUGZILLA"/>
		<reference ref_id="644373" ref_url="https://bugzilla.suse.com/644373" source="BUGZILLA"/>
		<reference ref_id="646045" ref_url="https://bugzilla.suse.com/646045" source="BUGZILLA"/>
		<reference ref_id="647392" ref_url="https://bugzilla.suse.com/647392" source="BUGZILLA"/>
		<reference ref_id="647497" ref_url="https://bugzilla.suse.com/647497" source="BUGZILLA"/>
		<reference ref_id="647775" ref_url="https://bugzilla.suse.com/647775" source="BUGZILLA"/>
		<reference ref_id="648308" ref_url="https://bugzilla.suse.com/648308" source="BUGZILLA"/>
		<reference ref_id="649231" ref_url="https://bugzilla.suse.com/649231" source="BUGZILLA"/>
		<reference ref_id="649257" ref_url="https://bugzilla.suse.com/649257" source="BUGZILLA"/>
		<reference ref_id="649820" ref_url="https://bugzilla.suse.com/649820" source="BUGZILLA"/>
		<reference ref_id="650109" ref_url="https://bugzilla.suse.com/650109" source="BUGZILLA"/>
		<reference ref_id="650111" ref_url="https://bugzilla.suse.com/650111" source="BUGZILLA"/>
		<reference ref_id="650113" ref_url="https://bugzilla.suse.com/650113" source="BUGZILLA"/>
		<reference ref_id="650116" ref_url="https://bugzilla.suse.com/650116" source="BUGZILLA"/>
		<reference ref_id="650128" ref_url="https://bugzilla.suse.com/650128" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2963" ref_url="https://www.suse.com/security/cve/CVE-2010-2963/" source="CVE"/>
		<reference ref_id="CVE-2010-3865" ref_url="https://www.suse.com/security/cve/CVE-2010-3865/" source="CVE"/>
		<reference ref_id="CVE-2010-3904" ref_url="https://www.suse.com/security/cve/CVE-2010-3904/" source="CVE"/>
		<description>

This update of the SUSE Linux Enterprise Server 11 SP1 kernel brings the 
kernel to 2.6.32.24 and fixes some critical security bugs and other 
non-security bugs.

Following security bugs were fixed:

    * 

      CVE-2010-3865: A iovec integer overflow in RDS sockets was fixed
      which could lead to local attackers gaining kernel privileges.

    * 

      CVE-2010-3904: A local privilege escalation in RDS sockets allowed
      local attackers to gain privileges.

      Please note that the net/rds socket protocol module only lives in the
      -extra kernel package, which is not installed by default on the SUSE
      Linux Enterprise Server 11.

    * 

      CVE-2010-2963: A problem in the compat ioctl handling in video4linux
      allowed local attackers with a video device plugged in to gain
      privileges on x86_64 systems.

		</description>
<advisory from="security@suse.de">
	<issued date="2010-11-03"/>
	<updated date="2010-11-03"/>
	<bugzilla href="https://bugzilla.suse.com/564324">SUSE bug 564324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/573330">SUSE bug 573330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/603738">SUSE bug 603738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/609196">SUSE bug 609196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/612729">SUSE bug 612729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/623307">SUSE bug 623307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/624850">SUSE bug 624850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629901">SUSE bug 629901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629908">SUSE bug 629908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638860">SUSE bug 638860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/639261">SUSE bug 639261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/640278">SUSE bug 640278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/643249">SUSE bug 643249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/644219">SUSE bug 644219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/644350">SUSE bug 644350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/644373">SUSE bug 644373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/646045">SUSE bug 646045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/647392">SUSE bug 647392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/647497">SUSE bug 647497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/647775">SUSE bug 647775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648308">SUSE bug 648308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649231">SUSE bug 649231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649257">SUSE bug 649257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649820">SUSE bug 649820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/650109">SUSE bug 650109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/650111">SUSE bug 650111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/650113">SUSE bug 650113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/650116">SUSE bug 650116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/650128">SUSE bug 650128</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2963/">CVE-2010-2963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2963">CVE-2010-2963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3865/">CVE-2010-3865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3865">CVE-2010-3865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3904/">CVE-2010-3904 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-3904">CVE-2010-3904 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991983" comment="kernel-ec2-2.6.32.24-0.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991984" comment="kernel-ec2-base-2.6.32.24-0.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217289" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1004418" ref_url="https://bugzilla.suse.com/1004418" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5195" ref_url="https://www.suse.com/security/cve/CVE-2016-5195/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP1 TD kernel was updated to fix one security issue.

This security bug was fixed:

- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-20"/>
	<updated date="2016-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1004418">SUSE bug 1004418</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5195/">CVE-2016-5195 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5195">CVE-2016-5195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991985" comment="kernel-default-2.6.32.54-0.91.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991986" comment="kernel-default-base-2.6.32.54-0.91.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991988" comment="kernel-source-2.6.32.54-0.91.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991989" comment="kernel-syms-2.6.32.54-0.91.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991990" comment="kernel-trace-2.6.32.54-0.91.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991991" comment="kernel-trace-base-2.6.32.54-0.91.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991993" comment="kernel-xen-2.6.32.54-0.91.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991994" comment="kernel-xen-base-2.6.32.54-0.91.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217290" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1008833" ref_url="https://bugzilla.suse.com/1008833" source="BUGZILLA"/>
		<reference ref_id="1010507" ref_url="https://bugzilla.suse.com/1010507" source="BUGZILLA"/>
		<reference ref_id="1010711" ref_url="https://bugzilla.suse.com/1010711" source="BUGZILLA"/>
		<reference ref_id="1012832" ref_url="https://bugzilla.suse.com/1012832" source="BUGZILLA"/>
		<reference ref_id="1013038" ref_url="https://bugzilla.suse.com/1013038" source="BUGZILLA"/>
		<reference ref_id="1013533" ref_url="https://bugzilla.suse.com/1013533" source="BUGZILLA"/>
		<reference ref_id="1013604" ref_url="https://bugzilla.suse.com/1013604" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8964" ref_url="https://www.suse.com/security/cve/CVE-2015-8964/" source="CVE"/>
		<reference ref_id="CVE-2016-7911" ref_url="https://www.suse.com/security/cve/CVE-2016-7911/" source="CVE"/>
		<reference ref_id="CVE-2016-8633" ref_url="https://www.suse.com/security/cve/CVE-2016-8633/" source="CVE"/>
		<reference ref_id="CVE-2016-9576" ref_url="https://www.suse.com/security/cve/CVE-2016-9576/" source="CVE"/>
		<reference ref_id="CVE-2016-9685" ref_url="https://www.suse.com/security/cve/CVE-2016-9685/" source="CVE"/>
		<reference ref_id="CVE-2016-9756" ref_url="https://www.suse.com/security/cve/CVE-2016-9756/" source="CVE"/>
		<reference ref_id="CVE-2016-9794" ref_url="https://www.suse.com/security/cve/CVE-2016-9794/" source="CVE"/>
		<description>

This update for kernel-source fixes the following issues:

- alsa/pcm: Call kill_fasync() in stream lock (CVE-2016-9794, bsc#1013533).
- block: Fix use-after-free in sys_ioprio_get() (CVE-2016-7911, bsc#1010711).
- firewire/net: Guard against rx buffer overflows (bsc#1008833, CVE-2016-8633).
- kvm/x86: Drop error recovery in em_jmp_far and em_ret_far (bsc#1013038, CVE-2016-9756).
- splice: Introduce FMODE_SPLICE_READ and FMODE_SPLICE_WRITE (CVE-2016-9576, bsc#1013604).
- tty: Prevent ldisc drivers from re-using stale tty fields (bsc#1010507, CVE-2015-8964).
- xfs: Fix two memory leaks in xfs_attr_list.c error paths (bsc#1012832, CVE-2016-9685).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-15"/>
	<updated date="2016-12-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1008833">SUSE bug 1008833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010507">SUSE bug 1010507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010711">SUSE bug 1010711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012832">SUSE bug 1012832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013038">SUSE bug 1013038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013533">SUSE bug 1013533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013604">SUSE bug 1013604</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-8964/">CVE-2015-8964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8964">CVE-2015-8964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7911/">CVE-2016-7911 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7911">CVE-2016-7911 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8633/">CVE-2016-8633 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8633">CVE-2016-8633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9576/">CVE-2016-9576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9576">CVE-2016-9576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9685/">CVE-2016-9685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9685">CVE-2016-9685 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9756/">CVE-2016-9756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9756">CVE-2016-9756 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9794/">CVE-2016-9794 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9794">CVE-2016-9794 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991996" comment="kernel-default-2.6.32.54-0.97.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991997" comment="kernel-default-base-2.6.32.54-0.97.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991999" comment="kernel-source-2.6.32.54-0.97.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992000" comment="kernel-syms-2.6.32.54-0.97.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992001" comment="kernel-trace-2.6.32.54-0.97.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992002" comment="kernel-trace-base-2.6.32.54-0.97.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992004" comment="kernel-xen-2.6.32.54-0.97.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992005" comment="kernel-xen-base-2.6.32.54-0.97.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217291" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-source (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1030593" ref_url="https://bugzilla.suse.com/1030593" source="BUGZILLA"/>
		<reference ref_id="1031240" ref_url="https://bugzilla.suse.com/1031240" source="BUGZILLA"/>
		<reference ref_id="1034862" ref_url="https://bugzilla.suse.com/1034862" source="BUGZILLA"/>
		<reference ref_id="1066674" ref_url="https://bugzilla.suse.com/1066674" source="BUGZILLA"/>
		<reference ref_id="1071021" ref_url="https://bugzilla.suse.com/1071021" source="BUGZILLA"/>
		<reference ref_id="1099922" ref_url="https://bugzilla.suse.com/1099922" source="BUGZILLA"/>
		<reference ref_id="1108498" ref_url="https://bugzilla.suse.com/1108498" source="BUGZILLA"/>
		<reference ref_id="1110785" ref_url="https://bugzilla.suse.com/1110785" source="BUGZILLA"/>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1112178" ref_url="https://bugzilla.suse.com/1112178" source="BUGZILLA"/>
		<reference ref_id="1113751" ref_url="https://bugzilla.suse.com/1113751" source="BUGZILLA"/>
		<reference ref_id="1119714" ref_url="https://bugzilla.suse.com/1119714" source="BUGZILLA"/>
		<reference ref_id="1119974" ref_url="https://bugzilla.suse.com/1119974" source="BUGZILLA"/>
		<reference ref_id="1120743" ref_url="https://bugzilla.suse.com/1120743" source="BUGZILLA"/>
		<reference ref_id="1120843" ref_url="https://bugzilla.suse.com/1120843" source="BUGZILLA"/>
		<reference ref_id="1128166" ref_url="https://bugzilla.suse.com/1128166" source="BUGZILLA"/>
		<reference ref_id="1132472" ref_url="https://bugzilla.suse.com/1132472" source="BUGZILLA"/>
		<reference ref_id="1134848" ref_url="https://bugzilla.suse.com/1134848" source="BUGZILLA"/>
		<reference ref_id="1137586" ref_url="https://bugzilla.suse.com/1137586" source="BUGZILLA"/>
		<reference ref_id="949936" ref_url="https://bugzilla.suse.com/949936" source="BUGZILLA"/>
		<reference ref_id="969340" ref_url="https://bugzilla.suse.com/969340" source="BUGZILLA"/>
		<reference ref_id="CVE-2004-0230" ref_url="https://www.suse.com/security/cve/CVE-2004-0230/" source="CVE"/>
		<reference ref_id="CVE-2015-7799" ref_url="https://www.suse.com/security/cve/CVE-2015-7799/" source="CVE"/>
		<reference ref_id="CVE-2016-5696" ref_url="https://www.suse.com/security/cve/CVE-2016-5696/" source="CVE"/>
		<reference ref_id="CVE-2017-1000407" ref_url="https://www.suse.com/security/cve/CVE-2017-1000407/" source="CVE"/>
		<reference ref_id="CVE-2017-16533" ref_url="https://www.suse.com/security/cve/CVE-2017-16533/" source="CVE"/>
		<reference ref_id="CVE-2017-2647" ref_url="https://www.suse.com/security/cve/CVE-2017-2647/" source="CVE"/>
		<reference ref_id="CVE-2017-6951" ref_url="https://www.suse.com/security/cve/CVE-2017-6951/" source="CVE"/>
		<reference ref_id="CVE-2017-7273" ref_url="https://www.suse.com/security/cve/CVE-2017-7273/" source="CVE"/>
		<reference ref_id="CVE-2017-7472" ref_url="https://www.suse.com/security/cve/CVE-2017-7472/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-12896" ref_url="https://www.suse.com/security/cve/CVE-2018-12896/" source="CVE"/>
		<reference ref_id="CVE-2018-17972" ref_url="https://www.suse.com/security/cve/CVE-2018-17972/" source="CVE"/>
		<reference ref_id="CVE-2018-18710" ref_url="https://www.suse.com/security/cve/CVE-2018-18710/" source="CVE"/>
		<reference ref_id="CVE-2018-19985" ref_url="https://www.suse.com/security/cve/CVE-2018-19985/" source="CVE"/>
		<reference ref_id="CVE-2018-20169" ref_url="https://www.suse.com/security/cve/CVE-2018-20169/" source="CVE"/>
		<reference ref_id="CVE-2018-9516" ref_url="https://www.suse.com/security/cve/CVE-2018-9516/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-11190" ref_url="https://www.suse.com/security/cve/CVE-2019-11190/" source="CVE"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11884" ref_url="https://www.suse.com/security/cve/CVE-2019-11884/" source="CVE"/>
		<reference ref_id="CVE-2019-5489" ref_url="https://www.suse.com/security/cve/CVE-2019-5489/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP1 Teradata Kernel was updated to fix bugs and security issues.

The following security bugs were fixed:

- CVE-2019-11477: A vulnerability was detected which relates to the TCP Selective Acknowledgement (SACK) and
  minimum segment size (MSS) capabilities. The most serious, dubbed 'SACK' allows a remotely-triggered kernel
  panic on recent Linux kernels (bsc#1137586)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors
  utilizing speculative execution may allow an authenticated user to potentially enable information disclosure
  via a side channel with local access (bsc#1111331)

- CVE-2018-12127: Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing
  speculative execution may allow an authenticated user to potentially enable information disclosure via a side
  channel with local access (bsc#1111331)

- CVE-2018-12130: Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors
  utilizing speculative execution may allow an authenticated user to potentially enable information disclosure
  via a side channel with local access (bsc#1111331)

- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some
  microprocessors utilizing speculative execution may allow an authenticated user to potentially enable
  information disclosure via a side channel with local access (bsc#1111331)

- CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed
  local attackers to observe page cache access patterns of other processes on the same system, potentially
  allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited
  remote exploitation may be possible, as demonstrated by latency differences in accessing public files from
  an Apache HTTP Server (bsc#1120843)

- CVE-2019-11190: The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs
  (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c,
  and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat (bsc#1132472) 

- CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before
  5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a
  HIDPCONNADD command, because a name field may not end with a '\0' character (bsc#1134848)

- CVE-2018-17972: An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel
  through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing
  a local attacker to exploit racy stack unwinding and leak kernel task stack contents (bsc#1110785)

- CVE-2019-9213: In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap
  minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP
  platforms. This is related to a capability check for the wrong task (bsc#1128166)

- CVE-2004-0230: TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence
  numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting
  a TCP RST packet, especially in protocols that use long-lived connections, such as BGP (bsc#969340)

- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of
  challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind
  in-window attack (bsc#969340)

- CVE-2018-19985: The function hso_get_config_data in drivers/net/usb/hso.c in the Linux kernel through 4.19.8
  reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object
  out-of-bounds (OOB) read that potentially allows arbitrary read in the kernel address space. (bsc#1120743)

- CVE-2018-20169: An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size
  checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in
  drivers/usb/core/usb.c (bsc#1119714)

- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not
  ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer
  dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call. (bsc#949936)

- CVE-2018-18710: An issue was discovered in the Linux kernel through 4.19. An information leak in
  cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because
  a cast from unsigned long to int interferes with bounds checking. (bsc#1113751)

- CVE-2017-7273: The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 4.x before 4.9.4
  allows physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified
  other impact via a crafted HID report. (bsc#1031240)

- CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c in the Linux kernel before 4.13.8 allows
  local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other
  impact via a crafted USB device. (bsc#1066674)

- CVE-2017-1000407: The Linux Kernel 2.6.32 and later are affected by a denial of service, by flooding the diagnostic
  port 0x80 an exception can be triggered leading to a kernel panic (bsc#1071021)

- CVE-2018-9516: In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to
  a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed.
  User interaction is not needed for exploitation (bsc#1108498)

- CVE-2018-12896: An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in
  kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on
  interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This
  basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun,
  random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex,
  timer_create, and timer_settime system calls (bsc#1099922)

- CVE-2017-2647, CVE-2017-6951: The KEYS subsystem in the Linux kernel before 3.18 allows local users to gain privileges
  or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain
  match field, related to the keyring_search_iterator function in keyring.c (bsc#1030593)

- CVE-2017-7472: The KEYS subsystem in the Linux kernel before 4.10.13 allows local users to cause a denial of service
  (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls (bsc#1034862)

Additional changes:

- Support was added for 'mitigations=' cmdline option (bsc#1112178) 

- Related to the following security fixes: CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091:

  * Adds mds=full,nosmt cmdline option (bsc#1111331)
  * Adds mitigation mode VMWERV (bsc#1111331)		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-17"/>
	<updated date="2019-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1030593">SUSE bug 1030593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031240">SUSE bug 1031240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034862">SUSE bug 1034862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066674">SUSE bug 1066674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071021">SUSE bug 1071021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099922">SUSE bug 1099922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108498">SUSE bug 1108498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110785">SUSE bug 1110785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112178">SUSE bug 1112178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113751">SUSE bug 1113751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119714">SUSE bug 1119714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119974">SUSE bug 1119974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120743">SUSE bug 1120743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120843">SUSE bug 1120843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128166">SUSE bug 1128166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132472">SUSE bug 1132472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134848">SUSE bug 1134848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949936">SUSE bug 949936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969340">SUSE bug 969340</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2004-0230/">CVE-2004-0230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-0230">CVE-2004-0230 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7799/">CVE-2015-7799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7799">CVE-2015-7799 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5696/">CVE-2016-5696 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5696">CVE-2016-5696 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000407/">CVE-2017-1000407 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000407">CVE-2017-1000407 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16533/">CVE-2017-16533 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16533">CVE-2017-16533 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2647/">CVE-2017-2647 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2647">CVE-2017-2647 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6951/">CVE-2017-6951 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6951">CVE-2017-6951 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7273/">CVE-2017-7273 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7273">CVE-2017-7273 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7472/">CVE-2017-7472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7472">CVE-2017-7472 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12896/">CVE-2018-12896 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12896">CVE-2018-12896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17972/">CVE-2018-17972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17972">CVE-2018-17972 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18710/">CVE-2018-18710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18710">CVE-2018-18710 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19985/">CVE-2018-19985 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19985">CVE-2018-19985 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20169/">CVE-2018-20169 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20169">CVE-2018-20169 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9516/">CVE-2018-9516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9516">CVE-2018-9516 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11190/">CVE-2019-11190 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11190">CVE-2019-11190 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11477">CVE-2019-11477 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11884/">CVE-2019-11884 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11884">CVE-2019-11884 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5489/">CVE-2019-5489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5489">CVE-2019-5489 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9213">CVE-2019-9213 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992007" comment="kernel-default-2.6.32.54-0.155.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992008" comment="kernel-default-base-2.6.32.54-0.155.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992010" comment="kernel-source-2.6.32.54-0.155.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992011" comment="kernel-syms-2.6.32.54-0.155.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992012" comment="kernel-trace-2.6.32.54-0.155.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992013" comment="kernel-trace-base-2.6.32.54-0.155.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992015" comment="kernel-xen-2.6.32.54-0.155.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992016" comment="kernel-xen-base-2.6.32.54-0.155.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217292" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1102340" ref_url="https://bugzilla.suse.com/1102340" source="BUGZILLA"/>
		<reference ref_id="1120758" ref_url="https://bugzilla.suse.com/1120758" source="BUGZILLA"/>
		<reference ref_id="1132686" ref_url="https://bugzilla.suse.com/1132686" source="BUGZILLA"/>
		<reference ref_id="1134395" ref_url="https://bugzilla.suse.com/1134395" source="BUGZILLA"/>
		<reference ref_id="1137586" ref_url="https://bugzilla.suse.com/1137586" source="BUGZILLA"/>
		<reference ref_id="1138943" ref_url="https://bugzilla.suse.com/1138943" source="BUGZILLA"/>
		<reference ref_id="1139751" ref_url="https://bugzilla.suse.com/1139751" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20836" ref_url="https://www.suse.com/security/cve/CVE-2018-20836/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-3459" ref_url="https://www.suse.com/security/cve/CVE-2019-3459/" source="CVE"/>
		<reference ref_id="CVE-2019-3460" ref_url="https://www.suse.com/security/cve/CVE-2019-3460/" source="CVE"/>
		<reference ref_id="CVE-2019-3896" ref_url="https://www.suse.com/security/cve/CVE-2019-3896/" source="CVE"/>
		<description>
This update for the Linux Kernel fixes the following issues:

Security issues fixed:

- CVE-2019-3459: A heap address information leak while using L2CAP_GET_CONF_OPT was fixed. (bsc#1120758)
- CVE-2019-3460: A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was fixed. (bsc#1120758)
- CVE-2019-3896: A double-free could have happened in idr_remove_all() in lib/idr.c. An unprivileged local attacker could have used this flaw for a privilege escalation or for a system crash and a denial of service (DoS).  (bsc#1138943)
- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service. (bsc#1102340)
- CVE-2018-20836: There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, that could have lead to a use-after-free. (bsc#1134395)
- CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586 bsc#1139751)
  The earlier fix had a regression where TCP connections could get stuck, this update fixes this regression.

Other issues fixed:

- Bluetooth: Verify that l2cap_get_conf_opt provides large enough
  buffer (bsc#1120758 CVE-2019-3459 CVE-2019-3460).
- idr: fix top layer handling (bsc#1138943 CVE-2019-3896).
- idr: make idr_get_next() good for rcu_read_lock() (bsc#1138943).
- idr: fix backtrack logic in idr_remove_all (bsc#1138943 CVE-2019-3896).
- tcp: avoid collapses in tcp_prune_queue() if possible (CVE-2018-5390 bsc#1102340).
- tcp: detect malicious patterns in tcp_collapse_ofo_queue() (CVE-2018-5390 bsc#1102340).
- Consolidate 'SACK Panic' series with upstream
- tcp: refine memory limit test in tcp_fragment() (CVE-2019-11478 bsc#1137586 bsc#1139751).
- direct-io: don't read inode-&gt;i_blkbits multiple times (bsc#1132686).
- scsi: libsas: fix a race condition when smp task timeout (CVE-2018-20836 bsc#1134395).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-31"/>
	<updated date="2019-07-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102340">SUSE bug 1102340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120758">SUSE bug 1120758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134395">SUSE bug 1134395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138943">SUSE bug 1138943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139751">SUSE bug 1139751</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20836/">CVE-2018-20836 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20836">CVE-2018-20836 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5390">CVE-2018-5390 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11478">CVE-2019-11478 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3459/">CVE-2019-3459 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3459">CVE-2019-3459 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3460/">CVE-2019-3460 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3460">CVE-2019-3460 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3896/">CVE-2019-3896 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3896">CVE-2019-3896 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992018" comment="kernel-default-2.6.32.54-0.158.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992019" comment="kernel-default-base-2.6.32.54-0.158.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992021" comment="kernel-source-2.6.32.54-0.158.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992022" comment="kernel-syms-2.6.32.54-0.158.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992023" comment="kernel-trace-2.6.32.54-0.158.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992024" comment="kernel-trace-base-2.6.32.54-0.158.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992026" comment="kernel-xen-2.6.32.54-0.158.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992027" comment="kernel-xen-base-2.6.32.54-0.158.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217293" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-source (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1134399" ref_url="https://bugzilla.suse.com/1134399" source="BUGZILLA"/>
		<reference ref_id="1142023" ref_url="https://bugzilla.suse.com/1142023" source="BUGZILLA"/>
		<reference ref_id="1143173" ref_url="https://bugzilla.suse.com/1143173" source="BUGZILLA"/>
		<reference ref_id="1143179" ref_url="https://bugzilla.suse.com/1143179" source="BUGZILLA"/>
		<reference ref_id="1143189" ref_url="https://bugzilla.suse.com/1143189" source="BUGZILLA"/>
		<reference ref_id="1143191" ref_url="https://bugzilla.suse.com/1143191" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-5331" ref_url="https://www.suse.com/security/cve/CVE-2010-5331/" source="CVE"/>
		<reference ref_id="CVE-2015-9289" ref_url="https://www.suse.com/security/cve/CVE-2015-9289/" source="CVE"/>
		<reference ref_id="CVE-2019-11810" ref_url="https://www.suse.com/security/cve/CVE-2019-11810/" source="CVE"/>
		<reference ref_id="CVE-2019-13631" ref_url="https://www.suse.com/security/cve/CVE-2019-13631/" source="CVE"/>
		<reference ref_id="CVE-2019-14283" ref_url="https://www.suse.com/security/cve/CVE-2019-14283/" source="CVE"/>
		<reference ref_id="CVE-2019-14284" ref_url="https://www.suse.com/security/cve/CVE-2019-14284/" source="CVE"/>
		<description>
This update for the SUSE Linux Enterprise Server 11 SP1 Kernel for Teradata fixes the following issues:

Security issues fixed:

- CVE-2015-9289: In the Linux kernel before 4.1.4, a buffer overflow occurs when checking userspace params in
  drivers/media/dvb-frontends/cx24116.c. The maximum size for a DiSEqC command is 6, according to the userspace
  API. However, the code allows larger values such as 23 (bsc#1143179)

- CVE-2019-14284: In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by
  setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set
  the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format
  operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has
  not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189)

- CVE-2019-14283: In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate
  the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered
  by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device
  by default (bsc#1143191)

- CVE-2010-5331: In the Linux kernel before 2.6.34, a range check issue in drivers/gpu/drm/radeon/atombios.c
  could cause an off by one (buffer overflow) problem (bsc#1143173)

- CVE-2019-11810: An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can
  occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c.
  This causes a Denial of Service, related to a use-after-free (bsc#1134399)

- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1,
  a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging
  messages (bsc#1142023)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-12"/>
	<updated date="2019-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1134399">SUSE bug 1134399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142023">SUSE bug 1142023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143173">SUSE bug 1143173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143179">SUSE bug 1143179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143189">SUSE bug 1143189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143191">SUSE bug 1143191</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5331/">CVE-2010-5331 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-5331">CVE-2010-5331 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-9289/">CVE-2015-9289 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9289">CVE-2015-9289 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11810/">CVE-2019-11810 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11810">CVE-2019-11810 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13631/">CVE-2019-13631 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13631">CVE-2019-13631 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14283/">CVE-2019-14283 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14283">CVE-2019-14283 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14284/">CVE-2019-14284 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14284">CVE-2019-14284 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992029" comment="kernel-default-2.6.32.54-0.161.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992030" comment="kernel-default-base-2.6.32.54-0.161.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992032" comment="kernel-source-2.6.32.54-0.161.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992033" comment="kernel-syms-2.6.32.54-0.161.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992034" comment="kernel-trace-2.6.32.54-0.161.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992035" comment="kernel-trace-base-2.6.32.54-0.161.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992037" comment="kernel-xen-2.6.32.54-0.161.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992038" comment="kernel-xen-base-2.6.32.54-0.161.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217294" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Linux Enterprise Server 11 SP1 Kernel for Teradata (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1137586" ref_url="https://bugzilla.suse.com/1137586" source="BUGZILLA"/>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1139751" ref_url="https://bugzilla.suse.com/1139751" source="BUGZILLA"/>
		<reference ref_id="1143170" ref_url="https://bugzilla.suse.com/1143170" source="BUGZILLA"/>
		<reference ref_id="1145922" ref_url="https://bugzilla.suse.com/1145922" source="BUGZILLA"/>
		<reference ref_id="1146163" ref_url="https://bugzilla.suse.com/1146163" source="BUGZILLA"/>
		<reference ref_id="1146391" ref_url="https://bugzilla.suse.com/1146391" source="BUGZILLA"/>
		<reference ref_id="1146524" ref_url="https://bugzilla.suse.com/1146524" source="BUGZILLA"/>
		<reference ref_id="1146540" ref_url="https://bugzilla.suse.com/1146540" source="BUGZILLA"/>
		<reference ref_id="1146547" ref_url="https://bugzilla.suse.com/1146547" source="BUGZILLA"/>
		<reference ref_id="1146678" ref_url="https://bugzilla.suse.com/1146678" source="BUGZILLA"/>
		<reference ref_id="1148938" ref_url="https://bugzilla.suse.com/1148938" source="BUGZILLA"/>
		<reference ref_id="1150025" ref_url="https://bugzilla.suse.com/1150025" source="BUGZILLA"/>
		<reference ref_id="1150452" ref_url="https://bugzilla.suse.com/1150452" source="BUGZILLA"/>
		<reference ref_id="1150457" ref_url="https://bugzilla.suse.com/1150457" source="BUGZILLA"/>
		<reference ref_id="1150465" ref_url="https://bugzilla.suse.com/1150465" source="BUGZILLA"/>
		<reference ref_id="1152779" ref_url="https://bugzilla.suse.com/1152779" source="BUGZILLA"/>
		<reference ref_id="1152782" ref_url="https://bugzilla.suse.com/1152782" source="BUGZILLA"/>
		<reference ref_id="1152786" ref_url="https://bugzilla.suse.com/1152786" source="BUGZILLA"/>
		<reference ref_id="1152789" ref_url="https://bugzilla.suse.com/1152789" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-5332" ref_url="https://www.suse.com/security/cve/CVE-2010-5332/" source="CVE"/>
		<reference ref_id="CVE-2017-18551" ref_url="https://www.suse.com/security/cve/CVE-2017-18551/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-14821" ref_url="https://www.suse.com/security/cve/CVE-2019-14821/" source="CVE"/>
		<reference ref_id="CVE-2019-15118" ref_url="https://www.suse.com/security/cve/CVE-2019-15118/" source="CVE"/>
		<reference ref_id="CVE-2019-15212" ref_url="https://www.suse.com/security/cve/CVE-2019-15212/" source="CVE"/>
		<reference ref_id="CVE-2019-15217" ref_url="https://www.suse.com/security/cve/CVE-2019-15217/" source="CVE"/>
		<reference ref_id="CVE-2019-15219" ref_url="https://www.suse.com/security/cve/CVE-2019-15219/" source="CVE"/>
		<reference ref_id="CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291/" source="CVE"/>
		<reference ref_id="CVE-2019-15292" ref_url="https://www.suse.com/security/cve/CVE-2019-15292/" source="CVE"/>
		<reference ref_id="CVE-2019-15807" ref_url="https://www.suse.com/security/cve/CVE-2019-15807/" source="CVE"/>
		<reference ref_id="CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232/" source="CVE"/>
		<reference ref_id="CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233/" source="CVE"/>
		<reference ref_id="CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234/" source="CVE"/>
		<reference ref_id="CVE-2019-17052" ref_url="https://www.suse.com/security/cve/CVE-2019-17052/" source="CVE"/>
		<reference ref_id="CVE-2019-17053" ref_url="https://www.suse.com/security/cve/CVE-2019-17053/" source="CVE"/>
		<reference ref_id="CVE-2019-17054" ref_url="https://www.suse.com/security/cve/CVE-2019-17054/" source="CVE"/>
		<reference ref_id="CVE-2019-17055" ref_url="https://www.suse.com/security/cve/CVE-2019-17055/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="CVE-2019-9456" ref_url="https://www.suse.com/security/cve/CVE-2019-9456/" source="CVE"/>
		<description>
This is an update for the SUSE Linux Enterprise Server 11 SP1 Kernel for Teradata:

The following security issues have been fixed:

- CVE-2019-11135: TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may
  allow an authenticated user to potentially enable information disclosure via a side channel with
  local access (bsc#1139073)

- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the
  alloc_workqueue return value, leading to a NULL pointer dereference (bsc#1150457)

- CVE-2019-16234: drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does
  not check the alloc_workqueue return value, leading to a NULL pointer dereference (bsc#1150452)

- CVE-2019-16232: drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does
  not check the alloc_workqueue return value, leading to a NULL pointer dereference (bsc#1150465)

- CVE-2019-17052: ax25_create in net/ax25/af_ax25.c in the AF_AX25 network module in the Linux
  kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can
  create a raw socket, aka CID-0614e2b73768 (bsc#1152779)

- CVE-2019-17055: base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module
  in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged
  users can create a raw socket, aka CID-b91ee4aa2a21 (bsc#1152782)

- CVE-2019-17054: atalk_create in net/appletalk/ddp.c in the AF_APPLETALK network module in the
  Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users
  can create a raw socket, aka CID-6cc03e8aa36c (bsc#1152786)

- CVE-2019-17133: In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in
  net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow (bsc#1153158)

- CVE-2019-17053: ieee802154_create in net/ieee802154/socket.c in the AF_IEEE802154 network
  module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that
  unprivileged users can create a raw socket, aka CID-e69dbd4619e7 (bsc#1152789)

- CVE-2019-15291: An issue was discovered in the Linux kernel through 5.2.9. There is a NULL
  pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in
  the drivers/media/usb/b2c2/flexcop-usb.c driver (bsc#1146540)

- CVE-2019-15807: In the Linux kernel before 5.1.13, there is a memory leak in
  drivers/scsi/libsas/sas_expander.c when SAS expander discovery fails. This will cause a
  BUG and denial of service (bsc#1148938)

- CVE-2019-14821: An out-of-bounds access issue was found in the Linux kernel, all versions
  through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write
  operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein
  write indices 'ring-&gt;first' and 'ring-&gt;last' value could be supplied by a host user-space
  process. An unprivileged host user or process with access to '/dev/kvm' device could use
  this flaw to crash the host kernel, resulting in a denial of service or potentially
  escalating privileges on the system (bsc#1151350)

- CVE-2010-5332: In the Linux kernel before 2.6.37, an out of bounds array access happened
  in drivers/net/mlx4/port.c. When searching for a free entry in either mlx4_register_vlan()
  or mlx4_register_mac(), and there is no free entry, the loop terminates without updating
  the local variable free thus causing out of array bounds access (bsc#1143170)

- CVE-2019-9456: In the Android kernel in Pixel C USB monitor driver there is a possible
  OOB write due to a missing bounds check. This could lead to local escalation of privilege
  with System execution privileges needed. User interaction is not needed for exploitation
  (bsc#1150025)

- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was
  subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments
  (SACKs). A remote attacker could use this to cause a denial of service (bsc#1137586, bsc#1139751)

- CVE-2019-15219: An issue was discovered in the Linux kernel before 5.1.8. There is a NULL
  pointer dereference caused by a malicious USB device in the drivers/usb/misc/sisusbvga/sisusb.c
  driver (bsc#1146524)

- CVE-2019-15212: An issue was discovered in the Linux kernel before 5.1.8. There is a double-free
  caused by a malicious USB device in the drivers/usb/misc/rio500.c driver (bsc#1146391)

- CVE-2019-15292: An issue was discovered in the Linux kernel before 5.0.9. There is a use-after-free
  in atalk_proc_exit, related to net/appletalk/atalk_proc.c, net/appletalk/ddp.c, and
  net/appletalk/sysctl_net_atalk.c (bsc#1146678)

- CVE-2019-15217: An issue was discovered in the Linux kernel before 5.2.3. There is a NULL pointer
  dereference caused by a malicious USB device in the drivers/media/usb/zr364xx/zr364xx.c driver (bsc#1146547)

- CVE-2017-18551: An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel before
  4.14.15. There is an out of bounds write in the function i2c_smbus_xfer_emulated (bsc#1146163)

- CVE-2019-15118: check_input_term in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles
  recursion, leading to kernel stack exhaustion (bsc#1145922)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-20"/>
	<updated date="2019-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139751">SUSE bug 1139751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143170">SUSE bug 1143170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145922">SUSE bug 1145922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146163">SUSE bug 1146163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146391">SUSE bug 1146391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146524">SUSE bug 1146524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146540">SUSE bug 1146540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146547">SUSE bug 1146547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146678">SUSE bug 1146678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148938">SUSE bug 1148938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150025">SUSE bug 1150025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150452">SUSE bug 1150452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150457">SUSE bug 1150457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150465">SUSE bug 1150465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152779">SUSE bug 1152779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152782">SUSE bug 1152782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152786">SUSE bug 1152786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152789">SUSE bug 1152789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5332/">CVE-2010-5332 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-5332">CVE-2010-5332 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-18551/">CVE-2017-18551 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18551">CVE-2017-18551 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11477">CVE-2019-11477 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-14821/">CVE-2019-14821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14821">CVE-2019-14821 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15118/">CVE-2019-15118 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15118">CVE-2019-15118 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15212/">CVE-2019-15212 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15212">CVE-2019-15212 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15217/">CVE-2019-15217 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15217">CVE-2019-15217 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15219/">CVE-2019-15219 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15219">CVE-2019-15219 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15291">CVE-2019-15291 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15292/">CVE-2019-15292 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15292">CVE-2019-15292 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15807/">CVE-2019-15807 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15807">CVE-2019-15807 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16232">CVE-2019-16232 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16233">CVE-2019-16233 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16234">CVE-2019-16234 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17052/">CVE-2019-17052 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17052">CVE-2019-17052 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17053/">CVE-2019-17053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-17053">CVE-2019-17053 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-17054/">CVE-2019-17054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-17054">CVE-2019-17054 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17055/">CVE-2019-17055 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17055">CVE-2019-17055 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9456/">CVE-2019-9456 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9456">CVE-2019-9456 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992040" comment="kernel-default-2.6.32.54-0.164.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992041" comment="kernel-default-base-2.6.32.54-0.164.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992043" comment="kernel-source-2.6.32.54-0.164.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992044" comment="kernel-syms-2.6.32.54-0.164.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992045" comment="kernel-trace-2.6.32.54-0.164.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992046" comment="kernel-trace-base-2.6.32.54-0.164.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992048" comment="kernel-xen-2.6.32.54-0.164.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992049" comment="kernel-xen-base-2.6.32.54-0.164.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217295" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-source (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1146544" ref_url="https://bugzilla.suse.com/1146544" source="BUGZILLA"/>
		<reference ref_id="1154824" ref_url="https://bugzilla.suse.com/1154824" source="BUGZILLA"/>
		<reference ref_id="1157678" ref_url="https://bugzilla.suse.com/1157678" source="BUGZILLA"/>
		<reference ref_id="1157804" ref_url="https://bugzilla.suse.com/1157804" source="BUGZILLA"/>
		<reference ref_id="1158410" ref_url="https://bugzilla.suse.com/1158410" source="BUGZILLA"/>
		<reference ref_id="1158413" ref_url="https://bugzilla.suse.com/1158413" source="BUGZILLA"/>
		<reference ref_id="1158823" ref_url="https://bugzilla.suse.com/1158823" source="BUGZILLA"/>
		<reference ref_id="1158824" ref_url="https://bugzilla.suse.com/1158824" source="BUGZILLA"/>
		<reference ref_id="1158904" ref_url="https://bugzilla.suse.com/1158904" source="BUGZILLA"/>
		<reference ref_id="1159841" ref_url="https://bugzilla.suse.com/1159841" source="BUGZILLA"/>
		<reference ref_id="1159908" ref_url="https://bugzilla.suse.com/1159908" source="BUGZILLA"/>
		<reference ref_id="1159911" ref_url="https://bugzilla.suse.com/1159911" source="BUGZILLA"/>
		<reference ref_id="1162928" ref_url="https://bugzilla.suse.com/1162928" source="BUGZILLA"/>
		<reference ref_id="1162929" ref_url="https://bugzilla.suse.com/1162929" source="BUGZILLA"/>
		<reference ref_id="1162931" ref_url="https://bugzilla.suse.com/1162931" source="BUGZILLA"/>
		<reference ref_id="1165111" ref_url="https://bugzilla.suse.com/1165111" source="BUGZILLA"/>
		<reference ref_id="1168075" ref_url="https://bugzilla.suse.com/1168075" source="BUGZILLA"/>
		<reference ref_id="1168829" ref_url="https://bugzilla.suse.com/1168829" source="BUGZILLA"/>
		<reference ref_id="1168854" ref_url="https://bugzilla.suse.com/1168854" source="BUGZILLA"/>
		<reference ref_id="1171218" ref_url="https://bugzilla.suse.com/1171218" source="BUGZILLA"/>
		<reference ref_id="1171219" ref_url="https://bugzilla.suse.com/1171219" source="BUGZILLA"/>
		<reference ref_id="1171220" ref_url="https://bugzilla.suse.com/1171220" source="BUGZILLA"/>
		<reference ref_id="1172775" ref_url="https://bugzilla.suse.com/1172775" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-15213" ref_url="https://www.suse.com/security/cve/CVE-2019-15213/" source="CVE"/>
		<reference ref_id="CVE-2019-18675" ref_url="https://www.suse.com/security/cve/CVE-2019-18675/" source="CVE"/>
		<reference ref_id="CVE-2019-19227" ref_url="https://www.suse.com/security/cve/CVE-2019-19227/" source="CVE"/>
		<reference ref_id="CVE-2019-19523" ref_url="https://www.suse.com/security/cve/CVE-2019-19523/" source="CVE"/>
		<reference ref_id="CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524/" source="CVE"/>
		<reference ref_id="CVE-2019-19530" ref_url="https://www.suse.com/security/cve/CVE-2019-19530/" source="CVE"/>
		<reference ref_id="CVE-2019-19532" ref_url="https://www.suse.com/security/cve/CVE-2019-19532/" source="CVE"/>
		<reference ref_id="CVE-2019-19537" ref_url="https://www.suse.com/security/cve/CVE-2019-19537/" source="CVE"/>
		<reference ref_id="CVE-2019-19965" ref_url="https://www.suse.com/security/cve/CVE-2019-19965/" source="CVE"/>
		<reference ref_id="CVE-2019-19966" ref_url="https://www.suse.com/security/cve/CVE-2019-19966/" source="CVE"/>
		<reference ref_id="CVE-2019-20096" ref_url="https://www.suse.com/security/cve/CVE-2019-20096/" source="CVE"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732/" source="CVE"/>
		<reference ref_id="CVE-2020-11608" ref_url="https://www.suse.com/security/cve/CVE-2020-11608/" source="CVE"/>
		<reference ref_id="CVE-2020-11609" ref_url="https://www.suse.com/security/cve/CVE-2020-11609/" source="CVE"/>
		<reference ref_id="CVE-2020-12652" ref_url="https://www.suse.com/security/cve/CVE-2020-12652/" source="CVE"/>
		<reference ref_id="CVE-2020-12656" ref_url="https://www.suse.com/security/cve/CVE-2020-12656/" source="CVE"/>
		<reference ref_id="CVE-2020-13974" ref_url="https://www.suse.com/security/cve/CVE-2020-13974/" source="CVE"/>
		<reference ref_id="CVE-2020-8647" ref_url="https://www.suse.com/security/cve/CVE-2020-8647/" source="CVE"/>
		<reference ref_id="CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648/" source="CVE"/>
		<reference ref_id="CVE-2020-8649" ref_url="https://www.suse.com/security/cve/CVE-2020-8649/" source="CVE"/>
		<reference ref_id="CVE-2020-9383" ref_url="https://www.suse.com/security/cve/CVE-2020-9383/" source="CVE"/>
		<description>
The SUSE Linux Enterpise Server 11 SP1 Kernel for Teradata was updated to receive the following fixes:

Fixed security issues:

- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it. 
  This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii was called several times in a row (bsc#1172775)
- CVE-2020-10732: A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account
  to crash a trivial program and exfiltrate private kernel data (bsc#1171220)
- CVE-2020-12656: gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks
  certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already
  available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user
  could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug (bsc#1171219)
- CVE-2020-12652: The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an
  incorrect lock during the ioctl operation and trigger a race condition, i.e., a 'double fetch' vulnerability, aka CID-28d76df18f0a (bsc#1171218)
- CVE-2020-11609: An issue was discovered in the stv06xx subsystem in the Linux kernel before 5.6.1. drivers/media/usb/gspca/stv06xx/stv06xx.c and
  drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid descriptors, as demonstrated by a NULL pointer dereference, aka CID-485b06aadb93.
  (bsc#1168854)
- CVE-2020-11608: An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences
  in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d (bsc#1168829)
- CVE-2020-8648: There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function
  in drivers/tty/n_tty.c (bsc#1162928)
- CVE-2020-8647: There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c
  (bsc#1162929)
- CVE-2020-8649: There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in
  drivers/video/console/vgacon.c (bsc#1162931)
- CVE-2020-9383: An issue was discovered in the Linux kernel through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready
  out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2 (bsc#1165111)
- CVE-2019-18675: he Linux kernel through 5.3.13 has a start_offset+size Integer Overflow in cpia2_remap_buffer in
  drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allows local users
  (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in
  a privilege escalation (bsc#1157804)
- CVE-2019-19965: In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because
  of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5 (bsc#1159911)
- CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091: Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers
  on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure
  via a side channel with local access (bsc#1111331)
- CVE-2019-11135: TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated
  user to potentially enable information disclosure via a side channel with local access (bsc#1139073)
- CVE-2019-20096: In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which may
  cause denial of service, aka CID-1d3ff0950e2b (bsc#1159908)
- CVE-2019-19966: In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c
  that will cause denial of service, aka CID-dea37a972655 (bsc#1159841)
- CVE-2019-19532: In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious
  USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95 (bsc#1158824)
- CVE-2019-19537: In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in
  the USB character device driver layer, aka CID-303911cfc5b9 (bsc#1158904)
- CVE-2019-19523: In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in
  the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79 (bsc#1158823)
- CVE-2019-19530: In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in
  the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef (bsc#1158410)
- CVE-2019-19524: In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in
  the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9 (bsc#1158413)
- CVE-2019-15213: An issue was discovered in the Linux kernel before 5.2.3. There is a use-after-free caused by a malicious USB
  device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver (bsc#1146544)

Regular bug fixes:

- Input: add safety guards to input_set_keycode() (bsc#1168075)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-29"/>
	<updated date="2020-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146544">SUSE bug 1146544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157678">SUSE bug 1157678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157804">SUSE bug 1157804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158410">SUSE bug 1158410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158413">SUSE bug 1158413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158823">SUSE bug 1158823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158824">SUSE bug 1158824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158904">SUSE bug 1158904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159841">SUSE bug 1159841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159908">SUSE bug 1159908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159911">SUSE bug 1159911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162928">SUSE bug 1162928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162929">SUSE bug 1162929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162931">SUSE bug 1162931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165111">SUSE bug 1165111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168075">SUSE bug 1168075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168829">SUSE bug 1168829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168854">SUSE bug 1168854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171218">SUSE bug 1171218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171219">SUSE bug 1171219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171220">SUSE bug 1171220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172775">SUSE bug 1172775</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15213/">CVE-2019-15213 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15213">CVE-2019-15213 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18675/">CVE-2019-18675 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18675">CVE-2019-18675 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19227/">CVE-2019-19227 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19227">CVE-2019-19227 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19523/">CVE-2019-19523 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19523">CVE-2019-19523 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19524">CVE-2019-19524 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19530/">CVE-2019-19530 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19530">CVE-2019-19530 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19532/">CVE-2019-19532 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19532">CVE-2019-19532 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19537/">CVE-2019-19537 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19537">CVE-2019-19537 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19965/">CVE-2019-19965 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19965">CVE-2019-19965 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19966/">CVE-2019-19966 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19966">CVE-2019-19966 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20096/">CVE-2019-20096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20096">CVE-2019-20096 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10732">CVE-2020-10732 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11608/">CVE-2020-11608 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11608">CVE-2020-11608 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11609/">CVE-2020-11609 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11609">CVE-2020-11609 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12652/">CVE-2020-12652 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12652">CVE-2020-12652 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12656/">CVE-2020-12656 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12656">CVE-2020-12656 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13974/">CVE-2020-13974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13974">CVE-2020-13974 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8647/">CVE-2020-8647 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8647">CVE-2020-8647 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8648">CVE-2020-8648 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8649/">CVE-2020-8649 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8649">CVE-2020-8649 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9383/">CVE-2020-9383 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9383">CVE-2020-9383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992051" comment="kernel-default-2.6.32.54-0.169.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992052" comment="kernel-default-base-2.6.32.54-0.169.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992054" comment="kernel-source-2.6.32.54-0.169.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992055" comment="kernel-syms-2.6.32.54-0.169.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992056" comment="kernel-trace-2.6.32.54-0.169.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992057" comment="kernel-trace-base-2.6.32.54-0.169.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992059" comment="kernel-xen-2.6.32.54-0.169.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992060" comment="kernel-xen-base-2.6.32.54-0.169.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217296" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1121826" ref_url="https://bugzilla.suse.com/1121826" source="BUGZILLA"/>
		<reference ref_id="1121872" ref_url="https://bugzilla.suse.com/1121872" source="BUGZILLA"/>
		<reference ref_id="1139358" ref_url="https://bugzilla.suse.com/1139358" source="BUGZILLA"/>
		<reference ref_id="1151347" ref_url="https://bugzilla.suse.com/1151347" source="BUGZILLA"/>
		<reference ref_id="1152107" ref_url="https://bugzilla.suse.com/1152107" source="BUGZILLA"/>
		<reference ref_id="1162002" ref_url="https://bugzilla.suse.com/1162002" source="BUGZILLA"/>
		<reference ref_id="1172999" ref_url="https://bugzilla.suse.com/1172999" source="BUGZILLA"/>
		<reference ref_id="1173265" ref_url="https://bugzilla.suse.com/1173265" source="BUGZILLA"/>
		<reference ref_id="1174462" ref_url="https://bugzilla.suse.com/1174462" source="BUGZILLA"/>
		<reference ref_id="1174993" ref_url="https://bugzilla.suse.com/1174993" source="BUGZILLA"/>
		<reference ref_id="1176011" ref_url="https://bugzilla.suse.com/1176011" source="BUGZILLA"/>
		<reference ref_id="1176235" ref_url="https://bugzilla.suse.com/1176235" source="BUGZILLA"/>
		<reference ref_id="1176278" ref_url="https://bugzilla.suse.com/1176278" source="BUGZILLA"/>
		<reference ref_id="1176423" ref_url="https://bugzilla.suse.com/1176423" source="BUGZILLA"/>
		<reference ref_id="1176722" ref_url="https://bugzilla.suse.com/1176722" source="BUGZILLA"/>
		<reference ref_id="1177206" ref_url="https://bugzilla.suse.com/1177206" source="BUGZILLA"/>
		<reference ref_id="1177766" ref_url="https://bugzilla.suse.com/1177766" source="BUGZILLA"/>
		<reference ref_id="1178123" ref_url="https://bugzilla.suse.com/1178123" source="BUGZILLA"/>
		<reference ref_id="1178182" ref_url="https://bugzilla.suse.com/1178182" source="BUGZILLA"/>
		<reference ref_id="1178589" ref_url="https://bugzilla.suse.com/1178589" source="BUGZILLA"/>
		<reference ref_id="1178590" ref_url="https://bugzilla.suse.com/1178590" source="BUGZILLA"/>
		<reference ref_id="1178886" ref_url="https://bugzilla.suse.com/1178886" source="BUGZILLA"/>
		<reference ref_id="1179140" ref_url="https://bugzilla.suse.com/1179140" source="BUGZILLA"/>
		<reference ref_id="1179601" ref_url="https://bugzilla.suse.com/1179601" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1125" ref_url="https://www.suse.com/security/cve/CVE-2019-1125/" source="CVE"/>
		<reference ref_id="CVE-2019-16413" ref_url="https://www.suse.com/security/cve/CVE-2019-16413/" source="CVE"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133/" source="CVE"/>
		<reference ref_id="CVE-2020-0305" ref_url="https://www.suse.com/security/cve/CVE-2020-0305/" source="CVE"/>
		<reference ref_id="CVE-2020-0404" ref_url="https://www.suse.com/security/cve/CVE-2020-0404/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-10769" ref_url="https://www.suse.com/security/cve/CVE-2020-10769/" source="CVE"/>
		<reference ref_id="CVE-2020-10773" ref_url="https://www.suse.com/security/cve/CVE-2020-10773/" source="CVE"/>
		<reference ref_id="CVE-2020-14353" ref_url="https://www.suse.com/security/cve/CVE-2020-14353/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14390" ref_url="https://www.suse.com/security/cve/CVE-2020-14390/" source="CVE"/>
		<reference ref_id="CVE-2020-14416" ref_url="https://www.suse.com/security/cve/CVE-2020-14416/" source="CVE"/>
		<reference ref_id="CVE-2020-15437" ref_url="https://www.suse.com/security/cve/CVE-2020-15437/" source="CVE"/>
		<reference ref_id="CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643/" source="CVE"/>
		<reference ref_id="CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656/" source="CVE"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25669" ref_url="https://www.suse.com/security/cve/CVE-2020-25669/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28915" ref_url="https://www.suse.com/security/cve/CVE-2020-28915/" source="CVE"/>
		<reference ref_id="CVE-2020-28974" ref_url="https://www.suse.com/security/cve/CVE-2020-28974/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP1 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-1125: Fixed SWAPGS speculative execution (bsc#1139358).
- CVE-2019-16413: Fixed an improper check of i_size_write() which caused i_size_read() infinite loop and denial of service on SMP systems (bsc#1151347).
- CVE-2019-16746: Fixed an improper check of the length of variable elements in a beacon head, leading to a buffer overflow (bsc#1152107).
- CVE-2019-6133: Fixed an issue where the 'start time' protection mechanism could have been bypassed and therefore authorization decisions are improperly cached (bsc#1128172).
- CVE-2020-0305: Fixed a race condition which could have led to local escalation of privilege (bsc#1174462).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-10769: Fixed a buffer over-read in the IPsec Cryptographic algorithm's module, authenc. This flaw allowed a local attacker with user privileges to cause a denial of service (bsc#1173265).
- CVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bsc#1172999).
- CVE-2020-14353: Fixed an issue where keys - for keyctl prevent creating a different user's keyrings (bsc#1174993).
- CVE-2020-14381: Fixed requeue paths such that filp was valid when dropping the references (bsc#1176011).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bsc#1176235).
- CVE-2020-14416: Fixed a race condition in tty-&gt;disc_data handling in the slip and slcan line discipline which could have led to a use-after-free (bsc#1162002).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service(bsc#1179140). 
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bsc#1177766).
- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-27786: Fixed a use after free in kernel midi subsystem snd_rawmidi_kernel_read1() (bsc#1179601).
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon (bsc#1178589).
- net/x25: prevent a couple of overflows (bsc#1178590).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-18"/>
	<updated date="2020-12-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1121826">SUSE bug 1121826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121872">SUSE bug 1121872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139358">SUSE bug 1139358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151347">SUSE bug 1151347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152107">SUSE bug 1152107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162002">SUSE bug 1162002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172999">SUSE bug 1172999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173265">SUSE bug 1173265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174462">SUSE bug 1174462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174993">SUSE bug 1174993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176011">SUSE bug 1176011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176235">SUSE bug 1176235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176278">SUSE bug 1176278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176423">SUSE bug 1176423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176722">SUSE bug 1176722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177206">SUSE bug 1177206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177766">SUSE bug 1177766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178123">SUSE bug 1178123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178182">SUSE bug 1178182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178589">SUSE bug 1178589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178590">SUSE bug 1178590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178886">SUSE bug 1178886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179140">SUSE bug 1179140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179601">SUSE bug 1179601</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1125/">CVE-2019-1125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1125">CVE-2019-1125 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16413/">CVE-2019-16413 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-16413">CVE-2019-16413 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16746">CVE-2019-16746 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6133">CVE-2019-6133 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0305/">CVE-2020-0305 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0305">CVE-2020-0305 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0404/">CVE-2020-0404 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0404">CVE-2020-0404 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0431">CVE-2020-0431 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10769/">CVE-2020-10769 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10769">CVE-2020-10769 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10773/">CVE-2020-10773 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10773">CVE-2020-10773 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14353/">CVE-2020-14353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-14353">CVE-2020-14353 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14381">CVE-2020-14381 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14390/">CVE-2020-14390 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14390">CVE-2020-14390 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14416/">CVE-2020-14416 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14416">CVE-2020-14416 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15437/">CVE-2020-15437 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15437">CVE-2020-15437 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25643">CVE-2020-25643 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25656">CVE-2020-25656 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25668">CVE-2020-25668 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25669/">CVE-2020-25669 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25669">CVE-2020-25669 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27786">CVE-2020-27786 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28915/">CVE-2020-28915 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28915">CVE-2020-28915 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28974/">CVE-2020-28974 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28974">CVE-2020-28974 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992062" comment="kernel-default-2.6.32.54-0.172.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992063" comment="kernel-default-base-2.6.32.54-0.172.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992065" comment="kernel-source-2.6.32.54-0.172.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992066" comment="kernel-syms-2.6.32.54-0.172.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992067" comment="kernel-trace-2.6.32.54-0.172.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992068" comment="kernel-trace-base-2.6.32.54-0.172.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992070" comment="kernel-xen-2.6.32.54-0.172.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992071" comment="kernel-xen-base-2.6.32.54-0.172.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217297" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1176395" ref_url="https://bugzilla.suse.com/1176395" source="BUGZILLA"/>
		<reference ref_id="1179601" ref_url="https://bugzilla.suse.com/1179601" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1180029" ref_url="https://bugzilla.suse.com/1180029" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180052" ref_url="https://bugzilla.suse.com/1180052" source="BUGZILLA"/>
		<reference ref_id="1180086" ref_url="https://bugzilla.suse.com/1180086" source="BUGZILLA"/>
		<reference ref_id="1181349" ref_url="https://bugzilla.suse.com/1181349" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211/" source="CVE"/>
		<reference ref_id="CVE-2020-27068" ref_url="https://www.suse.com/security/cve/CVE-2020-27068/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP1 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).
- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).

The following non-security bugs were fixed:

- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176395">SUSE bug 1176395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179601">SUSE bug 1179601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180029">SUSE bug 1180029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180052">SUSE bug 1180052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180086">SUSE bug 1180086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181349">SUSE bug 1181349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0465">CVE-2020-0465 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25211">CVE-2020-25211 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27068/">CVE-2020-27068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27068">CVE-2020-27068 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27786">CVE-2020-27786 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3347">CVE-2021-3347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992073" comment="kernel-default-2.6.32.54-0.175.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992074" comment="kernel-default-base-2.6.32.54-0.175.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992076" comment="kernel-source-2.6.32.54-0.175.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992077" comment="kernel-syms-2.6.32.54-0.175.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992078" comment="kernel-trace-2.6.32.54-0.175.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992079" comment="kernel-trace-base-2.6.32.54-0.175.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992081" comment="kernel-xen-2.6.32.54-0.175.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992082" comment="kernel-xen-base-2.6.32.54-0.175.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217298" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-source (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1179745" ref_url="https://bugzilla.suse.com/1179745" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP1 Kernel was updated to receive the following changes:

- CVE-2020-29660: A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through
  5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID,
  aka CID-c8bcd9c5be24 (bsc#1179745)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992084" comment="kernel-default-2.6.32.54-0.178.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992085" comment="kernel-default-base-2.6.32.54-0.178.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992087" comment="kernel-source-2.6.32.54-0.178.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992088" comment="kernel-syms-2.6.32.54-0.178.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992089" comment="kernel-trace-2.6.32.54-0.178.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992090" comment="kernel-trace-base-2.6.32.54-0.178.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992092" comment="kernel-xen-2.6.32.54-0.178.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992093" comment="kernel-xen-base-2.6.32.54-0.178.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217299" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1171420" ref_url="https://bugzilla.suse.com/1171420" source="BUGZILLA"/>
		<reference ref_id="1182715" ref_url="https://bugzilla.suse.com/1182715" source="BUGZILLA"/>
		<reference ref_id="1182716" ref_url="https://bugzilla.suse.com/1182716" source="BUGZILLA"/>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183089" ref_url="https://bugzilla.suse.com/1183089" source="BUGZILLA"/>
		<reference ref_id="1183400" ref_url="https://bugzilla.suse.com/1183400" source="BUGZILLA"/>
		<reference ref_id="1183696" ref_url="https://bugzilla.suse.com/1183696" source="BUGZILLA"/>
		<reference ref_id="1184198" ref_url="https://bugzilla.suse.com/1184198" source="BUGZILLA"/>
		<reference ref_id="1184211" ref_url="https://bugzilla.suse.com/1184211" source="BUGZILLA"/>
		<reference ref_id="1184611" ref_url="https://bugzilla.suse.com/1184611" source="BUGZILLA"/>
		<reference ref_id="1185859" ref_url="https://bugzilla.suse.com/1185859" source="BUGZILLA"/>
		<reference ref_id="1185862" ref_url="https://bugzilla.suse.com/1185862" source="BUGZILLA"/>
		<reference ref_id="1186062" ref_url="https://bugzilla.suse.com/1186062" source="BUGZILLA"/>
		<reference ref_id="1186109" ref_url="https://bugzilla.suse.com/1186109" source="BUGZILLA"/>
		<reference ref_id="1187038" ref_url="https://bugzilla.suse.com/1187038" source="BUGZILLA"/>
		<reference ref_id="1187215" ref_url="https://bugzilla.suse.com/1187215" source="BUGZILLA"/>
		<reference ref_id="1187452" ref_url="https://bugzilla.suse.com/1187452" source="BUGZILLA"/>
		<reference ref_id="1188563" ref_url="https://bugzilla.suse.com/1188563" source="BUGZILLA"/>
		<reference ref_id="1188601" ref_url="https://bugzilla.suse.com/1188601" source="BUGZILLA"/>
		<reference ref_id="1189057" ref_url="https://bugzilla.suse.com/1189057" source="BUGZILLA"/>
		<reference ref_id="1190025" ref_url="https://bugzilla.suse.com/1190025" source="BUGZILLA"/>
		<reference ref_id="1190351" ref_url="https://bugzilla.suse.com/1190351" source="BUGZILLA"/>
		<reference ref_id="1191315" ref_url="https://bugzilla.suse.com/1191315" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1192117" ref_url="https://bugzilla.suse.com/1192117" source="BUGZILLA"/>
		<reference ref_id="1193157" ref_url="https://bugzilla.suse.com/1193157" source="BUGZILLA"/>
		<reference ref_id="1193669" ref_url="https://bugzilla.suse.com/1193669" source="BUGZILLA"/>
		<reference ref_id="1194272" ref_url="https://bugzilla.suse.com/1194272" source="BUGZILLA"/>
		<reference ref_id="905100" ref_url="https://bugzilla.suse.com/905100" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-7841" ref_url="https://www.suse.com/security/cve/CVE-2014-7841/" source="CVE"/>
		<reference ref_id="CVE-2019-0136" ref_url="https://www.suse.com/security/cve/CVE-2019-0136/" source="CVE"/>
		<reference ref_id="CVE-2020-24586" ref_url="https://www.suse.com/security/cve/CVE-2020-24586/" source="CVE"/>
		<reference ref_id="CVE-2020-24587" ref_url="https://www.suse.com/security/cve/CVE-2020-24587/" source="CVE"/>
		<reference ref_id="CVE-2020-26139" ref_url="https://www.suse.com/security/cve/CVE-2020-26139/" source="CVE"/>
		<reference ref_id="CVE-2020-35519" ref_url="https://www.suse.com/security/cve/CVE-2020-35519/" source="CVE"/>
		<reference ref_id="CVE-2020-36386" ref_url="https://www.suse.com/security/cve/CVE-2020-36386/" source="CVE"/>
		<reference ref_id="CVE-2021-20261" ref_url="https://www.suse.com/security/cve/CVE-2021-20261/" source="CVE"/>
		<reference ref_id="CVE-2021-20265" ref_url="https://www.suse.com/security/cve/CVE-2021-20265/" source="CVE"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="CVE-2021-28972" ref_url="https://www.suse.com/security/cve/CVE-2021-28972/" source="CVE"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33033" ref_url="https://www.suse.com/security/cve/CVE-2021-33033/" source="CVE"/>
		<reference ref_id="CVE-2021-34693" ref_url="https://www.suse.com/security/cve/CVE-2021-34693/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-3655" ref_url="https://www.suse.com/security/cve/CVE-2021-3655/" source="CVE"/>
		<reference ref_id="CVE-2021-3679" ref_url="https://www.suse.com/security/cve/CVE-2021-3679/" source="CVE"/>
		<reference ref_id="CVE-2021-37159" ref_url="https://www.suse.com/security/cve/CVE-2021-37159/" source="CVE"/>
		<reference ref_id="CVE-2021-3753" ref_url="https://www.suse.com/security/cve/CVE-2021-3753/" source="CVE"/>
		<reference ref_id="CVE-2021-3772" ref_url="https://www.suse.com/security/cve/CVE-2021-3772/" source="CVE"/>
		<reference ref_id="CVE-2021-4155" ref_url="https://www.suse.com/security/cve/CVE-2021-4155/" source="CVE"/>
		<reference ref_id="CVE-2021-42008" ref_url="https://www.suse.com/security/cve/CVE-2021-42008/" source="CVE"/>
		<reference ref_id="CVE-2021-43389" ref_url="https://www.suse.com/security/cve/CVE-2021-43389/" source="CVE"/>
		<description>
he SUSE Linux Enterprise 11 SP1 Kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2014-7841: Fixed denial of service via a malformed SCTP INIT chunk when ASCONF is used (bnc#905100).
- CVE-2019-0136: Fixed an insufficient access control which allow an unauthenticated user to execute a denial of service. (bsc#1193157)
- CVE-2020-24586: Fixed a bug that, under the right circumstances, allows to inject arbitrary network packets and/or exfiltrate user data when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP. (bsc#1185859)
- CVE-2020-24587: Fixed a bug that allows an adversary to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed. (bsc#1185862)
- CVE-2020-26139: Fixed a bug that allows an Access Point (AP) to forward EAPOL frames to other clients even though the sender has not yet successfully authenticated. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients. (bsc#1186062)
- CVE-2020-35519: Fixed an out-of-bounds memory access flaw found in x25_bind (bsc#1183696).
- CVE-2020-36386: Fixed an out-of-bounds read issue in hci_extended_inquiry_result_evt (bnc#1187038).
- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)
- CVE-2021-3655: Fixed a missing size validations on inbound SCTP packets, which may have allowed the kernel to read uninitialized memory (bsc#1188563).
- CVE-2021-3679: Fixed denial of service flaw in the Linux kernel tracing module functionality (bnc#1189057).
- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).
- CVE-2021-3772: Fixed invalid chunks in SCTP that may be used to remotely remove existing associations (bsc#1190351).
- CVE-2021-4155: Fixed a data leak flaw that allows a local attacker to leak data on the XFS filesystem. (bsc#1194272)
- CVE-2021-20261: Fixed a race condition in the implementation of the floppy disk drive controller driver software (bsc#1183400).
- CVE-2021-20265: Fixed denial of service by unprivileged local users via the the unix_stream_recvmsg function in the Linux kernel when a signal was pending (bnc#1183089).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716).
- CVE-2021-27364: Fixed an issue in drivers/scsi/scsi_transport_iscsi.c where an unprivileged user can craft Netlink messages (bnc#1182717).
- CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715).
- CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- CVE-2021-33033: Fixed a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled (bsc#1186109).
- CVE-2021-34693: Fixed leak of sensitive information from kernel stack memory via partially uninitialized data structures in net/can/bcm.c (bnc#1187452).
- CVE-2021-37159: Fixed use-after-free and a double free inside hso_free_net_device in drivers/net/usb/hso.c when unregister_netdev is called without checking for the NETREG_REGISTERED state (bnc#1188601).
- CVE-2021-42008: Fixed a slab out-of-bounds write in the decode_data function in drivers/net/hamradio/6pack.c. Input from a process that had the CAP_NET_ADMIN capability could have lead to root access (bsc#1191315).
- CVE-2021-43389: Fixed an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).

The following non-security bugs were fixed:

- fuse: fix bad inode (bsc#1184211).
- fuse: fix live lock in fuse_iget() (bsc#1184211).
- kernel/timeconst.pl: Fix error with current day perl (bsc#1192117).
- kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
- scsi: sg: add sg_remove_request in sg_write (bsc#1171420 CVE2020-12770).
- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).
- sctp: fix to check the source address of COOKIE-ECHO chunk (bsc#1188563).
- sctp: fully initialize v4 addr in some functions (bsc#1188563).
- sctp: simplify addr copy (bsc#1188563).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-01"/>
	<updated date="2022-02-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171420">SUSE bug 1171420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182715">SUSE bug 1182715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182716">SUSE bug 1182716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183089">SUSE bug 1183089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183400">SUSE bug 1183400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183696">SUSE bug 1183696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184198">SUSE bug 1184198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184211">SUSE bug 1184211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185859">SUSE bug 1185859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185862">SUSE bug 1185862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186062">SUSE bug 1186062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186109">SUSE bug 1186109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187038">SUSE bug 1187038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187215">SUSE bug 1187215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187452">SUSE bug 1187452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188563">SUSE bug 1188563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188601">SUSE bug 1188601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189057">SUSE bug 1189057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190025">SUSE bug 1190025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190351">SUSE bug 1190351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191315">SUSE bug 1191315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192117">SUSE bug 1192117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193157">SUSE bug 1193157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193669">SUSE bug 1193669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194272">SUSE bug 1194272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905100">SUSE bug 905100</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7841/">CVE-2014-7841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7841">CVE-2014-7841 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0136/">CVE-2019-0136 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0136">CVE-2019-0136 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24586/">CVE-2020-24586 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24586">CVE-2020-24586 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24587/">CVE-2020-24587 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24587">CVE-2020-24587 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26139/">CVE-2020-26139 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26139">CVE-2020-26139 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35519/">CVE-2020-35519 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35519">CVE-2020-35519 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36386/">CVE-2020-36386 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36386">CVE-2020-36386 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20261/">CVE-2021-20261 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20261">CVE-2021-20261 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20265/">CVE-2021-20265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20265">CVE-2021-20265 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28972/">CVE-2021-28972 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28972">CVE-2021-28972 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32399">CVE-2021-32399 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33033/">CVE-2021-33033 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33033">CVE-2021-33033 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34693/">CVE-2021-34693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34693">CVE-2021-34693 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3609">CVE-2021-3609 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3655/">CVE-2021-3655 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3655">CVE-2021-3655 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3679/">CVE-2021-3679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3679">CVE-2021-3679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37159/">CVE-2021-37159 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37159">CVE-2021-37159 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3753/">CVE-2021-3753 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3753">CVE-2021-3753 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3772/">CVE-2021-3772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3772">CVE-2021-3772 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4155/">CVE-2021-4155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4155">CVE-2021-4155 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42008/">CVE-2021-42008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42008">CVE-2021-42008 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43389/">CVE-2021-43389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43389">CVE-2021-43389 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992095" comment="kernel-default-2.6.32.54-0.181.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992096" comment="kernel-default-base-2.6.32.54-0.181.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992098" comment="kernel-source-2.6.32.54-0.181.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992099" comment="kernel-syms-2.6.32.54-0.181.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992100" comment="kernel-trace-2.6.32.54-0.181.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992101" comment="kernel-trace-base-2.6.32.54-0.181.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992103" comment="kernel-xen-2.6.32.54-0.181.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992104" comment="kernel-xen-base-2.6.32.54-0.181.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217300" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1087081" ref_url="https://bugzilla.suse.com/1087081" source="BUGZILLA"/>
		<reference ref_id="1087086" ref_url="https://bugzilla.suse.com/1087086" source="BUGZILLA"/>
		<reference ref_id="1098658" ref_url="https://bugzilla.suse.com/1098658" source="BUGZILLA"/>
		<reference ref_id="1099177" ref_url="https://bugzilla.suse.com/1099177" source="BUGZILLA"/>
		<reference ref_id="1100091" ref_url="https://bugzilla.suse.com/1100091" source="BUGZILLA"/>
		<reference ref_id="1102517" ref_url="https://bugzilla.suse.com/1102517" source="BUGZILLA"/>
		<reference ref_id="1103119" ref_url="https://bugzilla.suse.com/1103119" source="BUGZILLA"/>
		<reference ref_id="1104684" ref_url="https://bugzilla.suse.com/1104684" source="BUGZILLA"/>
		<reference ref_id="1104818" ref_url="https://bugzilla.suse.com/1104818" source="BUGZILLA"/>
		<reference ref_id="1105296" ref_url="https://bugzilla.suse.com/1105296" source="BUGZILLA"/>
		<reference ref_id="1105322" ref_url="https://bugzilla.suse.com/1105322" source="BUGZILLA"/>
		<reference ref_id="1105536" ref_url="https://bugzilla.suse.com/1105536" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-14734" ref_url="https://www.suse.com/security/cve/CVE-2018-14734/" source="CVE"/>
		<reference ref_id="CVE-2018-15572" ref_url="https://www.suse.com/security/cve/CVE-2018-15572/" source="CVE"/>
		<reference ref_id="CVE-2018-3620" ref_url="https://www.suse.com/security/cve/CVE-2018-3620/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<description>


The SUSE Linux Enterprise 11 SP1 TD kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-15572: The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c did not always fill RSB upon a context switch, which made it easier for attackers to conduct userspace-userspace spectreRSB attacks (bnc#1102517 bnc#1105296).
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation (bnc#1105322).
- CVE-2018-3620: Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis (bnc#1087081).
- CVE-2018-14734: drivers/infiniband/core/ucma.c kernel allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).
- CVE-2018-3665: System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel. (bnc#1087086)

The following non-security bugs were fixed:

- Fixup X86_FEATURE_EAGER_FPU definition and use a unique bit.
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- module/retpoline: Warn about missing retpoline in module (bnc#1099177).
- x64/entry: move ENABLE_IBRS after switching from trampoline stack (bsc#1098658).
- x86/cpu/bugs: Make retpoline module warning conditional (bnc#1099177).
- x86/fpu: fix signal handling with eager FPU switching (bsc#1100091).
- x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).
- x86/mm: Simplify p[g4um]d_page() macros (bnc#1087081, bnc#1104684).
- x86, ptrace: Remove set_stopped_child_used_math() in [x]fpregs_set.
- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).
- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bnc#1105536).
- x86/traps: Fix bad_iret_stack in fixup_bad_iret() (bsc#1098658).
- xen x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- xen: x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).
- xen x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-11"/>
	<updated date="2018-09-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087086">SUSE bug 1087086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098658">SUSE bug 1098658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099177">SUSE bug 1099177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100091">SUSE bug 1100091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102517">SUSE bug 1102517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103119">SUSE bug 1103119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104684">SUSE bug 1104684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104818">SUSE bug 1104818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105296">SUSE bug 1105296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105322">SUSE bug 1105322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105536">SUSE bug 1105536</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10902">CVE-2018-10902 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14734/">CVE-2018-14734 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14734">CVE-2018-14734 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15572/">CVE-2018-15572 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15572">CVE-2018-15572 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3620/">CVE-2018-3620 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3620">CVE-2018-3620 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3665">CVE-2018-3665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992106" comment="kernel-default-2.6.32.54-0.142.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992107" comment="kernel-default-base-2.6.32.54-0.142.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992109" comment="kernel-source-2.6.32.54-0.142.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992110" comment="kernel-syms-2.6.32.54-0.142.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992111" comment="kernel-trace-2.6.32.54-0.142.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992112" comment="kernel-trace-base-2.6.32.54-0.142.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992114" comment="kernel-xen-2.6.32.54-0.142.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992115" comment="kernel-xen-base-2.6.32.54-0.142.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217301" version="1" class="patch">
	<metadata>
		<title>Security update for krb5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="612890" ref_url="https://bugzilla.suse.com/612890" source="BUGZILLA"/>
		<reference ref_id="650650" ref_url="https://bugzilla.suse.com/650650" source="BUGZILLA"/>
		<reference ref_id="663619" ref_url="https://bugzilla.suse.com/663619" source="BUGZILLA"/>
		<reference ref_id="698471" ref_url="https://bugzilla.suse.com/698471" source="BUGZILLA"/>
		<reference ref_id="738632" ref_url="https://bugzilla.suse.com/738632" source="BUGZILLA"/>
		<reference ref_id="787272" ref_url="https://bugzilla.suse.com/787272" source="BUGZILLA"/>
		<reference ref_id="806715" ref_url="https://bugzilla.suse.com/806715" source="BUGZILLA"/>
		<reference ref_id="825985" ref_url="https://bugzilla.suse.com/825985" source="BUGZILLA"/>
		<reference ref_id="849240" ref_url="https://bugzilla.suse.com/849240" source="BUGZILLA"/>
		<reference ref_id="886016" ref_url="https://bugzilla.suse.com/886016" source="BUGZILLA"/>
		<reference ref_id="888697" ref_url="https://bugzilla.suse.com/888697" source="BUGZILLA"/>
		<reference ref_id="891082" ref_url="https://bugzilla.suse.com/891082" source="BUGZILLA"/>
		<reference ref_id="CVE-2002-2443" ref_url="https://www.suse.com/security/cve/CVE-2002-2443/" source="CVE"/>
		<reference ref_id="CVE-2010-1323" ref_url="https://www.suse.com/security/cve/CVE-2010-1323/" source="CVE"/>
		<reference ref_id="CVE-2010-1324" ref_url="https://www.suse.com/security/cve/CVE-2010-1324/" source="CVE"/>
		<reference ref_id="CVE-2010-4020" ref_url="https://www.suse.com/security/cve/CVE-2010-4020/" source="CVE"/>
		<reference ref_id="CVE-2010-4021" ref_url="https://www.suse.com/security/cve/CVE-2010-4021/" source="CVE"/>
		<reference ref_id="CVE-2011-0281" ref_url="https://www.suse.com/security/cve/CVE-2011-0281/" source="CVE"/>
		<reference ref_id="CVE-2011-0282" ref_url="https://www.suse.com/security/cve/CVE-2011-0282/" source="CVE"/>
		<reference ref_id="CVE-2011-4862" ref_url="https://www.suse.com/security/cve/CVE-2011-4862/" source="CVE"/>
		<reference ref_id="CVE-2013-1415" ref_url="https://www.suse.com/security/cve/CVE-2013-1415/" source="CVE"/>
		<reference ref_id="CVE-2013-1418" ref_url="https://www.suse.com/security/cve/CVE-2013-1418/" source="CVE"/>
		<reference ref_id="CVE-2014-4341" ref_url="https://www.suse.com/security/cve/CVE-2014-4341/" source="CVE"/>
		<reference ref_id="CVE-2014-4342" ref_url="https://www.suse.com/security/cve/CVE-2014-4342/" source="CVE"/>
		<reference ref_id="CVE-2014-4343" ref_url="https://www.suse.com/security/cve/CVE-2014-4343/" source="CVE"/>
		<reference ref_id="CVE-2014-4344" ref_url="https://www.suse.com/security/cve/CVE-2014-4344/" source="CVE"/>
		<reference ref_id="CVE-2014-4345" ref_url="https://www.suse.com/security/cve/CVE-2014-4345/" source="CVE"/>
		<description>

This MIT krb5 update fixes a buffer overrun problem in kadmind:

    * bnc#891082: buffer overrun in kadmind with LDAP back end
      (MITKRB5-SA-2014-001) (CVE-2014-4345)

MIT krb5 Security Advisory 2014-001

    * http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2014-001.txt

Security Issues:

    * CVE-2014-4345
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-12"/>
	<updated date="2014-08-12"/>
	<bugzilla href="https://bugzilla.suse.com/612890">SUSE bug 612890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/650650">SUSE bug 650650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/663619">SUSE bug 663619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698471">SUSE bug 698471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/738632">SUSE bug 738632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787272">SUSE bug 787272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806715">SUSE bug 806715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825985">SUSE bug 825985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849240">SUSE bug 849240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886016">SUSE bug 886016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888697">SUSE bug 888697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891082">SUSE bug 891082</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2002-2443/">CVE-2002-2443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2002-2443">CVE-2002-2443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1323/">CVE-2010-1323 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1323">CVE-2010-1323 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1324/">CVE-2010-1324 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1324">CVE-2010-1324 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4020/">CVE-2010-4020 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2010-4020">CVE-2010-4020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4021/">CVE-2010-4021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4021">CVE-2010-4021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0281/">CVE-2011-0281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0281">CVE-2011-0281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0282/">CVE-2011-0282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0282">CVE-2011-0282 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4862/">CVE-2011-4862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4862">CVE-2011-4862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1415/">CVE-2013-1415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1415">CVE-2013-1415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1418/">CVE-2013-1418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1418">CVE-2013-1418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4341/">CVE-2014-4341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4341">CVE-2014-4341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4342/">CVE-2014-4342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4342">CVE-2014-4342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4343/">CVE-2014-4343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4343">CVE-2014-4343 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4344/">CVE-2014-4344 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4344">CVE-2014-4344 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4345/">CVE-2014-4345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4345">CVE-2014-4345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992117" comment="krb5-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566761" comment="krb5-32bit-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992118" comment="krb5-apps-clients-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992119" comment="krb5-apps-servers-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992120" comment="krb5-client-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572175" comment="krb5-doc-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572176" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572177" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992121" comment="krb5-server-1.6.3-133.49.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217302" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="952188" ref_url="https://bugzilla.suse.com/952188" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<description>
krb5 was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-2695: Applications which call gss_inquire_context() on a partially-established SPNEGO context could have caused the GSS-API library to read from a pointer using the wrong type, generally causing a process crash (bsc#952188).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-30"/>
	<updated date="2015-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/952188">SUSE bug 952188</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2695">CVE-2015-2695 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572180" comment="krb5-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566764" comment="krb5-32bit-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572181" comment="krb5-apps-clients-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572182" comment="krb5-apps-servers-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572183" comment="krb5-client-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572184" comment="krb5-doc-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572185" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572186" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572187" comment="krb5-server-1.6.3-133.49.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217303" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="954270" ref_url="https://bugzilla.suse.com/954270" source="BUGZILLA"/>
		<reference ref_id="954470" ref_url="https://bugzilla.suse.com/954470" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<description>
The krb5 package was updated to fix the following security and non security issues:

- CVE-2015-2695: Fixed missing functions that were still vulnerable (bsc#954270).
- Fixed a memory leak in the handling of error messages (bsc#954470). 
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-17"/>
	<updated date="2015-12-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954270">SUSE bug 954270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954470">SUSE bug 954470</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2695">CVE-2015-2695 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572188" comment="krb5-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566767" comment="krb5-32bit-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572189" comment="krb5-apps-clients-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572190" comment="krb5-apps-servers-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572191" comment="krb5-client-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572192" comment="krb5-server-1.6.3-133.49.103.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217304" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="963968" ref_url="https://bugzilla.suse.com/963968" source="BUGZILLA"/>
		<reference ref_id="963975" ref_url="https://bugzilla.suse.com/963975" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8629" ref_url="https://www.suse.com/security/cve/CVE-2015-8629/" source="CVE"/>
		<reference ref_id="CVE-2015-8631" ref_url="https://www.suse.com/security/cve/CVE-2015-8631/" source="CVE"/>
		<description>

This update for krb5 fixes the following issues:

- CVE-2015-8629: Information leak authenticated attackers with permissions to modify the database (bsc#963968)
- CVE-2015-8631: An authenticated attacker could have caused a memory leak in auditd by supplying a null principal name in request (bsc#963975)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-11"/>
	<updated date="2016-02-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/963968">SUSE bug 963968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963975">SUSE bug 963975</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8629/">CVE-2015-8629 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8629">CVE-2015-8629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8631/">CVE-2015-8631 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8631">CVE-2015-8631 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572193" comment="krb5-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567384" comment="krb5-32bit-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572194" comment="krb5-apps-clients-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572195" comment="krb5-apps-servers-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572196" comment="krb5-client-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572197" comment="krb5-server-1.6.3-133.49.106.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217305" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="971942" ref_url="https://bugzilla.suse.com/971942" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3119" ref_url="https://www.suse.com/security/cve/CVE-2016-3119/" source="CVE"/>
		<description>

This update for krb5 fixes the following security issue:

- CVE-2016-3119: An authenticated attacker with permission to modify a
  principal entry could have caused kadmind to dereference a null pointer
  by supplying an empty DB argument to the modify_principal command,
  if kadmind is configured to use the LDAP KDB module. (bsc#971942)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-18"/>
	<updated date="2016-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/971942">SUSE bug 971942</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3119/">CVE-2016-3119 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3119">CVE-2016-3119 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572198" comment="krb5-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572199" comment="krb5-32bit-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572200" comment="krb5-apps-clients-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572201" comment="krb5-apps-servers-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572202" comment="krb5-client-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572203" comment="krb5-server-1.6.3-133.49.109.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217306" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="770172" ref_url="https://bugzilla.suse.com/770172" source="BUGZILLA"/>
		<reference ref_id="816413" ref_url="https://bugzilla.suse.com/816413" source="BUGZILLA"/>
		<reference ref_id="918595" ref_url="https://bugzilla.suse.com/918595" source="BUGZILLA"/>
		<reference ref_id="952190" ref_url="https://bugzilla.suse.com/952190" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-1015" ref_url="https://www.suse.com/security/cve/CVE-2012-1015/" source="CVE"/>
		<reference ref_id="CVE-2013-1416" ref_url="https://www.suse.com/security/cve/CVE-2013-1416/" source="CVE"/>
		<reference ref_id="CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355/" source="CVE"/>
		<reference ref_id="CVE-2015-2697" ref_url="https://www.suse.com/security/cve/CVE-2015-2697/" source="CVE"/>
		<description>

This update for krb5 fixes the following issues:

- Incorrect string handling in build_principal_va can lead to DOS. (bsc#952190, CVE-2015-2697)
- Fix potential heap corruption and crash vulnerability described in MIT krb5 Security Advisory 2012-001. 
  (bsc#770172, CVE-2012-1015)
- Fix prep_reprocess_req NULL pointer deref. (bsc#816413, CVE-2013-1416)
- Fix Denial of service in krb5_read_message. (bsc#918595, CVE-2014-5355)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-12"/>
	<updated date="2017-05-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816413">SUSE bug 816413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918595">SUSE bug 918595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952190">SUSE bug 952190</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1015/">CVE-2012-1015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1015">CVE-2012-1015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1416/">CVE-2013-1416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1416">CVE-2013-1416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5355">CVE-2014-5355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2697/">CVE-2015-2697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2697">CVE-2015-2697 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572204" comment="krb5-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572205" comment="krb5-32bit-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572206" comment="krb5-apps-clients-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572207" comment="krb5-apps-servers-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572208" comment="krb5-client-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572209" comment="krb5-devel-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572210" comment="krb5-devel-32bit-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572211" comment="krb5-doc-1.8.6-133.49.121.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572212" comment="krb5-plugin-kdb-ldap-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572213" comment="krb5-plugin-preauth-pkinit-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572214" comment="krb5-server-1.8.6-133.49.121.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217307" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1025126" ref_url="https://bugzilla.suse.com/1025126" source="BUGZILLA"/>
		<reference ref_id="1049819" ref_url="https://bugzilla.suse.com/1049819" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11368" ref_url="https://www.suse.com/security/cve/CVE-2017-11368/" source="CVE"/>
		<description>
This update for krb5 fixes the following issues:

Security issues fixed:

- CVE-2017-11368: Fix an unintended assertion failure in KDC (bsc#1049819)


Also the openssl1 LDAP library build is now used for the LDAP plugin components. (bsc#1025126).

		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-07"/>
	<updated date="2017-09-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025126">SUSE bug 1025126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049819">SUSE bug 1049819</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11368/">CVE-2017-11368 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11368">CVE-2017-11368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572215" comment="krb5-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572216" comment="krb5-32bit-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572217" comment="krb5-apps-clients-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572218" comment="krb5-apps-servers-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572219" comment="krb5-client-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572220" comment="krb5-devel-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572221" comment="krb5-devel-32bit-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572222" comment="krb5-doc-1.8.6-133.49.125.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572223" comment="krb5-plugin-kdb-ldap-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572224" comment="krb5-plugin-preauth-pkinit-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572225" comment="krb5-server-1.8.6-133.49.125.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217308" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1056995" ref_url="https://bugzilla.suse.com/1056995" source="BUGZILLA"/>
		<reference ref_id="1065274" ref_url="https://bugzilla.suse.com/1065274" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11462" ref_url="https://www.suse.com/security/cve/CVE-2017-11462/" source="CVE"/>
		<reference ref_id="CVE-2017-15088" ref_url="https://www.suse.com/security/cve/CVE-2017-15088/" source="CVE"/>
		<description>
This update for krb5 fixes the following security issues:

- CVE-2017-15088: A buffer overflow in get_matching_data() was fixed that could under specific circumstances be used to execute code (bsc#1065274)
- CVE-2017-11462: Prevent automatic security context deletion to prevent double-free (bsc#1056995)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-02"/>
	<updated date="2017-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056995">SUSE bug 1056995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065274">SUSE bug 1065274</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11462/">CVE-2017-11462 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11462">CVE-2017-11462 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15088/">CVE-2017-15088 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15088">CVE-2017-15088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572226" comment="krb5-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572227" comment="krb5-32bit-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572228" comment="krb5-apps-clients-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572229" comment="krb5-apps-servers-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572230" comment="krb5-client-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572231" comment="krb5-devel-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572232" comment="krb5-devel-32bit-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572233" comment="krb5-doc-1.8.6-133.49.125.16.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572234" comment="krb5-plugin-kdb-ldap-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572235" comment="krb5-plugin-preauth-pkinit-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572236" comment="krb5-server-1.8.6-133.49.125.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217309" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1083926" ref_url="https://bugzilla.suse.com/1083926" source="BUGZILLA"/>
		<reference ref_id="1083927" ref_url="https://bugzilla.suse.com/1083927" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5729" ref_url="https://www.suse.com/security/cve/CVE-2018-5729/" source="CVE"/>
		<reference ref_id="CVE-2018-5730" ref_url="https://www.suse.com/security/cve/CVE-2018-5730/" source="CVE"/>
		<description>
This update for krb5 fixes the following issues:

Security issues fixed:

- CVE-2018-5729: Null pointer dereference in kadmind or DN container check bypass by supplying special crafted data (bsc#1083926).
- CVE-2018-5730: DN container check bypass by supplying special crafted data (bsc#1083927).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-16"/>
	<updated date="2018-04-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083926">SUSE bug 1083926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083927">SUSE bug 1083927</bugzilla>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5729/">CVE-2018-5729 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5729">CVE-2018-5729 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5730/">CVE-2018-5730 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5730">CVE-2018-5730 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572237" comment="krb5-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572238" comment="krb5-32bit-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572239" comment="krb5-apps-clients-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572240" comment="krb5-apps-servers-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572241" comment="krb5-client-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572242" comment="krb5-devel-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572243" comment="krb5-devel-32bit-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572244" comment="krb5-doc-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572245" comment="krb5-plugin-kdb-ldap-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572246" comment="krb5-plugin-preauth-pkinit-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572247" comment="krb5-server-1.8.6-133.49.125.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217310" version="1" class="patch">
	<metadata>
		<title>Security update for krb5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="890623" ref_url="https://bugzilla.suse.com/890623" source="BUGZILLA"/>
		<reference ref_id="897874" ref_url="https://bugzilla.suse.com/897874" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5351" ref_url="https://www.suse.com/security/cve/CVE-2014-5351/" source="CVE"/>
		<description>

This update for krb5 fixes the following issues:

    * When randomizing the keys for a service principal, current keys could
      be returned. (CVE-2014-5351)
    * klist -s crashes when handling multiple referral entries.
      (bnc#890623)

Security Issues:

    * CVE-2014-5351
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-02"/>
	<updated date="2014-10-02"/>
	<bugzilla href="https://bugzilla.suse.com/890623">SUSE bug 890623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897874">SUSE bug 897874</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5351/">CVE-2014-5351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5351">CVE-2014-5351 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572248" comment="krb5-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566770" comment="krb5-32bit-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572249" comment="krb5-apps-clients-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572250" comment="krb5-apps-servers-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572251" comment="krb5-client-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572252" comment="krb5-doc-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572253" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572254" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572255" comment="krb5-server-1.6.3-133.49.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217311" version="1" class="patch">
	<metadata>
		<title>Security update for krb5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="872912" ref_url="https://bugzilla.suse.com/872912" source="BUGZILLA"/>
		<reference ref_id="906557" ref_url="https://bugzilla.suse.com/906557" source="BUGZILLA"/>
		<reference ref_id="912002" ref_url="https://bugzilla.suse.com/912002" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5352" ref_url="https://www.suse.com/security/cve/CVE-2014-5352/" source="CVE"/>
		<reference ref_id="CVE-2014-9421" ref_url="https://www.suse.com/security/cve/CVE-2014-9421/" source="CVE"/>
		<reference ref_id="CVE-2014-9422" ref_url="https://www.suse.com/security/cve/CVE-2014-9422/" source="CVE"/>
		<reference ref_id="CVE-2014-9423" ref_url="https://www.suse.com/security/cve/CVE-2014-9423/" source="CVE"/>
		<description>

krb5 has been updated to fix four security issues:

    * CVE-2014-5352: gss_process_context_token() incorrectly frees context
      (bsc#912002)
    * CVE-2014-9421: kadmind doubly frees partial deserialization results
      (bsc#912002)
    * CVE-2014-9422: kadmind incorrectly validates server principal name
      (bsc#912002)
    * CVE-2014-9423: libgssrpc server applications leak uninitialized bytes
      (bsc#912002)

Additionally, these non-security issues have been fixed:

    * Winbind process hangs indefinitely without DC. (bsc#872912)
    * Hanging winbind processes. (bsc#906557)

Security Issues:

    * CVE-2014-5352
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352&gt;
    * CVE-2014-9421
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421&gt;
    * CVE-2014-9422
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422&gt;
    * CVE-2014-9423
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-06"/>
	<updated date="2015-02-06"/>
	<bugzilla href="https://bugzilla.suse.com/872912">SUSE bug 872912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906557">SUSE bug 906557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5352/">CVE-2014-5352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5352">CVE-2014-5352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9421/">CVE-2014-9421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9421">CVE-2014-9421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9422/">CVE-2014-9422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9422">CVE-2014-9422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9423/">CVE-2014-9423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9423">CVE-2014-9423 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572256" comment="krb5-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566773" comment="krb5-32bit-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572257" comment="krb5-apps-clients-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572258" comment="krb5-apps-servers-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572259" comment="krb5-client-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572260" comment="krb5-doc-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572261" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572262" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572263" comment="krb5-server-1.6.3-133.49.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217312" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="910457" ref_url="https://bugzilla.suse.com/910457" source="BUGZILLA"/>
		<reference ref_id="910458" ref_url="https://bugzilla.suse.com/910458" source="BUGZILLA"/>
		<reference ref_id="918595" ref_url="https://bugzilla.suse.com/918595" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353/" source="CVE"/>
		<reference ref_id="CVE-2014-5354" ref_url="https://www.suse.com/security/cve/CVE-2014-5354/" source="CVE"/>
		<reference ref_id="CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355/" source="CVE"/>
		<description>
krb5 was updated to fix three security issues.

Remote authenticated users could cause denial of service.

These security issues were fixed:
- CVE-2014-5353: NULL pointer dereference when using a ticket policy name as password name (bsc#910457).
- CVE-2014-5354: NULL pointer dereference when using keyless entries (bsc#910458).
- CVE-2014-5355: Denial of service in krb5_read_message (bsc#918595).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-10"/>
	<updated date="2015-07-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/910457">SUSE bug 910457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910458">SUSE bug 910458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918595">SUSE bug 918595</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5353">CVE-2014-5353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5354/">CVE-2014-5354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5354">CVE-2014-5354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5355">CVE-2014-5355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572264" comment="krb5-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566776" comment="krb5-32bit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572265" comment="krb5-apps-clients-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572266" comment="krb5-apps-servers-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572267" comment="krb5-client-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572268" comment="krb5-doc-1.6.3-133.49.68.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572269" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572270" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572271" comment="krb5-server-1.6.3-133.49.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217313" version="1" class="patch">
	<metadata>
		<title>Security update for kvm</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="598271" ref_url="https://bugzilla.suse.com/598271" source="BUGZILLA"/>
		<reference ref_id="598298" ref_url="https://bugzilla.suse.com/598298" source="BUGZILLA"/>
		<reference ref_id="599095" ref_url="https://bugzilla.suse.com/599095" source="BUGZILLA"/>
		<reference ref_id="603161" ref_url="https://bugzilla.suse.com/603161" source="BUGZILLA"/>
		<reference ref_id="603179" ref_url="https://bugzilla.suse.com/603179" source="BUGZILLA"/>
		<reference ref_id="610682" ref_url="https://bugzilla.suse.com/610682" source="BUGZILLA"/>
		<reference ref_id="619991" ref_url="https://bugzilla.suse.com/619991" source="BUGZILLA"/>
		<reference ref_id="621793" ref_url="https://bugzilla.suse.com/621793" source="BUGZILLA"/>
		<reference ref_id="626654" ref_url="https://bugzilla.suse.com/626654" source="BUGZILLA"/>
		<reference ref_id="637297" ref_url="https://bugzilla.suse.com/637297" source="BUGZILLA"/>
		<reference ref_id="689895" ref_url="https://bugzilla.suse.com/689895" source="BUGZILLA"/>
		<reference ref_id="690781" ref_url="https://bugzilla.suse.com/690781" source="BUGZILLA"/>
		<reference ref_id="695510" ref_url="https://bugzilla.suse.com/695510" source="BUGZILLA"/>
		<reference ref_id="695766" ref_url="https://bugzilla.suse.com/695766" source="BUGZILLA"/>
		<reference ref_id="698237" ref_url="https://bugzilla.suse.com/698237" source="BUGZILLA"/>
		<reference ref_id="701161" ref_url="https://bugzilla.suse.com/701161" source="BUGZILLA"/>
		<reference ref_id="702823" ref_url="https://bugzilla.suse.com/702823" source="BUGZILLA"/>
		<reference ref_id="704933" ref_url="https://bugzilla.suse.com/704933" source="BUGZILLA"/>
		<reference ref_id="705095" ref_url="https://bugzilla.suse.com/705095" source="BUGZILLA"/>
		<reference ref_id="705304" ref_url="https://bugzilla.suse.com/705304" source="BUGZILLA"/>
		<reference ref_id="740165" ref_url="https://bugzilla.suse.com/740165" source="BUGZILLA"/>
		<reference ref_id="764526" ref_url="https://bugzilla.suse.com/764526" source="BUGZILLA"/>
		<reference ref_id="777084" ref_url="https://bugzilla.suse.com/777084" source="BUGZILLA"/>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="877645" ref_url="https://bugzilla.suse.com/877645" source="BUGZILLA"/>
		<reference ref_id="929339" ref_url="https://bugzilla.suse.com/929339" source="BUGZILLA"/>
		<reference ref_id="932770" ref_url="https://bugzilla.suse.com/932770" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1750" ref_url="https://www.suse.com/security/cve/CVE-2011-1750/" source="CVE"/>
		<reference ref_id="CVE-2011-1751" ref_url="https://www.suse.com/security/cve/CVE-2011-1751/" source="CVE"/>
		<reference ref_id="CVE-2011-2212" ref_url="https://www.suse.com/security/cve/CVE-2011-2212/" source="CVE"/>
		<reference ref_id="CVE-2011-2512" ref_url="https://www.suse.com/security/cve/CVE-2011-2512/" source="CVE"/>
		<reference ref_id="CVE-2011-2527" ref_url="https://www.suse.com/security/cve/CVE-2011-2527/" source="CVE"/>
		<reference ref_id="CVE-2012-0029" ref_url="https://www.suse.com/security/cve/CVE-2012-0029/" source="CVE"/>
		<reference ref_id="CVE-2012-2652" ref_url="https://www.suse.com/security/cve/CVE-2012-2652/" source="CVE"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-0223" ref_url="https://www.suse.com/security/cve/CVE-2014-0223/" source="CVE"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001402.html" source="SUSE-SU"/>
		<description>

The kvm qemu vt100 emulation was affected by a problem where specific vt100 
sequences could have been used by guest users to affect the host. 
(CVE-2012-3515 aka XSA-17).

Also a temp file race was fixed. (CVE-2012-2652)

Security Issue reference:

    * CVE-2012-3515
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3515&gt;
    * CVE-2012-2652
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2652&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-31"/>
	<updated date="2012-08-31"/>
	<bugzilla href="https://bugzilla.suse.com/598271">SUSE bug 598271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/598298">SUSE bug 598298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/599095">SUSE bug 599095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/603161">SUSE bug 603161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/603179">SUSE bug 603179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/610682">SUSE bug 610682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/619991">SUSE bug 619991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/621793">SUSE bug 621793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/626654">SUSE bug 626654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/637297">SUSE bug 637297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/689895">SUSE bug 689895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/690781">SUSE bug 690781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/695510">SUSE bug 695510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/695766">SUSE bug 695766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698237">SUSE bug 698237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/701161">SUSE bug 701161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/702823">SUSE bug 702823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704933">SUSE bug 704933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/705095">SUSE bug 705095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/705304">SUSE bug 705304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/740165">SUSE bug 740165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/764526">SUSE bug 764526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777084">SUSE bug 777084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877645">SUSE bug 877645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929339">SUSE bug 929339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932770">SUSE bug 932770</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1750/">CVE-2011-1750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1750">CVE-2011-1750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1751/">CVE-2011-1751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1751">CVE-2011-1751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2212/">CVE-2011-2212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2212">CVE-2011-2212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2512/">CVE-2011-2512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2512">CVE-2011-2512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2527/">CVE-2011-2527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2527">CVE-2011-2527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0029/">CVE-2012-0029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0029">CVE-2012-0029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2652/">CVE-2012-2652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2652">CVE-2012-2652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3515">CVE-2012-3515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0222">CVE-2014-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0223/">CVE-2014-0223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0223">CVE-2014-0223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3209">CVE-2015-3209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3456">CVE-2015-3456 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589768" comment="kvm-0.12.5-1.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589768" comment="kvm-0.12.5-1.24.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217314" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001544.html" source="SUSE-SU"/>
		<description>
kvm was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344).		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-07"/>
	<updated date="2015-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5154">CVE-2015-5154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572273" comment="kvm-0.12.5-1.30.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572273" comment="kvm-0.12.5-1.30.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217315" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1026612" ref_url="https://bugzilla.suse.com/1026612" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1143794" ref_url="https://bugzilla.suse.com/1143794" source="BUGZILLA"/>
		<reference ref_id="1163018" ref_url="https://bugzilla.suse.com/1163018" source="BUGZILLA"/>
		<reference ref_id="1170940" ref_url="https://bugzilla.suse.com/1170940" source="BUGZILLA"/>
		<reference ref_id="1179466" ref_url="https://bugzilla.suse.com/1179466" source="BUGZILLA"/>
		<reference ref_id="1179467" ref_url="https://bugzilla.suse.com/1179467" source="BUGZILLA"/>
		<reference ref_id="1187364" ref_url="https://bugzilla.suse.com/1187364" source="BUGZILLA"/>
		<reference ref_id="1187367" ref_url="https://bugzilla.suse.com/1187367" source="BUGZILLA"/>
		<reference ref_id="864682" ref_url="https://bugzilla.suse.com/864682" source="BUGZILLA"/>
		<reference ref_id="942845" ref_url="https://bugzilla.suse.com/942845" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4530" ref_url="https://www.suse.com/security/cve/CVE-2013-4530/" source="CVE"/>
		<reference ref_id="CVE-2015-5225" ref_url="https://www.suse.com/security/cve/CVE-2015-5225/" source="CVE"/>
		<reference ref_id="CVE-2017-2633" ref_url="https://www.suse.com/security/cve/CVE-2017-2633/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<reference ref_id="CVE-2020-29129" ref_url="https://www.suse.com/security/cve/CVE-2020-29129/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<description>
This update for kvm fixes the following issues:

- CVE-2017-2633: memory corruption due to unchecked resolution limit in VNC. (bsc#1026612)
- CVE-2021-3594: invalid pointer initialization may lead to information disclosure in slirp (udp) (bsc#1187367)
- CVE-2019-14378: heap buffer overflow during packet reassembly in slirp networking implementation. (bsc#1143794)
- CVE-2020-1983: use-after-free in ip_reass function in ip_input.c. (bsc#1170940)
- CVE-2020-29130: out-of-bounds access while processing ARP packets. (bsc#1179467)
- CVE-2013-4530: fix buffer overun on invalid state load. (bsc#864682)
- CVE-2021-3592: invalid pointer initialization may lead to information disclosure (bootp). (bsc#1187364)
- CVE-2015-5225 heap memory corruption in vnc_refresh_server_surface. (bsc#942845)
- CVE-2020-29129: out-of-bounds access while processing NCSI packets. (bsc#1179466)
- CVE-2020-8608: potential OOB access due to unsafe snprintf() usages. (bsc#1163018)
- CVE-2017-5715: speculative side channel attacks on various CPU platforms aka 'SpectreAttack' and 'MeltdownAttack'. (bsc#1068032)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-29"/>
	<updated date="2021-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1026612">SUSE bug 1026612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143794">SUSE bug 1143794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163018">SUSE bug 1163018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170940">SUSE bug 1170940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179466">SUSE bug 1179466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179467">SUSE bug 1179467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187364">SUSE bug 1187364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187367">SUSE bug 1187367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864682">SUSE bug 864682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942845">SUSE bug 942845</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4530/">CVE-2013-4530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4530">CVE-2013-4530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5225/">CVE-2015-5225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5225">CVE-2015-5225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2633/">CVE-2017-2633 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2633">CVE-2017-2633 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14378">CVE-2019-14378 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1983">CVE-2020-1983 at NVD</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29129/">CVE-2020-29129 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29129">CVE-2020-29129 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29130">CVE-2020-29130 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3592">CVE-2021-3592 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3594">CVE-2021-3594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626551" comment="kvm-0.12.5-1.31.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217316" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1182651" ref_url="https://bugzilla.suse.com/1182651" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20255" ref_url="https://www.suse.com/security/cve/CVE-2021-20255/" source="CVE"/>
		<description>
This update for kvm fixes the following issues:

- eepro100: stack overflow via infinite recursion (bsc#1182651, CVE-2021-20255)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-23"/>
	<updated date="2021-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182651">SUSE bug 1182651</bugzilla>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20255/">CVE-2021-20255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20255">CVE-2021-20255 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630649" comment="kvm-0.12.5-1.31.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217317" version="1" class="patch">
	<metadata>
		<title>Security update for lcms</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="843716" ref_url="https://bugzilla.suse.com/843716" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4276" ref_url="https://www.suse.com/security/cve/CVE-2013-4276/" source="CVE"/>
		<description>

The lcms userland utilities were updated to fix stack overflows.

CVE-2013-4276: Multiple stack-based buffer overflows in LittleCMS allowed 
remote attackers to cause a denial of service (crash) via a crafted (1) ICC 
color profile to the icctrans utility or (2) TIFF image to the tiffdiff 
utility.

Security Issues:

    * CVE-2013-4276
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4276&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-08"/>
	<updated date="2013-10-08"/>
	<bugzilla href="https://bugzilla.suse.com/843716">SUSE bug 843716</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4276/">CVE-2013-4276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4276">CVE-2013-4276 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572274" comment="lcms-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572275" comment="liblcms1-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566061" comment="liblcms1-32bit-1.17-77.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217318" version="1" class="patch">
	<metadata>
		<title>Security update for less (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="921719" ref_url="https://bugzilla.suse.com/921719" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9488" ref_url="https://www.suse.com/security/cve/CVE-2014-9488/" source="CVE"/>
		<description>
This update for less fixes the following issues:

Security issue fixed:

- CVE-2014-9488: Malformed UTF-8 data could have caused an out of bounds read in 
  the UTF-8 decoding routines, causing an invalid read access (bsc#921719).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-21"/>
	<updated date="2020-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/921719">SUSE bug 921719</bugzilla>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-9488/">CVE-2014-9488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9488">CVE-2014-9488 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572276" comment="less-424b-10.24.3.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217319" version="1" class="patch">
	<metadata>
		<title>Security update for lha (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="962528" ref_url="https://bugzilla.suse.com/962528" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1925" ref_url="https://www.suse.com/security/cve/CVE-2016-1925/" source="CVE"/>
		<description>

lha was updated to fix one security issue.

This security issue was fixed:
- CVE-2016-1925: Buffer Overflow while parsing level0 and level1 headers (bsc#962528).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-28"/>
	<updated date="2016-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/962528">SUSE bug 962528</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1925/">CVE-2016-1925 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1925">CVE-2016-1925 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572277" comment="lha-1.14.0.894-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217320" version="1" class="patch">
	<metadata>
		<title>Security update for libHX13</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="631582" ref_url="https://bugzilla.suse.com/631582" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2947" ref_url="https://www.suse.com/security/cve/CVE-2010-2947/" source="CVE"/>
		<description>

This update fixes a heap-based buffer overflow in HX_split() of libHX. 
(CVE-2010-2947)

Security Issue reference:

    * CVE-2010-2947
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2947&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-08-23"/>
	<updated date="2010-08-23"/>
	<bugzilla href="https://bugzilla.suse.com/631582">SUSE bug 631582</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2947/">CVE-2010-2947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2947">CVE-2010-2947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992122" comment="libHX13-1.23-4.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992123" comment="libHX13-32bit-1.23-4.1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217321" version="1" class="patch">
	<metadata>
		<title>Security update for libQt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="610578" ref_url="https://bugzilla.suse.com/610578" source="BUGZILLA"/>
		<reference ref_id="613818" ref_url="https://bugzilla.suse.com/613818" source="BUGZILLA"/>
		<reference ref_id="619089" ref_url="https://bugzilla.suse.com/619089" source="BUGZILLA"/>
		<reference ref_id="637275" ref_url="https://bugzilla.suse.com/637275" source="BUGZILLA"/>
		<reference ref_id="637293" ref_url="https://bugzilla.suse.com/637293" source="BUGZILLA"/>
		<reference ref_id="643848" ref_url="https://bugzilla.suse.com/643848" source="BUGZILLA"/>
		<reference ref_id="668210" ref_url="https://bugzilla.suse.com/668210" source="BUGZILLA"/>
		<reference ref_id="669604" ref_url="https://bugzilla.suse.com/669604" source="BUGZILLA"/>
		<reference ref_id="714984" ref_url="https://bugzilla.suse.com/714984" source="BUGZILLA"/>
		<reference ref_id="739904" ref_url="https://bugzilla.suse.com/739904" source="BUGZILLA"/>
		<reference ref_id="746332" ref_url="https://bugzilla.suse.com/746332" source="BUGZILLA"/>
		<reference ref_id="755724" ref_url="https://bugzilla.suse.com/755724" source="BUGZILLA"/>
		<reference ref_id="779952" ref_url="https://bugzilla.suse.com/779952" source="BUGZILLA"/>
		<reference ref_id="784197" ref_url="https://bugzilla.suse.com/784197" source="BUGZILLA"/>
		<reference ref_id="797006" ref_url="https://bugzilla.suse.com/797006" source="BUGZILLA"/>
		<reference ref_id="802634" ref_url="https://bugzilla.suse.com/802634" source="BUGZILLA"/>
		<reference ref_id="856832" ref_url="https://bugzilla.suse.com/856832" source="BUGZILLA"/>
		<reference ref_id="859158" ref_url="https://bugzilla.suse.com/859158" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2621" ref_url="https://www.suse.com/security/cve/CVE-2010-2621/" source="CVE"/>
		<reference ref_id="CVE-2011-3193" ref_url="https://www.suse.com/security/cve/CVE-2011-3193/" source="CVE"/>
		<reference ref_id="CVE-2011-3194" ref_url="https://www.suse.com/security/cve/CVE-2011-3194/" source="CVE"/>
		<reference ref_id="CVE-2011-3922" ref_url="https://www.suse.com/security/cve/CVE-2011-3922/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-0254" ref_url="https://www.suse.com/security/cve/CVE-2013-0254/" source="CVE"/>
		<reference ref_id="CVE-2013-4549" ref_url="https://www.suse.com/security/cve/CVE-2013-4549/" source="CVE"/>
		<description>

The Qt library was updated to fix a XML entity expansion attack (XXE). 
(CVE-2013-4549)

Security Issue reference:

    * CVE-2013-4549
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4549&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-15"/>
	<updated date="2014-02-15"/>
	<bugzilla href="https://bugzilla.suse.com/610578">SUSE bug 610578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/613818">SUSE bug 613818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/619089">SUSE bug 619089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/637275">SUSE bug 637275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/637293">SUSE bug 637293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/643848">SUSE bug 643848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/668210">SUSE bug 668210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/669604">SUSE bug 669604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/714984">SUSE bug 714984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/739904">SUSE bug 739904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746332">SUSE bug 746332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/755724">SUSE bug 755724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779952">SUSE bug 779952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784197">SUSE bug 784197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797006">SUSE bug 797006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802634">SUSE bug 802634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856832">SUSE bug 856832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859158">SUSE bug 859158</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2621/">CVE-2010-2621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2621">CVE-2010-2621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3193/">CVE-2011-3193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3193">CVE-2011-3193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3194/">CVE-2011-3194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3194">CVE-2011-3194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3922/">CVE-2011-3922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3922">CVE-2011-3922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4929">CVE-2012-4929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0254/">CVE-2013-0254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0254">CVE-2013-0254 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4549/">CVE-2013-4549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4549">CVE-2013-4549 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992124" comment="libQtWebKit4-4.6.3-5.20.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992125" comment="libQtWebKit4-32bit-4.6.3-5.20.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992126" comment="libqt4-4.6.3-5.20.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992127" comment="libqt4-32bit-4.6.3-5.20.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992128" comment="libqt4-qt3support-4.6.3-5.20.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992129" comment="libqt4-qt3support-32bit-4.6.3-5.20.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992130" comment="libqt4-sql-4.6.3-5.20.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992131" comment="libqt4-sql-32bit-4.6.3-5.20.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992132" comment="libqt4-sql-mysql-4.6.3-5.20.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992133" comment="libqt4-sql-sqlite-4.6.3-5.20.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992134" comment="libqt4-x11-4.6.3-5.20.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992135" comment="libqt4-x11-32bit-4.6.3-5.20.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992136" comment="qt4-x11-tools-4.6.3-5.20.27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217322" version="1" class="patch">
	<metadata>
		<title>Security update for libapr</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="650435" ref_url="https://bugzilla.suse.com/650435" source="BUGZILLA"/>
		<reference ref_id="693778" ref_url="https://bugzilla.suse.com/693778" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-1623" ref_url="https://www.suse.com/security/cve/CVE-2010-1623/" source="CVE"/>
		<reference ref_id="CVE-2011-0419" ref_url="https://www.suse.com/security/cve/CVE-2011-0419/" source="CVE"/>
		<reference ref_id="CVE-2011-1928" ref_url="https://www.suse.com/security/cve/CVE-2011-1928/" source="CVE"/>
		<description>

This update fixes the following security issues:

    * 650435: remote DoS in APR (CVE-2010-1623)
    * 693778: unconstrained recursion when processing patterns
      (CVE-2011-0419,CVE-2011-1928)

Security Issue reference:

    * CVE-2011-0419
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0419&gt;
    * CVE-2010-1623
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1623&gt;
    * CVE-2011-1928
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1928&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-07-06"/>
	<updated date="2011-07-06"/>
	<bugzilla href="https://bugzilla.suse.com/650435">SUSE bug 650435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693778">SUSE bug 693778</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1623/">CVE-2010-1623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1623">CVE-2010-1623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0419/">CVE-2011-0419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0419">CVE-2011-0419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1928/">CVE-2011-1928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1928">CVE-2011-1928 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992137" comment="libapr-util1-1.3.4-12.22.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992138" comment="libapr1-1.3.3-11.18.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217323" version="1" class="patch">
	<metadata>
		<title>Security update for libapr-util1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1064990" ref_url="https://bugzilla.suse.com/1064990" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12618" ref_url="https://www.suse.com/security/cve/CVE-2017-12618/" source="CVE"/>
		<description>
This update for libapr-util1 fixes the following issues:

Security issue fixed:

- CVE-2017-12618: DoS via crafted SDBM database files in apr_sdbm*() functions (bsc#1064990)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064990">SUSE bug 1064990</bugzilla>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12618/">CVE-2017-12618 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12618">CVE-2017-12618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572282" comment="libapr-util1-1.3.4-12.22.23.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217324" version="1" class="patch">
	<metadata>
		<title>Security update for libapr1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1064982" ref_url="https://bugzilla.suse.com/1064982" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12613" ref_url="https://www.suse.com/security/cve/CVE-2017-12613/" source="CVE"/>
		<description>

This update fixes the following issues:
  
- CVE-2017-12613: DoS or information disclosure in pr_exp_time*() or apr_os_exp_time*() functions (bsc#1064982).

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064982">SUSE bug 1064982</bugzilla>
	<cve impact="low" cvss3="3.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12613/">CVE-2017-12613 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12613">CVE-2017-12613 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572283" comment="libapr1-1.3.3-11.18.19.13.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217325" version="1" class="patch">
	<metadata>
		<title>Recommended update for util-linux</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="495657" ref_url="https://bugzilla.suse.com/495657" source="BUGZILLA"/>
		<reference ref_id="704533" ref_url="https://bugzilla.suse.com/704533" source="BUGZILLA"/>
		<reference ref_id="704866" ref_url="https://bugzilla.suse.com/704866" source="BUGZILLA"/>
		<reference ref_id="784506" ref_url="https://bugzilla.suse.com/784506" source="BUGZILLA"/>
		<reference ref_id="808155" ref_url="https://bugzilla.suse.com/808155" source="BUGZILLA"/>
		<reference ref_id="871698" ref_url="https://bugzilla.suse.com/871698" source="BUGZILLA"/>
		<reference ref_id="888678" ref_url="https://bugzilla.suse.com/888678" source="BUGZILLA"/>
		<reference ref_id="907434" ref_url="https://bugzilla.suse.com/907434" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9114" ref_url="https://www.suse.com/security/cve/CVE-2014-9114/" source="CVE"/>
		<description>

This update for util-linux suppresses a warning that's not relevant on 
Linux systems. (bnc#871698)

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-04"/>
	<updated date="2014-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/495657">SUSE bug 495657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704533">SUSE bug 704533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704866">SUSE bug 704866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784506">SUSE bug 784506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808155">SUSE bug 808155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871698">SUSE bug 871698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888678">SUSE bug 888678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907434">SUSE bug 907434</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9114/">CVE-2014-9114 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9114">CVE-2014-9114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992139" comment="libblkid1-2.16-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992140" comment="libuuid1-2.16-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992141" comment="libuuid1-32bit-2.16-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992142" comment="util-linux-2.16-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992143" comment="util-linux-lang-2.16-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992144" comment="uuid-runtime-2.16-6.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217326" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1184751" ref_url="https://bugzilla.suse.com/1184751" source="BUGZILLA"/>
		<reference ref_id="1184752" ref_url="https://bugzilla.suse.com/1184752" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30498" ref_url="https://www.suse.com/security/cve/CVE-2021-30498/" source="CVE"/>
		<reference ref_id="CVE-2021-30499" ref_url="https://www.suse.com/security/cve/CVE-2021-30499/" source="CVE"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2021-30499: Fixed a memory corruption issue when exporting troff sources (bsc#1184751).
- CVE-2021-30498: Fixed a memory corruption issue when exporting TGA images (bsc#1184752).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184751">SUSE bug 1184751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184752">SUSE bug 1184752</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30498/">CVE-2021-30498 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30498">CVE-2021-30498 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30499/">CVE-2021-30499 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30499">CVE-2021-30499 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670907" comment="libcaca-0.99.beta13b-49.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217327" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1197028" ref_url="https://bugzilla.suse.com/1197028" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0856" ref_url="https://www.suse.com/security/cve/CVE-2022-0856/" source="CVE"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2022-0856: Fixed a divide by zero issue which could be exploited to cause
  an application crash (bsc#1197028).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-28"/>
	<updated date="2022-04-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1197028">SUSE bug 1197028</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0856/">CVE-2022-0856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0856">CVE-2022-0856 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681248" comment="libcaca-0.99.beta13b-49.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217328" version="1" class="patch">
	<metadata>
		<title>Security update for libcap</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="727715" ref_url="https://bugzilla.suse.com/727715" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-4099" ref_url="https://www.suse.com/security/cve/CVE-2011-4099/" source="CVE"/>
		<description>

The following bug has been fixed:

    * capsh did not chdir('/') after callling chroot(). Programs could
      therefore access the current directory outside of the chroot
      (CVE-2011-4099).

Security Issue reference:

    * CVE-2011-4099
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4099&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-11-05"/>
	<updated date="2011-11-05"/>
	<bugzilla href="https://bugzilla.suse.com/727715">SUSE bug 727715</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4099/">CVE-2011-4099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4099">CVE-2011-4099 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992145" comment="libcap-progs-2.11-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992146" comment="libcap2-2.11-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992147" comment="libcap2-32bit-2.11-2.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217329" version="1" class="patch">
	<metadata>
		<title>Security update for libcares2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1188881" ref_url="https://bugzilla.suse.com/1188881" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<description>
This update for libcares2 fixes the following issues:

- CVE-2021-3672: Fixed input validation on hostnames (bsc#1188881).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-10"/>
	<updated date="2021-08-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188881">SUSE bug 1188881</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3672">CVE-2021-3672 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630423" comment="libcares2-1.7.4-7.4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217330" version="1" class="patch">
	<metadata>
		<title>Security update for libcdio (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1082821" ref_url="https://bugzilla.suse.com/1082821" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18199" ref_url="https://www.suse.com/security/cve/CVE-2017-18199/" source="CVE"/>
		<description>
This update for libcdio and libcdio-mini fixes the following issues:

Security issue fixed: 

- CVE-2017-18199: Fixed a NULL Pointer Dereference in realloc_symlink which could allow remote attackers to cause Denial of Service (bsc#1082821).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-23"/>
	<updated date="2020-09-23"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1082821">SUSE bug 1082821</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18199/">CVE-2017-18199 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18199">CVE-2017-18199 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572288" comment="libcdio7-0.80-8.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572289" comment="libcdio7-32bit-0.80-8.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572290" comment="libcdio_cdda0-0.80-8.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572291" comment="libcdio_paranoia0-0.80-8.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217331" version="1" class="patch">
	<metadata>
		<title>Recommended update for libcgroup</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="658944" ref_url="https://bugzilla.suse.com/658944" source="BUGZILLA"/>
		<reference ref_id="675048" ref_url="https://bugzilla.suse.com/675048" source="BUGZILLA"/>
		<reference ref_id="675506" ref_url="https://bugzilla.suse.com/675506" source="BUGZILLA"/>
		<reference ref_id="711657" ref_url="https://bugzilla.suse.com/711657" source="BUGZILLA"/>
		<reference ref_id="728330" ref_url="https://bugzilla.suse.com/728330" source="BUGZILLA"/>
		<reference ref_id="728677" ref_url="https://bugzilla.suse.com/728677" source="BUGZILLA"/>
		<reference ref_id="728914" ref_url="https://bugzilla.suse.com/728914" source="BUGZILLA"/>
		<reference ref_id="732638" ref_url="https://bugzilla.suse.com/732638" source="BUGZILLA"/>
		<reference ref_id="752070" ref_url="https://bugzilla.suse.com/752070" source="BUGZILLA"/>
		<reference ref_id="754012" ref_url="https://bugzilla.suse.com/754012" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1006" ref_url="https://www.suse.com/security/cve/CVE-2011-1006/" source="CVE"/>
		<reference ref_id="CVE-2011-1022" ref_url="https://www.suse.com/security/cve/CVE-2011-1022/" source="CVE"/>
		<description>

This update for libcgroup1 provides an update to 0.37.1 which includes 
important fixes for cgroup support:

    * make it possible to configure disjoint cpusets in cgconfig.conf via
      comma separated lists (bnc#728677)
    * Fix cgrulesngd crashing on reload (bnc#728914)
    * Add a default config file and documentation (bnc#711657)
    * Fix cgconfig overwriting settings in cgconfig.conf (bnc#658944)
    * Fix incorrect symlink to pam_cgroup.so (bnc#752070)
    * Fix inconsistency with cgrules.conf (bnc#732638)
    * Fix startup failure with NIS groups (bnc#728330)
    * Fix crash on rules reload (bnc#728914)
    * Fix handling of certain cgroup configurations (bnc#754012)

		</description>
<advisory from="security@suse.de">
	<issued date="2012-03-20"/>
	<updated date="2012-03-20"/>
	<bugzilla href="https://bugzilla.suse.com/658944">SUSE bug 658944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/675048">SUSE bug 675048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/675506">SUSE bug 675506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711657">SUSE bug 711657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/728330">SUSE bug 728330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/728677">SUSE bug 728677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/728914">SUSE bug 728914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/732638">SUSE bug 732638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752070">SUSE bug 752070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754012">SUSE bug 754012</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1006/">CVE-2011-1006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1006">CVE-2011-1006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1022/">CVE-2011-1022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1022">CVE-2011-1022 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992148" comment="libcgroup1-0.37.1-5.14.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217332" version="1" class="patch">
	<metadata>
		<title>Security update for libcgroup1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1030747" ref_url="https://bugzilla.suse.com/1030747" source="BUGZILLA"/>
		<reference ref_id="1100365" ref_url="https://bugzilla.suse.com/1100365" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14348" ref_url="https://www.suse.com/security/cve/CVE-2018-14348/" source="CVE"/>
		<description>
This update for libcgroup1 fixes the following issues:

Security issue fixed:

- CVE-2018-14348: Fix daemon that creates /var/log/cgred with mode 0666 (bsc#1100365).

Bug fixes:

- bsc#1030747: Unable to use freezer sub system via libcgroup API when both freezer and cpuset subsystems are used.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1030747">SUSE bug 1030747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100365">SUSE bug 1100365</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14348/">CVE-2018-14348 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14348">CVE-2018-14348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572292" comment="libcgroup1-0.37.1-5.19.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217333" version="1" class="patch">
	<metadata>
		<title>Security update for libcroco (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1034481" ref_url="https://bugzilla.suse.com/1034481" source="BUGZILLA"/>
		<reference ref_id="1034482" ref_url="https://bugzilla.suse.com/1034482" source="BUGZILLA"/>
		<reference ref_id="1043898" ref_url="https://bugzilla.suse.com/1043898" source="BUGZILLA"/>
		<reference ref_id="1043899" ref_url="https://bugzilla.suse.com/1043899" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7960" ref_url="https://www.suse.com/security/cve/CVE-2017-7960/" source="CVE"/>
		<reference ref_id="CVE-2017-7961" ref_url="https://www.suse.com/security/cve/CVE-2017-7961/" source="CVE"/>
		<reference ref_id="CVE-2017-8834" ref_url="https://www.suse.com/security/cve/CVE-2017-8834/" source="CVE"/>
		<reference ref_id="CVE-2017-8871" ref_url="https://www.suse.com/security/cve/CVE-2017-8871/" source="CVE"/>
		<description>
This update for libcroco fixes the following issues:

Security issues fixed:

- CVE-2017-7960: Fixed heap overflow (input: check end of input before reading a byte) (bsc#1034481).
- CVE-2017-7961: Fixed undefined behavior (tknzr: support only max long rgb values) (bsc#1034482).
- CVE-2017-8834: Fixed denial of service (memory allocation error) via a crafted CSS file (bsc#1043898).
- CVE-2017-8871: Fixed denial of service (infinite loop and CPU consumption) via a crafted CSS file (bsc#1043899).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-13"/>
	<updated date="2019-06-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034481">SUSE bug 1034481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034482">SUSE bug 1034482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043898">SUSE bug 1043898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043899">SUSE bug 1043899</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7960/">CVE-2017-7960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7960">CVE-2017-7960 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7961/">CVE-2017-7961 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7961">CVE-2017-7961 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8834/">CVE-2017-8834 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8834">CVE-2017-8834 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8871/">CVE-2017-8871 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8871">CVE-2017-8871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572293" comment="libcroco-0_6-3-0.6.1-122.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572294" comment="libcroco-0_6-3-32bit-0.6.1-122.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217334" version="1" class="patch">
	<metadata>
		<title>Security update for libcroco (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1171685" ref_url="https://bugzilla.suse.com/1171685" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12825" ref_url="https://www.suse.com/security/cve/CVE-2020-12825/" source="CVE"/>
		<description>
This update for libcroco fixes the following issues:

- CVE-2020-12825: Fixed recursion issue in block and any productions (bsc#1171685).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171685">SUSE bug 1171685</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12825/">CVE-2020-12825 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12825">CVE-2020-12825 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631918" comment="libcroco-0_6-3-0.6.1-122.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631919" comment="libcroco-0_6-3-32bit-0.6.1-122.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217335" version="1" class="patch">
	<metadata>
		<title>Security update for libdb-4_5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1043886" ref_url="https://bugzilla.suse.com/1043886" source="BUGZILLA"/>
		<description>
This update for libdb-4_5 fixes the following issues:

- A DB_CONFIG file in the current working directory allowed local
  users to obtain sensitive information via a symlink attack
  involving a setgid or setuid application using libdb-4_8. (bsc#1043886)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-09"/>
	<updated date="2018-02-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043886">SUSE bug 1043886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572295" comment="db-doc-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572296" comment="db-utils-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572297" comment="db-utils-doc-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572298" comment="libdb-4_5-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572299" comment="libdb-4_5-32bit-4.5.20-97.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217336" version="1" class="patch">
	<metadata>
		<title>Security update for PostgreSQL 9.1</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="802679" ref_url="https://bugzilla.suse.com/802679" source="BUGZILLA"/>
		<reference ref_id="812525" ref_url="https://bugzilla.suse.com/812525" source="BUGZILLA"/>
		<reference ref_id="864845" ref_url="https://bugzilla.suse.com/864845" source="BUGZILLA"/>
		<reference ref_id="864846" ref_url="https://bugzilla.suse.com/864846" source="BUGZILLA"/>
		<reference ref_id="864847" ref_url="https://bugzilla.suse.com/864847" source="BUGZILLA"/>
		<reference ref_id="864850" ref_url="https://bugzilla.suse.com/864850" source="BUGZILLA"/>
		<reference ref_id="864851" ref_url="https://bugzilla.suse.com/864851" source="BUGZILLA"/>
		<reference ref_id="864852" ref_url="https://bugzilla.suse.com/864852" source="BUGZILLA"/>
		<reference ref_id="864853" ref_url="https://bugzilla.suse.com/864853" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255/" source="CVE"/>
		<reference ref_id="CVE-2013-1899" ref_url="https://www.suse.com/security/cve/CVE-2013-1899/" source="CVE"/>
		<reference ref_id="CVE-2013-1900" ref_url="https://www.suse.com/security/cve/CVE-2013-1900/" source="CVE"/>
		<reference ref_id="CVE-2013-1901" ref_url="https://www.suse.com/security/cve/CVE-2013-1901/" source="CVE"/>
		<reference ref_id="CVE-2014-0060" ref_url="https://www.suse.com/security/cve/CVE-2014-0060/" source="CVE"/>
		<reference ref_id="CVE-2014-0061" ref_url="https://www.suse.com/security/cve/CVE-2014-0061/" source="CVE"/>
		<reference ref_id="CVE-2014-0062" ref_url="https://www.suse.com/security/cve/CVE-2014-0062/" source="CVE"/>
		<reference ref_id="CVE-2014-0063" ref_url="https://www.suse.com/security/cve/CVE-2014-0063/" source="CVE"/>
		<reference ref_id="CVE-2014-0064" ref_url="https://www.suse.com/security/cve/CVE-2014-0064/" source="CVE"/>
		<reference ref_id="CVE-2014-0065" ref_url="https://www.suse.com/security/cve/CVE-2014-0065/" source="CVE"/>
		<reference ref_id="CVE-2014-0066" ref_url="https://www.suse.com/security/cve/CVE-2014-0066/" source="CVE"/>
		<description>

The PostgreSQL database server was updated to version 9.1.12 to fix various 
security issues:

    * 

      Granting a role without ADMIN OPTION is supposed to prevent the
      grantee from adding or removing members from the granted role, but
      this restriction was easily bypassed by doing SET ROLE first. The
      security impact is mostly that a role member can revoke the access of
      others, contrary to the wishes of his grantor. Unapproved role member
      additions are a lesser concern, since an uncooperative role member
      could provide most of his rights to others anyway by creating views
      or SECURITY DEFINER functions. (CVE-2014-0060)

    * 

      The primary role of PL validator functions is to be called implicitly
      during CREATE FUNCTION, but they are also normal SQL functions that a
      user can call explicitly. Calling a validator on a function actually
      written in some other language was not checked for and could be
      exploited for privilege-escalation purposes. The fix involves adding
      a call to a privilege-checking function in each validator function.
      Non-core procedural languages will also need to make this change to
      their own validator functions, if any. (CVE-2014-0061)

    * 

      If the name lookups come to different conclusions due to concurrent
      activity, we might perform some parts of the DDL on a different table
      than other parts. At least in the case of CREATE INDEX, this can be
      used to cause the permissions checks to be performed against a
      different table than the index creation, allowing for a privilege
      escalation attack. (CVE-2014-0062)

    * 

      The MAXDATELEN constant was too small for the longest possible value
      of type interval, allowing a buffer overrun in interval_out().
      Although the datetime input functions were more careful about
      avoiding buffer overrun, the limit was short enough to cause them to
      reject some valid inputs, such as input containing a very long
      timezone name. The ecpg library contained these vulnerabilities along
      with some of its own. (CVE-2014-0063)

    * 

      Several functions, mostly type input functions, calculated an
      allocation size without checking for overflow. If overflow did occur,
      a too-small buffer would be allocated and then written past.
      (CVE-2014-0064)

    * 

      Use strlcpy() and related functions to provide a clear guarantee that
      fixed-size buffers are not overrun. Unlike the preceding items, it is
      unclear whether these cases really represent live issues, since in
      most cases there appear to be previous constraints on the size of the
      input string. Nonetheless it seems prudent to silence all Coverity
      warnings of this type. (CVE-2014-0065)

    * 

      There are relatively few scenarios in which crypt() could return
      NULL, but contrib/chkpass would crash if it did. One practical case
      in which this could be an issue is if libc is configured to refuse to
      execute unapproved hashing algorithms (e.g., 'FIPS mode').
      (CVE-2014-0066)

    * 

      Since the temporary server started by make check uses 'trust'
      authentication, another user on the same machine could connect to it
      as database superuser, and then potentially exploit the privileges of
      the operating-system user who started the tests. A future release
      will probably incorporate changes in the testing procedure to prevent
      this risk, but some public discussion is needed first. So for the
      moment, just warn people against using make check when there are
      untrusted users on the same machine. (CVE-2014-0067)

The complete list of bugs and more information can be found at: 
http://www.postgresql.org/docs/9.1/static/release-9-1-12.html
&lt;http://www.postgresql.org/docs/9.1/static/release-9-1-12.html&gt;

Security Issues references:

    * CVE-2014-0060
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060&gt;
    * CVE-2014-0061
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061&gt;
    * CVE-2014-0062
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062&gt;
    * CVE-2014-0063
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063&gt;
    * CVE-2014-0064
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064&gt;
    * CVE-2014-0065
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065&gt;
    * CVE-2014-0066
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-03"/>
	<updated date="2014-03-03"/>
	<bugzilla href="https://bugzilla.suse.com/802679">SUSE bug 802679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/812525">SUSE bug 812525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864845">SUSE bug 864845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864846">SUSE bug 864846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864847">SUSE bug 864847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864850">SUSE bug 864850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864851">SUSE bug 864851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864852">SUSE bug 864852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864853">SUSE bug 864853</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0255">CVE-2013-0255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1899/">CVE-2013-1899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1899">CVE-2013-1899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1900/">CVE-2013-1900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1900">CVE-2013-1900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1901/">CVE-2013-1901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1901">CVE-2013-1901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0060/">CVE-2014-0060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0060">CVE-2014-0060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0061/">CVE-2014-0061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0061">CVE-2014-0061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0062/">CVE-2014-0062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0062">CVE-2014-0062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0063/">CVE-2014-0063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0063">CVE-2014-0063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0064/">CVE-2014-0064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0064">CVE-2014-0064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0065/">CVE-2014-0065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0065">CVE-2014-0065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0066/">CVE-2014-0066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0066">CVE-2014-0066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009592414" comment="libecpg6-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592415" comment="libpq5-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591139" comment="libpq5-32bit-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592416" comment="postgresql91-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592417" comment="postgresql91-contrib-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592418" comment="postgresql91-docs-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592419" comment="postgresql91-server-9.1.12-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009592414" comment="libecpg6-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592415" comment="libpq5-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591139" comment="libpq5-32bit-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592416" comment="postgresql91-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592417" comment="postgresql91-contrib-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592418" comment="postgresql91-docs-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592419" comment="postgresql91-server-9.1.12-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217337" version="1" class="patch">
	<metadata>
		<title>Security update for libesmtp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1160462" ref_url="https://bugzilla.suse.com/1160462" source="BUGZILLA"/>
		<reference ref_id="1189097" ref_url="https://bugzilla.suse.com/1189097" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19977" ref_url="https://www.suse.com/security/cve/CVE-2019-19977/" source="CVE"/>
		<description>
This update for libesmtp fixes the following issues:

- CVE-2019-19977: Fixed stack-based buffer over-read in ntlm/ntlmstruct.c (bsc#1160462).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160462">SUSE bug 1160462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189097">SUSE bug 1189097</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19977/">CVE-2019-19977 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19977">CVE-2019-19977 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629508" comment="libesmtp-1.0.4-157.18.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217338" version="1" class="patch">
	<metadata>
		<title>Security update for libevent</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="897243" ref_url="https://bugzilla.suse.com/897243" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6272" ref_url="https://www.suse.com/security/cve/CVE-2014-6272/" source="CVE"/>
		<description>

This update fixes a buffer overflow in the buffered event handling in 
libevent. (CVE-2014-6272)

Security Issues:

    * CVE-2014-6272
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6272&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-06"/>
	<updated date="2014-10-06"/>
	<bugzilla href="https://bugzilla.suse.com/897243">SUSE bug 897243</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6272/">CVE-2014-6272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6272">CVE-2014-6272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572307" comment="libevent-1_4-2-1.4.5-24.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217339" version="1" class="patch">
	<metadata>
		<title>Security update for libevent (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1022917" ref_url="https://bugzilla.suse.com/1022917" source="BUGZILLA"/>
		<reference ref_id="1022918" ref_url="https://bugzilla.suse.com/1022918" source="BUGZILLA"/>
		<reference ref_id="1022919" ref_url="https://bugzilla.suse.com/1022919" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10195" ref_url="https://www.suse.com/security/cve/CVE-2016-10195/" source="CVE"/>
		<reference ref_id="CVE-2016-10196" ref_url="https://www.suse.com/security/cve/CVE-2016-10196/" source="CVE"/>
		<reference ref_id="CVE-2016-10197" ref_url="https://www.suse.com/security/cve/CVE-2016-10197/" source="CVE"/>
		<description>
This update for libevent fixes the following issues:

- CVE-2016-10195: DNS remote stack overread vulnerability (bsc#1022917) 
- CVE-2016-10196: stack/buffer overflow in evutil_parse_sockaddr_port() (bsc#1022918) (backport for 2.0.21)
- CVE-2016-10197: out-of-bounds read in search_make_new() (bsc#1022919) 
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-29"/>
	<updated date="2018-01-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022917">SUSE bug 1022917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022918">SUSE bug 1022918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022919">SUSE bug 1022919</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10195/">CVE-2016-10195 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10195">CVE-2016-10195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10196/">CVE-2016-10196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10196">CVE-2016-10196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10197/">CVE-2016-10197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10197">CVE-2016-10197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572308" comment="libevent-1_4-2-1.4.5-24.24.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217340" version="1" class="patch">
	<metadata>
		<title>Security update for libexif</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="771229" ref_url="https://bugzilla.suse.com/771229" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2812" ref_url="https://www.suse.com/security/cve/CVE-2012-2812/" source="CVE"/>
		<reference ref_id="CVE-2012-2813" ref_url="https://www.suse.com/security/cve/CVE-2012-2813/" source="CVE"/>
		<reference ref_id="CVE-2012-2814" ref_url="https://www.suse.com/security/cve/CVE-2012-2814/" source="CVE"/>
		<reference ref_id="CVE-2012-2836" ref_url="https://www.suse.com/security/cve/CVE-2012-2836/" source="CVE"/>
		<reference ref_id="CVE-2012-2837" ref_url="https://www.suse.com/security/cve/CVE-2012-2837/" source="CVE"/>
		<reference ref_id="CVE-2012-2840" ref_url="https://www.suse.com/security/cve/CVE-2012-2840/" source="CVE"/>
		<reference ref_id="CVE-2012-2841" ref_url="https://www.suse.com/security/cve/CVE-2012-2841/" source="CVE"/>
		<description>

Various overflows and other security related bugs in libexif were found by 
the Google Security team and fixed by the libexif developers.

Security Issue references:

    * CVE-2012-2812
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2812&gt;
    * CVE-2012-2813
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2813&gt;
    * CVE-2012-2814
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2814&gt;
    * CVE-2012-2836
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2836&gt;
    * CVE-2012-2837
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2837&gt;
    * CVE-2012-2840
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2840&gt;
    * CVE-2012-2841
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2841&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-17"/>
	<updated date="2012-07-17"/>
	<bugzilla href="https://bugzilla.suse.com/771229">SUSE bug 771229</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2812/">CVE-2012-2812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2812">CVE-2012-2812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2813/">CVE-2012-2813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2813">CVE-2012-2813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2814/">CVE-2012-2814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2814">CVE-2012-2814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2836/">CVE-2012-2836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2836">CVE-2012-2836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2837/">CVE-2012-2837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2837">CVE-2012-2837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2840/">CVE-2012-2840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2840">CVE-2012-2840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2841/">CVE-2012-2841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2841">CVE-2012-2841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992149" comment="libexif-0.6.17-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992150" comment="libexif-32bit-0.6.17-2.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217341" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1059893" ref_url="https://bugzilla.suse.com/1059893" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544/" source="CVE"/>
		<description>
This update for libexif fixes the following security issue:

- CVE-2017-7544: Fixed out-of-bounds heap read vulnerability in
  exif_data_save_data_entry function in libexif/exif-data.c caused by improper
  length computation of the allocated data of an ExifMnote entry which can cause
  denial-of-service or possibly information disclosure (bsc#1059893)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-24"/>
	<updated date="2018-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1059893">SUSE bug 1059893</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7544">CVE-2017-7544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572312" comment="libexif-0.6.17-2.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572313" comment="libexif-32bit-0.6.17-2.14.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217342" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-27"/>
	<updated date="2020-02-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20030">CVE-2018-20030 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9278">CVE-2019-9278 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572314" comment="libexif-0.6.17-2.14.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572315" comment="libexif-32bit-0.6.17-2.14.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217343" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="637290" ref_url="https://bugzilla.suse.com/637290" source="BUGZILLA"/>
		<reference ref_id="811833" ref_url="https://bugzilla.suse.com/811833" source="BUGZILLA"/>
		<reference ref_id="897890" ref_url="https://bugzilla.suse.com/897890" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2014-1568" ref_url="https://www.suse.com/security/cve/CVE-2014-1568/" source="CVE"/>
		<description>

Mozilla NSS was updated to 3.16.5 to fix a RSA certificate forgery issue.

MFSA 2014-73 / CVE-2014-1568: Antoine Delignat-Lavaud, security researcher 
at Inria Paris in team Prosecco, reported an issue in Network Security 
Services (NSS) libraries affecting all versions. He discovered that NSS is 
vulnerable to a variant of a signature forgery attack previously published 
by Daniel Bleichenbacher. This is due to lenient parsing of ASN.1 values 
involved in a signature and could lead to the forging of RSA certificates.

The Advanced Threat Research team at Intel Security also independently 
discovered and reported this issue.

Security Issues:

    * CVE-2014-1568
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-26"/>
	<updated date="2014-09-26"/>
	<bugzilla href="https://bugzilla.suse.com/637290">SUSE bug 637290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/811833">SUSE bug 811833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897890">SUSE bug 897890</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3170">CVE-2010-3170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1568/">CVE-2014-1568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1568">CVE-2014-1568 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576466" comment="libfreebl3-3.16.5-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576467" comment="libfreebl3-32bit-3.16.5-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992151" comment="mozilla-nspr-4.8.6-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992152" comment="mozilla-nspr-32bit-4.8.6-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576468" comment="mozilla-nss-3.16.5-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576469" comment="mozilla-nss-32bit-3.16.5-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576471" comment="mozilla-nss-tools-3.16.5-0.4.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576466" comment="libfreebl3-3.16.5-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576467" comment="libfreebl3-32bit-3.16.5-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992151" comment="mozilla-nspr-4.8.6-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992152" comment="mozilla-nspr-32bit-4.8.6-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576468" comment="mozilla-nss-3.16.5-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576469" comment="mozilla-nss-32bit-3.16.5-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576471" comment="mozilla-nss-tools-3.16.5-0.4.2.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217344" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="831359" ref_url="https://bugzilla.suse.com/831359" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4242" ref_url="https://www.suse.com/security/cve/CVE-2013-4242/" source="CVE"/>
		<description>

libgcrypt has been updated to fix a cryptographic weakness.

    * CVE-2013-4242: libgcrypt was affected by the Yarom/Falkner
      flush+reload side-channel attach on RSA secret keys, that could have
      potentially leaked the key data to attackers on the same machine.

Security Issue reference:

    * CVE-2013-4242
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-06"/>
	<updated date="2014-05-06"/>
	<bugzilla href="https://bugzilla.suse.com/831359">SUSE bug 831359</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4242/">CVE-2013-4242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4242">CVE-2013-4242 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572316" comment="libgcrypt11-1.4.1-6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572317" comment="libgcrypt11-32bit-1.4.1-6.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572316" comment="libgcrypt11-1.4.1-6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572317" comment="libgcrypt11-32bit-1.4.1-6.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217345" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="920057" ref_url="https://bugzilla.suse.com/920057" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3591" ref_url="https://www.suse.com/security/cve/CVE-2014-3591/" source="CVE"/>
		<reference ref_id="CVE-2015-0837" ref_url="https://www.suse.com/security/cve/CVE-2015-0837/" source="CVE"/>
		<description>


This update fixes the following issues:
* Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
  See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.
  (bsc#920057)
* Fixed data-dependent timing variations in modular exponentiation
  [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
  are Practical]
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-17"/>
	<updated date="2015-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/920057">SUSE bug 920057</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3591/">CVE-2014-3591 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3591">CVE-2014-3591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0837/">CVE-2015-0837 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0837">CVE-2015-0837 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572318" comment="libgcrypt11-1.4.1-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572319" comment="libgcrypt11-32bit-1.4.1-6.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217346" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="994157" ref_url="https://bugzilla.suse.com/994157" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6313" ref_url="https://www.suse.com/security/cve/CVE-2016-6313/" source="CVE"/>
		<description>

This update for libgcrypt fixes the following issues:

  - RNG prediction vulnerability (bsc#994157, CVE-2016-6313)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-14"/>
	<updated date="2016-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/994157">SUSE bug 994157</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6313/">CVE-2016-6313 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6313">CVE-2016-6313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572320" comment="libgcrypt11-1.4.1-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572321" comment="libgcrypt11-32bit-1.4.1-6.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217347" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1046607" ref_url="https://bugzilla.suse.com/1046607" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7526" ref_url="https://www.suse.com/security/cve/CVE-2017-7526/" source="CVE"/>
		<description>
This update for libgcrypt fixes the following security issue:

- CVE-2017-7526: Hardening against local side-channel attack. (bsc#1046607)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-18"/>
	<updated date="2017-07-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1046607">SUSE bug 1046607</bugzilla>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7526/">CVE-2017-7526 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7526">CVE-2017-7526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572322" comment="libgcrypt11-1.4.1-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572323" comment="libgcrypt11-32bit-1.4.1-6.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217348" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1148987" ref_url="https://bugzilla.suse.com/1148987" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13627" ref_url="https://www.suse.com/security/cve/CVE-2019-13627/" source="CVE"/>
		<description>
This update for libgcrypt fixes the following issues:

Security issue fixed:

- CVE-2019-13627: Mitigated against an ECDSA timing attack. (bsc#1148987)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-16"/>
	<updated date="2019-10-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1148987">SUSE bug 1148987</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13627/">CVE-2019-13627 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13627">CVE-2019-13627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572324" comment="libgcrypt11-1.4.1-6.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572325" comment="libgcrypt11-32bit-1.4.1-6.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217349" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1187212" ref_url="https://bugzilla.suse.com/1187212" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33560" ref_url="https://www.suse.com/security/cve/CVE-2021-33560/" source="CVE"/>
		<description>
This update for libgcrypt fixes the following issues:

- CVE-2021-33560: Fixed a side-channel against ElGamal encryption, caused by missing exponent blinding (bsc#1187212).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187212">SUSE bug 1187212</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33560/">CVE-2021-33560 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33560">CVE-2021-33560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572326" comment="libgcrypt11-1.4.1-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572327" comment="libgcrypt11-32bit-1.4.1-6.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217350" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="892464" ref_url="https://bugzilla.suse.com/892464" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5270" ref_url="https://www.suse.com/security/cve/CVE-2014-5270/" source="CVE"/>
		<description>

This libgcrypt update fixes the following security issue:

    * bnc#892464: Side-channel attack on Elgamal encryption subkeys.
      (CVE-2014-5270)

Security Issues:

    * CVE-2014-5270
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5270&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-20"/>
	<updated date="2014-08-20"/>
	<bugzilla href="https://bugzilla.suse.com/892464">SUSE bug 892464</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5270/">CVE-2014-5270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5270">CVE-2014-5270 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572328" comment="libgcrypt11-1.4.1-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572329" comment="libgcrypt11-32bit-1.4.1-6.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217351" version="1" class="patch">
	<metadata>
		<title>Security update for libgdiplus0</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="630756" ref_url="https://bugzilla.suse.com/630756" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-1526" ref_url="https://www.suse.com/security/cve/CVE-2010-1526/" source="CVE"/>
		<description>

This update fixes three integer overflows found by Secunia Research member 
Stefan Cornelius that could possibly be exploited to execute arbitrary 
code:

    * gdip_load_tiff_image() by processing specially crafted TIFF images
    * gdip_load_jpeg_image_internal() by processing specially crafted JPEG
      images
    * gdip_read_bmp_image() by processing specially crafted BMP image

Security Issue reference:

    * CVE-2010-1526
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1526&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-08-24"/>
	<updated date="2010-08-24"/>
	<bugzilla href="https://bugzilla.suse.com/630756">SUSE bug 630756</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1526/">CVE-2010-1526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1526">CVE-2010-1526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992153" comment="libgdiplus0-2.0-11.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217352" version="1" class="patch">
	<metadata>
		<title>Security update for libgnomesu</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="695627" ref_url="https://bugzilla.suse.com/695627" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1946" ref_url="https://www.suse.com/security/cve/CVE-2011-1946/" source="CVE"/>
		<description>

The libgnomesu pam backend did not check the return value of the setuid() 
functions. Local users could exploit that to gain root privileges 
(CVE-2011-1946).

Note: this is just a re-release of the previous update to fix a regression 
unrelated to the security issue.

Security Issue reference:

    * CVE-2011-1946
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1946&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-06-29"/>
	<updated date="2011-06-29"/>
	<bugzilla href="https://bugzilla.suse.com/695627">SUSE bug 695627</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1946/">CVE-2011-1946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1946">CVE-2011-1946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992154" comment="libgnomesu-1.0.0-307.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992155" comment="libgnomesu-lang-1.0.0-307.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992156" comment="libgnomesu0-1.0.0-307.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217353" version="1" class="patch">
	<metadata>
		<title>Security update for libgssglue</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="694598" ref_url="https://bugzilla.suse.com/694598" source="BUGZILLA"/>
		<description>

This update fixes insecure getenv() usage in libgssglue, which could be 
used under some circumstances by local attackers do gain root privileges.

		</description>
<advisory from="security@suse.de">
	<issued date="2011-05-27"/>
	<updated date="2011-05-27"/>
	<bugzilla href="https://bugzilla.suse.com/694598">SUSE bug 694598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992157" comment="libgssglue1-0.1-20.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217354" version="1" class="patch">
	<metadata>
		<title>Security update for libical (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1015964" ref_url="https://bugzilla.suse.com/1015964" source="BUGZILLA"/>
		<reference ref_id="1044995" ref_url="https://bugzilla.suse.com/1044995" source="BUGZILLA"/>
		<reference ref_id="986631" ref_url="https://bugzilla.suse.com/986631" source="BUGZILLA"/>
		<reference ref_id="986632" ref_url="https://bugzilla.suse.com/986632" source="BUGZILLA"/>
		<reference ref_id="986639" ref_url="https://bugzilla.suse.com/986639" source="BUGZILLA"/>
		<reference ref_id="986642" ref_url="https://bugzilla.suse.com/986642" source="BUGZILLA"/>
		<reference ref_id="986658" ref_url="https://bugzilla.suse.com/986658" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5823" ref_url="https://www.suse.com/security/cve/CVE-2016-5823/" source="CVE"/>
		<reference ref_id="CVE-2016-5824" ref_url="https://www.suse.com/security/cve/CVE-2016-5824/" source="CVE"/>
		<reference ref_id="CVE-2016-5825" ref_url="https://www.suse.com/security/cve/CVE-2016-5825/" source="CVE"/>
		<reference ref_id="CVE-2016-5826" ref_url="https://www.suse.com/security/cve/CVE-2016-5826/" source="CVE"/>
		<reference ref_id="CVE-2016-5827" ref_url="https://www.suse.com/security/cve/CVE-2016-5827/" source="CVE"/>
		<reference ref_id="CVE-2016-9584" ref_url="https://www.suse.com/security/cve/CVE-2016-9584/" source="CVE"/>
		<description>
This update for libical fixes the following issues:

Security issues fixed:

- CVE-2016-5823: The icalproperty_new_clone function in libical 0.47 and 1.0 allows remote
  attackers to cause a denial of service (use-after-free) via a crafted ics file. (bnc#986632)
- CVE-2016-5824: libical 1.0 allows remote attackers to cause a denial of service (use-after-free)
  via a crafted ics file. (bsc#986639)
- CVE-2016-5825: The icalparser_parse_string function in libical 0.47 and 1.0 allows remote
  attackers to cause a denial of service (out-of-bounds heap read) via a crafted ics file.
  (bsc#986642)
- CVE-2016-5826: The parser_get_next_char function in libical 0.47 and 1.0 allows remote attackers
  to cause a denial of service (out-of-bounds heap read) by crafting a string to the
  icalparser_parse_string function. (bsc#986658)
- CVE-2016-5827: The icaltime_from_string function in libical 0.47 and 1.0 allows remote attackers
  to cause a denial of service (out-of-bounds heap read) via a crafted string to the
  icalparser_parse_string function. (bsc#986631)
- CVE-2016-9584: libical allows remote attackers to cause a denial of service (use-after-free) and
  possibly read heap memory via a crafted ics file. (bnc#1015964)

Bug fixes:

- libical crashes while parsing timezones (bsc#1044995)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-15"/>
	<updated date="2018-01-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015964">SUSE bug 1015964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044995">SUSE bug 1044995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986631">SUSE bug 986631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986632">SUSE bug 986632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986642">SUSE bug 986642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986658">SUSE bug 986658</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5823/">CVE-2016-5823 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5823">CVE-2016-5823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5824/">CVE-2016-5824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5824">CVE-2016-5824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5825/">CVE-2016-5825 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5825">CVE-2016-5825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5826/">CVE-2016-5826 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5826">CVE-2016-5826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5827/">CVE-2016-5827 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5827">CVE-2016-5827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9584/">CVE-2016-9584 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9584">CVE-2016-9584 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572334" comment="libical0-0.43-1.2.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572335" comment="libical0-32bit-0.43-1.2.5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217355" version="1" class="patch">
	<metadata>
		<title>Security update for libidn (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="923241" ref_url="https://bugzilla.suse.com/923241" source="BUGZILLA"/>
		<reference ref_id="990189" ref_url="https://bugzilla.suse.com/990189" source="BUGZILLA"/>
		<reference ref_id="990190" ref_url="https://bugzilla.suse.com/990190" source="BUGZILLA"/>
		<reference ref_id="990191" ref_url="https://bugzilla.suse.com/990191" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059/" source="CVE"/>
		<reference ref_id="CVE-2015-8948" ref_url="https://www.suse.com/security/cve/CVE-2015-8948/" source="CVE"/>
		<reference ref_id="CVE-2016-6261" ref_url="https://www.suse.com/security/cve/CVE-2016-6261/" source="CVE"/>
		<reference ref_id="CVE-2016-6262" ref_url="https://www.suse.com/security/cve/CVE-2016-6262/" source="CVE"/>
		<reference ref_id="CVE-2016-6263" ref_url="https://www.suse.com/security/cve/CVE-2016-6263/" source="CVE"/>
		<description>

This update for libidn fixes the following issues:

- CVE-2016-6262 and CVE-2015-8948: Out-of-bounds-read when reading one zero byte as input (bsc#990189)

- CVE-2016-6261: Out-of-bounds stack read in idna_to_ascii_4i (bsc#990190) 

- CVE-2016-6263: stringprep_utf8_nfkc_normalize reject invalid UTF-8 (bsc#990191)

- CVE-2015-2059: out-of-bounds read with stringprep on invalid UTF-8 (bsc#923241) 

		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-12"/>
	<updated date="2016-09-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/923241">SUSE bug 923241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990189">SUSE bug 990189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990190">SUSE bug 990190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990191">SUSE bug 990191</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2059">CVE-2015-2059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8948/">CVE-2015-8948 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8948">CVE-2015-8948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6261/">CVE-2016-6261 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6261">CVE-2016-6261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6262/">CVE-2016-6262 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6262">CVE-2016-6262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6263/">CVE-2016-6263 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6263">CVE-2016-6263 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572336" comment="libidn-1.10-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572337" comment="libidn-32bit-1.10-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217356" version="1" class="patch">
	<metadata>
		<title>Security update for libidn (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1056450" ref_url="https://bugzilla.suse.com/1056450" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14062" ref_url="https://www.suse.com/security/cve/CVE-2017-14062/" source="CVE"/>
		<description>
This update for libidn fixes one issues.

This security issue was fixed:

- CVE-2017-14062: Prevent integer overflow in the decode_digit function that
  allowed remote attackers to cause a denial of service or possibly have
  unspecified other impact (bsc#1056450).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-08"/>
	<updated date="2018-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056450">SUSE bug 1056450</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14062/">CVE-2017-14062 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14062">CVE-2017-14062 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572338" comment="libidn-1.10-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572339" comment="libidn-32bit-1.10-7.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217357" version="1" class="patch">
	<metadata>
		<title>Security update for libjasper</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="906364" ref_url="https://bugzilla.suse.com/906364" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9029" ref_url="https://www.suse.com/security/cve/CVE-2014-9029/" source="CVE"/>
		<description>

This update for libjasper fixes multiple off-by-one errors which could 
allow remote attackers to execute arbitrary code via a heap-based buffer 
overflow triggered by a crafted jp2 (JPEG 2000) file. (bsc#906364, 
CVE-2014-9029)

Security Issues:

    * CVE-2014-9029
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9029&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-04"/>
	<updated date="2014-12-04"/>
	<bugzilla href="https://bugzilla.suse.com/906364">SUSE bug 906364</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9029/">CVE-2014-9029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9029">CVE-2014-9029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572340" comment="libjasper-1.900.1-134.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566826" comment="libjasper-32bit-1.900.1-134.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217358" version="1" class="patch">
	<metadata>
		<title>Security update for libksba</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="907074" ref_url="https://bugzilla.suse.com/907074" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9087" ref_url="https://www.suse.com/security/cve/CVE-2014-9087/" source="CVE"/>
		<description>

This libksba update fixes the following security issue:

    * bnc#907074: buffer overflow in ksba_oid_to_str (CVE-2014-9087)

Security Issues:

    * CVE-2014-9087
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9087&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-11"/>
	<updated date="2014-12-11"/>
	<bugzilla href="https://bugzilla.suse.com/907074">SUSE bug 907074</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9087/">CVE-2014-9087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9087">CVE-2014-9087 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572341" comment="libksba-1.0.4-1.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217359" version="1" class="patch">
	<metadata>
		<title>Security update for libksba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="979261" ref_url="https://bugzilla.suse.com/979261" source="BUGZILLA"/>
		<reference ref_id="979906" ref_url="https://bugzilla.suse.com/979906" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4574" ref_url="https://www.suse.com/security/cve/CVE-2016-4574/" source="CVE"/>
		<reference ref_id="CVE-2016-4579" ref_url="https://www.suse.com/security/cve/CVE-2016-4579/" source="CVE"/>
		<description>

This update for libksba fixes the following issues:

- CVE-2016-4579: Out-of-bounds read in _ksba_ber_parse_tl()
- CVE-2016-4574: two OOB read access bugs (remote DoS) (bsc#979261)

Also adding reliability fixes from v1.3.4.

		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-07"/>
	<updated date="2016-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/979261">SUSE bug 979261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979906">SUSE bug 979906</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4574/">CVE-2016-4574 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4574">CVE-2016-4574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4579/">CVE-2016-4579 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4579">CVE-2016-4579 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572342" comment="libksba-1.0.4-1.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217360" version="1" class="patch">
	<metadata>
		<title>Security update for libksba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="926826" ref_url="https://bugzilla.suse.com/926826" source="BUGZILLA"/>
		<description>
The libksba package was updated to fix the following security issues:

- Fixed an integer overflow, an out of bounds read and a stack overflow issues (bsc#926826).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-23"/>
	<updated date="2015-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926826">SUSE bug 926826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572343" comment="libksba-1.0.4-1.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217361" version="1" class="patch">
	<metadata>
		<title>Security update for openLDAP</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="606294" ref_url="https://bugzilla.suse.com/606294" source="BUGZILLA"/>
		<reference ref_id="612430" ref_url="https://bugzilla.suse.com/612430" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0211" ref_url="https://www.suse.com/security/cve/CVE-2010-0211/" source="CVE"/>
		<reference ref_id="CVE-2010-0212" ref_url="https://www.suse.com/security/cve/CVE-2010-0212/" source="CVE"/>
		<description>

Several issues have been fixed in OpenLDAP:

    * specially crafted MODRDN operations can crash the OpenLDAP server
      (CVE-2010-0211 and CVE-2010-0212)
    * syncrepl might loose deletes in refreshAndPersist mode

Security Issues:

    * CVE-2010-0211
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0211&gt;
    * CVE-2010-0212
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0212&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-06-16"/>
	<updated date="2010-06-16"/>
	<bugzilla href="https://bugzilla.suse.com/606294">SUSE bug 606294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/612430">SUSE bug 612430</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0211/">CVE-2010-0211 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-0211">CVE-2010-0211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0212/">CVE-2010-0212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0212">CVE-2010-0212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992158" comment="libldap-2_4-2-2.4.20-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992159" comment="libldap-2_4-2-32bit-2.4.20-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992160" comment="openldap2-2.4.20-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992161" comment="openldap2-back-meta-2.4.20-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992162" comment="openldap2-client-2.4.20-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217362" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1056090" ref_url="https://bugzilla.suse.com/1056090" source="BUGZILLA"/>
		<reference ref_id="1056093" ref_url="https://bugzilla.suse.com/1056093" source="BUGZILLA"/>
		<reference ref_id="1056095" ref_url="https://bugzilla.suse.com/1056095" source="BUGZILLA"/>
		<reference ref_id="1056097" ref_url="https://bugzilla.suse.com/1056097" source="BUGZILLA"/>
		<reference ref_id="1056101" ref_url="https://bugzilla.suse.com/1056101" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13739" ref_url="https://www.suse.com/security/cve/CVE-2017-13739/" source="CVE"/>
		<reference ref_id="CVE-2017-13740" ref_url="https://www.suse.com/security/cve/CVE-2017-13740/" source="CVE"/>
		<reference ref_id="CVE-2017-13741" ref_url="https://www.suse.com/security/cve/CVE-2017-13741/" source="CVE"/>
		<reference ref_id="CVE-2017-13743" ref_url="https://www.suse.com/security/cve/CVE-2017-13743/" source="CVE"/>
		<description>
This update for liblouis fixes several issues.

These security issues were fixed:

- CVE-2017-13739: Prevent heap-based buffer overflow in the function resolveSubtable() that could have caused DoS or remote code execution (bsc#1056101)
- CVE-2017-13740: Prevent stack-based buffer overflow in the function parseChars() that could have caused DoS or possibly unspecified other impact (bsc#1056097)  ()
- CVE-2017-13741: Prevent use-after-free in function compileBrailleIndicator() that allowed to cause remote DoS (bsc#1056095)
- CVE_2017-13742: Prevent stack-based buffer overflow in function includeFile that allowed to cause remote DoS (bsc#1056093).
- CVE-2017-13743: Prevent buffer overflow triggered in the function _lou_showString() that allowed to cause remote DoS (bsc#1056090)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-28"/>
	<updated date="2017-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056090">SUSE bug 1056090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056093">SUSE bug 1056093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056095">SUSE bug 1056095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056097">SUSE bug 1056097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056101">SUSE bug 1056101</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13739/">CVE-2017-13739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13739">CVE-2017-13739 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13740/">CVE-2017-13740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13740">CVE-2017-13740 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13741/">CVE-2017-13741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13741">CVE-2017-13741 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13743/">CVE-2017-13743 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13743">CVE-2017-13743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572350" comment="liblouis-1.7.0-1.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572351" comment="liblouis0-1.7.0-1.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572352" comment="python-louis-1.7.0-1.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217363" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1062458" ref_url="https://bugzilla.suse.com/1062458" source="BUGZILLA"/>
		<reference ref_id="1067336" ref_url="https://bugzilla.suse.com/1067336" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8184" ref_url="https://www.suse.com/security/cve/CVE-2014-8184/" source="CVE"/>
		<reference ref_id="CVE-2017-15101" ref_url="https://www.suse.com/security/cve/CVE-2017-15101/" source="CVE"/>
		<description>
This update for liblouis fixes the following issues:

Security issues fixed:

- CVE-2017-15101: Buffer overflow in findTable (bsc#1067336).
- CVE-2014-8184: stack-based buffer overflow in findTable() (bsc#1062458).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-24"/>
	<updated date="2017-11-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062458">SUSE bug 1062458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067336">SUSE bug 1067336</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-8184/">CVE-2014-8184 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8184">CVE-2014-8184 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15101/">CVE-2017-15101 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15101">CVE-2017-15101 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572353" comment="liblouis-1.7.0-1.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572354" comment="liblouis0-1.7.0-1.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572355" comment="python-louis-1.7.0-1.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217364" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1095825" ref_url="https://bugzilla.suse.com/1095825" source="BUGZILLA"/>
		<reference ref_id="1095826" ref_url="https://bugzilla.suse.com/1095826" source="BUGZILLA"/>
		<reference ref_id="1095827" ref_url="https://bugzilla.suse.com/1095827" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11683" ref_url="https://www.suse.com/security/cve/CVE-2018-11683/" source="CVE"/>
		<reference ref_id="CVE-2018-11684" ref_url="https://www.suse.com/security/cve/CVE-2018-11684/" source="CVE"/>
		<reference ref_id="CVE-2018-11685" ref_url="https://www.suse.com/security/cve/CVE-2018-11685/" source="CVE"/>
		<description>
This update for liblouis, python-louis fixes the following issues:

Security issues fixed:

- CVE-2018-11684: Fixed stack-based buffer overflow in the function
  includeFile() in compileTranslationTable.c (bsc#1095826)
- CVE-2018-11685: Fixed a stack-based buffer overflow in the function
  compileHyphenation() in compileTranslationTable.c (bsc#1095825)
- CVE-2018-11683: Fix a stack-based buffer overflow in the function parseChars()
  in compileTranslationTable.c (bsc#1095827)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-31"/>
	<updated date="2018-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1095825">SUSE bug 1095825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095826">SUSE bug 1095826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095827">SUSE bug 1095827</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11683/">CVE-2018-11683 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11683">CVE-2018-11683 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11684/">CVE-2018-11684 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11684">CVE-2018-11684 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11685/">CVE-2018-11685 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11685">CVE-2018-11685 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572356" comment="liblouis-1.7.0-1.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572357" comment="liblouis0-1.7.0-1.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572358" comment="python-louis-1.7.0-1.3.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217365" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1109319" ref_url="https://bugzilla.suse.com/1109319" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17294" ref_url="https://www.suse.com/security/cve/CVE-2018-17294/" source="CVE"/>
		<description>
This update for liblouis and python-louis fixes the following issue:

Security issue fixed: 

- CVE-2018-17294: Fixed an out of bounds read in matchCurrentInput function
  which could allow a remote attacker to cause Denail of Service (bsc#1109319).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1109319">SUSE bug 1109319</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17294/">CVE-2018-17294 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17294">CVE-2018-17294 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572359" comment="liblouis-1.7.0-1.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572360" comment="liblouis0-1.7.0-1.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572361" comment="python-louis-1.7.0-1.3.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217366" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1097103" ref_url="https://bugzilla.suse.com/1097103" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12085" ref_url="https://www.suse.com/security/cve/CVE-2018-12085/" source="CVE"/>
		<description>
This update for liblouis fixes the following issues:

- CVE-2018-12085: Fixed an off-by-one error resulting in a buffer overrun (bsc#1097103).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-09"/>
	<updated date="2020-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1097103">SUSE bug 1097103</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12085/">CVE-2018-12085 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12085">CVE-2018-12085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572362" comment="liblouis-1.7.0-1.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572363" comment="liblouis0-1.7.0-1.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572364" comment="python-louis-1.7.0-1.3.19.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217367" version="1" class="patch">
	<metadata>
		<title>Security update for lzo</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="883947" ref_url="https://bugzilla.suse.com/883947" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607/" source="CVE"/>
		<description>

lzo was updated to fix a potential denial of service issue or possible 
remote code execution by allowing an attacker, if the LZO decompression 
algorithm is used in a threaded or kernel context, to corrupt memory 
structures that control the flow of execution in other contexts. 
(CVE-2014-4607)

Security Issue reference:

    * CVE-2014-4607
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4607&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-11"/>
	<updated date="2014-07-11"/>
	<bugzilla href="https://bugzilla.suse.com/883947">SUSE bug 883947</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4607">CVE-2014-4607 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572365" comment="liblzo2-2-2.03-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572366" comment="liblzo2-2-32bit-2.03-12.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572365" comment="liblzo2-2-2.03-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572366" comment="liblzo2-2-32bit-2.03-12.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217368" version="1" class="patch">
	<metadata>
		<title>Security update for libmpfr</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="911812" ref_url="https://bugzilla.suse.com/911812" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9474" ref_url="https://www.suse.com/security/cve/CVE-2014-9474/" source="CVE"/>
		<description>

This update for libmpfr fixes a buffer overflow in mpfr_strtofr. 
(CVE-2014-9474)

Security Issues:

    * CVE-2014-9474
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9474&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-23"/>
	<updated date="2015-01-23"/>
	<bugzilla href="https://bugzilla.suse.com/911812">SUSE bug 911812</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9474/">CVE-2014-9474 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9474">CVE-2014-9474 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572367" comment="libmpfr1-2.3.2-3.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563448" comment="libmpfr1-32bit-2.3.2-3.118.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217369" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="912214" ref_url="https://bugzilla.suse.com/912214" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556/" source="CVE"/>
		<description>

This update for libmspack fixes the following security issue:

    * CVE-2014-9556: An integer overflow in the function qtmd_decompress()
      could be exploited to cause a denial of service (endless loop).
      (bsc##912214)

Security Issues:

    * CVE-2014-9556
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9556&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-05"/>
	<updated date="2015-03-05"/>
	<bugzilla href="https://bugzilla.suse.com/912214">SUSE bug 912214</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9556">CVE-2014-9556 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572368" comment="libmspack0-0.0.20060920alpha-74.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217370" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="934524" ref_url="https://bugzilla.suse.com/934524" source="BUGZILLA"/>
		<reference ref_id="934525" ref_url="https://bugzilla.suse.com/934525" source="BUGZILLA"/>
		<reference ref_id="934526" ref_url="https://bugzilla.suse.com/934526" source="BUGZILLA"/>
		<reference ref_id="934527" ref_url="https://bugzilla.suse.com/934527" source="BUGZILLA"/>
		<reference ref_id="934528" ref_url="https://bugzilla.suse.com/934528" source="BUGZILLA"/>
		<reference ref_id="934529" ref_url="https://bugzilla.suse.com/934529" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9732" ref_url="https://www.suse.com/security/cve/CVE-2014-9732/" source="CVE"/>
		<reference ref_id="CVE-2015-4467" ref_url="https://www.suse.com/security/cve/CVE-2015-4467/" source="CVE"/>
		<reference ref_id="CVE-2015-4469" ref_url="https://www.suse.com/security/cve/CVE-2015-4469/" source="CVE"/>
		<reference ref_id="CVE-2015-4470" ref_url="https://www.suse.com/security/cve/CVE-2015-4470/" source="CVE"/>
		<reference ref_id="CVE-2015-4471" ref_url="https://www.suse.com/security/cve/CVE-2015-4471/" source="CVE"/>
		<reference ref_id="CVE-2015-4472" ref_url="https://www.suse.com/security/cve/CVE-2015-4472/" source="CVE"/>
		<description>
libmspack was updated to fix several security vulnerabilities.

- Fix null pointer dereference on a crafted CAB. (bsc#934524, CVE-2014-9732)
- Fix denial of service while processing crafted CHM file. (bsc#934525, CVE-2015-4467)
- Fix denial of service while processing crafted CHM file. (bsc#934529, CVE-2015-4472)
- Fix pointer arithmetic overflow during CHM decompression. (bsc#934526, CVE-2015-4469)
- Fix off-by-one buffer over-read in mspack/mszipd.c. (bsc#934527, CVE-2015-4470)
- Fix off-by-one buffer under-read in mspack/lzxd.c. (bsc#934528, CVE-2015-4471)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934525">SUSE bug 934525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934526">SUSE bug 934526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934527">SUSE bug 934527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934528">SUSE bug 934528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934529">SUSE bug 934529</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9732/">CVE-2014-9732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9732">CVE-2014-9732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4467/">CVE-2015-4467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4467">CVE-2015-4467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4469/">CVE-2015-4469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4469">CVE-2015-4469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4470/">CVE-2015-4470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4470">CVE-2015-4470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4471/">CVE-2015-4471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4471">CVE-2015-4471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4472/">CVE-2015-4472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4472">CVE-2015-4472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572369" comment="libmspack0-0.0.20060920alpha-74.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217371" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1113038" ref_url="https://bugzilla.suse.com/1113038" source="BUGZILLA"/>
		<reference ref_id="1113039" ref_url="https://bugzilla.suse.com/1113039" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18584" ref_url="https://www.suse.com/security/cve/CVE-2018-18584/" source="CVE"/>
		<reference ref_id="CVE-2018-18585" ref_url="https://www.suse.com/security/cve/CVE-2018-18585/" source="CVE"/>
		<description>
This update for libmspack fixes the following issues:

Security issues fixed:

- CVE-2018-18584: The CAB block input buffer was one byte too small for the maximal Quantum block, leading to an out-of-bounds write. (bsc#1113038)
- CVE-2018-18585: chmd_read_headers accepted a filename that has '\0' as its first or second character (such as the '/\0' name). (bsc#1113039)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1113038">SUSE bug 1113038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113039">SUSE bug 1113039</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18584/">CVE-2018-18584 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18584">CVE-2018-18584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18585/">CVE-2018-18585 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18585">CVE-2018-18585 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572370" comment="libmspack0-0.0.20060920alpha-74.11.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217372" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1141680" ref_url="https://bugzilla.suse.com/1141680" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010305" ref_url="https://www.suse.com/security/cve/CVE-2019-1010305/" source="CVE"/>
		<description>
This update for libmspack fixes the following issues:

Security issue fixed: 

- CVE-2019-1010305: Fixed a buffer overflow triggered by a crafted chm file
  which could have led to information disclosure (bsc#1141680).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-27"/>
	<updated date="2020-10-27"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1141680">SUSE bug 1141680</bugzilla>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1010305/">CVE-2019-1010305 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010305">CVE-2019-1010305 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572371" comment="libmspack0-0.0.20060920alpha-74.11.9.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217373" version="1" class="patch">
	<metadata>
		<title>Security update for MySQL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="607466" ref_url="https://bugzilla.suse.com/607466" source="BUGZILLA"/>
		<reference ref_id="609551" ref_url="https://bugzilla.suse.com/609551" source="BUGZILLA"/>
		<reference ref_id="637499" ref_url="https://bugzilla.suse.com/637499" source="BUGZILLA"/>
		<reference ref_id="644864" ref_url="https://bugzilla.suse.com/644864" source="BUGZILLA"/>
		<reference ref_id="694232" ref_url="https://bugzilla.suse.com/694232" source="BUGZILLA"/>
		<reference ref_id="742835" ref_url="https://bugzilla.suse.com/742835" source="BUGZILLA"/>
		<reference ref_id="765092" ref_url="https://bugzilla.suse.com/765092" source="BUGZILLA"/>
		<reference ref_id="769062" ref_url="https://bugzilla.suse.com/769062" source="BUGZILLA"/>
		<reference ref_id="792444" ref_url="https://bugzilla.suse.com/792444" source="BUGZILLA"/>
		<reference ref_id="934789" ref_url="https://bugzilla.suse.com/934789" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-1626" ref_url="https://www.suse.com/security/cve/CVE-2010-1626/" source="CVE"/>
		<reference ref_id="CVE-2010-1848" ref_url="https://www.suse.com/security/cve/CVE-2010-1848/" source="CVE"/>
		<reference ref_id="CVE-2010-1849" ref_url="https://www.suse.com/security/cve/CVE-2010-1849/" source="CVE"/>
		<reference ref_id="CVE-2010-1850" ref_url="https://www.suse.com/security/cve/CVE-2010-1850/" source="CVE"/>
		<reference ref_id="CVE-2010-3677" ref_url="https://www.suse.com/security/cve/CVE-2010-3677/" source="CVE"/>
		<reference ref_id="CVE-2010-3678" ref_url="https://www.suse.com/security/cve/CVE-2010-3678/" source="CVE"/>
		<reference ref_id="CVE-2010-3681" ref_url="https://www.suse.com/security/cve/CVE-2010-3681/" source="CVE"/>
		<reference ref_id="CVE-2010-3682" ref_url="https://www.suse.com/security/cve/CVE-2010-3682/" source="CVE"/>
		<reference ref_id="CVE-2010-3683" ref_url="https://www.suse.com/security/cve/CVE-2010-3683/" source="CVE"/>
		<reference ref_id="CVE-2010-3833" ref_url="https://www.suse.com/security/cve/CVE-2010-3833/" source="CVE"/>
		<reference ref_id="CVE-2010-3834" ref_url="https://www.suse.com/security/cve/CVE-2010-3834/" source="CVE"/>
		<reference ref_id="CVE-2010-3835" ref_url="https://www.suse.com/security/cve/CVE-2010-3835/" source="CVE"/>
		<reference ref_id="CVE-2010-3836" ref_url="https://www.suse.com/security/cve/CVE-2010-3836/" source="CVE"/>
		<reference ref_id="CVE-2010-3837" ref_url="https://www.suse.com/security/cve/CVE-2010-3837/" source="CVE"/>
		<reference ref_id="CVE-2010-3838" ref_url="https://www.suse.com/security/cve/CVE-2010-3838/" source="CVE"/>
		<reference ref_id="CVE-2010-3839" ref_url="https://www.suse.com/security/cve/CVE-2010-3839/" source="CVE"/>
		<reference ref_id="CVE-2010-3840" ref_url="https://www.suse.com/security/cve/CVE-2010-3840/" source="CVE"/>
		<reference ref_id="CVE-2012-2122" ref_url="https://www.suse.com/security/cve/CVE-2012-2122/" source="CVE"/>
		<reference ref_id="CVE-2012-5611" ref_url="https://www.suse.com/security/cve/CVE-2012-5611/" source="CVE"/>
		<reference ref_id="CVE-2012-5612" ref_url="https://www.suse.com/security/cve/CVE-2012-5612/" source="CVE"/>
		<reference ref_id="CVE-2012-5613" ref_url="https://www.suse.com/security/cve/CVE-2012-5613/" source="CVE"/>
		<reference ref_id="CVE-2012-5615" ref_url="https://www.suse.com/security/cve/CVE-2012-5615/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1177-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001491.html" source="SUSE-SU"/>
		<description>

A stack-based buffer overflow in MySQL has been fixed that could have 
caused a Denial of Service or potentially allowed the execution of 
arbitrary code (CVE-2012-5611).

Security Issue references:

    * CVE-2012-5615
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5615&gt;
    * CVE-2012-5615
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5615&gt;
    * CVE-2012-5613
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5613&gt;
    * CVE-2012-5612
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5612&gt;
    * CVE-2012-5611
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5611&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-12-27"/>
	<updated date="2012-12-27"/>
	<bugzilla href="https://bugzilla.suse.com/607466">SUSE bug 607466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/609551">SUSE bug 609551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/637499">SUSE bug 637499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/644864">SUSE bug 644864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/694232">SUSE bug 694232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742835">SUSE bug 742835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/765092">SUSE bug 765092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769062">SUSE bug 769062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792444">SUSE bug 792444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934789">SUSE bug 934789</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1626/">CVE-2010-1626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1626">CVE-2010-1626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1848/">CVE-2010-1848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1848">CVE-2010-1848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1849/">CVE-2010-1849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1849">CVE-2010-1849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1850/">CVE-2010-1850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1850">CVE-2010-1850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3677/">CVE-2010-3677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3677">CVE-2010-3677 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3678/">CVE-2010-3678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3678">CVE-2010-3678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3681/">CVE-2010-3681 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3681">CVE-2010-3681 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3682/">CVE-2010-3682 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3682">CVE-2010-3682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3683/">CVE-2010-3683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3683">CVE-2010-3683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3833/">CVE-2010-3833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3833">CVE-2010-3833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3834/">CVE-2010-3834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3834">CVE-2010-3834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3835/">CVE-2010-3835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3835">CVE-2010-3835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3836/">CVE-2010-3836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3836">CVE-2010-3836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3837/">CVE-2010-3837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3837">CVE-2010-3837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3838/">CVE-2010-3838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3838">CVE-2010-3838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3839/">CVE-2010-3839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3839">CVE-2010-3839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3840/">CVE-2010-3840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3840">CVE-2010-3840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2122/">CVE-2012-2122 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2122">CVE-2012-2122 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5611/">CVE-2012-5611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5611">CVE-2012-5611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5612/">CVE-2012-5612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5612">CVE-2012-5612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5613/">CVE-2012-5613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5613">CVE-2012-5613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5615/">CVE-2012-5615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5615">CVE-2012-5615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992163" comment="libmysqlclient15-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992164" comment="libmysqlclient15-32bit-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992165" comment="libmysqlclient_r15-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992166" comment="mysql-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992167" comment="mysql-Max-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992168" comment="mysql-client-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992169" comment="mysql-tools-5.0.96-0.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992163" comment="libmysqlclient15-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992164" comment="libmysqlclient15-32bit-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992165" comment="libmysqlclient_r15-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992166" comment="mysql-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992167" comment="mysql-Max-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992168" comment="mysql-client-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992169" comment="mysql-tools-5.0.96-0.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217374" version="1" class="patch">
	<metadata>
		<title>Security update for libnl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1020123" ref_url="https://bugzilla.suse.com/1020123" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0386" ref_url="https://www.suse.com/security/cve/CVE-2017-0386/" source="CVE"/>
		<description>
This update for libnl fixes the following issues:

Security issue fixed:

- CVE-2017-0386: Fixed a privilege escalation vulnerability which allowed a local user to execute code within a privileged process (bsc#1020123).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-28"/>
	<updated date="2020-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1020123">SUSE bug 1020123</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0386/">CVE-2017-0386 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0386">CVE-2017-0386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572380" comment="libnl-1.1-49.22.6.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572381" comment="libnl-32bit-1.1-49.22.6.3.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217375" version="1" class="patch">
	<metadata>
		<title>Security update for opensc</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="660109" ref_url="https://bugzilla.suse.com/660109" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-4523" ref_url="https://www.suse.com/security/cve/CVE-2010-4523/" source="CVE"/>
		<description>

Specially crafted smart cards could cause a buffer overflow in opensc 
(CVE-2010-4523).

Security Issue reference:

    * CVE-2010-4523
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4523&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-12-22"/>
	<updated date="2010-12-22"/>
	<bugzilla href="https://bugzilla.suse.com/660109">SUSE bug 660109</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4523/">CVE-2010-4523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4523">CVE-2010-4523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992170" comment="libopensc2-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992171" comment="libopensc2-32bit-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992172" comment="opensc-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992173" comment="opensc-32bit-0.11.6-5.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217376" version="1" class="patch">
	<metadata>
		<title>Security update for OpenSSL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="608666" ref_url="https://bugzilla.suse.com/608666" source="BUGZILLA"/>
		<reference ref_id="629905" ref_url="https://bugzilla.suse.com/629905" source="BUGZILLA"/>
		<reference ref_id="651003" ref_url="https://bugzilla.suse.com/651003" source="BUGZILLA"/>
		<reference ref_id="657663" ref_url="https://bugzilla.suse.com/657663" source="BUGZILLA"/>
		<reference ref_id="670526" ref_url="https://bugzilla.suse.com/670526" source="BUGZILLA"/>
		<reference ref_id="693027" ref_url="https://bugzilla.suse.com/693027" source="BUGZILLA"/>
		<reference ref_id="716144" ref_url="https://bugzilla.suse.com/716144" source="BUGZILLA"/>
		<reference ref_id="739719" ref_url="https://bugzilla.suse.com/739719" source="BUGZILLA"/>
		<reference ref_id="742821" ref_url="https://bugzilla.suse.com/742821" source="BUGZILLA"/>
		<reference ref_id="743344" ref_url="https://bugzilla.suse.com/743344" source="BUGZILLA"/>
		<reference ref_id="748738" ref_url="https://bugzilla.suse.com/748738" source="BUGZILLA"/>
		<reference ref_id="749210" ref_url="https://bugzilla.suse.com/749210" source="BUGZILLA"/>
		<reference ref_id="749213" ref_url="https://bugzilla.suse.com/749213" source="BUGZILLA"/>
		<reference ref_id="749735" ref_url="https://bugzilla.suse.com/749735" source="BUGZILLA"/>
		<reference ref_id="751946" ref_url="https://bugzilla.suse.com/751946" source="BUGZILLA"/>
		<reference ref_id="751977" ref_url="https://bugzilla.suse.com/751977" source="BUGZILLA"/>
		<reference ref_id="755395" ref_url="https://bugzilla.suse.com/755395" source="BUGZILLA"/>
		<reference ref_id="758060" ref_url="https://bugzilla.suse.com/758060" source="BUGZILLA"/>
		<reference ref_id="761324" ref_url="https://bugzilla.suse.com/761324" source="BUGZILLA"/>
		<reference ref_id="761838" ref_url="https://bugzilla.suse.com/761838" source="BUGZILLA"/>
		<reference ref_id="767256" ref_url="https://bugzilla.suse.com/767256" source="BUGZILLA"/>
		<reference ref_id="768097" ref_url="https://bugzilla.suse.com/768097" source="BUGZILLA"/>
		<reference ref_id="779952" ref_url="https://bugzilla.suse.com/779952" source="BUGZILLA"/>
		<reference ref_id="802648" ref_url="https://bugzilla.suse.com/802648" source="BUGZILLA"/>
		<reference ref_id="802746" ref_url="https://bugzilla.suse.com/802746" source="BUGZILLA"/>
		<reference ref_id="859228" ref_url="https://bugzilla.suse.com/859228" source="BUGZILLA"/>
		<reference ref_id="859924" ref_url="https://bugzilla.suse.com/859924" source="BUGZILLA"/>
		<reference ref_id="860332" ref_url="https://bugzilla.suse.com/860332" source="BUGZILLA"/>
		<reference ref_id="862181" ref_url="https://bugzilla.suse.com/862181" source="BUGZILLA"/>
		<reference ref_id="869945" ref_url="https://bugzilla.suse.com/869945" source="BUGZILLA"/>
		<reference ref_id="870192" ref_url="https://bugzilla.suse.com/870192" source="BUGZILLA"/>
		<reference ref_id="879179" ref_url="https://bugzilla.suse.com/879179" source="BUGZILLA"/>
		<reference ref_id="880891" ref_url="https://bugzilla.suse.com/880891" source="BUGZILLA"/>
		<reference ref_id="890764" ref_url="https://bugzilla.suse.com/890764" source="BUGZILLA"/>
		<reference ref_id="890767" ref_url="https://bugzilla.suse.com/890767" source="BUGZILLA"/>
		<reference ref_id="890768" ref_url="https://bugzilla.suse.com/890768" source="BUGZILLA"/>
		<reference ref_id="890769" ref_url="https://bugzilla.suse.com/890769" source="BUGZILLA"/>
		<reference ref_id="890770" ref_url="https://bugzilla.suse.com/890770" source="BUGZILLA"/>
		<reference ref_id="892403" ref_url="https://bugzilla.suse.com/892403" source="BUGZILLA"/>
		<reference ref_id="901223" ref_url="https://bugzilla.suse.com/901223" source="BUGZILLA"/>
		<reference ref_id="901277" ref_url="https://bugzilla.suse.com/901277" source="BUGZILLA"/>
		<reference ref_id="912014" ref_url="https://bugzilla.suse.com/912014" source="BUGZILLA"/>
		<reference ref_id="912015" ref_url="https://bugzilla.suse.com/912015" source="BUGZILLA"/>
		<reference ref_id="912018" ref_url="https://bugzilla.suse.com/912018" source="BUGZILLA"/>
		<reference ref_id="912293" ref_url="https://bugzilla.suse.com/912293" source="BUGZILLA"/>
		<reference ref_id="912294" ref_url="https://bugzilla.suse.com/912294" source="BUGZILLA"/>
		<reference ref_id="912296" ref_url="https://bugzilla.suse.com/912296" source="BUGZILLA"/>
		<reference ref_id="915976" ref_url="https://bugzilla.suse.com/915976" source="BUGZILLA"/>
		<reference ref_id="919648" ref_url="https://bugzilla.suse.com/919648" source="BUGZILLA"/>
		<reference ref_id="920236" ref_url="https://bugzilla.suse.com/920236" source="BUGZILLA"/>
		<reference ref_id="922488" ref_url="https://bugzilla.suse.com/922488" source="BUGZILLA"/>
		<reference ref_id="922496" ref_url="https://bugzilla.suse.com/922496" source="BUGZILLA"/>
		<reference ref_id="922499" ref_url="https://bugzilla.suse.com/922499" source="BUGZILLA"/>
		<reference ref_id="922500" ref_url="https://bugzilla.suse.com/922500" source="BUGZILLA"/>
		<reference ref_id="922501" ref_url="https://bugzilla.suse.com/922501" source="BUGZILLA"/>
		<reference ref_id="929678" ref_url="https://bugzilla.suse.com/929678" source="BUGZILLA"/>
		<reference ref_id="931698" ref_url="https://bugzilla.suse.com/931698" source="BUGZILLA"/>
		<reference ref_id="933898" ref_url="https://bugzilla.suse.com/933898" source="BUGZILLA"/>
		<reference ref_id="933911" ref_url="https://bugzilla.suse.com/933911" source="BUGZILLA"/>
		<reference ref_id="934487" ref_url="https://bugzilla.suse.com/934487" source="BUGZILLA"/>
		<reference ref_id="934489" ref_url="https://bugzilla.suse.com/934489" source="BUGZILLA"/>
		<reference ref_id="934491" ref_url="https://bugzilla.suse.com/934491" source="BUGZILLA"/>
		<reference ref_id="934493" ref_url="https://bugzilla.suse.com/934493" source="BUGZILLA"/>
		<reference ref_id="CVE-2006-7250" ref_url="https://www.suse.com/security/cve/CVE-2006-7250/" source="CVE"/>
		<reference ref_id="CVE-2009-5146" ref_url="https://www.suse.com/security/cve/CVE-2009-5146/" source="CVE"/>
		<reference ref_id="CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939/" source="CVE"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2010-4180" ref_url="https://www.suse.com/security/cve/CVE-2010-4180/" source="CVE"/>
		<reference ref_id="CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014/" source="CVE"/>
		<reference ref_id="CVE-2011-1945" ref_url="https://www.suse.com/security/cve/CVE-2011-1945/" source="CVE"/>
		<reference ref_id="CVE-2011-3210" ref_url="https://www.suse.com/security/cve/CVE-2011-3210/" source="CVE"/>
		<reference ref_id="CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108/" source="CVE"/>
		<reference ref_id="CVE-2011-4109" ref_url="https://www.suse.com/security/cve/CVE-2011-4109/" source="CVE"/>
		<reference ref_id="CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576/" source="CVE"/>
		<reference ref_id="CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577/" source="CVE"/>
		<reference ref_id="CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619/" source="CVE"/>
		<reference ref_id="CVE-2011-5095" ref_url="https://www.suse.com/security/cve/CVE-2011-5095/" source="CVE"/>
		<reference ref_id="CVE-2012-0050" ref_url="https://www.suse.com/security/cve/CVE-2012-0050/" source="CVE"/>
		<reference ref_id="CVE-2012-0884" ref_url="https://www.suse.com/security/cve/CVE-2012-0884/" source="CVE"/>
		<reference ref_id="CVE-2012-1165" ref_url="https://www.suse.com/security/cve/CVE-2012-1165/" source="CVE"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="CVE-2012-2333" ref_url="https://www.suse.com/security/cve/CVE-2012-2333/" source="CVE"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2014-0076" ref_url="https://www.suse.com/security/cve/CVE-2014-0076/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-3505" ref_url="https://www.suse.com/security/cve/CVE-2014-3505/" source="CVE"/>
		<reference ref_id="CVE-2014-3506" ref_url="https://www.suse.com/security/cve/CVE-2014-3506/" source="CVE"/>
		<reference ref_id="CVE-2014-3507" ref_url="https://www.suse.com/security/cve/CVE-2014-3507/" source="CVE"/>
		<reference ref_id="CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508/" source="CVE"/>
		<reference ref_id="CVE-2014-3510" ref_url="https://www.suse.com/security/cve/CVE-2014-3510/" source="CVE"/>
		<reference ref_id="CVE-2014-3513" ref_url="https://www.suse.com/security/cve/CVE-2014-3513/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0292" ref_url="https://www.suse.com/security/cve/CVE-2015-0292/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-3216" ref_url="https://www.suse.com/security/cve/CVE-2015-3216/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-403 Forbidden-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXGS2XJKGOALOEHCLQXFEU3NBJBEJEET/#OXGS2XJKGOALOEHCLQXFEU3NBJBEJEET" source="SUSE-SU"/>
		<description>

This OpenSSL update fixes the following issues:

    * Session Ticket Memory Leak (CVE-2014-3567)
    * Build option no-ssl3 is incomplete (CVE-2014-3568)
    * Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE)

Security Issues:

    * CVE-2014-3567
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567&gt;
    * CVE-2014-3566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&gt;
    * CVE-2014-3568
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-25"/>
	<updated date="2014-10-25"/>
	<bugzilla href="https://bugzilla.suse.com/608666">SUSE bug 608666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/651003">SUSE bug 651003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/657663">SUSE bug 657663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/670526">SUSE bug 670526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693027">SUSE bug 693027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/716144">SUSE bug 716144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/739719">SUSE bug 739719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742821">SUSE bug 742821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/743344">SUSE bug 743344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748738">SUSE bug 748738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749210">SUSE bug 749210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749213">SUSE bug 749213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749735">SUSE bug 749735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751946">SUSE bug 751946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751977">SUSE bug 751977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/755395">SUSE bug 755395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761324">SUSE bug 761324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761838">SUSE bug 761838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767256">SUSE bug 767256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/768097">SUSE bug 768097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779952">SUSE bug 779952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802648">SUSE bug 802648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802746">SUSE bug 802746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859228">SUSE bug 859228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859924">SUSE bug 859924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860332">SUSE bug 860332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862181">SUSE bug 862181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869945">SUSE bug 869945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870192">SUSE bug 870192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879179">SUSE bug 879179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890764">SUSE bug 890764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890767">SUSE bug 890767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890768">SUSE bug 890768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890769">SUSE bug 890769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890770">SUSE bug 890770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892403">SUSE bug 892403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901223">SUSE bug 901223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912014">SUSE bug 912014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912015">SUSE bug 912015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912018">SUSE bug 912018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912293">SUSE bug 912293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912294">SUSE bug 912294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912296">SUSE bug 912296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915976">SUSE bug 915976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920236">SUSE bug 920236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922488">SUSE bug 922488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922496">SUSE bug 922496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922499">SUSE bug 922499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922500">SUSE bug 922500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922501">SUSE bug 922501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929678">SUSE bug 929678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931698">SUSE bug 931698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933898">SUSE bug 933898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933911">SUSE bug 933911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934487">SUSE bug 934487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934489">SUSE bug 934489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934491">SUSE bug 934491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934493">SUSE bug 934493</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2006-7250/">CVE-2006-7250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-7250">CVE-2006-7250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5146/">CVE-2009-5146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5146">CVE-2009-5146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2939">CVE-2010-2939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3864">CVE-2010-3864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4180/">CVE-2010-4180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4180">CVE-2010-4180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0014">CVE-2011-0014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1945/">CVE-2011-1945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1945">CVE-2011-1945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3210/">CVE-2011-3210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3210">CVE-2011-3210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4108">CVE-2011-4108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4109/">CVE-2011-4109 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4109">CVE-2011-4109 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4576">CVE-2011-4576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4577">CVE-2011-4577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4619">CVE-2011-4619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5095/">CVE-2011-5095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-5095">CVE-2011-5095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0050/">CVE-2012-0050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0050">CVE-2012-0050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0884/">CVE-2012-0884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0884">CVE-2012-0884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1165/">CVE-2012-1165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1165">CVE-2012-1165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2110">CVE-2012-2110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2333/">CVE-2012-2333 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2333">CVE-2012-2333 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0166">CVE-2013-0166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0169">CVE-2013-0169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0076/">CVE-2014-0076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0076">CVE-2014-0076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0221">CVE-2014-0221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0224">CVE-2014-0224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3470">CVE-2014-3470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3505/">CVE-2014-3505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3505">CVE-2014-3505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3506/">CVE-2014-3506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3506">CVE-2014-3506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3507/">CVE-2014-3507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3507">CVE-2014-3507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3508">CVE-2014-3508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3510/">CVE-2014-3510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3510">CVE-2014-3510 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-3513/">CVE-2014-3513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3513">CVE-2014-3513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3567">CVE-2014-3567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3568">CVE-2014-3568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3570">CVE-2014-3570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3571">CVE-2014-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3572">CVE-2014-3572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8275">CVE-2014-8275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0205">CVE-2015-0205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0209">CVE-2015-0209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0286">CVE-2015-0286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0287">CVE-2015-0287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0288">CVE-2015-0288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0289">CVE-2015-0289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0292/">CVE-2015-0292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0292">CVE-2015-0292 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0293">CVE-2015-0293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1788">CVE-2015-1788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1789">CVE-2015-1789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1790">CVE-2015-1790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1791">CVE-2015-1791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1792">CVE-2015-1792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3216/">CVE-2015-3216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3216">CVE-2015-3216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572388" comment="libopenssl-devel-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992174" comment="libopenssl0_9_8-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992175" comment="libopenssl0_9_8-32bit-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992176" comment="libopenssl0_9_8-hmac-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992177" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992178" comment="openssl-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992179" comment="openssl-doc-0.9.8j-0.66.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572388" comment="libopenssl-devel-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992174" comment="libopenssl0_9_8-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992175" comment="libopenssl0_9_8-32bit-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992176" comment="libopenssl0_9_8-hmac-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992177" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992178" comment="openssl-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992179" comment="openssl-doc-0.9.8j-0.66.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217377" version="1" class="patch">
	<metadata>
		<title>Security update for libotr</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="777468" ref_url="https://bugzilla.suse.com/777468" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3461" ref_url="https://www.suse.com/security/cve/CVE-2012-3461/" source="CVE"/>
		<description>

This update fixes various heap overflows in libotr. CVE-2012-3461 has been 
assigned to this issue.

Security Issue reference:

    * CVE-2012-3461
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3461&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-21"/>
	<updated date="2012-11-21"/>
	<bugzilla href="https://bugzilla.suse.com/777468">SUSE bug 777468</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3461/">CVE-2012-3461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3461">CVE-2012-3461 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572397" comment="libotr2-3.2.0-10.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217378" version="1" class="patch">
	<metadata>
		<title>Security update for libotr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="969785" ref_url="https://bugzilla.suse.com/969785" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2851" ref_url="https://www.suse.com/security/cve/CVE-2016-2851/" source="CVE"/>
		<description>

This update for libotr fixes the following issues:

- Apply 'libotr-CVE-2016-2851.patch' to fix integer overflows that
  used to occur on 64-bit architectures when receiving 4GB messages.
  This flaw could potentially have been exploited by an attacker to
  remotely execute arbitrary code on the user's machine.
  (CVE-2016-2851, bsc#969785)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-09"/>
	<updated date="2016-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/969785">SUSE bug 969785</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2851/">CVE-2016-2851 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2851">CVE-2016-2851 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572398" comment="libotr2-3.2.0-10.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217379" version="1" class="patch">
	<metadata>
		<title>Security update for Xorg X11</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="709851" ref_url="https://bugzilla.suse.com/709851" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<description>

Specially crafted font files could cause a buffer overflow in applications 
that use libXfont to load such files (CVE-2011-2895).

Security Issue reference:

    * CVE-2011-2895
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2895&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-09-05"/>
	<updated date="2011-09-05"/>
	<bugzilla href="https://bugzilla.suse.com/709851">SUSE bug 709851</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2895">CVE-2011-2895 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992180" comment="libpciaccess0-7.4-8.26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992181" comment="libpciaccess0-32bit-7.4-8.26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992182" comment="xorg-x11-libs-7.4-8.26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992183" comment="xorg-x11-libs-32bit-7.4-8.26.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217380" version="1" class="patch">
	<metadata>
		<title>Security update for pixman</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="853824" ref_url="https://bugzilla.suse.com/853824" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6425" ref_url="https://www.suse.com/security/cve/CVE-2013-6425/" source="CVE"/>
		<description>

This update fixes the following security issue with pixman:

    * Integer underflow when handling trapezoids. (bnc#853824,
      CVE-2013-6425)

Security Issues:

    * CVE-2013-6425
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6425&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-21"/>
	<updated date="2013-12-21"/>
	<bugzilla href="https://bugzilla.suse.com/853824">SUSE bug 853824</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6425/">CVE-2013-6425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6425">CVE-2013-6425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572405" comment="libpixman-1-0-0.16.0-1.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566118" comment="libpixman-1-0-32bit-0.16.0-1.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217381" version="1" class="patch">
	<metadata>
		<title>Security update for libpng</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="475533" ref_url="https://bugzilla.suse.com/475533" source="BUGZILLA"/>
		<reference ref_id="617866" ref_url="https://bugzilla.suse.com/617866" source="BUGZILLA"/>
		<reference ref_id="680146" ref_url="https://bugzilla.suse.com/680146" source="BUGZILLA"/>
		<reference ref_id="702578" ref_url="https://bugzilla.suse.com/702578" source="BUGZILLA"/>
		<reference ref_id="706387" ref_url="https://bugzilla.suse.com/706387" source="BUGZILLA"/>
		<reference ref_id="706388" ref_url="https://bugzilla.suse.com/706388" source="BUGZILLA"/>
		<reference ref_id="706389" ref_url="https://bugzilla.suse.com/706389" source="BUGZILLA"/>
		<reference ref_id="747311" ref_url="https://bugzilla.suse.com/747311" source="BUGZILLA"/>
		<reference ref_id="754745" ref_url="https://bugzilla.suse.com/754745" source="BUGZILLA"/>
		<reference ref_id="772760" ref_url="https://bugzilla.suse.com/772760" source="BUGZILLA"/>
		<reference ref_id="873123" ref_url="https://bugzilla.suse.com/873123" source="BUGZILLA"/>
		<reference ref_id="873124" ref_url="https://bugzilla.suse.com/873124" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-6218" ref_url="https://www.suse.com/security/cve/CVE-2008-6218/" source="CVE"/>
		<reference ref_id="CVE-2009-5063" ref_url="https://www.suse.com/security/cve/CVE-2009-5063/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-2249" ref_url="https://www.suse.com/security/cve/CVE-2010-2249/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-2690" ref_url="https://www.suse.com/security/cve/CVE-2011-2690/" source="CVE"/>
		<reference ref_id="CVE-2011-2691" ref_url="https://www.suse.com/security/cve/CVE-2011-2691/" source="CVE"/>
		<reference ref_id="CVE-2011-2692" ref_url="https://www.suse.com/security/cve/CVE-2011-2692/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3048" ref_url="https://www.suse.com/security/cve/CVE-2011-3048/" source="CVE"/>
		<reference ref_id="CVE-2012-3425" ref_url="https://www.suse.com/security/cve/CVE-2012-3425/" source="CVE"/>
		<reference ref_id="CVE-2013-7353" ref_url="https://www.suse.com/security/cve/CVE-2013-7353/" source="CVE"/>
		<reference ref_id="CVE-2013-7354" ref_url="https://www.suse.com/security/cve/CVE-2013-7354/" source="CVE"/>
		<description>

This libpng update fixes the following two overflow security issues.

    * bnc#873123: Fixed integer overflow that could have lead to a
      heap-based buffer overflow in png_set_sPLT() and png_set_text_2()
      (CVE-2013-7354).
    * bnc#873124: Fixed integer overflow that could have lead to a
      heap-based buffer overflow in png_set_unknown_chunks()
      (CVE-2013-7353).

Security Issue references:

    * CVE-2013-7353
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7353&gt;
    * CVE-2013-7354
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7354&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-29"/>
	<updated date="2014-04-29"/>
	<bugzilla href="https://bugzilla.suse.com/475533">SUSE bug 475533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/617866">SUSE bug 617866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/680146">SUSE bug 680146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/702578">SUSE bug 702578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/706387">SUSE bug 706387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/706388">SUSE bug 706388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/706389">SUSE bug 706389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747311">SUSE bug 747311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754745">SUSE bug 754745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772760">SUSE bug 772760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873123">SUSE bug 873123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873124">SUSE bug 873124</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2008-6218/">CVE-2008-6218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-6218">CVE-2008-6218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5063/">CVE-2009-5063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5063">CVE-2009-5063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1205">CVE-2010-1205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2249/">CVE-2010-2249 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2249">CVE-2010-2249 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2501">CVE-2011-2501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2690/">CVE-2011-2690 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2690">CVE-2011-2690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2691/">CVE-2011-2691 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2691">CVE-2011-2691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2692/">CVE-2011-2692 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2692">CVE-2011-2692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3026">CVE-2011-3026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3048/">CVE-2011-3048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3048">CVE-2011-3048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3425/">CVE-2012-3425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3425">CVE-2012-3425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7353/">CVE-2013-7353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7353">CVE-2013-7353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7354/">CVE-2013-7354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7354">CVE-2013-7354 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992184" comment="libpng12-0-1.2.31-5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566850" comment="libpng12-0-32bit-1.2.31-5.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217382" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="580484" ref_url="https://bugzilla.suse.com/580484" source="BUGZILLA"/>
		<description>

Denial of service while decompressing a highly compressed huge ancillary 
chunk has been fixed in libpng (CVE-2010-0205).

		</description>
<advisory from="security@suse.de">
	<issued date="2010-03-19"/>
	<updated date="2010-03-19"/>
	<bugzilla href="https://bugzilla.suse.com/580484">SUSE bug 580484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992185" comment="libpng12-0-1.2.31-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992186" comment="libpng12-0-32bit-1.2.31-5.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217383" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="952051" ref_url="https://bugzilla.suse.com/952051" source="BUGZILLA"/>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<description>
The libpng12-0 package was updated to fix the following security issues:

- CVE-2015-8126: Fixed a buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions (bsc#954980).
- CVE-2015-7981: Fixed an out-of-bound read (bsc#952051).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-18"/>
	<updated date="2015-11-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952051">SUSE bug 952051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7981">CVE-2015-7981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572412" comment="libpng12-0-1.2.31-5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566852" comment="libpng12-0-32bit-1.2.31-5.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217384" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<description>
- security update:
   This update fixes the following securit issue:

   * CVE-2015-8126 Multiple buffer overflows in the png_set_PLTE and png_get_PLTE functions
     allow remote attackers to cause a denial of service (application crash) or possibly have 
     unspecified other impact [bsc#954980]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-08"/>
	<updated date="2016-01-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572413" comment="libpng12-0-1.2.31-5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566854" comment="libpng12-0-32bit-1.2.31-5.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217385" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1017646" ref_url="https://bugzilla.suse.com/1017646" source="BUGZILLA"/>
		<reference ref_id="958791" ref_url="https://bugzilla.suse.com/958791" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<description>

This update for libpng12-0 fixes the following issues:

Security issues fixed:
- CVE-2015-8540: read underflow in libpng (bsc#958791)
- CVE-2016-10087: NULL pointer dereference in png_set_text_2() (bsc#1017646)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-31"/>
	<updated date="2017-03-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017646">SUSE bug 1017646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958791">SUSE bug 958791</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8540">CVE-2015-8540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10087">CVE-2016-10087 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572414" comment="libpng12-0-1.2.31-5.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572415" comment="libpng12-0-32bit-1.2.31-5.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217386" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1141493" ref_url="https://bugzilla.suse.com/1141493" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12652" ref_url="https://www.suse.com/security/cve/CVE-2017-12652/" source="CVE"/>
		<description>
This update for libpng12-0 fixes the following issues:

Security issue fixed:

- CVE-2017-12652: Fixed an Input Validation Error related to the length of chunks (bsc#1141493).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-14"/>
	<updated date="2020-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141493">SUSE bug 1141493</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12652/">CVE-2017-12652 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12652">CVE-2017-12652 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572416" comment="libpng12-0-1.2.31-5.44.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572417" comment="libpng12-0-32bit-1.2.31-5.44.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217387" version="1" class="patch">
	<metadata>
		<title>Security update for poppler</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="642785" ref_url="https://bugzilla.suse.com/642785" source="BUGZILLA"/>
		<reference ref_id="806793" ref_url="https://bugzilla.suse.com/806793" source="BUGZILLA"/>
		<reference ref_id="845765" ref_url="https://bugzilla.suse.com/845765" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-3702" ref_url="https://www.suse.com/security/cve/CVE-2010-3702/" source="CVE"/>
		<reference ref_id="CVE-2010-3703" ref_url="https://www.suse.com/security/cve/CVE-2010-3703/" source="CVE"/>
		<reference ref_id="CVE-2010-3704" ref_url="https://www.suse.com/security/cve/CVE-2010-3704/" source="CVE"/>
		<reference ref_id="CVE-2010-5110" ref_url="https://www.suse.com/security/cve/CVE-2010-5110/" source="CVE"/>
		<reference ref_id="CVE-2013-1788" ref_url="https://www.suse.com/security/cve/CVE-2013-1788/" source="CVE"/>
		<reference ref_id="CVE-2013-1789" ref_url="https://www.suse.com/security/cve/CVE-2013-1789/" source="CVE"/>
		<reference ref_id="CVE-2013-1790" ref_url="https://www.suse.com/security/cve/CVE-2013-1790/" source="CVE"/>
		<description>

This update fixes problems in DCTStream error handling in poppler.

Security Issue reference:

    * CVE-2010-5110
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5110&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-21"/>
	<updated date="2014-05-21"/>
	<bugzilla href="https://bugzilla.suse.com/642785">SUSE bug 642785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806793">SUSE bug 806793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845765">SUSE bug 845765</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3702/">CVE-2010-3702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3702">CVE-2010-3702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3703/">CVE-2010-3703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3703">CVE-2010-3703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3704/">CVE-2010-3704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3704">CVE-2010-3704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5110/">CVE-2010-5110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-5110">CVE-2010-5110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1788/">CVE-2013-1788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1788">CVE-2013-1788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1789/">CVE-2013-1789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1789">CVE-2013-1789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1790/">CVE-2013-1790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1790">CVE-2013-1790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992187" comment="libpoppler-glib4-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992188" comment="libpoppler-qt4-3-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992189" comment="libpoppler5-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992190" comment="poppler-tools-0.12.3-1.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217388" version="1" class="patch">
	<metadata>
		<title>Security update for libproxy</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="761626" ref_url="https://bugzilla.suse.com/761626" source="BUGZILLA"/>
		<reference ref_id="784523" ref_url="https://bugzilla.suse.com/784523" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4505" ref_url="https://www.suse.com/security/cve/CVE-2012-4505/" source="CVE"/>
		<description>

This update for libproxy fixes a heap-based buffer overflow that could 
allow remote servers to have an unspecified impact via a crafted 
Content-Length size in an HTTP response header for a proxy.pac file request 
(CVE-2012-4505).

Additionally, it fixes parsing of the $no_proxy environment variable when 
it contains more than one URL separated by white-spaces.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-23"/>
	<updated date="2012-11-23"/>
	<bugzilla href="https://bugzilla.suse.com/761626">SUSE bug 761626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784523">SUSE bug 784523</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4505/">CVE-2012-4505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4505">CVE-2012-4505 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572422" comment="libproxy0-0.3.1-2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566124" comment="libproxy0-32bit-0.3.1-2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572423" comment="libproxy0-config-gnome-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572424" comment="libproxy0-config-kde4-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572425" comment="libproxy0-networkmanager-0.3.1-2.6.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217389" version="1" class="patch">
	<metadata>
		<title>Security update for pulseaudio</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="881524" ref_url="https://bugzilla.suse.com/881524" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3970" ref_url="https://www.suse.com/security/cve/CVE-2014-3970/" source="CVE"/>
		<description>

This update for pulseaudio provides the following security fix:

    * CVE-2014-3970: Fixed a remote denial of service attack in
      module-rtp-recv. (bnc#881524)

Security Issues:

    * CVE-2014-3970
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3970&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-12"/>
	<updated date="2014-08-12"/>
	<bugzilla href="https://bugzilla.suse.com/881524">SUSE bug 881524</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3970/">CVE-2014-3970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3970">CVE-2014-3970 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572426" comment="libpulse-browse0-0.9.21-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572427" comment="libpulse-mainloop-glib0-0.9.21-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572428" comment="libpulse0-0.9.21-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572429" comment="libpulse0-32bit-0.9.21-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572430" comment="pulseaudio-0.9.21-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572431" comment="pulseaudio-esound-compat-0.9.21-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572432" comment="pulseaudio-gdm-hooks-0.9.21-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572433" comment="pulseaudio-lang-0.9.21-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572434" comment="pulseaudio-module-x11-0.9.21-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572435" comment="pulseaudio-module-zeroconf-0.9.21-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572436" comment="pulseaudio-utils-0.9.21-1.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217390" version="1" class="patch">
	<metadata>
		<title>Recommended update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="609759" ref_url="https://bugzilla.suse.com/609759" source="BUGZILLA"/>
		<reference ref_id="609761" ref_url="https://bugzilla.suse.com/609761" source="BUGZILLA"/>
		<reference ref_id="638233" ref_url="https://bugzilla.suse.com/638233" source="BUGZILLA"/>
		<reference ref_id="682554" ref_url="https://bugzilla.suse.com/682554" source="BUGZILLA"/>
		<reference ref_id="742525" ref_url="https://bugzilla.suse.com/742525" source="BUGZILLA"/>
		<reference ref_id="764555" ref_url="https://bugzilla.suse.com/764555" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-1634" ref_url="https://www.suse.com/security/cve/CVE-2010-1634/" source="CVE"/>
		<reference ref_id="CVE-2010-2089" ref_url="https://www.suse.com/security/cve/CVE-2010-2089/" source="CVE"/>
		<reference ref_id="CVE-2010-3493" ref_url="https://www.suse.com/security/cve/CVE-2010-3493/" source="CVE"/>
		<reference ref_id="CVE-2011-1521" ref_url="https://www.suse.com/security/cve/CVE-2011-1521/" source="CVE"/>
		<description>

This update adds a regression fix for retry counter in pythons urllib2.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-05-30"/>
	<updated date="2012-05-30"/>
	<bugzilla href="https://bugzilla.suse.com/609759">SUSE bug 609759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/609761">SUSE bug 609761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638233">SUSE bug 638233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682554">SUSE bug 682554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742525">SUSE bug 742525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/764555">SUSE bug 764555</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1634/">CVE-2010-1634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1634">CVE-2010-1634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2089/">CVE-2010-2089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2089">CVE-2010-2089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3493/">CVE-2010-3493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3493">CVE-2010-3493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1521/">CVE-2011-1521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1521">CVE-2011-1521 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992191" comment="libpython2_6-1_0-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992192" comment="libpython2_6-1_0-32bit-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992193" comment="python-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992194" comment="python-32bit-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992195" comment="python-base-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992196" comment="python-base-32bit-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992197" comment="python-curses-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992198" comment="python-demo-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992199" comment="python-gdbm-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992200" comment="python-idle-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992201" comment="python-tk-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992202" comment="python-xml-2.6.8-0.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217391" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1118595" ref_url="https://bugzilla.suse.com/1118595" source="BUGZILLA"/>
		<reference ref_id="1118596" ref_url="https://bugzilla.suse.com/1118596" source="BUGZILLA"/>
		<reference ref_id="1118599" ref_url="https://bugzilla.suse.com/1118599" source="BUGZILLA"/>
		<reference ref_id="1176315" ref_url="https://bugzilla.suse.com/1176315" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15518" ref_url="https://www.suse.com/security/cve/CVE-2018-15518/" source="CVE"/>
		<reference ref_id="CVE-2018-19869" ref_url="https://www.suse.com/security/cve/CVE-2018-19869/" source="CVE"/>
		<reference ref_id="CVE-2018-19873" ref_url="https://www.suse.com/security/cve/CVE-2018-19873/" source="CVE"/>
		<reference ref_id="CVE-2020-17507" ref_url="https://www.suse.com/security/cve/CVE-2020-17507/" source="CVE"/>
		<description>
This update for libqt4 fixes the following issues:

- CVE-2020-17507: Fix buffer over-read in read_xbm_body (bsc#1176315):
- CVE-2018-15518: Fix 'double free or corruption' in QXmlStreamReader (bsc#1118595)
- CVE-2018-19873: Fix QBmpHandler segfault on malformed BMP file (bsc#1118596)
- CVE-2018-19869: Fix crash when parsing malformed url reference (bsc#1118599)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-16"/>
	<updated date="2020-12-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118595">SUSE bug 1118595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118596">SUSE bug 1118596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118599">SUSE bug 1118599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176315">SUSE bug 1176315</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15518/">CVE-2018-15518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15518">CVE-2018-15518 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19869/">CVE-2018-19869 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19869">CVE-2018-19869 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19873/">CVE-2018-19873 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19873">CVE-2018-19873 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17507/">CVE-2020-17507 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17507">CVE-2020-17507 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572437" comment="libQtWebKit4-4.6.3-5.20.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572438" comment="libQtWebKit4-32bit-4.6.3-5.20.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572439" comment="libqt4-4.6.3-5.20.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572440" comment="libqt4-32bit-4.6.3-5.20.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572441" comment="libqt4-qt3support-4.6.3-5.20.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572442" comment="libqt4-qt3support-32bit-4.6.3-5.20.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572443" comment="libqt4-sql-4.6.3-5.20.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572444" comment="libqt4-sql-32bit-4.6.3-5.20.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572445" comment="libqt4-sql-mysql-4.6.3-5.20.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572446" comment="libqt4-sql-sqlite-4.6.3-5.20.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572447" comment="libqt4-x11-4.6.3-5.20.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572448" comment="libqt4-x11-32bit-4.6.3-5.20.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572449" comment="qt4-x11-tools-4.6.3-5.20.27.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217392" version="1" class="patch">
	<metadata>
		<title>Security update for libraptor</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="745298" ref_url="https://bugzilla.suse.com/745298" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0037" ref_url="https://www.suse.com/security/cve/CVE-2012-0037/" source="CVE"/>
		<description>

Specially crafted XML files could have allowed XML External Entity (XXE) 
attacks resulting in file theft and a loss of user privacy. This has been 
fixed.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-17"/>
	<updated date="2012-02-17"/>
	<bugzilla href="https://bugzilla.suse.com/745298">SUSE bug 745298</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0037/">CVE-2012-0037 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0037">CVE-2012-0037 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992203" comment="libraptor1-1.4.18-28.23.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217393" version="1" class="patch">
	<metadata>
		<title>Security update for LibreOffice</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="653519" ref_url="https://bugzilla.suse.com/653519" source="BUGZILLA"/>
		<reference ref_id="653662" ref_url="https://bugzilla.suse.com/653662" source="BUGZILLA"/>
		<reference ref_id="663622" ref_url="https://bugzilla.suse.com/663622" source="BUGZILLA"/>
		<reference ref_id="675868" ref_url="https://bugzilla.suse.com/675868" source="BUGZILLA"/>
		<reference ref_id="675961" ref_url="https://bugzilla.suse.com/675961" source="BUGZILLA"/>
		<reference ref_id="676858" ref_url="https://bugzilla.suse.com/676858" source="BUGZILLA"/>
		<reference ref_id="678998" ref_url="https://bugzilla.suse.com/678998" source="BUGZILLA"/>
		<reference ref_id="680272" ref_url="https://bugzilla.suse.com/680272" source="BUGZILLA"/>
		<reference ref_id="681738" ref_url="https://bugzilla.suse.com/681738" source="BUGZILLA"/>
		<reference ref_id="683578" ref_url="https://bugzilla.suse.com/683578" source="BUGZILLA"/>
		<reference ref_id="684784" ref_url="https://bugzilla.suse.com/684784" source="BUGZILLA"/>
		<reference ref_id="693238" ref_url="https://bugzilla.suse.com/693238" source="BUGZILLA"/>
		<reference ref_id="693477" ref_url="https://bugzilla.suse.com/693477" source="BUGZILLA"/>
		<reference ref_id="694119" ref_url="https://bugzilla.suse.com/694119" source="BUGZILLA"/>
		<reference ref_id="694344" ref_url="https://bugzilla.suse.com/694344" source="BUGZILLA"/>
		<reference ref_id="695479" ref_url="https://bugzilla.suse.com/695479" source="BUGZILLA"/>
		<reference ref_id="696630" ref_url="https://bugzilla.suse.com/696630" source="BUGZILLA"/>
		<reference ref_id="699334" ref_url="https://bugzilla.suse.com/699334" source="BUGZILLA"/>
		<reference ref_id="702506" ref_url="https://bugzilla.suse.com/702506" source="BUGZILLA"/>
		<reference ref_id="704311" ref_url="https://bugzilla.suse.com/704311" source="BUGZILLA"/>
		<reference ref_id="704639" ref_url="https://bugzilla.suse.com/704639" source="BUGZILLA"/>
		<reference ref_id="704642" ref_url="https://bugzilla.suse.com/704642" source="BUGZILLA"/>
		<reference ref_id="705949" ref_url="https://bugzilla.suse.com/705949" source="BUGZILLA"/>
		<reference ref_id="706792" ref_url="https://bugzilla.suse.com/706792" source="BUGZILLA"/>
		<reference ref_id="707486" ref_url="https://bugzilla.suse.com/707486" source="BUGZILLA"/>
		<reference ref_id="707779" ref_url="https://bugzilla.suse.com/707779" source="BUGZILLA"/>
		<reference ref_id="708137" ref_url="https://bugzilla.suse.com/708137" source="BUGZILLA"/>
		<reference ref_id="708518" ref_url="https://bugzilla.suse.com/708518" source="BUGZILLA"/>
		<reference ref_id="710061" ref_url="https://bugzilla.suse.com/710061" source="BUGZILLA"/>
		<reference ref_id="710920" ref_url="https://bugzilla.suse.com/710920" source="BUGZILLA"/>
		<reference ref_id="711977" ref_url="https://bugzilla.suse.com/711977" source="BUGZILLA"/>
		<reference ref_id="712358" ref_url="https://bugzilla.suse.com/712358" source="BUGZILLA"/>
		<reference ref_id="715268" ref_url="https://bugzilla.suse.com/715268" source="BUGZILLA"/>
		<reference ref_id="715416" ref_url="https://bugzilla.suse.com/715416" source="BUGZILLA"/>
		<reference ref_id="715856" ref_url="https://bugzilla.suse.com/715856" source="BUGZILLA"/>
		<reference ref_id="715931" ref_url="https://bugzilla.suse.com/715931" source="BUGZILLA"/>
		<reference ref_id="717262" ref_url="https://bugzilla.suse.com/717262" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2685" ref_url="https://www.suse.com/security/cve/CVE-2011-2685/" source="CVE"/>
		<reference ref_id="CVE-2011-2713" ref_url="https://www.suse.com/security/cve/CVE-2011-2713/" source="CVE"/>
		<description>

LibreOffice 3.4 includes new interesting features and fixes, see 
http://www.libreoffice.org/download/3-4-new-features-and-fixes/
&lt;http://www.libreoffice.org/download/3-4-new-features-and-fixes/&gt;

The update fixes the following security issue:

    * 704311: libreoffice Lotus Word Pro filter multiple vulnerabilities
      (CVE-2011-2685)
    * 722075: LibreOffice: Out-of-bounds read in DOC sprm (CVE-2011-2713)

This update also fixes the following non-security issues:

    * 653519: Welcome screen missing.
    * 653662: libreoffice build calls mkbundle2 (deprecated) instead of
      mkbundle
    * 663622: Writer crash during document save
    * 675868: eliminate wording of ooconvert existed in loconvert --help
    * 675961: Libreoffice Copy paste of formula in Writer tables does not
      work as expected
    * 676858: Document with full page graphic in header will not allow
      click-drag or right-click.
    * 677354: The languagetool.rpm does not work as expected
    * 678998: Libre Office does not detect KDE3
    * 680272: Deleting multiple sheets results in run-time error/crash
    * 681738: DDE link is lost when .xls file is opened/saved in Calc.
    * 683578: Large xlsx file takes extremely long to open with Libreoffice
      calc
    * 684784: Microsoft Office spreadsheet does not display anything
    * 693238: Column format in docx file is not displayed correctly.
    * 693477: Format of Word .doc file from HP is bad.
    * 694119: Using File--&gt;Send--&gt;Document as E-mail will crash Impress
    * 694344: 3rd level bulleted items are not displayed properly.
    * 695479: RTF file is not displayed correctly by Writer.
    * 696630: DDE link from Calc to Excel needs Excel open to update link
      in Calc.
    * 699334: Presentation created in MS Office is missing text when opened
      in LibreOffice
    * 701317: xls spreadsheet macro fails with LibreOffice.
    * 702506: Writer crashes when opening docx files.
    * 704639: HTML document appearance changes when opened in open office
      vs LibreOffice
    * 704642: 16 digit numbers change in LibreOffice when opening a file
      created in MS Excel
    * 705949: Information missing from MS Word document when opened in
      LibreOffice (w:sdt)
    * 706792: crash when opening a pptx presentation.
    * 707486: Macro from excel fails on Selection.Copy when run in Calc.
    * 707779: Disappearing text
    * 708137: xls spreadsheet is extremely slow to open and check boxes are
      broken.
    * 708518: Bullet symbol is not rendered correctly in a specific slide.
    * 710061: ODP export to PDF produces broken images
    * 710920: RPM installation ending with redundant error.
    * 711977: File association for fod* files are missing.
    * 712358: Some extensions broken after upgrading.
    * 715268: Command libreoffice --help does not work when LibreOffice is
      already started
    * 715416: Impress crashes starting Slide show in the context of dual
      monitors extension mode.
    * 715931: failed to save an odp file.
    * 717262: libtool adds /usr/lib64 into rpath
    * 715856: LibreOffice:Stable/libreoffice-converter: Bug
    * 677354: The languagetool.rpm does not work as expected.
    * 693200: Documents created in MS Office cause LibreOffice to crash
    * 693386: Documents created in MS Office bring up the filter selection
      dialog when opened with LibreOffice
    * 693427: When using QT dialogs and not LibreOffice dialogs causes
      LibreOffice to hang when attempting to save a document
    * 706731: VBA Macros from MS Office Spreadsheet do not work correct
      with LibreOffice 3.3.1

Security Issue references:

    * CVE-2011-2685
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2685&gt;
    * CVE-2011-2713
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2713&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-10-12"/>
	<updated date="2011-10-12"/>
	<bugzilla href="https://bugzilla.suse.com/653519">SUSE bug 653519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/653662">SUSE bug 653662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/663622">SUSE bug 663622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/675868">SUSE bug 675868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/675961">SUSE bug 675961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/676858">SUSE bug 676858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/678998">SUSE bug 678998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/680272">SUSE bug 680272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/681738">SUSE bug 681738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/683578">SUSE bug 683578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/684784">SUSE bug 684784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693238">SUSE bug 693238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693477">SUSE bug 693477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/694119">SUSE bug 694119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/694344">SUSE bug 694344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/695479">SUSE bug 695479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/696630">SUSE bug 696630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/699334">SUSE bug 699334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/702506">SUSE bug 702506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704311">SUSE bug 704311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704639">SUSE bug 704639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704642">SUSE bug 704642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/705949">SUSE bug 705949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/706792">SUSE bug 706792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/707486">SUSE bug 707486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/707779">SUSE bug 707779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/708137">SUSE bug 708137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/708518">SUSE bug 708518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/710061">SUSE bug 710061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/710920">SUSE bug 710920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711977">SUSE bug 711977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/712358">SUSE bug 712358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/715268">SUSE bug 715268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/715416">SUSE bug 715416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/715856">SUSE bug 715856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/715931">SUSE bug 715931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/717262">SUSE bug 717262</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2685/">CVE-2011-2685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2685">CVE-2011-2685 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2713/">CVE-2011-2713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2713">CVE-2011-2713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992204" comment="libneon27-0.29.6-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572452" comment="libneon27-32bit-0.29.6-6.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217394" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="714980" ref_url="https://bugzilla.suse.com/714980" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3146" ref_url="https://www.suse.com/security/cve/CVE-2011-3146/" source="CVE"/>
		<description>

Specially crafted SVG files could make librsvg dereference a function 
pointer which potentially allows to execute arbitrary code (CVE-2011-3146).

Security Issue reference:

    * CVE-2011-3146
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3146&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-09-20"/>
	<updated date="2011-09-20"/>
	<bugzilla href="https://bugzilla.suse.com/714980">SUSE bug 714980</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3146/">CVE-2011-3146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3146">CVE-2011-3146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992205" comment="librsvg-2.26.0-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992206" comment="librsvg-32bit-2.26.0-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992207" comment="rsvg-view-2.26.0-2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217395" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="840753" ref_url="https://bugzilla.suse.com/840753" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1881" ref_url="https://www.suse.com/security/cve/CVE-2013-1881/" source="CVE"/>
		<description>
librsvg was updated to fix one security issue.

This security issue was fixed:
- CVE-2013-1881: GNOME libsvg allowed remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue (bsc#840753).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-12"/>
	<updated date="2015-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/840753">SUSE bug 840753</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1881/">CVE-2013-1881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1881">CVE-2013-1881 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572457" comment="librsvg-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566910" comment="librsvg-32bit-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572458" comment="rsvg-view-2.26.0-2.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217396" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1083232" ref_url="https://bugzilla.suse.com/1083232" source="BUGZILLA"/>
		<reference ref_id="1094213" ref_url="https://bugzilla.suse.com/1094213" source="BUGZILLA"/>
		<reference ref_id="1162501" ref_url="https://bugzilla.suse.com/1162501" source="BUGZILLA"/>
		<reference ref_id="977985" ref_url="https://bugzilla.suse.com/977985" source="BUGZILLA"/>
		<reference ref_id="977986" ref_url="https://bugzilla.suse.com/977986" source="BUGZILLA"/>
		<reference ref_id="987877" ref_url="https://bugzilla.suse.com/987877" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7558" ref_url="https://www.suse.com/security/cve/CVE-2015-7558/" source="CVE"/>
		<reference ref_id="CVE-2016-4348" ref_url="https://www.suse.com/security/cve/CVE-2016-4348/" source="CVE"/>
		<reference ref_id="CVE-2016-6163" ref_url="https://www.suse.com/security/cve/CVE-2016-6163/" source="CVE"/>
		<reference ref_id="CVE-2018-1000041" ref_url="https://www.suse.com/security/cve/CVE-2018-1000041/" source="CVE"/>
		<reference ref_id="CVE-2019-20446" ref_url="https://www.suse.com/security/cve/CVE-2019-20446/" source="CVE"/>
		<description>

This update for librsvg fixes the following issues:

- CVE-2019-20446: Fixed an issue where a crafted SVG file with nested
  patterns can cause denial of service (bsc#1162501).
  NOTE: Librsvg now has limits on the number of loaded XML elements,
  and the number of referenced elements within an SVG document.    
- CVE-2015-7558: librsvg allowed context-dependent attackers to cause a denial of service (infinite loop, stack consumption, and application crash) via cyclic references in an SVG document (bsc#977985).
- CVE-2016-6163: svg pattern linking to non-pattern fallback leads to invalid memory access, allowing to cause DoS (bsc#987877).
- CVE-2018-1000041: Fixed leaking credentials via SVG files that reference UNC paths (bsc#1083232)
- CVE-2016-4348: Fixed a denial of service parsing SVGs with circular definitions _rsvg_css_normalize_font_size() function (bsc#977986)
- Fixed a stack exhaustion with circular references in &lt;use&gt;
  elements.
- Fixed a denial-of-service condition from exponential explosion
  of rendered elements, through nested use of SVG 'use' elements in
  malicious SVGs.

This updated also removes the the Mozilla plugin package. Firefox can render SVG on its own and
the plugin interface is obsolete.
    
This update for libcroco fixes the following issue:

- Fixed an issue where librsvg was throwing a segmentation fault (bsc#1094213).    
    
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-17"/>
	<updated date="2020-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083232">SUSE bug 1083232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094213">SUSE bug 1094213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162501">SUSE bug 1162501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977985">SUSE bug 977985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977986">SUSE bug 977986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987877">SUSE bug 987877</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7558/">CVE-2015-7558 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7558">CVE-2015-7558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4348/">CVE-2016-4348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4348">CVE-2016-4348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6163/">CVE-2016-6163 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6163">CVE-2016-6163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000041/">CVE-2018-1000041 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000041">CVE-2018-1000041 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20446/">CVE-2019-20446 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20446">CVE-2019-20446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572459" comment="libcroco-0_6-3-0.6.1-122.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572460" comment="libcroco-0_6-3-32bit-0.6.1-122.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572461" comment="librsvg-2.26.0-2.6.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572462" comment="librsvg-32bit-2.26.0-2.6.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572463" comment="rsvg-view-2.26.0-2.6.8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217397" version="1" class="patch">
	<metadata>
		<title>Security update for libsamplerate (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1033564" ref_url="https://bugzilla.suse.com/1033564" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7697" ref_url="https://www.suse.com/security/cve/CVE-2017-7697/" source="CVE"/>
		<description>

This update for libsamplerate fixes the following issues:

- CVE-2017-7697: Fixed a buffer overflow in calc_output_single.  (bsc#1033564)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-19"/>
	<updated date="2017-04-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033564">SUSE bug 1033564</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7697/">CVE-2017-7697 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7697">CVE-2017-7697 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572464" comment="libsamplerate-0.1.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572465" comment="libsamplerate-32bit-0.1.4-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217398" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="631379" ref_url="https://bugzilla.suse.com/631379" source="BUGZILLA"/>
		<reference ref_id="705681" ref_url="https://bugzilla.suse.com/705681" source="BUGZILLA"/>
		<reference ref_id="911796" ref_url="https://bugzilla.suse.com/911796" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-4835" ref_url="https://www.suse.com/security/cve/CVE-2009-4835/" source="CVE"/>
		<reference ref_id="CVE-2011-2696" ref_url="https://www.suse.com/security/cve/CVE-2011-2696/" source="CVE"/>
		<reference ref_id="CVE-2014-9496" ref_url="https://www.suse.com/security/cve/CVE-2014-9496/" source="CVE"/>
		<description>

An integer overflow in libsndfile while processing certain PAF files has 
been fixed. CVE-2011-2696 has been assigned to this issue. Additionally a 
divide by zero error (CVE-2009-4835) has been fixed.

Security Issue references:

    * CVE-2011-2696
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2696&gt;
    * CVE-2009-4835
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4835&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-07-19"/>
	<updated date="2011-07-19"/>
	<bugzilla href="https://bugzilla.suse.com/631379">SUSE bug 631379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/705681">SUSE bug 705681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911796">SUSE bug 911796</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4835/">CVE-2009-4835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4835">CVE-2009-4835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2696/">CVE-2011-2696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2696">CVE-2011-2696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9496/">CVE-2014-9496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9496">CVE-2014-9496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992208" comment="libsndfile-1.0.20-2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992209" comment="libsndfile-32bit-1.0.20-2.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217399" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="953516" ref_url="https://bugzilla.suse.com/953516" source="BUGZILLA"/>
		<reference ref_id="953521" ref_url="https://bugzilla.suse.com/953521" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9756" ref_url="https://www.suse.com/security/cve/CVE-2014-9756/" source="CVE"/>
		<reference ref_id="CVE-2015-7805" ref_url="https://www.suse.com/security/cve/CVE-2015-7805/" source="CVE"/>
		<description>
The libsndfile package was updated to fix the following security issue:

- CVE-2014-9756: Fixed a divide by zero problem that can lead to a Denial of Service (DoS) (bsc#953521).
- CVE-2015-7805: Fixed heap overflow issue (bsc#953516).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-12"/>
	<updated date="2015-11-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/953516">SUSE bug 953516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953521">SUSE bug 953521</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9756/">CVE-2014-9756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9756">CVE-2014-9756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7805/">CVE-2015-7805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7805">CVE-2015-7805 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572469" comment="libsndfile-1.0.20-2.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566915" comment="libsndfile-32bit-1.0.20-2.10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217400" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1033054" ref_url="https://bugzilla.suse.com/1033054" source="BUGZILLA"/>
		<reference ref_id="1033914" ref_url="https://bugzilla.suse.com/1033914" source="BUGZILLA"/>
		<reference ref_id="1033915" ref_url="https://bugzilla.suse.com/1033915" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7585" ref_url="https://www.suse.com/security/cve/CVE-2017-7585/" source="CVE"/>
		<reference ref_id="CVE-2017-7741" ref_url="https://www.suse.com/security/cve/CVE-2017-7741/" source="CVE"/>
		<reference ref_id="CVE-2017-7742" ref_url="https://www.suse.com/security/cve/CVE-2017-7742/" source="CVE"/>
		<description>

This update for libsndfile fixes the following issues:

- CVE-2017-7585,CVE-2017-7741,CVE-2017-7742: Some stack-based buffer overflows via a specially crafted FLAC
  file were fixed (error in the 'flac_buffer_copy()' function) (bsc#1033054, bsc#1033914, bsc#1033915).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033054">SUSE bug 1033054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033914">SUSE bug 1033914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033915">SUSE bug 1033915</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7585/">CVE-2017-7585 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7585">CVE-2017-7585 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7741/">CVE-2017-7741 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7741">CVE-2017-7741 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7742/">CVE-2017-7742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7742">CVE-2017-7742 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572470" comment="libsndfile-1.0.20-2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572471" comment="libsndfile-32bit-1.0.20-2.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217401" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1033054" ref_url="https://bugzilla.suse.com/1033054" source="BUGZILLA"/>
		<reference ref_id="1033914" ref_url="https://bugzilla.suse.com/1033914" source="BUGZILLA"/>
		<reference ref_id="1033915" ref_url="https://bugzilla.suse.com/1033915" source="BUGZILLA"/>
		<reference ref_id="1036943" ref_url="https://bugzilla.suse.com/1036943" source="BUGZILLA"/>
		<reference ref_id="1036944" ref_url="https://bugzilla.suse.com/1036944" source="BUGZILLA"/>
		<reference ref_id="1036945" ref_url="https://bugzilla.suse.com/1036945" source="BUGZILLA"/>
		<reference ref_id="1036946" ref_url="https://bugzilla.suse.com/1036946" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7585" ref_url="https://www.suse.com/security/cve/CVE-2017-7585/" source="CVE"/>
		<reference ref_id="CVE-2017-7741" ref_url="https://www.suse.com/security/cve/CVE-2017-7741/" source="CVE"/>
		<reference ref_id="CVE-2017-7742" ref_url="https://www.suse.com/security/cve/CVE-2017-7742/" source="CVE"/>
		<reference ref_id="CVE-2017-8361" ref_url="https://www.suse.com/security/cve/CVE-2017-8361/" source="CVE"/>
		<reference ref_id="CVE-2017-8362" ref_url="https://www.suse.com/security/cve/CVE-2017-8362/" source="CVE"/>
		<reference ref_id="CVE-2017-8363" ref_url="https://www.suse.com/security/cve/CVE-2017-8363/" source="CVE"/>
		<reference ref_id="CVE-2017-8365" ref_url="https://www.suse.com/security/cve/CVE-2017-8365/" source="CVE"/>
		<description>

This update for libsndfile fixes the following issues:

- CVE-2017-8362: invalid memory read in flac_buffer_copy (flac.c) (bsc#1036943)
- CVE-2017-8365: global buffer overflow in i2les_array (pcm.c) (bsc#1036946)
- CVE-2017-8361: global buffer overflow in flac_buffer_copy (flac.c) (bsc#1036944)
- CVE-2017-8363: heap-based buffer overflow in flac_buffer_copy (flac.c) (bsc#1036945)
- CVE-2017-7585: stack-based buffer overflow via a specially crafted FLAC file (bsc#1033054)
   		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-10"/>
	<updated date="2017-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033054">SUSE bug 1033054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033914">SUSE bug 1033914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033915">SUSE bug 1033915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036943">SUSE bug 1036943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036944">SUSE bug 1036944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036945">SUSE bug 1036945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036946">SUSE bug 1036946</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7585/">CVE-2017-7585 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7585">CVE-2017-7585 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7741/">CVE-2017-7741 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7741">CVE-2017-7741 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7742/">CVE-2017-7742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7742">CVE-2017-7742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8361/">CVE-2017-8361 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8361">CVE-2017-8361 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8362/">CVE-2017-8362 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8362">CVE-2017-8362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8363/">CVE-2017-8363 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8363">CVE-2017-8363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8365/">CVE-2017-8365 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8365">CVE-2017-8365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572472" comment="libsndfile-1.0.20-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572473" comment="libsndfile-32bit-1.0.20-2.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217402" version="1" class="patch">
	<metadata>
		<title>Recommended update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1038856" ref_url="https://bugzilla.suse.com/1038856" source="BUGZILLA"/>
		<reference ref_id="1059911" ref_url="https://bugzilla.suse.com/1059911" source="BUGZILLA"/>
		<reference ref_id="1059912" ref_url="https://bugzilla.suse.com/1059912" source="BUGZILLA"/>
		<reference ref_id="1059913" ref_url="https://bugzilla.suse.com/1059913" source="BUGZILLA"/>
		<reference ref_id="1069874" ref_url="https://bugzilla.suse.com/1069874" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14245" ref_url="https://www.suse.com/security/cve/CVE-2017-14245/" source="CVE"/>
		<reference ref_id="CVE-2017-14246" ref_url="https://www.suse.com/security/cve/CVE-2017-14246/" source="CVE"/>
		<reference ref_id="CVE-2017-14634" ref_url="https://www.suse.com/security/cve/CVE-2017-14634/" source="CVE"/>
		<reference ref_id="CVE-2017-16942" ref_url="https://www.suse.com/security/cve/CVE-2017-16942/" source="CVE"/>
		<description>

- This update for libsndfile fixes a memory leak in an error path.(bsc#1038856)

- CVE-2017-16942: A divide-by-zero error exists in the function wav_w64_read_fmt_chunk() in wav_w64.c, which may lead to DoS when playing a crafted audio file. (bsc#1069874)
- CVE-2017-14634: In libsndfile 1.0.28, a divide-by-zero error exists in the function double64_init() in double64.c, which may lead to DoS when playing a crafted audio file. (bsc#1059911)
- CVE-2017-14245: An out of bounds read in the function d2alaw_array() in alaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of 
                  the NAN and INFINITY floating-point values. (bsc#1059912)
- CVE-2017-14246: An out of bounds read in the function d2ulaw_array() in ulaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of 
                  the NAN and INFINITY floating-point values.(bsc#1059913)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-02"/>
	<updated date="2018-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1038856">SUSE bug 1038856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059911">SUSE bug 1059911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059912">SUSE bug 1059912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059913">SUSE bug 1059913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069874">SUSE bug 1069874</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14245/">CVE-2017-14245 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14245">CVE-2017-14245 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14246/">CVE-2017-14246 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14246">CVE-2017-14246 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14634/">CVE-2017-14634 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14634">CVE-2017-14634 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16942/">CVE-2017-16942 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16942">CVE-2017-16942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572474" comment="libsndfile-1.0.20-2.19.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572475" comment="libsndfile-32bit-1.0.20-2.19.7.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217403" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1071767" ref_url="https://bugzilla.suse.com/1071767" source="BUGZILLA"/>
		<reference ref_id="1071777" ref_url="https://bugzilla.suse.com/1071777" source="BUGZILLA"/>
		<reference ref_id="1117954" ref_url="https://bugzilla.suse.com/1117954" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17456" ref_url="https://www.suse.com/security/cve/CVE-2017-17456/" source="CVE"/>
		<reference ref_id="CVE-2017-17457" ref_url="https://www.suse.com/security/cve/CVE-2017-17457/" source="CVE"/>
		<reference ref_id="CVE-2018-19758" ref_url="https://www.suse.com/security/cve/CVE-2018-19758/" source="CVE"/>
		<description>
This update for libsndfile fixes the following issues:

Security issues fixed:

- CVE-2017-17456: Prevent segmentation fault in the function d2alaw_array() that may have lead to a remote DoS (bsc#1071777).
- CVE-2017-17457: Prevent segmentation fault in the function d2ulaw_array() that may have lead to a remote DoS, a different vulnerability than CVE-2017-14246 (bsc#1071767).
- CVE-2018-19758: Fixed a heap-based buffer over-read at wav.c in wav_write_header that could have been used for a denial of service attack (bsc#1117954).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-02"/>
	<updated date="2019-04-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1071767">SUSE bug 1071767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071777">SUSE bug 1071777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117954">SUSE bug 1117954</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17456/">CVE-2017-17456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17456">CVE-2017-17456 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17457/">CVE-2017-17457 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17457">CVE-2017-17457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19758/">CVE-2018-19758 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19758">CVE-2018-19758 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572476" comment="libsndfile-1.0.20-2.19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572477" comment="libsndfile-32bit-1.0.20-2.19.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217404" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1188540" ref_url="https://bugzilla.suse.com/1188540" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3246" ref_url="https://www.suse.com/security/cve/CVE-2021-3246/" source="CVE"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2021-3246: Fixed a heap buffer overflow vulnerability in msadpcm_decode_block. (bsc#1188540)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1188540">SUSE bug 1188540</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3246/">CVE-2021-3246 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3246">CVE-2021-3246 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626760" comment="libsndfile-1.0.20-2.19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626761" comment="libsndfile-32bit-1.0.20-2.19.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217405" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1194006" ref_url="https://bugzilla.suse.com/1194006" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4156" ref_url="https://www.suse.com/security/cve/CVE-2021-4156/" source="CVE"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2021-4156: Fixed heap buffer overflow in flac_buffer_copy that
could potentially lead to heap exploitation (bsc#1194006).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-05"/>
	<updated date="2022-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194006">SUSE bug 1194006</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4156/">CVE-2021-4156 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4156">CVE-2021-4156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662523" comment="libsndfile-1.0.20-2.19.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662524" comment="libsndfile-32bit-1.0.20-2.19.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217406" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="431495" ref_url="https://bugzilla.suse.com/431495" source="BUGZILLA"/>
		<reference ref_id="604297" ref_url="https://bugzilla.suse.com/604297" source="BUGZILLA"/>
		<reference ref_id="607152" ref_url="https://bugzilla.suse.com/607152" source="BUGZILLA"/>
		<reference ref_id="612644" ref_url="https://bugzilla.suse.com/612644" source="BUGZILLA"/>
		<reference ref_id="613595" ref_url="https://bugzilla.suse.com/613595" source="BUGZILLA"/>
		<reference ref_id="616360" ref_url="https://bugzilla.suse.com/616360" source="BUGZILLA"/>
		<reference ref_id="623497" ref_url="https://bugzilla.suse.com/623497" source="BUGZILLA"/>
		<reference ref_id="629073" ref_url="https://bugzilla.suse.com/629073" source="BUGZILLA"/>
		<reference ref_id="634530" ref_url="https://bugzilla.suse.com/634530" source="BUGZILLA"/>
		<reference ref_id="670789" ref_url="https://bugzilla.suse.com/670789" source="BUGZILLA"/>
		<reference ref_id="694026" ref_url="https://bugzilla.suse.com/694026" source="BUGZILLA"/>
		<reference ref_id="695786" ref_url="https://bugzilla.suse.com/695786" source="BUGZILLA"/>
		<reference ref_id="707636" ref_url="https://bugzilla.suse.com/707636" source="BUGZILLA"/>
		<reference ref_id="719930" ref_url="https://bugzilla.suse.com/719930" source="BUGZILLA"/>
		<reference ref_id="720440" ref_url="https://bugzilla.suse.com/720440" source="BUGZILLA"/>
		<reference ref_id="734454" ref_url="https://bugzilla.suse.com/734454" source="BUGZILLA"/>
		<reference ref_id="759352" ref_url="https://bugzilla.suse.com/759352" source="BUGZILLA"/>
		<reference ref_id="762433" ref_url="https://bugzilla.suse.com/762433" source="BUGZILLA"/>
		<reference ref_id="762887" ref_url="https://bugzilla.suse.com/762887" source="BUGZILLA"/>
		<reference ref_id="865222" ref_url="https://bugzilla.suse.com/865222" source="BUGZILLA"/>
		<reference ref_id="866942" ref_url="https://bugzilla.suse.com/866942" source="BUGZILLA"/>
		<reference ref_id="867349" ref_url="https://bugzilla.suse.com/867349" source="BUGZILLA"/>
		<reference ref_id="894361" ref_url="https://bugzilla.suse.com/894361" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2141" ref_url="https://www.suse.com/security/cve/CVE-2012-2141/" source="CVE"/>
		<reference ref_id="CVE-2014-2284" ref_url="https://www.suse.com/security/cve/CVE-2014-2284/" source="CVE"/>
		<reference ref_id="CVE-2014-2310" ref_url="https://www.suse.com/security/cve/CVE-2014-2310/" source="CVE"/>
		<reference ref_id="CVE-2014-3565" ref_url="https://www.suse.com/security/cve/CVE-2014-3565/" source="CVE"/>
		<description>

This update for net-snmp fixes a remote denial of service problem inside 
snmptrapd when it is started with the '-OQ' option. (CVE-2014-3565, 
bnc#894361)

Additionally, a timeout issue during SNMP MIB walk on OID 1.3.6.1.2.1.4.24 
when using newer (v5.5+) versions of snmpwalk has been fixed. (bnc#865222)

Security Issues:

    * CVE-2014-3565
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3565&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-02"/>
	<updated date="2014-09-02"/>
	<bugzilla href="https://bugzilla.suse.com/431495">SUSE bug 431495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/604297">SUSE bug 604297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/607152">SUSE bug 607152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/612644">SUSE bug 612644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/613595">SUSE bug 613595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/616360">SUSE bug 616360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/623497">SUSE bug 623497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629073">SUSE bug 629073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/634530">SUSE bug 634530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/670789">SUSE bug 670789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/694026">SUSE bug 694026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/695786">SUSE bug 695786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/707636">SUSE bug 707636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/719930">SUSE bug 719930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/720440">SUSE bug 720440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/734454">SUSE bug 734454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759352">SUSE bug 759352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762433">SUSE bug 762433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762887">SUSE bug 762887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865222">SUSE bug 865222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866942">SUSE bug 866942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867349">SUSE bug 867349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894361">SUSE bug 894361</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2141/">CVE-2012-2141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2141">CVE-2012-2141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2284/">CVE-2014-2284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2284">CVE-2014-2284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2310/">CVE-2014-2310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2310">CVE-2014-2310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3565/">CVE-2014-3565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3565">CVE-2014-3565 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992210" comment="libsnmp15-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563659" comment="libsnmp15-32bit-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992211" comment="net-snmp-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992212" comment="perl-SNMP-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992213" comment="snmp-mibs-5.4.2.1-8.12.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217407" version="1" class="patch">
	<metadata>
		<title>Security update for libsoup</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="706630" ref_url="https://bugzilla.suse.com/706630" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2524" ref_url="https://www.suse.com/security/cve/CVE-2011-2524/" source="CVE"/>
		<description>

This update of libsoup fixes a directory traversal attack that affect 
application using the library. CVE-2011-2524: CVSS v2 Base Score: 5.0 
(AV:N/AC:L/Au:N/C:P/I:N/A:N)

Security Issue reference:

    * CVE-2011-2524
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2524&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-08-01"/>
	<updated date="2011-08-01"/>
	<bugzilla href="https://bugzilla.suse.com/706630">SUSE bug 706630</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2524/">CVE-2011-2524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2524">CVE-2011-2524 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992214" comment="libsoup-2_4-1-2.28.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992215" comment="libsoup-2_4-1-32bit-2.28.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217408" version="1" class="patch">
	<metadata>
		<title>Security update for libsoup (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1100097" ref_url="https://bugzilla.suse.com/1100097" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12910" ref_url="https://www.suse.com/security/cve/CVE-2018-12910/" source="CVE"/>
		<description>
This update for libsoup fixes the following issues:

Security issue fixed:

- CVE-2018-12910: Fixed a denial of service which was caused handling empty hostnames in get_cookies() (bsc#1100097).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-16"/>
	<updated date="2020-10-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100097">SUSE bug 1100097</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12910/">CVE-2018-12910 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12910">CVE-2018-12910 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572487" comment="libsoup-2_4-1-2.28.2-0.3.3.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572488" comment="libsoup-2_4-1-32bit-2.28.2-0.3.3.39 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217409" version="1" class="patch">
	<metadata>
		<title>Feature update for libssh2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="756830" ref_url="https://bugzilla.suse.com/756830" source="BUGZILLA"/>
		<reference ref_id="921070" ref_url="https://bugzilla.suse.com/921070" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1782" ref_url="https://www.suse.com/security/cve/CVE-2015-1782/" source="CVE"/>
		<description>

This feature update to libssh2_org brings several improvements from the 
upstream project, including:

    * Support for the 'aes128-ctr', 'aes192-ctr', 'aes256-ctr' and
      'arcfour128' ciphers
    * Performance improvements in SFTP and SCP
    * Support for the ssh-agent

In addition to that some problems were fixed, including a possible 
application hang when waiting for a remote server to return the results of 
a command.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-04-13"/>
	<updated date="2012-04-13"/>
	<bugzilla href="https://bugzilla.suse.com/756830">SUSE bug 756830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921070">SUSE bug 921070</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1782/">CVE-2015-1782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1782">CVE-2015-1782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992216" comment="libssh2-1-1.2.9-4.2.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217410" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="961964" ref_url="https://bugzilla.suse.com/961964" source="BUGZILLA"/>
		<reference ref_id="967026" ref_url="https://bugzilla.suse.com/967026" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0787" ref_url="https://www.suse.com/security/cve/CVE-2016-0787/" source="CVE"/>
		<description>

This update for libssh2_org fixes the following issues: 

- Add SHA256 support for DH group exchange (fate#320343, bsc#961964)

- fix CVE-2016-0787 (bsc#967026)
  * Weakness in diffie-hellman secret key generation lead to much shorter DH groups
    then needed, which could be used to retrieve server keys.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-11"/>
	<updated date="2016-03-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/961964">SUSE bug 961964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967026">SUSE bug 967026</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0787/">CVE-2016-0787 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0787">CVE-2016-0787 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572489" comment="libssh2-1-1.2.9-4.2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217411" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1091236" ref_url="https://bugzilla.suse.com/1091236" source="BUGZILLA"/>
		<reference ref_id="1128471" ref_url="https://bugzilla.suse.com/1128471" source="BUGZILLA"/>
		<reference ref_id="1128472" ref_url="https://bugzilla.suse.com/1128472" source="BUGZILLA"/>
		<reference ref_id="1128474" ref_url="https://bugzilla.suse.com/1128474" source="BUGZILLA"/>
		<reference ref_id="1128476" ref_url="https://bugzilla.suse.com/1128476" source="BUGZILLA"/>
		<reference ref_id="1128480" ref_url="https://bugzilla.suse.com/1128480" source="BUGZILLA"/>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1128490" ref_url="https://bugzilla.suse.com/1128490" source="BUGZILLA"/>
		<reference ref_id="1128492" ref_url="https://bugzilla.suse.com/1128492" source="BUGZILLA"/>
		<reference ref_id="1128493" ref_url="https://bugzilla.suse.com/1128493" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855/" source="CVE"/>
		<reference ref_id="CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856/" source="CVE"/>
		<reference ref_id="CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857/" source="CVE"/>
		<reference ref_id="CVE-2019-3858" ref_url="https://www.suse.com/security/cve/CVE-2019-3858/" source="CVE"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="CVE-2019-3861" ref_url="https://www.suse.com/security/cve/CVE-2019-3861/" source="CVE"/>
		<reference ref_id="CVE-2019-3862" ref_url="https://www.suse.com/security/cve/CVE-2019-3862/" source="CVE"/>
		<reference ref_id="CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863/" source="CVE"/>
		<description>
This update for libssh2_org fixes the following issues:

Security issues fixed:	  

- CVE-2019-3861: Fixed Out-of-bounds reads with specially crafted SSH packets (bsc#1128490).
- CVE-2019-3862: Fixed Out-of-bounds memory comparison with specially crafted message channel request packet (bsc#1128492).
- CVE-2019-3860: Fixed Out-of-bounds reads with specially crafted SFTP packets (bsc#1128481).
- CVE-2019-3863: Fixed an Integer overflow in user authenticate keyboard interactive which could allow out-of-bounds writes 
  with specially crafted keyboard responses (bsc#1128493).
- CVE-2019-3856: Fixed a potential Integer overflow in keyboard interactive handling which could allow out-of-bounds write 
  with specially crafted payload (bsc#1128472).
- CVE-2019-3859: Fixed Out-of-bounds reads with specially crafted payloads due to unchecked use of _libssh2_packet_require 
  and _libssh2_packet_requirev (bsc#1128480).
- CVE-2019-3855: Fixed a potential Integer overflow in transport read which could allow out-of-bounds write with specially 
  crafted payload (bsc#1128471).
- CVE-2019-3858: Fixed a potential zero-byte allocation which could lead to an out-of-bounds read with a specially crafted 
  SFTP packet (bsc#1128476).
- CVE-2019-3857: Fixed a potential Integer overflow which could lead to zero-byte allocation and out-of-bounds with specially 
  crafted message channel request SSH packet (bsc#1128474).

Other issue addressed:   

- Fixed an issue where libssh2 stops parsing known_hosts (bsc#1091236).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091236">SUSE bug 1091236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128471">SUSE bug 1128471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128472">SUSE bug 1128472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128474">SUSE bug 1128474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128476">SUSE bug 1128476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128480">SUSE bug 1128480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128490">SUSE bug 1128490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128492">SUSE bug 1128492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128493">SUSE bug 1128493</bugzilla>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3855">CVE-2019-3855 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3856">CVE-2019-3856 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3857">CVE-2019-3857 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3858/">CVE-2019-3858 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3858">CVE-2019-3858 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3859">CVE-2019-3859 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3860">CVE-2019-3860 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3861/">CVE-2019-3861 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3861">CVE-2019-3861 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3862/">CVE-2019-3862 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3862">CVE-2019-3862 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3863">CVE-2019-3863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572490" comment="libssh2-1-1.2.9-4.2.12.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217412" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1130103" ref_url="https://bugzilla.suse.com/1130103" source="BUGZILLA"/>
		<reference ref_id="1133528" ref_url="https://bugzilla.suse.com/1133528" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<description>
This update for libssh2_org fixes the following issues:

- Incorrect upstream fix for CVE-2019-3859 broke public key authentication [bsc#1133528, bsc#1130103]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-27"/>
	<updated date="2019-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130103">SUSE bug 1130103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133528">SUSE bug 1133528</bugzilla>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3859">CVE-2019-3859 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572491" comment="libssh2-1-1.2.9-4.2.12.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217413" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1136570" ref_url="https://bugzilla.suse.com/1136570" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<description>
This update for libssh2_org fixes the following issues:

- Fix the previous fix for CVE-2019-3860 (bsc#1136570, bsc#1128481)
  (Out-of-bounds reads with specially crafted SFTP packets)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136570">SUSE bug 1136570</bugzilla>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3860">CVE-2019-3860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572492" comment="libssh2-1-1.2.9-4.2.12.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217414" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1154862" ref_url="https://bugzilla.suse.com/1154862" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498/" source="CVE"/>
		<description>
This update for libssh2_org fixes the following issue:

- CVE-2019-17498: Fixed an integer overflow in a bounds check that might have led to the disclosure of sensitive information or a denial of service (bsc#1154862).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154862">SUSE bug 1154862</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17498">CVE-2019-17498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572493" comment="libssh2-1-1.2.9-4.2.12.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217415" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="880735" ref_url="https://bugzilla.suse.com/880735" source="BUGZILLA"/>
		<reference ref_id="880737" ref_url="https://bugzilla.suse.com/880737" source="BUGZILLA"/>
		<reference ref_id="880738" ref_url="https://bugzilla.suse.com/880738" source="BUGZILLA"/>
		<reference ref_id="924828" ref_url="https://bugzilla.suse.com/924828" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3467" ref_url="https://www.suse.com/security/cve/CVE-2014-3467/" source="CVE"/>
		<reference ref_id="CVE-2014-3468" ref_url="https://www.suse.com/security/cve/CVE-2014-3468/" source="CVE"/>
		<reference ref_id="CVE-2014-3469" ref_url="https://www.suse.com/security/cve/CVE-2014-3469/" source="CVE"/>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<description>

libtasn1 has been updated to fix three security issues:

    * asn1_get_bit_der() could have returned negative bit length
      (CVE-2014-3468)
    * Multiple boundary check issues could have allowed DoS (CVE-2014-3467)
    * Possible DoS by NULL pointer dereference in asn1_read_value_type
      (CVE-2014-3469)

Security Issues:

    * CVE-2014-3468
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468&gt;
    * CVE-2014-3467
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467&gt;
    * CVE-2014-3469
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-17"/>
	<updated date="2014-07-17"/>
	<bugzilla href="https://bugzilla.suse.com/880735">SUSE bug 880735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880737">SUSE bug 880737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880738">SUSE bug 880738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924828">SUSE bug 924828</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3467/">CVE-2014-3467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3467">CVE-2014-3467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3468/">CVE-2014-3468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3468">CVE-2014-3468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3469/">CVE-2014-3469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3469">CVE-2014-3469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2806">CVE-2015-2806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572494" comment="libtasn1-1.5-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572495" comment="libtasn1-3-1.5-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566923" comment="libtasn1-3-32bit-1.5-1.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217416" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1040621" ref_url="https://bugzilla.suse.com/1040621" source="BUGZILLA"/>
		<reference ref_id="1105435" ref_url="https://bugzilla.suse.com/1105435" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6891" ref_url="https://www.suse.com/security/cve/CVE-2017-6891/" source="CVE"/>
		<reference ref_id="CVE-2018-1000654" ref_url="https://www.suse.com/security/cve/CVE-2018-1000654/" source="CVE"/>
		<description>
This update for libtasn1 fixes the following issues:

Security issues fixed:

- CVE-2018-1000654: Fixed a denial of service in the asn1 parser (bsc#1105435).
- CVE-2017-6891: Fixed a stack overflow in asn1_find_node() (bsc#1040621).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-29"/>
	<updated date="2019-05-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040621">SUSE bug 1040621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105435">SUSE bug 1105435</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6891/">CVE-2017-6891 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6891">CVE-2017-6891 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000654/">CVE-2018-1000654 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000654">CVE-2018-1000654 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572496" comment="libtasn1-1.5-1.35.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572497" comment="libtasn1-3-1.5-1.35.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572498" comment="libtasn1-3-32bit-1.5-1.35.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217417" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="844689" ref_url="https://bugzilla.suse.com/844689" source="BUGZILLA"/>
		<reference ref_id="865746" ref_url="https://bugzilla.suse.com/865746" source="BUGZILLA"/>
		<reference ref_id="880346" ref_url="https://bugzilla.suse.com/880346" source="BUGZILLA"/>
		<reference ref_id="880347" ref_url="https://bugzilla.suse.com/880347" source="BUGZILLA"/>
		<reference ref_id="880348" ref_url="https://bugzilla.suse.com/880348" source="BUGZILLA"/>
		<reference ref_id="881700" ref_url="https://bugzilla.suse.com/881700" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0096" ref_url="https://www.suse.com/security/cve/CVE-2014-0096/" source="CVE"/>
		<reference ref_id="CVE-2014-0099" ref_url="https://www.suse.com/security/cve/CVE-2014-0099/" source="CVE"/>
		<reference ref_id="CVE-2014-0119" ref_url="https://www.suse.com/security/cve/CVE-2014-0119/" source="CVE"/>
		<description>

Tomcat has been updated to version 6.0.41, which brings security and bug 
fixes.

The following security fixes have been fixed:

    * CVE-2014-0096: A XXE vulnerability via user supplied XSLTs.
    * CVE-2014-0099: Request smuggling via malicious content length header.
    * CVE-2014-0119: A XML parser hijack by malicious web application.

Bugs fixed:

    * Socket bind fails on tomcat startup when using apr (IPV6)
      (bnc#881700)
    * classpath for org/apache/juli/logging/LogFactory (bnc#844689)

Security Issues:

    * CVE-2014-0099
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0099&gt;
    * CVE-2014-0096
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0096&gt;
    * CVE-2014-0119
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0119&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-06"/>
	<updated date="2014-07-06"/>
	<bugzilla href="https://bugzilla.suse.com/844689">SUSE bug 844689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865746">SUSE bug 865746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880346">SUSE bug 880346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880347">SUSE bug 880347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880348">SUSE bug 880348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881700">SUSE bug 881700</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0096/">CVE-2014-0096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0096">CVE-2014-0096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0099/">CVE-2014-0099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0099">CVE-2014-0099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0119/">CVE-2014-0119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0119">CVE-2014-0119 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572499" comment="libtcnative-1-0-1.3.3-12.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572500" comment="tomcat6-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572501" comment="tomcat6-admin-webapps-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572502" comment="tomcat6-docs-webapp-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572503" comment="tomcat6-javadoc-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572504" comment="tomcat6-jsp-2_1-api-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572505" comment="tomcat6-lib-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572506" comment="tomcat6-servlet-2_5-api-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572507" comment="tomcat6-webapps-6.0.41-0.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217418" version="1" class="patch">
	<metadata>
		<title>Security update for libtcnative-1-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="938945" ref_url="https://bugzilla.suse.com/938945" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>

This update for libtcnative-1-0 fixes the following issues:

- CVE-2015-4000: Disable 512-bit export-grade cryptography to prevent Logjam 
  vulnerability (bsc#938945) 
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-26"/>
	<updated date="2016-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/938945">SUSE bug 938945</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572508" comment="libtcnative-1-0-1.3.3-12.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217419" version="1" class="patch">
	<metadata>
		<title>Security update for libtcnative-1-0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1078679" ref_url="https://bugzilla.suse.com/1078679" source="BUGZILLA"/>
		<reference ref_id="1103347" ref_url="https://bugzilla.suse.com/1103347" source="BUGZILLA"/>
		<reference ref_id="1103348" ref_url="https://bugzilla.suse.com/1103348" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15698" ref_url="https://www.suse.com/security/cve/CVE-2017-15698/" source="CVE"/>
		<reference ref_id="CVE-2018-8019" ref_url="https://www.suse.com/security/cve/CVE-2018-8019/" source="CVE"/>
		<reference ref_id="CVE-2018-8020" ref_url="https://www.suse.com/security/cve/CVE-2018-8020/" source="CVE"/>
		<description>
This update for libtcnative-1-0 to version 1.1.34 fixes the following issues:

- CVE-2017-15698: Fixed an improper handling of fields with more than 127 bytes 
  which could allow invalid client certificates to be accepted (bsc#1078679).
- CVE-2018-8019: When using an OCSP responder did not correctly handle invalid
  responses. This allowed for revoked client certificates to be incorrectly
  identified. It was therefore possible for users to authenticate with revoked
  certificates when using mutual TLS (bsc#1103348).
- CVE-2018-8020: Did not properly check OCSP pre-produced responses. Revoked
  client certificates may have not been properly identified, allowing for users
  to authenticate with revoked certificates to connections that require mutual
  TLS (bsc#1103347).

For a complete list of changes please see
http://tomcat.apache.org/native-1.1-doc/miscellaneous/changelog.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-09"/>
	<updated date="2019-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1078679">SUSE bug 1078679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103347">SUSE bug 1103347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103348">SUSE bug 1103348</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15698/">CVE-2017-15698 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15698">CVE-2017-15698 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8019/">CVE-2018-8019 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8019">CVE-2018-8019 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8020/">CVE-2018-8020 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8020">CVE-2018-8020 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572509" comment="libtcnative-1-0-1.3.4-12.5.5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217420" version="1" class="patch">
	<metadata>
		<title>Security update for libtiff</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="599475" ref_url="https://bugzilla.suse.com/599475" source="BUGZILLA"/>
		<reference ref_id="672510" ref_url="https://bugzilla.suse.com/672510" source="BUGZILLA"/>
		<reference ref_id="682871" ref_url="https://bugzilla.suse.com/682871" source="BUGZILLA"/>
		<reference ref_id="683337" ref_url="https://bugzilla.suse.com/683337" source="BUGZILLA"/>
		<reference ref_id="687442" ref_url="https://bugzilla.suse.com/687442" source="BUGZILLA"/>
		<reference ref_id="753362" ref_url="https://bugzilla.suse.com/753362" source="BUGZILLA"/>
		<reference ref_id="767852" ref_url="https://bugzilla.suse.com/767852" source="BUGZILLA"/>
		<reference ref_id="767854" ref_url="https://bugzilla.suse.com/767854" source="BUGZILLA"/>
		<reference ref_id="770816" ref_url="https://bugzilla.suse.com/770816" source="BUGZILLA"/>
		<reference ref_id="781995" ref_url="https://bugzilla.suse.com/781995" source="BUGZILLA"/>
		<reference ref_id="787892" ref_url="https://bugzilla.suse.com/787892" source="BUGZILLA"/>
		<reference ref_id="788741" ref_url="https://bugzilla.suse.com/788741" source="BUGZILLA"/>
		<reference ref_id="791607" ref_url="https://bugzilla.suse.com/791607" source="BUGZILLA"/>
		<reference ref_id="817573" ref_url="https://bugzilla.suse.com/817573" source="BUGZILLA"/>
		<reference ref_id="818117" ref_url="https://bugzilla.suse.com/818117" source="BUGZILLA"/>
		<reference ref_id="834477" ref_url="https://bugzilla.suse.com/834477" source="BUGZILLA"/>
		<reference ref_id="834779" ref_url="https://bugzilla.suse.com/834779" source="BUGZILLA"/>
		<reference ref_id="834788" ref_url="https://bugzilla.suse.com/834788" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-4665" ref_url="https://www.suse.com/security/cve/CVE-2010-4665/" source="CVE"/>
		<reference ref_id="CVE-2011-0191" ref_url="https://www.suse.com/security/cve/CVE-2011-0191/" source="CVE"/>
		<reference ref_id="CVE-2011-0192" ref_url="https://www.suse.com/security/cve/CVE-2011-0192/" source="CVE"/>
		<reference ref_id="CVE-2011-1167" ref_url="https://www.suse.com/security/cve/CVE-2011-1167/" source="CVE"/>
		<reference ref_id="CVE-2012-1173" ref_url="https://www.suse.com/security/cve/CVE-2012-1173/" source="CVE"/>
		<reference ref_id="CVE-2012-2088" ref_url="https://www.suse.com/security/cve/CVE-2012-2088/" source="CVE"/>
		<reference ref_id="CVE-2012-2113" ref_url="https://www.suse.com/security/cve/CVE-2012-2113/" source="CVE"/>
		<reference ref_id="CVE-2012-3401" ref_url="https://www.suse.com/security/cve/CVE-2012-3401/" source="CVE"/>
		<reference ref_id="CVE-2012-4447" ref_url="https://www.suse.com/security/cve/CVE-2012-4447/" source="CVE"/>
		<reference ref_id="CVE-2012-4564" ref_url="https://www.suse.com/security/cve/CVE-2012-4564/" source="CVE"/>
		<reference ref_id="CVE-2012-5581" ref_url="https://www.suse.com/security/cve/CVE-2012-5581/" source="CVE"/>
		<reference ref_id="CVE-2013-1960" ref_url="https://www.suse.com/security/cve/CVE-2013-1960/" source="CVE"/>
		<reference ref_id="CVE-2013-1961" ref_url="https://www.suse.com/security/cve/CVE-2013-1961/" source="CVE"/>
		<reference ref_id="CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231/" source="CVE"/>
		<reference ref_id="CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232/" source="CVE"/>
		<reference ref_id="CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243/" source="CVE"/>
		<reference ref_id="CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244/" source="CVE"/>
		<description>

This tiff update fixes several security issues.

    * bnc#834477: CVE-2013-4232 CVE-2013-4231: tiff: buffer overflows/use
      after free problem
    * bnc#834779: CVE-2013-4243: libtiff (gif2tiff): heap-based buffer
      overflow in readgifimage()
    * bnc#834788: CVE-2013-4244: libtiff (gif2tiff): OOB Write in LZW
      decompressor

Security Issue references:

    * CVE-2013-4232
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4232&gt;
    * CVE-2013-4231
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4231&gt;
    * CVE-2013-4243
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4243&gt;
    * CVE-2013-4244
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4244&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/599475">SUSE bug 599475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/672510">SUSE bug 672510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682871">SUSE bug 682871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/683337">SUSE bug 683337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/687442">SUSE bug 687442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/753362">SUSE bug 753362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767852">SUSE bug 767852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767854">SUSE bug 767854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770816">SUSE bug 770816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/781995">SUSE bug 781995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787892">SUSE bug 787892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788741">SUSE bug 788741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791607">SUSE bug 791607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817573">SUSE bug 817573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818117">SUSE bug 818117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834477">SUSE bug 834477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834779">SUSE bug 834779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834788">SUSE bug 834788</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4665/">CVE-2010-4665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4665">CVE-2010-4665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0191/">CVE-2011-0191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0191">CVE-2011-0191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0192/">CVE-2011-0192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0192">CVE-2011-0192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1167/">CVE-2011-1167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1167">CVE-2011-1167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1173/">CVE-2012-1173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1173">CVE-2012-1173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2088/">CVE-2012-2088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2088">CVE-2012-2088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2113/">CVE-2012-2113 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2113">CVE-2012-2113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3401/">CVE-2012-3401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3401">CVE-2012-3401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4447/">CVE-2012-4447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4447">CVE-2012-4447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4564/">CVE-2012-4564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4564">CVE-2012-4564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5581/">CVE-2012-5581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5581">CVE-2012-5581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1960/">CVE-2013-1960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1960">CVE-2013-1960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1961/">CVE-2013-1961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1961">CVE-2013-1961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4231">CVE-2013-4231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4232">CVE-2013-4232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4243">CVE-2013-4243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4244">CVE-2013-4244 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992217" comment="libtiff3-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566132" comment="libtiff3-32bit-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992218" comment="tiff-3.8.2-141.154.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217421" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc, rpcbind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1037559" ref_url="https://bugzilla.suse.com/1037559" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779/" source="CVE"/>
		<description>

This update for libtirpc and rpcbind fixes the following issues:

- CVE-2017-8779: A crafted UDP package could lead rpcbind to remote denial-of-service. (bsc#1037559)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-31"/>
	<updated date="2017-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037559">SUSE bug 1037559</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8779">CVE-2017-8779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572514" comment="libtirpc1-0.2.1-1.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572515" comment="rpcbind-0.1.6+git20080930-8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217422" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="968175" ref_url="https://bugzilla.suse.com/968175" source="BUGZILLA"/>
		<description>
This update for libtirpc fixes the following issues:

- Prevent remote crash of RPC services (bsc#968175)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-30"/>
	<updated date="2018-08-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/968175">SUSE bug 968175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572516" comment="libtirpc1-0.2.1-1.13.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217423" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1106517" ref_url="https://bugzilla.suse.com/1106517" source="BUGZILLA"/>
		<reference ref_id="1106519" ref_url="https://bugzilla.suse.com/1106519" source="BUGZILLA"/>
		<reference ref_id="968175" ref_url="https://bugzilla.suse.com/968175" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14621" ref_url="https://www.suse.com/security/cve/CVE-2018-14621/" source="CVE"/>
		<reference ref_id="CVE-2018-14622" ref_url="https://www.suse.com/security/cve/CVE-2018-14622/" source="CVE"/>
		<description>
This update for libtirpc fixes the following issues:

Security issues fixed:

- CVE-2018-14621: libtirpc: Infinite loop in EMFILE case in svc_vc.c (bsc#1106519)
- CVE-2018-14622: libtirpc: Segmentation fault in makefd_xprt return value in svc_vc.c (bsc#1106517)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-15"/>
	<updated date="2018-10-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106517">SUSE bug 1106517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106519">SUSE bug 1106519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968175">SUSE bug 968175</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14621/">CVE-2018-14621 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14621">CVE-2018-14621 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14622/">CVE-2018-14622 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14622">CVE-2018-14622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572517" comment="libtirpc1-0.2.1-1.13.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217424" version="1" class="patch">
	<metadata>
		<title>Security update for libunwind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="936786" ref_url="https://bugzilla.suse.com/936786" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3239" ref_url="https://www.suse.com/security/cve/CVE-2015-3239/" source="CVE"/>
		<description>
This update for libunwind fixes the following issues:

- CVE-2015-3239: Fixed an off-by-one in dwarf_to_unw_regnum() (bsc#936786).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-22"/>
	<updated date="2020-07-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/936786">SUSE bug 936786</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-3239/">CVE-2015-3239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3239">CVE-2015-3239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572518" comment="libunwind-0.98.6-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572519" comment="libunwind-devel-0.98.6-28.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217425" version="1" class="patch">
	<metadata>
		<title>Security update for nuts</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="660236" ref_url="https://bugzilla.suse.com/660236" source="BUGZILLA"/>
		<reference ref_id="764699" ref_url="https://bugzilla.suse.com/764699" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2944" ref_url="https://www.suse.com/security/cve/CVE-2012-2944/" source="CVE"/>
		<description>

This update of nuts fixes a denial of service flaw that could have been 
exploited by remote attackers to cause an application crash of upsd.

Security Issue reference:

    * CVE-2012-2944
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2944&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-06-04"/>
	<updated date="2012-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/660236">SUSE bug 660236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/764699">SUSE bug 764699</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2944/">CVE-2012-2944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2944">CVE-2012-2944 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992219" comment="libupsclient1-2.6.2-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992220" comment="nut-2.6.2-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992221" comment="nut-classic-2.6.2-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992222" comment="nut-drivers-net-2.6.2-0.2.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217426" version="1" class="patch">
	<metadata>
		<title>Recommended update for libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="594024" ref_url="https://bugzilla.suse.com/594024" source="BUGZILLA"/>
		<reference ref_id="609738" ref_url="https://bugzilla.suse.com/609738" source="BUGZILLA"/>
		<reference ref_id="614853" ref_url="https://bugzilla.suse.com/614853" source="BUGZILLA"/>
		<reference ref_id="618155" ref_url="https://bugzilla.suse.com/618155" source="BUGZILLA"/>
		<reference ref_id="626070" ref_url="https://bugzilla.suse.com/626070" source="BUGZILLA"/>
		<reference ref_id="691926" ref_url="https://bugzilla.suse.com/691926" source="BUGZILLA"/>
		<reference ref_id="703084" ref_url="https://bugzilla.suse.com/703084" source="BUGZILLA"/>
		<reference ref_id="704024" ref_url="https://bugzilla.suse.com/704024" source="BUGZILLA"/>
		<reference ref_id="752702" ref_url="https://bugzilla.suse.com/752702" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2237" ref_url="https://www.suse.com/security/cve/CVE-2010-2237/" source="CVE"/>
		<reference ref_id="CVE-2010-2238" ref_url="https://www.suse.com/security/cve/CVE-2010-2238/" source="CVE"/>
		<reference ref_id="CVE-2010-2239" ref_url="https://www.suse.com/security/cve/CVE-2010-2239/" source="CVE"/>
		<reference ref_id="CVE-2010-2242" ref_url="https://www.suse.com/security/cve/CVE-2010-2242/" source="CVE"/>
		<reference ref_id="CVE-2011-2511" ref_url="https://www.suse.com/security/cve/CVE-2011-2511/" source="CVE"/>
		<description>

This update adds a dependency on the netcat-openbsd package for improved 
compatibility with SUSE Linux Enterprise 11 SP2 interopability.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-03-30"/>
	<updated date="2012-03-30"/>
	<bugzilla href="https://bugzilla.suse.com/594024">SUSE bug 594024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/609738">SUSE bug 609738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/614853">SUSE bug 614853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/618155">SUSE bug 618155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/626070">SUSE bug 626070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/691926">SUSE bug 691926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703084">SUSE bug 703084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704024">SUSE bug 704024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752702">SUSE bug 752702</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2237/">CVE-2010-2237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2237">CVE-2010-2237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2238/">CVE-2010-2238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2238">CVE-2010-2238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2239/">CVE-2010-2239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2239">CVE-2010-2239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2242/">CVE-2010-2242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2242">CVE-2010-2242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2511/">CVE-2011-2511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2511">CVE-2011-2511 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992223" comment="libvirt-0.7.6-1.31.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992224" comment="libvirt-doc-0.7.6-1.31.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992225" comment="libvirt-python-0.7.6-1.31.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217427" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="897031" ref_url="https://bugzilla.suse.com/897031" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6051" ref_url="https://www.suse.com/security/cve/CVE-2014-6051/" source="CVE"/>
		<reference ref_id="CVE-2014-6052" ref_url="https://www.suse.com/security/cve/CVE-2014-6052/" source="CVE"/>
		<reference ref_id="CVE-2014-6053" ref_url="https://www.suse.com/security/cve/CVE-2014-6053/" source="CVE"/>
		<reference ref_id="CVE-2014-6054" ref_url="https://www.suse.com/security/cve/CVE-2014-6054/" source="CVE"/>
		<reference ref_id="CVE-2014-6055" ref_url="https://www.suse.com/security/cve/CVE-2014-6055/" source="CVE"/>
		<description>
The libvncserver package was updated to fix the following security issues:

- bsc#897031: fix several security issues:
  * CVE-2014-6051: Integer overflow in MallocFrameBuffer() on client side.
  * CVE-2014-6052: Lack of malloc() return value checking on client side.
  * CVE-2014-6053: Server crash on a very large ClientCutText message.
  * CVE-2014-6054: Server crash when scaling factor is set to zero.
  * CVE-2014-6055: Multiple stack overflows in File Transfer feature.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-26"/>
	<updated date="2015-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6051/">CVE-2014-6051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6051">CVE-2014-6051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6052/">CVE-2014-6052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6052">CVE-2014-6052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6053/">CVE-2014-6053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6053">CVE-2014-6053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6054/">CVE-2014-6054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6054">CVE-2014-6054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6055/">CVE-2014-6055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6055">CVE-2014-6055 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572524" comment="LibVNCServer-0.9.1-156.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217428" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="608192" ref_url="https://bugzilla.suse.com/608192" source="BUGZILLA"/>
		<reference ref_id="747912" ref_url="https://bugzilla.suse.com/747912" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2663" ref_url="https://www.suse.com/security/cve/CVE-2009-2663/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<description>

Specially crafted Ogg files could cause a heap-based buffer overflow in the 
vorbis audio compression library that could potentially be exploited by 
attackers to cause a crash or execute arbitrary code (CVE-2012-0444).

Security Issue reference:

    * CVE-2012-0444
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0444&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-21"/>
	<updated date="2012-02-21"/>
	<bugzilla href="https://bugzilla.suse.com/608192">SUSE bug 608192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747912">SUSE bug 747912</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2663/">CVE-2009-2663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2663">CVE-2009-2663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0444">CVE-2012-0444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992226" comment="libvorbis-1.2.0-79.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992227" comment="libvorbis-32bit-1.2.0-79.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992228" comment="libvorbis-doc-1.2.0-79.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217429" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1059809" ref_url="https://bugzilla.suse.com/1059809" source="BUGZILLA"/>
		<reference ref_id="1059811" ref_url="https://bugzilla.suse.com/1059811" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14632" ref_url="https://www.suse.com/security/cve/CVE-2017-14632/" source="CVE"/>
		<reference ref_id="CVE-2017-14633" ref_url="https://www.suse.com/security/cve/CVE-2017-14633/" source="CVE"/>
		<description>
This update for libvorbis fixes the following issues:

- CVE-2017-14633: out-of-bounds array read vulnerability exists in
  function mapping0_forward() could lead to remote denial of service (bsc#1059811)
- CVE-2017-14632: Remote Code Execution upon freeing uninitialized
  memory in function vorbis_analysis_headerout(bsc#1059809)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1059809">SUSE bug 1059809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059811">SUSE bug 1059811</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14632/">CVE-2017-14632 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14632">CVE-2017-14632 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14633/">CVE-2017-14633 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14633">CVE-2017-14633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572529" comment="libvorbis-1.2.0-79.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572530" comment="libvorbis-32bit-1.2.0-79.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572531" comment="libvorbis-doc-1.2.0-79.20.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217430" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1085687" ref_url="https://bugzilla.suse.com/1085687" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<description>
This update for libvorbis fixes the following issues:

- CVE-2018-5146: Fixed out of bounds memory write while processing Vorbis audio data (bsc#1085687).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-23"/>
	<updated date="2018-03-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085687">SUSE bug 1085687</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5146">CVE-2018-5146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572532" comment="libvorbis-1.2.0-79.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572533" comment="libvorbis-32bit-1.2.0-79.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572534" comment="libvorbis-doc-1.2.0-79.20.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217431" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1059812" ref_url="https://bugzilla.suse.com/1059812" source="BUGZILLA"/>
		<reference ref_id="1091072" ref_url="https://bugzilla.suse.com/1091072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14160" ref_url="https://www.suse.com/security/cve/CVE-2017-14160/" source="CVE"/>
		<reference ref_id="CVE-2018-10393" ref_url="https://www.suse.com/security/cve/CVE-2018-10393/" source="CVE"/>
		<description>
This update for libvorbis fixes the following issues:

Security issues fixed:

- CVE-2018-10393: Fixed stack-based buffer over-read in bark_noise_hybridm (bsc#1091072).
- CVE-2017-14160: Fixed out-of-bounds access inside bark_noise_hybridmp function (bsc#1059812).

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1059812">SUSE bug 1059812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091072">SUSE bug 1091072</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14160/">CVE-2017-14160 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14160">CVE-2017-14160 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10393/">CVE-2018-10393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10393">CVE-2018-10393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572535" comment="libvorbis-1.2.0-79.20.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572536" comment="libvorbis-32bit-1.2.0-79.20.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572537" comment="libvorbis-doc-1.2.0-79.20.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217432" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1091070" ref_url="https://bugzilla.suse.com/1091070" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10392" ref_url="https://www.suse.com/security/cve/CVE-2018-10392/" source="CVE"/>
		<description>
This update for libvorbis fixes the following issues:

The following security issue was fixed:

  - Fixed the validation of channels in mapping0_forward(), which previously
    allowed remote attackers to cause a denial of service via specially crafted
    files (CVE-2018-10392, bsc#1091070)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-06"/>
	<updated date="2018-06-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091070">SUSE bug 1091070</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10392/">CVE-2018-10392 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10392">CVE-2018-10392 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572538" comment="libvorbis-1.2.0-79.20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572539" comment="libvorbis-32bit-1.2.0-79.20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572540" comment="libvorbis-doc-1.2.0-79.20.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217433" version="1" class="patch">
	<metadata>
		<title>Security update for openwsman</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="901882" ref_url="https://bugzilla.suse.com/901882" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<description>

This update adds a configuration option to disable SSLv2 and SSLv3 in 
openwsman. This is required to mitigate CVE-2014-3566.

To use the new option, edit /etc/openwsman/openwsman.conf and add the 
following line to the [server] section:

ssl_disabled_protocols = SSLv2 SSLv3

Security Issues:

    * CVE-2014-3566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-22"/>
	<updated date="2014-10-22"/>
	<bugzilla href="https://bugzilla.suse.com/901882">SUSE bug 901882</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572541" comment="libwsman1-2.2.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572542" comment="openwsman-client-2.2.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572543" comment="openwsman-server-2.2.3-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217434" version="1" class="patch">
	<metadata>
		<title>Security update for libxcrypt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="713727" ref_url="https://bugzilla.suse.com/713727" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<description>

The security update for CVE-2011-2483 broke changing blowfish passwords if 
compat mode was turned on (default). This update fixes the regression.

Security Issue reference:

    * CVE-2011-2483
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2483&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-08-24"/>
	<updated date="2011-08-24"/>
	<bugzilla href="https://bugzilla.suse.com/713727">SUSE bug 713727</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2483">CVE-2011-2483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992229" comment="libxcrypt-3.0.3-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992230" comment="libxcrypt-32bit-3.0.3-0.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217435" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="648277" ref_url="https://bugzilla.suse.com/648277" source="BUGZILLA"/>
		<reference ref_id="661471" ref_url="https://bugzilla.suse.com/661471" source="BUGZILLA"/>
		<reference ref_id="697372" ref_url="https://bugzilla.suse.com/697372" source="BUGZILLA"/>
		<reference ref_id="732787" ref_url="https://bugzilla.suse.com/732787" source="BUGZILLA"/>
		<reference ref_id="739894" ref_url="https://bugzilla.suse.com/739894" source="BUGZILLA"/>
		<reference ref_id="748561" ref_url="https://bugzilla.suse.com/748561" source="BUGZILLA"/>
		<reference ref_id="764538" ref_url="https://bugzilla.suse.com/764538" source="BUGZILLA"/>
		<reference ref_id="769184" ref_url="https://bugzilla.suse.com/769184" source="BUGZILLA"/>
		<reference ref_id="793334" ref_url="https://bugzilla.suse.com/793334" source="BUGZILLA"/>
		<reference ref_id="805233" ref_url="https://bugzilla.suse.com/805233" source="BUGZILLA"/>
		<reference ref_id="829077" ref_url="https://bugzilla.suse.com/829077" source="BUGZILLA"/>
		<reference ref_id="854869" ref_url="https://bugzilla.suse.com/854869" source="BUGZILLA"/>
		<reference ref_id="901546" ref_url="https://bugzilla.suse.com/901546" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-4008" ref_url="https://www.suse.com/security/cve/CVE-2010-4008/" source="CVE"/>
		<reference ref_id="CVE-2010-4494" ref_url="https://www.suse.com/security/cve/CVE-2010-4494/" source="CVE"/>
		<reference ref_id="CVE-2011-1944" ref_url="https://www.suse.com/security/cve/CVE-2011-1944/" source="CVE"/>
		<reference ref_id="CVE-2011-2821" ref_url="https://www.suse.com/security/cve/CVE-2011-2821/" source="CVE"/>
		<reference ref_id="CVE-2011-2834" ref_url="https://www.suse.com/security/cve/CVE-2011-2834/" source="CVE"/>
		<reference ref_id="CVE-2011-3102" ref_url="https://www.suse.com/security/cve/CVE-2011-3102/" source="CVE"/>
		<reference ref_id="CVE-2011-3919" ref_url="https://www.suse.com/security/cve/CVE-2011-3919/" source="CVE"/>
		<reference ref_id="CVE-2012-0841" ref_url="https://www.suse.com/security/cve/CVE-2012-0841/" source="CVE"/>
		<reference ref_id="CVE-2012-2807" ref_url="https://www.suse.com/security/cve/CVE-2012-2807/" source="CVE"/>
		<reference ref_id="CVE-2012-5134" ref_url="https://www.suse.com/security/cve/CVE-2012-5134/" source="CVE"/>
		<reference ref_id="CVE-2013-0338" ref_url="https://www.suse.com/security/cve/CVE-2013-0338/" source="CVE"/>
		<reference ref_id="CVE-2013-0339" ref_url="https://www.suse.com/security/cve/CVE-2013-0339/" source="CVE"/>
		<reference ref_id="CVE-2013-2877" ref_url="https://www.suse.com/security/cve/CVE-2013-2877/" source="CVE"/>
		<reference ref_id="CVE-2014-3660" ref_url="https://www.suse.com/security/cve/CVE-2014-3660/" source="CVE"/>
		<description>

This update fixes a denial of service via recursive entity expansion. 
(CVE-2014-3660)

Security Issues:

    * CVE-2014-3660
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3660&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-20"/>
	<updated date="2014-10-20"/>
	<bugzilla href="https://bugzilla.suse.com/648277">SUSE bug 648277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/661471">SUSE bug 661471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/697372">SUSE bug 697372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/732787">SUSE bug 732787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/739894">SUSE bug 739894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748561">SUSE bug 748561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/764538">SUSE bug 764538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769184">SUSE bug 769184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/793334">SUSE bug 793334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/805233">SUSE bug 805233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829077">SUSE bug 829077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854869">SUSE bug 854869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901546">SUSE bug 901546</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4008/">CVE-2010-4008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4008">CVE-2010-4008 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4494/">CVE-2010-4494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4494">CVE-2010-4494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1944/">CVE-2011-1944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1944">CVE-2011-1944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2821/">CVE-2011-2821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2821">CVE-2011-2821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2834/">CVE-2011-2834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2834">CVE-2011-2834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3102/">CVE-2011-3102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3102">CVE-2011-3102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3919/">CVE-2011-3919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3919">CVE-2011-3919 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0841/">CVE-2012-0841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0841">CVE-2012-0841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2807/">CVE-2012-2807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2807">CVE-2012-2807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5134/">CVE-2012-5134 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5134">CVE-2012-5134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0338/">CVE-2013-0338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0338">CVE-2013-0338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0339/">CVE-2013-0339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0339">CVE-2013-0339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2877/">CVE-2013-2877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2877">CVE-2013-2877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3660/">CVE-2014-3660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3660">CVE-2014-3660 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992231" comment="libxml2-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992232" comment="libxml2-32bit-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992233" comment="libxml2-doc-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009588203" comment="libxml2-python-2.7.6-0.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992231" comment="libxml2-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992232" comment="libxml2-32bit-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992233" comment="libxml2-doc-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009588203" comment="libxml2-python-2.7.6-0.31.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217436" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="972335" ref_url="https://bugzilla.suse.com/972335" source="BUGZILLA"/>
		<reference ref_id="975947" ref_url="https://bugzilla.suse.com/975947" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627/" source="CVE"/>
		<description>
This update for libxml2 fixes two security issues:

- libxml2 limits the number of recursions an XML document can contain so to protect against the 'Billion Laughs' denial-of-service attack. Unfortunately, the underlying counter was not incremented properly in all necessary locations. Therefore, specially crafted XML documents could exhaust all available stack space and crash the XML parser without running into the recursion limit. This vulnerability has been fixed. (bsc#975947)

- When running in recovery mode, certain invalid XML documents would trigger an infinite recursion in libxml2 that ran until all stack space was exhausted. This vulnerability could have been used to facilitate a denial-of-sevice attack. (CVE-2016-3627, bsc#972335)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-03"/>
	<updated date="2016-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/972335">SUSE bug 972335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975947">SUSE bug 975947</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3627">CVE-2016-3627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572552" comment="libxml2-2.7.6-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572553" comment="libxml2-32bit-2.7.6-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572554" comment="libxml2-doc-2.7.6-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572555" comment="libxml2-python-2.7.6-0.40.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217437" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="963963" ref_url="https://bugzilla.suse.com/963963" source="BUGZILLA"/>
		<reference ref_id="965283" ref_url="https://bugzilla.suse.com/965283" source="BUGZILLA"/>
		<reference ref_id="978395" ref_url="https://bugzilla.suse.com/978395" source="BUGZILLA"/>
		<reference ref_id="981040" ref_url="https://bugzilla.suse.com/981040" source="BUGZILLA"/>
		<reference ref_id="981041" ref_url="https://bugzilla.suse.com/981041" source="BUGZILLA"/>
		<reference ref_id="981108" ref_url="https://bugzilla.suse.com/981108" source="BUGZILLA"/>
		<reference ref_id="981109" ref_url="https://bugzilla.suse.com/981109" source="BUGZILLA"/>
		<reference ref_id="981111" ref_url="https://bugzilla.suse.com/981111" source="BUGZILLA"/>
		<reference ref_id="981112" ref_url="https://bugzilla.suse.com/981112" source="BUGZILLA"/>
		<reference ref_id="981114" ref_url="https://bugzilla.suse.com/981114" source="BUGZILLA"/>
		<reference ref_id="981115" ref_url="https://bugzilla.suse.com/981115" source="BUGZILLA"/>
		<reference ref_id="981548" ref_url="https://bugzilla.suse.com/981548" source="BUGZILLA"/>
		<reference ref_id="981549" ref_url="https://bugzilla.suse.com/981549" source="BUGZILLA"/>
		<reference ref_id="981550" ref_url="https://bugzilla.suse.com/981550" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8806" ref_url="https://www.suse.com/security/cve/CVE-2015-8806/" source="CVE"/>
		<reference ref_id="CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762/" source="CVE"/>
		<reference ref_id="CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833/" source="CVE"/>
		<reference ref_id="CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834/" source="CVE"/>
		<reference ref_id="CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835/" source="CVE"/>
		<reference ref_id="CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837/" source="CVE"/>
		<reference ref_id="CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838/" source="CVE"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840/" source="CVE"/>
		<reference ref_id="CVE-2016-2073" ref_url="https://www.suse.com/security/cve/CVE-2016-2073/" source="CVE"/>
		<reference ref_id="CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705/" source="CVE"/>
		<reference ref_id="CVE-2016-4447" ref_url="https://www.suse.com/security/cve/CVE-2016-4447/" source="CVE"/>
		<reference ref_id="CVE-2016-4448" ref_url="https://www.suse.com/security/cve/CVE-2016-4448/" source="CVE"/>
		<reference ref_id="CVE-2016-4449" ref_url="https://www.suse.com/security/cve/CVE-2016-4449/" source="CVE"/>
		<reference ref_id="CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483/" source="CVE"/>
		<description>

This update for libxml2 fixes the following security issues: 

- CVE-2016-2073, CVE-2015-8806, CVE-2016-1839: A Heap-buffer overread
  was fixed in libxml2/dict.c  [bsc#963963, bsc#965283, bsc#981114].
- CVE-2016-4483: Code was added to avoid an out of bound access when
  serializing malformed strings [bsc#978395].
- CVE-2016-1762: Fixed a heap-based buffer overread in xmlNextChar [bsc#981040].
- CVE-2016-1834: Fixed a heap-buffer-overflow in xmlStrncat [bsc#981041].
- CVE-2016-1833: Fixed a heap-based buffer overread in htmlCurrentChar [bsc#981108].
- CVE-2016-1835: Fixed a heap use-after-free in xmlSAX2AttributeNs [bsc#981109].
- CVE-2016-1837: Fixed a heap use-after-free in htmlParsePubidLiteral
  and htmlParseSystemiteral [bsc#981111].
- CVE-2016-1838: Fixed a heap-based buffer overread in
  xmlParserPrintFileContextInternal [bsc#981112].
- CVE-2016-1840: Fixed a heap-buffer-overflow in xmlFAParsePosCharGroup [bsc#981115].
- CVE-2016-4447: Fixed a heap-based buffer-underreads due to xmlParseName [bsc#981548].
- CVE-2016-4448: Fixed some format string warnings with possible format
  string vulnerability [bsc#981549],
- CVE-2016-4449: Fixed inappropriate fetch of entities content [bsc#981550].
- CVE-2016-3705: Fixed missing increment of recursion counter.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/963963">SUSE bug 963963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965283">SUSE bug 965283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978395">SUSE bug 978395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981040">SUSE bug 981040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981041">SUSE bug 981041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981108">SUSE bug 981108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981109">SUSE bug 981109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981111">SUSE bug 981111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981112">SUSE bug 981112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981114">SUSE bug 981114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981115">SUSE bug 981115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981548">SUSE bug 981548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981549">SUSE bug 981549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981550">SUSE bug 981550</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8806/">CVE-2015-8806 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8806">CVE-2015-8806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1762">CVE-2016-1762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1833">CVE-2016-1833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1834">CVE-2016-1834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1835">CVE-2016-1835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1837">CVE-2016-1837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1838">CVE-2016-1838 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1839">CVE-2016-1839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1840">CVE-2016-1840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2073/">CVE-2016-2073 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2073">CVE-2016-2073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3705">CVE-2016-3705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4447/">CVE-2016-4447 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4447">CVE-2016-4447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4448/">CVE-2016-4448 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4448">CVE-2016-4448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4449/">CVE-2016-4449 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4449">CVE-2016-4449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4483">CVE-2016-4483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572556" comment="libxml2-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572557" comment="libxml2-32bit-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572558" comment="libxml2-doc-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572559" comment="libxml2-python-2.7.6-0.44.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217438" version="1" class="patch">
	<metadata>
		<title>Recommended update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="996079" ref_url="https://bugzilla.suse.com/996079" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<description>

This update for libxml2 fixes an issue when processing external entities introduced
with the fix for CVE-2014-0191.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-29"/>
	<updated date="2016-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/996079">SUSE bug 996079</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0191">CVE-2014-0191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992234" comment="libxml2-2.7.6-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992235" comment="libxml2-32bit-2.7.6-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992236" comment="libxml2-doc-2.7.6-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992237" comment="libxml2-python-2.7.6-0.47.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217439" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1005544" ref_url="https://bugzilla.suse.com/1005544" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658/" source="CVE"/>
		<description>

This update for libxml2 fixes the following issues:

- CVE-2016-4658: Use after free via namespace node in XPointer ranges (bsc#1005544).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-26"/>
	<updated date="2016-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005544">SUSE bug 1005544</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4658">CVE-2016-4658 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572560" comment="libxml2-2.7.6-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572561" comment="libxml2-32bit-2.7.6-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572562" comment="libxml2-doc-2.7.6-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572563" comment="libxml2-python-2.7.6-0.50.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217440" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1010675" ref_url="https://bugzilla.suse.com/1010675" source="BUGZILLA"/>
		<reference ref_id="1014873" ref_url="https://bugzilla.suse.com/1014873" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<description>

This update for libxml2 fixes the following issues:

* CVE-2016-9318: libxml2 did not offer a flag directly indicating that the current document may be read but other files may not be opened, which made it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document (bsc#1010675).
* Prevent NULL dereference in xpointer.c and xmlDumpElementContent, and infinite recursion in xmlParseConditionalSections when in recovery mode(bnc#1014873)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-16"/>
	<updated date="2017-01-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014873">SUSE bug 1014873</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9318">CVE-2016-9318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572564" comment="libxml2-2.7.6-0.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572565" comment="libxml2-32bit-2.7.6-0.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572566" comment="libxml2-doc-2.7.6-0.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572567" comment="libxml2-python-2.7.6-0.64.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217441" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1010675" ref_url="https://bugzilla.suse.com/1010675" source="BUGZILLA"/>
		<reference ref_id="1013930" ref_url="https://bugzilla.suse.com/1013930" source="BUGZILLA"/>
		<reference ref_id="1039063" ref_url="https://bugzilla.suse.com/1039063" source="BUGZILLA"/>
		<reference ref_id="1039064" ref_url="https://bugzilla.suse.com/1039064" source="BUGZILLA"/>
		<reference ref_id="1039066" ref_url="https://bugzilla.suse.com/1039066" source="BUGZILLA"/>
		<reference ref_id="1039069" ref_url="https://bugzilla.suse.com/1039069" source="BUGZILLA"/>
		<reference ref_id="1039661" ref_url="https://bugzilla.suse.com/1039661" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<reference ref_id="CVE-2017-9047" ref_url="https://www.suse.com/security/cve/CVE-2017-9047/" source="CVE"/>
		<reference ref_id="CVE-2017-9048" ref_url="https://www.suse.com/security/cve/CVE-2017-9048/" source="CVE"/>
		<reference ref_id="CVE-2017-9049" ref_url="https://www.suse.com/security/cve/CVE-2017-9049/" source="CVE"/>
		<reference ref_id="CVE-2017-9050" ref_url="https://www.suse.com/security/cve/CVE-2017-9050/" source="CVE"/>
		<description>

This update for libxml2 fixes the following issues:

Security issues fixed:

- CVE-2017-9050: heap-based buffer overflow (xmlDictAddString func) [bsc#1039069, bsc#1039661]
- CVE-2017-9049: heap-based buffer overflow (xmlDictComputeFastKey func) [bsc#1039066]
- CVE-2017-9048: stack overflow vulnerability (xmlSnprintfElementContent func) [bsc#1039063]
- CVE-2017-9047: stack overflow vulnerability (xmlSnprintfElementContent func) [bsc#1039064]

A clarification for the previously released update: For CVE-2016-9318 we decided
not to ship a fix since it can break existing setups. Please take appropriate
actions if you parse untrusted XML files and use the new -noxxe flag if
possible (bnc#1010675, bnc#1013930).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-13"/>
	<updated date="2017-06-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013930">SUSE bug 1013930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039063">SUSE bug 1039063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039064">SUSE bug 1039064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039066">SUSE bug 1039066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039069">SUSE bug 1039069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039661">SUSE bug 1039661</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9318">CVE-2016-9318 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9047/">CVE-2017-9047 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9047">CVE-2017-9047 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9048/">CVE-2017-9048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9048">CVE-2017-9048 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9049/">CVE-2017-9049 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9049">CVE-2017-9049 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9050/">CVE-2017-9050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9050">CVE-2017-9050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572568" comment="libxml2-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572569" comment="libxml2-32bit-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572570" comment="libxml2-doc-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572571" comment="libxml2-python-2.7.6-0.69.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217442" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1024989" ref_url="https://bugzilla.suse.com/1024989" source="BUGZILLA"/>
		<reference ref_id="1044337" ref_url="https://bugzilla.suse.com/1044337" source="BUGZILLA"/>
		<reference ref_id="1044887" ref_url="https://bugzilla.suse.com/1044887" source="BUGZILLA"/>
		<reference ref_id="1044894" ref_url="https://bugzilla.suse.com/1044894" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0663" ref_url="https://www.suse.com/security/cve/CVE-2017-0663/" source="CVE"/>
		<reference ref_id="CVE-2017-5969" ref_url="https://www.suse.com/security/cve/CVE-2017-5969/" source="CVE"/>
		<reference ref_id="CVE-2017-7375" ref_url="https://www.suse.com/security/cve/CVE-2017-7375/" source="CVE"/>
		<reference ref_id="CVE-2017-7376" ref_url="https://www.suse.com/security/cve/CVE-2017-7376/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

Security issues fixed:

* CVE-2017-0663: Fixed a heap buffer overflow in xmlAddID (bsc#1044337)
* CVE-2017-5969: Fixed a NULL pointer deref in xmlDumpElementContent (bsc#1024989)
* CVE-2017-7375: Prevented an unwanted external entity reference (bsc#1044894)
* CVE-2017-7376: Increase buffer space for port in HTTP redirect support (bsc#1044887)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-07"/>
	<updated date="2017-07-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024989">SUSE bug 1024989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044337">SUSE bug 1044337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044887">SUSE bug 1044887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044894">SUSE bug 1044894</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0663/">CVE-2017-0663 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0663">CVE-2017-0663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5969/">CVE-2017-5969 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5969">CVE-2017-5969 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7375/">CVE-2017-7375 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7375">CVE-2017-7375 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7376/">CVE-2017-7376 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7376">CVE-2017-7376 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572572" comment="libxml2-2.7.6-0.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572573" comment="libxml2-32bit-2.7.6-0.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572574" comment="libxml2-doc-2.7.6-0.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572575" comment="libxml2-python-2.7.6-0.76.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217443" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1038444" ref_url="https://bugzilla.suse.com/1038444" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8872" ref_url="https://www.suse.com/security/cve/CVE-2017-8872/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2017-8872: Out-of-bounds read could lead to application crash (bsc#1038444)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-09"/>
	<updated date="2017-08-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1038444">SUSE bug 1038444</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8872/">CVE-2017-8872 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8872">CVE-2017-8872 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572576" comment="libxml2-2.7.6-0.77.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572577" comment="libxml2-32bit-2.7.6-0.77.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572578" comment="libxml2-doc-2.7.6-0.77.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572579" comment="libxml2-python-2.7.6-0.77.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217444" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1069689" ref_url="https://bugzilla.suse.com/1069689" source="BUGZILLA"/>
		<reference ref_id="1077993" ref_url="https://bugzilla.suse.com/1077993" source="BUGZILLA"/>
		<reference ref_id="1078806" ref_url="https://bugzilla.suse.com/1078806" source="BUGZILLA"/>
		<reference ref_id="1078813" ref_url="https://bugzilla.suse.com/1078813" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5131" ref_url="https://www.suse.com/security/cve/CVE-2016-5131/" source="CVE"/>
		<reference ref_id="CVE-2017-15412" ref_url="https://www.suse.com/security/cve/CVE-2017-15412/" source="CVE"/>
		<reference ref_id="CVE-2017-16932" ref_url="https://www.suse.com/security/cve/CVE-2017-16932/" source="CVE"/>
		<reference ref_id="CVE-2017-5130" ref_url="https://www.suse.com/security/cve/CVE-2017-5130/" source="CVE"/>
		<description>
This update for libxml2 fixes several issues.

Theses security issues were fixed:

- CVE-2017-16932: Fixed infinite recursion could lead to an infinite loop or
  memory exhaustion when expanding a parameter entity in a DTD (bsc#1069689).
- CVE-2017-15412: Prevent use after free when calling XPath extension functions
  that allowed remote attackers to cause DoS or potentially RCE (bsc#1077993)
- CVE-2016-5131: Use-after-free vulnerability in libxml2 allowed
  remote attackers to cause a denial of service or possibly have
  unspecified other impact via vectors related to the XPointer range-to
  function. (bsc#1078813)
- CVE-2017-5130: Fixed a potential remote buffer overflow in function
  xmlMemoryStrdup() (bsc#1078806)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-08"/>
	<updated date="2018-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1069689">SUSE bug 1069689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077993">SUSE bug 1077993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078806">SUSE bug 1078806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078813">SUSE bug 1078813</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5131/">CVE-2016-5131 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5131">CVE-2016-5131 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15412/">CVE-2017-15412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15412">CVE-2017-15412 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16932/">CVE-2017-16932 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16932">CVE-2017-16932 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5130/">CVE-2017-5130 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5130">CVE-2017-5130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572580" comment="libxml2-2.7.6-0.77.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572581" comment="libxml2-32bit-2.7.6-0.77.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572582" comment="libxml2-doc-2.7.6-0.77.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572583" comment="libxml2-python-2.7.6-0.77.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217445" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1010675" ref_url="https://bugzilla.suse.com/1010675" source="BUGZILLA"/>
		<reference ref_id="1102046" ref_url="https://bugzilla.suse.com/1102046" source="BUGZILLA"/>
		<reference ref_id="1110146" ref_url="https://bugzilla.suse.com/1110146" source="BUGZILLA"/>
		<reference ref_id="1126613" ref_url="https://bugzilla.suse.com/1126613" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<reference ref_id="CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

Security issue fixed:

- CVE-2018-14404: Prevent NULL pointer dereference in the xmlXPathCompOpEval()
  function when parsing an invalid XPath expression in the XPATH_OP_AND or
  XPATH_OP_OR case leading to a denial of service attack (bsc#1102046)

Other Issue fixed:

- Fixed a bug related to the fix for CVE-2016-9318 which allowed xsltproc to access 
  the internet even when --nonet was given and also was making docbook-xsl-stylesheets to have 
  incomplete xml catalog file (bsc#1010675, bsc#1126613 and bsc#1110146).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-21"/>
	<updated date="2019-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102046">SUSE bug 1102046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110146">SUSE bug 1110146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126613">SUSE bug 1126613</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9318">CVE-2016-9318 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14404">CVE-2018-14404 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572584" comment="libxml2-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572585" comment="libxml2-32bit-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572586" comment="libxml2-doc-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572587" comment="libxml2-python-2.7.6-0.77.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217446" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1123919" ref_url="https://bugzilla.suse.com/1123919" source="BUGZILLA"/>
		<description>

This update for libxml2 doesn't fix any additional security issues, but correct its rpm changelog to reflect
all CVEs that have been fixed over the past.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572588" comment="libxml2-2.7.6-0.77.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572589" comment="libxml2-32bit-2.7.6-0.77.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572590" comment="libxml2-doc-2.7.6-0.77.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572591" comment="libxml2-python-2.7.6-0.77.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217447" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1159928" ref_url="https://bugzilla.suse.com/1159928" source="BUGZILLA"/>
		<reference ref_id="1161517" ref_url="https://bugzilla.suse.com/1161517" source="BUGZILLA"/>
		<reference ref_id="1161521" ref_url="https://bugzilla.suse.com/1161521" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19956" ref_url="https://www.suse.com/security/cve/CVE-2019-19956/" source="CVE"/>
		<reference ref_id="CVE-2019-20388" ref_url="https://www.suse.com/security/cve/CVE-2019-20388/" source="CVE"/>
		<reference ref_id="CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2019-20388: Fixed a memory leak in xmlSchemaPreRun (bsc#1161521).
- CVE-2020-7595: Fixed an infinite loop in an EOF situation (bsc#1161517).
- CVE-2019-19956: Fixed a memory leak in xmlParseBalancedChunkMemoryRecover (bsc#1159928).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-22"/>
	<updated date="2020-07-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1159928">SUSE bug 1159928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161517">SUSE bug 1161517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161521">SUSE bug 1161521</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19956/">CVE-2019-19956 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19956">CVE-2019-19956 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20388/">CVE-2019-20388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20388">CVE-2019-20388 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7595">CVE-2020-7595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572592" comment="libxml2-2.7.6-0.77.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572593" comment="libxml2-32bit-2.7.6-0.77.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572594" comment="libxml2-doc-2.7.6-0.77.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572595" comment="libxml2-python-2.7.6-0.77.27.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217448" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1176179" ref_url="https://bugzilla.suse.com/1176179" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24977" ref_url="https://www.suse.com/security/cve/CVE-2020-24977/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2020-24977: Fixed a global-buffer-overflow in xmlEncodeEntitiesInternal (bsc#1176179).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-18"/>
	<updated date="2020-09-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1176179">SUSE bug 1176179</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24977/">CVE-2020-24977 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24977">CVE-2020-24977 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572596" comment="libxml2-2.7.6-0.77.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572597" comment="libxml2-32bit-2.7.6-0.77.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572598" comment="libxml2-doc-2.7.6-0.77.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572599" comment="libxml2-python-2.7.6-0.77.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217449" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1185408" ref_url="https://bugzilla.suse.com/1185408" source="BUGZILLA"/>
		<reference ref_id="1185409" ref_url="https://bugzilla.suse.com/1185409" source="BUGZILLA"/>
		<reference ref_id="1185410" ref_url="https://bugzilla.suse.com/1185410" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).
- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).
- CVE-2021-3516: Fixed a use after free in xmlEncodeEntitiesInternal() in entities.c (bsc#1185409)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-11"/>
	<updated date="2021-05-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185408">SUSE bug 1185408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185409">SUSE bug 1185409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185410">SUSE bug 1185410</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0191">CVE-2014-0191 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3516">CVE-2021-3516 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">CVE-2021-3517 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">CVE-2021-3518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572600" comment="libxml2-2.7.6-0.77.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572601" comment="libxml2-32bit-2.7.6-0.77.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572602" comment="libxml2-doc-2.7.6-0.77.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572603" comment="libxml2-python-2.7.6-0.77.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217450" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1159928" ref_url="https://bugzilla.suse.com/1159928" source="BUGZILLA"/>
		<reference ref_id="1161517" ref_url="https://bugzilla.suse.com/1161517" source="BUGZILLA"/>
		<reference ref_id="1161521" ref_url="https://bugzilla.suse.com/1161521" source="BUGZILLA"/>
		<reference ref_id="1176179" ref_url="https://bugzilla.suse.com/1176179" source="BUGZILLA"/>
		<reference ref_id="1185408" ref_url="https://bugzilla.suse.com/1185408" source="BUGZILLA"/>
		<reference ref_id="1185409" ref_url="https://bugzilla.suse.com/1185409" source="BUGZILLA"/>
		<reference ref_id="1185410" ref_url="https://bugzilla.suse.com/1185410" source="BUGZILLA"/>
		<reference ref_id="1185698" ref_url="https://bugzilla.suse.com/1185698" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2019-19956" ref_url="https://www.suse.com/security/cve/CVE-2019-19956/" source="CVE"/>
		<reference ref_id="CVE-2019-20388" ref_url="https://www.suse.com/security/cve/CVE-2019-20388/" source="CVE"/>
		<reference ref_id="CVE-2020-24977" ref_url="https://www.suse.com/security/cve/CVE-2020-24977/" source="CVE"/>
		<reference ref_id="CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595/" source="CVE"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<reference ref_id="CVE-2021-3537" ref_url="https://www.suse.com/security/cve/CVE-2021-3537/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

Security issues fixed:  

- CVE-2021-3537: NULL pointer dereference in valid.c:xmlValidBuildAContentModel (bsc#1185698)
- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).
- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).
- CVE-2021-3516: Fixed a use after free in xmlEncodeEntitiesInternal() in entities.c (bsc#1185409)
- CVE-2020-24977: Fixed a global-buffer-overflow in xmlEncodeEntitiesInternal (bsc#1176179).	  
- CVE-2019-20388: Fixed a memory leak in xmlSchemaPreRun (bsc#1161521).
- CVE-2020-7595: Fixed an infinite loop in an EOF situation (bsc#1161517).
- CVE-2019-19956: Fixed a memory leak in xmlParseBalancedChunkMemoryRecover (bsc#1159928).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159928">SUSE bug 1159928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161517">SUSE bug 1161517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161521">SUSE bug 1161521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176179">SUSE bug 1176179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185408">SUSE bug 1185408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185409">SUSE bug 1185409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185410">SUSE bug 1185410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185698">SUSE bug 1185698</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0191">CVE-2014-0191 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19956/">CVE-2019-19956 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19956">CVE-2019-19956 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20388/">CVE-2019-20388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20388">CVE-2019-20388 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24977/">CVE-2020-24977 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24977">CVE-2020-24977 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7595">CVE-2020-7595 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3516">CVE-2021-3516 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">CVE-2021-3517 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">CVE-2021-3518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3537/">CVE-2021-3537 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3537">CVE-2021-3537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572604" comment="libxml2-2.7.6-0.77.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572605" comment="libxml2-32bit-2.7.6-0.77.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572606" comment="libxml2-doc-2.7.6-0.77.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572607" comment="libxml2-python-2.7.6-0.77.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217451" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1186015" ref_url="https://bugzilla.suse.com/1186015" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3541" ref_url="https://www.suse.com/security/cve/CVE-2021-3541/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2021-3541: Fixed exponential entity expansion attack that could bypass all existing protection mechanisms (bsc#1186015).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-09"/>
	<updated date="2021-06-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186015">SUSE bug 1186015</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3541/">CVE-2021-3541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3541">CVE-2021-3541 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572608" comment="libxml2-2.7.6-0.77.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572609" comment="libxml2-32bit-2.7.6-0.77.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572610" comment="libxml2-doc-2.7.6-0.77.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572611" comment="libxml2-python-2.7.6-0.77.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217452" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1196490" ref_url="https://bugzilla.suse.com/1196490" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2022-23308: Fixed a use-after-free of ID and IDREF attributes (bsc#1196490).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196490">SUSE bug 1196490</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23308">CVE-2022-23308 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670908" comment="libxml2-2.7.6-0.77.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670909" comment="libxml2-32bit-2.7.6-0.77.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670910" comment="libxml2-doc-2.7.6-0.77.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670911" comment="libxml2-python-2.7.6-0.77.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217453" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="928193" ref_url="https://bugzilla.suse.com/928193" source="BUGZILLA"/>
		<reference ref_id="951734" ref_url="https://bugzilla.suse.com/951734" source="BUGZILLA"/>
		<reference ref_id="951735" ref_url="https://bugzilla.suse.com/951735" source="BUGZILLA"/>
		<reference ref_id="956018" ref_url="https://bugzilla.suse.com/956018" source="BUGZILLA"/>
		<reference ref_id="956021" ref_url="https://bugzilla.suse.com/956021" source="BUGZILLA"/>
		<reference ref_id="956260" ref_url="https://bugzilla.suse.com/956260" source="BUGZILLA"/>
		<reference ref_id="957105" ref_url="https://bugzilla.suse.com/957105" source="BUGZILLA"/>
		<reference ref_id="957106" ref_url="https://bugzilla.suse.com/957106" source="BUGZILLA"/>
		<reference ref_id="957107" ref_url="https://bugzilla.suse.com/957107" source="BUGZILLA"/>
		<reference ref_id="957109" ref_url="https://bugzilla.suse.com/957109" source="BUGZILLA"/>
		<reference ref_id="957110" ref_url="https://bugzilla.suse.com/957110" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317/" source="CVE"/>
		<description>

    This update fixes the following security issues: 

    * CVE-2015-1819 Enforce the reader to run in constant memory [bnc#928193]
    * CVE-2015-7941 Fix out of bound read with crafted xml input by stopping parsing on entities boundaries errors [bnc#951734]
    * CVE-2015-7942 Fix another variation of overflow in Conditional sections [bnc#951735]
    * CVE-2015-8241 Avoid extra processing of MarkupDecl when EOF [bnc#956018]
    * CVE-2015-8242 Buffer overead with HTML parser in push mode [bnc#956021]
    * CVE-2015-8317 Return if the encoding declaration is broken or encoding conversion failed [bnc#956260]
    * CVE-2015-5312 Fix another entity expansion issue [bnc#957105]
    * CVE-2015-7497 Avoid an heap buffer overflow in xmlDictComputeFastQKey [bnc#957106]
    * CVE-2015-7498 Processes entities after encoding conversion failures [bnc#957107]
    * CVE-2015-7499 Add xmlHaltParser() to stop the parser / Detect incoherency on GROW [bnc#957109]
    * CVE-2015-7500 Fix memory access error due to incorrect entities boundaries [bnc#957110]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-05"/>
	<updated date="2016-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/928193">SUSE bug 928193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951734">SUSE bug 951734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951735">SUSE bug 951735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956018">SUSE bug 956018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956021">SUSE bug 956021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956260">SUSE bug 956260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957105">SUSE bug 957105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957106">SUSE bug 957106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957107">SUSE bug 957107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957109">SUSE bug 957109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957110">SUSE bug 957110</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1819">CVE-2015-1819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5312">CVE-2015-5312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7497">CVE-2015-7497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7498">CVE-2015-7498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7499">CVE-2015-7499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7500">CVE-2015-7500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7941">CVE-2015-7941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7942">CVE-2015-7942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8241">CVE-2015-8241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8242">CVE-2015-8242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8317">CVE-2015-8317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572612" comment="libxml2-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566940" comment="libxml2-32bit-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572613" comment="libxml2-doc-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572614" comment="libxml2-python-2.7.6-0.34.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217454" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="960674" ref_url="https://bugzilla.suse.com/960674" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8710" ref_url="https://www.suse.com/security/cve/CVE-2015-8710/" source="CVE"/>
		<description>

This update for libxml2 fixes the following security issue:

- CVE-2015-8710: Parsing short unclosed HTML comment could cause uninitialized memory access, which allowed remote attackers to read contents from previous HTTP requests depending on the application (bsc#960674)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960674">SUSE bug 960674</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8710/">CVE-2015-8710 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8710">CVE-2015-8710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572615" comment="libxml2-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566943" comment="libxml2-32bit-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572616" comment="libxml2-doc-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572617" comment="libxml2-python-2.7.6-0.37.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217455" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="746039" ref_url="https://bugzilla.suse.com/746039" source="BUGZILLA"/>
		<reference ref_id="769182" ref_url="https://bugzilla.suse.com/769182" source="BUGZILLA"/>
		<reference ref_id="811686" ref_url="https://bugzilla.suse.com/811686" source="BUGZILLA"/>
		<reference ref_id="849019" ref_url="https://bugzilla.suse.com/849019" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3970" ref_url="https://www.suse.com/security/cve/CVE-2011-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-2825" ref_url="https://www.suse.com/security/cve/CVE-2012-2825/" source="CVE"/>
		<reference ref_id="CVE-2012-6139" ref_url="https://www.suse.com/security/cve/CVE-2012-6139/" source="CVE"/>
		<description>

libxslt received a security update to fix a security issue:

    * CVE-2013-4520: The XSL implementation in libxslt allowed remote
      attackers to cause a denial of service (crash) via an invalid DTD.
      (addendum due to incomplete fix for CVE-2012-2825)

Security Issue references:

    * CVE-2012-6139
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6139&gt;
    * CVE-2012-2825
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2825&gt;
    * CVE-2011-3970
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3970&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-06"/>
	<updated date="2013-11-06"/>
	<bugzilla href="https://bugzilla.suse.com/746039">SUSE bug 746039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769182">SUSE bug 769182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/811686">SUSE bug 811686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849019">SUSE bug 849019</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3970/">CVE-2011-3970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3970">CVE-2011-3970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2825/">CVE-2012-2825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2825">CVE-2012-2825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6139/">CVE-2012-6139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6139">CVE-2012-6139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992238" comment="libxslt-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566147" comment="libxslt-32bit-1.1.24-19.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217456" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1005591" ref_url="https://bugzilla.suse.com/1005591" source="BUGZILLA"/>
		<reference ref_id="1035905" ref_url="https://bugzilla.suse.com/1035905" source="BUGZILLA"/>
		<reference ref_id="934119" ref_url="https://bugzilla.suse.com/934119" source="BUGZILLA"/>
		<reference ref_id="952474" ref_url="https://bugzilla.suse.com/952474" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7995" ref_url="https://www.suse.com/security/cve/CVE-2015-7995/" source="CVE"/>
		<reference ref_id="CVE-2015-9019" ref_url="https://www.suse.com/security/cve/CVE-2015-9019/" source="CVE"/>
		<reference ref_id="CVE-2016-4738" ref_url="https://www.suse.com/security/cve/CVE-2016-4738/" source="CVE"/>
		<reference ref_id="CVE-2017-5029" ref_url="https://www.suse.com/security/cve/CVE-2017-5029/" source="CVE"/>
		<description>

 This update for libxslt fixes the following issues:
 
- CVE-2017-5029: The xsltAddTextString function in transform.c lacked a check 
for integer overflow during a size calculation, which allowed a remote attacker 
to perform an out of bounds memory write via a crafted HTML page (bsc#1035905).

- CVE-2016-4738: Fix heap overread in xsltFormatNumberConversion: An empty decimal-separator 
could cause a heap overread. This can be exploited to leak a couple of bytes after 
the buffer that holds the pattern string (bsc#1005591).

- CVE-2015-9019: Properly initialize random generator (bsc#934119).

- CVE-2015-7995: Vulnerability in function xsltStylePreCompute' in preproc.c could cause a 
type confusion leading to DoS. (bsc#952474)

 		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-15"/>
	<updated date="2017-05-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005591">SUSE bug 1005591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035905">SUSE bug 1035905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934119">SUSE bug 934119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952474">SUSE bug 952474</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7995/">CVE-2015-7995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7995">CVE-2015-7995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-9019/">CVE-2015-9019 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9019">CVE-2015-9019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4738/">CVE-2016-4738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4738">CVE-2016-4738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5029/">CVE-2017-5029 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5029">CVE-2017-5029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572621" comment="libxslt-1.1.24-19.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572622" comment="libxslt-32bit-1.1.24-19.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217457" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1132160" ref_url="https://bugzilla.suse.com/1132160" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<description>
This update for libxslt fixes the following issues:

Security issue fixed:

- CVE-2019-11068: Fixed a protection mechanism bypass where callers of 
  xsltCheckRead() and xsltCheckWrite() would permit access upon receiving an
  error (bsc#1132160).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-16"/>
	<updated date="2019-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1132160">SUSE bug 1132160</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11068">CVE-2019-11068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572623" comment="libxslt-1.1.24-19.34.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572624" comment="libxslt-32bit-1.1.24-19.34.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217458" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1140095" ref_url="https://bugzilla.suse.com/1140095" source="BUGZILLA"/>
		<reference ref_id="1140101" ref_url="https://bugzilla.suse.com/1140101" source="BUGZILLA"/>
		<reference ref_id="1154609" ref_url="https://bugzilla.suse.com/1154609" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<reference ref_id="CVE-2019-13117" ref_url="https://www.suse.com/security/cve/CVE-2019-13117/" source="CVE"/>
		<reference ref_id="CVE-2019-13118" ref_url="https://www.suse.com/security/cve/CVE-2019-13118/" source="CVE"/>
		<reference ref_id="CVE-2019-18197" ref_url="https://www.suse.com/security/cve/CVE-2019-18197/" source="CVE"/>
		<description>
This update for libxslt fixes the following issues:

Security issues fixed:

- CVE-2019-13118: Fixed a read of uninitialized stack data (bsc#1140101).
- CVE-2019-13117: Fixed a uninitialized read which allowed to discern whether a byte on the stack contains certain special characters (bsc#1140095).
- CVE-2019-18197: Fixed a dangling pointer in xsltCopyText which may have led to information disclosure (bsc#1154609).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-08"/>
	<updated date="2020-09-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1140095">SUSE bug 1140095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140101">SUSE bug 1140101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154609">SUSE bug 1154609</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11068">CVE-2019-11068 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13117/">CVE-2019-13117 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13117">CVE-2019-13117 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13118/">CVE-2019-13118 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13118">CVE-2019-13118 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18197/">CVE-2019-18197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18197">CVE-2019-18197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572625" comment="libxslt-1.1.24-19.34.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572626" comment="libxslt-32bit-1.1.24-19.34.8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217459" version="1" class="patch">
	<metadata>
		<title>Security update for libzip1</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="681193" ref_url="https://bugzilla.suse.com/681193" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<description>

The following bug has been fixed:

    * empty zip archives could crash programs using libzip (CVE-2011-0421).

Security Issue reference:

    * CVE-2011-0421
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0421&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-03-22"/>
	<updated date="2011-03-22"/>
	<bugzilla href="https://bugzilla.suse.com/681193">SUSE bug 681193</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0421">CVE-2011-0421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992239" comment="libzip1-0.9-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217460" version="1" class="patch">
	<metadata>
		<title>YOU update for libzypp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="684466" ref_url="https://bugzilla.suse.com/684466" source="BUGZILLA"/>
		<reference ref_id="694427" ref_url="https://bugzilla.suse.com/694427" source="BUGZILLA"/>
		<reference ref_id="709480" ref_url="https://bugzilla.suse.com/709480" source="BUGZILLA"/>
		<reference ref_id="828672" ref_url="https://bugzilla.suse.com/828672" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-3704" ref_url="https://www.suse.com/security/cve/CVE-2013-3704/" source="CVE"/>
		<description>

libzypp did not handle multiple gpg pubkeys in the repomd.xml.key and 
content.key consistently and secure. Attackers could have exploited this to 
add their own keys and pretend it's from SUSE.

Security Issue reference:

    * CVE-2013-3704
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3704&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-25"/>
	<updated date="2013-09-25"/>
	<bugzilla href="https://bugzilla.suse.com/684466">SUSE bug 684466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/694427">SUSE bug 694427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/709480">SUSE bug 709480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828672">SUSE bug 828672</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3704/">CVE-2013-3704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3704">CVE-2013-3704 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992240" comment="libzypp-6.39.0-0.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217461" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1159646" ref_url="https://bugzilla.suse.com/1159646" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17571" ref_url="https://www.suse.com/security/cve/CVE-2019-17571/" source="CVE"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2019-17571: Fixed a remote code execution by deserialization of untrusted data in SocketServer (bsc#1159646).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159646">SUSE bug 1159646</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17571/">CVE-2019-17571 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17571">CVE-2019-17571 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568460" comment="log4j-1.2.15-26.32.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217462" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1193662" ref_url="https://bugzilla.suse.com/1193662" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2021-4104: Disable the JMSAppender class from log4j to protect against
  the log4jshell vulnerability. [bsc#1193662]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-17"/>
	<updated date="2021-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104">CVE-2021-4104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660155" comment="log4j-1.2.15-26.32.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217463" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1194842" ref_url="https://bugzilla.suse.com/1194842" source="BUGZILLA"/>
		<reference ref_id="1194843" ref_url="https://bugzilla.suse.com/1194843" source="BUGZILLA"/>
		<reference ref_id="1194844" ref_url="https://bugzilla.suse.com/1194844" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23302" ref_url="https://www.suse.com/security/cve/CVE-2022-23302/" source="CVE"/>
		<reference ref_id="CVE-2022-23305" ref_url="https://www.suse.com/security/cve/CVE-2022-23305/" source="CVE"/>
		<reference ref_id="CVE-2022-23307" ref_url="https://www.suse.com/security/cve/CVE-2022-23307/" source="CVE"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2022-23307: Fixed deserialization flaw in the chainsaw component of log4j leading to malicious code execution. (bsc#1194844)
- CVE-2022-23305: Fixed SQL injection when application is configured to use JDBCAppender. (bsc#1194843)
- CVE-2022-23302: Fixed remote code execution when application is configured to use JMSSink. (bsc#1194842)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194842">SUSE bug 1194842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194843">SUSE bug 1194843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194844">SUSE bug 1194844</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23302/">CVE-2022-23302 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23302">CVE-2022-23302 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23305/">CVE-2022-23305 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23305">CVE-2022-23305 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23307/">CVE-2022-23307 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23307">CVE-2022-23307 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664707" comment="log4j-1.2.15-26.32.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217464" version="1" class="patch">
	<metadata>
		<title>Recommended update for logrotate</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="651685" ref_url="https://bugzilla.suse.com/651685" source="BUGZILLA"/>
		<reference ref_id="677335" ref_url="https://bugzilla.suse.com/677335" source="BUGZILLA"/>
		<reference ref_id="677336" ref_url="https://bugzilla.suse.com/677336" source="BUGZILLA"/>
		<reference ref_id="679661" ref_url="https://bugzilla.suse.com/679661" source="BUGZILLA"/>
		<reference ref_id="679662" ref_url="https://bugzilla.suse.com/679662" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1098" ref_url="https://www.suse.com/security/cve/CVE-2011-1098/" source="CVE"/>
		<reference ref_id="CVE-2011-1154" ref_url="https://www.suse.com/security/cve/CVE-2011-1154/" source="CVE"/>
		<reference ref_id="CVE-2011-1155" ref_url="https://www.suse.com/security/cve/CVE-2011-1155/" source="CVE"/>
		<reference ref_id="CVE-2011-1550" ref_url="https://www.suse.com/security/cve/CVE-2011-1550/" source="CVE"/>
		<description>

In order to make logrotate more robust against manipulated log directories 
logrotate was changed to

    * add a 'su' config option which makes logrotate run partially as the
      specified user
    * run external helpers like log file compressors as the user configured
      with the 'su' option
    * issue a warning for log directories writable by non-root users
    * not follow symlinks when rotating logs

Security Issue reference:

    * CVE-2011-1550
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1550&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-01"/>
	<updated date="2012-02-01"/>
	<bugzilla href="https://bugzilla.suse.com/651685">SUSE bug 651685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/677335">SUSE bug 677335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/677336">SUSE bug 677336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/679661">SUSE bug 679661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/679662">SUSE bug 679662</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1098/">CVE-2011-1098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1098">CVE-2011-1098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1154/">CVE-2011-1154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1154">CVE-2011-1154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1155/">CVE-2011-1155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1155">CVE-2011-1155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1550/">CVE-2011-1550 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1550">CVE-2011-1550 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992241" comment="logrotate-3.7.7-10.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217465" version="1" class="patch">
	<metadata>
		<title>Recommended update for logwatch</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="559856" ref_url="https://bugzilla.suse.com/559856" source="BUGZILLA"/>
		<reference ref_id="674984" ref_url="https://bugzilla.suse.com/674984" source="BUGZILLA"/>
		<reference ref_id="724164" ref_url="https://bugzilla.suse.com/724164" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1018" ref_url="https://www.suse.com/security/cve/CVE-2011-1018/" source="CVE"/>
		<description>

This update fixes an issue in logwatch where it wouldn't start with the 
service dmeventd because the crontab entry in /etc/cron.d/dmeventd was 
lacking the user name. In addition the print flag is reset if the output 
has to be saved (bnc#559856).

		</description>
<advisory from="security@suse.de">
	<issued date="2011-11-02"/>
	<updated date="2011-11-02"/>
	<bugzilla href="https://bugzilla.suse.com/559856">SUSE bug 559856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/674984">SUSE bug 674984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/724164">SUSE bug 724164</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1018/">CVE-2011-1018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1018">CVE-2011-1018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992242" comment="logwatch-7.3.6-65.72.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217466" version="1" class="patch">
	<metadata>
		<title>Security update for LVM2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="622537" ref_url="https://bugzilla.suse.com/622537" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2526" ref_url="https://www.suse.com/security/cve/CVE-2010-2526/" source="CVE"/>
		<description>

clvmd, when running, allowed unprivileged local users to issue arbitrary 
lvm commands (CVE-2010-2526) via incorrect permissions. This has been 
fixed.

		</description>
<advisory from="security@suse.de">
	<issued date="2010-08-20"/>
	<updated date="2010-08-20"/>
	<bugzilla href="https://bugzilla.suse.com/622537">SUSE bug 622537</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2526/">CVE-2010-2526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2526">CVE-2010-2526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992243" comment="lvm2-2.02.39-18.31.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217467" version="1" class="patch">
	<metadata>
		<title>Recommended update for mailman, mailman-debuginfo, mailman-debugsource</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="621104" ref_url="https://bugzilla.suse.com/621104" source="BUGZILLA"/>
		<reference ref_id="637295" ref_url="https://bugzilla.suse.com/637295" source="BUGZILLA"/>
		<reference ref_id="671745" ref_url="https://bugzilla.suse.com/671745" source="BUGZILLA"/>
		<reference ref_id="677335" ref_url="https://bugzilla.suse.com/677335" source="BUGZILLA"/>
		<reference ref_id="697638" ref_url="https://bugzilla.suse.com/697638" source="BUGZILLA"/>
		<reference ref_id="750259" ref_url="https://bugzilla.suse.com/750259" source="BUGZILLA"/>
		<reference ref_id="754623" ref_url="https://bugzilla.suse.com/754623" source="BUGZILLA"/>
		<reference ref_id="CVE-2002-0389" ref_url="https://www.suse.com/security/cve/CVE-2002-0389/" source="CVE"/>
		<reference ref_id="CVE-2010-3089" ref_url="https://www.suse.com/security/cve/CVE-2010-3089/" source="CVE"/>
		<reference ref_id="CVE-2010-3090" ref_url="https://www.suse.com/security/cve/CVE-2010-3090/" source="CVE"/>
		<reference ref_id="CVE-2011-0707" ref_url="https://www.suse.com/security/cve/CVE-2011-0707/" source="CVE"/>
		<description>

This update for mailman resolves the following issues:

    * Fix logrotation scripts in mailman erroring out due to non-root
      directory ownership (bnc#754623)
    * Fix a permission problem in private mailing list archives
      (bnc#697638). (CVE-2002-0389)

		</description>
<advisory from="security@suse.de">
	<issued date="2012-05-18"/>
	<updated date="2012-05-18"/>
	<bugzilla href="https://bugzilla.suse.com/621104">SUSE bug 621104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/637295">SUSE bug 637295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/671745">SUSE bug 671745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/677335">SUSE bug 677335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/697638">SUSE bug 697638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750259">SUSE bug 750259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754623">SUSE bug 754623</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2002-0389/">CVE-2002-0389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2002-0389">CVE-2002-0389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3089/">CVE-2010-3089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3089">CVE-2010-3089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3090/">CVE-2010-3090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3090">CVE-2010-3090 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0707/">CVE-2011-0707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0707">CVE-2011-0707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992244" comment="mailman-2.1.14-9.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217468" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="995352" ref_url="https://bugzilla.suse.com/995352" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6893" ref_url="https://www.suse.com/security/cve/CVE-2016-6893/" source="CVE"/>
		<description>
This update for mailman to version 2.1.15 fixes the following issues:

- CVE-2016-6893: Prevent cross-site request forgery (CSRF) vulnerability in the
  user options page that allowed remote attackers to hijack the authentication of
  arbitrary users for requests that modify an option (bsc#995352).
- Various other hardenings against CSFR attacks

For details please see https://launchpad.net/mailman/+milestone/2.1.15
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-11"/>
	<updated date="2018-06-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/995352">SUSE bug 995352</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6893/">CVE-2016-6893 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6893">CVE-2016-6893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572629" comment="mailman-2.1.15-9.6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217469" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1077358" ref_url="https://bugzilla.suse.com/1077358" source="BUGZILLA"/>
		<reference ref_id="1099510" ref_url="https://bugzilla.suse.com/1099510" source="BUGZILLA"/>
		<reference ref_id="1101288" ref_url="https://bugzilla.suse.com/1101288" source="BUGZILLA"/>
		<reference ref_id="925502" ref_url="https://bugzilla.suse.com/925502" source="BUGZILLA"/>
		<reference ref_id="995352" ref_url="https://bugzilla.suse.com/995352" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2775" ref_url="https://www.suse.com/security/cve/CVE-2015-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-6893" ref_url="https://www.suse.com/security/cve/CVE-2016-6893/" source="CVE"/>
		<reference ref_id="CVE-2018-0618" ref_url="https://www.suse.com/security/cve/CVE-2018-0618/" source="CVE"/>
		<reference ref_id="CVE-2018-13796" ref_url="https://www.suse.com/security/cve/CVE-2018-13796/" source="CVE"/>
		<reference ref_id="CVE-2018-5950" ref_url="https://www.suse.com/security/cve/CVE-2018-5950/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:

- Fixed a XSS vulnerability and information leak in user options CGI, which
  could be used to execute arbitrary scripts in the user's browser via
  specially encoded URLs (bsc#1077358 CVE-2018-5950)
- Fixed a directory traversal vulnerability in MTA transports when using the
  recommended Mailman Transport for Exim (bsc#925502 CVE-2015-2775)
- Fixed a XSS vulnerability, which allowed malicious listowners to inject
  scripts into the listinfo pages (bsc#1099510 CVE-2018-0618)
- Fixed arbitrary text injection vulnerability in several mailman CGIs
  (CVE-2018-13796 bsc#1101288)
- Fixed a CSRF vulnerability on the user options page (CVE-2016-6893 bsc#995352)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-04"/>
	<updated date="2019-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077358">SUSE bug 1077358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099510">SUSE bug 1099510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101288">SUSE bug 1101288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925502">SUSE bug 925502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995352">SUSE bug 995352</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-2775/">CVE-2015-2775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2775">CVE-2015-2775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6893/">CVE-2016-6893 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6893">CVE-2016-6893 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-0618/">CVE-2018-0618 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0618">CVE-2018-0618 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13796/">CVE-2018-13796 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13796">CVE-2018-13796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5950/">CVE-2018-5950 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5950">CVE-2018-5950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572630" comment="mailman-2.1.15-9.6.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217470" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1102416" ref_url="https://bugzilla.suse.com/1102416" source="BUGZILLA"/>
		<reference ref_id="997205" ref_url="https://bugzilla.suse.com/997205" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6893" ref_url="https://www.suse.com/security/cve/CVE-2016-6893/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:

Security issue fixed:

- CVE-2016-6893: Fixed a Cross-site request forgery vulnerability in the admin web interface (bsc#997205).

Following bug was fixed:

- Allow CSRF check to pass in mailman web frontend if the list
  name contains a '+' (bsc#1102416)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102416">SUSE bug 1102416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997205">SUSE bug 997205</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6893/">CVE-2016-6893 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6893">CVE-2016-6893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572631" comment="mailman-2.1.15-9.6.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217471" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1154328" ref_url="https://bugzilla.suse.com/1154328" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3693" ref_url="https://www.suse.com/security/cve/CVE-2019-3693/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:
	  
- CVE-2019-3693: Fixed a local privilege escalation from wwwrun to root (bsc#1154328).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154328">SUSE bug 1154328</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3693/">CVE-2019-3693 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3693">CVE-2019-3693 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572632" comment="mailman-2.1.15-9.6.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217472" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1167068" ref_url="https://bugzilla.suse.com/1167068" source="BUGZILLA"/>
		<reference ref_id="1170558" ref_url="https://bugzilla.suse.com/1170558" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12137" ref_url="https://www.suse.com/security/cve/CVE-2020-12137/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:

Security issue fixed:

- CVE-2020-12137: Fixed a XSS vulnerability caused by MIME type confusion (bsc#1170558).

Non-security issue fixed:

- Fixed rights and ownership on /var/lib/mailman/archives (bsc#1167068).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167068">SUSE bug 1167068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170558">SUSE bug 1170558</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12137/">CVE-2020-12137 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12137">CVE-2020-12137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572633" comment="mailman-2.1.15-9.6.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217473" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1171363" ref_url="https://bugzilla.suse.com/1171363" source="BUGZILLA"/>
		<reference ref_id="682920" ref_url="https://bugzilla.suse.com/682920" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12108" ref_url="https://www.suse.com/security/cve/CVE-2020-12108/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:

Security issue fixed:

- CVE-2020-12108: Fixed a content injection bug (bsc#1171363).

Non-security issue fixed:

- Don't default to invalid hosts for DEFAULT_EMAIL_HOST (bsc#682920).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171363">SUSE bug 1171363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682920">SUSE bug 682920</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12108/">CVE-2020-12108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12108">CVE-2020-12108 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572634" comment="mailman-2.1.15-9.6.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217474" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1173369" ref_url="https://bugzilla.suse.com/1173369" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15011" ref_url="https://www.suse.com/security/cve/CVE-2020-15011/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:

- CVE-2020-15011: Fixed a possible Arbitrary Content Injection via the private archive login page (bsc#1173369).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173369">SUSE bug 1173369</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15011/">CVE-2020-15011 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15011">CVE-2020-15011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572635" comment="mailman-2.1.15-9.6.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217475" version="1" class="patch">
	<metadata>
		<title>Recommended update for mailx</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="753340" ref_url="https://bugzilla.suse.com/753340" source="BUGZILLA"/>
		<reference ref_id="909208" ref_url="https://bugzilla.suse.com/909208" source="BUGZILLA"/>
		<reference ref_id="CVE-2004-2771" ref_url="https://www.suse.com/security/cve/CVE-2004-2771/" source="CVE"/>
		<reference ref_id="CVE-2014-7844" ref_url="https://www.suse.com/security/cve/CVE-2014-7844/" source="CVE"/>
		<description>

This update provides mailx 12.5, which provides the following fixes:

    * Better detection of base64 encoded text if acrossed a line
    * A null pointer dereference that lead to a segmentation fault when the
      user hit return at a yes/no question has been fixed
    * When both standard input and standard output refer to a terminal,
      ignore SIGPIPE
    * With the '-E' command line option or if the 'skipemptybody' variable
      is set, outgoing messages that contain no text in their first or only
      part are not sent but silently discarded.
    * When an attachment that would have a 'text/something' content type
      contains illegal byte sequences, it is now reliably sent out with the
      'application/octet-stream' content type instead
    * Fixed a bug that caused messages to be truncated with IMAP servers
      that use LF as line ending in message data, such as Google Mail
      (reported by Matthew L. Shobe).
    * Do not run filename expansion for IMAP or POP3 mailboxes names,
      making it possible to select mailboxes that contain both brackets and
      spaces in their names (reported by Matthew L. Shobe).
    * Fixed the format of the timezone in 'Date' header fields for zones in
      the Western Hemisphere whose offsets are not an integral number of
      hours (patch by Matthew Fischer).
    * Fixed a message corruption that occurred when the 'inc' command was
      used with a mbox format mailbox after encrypted messages had been
      viewed (reported by Martin Neitzel).
    * Fixed a condition that caused mailx to hang when looking at a
      message, copying that message, and issuing a 'z' command evaluating
      an uncached portion of an IMAP folder.
    * When the ORGANIZATION variable has an empty value, do not generate an
      'Organization:' header field. Previously, this condition resulted in
      mailx refusing to send mail

In addition, handling the encoding in non-UTF8 locales was improved 
(bnc#753340)

		</description>
<advisory from="security@suse.de">
	<issued date="2012-09-06"/>
	<updated date="2012-09-06"/>
	<bugzilla href="https://bugzilla.suse.com/753340">SUSE bug 753340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909208">SUSE bug 909208</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2004-2771/">CVE-2004-2771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-2771">CVE-2004-2771 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-7844/">CVE-2014-7844 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7844">CVE-2014-7844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992245" comment="mailx-12.5-1.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217476" version="1" class="patch">
	<metadata>
		<title>Recommended update for man-pages</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="470005" ref_url="https://bugzilla.suse.com/470005" source="BUGZILLA"/>
		<reference ref_id="707484" ref_url="https://bugzilla.suse.com/707484" source="BUGZILLA"/>
		<reference ref_id="707487" ref_url="https://bugzilla.suse.com/707487" source="BUGZILLA"/>
		<reference ref_id="713389" ref_url="https://bugzilla.suse.com/713389" source="BUGZILLA"/>
		<reference ref_id="742607" ref_url="https://bugzilla.suse.com/742607" source="BUGZILLA"/>
		<reference ref_id="753103" ref_url="https://bugzilla.suse.com/753103" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<description>

This update to man-pages improves the open(2) man page to describe in more 
detail a race condition that can occur between the fork() system call and 
direct I/O operations.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-05-21"/>
	<updated date="2012-05-21"/>
	<bugzilla href="https://bugzilla.suse.com/470005">SUSE bug 470005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/707484">SUSE bug 707484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/707487">SUSE bug 707487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/713389">SUSE bug 713389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742607">SUSE bug 742607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/753103">SUSE bug 753103</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2483">CVE-2011-2483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992246" comment="man-pages-3.15-2.20.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217477" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1000751" ref_url="https://bugzilla.suse.com/1000751" source="BUGZILLA"/>
		<reference ref_id="1009026" ref_url="https://bugzilla.suse.com/1009026" source="BUGZILLA"/>
		<reference ref_id="1010395" ref_url="https://bugzilla.suse.com/1010395" source="BUGZILLA"/>
		<reference ref_id="1010401" ref_url="https://bugzilla.suse.com/1010401" source="BUGZILLA"/>
		<reference ref_id="1010402" ref_url="https://bugzilla.suse.com/1010402" source="BUGZILLA"/>
		<reference ref_id="1010404" ref_url="https://bugzilla.suse.com/1010404" source="BUGZILLA"/>
		<reference ref_id="1010410" ref_url="https://bugzilla.suse.com/1010410" source="BUGZILLA"/>
		<reference ref_id="1010422" ref_url="https://bugzilla.suse.com/1010422" source="BUGZILLA"/>
		<reference ref_id="1010427" ref_url="https://bugzilla.suse.com/1010427" source="BUGZILLA"/>
		<reference ref_id="1010517" ref_url="https://bugzilla.suse.com/1010517" source="BUGZILLA"/>
		<reference ref_id="1012964" ref_url="https://bugzilla.suse.com/1012964" source="BUGZILLA"/>
		<reference ref_id="992549" ref_url="https://bugzilla.suse.com/992549" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5285" ref_url="https://www.suse.com/security/cve/CVE-2016-5285/" source="CVE"/>
		<reference ref_id="CVE-2016-5290" ref_url="https://www.suse.com/security/cve/CVE-2016-5290/" source="CVE"/>
		<reference ref_id="CVE-2016-5291" ref_url="https://www.suse.com/security/cve/CVE-2016-5291/" source="CVE"/>
		<reference ref_id="CVE-2016-5296" ref_url="https://www.suse.com/security/cve/CVE-2016-5296/" source="CVE"/>
		<reference ref_id="CVE-2016-5297" ref_url="https://www.suse.com/security/cve/CVE-2016-5297/" source="CVE"/>
		<reference ref_id="CVE-2016-9064" ref_url="https://www.suse.com/security/cve/CVE-2016-9064/" source="CVE"/>
		<reference ref_id="CVE-2016-9066" ref_url="https://www.suse.com/security/cve/CVE-2016-9066/" source="CVE"/>
		<reference ref_id="CVE-2016-9074" ref_url="https://www.suse.com/security/cve/CVE-2016-9074/" source="CVE"/>
		<reference ref_id="CVE-2016-9079" ref_url="https://www.suse.com/security/cve/CVE-2016-9079/" source="CVE"/>
		<description>
This update for MozillaFirefox, mozilla-nss fixes security issues and bugs.

The following vulnerabilities were fixed in Firefox ESR 45.5.1 (bsc#1009026):

- CVE-2016-9079: Use-after-free in SVG Animation (bsc#1012964 MFSA 2016-92)
- CVE-2016-5297: Incorrect argument length checking in Javascript (bsc#1010401)
- CVE-2016-9066: Integer overflow leading to a buffer overflow in nsScriptLoadHandler (bsc#1010404)
- CVE-2016-5296: Heap-buffer-overflow WRITE in rasterize_edges_1 (bsc#1010395)
- CVE-2016-9064: Addons update must verify IDs match between current and new versions (bsc#1010402)
- CVE-2016-5290: Memory safety bugs fixed in Firefox 50 and Firefox ESR 45.5 (bsc#1010427)
- CVE-2016-5291: Same-origin policy violation using local HTML file and saved shortcut file (bsc#1010410)

The following vulnerabilities were fixed in mozilla-nss 3.21.3:

- CVE-2016-9074: Insufficient timing side-channel resistance in divSpoiler (bsc#1010422)
- CVE-2016-5285: Missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime causes server crash (bsc#1010517)

The following bugs were fixed:

- Firefox would fail to go into fullscreen mode with some window managers (bsc#992549)
- font warning messages would flood console, now using fontconfig configuration from
  firefox-fontconfig instead of the system one (bsc#1000751)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-13"/>
	<updated date="2016-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000751">SUSE bug 1000751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010395">SUSE bug 1010395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010401">SUSE bug 1010401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010402">SUSE bug 1010402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010404">SUSE bug 1010404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010410">SUSE bug 1010410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010422">SUSE bug 1010422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010427">SUSE bug 1010427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010517">SUSE bug 1010517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012964">SUSE bug 1012964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992549">SUSE bug 992549</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5285/">CVE-2016-5285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5285">CVE-2016-5285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5290/">CVE-2016-5290 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5290">CVE-2016-5290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5291/">CVE-2016-5291 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5291">CVE-2016-5291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5296/">CVE-2016-5296 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5296">CVE-2016-5296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5297/">CVE-2016-5297 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5297">CVE-2016-5297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9064/">CVE-2016-9064 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9064">CVE-2016-9064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9066/">CVE-2016-9066 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9066">CVE-2016-9066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9074/">CVE-2016-9074 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9074">CVE-2016-9074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9079/">CVE-2016-9079 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9079">CVE-2016-9079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572636" comment="MozillaFirefox-45.5.1esr-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572637" comment="MozillaFirefox-translations-45.5.1esr-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572638" comment="libfreebl3-3.21.3-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572639" comment="libfreebl3-32bit-3.21.3-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572640" comment="mozilla-nss-3.21.3-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572641" comment="mozilla-nss-32bit-3.21.3-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572642" comment="mozilla-nss-tools-3.21.3-30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217478" version="1" class="patch">
	<metadata>
		<title>Security update for mgetty (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1108752" ref_url="https://bugzilla.suse.com/1108752" source="BUGZILLA"/>
		<reference ref_id="1108756" ref_url="https://bugzilla.suse.com/1108756" source="BUGZILLA"/>
		<reference ref_id="1108757" ref_url="https://bugzilla.suse.com/1108757" source="BUGZILLA"/>
		<reference ref_id="1108761" ref_url="https://bugzilla.suse.com/1108761" source="BUGZILLA"/>
		<reference ref_id="1108762" ref_url="https://bugzilla.suse.com/1108762" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16741" ref_url="https://www.suse.com/security/cve/CVE-2018-16741/" source="CVE"/>
		<reference ref_id="CVE-2018-16742" ref_url="https://www.suse.com/security/cve/CVE-2018-16742/" source="CVE"/>
		<reference ref_id="CVE-2018-16743" ref_url="https://www.suse.com/security/cve/CVE-2018-16743/" source="CVE"/>
		<reference ref_id="CVE-2018-16744" ref_url="https://www.suse.com/security/cve/CVE-2018-16744/" source="CVE"/>
		<reference ref_id="CVE-2018-16745" ref_url="https://www.suse.com/security/cve/CVE-2018-16745/" source="CVE"/>
		<description>
This update for mgetty fixes the following issues:

- CVE-2018-16741: The function do_activate() did not properly sanitize shell
  metacharacters to prevent command injection (bsc#1108752)
- CVE-2018-16745: The mail_to parameter was not sanitized, leading to a buffer
  overflow if long untrusted input reached it (bsc#1108756)
- CVE-2018-16744: The mail_to parameter was not sanitized, leading to command
  injection if untrusted input reached reach it (bsc#1108757)
- CVE-2018-16742: Prevent stack-based buffer overflow that could have been
  triggered via a command-line parameter (bsc#1108762)
- CVE-2018-16743: The command-line parameter username wsa passed unsanitized to
  strcpy(), which could have caused a stack-based buffer overflow (bsc#1108761)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-25"/>
	<updated date="2018-09-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1108752">SUSE bug 1108752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108756">SUSE bug 1108756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108757">SUSE bug 1108757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108761">SUSE bug 1108761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108762">SUSE bug 1108762</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16741/">CVE-2018-16741 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16741">CVE-2018-16741 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16742/">CVE-2018-16742 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16742">CVE-2018-16742 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16743/">CVE-2018-16743 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16743">CVE-2018-16743 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16744/">CVE-2018-16744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16744">CVE-2018-16744 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16745/">CVE-2018-16745 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16745">CVE-2018-16745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572643" comment="g3utils-1.1.36-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572644" comment="mgetty-1.1.36-28.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217479" version="1" class="patch">
	<metadata>
		<title>Security update for mgetty (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1142770" ref_url="https://bugzilla.suse.com/1142770" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010190" ref_url="https://www.suse.com/security/cve/CVE-2019-1010190/" source="CVE"/>
		<description>
This update for mgetty fixes the following issues:

- CVE-2019-1010190: Fixed a denial of service which could be caused by a local attacker in putwhitespan() (bsc#1142770).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-08"/>
	<updated date="2020-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1142770">SUSE bug 1142770</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010190/">CVE-2019-1010190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010190">CVE-2019-1010190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572645" comment="g3utils-1.1.36-28.6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572646" comment="mgetty-1.1.36-28.6.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217480" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<description>
This update for microcode_ctl fixes the following issues:

This new firmware disables branch prediction on AMD family 17h
processor.

Also the CPU microcode for Intel Haswell-X, Skylake-X and Broadwell-X chipsets
was updated to report both branch prediction control via CPUID flag and
ability to control branch prediction via an MSR register.

This update is part of a mitigation for a branch predictor based
information disclosure attack, and needs additional code in the Linux
Kernel to be active (bsc#1068032 CVE-2017-5715)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-10"/>
	<updated date="2018-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572647" comment="microcode_ctl-1.17-102.57.64.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217481" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1075262" ref_url="https://bugzilla.suse.com/1075262" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<description>


Update to Intel CPU Microcode version 20180108 (bsc#1075262 CVE-2017-5715)

- The pre-released microcode fixing some important security issues
  is now officially published (and included in the added tarball).

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-11"/>
	<updated date="2018-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1075262">SUSE bug 1075262</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572648" comment="microcode_ctl-1.17-102.57.64.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217482" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1085207" ref_url="https://bugzilla.suse.com/1085207" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<description>

  
This update for ucode-intel fixes the following issues:

The Intel CPU microcode version was updated to version 20180312.

This update enables the IBPB+IBRS based mitigations of the Spectre v2 flaws (boo#1085207 CVE-2017-5715)

- New Platforms

  - BDX-DE EGW A0 6-56-5:10 e000009
  - SKX B1 6-55-3:97 1000140

- Updates

  - SNB D2 6-2a-7:12 29-&gt;2d
  - JKT C1 6-2d-6:6d 619-&gt;61c
  - JKT C2 6-2d-7:6d 710-&gt;713
  - IVB E2 6-3a-9:12 1c-&gt;1f
  - IVT C0 6-3e-4:ed 428-&gt;42c
  - IVT D1 6-3e-7:ed 70d-&gt;713
  - HSW Cx/Dx 6-3c-3:32 22-&gt;24
  - HSW-ULT Cx/Dx 6-45-1:72 20-&gt;23
  - CRW Cx 6-46-1:32 17-&gt;19
  - HSX C0 6-3f-2:6f 3a-&gt;3c
  - HSX-EX E0 6-3f-4:80 0f-&gt;11
  - BDW-U/Y E/F 6-3d-4:c0 25-&gt;2a
  - BDW-H E/G 6-47-1:22 17-&gt;1d
  - BDX-DE V0/V1 6-56-2:10 0f-&gt;15
  - BDW-DE V2 6-56-3:10 700000d-&gt;7000012
  - BDW-DE Y0 6-56-4:10 f00000a-&gt;f000011
  - SKL-U/Y D0 6-4e-3:c0 ba-&gt;c2
  - SKL R0 6-5e-3:36 ba-&gt;c2
  - KBL-U/Y H0 6-8e-9:c0 62-&gt;84
  - KBL B0 6-9e-9:2a 5e-&gt;84
  - CFL D0 6-8e-a:c0 70-&gt;84
  - CFL U0 6-9e-a:22 70-&gt;84
  - CFL B0 6-9e-b:02 72-&gt;84
  - SKX H0 6-55-4:b7 2000035-&gt;2000043

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-16"/>
	<updated date="2018-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085207">SUSE bug 1085207</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572649" comment="microcode_ctl-1.17-102.57.64.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217483" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1095735" ref_url="https://bugzilla.suse.com/1095735" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<description>
This update for microcode_ctl fixes the following security issue:

- CVE-2017-5715: Prevent unauthorized disclosure of information to an attacker
  with local user access caused by speculative execution and indirect branch
  prediction (bsc#1095735)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-19"/>
	<updated date="2018-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1095735">SUSE bug 1095735</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572650" comment="microcode_ctl-1.17-102.57.64.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217484" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087083" ref_url="https://bugzilla.suse.com/1087083" source="BUGZILLA"/>
		<reference ref_id="1100147" ref_url="https://bugzilla.suse.com/1100147" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<description>


This update for microcode_ctl fixes the following issues:

The Intel CPU Microcode bundle was updated to the 20180703 release

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a) and
helps mitigating CVE-2018-3639 (Spectre v4)  (bsc#1100147 bsc#1087082 bsc#1087083)

More details can be found on:

  https://downloadcenter.intel.com/download/27945/Linux-Processor-Microcode-Data-File

Following chipsets are fixed in this round:

Model        Stepping F-MO-S/PI      Old-&gt;New
---- updated platforms ------------------------------------
SNB-EP       C1       6-2d-6/6d 0000061c-&gt;0000061d Xeon E5
SNB-EP       C2       6-2d-7/6d 00000713-&gt;00000714 Xeon E5
IVT          C0       6-3e-4/ed 0000042c-&gt;0000042d Xeon E5 v2; Core i7-4960X/4930K/4820K
IVT          D1       6-3e-7/ed 00000713-&gt;00000714 Xeon E5 v2
HSX-E/EP/4S  C0       6-3f-2/6f 0000003c-&gt;0000003d Xeon E5 v3
HSX-EX       E0       6-3f-4/80 00000011-&gt;00000012 Xeon E7 v3
SKX-SP/D/W/X H0       6-55-4/b7 02000043-&gt;0200004d Xeon Bronze 31xx, Silver 41xx, Gold 51xx/61xx Platinum 81xx, D/W-21xx; Core i9-7xxxX
BDX-DE       A1       6-56-5/10 0e000009-&gt;0e00000a Xeon D-15x3N
BDX-ML       B/M/R0   6-4f-1/ef 0b00002c-&gt;0b00002e Xeon E5/E7 v4; Core i7-69xx/68xx
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-06"/>
	<updated date="2018-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100147">SUSE bug 1100147</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3640">CVE-2018-3640 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572651" comment="microcode_ctl-1.17-102.57.64.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217485" version="1" class="patch">
	<metadata>
		<title>Security update to ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087083" ref_url="https://bugzilla.suse.com/1087083" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1104134" ref_url="https://bugzilla.suse.com/1104134" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<description>

ucode-intel was updated to the 20180807 release.

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a)
and is also part of the mitigations for CVE-2018-3639 (Spectre v4)
and CVE-2018-3646 (L1 Terminal Fault).
(bsc#1104134 bsc#1087082 bsc#1087083 bsc#1089343)

 Processor             Identifier     Version       Products

 Model        Stepping F-MO-S/PI      Old-&gt;New

 ---- new platforms ----------------------------------------
 WSM-EP/WS    U1       6-2c-2/03           0000001f Xeon E/L/X56xx, W36xx
 NHM-EX       D0       6-2e-6/04           0000000d Xeon E/L/X65xx/75xx
 BXT          C0       6-5c-2/01           00000014 Atom T5500/5700
 APL          E0       6-5c-a/03           0000000c Atom x5-E39xx
 DVN          B0       6-5f-1/01           00000024 Atom C3xxx
 ---- updated platforms ------------------------------------
 NHM-EP/WS    D0       6-1a-5/03 00000019-&gt;0000001d Xeon E/L/X/W55xx
 NHM          B1       6-1e-5/13 00000007-&gt;0000000a Core i7-8xx, i5-7xx; Xeon L3426, X24xx
 WSM          B1       6-25-2/12 0000000e-&gt;00000011 Core i7-6xx, i5-6xx/4xxM, i3-5xx/3xxM, Pentium G69xx, Celeon P45xx; Xeon L3406
 WSM          K0       6-25-5/92 00000004-&gt;00000007 Core i7-6xx, i5-6xx/5xx/4xx, i3-5xx/3xx, Pentium G69xx/P6xxx/U5xxx, Celeron P4xxx/U3xxx
 SNB          D2       6-2a-7/12 0000002d-&gt;0000002e Core Gen2; Xeon E3
 WSM-EX       A2       6-2f-2/05 00000037-&gt;0000003b Xeon E7
 IVB          E2       6-3a-9/12 0000001f-&gt;00000020 Core Gen3 Mobile
 HSW-H/S/E3   Cx/Dx    6-3c-3/32 00000024-&gt;00000025 Core Gen4 Desktop; Xeon E3 v3
 BDW-U/Y      E/F      6-3d-4/c0 0000002a-&gt;0000002b Core Gen5 Mobile
 HSW-ULT      Cx/Dx    6-45-1/72 00000023-&gt;00000024 Core Gen4 Mobile and derived Pentium/Celeron
 HSW-H        Cx       6-46-1/32 00000019-&gt;0000001a Core Extreme i7-5xxxX
 BDW-H/E3     E/G      6-47-1/22 0000001d-&gt;0000001e Core i5-5xxxR/C, i7-5xxxHQ/EQ; Xeon E3 v4
 SKL-U/Y      D0       6-4e-3/c0 000000c2-&gt;000000c6 Core Gen6 Mobile
 BDX-DE       V1       6-56-2/10 00000015-&gt;00000017 Xeon D-1520/40
 BDX-DE       V2/3     6-56-3/10 07000012-&gt;07000013 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
 BDX-DE       Y0       6-56-4/10 0f000011-&gt;0f000012 Xeon D-1557/59/67/71/77/81/87
 APL          D0       6-5c-9/03 0000002c-&gt;00000032 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
 SKL-H/S/E3   R0       6-5e-3/36 000000c2-&gt;000000c6 Core Gen6; Xeon E3 v5
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104134">SUSE bug 1104134</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3640">CVE-2018-3640 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3646">CVE-2018-3646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572652" comment="microcode_ctl-1.17-102.57.64.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217486" version="1" class="patch">
	<metadata>
		<title>Security update for minicom (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1033783" ref_url="https://bugzilla.suse.com/1033783" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7467" ref_url="https://www.suse.com/security/cve/CVE-2017-7467/" source="CVE"/>
		<description>

This update for minicom fixes the following issues:

- CVE-2017-7467: Invalid cursor coordinates and scroll regions could lead to code 
  execution (bsc#1033783)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-28"/>
	<updated date="2017-04-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033783">SUSE bug 1033783</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7467/">CVE-2017-7467 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7467">CVE-2017-7467 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572653" comment="minicom-2.3-27.24.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217487" version="1" class="patch">
	<metadata>
		<title>Security update for mipv6d</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="424311" ref_url="https://bugzilla.suse.com/424311" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2522" ref_url="https://www.suse.com/security/cve/CVE-2010-2522/" source="CVE"/>
		<reference ref_id="CVE-2010-2523" ref_url="https://www.suse.com/security/cve/CVE-2010-2523/" source="CVE"/>
		<description>

The following issues have been fixed:

    * the mipv6 daemon did not check the origin of netlink messages,
      therefore allowing local users to spoof messages (CVE-2010-2522).
    * remote attackers could cause buffer overflows in mipv6d
      (CVE-2010-2523).

Security Issues references:

    * CVE-2010-2522
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2522&gt;
    * CVE-2010-2523
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2523&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-09-01"/>
	<updated date="2010-09-01"/>
	<bugzilla href="https://bugzilla.suse.com/424311">SUSE bug 424311</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2522/">CVE-2010-2522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2522">CVE-2010-2522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2523/">CVE-2010-2523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2523">CVE-2010-2523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992247" comment="mipv6d-2.0.2-2.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217488" version="1" class="patch">
	<metadata>
		<title>Security update for mono-core (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="739119" ref_url="https://bugzilla.suse.com/739119" source="BUGZILLA"/>
		<reference ref_id="958097" ref_url="https://bugzilla.suse.com/958097" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2012-3543" ref_url="https://www.suse.com/security/cve/CVE-2012-3543/" source="CVE"/>
		<description>

mono-core was updated to fix the following vulnerabilities:

- CVE-2009-0689: Remote attackers could cause a denial of service and possibly arbitrary code execution through the string-to-double parser implementation (bsc#958097)
- CVE-2012-3543: Remote attackers could cause a denial of service through increased CPU consumption due to lack of protection against predictable hash collisions when processing form parameters (bsc#739119)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-27"/>
	<updated date="2016-01-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/739119">SUSE bug 739119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958097">SUSE bug 958097</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0689">CVE-2009-0689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3543/">CVE-2012-3543 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-3543">CVE-2012-3543 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572654" comment="mono-core-2.0.1-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572655" comment="mono-data-2.0.1-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572656" comment="mono-data-postgresql-2.0.1-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572657" comment="mono-data-sqlite-2.0.1-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572658" comment="mono-locale-extras-2.0.1-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572659" comment="mono-nunit-2.0.1-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572660" comment="mono-web-2.0.1-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572661" comment="mono-winforms-2.0.1-1.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217489" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLED, MozillaFirefox-branding-SLES-for-VMware, mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="954447" ref_url="https://bugzilla.suse.com/954447" source="BUGZILLA"/>
		<reference ref_id="959888" ref_url="https://bugzilla.suse.com/959888" source="BUGZILLA"/>
		<reference ref_id="963520" ref_url="https://bugzilla.suse.com/963520" source="BUGZILLA"/>
		<reference ref_id="963632" ref_url="https://bugzilla.suse.com/963632" source="BUGZILLA"/>
		<reference ref_id="963635" ref_url="https://bugzilla.suse.com/963635" source="BUGZILLA"/>
		<reference ref_id="963731" ref_url="https://bugzilla.suse.com/963731" source="BUGZILLA"/>
		<reference ref_id="967087" ref_url="https://bugzilla.suse.com/967087" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523/" source="CVE"/>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<reference ref_id="CVE-2016-1938" ref_url="https://www.suse.com/security/cve/CVE-2016-1938/" source="CVE"/>
		<description>

This update for MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nss fixes the following issues: 

Firefox 38.6.1 ESR (bsc#967087)

The following vulnerabilities were fixed:

- CVE-2016-1523: Fixed denial of service in Graphite 2 library (MFSA 2016-14/bmo#1246093)

Firefox 38.6.0 ESR + Mozilla NSS 3.20.2. (bsc#963520)

The following vulnerabilities were fixed:

- CVE-2016-1930: Memory safety bugs fixed in Firefox ESR 38.6 (bsc#963632)
- CVE-2016-1935: Buffer overflow in WebGL after out of memory allocation (bsc#963635)
- CVE-2016-1938: Calculations with mp_div and mp_exptmod in Network Security Services (NSS) canproduce wrong results (bsc#963731)
- CVE-2015-7575: MD5 signatures accepted within TLS 1.2 ServerKeyExchange in server signature (bsc#959888)

The following improvements were added:

- bsc#954447: Mozilla NSS now supports a number of new DHE ciphersuites
- Tracking protection is now enabled by default
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-25"/>
	<updated date="2016-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954447">SUSE bug 954447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959888">SUSE bug 959888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963520">SUSE bug 963520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963632">SUSE bug 963632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963635">SUSE bug 963635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963731">SUSE bug 963731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967087">SUSE bug 967087</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1523">CVE-2016-1523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1930">CVE-2016-1930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1935">CVE-2016-1935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1938/">CVE-2016-1938 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1938">CVE-2016-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572662" comment="MozillaFirefox-38.6.1esr-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572663" comment="MozillaFirefox-branding-SLED-38-15.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572664" comment="MozillaFirefox-translations-38.6.1esr-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572665" comment="libfreebl3-3.20.2-17.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572666" comment="libfreebl3-32bit-3.20.2-17.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572667" comment="mozilla-nss-3.20.2-17.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572668" comment="mozilla-nss-32bit-3.20.2-17.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572669" comment="mozilla-nss-tools-3.20.2-17.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217490" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="935033" ref_url="https://bugzilla.suse.com/935033" source="BUGZILLA"/>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="940806" ref_url="https://bugzilla.suse.com/940806" source="BUGZILLA"/>
		<reference ref_id="940918" ref_url="https://bugzilla.suse.com/940918" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4474" ref_url="https://www.suse.com/security/cve/CVE-2015-4474/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox is being updated to the current Firefox 38ESR branch (specifically the 38.2.0ESR release).

Security issues fixed:
- MFSA 2015-78 / CVE-2015-4495: Same origin violation and local file stealing via PDF reader
- MFSA 2015-79 / CVE-2015-4473/CVE-2015-4474: Miscellaneous memory safety hazards (rv:40.0 / rv:38.2)
- MFSA 2015-80 / CVE-2015-4475: Out-of-bounds read with malformed MP3 file
- MFSA 2015-82 / CVE-2015-4478: Redefinition of non-configurable JavaScript object properties
- MFSA 2015-83 / CVE-2015-4479: Overflow issues in libstagefright
- MFSA 2015-87 / CVE-2015-4484: Crash when using shared memory in JavaScript
- MFSA 2015-88 / CVE-2015-4491: Heap overflow in gdk-pixbuf when scaling bitmap images
- MFSA 2015-89 / CVE-2015-4485/CVE-2015-4486: Buffer overflows on Libvpx when decoding WebM video
- MFSA 2015-90 / CVE-2015-4487/CVE-2015-4488/CVE-2015-4489: Vulnerabilities found through code inspection
- MFSA 2015-92 / CVE-2015-4492: Use-after-free in XMLHttpRequest with shared workers

The following vulnerabilities were fixed in ESR31 and are also included here:
- CVE-2015-2724/CVE-2015-2725/CVE-2015-2726: Miscellaneous memory safety hazards (bsc#935979).
- CVE-2015-2728: Type confusion in Indexed Database Manager (bsc#935979).
- CVE-2015-2730: ECDSA signature validation fails to handle some signatures correctly (bsc#935979).
- CVE-2015-2722/CVE-2015-2733: Use-after-free in workers while using XMLHttpRequest (bsc#935979).
- CVE-2015-2734/CVE-2015-2735/CVE-2015-2736/CVE-2015-2737/CVE-2015-2738/CVE-2015-2739/CVE-2015-2740: Vulnerabilities found through code inspection (bsc#935979).
- CVE-2015-2743: Privilege escalation in PDF.js (bsc#935979).
- CVE-2015-4000: NSS accepts export-length DHE keys with regular DHE cipher suites (bsc#935033).
- CVE-2015-2721: NSS incorrectly permits skipping of ServerKeyExchange (bsc#935979).

This update also contains a lot of feature improvements and bug fixes from 31ESR to 38ESR.

Also the Mozilla NSS library switched its CKBI API from 1.98 to 2.4, which is what Firefox 38ESR uses.

Mozilla Firefox and mozilla-nss were updated to fix 17 security issues.

		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-25"/>
	<updated date="2015-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/935033">SUSE bug 935033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940918">SUSE bug 940918</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2721">CVE-2015-2721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2722">CVE-2015-2722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2724">CVE-2015-2724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2725">CVE-2015-2725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2726">CVE-2015-2726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2728">CVE-2015-2728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2730">CVE-2015-2730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2733">CVE-2015-2733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2734">CVE-2015-2734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2735">CVE-2015-2735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2736">CVE-2015-2736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2737">CVE-2015-2737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2738">CVE-2015-2738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2739">CVE-2015-2739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2740">CVE-2015-2740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2743">CVE-2015-2743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4473">CVE-2015-4473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4474/">CVE-2015-4474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4474">CVE-2015-4474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4475">CVE-2015-4475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4478">CVE-2015-4478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4479">CVE-2015-4479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4484">CVE-2015-4484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4485">CVE-2015-4485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4486">CVE-2015-4486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4487">CVE-2015-4487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4488">CVE-2015-4488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4489">CVE-2015-4489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4491">CVE-2015-4491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4492">CVE-2015-4492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4495">CVE-2015-4495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572670" comment="MozillaFirefox-38.2.0esr-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572671" comment="MozillaFirefox-branding-SLED-31.0-0.5.7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572672" comment="MozillaFirefox-translations-38.2.0esr-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572673" comment="firefox-libgcc_s1-4.7.2_20130108-0.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572674" comment="firefox-libstdc++6-4.7.2_20130108-0.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572675" comment="libfreebl3-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572676" comment="libfreebl3-32bit-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572677" comment="mozilla-nss-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572678" comment="mozilla-nss-32bit-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572679" comment="mozilla-nss-devel-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572680" comment="mozilla-nss-tools-3.19.2.0-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572670" comment="MozillaFirefox-38.2.0esr-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572671" comment="MozillaFirefox-branding-SLED-31.0-0.5.7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572672" comment="MozillaFirefox-translations-38.2.0esr-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572673" comment="firefox-libgcc_s1-4.7.2_20130108-0.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572674" comment="firefox-libstdc++6-4.7.2_20130108-0.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572675" comment="libfreebl3-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572676" comment="libfreebl3-32bit-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572677" comment="mozilla-nss-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572678" comment="mozilla-nss-32bit-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572679" comment="mozilla-nss-devel-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572680" comment="mozilla-nss-tools-3.19.2.0-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217491" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2015:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001554.html" source="SUSE-SU"/>
		<description>
mozilla-nspr was update to version 4.10.8		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-14"/>
	<updated date="2015-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572681" comment="mozilla-nspr-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572682" comment="mozilla-nspr-32bit-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572683" comment="mozilla-nspr-devel-4.10.8-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572681" comment="mozilla-nspr-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572682" comment="mozilla-nspr-32bit-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572683" comment="mozilla-nspr-devel-4.10.8-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217492" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1193170" ref_url="https://bugzilla.suse.com/1193170" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<description>
This update for mozilla-nss fixes the following issues:

Update to version 3.68.1:

- CVE-2021-43527: Fixed a Heap overflow in NSS when verifying DER-encoded DSA or RSA-PSS signatures (bsc#1193170).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193170">SUSE bug 1193170</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659163" comment="libfreebl3-3.68.1-38.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659164" comment="libfreebl3-32bit-3.68.1-38.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659165" comment="libsoftokn3-3.68.1-38.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659166" comment="libsoftokn3-32bit-3.68.1-38.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659167" comment="mozilla-nss-3.68.1-38.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659168" comment="mozilla-nss-32bit-3.68.1-38.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659169" comment="mozilla-nss-certs-3.68.1-38.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659170" comment="mozilla-nss-certs-32bit-3.68.1-38.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659171" comment="mozilla-nss-tools-3.68.1-38.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217493" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla NSS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="847708" ref_url="https://bugzilla.suse.com/847708" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<description>

Mozilla NSS has been updated to 3.15.2 (bnc#847708) bringing various 
features and bugfixes:

The main feature is TLS 1.2 support and its dependend algorithms.

    * Support for AES-GCM cipher suites that use the SHA-256 PRF
    * MD2, MD4, and MD5 signatures are no longer accepted for OCSP or CRLs
    * Add PK11_CipherFinal macro
    * sizeof() used incorrectly
    * nssutil_ReadSecmodDB() leaks memory
    * Allow SSL_HandshakeNegotiatedExtension to be called before the
      handshake is finished.
    * Deprecate the SSL cipher policy code
    * Avoid uninitialized data read in the event of a decryption failure.
      (CVE-2013-1739)

Changes coming with version 3.15.1:

    * TLS 1.2 (RFC 5246) is supported. HMAC-SHA256 cipher suites (RFC 5246
      and RFC 5289) are supported, allowing TLS to be used without MD5 and
      SHA-1.
      Note the following limitations:
      The hash function used in the signature for TLS 1.2 client
      authentication must be the hash function of the TLS 1.2 PRF, which is
      always SHA-256 in NSS 3.15.1.
      AES GCM cipher suites are not yet supported.
          o some bugfixes and improvements

Changes with version 3.15

    * New Functionality
          o Support for OCSP Stapling (RFC 6066, Certificate Status
            Request) has been added for both client and server sockets. TLS
            client applications may enable this via a call to
            SSL_OptionSetDefault(SSL_ENABLE_OCSP_STAPLING, PR_TRUE);
          o Added function SECITEM_ReallocItemV2. It replaces function
            SECITEM_ReallocItem, which is now declared as obsolete.
          o Support for single-operation (eg: not multi-part) symmetric key
            encryption and decryption, via PK11_Encrypt and PK11_Decrypt.
          o certutil has been updated to support creating name constraints
            extensions.

Mozilla NSPR was updated to 4.10.1 bringing api additions and bugfixes.

Security Issue reference:

    * CVE-2013-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-29"/>
	<updated date="2013-10-29"/>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1739">CVE-2013-1739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572684" comment="libfreebl3-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572685" comment="libfreebl3-32bit-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572686" comment="mozilla-nspr-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572687" comment="mozilla-nspr-32bit-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572688" comment="mozilla-nss-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572689" comment="mozilla-nss-32bit-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572690" comment="mozilla-nss-tools-3.15.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572684" comment="libfreebl3-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572685" comment="libfreebl3-32bit-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572686" comment="mozilla-nspr-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572687" comment="mozilla-nspr-32bit-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572688" comment="mozilla-nss-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572689" comment="mozilla-nss-32bit-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572690" comment="mozilla-nss-tools-3.15.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217494" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1141322" ref_url="https://bugzilla.suse.com/1141322" source="BUGZILLA"/>
		<reference ref_id="1158527" ref_url="https://bugzilla.suse.com/1158527" source="BUGZILLA"/>
		<reference ref_id="1159819" ref_url="https://bugzilla.suse.com/1159819" source="BUGZILLA"/>
		<reference ref_id="1168669" ref_url="https://bugzilla.suse.com/1168669" source="BUGZILLA"/>
		<reference ref_id="1169746" ref_url="https://bugzilla.suse.com/1169746" source="BUGZILLA"/>
		<reference ref_id="1170908" ref_url="https://bugzilla.suse.com/1170908" source="BUGZILLA"/>
		<reference ref_id="1171978" ref_url="https://bugzilla.suse.com/1171978" source="BUGZILLA"/>
		<reference ref_id="1173032" ref_url="https://bugzilla.suse.com/1173032" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="CVE-2020-12399" ref_url="https://www.suse.com/security/cve/CVE-2020-12399/" source="CVE"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to version 3.53.1

- CVE-2019-11745: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate
- CVE-2020-12402: Fixed a potential side channel attack during RSA key generation (bsc#1173032).
- CVE-2020-12399: Fixed a timing attack on DSA signature generation (bsc#1171978).
- CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
- CVE-2019-11727: A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages.
- Fixed various FIPS issues in libfreebl3 which were causing segfaults in the test suite of chrony (bsc#1168669).
- Fixed an issue where Firefox tab was crashing (bsc#1170908).

Release notes: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53_release_notes

mozilla-nspr was updated to version 4.25.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141322">SUSE bug 1141322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158527">SUSE bug 1158527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168669">SUSE bug 1168669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169746">SUSE bug 1169746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170908">SUSE bug 1170908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171978">SUSE bug 1171978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173032">SUSE bug 1173032</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11727">CVE-2019-11727 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11745">CVE-2019-11745 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17006">CVE-2019-17006 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12399/">CVE-2020-12399 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12399">CVE-2020-12399 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12402">CVE-2020-12402 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572691" comment="libfreebl3-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572692" comment="libfreebl3-32bit-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572693" comment="libsoftokn3-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572694" comment="libsoftokn3-32bit-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572695" comment="mozilla-nspr-4.25-29.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572696" comment="mozilla-nspr-32bit-4.25-29.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572697" comment="mozilla-nss-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572698" comment="mozilla-nss-32bit-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572699" comment="mozilla-nss-certs-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572700" comment="mozilla-nss-certs-32bit-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572701" comment="mozilla-nss-tools-3.53.1-38.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217495" version="1" class="patch">
	<metadata>
		<title>Recommended update for mozilla-nspr, mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1029961" ref_url="https://bugzilla.suse.com/1029961" source="BUGZILLA"/>
		<reference ref_id="1174697" ref_url="https://bugzilla.suse.com/1174697" source="BUGZILLA"/>
		<reference ref_id="1176206" ref_url="https://bugzilla.suse.com/1176206" source="BUGZILLA"/>
		<reference ref_id="1176934" ref_url="https://bugzilla.suse.com/1176934" source="BUGZILLA"/>
		<reference ref_id="1179382" ref_url="https://bugzilla.suse.com/1179382" source="BUGZILLA"/>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12400" ref_url="https://www.suse.com/security/cve/CVE-2020-12400/" source="CVE"/>
		<reference ref_id="CVE-2020-12401" ref_url="https://www.suse.com/security/cve/CVE-2020-12401/" source="CVE"/>
		<reference ref_id="CVE-2020-12403" ref_url="https://www.suse.com/security/cve/CVE-2020-12403/" source="CVE"/>
		<reference ref_id="CVE-2020-25648" ref_url="https://www.suse.com/security/cve/CVE-2020-25648/" source="CVE"/>
		<reference ref_id="CVE-2020-6829" ref_url="https://www.suse.com/security/cve/CVE-2020-6829/" source="CVE"/>
		<description>
This update for mozilla-nspr fixes the following issues:

mozilla-nspr was updated to version 4.32:

* implement new socket option PR_SockOpt_DontFrag
* support larger DNS records by increasing the default buffer
  size for DNS queries 
* Lock access to PRCallOnceType members in PR_CallOnce* for
  thread safety bmo#1686138
* PR_GetSystemInfo supports a new flag PR_SI_RELEASE_BUILD to get
  information about the operating system build version.


Mozilla NSS was updated to version 3.68:

* bmo#1713562 - Fix test leak.
* bmo#1717452 - NSS 3.68 should depend on NSPR 4.32.
* bmo#1693206 - Implement PKCS8 export of ECDSA keys.
* bmo#1712883 - DTLS 1.3 draft-43.
* bmo#1655493 - Support SHA2 HW acceleration using Intel SHA Extension.
* bmo#1713562 - Validate ECH public names.
* bmo#1717610 - Add function to get seconds from epoch from pkix::Time.

update to NSS 3.67

* bmo#1683710 - Add a means to disable ALPN.
* bmo#1715720 - Fix nssckbi version number in NSS 3.67 (was supposed to be incremented in 3.66).
* bmo#1714719 - Set NSS_USE_64 on riscv64 target when using GYP/Ninja.
* bmo#1566124 - Fix counter increase in ppc-gcm-wrap.c.
* bmo#1566124 - Fix AES_GCM mode on ppc64le for messages of length more than 255-byte.

update to NSS 3.66

* bmo#1710716 - Remove Expired Sonera Class2 CA from NSS.
* bmo#1710716 - Remove Expired Root Certificates from NSS - QuoVadis Root Certification Authority.
* bmo#1708307 - Remove Trustis FPS Root CA from NSS.
* bmo#1707097 - Add Certum Trusted Root CA to NSS.
* bmo#1707097 - Add Certum EC-384 CA to NSS.
* bmo#1703942 - Add ANF Secure Server Root CA to NSS.
* bmo#1697071 - Add GLOBALTRUST 2020 root cert to NSS.
* bmo#1712184 - NSS tools manpages need to be updated to reflect that sqlite is the default database.
* bmo#1712230 - Don't build ppc-gcm.s with clang integrated assembler.
* bmo#1712211 - Strict prototype error when trying to compile nss code that includes blapi.h.
* bmo#1710773 - NSS needs FIPS 180-3 FIPS indicators.
* bmo#1709291 - Add VerifyCodeSigningCertificateChain.

update to NSS 3.65

* bmo#1709654 - Update for NetBSD configuration.
* bmo#1709750 - Disable HPKE test when fuzzing.
* bmo#1566124 - Optimize AES-GCM for ppc64le.
* bmo#1699021 - Add AES-256-GCM to HPKE.
* bmo#1698419 - ECH -10 updates.
* bmo#1692930 - Update HPKE to final version.
* bmo#1707130 - NSS should use modern algorithms in PKCS#12 files by default.
* bmo#1703936 - New coverity/cpp scanner errors.
* bmo#1697303 - NSS needs to update it's csp clearing to FIPS 180-3 standards.
* bmo#1702663 - Need to support RSA PSS with Hashing PKCS #11 Mechanisms.
* bmo#1705119 - Deadlock when using GCM and non-thread safe tokens.

update to NSS 3.64

* bmo#1705286 - Properly detect mips64.
* bmo#1687164 - Introduce NSS_DISABLE_CRYPTO_VSX and
		disable_crypto_vsx.
* bmo#1698320 - replace __builtin_cpu_supports('vsx') with
		ppc_crypto_support() for clang.
* bmo#1613235 - Add POWER ChaCha20 stream cipher vector
		acceleration.

Fixed in 3.63

* bmo#1697380 - Make a clang-format run on top of helpful contributions.
* bmo#1683520 - ECCKiila P384, change syntax of nested structs
		initialization to prevent build isses with GCC 4.8.
* bmo#1683520 - [lib/freebl/ecl] P-384: allow zero scalars in dual
		scalar multiplication.
* bmo#1683520 - ECCKiila P521, change syntax of nested structs
		initialization to prevent build isses with GCC 4.8.
* bmo#1683520 - [lib/freebl/ecl] P-521: allow zero scalars in dual
		scalar multiplication.
* bmo#1696800 - HACL* update March 2021 - c95ab70fcb2bc21025d8845281bc4bc8987ca683.
* bmo#1694214 - tstclnt can't enable middlebox compat mode.
* bmo#1694392 - NSS does not work with PKCS #11 modules not supporting
		profiles.
* bmo#1685880 - Minor fix to prevent unused variable on early return.
* bmo#1685880 - Fix for the gcc compiler version 7 to support setenv
		with nss build.
* bmo#1693217 - Increase nssckbi.h version number for March 2021 batch
		of root CA changes, CA list version 2.48.
* bmo#1692094 - Set email distrust after to 21-03-01 for Camerfirma's
		'Chambers of Commerce' and 'Global Chambersign' roots.
* bmo#1618407 - Symantec root certs - Set CKA_NSS_EMAIL_DISTRUST_AFTER.
* bmo#1693173 - Add GlobalSign R45, E45, R46, and E46 root certs to NSS.
* bmo#1683738 - Add AC RAIZ FNMT-RCM SERVIDORES SEGUROS root cert to NSS.
* bmo#1686854 - Remove GeoTrust PCA-G2 and VeriSign Universal root certs
		from NSS.
* bmo#1687822 - Turn off Websites trust bit for the “Staat der
		Nederlanden Root CA - G3” root cert in NSS.
* bmo#1692094 - Turn off Websites Trust Bit for 'Chambers of Commerce
		Root - 2008' and 'Global Chambersign Root - 2008’.
* bmo#1694291 - Tracing fixes for ECH.

update to NSS 3.62

* bmo#1688374 - Fix parallel build NSS-3.61 with make
* bmo#1682044 - pkix_Build_GatherCerts() + pkix_CacheCert_Add()
		can corrupt 'cachedCertTable'
* bmo#1690583 - Fix CH padding extension size calculation
* bmo#1690421 - Adjust 3.62 ABI report formatting for new libabigail
* bmo#1690421 - Install packaged libabigail in docker-builds image
* bmo#1689228 - Minor ECH -09 fixes for interop testing, fuzzing
* bmo#1674819 - Fixup a51fae403328, enum type may be signed
* bmo#1681585 - Add ECH support to selfserv
* bmo#1681585 - Update ECH to Draft-09
* bmo#1678398 - Add Export/Import functions for HPKE context
* bmo#1678398 - Update HPKE to draft-07

update to NSS 3.61

* bmo#1682071 - Fix issue with IKE Quick mode deriving incorrect key
		values under certain conditions.
* bmo#1684300 - Fix default PBE iteration count when NSS is compiled
		with NSS_DISABLE_DBM.
* bmo#1651411 - Improve constant-timeness in RSA operations.
* bmo#1677207 - Upgrade Google Test version to latest release.
* bmo#1654332 - Add aarch64-make target to nss-try.

Update to NSS 3.60.1:

Notable changes in NSS 3.60:
* TLS 1.3 Encrypted Client Hello (draft-ietf-tls-esni-08) support
  has been added, replacing the previous ESNI (draft-ietf-tls-esni-01)
  implementation. See bmo#1654332 for more information.
* December 2020 batch of Root CA changes, builtins library updated
  to version 2.46. See bmo#1678189, bmo#1678166, and bmo#1670769
  for more information.

Update to NSS 3.59.1:

* bmo#1679290 - Fix potential deadlock with certain third-party
		PKCS11 modules

Update to NSS 3.59:

Notable changes:

* Exported two existing functions from libnss:
  CERT_AddCertToListHeadWithData and CERT_AddCertToListTailWithData

Bugfixes

* bmo#1607449 - Lock cert-&gt;nssCertificate to prevent a potential data race
* bmo#1672823 - Add Wycheproof test cases for HMAC, HKDF, and DSA
* bmo#1663661 - Guard against NULL token in nssSlot_IsTokenPresent
* bmo#1670835 - Support enabling and disabling signatures via Crypto Policy
* bmo#1672291 - Resolve libpkix OCSP failures on SHA1 self-signed
		root certs when SHA1 signatures are disabled.
* bmo#1644209 - Fix broken SelectedCipherSuiteReplacer filter to
		solve some test intermittents
* bmo#1672703 - Tolerate the first CCS in TLS 1.3 to fix a regression in
		our CVE-2020-25648 fix that broke purple-discord
		(boo#1179382)
* bmo#1666891 - Support key wrap/unwrap with RSA-OAEP
* bmo#1667989 - Fix gyp linking on Solaris
* bmo#1668123 - Export CERT_AddCertToListHeadWithData and
		CERT_AddCertToListTailWithData from libnss
* bmo#1634584 - Set CKA_NSS_SERVER_DISTRUST_AFTER for Trustis FPS Root CA
* bmo#1663091 - Remove unnecessary assertions in the streaming
		ASN.1 decoder that affected decoding certain PKCS8
		private keys when using NSS debug builds
*  bmo#670839 - Use ARM crypto extension for AES, SHA1 and SHA2 on MacOS.

update to NSS 3.58

Bugs fixed:

* bmo#1641480 (CVE-2020-25648)
  Tighten CCS handling for middlebox compatibility mode.
* bmo#1631890 - Add support for Hybrid Public Key Encryption
  (draft-irtf-cfrg-hpke) support for TLS Encrypted Client Hello
  (draft-ietf-tls-esni).
* bmo#1657255 - Add CI tests that disable SHA1/SHA2 ARM crypto
  extensions.
* bmo#1668328 - Handle spaces in the Python path name when using
  gyp on Windows.
* bmo#1667153 - Add PK11_ImportDataKey for data object import.
* bmo#1665715 - Pass the embedded SCT list extension (if present)
  to TrustDomain::CheckRevocation instead of the notBefore value.

update to NSS 3.57

* The following CA certificates were Added:
  bmo#1663049 - CN=Trustwave Global Certification Authority
      SHA-256 Fingerprint: 97552015F5DDFC3C8788C006944555408894450084F100867086BC1A2BB58DC8
  bmo#1663049 - CN=Trustwave Global ECC P256 Certification Authority
      SHA-256 Fingerprint: 945BBC825EA554F489D1FD51A73DDF2EA624AC7019A05205225C22A78CCFA8B4
  bmo#1663049 - CN=Trustwave Global ECC P384 Certification Authority
      SHA-256 Fingerprint: 55903859C8C0C3EBB8759ECE4E2557225FF5758BBD38EBD48276601E1BD58097
* The following CA certificates were Removed:
  bmo#1651211 - CN=EE Certification Centre Root CA
      SHA-256 Fingerprint: 3E84BA4342908516E77573C0992F0979CA084E4685681FF195CCBA8A229B8A76
  bmo#1656077 - O=Government Root Certification Authority; C=TW
      SHA-256 Fingerprint: 7600295EEFE85B9E1FD624DB76062AAAAE59818A54D2774CD4C0B2C01131E1B3
* Trust settings for the following CA certificates were Modified:
  bmo#1653092 - CN=OISTE WISeKey Global Root GA CA
      Websites (server authentication) trust bit removed.
* https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.57_release_notes

update to NSS 3.56

Notable changes

* bmo#1650702 - Support SHA-1 HW acceleration on ARMv8
* bmo#1656981 - Use MPI comba and mulq optimizations on x86-64 MacOS.
* bmo#1654142 - Add CPU feature detection for Intel SHA extension.
* bmo#1648822 - Add stricter validation of DH keys in FIPS mode.
* bmo#1656986 - Properly detect arm64 during GYP build architecture
		detection.
* bmo#1652729 - Add build flag to disable RC2 and relocate to
		lib/freebl/deprecated.
* bmo#1656429 - Correct RTT estimate used in 0-RTT anti-replay.
* bmo#1588941 - Send empty certificate message when scheme selection
		fails.
* bmo#1652032 - Fix failure to build in Windows arm64 makefile
		cross-compilation.
* bmo#1625791 - Fix deadlock issue in nssSlot_IsTokenPresent.
* bmo#1653975 - Fix 3.53 regression by setting 'all' as the default
		makefile target.
* bmo#1659792 - Fix broken libpkix tests with unexpired PayPal cert.
* bmo#1659814 - Fix interop.sh failures with newer tls-interop
		commit and dependencies.
* bmo#1656519 - NSPR dependency updated to 4.28

update to NSS 3.55

Notable changes
* P384 and P521 elliptic curve implementations are replaced with
  verifiable implementations from Fiat-Crypto [0] and ECCKiila [1].
* PK11_FindCertInSlot is added. With this function, a given slot
  can be queried with a DER-Encoded certificate, providing performance
  and usability improvements over other mechanisms. (bmo#1649633)
* DTLS 1.3 implementation is updated to draft-38. (bmo#1647752)

Relevant Bugfixes

* bmo#1631583 (CVE-2020-6829, CVE-2020-12400) - Replace P384 and
  P521 with new, verifiable implementations from Fiat-Crypto and ECCKiila.
* bmo#1649487 - Move overzealous assertion in VFY_EndWithSignature.
* bmo#1631573 (CVE-2020-12401) - Remove unnecessary scalar padding.
* bmo#1636771 (CVE-2020-12403) - Explicitly disable multi-part
  ChaCha20 (which was not functioning correctly) and more strictly
  enforce tag length.
* bmo#1649648 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1649316 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1649322 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1653202 - Fix initialization bug in blapitest when compiled
  with NSS_DISABLE_DEPRECATED_SEED.
* bmo#1646594 - Fix AVX2 detection in makefile builds.
* bmo#1649633 - Add PK11_FindCertInSlot to search a given slot
  for a DER-encoded certificate.
* bmo#1651520 - Fix slotLock race in NSC_GetTokenInfo.
* bmo#1647752 - Update DTLS 1.3 implementation to draft-38.
* bmo#1649190 - Run cipher, sdr, and ocsp tests under standard test cycle in CI.
* bmo#1649226 - Add Wycheproof ECDSA tests.
* bmo#1637222 - Consistently enforce IV requirements for DES and 3DES.
* bmo#1067214 - Enforce minimum PKCS#1 v1.5 padding length in
  RSA_CheckSignRecover.
* bmo#1646324 - Advertise PKCS#1 schemes for certificates in the
  signature_algorithms extension.

update to NSS 3.54

Notable changes

* Support for TLS 1.3 external pre-shared keys (bmo#1603042).
* Use ARM Cryptography Extension for SHA256, when available
  (bmo#1528113)
* The following CA certificates were Added:
  bmo#1645186 - certSIGN Root CA G2.
  bmo#1645174 - e-Szigno Root CA 2017.
  bmo#1641716 - Microsoft ECC Root Certificate Authority 2017.
  bmo#1641716 - Microsoft RSA Root Certificate Authority 2017.
* The following CA certificates were Removed:
  bmo#1645199 - AddTrust Class 1 CA Root.
  bmo#1645199 - AddTrust External CA Root.
  bmo#1641718 - LuxTrust Global Root 2.
  bmo#1639987 - Staat der Nederlanden Root CA - G2.
  bmo#1618402 - Symantec Class 2 Public Primary Certification Authority - G4.
  bmo#1618402 - Symantec Class 1 Public Primary Certification Authority - G4.
  bmo#1618402 - VeriSign Class 3 Public Primary Certification Authority - G3.

* A number of certificates had their Email trust bit disabled.
  See bmo#1618402 for a complete list.

Bugs fixed

* bmo#1528113 - Use ARM Cryptography Extension for SHA256.
* bmo#1603042 - Add TLS 1.3 external PSK support.
* bmo#1642802 - Add uint128 support for HACL* curve25519 on Windows.
* bmo#1645186 - Add 'certSIGN Root CA G2' root certificate.
* bmo#1645174 - Add Microsec's 'e-Szigno Root CA 2017' root certificate.
* bmo#1641716 - Add Microsoft's non-EV root certificates.
* bmo1621151 - Disable email trust bit for 'O=Government
	       Root Certification Authority; C=TW' root.
* bmo#1645199 - Remove AddTrust root certificates.
* bmo#1641718 - Remove 'LuxTrust Global Root 2' root certificate.
* bmo#1639987 - Remove 'Staat der Nederlanden Root CA - G2' root
		certificate.
* bmo#1618402 - Remove Symantec root certificates and disable email trust
		bit.
* bmo#1640516 - NSS 3.54 should depend on NSPR 4.26.
* bmo#1642146 - Fix undefined reference to `PORT_ZAlloc_stub' in seed.c.
* bmo#1642153 - Fix infinite recursion building NSS.
* bmo#1642638 - Fix fuzzing assertion crash.
* bmo#1642871 - Enable SSL_SendSessionTicket after resumption.
* bmo#1643123 - Support SSL_ExportEarlyKeyingMaterial with External PSKs.
* bmo#1643557 - Fix numerous compile warnings in NSS.
* bmo#1644774 - SSL gtests to use ClearServerCache when resetting
		self-encrypt keys.
* bmo#1645479 - Don't use SECITEM_MakeItem in secutil.c.
* bmo#1646520 - Stricter enforcement of ASN.1 INTEGER encoding.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-29"/>
	<updated date="2021-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029961">SUSE bug 1029961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174697">SUSE bug 1174697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176206">SUSE bug 1176206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176934">SUSE bug 1176934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179382">SUSE bug 1179382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12400/">CVE-2020-12400 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12400">CVE-2020-12400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12401/">CVE-2020-12401 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12401">CVE-2020-12401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12403/">CVE-2020-12403 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12403">CVE-2020-12403 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25648/">CVE-2020-25648 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25648">CVE-2020-25648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6829/">CVE-2020-6829 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6829">CVE-2020-6829 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634778" comment="libfreebl3-3.68-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634779" comment="libfreebl3-32bit-3.68-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634780" comment="libsoftokn3-3.68-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634781" comment="libsoftokn3-32bit-3.68-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634782" comment="mozilla-nspr-4.32-29.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634783" comment="mozilla-nspr-32bit-4.32-29.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634784" comment="mozilla-nss-3.68-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634785" comment="mozilla-nss-32bit-3.68-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634786" comment="mozilla-nss-certs-3.68-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634787" comment="mozilla-nss-certs-32bit-3.68-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634788" comment="mozilla-nss-tools-3.68-38.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217496" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla-XULrunner</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="645315" ref_url="https://bugzilla.suse.com/645315" source="BUGZILLA"/>
		<reference ref_id="653606" ref_url="https://bugzilla.suse.com/653606" source="BUGZILLA"/>
		<reference ref_id="657016" ref_url="https://bugzilla.suse.com/657016" source="BUGZILLA"/>
		<reference ref_id="667155" ref_url="https://bugzilla.suse.com/667155" source="BUGZILLA"/>
		<reference ref_id="680771" ref_url="https://bugzilla.suse.com/680771" source="BUGZILLA"/>
		<reference ref_id="689281" ref_url="https://bugzilla.suse.com/689281" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0179" ref_url="https://www.suse.com/security/cve/CVE-2010-0179/" source="CVE"/>
		<reference ref_id="CVE-2010-1585" ref_url="https://www.suse.com/security/cve/CVE-2010-1585/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<reference ref_id="CVE-2010-3766" ref_url="https://www.suse.com/security/cve/CVE-2010-3766/" source="CVE"/>
		<reference ref_id="CVE-2010-3767" ref_url="https://www.suse.com/security/cve/CVE-2010-3767/" source="CVE"/>
		<reference ref_id="CVE-2010-3768" ref_url="https://www.suse.com/security/cve/CVE-2010-3768/" source="CVE"/>
		<reference ref_id="CVE-2010-3769" ref_url="https://www.suse.com/security/cve/CVE-2010-3769/" source="CVE"/>
		<reference ref_id="CVE-2010-3770" ref_url="https://www.suse.com/security/cve/CVE-2010-3770/" source="CVE"/>
		<reference ref_id="CVE-2010-3771" ref_url="https://www.suse.com/security/cve/CVE-2010-3771/" source="CVE"/>
		<reference ref_id="CVE-2010-3772" ref_url="https://www.suse.com/security/cve/CVE-2010-3772/" source="CVE"/>
		<reference ref_id="CVE-2010-3773" ref_url="https://www.suse.com/security/cve/CVE-2010-3773/" source="CVE"/>
		<reference ref_id="CVE-2010-3774" ref_url="https://www.suse.com/security/cve/CVE-2010-3774/" source="CVE"/>
		<reference ref_id="CVE-2010-3775" ref_url="https://www.suse.com/security/cve/CVE-2010-3775/" source="CVE"/>
		<reference ref_id="CVE-2010-3776" ref_url="https://www.suse.com/security/cve/CVE-2010-3776/" source="CVE"/>
		<reference ref_id="CVE-2010-3777" ref_url="https://www.suse.com/security/cve/CVE-2010-3777/" source="CVE"/>
		<reference ref_id="CVE-2010-3778" ref_url="https://www.suse.com/security/cve/CVE-2010-3778/" source="CVE"/>
		<reference ref_id="CVE-2011-0051" ref_url="https://www.suse.com/security/cve/CVE-2011-0051/" source="CVE"/>
		<reference ref_id="CVE-2011-0053" ref_url="https://www.suse.com/security/cve/CVE-2011-0053/" source="CVE"/>
		<reference ref_id="CVE-2011-0054" ref_url="https://www.suse.com/security/cve/CVE-2011-0054/" source="CVE"/>
		<reference ref_id="CVE-2011-0055" ref_url="https://www.suse.com/security/cve/CVE-2011-0055/" source="CVE"/>
		<reference ref_id="CVE-2011-0056" ref_url="https://www.suse.com/security/cve/CVE-2011-0056/" source="CVE"/>
		<reference ref_id="CVE-2011-0057" ref_url="https://www.suse.com/security/cve/CVE-2011-0057/" source="CVE"/>
		<reference ref_id="CVE-2011-0058" ref_url="https://www.suse.com/security/cve/CVE-2011-0058/" source="CVE"/>
		<reference ref_id="CVE-2011-0059" ref_url="https://www.suse.com/security/cve/CVE-2011-0059/" source="CVE"/>
		<reference ref_id="CVE-2011-0061" ref_url="https://www.suse.com/security/cve/CVE-2011-0061/" source="CVE"/>
		<reference ref_id="CVE-2011-0062" ref_url="https://www.suse.com/security/cve/CVE-2011-0062/" source="CVE"/>
		<reference ref_id="CVE-2011-0065" ref_url="https://www.suse.com/security/cve/CVE-2011-0065/" source="CVE"/>
		<reference ref_id="CVE-2011-0066" ref_url="https://www.suse.com/security/cve/CVE-2011-0066/" source="CVE"/>
		<reference ref_id="CVE-2011-0067" ref_url="https://www.suse.com/security/cve/CVE-2011-0067/" source="CVE"/>
		<reference ref_id="CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069/" source="CVE"/>
		<reference ref_id="CVE-2011-0070" ref_url="https://www.suse.com/security/cve/CVE-2011-0070/" source="CVE"/>
		<reference ref_id="CVE-2011-0072" ref_url="https://www.suse.com/security/cve/CVE-2011-0072/" source="CVE"/>
		<reference ref_id="CVE-2011-0073" ref_url="https://www.suse.com/security/cve/CVE-2011-0073/" source="CVE"/>
		<reference ref_id="CVE-2011-0074" ref_url="https://www.suse.com/security/cve/CVE-2011-0074/" source="CVE"/>
		<reference ref_id="CVE-2011-0075" ref_url="https://www.suse.com/security/cve/CVE-2011-0075/" source="CVE"/>
		<reference ref_id="CVE-2011-0077" ref_url="https://www.suse.com/security/cve/CVE-2011-0077/" source="CVE"/>
		<reference ref_id="CVE-2011-0078" ref_url="https://www.suse.com/security/cve/CVE-2011-0078/" source="CVE"/>
		<reference ref_id="CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080/" source="CVE"/>
		<reference ref_id="CVE-2011-0081" ref_url="https://www.suse.com/security/cve/CVE-2011-0081/" source="CVE"/>
		<reference ref_id="CVE-2011-1202" ref_url="https://www.suse.com/security/cve/CVE-2011-1202/" source="CVE"/>
		<description>

Mozilla XULRunner 1.9.1 was updated to the 1.9.1.19 security release.

    * 

      MFSA 2011-12: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code. Credits

    * 

      Mozilla developer Scoobidiver reported a memory safety issue which
      affected Firefox 4 and Firefox 3.6 (CVE-2011-0081)

      The web development team of Alcidion reported a crash that affected
      Firefox 4, Firefox 3.6 and Firefox 3.5. (CVE-2011-0069)

      Ian Beer reported a crash that affected Firefox 4, Firefox 3.6 and
      Firefox 3.5. (CVE-2011-0070)

      Mozilla developers Bob Clary, Henri Sivonen, Marco Bonardo, Mats
      Palmgren and Jesse Ruderman reported memory safety issues which
      affected Firefox 3.6 and Firefox 3.5. (CVE-2011-0080)

      Aki Helin reported memory safety issues which affected Firefox 3.6
      and Firefox 3.5. (CVE-2011-0074 , CVE-2011-0075)

      Ian Beer reported memory safety issues which affected Firefox 3.6 and
      Firefox 3.5. (CVE-2011-0077 , CVE-2011-0078)

      Martin Barbella reported a memory safety issue which affected Firefox
      3.6 and Firefox 3.5. (CVE-2011-0072)

    * 

      MFSA 2011-13 / CVE-2011-0065 / CVE-2011-0066 / CVE-2011-0073:
      Security researcher regenrecht reported several dangling pointer
      vulnerabilities via TippingPoint's Zero Day Initiative.

    * 

      MFSA 2011-14 / CVE-2011-0067: Security researcher Paul Stone reported
      that a Java applet could be used to mimic interaction with form
      autocomplete controls and steal entries from the form history.

    * 

      MFSA 2011-18 / CVE-2011-1202: Chris Evans of the Chrome Security Team
      reported that the XSLT generate-id() function returned a string that
      revealed a specific valid address of an object on the memory heap. It
      is possible that in some cases this address would be valuable
      information that could be used by an attacker while exploiting a
      different memory corruption but, in order to make an exploit more
      reliable or work around mitigation features in the browser or
      operating system.

		</description>
<advisory from="security@suse.de">
	<issued date="2011-04-29"/>
	<updated date="2011-04-29"/>
	<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/653606">SUSE bug 653606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/657016">SUSE bug 657016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/667155">SUSE bug 667155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/680771">SUSE bug 680771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0179/">CVE-2010-0179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0179">CVE-2010-0179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1585/">CVE-2010-1585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1585">CVE-2010-1585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3170">CVE-2010-3170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3174">CVE-2010-3174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3175">CVE-2010-3175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3176">CVE-2010-3176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3177">CVE-2010-3177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3178">CVE-2010-3178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3179">CVE-2010-3179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3180">CVE-2010-3180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3182">CVE-2010-3182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3183">CVE-2010-3183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3765">CVE-2010-3765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3766/">CVE-2010-3766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3766">CVE-2010-3766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3767/">CVE-2010-3767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3767">CVE-2010-3767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3768/">CVE-2010-3768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3768">CVE-2010-3768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3769/">CVE-2010-3769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3769">CVE-2010-3769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3770/">CVE-2010-3770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3770">CVE-2010-3770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3771/">CVE-2010-3771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3771">CVE-2010-3771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3772/">CVE-2010-3772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3772">CVE-2010-3772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3773/">CVE-2010-3773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3773">CVE-2010-3773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3774/">CVE-2010-3774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3774">CVE-2010-3774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3775/">CVE-2010-3775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3775">CVE-2010-3775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3776/">CVE-2010-3776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3776">CVE-2010-3776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3777/">CVE-2010-3777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3777">CVE-2010-3777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3778/">CVE-2010-3778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3778">CVE-2010-3778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0051/">CVE-2011-0051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0051">CVE-2011-0051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0053/">CVE-2011-0053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0053">CVE-2011-0053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0054/">CVE-2011-0054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0054">CVE-2011-0054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0055/">CVE-2011-0055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0055">CVE-2011-0055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0056/">CVE-2011-0056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0056">CVE-2011-0056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0057/">CVE-2011-0057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0057">CVE-2011-0057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0058/">CVE-2011-0058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0058">CVE-2011-0058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0059/">CVE-2011-0059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0059">CVE-2011-0059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0061/">CVE-2011-0061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0061">CVE-2011-0061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0062/">CVE-2011-0062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0062">CVE-2011-0062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0065/">CVE-2011-0065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0065">CVE-2011-0065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0066/">CVE-2011-0066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0066">CVE-2011-0066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0067/">CVE-2011-0067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0067">CVE-2011-0067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0069">CVE-2011-0069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0070/">CVE-2011-0070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0070">CVE-2011-0070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0072/">CVE-2011-0072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0072">CVE-2011-0072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0073/">CVE-2011-0073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0073">CVE-2011-0073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0074/">CVE-2011-0074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0074">CVE-2011-0074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0075/">CVE-2011-0075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0075">CVE-2011-0075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0077/">CVE-2011-0077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0077">CVE-2011-0077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0078/">CVE-2011-0078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0078">CVE-2011-0078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0080">CVE-2011-0080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0081/">CVE-2011-0081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0081">CVE-2011-0081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1202/">CVE-2011-1202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1202">CVE-2011-1202 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992248" comment="mozilla-xulrunner191-1.9.1.19-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992249" comment="mozilla-xulrunner191-32bit-1.9.1.19-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992250" comment="mozilla-xulrunner191-gnomevfs-1.9.1.19-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992251" comment="mozilla-xulrunner191-translations-1.9.1.19-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217497" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla XULrunner</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="737533" ref_url="https://bugzilla.suse.com/737533" source="BUGZILLA"/>
		<reference ref_id="744275" ref_url="https://bugzilla.suse.com/744275" source="BUGZILLA"/>
		<reference ref_id="747328" ref_url="https://bugzilla.suse.com/747328" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3659" ref_url="https://www.suse.com/security/cve/CVE-2011-3659/" source="CVE"/>
		<reference ref_id="CVE-2011-3670" ref_url="https://www.suse.com/security/cve/CVE-2011-3670/" source="CVE"/>
		<reference ref_id="CVE-2012-0442" ref_url="https://www.suse.com/security/cve/CVE-2012-0442/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<reference ref_id="CVE-2012-0449" ref_url="https://www.suse.com/security/cve/CVE-2012-0449/" source="CVE"/>
		<description>

Mozilla XULRunner was updated to 1.9.2.27 to fix a security issue with the 
embedded libpng, where a integer overflow could allow remote attackers to 
crash the browser or potentially execute code (CVE-2011-3026),

Security Issue reference:

    * CVE-2011-3026
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3026&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-20"/>
	<updated date="2012-02-20"/>
	<bugzilla href="https://bugzilla.suse.com/737533">SUSE bug 737533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744275">SUSE bug 744275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747328">SUSE bug 747328</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3026">CVE-2011-3026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3659/">CVE-2011-3659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3659">CVE-2011-3659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3670/">CVE-2011-3670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3670">CVE-2011-3670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0442/">CVE-2012-0442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0442">CVE-2012-0442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0444">CVE-2012-0444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0449/">CVE-2012-0449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0449">CVE-2012-0449 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992252" comment="mozilla-xulrunner192-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992253" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992254" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992255" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217498" version="1" class="patch">
	<metadata>
		<title>Security update for mutt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="868115" ref_url="https://bugzilla.suse.com/868115" source="BUGZILLA"/>
		<reference ref_id="905481" ref_url="https://bugzilla.suse.com/905481" source="BUGZILLA"/>
		<reference ref_id="907453" ref_url="https://bugzilla.suse.com/907453" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0467" ref_url="https://www.suse.com/security/cve/CVE-2014-0467/" source="CVE"/>
		<reference ref_id="CVE-2014-9116" ref_url="https://www.suse.com/security/cve/CVE-2014-9116/" source="CVE"/>
		<description>

The mailreader mutt was updated to fix a security issue in displaying mail 
headers, where a crafted e-mail could cause a heap overflow, which in turn 
might be used by attackers to crash mutt or potentially even execute code.

Security Issues references:

    * CVE-2014-0467
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0467&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-17"/>
	<updated date="2014-03-17"/>
	<bugzilla href="https://bugzilla.suse.com/868115">SUSE bug 868115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905481">SUSE bug 905481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907453">SUSE bug 907453</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0467/">CVE-2014-0467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0467">CVE-2014-0467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9116/">CVE-2014-9116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9116">CVE-2014-9116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572712" comment="mutt-1.5.17-42.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217499" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1101567" ref_url="https://bugzilla.suse.com/1101567" source="BUGZILLA"/>
		<reference ref_id="1101570" ref_url="https://bugzilla.suse.com/1101570" source="BUGZILLA"/>
		<reference ref_id="1101571" ref_url="https://bugzilla.suse.com/1101571" source="BUGZILLA"/>
		<reference ref_id="1101573" ref_url="https://bugzilla.suse.com/1101573" source="BUGZILLA"/>
		<reference ref_id="1101576" ref_url="https://bugzilla.suse.com/1101576" source="BUGZILLA"/>
		<reference ref_id="1101577" ref_url="https://bugzilla.suse.com/1101577" source="BUGZILLA"/>
		<reference ref_id="1101578" ref_url="https://bugzilla.suse.com/1101578" source="BUGZILLA"/>
		<reference ref_id="1101581" ref_url="https://bugzilla.suse.com/1101581" source="BUGZILLA"/>
		<reference ref_id="1101582" ref_url="https://bugzilla.suse.com/1101582" source="BUGZILLA"/>
		<reference ref_id="1101588" ref_url="https://bugzilla.suse.com/1101588" source="BUGZILLA"/>
		<reference ref_id="1101589" ref_url="https://bugzilla.suse.com/1101589" source="BUGZILLA"/>
		<reference ref_id="936807" ref_url="https://bugzilla.suse.com/936807" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14349" ref_url="https://www.suse.com/security/cve/CVE-2018-14349/" source="CVE"/>
		<reference ref_id="CVE-2018-14350" ref_url="https://www.suse.com/security/cve/CVE-2018-14350/" source="CVE"/>
		<reference ref_id="CVE-2018-14352" ref_url="https://www.suse.com/security/cve/CVE-2018-14352/" source="CVE"/>
		<reference ref_id="CVE-2018-14353" ref_url="https://www.suse.com/security/cve/CVE-2018-14353/" source="CVE"/>
		<reference ref_id="CVE-2018-14354" ref_url="https://www.suse.com/security/cve/CVE-2018-14354/" source="CVE"/>
		<reference ref_id="CVE-2018-14355" ref_url="https://www.suse.com/security/cve/CVE-2018-14355/" source="CVE"/>
		<reference ref_id="CVE-2018-14356" ref_url="https://www.suse.com/security/cve/CVE-2018-14356/" source="CVE"/>
		<reference ref_id="CVE-2018-14357" ref_url="https://www.suse.com/security/cve/CVE-2018-14357/" source="CVE"/>
		<reference ref_id="CVE-2018-14358" ref_url="https://www.suse.com/security/cve/CVE-2018-14358/" source="CVE"/>
		<reference ref_id="CVE-2018-14359" ref_url="https://www.suse.com/security/cve/CVE-2018-14359/" source="CVE"/>
		<reference ref_id="CVE-2018-14362" ref_url="https://www.suse.com/security/cve/CVE-2018-14362/" source="CVE"/>
		<description>
This update for mutt fixes the following issues:

Security issues fixed:

- CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582).
- CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581).
- CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567).
- CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578).
- CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576).
- CVE-2018-14355: Fix imap/util.c that mishandles '..' directory traversal in a mailbox name (bsc#1101577).
- CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589).
- CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588).
- CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573).
- CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570).
- CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571).


Bug fixes:

- bsc#936807: On entering a 70 character subject line in mutt, a tab is added to the text after 67 characters.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101567">SUSE bug 1101567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101570">SUSE bug 1101570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101571">SUSE bug 1101571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101573">SUSE bug 1101573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101576">SUSE bug 1101576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101577">SUSE bug 1101577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101578">SUSE bug 1101578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101581">SUSE bug 1101581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101582">SUSE bug 1101582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101588">SUSE bug 1101588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101589">SUSE bug 1101589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936807">SUSE bug 936807</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14349/">CVE-2018-14349 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14349">CVE-2018-14349 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14350/">CVE-2018-14350 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14350">CVE-2018-14350 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14352/">CVE-2018-14352 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14352">CVE-2018-14352 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14353/">CVE-2018-14353 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14353">CVE-2018-14353 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14354/">CVE-2018-14354 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14354">CVE-2018-14354 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14355/">CVE-2018-14355 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14355">CVE-2018-14355 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14356/">CVE-2018-14356 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14356">CVE-2018-14356 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14357/">CVE-2018-14357 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14357">CVE-2018-14357 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14358/">CVE-2018-14358 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14358">CVE-2018-14358 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14359/">CVE-2018-14359 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14359">CVE-2018-14359 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14362/">CVE-2018-14362 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14362">CVE-2018-14362 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572713" comment="mutt-1.5.17-42.43.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217500" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1172906" ref_url="https://bugzilla.suse.com/1172906" source="BUGZILLA"/>
		<reference ref_id="1172935" ref_url="https://bugzilla.suse.com/1172935" source="BUGZILLA"/>
		<reference ref_id="1173197" ref_url="https://bugzilla.suse.com/1173197" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14093" ref_url="https://www.suse.com/security/cve/CVE-2020-14093/" source="CVE"/>
		<reference ref_id="CVE-2020-14154" ref_url="https://www.suse.com/security/cve/CVE-2020-14154/" source="CVE"/>
		<reference ref_id="CVE-2020-14954" ref_url="https://www.suse.com/security/cve/CVE-2020-14954/" source="CVE"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2020-14954: Fixed a response injection due to a STARTTLS buffering issue which was
  affecting IMAP, SMTP, and POP3 (bsc#1173197).	  
- CVE-2020-14093: Fixed a potential IMAP Man-in-the-Middle attack via a PREAUTH response (bsc#1172906, bsc#1172935).
- CVE-2020-14154: Fixed an issue where Mutt was ignoring an expired certificate and was proceeding with a connection (bsc#1172906, bsc#1172935).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-30"/>
	<updated date="2020-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172906">SUSE bug 1172906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172935">SUSE bug 1172935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173197">SUSE bug 1173197</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14093/">CVE-2020-14093 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14093">CVE-2020-14093 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14154/">CVE-2020-14154 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14154">CVE-2020-14154 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14954/">CVE-2020-14954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14954">CVE-2020-14954 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572714" comment="mutt-1.5.17-42.51.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217501" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1179035" ref_url="https://bugzilla.suse.com/1179035" source="BUGZILLA"/>
		<reference ref_id="1179113" ref_url="https://bugzilla.suse.com/1179113" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28896" ref_url="https://www.suse.com/security/cve/CVE-2020-28896/" source="CVE"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2020-28896: incomplete connection termination could lead to sending credentials over unencrypted connections (bsc#1179035)
- Avoid that message with a million tiny parts can freeze MUA for several minutes (bsc#1179113)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-30"/>
	<updated date="2020-11-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179035">SUSE bug 1179035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179113">SUSE bug 1179113</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28896/">CVE-2020-28896 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28896">CVE-2020-28896 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572715" comment="mutt-1.5.17-42.56.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217502" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1181221" ref_url="https://bugzilla.suse.com/1181221" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3181" ref_url="https://www.suse.com/security/cve/CVE-2021-3181/" source="CVE"/>
		<description>
This update for mutt fixes the following issue:

- CVE-2021-3181: Fixed a memory leak in recipient parsing (bsc#1181221).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-22"/>
	<updated date="2021-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181221">SUSE bug 1181221</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3181/">CVE-2021-3181 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3181">CVE-2021-3181 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572716" comment="mutt-1.5.17-42.62.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217503" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1198518" ref_url="https://bugzilla.suse.com/1198518" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1328" ref_url="https://www.suse.com/security/cve/CVE-2022-1328/" source="CVE"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2022-1328: Fixed an invalid memory access when reading untrusted uuencoded
  data. This could result in including private memory in replies (bsc#1198518).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198518">SUSE bug 1198518</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1328/">CVE-2022-1328 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1328">CVE-2022-1328 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680095" comment="mutt-1.5.17-42.65.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217504" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="934789" ref_url="https://bugzilla.suse.com/934789" source="BUGZILLA"/>
		<reference ref_id="959724" ref_url="https://bugzilla.suse.com/959724" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>

This update for mysql fixes the following issues:

- bsc#959724: fix incorrect usage of sprintf/strcpy that caused possible buffer overflow issues at various places

On SUSE Linux Enterprise 11 SP4 this fix was not yet shipped:
- Increase the key length (to 2048 bits) used in vio/viosslfactories.c for creating
  Diffie-Hellman keys (Logjam Attack) [bnc#934789] [CVE-2015-4000]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934789">SUSE bug 934789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959724">SUSE bug 959724</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572717" comment="libmysqlclient15-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572718" comment="libmysqlclient15-32bit-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572719" comment="libmysqlclient_r15-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572720" comment="mysql-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572721" comment="mysql-Max-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572722" comment="mysql-client-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572723" comment="mysql-tools-5.0.96-0.8.10.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217505" version="1" class="patch">
	<metadata>
		<title>Security update for nagios</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="682966" ref_url="https://bugzilla.suse.com/682966" source="BUGZILLA"/>
		<reference ref_id="722074" ref_url="https://bugzilla.suse.com/722074" source="BUGZILLA"/>
		<reference ref_id="797237" ref_url="https://bugzilla.suse.com/797237" source="BUGZILLA"/>
		<reference ref_id="856837" ref_url="https://bugzilla.suse.com/856837" source="BUGZILLA"/>
		<reference ref_id="864843" ref_url="https://bugzilla.suse.com/864843" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1523" ref_url="https://www.suse.com/security/cve/CVE-2011-1523/" source="CVE"/>
		<reference ref_id="CVE-2012-6096" ref_url="https://www.suse.com/security/cve/CVE-2012-6096/" source="CVE"/>
		<reference ref_id="CVE-2013-7108" ref_url="https://www.suse.com/security/cve/CVE-2013-7108/" source="CVE"/>
		<reference ref_id="CVE-2014-1878" ref_url="https://www.suse.com/security/cve/CVE-2014-1878/" source="CVE"/>
		<description>

The monitoring service Nagios has been updated to fix potential buffer 
overflows in its CGI scripts. (CVE-2014-1878)

Security Issue reference:

    * CVE-2014-1878
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1878&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-31"/>
	<updated date="2014-03-31"/>
	<bugzilla href="https://bugzilla.suse.com/682966">SUSE bug 682966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/722074">SUSE bug 722074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797237">SUSE bug 797237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856837">SUSE bug 856837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864843">SUSE bug 864843</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1523/">CVE-2011-1523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1523">CVE-2011-1523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6096/">CVE-2012-6096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6096">CVE-2012-6096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7108/">CVE-2013-7108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7108">CVE-2013-7108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1878/">CVE-2014-1878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1878">CVE-2014-1878 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992256" comment="nagios-3.0.6-1.25.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992257" comment="nagios-www-3.0.6-1.25.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217506" version="1" class="patch">
	<metadata>
		<title>Security update for nagios (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1011630" ref_url="https://bugzilla.suse.com/1011630" source="BUGZILLA"/>
		<reference ref_id="1018047" ref_url="https://bugzilla.suse.com/1018047" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10089" ref_url="https://www.suse.com/security/cve/CVE-2016-10089/" source="CVE"/>
		<reference ref_id="CVE-2016-8641" ref_url="https://www.suse.com/security/cve/CVE-2016-8641/" source="CVE"/>
		<description>
This update for nagios fixes the following issues:

- CVE-2016-8641 / CVE-2016-10089: fixed possible symlink attacks for files/directories created by root (bsc#1011630 / bsc#1018047)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-19"/>
	<updated date="2018-10-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011630">SUSE bug 1011630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018047">SUSE bug 1018047</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10089/">CVE-2016-10089 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10089">CVE-2016-10089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8641/">CVE-2016-8641 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8641">CVE-2016-8641 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572724" comment="nagios-3.0.6-1.25.36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572725" comment="nagios-www-3.0.6-1.25.36.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217507" version="1" class="patch">
	<metadata>
		<title>Security update for nagios-nrpe</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="701079" ref_url="https://bugzilla.suse.com/701079" source="BUGZILLA"/>
		<reference ref_id="807241" ref_url="https://bugzilla.suse.com/807241" source="BUGZILLA"/>
		<reference ref_id="874743" ref_url="https://bugzilla.suse.com/874743" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1362" ref_url="https://www.suse.com/security/cve/CVE-2013-1362/" source="CVE"/>
		<reference ref_id="CVE-2014-2913" ref_url="https://www.suse.com/security/cve/CVE-2014-2913/" source="CVE"/>
		<description>

nagios-nrpe has been updated to prevent possible remote command execution 
when command arguments are enabled. This issue affects versions 2.15 and 
older.

Further information is available at
http://seclists.org/fulldisclosure/2014/Apr/240
&lt;http://seclists.org/fulldisclosure/2014/Apr/240&gt;

These security issues have been fixed:

    * Remote command execution (CVE-2014-2913)

Security Issue references:

    * CVE-2014-2913
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2913&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-06"/>
	<updated date="2014-05-06"/>
	<bugzilla href="https://bugzilla.suse.com/701079">SUSE bug 701079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807241">SUSE bug 807241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/874743">SUSE bug 874743</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1362/">CVE-2013-1362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1362">CVE-2013-1362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2913/">CVE-2014-2913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2913">CVE-2014-2913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992258" comment="nagios-nrpe-2.12-24.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992259" comment="nagios-nrpe-doc-2.12-24.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992260" comment="nagios-plugins-nrpe-2.12-24.4.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217508" version="1" class="patch">
	<metadata>
		<title>Security update for nagios-nrpe (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="938906" ref_url="https://bugzilla.suse.com/938906" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>
This update for nagios-nrpe fixes one issue.

This security issue was fixed:

- CVE-2015-4000: Prevent Logjam. The TLS protocol 1.2 and earlier, when a
  DHE_EXPORT ciphersuite is enabled on a server but not on a client, did not
  properly convey a DHE_EXPORT choice, which allowed man-in-the-middle attackers
  to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE
  replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT
  replaced by DHE (bsc#938906).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-20"/>
	<updated date="2018-06-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/938906">SUSE bug 938906</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572726" comment="nagios-nrpe-2.12-24.4.10.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572727" comment="nagios-nrpe-doc-2.12-24.4.10.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572728" comment="nagios-plugins-nrpe-2.12-24.4.10.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217509" version="1" class="patch">
	<metadata>
		<title>Security update for nautilus (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1060031" ref_url="https://bugzilla.suse.com/1060031" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14604" ref_url="https://www.suse.com/security/cve/CVE-2017-14604/" source="CVE"/>
		<description>
This update for nautilus fixes the following security issue:

- CVE-2017-14604: Fixed a file type spoofing attack by adding a
  metadata::trusted attribute to a file once the user acknowledges the file as
  trusted, and also remove the 'trusted' content in the desktop file
  (bsc#1060031).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-14"/>
	<updated date="2018-06-14"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1060031">SUSE bug 1060031</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14604/">CVE-2017-14604 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14604">CVE-2017-14604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572729" comment="nautilus-2.28.4-1.16.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572730" comment="nautilus-32bit-2.28.4-1.16.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572731" comment="nautilus-lang-2.28.4-1.16.21.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217510" version="1" class="patch">
	<metadata>
		<title>Recommended update for ncurses (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1046853" ref_url="https://bugzilla.suse.com/1046853" source="BUGZILLA"/>
		<reference ref_id="1046858" ref_url="https://bugzilla.suse.com/1046858" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10684" ref_url="https://www.suse.com/security/cve/CVE-2017-10684/" source="CVE"/>
		<reference ref_id="CVE-2017-10685" ref_url="https://www.suse.com/security/cve/CVE-2017-10685/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:
- CVE-2017-10684: Possible RCE via stack-based buffer overflow in the fmt_entry function. (bsc#1046858)
- CVE-2017-10685: Possible RCE with format string vulnerability in the fmt_entry function. (bsc#1046853)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-06"/>
	<updated date="2017-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046853">SUSE bug 1046853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046858">SUSE bug 1046858</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10684/">CVE-2017-10684 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10684">CVE-2017-10684 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10685/">CVE-2017-10685 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10685">CVE-2017-10685 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572732" comment="libncurses5-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572733" comment="libncurses5-32bit-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572734" comment="libncurses6-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572735" comment="libncurses6-32bit-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572736" comment="ncurses-devel-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565005" comment="ncurses-devel-32bit-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572737" comment="ncurses-utils-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572738" comment="tack-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572739" comment="terminfo-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572740" comment="terminfo-base-5.6-92.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217511" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1046853" ref_url="https://bugzilla.suse.com/1046853" source="BUGZILLA"/>
		<reference ref_id="1046858" ref_url="https://bugzilla.suse.com/1046858" source="BUGZILLA"/>
		<reference ref_id="1047964" ref_url="https://bugzilla.suse.com/1047964" source="BUGZILLA"/>
		<reference ref_id="1047965" ref_url="https://bugzilla.suse.com/1047965" source="BUGZILLA"/>
		<reference ref_id="1049344" ref_url="https://bugzilla.suse.com/1049344" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10684" ref_url="https://www.suse.com/security/cve/CVE-2017-10684/" source="CVE"/>
		<reference ref_id="CVE-2017-10685" ref_url="https://www.suse.com/security/cve/CVE-2017-10685/" source="CVE"/>
		<reference ref_id="CVE-2017-11112" ref_url="https://www.suse.com/security/cve/CVE-2017-11112/" source="CVE"/>
		<reference ref_id="CVE-2017-11113" ref_url="https://www.suse.com/security/cve/CVE-2017-11113/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:
- CVE-2017-11112: Illegal address access in append_acs. (bsc#1047964)
- CVE-2017-11113: Dereferencing NULL pointer in _nc_parse_entry. (bsc#1047965)
- CVE-2017-10684, CVE-2017-10685: Add modified upstream fix from ncurses 6.0 to avoid broken
  termcap format (bsc#1046853, bsc#1046858, bsc#1049344)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-07"/>
	<updated date="2017-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046853">SUSE bug 1046853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046858">SUSE bug 1046858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047964">SUSE bug 1047964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047965">SUSE bug 1047965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049344">SUSE bug 1049344</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10684/">CVE-2017-10684 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10684">CVE-2017-10684 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10685/">CVE-2017-10685 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10685">CVE-2017-10685 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11112/">CVE-2017-11112 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11112">CVE-2017-11112 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11113/">CVE-2017-11113 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11113">CVE-2017-11113 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572741" comment="libncurses5-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572742" comment="libncurses5-32bit-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572743" comment="libncurses6-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572744" comment="libncurses6-32bit-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572745" comment="ncurses-devel-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565008" comment="ncurses-devel-32bit-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572746" comment="ncurses-utils-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572747" comment="tack-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572748" comment="terminfo-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572749" comment="terminfo-base-5.6-93.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217512" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1056127" ref_url="https://bugzilla.suse.com/1056127" source="BUGZILLA"/>
		<reference ref_id="1056128" ref_url="https://bugzilla.suse.com/1056128" source="BUGZILLA"/>
		<reference ref_id="1056129" ref_url="https://bugzilla.suse.com/1056129" source="BUGZILLA"/>
		<reference ref_id="1056131" ref_url="https://bugzilla.suse.com/1056131" source="BUGZILLA"/>
		<reference ref_id="1056132" ref_url="https://bugzilla.suse.com/1056132" source="BUGZILLA"/>
		<reference ref_id="1056136" ref_url="https://bugzilla.suse.com/1056136" source="BUGZILLA"/>
		<reference ref_id="1069530" ref_url="https://bugzilla.suse.com/1069530" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13728" ref_url="https://www.suse.com/security/cve/CVE-2017-13728/" source="CVE"/>
		<reference ref_id="CVE-2017-13729" ref_url="https://www.suse.com/security/cve/CVE-2017-13729/" source="CVE"/>
		<reference ref_id="CVE-2017-13730" ref_url="https://www.suse.com/security/cve/CVE-2017-13730/" source="CVE"/>
		<reference ref_id="CVE-2017-13731" ref_url="https://www.suse.com/security/cve/CVE-2017-13731/" source="CVE"/>
		<reference ref_id="CVE-2017-13732" ref_url="https://www.suse.com/security/cve/CVE-2017-13732/" source="CVE"/>
		<reference ref_id="CVE-2017-13733" ref_url="https://www.suse.com/security/cve/CVE-2017-13733/" source="CVE"/>
		<reference ref_id="CVE-2017-16879" ref_url="https://www.suse.com/security/cve/CVE-2017-16879/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:

- CVE-2017-13728: Fix infinite loop in the next_char function in comp_scan.c (bsc#1056136).
- CVE-2017-13729: Fix illegal address access in the _nc_save_str (bsc#1056132).
- CVE-2017-13730: Fix illegal address access in the function _nc_read_entry_source() (bsc#1056131).
- CVE-2017-13731: Fix illegal address access in the function postprocess_termcap() (bsc#1056129).
- CVE-2017-13732: Fix illegal address access in the function dump_uses() (bsc#1056128).
- CVE-2017-13733: Fix illegal address access in the fmt_entry function (bsc#1056127).
- CVE-2017-16879: Fix stack-based buffer overflow in the _nc_write_entry() function (bsc#1069530).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-01"/>
	<updated date="2017-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056127">SUSE bug 1056127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056128">SUSE bug 1056128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056129">SUSE bug 1056129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056131">SUSE bug 1056131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056132">SUSE bug 1056132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056136">SUSE bug 1056136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069530">SUSE bug 1069530</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13728/">CVE-2017-13728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13728">CVE-2017-13728 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13729/">CVE-2017-13729 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13729">CVE-2017-13729 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13730/">CVE-2017-13730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13730">CVE-2017-13730 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13731/">CVE-2017-13731 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13731">CVE-2017-13731 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13732/">CVE-2017-13732 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13732">CVE-2017-13732 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13733/">CVE-2017-13733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13733">CVE-2017-13733 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16879/">CVE-2017-16879 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16879">CVE-2017-16879 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572750" comment="libncurses5-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572751" comment="libncurses5-32bit-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572752" comment="libncurses6-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572753" comment="libncurses6-32bit-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572754" comment="ncurses-devel-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565011" comment="ncurses-devel-32bit-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572755" comment="ncurses-utils-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572756" comment="tack-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572757" comment="terminfo-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572758" comment="terminfo-base-5.6-93.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217513" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1056127" ref_url="https://bugzilla.suse.com/1056127" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13733" ref_url="https://www.suse.com/security/cve/CVE-2017-13733/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

Security issue fixed:

- CVE-2017-13733: Fix illegal address access in the fmt_entry function (bsc#1056127).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-23"/>
	<updated date="2018-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056127">SUSE bug 1056127</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13733/">CVE-2017-13733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13733">CVE-2017-13733 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572759" comment="libncurses5-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572760" comment="libncurses5-32bit-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572761" comment="libncurses6-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572762" comment="libncurses6-32bit-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572763" comment="ncurses-devel-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565014" comment="ncurses-devel-32bit-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572764" comment="ncurses-utils-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572765" comment="tack-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572766" comment="terminfo-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572767" comment="terminfo-base-5.6-93.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217514" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1056126" ref_url="https://bugzilla.suse.com/1056126" source="BUGZILLA"/>
		<reference ref_id="1056127" ref_url="https://bugzilla.suse.com/1056127" source="BUGZILLA"/>
		<reference ref_id="1056128" ref_url="https://bugzilla.suse.com/1056128" source="BUGZILLA"/>
		<reference ref_id="1056129" ref_url="https://bugzilla.suse.com/1056129" source="BUGZILLA"/>
		<reference ref_id="1056131" ref_url="https://bugzilla.suse.com/1056131" source="BUGZILLA"/>
		<reference ref_id="1056132" ref_url="https://bugzilla.suse.com/1056132" source="BUGZILLA"/>
		<reference ref_id="1056136" ref_url="https://bugzilla.suse.com/1056136" source="BUGZILLA"/>
		<reference ref_id="1131830" ref_url="https://bugzilla.suse.com/1131830" source="BUGZILLA"/>
		<reference ref_id="1154037" ref_url="https://bugzilla.suse.com/1154037" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13728" ref_url="https://www.suse.com/security/cve/CVE-2017-13728/" source="CVE"/>
		<reference ref_id="CVE-2017-13729" ref_url="https://www.suse.com/security/cve/CVE-2017-13729/" source="CVE"/>
		<reference ref_id="CVE-2017-13730" ref_url="https://www.suse.com/security/cve/CVE-2017-13730/" source="CVE"/>
		<reference ref_id="CVE-2017-13731" ref_url="https://www.suse.com/security/cve/CVE-2017-13731/" source="CVE"/>
		<reference ref_id="CVE-2017-13732" ref_url="https://www.suse.com/security/cve/CVE-2017-13732/" source="CVE"/>
		<reference ref_id="CVE-2017-13733" ref_url="https://www.suse.com/security/cve/CVE-2017-13733/" source="CVE"/>
		<reference ref_id="CVE-2017-13734" ref_url="https://www.suse.com/security/cve/CVE-2017-13734/" source="CVE"/>
		<reference ref_id="CVE-2018-10754" ref_url="https://www.suse.com/security/cve/CVE-2018-10754/" source="CVE"/>
		<reference ref_id="CVE-2019-17595" ref_url="https://www.suse.com/security/cve/CVE-2019-17595/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:

- CVE-2017-13728: Fixed an infinite loop in the next_char function (bsc#1056136).
- CVE-2017-13729: Fixed an illegal address access in the _nc_save_str (bsc#1056132).
- CVE-2017-13730: Fixed an illegal address access in the function _nc_read_entry_source (bsc#1056131).
- CVE-2017-13731: Fixed an illegal address access in the function postprocess_termcap (bsc#1056129).
- CVE-2017-13732: Fixed an illegal address access in the function dump_uses (bsc#1056128).
- CVE-2017-13733: Fixed an illegal address access in the fmt_entry function (bsc#1056127).
- CVE-2017-13734: Fixed an illegal address access in the _nc_safe_strcat (bsc#1056126).
- CVE-2018-10754: Fixed a denial of service caused by a NULL Pointer Dereference in the _nc_parse_entry() (bsc#1131830).
- CVE-2019-17595: Fixed a heap-based buffer over-read in the fmt_entry function (bsc#1154037)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056126">SUSE bug 1056126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056127">SUSE bug 1056127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056128">SUSE bug 1056128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056129">SUSE bug 1056129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056131">SUSE bug 1056131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056132">SUSE bug 1056132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056136">SUSE bug 1056136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131830">SUSE bug 1131830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154037">SUSE bug 1154037</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13728/">CVE-2017-13728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13728">CVE-2017-13728 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13729/">CVE-2017-13729 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13729">CVE-2017-13729 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13730/">CVE-2017-13730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13730">CVE-2017-13730 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13731/">CVE-2017-13731 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13731">CVE-2017-13731 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13732/">CVE-2017-13732 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13732">CVE-2017-13732 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13733/">CVE-2017-13733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13733">CVE-2017-13733 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13734/">CVE-2017-13734 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13734">CVE-2017-13734 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10754/">CVE-2018-10754 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10754">CVE-2018-10754 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17595/">CVE-2019-17595 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17595">CVE-2019-17595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572768" comment="libncurses5-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572769" comment="libncurses5-32bit-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572770" comment="libncurses6-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572771" comment="libncurses6-32bit-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572772" comment="ncurses-devel-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572773" comment="ncurses-devel-32bit-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572774" comment="ncurses-utils-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572775" comment="tack-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572776" comment="terminfo-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572777" comment="terminfo-base-5.6-93.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217515" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1115929" ref_url="https://bugzilla.suse.com/1115929" source="BUGZILLA"/>
		<reference ref_id="1121450" ref_url="https://bugzilla.suse.com/1121450" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19211" ref_url="https://www.suse.com/security/cve/CVE-2018-19211/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

Security issue fixed:

- CVE-2018-19211: Fixed NULL pointer dereference at function _nc_parse_entry in parse_entry.c (bsc#1115929).

Bug fixes:

- Modify bsc#1115929 patch to fix change in form_driver() that breaks ncurses-5.9 and the variable move_after_insert of ncurses-6.1 (bsc#1121450).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-11"/>
	<updated date="2019-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115929">SUSE bug 1115929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121450">SUSE bug 1121450</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19211/">CVE-2018-19211 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19211">CVE-2018-19211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572778" comment="libncurses5-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572779" comment="libncurses5-32bit-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572780" comment="libncurses6-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572781" comment="libncurses6-32bit-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572782" comment="ncurses-devel-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572783" comment="ncurses-devel-32bit-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572784" comment="ncurses-utils-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572785" comment="tack-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572786" comment="terminfo-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572787" comment="terminfo-base-5.6-93.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217516" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1190793" ref_url="https://bugzilla.suse.com/1190793" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39537" ref_url="https://www.suse.com/security/cve/CVE-2021-39537/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

- CVE-2021-39537: Fixed an heap-based buffer overflow in _nc_captoinfo. (bsc#1190793)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-18"/>
	<updated date="2021-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190793">SUSE bug 1190793</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39537/">CVE-2021-39537 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">CVE-2021-39537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652290" comment="libncurses5-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652291" comment="libncurses5-32bit-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652292" comment="libncurses6-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652293" comment="libncurses6-32bit-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652294" comment="ncurses-devel-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652295" comment="ncurses-devel-32bit-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652296" comment="ncurses-utils-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652297" comment="tack-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652298" comment="terminfo-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652299" comment="terminfo-base-5.6-93.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217517" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="853382" ref_url="https://bugzilla.suse.com/853382" source="BUGZILLA"/>
		<reference ref_id="935863" ref_url="https://bugzilla.suse.com/935863" source="BUGZILLA"/>
		<reference ref_id="940188" ref_url="https://bugzilla.suse.com/940188" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621/" source="CVE"/>
		<description>
net-snmp was updated to fix one security vulnerability and several bugs.

- fix a vulnerability within the snmp_pdu_parse() function of snmp_api.c. (bnc#940188, CVE-2015-5621) 
- Add build requirement 'procps' to fix a net-snmp-config error. (bsc#935863)
- add support for /dev/shm in snmp hostmib (bnc#853382, FATE#316893).
- stop snmptrapd on package removal.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-17"/>
	<updated date="2015-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/853382">SUSE bug 853382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935863">SUSE bug 935863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940188">SUSE bug 940188</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5621">CVE-2015-5621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572788" comment="libsnmp15-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563731" comment="libsnmp15-32bit-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572789" comment="net-snmp-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572790" comment="perl-SNMP-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572791" comment="snmp-mibs-5.4.2.1-8.12.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217518" version="1" class="patch">
	<metadata>
		<title>Security update for netpbm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1024287" ref_url="https://bugzilla.suse.com/1024287" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2581" ref_url="https://www.suse.com/security/cve/CVE-2017-2581/" source="CVE"/>
		<description>
This update for netpbm fixes the following security issues:

- CVE-2017-2581: An out-of-bounds write in writeRasterPbm() could lead to memory corruption and potential code execution. (bsc#1024287)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-15"/>
	<updated date="2017-06-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024287">SUSE bug 1024287</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2581/">CVE-2017-2581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2581">CVE-2017-2581 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572792" comment="libnetpbm10-10.26.44-101.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572793" comment="libnetpbm10-32bit-10.26.44-101.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572794" comment="netpbm-10.26.44-101.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217519" version="1" class="patch">
	<metadata>
		<title>Security update for netpbm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1024288" ref_url="https://bugzilla.suse.com/1024288" source="BUGZILLA"/>
		<reference ref_id="1024291" ref_url="https://bugzilla.suse.com/1024291" source="BUGZILLA"/>
		<reference ref_id="1136936" ref_url="https://bugzilla.suse.com/1136936" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2579" ref_url="https://www.suse.com/security/cve/CVE-2017-2579/" source="CVE"/>
		<reference ref_id="CVE-2017-2580" ref_url="https://www.suse.com/security/cve/CVE-2017-2580/" source="CVE"/>
		<description>
This update for netpbm fixes the following issues:

Security issues fixed:

- CVE-2017-2579: Fixed out-of-bounds read in expandCodeOntoStack() (bsc#1024288).
- CVE-2017-2580: Fixed out-of-bounds write of heap data in addPixelToRaster() function (bsc#1024291).
- created a netpbm-vulnerable subpackage and move pstopnm there, as it uses ghostscript for conversion (bsc#1136936)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024288">SUSE bug 1024288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024291">SUSE bug 1024291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136936">SUSE bug 1136936</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2579/">CVE-2017-2579 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2579">CVE-2017-2579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2580/">CVE-2017-2580 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2580">CVE-2017-2580 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572795" comment="libnetpbm10-10.26.44-101.15.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572796" comment="libnetpbm10-32bit-10.26.44-101.15.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572797" comment="netpbm-10.26.44-101.15.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217520" version="1" class="patch">
	<metadata>
		<title>Security update for nfs-client</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="648923" ref_url="https://bugzilla.suse.com/648923" source="BUGZILLA"/>
		<reference ref_id="663952" ref_url="https://bugzilla.suse.com/663952" source="BUGZILLA"/>
		<reference ref_id="666128" ref_url="https://bugzilla.suse.com/666128" source="BUGZILLA"/>
		<reference ref_id="670449" ref_url="https://bugzilla.suse.com/670449" source="BUGZILLA"/>
		<reference ref_id="680978" ref_url="https://bugzilla.suse.com/680978" source="BUGZILLA"/>
		<reference ref_id="687026" ref_url="https://bugzilla.suse.com/687026" source="BUGZILLA"/>
		<reference ref_id="689622" ref_url="https://bugzilla.suse.com/689622" source="BUGZILLA"/>
		<reference ref_id="689799" ref_url="https://bugzilla.suse.com/689799" source="BUGZILLA"/>
		<reference ref_id="701702" ref_url="https://bugzilla.suse.com/701702" source="BUGZILLA"/>
		<reference ref_id="733761" ref_url="https://bugzilla.suse.com/733761" source="BUGZILLA"/>
		<reference ref_id="743292" ref_url="https://bugzilla.suse.com/743292" source="BUGZILLA"/>
		<reference ref_id="752537" ref_url="https://bugzilla.suse.com/752537" source="BUGZILLA"/>
		<reference ref_id="756479" ref_url="https://bugzilla.suse.com/756479" source="BUGZILLA"/>
		<reference ref_id="813464" ref_url="https://bugzilla.suse.com/813464" source="BUGZILLA"/>
		<reference ref_id="816897" ref_url="https://bugzilla.suse.com/816897" source="BUGZILLA"/>
		<reference ref_id="818094" ref_url="https://bugzilla.suse.com/818094" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1749" ref_url="https://www.suse.com/security/cve/CVE-2011-1749/" source="CVE"/>
		<reference ref_id="CVE-2011-2500" ref_url="https://www.suse.com/security/cve/CVE-2011-2500/" source="CVE"/>
		<reference ref_id="CVE-2013-1923" ref_url="https://www.suse.com/security/cve/CVE-2013-1923/" source="CVE"/>
		<description>

This update fixes a DNS spoofing problem with NFS rpc-gssd. 
(CVE-2013-1923)(bnc#813464)
It also adds MOUNTD_OPTIONS and GSSD_OPTIONS to /etc/sysconfig/nfs. 
(bnc#818094, bnc#816897)

Security Issue reference:

    * CVE-2013-1923
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1923&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-21"/>
	<updated date="2013-05-21"/>
	<bugzilla href="https://bugzilla.suse.com/648923">SUSE bug 648923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/663952">SUSE bug 663952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/666128">SUSE bug 666128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/670449">SUSE bug 670449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/680978">SUSE bug 680978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/687026">SUSE bug 687026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/689622">SUSE bug 689622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/689799">SUSE bug 689799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/701702">SUSE bug 701702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/733761">SUSE bug 733761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/743292">SUSE bug 743292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752537">SUSE bug 752537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/756479">SUSE bug 756479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813464">SUSE bug 813464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816897">SUSE bug 816897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818094">SUSE bug 818094</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1749/">CVE-2011-1749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1749">CVE-2011-1749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2500/">CVE-2011-2500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2500">CVE-2011-2500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1923/">CVE-2013-1923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1923">CVE-2013-1923 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992261" comment="nfs-client-1.2.1-2.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992262" comment="nfs-doc-1.2.1-2.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992263" comment="nfs-kernel-server-1.2.1-2.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217521" version="1" class="patch">
	<metadata>
		<title>Security update for nmap (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1104139" ref_url="https://bugzilla.suse.com/1104139" source="BUGZILLA"/>
		<reference ref_id="1135350" ref_url="https://bugzilla.suse.com/1135350" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15173" ref_url="https://www.suse.com/security/cve/CVE-2018-15173/" source="CVE"/>
		<description>
This update for nmap fixes the following issues:

Security issue fixed:

- CVE-2018-15173: Fixed a remote denial of service attack via a crafted TCP-based service (bsc#1104139).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-20"/>
	<updated date="2019-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104139">SUSE bug 1104139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135350">SUSE bug 1135350</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15173/">CVE-2018-15173 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15173">CVE-2018-15173 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572798" comment="nmap-4.75-1.30.5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217522" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="850148" ref_url="https://bugzilla.suse.com/850148" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1741" ref_url="https://www.suse.com/security/cve/CVE-2013-1741/" source="CVE"/>
		<reference ref_id="CVE-2013-5605" ref_url="https://www.suse.com/security/cve/CVE-2013-5605/" source="CVE"/>
		<reference ref_id="CVE-2013-5606" ref_url="https://www.suse.com/security/cve/CVE-2013-5606/" source="CVE"/>
		<reference ref_id="CVE-2013-5607" ref_url="https://www.suse.com/security/cve/CVE-2013-5607/" source="CVE"/>
		<description>

Mozilla NSPR and NSS were updated to fix various security bugs that could 
be used to crash the browser or potentially execute code.

Mozilla NSPR 4.10.2 has the following bug fixes:

    * Bug 770534: Possible pointer overflow in PL_ArenaAllocate(). Fixed by
      Pascal Cuoq and Kamil Dudka.
    * Bug 888546: ptio.c:PR_ImportUDPSocket doesn't work. Fixed by Miloslav
      Trmac.
    * Bug 915522: VS2013 support for NSPR. Fixed by Makoto Kato.
    * Bug 927687: Avoid unsigned integer wrapping in PL_ArenaAllocate.
      (CVE-2013-5607)

Mozilla NSS 3.15.3 is a patch release for NSS 3.15 and includes the 
following bug fixes:

    * Bug 925100: Ensure a size is &lt;= half of the maximum PRUint32 value.
      (CVE-2013-1741)
    * Bug 934016: Handle invalid handshake packets. (CVE-2013-5605)
    * Bug 910438: Return the correct result in CERT_VerifyCert on failure,
      if a verifyLog isn't used. (CVE-2013-5606)

Security Issue references:

    * CVE-2013-1741
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741&gt;
    * CVE-2013-5605
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605&gt;
    * CVE-2013-5606
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606&gt;
    * CVE-2013-5607
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5607&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-21"/>
	<updated date="2013-11-21"/>
	<bugzilla href="https://bugzilla.suse.com/850148">SUSE bug 850148</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1741/">CVE-2013-1741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1741">CVE-2013-1741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5605/">CVE-2013-5605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5605">CVE-2013-5605 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5606/">CVE-2013-5606 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5606">CVE-2013-5606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5607/">CVE-2013-5607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5607">CVE-2013-5607 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572799" comment="libfreebl3-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572800" comment="libfreebl3-32bit-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572801" comment="mozilla-nspr-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572802" comment="mozilla-nspr-32bit-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572803" comment="mozilla-nss-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572804" comment="mozilla-nss-32bit-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572805" comment="mozilla-nss-tools-3.15.3-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572799" comment="libfreebl3-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572800" comment="libfreebl3-32bit-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572801" comment="mozilla-nspr-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572802" comment="mozilla-nspr-32bit-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572803" comment="mozilla-nss-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572804" comment="mozilla-nss-32bit-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572805" comment="mozilla-nss-tools-3.15.3-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217523" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="854367" ref_url="https://bugzilla.suse.com/854367" source="BUGZILLA"/>
		<description>

Mozilla NSS was updated to the 3.15.3.1 security release.

The update blacklists an intermediate CA that was used to create 
man-in-the-middle certificates.

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-13"/>
	<updated date="2013-12-13"/>
	<bugzilla href="https://bugzilla.suse.com/854367">SUSE bug 854367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572806" comment="libfreebl3-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566163" comment="libfreebl3-32bit-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572807" comment="mozilla-nss-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566165" comment="mozilla-nss-32bit-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572808" comment="mozilla-nss-tools-3.15.3.1-0.4.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217524" version="1" class="patch">
	<metadata>
		<title>Security update for libfreebl3</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="714931" ref_url="https://bugzilla.suse.com/714931" source="BUGZILLA"/>
		<description>

This update updates Mozilla NSS to 3.12.11.

The update marks the compromised DigiNotar Certificate Authority as 
untrusted

For more information read:

MFSA 2011-34
&lt;http://www.mozilla.org/security/announce/2011/mfsa2011-34.html&gt;

    * update to 3.12.10
          o root CA changes
          o filter certain bogus certs (bmo#642815)
          o fix minor memory leaks
          o other bugfixes
    * update to 3.12.9
          o fix minor memory leaks (bmo#619268)
          o fix crash in nss_cms_decoder_work_data (bmo#607058)
          o fix crash in certutil (bmo#620908)
          o handle invalid argument in JPAKE (bmo#609068)
          o J-PAKE support (API requirement for Firefox &gt;= 4.0b8)
    * replaced expired PayPal test certificate (fixing testsuite)
    * removed DigiNotar root certifiate from trusted db (bmo#682927)

This update also brings the prerequired Mozilla NSPR to version 4.8.9.

    * update to 4.8.9
    * update to 4.8.8
          o support IPv6 on Android (bmo#626866)
          o use AI_ADDRCONFIG for loopback hostnames (bmo#614526)
          o support SDP sockets (bmo#518078)
          o support m32r architecture (bmo#635667)
          o use atomic functions on ARM (bmo#626309)
          o some other fixes not affecting the Linux platform

		</description>
<advisory from="security@suse.de">
	<issued date="2011-09-05"/>
	<updated date="2011-09-05"/>
	<bugzilla href="https://bugzilla.suse.com/714931">SUSE bug 714931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992264" comment="libfreebl3-3.12.11-3.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992265" comment="libfreebl3-32bit-3.12.11-3.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992266" comment="mozilla-nspr-4.8.9-1.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992267" comment="mozilla-nspr-32bit-4.8.9-1.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992268" comment="mozilla-nss-3.12.11-3.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992269" comment="mozilla-nss-32bit-3.12.11-3.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992270" comment="mozilla-nss-tools-3.12.11-3.2.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217525" version="1" class="patch">
	<metadata>
		<title>Security update for ntp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="611513" ref_url="https://bugzilla.suse.com/611513" source="BUGZILLA"/>
		<reference ref_id="645356" ref_url="https://bugzilla.suse.com/645356" source="BUGZILLA"/>
		<reference ref_id="656345" ref_url="https://bugzilla.suse.com/656345" source="BUGZILLA"/>
		<reference ref_id="680301" ref_url="https://bugzilla.suse.com/680301" source="BUGZILLA"/>
		<reference ref_id="692969" ref_url="https://bugzilla.suse.com/692969" source="BUGZILLA"/>
		<reference ref_id="730374" ref_url="https://bugzilla.suse.com/730374" source="BUGZILLA"/>
		<reference ref_id="734467" ref_url="https://bugzilla.suse.com/734467" source="BUGZILLA"/>
		<reference ref_id="758253" ref_url="https://bugzilla.suse.com/758253" source="BUGZILLA"/>
		<reference ref_id="771480" ref_url="https://bugzilla.suse.com/771480" source="BUGZILLA"/>
		<reference ref_id="817893" ref_url="https://bugzilla.suse.com/817893" source="BUGZILLA"/>
		<reference ref_id="838458" ref_url="https://bugzilla.suse.com/838458" source="BUGZILLA"/>
		<reference ref_id="857195" ref_url="https://bugzilla.suse.com/857195" source="BUGZILLA"/>
		<reference ref_id="910764" ref_url="https://bugzilla.suse.com/910764" source="BUGZILLA"/>
		<reference ref_id="911792" ref_url="https://bugzilla.suse.com/911792" source="BUGZILLA"/>
		<reference ref_id="924202" ref_url="https://bugzilla.suse.com/924202" source="BUGZILLA"/>
		<reference ref_id="928321" ref_url="https://bugzilla.suse.com/928321" source="BUGZILLA"/>
		<reference ref_id="935409" ref_url="https://bugzilla.suse.com/935409" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5211" ref_url="https://www.suse.com/security/cve/CVE-2013-5211/" source="CVE"/>
		<reference ref_id="CVE-2014-9293" ref_url="https://www.suse.com/security/cve/CVE-2014-9293/" source="CVE"/>
		<reference ref_id="CVE-2014-9294" ref_url="https://www.suse.com/security/cve/CVE-2014-9294/" source="CVE"/>
		<reference ref_id="CVE-2014-9295" ref_url="https://www.suse.com/security/cve/CVE-2014-9295/" source="CVE"/>
		<reference ref_id="CVE-2014-9297" ref_url="https://www.suse.com/security/cve/CVE-2014-9297/" source="CVE"/>
		<reference ref_id="CVE-2014-9298" ref_url="https://www.suse.com/security/cve/CVE-2014-9298/" source="CVE"/>
		<reference ref_id="CVE-2015-1799" ref_url="https://www.suse.com/security/cve/CVE-2015-1799/" source="CVE"/>
		<reference ref_id="CVE-2015-3405" ref_url="https://www.suse.com/security/cve/CVE-2015-3405/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0259-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001229.html" source="SUSE-SU"/>
		<description>

The NTP time service could have been used for remote denial of service 
amplification attacks.

This issue can be fixed by the administrator as we described in our 
security advisory SUSE-SA:2014:001

http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00005.html
&lt;http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00005.html&gt;

and on

http://support.novell.com/security/cve/CVE-2013-5211.html
&lt;http://support.novell.com/security/cve/CVE-2013-5211.html&gt;

this update now also replaces the default ntp.conf template to fix this 
problem.

Please note that if you have touched or modified ntp.conf yourself, it will 
not be automatically fixed, you need to merge the changes manually as 
described.

Additionally the following bug has been fixed:

    * ntp start script does not update /var/lib/ntp/etc/localtime file if
      /etc/localtime is symlink (bnc#838458)

Security Issues:

    * CVE-2013-5211
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5211&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-21"/>
	<updated date="2014-07-21"/>
	<bugzilla href="https://bugzilla.suse.com/611513">SUSE bug 611513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/645356">SUSE bug 645356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/656345">SUSE bug 656345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/680301">SUSE bug 680301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/692969">SUSE bug 692969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/730374">SUSE bug 730374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/734467">SUSE bug 734467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758253">SUSE bug 758253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/771480">SUSE bug 771480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817893">SUSE bug 817893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/838458">SUSE bug 838458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857195">SUSE bug 857195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910764">SUSE bug 910764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924202">SUSE bug 924202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928321">SUSE bug 928321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935409">SUSE bug 935409</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5211/">CVE-2013-5211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5211">CVE-2013-5211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9293/">CVE-2014-9293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9293">CVE-2014-9293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9294/">CVE-2014-9294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9294">CVE-2014-9294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9295/">CVE-2014-9295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9295">CVE-2014-9295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9297/">CVE-2014-9297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9297">CVE-2014-9297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9298/">CVE-2014-9298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9298">CVE-2014-9298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1799/">CVE-2015-1799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1799">CVE-2015-1799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3405/">CVE-2015-3405 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3405">CVE-2015-3405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992271" comment="ntp-4.2.4p8-1.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992272" comment="ntp-doc-4.2.4p8-1.24.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992271" comment="ntp-4.2.4p8-1.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992272" comment="ntp-doc-4.2.4p8-1.24.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217526" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="782060" ref_url="https://bugzilla.suse.com/782060" source="BUGZILLA"/>
		<reference ref_id="784760" ref_url="https://bugzilla.suse.com/784760" source="BUGZILLA"/>
		<reference ref_id="905885" ref_url="https://bugzilla.suse.com/905885" source="BUGZILLA"/>
		<reference ref_id="910063" ref_url="https://bugzilla.suse.com/910063" source="BUGZILLA"/>
		<reference ref_id="916617" ref_url="https://bugzilla.suse.com/916617" source="BUGZILLA"/>
		<reference ref_id="920183" ref_url="https://bugzilla.suse.com/920183" source="BUGZILLA"/>
		<reference ref_id="920238" ref_url="https://bugzilla.suse.com/920238" source="BUGZILLA"/>
		<reference ref_id="926510" ref_url="https://bugzilla.suse.com/926510" source="BUGZILLA"/>
		<reference ref_id="936327" ref_url="https://bugzilla.suse.com/936327" source="BUGZILLA"/>
		<reference ref_id="937837" ref_url="https://bugzilla.suse.com/937837" source="BUGZILLA"/>
		<reference ref_id="942441" ref_url="https://bugzilla.suse.com/942441" source="BUGZILLA"/>
		<reference ref_id="942587" ref_url="https://bugzilla.suse.com/942587" source="BUGZILLA"/>
		<reference ref_id="943216" ref_url="https://bugzilla.suse.com/943216" source="BUGZILLA"/>
		<reference ref_id="943218" ref_url="https://bugzilla.suse.com/943218" source="BUGZILLA"/>
		<reference ref_id="944300" ref_url="https://bugzilla.suse.com/944300" source="BUGZILLA"/>
		<reference ref_id="946386" ref_url="https://bugzilla.suse.com/946386" source="BUGZILLA"/>
		<reference ref_id="951351" ref_url="https://bugzilla.suse.com/951351" source="BUGZILLA"/>
		<reference ref_id="951559" ref_url="https://bugzilla.suse.com/951559" source="BUGZILLA"/>
		<reference ref_id="951608" ref_url="https://bugzilla.suse.com/951608" source="BUGZILLA"/>
		<reference ref_id="951629" ref_url="https://bugzilla.suse.com/951629" source="BUGZILLA"/>
		<reference ref_id="954982" ref_url="https://bugzilla.suse.com/954982" source="BUGZILLA"/>
		<reference ref_id="956773" ref_url="https://bugzilla.suse.com/956773" source="BUGZILLA"/>
		<reference ref_id="962318" ref_url="https://bugzilla.suse.com/962318" source="BUGZILLA"/>
		<reference ref_id="962784" ref_url="https://bugzilla.suse.com/962784" source="BUGZILLA"/>
		<reference ref_id="962802" ref_url="https://bugzilla.suse.com/962802" source="BUGZILLA"/>
		<reference ref_id="962960" ref_url="https://bugzilla.suse.com/962960" source="BUGZILLA"/>
		<reference ref_id="962966" ref_url="https://bugzilla.suse.com/962966" source="BUGZILLA"/>
		<reference ref_id="962970" ref_url="https://bugzilla.suse.com/962970" source="BUGZILLA"/>
		<reference ref_id="962988" ref_url="https://bugzilla.suse.com/962988" source="BUGZILLA"/>
		<reference ref_id="962994" ref_url="https://bugzilla.suse.com/962994" source="BUGZILLA"/>
		<reference ref_id="962995" ref_url="https://bugzilla.suse.com/962995" source="BUGZILLA"/>
		<reference ref_id="962997" ref_url="https://bugzilla.suse.com/962997" source="BUGZILLA"/>
		<reference ref_id="963000" ref_url="https://bugzilla.suse.com/963000" source="BUGZILLA"/>
		<reference ref_id="963002" ref_url="https://bugzilla.suse.com/963002" source="BUGZILLA"/>
		<reference ref_id="975496" ref_url="https://bugzilla.suse.com/975496" source="BUGZILLA"/>
		<reference ref_id="975981" ref_url="https://bugzilla.suse.com/975981" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5194" ref_url="https://www.suse.com/security/cve/CVE-2015-5194/" source="CVE"/>
		<reference ref_id="CVE-2015-5219" ref_url="https://www.suse.com/security/cve/CVE-2015-5219/" source="CVE"/>
		<reference ref_id="CVE-2015-5300" ref_url="https://www.suse.com/security/cve/CVE-2015-5300/" source="CVE"/>
		<reference ref_id="CVE-2015-7691" ref_url="https://www.suse.com/security/cve/CVE-2015-7691/" source="CVE"/>
		<reference ref_id="CVE-2015-7692" ref_url="https://www.suse.com/security/cve/CVE-2015-7692/" source="CVE"/>
		<reference ref_id="CVE-2015-7701" ref_url="https://www.suse.com/security/cve/CVE-2015-7701/" source="CVE"/>
		<reference ref_id="CVE-2015-7702" ref_url="https://www.suse.com/security/cve/CVE-2015-7702/" source="CVE"/>
		<reference ref_id="CVE-2015-7703" ref_url="https://www.suse.com/security/cve/CVE-2015-7703/" source="CVE"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<reference ref_id="CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705/" source="CVE"/>
		<reference ref_id="CVE-2015-7848" ref_url="https://www.suse.com/security/cve/CVE-2015-7848/" source="CVE"/>
		<reference ref_id="CVE-2015-7849" ref_url="https://www.suse.com/security/cve/CVE-2015-7849/" source="CVE"/>
		<reference ref_id="CVE-2015-7850" ref_url="https://www.suse.com/security/cve/CVE-2015-7850/" source="CVE"/>
		<reference ref_id="CVE-2015-7851" ref_url="https://www.suse.com/security/cve/CVE-2015-7851/" source="CVE"/>
		<reference ref_id="CVE-2015-7852" ref_url="https://www.suse.com/security/cve/CVE-2015-7852/" source="CVE"/>
		<reference ref_id="CVE-2015-7853" ref_url="https://www.suse.com/security/cve/CVE-2015-7853/" source="CVE"/>
		<reference ref_id="CVE-2015-7854" ref_url="https://www.suse.com/security/cve/CVE-2015-7854/" source="CVE"/>
		<reference ref_id="CVE-2015-7855" ref_url="https://www.suse.com/security/cve/CVE-2015-7855/" source="CVE"/>
		<reference ref_id="CVE-2015-7871" ref_url="https://www.suse.com/security/cve/CVE-2015-7871/" source="CVE"/>
		<reference ref_id="CVE-2015-7973" ref_url="https://www.suse.com/security/cve/CVE-2015-7973/" source="CVE"/>
		<reference ref_id="CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974/" source="CVE"/>
		<reference ref_id="CVE-2015-7975" ref_url="https://www.suse.com/security/cve/CVE-2015-7975/" source="CVE"/>
		<reference ref_id="CVE-2015-7976" ref_url="https://www.suse.com/security/cve/CVE-2015-7976/" source="CVE"/>
		<reference ref_id="CVE-2015-7977" ref_url="https://www.suse.com/security/cve/CVE-2015-7977/" source="CVE"/>
		<reference ref_id="CVE-2015-7978" ref_url="https://www.suse.com/security/cve/CVE-2015-7978/" source="CVE"/>
		<reference ref_id="CVE-2015-7979" ref_url="https://www.suse.com/security/cve/CVE-2015-7979/" source="CVE"/>
		<reference ref_id="CVE-2015-8138" ref_url="https://www.suse.com/security/cve/CVE-2015-8138/" source="CVE"/>
		<reference ref_id="CVE-2015-8139" ref_url="https://www.suse.com/security/cve/CVE-2015-8139/" source="CVE"/>
		<reference ref_id="CVE-2015-8140" ref_url="https://www.suse.com/security/cve/CVE-2015-8140/" source="CVE"/>
		<reference ref_id="CVE-2015-8158" ref_url="https://www.suse.com/security/cve/CVE-2015-8158/" source="CVE"/>
		<description>

This network time protocol server ntp was updated to 4.2.8p6 to fix the following
issues:

Also yast2-ntp-client was updated to match some sntp syntax changes. (bsc#937837)

Major functional changes:
- The 'sntp' commandline tool changed its option handling in a major way.
- 'controlkey 1' is added during update to ntp.conf to allow sntp to work.
- The local clock is being disabled during update.
- ntpd is no longer running chrooted.


Other functional changes:
- ntp-signd is installed.
- 'enable mode7' can be added to the configuration to allow ntdpc to work as compatibility mode option.
- 'kod' was removed from the default restrictions.
- SHA1 keys are used by default instead of MD5 keys.

These security issues were fixed:
- CVE-2015-5219: An endless loop due to incorrect precision to double conversion (bsc#943216).
- CVE-2015-8158: Fixed potential infinite loop in ntpq (bsc#962966).
- CVE-2015-8138: Zero Origin Timestamp Bypass (bsc#963002).
- CVE-2015-7979: Off-path Denial of Service (DoS) attack on authenticated broadcast mode (bsc#962784).
- CVE-2015-7978: Stack exhaustion in recursive traversal of restriction list (bsc#963000).
- CVE-2015-7977: reslist NULL pointer dereference (bsc#962970).
- CVE-2015-7976: ntpq saveconfig command allows dangerous characters in filenames (bsc#962802).
- CVE-2015-7975: nextvar() missing length check (bsc#962988).
- CVE-2015-7974: Skeleton Key: Missing key check allows impersonation between authenticated peers (bsc#962960).
- CVE-2015-7973: Replay attack on authenticated broadcast mode (bsc#962995).
- CVE-2015-8140: ntpq vulnerable to replay attacks (bsc#962994).
- CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin (bsc#962997).
- CVE-2015-5300: MITM attacker could have forced ntpd to make a step larger than the panic threshold (bsc#951629).
- CVE-2015-7871: NAK to the Future: Symmetric association authentication bypass via crypto-NAK (bsc#951608).
- CVE-2015-7855: decodenetnum() will ASSERT botch instead of returning FAIL on some bogus values (bsc#951608).
- CVE-2015-7854: Password Length Memory Corruption Vulnerability (bsc#951608).
- CVE-2015-7853: Invalid length data provided by a custom refclock driver could cause a buffer overflow (bsc#951608).
- CVE-2015-7852: ntpq atoascii() Memory Corruption Vulnerability (bsc#951608).
- CVE-2015-7851: saveconfig Directory Traversal Vulnerability (bsc#951608).
- CVE-2015-7850: remote config logfile-keyfile (bsc#951608).
- CVE-2015-7849: trusted key use-after-free (bsc#951608).
- CVE-2015-7848: mode 7 loop counter underrun (bsc#951608).
- CVE-2015-7701: Slow memory leak in CRYPTO_ASSOC (bsc#951608).
- CVE-2015-7703: configuration directives 'pidfile' and 'driftfile' should only be allowed locally (bsc#951608).
- CVE-2015-7704, CVE-2015-7705: Clients that receive a KoD should validate the origin timestamp field (bsc#951608).
- CVE-2015-7691, CVE-2015-7692, CVE-2015-7702: Incomplete autokey data packet length checks (bsc#951608).

These non-security issues were fixed:
- fate#320758 bsc#975981: Enable compile-time support for MS-SNTP (--enable-ntp-signd).
  This replaces the w32 patches in 4.2.4 that added the authreg
  directive.
- bsc#962318: Call /usr/sbin/sntp with full path to synchronize in start-ntpd.
  When run as cron job, /usr/sbin/ is not in the path, which caused
  the synchronization to fail.
- bsc#782060: Speedup ntpq.
- bsc#916617: Add /var/db/ntp-kod.
- bsc#956773: Add ntp-ENOBUFS.patch to limit a warning that might happen quite a lot on loaded systems.
- bsc#951559,bsc#975496: Fix the TZ offset output of sntp during DST.
- Add ntp-fork.patch and build with threads disabled to allow name resolution even when running chrooted.
- Add a controlkey line to /etc/ntp.conf if one does not already exist to allow runtime configuuration via ntpq.
- bsc#946386: Temporarily disable memlock to avoid problems due to high memory usage during name resolution.
- bsc#905885: Use SHA1 instead of MD5 for symmetric keys.
- Improve runtime configuration:
  * Read keytype from ntp.conf
  * Don't write ntp keys to syslog.
- Fix legacy action scripts to pass on command line arguments.
- bsc#944300: Remove 'kod' from the restrict line in ntp.conf.
- bsc#936327: Use ntpq instead of deprecated ntpdc in start-ntpd.
- Don't let 'keysdir' lines in ntp.conf trigger the 'keys' parser.
- Disable mode 7 (ntpdc) again, now that we don't use it anymore.
- Add 'addserver' as a new legacy action.
- bsc#910063: Fix the comment regarding addserver in ntp.conf.
- bsc#926510: Disable chroot by default.
- bsc#920238: Enable ntpdc for backwards compatibility.
- bsc#784760: Remove local clock from default configuration.
- bsc#942441/fate#319496: Require perl-Socket6.
- Improve runtime configuration:
  * Read keytype from ntp.conf
  * Don't write ntp keys to syslog.
- bsc#920183: Allow -4 and -6 address qualifiers in 'server' directives.
- Use upstream ntp-wait, because our version is incompatible with
  the new ntpq command line syntax.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-17"/>
	<updated date="2016-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/782060">SUSE bug 782060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784760">SUSE bug 784760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905885">SUSE bug 905885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910063">SUSE bug 910063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916617">SUSE bug 916617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920183">SUSE bug 920183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920238">SUSE bug 920238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926510">SUSE bug 926510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936327">SUSE bug 936327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937837">SUSE bug 937837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942441">SUSE bug 942441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942587">SUSE bug 942587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943218">SUSE bug 943218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944300">SUSE bug 944300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946386">SUSE bug 946386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951351">SUSE bug 951351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951559">SUSE bug 951559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951629">SUSE bug 951629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954982">SUSE bug 954982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956773">SUSE bug 956773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962318">SUSE bug 962318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962784">SUSE bug 962784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962802">SUSE bug 962802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962960">SUSE bug 962960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962966">SUSE bug 962966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962970">SUSE bug 962970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962988">SUSE bug 962988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962994">SUSE bug 962994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962997">SUSE bug 962997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963000">SUSE bug 963000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963002">SUSE bug 963002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975496">SUSE bug 975496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975981">SUSE bug 975981</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5194/">CVE-2015-5194 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5194">CVE-2015-5194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5219/">CVE-2015-5219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5219">CVE-2015-5219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5300/">CVE-2015-5300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5300">CVE-2015-5300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7691/">CVE-2015-7691 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7691">CVE-2015-7691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7692/">CVE-2015-7692 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7692">CVE-2015-7692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7701/">CVE-2015-7701 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7701">CVE-2015-7701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7702/">CVE-2015-7702 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7702">CVE-2015-7702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7703/">CVE-2015-7703 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7703">CVE-2015-7703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7704">CVE-2015-7704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7705">CVE-2015-7705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7848/">CVE-2015-7848 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7848">CVE-2015-7848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7849/">CVE-2015-7849 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7849">CVE-2015-7849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7850/">CVE-2015-7850 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7850">CVE-2015-7850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7851/">CVE-2015-7851 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7851">CVE-2015-7851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7852/">CVE-2015-7852 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7852">CVE-2015-7852 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7853/">CVE-2015-7853 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7853">CVE-2015-7853 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7854/">CVE-2015-7854 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7854">CVE-2015-7854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7855/">CVE-2015-7855 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7855">CVE-2015-7855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7871/">CVE-2015-7871 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7871">CVE-2015-7871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7973/">CVE-2015-7973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7973">CVE-2015-7973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7974">CVE-2015-7974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7975/">CVE-2015-7975 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7975">CVE-2015-7975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7976/">CVE-2015-7976 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7976">CVE-2015-7976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7977/">CVE-2015-7977 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7977">CVE-2015-7977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7978/">CVE-2015-7978 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7978">CVE-2015-7978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7979/">CVE-2015-7979 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7979">CVE-2015-7979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8138/">CVE-2015-8138 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8138">CVE-2015-8138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8139/">CVE-2015-8139 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8139">CVE-2015-8139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8140/">CVE-2015-8140 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8140">CVE-2015-8140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8158/">CVE-2015-8158 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8158">CVE-2015-8158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572819" comment="ntp-4.2.8p6-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572820" comment="ntp-doc-4.2.8p6-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572821" comment="yast2-ntp-client-2.17.14.1-1.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217527" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="957226" ref_url="https://bugzilla.suse.com/957226" source="BUGZILLA"/>
		<reference ref_id="977446" ref_url="https://bugzilla.suse.com/977446" source="BUGZILLA"/>
		<reference ref_id="977450" ref_url="https://bugzilla.suse.com/977450" source="BUGZILLA"/>
		<reference ref_id="977451" ref_url="https://bugzilla.suse.com/977451" source="BUGZILLA"/>
		<reference ref_id="977452" ref_url="https://bugzilla.suse.com/977452" source="BUGZILLA"/>
		<reference ref_id="977455" ref_url="https://bugzilla.suse.com/977455" source="BUGZILLA"/>
		<reference ref_id="977457" ref_url="https://bugzilla.suse.com/977457" source="BUGZILLA"/>
		<reference ref_id="977458" ref_url="https://bugzilla.suse.com/977458" source="BUGZILLA"/>
		<reference ref_id="977459" ref_url="https://bugzilla.suse.com/977459" source="BUGZILLA"/>
		<reference ref_id="977461" ref_url="https://bugzilla.suse.com/977461" source="BUGZILLA"/>
		<reference ref_id="977464" ref_url="https://bugzilla.suse.com/977464" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<reference ref_id="CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705/" source="CVE"/>
		<reference ref_id="CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974/" source="CVE"/>
		<reference ref_id="CVE-2016-1547" ref_url="https://www.suse.com/security/cve/CVE-2016-1547/" source="CVE"/>
		<reference ref_id="CVE-2016-1548" ref_url="https://www.suse.com/security/cve/CVE-2016-1548/" source="CVE"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2016-1550" ref_url="https://www.suse.com/security/cve/CVE-2016-1550/" source="CVE"/>
		<reference ref_id="CVE-2016-1551" ref_url="https://www.suse.com/security/cve/CVE-2016-1551/" source="CVE"/>
		<reference ref_id="CVE-2016-2516" ref_url="https://www.suse.com/security/cve/CVE-2016-2516/" source="CVE"/>
		<reference ref_id="CVE-2016-2517" ref_url="https://www.suse.com/security/cve/CVE-2016-2517/" source="CVE"/>
		<reference ref_id="CVE-2016-2518" ref_url="https://www.suse.com/security/cve/CVE-2016-2518/" source="CVE"/>
		<reference ref_id="CVE-2016-2519" ref_url="https://www.suse.com/security/cve/CVE-2016-2519/" source="CVE"/>
		<description>

This update for ntp fixes the following issues: 

- Separate the creation of ntp.keys and key #1 in it to avoid
  problems when upgrading installations that have the file, but
  no key #1, which is needed e.g. by 'rcntp addserver'.

- Update to 4.2.8p7 (bsc#977446):
  * CVE-2016-1547, bsc#977459:
    Validate crypto-NAKs, AKA: CRYPTO-NAK DoS.
  * CVE-2016-1548, bsc#977461: Interleave-pivot
  * CVE-2016-1549, bsc#977451:
    Sybil vulnerability: ephemeral association attack.
  * CVE-2016-1550, bsc#977464: Improve NTP security against buffer
    comparison timing attacks.
  * CVE-2016-1551, bsc#977450:
    Refclock impersonation vulnerability
  * CVE-2016-2516, bsc#977452: Duplicate IPs on unconfig
    directives will cause an assertion botch in ntpd.
  * CVE-2016-2517, bsc#977455: remote configuration trustedkey/
    requestkey/controlkey values are not properly validated.
  * CVE-2016-2518, bsc#977457: Crafted addpeer with hmode &gt; 7
    causes array wraparound with MATCH_ASSOC.
  * CVE-2016-2519, bsc#977458: ctl_getitem() return value not
    always checked.
  * integrate ntp-fork.patch
  * Improve the fixes for:
    CVE-2015-7704, CVE-2015-7705, CVE-2015-7974
- Restrict the parser in the startup script to the first
  occurrance of 'keys' and 'controlkey' in ntp.conf (bsc#957226).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-01"/>
	<updated date="2016-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/957226">SUSE bug 957226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977450">SUSE bug 977450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977451">SUSE bug 977451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977452">SUSE bug 977452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977455">SUSE bug 977455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977457">SUSE bug 977457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977458">SUSE bug 977458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977459">SUSE bug 977459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977461">SUSE bug 977461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977464">SUSE bug 977464</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7704">CVE-2015-7704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7705">CVE-2015-7705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7974">CVE-2015-7974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1547/">CVE-2016-1547 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1547">CVE-2016-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1548/">CVE-2016-1548 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1548">CVE-2016-1548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1549">CVE-2016-1549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1550/">CVE-2016-1550 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1550">CVE-2016-1550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1551/">CVE-2016-1551 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1551">CVE-2016-1551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2516/">CVE-2016-2516 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2516">CVE-2016-2516 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2517/">CVE-2016-2517 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2517">CVE-2016-2517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2518/">CVE-2016-2518 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2518">CVE-2016-2518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2519/">CVE-2016-2519 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2519">CVE-2016-2519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572822" comment="ntp-4.2.8p7-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572823" comment="ntp-doc-4.2.8p7-44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217528" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="929414" ref_url="https://bugzilla.suse.com/929414" source="BUGZILLA"/>
		<reference ref_id="961491" ref_url="https://bugzilla.suse.com/961491" source="BUGZILLA"/>
		<reference ref_id="982779" ref_url="https://bugzilla.suse.com/982779" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-4008" ref_url="https://www.suse.com/security/cve/CVE-2016-4008/" source="CVE"/>
		<description>
This update for libtasn1 fixes the following issues:

- Malformed asn1 definitions could have caused a segmentation fault in the asn1 definition parser (bsc#961491)
- CVE-2015-3622: Fixed invalid read in octet string decoding (bsc#929414)
- CVE-2016-4008: Fixed infinite loop while parsing DER certificates (bsc#982779)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-16"/>
	<updated date="2016-06-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/929414">SUSE bug 929414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961491">SUSE bug 961491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982779">SUSE bug 982779</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3622">CVE-2015-3622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4008/">CVE-2016-4008 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4008">CVE-2016-4008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572824" comment="libtasn1-1.5-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572825" comment="libtasn1-3-1.5-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572826" comment="libtasn1-3-32bit-1.5-1.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217529" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="979302" ref_url="https://bugzilla.suse.com/979302" source="BUGZILLA"/>
		<reference ref_id="981422" ref_url="https://bugzilla.suse.com/981422" source="BUGZILLA"/>
		<reference ref_id="982056" ref_url="https://bugzilla.suse.com/982056" source="BUGZILLA"/>
		<reference ref_id="982064" ref_url="https://bugzilla.suse.com/982064" source="BUGZILLA"/>
		<reference ref_id="982065" ref_url="https://bugzilla.suse.com/982065" source="BUGZILLA"/>
		<reference ref_id="982066" ref_url="https://bugzilla.suse.com/982066" source="BUGZILLA"/>
		<reference ref_id="982067" ref_url="https://bugzilla.suse.com/982067" source="BUGZILLA"/>
		<reference ref_id="982068" ref_url="https://bugzilla.suse.com/982068" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4953" ref_url="https://www.suse.com/security/cve/CVE-2016-4953/" source="CVE"/>
		<reference ref_id="CVE-2016-4954" ref_url="https://www.suse.com/security/cve/CVE-2016-4954/" source="CVE"/>
		<reference ref_id="CVE-2016-4955" ref_url="https://www.suse.com/security/cve/CVE-2016-4955/" source="CVE"/>
		<reference ref_id="CVE-2016-4956" ref_url="https://www.suse.com/security/cve/CVE-2016-4956/" source="CVE"/>
		<reference ref_id="CVE-2016-4957" ref_url="https://www.suse.com/security/cve/CVE-2016-4957/" source="CVE"/>
		<description>
ntp was updated to version 4.2.8p8 to fix five security issues.

These security issues were fixed:
- CVE-2016-4953: Bad authentication demobilizes ephemeral associations (bsc#982065).
- CVE-2016-4954: Processing spoofed server packets (bsc#982066).
- CVE-2016-4955: Autokey association reset (bsc#982067).
- CVE-2016-4956: Broadcast interleave (bsc#982068).
- CVE-2016-4957: CRYPTO_NAK crash (bsc#982064).

These non-security issues were fixed:
- Keep the parent process alive until the daemon has finished initialisation, to make sure that the PID file exists when the parent returns.
- bsc#979302: Change the process name of the forking DNS worker process to avoid the impression that ntpd is started twice.
- bsc#981422: Don't ignore SIGCHILD because it breaks wait().
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979302">SUSE bug 979302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981422">SUSE bug 981422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982056">SUSE bug 982056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982064">SUSE bug 982064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982065">SUSE bug 982065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982066">SUSE bug 982066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982067">SUSE bug 982067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982068">SUSE bug 982068</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4953/">CVE-2016-4953 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4953">CVE-2016-4953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4954/">CVE-2016-4954 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4954">CVE-2016-4954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4955/">CVE-2016-4955 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4955">CVE-2016-4955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4956/">CVE-2016-4956 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4956">CVE-2016-4956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4957/">CVE-2016-4957 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4957">CVE-2016-4957 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572827" comment="ntp-4.2.8p8-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572828" comment="ntp-doc-4.2.8p8-47.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217530" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1009434" ref_url="https://bugzilla.suse.com/1009434" source="BUGZILLA"/>
		<reference ref_id="1011377" ref_url="https://bugzilla.suse.com/1011377" source="BUGZILLA"/>
		<reference ref_id="1011390" ref_url="https://bugzilla.suse.com/1011390" source="BUGZILLA"/>
		<reference ref_id="1011395" ref_url="https://bugzilla.suse.com/1011395" source="BUGZILLA"/>
		<reference ref_id="1011398" ref_url="https://bugzilla.suse.com/1011398" source="BUGZILLA"/>
		<reference ref_id="1011404" ref_url="https://bugzilla.suse.com/1011404" source="BUGZILLA"/>
		<reference ref_id="1011406" ref_url="https://bugzilla.suse.com/1011406" source="BUGZILLA"/>
		<reference ref_id="1011411" ref_url="https://bugzilla.suse.com/1011411" source="BUGZILLA"/>
		<reference ref_id="1011417" ref_url="https://bugzilla.suse.com/1011417" source="BUGZILLA"/>
		<reference ref_id="943216" ref_url="https://bugzilla.suse.com/943216" source="BUGZILLA"/>
		<reference ref_id="956365" ref_url="https://bugzilla.suse.com/956365" source="BUGZILLA"/>
		<reference ref_id="981252" ref_url="https://bugzilla.suse.com/981252" source="BUGZILLA"/>
		<reference ref_id="988028" ref_url="https://bugzilla.suse.com/988028" source="BUGZILLA"/>
		<reference ref_id="992038" ref_url="https://bugzilla.suse.com/992038" source="BUGZILLA"/>
		<reference ref_id="992606" ref_url="https://bugzilla.suse.com/992606" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5219" ref_url="https://www.suse.com/security/cve/CVE-2015-5219/" source="CVE"/>
		<reference ref_id="CVE-2015-8139" ref_url="https://www.suse.com/security/cve/CVE-2015-8139/" source="CVE"/>
		<reference ref_id="CVE-2015-8140" ref_url="https://www.suse.com/security/cve/CVE-2015-8140/" source="CVE"/>
		<reference ref_id="CVE-2016-7426" ref_url="https://www.suse.com/security/cve/CVE-2016-7426/" source="CVE"/>
		<reference ref_id="CVE-2016-7427" ref_url="https://www.suse.com/security/cve/CVE-2016-7427/" source="CVE"/>
		<reference ref_id="CVE-2016-7428" ref_url="https://www.suse.com/security/cve/CVE-2016-7428/" source="CVE"/>
		<reference ref_id="CVE-2016-7429" ref_url="https://www.suse.com/security/cve/CVE-2016-7429/" source="CVE"/>
		<reference ref_id="CVE-2016-7431" ref_url="https://www.suse.com/security/cve/CVE-2016-7431/" source="CVE"/>
		<reference ref_id="CVE-2016-7433" ref_url="https://www.suse.com/security/cve/CVE-2016-7433/" source="CVE"/>
		<reference ref_id="CVE-2016-7434" ref_url="https://www.suse.com/security/cve/CVE-2016-7434/" source="CVE"/>
		<reference ref_id="CVE-2016-9310" ref_url="https://www.suse.com/security/cve/CVE-2016-9310/" source="CVE"/>
		<reference ref_id="CVE-2016-9311" ref_url="https://www.suse.com/security/cve/CVE-2016-9311/" source="CVE"/>
		<description>

This update for ntp fixes the following issues:

ntp was updated to 4.2.8p9.

Security issues fixed:

- CVE-2016-9311, CVE-2016-9310, bsc#1011377: Mode 6
  unauthenticated trap information disclosure and DDoS vector.
- CVE-2016-7427, bsc#1011390:
  Broadcast Mode Replay Prevention DoS.
- CVE-2016-7428, bsc#1011417:
  Broadcast Mode Poll Interval Enforcement DoS.
- CVE-2016-7431, bsc#1011395:
  Regression: 010-origin: Zero Origin Timestamp Bypass.
- CVE-2016-7434, bsc#1011398:
  Null pointer dereference in _IO_str_init_static_internal().
- CVE-2016-7429, bsc#1011404: Interface selection attack.
- CVE-2016-7426, bsc#1011406:
  Client rate limiting and server responses.
- CVE-2016-7433, bsc#1011411: Reboot sync calculation problem.
- CVE-2015-8140: ntpq vulnerable to replay attacks.
- CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin.
- CVE-2015-5219: An endless loop due to incorrect precision to
  double conversion (bsc#943216).

Non-security issues fixed:

- Fix a spurious error message.
- Other bugfixes, see /usr/share/doc/packages/ntp/ChangeLog.
- Fix a regression in 'trap' (bsc#981252).
- Reduce the number of netlink groups to listen on for changes to
  the local network setup (bsc#992606).
- Fix segfault in 'sntp -a' (bsc#1009434).
- Silence an OpenSSL version warning (bsc#992038).
- Make the resolver task change user and group IDs to the same
  values as the main task. (bsc#988028)
- Simplify ntpd's search for its own executable to prevent AppArmor
  warnings (bsc#956365).

		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-23"/>
	<updated date="2017-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009434">SUSE bug 1009434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011377">SUSE bug 1011377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011390">SUSE bug 1011390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011395">SUSE bug 1011395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011398">SUSE bug 1011398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011404">SUSE bug 1011404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011406">SUSE bug 1011406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011411">SUSE bug 1011411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011417">SUSE bug 1011417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956365">SUSE bug 956365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981252">SUSE bug 981252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988028">SUSE bug 988028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992038">SUSE bug 992038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992606">SUSE bug 992606</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5219/">CVE-2015-5219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5219">CVE-2015-5219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8139/">CVE-2015-8139 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8139">CVE-2015-8139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8140/">CVE-2015-8140 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8140">CVE-2015-8140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7426/">CVE-2016-7426 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7426">CVE-2016-7426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7427/">CVE-2016-7427 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7427">CVE-2016-7427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7428/">CVE-2016-7428 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7428">CVE-2016-7428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7429/">CVE-2016-7429 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7429">CVE-2016-7429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7431/">CVE-2016-7431 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7431">CVE-2016-7431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7433/">CVE-2016-7433 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7433">CVE-2016-7433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7434/">CVE-2016-7434 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7434">CVE-2016-7434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9310/">CVE-2016-9310 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9310">CVE-2016-9310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9311/">CVE-2016-9311 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9311">CVE-2016-9311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572829" comment="ntp-4.2.8p9-48.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572830" comment="ntp-doc-4.2.8p9-48.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217531" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1014172" ref_url="https://bugzilla.suse.com/1014172" source="BUGZILLA"/>
		<reference ref_id="1030050" ref_url="https://bugzilla.suse.com/1030050" source="BUGZILLA"/>
		<reference ref_id="1031085" ref_url="https://bugzilla.suse.com/1031085" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9042" ref_url="https://www.suse.com/security/cve/CVE-2016-9042/" source="CVE"/>
		<reference ref_id="CVE-2017-6451" ref_url="https://www.suse.com/security/cve/CVE-2017-6451/" source="CVE"/>
		<reference ref_id="CVE-2017-6458" ref_url="https://www.suse.com/security/cve/CVE-2017-6458/" source="CVE"/>
		<reference ref_id="CVE-2017-6460" ref_url="https://www.suse.com/security/cve/CVE-2017-6460/" source="CVE"/>
		<reference ref_id="CVE-2017-6462" ref_url="https://www.suse.com/security/cve/CVE-2017-6462/" source="CVE"/>
		<reference ref_id="CVE-2017-6463" ref_url="https://www.suse.com/security/cve/CVE-2017-6463/" source="CVE"/>
		<reference ref_id="CVE-2017-6464" ref_url="https://www.suse.com/security/cve/CVE-2017-6464/" source="CVE"/>
		<description>

This ntp update to version 4.2.8p10 fixes the following issues:

Security issues fixed (bsc#1030050):
- CVE-2017-6464: Denial of Service via Malformed Config
- CVE-2017-6462: Buffer Overflow in DPTS Clock
- CVE-2017-6463: Authenticated DoS via Malicious Config Option
- CVE-2017-6458: Potential Overflows in ctl_put() functions
- CVE-2017-6451: Improper use of snprintf() in mx4200_send()
- CVE-2017-6460: Buffer Overflow in ntpq when fetching reslist
- CVE-2016-9042: 0rigin (zero origin) DoS.
- ntpq_stripquotes() returns incorrect Value
- ereallocarray()/eallocarray() underused
- Copious amounts of Unused Code
- Off-by-one in Oncore GPS Receiver
- Makefile does not enforce Security Flags

Bugfixes:
- Remove spurious log messages (bsc#1014172).
- Fixing ppc and ppc64 linker issue (bsc#1031085).
- clang scan-build findings
- Support for openssl-1.1.0 without compatibility modes
- Bugfix 3072 breaks multicastclient
- forking async worker: interrupted pipe I/O
- (...) time_pps_create: Exec format error
- Incorrect Logic for Peer Event Limiting
- Change the process name of forked DNS worker
- Trap Configuration Fail
- Nothing happens if minsane &lt; maxclock &lt; minclock
- allow -4/-6 on restrict line with mask
- out-of-bound pointers in ctl_putsys and decode_bitflags
- Move ntp-kod to /var/lib/ntp, because /var/db is not a standard directory and causes problems for
  transactional updates.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-07"/>
	<updated date="2017-04-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1014172">SUSE bug 1014172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031085">SUSE bug 1031085</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9042/">CVE-2016-9042 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9042">CVE-2016-9042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6451/">CVE-2017-6451 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6451">CVE-2017-6451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6458/">CVE-2017-6458 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6458">CVE-2017-6458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6460/">CVE-2017-6460 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6460">CVE-2017-6460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6462/">CVE-2017-6462 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6462">CVE-2017-6462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6463/">CVE-2017-6463 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6463">CVE-2017-6463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6464/">CVE-2017-6464 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6464">CVE-2017-6464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572831" comment="ntp-4.2.8p10-48.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572832" comment="ntp-doc-4.2.8p10-48.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217532" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1077445" ref_url="https://bugzilla.suse.com/1077445" source="BUGZILLA"/>
		<reference ref_id="1082210" ref_url="https://bugzilla.suse.com/1082210" source="BUGZILLA"/>
		<reference ref_id="1083417" ref_url="https://bugzilla.suse.com/1083417" source="BUGZILLA"/>
		<reference ref_id="1083420" ref_url="https://bugzilla.suse.com/1083420" source="BUGZILLA"/>
		<reference ref_id="1083422" ref_url="https://bugzilla.suse.com/1083422" source="BUGZILLA"/>
		<reference ref_id="1083424" ref_url="https://bugzilla.suse.com/1083424" source="BUGZILLA"/>
		<reference ref_id="1083426" ref_url="https://bugzilla.suse.com/1083426" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<reference ref_id="CVE-2018-7182" ref_url="https://www.suse.com/security/cve/CVE-2018-7182/" source="CVE"/>
		<reference ref_id="CVE-2018-7183" ref_url="https://www.suse.com/security/cve/CVE-2018-7183/" source="CVE"/>
		<reference ref_id="CVE-2018-7184" ref_url="https://www.suse.com/security/cve/CVE-2018-7184/" source="CVE"/>
		<reference ref_id="CVE-2018-7185" ref_url="https://www.suse.com/security/cve/CVE-2018-7185/" source="CVE"/>
		<description>
This update for ntp fixes the following issues:

- Update to 4.2.8p11 (bsc#1082210):
  * CVE-2016-1549: Sybil vulnerability: ephemeral association
    attack. While fixed in ntp-4.2.8p7, there are significant
    additional protections for this issue in 4.2.8p11.
  * CVE-2018-7182: ctl_getitem(): buffer read overrun
    leads to undefined behavior and information leak. (bsc#1083426)
  * CVE-2018-7170: Multiple authenticated ephemeral
    associations. (bsc#1083424)
  * CVE-2018-7184: Interleaved symmetric mode cannot
    recover from bad state. (bsc#1083422)
  * CVE-2018-7185: Unauthenticated packet can reset
    authenticated interleaved association. (bsc#1083420)
  * CVE-2018-7183: ntpq:decodearr() can write beyond its
    buffer limit.(bsc#1083417)
- Don't use libevent's cached time stamps in sntp.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-16"/>
	<updated date="2018-04-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077445">SUSE bug 1077445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082210">SUSE bug 1082210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083417">SUSE bug 1083417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083420">SUSE bug 1083420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083422">SUSE bug 1083422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083426">SUSE bug 1083426</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1549">CVE-2016-1549 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7170">CVE-2018-7170 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7182/">CVE-2018-7182 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7182">CVE-2018-7182 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-7183/">CVE-2018-7183 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7183">CVE-2018-7183 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7184/">CVE-2018-7184 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7184">CVE-2018-7184 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7185/">CVE-2018-7185 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7185">CVE-2018-7185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572833" comment="ntp-4.2.8p11-48.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572834" comment="ntp-doc-4.2.8p11-48.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217533" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1083424" ref_url="https://bugzilla.suse.com/1083424" source="BUGZILLA"/>
		<reference ref_id="1098531" ref_url="https://bugzilla.suse.com/1098531" source="BUGZILLA"/>
		<reference ref_id="1111853" ref_url="https://bugzilla.suse.com/1111853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12327" ref_url="https://www.suse.com/security/cve/CVE-2018-12327/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<description>

NTP was updated to 4.2.8p12 (bsc#1111853):

- CVE-2018-12327: Fixed stack buffer overflow in the openhost() command-line call of NTPQ/NTPDC. (bsc#1098531)
- CVE-2018-7170: Add further tweaks to improve the fix for the ephemeral association time spoofing additional protection (bsc#1083424)

Please also see https://www.nwtime.org/network-time-foundation-publishes-ntp-4-2-8p12/ for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098531">SUSE bug 1098531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111853">SUSE bug 1111853</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12327/">CVE-2018-12327 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12327">CVE-2018-12327 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7170">CVE-2018-7170 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572835" comment="ntp-4.2.8p12-48.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572836" comment="ntp-doc-4.2.8p12-48.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217534" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1001182" ref_url="https://bugzilla.suse.com/1001182" source="BUGZILLA"/>
		<reference ref_id="1128525" ref_url="https://bugzilla.suse.com/1128525" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8936" ref_url="https://www.suse.com/security/cve/CVE-2019-8936/" source="CVE"/>
		<description>
This update for ntp fixes the following issues:
	  
Security issue fixed: 	  

- CVE-2019-8936: Fixed a null pointer exception which could allow an authenticated attcker to cause 
  segmentation fault to ntpd (bsc#1128525).

Other issues addressed:

- Make sure that SLE12 version is higher than the one in SLE11 (bsc#1001182). 
- Fixed several bugs in the BANCOMM reclock driver.
- Fixed ntp_loopfilter.c snprintf compilation warnings.
- Fixed spurious initgroups() error message.
- Fixed STA_NANO struct timex units.
- Fixed GPS week rollover in libparse.
- Fixed incorrect poll interval in packet.
- Added a missing check for ENABLE_CMAC.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1001182">SUSE bug 1001182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128525">SUSE bug 1128525</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8936/">CVE-2019-8936 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8936">CVE-2019-8936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572837" comment="ntp-4.2.8p13-48.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572838" comment="ntp-doc-4.2.8p13-48.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217535" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1169740" ref_url="https://bugzilla.suse.com/1169740" source="BUGZILLA"/>
		<reference ref_id="1171355" ref_url="https://bugzilla.suse.com/1171355" source="BUGZILLA"/>
		<reference ref_id="1172651" ref_url="https://bugzilla.suse.com/1172651" source="BUGZILLA"/>
		<reference ref_id="1173334" ref_url="https://bugzilla.suse.com/1173334" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8956" ref_url="https://www.suse.com/security/cve/CVE-2018-8956/" source="CVE"/>
		<reference ref_id="CVE-2020-11868" ref_url="https://www.suse.com/security/cve/CVE-2020-11868/" source="CVE"/>
		<reference ref_id="CVE-2020-13817" ref_url="https://www.suse.com/security/cve/CVE-2020-13817/" source="CVE"/>
		<reference ref_id="CVE-2020-15025" ref_url="https://www.suse.com/security/cve/CVE-2020-15025/" source="CVE"/>
		<description>
This update for ntp fixes the following issues:

ntp was updated to 4.2.8p15

- CVE-2020-11868: Fixed an issue which a server mode packet with spoofed source address 
  frequently send to the client ntpd could have caused denial of service (bsc#1169740).
- CVE-2018-8956: Fixed an issue which could have allowed remote attackers to prevent 
  a broadcast client from synchronizing its clock with a broadcast NTP server via spoofed 
  mode 3 and mode 5 packets (bsc#1171355).
- CVE-2020-13817: Fixed an issue which an off-path attacker with the ability to query time 
  from victim's ntpd instance could have modified the victim's clock by a limited amount (bsc#1172651).
- CVE-2020-15025: Fixed an issue which remote attacker could have caused denial of service by consuming 
  the memory when a CMAC key was used andassociated with a CMAC algorithm in the ntp.keys (bsc#1173334).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-01"/>
	<updated date="2020-07-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169740">SUSE bug 1169740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171355">SUSE bug 1171355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172651">SUSE bug 1172651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173334">SUSE bug 1173334</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8956/">CVE-2018-8956 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8956">CVE-2018-8956 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11868/">CVE-2020-11868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11868">CVE-2020-11868 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13817/">CVE-2020-13817 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13817">CVE-2020-13817 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15025/">CVE-2020-15025 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15025">CVE-2020-15025 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572839" comment="ntp-4.2.8p15-48.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572840" comment="ntp-doc-4.2.8p15-48.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217536" version="1" class="patch">
	<metadata>
		<title>Security update for OFED</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="693243" ref_url="https://bugzilla.suse.com/693243" source="BUGZILLA"/>
		<reference ref_id="703752" ref_url="https://bugzilla.suse.com/703752" source="BUGZILLA"/>
		<reference ref_id="704914" ref_url="https://bugzilla.suse.com/704914" source="BUGZILLA"/>
		<reference ref_id="706175" ref_url="https://bugzilla.suse.com/706175" source="BUGZILLA"/>
		<reference ref_id="722030" ref_url="https://bugzilla.suse.com/722030" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1023" ref_url="https://www.suse.com/security/cve/CVE-2011-1023/" source="CVE"/>
		<description>

This update fixes the following reports for OFED:

    * 704914: Fixed NFS client over TCP hangs due to packet loss.
    * 693243: Fixed issue with building lustre against ofed-devel.
    * 706175: Fix crash on accessing /proc/net/sdpstats
    * 722030: Cannot load ib_ipath
    * 703752: Prevent BUG_ON triggering on congestion

Security Issue reference:

    * CVE-2011-1023
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1023&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-11-03"/>
	<updated date="2011-11-03"/>
	<bugzilla href="https://bugzilla.suse.com/693243">SUSE bug 693243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703752">SUSE bug 703752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704914">SUSE bug 704914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/706175">SUSE bug 706175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/722030">SUSE bug 722030</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1023/">CVE-2011-1023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1023">CVE-2011-1023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992273" comment="cxgb3-firmware-1.5.2-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992274" comment="ofed-1.5.2-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992275" comment="ofed-doc-1.5.2-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992276" comment="ofed-kmp-default-1.5.2_2.6.32.46_0.3-0.9.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217537" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1143194" ref_url="https://bugzilla.suse.com/1143194" source="BUGZILLA"/>
		<reference ref_id="1143273" ref_url="https://bugzilla.suse.com/1143273" source="BUGZILLA"/>
		<reference ref_id="1170771" ref_url="https://bugzilla.suse.com/1170771" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13057" ref_url="https://www.suse.com/security/cve/CVE-2019-13057/" source="CVE"/>
		<reference ref_id="CVE-2019-13565" ref_url="https://www.suse.com/security/cve/CVE-2019-13565/" source="CVE"/>
		<reference ref_id="CVE-2020-12243" ref_url="https://www.suse.com/security/cve/CVE-2020-12243/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-12243: Fixed a denial of service related to recursive filters (bsc#1170771).
- CVE-2019-13565: Fixed an authentication bypass caused by incorrect authorization of another connection, granting excess connection rights (bsc#1143194).
- CVE-2019-13057: Fixed an issue with improper authorization with delegated database admin privileges (bsc#1143273).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-11"/>
	<updated date="2020-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1143194">SUSE bug 1143194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143273">SUSE bug 1143273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170771">SUSE bug 1170771</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13057/">CVE-2019-13057 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13057">CVE-2019-13057 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13565/">CVE-2019-13565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13565">CVE-2019-13565 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12243/">CVE-2020-12243 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12243">CVE-2020-12243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572847" comment="compat-libldap-2_3-0-2.3.37-2.17.31.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572848" comment="libldap-2_4-2-2.4.26-0.17.31.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572849" comment="libldap-2_4-2-32bit-2.4.26-0.17.31.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572850" comment="libldap-openssl1-2_4-2-2.4.26-0.17.31.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572851" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.17.31.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572852" comment="openldap2-2.4.26-0.17.31.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572853" comment="openldap2-back-meta-2.4.26-0.17.31.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572854" comment="openldap2-client-2.4.26-0.17.31.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572855" comment="openldap2-client-openssl1-2.4.26-0.17.31.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572856" comment="openldap2-openssl1-2.4.26-0.17.31.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217538" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1172698" ref_url="https://bugzilla.suse.com/1172698" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8023" ref_url="https://www.suse.com/security/cve/CVE-2020-8023/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-8023: Fixed a local privilege escalation from ldap to root (bsc#1172698).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-07"/>
	<updated date="2020-07-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172698">SUSE bug 1172698</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8023/">CVE-2020-8023 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8023">CVE-2020-8023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572857" comment="compat-libldap-2_3-0-2.3.37-2.17.31.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572858" comment="libldap-2_4-2-2.4.26-0.17.31.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572859" comment="libldap-2_4-2-32bit-2.4.26-0.17.31.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572860" comment="libldap-openssl1-2_4-2-2.4.26-0.17.31.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572861" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.17.31.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572862" comment="openldap2-2.4.26-0.17.31.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572863" comment="openldap2-back-meta-2.4.26-0.17.31.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572864" comment="openldap2-client-2.4.26-0.17.31.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572865" comment="openldap2-client-openssl1-2.4.26-0.17.31.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572866" comment="openldap2-openssl1-2.4.26-0.17.31.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217539" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1178387" ref_url="https://bugzilla.suse.com/1178387" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692/" source="CVE"/>
		<description>
This update for openldap2 fixes the following security issue:

- CVE-2020-25692: Fixed an unauthenticated remote denial of service due to incorrect validation of modrdn equality rules (bsc#1178387).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178387">SUSE bug 1178387</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25692">CVE-2020-25692 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572867" comment="compat-libldap-2_3-0-2.3.37-2.17.31.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572868" comment="libldap-2_4-2-2.4.26-0.17.31.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572869" comment="libldap-2_4-2-32bit-2.4.26-0.17.31.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572870" comment="libldap-openssl1-2_4-2-2.4.26-0.17.31.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572871" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.17.31.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572872" comment="openldap2-2.4.26-0.17.31.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572873" comment="openldap2-back-meta-2.4.26-0.17.31.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572874" comment="openldap2-client-2.4.26-0.17.31.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572875" comment="openldap2-client-openssl1-2.4.26-0.17.31.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572876" comment="openldap2-openssl1-2.4.26-0.17.31.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217540" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1178909" ref_url="https://bugzilla.suse.com/1178909" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25709" ref_url="https://www.suse.com/security/cve/CVE-2020-25709/" source="CVE"/>
		<reference ref_id="CVE-2020-25710" ref_url="https://www.suse.com/security/cve/CVE-2020-25710/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-25709: Fixed a crash caused by specially crafted network traffic (bsc#1178909).
- CVE-2020-25710: Fixed a crash caused by specially crafted network traffic (bsc#1178909).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-14"/>
	<updated date="2021-01-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178909">SUSE bug 1178909</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25709/">CVE-2020-25709 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25709">CVE-2020-25709 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25710/">CVE-2020-25710 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25710">CVE-2020-25710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572877" comment="compat-libldap-2_3-0-2.3.37-2.17.31.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572878" comment="libldap-2_4-2-2.4.26-0.17.31.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572879" comment="libldap-2_4-2-32bit-2.4.26-0.17.31.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572880" comment="libldap-openssl1-2_4-2-2.4.26-0.17.31.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572881" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.17.31.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572882" comment="openldap2-2.4.26-0.17.31.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572883" comment="openldap2-back-meta-2.4.26-0.17.31.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572884" comment="openldap2-client-2.4.26-0.17.31.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572885" comment="openldap2-client-openssl1-2.4.26-0.17.31.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572886" comment="openldap2-openssl1-2.4.26-0.17.31.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217541" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1182279" ref_url="https://bugzilla.suse.com/1182279" source="BUGZILLA"/>
		<reference ref_id="1182408" ref_url="https://bugzilla.suse.com/1182408" source="BUGZILLA"/>
		<reference ref_id="1182411" ref_url="https://bugzilla.suse.com/1182411" source="BUGZILLA"/>
		<reference ref_id="1182412" ref_url="https://bugzilla.suse.com/1182412" source="BUGZILLA"/>
		<reference ref_id="1182413" ref_url="https://bugzilla.suse.com/1182413" source="BUGZILLA"/>
		<reference ref_id="1182415" ref_url="https://bugzilla.suse.com/1182415" source="BUGZILLA"/>
		<reference ref_id="1182416" ref_url="https://bugzilla.suse.com/1182416" source="BUGZILLA"/>
		<reference ref_id="1182417" ref_url="https://bugzilla.suse.com/1182417" source="BUGZILLA"/>
		<reference ref_id="1182418" ref_url="https://bugzilla.suse.com/1182418" source="BUGZILLA"/>
		<reference ref_id="1182419" ref_url="https://bugzilla.suse.com/1182419" source="BUGZILLA"/>
		<reference ref_id="1182420" ref_url="https://bugzilla.suse.com/1182420" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36221" ref_url="https://www.suse.com/security/cve/CVE-2020-36221/" source="CVE"/>
		<reference ref_id="CVE-2020-36222" ref_url="https://www.suse.com/security/cve/CVE-2020-36222/" source="CVE"/>
		<reference ref_id="CVE-2020-36223" ref_url="https://www.suse.com/security/cve/CVE-2020-36223/" source="CVE"/>
		<reference ref_id="CVE-2020-36224" ref_url="https://www.suse.com/security/cve/CVE-2020-36224/" source="CVE"/>
		<reference ref_id="CVE-2020-36225" ref_url="https://www.suse.com/security/cve/CVE-2020-36225/" source="CVE"/>
		<reference ref_id="CVE-2020-36226" ref_url="https://www.suse.com/security/cve/CVE-2020-36226/" source="CVE"/>
		<reference ref_id="CVE-2020-36227" ref_url="https://www.suse.com/security/cve/CVE-2020-36227/" source="CVE"/>
		<reference ref_id="CVE-2020-36228" ref_url="https://www.suse.com/security/cve/CVE-2020-36228/" source="CVE"/>
		<reference ref_id="CVE-2020-36229" ref_url="https://www.suse.com/security/cve/CVE-2020-36229/" source="CVE"/>
		<reference ref_id="CVE-2020-36230" ref_url="https://www.suse.com/security/cve/CVE-2020-36230/" source="CVE"/>
		<reference ref_id="CVE-2021-27212" ref_url="https://www.suse.com/security/cve/CVE-2021-27212/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- bsc#1182408 CVE-2020-36230 - an assertion failure in slapd in the
  X.509 DN parsing in decode.c ber_next_element, resulting in denial
  of service.
- bsc#1182411 CVE-2020-36229 - ldap_X509dn2bv crash in the X.509 DN
  parsing in ad_keystring, resulting in denial of service.
- bsc#1182412 CVE-2020-36228 - integer underflow leading to crash
  in the Certificate List Exact Assertion processing, resulting in
  denial of service.
- bsc#1182413 CVE-2020-36227 - infinite loop in slapd with the
  cancel_extop Cancel operation, resulting in denial of service.
- bsc#1182416 CVE-2020-36225 - double free and slapd crash in the
  saslAuthzTo processing, resulting in denial of service.
- bsc#1182417 CVE-2020-36224 - invalid pointer free and slapd crash
  in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182415 CVE-2020-36226 - memch-&gt;bv_len miscalculation and slapd
  crash in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182419 CVE-2020-36222 - assertion failure in slapd in the
  saslAuthzTo validation, resulting in denial of service.
- bsc#1182420 CVE-2020-36221 - slapd crashes in the Certificate Exact
  Assertion processing, resulting in denial of service (schema_init.c
  serialNumberAndIssuerCheck).
- bsc#1182418 CVE-2020-36223 - slapd crash in the Values Return Filter
  control handling, resulting in denial of service (double free and
  out-of-bounds read).
- bsc#1182279 CVE-2021-27212 - an assertion failure in slapd can occur
    in the issuerAndThisUpdateCheck function via a crafted packet,
    resulting in a denial of service (daemon exit) via a short timestamp.
    This is related to schema_init.c and checkTime.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-04"/>
	<updated date="2021-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182279">SUSE bug 1182279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182408">SUSE bug 1182408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182411">SUSE bug 1182411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182412">SUSE bug 1182412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182413">SUSE bug 1182413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182415">SUSE bug 1182415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182416">SUSE bug 1182416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182417">SUSE bug 1182417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182418">SUSE bug 1182418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182419">SUSE bug 1182419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182420">SUSE bug 1182420</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36221/">CVE-2020-36221 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36221">CVE-2020-36221 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36222/">CVE-2020-36222 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36222">CVE-2020-36222 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36223/">CVE-2020-36223 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36223">CVE-2020-36223 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36224/">CVE-2020-36224 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36224">CVE-2020-36224 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36225/">CVE-2020-36225 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36225">CVE-2020-36225 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36226/">CVE-2020-36226 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36226">CVE-2020-36226 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36227/">CVE-2020-36227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36227">CVE-2020-36227 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36228/">CVE-2020-36228 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36228">CVE-2020-36228 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36229/">CVE-2020-36229 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36229">CVE-2020-36229 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36230/">CVE-2020-36230 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36230">CVE-2020-36230 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27212/">CVE-2021-27212 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27212">CVE-2021-27212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572887" comment="compat-libldap-2_3-0-2.3.37-2.17.31.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572888" comment="libldap-2_4-2-2.4.26-0.17.31.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572889" comment="libldap-2_4-2-32bit-2.4.26-0.17.31.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572890" comment="libldap-openssl1-2_4-2-2.4.26-0.17.31.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572891" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.17.31.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572892" comment="openldap2-2.4.26-0.17.31.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572893" comment="openldap2-back-meta-2.4.26-0.17.31.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572894" comment="openldap2-client-2.4.26-0.17.31.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572895" comment="openldap2-client-openssl1-2.4.26-0.17.31.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572896" comment="openldap2-openssl1-2.4.26-0.17.31.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217542" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="846389" ref_url="https://bugzilla.suse.com/846389" source="BUGZILLA"/>
		<reference ref_id="905959" ref_url="https://bugzilla.suse.com/905959" source="BUGZILLA"/>
		<reference ref_id="916897" ref_url="https://bugzilla.suse.com/916897" source="BUGZILLA"/>
		<reference ref_id="916914" ref_url="https://bugzilla.suse.com/916914" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4449" ref_url="https://www.suse.com/security/cve/CVE-2013-4449/" source="CVE"/>
		<reference ref_id="CVE-2015-1545" ref_url="https://www.suse.com/security/cve/CVE-2015-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-1546" ref_url="https://www.suse.com/security/cve/CVE-2015-1546/" source="CVE"/>
		<description>

openldap2 was updated to fix three security issues and one non-security 
bug.

The following vulnerabilities were fixed:

    * A remote attacker could cause a denial of service (slapd crash) by
      unbinding immediately after a search request. (bnc#846389,
      CVE-2013-4449)
    * A remote attacker could cause a denial of service through a NULL
      pointer dereference and crash via an empty attribute list in a deref
      control in a search request. (bnc#916897, CVE-2015-1545)
    * A remote attacker could cause a denial of service (crash) via a
      crafted search query with a matched values control. (bnc#916914,
      CVE-2015-1546)

The following non-security bug was fixed:

    * Prevent connection-0 (internal connection) from showing up in the
      monitor back-end. (bnc#905959)

Security Issues:

    * CVE-2015-1546
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1546&gt;
    * CVE-2015-1545
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1545&gt;
    * CVE-2013-4449
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4449&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-22"/>
	<updated date="2015-04-22"/>
	<bugzilla href="https://bugzilla.suse.com/846389">SUSE bug 846389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905959">SUSE bug 905959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916897">SUSE bug 916897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916914">SUSE bug 916914</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4449/">CVE-2013-4449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4449">CVE-2013-4449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1545/">CVE-2015-1545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1545">CVE-2015-1545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1546/">CVE-2015-1546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1546">CVE-2015-1546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572897" comment="compat-libldap-2_3-0-2.3.37-2.17.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572898" comment="libldap-2_4-2-2.4.26-0.17.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572899" comment="libldap-2_4-2-32bit-2.4.26-0.17.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572900" comment="openldap2-2.4.26-0.17.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572901" comment="openldap2-back-meta-2.4.26-0.17.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572902" comment="openldap2-client-2.4.26-0.17.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217543" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="937766" ref_url="https://bugzilla.suse.com/937766" source="BUGZILLA"/>
		<reference ref_id="945582" ref_url="https://bugzilla.suse.com/945582" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908/" source="CVE"/>
		<description>
This update fixes the following security issues:

- CVE-2015-6908: The ber_get_next function allowed remote attackers to cause a denial
  of service (reachable assertion and application crash) via crafted BER data, as
  demonstrated by an attack against slapd. (bsc#945582)
- CVE-2015-4000: Fix weak Diffie-Hellman size vulnerability. (bsc#937766)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-27"/>
	<updated date="2016-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/937766">SUSE bug 937766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945582">SUSE bug 945582</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6908">CVE-2015-6908 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572903" comment="compat-libldap-2_3-0-2.3.37-2.17.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572904" comment="libldap-2_4-2-2.4.26-0.17.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572905" comment="libldap-2_4-2-32bit-2.4.26-0.17.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572906" comment="openldap2-2.4.26-0.17.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572907" comment="openldap2-back-meta-2.4.26-0.17.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572908" comment="openldap2-client-2.4.26-0.17.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217544" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1104812" ref_url="https://bugzilla.suse.com/1104812" source="BUGZILLA"/>
		<reference ref_id="1106998" ref_url="https://bugzilla.suse.com/1106998" source="BUGZILLA"/>
		<reference ref_id="1106999" ref_url="https://bugzilla.suse.com/1106999" source="BUGZILLA"/>
		<reference ref_id="1107033" ref_url="https://bugzilla.suse.com/1107033" source="BUGZILLA"/>
		<reference ref_id="1107037" ref_url="https://bugzilla.suse.com/1107037" source="BUGZILLA"/>
		<reference ref_id="1107038" ref_url="https://bugzilla.suse.com/1107038" source="BUGZILLA"/>
		<reference ref_id="1107039" ref_url="https://bugzilla.suse.com/1107039" source="BUGZILLA"/>
		<reference ref_id="1107107" ref_url="https://bugzilla.suse.com/1107107" source="BUGZILLA"/>
		<reference ref_id="1108318" ref_url="https://bugzilla.suse.com/1108318" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16391" ref_url="https://www.suse.com/security/cve/CVE-2018-16391/" source="CVE"/>
		<reference ref_id="CVE-2018-16392" ref_url="https://www.suse.com/security/cve/CVE-2018-16392/" source="CVE"/>
		<reference ref_id="CVE-2018-16393" ref_url="https://www.suse.com/security/cve/CVE-2018-16393/" source="CVE"/>
		<reference ref_id="CVE-2018-16418" ref_url="https://www.suse.com/security/cve/CVE-2018-16418/" source="CVE"/>
		<reference ref_id="CVE-2018-16419" ref_url="https://www.suse.com/security/cve/CVE-2018-16419/" source="CVE"/>
		<reference ref_id="CVE-2018-16422" ref_url="https://www.suse.com/security/cve/CVE-2018-16422/" source="CVE"/>
		<reference ref_id="CVE-2018-16423" ref_url="https://www.suse.com/security/cve/CVE-2018-16423/" source="CVE"/>
		<reference ref_id="CVE-2018-16427" ref_url="https://www.suse.com/security/cve/CVE-2018-16427/" source="CVE"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2018-16391: Fixed a denial of service when handling responses from a Muscle Card (bsc#1106998)
- CVE-2018-16392: Fixed a denial of service when handling responses from a TCOS Card (bsc#1106999)
- CVE-2018-16393: Fixed buffer overflows when handling responses from Gemsafe V1 Smartcards (bsc#1108318)
- CVE-2018-16418: Fixed buffer overflow when handling string concatenation in util_acl_to_str (bsc#1107039)
- CVE-2018-16419: Fixed several buffer overflows when handling responses from a Cryptoflex card (bsc#1107107)
- CVE-2018-16422: Fixed single byte buffer overflow when handling responses from an esteid Card (bsc#1107038)
- CVE-2018-16423: Fixed double free when handling responses from a smartcard (bsc#1107037)
- CVE-2018-16427: Fixed out of bounds reads when handling responses in OpenSC (bsc#1107033)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-05"/>
	<updated date="2018-11-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104812">SUSE bug 1104812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106998">SUSE bug 1106998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106999">SUSE bug 1106999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107033">SUSE bug 1107033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107037">SUSE bug 1107037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107038">SUSE bug 1107038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107039">SUSE bug 1107039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107107">SUSE bug 1107107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108318">SUSE bug 1108318</bugzilla>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16391/">CVE-2018-16391 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16391">CVE-2018-16391 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16392/">CVE-2018-16392 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16392">CVE-2018-16392 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16393/">CVE-2018-16393 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16393">CVE-2018-16393 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16418/">CVE-2018-16418 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16418">CVE-2018-16418 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16419/">CVE-2018-16419 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16419">CVE-2018-16419 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16422/">CVE-2018-16422 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16422">CVE-2018-16422 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16423/">CVE-2018-16423 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16423">CVE-2018-16423 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16427/">CVE-2018-16427 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16427">CVE-2018-16427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572909" comment="libopensc2-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572910" comment="libopensc2-32bit-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572911" comment="opensc-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572912" comment="opensc-32bit-0.11.6-5.27.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217545" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1122756" ref_url="https://bugzilla.suse.com/1122756" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6502" ref_url="https://www.suse.com/security/cve/CVE-2019-6502/" source="CVE"/>
		<description>
This update for opensc fixes the following issues:

Security issue fixed:

- CVE-2019-6502: Fixed a memory leak in sc_context_create() (bsc#1122756).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-04"/>
	<updated date="2020-11-04"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1122756">SUSE bug 1122756</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6502/">CVE-2019-6502 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6502">CVE-2019-6502 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572913" comment="libopensc2-0.11.6-5.27.6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572914" comment="libopensc2-32bit-0.11.6-5.27.6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572915" comment="opensc-0.11.6-5.27.6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572916" comment="opensc-32bit-0.11.6-5.27.6.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217546" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1149746" ref_url="https://bugzilla.suse.com/1149746" source="BUGZILLA"/>
		<reference ref_id="1149747" ref_url="https://bugzilla.suse.com/1149747" source="BUGZILLA"/>
		<reference ref_id="1158256" ref_url="https://bugzilla.suse.com/1158256" source="BUGZILLA"/>
		<reference ref_id="1177378" ref_url="https://bugzilla.suse.com/1177378" source="BUGZILLA"/>
		<reference ref_id="1177380" ref_url="https://bugzilla.suse.com/1177380" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15945" ref_url="https://www.suse.com/security/cve/CVE-2019-15945/" source="CVE"/>
		<reference ref_id="CVE-2019-15946" ref_url="https://www.suse.com/security/cve/CVE-2019-15946/" source="CVE"/>
		<reference ref_id="CVE-2019-19479" ref_url="https://www.suse.com/security/cve/CVE-2019-19479/" source="CVE"/>
		<reference ref_id="CVE-2020-26571" ref_url="https://www.suse.com/security/cve/CVE-2020-26571/" source="CVE"/>
		<reference ref_id="CVE-2020-26572" ref_url="https://www.suse.com/security/cve/CVE-2020-26572/" source="CVE"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2020-26571: gemsafe GPK smart card software driver stack-based buffer overflow (bsc#1177380)
- CVE-2019-15946: out-of-bounds access of an ASN.1 Octet string in asn1_decode_entry (bsc#1149747)
- CVE-2019-15945: out-of-bounds access of an ASN.1 Bitstring in decode_bit_string (bsc#1149746)
- CVE-2019-19479: incorrect read operation during parsing of a SETCOS file attribute (bsc#1158256)
- CVE-2020-26572: Prevent out of bounds write (bsc#1177378)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-06"/>
	<updated date="2021-04-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149746">SUSE bug 1149746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149747">SUSE bug 1149747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158256">SUSE bug 1158256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177378">SUSE bug 1177378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177380">SUSE bug 1177380</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15945/">CVE-2019-15945 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15945">CVE-2019-15945 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15946/">CVE-2019-15946 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15946">CVE-2019-15946 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19479/">CVE-2019-19479 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19479">CVE-2019-19479 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26571/">CVE-2020-26571 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26571">CVE-2020-26571 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26572/">CVE-2020-26572 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26572">CVE-2020-26572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572917" comment="libopensc2-0.11.6-5.27.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572918" comment="libopensc2-32bit-0.11.6-5.27.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572919" comment="opensc-0.11.6-5.27.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572920" comment="opensc-32bit-0.11.6-5.27.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217547" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1191957" ref_url="https://bugzilla.suse.com/1191957" source="BUGZILLA"/>
		<reference ref_id="1192005" ref_url="https://bugzilla.suse.com/1192005" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42780" ref_url="https://www.suse.com/security/cve/CVE-2021-42780/" source="CVE"/>
		<reference ref_id="CVE-2021-42782" ref_url="https://www.suse.com/security/cve/CVE-2021-42782/" source="CVE"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2021-42780: Fixed use after return in insert_pin() (bsc#1192005).
- CVE-2021-42782: Stack buffer overflow issues in various places (bsc#1191957).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-29"/>
	<updated date="2021-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191957">SUSE bug 1191957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192005">SUSE bug 1192005</bugzilla>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-42780/">CVE-2021-42780 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42780">CVE-2021-42780 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42782/">CVE-2021-42782 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42782">CVE-2021-42782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653634" comment="libopensc2-0.11.6-5.27.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653635" comment="libopensc2-32bit-0.11.6-5.27.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653636" comment="opensc-0.11.6-5.27.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653637" comment="opensc-32bit-0.11.6-5.27.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217548" version="1" class="patch">
	<metadata>
		<title>Recommended update for openslp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="564504" ref_url="https://bugzilla.suse.com/564504" source="BUGZILLA"/>
		<reference ref_id="597215" ref_url="https://bugzilla.suse.com/597215" source="BUGZILLA"/>
		<reference ref_id="601002" ref_url="https://bugzilla.suse.com/601002" source="BUGZILLA"/>
		<reference ref_id="626444" ref_url="https://bugzilla.suse.com/626444" source="BUGZILLA"/>
		<reference ref_id="642571" ref_url="https://bugzilla.suse.com/642571" source="BUGZILLA"/>
		<reference ref_id="648384" ref_url="https://bugzilla.suse.com/648384" source="BUGZILLA"/>
		<reference ref_id="658972" ref_url="https://bugzilla.suse.com/658972" source="BUGZILLA"/>
		<reference ref_id="667953" ref_url="https://bugzilla.suse.com/667953" source="BUGZILLA"/>
		<reference ref_id="693756" ref_url="https://bugzilla.suse.com/693756" source="BUGZILLA"/>
		<reference ref_id="723385" ref_url="https://bugzilla.suse.com/723385" source="BUGZILLA"/>
		<reference ref_id="778508" ref_url="https://bugzilla.suse.com/778508" source="BUGZILLA"/>
		<reference ref_id="855385" ref_url="https://bugzilla.suse.com/855385" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-3609" ref_url="https://www.suse.com/security/cve/CVE-2010-3609/" source="CVE"/>
		<reference ref_id="CVE-2012-4428" ref_url="https://www.suse.com/security/cve/CVE-2012-4428/" source="CVE"/>
		<description>

Due to a bug in the DA network code, changes in service registrations could 
be lost if an old socket connection was used and the remove side closed the 
socket in the meantime. The code was changed to reconnect to the DA if this 
happens.

Also, a bug in the service lifetime handling was fixed that could lead to 
services being removed up to 15 seconds to early.

		</description>
<advisory from="security@suse.de">
	<issued date="2011-12-17"/>
	<updated date="2011-12-17"/>
	<bugzilla href="https://bugzilla.suse.com/564504">SUSE bug 564504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/597215">SUSE bug 597215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/601002">SUSE bug 601002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/626444">SUSE bug 626444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/642571">SUSE bug 642571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648384">SUSE bug 648384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/658972">SUSE bug 658972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/667953">SUSE bug 667953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693756">SUSE bug 693756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/723385">SUSE bug 723385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778508">SUSE bug 778508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855385">SUSE bug 855385</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3609/">CVE-2010-3609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3609">CVE-2010-3609 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2012-4428/">CVE-2012-4428 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-4428">CVE-2012-4428 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992277" comment="openslp-1.2.0-172.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992278" comment="openslp-32bit-1.2.0-172.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992279" comment="openslp-server-1.2.0-172.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217549" version="1" class="patch">
	<metadata>
		<title>Security update for openslp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1090638" ref_url="https://bugzilla.suse.com/1090638" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<description>
This update for openslp fixes the following issues:

- CVE-2017-17833: Prevent heap-related memory corruption issue which may have
  manifested itself as a denial-of-service or a remote code-execution
  vulnerability (bsc#1090638).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-09"/>
	<updated date="2018-07-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17833">CVE-2017-17833 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572921" comment="libslp1-openssl1-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572922" comment="libslp1-openssl1-32bit-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572923" comment="openslp-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572924" comment="openslp-32bit-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572925" comment="openslp-server-1.2.0-172.27.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217550" version="1" class="patch">
	<metadata>
		<title>Security update for OpenSSH</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="604274" ref_url="https://bugzilla.suse.com/604274" source="BUGZILLA"/>
		<reference ref_id="628444" ref_url="https://bugzilla.suse.com/628444" source="BUGZILLA"/>
		<reference ref_id="660064" ref_url="https://bugzilla.suse.com/660064" source="BUGZILLA"/>
		<reference ref_id="663412" ref_url="https://bugzilla.suse.com/663412" source="BUGZILLA"/>
		<reference ref_id="683733" ref_url="https://bugzilla.suse.com/683733" source="BUGZILLA"/>
		<reference ref_id="692799" ref_url="https://bugzilla.suse.com/692799" source="BUGZILLA"/>
		<reference ref_id="694890" ref_url="https://bugzilla.suse.com/694890" source="BUGZILLA"/>
		<reference ref_id="703147" ref_url="https://bugzilla.suse.com/703147" source="BUGZILLA"/>
		<reference ref_id="703221" ref_url="https://bugzilla.suse.com/703221" source="BUGZILLA"/>
		<reference ref_id="708678" ref_url="https://bugzilla.suse.com/708678" source="BUGZILLA"/>
		<reference ref_id="709782" ref_url="https://bugzilla.suse.com/709782" source="BUGZILLA"/>
		<reference ref_id="719132" ref_url="https://bugzilla.suse.com/719132" source="BUGZILLA"/>
		<reference ref_id="744643" ref_url="https://bugzilla.suse.com/744643" source="BUGZILLA"/>
		<reference ref_id="749147" ref_url="https://bugzilla.suse.com/749147" source="BUGZILLA"/>
		<reference ref_id="752354" ref_url="https://bugzilla.suse.com/752354" source="BUGZILLA"/>
		<reference ref_id="755505" ref_url="https://bugzilla.suse.com/755505" source="BUGZILLA"/>
		<reference ref_id="756370" ref_url="https://bugzilla.suse.com/756370" source="BUGZILLA"/>
		<reference ref_id="802639" ref_url="https://bugzilla.suse.com/802639" source="BUGZILLA"/>
		<reference ref_id="821039" ref_url="https://bugzilla.suse.com/821039" source="BUGZILLA"/>
		<reference ref_id="826906" ref_url="https://bugzilla.suse.com/826906" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-5107" ref_url="https://www.suse.com/security/cve/CVE-2010-5107/" source="CVE"/>
		<reference ref_id="CVE-2011-5000" ref_url="https://www.suse.com/security/cve/CVE-2011-5000/" source="CVE"/>
		<reference ref_id="CVE-2012-0814" ref_url="https://www.suse.com/security/cve/CVE-2012-0814/" source="CVE"/>
		<description>

This update for OpenSSH provides the following fixes:

    * Implement remote denial of service hardening (bnc#802639,
      CVE-2010-5107)
    * Use only FIPS 140-2 approved algorithms when FIPS mode is detected
      (bnc#755505, bnc#821039)
    * Do not link OpenSSH binaries with LDAP libraries (bnc#826906)

Security Issue reference:

    * CVE-2010-5107
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5107&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-07-16"/>
	<updated date="2013-07-16"/>
	<bugzilla href="https://bugzilla.suse.com/604274">SUSE bug 604274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/628444">SUSE bug 628444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/660064">SUSE bug 660064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/663412">SUSE bug 663412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/683733">SUSE bug 683733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/692799">SUSE bug 692799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/694890">SUSE bug 694890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703147">SUSE bug 703147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703221">SUSE bug 703221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/708678">SUSE bug 708678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/709782">SUSE bug 709782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/719132">SUSE bug 719132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744643">SUSE bug 744643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749147">SUSE bug 749147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752354">SUSE bug 752354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/755505">SUSE bug 755505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/756370">SUSE bug 756370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802639">SUSE bug 802639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821039">SUSE bug 821039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826906">SUSE bug 826906</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5107/">CVE-2010-5107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-5107">CVE-2010-5107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5000/">CVE-2011-5000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-5000">CVE-2011-5000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0814/">CVE-2012-0814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0814">CVE-2012-0814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992280" comment="openssh-5.1p1-41.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992281" comment="openssh-askpass-5.1p1-41.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992282" comment="openssh-askpass-gnome-5.1p1-41.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217551" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="673532" ref_url="https://bugzilla.suse.com/673532" source="BUGZILLA"/>
		<reference ref_id="903649" ref_url="https://bugzilla.suse.com/903649" source="BUGZILLA"/>
		<reference ref_id="905118" ref_url="https://bugzilla.suse.com/905118" source="BUGZILLA"/>
		<reference ref_id="914309" ref_url="https://bugzilla.suse.com/914309" source="BUGZILLA"/>
		<reference ref_id="932483" ref_url="https://bugzilla.suse.com/932483" source="BUGZILLA"/>
		<reference ref_id="936695" ref_url="https://bugzilla.suse.com/936695" source="BUGZILLA"/>
		<reference ref_id="938746" ref_url="https://bugzilla.suse.com/938746" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-5352" ref_url="https://www.suse.com/security/cve/CVE-2015-5352/" source="CVE"/>
		<reference ref_id="CVE-2015-5600" ref_url="https://www.suse.com/security/cve/CVE-2015-5600/" source="CVE"/>
		<description>
openssh was updated to fix four security issues.

These security issues were fixed:
- CVE-2015-5352: The x11_open_helper function in channels.c in ssh in OpenSSH when ForwardX11Trusted mode is not used, lacked a check of the refusal deadline for X connections, which made it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window (bsc#936695).
- CVE-2015-5600: The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH did not properly restrict the processing of keyboard-interactive devices within a single connection, which made it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list (bsc#938746).
- CVE-2015-4000: Removed and disabled weak DH groups (bsc#932483).
- Hardening patch to fix sftp RCE (bsc#903649).

These non-security issues were fixed:
- bsc#914309: sshd inherits oom_adj -17 on SIGHUP causing DoS potential for oom_killer.
- bsc#673532: limits.conf fsize change in SLES10SP3 causing problems to WebSphere mqm user.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-19"/>
	<updated date="2015-10-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/673532">SUSE bug 673532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903649">SUSE bug 903649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905118">SUSE bug 905118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914309">SUSE bug 914309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936695">SUSE bug 936695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938746">SUSE bug 938746</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5352/">CVE-2015-5352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5352">CVE-2015-5352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5600/">CVE-2015-5600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5600">CVE-2015-5600 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572929" comment="openssh-5.1p1-41.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572930" comment="openssh-askpass-5.1p1-41.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572931" comment="openssh-askpass-gnome-5.1p1-41.69.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217552" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="932483" ref_url="https://bugzilla.suse.com/932483" source="BUGZILLA"/>
		<reference ref_id="948902" ref_url="https://bugzilla.suse.com/948902" source="BUGZILLA"/>
		<reference ref_id="959096" ref_url="https://bugzilla.suse.com/959096" source="BUGZILLA"/>
		<reference ref_id="962313" ref_url="https://bugzilla.suse.com/962313" source="BUGZILLA"/>
		<reference ref_id="962794" ref_url="https://bugzilla.suse.com/962794" source="BUGZILLA"/>
		<reference ref_id="970632" ref_url="https://bugzilla.suse.com/970632" source="BUGZILLA"/>
		<reference ref_id="975865" ref_url="https://bugzilla.suse.com/975865" source="BUGZILLA"/>
		<reference ref_id="981654" ref_url="https://bugzilla.suse.com/981654" source="BUGZILLA"/>
		<reference ref_id="989363" ref_url="https://bugzilla.suse.com/989363" source="BUGZILLA"/>
		<reference ref_id="992533" ref_url="https://bugzilla.suse.com/992533" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8325" ref_url="https://www.suse.com/security/cve/CVE-2015-8325/" source="CVE"/>
		<reference ref_id="CVE-2016-1908" ref_url="https://www.suse.com/security/cve/CVE-2016-1908/" source="CVE"/>
		<reference ref_id="CVE-2016-3115" ref_url="https://www.suse.com/security/cve/CVE-2016-3115/" source="CVE"/>
		<reference ref_id="CVE-2016-6210" ref_url="https://www.suse.com/security/cve/CVE-2016-6210/" source="CVE"/>
		<reference ref_id="CVE-2016-6515" ref_url="https://www.suse.com/security/cve/CVE-2016-6515/" source="CVE"/>
		<description>
This update for openssh fixes security issues and bugs.

The following vulnerabilities were fixed:

- CVE-2016-6210: User enumeration through the timing of password (bsc#989363)
- CVE-2016-3115: Missing sanitisation of untrusted input allows an authenticated user who is able to request X11 forwarding inject commands to xauth (bsc#970632)
- CVE-2016-1908: X11 SECURITY circumvention when forwarding X11 connections (bsc#962313)
- CVE-2015-8325: Malicious users may attach /bin/login via LD_PRELOAD or similar environment variables set via PAM if PAM is configured to read user-specified environment and UseLogin=yes is set is sshd_config (bsc#975865)
- CVE-2016-6515: Remote attackers could cause a denial of service by providing exceptionally long passwords (bsc#992533)

The following security related changes are included:

- bsc#932483, bsc#948902: Disable DH parameters under 2048 bits by default and allow lowering the limit back to the RFC 4419 specified minimum through an option (bsc#932483, bsc#948902)
- bsc#948902: Allow lowering the DH groups parameter limit in server as well as when GSSAPI key exchange is used

The following tracked changes are included:

- bsc#981654: avoid complaining about unset DISPLAY variable
- bsc#959096: initialise msg_id to prevent disconnections
- bsc#962794: relax version requires for the openssh-askpass subpackage
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-19"/>
	<updated date="2016-10-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948902">SUSE bug 948902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959096">SUSE bug 959096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962313">SUSE bug 962313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962794">SUSE bug 962794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970632">SUSE bug 970632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975865">SUSE bug 975865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981654">SUSE bug 981654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989363">SUSE bug 989363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992533">SUSE bug 992533</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8325/">CVE-2015-8325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8325">CVE-2015-8325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1908/">CVE-2016-1908 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1908">CVE-2016-1908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3115/">CVE-2016-3115 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3115">CVE-2016-3115 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-6210/">CVE-2016-6210 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6210">CVE-2016-6210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6515/">CVE-2016-6515 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6515">CVE-2016-6515 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572932" comment="openssh-5.1p1-41.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572933" comment="openssh-askpass-5.1p1-41.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572934" comment="openssh-askpass-gnome-5.1p1-41.74.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217553" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1005480" ref_url="https://bugzilla.suse.com/1005480" source="BUGZILLA"/>
		<reference ref_id="1005893" ref_url="https://bugzilla.suse.com/1005893" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8858" ref_url="https://www.suse.com/security/cve/CVE-2016-8858/" source="CVE"/>
		<description>

This update for openssh fixes the following issues:

- CVE-2016-8858: prevent resource depletion during key exchange (bsc#1005480, CVE-2016-8858)
- Properly verify CIDR masks in configuration (bsc#1005893)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-07"/>
	<updated date="2017-04-07"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1005480">SUSE bug 1005480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005893">SUSE bug 1005893</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8858/">CVE-2016-8858 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8858">CVE-2016-8858 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572935" comment="openssh-5.1p1-41.79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572936" comment="openssh-askpass-5.1p1-41.79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572937" comment="openssh-askpass-gnome-5.1p1-41.79.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217554" version="1" class="patch">
	<metadata>
		<title>Security update for openssh, openssh-askpass, openssh-openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1034467" ref_url="https://bugzilla.suse.com/1034467" source="BUGZILLA"/>
		<reference ref_id="1077104" ref_url="https://bugzilla.suse.com/1077104" source="BUGZILLA"/>
		<reference ref_id="886235" ref_url="https://bugzilla.suse.com/886235" source="BUGZILLA"/>
		<description>


This update for openssh, openssh-askpass, openssh-openssl1 fixes the following issues:

Upgrade to OpenSSH version 6.6p1 (bsc#1077104, bsc#1034467)

This also adds another build using '-openssl1' suffix, which can be installed

- require openssh-askpass of the same version or newer.
- change the Supplements tag to combination of both openssh and X11
  to prevent accidental imports of the X11 packages into minimal
  installs (bsc#886235)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-20"/>
	<updated date="2018-02-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034467">SUSE bug 1034467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077104">SUSE bug 1077104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886235">SUSE bug 886235</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572938" comment="openssh-5.1p1-41.80.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572939" comment="openssh-askpass-1.2.4.1-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572940" comment="openssh-openssl1-6.6p1-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572941" comment="openssh-openssl1-helpers-6.6p1-3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217555" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1121571" ref_url="https://bugzilla.suse.com/1121571" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20685" ref_url="https://www.suse.com/security/cve/CVE-2018-20685/" source="CVE"/>
		<description>
This update for openssh version 6.6p1 fixes the following issues:

Security issues fixed:

- CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions (bsc#1121571)

The regular openssh version was updated to openssh 6.6p1, the -openssl1 variant was at this version already.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-08"/>
	<updated date="2019-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20685/">CVE-2018-20685 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20685">CVE-2018-20685 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572942" comment="openssh-6.6p1-80.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572943" comment="openssh-askpass-gnome-6.6p1-80.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572944" comment="openssh-openssl1-6.6p1-80.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572945" comment="openssh-openssl1-helpers-6.6p1-80.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217556" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1090671" ref_url="https://bugzilla.suse.com/1090671" source="BUGZILLA"/>
		<reference ref_id="1115550" ref_url="https://bugzilla.suse.com/1115550" source="BUGZILLA"/>
		<reference ref_id="1119183" ref_url="https://bugzilla.suse.com/1119183" source="BUGZILLA"/>
		<reference ref_id="1121816" ref_url="https://bugzilla.suse.com/1121816" source="BUGZILLA"/>
		<reference ref_id="1121821" ref_url="https://bugzilla.suse.com/1121821" source="BUGZILLA"/>
		<reference ref_id="1131709" ref_url="https://bugzilla.suse.com/1131709" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<description>
This update for openssh fixes the following issues:

Security vulnerabilities addressed:

- CVE-2019-6109: Fixed an character encoding issue in the progress display of
  the scp client that could be used to manipulate client output, allowing
  for spoofing during file transfers (bsc#1121816).
- CVE-2019-6111: Properly validate object names received by the scp client to
  prevent arbitrary file overwrites when interacting with a malicious SSH server
  (bsc#1121821).

Other issues fixed: 

- Fixed two race conditions in sshd relating to SIGHUP (bsc#1119183).
- Returned proper reason for port forwarding failures (bsc#1090671).
- Fixed SSHD termination of multichannel sessions with non-root users (bsc#1115550).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-16"/>
	<updated date="2019-04-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1090671">SUSE bug 1090671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115550">SUSE bug 1115550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119183">SUSE bug 1119183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131709">SUSE bug 1131709</bugzilla>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6109">CVE-2019-6109 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6111">CVE-2019-6111 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572946" comment="openssh-6.6p1-80.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572947" comment="openssh-askpass-gnome-6.6p1-80.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572948" comment="openssh-openssl1-6.6p1-80.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572949" comment="openssh-openssl1-helpers-6.6p1-80.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217557" version="1" class="patch">
	<metadata>
		<title>Security update for openssh</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="798362" ref_url="https://bugzilla.suse.com/798362" source="BUGZILLA"/>
		<reference ref_id="826427" ref_url="https://bugzilla.suse.com/826427" source="BUGZILLA"/>
		<reference ref_id="826906" ref_url="https://bugzilla.suse.com/826906" source="BUGZILLA"/>
		<reference ref_id="832628" ref_url="https://bugzilla.suse.com/832628" source="BUGZILLA"/>
		<reference ref_id="833605" ref_url="https://bugzilla.suse.com/833605" source="BUGZILLA"/>
		<reference ref_id="847710" ref_url="https://bugzilla.suse.com/847710" source="BUGZILLA"/>
		<reference ref_id="862875" ref_url="https://bugzilla.suse.com/862875" source="BUGZILLA"/>
		<reference ref_id="869101" ref_url="https://bugzilla.suse.com/869101" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2532" ref_url="https://www.suse.com/security/cve/CVE-2014-2532/" source="CVE"/>
		<description>

This update for OpenSSH provides fixes for the following issues:

    * Exit sshd normally when port is already in use. (bnc#832628)
    * Use hardware crypto engines where available. (bnc#826427)
    * Use correct options for login when it is used. (bnc#833605)
    * Move FIPS messages to higher debug level. (bnc#862875)
    * Fix forwarding with IPv6 addresses in DISPLAY. (bnc#847710)
    * Do not link OpenSSH binaries with LDAP libraries. (bnc#826906)
    * Parse AcceptEnv properly. (bnc#869101, CVE-2014-2532)
    * Properly terminate connections on server reboot/powerdown.
      (bnc#798362)

Security Issue reference:

    * CVE-2014-2532
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2532&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-10"/>
	<updated date="2014-06-10"/>
	<bugzilla href="https://bugzilla.suse.com/798362">SUSE bug 798362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826427">SUSE bug 826427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826906">SUSE bug 826906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/832628">SUSE bug 832628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833605">SUSE bug 833605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847710">SUSE bug 847710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862875">SUSE bug 862875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869101">SUSE bug 869101</bugzilla>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-2532/">CVE-2014-2532 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-2532">CVE-2014-2532 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572950" comment="openssh-5.1p1-41.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572951" comment="openssh-askpass-5.1p1-41.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572952" comment="openssh-askpass-gnome-5.1p1-41.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217558" version="1" class="patch">
	<metadata>
		<title>Security update for openssh-openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1076957" ref_url="https://bugzilla.suse.com/1076957" source="BUGZILLA"/>
		<reference ref_id="1091396" ref_url="https://bugzilla.suse.com/1091396" source="BUGZILLA"/>
		<reference ref_id="1105010" ref_url="https://bugzilla.suse.com/1105010" source="BUGZILLA"/>
		<reference ref_id="1115654" ref_url="https://bugzilla.suse.com/1115654" source="BUGZILLA"/>
		<reference ref_id="1116577" ref_url="https://bugzilla.suse.com/1116577" source="BUGZILLA"/>
		<reference ref_id="964336" ref_url="https://bugzilla.suse.com/964336" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10708" ref_url="https://www.suse.com/security/cve/CVE-2016-10708/" source="CVE"/>
		<reference ref_id="CVE-2018-15473" ref_url="https://www.suse.com/security/cve/CVE-2018-15473/" source="CVE"/>
		<description>


This update for openssh-openssl1 fixes the following security issues:

- CVE-2016-10708: sshd allowed remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.  (bsc#1076957)
- CVE-2018-15473: OpenSSH was prone to a user existance oracle vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. (bsc#1105010)

Non security bugfixes:

- Fix for sftp client because it returns wrong error code upon failure (bsc#1091396)
- Stop leaking File descriptors (bsc#964336)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-28"/>
	<updated date="2018-11-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076957">SUSE bug 1076957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091396">SUSE bug 1091396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115654">SUSE bug 1115654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116577">SUSE bug 1116577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964336">SUSE bug 964336</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10708/">CVE-2016-10708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10708">CVE-2016-10708 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15473/">CVE-2018-15473 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15473">CVE-2018-15473 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572953" comment="openssh-openssl1-6.6p1-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572954" comment="openssh-openssl1-helpers-6.6p1-3.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217559" version="1" class="patch">
	<metadata>
		<title>Recommended update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="937492" ref_url="https://bugzilla.suse.com/937492" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="SUSE-RU-2015:1469-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-September/003386.html" source="SUSE-SU"/>
		<description>

This update of openssl fixes a regression caused by the security fix for CVE-2015-0287,
after which DSA keys could occasionaly not loaded from disk. (bsc#937492)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-06"/>
	<updated date="2015-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/937492">SUSE bug 937492</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0287">CVE-2015-0287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009593836" comment="libopenssl-devel-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593837" comment="libopenssl0_9_8-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593838" comment="libopenssl0_9_8-32bit-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593839" comment="libopenssl0_9_8-hmac-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593840" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593841" comment="openssl-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593842" comment="openssl-doc-0.9.8j-0.74.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009593836" comment="libopenssl-devel-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593837" comment="libopenssl0_9_8-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593838" comment="libopenssl0_9_8-32bit-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593839" comment="libopenssl0_9_8-hmac-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593840" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593841" comment="openssl-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593842" comment="openssl-doc-0.9.8j-0.74.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217560" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="952099" ref_url="https://bugzilla.suse.com/952099" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<description>

This update for openssl fixes the following issues: 

- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure
  OpenSSL would leak memory. This structure is used by the PKCS#7 and CMS
  routines so any application which reads PKCS#7 or CMS data from untrusted
  sources is affected. SSL/TLS is not affected. (bsc#957812)

- Prevent segfault in s_client with invalid options (bsc#952099)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-15"/>
	<updated date="2015-12-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952099">SUSE bug 952099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3195">CVE-2015-3195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572955" comment="libopenssl0_9_8-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567025" comment="libopenssl0_9_8-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572956" comment="libopenssl0_9_8-hmac-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572957" comment="openssl-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572958" comment="openssl-doc-0.9.8j-0.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217561" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="952871" ref_url="https://bugzilla.suse.com/952871" source="BUGZILLA"/>
		<reference ref_id="963415" ref_url="https://bugzilla.suse.com/963415" source="BUGZILLA"/>
		<reference ref_id="967787" ref_url="https://bugzilla.suse.com/967787" source="BUGZILLA"/>
		<reference ref_id="968046" ref_url="https://bugzilla.suse.com/968046" source="BUGZILLA"/>
		<reference ref_id="968047" ref_url="https://bugzilla.suse.com/968047" source="BUGZILLA"/>
		<reference ref_id="968048" ref_url="https://bugzilla.suse.com/968048" source="BUGZILLA"/>
		<reference ref_id="968051" ref_url="https://bugzilla.suse.com/968051" source="BUGZILLA"/>
		<reference ref_id="968053" ref_url="https://bugzilla.suse.com/968053" source="BUGZILLA"/>
		<reference ref_id="968374" ref_url="https://bugzilla.suse.com/968374" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0703" ref_url="https://www.suse.com/security/cve/CVE-2016-0703/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<description>

This update for openssl fixes various security issues and bugs: 

Security issues fixed:
- CVE-2016-0800 aka the 'DROWN' attack (bsc#968046):
  OpenSSL was vulnerable to a cross-protocol attack that could lead to
  decryption of TLS sessions by using a server supporting SSLv2 and
  EXPORT cipher suites as a Bleichenbacher RSA padding oracle.

  This update changes the openssl library to:

  * Disable SSLv2 protocol support by default.

    This can be overridden by setting the environment variable
    'OPENSSL_ALLOW_SSL2' or by using SSL_CTX_clear_options using the
    SSL_OP_NO_SSLv2 flag.

    Note that various services and clients had already disabled SSL
    protocol 2 by default previously.

  * Disable all weak EXPORT ciphers by default. These can be reenabled
    if required by old legacy software using the environment variable
    'OPENSSL_ALLOW_EXPORT'.

- CVE-2016-0705 (bnc#968047):
  A double free() bug in the DSA ASN1 parser code was fixed that could
  be abused to facilitate a denial-of-service attack.

- CVE-2016-0797 (bnc#968048):
  The BN_hex2bn() and BN_dec2bn() functions had a bug that could result
  in an attempt to de-reference a NULL pointer leading to crashes.
  This could have security consequences if these functions were ever
  called by user applications with large untrusted hex/decimal data. Also,
  internal usage of these functions in OpenSSL uses data from config files
  or application command line arguments. If user developed applications
  generated config file data based on untrusted data, then this could
  have had security consequences as well.

- CVE-2016-0799 (bnc#968374)
  On many 64 bit systems, the internal fmtstr() and doapr_outch()
  functions could miscalculate the length of a string and attempt to
  access out-of-bounds memory locations. These problems could have
  enabled attacks where large amounts of untrusted data is passed to
  the BIO_*printf functions. If applications use these functions in
  this way then they could have been vulnerable. OpenSSL itself uses
  these functions when printing out human-readable dumps of ASN.1
  data. Therefore applications that print this data could have been
  vulnerable if the data is from untrusted sources. OpenSSL command line
  applications could also have been vulnerable when they print out ASN.1
  data, or if untrusted data is passed as command line arguments. Libssl
  is not considered directly vulnerable.

- CVE-2015-3197 (bsc#963415):
  The SSLv2 protocol did not block disabled ciphers.

Note that the March 1st 2016 release also references following CVEs
that were fixed by us with CVE-2015-0293 in 2015:

- CVE-2016-0703 (bsc#968051): This issue only affected versions of
  OpenSSL prior to March 19th 2015 at which time the code was refactored
  to address vulnerability CVE-2015-0293. It would have made the above
  'DROWN' attack much easier.
- CVE-2016-0704 (bsc#968053): 'Bleichenbacher oracle in SSLv2'
  This issue only affected versions of OpenSSL prior to March 19th
  2015 at which time the code was refactored to address vulnerability
  CVE-2015-0293. It would have made the above 'DROWN' attack much easier.

Also fixes the following bug:
- Avoid running OPENSSL_config twice. This avoids breaking
  engine loading and also fixes a memory leak in libssl. (bsc#952871 bsc#967787)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-01"/>
	<updated date="2016-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/952871">SUSE bug 952871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963415">SUSE bug 963415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967787">SUSE bug 967787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968047">SUSE bug 968047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968048">SUSE bug 968048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968053">SUSE bug 968053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968374">SUSE bug 968374</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3197">CVE-2015-3197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0702">CVE-2016-0702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0703/">CVE-2016-0703 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0703">CVE-2016-0703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0705">CVE-2016-0705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0797">CVE-2016-0797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0799">CVE-2016-0799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0800">CVE-2016-0800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572959" comment="libopenssl0_9_8-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567421" comment="libopenssl0_9_8-32bit-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572960" comment="libopenssl0_9_8-hmac-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572961" comment="openssl-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572962" comment="openssl-doc-0.9.8j-0.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217562" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="889013" ref_url="https://bugzilla.suse.com/889013" source="BUGZILLA"/>
		<reference ref_id="968050" ref_url="https://bugzilla.suse.com/968050" source="BUGZILLA"/>
		<reference ref_id="976942" ref_url="https://bugzilla.suse.com/976942" source="BUGZILLA"/>
		<reference ref_id="976943" ref_url="https://bugzilla.suse.com/976943" source="BUGZILLA"/>
		<reference ref_id="977614" ref_url="https://bugzilla.suse.com/977614" source="BUGZILLA"/>
		<reference ref_id="977615" ref_url="https://bugzilla.suse.com/977615" source="BUGZILLA"/>
		<reference ref_id="977617" ref_url="https://bugzilla.suse.com/977617" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<description>

This update for openssl fixes the following issues: 

Security issues fixed:
- CVE-2016-2108: Memory corruption in the ASN.1 encoder (bsc#977617)
- CVE-2016-2105: EVP_EncodeUpdate overflow (bsc#977614)
- CVE-2016-2106: EVP_EncryptUpdate overflow (bsc#977615)
- CVE-2016-2109: ASN.1 BIO excessive memory allocation (bsc#976942)
- CVE-2016-0702: Side channel attack on modular exponentiation 'CacheBleed' (bsc#968050)

Bugs fixed:
- fate#320304: build 32bit devel package
- bsc#976943: Fix buffer overrun in ASN1_parse
- bsc#973223: allow weak DH groups, vulnerable to the logjam attack,
  when environment variable OPENSSL_ALLOW_LOGJAM_ATTACK is set
- bsc#889013: Rename README.SuSE to the new spelling
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-12"/>
	<updated date="2016-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/889013">SUSE bug 889013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968050">SUSE bug 968050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976943">SUSE bug 976943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977614">SUSE bug 977614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977615">SUSE bug 977615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977617">SUSE bug 977617</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0702">CVE-2016-0702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2105">CVE-2016-2105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2106">CVE-2016-2106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2108">CVE-2016-2108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2109">CVE-2016-2109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572963" comment="libopenssl0_9_8-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572964" comment="libopenssl0_9_8-32bit-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572965" comment="libopenssl0_9_8-hmac-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572966" comment="openssl-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572967" comment="openssl-doc-0.9.8j-0.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217563" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="979475" ref_url="https://bugzilla.suse.com/979475" source="BUGZILLA"/>
		<reference ref_id="982575" ref_url="https://bugzilla.suse.com/982575" source="BUGZILLA"/>
		<reference ref_id="983249" ref_url="https://bugzilla.suse.com/983249" source="BUGZILLA"/>
		<reference ref_id="993819" ref_url="https://bugzilla.suse.com/993819" source="BUGZILLA"/>
		<reference ref_id="994749" ref_url="https://bugzilla.suse.com/994749" source="BUGZILLA"/>
		<reference ref_id="994844" ref_url="https://bugzilla.suse.com/994844" source="BUGZILLA"/>
		<reference ref_id="995075" ref_url="https://bugzilla.suse.com/995075" source="BUGZILLA"/>
		<reference ref_id="995324" ref_url="https://bugzilla.suse.com/995324" source="BUGZILLA"/>
		<reference ref_id="995359" ref_url="https://bugzilla.suse.com/995359" source="BUGZILLA"/>
		<reference ref_id="995377" ref_url="https://bugzilla.suse.com/995377" source="BUGZILLA"/>
		<reference ref_id="998190" ref_url="https://bugzilla.suse.com/998190" source="BUGZILLA"/>
		<reference ref_id="999665" ref_url="https://bugzilla.suse.com/999665" source="BUGZILLA"/>
		<reference ref_id="999666" ref_url="https://bugzilla.suse.com/999666" source="BUGZILLA"/>
		<reference ref_id="999668" ref_url="https://bugzilla.suse.com/999668" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<description>

This update for openssl fixes the following issues:

OpenSSL Security Advisory [22 Sep 2016] (bsc#999665)

Severity: High
* OCSP Status Request extension unbounded memory growth (CVE-2016-6304) (bsc#999666)

Severity: Low
* Pointer arithmetic undefined behavior (CVE-2016-2177) (bsc#982575)
* Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249)
* DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
* DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
* OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
* Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359)
* Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
* OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
* Certificate message OOB reads (CVE-2016-6306) (bsc#999668)

More information can be found on: https://www.openssl.org/news/secadv/20160922.txt

Bugs fixed:
* Update expired S/MIME certs (bsc#979475)
* Fix crash in print_notice (bsc#998190)
* Resume reading from /dev/urandom when interrupted by a signal (bsc#995075)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-05"/>
	<updated date="2016-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979475">SUSE bug 979475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983249">SUSE bug 983249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993819">SUSE bug 993819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994749">SUSE bug 994749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995075">SUSE bug 995075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995324">SUSE bug 995324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995359">SUSE bug 995359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995377">SUSE bug 995377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998190">SUSE bug 998190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999666">SUSE bug 999666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999668">SUSE bug 999668</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2177">CVE-2016-2177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2178">CVE-2016-2178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2179">CVE-2016-2179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2181">CVE-2016-2181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2182">CVE-2016-2182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6302">CVE-2016-6302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6303">CVE-2016-6303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6304">CVE-2016-6304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6306">CVE-2016-6306 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572968" comment="libopenssl0_9_8-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572969" comment="libopenssl0_9_8-32bit-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572970" comment="libopenssl0_9_8-hmac-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572971" comment="openssl-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572972" comment="openssl-doc-0.9.8j-0.102.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217564" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1000677" ref_url="https://bugzilla.suse.com/1000677" source="BUGZILLA"/>
		<reference ref_id="1001912" ref_url="https://bugzilla.suse.com/1001912" source="BUGZILLA"/>
		<reference ref_id="1004499" ref_url="https://bugzilla.suse.com/1004499" source="BUGZILLA"/>
		<reference ref_id="1005878" ref_url="https://bugzilla.suse.com/1005878" source="BUGZILLA"/>
		<reference ref_id="1019334" ref_url="https://bugzilla.suse.com/1019334" source="BUGZILLA"/>
		<reference ref_id="1021641" ref_url="https://bugzilla.suse.com/1021641" source="BUGZILLA"/>
		<reference ref_id="984663" ref_url="https://bugzilla.suse.com/984663" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<description>

This update for openssl fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)

Security issues fixed:
- CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334)
- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)
- degrade 3DES to MEDIUM in SSL2 (bsc#1001912)
- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)

Bugs fixed:
- fix crash in openssl speed (bsc#1000677)
- don't attempt session resumption if no ticket is present and session
  ID length is zero (bsc#984663)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-01"/>
	<updated date="2017-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000677">SUSE bug 1000677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001912">SUSE bug 1001912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004499">SUSE bug 1004499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019334">SUSE bug 1019334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984663">SUSE bug 984663</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2108">CVE-2016-2108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7056">CVE-2016-7056 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8610">CVE-2016-8610 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572973" comment="libopenssl0_9_8-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572974" comment="libopenssl0_9_8-32bit-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572975" comment="libopenssl0_9_8-hmac-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572976" comment="openssl-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572977" comment="openssl-doc-0.9.8j-0.105.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217565" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1087102" ref_url="https://bugzilla.suse.com/1087102" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

-  CVE-2018-0739: Constructed ASN.1 types with a recursive definition could exceed
    the stack. This could result in a Denial Of Service attack. (bsc#1087102)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-18"/>
	<updated date="2018-04-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087102">SUSE bug 1087102</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0739">CVE-2018-0739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572978" comment="libopenssl0_9_8-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572979" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572980" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572981" comment="openssl-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572982" comment="openssl-doc-0.9.8j-0.106.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217566" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="1097624" ref_url="https://bugzilla.suse.com/1097624" source="BUGZILLA"/>
		<reference ref_id="1098592" ref_url="https://bugzilla.suse.com/1098592" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based
  ciphersuite a malicious server could have sent a very large prime value to the
  client. This caused the client to spend an unreasonably long period of time
  generating a key for this prime resulting in a hang until the client has
  finished. This could be exploited in a Denial Of Service attack (bsc#1097158).
- Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-06"/>
	<updated date="2018-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097624">SUSE bug 1097624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098592">SUSE bug 1098592</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0732">CVE-2018-0732 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572983" comment="libopenssl0_9_8-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572984" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572985" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572986" comment="openssl-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572987" comment="openssl-doc-0.9.8j-0.106.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217567" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1089039" ref_url="https://bugzilla.suse.com/1089039" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<description>
This update for openssl fixes the following security issue:

- CVE-2018-0737: The RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could have recovered the private key (bsc#1089039)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-23"/>
	<updated date="2018-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089039">SUSE bug 1089039</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0737">CVE-2018-0737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572988" comment="libopenssl0_9_8-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572989" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572990" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572991" comment="openssl-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572992" comment="openssl-doc-0.9.8j-0.106.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217568" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1104789" ref_url="https://bugzilla.suse.com/1104789" source="BUGZILLA"/>
		<reference ref_id="1110018" ref_url="https://bugzilla.suse.com/1110018" source="BUGZILLA"/>
		<reference ref_id="1113534" ref_url="https://bugzilla.suse.com/1113534" source="BUGZILLA"/>
		<reference ref_id="1113652" ref_url="https://bugzilla.suse.com/1113652" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed:

- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).
- Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-27"/>
	<updated date="2018-12-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104789">SUSE bug 1104789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110018">SUSE bug 1110018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8610">CVE-2016-8610 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0734">CVE-2018-0734 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5407">CVE-2018-5407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572993" comment="libopenssl0_9_8-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572994" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572995" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572996" comment="openssl-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572997" comment="openssl-doc-0.9.8j-0.106.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217569" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1127080" ref_url="https://bugzilla.suse.com/1127080" source="BUGZILLA"/>
		<reference ref_id="1131291" ref_url="https://bugzilla.suse.com/1131291" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed:

- CVE-2019-1559: Fix 0-byte record padding oracle via SSL_shutdown (bsc#1127080)
- Reject invalid EC point coordinates (bsc#1131291)
- Mitigate the 'The 9 Lives of Bleichenbacher's CAT: Cache ATtacks on TLS Implementations' attack (bsc#1117951)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-11"/>
	<updated date="2019-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131291">SUSE bug 1131291</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1559">CVE-2019-1559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572998" comment="libopenssl0_9_8-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572999" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573000" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573001" comment="openssl-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573002" comment="openssl-doc-0.9.8j-0.106.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217570" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1150003" ref_url="https://bugzilla.suse.com/1150003" source="BUGZILLA"/>
		<reference ref_id="1150250" ref_url="https://bugzilla.suse.com/1150250" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

OpenSSL Security Advisory [10 September 2019]

- CVE-2019-1547: Added EC_GROUP_set_generator side channel attack avoidance (bsc#1150003).
- CVE-2019-1563: Fixed Bleichenbacher attack against cms/pkcs7 encryption transported key (bsc#1150250).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-19"/>
	<updated date="2019-09-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1547">CVE-2019-1547 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1563">CVE-2019-1563 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573003" comment="libopenssl0_9_8-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573004" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573005" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573006" comment="openssl-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573007" comment="openssl-doc-0.9.8j-0.106.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217571" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1153785" ref_url="https://bugzilla.suse.com/1153785" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- Included the missing cms and pk7 fixes of CVE-2019-1563 (bsc#1153785).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-12"/>
	<updated date="2019-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153785">SUSE bug 1153785</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1563">CVE-2019-1563 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573008" comment="libopenssl0_9_8-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573009" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573010" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573011" comment="openssl-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573012" comment="openssl-doc-0.9.8j-0.106.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217572" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1160163" ref_url="https://bugzilla.suse.com/1160163" source="BUGZILLA"/>
		<description>
This update for openssl fixes the following issues:

- Add missing commits for fixing the security issue called 'The 9 Lives of Bleichenbacher's CAT'. (bsc#1117951)
- Fix a memory leak problem in function 'BN_copy()'. (bsc#1160163)
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-27"/>
	<updated date="2020-02-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160163">SUSE bug 1160163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573013" comment="libopenssl0_9_8-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573014" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573015" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573016" comment="openssl-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573017" comment="openssl-doc-0.9.8j-0.106.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217573" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1176331" ref_url="https://bugzilla.suse.com/1176331" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1968" ref_url="https://www.suse.com/security/cve/CVE-2020-1968/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2020-1968: Introduced hardening against the Raccoon attack by always generating fresh DH keys 
  and never reuse them across multiple TLS connections (bsc#1176331).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-15"/>
	<updated date="2020-09-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176331">SUSE bug 1176331</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1968/">CVE-2020-1968 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1968">CVE-2020-1968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573018" comment="libopenssl0_9_8-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573019" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573020" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573021" comment="openssl-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573022" comment="openssl-doc-0.9.8j-0.106.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217574" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1182331" ref_url="https://bugzilla.suse.com/1182331" source="BUGZILLA"/>
		<reference ref_id="1182333" ref_url="https://bugzilla.suse.com/1182333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-23840: Fixed an Integer overflow in CipherUpdate (bsc#1182333)
- CVE-2021-23841: Fixed a Null pointer dereference in X509_issuer_and_serial_hash() (bsc#1182331)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-19"/>
	<updated date="2021-03-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182331">SUSE bug 1182331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23840">CVE-2021-23840 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23841">CVE-2021-23841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573023" comment="libopenssl0_9_8-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573024" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573025" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573026" comment="openssl-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573027" comment="openssl-doc-0.9.8j-0.106.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217575" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<description>
This update for openssl fixes the following security issue:

- CVE-2021-3712: a bug in the code for printing certificate details could lead
  to a buffer overrun that a malicious actor could exploit to crash the
  application, causing a denial-of-service attack. [bsc#1189521]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631740" comment="libopenssl0_9_8-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631741" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631742" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631743" comment="openssl-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631744" comment="openssl-doc-0.9.8j-0.106.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217576" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-3712: This is an update for the incomplete fix for CVE-2021-3712. 
  Read buffer overruns processing ASN.1 strings (bsc#1189521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-18"/>
	<updated date="2021-09-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632461" comment="libopenssl0_9_8-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632462" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632463" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632464" comment="openssl-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632465" comment="openssl-doc-0.9.8j-0.106.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217577" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2022-0778: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673400" comment="libopenssl0_9_8-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673401" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673402" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673403" comment="openssl-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673404" comment="openssl-doc-0.9.8j-0.106.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217578" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-certs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="714931" ref_url="https://bugzilla.suse.com/714931" source="BUGZILLA"/>
		<reference ref_id="760503" ref_url="https://bugzilla.suse.com/760503" source="BUGZILLA"/>
		<reference ref_id="783509" ref_url="https://bugzilla.suse.com/783509" source="BUGZILLA"/>
		<reference ref_id="796628" ref_url="https://bugzilla.suse.com/796628" source="BUGZILLA"/>
		<reference ref_id="854367" ref_url="https://bugzilla.suse.com/854367" source="BUGZILLA"/>
		<reference ref_id="860581" ref_url="https://bugzilla.suse.com/860581" source="BUGZILLA"/>
		<reference ref_id="865080" ref_url="https://bugzilla.suse.com/865080" source="BUGZILLA"/>
		<reference ref_id="875647" ref_url="https://bugzilla.suse.com/875647" source="BUGZILLA"/>
		<reference ref_id="881241" ref_url="https://bugzilla.suse.com/881241" source="BUGZILLA"/>
		<description>

openssl-certs has been updated to include four new and remove two 
certificates:

    * new: Atos_TrustedRoot_2011:2.8.92.51.203.98.44.95.179.50.crt
    * new:
      E-Tugra_Certification_Authority:2.8.106.104.62.156.81.155.203.83.crt
    * new:
      TeliaSonera_Root_CA_v1:2.17.0.149.190.22.160.247.46.70.241.123.57.130.114.250.139.205.150.crt
    * new: T-TeleSec_GlobalRoot_Class_2:2.1.1.crt
    * removed: Firmaprofesional_Root_CA:2.1.1.crt
    * removed: TDC_OCES_Root_CA:2.4.62.72.189.196.crt

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-04"/>
	<updated date="2014-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/714931">SUSE bug 714931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760503">SUSE bug 760503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/783509">SUSE bug 783509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796628">SUSE bug 796628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854367">SUSE bug 854367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860581">SUSE bug 860581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865080">SUSE bug 865080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875647">SUSE bug 875647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881241">SUSE bug 881241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567027" comment="openssl-certs-1.97-0.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567027" comment="openssl-certs-1.97-0.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217579" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="889013" ref_url="https://bugzilla.suse.com/889013" source="BUGZILLA"/>
		<reference ref_id="971354" ref_url="https://bugzilla.suse.com/971354" source="BUGZILLA"/>
		<reference ref_id="976942" ref_url="https://bugzilla.suse.com/976942" source="BUGZILLA"/>
		<reference ref_id="976943" ref_url="https://bugzilla.suse.com/976943" source="BUGZILLA"/>
		<reference ref_id="977614" ref_url="https://bugzilla.suse.com/977614" source="BUGZILLA"/>
		<reference ref_id="977615" ref_url="https://bugzilla.suse.com/977615" source="BUGZILLA"/>
		<reference ref_id="977616" ref_url="https://bugzilla.suse.com/977616" source="BUGZILLA"/>
		<reference ref_id="977617" ref_url="https://bugzilla.suse.com/977617" source="BUGZILLA"/>
		<reference ref_id="977621" ref_url="https://bugzilla.suse.com/977621" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107/" source="CVE"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<description>

This update for openssl1 fixes the following issues:

Security issues fixed:
- CVE-2016-2108: Memory corruption in the ASN.1 encoder (bsc#977617)
- CVE-2016-2107: Padding oracle in AES-NI CBC MAC check (bsc#977616)
- CVE-2016-2105: EVP_EncodeUpdate overflow (bsc#977614)
- CVE-2016-2106: EVP_EncryptUpdate overflow (bsc#977615)
- CVE-2016-2109: ASN.1 BIO excessive memory allocation (bsc#976942)

Bugs fixed:
- bsc#971354: libopenssl1_0_0 now Recommends: openssl1 to get correct SSL Root
  Certificate hashes
- bsc#889013: Rename README.SuSE to the new spelling README.SUSE
- bsc#976943: Fixed a buffer overrun in ASN1_parse.
- bsc#977621: Preserve negotiated digests for SNI (bsc#977621)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-03"/>
	<updated date="2016-05-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/889013">SUSE bug 889013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971354">SUSE bug 971354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976943">SUSE bug 976943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977614">SUSE bug 977614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977615">SUSE bug 977615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977616">SUSE bug 977616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977617">SUSE bug 977617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977621">SUSE bug 977621</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2105">CVE-2016-2105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2106">CVE-2016-2106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2107">CVE-2016-2107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2108">CVE-2016-2108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2109">CVE-2016-2109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573028" comment="libopenssl1-devel-1.0.1g-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573029" comment="libopenssl1_0_0-1.0.1g-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573030" comment="libopenssl1_0_0-32bit-1.0.1g-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573031" comment="openssl1-1.0.1g-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573032" comment="openssl1-doc-1.0.1g-0.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217580" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="979475" ref_url="https://bugzilla.suse.com/979475" source="BUGZILLA"/>
		<reference ref_id="982575" ref_url="https://bugzilla.suse.com/982575" source="BUGZILLA"/>
		<reference ref_id="982745" ref_url="https://bugzilla.suse.com/982745" source="BUGZILLA"/>
		<reference ref_id="983249" ref_url="https://bugzilla.suse.com/983249" source="BUGZILLA"/>
		<reference ref_id="990419" ref_url="https://bugzilla.suse.com/990419" source="BUGZILLA"/>
		<reference ref_id="993819" ref_url="https://bugzilla.suse.com/993819" source="BUGZILLA"/>
		<reference ref_id="994749" ref_url="https://bugzilla.suse.com/994749" source="BUGZILLA"/>
		<reference ref_id="994844" ref_url="https://bugzilla.suse.com/994844" source="BUGZILLA"/>
		<reference ref_id="995075" ref_url="https://bugzilla.suse.com/995075" source="BUGZILLA"/>
		<reference ref_id="995324" ref_url="https://bugzilla.suse.com/995324" source="BUGZILLA"/>
		<reference ref_id="995359" ref_url="https://bugzilla.suse.com/995359" source="BUGZILLA"/>
		<reference ref_id="995377" ref_url="https://bugzilla.suse.com/995377" source="BUGZILLA"/>
		<reference ref_id="998190" ref_url="https://bugzilla.suse.com/998190" source="BUGZILLA"/>
		<reference ref_id="999665" ref_url="https://bugzilla.suse.com/999665" source="BUGZILLA"/>
		<reference ref_id="999666" ref_url="https://bugzilla.suse.com/999666" source="BUGZILLA"/>
		<reference ref_id="999668" ref_url="https://bugzilla.suse.com/999668" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2180" ref_url="https://www.suse.com/security/cve/CVE-2016-2180/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<description>

This update for openssl1 fixes the following issues:

penSSL Security Advisory [22 Sep 2016] (bsc#999665)

Severity: High
* OCSP Status Request extension unbounded memory growth (CVE-2016-6304) (bsc#999666)

Severity: Low
* Pointer arithmetic undefined behaviour (CVE-2016-2177) (bsc#982575)
* Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249)
* DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
* OOB read in TS_OBJ_print_bio() (CVE-2016-2180) (bsc#990419)
* DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
* OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
* Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359)
* Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
* OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
* Certificate message OOB reads (CVE-2016-6306) (bsc#999668)

More information can be found on: https://www.openssl.org/news/secadv/20160922.txt

Also following bugs were fixed:
* update expired S/MIME certs (bsc#979475)
* improve s390x performance (bsc#982745)
* fix crash in print_notice (bsc#998190)
* resume reading from /dev/urandom when interrupted by a signal (bsc#995075)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-06"/>
	<updated date="2016-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979475">SUSE bug 979475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982745">SUSE bug 982745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983249">SUSE bug 983249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990419">SUSE bug 990419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993819">SUSE bug 993819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994749">SUSE bug 994749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995075">SUSE bug 995075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995324">SUSE bug 995324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995359">SUSE bug 995359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995377">SUSE bug 995377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998190">SUSE bug 998190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999666">SUSE bug 999666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999668">SUSE bug 999668</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2177">CVE-2016-2177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2178">CVE-2016-2178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2179">CVE-2016-2179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2180/">CVE-2016-2180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2180">CVE-2016-2180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2181">CVE-2016-2181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2182">CVE-2016-2182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6302">CVE-2016-6302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6303">CVE-2016-6303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6304">CVE-2016-6304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6306">CVE-2016-6306 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573033" comment="libopenssl1-devel-1.0.1g-0.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573034" comment="libopenssl1_0_0-1.0.1g-0.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573035" comment="libopenssl1_0_0-32bit-1.0.1g-0.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573036" comment="openssl1-1.0.1g-0.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573037" comment="openssl1-doc-1.0.1g-0.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217581" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1000677" ref_url="https://bugzilla.suse.com/1000677" source="BUGZILLA"/>
		<reference ref_id="1001707" ref_url="https://bugzilla.suse.com/1001707" source="BUGZILLA"/>
		<reference ref_id="1001912" ref_url="https://bugzilla.suse.com/1001912" source="BUGZILLA"/>
		<reference ref_id="1004499" ref_url="https://bugzilla.suse.com/1004499" source="BUGZILLA"/>
		<reference ref_id="1005878" ref_url="https://bugzilla.suse.com/1005878" source="BUGZILLA"/>
		<reference ref_id="1019334" ref_url="https://bugzilla.suse.com/1019334" source="BUGZILLA"/>
		<reference ref_id="1021641" ref_url="https://bugzilla.suse.com/1021641" source="BUGZILLA"/>
		<reference ref_id="1022085" ref_url="https://bugzilla.suse.com/1022085" source="BUGZILLA"/>
		<reference ref_id="1022644" ref_url="https://bugzilla.suse.com/1022644" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731/" source="CVE"/>
		<description>

This update for openssl1 fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)

Security issues fixed:
- CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334)
- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)
- CVE-2017-3731: Truncated packet could crash via OOB read (bsc#1022085)
- Degrade the 3DES cipher to MEDIUM in SSLv2 (bsc#1001912)
- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)

Bugs fixed:
- fix crash in openssl speed (bsc#1000677)
- call c_rehash in %post (bsc#1001707)
- ship static libraries in the devel package (bsc#1022644)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-17"/>
	<updated date="2017-02-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000677">SUSE bug 1000677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001707">SUSE bug 1001707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001912">SUSE bug 1001912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004499">SUSE bug 1004499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019334">SUSE bug 1019334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022085">SUSE bug 1022085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022644">SUSE bug 1022644</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2108">CVE-2016-2108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7056">CVE-2016-7056 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8610">CVE-2016-8610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3731">CVE-2017-3731 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573038" comment="libopenssl1-devel-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573039" comment="libopenssl1-devel-32bit-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573040" comment="libopenssl1_0_0-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573041" comment="libopenssl1_0_0-32bit-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573042" comment="openssl1-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573043" comment="openssl1-doc-1.0.1g-0.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217582" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1027908" ref_url="https://bugzilla.suse.com/1027908" source="BUGZILLA"/>
		<reference ref_id="1032261" ref_url="https://bugzilla.suse.com/1032261" source="BUGZILLA"/>
		<reference ref_id="1055825" ref_url="https://bugzilla.suse.com/1055825" source="BUGZILLA"/>
		<reference ref_id="1056058" ref_url="https://bugzilla.suse.com/1056058" source="BUGZILLA"/>
		<reference ref_id="1057660" ref_url="https://bugzilla.suse.com/1057660" source="BUGZILLA"/>
		<reference ref_id="1065363" ref_url="https://bugzilla.suse.com/1065363" source="BUGZILLA"/>
		<reference ref_id="990592" ref_url="https://bugzilla.suse.com/990592" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

Security issues fixed:

- CVE-2017-3735: Malformed X.509 IPAdressFamily could cause OOB read (bsc#1056058)
- adjust DEFAULT_SUSE to meet 1.0.2 and current state (bsc#1027908)
- out of bounds read+crash in DES_fcrypt (bsc#1065363)
- DEFAULT_SUSE cipher list is missing ECDHE-ECDSA ciphers (bsc#1055825)
- Missing important ciphers in openssl 1.0.1i-47.1 (bsc#990592)

Bug fixes:

- support alternate root ca chains (bsc#1032261)
- Require openssl1, so c_rehash1 is available during %post to hash the certificates (bsc#1057660)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-09"/>
	<updated date="2017-11-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027908">SUSE bug 1027908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032261">SUSE bug 1032261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055825">SUSE bug 1055825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056058">SUSE bug 1056058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057660">SUSE bug 1057660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065363">SUSE bug 1065363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990592">SUSE bug 990592</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3735">CVE-2017-3735 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573044" comment="libopenssl1-devel-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573045" comment="libopenssl1-devel-32bit-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573046" comment="libopenssl1_0_0-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573047" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573048" comment="openssl1-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573049" comment="openssl1-doc-1.0.1g-0.58.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217583" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1087102" ref_url="https://bugzilla.suse.com/1087102" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

-  CVE-2018-0739: Constructed ASN.1 types with a recursive definition could exceed
    the stack. This could result in a Denial Of Service attack. (bsc#1087102)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-09"/>
	<updated date="2018-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087102">SUSE bug 1087102</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0739">CVE-2018-0739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573050" comment="libopenssl1-devel-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573051" comment="libopenssl1-devel-32bit-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573052" comment="libopenssl1_0_0-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573053" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573054" comment="openssl1-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573055" comment="openssl1-doc-1.0.1g-0.58.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217584" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1089039" ref_url="https://bugzilla.suse.com/1089039" source="BUGZILLA"/>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="1097624" ref_url="https://bugzilla.suse.com/1097624" source="BUGZILLA"/>
		<reference ref_id="1098592" ref_url="https://bugzilla.suse.com/1098592" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<description>
This update for openssl1 fixes the following security issues:

- CVE-2018-0737: The RSA Key generation algorithm has been shown to be
  vulnerable to a cache timing side channel attack. An attacker with sufficient
  access to mount cache timing attacks during the RSA key generation process
  could have recovered the private key (bsc#1089039)
- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based
  ciphersuite a malicious server could have sent a very large prime value to the
  client. This caused the client to spend an unreasonably long period of time
  generating a key for this prime resulting in a hang until the client has
  finished. This could be exploited in a Denial Of Service attack (bsc#1097158)
- Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-28"/>
	<updated date="2018-08-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089039">SUSE bug 1089039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097624">SUSE bug 1097624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098592">SUSE bug 1098592</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0732">CVE-2018-0732 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0737">CVE-2018-0737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573056" comment="libopenssl1-devel-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573057" comment="libopenssl1-devel-32bit-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573058" comment="libopenssl1_0_0-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573059" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573060" comment="openssl1-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573061" comment="openssl1-doc-1.0.1g-0.58.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217585" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1104789" ref_url="https://bugzilla.suse.com/1104789" source="BUGZILLA"/>
		<reference ref_id="1110018" ref_url="https://bugzilla.suse.com/1110018" source="BUGZILLA"/>
		<reference ref_id="1113534" ref_url="https://bugzilla.suse.com/1113534" source="BUGZILLA"/>
		<reference ref_id="1113652" ref_url="https://bugzilla.suse.com/1113652" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

Security issues fixed:

- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).
- Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-03"/>
	<updated date="2018-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104789">SUSE bug 1104789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110018">SUSE bug 1110018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8610">CVE-2016-8610 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0734">CVE-2018-0734 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5407">CVE-2018-5407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573062" comment="libopenssl1-devel-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573063" comment="libopenssl1-devel-32bit-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573064" comment="libopenssl1_0_0-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573065" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573066" comment="openssl1-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573067" comment="openssl1-doc-1.0.1g-0.58.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217586" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1127080" ref_url="https://bugzilla.suse.com/1127080" source="BUGZILLA"/>
		<reference ref_id="1131291" ref_url="https://bugzilla.suse.com/1131291" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559/" source="CVE"/>
		<description>
This update for openssl1 fixes the following security issues:

- CVE-2019-1559: Fix 0-byte record padding oracle via SSL_shutdown (bsc#1127080)
- Reject invalid EC point coordinates (bsc#1131291)
- Fixed 'The 9 Lives of Bleichenbacher's CAT: Cache ATtacks on TLS Implementations' (bsc#1117951)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-18"/>
	<updated date="2019-06-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131291">SUSE bug 1131291</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1559">CVE-2019-1559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573068" comment="libopenssl1-devel-1.0.1g-0.58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573069" comment="libopenssl1-devel-32bit-1.0.1g-0.58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573070" comment="libopenssl1_0_0-1.0.1g-0.58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573071" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573072" comment="openssl1-1.0.1g-0.58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573073" comment="openssl1-doc-1.0.1g-0.58.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217587" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1150003" ref_url="https://bugzilla.suse.com/1150003" source="BUGZILLA"/>
		<reference ref_id="1150250" ref_url="https://bugzilla.suse.com/1150250" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

OpenSSL Security Advisory [10 September 2019]

* CVE-2019-1547: Added EC_GROUP_set_generator side channel attack avoidance. (bsc#1150003)
* CVE-2019-1563: Fixed Bleichenbacher attack against cms/pkcs7 encryption transported key (bsc#1150250)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1547">CVE-2019-1547 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1563">CVE-2019-1563 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573074" comment="libopenssl1-devel-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573075" comment="libopenssl1-devel-32bit-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573076" comment="libopenssl1_0_0-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573077" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573078" comment="openssl1-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573079" comment="openssl1-doc-1.0.1g-0.58.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217588" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1160163" ref_url="https://bugzilla.suse.com/1160163" source="BUGZILLA"/>
		<description>
This update for openssl1 fixes the following issues:

- Add missing commits fixing the security issue called 'The 9 Lives of Bleichenbacher's CAT'. (bsc#1117951)
- Fix a memory problem in 'BN_copy()'. (bsc#1160163)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-24"/>
	<updated date="2020-02-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160163">SUSE bug 1160163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573080" comment="libopenssl1-devel-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573081" comment="libopenssl1-devel-32bit-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573082" comment="libopenssl1_0_0-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573083" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573084" comment="openssl1-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573085" comment="openssl1-doc-1.0.1g-0.58.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217589" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1176331" ref_url="https://bugzilla.suse.com/1176331" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1968" ref_url="https://www.suse.com/security/cve/CVE-2020-1968/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2020-1968: Introduced hardening against the Raccoon attack by always generating fresh DH keys 
  and never reuse them across multiple TLS connections (bsc#1176331).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176331">SUSE bug 1176331</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1968/">CVE-2020-1968 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1968">CVE-2020-1968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573086" comment="libopenssl1-devel-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573087" comment="libopenssl1-devel-32bit-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573088" comment="libopenssl1_0_0-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573089" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573090" comment="openssl1-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573091" comment="openssl1-doc-1.0.1g-0.58.27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217590" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1179491" ref_url="https://bugzilla.suse.com/1179491" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2020-1971: Fixed a null pointer dereference in EDIPARTYNAME (bsc#1179491).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-09"/>
	<updated date="2020-12-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179491">SUSE bug 1179491</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1971">CVE-2020-1971 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573092" comment="libopenssl1-devel-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573093" comment="libopenssl1-devel-32bit-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573094" comment="libopenssl1_0_0-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573095" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573096" comment="openssl1-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573097" comment="openssl1-doc-1.0.1g-0.58.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217591" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1182331" ref_url="https://bugzilla.suse.com/1182331" source="BUGZILLA"/>
		<reference ref_id="1182333" ref_url="https://bugzilla.suse.com/1182333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2021-23840: Fixed an Integer overflow in CipherUpdate (bsc#1182333)
- CVE-2021-23841: Fixed a Null pointer dereference in X509_issuer_and_serial_hash() (bsc#1182331)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182331">SUSE bug 1182331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23840">CVE-2021-23840 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23841">CVE-2021-23841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573098" comment="libopenssl1-devel-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573099" comment="libopenssl1-devel-32bit-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573100" comment="libopenssl1_0_0-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573101" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573102" comment="openssl1-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573103" comment="openssl1-doc-1.0.1g-0.58.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217592" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<description>
This update for openssl1 fixes the following security issue:

- CVE-2021-3712: a bug in the code for printing certificate details could
  lead to a buffer overrun that a malicious actor could exploit to crash
  the application, causing a denial-of-service attack. [bsc#1189521]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631745" comment="libopenssl1-devel-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631746" comment="libopenssl1-devel-32bit-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631747" comment="libopenssl1_0_0-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631748" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631749" comment="openssl1-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631750" comment="openssl1-doc-1.0.1g-0.58.36.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217593" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2021-3712: This is an update for the incomplete fix for CVE-2021-3712.                                                                                                                   
  Read buffer overruns processing ASN.1 strings (bsc#1189521).                                                                                                                                 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-18"/>
	<updated date="2021-09-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632543" comment="libopenssl1-devel-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632544" comment="libopenssl1-devel-32bit-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632545" comment="libopenssl1_0_0-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632546" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632547" comment="openssl1-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632548" comment="openssl1-doc-1.0.1g-0.58.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217594" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2022-0778: Fixed an infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673405" comment="libopenssl1-devel-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673406" comment="libopenssl1-devel-32bit-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673407" comment="libopenssl1_0_0-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673408" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673409" comment="openssl1-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673410" comment="openssl1-doc-1.0.1g-0.58.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217595" version="1" class="patch">
	<metadata>
		<title>Security update for openswan</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="713986" ref_url="https://bugzilla.suse.com/713986" source="BUGZILLA"/>
		<reference ref_id="727002" ref_url="https://bugzilla.suse.com/727002" source="BUGZILLA"/>
		<reference ref_id="824316" ref_url="https://bugzilla.suse.com/824316" source="BUGZILLA"/>
		<reference ref_id="859220" ref_url="https://bugzilla.suse.com/859220" source="BUGZILLA"/>
		<reference ref_id="860542" ref_url="https://bugzilla.suse.com/860542" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-4073" ref_url="https://www.suse.com/security/cve/CVE-2011-4073/" source="CVE"/>
		<reference ref_id="CVE-2013-2053" ref_url="https://www.suse.com/security/cve/CVE-2013-2053/" source="CVE"/>
		<reference ref_id="CVE-2013-6466" ref_url="https://www.suse.com/security/cve/CVE-2013-6466/" source="CVE"/>
		<reference ref_id="CVE-2013-7294" ref_url="https://www.suse.com/security/cve/CVE-2013-7294/" source="CVE"/>
		<reference ref_id="CVE-2014-2037" ref_url="https://www.suse.com/security/cve/CVE-2014-2037/" source="CVE"/>
		<description>

This update amends an incomplete fix for CVE-2013-6466 (NULL pointer DoS). 
CVE-2014-2037 has been assigned to this issue.

Security Issues:

    * CVE-2014-2037
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2037&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-13"/>
	<updated date="2014-10-13"/>
	<bugzilla href="https://bugzilla.suse.com/713986">SUSE bug 713986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/727002">SUSE bug 727002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824316">SUSE bug 824316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859220">SUSE bug 859220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860542">SUSE bug 860542</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4073/">CVE-2011-4073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4073">CVE-2011-4073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2053/">CVE-2013-2053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2053">CVE-2013-2053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6466/">CVE-2013-6466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6466">CVE-2013-6466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7294/">CVE-2013-7294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7294">CVE-2013-7294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2037/">CVE-2014-2037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2037">CVE-2014-2037 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992283" comment="openswan-2.6.16-1.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992284" comment="openswan-doc-2.6.16-1.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217596" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="843509" ref_url="https://bugzilla.suse.com/843509" source="BUGZILLA"/>
		<reference ref_id="895882" ref_url="https://bugzilla.suse.com/895882" source="BUGZILLA"/>
		<reference ref_id="907764" ref_url="https://bugzilla.suse.com/907764" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2061" ref_url="https://www.suse.com/security/cve/CVE-2013-2061/" source="CVE"/>
		<reference ref_id="CVE-2014-8104" ref_url="https://www.suse.com/security/cve/CVE-2014-8104/" source="CVE"/>
		<description>

OpenVPN used a non-constant-time memcmp in HMAC comparison in 
openvpn_decrypt that might have allowed remote attackers to gain knowledge 
of plaintext data. (CVE-2013-2061)

Security Issues:

    * CVE-2013-2061
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2061&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-31"/>
	<updated date="2013-10-31"/>
	<bugzilla href="https://bugzilla.suse.com/843509">SUSE bug 843509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895882">SUSE bug 895882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907764">SUSE bug 907764</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2061/">CVE-2013-2061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2061">CVE-2013-2061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8104/">CVE-2014-8104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8104">CVE-2014-8104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573106" comment="openvpn-2.0.9-143.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573107" comment="openvpn-auth-pam-plugin-2.0.9-143.33.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217597" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1038709" ref_url="https://bugzilla.suse.com/1038709" source="BUGZILLA"/>
		<reference ref_id="1038711" ref_url="https://bugzilla.suse.com/1038711" source="BUGZILLA"/>
		<reference ref_id="1038713" ref_url="https://bugzilla.suse.com/1038713" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7478" ref_url="https://www.suse.com/security/cve/CVE-2017-7478/" source="CVE"/>
		<reference ref_id="CVE-2017-7479" ref_url="https://www.suse.com/security/cve/CVE-2017-7479/" source="CVE"/>
		<description>
This update for openvpn fixes the following issues:

- CVE-2017-7478: openvpn: Authenticated user can DoS server by using a big payload in P_CONTROL (bsc#1038709)
- CVE-2017-7479: openvpn: Denial of Service due to Exhaustion of Packet-ID counter (bsc#1038711)
- Hardening measures found by internal audit (bsc#1038713)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-31"/>
	<updated date="2017-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038709">SUSE bug 1038709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038711">SUSE bug 1038711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038713">SUSE bug 1038713</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7478/">CVE-2017-7478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7478">CVE-2017-7478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7479/">CVE-2017-7479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7479">CVE-2017-7479 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573108" comment="openvpn-2.0.9-143.35.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573109" comment="openvpn-auth-pam-plugin-2.0.9-143.35.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217598" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1044947" ref_url="https://bugzilla.suse.com/1044947" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7508" ref_url="https://www.suse.com/security/cve/CVE-2017-7508/" source="CVE"/>
		<description>
This update for openvpn fixes the following issues:

- It was possible to trigger an assertion by sending a malformed IPv6 packet.
  That issue could have been abused to remotely shutdown an openvpn server or
  client, if IPv6 and --mssfix were enabled and if the IPv6 networks used
  inside the VPN were known. [bsc#1044947, CVE-2017-7508]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-22"/>
	<updated date="2017-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1044947">SUSE bug 1044947</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7508/">CVE-2017-7508 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7508">CVE-2017-7508 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573110" comment="openvpn-2.0.9-143.35.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573111" comment="openvpn-auth-pam-plugin-2.0.9-143.35.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217599" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1060877" ref_url="https://bugzilla.suse.com/1060877" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12166" ref_url="https://www.suse.com/security/cve/CVE-2017-12166/" source="CVE"/>
		<description>
This update for openvpn fixes the following security issue:

- CVE-2017-12166: OpenVPN was vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution. (bsc#1060877).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-27"/>
	<updated date="2017-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060877">SUSE bug 1060877</bugzilla>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12166/">CVE-2017-12166 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12166">CVE-2017-12166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573112" comment="openvpn-2.0.9-143.35.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573113" comment="openvpn-auth-pam-plugin-2.0.9-143.35.9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217600" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="995374" ref_url="https://bugzilla.suse.com/995374" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6329" ref_url="https://www.suse.com/security/cve/CVE-2016-6329/" source="CVE"/>
		<description>
This update for openvpn fixes the following issues:

- CVE-2016-6329: OpenVPN, when using a 64-bit block cipher, makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN session using Blowfish in CBC mode, aka a \'Sweet32\' attack. (bsc#995374)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-12"/>
	<updated date="2018-04-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/995374">SUSE bug 995374</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6329/">CVE-2016-6329 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6329">CVE-2016-6329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573114" comment="openvpn-2.0.9-143.35.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573115" comment="openvpn-auth-pam-plugin-2.0.9-143.35.9.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217601" version="1" class="patch">
	<metadata>
		<title>Security update for openwsman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1122623" ref_url="https://bugzilla.suse.com/1122623" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3816" ref_url="https://www.suse.com/security/cve/CVE-2019-3816/" source="CVE"/>
		<reference ref_id="CVE-2019-3833" ref_url="https://www.suse.com/security/cve/CVE-2019-3833/" source="CVE"/>
		<description>
This update for openwsman fixes the following issues:

Security issues fixed:

- CVE-2019-3816: Fixed a vulnerability in openwsmand deamon which could lead to arbitary file disclosure (bsc#1122623).
- CVE-2019-3833: Fixed a vulnerability in process_connection() which could allow an attacker to trigger an infinite
  loop which leads to Denial of Service (bsc#1122623).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-18"/>
	<updated date="2019-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122623">SUSE bug 1122623</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3816/">CVE-2019-3816 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3816">CVE-2019-3816 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3833/">CVE-2019-3833 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3833">CVE-2019-3833 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573116" comment="libwsman1-2.2.3-0.16.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573117" comment="openwsman-client-2.2.3-0.16.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573118" comment="openwsman-server-2.2.3-0.16.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217602" version="1" class="patch">
	<metadata>
		<title>Security update for opie</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="698772" ref_url="https://bugzilla.suse.com/698772" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2489" ref_url="https://www.suse.com/security/cve/CVE-2011-2489/" source="CVE"/>
		<reference ref_id="CVE-2011-2490" ref_url="https://www.suse.com/security/cve/CVE-2011-2490/" source="CVE"/>
		<description>

This update fixes off-by-one errors in opiesu (CVE-2011-2489) and missing 
setuid() return value checks in opielogin (CVE-2011-2490).

This update also removes the setuid bit from opiesu program. If you rely on 
the setuid bit on opiesu, add the following line to /etc/permissions.local:

/usr/bin/opiesu                root:root         4755

Security Issue references:

    * CVE-2011-2489
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2489&gt;
    * CVE-2011-2490
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2490&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-06-29"/>
	<updated date="2011-06-29"/>
	<bugzilla href="https://bugzilla.suse.com/698772">SUSE bug 698772</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2489/">CVE-2011-2489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2489">CVE-2011-2489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2490/">CVE-2011-2490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2490">CVE-2011-2490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992285" comment="opie-2.4-662.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992286" comment="opie-32bit-2.4-662.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992287" comment="permissions-2011.6.28-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217603" version="1" class="patch">
	<metadata>
		<title>Security update for orca (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="916835" ref_url="https://bugzilla.suse.com/916835" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4245" ref_url="https://www.suse.com/security/cve/CVE-2013-4245/" source="CVE"/>
		<description>
This orca update fixes the following security issue.

- Don't try to import modules from current working directory (bsc#916835, CVE-2013-4245).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-02"/>
	<updated date="2015-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/916835">SUSE bug 916835</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4245/">CVE-2013-4245 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4245">CVE-2013-4245 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573123" comment="orca-2.28.3-0.5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573124" comment="orca-lang-2.28.3-0.5.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217604" version="1" class="patch">
	<metadata>
		<title>Recommended update for pam</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="631802" ref_url="https://bugzilla.suse.com/631802" source="BUGZILLA"/>
		<reference ref_id="724480" ref_url="https://bugzilla.suse.com/724480" source="BUGZILLA"/>
		<reference ref_id="726071" ref_url="https://bugzilla.suse.com/726071" source="BUGZILLA"/>
		<reference ref_id="759130" ref_url="https://bugzilla.suse.com/759130" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-3316" ref_url="https://www.suse.com/security/cve/CVE-2010-3316/" source="CVE"/>
		<reference ref_id="CVE-2011-3148" ref_url="https://www.suse.com/security/cve/CVE-2011-3148/" source="CVE"/>
		<reference ref_id="CVE-2011-3149" ref_url="https://www.suse.com/security/cve/CVE-2011-3149/" source="CVE"/>
		<description>

This update fixes a double-free issue in pam_tty_audit that causes, when 
enabled, the login to crash and no longer work.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-06-19"/>
	<updated date="2012-06-19"/>
	<bugzilla href="https://bugzilla.suse.com/631802">SUSE bug 631802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/724480">SUSE bug 724480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/726071">SUSE bug 726071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759130">SUSE bug 759130</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3316/">CVE-2010-3316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3316">CVE-2010-3316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3148/">CVE-2011-3148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3148">CVE-2011-3148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3149/">CVE-2011-3149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3149">CVE-2011-3149 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992288" comment="pam-1.0.4-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992289" comment="pam-32bit-1.0.4-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992290" comment="pam-doc-1.0.4-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217605" version="1" class="patch">
	<metadata>
		<title>Security update for pam (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="854480" ref_url="https://bugzilla.suse.com/854480" source="BUGZILLA"/>
		<reference ref_id="934920" ref_url="https://bugzilla.suse.com/934920" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7041" ref_url="https://www.suse.com/security/cve/CVE-2013-7041/" source="CVE"/>
		<reference ref_id="CVE-2015-3238" ref_url="https://www.suse.com/security/cve/CVE-2015-3238/" source="CVE"/>
		<description>
This update for pam fixes the following issues:

Security issues fixed:

- CVE-2015-3238: Fixed a denial of service and information leak which could be caused by very long passwords (bsc#934920).
- CVE-2013-7041: Fixed a potential authentication bypass where password hashes weren't compared case-sensitively (bsc#854480).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-07"/>
	<updated date="2019-05-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/854480">SUSE bug 854480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934920">SUSE bug 934920</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7041/">CVE-2013-7041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7041">CVE-2013-7041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3238/">CVE-2015-3238 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3238">CVE-2015-3238 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573125" comment="pam-1.0.4-0.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573126" comment="pam-32bit-1.0.4-0.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573127" comment="pam-doc-1.0.4-0.9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217606" version="1" class="patch">
	<metadata>
		<title>Security update for pam-modules (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="707645" ref_url="https://bugzilla.suse.com/707645" source="BUGZILLA"/>
		<reference ref_id="839386" ref_url="https://bugzilla.suse.com/839386" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3172" ref_url="https://www.suse.com/security/cve/CVE-2011-3172/" source="CVE"/>
		<description>
This update for pam-modules fixes the following issue.

This security issue was fixed:

- CVE-2011-3172: Ensure that unix2_chkpwd calls pam_acct_mgmt to prevent usage
  of locked accounts (bsc#707645, bsc#839386).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-21"/>
	<updated date="2018-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/707645">SUSE bug 707645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839386">SUSE bug 839386</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3172/">CVE-2011-3172 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3172">CVE-2011-3172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573128" comment="pam-modules-11-1.22.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573129" comment="pam-modules-32bit-11-1.22.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217607" version="1" class="patch">
	<metadata>
		<title>Security update for pam_pkcs11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1105012" ref_url="https://bugzilla.suse.com/1105012" source="BUGZILLA"/>
		<description>
This update for pam_pkcs11 fixes the following security issues:

- It was possible to replay an authentication by using a specially prepared smartcard or token (bsc#1105012)
- Prevent buffer overflow if a user has a home directory with a length of more than 512 bytes (bsc#1105012)
- Memory not cleaned properly before free() (bsc#1105012)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1105012">SUSE bug 1105012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573130" comment="pam_pkcs11-0.6.0-141.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573131" comment="pam_pkcs11-32bit-0.6.0-141.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217608" version="1" class="patch">
	<metadata>
		<title>Security update for pango</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="666101" ref_url="https://bugzilla.suse.com/666101" source="BUGZILLA"/>
		<reference ref_id="672502" ref_url="https://bugzilla.suse.com/672502" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-0020" ref_url="https://www.suse.com/security/cve/CVE-2011-0020/" source="CVE"/>
		<reference ref_id="CVE-2011-0064" ref_url="https://www.suse.com/security/cve/CVE-2011-0064/" source="CVE"/>
		<description>

Specially crafted font files could cause a heap corruption in applications 
linked against pango (CVE-2011-0064, CVE-2011-0020).

Security Issue references:

    * CVE-2011-0064
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0064&gt;
    * CVE-2011-0020
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0020&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-03-01"/>
	<updated date="2011-03-01"/>
	<bugzilla href="https://bugzilla.suse.com/666101">SUSE bug 666101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/672502">SUSE bug 672502</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0020/">CVE-2011-0020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0020">CVE-2011-0020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0064/">CVE-2011-0064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0064">CVE-2011-0064 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992291" comment="pango-1.26.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992292" comment="pango-32bit-1.26.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992293" comment="pango-doc-1.26.2-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217609" version="1" class="patch">
	<metadata>
		<title>Security update for patch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1059698" ref_url="https://bugzilla.suse.com/1059698" source="BUGZILLA"/>
		<reference ref_id="1080918" ref_url="https://bugzilla.suse.com/1080918" source="BUGZILLA"/>
		<reference ref_id="1088420" ref_url="https://bugzilla.suse.com/1088420" source="BUGZILLA"/>
		<reference ref_id="662957" ref_url="https://bugzilla.suse.com/662957" source="BUGZILLA"/>
		<reference ref_id="914891" ref_url="https://bugzilla.suse.com/914891" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-4651" ref_url="https://www.suse.com/security/cve/CVE-2010-4651/" source="CVE"/>
		<reference ref_id="CVE-2014-9637" ref_url="https://www.suse.com/security/cve/CVE-2014-9637/" source="CVE"/>
		<reference ref_id="CVE-2016-10713" ref_url="https://www.suse.com/security/cve/CVE-2016-10713/" source="CVE"/>
		<reference ref_id="CVE-2018-1000156" ref_url="https://www.suse.com/security/cve/CVE-2018-1000156/" source="CVE"/>
		<description>
This update for patch fixes several issues.

These security issues were fixed:

- CVE-2018-1000156: patch: Malicious patch files cause ed to execute arbitrary commands (bsc#1088420).
- CVE-2014-9637: Prevent DoS by remote attackers (memory consumption and
  segmentation fault) via a crafted diff file (bsc#914891).
- CVE-2016-10713: Prevent out-of-bounds access within pch_write_line() that
  could have lead to DoS via a crafted input file (bsc#1080918).
- CVE-2010-4651: Fixed a directory traversal bug (bsc#662957):

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-07"/>
	<updated date="2018-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059698">SUSE bug 1059698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080918">SUSE bug 1080918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088420">SUSE bug 1088420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662957">SUSE bug 662957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914891">SUSE bug 914891</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4651/">CVE-2010-4651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4651">CVE-2010-4651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9637/">CVE-2014-9637 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9637">CVE-2014-9637 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10713/">CVE-2016-10713 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10713">CVE-2016-10713 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000156/">CVE-2018-1000156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000156">CVE-2018-1000156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573136" comment="patch-2.5.9-252.22.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217610" version="1" class="patch">
	<metadata>
		<title>Security update for pcsc-lite</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="651759" ref_url="https://bugzilla.suse.com/651759" source="BUGZILLA"/>
		<reference ref_id="661000" ref_url="https://bugzilla.suse.com/661000" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-4530" ref_url="https://www.suse.com/security/cve/CVE-2010-4530/" source="CVE"/>
		<reference ref_id="CVE-2010-4531" ref_url="https://www.suse.com/security/cve/CVE-2010-4531/" source="CVE"/>
		<description>

An integer overflow in pcsc-ccid and a buffer overflow in pcsc-lite while 
handling smart card responses have been fixed.

CVE-2010-4530 and CVE-2010-4531 have been assigned to these issues. 
Additionally a new device ID for card readers was added.

Security Issue references:

    * CVE-2010-4531
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4531&gt;
    * CVE-2010-4530
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4530&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-01-21"/>
	<updated date="2011-01-21"/>
	<bugzilla href="https://bugzilla.suse.com/651759">SUSE bug 651759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/661000">SUSE bug 661000</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4530/">CVE-2010-4530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4530">CVE-2010-4530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4531/">CVE-2010-4531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4531">CVE-2010-4531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992294" comment="pcsc-ccid-1.3.8-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992295" comment="pcsc-lite-1.4.102-1.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992296" comment="pcsc-lite-32bit-1.4.102-1.37.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217611" version="1" class="patch">
	<metadata>
		<title>Security update for pcsc-lite</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="609317" ref_url="https://bugzilla.suse.com/609317" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0407" ref_url="https://www.suse.com/security/cve/CVE-2010-0407/" source="CVE"/>
		<description>

This update of pcsc-lite fixes a local vulnerability (stack overflow) which 
allowed every user with write-access to '/var/run/pcscd/pcscd.comm' to gain 
root privileges. CVE-2010-0407 has been assigned to this issue.

		</description>
<advisory from="security@suse.de">
	<issued date="2010-07-06"/>
	<updated date="2010-07-06"/>
	<bugzilla href="https://bugzilla.suse.com/609317">SUSE bug 609317</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0407/">CVE-2010-0407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0407">CVE-2010-0407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992297" comment="pcsc-lite-1.4.102-1.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992298" comment="pcsc-lite-32bit-1.4.102-1.31.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217612" version="1" class="patch">
	<metadata>
		<title>Security update for perf</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="607339" ref_url="https://bugzilla.suse.com/607339" source="BUGZILLA"/>
		<reference ref_id="711414" ref_url="https://bugzilla.suse.com/711414" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2905" ref_url="https://www.suse.com/security/cve/CVE-2011-2905/" source="CVE"/>
		<description>

The following perf tool bugs have been fixed:

    * it was issuing excessive number of gettimeofday calls creating noise
      when trying to measure performance (bnc#607339).
    * it would consider a file named 'config' in the
      current-working-directory as containing perf configuration data, this
      fact could be exploited by a malicious user (bnc#711414,
      CVE-2011-2905) .

Security Issue reference:

    * CVE-2011-2905
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2905&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-11-11"/>
	<updated date="2011-11-11"/>
	<bugzilla href="https://bugzilla.suse.com/607339">SUSE bug 607339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711414">SUSE bug 711414</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2905/">CVE-2011-2905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2905">CVE-2011-2905 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992299" comment="perf-2.6.32.46-2.5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217613" version="1" class="patch">
	<metadata>
		<title>Security update for perl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="557636" ref_url="https://bugzilla.suse.com/557636" source="BUGZILLA"/>
		<reference ref_id="596167" ref_url="https://bugzilla.suse.com/596167" source="BUGZILLA"/>
		<reference ref_id="603840" ref_url="https://bugzilla.suse.com/603840" source="BUGZILLA"/>
		<reference ref_id="605918" ref_url="https://bugzilla.suse.com/605918" source="BUGZILLA"/>
		<reference ref_id="605928" ref_url="https://bugzilla.suse.com/605928" source="BUGZILLA"/>
		<reference ref_id="657343" ref_url="https://bugzilla.suse.com/657343" source="BUGZILLA"/>
		<reference ref_id="657625" ref_url="https://bugzilla.suse.com/657625" source="BUGZILLA"/>
		<reference ref_id="676086" ref_url="https://bugzilla.suse.com/676086" source="BUGZILLA"/>
		<reference ref_id="684799" ref_url="https://bugzilla.suse.com/684799" source="BUGZILLA"/>
		<reference ref_id="789994" ref_url="https://bugzilla.suse.com/789994" source="BUGZILLA"/>
		<reference ref_id="796014" ref_url="https://bugzilla.suse.com/796014" source="BUGZILLA"/>
		<reference ref_id="797060" ref_url="https://bugzilla.suse.com/797060" source="BUGZILLA"/>
		<reference ref_id="804415" ref_url="https://bugzilla.suse.com/804415" source="BUGZILLA"/>
		<reference ref_id="838333" ref_url="https://bugzilla.suse.com/838333" source="BUGZILLA"/>
		<reference ref_id="896715" ref_url="https://bugzilla.suse.com/896715" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-1168" ref_url="https://www.suse.com/security/cve/CVE-2010-1168/" source="CVE"/>
		<reference ref_id="CVE-2010-1447" ref_url="https://www.suse.com/security/cve/CVE-2010-1447/" source="CVE"/>
		<reference ref_id="CVE-2010-2761" ref_url="https://www.suse.com/security/cve/CVE-2010-2761/" source="CVE"/>
		<reference ref_id="CVE-2010-3172" ref_url="https://www.suse.com/security/cve/CVE-2010-3172/" source="CVE"/>
		<reference ref_id="CVE-2010-4777" ref_url="https://www.suse.com/security/cve/CVE-2010-4777/" source="CVE"/>
		<reference ref_id="CVE-2013-1667" ref_url="https://www.suse.com/security/cve/CVE-2013-1667/" source="CVE"/>
		<reference ref_id="CVE-2014-4330" ref_url="https://www.suse.com/security/cve/CVE-2014-4330/" source="CVE"/>
		<description>

This update for Perl provides fixes for the following issues:

    * A memory leak and an infinite recursion in Data::Dumper.
      (CVE-2014-4330)
    * A memory leak in the DBI module.

Security Issues:

    * CVE-2014-4330
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4330&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-14"/>
	<updated date="2014-10-14"/>
	<bugzilla href="https://bugzilla.suse.com/557636">SUSE bug 557636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/596167">SUSE bug 596167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/603840">SUSE bug 603840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/605918">SUSE bug 605918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/605928">SUSE bug 605928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/657343">SUSE bug 657343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/657625">SUSE bug 657625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/676086">SUSE bug 676086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/684799">SUSE bug 684799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789994">SUSE bug 789994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796014">SUSE bug 796014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797060">SUSE bug 797060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804415">SUSE bug 804415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/838333">SUSE bug 838333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896715">SUSE bug 896715</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1168/">CVE-2010-1168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1168">CVE-2010-1168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1447/">CVE-2010-1447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1447">CVE-2010-1447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2761/">CVE-2010-2761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2761">CVE-2010-2761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3172/">CVE-2010-3172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3172">CVE-2010-3172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4777/">CVE-2010-4777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4777">CVE-2010-4777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1667/">CVE-2013-1667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1667">CVE-2013-1667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4330/">CVE-2014-4330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4330">CVE-2014-4330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992300" comment="perl-5.10.0-64.61.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992301" comment="perl-32bit-5.10.0-64.61.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992302" comment="perl-base-5.10.0-64.61.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992303" comment="perl-doc-5.10.0-64.61.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217614" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1047178" ref_url="https://bugzilla.suse.com/1047178" source="BUGZILLA"/>
		<reference ref_id="1082216" ref_url="https://bugzilla.suse.com/1082216" source="BUGZILLA"/>
		<reference ref_id="1082233" ref_url="https://bugzilla.suse.com/1082233" source="BUGZILLA"/>
		<reference ref_id="1096718" ref_url="https://bugzilla.suse.com/1096718" source="BUGZILLA"/>
		<reference ref_id="900455" ref_url="https://bugzilla.suse.com/900455" source="BUGZILLA"/>
		<reference ref_id="929027" ref_url="https://bugzilla.suse.com/929027" source="BUGZILLA"/>
		<reference ref_id="967082" ref_url="https://bugzilla.suse.com/967082" source="BUGZILLA"/>
		<reference ref_id="976584" ref_url="https://bugzilla.suse.com/976584" source="BUGZILLA"/>
		<reference ref_id="987887" ref_url="https://bugzilla.suse.com/987887" source="BUGZILLA"/>
		<reference ref_id="988311" ref_url="https://bugzilla.suse.com/988311" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8853" ref_url="https://www.suse.com/security/cve/CVE-2015-8853/" source="CVE"/>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<reference ref_id="CVE-2016-2381" ref_url="https://www.suse.com/security/cve/CVE-2016-2381/" source="CVE"/>
		<reference ref_id="CVE-2016-6185" ref_url="https://www.suse.com/security/cve/CVE-2016-6185/" source="CVE"/>
		<reference ref_id="CVE-2017-6512" ref_url="https://www.suse.com/security/cve/CVE-2017-6512/" source="CVE"/>
		<reference ref_id="CVE-2018-12015" ref_url="https://www.suse.com/security/cve/CVE-2018-12015/" source="CVE"/>
		<reference ref_id="CVE-2018-6798" ref_url="https://www.suse.com/security/cve/CVE-2018-6798/" source="CVE"/>
		<reference ref_id="CVE-2018-6913" ref_url="https://www.suse.com/security/cve/CVE-2018-6913/" source="CVE"/>
		<description>
This update for perl fixes the following issues:

These security issues were fixed: 

- CVE-2018-12015: The Archive::Tar module allowed remote attackers to bypass a
  directory-traversal protection mechanism and overwrite arbitrary files
  (bsc#1096718)
- CVE-2018-6913: Prevent heap-based buffer overflow in the pack function that
  allowed context-dependent attackers to execute arbitrary code via a large item
  count (bsc#1082216).
- CVE-2018-6798: Matching a crafted locale dependent regular expression could
  have caused a heap-based buffer over-read and potentially information
  disclosure (bsc#1082233).
- CVE-2017-6512: Prevent race condition in the rmtree and remove_tree functions
  in the File-Path module that allowed attackers to set the mode on arbitrary
  files via vectors involving directory-permission loosening logic (bsc#1047178)
- CVE-2016-6185: The XSLoader::load method did not properly locate .so files
  when called in a string eval, which might have allowed local users to execute
  arbitrary code via a Trojan horse library under the current working directory
  (bsc#988311)
- CVE-2016-1238: (1) cpan/Archive-Tar/bin/ptar, (2)
  cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4)
  cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs,
  (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9)
  cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11)
  cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails,
  (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15)
  dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist,
  (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20)
  utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23)
  utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL did not
  properly remove . (period) characters from the end of the includes directory
  array, which might have allowed local users to gain privileges via a Trojan
  horse module under the current working directory (bsc#987887)
- CVE-2015-8853: The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3
  functions allowed context-dependent attackers to cause a denial of service
  (infinite loop) via crafted utf-8 data (bsc#976584)
- CVE-2016-2381: Perl might have allowed context-dependent attackers to bypass
  the taint protection mechanism in a child process via duplicate environment
  variables in envp (bsc#967082)

These non-security issues were fixed: 

- Fix perl panic with utf8_mg_pos_cache_update [bsc#929027]
- Fix sprintf calling sv_pos_u2b with a wrong offset, leading to a panic [bsc#900455]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-17"/>
	<updated date="2018-07-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047178">SUSE bug 1047178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082216">SUSE bug 1082216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082233">SUSE bug 1082233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096718">SUSE bug 1096718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900455">SUSE bug 900455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929027">SUSE bug 929027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967082">SUSE bug 967082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976584">SUSE bug 976584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987887">SUSE bug 987887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988311">SUSE bug 988311</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8853/">CVE-2015-8853 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8853">CVE-2015-8853 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1238">CVE-2016-1238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2381/">CVE-2016-2381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2381">CVE-2016-2381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6185/">CVE-2016-6185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6185">CVE-2016-6185 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-6512/">CVE-2017-6512 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6512">CVE-2017-6512 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12015/">CVE-2018-12015 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12015">CVE-2018-12015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6798/">CVE-2018-6798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6798">CVE-2018-6798 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6913/">CVE-2018-6913 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6913">CVE-2018-6913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573150" comment="perl-5.10.0-64.61.63.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573151" comment="perl-32bit-5.10.0-64.61.63.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573152" comment="perl-base-5.10.0-64.61.63.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573153" comment="perl-doc-5.10.0-64.61.63.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217615" version="1" class="patch">
	<metadata>
		<title>Security update for perl-Archive-Zip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1099497" ref_url="https://bugzilla.suse.com/1099497" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10860" ref_url="https://www.suse.com/security/cve/CVE-2018-10860/" source="CVE"/>
		<description>
This update for perl-Archive-Zip fixes the following security issue:

- CVE-2018-10860: Prevent directory traversal caused by not properly sanitizing
  paths while extracting zip files. An attacker able to provide a specially
  crafted archive for processing could have used this flaw to write or overwrite
  arbitrary files in the context of the perl interpreter (bsc#1099497).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1099497">SUSE bug 1099497</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-10860/">CVE-2018-10860 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10860">CVE-2018-10860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573154" comment="perl-Archive-Zip-1.24-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217616" version="1" class="patch">
	<metadata>
		<title>Security update for perl-Config-General</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="697106" ref_url="https://bugzilla.suse.com/697106" source="BUGZILLA"/>
		<description>

This update adds the perl-Config-General to the SLES update channel, which 
is a new requirement after the last tgt security release.

    * 697106: tgt is not installable

		</description>
<advisory from="security@suse.de">
	<issued date="2009-02-21"/>
	<updated date="2009-02-21"/>
	<bugzilla href="https://bugzilla.suse.com/697106">SUSE bug 697106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992304" comment="perl-Config-General-2.33-2.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217617" version="1" class="patch">
	<metadata>
		<title>Security update for perl-Convert-ASN1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1168934" ref_url="https://bugzilla.suse.com/1168934" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7488" ref_url="https://www.suse.com/security/cve/CVE-2013-7488/" source="CVE"/>
		<description>
This update for perl-Convert-ASN1 fixes the following issue:

- CVE-2013-7488: Fixed an infinite loop via unexpected input (bsc#1168934).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-19"/>
	<updated date="2021-01-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1168934">SUSE bug 1168934</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-7488/">CVE-2013-7488 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7488">CVE-2013-7488 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573156" comment="perl-Convert-ASN1-0.22-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217618" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBD-mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1012546" ref_url="https://bugzilla.suse.com/1012546" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1251" ref_url="https://www.suse.com/security/cve/CVE-2016-1251/" source="CVE"/>
		<description>

This update for perl-DBD-mysql fixes the following issues:

- Add patch to fix CVE-2016-1251 (bsc#1012546) use-after-free for repeated
  fetchrow_arrayref calls when mysql_server_prepare=1

		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-04"/>
	<updated date="2017-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1012546">SUSE bug 1012546</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1251/">CVE-2016-1251 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1251">CVE-2016-1251 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573157" comment="perl-DBD-mysql-4.008-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217619" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBD-mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1002626" ref_url="https://bugzilla.suse.com/1002626" source="BUGZILLA"/>
		<reference ref_id="1010457" ref_url="https://bugzilla.suse.com/1010457" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1246" ref_url="https://www.suse.com/security/cve/CVE-2016-1246/" source="CVE"/>
		<reference ref_id="CVE-2016-1249" ref_url="https://www.suse.com/security/cve/CVE-2016-1249/" source="CVE"/>
		<description>

This update for perl-DBD-mysql fixes the following issues:

- CVE-2016-1246: Buffer overflow allowed context-dependent attackers to cause a denial of service (crash) via vectors related to an error message (bsc#1002626).
- CVE-2016-1249: Out-of-bounds read when using server-side prepared statement support (bsc#1010457).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-13"/>
	<updated date="2017-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002626">SUSE bug 1002626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010457">SUSE bug 1010457</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1246/">CVE-2016-1246 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1246">CVE-2016-1246 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1249/">CVE-2016-1249 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1249">CVE-2016-1249 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573158" comment="perl-DBD-mysql-4.008-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217620" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBD-mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1047059" ref_url="https://bugzilla.suse.com/1047059" source="BUGZILLA"/>
		<reference ref_id="1047095" ref_url="https://bugzilla.suse.com/1047095" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10788" ref_url="https://www.suse.com/security/cve/CVE-2017-10788/" source="CVE"/>
		<reference ref_id="CVE-2017-10789" ref_url="https://www.suse.com/security/cve/CVE-2017-10789/" source="CVE"/>
		<description>
This update for perl-DBD-mysql fixes the following issues:

- CVE-2017-10789: The DBD::mysql module when with mysql_ssl=1 setting enabled, means that SSL is optional 
(even though this setting's documentation has a \'your communication with the server will be encrypted\' statement), 
which could lead man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, 
a related issue to CVE-2015-3152. (bsc#1047059)
- CVE-2017-10788: The DBD::mysql module through 4.043 for Perl allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by triggering (1) certain error responses from a MySQL server or (2) a loss of a network connection to a MySQL server. The use-after-free defect was introduced by relying on incorrect Oracle mysql_stmt_close documentation and code examples. (bsc#1047095)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-28"/>
	<updated date="2018-05-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047059">SUSE bug 1047059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047095">SUSE bug 1047095</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10788/">CVE-2017-10788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10788">CVE-2017-10788 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10789/">CVE-2017-10789 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10789">CVE-2017-10789 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573159" comment="perl-DBD-mysql-4.008-10.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217621" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1176409" ref_url="https://bugzilla.suse.com/1176409" source="BUGZILLA"/>
		<reference ref_id="1176412" ref_url="https://bugzilla.suse.com/1176412" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14392" ref_url="https://www.suse.com/security/cve/CVE-2020-14392/" source="CVE"/>
		<reference ref_id="CVE-2020-14393" ref_url="https://www.suse.com/security/cve/CVE-2020-14393/" source="CVE"/>
		<description>
This update for perl-DBI fixes the following issues:

Security issues fixed:

- CVE-2020-14392: Memory corruption in XS functions when Perl stack is reallocated (bsc#1176412).
- CVE-2020-14393: Fixed a buffer overflow on an overlong DBD class name (bsc#1176409).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176409">SUSE bug 1176409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176412">SUSE bug 1176412</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14392/">CVE-2020-14392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14392">CVE-2020-14392 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14393/">CVE-2020-14393 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14393">CVE-2020-14393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573160" comment="perl-DBI-1.607-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217622" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1176493" ref_url="https://bugzilla.suse.com/1176493" source="BUGZILLA"/>
		<reference ref_id="1176496" ref_url="https://bugzilla.suse.com/1176496" source="BUGZILLA"/>
		<reference ref_id="1176764" ref_url="https://bugzilla.suse.com/1176764" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7490" ref_url="https://www.suse.com/security/cve/CVE-2013-7490/" source="CVE"/>
		<reference ref_id="CVE-2013-7491" ref_url="https://www.suse.com/security/cve/CVE-2013-7491/" source="CVE"/>
		<reference ref_id="CVE-2019-20919" ref_url="https://www.suse.com/security/cve/CVE-2019-20919/" source="CVE"/>
		<description>
This update for perl-DBI fixes the following issues:

- CVE-2019-20919: Fixed a NULL profile dereference in dbi_profile (bsc#1176764).
- CVE-2013-7490: Fixed memory corruption when using many arguments 
  to methods for CallbacksUsing (bsc#1176496).	  
- CVE-2013-7491: Fixed a stack corruption when a user-defined function required a
  non-trivial amount of memory (bsc#1176493).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176493">SUSE bug 1176493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176496">SUSE bug 1176496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176764">SUSE bug 1176764</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-7490/">CVE-2013-7490 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7490">CVE-2013-7490 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-7491/">CVE-2013-7491 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7491">CVE-2013-7491 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20919/">CVE-2019-20919 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20919">CVE-2019-20919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573161" comment="perl-DBI-1.607-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217623" version="1" class="patch">
	<metadata>
		<title>Security update for perl-PlRPC (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="858243" ref_url="https://bugzilla.suse.com/858243" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7284" ref_url="https://www.suse.com/security/cve/CVE-2013-7284/" source="CVE"/>
		<description>
This update for perl-PlRPC fixes the following issues:

- Security notice: [bsc#858243, CVE-2013-7284]
  * Document security vulnerability on Storable and reply attack
- Add perl-PlRPC-CVE-2013-7284.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-14"/>
	<updated date="2020-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/858243">SUSE bug 858243</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7284/">CVE-2013-7284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7284">CVE-2013-7284 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573162" comment="perl-PlRPC-0.2019-32.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217624" version="1" class="patch">
	<metadata>
		<title>Security update for perl-XML-LibXML (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1046848" ref_url="https://bugzilla.suse.com/1046848" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10672" ref_url="https://www.suse.com/security/cve/CVE-2017-10672/" source="CVE"/>
		<description>
This update for perl-XML-LibXML fixes the following issues:

- CVE-2017-10672: A use-after-free allowed remote attackers to potentially
  execute arbitrary code by controlling the arguments to a replaceChild call
  (bsc#1046848)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-22"/>
	<updated date="2018-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046848">SUSE bug 1046848</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-10672/">CVE-2017-10672 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10672">CVE-2017-10672 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573163" comment="perl-XML-LibXML-1.66-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217625" version="1" class="patch">
	<metadata>
		<title>Recommended update for perl-libwww-perl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="693999" ref_url="https://bugzilla.suse.com/693999" source="BUGZILLA"/>
		<reference ref_id="698503" ref_url="https://bugzilla.suse.com/698503" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-0633" ref_url="https://www.suse.com/security/cve/CVE-2011-0633/" source="CVE"/>
		<description>

In the last update there was a SSL backend change which causes problems 
with https connections over a proxy. Fixed by this update.

		</description>
<advisory from="security@suse.de">
	<issued date="2011-08-02"/>
	<updated date="2011-08-02"/>
	<bugzilla href="https://bugzilla.suse.com/693999">SUSE bug 693999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698503">SUSE bug 698503</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0633/">CVE-2011-0633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0633">CVE-2011-0633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992305" comment="perl-libwww-perl-5.816-2.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217626" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="945412" ref_url="https://bugzilla.suse.com/945412" source="BUGZILLA"/>
		<reference ref_id="945428" ref_url="https://bugzilla.suse.com/945428" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6836" ref_url="https://www.suse.com/security/cve/CVE-2015-6836/" source="CVE"/>
		<reference ref_id="CVE-2015-6837" ref_url="https://www.suse.com/security/cve/CVE-2015-6837/" source="CVE"/>
		<reference ref_id="CVE-2015-6838" ref_url="https://www.suse.com/security/cve/CVE-2015-6838/" source="CVE"/>
		<description>

The PHP5 script interpreter was updated to fix security issues:

* CVE-2015-6836: A SOAP serialize_function_call() type confusion leading to remote code execution problem was fixed. [bnc#945428]
* CVE-2015-6837 CVE-2015-6838: Two NULL pointer dereferences in the XSLTProcessor class were fixed. [bnc#945412]
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-17"/>
	<updated date="2015-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/945412">SUSE bug 945412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945428">SUSE bug 945428</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6836/">CVE-2015-6836 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6836">CVE-2015-6836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6837/">CVE-2015-6837 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6837">CVE-2015-6837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6838/">CVE-2015-6838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6838">CVE-2015-6838 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573164" comment="apache2-mod_php5-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573165" comment="php5-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573166" comment="php5-bcmath-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573167" comment="php5-bz2-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573168" comment="php5-calendar-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573169" comment="php5-ctype-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573170" comment="php5-curl-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573171" comment="php5-dba-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573172" comment="php5-dbase-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573173" comment="php5-dom-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573174" comment="php5-exif-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573175" comment="php5-fastcgi-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573176" comment="php5-ftp-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573177" comment="php5-gd-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573178" comment="php5-gettext-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573179" comment="php5-gmp-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573180" comment="php5-hash-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573181" comment="php5-iconv-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573182" comment="php5-json-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573183" comment="php5-ldap-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573184" comment="php5-mbstring-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573185" comment="php5-mcrypt-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573186" comment="php5-mysql-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573187" comment="php5-odbc-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573188" comment="php5-openssl-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573189" comment="php5-pcntl-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573190" comment="php5-pdo-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573191" comment="php5-pear-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573192" comment="php5-pgsql-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573193" comment="php5-pspell-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573194" comment="php5-shmop-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573195" comment="php5-snmp-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573196" comment="php5-soap-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573197" comment="php5-suhosin-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573198" comment="php5-sysvmsg-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573199" comment="php5-sysvsem-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573200" comment="php5-sysvshm-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573201" comment="php5-tokenizer-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573202" comment="php5-wddx-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573203" comment="php5-xmlreader-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573204" comment="php5-xmlrpc-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573205" comment="php5-xmlwriter-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573206" comment="php5-xsl-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573207" comment="php5-zip-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573208" comment="php5-zlib-5.2.14-0.7.30.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217627" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="969821" ref_url="https://bugzilla.suse.com/969821" source="BUGZILLA"/>
		<reference ref_id="971611" ref_url="https://bugzilla.suse.com/971611" source="BUGZILLA"/>
		<reference ref_id="971612" ref_url="https://bugzilla.suse.com/971612" source="BUGZILLA"/>
		<reference ref_id="973351" ref_url="https://bugzilla.suse.com/973351" source="BUGZILLA"/>
		<reference ref_id="976996" ref_url="https://bugzilla.suse.com/976996" source="BUGZILLA"/>
		<reference ref_id="976997" ref_url="https://bugzilla.suse.com/976997" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9767" ref_url="https://www.suse.com/security/cve/CVE-2014-9767/" source="CVE"/>
		<reference ref_id="CVE-2015-8835" ref_url="https://www.suse.com/security/cve/CVE-2015-8835/" source="CVE"/>
		<reference ref_id="CVE-2015-8866" ref_url="https://www.suse.com/security/cve/CVE-2015-8866/" source="CVE"/>
		<reference ref_id="CVE-2016-3141" ref_url="https://www.suse.com/security/cve/CVE-2016-3141/" source="CVE"/>
		<reference ref_id="CVE-2016-3185" ref_url="https://www.suse.com/security/cve/CVE-2016-3185/" source="CVE"/>
		<reference ref_id="CVE-2016-4070" ref_url="https://www.suse.com/security/cve/CVE-2016-4070/" source="CVE"/>
		<description>

This update for php5 fixes the following issues:

- CVE-2015-8835: SoapClient s_call method suffered from a type confusion issue that could have lead to crashes [bsc#973351]
- CVE-2016-3141: A use-after-free / double-free in the WDDX
  deserialization could lead to crashes or potential code
   execution. [bsc#969821]
- CVE-2014-9767: A directory traversal when extracting zip files was fixed that could lead to
  overwritten files. [bsc#971612]
- CVE-2016-3185: A type confusion vulnerability in
  make_http_soap_request() could lead to crashes or potentially code
  execution. [bsc#971611]
- CVE-2016-4070: The libxml_disable_entity_loader() setting was shared between threads, which could have resulted in XML external entity injection and entity expansion issues [bsc#976997]
- CVE-2015-8866: A remote attacker could have caused denial of service due to incorrect handling of large strings in php_raw_url_encode() [bsc#976996]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-23"/>
	<updated date="2016-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/969821">SUSE bug 969821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971611">SUSE bug 971611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971612">SUSE bug 971612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973351">SUSE bug 973351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976996">SUSE bug 976996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976997">SUSE bug 976997</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9767/">CVE-2014-9767 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9767">CVE-2014-9767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8835/">CVE-2015-8835 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8835">CVE-2015-8835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8866/">CVE-2015-8866 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8866">CVE-2015-8866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3141/">CVE-2016-3141 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3141">CVE-2016-3141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3185/">CVE-2016-3185 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3185">CVE-2016-3185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4070/">CVE-2016-4070 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4070">CVE-2016-4070 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573209" comment="apache2-mod_php5-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573210" comment="php5-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573211" comment="php5-bcmath-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573212" comment="php5-bz2-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573213" comment="php5-calendar-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573214" comment="php5-ctype-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573215" comment="php5-curl-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573216" comment="php5-dba-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573217" comment="php5-dbase-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573218" comment="php5-dom-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573219" comment="php5-exif-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573220" comment="php5-fastcgi-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573221" comment="php5-ftp-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573222" comment="php5-gd-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573223" comment="php5-gettext-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573224" comment="php5-gmp-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573225" comment="php5-hash-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573226" comment="php5-iconv-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573227" comment="php5-json-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573228" comment="php5-ldap-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573229" comment="php5-mbstring-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573230" comment="php5-mcrypt-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573231" comment="php5-mysql-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573232" comment="php5-odbc-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573233" comment="php5-openssl-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573234" comment="php5-pcntl-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573235" comment="php5-pdo-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573236" comment="php5-pear-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573237" comment="php5-pgsql-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573238" comment="php5-pspell-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573239" comment="php5-shmop-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573240" comment="php5-snmp-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573241" comment="php5-soap-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573242" comment="php5-suhosin-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573243" comment="php5-sysvmsg-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573244" comment="php5-sysvsem-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573245" comment="php5-sysvshm-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573246" comment="php5-tokenizer-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573247" comment="php5-wddx-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573248" comment="php5-xmlreader-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573249" comment="php5-xmlrpc-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573250" comment="php5-xmlwriter-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573251" comment="php5-xsl-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573252" comment="php5-zip-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573253" comment="php5-zlib-5.2.14-0.7.30.79.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217628" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="977994" ref_url="https://bugzilla.suse.com/977994" source="BUGZILLA"/>
		<reference ref_id="978827" ref_url="https://bugzilla.suse.com/978827" source="BUGZILLA"/>
		<reference ref_id="978828" ref_url="https://bugzilla.suse.com/978828" source="BUGZILLA"/>
		<reference ref_id="978830" ref_url="https://bugzilla.suse.com/978830" source="BUGZILLA"/>
		<reference ref_id="980373" ref_url="https://bugzilla.suse.com/980373" source="BUGZILLA"/>
		<reference ref_id="980375" ref_url="https://bugzilla.suse.com/980375" source="BUGZILLA"/>
		<reference ref_id="981050" ref_url="https://bugzilla.suse.com/981050" source="BUGZILLA"/>
		<reference ref_id="982011" ref_url="https://bugzilla.suse.com/982011" source="BUGZILLA"/>
		<reference ref_id="982012" ref_url="https://bugzilla.suse.com/982012" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8873" ref_url="https://www.suse.com/security/cve/CVE-2015-8873/" source="CVE"/>
		<reference ref_id="CVE-2015-8874" ref_url="https://www.suse.com/security/cve/CVE-2015-8874/" source="CVE"/>
		<reference ref_id="CVE-2015-8879" ref_url="https://www.suse.com/security/cve/CVE-2015-8879/" source="CVE"/>
		<reference ref_id="CVE-2016-4346" ref_url="https://www.suse.com/security/cve/CVE-2016-4346/" source="CVE"/>
		<reference ref_id="CVE-2016-4537" ref_url="https://www.suse.com/security/cve/CVE-2016-4537/" source="CVE"/>
		<reference ref_id="CVE-2016-4538" ref_url="https://www.suse.com/security/cve/CVE-2016-4538/" source="CVE"/>
		<reference ref_id="CVE-2016-4539" ref_url="https://www.suse.com/security/cve/CVE-2016-4539/" source="CVE"/>
		<reference ref_id="CVE-2016-4542" ref_url="https://www.suse.com/security/cve/CVE-2016-4542/" source="CVE"/>
		<reference ref_id="CVE-2016-4543" ref_url="https://www.suse.com/security/cve/CVE-2016-4543/" source="CVE"/>
		<reference ref_id="CVE-2016-4544" ref_url="https://www.suse.com/security/cve/CVE-2016-4544/" source="CVE"/>
		<reference ref_id="CVE-2016-5094" ref_url="https://www.suse.com/security/cve/CVE-2016-5094/" source="CVE"/>
		<reference ref_id="CVE-2016-5095" ref_url="https://www.suse.com/security/cve/CVE-2016-5095/" source="CVE"/>
		<description>
This update for php5 fixes the following issues: 

- CVE-2015-8879: The odbc_bindcols function in ext/odbc/php_odbc.c in PHP mishandles driver behavior for SQL_WVARCHAR columns, which allowed remote attackers to cause a denial of service (application crash) in opportunistic circumstances by leveraging use of the odbc_fetch_array function to access a certain type of Microsoft SQL Server table (bsc#981050).
- CVE-2015-8874: Stack consumption vulnerability in GD in PHP allowed remote attackers to cause a denial of service via a crafted imagefilltoborder call (bsc#980375).
- CVE-2015-8873: Stack consumption vulnerability in Zend/zend_exceptions.c in PHP allowed remote attackers to cause a denial of service (segmentation fault) via recursive method calls (bsc#980373).
- CVE-2016-4346: Integer overflow in the str_pad function in ext/standard/string.c in PHP allowed remote attackers to cause a denial of service or possibly have unspecified other impact via a long string, leading to a heap-based buffer overflow (bsc#977994).
- CVE-2016-4542: The exif_process_IFD_TAG function in ext/exif/exif.c in PHP did not properly construct spprintf arguments, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data (bsc#978830).
- CVE-2016-4543: The exif_process_IFD_in_JPEG function in ext/exif/exif.c in PHP did not validate IFD sizes, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data (bsc#978830.
- CVE-2016-4544: The exif_process_TIFF_in_JPEG function in ext/exif/exif.c in PHP did not validate TIFF start data, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data (bsc#978830.
- CVE-2016-4537: The bcpowmod function in ext/bcmath/bcmath.c in PHP accepted a negative integer for the scale argument, which allowed remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call (bsc#978827).
- CVE-2016-4538: The bcpowmod function in ext/bcmath/bcmath.c in PHP modified certain data structures without considering whether they are copies of the _zero_, _one_, or _two_ global variable, which allowed remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call (bsc#978827).
- CVE-2016-4539: The xml_parse_into_struct function in ext/xml/xml.c in PHP allowed remote attackers to cause a denial of service (buffer under-read and segmentation fault) or possibly have unspecified other impact via crafted XML data in the second argument, leading to a parser level of zero (bsc#978828).
- CVE-2016-5094: Don't create strings with lengths outside int range (bnc#982011).
- CVE-2016-5095: Don't create strings with lengths outside int range (bnc#982012).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-14"/>
	<updated date="2016-06-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/977994">SUSE bug 977994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978827">SUSE bug 978827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978828">SUSE bug 978828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978830">SUSE bug 978830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980373">SUSE bug 980373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980375">SUSE bug 980375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981050">SUSE bug 981050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982011">SUSE bug 982011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982012">SUSE bug 982012</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8873/">CVE-2015-8873 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8873">CVE-2015-8873 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8874/">CVE-2015-8874 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8874">CVE-2015-8874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8879/">CVE-2015-8879 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8879">CVE-2015-8879 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4346/">CVE-2016-4346 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4346">CVE-2016-4346 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4537/">CVE-2016-4537 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4537">CVE-2016-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4538/">CVE-2016-4538 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4538">CVE-2016-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4539/">CVE-2016-4539 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4539">CVE-2016-4539 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4542/">CVE-2016-4542 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4542">CVE-2016-4542 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4543/">CVE-2016-4543 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4543">CVE-2016-4543 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4544/">CVE-2016-4544 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4544">CVE-2016-4544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5094/">CVE-2016-5094 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5094">CVE-2016-5094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5095/">CVE-2016-5095 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5095">CVE-2016-5095 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573254" comment="apache2-mod_php5-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573255" comment="php5-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573256" comment="php5-bcmath-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573257" comment="php5-bz2-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573258" comment="php5-calendar-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573259" comment="php5-ctype-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573260" comment="php5-curl-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573261" comment="php5-dba-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573262" comment="php5-dbase-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573263" comment="php5-dom-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573264" comment="php5-exif-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573265" comment="php5-fastcgi-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573266" comment="php5-ftp-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573267" comment="php5-gd-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573268" comment="php5-gettext-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573269" comment="php5-gmp-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573270" comment="php5-hash-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573271" comment="php5-iconv-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573272" comment="php5-json-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573273" comment="php5-ldap-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573274" comment="php5-mbstring-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573275" comment="php5-mcrypt-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573276" comment="php5-mysql-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573277" comment="php5-odbc-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573278" comment="php5-openssl-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573279" comment="php5-pcntl-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573280" comment="php5-pdo-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573281" comment="php5-pear-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573282" comment="php5-pgsql-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573283" comment="php5-pspell-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573284" comment="php5-shmop-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573285" comment="php5-snmp-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573286" comment="php5-soap-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573287" comment="php5-suhosin-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573288" comment="php5-sysvmsg-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573289" comment="php5-sysvsem-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573290" comment="php5-sysvshm-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573291" comment="php5-tokenizer-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573292" comment="php5-wddx-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573293" comment="php5-xmlreader-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573294" comment="php5-xmlrpc-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573295" comment="php5-xmlwriter-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573296" comment="php5-xsl-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573297" comment="php5-zip-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573298" comment="php5-zlib-5.2.14-0.7.30.84.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217629" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="986004" ref_url="https://bugzilla.suse.com/986004" source="BUGZILLA"/>
		<reference ref_id="986244" ref_url="https://bugzilla.suse.com/986244" source="BUGZILLA"/>
		<reference ref_id="986386" ref_url="https://bugzilla.suse.com/986386" source="BUGZILLA"/>
		<reference ref_id="986388" ref_url="https://bugzilla.suse.com/986388" source="BUGZILLA"/>
		<reference ref_id="986393" ref_url="https://bugzilla.suse.com/986393" source="BUGZILLA"/>
		<reference ref_id="991426" ref_url="https://bugzilla.suse.com/991426" source="BUGZILLA"/>
		<reference ref_id="991427" ref_url="https://bugzilla.suse.com/991427" source="BUGZILLA"/>
		<reference ref_id="991428" ref_url="https://bugzilla.suse.com/991428" source="BUGZILLA"/>
		<reference ref_id="991429" ref_url="https://bugzilla.suse.com/991429" source="BUGZILLA"/>
		<reference ref_id="991430" ref_url="https://bugzilla.suse.com/991430" source="BUGZILLA"/>
		<reference ref_id="991433" ref_url="https://bugzilla.suse.com/991433" source="BUGZILLA"/>
		<reference ref_id="991437" ref_url="https://bugzilla.suse.com/991437" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8935" ref_url="https://www.suse.com/security/cve/CVE-2015-8935/" source="CVE"/>
		<reference ref_id="CVE-2016-5399" ref_url="https://www.suse.com/security/cve/CVE-2016-5399/" source="CVE"/>
		<reference ref_id="CVE-2016-5766" ref_url="https://www.suse.com/security/cve/CVE-2016-5766/" source="CVE"/>
		<reference ref_id="CVE-2016-5767" ref_url="https://www.suse.com/security/cve/CVE-2016-5767/" source="CVE"/>
		<reference ref_id="CVE-2016-5769" ref_url="https://www.suse.com/security/cve/CVE-2016-5769/" source="CVE"/>
		<reference ref_id="CVE-2016-5772" ref_url="https://www.suse.com/security/cve/CVE-2016-5772/" source="CVE"/>
		<reference ref_id="CVE-2016-6288" ref_url="https://www.suse.com/security/cve/CVE-2016-6288/" source="CVE"/>
		<reference ref_id="CVE-2016-6289" ref_url="https://www.suse.com/security/cve/CVE-2016-6289/" source="CVE"/>
		<reference ref_id="CVE-2016-6290" ref_url="https://www.suse.com/security/cve/CVE-2016-6290/" source="CVE"/>
		<reference ref_id="CVE-2016-6291" ref_url="https://www.suse.com/security/cve/CVE-2016-6291/" source="CVE"/>
		<reference ref_id="CVE-2016-6296" ref_url="https://www.suse.com/security/cve/CVE-2016-6296/" source="CVE"/>
		<reference ref_id="CVE-2016-6297" ref_url="https://www.suse.com/security/cve/CVE-2016-6297/" source="CVE"/>
		<description>

php5 was updated to fix the following security issues:

- CVE-2016-6297: Stack-based buffer overflow vulnerability in php_stream_zip_opener (bsc#991426).
- CVE-2016-6291: Out-of-bounds access in exif_process_IFD_in_MAKERNOTE (bsc#991427).
- CVE-2016-6289: Integer overflow leads to buffer overflow in virtual_file_ex (bsc#991428).
- CVE-2016-6290: Use after free in unserialize() with Unexpected Session Deserialization (bsc#991429).
- CVE-2016-5399: Improper error handling in bzread() (bsc#991430).
- CVE-2016-6288: Buffer over-read in php_url_parse_ex (bsc#991433).
- CVE-2016-6296: Heap buffer overflow vulnerability in simplestring_addn in simplestring.c (bsc#991437).
- CVE-2016-5769: Mcrypt: Heap Overflow due to integer overflows (bsc#986388).
- CVE-2015-8935: XSS in header() with Internet Explorer (bsc#986004).
- CVE-2016-5772: Double free corruption in wddx_deserialize (bsc#986244).
- CVE-2016-5766: Integer Overflow in _gd2GetHeader() resulting in heap overflow (bsc#986386).
- CVE-2016-5767: Integer Overflow in gdImagePaletteToTrueColor() resulting in heap overflow (bsc#986393).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-16"/>
	<updated date="2016-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/986004">SUSE bug 986004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986244">SUSE bug 986244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986386">SUSE bug 986386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986388">SUSE bug 986388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986393">SUSE bug 986393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991426">SUSE bug 991426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991427">SUSE bug 991427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991428">SUSE bug 991428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991429">SUSE bug 991429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991430">SUSE bug 991430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991433">SUSE bug 991433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991437">SUSE bug 991437</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8935/">CVE-2015-8935 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8935">CVE-2015-8935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5399/">CVE-2016-5399 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5399">CVE-2016-5399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5766/">CVE-2016-5766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5766">CVE-2016-5766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5767/">CVE-2016-5767 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5767">CVE-2016-5767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5769/">CVE-2016-5769 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5769">CVE-2016-5769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5772/">CVE-2016-5772 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5772">CVE-2016-5772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6288/">CVE-2016-6288 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6288">CVE-2016-6288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6289/">CVE-2016-6289 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6289">CVE-2016-6289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6290/">CVE-2016-6290 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6290">CVE-2016-6290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6291/">CVE-2016-6291 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6291">CVE-2016-6291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6296/">CVE-2016-6296 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6296">CVE-2016-6296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6297/">CVE-2016-6297 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6297">CVE-2016-6297 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573299" comment="apache2-mod_php5-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573300" comment="php5-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573301" comment="php5-bcmath-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573302" comment="php5-bz2-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573303" comment="php5-calendar-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573304" comment="php5-ctype-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573305" comment="php5-curl-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573306" comment="php5-dba-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573307" comment="php5-dbase-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573308" comment="php5-dom-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573309" comment="php5-exif-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573310" comment="php5-fastcgi-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573311" comment="php5-ftp-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573312" comment="php5-gd-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573313" comment="php5-gettext-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573314" comment="php5-gmp-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573315" comment="php5-hash-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573316" comment="php5-iconv-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573317" comment="php5-json-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573318" comment="php5-ldap-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573319" comment="php5-mbstring-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573320" comment="php5-mcrypt-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573321" comment="php5-mysql-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573322" comment="php5-odbc-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573323" comment="php5-openssl-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573324" comment="php5-pcntl-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573325" comment="php5-pdo-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573326" comment="php5-pear-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573327" comment="php5-pgsql-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573328" comment="php5-pspell-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573329" comment="php5-shmop-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573330" comment="php5-snmp-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573331" comment="php5-soap-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573332" comment="php5-suhosin-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573333" comment="php5-sysvmsg-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573334" comment="php5-sysvsem-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573335" comment="php5-sysvshm-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573336" comment="php5-tokenizer-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573337" comment="php5-wddx-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573338" comment="php5-xmlreader-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573339" comment="php5-xmlrpc-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573340" comment="php5-xmlwriter-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573341" comment="php5-xsl-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573342" comment="php5-zip-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573343" comment="php5-zlib-5.2.14-0.7.30.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217630" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="997206" ref_url="https://bugzilla.suse.com/997206" source="BUGZILLA"/>
		<reference ref_id="997207" ref_url="https://bugzilla.suse.com/997207" source="BUGZILLA"/>
		<reference ref_id="997208" ref_url="https://bugzilla.suse.com/997208" source="BUGZILLA"/>
		<reference ref_id="997210" ref_url="https://bugzilla.suse.com/997210" source="BUGZILLA"/>
		<reference ref_id="997211" ref_url="https://bugzilla.suse.com/997211" source="BUGZILLA"/>
		<reference ref_id="997220" ref_url="https://bugzilla.suse.com/997220" source="BUGZILLA"/>
		<reference ref_id="997225" ref_url="https://bugzilla.suse.com/997225" source="BUGZILLA"/>
		<reference ref_id="997230" ref_url="https://bugzilla.suse.com/997230" source="BUGZILLA"/>
		<reference ref_id="997257" ref_url="https://bugzilla.suse.com/997257" source="BUGZILLA"/>
		<reference ref_id="999679" ref_url="https://bugzilla.suse.com/999679" source="BUGZILLA"/>
		<reference ref_id="999682" ref_url="https://bugzilla.suse.com/999682" source="BUGZILLA"/>
		<reference ref_id="999819" ref_url="https://bugzilla.suse.com/999819" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7124" ref_url="https://www.suse.com/security/cve/CVE-2016-7124/" source="CVE"/>
		<reference ref_id="CVE-2016-7125" ref_url="https://www.suse.com/security/cve/CVE-2016-7125/" source="CVE"/>
		<reference ref_id="CVE-2016-7126" ref_url="https://www.suse.com/security/cve/CVE-2016-7126/" source="CVE"/>
		<reference ref_id="CVE-2016-7127" ref_url="https://www.suse.com/security/cve/CVE-2016-7127/" source="CVE"/>
		<reference ref_id="CVE-2016-7128" ref_url="https://www.suse.com/security/cve/CVE-2016-7128/" source="CVE"/>
		<reference ref_id="CVE-2016-7129" ref_url="https://www.suse.com/security/cve/CVE-2016-7129/" source="CVE"/>
		<reference ref_id="CVE-2016-7130" ref_url="https://www.suse.com/security/cve/CVE-2016-7130/" source="CVE"/>
		<reference ref_id="CVE-2016-7131" ref_url="https://www.suse.com/security/cve/CVE-2016-7131/" source="CVE"/>
		<reference ref_id="CVE-2016-7132" ref_url="https://www.suse.com/security/cve/CVE-2016-7132/" source="CVE"/>
		<reference ref_id="CVE-2016-7411" ref_url="https://www.suse.com/security/cve/CVE-2016-7411/" source="CVE"/>
		<reference ref_id="CVE-2016-7413" ref_url="https://www.suse.com/security/cve/CVE-2016-7413/" source="CVE"/>
		<reference ref_id="CVE-2016-7418" ref_url="https://www.suse.com/security/cve/CVE-2016-7418/" source="CVE"/>
		<description>

This update for php5 fixes the following issues:

* CVE-2016-7124: Create an Unexpected Object and Don't Invoke __wakeup() in Deserialization
* CVE-2016-7125: PHP Session Data Injection Vulnerability
* CVE-2016-7126: select_colors write out-of-bounds
* CVE-2016-7127: imagegammacorrect allowed arbitrary write access
* CVE-2016-7128: Memory Leakage In exif_process_IFD_in_TIFF
* CVE-2016-7129: wddx_deserialize allowed illegal memory access
* CVE-2016-7130: wddx_deserialize null dereference
* CVE-2016-7131: wddx_deserialize null dereference with invalid xml
* CVE-2016-7132: wddx_deserialize null dereference in php_wddx_pop_element
* CVE-2016-7411: php5: Memory corruption when destructing deserialized object
* CVE-2016-7413: Use after free in wddx_deserialize
* CVE-2016-7418: Null pointer dereference in php_wddx_push_element
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-19"/>
	<updated date="2016-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/997206">SUSE bug 997206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997207">SUSE bug 997207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997208">SUSE bug 997208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997210">SUSE bug 997210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997211">SUSE bug 997211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997220">SUSE bug 997220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997225">SUSE bug 997225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997230">SUSE bug 997230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997257">SUSE bug 997257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999679">SUSE bug 999679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999682">SUSE bug 999682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999819">SUSE bug 999819</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7124/">CVE-2016-7124 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7124">CVE-2016-7124 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-7125/">CVE-2016-7125 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7125">CVE-2016-7125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7126/">CVE-2016-7126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7126">CVE-2016-7126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7127/">CVE-2016-7127 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7127">CVE-2016-7127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7128/">CVE-2016-7128 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7128">CVE-2016-7128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7129/">CVE-2016-7129 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7129">CVE-2016-7129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7130/">CVE-2016-7130 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7130">CVE-2016-7130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7131/">CVE-2016-7131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7131">CVE-2016-7131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7132/">CVE-2016-7132 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7132">CVE-2016-7132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7411/">CVE-2016-7411 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7411">CVE-2016-7411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7413/">CVE-2016-7413 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7413">CVE-2016-7413 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7418/">CVE-2016-7418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7418">CVE-2016-7418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573344" comment="apache2-mod_php5-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573345" comment="php5-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573346" comment="php5-bcmath-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573347" comment="php5-bz2-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573348" comment="php5-calendar-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573349" comment="php5-ctype-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573350" comment="php5-curl-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573351" comment="php5-dba-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573352" comment="php5-dbase-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573353" comment="php5-dom-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573354" comment="php5-exif-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573355" comment="php5-fastcgi-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573356" comment="php5-ftp-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573357" comment="php5-gd-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573358" comment="php5-gettext-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573359" comment="php5-gmp-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573360" comment="php5-hash-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573361" comment="php5-iconv-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573362" comment="php5-json-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573363" comment="php5-ldap-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573364" comment="php5-mbstring-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573365" comment="php5-mcrypt-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573366" comment="php5-mysql-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573367" comment="php5-odbc-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573368" comment="php5-openssl-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573369" comment="php5-pcntl-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573370" comment="php5-pdo-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573371" comment="php5-pear-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573372" comment="php5-pgsql-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573373" comment="php5-pspell-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573374" comment="php5-shmop-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573375" comment="php5-snmp-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573376" comment="php5-soap-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573377" comment="php5-suhosin-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573378" comment="php5-sysvmsg-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573379" comment="php5-sysvsem-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573380" comment="php5-sysvshm-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573381" comment="php5-tokenizer-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573382" comment="php5-wddx-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573383" comment="php5-xmlreader-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573384" comment="php5-xmlrpc-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573385" comment="php5-xmlwriter-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573386" comment="php5-xsl-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573387" comment="php5-zip-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573388" comment="php5-zlib-5.2.14-0.7.30.94.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217631" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1004924" ref_url="https://bugzilla.suse.com/1004924" source="BUGZILLA"/>
		<reference ref_id="1005274" ref_url="https://bugzilla.suse.com/1005274" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6911" ref_url="https://www.suse.com/security/cve/CVE-2016-6911/" source="CVE"/>
		<reference ref_id="CVE-2016-8670" ref_url="https://www.suse.com/security/cve/CVE-2016-8670/" source="CVE"/>
		<description>

This update for php5 fixes the following issues:

- CVE-2016-8670: Stack Buffer Overflow in GD dynamicGetbuf (bsc#1004924)
- CVE-2016-6911: Check for out-of-bound read in dynamicGetbuf() (bsc#1005274)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-10"/>
	<updated date="2016-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1004924">SUSE bug 1004924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005274">SUSE bug 1005274</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6911/">CVE-2016-6911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6911">CVE-2016-6911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8670/">CVE-2016-8670 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8670">CVE-2016-8670 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573389" comment="apache2-mod_php5-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573390" comment="php5-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573391" comment="php5-bcmath-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573392" comment="php5-bz2-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573393" comment="php5-calendar-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573394" comment="php5-ctype-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573395" comment="php5-curl-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573396" comment="php5-dba-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573397" comment="php5-dbase-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573398" comment="php5-dom-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573399" comment="php5-exif-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573400" comment="php5-fastcgi-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573401" comment="php5-ftp-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573402" comment="php5-gd-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573403" comment="php5-gettext-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573404" comment="php5-gmp-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573405" comment="php5-hash-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573406" comment="php5-iconv-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573407" comment="php5-json-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573408" comment="php5-ldap-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573409" comment="php5-mbstring-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573410" comment="php5-mcrypt-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573411" comment="php5-mysql-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573412" comment="php5-odbc-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573413" comment="php5-openssl-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573414" comment="php5-pcntl-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573415" comment="php5-pdo-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573416" comment="php5-pear-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573417" comment="php5-pgsql-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573418" comment="php5-pspell-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573419" comment="php5-shmop-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573420" comment="php5-snmp-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573421" comment="php5-soap-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573422" comment="php5-suhosin-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573423" comment="php5-sysvmsg-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573424" comment="php5-sysvsem-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573425" comment="php5-sysvshm-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573426" comment="php5-tokenizer-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573427" comment="php5-wddx-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573428" comment="php5-xmlreader-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573429" comment="php5-xmlrpc-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573430" comment="php5-xmlwriter-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573431" comment="php5-xsl-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573432" comment="php5-zip-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573433" comment="php5-zlib-5.2.14-0.7.30.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217632" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1015187" ref_url="https://bugzilla.suse.com/1015187" source="BUGZILLA"/>
		<reference ref_id="1015188" ref_url="https://bugzilla.suse.com/1015188" source="BUGZILLA"/>
		<reference ref_id="1015189" ref_url="https://bugzilla.suse.com/1015189" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9933" ref_url="https://www.suse.com/security/cve/CVE-2016-9933/" source="CVE"/>
		<reference ref_id="CVE-2016-9934" ref_url="https://www.suse.com/security/cve/CVE-2016-9934/" source="CVE"/>
		<reference ref_id="CVE-2016-9935" ref_url="https://www.suse.com/security/cve/CVE-2016-9935/" source="CVE"/>
		<description>

This update for php5 fixes the following issues:

 * CVE-2016-9933 Possible stack overflow on truecolor images handling [bsc#1015187]
 * CVE-2016-9934 Dereference from NULL pointer could lead to crash [bsc#1015188]
 * CVE-2016-9935 Invalid read could lead to crash [bsc#1015189]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-20"/>
	<updated date="2016-12-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015187">SUSE bug 1015187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015188">SUSE bug 1015188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015189">SUSE bug 1015189</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9933/">CVE-2016-9933 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9933">CVE-2016-9933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9934/">CVE-2016-9934 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9934">CVE-2016-9934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9935/">CVE-2016-9935 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9935">CVE-2016-9935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573434" comment="apache2-mod_php5-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573435" comment="php5-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573436" comment="php5-bcmath-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573437" comment="php5-bz2-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573438" comment="php5-calendar-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573439" comment="php5-ctype-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573440" comment="php5-curl-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573441" comment="php5-dba-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573442" comment="php5-dbase-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573443" comment="php5-dom-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573444" comment="php5-exif-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573445" comment="php5-fastcgi-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573446" comment="php5-ftp-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573447" comment="php5-gd-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573448" comment="php5-gettext-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573449" comment="php5-gmp-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573450" comment="php5-hash-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573451" comment="php5-iconv-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573452" comment="php5-json-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573453" comment="php5-ldap-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573454" comment="php5-mbstring-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573455" comment="php5-mcrypt-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573456" comment="php5-mysql-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573457" comment="php5-odbc-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573458" comment="php5-openssl-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573459" comment="php5-pcntl-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573460" comment="php5-pdo-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573461" comment="php5-pear-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573462" comment="php5-pgsql-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573463" comment="php5-pspell-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573464" comment="php5-shmop-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573465" comment="php5-snmp-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573466" comment="php5-soap-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573467" comment="php5-suhosin-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573468" comment="php5-sysvmsg-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573469" comment="php5-sysvsem-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573470" comment="php5-sysvshm-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573471" comment="php5-tokenizer-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573472" comment="php5-wddx-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573473" comment="php5-xmlreader-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573474" comment="php5-xmlrpc-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573475" comment="php5-xmlwriter-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573476" comment="php5-xsl-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573477" comment="php5-zip-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573478" comment="php5-zlib-5.2.14-0.7.30.100.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217633" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1022219" ref_url="https://bugzilla.suse.com/1022219" source="BUGZILLA"/>
		<reference ref_id="1022260" ref_url="https://bugzilla.suse.com/1022260" source="BUGZILLA"/>
		<reference ref_id="1022264" ref_url="https://bugzilla.suse.com/1022264" source="BUGZILLA"/>
		<reference ref_id="1022265" ref_url="https://bugzilla.suse.com/1022265" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10158" ref_url="https://www.suse.com/security/cve/CVE-2016-10158/" source="CVE"/>
		<reference ref_id="CVE-2016-10161" ref_url="https://www.suse.com/security/cve/CVE-2016-10161/" source="CVE"/>
		<reference ref_id="CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167/" source="CVE"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<description>

This update for php5 fixes the following issues:

- CVE-2016-10158: The exif_convert_any_to_int function in ext/exif/exif.c
  in PHP allowed remote attackers to cause a denial of service (application
  crash) via crafted EXIF data that triggers an attempt to divide the
  minimum representable negative integer by -1.  (bsc#1022219)
- CVE-2016-10161: The object_common1 function in
  ext/standard/var_unserializer.c in PHP allowed remote attackers to
  cause a denial of service (buffer over-read and application crash) via
  crafted serialized data that is mishandled in a finish_nested_data call.
  (bsc#1022260)
- CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx()
  could lead to php out of memory even on small files. (bsc#1022264)
- CVE-2016-10168: A signed integer overflow in the gd module could lead
  to memory corruption (bsc#1022265)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-20"/>
	<updated date="2017-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1022219">SUSE bug 1022219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022260">SUSE bug 1022260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022264">SUSE bug 1022264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022265">SUSE bug 1022265</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10158/">CVE-2016-10158 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10158">CVE-2016-10158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10161/">CVE-2016-10161 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10161">CVE-2016-10161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10167">CVE-2016-10167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10168">CVE-2016-10168 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573479" comment="apache2-mod_php5-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573480" comment="php5-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573481" comment="php5-bcmath-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573482" comment="php5-bz2-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573483" comment="php5-calendar-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573484" comment="php5-ctype-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573485" comment="php5-curl-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573486" comment="php5-dba-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573487" comment="php5-dbase-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573488" comment="php5-dom-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573489" comment="php5-exif-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573490" comment="php5-fastcgi-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573491" comment="php5-ftp-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573492" comment="php5-gd-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573493" comment="php5-gettext-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573494" comment="php5-gmp-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573495" comment="php5-hash-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573496" comment="php5-iconv-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573497" comment="php5-json-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573498" comment="php5-ldap-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573499" comment="php5-mbstring-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573500" comment="php5-mcrypt-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573501" comment="php5-mysql-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573502" comment="php5-odbc-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573503" comment="php5-openssl-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573504" comment="php5-pcntl-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573505" comment="php5-pdo-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573506" comment="php5-pear-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573507" comment="php5-pgsql-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573508" comment="php5-pspell-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573509" comment="php5-shmop-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573510" comment="php5-snmp-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573511" comment="php5-soap-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573512" comment="php5-suhosin-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573513" comment="php5-sysvmsg-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573514" comment="php5-sysvsem-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573515" comment="php5-sysvshm-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573516" comment="php5-tokenizer-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573517" comment="php5-wddx-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573518" comment="php5-xmlreader-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573519" comment="php5-xmlrpc-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573520" comment="php5-xmlwriter-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573521" comment="php5-xsl-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573522" comment="php5-zip-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573523" comment="php5-zlib-5.2.14-0.7.30.103.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217634" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1040883" ref_url="https://bugzilla.suse.com/1040883" source="BUGZILLA"/>
		<reference ref_id="1040889" ref_url="https://bugzilla.suse.com/1040889" source="BUGZILLA"/>
		<reference ref_id="1040891" ref_url="https://bugzilla.suse.com/1040891" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9224" ref_url="https://www.suse.com/security/cve/CVE-2017-9224/" source="CVE"/>
		<reference ref_id="CVE-2017-9226" ref_url="https://www.suse.com/security/cve/CVE-2017-9226/" source="CVE"/>
		<reference ref_id="CVE-2017-9227" ref_url="https://www.suse.com/security/cve/CVE-2017-9227/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

- CVE-2017-9227: A stack out-of-bounds read occurs in mbc_enc_len() during regular expression searching. (bsc#1040883)
- CVE-2017-9226: A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. (bsc#1040889)
- CVE-2017-9224: A stack out-of-bounds read occurs in match_at() during regular expression searching. (bsc#1040891)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-27"/>
	<updated date="2017-06-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040883">SUSE bug 1040883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040889">SUSE bug 1040889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040891">SUSE bug 1040891</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9224/">CVE-2017-9224 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9224">CVE-2017-9224 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9226/">CVE-2017-9226 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9226">CVE-2017-9226 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9227/">CVE-2017-9227 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9227">CVE-2017-9227 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573524" comment="apache2-mod_php5-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573525" comment="php5-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573526" comment="php5-bcmath-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573527" comment="php5-bz2-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573528" comment="php5-calendar-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573529" comment="php5-ctype-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573530" comment="php5-curl-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573531" comment="php5-dba-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573532" comment="php5-dbase-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573533" comment="php5-dom-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573534" comment="php5-exif-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573535" comment="php5-fastcgi-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573536" comment="php5-ftp-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573537" comment="php5-gd-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573538" comment="php5-gettext-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573539" comment="php5-gmp-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573540" comment="php5-hash-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573541" comment="php5-iconv-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573542" comment="php5-json-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573543" comment="php5-ldap-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573544" comment="php5-mbstring-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573545" comment="php5-mcrypt-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573546" comment="php5-mysql-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573547" comment="php5-odbc-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573548" comment="php5-openssl-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573549" comment="php5-pcntl-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573550" comment="php5-pdo-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573551" comment="php5-pear-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573552" comment="php5-pgsql-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573553" comment="php5-pspell-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573554" comment="php5-shmop-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573555" comment="php5-snmp-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573556" comment="php5-soap-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573557" comment="php5-suhosin-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573558" comment="php5-sysvmsg-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573559" comment="php5-sysvsem-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573560" comment="php5-sysvshm-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573561" comment="php5-tokenizer-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573562" comment="php5-wddx-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573563" comment="php5-xmlreader-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573564" comment="php5-xmlrpc-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573565" comment="php5-xmlwriter-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573566" comment="php5-xsl-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573567" comment="php5-zip-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573568" comment="php5-zlib-5.2.14-0.7.30.110.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217635" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1047454" ref_url="https://bugzilla.suse.com/1047454" source="BUGZILLA"/>
		<reference ref_id="1048096" ref_url="https://bugzilla.suse.com/1048096" source="BUGZILLA"/>
		<reference ref_id="1048112" ref_url="https://bugzilla.suse.com/1048112" source="BUGZILLA"/>
		<reference ref_id="1050241" ref_url="https://bugzilla.suse.com/1050241" source="BUGZILLA"/>
		<reference ref_id="1050726" ref_url="https://bugzilla.suse.com/1050726" source="BUGZILLA"/>
		<reference ref_id="986386" ref_url="https://bugzilla.suse.com/986386" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-10397" ref_url="https://www.suse.com/security/cve/CVE-2016-10397/" source="CVE"/>
		<reference ref_id="CVE-2016-5766" ref_url="https://www.suse.com/security/cve/CVE-2016-5766/" source="CVE"/>
		<reference ref_id="CVE-2017-11144" ref_url="https://www.suse.com/security/cve/CVE-2017-11144/" source="CVE"/>
		<reference ref_id="CVE-2017-11145" ref_url="https://www.suse.com/security/cve/CVE-2017-11145/" source="CVE"/>
		<reference ref_id="CVE-2017-11628" ref_url="https://www.suse.com/security/cve/CVE-2017-11628/" source="CVE"/>
		<reference ref_id="CVE-2017-7890" ref_url="https://www.suse.com/security/cve/CVE-2017-7890/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

- CVE-2016-10397: parse_url() can be bypassed to return fake host. (bsc#1047454)
- CVE-2017-11144: The opensslextension PEM sealing code did not check the return value of the
  OpenSSL sealingfunction, which could lead to a crash. (bsc#1048096)
- CVE-2017-11145: Lack of bounds checks in timelib_meridian coud lead to information leak. (bsc#1048112)
- CVE-2016-5766: Integer Overflow in _gd2GetHeader() could lead to heap overflow (bsc#986386)
- CVE-2017-11628: Stack-base dbuffer overflow in zend_ini_do_op() could lead to denial of service (bsc#1050726)
- CVE-2017-7890: Buffer over-read from unitialized data in gdImageCreateFromGifCtx could lead to denial of service (bsc#1050241)
    
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-05"/>
	<updated date="2017-09-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047454">SUSE bug 1047454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048096">SUSE bug 1048096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048112">SUSE bug 1048112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050241">SUSE bug 1050241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050726">SUSE bug 1050726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986386">SUSE bug 986386</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10168">CVE-2016-10168 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-10397/">CVE-2016-10397 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10397">CVE-2016-10397 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5766/">CVE-2016-5766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5766">CVE-2016-5766 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11144/">CVE-2017-11144 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11144">CVE-2017-11144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11145/">CVE-2017-11145 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11145">CVE-2017-11145 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11628/">CVE-2017-11628 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11628">CVE-2017-11628 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7890/">CVE-2017-7890 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7890">CVE-2017-7890 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573569" comment="apache2-mod_php5-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573570" comment="php5-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573571" comment="php5-bcmath-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573572" comment="php5-bz2-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573573" comment="php5-calendar-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573574" comment="php5-ctype-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573575" comment="php5-curl-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573576" comment="php5-dba-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573577" comment="php5-dbase-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573578" comment="php5-dom-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573579" comment="php5-exif-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573580" comment="php5-fastcgi-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573581" comment="php5-ftp-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573582" comment="php5-gd-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573583" comment="php5-gettext-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573584" comment="php5-gmp-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573585" comment="php5-hash-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573586" comment="php5-iconv-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573587" comment="php5-json-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573588" comment="php5-ldap-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573589" comment="php5-mbstring-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573590" comment="php5-mcrypt-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573591" comment="php5-mysql-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573592" comment="php5-odbc-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573593" comment="php5-openssl-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573594" comment="php5-pcntl-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573595" comment="php5-pdo-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573596" comment="php5-pear-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573597" comment="php5-pgsql-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573598" comment="php5-pspell-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573599" comment="php5-shmop-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573600" comment="php5-snmp-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573601" comment="php5-soap-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573602" comment="php5-suhosin-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573603" comment="php5-sysvmsg-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573604" comment="php5-sysvsem-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573605" comment="php5-sysvshm-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573606" comment="php5-tokenizer-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573607" comment="php5-wddx-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573608" comment="php5-xmlreader-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573609" comment="php5-xmlrpc-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573610" comment="php5-xmlwriter-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573611" comment="php5-xsl-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573612" comment="php5-zip-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573613" comment="php5-zlib-5.2.14-0.7.30.111.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217636" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1054430" ref_url="https://bugzilla.suse.com/1054430" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12933" ref_url="https://www.suse.com/security/cve/CVE-2017-12933/" source="CVE"/>
		<description>
This update for php5 fixes one issues.

This security issue was fixed:

- CVE-2017-12933: The finish_nested_data function in ext/standard/var_unserializer.re was prone to a buffer over-read while unserializing untrusted data. Exploitation of this issue could have had an unspecified impact on the integrity of PHP (bsc#1054430)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-06"/>
	<updated date="2017-11-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1054430">SUSE bug 1054430</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12933/">CVE-2017-12933 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12933">CVE-2017-12933 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573614" comment="apache2-mod_php5-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573615" comment="php5-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573616" comment="php5-bcmath-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573617" comment="php5-bz2-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573618" comment="php5-calendar-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573619" comment="php5-ctype-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573620" comment="php5-curl-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573621" comment="php5-dba-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573622" comment="php5-dbase-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573623" comment="php5-dom-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573624" comment="php5-exif-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573625" comment="php5-fastcgi-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573626" comment="php5-ftp-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573627" comment="php5-gd-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573628" comment="php5-gettext-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573629" comment="php5-gmp-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573630" comment="php5-hash-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573631" comment="php5-iconv-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573632" comment="php5-json-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573633" comment="php5-ldap-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573634" comment="php5-mbstring-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573635" comment="php5-mcrypt-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573636" comment="php5-mysql-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573637" comment="php5-odbc-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573638" comment="php5-openssl-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573639" comment="php5-pcntl-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573640" comment="php5-pdo-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573641" comment="php5-pear-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573642" comment="php5-pgsql-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573643" comment="php5-pspell-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573644" comment="php5-shmop-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573645" comment="php5-snmp-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573646" comment="php5-soap-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573647" comment="php5-suhosin-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573648" comment="php5-sysvmsg-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573649" comment="php5-sysvsem-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573650" comment="php5-sysvshm-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573651" comment="php5-tokenizer-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573652" comment="php5-wddx-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573653" comment="php5-xmlreader-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573654" comment="php5-xmlrpc-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573655" comment="php5-xmlwriter-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573656" comment="php5-xsl-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573657" comment="php5-zip-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573658" comment="php5-zlib-5.2.14-0.7.30.111.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217637" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1069606" ref_url="https://bugzilla.suse.com/1069606" source="BUGZILLA"/>
		<reference ref_id="1069631" ref_url="https://bugzilla.suse.com/1069631" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9228" ref_url="https://www.suse.com/security/cve/CVE-2017-9228/" source="CVE"/>
		<reference ref_id="CVE-2017-9229" ref_url="https://www.suse.com/security/cve/CVE-2017-9229/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

Security issues fixed:

- CVE-2017-9228: Fix heap out-of-bounds write that occurs in bitset_set_range() during regex compilation (bsc#1069606).
- CVE-2017-9229: Fix invalid pointer dereference in left_adjust_char_head() (bsc#1069631).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1069606">SUSE bug 1069606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069631">SUSE bug 1069631</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9228/">CVE-2017-9228 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9228">CVE-2017-9228 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9229/">CVE-2017-9229 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9229">CVE-2017-9229 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573659" comment="apache2-mod_php5-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573660" comment="php5-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573661" comment="php5-bcmath-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573662" comment="php5-bz2-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573663" comment="php5-calendar-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573664" comment="php5-ctype-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573665" comment="php5-curl-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573666" comment="php5-dba-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573667" comment="php5-dbase-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573668" comment="php5-dom-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573669" comment="php5-exif-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573670" comment="php5-fastcgi-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573671" comment="php5-ftp-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573672" comment="php5-gd-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573673" comment="php5-gettext-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573674" comment="php5-gmp-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573675" comment="php5-hash-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573676" comment="php5-iconv-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573677" comment="php5-json-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573678" comment="php5-ldap-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573679" comment="php5-mbstring-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573680" comment="php5-mcrypt-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573681" comment="php5-mysql-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573682" comment="php5-odbc-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573683" comment="php5-openssl-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573684" comment="php5-pcntl-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573685" comment="php5-pdo-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573686" comment="php5-pear-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573687" comment="php5-pgsql-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573688" comment="php5-pspell-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573689" comment="php5-shmop-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573690" comment="php5-snmp-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573691" comment="php5-soap-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573692" comment="php5-suhosin-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573693" comment="php5-sysvmsg-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573694" comment="php5-sysvsem-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573695" comment="php5-sysvshm-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573696" comment="php5-tokenizer-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573697" comment="php5-wddx-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573698" comment="php5-xmlreader-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573699" comment="php5-xmlrpc-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573700" comment="php5-xmlwriter-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573701" comment="php5-xsl-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573702" comment="php5-zip-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573703" comment="php5-zlib-5.2.14-0.7.30.111.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217638" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1076391" ref_url="https://bugzilla.suse.com/1076391" source="BUGZILLA"/>
		<reference ref_id="1080234" ref_url="https://bugzilla.suse.com/1080234" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10712" ref_url="https://www.suse.com/security/cve/CVE-2016-10712/" source="CVE"/>
		<reference ref_id="CVE-2018-5711" ref_url="https://www.suse.com/security/cve/CVE-2018-5711/" source="CVE"/>
		<description>
This update for php5 fixes one issues.

This security issue was fixed:

- CVE-2016-10712: In PHP all of the return values of stream_get_meta_data could be controlled if the input can be controlled (e.g., during file uploads).  (bsc#1080234)
- CVE-2018-5711: Prevent integer signedness error that could have lead to an infinite loop via a crafted GIF file allowing for DoS (bsc#1076391).

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-22"/>
	<updated date="2018-02-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080234">SUSE bug 1080234</bugzilla>
	<cve impact="critical" cvss3="9.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2016-10712/">CVE-2016-10712 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10712">CVE-2016-10712 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5711/">CVE-2018-5711 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5711">CVE-2018-5711 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573704" comment="apache2-mod_php5-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573705" comment="php5-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573706" comment="php5-bcmath-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573707" comment="php5-bz2-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573708" comment="php5-calendar-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573709" comment="php5-ctype-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573710" comment="php5-curl-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573711" comment="php5-dba-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573712" comment="php5-dbase-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573713" comment="php5-dom-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573714" comment="php5-exif-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573715" comment="php5-fastcgi-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573716" comment="php5-ftp-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573717" comment="php5-gd-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573718" comment="php5-gettext-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573719" comment="php5-gmp-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573720" comment="php5-hash-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573721" comment="php5-iconv-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573722" comment="php5-json-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573723" comment="php5-ldap-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573724" comment="php5-mbstring-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573725" comment="php5-mcrypt-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573726" comment="php5-mysql-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573727" comment="php5-odbc-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573728" comment="php5-openssl-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573729" comment="php5-pcntl-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573730" comment="php5-pdo-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573731" comment="php5-pear-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573732" comment="php5-pgsql-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573733" comment="php5-pspell-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573734" comment="php5-shmop-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573735" comment="php5-snmp-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573736" comment="php5-soap-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573737" comment="php5-suhosin-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573738" comment="php5-sysvmsg-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573739" comment="php5-sysvsem-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573740" comment="php5-sysvshm-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573741" comment="php5-tokenizer-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573742" comment="php5-wddx-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573743" comment="php5-xmlreader-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573744" comment="php5-xmlrpc-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573745" comment="php5-xmlwriter-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573746" comment="php5-xsl-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573747" comment="php5-zip-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573748" comment="php5-zlib-5.2.14-0.7.30.111.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217639" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1083639" ref_url="https://bugzilla.suse.com/1083639" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7584" ref_url="https://www.suse.com/security/cve/CVE-2018-7584/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

Security issues fixed:

- CVE-2018-7584: Fixed stack-based buffer under-read while parsing an HTTPresponse in the php_stream_url_wrap_http_ex (bsc#1083639).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-15"/>
	<updated date="2018-03-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083639">SUSE bug 1083639</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7584/">CVE-2018-7584 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7584">CVE-2018-7584 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573749" comment="apache2-mod_php5-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573750" comment="php5-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573751" comment="php5-bcmath-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573752" comment="php5-bz2-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573753" comment="php5-calendar-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573754" comment="php5-ctype-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573755" comment="php5-curl-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573756" comment="php5-dba-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573757" comment="php5-dbase-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573758" comment="php5-dom-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573759" comment="php5-exif-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573760" comment="php5-fastcgi-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573761" comment="php5-ftp-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573762" comment="php5-gd-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573763" comment="php5-gettext-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573764" comment="php5-gmp-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573765" comment="php5-hash-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573766" comment="php5-iconv-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573767" comment="php5-json-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573768" comment="php5-ldap-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573769" comment="php5-mbstring-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573770" comment="php5-mcrypt-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573771" comment="php5-mysql-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573772" comment="php5-odbc-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573773" comment="php5-openssl-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573774" comment="php5-pcntl-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573775" comment="php5-pdo-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573776" comment="php5-pear-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573777" comment="php5-pgsql-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573778" comment="php5-pspell-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573779" comment="php5-shmop-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573780" comment="php5-snmp-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573781" comment="php5-soap-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573782" comment="php5-suhosin-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573783" comment="php5-sysvmsg-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573784" comment="php5-sysvsem-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573785" comment="php5-sysvshm-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573786" comment="php5-tokenizer-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573787" comment="php5-wddx-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573788" comment="php5-xmlreader-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573789" comment="php5-xmlrpc-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573790" comment="php5-xmlwriter-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573791" comment="php5-xsl-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573792" comment="php5-zip-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573793" comment="php5-zlib-5.2.14-0.7.30.111.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217640" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1091355" ref_url="https://bugzilla.suse.com/1091355" source="BUGZILLA"/>
		<reference ref_id="1091363" ref_url="https://bugzilla.suse.com/1091363" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10546" ref_url="https://www.suse.com/security/cve/CVE-2018-10546/" source="CVE"/>
		<reference ref_id="CVE-2018-10548" ref_url="https://www.suse.com/security/cve/CVE-2018-10548/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

Security issues fixed:

- CVE-2018-10546: Fix an infinite loop exists in ext/iconv/iconv.c (bsc#1091363).
- CVE-2018-10548: Fix remote denial of service in ext/ldap/ldap.c (bsc#1091355).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-25"/>
	<updated date="2018-05-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091355">SUSE bug 1091355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091363">SUSE bug 1091363</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10546/">CVE-2018-10546 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10546">CVE-2018-10546 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10548/">CVE-2018-10548 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10548">CVE-2018-10548 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573794" comment="apache2-mod_php5-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573795" comment="php5-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573796" comment="php5-bcmath-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573797" comment="php5-bz2-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573798" comment="php5-calendar-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573799" comment="php5-ctype-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573800" comment="php5-curl-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573801" comment="php5-dba-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573802" comment="php5-dbase-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573803" comment="php5-dom-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573804" comment="php5-exif-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573805" comment="php5-fastcgi-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573806" comment="php5-ftp-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573807" comment="php5-gd-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573808" comment="php5-gettext-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573809" comment="php5-gmp-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573810" comment="php5-hash-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573811" comment="php5-iconv-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573812" comment="php5-json-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573813" comment="php5-ldap-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573814" comment="php5-mbstring-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573815" comment="php5-mcrypt-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573816" comment="php5-mysql-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573817" comment="php5-odbc-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573818" comment="php5-openssl-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573819" comment="php5-pcntl-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573820" comment="php5-pdo-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573821" comment="php5-pear-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573822" comment="php5-pgsql-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573823" comment="php5-pspell-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573824" comment="php5-shmop-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573825" comment="php5-snmp-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573826" comment="php5-soap-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573827" comment="php5-suhosin-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573828" comment="php5-sysvmsg-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573829" comment="php5-sysvsem-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573830" comment="php5-sysvshm-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573831" comment="php5-tokenizer-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573832" comment="php5-wddx-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573833" comment="php5-xmlreader-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573834" comment="php5-xmlrpc-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573835" comment="php5-xmlwriter-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573836" comment="php5-xsl-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573837" comment="php5-zip-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573838" comment="php5-zlib-5.2.14-0.7.30.111.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217641" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1099098" ref_url="https://bugzilla.suse.com/1099098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12882" ref_url="https://www.suse.com/security/cve/CVE-2018-12882/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

- CVE-2018-12882: exif_read_from_impl allowed attackers to trigger a
  use-after-free (in exif_read_from_file) because it closed a stream that it is
  not responsible for closing (bsc#1099098)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-10"/>
	<updated date="2018-08-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1099098">SUSE bug 1099098</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12882/">CVE-2018-12882 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12882">CVE-2018-12882 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573839" comment="apache2-mod_php5-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573840" comment="php5-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573841" comment="php5-bcmath-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573842" comment="php5-bz2-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573843" comment="php5-calendar-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573844" comment="php5-ctype-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573845" comment="php5-curl-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573846" comment="php5-dba-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573847" comment="php5-dbase-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573848" comment="php5-dom-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573849" comment="php5-exif-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573850" comment="php5-fastcgi-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573851" comment="php5-ftp-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573852" comment="php5-gd-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573853" comment="php5-gettext-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573854" comment="php5-gmp-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573855" comment="php5-hash-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573856" comment="php5-iconv-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573857" comment="php5-json-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573858" comment="php5-ldap-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573859" comment="php5-mbstring-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573860" comment="php5-mcrypt-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573861" comment="php5-mysql-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573862" comment="php5-odbc-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573863" comment="php5-openssl-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573864" comment="php5-pcntl-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573865" comment="php5-pdo-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573866" comment="php5-pear-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573867" comment="php5-pgsql-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573868" comment="php5-pspell-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573869" comment="php5-shmop-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573870" comment="php5-snmp-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573871" comment="php5-soap-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573872" comment="php5-suhosin-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573873" comment="php5-sysvmsg-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573874" comment="php5-sysvsem-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573875" comment="php5-sysvshm-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573876" comment="php5-tokenizer-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573877" comment="php5-wddx-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573878" comment="php5-xmlreader-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573879" comment="php5-xmlrpc-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573880" comment="php5-xmlwriter-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573881" comment="php5-xsl-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573882" comment="php5-zip-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573883" comment="php5-zlib-5.2.14-0.7.30.111.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217642" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1103659" ref_url="https://bugzilla.suse.com/1103659" source="BUGZILLA"/>
		<reference ref_id="1103836" ref_url="https://bugzilla.suse.com/1103836" source="BUGZILLA"/>
		<reference ref_id="1105466" ref_url="https://bugzilla.suse.com/1105466" source="BUGZILLA"/>
		<reference ref_id="1108753" ref_url="https://bugzilla.suse.com/1108753" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9118" ref_url="https://www.suse.com/security/cve/CVE-2017-9118/" source="CVE"/>
		<reference ref_id="CVE-2018-14851" ref_url="https://www.suse.com/security/cve/CVE-2018-14851/" source="CVE"/>
		<reference ref_id="CVE-2018-14883" ref_url="https://www.suse.com/security/cve/CVE-2018-14883/" source="CVE"/>
		<reference ref_id="CVE-2018-17082" ref_url="https://www.suse.com/security/cve/CVE-2018-17082/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

The following security vulnerabilities were fixed:

- CVE-2018-17082: The Apache2 component in PHP allowed XSS via the body of a
  'Transfer-Encoding: chunked' request, because the bucket brigade was mishandled
  in the php_handler function (bsc#1108753)
- CVE-2018-14851: Fixed an out-of-bounds read and application crash in 
  exif_process_IFD_in_MAKERNOTE in ext/exif/exif.c, which allowed remote
  attackers to cause a denial of service (bsc#1103659)
- CVE-2018-14883: Fixed an integer overflow that could lead to a heap-based
  buffer over-read in exif_thumbnail_extract of exif.c and allowed remote
  attackers to cause a denial of service (bsc#1103836)
- CVE-2017-9118: Fixed an out of bounds access in php_pcre_replace_impl via a
  crafted preg_replace call (bsc#1105466)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-26"/>
	<updated date="2018-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103659">SUSE bug 1103659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103836">SUSE bug 1103836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105466">SUSE bug 1105466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108753">SUSE bug 1108753</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9118/">CVE-2017-9118 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9118">CVE-2017-9118 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14851/">CVE-2018-14851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14851">CVE-2018-14851 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14883/">CVE-2018-14883 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14883">CVE-2018-14883 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-17082/">CVE-2018-17082 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17082">CVE-2018-17082 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573884" comment="apache2-mod_php5-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573885" comment="php5-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573886" comment="php5-bcmath-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573887" comment="php5-bz2-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573888" comment="php5-calendar-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573889" comment="php5-ctype-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573890" comment="php5-curl-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573891" comment="php5-dba-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573892" comment="php5-dbase-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573893" comment="php5-dom-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573894" comment="php5-exif-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573895" comment="php5-fastcgi-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573896" comment="php5-ftp-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573897" comment="php5-gd-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573898" comment="php5-gettext-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573899" comment="php5-gmp-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573900" comment="php5-hash-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573901" comment="php5-iconv-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573902" comment="php5-json-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573903" comment="php5-ldap-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573904" comment="php5-mbstring-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573905" comment="php5-mcrypt-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573906" comment="php5-mysql-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573907" comment="php5-odbc-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573908" comment="php5-openssl-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573909" comment="php5-pcntl-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573910" comment="php5-pdo-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573911" comment="php5-pear-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573912" comment="php5-pgsql-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573913" comment="php5-pspell-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573914" comment="php5-shmop-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573915" comment="php5-snmp-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573916" comment="php5-soap-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573917" comment="php5-suhosin-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573918" comment="php5-sysvmsg-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573919" comment="php5-sysvsem-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573920" comment="php5-sysvshm-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573921" comment="php5-tokenizer-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573922" comment="php5-wddx-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573923" comment="php5-xmlreader-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573924" comment="php5-xmlrpc-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573925" comment="php5-xmlwriter-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573926" comment="php5-xsl-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573927" comment="php5-zip-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573928" comment="php5-zlib-5.2.14-0.7.30.111.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217643" version="1" class="patch">
	<metadata>
		<title>Recommended update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1117107" ref_url="https://bugzilla.suse.com/1117107" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19518" ref_url="https://www.suse.com/security/cve/CVE-2018-19518/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

Security issue fixed:
    
- CVE-2018-19518: Fixed imap_open script injection flaw (bsc#1117107).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-12"/>
	<updated date="2018-12-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117107">SUSE bug 1117107</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19518/">CVE-2018-19518 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19518">CVE-2018-19518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573929" comment="apache2-mod_php5-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573930" comment="php5-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573931" comment="php5-bcmath-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573932" comment="php5-bz2-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573933" comment="php5-calendar-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573934" comment="php5-ctype-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573935" comment="php5-curl-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573936" comment="php5-dba-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573937" comment="php5-dbase-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573938" comment="php5-dom-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573939" comment="php5-exif-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573940" comment="php5-fastcgi-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573941" comment="php5-ftp-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573942" comment="php5-gd-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573943" comment="php5-gettext-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573944" comment="php5-gmp-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573945" comment="php5-hash-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573946" comment="php5-iconv-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573947" comment="php5-json-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573948" comment="php5-ldap-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573949" comment="php5-mbstring-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573950" comment="php5-mcrypt-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573951" comment="php5-mysql-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573952" comment="php5-odbc-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573953" comment="php5-openssl-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573954" comment="php5-pcntl-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573955" comment="php5-pdo-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573956" comment="php5-pear-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573957" comment="php5-pgsql-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573958" comment="php5-pspell-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573959" comment="php5-shmop-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573960" comment="php5-snmp-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573961" comment="php5-soap-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573962" comment="php5-suhosin-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573963" comment="php5-sysvmsg-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573964" comment="php5-sysvsem-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573965" comment="php5-sysvshm-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573966" comment="php5-tokenizer-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573967" comment="php5-wddx-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573968" comment="php5-xmlreader-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573969" comment="php5-xmlrpc-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573970" comment="php5-xmlwriter-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573971" comment="php5-xsl-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573972" comment="php5-zip-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573973" comment="php5-zlib-5.2.14-0.7.30.111.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217644" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1123354" ref_url="https://bugzilla.suse.com/1123354" source="BUGZILLA"/>
		<reference ref_id="1123522" ref_url="https://bugzilla.suse.com/1123522" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6977" ref_url="https://www.suse.com/security/cve/CVE-2019-6977/" source="CVE"/>
		<reference ref_id="CVE-2019-6978" ref_url="https://www.suse.com/security/cve/CVE-2019-6978/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

Security vulnerabilities addressed:

- CVE-2019-6977: Fixed a heap-based buffer overflow in the GD graphics library (bsc#1123354).
- CVE-2019-6978: Fixed a double free in the GD graphics library (bsc#1123522).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-08"/>
	<updated date="2019-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123354">SUSE bug 1123354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123522">SUSE bug 1123522</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6977/">CVE-2019-6977 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6977">CVE-2019-6977 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6978/">CVE-2019-6978 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6978">CVE-2019-6978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573974" comment="apache2-mod_php5-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573975" comment="php5-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573976" comment="php5-bcmath-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573977" comment="php5-bz2-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573978" comment="php5-calendar-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573979" comment="php5-ctype-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573980" comment="php5-curl-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573981" comment="php5-dba-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573982" comment="php5-dbase-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573983" comment="php5-dom-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573984" comment="php5-exif-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573985" comment="php5-fastcgi-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573986" comment="php5-ftp-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573987" comment="php5-gd-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573988" comment="php5-gettext-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573989" comment="php5-gmp-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573990" comment="php5-hash-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573991" comment="php5-iconv-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573992" comment="php5-json-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573993" comment="php5-ldap-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573994" comment="php5-mbstring-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573995" comment="php5-mcrypt-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573996" comment="php5-mysql-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573997" comment="php5-odbc-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573998" comment="php5-openssl-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573999" comment="php5-pcntl-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574000" comment="php5-pdo-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574001" comment="php5-pear-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574002" comment="php5-pgsql-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574003" comment="php5-pspell-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574004" comment="php5-shmop-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574005" comment="php5-snmp-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574006" comment="php5-soap-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574007" comment="php5-suhosin-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574008" comment="php5-sysvmsg-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574009" comment="php5-sysvsem-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574010" comment="php5-sysvshm-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574011" comment="php5-tokenizer-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574012" comment="php5-wddx-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574013" comment="php5-xmlreader-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574014" comment="php5-xmlrpc-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574015" comment="php5-xmlwriter-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574016" comment="php5-xsl-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574017" comment="php5-zip-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574018" comment="php5-zlib-5.2.14-0.7.30.111.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217645" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1126711" ref_url="https://bugzilla.suse.com/1126711" source="BUGZILLA"/>
		<reference ref_id="1126821" ref_url="https://bugzilla.suse.com/1126821" source="BUGZILLA"/>
		<reference ref_id="1126823" ref_url="https://bugzilla.suse.com/1126823" source="BUGZILLA"/>
		<reference ref_id="1128722" ref_url="https://bugzilla.suse.com/1128722" source="BUGZILLA"/>
		<reference ref_id="1128883" ref_url="https://bugzilla.suse.com/1128883" source="BUGZILLA"/>
		<reference ref_id="1128887" ref_url="https://bugzilla.suse.com/1128887" source="BUGZILLA"/>
		<reference ref_id="1128889" ref_url="https://bugzilla.suse.com/1128889" source="BUGZILLA"/>
		<reference ref_id="1128892" ref_url="https://bugzilla.suse.com/1128892" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9020" ref_url="https://www.suse.com/security/cve/CVE-2019-9020/" source="CVE"/>
		<reference ref_id="CVE-2019-9023" ref_url="https://www.suse.com/security/cve/CVE-2019-9023/" source="CVE"/>
		<reference ref_id="CVE-2019-9024" ref_url="https://www.suse.com/security/cve/CVE-2019-9024/" source="CVE"/>
		<reference ref_id="CVE-2019-9637" ref_url="https://www.suse.com/security/cve/CVE-2019-9637/" source="CVE"/>
		<reference ref_id="CVE-2019-9638" ref_url="https://www.suse.com/security/cve/CVE-2019-9638/" source="CVE"/>
		<reference ref_id="CVE-2019-9639" ref_url="https://www.suse.com/security/cve/CVE-2019-9639/" source="CVE"/>
		<reference ref_id="CVE-2019-9640" ref_url="https://www.suse.com/security/cve/CVE-2019-9640/" source="CVE"/>
		<reference ref_id="CVE-2019-9641" ref_url="https://www.suse.com/security/cve/CVE-2019-9641/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

Security issues fixed: 	  

- CVE-2019-9637: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128892).
- CVE-2019-9638: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension ((bsc#1128889).
- CVE-2019-9639: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128887).
- CVE-2019-9640: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128883).
- CVE-2019-9024: Fixed a vulnerability in xmlrpc_decode function which could allow to a hostile XMLRPC server
  to cause memory read outside the allocated areas (bsc#1126821).
- CVE-2019-9020: Fixed a heap out of bounds in xmlrpc_decode function (bsc#1126711).
- CVE-2019-9023: Fixed multiple heap-based buffer over-read instances in mbstring regular expression functions (bsc#1126823).
- CVE-2019-9641: Fixed multiple invalid memory access in EXIF extension and improved insecure implementation 
  of rename function (bsc#1128722).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-02"/>
	<updated date="2019-04-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1126711">SUSE bug 1126711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126821">SUSE bug 1126821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126823">SUSE bug 1126823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128722">SUSE bug 1128722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128883">SUSE bug 1128883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128887">SUSE bug 1128887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128889">SUSE bug 1128889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128892">SUSE bug 1128892</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9020/">CVE-2019-9020 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9020">CVE-2019-9020 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9023/">CVE-2019-9023 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9023">CVE-2019-9023 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9024/">CVE-2019-9024 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9024">CVE-2019-9024 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9637/">CVE-2019-9637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9637">CVE-2019-9637 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9638/">CVE-2019-9638 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9638">CVE-2019-9638 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9639/">CVE-2019-9639 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9639">CVE-2019-9639 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9640/">CVE-2019-9640 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9640">CVE-2019-9640 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9641/">CVE-2019-9641 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9641">CVE-2019-9641 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574019" comment="apache2-mod_php5-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574020" comment="php5-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574021" comment="php5-bcmath-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574022" comment="php5-bz2-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574023" comment="php5-calendar-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574024" comment="php5-ctype-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574025" comment="php5-curl-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574026" comment="php5-dba-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574027" comment="php5-dbase-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574028" comment="php5-dom-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574029" comment="php5-exif-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574030" comment="php5-fastcgi-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574031" comment="php5-ftp-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574032" comment="php5-gd-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574033" comment="php5-gettext-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574034" comment="php5-gmp-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574035" comment="php5-hash-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574036" comment="php5-iconv-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574037" comment="php5-json-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574038" comment="php5-ldap-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574039" comment="php5-mbstring-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574040" comment="php5-mcrypt-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574041" comment="php5-mysql-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574042" comment="php5-odbc-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574043" comment="php5-openssl-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574044" comment="php5-pcntl-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574045" comment="php5-pdo-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574046" comment="php5-pear-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574047" comment="php5-pgsql-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574048" comment="php5-pspell-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574049" comment="php5-shmop-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574050" comment="php5-snmp-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574051" comment="php5-soap-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574052" comment="php5-suhosin-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574053" comment="php5-sysvmsg-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574054" comment="php5-sysvsem-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574055" comment="php5-sysvshm-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574056" comment="php5-tokenizer-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574057" comment="php5-wddx-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574058" comment="php5-xmlreader-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574059" comment="php5-xmlrpc-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574060" comment="php5-xmlwriter-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574061" comment="php5-xsl-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574062" comment="php5-zip-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574063" comment="php5-zlib-5.2.14-111.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217646" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1132837" ref_url="https://bugzilla.suse.com/1132837" source="BUGZILLA"/>
		<reference ref_id="1132838" ref_url="https://bugzilla.suse.com/1132838" source="BUGZILLA"/>
		<reference ref_id="1134322" ref_url="https://bugzilla.suse.com/1134322" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11034" ref_url="https://www.suse.com/security/cve/CVE-2019-11034/" source="CVE"/>
		<reference ref_id="CVE-2019-11035" ref_url="https://www.suse.com/security/cve/CVE-2019-11035/" source="CVE"/>
		<reference ref_id="CVE-2019-11036" ref_url="https://www.suse.com/security/cve/CVE-2019-11036/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

Security issues fixed:

- CVE-2019-11034: Fixed a heap-buffer overflow in php_ifd_get32si() (bsc#1132838).
- CVE-2019-11035: Fixed a heap-buffer overflow in exif_iif_add_value() (bsc#1132837).
- CVE-2019-11036: Fixed buffer over-read in exif_process_IFD_TAG function leading to information disclosure (bsc#1134322).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-24"/>
	<updated date="2019-05-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1132837">SUSE bug 1132837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132838">SUSE bug 1132838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134322">SUSE bug 1134322</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11034/">CVE-2019-11034 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11034">CVE-2019-11034 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11035/">CVE-2019-11035 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11035">CVE-2019-11035 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11036/">CVE-2019-11036 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11036">CVE-2019-11036 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574064" comment="apache2-mod_php5-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574065" comment="php5-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574066" comment="php5-bcmath-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574067" comment="php5-bz2-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574068" comment="php5-calendar-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574069" comment="php5-ctype-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574070" comment="php5-curl-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574071" comment="php5-dba-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574072" comment="php5-dbase-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574073" comment="php5-dom-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574074" comment="php5-exif-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574075" comment="php5-fastcgi-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574076" comment="php5-ftp-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574077" comment="php5-gd-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574078" comment="php5-gettext-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574079" comment="php5-gmp-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574080" comment="php5-hash-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574081" comment="php5-iconv-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574082" comment="php5-json-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574083" comment="php5-ldap-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574084" comment="php5-mbstring-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574085" comment="php5-mcrypt-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574086" comment="php5-mysql-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574087" comment="php5-odbc-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574088" comment="php5-openssl-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574089" comment="php5-pcntl-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574090" comment="php5-pdo-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574091" comment="php5-pear-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574092" comment="php5-pgsql-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574093" comment="php5-pspell-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574094" comment="php5-shmop-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574095" comment="php5-snmp-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574096" comment="php5-soap-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574097" comment="php5-suhosin-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574098" comment="php5-sysvmsg-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574099" comment="php5-sysvsem-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574100" comment="php5-sysvshm-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574101" comment="php5-tokenizer-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574102" comment="php5-wddx-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574103" comment="php5-xmlreader-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574104" comment="php5-xmlrpc-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574105" comment="php5-xmlwriter-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574106" comment="php5-xsl-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574107" comment="php5-zip-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574108" comment="php5-zlib-5.2.14-111.51.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217647" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1138172" ref_url="https://bugzilla.suse.com/1138172" source="BUGZILLA"/>
		<reference ref_id="1138173" ref_url="https://bugzilla.suse.com/1138173" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11039" ref_url="https://www.suse.com/security/cve/CVE-2019-11039/" source="CVE"/>
		<reference ref_id="CVE-2019-11040" ref_url="https://www.suse.com/security/cve/CVE-2019-11040/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:
	  
Security issues fixed:	  

- CVE-2019-11039: Fixed a heap-buffer-overflow on php_jpg_get16 (bsc#1138173).
- CVE-2019-11040: Fixed an out-of-bounds read due to an integer overflow in 
  iconv.c:_php_iconv_mime_decode() (bsc#1138172).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1138172">SUSE bug 1138172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138173">SUSE bug 1138173</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11039/">CVE-2019-11039 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11039">CVE-2019-11039 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11040/">CVE-2019-11040 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11040">CVE-2019-11040 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574109" comment="apache2-mod_php5-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574110" comment="php5-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574111" comment="php5-bcmath-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574112" comment="php5-bz2-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574113" comment="php5-calendar-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574114" comment="php5-ctype-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574115" comment="php5-curl-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574116" comment="php5-dba-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574117" comment="php5-dbase-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574118" comment="php5-dom-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574119" comment="php5-exif-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574120" comment="php5-fastcgi-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574121" comment="php5-ftp-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574122" comment="php5-gd-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574123" comment="php5-gettext-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574124" comment="php5-gmp-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574125" comment="php5-hash-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574126" comment="php5-iconv-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574127" comment="php5-json-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574128" comment="php5-ldap-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574129" comment="php5-mbstring-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574130" comment="php5-mcrypt-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574131" comment="php5-mysql-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574132" comment="php5-odbc-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574133" comment="php5-openssl-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574134" comment="php5-pcntl-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574135" comment="php5-pdo-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574136" comment="php5-pear-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574137" comment="php5-pgsql-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574138" comment="php5-pspell-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574139" comment="php5-shmop-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574140" comment="php5-snmp-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574141" comment="php5-soap-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574142" comment="php5-suhosin-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574143" comment="php5-sysvmsg-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574144" comment="php5-sysvsem-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574145" comment="php5-sysvshm-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574146" comment="php5-tokenizer-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574147" comment="php5-wddx-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574148" comment="php5-xmlreader-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574149" comment="php5-xmlrpc-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574150" comment="php5-xmlwriter-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574151" comment="php5-xsl-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574152" comment="php5-zip-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574153" comment="php5-zlib-5.2.14-111.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217648" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1140118" ref_url="https://bugzilla.suse.com/1140118" source="BUGZILLA"/>
		<reference ref_id="1145095" ref_url="https://bugzilla.suse.com/1145095" source="BUGZILLA"/>
		<reference ref_id="1146360" ref_url="https://bugzilla.suse.com/1146360" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11038" ref_url="https://www.suse.com/security/cve/CVE-2019-11038/" source="CVE"/>
		<reference ref_id="CVE-2019-11041" ref_url="https://www.suse.com/security/cve/CVE-2019-11041/" source="CVE"/>
		<reference ref_id="CVE-2019-11042" ref_url="https://www.suse.com/security/cve/CVE-2019-11042/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

Security issues fixed:

- CVE-2019-11038: Fixed a information disclosure in gdImageCreateFromXbm() (bsc#1140118).
- CVE-2019-11041: Fixed heap buffer over-read in exif_scan_thumbnail() (bsc#1146360). 
- CVE-2019-11042: Fixed heap buffer over-read in exif_process_user_comment() (bsc#1145095).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-28"/>
	<updated date="2019-08-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140118">SUSE bug 1140118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145095">SUSE bug 1145095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146360">SUSE bug 1146360</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11038/">CVE-2019-11038 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11038">CVE-2019-11038 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11041/">CVE-2019-11041 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11041">CVE-2019-11041 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11042/">CVE-2019-11042 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11042">CVE-2019-11042 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574154" comment="apache2-mod_php5-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574155" comment="php5-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574156" comment="php5-bcmath-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574157" comment="php5-bz2-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574158" comment="php5-calendar-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574159" comment="php5-ctype-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574160" comment="php5-curl-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574161" comment="php5-dba-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574162" comment="php5-dbase-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574163" comment="php5-dom-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574164" comment="php5-exif-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574165" comment="php5-fastcgi-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574166" comment="php5-ftp-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574167" comment="php5-gd-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574168" comment="php5-gettext-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574169" comment="php5-gmp-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574170" comment="php5-hash-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574171" comment="php5-iconv-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574172" comment="php5-json-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574173" comment="php5-ldap-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574174" comment="php5-mbstring-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574175" comment="php5-mcrypt-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574176" comment="php5-mysql-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574177" comment="php5-odbc-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574178" comment="php5-openssl-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574179" comment="php5-pcntl-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574180" comment="php5-pdo-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574181" comment="php5-pear-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574182" comment="php5-pgsql-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574183" comment="php5-pspell-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574184" comment="php5-shmop-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574185" comment="php5-snmp-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574186" comment="php5-soap-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574187" comment="php5-suhosin-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574188" comment="php5-sysvmsg-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574189" comment="php5-sysvsem-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574190" comment="php5-sysvshm-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574191" comment="php5-tokenizer-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574192" comment="php5-wddx-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574193" comment="php5-xmlreader-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574194" comment="php5-xmlrpc-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574195" comment="php5-xmlwriter-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574196" comment="php5-xsl-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574197" comment="php5-zip-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574198" comment="php5-zlib-5.2.14-111.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217649" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1159922" ref_url="https://bugzilla.suse.com/1159922" source="BUGZILLA"/>
		<reference ref_id="1159923" ref_url="https://bugzilla.suse.com/1159923" source="BUGZILLA"/>
		<reference ref_id="1159924" ref_url="https://bugzilla.suse.com/1159924" source="BUGZILLA"/>
		<reference ref_id="1159927" ref_url="https://bugzilla.suse.com/1159927" source="BUGZILLA"/>
		<reference ref_id="1161982" ref_url="https://bugzilla.suse.com/1161982" source="BUGZILLA"/>
		<reference ref_id="1162629" ref_url="https://bugzilla.suse.com/1162629" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11045" ref_url="https://www.suse.com/security/cve/CVE-2019-11045/" source="CVE"/>
		<reference ref_id="CVE-2019-11046" ref_url="https://www.suse.com/security/cve/CVE-2019-11046/" source="CVE"/>
		<reference ref_id="CVE-2019-11047" ref_url="https://www.suse.com/security/cve/CVE-2019-11047/" source="CVE"/>
		<reference ref_id="CVE-2019-11050" ref_url="https://www.suse.com/security/cve/CVE-2019-11050/" source="CVE"/>
		<reference ref_id="CVE-2019-20433" ref_url="https://www.suse.com/security/cve/CVE-2019-20433/" source="CVE"/>
		<reference ref_id="CVE-2020-7059" ref_url="https://www.suse.com/security/cve/CVE-2020-7059/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

Security issues fixed:

- CVE-2020-7059: Fixed an out-of-bounds read in php_strip_tags_ex (bsc#1162629).
- CVE-2019-11045: Fixed an issue with the PHP DirectoryIterator class that accepts filenames with embedded \0 bytes (bsc#1159923).
- CVE-2019-11046: Fixed an out-of-bounds read in bc_shift_addsub (bsc#1159924).
- CVE-2019-11047: Fixed an information disclosure in exif_read_data (bsc#1159922).
- CVE-2019-11050: Fixed a buffer over-read in the EXIF extension (bsc#1159927).
- CVE-2019-20433: Fixed a buffer over-read when processing strings ending with a single '\0' byte with ucs-2 and ucs-4 encoding (bsc#1161982).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-18"/>
	<updated date="2020-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159922">SUSE bug 1159922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159923">SUSE bug 1159923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159924">SUSE bug 1159924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159927">SUSE bug 1159927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161982">SUSE bug 1161982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162629">SUSE bug 1162629</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11045/">CVE-2019-11045 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11045">CVE-2019-11045 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11046/">CVE-2019-11046 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11046">CVE-2019-11046 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11047/">CVE-2019-11047 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11047">CVE-2019-11047 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11050/">CVE-2019-11050 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11050">CVE-2019-11050 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20433/">CVE-2019-20433 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20433">CVE-2019-20433 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7059/">CVE-2020-7059 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7059">CVE-2020-7059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574199" comment="apache2-mod_php5-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574200" comment="php5-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574201" comment="php5-bcmath-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574202" comment="php5-bz2-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574203" comment="php5-calendar-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574204" comment="php5-ctype-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574205" comment="php5-curl-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574206" comment="php5-dba-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574207" comment="php5-dbase-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574208" comment="php5-dom-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574209" comment="php5-exif-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574210" comment="php5-fastcgi-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574211" comment="php5-ftp-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574212" comment="php5-gd-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574213" comment="php5-gettext-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574214" comment="php5-gmp-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574215" comment="php5-hash-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574216" comment="php5-iconv-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574217" comment="php5-json-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574218" comment="php5-ldap-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574219" comment="php5-mbstring-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574220" comment="php5-mcrypt-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574221" comment="php5-mysql-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574222" comment="php5-odbc-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574223" comment="php5-openssl-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574224" comment="php5-pcntl-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574225" comment="php5-pdo-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574226" comment="php5-pear-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574227" comment="php5-pgsql-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574228" comment="php5-pspell-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574229" comment="php5-shmop-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574230" comment="php5-snmp-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574231" comment="php5-soap-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574232" comment="php5-suhosin-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574233" comment="php5-sysvmsg-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574234" comment="php5-sysvsem-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574235" comment="php5-sysvshm-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574236" comment="php5-tokenizer-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574237" comment="php5-wddx-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574238" comment="php5-xmlreader-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574239" comment="php5-xmlrpc-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574240" comment="php5-xmlwriter-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574241" comment="php5-xsl-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574242" comment="php5-zip-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574243" comment="php5-zlib-5.2.14-111.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217650" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1168326" ref_url="https://bugzilla.suse.com/1168326" source="BUGZILLA"/>
		<reference ref_id="1168352" ref_url="https://bugzilla.suse.com/1168352" source="BUGZILLA"/>
		<reference ref_id="1171999" ref_url="https://bugzilla.suse.com/1171999" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11048" ref_url="https://www.suse.com/security/cve/CVE-2019-11048/" source="CVE"/>
		<reference ref_id="CVE-2020-7064" ref_url="https://www.suse.com/security/cve/CVE-2020-7064/" source="CVE"/>
		<reference ref_id="CVE-2020-7066" ref_url="https://www.suse.com/security/cve/CVE-2020-7066/" source="CVE"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2020-7064: Fixed a one byte read of uninitialized memory in exif_read_data() (bsc#1168326).
- CVE-2020-7066: Fixed URL truncation get_headers() if the URL contains zero (\0) character (bsc#1168352).
- CVE-2019-11048: Improved the handling of overly long filenames or field names in HTTP file uploads (bsc#1171999).

		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-05"/>
	<updated date="2020-06-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1168326">SUSE bug 1168326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168352">SUSE bug 1168352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171999">SUSE bug 1171999</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11048/">CVE-2019-11048 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11048">CVE-2019-11048 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7064/">CVE-2020-7064 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7064">CVE-2020-7064 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7066/">CVE-2020-7066 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7066">CVE-2020-7066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574244" comment="apache2-mod_php5-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574245" comment="php5-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574246" comment="php5-bcmath-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574247" comment="php5-bz2-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574248" comment="php5-calendar-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574249" comment="php5-ctype-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574250" comment="php5-curl-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574251" comment="php5-dba-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574252" comment="php5-dbase-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574253" comment="php5-dom-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574254" comment="php5-exif-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574255" comment="php5-fastcgi-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574256" comment="php5-ftp-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574257" comment="php5-gd-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574258" comment="php5-gettext-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574259" comment="php5-gmp-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574260" comment="php5-hash-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574261" comment="php5-iconv-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574262" comment="php5-json-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574263" comment="php5-ldap-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574264" comment="php5-mbstring-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574265" comment="php5-mcrypt-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574266" comment="php5-mysql-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574267" comment="php5-odbc-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574268" comment="php5-openssl-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574269" comment="php5-pcntl-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574270" comment="php5-pdo-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574271" comment="php5-pear-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574272" comment="php5-pgsql-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574273" comment="php5-pspell-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574274" comment="php5-shmop-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574275" comment="php5-snmp-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574276" comment="php5-soap-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574277" comment="php5-suhosin-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574278" comment="php5-sysvmsg-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574279" comment="php5-sysvsem-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574280" comment="php5-sysvshm-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574281" comment="php5-tokenizer-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574282" comment="php5-wddx-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574283" comment="php5-xmlreader-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574284" comment="php5-xmlrpc-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574285" comment="php5-xmlwriter-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574286" comment="php5-xsl-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574287" comment="php5-zip-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574288" comment="php5-zlib-5.2.14-111.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217651" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1177352" ref_url="https://bugzilla.suse.com/1177352" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7070" ref_url="https://www.suse.com/security/cve/CVE-2020-7070/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

- CVE-2020-7070: Fixed an issue where percent-encoded cookies could have been used to overwrite existing prefixed cookie names (bsc#1177352).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177352">SUSE bug 1177352</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-7070/">CVE-2020-7070 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7070">CVE-2020-7070 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574289" comment="apache2-mod_php5-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574290" comment="php5-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574291" comment="php5-bcmath-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574292" comment="php5-bz2-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574293" comment="php5-calendar-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574294" comment="php5-ctype-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574295" comment="php5-curl-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574296" comment="php5-dba-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574297" comment="php5-dbase-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574298" comment="php5-dom-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574299" comment="php5-exif-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574300" comment="php5-fastcgi-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574301" comment="php5-ftp-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574302" comment="php5-gd-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574303" comment="php5-gettext-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574304" comment="php5-gmp-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574305" comment="php5-hash-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574306" comment="php5-iconv-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574307" comment="php5-json-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574308" comment="php5-ldap-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574309" comment="php5-mbstring-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574310" comment="php5-mcrypt-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574311" comment="php5-mysql-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574312" comment="php5-odbc-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574313" comment="php5-openssl-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574314" comment="php5-pcntl-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574315" comment="php5-pdo-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574316" comment="php5-pear-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574317" comment="php5-pgsql-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574318" comment="php5-pspell-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574319" comment="php5-shmop-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574320" comment="php5-snmp-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574321" comment="php5-soap-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574322" comment="php5-suhosin-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574323" comment="php5-sysvmsg-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574324" comment="php5-sysvsem-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574325" comment="php5-sysvshm-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574326" comment="php5-tokenizer-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574327" comment="php5-wddx-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574328" comment="php5-xmlreader-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574329" comment="php5-xmlrpc-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574330" comment="php5-xmlwriter-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574331" comment="php5-xsl-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574332" comment="php5-zip-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574333" comment="php5-zlib-5.2.14-111.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217652" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1180706" ref_url="https://bugzilla.suse.com/1180706" source="BUGZILLA"/>
		<reference ref_id="1182049" ref_url="https://bugzilla.suse.com/1182049" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7071" ref_url="https://www.suse.com/security/cve/CVE-2020-7071/" source="CVE"/>
		<reference ref_id="CVE-2021-21702" ref_url="https://www.suse.com/security/cve/CVE-2021-21702/" source="CVE"/>
		<description>
This update for php5 fixes the following issue:

- CVE-2020-7071: Fixed an insufficient filter in parse_url() that accepted URLs with invalid userinfo (bsc#1180706).
- CVE-2021-21702: NULL pointer dereference in SoapClient (bsc#1182049)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180706">SUSE bug 1180706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182049">SUSE bug 1182049</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-7071/">CVE-2020-7071 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7071">CVE-2020-7071 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21702/">CVE-2021-21702 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21702">CVE-2021-21702 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574334" comment="apache2-mod_php5-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574335" comment="php5-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574336" comment="php5-bcmath-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574337" comment="php5-bz2-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574338" comment="php5-calendar-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574339" comment="php5-ctype-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574340" comment="php5-curl-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574341" comment="php5-dba-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574342" comment="php5-dbase-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574343" comment="php5-dom-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574344" comment="php5-exif-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574345" comment="php5-fastcgi-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574346" comment="php5-ftp-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574347" comment="php5-gd-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574348" comment="php5-gettext-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574349" comment="php5-gmp-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574350" comment="php5-hash-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574351" comment="php5-iconv-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574352" comment="php5-json-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574353" comment="php5-ldap-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574354" comment="php5-mbstring-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574355" comment="php5-mcrypt-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574356" comment="php5-mysql-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574357" comment="php5-odbc-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574358" comment="php5-openssl-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574359" comment="php5-pcntl-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574360" comment="php5-pdo-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574361" comment="php5-pear-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574362" comment="php5-pgsql-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574363" comment="php5-pspell-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574364" comment="php5-shmop-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574365" comment="php5-snmp-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574366" comment="php5-soap-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574367" comment="php5-suhosin-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574368" comment="php5-sysvmsg-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574369" comment="php5-sysvsem-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574370" comment="php5-sysvshm-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574371" comment="php5-tokenizer-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574372" comment="php5-wddx-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574373" comment="php5-xmlreader-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574374" comment="php5-xmlrpc-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574375" comment="php5-xmlwriter-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574376" comment="php5-xsl-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574377" comment="php5-zip-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574378" comment="php5-zlib-5.2.14-111.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217653" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1188037" ref_url="https://bugzilla.suse.com/1188037" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21705" ref_url="https://www.suse.com/security/cve/CVE-2021-21705/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

- CVE-2021-21705 [bsc#1188037]: SSRF bypass in FILTER_VALIDATE_URL
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-23"/>
	<updated date="2021-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188037">SUSE bug 1188037</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21705/">CVE-2021-21705 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21705">CVE-2021-21705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627044" comment="apache2-mod_php5-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627045" comment="php5-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627046" comment="php5-bcmath-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627047" comment="php5-bz2-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627048" comment="php5-calendar-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627049" comment="php5-ctype-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627050" comment="php5-curl-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627051" comment="php5-dba-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627052" comment="php5-dbase-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627053" comment="php5-dom-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627054" comment="php5-exif-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627055" comment="php5-fastcgi-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627056" comment="php5-ftp-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627057" comment="php5-gd-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627058" comment="php5-gettext-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627059" comment="php5-gmp-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627060" comment="php5-hash-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627061" comment="php5-iconv-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627062" comment="php5-json-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627063" comment="php5-ldap-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627064" comment="php5-mbstring-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627065" comment="php5-mcrypt-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627066" comment="php5-mysql-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627067" comment="php5-odbc-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627068" comment="php5-openssl-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627069" comment="php5-pcntl-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627070" comment="php5-pdo-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627071" comment="php5-pear-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627072" comment="php5-pgsql-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627073" comment="php5-pspell-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627074" comment="php5-shmop-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627075" comment="php5-snmp-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627076" comment="php5-soap-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627077" comment="php5-suhosin-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627078" comment="php5-sysvmsg-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627079" comment="php5-sysvsem-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627080" comment="php5-sysvshm-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627081" comment="php5-tokenizer-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627082" comment="php5-wddx-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627083" comment="php5-xmlreader-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627084" comment="php5-xmlrpc-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627085" comment="php5-xmlwriter-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627086" comment="php5-xsl-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627087" comment="php5-zip-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627088" comment="php5-zlib-5.2.14-111.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217654" version="1" class="patch">
	<metadata>
		<title>Security update for pixman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1074701" ref_url="https://bugzilla.suse.com/1074701" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2633" ref_url="https://www.suse.com/security/cve/CVE-2017-2633/" source="CVE"/>
		<description>
This update for pixman fixes the following issues:

- This issue is needed to fix security issue in qemu that is tracked by CVE-2017-2633.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-14"/>
	<updated date="2018-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2633/">CVE-2017-2633 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2633">CVE-2017-2633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574379" comment="libpixman-1-0-0.16.0-2.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574380" comment="libpixman-1-0-32bit-0.16.0-2.7.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217655" version="1" class="patch">
	<metadata>
		<title>Security update for policycoreutils (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1000998" ref_url="https://bugzilla.suse.com/1000998" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7545" ref_url="https://www.suse.com/security/cve/CVE-2016-7545/" source="CVE"/>
		<description>

This update for policycoreutils fixes the following issues:

* CVE-2016-7545: nonpriv session can escape to parent [bsc#1000998]

		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-31"/>
	<updated date="2017-01-31"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1000998">SUSE bug 1000998</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7545/">CVE-2016-7545 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7545">CVE-2016-7545 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574381" comment="policycoreutils-2.0.79-4.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217656" version="1" class="patch">
	<metadata>
		<title>Security update for policycoreutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1083624" ref_url="https://bugzilla.suse.com/1083624" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1063" ref_url="https://www.suse.com/security/cve/CVE-2018-1063/" source="CVE"/>
		<description>
This update for policycoreutils fixes the following issues:

- CVE-2018-1063: Prevent chcon from following symlinks in /tmp, /var/tmp,
  /var/run and /var/lib/debug (bsc#1083624).  
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-11"/>
	<updated date="2018-04-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083624">SUSE bug 1083624</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1063/">CVE-2018-1063 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1063">CVE-2018-1063 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574382" comment="policycoreutils-2.0.79-4.9.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217657" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="976844" ref_url="https://bugzilla.suse.com/976844" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8868" ref_url="https://www.suse.com/security/cve/CVE-2015-8868/" source="CVE"/>
		<description>

This update for poppler fixes the following issues: 

Security issues fixed:
- CVE-2015-8868: Corrupted PDF file can corrupt heap, causing DoS (bsc#976844)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-10"/>
	<updated date="2016-06-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/976844">SUSE bug 976844</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8868/">CVE-2015-8868 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8868">CVE-2015-8868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574383" comment="libpoppler-glib4-0.12.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574384" comment="libpoppler-qt4-3-0.12.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574385" comment="libpoppler5-0.12.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574386" comment="poppler-tools-0.12.3-1.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217658" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1061265" ref_url="https://bugzilla.suse.com/1061265" source="BUGZILLA"/>
		<reference ref_id="1064593" ref_url="https://bugzilla.suse.com/1064593" source="BUGZILLA"/>
		<reference ref_id="1074453" ref_url="https://bugzilla.suse.com/1074453" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000456" ref_url="https://www.suse.com/security/cve/CVE-2017-1000456/" source="CVE"/>
		<reference ref_id="CVE-2017-14977" ref_url="https://www.suse.com/security/cve/CVE-2017-14977/" source="CVE"/>
		<reference ref_id="CVE-2017-15565" ref_url="https://www.suse.com/security/cve/CVE-2017-15565/" source="CVE"/>
		<description>
This update for poppler fixes the following issues:

- CVE-2017-14977: Fixed a NULL pointer dereference vulnerability in the
  FoFiTrueType::getCFFBlock() function in FoFiTrueType.cc that occurred due to
  lack of validation of a table pointer, which allows an attacker to launch a
  denial of service attack. (bsc#1061265)
- CVE-2017-1000456: Validate boundaries in TextPool::addWord to prevent
  overflows in subsequent calculations (bsc#1074453)
- CVE-2017-15565: Prevent NULL Pointer dereference in the
  GfxImageColorMap::getGrayLine() function via a crafted PDF document
  (bsc#1064593)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-14"/>
	<updated date="2018-06-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1061265">SUSE bug 1061265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064593">SUSE bug 1064593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074453">SUSE bug 1074453</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000456/">CVE-2017-1000456 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000456">CVE-2017-1000456 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14977/">CVE-2017-14977 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14977">CVE-2017-14977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15565/">CVE-2017-15565 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15565">CVE-2017-15565 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574387" comment="libpoppler-glib4-0.12.3-1.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574388" comment="libpoppler-qt4-3-0.12.3-1.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574389" comment="libpoppler5-0.12.3-1.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574390" comment="poppler-tools-0.12.3-1.13.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217659" version="1" class="patch">
	<metadata>
		<title>Security update for RPM</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="610941" ref_url="https://bugzilla.suse.com/610941" source="BUGZILLA"/>
		<reference ref_id="615409" ref_url="https://bugzilla.suse.com/615409" source="BUGZILLA"/>
		<reference ref_id="656132" ref_url="https://bugzilla.suse.com/656132" source="BUGZILLA"/>
		<reference ref_id="720824" ref_url="https://bugzilla.suse.com/720824" source="BUGZILLA"/>
		<reference ref_id="747225" ref_url="https://bugzilla.suse.com/747225" source="BUGZILLA"/>
		<reference ref_id="754281" ref_url="https://bugzilla.suse.com/754281" source="BUGZILLA"/>
		<reference ref_id="754284" ref_url="https://bugzilla.suse.com/754284" source="BUGZILLA"/>
		<reference ref_id="754285" ref_url="https://bugzilla.suse.com/754285" source="BUGZILLA"/>
		<reference ref_id="892431" ref_url="https://bugzilla.suse.com/892431" source="BUGZILLA"/>
		<reference ref_id="906803" ref_url="https://bugzilla.suse.com/906803" source="BUGZILLA"/>
		<reference ref_id="908128" ref_url="https://bugzilla.suse.com/908128" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2059" ref_url="https://www.suse.com/security/cve/CVE-2010-2059/" source="CVE"/>
		<reference ref_id="CVE-2011-3378" ref_url="https://www.suse.com/security/cve/CVE-2011-3378/" source="CVE"/>
		<reference ref_id="CVE-2012-0060" ref_url="https://www.suse.com/security/cve/CVE-2012-0060/" source="CVE"/>
		<reference ref_id="CVE-2012-0061" ref_url="https://www.suse.com/security/cve/CVE-2012-0061/" source="CVE"/>
		<reference ref_id="CVE-2012-0815" ref_url="https://www.suse.com/security/cve/CVE-2012-0815/" source="CVE"/>
		<reference ref_id="CVE-2013-6435" ref_url="https://www.suse.com/security/cve/CVE-2013-6435/" source="CVE"/>
		<reference ref_id="CVE-2014-8118" ref_url="https://www.suse.com/security/cve/CVE-2014-8118/" source="CVE"/>
		<description>

Multiple security vulnerabilities were reported in RPM which could be 
exploited via specially crafted RPM files to cause a denial of service 
(application crash) or potentially allow attackers to execute arbitrary 
code.

Additionally, a non-security issue was fixed that could cause a division by 
zero in cycles calculation under rare circumstances.

Security Issue references:

    * CVE-2012-0815
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0815&gt;
    * CVE-2012-0060
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0060&gt;
    * CVE-2012-0061
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0061&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-04-20"/>
	<updated date="2012-04-20"/>
	<bugzilla href="https://bugzilla.suse.com/610941">SUSE bug 610941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/615409">SUSE bug 615409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/656132">SUSE bug 656132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/720824">SUSE bug 720824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747225">SUSE bug 747225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754281">SUSE bug 754281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754284">SUSE bug 754284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754285">SUSE bug 754285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892431">SUSE bug 892431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906803">SUSE bug 906803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908128">SUSE bug 908128</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2059/">CVE-2010-2059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2059">CVE-2010-2059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3378/">CVE-2011-3378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3378">CVE-2011-3378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0060/">CVE-2012-0060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0060">CVE-2012-0060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0061/">CVE-2012-0061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0061">CVE-2012-0061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0815/">CVE-2012-0815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0815">CVE-2012-0815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6435/">CVE-2013-6435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6435">CVE-2013-6435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8118/">CVE-2014-8118 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8118">CVE-2014-8118 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992306" comment="popt-1.7-37.29.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992307" comment="popt-32bit-1.7-37.29.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992308" comment="rpm-4.4.2.3-37.29.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992309" comment="rpm-32bit-4.4.2.3-37.29.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574396" comment="rpm-python-4.4.2.3-37.29.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217660" version="1" class="patch">
	<metadata>
		<title>Recommended update for Postfix</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="622873" ref_url="https://bugzilla.suse.com/622873" source="BUGZILLA"/>
		<reference ref_id="677792" ref_url="https://bugzilla.suse.com/677792" source="BUGZILLA"/>
		<reference ref_id="689021" ref_url="https://bugzilla.suse.com/689021" source="BUGZILLA"/>
		<reference ref_id="690213" ref_url="https://bugzilla.suse.com/690213" source="BUGZILLA"/>
		<reference ref_id="728308" ref_url="https://bugzilla.suse.com/728308" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-0411" ref_url="https://www.suse.com/security/cve/CVE-2011-0411/" source="CVE"/>
		<reference ref_id="CVE-2011-1720" ref_url="https://www.suse.com/security/cve/CVE-2011-1720/" source="CVE"/>
		<description>

This update adds a hook to the sysv5 init script to recreate postmaps upon 
server start, restart or reload if configured to do so via 
/etc/sysconfig/postfix.

This fixes a regression from the previous update where the invocation of 
SuSEconfig postfix module was removed from the post installation script.

		</description>
<advisory from="security@suse.de">
	<issued date="2011-12-13"/>
	<updated date="2011-12-13"/>
	<bugzilla href="https://bugzilla.suse.com/622873">SUSE bug 622873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/677792">SUSE bug 677792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/689021">SUSE bug 689021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/690213">SUSE bug 690213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/728308">SUSE bug 728308</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0411/">CVE-2011-0411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0411">CVE-2011-0411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1720/">CVE-2011-1720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1720">CVE-2011-1720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992310" comment="postfix-2.5.6-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992311" comment="postfix-doc-2.5.6-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992312" comment="postfix-mysql-2.5.6-5.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217661" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="949669" ref_url="https://bugzilla.suse.com/949669" source="BUGZILLA"/>
		<reference ref_id="949670" ref_url="https://bugzilla.suse.com/949670" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<description>

This update of postgresql94 to 9.4.5 fixes the following issues:

* CVE-2015-5289: json or jsonb input values constructed from arbitrary user input could have crashed the PostgreSQL server and caused a denial of service (bsc#949670)
* CVE-2015-5288: crypt() (pgCrypto extension) couldi potentially be exploited to read a few additional bytes of memory (bsc#949669)

Also contains all changes and bugfixes in the upstream 9.4.5 release:
  http://www.postgresql.org/docs/current/static/release-9-4-5.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5288">CVE-2015-5288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5289">CVE-2015-5289 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574398" comment="libecpg6-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574399" comment="libpq5-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567046" comment="libpq5-32bit-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574400" comment="postgresql94-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574401" comment="postgresql94-contrib-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574402" comment="postgresql94-docs-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574403" comment="postgresql94-server-9.4.5-0.8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217662" version="1" class="patch">
	<metadata>
		<title>Security update for PostgreSQL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="588996" ref_url="https://bugzilla.suse.com/588996" source="BUGZILLA"/>
		<reference ref_id="605845" ref_url="https://bugzilla.suse.com/605845" source="BUGZILLA"/>
		<reference ref_id="605926" ref_url="https://bugzilla.suse.com/605926" source="BUGZILLA"/>
		<reference ref_id="607778" ref_url="https://bugzilla.suse.com/607778" source="BUGZILLA"/>
		<reference ref_id="660478" ref_url="https://bugzilla.suse.com/660478" source="BUGZILLA"/>
		<reference ref_id="701489" ref_url="https://bugzilla.suse.com/701489" source="BUGZILLA"/>
		<reference ref_id="749299" ref_url="https://bugzilla.suse.com/749299" source="BUGZILLA"/>
		<reference ref_id="749303" ref_url="https://bugzilla.suse.com/749303" source="BUGZILLA"/>
		<reference ref_id="760511" ref_url="https://bugzilla.suse.com/760511" source="BUGZILLA"/>
		<reference ref_id="765069" ref_url="https://bugzilla.suse.com/765069" source="BUGZILLA"/>
		<reference ref_id="766799" ref_url="https://bugzilla.suse.com/766799" source="BUGZILLA"/>
		<reference ref_id="767505" ref_url="https://bugzilla.suse.com/767505" source="BUGZILLA"/>
		<reference ref_id="770193" ref_url="https://bugzilla.suse.com/770193" source="BUGZILLA"/>
		<reference ref_id="773771" ref_url="https://bugzilla.suse.com/773771" source="BUGZILLA"/>
		<reference ref_id="774616" ref_url="https://bugzilla.suse.com/774616" source="BUGZILLA"/>
		<reference ref_id="774617" ref_url="https://bugzilla.suse.com/774617" source="BUGZILLA"/>
		<reference ref_id="775399" ref_url="https://bugzilla.suse.com/775399" source="BUGZILLA"/>
		<reference ref_id="775402" ref_url="https://bugzilla.suse.com/775402" source="BUGZILLA"/>
		<reference ref_id="776523" ref_url="https://bugzilla.suse.com/776523" source="BUGZILLA"/>
		<reference ref_id="776524" ref_url="https://bugzilla.suse.com/776524" source="BUGZILLA"/>
		<reference ref_id="802679" ref_url="https://bugzilla.suse.com/802679" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0733" ref_url="https://www.suse.com/security/cve/CVE-2010-0733/" source="CVE"/>
		<reference ref_id="CVE-2010-1169" ref_url="https://www.suse.com/security/cve/CVE-2010-1169/" source="CVE"/>
		<reference ref_id="CVE-2010-1170" ref_url="https://www.suse.com/security/cve/CVE-2010-1170/" source="CVE"/>
		<reference ref_id="CVE-2010-1975" ref_url="https://www.suse.com/security/cve/CVE-2010-1975/" source="CVE"/>
		<reference ref_id="CVE-2010-4014" ref_url="https://www.suse.com/security/cve/CVE-2010-4014/" source="CVE"/>
		<reference ref_id="CVE-2010-4015" ref_url="https://www.suse.com/security/cve/CVE-2010-4015/" source="CVE"/>
		<reference ref_id="CVE-2012-0866" ref_url="https://www.suse.com/security/cve/CVE-2012-0866/" source="CVE"/>
		<reference ref_id="CVE-2012-0868" ref_url="https://www.suse.com/security/cve/CVE-2012-0868/" source="CVE"/>
		<reference ref_id="CVE-2012-2143" ref_url="https://www.suse.com/security/cve/CVE-2012-2143/" source="CVE"/>
		<reference ref_id="CVE-2012-2655" ref_url="https://www.suse.com/security/cve/CVE-2012-2655/" source="CVE"/>
		<reference ref_id="CVE-2012-3488" ref_url="https://www.suse.com/security/cve/CVE-2012-3488/" source="CVE"/>
		<reference ref_id="CVE-2012-3489" ref_url="https://www.suse.com/security/cve/CVE-2012-3489/" source="CVE"/>
		<reference ref_id="CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255/" source="CVE"/>
		<description>

PostgreSQL has been updated to version 8.3.23 which fixes various bugs and 
one security issue.

The security issue fixed in this release, CVE-2013-0255, allowed a 
previously authenticated user to crash the server by calling an internal 
function with invalid arguments. This issue was discovered by independent 
security researcher Sumit Soni this week and reported via Secunia SVCRP, 
and we are grateful for their efforts in making PostgreSQL more secure.

More information can be found at

http://www.postgresql.org/about/news/1446/
&lt;http://www.postgresql.org/about/news/1446/&gt;

Security Issue reference:

    * CVE-2013-0255
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0255&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-02-13"/>
	<updated date="2013-02-13"/>
	<bugzilla href="https://bugzilla.suse.com/588996">SUSE bug 588996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/605845">SUSE bug 605845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/605926">SUSE bug 605926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/607778">SUSE bug 607778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/660478">SUSE bug 660478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/701489">SUSE bug 701489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749299">SUSE bug 749299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749303">SUSE bug 749303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760511">SUSE bug 760511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/765069">SUSE bug 765069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/766799">SUSE bug 766799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767505">SUSE bug 767505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770193">SUSE bug 770193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773771">SUSE bug 773771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774616">SUSE bug 774616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774617">SUSE bug 774617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775399">SUSE bug 775399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775402">SUSE bug 775402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776523">SUSE bug 776523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776524">SUSE bug 776524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802679">SUSE bug 802679</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0733/">CVE-2010-0733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0733">CVE-2010-0733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1169/">CVE-2010-1169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1169">CVE-2010-1169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1170/">CVE-2010-1170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1170">CVE-2010-1170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1975/">CVE-2010-1975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1975">CVE-2010-1975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4014/">CVE-2010-4014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4014">CVE-2010-4014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4015/">CVE-2010-4015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4015">CVE-2010-4015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0866/">CVE-2012-0866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0866">CVE-2012-0866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0868/">CVE-2012-0868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0868">CVE-2012-0868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2143/">CVE-2012-2143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2143">CVE-2012-2143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2655/">CVE-2012-2655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2655">CVE-2012-2655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3488/">CVE-2012-3488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3488">CVE-2012-3488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3489/">CVE-2012-3489 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2012-3489">CVE-2012-3489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0255">CVE-2013-0255 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992313" comment="postgresql-8.3.23-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992314" comment="postgresql-contrib-8.3.23-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992315" comment="postgresql-docs-8.3.23-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574407" comment="postgresql-init-9.1-0.6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992316" comment="postgresql-libs-8.3.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992317" comment="postgresql-libs-32bit-8.3.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992318" comment="postgresql-server-8.3.23-0.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217663" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql-init (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1062722" ref_url="https://bugzilla.suse.com/1062722" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14798" ref_url="https://www.suse.com/security/cve/CVE-2017-14798/" source="CVE"/>
		<description>
This update for postgresql-init fixes the following issues:

- CVE-2017-14798: A race condition in the init script could be used by attackers able to access the postgresql account to escalate their privileges to root (bsc#1062722)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-27"/>
	<updated date="2017-11-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062722">SUSE bug 1062722</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14798/">CVE-2017-14798 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14798">CVE-2017-14798 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574412" comment="postgresql-init-9.4-0.5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217664" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1108308" ref_url="https://bugzilla.suse.com/1108308" source="BUGZILLA"/>
		<description>

This update for postgresql10 brings version 10.6 to SUSE Linux Enterprise 11.


This release marks the change of the versioning scheme for PostgreSQL
to a 'x.y' format. This means the next minor releases of PostgreSQL
will be 10.1, 10.2, ... and the next major release will be 11.

* Logical Replication

Logical replication extends the current replication features of
PostgreSQL with the ability to send modifications on a per-database
and per-table level to different PostgreSQL databases. Users can now
fine-tune the data replicated to various database clusters and will
have the ability to perform zero-downtime upgrades to future major
PostgreSQL versions.

* Declarative Table Partitioning

Table partitioning has existed for years in PostgreSQL but required a
user to maintain a nontrivial set of rules and triggers for the
partitioning to work. PostgreSQL 10 introduces a table partitioning
syntax that lets users easily create and maintain range and list
partitioned tables.

* Improved Query Parallelism

PostgreSQL 10 provides better support for parallelized queries by
allowing more parts of the query execution process to be
parallelized. Improvements include additional types of data scans that
are parallelized as well as optimizations when the data is recombined,
such as pre-sorting. These enhancements allow results to be returned
more quickly.

* Quorum Commit for Synchronous Replication

PostgreSQL 10 introduces quorum commit for synchronous replication,
which allows for flexibility in how a primary database receives
acknowledgement that changes were successfully written to remote
replicas.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-10"/>
	<updated date="2019-01-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1108308">SUSE bug 1108308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574413" comment="libecpg6-10.6-0.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574414" comment="libpq5-10.6-0.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574415" comment="libpq5-32bit-10.6-0.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574416" comment="postgresql-init-10-0.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574417" comment="postgresql10-10.6-0.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574418" comment="postgresql10-contrib-10.6-0.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574419" comment="postgresql10-docs-10.6-0.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574420" comment="postgresql10-server-10.6-0.2.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217665" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1134689" ref_url="https://bugzilla.suse.com/1134689" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10130" ref_url="https://www.suse.com/security/cve/CVE-2019-10130/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

Security issue fixed:

- CVE-2019-10130: Prevent row-level security policies from being bypassed via selectivity estimators (bsc#1134689).

Bug fixes:

- For a complete list of fixes check the release notes.
  * https://www.postgresql.org/docs/10/release-10-8.html
  * https://www.postgresql.org/docs/10/release-10-7.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-18"/>
	<updated date="2019-06-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1134689">SUSE bug 1134689</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10130/">CVE-2019-10130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10130">CVE-2019-10130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574421" comment="libecpg6-10.8-0.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574422" comment="libpq5-10.8-0.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574423" comment="libpq5-32bit-10.8-0.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574424" comment="postgresql10-10.8-0.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574425" comment="postgresql10-contrib-10.8-0.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574426" comment="postgresql10-docs-10.8-0.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574427" comment="postgresql10-server-10.8-0.2.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217666" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1138034" ref_url="https://bugzilla.suse.com/1138034" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10164" ref_url="https://www.suse.com/security/cve/CVE-2019-10164/" source="CVE"/>
		<description>
This update for postgresql10 to version 10.9 fixes the following issues:

Security issue fixed:	  

- CVE-2019-10164: Fixed buffer-overflow vulnerabilities in SCRAM verifier parsing (bsc#1138034).

More information at https://www.postgresql.org/docs/10/release-10-9.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138034">SUSE bug 1138034</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10164/">CVE-2019-10164 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10164">CVE-2019-10164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574428" comment="libecpg6-10.9-0.2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574429" comment="libpq5-10.9-0.2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574430" comment="libpq5-32bit-10.9-0.2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574431" comment="postgresql10-10.9-0.2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574432" comment="postgresql10-contrib-10.9-0.2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574433" comment="postgresql10-docs-10.9-0.2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574434" comment="postgresql10-server-10.9-0.2.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217667" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1145092" ref_url="https://bugzilla.suse.com/1145092" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

Security issue fixed:

- CVE-2019-10208: Fixed arbitrary SQL execution via suitable SECURITY DEFINER function under the identity of the function owner (bsc#1145092).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-17"/>
	<updated date="2019-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145092">SUSE bug 1145092</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-10208">CVE-2019-10208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574435" comment="libecpg6-10.10-0.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574436" comment="libpq5-10.10-0.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574437" comment="libpq5-32bit-10.10-0.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574438" comment="postgresql10-10.10-0.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574439" comment="postgresql10-contrib-10.10-0.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574440" comment="postgresql10-devel-10.10-0.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574441" comment="postgresql10-docs-10.10-0.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574442" comment="postgresql10-server-10.10-0.2.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217668" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1163985" ref_url="https://bugzilla.suse.com/1163985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

PostgreSQL was updated to version 10.12.

Security issue fixed:

- CVE-2020-1720: Fixed a missing authorization check in the ALTER ... DEPENDS ON extension (bsc#1163985).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-05"/>
	<updated date="2020-03-05"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1163985">SUSE bug 1163985</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1720">CVE-2020-1720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574443" comment="libecpg6-10.12-0.2.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574444" comment="libpq5-10.12-0.2.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574445" comment="libpq5-32bit-10.12-0.2.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574446" comment="postgresql10-10.12-0.2.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574447" comment="postgresql10-contrib-10.12-0.2.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574448" comment="postgresql10-devel-10.12-0.2.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574449" comment="postgresql10-docs-10.12-0.2.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574450" comment="postgresql10-server-10.12-0.2.18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217669" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1171924" ref_url="https://bugzilla.suse.com/1171924" source="BUGZILLA"/>
		<reference ref_id="1175193" ref_url="https://bugzilla.suse.com/1175193" source="BUGZILLA"/>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

- update to 10.14:
  * CVE-2020-14349, bsc#1175193: Set a secure search_path in
    logical replication walsenders and apply workers
  * CVE-2020-14350, bsc#1175194: Make contrib modules' installation
    scripts more secure.
  * https://www.postgresql.org/docs/10/release-10-14.html
- update to 10.13 (bsc#1171924).
  https://www.postgresql.org/about/news/2038/
  https://www.postgresql.org/docs/10/release-10-13.html
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-18"/>
	<updated date="2020-08-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171924">SUSE bug 1171924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14349">CVE-2020-14349 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14350">CVE-2020-14350 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574451" comment="libecpg6-10.14-0.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574452" comment="libpq5-10.14-0.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574453" comment="libpq5-32bit-10.14-0.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574454" comment="postgresql10-10.14-0.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574455" comment="postgresql10-contrib-10.14-0.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574456" comment="postgresql10-devel-10.14-0.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574457" comment="postgresql10-docs-10.14-0.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574458" comment="postgresql10-server-10.14-0.2.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217670" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

- Upgrade to version 10.15:
  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/10/release-10-15.html

- Upgrade to version 10.15:
  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/10/release-10-15.html
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574459" comment="libecpg6-10.15-0.2.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574460" comment="libpq5-10.15-0.2.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574461" comment="libpq5-32bit-10.15-0.2.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574462" comment="postgresql10-10.15-0.2.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574463" comment="postgresql10-contrib-10.15-0.2.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574464" comment="postgresql10-devel-10.15-0.2.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574465" comment="postgresql10-docs-10.15-0.2.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574466" comment="postgresql10-server-10.15-0.2.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217671" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1185924" ref_url="https://bugzilla.suse.com/1185924" source="BUGZILLA"/>
		<reference ref_id="1185925" ref_url="https://bugzilla.suse.com/1185925" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

- Upgrade to version 10.17:
- CVE-2021-32027: Fixed integer overflows in array subscripting calculations (bsc#1185924).
- CVE-2021-32028: Fixed mishandling of junk columns in INSERT ... ON CONFLICT ... UPDATE target lists (bsc#1185925).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-27"/>
	<updated date="2021-05-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185924">SUSE bug 1185924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185925">SUSE bug 1185925</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32028">CVE-2021-32028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574467" comment="libecpg6-10.17-0.2.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574468" comment="libpq5-10.17-0.2.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574469" comment="libpq5-32bit-10.17-0.2.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574470" comment="postgresql10-10.17-0.2.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574471" comment="postgresql10-contrib-10.17-0.2.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574472" comment="postgresql10-devel-10.17-0.2.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574473" comment="postgresql10-docs-10.17-0.2.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574474" comment="postgresql10-server-10.17-0.2.30.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217672" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:
          
- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656585" comment="libecpg6-10.19-0.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656586" comment="libpq5-10.19-0.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656587" comment="libpq5-32bit-10.19-0.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656588" comment="postgresql10-10.19-0.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656589" comment="postgresql10-contrib-10.19-0.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656590" comment="postgresql10-devel-10.19-0.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656591" comment="postgresql10-docs-10.19-0.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656592" comment="postgresql10-server-10.19-0.2.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217673" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql91</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="916953" ref_url="https://bugzilla.suse.com/916953" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8161" ref_url="https://www.suse.com/security/cve/CVE-2014-8161/" source="CVE"/>
		<reference ref_id="CVE-2015-0241" ref_url="https://www.suse.com/security/cve/CVE-2015-0241/" source="CVE"/>
		<reference ref_id="CVE-2015-0243" ref_url="https://www.suse.com/security/cve/CVE-2015-0243/" source="CVE"/>
		<reference ref_id="CVE-2015-0244" ref_url="https://www.suse.com/security/cve/CVE-2015-0244/" source="CVE"/>
		<description>

The PostgreSQL database server was updated to 9.1.15, fixing bugs and 
security issues:

    * Fix buffer overruns in to_char() (CVE-2015-0241).
    * Fix buffer overrun in replacement *printf() functions
      (CVE-2015-0242).
    * Fix buffer overruns in contrib/pgcrypto (CVE-2015-0243).
    * Fix possible loss of frontend/backend protocol synchronization after
      an error (CVE-2015-0244).
    * Fix information leak via constraint-violation error messages
      (CVE-2014-8161).

For a comprehensive list of fixes, please refer to the following release 
notes:

    * http://www.postgresql.org/docs/9.1/static/release-9-1-15.html
      &lt;http://www.postgresql.org/docs/9.1/static/release-9-1-15.html&gt;
    * http://www.postgresql.org/docs/9.1/static/release-9-1-14.html
      &lt;http://www.postgresql.org/docs/9.1/static/release-9-1-14.html&gt;
    * http://www.postgresql.org/docs/9.1/static/release-9-1-13.html
      &lt;http://www.postgresql.org/docs/9.1/static/release-9-1-13.html&gt;

Security Issues:

    * CVE-2015-0241
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241&gt;
    * CVE-2015-0243
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243&gt;
    * CVE-2015-0244
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244&gt;
    * CVE-2014-8161
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-02"/>
	<updated date="2015-03-02"/>
	<bugzilla href="https://bugzilla.suse.com/916953">SUSE bug 916953</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8161/">CVE-2014-8161 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8161">CVE-2014-8161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0241/">CVE-2015-0241 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0241">CVE-2015-0241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0243/">CVE-2015-0243 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0243">CVE-2015-0243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0244/">CVE-2015-0244 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0244">CVE-2015-0244 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574475" comment="libecpg6-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574476" comment="libpq5-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567051" comment="libpq5-32bit-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574477" comment="postgresql91-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574478" comment="postgresql91-contrib-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574479" comment="postgresql91-docs-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574480" comment="postgresql91-server-9.1.15-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217674" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql91</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="907651" ref_url="https://bugzilla.suse.com/907651" source="BUGZILLA"/>
		<reference ref_id="931972" ref_url="https://bugzilla.suse.com/931972" source="BUGZILLA"/>
		<reference ref_id="931973" ref_url="https://bugzilla.suse.com/931973" source="BUGZILLA"/>
		<reference ref_id="931974" ref_url="https://bugzilla.suse.com/931974" source="BUGZILLA"/>
		<reference ref_id="932040" ref_url="https://bugzilla.suse.com/932040" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3165" ref_url="https://www.suse.com/security/cve/CVE-2015-3165/" source="CVE"/>
		<reference ref_id="CVE-2015-3166" ref_url="https://www.suse.com/security/cve/CVE-2015-3166/" source="CVE"/>
		<reference ref_id="CVE-2015-3167" ref_url="https://www.suse.com/security/cve/CVE-2015-3167/" source="CVE"/>
		<description>

This update provides PostgreSQL 9.1.18, which brings fixes for security 
issues and other enhancements.

The following vulnerabilities have been fixed:

    * CVE-2015-3165: Avoid possible crash when client disconnects.
      (bsc#931972)
    * CVE-2015-3166: Consistently check for failure of the *printf().
      (bsc#931973)
    * CVE-2015-3167: In contrib/pgcrypto, uniformly report decryption
      failures. (bsc#931974)

For a comprehensive list of changes, please refer to 
http://www.postgresql.org/docs/9.1/static/release-9-1-18.html
&lt;http://www.postgresql.org/docs/9.1/static/release-9-1-18.html&gt; .

This update also includes changes in PostgreSQL's packaging to prepare for 
the migration to the new major version 9.4. (FATE#316970, bsc#907651)

Security Issues:

    * CVE-2015-3165
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3165&gt;
    * CVE-2015-3166
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3166&gt;
    * CVE-2015-3167
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3167&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-11"/>
	<updated date="2015-06-11"/>
	<bugzilla href="https://bugzilla.suse.com/907651">SUSE bug 907651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931972">SUSE bug 931972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931973">SUSE bug 931973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931974">SUSE bug 931974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932040">SUSE bug 932040</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3165/">CVE-2015-3165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3165">CVE-2015-3165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3166/">CVE-2015-3166 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3166">CVE-2015-3166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3167/">CVE-2015-3167 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3167">CVE-2015-3167 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574481" comment="postgresql91-9.1.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574482" comment="postgresql91-contrib-9.1.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574483" comment="postgresql91-docs-9.1.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574484" comment="postgresql91-server-9.1.18-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217675" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql91 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="949669" ref_url="https://bugzilla.suse.com/949669" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<description>

This update of postgresql91 to 9.1.19 fixes the following issues:

* CVE-2015-5288: crypt() (pgCrypto extension) couldi potentially be exploited to read a few additional bytes of memory (bsc#949669)

Also contains all changes and bugfixes in the upstream 9.1.19 release:
http://www.postgresql.org/docs/9.1/static/release-9-1-19.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-09"/>
	<updated date="2016-02-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5288">CVE-2015-5288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574485" comment="postgresql91-9.1.19-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574486" comment="postgresql91-contrib-9.1.19-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574487" comment="postgresql91-docs-9.1.19-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574488" comment="postgresql91-server-9.1.19-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217676" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="949669" ref_url="https://bugzilla.suse.com/949669" source="BUGZILLA"/>
		<reference ref_id="949670" ref_url="https://bugzilla.suse.com/949670" source="BUGZILLA"/>
		<reference ref_id="966435" ref_url="https://bugzilla.suse.com/966435" source="BUGZILLA"/>
		<reference ref_id="966436" ref_url="https://bugzilla.suse.com/966436" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-0766" ref_url="https://www.suse.com/security/cve/CVE-2016-0766/" source="CVE"/>
		<reference ref_id="CVE-2016-0773" ref_url="https://www.suse.com/security/cve/CVE-2016-0773/" source="CVE"/>
		<description>

This update for postgresql94 fixes the following issues: 

- Security and bugfix release 9.4.6:
  * *** IMPORTANT ***
    Users of version 9.4 will need to reindex any jsonb_path_ops
    indexes they have created, in order to fix a persistent issue
    with missing index entries.
  * Fix infinite loops and buffer-overrun problems in regular
    expressions (CVE-2016-0773, bsc#966436).
  * Fix regular-expression compiler to handle loops of constraint
    arcs (CVE-2007-4772).
  * Prevent certain PL/Java parameters from being set by
    non-superusers (CVE-2016-0766, bsc#966435).
  * Fix many issues in pg_dump with specific object types
  * Prevent over-eager pushdown of HAVING clauses for
    GROUPING SETS
  * Fix deparsing error with ON CONFLICT ... WHERE clauses
  * Fix tableoid errors for postgres_fdw
  * Prevent floating-point exceptions in pgbench
  * Make \det search Foreign Table names consistently
  * Fix quoting of domain constraint names in pg_dump
  * Prevent putting expanded objects into Const nodes
  * Allow compile of PL/Java on Windows
  * Fix 'unresolved symbol' errors in PL/Python execution
  * Allow Python2 and Python3 to be used in the same database
  * Add support for Python 3.5 in PL/Python
  * Fix issue with subdirectory creation during initdb
  * Make pg_ctl report status correctly on Windows
  * Suppress confusing error when using pg_receivexlog with older
    servers
  * Multiple documentation corrections and additions
  * Fix erroneous hash calculations in gin_extract_jsonb_path()
- For the full release notse, see:
  http://www.postgresql.org/docs/9.4/static/release-9-4-6.html

- Security and bugfix release 9.4.5:
  * CVE-2015-5289, bsc#949670: json or jsonb input values
    constructed from arbitrary user input can crash the PostgreSQL
    server and cause a denial of service.
  * CVE-2015-5288, bsc#949669: The crypt() function included with
    the optional pgCrypto extension could be exploited to read a
    few additional bytes of memory. No working exploit for this
    issue has been developed.
- For the full release notse, see:
  http://www.postgresql.org/docs/current/static/release-9-4-5.html
- Relax dependency on libpq to major version.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-07"/>
	<updated date="2016-03-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966435">SUSE bug 966435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966436">SUSE bug 966436</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4772">CVE-2007-4772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5288">CVE-2015-5288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5289">CVE-2015-5289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0766/">CVE-2016-0766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0766">CVE-2016-0766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0773/">CVE-2016-0773 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0773">CVE-2016-0773 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574489" comment="libecpg6-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574490" comment="libpq5-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567425" comment="libpq5-32bit-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574491" comment="postgresql94-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574492" comment="postgresql94-contrib-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574493" comment="postgresql94-docs-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574494" comment="postgresql94-server-9.4.6-0.14.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217677" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="993453" ref_url="https://bugzilla.suse.com/993453" source="BUGZILLA"/>
		<reference ref_id="993454" ref_url="https://bugzilla.suse.com/993454" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5423" ref_url="https://www.suse.com/security/cve/CVE-2016-5423/" source="CVE"/>
		<reference ref_id="CVE-2016-5424" ref_url="https://www.suse.com/security/cve/CVE-2016-5424/" source="CVE"/>
		<description>
This update for postgresql94 to version 9.4.9 fixes the several issues.

These security issues were fixed:
- CVE-2016-5423: CASE/WHEN with inlining can cause untrusted pointer dereference (bsc#993454).
- CVE-2016-5424: Fix client programs' handling of special characters in database and role names (bsc#993453).

For the non-security issues please refer to 
- http://www.postgresql.org/docs/9.4/static/release-9-4-9.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-8.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-7.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-29"/>
	<updated date="2016-09-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/993453">SUSE bug 993453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993454">SUSE bug 993454</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5423/">CVE-2016-5423 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5423">CVE-2016-5423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5424/">CVE-2016-5424 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5424">CVE-2016-5424 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574495" comment="libecpg6-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574496" comment="libpq5-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574497" comment="libpq5-32bit-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574498" comment="postgresql94-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574499" comment="postgresql94-contrib-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574500" comment="postgresql94-docs-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574501" comment="postgresql94-server-9.4.9-0.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217678" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1029547" ref_url="https://bugzilla.suse.com/1029547" source="BUGZILLA"/>
		<reference ref_id="1037603" ref_url="https://bugzilla.suse.com/1037603" source="BUGZILLA"/>
		<reference ref_id="1037624" ref_url="https://bugzilla.suse.com/1037624" source="BUGZILLA"/>
		<reference ref_id="1038293" ref_url="https://bugzilla.suse.com/1038293" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7484" ref_url="https://www.suse.com/security/cve/CVE-2017-7484/" source="CVE"/>
		<reference ref_id="CVE-2017-7485" ref_url="https://www.suse.com/security/cve/CVE-2017-7485/" source="CVE"/>
		<reference ref_id="CVE-2017-7486" ref_url="https://www.suse.com/security/cve/CVE-2017-7486/" source="CVE"/>
		<description>

This update for postgresql93 fixes the following issues:

- bsc#1029547: Fix tests with timezone 2017a 
- CVE-2017-7486: Restrict visibility of
    pg_user_mappings.umoptions, to protect passwords stored as
    user mapping options. (bsc#1037624) 
- CVE-2017-7485: Recognize PGREQUIRESSL variable again. (bsc#1038293)
- CVE-2017-7484: Prevent exposure of statistical information via leaky operators. (bsc#1037603)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-05"/>
	<updated date="2017-07-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029547">SUSE bug 1029547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037603">SUSE bug 1037603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037624">SUSE bug 1037624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038293">SUSE bug 1038293</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7484/">CVE-2017-7484 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7484">CVE-2017-7484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7485/">CVE-2017-7485 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7485">CVE-2017-7485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7486/">CVE-2017-7486 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7486">CVE-2017-7486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574502" comment="libecpg6-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574503" comment="libpq5-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574504" comment="libpq5-32bit-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574505" comment="postgresql94-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574506" comment="postgresql94-contrib-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574507" comment="postgresql94-docs-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574508" comment="postgresql94-server-9.4.12-0.22.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217679" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1051684" ref_url="https://bugzilla.suse.com/1051684" source="BUGZILLA"/>
		<reference ref_id="1051685" ref_url="https://bugzilla.suse.com/1051685" source="BUGZILLA"/>
		<reference ref_id="1053259" ref_url="https://bugzilla.suse.com/1053259" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7546" ref_url="https://www.suse.com/security/cve/CVE-2017-7546/" source="CVE"/>
		<reference ref_id="CVE-2017-7547" ref_url="https://www.suse.com/security/cve/CVE-2017-7547/" source="CVE"/>
		<reference ref_id="CVE-2017-7548" ref_url="https://www.suse.com/security/cve/CVE-2017-7548/" source="CVE"/>
		<description>
Postgresql94 was updated to 9.4.13 to fix the following issues:

* CVE-2017-7547: Further restrict visibility of pg_user_mappings.umoptions, to protect passwords stored as user mapping options. (bsc#1051685)
* CVE-2017-7546: Disallow empty passwords in all password-based authentication methods. (bsc#1051684)
* CVE-2017-7548: lo_put() function ignores ACLs. (bsc#1053259)

The changelog for this release is here:
	https://www.postgresql.org/docs/9.4/static/release-9-4-13.html

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-25"/>
	<updated date="2017-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051684">SUSE bug 1051684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051685">SUSE bug 1051685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053259">SUSE bug 1053259</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7546/">CVE-2017-7546 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7546">CVE-2017-7546 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7547/">CVE-2017-7547 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7547">CVE-2017-7547 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7548/">CVE-2017-7548 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7548">CVE-2017-7548 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574509" comment="libecpg6-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574510" comment="libpq5-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574511" comment="libpq5-32bit-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574512" comment="postgresql94-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574513" comment="postgresql94-contrib-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574514" comment="postgresql94-docs-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574515" comment="postgresql94-server-9.4.13-0.23.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217680" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1062538" ref_url="https://bugzilla.suse.com/1062538" source="BUGZILLA"/>
		<reference ref_id="1067844" ref_url="https://bugzilla.suse.com/1067844" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12172" ref_url="https://www.suse.com/security/cve/CVE-2017-12172/" source="CVE"/>
		<reference ref_id="CVE-2017-15098" ref_url="https://www.suse.com/security/cve/CVE-2017-15098/" source="CVE"/>
		<description>
This update for postgresql94 fixes the following issues:

Security issues fixed:

- CVE-2017-15098: Fix crash due to rowtype mismatch in json{b}_populate_recordset() (bsc#1067844).
- CVE-2017-12172: Start scripts permit database administrator to modify root-owned files. This issue did not affect SUSE (bsc#1062538).

Bug fixes:

- Update to version 9.4.15
  * https://www.postgresql.org/docs/9.4/static/release-9-4-15.html
  * https://www.postgresql.org/docs/9.4/static/release-9-4-14.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062538">SUSE bug 1062538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067844">SUSE bug 1067844</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12172/">CVE-2017-12172 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12172">CVE-2017-12172 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15098/">CVE-2017-15098 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15098">CVE-2017-15098 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574516" comment="libecpg6-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574517" comment="libpq5-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574518" comment="libpq5-32bit-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574519" comment="postgresql94-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574520" comment="postgresql94-contrib-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574521" comment="postgresql94-docs-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574522" comment="postgresql94-server-9.4.15-0.23.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217681" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1077983" ref_url="https://bugzilla.suse.com/1077983" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1053" ref_url="https://www.suse.com/security/cve/CVE-2018-1053/" source="CVE"/>
		<description>
This update for postgresql94 fixes the following issues:

PostgreSQL was updated to version 9.4.16, full release notes:

	https://www.postgresql.org/docs/9.4/static/release-9-4-16.html

Security issues fixed:

- CVE-2018-1053: Ensure that all temporary files made by pg_upgrade are non-world-readable. (bsc#1077983)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-21"/>
	<updated date="2018-02-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077983">SUSE bug 1077983</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1053/">CVE-2018-1053 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1053">CVE-2018-1053 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574523" comment="libecpg6-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574524" comment="libpq5-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574525" comment="libpq5-32bit-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574526" comment="postgresql94-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574527" comment="postgresql94-contrib-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574528" comment="postgresql94-docs-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574529" comment="postgresql94-server-9.4.16-0.23.13.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217682" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1081925" ref_url="https://bugzilla.suse.com/1081925" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1058" ref_url="https://www.suse.com/security/cve/CVE-2018-1058/" source="CVE"/>
		<description>
This update for postgresql94 fixes the following issues:

Security issues fixed:

- CVE-2018-1058: Fixed uncontrolled search path element in pg_dump and other client applications (bsc#1081925).


Bug fixes:

- See release notes for details:
  * https://www.postgresql.org/docs/9.4/static/release-9-4-17.html
  * https://www.postgresql.org/docs/9.4/static/release-9-4-16.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-21"/>
	<updated date="2018-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081925">SUSE bug 1081925</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1058/">CVE-2018-1058 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1058">CVE-2018-1058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574530" comment="libecpg6-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574531" comment="libpq5-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574532" comment="libpq5-32bit-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574533" comment="postgresql94-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574534" comment="postgresql94-contrib-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574535" comment="postgresql94-docs-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574536" comment="postgresql94-server-9.4.17-0.23.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217683" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1104199" ref_url="https://bugzilla.suse.com/1104199" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10915" ref_url="https://www.suse.com/security/cve/CVE-2018-10915/" source="CVE"/>
		<description>
This update for postgresql94 fixes the following issues:

postgresql was updated to 9.4.19:

  https://www.postgresql.org/docs/current/static/release-9-4-19.html
  * CVE-2018-10915, bsc#1104199: Fix failure to reset libpq's state
    fully between connection attempts.

postgresql was updated to 9.4.18:

- https://www.postgresql.org/about/news/1851/
- https://www.postgresql.org/docs/current/static/release-9-4-18.html
  A dump/restore is not required for those running 9.4.X.
  However, if the function marking mistakes mentioned in the first
  changelog entry below affect you, you will want to take steps to
  correct your database catalogs.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-22"/>
	<updated date="2018-10-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104199">SUSE bug 1104199</bugzilla>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10915/">CVE-2018-10915 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10915">CVE-2018-10915 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574537" comment="libecpg6-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574538" comment="libpq5-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574539" comment="libpq5-32bit-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574540" comment="postgresql94-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574541" comment="postgresql94-contrib-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574542" comment="postgresql94-docs-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574543" comment="postgresql94-server-9.4.19-0.23.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217684" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1145092" ref_url="https://bugzilla.suse.com/1145092" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<description>
This update for postgresql94 fixes the following issues:

Security issue fixed:

- CVE-2019-10208: Fixed arbitrary SQL execution via suitable SECURITY DEFINER function under the identity of the function owner (bsc#1145092).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145092">SUSE bug 1145092</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-10208">CVE-2019-10208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574544" comment="postgresql94-9.4.24-0.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574545" comment="postgresql94-contrib-9.4.24-0.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574546" comment="postgresql94-devel-9.4.24-0.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574547" comment="postgresql94-docs-9.4.24-0.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574548" comment="postgresql94-server-9.4.24-0.23.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217685" version="1" class="patch">
	<metadata>
		<title>Security update for ppp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="629729" ref_url="https://bugzilla.suse.com/629729" source="BUGZILLA"/>
		<reference ref_id="891489" ref_url="https://bugzilla.suse.com/891489" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3158" ref_url="https://www.suse.com/security/cve/CVE-2014-3158/" source="CVE"/>
		<description>

This ppp update fixes a potential security issue where an unprivileged 
attacker could have accessed privileged options:

    * integer overflow in option parsing (CVE-2014-3158, bnc#891489)

Security Issues:

    * CVE-2014-3158
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3158&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-26"/>
	<updated date="2014-08-26"/>
	<bugzilla href="https://bugzilla.suse.com/629729">SUSE bug 629729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891489">SUSE bug 891489</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3158/">CVE-2014-3158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3158">CVE-2014-3158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992319" comment="ppp-2.4.5.git-2.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217686" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="927841" ref_url="https://bugzilla.suse.com/927841" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3310" ref_url="https://www.suse.com/security/cve/CVE-2015-3310/" source="CVE"/>
		<description>
The ppp package was updated to fix the following security issue:

- CVE-2015-3310: Fixed a buffer overflow in radius plug-in's rc_mksid() (bsc#927841).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/927841">SUSE bug 927841</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3310/">CVE-2015-3310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3310">CVE-2015-3310 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574549" comment="ppp-2.4.5.git-2.31.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217687" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1162610" ref_url="https://bugzilla.suse.com/1162610" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8597" ref_url="https://www.suse.com/security/cve/CVE-2020-8597/" source="CVE"/>
		<description>
This update for ppp fixes the following security issue:

- CVE-2020-8597: Fixed a buffer overflow in the eap_request and eap_response functions (bsc#1162610).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-25"/>
	<updated date="2020-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162610">SUSE bug 1162610</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-8597/">CVE-2020-8597 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8597">CVE-2020-8597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574550" comment="ppp-2.4.5.git-2.32.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217688" version="1" class="patch">
	<metadata>
		<title>Security update for procmail</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="894999" ref_url="https://bugzilla.suse.com/894999" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3618" ref_url="https://www.suse.com/security/cve/CVE-2014-3618/" source="CVE"/>
		<description>

procmail was updated to fix a security issue in its formail helper.

    * When formail processed specially crafted e-mail headers a heap
      corruption could be triggered, which would lead to a crash of
      formail. (CVE-2014-3618)

Security Issues:

    * CVE-2014-3618
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3618&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-04"/>
	<updated date="2014-09-04"/>
	<bugzilla href="https://bugzilla.suse.com/894999">SUSE bug 894999</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3618/">CVE-2014-3618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3618">CVE-2014-3618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574551" comment="procmail-3.22-240.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217689" version="1" class="patch">
	<metadata>
		<title>Security update for procmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1068648" ref_url="https://bugzilla.suse.com/1068648" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16844" ref_url="https://www.suse.com/security/cve/CVE-2017-16844/" source="CVE"/>
		<description>
This update for procmail fixes the following issues:

Security issue fixed:

- CVE-2017-16844: Heap-based buffer overflow in the loadbuf function in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted e-mail message because of a hardcoded realloc size, a different vulnerability than CVE-2014-3618. (bnc#1068648)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-07"/>
	<updated date="2017-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068648">SUSE bug 1068648</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16844/">CVE-2017-16844 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16844">CVE-2017-16844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574552" comment="procmail-3.22-240.8.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217690" version="1" class="patch">
	<metadata>
		<title>Security update for puppet</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="620808" ref_url="https://bugzilla.suse.com/620808" source="BUGZILLA"/>
		<reference ref_id="623884" ref_url="https://bugzilla.suse.com/623884" source="BUGZILLA"/>
		<reference ref_id="721139" ref_url="https://bugzilla.suse.com/721139" source="BUGZILLA"/>
		<reference ref_id="726372" ref_url="https://bugzilla.suse.com/726372" source="BUGZILLA"/>
		<reference ref_id="727024" ref_url="https://bugzilla.suse.com/727024" source="BUGZILLA"/>
		<reference ref_id="727025" ref_url="https://bugzilla.suse.com/727025" source="BUGZILLA"/>
		<reference ref_id="739361" ref_url="https://bugzilla.suse.com/739361" source="BUGZILLA"/>
		<reference ref_id="747657" ref_url="https://bugzilla.suse.com/747657" source="BUGZILLA"/>
		<reference ref_id="755726" ref_url="https://bugzilla.suse.com/755726" source="BUGZILLA"/>
		<reference ref_id="755869" ref_url="https://bugzilla.suse.com/755869" source="BUGZILLA"/>
		<reference ref_id="755870" ref_url="https://bugzilla.suse.com/755870" source="BUGZILLA"/>
		<reference ref_id="755871" ref_url="https://bugzilla.suse.com/755871" source="BUGZILLA"/>
		<reference ref_id="755872" ref_url="https://bugzilla.suse.com/755872" source="BUGZILLA"/>
		<reference ref_id="770828" ref_url="https://bugzilla.suse.com/770828" source="BUGZILLA"/>
		<reference ref_id="770829" ref_url="https://bugzilla.suse.com/770829" source="BUGZILLA"/>
		<reference ref_id="770833" ref_url="https://bugzilla.suse.com/770833" source="BUGZILLA"/>
		<reference ref_id="809839" ref_url="https://bugzilla.suse.com/809839" source="BUGZILLA"/>
		<reference ref_id="825878" ref_url="https://bugzilla.suse.com/825878" source="BUGZILLA"/>
		<reference ref_id="835122" ref_url="https://bugzilla.suse.com/835122" source="BUGZILLA"/>
		<reference ref_id="835848" ref_url="https://bugzilla.suse.com/835848" source="BUGZILLA"/>
		<reference ref_id="853982" ref_url="https://bugzilla.suse.com/853982" source="BUGZILLA"/>
		<reference ref_id="856843" ref_url="https://bugzilla.suse.com/856843" source="BUGZILLA"/>
		<reference ref_id="864082" ref_url="https://bugzilla.suse.com/864082" source="BUGZILLA"/>
		<reference ref_id="879913" ref_url="https://bugzilla.suse.com/879913" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3848" ref_url="https://www.suse.com/security/cve/CVE-2011-3848/" source="CVE"/>
		<reference ref_id="CVE-2011-3869" ref_url="https://www.suse.com/security/cve/CVE-2011-3869/" source="CVE"/>
		<reference ref_id="CVE-2011-3870" ref_url="https://www.suse.com/security/cve/CVE-2011-3870/" source="CVE"/>
		<reference ref_id="CVE-2011-3871" ref_url="https://www.suse.com/security/cve/CVE-2011-3871/" source="CVE"/>
		<reference ref_id="CVE-2011-3872" ref_url="https://www.suse.com/security/cve/CVE-2011-3872/" source="CVE"/>
		<reference ref_id="CVE-2012-1053" ref_url="https://www.suse.com/security/cve/CVE-2012-1053/" source="CVE"/>
		<reference ref_id="CVE-2012-1054" ref_url="https://www.suse.com/security/cve/CVE-2012-1054/" source="CVE"/>
		<reference ref_id="CVE-2012-1986" ref_url="https://www.suse.com/security/cve/CVE-2012-1986/" source="CVE"/>
		<reference ref_id="CVE-2012-1987" ref_url="https://www.suse.com/security/cve/CVE-2012-1987/" source="CVE"/>
		<reference ref_id="CVE-2012-1988" ref_url="https://www.suse.com/security/cve/CVE-2012-1988/" source="CVE"/>
		<reference ref_id="CVE-2012-1989" ref_url="https://www.suse.com/security/cve/CVE-2012-1989/" source="CVE"/>
		<reference ref_id="CVE-2012-3864" ref_url="https://www.suse.com/security/cve/CVE-2012-3864/" source="CVE"/>
		<reference ref_id="CVE-2012-3865" ref_url="https://www.suse.com/security/cve/CVE-2012-3865/" source="CVE"/>
		<reference ref_id="CVE-2012-3867" ref_url="https://www.suse.com/security/cve/CVE-2012-3867/" source="CVE"/>
		<reference ref_id="CVE-2013-1640" ref_url="https://www.suse.com/security/cve/CVE-2013-1640/" source="CVE"/>
		<reference ref_id="CVE-2013-1652" ref_url="https://www.suse.com/security/cve/CVE-2013-1652/" source="CVE"/>
		<reference ref_id="CVE-2013-1653" ref_url="https://www.suse.com/security/cve/CVE-2013-1653/" source="CVE"/>
		<reference ref_id="CVE-2013-1654" ref_url="https://www.suse.com/security/cve/CVE-2013-1654/" source="CVE"/>
		<reference ref_id="CVE-2013-1655" ref_url="https://www.suse.com/security/cve/CVE-2013-1655/" source="CVE"/>
		<reference ref_id="CVE-2013-2274" ref_url="https://www.suse.com/security/cve/CVE-2013-2274/" source="CVE"/>
		<reference ref_id="CVE-2013-2275" ref_url="https://www.suse.com/security/cve/CVE-2013-2275/" source="CVE"/>
		<reference ref_id="CVE-2013-3567" ref_url="https://www.suse.com/security/cve/CVE-2013-3567/" source="CVE"/>
		<reference ref_id="CVE-2013-4761" ref_url="https://www.suse.com/security/cve/CVE-2013-4761/" source="CVE"/>
		<reference ref_id="CVE-2013-4969" ref_url="https://www.suse.com/security/cve/CVE-2013-4969/" source="CVE"/>
		<reference ref_id="CVE-2014-3248" ref_url="https://www.suse.com/security/cve/CVE-2014-3248/" source="CVE"/>
		<reference ref_id="CVE-2014-3250" ref_url="https://www.suse.com/security/cve/CVE-2014-3250/" source="CVE"/>
		<description>

Puppet was updated to fix the following security issues:

    * Unsafe use of temporary files. (CVE-2013-4969)
    * Arbitrary code execution with required social engineering.
      (CVE-2014-3248, CVE-2014-3250)

Security Issues references:

    * CVE-2014-3248
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3248&gt;
    * CVE-2013-4969
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4969&gt;
    * CVE-2014-3250
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3250&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-30"/>
	<updated date="2014-06-30"/>
	<bugzilla href="https://bugzilla.suse.com/620808">SUSE bug 620808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/623884">SUSE bug 623884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/721139">SUSE bug 721139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/726372">SUSE bug 726372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/727024">SUSE bug 727024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/727025">SUSE bug 727025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/739361">SUSE bug 739361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747657">SUSE bug 747657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/755726">SUSE bug 755726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/755869">SUSE bug 755869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/755870">SUSE bug 755870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/755871">SUSE bug 755871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/755872">SUSE bug 755872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770828">SUSE bug 770828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770829">SUSE bug 770829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770833">SUSE bug 770833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809839">SUSE bug 809839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825878">SUSE bug 825878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835122">SUSE bug 835122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835848">SUSE bug 835848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853982">SUSE bug 853982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856843">SUSE bug 856843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864082">SUSE bug 864082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879913">SUSE bug 879913</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3848/">CVE-2011-3848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3848">CVE-2011-3848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3869/">CVE-2011-3869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3869">CVE-2011-3869 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3870/">CVE-2011-3870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3870">CVE-2011-3870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3871/">CVE-2011-3871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3871">CVE-2011-3871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3872/">CVE-2011-3872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3872">CVE-2011-3872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1053/">CVE-2012-1053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1053">CVE-2012-1053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1054/">CVE-2012-1054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1054">CVE-2012-1054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1986/">CVE-2012-1986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1986">CVE-2012-1986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1987/">CVE-2012-1987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1987">CVE-2012-1987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1988/">CVE-2012-1988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1988">CVE-2012-1988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1989/">CVE-2012-1989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1989">CVE-2012-1989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3864/">CVE-2012-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3864">CVE-2012-3864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3865/">CVE-2012-3865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3865">CVE-2012-3865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3867/">CVE-2012-3867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3867">CVE-2012-3867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1640/">CVE-2013-1640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1640">CVE-2013-1640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1652/">CVE-2013-1652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1652">CVE-2013-1652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1653/">CVE-2013-1653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1653">CVE-2013-1653 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1654/">CVE-2013-1654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1654">CVE-2013-1654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1655/">CVE-2013-1655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1655">CVE-2013-1655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2274/">CVE-2013-2274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2274">CVE-2013-2274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2275/">CVE-2013-2275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2275">CVE-2013-2275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3567/">CVE-2013-3567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3567">CVE-2013-3567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4761/">CVE-2013-4761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4761">CVE-2013-4761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4969/">CVE-2013-4969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4969">CVE-2013-4969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3248/">CVE-2014-3248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3248">CVE-2014-3248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3250/">CVE-2014-3250 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3250">CVE-2014-3250 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992320" comment="puppet-2.6.18-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992321" comment="puppet-server-2.6.18-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992322" comment="pwdutils-3.2.8-0.2.35 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217691" version="1" class="patch">
	<metadata>
		<title>Security update for puppet (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1040151" ref_url="https://bugzilla.suse.com/1040151" source="BUGZILLA"/>
		<reference ref_id="1077767" ref_url="https://bugzilla.suse.com/1077767" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2295" ref_url="https://www.suse.com/security/cve/CVE-2017-2295/" source="CVE"/>
		<description>
This update for puppet fixes the following issues:

- CVE-2017-2295: Fixed a security vulnerability where an attacker could
  force YAML deserialization in an unsafe manner, which would lead to
  remote code execution.

In default, this update would break a backwards compatibility
with Puppet agents older than 3.2.2 as the SLE11 master doesn't
support other fact formats than pson in default anymore.
In order to allow users to continue using their SLE11 agents
a patch was added that enables sending PSON from agents.

For non-SUSE clients older that 3.2.2 a new puppet master boolean option
'dangerous_fact_formats' was added. When it's set to true it
enables using dangerous fact formats (e.g. YAML). When it's set
to false, only PSON fact format is accepted. (bsc#1040151),
(bsc#1077767)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-05"/>
	<updated date="2018-03-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040151">SUSE bug 1040151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077767">SUSE bug 1077767</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2295/">CVE-2017-2295 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2295">CVE-2017-2295 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574556" comment="puppet-2.7.26-0.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574557" comment="puppet-server-2.7.26-0.5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217692" version="1" class="patch">
	<metadata>
		<title>Security update for puppet (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1167645" ref_url="https://bugzilla.suse.com/1167645" source="BUGZILLA"/>
		<reference ref_id="935899" ref_url="https://bugzilla.suse.com/935899" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7942" ref_url="https://www.suse.com/security/cve/CVE-2020-7942/" source="CVE"/>
		<description>
This update for puppet fixes the following issues:

Security issue fixed:

- CVE-2020-7942: Added a warning for a vulnerable configuration option, which could allow
  for information disclosure in certain setups. Disabling it my break some setups. (bsc#1167645)

Non-security issue fixed:

- Fixed deletion of puppet master file /etc/puppet/manifests/site.pp during updates (bsc#935899).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1167645">SUSE bug 1167645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935899">SUSE bug 935899</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7942/">CVE-2020-7942 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7942">CVE-2020-7942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574558" comment="puppet-2.7.26-0.5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574559" comment="puppet-server-2.7.26-0.5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217693" version="1" class="patch">
	<metadata>
		<title>Recommended update for pure-ftpd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="524121" ref_url="https://bugzilla.suse.com/524121" source="BUGZILLA"/>
		<reference ref_id="638626" ref_url="https://bugzilla.suse.com/638626" source="BUGZILLA"/>
		<reference ref_id="655608" ref_url="https://bugzilla.suse.com/655608" source="BUGZILLA"/>
		<reference ref_id="675934" ref_url="https://bugzilla.suse.com/675934" source="BUGZILLA"/>
		<reference ref_id="676680" ref_url="https://bugzilla.suse.com/676680" source="BUGZILLA"/>
		<reference ref_id="685447" ref_url="https://bugzilla.suse.com/685447" source="BUGZILLA"/>
		<reference ref_id="686590" ref_url="https://bugzilla.suse.com/686590" source="BUGZILLA"/>
		<reference ref_id="693165" ref_url="https://bugzilla.suse.com/693165" source="BUGZILLA"/>
		<reference ref_id="694531" ref_url="https://bugzilla.suse.com/694531" source="BUGZILLA"/>
		<reference ref_id="698253" ref_url="https://bugzilla.suse.com/698253" source="BUGZILLA"/>
		<reference ref_id="699300" ref_url="https://bugzilla.suse.com/699300" source="BUGZILLA"/>
		<reference ref_id="700335" ref_url="https://bugzilla.suse.com/700335" source="BUGZILLA"/>
		<reference ref_id="700611" ref_url="https://bugzilla.suse.com/700611" source="BUGZILLA"/>
		<reference ref_id="703035" ref_url="https://bugzilla.suse.com/703035" source="BUGZILLA"/>
		<reference ref_id="717802" ref_url="https://bugzilla.suse.com/717802" source="BUGZILLA"/>
		<reference ref_id="721118" ref_url="https://bugzilla.suse.com/721118" source="BUGZILLA"/>
		<reference ref_id="828469" ref_url="https://bugzilla.suse.com/828469" source="BUGZILLA"/>
		<reference ref_id="856424" ref_url="https://bugzilla.suse.com/856424" source="BUGZILLA"/>
		<reference ref_id="902229" ref_url="https://bugzilla.suse.com/902229" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1575" ref_url="https://www.suse.com/security/cve/CVE-2011-1575/" source="CVE"/>
		<reference ref_id="CVE-2011-3171" ref_url="https://www.suse.com/security/cve/CVE-2011-3171/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<description>

This update for pure-ftpd provides the following fixes:

    * 524121: configurable ldap port for ftp server
    * 655608: mdtm and some other commands fail, using full path of remote
      server access
    * 717802: FTP Remote server navigation not working for file/directory
      operations when full path is specified.

Every Open Enterprise Server user should immediately install this update.

		</description>
<advisory from="security@suse.de">
	<issued date="2011-10-05"/>
	<updated date="2011-10-05"/>
	<bugzilla href="https://bugzilla.suse.com/524121">SUSE bug 524121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638626">SUSE bug 638626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/655608">SUSE bug 655608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/675934">SUSE bug 675934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/676680">SUSE bug 676680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/685447">SUSE bug 685447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/686590">SUSE bug 686590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693165">SUSE bug 693165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/694531">SUSE bug 694531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698253">SUSE bug 698253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/699300">SUSE bug 699300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/700335">SUSE bug 700335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/700611">SUSE bug 700611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703035">SUSE bug 703035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/717802">SUSE bug 717802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/721118">SUSE bug 721118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828469">SUSE bug 828469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856424">SUSE bug 856424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902229">SUSE bug 902229</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1575/">CVE-2011-1575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1575">CVE-2011-1575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3171/">CVE-2011-3171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3171">CVE-2011-3171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992323" comment="pure-ftpd-1.0.22-3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217694" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="984751" ref_url="https://bugzilla.suse.com/984751" source="BUGZILLA"/>
		<reference ref_id="985348" ref_url="https://bugzilla.suse.com/985348" source="BUGZILLA"/>
		<reference ref_id="989523" ref_url="https://bugzilla.suse.com/989523" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<description>

This update for python fixes the following issues:

- CVE-2016-0772: smtplib vulnerability opens startTLS stripping attack (bsc#984751)
- CVE-2016-5699: incorrect validation of HTTP headers allow header injection (bsc#985348)
- CVE-2016-1000110: HTTPoxy vulnerability in urllib, fixed by disregarding HTTP_PROXY
  when REQUEST_METHOD is also set (bsc#989523)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-09"/>
	<updated date="2016-09-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/984751">SUSE bug 984751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985348">SUSE bug 985348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989523">SUSE bug 989523</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0772">CVE-2016-0772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000110">CVE-2016-1000110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5699">CVE-2016-5699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574560" comment="libpython2_6-1_0-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574561" comment="libpython2_6-1_0-32bit-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574562" comment="python-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565245" comment="python-32bit-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574563" comment="python-base-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574564" comment="python-base-32bit-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574565" comment="python-curses-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574566" comment="python-demo-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565248" comment="python-doc-2.6-8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565249" comment="python-doc-pdf-2.6-8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574567" comment="python-gdbm-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574568" comment="python-idle-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574569" comment="python-tk-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574570" comment="python-xml-2.6.9-39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217695" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1068664" ref_url="https://bugzilla.suse.com/1068664" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2017-1000158: Fixed integer overflow in thePyString_DecodeEscape function (bsc#1068664).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-22"/>
	<updated date="2018-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068664">SUSE bug 1068664</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000158">CVE-2017-1000158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574571" comment="libpython2_6-1_0-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574572" comment="libpython2_6-1_0-32bit-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574573" comment="python-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565253" comment="python-32bit-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574574" comment="python-base-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574575" comment="python-base-32bit-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574576" comment="python-curses-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574577" comment="python-demo-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565256" comment="python-doc-2.6-8.40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565257" comment="python-doc-pdf-2.6-8.40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574578" comment="python-gdbm-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574579" comment="python-idle-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574580" comment="python-tk-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574581" comment="python-xml-2.6.9-40.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217696" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1083507" ref_url="https://bugzilla.suse.com/1083507" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<description>
This update for python fixes the following issues:

The following security vulnerabilities were addressed:

- Add a check to Lib/wave.py that verifies that at least one channel is
  provided. Prior to this, attackers could cause a denial of service via a
  crafted wav format audio file. [bsc#1083507, CVE-2017-18207]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-22"/>
	<updated date="2018-06-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083507">SUSE bug 1083507</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18207">CVE-2017-18207 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574582" comment="libpython2_6-1_0-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574583" comment="libpython2_6-1_0-32bit-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574584" comment="python-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565261" comment="python-32bit-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574585" comment="python-base-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574586" comment="python-base-32bit-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574587" comment="python-curses-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574588" comment="python-demo-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565264" comment="python-doc-2.6-8.40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565265" comment="python-doc-pdf-2.6-8.40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574589" comment="python-gdbm-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574590" comment="python-idle-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574591" comment="python-tk-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574592" comment="python-xml-2.6.9-40.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217697" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1086001" ref_url="https://bugzilla.suse.com/1086001" source="BUGZILLA"/>
		<reference ref_id="1088004" ref_url="https://bugzilla.suse.com/1088004" source="BUGZILLA"/>
		<reference ref_id="1088009" ref_url="https://bugzilla.suse.com/1088009" source="BUGZILLA"/>
		<reference ref_id="985177" ref_url="https://bugzilla.suse.com/985177" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060/" source="CVE"/>
		<reference ref_id="CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061/" source="CVE"/>
		<description>
This update for python-base fixes the following issues:

Security issues fixed:

- CVE-2018-1061: Fixed DoS via regular expression backtracking in difflib.IS_LINE_JUNK method in difflib (bsc#1088004).
- CVE-2018-1060: Fixed DoS via regular expression catastrophic backtracking in apop() method in pop3lib (bsc#1088009).
- CVE-2016-5636: Fixed heap overflow in zipimporter module (bsc#985177)

Bug fixes:

- bsc#1086001: python tarfile uses random order.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1086001">SUSE bug 1086001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985177">SUSE bug 985177</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5636">CVE-2016-5636 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1060">CVE-2018-1060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1061">CVE-2018-1061 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574593" comment="libpython2_6-1_0-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574594" comment="libpython2_6-1_0-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574595" comment="python-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565269" comment="python-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574596" comment="python-base-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574597" comment="python-base-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574598" comment="python-curses-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574599" comment="python-demo-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565272" comment="python-doc-2.6-8.40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565273" comment="python-doc-pdf-2.6-8.40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574600" comment="python-gdbm-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574601" comment="python-idle-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574602" comment="python-tk-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574603" comment="python-xml-2.6.9-40.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217698" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<description>
This update for python fixes the following issue:

- CVE-2018-14647: Python's elementtree C accelerator failed to initialise
  Expat's hash salt during initialization. This could make it easy to conduct
  denial of service attacks against Expat by constructing an XML document that
  would cause pathological hash collisions in Expat's internal data structures,
  consuming large amounts CPU and RAM (bsc#1109847)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14647">CVE-2018-14647 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574604" comment="libpython2_6-1_0-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574605" comment="libpython2_6-1_0-32bit-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574606" comment="python-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565277" comment="python-32bit-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574607" comment="python-base-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574608" comment="python-base-32bit-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574609" comment="python-curses-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574610" comment="python-demo-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565280" comment="python-doc-2.6-8.40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565281" comment="python-doc-pdf-2.6-8.40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574611" comment="python-gdbm-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574612" comment="python-idle-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574613" comment="python-tk-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574614" comment="python-xml-2.6.9-40.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217699" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="1130847" ref_url="https://bugzilla.suse.com/1130847" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9948" ref_url="https://www.suse.com/security/cve/CVE-2019-9948/" source="CVE"/>
		<description>
This update for python fixes the following issues:

Security issues fixed:

- CVE-2019-9948: Fixed a 'file:' blacklist bypass in URIs by using the 'local-file:' scheme instead (bsc#1130847).
- CVE-2019-9636: Fixed an information disclosure because of incorrect handling of Unicode encoding during NFKC normalization (bsc#1129346).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-15"/>
	<updated date="2019-04-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130847">SUSE bug 1130847</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9636">CVE-2019-9636 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9948/">CVE-2019-9948 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9948">CVE-2019-9948 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574615" comment="libpython2_6-1_0-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574616" comment="libpython2_6-1_0-32bit-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574617" comment="python-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574618" comment="python-32bit-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574619" comment="python-base-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574620" comment="python-base-32bit-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574621" comment="python-curses-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574622" comment="python-demo-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569038" comment="python-doc-2.6-8.40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569039" comment="python-doc-pdf-2.6-8.40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574623" comment="python-gdbm-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574624" comment="python-idle-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574625" comment="python-tk-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574626" comment="python-xml-2.6.9-40.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217700" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459).
- CVE-2018-20852: Fixed an information leak where cookies could be send to the wrong server because of incorrect domain validation (bsc#1141853).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-08"/>
	<updated date="2019-08-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20852">CVE-2018-20852 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10160">CVE-2019-10160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574627" comment="libpython2_6-1_0-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574628" comment="libpython2_6-1_0-32bit-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574629" comment="python-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574630" comment="python-32bit-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574631" comment="python-base-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574632" comment="python-base-32bit-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574633" comment="python-curses-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574634" comment="python-demo-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569049" comment="python-doc-2.6-8.40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569050" comment="python-doc-pdf-2.6-8.40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574635" comment="python-gdbm-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574636" comment="python-idle-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574637" comment="python-tk-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574638" comment="python-xml-2.6.9-40.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217701" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1149955" ref_url="https://bugzilla.suse.com/1149955" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<description>
This update for python fixes the following issues:

Security issue fixed:

- CVE-2019-16056: Fixed a parser issue in the email module. (bsc#1149955)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-22"/>
	<updated date="2019-10-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16056">CVE-2019-16056 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574639" comment="libpython2_6-1_0-2.6.9-40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574640" comment="libpython2_6-1_0-32bit-2.6.9-40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574641" comment="python-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574642" comment="python-32bit-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574643" comment="python-base-2.6.9-40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574644" comment="python-base-32bit-2.6.9-40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574645" comment="python-curses-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574646" comment="python-demo-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569060" comment="python-doc-2.6-8.40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569061" comment="python-doc-pdf-2.6-8.40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574647" comment="python-gdbm-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574648" comment="python-idle-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574649" comment="python-tk-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574650" comment="python-xml-2.6.9-40.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217702" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<description>
This update for python fixes the following security issue:

- CVE-2020-8492: Fixed a regular expression in urllib that was prone to denial of service via HTTP (bsc#1162367).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-03"/>
	<updated date="2020-03-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574651" comment="libpython2_6-1_0-2.6.9-40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574652" comment="libpython2_6-1_0-32bit-2.6.9-40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574653" comment="python-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574654" comment="python-32bit-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574655" comment="python-base-2.6.9-40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574656" comment="python-base-32bit-2.6.9-40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574657" comment="python-curses-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574658" comment="python-demo-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569071" comment="python-doc-2.6-8.40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569072" comment="python-doc-pdf-2.6-8.40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574659" comment="python-gdbm-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574660" comment="python-idle-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574661" comment="python-tk-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574662" comment="python-xml-2.6.9-40.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217703" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1162825" ref_url="https://bugzilla.suse.com/1162825" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<description>
This update for python fixes the following issues:

Security issues fixed:

- CVE-2019-18348: Fixed a CRLF injection via the host part of the url passed to urlopen().
                  Now an InvalidURL exception is raised (bsc#1155094).
- CVE-2019-9674: Improved the documentation to reflect the dangers of zip-bombs (bsc#1162825).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-28"/>
	<updated date="2020-05-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">CVE-2019-18348 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">CVE-2019-9674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574663" comment="libpython2_6-1_0-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574664" comment="libpython2_6-1_0-32bit-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574665" comment="python-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574666" comment="python-32bit-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574667" comment="python-base-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574668" comment="python-base-32bit-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574669" comment="python-curses-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574670" comment="python-demo-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574671" comment="python-doc-2.6-8.40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574672" comment="python-doc-pdf-2.6-8.40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574673" comment="python-gdbm-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574674" comment="python-idle-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574675" comment="python-tk-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574676" comment="python-xml-2.6.9-40.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217704" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1174091" ref_url="https://bugzilla.suse.com/1174091" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2019-20907: Avoid a possible infinite loop caused by specifically crafted tarballs (bsc#1174091).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-27"/>
	<updated date="2020-08-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574677" comment="libpython2_6-1_0-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574678" comment="libpython2_6-1_0-32bit-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574679" comment="python-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574680" comment="python-32bit-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574681" comment="python-base-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574682" comment="python-base-32bit-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574683" comment="python-curses-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574684" comment="python-demo-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574685" comment="python-doc-2.6-8.40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574686" comment="python-doc-pdf-2.6-8.40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574687" comment="python-gdbm-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574688" comment="python-idle-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574689" comment="python-tk-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574690" comment="python-xml-2.6.9-40.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217705" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1177211" ref_url="https://bugzilla.suse.com/1177211" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- bsc#1177211 (CVE-2020-26116) no longer allowing special characters in the method parameter 
  of HTTPConnection.putrequest in httplib, stopping injection of headers.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-26"/>
	<updated date="2020-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26116">CVE-2020-26116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574691" comment="libpython2_6-1_0-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574692" comment="libpython2_6-1_0-32bit-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574693" comment="python-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574694" comment="python-32bit-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574695" comment="python-base-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574696" comment="python-base-32bit-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574697" comment="python-curses-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574698" comment="python-demo-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569082" comment="python-doc-2.6-8.40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569083" comment="python-doc-pdf-2.6-8.40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574699" comment="python-gdbm-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574700" comment="python-idle-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574701" comment="python-tk-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574702" comment="python-xml-2.6.9-40.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217706" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1181126" ref_url="https://bugzilla.suse.com/1181126" source="BUGZILLA"/>
		<reference ref_id="1182379" ref_url="https://bugzilla.suse.com/1182379" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2021-23336: which forbids use of semicolon as a query string separator (bpo#42967, bsc#1182379, CVE-2021-23336).
- Switch off -O0 non-optimization.
- CVE-2021-3177: fixing bsc#1181126 (CVE-2021-3177) buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181126">SUSE bug 1181126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182379">SUSE bug 1182379</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631986" comment="libpython2_6-1_0-2.6.9-40.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631987" comment="libpython2_6-1_0-32bit-2.6.9-40.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631988" comment="python-2.6.9-40.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631989" comment="python-32bit-2.6.9-40.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631990" comment="python-base-2.6.9-40.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631991" comment="python-base-32bit-2.6.9-40.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631992" comment="python-curses-2.6.9-40.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631993" comment="python-demo-2.6.9-40.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631994" comment="python-doc-2.6-8.40.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631995" comment="python-doc-pdf-2.6-8.40.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631996" comment="python-gdbm-2.6.9-40.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631997" comment="python-idle-2.6.9-40.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631998" comment="python-tk-2.6.9-40.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631999" comment="python-xml-2.6.9-40.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217707" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1130840" ref_url="https://bugzilla.suse.com/1130840" source="BUGZILLA"/>
		<reference ref_id="1189241" ref_url="https://bugzilla.suse.com/1189241" source="BUGZILLA"/>
		<reference ref_id="1189287" ref_url="https://bugzilla.suse.com/1189287" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2021-3733" ref_url="https://www.suse.com/security/cve/CVE-2021-3733/" source="CVE"/>
		<reference ref_id="CVE-2021-3737" ref_url="https://www.suse.com/security/cve/CVE-2021-3737/" source="CVE"/>
		<description>
This update for python fixes the following issues:


- CVE-2021-3737: Fixed http client infinite line reading (DoS) after a http 100. (bsc#1189241)
- CVE-2021-3733: Fixed ReDoS in urllib.request. (bsc#1189287)
- CVE-2019-9947: Fixed a CRLF injection that can occur if the attacker controls a url parameter. (bsc#1130840)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-25"/>
	<updated date="2021-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189241">SUSE bug 1189241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189287">SUSE bug 1189287</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3733/">CVE-2021-3733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3733">CVE-2021-3733 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3737/">CVE-2021-3737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3737">CVE-2021-3737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651289" comment="libpython2_6-1_0-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651290" comment="libpython2_6-1_0-32bit-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651291" comment="python-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651292" comment="python-32bit-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651293" comment="python-base-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651294" comment="python-base-32bit-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651295" comment="python-curses-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651296" comment="python-demo-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651297" comment="python-doc-2.6-8.40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651298" comment="python-doc-pdf-2.6-8.40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651299" comment="python-gdbm-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651300" comment="python-idle-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651301" comment="python-tk-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651302" comment="python-xml-2.6.9-40.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217708" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="834601" ref_url="https://bugzilla.suse.com/834601" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<description>

This Python update fixes a certificate hostname issue.

    * bnc#834601: CVE-2013-4238: python: SSL module does not handle
      certificates that contain hostnames with NULL bytes

Security Issue reference:

    * CVE-2013-4238
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4238">CVE-2013-4238 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574717" comment="libpython2_6-1_0-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566178" comment="libpython2_6-1_0-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574718" comment="python-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563122" comment="python-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574719" comment="python-base-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566181" comment="python-base-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574720" comment="python-curses-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574721" comment="python-demo-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574722" comment="python-gdbm-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574723" comment="python-idle-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574724" comment="python-tk-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574725" comment="python-xml-2.6.8-0.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217709" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="898572" ref_url="https://bugzilla.suse.com/898572" source="BUGZILLA"/>
		<reference ref_id="901715" ref_url="https://bugzilla.suse.com/901715" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-7185" ref_url="https://www.suse.com/security/cve/CVE-2014-7185/" source="CVE"/>
		<description>

Python has been updated to fix one security issue:

    * Potential wraparound/overflow in buffer() (CVE-2014-7185)

As an additional hardening measure SSLv2 was disabled (bnc#901715).

Security Issues:

    * CVE-2014-7185
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7185&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-19"/>
	<updated date="2014-11-19"/>
	<bugzilla href="https://bugzilla.suse.com/898572">SUSE bug 898572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901715">SUSE bug 901715</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7185/">CVE-2014-7185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7185">CVE-2014-7185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574726" comment="libpython2_6-1_0-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567066" comment="libpython2_6-1_0-32bit-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574727" comment="python-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563781" comment="python-32bit-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574728" comment="python-base-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567069" comment="python-base-32bit-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574729" comment="python-curses-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574730" comment="python-demo-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563784" comment="python-doc-2.6-8.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563785" comment="python-doc-pdf-2.6-8.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574731" comment="python-gdbm-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574732" comment="python-idle-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574733" comment="python-tk-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574734" comment="python-xml-2.6.9-0.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217710" version="1" class="patch">
	<metadata>
		<title>Security update for python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="834601" ref_url="https://bugzilla.suse.com/834601" source="BUGZILLA"/>
		<reference ref_id="847135" ref_url="https://bugzilla.suse.com/847135" source="BUGZILLA"/>
		<reference ref_id="856836" ref_url="https://bugzilla.suse.com/856836" source="BUGZILLA"/>
		<reference ref_id="859068" ref_url="https://bugzilla.suse.com/859068" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4073" ref_url="https://www.suse.com/security/cve/CVE-2013-4073/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<description>

This update for Python fixes the following security issues:

    * bnc#834601: SSL module does not handle certificates that contain
      hostnames with NULL bytes. (CVE-2013-4238)
    * bnc#856836: Various stdlib read flaws. (CVE-2013-1752)

Additionally, the following non-security issues have been fixed:

    * bnc#859068: Turn off OpenSSL's aggressive optimizations that conflict
      with Python's GC.
    * bnc#847135: Setting fips=1 at boot time causes problems with Python
      due to MD5 usage.

Security Issue references:

    * CVE-2013-4073
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4073&gt;
    * CVE-2013-4238
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-24"/>
	<updated date="2014-02-24"/>
	<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847135">SUSE bug 847135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856836">SUSE bug 856836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859068">SUSE bug 859068</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4073/">CVE-2013-4073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4073">CVE-2013-4073 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4238">CVE-2013-4238 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574735" comment="libpython2_6-1_0-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567074" comment="libpython2_6-1_0-32bit-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574736" comment="python-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563789" comment="python-32bit-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574737" comment="python-base-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567077" comment="python-base-32bit-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574738" comment="python-curses-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574739" comment="python-demo-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563792" comment="python-doc-2.6-8.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563793" comment="python-doc-pdf-2.6-8.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574740" comment="python-gdbm-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574741" comment="python-idle-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574742" comment="python-tk-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574743" comment="python-xml-2.6.9-0.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217711" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="863741" ref_url="https://bugzilla.suse.com/863741" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1912" ref_url="https://www.suse.com/security/cve/CVE-2014-1912/" source="CVE"/>
		<description>

Python was updated to fix a security issue in the socket.recvfrom_into 
function, where data could be written over the end of the buffer. 
(CVE-2014-1912)

Security Issue reference:

    * CVE-2014-1912
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1912&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-01"/>
	<updated date="2014-04-01"/>
	<bugzilla href="https://bugzilla.suse.com/863741">SUSE bug 863741</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1912/">CVE-2014-1912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1912">CVE-2014-1912 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574744" comment="libpython2_6-1_0-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567082" comment="libpython2_6-1_0-32bit-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574745" comment="python-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563797" comment="python-32bit-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574746" comment="python-base-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567085" comment="python-base-32bit-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574747" comment="python-curses-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574748" comment="python-demo-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563800" comment="python-doc-2.6-8.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563801" comment="python-doc-pdf-2.6-8.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574749" comment="python-gdbm-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574750" comment="python-idle-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574751" comment="python-tk-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574752" comment="python-xml-2.6.9-0.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217712" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="827982" ref_url="https://bugzilla.suse.com/827982" source="BUGZILLA"/>
		<reference ref_id="834601" ref_url="https://bugzilla.suse.com/834601" source="BUGZILLA"/>
		<reference ref_id="847135" ref_url="https://bugzilla.suse.com/847135" source="BUGZILLA"/>
		<reference ref_id="856836" ref_url="https://bugzilla.suse.com/856836" source="BUGZILLA"/>
		<reference ref_id="859068" ref_url="https://bugzilla.suse.com/859068" source="BUGZILLA"/>
		<reference ref_id="863741" ref_url="https://bugzilla.suse.com/863741" source="BUGZILLA"/>
		<reference ref_id="872848" ref_url="https://bugzilla.suse.com/872848" source="BUGZILLA"/>
		<reference ref_id="885882" ref_url="https://bugzilla.suse.com/885882" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-1912" ref_url="https://www.suse.com/security/cve/CVE-2014-1912/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<description>

This update for Python provides fixes for the following issues:

    * CGIHTTPServer file disclosure and directory traversal through
      URL-encoded characters. (CVE-2014-4650)
    * The urlparse module has been updated to correctly parse IPv6
      addresses. (bnc#872848)
    * Correctly enable IPv6 support.

Security Issues:

    * CVE-2014-4650
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4650&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-28"/>
	<updated date="2014-07-28"/>
	<bugzilla href="https://bugzilla.suse.com/827982">SUSE bug 827982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847135">SUSE bug 847135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856836">SUSE bug 856836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859068">SUSE bug 859068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863741">SUSE bug 863741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/872848">SUSE bug 872848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885882">SUSE bug 885882</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1752">CVE-2013-1752 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4238">CVE-2013-4238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1912/">CVE-2014-1912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1912">CVE-2014-1912 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4650">CVE-2014-4650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574753" comment="libpython2_6-1_0-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574754" comment="libpython2_6-1_0-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574755" comment="python-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574756" comment="python-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574757" comment="python-base-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574758" comment="python-base-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574759" comment="python-curses-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574760" comment="python-demo-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574761" comment="python-devel-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563808" comment="python-doc-2.6-8.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563809" comment="python-doc-pdf-2.6-8.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574762" comment="python-gdbm-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574763" comment="python-idle-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574764" comment="python-tk-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574765" comment="python-xml-2.6.9-0.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574753" comment="libpython2_6-1_0-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574754" comment="libpython2_6-1_0-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574755" comment="python-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574756" comment="python-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574757" comment="python-base-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574758" comment="python-base-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574759" comment="python-curses-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574760" comment="python-demo-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574761" comment="python-devel-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563808" comment="python-doc-2.6-8.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563809" comment="python-doc-pdf-2.6-8.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574762" comment="python-gdbm-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574763" comment="python-idle-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574764" comment="python-tk-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574765" comment="python-xml-2.6.9-0.31.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217713" version="1" class="patch">
	<metadata>
		<title>Security update for python-imaging</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="863541" ref_url="https://bugzilla.suse.com/863541" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1932" ref_url="https://www.suse.com/security/cve/CVE-2014-1932/" source="CVE"/>
		<reference ref_id="CVE-2014-1933" ref_url="https://www.suse.com/security/cve/CVE-2014-1933/" source="CVE"/>
		<description>

This python-imaging update fixes the following two security issues:

    * bnc#863541: Fixed insecure temporary file creation and handling
      (CVE-2014-1932, CVE-2014-1933)

Security Issue references:

    * CVE-2014-1932
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1932&gt;
    * CVE-2014-1933
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1933&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-23"/>
	<updated date="2014-04-23"/>
	<bugzilla href="https://bugzilla.suse.com/863541">SUSE bug 863541</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1932/">CVE-2014-1932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1932">CVE-2014-1932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1933/">CVE-2014-1933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1933">CVE-2014-1933 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574766" comment="python-imaging-1.1.6-168.34.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217714" version="1" class="patch">
	<metadata>
		<title>Security update for python-lxml</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="657698" ref_url="https://bugzilla.suse.com/657698" source="BUGZILLA"/>
		<reference ref_id="746129" ref_url="https://bugzilla.suse.com/746129" source="BUGZILLA"/>
		<reference ref_id="877258" ref_url="https://bugzilla.suse.com/877258" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3146" ref_url="https://www.suse.com/security/cve/CVE-2014-3146/" source="CVE"/>
		<description>

This security update for python-lxml fixes an input sanitization flaw in 
clean_html. (CVE-2014-3146)

Security Issues:

    * CVE-2014-3146
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3146&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-01"/>
	<updated date="2014-10-01"/>
	<bugzilla href="https://bugzilla.suse.com/657698">SUSE bug 657698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746129">SUSE bug 746129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877258">SUSE bug 877258</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3146/">CVE-2014-3146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3146">CVE-2014-3146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992324" comment="python-lxml-2.1.2-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217715" version="1" class="patch">
	<metadata>
		<title>Security update for python-numpy (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1122208" ref_url="https://bugzilla.suse.com/1122208" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6446" ref_url="https://www.suse.com/security/cve/CVE-2019-6446/" source="CVE"/>
		<description>
This update for python-numpy fixes the following issues:
	  
Security issue fixed:

- CVE-2019-6446: Set allow_pickle to false by default to restrict loading untrusted content (bsc#1122208).
  With this update we decrease the possibility of allowing remote attackers to execute arbitrary code by
  misusing numpy.load(). A warning during runtime will show-up when the allow_pickle is not explicitly set.
  
NOTE: By applying this update the behavior of python-numpy changes, which might break your application.
In order to get the old behaviour back, you have to explicitly set `allow_pickle` to True. Be aware
that this should only be done for trusted input, as loading untrusted input might lead to arbitrary code
execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-12"/>
	<updated date="2019-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122208">SUSE bug 1122208</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6446/">CVE-2019-6446 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6446">CVE-2019-6446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574767" comment="python-numpy-1.3.0-1.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217716" version="1" class="patch">
	<metadata>
		<title>Security update for python-pam</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="751005" ref_url="https://bugzilla.suse.com/751005" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-1502" ref_url="https://www.suse.com/security/cve/CVE-2012-1502/" source="CVE"/>
		<description>

python-pam was prone to a double-free issue which is fixed by this update. 
(CVE-2012-1502).

Security Issues:

    * CVE-2012-1502
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1502&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-03-22"/>
	<updated date="2012-03-22"/>
	<bugzilla href="https://bugzilla.suse.com/751005">SUSE bug 751005</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1502/">CVE-2012-1502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1502">CVE-2012-1502 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992325" comment="python-pam-0.5.0-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217717" version="1" class="patch">
	<metadata>
		<title>Recommended update for python-pywbem</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="856108" ref_url="https://bugzilla.suse.com/856108" source="BUGZILLA"/>
		<reference ref_id="856323" ref_url="https://bugzilla.suse.com/856323" source="BUGZILLA"/>
		<reference ref_id="876783" ref_url="https://bugzilla.suse.com/876783" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6418" ref_url="https://www.suse.com/security/cve/CVE-2013-6418/" source="CVE"/>
		<description>

This update for python-pywbem fixes the following issue:

    * Do not remove 'pwd' library from the import list. (bnc#876783)

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-04"/>
	<updated date="2014-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/856108">SUSE bug 856108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856323">SUSE bug 856323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876783">SUSE bug 876783</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6418/">CVE-2013-6418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6418">CVE-2013-6418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992326" comment="python-pywbem-0.7-6.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217718" version="1" class="patch">
	<metadata>
		<title>Security update for libpython2_6-1_0, libpython2_6-1_0-32bit, libpython2_6-1_0-x86, python, python-32bit, python-base, python-base-32bit, python-base-debuginfo, python-base-debuginfo-32bit, python-base-debuginfo-x86, python-base-debugsource, python-base-x86, python-curses, python-debuginfo, python-debuginfo-32bit, python-debuginfo-x86, python-debugsource, python-demo, python-devel, python-doc, python-doc-pdf, python-gdbm, python-idle, python-tk, python-x86, python-xml</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="744287" ref_url="https://bugzilla.suse.com/744287" source="BUGZILLA"/>
		<reference ref_id="747125" ref_url="https://bugzilla.suse.com/747125" source="BUGZILLA"/>
		<reference ref_id="748079" ref_url="https://bugzilla.suse.com/748079" source="BUGZILLA"/>
		<reference ref_id="751714" ref_url="https://bugzilla.suse.com/751714" source="BUGZILLA"/>
		<reference ref_id="751718" ref_url="https://bugzilla.suse.com/751718" source="BUGZILLA"/>
		<reference ref_id="752375" ref_url="https://bugzilla.suse.com/752375" source="BUGZILLA"/>
		<reference ref_id="754447" ref_url="https://bugzilla.suse.com/754447" source="BUGZILLA"/>
		<reference ref_id="754547" ref_url="https://bugzilla.suse.com/754547" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1015" ref_url="https://www.suse.com/security/cve/CVE-2011-1015/" source="CVE"/>
		<reference ref_id="CVE-2011-1521" ref_url="https://www.suse.com/security/cve/CVE-2011-1521/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<description>

This update to python 2.6.8 fixes the following bugs, among others:

    * XMLRPC Server DoS (CVE-2012-0845, bnc#747125)
    * hash randomization issues (CVE-2012-1150, bnc#751718)
    * insecure creation of .pypirc (CVE-2011-4944, bnc#754447)
    * SimpleHTTPServer XSS (CVE-2011-1015, bnc#752375)
    * functions can accept unicode kwargs (bnc#744287)
    * python MainThread lacks ident (bnc#754547)
    * TypeError: waitpid() takes no keyword arguments (bnc#751714)
    * Source code exposure in CGIHTTPServer module (CVE-2011-1015,
      bnc#674646)
    * Insecure redirect processing in urllib2 (CVE-2011-1521, bnc#682554)

The hash randomization fix is by default disabled to keep compatibility 
with existing python code when it extracts hashes.

To enable the hash seed randomization you can use: - pass -R to the python 
interpreter commandline. - set the environment variable 
PYTHONHASHSEED=random to enable it for programs. You can also set this 
environment variable to a fixed hash seed by specifying a integer value 
between 0 and MAX_UINT.

In generally enabling this is only needed when malicious third parties can 
inject values into your hash tables.

The update to 2.6.8 also provides many compatibility fixes with OpenStack.

Security Issues:

    * CVE-2011-1015
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1015&gt;
    * CVE-2011-1521
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1521&gt;
    * CVE-2011-4944
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4944&gt;
    * CVE-2012-0845
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0845&gt;
    * CVE-2012-1150
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1150&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-05-17"/>
	<updated date="2012-05-17"/>
	<bugzilla href="https://bugzilla.suse.com/744287">SUSE bug 744287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747125">SUSE bug 747125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748079">SUSE bug 748079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751714">SUSE bug 751714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751718">SUSE bug 751718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752375">SUSE bug 752375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754447">SUSE bug 754447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754547">SUSE bug 754547</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1015/">CVE-2011-1015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1015">CVE-2011-1015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1521/">CVE-2011-1521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1521">CVE-2011-1521 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4944">CVE-2011-4944 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0845">CVE-2012-0845 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1150">CVE-2012-1150 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992327" comment="libpython2_6-1_0-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992328" comment="libpython2_6-1_0-32bit-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992329" comment="python-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992330" comment="python-32bit-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992331" comment="python-base-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992332" comment="python-base-32bit-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992333" comment="python-curses-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992334" comment="python-demo-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574779" comment="python-doc-2.6-8.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574780" comment="python-doc-pdf-2.6-8.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992335" comment="python-gdbm-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992336" comment="python-idle-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992337" comment="python-tk-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992338" comment="python-xml-2.6.8-0.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217719" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1068664" ref_url="https://bugzilla.suse.com/1068664" source="BUGZILLA"/>
		<reference ref_id="1079300" ref_url="https://bugzilla.suse.com/1079300" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<reference ref_id="CVE-2018-1000030" ref_url="https://www.suse.com/security/cve/CVE-2018-1000030/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

Security issues fixed:

- CVE-2017-1000158: Fixed integer overflows in PyString_DecodeEscape that could have resulted in
  heap-based buffer overflow attacks and possible arbitrary code execution (bsc#1068664).
- CVE-2018-1000030: Fixed crash inside the Python interpreter when multiple threads used the same
  I/O stream concurrently (bsc#1079300).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-07"/>
	<updated date="2018-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068664">SUSE bug 1068664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079300">SUSE bug 1079300</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000158">CVE-2017-1000158 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000030/">CVE-2018-1000030 at SUSE</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000030">CVE-2018-1000030 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574786" comment="libpython2_7-1_0-2.7.9-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574787" comment="libpython2_7-1_0-32bit-2.7.9-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574788" comment="python27-2.7.9-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574789" comment="python27-32bit-2.7.9-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574790" comment="python27-base-2.7.9-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574791" comment="python27-base-32bit-2.7.9-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574792" comment="python27-curses-2.7.9-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574793" comment="python27-demo-2.7.9-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574794" comment="python27-devel-2.7.9-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574795" comment="python27-doc-2.7.9-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574796" comment="python27-doc-pdf-2.7.9-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574797" comment="python27-gdbm-2.7.9-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574798" comment="python27-idle-2.7.9-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574799" comment="python27-tk-2.7.9-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574800" comment="python27-xml-2.7.9-6.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217720" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1083507" ref_url="https://bugzilla.suse.com/1083507" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

The following security vulnerabilities were addressed:

- Add a check to Lib/wave.py that verifies that at least one channel is
  provided. Prior to this, attackers could cause a denial of service via a
  crafted wav format audio file. [bsc#1083507, CVE-2017-18207]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-13"/>
	<updated date="2018-06-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083507">SUSE bug 1083507</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18207">CVE-2017-18207 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574801" comment="libpython2_7-1_0-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574802" comment="libpython2_7-1_0-32bit-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574803" comment="python27-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574804" comment="python27-32bit-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574805" comment="python27-base-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574806" comment="python27-base-32bit-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574807" comment="python27-curses-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574808" comment="python27-demo-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574809" comment="python27-devel-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574810" comment="python27-doc-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574811" comment="python27-doc-pdf-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574812" comment="python27-gdbm-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574813" comment="python27-idle-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574814" comment="python27-tk-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574815" comment="python27-xml-2.7.9-6.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217721" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1109663" ref_url="https://bugzilla.suse.com/1109663" source="BUGZILLA"/>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802/" source="CVE"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<description>
This update for python27 fixes the following issue:

- CVE-2018-1000802: Prevent command injection in shutil module (make_archive
  function) via passage of unfiltered user input (bsc#1109663)
- CVE-2018-14647: Python's elementtree C accelerator failed to initialise
  Expat's hash salt during initialization. This could make it easy to conduct
  denial of service attacks against Expat by constructing an XML document that
  would cause pathological hash collisions in Expat's internal data structures,
  consuming large amounts CPU and RAM (bsc#1109847).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-04"/>
	<updated date="2018-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1109663">SUSE bug 1109663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000802">CVE-2018-1000802 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14647">CVE-2018-14647 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574816" comment="libpython2_7-1_0-2.7.9-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574817" comment="libpython2_7-1_0-32bit-2.7.9-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574818" comment="python27-2.7.9-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574819" comment="python27-32bit-2.7.9-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574820" comment="python27-base-2.7.9-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574821" comment="python27-base-32bit-2.7.9-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574822" comment="python27-curses-2.7.9-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574823" comment="python27-demo-2.7.9-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574824" comment="python27-devel-2.7.9-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574825" comment="python27-doc-2.7.9-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574826" comment="python27-doc-pdf-2.7.9-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574827" comment="python27-gdbm-2.7.9-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574828" comment="python27-idle-2.7.9-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574829" comment="python27-tk-2.7.9-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574830" comment="python27-xml-2.7.9-6.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217722" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1122191" ref_url="https://bugzilla.suse.com/1122191" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

Security issue fixed:

- CVE-2019-5010: Fixed a denial-of-service vulnerability in the X509 certificate parser (bsc#1122191)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-25"/>
	<updated date="2019-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5010">CVE-2019-5010 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574831" comment="libpython2_7-1_0-2.7.9-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574832" comment="libpython2_7-1_0-32bit-2.7.9-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574833" comment="python27-2.7.9-6.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574834" comment="python27-32bit-2.7.9-6.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574835" comment="python27-base-2.7.9-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574836" comment="python27-base-32bit-2.7.9-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574837" comment="python27-curses-2.7.9-6.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574838" comment="python27-demo-2.7.9-6.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574839" comment="python27-devel-2.7.9-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574840" comment="python27-doc-2.7.9-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574841" comment="python27-doc-pdf-2.7.9-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574842" comment="python27-gdbm-2.7.9-6.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574843" comment="python27-idle-2.7.9-6.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574844" comment="python27-tk-2.7.9-6.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574845" comment="python27-xml-2.7.9-6.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217723" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="1130847" ref_url="https://bugzilla.suse.com/1130847" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9948" ref_url="https://www.suse.com/security/cve/CVE-2019-9948/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:
Security issues fixed:

- CVE-2019-9948: Fixed a 'file:' blacklist bypass in URIs by using the 'local-file:' scheme instead (bsc#1130847).
- CVE-2019-9636: Fixed an information disclosure because of incorrect handling of Unicode encoding during NFKC normalization (bsc#1129346).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-15"/>
	<updated date="2019-04-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130847">SUSE bug 1130847</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9636">CVE-2019-9636 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9948/">CVE-2019-9948 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9948">CVE-2019-9948 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574846" comment="libpython2_7-1_0-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574847" comment="libpython2_7-1_0-32bit-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574848" comment="python27-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574849" comment="python27-32bit-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574850" comment="python27-base-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574851" comment="python27-base-32bit-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574852" comment="python27-curses-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574853" comment="python27-demo-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574854" comment="python27-devel-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574855" comment="python27-doc-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574856" comment="python27-doc-pdf-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574857" comment="python27-gdbm-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574858" comment="python27-idle-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574859" comment="python27-tk-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574860" comment="python27-xml-2.7.9-6.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217724" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1149955" ref_url="https://bugzilla.suse.com/1149955" source="BUGZILLA"/>
		<reference ref_id="1153238" ref_url="https://bugzilla.suse.com/1153238" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

Security issue fixed:

- CVE-2019-16056: Fixed a parser issue in the email module. (bsc#1149955)
- CVE-2019-16935: Fixed a reflected XSS in python/Lib/DocXMLRPCServer.py (bsc#1153238).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-18"/>
	<updated date="2019-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153238">SUSE bug 1153238</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16056">CVE-2019-16056 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16935">CVE-2019-16935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574861" comment="libpython2_7-1_0-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574862" comment="libpython2_7-1_0-32bit-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574863" comment="python27-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574864" comment="python27-32bit-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574865" comment="python27-base-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574866" comment="python27-base-32bit-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574867" comment="python27-curses-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574868" comment="python27-demo-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574869" comment="python27-devel-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574870" comment="python27-doc-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574871" comment="python27-doc-pdf-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574872" comment="python27-gdbm-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574873" comment="python27-idle-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574874" comment="python27-tk-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574875" comment="python27-xml-2.7.16-6.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217725" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="1162825" ref_url="https://bugzilla.suse.com/1162825" source="BUGZILLA"/>
		<reference ref_id="1165894" ref_url="https://bugzilla.suse.com/1165894" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

python27 was updated to version 2.7.17. 

- CVE-2019-18348: Fixed a CRLF injection via the host part 
  of the url passed to urlopen(). Now an InvalidURL exception 
  is raised (bsc#1155094).
- CVE-2019-9674: Improved the documentation to reflect the dangers of zip-bombs (bsc#1162825).
- CVE-2020-8492: Fixed a regular expression in urllib that was prone to denial of service via HTTP (bsc#1162367).	  
- Unified packages among openSUSE:Factory and SLE versions (bsc#1159035).
- Added idle.desktop and idle.appdata.xml to provide IDLE in menus (bsc#1153830).
- Changed name of idle27 icons to idle27.png (bsc#1165894).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-27"/>
	<updated date="2020-03-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165894">SUSE bug 1165894</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">CVE-2019-18348 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">CVE-2019-9674 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574876" comment="libpython2_7-1_0-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574877" comment="libpython2_7-1_0-32bit-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574878" comment="python-rpm-macros-20190408.32abece-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574879" comment="python27-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574880" comment="python27-32bit-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574881" comment="python27-base-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574882" comment="python27-base-32bit-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574883" comment="python27-curses-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574884" comment="python27-demo-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574885" comment="python27-devel-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574886" comment="python27-doc-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574887" comment="python27-doc-pdf-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574888" comment="python27-gdbm-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574889" comment="python27-idle-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574890" comment="python27-tk-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574891" comment="python27-xml-2.7.17-6.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217726" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1174091" ref_url="https://bugzilla.suse.com/1174091" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

- CVE-2019-20907, bsc#1174091: avoiding possible infinite loop in specifically crafted tarball.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-09"/>
	<updated date="2020-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574892" comment="libpython2_7-1_0-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574893" comment="libpython2_7-1_0-32bit-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574894" comment="python27-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574895" comment="python27-32bit-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574896" comment="python27-base-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574897" comment="python27-base-32bit-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574898" comment="python27-curses-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574899" comment="python27-demo-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574900" comment="python27-devel-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574901" comment="python27-doc-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574902" comment="python27-doc-pdf-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574903" comment="python27-gdbm-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574904" comment="python27-idle-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574905" comment="python27-tk-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574906" comment="python27-xml-2.7.17-6.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217727" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

 - Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574907" comment="libpython2_7-1_0-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574908" comment="libpython2_7-1_0-32bit-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574909" comment="python27-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574910" comment="python27-32bit-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574911" comment="python27-base-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574912" comment="python27-base-32bit-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574913" comment="python27-curses-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574914" comment="python27-demo-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574915" comment="python27-devel-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574916" comment="python27-doc-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574917" comment="python27-doc-pdf-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574918" comment="python27-gdbm-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574919" comment="python27-idle-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574920" comment="python27-tk-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574921" comment="python27-xml-2.7.17-6.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217728" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="1181126" ref_url="https://bugzilla.suse.com/1181126" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

- buffer overflow in PyCArg_repr in _ctypes/callproc.c,
  which may lead to remote code execution (bsc#1181126, CVE-2021-3177).
- Provide the newest setuptools wheel (bsc#1176262,
  CVE-2019-20916) in their correct form (bsc#1180686).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-08"/>
	<updated date="2021-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181126">SUSE bug 1181126</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574922" comment="libpython2_7-1_0-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574923" comment="libpython2_7-1_0-32bit-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574924" comment="python27-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574925" comment="python27-32bit-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574926" comment="python27-base-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574927" comment="python27-base-32bit-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574928" comment="python27-curses-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574929" comment="python27-demo-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574930" comment="python27-devel-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574931" comment="python27-doc-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574932" comment="python27-doc-pdf-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574933" comment="python27-gdbm-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574934" comment="python27-idle-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574935" comment="python27-tk-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574936" comment="python27-xml-2.7.17-6.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217729" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1182379" ref_url="https://bugzilla.suse.com/1182379" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

- python27 was upgraded to 2.7.18 	  
- CVE-2021-23336: Fixed a potential web cache poisoning by using a 
  semicolon in query parameters use of semicolon as a query string 
  separator (bsc#1182379).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-04"/>
	<updated date="2021-03-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182379">SUSE bug 1182379</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574937" comment="libpython2_7-1_0-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574938" comment="libpython2_7-1_0-32bit-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574939" comment="python27-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574940" comment="python27-32bit-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574941" comment="python27-base-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574942" comment="python27-base-32bit-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574943" comment="python27-curses-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574944" comment="python27-demo-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574945" comment="python27-devel-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574946" comment="python27-doc-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574947" comment="python27-doc-pdf-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574948" comment="python27-gdbm-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574949" comment="python27-idle-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574950" comment="python27-tk-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574951" comment="python27-xml-2.7.18-6.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217730" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1177211" ref_url="https://bugzilla.suse.com/1177211" source="BUGZILLA"/>
		<reference ref_id="1187668" ref_url="https://bugzilla.suse.com/1187668" source="BUGZILLA"/>
		<reference ref_id="1189241" ref_url="https://bugzilla.suse.com/1189241" source="BUGZILLA"/>
		<reference ref_id="1189287" ref_url="https://bugzilla.suse.com/1189287" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<reference ref_id="CVE-2021-3733" ref_url="https://www.suse.com/security/cve/CVE-2021-3733/" source="CVE"/>
		<reference ref_id="CVE-2021-3737" ref_url="https://www.suse.com/security/cve/CVE-2021-3737/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

- CVE-2021-3737: Fixed http client infinite line reading (DoS) after a http 100. (bsc#1189241)
- CVE-2021-3733: Fixed ReDoS in urllib.request. (bsc#1189287)
- CVE-2020-26116: Fixed a CRLF injection via HTTP request method in httplib/http.client. (bsc#1177211)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-30"/>
	<updated date="2021-09-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187668">SUSE bug 1187668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189241">SUSE bug 1189241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189287">SUSE bug 1189287</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26116">CVE-2020-26116 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3733/">CVE-2021-3733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3733">CVE-2021-3733 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3737/">CVE-2021-3737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3737">CVE-2021-3737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634733" comment="libpython2_7-1_0-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634734" comment="libpython2_7-1_0-32bit-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634735" comment="python27-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634736" comment="python27-32bit-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634737" comment="python27-base-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634738" comment="python27-base-32bit-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634739" comment="python27-curses-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634740" comment="python27-demo-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634741" comment="python27-devel-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634742" comment="python27-doc-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634743" comment="python27-doc-pdf-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634744" comment="python27-gdbm-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634745" comment="python27-idle-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634746" comment="python27-tk-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634747" comment="python27-xml-2.7.18-6.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217731" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1194146" ref_url="https://bugzilla.suse.com/1194146" source="BUGZILLA"/>
		<reference ref_id="1195396" ref_url="https://bugzilla.suse.com/1195396" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4189" ref_url="https://www.suse.com/security/cve/CVE-2021-4189/" source="CVE"/>
		<reference ref_id="CVE-2022-0391" ref_url="https://www.suse.com/security/cve/CVE-2022-0391/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

- CVE-2022-0391: Fixed newline and tabs sanitation in urllib.parse (bsc#1195396).
- CVE-2021-4189: Fixed incorrect trust of PASV response (bsc#1194146).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-25"/>
	<updated date="2022-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194146">SUSE bug 1194146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195396">SUSE bug 1195396</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4189/">CVE-2021-4189 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4189">CVE-2021-4189 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-0391/">CVE-2022-0391 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0391">CVE-2022-0391 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668229" comment="libpython2_7-1_0-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668230" comment="libpython2_7-1_0-32bit-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668231" comment="python27-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668232" comment="python27-32bit-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668233" comment="python27-base-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668234" comment="python27-base-32bit-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668235" comment="python27-curses-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668236" comment="python27-demo-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668237" comment="python27-devel-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668238" comment="python27-doc-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668239" comment="python27-doc-pdf-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668240" comment="python27-gdbm-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668241" comment="python27-idle-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668242" comment="python27-tk-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668243" comment="python27-xml-2.7.18-6.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217732" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1186819" ref_url="https://bugzilla.suse.com/1186819" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3572" ref_url="https://www.suse.com/security/cve/CVE-2021-3572/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

- CVE-2021-3572: Fixed an improper handling of unicode characters in pip (bsc#1186819).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186819">SUSE bug 1186819</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3572/">CVE-2021-3572 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3572">CVE-2021-3572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677044" comment="libpython2_7-1_0-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677045" comment="libpython2_7-1_0-32bit-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677046" comment="python27-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677047" comment="python27-32bit-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677048" comment="python27-base-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677049" comment="python27-base-32bit-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677050" comment="python27-curses-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677051" comment="python27-demo-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677052" comment="python27-devel-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677053" comment="python27-doc-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677054" comment="python27-doc-pdf-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677055" comment="python27-gdbm-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677056" comment="python27-idle-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677057" comment="python27-tk-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677058" comment="python27-xml-2.7.18-6.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217733" version="1" class="patch">
	<metadata>
		<title>Recommended update for python 2.7 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1007084" ref_url="https://bugzilla.suse.com/1007084" source="BUGZILLA"/>
		<reference ref_id="1014478" ref_url="https://bugzilla.suse.com/1014478" source="BUGZILLA"/>
		<reference ref_id="1015776" ref_url="https://bugzilla.suse.com/1015776" source="BUGZILLA"/>
		<reference ref_id="1054106" ref_url="https://bugzilla.suse.com/1054106" source="BUGZILLA"/>
		<reference ref_id="1054413" ref_url="https://bugzilla.suse.com/1054413" source="BUGZILLA"/>
		<reference ref_id="1064755" ref_url="https://bugzilla.suse.com/1064755" source="BUGZILLA"/>
		<reference ref_id="1073879" ref_url="https://bugzilla.suse.com/1073879" source="BUGZILLA"/>
		<reference ref_id="1075263" ref_url="https://bugzilla.suse.com/1075263" source="BUGZILLA"/>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1097455" ref_url="https://bugzilla.suse.com/1097455" source="BUGZILLA"/>
		<reference ref_id="1098681" ref_url="https://bugzilla.suse.com/1098681" source="BUGZILLA"/>
		<reference ref_id="905354" ref_url="https://bugzilla.suse.com/905354" source="BUGZILLA"/>
		<reference ref_id="962170" ref_url="https://bugzilla.suse.com/962170" source="BUGZILLA"/>
		<reference ref_id="974705" ref_url="https://bugzilla.suse.com/974705" source="BUGZILLA"/>
		<reference ref_id="974993" ref_url="https://bugzilla.suse.com/974993" source="BUGZILLA"/>
		<reference ref_id="975949" ref_url="https://bugzilla.suse.com/975949" source="BUGZILLA"/>
		<reference ref_id="998103" ref_url="https://bugzilla.suse.com/998103" source="BUGZILLA"/>
		<reference ref_id="998378" ref_url="https://bugzilla.suse.com/998378" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12880" ref_url="https://www.suse.com/security/cve/CVE-2017-12880/" source="CVE"/>
		<description>

This update provides various modules for Python 2.7.

It also updates python 2.7 to the 2.7.16 release, fixing security issues and bugs.

The following packages are included in the update:

- cloud-init
- growpart
- python27-argparse
- python27-blinker
- python27-boto3
- python27-botocore
- python27-cffi
- python27-Cheetah
- python27-configobj
- python27-cryptography
- python27-dateutil
- python27-docutils
- python27-ecdsa
- python27-enum34
- python27-futures
- python27-httplib2
- python27-idna
- python27-ipaddress
- python27-Jinja2
- python27-jmespath
- python27-jsonpatch
- python27-jsonpointer
- python27-jsonschema
- python27-lockfile
- python27-MarkupSafe
- python27-oauthlib
- python27-oauth
- python27-paramiko
- python27-ply
- python27-PrettyTable
- python27-pyasn1-modules
- python27-pyasn1
- python27-pycparser
- python27-pycrypto
- python27-PyJWT
- python27-pyserial
- python27-pytest
- python27-python-daemon
- python27-PyYAML
- python27-requests
- python27-s3transfer
- python27-setuptools
- python27-simplejson
- python27-six
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-03"/>
	<updated date="2019-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007084">SUSE bug 1007084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014478">SUSE bug 1014478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015776">SUSE bug 1015776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054106">SUSE bug 1054106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054413">SUSE bug 1054413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064755">SUSE bug 1064755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073879">SUSE bug 1073879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075263">SUSE bug 1075263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097455">SUSE bug 1097455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098681">SUSE bug 1098681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905354">SUSE bug 905354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962170">SUSE bug 962170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974705">SUSE bug 974705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974993">SUSE bug 974993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975949">SUSE bug 975949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998103">SUSE bug 998103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998378">SUSE bug 998378</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12880/">CVE-2017-12880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-12880">CVE-2017-12880 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574952" comment="libpython2_7-1_0-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574953" comment="libpython2_7-1_0-32bit-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574954" comment="python27-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574955" comment="python27-32bit-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574956" comment="python27-base-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574957" comment="python27-base-32bit-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574958" comment="python27-curses-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574959" comment="python27-demo-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574960" comment="python27-devel-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574961" comment="python27-doc-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574962" comment="python27-doc-pdf-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574963" comment="python27-gdbm-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574964" comment="python27-idle-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574965" comment="python27-setuptools-18.0.1-4.2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574966" comment="python27-tk-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574967" comment="python27-xml-2.7.16-6.29.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217734" version="1" class="patch">
	<metadata>
		<title>Security update for quagga</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="634300" ref_url="https://bugzilla.suse.com/634300" source="BUGZILLA"/>
		<reference ref_id="654270" ref_url="https://bugzilla.suse.com/654270" source="BUGZILLA"/>
		<reference ref_id="677335" ref_url="https://bugzilla.suse.com/677335" source="BUGZILLA"/>
		<reference ref_id="718056" ref_url="https://bugzilla.suse.com/718056" source="BUGZILLA"/>
		<reference ref_id="718058" ref_url="https://bugzilla.suse.com/718058" source="BUGZILLA"/>
		<reference ref_id="718059" ref_url="https://bugzilla.suse.com/718059" source="BUGZILLA"/>
		<reference ref_id="718061" ref_url="https://bugzilla.suse.com/718061" source="BUGZILLA"/>
		<reference ref_id="718062" ref_url="https://bugzilla.suse.com/718062" source="BUGZILLA"/>
		<reference ref_id="752204" ref_url="https://bugzilla.suse.com/752204" source="BUGZILLA"/>
		<reference ref_id="752205" ref_url="https://bugzilla.suse.com/752205" source="BUGZILLA"/>
		<reference ref_id="752206" ref_url="https://bugzilla.suse.com/752206" source="BUGZILLA"/>
		<reference ref_id="759081" ref_url="https://bugzilla.suse.com/759081" source="BUGZILLA"/>
		<reference ref_id="822572" ref_url="https://bugzilla.suse.com/822572" source="BUGZILLA"/>
		<reference ref_id="828117" ref_url="https://bugzilla.suse.com/828117" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-1674" ref_url="https://www.suse.com/security/cve/CVE-2010-1674/" source="CVE"/>
		<reference ref_id="CVE-2010-1675" ref_url="https://www.suse.com/security/cve/CVE-2010-1675/" source="CVE"/>
		<reference ref_id="CVE-2010-2948" ref_url="https://www.suse.com/security/cve/CVE-2010-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-2949" ref_url="https://www.suse.com/security/cve/CVE-2010-2949/" source="CVE"/>
		<reference ref_id="CVE-2011-3323" ref_url="https://www.suse.com/security/cve/CVE-2011-3323/" source="CVE"/>
		<reference ref_id="CVE-2011-3324" ref_url="https://www.suse.com/security/cve/CVE-2011-3324/" source="CVE"/>
		<reference ref_id="CVE-2011-3325" ref_url="https://www.suse.com/security/cve/CVE-2011-3325/" source="CVE"/>
		<reference ref_id="CVE-2011-3326" ref_url="https://www.suse.com/security/cve/CVE-2011-3326/" source="CVE"/>
		<reference ref_id="CVE-2011-3327" ref_url="https://www.suse.com/security/cve/CVE-2011-3327/" source="CVE"/>
		<reference ref_id="CVE-2012-0249" ref_url="https://www.suse.com/security/cve/CVE-2012-0249/" source="CVE"/>
		<reference ref_id="CVE-2012-0250" ref_url="https://www.suse.com/security/cve/CVE-2012-0250/" source="CVE"/>
		<reference ref_id="CVE-2012-0255" ref_url="https://www.suse.com/security/cve/CVE-2012-0255/" source="CVE"/>
		<reference ref_id="CVE-2012-1820" ref_url="https://www.suse.com/security/cve/CVE-2012-1820/" source="CVE"/>
		<reference ref_id="CVE-2013-0149" ref_url="https://www.suse.com/security/cve/CVE-2013-0149/" source="CVE"/>
		<reference ref_id="CVE-2013-2236" ref_url="https://www.suse.com/security/cve/CVE-2013-2236/" source="CVE"/>
		<description>

This update of quagga fixes two security issues:

    * CVE-2013-0149: specially-crafted OSPF packets caused the routing
      table to be erased (bnc#822572)
    * CVE-2013-2236: local network stack overflow (bnc#828117)

Security Issue references:

    * CVE-2013-2236
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2236&gt;
    * CVE-2013-0149
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0149&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-22"/>
	<updated date="2013-08-22"/>
	<bugzilla href="https://bugzilla.suse.com/634300">SUSE bug 634300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/654270">SUSE bug 654270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/677335">SUSE bug 677335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/718056">SUSE bug 718056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/718058">SUSE bug 718058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/718059">SUSE bug 718059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/718061">SUSE bug 718061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/718062">SUSE bug 718062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752204">SUSE bug 752204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752205">SUSE bug 752205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752206">SUSE bug 752206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759081">SUSE bug 759081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822572">SUSE bug 822572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828117">SUSE bug 828117</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1674/">CVE-2010-1674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1674">CVE-2010-1674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1675/">CVE-2010-1675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1675">CVE-2010-1675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2948/">CVE-2010-2948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2948">CVE-2010-2948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2949/">CVE-2010-2949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2949">CVE-2010-2949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3323/">CVE-2011-3323 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3323">CVE-2011-3323 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3324/">CVE-2011-3324 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3324">CVE-2011-3324 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3325/">CVE-2011-3325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3325">CVE-2011-3325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3326/">CVE-2011-3326 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3326">CVE-2011-3326 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3327/">CVE-2011-3327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3327">CVE-2011-3327 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0249/">CVE-2012-0249 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0249">CVE-2012-0249 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0250/">CVE-2012-0250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0250">CVE-2012-0250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0255/">CVE-2012-0255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0255">CVE-2012-0255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1820/">CVE-2012-1820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1820">CVE-2012-1820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0149/">CVE-2013-0149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0149">CVE-2013-0149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2236/">CVE-2013-2236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2236">CVE-2013-2236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992339" comment="quagga-0.99.15-0.14.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992339" comment="quagga-0.99.15-0.14.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217735" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="970952" ref_url="https://bugzilla.suse.com/970952" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2342" ref_url="https://www.suse.com/security/cve/CVE-2016-2342/" source="CVE"/>
		<description>

This update for quagga fixes the following security issue:

- CVE-2016-2342: Quagga was extended the prefixlen check to ensure it is
  within the bound of the NLRI packet data and the on-stack prefix structure
  and the maximum size for the address family (bsc#970952).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-04"/>
	<updated date="2016-04-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/970952">SUSE bug 970952</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2342/">CVE-2016-2342 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2342">CVE-2016-2342 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574969" comment="quagga-0.99.15-0.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217736" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="770619" ref_url="https://bugzilla.suse.com/770619" source="BUGZILLA"/>
		<description>
This update for quagga fixes one security issue:

- bsc#770619: Disallow unprivileged users to enter config directory /etc/quagga
  (group: quagga, mode: 750) and read configuration files installed
  there (group: quagga, mode: 640).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-05"/>
	<updated date="2016-04-05"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/770619">SUSE bug 770619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574970" comment="quagga-0.99.15-0.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217737" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="977012" ref_url="https://bugzilla.suse.com/977012" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4049" ref_url="https://www.suse.com/security/cve/CVE-2016-4049/" source="CVE"/>
		<description>

This update for quagga fixes the following issue:

Security issue fixed:
- CVE-2016-4049: Fix for a buffer overflow error in bgp_dump_routes_func. (bsc#977012)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-03"/>
	<updated date="2016-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/977012">SUSE bug 977012</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4049/">CVE-2016-4049 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4049">CVE-2016-4049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574971" comment="quagga-0.99.15-0.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217738" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1005258" ref_url="https://bugzilla.suse.com/1005258" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1245" ref_url="https://www.suse.com/security/cve/CVE-2016-1245/" source="CVE"/>
		<description>

This update for quagga fixes the following issues:

- CVE-2016-1245: Fix for a zebra stack overrun in IPv6 RA receive code (bsc#1005258).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-19"/>
	<updated date="2016-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005258">SUSE bug 1005258</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1245/">CVE-2016-1245 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1245">CVE-2016-1245 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574972" comment="quagga-0.99.15-0.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217739" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1021669" ref_url="https://bugzilla.suse.com/1021669" source="BUGZILLA"/>
		<reference ref_id="1065641" ref_url="https://bugzilla.suse.com/1065641" source="BUGZILLA"/>
		<reference ref_id="1079798" ref_url="https://bugzilla.suse.com/1079798" source="BUGZILLA"/>
		<reference ref_id="1079799" ref_url="https://bugzilla.suse.com/1079799" source="BUGZILLA"/>
		<reference ref_id="1079800" ref_url="https://bugzilla.suse.com/1079800" source="BUGZILLA"/>
		<reference ref_id="1079801" ref_url="https://bugzilla.suse.com/1079801" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16227" ref_url="https://www.suse.com/security/cve/CVE-2017-16227/" source="CVE"/>
		<reference ref_id="CVE-2017-5495" ref_url="https://www.suse.com/security/cve/CVE-2017-5495/" source="CVE"/>
		<reference ref_id="CVE-2018-5378" ref_url="https://www.suse.com/security/cve/CVE-2018-5378/" source="CVE"/>
		<reference ref_id="CVE-2018-5379" ref_url="https://www.suse.com/security/cve/CVE-2018-5379/" source="CVE"/>
		<reference ref_id="CVE-2018-5380" ref_url="https://www.suse.com/security/cve/CVE-2018-5380/" source="CVE"/>
		<reference ref_id="CVE-2018-5381" ref_url="https://www.suse.com/security/cve/CVE-2018-5381/" source="CVE"/>
		<description>
This update for quagga fixes the following issues:

- The Quagga BGP daemon contained a bug in the AS_PATH size calculation that
  could have been exploited to facilitate a remote denial-of-service attack via
  specially crafted BGP UPDATE messages. [CVE-2017-16227, bsc#1065641]

- The Quagga BGP daemon did not check whether data sent to peers via NOTIFY had
  an invalid attribute length. It was possible to exploit this issue and cause
  the bgpd process to leak sensitive information over the network to a
  configured peer. [CVE-2018-5378, bsc#1079798]

- The Quagga BGP daemon used to double-free memory when processing certain
  forms of UPDATE messages. This issue could be exploited by sending an
  optional/transitive UPDATE attribute that all conforming eBGP speakers should
  pass along. Consequently, a single UPDATE message could have affected many
  bgpd processes across a wide area of a network. Through this vulnerability,
  attackers could potentially have taken over control of affected bgpd
  processes remotely. [CVE-2018-5379, bsc#1079799]

- It was possible to overrun internal BGP code-to-string conversion tables in
  the Quagga BGP daemon. Configured peers could have exploited this issue and
  cause bgpd to emit debug and warning messages into the logs that would
  contained arbitrary bytes. [CVE-2018-5380, bsc#1079800]

- The Quagga BGP daemon could have entered an infinite loop if sent an invalid
  OPEN message by a configured peer. If this issue was exploited, then bgpd
  would cease to respond to any other events. BGP sessions would have been
  dropped and not be reestablished. The CLI interface would have been
  unresponsive. The bgpd daemon would have stayed in this state until
  restarted. [CVE-2018-5381, bsc#1079801]

- The Quagga daemon's telnet 'vty' CLI contains an unbounded memory allocation
  bug that could be exploited for a denial-of-service attack on the daemon.
  This issue has been fixed. [CVE-2017-5495, bsc#1021669]

- The telnet 'vty' CLI of the Quagga daemon is no longer enabled by default,
  because the passwords in the default 'zebra.conf' config file are now
  disabled. The vty interface is available via 'vtysh' utility using pam
  authentication to permit management access for root without password.
  [bsc#1021669]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021669">SUSE bug 1021669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065641">SUSE bug 1065641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079798">SUSE bug 1079798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079799">SUSE bug 1079799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079800">SUSE bug 1079800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079801">SUSE bug 1079801</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16227/">CVE-2017-16227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16227">CVE-2017-16227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5495/">CVE-2017-5495 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5495">CVE-2017-5495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5378/">CVE-2018-5378 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5378">CVE-2018-5378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5379/">CVE-2018-5379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5379">CVE-2018-5379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5380/">CVE-2018-5380 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5380">CVE-2018-5380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5381/">CVE-2018-5381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5381">CVE-2018-5381 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574973" comment="quagga-0.99.15-0.30.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217740" version="1" class="patch">
	<metadata>
		<title>Security update for quota</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="636551" ref_url="https://bugzilla.suse.com/636551" source="BUGZILLA"/>
		<reference ref_id="687699" ref_url="https://bugzilla.suse.com/687699" source="BUGZILLA"/>
		<reference ref_id="728626" ref_url="https://bugzilla.suse.com/728626" source="BUGZILLA"/>
		<reference ref_id="772570" ref_url="https://bugzilla.suse.com/772570" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3417" ref_url="https://www.suse.com/security/cve/CVE-2012-3417/" source="CVE"/>
		<description>

The quota package was updated to fix an issue with tcp_wrappers, where 
hosts.allow/deny files would have not been correctly honored. 
(CVE-2012-3417)

Security Issue reference:

    * CVE-2012-3417
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3417&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-23"/>
	<updated date="2012-08-23"/>
	<bugzilla href="https://bugzilla.suse.com/636551">SUSE bug 636551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/687699">SUSE bug 687699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/728626">SUSE bug 728626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772570">SUSE bug 772570</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3417/">CVE-2012-3417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3417">CVE-2012-3417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992340" comment="quota-3.16-50.36.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992341" comment="quota-nfs-3.16-50.36.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217741" version="1" class="patch">
	<metadata>
		<title>Security update for radvd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="721968" ref_url="https://bugzilla.suse.com/721968" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3601" ref_url="https://www.suse.com/security/cve/CVE-2011-3601/" source="CVE"/>
		<reference ref_id="CVE-2011-3602" ref_url="https://www.suse.com/security/cve/CVE-2011-3602/" source="CVE"/>
		<reference ref_id="CVE-2011-3603" ref_url="https://www.suse.com/security/cve/CVE-2011-3603/" source="CVE"/>
		<reference ref_id="CVE-2011-3604" ref_url="https://www.suse.com/security/cve/CVE-2011-3604/" source="CVE"/>
		<reference ref_id="CVE-2011-3605" ref_url="https://www.suse.com/security/cve/CVE-2011-3605/" source="CVE"/>
		<description>

This update of radvd fixes the following security flaws:

    * arbitrary file overwrite flaw through unsanitized interface names
      (CVE-2011-3602),
    * missing return value checks in privsep_init() which could cause radvd
      to keep running with root privileges (CVE-2011-3603),
    * buffer overread flaws in the process_ra() function (CVE-2011-3604),
    * temporary denial of service flaw triggered by a flood of
      ND_ROUTER_SOLICIT (CVE-2011-3605)

Security Issue references:

    * CVE-2011-3601
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3601&gt;
    * CVE-2011-3602
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3602&gt;
    * CVE-2011-3603
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3603&gt;
    * CVE-2011-3604
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3604&gt;
    * CVE-2011-3605
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3605&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-11-09"/>
	<updated date="2011-11-09"/>
	<bugzilla href="https://bugzilla.suse.com/721968">SUSE bug 721968</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3601/">CVE-2011-3601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3601">CVE-2011-3601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3602/">CVE-2011-3602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3602">CVE-2011-3602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3603/">CVE-2011-3603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3603">CVE-2011-3603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3604/">CVE-2011-3604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3604">CVE-2011-3604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3605/">CVE-2011-3605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3605">CVE-2011-3605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992342" comment="radvd-1.1-1.24.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217742" version="1" class="patch">
	<metadata>
		<title>Security update for sendmail</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="881284" ref_url="https://bugzilla.suse.com/881284" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3956" ref_url="https://www.suse.com/security/cve/CVE-2014-3956/" source="CVE"/>
		<description>

sendmail has been updated to properly close file descriptors before 
executing programs.

These security issues were fixed:

    * Not properly closing file descriptors before executing programs
      (CVE-2014-3956).

Security Issues:

    * CVE-2014-3956
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3956&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-04"/>
	<updated date="2014-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/881284">SUSE bug 881284</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3956/">CVE-2014-3956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3956">CVE-2014-3956 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574977" comment="sendmail-8.14.3-50.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217743" version="1" class="patch">
	<metadata>
		<title>Recommended update for rsync</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="684387" ref_url="https://bugzilla.suse.com/684387" source="BUGZILLA"/>
		<reference ref_id="694030" ref_url="https://bugzilla.suse.com/694030" source="BUGZILLA"/>
		<reference ref_id="753035" ref_url="https://bugzilla.suse.com/753035" source="BUGZILLA"/>
		<reference ref_id="766313" ref_url="https://bugzilla.suse.com/766313" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1097" ref_url="https://www.suse.com/security/cve/CVE-2011-1097/" source="CVE"/>
		<description>

This collective update for rsync provides the following fixes:

    * Fix crash on Z_BUF_ERROR in see_deflate_token (bnc#753035)
    * call localtime() once before chroot to initialize time zone
      (bnc#766313)

		</description>
<advisory from="security@suse.de">
	<issued date="2012-06-25"/>
	<updated date="2012-06-25"/>
	<bugzilla href="https://bugzilla.suse.com/684387">SUSE bug 684387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/694030">SUSE bug 694030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/753035">SUSE bug 753035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/766313">SUSE bug 766313</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1097/">CVE-2011-1097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1097">CVE-2011-1097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992343" comment="rsync-3.0.4-2.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217744" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="900914" ref_url="https://bugzilla.suse.com/900914" source="BUGZILLA"/>
		<reference ref_id="915410" ref_url="https://bugzilla.suse.com/915410" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8242" ref_url="https://www.suse.com/security/cve/CVE-2014-8242/" source="CVE"/>
		<reference ref_id="CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512/" source="CVE"/>
		<description>

This update for rsync fixes two security issues:

- CVE-2014-8242: Checksum collisions leading to a denial of service (bsc#900914)
- CVE-2014-9512: Malicious servers could send files outside of the transferred directory (bsc#915410)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-15"/>
	<updated date="2016-01-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/900914">SUSE bug 900914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915410">SUSE bug 915410</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8242/">CVE-2014-8242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8242">CVE-2014-8242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9512">CVE-2014-9512 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574978" comment="rsync-3.0.4-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217745" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="791660" ref_url="https://bugzilla.suse.com/791660" source="BUGZILLA"/>
		<reference ref_id="915410" ref_url="https://bugzilla.suse.com/915410" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512/" source="CVE"/>
		<description>

This update for rsync fixes the following issues:

- CVE-2014-9512: rsync allowed remote attackers to write to arbitrary files via a
  symlink attack on a file in the synchronization path. (bsc#915410)
- The rsyncd daemon doesn't handle the HUP signal. Fix 'reload' action in the init
  script to restart the service. (bsc#791660)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-24"/>
	<updated date="2016-08-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/791660">SUSE bug 791660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915410">SUSE bug 915410</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9512">CVE-2014-9512 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574979" comment="rsync-3.0.4-2.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217746" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1066644" ref_url="https://bugzilla.suse.com/1066644" source="BUGZILLA"/>
		<reference ref_id="1071459" ref_url="https://bugzilla.suse.com/1071459" source="BUGZILLA"/>
		<reference ref_id="1071460" ref_url="https://bugzilla.suse.com/1071460" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16548" ref_url="https://www.suse.com/security/cve/CVE-2017-16548/" source="CVE"/>
		<reference ref_id="CVE-2017-17433" ref_url="https://www.suse.com/security/cve/CVE-2017-17433/" source="CVE"/>
		<reference ref_id="CVE-2017-17434" ref_url="https://www.suse.com/security/cve/CVE-2017-17434/" source="CVE"/>
		<description>
This update for rsync fixes several issues.

These security issues were fixed:

- CVE-2017-17434: The daemon in rsync did not check for fnamecmp filenames in
  the daemon_filter_list data structure (in the recv_files function in
  receiver.c) and also did not apply the sanitize_paths protection mechanism to
  pathnames found in 'xname follows' strings (in the read_ndx_and_attrs function
  in rsync.c), which allowed remote attackers to bypass intended access
  restrictions' (bsc#1071460).
- CVE-2017-17433: The recv_files function in receiver.c in the daemon in rsync,
  proceeded with certain file metadata updates before checking for a filename in
  the daemon_filter_list data structure, which allowed remote attackers to bypass
  intended access restrictions (bsc#1071459).
- CVE-2017-16548: The receive_xattr function in xattrs.c in rsync did not check
  for a trailing '\\0' character in an xattr name, which allowed remote attackers
  to cause a denial of service (heap-based buffer over-read and application
  crash) or possibly have unspecified other impact by sending crafted data to the
  daemon (bsc#1066644).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-10"/>
	<updated date="2018-01-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1066644">SUSE bug 1066644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071459">SUSE bug 1071459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071460">SUSE bug 1071460</bugzilla>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16548/">CVE-2017-16548 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16548">CVE-2017-16548 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17433/">CVE-2017-17433 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17433">CVE-2017-17433 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17434/">CVE-2017-17434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17434">CVE-2017-17434 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574980" comment="rsync-3.0.4-2.48.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217747" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1076503" ref_url="https://bugzilla.suse.com/1076503" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5764" ref_url="https://www.suse.com/security/cve/CVE-2018-5764/" source="CVE"/>
		<description>
This update for rsync fixes one issues.

This security issue was fixed:

- CVE-2018-5764: The parse_arguments function in options.c did not prevent
  multiple --protect-args uses, which allowed remote attackers to bypass an
  argument-sanitization protection mechanism (bsc#1076503)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-23"/>
	<updated date="2018-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076503">SUSE bug 1076503</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5764/">CVE-2018-5764 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5764">CVE-2018-5764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574981" comment="rsync-3.0.4-2.48.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217748" version="1" class="patch">
	<metadata>
		<title>Security update for rsyslog</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="632290" ref_url="https://bugzilla.suse.com/632290" source="BUGZILLA"/>
		<reference ref_id="682012" ref_url="https://bugzilla.suse.com/682012" source="BUGZILLA"/>
		<reference ref_id="897262" ref_url="https://bugzilla.suse.com/897262" source="BUGZILLA"/>
		<reference ref_id="899756" ref_url="https://bugzilla.suse.com/899756" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3634" ref_url="https://www.suse.com/security/cve/CVE-2014-3634/" source="CVE"/>
		<reference ref_id="CVE-2014-3683" ref_url="https://www.suse.com/security/cve/CVE-2014-3683/" source="CVE"/>
		<description>

rsyslog has been updated to fix a remote denial of service issue:

    * Under certain configurations, a local or remote attacker able to send
      syslog messages to the server could have crashed the log server due
      to an array overread. (CVE-2014-3634, CVE-2014-3683)

Security Issues:

    * CVE-2014-3634
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3634&gt;
    * CVE-2014-3683
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3683&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-06"/>
	<updated date="2014-10-06"/>
	<bugzilla href="https://bugzilla.suse.com/632290">SUSE bug 632290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682012">SUSE bug 682012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897262">SUSE bug 897262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899756">SUSE bug 899756</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3634/">CVE-2014-3634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3634">CVE-2014-3634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3683/">CVE-2014-3683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3683">CVE-2014-3683 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992344" comment="rsyslog-3.18.3-7.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217749" version="1" class="patch">
	<metadata>
		<title>Security update for ruby</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="554178" ref_url="https://bugzilla.suse.com/554178" source="BUGZILLA"/>
		<reference ref_id="570616" ref_url="https://bugzilla.suse.com/570616" source="BUGZILLA"/>
		<reference ref_id="600752" ref_url="https://bugzilla.suse.com/600752" source="BUGZILLA"/>
		<reference ref_id="673740" ref_url="https://bugzilla.suse.com/673740" source="BUGZILLA"/>
		<reference ref_id="673750" ref_url="https://bugzilla.suse.com/673750" source="BUGZILLA"/>
		<reference ref_id="682287" ref_url="https://bugzilla.suse.com/682287" source="BUGZILLA"/>
		<reference ref_id="697384" ref_url="https://bugzilla.suse.com/697384" source="BUGZILLA"/>
		<reference ref_id="783525" ref_url="https://bugzilla.suse.com/783525" source="BUGZILLA"/>
		<reference ref_id="808137" ref_url="https://bugzilla.suse.com/808137" source="BUGZILLA"/>
		<reference ref_id="827265" ref_url="https://bugzilla.suse.com/827265" source="BUGZILLA"/>
		<reference ref_id="851803" ref_url="https://bugzilla.suse.com/851803" source="BUGZILLA"/>
		<reference ref_id="902851" ref_url="https://bugzilla.suse.com/902851" source="BUGZILLA"/>
		<reference ref_id="905326" ref_url="https://bugzilla.suse.com/905326" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2009-4492" ref_url="https://www.suse.com/security/cve/CVE-2009-4492/" source="CVE"/>
		<reference ref_id="CVE-2010-0541" ref_url="https://www.suse.com/security/cve/CVE-2010-0541/" source="CVE"/>
		<reference ref_id="CVE-2011-0188" ref_url="https://www.suse.com/security/cve/CVE-2011-0188/" source="CVE"/>
		<reference ref_id="CVE-2011-1004" ref_url="https://www.suse.com/security/cve/CVE-2011-1004/" source="CVE"/>
		<reference ref_id="CVE-2011-1005" ref_url="https://www.suse.com/security/cve/CVE-2011-1005/" source="CVE"/>
		<reference ref_id="CVE-2012-4481" ref_url="https://www.suse.com/security/cve/CVE-2012-4481/" source="CVE"/>
		<reference ref_id="CVE-2012-4522" ref_url="https://www.suse.com/security/cve/CVE-2012-4522/" source="CVE"/>
		<reference ref_id="CVE-2013-1821" ref_url="https://www.suse.com/security/cve/CVE-2013-1821/" source="CVE"/>
		<reference ref_id="CVE-2013-4073" ref_url="https://www.suse.com/security/cve/CVE-2013-4073/" source="CVE"/>
		<reference ref_id="CVE-2013-4164" ref_url="https://www.suse.com/security/cve/CVE-2013-4164/" source="CVE"/>
		<reference ref_id="CVE-2014-8080" ref_url="https://www.suse.com/security/cve/CVE-2014-8080/" source="CVE"/>
		<reference ref_id="CVE-2014-8090" ref_url="https://www.suse.com/security/cve/CVE-2014-8090/" source="CVE"/>
		<description>

This Ruby update fixes the following security issue:

    * bnc#808137: Fixed entity expansion DoS vulnerability in REXML
      (CVE-2013-1821).

Security Issue reference:

    * CVE-2013-1821
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1821&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-15"/>
	<updated date="2014-04-15"/>
	<bugzilla href="https://bugzilla.suse.com/554178">SUSE bug 554178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/570616">SUSE bug 570616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/600752">SUSE bug 600752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/673740">SUSE bug 673740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/673750">SUSE bug 673750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682287">SUSE bug 682287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/697384">SUSE bug 697384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/783525">SUSE bug 783525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808137">SUSE bug 808137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827265">SUSE bug 827265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851803">SUSE bug 851803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902851">SUSE bug 902851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905326">SUSE bug 905326</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0689">CVE-2009-0689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4492/">CVE-2009-4492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4492">CVE-2009-4492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0541/">CVE-2010-0541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0541">CVE-2010-0541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0188/">CVE-2011-0188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0188">CVE-2011-0188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1004/">CVE-2011-1004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1004">CVE-2011-1004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1005/">CVE-2011-1005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1005">CVE-2011-1005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4481/">CVE-2012-4481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4481">CVE-2012-4481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4522/">CVE-2012-4522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4522">CVE-2012-4522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1821/">CVE-2013-1821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1821">CVE-2013-1821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4073/">CVE-2013-4073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4073">CVE-2013-4073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4164/">CVE-2013-4164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4164">CVE-2013-4164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8080/">CVE-2014-8080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8080">CVE-2014-8080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8090/">CVE-2014-8090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8090">CVE-2014-8090 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992345" comment="ruby-1.8.7.p357-0.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992346" comment="ruby-doc-html-1.8.7.p357-0.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992347" comment="ruby-tk-1.8.7.p357-0.9.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992345" comment="ruby-1.8.7.p357-0.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992346" comment="ruby-doc-html-1.8.7.p357-0.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992347" comment="ruby-tk-1.8.7.p357-0.9.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217750" version="1" class="patch">
	<metadata>
		<title>Security update for ruby (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="926974" ref_url="https://bugzilla.suse.com/926974" source="BUGZILLA"/>
		<reference ref_id="959495" ref_url="https://bugzilla.suse.com/959495" source="BUGZILLA"/>
		<reference ref_id="986630" ref_url="https://bugzilla.suse.com/986630" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1855" ref_url="https://www.suse.com/security/cve/CVE-2015-1855/" source="CVE"/>
		<reference ref_id="CVE-2015-7551" ref_url="https://www.suse.com/security/cve/CVE-2015-7551/" source="CVE"/>
		<description>

This update for ruby fixes the following issues:

Secuirty issues fixed:
- CVE-2015-1855: Ruby OpenSSL Hostname Verification (bsc#926974)
- CVE-2015-7551: Unsafe tainted string usage in Fiddle and DL (bsc#959495)

Bugfixes:
- fix small mistake in the backport for (bsc#986630)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-06"/>
	<updated date="2017-04-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926974">SUSE bug 926974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959495">SUSE bug 959495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986630">SUSE bug 986630</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1855/">CVE-2015-1855 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1855">CVE-2015-1855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7551/">CVE-2015-7551 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7551">CVE-2015-7551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574982" comment="ruby-1.8.7.p357-0.9.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574983" comment="ruby-doc-html-1.8.7.p357-0.9.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574984" comment="ruby-tk-1.8.7.p357-0.9.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217751" version="1" class="patch">
	<metadata>
		<title>Security update for ruby</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="704409" ref_url="https://bugzilla.suse.com/704409" source="BUGZILLA"/>
		<reference ref_id="739122" ref_url="https://bugzilla.suse.com/739122" source="BUGZILLA"/>
		<reference ref_id="740796" ref_url="https://bugzilla.suse.com/740796" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2686" ref_url="https://www.suse.com/security/cve/CVE-2011-2686/" source="CVE"/>
		<reference ref_id="CVE-2011-2705" ref_url="https://www.suse.com/security/cve/CVE-2011-2705/" source="CVE"/>
		<reference ref_id="CVE-2011-3009" ref_url="https://www.suse.com/security/cve/CVE-2011-3009/" source="CVE"/>
		<reference ref_id="CVE-2011-4815" ref_url="https://www.suse.com/security/cve/CVE-2011-4815/" source="CVE"/>
		<description>

This update of ruby provides 1.8.7p357, which contains many stability fixes 
and bug fixes while maintaining full compatibility with the previous 
version. A detailailed list of changes is available from 
http://svn.ruby-lang.org/repos/ruby/tags/v1_8_7_357/ChangeLog
&lt;http://svn.ruby-lang.org/repos/ruby/tags/v1_8_7_357/ChangeLog&gt; .

The most important fixes are:

    * Hash functions are now using a randomized seed to avoid algorithmic
      complexity attacks. If available, OpenSSL::Random.seed at the
      SecureRandom.random_bytes is used to achieve this. (CVE-2011-4815
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4815&gt; )
    * mkconfig.rb: fix for continued lines.
    * Fix Infinity to be greater than any bignum number.
    * Initialize store-&gt;ex_data.sk.
    * Several IPv6 related fixes.
    * Fixes for zlib.
    * Reinitialize PRNG when forking children (CVE-2011-2686
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2686&gt; , 
      CVE-2011-3009
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3009&gt; )
    * Fixes to securerandom. (CVE-2011-2705
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2705&gt; )
    * Fix uri route_to
    * Fix race condition with variables and autoload.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-01-27"/>
	<updated date="2012-01-27"/>
	<bugzilla href="https://bugzilla.suse.com/704409">SUSE bug 704409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/739122">SUSE bug 739122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/740796">SUSE bug 740796</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2686/">CVE-2011-2686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2686">CVE-2011-2686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2705/">CVE-2011-2705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2705">CVE-2011-2705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3009/">CVE-2011-3009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3009">CVE-2011-3009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4815/">CVE-2011-4815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4815">CVE-2011-4815 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992348" comment="ruby-1.8.7.p357-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992349" comment="ruby-doc-html-1.8.7.p357-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992350" comment="ruby-tk-1.8.7.p357-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217752" version="1" class="patch">
	<metadata>
		<title>Security update for rzsz (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1076576" ref_url="https://bugzilla.suse.com/1076576" source="BUGZILLA"/>
		<reference ref_id="1086416" ref_url="https://bugzilla.suse.com/1086416" source="BUGZILLA"/>
		<reference ref_id="1090051" ref_url="https://bugzilla.suse.com/1090051" source="BUGZILLA"/>
		<reference ref_id="529899" ref_url="https://bugzilla.suse.com/529899" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10195" ref_url="https://www.suse.com/security/cve/CVE-2018-10195/" source="CVE"/>
		<description>
This update for rzsz fixes the following issues:

- L3: sz of rzsz segfaults in zsdata() (bsc#1086416)
- VUL-0: CVE-2018-10195: rzsz: sz can leak data to receiving side (bsc#1090051)
- rzsz-0.12.20-976.7: illegal use of freed variable (bsc#529899)
- /usr/bin/lsb segfaults [rzsz] (bsc#1076576)


		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-24"/>
	<updated date="2018-04-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076576">SUSE bug 1076576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086416">SUSE bug 1086416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090051">SUSE bug 1090051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/529899">SUSE bug 529899</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10195/">CVE-2018-10195 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10195">CVE-2018-10195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574988" comment="rzsz-0.12.21~rc-936.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217753" version="1" class="patch">
	<metadata>
		<title>Recommended update for Samba</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="569721" ref_url="https://bugzilla.suse.com/569721" source="BUGZILLA"/>
		<reference ref_id="592198" ref_url="https://bugzilla.suse.com/592198" source="BUGZILLA"/>
		<reference ref_id="599873" ref_url="https://bugzilla.suse.com/599873" source="BUGZILLA"/>
		<reference ref_id="605935" ref_url="https://bugzilla.suse.com/605935" source="BUGZILLA"/>
		<reference ref_id="613459" ref_url="https://bugzilla.suse.com/613459" source="BUGZILLA"/>
		<reference ref_id="619787" ref_url="https://bugzilla.suse.com/619787" source="BUGZILLA"/>
		<reference ref_id="643119" ref_url="https://bugzilla.suse.com/643119" source="BUGZILLA"/>
		<reference ref_id="643787" ref_url="https://bugzilla.suse.com/643787" source="BUGZILLA"/>
		<reference ref_id="649526" ref_url="https://bugzilla.suse.com/649526" source="BUGZILLA"/>
		<reference ref_id="649636" ref_url="https://bugzilla.suse.com/649636" source="BUGZILLA"/>
		<reference ref_id="653353" ref_url="https://bugzilla.suse.com/653353" source="BUGZILLA"/>
		<reference ref_id="657026" ref_url="https://bugzilla.suse.com/657026" source="BUGZILLA"/>
		<reference ref_id="659424" ref_url="https://bugzilla.suse.com/659424" source="BUGZILLA"/>
		<reference ref_id="668773" ref_url="https://bugzilla.suse.com/668773" source="BUGZILLA"/>
		<reference ref_id="675478" ref_url="https://bugzilla.suse.com/675478" source="BUGZILLA"/>
		<reference ref_id="675978" ref_url="https://bugzilla.suse.com/675978" source="BUGZILLA"/>
		<reference ref_id="681208" ref_url="https://bugzilla.suse.com/681208" source="BUGZILLA"/>
		<reference ref_id="687535" ref_url="https://bugzilla.suse.com/687535" source="BUGZILLA"/>
		<reference ref_id="688810" ref_url="https://bugzilla.suse.com/688810" source="BUGZILLA"/>
		<reference ref_id="692607" ref_url="https://bugzilla.suse.com/692607" source="BUGZILLA"/>
		<reference ref_id="694836" ref_url="https://bugzilla.suse.com/694836" source="BUGZILLA"/>
		<reference ref_id="698209" ref_url="https://bugzilla.suse.com/698209" source="BUGZILLA"/>
		<reference ref_id="701257" ref_url="https://bugzilla.suse.com/701257" source="BUGZILLA"/>
		<reference ref_id="703655" ref_url="https://bugzilla.suse.com/703655" source="BUGZILLA"/>
		<reference ref_id="710791" ref_url="https://bugzilla.suse.com/710791" source="BUGZILLA"/>
		<reference ref_id="723261" ref_url="https://bugzilla.suse.com/723261" source="BUGZILLA"/>
		<reference ref_id="726145" ref_url="https://bugzilla.suse.com/726145" source="BUGZILLA"/>
		<reference ref_id="729516" ref_url="https://bugzilla.suse.com/729516" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-1635" ref_url="https://www.suse.com/security/cve/CVE-2010-1635/" source="CVE"/>
		<description>

This updates Samba to the latest state for SLE 10 SP4 and SLE 11 SP 1.

    * Fixing libsmbsharemode dependency on ldap and krb5 libs in Makefile;
      (bnc #729516).
    * Add 'ldapsam:login cache' parameter to allow explicit disabling of
      the login cache; (bnc#723261).
    * Fix samba duplicates file content on appending. Move posix case
      semantics out from under the VFS; (bso#6898); (bnc#681208).
    * Make winbind child reconnect when remote end has closed, fix failing
      sudo; (bso#7295); (bnc#569721).
    * Fixed the DFS referral response for msdfs root; (bnc#703655).
    * Fix CUPS print job IDs; (bso#7288); (bnc#701257).
    * Fix winbind internal error; (bso#7636); (bnc#659424).
    * Fix printing from Windows 7 clients; (bso#7567); (bnc#687535).
    * Update pidl and always compile IDL at build time; (bnc#688810).
    * Abide by print$ share 'force user' &amp; 'force group' settings when
      handling AddprinterDriver and DeletePrinterDriver requests;
      (bso#7921); (bnc#653353).

SUSE Linux Enterprise 11 only:

    * mount.cifs: don't try to alter mtab if it's a symlink; (bnc#710791).
    * Fix smbclient -Tc failing on 8GB sized tar files on s390x
      (bnc#726145)

		</description>
<advisory from="security@suse.de">
	<issued date="2011-12-20"/>
	<updated date="2011-12-20"/>
	<bugzilla href="https://bugzilla.suse.com/569721">SUSE bug 569721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/592198">SUSE bug 592198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/599873">SUSE bug 599873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/605935">SUSE bug 605935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/613459">SUSE bug 613459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/619787">SUSE bug 619787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/643119">SUSE bug 643119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/643787">SUSE bug 643787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649526">SUSE bug 649526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649636">SUSE bug 649636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/653353">SUSE bug 653353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/657026">SUSE bug 657026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/659424">SUSE bug 659424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/668773">SUSE bug 668773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/675478">SUSE bug 675478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/675978">SUSE bug 675978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/681208">SUSE bug 681208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/687535">SUSE bug 687535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/688810">SUSE bug 688810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/692607">SUSE bug 692607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/694836">SUSE bug 694836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698209">SUSE bug 698209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/701257">SUSE bug 701257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703655">SUSE bug 703655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/710791">SUSE bug 710791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/723261">SUSE bug 723261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/726145">SUSE bug 726145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/729516">SUSE bug 729516</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1635/">CVE-2010-1635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1635">CVE-2010-1635 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992351" comment="cifs-mount-3.4.3-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992352" comment="ldapsmb-1.34b-11.28.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992353" comment="libsmbclient0-3.4.3-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992354" comment="libsmbclient0-32bit-3.4.3-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992355" comment="libtalloc1-3.4.3-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992356" comment="libtalloc1-32bit-3.4.3-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992357" comment="libtdb1-3.4.3-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992358" comment="libtdb1-32bit-3.4.3-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992359" comment="libwbclient0-3.4.3-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992360" comment="libwbclient0-32bit-3.4.3-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992361" comment="samba-3.4.3-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992362" comment="samba-32bit-3.4.3-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992363" comment="samba-client-3.4.3-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992364" comment="samba-client-32bit-3.4.3-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992365" comment="samba-doc-3.4.3-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992366" comment="samba-krb-printing-3.4.3-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992367" comment="samba-winbind-3.4.3-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992368" comment="samba-winbind-32bit-3.4.3-1.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217754" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="295284" ref_url="https://bugzilla.suse.com/295284" source="BUGZILLA"/>
		<reference ref_id="958582" ref_url="https://bugzilla.suse.com/958582" source="BUGZILLA"/>
		<reference ref_id="958583" ref_url="https://bugzilla.suse.com/958583" source="BUGZILLA"/>
		<reference ref_id="958584" ref_url="https://bugzilla.suse.com/958584" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252/" source="CVE"/>
		<reference ref_id="CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296/" source="CVE"/>
		<reference ref_id="CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299/" source="CVE"/>
		<description>


This update for samba fixes the following security issues: 

- CVE-2015-5252: Insufficient symlink verification (file access outside the share) (bsc#958582).

- CVE-2015-5296: No man in the middle protection when forcing smb encryption on the client
  side (bsc#958584).

- CVE-2015-5299: Currently the snapshot browsing is not secure thru windows previous version
  (shadow_copy2) (bsc#958583).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-15"/>
	<updated date="2016-01-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/295284">SUSE bug 295284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958582">SUSE bug 958582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958583">SUSE bug 958583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958584">SUSE bug 958584</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5252">CVE-2015-5252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5296">CVE-2015-5296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5299">CVE-2015-5299 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574989" comment="cifs-mount-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574990" comment="ldapsmb-1.34b-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574991" comment="libsmbclient0-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574992" comment="libsmbclient0-32bit-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574993" comment="libtalloc1-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574994" comment="libtalloc1-32bit-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574995" comment="libtdb1-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574996" comment="libtdb1-32bit-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574997" comment="libwbclient0-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574998" comment="libwbclient0-32bit-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574999" comment="samba-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575000" comment="samba-32bit-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575001" comment="samba-client-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575002" comment="samba-client-32bit-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575003" comment="samba-krb-printing-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575004" comment="samba-winbind-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575005" comment="samba-winbind-32bit-3.4.3-56.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217755" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="968222" ref_url="https://bugzilla.suse.com/968222" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560/" source="CVE"/>
		<description>

This update for samba fixes the following issues:

- CVE-2015-7560: Getting and setting Windows ACLs on symlinks can change
permissions on link target (bso#11648 bsc#968222).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-29"/>
	<updated date="2016-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/968222">SUSE bug 968222</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7560">CVE-2015-7560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575006" comment="cifs-mount-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575007" comment="ldapsmb-1.34b-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575008" comment="libsmbclient0-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575009" comment="libsmbclient0-32bit-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575010" comment="libtalloc1-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575011" comment="libtalloc1-32bit-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575012" comment="libtdb1-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575013" comment="libtdb1-32bit-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575014" comment="libwbclient0-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575015" comment="libwbclient0-32bit-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575016" comment="samba-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575017" comment="samba-32bit-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575018" comment="samba-client-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575019" comment="samba-client-32bit-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575020" comment="samba-krb-printing-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575021" comment="samba-winbind-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575022" comment="samba-winbind-32bit-3.4.3-59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217756" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="973031" ref_url="https://bugzilla.suse.com/973031" source="BUGZILLA"/>
		<reference ref_id="973032" ref_url="https://bugzilla.suse.com/973032" source="BUGZILLA"/>
		<reference ref_id="973033" ref_url="https://bugzilla.suse.com/973033" source="BUGZILLA"/>
		<reference ref_id="973034" ref_url="https://bugzilla.suse.com/973034" source="BUGZILLA"/>
		<reference ref_id="973036" ref_url="https://bugzilla.suse.com/973036" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2110" ref_url="https://www.suse.com/security/cve/CVE-2016-2110/" source="CVE"/>
		<reference ref_id="CVE-2016-2111" ref_url="https://www.suse.com/security/cve/CVE-2016-2111/" source="CVE"/>
		<reference ref_id="CVE-2016-2112" ref_url="https://www.suse.com/security/cve/CVE-2016-2112/" source="CVE"/>
		<reference ref_id="CVE-2016-2113" ref_url="https://www.suse.com/security/cve/CVE-2016-2113/" source="CVE"/>
		<reference ref_id="CVE-2016-2115" ref_url="https://www.suse.com/security/cve/CVE-2016-2115/" source="CVE"/>
		<description>

This update for samba fixes the following issues: 

Security issues fixed:
- CVE-2016-2110: A man-in-the-middle can downgrade NTLMSSP authentication. (bso#11688)(bsc#973031)
- CVE-2016-2111: Domain controller netlogon member computer can be spoofed. (bso#11749)(bsc#973032)
- CVE-2016-2112: LDAP conenctions vulnerable to downgrade and  MITM attack. (bso#11644)(bsc#973033)
- CVE-2016-2113: TLS certificate validation missing. (bso#11752)(bsc#973034)
- CVE-2016-2115: Named pipe IPC vulnerable to MITM attacks. (bso#11756)(bsc#973036)

Bugs fixed:
- Getting and setting Windows ACLs on symlinks can change permissions on link		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-23"/>
	<updated date="2016-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/973031">SUSE bug 973031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973032">SUSE bug 973032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973033">SUSE bug 973033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973034">SUSE bug 973034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973036">SUSE bug 973036</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2110/">CVE-2016-2110 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2110">CVE-2016-2110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2111/">CVE-2016-2111 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2111">CVE-2016-2111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2112/">CVE-2016-2112 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2112">CVE-2016-2112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2113/">CVE-2016-2113 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2113">CVE-2016-2113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2115/">CVE-2016-2115 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2115">CVE-2016-2115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575023" comment="cifs-mount-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575024" comment="ldapsmb-1.34b-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575025" comment="libsmbclient0-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575026" comment="libsmbclient0-32bit-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575027" comment="libtalloc1-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575028" comment="libtalloc1-32bit-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575029" comment="libtdb1-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575030" comment="libtdb1-32bit-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575031" comment="libwbclient0-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575032" comment="libwbclient0-32bit-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575033" comment="samba-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575034" comment="samba-32bit-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575035" comment="samba-client-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575036" comment="samba-client-32bit-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575037" comment="samba-krb-printing-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575038" comment="samba-winbind-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575039" comment="samba-winbind-32bit-3.4.3-63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217757" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="936862" ref_url="https://bugzilla.suse.com/936862" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5370" ref_url="https://www.suse.com/security/cve/CVE-2015-5370/" source="CVE"/>
		<description>

This update for samba fixes the following issues:

- CVE-2015-5370: The DCERPC server and client were vulnerable to DOS and MITM attacks.
  (bsc#936862).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-14"/>
	<updated date="2016-09-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/936862">SUSE bug 936862</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5370/">CVE-2015-5370 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5370">CVE-2015-5370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575040" comment="cifs-mount-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575041" comment="ldapsmb-1.34b-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575042" comment="libsmbclient0-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575043" comment="libsmbclient0-32bit-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575044" comment="libtalloc1-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575045" comment="libtalloc1-32bit-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575046" comment="libtdb1-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575047" comment="libtdb1-32bit-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575048" comment="libwbclient0-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575049" comment="libwbclient0-32bit-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575050" comment="samba-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575051" comment="samba-32bit-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575052" comment="samba-client-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575053" comment="samba-client-32bit-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575054" comment="samba-krb-printing-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575055" comment="samba-winbind-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575056" comment="samba-winbind-32bit-3.4.3-66.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217758" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1014441" ref_url="https://bugzilla.suse.com/1014441" source="BUGZILLA"/>
		<reference ref_id="1014442" ref_url="https://bugzilla.suse.com/1014442" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2125" ref_url="https://www.suse.com/security/cve/CVE-2016-2125/" source="CVE"/>
		<reference ref_id="CVE-2016-2126" ref_url="https://www.suse.com/security/cve/CVE-2016-2126/" source="CVE"/>
		<description>

This update for samba fixes the following issues:

- CVE-2016-2125: Don't send delegated credentials to all servers (bsc#1014441).
- CVE-2016-2126: Denial of service due to a client triggered crash in the winbindd parent process (bsc#1014442).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-22"/>
	<updated date="2016-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1014441">SUSE bug 1014441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014442">SUSE bug 1014442</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2125/">CVE-2016-2125 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2125">CVE-2016-2125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2126/">CVE-2016-2126 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2126">CVE-2016-2126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575057" comment="cifs-mount-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575058" comment="ldapsmb-1.34b-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575059" comment="libsmbclient0-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575060" comment="libsmbclient0-32bit-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575061" comment="libtalloc1-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575062" comment="libtalloc1-32bit-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575063" comment="libtdb1-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575064" comment="libtdb1-32bit-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575065" comment="libwbclient0-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575066" comment="libwbclient0-32bit-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575067" comment="samba-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575068" comment="samba-32bit-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575069" comment="samba-client-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575070" comment="samba-client-32bit-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575071" comment="samba-krb-printing-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575072" comment="samba-winbind-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575073" comment="samba-winbind-32bit-3.4.3-69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217759" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1009711" ref_url="https://bugzilla.suse.com/1009711" source="BUGZILLA"/>
		<reference ref_id="1027147" ref_url="https://bugzilla.suse.com/1027147" source="BUGZILLA"/>
		<reference ref_id="1058622" ref_url="https://bugzilla.suse.com/1058622" source="BUGZILLA"/>
		<reference ref_id="1058624" ref_url="https://bugzilla.suse.com/1058624" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12150" ref_url="https://www.suse.com/security/cve/CVE-2017-12150/" source="CVE"/>
		<reference ref_id="CVE-2017-12163" ref_url="https://www.suse.com/security/cve/CVE-2017-12163/" source="CVE"/>
		<reference ref_id="CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619/" source="CVE"/>
		<description>
This update for samba fixes several issues.

These security issues were fixed:

- CVE-2017-12163: Prevent client short SMB1 write from writing server memory to
  file, leaking information from the server to the client (bsc#1058624).
- CVE-2017-12150: Always enforce smb signing when it is configured (bsc#1058622).
- CVE-2017-2619: Symlink race permited opening files outside share directory (bsc#1027147).

These non-security issues were fixed:

- Allow SESSION KEY setup without signing (bsc#1009711).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-27"/>
	<updated date="2017-09-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009711">SUSE bug 1009711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027147">SUSE bug 1027147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058622">SUSE bug 1058622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058624">SUSE bug 1058624</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12150/">CVE-2017-12150 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12150">CVE-2017-12150 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12163/">CVE-2017-12163 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12163">CVE-2017-12163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2619">CVE-2017-2619 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575074" comment="cifs-mount-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575075" comment="ldapsmb-1.34b-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575076" comment="libsmbclient0-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575077" comment="libsmbclient0-32bit-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575078" comment="libtalloc1-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575079" comment="libtalloc1-32bit-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575080" comment="libtdb1-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575081" comment="libtdb1-32bit-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575082" comment="libwbclient0-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575083" comment="libwbclient0-32bit-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575084" comment="samba-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575085" comment="samba-32bit-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575086" comment="samba-client-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575087" comment="samba-client-32bit-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575088" comment="samba-krb-printing-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575089" comment="samba-winbind-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575090" comment="samba-winbind-32bit-3.4.3-70.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217760" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1063008" ref_url="https://bugzilla.suse.com/1063008" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15275" ref_url="https://www.suse.com/security/cve/CVE-2017-15275/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- CVE-2017-15275: s3: smbd: Chain code can return uninitialized
  memory when talloc buffer is grown; (bsc#1063008); (bso#13077);

		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-16"/>
	<updated date="2017-12-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1063008">SUSE bug 1063008</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15275/">CVE-2017-15275 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15275">CVE-2017-15275 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575091" comment="cifs-mount-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575092" comment="ldapsmb-1.34b-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575093" comment="libsmbclient0-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575094" comment="libsmbclient0-32bit-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575095" comment="libtalloc1-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575096" comment="libtalloc1-32bit-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575097" comment="libtdb1-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575098" comment="libtdb1-32bit-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575099" comment="libwbclient0-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575100" comment="libwbclient0-32bit-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575101" comment="samba-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575102" comment="samba-32bit-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575103" comment="samba-client-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575104" comment="samba-client-32bit-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575105" comment="samba-krb-printing-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575106" comment="samba-winbind-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575107" comment="samba-winbind-32bit-3.4.3-70.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217761" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1103411" ref_url="https://bugzilla.suse.com/1103411" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10858" ref_url="https://www.suse.com/security/cve/CVE-2018-10858/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

The following security issue was fixed:

- CVE-2018-10858: Insufficient input validation on client directory listing in libsmbclient (bsc#1103411).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1103411">SUSE bug 1103411</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10858/">CVE-2018-10858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10858">CVE-2018-10858 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575108" comment="cifs-mount-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575109" comment="ldapsmb-1.34b-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575110" comment="libsmbclient0-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575111" comment="libsmbclient0-32bit-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575112" comment="libtalloc1-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575113" comment="libtalloc1-32bit-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575114" comment="libtdb1-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575115" comment="libtdb1-32bit-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575116" comment="libwbclient0-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575117" comment="libwbclient0-32bit-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575118" comment="samba-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575119" comment="samba-32bit-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575120" comment="samba-client-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575121" comment="samba-client-32bit-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575122" comment="samba-krb-printing-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575123" comment="samba-winbind-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575124" comment="samba-winbind-32bit-3.4.3-70.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217762" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1131060" ref_url="https://bugzilla.suse.com/1131060" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3880" ref_url="https://www.suse.com/security/cve/CVE-2019-3880/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

Security issue fixed:

- CVE-2019-3880: Fixed a path/symlink traversal vulnerability, which allowed 
  an unprivileged user to save registry files outside a share (bsc#1131060).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-30"/>
	<updated date="2019-04-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1131060">SUSE bug 1131060</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3880/">CVE-2019-3880 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3880">CVE-2019-3880 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575125" comment="cifs-mount-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575126" comment="ldapsmb-1.34b-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575127" comment="libsmbclient0-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575128" comment="libsmbclient0-32bit-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575129" comment="libtalloc1-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575130" comment="libtalloc1-32bit-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575131" comment="libtdb1-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575132" comment="libtdb1-32bit-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575133" comment="libwbclient0-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575134" comment="libwbclient0-32bit-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575135" comment="samba-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575136" comment="samba-32bit-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575137" comment="samba-client-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575138" comment="samba-client-32bit-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575139" comment="samba-krb-printing-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575140" comment="samba-winbind-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575141" comment="samba-winbind-32bit-3.4.3-70.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217763" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1144902" ref_url="https://bugzilla.suse.com/1144902" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218/" source="CVE"/>
		<description>
This update for samba fixes the following issue:

- CVE-2019-10218: Fixed a path injection caused by filenames containing path separators (bso#14071) (bsc#1144902).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-29"/>
	<updated date="2019-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10218">CVE-2019-10218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575142" comment="cifs-mount-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575143" comment="ldapsmb-1.34b-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575144" comment="libsmbclient0-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575145" comment="libsmbclient0-32bit-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575146" comment="libtalloc1-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575147" comment="libtalloc1-32bit-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575148" comment="libtdb1-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575149" comment="libtdb1-32bit-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575150" comment="libwbclient0-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575151" comment="libwbclient0-32bit-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575152" comment="samba-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575153" comment="samba-32bit-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575154" comment="samba-client-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575155" comment="samba-client-32bit-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575156" comment="samba-krb-printing-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575157" comment="samba-winbind-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575158" comment="samba-winbind-32bit-3.4.3-70.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217764" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1173160" ref_url="https://bugzilla.suse.com/1173160" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10745" ref_url="https://www.suse.com/security/cve/CVE-2020-10745/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

-  CVE-2020-10745: Fixed an issue which parsing and packing of NBT and DNS packets 
   containing dots could potentially have consumed excessive CPU (bsc#1173160).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-24"/>
	<updated date="2020-07-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173160">SUSE bug 1173160</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10745/">CVE-2020-10745 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10745">CVE-2020-10745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575159" comment="cifs-mount-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575160" comment="ldapsmb-1.34b-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575161" comment="libsmbclient0-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575162" comment="libsmbclient0-32bit-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575163" comment="libtalloc1-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575164" comment="libtalloc1-32bit-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575165" comment="libtdb1-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575166" comment="libtdb1-32bit-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575167" comment="libwbclient0-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575168" comment="libwbclient0-32bit-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575169" comment="samba-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575170" comment="samba-32bit-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575171" comment="samba-client-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575172" comment="samba-client-32bit-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575173" comment="samba-krb-printing-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575174" comment="samba-winbind-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575175" comment="samba-winbind-32bit-3.4.3-70.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217765" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1192284" ref_url="https://bugzilla.suse.com/1192284" source="BUGZILLA"/>
		<reference ref_id="1196717" ref_url="https://bugzilla.suse.com/1196717" source="BUGZILLA"/>
		<reference ref_id="577868" ref_url="https://bugzilla.suse.com/577868" source="BUGZILLA"/>
		<reference ref_id="656867" ref_url="https://bugzilla.suse.com/656867" source="BUGZILLA"/>
		<reference ref_id="973032" ref_url="https://bugzilla.suse.com/973032" source="BUGZILLA"/>
		<reference ref_id="973033" ref_url="https://bugzilla.suse.com/973033" source="BUGZILLA"/>
		<reference ref_id="973036" ref_url="https://bugzilla.suse.com/973036" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- CVE-2020-25717: A user in an AD Domain could become root on domain members (bsc#1192284).
- Added missing man page updates
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-17"/>
	<updated date="2022-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192284">SUSE bug 1192284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196717">SUSE bug 1196717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/577868">SUSE bug 577868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/656867">SUSE bug 656867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973032">SUSE bug 973032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973033">SUSE bug 973033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973036">SUSE bug 973036</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25717">CVE-2020-25717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672778" comment="cifs-mount-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672779" comment="ldapsmb-1.34b-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672780" comment="libsmbclient0-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672781" comment="libsmbclient0-32bit-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672782" comment="libtalloc1-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672783" comment="libtalloc1-32bit-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672784" comment="libtdb1-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672785" comment="libtdb1-32bit-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672786" comment="libwbclient0-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672787" comment="libwbclient0-32bit-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672788" comment="samba-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672789" comment="samba-32bit-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672790" comment="samba-client-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672791" comment="samba-client-32bit-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672792" comment="samba-krb-printing-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672793" comment="samba-winbind-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672794" comment="samba-winbind-32bit-3.4.3-70.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217766" version="1" class="patch">
	<metadata>
		<title>Security update for sane-backends (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1027197" ref_url="https://bugzilla.suse.com/1027197" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6318" ref_url="https://www.suse.com/security/cve/CVE-2017-6318/" source="CVE"/>
		<description>

This update for sane-backends fixes the following issues:

- saned could have leaked uninitialized memory back to its requesters for some
  opcodes, allowing for information disclosure of saned memory
  (CVE-2017-6318, bsc#1027197).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027197">SUSE bug 1027197</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6318/">CVE-2017-6318 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6318">CVE-2017-6318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575176" comment="sane-backends-1.0.20-7.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217767" version="1" class="patch">
	<metadata>
		<title>Security update for sblim-sfcb</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="612033" ref_url="https://bugzilla.suse.com/612033" source="BUGZILLA"/>
		<reference ref_id="612043" ref_url="https://bugzilla.suse.com/612043" source="BUGZILLA"/>
		<reference ref_id="621620" ref_url="https://bugzilla.suse.com/621620" source="BUGZILLA"/>
		<reference ref_id="625780" ref_url="https://bugzilla.suse.com/625780" source="BUGZILLA"/>
		<reference ref_id="625782" ref_url="https://bugzilla.suse.com/625782" source="BUGZILLA"/>
		<reference ref_id="645804" ref_url="https://bugzilla.suse.com/645804" source="BUGZILLA"/>
		<reference ref_id="667729" ref_url="https://bugzilla.suse.com/667729" source="BUGZILLA"/>
		<reference ref_id="680142" ref_url="https://bugzilla.suse.com/680142" source="BUGZILLA"/>
		<reference ref_id="713687" ref_url="https://bugzilla.suse.com/713687" source="BUGZILLA"/>
		<reference ref_id="716299" ref_url="https://bugzilla.suse.com/716299" source="BUGZILLA"/>
		<reference ref_id="794021" ref_url="https://bugzilla.suse.com/794021" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-1937" ref_url="https://www.suse.com/security/cve/CVE-2010-1937/" source="CVE"/>
		<reference ref_id="CVE-2010-2054" ref_url="https://www.suse.com/security/cve/CVE-2010-2054/" source="CVE"/>
		<description>

This collective update for the Small Footprint CIM Broker (sblim-sfcb) 
provides the following fixes:

    * Fix possible crash in case of bad content length (bnc#794021,
      upstream #3001896)
    * Fix possible crash when httpMaxContentLength is set to 0 allowing
      specific Content-Lengh values to cause a buffer overflow (bnc#794021,
      upstream #3001915).

Security Issue references:

    * CVE-2010-1937
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1937&gt;
    * CVE-2010-2054
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2054&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-12-20"/>
	<updated date="2012-12-20"/>
	<bugzilla href="https://bugzilla.suse.com/612033">SUSE bug 612033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/612043">SUSE bug 612043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/621620">SUSE bug 621620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/625780">SUSE bug 625780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/625782">SUSE bug 625782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/645804">SUSE bug 645804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/667729">SUSE bug 667729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/680142">SUSE bug 680142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/713687">SUSE bug 713687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/716299">SUSE bug 716299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/794021">SUSE bug 794021</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1937/">CVE-2010-1937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1937">CVE-2010-1937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2054/">CVE-2010-2054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2054">CVE-2010-2054 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992369" comment="sblim-sfcb-1.3.7-0.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217768" version="1" class="patch">
	<metadata>
		<title>Security update for sblim-sfcb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="942628" ref_url="https://bugzilla.suse.com/942628" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5185" ref_url="https://www.suse.com/security/cve/CVE-2015-5185/" source="CVE"/>
		<description>

This update of sblim-sfcb fixes a potential NULL pointer crash in lookupProviders() (CVE-2015-5185).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-15"/>
	<updated date="2015-12-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/942628">SUSE bug 942628</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5185/">CVE-2015-5185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5185">CVE-2015-5185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575177" comment="sblim-sfcb-1.3.7-0.21.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217769" version="1" class="patch">
	<metadata>
		<title>Security update for screen (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="944458" ref_url="https://bugzilla.suse.com/944458" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6806" ref_url="https://www.suse.com/security/cve/CVE-2015-6806/" source="CVE"/>
		<description>
This update for screen fixes the following issues:

Security issue fixed:

- CVE-2015-6806: Fixed a stack overflow due to deep recursion (bsc#944458).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-16"/>
	<updated date="2019-05-16"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/944458">SUSE bug 944458</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-6806/">CVE-2015-6806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6806">CVE-2015-6806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575178" comment="screen-4.0.2-162.19.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217770" version="1" class="patch">
	<metadata>
		<title>Security update for socat</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="627475" ref_url="https://bugzilla.suse.com/627475" source="BUGZILLA"/>
		<reference ref_id="759859" ref_url="https://bugzilla.suse.com/759859" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2799" ref_url="https://www.suse.com/security/cve/CVE-2010-2799/" source="CVE"/>
		<reference ref_id="CVE-2012-0219" ref_url="https://www.suse.com/security/cve/CVE-2012-0219/" source="CVE"/>
		<description>

This update fixes two small security issues in socat:

    * Fixed a stack overflow in commandline parsing (bnc#627475 /
      CVE-2010-2799) Only exploitable if an attacker can control the
      commandline parameters.
    * Fixed heap overflow in READLINE output mode (bnc#759859 /
      CVE-2012-0219)

Security Issue references:

    * CVE-2012-0219
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0219&gt;
    * CVE-2010-2799
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2799&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-06-11"/>
	<updated date="2012-06-11"/>
	<bugzilla href="https://bugzilla.suse.com/627475">SUSE bug 627475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759859">SUSE bug 759859</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2799/">CVE-2010-2799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2799">CVE-2010-2799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0219/">CVE-2012-0219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0219">CVE-2012-0219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992370" comment="socat-1.7.0.0-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217771" version="1" class="patch">
	<metadata>
		<title>Security update for socat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="821985" ref_url="https://bugzilla.suse.com/821985" source="BUGZILLA"/>
		<reference ref_id="860991" ref_url="https://bugzilla.suse.com/860991" source="BUGZILLA"/>
		<reference ref_id="964844" ref_url="https://bugzilla.suse.com/964844" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-3571" ref_url="https://www.suse.com/security/cve/CVE-2013-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-0019" ref_url="https://www.suse.com/security/cve/CVE-2014-0019/" source="CVE"/>
		<description>

This update for socat fixes the following issues:

- CVE-2013-3571: Fix a file descriptor leak that could have been misused for a denial of service attack against socat running in server mode (bsc#821985)
- CVE-2014-0019: PROXY-CONNECT address was vulnerable to a stack buffer overflow (bsc#860991)
- Fix a stack overflow in the parser that could have been leveraged to execute arbitrary code (bsc#964844)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/821985">SUSE bug 821985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860991">SUSE bug 860991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964844">SUSE bug 964844</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3571/">CVE-2013-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3571">CVE-2013-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0019/">CVE-2014-0019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0019">CVE-2014-0019 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575180" comment="socat-1.7.0.0-1.18.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217772" version="1" class="patch">
	<metadata>
		<title>YOU update for Software Update Stack</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="616708" ref_url="https://bugzilla.suse.com/616708" source="BUGZILLA"/>
		<reference ref_id="616982" ref_url="https://bugzilla.suse.com/616982" source="BUGZILLA"/>
		<reference ref_id="622286" ref_url="https://bugzilla.suse.com/622286" source="BUGZILLA"/>
		<reference ref_id="663301" ref_url="https://bugzilla.suse.com/663301" source="BUGZILLA"/>
		<reference ref_id="680630" ref_url="https://bugzilla.suse.com/680630" source="BUGZILLA"/>
		<reference ref_id="687529" ref_url="https://bugzilla.suse.com/687529" source="BUGZILLA"/>
		<reference ref_id="698796" ref_url="https://bugzilla.suse.com/698796" source="BUGZILLA"/>
		<reference ref_id="708632" ref_url="https://bugzilla.suse.com/708632" source="BUGZILLA"/>
		<reference ref_id="708641" ref_url="https://bugzilla.suse.com/708641" source="BUGZILLA"/>
		<reference ref_id="708667" ref_url="https://bugzilla.suse.com/708667" source="BUGZILLA"/>
		<reference ref_id="708676" ref_url="https://bugzilla.suse.com/708676" source="BUGZILLA"/>
		<reference ref_id="708888" ref_url="https://bugzilla.suse.com/708888" source="BUGZILLA"/>
		<reference ref_id="709480" ref_url="https://bugzilla.suse.com/709480" source="BUGZILLA"/>
		<reference ref_id="709494" ref_url="https://bugzilla.suse.com/709494" source="BUGZILLA"/>
		<reference ref_id="710269" ref_url="https://bugzilla.suse.com/710269" source="BUGZILLA"/>
		<reference ref_id="711429" ref_url="https://bugzilla.suse.com/711429" source="BUGZILLA"/>
		<reference ref_id="721128" ref_url="https://bugzilla.suse.com/721128" source="BUGZILLA"/>
		<reference ref_id="722039" ref_url="https://bugzilla.suse.com/722039" source="BUGZILLA"/>
		<reference ref_id="722250" ref_url="https://bugzilla.suse.com/722250" source="BUGZILLA"/>
		<reference ref_id="724449" ref_url="https://bugzilla.suse.com/724449" source="BUGZILLA"/>
		<reference ref_id="724957" ref_url="https://bugzilla.suse.com/724957" source="BUGZILLA"/>
		<reference ref_id="732813" ref_url="https://bugzilla.suse.com/732813" source="BUGZILLA"/>
		<reference ref_id="735284" ref_url="https://bugzilla.suse.com/735284" source="BUGZILLA"/>
		<reference ref_id="735826" ref_url="https://bugzilla.suse.com/735826" source="BUGZILLA"/>
		<reference ref_id="740982" ref_url="https://bugzilla.suse.com/740982" source="BUGZILLA"/>
		<reference ref_id="742033" ref_url="https://bugzilla.suse.com/742033" source="BUGZILLA"/>
		<reference ref_id="742306" ref_url="https://bugzilla.suse.com/742306" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2192" ref_url="https://www.suse.com/security/cve/CVE-2011-2192/" source="CVE"/>
		<description>

This 2012/02 update for the Software Management Update Stack provides the 
following fixes:

Libzypp and libsatsolver:

    * change splitprovides so that they only work on packages that are to
      be updated (bnc#740982)
    * Fix and optimize Pathname ctor and provide testcases (bnc#721128)
    * Fix code10 to code11 conversion of product metadata (bnc#711429)
    * Fix arch name typo in code10 to code11 conversion (bnc#711429)
    * Do not differ between type nfs and nfs4 when checking the mount table
      (bnc#710269)
    * Fix and optimize Pathname ctor and provide testcases (bnc#721128)
    * Require curl version that provides gssapi delegation (bnc#735284)

zypper:

    * Fix 'zypper search' xml output (bnc#687529)
    * Allow white space before key=value pair (bnc#722250)
    * Update manpage to give some repo URI examples (bnc#680630)

yast2-wagon:

    * install also all applicable patches (except optional ones) (part of
      fate#311994)
    * force product upgrade in full migration mode, handle product name
      changes (bnc#735826)
    * Do not allow to continue without package lock (BNC #616982)
    * added new core/full migration selection dialog (fate#311994)
    * if the system is managed by SUSE Manager display a message and exit
      (fate#311994)
    * added a new client for selecting DUP repositories (fate#311994)
    * added a new client for checking registration status before starting
      migration (fate#309594)
    * implemented download in advance mode support (fate#308951)
    * display solver error in the migration propsal, do not allow starting
      migration when there is an unsolved problem (bnc#708676)
    * do not disable current repositories, minimal migration uses 'DUP
      from' feature so they can stay enabled (bnc#708632)
    * fixed registration status check when registering against SMT
      (bnc#708888)
    * properly display selected migration type when going back in the
      migration workflow (bnc#708667)
    * reset and repropose package selection when migration type is changed
      (bnc#708641)
    * display 'Registration Code' checkbox in the registration step
      (bnc#724957)
    * fixed registration status check when there is only one product
      installed (bnc#732813)
    * do full migration only from SP2 repos (but also install patches in
      addition to minimal migration) (fate#311994)

yast2-packager:

    * fixed UI syntax error in package callbacks when there is a popup
      window displayed (bnc#722039, bnc#622286)
    * correctly display download progress in DownloadInAdvance libzypp mode
      (bnc#616708)
    * fix download progress when using add-ons (bnc#663301)

yast2-pkg-bindings:

    * fixed reloading of repositories which have been removed during
      service reload (bnc#724449)
    * fixed saving additional repositories added by registration
      (bnc#742033)

curl:

    * Added also the --delegation option to the curl tool (bnc#698796#c12).
    * Add CURLOPT_GSSAPI_DELEGATION libcurl option (bnc#698796#c12) plus a
      couple of minor fixes and cleanups.
    * Curl_input_negotiate: do not delegate GSSAPI credentials (bnc#698796,
      CVE-2011-2192).
    * Update to 7.19.7, which provides many bugfixes
    * fix for a regression in handling of '[protocol]_proxy' environment
      variables.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-01-23"/>
	<updated date="2012-01-23"/>
	<bugzilla href="https://bugzilla.suse.com/616708">SUSE bug 616708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/616982">SUSE bug 616982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/622286">SUSE bug 622286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/663301">SUSE bug 663301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/680630">SUSE bug 680630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/687529">SUSE bug 687529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698796">SUSE bug 698796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/708632">SUSE bug 708632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/708641">SUSE bug 708641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/708667">SUSE bug 708667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/708676">SUSE bug 708676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/708888">SUSE bug 708888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/709480">SUSE bug 709480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/709494">SUSE bug 709494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/710269">SUSE bug 710269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711429">SUSE bug 711429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/721128">SUSE bug 721128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/722039">SUSE bug 722039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/722250">SUSE bug 722250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/724449">SUSE bug 724449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/724957">SUSE bug 724957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/732813">SUSE bug 732813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/735284">SUSE bug 735284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/735826">SUSE bug 735826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/740982">SUSE bug 740982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742033">SUSE bug 742033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742306">SUSE bug 742306</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2192/">CVE-2011-2192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2192">CVE-2011-2192 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992371" comment="curl-7.19.7-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992372" comment="libcurl4-7.19.7-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992373" comment="libcurl4-32bit-7.19.7-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992374" comment="libzypp-6.37.5-0.5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992375" comment="perl-satsolver-0.14.19-0.3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992376" comment="python-satsolver-0.14.19-0.3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992377" comment="satsolver-tools-0.14.19-0.3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992378" comment="yast2-packager-2.17.78.3-0.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992379" comment="yast2-pkg-bindings-2.17.45.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009588764" comment="yast2-wagon-2.17.17.8-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992380" comment="zypper-1.3.16-0.3.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217773" version="1" class="patch">
	<metadata>
		<title>Security update for speex (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1192580" ref_url="https://bugzilla.suse.com/1192580" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-23903" ref_url="https://www.suse.com/security/cve/CVE-2020-23903/" source="CVE"/>
		<description>
This update for speex fixes the following issues:

- CVE-2020-23903: Fixed zero division error in read_samples (bsc#1192580).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192580">SUSE bug 1192580</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-23903/">CVE-2020-23903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-23903">CVE-2020-23903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656593" comment="libspeex-1.1.99.91-16.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656594" comment="libspeex-32bit-1.1.99.91-16.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217774" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1136976" ref_url="https://bugzilla.suse.com/1136976" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8457" ref_url="https://www.suse.com/security/cve/CVE-2019-8457/" source="CVE"/>
		<description>
This update for sqlite3 fixes the following issues:

Security issue fixed:

- CVE-2019-8457: Fixed an heap out-of-bound read in the rtreenode() when handling invalid rtree tables (bsc#1136976).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-10"/>
	<updated date="2019-07-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136976">SUSE bug 1136976</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8457/">CVE-2019-8457 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8457">CVE-2019-8457 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575181" comment="libsqlite3-0-3.6.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575182" comment="libsqlite3-0-32bit-3.6.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575183" comment="sqlite3-3.6.4-4.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217775" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1085790" ref_url="https://bugzilla.suse.com/1085790" source="BUGZILLA"/>
		<reference ref_id="1155787" ref_url="https://bugzilla.suse.com/1155787" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2518" ref_url="https://www.suse.com/security/cve/CVE-2017-2518/" source="CVE"/>
		<reference ref_id="CVE-2018-8740" ref_url="https://www.suse.com/security/cve/CVE-2018-8740/" source="CVE"/>
		<description>
This update for sqlite3 fixes the following issues:

- CVE-2017-2518: Fixed a use-after-free vulnerability which could have 
  led to buffer overflow via a crafted SQL statement (bsc#1155787).	  
- CVE-2018-8740: Fixed a null pointer dereference caused when CREATE
  TABLE AS statement is used (bsc#1085790).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085790">SUSE bug 1085790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155787">SUSE bug 1155787</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2518/">CVE-2017-2518 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2518">CVE-2017-2518 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8740/">CVE-2018-8740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8740">CVE-2018-8740 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575184" comment="libsqlite3-0-3.6.4-4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575185" comment="libsqlite3-0-32bit-3.6.4-4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575186" comment="sqlite3-3.6.4-4.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217776" version="1" class="patch">
	<metadata>
		<title>Security update for Squid</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="587375" ref_url="https://bugzilla.suse.com/587375" source="BUGZILLA"/>
		<reference ref_id="677335" ref_url="https://bugzilla.suse.com/677335" source="BUGZILLA"/>
		<reference ref_id="794954" ref_url="https://bugzilla.suse.com/794954" source="BUGZILLA"/>
		<reference ref_id="796999" ref_url="https://bugzilla.suse.com/796999" source="BUGZILLA"/>
		<reference ref_id="829084" ref_url="https://bugzilla.suse.com/829084" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0639" ref_url="https://www.suse.com/security/cve/CVE-2010-0639/" source="CVE"/>
		<reference ref_id="CVE-2012-5643" ref_url="https://www.suse.com/security/cve/CVE-2012-5643/" source="CVE"/>
		<reference ref_id="CVE-2013-0188" ref_url="https://www.suse.com/security/cve/CVE-2013-0188/" source="CVE"/>
		<reference ref_id="CVE-2013-4115" ref_url="https://www.suse.com/security/cve/CVE-2013-4115/" source="CVE"/>
		<description>

This Squid update fixes a buffer overflow issue when squid attempted to 
resolve an overly long hostname. This could have been triggered with 
specially crafted http requests. (bnc#829084, CVE-2013-4115)

This update also includes a correction to the last change for logrotate. 
(bnc#677335)

Security Issue reference:

    * CVE-2013-4115
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4115&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-09"/>
	<updated date="2013-09-09"/>
	<bugzilla href="https://bugzilla.suse.com/587375">SUSE bug 587375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/677335">SUSE bug 677335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/794954">SUSE bug 794954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796999">SUSE bug 796999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829084">SUSE bug 829084</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0639/">CVE-2010-0639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0639">CVE-2010-0639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5643/">CVE-2012-5643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5643">CVE-2012-5643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0188/">CVE-2013-0188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0188">CVE-2013-0188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4115/">CVE-2013-4115 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4115">CVE-2013-4115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992381" comment="squid-2.7.STABLE5-2.12.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217777" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="895773" ref_url="https://bugzilla.suse.com/895773" source="BUGZILLA"/>
		<reference ref_id="949942" ref_url="https://bugzilla.suse.com/949942" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6270" ref_url="https://www.suse.com/security/cve/CVE-2014-6270/" source="CVE"/>
		<reference ref_id="CVE-2014-9749" ref_url="https://www.suse.com/security/cve/CVE-2014-9749/" source="CVE"/>
		<description>
squid was updated to fix two security issues.

These security issues were fixed:
- CVE-2014-6270: Fixed an off by one in snmp subsystem (bsc#895773).
- CVE-2014-9749: Fixed a nonce replay vulnerability in Digest authentication (bsc#949942).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-13"/>
	<updated date="2015-11-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/895773">SUSE bug 895773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949942">SUSE bug 949942</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6270/">CVE-2014-6270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6270">CVE-2014-6270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9749/">CVE-2014-9749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9749">CVE-2014-9749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575188" comment="squid-2.7.STABLE5-2.12.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217778" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="976553" ref_url="https://bugzilla.suse.com/976553" source="BUGZILLA"/>
		<reference ref_id="979010" ref_url="https://bugzilla.suse.com/979010" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4051" ref_url="https://www.suse.com/security/cve/CVE-2016-4051/" source="CVE"/>
		<reference ref_id="CVE-2016-4554" ref_url="https://www.suse.com/security/cve/CVE-2016-4554/" source="CVE"/>
		<description>

This update for squid fixes the following issues:

- CVE-2016-4051: backport fix buffer overflow in cachemgr.cgi (bsc#976553)
- CVE-2016-4554: backport fix for header smuggling issue in HTTP Request processing (bsc#979010)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-24"/>
	<updated date="2016-08-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/976553">SUSE bug 976553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979010">SUSE bug 979010</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4051/">CVE-2016-4051 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4051">CVE-2016-4051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4554/">CVE-2016-4554 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4554">CVE-2016-4554 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575189" comment="squid-2.7.STABLE5-2.12.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217779" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1140738" ref_url="https://bugzilla.suse.com/1140738" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13345" ref_url="https://www.suse.com/security/cve/CVE-2019-13345/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

Security issue fixed:

- CVE-2019-13345: Fixed a cross site scripting vulnerability via user_name or auth parameter in cachemgr.cgi (bsc#1140738).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-15"/>
	<updated date="2019-08-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1140738">SUSE bug 1140738</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13345/">CVE-2019-13345 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13345">CVE-2019-13345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575190" comment="squid-2.7.STABLE5-2.12.30.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217780" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1156329" ref_url="https://bugzilla.suse.com/1156329" source="BUGZILLA"/>
		<reference ref_id="1175664" ref_url="https://bugzilla.suse.com/1175664" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523/" source="CVE"/>
		<reference ref_id="CVE-2019-18676" ref_url="https://www.suse.com/security/cve/CVE-2019-18676/" source="CVE"/>
		<reference ref_id="CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-15810: Fixed a HTTP Request Smuggling that could have resulted in cache poisoning (bsc#1175664).
- CVE-2019-12523: Disabled urn parsing and parsing of unknown schemes (bsc#1156329).
- CVE-2019-18676: Disabled urn parsing and parsing of unknown schemes (bsc#1156329).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156329">SUSE bug 1156329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175664">SUSE bug 1175664</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12523">CVE-2019-12523 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18676/">CVE-2019-18676 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18676">CVE-2019-18676 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15810">CVE-2020-15810 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670261" comment="squid-2.7.STABLE5-2.12.30.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217781" version="1" class="patch">
	<metadata>
		<title>Security update for squid3</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="677335" ref_url="https://bugzilla.suse.com/677335" source="BUGZILLA"/>
		<reference ref_id="710376" ref_url="https://bugzilla.suse.com/710376" source="BUGZILLA"/>
		<reference ref_id="715171" ref_url="https://bugzilla.suse.com/715171" source="BUGZILLA"/>
		<reference ref_id="727492" ref_url="https://bugzilla.suse.com/727492" source="BUGZILLA"/>
		<reference ref_id="737905" ref_url="https://bugzilla.suse.com/737905" source="BUGZILLA"/>
		<reference ref_id="794954" ref_url="https://bugzilla.suse.com/794954" source="BUGZILLA"/>
		<reference ref_id="796999" ref_url="https://bugzilla.suse.com/796999" source="BUGZILLA"/>
		<reference ref_id="867533" ref_url="https://bugzilla.suse.com/867533" source="BUGZILLA"/>
		<reference ref_id="893649" ref_url="https://bugzilla.suse.com/893649" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3205" ref_url="https://www.suse.com/security/cve/CVE-2011-3205/" source="CVE"/>
		<reference ref_id="CVE-2011-4096" ref_url="https://www.suse.com/security/cve/CVE-2011-4096/" source="CVE"/>
		<reference ref_id="CVE-2012-5643" ref_url="https://www.suse.com/security/cve/CVE-2012-5643/" source="CVE"/>
		<reference ref_id="CVE-2013-0188" ref_url="https://www.suse.com/security/cve/CVE-2013-0188/" source="CVE"/>
		<reference ref_id="CVE-2014-0128" ref_url="https://www.suse.com/security/cve/CVE-2014-0128/" source="CVE"/>
		<reference ref_id="CVE-2014-3609" ref_url="https://www.suse.com/security/cve/CVE-2014-3609/" source="CVE"/>
		<description>

Squid3 was updated to fix a denial of service in Range Header processing, 
which would have allowed proxy users to crash the squid proxy process. 
(CVE-2014-3609)

Security Issues:

    * CVE-2014-3609
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3609&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-12"/>
	<updated date="2014-09-12"/>
	<bugzilla href="https://bugzilla.suse.com/677335">SUSE bug 677335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/710376">SUSE bug 710376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/715171">SUSE bug 715171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/727492">SUSE bug 727492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/737905">SUSE bug 737905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/794954">SUSE bug 794954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796999">SUSE bug 796999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867533">SUSE bug 867533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893649">SUSE bug 893649</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3205/">CVE-2011-3205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3205">CVE-2011-3205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4096/">CVE-2011-4096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4096">CVE-2011-4096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5643/">CVE-2012-5643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5643">CVE-2012-5643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0188/">CVE-2013-0188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0188">CVE-2013-0188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0128/">CVE-2014-0128 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0128">CVE-2014-0128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3609/">CVE-2014-3609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3609">CVE-2014-3609 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992382" comment="squid3-3.1.12-8.16.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217782" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="895773" ref_url="https://bugzilla.suse.com/895773" source="BUGZILLA"/>
		<reference ref_id="902197" ref_url="https://bugzilla.suse.com/902197" source="BUGZILLA"/>
		<reference ref_id="938715" ref_url="https://bugzilla.suse.com/938715" source="BUGZILLA"/>
		<reference ref_id="963539" ref_url="https://bugzilla.suse.com/963539" source="BUGZILLA"/>
		<reference ref_id="967011" ref_url="https://bugzilla.suse.com/967011" source="BUGZILLA"/>
		<reference ref_id="968392" ref_url="https://bugzilla.suse.com/968392" source="BUGZILLA"/>
		<reference ref_id="968393" ref_url="https://bugzilla.suse.com/968393" source="BUGZILLA"/>
		<reference ref_id="968394" ref_url="https://bugzilla.suse.com/968394" source="BUGZILLA"/>
		<reference ref_id="968395" ref_url="https://bugzilla.suse.com/968395" source="BUGZILLA"/>
		<reference ref_id="973782" ref_url="https://bugzilla.suse.com/973782" source="BUGZILLA"/>
		<reference ref_id="973783" ref_url="https://bugzilla.suse.com/973783" source="BUGZILLA"/>
		<reference ref_id="976553" ref_url="https://bugzilla.suse.com/976553" source="BUGZILLA"/>
		<reference ref_id="976556" ref_url="https://bugzilla.suse.com/976556" source="BUGZILLA"/>
		<reference ref_id="976708" ref_url="https://bugzilla.suse.com/976708" source="BUGZILLA"/>
		<reference ref_id="979008" ref_url="https://bugzilla.suse.com/979008" source="BUGZILLA"/>
		<reference ref_id="979009" ref_url="https://bugzilla.suse.com/979009" source="BUGZILLA"/>
		<reference ref_id="979010" ref_url="https://bugzilla.suse.com/979010" source="BUGZILLA"/>
		<reference ref_id="979011" ref_url="https://bugzilla.suse.com/979011" source="BUGZILLA"/>
		<reference ref_id="993299" ref_url="https://bugzilla.suse.com/993299" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3205" ref_url="https://www.suse.com/security/cve/CVE-2011-3205/" source="CVE"/>
		<reference ref_id="CVE-2011-4096" ref_url="https://www.suse.com/security/cve/CVE-2011-4096/" source="CVE"/>
		<reference ref_id="CVE-2012-5643" ref_url="https://www.suse.com/security/cve/CVE-2012-5643/" source="CVE"/>
		<reference ref_id="CVE-2013-0188" ref_url="https://www.suse.com/security/cve/CVE-2013-0188/" source="CVE"/>
		<reference ref_id="CVE-2013-4115" ref_url="https://www.suse.com/security/cve/CVE-2013-4115/" source="CVE"/>
		<reference ref_id="CVE-2014-0128" ref_url="https://www.suse.com/security/cve/CVE-2014-0128/" source="CVE"/>
		<reference ref_id="CVE-2014-6270" ref_url="https://www.suse.com/security/cve/CVE-2014-6270/" source="CVE"/>
		<reference ref_id="CVE-2014-7141" ref_url="https://www.suse.com/security/cve/CVE-2014-7141/" source="CVE"/>
		<reference ref_id="CVE-2014-7142" ref_url="https://www.suse.com/security/cve/CVE-2014-7142/" source="CVE"/>
		<reference ref_id="CVE-2015-5400" ref_url="https://www.suse.com/security/cve/CVE-2015-5400/" source="CVE"/>
		<reference ref_id="CVE-2016-2390" ref_url="https://www.suse.com/security/cve/CVE-2016-2390/" source="CVE"/>
		<reference ref_id="CVE-2016-2569" ref_url="https://www.suse.com/security/cve/CVE-2016-2569/" source="CVE"/>
		<reference ref_id="CVE-2016-2570" ref_url="https://www.suse.com/security/cve/CVE-2016-2570/" source="CVE"/>
		<reference ref_id="CVE-2016-2571" ref_url="https://www.suse.com/security/cve/CVE-2016-2571/" source="CVE"/>
		<reference ref_id="CVE-2016-2572" ref_url="https://www.suse.com/security/cve/CVE-2016-2572/" source="CVE"/>
		<reference ref_id="CVE-2016-3947" ref_url="https://www.suse.com/security/cve/CVE-2016-3947/" source="CVE"/>
		<reference ref_id="CVE-2016-3948" ref_url="https://www.suse.com/security/cve/CVE-2016-3948/" source="CVE"/>
		<reference ref_id="CVE-2016-4051" ref_url="https://www.suse.com/security/cve/CVE-2016-4051/" source="CVE"/>
		<reference ref_id="CVE-2016-4052" ref_url="https://www.suse.com/security/cve/CVE-2016-4052/" source="CVE"/>
		<reference ref_id="CVE-2016-4053" ref_url="https://www.suse.com/security/cve/CVE-2016-4053/" source="CVE"/>
		<reference ref_id="CVE-2016-4054" ref_url="https://www.suse.com/security/cve/CVE-2016-4054/" source="CVE"/>
		<reference ref_id="CVE-2016-4553" ref_url="https://www.suse.com/security/cve/CVE-2016-4553/" source="CVE"/>
		<reference ref_id="CVE-2016-4554" ref_url="https://www.suse.com/security/cve/CVE-2016-4554/" source="CVE"/>
		<reference ref_id="CVE-2016-4555" ref_url="https://www.suse.com/security/cve/CVE-2016-4555/" source="CVE"/>
		<reference ref_id="CVE-2016-4556" ref_url="https://www.suse.com/security/cve/CVE-2016-4556/" source="CVE"/>
		<description>


This update for squid3 fixes the following issues:

- Multiple issues in pinger ICMP processing.  (CVE-2014-7141, CVE-2014-7142) 

- CVE-2016-3947: Buffer overrun issue in pinger
    ICMPv6 processing. (bsc#973782)

-  CVE-2016-4554: fix header smuggling issue in HTTP Request processing (bsc#979010)

- Fix multiple Denial of Service issues in HTTP Response processing.
    (CVE-2016-2569, CVE-2016-2570, CVE-2016-2571, CVE-2016-2572,
     bsc#968392, bsc#968393, bsc#968394, bsc#968395)
- Regression caused by the DoS fixes above (bsc#993299)

- CVE-2016-3948: Fix denial of service in HTTP Response processing (bsc#973783)

- CVE-2016-4051: fixes buffer overflow in cachemgr.cgi (bsc#976553)

- CVE-2016-4052, CVE-2016-4053, CVE-2016-4054:
  * fixes multiple issues in ESI processing (bsc#976556)

- CVE-2016-4556: fixes double free vulnerability in Esi.cc (bsc#979008)

- CVE-2015-5400: Improper Protection of Alternate Path (bsc#938715)

- CVE-2014-6270: fix off-by-one in snmp subsystem (bsc#895773)

- Memory leak in squid3 when using external_acl (bsc#976708)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-16"/>
	<updated date="2016-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/895773">SUSE bug 895773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902197">SUSE bug 902197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938715">SUSE bug 938715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963539">SUSE bug 963539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967011">SUSE bug 967011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968392">SUSE bug 968392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968393">SUSE bug 968393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968394">SUSE bug 968394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968395">SUSE bug 968395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973782">SUSE bug 973782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973783">SUSE bug 973783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976553">SUSE bug 976553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976556">SUSE bug 976556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976708">SUSE bug 976708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979008">SUSE bug 979008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979009">SUSE bug 979009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979010">SUSE bug 979010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979011">SUSE bug 979011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993299">SUSE bug 993299</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3205/">CVE-2011-3205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3205">CVE-2011-3205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4096/">CVE-2011-4096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4096">CVE-2011-4096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5643/">CVE-2012-5643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5643">CVE-2012-5643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0188/">CVE-2013-0188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0188">CVE-2013-0188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4115/">CVE-2013-4115 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4115">CVE-2013-4115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0128/">CVE-2014-0128 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0128">CVE-2014-0128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6270/">CVE-2014-6270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6270">CVE-2014-6270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7141/">CVE-2014-7141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7141">CVE-2014-7141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7142/">CVE-2014-7142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7142">CVE-2014-7142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5400/">CVE-2015-5400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5400">CVE-2015-5400 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2390/">CVE-2016-2390 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2390">CVE-2016-2390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2569/">CVE-2016-2569 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2569">CVE-2016-2569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2570/">CVE-2016-2570 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2570">CVE-2016-2570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2571/">CVE-2016-2571 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2571">CVE-2016-2571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2572/">CVE-2016-2572 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2572">CVE-2016-2572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3947/">CVE-2016-3947 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3947">CVE-2016-3947 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3948/">CVE-2016-3948 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3948">CVE-2016-3948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4051/">CVE-2016-4051 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4051">CVE-2016-4051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4052/">CVE-2016-4052 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4052">CVE-2016-4052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4053/">CVE-2016-4053 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4053">CVE-2016-4053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4054/">CVE-2016-4054 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4054">CVE-2016-4054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4553/">CVE-2016-4553 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4553">CVE-2016-4553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4554/">CVE-2016-4554 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4554">CVE-2016-4554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4555/">CVE-2016-4555 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4555">CVE-2016-4555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4556/">CVE-2016-4556 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4556">CVE-2016-4556 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575192" comment="squid3-3.1.23-8.16.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217783" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1016168" ref_url="https://bugzilla.suse.com/1016168" source="BUGZILLA"/>
		<reference ref_id="949942" ref_url="https://bugzilla.suse.com/949942" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9749" ref_url="https://www.suse.com/security/cve/CVE-2014-9749/" source="CVE"/>
		<reference ref_id="CVE-2016-10002" ref_url="https://www.suse.com/security/cve/CVE-2016-10002/" source="CVE"/>
		<description>

This update for squid3 fixes the following issues:

- CVE-2016-10002: Fixed incorrect processing of responses to If-None-Modified HTTP conditional requests. This allowed responses containing private data to clients it should not have reached (bsc#1016168)
- CVE-2014-9749: Prevent nonce replay in Digest authentication, preventing the reuse of stale auth tokens (bsc#949942)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1016168">SUSE bug 1016168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949942">SUSE bug 949942</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9749/">CVE-2014-9749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9749">CVE-2014-9749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10002/">CVE-2016-10002 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10002">CVE-2016-10002 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575193" comment="squid3-3.1.23-8.16.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217784" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1077003" ref_url="https://bugzilla.suse.com/1077003" source="BUGZILLA"/>
		<reference ref_id="1077006" ref_url="https://bugzilla.suse.com/1077006" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000024" ref_url="https://www.suse.com/security/cve/CVE-2018-1000024/" source="CVE"/>
		<reference ref_id="CVE-2018-1000027" ref_url="https://www.suse.com/security/cve/CVE-2018-1000027/" source="CVE"/>
		<description>
This update for squid3 fixes the following issues:

Security issues fixed:

- CVE-2018-1000024: DoS fix caused by incorrect pointer handling when processing ESI
  responses. This affects the default custom esi_parser (bsc#1077003).
- CVE-2018-1000027: DoS fix caused by incorrect pointer handing whien processing ESI
  responses or downloading intermediate CA certificates (bsc#1077006).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-21"/>
	<updated date="2018-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077003">SUSE bug 1077003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077006">SUSE bug 1077006</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000024/">CVE-2018-1000024 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000024">CVE-2018-1000024 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000027/">CVE-2018-1000027 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000027">CVE-2018-1000027 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575194" comment="squid3-3.1.23-8.16.37.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217785" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1090089" ref_url="https://bugzilla.suse.com/1090089" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1172" ref_url="https://www.suse.com/security/cve/CVE-2018-1172/" source="CVE"/>
		<description>
This update for squid3 fixes the following issues:

- CVE-2018-1172: Fixed a DoS caused by incorrect handling of ESI responses. (bsc#1090089, SQUID-2018:3)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090089">SUSE bug 1090089</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1172/">CVE-2018-1172 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1172">CVE-2018-1172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575195" comment="squid3-3.1.23-8.16.37.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217786" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1113668" ref_url="https://bugzilla.suse.com/1113668" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19131" ref_url="https://www.suse.com/security/cve/CVE-2018-19131/" source="CVE"/>
		<description>
This update for squid3 fixes the following issues:

Security issue fixed:

- CVE-2018-19131: Fixed Cross-Site-Scripting vulnerability in the TLS error handling (bsc#1113668).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-16"/>
	<updated date="2018-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1113668">SUSE bug 1113668</bugzilla>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19131/">CVE-2018-19131 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19131">CVE-2018-19131 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575196" comment="squid3-3.1.23-8.16.37.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217787" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1140738" ref_url="https://bugzilla.suse.com/1140738" source="BUGZILLA"/>
		<reference ref_id="1141329" ref_url="https://bugzilla.suse.com/1141329" source="BUGZILLA"/>
		<reference ref_id="1141332" ref_url="https://bugzilla.suse.com/1141332" source="BUGZILLA"/>
		<reference ref_id="1156323" ref_url="https://bugzilla.suse.com/1156323" source="BUGZILLA"/>
		<reference ref_id="1156324" ref_url="https://bugzilla.suse.com/1156324" source="BUGZILLA"/>
		<reference ref_id="1156326" ref_url="https://bugzilla.suse.com/1156326" source="BUGZILLA"/>
		<reference ref_id="1156328" ref_url="https://bugzilla.suse.com/1156328" source="BUGZILLA"/>
		<reference ref_id="1156329" ref_url="https://bugzilla.suse.com/1156329" source="BUGZILLA"/>
		<reference ref_id="1162687" ref_url="https://bugzilla.suse.com/1162687" source="BUGZILLA"/>
		<reference ref_id="1162689" ref_url="https://bugzilla.suse.com/1162689" source="BUGZILLA"/>
		<reference ref_id="1162691" ref_url="https://bugzilla.suse.com/1162691" source="BUGZILLA"/>
		<reference ref_id="1167373" ref_url="https://bugzilla.suse.com/1167373" source="BUGZILLA"/>
		<reference ref_id="1169659" ref_url="https://bugzilla.suse.com/1169659" source="BUGZILLA"/>
		<reference ref_id="1170313" ref_url="https://bugzilla.suse.com/1170313" source="BUGZILLA"/>
		<reference ref_id="1170423" ref_url="https://bugzilla.suse.com/1170423" source="BUGZILLA"/>
		<reference ref_id="1173304" ref_url="https://bugzilla.suse.com/1173304" source="BUGZILLA"/>
		<reference ref_id="1173455" ref_url="https://bugzilla.suse.com/1173455" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12519" ref_url="https://www.suse.com/security/cve/CVE-2019-12519/" source="CVE"/>
		<reference ref_id="CVE-2019-12520" ref_url="https://www.suse.com/security/cve/CVE-2019-12520/" source="CVE"/>
		<reference ref_id="CVE-2019-12521" ref_url="https://www.suse.com/security/cve/CVE-2019-12521/" source="CVE"/>
		<reference ref_id="CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523/" source="CVE"/>
		<reference ref_id="CVE-2019-12524" ref_url="https://www.suse.com/security/cve/CVE-2019-12524/" source="CVE"/>
		<reference ref_id="CVE-2019-12525" ref_url="https://www.suse.com/security/cve/CVE-2019-12525/" source="CVE"/>
		<reference ref_id="CVE-2019-12526" ref_url="https://www.suse.com/security/cve/CVE-2019-12526/" source="CVE"/>
		<reference ref_id="CVE-2019-12528" ref_url="https://www.suse.com/security/cve/CVE-2019-12528/" source="CVE"/>
		<reference ref_id="CVE-2019-12529" ref_url="https://www.suse.com/security/cve/CVE-2019-12529/" source="CVE"/>
		<reference ref_id="CVE-2019-13345" ref_url="https://www.suse.com/security/cve/CVE-2019-13345/" source="CVE"/>
		<reference ref_id="CVE-2019-18676" ref_url="https://www.suse.com/security/cve/CVE-2019-18676/" source="CVE"/>
		<reference ref_id="CVE-2019-18677" ref_url="https://www.suse.com/security/cve/CVE-2019-18677/" source="CVE"/>
		<reference ref_id="CVE-2019-18678" ref_url="https://www.suse.com/security/cve/CVE-2019-18678/" source="CVE"/>
		<reference ref_id="CVE-2019-18679" ref_url="https://www.suse.com/security/cve/CVE-2019-18679/" source="CVE"/>
		<reference ref_id="CVE-2019-18860" ref_url="https://www.suse.com/security/cve/CVE-2019-18860/" source="CVE"/>
		<reference ref_id="CVE-2020-11945" ref_url="https://www.suse.com/security/cve/CVE-2020-11945/" source="CVE"/>
		<reference ref_id="CVE-2020-14059" ref_url="https://www.suse.com/security/cve/CVE-2020-14059/" source="CVE"/>
		<reference ref_id="CVE-2020-15049" ref_url="https://www.suse.com/security/cve/CVE-2020-15049/" source="CVE"/>
		<reference ref_id="CVE-2020-8449" ref_url="https://www.suse.com/security/cve/CVE-2020-8449/" source="CVE"/>
		<reference ref_id="CVE-2020-8450" ref_url="https://www.suse.com/security/cve/CVE-2020-8450/" source="CVE"/>
		<reference ref_id="CVE-2020-8517" ref_url="https://www.suse.com/security/cve/CVE-2020-8517/" source="CVE"/>
		<description>
This update for squid3 fixes the following issues:

- Fixed a Cache Poisoning and Request Smuggling
  attack (CVE-2020-15049, bsc#1173455)
- Fixed incorrect buffer handling that can
  result in cache poisoning, remote execution, and
  denial of service attacks when processing ESI responses
  (CVE-2019-12519, CVE-2019-12521, bsc#1169659)

- Fixed handling of hostname in
  cachemgr.cgi (CVE-2019-18860, bsc#1167373)
- Fixed a potential remote execution vulnerability
  when using HTTP Digest Authentication (CVE-2020-11945, bsc#1170313)
- Fixed a potential ACL bypass, cache-bypass
  and cross-site scripting attack when processing invalid HTTP
  Request messages (CVE-2019-12520, CVE-2019-12524, bsc#1170423)
- Fixed a potential denial of service when
  processing TLS certificates during HTTPS connections
  (CVE-2020-14059, bsc#1173304)

- Fixed a potential denial of service associated
  with incorrect buffer management of HTTP Basic Authentication
  credentials (bsc#1141329, CVE-2019-12529)
- Fixed an incorrect buffer management resulting
  in vulnerability to a denial of service during processing of
  HTTP Digest Authentication credentials (bsc#1141332, CVE-2019-12525)
- Fix XSS via user_name or auth parameter
  in cachemgr.cgi (bsc#1140738, CVE-2019-13345)
- Fixed a potential code execution vulnerability
  (CVE-2019-12526, bsc#1156326)
- Fixed HTTP Request Splitting in HTTP
  message processing and information disclosure in
  HTTP Digest Authentication
  (CVE-2019-18678, CVE-2019-18679, bsc#1156323, bsc#1156324)
- Fixed a security issue allowing a remote
  client ability to cause use a buffer overflow when squid is
  acting as reverse-proxy.
  (CVE-2020-8449, CVE-2020-8450, bsc#1162687)
- Fixed a security issue allowing for information
  disclosure in FTP gateway (CVE-2019-12528, bsc#1162689)
- Fixed a security issue in ext_lm_group_acl
  when processing NTLM Authentication credentials.
  (CVE-2020-8517, bsc#1162691)

- Fixed Cross-Site Request Forgery in
  HTTP Request processing (CVE-2019-18677, bsc#1156328)

- Disable urn parsing and parsing of
  unknown schemes (bsc#1156329, CVE-2019-12523, CVE-2019-18676)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-24"/>
	<updated date="2020-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140738">SUSE bug 1140738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141329">SUSE bug 1141329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141332">SUSE bug 1141332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156323">SUSE bug 1156323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156324">SUSE bug 1156324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156326">SUSE bug 1156326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156328">SUSE bug 1156328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156329">SUSE bug 1156329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162687">SUSE bug 1162687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162689">SUSE bug 1162689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162691">SUSE bug 1162691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167373">SUSE bug 1167373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169659">SUSE bug 1169659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170313">SUSE bug 1170313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170423">SUSE bug 1170423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173304">SUSE bug 1173304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173455">SUSE bug 1173455</bugzilla>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-12519/">CVE-2019-12519 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12519">CVE-2019-12519 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12520/">CVE-2019-12520 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12520">CVE-2019-12520 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12521/">CVE-2019-12521 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12521">CVE-2019-12521 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12523">CVE-2019-12523 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12524/">CVE-2019-12524 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12524">CVE-2019-12524 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12525/">CVE-2019-12525 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12525">CVE-2019-12525 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12526/">CVE-2019-12526 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12526">CVE-2019-12526 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12528/">CVE-2019-12528 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12528">CVE-2019-12528 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12529/">CVE-2019-12529 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12529">CVE-2019-12529 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13345/">CVE-2019-13345 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13345">CVE-2019-13345 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18676/">CVE-2019-18676 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18676">CVE-2019-18676 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18677/">CVE-2019-18677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18677">CVE-2019-18677 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18678/">CVE-2019-18678 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18678">CVE-2019-18678 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18679/">CVE-2019-18679 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18679">CVE-2019-18679 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18860/">CVE-2019-18860 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18860">CVE-2019-18860 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11945/">CVE-2020-11945 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11945">CVE-2020-11945 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14059/">CVE-2020-14059 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14059">CVE-2020-14059 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15049/">CVE-2020-15049 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15049">CVE-2020-15049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8449/">CVE-2020-8449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8449">CVE-2020-8449 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8450/">CVE-2020-8450 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8450">CVE-2020-8450 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8517/">CVE-2020-8517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8517">CVE-2020-8517 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575197" comment="squid3-3.1.23-8.16.37.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217788" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1175664" ref_url="https://bugzilla.suse.com/1175664" source="BUGZILLA"/>
		<reference ref_id="1175665" ref_url="https://bugzilla.suse.com/1175665" source="BUGZILLA"/>
		<reference ref_id="1175671" ref_url="https://bugzilla.suse.com/1175671" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810/" source="CVE"/>
		<reference ref_id="CVE-2020-15811" ref_url="https://www.suse.com/security/cve/CVE-2020-15811/" source="CVE"/>
		<reference ref_id="CVE-2020-24606" ref_url="https://www.suse.com/security/cve/CVE-2020-24606/" source="CVE"/>
		<description>
This update for squid3 fixes the following issues:

- CVE-2020-15811: Fixed an HTTP request splitting vulnerability (bsc#1175665).
- CVE-2020-24606: Fixed a DoS vulnerability when processing Cache Digest Responses (bsc#1175671).
- CVE-2020-15810: Fixed an HTTP request smuggling vulnerability (bsc#1175664).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-30"/>
	<updated date="2020-12-30"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1175664">SUSE bug 1175664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175665">SUSE bug 1175665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175671">SUSE bug 1175671</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15810">CVE-2020-15810 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15811/">CVE-2020-15811 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15811">CVE-2020-15811 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24606/">CVE-2020-24606 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24606">CVE-2020-24606 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575198" comment="squid3-3.1.23-8.16.37.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217789" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1183436" ref_url="https://bugzilla.suse.com/1183436" source="BUGZILLA"/>
		<reference ref_id="1185921" ref_url="https://bugzilla.suse.com/1185921" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25097" ref_url="https://www.suse.com/security/cve/CVE-2020-25097/" source="CVE"/>
		<reference ref_id="CVE-2021-28651" ref_url="https://www.suse.com/security/cve/CVE-2021-28651/" source="CVE"/>
		<description>
This update for squid3 fixes the following issues:

- CVE-2021-28651: Fixed a denial of service issue when processing URN
  resource identifiers (bsc#1185921).
- CVE-2020-25097: Fixed an HTTP request smuggling issue (bsc#1183436).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183436">SUSE bug 1183436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185921">SUSE bug 1185921</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25097/">CVE-2020-25097 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25097">CVE-2020-25097 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28651/">CVE-2021-28651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28651">CVE-2021-28651 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671855" comment="squid3-3.1.23-8.16.37.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217790" version="1" class="patch">
	<metadata>
		<title>Security update for squidGuard (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="985612" ref_url="https://bugzilla.suse.com/985612" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8936" ref_url="https://www.suse.com/security/cve/CVE-2015-8936/" source="CVE"/>
		<description>
squidGuard was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-8936: Reflected cross site scripting vulnerability because of insufficient escaping (bsc#985612).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-12"/>
	<updated date="2016-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/985612">SUSE bug 985612</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8936/">CVE-2015-8936 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8936">CVE-2015-8936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575199" comment="squidGuard-1.4-13.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575200" comment="squidGuard-doc-1.4-13.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217791" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="615915" ref_url="https://bugzilla.suse.com/615915" source="BUGZILLA"/>
		<reference ref_id="677041" ref_url="https://bugzilla.suse.com/677041" source="BUGZILLA"/>
		<reference ref_id="761325" ref_url="https://bugzilla.suse.com/761325" source="BUGZILLA"/>
		<reference ref_id="779038" ref_url="https://bugzilla.suse.com/779038" source="BUGZILLA"/>
		<reference ref_id="815236" ref_url="https://bugzilla.suse.com/815236" source="BUGZILLA"/>
		<reference ref_id="833278" ref_url="https://bugzilla.suse.com/833278" source="BUGZILLA"/>
		<reference ref_id="840826" ref_url="https://bugzilla.suse.com/840826" source="BUGZILLA"/>
		<reference ref_id="847506" ref_url="https://bugzilla.suse.com/847506" source="BUGZILLA"/>
		<reference ref_id="870572" ref_url="https://bugzilla.suse.com/870572" source="BUGZILLA"/>
		<reference ref_id="876449" ref_url="https://bugzilla.suse.com/876449" source="BUGZILLA"/>
		<reference ref_id="933591" ref_url="https://bugzilla.suse.com/933591" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2628" ref_url="https://www.suse.com/security/cve/CVE-2010-2628/" source="CVE"/>
		<reference ref_id="CVE-2012-2388" ref_url="https://www.suse.com/security/cve/CVE-2012-2388/" source="CVE"/>
		<reference ref_id="CVE-2013-2944" ref_url="https://www.suse.com/security/cve/CVE-2013-2944/" source="CVE"/>
		<reference ref_id="CVE-2013-5018" ref_url="https://www.suse.com/security/cve/CVE-2013-5018/" source="CVE"/>
		<reference ref_id="CVE-2014-2338" ref_url="https://www.suse.com/security/cve/CVE-2014-2338/" source="CVE"/>
		<reference ref_id="CVE-2014-2891" ref_url="https://www.suse.com/security/cve/CVE-2014-2891/" source="CVE"/>
		<reference ref_id="CVE-2015-4171" ref_url="https://www.suse.com/security/cve/CVE-2015-4171/" source="CVE"/>
		<description>

This update fixes a NULL ptr dereference (DoS) via ID_DER_ASN1_DN ID 
payloads.

Security Issue reference:

    * CVE-2014-2891
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2891&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-14"/>
	<updated date="2014-05-14"/>
	<bugzilla href="https://bugzilla.suse.com/615915">SUSE bug 615915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/677041">SUSE bug 677041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761325">SUSE bug 761325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779038">SUSE bug 779038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815236">SUSE bug 815236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833278">SUSE bug 833278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840826">SUSE bug 840826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847506">SUSE bug 847506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870572">SUSE bug 870572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876449">SUSE bug 876449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933591">SUSE bug 933591</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2628/">CVE-2010-2628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2628">CVE-2010-2628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2388/">CVE-2012-2388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2388">CVE-2012-2388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2944/">CVE-2013-2944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2944">CVE-2013-2944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5018/">CVE-2013-5018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5018">CVE-2013-5018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2338/">CVE-2014-2338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2338">CVE-2014-2338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2891/">CVE-2014-2891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2891">CVE-2014-2891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4171/">CVE-2015-4171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4171">CVE-2015-4171 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992383" comment="strongswan-4.4.0-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992384" comment="strongswan-doc-4.4.0-6.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992383" comment="strongswan-4.4.0-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992384" comment="strongswan-doc-4.4.0-6.25.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217792" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="953817" ref_url="https://bugzilla.suse.com/953817" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8023" ref_url="https://www.suse.com/security/cve/CVE-2015-8023/" source="CVE"/>
		<description>
The strongswan package was updated to fix the following security issue:

- CVE-2015-8023: Fixed an authentication bypass vulnerability in the eap-mschapv2 plugin (bsc#953817).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-03"/>
	<updated date="2015-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/953817">SUSE bug 953817</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8023/">CVE-2015-8023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8023">CVE-2015-8023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575203" comment="strongswan-4.4.0-6.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575204" comment="strongswan-doc-4.4.0-6.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217793" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1039514" ref_url="https://bugzilla.suse.com/1039514" source="BUGZILLA"/>
		<reference ref_id="1039515" ref_url="https://bugzilla.suse.com/1039515" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9022" ref_url="https://www.suse.com/security/cve/CVE-2017-9022/" source="CVE"/>
		<reference ref_id="CVE-2017-9023" ref_url="https://www.suse.com/security/cve/CVE-2017-9023/" source="CVE"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2017-9022: Insufficient Input Validation in gmp Plugin leads to Denial of service (bsc#1039514)
- CVE-2017-9023: Incorrect x509 ASN.1 parser error handling could lead to Denial of service  (bsc#1039515)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-01"/>
	<updated date="2017-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1039514">SUSE bug 1039514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039515">SUSE bug 1039515</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9022/">CVE-2017-9022 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9022">CVE-2017-9022 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9023/">CVE-2017-9023 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9023">CVE-2017-9023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575205" comment="strongswan-4.4.0-6.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575206" comment="strongswan-doc-4.4.0-6.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217794" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1051222" ref_url="https://bugzilla.suse.com/1051222" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11185" ref_url="https://www.suse.com/security/cve/CVE-2017-11185/" source="CVE"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2017-11185: Specific RSA signatures passed to the gmp plugin for verification can
cause a null-pointer dereference and it may lead to a denial of service (bsc#1051222) 

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-29"/>
	<updated date="2017-08-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1051222">SUSE bug 1051222</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11185/">CVE-2017-11185 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11185">CVE-2017-11185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575207" comment="strongswan-4.4.0-6.36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575208" comment="strongswan-doc-4.4.0-6.36.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217795" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1094462" ref_url="https://bugzilla.suse.com/1094462" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5388" ref_url="https://www.suse.com/security/cve/CVE-2018-5388/" source="CVE"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2018-5388: Fixed a buffer underflow which may allow to a remote attacker 
  with local user credentials to resource exhaustion and denial of service while 
  reading from the socket (bsc#1094462).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-30"/>
	<updated date="2019-12-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094462">SUSE bug 1094462</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5388/">CVE-2018-5388 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5388">CVE-2018-5388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575209" comment="strongswan-4.4.0-6.36.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575210" comment="strongswan-doc-4.4.0-6.36.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217796" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1191435" ref_url="https://bugzilla.suse.com/1191435" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41991" ref_url="https://www.suse.com/security/cve/CVE-2021-41991/" source="CVE"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-19"/>
	<updated date="2021-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191435">SUSE bug 1191435</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41991/">CVE-2021-41991 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41991">CVE-2021-41991 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652840" comment="strongswan-4.4.0-6.36.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652841" comment="strongswan-doc-4.4.0-6.36.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217797" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1107874" ref_url="https://bugzilla.suse.com/1107874" source="BUGZILLA"/>
		<reference ref_id="1109845" ref_url="https://bugzilla.suse.com/1109845" source="BUGZILLA"/>
		<reference ref_id="1194471" ref_url="https://bugzilla.suse.com/1194471" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16151" ref_url="https://www.suse.com/security/cve/CVE-2018-16151/" source="CVE"/>
		<reference ref_id="CVE-2018-16152" ref_url="https://www.suse.com/security/cve/CVE-2018-16152/" source="CVE"/>
		<reference ref_id="CVE-2018-17540" ref_url="https://www.suse.com/security/cve/CVE-2018-17540/" source="CVE"/>
		<reference ref_id="CVE-2021-45079" ref_url="https://www.suse.com/security/cve/CVE-2021-45079/" source="CVE"/>
		<description>
This update for strongswan fixes the following issues:
	  
- CVE-2018-16151: Fixed flaws in gmp plugin that could lead to authorization bypass. (bsc#1107874)
- CVE-2018-16152: Fixed flaws in gmp plugin that could lead to authorization bypass. (bsc#1107874)
- CVE-2018-17540: Fixed insufficient input validation in gmp plugin. (bsc#1109845)
- CVE-2021-45079: Fixed authentication bypass in EAP authentication. (bsc#1194471)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109845">SUSE bug 1109845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194471">SUSE bug 1194471</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16151/">CVE-2018-16151 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16151">CVE-2018-16151 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16152/">CVE-2018-16152 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16152">CVE-2018-16152 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17540/">CVE-2018-17540 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17540">CVE-2018-17540 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45079/">CVE-2021-45079 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45079">CVE-2021-45079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664947" comment="strongswan-4.4.0-6.36.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664948" comment="strongswan-doc-4.4.0-6.36.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217798" version="1" class="patch">
	<metadata>
		<title>Security update for stunnel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="674554" ref_url="https://bugzilla.suse.com/674554" source="BUGZILLA"/>
		<reference ref_id="697549" ref_url="https://bugzilla.suse.com/697549" source="BUGZILLA"/>
		<reference ref_id="775262" ref_url="https://bugzilla.suse.com/775262" source="BUGZILLA"/>
		<reference ref_id="776756" ref_url="https://bugzilla.suse.com/776756" source="BUGZILLA"/>
		<reference ref_id="807450" ref_url="https://bugzilla.suse.com/807450" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1762" ref_url="https://www.suse.com/security/cve/CVE-2013-1762/" source="CVE"/>
		<description>

This update for stunnel fixes a buffer overflow vulnerability caused by 
incorrect integer conversion in the NTLM authentication of the CONNECT 
protocol negotiation (CVE-2013-1762).

Security Issue reference:

    * CVE-2013-1762
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1762&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-05"/>
	<updated date="2013-03-05"/>
	<bugzilla href="https://bugzilla.suse.com/674554">SUSE bug 674554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/697549">SUSE bug 697549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775262">SUSE bug 775262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776756">SUSE bug 776756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807450">SUSE bug 807450</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1762/">CVE-2013-1762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1762">CVE-2013-1762 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992385" comment="stunnel-4.36-0.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217799" version="1" class="patch">
	<metadata>
		<title>Security update for sudo</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="667558" ref_url="https://bugzilla.suse.com/667558" source="BUGZILLA"/>
		<reference ref_id="681296" ref_url="https://bugzilla.suse.com/681296" source="BUGZILLA"/>
		<reference ref_id="720181" ref_url="https://bugzilla.suse.com/720181" source="BUGZILLA"/>
		<reference ref_id="724490" ref_url="https://bugzilla.suse.com/724490" source="BUGZILLA"/>
		<reference ref_id="739214" ref_url="https://bugzilla.suse.com/739214" source="BUGZILLA"/>
		<reference ref_id="760697" ref_url="https://bugzilla.suse.com/760697" source="BUGZILLA"/>
		<reference ref_id="762327" ref_url="https://bugzilla.suse.com/762327" source="BUGZILLA"/>
		<reference ref_id="806919" ref_url="https://bugzilla.suse.com/806919" source="BUGZILLA"/>
		<reference ref_id="806921" ref_url="https://bugzilla.suse.com/806921" source="BUGZILLA"/>
		<reference ref_id="817349" ref_url="https://bugzilla.suse.com/817349" source="BUGZILLA"/>
		<reference ref_id="817350" ref_url="https://bugzilla.suse.com/817350" source="BUGZILLA"/>
		<reference ref_id="866503" ref_url="https://bugzilla.suse.com/866503" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2337" ref_url="https://www.suse.com/security/cve/CVE-2012-2337/" source="CVE"/>
		<reference ref_id="CVE-2013-1775" ref_url="https://www.suse.com/security/cve/CVE-2013-1775/" source="CVE"/>
		<reference ref_id="CVE-2013-1776" ref_url="https://www.suse.com/security/cve/CVE-2013-1776/" source="CVE"/>
		<reference ref_id="CVE-2013-2776" ref_url="https://www.suse.com/security/cve/CVE-2013-2776/" source="CVE"/>
		<reference ref_id="CVE-2013-2777" ref_url="https://www.suse.com/security/cve/CVE-2013-2777/" source="CVE"/>
		<reference ref_id="CVE-2014-0106" ref_url="https://www.suse.com/security/cve/CVE-2014-0106/" source="CVE"/>
		<description>

This security update for sudo provides a fix for the following issue:

    * A security policy bypass when env_reset is disabled. (CVE-2014-0106,
      bnc#866503)

Security Issues references:

    * CVE-2014-0106
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0106&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-21"/>
	<updated date="2014-03-21"/>
	<bugzilla href="https://bugzilla.suse.com/667558">SUSE bug 667558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/681296">SUSE bug 681296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/720181">SUSE bug 720181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/724490">SUSE bug 724490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/739214">SUSE bug 739214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760697">SUSE bug 760697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762327">SUSE bug 762327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806919">SUSE bug 806919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806921">SUSE bug 806921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817349">SUSE bug 817349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817350">SUSE bug 817350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866503">SUSE bug 866503</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2337/">CVE-2012-2337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2337">CVE-2012-2337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1775/">CVE-2013-1775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1775">CVE-2013-1775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1776/">CVE-2013-1776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1776">CVE-2013-1776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2776/">CVE-2013-2776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2776">CVE-2013-2776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2777/">CVE-2013-2777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2777">CVE-2013-2777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0106/">CVE-2014-0106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0106">CVE-2014-0106 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992386" comment="sudo-1.7.6p2-0.2.14.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992386" comment="sudo-1.7.6p2-0.2.14.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217800" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1007501" ref_url="https://bugzilla.suse.com/1007501" source="BUGZILLA"/>
		<reference ref_id="1007766" ref_url="https://bugzilla.suse.com/1007766" source="BUGZILLA"/>
		<reference ref_id="823292" ref_url="https://bugzilla.suse.com/823292" source="BUGZILLA"/>
		<reference ref_id="823796" ref_url="https://bugzilla.suse.com/823796" source="BUGZILLA"/>
		<reference ref_id="917806" ref_url="https://bugzilla.suse.com/917806" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9680" ref_url="https://www.suse.com/security/cve/CVE-2014-9680/" source="CVE"/>
		<reference ref_id="CVE-2016-7032" ref_url="https://www.suse.com/security/cve/CVE-2016-7032/" source="CVE"/>
		<reference ref_id="CVE-2016-7076" ref_url="https://www.suse.com/security/cve/CVE-2016-7076/" source="CVE"/>
		<description>

This update for sudo fixes the following issues:

Security issues:
- CVE-2016-7032: noexec bypass via system() and popen(). (bsc#1007766)
- CVE-2016-7076: noexec bypass via wordexp(). (bsc#1007501)
- CVE-2014-9680: unsafe handling of TZ environment variable. (bsc#917806)

Bug fixes:
- bsc#823292: Fix the default flag settings in manual page to reflect changes caused
  by sudoers patch.
- bsc#823796: Escape the command args for 'sudo -i' and 'sudo -s'.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-20"/>
	<updated date="2016-12-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007501">SUSE bug 1007501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007766">SUSE bug 1007766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823292">SUSE bug 823292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823796">SUSE bug 823796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917806">SUSE bug 917806</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9680/">CVE-2014-9680 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9680">CVE-2014-9680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7032/">CVE-2016-7032 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7032">CVE-2016-7032 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7076/">CVE-2016-7076 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7076">CVE-2016-7076 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575212" comment="sudo-1.7.6p2-0.2.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217801" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1153674" ref_url="https://bugzilla.suse.com/1153674" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287/" source="CVE"/>
		<description>
This update for sudo fixes the following issue:

- CVE-2019-14287: Fixed an issue where a user with sudo privileges that allowed them to run commands with an arbitrary uid, could run commands as root, despite being forbidden to do so in sudoers (bsc#1153674).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-21"/>
	<updated date="2019-10-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153674">SUSE bug 1153674</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14287">CVE-2019-14287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575213" comment="sudo-1.7.6p2-0.2.21.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217802" version="1" class="patch">
	<metadata>
		<title>Recommended update for supportutils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="595768" ref_url="https://bugzilla.suse.com/595768" source="BUGZILLA"/>
		<reference ref_id="596846" ref_url="https://bugzilla.suse.com/596846" source="BUGZILLA"/>
		<reference ref_id="599594" ref_url="https://bugzilla.suse.com/599594" source="BUGZILLA"/>
		<reference ref_id="599742" ref_url="https://bugzilla.suse.com/599742" source="BUGZILLA"/>
		<reference ref_id="600165" ref_url="https://bugzilla.suse.com/600165" source="BUGZILLA"/>
		<reference ref_id="604406" ref_url="https://bugzilla.suse.com/604406" source="BUGZILLA"/>
		<reference ref_id="607733" ref_url="https://bugzilla.suse.com/607733" source="BUGZILLA"/>
		<reference ref_id="619248" ref_url="https://bugzilla.suse.com/619248" source="BUGZILLA"/>
		<reference ref_id="620273" ref_url="https://bugzilla.suse.com/620273" source="BUGZILLA"/>
		<reference ref_id="621190" ref_url="https://bugzilla.suse.com/621190" source="BUGZILLA"/>
		<reference ref_id="623364" ref_url="https://bugzilla.suse.com/623364" source="BUGZILLA"/>
		<reference ref_id="624142" ref_url="https://bugzilla.suse.com/624142" source="BUGZILLA"/>
		<reference ref_id="624976" ref_url="https://bugzilla.suse.com/624976" source="BUGZILLA"/>
		<reference ref_id="630470" ref_url="https://bugzilla.suse.com/630470" source="BUGZILLA"/>
		<reference ref_id="630497" ref_url="https://bugzilla.suse.com/630497" source="BUGZILLA"/>
		<reference ref_id="631435" ref_url="https://bugzilla.suse.com/631435" source="BUGZILLA"/>
		<reference ref_id="632315" ref_url="https://bugzilla.suse.com/632315" source="BUGZILLA"/>
		<reference ref_id="635114" ref_url="https://bugzilla.suse.com/635114" source="BUGZILLA"/>
		<reference ref_id="637038" ref_url="https://bugzilla.suse.com/637038" source="BUGZILLA"/>
		<reference ref_id="637675" ref_url="https://bugzilla.suse.com/637675" source="BUGZILLA"/>
		<reference ref_id="638813" ref_url="https://bugzilla.suse.com/638813" source="BUGZILLA"/>
		<reference ref_id="640554" ref_url="https://bugzilla.suse.com/640554" source="BUGZILLA"/>
		<reference ref_id="641126" ref_url="https://bugzilla.suse.com/641126" source="BUGZILLA"/>
		<reference ref_id="642837" ref_url="https://bugzilla.suse.com/642837" source="BUGZILLA"/>
		<reference ref_id="643575" ref_url="https://bugzilla.suse.com/643575" source="BUGZILLA"/>
		<reference ref_id="645418" ref_url="https://bugzilla.suse.com/645418" source="BUGZILLA"/>
		<reference ref_id="646645" ref_url="https://bugzilla.suse.com/646645" source="BUGZILLA"/>
		<reference ref_id="649282" ref_url="https://bugzilla.suse.com/649282" source="BUGZILLA"/>
		<reference ref_id="649603" ref_url="https://bugzilla.suse.com/649603" source="BUGZILLA"/>
		<reference ref_id="652675" ref_url="https://bugzilla.suse.com/652675" source="BUGZILLA"/>
		<reference ref_id="652693" ref_url="https://bugzilla.suse.com/652693" source="BUGZILLA"/>
		<reference ref_id="653544" ref_url="https://bugzilla.suse.com/653544" source="BUGZILLA"/>
		<reference ref_id="656855" ref_url="https://bugzilla.suse.com/656855" source="BUGZILLA"/>
		<reference ref_id="659243" ref_url="https://bugzilla.suse.com/659243" source="BUGZILLA"/>
		<reference ref_id="659254" ref_url="https://bugzilla.suse.com/659254" source="BUGZILLA"/>
		<reference ref_id="661611" ref_url="https://bugzilla.suse.com/661611" source="BUGZILLA"/>
		<reference ref_id="667677" ref_url="https://bugzilla.suse.com/667677" source="BUGZILLA"/>
		<reference ref_id="674469" ref_url="https://bugzilla.suse.com/674469" source="BUGZILLA"/>
		<reference ref_id="674641" ref_url="https://bugzilla.suse.com/674641" source="BUGZILLA"/>
		<reference ref_id="675622" ref_url="https://bugzilla.suse.com/675622" source="BUGZILLA"/>
		<reference ref_id="683511" ref_url="https://bugzilla.suse.com/683511" source="BUGZILLA"/>
		<reference ref_id="683514" ref_url="https://bugzilla.suse.com/683514" source="BUGZILLA"/>
		<reference ref_id="683516" ref_url="https://bugzilla.suse.com/683516" source="BUGZILLA"/>
		<reference ref_id="683962" ref_url="https://bugzilla.suse.com/683962" source="BUGZILLA"/>
		<reference ref_id="692308" ref_url="https://bugzilla.suse.com/692308" source="BUGZILLA"/>
		<reference ref_id="692344" ref_url="https://bugzilla.suse.com/692344" source="BUGZILLA"/>
		<reference ref_id="692379" ref_url="https://bugzilla.suse.com/692379" source="BUGZILLA"/>
		<reference ref_id="692727" ref_url="https://bugzilla.suse.com/692727" source="BUGZILLA"/>
		<reference ref_id="697538" ref_url="https://bugzilla.suse.com/697538" source="BUGZILLA"/>
		<reference ref_id="699734" ref_url="https://bugzilla.suse.com/699734" source="BUGZILLA"/>
		<reference ref_id="700317" ref_url="https://bugzilla.suse.com/700317" source="BUGZILLA"/>
		<reference ref_id="700389" ref_url="https://bugzilla.suse.com/700389" source="BUGZILLA"/>
		<reference ref_id="701372" ref_url="https://bugzilla.suse.com/701372" source="BUGZILLA"/>
		<reference ref_id="703005" ref_url="https://bugzilla.suse.com/703005" source="BUGZILLA"/>
		<reference ref_id="703006" ref_url="https://bugzilla.suse.com/703006" source="BUGZILLA"/>
		<reference ref_id="703310" ref_url="https://bugzilla.suse.com/703310" source="BUGZILLA"/>
		<reference ref_id="703599" ref_url="https://bugzilla.suse.com/703599" source="BUGZILLA"/>
		<reference ref_id="704195" ref_url="https://bugzilla.suse.com/704195" source="BUGZILLA"/>
		<reference ref_id="710066" ref_url="https://bugzilla.suse.com/710066" source="BUGZILLA"/>
		<reference ref_id="710484" ref_url="https://bugzilla.suse.com/710484" source="BUGZILLA"/>
		<reference ref_id="712874" ref_url="https://bugzilla.suse.com/712874" source="BUGZILLA"/>
		<reference ref_id="718091" ref_url="https://bugzilla.suse.com/718091" source="BUGZILLA"/>
		<reference ref_id="727546" ref_url="https://bugzilla.suse.com/727546" source="BUGZILLA"/>
		<reference ref_id="738110" ref_url="https://bugzilla.suse.com/738110" source="BUGZILLA"/>
		<reference ref_id="738472" ref_url="https://bugzilla.suse.com/738472" source="BUGZILLA"/>
		<reference ref_id="738475" ref_url="https://bugzilla.suse.com/738475" source="BUGZILLA"/>
		<reference ref_id="743084" ref_url="https://bugzilla.suse.com/743084" source="BUGZILLA"/>
		<reference ref_id="743454" ref_url="https://bugzilla.suse.com/743454" source="BUGZILLA"/>
		<reference ref_id="756890" ref_url="https://bugzilla.suse.com/756890" source="BUGZILLA"/>
		<reference ref_id="765150" ref_url="https://bugzilla.suse.com/765150" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-3912" ref_url="https://www.suse.com/security/cve/CVE-2010-3912/" source="CVE"/>
		<description>

This collective update provides the newest version of supportutils, which 
contains the following tools used for troubleshooting : supportconfig, 
chkbin, schealth, getappcore, analyzevmcore.

The fixes in detail are:

    * fixed multiple Novell DNS configuration files (bnc#765150)
    * fixed HA error when cibadmin -Q doesn't connect
    * fixed ldapsearch search on non-default port (bnc#756890)
    * added systool base output to sysfs.txt
    * analyzevmcore files included in crash.txt
    * /etc/services included in network.txt
    * added analyzevmcore
    * added getappcore
    * changed to systool for sysfs.txt
    * added local binary list (bnc#743084)
    * added curl check for update registrations
    * fixed conf file execution in plugins directory (bnc#743454)
    * added a supportconfig summary in summary.xml
    * added /etc/init.d/halt.local to boot.txt
    * added fslist_ufiles_info (bnc#738475)
    * fixed fslist_info order (bnc#738472)
    * added kdump rpm check for sles11sp1 (bnc#738110)
    * added plugin-icommand to scplugin.rc for internal bash commands
    * added /proc/sys to proc.txt
    * removed extra bridge command
    * the -v for rpm validation now works on all versions
    * added netstat check for port 6901 to novell-dfs.txt (bnc#712874)
    * added rpm packages to samba.txt list (bnc#727546)
    * added sbd HAE information to ha.txt (bnc#710484)
    * added KVM information to SLE11GA
    * added LANG for consistent output (bnc#718091)
    * improved novell-dfs.txt (bnc#712874)
    * added /var/log/xdm.errors to x.txt (bnc#710066)

		</description>
<advisory from="security@suse.de">
	<issued date="2012-06-26"/>
	<updated date="2012-06-26"/>
	<bugzilla href="https://bugzilla.suse.com/595768">SUSE bug 595768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/596846">SUSE bug 596846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/599594">SUSE bug 599594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/599742">SUSE bug 599742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/600165">SUSE bug 600165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/604406">SUSE bug 604406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/607733">SUSE bug 607733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/619248">SUSE bug 619248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/620273">SUSE bug 620273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/621190">SUSE bug 621190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/623364">SUSE bug 623364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/624142">SUSE bug 624142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/624976">SUSE bug 624976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/630470">SUSE bug 630470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/630497">SUSE bug 630497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/631435">SUSE bug 631435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/632315">SUSE bug 632315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/635114">SUSE bug 635114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/637038">SUSE bug 637038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/637675">SUSE bug 637675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638813">SUSE bug 638813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/640554">SUSE bug 640554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/641126">SUSE bug 641126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/642837">SUSE bug 642837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/643575">SUSE bug 643575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/645418">SUSE bug 645418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/646645">SUSE bug 646645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649282">SUSE bug 649282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649603">SUSE bug 649603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652675">SUSE bug 652675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652693">SUSE bug 652693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/653544">SUSE bug 653544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/656855">SUSE bug 656855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/659243">SUSE bug 659243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/659254">SUSE bug 659254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/661611">SUSE bug 661611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/667677">SUSE bug 667677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/674469">SUSE bug 674469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/674641">SUSE bug 674641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/675622">SUSE bug 675622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/683511">SUSE bug 683511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/683514">SUSE bug 683514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/683516">SUSE bug 683516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/683962">SUSE bug 683962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/692308">SUSE bug 692308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/692344">SUSE bug 692344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/692379">SUSE bug 692379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/692727">SUSE bug 692727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/697538">SUSE bug 697538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/699734">SUSE bug 699734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/700317">SUSE bug 700317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/700389">SUSE bug 700389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/701372">SUSE bug 701372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703005">SUSE bug 703005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703006">SUSE bug 703006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703310">SUSE bug 703310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703599">SUSE bug 703599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704195">SUSE bug 704195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/710066">SUSE bug 710066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/710484">SUSE bug 710484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/712874">SUSE bug 712874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/718091">SUSE bug 718091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/727546">SUSE bug 727546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/738110">SUSE bug 738110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/738472">SUSE bug 738472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/738475">SUSE bug 738475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/743084">SUSE bug 743084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/743454">SUSE bug 743454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/756890">SUSE bug 756890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/765150">SUSE bug 765150</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3912/">CVE-2010-3912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3912">CVE-2010-3912 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992387" comment="supportutils-1.20-0.28.61.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217803" version="1" class="patch">
	<metadata>
		<title>Recommended update for sysconfig</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="559170" ref_url="https://bugzilla.suse.com/559170" source="BUGZILLA"/>
		<reference ref_id="572367" ref_url="https://bugzilla.suse.com/572367" source="BUGZILLA"/>
		<reference ref_id="576355" ref_url="https://bugzilla.suse.com/576355" source="BUGZILLA"/>
		<reference ref_id="580018" ref_url="https://bugzilla.suse.com/580018" source="BUGZILLA"/>
		<reference ref_id="607511" ref_url="https://bugzilla.suse.com/607511" source="BUGZILLA"/>
		<reference ref_id="609809" ref_url="https://bugzilla.suse.com/609809" source="BUGZILLA"/>
		<reference ref_id="616765" ref_url="https://bugzilla.suse.com/616765" source="BUGZILLA"/>
		<reference ref_id="617373" ref_url="https://bugzilla.suse.com/617373" source="BUGZILLA"/>
		<reference ref_id="630434" ref_url="https://bugzilla.suse.com/630434" source="BUGZILLA"/>
		<reference ref_id="637183" ref_url="https://bugzilla.suse.com/637183" source="BUGZILLA"/>
		<reference ref_id="644738" ref_url="https://bugzilla.suse.com/644738" source="BUGZILLA"/>
		<reference ref_id="648830" ref_url="https://bugzilla.suse.com/648830" source="BUGZILLA"/>
		<reference ref_id="660774" ref_url="https://bugzilla.suse.com/660774" source="BUGZILLA"/>
		<reference ref_id="669361" ref_url="https://bugzilla.suse.com/669361" source="BUGZILLA"/>
		<reference ref_id="670871" ref_url="https://bugzilla.suse.com/670871" source="BUGZILLA"/>
		<reference ref_id="697929" ref_url="https://bugzilla.suse.com/697929" source="BUGZILLA"/>
		<reference ref_id="698478" ref_url="https://bugzilla.suse.com/698478" source="BUGZILLA"/>
		<reference ref_id="735394" ref_url="https://bugzilla.suse.com/735394" source="BUGZILLA"/>
		<reference ref_id="737078" ref_url="https://bugzilla.suse.com/737078" source="BUGZILLA"/>
		<reference ref_id="737333" ref_url="https://bugzilla.suse.com/737333" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-4182" ref_url="https://www.suse.com/security/cve/CVE-2011-4182/" source="CVE"/>
		<description>

This update to sysconfig fixes the following issues:

    * bnc#737333: Improved the bonding setup documentation.
    * bnc#737078: Fixed /etc/init.d/network to not fail when a hotplug
      bonding slave interface is not available at boot time.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-04-20"/>
	<updated date="2012-04-20"/>
	<bugzilla href="https://bugzilla.suse.com/559170">SUSE bug 559170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/572367">SUSE bug 572367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/576355">SUSE bug 576355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/580018">SUSE bug 580018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/607511">SUSE bug 607511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/609809">SUSE bug 609809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/616765">SUSE bug 616765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/617373">SUSE bug 617373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/630434">SUSE bug 630434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/637183">SUSE bug 637183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/644738">SUSE bug 644738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648830">SUSE bug 648830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/660774">SUSE bug 660774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/669361">SUSE bug 669361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/670871">SUSE bug 670871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/697929">SUSE bug 697929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698478">SUSE bug 698478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/735394">SUSE bug 735394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/737078">SUSE bug 737078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/737333">SUSE bug 737333</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4182/">CVE-2011-4182 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-4182">CVE-2011-4182 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992388" comment="sysconfig-0.71.31-0.9.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217804" version="1" class="patch">
	<metadata>
		<title>Security update for syslog-ng (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1169385" ref_url="https://bugzilla.suse.com/1169385" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8019" ref_url="https://www.suse.com/security/cve/CVE-2020-8019/" source="CVE"/>
		<description>
This update for syslog-ng fixes the following issues:

- CVE-2020-8019: Fixed a local privilege escalation during package update (bsc#1169385).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-14"/>
	<updated date="2020-05-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169385">SUSE bug 1169385</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8019/">CVE-2020-8019 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8019">CVE-2020-8019 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575214" comment="syslog-ng-2.0.9-27.34.40.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217805" version="1" class="patch">
	<metadata>
		<title>Recommended update for system-config-printer</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="590397" ref_url="https://bugzilla.suse.com/590397" source="BUGZILLA"/>
		<reference ref_id="596445" ref_url="https://bugzilla.suse.com/596445" source="BUGZILLA"/>
		<reference ref_id="623894" ref_url="https://bugzilla.suse.com/623894" source="BUGZILLA"/>
		<reference ref_id="733542" ref_url="https://bugzilla.suse.com/733542" source="BUGZILLA"/>
		<reference ref_id="735322" ref_url="https://bugzilla.suse.com/735322" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2899" ref_url="https://www.suse.com/security/cve/CVE-2011-2899/" source="CVE"/>
		<reference ref_id="CVE-2011-4405" ref_url="https://www.suse.com/security/cve/CVE-2011-4405/" source="CVE"/>
		<description>

This update fixes an issue with Samba authentication, where a pop up window 
wasn't displayed immediately when sending a job to a Samba printer 
(bnc#590397).

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-25"/>
	<updated date="2012-02-25"/>
	<bugzilla href="https://bugzilla.suse.com/590397">SUSE bug 590397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/596445">SUSE bug 596445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/623894">SUSE bug 623894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/733542">SUSE bug 733542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/735322">SUSE bug 735322</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2899/">CVE-2011-2899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2899">CVE-2011-2899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4405/">CVE-2011-4405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4405">CVE-2011-4405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992389" comment="system-config-printer-1.0.8-9.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992390" comment="system-config-printer-lang-1.0.8-9.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217806" version="1" class="patch">
	<metadata>
		<title>Security update for system-config-printer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="783488" ref_url="https://bugzilla.suse.com/783488" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4510" ref_url="https://www.suse.com/security/cve/CVE-2012-4510/" source="CVE"/>
		<description>
This update for system-config-printer fixes the following issues:

Security issue fixed:

- CVE-2012-4510: Fixed an issue in the CUPS PolicyKit helper that allowed attackers, with user assistance, to overwrite specific files or upload sensitive data to a CUPS resource (bsc#783488).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/783488">SUSE bug 783488</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4510/">CVE-2012-4510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4510">CVE-2012-4510 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575215" comment="system-config-printer-1.0.8-9.18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575216" comment="system-config-printer-lang-1.0.8-9.18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217807" version="1" class="patch">
	<metadata>
		<title>Security update for t1lib</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="662411" ref_url="https://bugzilla.suse.com/662411" source="BUGZILLA"/>
		<reference ref_id="684802" ref_url="https://bugzilla.suse.com/684802" source="BUGZILLA"/>
		<reference ref_id="757961" ref_url="https://bugzilla.suse.com/757961" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2642" ref_url="https://www.suse.com/security/cve/CVE-2010-2642/" source="CVE"/>
		<reference ref_id="CVE-2011-0433" ref_url="https://www.suse.com/security/cve/CVE-2011-0433/" source="CVE"/>
		<reference ref_id="CVE-2011-0764" ref_url="https://www.suse.com/security/cve/CVE-2011-0764/" source="CVE"/>
		<reference ref_id="CVE-2011-1552" ref_url="https://www.suse.com/security/cve/CVE-2011-1552/" source="CVE"/>
		<reference ref_id="CVE-2011-1553" ref_url="https://www.suse.com/security/cve/CVE-2011-1553/" source="CVE"/>
		<reference ref_id="CVE-2011-1554" ref_url="https://www.suse.com/security/cve/CVE-2011-1554/" source="CVE"/>
		<description>

This update of t1lib fixes memory corruptions and a heap-based overflow in 
the afm font parser.

Security Issue references:

    * CVE-2011-0764
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0764&gt;
    * CVE-2011-1552
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1552&gt;
    * CVE-2011-1553
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1553&gt;
    * CVE-2011-1554
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1554&gt;
    * CVE-2011-0433
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0433&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-04-23"/>
	<updated date="2012-04-23"/>
	<bugzilla href="https://bugzilla.suse.com/662411">SUSE bug 662411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/684802">SUSE bug 684802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757961">SUSE bug 757961</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2642/">CVE-2010-2642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2642">CVE-2010-2642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0433/">CVE-2011-0433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0433">CVE-2011-0433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0764/">CVE-2011-0764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0764">CVE-2011-0764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1552/">CVE-2011-1552 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1552">CVE-2011-1552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1553/">CVE-2011-1553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1553">CVE-2011-1553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1554/">CVE-2011-1554 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1554">CVE-2011-1554 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992391" comment="t1lib-5.1.1-100.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217808" version="1" class="patch">
	<metadata>
		<title>Security update for taglib</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="750690" ref_url="https://bugzilla.suse.com/750690" source="BUGZILLA"/>
		<reference ref_id="750691" ref_url="https://bugzilla.suse.com/750691" source="BUGZILLA"/>
		<reference ref_id="750693" ref_url="https://bugzilla.suse.com/750693" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-1108" ref_url="https://www.suse.com/security/cve/CVE-2012-1108/" source="CVE"/>
		<reference ref_id="CVE-2012-1584" ref_url="https://www.suse.com/security/cve/CVE-2012-1584/" source="CVE"/>
		<description>

The following issue has been fixed:

    * specially crafted ogg files could have crashed taglib

Security Issue references:

    * CVE-2012-1108
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1108&gt;
    * CVE-2012-1584
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1584&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-04-17"/>
	<updated date="2012-04-17"/>
	<bugzilla href="https://bugzilla.suse.com/750690">SUSE bug 750690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750691">SUSE bug 750691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750693">SUSE bug 750693</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1108/">CVE-2012-1108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1108">CVE-2012-1108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1584/">CVE-2012-1584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1584">CVE-2012-1584 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992392" comment="taglib-1.5-19.23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992393" comment="taglib-32bit-1.5-19.23.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217809" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1007188" ref_url="https://bugzilla.suse.com/1007188" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6321" ref_url="https://www.suse.com/security/cve/CVE-2016-6321/" source="CVE"/>
		<description>

This update for tar fixes the following issues:

- Fix the POINTYFEATHER vulnerability - GNU tar archiver can be tricked
  into extracting files and directories in the given destination, regardless
  of the path name(s) specified on the command line [bsc#1007188]
  [CVE-2016-6321]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-24"/>
	<updated date="2016-11-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007188">SUSE bug 1007188</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6321/">CVE-2016-6321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6321">CVE-2016-6321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575221" comment="tar-1.26-1.2.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217810" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1120610" ref_url="https://bugzilla.suse.com/1120610" source="BUGZILLA"/>
		<reference ref_id="1130496" ref_url="https://bugzilla.suse.com/1130496" source="BUGZILLA"/>
		<reference ref_id="1152736" ref_url="https://bugzilla.suse.com/1152736" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20482" ref_url="https://www.suse.com/security/cve/CVE-2018-20482/" source="CVE"/>
		<reference ref_id="CVE-2019-9923" ref_url="https://www.suse.com/security/cve/CVE-2019-9923/" source="CVE"/>
		<description>
This update for tar to version 1.27.1 fixes the following issues:

tar 1.27.1 brings following changes (jsc#ECO-339)

* Sparse files with large data
* No backticks in quoting
* --owner and --group names and numbers
* Support for POSIX ACLs, extended attributes and SELinux context.
* Passing command line arguments to external commands.
* New configure option --enable-gcc-warnings, intended for debugging.
* New warning control option --warning=[no-]record-size
* New command line option --keep-directory-symlink
* Fix unquoting of file names obtained via the -T option.
* Fix GNU long link header timestamp (backward compatibility).

Security issues fixed:

- CVE-2019-9923: Fixed a denial of service while parsing certain archives with malformed extended headers in pax_decode_header() (bsc#1130496).
- CVE-2018-20482: Fixed a denial of service when the '--sparse' option mishandles file shrinkage during read access (bsc#1120610).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-11"/>
	<updated date="2019-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120610">SUSE bug 1120610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130496">SUSE bug 1130496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152736">SUSE bug 1152736</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20482/">CVE-2018-20482 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20482">CVE-2018-20482 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9923/">CVE-2019-9923 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9923">CVE-2019-9923 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575222" comment="tar-1.27.1-14.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217811" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1181131" ref_url="https://bugzilla.suse.com/1181131" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20193" ref_url="https://www.suse.com/security/cve/CVE-2021-20193/" source="CVE"/>
		<description>
This update for tar fixes the following issues:

CVE-2021-20193: Memory leak in read_header() in list.c (bsc#1181131)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-29"/>
	<updated date="2021-03-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1181131">SUSE bug 1181131</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20193/">CVE-2021-20193 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20193">CVE-2021-20193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575223" comment="tar-1.27.1-14.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217812" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="905870" ref_url="https://bugzilla.suse.com/905870" source="BUGZILLA"/>
		<reference ref_id="905872" ref_url="https://bugzilla.suse.com/905872" source="BUGZILLA"/>
		<reference ref_id="922220" ref_url="https://bugzilla.suse.com/922220" source="BUGZILLA"/>
		<reference ref_id="922222" ref_url="https://bugzilla.suse.com/922222" source="BUGZILLA"/>
		<reference ref_id="923142" ref_url="https://bugzilla.suse.com/923142" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8767" ref_url="https://www.suse.com/security/cve/CVE-2014-8767/" source="CVE"/>
		<reference ref_id="CVE-2014-8769" ref_url="https://www.suse.com/security/cve/CVE-2014-8769/" source="CVE"/>
		<reference ref_id="CVE-2014-9140" ref_url="https://www.suse.com/security/cve/CVE-2014-9140/" source="CVE"/>
		<reference ref_id="CVE-2015-0261" ref_url="https://www.suse.com/security/cve/CVE-2015-0261/" source="CVE"/>
		<reference ref_id="CVE-2015-2154" ref_url="https://www.suse.com/security/cve/CVE-2015-2154/" source="CVE"/>
		<description>

When running tcpdump, a remote unauthenticated user could have crashed the 
application or, potentially, execute arbitrary code by injecting crafted 
packages into the network.

The following vulnerabilities in protocol printers have been fixed:

    * IPv6 mobility printer remote DoS (CVE-2015-0261, bnc#922220)
    * Ethernet printer remote DoS (CVE-2015-2154, bnc#922222)
    * PPP printer remote DoS (CVE-2014-9140, bnc#923142)

Security Issues:

    * CVE-2015-0261
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0261&gt;
    * CVE-2015-2154
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2154&gt;
    * CVE-2014-9140
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9140&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-20"/>
	<updated date="2015-03-20"/>
	<bugzilla href="https://bugzilla.suse.com/905870">SUSE bug 905870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905872">SUSE bug 905872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922220">SUSE bug 922220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922222">SUSE bug 922222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923142">SUSE bug 923142</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8767/">CVE-2014-8767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8767">CVE-2014-8767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8769/">CVE-2014-8769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8769">CVE-2014-8769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9140/">CVE-2014-9140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9140">CVE-2014-9140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0261/">CVE-2015-0261 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0261">CVE-2015-0261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2154/">CVE-2015-2154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2154">CVE-2015-2154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575224" comment="tcpdump-3.9.8-1.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217813" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1020940" ref_url="https://bugzilla.suse.com/1020940" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7922" ref_url="https://www.suse.com/security/cve/CVE-2016-7922/" source="CVE"/>
		<reference ref_id="CVE-2016-7923" ref_url="https://www.suse.com/security/cve/CVE-2016-7923/" source="CVE"/>
		<reference ref_id="CVE-2016-7925" ref_url="https://www.suse.com/security/cve/CVE-2016-7925/" source="CVE"/>
		<reference ref_id="CVE-2016-7926" ref_url="https://www.suse.com/security/cve/CVE-2016-7926/" source="CVE"/>
		<reference ref_id="CVE-2016-7927" ref_url="https://www.suse.com/security/cve/CVE-2016-7927/" source="CVE"/>
		<reference ref_id="CVE-2016-7928" ref_url="https://www.suse.com/security/cve/CVE-2016-7928/" source="CVE"/>
		<reference ref_id="CVE-2016-7931" ref_url="https://www.suse.com/security/cve/CVE-2016-7931/" source="CVE"/>
		<reference ref_id="CVE-2016-7934" ref_url="https://www.suse.com/security/cve/CVE-2016-7934/" source="CVE"/>
		<reference ref_id="CVE-2016-7935" ref_url="https://www.suse.com/security/cve/CVE-2016-7935/" source="CVE"/>
		<reference ref_id="CVE-2016-7936" ref_url="https://www.suse.com/security/cve/CVE-2016-7936/" source="CVE"/>
		<reference ref_id="CVE-2016-7937" ref_url="https://www.suse.com/security/cve/CVE-2016-7937/" source="CVE"/>
		<reference ref_id="CVE-2016-7939" ref_url="https://www.suse.com/security/cve/CVE-2016-7939/" source="CVE"/>
		<reference ref_id="CVE-2016-7940" ref_url="https://www.suse.com/security/cve/CVE-2016-7940/" source="CVE"/>
		<reference ref_id="CVE-2016-7973" ref_url="https://www.suse.com/security/cve/CVE-2016-7973/" source="CVE"/>
		<reference ref_id="CVE-2016-7974" ref_url="https://www.suse.com/security/cve/CVE-2016-7974/" source="CVE"/>
		<reference ref_id="CVE-2016-7975" ref_url="https://www.suse.com/security/cve/CVE-2016-7975/" source="CVE"/>
		<reference ref_id="CVE-2016-7983" ref_url="https://www.suse.com/security/cve/CVE-2016-7983/" source="CVE"/>
		<reference ref_id="CVE-2016-7984" ref_url="https://www.suse.com/security/cve/CVE-2016-7984/" source="CVE"/>
		<reference ref_id="CVE-2016-7992" ref_url="https://www.suse.com/security/cve/CVE-2016-7992/" source="CVE"/>
		<reference ref_id="CVE-2016-7993" ref_url="https://www.suse.com/security/cve/CVE-2016-7993/" source="CVE"/>
		<reference ref_id="CVE-2016-8574" ref_url="https://www.suse.com/security/cve/CVE-2016-8574/" source="CVE"/>
		<reference ref_id="CVE-2017-5202" ref_url="https://www.suse.com/security/cve/CVE-2017-5202/" source="CVE"/>
		<reference ref_id="CVE-2017-5203" ref_url="https://www.suse.com/security/cve/CVE-2017-5203/" source="CVE"/>
		<reference ref_id="CVE-2017-5204" ref_url="https://www.suse.com/security/cve/CVE-2017-5204/" source="CVE"/>
		<reference ref_id="CVE-2017-5483" ref_url="https://www.suse.com/security/cve/CVE-2017-5483/" source="CVE"/>
		<reference ref_id="CVE-2017-5484" ref_url="https://www.suse.com/security/cve/CVE-2017-5484/" source="CVE"/>
		<reference ref_id="CVE-2017-5485" ref_url="https://www.suse.com/security/cve/CVE-2017-5485/" source="CVE"/>
		<reference ref_id="CVE-2017-5486" ref_url="https://www.suse.com/security/cve/CVE-2017-5486/" source="CVE"/>
		<description>

This update for tcpdump fixes the following issues:

Security issues fixed (bsc#1020940):
- CVE-2016-7922: Corrected buffer overflow in AH parser print-ah.c:ah_print().
- CVE-2016-7923: Corrected buffer overflow in ARP parser print-arp.c:arp_print().
- CVE-2016-7925: Corrected buffer overflow in compressed SLIP parser print-sl.c:sl_if_print().
- CVE-2016-7926: Corrected buffer overflow in the Ethernet parser print-ether.c:ethertype_print().
- CVE-2016-7927: Corrected buffer overflow in the IEEE 802.11 parser print-802_11.c:ieee802_11_radio_print().
- CVE-2016-7928: Corrected buffer overflow in the IPComp parser print-ipcomp.c:ipcomp_print().
- CVE-2016-7931: Corrected buffer overflow in the MPLS parser print-mpls.c:mpls_print().
- CVE-2016-7936: Corrected buffer overflow in the UDP parser print-udp.c:udp_print().
- CVE-2016-7934,CVE-2016-7935,CVE-2016-7937: Corrected segmentation faults in function udp_print(). 
- CVE-2016-7939: Corrected buffer overflows in GRE parser print-gre.c:(multiple functions).
- CVE-2016-7940: Corrected buffer overflows in STP parser print-stp.c:(multiple functions).
- CVE-2016-7973: Corrected buffer overflow in AppleTalk parser print-atalk.c.
- CVE-2016-7974: Corrected buffer overflow in IP parser print-ip.c:(multiple functions).
- CVE-2016-7975: Corrected buffer overflow in TCP parser print-tcp.c:tcp_print().
- CVE-2016-7983,CVE-2016-7984: Corrected buffer overflow in TFTP parser print-tftp.c:tftp_print().
- CVE-2016-7992: Corrected buffer overflow in Classical IP over ATM parser print-cip.c.
- CVE-2016-7993: Corrected buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, etc.).
- CVE-2016-8574: Corrected buffer overflow in FRF.15 parser print-fr.c:frf15_print().
- CVE-2017-5202: Corrected buffer overflow in ISO CLNS parser print-isoclns.c:clnp_print().
- CVE-2017-5203: Corrected buffer overflow in BOOTP parser print-bootp.c:bootp_print().
- CVE-2017-5204: Corrected buffer overflow in IPv6 parser print-ip6.c:ip6_print().
- CVE-2017-5483: Corrected buffer overflow in SNMP parser print-snmp.c:asn1_parse().
- CVE-2017-5484: Corrected buffer overflow in ATM parser print-atm.c:sig_print().
- CVE-2017-5485: Corrected buffer overflow in ISO CLNS parser addrtoname.c:lookup_nsap().
- CVE-2017-5486: Corrected buffer overflow in ISO CLNS parser print-isoclns.c:clnp_print().
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-10"/>
	<updated date="2017-03-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7922/">CVE-2016-7922 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7922">CVE-2016-7922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7923/">CVE-2016-7923 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7923">CVE-2016-7923 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7925/">CVE-2016-7925 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7925">CVE-2016-7925 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7926/">CVE-2016-7926 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7926">CVE-2016-7926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7927/">CVE-2016-7927 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7927">CVE-2016-7927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7928/">CVE-2016-7928 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7928">CVE-2016-7928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7931/">CVE-2016-7931 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7931">CVE-2016-7931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7934/">CVE-2016-7934 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7934">CVE-2016-7934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7935/">CVE-2016-7935 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7935">CVE-2016-7935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7936/">CVE-2016-7936 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7936">CVE-2016-7936 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7937/">CVE-2016-7937 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7937">CVE-2016-7937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7939/">CVE-2016-7939 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7939">CVE-2016-7939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7940/">CVE-2016-7940 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7940">CVE-2016-7940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7973/">CVE-2016-7973 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7973">CVE-2016-7973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7974/">CVE-2016-7974 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7974">CVE-2016-7974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7975/">CVE-2016-7975 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7975">CVE-2016-7975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7983/">CVE-2016-7983 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7983">CVE-2016-7983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7984/">CVE-2016-7984 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7984">CVE-2016-7984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7992/">CVE-2016-7992 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7992">CVE-2016-7992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7993/">CVE-2016-7993 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7993">CVE-2016-7993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8574/">CVE-2016-8574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8574">CVE-2016-8574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5202/">CVE-2017-5202 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5202">CVE-2017-5202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5203/">CVE-2017-5203 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5203">CVE-2017-5203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5204/">CVE-2017-5204 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5204">CVE-2017-5204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5483/">CVE-2017-5483 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5483">CVE-2017-5483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5484/">CVE-2017-5484 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5484">CVE-2017-5484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5485/">CVE-2017-5485 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5485">CVE-2017-5485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5486/">CVE-2017-5486 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5486">CVE-2017-5486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575225" comment="tcpdump-3.9.8-1.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217814" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1047873" ref_url="https://bugzilla.suse.com/1047873" source="BUGZILLA"/>
		<reference ref_id="1057247" ref_url="https://bugzilla.suse.com/1057247" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11108" ref_url="https://www.suse.com/security/cve/CVE-2017-11108/" source="CVE"/>
		<reference ref_id="CVE-2017-11541" ref_url="https://www.suse.com/security/cve/CVE-2017-11541/" source="CVE"/>
		<reference ref_id="CVE-2017-11542" ref_url="https://www.suse.com/security/cve/CVE-2017-11542/" source="CVE"/>
		<reference ref_id="CVE-2017-11543" ref_url="https://www.suse.com/security/cve/CVE-2017-11543/" source="CVE"/>
		<reference ref_id="CVE-2017-13011" ref_url="https://www.suse.com/security/cve/CVE-2017-13011/" source="CVE"/>
		<description>
This update for tcpdump fixes the following issues:

Security issues fixed:

- CVE-2017-11108: Crafted input allowed remote DoS (bsc#1047873)
- CVE-2017-11541: Prevent a heap-based buffer over-read in the lldp_print function in print-lldp.c, related to util-print.c (bsc#1057247).
- CVE-2017-11542: Prevent a heap-based buffer over-read in the pimv1_print function in print-pim.c (bsc#1057247).
- CVE-2017-11543: Prevent a buffer overflow in the sliplink_print function in print-sl.c (bsc#1057247).
- CVE-2017-13011: Several protocol parsers in tcpdump could have caused a buffer overflow in util-print.c:bittok2str_internal() (bsc#1057247).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-10"/>
	<updated date="2017-10-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047873">SUSE bug 1047873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11108/">CVE-2017-11108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11108">CVE-2017-11108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11541/">CVE-2017-11541 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11541">CVE-2017-11541 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11542/">CVE-2017-11542 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11542">CVE-2017-11542 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11543/">CVE-2017-11543 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11543">CVE-2017-11543 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13011/">CVE-2017-13011 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13011">CVE-2017-13011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575226" comment="tcpdump-3.9.8-1.30.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217815" version="1" class="patch">
	<metadata>
		<title>Recommended update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1094241" ref_url="https://bugzilla.suse.com/1094241" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7975" ref_url="https://www.suse.com/security/cve/CVE-2016-7975/" source="CVE"/>
		<description>
This update for tcpdump provides the following fix:

- The original fix for CVE-2016-7975 was using a variable before declaring it. Fix this
  by moving the declaration before any usage. (bsc#1094241, CVE-2016-7975)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-09"/>
	<updated date="2018-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094241">SUSE bug 1094241</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7975/">CVE-2016-7975 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7975">CVE-2016-7975 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594221" comment="tcpdump-3.9.8-1.30.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217816" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1057247" ref_url="https://bugzilla.suse.com/1057247" source="BUGZILLA"/>
		<reference ref_id="1153098" ref_url="https://bugzilla.suse.com/1153098" source="BUGZILLA"/>
		<reference ref_id="1153332" ref_url="https://bugzilla.suse.com/1153332" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12893" ref_url="https://www.suse.com/security/cve/CVE-2017-12893/" source="CVE"/>
		<reference ref_id="CVE-2017-12894" ref_url="https://www.suse.com/security/cve/CVE-2017-12894/" source="CVE"/>
		<reference ref_id="CVE-2017-12896" ref_url="https://www.suse.com/security/cve/CVE-2017-12896/" source="CVE"/>
		<reference ref_id="CVE-2017-12897" ref_url="https://www.suse.com/security/cve/CVE-2017-12897/" source="CVE"/>
		<reference ref_id="CVE-2017-12898" ref_url="https://www.suse.com/security/cve/CVE-2017-12898/" source="CVE"/>
		<reference ref_id="CVE-2017-12899" ref_url="https://www.suse.com/security/cve/CVE-2017-12899/" source="CVE"/>
		<reference ref_id="CVE-2017-12900" ref_url="https://www.suse.com/security/cve/CVE-2017-12900/" source="CVE"/>
		<reference ref_id="CVE-2017-12901" ref_url="https://www.suse.com/security/cve/CVE-2017-12901/" source="CVE"/>
		<reference ref_id="CVE-2017-12902" ref_url="https://www.suse.com/security/cve/CVE-2017-12902/" source="CVE"/>
		<reference ref_id="CVE-2017-12985" ref_url="https://www.suse.com/security/cve/CVE-2017-12985/" source="CVE"/>
		<reference ref_id="CVE-2017-12986" ref_url="https://www.suse.com/security/cve/CVE-2017-12986/" source="CVE"/>
		<reference ref_id="CVE-2017-12987" ref_url="https://www.suse.com/security/cve/CVE-2017-12987/" source="CVE"/>
		<reference ref_id="CVE-2017-12988" ref_url="https://www.suse.com/security/cve/CVE-2017-12988/" source="CVE"/>
		<reference ref_id="CVE-2017-12991" ref_url="https://www.suse.com/security/cve/CVE-2017-12991/" source="CVE"/>
		<reference ref_id="CVE-2017-12992" ref_url="https://www.suse.com/security/cve/CVE-2017-12992/" source="CVE"/>
		<reference ref_id="CVE-2017-12993" ref_url="https://www.suse.com/security/cve/CVE-2017-12993/" source="CVE"/>
		<reference ref_id="CVE-2017-12995" ref_url="https://www.suse.com/security/cve/CVE-2017-12995/" source="CVE"/>
		<reference ref_id="CVE-2017-12996" ref_url="https://www.suse.com/security/cve/CVE-2017-12996/" source="CVE"/>
		<reference ref_id="CVE-2017-12998" ref_url="https://www.suse.com/security/cve/CVE-2017-12998/" source="CVE"/>
		<reference ref_id="CVE-2017-12999" ref_url="https://www.suse.com/security/cve/CVE-2017-12999/" source="CVE"/>
		<reference ref_id="CVE-2017-13001" ref_url="https://www.suse.com/security/cve/CVE-2017-13001/" source="CVE"/>
		<reference ref_id="CVE-2017-13002" ref_url="https://www.suse.com/security/cve/CVE-2017-13002/" source="CVE"/>
		<reference ref_id="CVE-2017-13003" ref_url="https://www.suse.com/security/cve/CVE-2017-13003/" source="CVE"/>
		<reference ref_id="CVE-2017-13004" ref_url="https://www.suse.com/security/cve/CVE-2017-13004/" source="CVE"/>
		<reference ref_id="CVE-2017-13005" ref_url="https://www.suse.com/security/cve/CVE-2017-13005/" source="CVE"/>
		<reference ref_id="CVE-2017-13006" ref_url="https://www.suse.com/security/cve/CVE-2017-13006/" source="CVE"/>
		<reference ref_id="CVE-2017-13008" ref_url="https://www.suse.com/security/cve/CVE-2017-13008/" source="CVE"/>
		<reference ref_id="CVE-2017-13009" ref_url="https://www.suse.com/security/cve/CVE-2017-13009/" source="CVE"/>
		<reference ref_id="CVE-2017-13010" ref_url="https://www.suse.com/security/cve/CVE-2017-13010/" source="CVE"/>
		<reference ref_id="CVE-2017-13012" ref_url="https://www.suse.com/security/cve/CVE-2017-13012/" source="CVE"/>
		<reference ref_id="CVE-2017-13013" ref_url="https://www.suse.com/security/cve/CVE-2017-13013/" source="CVE"/>
		<reference ref_id="CVE-2017-13014" ref_url="https://www.suse.com/security/cve/CVE-2017-13014/" source="CVE"/>
		<reference ref_id="CVE-2017-13016" ref_url="https://www.suse.com/security/cve/CVE-2017-13016/" source="CVE"/>
		<reference ref_id="CVE-2017-13017" ref_url="https://www.suse.com/security/cve/CVE-2017-13017/" source="CVE"/>
		<reference ref_id="CVE-2017-13018" ref_url="https://www.suse.com/security/cve/CVE-2017-13018/" source="CVE"/>
		<reference ref_id="CVE-2017-13019" ref_url="https://www.suse.com/security/cve/CVE-2017-13019/" source="CVE"/>
		<reference ref_id="CVE-2017-13021" ref_url="https://www.suse.com/security/cve/CVE-2017-13021/" source="CVE"/>
		<reference ref_id="CVE-2017-13022" ref_url="https://www.suse.com/security/cve/CVE-2017-13022/" source="CVE"/>
		<reference ref_id="CVE-2017-13023" ref_url="https://www.suse.com/security/cve/CVE-2017-13023/" source="CVE"/>
		<reference ref_id="CVE-2017-13024" ref_url="https://www.suse.com/security/cve/CVE-2017-13024/" source="CVE"/>
		<reference ref_id="CVE-2017-13025" ref_url="https://www.suse.com/security/cve/CVE-2017-13025/" source="CVE"/>
		<reference ref_id="CVE-2017-13027" ref_url="https://www.suse.com/security/cve/CVE-2017-13027/" source="CVE"/>
		<reference ref_id="CVE-2017-13028" ref_url="https://www.suse.com/security/cve/CVE-2017-13028/" source="CVE"/>
		<reference ref_id="CVE-2017-13029" ref_url="https://www.suse.com/security/cve/CVE-2017-13029/" source="CVE"/>
		<reference ref_id="CVE-2017-13030" ref_url="https://www.suse.com/security/cve/CVE-2017-13030/" source="CVE"/>
		<reference ref_id="CVE-2017-13031" ref_url="https://www.suse.com/security/cve/CVE-2017-13031/" source="CVE"/>
		<reference ref_id="CVE-2017-13032" ref_url="https://www.suse.com/security/cve/CVE-2017-13032/" source="CVE"/>
		<reference ref_id="CVE-2017-13034" ref_url="https://www.suse.com/security/cve/CVE-2017-13034/" source="CVE"/>
		<reference ref_id="CVE-2017-13035" ref_url="https://www.suse.com/security/cve/CVE-2017-13035/" source="CVE"/>
		<reference ref_id="CVE-2017-13036" ref_url="https://www.suse.com/security/cve/CVE-2017-13036/" source="CVE"/>
		<reference ref_id="CVE-2017-13037" ref_url="https://www.suse.com/security/cve/CVE-2017-13037/" source="CVE"/>
		<reference ref_id="CVE-2017-13038" ref_url="https://www.suse.com/security/cve/CVE-2017-13038/" source="CVE"/>
		<reference ref_id="CVE-2017-13041" ref_url="https://www.suse.com/security/cve/CVE-2017-13041/" source="CVE"/>
		<reference ref_id="CVE-2017-13047" ref_url="https://www.suse.com/security/cve/CVE-2017-13047/" source="CVE"/>
		<reference ref_id="CVE-2017-13048" ref_url="https://www.suse.com/security/cve/CVE-2017-13048/" source="CVE"/>
		<reference ref_id="CVE-2017-13049" ref_url="https://www.suse.com/security/cve/CVE-2017-13049/" source="CVE"/>
		<reference ref_id="CVE-2017-13051" ref_url="https://www.suse.com/security/cve/CVE-2017-13051/" source="CVE"/>
		<reference ref_id="CVE-2017-13053" ref_url="https://www.suse.com/security/cve/CVE-2017-13053/" source="CVE"/>
		<reference ref_id="CVE-2017-13055" ref_url="https://www.suse.com/security/cve/CVE-2017-13055/" source="CVE"/>
		<reference ref_id="CVE-2017-13687" ref_url="https://www.suse.com/security/cve/CVE-2017-13687/" source="CVE"/>
		<reference ref_id="CVE-2017-13688" ref_url="https://www.suse.com/security/cve/CVE-2017-13688/" source="CVE"/>
		<reference ref_id="CVE-2017-13689" ref_url="https://www.suse.com/security/cve/CVE-2017-13689/" source="CVE"/>
		<reference ref_id="CVE-2017-13725" ref_url="https://www.suse.com/security/cve/CVE-2017-13725/" source="CVE"/>
		<reference ref_id="CVE-2018-10103" ref_url="https://www.suse.com/security/cve/CVE-2018-10103/" source="CVE"/>
		<reference ref_id="CVE-2018-10105" ref_url="https://www.suse.com/security/cve/CVE-2018-10105/" source="CVE"/>
		<reference ref_id="CVE-2018-14461" ref_url="https://www.suse.com/security/cve/CVE-2018-14461/" source="CVE"/>
		<reference ref_id="CVE-2018-14462" ref_url="https://www.suse.com/security/cve/CVE-2018-14462/" source="CVE"/>
		<reference ref_id="CVE-2018-14463" ref_url="https://www.suse.com/security/cve/CVE-2018-14463/" source="CVE"/>
		<reference ref_id="CVE-2018-14464" ref_url="https://www.suse.com/security/cve/CVE-2018-14464/" source="CVE"/>
		<reference ref_id="CVE-2018-14465" ref_url="https://www.suse.com/security/cve/CVE-2018-14465/" source="CVE"/>
		<reference ref_id="CVE-2018-14466" ref_url="https://www.suse.com/security/cve/CVE-2018-14466/" source="CVE"/>
		<reference ref_id="CVE-2018-14467" ref_url="https://www.suse.com/security/cve/CVE-2018-14467/" source="CVE"/>
		<reference ref_id="CVE-2018-14468" ref_url="https://www.suse.com/security/cve/CVE-2018-14468/" source="CVE"/>
		<reference ref_id="CVE-2018-14469" ref_url="https://www.suse.com/security/cve/CVE-2018-14469/" source="CVE"/>
		<reference ref_id="CVE-2018-14881" ref_url="https://www.suse.com/security/cve/CVE-2018-14881/" source="CVE"/>
		<reference ref_id="CVE-2018-14882" ref_url="https://www.suse.com/security/cve/CVE-2018-14882/" source="CVE"/>
		<reference ref_id="CVE-2018-16229" ref_url="https://www.suse.com/security/cve/CVE-2018-16229/" source="CVE"/>
		<reference ref_id="CVE-2018-16230" ref_url="https://www.suse.com/security/cve/CVE-2018-16230/" source="CVE"/>
		<reference ref_id="CVE-2018-16300" ref_url="https://www.suse.com/security/cve/CVE-2018-16300/" source="CVE"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="CVE-2018-16451" ref_url="https://www.suse.com/security/cve/CVE-2018-16451/" source="CVE"/>
		<reference ref_id="CVE-2018-16452" ref_url="https://www.suse.com/security/cve/CVE-2018-16452/" source="CVE"/>
		<reference ref_id="CVE-2019-15166" ref_url="https://www.suse.com/security/cve/CVE-2019-15166/" source="CVE"/>
		<description>
This update for tcpdump fixes the following issues:

Security issues fixed:

- CVE-2017-12995: Fixed an infinite loop in the DNS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12893: Fixed a buffer over-read in the SMB/CIFS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12894: Fixed a buffer over-read in several protocol parsers that allowed remote DoS (bsc#1057247).
- CVE-2017-12896: Fixed a buffer over-read in the ISAKMP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12897: Fixed a buffer over-read in the ISO CLNS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12898: Fixed a buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12899: Fixed a buffer over-read in the DECnet parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12900: Fixed a buffer over-read in the in several protocol parsers that allowed remote DoS (bsc#1057247).
- CVE-2017-12901: Fixed a buffer over-read in the EIGRP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12902: Fixed a buffer over-read in the Zephyr parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12985: Fixed a buffer over-read in the IPv6 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12986: Fixed a buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12987: Fixed a buffer over-read in the 802.11 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12988: Fixed a buffer over-read in the telnet parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12991: Fixed a buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12992: Fixed a buffer over-read in the RIPng parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12993: Fixed a buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12996: Fixed a buffer over-read in the PIMv2 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12998: Fixed a buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12999: Fixed a buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13001: Fixed a buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13002: Fixed a buffer over-read in the AODV parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13003: Fixed a buffer over-read in the LMP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13004: Fixed a buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13005: Fixed a buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13006: Fixed a buffer over-read in the L2TP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13008: Fixed a buffer over-read in the IEEE 802.11 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13009: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13010: Fixed a buffer over-read in the BEEP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13012: Fixed a buffer over-read in the ICMP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13013: Fixed a buffer over-read in the ARP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13014: Fixed a buffer over-read in the White Board protocol parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13016: Fixed a buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13017: Fixed a buffer over-read in the DHCPv6 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13018: Fixed a buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13019: Fixed a buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13021: Fixed a buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13022: Fixed a buffer over-read in the IP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13023: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13024: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13025: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13027: Fixed a buffer over-read in the LLDP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13028: Fixed a buffer over-read in the BOOTP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13029: Fixed a buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13030: Fixed a buffer over-read in the PIM parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13031: Fixed a buffer over-read in the IPv6 fragmentation header parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13032: Fixed a buffer over-read in the RADIUS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13034: Fixed a buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13035: Fixed a buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13036: Fixed a buffer over-read in the OSPFv3 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13037: Fixed a buffer over-read in the IP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13038: Fixed a buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13041: Fixed a buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13047: Fixed a buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13048: Fixed a buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13049: Fixed a buffer over-read in the Rx protocol parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13051: Fixed a buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13053: Fixed a buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13055: Fixed a buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13687: Fixed a buffer over-read in the Cisco HDLC parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13688: Fixed a buffer over-read in the OLSR parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13689: Fixed a buffer over-read in the IKEv1 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13725: Fixed a buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247).
- CVE-2018-10103: Fixed a mishandling of the printing of SMB data (bsc#1153098).
- CVE-2018-10105: Fixed a mishandling of the printing of SMB data (bsc#1153098).
- CVE-2018-14461: Fixed a buffer over-read in print-ldp.c:ldp_tlv_print (bsc#1153098).
- CVE-2018-14462: Fixed a buffer over-read in print-icmp.c:icmp_print (bsc#1153098).
- CVE-2018-14463: Fixed a buffer over-read in print-vrrp.c:vrrp_print (bsc#1153098).
- CVE-2018-14464: Fixed a buffer over-read in print-lmp.c:lmp_print_data_link_subobjs (bsc#1153098).
- CVE-2018-14465: Fixed a buffer over-read in print-rsvp.c:rsvp_obj_print (bsc#1153098).
- CVE-2018-14466: Fixed a buffer over-read in print-rx.c:rx_cache_find (bsc#1153098).
- CVE-2018-14467: Fixed a buffer over-read in print-bgp.c:bgp_capabilities_print (bsc#1153098).
- CVE-2018-14468: Fixed a buffer over-read in print-fr.c:mfr_print (bsc#1153098).
- CVE-2018-14469: Fixed a buffer over-read in print-isakmp.c:ikev1_n_print (bsc#1153098).
- CVE-2018-14881: Fixed a buffer over-read in the BGP parser (bsc#1153098).
- CVE-2018-14882: Fixed a buffer over-read in the ICMPv6 parser (bsc#1153098).
- CVE-2018-16229: Fixed a buffer over-read in the DCCP parser (bsc#1153098).
- CVE-2018-16230: Fixed a buffer over-read in the BGP parser in print-bgp.c:bgp_attr_print (bsc#1153098).
- CVE-2018-16300: Fixed an unlimited recursion in the BGP parser that allowed denial-of-service by stack consumption (bsc#1153098).
- CVE-2018-16301: Fixed a buffer overflow (bsc#1153332 bsc#1153098).
- CVE-2018-16451: Fixed several buffer over-reads in print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN (bsc#1153098).
- CVE-2018-16452: Fixed a stack exhaustion in smbutil.c:smb_fdata (bsc#1153098).
- CVE-2019-15166: Fixed a bounds check in lmp_print_data_link_subobjs (bsc#1153098).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153332">SUSE bug 1153332</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12893/">CVE-2017-12893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12893">CVE-2017-12893 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12894/">CVE-2017-12894 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12894">CVE-2017-12894 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12896/">CVE-2017-12896 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12896">CVE-2017-12896 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12897/">CVE-2017-12897 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12897">CVE-2017-12897 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12898/">CVE-2017-12898 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12898">CVE-2017-12898 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12899/">CVE-2017-12899 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12899">CVE-2017-12899 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12900/">CVE-2017-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12900">CVE-2017-12900 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12901/">CVE-2017-12901 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12901">CVE-2017-12901 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12902/">CVE-2017-12902 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12902">CVE-2017-12902 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12985/">CVE-2017-12985 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12985">CVE-2017-12985 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12986/">CVE-2017-12986 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12986">CVE-2017-12986 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12987/">CVE-2017-12987 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12987">CVE-2017-12987 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12988/">CVE-2017-12988 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12988">CVE-2017-12988 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12991/">CVE-2017-12991 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12991">CVE-2017-12991 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12992/">CVE-2017-12992 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12992">CVE-2017-12992 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12993/">CVE-2017-12993 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12993">CVE-2017-12993 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12995/">CVE-2017-12995 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12995">CVE-2017-12995 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12996/">CVE-2017-12996 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12996">CVE-2017-12996 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12998/">CVE-2017-12998 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12998">CVE-2017-12998 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12999/">CVE-2017-12999 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12999">CVE-2017-12999 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13001/">CVE-2017-13001 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13001">CVE-2017-13001 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13002/">CVE-2017-13002 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13002">CVE-2017-13002 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13003/">CVE-2017-13003 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13003">CVE-2017-13003 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13004/">CVE-2017-13004 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13004">CVE-2017-13004 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13005/">CVE-2017-13005 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13005">CVE-2017-13005 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13006/">CVE-2017-13006 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13006">CVE-2017-13006 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13008/">CVE-2017-13008 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13008">CVE-2017-13008 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13009/">CVE-2017-13009 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13009">CVE-2017-13009 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13010/">CVE-2017-13010 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13010">CVE-2017-13010 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13012/">CVE-2017-13012 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13012">CVE-2017-13012 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13013/">CVE-2017-13013 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13013">CVE-2017-13013 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13014/">CVE-2017-13014 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13014">CVE-2017-13014 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13016/">CVE-2017-13016 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13016">CVE-2017-13016 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13017/">CVE-2017-13017 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13017">CVE-2017-13017 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13018/">CVE-2017-13018 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13018">CVE-2017-13018 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13019/">CVE-2017-13019 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13019">CVE-2017-13019 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13021/">CVE-2017-13021 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13021">CVE-2017-13021 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13022/">CVE-2017-13022 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13022">CVE-2017-13022 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13023/">CVE-2017-13023 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13023">CVE-2017-13023 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13024/">CVE-2017-13024 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13024">CVE-2017-13024 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13025/">CVE-2017-13025 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13025">CVE-2017-13025 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13027/">CVE-2017-13027 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13027">CVE-2017-13027 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13028/">CVE-2017-13028 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13028">CVE-2017-13028 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13029/">CVE-2017-13029 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13029">CVE-2017-13029 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13030/">CVE-2017-13030 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13030">CVE-2017-13030 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13031/">CVE-2017-13031 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13031">CVE-2017-13031 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13032/">CVE-2017-13032 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13032">CVE-2017-13032 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13034/">CVE-2017-13034 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13034">CVE-2017-13034 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13035/">CVE-2017-13035 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13035">CVE-2017-13035 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13036/">CVE-2017-13036 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13036">CVE-2017-13036 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13037/">CVE-2017-13037 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13037">CVE-2017-13037 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13038/">CVE-2017-13038 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13038">CVE-2017-13038 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13041/">CVE-2017-13041 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13041">CVE-2017-13041 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13047/">CVE-2017-13047 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13047">CVE-2017-13047 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13048/">CVE-2017-13048 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13048">CVE-2017-13048 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13049/">CVE-2017-13049 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13049">CVE-2017-13049 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13051/">CVE-2017-13051 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13051">CVE-2017-13051 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13053/">CVE-2017-13053 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13053">CVE-2017-13053 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13055/">CVE-2017-13055 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13055">CVE-2017-13055 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13687/">CVE-2017-13687 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13687">CVE-2017-13687 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13688/">CVE-2017-13688 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13688">CVE-2017-13688 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13689/">CVE-2017-13689 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13689">CVE-2017-13689 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13725/">CVE-2017-13725 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13725">CVE-2017-13725 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10103/">CVE-2018-10103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10103">CVE-2018-10103 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10105/">CVE-2018-10105 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10105">CVE-2018-10105 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14461/">CVE-2018-14461 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14461">CVE-2018-14461 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14462/">CVE-2018-14462 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14462">CVE-2018-14462 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14463/">CVE-2018-14463 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14463">CVE-2018-14463 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14464/">CVE-2018-14464 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14464">CVE-2018-14464 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14465/">CVE-2018-14465 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14465">CVE-2018-14465 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14466/">CVE-2018-14466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14466">CVE-2018-14466 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14467/">CVE-2018-14467 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14467">CVE-2018-14467 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14468/">CVE-2018-14468 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14468">CVE-2018-14468 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14469/">CVE-2018-14469 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14469">CVE-2018-14469 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14881/">CVE-2018-14881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14881">CVE-2018-14881 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14882/">CVE-2018-14882 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14882">CVE-2018-14882 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16229/">CVE-2018-16229 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16229">CVE-2018-16229 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16230/">CVE-2018-16230 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16230">CVE-2018-16230 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16300/">CVE-2018-16300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16300">CVE-2018-16300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16301">CVE-2018-16301 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16451/">CVE-2018-16451 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16451">CVE-2018-16451 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16452/">CVE-2018-16452 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16452">CVE-2018-16452 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15166/">CVE-2019-15166 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15166">CVE-2019-15166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575227" comment="tcpdump-3.9.8-1.30.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217817" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1178466" ref_url="https://bugzilla.suse.com/1178466" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8037" ref_url="https://www.suse.com/security/cve/CVE-2020-8037/" source="CVE"/>
		<description>
This update for tcpdump fixes the following issues:

- CVE-2020-8037: Fixed an issue where PPP decapsulator did not allocate the right buffer size (bsc#1178466).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-17"/>
	<updated date="2020-11-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178466">SUSE bug 1178466</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8037/">CVE-2020-8037 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8037">CVE-2020-8037 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575228" comment="tcpdump-3.9.8-1.30.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217818" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1195825" ref_url="https://bugzilla.suse.com/1195825" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<description>
This update for tcpdump fixes the following issues:

- CVE-2018-16301: Fixed segfault when handling large files (bsc#1195825).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195825">SUSE bug 1195825</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16301">CVE-2018-16301 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668244" comment="tcpdump-3.9.8-1.30.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217819" version="1" class="patch">
	<metadata>
		<title>Security update for tftp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="630297" ref_url="https://bugzilla.suse.com/630297" source="BUGZILLA"/>
		<reference ref_id="699714" ref_url="https://bugzilla.suse.com/699714" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2199" ref_url="https://www.suse.com/security/cve/CVE-2011-2199/" source="CVE"/>
		<description>

Malicious clients could overflow a buffer in tftpd by specifying a large 
value for the utimeout option (CVE-2011-2199).

Security Issue reference:

    * CVE-2011-2199
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2199&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-06-24"/>
	<updated date="2011-06-24"/>
	<bugzilla href="https://bugzilla.suse.com/630297">SUSE bug 630297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/699714">SUSE bug 699714</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2199/">CVE-2011-2199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2199">CVE-2011-2199 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992394" comment="tftp-0.48-101.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217820" version="1" class="patch">
	<metadata>
		<title>Security update for tgt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="513934" ref_url="https://bugzilla.suse.com/513934" source="BUGZILLA"/>
		<reference ref_id="592928" ref_url="https://bugzilla.suse.com/592928" source="BUGZILLA"/>
		<reference ref_id="598927" ref_url="https://bugzilla.suse.com/598927" source="BUGZILLA"/>
		<reference ref_id="618574" ref_url="https://bugzilla.suse.com/618574" source="BUGZILLA"/>
		<reference ref_id="633111" ref_url="https://bugzilla.suse.com/633111" source="BUGZILLA"/>
		<reference ref_id="665415" ref_url="https://bugzilla.suse.com/665415" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0743" ref_url="https://www.suse.com/security/cve/CVE-2010-0743/" source="CVE"/>
		<reference ref_id="CVE-2010-2221" ref_url="https://www.suse.com/security/cve/CVE-2010-2221/" source="CVE"/>
		<reference ref_id="CVE-2011-0001" ref_url="https://www.suse.com/security/cve/CVE-2011-0001/" source="CVE"/>
		<description>

This update of tgt fixes multiple bugs:

    * tgtadm user unbind broken [bnc#633111]
    * iscsitarget package not supported [bnc#513934]
    * iscsitarget vs. tgt (and /etc/ietd.conf) [bnc#598927]
    * tgt fix double free() flaw [bnc#665415, CVE-2011-0001]

Security Issue reference:

    * CVE-2011-0001
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0001&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-04-18"/>
	<updated date="2011-04-18"/>
	<bugzilla href="https://bugzilla.suse.com/513934">SUSE bug 513934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/592928">SUSE bug 592928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/598927">SUSE bug 598927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/618574">SUSE bug 618574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633111">SUSE bug 633111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/665415">SUSE bug 665415</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0743/">CVE-2010-0743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0743">CVE-2010-0743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2221/">CVE-2010-2221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2221">CVE-2010-2221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0001/">CVE-2011-0001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0001">CVE-2011-0001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992395" comment="tgt-0.9.10-0.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217821" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="914890" ref_url="https://bugzilla.suse.com/914890" source="BUGZILLA"/>
		<reference ref_id="916927" ref_url="https://bugzilla.suse.com/916927" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127/" source="CVE"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129/" source="CVE"/>
		<reference ref_id="CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130/" source="CVE"/>
		<reference ref_id="CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655/" source="CVE"/>
		<description>
tiff was updated to fix six security issues found by fuzzing initiatives.

These security issues were fixed:
- CVE-2014-8127: Out-of-bounds write (bnc#914890).
- CVE-2014-8128: Out-of-bounds write (bnc#914890).
- CVE-2014-8129: Out-of-bounds write (bnc#914890).
- CVE-2014-8130: Out-of-bounds write (bnc#914890).
- CVE-2014-9655: Access of uninitialized memory (bnc#916927).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-12"/>
	<updated date="2015-08-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916927">SUSE bug 916927</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8127">CVE-2014-8127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8128">CVE-2014-8128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8129">CVE-2014-8129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8130">CVE-2014-8130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9655">CVE-2014-9655 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575231" comment="libtiff3-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567154" comment="libtiff3-32bit-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575232" comment="tiff-3.8.2-141.160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217822" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="960341" ref_url="https://bugzilla.suse.com/960341" source="BUGZILLA"/>
		<reference ref_id="964225" ref_url="https://bugzilla.suse.com/964225" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2015-8781" ref_url="https://www.suse.com/security/cve/CVE-2015-8781/" source="CVE"/>
		<reference ref_id="CVE-2015-8782" ref_url="https://www.suse.com/security/cve/CVE-2015-8782/" source="CVE"/>
		<reference ref_id="CVE-2015-8783" ref_url="https://www.suse.com/security/cve/CVE-2015-8783/" source="CVE"/>
		<description>

This update for tiff fixes the following issues:

- CVE-2015-8781, CVE-2015-8782, CVE-2015-8783: Out-of-bounds writes for invalid images (bsc#964225)
- CVE-2015-7554: Out-of-bounds Write in the thumbnail and tiffcmp tools (bsc#960341)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964225">SUSE bug 964225</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7554">CVE-2015-7554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8781/">CVE-2015-8781 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8781">CVE-2015-8781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8782/">CVE-2015-8782 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8782">CVE-2015-8782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8783/">CVE-2015-8783 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8783">CVE-2015-8783 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575233" comment="libtiff3-3.8.2-141.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567450" comment="libtiff3-32bit-3.8.2-141.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575234" comment="tiff-3.8.2-141.163.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217823" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="973340" ref_url="https://bugzilla.suse.com/973340" source="BUGZILLA"/>
		<reference ref_id="974449" ref_url="https://bugzilla.suse.com/974449" source="BUGZILLA"/>
		<reference ref_id="974614" ref_url="https://bugzilla.suse.com/974614" source="BUGZILLA"/>
		<reference ref_id="974618" ref_url="https://bugzilla.suse.com/974618" source="BUGZILLA"/>
		<reference ref_id="975069" ref_url="https://bugzilla.suse.com/975069" source="BUGZILLA"/>
		<reference ref_id="984808" ref_url="https://bugzilla.suse.com/984808" source="BUGZILLA"/>
		<reference ref_id="984831" ref_url="https://bugzilla.suse.com/984831" source="BUGZILLA"/>
		<reference ref_id="984837" ref_url="https://bugzilla.suse.com/984837" source="BUGZILLA"/>
		<reference ref_id="984842" ref_url="https://bugzilla.suse.com/984842" source="BUGZILLA"/>
		<reference ref_id="987351" ref_url="https://bugzilla.suse.com/987351" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3186" ref_url="https://www.suse.com/security/cve/CVE-2016-3186/" source="CVE"/>
		<reference ref_id="CVE-2016-3622" ref_url="https://www.suse.com/security/cve/CVE-2016-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-3623" ref_url="https://www.suse.com/security/cve/CVE-2016-3623/" source="CVE"/>
		<reference ref_id="CVE-2016-3945" ref_url="https://www.suse.com/security/cve/CVE-2016-3945/" source="CVE"/>
		<reference ref_id="CVE-2016-3990" ref_url="https://www.suse.com/security/cve/CVE-2016-3990/" source="CVE"/>
		<reference ref_id="CVE-2016-5314" ref_url="https://www.suse.com/security/cve/CVE-2016-5314/" source="CVE"/>
		<reference ref_id="CVE-2016-5316" ref_url="https://www.suse.com/security/cve/CVE-2016-5316/" source="CVE"/>
		<reference ref_id="CVE-2016-5317" ref_url="https://www.suse.com/security/cve/CVE-2016-5317/" source="CVE"/>
		<reference ref_id="CVE-2016-5320" ref_url="https://www.suse.com/security/cve/CVE-2016-5320/" source="CVE"/>
		<reference ref_id="CVE-2016-5875" ref_url="https://www.suse.com/security/cve/CVE-2016-5875/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2016-3622: Specially crafted TIFF images could trigger a crash in tiff2rgba (bsc#974449)
- Various out-of-bound write vulnerabilities with unspecified impact (MSVR 35093, MSVR 35094, MSVR 35095, MSVR 35096, MSVR 35097, MSVR 35098)
- CVE-2016-5314: Specially crafted TIFF images could trigger a crash that could result in DoS (bsc#984831)
- CVE-2016-5316: Specially crafted TIFF images could trigger a crash in the rgb2ycbcr tool, leading to Doa (bsc#984837)
- CVE-2016-5317: Specially crafted TIFF images could trigger a crash through an out of bound write (bsc#984842)
- CVE-2016-5320: Specially crafted TIFF images could trigger a crash or potentially allow remote code execution when using the rgb2ycbcr command (bsc#984808)
- CVE-2016-5875: Specially crafted TIFF images could trigger could allow arbitrary code execution (bsc#987351)
- CVE-2016-3623: Specially crafted TIFF images could trigger a crash in rgb2ycbcr (bsc#974618)
- CVE-2016-3945: Specially crafted TIFF images could trigger a crash or allow for arbitrary command execution via tiff2rgba (bsc#974614)
- CVE-2016-3990: Specially crafted TIFF images could trigger a crash or allow for arbitrary command execution (bsc#975069)
- CVE-2016-3186: Specially crafted TIFF imaged could trigger a crash in the gif2tiff command via a buffer overflow (bsc#973340)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-13"/>
	<updated date="2016-10-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/973340">SUSE bug 973340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974449">SUSE bug 974449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974614">SUSE bug 974614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974618">SUSE bug 974618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975069">SUSE bug 975069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984808">SUSE bug 984808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984831">SUSE bug 984831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984837">SUSE bug 984837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984842">SUSE bug 984842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987351">SUSE bug 987351</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3186/">CVE-2016-3186 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3186">CVE-2016-3186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3622/">CVE-2016-3622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3622">CVE-2016-3622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3623/">CVE-2016-3623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3623">CVE-2016-3623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3945/">CVE-2016-3945 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3945">CVE-2016-3945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3990/">CVE-2016-3990 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3990">CVE-2016-3990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5314/">CVE-2016-5314 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5314">CVE-2016-5314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5316/">CVE-2016-5316 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5316">CVE-2016-5316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5317/">CVE-2016-5317 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5317">CVE-2016-5317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5320/">CVE-2016-5320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-5320">CVE-2016-5320 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5875/">CVE-2016-5875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-5875">CVE-2016-5875 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575235" comment="libtiff3-3.8.2-141.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575236" comment="libtiff3-32bit-3.8.2-141.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575237" comment="tiff-3.8.2-141.168.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217824" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1007280" ref_url="https://bugzilla.suse.com/1007280" source="BUGZILLA"/>
		<reference ref_id="1011107" ref_url="https://bugzilla.suse.com/1011107" source="BUGZILLA"/>
		<reference ref_id="1011845" ref_url="https://bugzilla.suse.com/1011845" source="BUGZILLA"/>
		<reference ref_id="1017688" ref_url="https://bugzilla.suse.com/1017688" source="BUGZILLA"/>
		<reference ref_id="1017690" ref_url="https://bugzilla.suse.com/1017690" source="BUGZILLA"/>
		<reference ref_id="1017691" ref_url="https://bugzilla.suse.com/1017691" source="BUGZILLA"/>
		<reference ref_id="1017692" ref_url="https://bugzilla.suse.com/1017692" source="BUGZILLA"/>
		<reference ref_id="1031255" ref_url="https://bugzilla.suse.com/1031255" source="BUGZILLA"/>
		<reference ref_id="1046077" ref_url="https://bugzilla.suse.com/1046077" source="BUGZILLA"/>
		<reference ref_id="1048937" ref_url="https://bugzilla.suse.com/1048937" source="BUGZILLA"/>
		<reference ref_id="1074318" ref_url="https://bugzilla.suse.com/1074318" source="BUGZILLA"/>
		<reference ref_id="960341" ref_url="https://bugzilla.suse.com/960341" source="BUGZILLA"/>
		<reference ref_id="983436" ref_url="https://bugzilla.suse.com/983436" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2016-10095" ref_url="https://www.suse.com/security/cve/CVE-2016-10095/" source="CVE"/>
		<reference ref_id="CVE-2016-10268" ref_url="https://www.suse.com/security/cve/CVE-2016-10268/" source="CVE"/>
		<reference ref_id="CVE-2016-3945" ref_url="https://www.suse.com/security/cve/CVE-2016-3945/" source="CVE"/>
		<reference ref_id="CVE-2016-5318" ref_url="https://www.suse.com/security/cve/CVE-2016-5318/" source="CVE"/>
		<reference ref_id="CVE-2016-5652" ref_url="https://www.suse.com/security/cve/CVE-2016-5652/" source="CVE"/>
		<reference ref_id="CVE-2016-9453" ref_url="https://www.suse.com/security/cve/CVE-2016-9453/" source="CVE"/>
		<reference ref_id="CVE-2016-9536" ref_url="https://www.suse.com/security/cve/CVE-2016-9536/" source="CVE"/>
		<reference ref_id="CVE-2017-11335" ref_url="https://www.suse.com/security/cve/CVE-2017-11335/" source="CVE"/>
		<reference ref_id="CVE-2017-17973" ref_url="https://www.suse.com/security/cve/CVE-2017-17973/" source="CVE"/>
		<reference ref_id="CVE-2017-9935" ref_url="https://www.suse.com/security/cve/CVE-2017-9935/" source="CVE"/>
		<description>

  
This update for tiff fixes the following issues:

- CVE-2016-9453: The t2p_readwrite_pdf_image_tile function allowed remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a JPEG file with a TIFFTAG_JPEGTABLES of length one (bsc#1011107).
- CVE-2016-5652: An exploitable heap-based buffer overflow existed in the handling of TIFF images in the TIFF2PDF tool. A crafted TIFF document can lead to a heap-based buffer overflow resulting in remote code execution. Vulnerability can be triggered via a saved TIFF file delivered by other means (bsc#1007280).
- CVE-2017-11335: There is a heap based buffer overflow in tools/tiff2pdf.c via a PlanarConfig=Contig image, which caused a more than one hundred bytes out-of-bounds write (related to the ZIPDecode function in tif_zip.c). A crafted input may lead to a remote denial of service attack or an arbitrary code execution attack (bsc#1048937).
- CVE-2016-9536: tools/tiff2pdf.c had an out-of-bounds write vulnerabilities in heap allocated buffers in t2p_process_jpeg_strip(). Reported as MSVR 35098, aka 't2p_process_jpeg_strip heap-buffer-overflow.'  (bsc#1011845)
- CVE-2017-9935: In LibTIFF, there was a heap-based buffer overflow in the t2p_write_pdf function in tools/tiff2pdf.c. This heap overflow could lead to different damages. For example, a crafted TIFF document can lead to an out-of-bounds read in TIFFCleanup, an invalid free in TIFFClose or t2p_free, memory corruption in t2p_readwrite_pdf_image, or a double free in t2p_free. Given these possibilities, it probably could cause arbitrary code execution (bsc#1046077).
- CVE-2017-17973: There is a heap-based use-after-free in the t2p_writeproc function in tiff2pdf.c. (bsc#1074318)
- CVE-2015-7554: The _TIFFVGetField function in tif_dir.c allowed attackers to cause a denial of service (invalid memory write and crash) or possibly have unspecified other impact via crafted field data in an extension tag in a TIFF image (bsc#960341).
- CVE-2016-5318: Stack-based buffer overflow in the _TIFFVGetField function allowed remote attackers to crash the application via a crafted tiff (bsc#983436).
- CVE-2016-10095: Stack-based buffer overflow in the _TIFFVGetField function in tif_dir.c allowed remote attackers to cause a denial of service (crash) via a crafted TIFF file (bsc#1017690,).
- CVE-2016-10268: tools/tiffcp.c allowed remote attackers to cause a denial of service (integer underflow and heap-based buffer under-read) or possibly have unspecified other impact via a crafted TIFF image, related to 'READ of size 78490' and libtiff/tif_unix.c:115:23 (bsc#1031255)
- An overlapping of memcpy parameters was fixed which could lead to content corruption (bsc#1017691).
- Fixed an invalid memory read which could lead to a crash (bsc#1017692).
- Fixed a NULL pointer dereference in TIFFReadRawData (tiffinfo.c) that could crash the decoder (bsc#1017688).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-09"/>
	<updated date="2018-05-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007280">SUSE bug 1007280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011107">SUSE bug 1011107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011845">SUSE bug 1011845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017688">SUSE bug 1017688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017691">SUSE bug 1017691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017692">SUSE bug 1017692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031255">SUSE bug 1031255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046077">SUSE bug 1046077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048937">SUSE bug 1048937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074318">SUSE bug 1074318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983436">SUSE bug 983436</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7554">CVE-2015-7554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10095/">CVE-2016-10095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10095">CVE-2016-10095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10268/">CVE-2016-10268 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10268">CVE-2016-10268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3945/">CVE-2016-3945 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3945">CVE-2016-3945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5318/">CVE-2016-5318 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5318">CVE-2016-5318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5652/">CVE-2016-5652 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5652">CVE-2016-5652 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9453/">CVE-2016-9453 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9453">CVE-2016-9453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9536/">CVE-2016-9536 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9536">CVE-2016-9536 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11335/">CVE-2017-11335 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11335">CVE-2017-11335 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17973/">CVE-2017-17973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17973">CVE-2017-17973 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9935/">CVE-2017-9935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9935">CVE-2017-9935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575238" comment="libtiff3-3.8.2-141.169.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575239" comment="libtiff3-32bit-3.8.2-141.169.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575240" comment="tiff-3.8.2-141.169.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217825" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1017694" ref_url="https://bugzilla.suse.com/1017694" source="BUGZILLA"/>
		<reference ref_id="1031250" ref_url="https://bugzilla.suse.com/1031250" source="BUGZILLA"/>
		<reference ref_id="1031254" ref_url="https://bugzilla.suse.com/1031254" source="BUGZILLA"/>
		<reference ref_id="1033109" ref_url="https://bugzilla.suse.com/1033109" source="BUGZILLA"/>
		<reference ref_id="1033111" ref_url="https://bugzilla.suse.com/1033111" source="BUGZILLA"/>
		<reference ref_id="1033112" ref_url="https://bugzilla.suse.com/1033112" source="BUGZILLA"/>
		<reference ref_id="1033113" ref_url="https://bugzilla.suse.com/1033113" source="BUGZILLA"/>
		<reference ref_id="1033120" ref_url="https://bugzilla.suse.com/1033120" source="BUGZILLA"/>
		<reference ref_id="1033126" ref_url="https://bugzilla.suse.com/1033126" source="BUGZILLA"/>
		<reference ref_id="1033127" ref_url="https://bugzilla.suse.com/1033127" source="BUGZILLA"/>
		<reference ref_id="1033129" ref_url="https://bugzilla.suse.com/1033129" source="BUGZILLA"/>
		<reference ref_id="1074317" ref_url="https://bugzilla.suse.com/1074317" source="BUGZILLA"/>
		<reference ref_id="984808" ref_url="https://bugzilla.suse.com/984808" source="BUGZILLA"/>
		<reference ref_id="984809" ref_url="https://bugzilla.suse.com/984809" source="BUGZILLA"/>
		<reference ref_id="984831" ref_url="https://bugzilla.suse.com/984831" source="BUGZILLA"/>
		<reference ref_id="987351" ref_url="https://bugzilla.suse.com/987351" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10267" ref_url="https://www.suse.com/security/cve/CVE-2016-10267/" source="CVE"/>
		<reference ref_id="CVE-2016-10269" ref_url="https://www.suse.com/security/cve/CVE-2016-10269/" source="CVE"/>
		<reference ref_id="CVE-2016-10270" ref_url="https://www.suse.com/security/cve/CVE-2016-10270/" source="CVE"/>
		<reference ref_id="CVE-2016-5314" ref_url="https://www.suse.com/security/cve/CVE-2016-5314/" source="CVE"/>
		<reference ref_id="CVE-2016-5315" ref_url="https://www.suse.com/security/cve/CVE-2016-5315/" source="CVE"/>
		<reference ref_id="CVE-2017-18013" ref_url="https://www.suse.com/security/cve/CVE-2017-18013/" source="CVE"/>
		<reference ref_id="CVE-2017-7593" ref_url="https://www.suse.com/security/cve/CVE-2017-7593/" source="CVE"/>
		<reference ref_id="CVE-2017-7595" ref_url="https://www.suse.com/security/cve/CVE-2017-7595/" source="CVE"/>
		<reference ref_id="CVE-2017-7596" ref_url="https://www.suse.com/security/cve/CVE-2017-7596/" source="CVE"/>
		<reference ref_id="CVE-2017-7597" ref_url="https://www.suse.com/security/cve/CVE-2017-7597/" source="CVE"/>
		<reference ref_id="CVE-2017-7599" ref_url="https://www.suse.com/security/cve/CVE-2017-7599/" source="CVE"/>
		<reference ref_id="CVE-2017-7600" ref_url="https://www.suse.com/security/cve/CVE-2017-7600/" source="CVE"/>
		<reference ref_id="CVE-2017-7601" ref_url="https://www.suse.com/security/cve/CVE-2017-7601/" source="CVE"/>
		<reference ref_id="CVE-2017-7602" ref_url="https://www.suse.com/security/cve/CVE-2017-7602/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

Security issues fixed:

- CVE-2016-5315: The setByteArray function in tif_dir.c allowed remote attackers to cause a denial of service (out-of-bounds read) via a crafted tiff image.  (bsc#984809)
- CVE-2016-10267: LibTIFF allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_ojpeg.c:816:8.  (bsc#1017694)
- CVE-2016-10269: LibTIFF allowed remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to 'READ of size 512' and libtiff/tif_unix.c:340:2.  (bsc#1031254)
- CVE-2016-10270: LibTIFF allowed remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to 'READ of size 8' and libtiff/tif_read.c:523:22.  (bsc#1031250)
- CVE-2017-18013: In LibTIFF, there was a Null-Pointer Dereference in the tif_print.c TIFFPrintDirectory function, as demonstrated by a tiffinfo crash.  (bsc#1074317)
- CVE-2017-7593: tif_read.c did not ensure that tif_rawdata is properly initialized, which might have allowed remote attackers to obtain sensitive information from process memory via a crafted image.  (bsc#1033129)
- CVE-2017-7595: The JPEGSetupEncode function in tiff_jpeg.c allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image.  (bsc#1033127)
- CVE-2017-7596: LibTIFF had an 'outside the range of representable values of type float' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033126)
- CVE-2017-7597: tif_dirread.c had an 'outside the range of representable values of type float' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033120)
- CVE-2017-7599: LibTIFF had an 'outside the range of representable values of type short' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033113)
- CVE-2017-7600: LibTIFF had an 'outside the range of representable values of type unsigned char' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033112)
- CVE-2017-7601: LibTIFF had a 'shift exponent too large for 64-bit type long' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033111)
- CVE-2017-7602: LibTIFF had a signed integer overflow, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033109)
- Multiple divide by zero issues
- CVE-2016-5314: Buffer overflow in the PixarLogDecode function in tif_pixarlog.c allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.  (bsc#987351 bsc#984808 bsc#984831)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-30"/>
	<updated date="2018-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017694">SUSE bug 1017694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031250">SUSE bug 1031250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031254">SUSE bug 1031254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033109">SUSE bug 1033109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033111">SUSE bug 1033111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033112">SUSE bug 1033112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033113">SUSE bug 1033113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033120">SUSE bug 1033120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033126">SUSE bug 1033126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033127">SUSE bug 1033127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033129">SUSE bug 1033129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074317">SUSE bug 1074317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984808">SUSE bug 984808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984809">SUSE bug 984809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984831">SUSE bug 984831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987351">SUSE bug 987351</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10267/">CVE-2016-10267 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10267">CVE-2016-10267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10269/">CVE-2016-10269 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10269">CVE-2016-10269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10270/">CVE-2016-10270 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10270">CVE-2016-10270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5314/">CVE-2016-5314 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5314">CVE-2016-5314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5315/">CVE-2016-5315 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5315">CVE-2016-5315 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18013/">CVE-2017-18013 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18013">CVE-2017-18013 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7593/">CVE-2017-7593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7593">CVE-2017-7593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7595/">CVE-2017-7595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7595">CVE-2017-7595 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7596/">CVE-2017-7596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7596">CVE-2017-7596 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7597/">CVE-2017-7597 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7597">CVE-2017-7597 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7599/">CVE-2017-7599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7599">CVE-2017-7599 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7600/">CVE-2017-7600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7600">CVE-2017-7600 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7601/">CVE-2017-7601 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7601">CVE-2017-7601 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7602/">CVE-2017-7602 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7602">CVE-2017-7602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575241" comment="libtiff3-3.8.2-141.169.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575242" comment="libtiff3-32bit-3.8.2-141.169.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575243" comment="tiff-3.8.2-141.169.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217826" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1007276" ref_url="https://bugzilla.suse.com/1007276" source="BUGZILLA"/>
		<reference ref_id="1011839" ref_url="https://bugzilla.suse.com/1011839" source="BUGZILLA"/>
		<reference ref_id="1011846" ref_url="https://bugzilla.suse.com/1011846" source="BUGZILLA"/>
		<reference ref_id="1017689" ref_url="https://bugzilla.suse.com/1017689" source="BUGZILLA"/>
		<reference ref_id="1017690" ref_url="https://bugzilla.suse.com/1017690" source="BUGZILLA"/>
		<reference ref_id="1019611" ref_url="https://bugzilla.suse.com/1019611" source="BUGZILLA"/>
		<reference ref_id="1031263" ref_url="https://bugzilla.suse.com/1031263" source="BUGZILLA"/>
		<reference ref_id="1082332" ref_url="https://bugzilla.suse.com/1082332" source="BUGZILLA"/>
		<reference ref_id="1082825" ref_url="https://bugzilla.suse.com/1082825" source="BUGZILLA"/>
		<reference ref_id="1086408" ref_url="https://bugzilla.suse.com/1086408" source="BUGZILLA"/>
		<reference ref_id="974621" ref_url="https://bugzilla.suse.com/974621" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2016-10095" ref_url="https://www.suse.com/security/cve/CVE-2016-10095/" source="CVE"/>
		<reference ref_id="CVE-2016-10266" ref_url="https://www.suse.com/security/cve/CVE-2016-10266/" source="CVE"/>
		<reference ref_id="CVE-2016-3632" ref_url="https://www.suse.com/security/cve/CVE-2016-3632/" source="CVE"/>
		<reference ref_id="CVE-2016-5318" ref_url="https://www.suse.com/security/cve/CVE-2016-5318/" source="CVE"/>
		<reference ref_id="CVE-2016-8331" ref_url="https://www.suse.com/security/cve/CVE-2016-8331/" source="CVE"/>
		<reference ref_id="CVE-2016-9535" ref_url="https://www.suse.com/security/cve/CVE-2016-9535/" source="CVE"/>
		<reference ref_id="CVE-2016-9540" ref_url="https://www.suse.com/security/cve/CVE-2016-9540/" source="CVE"/>
		<reference ref_id="CVE-2017-11613" ref_url="https://www.suse.com/security/cve/CVE-2017-11613/" source="CVE"/>
		<reference ref_id="CVE-2017-5225" ref_url="https://www.suse.com/security/cve/CVE-2017-5225/" source="CVE"/>
		<reference ref_id="CVE-2018-7456" ref_url="https://www.suse.com/security/cve/CVE-2018-7456/" source="CVE"/>
		<reference ref_id="CVE-2018-8905" ref_url="https://www.suse.com/security/cve/CVE-2018-8905/" source="CVE"/>
		<description>
This update for tiff fixes the following security issues:

- CVE-2017-5225: Prevent heap buffer overflow in the tools/tiffcp that could
  have caused DoS or code execution via a crafted BitsPerSample value
  (bsc#1019611)
- CVE-2018-7456: Prevent a NULL Pointer dereference in the function
  TIFFPrintDirectory when using the tiffinfo tool to print crafted TIFF
  information, a different vulnerability than CVE-2017-18013 (bsc#1082825)
- CVE-2017-11613: Prevent denial of service in the TIFFOpen function. During
  the TIFFOpen process, td_imagelength is not checked. The value of
  td_imagelength can be directly controlled by an input file. In the
  ChopUpSingleUncompressedStrip function, the _TIFFCheckMalloc function is called
  based on td_imagelength. If the value of td_imagelength is set close to the
  amount of system memory, it will hang the system or trigger the OOM killer
  (bsc#1082332)
- CVE-2016-10266: Prevent remote attackers to cause a denial of service
  (divide-by-zero error and application crash) via a crafted TIFF image, related
  to libtiff/tif_read.c:351:22 (bsc#1031263)
- CVE-2018-8905: Prevent heap-based buffer overflow in the function
  LZWDecodeCompat via a crafted TIFF file (bsc#1086408)
- CVE-2016-9540: Prevent out-of-bounds write on tiled images with odd tile
  width versus image width (bsc#1011839).
- CVE-2016-9535: tif_predict.h and tif_predict.c had assertions that could have
  lead to assertion failures in debug mode, or buffer overflows in release mode,
  when dealing with unusual tile size like YCbCr with subsampling (bsc#1011846).
- CVE-2016-9535: tif_predict.h and tif_predict.c had assertions that could have
  lead to assertion failures in debug mode, or buffer overflows in release mode,
  when dealing with unusual tile size like YCbCr with subsampling (bsc#1011846).
- Removed assert in readSeparateTilesIntoBuffer() function (bsc#1017689).
- CVE-2016-10095: Prevent stack-based buffer overflow in the _TIFFVGetField
  function that allowed remote attackers to cause a denial of service (crash) via
  a crafted TIFF file (bsc#1017690).
- CVE-2016-8331: Prevent remote code execution because of incorrect handling of
  TIFF images. A crafted TIFF document could have lead to a type confusion
  vulnerability resulting in remote code execution. This vulnerability could have
  been be triggered via a TIFF file delivered to the application using LibTIFF's
  tag extension functionality (bsc#1007276).
- CVE-2016-3632: The _TIFFVGetField function allowed remote attackers to cause
  a denial of service (out-of-bounds write) or execute arbitrary code via a
  crafted TIFF image (bsc#974621).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-28"/>
	<updated date="2018-06-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007276">SUSE bug 1007276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011839">SUSE bug 1011839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011846">SUSE bug 1011846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017689">SUSE bug 1017689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019611">SUSE bug 1019611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031263">SUSE bug 1031263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082332">SUSE bug 1082332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082825">SUSE bug 1082825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086408">SUSE bug 1086408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974621">SUSE bug 974621</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8128">CVE-2014-8128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7554">CVE-2015-7554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10095/">CVE-2016-10095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10095">CVE-2016-10095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10266/">CVE-2016-10266 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10266">CVE-2016-10266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3632/">CVE-2016-3632 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3632">CVE-2016-3632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5318/">CVE-2016-5318 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5318">CVE-2016-5318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8331/">CVE-2016-8331 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8331">CVE-2016-8331 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9535/">CVE-2016-9535 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9535">CVE-2016-9535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9540/">CVE-2016-9540 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9540">CVE-2016-9540 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11613/">CVE-2017-11613 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11613">CVE-2017-11613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5225/">CVE-2017-5225 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5225">CVE-2017-5225 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7456/">CVE-2018-7456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7456">CVE-2018-7456 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-8905/">CVE-2018-8905 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8905">CVE-2018-8905 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575244" comment="libtiff3-3.8.2-141.169.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575245" comment="libtiff3-32bit-3.8.2-141.169.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575246" comment="tiff-3.8.2-141.169.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217827" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1074186" ref_url="https://bugzilla.suse.com/1074186" source="BUGZILLA"/>
		<reference ref_id="1092480" ref_url="https://bugzilla.suse.com/1092480" source="BUGZILLA"/>
		<reference ref_id="960589" ref_url="https://bugzilla.suse.com/960589" source="BUGZILLA"/>
		<reference ref_id="983440" ref_url="https://bugzilla.suse.com/983440" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8668" ref_url="https://www.suse.com/security/cve/CVE-2015-8668/" source="CVE"/>
		<reference ref_id="CVE-2016-5319" ref_url="https://www.suse.com/security/cve/CVE-2016-5319/" source="CVE"/>
		<reference ref_id="CVE-2017-17942" ref_url="https://www.suse.com/security/cve/CVE-2017-17942/" source="CVE"/>
		<reference ref_id="CVE-2018-10779" ref_url="https://www.suse.com/security/cve/CVE-2018-10779/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

The following security vulnerabilities were addressed:

- CVE-2015-8668: Fixed a heap-based buffer overflow in the PackBitsPreEncode
  function in tif_packbits.c in bmp2tiff, which allowed remote attackers to
  execute arbitrary code or cause a denial of service via a large width field
  in a specially crafted BMP image. (bsc#960589)
- CVE-2018-10779: Fixed a heap-based buffer over-read in TIFFWriteScanline() in
  tif_write.c (bsc#1092480)
- CVE-2017-17942: Fixed a heap-based buffer overflow in the function
  PackBitsEncode in tif_packbits.c. (bsc#1074186)
- CVE-2016-5319: Fixed a beap-based buffer overflow in bmp2tiff (bsc#983440)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-10"/>
	<updated date="2018-09-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074186">SUSE bug 1074186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092480">SUSE bug 1092480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960589">SUSE bug 960589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983440">SUSE bug 983440</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8668/">CVE-2015-8668 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8668">CVE-2015-8668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5319/">CVE-2016-5319 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5319">CVE-2016-5319 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17942/">CVE-2017-17942 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17942">CVE-2017-17942 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10779/">CVE-2018-10779 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10779">CVE-2018-10779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575247" comment="libtiff3-3.8.2-141.169.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575248" comment="libtiff3-32bit-3.8.2-141.169.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575249" comment="tiff-3.8.2-141.169.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217828" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1106853" ref_url="https://bugzilla.suse.com/1106853" source="BUGZILLA"/>
		<reference ref_id="1108627" ref_url="https://bugzilla.suse.com/1108627" source="BUGZILLA"/>
		<reference ref_id="1108637" ref_url="https://bugzilla.suse.com/1108637" source="BUGZILLA"/>
		<reference ref_id="1110358" ref_url="https://bugzilla.suse.com/1110358" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11613" ref_url="https://www.suse.com/security/cve/CVE-2017-11613/" source="CVE"/>
		<reference ref_id="CVE-2017-9935" ref_url="https://www.suse.com/security/cve/CVE-2017-9935/" source="CVE"/>
		<reference ref_id="CVE-2018-16335" ref_url="https://www.suse.com/security/cve/CVE-2018-16335/" source="CVE"/>
		<reference ref_id="CVE-2018-17100" ref_url="https://www.suse.com/security/cve/CVE-2018-17100/" source="CVE"/>
		<reference ref_id="CVE-2018-17101" ref_url="https://www.suse.com/security/cve/CVE-2018-17101/" source="CVE"/>
		<reference ref_id="CVE-2018-17795" ref_url="https://www.suse.com/security/cve/CVE-2018-17795/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2018-17100: There is a int32 overflow in multiply_ms in tools/ppm2tiff.c, which can cause a denial of service (crash) or possibly have unspecified other impact via a crafted image file. (bsc#1108637)
- CVE-2018-17101: There are two out-of-bounds writes in cpTags in tools/tiff2bw.c and tools/pal2rgb.c, which can cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image file. (bsc#1108627)
- CVE-2018-17795: The function t2p_write_pdf in tiff2pdf.c allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, a similar issue to CVE-2017-9935. (bsc#1110358)
- CVE-2018-16335: newoffsets handling in ChopUpSingleUncompressedStrip in tif_dirread.c allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf. This is a different vulnerability than CVE-2018-15209. (bsc#1106853)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-24"/>
	<updated date="2018-10-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106853">SUSE bug 1106853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108627">SUSE bug 1108627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108637">SUSE bug 1108637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110358">SUSE bug 1110358</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11613/">CVE-2017-11613 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11613">CVE-2017-11613 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9935/">CVE-2017-9935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9935">CVE-2017-9935 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16335/">CVE-2018-16335 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16335">CVE-2018-16335 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17100/">CVE-2018-17100 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17100">CVE-2018-17100 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-17101/">CVE-2018-17101 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17101">CVE-2018-17101 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17795/">CVE-2018-17795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17795">CVE-2018-17795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575250" comment="libtiff3-3.8.2-141.169.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575251" comment="libtiff3-32bit-3.8.2-141.169.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575252" comment="tiff-3.8.2-141.169.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217829" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1010163" ref_url="https://bugzilla.suse.com/1010163" source="BUGZILLA"/>
		<reference ref_id="1014461" ref_url="https://bugzilla.suse.com/1014461" source="BUGZILLA"/>
		<reference ref_id="1040080" ref_url="https://bugzilla.suse.com/1040080" source="BUGZILLA"/>
		<reference ref_id="1040322" ref_url="https://bugzilla.suse.com/1040322" source="BUGZILLA"/>
		<reference ref_id="1074186" ref_url="https://bugzilla.suse.com/1074186" source="BUGZILLA"/>
		<reference ref_id="1099257" ref_url="https://bugzilla.suse.com/1099257" source="BUGZILLA"/>
		<reference ref_id="1113672" ref_url="https://bugzilla.suse.com/1113672" source="BUGZILLA"/>
		<reference ref_id="974446" ref_url="https://bugzilla.suse.com/974446" source="BUGZILLA"/>
		<reference ref_id="974447" ref_url="https://bugzilla.suse.com/974447" source="BUGZILLA"/>
		<reference ref_id="974448" ref_url="https://bugzilla.suse.com/974448" source="BUGZILLA"/>
		<reference ref_id="983440" ref_url="https://bugzilla.suse.com/983440" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8870" ref_url="https://www.suse.com/security/cve/CVE-2015-8870/" source="CVE"/>
		<reference ref_id="CVE-2016-3619" ref_url="https://www.suse.com/security/cve/CVE-2016-3619/" source="CVE"/>
		<reference ref_id="CVE-2016-3620" ref_url="https://www.suse.com/security/cve/CVE-2016-3620/" source="CVE"/>
		<reference ref_id="CVE-2016-3621" ref_url="https://www.suse.com/security/cve/CVE-2016-3621/" source="CVE"/>
		<reference ref_id="CVE-2016-5319" ref_url="https://www.suse.com/security/cve/CVE-2016-5319/" source="CVE"/>
		<reference ref_id="CVE-2016-9273" ref_url="https://www.suse.com/security/cve/CVE-2016-9273/" source="CVE"/>
		<reference ref_id="CVE-2017-17942" ref_url="https://www.suse.com/security/cve/CVE-2017-17942/" source="CVE"/>
		<reference ref_id="CVE-2017-9117" ref_url="https://www.suse.com/security/cve/CVE-2017-9117/" source="CVE"/>
		<reference ref_id="CVE-2017-9147" ref_url="https://www.suse.com/security/cve/CVE-2017-9147/" source="CVE"/>
		<reference ref_id="CVE-2018-12900" ref_url="https://www.suse.com/security/cve/CVE-2018-12900/" source="CVE"/>
		<reference ref_id="CVE-2018-18661" ref_url="https://www.suse.com/security/cve/CVE-2018-18661/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

Security issues fixed:

- CVE-2018-18661: Fixed NULL pointer dereference in the function LZWDecode in the file tif_lzw.c (bsc#1113672).
- CVE-2018-12900: Fixed heap-based buffer overflow in the cpSeparateBufToContigBuf (bsc#1099257).
- CVE-2017-9147: Fixed invalid read in the _TIFFVGetField function in tif_dir.c, that allowed remote attackers to cause a DoS via acrafted TIFF file (bsc#1040322). 
- CVE-2017-9117: Fixed BMP images processing that was verified without biWidth and biHeight values (bsc#1040080).
- CVE-2017-17942: Fixed issue in the function PackBitsEncode that could have led to a heap overflow and caused a DoS (bsc#1074186).
- CVE-2016-9273: Fixed heap-based buffer overflow issue (bsc#1010163).
- CVE-2016-5319: Fixed heap-based buffer overflow in PackBitsEncode (bsc#983440).
- CVE-2016-3621: Fixed out-of-bounds read in the bmp2tiff tool (lzw packing) (bsc#974448).
- CVE-2016-3620: Fixed out-of-bounds read in the bmp2tiff tool (zip packing) (bsc#974447)
- CVE-2016-3619: Fixed out-of-bounds read in the bmp2tiff tool (none packing) (bsc#974446)
- CVE-2015-8870: Fixed integer overflow in tools/bmp2tiff.c that allowed remote attackers to causea DOS (bsc#1014461).

Non-security issues fixed:

- asan_build: build ASAN included
- debug_build: build more suitable for debugging
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-23"/>
	<updated date="2018-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010163">SUSE bug 1010163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014461">SUSE bug 1014461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040080">SUSE bug 1040080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040322">SUSE bug 1040322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074186">SUSE bug 1074186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099257">SUSE bug 1099257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113672">SUSE bug 1113672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974446">SUSE bug 974446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974447">SUSE bug 974447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974448">SUSE bug 974448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983440">SUSE bug 983440</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8870/">CVE-2015-8870 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8870">CVE-2015-8870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3619/">CVE-2016-3619 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3619">CVE-2016-3619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3620/">CVE-2016-3620 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3620">CVE-2016-3620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3621/">CVE-2016-3621 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3621">CVE-2016-3621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5319/">CVE-2016-5319 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5319">CVE-2016-5319 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9273/">CVE-2016-9273 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9273">CVE-2016-9273 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17942/">CVE-2017-17942 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17942">CVE-2017-17942 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9117/">CVE-2017-9117 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9117">CVE-2017-9117 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9147/">CVE-2017-9147 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9147">CVE-2017-9147 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12900/">CVE-2018-12900 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12900">CVE-2018-12900 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18661/">CVE-2018-18661 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18661">CVE-2018-18661 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575253" comment="libtiff3-3.8.2-141.169.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575254" comment="libtiff3-32bit-3.8.2-141.169.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575255" comment="tiff-3.8.2-141.169.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217830" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1017693" ref_url="https://bugzilla.suse.com/1017693" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10092" ref_url="https://www.suse.com/security/cve/CVE-2016-10092/" source="CVE"/>
		<reference ref_id="CVE-2016-10093" ref_url="https://www.suse.com/security/cve/CVE-2016-10093/" source="CVE"/>
		<reference ref_id="CVE-2016-10094" ref_url="https://www.suse.com/security/cve/CVE-2016-10094/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:                                             
                                                                                     
Security issues fixed:                                                                         
                                                                                                                               
- CVE-2016-10094: Fixed heap-based buffer overflow in the _tiffWriteProc function (bsc#1017693).                   
- CVE-2016-10093: Fixed heap-based buffer overflow in the _TIFFmemcpy function (bsc#1017693).      
- CVE-2016-10092: Fixed heap-based buffer overflow in the TIFFReverseBits function (bsc#1017693).          
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017693">SUSE bug 1017693</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10092/">CVE-2016-10092 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10092">CVE-2016-10092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10093/">CVE-2016-10093 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10093">CVE-2016-10093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10094/">CVE-2016-10094 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10094">CVE-2016-10094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575256" comment="libtiff3-3.8.2-141.169.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575257" comment="libtiff3-32bit-3.8.2-141.169.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575258" comment="tiff-3.8.2-141.169.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217831" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1121626" ref_url="https://bugzilla.suse.com/1121626" source="BUGZILLA"/>
		<reference ref_id="983268" ref_url="https://bugzilla.suse.com/983268" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5102" ref_url="https://www.suse.com/security/cve/CVE-2016-5102/" source="CVE"/>
		<reference ref_id="CVE-2019-6128" ref_url="https://www.suse.com/security/cve/CVE-2019-6128/" source="CVE"/>
		<description>
This update for tiff fixes the following issue:

Security vulnerabilities fixed:

- CVE-2016-5102: Fixed a buffer overflow in readgifimage() (bsc#983268)
- CVE-2019-6128: Fixed a memory leak in the TIFFFdOpen function in tif_unix.c (bsc#1121626)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1121626">SUSE bug 1121626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983268">SUSE bug 983268</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5102/">CVE-2016-5102 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5102">CVE-2016-5102 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6128/">CVE-2019-6128 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6128">CVE-2019-6128 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575259" comment="libtiff3-3.8.2-141.169.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575260" comment="libtiff3-32bit-3.8.2-141.169.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575261" comment="tiff-3.8.2-141.169.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217832" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1156749" ref_url="https://bugzilla.suse.com/1156749" source="BUGZILLA"/>
		<reference ref_id="1156754" ref_url="https://bugzilla.suse.com/1156754" source="BUGZILLA"/>
		<reference ref_id="1182808" ref_url="https://bugzilla.suse.com/1182808" source="BUGZILLA"/>
		<reference ref_id="1182809" ref_url="https://bugzilla.suse.com/1182809" source="BUGZILLA"/>
		<reference ref_id="1182811" ref_url="https://bugzilla.suse.com/1182811" source="BUGZILLA"/>
		<reference ref_id="1182812" ref_url="https://bugzilla.suse.com/1182812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8665" ref_url="https://www.suse.com/security/cve/CVE-2015-8665/" source="CVE"/>
		<reference ref_id="CVE-2015-8683" ref_url="https://www.suse.com/security/cve/CVE-2015-8683/" source="CVE"/>
		<reference ref_id="CVE-2020-35521" ref_url="https://www.suse.com/security/cve/CVE-2020-35521/" source="CVE"/>
		<reference ref_id="CVE-2020-35522" ref_url="https://www.suse.com/security/cve/CVE-2020-35522/" source="CVE"/>
		<reference ref_id="CVE-2020-35523" ref_url="https://www.suse.com/security/cve/CVE-2020-35523/" source="CVE"/>
		<reference ref_id="CVE-2020-35524" ref_url="https://www.suse.com/security/cve/CVE-2020-35524/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2015-8683: Fixed out-of-bounds when reading CIE Lab image format files (bsc#1156754).
- CVE-2015-8665: Fixed out-of-bounds read in tif_getimage.c (bsc#1156749).
- CVE-2020-35521: Fixed memory allocation failure in tif_read.c (bsc#1182808).
- CVE-2020-35522: Fixed memory allocation failure in tif_pixarlog.c (bsc#1182809).
- CVE-2020-35523: Fixed integer overflow in tif_getimage.c (bsc#1182811).
- CVE-2020-35524: Fixed heap-based buffer overflow in TIFF2PDF tool (bsc#1182812).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156749">SUSE bug 1156749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156754">SUSE bug 1156754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182808">SUSE bug 1182808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182809">SUSE bug 1182809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182811">SUSE bug 1182811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182812">SUSE bug 1182812</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8665/">CVE-2015-8665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8665">CVE-2015-8665 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8683/">CVE-2015-8683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8683">CVE-2015-8683 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35521/">CVE-2020-35521 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35521">CVE-2020-35521 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35522/">CVE-2020-35522 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35522">CVE-2020-35522 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35523/">CVE-2020-35523 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35523">CVE-2020-35523 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35524/">CVE-2020-35524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35524">CVE-2020-35524 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666461" comment="libtiff3-3.8.2-141.169.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666462" comment="libtiff3-32bit-3.8.2-141.169.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666463" comment="tiff-3.8.2-141.169.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217833" version="1" class="patch">
	<metadata>
		<title>Security update for tightvnc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1155442" ref_url="https://bugzilla.suse.com/1155442" source="BUGZILLA"/>
		<reference ref_id="1155452" ref_url="https://bugzilla.suse.com/1155452" source="BUGZILLA"/>
		<reference ref_id="1155472" ref_url="https://bugzilla.suse.com/1155472" source="BUGZILLA"/>
		<reference ref_id="1155476" ref_url="https://bugzilla.suse.com/1155476" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15678" ref_url="https://www.suse.com/security/cve/CVE-2019-15678/" source="CVE"/>
		<reference ref_id="CVE-2019-15679" ref_url="https://www.suse.com/security/cve/CVE-2019-15679/" source="CVE"/>
		<reference ref_id="CVE-2019-15680" ref_url="https://www.suse.com/security/cve/CVE-2019-15680/" source="CVE"/>
		<reference ref_id="CVE-2019-8287" ref_url="https://www.suse.com/security/cve/CVE-2019-8287/" source="CVE"/>
		<description>
This update for tightvnc fixes the following issues:

- CVE-2019-15679: Fixed a heap buffer overflow in InitialiseRFBConnection 
  which might lead to code execution (bsc#1155476). 
- CVE-2019-8287: Fixed a global buffer overflow in HandleCoRREBBPmay which 
  might lead to code execution (bsc#1155472).
- CVE-2019-15680: Fixed a null pointer dereference in HandleZlibBPP which 
  could have led to denial of service (bsc#1155452).
- CVE-2019-15678: Fixed a heap buffer overflow in rfbServerCutText handler 
  (bsc#1155442).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-29"/>
	<updated date="2019-11-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155442">SUSE bug 1155442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155452">SUSE bug 1155452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155472">SUSE bug 1155472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155476">SUSE bug 1155476</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15678/">CVE-2019-15678 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15678">CVE-2019-15678 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15679/">CVE-2019-15679 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15679">CVE-2019-15679 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15680/">CVE-2019-15680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15680">CVE-2019-15680 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8287/">CVE-2019-8287 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8287">CVE-2019-8287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575262" comment="tightvnc-1.3.9-81.15.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217834" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="988489" ref_url="https://bugzilla.suse.com/988489" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5388" ref_url="https://www.suse.com/security/cve/CVE-2016-5388/" source="CVE"/>
		<description>

This update for tomcat6 fixes the following issue:

- CVE-2016-5388 Setting HTTP_PROXY environment variable via Proxy header (bsc#988489)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-02"/>
	<updated date="2016-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5388/">CVE-2016-5388 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5388">CVE-2016-5388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575263" comment="tomcat6-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575264" comment="tomcat6-admin-webapps-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575265" comment="tomcat6-docs-webapp-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575266" comment="tomcat6-javadoc-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575267" comment="tomcat6-jsp-2_1-api-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575268" comment="tomcat6-lib-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575269" comment="tomcat6-servlet-2_5-api-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575270" comment="tomcat6-webapps-6.0.45-0.53.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217835" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="735343" ref_url="https://bugzilla.suse.com/735343" source="BUGZILLA"/>
		<reference ref_id="742477" ref_url="https://bugzilla.suse.com/742477" source="BUGZILLA"/>
		<reference ref_id="768772" ref_url="https://bugzilla.suse.com/768772" source="BUGZILLA"/>
		<reference ref_id="789406" ref_url="https://bugzilla.suse.com/789406" source="BUGZILLA"/>
		<reference ref_id="791423" ref_url="https://bugzilla.suse.com/791423" source="BUGZILLA"/>
		<reference ref_id="791424" ref_url="https://bugzilla.suse.com/791424" source="BUGZILLA"/>
		<reference ref_id="791426" ref_url="https://bugzilla.suse.com/791426" source="BUGZILLA"/>
		<reference ref_id="791679" ref_url="https://bugzilla.suse.com/791679" source="BUGZILLA"/>
		<reference ref_id="793391" ref_url="https://bugzilla.suse.com/793391" source="BUGZILLA"/>
		<reference ref_id="793394" ref_url="https://bugzilla.suse.com/793394" source="BUGZILLA"/>
		<reference ref_id="794548" ref_url="https://bugzilla.suse.com/794548" source="BUGZILLA"/>
		<reference ref_id="804992" ref_url="https://bugzilla.suse.com/804992" source="BUGZILLA"/>
		<reference ref_id="818948" ref_url="https://bugzilla.suse.com/818948" source="BUGZILLA"/>
		<reference ref_id="822177" ref_url="https://bugzilla.suse.com/822177" source="BUGZILLA"/>
		<reference ref_id="831119" ref_url="https://bugzilla.suse.com/831119" source="BUGZILLA"/>
		<reference ref_id="906152" ref_url="https://bugzilla.suse.com/906152" source="BUGZILLA"/>
		<reference ref_id="917127" ref_url="https://bugzilla.suse.com/917127" source="BUGZILLA"/>
		<reference ref_id="918195" ref_url="https://bugzilla.suse.com/918195" source="BUGZILLA"/>
		<reference ref_id="926762" ref_url="https://bugzilla.suse.com/926762" source="BUGZILLA"/>
		<reference ref_id="931442" ref_url="https://bugzilla.suse.com/931442" source="BUGZILLA"/>
		<reference ref_id="932698" ref_url="https://bugzilla.suse.com/932698" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1184" ref_url="https://www.suse.com/security/cve/CVE-2011-1184/" source="CVE"/>
		<reference ref_id="CVE-2011-5062" ref_url="https://www.suse.com/security/cve/CVE-2011-5062/" source="CVE"/>
		<reference ref_id="CVE-2011-5063" ref_url="https://www.suse.com/security/cve/CVE-2011-5063/" source="CVE"/>
		<reference ref_id="CVE-2011-5064" ref_url="https://www.suse.com/security/cve/CVE-2011-5064/" source="CVE"/>
		<reference ref_id="CVE-2012-0022" ref_url="https://www.suse.com/security/cve/CVE-2012-0022/" source="CVE"/>
		<reference ref_id="CVE-2012-2733" ref_url="https://www.suse.com/security/cve/CVE-2012-2733/" source="CVE"/>
		<reference ref_id="CVE-2012-3544" ref_url="https://www.suse.com/security/cve/CVE-2012-3544/" source="CVE"/>
		<reference ref_id="CVE-2012-3546" ref_url="https://www.suse.com/security/cve/CVE-2012-3546/" source="CVE"/>
		<reference ref_id="CVE-2012-4431" ref_url="https://www.suse.com/security/cve/CVE-2012-4431/" source="CVE"/>
		<reference ref_id="CVE-2012-4534" ref_url="https://www.suse.com/security/cve/CVE-2012-4534/" source="CVE"/>
		<reference ref_id="CVE-2012-5568" ref_url="https://www.suse.com/security/cve/CVE-2012-5568/" source="CVE"/>
		<reference ref_id="CVE-2012-5885" ref_url="https://www.suse.com/security/cve/CVE-2012-5885/" source="CVE"/>
		<reference ref_id="CVE-2012-5886" ref_url="https://www.suse.com/security/cve/CVE-2012-5886/" source="CVE"/>
		<reference ref_id="CVE-2012-5887" ref_url="https://www.suse.com/security/cve/CVE-2012-5887/" source="CVE"/>
		<reference ref_id="CVE-2013-1976" ref_url="https://www.suse.com/security/cve/CVE-2013-1976/" source="CVE"/>
		<reference ref_id="CVE-2014-0227" ref_url="https://www.suse.com/security/cve/CVE-2014-0227/" source="CVE"/>
		<reference ref_id="CVE-2014-0230" ref_url="https://www.suse.com/security/cve/CVE-2014-0230/" source="CVE"/>
		<reference ref_id="CVE-2014-7810" ref_url="https://www.suse.com/security/cve/CVE-2014-7810/" source="CVE"/>
		<description>

This update of tomcat6 fixes:

    * apache-tomcat-CVE-2012-3544.patch (bnc#831119)
    * use chown --no-dereference to prevent symlink attacks on log
      (bnc#822177#c7/prevents CVE-2013-1976)
    * Fix tomcat init scripts generating malformed classpath
      (http://youtrack.jetbrains.com/issue/JT-18545) bnc#804992 (patch from
      m407)
    * fix a typo in initscript (bnc#768772 )
    * copy all shell scripts (bnc#818948)

Security Issue reference:

    * CVE-2012-3544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3544&gt;
    * CVE-2013-1976
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1976&gt;
    * CVE-2012-0022
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0022&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-02"/>
	<updated date="2013-08-02"/>
	<bugzilla href="https://bugzilla.suse.com/735343">SUSE bug 735343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742477">SUSE bug 742477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/768772">SUSE bug 768772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789406">SUSE bug 789406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791423">SUSE bug 791423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791424">SUSE bug 791424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791426">SUSE bug 791426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791679">SUSE bug 791679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/793391">SUSE bug 793391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/793394">SUSE bug 793394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/794548">SUSE bug 794548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804992">SUSE bug 804992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818948">SUSE bug 818948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822177">SUSE bug 822177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831119">SUSE bug 831119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906152">SUSE bug 906152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917127">SUSE bug 917127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918195">SUSE bug 918195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926762">SUSE bug 926762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931442">SUSE bug 931442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932698">SUSE bug 932698</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1184/">CVE-2011-1184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1184">CVE-2011-1184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5062/">CVE-2011-5062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-5062">CVE-2011-5062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5063/">CVE-2011-5063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-5063">CVE-2011-5063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5064/">CVE-2011-5064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-5064">CVE-2011-5064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0022/">CVE-2012-0022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0022">CVE-2012-0022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2733/">CVE-2012-2733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2733">CVE-2012-2733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3544/">CVE-2012-3544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3544">CVE-2012-3544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3546/">CVE-2012-3546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3546">CVE-2012-3546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4431/">CVE-2012-4431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4431">CVE-2012-4431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4534/">CVE-2012-4534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4534">CVE-2012-4534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5568/">CVE-2012-5568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5568">CVE-2012-5568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5885/">CVE-2012-5885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5885">CVE-2012-5885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5886/">CVE-2012-5886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5886">CVE-2012-5886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5887/">CVE-2012-5887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5887">CVE-2012-5887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1976/">CVE-2013-1976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1976">CVE-2013-1976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0227/">CVE-2014-0227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0227">CVE-2014-0227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0230/">CVE-2014-0230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0230">CVE-2014-0230 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7810/">CVE-2014-7810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7810">CVE-2014-7810 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576962" comment="tomcat6-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576963" comment="tomcat6-admin-webapps-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576964" comment="tomcat6-docs-webapp-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576965" comment="tomcat6-javadoc-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576966" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576967" comment="tomcat6-lib-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576968" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576969" comment="tomcat6-webapps-6.0.18-20.35.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217836" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="934219" ref_url="https://bugzilla.suse.com/934219" source="BUGZILLA"/>
		<reference ref_id="967815" ref_url="https://bugzilla.suse.com/967815" source="BUGZILLA"/>
		<reference ref_id="967964" ref_url="https://bugzilla.suse.com/967964" source="BUGZILLA"/>
		<reference ref_id="967965" ref_url="https://bugzilla.suse.com/967965" source="BUGZILLA"/>
		<reference ref_id="967967" ref_url="https://bugzilla.suse.com/967967" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5174" ref_url="https://www.suse.com/security/cve/CVE-2015-5174/" source="CVE"/>
		<reference ref_id="CVE-2015-5345" ref_url="https://www.suse.com/security/cve/CVE-2015-5345/" source="CVE"/>
		<reference ref_id="CVE-2016-0706" ref_url="https://www.suse.com/security/cve/CVE-2016-0706/" source="CVE"/>
		<reference ref_id="CVE-2016-0714" ref_url="https://www.suse.com/security/cve/CVE-2016-0714/" source="CVE"/>
		<description>

This update for tomcat6 fixes the following issues:

The version was updated from 6.0.41 to 6.0.45.

Security issues fixed:

* CVE-2015-5174: Directory traversal vulnerability in RequestUtil.java
  in Apache Tomcat allowed remote authenticated users to bypass intended
  SecurityManager restrictions and list a parent directory via a /.. (slash
  dot dot) in a pathname used by a web application in a getResource,
  getResourceAsStream, or getResourcePaths call, as demonstrated by the
  $CATALINA_BASE/webapps directory.  (bsc#967967)
* CVE-2015-5345: The Mapper component in Apache Tomcat processes redirects
  before considering security constraints and Filters, which allowed remote
  attackers to determine the existence of a directory via a URL that lacks
  a trailing / (slash) character. (bsc#967965)
* CVE-2016-0706: Apache Tomcat did not place
  org.apache.catalina.manager.StatusManagerServlet on the
  org/apache/catalina/core/RestrictedServlets.properties list, which
  allowed remote authenticated users to bypass intended SecurityManager
  restrictions and read arbitrary HTTP requests, and consequently discover
  session ID values, via a crafted web application.  (bsc#967815)
* CVE-2016-0714: The session-persistence implementation in Apache Tomcat
  mishandled session attributes, which allowed remote authenticated users
  to bypass intended SecurityManager restrictions and execute arbitrary
  code in a privileged context via a web application that places a crafted
  object in a session. (bsc#967964)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-21"/>
	<updated date="2016-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/934219">SUSE bug 934219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967815">SUSE bug 967815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967964">SUSE bug 967964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967965">SUSE bug 967965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967967">SUSE bug 967967</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5174/">CVE-2015-5174 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5174">CVE-2015-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5345/">CVE-2015-5345 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5345">CVE-2015-5345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0706/">CVE-2016-0706 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0706">CVE-2016-0706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0714/">CVE-2016-0714 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0714">CVE-2016-0714 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575279" comment="tomcat6-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575280" comment="tomcat6-admin-webapps-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575281" comment="tomcat6-docs-webapp-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575282" comment="tomcat6-javadoc-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575283" comment="tomcat6-jsp-2_1-api-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575284" comment="tomcat6-lib-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575285" comment="tomcat6-servlet-2_5-api-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575286" comment="tomcat6-webapps-6.0.45-0.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217837" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1007853" ref_url="https://bugzilla.suse.com/1007853" source="BUGZILLA"/>
		<reference ref_id="1007854" ref_url="https://bugzilla.suse.com/1007854" source="BUGZILLA"/>
		<reference ref_id="1007855" ref_url="https://bugzilla.suse.com/1007855" source="BUGZILLA"/>
		<reference ref_id="1007857" ref_url="https://bugzilla.suse.com/1007857" source="BUGZILLA"/>
		<reference ref_id="1007858" ref_url="https://bugzilla.suse.com/1007858" source="BUGZILLA"/>
		<reference ref_id="1011805" ref_url="https://bugzilla.suse.com/1011805" source="BUGZILLA"/>
		<reference ref_id="1011812" ref_url="https://bugzilla.suse.com/1011812" source="BUGZILLA"/>
		<reference ref_id="1015119" ref_url="https://bugzilla.suse.com/1015119" source="BUGZILLA"/>
		<reference ref_id="1033448" ref_url="https://bugzilla.suse.com/1033448" source="BUGZILLA"/>
		<reference ref_id="1036642" ref_url="https://bugzilla.suse.com/1036642" source="BUGZILLA"/>
		<reference ref_id="988489" ref_url="https://bugzilla.suse.com/988489" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0762" ref_url="https://www.suse.com/security/cve/CVE-2016-0762/" source="CVE"/>
		<reference ref_id="CVE-2016-5018" ref_url="https://www.suse.com/security/cve/CVE-2016-5018/" source="CVE"/>
		<reference ref_id="CVE-2016-5388" ref_url="https://www.suse.com/security/cve/CVE-2016-5388/" source="CVE"/>
		<reference ref_id="CVE-2016-6794" ref_url="https://www.suse.com/security/cve/CVE-2016-6794/" source="CVE"/>
		<reference ref_id="CVE-2016-6796" ref_url="https://www.suse.com/security/cve/CVE-2016-6796/" source="CVE"/>
		<reference ref_id="CVE-2016-6797" ref_url="https://www.suse.com/security/cve/CVE-2016-6797/" source="CVE"/>
		<reference ref_id="CVE-2016-6816" ref_url="https://www.suse.com/security/cve/CVE-2016-6816/" source="CVE"/>
		<reference ref_id="CVE-2016-8735" ref_url="https://www.suse.com/security/cve/CVE-2016-8735/" source="CVE"/>
		<reference ref_id="CVE-2016-8745" ref_url="https://www.suse.com/security/cve/CVE-2016-8745/" source="CVE"/>
		<reference ref_id="CVE-2017-5647" ref_url="https://www.suse.com/security/cve/CVE-2017-5647/" source="CVE"/>
		<description>
This update for tomcat6 fixes the following issues:

Tomcat was updated to version 6.0.53:

The full changelog is:
  http://tomcat.apache.org/tomcat-6.0-doc/changelog.html

Security issues fixed:

- CVE-2017-5647: A bug in the handling of pipelined requests could lead to information disclosure (bsc#1036642)
- CVE-2016-8745: Regression in the error handling methods could lead to information disclosure (bsc#1015119) 
- CVE-2016-8735: Remote code execution vulnerability in JmxRemoteLifecycleListener (bsc#1011805)
- CVE-2016-6816: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests (bsc#1011812)
- CVE-2016-6797: Unrestricted Access to Global Resources (bsc#1007853)
- CVE-2016-6796: Manager Bypass (bsc#1007858)
- CVE-2016-6794: System Property Disclosure (bsc#1007857)
- CVE-2016-5018: Security Manager Bypass (bsc#1007855)
- CVE-2016-0762: Realm Timing Attack (bsc#1007854)
- CVE-2016-5388: an arbitrary HTTP_PROXY environment variable might allow remote attackers to redirect  outbound HTTP traffic (bsc#988489)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-21"/>
	<updated date="2017-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1007853">SUSE bug 1007853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007854">SUSE bug 1007854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007855">SUSE bug 1007855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007857">SUSE bug 1007857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007858">SUSE bug 1007858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011805">SUSE bug 1011805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011812">SUSE bug 1011812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015119">SUSE bug 1015119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033448">SUSE bug 1033448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036642">SUSE bug 1036642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0762/">CVE-2016-0762 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0762">CVE-2016-0762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5018/">CVE-2016-5018 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5018">CVE-2016-5018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5388/">CVE-2016-5388 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5388">CVE-2016-5388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6794/">CVE-2016-6794 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6794">CVE-2016-6794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6796/">CVE-2016-6796 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6796">CVE-2016-6796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6797/">CVE-2016-6797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6797">CVE-2016-6797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6816/">CVE-2016-6816 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6816">CVE-2016-6816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8735/">CVE-2016-8735 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8735">CVE-2016-8735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8745/">CVE-2016-8745 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8745">CVE-2016-8745 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5647/">CVE-2017-5647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5647">CVE-2017-5647 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569238" comment="tomcat6-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569239" comment="tomcat6-admin-webapps-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569240" comment="tomcat6-docs-webapp-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569241" comment="tomcat6-javadoc-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569242" comment="tomcat6-jsp-2_1-api-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569243" comment="tomcat6-lib-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569244" comment="tomcat6-servlet-2_5-api-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569245" comment="tomcat6-webapps-6.0.53-0.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217838" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1042910" ref_url="https://bugzilla.suse.com/1042910" source="BUGZILLA"/>
		<reference ref_id="1082480" ref_url="https://bugzilla.suse.com/1082480" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5664" ref_url="https://www.suse.com/security/cve/CVE-2017-5664/" source="CVE"/>
		<reference ref_id="CVE-2018-1304" ref_url="https://www.suse.com/security/cve/CVE-2018-1304/" source="CVE"/>
		<description>
This update for tomcat6 fixes the following security issues:

- : The error page mechanism of the Java Servlet Specification
  requires that, when an error occurs and an error page is configured for the
  error that occurred, the original request and response are forwarded to the
  error page. This means that the request is presented to the error page with the
  original HTTP method. If the error page is a static file, expected behaviour is
  to serve content of the file as if processing a GET request, regardless of the
  actual HTTP method. The Default Servlet in Tomcat did not do this. Depending on
  the original request this could lead to unexpected and undesirable results for
  static error pages including, if the DefaultServlet is configured to permit
  writes, the replacement or removal of the custom error page (bsc#1042910).
- : The URL pattern of '' was not correctly handled when used as
  part of a security constraint definition. This caused the constraint to be
  ignored. It was possible for unauthorised users to gain access to web
  application resources that should have been protected. Only security
  constraints with a URL pattern of the empty string were affected (bsc#1082480).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-29"/>
	<updated date="2018-06-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042910">SUSE bug 1042910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082480">SUSE bug 1082480</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5664/">CVE-2017-5664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5664">CVE-2017-5664 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1304/">CVE-2018-1304 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1304">CVE-2018-1304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575287" comment="tomcat6-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575288" comment="tomcat6-admin-webapps-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575289" comment="tomcat6-docs-webapp-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575290" comment="tomcat6-javadoc-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575291" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575292" comment="tomcat6-lib-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575293" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575294" comment="tomcat6-webapps-6.0.53-0.57.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217839" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1110850" ref_url="https://bugzilla.suse.com/1110850" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11784" ref_url="https://www.suse.com/security/cve/CVE-2018-11784/" source="CVE"/>
		<description>
This update for tomcat6 fixes the following issue:

Security issue fixed:

- CVE-2018-11784: Fixed problem with specially crafted URLs that could be used to cause a redirect to any URI of an attackers choise (bsc#1110850).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-28"/>
	<updated date="2018-11-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1110850">SUSE bug 1110850</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-11784/">CVE-2018-11784 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11784">CVE-2018-11784 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575295" comment="tomcat6-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575296" comment="tomcat6-admin-webapps-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575297" comment="tomcat6-docs-webapp-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575298" comment="tomcat6-javadoc-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575299" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575300" comment="tomcat6-lib-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575301" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575302" comment="tomcat6-webapps-6.0.53-0.57.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217840" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1164692" ref_url="https://bugzilla.suse.com/1164692" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<description>
This update for tomcat6 fixes the following issues:

- CVE-2020-1938: Fixed a file contents disclosure vulnerability (bsc#1164692).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-27"/>
	<updated date="2020-03-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1164692">SUSE bug 1164692</bugzilla>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1938">CVE-2020-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569246" comment="tomcat6-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569247" comment="tomcat6-admin-webapps-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569248" comment="tomcat6-docs-webapp-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569249" comment="tomcat6-javadoc-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569250" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569251" comment="tomcat6-lib-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569252" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569253" comment="tomcat6-webapps-6.0.53-0.57.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217841" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1136085" ref_url="https://bugzilla.suse.com/1136085" source="BUGZILLA"/>
		<reference ref_id="1159723" ref_url="https://bugzilla.suse.com/1159723" source="BUGZILLA"/>
		<reference ref_id="1171928" ref_url="https://bugzilla.suse.com/1171928" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0221" ref_url="https://www.suse.com/security/cve/CVE-2019-0221/" source="CVE"/>
		<reference ref_id="CVE-2019-12418" ref_url="https://www.suse.com/security/cve/CVE-2019-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-9484" ref_url="https://www.suse.com/security/cve/CVE-2020-9484/" source="CVE"/>
		<description>
This update for tomcat6 fixes the following issues:

CVE-2020-9484 (bsc#1171928)
Apache Tomcat Remote Code Execution via session persistence

If an attacker was able to control the contents and name of a file on a
server configured to use the PersistenceManager, then the attacker could
have triggered a remote code execution via deserialization of the file under
their control.

CVE-2019-12418 (bsc#1159723)
Local privilege escalation by manipulating the RMI registry and performing a man-in-the-middle attack

When Tomcat is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files was able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface.
The attacker could then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.

CVE-2019-0221 (bsc#1136085)
The SSI printenv command echoed user provided data without escaping, which
made it vulnerable to XSS.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-22"/>
	<updated date="2020-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136085">SUSE bug 1136085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159723">SUSE bug 1159723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171928">SUSE bug 1171928</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0221/">CVE-2019-0221 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0221">CVE-2019-0221 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12418/">CVE-2019-12418 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12418">CVE-2019-12418 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9484/">CVE-2020-9484 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9484">CVE-2020-9484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569254" comment="tomcat6-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569255" comment="tomcat6-admin-webapps-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569256" comment="tomcat6-docs-webapp-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569257" comment="tomcat6-javadoc-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569258" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569259" comment="tomcat6-lib-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569260" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569261" comment="tomcat6-webapps-6.0.53-0.57.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217842" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1059554" ref_url="https://bugzilla.suse.com/1059554" source="BUGZILLA"/>
		<reference ref_id="1180947" ref_url="https://bugzilla.suse.com/1180947" source="BUGZILLA"/>
		<reference ref_id="1182909" ref_url="https://bugzilla.suse.com/1182909" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12617" ref_url="https://www.suse.com/security/cve/CVE-2017-12617/" source="CVE"/>
		<reference ref_id="CVE-2021-24122" ref_url="https://www.suse.com/security/cve/CVE-2021-24122/" source="CVE"/>
		<reference ref_id="CVE-2021-25329" ref_url="https://www.suse.com/security/cve/CVE-2021-25329/" source="CVE"/>
		<description>
This update for tomcat6 fixes the following issues:

- CVE-2021-25329: Fixed completely CVE-2020-9484 (bsc#1182909).
- CVE-2021-24122: Fixed an information disclosure (bsc#1180947).
- CVE-2017-12617: Fixed a file inclusion vulnerability through a crafted request (bsc#1059554).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-21"/>
	<updated date="2021-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059554">SUSE bug 1059554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180947">SUSE bug 1180947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182909">SUSE bug 1182909</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12617/">CVE-2017-12617 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12617">CVE-2017-12617 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-24122/">CVE-2021-24122 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24122">CVE-2021-24122 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25329/">CVE-2021-25329 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25329">CVE-2021-25329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569262" comment="tomcat6-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569263" comment="tomcat6-admin-webapps-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569264" comment="tomcat6-docs-webapp-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569265" comment="tomcat6-javadoc-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569266" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569267" comment="tomcat6-lib-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569268" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569269" comment="tomcat6-webapps-6.0.53-0.57.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217843" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1069257" ref_url="https://bugzilla.suse.com/1069257" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16899" ref_url="https://www.suse.com/security/cve/CVE-2017-16899/" source="CVE"/>
		<description>
This update for transfig fixes the following issues:

Security issue fixed:

- CVE-2017-16899: Fix array index error in the fig2dev program (bsc#1069257).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1069257">SUSE bug 1069257</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16899/">CVE-2017-16899 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16899">CVE-2017-16899 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575303" comment="transfig-3.2.5-160.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217844" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1106531" ref_url="https://bugzilla.suse.com/1106531" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16140" ref_url="https://www.suse.com/security/cve/CVE-2018-16140/" source="CVE"/>
		<description>
This update for transfig fixes the following issues:

Security issue fixed:

- CVE-2018-16140: Fixed a buffer underwrite vulnerability in get_line() in
  read.c, which allowed an attacker to write prior to the beginning of the
  buffer via specially crafted .fig file (bsc#1106531)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1106531">SUSE bug 1106531</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16140/">CVE-2018-16140 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16140">CVE-2018-16140 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575304" comment="transfig-3.2.5-160.6.20 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217845" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1136882" ref_url="https://bugzilla.suse.com/1136882" source="BUGZILLA"/>
		<reference ref_id="1143650" ref_url="https://bugzilla.suse.com/1143650" source="BUGZILLA"/>
		<reference ref_id="1159130" ref_url="https://bugzilla.suse.com/1159130" source="BUGZILLA"/>
		<reference ref_id="1159293" ref_url="https://bugzilla.suse.com/1159293" source="BUGZILLA"/>
		<reference ref_id="1161698" ref_url="https://bugzilla.suse.com/1161698" source="BUGZILLA"/>
		<reference ref_id="1186329" ref_url="https://bugzilla.suse.com/1186329" source="BUGZILLA"/>
		<reference ref_id="1189325" ref_url="https://bugzilla.suse.com/1189325" source="BUGZILLA"/>
		<reference ref_id="1189343" ref_url="https://bugzilla.suse.com/1189343" source="BUGZILLA"/>
		<reference ref_id="1189345" ref_url="https://bugzilla.suse.com/1189345" source="BUGZILLA"/>
		<reference ref_id="1189346" ref_url="https://bugzilla.suse.com/1189346" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14275" ref_url="https://www.suse.com/security/cve/CVE-2019-14275/" source="CVE"/>
		<reference ref_id="CVE-2019-19555" ref_url="https://www.suse.com/security/cve/CVE-2019-19555/" source="CVE"/>
		<reference ref_id="CVE-2019-19746" ref_url="https://www.suse.com/security/cve/CVE-2019-19746/" source="CVE"/>
		<reference ref_id="CVE-2019-19797" ref_url="https://www.suse.com/security/cve/CVE-2019-19797/" source="CVE"/>
		<reference ref_id="CVE-2020-21680" ref_url="https://www.suse.com/security/cve/CVE-2020-21680/" source="CVE"/>
		<reference ref_id="CVE-2020-21681" ref_url="https://www.suse.com/security/cve/CVE-2020-21681/" source="CVE"/>
		<reference ref_id="CVE-2020-21682" ref_url="https://www.suse.com/security/cve/CVE-2020-21682/" source="CVE"/>
		<reference ref_id="CVE-2020-21683" ref_url="https://www.suse.com/security/cve/CVE-2020-21683/" source="CVE"/>
		<reference ref_id="CVE-2021-3561" ref_url="https://www.suse.com/security/cve/CVE-2021-3561/" source="CVE"/>
		<description>
This update for transfig fixes the following issues:

- CVE-2021-3561: Fixed global buffer overflow in fig2dev/read.c in function read_colordef() (bsc#1186329).
- CVE-2019-19797: Fixed out-of-bounds write in read_colordef in read.c (bsc#1159293).
- CVE-2019-19746: Fixed segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type (bsc#1159130).
- CVE-2019-19555: Fixed stack-based buffer overflow because of an incorrect sscanf (bsc#1161698).
- CVE-2019-14275: Fixed stack-based buffer overflow in the calc_arrow function in bound.c (bsc#1143650).
- CVE-2020-21680: Fixed a stack-based buffer overflow in the put_arrow() component in genpict2e.c (bsc#1189343).
- CVE-2020-21681: Fixed a global buffer overflow in the set_color component in genge.c (bsc#1189345).
- CVE-2020-21682: Fixed a global buffer overflow in the set_fill component in genge.c (bsc#1189346).
- CVE-2020-21683: Fixed a global buffer overflow in the shade_or_tint_name_after_declare_color in genpstricks.c (bsc#1189325).

- Do hardening via compile and linker flags 
- Fixed last added upstream commit (boo#1136882)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136882">SUSE bug 1136882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143650">SUSE bug 1143650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159130">SUSE bug 1159130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159293">SUSE bug 1159293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161698">SUSE bug 1161698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186329">SUSE bug 1186329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189325">SUSE bug 1189325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189343">SUSE bug 1189343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189345">SUSE bug 1189345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189346">SUSE bug 1189346</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14275/">CVE-2019-14275 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14275">CVE-2019-14275 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19555/">CVE-2019-19555 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19555">CVE-2019-19555 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19746/">CVE-2019-19746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19746">CVE-2019-19746 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19797/">CVE-2019-19797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19797">CVE-2019-19797 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21680/">CVE-2020-21680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21680">CVE-2020-21680 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21681/">CVE-2020-21681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21681">CVE-2020-21681 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21682/">CVE-2020-21682 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21682">CVE-2020-21682 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21683/">CVE-2020-21683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21683">CVE-2020-21683 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3561/">CVE-2021-3561 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3561">CVE-2021-3561 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651176" comment="transfig-3.2.8a-1.160.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217846" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1190607" ref_url="https://bugzilla.suse.com/1190607" source="BUGZILLA"/>
		<reference ref_id="1190611" ref_url="https://bugzilla.suse.com/1190611" source="BUGZILLA"/>
		<reference ref_id="1190612" ref_url="https://bugzilla.suse.com/1190612" source="BUGZILLA"/>
		<reference ref_id="1190615" ref_url="https://bugzilla.suse.com/1190615" source="BUGZILLA"/>
		<reference ref_id="1190616" ref_url="https://bugzilla.suse.com/1190616" source="BUGZILLA"/>
		<reference ref_id="1190617" ref_url="https://bugzilla.suse.com/1190617" source="BUGZILLA"/>
		<reference ref_id="1190618" ref_url="https://bugzilla.suse.com/1190618" source="BUGZILLA"/>
		<reference ref_id="1192019" ref_url="https://bugzilla.suse.com/1192019" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-21529" ref_url="https://www.suse.com/security/cve/CVE-2020-21529/" source="CVE"/>
		<reference ref_id="CVE-2020-21530" ref_url="https://www.suse.com/security/cve/CVE-2020-21530/" source="CVE"/>
		<reference ref_id="CVE-2020-21531" ref_url="https://www.suse.com/security/cve/CVE-2020-21531/" source="CVE"/>
		<reference ref_id="CVE-2020-21532" ref_url="https://www.suse.com/security/cve/CVE-2020-21532/" source="CVE"/>
		<reference ref_id="CVE-2020-21533" ref_url="https://www.suse.com/security/cve/CVE-2020-21533/" source="CVE"/>
		<reference ref_id="CVE-2020-21534" ref_url="https://www.suse.com/security/cve/CVE-2020-21534/" source="CVE"/>
		<reference ref_id="CVE-2020-21535" ref_url="https://www.suse.com/security/cve/CVE-2020-21535/" source="CVE"/>
		<reference ref_id="CVE-2021-32280" ref_url="https://www.suse.com/security/cve/CVE-2021-32280/" source="CVE"/>
		<description>
This update for transfig fixes the following issues:

Update to fig2dev version 3.2.8 Patchlevel 8b (Aug 2021)

- bsc#1190618, CVE-2020-21529: stack buffer overflow in the bezier_spline function in genepic.c.
- bsc#1190615, CVE-2020-21530: segmentation fault in the read_objects function in read.c.
- bsc#1190617, CVE-2020-21531: global buffer overflow in the conv_pattern_index function in gencgm.c.
- bsc#1190616, CVE-2020-21532: global buffer overflow in the setfigfont function in genepic.c.
- bsc#1190612, CVE-2020-21533: stack buffer overflow in the read_textobject function in read.c.
- bsc#1190611, CVE-2020-21534: global buffer overflow in the get_line function in read.c.
- bsc#1190607, CVE-2020-21535: segmentation fault in the gencgm_start function in gencgm.c.
- bsc#1192019, CVE-2021-32280: NULL pointer dereference in compute_closed_spline() in trans_spline.c
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-02"/>
	<updated date="2021-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190607">SUSE bug 1190607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190611">SUSE bug 1190611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190612">SUSE bug 1190612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190615">SUSE bug 1190615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190616">SUSE bug 1190616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190617">SUSE bug 1190617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190618">SUSE bug 1190618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192019">SUSE bug 1192019</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21529/">CVE-2020-21529 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21529">CVE-2020-21529 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21530/">CVE-2020-21530 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21530">CVE-2020-21530 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21531/">CVE-2020-21531 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21531">CVE-2020-21531 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21532/">CVE-2020-21532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21532">CVE-2020-21532 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21533/">CVE-2020-21533 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21533">CVE-2020-21533 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21534/">CVE-2020-21534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21534">CVE-2020-21534 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21535/">CVE-2020-21535 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21535">CVE-2020-21535 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32280/">CVE-2021-32280 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32280">CVE-2021-32280 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653706" comment="transfig-3.2.8b-160.16.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217847" version="1" class="patch">
	<metadata>
		<title>Security update for unrar (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1045315" ref_url="https://bugzilla.suse.com/1045315" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<description>
This update for unrar fixes the following issues:

- CVE-2012-6706: decoding malicious RAR files could have lead to memory corruption or code execution. (bsc#1045315).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-03"/>
	<updated date="2017-07-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045315">SUSE bug 1045315</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6706">CVE-2012-6706 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575305" comment="unrar-3.80.2-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217848" version="1" class="patch">
	<metadata>
		<title>Security update for unrar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1046882" ref_url="https://bugzilla.suse.com/1046882" source="BUGZILLA"/>
		<reference ref_id="1054038" ref_url="https://bugzilla.suse.com/1054038" source="BUGZILLA"/>
		<reference ref_id="513804" ref_url="https://bugzilla.suse.com/513804" source="BUGZILLA"/>
		<reference ref_id="693890" ref_url="https://bugzilla.suse.com/693890" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="CVE-2017-12938" ref_url="https://www.suse.com/security/cve/CVE-2017-12938/" source="CVE"/>
		<reference ref_id="CVE-2017-12940" ref_url="https://www.suse.com/security/cve/CVE-2017-12940/" source="CVE"/>
		<reference ref_id="CVE-2017-12941" ref_url="https://www.suse.com/security/cve/CVE-2017-12941/" source="CVE"/>
		<reference ref_id="CVE-2017-12942" ref_url="https://www.suse.com/security/cve/CVE-2017-12942/" source="CVE"/>
		<description>
This update for unrar to version 5.6.1 fixes several issues.

These security issues were fixed:

- CVE-2017-12938: Prevent remote attackers to bypass a directory-traversal
  protection mechanism via vectors involving a symlink to the . directory, a
  symlink to the .. directory, and a regular file (bsc#1054038).
- CVE-2017-12940: Prevent out-of-bounds read in the EncodeFileName::Decode call
  within the Archive::ReadHeader15 function (bsc#1054038).
- CVE-2017-12941: Prevent an out-of-bounds read in the Unpack::Unpack20
  function (bsc#1054038).
- CVE-2017-12942: Prevent a buffer overflow in the Unpack::LongLZ function
  (bsc#1054038).

These non-security issues were fixed:

- Added extraction support for .LZ archives created by Lzip compressor
- Enable unpacking of files in ZIP archives compressed with XZ algorithm and
  encrypted with AES
- Added support for PAX extended headers inside of TAR archive
- If RAR recovery volumes (.rev files) are present in the same folder as usual
  RAR volumes, archive test command verifies .rev contents after completing
  testing .rar files
- By default unrar skips symbolic links with absolute paths in link target when
  extracting unless -ola command line switch is specified
- Added support for AES-NI CPU instructions 
- Support for a new RAR 5.0 archiving format
- Wildcard exclusion mask for folders
- Added libunrar* and libunrar*-devel subpackages (bsc#513804)
- Prevent conditional jumps depending on uninitialised values (bsc#1046882)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046882">SUSE bug 1046882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054038">SUSE bug 1054038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/513804">SUSE bug 513804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693890">SUSE bug 693890</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6706">CVE-2012-6706 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12938/">CVE-2017-12938 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12938">CVE-2017-12938 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12940/">CVE-2017-12940 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12940">CVE-2017-12940 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12941/">CVE-2017-12941 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12941">CVE-2017-12941 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12942/">CVE-2017-12942 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12942">CVE-2017-12942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575306" comment="unrar-5.6.1-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217849" version="1" class="patch">
	<metadata>
		<title>Security update for unzip</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="909214" ref_url="https://bugzilla.suse.com/909214" source="BUGZILLA"/>
		<reference ref_id="914442" ref_url="https://bugzilla.suse.com/914442" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8139" ref_url="https://www.suse.com/security/cve/CVE-2014-8139/" source="CVE"/>
		<reference ref_id="CVE-2014-8140" ref_url="https://www.suse.com/security/cve/CVE-2014-8140/" source="CVE"/>
		<reference ref_id="CVE-2014-8141" ref_url="https://www.suse.com/security/cve/CVE-2014-8141/" source="CVE"/>
		<reference ref_id="CVE-2014-9636" ref_url="https://www.suse.com/security/cve/CVE-2014-9636/" source="CVE"/>
		<description>

This update fixes the following security issues:

    * CVE-2014-8139: input sanitization errors (bnc#909214)
    * CVE-2014-9636: out-of-bounds read/write in test_compr_eb()
      (bnc#914442)

Security Issues:

    * CVE-2014-9636
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9636&gt;
    * CVE-2014-8139
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8139&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-20"/>
	<updated date="2015-02-20"/>
	<bugzilla href="https://bugzilla.suse.com/909214">SUSE bug 909214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914442">SUSE bug 914442</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8139/">CVE-2014-8139 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8139">CVE-2014-8139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8140/">CVE-2014-8140 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8140">CVE-2014-8140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8141/">CVE-2014-8141 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8141">CVE-2014-8141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9636/">CVE-2014-9636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9636">CVE-2014-9636 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575307" comment="unzip-5.52-142.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217850" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1013992" ref_url="https://bugzilla.suse.com/1013992" source="BUGZILLA"/>
		<reference ref_id="1013993" ref_url="https://bugzilla.suse.com/1013993" source="BUGZILLA"/>
		<reference ref_id="950110" ref_url="https://bugzilla.suse.com/950110" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9913" ref_url="https://www.suse.com/security/cve/CVE-2014-9913/" source="CVE"/>
		<reference ref_id="CVE-2015-7696" ref_url="https://www.suse.com/security/cve/CVE-2015-7696/" source="CVE"/>
		<reference ref_id="CVE-2016-9844" ref_url="https://www.suse.com/security/cve/CVE-2016-9844/" source="CVE"/>
		<description>
This update for unzip fixes the following issues:

- CVE-2014-9913: Specially crafted zip files could trigger invalid memory writes possibly resulting in DoS or corruption (bsc#1013993)
- CVE-2015-7696: Specially crafted zip files with password protection could trigger a crash and lead to denial of service (bsc#950110)
- CVE-2016-9844: Specially crafted zip files could trigger invalid memory writes possibly resulting in DoS or corruption (bsc#1013992)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-07"/>
	<updated date="2017-04-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013992">SUSE bug 1013992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013993">SUSE bug 1013993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950110">SUSE bug 950110</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9913/">CVE-2014-9913 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9913">CVE-2014-9913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7696/">CVE-2015-7696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7696">CVE-2015-7696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9844/">CVE-2016-9844 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9844">CVE-2016-9844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575308" comment="unzip-5.52-142.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217851" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1080074" ref_url="https://bugzilla.suse.com/1080074" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000035" ref_url="https://www.suse.com/security/cve/CVE-2018-1000035/" source="CVE"/>
		<description>
This update for unzip fixes the following issues:

- CVE-2018-1000035: Fixed a heap-based buffer overflow in password protected ZIP archives (bsc#1080074)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-14"/>
	<updated date="2018-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1080074">SUSE bug 1080074</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000035/">CVE-2018-1000035 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000035">CVE-2018-1000035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575309" comment="unzip-5.52-142.34.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217852" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1110194" ref_url="https://bugzilla.suse.com/1110194" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18384" ref_url="https://www.suse.com/security/cve/CVE-2018-18384/" source="CVE"/>
		<description>
This update for unzip fixes the following issues:

- CVE-2018-18384: Fixed buffer overflow when listing archives (bsc#1110194)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-03"/>
	<updated date="2020-07-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1110194">SUSE bug 1110194</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18384/">CVE-2018-18384 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18384">CVE-2018-18384 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575310" comment="unzip-5.52-142.34.8.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217853" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1196175" ref_url="https://bugzilla.suse.com/1196175" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4217" ref_url="https://www.suse.com/security/cve/CVE-2021-4217/" source="CVE"/>
		<description>
This update for unzip fixes the following issues:

- CVE-2021-4217: Fixed null pointer dereference in Unicode strings code (bsc#1196175).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196175">SUSE bug 1196175</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4217/">CVE-2021-4217 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4217">CVE-2021-4217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669728" comment="unzip-5.52-142.34.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217854" version="1" class="patch">
	<metadata>
		<title>Security update for FUSE</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="635393" ref_url="https://bugzilla.suse.com/635393" source="BUGZILLA"/>
		<reference ref_id="651598" ref_url="https://bugzilla.suse.com/651598" source="BUGZILLA"/>
		<reference ref_id="663385" ref_url="https://bugzilla.suse.com/663385" source="BUGZILLA"/>
		<reference ref_id="666893" ref_url="https://bugzilla.suse.com/666893" source="BUGZILLA"/>
		<reference ref_id="667215" ref_url="https://bugzilla.suse.com/667215" source="BUGZILLA"/>
		<reference ref_id="668820" ref_url="https://bugzilla.suse.com/668820" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-3879" ref_url="https://www.suse.com/security/cve/CVE-2010-3879/" source="CVE"/>
		<reference ref_id="CVE-2011-0541" ref_url="https://www.suse.com/security/cve/CVE-2011-0541/" source="CVE"/>
		<reference ref_id="CVE-2011-0543" ref_url="https://www.suse.com/security/cve/CVE-2011-0543/" source="CVE"/>
		<description>

The following security issues were fixed:

    * CVE-2010-3879: FUSE allowed local users to create mtab entries with
      arbitrary pathnames, and consequently unmount any filesystem, via a
      symlink attack on the parent directory of the mountpoint of a FUSE
      filesystem.
    * CVE-2011-0541: Avoid mounting a directory including evaluation of
      symlinks, which might have allowed local attackers to mount
      filesystems anywhere in the system.
    * CVE-2011-0543: Avoid symlink attacks on the mount point written in
      the mtab file.

Four bugs were fixed:

    * fixed retrying nfs mounts on rpc timeouts
    * allow seperate control of the internet protocol uses by rpc.mount
      seperately of the protocol used by nfs.
    * Fixed locking in libuuid/uuid to avoid duplicate uuids.
    * mkswap bad block check marked every block bad in O(n!) time on a good
      device

New features were implemented:

    * mount now has --fake and --no-canonicalize options, required for the
      symlink security fixes. These were backported from mainline.
    * mount can now auto-detect and differentiate between squashfs3 and
      squashfs (v4) filesystems, allowing backward compatibility to the
      SUSE Linux Enterprise 11 GA codebase.

Security Issues:

    * CVE-2010-3879
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3879&gt;
    * CVE-2011-0541
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0541&gt;
    * CVE-2011-0543
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0543&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-03-03"/>
	<updated date="2011-03-03"/>
	<bugzilla href="https://bugzilla.suse.com/635393">SUSE bug 635393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/651598">SUSE bug 651598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/663385">SUSE bug 663385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/666893">SUSE bug 666893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/667215">SUSE bug 667215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/668820">SUSE bug 668820</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3879/">CVE-2010-3879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3879">CVE-2010-3879 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0541/">CVE-2011-0541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0541">CVE-2011-0541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0543/">CVE-2011-0543 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0543">CVE-2011-0543 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992396" comment="fuse-2.7.2-61.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992397" comment="libblkid1-2.16-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992398" comment="libfuse2-2.7.2-61.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992399" comment="libuuid1-2.16-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992400" comment="libuuid1-32bit-2.16-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992401" comment="util-linux-2.16-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992402" comment="util-linux-lang-2.16-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992403" comment="uuid-runtime-2.16-6.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217855" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1010685" ref_url="https://bugzilla.suse.com/1010685" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1248" ref_url="https://www.suse.com/security/cve/CVE-2016-1248/" source="CVE"/>
		<description>

This update for vim fixes the following security issues:

- Fixed CVE-2016-1248, an arbitrary command execution vulnerability
  (bsc#1010685)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-25"/>
	<updated date="2016-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010685">SUSE bug 1010685</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1248/">CVE-2016-1248 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1248">CVE-2016-1248 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575320" comment="gvim-7.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575321" comment="vim-7.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575322" comment="vim-base-7.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575323" comment="vim-data-7.2-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217856" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1024724" ref_url="https://bugzilla.suse.com/1024724" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5953" ref_url="https://www.suse.com/security/cve/CVE-2017-5953/" source="CVE"/>
		<description>

This update for vim fixes the following issues:

- CVE-2017-5953: Fixed a possible overflow with corrupted spell file (bsc#1024724)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-18"/>
	<updated date="2017-07-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024724">SUSE bug 1024724</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5953/">CVE-2017-5953 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5953">CVE-2017-5953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575324" comment="gvim-7.2-13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575325" comment="vim-7.2-13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575326" comment="vim-base-7.2-13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575327" comment="vim-data-7.2-13.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217857" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1137443" ref_url="https://bugzilla.suse.com/1137443" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12735" ref_url="https://www.suse.com/security/cve/CVE-2019-12735/" source="CVE"/>
		<description>
This update for vim fixes the following issues:

Security issue fixed: 

- CVE-2019-12735: Fixed a potential arbitrary code execution vulnerability in getchar.c (bsc#1137443).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-11"/>
	<updated date="2019-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137443">SUSE bug 1137443</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12735/">CVE-2019-12735 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12735">CVE-2019-12735 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575328" comment="gvim-7.2-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575329" comment="vim-7.2-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575330" comment="vim-base-7.2-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575331" comment="vim-data-7.2-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217858" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1172225" ref_url="https://bugzilla.suse.com/1172225" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20807" ref_url="https://www.suse.com/security/cve/CVE-2019-20807/" source="CVE"/>
		<description>
This update for vim fixes the following issues:

- CVE-2019-20807: Fixed an issue where escaping from the restrictive mode of vim
  was possible using interfaces (bsc#1172225). 	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-02"/>
	<updated date="2020-06-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172225">SUSE bug 1172225</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-20807/">CVE-2019-20807 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20807">CVE-2019-20807 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575332" comment="gvim-7.2-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575333" comment="vim-7.2-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575334" comment="vim-base-7.2-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575335" comment="vim-data-7.2-21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217859" version="1" class="patch">
	<metadata>
		<title>Security update for vino</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="691207" ref_url="https://bugzilla.suse.com/691207" source="BUGZILLA"/>
		<reference ref_id="843174" ref_url="https://bugzilla.suse.com/843174" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-0904" ref_url="https://www.suse.com/security/cve/CVE-2011-0904/" source="CVE"/>
		<reference ref_id="CVE-2011-0905" ref_url="https://www.suse.com/security/cve/CVE-2011-0905/" source="CVE"/>
		<reference ref_id="CVE-2013-5745" ref_url="https://www.suse.com/security/cve/CVE-2013-5745/" source="CVE"/>
		<description>

vino has been updated to fix a remote denial of service problem where 
remote attackers could have caused an infinite loop in vino (CPU 
consumption). (CVE-2013-5745)

Security Issue reference:

    * CVE-2013-5745
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5745&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-17"/>
	<updated date="2013-10-17"/>
	<bugzilla href="https://bugzilla.suse.com/691207">SUSE bug 691207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843174">SUSE bug 843174</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0904/">CVE-2011-0904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0904">CVE-2011-0904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0905/">CVE-2011-0905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0905">CVE-2011-0905 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5745/">CVE-2013-5745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5745">CVE-2013-5745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992404" comment="vino-2.28.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992405" comment="vino-lang-2.28.1-2.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217860" version="1" class="patch">
	<metadata>
		<title>Security update for vino (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1155419" ref_url="https://bugzilla.suse.com/1155419" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681/" source="CVE"/>
		<description>
This update for vino fixes the following issues:
	  
- CVE-2019-15681: Fixed a memory leak which could have allowed to a 
  remote attacker to read stack memory (bsc#1155419).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-23"/>
	<updated date="2020-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155419">SUSE bug 1155419</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15681">CVE-2019-15681 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575338" comment="vino-2.28.1-2.5.3.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575339" comment="vino-lang-2.28.1-2.5.3.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217861" version="1" class="patch">
	<metadata>
		<title>Recommended update for vsftpd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="676259" ref_url="https://bugzilla.suse.com/676259" source="BUGZILLA"/>
		<reference ref_id="734424" ref_url="https://bugzilla.suse.com/734424" source="BUGZILLA"/>
		<reference ref_id="762381" ref_url="https://bugzilla.suse.com/762381" source="BUGZILLA"/>
		<reference ref_id="767364" ref_url="https://bugzilla.suse.com/767364" source="BUGZILLA"/>
		<reference ref_id="900326" ref_url="https://bugzilla.suse.com/900326" source="BUGZILLA"/>
		<reference ref_id="915522" ref_url="https://bugzilla.suse.com/915522" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-0762" ref_url="https://www.suse.com/security/cve/CVE-2011-0762/" source="CVE"/>
		<reference ref_id="CVE-2015-1419" ref_url="https://www.suse.com/security/cve/CVE-2015-1419/" source="CVE"/>
		<description>

The following issues have been fixed:

    * #767364: vsftpd problem with subsequent ssl data connections
    * #762381: 500 OOPS: child died error from vsftp

		</description>
<advisory from="security@suse.de">
	<issued date="2012-10-16"/>
	<updated date="2012-10-16"/>
	<bugzilla href="https://bugzilla.suse.com/676259">SUSE bug 676259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/734424">SUSE bug 734424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762381">SUSE bug 762381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767364">SUSE bug 767364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900326">SUSE bug 900326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915522">SUSE bug 915522</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0762/">CVE-2011-0762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0762">CVE-2011-0762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1419/">CVE-2015-1419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1419">CVE-2015-1419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992406" comment="vsftpd-2.0.7-4.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217862" version="1" class="patch">
	<metadata>
		<title>Security update for vte, vte-debuginfo, vte-debugsource, vte-devel, vte-doc, vte-lang</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="621097" ref_url="https://bugzilla.suse.com/621097" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2713" ref_url="https://www.suse.com/security/cve/CVE-2010-2713/" source="CVE"/>
		<description>

This update fixes a vulnerability of VTE to an old title set and query 
attack which could be used by remote attackers to execute arbitrary code (
CVE-2010-2713 &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2713&gt; 
).

		</description>
<advisory from="security@suse.de">
	<issued date="2010-07-15"/>
	<updated date="2010-07-15"/>
	<bugzilla href="https://bugzilla.suse.com/621097">SUSE bug 621097</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2713/">CVE-2010-2713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2713">CVE-2010-2713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992407" comment="vte-0.22.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992408" comment="vte-doc-0.22.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992409" comment="vte-lang-0.22.5-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217863" version="1" class="patch">
	<metadata>
		<title>Security update for w3m</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="609451" ref_url="https://bugzilla.suse.com/609451" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2074" ref_url="https://www.suse.com/security/cve/CVE-2010-2074/" source="CVE"/>
		<description>

w3m does not handle embedded NUL characters in the common name and in 
subject alternative names of X.509 certificates (CVE-2010-2074
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2074&gt; ). This 
update fixes the issue and also turns on verification of x509 certificates 
by default which was not the case before.

		</description>
<advisory from="security@suse.de">
	<issued date="2010-06-17"/>
	<updated date="2010-06-17"/>
	<bugzilla href="https://bugzilla.suse.com/609451">SUSE bug 609451</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2074/">CVE-2010-2074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2074">CVE-2010-2074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992410" comment="w3m-0.5.2-132.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217864" version="1" class="patch">
	<metadata>
		<title>Security update for w3m (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1011269" ref_url="https://bugzilla.suse.com/1011269" source="BUGZILLA"/>
		<reference ref_id="1011270" ref_url="https://bugzilla.suse.com/1011270" source="BUGZILLA"/>
		<reference ref_id="1011271" ref_url="https://bugzilla.suse.com/1011271" source="BUGZILLA"/>
		<reference ref_id="1011272" ref_url="https://bugzilla.suse.com/1011272" source="BUGZILLA"/>
		<reference ref_id="1011283" ref_url="https://bugzilla.suse.com/1011283" source="BUGZILLA"/>
		<reference ref_id="1011284" ref_url="https://bugzilla.suse.com/1011284" source="BUGZILLA"/>
		<reference ref_id="1011285" ref_url="https://bugzilla.suse.com/1011285" source="BUGZILLA"/>
		<reference ref_id="1011286" ref_url="https://bugzilla.suse.com/1011286" source="BUGZILLA"/>
		<reference ref_id="1011287" ref_url="https://bugzilla.suse.com/1011287" source="BUGZILLA"/>
		<reference ref_id="1011288" ref_url="https://bugzilla.suse.com/1011288" source="BUGZILLA"/>
		<reference ref_id="1011289" ref_url="https://bugzilla.suse.com/1011289" source="BUGZILLA"/>
		<reference ref_id="1011290" ref_url="https://bugzilla.suse.com/1011290" source="BUGZILLA"/>
		<reference ref_id="1011291" ref_url="https://bugzilla.suse.com/1011291" source="BUGZILLA"/>
		<reference ref_id="1011292" ref_url="https://bugzilla.suse.com/1011292" source="BUGZILLA"/>
		<reference ref_id="1011293" ref_url="https://bugzilla.suse.com/1011293" source="BUGZILLA"/>
		<reference ref_id="1012020" ref_url="https://bugzilla.suse.com/1012020" source="BUGZILLA"/>
		<reference ref_id="1012021" ref_url="https://bugzilla.suse.com/1012021" source="BUGZILLA"/>
		<reference ref_id="1012022" ref_url="https://bugzilla.suse.com/1012022" source="BUGZILLA"/>
		<reference ref_id="1012023" ref_url="https://bugzilla.suse.com/1012023" source="BUGZILLA"/>
		<reference ref_id="1012024" ref_url="https://bugzilla.suse.com/1012024" source="BUGZILLA"/>
		<reference ref_id="1012025" ref_url="https://bugzilla.suse.com/1012025" source="BUGZILLA"/>
		<reference ref_id="1012026" ref_url="https://bugzilla.suse.com/1012026" source="BUGZILLA"/>
		<reference ref_id="1012027" ref_url="https://bugzilla.suse.com/1012027" source="BUGZILLA"/>
		<reference ref_id="1012028" ref_url="https://bugzilla.suse.com/1012028" source="BUGZILLA"/>
		<reference ref_id="1012029" ref_url="https://bugzilla.suse.com/1012029" source="BUGZILLA"/>
		<reference ref_id="1012030" ref_url="https://bugzilla.suse.com/1012030" source="BUGZILLA"/>
		<reference ref_id="1012031" ref_url="https://bugzilla.suse.com/1012031" source="BUGZILLA"/>
		<reference ref_id="1012032" ref_url="https://bugzilla.suse.com/1012032" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2074" ref_url="https://www.suse.com/security/cve/CVE-2010-2074/" source="CVE"/>
		<reference ref_id="CVE-2016-9422" ref_url="https://www.suse.com/security/cve/CVE-2016-9422/" source="CVE"/>
		<reference ref_id="CVE-2016-9423" ref_url="https://www.suse.com/security/cve/CVE-2016-9423/" source="CVE"/>
		<reference ref_id="CVE-2016-9424" ref_url="https://www.suse.com/security/cve/CVE-2016-9424/" source="CVE"/>
		<reference ref_id="CVE-2016-9425" ref_url="https://www.suse.com/security/cve/CVE-2016-9425/" source="CVE"/>
		<reference ref_id="CVE-2016-9434" ref_url="https://www.suse.com/security/cve/CVE-2016-9434/" source="CVE"/>
		<reference ref_id="CVE-2016-9435" ref_url="https://www.suse.com/security/cve/CVE-2016-9435/" source="CVE"/>
		<reference ref_id="CVE-2016-9436" ref_url="https://www.suse.com/security/cve/CVE-2016-9436/" source="CVE"/>
		<reference ref_id="CVE-2016-9437" ref_url="https://www.suse.com/security/cve/CVE-2016-9437/" source="CVE"/>
		<reference ref_id="CVE-2016-9438" ref_url="https://www.suse.com/security/cve/CVE-2016-9438/" source="CVE"/>
		<reference ref_id="CVE-2016-9439" ref_url="https://www.suse.com/security/cve/CVE-2016-9439/" source="CVE"/>
		<reference ref_id="CVE-2016-9440" ref_url="https://www.suse.com/security/cve/CVE-2016-9440/" source="CVE"/>
		<reference ref_id="CVE-2016-9441" ref_url="https://www.suse.com/security/cve/CVE-2016-9441/" source="CVE"/>
		<reference ref_id="CVE-2016-9442" ref_url="https://www.suse.com/security/cve/CVE-2016-9442/" source="CVE"/>
		<reference ref_id="CVE-2016-9443" ref_url="https://www.suse.com/security/cve/CVE-2016-9443/" source="CVE"/>
		<reference ref_id="CVE-2016-9621" ref_url="https://www.suse.com/security/cve/CVE-2016-9621/" source="CVE"/>
		<reference ref_id="CVE-2016-9622" ref_url="https://www.suse.com/security/cve/CVE-2016-9622/" source="CVE"/>
		<reference ref_id="CVE-2016-9623" ref_url="https://www.suse.com/security/cve/CVE-2016-9623/" source="CVE"/>
		<reference ref_id="CVE-2016-9624" ref_url="https://www.suse.com/security/cve/CVE-2016-9624/" source="CVE"/>
		<reference ref_id="CVE-2016-9625" ref_url="https://www.suse.com/security/cve/CVE-2016-9625/" source="CVE"/>
		<reference ref_id="CVE-2016-9626" ref_url="https://www.suse.com/security/cve/CVE-2016-9626/" source="CVE"/>
		<reference ref_id="CVE-2016-9627" ref_url="https://www.suse.com/security/cve/CVE-2016-9627/" source="CVE"/>
		<reference ref_id="CVE-2016-9628" ref_url="https://www.suse.com/security/cve/CVE-2016-9628/" source="CVE"/>
		<reference ref_id="CVE-2016-9629" ref_url="https://www.suse.com/security/cve/CVE-2016-9629/" source="CVE"/>
		<reference ref_id="CVE-2016-9630" ref_url="https://www.suse.com/security/cve/CVE-2016-9630/" source="CVE"/>
		<reference ref_id="CVE-2016-9631" ref_url="https://www.suse.com/security/cve/CVE-2016-9631/" source="CVE"/>
		<reference ref_id="CVE-2016-9632" ref_url="https://www.suse.com/security/cve/CVE-2016-9632/" source="CVE"/>
		<reference ref_id="CVE-2016-9633" ref_url="https://www.suse.com/security/cve/CVE-2016-9633/" source="CVE"/>
		<description>

This update for w3m fixes the following issues:

- update to debian git version (bsc#1011293)
  addressed security issues:
         CVE-2016-9621: w3m: global-buffer-overflow write (bsc#1012020)
         CVE-2016-9622: w3m: null deref (bsc#1012021)
         CVE-2016-9623: w3m: null deref (bsc#1012022)
         CVE-2016-9624: w3m: near-null deref (bsc#1012023)
         CVE-2016-9625: w3m: stack overflow (bsc#1012024)
         CVE-2016-9626: w3m: stack overflow (bsc#1012025)
         CVE-2016-9627: w3m: heap overflow read + deref (bsc#1012026)
         CVE-2016-9628: w3m: null deref (bsc#1012027)
         CVE-2016-9629: w3m: null deref (bsc#1012028)
         CVE-2016-9630: w3m: global-buffer-overflow read (bsc#1012029)
         CVE-2016-9631: w3m: null deref (bsc#1012030)
         CVE-2016-9632: w3m: global-buffer-overflow read (bsc#1012031)
         CVE-2016-9633: w3m: OOM (bsc#1012032)
         CVE-2016-9434: w3m: null deref (bsc#1011283)
         CVE-2016-9435: w3m: use uninit value (bsc#1011284)
         CVE-2016-9436: w3m: use uninit value (bsc#1011285)
         CVE-2016-9437: w3m: write to rodata (bsc#1011286)
         CVE-2016-9438: w3m: null deref (bsc#1011287)
         CVE-2016-9439: w3m: stack overflow (bsc#1011288)
         CVE-2016-9440: w3m: near-null deref (bsc#1011289)
         CVE-2016-9441: w3m: near-null deref (bsc#1011290)
         CVE-2016-9442: w3m: potential heap buffer corruption (bsc#1011291)
         CVE-2016-9443: w3m: null deref (bsc#1011292)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-07"/>
	<updated date="2016-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011269">SUSE bug 1011269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011270">SUSE bug 1011270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011271">SUSE bug 1011271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011272">SUSE bug 1011272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011283">SUSE bug 1011283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011284">SUSE bug 1011284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011285">SUSE bug 1011285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011286">SUSE bug 1011286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011287">SUSE bug 1011287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011288">SUSE bug 1011288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011289">SUSE bug 1011289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011290">SUSE bug 1011290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011291">SUSE bug 1011291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011292">SUSE bug 1011292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012020">SUSE bug 1012020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012021">SUSE bug 1012021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012022">SUSE bug 1012022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012023">SUSE bug 1012023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012024">SUSE bug 1012024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012025">SUSE bug 1012025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012026">SUSE bug 1012026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012027">SUSE bug 1012027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012028">SUSE bug 1012028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012029">SUSE bug 1012029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012030">SUSE bug 1012030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012031">SUSE bug 1012031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012032">SUSE bug 1012032</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2074/">CVE-2010-2074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2074">CVE-2010-2074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9422/">CVE-2016-9422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9422">CVE-2016-9422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9423/">CVE-2016-9423 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9423">CVE-2016-9423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9424/">CVE-2016-9424 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9424">CVE-2016-9424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9425/">CVE-2016-9425 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9425">CVE-2016-9425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9434/">CVE-2016-9434 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9434">CVE-2016-9434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9435/">CVE-2016-9435 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9435">CVE-2016-9435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9436/">CVE-2016-9436 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9436">CVE-2016-9436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9437/">CVE-2016-9437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9437">CVE-2016-9437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9438/">CVE-2016-9438 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9438">CVE-2016-9438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9439/">CVE-2016-9439 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9439">CVE-2016-9439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9440/">CVE-2016-9440 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9440">CVE-2016-9440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9441/">CVE-2016-9441 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9441">CVE-2016-9441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9442/">CVE-2016-9442 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9442">CVE-2016-9442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9443/">CVE-2016-9443 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9443">CVE-2016-9443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9621/">CVE-2016-9621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-9621">CVE-2016-9621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9622/">CVE-2016-9622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9622">CVE-2016-9622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9623/">CVE-2016-9623 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9623">CVE-2016-9623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9624/">CVE-2016-9624 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9624">CVE-2016-9624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9625/">CVE-2016-9625 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9625">CVE-2016-9625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9626/">CVE-2016-9626 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9626">CVE-2016-9626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9627/">CVE-2016-9627 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9627">CVE-2016-9627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9628/">CVE-2016-9628 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9628">CVE-2016-9628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9629/">CVE-2016-9629 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9629">CVE-2016-9629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9630/">CVE-2016-9630 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9630">CVE-2016-9630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9631/">CVE-2016-9631 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9631">CVE-2016-9631 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9632/">CVE-2016-9632 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9632">CVE-2016-9632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9633/">CVE-2016-9633 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9633">CVE-2016-9633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575344" comment="w3m-0.5.3.git20161120-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217865" version="1" class="patch">
	<metadata>
		<title>Security update for w3m (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1077559" ref_url="https://bugzilla.suse.com/1077559" source="BUGZILLA"/>
		<reference ref_id="1077568" ref_url="https://bugzilla.suse.com/1077568" source="BUGZILLA"/>
		<reference ref_id="1077572" ref_url="https://bugzilla.suse.com/1077572" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6196" ref_url="https://www.suse.com/security/cve/CVE-2018-6196/" source="CVE"/>
		<reference ref_id="CVE-2018-6197" ref_url="https://www.suse.com/security/cve/CVE-2018-6197/" source="CVE"/>
		<reference ref_id="CVE-2018-6198" ref_url="https://www.suse.com/security/cve/CVE-2018-6198/" source="CVE"/>
		<description>
This update for w3m fixes several issues.

These security issues were fixed:

- CVE-2018-6196: Prevent infinite recursion in HTMLlineproc0 caused by the feed_table_block_tag function which did not prevent a negative indent value (bsc#1077559)
- CVE-2018-6197: Prevent NULL pointer dereference in formUpdateBuffer (bsc#1077568)
- CVE-2018-6198: w3m did not properly handle temporary files when the ~/.w3m directory is unwritable, which allowed a local attacker to craft a symlink attack to overwrite arbitrary files (bsc#1077572)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-03"/>
	<updated date="2020-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077559">SUSE bug 1077559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077568">SUSE bug 1077568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077572">SUSE bug 1077572</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6196/">CVE-2018-6196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6196">CVE-2018-6196 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6197/">CVE-2018-6197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6197">CVE-2018-6197 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6198/">CVE-2018-6198 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6198">CVE-2018-6198 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575345" comment="w3m-0.5.3.git20161120-5.3.37 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217866" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1021483" ref_url="https://bugzilla.suse.com/1021483" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10169" ref_url="https://www.suse.com/security/cve/CVE-2016-10169/" source="CVE"/>
		<reference ref_id="CVE-2016-10170" ref_url="https://www.suse.com/security/cve/CVE-2016-10170/" source="CVE"/>
		<reference ref_id="CVE-2016-10171" ref_url="https://www.suse.com/security/cve/CVE-2016-10171/" source="CVE"/>
		<reference ref_id="CVE-2016-10172" ref_url="https://www.suse.com/security/cve/CVE-2016-10172/" source="CVE"/>
		<description>
This update for wavpack fixes the following issues:

- CVE-2016-10169 CVE-2016-10170 CVE-2016-10171 CVE-2016-10172: Make sure upper and lower boundaries make sense, to avoid out of bounds memory reads that could lead to crashes or disclosing memory. (bsc#1021483)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-05"/>
	<updated date="2018-03-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1021483">SUSE bug 1021483</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10169/">CVE-2016-10169 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10169">CVE-2016-10169 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10170/">CVE-2016-10170 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10170">CVE-2016-10170 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10171/">CVE-2016-10171 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10171">CVE-2016-10171 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10172/">CVE-2016-10172 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10172">CVE-2016-10172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575346" comment="libwavpack1-4.50.1-1.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217867" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1120930" ref_url="https://bugzilla.suse.com/1120930" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19840" ref_url="https://www.suse.com/security/cve/CVE-2018-19840/" source="CVE"/>
		<description>
This update for wavpack fixes the following issues:

Security issues fixed:

- CVE-2018-19840: Fixed a denial-of-service in the WavpackPackInit function from pack_utils.c (bsc#1120930)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120930">SUSE bug 1120930</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19840/">CVE-2018-19840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19840">CVE-2018-19840 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575347" comment="libwavpack1-4.50.1-1.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217868" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1180414" ref_url="https://bugzilla.suse.com/1180414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35738" ref_url="https://www.suse.com/security/cve/CVE-2020-35738/" source="CVE"/>
		<description>
This update for wavpack fixes the following issues:

- CVE-2020-35738: Fixed an out-of-bounds write in WavpackPackSamples (bsc#1180414). 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-19"/>
	<updated date="2021-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180414">SUSE bug 1180414</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35738/">CVE-2020-35738 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35738">CVE-2020-35738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575348" comment="libwavpack1-4.50.1-1.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217869" version="1" class="patch">
	<metadata>
		<title>Security update for wget</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="885069" ref_url="https://bugzilla.suse.com/885069" source="BUGZILLA"/>
		<reference ref_id="901276" ref_url="https://bugzilla.suse.com/901276" source="BUGZILLA"/>
		<reference ref_id="902709" ref_url="https://bugzilla.suse.com/902709" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4877" ref_url="https://www.suse.com/security/cve/CVE-2014-4877/" source="CVE"/>
		<description>

wget has been updated to fix one security issue and two non-security 
issues.

This security issue has been fixed:

    * FTP symlink arbitrary filesystem access (CVE-2014-4877).

These non-security issues have been fixed:

    * Fix displaying of download time (bnc#901276).
    * Fix 0 size FTP downloads after failure (bnc#885069).

Security Issues:

    * CVE-2014-4877
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-05"/>
	<updated date="2014-11-05"/>
	<bugzilla href="https://bugzilla.suse.com/885069">SUSE bug 885069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901276">SUSE bug 901276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902709">SUSE bug 902709</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4877/">CVE-2014-4877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4877">CVE-2014-4877 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575349" comment="wget-1.11.4-1.19.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575349" comment="wget-1.11.4-1.19.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217870" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="958342" ref_url="https://bugzilla.suse.com/958342" source="BUGZILLA"/>
		<reference ref_id="984060" ref_url="https://bugzilla.suse.com/984060" source="BUGZILLA"/>
		<reference ref_id="995964" ref_url="https://bugzilla.suse.com/995964" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4971" ref_url="https://www.suse.com/security/cve/CVE-2016-4971/" source="CVE"/>
		<reference ref_id="CVE-2016-7098" ref_url="https://www.suse.com/security/cve/CVE-2016-7098/" source="CVE"/>
		<description>

This update for wget fixes the following issues:

- CVE-2016-4971: A HTTP to FTP redirection file name confusion vulnerability was fixed.
  (bsc#984060).

- CVE-2016-7098: A potential race condition was fixed by creating files with .tmp ext
  and making them accessible to the current user only. (bsc#995964)

Bug fixed:
- Wget failed with basicauth: Failed writing HTTP request: Bad file descriptor
  (bsc#958342)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-23"/>
	<updated date="2016-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958342">SUSE bug 958342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984060">SUSE bug 984060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995964">SUSE bug 995964</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4971/">CVE-2016-4971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4971">CVE-2016-4971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7098/">CVE-2016-7098 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7098">CVE-2016-7098 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575350" comment="wget-1.11.4-1.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575351" comment="wget-openssl1-1.11.4-1.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217871" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1028301" ref_url="https://bugzilla.suse.com/1028301" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6508" ref_url="https://www.suse.com/security/cve/CVE-2017-6508/" source="CVE"/>
		<description>

This update for wget fixes the following issues:

Security issue fixed:
- CVE-2017-6508: (url_parse): Reject control characters in host part of URL (bsc#1028301).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-22"/>
	<updated date="2017-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1028301">SUSE bug 1028301</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6508/">CVE-2017-6508 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6508">CVE-2017-6508 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575352" comment="wget-1.11.4-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575353" comment="wget-openssl1-1.11.4-1.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217872" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1092061" ref_url="https://bugzilla.suse.com/1092061" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0494" ref_url="https://www.suse.com/security/cve/CVE-2018-0494/" source="CVE"/>
		<description>
This update for wget fixes the following issues:

- CVE-2018-0494: Fixed Cookie injection vulnerability by checking for
  and joining continuation lines. (bsc#1092061)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092061">SUSE bug 1092061</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0494/">CVE-2018-0494 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0494">CVE-2018-0494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575354" comment="wget-1.11.4-1.41.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575355" comment="wget-openssl1-1.11.4-1.41.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217873" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="603251" ref_url="https://bugzilla.suse.com/603251" source="BUGZILLA"/>
		<reference ref_id="613487" ref_url="https://bugzilla.suse.com/613487" source="BUGZILLA"/>
		<reference ref_id="630599" ref_url="https://bugzilla.suse.com/630599" source="BUGZILLA"/>
		<reference ref_id="643078" ref_url="https://bugzilla.suse.com/643078" source="BUGZILLA"/>
		<reference ref_id="655448" ref_url="https://bugzilla.suse.com/655448" source="BUGZILLA"/>
		<reference ref_id="662029" ref_url="https://bugzilla.suse.com/662029" source="BUGZILLA"/>
		<reference ref_id="669908" ref_url="https://bugzilla.suse.com/669908" source="BUGZILLA"/>
		<reference ref_id="672916" ref_url="https://bugzilla.suse.com/672916" source="BUGZILLA"/>
		<reference ref_id="678567" ref_url="https://bugzilla.suse.com/678567" source="BUGZILLA"/>
		<reference ref_id="678568" ref_url="https://bugzilla.suse.com/678568" source="BUGZILLA"/>
		<reference ref_id="678569" ref_url="https://bugzilla.suse.com/678569" source="BUGZILLA"/>
		<reference ref_id="678571" ref_url="https://bugzilla.suse.com/678571" source="BUGZILLA"/>
		<reference ref_id="688109" ref_url="https://bugzilla.suse.com/688109" source="BUGZILLA"/>
		<reference ref_id="697516" ref_url="https://bugzilla.suse.com/697516" source="BUGZILLA"/>
		<reference ref_id="706728" ref_url="https://bugzilla.suse.com/706728" source="BUGZILLA"/>
		<reference ref_id="718032" ref_url="https://bugzilla.suse.com/718032" source="BUGZILLA"/>
		<reference ref_id="741187" ref_url="https://bugzilla.suse.com/741187" source="BUGZILLA"/>
		<reference ref_id="741188" ref_url="https://bugzilla.suse.com/741188" source="BUGZILLA"/>
		<reference ref_id="741190" ref_url="https://bugzilla.suse.com/741190" source="BUGZILLA"/>
		<reference ref_id="754474" ref_url="https://bugzilla.suse.com/754474" source="BUGZILLA"/>
		<reference ref_id="754476" ref_url="https://bugzilla.suse.com/754476" source="BUGZILLA"/>
		<reference ref_id="754477" ref_url="https://bugzilla.suse.com/754477" source="BUGZILLA"/>
		<reference ref_id="763855" ref_url="https://bugzilla.suse.com/763855" source="BUGZILLA"/>
		<reference ref_id="763857" ref_url="https://bugzilla.suse.com/763857" source="BUGZILLA"/>
		<reference ref_id="763859" ref_url="https://bugzilla.suse.com/763859" source="BUGZILLA"/>
		<reference ref_id="772738" ref_url="https://bugzilla.suse.com/772738" source="BUGZILLA"/>
		<reference ref_id="776083" ref_url="https://bugzilla.suse.com/776083" source="BUGZILLA"/>
		<reference ref_id="792005" ref_url="https://bugzilla.suse.com/792005" source="BUGZILLA"/>
		<reference ref_id="801131" ref_url="https://bugzilla.suse.com/801131" source="BUGZILLA"/>
		<reference ref_id="807942" ref_url="https://bugzilla.suse.com/807942" source="BUGZILLA"/>
		<reference ref_id="813217" ref_url="https://bugzilla.suse.com/813217" source="BUGZILLA"/>
		<reference ref_id="816517" ref_url="https://bugzilla.suse.com/816517" source="BUGZILLA"/>
		<reference ref_id="816887" ref_url="https://bugzilla.suse.com/816887" source="BUGZILLA"/>
		<reference ref_id="820973" ref_url="https://bugzilla.suse.com/820973" source="BUGZILLA"/>
		<reference ref_id="824900" ref_url="https://bugzilla.suse.com/824900" source="BUGZILLA"/>
		<reference ref_id="831718" ref_url="https://bugzilla.suse.com/831718" source="BUGZILLA"/>
		<reference ref_id="839607" ref_url="https://bugzilla.suse.com/839607" source="BUGZILLA"/>
		<reference ref_id="848738" ref_url="https://bugzilla.suse.com/848738" source="BUGZILLA"/>
		<reference ref_id="855980" ref_url="https://bugzilla.suse.com/855980" source="BUGZILLA"/>
		<reference ref_id="856495" ref_url="https://bugzilla.suse.com/856495" source="BUGZILLA"/>
		<reference ref_id="856496" ref_url="https://bugzilla.suse.com/856496" source="BUGZILLA"/>
		<reference ref_id="856498" ref_url="https://bugzilla.suse.com/856498" source="BUGZILLA"/>
		<reference ref_id="867485" ref_url="https://bugzilla.suse.com/867485" source="BUGZILLA"/>
		<reference ref_id="889854" ref_url="https://bugzilla.suse.com/889854" source="BUGZILLA"/>
		<reference ref_id="889899" ref_url="https://bugzilla.suse.com/889899" source="BUGZILLA"/>
		<reference ref_id="889900" ref_url="https://bugzilla.suse.com/889900" source="BUGZILLA"/>
		<reference ref_id="889901" ref_url="https://bugzilla.suse.com/889901" source="BUGZILLA"/>
		<reference ref_id="889906" ref_url="https://bugzilla.suse.com/889906" source="BUGZILLA"/>
		<reference ref_id="897055" ref_url="https://bugzilla.suse.com/897055" source="BUGZILLA"/>
		<reference ref_id="899303" ref_url="https://bugzilla.suse.com/899303" source="BUGZILLA"/>
		<reference ref_id="905245" ref_url="https://bugzilla.suse.com/905245" source="BUGZILLA"/>
		<reference ref_id="905246" ref_url="https://bugzilla.suse.com/905246" source="BUGZILLA"/>
		<reference ref_id="905247" ref_url="https://bugzilla.suse.com/905247" source="BUGZILLA"/>
		<reference ref_id="905248" ref_url="https://bugzilla.suse.com/905248" source="BUGZILLA"/>
		<reference ref_id="912365" ref_url="https://bugzilla.suse.com/912365" source="BUGZILLA"/>
		<reference ref_id="912368" ref_url="https://bugzilla.suse.com/912368" source="BUGZILLA"/>
		<reference ref_id="912369" ref_url="https://bugzilla.suse.com/912369" source="BUGZILLA"/>
		<reference ref_id="912370" ref_url="https://bugzilla.suse.com/912370" source="BUGZILLA"/>
		<reference ref_id="912372" ref_url="https://bugzilla.suse.com/912372" source="BUGZILLA"/>
		<reference ref_id="920696" ref_url="https://bugzilla.suse.com/920696" source="BUGZILLA"/>
		<reference ref_id="920697" ref_url="https://bugzilla.suse.com/920697" source="BUGZILLA"/>
		<reference ref_id="920699" ref_url="https://bugzilla.suse.com/920699" source="BUGZILLA"/>
		<reference ref_id="930691" ref_url="https://bugzilla.suse.com/930691" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-1455" ref_url="https://www.suse.com/security/cve/CVE-2010-1455/" source="CVE"/>
		<reference ref_id="CVE-2010-2283" ref_url="https://www.suse.com/security/cve/CVE-2010-2283/" source="CVE"/>
		<reference ref_id="CVE-2010-2284" ref_url="https://www.suse.com/security/cve/CVE-2010-2284/" source="CVE"/>
		<reference ref_id="CVE-2010-2285" ref_url="https://www.suse.com/security/cve/CVE-2010-2285/" source="CVE"/>
		<reference ref_id="CVE-2010-2286" ref_url="https://www.suse.com/security/cve/CVE-2010-2286/" source="CVE"/>
		<reference ref_id="CVE-2010-2287" ref_url="https://www.suse.com/security/cve/CVE-2010-2287/" source="CVE"/>
		<reference ref_id="CVE-2010-2992" ref_url="https://www.suse.com/security/cve/CVE-2010-2992/" source="CVE"/>
		<reference ref_id="CVE-2010-2993" ref_url="https://www.suse.com/security/cve/CVE-2010-2993/" source="CVE"/>
		<reference ref_id="CVE-2010-2994" ref_url="https://www.suse.com/security/cve/CVE-2010-2994/" source="CVE"/>
		<reference ref_id="CVE-2010-2995" ref_url="https://www.suse.com/security/cve/CVE-2010-2995/" source="CVE"/>
		<reference ref_id="CVE-2010-3445" ref_url="https://www.suse.com/security/cve/CVE-2010-3445/" source="CVE"/>
		<reference ref_id="CVE-2010-4300" ref_url="https://www.suse.com/security/cve/CVE-2010-4300/" source="CVE"/>
		<reference ref_id="CVE-2010-4301" ref_url="https://www.suse.com/security/cve/CVE-2010-4301/" source="CVE"/>
		<reference ref_id="CVE-2010-4538" ref_url="https://www.suse.com/security/cve/CVE-2010-4538/" source="CVE"/>
		<reference ref_id="CVE-2011-0444" ref_url="https://www.suse.com/security/cve/CVE-2011-0444/" source="CVE"/>
		<reference ref_id="CVE-2011-0445" ref_url="https://www.suse.com/security/cve/CVE-2011-0445/" source="CVE"/>
		<reference ref_id="CVE-2011-0538" ref_url="https://www.suse.com/security/cve/CVE-2011-0538/" source="CVE"/>
		<reference ref_id="CVE-2011-0713" ref_url="https://www.suse.com/security/cve/CVE-2011-0713/" source="CVE"/>
		<reference ref_id="CVE-2011-1138" ref_url="https://www.suse.com/security/cve/CVE-2011-1138/" source="CVE"/>
		<reference ref_id="CVE-2011-1139" ref_url="https://www.suse.com/security/cve/CVE-2011-1139/" source="CVE"/>
		<reference ref_id="CVE-2011-1140" ref_url="https://www.suse.com/security/cve/CVE-2011-1140/" source="CVE"/>
		<reference ref_id="CVE-2011-1143" ref_url="https://www.suse.com/security/cve/CVE-2011-1143/" source="CVE"/>
		<reference ref_id="CVE-2011-1590" ref_url="https://www.suse.com/security/cve/CVE-2011-1590/" source="CVE"/>
		<reference ref_id="CVE-2011-1591" ref_url="https://www.suse.com/security/cve/CVE-2011-1591/" source="CVE"/>
		<reference ref_id="CVE-2011-1592" ref_url="https://www.suse.com/security/cve/CVE-2011-1592/" source="CVE"/>
		<reference ref_id="CVE-2011-1957" ref_url="https://www.suse.com/security/cve/CVE-2011-1957/" source="CVE"/>
		<reference ref_id="CVE-2011-1958" ref_url="https://www.suse.com/security/cve/CVE-2011-1958/" source="CVE"/>
		<reference ref_id="CVE-2011-1959" ref_url="https://www.suse.com/security/cve/CVE-2011-1959/" source="CVE"/>
		<reference ref_id="CVE-2011-2174" ref_url="https://www.suse.com/security/cve/CVE-2011-2174/" source="CVE"/>
		<reference ref_id="CVE-2011-2175" ref_url="https://www.suse.com/security/cve/CVE-2011-2175/" source="CVE"/>
		<reference ref_id="CVE-2011-2597" ref_url="https://www.suse.com/security/cve/CVE-2011-2597/" source="CVE"/>
		<reference ref_id="CVE-2011-2698" ref_url="https://www.suse.com/security/cve/CVE-2011-2698/" source="CVE"/>
		<reference ref_id="CVE-2011-3266" ref_url="https://www.suse.com/security/cve/CVE-2011-3266/" source="CVE"/>
		<reference ref_id="CVE-2011-3360" ref_url="https://www.suse.com/security/cve/CVE-2011-3360/" source="CVE"/>
		<reference ref_id="CVE-2011-3483" ref_url="https://www.suse.com/security/cve/CVE-2011-3483/" source="CVE"/>
		<reference ref_id="CVE-2012-0041" ref_url="https://www.suse.com/security/cve/CVE-2012-0041/" source="CVE"/>
		<reference ref_id="CVE-2012-0042" ref_url="https://www.suse.com/security/cve/CVE-2012-0042/" source="CVE"/>
		<reference ref_id="CVE-2012-0043" ref_url="https://www.suse.com/security/cve/CVE-2012-0043/" source="CVE"/>
		<reference ref_id="CVE-2012-0066" ref_url="https://www.suse.com/security/cve/CVE-2012-0066/" source="CVE"/>
		<reference ref_id="CVE-2012-0067" ref_url="https://www.suse.com/security/cve/CVE-2012-0067/" source="CVE"/>
		<reference ref_id="CVE-2012-0068" ref_url="https://www.suse.com/security/cve/CVE-2012-0068/" source="CVE"/>
		<reference ref_id="CVE-2012-1593" ref_url="https://www.suse.com/security/cve/CVE-2012-1593/" source="CVE"/>
		<reference ref_id="CVE-2012-1595" ref_url="https://www.suse.com/security/cve/CVE-2012-1595/" source="CVE"/>
		<reference ref_id="CVE-2012-1596" ref_url="https://www.suse.com/security/cve/CVE-2012-1596/" source="CVE"/>
		<reference ref_id="CVE-2012-2392" ref_url="https://www.suse.com/security/cve/CVE-2012-2392/" source="CVE"/>
		<reference ref_id="CVE-2012-2393" ref_url="https://www.suse.com/security/cve/CVE-2012-2393/" source="CVE"/>
		<reference ref_id="CVE-2012-2394" ref_url="https://www.suse.com/security/cve/CVE-2012-2394/" source="CVE"/>
		<reference ref_id="CVE-2012-4048" ref_url="https://www.suse.com/security/cve/CVE-2012-4048/" source="CVE"/>
		<reference ref_id="CVE-2012-4049" ref_url="https://www.suse.com/security/cve/CVE-2012-4049/" source="CVE"/>
		<reference ref_id="CVE-2012-4285" ref_url="https://www.suse.com/security/cve/CVE-2012-4285/" source="CVE"/>
		<reference ref_id="CVE-2012-4288" ref_url="https://www.suse.com/security/cve/CVE-2012-4288/" source="CVE"/>
		<reference ref_id="CVE-2012-4289" ref_url="https://www.suse.com/security/cve/CVE-2012-4289/" source="CVE"/>
		<reference ref_id="CVE-2012-4290" ref_url="https://www.suse.com/security/cve/CVE-2012-4290/" source="CVE"/>
		<reference ref_id="CVE-2012-4291" ref_url="https://www.suse.com/security/cve/CVE-2012-4291/" source="CVE"/>
		<reference ref_id="CVE-2012-4292" ref_url="https://www.suse.com/security/cve/CVE-2012-4292/" source="CVE"/>
		<reference ref_id="CVE-2012-4293" ref_url="https://www.suse.com/security/cve/CVE-2012-4293/" source="CVE"/>
		<reference ref_id="CVE-2012-4296" ref_url="https://www.suse.com/security/cve/CVE-2012-4296/" source="CVE"/>
		<reference ref_id="CVE-2012-5592" ref_url="https://www.suse.com/security/cve/CVE-2012-5592/" source="CVE"/>
		<reference ref_id="CVE-2012-5593" ref_url="https://www.suse.com/security/cve/CVE-2012-5593/" source="CVE"/>
		<reference ref_id="CVE-2012-5594" ref_url="https://www.suse.com/security/cve/CVE-2012-5594/" source="CVE"/>
		<reference ref_id="CVE-2012-5595" ref_url="https://www.suse.com/security/cve/CVE-2012-5595/" source="CVE"/>
		<reference ref_id="CVE-2012-5596" ref_url="https://www.suse.com/security/cve/CVE-2012-5596/" source="CVE"/>
		<reference ref_id="CVE-2012-5597" ref_url="https://www.suse.com/security/cve/CVE-2012-5597/" source="CVE"/>
		<reference ref_id="CVE-2012-5598" ref_url="https://www.suse.com/security/cve/CVE-2012-5598/" source="CVE"/>
		<reference ref_id="CVE-2012-5599" ref_url="https://www.suse.com/security/cve/CVE-2012-5599/" source="CVE"/>
		<reference ref_id="CVE-2012-5600" ref_url="https://www.suse.com/security/cve/CVE-2012-5600/" source="CVE"/>
		<reference ref_id="CVE-2012-5601" ref_url="https://www.suse.com/security/cve/CVE-2012-5601/" source="CVE"/>
		<reference ref_id="CVE-2012-5602" ref_url="https://www.suse.com/security/cve/CVE-2012-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-1572" ref_url="https://www.suse.com/security/cve/CVE-2013-1572/" source="CVE"/>
		<reference ref_id="CVE-2013-1573" ref_url="https://www.suse.com/security/cve/CVE-2013-1573/" source="CVE"/>
		<reference ref_id="CVE-2013-1574" ref_url="https://www.suse.com/security/cve/CVE-2013-1574/" source="CVE"/>
		<reference ref_id="CVE-2013-1575" ref_url="https://www.suse.com/security/cve/CVE-2013-1575/" source="CVE"/>
		<reference ref_id="CVE-2013-1576" ref_url="https://www.suse.com/security/cve/CVE-2013-1576/" source="CVE"/>
		<reference ref_id="CVE-2013-1577" ref_url="https://www.suse.com/security/cve/CVE-2013-1577/" source="CVE"/>
		<reference ref_id="CVE-2013-1578" ref_url="https://www.suse.com/security/cve/CVE-2013-1578/" source="CVE"/>
		<reference ref_id="CVE-2013-1579" ref_url="https://www.suse.com/security/cve/CVE-2013-1579/" source="CVE"/>
		<reference ref_id="CVE-2013-1580" ref_url="https://www.suse.com/security/cve/CVE-2013-1580/" source="CVE"/>
		<reference ref_id="CVE-2013-1581" ref_url="https://www.suse.com/security/cve/CVE-2013-1581/" source="CVE"/>
		<reference ref_id="CVE-2013-1582" ref_url="https://www.suse.com/security/cve/CVE-2013-1582/" source="CVE"/>
		<reference ref_id="CVE-2013-1583" ref_url="https://www.suse.com/security/cve/CVE-2013-1583/" source="CVE"/>
		<reference ref_id="CVE-2013-1584" ref_url="https://www.suse.com/security/cve/CVE-2013-1584/" source="CVE"/>
		<reference ref_id="CVE-2013-1585" ref_url="https://www.suse.com/security/cve/CVE-2013-1585/" source="CVE"/>
		<reference ref_id="CVE-2013-1586" ref_url="https://www.suse.com/security/cve/CVE-2013-1586/" source="CVE"/>
		<reference ref_id="CVE-2013-1587" ref_url="https://www.suse.com/security/cve/CVE-2013-1587/" source="CVE"/>
		<reference ref_id="CVE-2013-1588" ref_url="https://www.suse.com/security/cve/CVE-2013-1588/" source="CVE"/>
		<reference ref_id="CVE-2013-1589" ref_url="https://www.suse.com/security/cve/CVE-2013-1589/" source="CVE"/>
		<reference ref_id="CVE-2013-1590" ref_url="https://www.suse.com/security/cve/CVE-2013-1590/" source="CVE"/>
		<reference ref_id="CVE-2013-2475" ref_url="https://www.suse.com/security/cve/CVE-2013-2475/" source="CVE"/>
		<reference ref_id="CVE-2013-2476" ref_url="https://www.suse.com/security/cve/CVE-2013-2476/" source="CVE"/>
		<reference ref_id="CVE-2013-2477" ref_url="https://www.suse.com/security/cve/CVE-2013-2477/" source="CVE"/>
		<reference ref_id="CVE-2013-2478" ref_url="https://www.suse.com/security/cve/CVE-2013-2478/" source="CVE"/>
		<reference ref_id="CVE-2013-2479" ref_url="https://www.suse.com/security/cve/CVE-2013-2479/" source="CVE"/>
		<reference ref_id="CVE-2013-2480" ref_url="https://www.suse.com/security/cve/CVE-2013-2480/" source="CVE"/>
		<reference ref_id="CVE-2013-2481" ref_url="https://www.suse.com/security/cve/CVE-2013-2481/" source="CVE"/>
		<reference ref_id="CVE-2013-2482" ref_url="https://www.suse.com/security/cve/CVE-2013-2482/" source="CVE"/>
		<reference ref_id="CVE-2013-2483" ref_url="https://www.suse.com/security/cve/CVE-2013-2483/" source="CVE"/>
		<reference ref_id="CVE-2013-2484" ref_url="https://www.suse.com/security/cve/CVE-2013-2484/" source="CVE"/>
		<reference ref_id="CVE-2013-2485" ref_url="https://www.suse.com/security/cve/CVE-2013-2485/" source="CVE"/>
		<reference ref_id="CVE-2013-2486" ref_url="https://www.suse.com/security/cve/CVE-2013-2486/" source="CVE"/>
		<reference ref_id="CVE-2013-2487" ref_url="https://www.suse.com/security/cve/CVE-2013-2487/" source="CVE"/>
		<reference ref_id="CVE-2013-2488" ref_url="https://www.suse.com/security/cve/CVE-2013-2488/" source="CVE"/>
		<reference ref_id="CVE-2013-3555" ref_url="https://www.suse.com/security/cve/CVE-2013-3555/" source="CVE"/>
		<reference ref_id="CVE-2013-3556" ref_url="https://www.suse.com/security/cve/CVE-2013-3556/" source="CVE"/>
		<reference ref_id="CVE-2013-3557" ref_url="https://www.suse.com/security/cve/CVE-2013-3557/" source="CVE"/>
		<reference ref_id="CVE-2013-3558" ref_url="https://www.suse.com/security/cve/CVE-2013-3558/" source="CVE"/>
		<reference ref_id="CVE-2013-3559" ref_url="https://www.suse.com/security/cve/CVE-2013-3559/" source="CVE"/>
		<reference ref_id="CVE-2013-3560" ref_url="https://www.suse.com/security/cve/CVE-2013-3560/" source="CVE"/>
		<reference ref_id="CVE-2013-3561" ref_url="https://www.suse.com/security/cve/CVE-2013-3561/" source="CVE"/>
		<reference ref_id="CVE-2013-3562" ref_url="https://www.suse.com/security/cve/CVE-2013-3562/" source="CVE"/>
		<reference ref_id="CVE-2013-4074" ref_url="https://www.suse.com/security/cve/CVE-2013-4074/" source="CVE"/>
		<reference ref_id="CVE-2013-4075" ref_url="https://www.suse.com/security/cve/CVE-2013-4075/" source="CVE"/>
		<reference ref_id="CVE-2013-4076" ref_url="https://www.suse.com/security/cve/CVE-2013-4076/" source="CVE"/>
		<reference ref_id="CVE-2013-4077" ref_url="https://www.suse.com/security/cve/CVE-2013-4077/" source="CVE"/>
		<reference ref_id="CVE-2013-4078" ref_url="https://www.suse.com/security/cve/CVE-2013-4078/" source="CVE"/>
		<reference ref_id="CVE-2013-4079" ref_url="https://www.suse.com/security/cve/CVE-2013-4079/" source="CVE"/>
		<reference ref_id="CVE-2013-4080" ref_url="https://www.suse.com/security/cve/CVE-2013-4080/" source="CVE"/>
		<reference ref_id="CVE-2013-4081" ref_url="https://www.suse.com/security/cve/CVE-2013-4081/" source="CVE"/>
		<reference ref_id="CVE-2013-4082" ref_url="https://www.suse.com/security/cve/CVE-2013-4082/" source="CVE"/>
		<reference ref_id="CVE-2013-4083" ref_url="https://www.suse.com/security/cve/CVE-2013-4083/" source="CVE"/>
		<reference ref_id="CVE-2013-4929" ref_url="https://www.suse.com/security/cve/CVE-2013-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-4930" ref_url="https://www.suse.com/security/cve/CVE-2013-4930/" source="CVE"/>
		<reference ref_id="CVE-2013-4931" ref_url="https://www.suse.com/security/cve/CVE-2013-4931/" source="CVE"/>
		<reference ref_id="CVE-2013-4932" ref_url="https://www.suse.com/security/cve/CVE-2013-4932/" source="CVE"/>
		<reference ref_id="CVE-2013-4933" ref_url="https://www.suse.com/security/cve/CVE-2013-4933/" source="CVE"/>
		<reference ref_id="CVE-2013-4934" ref_url="https://www.suse.com/security/cve/CVE-2013-4934/" source="CVE"/>
		<reference ref_id="CVE-2013-4935" ref_url="https://www.suse.com/security/cve/CVE-2013-4935/" source="CVE"/>
		<reference ref_id="CVE-2013-6336" ref_url="https://www.suse.com/security/cve/CVE-2013-6336/" source="CVE"/>
		<reference ref_id="CVE-2013-6337" ref_url="https://www.suse.com/security/cve/CVE-2013-6337/" source="CVE"/>
		<reference ref_id="CVE-2013-6338" ref_url="https://www.suse.com/security/cve/CVE-2013-6338/" source="CVE"/>
		<reference ref_id="CVE-2013-6339" ref_url="https://www.suse.com/security/cve/CVE-2013-6339/" source="CVE"/>
		<reference ref_id="CVE-2013-6340" ref_url="https://www.suse.com/security/cve/CVE-2013-6340/" source="CVE"/>
		<reference ref_id="CVE-2013-7112" ref_url="https://www.suse.com/security/cve/CVE-2013-7112/" source="CVE"/>
		<reference ref_id="CVE-2013-7113" ref_url="https://www.suse.com/security/cve/CVE-2013-7113/" source="CVE"/>
		<reference ref_id="CVE-2013-7114" ref_url="https://www.suse.com/security/cve/CVE-2013-7114/" source="CVE"/>
		<reference ref_id="CVE-2014-2281" ref_url="https://www.suse.com/security/cve/CVE-2014-2281/" source="CVE"/>
		<reference ref_id="CVE-2014-2282" ref_url="https://www.suse.com/security/cve/CVE-2014-2282/" source="CVE"/>
		<reference ref_id="CVE-2014-2283" ref_url="https://www.suse.com/security/cve/CVE-2014-2283/" source="CVE"/>
		<reference ref_id="CVE-2014-2299" ref_url="https://www.suse.com/security/cve/CVE-2014-2299/" source="CVE"/>
		<reference ref_id="CVE-2014-6421" ref_url="https://www.suse.com/security/cve/CVE-2014-6421/" source="CVE"/>
		<reference ref_id="CVE-2014-6422" ref_url="https://www.suse.com/security/cve/CVE-2014-6422/" source="CVE"/>
		<reference ref_id="CVE-2014-6423" ref_url="https://www.suse.com/security/cve/CVE-2014-6423/" source="CVE"/>
		<reference ref_id="CVE-2014-6424" ref_url="https://www.suse.com/security/cve/CVE-2014-6424/" source="CVE"/>
		<reference ref_id="CVE-2014-6427" ref_url="https://www.suse.com/security/cve/CVE-2014-6427/" source="CVE"/>
		<reference ref_id="CVE-2014-6428" ref_url="https://www.suse.com/security/cve/CVE-2014-6428/" source="CVE"/>
		<reference ref_id="CVE-2014-6429" ref_url="https://www.suse.com/security/cve/CVE-2014-6429/" source="CVE"/>
		<reference ref_id="CVE-2014-6430" ref_url="https://www.suse.com/security/cve/CVE-2014-6430/" source="CVE"/>
		<reference ref_id="CVE-2014-6431" ref_url="https://www.suse.com/security/cve/CVE-2014-6431/" source="CVE"/>
		<reference ref_id="CVE-2014-6432" ref_url="https://www.suse.com/security/cve/CVE-2014-6432/" source="CVE"/>
		<reference ref_id="CVE-2014-8710" ref_url="https://www.suse.com/security/cve/CVE-2014-8710/" source="CVE"/>
		<reference ref_id="CVE-2014-8711" ref_url="https://www.suse.com/security/cve/CVE-2014-8711/" source="CVE"/>
		<reference ref_id="CVE-2014-8712" ref_url="https://www.suse.com/security/cve/CVE-2014-8712/" source="CVE"/>
		<reference ref_id="CVE-2014-8713" ref_url="https://www.suse.com/security/cve/CVE-2014-8713/" source="CVE"/>
		<reference ref_id="CVE-2014-8714" ref_url="https://www.suse.com/security/cve/CVE-2014-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-0559" ref_url="https://www.suse.com/security/cve/CVE-2015-0559/" source="CVE"/>
		<reference ref_id="CVE-2015-0560" ref_url="https://www.suse.com/security/cve/CVE-2015-0560/" source="CVE"/>
		<reference ref_id="CVE-2015-0561" ref_url="https://www.suse.com/security/cve/CVE-2015-0561/" source="CVE"/>
		<reference ref_id="CVE-2015-0562" ref_url="https://www.suse.com/security/cve/CVE-2015-0562/" source="CVE"/>
		<reference ref_id="CVE-2015-0563" ref_url="https://www.suse.com/security/cve/CVE-2015-0563/" source="CVE"/>
		<reference ref_id="CVE-2015-0564" ref_url="https://www.suse.com/security/cve/CVE-2015-0564/" source="CVE"/>
		<reference ref_id="CVE-2015-2188" ref_url="https://www.suse.com/security/cve/CVE-2015-2188/" source="CVE"/>
		<reference ref_id="CVE-2015-2189" ref_url="https://www.suse.com/security/cve/CVE-2015-2189/" source="CVE"/>
		<reference ref_id="CVE-2015-2191" ref_url="https://www.suse.com/security/cve/CVE-2015-2191/" source="CVE"/>
		<reference ref_id="CVE-2015-3811" ref_url="https://www.suse.com/security/cve/CVE-2015-3811/" source="CVE"/>
		<reference ref_id="CVE-2015-3812" ref_url="https://www.suse.com/security/cve/CVE-2015-3812/" source="CVE"/>
		<reference ref_id="CVE-2015-3814" ref_url="https://www.suse.com/security/cve/CVE-2015-3814/" source="CVE"/>
		<description>

wireshark has been updated to version 1.10.11 to fix five security issues.

These security issues have been fixed:

    * SigComp UDVM buffer overflow (CVE-2014-8710).
    * AMQP dissector crash (CVE-2014-8711).
    * NCP dissector crashes (CVE-2014-8712, CVE-2014-8713).
    * TN5250 infinite loops (CVE-2014-8714).

This non-security issue was fixed: - enable zlib (bnc#899303).

Further bug fixes and updated protocol support are listed in:
https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html
&lt;https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html&gt;

Security Issues:

    * CVE-2014-8711
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711&gt;
    * CVE-2014-8710
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710&gt;
    * CVE-2014-8714
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714&gt;
    * CVE-2014-8712
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712&gt;
    * CVE-2014-8713
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-14"/>
	<updated date="2014-11-14"/>
	<bugzilla href="https://bugzilla.suse.com/603251">SUSE bug 603251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/613487">SUSE bug 613487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/630599">SUSE bug 630599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/643078">SUSE bug 643078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/655448">SUSE bug 655448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662029">SUSE bug 662029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/669908">SUSE bug 669908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/672916">SUSE bug 672916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/678567">SUSE bug 678567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/678568">SUSE bug 678568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/678569">SUSE bug 678569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/678571">SUSE bug 678571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/688109">SUSE bug 688109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/697516">SUSE bug 697516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/706728">SUSE bug 706728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/718032">SUSE bug 718032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/741187">SUSE bug 741187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/741188">SUSE bug 741188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/741190">SUSE bug 741190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754474">SUSE bug 754474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754476">SUSE bug 754476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754477">SUSE bug 754477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763855">SUSE bug 763855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763857">SUSE bug 763857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763859">SUSE bug 763859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772738">SUSE bug 772738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813217">SUSE bug 813217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816517">SUSE bug 816517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816887">SUSE bug 816887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824900">SUSE bug 824900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839607">SUSE bug 839607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848738">SUSE bug 848738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855980">SUSE bug 855980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856495">SUSE bug 856495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856496">SUSE bug 856496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856498">SUSE bug 856498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867485">SUSE bug 867485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889854">SUSE bug 889854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889899">SUSE bug 889899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889900">SUSE bug 889900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889901">SUSE bug 889901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889906">SUSE bug 889906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899303">SUSE bug 899303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905245">SUSE bug 905245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905246">SUSE bug 905246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905247">SUSE bug 905247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905248">SUSE bug 905248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912365">SUSE bug 912365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912368">SUSE bug 912368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912369">SUSE bug 912369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912370">SUSE bug 912370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912372">SUSE bug 912372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920696">SUSE bug 920696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920697">SUSE bug 920697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920699">SUSE bug 920699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930691">SUSE bug 930691</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1455/">CVE-2010-1455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1455">CVE-2010-1455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2283/">CVE-2010-2283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2283">CVE-2010-2283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2284/">CVE-2010-2284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2284">CVE-2010-2284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2285/">CVE-2010-2285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2285">CVE-2010-2285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2286/">CVE-2010-2286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2286">CVE-2010-2286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2287/">CVE-2010-2287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2287">CVE-2010-2287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2992/">CVE-2010-2992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2992">CVE-2010-2992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2993/">CVE-2010-2993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2993">CVE-2010-2993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2994/">CVE-2010-2994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2994">CVE-2010-2994 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2995/">CVE-2010-2995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2995">CVE-2010-2995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3445/">CVE-2010-3445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3445">CVE-2010-3445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4300/">CVE-2010-4300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4300">CVE-2010-4300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4301/">CVE-2010-4301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4301">CVE-2010-4301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4538/">CVE-2010-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4538">CVE-2010-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0444/">CVE-2011-0444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0444">CVE-2011-0444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0445/">CVE-2011-0445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0445">CVE-2011-0445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0538/">CVE-2011-0538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0538">CVE-2011-0538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0713/">CVE-2011-0713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0713">CVE-2011-0713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1138/">CVE-2011-1138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1138">CVE-2011-1138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1139/">CVE-2011-1139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1139">CVE-2011-1139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1140/">CVE-2011-1140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1140">CVE-2011-1140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1143/">CVE-2011-1143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1143">CVE-2011-1143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1590/">CVE-2011-1590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1590">CVE-2011-1590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1591/">CVE-2011-1591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1591">CVE-2011-1591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1592/">CVE-2011-1592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1592">CVE-2011-1592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1957/">CVE-2011-1957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1957">CVE-2011-1957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1958/">CVE-2011-1958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1958">CVE-2011-1958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1959/">CVE-2011-1959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1959">CVE-2011-1959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2174/">CVE-2011-2174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2174">CVE-2011-2174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2175/">CVE-2011-2175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2175">CVE-2011-2175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2597/">CVE-2011-2597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2597">CVE-2011-2597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2698/">CVE-2011-2698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2698">CVE-2011-2698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3266/">CVE-2011-3266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3266">CVE-2011-3266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3360/">CVE-2011-3360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3360">CVE-2011-3360 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3483/">CVE-2011-3483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3483">CVE-2011-3483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0041/">CVE-2012-0041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0041">CVE-2012-0041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0042/">CVE-2012-0042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0042">CVE-2012-0042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0043/">CVE-2012-0043 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0043">CVE-2012-0043 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0066/">CVE-2012-0066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0066">CVE-2012-0066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0067/">CVE-2012-0067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0067">CVE-2012-0067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0068/">CVE-2012-0068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0068">CVE-2012-0068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1593/">CVE-2012-1593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1593">CVE-2012-1593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1595/">CVE-2012-1595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1595">CVE-2012-1595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1596/">CVE-2012-1596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1596">CVE-2012-1596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2392/">CVE-2012-2392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2392">CVE-2012-2392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2393/">CVE-2012-2393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2393">CVE-2012-2393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2394/">CVE-2012-2394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2394">CVE-2012-2394 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4048/">CVE-2012-4048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4048">CVE-2012-4048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4049/">CVE-2012-4049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4049">CVE-2012-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4285/">CVE-2012-4285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4285">CVE-2012-4285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4288/">CVE-2012-4288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4288">CVE-2012-4288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4289/">CVE-2012-4289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4289">CVE-2012-4289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4290/">CVE-2012-4290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4290">CVE-2012-4290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4291/">CVE-2012-4291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4291">CVE-2012-4291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4292/">CVE-2012-4292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4292">CVE-2012-4292 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4293/">CVE-2012-4293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4293">CVE-2012-4293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4296/">CVE-2012-4296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4296">CVE-2012-4296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5592/">CVE-2012-5592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5592">CVE-2012-5592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5593/">CVE-2012-5593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5593">CVE-2012-5593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5594/">CVE-2012-5594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5594">CVE-2012-5594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5595/">CVE-2012-5595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5595">CVE-2012-5595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5596/">CVE-2012-5596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5596">CVE-2012-5596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5597/">CVE-2012-5597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5597">CVE-2012-5597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5598/">CVE-2012-5598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5598">CVE-2012-5598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5599/">CVE-2012-5599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5599">CVE-2012-5599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5600/">CVE-2012-5600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5600">CVE-2012-5600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5601/">CVE-2012-5601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5601">CVE-2012-5601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5602/">CVE-2012-5602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5602">CVE-2012-5602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1572/">CVE-2013-1572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1572">CVE-2013-1572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1573/">CVE-2013-1573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1573">CVE-2013-1573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1574/">CVE-2013-1574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1574">CVE-2013-1574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1575/">CVE-2013-1575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1575">CVE-2013-1575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1576/">CVE-2013-1576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1576">CVE-2013-1576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1577/">CVE-2013-1577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1577">CVE-2013-1577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1578/">CVE-2013-1578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1578">CVE-2013-1578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1579/">CVE-2013-1579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1579">CVE-2013-1579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1580/">CVE-2013-1580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1580">CVE-2013-1580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1581/">CVE-2013-1581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1581">CVE-2013-1581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1582/">CVE-2013-1582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1582">CVE-2013-1582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1583/">CVE-2013-1583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1583">CVE-2013-1583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1584/">CVE-2013-1584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1584">CVE-2013-1584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1585/">CVE-2013-1585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1585">CVE-2013-1585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1586/">CVE-2013-1586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1586">CVE-2013-1586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1587/">CVE-2013-1587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1587">CVE-2013-1587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1588/">CVE-2013-1588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1588">CVE-2013-1588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1589/">CVE-2013-1589 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1589">CVE-2013-1589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1590/">CVE-2013-1590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1590">CVE-2013-1590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2475/">CVE-2013-2475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2475">CVE-2013-2475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2476/">CVE-2013-2476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2476">CVE-2013-2476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2477/">CVE-2013-2477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2477">CVE-2013-2477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2478/">CVE-2013-2478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2478">CVE-2013-2478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2479/">CVE-2013-2479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2479">CVE-2013-2479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2480/">CVE-2013-2480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2480">CVE-2013-2480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2481/">CVE-2013-2481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2481">CVE-2013-2481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2482/">CVE-2013-2482 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2482">CVE-2013-2482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2483/">CVE-2013-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2483">CVE-2013-2483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2484/">CVE-2013-2484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2484">CVE-2013-2484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2485/">CVE-2013-2485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2485">CVE-2013-2485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2486/">CVE-2013-2486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2486">CVE-2013-2486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2487/">CVE-2013-2487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2487">CVE-2013-2487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2488/">CVE-2013-2488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2488">CVE-2013-2488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3555/">CVE-2013-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3555">CVE-2013-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3556/">CVE-2013-3556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3556">CVE-2013-3556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3557/">CVE-2013-3557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3557">CVE-2013-3557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3558/">CVE-2013-3558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3558">CVE-2013-3558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3559/">CVE-2013-3559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3559">CVE-2013-3559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3560/">CVE-2013-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3560">CVE-2013-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3561/">CVE-2013-3561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3561">CVE-2013-3561 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3562/">CVE-2013-3562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3562">CVE-2013-3562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4074/">CVE-2013-4074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4074">CVE-2013-4074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4075/">CVE-2013-4075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4075">CVE-2013-4075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4076/">CVE-2013-4076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4076">CVE-2013-4076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4077/">CVE-2013-4077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4077">CVE-2013-4077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4078/">CVE-2013-4078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4078">CVE-2013-4078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4079/">CVE-2013-4079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4079">CVE-2013-4079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4080/">CVE-2013-4080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4080">CVE-2013-4080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4081/">CVE-2013-4081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4081">CVE-2013-4081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4082/">CVE-2013-4082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4082">CVE-2013-4082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4083/">CVE-2013-4083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4083">CVE-2013-4083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4929/">CVE-2013-4929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4929">CVE-2013-4929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4930/">CVE-2013-4930 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4930">CVE-2013-4930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4931/">CVE-2013-4931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4931">CVE-2013-4931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4932/">CVE-2013-4932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4932">CVE-2013-4932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4933/">CVE-2013-4933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4933">CVE-2013-4933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4934/">CVE-2013-4934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4934">CVE-2013-4934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4935/">CVE-2013-4935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4935">CVE-2013-4935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6336/">CVE-2013-6336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6336">CVE-2013-6336 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6337/">CVE-2013-6337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6337">CVE-2013-6337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6338/">CVE-2013-6338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6338">CVE-2013-6338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6339/">CVE-2013-6339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6339">CVE-2013-6339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6340/">CVE-2013-6340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6340">CVE-2013-6340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7112/">CVE-2013-7112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7112">CVE-2013-7112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7113/">CVE-2013-7113 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7113">CVE-2013-7113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7114/">CVE-2013-7114 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7114">CVE-2013-7114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2281/">CVE-2014-2281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2281">CVE-2014-2281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2282/">CVE-2014-2282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2282">CVE-2014-2282 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2283/">CVE-2014-2283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2283">CVE-2014-2283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2299/">CVE-2014-2299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2299">CVE-2014-2299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6421/">CVE-2014-6421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6421">CVE-2014-6421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6422/">CVE-2014-6422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6422">CVE-2014-6422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6423/">CVE-2014-6423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6423">CVE-2014-6423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6424/">CVE-2014-6424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6424">CVE-2014-6424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6427/">CVE-2014-6427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6427">CVE-2014-6427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6428/">CVE-2014-6428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6428">CVE-2014-6428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6429/">CVE-2014-6429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6429">CVE-2014-6429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6430/">CVE-2014-6430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6430">CVE-2014-6430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6431/">CVE-2014-6431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6431">CVE-2014-6431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6432/">CVE-2014-6432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6432">CVE-2014-6432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8710/">CVE-2014-8710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8710">CVE-2014-8710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8711/">CVE-2014-8711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8711">CVE-2014-8711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8712/">CVE-2014-8712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8712">CVE-2014-8712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8713/">CVE-2014-8713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8713">CVE-2014-8713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8714/">CVE-2014-8714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8714">CVE-2014-8714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0559/">CVE-2015-0559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0559">CVE-2015-0559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0560/">CVE-2015-0560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0560">CVE-2015-0560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0561/">CVE-2015-0561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0561">CVE-2015-0561 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0562/">CVE-2015-0562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0562">CVE-2015-0562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0563/">CVE-2015-0563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0563">CVE-2015-0563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0564/">CVE-2015-0564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0564">CVE-2015-0564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2188/">CVE-2015-2188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2188">CVE-2015-2188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2189/">CVE-2015-2189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2189">CVE-2015-2189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2191/">CVE-2015-2191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2191">CVE-2015-2191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3811/">CVE-2015-3811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3811">CVE-2015-3811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3812/">CVE-2015-3812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3812">CVE-2015-3812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3814/">CVE-2015-3814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3814">CVE-2015-3814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992411" comment="wireshark-1.10.11-0.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217874" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="935158" ref_url="https://bugzilla.suse.com/935158" source="BUGZILLA"/>
		<reference ref_id="941500" ref_url="https://bugzilla.suse.com/941500" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813/" source="CVE"/>
		<reference ref_id="CVE-2015-4652" ref_url="https://www.suse.com/security/cve/CVE-2015-4652/" source="CVE"/>
		<reference ref_id="CVE-2015-6241" ref_url="https://www.suse.com/security/cve/CVE-2015-6241/" source="CVE"/>
		<reference ref_id="CVE-2015-6242" ref_url="https://www.suse.com/security/cve/CVE-2015-6242/" source="CVE"/>
		<reference ref_id="CVE-2015-6243" ref_url="https://www.suse.com/security/cve/CVE-2015-6243/" source="CVE"/>
		<reference ref_id="CVE-2015-6244" ref_url="https://www.suse.com/security/cve/CVE-2015-6244/" source="CVE"/>
		<reference ref_id="CVE-2015-6245" ref_url="https://www.suse.com/security/cve/CVE-2015-6245/" source="CVE"/>
		<reference ref_id="CVE-2015-6246" ref_url="https://www.suse.com/security/cve/CVE-2015-6246/" source="CVE"/>
		<reference ref_id="CVE-2015-6247" ref_url="https://www.suse.com/security/cve/CVE-2015-6247/" source="CVE"/>
		<reference ref_id="CVE-2015-6248" ref_url="https://www.suse.com/security/cve/CVE-2015-6248/" source="CVE"/>
		<reference ref_id="CVE-2015-6249" ref_url="https://www.suse.com/security/cve/CVE-2015-6249/" source="CVE"/>
		<description>

Wireshark has been updated to 1.12.7. (FATE#319388)

The following vulnerabilities have been fixed:
* Wireshark could crash when adding an item to the protocol tree. wnpa-sec-2015-21 CVE-2015-6241
* Wireshark could attempt to free invalid memory. wnpa-sec-2015-22 CVE-2015-6242
* Wireshark could crash when searching for a protocol dissector. wnpa-sec-2015-23 CVE-2015-6243
* The ZigBee dissector could crash. wnpa-sec-2015-24 CVE-2015-6244
* The GSM RLC/MAC dissector could go into an infinite loop. wnpa-sec-2015-25 CVE-2015-6245
* The WaveAgent dissector could crash. wnpa-sec-2015-26 CVE-2015-6246
* The OpenFlow dissector could go into an infinite loop. wnpa-sec-2015-27 CVE-2015-6247
* Wireshark could crash due to invalid ptvcursor length checking. wnpa-sec-2015-28 CVE-2015-6248
* The WCCP dissector could crash. wnpa-sec-2015-29 CVE-2015-6249
* Further bug fixes and updated protocol support as listed in:
    https://www.wireshark.org/docs/relnotes/wireshark-1.12.7.html 

Also a fix from 1.12.6 in GSM DTAP was backported. (bnc#935158 CVE-2015-4652)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-16"/>
	<updated date="2015-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935158">SUSE bug 935158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3813">CVE-2015-3813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4652/">CVE-2015-4652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4652">CVE-2015-4652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6241/">CVE-2015-6241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6241">CVE-2015-6241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6242/">CVE-2015-6242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6242">CVE-2015-6242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6243/">CVE-2015-6243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6243">CVE-2015-6243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6244/">CVE-2015-6244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6244">CVE-2015-6244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6245/">CVE-2015-6245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6245">CVE-2015-6245 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6246/">CVE-2015-6246 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6246">CVE-2015-6246 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6247/">CVE-2015-6247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6247">CVE-2015-6247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6248/">CVE-2015-6248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6248">CVE-2015-6248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6249/">CVE-2015-6249 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6249">CVE-2015-6249 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575357" comment="wireshark-1.12.7-0.5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217875" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="950437" ref_url="https://bugzilla.suse.com/950437" source="BUGZILLA"/>
		<reference ref_id="960382" ref_url="https://bugzilla.suse.com/960382" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7830" ref_url="https://www.suse.com/security/cve/CVE-2015-7830/" source="CVE"/>
		<reference ref_id="CVE-2015-8711" ref_url="https://www.suse.com/security/cve/CVE-2015-8711/" source="CVE"/>
		<reference ref_id="CVE-2015-8712" ref_url="https://www.suse.com/security/cve/CVE-2015-8712/" source="CVE"/>
		<reference ref_id="CVE-2015-8713" ref_url="https://www.suse.com/security/cve/CVE-2015-8713/" source="CVE"/>
		<reference ref_id="CVE-2015-8714" ref_url="https://www.suse.com/security/cve/CVE-2015-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-8715" ref_url="https://www.suse.com/security/cve/CVE-2015-8715/" source="CVE"/>
		<reference ref_id="CVE-2015-8716" ref_url="https://www.suse.com/security/cve/CVE-2015-8716/" source="CVE"/>
		<reference ref_id="CVE-2015-8717" ref_url="https://www.suse.com/security/cve/CVE-2015-8717/" source="CVE"/>
		<reference ref_id="CVE-2015-8718" ref_url="https://www.suse.com/security/cve/CVE-2015-8718/" source="CVE"/>
		<reference ref_id="CVE-2015-8719" ref_url="https://www.suse.com/security/cve/CVE-2015-8719/" source="CVE"/>
		<reference ref_id="CVE-2015-8720" ref_url="https://www.suse.com/security/cve/CVE-2015-8720/" source="CVE"/>
		<reference ref_id="CVE-2015-8721" ref_url="https://www.suse.com/security/cve/CVE-2015-8721/" source="CVE"/>
		<reference ref_id="CVE-2015-8722" ref_url="https://www.suse.com/security/cve/CVE-2015-8722/" source="CVE"/>
		<reference ref_id="CVE-2015-8723" ref_url="https://www.suse.com/security/cve/CVE-2015-8723/" source="CVE"/>
		<reference ref_id="CVE-2015-8724" ref_url="https://www.suse.com/security/cve/CVE-2015-8724/" source="CVE"/>
		<reference ref_id="CVE-2015-8725" ref_url="https://www.suse.com/security/cve/CVE-2015-8725/" source="CVE"/>
		<reference ref_id="CVE-2015-8726" ref_url="https://www.suse.com/security/cve/CVE-2015-8726/" source="CVE"/>
		<reference ref_id="CVE-2015-8727" ref_url="https://www.suse.com/security/cve/CVE-2015-8727/" source="CVE"/>
		<reference ref_id="CVE-2015-8728" ref_url="https://www.suse.com/security/cve/CVE-2015-8728/" source="CVE"/>
		<reference ref_id="CVE-2015-8729" ref_url="https://www.suse.com/security/cve/CVE-2015-8729/" source="CVE"/>
		<reference ref_id="CVE-2015-8730" ref_url="https://www.suse.com/security/cve/CVE-2015-8730/" source="CVE"/>
		<reference ref_id="CVE-2015-8731" ref_url="https://www.suse.com/security/cve/CVE-2015-8731/" source="CVE"/>
		<reference ref_id="CVE-2015-8732" ref_url="https://www.suse.com/security/cve/CVE-2015-8732/" source="CVE"/>
		<reference ref_id="CVE-2015-8733" ref_url="https://www.suse.com/security/cve/CVE-2015-8733/" source="CVE"/>
		<description>

This update contains Wireshark 1.12.9 and fixes the following issues:

* CVE-2015-7830: pcapng file parser could crash while copying an interface filter (bsc#950437)
* CVE-2015-8711: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate conversation data, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
* CVE-2015-8712: The dissect_hsdsch_channel_info function in epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not validate the number of PDUs, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8713: epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not properly reserve memory for channel ID mappings, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.
* CVE-2015-8714: The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8715: epan/dissectors/packet-alljoyn.c in the AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does not check for empty arguments, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
* CVE-2015-8716: The init_t38_info_conv function in epan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x before 1.12.9 does not ensure that a conversation exists, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8717: The dissect_sdp function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.12.x before 1.12.9 does not prevent use of a negative media count, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8718: Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the 'Match MSG/RES packets for async NLM' option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8719: The dissect_dns_answer function in epan/dissectors/packet-dns.c in the DNS dissector in Wireshark 1.12.x before 1.12.9 mishandles the EDNS0 Client Subnet option, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8720: The dissect_ber_GeneralizedTime function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8721: Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression.
* CVE-2015-8722: epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the frame pointer, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
* CVE-2015-8723: The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted
* CVE-2015-8724: The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not verify the WPA broadcast key length, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8725: The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
* CVE-2015-8726: wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
* CVE-2015-8727: The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not properly maintain request-key data, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.
* CVE-2015-8728: The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function, which allows remote attackers to cause a denial of service (buffer overflow and application crash) via a crafted packet.
* CVE-2015-8729: The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
* CVE-2015-8730: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet.
* CVE-2015-8731: The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8732: The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8733: The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-13"/>
	<updated date="2016-01-13"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/950437">SUSE bug 950437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7830/">CVE-2015-7830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7830">CVE-2015-7830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8711/">CVE-2015-8711 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8711">CVE-2015-8711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8712/">CVE-2015-8712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8712">CVE-2015-8712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8713/">CVE-2015-8713 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8713">CVE-2015-8713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8714/">CVE-2015-8714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8714">CVE-2015-8714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8715/">CVE-2015-8715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8715">CVE-2015-8715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8716/">CVE-2015-8716 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8716">CVE-2015-8716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8717/">CVE-2015-8717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8717">CVE-2015-8717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8718/">CVE-2015-8718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8718">CVE-2015-8718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8719/">CVE-2015-8719 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8719">CVE-2015-8719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8720/">CVE-2015-8720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8720">CVE-2015-8720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8721/">CVE-2015-8721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8721">CVE-2015-8721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8722/">CVE-2015-8722 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8722">CVE-2015-8722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8723/">CVE-2015-8723 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8723">CVE-2015-8723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8724/">CVE-2015-8724 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8724">CVE-2015-8724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8725/">CVE-2015-8725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8725">CVE-2015-8725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8726/">CVE-2015-8726 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8726">CVE-2015-8726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8727/">CVE-2015-8727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8727">CVE-2015-8727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8728/">CVE-2015-8728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8728">CVE-2015-8728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8729/">CVE-2015-8729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8729">CVE-2015-8729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8730/">CVE-2015-8730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8730">CVE-2015-8730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8731/">CVE-2015-8731 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8731">CVE-2015-8731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8732/">CVE-2015-8732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8732">CVE-2015-8732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8733/">CVE-2015-8733 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8733">CVE-2015-8733 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575358" comment="wireshark-1.12.9-0.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217876" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="968565" ref_url="https://bugzilla.suse.com/968565" source="BUGZILLA"/>
		<reference ref_id="976944" ref_url="https://bugzilla.suse.com/976944" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2523" ref_url="https://www.suse.com/security/cve/CVE-2016-2523/" source="CVE"/>
		<reference ref_id="CVE-2016-2530" ref_url="https://www.suse.com/security/cve/CVE-2016-2530/" source="CVE"/>
		<reference ref_id="CVE-2016-2531" ref_url="https://www.suse.com/security/cve/CVE-2016-2531/" source="CVE"/>
		<reference ref_id="CVE-2016-2532" ref_url="https://www.suse.com/security/cve/CVE-2016-2532/" source="CVE"/>
		<description>
This update to Wireshark 1 12.11 fixes a number issues in protocol dissectors that could have allowed a remote attacker to crash Wireshark or cause excessive CPU usage through specially crafted packages inserted into the network or a capture file.

- The PKTC dissector could crash (wnpa-sec-2016-22)
- The PKTC dissector could crash (wnpa-sec-2016-23)
- The IAX2 dissector could go into an infinite loop (wnpa-sec-2016-24)
- Wireshark and TShark could exhaust the stack (wnpa-sec-2016-25) 
- The GSM CBCH dissector could crash (wnpa-sec-2016-26)
- The NCP dissector could crash (wnpa-sec-2016-28)
- CVE-2016-2523: DNP dissector infinite loop (wnpa-sec-2016-03)
- CVE-2016-2530: RSL dissector crash (wnpa-sec-2016-10)
- CVE-2016-2531: RSL dissector crash (wnpa-sec-2016-10)
- CVE-2016-2532: LLRP dissector crash (wnpa-sec-2016-11)
- GSM A-bis OML dissector crash (wnpa-sec-2016-14)
- ASN.1 BER dissector crash (wnpa-sec-2016-15)
- ASN.1 BER dissector crash (wnpa-sec-2016-18) 

Also containsfurther bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-1.12.11.html 
https://www.wireshark.org/docs/relnotes/wireshark-1.12.10.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-18"/>
	<updated date="2016-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/968565">SUSE bug 968565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976944">SUSE bug 976944</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2523/">CVE-2016-2523 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2523">CVE-2016-2523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2530/">CVE-2016-2530 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2530">CVE-2016-2530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2531/">CVE-2016-2531 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2531">CVE-2016-2531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2532/">CVE-2016-2532 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2532">CVE-2016-2532 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575359" comment="wireshark-1.12.11-0.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217877" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="983671" ref_url="https://bugzilla.suse.com/983671" source="BUGZILLA"/>
		<reference ref_id="991012" ref_url="https://bugzilla.suse.com/991012" source="BUGZILLA"/>
		<reference ref_id="991013" ref_url="https://bugzilla.suse.com/991013" source="BUGZILLA"/>
		<reference ref_id="991015" ref_url="https://bugzilla.suse.com/991015" source="BUGZILLA"/>
		<reference ref_id="991016" ref_url="https://bugzilla.suse.com/991016" source="BUGZILLA"/>
		<reference ref_id="991017" ref_url="https://bugzilla.suse.com/991017" source="BUGZILLA"/>
		<reference ref_id="991018" ref_url="https://bugzilla.suse.com/991018" source="BUGZILLA"/>
		<reference ref_id="991019" ref_url="https://bugzilla.suse.com/991019" source="BUGZILLA"/>
		<reference ref_id="991020" ref_url="https://bugzilla.suse.com/991020" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5350" ref_url="https://www.suse.com/security/cve/CVE-2016-5350/" source="CVE"/>
		<reference ref_id="CVE-2016-5351" ref_url="https://www.suse.com/security/cve/CVE-2016-5351/" source="CVE"/>
		<reference ref_id="CVE-2016-5352" ref_url="https://www.suse.com/security/cve/CVE-2016-5352/" source="CVE"/>
		<reference ref_id="CVE-2016-5353" ref_url="https://www.suse.com/security/cve/CVE-2016-5353/" source="CVE"/>
		<reference ref_id="CVE-2016-5354" ref_url="https://www.suse.com/security/cve/CVE-2016-5354/" source="CVE"/>
		<reference ref_id="CVE-2016-5355" ref_url="https://www.suse.com/security/cve/CVE-2016-5355/" source="CVE"/>
		<reference ref_id="CVE-2016-5356" ref_url="https://www.suse.com/security/cve/CVE-2016-5356/" source="CVE"/>
		<reference ref_id="CVE-2016-5357" ref_url="https://www.suse.com/security/cve/CVE-2016-5357/" source="CVE"/>
		<reference ref_id="CVE-2016-5358" ref_url="https://www.suse.com/security/cve/CVE-2016-5358/" source="CVE"/>
		<reference ref_id="CVE-2016-5359" ref_url="https://www.suse.com/security/cve/CVE-2016-5359/" source="CVE"/>
		<reference ref_id="CVE-2016-6504" ref_url="https://www.suse.com/security/cve/CVE-2016-6504/" source="CVE"/>
		<reference ref_id="CVE-2016-6505" ref_url="https://www.suse.com/security/cve/CVE-2016-6505/" source="CVE"/>
		<reference ref_id="CVE-2016-6506" ref_url="https://www.suse.com/security/cve/CVE-2016-6506/" source="CVE"/>
		<reference ref_id="CVE-2016-6507" ref_url="https://www.suse.com/security/cve/CVE-2016-6507/" source="CVE"/>
		<reference ref_id="CVE-2016-6508" ref_url="https://www.suse.com/security/cve/CVE-2016-6508/" source="CVE"/>
		<reference ref_id="CVE-2016-6509" ref_url="https://www.suse.com/security/cve/CVE-2016-6509/" source="CVE"/>
		<reference ref_id="CVE-2016-6510" ref_url="https://www.suse.com/security/cve/CVE-2016-6510/" source="CVE"/>
		<reference ref_id="CVE-2016-6511" ref_url="https://www.suse.com/security/cve/CVE-2016-6511/" source="CVE"/>
		<description>

This update to wireshark 1.12.13 fixes the following issues:

 - CVE-2016-6504: wireshark: NDS dissector crash (bsc#991012)
 - CVE-2016-6505: wireshark: PacketBB dissector could divide by zero (bsc#991013)
 - CVE-2016-6506: wireshark: WSP infinite loop (bsc#991015)
 - CVE-2016-6507: wireshark: MMSE infinite loop (bsc#991016)
 - CVE-2016-6508: wireshark: RLC long loop (bsc#991017)
 - CVE-2016-6509: wireshark: LDSS dissector crash (bsc#991018)
 - CVE-2016-6510: wireshark: RLC dissector crash (bsc#991019)
 - CVE-2016-6511: wireshark: OpenFlow long loop (bnc991020)
 - CVE-2016-5350: SPOOLS infinite loop (bsc#983671)
 - CVE-2016-5351: IEEE 802.11 dissector crash (bsc#983671)
 - CVE-2016-5352: IEEE 802.11 dissector crash, different from wpna-sec-2016-30 (bsc#983671)
 - CVE-2016-5353: UMTS FP crash (bsc#983671)
 - CVE-2016-5354: USB dissector crash (bsc#983671)
 - CVE-2016-5355: Toshiba file parser crash (bsc#983671)
 - CVE-2016-5356: CoSine file parser crash (bsc#983671)
 - CVE-2016-5357: NetScreen file parser crash (bsc#983671)
 - CVE-2016-5358: Ethernet dissector crash (bsc#983671)
 - CVE-2016-5359: WBXML infinite loop (bsc#983671)

For more details please see:
  https://www.wireshark.org/docs/relnotes/wireshark-1.12.12.html
  https://www.wireshark.org/docs/relnotes/wireshark-1.12.13.html

		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-02"/>
	<updated date="2016-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991012">SUSE bug 991012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991013">SUSE bug 991013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991015">SUSE bug 991015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991016">SUSE bug 991016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991017">SUSE bug 991017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991018">SUSE bug 991018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991019">SUSE bug 991019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991020">SUSE bug 991020</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5350/">CVE-2016-5350 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5350">CVE-2016-5350 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5351/">CVE-2016-5351 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5351">CVE-2016-5351 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5352/">CVE-2016-5352 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5352">CVE-2016-5352 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5353/">CVE-2016-5353 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5353">CVE-2016-5353 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5354/">CVE-2016-5354 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5354">CVE-2016-5354 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5355/">CVE-2016-5355 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5355">CVE-2016-5355 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5356/">CVE-2016-5356 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5356">CVE-2016-5356 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5357/">CVE-2016-5357 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5357">CVE-2016-5357 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5358/">CVE-2016-5358 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5358">CVE-2016-5358 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5359/">CVE-2016-5359 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5359">CVE-2016-5359 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6504/">CVE-2016-6504 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6504">CVE-2016-6504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6505/">CVE-2016-6505 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6505">CVE-2016-6505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6506/">CVE-2016-6506 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6506">CVE-2016-6506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6507/">CVE-2016-6507 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6507">CVE-2016-6507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6508/">CVE-2016-6508 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6508">CVE-2016-6508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6509/">CVE-2016-6509 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6509">CVE-2016-6509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6510/">CVE-2016-6510 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6510">CVE-2016-6510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6511/">CVE-2016-6511 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6511">CVE-2016-6511 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575360" comment="wireshark-1.12.13-0.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217878" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1002981" ref_url="https://bugzilla.suse.com/1002981" source="BUGZILLA"/>
		<reference ref_id="1010735" ref_url="https://bugzilla.suse.com/1010735" source="BUGZILLA"/>
		<reference ref_id="1010740" ref_url="https://bugzilla.suse.com/1010740" source="BUGZILLA"/>
		<reference ref_id="1010752" ref_url="https://bugzilla.suse.com/1010752" source="BUGZILLA"/>
		<reference ref_id="1010754" ref_url="https://bugzilla.suse.com/1010754" source="BUGZILLA"/>
		<reference ref_id="1010911" ref_url="https://bugzilla.suse.com/1010911" source="BUGZILLA"/>
		<reference ref_id="1021739" ref_url="https://bugzilla.suse.com/1021739" source="BUGZILLA"/>
		<reference ref_id="1025913" ref_url="https://bugzilla.suse.com/1025913" source="BUGZILLA"/>
		<reference ref_id="1027998" ref_url="https://bugzilla.suse.com/1027998" source="BUGZILLA"/>
		<reference ref_id="1033936" ref_url="https://bugzilla.suse.com/1033936" source="BUGZILLA"/>
		<reference ref_id="1033937" ref_url="https://bugzilla.suse.com/1033937" source="BUGZILLA"/>
		<reference ref_id="1033938" ref_url="https://bugzilla.suse.com/1033938" source="BUGZILLA"/>
		<reference ref_id="1033939" ref_url="https://bugzilla.suse.com/1033939" source="BUGZILLA"/>
		<reference ref_id="1033940" ref_url="https://bugzilla.suse.com/1033940" source="BUGZILLA"/>
		<reference ref_id="1033941" ref_url="https://bugzilla.suse.com/1033941" source="BUGZILLA"/>
		<reference ref_id="1033942" ref_url="https://bugzilla.suse.com/1033942" source="BUGZILLA"/>
		<reference ref_id="1033943" ref_url="https://bugzilla.suse.com/1033943" source="BUGZILLA"/>
		<reference ref_id="1033944" ref_url="https://bugzilla.suse.com/1033944" source="BUGZILLA"/>
		<reference ref_id="1033945" ref_url="https://bugzilla.suse.com/1033945" source="BUGZILLA"/>
		<reference ref_id="998761" ref_url="https://bugzilla.suse.com/998761" source="BUGZILLA"/>
		<reference ref_id="998762" ref_url="https://bugzilla.suse.com/998762" source="BUGZILLA"/>
		<reference ref_id="998763" ref_url="https://bugzilla.suse.com/998763" source="BUGZILLA"/>
		<reference ref_id="998800" ref_url="https://bugzilla.suse.com/998800" source="BUGZILLA"/>
		<reference ref_id="998963" ref_url="https://bugzilla.suse.com/998963" source="BUGZILLA"/>
		<reference ref_id="998964" ref_url="https://bugzilla.suse.com/998964" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7175" ref_url="https://www.suse.com/security/cve/CVE-2016-7175/" source="CVE"/>
		<reference ref_id="CVE-2016-7176" ref_url="https://www.suse.com/security/cve/CVE-2016-7176/" source="CVE"/>
		<reference ref_id="CVE-2016-7177" ref_url="https://www.suse.com/security/cve/CVE-2016-7177/" source="CVE"/>
		<reference ref_id="CVE-2016-7178" ref_url="https://www.suse.com/security/cve/CVE-2016-7178/" source="CVE"/>
		<reference ref_id="CVE-2016-7179" ref_url="https://www.suse.com/security/cve/CVE-2016-7179/" source="CVE"/>
		<reference ref_id="CVE-2016-7180" ref_url="https://www.suse.com/security/cve/CVE-2016-7180/" source="CVE"/>
		<reference ref_id="CVE-2016-9373" ref_url="https://www.suse.com/security/cve/CVE-2016-9373/" source="CVE"/>
		<reference ref_id="CVE-2016-9374" ref_url="https://www.suse.com/security/cve/CVE-2016-9374/" source="CVE"/>
		<reference ref_id="CVE-2016-9375" ref_url="https://www.suse.com/security/cve/CVE-2016-9375/" source="CVE"/>
		<reference ref_id="CVE-2016-9376" ref_url="https://www.suse.com/security/cve/CVE-2016-9376/" source="CVE"/>
		<reference ref_id="CVE-2017-5596" ref_url="https://www.suse.com/security/cve/CVE-2017-5596/" source="CVE"/>
		<reference ref_id="CVE-2017-5597" ref_url="https://www.suse.com/security/cve/CVE-2017-5597/" source="CVE"/>
		<reference ref_id="CVE-2017-6014" ref_url="https://www.suse.com/security/cve/CVE-2017-6014/" source="CVE"/>
		<reference ref_id="CVE-2017-7700" ref_url="https://www.suse.com/security/cve/CVE-2017-7700/" source="CVE"/>
		<reference ref_id="CVE-2017-7701" ref_url="https://www.suse.com/security/cve/CVE-2017-7701/" source="CVE"/>
		<reference ref_id="CVE-2017-7702" ref_url="https://www.suse.com/security/cve/CVE-2017-7702/" source="CVE"/>
		<reference ref_id="CVE-2017-7703" ref_url="https://www.suse.com/security/cve/CVE-2017-7703/" source="CVE"/>
		<reference ref_id="CVE-2017-7704" ref_url="https://www.suse.com/security/cve/CVE-2017-7704/" source="CVE"/>
		<reference ref_id="CVE-2017-7705" ref_url="https://www.suse.com/security/cve/CVE-2017-7705/" source="CVE"/>
		<reference ref_id="CVE-2017-7745" ref_url="https://www.suse.com/security/cve/CVE-2017-7745/" source="CVE"/>
		<reference ref_id="CVE-2017-7746" ref_url="https://www.suse.com/security/cve/CVE-2017-7746/" source="CVE"/>
		<reference ref_id="CVE-2017-7747" ref_url="https://www.suse.com/security/cve/CVE-2017-7747/" source="CVE"/>
		<reference ref_id="CVE-2017-7748" ref_url="https://www.suse.com/security/cve/CVE-2017-7748/" source="CVE"/>
		<description>

Wireshark was updated to version 2.0.12, which brings several new features, enhancements
and bug fixes.

These security issues were fixed:

- CVE-2017-7700: In Wireshark the NetScaler file parser could go into an infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by ensuring a nonzero record size (bsc#1033936).
- CVE-2017-7701: In Wireshark the BGP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-bgp.c by using a different integer data type (bsc#1033937).
- CVE-2017-7702: In Wireshark the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding length validation (bsc#1033938).
- CVE-2017-7703: In Wireshark the IMAP dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-imap.c by calculating a line's end correctly (bsc#1033939).
- CVE-2017-7704: In Wireshark the DOF dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dof.c by using a different integer data type and adjusting a return value (bsc#1033940).
- CVE-2017-7705: In Wireshark the RPC over RDMA dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-rpcrdma.c by correctly checking for going beyond the maximum offset (bsc#1033941).
- CVE-2017-7745: In Wireshark the SIGCOMP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-sigcomp.c by correcting a memory-size check (bsc#1033942).
- CVE-2017-7746: In Wireshark the SLSK dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-slsk.c by adding checks for the remaining length (bsc#1033943).
- CVE-2017-7747: In Wireshark the PacketBB dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-packetbb.c by restricting additions to the protocol tree (bsc#1033944).
- CVE-2017-7748: In Wireshark the WSP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wsp.c by adding a length check (bsc#1033945).
- CVE-2016-7179: Stack-based buffer overflow in epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#998963).
- CVE-2016-9376: In Wireshark the OpenFlow dissector could crash with memory exhaustion, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-openflow_v5.c by ensuring that certain length values were sufficiently large (bsc#1010735).
- CVE-2016-9375: In Wireshark the DTN dissector could go into an infinite loop, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dtn.c by checking whether SDNV evaluation was successful (bsc#1010740).
- CVE-2016-9374: In Wireshark the AllJoyn dissector could crash with a buffer over-read, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-alljoyn.c by ensuring that a length variable properly tracked the state of a signature variable (bsc#1010752).
- CVE-2016-9373: In Wireshark the DCERPC dissector could crash with a use-after-free, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dcerpc-nt.c and epan/dissectors/packet-dcerpc-spoolss.c by using the wmem file scope for private strings (bsc#1010754).
- CVE-2016-7175: epan/dissectors/packet-qnet6.c in the QNX6 QNET dissector in Wireshark mishandled MAC address data, which allowed remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet (bsc#998761).
- CVE-2016-7176: epan/dissectors/packet-h225.c in the H.225 dissector in Wireshark called snprintf with one of its input buffers as the output buffer, which allowed remote attackers to cause a denial of service (copy overlap and application crash) via a crafted packet (bsc#998762).
- CVE-2016-7177: epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark did not restrict the number of channels, which allowed remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet (bsc#998763).
- CVE-2016-7180: epan/dissectors/packet-ipmi-trace.c in the IPMI trace dissector in Wireshark did not properly consider whether a string is constant, which allowed remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet (bsc#998800).
- CVE-2016-7178: epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark did not ensure that memory is allocated for certain data structures, which allowed remote attackers to cause a denial of service (invalid write access and application crash) via a crafted packet (bsc#998964).
- CVE-2017-6014: In Wireshark a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory (bsc#1025913).
- CVE-2017-5596: In Wireshark the ASTERIX dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-asterix.c by changing a data type to avoid an integer overflow (bsc#1021739).
- CVE-2017-5597: In Wireshark the DHCPv6 dissector could go into a large loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dhcpv6.c by changing a data type to avoid an integer overflow (bsc#1021739).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-04"/>
	<updated date="2017-05-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002981">SUSE bug 1002981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010735">SUSE bug 1010735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010740">SUSE bug 1010740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010752">SUSE bug 1010752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010754">SUSE bug 1010754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010911">SUSE bug 1010911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021739">SUSE bug 1021739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025913">SUSE bug 1025913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027998">SUSE bug 1027998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033936">SUSE bug 1033936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033937">SUSE bug 1033937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033938">SUSE bug 1033938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033939">SUSE bug 1033939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033940">SUSE bug 1033940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033941">SUSE bug 1033941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033942">SUSE bug 1033942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033943">SUSE bug 1033943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033944">SUSE bug 1033944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033945">SUSE bug 1033945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998761">SUSE bug 998761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998762">SUSE bug 998762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998763">SUSE bug 998763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998800">SUSE bug 998800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998963">SUSE bug 998963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998964">SUSE bug 998964</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7175/">CVE-2016-7175 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7175">CVE-2016-7175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7176/">CVE-2016-7176 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7176">CVE-2016-7176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7177/">CVE-2016-7177 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7177">CVE-2016-7177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7178/">CVE-2016-7178 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7178">CVE-2016-7178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7179/">CVE-2016-7179 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7179">CVE-2016-7179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7180/">CVE-2016-7180 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7180">CVE-2016-7180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9373/">CVE-2016-9373 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9373">CVE-2016-9373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9374/">CVE-2016-9374 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9374">CVE-2016-9374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9375/">CVE-2016-9375 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9375">CVE-2016-9375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9376/">CVE-2016-9376 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9376">CVE-2016-9376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5596/">CVE-2017-5596 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5596">CVE-2017-5596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5597/">CVE-2017-5597 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5597">CVE-2017-5597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6014/">CVE-2017-6014 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6014">CVE-2017-6014 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7700/">CVE-2017-7700 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7700">CVE-2017-7700 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7701/">CVE-2017-7701 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7701">CVE-2017-7701 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7702/">CVE-2017-7702 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7702">CVE-2017-7702 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7703/">CVE-2017-7703 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7703">CVE-2017-7703 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7704/">CVE-2017-7704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7704">CVE-2017-7704 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7705/">CVE-2017-7705 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7705">CVE-2017-7705 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7745/">CVE-2017-7745 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7745">CVE-2017-7745 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7746/">CVE-2017-7746 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7746">CVE-2017-7746 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7747/">CVE-2017-7747 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7747">CVE-2017-7747 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7748/">CVE-2017-7748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7748">CVE-2017-7748 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575361" comment="libcares2-1.7.4-7.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575362" comment="wireshark-2.0.12-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575363" comment="wireshark-gtk-2.0.12-36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217879" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1042298" ref_url="https://bugzilla.suse.com/1042298" source="BUGZILLA"/>
		<reference ref_id="1042299" ref_url="https://bugzilla.suse.com/1042299" source="BUGZILLA"/>
		<reference ref_id="1042300" ref_url="https://bugzilla.suse.com/1042300" source="BUGZILLA"/>
		<reference ref_id="1042301" ref_url="https://bugzilla.suse.com/1042301" source="BUGZILLA"/>
		<reference ref_id="1042302" ref_url="https://bugzilla.suse.com/1042302" source="BUGZILLA"/>
		<reference ref_id="1042303" ref_url="https://bugzilla.suse.com/1042303" source="BUGZILLA"/>
		<reference ref_id="1042304" ref_url="https://bugzilla.suse.com/1042304" source="BUGZILLA"/>
		<reference ref_id="1042305" ref_url="https://bugzilla.suse.com/1042305" source="BUGZILLA"/>
		<reference ref_id="1042306" ref_url="https://bugzilla.suse.com/1042306" source="BUGZILLA"/>
		<reference ref_id="1042307" ref_url="https://bugzilla.suse.com/1042307" source="BUGZILLA"/>
		<reference ref_id="1042308" ref_url="https://bugzilla.suse.com/1042308" source="BUGZILLA"/>
		<reference ref_id="1042309" ref_url="https://bugzilla.suse.com/1042309" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9343" ref_url="https://www.suse.com/security/cve/CVE-2017-9343/" source="CVE"/>
		<reference ref_id="CVE-2017-9344" ref_url="https://www.suse.com/security/cve/CVE-2017-9344/" source="CVE"/>
		<reference ref_id="CVE-2017-9345" ref_url="https://www.suse.com/security/cve/CVE-2017-9345/" source="CVE"/>
		<reference ref_id="CVE-2017-9346" ref_url="https://www.suse.com/security/cve/CVE-2017-9346/" source="CVE"/>
		<reference ref_id="CVE-2017-9347" ref_url="https://www.suse.com/security/cve/CVE-2017-9347/" source="CVE"/>
		<reference ref_id="CVE-2017-9348" ref_url="https://www.suse.com/security/cve/CVE-2017-9348/" source="CVE"/>
		<reference ref_id="CVE-2017-9349" ref_url="https://www.suse.com/security/cve/CVE-2017-9349/" source="CVE"/>
		<reference ref_id="CVE-2017-9350" ref_url="https://www.suse.com/security/cve/CVE-2017-9350/" source="CVE"/>
		<reference ref_id="CVE-2017-9351" ref_url="https://www.suse.com/security/cve/CVE-2017-9351/" source="CVE"/>
		<reference ref_id="CVE-2017-9352" ref_url="https://www.suse.com/security/cve/CVE-2017-9352/" source="CVE"/>
		<reference ref_id="CVE-2017-9353" ref_url="https://www.suse.com/security/cve/CVE-2017-9353/" source="CVE"/>
		<reference ref_id="CVE-2017-9354" ref_url="https://www.suse.com/security/cve/CVE-2017-9354/" source="CVE"/>
		<description>
The network analysis tool wireshark was updated to version 2.0.13 to fix the following issues:

* CVE-2017-9352: Bazaar dissector infinite loop (wnpa-sec-2017-22) (bsc#1042304)
* CVE-2017-9348: DOF dissector read overflow (wnpa-sec-2017-23) (bsc#1042303)
* CVE-2017-9351: DHCP dissector read overflow (wnpa-sec-2017-24) (bsc#1042302)
* CVE-2017-9346: SoulSeek dissector infinite loop (wnpa-sec-2017-25) (bsc#1042301)
* CVE-2017-9345: DNS dissector infinite loop (wnpa-sec-2017-26) (bsc#1042300)
* CVE-2017-9349: DICOM dissector infinite loop (wnpa-sec-2017-27) (bsc#1042305)
* CVE-2017-9350: openSAFETY dissector memory exh.. (wnpa-sec-2017-28) (bsc#1042299)
* CVE-2017-9344: BT L2CAP dissector divide by zero (wnpa-sec-2017-29) (bsc#1042298)
* CVE-2017-9343: MSNIP dissector crash (wnpa-sec-2017-30) (bsc#1042309)
* CVE-2017-9347: ROS dissector crash (wnpa-sec-2017-31) (bsc#1042308)
* CVE-2017-9354: RGMP dissector crash (wnpa-sec-2017-32) (bsc#1042307)
* CVE-2017-9353: wireshark: IPv6 dissector crash (wnpa-sec-2017-33) (bsc#1042306)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-23"/>
	<updated date="2017-06-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042298">SUSE bug 1042298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042299">SUSE bug 1042299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042300">SUSE bug 1042300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042301">SUSE bug 1042301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042302">SUSE bug 1042302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042303">SUSE bug 1042303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042304">SUSE bug 1042304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042305">SUSE bug 1042305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042306">SUSE bug 1042306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042307">SUSE bug 1042307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042308">SUSE bug 1042308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042309">SUSE bug 1042309</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9343/">CVE-2017-9343 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9343">CVE-2017-9343 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9344/">CVE-2017-9344 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9344">CVE-2017-9344 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9345/">CVE-2017-9345 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9345">CVE-2017-9345 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9346/">CVE-2017-9346 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9346">CVE-2017-9346 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9347/">CVE-2017-9347 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9347">CVE-2017-9347 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9348/">CVE-2017-9348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9348">CVE-2017-9348 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9349/">CVE-2017-9349 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9349">CVE-2017-9349 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9350/">CVE-2017-9350 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9350">CVE-2017-9350 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9351/">CVE-2017-9351 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9351">CVE-2017-9351 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9352/">CVE-2017-9352 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9352">CVE-2017-9352 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9353/">CVE-2017-9353 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9353">CVE-2017-9353 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9354/">CVE-2017-9354 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9354">CVE-2017-9354 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575364" comment="wireshark-2.0.13-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575365" comment="wireshark-gtk-2.0.13-39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217880" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1049255" ref_url="https://bugzilla.suse.com/1049255" source="BUGZILLA"/>
		<reference ref_id="1049621" ref_url="https://bugzilla.suse.com/1049621" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11406" ref_url="https://www.suse.com/security/cve/CVE-2017-11406/" source="CVE"/>
		<reference ref_id="CVE-2017-11407" ref_url="https://www.suse.com/security/cve/CVE-2017-11407/" source="CVE"/>
		<reference ref_id="CVE-2017-11408" ref_url="https://www.suse.com/security/cve/CVE-2017-11408/" source="CVE"/>
		<reference ref_id="CVE-2017-11410" ref_url="https://www.suse.com/security/cve/CVE-2017-11410/" source="CVE"/>
		<reference ref_id="CVE-2017-11411" ref_url="https://www.suse.com/security/cve/CVE-2017-11411/" source="CVE"/>
		<description>
This wireshark update to version 2.2.8 fixes the following issues:

Security issues fixed:
- CVE-2017-11411: The openSAFETY dissectorcould crash or exhaust system memory because of missing
  length validation. (bsc#1049621)
- CVE-2017-11410: The WBXML dissector could go into an infinite loop. (bsc#1049255)
- CVE-2017-11408: The AMQP dissector could crash. (bsc#1049255)
- CVE-2017-11407: The MQ dissector could crash. (bsc#1049255)
- CVE-2017-11406: The DOCSIS dissector could go into an infinite loop. (bsc#1049255)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-03"/>
	<updated date="2017-08-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049621">SUSE bug 1049621</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11406/">CVE-2017-11406 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11406">CVE-2017-11406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11407/">CVE-2017-11407 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11407">CVE-2017-11407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11408/">CVE-2017-11408 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11408">CVE-2017-11408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11410/">CVE-2017-11410 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11410">CVE-2017-11410 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11411/">CVE-2017-11411 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11411">CVE-2017-11411 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575366" comment="wireshark-2.0.14-40.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575367" comment="wireshark-gtk-2.0.14-40.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217881" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1044417" ref_url="https://bugzilla.suse.com/1044417" source="BUGZILLA"/>
		<reference ref_id="1045341" ref_url="https://bugzilla.suse.com/1045341" source="BUGZILLA"/>
		<reference ref_id="1056248" ref_url="https://bugzilla.suse.com/1056248" source="BUGZILLA"/>
		<reference ref_id="1056249" ref_url="https://bugzilla.suse.com/1056249" source="BUGZILLA"/>
		<reference ref_id="1056251" ref_url="https://bugzilla.suse.com/1056251" source="BUGZILLA"/>
		<reference ref_id="1062645" ref_url="https://bugzilla.suse.com/1062645" source="BUGZILLA"/>
		<reference ref_id="1070727" ref_url="https://bugzilla.suse.com/1070727" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13765" ref_url="https://www.suse.com/security/cve/CVE-2017-13765/" source="CVE"/>
		<reference ref_id="CVE-2017-13766" ref_url="https://www.suse.com/security/cve/CVE-2017-13766/" source="CVE"/>
		<reference ref_id="CVE-2017-13767" ref_url="https://www.suse.com/security/cve/CVE-2017-13767/" source="CVE"/>
		<reference ref_id="CVE-2017-15191" ref_url="https://www.suse.com/security/cve/CVE-2017-15191/" source="CVE"/>
		<reference ref_id="CVE-2017-15192" ref_url="https://www.suse.com/security/cve/CVE-2017-15192/" source="CVE"/>
		<reference ref_id="CVE-2017-15193" ref_url="https://www.suse.com/security/cve/CVE-2017-15193/" source="CVE"/>
		<reference ref_id="CVE-2017-17083" ref_url="https://www.suse.com/security/cve/CVE-2017-17083/" source="CVE"/>
		<reference ref_id="CVE-2017-17084" ref_url="https://www.suse.com/security/cve/CVE-2017-17084/" source="CVE"/>
		<reference ref_id="CVE-2017-17085" ref_url="https://www.suse.com/security/cve/CVE-2017-17085/" source="CVE"/>
		<reference ref_id="CVE-2017-9617" ref_url="https://www.suse.com/security/cve/CVE-2017-9617/" source="CVE"/>
		<reference ref_id="CVE-2017-9766" ref_url="https://www.suse.com/security/cve/CVE-2017-9766/" source="CVE"/>
		<description>

  
This update for wireshark to version 2.2.11 fixes several issues.

These security issues were fixed:

- CVE-2017-13767: The MSDP dissector could have gone into an infinite loop.
  This was addressed by adding length validation (bsc#1056248)
- CVE-2017-13766: The Profinet I/O dissector could have crash with an
  out-of-bounds write. This was addressed by adding string validation
  (bsc#1056249)
- CVE-2017-13765: The IrCOMM dissector had a buffer over-read and application
  crash. This was addressed by adding length validation (bsc#1056251)
- CVE-2017-9766: PROFINET IO data with a high recursion depth allowed remote
  attackers to cause a denial of service (stack exhaustion) in the
  dissect_IODWriteReq function (bsc#1045341)
- CVE-2017-9617: Deeply nested DAAP data may have cause stack exhaustion
  (uncontrolled recursion) in the dissect_daap_one_tag function in the DAAP
  dissector (bsc#1044417)
- CVE-2017-15192: The BT ATT dissector could crash. This was addressed
  in epan/dissectors/packet-btatt.c by considering a case where not all
  of the BTATT packets have the same encapsulation level. (bsc#1062645)
- CVE-2017-15193: The MBIM dissector could crash or exhaust system
  memory. This was addressed in epan/dissectors/packet-mbim.c by changing
  the memory-allocation approach. (bsc#1062645)
- CVE-2017-15191: The DMP dissector could crash. This was addressed in
  epan/dissectors/packet-dmp.c by validating a string length. (bsc#1062645)
- CVE-2017-17083: NetBIOS dissector could crash. This was addressed in
  epan/dissectors/packet-netbios.c by ensuring that write operations are
  bounded by the beginning of a buffer. (bsc#1070727)
- CVE-2017-17084: IWARP_MPA dissector could crash. This was addressed
  in epan/dissectors/packet-iwarp-mpa.c by validating a ULPDU
  length. (bsc#1070727)
- CVE-2017-17085: the CIP Safety dissector could crash. This was
  addressed in epan/dissectors/packet-cipsafety.c by validating the packet
  length. (bsc#1070727)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-09"/>
	<updated date="2018-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1044417">SUSE bug 1044417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045341">SUSE bug 1045341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056248">SUSE bug 1056248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056249">SUSE bug 1056249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056251">SUSE bug 1056251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062645">SUSE bug 1062645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070727">SUSE bug 1070727</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-13765/">CVE-2017-13765 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13765">CVE-2017-13765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-13766/">CVE-2017-13766 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13766">CVE-2017-13766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-13767/">CVE-2017-13767 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13767">CVE-2017-13767 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15191/">CVE-2017-15191 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15191">CVE-2017-15191 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15192/">CVE-2017-15192 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15192">CVE-2017-15192 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15193/">CVE-2017-15193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15193">CVE-2017-15193 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17083/">CVE-2017-17083 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17083">CVE-2017-17083 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17084/">CVE-2017-17084 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17084">CVE-2017-17084 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17085/">CVE-2017-17085 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17085">CVE-2017-17085 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9617/">CVE-2017-9617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9617">CVE-2017-9617 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9766/">CVE-2017-9766 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9766">CVE-2017-9766 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575368" comment="libjack0-0.109.2-67.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575369" comment="libsmi-0.4.5-2.7.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575370" comment="libwireshark8-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575371" comment="libwiretap6-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575372" comment="libwscodecs1-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575373" comment="libwsutil7-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575374" comment="portaudio-19-234.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575375" comment="wireshark-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575376" comment="wireshark-gtk-2.2.11-40.14.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217882" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1074171" ref_url="https://bugzilla.suse.com/1074171" source="BUGZILLA"/>
		<reference ref_id="1075737" ref_url="https://bugzilla.suse.com/1075737" source="BUGZILLA"/>
		<reference ref_id="1075738" ref_url="https://bugzilla.suse.com/1075738" source="BUGZILLA"/>
		<reference ref_id="1075739" ref_url="https://bugzilla.suse.com/1075739" source="BUGZILLA"/>
		<reference ref_id="1075748" ref_url="https://bugzilla.suse.com/1075748" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17935" ref_url="https://www.suse.com/security/cve/CVE-2017-17935/" source="CVE"/>
		<reference ref_id="CVE-2018-5334" ref_url="https://www.suse.com/security/cve/CVE-2018-5334/" source="CVE"/>
		<reference ref_id="CVE-2018-5335" ref_url="https://www.suse.com/security/cve/CVE-2018-5335/" source="CVE"/>
		<reference ref_id="CVE-2018-5336" ref_url="https://www.suse.com/security/cve/CVE-2018-5336/" source="CVE"/>
		<description>
This update for wireshark to version 2.2.12 fixes the following issues:

- CVE-2018-5334: IxVeriWave file could crash (bsc#1075737)
- CVE-2018-5335: WCP dissector could crash (bsc#1075738)
- CVE-2018-5336: Multiple dissector crashes (bsc#1075739)
- CVE-2017-17935: Incorrect handling of '\n' in file_read_line function could
  have lead to denial of service (bsc#1074171)

This release no longer enables the Linux kernel BPF JIT compiler via the
net.core.bpf_jit_enable sysctl, as this would make systems more vulnerable
to Spectre variant 1 CVE-2017-5753 - (bsc#1075748)

Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-2.2.12.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-23"/>
	<updated date="2018-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074171">SUSE bug 1074171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075737">SUSE bug 1075737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075738">SUSE bug 1075738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075739">SUSE bug 1075739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075748">SUSE bug 1075748</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17935/">CVE-2017-17935 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17935">CVE-2017-17935 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5334/">CVE-2018-5334 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5334">CVE-2018-5334 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5335/">CVE-2018-5335 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5335">CVE-2018-5335 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5336/">CVE-2018-5336 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5336">CVE-2018-5336 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575377" comment="libwireshark8-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575378" comment="libwiretap6-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575379" comment="libwscodecs1-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575380" comment="libwsutil7-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575381" comment="wireshark-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575382" comment="wireshark-gtk-2.2.12-40.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217883" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1077080" ref_url="https://bugzilla.suse.com/1077080" source="BUGZILLA"/>
		<reference ref_id="1082692" ref_url="https://bugzilla.suse.com/1082692" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17997" ref_url="https://www.suse.com/security/cve/CVE-2017-17997/" source="CVE"/>
		<reference ref_id="CVE-2018-7320" ref_url="https://www.suse.com/security/cve/CVE-2018-7320/" source="CVE"/>
		<reference ref_id="CVE-2018-7321" ref_url="https://www.suse.com/security/cve/CVE-2018-7321/" source="CVE"/>
		<reference ref_id="CVE-2018-7322" ref_url="https://www.suse.com/security/cve/CVE-2018-7322/" source="CVE"/>
		<reference ref_id="CVE-2018-7323" ref_url="https://www.suse.com/security/cve/CVE-2018-7323/" source="CVE"/>
		<reference ref_id="CVE-2018-7324" ref_url="https://www.suse.com/security/cve/CVE-2018-7324/" source="CVE"/>
		<reference ref_id="CVE-2018-7325" ref_url="https://www.suse.com/security/cve/CVE-2018-7325/" source="CVE"/>
		<reference ref_id="CVE-2018-7326" ref_url="https://www.suse.com/security/cve/CVE-2018-7326/" source="CVE"/>
		<reference ref_id="CVE-2018-7327" ref_url="https://www.suse.com/security/cve/CVE-2018-7327/" source="CVE"/>
		<reference ref_id="CVE-2018-7328" ref_url="https://www.suse.com/security/cve/CVE-2018-7328/" source="CVE"/>
		<reference ref_id="CVE-2018-7329" ref_url="https://www.suse.com/security/cve/CVE-2018-7329/" source="CVE"/>
		<reference ref_id="CVE-2018-7330" ref_url="https://www.suse.com/security/cve/CVE-2018-7330/" source="CVE"/>
		<reference ref_id="CVE-2018-7331" ref_url="https://www.suse.com/security/cve/CVE-2018-7331/" source="CVE"/>
		<reference ref_id="CVE-2018-7332" ref_url="https://www.suse.com/security/cve/CVE-2018-7332/" source="CVE"/>
		<reference ref_id="CVE-2018-7333" ref_url="https://www.suse.com/security/cve/CVE-2018-7333/" source="CVE"/>
		<reference ref_id="CVE-2018-7334" ref_url="https://www.suse.com/security/cve/CVE-2018-7334/" source="CVE"/>
		<reference ref_id="CVE-2018-7335" ref_url="https://www.suse.com/security/cve/CVE-2018-7335/" source="CVE"/>
		<reference ref_id="CVE-2018-7336" ref_url="https://www.suse.com/security/cve/CVE-2018-7336/" source="CVE"/>
		<reference ref_id="CVE-2018-7337" ref_url="https://www.suse.com/security/cve/CVE-2018-7337/" source="CVE"/>
		<reference ref_id="CVE-2018-7417" ref_url="https://www.suse.com/security/cve/CVE-2018-7417/" source="CVE"/>
		<reference ref_id="CVE-2018-7418" ref_url="https://www.suse.com/security/cve/CVE-2018-7418/" source="CVE"/>
		<reference ref_id="CVE-2018-7419" ref_url="https://www.suse.com/security/cve/CVE-2018-7419/" source="CVE"/>
		<reference ref_id="CVE-2018-7420" ref_url="https://www.suse.com/security/cve/CVE-2018-7420/" source="CVE"/>
		<reference ref_id="CVE-2018-7421" ref_url="https://www.suse.com/security/cve/CVE-2018-7421/" source="CVE"/>
		<description>
This update for wireshark fixes the following issues:

Security issue fixed (bsc#1082692):

- CVE-2018-7335: The IEEE 802.11 dissector could crash (wnpa-sec-2018-05)
- CVE-2018-7321: thrift long dissector loop (dissect_thrift_map)
- CVE-2018-7322: DICOM: inifinite loop (dissect_dcm_tag) 
- CVE-2018-7323: WCCP: very long loop (dissect_wccp2_alternate_mask_value_set_element) 
- CVE-2018-7324: SCCP: infinite loop (dissect_sccp_optional_parameters) 
- CVE-2018-7325: RPKI-Router Protocol: infinite loop (dissect_rpkirtr_pdu) 
- CVE-2018-7326: LLTD: infinite loop (dissect_lltd_tlv) 
- CVE-2018-7327: openflow_v6: infinite loop (dissect_openflow_bundle_control_v6) 
- CVE-2018-7328: USB-DARWIN: long loop (dissect_darwin_usb_iso_transfer) 
- CVE-2018-7329: S7COMM: infinite loop (s7comm_decode_ud_cpu_alarm_main) 
- CVE-2018-7330: thread_meshcop: infinite loop (get_chancount) 
- CVE-2018-7331: GTP: infinite loop (dissect_gprscdr_GGSNPDPRecord, dissect_ber_set) 
- CVE-2018-7332: RELOAD: infinite loop (dissect_statans) 
- CVE-2018-7333: RPCoRDMA: infinite loop in get_write_list_chunk_count
- CVE-2018-7421: Multiple dissectors could go into large infinite loops (wnpa-sec-2018-06)
- CVE-2018-7334: The UMTS MAC dissector could crash (wnpa-sec-2018-07)
- CVE-2018-7337: The DOCSIS dissector could crash (wnpa-sec-2018-08)
- CVE-2018-7336: The FCP dissector could crash (wnpa-sec-2018-09)
- CVE-2018-7320: The SIGCOMP dissector could crash (wnpa-sec-2018-10)
- CVE-2018-7420: The pcapng file parser could crash (wnpa-sec-2018-11)
- CVE-2018-7417: The IPMI dissector could crash (wnpa-sec-2018-12)
- CVE-2018-7418: The SIGCOMP dissector could crash (wnpa-sec-2018-13)
- CVE-2018-7419: The NBAP disssector could crash (wnpa-sec-2018-14)
- CVE-2017-17997: Misuse of NULL pointer in MRDISC dissector (bsc#1077080).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077080">SUSE bug 1077080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17997/">CVE-2017-17997 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17997">CVE-2017-17997 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7320/">CVE-2018-7320 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7320">CVE-2018-7320 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7321/">CVE-2018-7321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7321">CVE-2018-7321 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7322/">CVE-2018-7322 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7322">CVE-2018-7322 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7323/">CVE-2018-7323 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7323">CVE-2018-7323 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7324/">CVE-2018-7324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7324">CVE-2018-7324 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7325/">CVE-2018-7325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7325">CVE-2018-7325 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7326/">CVE-2018-7326 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7326">CVE-2018-7326 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7327/">CVE-2018-7327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7327">CVE-2018-7327 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7328/">CVE-2018-7328 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7328">CVE-2018-7328 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7329/">CVE-2018-7329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7329">CVE-2018-7329 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7330/">CVE-2018-7330 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7330">CVE-2018-7330 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7331/">CVE-2018-7331 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7331">CVE-2018-7331 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7332/">CVE-2018-7332 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7332">CVE-2018-7332 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7333/">CVE-2018-7333 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7333">CVE-2018-7333 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7334/">CVE-2018-7334 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7334">CVE-2018-7334 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7335/">CVE-2018-7335 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7335">CVE-2018-7335 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7336/">CVE-2018-7336 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7336">CVE-2018-7336 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7337/">CVE-2018-7337 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7337">CVE-2018-7337 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7417/">CVE-2018-7417 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7417">CVE-2018-7417 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7418/">CVE-2018-7418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7418">CVE-2018-7418 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7419/">CVE-2018-7419 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7419">CVE-2018-7419 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7420/">CVE-2018-7420 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7420">CVE-2018-7420 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7421/">CVE-2018-7421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7421">CVE-2018-7421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575383" comment="libwireshark8-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575384" comment="libwiretap6-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575385" comment="libwscodecs1-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575386" comment="libwsutil7-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575387" comment="wireshark-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575388" comment="wireshark-gtk-2.2.13-40.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217884" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1088200" ref_url="https://bugzilla.suse.com/1088200" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-9256" ref_url="https://www.suse.com/security/cve/CVE-2018-9256/" source="CVE"/>
		<reference ref_id="CVE-2018-9259" ref_url="https://www.suse.com/security/cve/CVE-2018-9259/" source="CVE"/>
		<reference ref_id="CVE-2018-9260" ref_url="https://www.suse.com/security/cve/CVE-2018-9260/" source="CVE"/>
		<reference ref_id="CVE-2018-9261" ref_url="https://www.suse.com/security/cve/CVE-2018-9261/" source="CVE"/>
		<reference ref_id="CVE-2018-9262" ref_url="https://www.suse.com/security/cve/CVE-2018-9262/" source="CVE"/>
		<reference ref_id="CVE-2018-9263" ref_url="https://www.suse.com/security/cve/CVE-2018-9263/" source="CVE"/>
		<reference ref_id="CVE-2018-9264" ref_url="https://www.suse.com/security/cve/CVE-2018-9264/" source="CVE"/>
		<reference ref_id="CVE-2018-9265" ref_url="https://www.suse.com/security/cve/CVE-2018-9265/" source="CVE"/>
		<reference ref_id="CVE-2018-9266" ref_url="https://www.suse.com/security/cve/CVE-2018-9266/" source="CVE"/>
		<reference ref_id="CVE-2018-9267" ref_url="https://www.suse.com/security/cve/CVE-2018-9267/" source="CVE"/>
		<reference ref_id="CVE-2018-9268" ref_url="https://www.suse.com/security/cve/CVE-2018-9268/" source="CVE"/>
		<reference ref_id="CVE-2018-9269" ref_url="https://www.suse.com/security/cve/CVE-2018-9269/" source="CVE"/>
		<reference ref_id="CVE-2018-9270" ref_url="https://www.suse.com/security/cve/CVE-2018-9270/" source="CVE"/>
		<reference ref_id="CVE-2018-9271" ref_url="https://www.suse.com/security/cve/CVE-2018-9271/" source="CVE"/>
		<reference ref_id="CVE-2018-9272" ref_url="https://www.suse.com/security/cve/CVE-2018-9272/" source="CVE"/>
		<reference ref_id="CVE-2018-9273" ref_url="https://www.suse.com/security/cve/CVE-2018-9273/" source="CVE"/>
		<reference ref_id="CVE-2018-9274" ref_url="https://www.suse.com/security/cve/CVE-2018-9274/" source="CVE"/>
		<description>
This update for wireshark fixes the following issues:

- Update to wireshark 2.2.14, fix such issues:
  * bsc#1088200 VUL-0: wireshark: multiple vulnerabilities
    fixed in 2.2.14, 2.4.6
  * CVE-2018-9256: LWAPP dissector crash
  * CVE-2018-9260: IEEE 802.15.4 dissector crash
  * CVE-2018-9261: NBAP dissector crash
  * CVE-2018-9262: VLAN dissector crash
  * CVE-2018-9263: Kerberos dissector crash
  * CVE-2018-9264: ADB dissector crash
  * CVE-2018-9265: tn3270 dissector has a memory leak
  * CVE-2018-9266: ISUP dissector memory leak
  * CVE-2018-9267: LAPD dissector memory leak
  * CVE-2018-9268: SMB2 dissector memory leak
  * CVE-2018-9269: GIOP dissector memory leak
  * CVE-2018-9270: OIDS dissector memory leak
  * CVE-2018-9271: multipart dissector memory leak
  * CVE-2018-9272: h223 dissector memory leak
  * CVE-2018-9273: pcp dissector memory leak
  * CVE-2018-9274: failure message memory leak
  * CVE-2018-9259: MP4 dissector crash
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-19"/>
	<updated date="2018-04-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9256/">CVE-2018-9256 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9256">CVE-2018-9256 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9259/">CVE-2018-9259 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9259">CVE-2018-9259 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9260/">CVE-2018-9260 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9260">CVE-2018-9260 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9261/">CVE-2018-9261 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9261">CVE-2018-9261 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9262/">CVE-2018-9262 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9262">CVE-2018-9262 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9263/">CVE-2018-9263 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9263">CVE-2018-9263 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9264/">CVE-2018-9264 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9264">CVE-2018-9264 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9265/">CVE-2018-9265 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9265">CVE-2018-9265 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9266/">CVE-2018-9266 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9266">CVE-2018-9266 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9267/">CVE-2018-9267 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9267">CVE-2018-9267 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9268/">CVE-2018-9268 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9268">CVE-2018-9268 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9269/">CVE-2018-9269 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9269">CVE-2018-9269 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9270/">CVE-2018-9270 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9270">CVE-2018-9270 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9271/">CVE-2018-9271 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9271">CVE-2018-9271 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9272/">CVE-2018-9272 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9272">CVE-2018-9272 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9273/">CVE-2018-9273 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9273">CVE-2018-9273 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9274/">CVE-2018-9274 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9274">CVE-2018-9274 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575389" comment="libwireshark8-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575390" comment="libwiretap6-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575391" comment="libwscodecs1-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575392" comment="libwsutil7-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575393" comment="wireshark-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575394" comment="wireshark-gtk-2.2.14-40.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217885" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1094301" ref_url="https://bugzilla.suse.com/1094301" source="BUGZILLA"/>
		<reference ref_id="1101776" ref_url="https://bugzilla.suse.com/1101776" source="BUGZILLA"/>
		<reference ref_id="1101777" ref_url="https://bugzilla.suse.com/1101777" source="BUGZILLA"/>
		<reference ref_id="1101786" ref_url="https://bugzilla.suse.com/1101786" source="BUGZILLA"/>
		<reference ref_id="1101788" ref_url="https://bugzilla.suse.com/1101788" source="BUGZILLA"/>
		<reference ref_id="1101791" ref_url="https://bugzilla.suse.com/1101791" source="BUGZILLA"/>
		<reference ref_id="1101794" ref_url="https://bugzilla.suse.com/1101794" source="BUGZILLA"/>
		<reference ref_id="1101800" ref_url="https://bugzilla.suse.com/1101800" source="BUGZILLA"/>
		<reference ref_id="1101802" ref_url="https://bugzilla.suse.com/1101802" source="BUGZILLA"/>
		<reference ref_id="1101804" ref_url="https://bugzilla.suse.com/1101804" source="BUGZILLA"/>
		<reference ref_id="1101810" ref_url="https://bugzilla.suse.com/1101810" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11354" ref_url="https://www.suse.com/security/cve/CVE-2018-11354/" source="CVE"/>
		<reference ref_id="CVE-2018-11355" ref_url="https://www.suse.com/security/cve/CVE-2018-11355/" source="CVE"/>
		<reference ref_id="CVE-2018-11356" ref_url="https://www.suse.com/security/cve/CVE-2018-11356/" source="CVE"/>
		<reference ref_id="CVE-2018-11357" ref_url="https://www.suse.com/security/cve/CVE-2018-11357/" source="CVE"/>
		<reference ref_id="CVE-2018-11358" ref_url="https://www.suse.com/security/cve/CVE-2018-11358/" source="CVE"/>
		<reference ref_id="CVE-2018-11359" ref_url="https://www.suse.com/security/cve/CVE-2018-11359/" source="CVE"/>
		<reference ref_id="CVE-2018-11360" ref_url="https://www.suse.com/security/cve/CVE-2018-11360/" source="CVE"/>
		<reference ref_id="CVE-2018-11361" ref_url="https://www.suse.com/security/cve/CVE-2018-11361/" source="CVE"/>
		<reference ref_id="CVE-2018-11362" ref_url="https://www.suse.com/security/cve/CVE-2018-11362/" source="CVE"/>
		<reference ref_id="CVE-2018-14339" ref_url="https://www.suse.com/security/cve/CVE-2018-14339/" source="CVE"/>
		<reference ref_id="CVE-2018-14340" ref_url="https://www.suse.com/security/cve/CVE-2018-14340/" source="CVE"/>
		<reference ref_id="CVE-2018-14341" ref_url="https://www.suse.com/security/cve/CVE-2018-14341/" source="CVE"/>
		<reference ref_id="CVE-2018-14342" ref_url="https://www.suse.com/security/cve/CVE-2018-14342/" source="CVE"/>
		<reference ref_id="CVE-2018-14343" ref_url="https://www.suse.com/security/cve/CVE-2018-14343/" source="CVE"/>
		<reference ref_id="CVE-2018-14344" ref_url="https://www.suse.com/security/cve/CVE-2018-14344/" source="CVE"/>
		<reference ref_id="CVE-2018-14367" ref_url="https://www.suse.com/security/cve/CVE-2018-14367/" source="CVE"/>
		<reference ref_id="CVE-2018-14368" ref_url="https://www.suse.com/security/cve/CVE-2018-14368/" source="CVE"/>
		<reference ref_id="CVE-2018-14369" ref_url="https://www.suse.com/security/cve/CVE-2018-14369/" source="CVE"/>
		<reference ref_id="CVE-2018-14370" ref_url="https://www.suse.com/security/cve/CVE-2018-14370/" source="CVE"/>
		<description>
This update for wireshark fixes the following issues:

Security issues fixed:

- bsc#1094301: Wireshark security update to 2.6.1, 2.4.7, 2.2.15
- CVE-2018-14339: MMSE dissector infinite loop (wnpa-sec-2018-38, bsc#1101810)
- CVE-2018-14341: DICOM dissector crash (wnpa-sec-2018-39, bsc#1101776)
- CVE-2018-14343: ASN.1 BER dissector crash (wnpa-sec-2018-37, bsc#1101786)
- CVE-2018-14344: ISMP dissector crash (wnpa-sec-2018-35, bsc#1101788)
- CVE-2018-14340: Multiple dissectors could crash (wnpa-sec-2018-36, bsc#1101804)
- CVE-2018-14342: BGP dissector large loop (wnpa-sec-2018-34, bsc#1101777)
- CVE-2018-14370: IEEE 802.11 dissector crash (wnpa-sec-2018-43, bsc#1101802)
- CVE-2018-14369: HTTP2 dissector crash (wnpa-sec-2018-41, bsc#1101800)
- CVE-2018-14367: CoAP dissector crash (wnpa-sec-2018-42, bsc#1101791)
- CVE-2018-14368: Bazaar dissector infinite loop (wnpa-sec-2018-40, bsc#1101794)
- CVE-2018-11355: Fix RTCP dissector crash (bsc#1094301).
- CVE-2018-11362: Fix LDSS dissector crash (bsc#1094301).
- CVE-2018-11361: Fix IEEE 802.11 dissector crash (bsc#1094301).
- CVE-2018-11360: Fix GSM A DTAP dissector crash (bsc#1094301).
- CVE-2018-11358: Fix Q.931 dissector crash (bsc#1094301).
- CVE-2018-11359: Fix multiple dissectors crashs (bsc#1094301).
- CVE-2018-11356: Fix DNS dissector crash (bsc#1094301).
- CVE-2018-11357: Fix multiple dissectors that could consume excessive memory (bsc#1094301).
- CVE-2018-11354: Fix IEEE 1905.1a dissector crash (bsc#1094301).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101776">SUSE bug 1101776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101777">SUSE bug 1101777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101786">SUSE bug 1101786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101788">SUSE bug 1101788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101791">SUSE bug 1101791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101794">SUSE bug 1101794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101800">SUSE bug 1101800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101802">SUSE bug 1101802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101804">SUSE bug 1101804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101810">SUSE bug 1101810</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11354/">CVE-2018-11354 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11354">CVE-2018-11354 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11355/">CVE-2018-11355 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11355">CVE-2018-11355 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11356/">CVE-2018-11356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11356">CVE-2018-11356 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11357/">CVE-2018-11357 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11357">CVE-2018-11357 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11358/">CVE-2018-11358 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11358">CVE-2018-11358 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11359/">CVE-2018-11359 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11359">CVE-2018-11359 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11360/">CVE-2018-11360 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11360">CVE-2018-11360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11361/">CVE-2018-11361 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11361">CVE-2018-11361 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11362/">CVE-2018-11362 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11362">CVE-2018-11362 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14339/">CVE-2018-14339 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14339">CVE-2018-14339 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14340/">CVE-2018-14340 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14340">CVE-2018-14340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14341/">CVE-2018-14341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14341">CVE-2018-14341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14342/">CVE-2018-14342 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14342">CVE-2018-14342 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14343/">CVE-2018-14343 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14343">CVE-2018-14343 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14344/">CVE-2018-14344 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14344">CVE-2018-14344 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14367/">CVE-2018-14367 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14367">CVE-2018-14367 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14368/">CVE-2018-14368 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14368">CVE-2018-14368 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14369/">CVE-2018-14369 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14369">CVE-2018-14369 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14370/">CVE-2018-14370 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14370">CVE-2018-14370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575395" comment="libwireshark8-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575396" comment="libwiretap6-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575397" comment="libwscodecs1-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575398" comment="libwsutil7-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575399" comment="wireshark-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575400" comment="wireshark-gtk-2.2.16-40.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217886" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1106514" ref_url="https://bugzilla.suse.com/1106514" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16056" ref_url="https://www.suse.com/security/cve/CVE-2018-16056/" source="CVE"/>
		<reference ref_id="CVE-2018-16057" ref_url="https://www.suse.com/security/cve/CVE-2018-16057/" source="CVE"/>
		<reference ref_id="CVE-2018-16058" ref_url="https://www.suse.com/security/cve/CVE-2018-16058/" source="CVE"/>
		<description>
This update for wireshark fixes the following issues:

Update wireshark to version 2.2.17 (bsc#1106514):

Security issues fixed:

- CVE-2018-16058: Bluetooth AVDTP dissector crash (wnpa-sec-2018-44)
- CVE-2018-16056: Bluetooth Attribute Protocol dissector crash (wnpa-sec-2018-45)
- CVE-2018-16057: Radiotap dissector crash (wnpa-sec-2018-46)

Further bug fixes and updated protocol support as listed in:
  https://www.wireshark.org/docs/relnotes/wireshark-2.2.17.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-26"/>
	<updated date="2018-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106514">SUSE bug 1106514</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16056/">CVE-2018-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16056">CVE-2018-16056 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16057/">CVE-2018-16057 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16057">CVE-2018-16057 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16058/">CVE-2018-16058 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16058">CVE-2018-16058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575401" comment="libwireshark8-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575402" comment="libwiretap6-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575403" comment="libwscodecs1-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575404" comment="libwsutil7-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575405" comment="wireshark-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575406" comment="wireshark-gtk-2.2.17-40.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217887" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="868937" ref_url="https://bugzilla.suse.com/868937" source="BUGZILLA"/>
		<reference ref_id="900611" ref_url="https://bugzilla.suse.com/900611" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3686" ref_url="https://www.suse.com/security/cve/CVE-2014-3686/" source="CVE"/>
		<description>

This update fixes a remote code execution vulnerability in wpa_supplicant's 
wpa_cli and hostapd_cli tools. CVE-2014-3686 has been assigned to this 
issue.

Additionally, password based authentication with PKCS#5v2 has been enabled.

Security Issues:

    * CVE-2014-3686
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3686&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-15"/>
	<updated date="2014-10-15"/>
	<bugzilla href="https://bugzilla.suse.com/868937">SUSE bug 868937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900611">SUSE bug 900611</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3686/">CVE-2014-3686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3686">CVE-2014-3686 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575407" comment="wpa_supplicant-0.6.9-4.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217888" version="1" class="patch">
	<metadata>
		<title>Security update for xalan-j2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="870082" ref_url="https://bugzilla.suse.com/870082" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0107" ref_url="https://www.suse.com/security/cve/CVE-2014-0107/" source="CVE"/>
		<description>

xalan-j2 has been updated to ensure that secure processing can't be 
circumvented (CVE-2014-0107).

Security Issues:

    * CVE-2014-0107
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0107&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-23"/>
	<updated date="2014-06-23"/>
	<bugzilla href="https://bugzilla.suse.com/870082">SUSE bug 870082</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0107/">CVE-2014-0107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0107">CVE-2014-0107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567162" comment="xalan-j2-2.7.0-217.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217889" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="777628" ref_url="https://bugzilla.suse.com/777628" source="BUGZILLA"/>
		<reference ref_id="789944" ref_url="https://bugzilla.suse.com/789944" source="BUGZILLA"/>
		<reference ref_id="789945" ref_url="https://bugzilla.suse.com/789945" source="BUGZILLA"/>
		<reference ref_id="789948" ref_url="https://bugzilla.suse.com/789948" source="BUGZILLA"/>
		<reference ref_id="789950" ref_url="https://bugzilla.suse.com/789950" source="BUGZILLA"/>
		<reference ref_id="789951" ref_url="https://bugzilla.suse.com/789951" source="BUGZILLA"/>
		<reference ref_id="826717" ref_url="https://bugzilla.suse.com/826717" source="BUGZILLA"/>
		<reference ref_id="880751" ref_url="https://bugzilla.suse.com/880751" source="BUGZILLA"/>
		<reference ref_id="895798" ref_url="https://bugzilla.suse.com/895798" source="BUGZILLA"/>
		<reference ref_id="895799" ref_url="https://bugzilla.suse.com/895799" source="BUGZILLA"/>
		<reference ref_id="895802" ref_url="https://bugzilla.suse.com/895802" source="BUGZILLA"/>
		<reference ref_id="903850" ref_url="https://bugzilla.suse.com/903850" source="BUGZILLA"/>
		<reference ref_id="903967" ref_url="https://bugzilla.suse.com/903967" source="BUGZILLA"/>
		<reference ref_id="903970" ref_url="https://bugzilla.suse.com/903970" source="BUGZILLA"/>
		<reference ref_id="905465" ref_url="https://bugzilla.suse.com/905465" source="BUGZILLA"/>
		<reference ref_id="905467" ref_url="https://bugzilla.suse.com/905467" source="BUGZILLA"/>
		<reference ref_id="906439" ref_url="https://bugzilla.suse.com/906439" source="BUGZILLA"/>
		<reference ref_id="927967" ref_url="https://bugzilla.suse.com/927967" source="BUGZILLA"/>
		<reference ref_id="929339" ref_url="https://bugzilla.suse.com/929339" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5510" ref_url="https://www.suse.com/security/cve/CVE-2012-5510/" source="CVE"/>
		<reference ref_id="CVE-2012-5511" ref_url="https://www.suse.com/security/cve/CVE-2012-5511/" source="CVE"/>
		<reference ref_id="CVE-2012-5513" ref_url="https://www.suse.com/security/cve/CVE-2012-5513/" source="CVE"/>
		<reference ref_id="CVE-2012-5514" ref_url="https://www.suse.com/security/cve/CVE-2012-5514/" source="CVE"/>
		<reference ref_id="CVE-2012-5515" ref_url="https://www.suse.com/security/cve/CVE-2012-5515/" source="CVE"/>
		<reference ref_id="CVE-2013-3495" ref_url="https://www.suse.com/security/cve/CVE-2013-3495/" source="CVE"/>
		<reference ref_id="CVE-2014-4021" ref_url="https://www.suse.com/security/cve/CVE-2014-4021/" source="CVE"/>
		<reference ref_id="CVE-2014-7154" ref_url="https://www.suse.com/security/cve/CVE-2014-7154/" source="CVE"/>
		<reference ref_id="CVE-2014-7155" ref_url="https://www.suse.com/security/cve/CVE-2014-7155/" source="CVE"/>
		<reference ref_id="CVE-2014-7156" ref_url="https://www.suse.com/security/cve/CVE-2014-7156/" source="CVE"/>
		<reference ref_id="CVE-2014-8594" ref_url="https://www.suse.com/security/cve/CVE-2014-8594/" source="CVE"/>
		<reference ref_id="CVE-2014-8595" ref_url="https://www.suse.com/security/cve/CVE-2014-8595/" source="CVE"/>
		<reference ref_id="CVE-2014-8866" ref_url="https://www.suse.com/security/cve/CVE-2014-8866/" source="CVE"/>
		<reference ref_id="CVE-2014-8867" ref_url="https://www.suse.com/security/cve/CVE-2014-8867/" source="CVE"/>
		<reference ref_id="CVE-2014-9030" ref_url="https://www.suse.com/security/cve/CVE-2014-9030/" source="CVE"/>
		<reference ref_id="CVE-2015-3340" ref_url="https://www.suse.com/security/cve/CVE-2015-3340/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001404.html" source="SUSE-SU"/>
		<description>

This update fixes the following security issues in Xen:

    * CVE-2012-5510: Grant table version switch list corruption
      vulnerability (XSA-26)
    * CVE-2012-5511: Several HVM operations do not validate the range of
      their inputs (XSA-27)
    * CVE-2012-5513: XENMEM_exchange may overwrite hypervisor memory
      (XSA-29)
    * CVE-2012-5514: Missing unlock in
      guest_physmap_mark_populate_on_demand() (XSA-30)
    * CVE-2012-5515: Several memory hypercall operations allow invalid
      extent order values (XSA-31)

Also the following fix has been applied:

    * bnc#777628 - guest 'disappears' after live migration
      Updated block-dmmd script

Security Issues references:

    * CVE-2012-5513
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5513&gt;
    * CVE-2012-5514
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5514&gt;
    * CVE-2012-5511
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5511&gt;
    * CVE-2012-5510
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5510&gt;
    * CVE-2012-5515
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5515&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-22"/>
	<updated date="2012-11-22"/>
	<bugzilla href="https://bugzilla.suse.com/777628">SUSE bug 777628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789944">SUSE bug 789944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789945">SUSE bug 789945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789948">SUSE bug 789948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789950">SUSE bug 789950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789951">SUSE bug 789951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826717">SUSE bug 826717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895798">SUSE bug 895798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895799">SUSE bug 895799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895802">SUSE bug 895802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903850">SUSE bug 903850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905465">SUSE bug 905465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905467">SUSE bug 905467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906439">SUSE bug 906439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927967">SUSE bug 927967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929339">SUSE bug 929339</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5510/">CVE-2012-5510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5510">CVE-2012-5510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5511/">CVE-2012-5511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5511">CVE-2012-5511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5513/">CVE-2012-5513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5513">CVE-2012-5513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5514/">CVE-2012-5514 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5514">CVE-2012-5514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5515/">CVE-2012-5515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5515">CVE-2012-5515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3495/">CVE-2013-3495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3495">CVE-2013-3495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4021/">CVE-2014-4021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4021">CVE-2014-4021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7154/">CVE-2014-7154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7154">CVE-2014-7154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7155/">CVE-2014-7155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7155">CVE-2014-7155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7156/">CVE-2014-7156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7156">CVE-2014-7156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8594/">CVE-2014-8594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8594">CVE-2014-8594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8595/">CVE-2014-8595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8595">CVE-2014-8595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8866/">CVE-2014-8866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8866">CVE-2014-8866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8867/">CVE-2014-8867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8867">CVE-2014-8867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9030/">CVE-2014-9030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9030">CVE-2014-9030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3340/">CVE-2015-3340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3340">CVE-2015-3340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3456">CVE-2015-3456 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009590281" comment="xen-4.0.3_21548_12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590282" comment="xen-doc-html-4.0.3_21548_12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590283" comment="xen-doc-pdf-4.0.3_21548_12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590284" comment="xen-kmp-default-4.0.3_21548_12_2.6.32.54_0.11.TDC-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575412" comment="xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590285" comment="xen-kmp-trace-4.0.3_21548_12_2.6.32.54_0.11.TDC-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590286" comment="xen-libs-4.0.3_21548_12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590287" comment="xen-tools-4.0.3_21548_12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590288" comment="xen-tools-domU-4.0.3_21548_12-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009590281" comment="xen-4.0.3_21548_12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590282" comment="xen-doc-html-4.0.3_21548_12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590283" comment="xen-doc-pdf-4.0.3_21548_12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590284" comment="xen-kmp-default-4.0.3_21548_12_2.6.32.54_0.11.TDC-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575412" comment="xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590285" comment="xen-kmp-trace-4.0.3_21548_12_2.6.32.54_0.11.TDC-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590286" comment="xen-libs-4.0.3_21548_12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590287" comment="xen-tools-4.0.3_21548_12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590288" comment="xen-tools-domU-4.0.3_21548_12-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217890" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
		</affected>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="939712" ref_url="https://bugzilla.suse.com/939712" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5165" ref_url="https://www.suse.com/security/cve/CVE-2015-5165/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001547.html" source="SUSE-SU"/>
		<description>

Xen was updated to fix the following security issues:

* CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344)
* CVE-2015-5165: QEMU leak of uninitialized heap memory in rtl8139 device model (XSA-140, bsc#939712)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-11"/>
	<updated date="2015-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939712">SUSE bug 939712</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5154">CVE-2015-5154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-5165/">CVE-2015-5165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5165">CVE-2015-5165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575417" comment="xen-4.0.3_21548_18-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575418" comment="xen-doc-html-4.0.3_21548_18-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575419" comment="xen-doc-pdf-4.0.3_21548_18-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575420" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.59_0.19-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575421" comment="xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575422" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.59_0.19-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575423" comment="xen-libs-4.0.3_21548_18-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575424" comment="xen-tools-4.0.3_21548_18-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575425" comment="xen-tools-domU-4.0.3_21548_18-29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217891" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="939712" ref_url="https://bugzilla.suse.com/939712" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5165" ref_url="https://www.suse.com/security/cve/CVE-2015-5165/" source="CVE"/>
		<description>

Xen was updated to fix the following security issues:

* CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344)
* CVE-2015-5165: QEMU leak of uninitialized heap memory in rtl8139 device model (XSA-140, bsc#939712)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-09"/>
	<updated date="2015-10-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939712">SUSE bug 939712</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5154">CVE-2015-5154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-5165/">CVE-2015-5165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5165">CVE-2015-5165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575426" comment="xen-4.0.3_21548_18-27.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575427" comment="xen-doc-html-4.0.3_21548_18-27.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575428" comment="xen-doc-pdf-4.0.3_21548_18-27.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575429" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.68.TDC-27.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575430" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.68.TDC-27.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575431" comment="xen-libs-4.0.3_21548_18-27.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575432" comment="xen-tools-4.0.3_21548_18-27.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575433" comment="xen-tools-domU-4.0.3_21548_18-27.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217892" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="932267" ref_url="https://bugzilla.suse.com/932267" source="BUGZILLA"/>
		<reference ref_id="944463" ref_url="https://bugzilla.suse.com/944463" source="BUGZILLA"/>
		<reference ref_id="944697" ref_url="https://bugzilla.suse.com/944697" source="BUGZILLA"/>
		<reference ref_id="950367" ref_url="https://bugzilla.suse.com/950367" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<description>
xen was updated to fix eight security issues.

These security issues were fixed:
- CVE-2015-4037: The slirp_smb function in net/slirp.c created temporary files with predictable names, which allowed local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program (bsc#932267).
- CVE-2014-0222: Integer overflow in the qcow_open function allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests (bsc#950367).
- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).
- CVE-2015-6815: With e1000 NIC emulation support it was possible to enter an infinite loop (bsc#944697).
- CVE-2015-7969: Leak of main per-domain vcpu pointer array leading to denial of service (bsc#950703).
- CVE-2015-7969: Leak of per-domain profiling- related vcpu pointer array leading to denial of service (bsc#950705).
- CVE-2015-7971: Some pmu and profiling hypercalls log without rate limiting (bsc#950706).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-29"/>
	<updated date="2015-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944463">SUSE bug 944463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944697">SUSE bug 944697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0222">CVE-2014-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4037">CVE-2015-4037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5239">CVE-2015-5239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6815">CVE-2015-6815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7835">CVE-2015-7835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7969">CVE-2015-7969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7971">CVE-2015-7971 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575434" comment="xen-4.0.3_21548_18-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575435" comment="xen-doc-html-4.0.3_21548_18-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575436" comment="xen-doc-pdf-4.0.3_21548_18-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575437" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.68.TDC-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575438" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.68.TDC-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575439" comment="xen-libs-4.0.3_21548_18-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575440" comment="xen-tools-4.0.3_21548_18-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575441" comment="xen-tools-domU-4.0.3_21548_18-30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217893" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="864391" ref_url="https://bugzilla.suse.com/864391" source="BUGZILLA"/>
		<reference ref_id="864655" ref_url="https://bugzilla.suse.com/864655" source="BUGZILLA"/>
		<reference ref_id="864769" ref_url="https://bugzilla.suse.com/864769" source="BUGZILLA"/>
		<reference ref_id="864805" ref_url="https://bugzilla.suse.com/864805" source="BUGZILLA"/>
		<reference ref_id="864811" ref_url="https://bugzilla.suse.com/864811" source="BUGZILLA"/>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="897654" ref_url="https://bugzilla.suse.com/897654" source="BUGZILLA"/>
		<reference ref_id="901508" ref_url="https://bugzilla.suse.com/901508" source="BUGZILLA"/>
		<reference ref_id="902737" ref_url="https://bugzilla.suse.com/902737" source="BUGZILLA"/>
		<reference ref_id="932267" ref_url="https://bugzilla.suse.com/932267" source="BUGZILLA"/>
		<reference ref_id="944463" ref_url="https://bugzilla.suse.com/944463" source="BUGZILLA"/>
		<reference ref_id="944697" ref_url="https://bugzilla.suse.com/944697" source="BUGZILLA"/>
		<reference ref_id="945989" ref_url="https://bugzilla.suse.com/945989" source="BUGZILLA"/>
		<reference ref_id="950367" ref_url="https://bugzilla.suse.com/950367" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950704" ref_url="https://bugzilla.suse.com/950704" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="951845" ref_url="https://bugzilla.suse.com/951845" source="BUGZILLA"/>
		<reference ref_id="953527" ref_url="https://bugzilla.suse.com/953527" source="BUGZILLA"/>
		<reference ref_id="954404" ref_url="https://bugzilla.suse.com/954404" source="BUGZILLA"/>
		<reference ref_id="956408" ref_url="https://bugzilla.suse.com/956408" source="BUGZILLA"/>
		<reference ref_id="956411" ref_url="https://bugzilla.suse.com/956411" source="BUGZILLA"/>
		<reference ref_id="956829" ref_url="https://bugzilla.suse.com/956829" source="BUGZILLA"/>
		<reference ref_id="957162" ref_url="https://bugzilla.suse.com/957162" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="958007" ref_url="https://bugzilla.suse.com/958007" source="BUGZILLA"/>
		<reference ref_id="958009" ref_url="https://bugzilla.suse.com/958009" source="BUGZILLA"/>
		<reference ref_id="958491" ref_url="https://bugzilla.suse.com/958491" source="BUGZILLA"/>
		<reference ref_id="958493" ref_url="https://bugzilla.suse.com/958493" source="BUGZILLA"/>
		<reference ref_id="958523" ref_url="https://bugzilla.suse.com/958523" source="BUGZILLA"/>
		<reference ref_id="959005" ref_url="https://bugzilla.suse.com/959005" source="BUGZILLA"/>
		<reference ref_id="960707" ref_url="https://bugzilla.suse.com/960707" source="BUGZILLA"/>
		<reference ref_id="960725" ref_url="https://bugzilla.suse.com/960725" source="BUGZILLA"/>
		<reference ref_id="960726" ref_url="https://bugzilla.suse.com/960726" source="BUGZILLA"/>
		<reference ref_id="960862" ref_url="https://bugzilla.suse.com/960862" source="BUGZILLA"/>
		<reference ref_id="961691" ref_url="https://bugzilla.suse.com/961691" source="BUGZILLA"/>
		<reference ref_id="961692" ref_url="https://bugzilla.suse.com/961692" source="BUGZILLA"/>
		<reference ref_id="962335" ref_url="https://bugzilla.suse.com/962335" source="BUGZILLA"/>
		<reference ref_id="962360" ref_url="https://bugzilla.suse.com/962360" source="BUGZILLA"/>
		<reference ref_id="962611" ref_url="https://bugzilla.suse.com/962611" source="BUGZILLA"/>
		<reference ref_id="962627" ref_url="https://bugzilla.suse.com/962627" source="BUGZILLA"/>
		<reference ref_id="962642" ref_url="https://bugzilla.suse.com/962642" source="BUGZILLA"/>
		<reference ref_id="962758" ref_url="https://bugzilla.suse.com/962758" source="BUGZILLA"/>
		<reference ref_id="963782" ref_url="https://bugzilla.suse.com/963782" source="BUGZILLA"/>
		<reference ref_id="963783" ref_url="https://bugzilla.suse.com/963783" source="BUGZILLA"/>
		<reference ref_id="964452" ref_url="https://bugzilla.suse.com/964452" source="BUGZILLA"/>
		<reference ref_id="964644" ref_url="https://bugzilla.suse.com/964644" source="BUGZILLA"/>
		<reference ref_id="964925" ref_url="https://bugzilla.suse.com/964925" source="BUGZILLA"/>
		<reference ref_id="964947" ref_url="https://bugzilla.suse.com/964947" source="BUGZILLA"/>
		<reference ref_id="965112" ref_url="https://bugzilla.suse.com/965112" source="BUGZILLA"/>
		<reference ref_id="965315" ref_url="https://bugzilla.suse.com/965315" source="BUGZILLA"/>
		<reference ref_id="965317" ref_url="https://bugzilla.suse.com/965317" source="BUGZILLA"/>
		<reference ref_id="967013" ref_url="https://bugzilla.suse.com/967013" source="BUGZILLA"/>
		<reference ref_id="967101" ref_url="https://bugzilla.suse.com/967101" source="BUGZILLA"/>
		<reference ref_id="967630" ref_url="https://bugzilla.suse.com/967630" source="BUGZILLA"/>
		<reference ref_id="969350" ref_url="https://bugzilla.suse.com/969350" source="BUGZILLA"/>
		<reference ref_id="969351" ref_url="https://bugzilla.suse.com/969351" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3689" ref_url="https://www.suse.com/security/cve/CVE-2014-3689/" source="CVE"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554/" source="CVE"/>
		<reference ref_id="CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270/" source="CVE"/>
		<reference ref_id="CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<description>
xen was updated to fix 41 security issues.

These security issues were fixed:
- CVE-2013-4533: Buffer overflow in the pxa2xx_ssp_load function in hw/arm/pxa2xx.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted s-&gt;rx_level value in a savevm image (bsc#864655).
- CVE-2013-4534: Buffer overflow in hw/intc/openpic.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via vectors related to IRQDest elements (bsc#864811).
- CVE-2013-4537: The ssi_sd_transfer function in hw/sd/ssi-sd.c allowed remote attackers to execute arbitrary code via a crafted arglen value in a savevm image (bsc#864391).
- CVE-2013-4538: Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c allowed remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image (bsc#864769).
- CVE-2013-4539: Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c might have allowed remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image (bsc#864805).
- CVE-2014-0222: Integer overflow in the qcow_open function in block/qcow.c allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2014-0222: Integer overflow in the qcow_open function in block/qcow.c allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2014-3640: The sosendto function in slirp/udp.c allowed local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket (bsc#897654).
- CVE-2014-3689: The vmware-vga driver (hw/display/vmware_vga.c) allowed local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling (bsc#901508).
- CVE-2014-7815: The set_pixel_format function in ui/vnc.c allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value (bsc#902737).
- CVE-2015-4037: The slirp_smb function in net/slirp.c created temporary files with predictable names, which allowed local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program (bnc#932267).
- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bnc#944463).
- CVE-2015-5278: Infinite loop in ne2000_receive() function (bsc#945989).
- CVE-2015-5307: The KVM subsystem allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c (bnc#953527).
- CVE-2015-6815: e1000: infinite loop issue (bnc#944697).
- CVE-2015-7504: Heap buffer overflow vulnerability in pcnet emulator (XSA-162) (bnc#956411).
- CVE-2015-7512: Buffer overflow in the pcnet_receive function in hw/net/pcnet.c, when a guest NIC has a larger MTU, allowed remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet (bsc#957162).
- CVE-2015-7835: The mod_l2_entry function in arch/x86/mm.c did not properly validate level 2 page table entries, which allowed local PV guest administrators to gain privileges via a crafted superpage mapping (bnc#950367).
- CVE-2015-7969: Multiple memory leaks allowed local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of 'teardowns' of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall (bnc#950703).
- CVE-2015-7969: Multiple memory leaks allowed local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of 'teardowns' of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall (bnc#950703).
- CVE-2015-7970: The p2m_pod_emergency_sweep function in arch/x86/mm/p2m-pod.c was not preemptible, which allowed local x86 HVM guest administrators to cause a denial of service (CPU consumption and possibly reboot) via crafted memory contents that triggers a 'time-consuming linear scan,' related to Populate-on-Demand (bnc#950704).
- CVE-2015-7971: There was no limit on the number of printk console messages when logging certain pmu and profiling hypercalls, which allowed local guests to cause a denial of service via a sequence of crafted (1) HYPERCALL_xenoprof_op hypercalls, which are not properly handled in the do_xenoprof_op function in common/xenoprof.c, or (2) HYPERVISOR_xenpmu_op hypercalls, which are not properly handled in the do_xenpmu_op function in arch/x86/cpu/vpmu.c (bnc#950706).
- CVE-2015-7972: The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c did not properly calculate the balloon size when using the populate-on-demand (PoD) system, which allowed local HVM guest users to cause a denial of service (guest crash) via unspecified vectors related to 'heavy memory pressure (bnc#951845).
- CVE-2015-8104: The KVM subsystem allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).
- CVE-2015-8339: The memory_exchange function in common/memory.c did not properly hand back pages to a domain, which might allowed guest OS administrators to cause a denial of service (host crash) via unspecified vectors related to domain teardown (bnc#956408).
- CVE-2015-8345: eepro100: infinite loop in processing command block list (bsc#956829).
- CVE-2015-8504: VNC: floating point exception (bsc#958491).
- CVE-2015-8550: Paravirtualized drivers were incautious about shared memory contents (XSA-155) (bsc#957988).
- CVE-2015-8554: qemu-dm buffer overrun in MSI-X handling (XSA-164) (bsc#958007).
- CVE-2015-8555: Information leak in legacy x86 FPU/XMM initialization (XSA-165) (bsc#958009).
- CVE-2015-8558: Infinite loop in ehci_advance_state resulted in DoS (bsc#959005).
- CVE-2015-8743: ne2000: OOB memory access in ioport r/w functions (bsc#960725).
- CVE-2015-8745: Reading IMR registers lead to a crash via assert(2) call (bsc#960707).
- CVE-2016-1571: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) (bsc#960862).
- CVE-2016-1714: nvram: OOB r/w access in processing firmware configurations (bsc#961691).
- CVE-2016-1981: e1000 infinite loop in start_xmit and e1000_receive_iov routines (bsc#963782).
- CVE-2016-2270: Xen allowed local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings (bsc#965315).
- CVE-2016-2271: VMX when using an Intel or Cyrix CPU, allowed local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP (bsc#965317).
- CVE-2016-2391: usb: multiple eof_timers in ohci module lead to NULL pointer dereference (bsc#967013).
- CVE-2016-2841: ne2000: Infinite loop in ne2000_receive (bsc#969350).
- XSA-166: ioreq handling possibly susceptible to multiple read issue (bsc#958523).

This non-security issue was fixed:
- bsc#967630: Discrepancy in reported memory size with correction XSA-153 for xend
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-19"/>
	<updated date="2016-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/864391">SUSE bug 864391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864655">SUSE bug 864655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864769">SUSE bug 864769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864805">SUSE bug 864805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864811">SUSE bug 864811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897654">SUSE bug 897654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901508">SUSE bug 901508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902737">SUSE bug 902737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944463">SUSE bug 944463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944697">SUSE bug 944697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945989">SUSE bug 945989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950704">SUSE bug 950704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951845">SUSE bug 951845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956411">SUSE bug 956411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956829">SUSE bug 956829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957162">SUSE bug 957162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958007">SUSE bug 958007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958009">SUSE bug 958009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958491">SUSE bug 958491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958493">SUSE bug 958493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958523">SUSE bug 958523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959005">SUSE bug 959005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960707">SUSE bug 960707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960725">SUSE bug 960725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960726">SUSE bug 960726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960862">SUSE bug 960862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961691">SUSE bug 961691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961692">SUSE bug 961692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962335">SUSE bug 962335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962360">SUSE bug 962360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962611">SUSE bug 962611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962627">SUSE bug 962627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962642">SUSE bug 962642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962758">SUSE bug 962758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963782">SUSE bug 963782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963783">SUSE bug 963783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964452">SUSE bug 964452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964644">SUSE bug 964644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964925">SUSE bug 964925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964947">SUSE bug 964947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965112">SUSE bug 965112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965315">SUSE bug 965315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965317">SUSE bug 965317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967013">SUSE bug 967013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967101">SUSE bug 967101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967630">SUSE bug 967630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969350">SUSE bug 969350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969351">SUSE bug 969351</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4533">CVE-2013-4533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4534">CVE-2013-4534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4537">CVE-2013-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4538">CVE-2013-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4539">CVE-2013-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0222">CVE-2014-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3640">CVE-2014-3640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3689/">CVE-2014-3689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3689">CVE-2014-3689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7815">CVE-2014-7815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4037">CVE-2015-4037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5239">CVE-2015-5239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5278">CVE-2015-5278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5307">CVE-2015-5307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6815">CVE-2015-6815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7504">CVE-2015-7504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7512">CVE-2015-7512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7835">CVE-2015-7835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7969">CVE-2015-7969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7970">CVE-2015-7970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7971">CVE-2015-7971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7972">CVE-2015-7972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8104">CVE-2015-8104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8339">CVE-2015-8339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8345">CVE-2015-8345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8504">CVE-2015-8504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8550">CVE-2015-8550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8554">CVE-2015-8554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8555">CVE-2015-8555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8558">CVE-2015-8558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8743">CVE-2015-8743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8745">CVE-2015-8745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1571">CVE-2016-1571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1714">CVE-2016-1714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1981">CVE-2016-1981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2270">CVE-2016-2270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2271">CVE-2016-2271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2391">CVE-2016-2391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2841">CVE-2016-2841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575442" comment="xen-4.0.3_21548_18-36.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575443" comment="xen-doc-html-4.0.3_21548_18-36.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575444" comment="xen-doc-pdf-4.0.3_21548_18-36.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575445" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.85.TDC-36.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575446" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.85.TDC-36.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575447" comment="xen-libs-4.0.3_21548_18-36.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575448" comment="xen-tools-4.0.3_21548_18-36.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575449" comment="xen-tools-domU-4.0.3_21548_18-36.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217894" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1000106" ref_url="https://bugzilla.suse.com/1000106" source="BUGZILLA"/>
		<reference ref_id="1000893" ref_url="https://bugzilla.suse.com/1000893" source="BUGZILLA"/>
		<reference ref_id="1003030" ref_url="https://bugzilla.suse.com/1003030" source="BUGZILLA"/>
		<reference ref_id="1003032" ref_url="https://bugzilla.suse.com/1003032" source="BUGZILLA"/>
		<reference ref_id="1005004" ref_url="https://bugzilla.suse.com/1005004" source="BUGZILLA"/>
		<reference ref_id="1005005" ref_url="https://bugzilla.suse.com/1005005" source="BUGZILLA"/>
		<reference ref_id="1007157" ref_url="https://bugzilla.suse.com/1007157" source="BUGZILLA"/>
		<reference ref_id="1009100" ref_url="https://bugzilla.suse.com/1009100" source="BUGZILLA"/>
		<reference ref_id="1009103" ref_url="https://bugzilla.suse.com/1009103" source="BUGZILLA"/>
		<reference ref_id="1009107" ref_url="https://bugzilla.suse.com/1009107" source="BUGZILLA"/>
		<reference ref_id="1009109" ref_url="https://bugzilla.suse.com/1009109" source="BUGZILLA"/>
		<reference ref_id="1009111" ref_url="https://bugzilla.suse.com/1009111" source="BUGZILLA"/>
		<reference ref_id="1011652" ref_url="https://bugzilla.suse.com/1011652" source="BUGZILLA"/>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="932267" ref_url="https://bugzilla.suse.com/932267" source="BUGZILLA"/>
		<reference ref_id="944463" ref_url="https://bugzilla.suse.com/944463" source="BUGZILLA"/>
		<reference ref_id="944697" ref_url="https://bugzilla.suse.com/944697" source="BUGZILLA"/>
		<reference ref_id="950367" ref_url="https://bugzilla.suse.com/950367" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950704" ref_url="https://bugzilla.suse.com/950704" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="951845" ref_url="https://bugzilla.suse.com/951845" source="BUGZILLA"/>
		<reference ref_id="953527" ref_url="https://bugzilla.suse.com/953527" source="BUGZILLA"/>
		<reference ref_id="954405" ref_url="https://bugzilla.suse.com/954405" source="BUGZILLA"/>
		<reference ref_id="956408" ref_url="https://bugzilla.suse.com/956408" source="BUGZILLA"/>
		<reference ref_id="956411" ref_url="https://bugzilla.suse.com/956411" source="BUGZILLA"/>
		<reference ref_id="956832" ref_url="https://bugzilla.suse.com/956832" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="958007" ref_url="https://bugzilla.suse.com/958007" source="BUGZILLA"/>
		<reference ref_id="958009" ref_url="https://bugzilla.suse.com/958009" source="BUGZILLA"/>
		<reference ref_id="958493" ref_url="https://bugzilla.suse.com/958493" source="BUGZILLA"/>
		<reference ref_id="958523" ref_url="https://bugzilla.suse.com/958523" source="BUGZILLA"/>
		<reference ref_id="960726" ref_url="https://bugzilla.suse.com/960726" source="BUGZILLA"/>
		<reference ref_id="960862" ref_url="https://bugzilla.suse.com/960862" source="BUGZILLA"/>
		<reference ref_id="961692" ref_url="https://bugzilla.suse.com/961692" source="BUGZILLA"/>
		<reference ref_id="962335" ref_url="https://bugzilla.suse.com/962335" source="BUGZILLA"/>
		<reference ref_id="962360" ref_url="https://bugzilla.suse.com/962360" source="BUGZILLA"/>
		<reference ref_id="962611" ref_url="https://bugzilla.suse.com/962611" source="BUGZILLA"/>
		<reference ref_id="962627" ref_url="https://bugzilla.suse.com/962627" source="BUGZILLA"/>
		<reference ref_id="962642" ref_url="https://bugzilla.suse.com/962642" source="BUGZILLA"/>
		<reference ref_id="962758" ref_url="https://bugzilla.suse.com/962758" source="BUGZILLA"/>
		<reference ref_id="963783" ref_url="https://bugzilla.suse.com/963783" source="BUGZILLA"/>
		<reference ref_id="964452" ref_url="https://bugzilla.suse.com/964452" source="BUGZILLA"/>
		<reference ref_id="964644" ref_url="https://bugzilla.suse.com/964644" source="BUGZILLA"/>
		<reference ref_id="964925" ref_url="https://bugzilla.suse.com/964925" source="BUGZILLA"/>
		<reference ref_id="964947" ref_url="https://bugzilla.suse.com/964947" source="BUGZILLA"/>
		<reference ref_id="965112" ref_url="https://bugzilla.suse.com/965112" source="BUGZILLA"/>
		<reference ref_id="965315" ref_url="https://bugzilla.suse.com/965315" source="BUGZILLA"/>
		<reference ref_id="965317" ref_url="https://bugzilla.suse.com/965317" source="BUGZILLA"/>
		<reference ref_id="967101" ref_url="https://bugzilla.suse.com/967101" source="BUGZILLA"/>
		<reference ref_id="967630" ref_url="https://bugzilla.suse.com/967630" source="BUGZILLA"/>
		<reference ref_id="969351" ref_url="https://bugzilla.suse.com/969351" source="BUGZILLA"/>
		<reference ref_id="973188" ref_url="https://bugzilla.suse.com/973188" source="BUGZILLA"/>
		<reference ref_id="974038" ref_url="https://bugzilla.suse.com/974038" source="BUGZILLA"/>
		<reference ref_id="975130" ref_url="https://bugzilla.suse.com/975130" source="BUGZILLA"/>
		<reference ref_id="975138" ref_url="https://bugzilla.suse.com/975138" source="BUGZILLA"/>
		<reference ref_id="978164" ref_url="https://bugzilla.suse.com/978164" source="BUGZILLA"/>
		<reference ref_id="978295" ref_url="https://bugzilla.suse.com/978295" source="BUGZILLA"/>
		<reference ref_id="980716" ref_url="https://bugzilla.suse.com/980716" source="BUGZILLA"/>
		<reference ref_id="980724" ref_url="https://bugzilla.suse.com/980724" source="BUGZILLA"/>
		<reference ref_id="981264" ref_url="https://bugzilla.suse.com/981264" source="BUGZILLA"/>
		<reference ref_id="982960" ref_url="https://bugzilla.suse.com/982960" source="BUGZILLA"/>
		<reference ref_id="983984" ref_url="https://bugzilla.suse.com/983984" source="BUGZILLA"/>
		<reference ref_id="988675" ref_url="https://bugzilla.suse.com/988675" source="BUGZILLA"/>
		<reference ref_id="990843" ref_url="https://bugzilla.suse.com/990843" source="BUGZILLA"/>
		<reference ref_id="995785" ref_url="https://bugzilla.suse.com/995785" source="BUGZILLA"/>
		<reference ref_id="995792" ref_url="https://bugzilla.suse.com/995792" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-3615" ref_url="https://www.suse.com/security/cve/CVE-2014-3615/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3672" ref_url="https://www.suse.com/security/cve/CVE-2014-3672/" source="CVE"/>
		<reference ref_id="CVE-2014-3689" ref_url="https://www.suse.com/security/cve/CVE-2014-3689/" source="CVE"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554/" source="CVE"/>
		<reference ref_id="CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270/" source="CVE"/>
		<reference ref_id="CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="CVE-2016-3158" ref_url="https://www.suse.com/security/cve/CVE-2016-3158/" source="CVE"/>
		<reference ref_id="CVE-2016-3159" ref_url="https://www.suse.com/security/cve/CVE-2016-3159/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3960" ref_url="https://www.suse.com/security/cve/CVE-2016-3960/" source="CVE"/>
		<reference ref_id="CVE-2016-4001" ref_url="https://www.suse.com/security/cve/CVE-2016-4001/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-4480" ref_url="https://www.suse.com/security/cve/CVE-2016-4480/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-7092" ref_url="https://www.suse.com/security/cve/CVE-2016-7092/" source="CVE"/>
		<reference ref_id="CVE-2016-7094" ref_url="https://www.suse.com/security/cve/CVE-2016-7094/" source="CVE"/>
		<reference ref_id="CVE-2016-7777" ref_url="https://www.suse.com/security/cve/CVE-2016-7777/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9379" ref_url="https://www.suse.com/security/cve/CVE-2016-9379/" source="CVE"/>
		<reference ref_id="CVE-2016-9380" ref_url="https://www.suse.com/security/cve/CVE-2016-9380/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9382" ref_url="https://www.suse.com/security/cve/CVE-2016-9382/" source="CVE"/>
		<reference ref_id="CVE-2016-9383" ref_url="https://www.suse.com/security/cve/CVE-2016-9383/" source="CVE"/>
		<reference ref_id="CVE-2016-9386" ref_url="https://www.suse.com/security/cve/CVE-2016-9386/" source="CVE"/>
		<reference ref_id="CVE-2016-9637" ref_url="https://www.suse.com/security/cve/CVE-2016-9637/" source="CVE"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2016-9637: ioport array overflow allowing a malicious guest administrator can escalate their privilege to that of the host (bsc#1011652)
- CVE-2016-9386: x86 null segments were not always treated as unusable allowing an unprivileged guest user program to elevate its privilege to that of the guest operating system. Exploit of this vulnerability is easy on Intel and more complicated on AMD (bsc#1009100)
- CVE-2016-9382: x86 task switch to VM86 mode was mis-handled, allowing a unprivileged guest process to escalate its privilege to that of the guest operating system on AMD hardware. On Intel hardware a malicious unprivileged guest process can crash the guest (bsc#1009103)
- CVE-2016-9383: The x86 64-bit bit test instruction emulation was broken, allowing a guest to modify arbitrary memory leading to arbitray code execution (bsc#1009107)
- CVE-2016-9381: Improper processing of shared rings allowing guest administrators take over the qemu process, elevating their privilege to that of the qemu process (bsc#1009109)
- CVE-2016-9380: Delimiter injection vulnerabilities in pygrub allowed guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111)
- CVE-2016-9379: Delimiter injection vulnerabilities in pygrub allowed guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111)
- CVE-2016-7777: Xen did not properly honor CR0.TS and CR0.EM, which allowed local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it (bsc#1000106)
- CVE-2016-8910: The rtl8139_cplus_transmit function in hw/net/rtl8139.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count (bsc#1007157)
- CVE-2016-8667: The rc4030_write function in hw/dma/rc4030.c in allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value (bsc#1005004)
- CVE-2016-8669: The serial_update_parameters function in hw/char/serial.c allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base (bsc#1005005)
- CVE-2016-7908: The mcf_fec_do_tx function in hw/net/mcf_fec.c did not properly limit the buffer descriptor count when transmitting packets, which allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags (bsc#1003030)
- CVE-2016-7909: The pcnet_rdra_addr function in hw/net/pcnet.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0 (bsc#1003032)
- CVE-2016-6351: The esp_do_dma function in hw/scsi/esp.c, when built with ESP/NCR53C9x controller emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the host via vectors involving DMA read into ESP command buffer (bsc#990843)
- CVE-2016-7094: Buffer overflow in Xen allowed local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update (bsc#995792)
- CVE-2016-7092: The get_page_from_l3e function in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables (bsc#995785)
- CVE-2016-6258: The PV pagetable code in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries (bsc#988675)
- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the host via vectors related to the information transfer buffer (bsc#983984)
- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c might have allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982960)
- CVE-2014-3672: The qemu implementation in libvirt Xen allowed local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr (bsc#981264)
- CVE-2016-4441: The get_cmd function in the 53C9X Fast SCSI Controller (FSC) support did not properly check DMA length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command (bsc#980724)
- CVE-2016-4439: The esp_reg_write function in the 53C9X Fast SCSI Controller (FSC) support did not properly check command buffer length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the host via unspecified vectors (bsc#980716)
- CVE-2016-3710: The VGA module improperly performed bounds checking on banked access to video memory, which allowed local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the 'Dark Portal' issue (bsc#978164)
- CVE-2016-4480: The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen did not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might have allowed local guest OS users to gain privileges via a crafted mapping of memory (bsc#978295)
- CVE-2016-3960: Integer overflow in the x86 shadow pagetable code allowed local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping (bsc#974038)
- CVE-2016-3158: The xrstor function did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188)
- CVE-2016-4001: Buffer overflow in the stellaris_enet_receive function, when the Stellaris ethernet controller is configured to accept large packets, allowed remote attackers to cause a denial of service (QEMU crash) via a large packet (bsc#975130)
- CVE-2016-4002: Buffer overflow in the mipsnet_receive function, when the guest NIC is configured to accept large packets, allowed remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes (bsc#975138)
- CVE-2016-2841: The ne2000_receive function in the NE2000 NIC emulation support (hw/net/ne2000.c) allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via crafted values for the PSTART and PSTOP registers, involving ring buffer control (bsc#969351).
- CVE-2016-2391: The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers (bsc#967101).
- CVE-2016-2270: Xen allowed local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings (bsc#965315).
- CVE-2016-2271: VMX in Xen, when using an Intel or Cyrix CPU, allowed local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP (bsc#965317).
- CVE-2014-3640: The sosendto function in slirp/udp.c allowed local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket (bsc#965112).
- CVE-2015-5278: Infinite loop in ne2000_receive() function allowed a privileged user inside the guest to crash the Qemu instance resulting in DoS (bsc#964947).
- CVE-2013-4533: Buffer overflow in the pxa2xx_ssp_load function in hw/arm/pxa2xx.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted s-&gt;rx_level value in a savevm image (bsc#964644).
- CVE-2014-0222: Integer overflow in the qcow_open function in block/qcow.c allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#964925).
- CVE-2013-4534: Buffer overflow in hw/intc/openpic.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via vectors related to IRQDest elements (bsc#964452).
- CVE-2016-1981: A:infinite loop in start_xmit and e1000_receive_iov routines allowed a privileged user inside the guest to crash the Qemu instance resulting in DoS (bsc#963783).
- CVE-2013-4539: Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c might have allowed remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image (bsc#962758).
- CVE-2013-4537: The ssi_sd_transfer function in hw/sd/ssi-sd.c allowed remote attackers to execute arbitrary code via a crafted arglen value in a savevm image (bsc#962642).
- CVE-2014-7815: The set_pixel_format function in ui/vnc.c allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value (bsc#962627).
- CVE-2014-3689: The vmware-vga driver (hw/display/vmware_vga.c) allowed local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling (bsc#962611).
- CVE-2013-4538: Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c allowed remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image (bsc#962335).
- CVE-2015-7512: Buffer overflow in the pcnet_receive function in hw/net/pcnet.c, when a guest NIC has a larger MTU, allowed remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet (bsc#962360).
- CVE-2016-1714: The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c when built with the Firmware Configuration device emulation support, allowed guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration (bsc#961692).
- CVE-2016-1571: The paging_invlpg function in include/asm-x86/paging.h in Xen when using shadow mode paging or nested virtualization is enabled, allowed local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction, which triggers a hypervisor bug check (bsc#960862).
- CVE-2015-8743: A OOB memory access in ioport r/w functions allowed a privileged (CAP_SYS_RAWIO) user/process to use this flaw to leak or corrupt Qemu memory bytes (bsc#960726).
- CVE-2015-8550: Xen, when used on a system providing PV backends, allowed local guest OS administrators to cause a denial of service (host OS crash) or gain privileges by writing to memory shared between the frontend and backend, aka a double fetch vulnerability (bsc#957988).
- CVE-2015-8554: Buffer overflow in hw/pt-msi.c in Xen, when using the qemu-xen-traditional (aka qemu-dm) device model, allowed local x86 HVM guest administrators to gain privileges by leveraging a system with access to a passed-through MSI-X capable physical PCI device and MSI-X table entries, related to a 'write path.'  (bsc#958007).
- CVE-2015-8555: Xen did not initialize x86 FPU stack and XMM registers when XSAVE/XRSTOR are not used to manage guest extended register state, which allowed local guest domains to obtain sensitive information from other domains via unspecified vectors (bsc#958009).
- CVE-2015-8339: The memory_exchange function in common/memory.c in Xen did not properly hand back pages to a domain, which might have allowed guest OS administrators to cause a denial of service (host crash) via unspecified vectors related to domain teardown (bsc#956408).
- CVE-2015-8104: The KVM subsystem might have allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c (bsc#954405).
- CVE-2015-5307: The KVM subsystem might allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c (bsc#953527).
- CVE-2015-7970: The p2m_pod_emergency_sweep function in arch/x86/mm/p2m-pod.c in Xen was not preemptible, which allowed local x86 HVM guest administrators to cause a denial of service (CPU consumption and possibly reboot) via crafted memory contents that triggers a 'time-consuming linear scan,' related to Populate-on-Demand (bsc#950704).
- CVE-2015-7972: The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c in Xen did not properly calculate the balloon size when using the populate-on-demand (PoD) system, which allowed local HVM guest users to cause a denial of service (guest crash) via unspecified vectors related to 'heavy memory pressure.' (bsc#951845).
- CVE-2015-7969: Multiple memory leaks in Xen allowed local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of 'teardowns' of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall (bsc#950703).
- CVE-2015-7969: Multiple memory leaks in Xen allowed local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of 'teardowns' of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall (bsc#950705).
- CVE-2015-7971: Xen did not limit the number of printk console messages when logging certain pmu and profiling hypercalls, which allowed local guests to cause a denial of service via a sequence of crafted (1) HYPERCALL_xenoprof_op hypercalls, which are not properly handled in the do_xenoprof_op function in common/xenoprof.c, or (2) HYPERVISOR_xenpmu_op hypercalls, which are not properly handled in the do_xenpmu_op function in arch/x86/cpu/vpmu.c (bsc#950706).
- CVE-2015-4037: The slirp_smb function in net/slirp.c in created temporary files with predictable names, which allowed local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files the program (bsc#932267).
- CVE-2014-0222: Integer overflow in the qcow_open function in block/qcow.c allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2015-7835: The mod_l2_entry function in arch/x86/mm.c did not properly validate level 2 page table entries, which allowed local PV guest administrators to gain privileges via a crafted superpage mapping (bsc#950367).
- CVE-2015-8504: The VNC display driver support was vulnerable to an arithmetic exception flaw that allowed a privileged remote client to crash the guest resulting in DoS (bsc#958493).
- CVE-2015-8345: The i8255x (PRO100) emulation support was vulnerable to an infinite loop issue that allowed a privileged (CAP_SYS_RAWIO) user inside guest to crash the Qemu instance resulting in DoS (bsc#956832).
- CVE-2015-7504: When using the AMD PC-Net II emulator(hw/net/pcnet.c) a heap buffer overflow could be triggered that could have allowed a guest to to take over the qemu process (bsc#956411).
- CVE-2015-5239: The VNC display driver was vulnerable to an infinite loop issue that allowed a privileged user inside guest to crash the Qemu instance resulting in DoS (bsc#944463).
- CVE-2015-6815: The e1000 NIC emulation support was vulnerable to an infinite loop issue that allowed a privileged user inside guest to crash the Qemu instance resulting in DoS (bsc#944697).

These non-security issues were fixed:

- bsc#1000893: virsh setmem won't allow to set current guest memory to max limit
- bsc#967630: Discrepancy in reported memory size with correction XSA-153 for xend                                 
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-16"/>
	<updated date="2016-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000106">SUSE bug 1000106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000893">SUSE bug 1000893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003030">SUSE bug 1003030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003032">SUSE bug 1003032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005004">SUSE bug 1005004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005005">SUSE bug 1005005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007157">SUSE bug 1007157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009100">SUSE bug 1009100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009103">SUSE bug 1009103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009107">SUSE bug 1009107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009109">SUSE bug 1009109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009111">SUSE bug 1009111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011652">SUSE bug 1011652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944463">SUSE bug 944463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944697">SUSE bug 944697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950704">SUSE bug 950704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951845">SUSE bug 951845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956411">SUSE bug 956411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956832">SUSE bug 956832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958007">SUSE bug 958007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958009">SUSE bug 958009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958493">SUSE bug 958493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958523">SUSE bug 958523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960726">SUSE bug 960726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960862">SUSE bug 960862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961692">SUSE bug 961692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962335">SUSE bug 962335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962360">SUSE bug 962360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962611">SUSE bug 962611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962627">SUSE bug 962627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962642">SUSE bug 962642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962758">SUSE bug 962758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963783">SUSE bug 963783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964452">SUSE bug 964452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964644">SUSE bug 964644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964925">SUSE bug 964925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964947">SUSE bug 964947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965112">SUSE bug 965112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965315">SUSE bug 965315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965317">SUSE bug 965317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967101">SUSE bug 967101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967630">SUSE bug 967630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969351">SUSE bug 969351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973188">SUSE bug 973188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974038">SUSE bug 974038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975130">SUSE bug 975130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975138">SUSE bug 975138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978164">SUSE bug 978164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978295">SUSE bug 978295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980716">SUSE bug 980716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980724">SUSE bug 980724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981264">SUSE bug 981264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982960">SUSE bug 982960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983984">SUSE bug 983984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988675">SUSE bug 988675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990843">SUSE bug 990843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995785">SUSE bug 995785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995792">SUSE bug 995792</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4533">CVE-2013-4533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4534">CVE-2013-4534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4537">CVE-2013-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4538">CVE-2013-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4539">CVE-2013-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0222">CVE-2014-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3615/">CVE-2014-3615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3615">CVE-2014-3615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3640">CVE-2014-3640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3672/">CVE-2014-3672 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3672">CVE-2014-3672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3689/">CVE-2014-3689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3689">CVE-2014-3689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7815">CVE-2014-7815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4037">CVE-2015-4037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5239">CVE-2015-5239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5278">CVE-2015-5278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5307">CVE-2015-5307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6815">CVE-2015-6815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7504">CVE-2015-7504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7512">CVE-2015-7512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7835">CVE-2015-7835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7969">CVE-2015-7969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7970">CVE-2015-7970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7971">CVE-2015-7971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7972">CVE-2015-7972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8104">CVE-2015-8104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8339">CVE-2015-8339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8340">CVE-2015-8340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8345">CVE-2015-8345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8504">CVE-2015-8504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8550">CVE-2015-8550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8554">CVE-2015-8554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8555">CVE-2015-8555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8743">CVE-2015-8743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1571">CVE-2016-1571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1714">CVE-2016-1714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1981">CVE-2016-1981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2270">CVE-2016-2270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2271">CVE-2016-2271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2391">CVE-2016-2391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2841">CVE-2016-2841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3158/">CVE-2016-3158 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3158">CVE-2016-3158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3159/">CVE-2016-3159 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3159">CVE-2016-3159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3710">CVE-2016-3710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3960/">CVE-2016-3960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3960">CVE-2016-3960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4001/">CVE-2016-4001 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4001">CVE-2016-4001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4002">CVE-2016-4002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4439">CVE-2016-4439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4441">CVE-2016-4441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4480/">CVE-2016-4480 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4480">CVE-2016-4480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5238">CVE-2016-5238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5338">CVE-2016-5338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6258">CVE-2016-6258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6351">CVE-2016-6351 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7092/">CVE-2016-7092 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7092">CVE-2016-7092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7094/">CVE-2016-7094 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7094">CVE-2016-7094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7777/">CVE-2016-7777 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7777">CVE-2016-7777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7908">CVE-2016-7908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7909">CVE-2016-7909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8667">CVE-2016-8667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8669">CVE-2016-8669 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8910">CVE-2016-8910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9379/">CVE-2016-9379 at SUSE</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9379">CVE-2016-9379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9380/">CVE-2016-9380 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9380">CVE-2016-9380 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9381">CVE-2016-9381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9382/">CVE-2016-9382 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9382">CVE-2016-9382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9383/">CVE-2016-9383 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9383">CVE-2016-9383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9386/">CVE-2016-9386 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9386">CVE-2016-9386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9637/">CVE-2016-9637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9637">CVE-2016-9637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575450" comment="xen-4.0.3_21548_18-41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575451" comment="xen-doc-html-4.0.3_21548_18-41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575452" comment="xen-doc-pdf-4.0.3_21548_18-41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575453" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.94.TDC-41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575454" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.94.TDC-41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575455" comment="xen-libs-4.0.3_21548_18-41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575456" comment="xen-tools-4.0.3_21548_18-41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575457" comment="xen-tools-domU-4.0.3_21548_18-41.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217895" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1012651" ref_url="https://bugzilla.suse.com/1012651" source="BUGZILLA"/>
		<reference ref_id="1014298" ref_url="https://bugzilla.suse.com/1014298" source="BUGZILLA"/>
		<reference ref_id="1016340" ref_url="https://bugzilla.suse.com/1016340" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10013" ref_url="https://www.suse.com/security/cve/CVE-2016-10013/" source="CVE"/>
		<reference ref_id="CVE-2016-10024" ref_url="https://www.suse.com/security/cve/CVE-2016-10024/" source="CVE"/>
		<reference ref_id="CVE-2016-9932" ref_url="https://www.suse.com/security/cve/CVE-2016-9932/" source="CVE"/>
		<description>

This update for xen fixes the following issues:

- A Mishandling of SYSCALL singlestep during emulation which could
  have lead to privilege escalation. (XSA-204, bsc#1016340, CVE-2016-10013)
- CMPXCHG8B emulation failed to ignore operand size override which could have
  lead to information disclosure. (XSA-200, bsc#1012651, CVE-2016-9932)
- PV guests may have been able to mask interrupts causing a Denial of Service.
  (XSA-202, bsc#1014298, CVE-2016-10024)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-10"/>
	<updated date="2017-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012651">SUSE bug 1012651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014298">SUSE bug 1014298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016340">SUSE bug 1016340</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10013/">CVE-2016-10013 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10013">CVE-2016-10013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10024/">CVE-2016-10024 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10024">CVE-2016-10024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9932/">CVE-2016-9932 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9932">CVE-2016-9932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575458" comment="xen-4.0.3_21548_18-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575459" comment="xen-doc-html-4.0.3_21548_18-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575460" comment="xen-doc-pdf-4.0.3_21548_18-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575461" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.97.TDC-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575462" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.97.TDC-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575463" comment="xen-libs-4.0.3_21548_18-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575464" comment="xen-tools-4.0.3_21548_18-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575465" comment="xen-tools-domU-4.0.3_21548_18-44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217896" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1013657" ref_url="https://bugzilla.suse.com/1013657" source="BUGZILLA"/>
		<reference ref_id="1014298" ref_url="https://bugzilla.suse.com/1014298" source="BUGZILLA"/>
		<reference ref_id="1015169" ref_url="https://bugzilla.suse.com/1015169" source="BUGZILLA"/>
		<reference ref_id="1022871" ref_url="https://bugzilla.suse.com/1022871" source="BUGZILLA"/>
		<reference ref_id="1023004" ref_url="https://bugzilla.suse.com/1023004" source="BUGZILLA"/>
		<reference ref_id="1024834" ref_url="https://bugzilla.suse.com/1024834" source="BUGZILLA"/>
		<reference ref_id="1028235" ref_url="https://bugzilla.suse.com/1028235" source="BUGZILLA"/>
		<reference ref_id="1030442" ref_url="https://bugzilla.suse.com/1030442" source="BUGZILLA"/>
		<reference ref_id="907805" ref_url="https://bugzilla.suse.com/907805" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="CVE-2016-10024" ref_url="https://www.suse.com/security/cve/CVE-2016-10024/" source="CVE"/>
		<reference ref_id="CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-7228" ref_url="https://www.suse.com/security/cve/CVE-2017-7228/" source="CVE"/>
		<description>

This update for xen fixes several issues:

These security issues were fixed:

- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024834)
- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)
- CVE-2014-8106: A heap-based buffer overflow in the Cirrus VGA emulator allowed local guest users to execute arbitrary code via vectors related to blit regions (bsc#907805)
- A malicious guest could have, by frequently rebooting over extended periods of time, run the host system out of memory, resulting in a Denial of Service (DoS) (bsc#1022871)
- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)
- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013657)
- CVE-2016-10024: Xen allowed local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations (bsc#1014298).
- CVE-2017-7228: Broken check in memory_exchange() permited PV guest breakout (bsc#1030442).
- CVE-2017-6505: The ohci_service_ed_list function in hw/usb/hcd-ohci.c allowed local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors (bsc#1028235).
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-28"/>
	<updated date="2017-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013657">SUSE bug 1013657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014298">SUSE bug 1014298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015169">SUSE bug 1015169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022871">SUSE bug 1022871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024834">SUSE bug 1024834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028235">SUSE bug 1028235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030442">SUSE bug 1030442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907805">SUSE bug 907805</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8106">CVE-2014-8106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10024/">CVE-2016-10024 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10024">CVE-2016-10024 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9776">CVE-2016-9776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9921">CVE-2016-9921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9922">CVE-2016-9922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2615">CVE-2017-2615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2620">CVE-2017-2620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6505">CVE-2017-6505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7228/">CVE-2017-7228 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7228">CVE-2017-7228 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575466" comment="xen-4.0.3_21548_18-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575467" comment="xen-doc-html-4.0.3_21548_18-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575468" comment="xen-doc-pdf-4.0.3_21548_18-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575469" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.103.TDC-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575470" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.103.TDC-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575471" comment="xen-libs-4.0.3_21548_18-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575472" comment="xen-tools-4.0.3_21548_18-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575473" comment="xen-tools-domU-4.0.3_21548_18-49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217897" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1028655" ref_url="https://bugzilla.suse.com/1028655" source="BUGZILLA"/>
		<reference ref_id="1033948" ref_url="https://bugzilla.suse.com/1033948" source="BUGZILLA"/>
		<reference ref_id="1034843" ref_url="https://bugzilla.suse.com/1034843" source="BUGZILLA"/>
		<reference ref_id="1034844" ref_url="https://bugzilla.suse.com/1034844" source="BUGZILLA"/>
		<reference ref_id="1034845" ref_url="https://bugzilla.suse.com/1034845" source="BUGZILLA"/>
		<reference ref_id="1034994" ref_url="https://bugzilla.suse.com/1034994" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9603" ref_url="https://www.suse.com/security/cve/CVE-2016-9603/" source="CVE"/>
		<reference ref_id="CVE-2017-7718" ref_url="https://www.suse.com/security/cve/CVE-2017-7718/" source="CVE"/>
		<reference ref_id="CVE-2017-7995" ref_url="https://www.suse.com/security/cve/CVE-2017-7995/" source="CVE"/>
		<description>

This update for xen fixes the following security issues:

- A malicious 64-bit PV guest may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks by placing a IRET hypercall in the middle of a multicall batch (XSA-213, bsc#1034843)
- A malicious pair of guests may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks because of a missing check when transfering pages via GNTTABOP_transfer (XSA-214, bsc#1034844).
- CVE-2017-7718: hw/display/cirrus_vga_rop.h allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions (bsc#1034994).
- CVE-2016-9603: A privileged user within the guest VM could have caused a heap overflow in the device model process, potentially escalating their privileges to that of the device model process (bsc#1028655)
- CVE-2017-7995: Incorrect address range validation potentially allowing PV guests to access MMIO memory with read side effects (bsc#1033948).
- Incorrect checks when handling exceptions allowed a malicious or buggy 64-bit PV guest to modify part of a physical memory page not belonging to it, potentially allowing for all of privilege escalation, host or other guest crashes, and information leaks (XSA-215, bsc#1034845)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-02"/>
	<updated date="2017-05-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1028655">SUSE bug 1028655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033948">SUSE bug 1033948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034843">SUSE bug 1034843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034844">SUSE bug 1034844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034845">SUSE bug 1034845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034994">SUSE bug 1034994</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9603/">CVE-2016-9603 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9603">CVE-2016-9603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7718/">CVE-2017-7718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7718">CVE-2017-7718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7995/">CVE-2017-7995 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7995">CVE-2017-7995 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575474" comment="xen-4.0.3_21548_18-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575475" comment="xen-doc-html-4.0.3_21548_18-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575476" comment="xen-doc-pdf-4.0.3_21548_18-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575477" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.103.TDC-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575478" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.103.TDC-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575479" comment="xen-libs-4.0.3_21548_18-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575480" comment="xen-tools-4.0.3_21548_18-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575481" comment="xen-tools-domU-4.0.3_21548_18-52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217898" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1034845" ref_url="https://bugzilla.suse.com/1034845" source="BUGZILLA"/>
		<reference ref_id="1037243" ref_url="https://bugzilla.suse.com/1037243" source="BUGZILLA"/>
		<reference ref_id="1042160" ref_url="https://bugzilla.suse.com/1042160" source="BUGZILLA"/>
		<reference ref_id="1042882" ref_url="https://bugzilla.suse.com/1042882" source="BUGZILLA"/>
		<reference ref_id="1042931" ref_url="https://bugzilla.suse.com/1042931" source="BUGZILLA"/>
		<reference ref_id="1042938" ref_url="https://bugzilla.suse.com/1042938" source="BUGZILLA"/>
		<reference ref_id="1046637" ref_url="https://bugzilla.suse.com/1046637" source="BUGZILLA"/>
		<reference ref_id="1049578" ref_url="https://bugzilla.suse.com/1049578" source="BUGZILLA"/>
		<reference ref_id="1051787" ref_url="https://bugzilla.suse.com/1051787" source="BUGZILLA"/>
		<reference ref_id="1051788" ref_url="https://bugzilla.suse.com/1051788" source="BUGZILLA"/>
		<reference ref_id="1052686" ref_url="https://bugzilla.suse.com/1052686" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-10912" ref_url="https://www.suse.com/security/cve/CVE-2017-10912/" source="CVE"/>
		<reference ref_id="CVE-2017-10918" ref_url="https://www.suse.com/security/cve/CVE-2017-10918/" source="CVE"/>
		<reference ref_id="CVE-2017-10920" ref_url="https://www.suse.com/security/cve/CVE-2017-10920/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-12135" ref_url="https://www.suse.com/security/cve/CVE-2017-12135/" source="CVE"/>
		<reference ref_id="CVE-2017-12137" ref_url="https://www.suse.com/security/cve/CVE-2017-12137/" source="CVE"/>
		<reference ref_id="CVE-2017-12855" ref_url="https://www.suse.com/security/cve/CVE-2017-12855/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-8905" ref_url="https://www.suse.com/security/cve/CVE-2017-8905/" source="CVE"/>
		<reference ref_id="CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330/" source="CVE"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-12855: Premature clearing of GTF_writing / GTF_reading lead to
  potentially leaking sensitive information (XSA-230 bsc#1052686).
- CVE-2017-12135: Unbounded recursion in grant table code allowed a malicious
  guest to crash the host or potentially escalate privileges/leak information
  (XSA-226, bsc#1051787).
- CVE-2017-12137: Incorrectly-aligned updates to pagetables allowed for
  privilege escalation (XSA-227, bsc#1051788).
- CVE-2017-11434: The dhcp_decode function in slirp/bootp.c allowed local guest
  OS users to cause a denial of service (out-of-bounds read) via a crafted DHCP
  options string (bsc#1049578).
- CVE-2017-10664: qemu-nbd did not ignore SIGPIPE, which allowed remote
  attackers to cause a denial of service (daemon crash) by disconnecting during
  a server-to-client reply attempt (bsc#1046637).
- CVE-2017-8905: Fixed a memory corruption via a failsafe callback, which might
  have allowed PV guest OS users to execute arbitrary code on the host OS
  (XSA-215, bsc#1034845).
- CVE-2017-10912: Xen mishandled page transfer, which allowed guest OS users to
  obtain privileged host OS access (XSA-217, bsc#1042882).
- CVE-2017-10918: Xen did not validate memory allocations during certain P2M
  operations, which allowed guest OS users to obtain privileged host OS access
  (XSA-222, bsc#1042931).
- CVE-2017-10920: The grant-table feature in Xen mishandled a GNTMAP_device_map
  and GNTMAP_host_map mapping, when followed by only a GNTMAP_host_map unmapping,
  which allowed guest OS users to cause a denial of service (count mismanagement
  and memory corruption) or obtain privileged host OS access (XSA-224,
  bsc#1042938).
- CVE-2017-9330: USB OHCI Emulation in qemu allowed local guest OS users to
  cause a denial of service (infinite loop) by leveraging an incorrect return
  value (bsc#1042160)
- CVE-2017-8309: Memory leak in the audio/audio.c allowed remote attackers to
  cause a denial of service (memory consumption) by repeatedly starting and
  stopping audio capture (bsc#1037243)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-04"/>
	<updated date="2017-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1034845">SUSE bug 1034845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037243">SUSE bug 1037243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042160">SUSE bug 1042160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042882">SUSE bug 1042882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042931">SUSE bug 1042931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042938">SUSE bug 1042938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046637">SUSE bug 1046637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049578">SUSE bug 1049578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051787">SUSE bug 1051787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051788">SUSE bug 1051788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052686">SUSE bug 1052686</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10664">CVE-2017-10664 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10912/">CVE-2017-10912 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10912">CVE-2017-10912 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10918/">CVE-2017-10918 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10918">CVE-2017-10918 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10920/">CVE-2017-10920 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10920">CVE-2017-10920 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11434">CVE-2017-11434 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12135/">CVE-2017-12135 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12135">CVE-2017-12135 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12137/">CVE-2017-12137 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12137">CVE-2017-12137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12855/">CVE-2017-12855 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12855">CVE-2017-12855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8309">CVE-2017-8309 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8905/">CVE-2017-8905 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8905">CVE-2017-8905 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9330">CVE-2017-9330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575482" comment="xen-4.0.3_21548_18-53.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575483" comment="xen-doc-html-4.0.3_21548_18-53.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575484" comment="xen-doc-pdf-4.0.3_21548_18-53.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575485" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.112.TDC-53.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575486" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.112.TDC-53.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575487" comment="xen-libs-4.0.3_21548_18-53.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575488" comment="xen-tools-4.0.3_21548_18-53.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575489" comment="xen-tools-domU-4.0.3_21548_18-53.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217899" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1056281" ref_url="https://bugzilla.suse.com/1056281" source="BUGZILLA"/>
		<reference ref_id="1056282" ref_url="https://bugzilla.suse.com/1056282" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14317" ref_url="https://www.suse.com/security/cve/CVE-2017-14317/" source="CVE"/>
		<reference ref_id="CVE-2017-14319" ref_url="https://www.suse.com/security/cve/CVE-2017-14319/" source="CVE"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-14317: A race in cxenstored may have cause a double-free allowind for
  DoS of the xenstored daemon (XSA-233, bsc#1056281).
- CVE-2017-14319: An error while handling grant mappings allowed malicious or
  buggy x86 PV guest to escalate its privileges or crash the hypervisor (XSA-234,
  bsc#1056282).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-12"/>
	<updated date="2017-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056281">SUSE bug 1056281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056282">SUSE bug 1056282</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14317/">CVE-2017-14317 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14317">CVE-2017-14317 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14319/">CVE-2017-14319 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14319">CVE-2017-14319 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575490" comment="xen-4.0.3_21548_18-53.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575491" comment="xen-doc-html-4.0.3_21548_18-53.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575492" comment="xen-doc-pdf-4.0.3_21548_18-53.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575493" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.112.TDC-53.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575494" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.112.TDC-53.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575495" comment="xen-libs-4.0.3_21548_18-53.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575496" comment="xen-tools-4.0.3_21548_18-53.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575497" comment="xen-tools-domU-4.0.3_21548_18-53.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217900" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1059777" ref_url="https://bugzilla.suse.com/1059777" source="BUGZILLA"/>
		<reference ref_id="1061076" ref_url="https://bugzilla.suse.com/1061076" source="BUGZILLA"/>
		<reference ref_id="1061080" ref_url="https://bugzilla.suse.com/1061080" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1061082" ref_url="https://bugzilla.suse.com/1061082" source="BUGZILLA"/>
		<reference ref_id="1061084" ref_url="https://bugzilla.suse.com/1061084" source="BUGZILLA"/>
		<reference ref_id="1061086" ref_url="https://bugzilla.suse.com/1061086" source="BUGZILLA"/>
		<reference ref_id="1061087" ref_url="https://bugzilla.suse.com/1061087" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15588" ref_url="https://www.suse.com/security/cve/CVE-2017-15588/" source="CVE"/>
		<reference ref_id="CVE-2017-15589" ref_url="https://www.suse.com/security/cve/CVE-2017-15589/" source="CVE"/>
		<reference ref_id="CVE-2017-15590" ref_url="https://www.suse.com/security/cve/CVE-2017-15590/" source="CVE"/>
		<reference ref_id="CVE-2017-15592" ref_url="https://www.suse.com/security/cve/CVE-2017-15592/" source="CVE"/>
		<reference ref_id="CVE-2017-15593" ref_url="https://www.suse.com/security/cve/CVE-2017-15593/" source="CVE"/>
		<reference ref_id="CVE-2017-15594" ref_url="https://www.suse.com/security/cve/CVE-2017-15594/" source="CVE"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526/" source="CVE"/>
		<description>
This update for xen fixes several issues:

These security issues were fixed:

- CVE-2017-5526: The ES1370 audio device emulation support was vulnerable to a
  memory leakage issue allowing a privileged user inside the guest to cause a DoS
  and/or potentially crash the Qemu process on the host (bsc#1059777)
- CVE-2017-15593: Missing cleanup in the page type system allowed a malicious or
  buggy PV guest to cause DoS (XSA-242 bsc#1061084)
- CVE-2017-15592: A problem in the shadow pagetable code allowed a malicious or
  buggy HVM guest to cause DoS or cause hypervisor memory corruption potentially
  allowing the guest to escalate its privilege (XSA-243 bsc#1061086)
- CVE-2017-15594: Problematic handling of the selector fields in the Interrupt
  Descriptor Table (IDT) allowed a malicious or buggy x86 PV guest to escalate
  its privileges or cause DoS (XSA-244 bsc#1061087)
- CVE-2017-15589: Intercepted I/O write operations with less than a full machine
  word's worth of data were not properly handled, which allowed a malicious
  unprivileged x86 HVM guest to obtain sensitive information from the host or
  other guests (XSA-239 bsc#1061080)
- CVE-2017-15595: In certain configurations of linear page tables a stack overflow
  might have occured that allowed a malicious or buggy PV guest to cause DoS and
  potentially privilege escalation and information leaks (XSA-240 bsc#1061081)
- CVE-2017-15588: Under certain conditions x86 PV guests could have caused the
  hypervisor to miss a necessary TLB flush for a page. This allowed a malicious
  x86 PV guest to access all of system memory, allowing for privilege escalation,
  DoS, and information leaks (XSA-241 bsc#1061082)
- CVE-2017-15590: Multiple issues existed with the setup of PCI MSI interrupts
  that allowed a malicious or buggy guest to cause DoS and potentially privilege
  escalation and information leaks (XSA-237 bsc#1061076)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-06"/>
	<updated date="2017-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059777">SUSE bug 1059777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061076">SUSE bug 1061076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061080">SUSE bug 1061080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061082">SUSE bug 1061082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061084">SUSE bug 1061084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061086">SUSE bug 1061086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061087">SUSE bug 1061087</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15588/">CVE-2017-15588 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15588">CVE-2017-15588 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15589/">CVE-2017-15589 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15589">CVE-2017-15589 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15590/">CVE-2017-15590 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15590">CVE-2017-15590 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15592/">CVE-2017-15592 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15592">CVE-2017-15592 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15593/">CVE-2017-15593 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15593">CVE-2017-15593 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15594/">CVE-2017-15594 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15594">CVE-2017-15594 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15595">CVE-2017-15595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5526">CVE-2017-5526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575498" comment="xen-4.0.3_21548_18-53.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575499" comment="xen-doc-html-4.0.3_21548_18-53.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575500" comment="xen-doc-pdf-4.0.3_21548_18-53.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575501" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.116.TDC-53.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575502" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.116.TDC-53.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575503" comment="xen-libs-4.0.3_21548_18-53.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575504" comment="xen-tools-4.0.3_21548_18-53.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575505" comment="xen-tools-domU-4.0.3_21548_18-53.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217901" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1061086" ref_url="https://bugzilla.suse.com/1061086" source="BUGZILLA"/>
		<reference ref_id="1063123" ref_url="https://bugzilla.suse.com/1063123" source="BUGZILLA"/>
		<reference ref_id="1068187" ref_url="https://bugzilla.suse.com/1068187" source="BUGZILLA"/>
		<reference ref_id="1068191" ref_url="https://bugzilla.suse.com/1068191" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-15592" ref_url="https://www.suse.com/security/cve/CVE-2017-15592/" source="CVE"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- bsc#1068187: Failure to recognize errors in the Populate on Demand (PoD) code
  allowed for DoS (XSA-246)
- bsc#1068191: Missing p2m error checking in PoD code allowed unprivileged guests
  to retain a writable mapping of freed memory leading to information leaks,
  privilege escalation or DoS (XSA-247).
- CVE-2017-15289: The mode4and5 write functions allowed local OS guest privileged
  users to cause a denial of service (out-of-bounds write access and Qemu process
  crash) via vectors related to dst calculation (bsc#1063123)
- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS (unbounded
  recursion, stack consumption, and hypervisor crash) or possibly gain privileges
  via crafted page-table stacking (bsc#1061081).
- CVE-2017-15592: x86 HVM guest OS users were able to cause a DoS (hypervisor
  crash) or possibly gain privileges because self-linear shadow mappings were
  mishandled for translated guests (bsc#1061086).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-07"/>
	<updated date="2017-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061086">SUSE bug 1061086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063123">SUSE bug 1063123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068187">SUSE bug 1068187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068191">SUSE bug 1068191</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15289">CVE-2017-15289 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15592/">CVE-2017-15592 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15592">CVE-2017-15592 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15595">CVE-2017-15595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575506" comment="xen-4.0.3_21548_18-53.14.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575507" comment="xen-doc-html-4.0.3_21548_18-53.14.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575508" comment="xen-doc-pdf-4.0.3_21548_18-53.14.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575509" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.122.TDC-53.14.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575510" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.122.TDC-53.14.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575511" comment="xen-libs-4.0.3_21548_18-53.14.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575512" comment="xen-tools-4.0.3_21548_18-53.14.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575513" comment="xen-tools-domU-4.0.3_21548_18-53.14.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217902" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1030144" ref_url="https://bugzilla.suse.com/1030144" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1070158" ref_url="https://bugzilla.suse.com/1070158" source="BUGZILLA"/>
		<reference ref_id="1070160" ref_url="https://bugzilla.suse.com/1070160" source="BUGZILLA"/>
		<reference ref_id="1070163" ref_url="https://bugzilla.suse.com/1070163" source="BUGZILLA"/>
		<reference ref_id="1076116" ref_url="https://bugzilla.suse.com/1076116" source="BUGZILLA"/>
		<reference ref_id="1076180" ref_url="https://bugzilla.suse.com/1076180" source="BUGZILLA"/>
		<reference ref_id="1089152" ref_url="https://bugzilla.suse.com/1089152" source="BUGZILLA"/>
		<reference ref_id="1090820" ref_url="https://bugzilla.suse.com/1090820" source="BUGZILLA"/>
		<reference ref_id="1090822" ref_url="https://bugzilla.suse.com/1090822" source="BUGZILLA"/>
		<reference ref_id="1090823" ref_url="https://bugzilla.suse.com/1090823" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17564" ref_url="https://www.suse.com/security/cve/CVE-2017-17564/" source="CVE"/>
		<reference ref_id="CVE-2017-17565" ref_url="https://www.suse.com/security/cve/CVE-2017-17565/" source="CVE"/>
		<reference ref_id="CVE-2017-17566" ref_url="https://www.suse.com/security/cve/CVE-2017-17566/" source="CVE"/>
		<reference ref_id="CVE-2017-18030" ref_url="https://www.suse.com/security/cve/CVE-2017-18030/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-5683" ref_url="https://www.suse.com/security/cve/CVE-2018-5683/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2018-8897: Prevent mishandling of debug exceptions on x86 (XSA-260, bsc#1090820)
- Handle HPET timers in IO-APIC mode correctly to prevent malicious or buggy
  HVM guests from causing a hypervisor crash or potentially privilege
  escalation/information leaks (XSA-261, bsc#1090822)
- Prevent unbounded loop, induced by qemu allowing an attacker to permanently
  keep a physical CPU core busy (XSA-262, bsc#1090823)
- CVE-2018-5683: The vga_draw_text function allowed local OS guest privileged
  users to cause a denial of service (out-of-bounds read and QEMU process crash)
  by leveraging improper memory address validation (bsc#1076116)
- CVE-2017-18030: The cirrus_invalidate_region function allowed local OS guest
  privileged users to cause a denial of service (out-of-bounds array access and
  QEMU process crash) via vectors related to negative pitch (bsc#1076180)
- CVE-2017-17566: Prevent PV guest OS users to cause a denial of service (host
  OS crash) or gain host OS privileges in shadow mode by mapping a certain
  auxiliary page (bsc#1070158)
- CVE-2017-17564: Prevent guest OS users to cause a denial of service (host OS
  crash) or gain host OS privileges by leveraging incorrect error handling for
  reference counting in shadow mode (bsc#1070160)
- CVE-2017-17565: Prevent PV guest OS users to cause a denial of service (host
  OS crash) if shadow mode and log-dirty mode are in place, because of an
  incorrect assertion related to M2P (bsc#1070163)
- CVE-2017-5715: Prevent side channel attacks aka Spectre and Meltdown (bsc#1068032)
- Prevent denial of service against xenstore via repeated updates (bsc#1030144, XSA-206)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-11"/>
	<updated date="2018-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1030144">SUSE bug 1030144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070158">SUSE bug 1070158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070160">SUSE bug 1070160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070163">SUSE bug 1070163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076116">SUSE bug 1076116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076180">SUSE bug 1076180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089152">SUSE bug 1089152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090820">SUSE bug 1090820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090822">SUSE bug 1090822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090823">SUSE bug 1090823</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17564/">CVE-2017-17564 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17564">CVE-2017-17564 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17565/">CVE-2017-17565 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17565">CVE-2017-17565 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17566/">CVE-2017-17566 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17566">CVE-2017-17566 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18030/">CVE-2017-18030 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18030">CVE-2017-18030 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5683/">CVE-2018-5683 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5683">CVE-2018-5683 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8897">CVE-2018-8897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575514" comment="xen-4.0.3_21548_18-53.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575515" comment="xen-doc-html-4.0.3_21548_18-53.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575516" comment="xen-doc-pdf-4.0.3_21548_18-53.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575517" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.133.TDC-53.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575518" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.133.TDC-53.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575519" comment="xen-libs-4.0.3_21548_18-53.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575520" comment="xen-tools-4.0.3_21548_18-53.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575521" comment="xen-tools-domU-4.0.3_21548_18-53.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217903" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1022555" ref_url="https://bugzilla.suse.com/1022555" source="BUGZILLA"/>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1029827" ref_url="https://bugzilla.suse.com/1029827" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1089635" ref_url="https://bugzilla.suse.com/1089635" source="BUGZILLA"/>
		<reference ref_id="1090822" ref_url="https://bugzilla.suse.com/1090822" source="BUGZILLA"/>
		<reference ref_id="1090823" ref_url="https://bugzilla.suse.com/1090823" source="BUGZILLA"/>
		<reference ref_id="1091107" ref_url="https://bugzilla.suse.com/1091107" source="BUGZILLA"/>
		<reference ref_id="1092631" ref_url="https://bugzilla.suse.com/1092631" source="BUGZILLA"/>
		<reference ref_id="1095242" ref_url="https://bugzilla.suse.com/1095242" source="BUGZILLA"/>
		<reference ref_id="1096224" ref_url="https://bugzilla.suse.com/1096224" source="BUGZILLA"/>
		<reference ref_id="1097521" ref_url="https://bugzilla.suse.com/1097521" source="BUGZILLA"/>
		<reference ref_id="1097522" ref_url="https://bugzilla.suse.com/1097522" source="BUGZILLA"/>
		<reference ref_id="1111014" ref_url="https://bugzilla.suse.com/1111014" source="BUGZILLA"/>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1114423" ref_url="https://bugzilla.suse.com/1114423" source="BUGZILLA"/>
		<reference ref_id="1114988" ref_url="https://bugzilla.suse.com/1114988" source="BUGZILLA"/>
		<reference ref_id="1115040" ref_url="https://bugzilla.suse.com/1115040" source="BUGZILLA"/>
		<reference ref_id="1115047" ref_url="https://bugzilla.suse.com/1115047" source="BUGZILLA"/>
		<reference ref_id="1117756" ref_url="https://bugzilla.suse.com/1117756" source="BUGZILLA"/>
		<reference ref_id="1123157" ref_url="https://bugzilla.suse.com/1123157" source="BUGZILLA"/>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1129623" ref_url="https://bugzilla.suse.com/1129623" source="BUGZILLA"/>
		<reference ref_id="1130680" ref_url="https://bugzilla.suse.com/1130680" source="BUGZILLA"/>
		<reference ref_id="1143797" ref_url="https://bugzilla.suse.com/1143797" source="BUGZILLA"/>
		<reference ref_id="1146874" ref_url="https://bugzilla.suse.com/1146874" source="BUGZILLA"/>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="1154456" ref_url="https://bugzilla.suse.com/1154456" source="BUGZILLA"/>
		<reference ref_id="1154458" ref_url="https://bugzilla.suse.com/1154458" source="BUGZILLA"/>
		<reference ref_id="1155945" ref_url="https://bugzilla.suse.com/1155945" source="BUGZILLA"/>
		<reference ref_id="1158004" ref_url="https://bugzilla.suse.com/1158004" source="BUGZILLA"/>
		<reference ref_id="1158005" ref_url="https://bugzilla.suse.com/1158005" source="BUGZILLA"/>
		<reference ref_id="1158006" ref_url="https://bugzilla.suse.com/1158006" source="BUGZILLA"/>
		<reference ref_id="1161181" ref_url="https://bugzilla.suse.com/1161181" source="BUGZILLA"/>
		<reference ref_id="1168140" ref_url="https://bugzilla.suse.com/1168140" source="BUGZILLA"/>
		<reference ref_id="1169392" ref_url="https://bugzilla.suse.com/1169392" source="BUGZILLA"/>
		<reference ref_id="1172205" ref_url="https://bugzilla.suse.com/1172205" source="BUGZILLA"/>
		<reference ref_id="1173380" ref_url="https://bugzilla.suse.com/1173380" source="BUGZILLA"/>
		<reference ref_id="1176343" ref_url="https://bugzilla.suse.com/1176343" source="BUGZILLA"/>
		<reference ref_id="1176344" ref_url="https://bugzilla.suse.com/1176344" source="BUGZILLA"/>
		<reference ref_id="1176345" ref_url="https://bugzilla.suse.com/1176345" source="BUGZILLA"/>
		<reference ref_id="1177409" ref_url="https://bugzilla.suse.com/1177409" source="BUGZILLA"/>
		<reference ref_id="1177412" ref_url="https://bugzilla.suse.com/1177412" source="BUGZILLA"/>
		<reference ref_id="1177414" ref_url="https://bugzilla.suse.com/1177414" source="BUGZILLA"/>
		<reference ref_id="1178591" ref_url="https://bugzilla.suse.com/1178591" source="BUGZILLA"/>
		<reference ref_id="1179477" ref_url="https://bugzilla.suse.com/1179477" source="BUGZILLA"/>
		<reference ref_id="1179496" ref_url="https://bugzilla.suse.com/1179496" source="BUGZILLA"/>
		<reference ref_id="1179498" ref_url="https://bugzilla.suse.com/1179498" source="BUGZILLA"/>
		<reference ref_id="1179501" ref_url="https://bugzilla.suse.com/1179501" source="BUGZILLA"/>
		<reference ref_id="1179502" ref_url="https://bugzilla.suse.com/1179502" source="BUGZILLA"/>
		<reference ref_id="1179506" ref_url="https://bugzilla.suse.com/1179506" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-10471" ref_url="https://www.suse.com/security/cve/CVE-2018-10471/" source="CVE"/>
		<reference ref_id="CVE-2018-10981" ref_url="https://www.suse.com/security/cve/CVE-2018-10981/" source="CVE"/>
		<reference ref_id="CVE-2018-10982" ref_url="https://www.suse.com/security/cve/CVE-2018-10982/" source="CVE"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2018-12891" ref_url="https://www.suse.com/security/cve/CVE-2018-12891/" source="CVE"/>
		<reference ref_id="CVE-2018-12893" ref_url="https://www.suse.com/security/cve/CVE-2018-12893/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="CVE-2018-19665" ref_url="https://www.suse.com/security/cve/CVE-2018-19665/" source="CVE"/>
		<reference ref_id="CVE-2018-19961" ref_url="https://www.suse.com/security/cve/CVE-2018-19961/" source="CVE"/>
		<reference ref_id="CVE-2018-19962" ref_url="https://www.suse.com/security/cve/CVE-2018-19962/" source="CVE"/>
		<reference ref_id="CVE-2018-19966" ref_url="https://www.suse.com/security/cve/CVE-2018-19966/" source="CVE"/>
		<reference ref_id="CVE-2018-19967" ref_url="https://www.suse.com/security/cve/CVE-2018-19967/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-17340" ref_url="https://www.suse.com/security/cve/CVE-2019-17340/" source="CVE"/>
		<reference ref_id="CVE-2019-17341" ref_url="https://www.suse.com/security/cve/CVE-2019-17341/" source="CVE"/>
		<reference ref_id="CVE-2019-17342" ref_url="https://www.suse.com/security/cve/CVE-2019-17342/" source="CVE"/>
		<reference ref_id="CVE-2019-17343" ref_url="https://www.suse.com/security/cve/CVE-2019-17343/" source="CVE"/>
		<reference ref_id="CVE-2019-17344" ref_url="https://www.suse.com/security/cve/CVE-2019-17344/" source="CVE"/>
		<reference ref_id="CVE-2019-18421" ref_url="https://www.suse.com/security/cve/CVE-2019-18421/" source="CVE"/>
		<reference ref_id="CVE-2019-18425" ref_url="https://www.suse.com/security/cve/CVE-2019-18425/" source="CVE"/>
		<reference ref_id="CVE-2019-19578" ref_url="https://www.suse.com/security/cve/CVE-2019-19578/" source="CVE"/>
		<reference ref_id="CVE-2019-19580" ref_url="https://www.suse.com/security/cve/CVE-2019-19580/" source="CVE"/>
		<reference ref_id="CVE-2019-19583" ref_url="https://www.suse.com/security/cve/CVE-2019-19583/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-11740" ref_url="https://www.suse.com/security/cve/CVE-2020-11740/" source="CVE"/>
		<reference ref_id="CVE-2020-11741" ref_url="https://www.suse.com/security/cve/CVE-2020-11741/" source="CVE"/>
		<reference ref_id="CVE-2020-11742" ref_url="https://www.suse.com/security/cve/CVE-2020-11742/" source="CVE"/>
		<reference ref_id="CVE-2020-15567" ref_url="https://www.suse.com/security/cve/CVE-2020-15567/" source="CVE"/>
		<reference ref_id="CVE-2020-25595" ref_url="https://www.suse.com/security/cve/CVE-2020-25595/" source="CVE"/>
		<reference ref_id="CVE-2020-25596" ref_url="https://www.suse.com/security/cve/CVE-2020-25596/" source="CVE"/>
		<reference ref_id="CVE-2020-25604" ref_url="https://www.suse.com/security/cve/CVE-2020-25604/" source="CVE"/>
		<reference ref_id="CVE-2020-27670" ref_url="https://www.suse.com/security/cve/CVE-2020-27670/" source="CVE"/>
		<reference ref_id="CVE-2020-27672" ref_url="https://www.suse.com/security/cve/CVE-2020-27672/" source="CVE"/>
		<reference ref_id="CVE-2020-27674" ref_url="https://www.suse.com/security/cve/CVE-2020-27674/" source="CVE"/>
		<reference ref_id="CVE-2020-28368" ref_url="https://www.suse.com/security/cve/CVE-2020-28368/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29480" ref_url="https://www.suse.com/security/cve/CVE-2020-29480/" source="CVE"/>
		<reference ref_id="CVE-2020-29481" ref_url="https://www.suse.com/security/cve/CVE-2020-29481/" source="CVE"/>
		<reference ref_id="CVE-2020-29483" ref_url="https://www.suse.com/security/cve/CVE-2020-29483/" source="CVE"/>
		<reference ref_id="CVE-2020-29484" ref_url="https://www.suse.com/security/cve/CVE-2020-29484/" source="CVE"/>
		<reference ref_id="CVE-2020-29566" ref_url="https://www.suse.com/security/cve/CVE-2020-29566/" source="CVE"/>
		<reference ref_id="CVE-2020-7211" ref_url="https://www.suse.com/security/cve/CVE-2020-7211/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed:

- bsc#1074562 - VUL-0: CVE-2017-5753,CVE-2017-5715,CVE-2017-5754
  xen: Information leak via side effects of speculative execution
  (XSA-254). Includes Spectre v2 mitigation.
- bsc#1089635 - VUL-0: CVE-2018-10471: xen: x86: PV guest may crash
  Xen with XPTI (XSA-259)
- bsc#1092631 - VUL-0: CVE-2018-3639: xen: V4 – Speculative Store
  Bypass aka 'Memory Disambiguation' (XSA-263)
- bsc#1095242 - VUL-0: CVE-2018-3665: xen: Lazy FP Save/Restore
  (XSA-267)
- bsc#1091107 - VUL-0: CVE-2018-3646: xen: L1 Terminal Fault -VMM
  (XSA-273)
- bsc#1115040 - VUL-0: CVE-2018-19961 CVE-2018-19962: xen:
  insufficient TLB flushing / improper large page mappings with AMD
  IOMMUs (XSA-275)
- bsc#1115047 - VUL-0: CVE-2018-19966: xen: Fix for XSA-240
  conflicts with shadow paging (XSA-280)
- bsc#1114988 - VUL-0: CVE-2018-19967: xen: guest use of HLE
  constructs may lock up host (XSA-282)
- bsc#1126140 - VUL-0: CVE-2019-17340: xen: XSA-284: grant table
  transfer issues on large hosts
- bsc#1126141 - VUL-0: CVE-2019-17341: xen: XSA-285: race with
  pass-through device hotplug
- bsc#1177409 - VUL-0: CVE-2020-27674: xen: x86 PV guest
  INVLPG-like flushes may leave stale TLB entries (XSA-286)
- bsc#1126192 - VUL-0: CVE-2019-17342: xen: XSA-287: x86:
  steal_page violates page_struct access discipline
- bsc#1126195 - VUL-0: CVE-2019-17343: xen: XSA-288: x86:
  Inconsistent PV IOMMU discipline
- bsc#1126196 - VUL-0: CVE-2019-17344: xen: XSA-290: missing
  preemption in x86 PV page table unvalidation
- bsc#1111331 - VUL-0: CPU issues Q2 2019 aka 'Group 4'
  CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
- bsc#1154458 - VUL-0: CVE-2019-18421: xen: XSA-299: Issues with
  restartable PV type change operations
- bsc#1155945 - VUL-0: CVE-2018-12207: xen: Machine Check Error
  Avoidance on Page Size Change (aka IFU issue)
- bsc#1158004 - VUL-0: CVE-2019-19583: xen: XSA-308 - VMX: VMentry
  failure with debug exceptions and blocked states
- bsc#1158005 - VUL-0: CVE-2019-19578: xen: XSA-309 - Linear
  pagetable use / entry miscounts
- bsc#1158006 - VUL-0: CVE-2019-19580: xen: XSA-310 - Further
  issues with restartable PV type change operations
- bsc#1172205 - VUL-0: CVE-2020-0543: xen: Special Register Buffer
  Data Sampling (SRBDS) aka 'CrossTalk' (XSA-320)
- bsc#1173380 - VUL-0: CVE-2020-15567: xen: XSA-328 - non-atomic
  modification of live EPT PTE
- bsc#1176343 - VUL-0: CVE-2020-25604: xen: race when migrating
  timers between x86 HVM vCPU-s (XSA-336)
- bsc#1176344 - VUL-0: CVE-2020-25595: xen: PCI passthrough code
  reading back hardware registers (XSA-337)
- bsc#1176345 - VUL-0: CVE-2020-25596: xen: x86 pv guest kernel
  DoS via SYSENTER (XSA-339)
- bsc#1177412 - VUL-0: CVE-2020-27672: xen: Race condition in Xen
  mapping code (XSA-345)
- bsc#1177414 - VUL-0: CVE-2020-27670: xen: unsafe AMD IOMMU page
  table updates (XSA-347)
- bsc#1179506 - VUL-0: CVE-2020-29566: xen: undue recursion in x86
  HVM context switch code (XSA-348)
- bsc#1178591 - VUL-0: CVE-2020-28368: xen: Intel RAPL sidechannel
- bsc#1179496 - VUL-0: CVE-2020-29480: xen: xenstore: watch
  notifications lacking permission checks (XSA-115)
- bsc#1179498 - VUL-0: CVE-2020-29481: xen: xenstore: new domains
  inheriting existing node permissions (XSA-322)
- bsc#1179501 - VUL-0: CVE-2020-29484: xen: xenstore: guests can
  crash xenstored via watchs (XSA-324)
- bsc#1179502 - VUL-0: CVE-2020-29483: xen: xenstore: guests can
  disturb domain cleanup (XSA-325)
- bsc#1179477 - VUL-0: CVE-2020-29130: xen: out-of-bounds access
  while processing ARP packets
- bsc#1169392 - VUL-0: CVE-2020-11742: xen: Bad continuation
  handling in GNTTABOP_copy (XSA-318)
- bsc#1168140 - VUL-0: CVE-2020-11740, CVE-2020-11741: xen: XSA-313
  multiple xenoprof issues
- bsc#1161181 - VUL-0: CVE-2020-7211: xen: potential directory
  traversal using relative paths via tftp server on Windows host
- bsc#1154456 - VUL-0: CVE-2019-18425: xen: XSA-298: missing
  descriptor table limit checking in x86 PV emulation
- bsc#1149813 - VUL-0: CVE-2019-15890: xen: use-after-free during
  packet reassembly
- bsc#1146874 - VUL-0: CVE-2019-12068: xen: infinite loop while
  executing script
- bsc#1143797 - VUL-0: CVE-2019-14378: xen: heap buffer overflow
  during packet reassembly in slirp networking implementation
- bsc#1130680 - VUL-0: CVE-2018-20815: xen: qemu: device_tree:
  heap buffer overflow while loading device tree blob
- bsc#1129623 - VUL-1: CVE-2019-9824: xen: information leakage in
  tcp_emu() due to uninitialized stack variables
- bsc#1123157 - VUL-0: CVE-2019-6778: xen: A heap buffer overflow
  in tcp_emu() found in slirp
- bsc#1117756 - VUL-0: CVE-2018-19665: xen: Integer overflow in
  Bluetooth routines allows memory corruption
- bsc#1114423 - VUL-0: CVE-2018-18849: xen: QEMU: lsi53c895a: OOB
  msg buffer access leads to DoS
- bsc#1111014 - VUL-0: CVE-2018-17963: xen: net: ignore packets with
  large size
- bsc#1097521 - VUL-0: CVE-2018-12891: xen: preemption checks
  bypassed in x86 PV MM handling (XSA-264)
- bsc#1097522 - VUL-0: CVE-2018-12893: xen: x86: #DB exception
  safety check can be triggered by a guest (XSA-265)
- bsc#1096224 - VUL-0: CVE-2018-11806: xen: slirp: heap buffer
  overflow while reassembling fragmented datagrams
- bsc#1090822 - VUL-0: CVE-2018-10982: xen: x86 vHPET interrupt
  injection errors (XSA-261)
- bsc#1090823 - VUL-0: CVE-2018-10981: xen: qemu may drive Xen into
  unbounded loop (XSA-262)

Non-security issues fixed:

- Upstream prereq patches for XSA-273 (bsc#1091107)
- Additional upstream adjustments (bsc#1027519)
- bsc#1022555 - L3: Timeout in 'execution of /etc/xen/scripts/block add'
- bsc#1029827 - Forward port xenstored
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-07"/>
	<updated date="2021-01-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1022555">SUSE bug 1022555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029827">SUSE bug 1029827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089635">SUSE bug 1089635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090822">SUSE bug 1090822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090823">SUSE bug 1090823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092631">SUSE bug 1092631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095242">SUSE bug 1095242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096224">SUSE bug 1096224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097521">SUSE bug 1097521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097522">SUSE bug 1097522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111014">SUSE bug 1111014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114423">SUSE bug 1114423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114988">SUSE bug 1114988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115040">SUSE bug 1115040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115047">SUSE bug 1115047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117756">SUSE bug 1117756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123157">SUSE bug 1123157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129623">SUSE bug 1129623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130680">SUSE bug 1130680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143797">SUSE bug 1143797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146874">SUSE bug 1146874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154456">SUSE bug 1154456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154458">SUSE bug 1154458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155945">SUSE bug 1155945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158004">SUSE bug 1158004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158005">SUSE bug 1158005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158006">SUSE bug 1158006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161181">SUSE bug 1161181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168140">SUSE bug 1168140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169392">SUSE bug 1169392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172205">SUSE bug 1172205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173380">SUSE bug 1173380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176343">SUSE bug 1176343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176344">SUSE bug 1176344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176345">SUSE bug 1176345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177409">SUSE bug 1177409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177412">SUSE bug 1177412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177414">SUSE bug 1177414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179496">SUSE bug 1179496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179498">SUSE bug 1179498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179501">SUSE bug 1179501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179502">SUSE bug 1179502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179506">SUSE bug 1179506</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5754">CVE-2017-5754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10471/">CVE-2018-10471 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10471">CVE-2018-10471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10981/">CVE-2018-10981 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10981">CVE-2018-10981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10982/">CVE-2018-10982 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10982">CVE-2018-10982 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11806">CVE-2018-11806 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12207">CVE-2018-12207 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12891/">CVE-2018-12891 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12891">CVE-2018-12891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12893/">CVE-2018-12893 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12893">CVE-2018-12893 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17963">CVE-2018-17963 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18849">CVE-2018-18849 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19665/">CVE-2018-19665 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19665">CVE-2018-19665 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19961/">CVE-2018-19961 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19961">CVE-2018-19961 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19962/">CVE-2018-19962 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19962">CVE-2018-19962 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19966/">CVE-2018-19966 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19966">CVE-2018-19966 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19967/">CVE-2018-19967 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19967">CVE-2018-19967 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20815">CVE-2018-20815 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3646">CVE-2018-3646 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3665">CVE-2018-3665 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12068">CVE-2019-12068 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14378">CVE-2019-14378 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15890">CVE-2019-15890 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17340/">CVE-2019-17340 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17340">CVE-2019-17340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17341/">CVE-2019-17341 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17341">CVE-2019-17341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17342/">CVE-2019-17342 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17342">CVE-2019-17342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17343/">CVE-2019-17343 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17343">CVE-2019-17343 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17344/">CVE-2019-17344 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17344">CVE-2019-17344 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18421/">CVE-2019-18421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18421">CVE-2019-18421 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18425/">CVE-2019-18425 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18425">CVE-2019-18425 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19578/">CVE-2019-19578 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19578">CVE-2019-19578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19580/">CVE-2019-19580 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19580">CVE-2019-19580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19583/">CVE-2019-19583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19583">CVE-2019-19583 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6778">CVE-2019-6778 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9824">CVE-2019-9824 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11740/">CVE-2020-11740 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11740">CVE-2020-11740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11741/">CVE-2020-11741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11741">CVE-2020-11741 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11742/">CVE-2020-11742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11742">CVE-2020-11742 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15567/">CVE-2020-15567 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15567">CVE-2020-15567 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25595/">CVE-2020-25595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25595">CVE-2020-25595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25596/">CVE-2020-25596 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25596">CVE-2020-25596 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25604/">CVE-2020-25604 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25604">CVE-2020-25604 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27670/">CVE-2020-27670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27670">CVE-2020-27670 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27672/">CVE-2020-27672 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27672">CVE-2020-27672 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27674/">CVE-2020-27674 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27674">CVE-2020-27674 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28368/">CVE-2020-28368 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28368">CVE-2020-28368 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29130">CVE-2020-29130 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29480/">CVE-2020-29480 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29480">CVE-2020-29480 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29481/">CVE-2020-29481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29481">CVE-2020-29481 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29483/">CVE-2020-29483 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29483">CVE-2020-29483 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29484/">CVE-2020-29484 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29484">CVE-2020-29484 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29566/">CVE-2020-29566 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29566">CVE-2020-29566 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-7211/">CVE-2020-7211 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7211">CVE-2020-7211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575522" comment="xen-4.0.3_21548_20-53.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575523" comment="xen-doc-html-4.0.3_21548_20-53.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575524" comment="xen-doc-pdf-4.0.3_21548_20-53.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575525" comment="xen-kmp-default-4.0.3_21548_20_2.6.32.54_0.172.TDC-53.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575526" comment="xen-kmp-trace-4.0.3_21548_20_2.6.32.54_0.172.TDC-53.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575527" comment="xen-libs-4.0.3_21548_20-53.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575528" comment="xen-tools-4.0.3_21548_20-53.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575529" comment="xen-tools-domU-4.0.3_21548_20-53.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217904" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1163019" ref_url="https://bugzilla.suse.com/1163019" source="BUGZILLA"/>
		<reference ref_id="1175534" ref_url="https://bugzilla.suse.com/1175534" source="BUGZILLA"/>
		<reference ref_id="1182155" ref_url="https://bugzilla.suse.com/1182155" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- L3: xenstored crashing with segfault after applying latest xen updates on SLES12 SP2 (LTSS) Server (bsc#1182155)
- CVE-2020-14364: out-of-bounds r/w access issue while processing usb packets (bsc#1175534)
- CVE-2020-8608: potential OOB access due to unsafe snprintf() usages (bsc#1163019)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-02"/>
	<updated date="2021-06-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182155">SUSE bug 1182155</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575530" comment="xen-4.0.3_21548_20-53.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575531" comment="xen-doc-html-4.0.3_21548_20-53.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575532" comment="xen-doc-pdf-4.0.3_21548_20-53.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575533" comment="xen-kmp-default-4.0.3_21548_20_2.6.32.54_0.178.TDC-53.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575534" comment="xen-kmp-trace-4.0.3_21548_20_2.6.32.54_0.178.TDC-53.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575535" comment="xen-libs-4.0.3_21548_20-53.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575536" comment="xen-tools-4.0.3_21548_20-53.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575537" comment="xen-tools-domU-4.0.3_21548_20-53.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217905" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="623680" ref_url="https://bugzilla.suse.com/623680" source="BUGZILLA"/>
		<reference ref_id="665610" ref_url="https://bugzilla.suse.com/665610" source="BUGZILLA"/>
		<reference ref_id="672833" ref_url="https://bugzilla.suse.com/672833" source="BUGZILLA"/>
		<reference ref_id="674371" ref_url="https://bugzilla.suse.com/674371" source="BUGZILLA"/>
		<reference ref_id="675363" ref_url="https://bugzilla.suse.com/675363" source="BUGZILLA"/>
		<reference ref_id="675817" ref_url="https://bugzilla.suse.com/675817" source="BUGZILLA"/>
		<reference ref_id="675861" ref_url="https://bugzilla.suse.com/675861" source="BUGZILLA"/>
		<reference ref_id="678152" ref_url="https://bugzilla.suse.com/678152" source="BUGZILLA"/>
		<reference ref_id="678229" ref_url="https://bugzilla.suse.com/678229" source="BUGZILLA"/>
		<reference ref_id="678406" ref_url="https://bugzilla.suse.com/678406" source="BUGZILLA"/>
		<reference ref_id="678871" ref_url="https://bugzilla.suse.com/678871" source="BUGZILLA"/>
		<reference ref_id="679344" ref_url="https://bugzilla.suse.com/679344" source="BUGZILLA"/>
		<reference ref_id="680824" ref_url="https://bugzilla.suse.com/680824" source="BUGZILLA"/>
		<reference ref_id="681546" ref_url="https://bugzilla.suse.com/681546" source="BUGZILLA"/>
		<reference ref_id="684877" ref_url="https://bugzilla.suse.com/684877" source="BUGZILLA"/>
		<reference ref_id="686737" ref_url="https://bugzilla.suse.com/686737" source="BUGZILLA"/>
		<reference ref_id="687981" ref_url="https://bugzilla.suse.com/687981" source="BUGZILLA"/>
		<reference ref_id="688306" ref_url="https://bugzilla.suse.com/688306" source="BUGZILLA"/>
		<reference ref_id="688473" ref_url="https://bugzilla.suse.com/688473" source="BUGZILLA"/>
		<reference ref_id="688757" ref_url="https://bugzilla.suse.com/688757" source="BUGZILLA"/>
		<reference ref_id="691238" ref_url="https://bugzilla.suse.com/691238" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1146" ref_url="https://www.suse.com/security/cve/CVE-2011-1146/" source="CVE"/>
		<reference ref_id="CVE-2011-1166" ref_url="https://www.suse.com/security/cve/CVE-2011-1166/" source="CVE"/>
		<reference ref_id="CVE-2011-1486" ref_url="https://www.suse.com/security/cve/CVE-2011-1486/" source="CVE"/>
		<reference ref_id="CVE-2011-1583" ref_url="https://www.suse.com/security/cve/CVE-2011-1583/" source="CVE"/>
		<description>

Collective May/2011 update for Xen

Xen:

    * 679344: Xen: multi-vCPU pv guest may crash host
    * 675817: Kernel panic when creating HVM guests on AMD platforms with
      XSAVE
    * 678871: dom0 hangs long time when starting hvm guests with memory &gt;=
      64GB
    * 675363: Random lockups with kernel-xen. Possibly graphics related
    * 678229: restore of sles HVM fails
    * 672833: xen-tools bug causing problems with Ubuntu 10.10 under Xen 4.
    * 665610: xm console &gt; 1 to same VM messes up both consoles
    * 687981: mistyping model type when defining VIF crashes VM
    * 688473: Fix potential buffer overflow in decode
    * 691238: revert accidental behaviour change in xm list
    * 680824: dom0 can't recognize boot disk when IOMMU is enabled
    * 623680: xen kernel freezes during boot when processor module is
      loaded

vm-install:

    * 678152: virt-manager: harmless block device admin actions on FV
      guests mess up network (VIF) device type ==&gt; network lost.
    * 688757: SLED10SP4 fully virtualized in SLES10SP4 XEN - kernel panic

libvirt:

    * 674371: qemu aio mode per disk
    * 675861: Force FLR on for buggy SR-IOV devices
    * 678406: libvirt: several API calls do not honour read-only
    * 684877: libvirt: error reporting in libvirtd is not thread safe
    * 686737: virsh: Add option 'model' to attach-interface
    * 681546: Fix xmdomain.cfg to libvirt XML format conversion
    * 688306: Handle support for recent KVM versions

Security Issue references:

    * CVE-2011-1146
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1146&gt;
    * CVE-2011-1486
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1486&gt;
    * CVE-2011-1166
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1166&gt;
    * CVE-2011-1583
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1583&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-05-05"/>
	<updated date="2011-05-05"/>
	<bugzilla href="https://bugzilla.suse.com/623680">SUSE bug 623680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/665610">SUSE bug 665610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/672833">SUSE bug 672833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/674371">SUSE bug 674371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/675363">SUSE bug 675363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/675817">SUSE bug 675817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/675861">SUSE bug 675861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/678152">SUSE bug 678152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/678229">SUSE bug 678229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/678406">SUSE bug 678406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/678871">SUSE bug 678871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/679344">SUSE bug 679344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/680824">SUSE bug 680824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/681546">SUSE bug 681546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/684877">SUSE bug 684877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/686737">SUSE bug 686737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/687981">SUSE bug 687981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/688306">SUSE bug 688306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/688473">SUSE bug 688473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/688757">SUSE bug 688757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/691238">SUSE bug 691238</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1146/">CVE-2011-1146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1146">CVE-2011-1146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1166/">CVE-2011-1166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1166">CVE-2011-1166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1486/">CVE-2011-1486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1486">CVE-2011-1486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1583/">CVE-2011-1583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1583">CVE-2011-1583 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992412" comment="libvirt-0.7.6-1.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992413" comment="libvirt-doc-0.7.6-1.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992414" comment="libvirt-python-0.7.6-1.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992415" comment="vm-install-0.4.30-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992416" comment="xen-4.0.1_21326_08-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992417" comment="xen-doc-html-4.0.1_21326_08-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992418" comment="xen-doc-pdf-4.0.1_21326_08-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992419" comment="xen-kmp-default-4.0.1_21326_08_2.6.32.36_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992420" comment="xen-libs-4.0.1_21326_08-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992421" comment="xen-tools-4.0.1_21326_08-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992422" comment="xen-tools-domU-4.0.1_21326_08-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217906" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="582265" ref_url="https://bugzilla.suse.com/582265" source="BUGZILLA"/>
		<reference ref_id="670465" ref_url="https://bugzilla.suse.com/670465" source="BUGZILLA"/>
		<reference ref_id="684297" ref_url="https://bugzilla.suse.com/684297" source="BUGZILLA"/>
		<reference ref_id="684305" ref_url="https://bugzilla.suse.com/684305" source="BUGZILLA"/>
		<reference ref_id="689954" ref_url="https://bugzilla.suse.com/689954" source="BUGZILLA"/>
		<reference ref_id="692625" ref_url="https://bugzilla.suse.com/692625" source="BUGZILLA"/>
		<reference ref_id="693472" ref_url="https://bugzilla.suse.com/693472" source="BUGZILLA"/>
		<reference ref_id="702025" ref_url="https://bugzilla.suse.com/702025" source="BUGZILLA"/>
		<reference ref_id="703924" ref_url="https://bugzilla.suse.com/703924" source="BUGZILLA"/>
		<reference ref_id="704160" ref_url="https://bugzilla.suse.com/704160" source="BUGZILLA"/>
		<reference ref_id="706574" ref_url="https://bugzilla.suse.com/706574" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1898" ref_url="https://www.suse.com/security/cve/CVE-2011-1898/" source="CVE"/>
		<description>

Security / Collective Update for Xen

Xen:

    * bnc#702025 - VUL-0: xen: VT-d (PCI passthrough) MSI trap injection
      (CVE-2011-1898)
    * bnc#703924 - update block-npiv scripts to support BFA HBA
    * bnc#689954 - L3: Live migrations fail when guest crashes:
      domain_crash_sync called from entry.S
    * bnc#693472 - Bridge hangs cause redundant ring failures in SLE 11 SP1
      HAE + XEN
    * bnc#582265 - xen-scsi.ko not supported
    * bnc#670465 - When connecting to Xen guest through vncviewer mouse
      tracking is off.
    * bnc#684305 - on_crash is being ignored with kdump now working in HVM
    * bnc#684297 - HVM taking too long to dump vmcore
    * bnc#704160 - crm resource migrate fails with xen machines
    * bnc#706574 - xm console DomUName hang after 'xm save/restore' of PVM
      on the latest Xen

vm-install:

    * bnc#692625 - virt-manager has problems to install guest from multiple
      CD

Security Issue reference:

    * CVE-2011-1898
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1898&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-08-08"/>
	<updated date="2011-08-08"/>
	<bugzilla href="https://bugzilla.suse.com/582265">SUSE bug 582265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/670465">SUSE bug 670465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/684297">SUSE bug 684297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/684305">SUSE bug 684305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/689954">SUSE bug 689954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/692625">SUSE bug 692625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693472">SUSE bug 693472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/702025">SUSE bug 702025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703924">SUSE bug 703924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704160">SUSE bug 704160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/706574">SUSE bug 706574</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1898/">CVE-2011-1898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1898">CVE-2011-1898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992423" comment="vm-install-0.4.31-0.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992424" comment="xen-4.0.2_21511_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992425" comment="xen-doc-html-4.0.2_21511_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992426" comment="xen-doc-pdf-4.0.2_21511_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992427" comment="xen-kmp-default-4.0.2_21511_02_2.6.32.43_0.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992428" comment="xen-libs-4.0.2_21511_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992429" comment="xen-tools-4.0.2_21511_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992430" comment="xen-tools-domU-4.0.2_21511_02-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217907" version="1" class="patch">
	<metadata>
		<title>Recommended update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="683580" ref_url="https://bugzilla.suse.com/683580" source="BUGZILLA"/>
		<reference ref_id="691256" ref_url="https://bugzilla.suse.com/691256" source="BUGZILLA"/>
		<reference ref_id="694863" ref_url="https://bugzilla.suse.com/694863" source="BUGZILLA"/>
		<reference ref_id="701686" ref_url="https://bugzilla.suse.com/701686" source="BUGZILLA"/>
		<reference ref_id="704160" ref_url="https://bugzilla.suse.com/704160" source="BUGZILLA"/>
		<reference ref_id="706106" ref_url="https://bugzilla.suse.com/706106" source="BUGZILLA"/>
		<reference ref_id="706436" ref_url="https://bugzilla.suse.com/706436" source="BUGZILLA"/>
		<reference ref_id="706574" ref_url="https://bugzilla.suse.com/706574" source="BUGZILLA"/>
		<reference ref_id="712051" ref_url="https://bugzilla.suse.com/712051" source="BUGZILLA"/>
		<reference ref_id="712823" ref_url="https://bugzilla.suse.com/712823" source="BUGZILLA"/>
		<reference ref_id="715655" ref_url="https://bugzilla.suse.com/715655" source="BUGZILLA"/>
		<reference ref_id="716695" ref_url="https://bugzilla.suse.com/716695" source="BUGZILLA"/>
		<reference ref_id="722794" ref_url="https://bugzilla.suse.com/722794" source="BUGZILLA"/>
		<reference ref_id="725169" ref_url="https://bugzilla.suse.com/725169" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3131" ref_url="https://www.suse.com/security/cve/CVE-2011-3131/" source="CVE"/>
		<description>

This collective October/2011 Update for Xen provides the following fixes:

Xen:

    * 712823: Xen guest does not start reliable when rebooted
    * 694863: kexec fails in xen
    * 691256: remove /etc/init.d/xencommons, its unused and breaks
      upgrading/downgrading of the xen-tools package because this runlevel
      script remains enabled in this sles11sp1 package
    * 716695: domUs using tap devices will not start
    * 683580: Xen Hypervisor occasionally hangs forever during boot up
      after the message 'Enabled directed EOI with ioapic_ack_old on!
    * 701686: kdump hangs on megaraid_sas driver
    * 712051: Xen DoS using IOMMU faults from PCI-passthrough guest
      (CVE-2011-3131).
    * 715655: Add support for performance counters for Westmere and
      SandyBridge
    * 706106: Fix inconsistent reporting of VM names during migration
    * 704160: crm resource migrate fails with xen machines
    * 706574: xm console DomUName hangs after 'xm save/restore' of PVM on
      the latest Xen
    * 725169: Hang when using Microcode update on AMD

Libvirt:

    * 706436: KVM crash dump speed limited by libvirt

vm-install:

    * 722794: Support for RHEL 6 is missing from vm-install

Security Issue reference:

    * CVE-2011-3131
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3131&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-10-25"/>
	<updated date="2011-10-25"/>
	<bugzilla href="https://bugzilla.suse.com/683580">SUSE bug 683580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/691256">SUSE bug 691256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/694863">SUSE bug 694863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/701686">SUSE bug 701686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704160">SUSE bug 704160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/706106">SUSE bug 706106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/706436">SUSE bug 706436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/706574">SUSE bug 706574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/712051">SUSE bug 712051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/712823">SUSE bug 712823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/715655">SUSE bug 715655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/716695">SUSE bug 716695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/722794">SUSE bug 722794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/725169">SUSE bug 725169</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3131/">CVE-2011-3131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3131">CVE-2011-3131 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992431" comment="libvirt-0.7.6-1.27.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992432" comment="libvirt-doc-0.7.6-1.27.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992433" comment="libvirt-python-0.7.6-1.27.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992434" comment="vm-install-0.4.32-0.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992435" comment="xen-4.0.2_21511_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992436" comment="xen-doc-html-4.0.2_21511_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992437" comment="xen-doc-pdf-4.0.2_21511_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992438" comment="xen-kmp-default-4.0.2_21511_04_2.6.32.46_0.3-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992439" comment="xen-libs-4.0.2_21511_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992440" comment="xen-tools-4.0.2_21511_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992441" comment="xen-tools-domU-4.0.2_21511_04-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217908" version="1" class="patch">
	<metadata>
		<title>Security update for Xen and libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="649209" ref_url="https://bugzilla.suse.com/649209" source="BUGZILLA"/>
		<reference ref_id="694863" ref_url="https://bugzilla.suse.com/694863" source="BUGZILLA"/>
		<reference ref_id="725169" ref_url="https://bugzilla.suse.com/725169" source="BUGZILLA"/>
		<reference ref_id="726332" ref_url="https://bugzilla.suse.com/726332" source="BUGZILLA"/>
		<reference ref_id="727515" ref_url="https://bugzilla.suse.com/727515" source="BUGZILLA"/>
		<reference ref_id="732782" ref_url="https://bugzilla.suse.com/732782" source="BUGZILLA"/>
		<reference ref_id="734826" ref_url="https://bugzilla.suse.com/734826" source="BUGZILLA"/>
		<reference ref_id="735403" ref_url="https://bugzilla.suse.com/735403" source="BUGZILLA"/>
		<reference ref_id="736824" ref_url="https://bugzilla.suse.com/736824" source="BUGZILLA"/>
		<reference ref_id="739585" ref_url="https://bugzilla.suse.com/739585" source="BUGZILLA"/>
		<reference ref_id="740165" ref_url="https://bugzilla.suse.com/740165" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0029" ref_url="https://www.suse.com/security/cve/CVE-2012-0029/" source="CVE"/>
		<description>

This collective update 2012/02 for Xen provides fixes for the following 
reports:

Xen:

    * 740165: Fix heap overflow in e1000 device emulation (applicable to
      Xen qemu - CVE-2012-0029)
    * 739585: Xen block-attach fails after repeated attach/detach
    * 727515: Fragmented packets hang network boot of HVM guest
    * 736824: Microcode patches for AMD's 15h processors panic the system
    * 732782: xm create hangs when maxmen value is enclosed in 'quotes'
    * 734826: xm rename doesn't work anymore
    * 694863: kexec fails in xen
    * 726332: Fix considerable performance hit by previous changeset
    * 649209: Fix slow Xen live migrations

libvirt

    * 735403: Fix connection with virt-manager as normal user

virt-utils

    * Add Support for creating images that can be run on Microsoft Hyper-V
      host (Fix vpc file format. Add support for fixed disks)

Security Issue references:

    * CVE-2012-0029
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0029&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-10"/>
	<updated date="2012-02-10"/>
	<bugzilla href="https://bugzilla.suse.com/649209">SUSE bug 649209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/694863">SUSE bug 694863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/725169">SUSE bug 725169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/726332">SUSE bug 726332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/727515">SUSE bug 727515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/732782">SUSE bug 732782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/734826">SUSE bug 734826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/735403">SUSE bug 735403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/736824">SUSE bug 736824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/739585">SUSE bug 739585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/740165">SUSE bug 740165</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0029/">CVE-2012-0029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0029">CVE-2012-0029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992442" comment="libvirt-0.7.6-1.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992443" comment="libvirt-doc-0.7.6-1.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992444" comment="libvirt-python-0.7.6-1.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992445" comment="virt-utils-1.1.3-1.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992446" comment="xen-4.0.3_21548_02-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992447" comment="xen-doc-html-4.0.3_21548_02-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992448" comment="xen-doc-pdf-4.0.3_21548_02-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992449" comment="xen-kmp-default-4.0.3_21548_02_2.6.32.54_0.3-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992450" comment="xen-kmp-trace-4.0.3_21548_02_2.6.32.54_0.3-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992451" comment="xen-libs-4.0.3_21548_02-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992452" comment="xen-tools-4.0.3_21548_02-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992453" comment="xen-tools-domU-4.0.3_21548_02-0.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217909" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="757537" ref_url="https://bugzilla.suse.com/757537" source="BUGZILLA"/>
		<reference ref_id="757970" ref_url="https://bugzilla.suse.com/757970" source="BUGZILLA"/>
		<reference ref_id="764077" ref_url="https://bugzilla.suse.com/764077" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0217" ref_url="https://www.suse.com/security/cve/CVE-2012-0217/" source="CVE"/>
		<reference ref_id="CVE-2012-0218" ref_url="https://www.suse.com/security/cve/CVE-2012-0218/" source="CVE"/>
		<reference ref_id="CVE-2012-2934" ref_url="https://www.suse.com/security/cve/CVE-2012-2934/" source="CVE"/>
		<description>

Three security issues were found in XEN.

Two security issues are fixed by this update:

    * 

      CVE-2012-0217: Due to incorrect fault handling in the XEN hypervisor
      it was possible for a XEN guest domain administrator to execute code
      in the XEN host environment.

    * 

      CVE-2012-0218: Also a guest user could crash the guest XEN kernel due
      to a protection fault bounce.

The third fix is changing the Xen behaviour on certain hardware:

    * 

      CVE-2012-2934: The issue is a denial of service issue on older
      pre-SVM AMD CPUs (AMD Erratum 121).

      AMD Erratum #121 is described in 'Revision Guide for AMD Athlon 64
      and AMD Opteron Processors':
      http://support.amd.com/us/Processor_TechDocs/25759.pdf
      &lt;http://support.amd.com/us/Processor_TechDocs/25759.pdf&gt;

      The following 130nm and 90nm (DDR1-only) AMD processors are subject
      to this erratum:

          o 

            First-generation AMD-Opteron(tm) single and dual core
            processors in either 939 or 940 packages:

                + AMD Opteron(tm) 100-Series Processors
                + AMD Opteron(tm) 200-Series Processors
                + AMD Opteron(tm) 800-Series Processors
                + AMD Athlon(tm) processors in either 754, 939 or 940
                  packages
                + AMD Sempron(tm) processor in either 754 or 939 packages
                + AMD Turion(tm) Mobile Technology in 754 package

      This issue does not effect Intel processors.

      The impact of this flaw is that a malicious PV guest user can halt
      the host system.

      As this is a hardware flaw, it is not fixable except by upgrading
      your hardware to a newer revision, or not allowing untrusted 64bit
      guestsystems.

      The patch changes the behaviour of the host system booting, which
      makes it unable to create guest machines until a specific boot option
      is set.

      There is a new XEN boot option 'allow_unsafe' for GRUB which allows
      the host to start guests again.

      This is added to /boot/grub/menu.lst in the line looking like this:

      kernel /boot/xen.gz .... allow_unsafe

      Note: .... in this example represents the existing boot options for
      the host.

Security Issue references:

    * CVE-2012-0217
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0217&gt;
    * CVE-2012-0218
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0218&gt;
    * CVE-2012-2934
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2934&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-06-07"/>
	<updated date="2012-06-07"/>
	<bugzilla href="https://bugzilla.suse.com/757537">SUSE bug 757537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757970">SUSE bug 757970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/764077">SUSE bug 764077</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0217/">CVE-2012-0217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0217">CVE-2012-0217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0218/">CVE-2012-0218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0218">CVE-2012-0218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2934/">CVE-2012-2934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2934">CVE-2012-2934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992454" comment="xen-4.0.3_21548_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992455" comment="xen-doc-html-4.0.3_21548_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992456" comment="xen-doc-pdf-4.0.3_21548_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992457" comment="xen-kmp-default-4.0.3_21548_04_2.6.32.59_0.5-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992458" comment="xen-kmp-trace-4.0.3_21548_04_2.6.32.59_0.5-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992459" comment="xen-libs-4.0.3_21548_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992460" comment="xen-tools-4.0.3_21548_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992461" comment="xen-tools-domU-4.0.3_21548_04-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217910" version="1" class="patch">
	<metadata>
		<title>Security update for Xen </title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="744771" ref_url="https://bugzilla.suse.com/744771" source="BUGZILLA"/>
		<reference ref_id="746702" ref_url="https://bugzilla.suse.com/746702" source="BUGZILLA"/>
		<reference ref_id="762484" ref_url="https://bugzilla.suse.com/762484" source="BUGZILLA"/>
		<reference ref_id="762963" ref_url="https://bugzilla.suse.com/762963" source="BUGZILLA"/>
		<reference ref_id="773393" ref_url="https://bugzilla.suse.com/773393" source="BUGZILLA"/>
		<reference ref_id="773401" ref_url="https://bugzilla.suse.com/773401" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2625" ref_url="https://www.suse.com/security/cve/CVE-2012-2625/" source="CVE"/>
		<reference ref_id="CVE-2012-3432" ref_url="https://www.suse.com/security/cve/CVE-2012-3432/" source="CVE"/>
		<reference ref_id="CVE-2012-3433" ref_url="https://www.suse.com/security/cve/CVE-2012-3433/" source="CVE"/>
		<description>

Xen was updated to fix several security issues:

    * 

      CVE-2012-3433: A xen HVM guest destroy p2m teardown host DoS
      vulnerability was fixed, where malicious guest could lock/crash the
      host.

    * 

      CVE-2012-3432: A xen HVM guest user mode MMIO emulation DoS was
      fixed.

    * 

      CVE-2012-2625: The xen pv bootloader doesn't check the size of the
      bzip2 or lzma compressed kernel, leading to denial of service
      (crash).

Also the following bug in XEN was fixed:

    * bnc#746702 - Xen HVM DomU crash during Windows Server 2008 R2
      install, when maxmem &gt; memory

This update also included bugfixes for:

    * vm-install: - bnc#762963 - ReaR: Unable to recover a paravirtualized
      XEN guest

Security Issue references:

    * CVE-2012-3432
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3432&gt;
    * CVE-2012-3433
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3433&gt;
    * CVE-2012-2625
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2625&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-03"/>
	<updated date="2012-08-03"/>
	<bugzilla href="https://bugzilla.suse.com/744771">SUSE bug 744771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746702">SUSE bug 746702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762484">SUSE bug 762484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762963">SUSE bug 762963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773393">SUSE bug 773393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773401">SUSE bug 773401</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2625/">CVE-2012-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2625">CVE-2012-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3432/">CVE-2012-3432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3432">CVE-2012-3432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3433/">CVE-2012-3433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3433">CVE-2012-3433 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992462" comment="vm-install-0.4.34-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992463" comment="xen-4.0.3_21548_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992464" comment="xen-doc-html-4.0.3_21548_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992465" comment="xen-doc-pdf-4.0.3_21548_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992466" comment="xen-kmp-default-4.0.3_21548_08_2.6.32.59_0.7-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992467" comment="xen-kmp-trace-4.0.3_21548_08_2.6.32.59_0.7-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992468" comment="xen-libs-4.0.3_21548_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992469" comment="xen-tools-4.0.3_21548_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992470" comment="xen-tools-domU-4.0.3_21548_08-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217911" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="776995" ref_url="https://bugzilla.suse.com/776995" source="BUGZILLA"/>
		<reference ref_id="777084" ref_url="https://bugzilla.suse.com/777084" source="BUGZILLA"/>
		<reference ref_id="777090" ref_url="https://bugzilla.suse.com/777090" source="BUGZILLA"/>
		<reference ref_id="777091" ref_url="https://bugzilla.suse.com/777091" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3494" ref_url="https://www.suse.com/security/cve/CVE-2012-3494/" source="CVE"/>
		<reference ref_id="CVE-2012-3495" ref_url="https://www.suse.com/security/cve/CVE-2012-3495/" source="CVE"/>
		<reference ref_id="CVE-2012-3496" ref_url="https://www.suse.com/security/cve/CVE-2012-3496/" source="CVE"/>
		<reference ref_id="CVE-2012-3498" ref_url="https://www.suse.com/security/cve/CVE-2012-3498/" source="CVE"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<reference ref_id="CVE-2012-3516" ref_url="https://www.suse.com/security/cve/CVE-2012-3516/" source="CVE"/>
		<description>

XEN was updated to fix multiple bugs and security issues.

The following security issues have been fixed:

    * CVE-2012-3494: xen: hypercall set_debugreg vulnerability (XSA-12)
    * CVE-2012-3496: xen: XENMEM_populate_physmap DoS vulnerability
      (XSA-14)
    * CVE-2012-3515: xen: Qemu VT100 emulation vulnerability (XSA-17)

Also the following bugs have been fixed:

    * pvscsi support of attaching Luns - bnc#776995

Security Issue references:

    * CVE-2012-3496
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3496&gt;
    * CVE-2012-3494
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3494&gt;
    * CVE-2012-3495
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3495&gt;
    * CVE-2012-3498
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3498&gt;
    * CVE-2012-3516
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3516&gt;
    * CVE-2012-3515
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3515&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-30"/>
	<updated date="2012-08-30"/>
	<bugzilla href="https://bugzilla.suse.com/776995">SUSE bug 776995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777084">SUSE bug 777084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777090">SUSE bug 777090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777091">SUSE bug 777091</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3494/">CVE-2012-3494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3494">CVE-2012-3494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3495/">CVE-2012-3495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3495">CVE-2012-3495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3496/">CVE-2012-3496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3496">CVE-2012-3496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3498/">CVE-2012-3498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3498">CVE-2012-3498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3515">CVE-2012-3515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3516/">CVE-2012-3516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3516">CVE-2012-3516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575591" comment="xen-4.0.3_21548_10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575592" comment="xen-doc-html-4.0.3_21548_10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575593" comment="xen-doc-pdf-4.0.3_21548_10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575594" comment="xen-kmp-default-4.0.3_21548_10_2.6.32.59_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575595" comment="xen-kmp-pae-4.0.3_21548_10_2.6.32.59_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575596" comment="xen-kmp-trace-4.0.3_21548_10_2.6.32.59_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575597" comment="xen-libs-4.0.3_21548_10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575598" comment="xen-tools-4.0.3_21548_10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575599" comment="xen-tools-domU-4.0.3_21548_10-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575591" comment="xen-4.0.3_21548_10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575592" comment="xen-doc-html-4.0.3_21548_10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575593" comment="xen-doc-pdf-4.0.3_21548_10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575594" comment="xen-kmp-default-4.0.3_21548_10_2.6.32.59_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575595" comment="xen-kmp-pae-4.0.3_21548_10_2.6.32.59_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575596" comment="xen-kmp-trace-4.0.3_21548_10_2.6.32.59_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575597" comment="xen-libs-4.0.3_21548_10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575598" comment="xen-tools-4.0.3_21548_10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575599" comment="xen-tools-domU-4.0.3_21548_10-0.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217912" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="777890" ref_url="https://bugzilla.suse.com/777890" source="BUGZILLA"/>
		<reference ref_id="779212" ref_url="https://bugzilla.suse.com/779212" source="BUGZILLA"/>
		<reference ref_id="786516" ref_url="https://bugzilla.suse.com/786516" source="BUGZILLA"/>
		<reference ref_id="786517" ref_url="https://bugzilla.suse.com/786517" source="BUGZILLA"/>
		<reference ref_id="786519" ref_url="https://bugzilla.suse.com/786519" source="BUGZILLA"/>
		<reference ref_id="786520" ref_url="https://bugzilla.suse.com/786520" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3497" ref_url="https://www.suse.com/security/cve/CVE-2012-3497/" source="CVE"/>
		<reference ref_id="CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411/" source="CVE"/>
		<reference ref_id="CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535/" source="CVE"/>
		<reference ref_id="CVE-2012-4536" ref_url="https://www.suse.com/security/cve/CVE-2012-4536/" source="CVE"/>
		<reference ref_id="CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537/" source="CVE"/>
		<reference ref_id="CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538/" source="CVE"/>
		<reference ref_id="CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544/" source="CVE"/>
		<description>

XEN received various security fixes:

    * CVE-2012-4411: XEN / qemu: guest administrator can access qemu
      monitor console (XSA-19)
    * CVE-2012-4535: xen: Timer overflow DoS vulnerability (XSA-20)
    * CVE-2012-4537: xen: Memory mapping failure DoS vulnerability (XSA-22)
    * CVE-2012-4538: xen: Unhooking empty PAE entries DoS vulnerability
      (XSA-23)
    * CVE-2012-4539: xen: Grant table hypercall infinite loop DoS
      vulnerability (XSA-24)
    * CVE-2012-3497: xen: multiple TMEM hypercall vulnerabilities (XSA-15)

Security Issue references:

    * CVE-2012-4539
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539&gt;
    * CVE-2012-3497
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3497&gt;
    * CVE-2012-4411
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4411&gt;
    * CVE-2012-4535
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4535&gt;
    * CVE-2012-4537
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4537&gt;
    * CVE-2012-4536
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4536&gt;
    * CVE-2012-4538
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4538&gt;
    * CVE-2012-4539
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539&gt;
    * CVE-2012-4544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4544&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-05"/>
	<updated date="2012-11-05"/>
	<bugzilla href="https://bugzilla.suse.com/777890">SUSE bug 777890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786517">SUSE bug 786517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3497/">CVE-2012-3497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3497">CVE-2012-3497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4411">CVE-2012-4411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4535">CVE-2012-4535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4536/">CVE-2012-4536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4536">CVE-2012-4536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4537">CVE-2012-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4538">CVE-2012-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4539">CVE-2012-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4544">CVE-2012-4544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575600" comment="xen-4.0.3_21548_11-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575601" comment="xen-doc-html-4.0.3_21548_11-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575602" comment="xen-doc-pdf-4.0.3_21548_11-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575603" comment="xen-kmp-default-4.0.3_21548_11_2.6.32.54_0.11.TDC-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575604" comment="xen-kmp-trace-4.0.3_21548_11_2.6.32.54_0.11.TDC-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575605" comment="xen-libs-4.0.3_21548_11-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575606" comment="xen-tools-4.0.3_21548_11-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575607" comment="xen-tools-domU-4.0.3_21548_11-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217913" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="787163" ref_url="https://bugzilla.suse.com/787163" source="BUGZILLA"/>
		<reference ref_id="794316" ref_url="https://bugzilla.suse.com/794316" source="BUGZILLA"/>
		<reference ref_id="797031" ref_url="https://bugzilla.suse.com/797031" source="BUGZILLA"/>
		<reference ref_id="797523" ref_url="https://bugzilla.suse.com/797523" source="BUGZILLA"/>
		<reference ref_id="800275" ref_url="https://bugzilla.suse.com/800275" source="BUGZILLA"/>
		<reference ref_id="813673" ref_url="https://bugzilla.suse.com/813673" source="BUGZILLA"/>
		<reference ref_id="813675" ref_url="https://bugzilla.suse.com/813675" source="BUGZILLA"/>
		<reference ref_id="813677" ref_url="https://bugzilla.suse.com/813677" source="BUGZILLA"/>
		<reference ref_id="816156" ref_url="https://bugzilla.suse.com/816156" source="BUGZILLA"/>
		<reference ref_id="816159" ref_url="https://bugzilla.suse.com/816159" source="BUGZILLA"/>
		<reference ref_id="816163" ref_url="https://bugzilla.suse.com/816163" source="BUGZILLA"/>
		<reference ref_id="819416" ref_url="https://bugzilla.suse.com/819416" source="BUGZILLA"/>
		<reference ref_id="820917" ref_url="https://bugzilla.suse.com/820917" source="BUGZILLA"/>
		<reference ref_id="820919" ref_url="https://bugzilla.suse.com/820919" source="BUGZILLA"/>
		<reference ref_id="823011" ref_url="https://bugzilla.suse.com/823011" source="BUGZILLA"/>
		<reference ref_id="823608" ref_url="https://bugzilla.suse.com/823608" source="BUGZILLA"/>
		<reference ref_id="826882" ref_url="https://bugzilla.suse.com/826882" source="BUGZILLA"/>
		<reference ref_id="839596" ref_url="https://bugzilla.suse.com/839596" source="BUGZILLA"/>
		<reference ref_id="839618" ref_url="https://bugzilla.suse.com/839618" source="BUGZILLA"/>
		<reference ref_id="840592" ref_url="https://bugzilla.suse.com/840592" source="BUGZILLA"/>
		<reference ref_id="841766" ref_url="https://bugzilla.suse.com/841766" source="BUGZILLA"/>
		<reference ref_id="842511" ref_url="https://bugzilla.suse.com/842511" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544/" source="CVE"/>
		<reference ref_id="CVE-2012-5634" ref_url="https://www.suse.com/security/cve/CVE-2012-5634/" source="CVE"/>
		<reference ref_id="CVE-2012-6075" ref_url="https://www.suse.com/security/cve/CVE-2012-6075/" source="CVE"/>
		<reference ref_id="CVE-2013-0153" ref_url="https://www.suse.com/security/cve/CVE-2013-0153/" source="CVE"/>
		<reference ref_id="CVE-2013-0154" ref_url="https://www.suse.com/security/cve/CVE-2013-0154/" source="CVE"/>
		<reference ref_id="CVE-2013-1432" ref_url="https://www.suse.com/security/cve/CVE-2013-1432/" source="CVE"/>
		<reference ref_id="CVE-2013-1442" ref_url="https://www.suse.com/security/cve/CVE-2013-1442/" source="CVE"/>
		<reference ref_id="CVE-2013-1917" ref_url="https://www.suse.com/security/cve/CVE-2013-1917/" source="CVE"/>
		<reference ref_id="CVE-2013-1918" ref_url="https://www.suse.com/security/cve/CVE-2013-1918/" source="CVE"/>
		<reference ref_id="CVE-2013-1919" ref_url="https://www.suse.com/security/cve/CVE-2013-1919/" source="CVE"/>
		<reference ref_id="CVE-2013-1920" ref_url="https://www.suse.com/security/cve/CVE-2013-1920/" source="CVE"/>
		<reference ref_id="CVE-2013-1952" ref_url="https://www.suse.com/security/cve/CVE-2013-1952/" source="CVE"/>
		<reference ref_id="CVE-2013-1964" ref_url="https://www.suse.com/security/cve/CVE-2013-1964/" source="CVE"/>
		<reference ref_id="CVE-2013-2072" ref_url="https://www.suse.com/security/cve/CVE-2013-2072/" source="CVE"/>
		<reference ref_id="CVE-2013-2076" ref_url="https://www.suse.com/security/cve/CVE-2013-2076/" source="CVE"/>
		<reference ref_id="CVE-2013-2077" ref_url="https://www.suse.com/security/cve/CVE-2013-2077/" source="CVE"/>
		<reference ref_id="CVE-2013-2194" ref_url="https://www.suse.com/security/cve/CVE-2013-2194/" source="CVE"/>
		<reference ref_id="CVE-2013-2195" ref_url="https://www.suse.com/security/cve/CVE-2013-2195/" source="CVE"/>
		<reference ref_id="CVE-2013-2196" ref_url="https://www.suse.com/security/cve/CVE-2013-2196/" source="CVE"/>
		<reference ref_id="CVE-2013-2211" ref_url="https://www.suse.com/security/cve/CVE-2013-2211/" source="CVE"/>
		<reference ref_id="CVE-2013-4329" ref_url="https://www.suse.com/security/cve/CVE-2013-4329/" source="CVE"/>
		<reference ref_id="CVE-2013-4355" ref_url="https://www.suse.com/security/cve/CVE-2013-4355/" source="CVE"/>
		<reference ref_id="CVE-2013-4361" ref_url="https://www.suse.com/security/cve/CVE-2013-4361/" source="CVE"/>
		<reference ref_id="CVE-2013-4368" ref_url="https://www.suse.com/security/cve/CVE-2013-4368/" source="CVE"/>
		<description>

XEN has been updated to fix various security issues:

    * CVE-2013-1917: Xen PV DoS vulnerability with SYSENTER
    * CVE-2013-1918: XSA-45: Several long latency operations are not
      preemptible
    * CVE-2013-1919: Several access permission issues with IRQs for
      unprivileged guests
    * CVE-2013-1920: XSA-47: Potential use of freed memory in event channel
      operations
    * CVE-2013-1952: XSA-49: VT-d interrupt remapping source validation
      flaw for bridges
    * CVE-2013-1964: XSA-50: grant table hypercall acquire/release
      imbalance
    * CVE-2013-2076: XSA-52: Information leak on XSAVE/XRSTOR capable AMD
      CPUs
    * CVE-2013-2077: XSA-53: Hypervisor crash due to missing exception
      recovery on XRSTOR
    * CVE-2013-2194: XSA-55: Multiple vulnerabilities in libelf PV kernel
      handling (also CVE-2013-2195 and CVE-2013-2196)
    * CVE-2013-2072: XSA-56: Buffer overflow in xencontrol Python bindings
      affecting xend
    * CVE-2013-2211: XSA-57: libxl allows guest write access to sensitive
      console related xenstore keys
    * CVE-2013-1432: XSA-58: x86: fix page refcount handling in page table
      pin error path
    * CVE-2013-4329: XSA-61: libxl partially sets up HVM passthrough even
      with disabled iommu
    * CVE-2013-1442: XSA-62: xen: Information leak on AVX and/or LWP
      capable CPUs
    * CVE-2013-4355: XSA-63: Information leaks through I/O instruction
      emulation
    * CVE-2013-4361: XSA-66: Information leak through fbld instruction
      emulation
    * CVE-2013-4368: XSA-67: Information leak through outs instruction
      emulation
    * CVE-2012-4544: XSA-25: Domain builder Out-of-memory due to malicious
      kernel/ramdisk
    * CVE-2013-0153: interrupt remap entries shared and old ones not
      cleared on AMD IOMMUs
    * CVE-2013-0154: XSA-37: Hypervisor crash due to incorrect ASSERT
      (debug build only)
    * CVE-2012-6075: qemu / kvm-qemu: e1000 overflows under some conditions
    * CVE-2012-5634: XSA-33: VT-d interrupt remapping source validation
      flaw.

Security Issue references:

    * CVE-2012-4544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4544&gt;
    * CVE-2012-5634
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5634&gt;
    * CVE-2012-6075
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6075&gt;
    * CVE-2013-0153
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0153&gt;
    * CVE-2013-0154
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0154&gt;
    * CVE-2013-1432
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432&gt;
    * CVE-2013-1442
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442&gt;
    * CVE-2013-1917
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1917&gt;
    * CVE-2013-1918
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1918&gt;
    * CVE-2013-1919
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1919&gt;
    * CVE-2013-1920
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1920&gt;
    * CVE-2013-1952
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1952&gt;
    * CVE-2013-1964
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1964&gt;
    * CVE-2013-2072
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2072&gt;
    * CVE-2013-2076
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076&gt;
    * CVE-2013-2077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077&gt;
    * CVE-2013-2194
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194&gt;
    * CVE-2013-2195
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195&gt;
    * CVE-2013-2196
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196&gt;
    * CVE-2013-2211
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211&gt;
    * CVE-2013-4329
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329&gt;
    * CVE-2013-4355
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355&gt;
    * CVE-2013-4361
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361&gt;
    * CVE-2013-4368
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-30"/>
	<updated date="2013-10-30"/>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/794316">SUSE bug 794316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797031">SUSE bug 797031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797523">SUSE bug 797523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800275">SUSE bug 800275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813675">SUSE bug 813675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813677">SUSE bug 813677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816156">SUSE bug 816156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816159">SUSE bug 816159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816163">SUSE bug 816163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819416">SUSE bug 819416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820917">SUSE bug 820917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820919">SUSE bug 820919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823011">SUSE bug 823011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823608">SUSE bug 823608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826882">SUSE bug 826882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839596">SUSE bug 839596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839618">SUSE bug 839618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841766">SUSE bug 841766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842511">SUSE bug 842511</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4544">CVE-2012-4544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5634/">CVE-2012-5634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5634">CVE-2012-5634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6075/">CVE-2012-6075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6075">CVE-2012-6075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0153/">CVE-2013-0153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0153">CVE-2013-0153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0154/">CVE-2013-0154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0154">CVE-2013-0154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1432/">CVE-2013-1432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1432">CVE-2013-1432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1442/">CVE-2013-1442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1442">CVE-2013-1442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1917/">CVE-2013-1917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1917">CVE-2013-1917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1918/">CVE-2013-1918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1918">CVE-2013-1918 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1919/">CVE-2013-1919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1919">CVE-2013-1919 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1920/">CVE-2013-1920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1920">CVE-2013-1920 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1952/">CVE-2013-1952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1952">CVE-2013-1952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1964/">CVE-2013-1964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1964">CVE-2013-1964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2072/">CVE-2013-2072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2072">CVE-2013-2072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2076/">CVE-2013-2076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2076">CVE-2013-2076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2077/">CVE-2013-2077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2077">CVE-2013-2077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2194/">CVE-2013-2194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2194">CVE-2013-2194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2195/">CVE-2013-2195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2195">CVE-2013-2195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2196/">CVE-2013-2196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2196">CVE-2013-2196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2211/">CVE-2013-2211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2211">CVE-2013-2211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4329/">CVE-2013-4329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4329">CVE-2013-4329 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4355/">CVE-2013-4355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4355">CVE-2013-4355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4361/">CVE-2013-4361 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4361">CVE-2013-4361 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4368/">CVE-2013-4368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4368">CVE-2013-4368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575608" comment="xen-4.0.3_21548_14-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575609" comment="xen-doc-html-4.0.3_21548_14-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575610" comment="xen-doc-pdf-4.0.3_21548_14-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575611" comment="xen-kmp-default-4.0.3_21548_14_2.6.32.54_0.31.TDC-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575612" comment="xen-kmp-trace-4.0.3_21548_14_2.6.32.54_0.31.TDC-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575613" comment="xen-libs-4.0.3_21548_14-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575614" comment="xen-tools-4.0.3_21548_14-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575615" comment="xen-tools-domU-4.0.3_21548_14-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217914" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="777628" ref_url="https://bugzilla.suse.com/777628" source="BUGZILLA"/>
		<reference ref_id="777890" ref_url="https://bugzilla.suse.com/777890" source="BUGZILLA"/>
		<reference ref_id="779212" ref_url="https://bugzilla.suse.com/779212" source="BUGZILLA"/>
		<reference ref_id="786516" ref_url="https://bugzilla.suse.com/786516" source="BUGZILLA"/>
		<reference ref_id="786517" ref_url="https://bugzilla.suse.com/786517" source="BUGZILLA"/>
		<reference ref_id="786519" ref_url="https://bugzilla.suse.com/786519" source="BUGZILLA"/>
		<reference ref_id="786520" ref_url="https://bugzilla.suse.com/786520" source="BUGZILLA"/>
		<reference ref_id="787163" ref_url="https://bugzilla.suse.com/787163" source="BUGZILLA"/>
		<reference ref_id="789944" ref_url="https://bugzilla.suse.com/789944" source="BUGZILLA"/>
		<reference ref_id="789945" ref_url="https://bugzilla.suse.com/789945" source="BUGZILLA"/>
		<reference ref_id="789948" ref_url="https://bugzilla.suse.com/789948" source="BUGZILLA"/>
		<reference ref_id="789950" ref_url="https://bugzilla.suse.com/789950" source="BUGZILLA"/>
		<reference ref_id="789951" ref_url="https://bugzilla.suse.com/789951" source="BUGZILLA"/>
		<reference ref_id="794316" ref_url="https://bugzilla.suse.com/794316" source="BUGZILLA"/>
		<reference ref_id="797031" ref_url="https://bugzilla.suse.com/797031" source="BUGZILLA"/>
		<reference ref_id="797523" ref_url="https://bugzilla.suse.com/797523" source="BUGZILLA"/>
		<reference ref_id="800275" ref_url="https://bugzilla.suse.com/800275" source="BUGZILLA"/>
		<reference ref_id="805094" ref_url="https://bugzilla.suse.com/805094" source="BUGZILLA"/>
		<reference ref_id="813673" ref_url="https://bugzilla.suse.com/813673" source="BUGZILLA"/>
		<reference ref_id="813675" ref_url="https://bugzilla.suse.com/813675" source="BUGZILLA"/>
		<reference ref_id="813677" ref_url="https://bugzilla.suse.com/813677" source="BUGZILLA"/>
		<reference ref_id="816156" ref_url="https://bugzilla.suse.com/816156" source="BUGZILLA"/>
		<reference ref_id="816159" ref_url="https://bugzilla.suse.com/816159" source="BUGZILLA"/>
		<reference ref_id="816163" ref_url="https://bugzilla.suse.com/816163" source="BUGZILLA"/>
		<reference ref_id="819416" ref_url="https://bugzilla.suse.com/819416" source="BUGZILLA"/>
		<reference ref_id="820917" ref_url="https://bugzilla.suse.com/820917" source="BUGZILLA"/>
		<reference ref_id="820919" ref_url="https://bugzilla.suse.com/820919" source="BUGZILLA"/>
		<reference ref_id="823011" ref_url="https://bugzilla.suse.com/823011" source="BUGZILLA"/>
		<reference ref_id="823608" ref_url="https://bugzilla.suse.com/823608" source="BUGZILLA"/>
		<reference ref_id="826882" ref_url="https://bugzilla.suse.com/826882" source="BUGZILLA"/>
		<reference ref_id="831120" ref_url="https://bugzilla.suse.com/831120" source="BUGZILLA"/>
		<reference ref_id="839596" ref_url="https://bugzilla.suse.com/839596" source="BUGZILLA"/>
		<reference ref_id="839618" ref_url="https://bugzilla.suse.com/839618" source="BUGZILLA"/>
		<reference ref_id="840592" ref_url="https://bugzilla.suse.com/840592" source="BUGZILLA"/>
		<reference ref_id="841766" ref_url="https://bugzilla.suse.com/841766" source="BUGZILLA"/>
		<reference ref_id="842511" ref_url="https://bugzilla.suse.com/842511" source="BUGZILLA"/>
		<reference ref_id="848657" ref_url="https://bugzilla.suse.com/848657" source="BUGZILLA"/>
		<reference ref_id="849667" ref_url="https://bugzilla.suse.com/849667" source="BUGZILLA"/>
		<reference ref_id="849668" ref_url="https://bugzilla.suse.com/849668" source="BUGZILLA"/>
		<reference ref_id="853049" ref_url="https://bugzilla.suse.com/853049" source="BUGZILLA"/>
		<reference ref_id="860163" ref_url="https://bugzilla.suse.com/860163" source="BUGZILLA"/>
		<reference ref_id="CVE-2006-1056" ref_url="https://www.suse.com/security/cve/CVE-2006-1056/" source="CVE"/>
		<reference ref_id="CVE-2007-0998" ref_url="https://www.suse.com/security/cve/CVE-2007-0998/" source="CVE"/>
		<reference ref_id="CVE-2012-3497" ref_url="https://www.suse.com/security/cve/CVE-2012-3497/" source="CVE"/>
		<reference ref_id="CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411/" source="CVE"/>
		<reference ref_id="CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535/" source="CVE"/>
		<reference ref_id="CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537/" source="CVE"/>
		<reference ref_id="CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538/" source="CVE"/>
		<reference ref_id="CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544/" source="CVE"/>
		<reference ref_id="CVE-2012-5510" ref_url="https://www.suse.com/security/cve/CVE-2012-5510/" source="CVE"/>
		<reference ref_id="CVE-2012-5511" ref_url="https://www.suse.com/security/cve/CVE-2012-5511/" source="CVE"/>
		<reference ref_id="CVE-2012-5513" ref_url="https://www.suse.com/security/cve/CVE-2012-5513/" source="CVE"/>
		<reference ref_id="CVE-2012-5514" ref_url="https://www.suse.com/security/cve/CVE-2012-5514/" source="CVE"/>
		<reference ref_id="CVE-2012-5515" ref_url="https://www.suse.com/security/cve/CVE-2012-5515/" source="CVE"/>
		<reference ref_id="CVE-2012-5634" ref_url="https://www.suse.com/security/cve/CVE-2012-5634/" source="CVE"/>
		<reference ref_id="CVE-2012-6075" ref_url="https://www.suse.com/security/cve/CVE-2012-6075/" source="CVE"/>
		<reference ref_id="CVE-2012-6333" ref_url="https://www.suse.com/security/cve/CVE-2012-6333/" source="CVE"/>
		<reference ref_id="CVE-2013-0153" ref_url="https://www.suse.com/security/cve/CVE-2013-0153/" source="CVE"/>
		<reference ref_id="CVE-2013-0154" ref_url="https://www.suse.com/security/cve/CVE-2013-0154/" source="CVE"/>
		<reference ref_id="CVE-2013-1432" ref_url="https://www.suse.com/security/cve/CVE-2013-1432/" source="CVE"/>
		<reference ref_id="CVE-2013-1442" ref_url="https://www.suse.com/security/cve/CVE-2013-1442/" source="CVE"/>
		<reference ref_id="CVE-2013-1917" ref_url="https://www.suse.com/security/cve/CVE-2013-1917/" source="CVE"/>
		<reference ref_id="CVE-2013-1918" ref_url="https://www.suse.com/security/cve/CVE-2013-1918/" source="CVE"/>
		<reference ref_id="CVE-2013-1919" ref_url="https://www.suse.com/security/cve/CVE-2013-1919/" source="CVE"/>
		<reference ref_id="CVE-2013-1920" ref_url="https://www.suse.com/security/cve/CVE-2013-1920/" source="CVE"/>
		<reference ref_id="CVE-2013-1952" ref_url="https://www.suse.com/security/cve/CVE-2013-1952/" source="CVE"/>
		<reference ref_id="CVE-2013-1964" ref_url="https://www.suse.com/security/cve/CVE-2013-1964/" source="CVE"/>
		<reference ref_id="CVE-2013-2072" ref_url="https://www.suse.com/security/cve/CVE-2013-2072/" source="CVE"/>
		<reference ref_id="CVE-2013-2076" ref_url="https://www.suse.com/security/cve/CVE-2013-2076/" source="CVE"/>
		<reference ref_id="CVE-2013-2077" ref_url="https://www.suse.com/security/cve/CVE-2013-2077/" source="CVE"/>
		<reference ref_id="CVE-2013-2194" ref_url="https://www.suse.com/security/cve/CVE-2013-2194/" source="CVE"/>
		<reference ref_id="CVE-2013-2195" ref_url="https://www.suse.com/security/cve/CVE-2013-2195/" source="CVE"/>
		<reference ref_id="CVE-2013-2196" ref_url="https://www.suse.com/security/cve/CVE-2013-2196/" source="CVE"/>
		<reference ref_id="CVE-2013-2211" ref_url="https://www.suse.com/security/cve/CVE-2013-2211/" source="CVE"/>
		<reference ref_id="CVE-2013-2212" ref_url="https://www.suse.com/security/cve/CVE-2013-2212/" source="CVE"/>
		<reference ref_id="CVE-2013-4329" ref_url="https://www.suse.com/security/cve/CVE-2013-4329/" source="CVE"/>
		<reference ref_id="CVE-2013-4355" ref_url="https://www.suse.com/security/cve/CVE-2013-4355/" source="CVE"/>
		<reference ref_id="CVE-2013-4361" ref_url="https://www.suse.com/security/cve/CVE-2013-4361/" source="CVE"/>
		<reference ref_id="CVE-2013-4368" ref_url="https://www.suse.com/security/cve/CVE-2013-4368/" source="CVE"/>
		<reference ref_id="CVE-2013-4494" ref_url="https://www.suse.com/security/cve/CVE-2013-4494/" source="CVE"/>
		<reference ref_id="CVE-2013-4553" ref_url="https://www.suse.com/security/cve/CVE-2013-4553/" source="CVE"/>
		<reference ref_id="CVE-2013-4554" ref_url="https://www.suse.com/security/cve/CVE-2013-4554/" source="CVE"/>
		<reference ref_id="CVE-2013-6885" ref_url="https://www.suse.com/security/cve/CVE-2013-6885/" source="CVE"/>
		<reference ref_id="CVE-2014-1891" ref_url="https://www.suse.com/security/cve/CVE-2014-1891/" source="CVE"/>
		<reference ref_id="CVE-2014-1892" ref_url="https://www.suse.com/security/cve/CVE-2014-1892/" source="CVE"/>
		<reference ref_id="CVE-2014-1893" ref_url="https://www.suse.com/security/cve/CVE-2014-1893/" source="CVE"/>
		<reference ref_id="CVE-2014-1894" ref_url="https://www.suse.com/security/cve/CVE-2014-1894/" source="CVE"/>
		<description>

The SUSE Linux Enterprise Server 11 Service Pack 1 Xen hypervisor and 
toolset have been updated to fix various security issues:

The following security issues have been addressed:

    * 

      XSA-60: CVE-2013-2212: The vmx_set_uc_mode function in Xen 3.3
      through 4.3, when disabling chaches, allows local HVM guests with
      access to memory mapped I/O regions to cause a denial of service (CPU
      consumption and possibly hypervisor or guest kernel panic) via a
      crafted GFN range. (bnc#831120)

    * 

      XSA-73: CVE-2013-4494: Xen before 4.1.x, 4.2.x, and 4.3.x does not
      take the page_alloc_lock and grant_table.lock in the same order,
      which allows local guest administrators with access to multiple vcpus
      to cause a denial of service (host deadlock) via unspecified vectors.
      (bnc#848657)

    * 

      XSA-74: CVE-2013-4553: The XEN_DOMCTL_getmemlist hypercall in Xen
      3.4.x through 4.3.x (possibly 4.3.1) does not always obtain the
      page_alloc_lock and mm_rwlock in the same order, which allows local
      guest administrators to cause a denial of service (host deadlock).
      (bnc#849667)

    * 

      XSA-76: CVE-2013-4554: Xen 3.0.3 through 4.1.x (possibly 4.1.6.1),
      4.2.x (possibly 4.2.3), and 4.3.x (possibly 4.3.1) does not properly
      prevent access to hypercalls, which allows local guest users to gain
      privileges via a crafted application running in ring 1 or 2.
      (bnc#849668)

    * 

      XSA-82: CVE-2013-6885: The microcode on AMD 16h 00h through 0Fh
      processors does not properly handle the interaction between locked
      instructions and write-combined memory types, which allows local
      users to cause a denial of service (system hang) via a crafted
      application, aka the errata 793 issue. (bnc#853049)

    * 

      XSA-84: CVE-2014-1891: The FLASK_{GET,SET}BOOL, FLASK_USER and
      FLASK_CONTEXT_TO_SID suboperations of the flask hypercall are
      vulnerable to an integer overflow on the input size. The hypercalls
      attempt to allocate a buffer which is 1 larger than this size and is
      therefore vulnerable to integer overflow and an attempt to allocate
      then access a zero byte buffer. (bnc#860163)

    * 

      XSA-84: CVE-2014-1892 CVE-2014-1893: Xen 3.3 through 4.1, while not
      affected by the above overflow, have a different overflow issue on
      FLASK_{GET,SET}BOOL and expose unreasonably large memory allocation
      to aribitrary guests. (bnc#860163)

    * 

      XSA-84: CVE-2014-1894: Xen 3.2 (and presumably earlier) exhibit both
      problems with the overflow issue being present for more than just the
      suboperations listed above. (bnc#860163)

Security Issues references:

    * CVE-2013-2212
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2212&gt;
    * CVE-2013-4494
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494&gt;
    * CVE-2013-4553
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553&gt;
    * CVE-2013-4554
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4554&gt;
    * CVE-2013-6885
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6885&gt;
    * CVE-2014-1891
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1891&gt;
    * CVE-2014-1892
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1892&gt;
    * CVE-2014-1893
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1893&gt;
    * CVE-2014-1894
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1894&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-01"/>
	<updated date="2014-03-01"/>
	<bugzilla href="https://bugzilla.suse.com/777628">SUSE bug 777628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777890">SUSE bug 777890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786517">SUSE bug 786517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789944">SUSE bug 789944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789945">SUSE bug 789945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789948">SUSE bug 789948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789950">SUSE bug 789950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789951">SUSE bug 789951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/794316">SUSE bug 794316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797031">SUSE bug 797031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797523">SUSE bug 797523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800275">SUSE bug 800275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/805094">SUSE bug 805094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813675">SUSE bug 813675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813677">SUSE bug 813677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816156">SUSE bug 816156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816159">SUSE bug 816159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816163">SUSE bug 816163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819416">SUSE bug 819416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820917">SUSE bug 820917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820919">SUSE bug 820919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823011">SUSE bug 823011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823608">SUSE bug 823608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826882">SUSE bug 826882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831120">SUSE bug 831120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839596">SUSE bug 839596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839618">SUSE bug 839618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841766">SUSE bug 841766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842511">SUSE bug 842511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848657">SUSE bug 848657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849667">SUSE bug 849667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849668">SUSE bug 849668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853049">SUSE bug 853049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860163">SUSE bug 860163</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1056/">CVE-2006-1056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1056">CVE-2006-1056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0998/">CVE-2007-0998 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0998">CVE-2007-0998 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3497/">CVE-2012-3497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3497">CVE-2012-3497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4411">CVE-2012-4411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4535">CVE-2012-4535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4537">CVE-2012-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4538">CVE-2012-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4539">CVE-2012-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4544">CVE-2012-4544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5510/">CVE-2012-5510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5510">CVE-2012-5510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5511/">CVE-2012-5511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5511">CVE-2012-5511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5513/">CVE-2012-5513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5513">CVE-2012-5513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5514/">CVE-2012-5514 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5514">CVE-2012-5514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5515/">CVE-2012-5515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5515">CVE-2012-5515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5634/">CVE-2012-5634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5634">CVE-2012-5634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6075/">CVE-2012-6075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6075">CVE-2012-6075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6333/">CVE-2012-6333 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6333">CVE-2012-6333 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0153/">CVE-2013-0153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0153">CVE-2013-0153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0154/">CVE-2013-0154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0154">CVE-2013-0154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1432/">CVE-2013-1432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1432">CVE-2013-1432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1442/">CVE-2013-1442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1442">CVE-2013-1442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1917/">CVE-2013-1917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1917">CVE-2013-1917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1918/">CVE-2013-1918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1918">CVE-2013-1918 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1919/">CVE-2013-1919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1919">CVE-2013-1919 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1920/">CVE-2013-1920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1920">CVE-2013-1920 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1952/">CVE-2013-1952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1952">CVE-2013-1952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1964/">CVE-2013-1964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1964">CVE-2013-1964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2072/">CVE-2013-2072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2072">CVE-2013-2072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2076/">CVE-2013-2076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2076">CVE-2013-2076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2077/">CVE-2013-2077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2077">CVE-2013-2077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2194/">CVE-2013-2194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2194">CVE-2013-2194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2195/">CVE-2013-2195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2195">CVE-2013-2195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2196/">CVE-2013-2196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2196">CVE-2013-2196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2211/">CVE-2013-2211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2211">CVE-2013-2211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2212/">CVE-2013-2212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2212">CVE-2013-2212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4329/">CVE-2013-4329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4329">CVE-2013-4329 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4355/">CVE-2013-4355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4355">CVE-2013-4355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4361/">CVE-2013-4361 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4361">CVE-2013-4361 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4368/">CVE-2013-4368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4368">CVE-2013-4368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4494/">CVE-2013-4494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4494">CVE-2013-4494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4553/">CVE-2013-4553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4553">CVE-2013-4553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4554/">CVE-2013-4554 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4554">CVE-2013-4554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6885/">CVE-2013-6885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6885">CVE-2013-6885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1891/">CVE-2014-1891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1891">CVE-2014-1891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1892/">CVE-2014-1892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1892">CVE-2014-1892 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1893/">CVE-2014-1893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1893">CVE-2014-1893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1894/">CVE-2014-1894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1894">CVE-2014-1894 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591430" comment="xen-4.0.3_21548_16-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591431" comment="xen-doc-html-4.0.3_21548_16-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591432" comment="xen-doc-pdf-4.0.3_21548_16-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591433" comment="xen-kmp-default-4.0.3_21548_16_2.6.32.54_0.33.TDC-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575620" comment="xen-kmp-pae-4.0.3_21548_16_2.6.32.59_0.9-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591434" comment="xen-kmp-trace-4.0.3_21548_16_2.6.32.54_0.33.TDC-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591435" comment="xen-libs-4.0.3_21548_16-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591436" comment="xen-tools-4.0.3_21548_16-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591437" comment="xen-tools-domU-4.0.3_21548_16-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591430" comment="xen-4.0.3_21548_16-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591431" comment="xen-doc-html-4.0.3_21548_16-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591432" comment="xen-doc-pdf-4.0.3_21548_16-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591433" comment="xen-kmp-default-4.0.3_21548_16_2.6.32.54_0.33.TDC-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575620" comment="xen-kmp-pae-4.0.3_21548_16_2.6.32.59_0.9-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591434" comment="xen-kmp-trace-4.0.3_21548_16_2.6.32.54_0.33.TDC-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591435" comment="xen-libs-4.0.3_21548_16-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591436" comment="xen-tools-4.0.3_21548_16-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591437" comment="xen-tools-domU-4.0.3_21548_16-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217915" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="880751" ref_url="https://bugzilla.suse.com/880751" source="BUGZILLA"/>
		<reference ref_id="895798" ref_url="https://bugzilla.suse.com/895798" source="BUGZILLA"/>
		<reference ref_id="895799" ref_url="https://bugzilla.suse.com/895799" source="BUGZILLA"/>
		<reference ref_id="895802" ref_url="https://bugzilla.suse.com/895802" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4021" ref_url="https://www.suse.com/security/cve/CVE-2014-4021/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 Service Pack 1 Xen package was updated to fix 
the following security issues:

    * XSA-106: Missing privilege level checks in x86 emulation of software
      interrupts (bnc#895802)
    * XSA-105: Missing privilege level checks in x86 HLT, LGDT, LIDT, and
      LMSW emulation (bnc#895799)
    * XSA-104: Race condition in HVMOP_track_dirty_vram (bnc#895798)
    * XSA-100: CVE-2014-4021: Hypervisor heap contents leaked to guests
      (bnc#880751)

Security Issues:

    * CVE-2014-4021
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-22"/>
	<updated date="2014-09-22"/>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895798">SUSE bug 895798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895799">SUSE bug 895799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895802">SUSE bug 895802</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4021/">CVE-2014-4021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4021">CVE-2014-4021 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575625" comment="xen-4.0.3_21548_18-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575626" comment="xen-doc-html-4.0.3_21548_18-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575627" comment="xen-doc-pdf-4.0.3_21548_18-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575628" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.45.TDC-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575629" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.45.TDC-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575630" comment="xen-libs-4.0.3_21548_18-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575631" comment="xen-tools-4.0.3_21548_18-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575632" comment="xen-tools-domU-4.0.3_21548_18-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217916" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="918995" ref_url="https://bugzilla.suse.com/918995" source="BUGZILLA"/>
		<reference ref_id="918998" ref_url="https://bugzilla.suse.com/918998" source="BUGZILLA"/>
		<reference ref_id="919464" ref_url="https://bugzilla.suse.com/919464" source="BUGZILLA"/>
		<reference ref_id="922705" ref_url="https://bugzilla.suse.com/922705" source="BUGZILLA"/>
		<reference ref_id="922706" ref_url="https://bugzilla.suse.com/922706" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2044" ref_url="https://www.suse.com/security/cve/CVE-2015-2044/" source="CVE"/>
		<reference ref_id="CVE-2015-2045" ref_url="https://www.suse.com/security/cve/CVE-2015-2045/" source="CVE"/>
		<reference ref_id="CVE-2015-2151" ref_url="https://www.suse.com/security/cve/CVE-2015-2151/" source="CVE"/>
		<reference ref_id="CVE-2015-2756" ref_url="https://www.suse.com/security/cve/CVE-2015-2756/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001355.html" source="SUSE-SU"/>
		<description>

The Virtualization service XEN was updated to fix various bugs and security 
issues.

The following security issues have been fixed:

    * 

      CVE-2015-2756: XSA-126: Unmediated PCI command register access in
      qemu could have lead to denial of service attacks against the host,
      if PCI cards are - passed through to guests.

    * 

      XSA-125: Long latency MMIO mapping operations were not preemptible.

    * 

      CVE-2015-2151: XSA-123: Instructions with register operands ignored
      eventual segment overrides encoded for them. Due to an insufficiently
      conditional assignment such a bogus segment override could have,
      however, corrupted a pointer used subsequently to store the result of
      the instruction.

    * 

      CVE-2015-2045: XSA-122: The code handling certain sub-operations of
      the HYPERVISOR_xen_version hypercall failed to fully initialize all
      fields of structures subsequently copied back to guest memory. Due to
      this hypervisor stack contents were copied into the destination of
      the operation, thus becoming visible to the guest.

    * 

      CVE-2015-2044: XSA-121: Emulation routines in the hypervisor dealing
      with certain system devices checked whether the access size by the
      guest is a supported one. When the access size is unsupported these
      routines failed to set the data to be returned to the guest for read
      accesses, so that hypervisor stack contents were copied into the
      destination of the operation, thus becoming visible to the guest.

Security Issues:

    * CVE-2015-2044
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2044&gt;
    * CVE-2015-2045
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2045&gt;
    * CVE-2015-2151
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2151&gt;
    * CVE-2015-2756
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-30"/>
	<updated date="2015-03-30"/>
	<bugzilla href="https://bugzilla.suse.com/918995">SUSE bug 918995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919464">SUSE bug 919464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922705">SUSE bug 922705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922706">SUSE bug 922706</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2044/">CVE-2015-2044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2044">CVE-2015-2044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2045/">CVE-2015-2045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2045">CVE-2015-2045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2151/">CVE-2015-2151 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2151">CVE-2015-2151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2756/">CVE-2015-2756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2756">CVE-2015-2756 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009593940" comment="xen-4.0.3_21548_18-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593941" comment="xen-doc-html-4.0.3_21548_18-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593942" comment="xen-doc-pdf-4.0.3_21548_18-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593943" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.55.TDC-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575637" comment="xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593944" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.55.TDC-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593945" comment="xen-libs-4.0.3_21548_18-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593946" comment="xen-tools-4.0.3_21548_18-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593947" comment="xen-tools-domU-4.0.3_21548_18-0.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009593940" comment="xen-4.0.3_21548_18-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593941" comment="xen-doc-html-4.0.3_21548_18-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593942" comment="xen-doc-pdf-4.0.3_21548_18-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593943" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.55.TDC-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575637" comment="xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593944" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.55.TDC-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593945" comment="xen-libs-4.0.3_21548_18-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593946" comment="xen-tools-4.0.3_21548_18-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593947" comment="xen-tools-domU-4.0.3_21548_18-0.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217917" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="931625" ref_url="https://bugzilla.suse.com/931625" source="BUGZILLA"/>
		<reference ref_id="931626" ref_url="https://bugzilla.suse.com/931626" source="BUGZILLA"/>
		<reference ref_id="931627" ref_url="https://bugzilla.suse.com/931627" source="BUGZILLA"/>
		<reference ref_id="931628" ref_url="https://bugzilla.suse.com/931628" source="BUGZILLA"/>
		<reference ref_id="932770" ref_url="https://bugzilla.suse.com/932770" source="BUGZILLA"/>
		<reference ref_id="932996" ref_url="https://bugzilla.suse.com/932996" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-4103" ref_url="https://www.suse.com/security/cve/CVE-2015-4103/" source="CVE"/>
		<reference ref_id="CVE-2015-4104" ref_url="https://www.suse.com/security/cve/CVE-2015-4104/" source="CVE"/>
		<reference ref_id="CVE-2015-4105" ref_url="https://www.suse.com/security/cve/CVE-2015-4105/" source="CVE"/>
		<reference ref_id="CVE-2015-4106" ref_url="https://www.suse.com/security/cve/CVE-2015-4106/" source="CVE"/>
		<reference ref_id="CVE-2015-4164" ref_url="https://www.suse.com/security/cve/CVE-2015-4164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001467.html" source="SUSE-SU"/>
		<description>

Xen was updated to fix six security issues:

    * CVE-2015-4103: Potential unintended writes to host MSI message data
      field via qemu. (XSA-128, bsc#931625)
    * CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests.
      (XSA-129, bsc#931626)
    * CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error
      messages. (XSA-130, bsc#931627)
    * CVE-2015-4106: Unmediated PCI register access in qemu. (XSA-131,
      bsc#931628)
    * CVE-2015-3209: heap overflow in qemu pcnet controller allowing guest
      to host escape. (XSA-135, bsc#932770)
    * CVE-2015-4164: DoS through iret hypercall handler. (XSA-136,
      bsc#932996)

Security Issues:

    * CVE-2015-4103
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103&gt;
    * CVE-2015-4104
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104&gt;
    * CVE-2015-4105
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105&gt;
    * CVE-2015-4106
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106&gt;
    * CVE-2015-4164
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164&gt;
    * CVE-2015-3209
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-05"/>
	<updated date="2015-06-05"/>
	<bugzilla href="https://bugzilla.suse.com/931625">SUSE bug 931625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931626">SUSE bug 931626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931627">SUSE bug 931627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931628">SUSE bug 931628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932770">SUSE bug 932770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932996">SUSE bug 932996</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3209">CVE-2015-3209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4103/">CVE-2015-4103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4103">CVE-2015-4103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4104/">CVE-2015-4104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4104">CVE-2015-4104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4105/">CVE-2015-4105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4105">CVE-2015-4105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4106/">CVE-2015-4106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4106">CVE-2015-4106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4164/">CVE-2015-4164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4164">CVE-2015-4164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594039" comment="xen-4.0.3_21548_18-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594040" comment="xen-doc-html-4.0.3_21548_18-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594041" comment="xen-doc-pdf-4.0.3_21548_18-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594042" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575646" comment="xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594043" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594044" comment="xen-libs-4.0.3_21548_18-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594045" comment="xen-tools-4.0.3_21548_18-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594046" comment="xen-tools-domU-4.0.3_21548_18-0.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594039" comment="xen-4.0.3_21548_18-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594040" comment="xen-doc-html-4.0.3_21548_18-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594041" comment="xen-doc-pdf-4.0.3_21548_18-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594042" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575646" comment="xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594043" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594044" comment="xen-libs-4.0.3_21548_18-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594045" comment="xen-tools-4.0.3_21548_18-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594046" comment="xen-tools-domU-4.0.3_21548_18-0.23.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217918" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950704" ref_url="https://bugzilla.suse.com/950704" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="951845" ref_url="https://bugzilla.suse.com/951845" source="BUGZILLA"/>
		<reference ref_id="953527" ref_url="https://bugzilla.suse.com/953527" source="BUGZILLA"/>
		<reference ref_id="954405" ref_url="https://bugzilla.suse.com/954405" source="BUGZILLA"/>
		<reference ref_id="956408" ref_url="https://bugzilla.suse.com/956408" source="BUGZILLA"/>
		<reference ref_id="956411" ref_url="https://bugzilla.suse.com/956411" source="BUGZILLA"/>
		<reference ref_id="956832" ref_url="https://bugzilla.suse.com/956832" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<description>


This update fixes the following security issues:

- bsc#956832 -  CVE-2015-8345: xen: qemu: net: eepro100:
  infinite loop in processing command block list

- bsc#956408 -  CVE-2015-8339, CVE-2015-8340: xen:
  XENMEM_exchange error handling issues (XSA-159)
- bsc#956411 -  CVE-2015-7504: xen: heap buffer overflow
  vulnerability in pcnet emulator (XSA-162)

- bsc#954405 -  CVE-2015-8104: Xen: guest to host DoS by
  triggering an infinite loop in microcode via #DB exception

- bsc#953527 -  CVE-2015-5307: kernel: kvm/xen: x86: avoid
  guest-&gt;host DOS by intercepting #AC (XSA-156)

- bsc#950704 -  CVE-2015-7970: xen: x86: Long latency
  populate-on-demand operation is not preemptible (XSA-150)

- bsc#951845 -  CVE-2015-7972: xen: x86: populate-on-demand
  balloon size inaccuracy can crash guests (XSA-153)

- bsc#950703 -  CVE-2015-7969: xen: leak of main per-domain
  vcpu pointer array (DoS) (XSA-149)

- bsc#950705 -  CVE-2015-7969: xen: x86: leak of per-domain
  profiling-related vcpu pointer array (DoS) (XSA-151)

- bsc#950706 -  CVE-2015-7971: xen: x86: some pmu and
  profiling hypercalls log without rate limiting (XSA-152)		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-15"/>
	<updated date="2015-12-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950704">SUSE bug 950704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951845">SUSE bug 951845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956411">SUSE bug 956411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956832">SUSE bug 956832</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5307">CVE-2015-5307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7504">CVE-2015-7504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7969">CVE-2015-7969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7970">CVE-2015-7970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7971">CVE-2015-7971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7972">CVE-2015-7972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8104">CVE-2015-8104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8339">CVE-2015-8339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8340">CVE-2015-8340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8345">CVE-2015-8345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575651" comment="xen-4.0.3_21548_18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575652" comment="xen-doc-html-4.0.3_21548_18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575653" comment="xen-doc-pdf-4.0.3_21548_18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575654" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.73.TDC-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575655" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.73.TDC-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575656" comment="xen-libs-4.0.3_21548_18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575657" comment="xen-tools-4.0.3_21548_18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575658" comment="xen-tools-domU-4.0.3_21548_18-33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217919" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1047536" ref_url="https://bugzilla.suse.com/1047536" source="BUGZILLA"/>
		<reference ref_id="814241" ref_url="https://bugzilla.suse.com/814241" source="BUGZILLA"/>
		<reference ref_id="879138" ref_url="https://bugzilla.suse.com/879138" source="BUGZILLA"/>
		<description>
xerces-j2 was updated to fix several issues.

This security issue was fixed:

- bsc#814241: Prevent possible DoS through very long attribute names

This non-security issue was fixed:

- Prevent StackOverflowError when applying a pattern restriction on long strings
  while trying to validate an XML file against a schema (bsc#1047536, bsc#879138)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-17"/>
	<updated date="2017-10-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047536">SUSE bug 1047536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814241">SUSE bug 814241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879138">SUSE bug 879138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575659" comment="xerces-j2-2.8.1-238.29.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565556" comment="xerces-j2-xml-apis-2.8.1-238.29.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565557" comment="xerces-j2-xml-resolver-2.8.1-238.29.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217920" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1195108" ref_url="https://bugzilla.suse.com/1195108" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437/" source="CVE"/>
		<description>
This update for xerces-j2 fixes the following issues:

- CVE-2022-23437: Fixed infinite loop within Apache XercesJ xml parser (bsc#1195108).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195108">SUSE bug 1195108</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23437">CVE-2022-23437 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667942" comment="xerces-j2-2.8.1-238.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667943" comment="xerces-j2-xml-apis-2.8.1-238.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667944" comment="xerces-j2-xml-resolver-2.8.1-238.29.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217921" version="1" class="patch">
	<metadata>
		<title>Security update for xinetd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="598305" ref_url="https://bugzilla.suse.com/598305" source="BUGZILLA"/>
		<reference ref_id="726737" ref_url="https://bugzilla.suse.com/726737" source="BUGZILLA"/>
		<reference ref_id="762294" ref_url="https://bugzilla.suse.com/762294" source="BUGZILLA"/>
		<reference ref_id="844230" ref_url="https://bugzilla.suse.com/844230" source="BUGZILLA"/>
		<reference ref_id="855685" ref_url="https://bugzilla.suse.com/855685" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0862" ref_url="https://www.suse.com/security/cve/CVE-2012-0862/" source="CVE"/>
		<reference ref_id="CVE-2013-4342" ref_url="https://www.suse.com/security/cve/CVE-2013-4342/" source="CVE"/>
		<description>

The multiplexing system xinetd was updated to fix security issues and a 
bug.

Security issues fixed:

    * CVE-2013-4342: xinetd ignores user and group directives for tcpmux
      services.
    * CVE-2012-0862: xinetd enables all services when tcp multiplexing is
      used.

Bug fixed:

    * Services started by xinetd were limited to 1024 open file
      descriptors. (bnc#855685)

Security Issues references:

    * CVE-2012-0862
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0862&gt;
    * CVE-2013-4342
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4342&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-13"/>
	<updated date="2014-03-13"/>
	<bugzilla href="https://bugzilla.suse.com/598305">SUSE bug 598305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/726737">SUSE bug 726737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762294">SUSE bug 762294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844230">SUSE bug 844230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855685">SUSE bug 855685</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0862/">CVE-2012-0862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0862">CVE-2012-0862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4342/">CVE-2013-4342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4342">CVE-2013-4342 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577073" comment="xinetd-2.3.14-130.133.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577073" comment="xinetd-2.3.14-130.133.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217922" version="1" class="patch">
	<metadata>
		<title>Recommended update for xorg-x11</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="598422" ref_url="https://bugzilla.suse.com/598422" source="BUGZILLA"/>
		<reference ref_id="667577" ref_url="https://bugzilla.suse.com/667577" source="BUGZILLA"/>
		<reference ref_id="674733" ref_url="https://bugzilla.suse.com/674733" source="BUGZILLA"/>
		<reference ref_id="693385" ref_url="https://bugzilla.suse.com/693385" source="BUGZILLA"/>
		<reference ref_id="702029" ref_url="https://bugzilla.suse.com/702029" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-0465" ref_url="https://www.suse.com/security/cve/CVE-2011-0465/" source="CVE"/>
		<description>

This collective update for Xorg fixes the following issues:

    * Fixes xdm segfault during login when using ldap's 'Create Home
      Directory on Login' (bnc #693385)
    * run cpp with option '-traditional-cpp' since '-a' option has been
      removed with newer cpp (bnc#702029)
    * fix listing in 'xauth list' when using ssh tunneled connections
      (bnc#667577)

		</description>
<advisory from="security@suse.de">
	<issued date="2011-09-20"/>
	<updated date="2011-09-20"/>
	<bugzilla href="https://bugzilla.suse.com/598422">SUSE bug 598422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/667577">SUSE bug 667577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/674733">SUSE bug 674733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693385">SUSE bug 693385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/702029">SUSE bug 702029</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0465/">CVE-2011-0465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0465">CVE-2011-0465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992471" comment="xorg-x11-7.4-9.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992472" comment="xorg-x11-xauth-7.4-9.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217923" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="462283" ref_url="https://bugzilla.suse.com/462283" source="BUGZILLA"/>
		<reference ref_id="597232" ref_url="https://bugzilla.suse.com/597232" source="BUGZILLA"/>
		<reference ref_id="605015" ref_url="https://bugzilla.suse.com/605015" source="BUGZILLA"/>
		<reference ref_id="605191" ref_url="https://bugzilla.suse.com/605191" source="BUGZILLA"/>
		<reference ref_id="618152" ref_url="https://bugzilla.suse.com/618152" source="BUGZILLA"/>
		<reference ref_id="619232" ref_url="https://bugzilla.suse.com/619232" source="BUGZILLA"/>
		<reference ref_id="625598" ref_url="https://bugzilla.suse.com/625598" source="BUGZILLA"/>
		<reference ref_id="639082" ref_url="https://bugzilla.suse.com/639082" source="BUGZILLA"/>
		<reference ref_id="647568" ref_url="https://bugzilla.suse.com/647568" source="BUGZILLA"/>
		<reference ref_id="648557" ref_url="https://bugzilla.suse.com/648557" source="BUGZILLA"/>
		<reference ref_id="653915" ref_url="https://bugzilla.suse.com/653915" source="BUGZILLA"/>
		<reference ref_id="660797" ref_url="https://bugzilla.suse.com/660797" source="BUGZILLA"/>
		<reference ref_id="722944" ref_url="https://bugzilla.suse.com/722944" source="BUGZILLA"/>
		<reference ref_id="734815" ref_url="https://bugzilla.suse.com/734815" source="BUGZILLA"/>
		<reference ref_id="743810" ref_url="https://bugzilla.suse.com/743810" source="BUGZILLA"/>
		<reference ref_id="744625" ref_url="https://bugzilla.suse.com/744625" source="BUGZILLA"/>
		<reference ref_id="813178" ref_url="https://bugzilla.suse.com/813178" source="BUGZILLA"/>
		<reference ref_id="813683" ref_url="https://bugzilla.suse.com/813683" source="BUGZILLA"/>
		<reference ref_id="814653" ref_url="https://bugzilla.suse.com/814653" source="BUGZILLA"/>
		<reference ref_id="816813" ref_url="https://bugzilla.suse.com/816813" source="BUGZILLA"/>
		<reference ref_id="843652" ref_url="https://bugzilla.suse.com/843652" source="BUGZILLA"/>
		<reference ref_id="853846" ref_url="https://bugzilla.suse.com/853846" source="BUGZILLA"/>
		<reference ref_id="907268" ref_url="https://bugzilla.suse.com/907268" source="BUGZILLA"/>
		<reference ref_id="915810" ref_url="https://bugzilla.suse.com/915810" source="BUGZILLA"/>
		<reference ref_id="928520" ref_url="https://bugzilla.suse.com/928520" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2240" ref_url="https://www.suse.com/security/cve/CVE-2010-2240/" source="CVE"/>
		<reference ref_id="CVE-2011-4028" ref_url="https://www.suse.com/security/cve/CVE-2011-4028/" source="CVE"/>
		<reference ref_id="CVE-2011-4029" ref_url="https://www.suse.com/security/cve/CVE-2011-4029/" source="CVE"/>
		<reference ref_id="CVE-2013-1940" ref_url="https://www.suse.com/security/cve/CVE-2013-1940/" source="CVE"/>
		<reference ref_id="CVE-2013-4396" ref_url="https://www.suse.com/security/cve/CVE-2013-4396/" source="CVE"/>
		<reference ref_id="CVE-2013-6424" ref_url="https://www.suse.com/security/cve/CVE-2013-6424/" source="CVE"/>
		<reference ref_id="CVE-2014-8091" ref_url="https://www.suse.com/security/cve/CVE-2014-8091/" source="CVE"/>
		<reference ref_id="CVE-2014-8092" ref_url="https://www.suse.com/security/cve/CVE-2014-8092/" source="CVE"/>
		<reference ref_id="CVE-2014-8093" ref_url="https://www.suse.com/security/cve/CVE-2014-8093/" source="CVE"/>
		<reference ref_id="CVE-2014-8094" ref_url="https://www.suse.com/security/cve/CVE-2014-8094/" source="CVE"/>
		<reference ref_id="CVE-2014-8095" ref_url="https://www.suse.com/security/cve/CVE-2014-8095/" source="CVE"/>
		<reference ref_id="CVE-2014-8096" ref_url="https://www.suse.com/security/cve/CVE-2014-8096/" source="CVE"/>
		<reference ref_id="CVE-2014-8097" ref_url="https://www.suse.com/security/cve/CVE-2014-8097/" source="CVE"/>
		<reference ref_id="CVE-2014-8098" ref_url="https://www.suse.com/security/cve/CVE-2014-8098/" source="CVE"/>
		<reference ref_id="CVE-2014-8099" ref_url="https://www.suse.com/security/cve/CVE-2014-8099/" source="CVE"/>
		<reference ref_id="CVE-2014-8100" ref_url="https://www.suse.com/security/cve/CVE-2014-8100/" source="CVE"/>
		<reference ref_id="CVE-2014-8101" ref_url="https://www.suse.com/security/cve/CVE-2014-8101/" source="CVE"/>
		<reference ref_id="CVE-2014-8102" ref_url="https://www.suse.com/security/cve/CVE-2014-8102/" source="CVE"/>
		<reference ref_id="CVE-2015-0255" ref_url="https://www.suse.com/security/cve/CVE-2015-0255/" source="CVE"/>
		<reference ref_id="CVE-2015-3418" ref_url="https://www.suse.com/security/cve/CVE-2015-3418/" source="CVE"/>
		<description>

This update fixes the following security issue with xorg-x11-server:

    * bnc#853846: xorg-x11-server: An integer underflow when handling
      trapezoids could have been used to crash the X Server (CVE-2013-6424)

Security Issue reference:

    * CVE-2013-6424
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6424&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-10"/>
	<updated date="2014-01-10"/>
	<bugzilla href="https://bugzilla.suse.com/462283">SUSE bug 462283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/597232">SUSE bug 597232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/605015">SUSE bug 605015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/605191">SUSE bug 605191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/618152">SUSE bug 618152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/619232">SUSE bug 619232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/625598">SUSE bug 625598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/639082">SUSE bug 639082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/647568">SUSE bug 647568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648557">SUSE bug 648557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/653915">SUSE bug 653915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/660797">SUSE bug 660797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/722944">SUSE bug 722944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/734815">SUSE bug 734815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/743810">SUSE bug 743810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744625">SUSE bug 744625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813178">SUSE bug 813178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813683">SUSE bug 813683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814653">SUSE bug 814653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816813">SUSE bug 816813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843652">SUSE bug 843652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853846">SUSE bug 853846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915810">SUSE bug 915810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928520">SUSE bug 928520</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2240/">CVE-2010-2240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2240">CVE-2010-2240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4028/">CVE-2011-4028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4028">CVE-2011-4028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4029/">CVE-2011-4029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4029">CVE-2011-4029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1940/">CVE-2013-1940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1940">CVE-2013-1940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4396/">CVE-2013-4396 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4396">CVE-2013-4396 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6424/">CVE-2013-6424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6424">CVE-2013-6424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8091/">CVE-2014-8091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8091">CVE-2014-8091 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2014-8092/">CVE-2014-8092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8092">CVE-2014-8092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8093/">CVE-2014-8093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8093">CVE-2014-8093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8094/">CVE-2014-8094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8094">CVE-2014-8094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8095/">CVE-2014-8095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8095">CVE-2014-8095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8096/">CVE-2014-8096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8096">CVE-2014-8096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8097/">CVE-2014-8097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8097">CVE-2014-8097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8098/">CVE-2014-8098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8098">CVE-2014-8098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8099/">CVE-2014-8099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8099">CVE-2014-8099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8100/">CVE-2014-8100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8100">CVE-2014-8100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8101/">CVE-2014-8101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8101">CVE-2014-8101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8102/">CVE-2014-8102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8102">CVE-2014-8102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0255/">CVE-2015-0255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0255">CVE-2015-0255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3418/">CVE-2015-3418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3418">CVE-2015-3418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992473" comment="xorg-x11-Xvnc-7.4-27.40.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992474" comment="xorg-x11-server-7.4-27.40.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992475" comment="xorg-x11-server-extra-7.4-27.40.68.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992473" comment="xorg-x11-Xvnc-7.4-27.40.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992474" comment="xorg-x11-server-7.4-27.40.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992475" comment="xorg-x11-server-extra-7.4-27.40.68.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217924" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821663" ref_url="https://bugzilla.suse.com/821663" source="BUGZILLA"/>
		<reference ref_id="854915" ref_url="https://bugzilla.suse.com/854915" source="BUGZILLA"/>
		<reference ref_id="857544" ref_url="https://bugzilla.suse.com/857544" source="BUGZILLA"/>
		<reference ref_id="921978" ref_url="https://bugzilla.suse.com/921978" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1984" ref_url="https://www.suse.com/security/cve/CVE-2013-1984/" source="CVE"/>
		<reference ref_id="CVE-2013-1985" ref_url="https://www.suse.com/security/cve/CVE-2013-1985/" source="CVE"/>
		<reference ref_id="CVE-2013-1986" ref_url="https://www.suse.com/security/cve/CVE-2013-1986/" source="CVE"/>
		<reference ref_id="CVE-2013-1988" ref_url="https://www.suse.com/security/cve/CVE-2013-1988/" source="CVE"/>
		<reference ref_id="CVE-2013-1990" ref_url="https://www.suse.com/security/cve/CVE-2013-1990/" source="CVE"/>
		<reference ref_id="CVE-2013-1991" ref_url="https://www.suse.com/security/cve/CVE-2013-1991/" source="CVE"/>
		<reference ref_id="CVE-2013-1992" ref_url="https://www.suse.com/security/cve/CVE-2013-1992/" source="CVE"/>
		<reference ref_id="CVE-2013-1995" ref_url="https://www.suse.com/security/cve/CVE-2013-1995/" source="CVE"/>
		<reference ref_id="CVE-2013-1996" ref_url="https://www.suse.com/security/cve/CVE-2013-1996/" source="CVE"/>
		<reference ref_id="CVE-2013-1998" ref_url="https://www.suse.com/security/cve/CVE-2013-1998/" source="CVE"/>
		<reference ref_id="CVE-2013-1999" ref_url="https://www.suse.com/security/cve/CVE-2013-1999/" source="CVE"/>
		<reference ref_id="CVE-2013-2000" ref_url="https://www.suse.com/security/cve/CVE-2013-2000/" source="CVE"/>
		<reference ref_id="CVE-2013-2001" ref_url="https://www.suse.com/security/cve/CVE-2013-2001/" source="CVE"/>
		<reference ref_id="CVE-2013-2003" ref_url="https://www.suse.com/security/cve/CVE-2013-2003/" source="CVE"/>
		<reference ref_id="CVE-2013-2063" ref_url="https://www.suse.com/security/cve/CVE-2013-2063/" source="CVE"/>
		<reference ref_id="CVE-2013-6462" ref_url="https://www.suse.com/security/cve/CVE-2013-6462/" source="CVE"/>
		<reference ref_id="CVE-2014-0209" ref_url="https://www.suse.com/security/cve/CVE-2014-0209/" source="CVE"/>
		<reference ref_id="CVE-2014-0210" ref_url="https://www.suse.com/security/cve/CVE-2014-0210/" source="CVE"/>
		<reference ref_id="CVE-2014-0211" ref_url="https://www.suse.com/security/cve/CVE-2014-0211/" source="CVE"/>
		<reference ref_id="CVE-2015-1802" ref_url="https://www.suse.com/security/cve/CVE-2015-1802/" source="CVE"/>
		<reference ref_id="CVE-2015-1803" ref_url="https://www.suse.com/security/cve/CVE-2015-1803/" source="CVE"/>
		<reference ref_id="CVE-2015-1804" ref_url="https://www.suse.com/security/cve/CVE-2015-1804/" source="CVE"/>
		<description>

xorg-x11-libs was patched to fix the following security issues:

    * Integer overflow of allocations in font metadata file parsing.
      (CVE-2014-0209)
    * libxfont not validating length fields when parsing xfs protocol
      replies. (CVE-2014-0210)
    * Integer overflows causing miscalculating memory needs for xfs
      replies. (CVE-2014-0211)

Further information is available at 
http://lists.x.org/archives/xorg-announce/2014-May/002431.html
&lt;http://lists.x.org/archives/xorg-announce/2014-May/002431.html&gt; .

Security Issues references:

    * CVE-2014-0209
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209&gt;
    * CVE-2014-0210
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210&gt;
    * CVE-2014-0211
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-15"/>
	<updated date="2014-05-15"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854915">SUSE bug 854915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857544">SUSE bug 857544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921978">SUSE bug 921978</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1984/">CVE-2013-1984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1984">CVE-2013-1984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1985/">CVE-2013-1985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1985">CVE-2013-1985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1986/">CVE-2013-1986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1986">CVE-2013-1986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1988/">CVE-2013-1988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1988">CVE-2013-1988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1990/">CVE-2013-1990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1990">CVE-2013-1990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1991/">CVE-2013-1991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1991">CVE-2013-1991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1992/">CVE-2013-1992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1992">CVE-2013-1992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1995/">CVE-2013-1995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1995">CVE-2013-1995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1996/">CVE-2013-1996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1996">CVE-2013-1996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1998/">CVE-2013-1998 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1998">CVE-2013-1998 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1999/">CVE-2013-1999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1999">CVE-2013-1999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2000/">CVE-2013-2000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2000">CVE-2013-2000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2001/">CVE-2013-2001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2001">CVE-2013-2001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2003/">CVE-2013-2003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2003">CVE-2013-2003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2063/">CVE-2013-2063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2063">CVE-2013-2063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6462/">CVE-2013-6462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6462">CVE-2013-6462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0209/">CVE-2014-0209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0209">CVE-2014-0209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0210/">CVE-2014-0210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0210">CVE-2014-0210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0211/">CVE-2014-0211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0211">CVE-2014-0211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1802/">CVE-2015-1802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1802">CVE-2015-1802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1803/">CVE-2015-1803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1803">CVE-2015-1803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1804/">CVE-2015-1804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1804">CVE-2015-1804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009592637" comment="xorg-x11-libs-7.4-8.26.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592638" comment="xorg-x11-libs-32bit-7.4-8.26.42.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009592637" comment="xorg-x11-libs-7.4-8.26.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592638" comment="xorg-x11-libs-32bit-7.4-8.26.42.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217925" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libICE (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1025068" ref_url="https://bugzilla.suse.com/1025068" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2626" ref_url="https://www.suse.com/security/cve/CVE-2017-2626/" source="CVE"/>
		<description>
This update for xorg-x11-libICE fixes the following issues:

- CVE-2017-2626: Creation of the ICE auth session cookies used insufficient randomness, making these cookies
  predictable. A more random generation method has been implemented. (boo#1025068)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-12"/>
	<updated date="2017-07-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025068">SUSE bug 1025068</bugzilla>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-2626/">CVE-2017-2626 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2626">CVE-2017-2626 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575662" comment="xorg-x11-libICE-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575663" comment="xorg-x11-libICE-32bit-7.4-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217926" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="714901" ref_url="https://bugzilla.suse.com/714901" source="BUGZILLA"/>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821664" ref_url="https://bugzilla.suse.com/821664" source="BUGZILLA"/>
		<reference ref_id="824294" ref_url="https://bugzilla.suse.com/824294" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1981" ref_url="https://www.suse.com/security/cve/CVE-2013-1981/" source="CVE"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<reference ref_id="CVE-2013-2004" ref_url="https://www.suse.com/security/cve/CVE-2013-2004/" source="CVE"/>
		<description>

This update of xorg-x11-libX11 fixes several security issues (bnc#815451, 
bnc#821664).

Security Issue references:

    * CVE-2013-1981
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981&gt;
    * CVE-2013-1997
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997&gt;
    * CVE-2013-2004
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/714901">SUSE bug 714901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821664">SUSE bug 821664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824294">SUSE bug 824294</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1981/">CVE-2013-1981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1981">CVE-2013-1981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1997">CVE-2013-1997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2004/">CVE-2013-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2004">CVE-2013-2004 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992476" comment="xorg-x11-libX11-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992477" comment="xorg-x11-libX11-32bit-7.4-5.11.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992476" comment="xorg-x11-libX11-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992477" comment="xorg-x11-libX11-32bit-7.4-5.11.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217927" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="927220" ref_url="https://bugzilla.suse.com/927220" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7439" ref_url="https://www.suse.com/security/cve/CVE-2013-7439/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001521.html" source="SUSE-SU"/>
		<description>
xorg-x11-libX11 was updated to fix one security issue.

This security issue was fixed:
- CVE-2013-7439: Multiple off-by-one errors in the (1) MakeBigReq and (2) SetReqLen macros in include/X11/Xlibint.h in X11R6.x and libX11 before 1.6.0 allowed remote attackers to have unspecified impact via a crafted request, which triggered a buffer overflow (bsc#927220).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-17"/>
	<updated date="2015-07-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/927220">SUSE bug 927220</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7439/">CVE-2013-7439 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7439">CVE-2013-7439 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575664" comment="xorg-x11-libX11-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575665" comment="xorg-x11-libX11-32bit-7.4-5.11.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575664" comment="xorg-x11-libX11-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575665" comment="xorg-x11-libX11-32bit-7.4-5.11.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217928" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1002991" ref_url="https://bugzilla.suse.com/1002991" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7942" ref_url="https://www.suse.com/security/cve/CVE-2016-7942/" source="CVE"/>
		<description>

This update for xorg-x11-libX11 fixes the following issues:

  - plug a memory leak (bsc#1002991, CVE-2016-7942)
  - insufficient validation of data from the X server can cause
    out of boundary memory read (XGetImage()) or write (XListFonts())
    (bsc#1002991, CVE-2016-7942)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-08"/>
	<updated date="2016-12-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002991">SUSE bug 1002991</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7942/">CVE-2016-7942 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7942">CVE-2016-7942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575666" comment="xorg-x11-libX11-7.4-5.11.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575667" comment="xorg-x11-libX11-32bit-7.4-5.11.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217929" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1019642" ref_url="https://bugzilla.suse.com/1019642" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<description>

This update for xorg-x11-libX11 fixes the following issues:

- a regression introduced by the security fix for CVE-2013-1997
  (bnc#824294). Keyboard mappings for special characters on Non-English
  keyboards might have been broken. (bnc#1019642)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-09"/>
	<updated date="2017-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1019642">SUSE bug 1019642</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1997">CVE-2013-1997 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575668" comment="xorg-x11-libX11-7.4-5.11.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575669" comment="xorg-x11-libX11-32bit-7.4-5.11.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217930" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1102062" ref_url="https://bugzilla.suse.com/1102062" source="BUGZILLA"/>
		<reference ref_id="1102068" ref_url="https://bugzilla.suse.com/1102068" source="BUGZILLA"/>
		<reference ref_id="1102073" ref_url="https://bugzilla.suse.com/1102073" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14598" ref_url="https://www.suse.com/security/cve/CVE-2018-14598/" source="CVE"/>
		<reference ref_id="CVE-2018-14599" ref_url="https://www.suse.com/security/cve/CVE-2018-14599/" source="CVE"/>
		<reference ref_id="CVE-2018-14600" ref_url="https://www.suse.com/security/cve/CVE-2018-14600/" source="CVE"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- CVE-2018-14599: The function XListExtensions was vulnerable to an off-by-one
  error caused by malicious server responses, leading to DoS or possibly
  unspecified other impact (bsc#1102062)
- CVE-2018-14600: The function XListExtensions interpreted a variable as signed
  instead of unsigned, resulting in an out-of-bounds write (of up to 128 bytes),
  leading to DoS or remote code execution (bsc#1102068)
- CVE-2018-14598: A malicious server could have sent a reply in which the first
  string overflows, causing a variable to be set to NULL that will be freed later
  on, leading to DoS (segmentation fault) (bsc#1102073)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-28"/>
	<updated date="2018-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1102062">SUSE bug 1102062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102068">SUSE bug 1102068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102073">SUSE bug 1102073</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14598/">CVE-2018-14598 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14598">CVE-2018-14598 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14599/">CVE-2018-14599 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14599">CVE-2018-14599 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14600/">CVE-2018-14600 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14600">CVE-2018-14600 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575670" comment="xorg-x11-libX11-7.4-5.11.72.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575671" comment="xorg-x11-libX11-32bit-7.4-5.11.72.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217931" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-05"/>
	<updated date="2020-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14344">CVE-2020-14344 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575672" comment="xorg-x11-libX11-7.4-5.11.72.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575673" comment="xorg-x11-libX11-32bit-7.4-5.11.72.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217932" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-11"/>
	<updated date="2020-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14344">CVE-2020-14344 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575674" comment="xorg-x11-libX11-7.4-5.11.72.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575675" comment="xorg-x11-libX11-32bit-7.4-5.11.72.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217933" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1175239" ref_url="https://bugzilla.suse.com/1175239" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14363" ref_url="https://www.suse.com/security/cve/CVE-2020-14363/" source="CVE"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- CVE-2020-14363: Fix an integer overflow in init_om() (bsc#1175239).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-15"/>
	<updated date="2020-09-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175239">SUSE bug 1175239</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14363/">CVE-2020-14363 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14363">CVE-2020-14363 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575676" comment="xorg-x11-libX11-7.4-5.11.72.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575677" comment="xorg-x11-libX11-32bit-7.4-5.11.72.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217934" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1182506" ref_url="https://bugzilla.suse.com/1182506" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535/" source="CVE"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- CVE-2021-31535: Fixed missing request length checks in libX11 (bsc#1182506).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-26"/>
	<updated date="2021-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182506">SUSE bug 1182506</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31535">CVE-2021-31535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575678" comment="xorg-x11-libX11-7.4-5.11.72.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575679" comment="xorg-x11-libX11-32bit-7.4-5.11.72.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217935" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1186643" ref_url="https://bugzilla.suse.com/1186643" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535/" source="CVE"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- Regression in the fix for CVE-2021-31535, causing segfaults for xforms applications like fdesign (bsc#1186643).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-15"/>
	<updated date="2021-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186643">SUSE bug 1186643</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31535">CVE-2021-31535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575680" comment="xorg-x11-libX11-7.4-5.11.72.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575681" comment="xorg-x11-libX11-32bit-7.4-5.11.72.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217936" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXdmcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1025046" ref_url="https://bugzilla.suse.com/1025046" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2625" ref_url="https://www.suse.com/security/cve/CVE-2017-2625/" source="CVE"/>
		<description>
This update for xorg-x11-libXdmcp fixes the following issues:

- CVE-2017-2625: The generation of session key in XDM using libXdmcp might have used weak entropy, making
  the session keys predictable (bsc#1025046)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-14"/>
	<updated date="2017-07-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025046">SUSE bug 1025046</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2625/">CVE-2017-2625 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2625">CVE-2017-2625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575682" comment="xorg-x11-libXdmcp-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565566" comment="xorg-x11-libXdmcp-32bit-7.4-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217937" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXext</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821665" ref_url="https://bugzilla.suse.com/821665" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982/" source="CVE"/>
		<description>

This update of xorg-x11-libXext fixes several integer overflow issues 
(bnc#815451, bnc#821665, CVE-2013-1982).

Security Issue reference:

    * CVE-2013-1982
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-31"/>
	<updated date="2013-05-31"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821665">SUSE bug 821665</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1982">CVE-2013-1982 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591187" comment="xorg-x11-libXext-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591188" comment="xorg-x11-libXext-32bit-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591187" comment="xorg-x11-libXext-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591188" comment="xorg-x11-libXext-32bit-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217938" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXfixes</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821667" ref_url="https://bugzilla.suse.com/821667" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983/" source="CVE"/>
		<description>

This update of xorg-x11-libXfixes fixes a integer overflow issue 
(bnc#815451, bnc#821667, CVE-2013-1983).

Security Issue reference:

    * CVE-2013-1983
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-31"/>
	<updated date="2013-05-31"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821667">SUSE bug 821667</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1983">CVE-2013-1983 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591189" comment="xorg-x11-libXfixes-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591190" comment="xorg-x11-libXfixes-32bit-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591189" comment="xorg-x11-libXfixes-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591190" comment="xorg-x11-libXfixes-32bit-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217939" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXfixes (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1002995" ref_url="https://bugzilla.suse.com/1002995" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7944" ref_url="https://www.suse.com/security/cve/CVE-2016-7944/" source="CVE"/>
		<description>

This update for xorg-x11-libXfixes fixes the following issues:

  - insufficient validation of data from the X server can cause an
    integer overflow on 32 bit architectures (bsc#1002995, CVE-2016-7944)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-16"/>
	<updated date="2016-12-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002995">SUSE bug 1002995</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7944/">CVE-2016-7944 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7944">CVE-2016-7944 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575687" comment="xorg-x11-libXfixes-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575688" comment="xorg-x11-libXfixes-32bit-7.4-1.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217940" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821668" ref_url="https://bugzilla.suse.com/821668" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2062" ref_url="https://www.suse.com/security/cve/CVE-2013-2062/" source="CVE"/>
		<description>

This update of xorg-x11-libXp fixes several integer overflow issues 
(bnc#815451, bnc#821668, CVE-2013-2062).

Security Issue reference:

    * CVE-2013-2062
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821668">SUSE bug 821668</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2062/">CVE-2013-2062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2062">CVE-2013-2062 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591220" comment="xorg-x11-libXp-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591221" comment="xorg-x11-libXp-32bit-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591220" comment="xorg-x11-libXp-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591221" comment="xorg-x11-libXp-32bit-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217941" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXpm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1021315" ref_url="https://bugzilla.suse.com/1021315" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10164" ref_url="https://www.suse.com/security/cve/CVE-2016-10164/" source="CVE"/>
		<description>

This update for xorg-x11-libXpm fixes the following security issue:

- A heap overflow in XPM handling could be used by attackers supplying
  XPM files to  crash or potentially execute code. (bsc#1021315)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1021315">SUSE bug 1021315</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10164/">CVE-2016-10164 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10164">CVE-2016-10164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575691" comment="xorg-x11-libXpm-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575692" comment="xorg-x11-libXpm-32bit-7.4-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217942" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXrender</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821669" ref_url="https://bugzilla.suse.com/821669" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987/" source="CVE"/>
		<description>

This update of xorg-x11-libXrender fixes several integer overflow issues 
(bnc#815451, bnc#821669, CVE-2013-1987).

Security Issue reference:

    * CVE-2013-1987
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-03"/>
	<updated date="2013-06-03"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821669">SUSE bug 821669</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1987">CVE-2013-1987 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591206" comment="xorg-x11-libXrender-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591207" comment="xorg-x11-libXrender-32bit-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591206" comment="xorg-x11-libXrender-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591207" comment="xorg-x11-libXrender-32bit-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217943" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXrender (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1003002" ref_url="https://bugzilla.suse.com/1003002" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7949" ref_url="https://www.suse.com/security/cve/CVE-2016-7949/" source="CVE"/>
		<reference ref_id="CVE-2016-7950" ref_url="https://www.suse.com/security/cve/CVE-2016-7950/" source="CVE"/>
		<description>

This update for xorg-x11-libXrender fixes the following issues:

  - insufficient validation of data from the X server can cause out
    of boundary memory writes (bsc#1003002, CVE-2016-7949, CVE-2016-7950)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-13"/>
	<updated date="2016-12-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003002">SUSE bug 1003002</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7949/">CVE-2016-7949 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7949">CVE-2016-7949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7950/">CVE-2016-7950 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7950">CVE-2016-7950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575695" comment="xorg-x11-libXrender-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575696" comment="xorg-x11-libXrender-32bit-7.4-1.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217944" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821670" ref_url="https://bugzilla.suse.com/821670" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002/" source="CVE"/>
		<reference ref_id="CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005/" source="CVE"/>
		<description>

This update of xorg-x11-libXt fixes several integer and buffer overflow 
issues (bnc#815451, bnc#821670, CVE-2013-2002, CVE-2013-2005).

Security Issue references:

    * CVE-2013-2002
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002&gt;
    * CVE-2013-2005
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-04"/>
	<updated date="2013-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821670">SUSE bug 821670</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2002">CVE-2013-2002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2005">CVE-2013-2005 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591214" comment="xorg-x11-libXt-7.4-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591215" comment="xorg-x11-libXt-32bit-7.4-1.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591214" comment="xorg-x11-libXt-7.4-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591215" comment="xorg-x11-libXt-32bit-7.4-1.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217945" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXv</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821671" ref_url="https://bugzilla.suse.com/821671" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989/" source="CVE"/>
		<reference ref_id="CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066/" source="CVE"/>
		<description>

This update of xorg-x11-libXv fixes several integer and buffer overflow 
issues (bnc#815451, bnc#821671, CVE-2013-1989, CVE-2013-2066).

Security Issue references:

    * CVE-2013-1989
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989&gt;
    * CVE-2013-2066
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-04"/>
	<updated date="2013-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821671">SUSE bug 821671</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1989">CVE-2013-1989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2066">CVE-2013-2066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591208" comment="xorg-x11-libXv-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591209" comment="xorg-x11-libXv-32bit-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591208" comment="xorg-x11-libXv-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591209" comment="xorg-x11-libXv-32bit-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217946" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXv (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1003017" ref_url="https://bugzilla.suse.com/1003017" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5407" ref_url="https://www.suse.com/security/cve/CVE-2016-5407/" source="CVE"/>
		<description>

This update for xorg-x11-libXv fixes the following issues:

  - insufficient validation of data from the X server can cause
    memory corruption (bsc#1003017, CVE-2016-5407)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-13"/>
	<updated date="2016-12-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003017">SUSE bug 1003017</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5407/">CVE-2016-5407 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5407">CVE-2016-5407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575701" comment="xorg-x11-libXv-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575702" comment="xorg-x11-libXv-32bit-7.4-1.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217947" version="1" class="patch">
	<metadata>
		<title>Recommended update for xorg-x11-libs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="958383" ref_url="https://bugzilla.suse.com/958383" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1804" ref_url="https://www.suse.com/security/cve/CVE-2015-1804/" source="CVE"/>
		<description>

This update for xorg-x11-libs fixes the following issues: 

- The original fix for CVE-2015-1804 prevented DWIDTH to be negative. However, the
  spec states that 'DWIDTH [...] is a vector indicating the position of the next
  glyph's origin relative to the origin of this glyph'. Consequently, negative 
  DWIDTH values should be allowed. (bsc#958383)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-29"/>
	<updated date="2015-12-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958383">SUSE bug 958383</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1804/">CVE-2015-1804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1804">CVE-2015-1804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009593934" comment="xorg-x11-libs-7.4-8.26.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593933" comment="xorg-x11-libs-32bit-7.4-8.26.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217948" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1002998" ref_url="https://bugzilla.suse.com/1002998" source="BUGZILLA"/>
		<reference ref_id="1003000" ref_url="https://bugzilla.suse.com/1003000" source="BUGZILLA"/>
		<reference ref_id="1003012" ref_url="https://bugzilla.suse.com/1003012" source="BUGZILLA"/>
		<reference ref_id="1003023" ref_url="https://bugzilla.suse.com/1003023" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7945" ref_url="https://www.suse.com/security/cve/CVE-2016-7945/" source="CVE"/>
		<reference ref_id="CVE-2016-7946" ref_url="https://www.suse.com/security/cve/CVE-2016-7946/" source="CVE"/>
		<reference ref_id="CVE-2016-7947" ref_url="https://www.suse.com/security/cve/CVE-2016-7947/" source="CVE"/>
		<reference ref_id="CVE-2016-7948" ref_url="https://www.suse.com/security/cve/CVE-2016-7948/" source="CVE"/>
		<reference ref_id="CVE-2016-7951" ref_url="https://www.suse.com/security/cve/CVE-2016-7951/" source="CVE"/>
		<reference ref_id="CVE-2016-7952" ref_url="https://www.suse.com/security/cve/CVE-2016-7952/" source="CVE"/>
		<reference ref_id="CVE-2016-7953" ref_url="https://www.suse.com/security/cve/CVE-2016-7953/" source="CVE"/>
		<description>

This update for xorg-x11-libs fixes the following issues:

  - insufficient validation of data from the X server can cause a
    one byte buffer read underrun (bsc#1003023, CVE-2016-7953)
  - insufficient validation of data from the X server can cause out
    of boundary memory access or endless loops (Denial of Service)
    (bsc#1003012, CVE-2016-7951, CVE-2016-7952)
  - insufficient validation of data from the X server can cause out
    of boundary memory writes (bsc#1003000, CVE-2016-7947, CVE-2016-7948)
  - insufficient validation of data from the X server can cause out
    of boundary memory access or endless loops (Denial of Service).
    (bsc#1002998, CVE-2016-7945, CVE-2016-7946)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-16"/>
	<updated date="2016-12-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002998">SUSE bug 1002998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003000">SUSE bug 1003000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003012">SUSE bug 1003012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003023">SUSE bug 1003023</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7945/">CVE-2016-7945 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7945">CVE-2016-7945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7946/">CVE-2016-7946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7946">CVE-2016-7946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7947/">CVE-2016-7947 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7947">CVE-2016-7947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7948/">CVE-2016-7948 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7948">CVE-2016-7948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7951/">CVE-2016-7951 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7951">CVE-2016-7951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7952/">CVE-2016-7952 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7952">CVE-2016-7952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7953/">CVE-2016-7953 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7953">CVE-2016-7953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575703" comment="xorg-x11-libs-7.4-8.26.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575704" comment="xorg-x11-libs-32bit-7.4-8.26.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217949" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1049692" ref_url="https://bugzilla.suse.com/1049692" source="BUGZILLA"/>
		<reference ref_id="1050459" ref_url="https://bugzilla.suse.com/1050459" source="BUGZILLA"/>
		<reference ref_id="1054285" ref_url="https://bugzilla.suse.com/1054285" source="BUGZILLA"/>
		<reference ref_id="1065386" ref_url="https://bugzilla.suse.com/1065386" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13720" ref_url="https://www.suse.com/security/cve/CVE-2017-13720/" source="CVE"/>
		<reference ref_id="CVE-2017-13722" ref_url="https://www.suse.com/security/cve/CVE-2017-13722/" source="CVE"/>
		<reference ref_id="CVE-2017-16612" ref_url="https://www.suse.com/security/cve/CVE-2017-16612/" source="CVE"/>
		<description>
This update for xorg-x11-libs fixes several issues.

These security issues were fixed:

- CVE-2017-16612: Heap overflows due to an integer overflow while parsing images and a signedness issue while parsing comments (bsc#1065386).
- CVE-2017-13720: Improper check for end of string in PatterMatch caused invalid reads (bsc#1054285)
- CVE-2017-13722: Malformed PCF file could have caused DoS or leak information (bsc#1049692)
- Prevent the X server from accessing arbitrary files as root. It is not possible to leak information, but special files can be touched allowing for causing side effects (bsc#1050459)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049692">SUSE bug 1049692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050459">SUSE bug 1050459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054285">SUSE bug 1054285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065386">SUSE bug 1065386</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-13720/">CVE-2017-13720 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13720">CVE-2017-13720 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13722/">CVE-2017-13722 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13722">CVE-2017-13722 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16612/">CVE-2017-16612 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16612">CVE-2017-16612 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575705" comment="xorg-x11-libs-7.4-8.26.50.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575706" comment="xorg-x11-libs-32bit-7.4-8.26.50.5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217950" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1103511" ref_url="https://bugzilla.suse.com/1103511" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9262" ref_url="https://www.suse.com/security/cve/CVE-2015-9262/" source="CVE"/>
		<description>
This update for xorg-x11-libs fixes the following security issue:

- CVE-2015-9262: _XcursorThemeInherits allowed remote attackers to cause denial
  of service or potentially code execution via a one-byte heap overflow
  (bsc#1103511)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-21"/>
	<updated date="2018-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103511">SUSE bug 1103511</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-9262/">CVE-2015-9262 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9262">CVE-2015-9262 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575707" comment="xorg-x11-libs-7.4-8.26.50.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575708" comment="xorg-x11-libs-32bit-7.4-8.26.50.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217951" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libxcb</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="818829" ref_url="https://bugzilla.suse.com/818829" source="BUGZILLA"/>
		<reference ref_id="821584" ref_url="https://bugzilla.suse.com/821584" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2064" ref_url="https://www.suse.com/security/cve/CVE-2013-2064/" source="CVE"/>
		<description>

This update for xorg-x11-libxcb addresses the following issues:

    * Fix a deadlock with multi-threaded applications running on real time
      kernels. (bnc#818829)
    * Fix an integer overflow in read_packet(). (bnc#821584, CVE-2013-2064)

Security Issue reference:

    * CVE-2013-2064
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2064&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-24"/>
	<updated date="2013-05-24"/>
	<bugzilla href="https://bugzilla.suse.com/818829">SUSE bug 818829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821584">SUSE bug 821584</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2064/">CVE-2013-2064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2064">CVE-2013-2064 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591222" comment="xorg-x11-libxcb-7.4-1.22.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591223" comment="xorg-x11-libxcb-32bit-7.4-1.22.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591222" comment="xorg-x11-libxcb-7.4-1.22.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591223" comment="xorg-x11-libxcb-32bit-7.4-1.22.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217952" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1025029" ref_url="https://bugzilla.suse.com/1025029" source="BUGZILLA"/>
		<reference ref_id="1025035" ref_url="https://bugzilla.suse.com/1025035" source="BUGZILLA"/>
		<reference ref_id="1025084" ref_url="https://bugzilla.suse.com/1025084" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2624" ref_url="https://www.suse.com/security/cve/CVE-2017-2624/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

Security issues:

- CVE-2017-2624: Prevent timing attack against MIT cookie. (bsc#1025029)

Non security issues:

- Remove unused function with use-after-free issue. (bsc#1025035)
- Use arc4random to generate cookies. (bsc#1025084)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-27"/>
	<updated date="2017-06-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025029">SUSE bug 1025029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025035">SUSE bug 1025035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025084">SUSE bug 1025084</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-2624/">CVE-2017-2624 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2624">CVE-2017-2624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575711" comment="xorg-x11-Xvnc-7.4-27.40.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575712" comment="xorg-x11-server-7.4-27.40.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575713" comment="xorg-x11-server-extra-7.4-27.40.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217953" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1025084" ref_url="https://bugzilla.suse.com/1025084" source="BUGZILLA"/>
		<reference ref_id="1063034" ref_url="https://bugzilla.suse.com/1063034" source="BUGZILLA"/>
		<reference ref_id="1063035" ref_url="https://bugzilla.suse.com/1063035" source="BUGZILLA"/>
		<reference ref_id="1063037" ref_url="https://bugzilla.suse.com/1063037" source="BUGZILLA"/>
		<reference ref_id="1063038" ref_url="https://bugzilla.suse.com/1063038" source="BUGZILLA"/>
		<reference ref_id="1063039" ref_url="https://bugzilla.suse.com/1063039" source="BUGZILLA"/>
		<reference ref_id="1063040" ref_url="https://bugzilla.suse.com/1063040" source="BUGZILLA"/>
		<reference ref_id="1063041" ref_url="https://bugzilla.suse.com/1063041" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12176" ref_url="https://www.suse.com/security/cve/CVE-2017-12176/" source="CVE"/>
		<reference ref_id="CVE-2017-12177" ref_url="https://www.suse.com/security/cve/CVE-2017-12177/" source="CVE"/>
		<reference ref_id="CVE-2017-12178" ref_url="https://www.suse.com/security/cve/CVE-2017-12178/" source="CVE"/>
		<reference ref_id="CVE-2017-12179" ref_url="https://www.suse.com/security/cve/CVE-2017-12179/" source="CVE"/>
		<reference ref_id="CVE-2017-12180" ref_url="https://www.suse.com/security/cve/CVE-2017-12180/" source="CVE"/>
		<reference ref_id="CVE-2017-12181" ref_url="https://www.suse.com/security/cve/CVE-2017-12181/" source="CVE"/>
		<reference ref_id="CVE-2017-12182" ref_url="https://www.suse.com/security/cve/CVE-2017-12182/" source="CVE"/>
		<reference ref_id="CVE-2017-12183" ref_url="https://www.suse.com/security/cve/CVE-2017-12183/" source="CVE"/>
		<reference ref_id="CVE-2017-12184" ref_url="https://www.suse.com/security/cve/CVE-2017-12184/" source="CVE"/>
		<reference ref_id="CVE-2017-12185" ref_url="https://www.suse.com/security/cve/CVE-2017-12185/" source="CVE"/>
		<reference ref_id="CVE-2017-12186" ref_url="https://www.suse.com/security/cve/CVE-2017-12186/" source="CVE"/>
		<reference ref_id="CVE-2017-12187" ref_url="https://www.suse.com/security/cve/CVE-2017-12187/" source="CVE"/>
		<description>
This update for xorg-x11-server provides the following fixes:

Security issues fixed:

- CVE-2017-12184,CVE-2017-12185,CVE-2017-12186,CVE-2017-12187: Fixed
  unvalidated lengths in multiple extensions (bsc#1063034)
- CVE-2017-12183: Fixed some unvalidated lengths in the XFIXES
  extension. (bsc#1063035)
- CVE-2017-12180,CVE-2017-12181,CVE-2017-12182: Fixed various unvalidated
  lengths in the XFree86-VidMode/XFree86-DGA/XFree86-DRI extensions
  (bsc#1063037)
- CVE-2017-12179: Fixed an integer overflow and unvalidated length in
  (S)ProcXIBarrierReleasePointer in Xi (bsc#1063038)
- CVE-2017-12178: Fixed a wrong extra length check in
  ProcXIChangeHierarchy in Xi (bsc#1063039)
- CVE-2017-12177: Fixed an unvalidated variable-length request in
  ProcDbeGetVisualInfo (bsc#1063040)
- CVE-2017-12176: Fixed an unvalidated extra length in
  ProcEstablishConnection (bsc#1063041)
- Improve the entropy when generating random data used in X.org server authorization
  cookies generation by using getentropy() and getrandom() when available (bsc#1025084)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-02"/>
	<updated date="2017-11-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025084">SUSE bug 1025084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063034">SUSE bug 1063034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063035">SUSE bug 1063035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063037">SUSE bug 1063037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063038">SUSE bug 1063038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063039">SUSE bug 1063039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063040">SUSE bug 1063040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063041">SUSE bug 1063041</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12176/">CVE-2017-12176 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12176">CVE-2017-12176 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12177/">CVE-2017-12177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12177">CVE-2017-12177 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12178/">CVE-2017-12178 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12178">CVE-2017-12178 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12179/">CVE-2017-12179 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12179">CVE-2017-12179 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12180/">CVE-2017-12180 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12180">CVE-2017-12180 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12181/">CVE-2017-12181 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12181">CVE-2017-12181 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12182/">CVE-2017-12182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12182">CVE-2017-12182 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12183/">CVE-2017-12183 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12183">CVE-2017-12183 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12184/">CVE-2017-12184 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12184">CVE-2017-12184 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12185/">CVE-2017-12185 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12185">CVE-2017-12185 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12186/">CVE-2017-12186 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12186">CVE-2017-12186 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12187/">CVE-2017-12187 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12187">CVE-2017-12187 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575714" comment="xorg-x11-Xvnc-7.4-27.40.79.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575715" comment="xorg-x11-server-7.4-27.40.79.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575716" comment="xorg-x11-server-extra-7.4-27.40.79.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217954" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1111697" ref_url="https://bugzilla.suse.com/1111697" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14665" ref_url="https://www.suse.com/security/cve/CVE-2018-14665/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

Security issue fixed:

- CVE-2018-14665: Local attackers could overwrite system files in any directory using the -logfile option and gain privileges (bsc#1111697)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111697">SUSE bug 1111697</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14665/">CVE-2018-14665 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14665">CVE-2018-14665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575717" comment="xorg-x11-Xvnc-7.4-27.40.79.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575718" comment="xorg-x11-server-7.4-27.40.79.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575719" comment="xorg-x11-server-extra-7.4-27.40.79.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217955" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1174633" ref_url="https://bugzilla.suse.com/1174633" source="BUGZILLA"/>
		<reference ref_id="1174635" ref_url="https://bugzilla.suse.com/1174635" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14345" ref_url="https://www.suse.com/security/cve/CVE-2020-14345/" source="CVE"/>
		<reference ref_id="CVE-2020-14347" ref_url="https://www.suse.com/security/cve/CVE-2020-14347/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14347: Leak of uninitialized heap memory from the X server to clients on pixmap allocation (bsc#1174633, ZDI-CAN-11426).
- CVE-2020-14345: XKB out-of-bounds access privilege escalation vulnerability (bsc#1174635, ZDI-CAN-11428).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174633">SUSE bug 1174633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14345/">CVE-2020-14345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14345">CVE-2020-14345 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14347/">CVE-2020-14347 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14347">CVE-2020-14347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575720" comment="xorg-x11-Xvnc-7.4-27.40.79.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575721" comment="xorg-x11-server-7.4-27.40.79.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575722" comment="xorg-x11-server-extra-7.4-27.40.79.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217956" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1174910" ref_url="https://bugzilla.suse.com/1174910" source="BUGZILLA"/>
		<reference ref_id="1174913" ref_url="https://bugzilla.suse.com/1174913" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14361" ref_url="https://www.suse.com/security/cve/CVE-2020-14361/" source="CVE"/>
		<reference ref_id="CVE-2020-14362" ref_url="https://www.suse.com/security/cve/CVE-2020-14362/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14361: Fix XkbSelectEvents() integer underflow (bsc#1174910 ZDI-CAN-11573).
- CVE-2020-14362: Fix XRecordRegisterClients() Integer underflow (bsc#1174913 ZDI-CAN-11574).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-01"/>
	<updated date="2020-09-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14361/">CVE-2020-14361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14361">CVE-2020-14361 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14362/">CVE-2020-14362 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14362">CVE-2020-14362 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575723" comment="xorg-x11-Xvnc-7.4-27.40.79.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575724" comment="xorg-x11-server-7.4-27.40.79.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575725" comment="xorg-x11-server-extra-7.4-27.40.79.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217957" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1174908" ref_url="https://bugzilla.suse.com/1174908" source="BUGZILLA"/>
		<reference ref_id="1177596" ref_url="https://bugzilla.suse.com/1177596" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14360" ref_url="https://www.suse.com/security/cve/CVE-2020-14360/" source="CVE"/>
		<reference ref_id="CVE-2020-25712" ref_url="https://www.suse.com/security/cve/CVE-2020-25712/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-25712: Fixed a heap-based buffer overflow which could have led to privilege escalation (bsc#1177596).
- CVE-2020-14360: Fixed an out of bounds memory accesses on too short request which could lead to denial of service (bsc#1174908).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-01"/>
	<updated date="2020-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14360/">CVE-2020-14360 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14360">CVE-2020-14360 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25712/">CVE-2020-25712 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25712">CVE-2020-25712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575726" comment="xorg-x11-Xvnc-7.4-27.40.79.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575727" comment="xorg-x11-server-7.4-27.40.79.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575728" comment="xorg-x11-server-extra-7.4-27.40.79.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217958" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1180128" ref_url="https://bugzilla.suse.com/1180128" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3472" ref_url="https://www.suse.com/security/cve/CVE-2021-3472/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-3472: XChangeFeedbackControl Integer Underflow Privilege Escalation (bsc#1180128)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-13"/>
	<updated date="2021-04-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180128">SUSE bug 1180128</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3472/">CVE-2021-3472 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3472">CVE-2021-3472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575729" comment="xorg-x11-Xvnc-7.4-27.40.79.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575730" comment="xorg-x11-server-7.4-27.40.79.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575731" comment="xorg-x11-server-extra-7.4-27.40.79.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217959" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1193030" ref_url="https://bugzilla.suse.com/1193030" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4008" ref_url="https://www.suse.com/security/cve/CVE-2021-4008/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-4008: Fixed Privilege Escalation Vulnerability via Out-Of-Bounds Access in SProcRenderCompositeGlyphs (bsc#1193030).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193030">SUSE bug 1193030</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4008/">CVE-2021-4008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4008">CVE-2021-4008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659909" comment="xorg-x11-Xvnc-7.4-27.40.79.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659910" comment="xorg-x11-server-7.4-27.40.79.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659911" comment="xorg-x11-server-extra-7.4-27.40.79.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217960" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1190489" ref_url="https://bugzilla.suse.com/1190489" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-4011: The handlers for the RecordCreateContext and RecordRegisterClients
  requests of the Record extension do not properly validate the request
  length leading to out of bounds memory write. (bsc#1190489)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-16"/>
	<updated date="2021-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190489">SUSE bug 1190489</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4011">CVE-2021-4011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660156" comment="xorg-x11-Xvnc-7.4-27.40.79.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660157" comment="xorg-x11-server-7.4-27.40.79.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660158" comment="xorg-x11-server-extra-7.4-27.40.79.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217961" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server-dmx, xorg-x11-server-dmx-debuginfo, xorg-x11-server-dmx-debugsource</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="746949" ref_url="https://bugzilla.suse.com/746949" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2240" ref_url="https://www.suse.com/security/cve/CVE-2010-2240/" source="CVE"/>
		<reference ref_id="CVE-2011-4028" ref_url="https://www.suse.com/security/cve/CVE-2011-4028/" source="CVE"/>
		<reference ref_id="CVE-2011-4029" ref_url="https://www.suse.com/security/cve/CVE-2011-4029/" source="CVE"/>
		<description>

This update of xorg-x11-server-dmx fixed the following security issues:

CVE-2010-2240 - memory exhaustion flaw CVE-2011-4028 / CVE-2011-4029 - race 
condition flaw

Security Issues:

    * CVE-2010-2240
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2240&gt;
    * CVE-2011-4028
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4028&gt;
    * CVE-2011-4029
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4029&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-04-10"/>
	<updated date="2012-04-10"/>
	<bugzilla href="https://bugzilla.suse.com/746949">SUSE bug 746949</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2240/">CVE-2010-2240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2240">CVE-2010-2240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4028/">CVE-2011-4028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4028">CVE-2011-4028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4029/">CVE-2011-4029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4029">CVE-2011-4029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992478" comment="xorg-x11-server-dmx-7.3.99-17.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217962" version="1" class="patch">
	<metadata>
		<title>Security update for Xorg</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="648287" ref_url="https://bugzilla.suse.com/648287" source="BUGZILLA"/>
		<reference ref_id="648290" ref_url="https://bugzilla.suse.com/648290" source="BUGZILLA"/>
		<reference ref_id="698281" ref_url="https://bugzilla.suse.com/698281" source="BUGZILLA"/>
		<reference ref_id="704467" ref_url="https://bugzilla.suse.com/704467" source="BUGZILLA"/>
		<reference ref_id="709943" ref_url="https://bugzilla.suse.com/709943" source="BUGZILLA"/>
		<reference ref_id="709987" ref_url="https://bugzilla.suse.com/709987" source="BUGZILLA"/>
		<reference ref_id="714677" ref_url="https://bugzilla.suse.com/714677" source="BUGZILLA"/>
		<reference ref_id="716355" ref_url="https://bugzilla.suse.com/716355" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-4818" ref_url="https://www.suse.com/security/cve/CVE-2010-4818/" source="CVE"/>
		<reference ref_id="CVE-2010-4819" ref_url="https://www.suse.com/security/cve/CVE-2010-4819/" source="CVE"/>
		<description>

This update for xorg-x11-server and xorg-x11-libs brings improved 
compatibility fixes and enhancements for X.org. The main feature is support 
for Multi monitor configurations with independent heads, which used to be 
supported with SUSE Linux Enterprise 10 (VGA Arbitration Support).

During update to Service Pack 1, the support for AppGroup Extension was 
removed from the X11 Server. This update fixes this regression and adds 
back the support (bnc#709943).

Additionally this update fixes bugs in the AppGroup Extensions, which 
resulted in Xserver crashes (bnc #716355).

It also fixes an issue with changing the mouse mode to absolute 
(bnc#704467).

It also fixes an issue with button release on non-core pointing devices 
(bnc#698281).

In addition to that, multiple missing or incorrect bounds checking flaws 
were fixed in in GLX (CVE-2010-4818) and in the X Render Extension 
(CVE-2010-4819) were fixed, which could be used to crash the X server.

A regression in handling TWM was fixed as well (bnc#709987).

Security Issue references:

    * CVE-2010-4818
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4818&gt;
    * CVE-2010-4819
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4819&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-10-10"/>
	<updated date="2011-10-10"/>
	<bugzilla href="https://bugzilla.suse.com/648287">SUSE bug 648287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648290">SUSE bug 648290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698281">SUSE bug 698281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704467">SUSE bug 704467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/709943">SUSE bug 709943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/709987">SUSE bug 709987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/714677">SUSE bug 714677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/716355">SUSE bug 716355</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4818/">CVE-2010-4818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4818">CVE-2010-4818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4819/">CVE-2010-4819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4819">CVE-2010-4819 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992479" comment="libpciaccess0-7.4_0.11.0-0.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992480" comment="libpciaccess0-32bit-7.4_0.11.0-0.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992481" comment="xorg-x11-Xvnc-7.4-27.40.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992482" comment="xorg-x11-libs-7.4-8.26.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992483" comment="xorg-x11-libs-32bit-7.4-8.26.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992484" comment="xorg-x11-server-7.4-27.40.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992485" comment="xorg-x11-server-extra-7.4-27.40.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217963" version="1" class="patch">
	<metadata>
		<title>Security update for xpdf</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="644112" ref_url="https://bugzilla.suse.com/644112" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-3702" ref_url="https://www.suse.com/security/cve/CVE-2010-3702/" source="CVE"/>
		<reference ref_id="CVE-2010-3703" ref_url="https://www.suse.com/security/cve/CVE-2010-3703/" source="CVE"/>
		<reference ref_id="CVE-2010-3704" ref_url="https://www.suse.com/security/cve/CVE-2010-3704/" source="CVE"/>
		<description>

A specially crafted PDF files could crash xpdf or potentially even cause 
execution of arbitrary code (CVE-2010-3702, CVE-2010-3703, CVE-2010-3704)

Security Issue references:

    * CVE-2010-3702
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702&gt;
    * CVE-2010-3703
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3703&gt;
    * CVE-2010-3704
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-10-15"/>
	<updated date="2010-10-15"/>
	<bugzilla href="https://bugzilla.suse.com/644112">SUSE bug 644112</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3702/">CVE-2010-3702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3702">CVE-2010-3702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3703/">CVE-2010-3703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3703">CVE-2010-3703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3704/">CVE-2010-3704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3704">CVE-2010-3704 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992486" comment="xpdf-tools-3.02-138.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217964" version="1" class="patch">
	<metadata>
		<title>Security update for xpdf-tools</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="661018" ref_url="https://bugzilla.suse.com/661018" source="BUGZILLA"/>
		<reference ref_id="664484" ref_url="https://bugzilla.suse.com/664484" source="BUGZILLA"/>
		<description>

This update of xpdf fixes an out-of-bounds write in CharCodeToUnicode.cc 
and a bad instruction pointer while parsing malformed PDF files.

Security Issue references:

    * CVE-2010-2642
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2642&gt;
    * CVE-2010-4653
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4653&gt;
    * CVE-2010-4654
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4654&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-01-26"/>
	<updated date="2011-01-26"/>
	<bugzilla href="https://bugzilla.suse.com/661018">SUSE bug 661018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/664484">SUSE bug 664484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992487" comment="xpdf-tools-3.02-138.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217965" version="1" class="patch">
	<metadata>
		<title>Security update for xscreensaver (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="952062" ref_url="https://bugzilla.suse.com/952062" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8025" ref_url="https://www.suse.com/security/cve/CVE-2015-8025/" source="CVE"/>
		<description>
The xscreensaver package was updated to fix the following security and non security issues:

- CVE-2015-8025: Fixed a crash when hot-swapping monitors while locked (bsc#952062).
- Added xscreensaver-in_signal_handler_p.patch needed for fix of signal handling.
- Refresh xscreensaver-stars.patch.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-20"/>
	<updated date="2015-11-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952062">SUSE bug 952062</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8025/">CVE-2015-8025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8025">CVE-2015-8025 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575744" comment="xscreensaver-5.07-6.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217966" version="1" class="patch">
	<metadata>
		<title>Security update for xterm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1182091" ref_url="https://bugzilla.suse.com/1182091" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27135" ref_url="https://www.suse.com/security/cve/CVE-2021-27135/" source="CVE"/>
		<description>
This update for xterm fixes the following issues:

- CVE-2021-27135: Fixed buffer-overflow when clicking on selected utf8 text. (bsc#1182091)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-14"/>
	<updated date="2021-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182091">SUSE bug 1182091</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27135/">CVE-2021-27135 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27135">CVE-2021-27135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575745" comment="xterm-238-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217967" version="1" class="patch">
	<metadata>
		<title>Security update for xz (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<description>
This update for xz fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679343" comment="liblzma5-5.0.3-0.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679344" comment="liblzma5-32bit-5.0.3-0.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679345" comment="xz-5.0.3-0.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679346" comment="xz-lang-5.0.3-0.12.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217968" version="1" class="patch">
	<metadata>
		<title>Recommended update for yast2-core</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="492746" ref_url="https://bugzilla.suse.com/492746" source="BUGZILLA"/>
		<reference ref_id="700876" ref_url="https://bugzilla.suse.com/700876" source="BUGZILLA"/>
		<reference ref_id="706705" ref_url="https://bugzilla.suse.com/706705" source="BUGZILLA"/>
		<reference ref_id="763386" ref_url="https://bugzilla.suse.com/763386" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<description>

This update fixes parsing of configuration files with option values longer 
than 2048 characters.

In some cases, this could cause SuSEFirewall2 configurations to become 
corrupted (bnc#763386).

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-03"/>
	<updated date="2012-07-03"/>
	<bugzilla href="https://bugzilla.suse.com/492746">SUSE bug 492746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/700876">SUSE bug 700876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/706705">SUSE bug 706705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763386">SUSE bug 763386</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2483">CVE-2011-2483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992488" comment="yast2-core-2.17.35.4-0.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217969" version="1" class="patch">
	<metadata>
		<title>Security update for yast2-storage (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="986971" ref_url="https://bugzilla.suse.com/986971" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5746" ref_url="https://www.suse.com/security/cve/CVE-2016-5746/" source="CVE"/>
		<description>

This update for yast2-storage fixes the following issue:

- Use stdin, not tmp files for passwords (bsc#986971, CVE-2016-5746)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-14"/>
	<updated date="2016-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/986971">SUSE bug 986971</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5746/">CVE-2016-5746 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5746">CVE-2016-5746 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575746" comment="yast2-storage-2.17.99.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575747" comment="yast2-storage-lib-2.17.99.5-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217970" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1003577" ref_url="https://bugzilla.suse.com/1003577" source="BUGZILLA"/>
		<reference ref_id="1003579" ref_url="https://bugzilla.suse.com/1003579" source="BUGZILLA"/>
		<reference ref_id="1003580" ref_url="https://bugzilla.suse.com/1003580" source="BUGZILLA"/>
		<reference ref_id="1013882" ref_url="https://bugzilla.suse.com/1013882" source="BUGZILLA"/>
		<reference ref_id="912771" ref_url="https://bugzilla.suse.com/912771" source="BUGZILLA"/>
		<reference ref_id="920442" ref_url="https://bugzilla.suse.com/920442" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<description>

This update for zlib fixes the following issues:

CVE-2016-9843: Big-endian out-of-bounds pointer (bsc#1013882)

CVE-2016-9840 CVE-2016-9841: Out-of-bounds pointer arithmetic in inftrees.c (bsc#1003579)

Incompatible declarations for external linkage function deflate (bsc#1003577)

Empty text files compressed with gzip result in empty .gz file which cannot be uncompressed (bsc#920442)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-22"/>
	<updated date="2016-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003577">SUSE bug 1003577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003579">SUSE bug 1003579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003580">SUSE bug 1003580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912771">SUSE bug 912771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920442">SUSE bug 920442</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9840">CVE-2016-9840 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9841">CVE-2016-9841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9843">CVE-2016-9843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575748" comment="zlib-1.2.7-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575749" comment="zlib-32bit-1.2.7-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575750" comment="zlib-devel-1.2.7-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575751" comment="zlib-devel-32bit-1.2.7-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217971" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1197459" ref_url="https://bugzilla.suse.com/1197459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<description>
This update for zlib fixes the following issues:

- CVE-2018-25032: Fixed memory corruption on deflate (bsc#1197459).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197459">SUSE bug 1197459</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677059" comment="zlib-1.2.7-0.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677060" comment="zlib-32bit-1.2.7-0.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677061" comment="zlib-devel-1.2.7-0.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677062" comment="zlib-devel-32bit-1.2.7-0.9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217972" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1089030" ref_url="https://bugzilla.suse.com/1089030" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1100" ref_url="https://www.suse.com/security/cve/CVE-2018-1100/" source="CVE"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2018-1100: Fixed a buffer overflow in
  utils.c:checkmailpath() that could lead to local arbitrary code
  execution ( bsc#1089030)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-20"/>
	<updated date="2018-04-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089030">SUSE bug 1089030</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1100/">CVE-2018-1100 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1100">CVE-2018-1100 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575752" comment="zsh-4.3.6-67.9.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217973" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1082885" ref_url="https://bugzilla.suse.com/1082885" source="BUGZILLA"/>
		<reference ref_id="1082975" ref_url="https://bugzilla.suse.com/1082975" source="BUGZILLA"/>
		<reference ref_id="1082977" ref_url="https://bugzilla.suse.com/1082977" source="BUGZILLA"/>
		<reference ref_id="1082991" ref_url="https://bugzilla.suse.com/1082991" source="BUGZILLA"/>
		<reference ref_id="1082998" ref_url="https://bugzilla.suse.com/1082998" source="BUGZILLA"/>
		<reference ref_id="1083002" ref_url="https://bugzilla.suse.com/1083002" source="BUGZILLA"/>
		<reference ref_id="1083250" ref_url="https://bugzilla.suse.com/1083250" source="BUGZILLA"/>
		<reference ref_id="1084656" ref_url="https://bugzilla.suse.com/1084656" source="BUGZILLA"/>
		<reference ref_id="1087026" ref_url="https://bugzilla.suse.com/1087026" source="BUGZILLA"/>
		<reference ref_id="1107294" ref_url="https://bugzilla.suse.com/1107294" source="BUGZILLA"/>
		<reference ref_id="1107296" ref_url="https://bugzilla.suse.com/1107296" source="BUGZILLA"/>
		<reference ref_id="1163882" ref_url="https://bugzilla.suse.com/1163882" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-10070" ref_url="https://www.suse.com/security/cve/CVE-2014-10070/" source="CVE"/>
		<reference ref_id="CVE-2014-10071" ref_url="https://www.suse.com/security/cve/CVE-2014-10071/" source="CVE"/>
		<reference ref_id="CVE-2014-10072" ref_url="https://www.suse.com/security/cve/CVE-2014-10072/" source="CVE"/>
		<reference ref_id="CVE-2016-10714" ref_url="https://www.suse.com/security/cve/CVE-2016-10714/" source="CVE"/>
		<reference ref_id="CVE-2017-18205" ref_url="https://www.suse.com/security/cve/CVE-2017-18205/" source="CVE"/>
		<reference ref_id="CVE-2017-18206" ref_url="https://www.suse.com/security/cve/CVE-2017-18206/" source="CVE"/>
		<reference ref_id="CVE-2018-0502" ref_url="https://www.suse.com/security/cve/CVE-2018-0502/" source="CVE"/>
		<reference ref_id="CVE-2018-1071" ref_url="https://www.suse.com/security/cve/CVE-2018-1071/" source="CVE"/>
		<reference ref_id="CVE-2018-1083" ref_url="https://www.suse.com/security/cve/CVE-2018-1083/" source="CVE"/>
		<reference ref_id="CVE-2018-13259" ref_url="https://www.suse.com/security/cve/CVE-2018-13259/" source="CVE"/>
		<reference ref_id="CVE-2018-7549" ref_url="https://www.suse.com/security/cve/CVE-2018-7549/" source="CVE"/>
		<reference ref_id="CVE-2019-20044" ref_url="https://www.suse.com/security/cve/CVE-2019-20044/" source="CVE"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2019-20044: Fixed an insecure dropping of privileges when unsetting
  the PRIVILEGED option (bsc#1163882).
- CVE-2018-13259: Fixed an unexpected truncation of long shebang lines (bsc#1107294).
- CVE-2018-7549: Fixed a crash when an empty hash table (bsc#1082991).
- CVE-2018-1083: Fixed a stack-based buffer overflow when using tab completion
  on directories with long names (bsc#1087026).
- CVE-2018-1071: Fixed a stack-based buffer overflow when executing certain
  commands (bsc#1084656).
- CVE-2018-0502: Fixed a mishandling of shebang lines (bsc#1107296).
- CVE-2017-18206: Fixed a buffer overflow related to symlink processing (bsc#1083002).
- CVE-2017-18205: Fixed an application crash when using cd with no
  arguments (bsc#1082998).
- CVE-2016-10714: Fixed a potential application crash when handling maximum
  length paths (bsc#1083250).
- CVE-2014-10072: Fixed a buffer overflow when scanning very long directory
  paths for symbolic links (bsc#1082975).
- CVE-2014-10071: Fixed a buffer overflow when redirecting output to a long
  file descriptor (bsc#1082977).
- CVE-2014-10070: Fixed a privilege escalation vulnerability via environment
  variables (bsc#1082885).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082885">SUSE bug 1082885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082975">SUSE bug 1082975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082977">SUSE bug 1082977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082991">SUSE bug 1082991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082998">SUSE bug 1082998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083002">SUSE bug 1083002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083250">SUSE bug 1083250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084656">SUSE bug 1084656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087026">SUSE bug 1087026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107294">SUSE bug 1107294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107296">SUSE bug 1107296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163882">SUSE bug 1163882</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-10070/">CVE-2014-10070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-10070">CVE-2014-10070 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-10071/">CVE-2014-10071 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-10071">CVE-2014-10071 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-10072/">CVE-2014-10072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-10072">CVE-2014-10072 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10714/">CVE-2016-10714 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10714">CVE-2016-10714 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18205/">CVE-2017-18205 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18205">CVE-2017-18205 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18206/">CVE-2017-18206 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18206">CVE-2017-18206 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-0502/">CVE-2018-0502 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0502">CVE-2018-0502 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1071/">CVE-2018-1071 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1071">CVE-2018-1071 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1083/">CVE-2018-1083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1083">CVE-2018-1083 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13259/">CVE-2018-13259 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13259">CVE-2018-13259 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7549/">CVE-2018-7549 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7549">CVE-2018-7549 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20044/">CVE-2019-20044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20044">CVE-2019-20044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671293" comment="zsh-4.3.6-67.9.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217974" version="1" class="patch">
	<metadata>
		<title>Security update for zypper</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="770630" ref_url="https://bugzilla.suse.com/770630" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0420" ref_url="https://www.suse.com/security/cve/CVE-2012-0420/" source="CVE"/>
		<description>

The zypper setuid wrapper links against libzypp. This is not needed and 
adds unnecessary attack vectors. CVE-2012-0420 has been assigned to this 
issue.

Security Issue reference:

    * CVE-2012-0420
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0420&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-10"/>
	<updated date="2012-07-10"/>
	<bugzilla href="https://bugzilla.suse.com/770630">SUSE bug 770630</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0420/">CVE-2012-0420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0420">CVE-2012-0420 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992489" comment="zypper-1.3.21-0.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217975" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="881874" ref_url="https://bugzilla.suse.com/881874" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1533" ref_url="https://www.suse.com/security/cve/CVE-2014-1533/" source="CVE"/>
		<reference ref_id="CVE-2014-1534" ref_url="https://www.suse.com/security/cve/CVE-2014-1534/" source="CVE"/>
		<reference ref_id="CVE-2014-1536" ref_url="https://www.suse.com/security/cve/CVE-2014-1536/" source="CVE"/>
		<reference ref_id="CVE-2014-1537" ref_url="https://www.suse.com/security/cve/CVE-2014-1537/" source="CVE"/>
		<reference ref_id="CVE-2014-1538" ref_url="https://www.suse.com/security/cve/CVE-2014-1538/" source="CVE"/>
		<reference ref_id="CVE-2014-1541" ref_url="https://www.suse.com/security/cve/CVE-2014-1541/" source="CVE"/>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<description>

MozillaFirefox was updated to version 24.6.0 to fix six security issues:

    * Miscellaneous memory safety hazards. (CVE-2014-1533, CVE-2014-1534)
    * Use-after-free and out of bounds issues found using Address
      Sanitizer. (CVE-2014-1536, CVE-2014-1537, CVE-2014-1538)
    * Use-after-free with SMIL Animation Controller. (CVE-2014-1541)

mozilla-nspr was updated to version 4.10.6 to fix one security issue:

    * Out of bounds write in NSPR. (CVE-2014-1545)

Further information can be found at 
https://www.mozilla.org/security/announce/
&lt;https://www.mozilla.org/security/announce/&gt; .

Security Issues references:

    * CVE-2014-1533
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533&gt;
    * CVE-2014-1534
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1534&gt;
    * CVE-2014-1536
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1536&gt;
    * CVE-2014-1537
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1537&gt;
    * CVE-2014-1538
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538&gt;
    * CVE-2014-1541
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541&gt;
    * CVE-2014-1545
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-12"/>
	<updated date="2014-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/881874">SUSE bug 881874</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1533/">CVE-2014-1533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1533">CVE-2014-1533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1534/">CVE-2014-1534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1534">CVE-2014-1534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1536/">CVE-2014-1536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1536">CVE-2014-1536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1537/">CVE-2014-1537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1537">CVE-2014-1537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1538/">CVE-2014-1538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1538">CVE-2014-1538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1541/">CVE-2014-1541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1541">CVE-2014-1541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1545">CVE-2014-1545 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570404" comment="MozillaFirefox-24.6.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570405" comment="MozillaFirefox-branding-SLED-24-0.4.10.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570406" comment="MozillaFirefox-translations-24.6.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570407" comment="libfreebl3-3.16.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570408" comment="libfreebl3-32bit-3.16.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570409" comment="mozilla-nspr-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570410" comment="mozilla-nspr-32bit-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575771" comment="mozilla-nspr-devel-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570411" comment="mozilla-nss-3.16.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570412" comment="mozilla-nss-32bit-3.16.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575772" comment="mozilla-nss-devel-3.16.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570413" comment="mozilla-nss-tools-3.16.1-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217976" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="754481" ref_url="https://bugzilla.suse.com/754481" source="BUGZILLA"/>
		<reference ref_id="773612" ref_url="https://bugzilla.suse.com/773612" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3438" ref_url="https://www.suse.com/security/cve/CVE-2012-3438/" source="CVE"/>
		<description>

ImageMagick has been updated to fix an integer overflow (CVE-2012-3438).

Also a slowness in 'convert' when resizing JPEG images has been addressed 
(bnc#754481).

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-20"/>
	<updated date="2013-03-20"/>
	<bugzilla href="https://bugzilla.suse.com/754481">SUSE bug 754481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773612">SUSE bug 773612</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3438/">CVE-2012-3438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3438">CVE-2012-3438 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575773" comment="libMagickCore1-6.4.3.6-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575774" comment="libMagickCore1-32bit-6.4.3.6-7.26.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575773" comment="libMagickCore1-6.4.3.6-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575774" comment="libMagickCore1-32bit-6.4.3.6-7.26.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217977" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="978061" ref_url="https://bugzilla.suse.com/978061" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="CVE-2016-3715" ref_url="https://www.suse.com/security/cve/CVE-2016-3715/" source="CVE"/>
		<reference ref_id="CVE-2016-3716" ref_url="https://www.suse.com/security/cve/CVE-2016-3716/" source="CVE"/>
		<reference ref_id="CVE-2016-3717" ref_url="https://www.suse.com/security/cve/CVE-2016-3717/" source="CVE"/>
		<reference ref_id="CVE-2016-3718" ref_url="https://www.suse.com/security/cve/CVE-2016-3718/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002051.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

Security issues fixed:
- Several coders were vulnerable to remote code execution attacks,
  these coders have now been disabled. They can be re-enabled by
  exporting the following environment variable
  MAGICK_CODER_MODULE_PATH=/usr/lib64/ImageMagick-6.4.3/modules-Q16/coders/vulnerable/
  (bsc#978061)
- CVE-2016-3714: Insufficient shell characters filtering leads to
  (potentially remote) code execution
- CVE-2016-3715: Possible file deletion by using ImageMagick's
  'ephemeral' pseudo protocol which deletes files after reading.
- CVE-2016-3716: Possible file moving by using ImageMagick's 'msl'
  pseudo protocol with any extension in any folder.
- CVE-2016-3717: Possible local file read by using ImageMagick's 
  'label' pseudo protocol to get content of the files from the server.
- CVE-2016-3718: Possible Server Side Request Forgery (SSRF) to make
  HTTP GET or FTP request.

Bugs fixed:
- Use external svg loader (rsvg)		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-11"/>
	<updated date="2016-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3714">CVE-2016-3714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3715/">CVE-2016-3715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3715">CVE-2016-3715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3716/">CVE-2016-3716 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3716">CVE-2016-3716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3717/">CVE-2016-3717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3717">CVE-2016-3717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3718/">CVE-2016-3718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3718">CVE-2016-3718 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575775" comment="libMagickCore1-6.4.3.6-7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575776" comment="libMagickCore1-32bit-6.4.3.6-7.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217978" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="978061" ref_url="https://bugzilla.suse.com/978061" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002060.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- bsc#978061: A vulnerability in ImageMagick's 'https' module allowed users to
execute arbitrary shell commands on the host performing the image conversion.
The issue had the potential for remote command injection. This update mitigates
the vulnerability by disabling all access to the 'https' module in the
'delegates.xml' config file. (CVE-2016-3714)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-13"/>
	<updated date="2016-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3714">CVE-2016-3714 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575777" comment="libMagickCore1-6.4.3.6-7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575778" comment="libMagickCore1-32bit-6.4.3.6-7.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217979" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="982178" ref_url="https://bugzilla.suse.com/982178" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5118" ref_url="https://www.suse.com/security/cve/CVE-2016-5118/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002124.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues: 

- CVE-2016-5118: popen() shell vulnerability via filenames (bsc#982178)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/982178">SUSE bug 982178</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5118/">CVE-2016-5118 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5118">CVE-2016-5118 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575779" comment="libMagickCore1-6.4.3.6-7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575780" comment="libMagickCore1-32bit-6.4.3.6-7.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217980" version="1" class="patch">
	<metadata>
		<title>Security update for Mesa</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821855" ref_url="https://bugzilla.suse.com/821855" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1993" ref_url="https://www.suse.com/security/cve/CVE-2013-1993/" source="CVE"/>
		<description>

This update of Mesa fixes multiple integer overflows.

Security Issue reference:

    * CVE-2013-1993
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1993&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-31"/>
	<updated date="2013-05-31"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821855">SUSE bug 821855</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1993/">CVE-2013-1993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1993">CVE-2013-1993 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575781" comment="Mesa-7.11.2-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575782" comment="Mesa-32bit-7.11.2-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575783" comment="Mesa-x86-7.11.2-0.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575781" comment="Mesa-7.11.2-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575782" comment="Mesa-32bit-7.11.2-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575783" comment="Mesa-x86-7.11.2-0.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217981" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="833389" ref_url="https://bugzilla.suse.com/833389" source="BUGZILLA"/>
		<reference ref_id="840485" ref_url="https://bugzilla.suse.com/840485" source="BUGZILLA"/>
		<reference ref_id="917597" ref_url="https://bugzilla.suse.com/917597" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1701" ref_url="https://www.suse.com/security/cve/CVE-2013-1701/" source="CVE"/>
		<reference ref_id="CVE-2013-1702" ref_url="https://www.suse.com/security/cve/CVE-2013-1702/" source="CVE"/>
		<reference ref_id="CVE-2013-1705" ref_url="https://www.suse.com/security/cve/CVE-2013-1705/" source="CVE"/>
		<reference ref_id="CVE-2013-1706" ref_url="https://www.suse.com/security/cve/CVE-2013-1706/" source="CVE"/>
		<reference ref_id="CVE-2013-1707" ref_url="https://www.suse.com/security/cve/CVE-2013-1707/" source="CVE"/>
		<reference ref_id="CVE-2013-1709" ref_url="https://www.suse.com/security/cve/CVE-2013-1709/" source="CVE"/>
		<reference ref_id="CVE-2013-1710" ref_url="https://www.suse.com/security/cve/CVE-2013-1710/" source="CVE"/>
		<reference ref_id="CVE-2013-1712" ref_url="https://www.suse.com/security/cve/CVE-2013-1712/" source="CVE"/>
		<reference ref_id="CVE-2013-1713" ref_url="https://www.suse.com/security/cve/CVE-2013-1713/" source="CVE"/>
		<reference ref_id="CVE-2013-1714" ref_url="https://www.suse.com/security/cve/CVE-2013-1714/" source="CVE"/>
		<reference ref_id="CVE-2013-1717" ref_url="https://www.suse.com/security/cve/CVE-2013-1717/" source="CVE"/>
		<reference ref_id="CVE-2013-1718" ref_url="https://www.suse.com/security/cve/CVE-2013-1718/" source="CVE"/>
		<reference ref_id="CVE-2013-1722" ref_url="https://www.suse.com/security/cve/CVE-2013-1722/" source="CVE"/>
		<reference ref_id="CVE-2013-1725" ref_url="https://www.suse.com/security/cve/CVE-2013-1725/" source="CVE"/>
		<reference ref_id="CVE-2013-1726" ref_url="https://www.suse.com/security/cve/CVE-2013-1726/" source="CVE"/>
		<reference ref_id="CVE-2013-1730" ref_url="https://www.suse.com/security/cve/CVE-2013-1730/" source="CVE"/>
		<reference ref_id="CVE-2013-1732" ref_url="https://www.suse.com/security/cve/CVE-2013-1732/" source="CVE"/>
		<reference ref_id="CVE-2013-1735" ref_url="https://www.suse.com/security/cve/CVE-2013-1735/" source="CVE"/>
		<reference ref_id="CVE-2013-1736" ref_url="https://www.suse.com/security/cve/CVE-2013-1736/" source="CVE"/>
		<reference ref_id="CVE-2013-1737" ref_url="https://www.suse.com/security/cve/CVE-2013-1737/" source="CVE"/>
		<reference ref_id="CVE-2015-0822" ref_url="https://www.suse.com/security/cve/CVE-2015-0822/" source="CVE"/>
		<reference ref_id="CVE-2015-0827" ref_url="https://www.suse.com/security/cve/CVE-2015-0827/" source="CVE"/>
		<reference ref_id="CVE-2015-0831" ref_url="https://www.suse.com/security/cve/CVE-2015-0831/" source="CVE"/>
		<reference ref_id="CVE-2015-0836" ref_url="https://www.suse.com/security/cve/CVE-2015-0836/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001273.html" source="SUSE-SU"/>
		<description>

This update to Firefox 17.0.9esr (bnc#840485) addresses:

    * MFSA 2013-91 User-defined properties on DOM proxies get the wrong
      'this' object
          o (CVE-2013-1737)
    * MFSA 2013-90 Memory corruption involving scrolling
          o use-after-free in mozilla::layout::ScrollbarActivity
            (CVE-2013-1735)
          o Memory corruption in nsGfxScrollFrameInner::IsLTR()
            (CVE-2013-1736)
    * MFSA 2013-89 Buffer overflow with multi-column, lists, and floats
          o buffer overflow at nsFloatManager::GetFlowArea() with multicol,
            list, floats (CVE-2013-1732)
    * MFSA 2013-88 compartment mismatch re-attaching XBL-backed nodes
          o compartment mismatch in nsXBLBinding::DoInitJSClass
            (CVE-2013-1730)
    * MFSA 2013-83 Mozilla Updater does not lock MAR file after signature
      verification
          o MAR signature bypass in Updater could lead to downgrade
            (CVE-2013-1726)
    * MFSA 2013-82 Calling scope for new Javascript objects can lead to
      memory corruption
          o ABORT: bad scope for new JSObjects: ReparentWrapper /
            document.open (CVE-2013-1725)
    * MFSA 2013-79 Use-after-free in Animation Manager during stylesheet
      cloning
          o Heap-use-after-free in nsAnimationManager::BuildAnimations
            (CVE-2013-1722)
    * MFSA 2013-76 Miscellaneous memory safety hazards (rv:24.0 /
      rv:17.0.9)
          o Memory safety bugs fixed in Firefox 17.0.9 and Firefox 24.0
            (CVE-2013-1718)
    * MFSA 2013-65 Buffer underflow when generating CRMF requests
          o ASAN heap-buffer-overflow (read 1) in
            cryptojs_interpret_key_gen_type (CVE-2013-1705)

Security Issue references:

    * CVE-2013-1737
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737&gt;
    * CVE-2013-1735
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735&gt;
    * CVE-2013-1736
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736&gt;
    * CVE-2013-1732
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732&gt;
    * CVE-2013-1730
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730&gt;
    * CVE-2013-1726
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1726&gt;
    * CVE-2013-1725
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725&gt;
    * CVE-2013-1722
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722&gt;
    * CVE-2013-1718
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718&gt;
    * CVE-2013-1705
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1705&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-19"/>
	<updated date="2013-09-19"/>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1701/">CVE-2013-1701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1701">CVE-2013-1701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1702/">CVE-2013-1702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1702">CVE-2013-1702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1705/">CVE-2013-1705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1705">CVE-2013-1705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1706/">CVE-2013-1706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1706">CVE-2013-1706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1707/">CVE-2013-1707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1707">CVE-2013-1707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1709/">CVE-2013-1709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1709">CVE-2013-1709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1710/">CVE-2013-1710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1710">CVE-2013-1710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1712/">CVE-2013-1712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1712">CVE-2013-1712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1713/">CVE-2013-1713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1713">CVE-2013-1713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1714/">CVE-2013-1714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1714">CVE-2013-1714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1717/">CVE-2013-1717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1717">CVE-2013-1717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1718/">CVE-2013-1718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1718">CVE-2013-1718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1722/">CVE-2013-1722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1722">CVE-2013-1722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1725/">CVE-2013-1725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1725">CVE-2013-1725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1726/">CVE-2013-1726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1726">CVE-2013-1726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1730/">CVE-2013-1730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1730">CVE-2013-1730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1732/">CVE-2013-1732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1732">CVE-2013-1732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1735/">CVE-2013-1735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1735">CVE-2013-1735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1736/">CVE-2013-1736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1736">CVE-2013-1736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1737/">CVE-2013-1737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1737">CVE-2013-1737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0822/">CVE-2015-0822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0822">CVE-2015-0822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0827/">CVE-2015-0827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0827">CVE-2015-0827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0831/">CVE-2015-0831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0831">CVE-2015-0831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0836/">CVE-2015-0836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0836">CVE-2015-0836 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575784" comment="MozillaFirefox-17.0.9esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575785" comment="MozillaFirefox-translations-17.0.9esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575784" comment="MozillaFirefox-17.0.9esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575785" comment="MozillaFirefox-translations-17.0.9esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575784" comment="MozillaFirefox-17.0.9esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575785" comment="MozillaFirefox-translations-17.0.9esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217982" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="959277" ref_url="https://bugzilla.suse.com/959277" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7202" ref_url="https://www.suse.com/security/cve/CVE-2015-7202/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001750.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to version 38.5.0 ESR.

It fixes the following security issues:

* MFSA 2015-134/CVE-2015-7201/CVE-2015-7202
  Miscellaneous memory safety hazards (rv:43.0 / rv:38.5)
* MFSA 2015-138/CVE-2015-7210
  Use-after-free in WebRTC when datachannel is used after being
  destroyed
* MFSA 2015-139/CVE-2015-7212
  Integer overflow allocating extremely large textures
* MFSA 2015-145/CVE-2015-7205
  Underflow through code inspection
* MFSA 2015-146/CVE-2015-7213
  Integer overflow in MP4 playback in 64-bit versions
* MFSA 2015-147/CVE-2015-7222
  Integer underflow and buffer overflow processing MP4 metadata
  in libstagefright
* MFSA 2015-149/CVE-2015-7214
  Cross-site reading attack through data and view-source URIs
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-21"/>
	<updated date="2015-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7201">CVE-2015-7201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7202/">CVE-2015-7202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7202">CVE-2015-7202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7205">CVE-2015-7205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7210">CVE-2015-7210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7212">CVE-2015-7212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7213">CVE-2015-7213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7214">CVE-2015-7214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7222">CVE-2015-7222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575786" comment="MozillaFirefox-38.5.0esr-28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575787" comment="MozillaFirefox-translations-38.5.0esr-28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217983" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="977333" ref_url="https://bugzilla.suse.com/977333" source="BUGZILLA"/>
		<reference ref_id="977374" ref_url="https://bugzilla.suse.com/977374" source="BUGZILLA"/>
		<reference ref_id="977376" ref_url="https://bugzilla.suse.com/977376" source="BUGZILLA"/>
		<reference ref_id="977381" ref_url="https://bugzilla.suse.com/977381" source="BUGZILLA"/>
		<reference ref_id="977386" ref_url="https://bugzilla.suse.com/977386" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2805" ref_url="https://www.suse.com/security/cve/CVE-2016-2805/" source="CVE"/>
		<reference ref_id="CVE-2016-2807" ref_url="https://www.suse.com/security/cve/CVE-2016-2807/" source="CVE"/>
		<reference ref_id="CVE-2016-2808" ref_url="https://www.suse.com/security/cve/CVE-2016-2808/" source="CVE"/>
		<reference ref_id="CVE-2016-2814" ref_url="https://www.suse.com/security/cve/CVE-2016-2814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002066.html" source="SUSE-SU"/>
		<description>
This update to MozillaFirefox 38.8.0 ESR fixes the following security issues (bsc#977333):

- CVE-2016-2805: Miscellaneous memory safety hazards - MFSA 2016-39 (bsc#977374)
- CVE-2016-2807: Miscellaneous memory safety hazards - MFSA 2016-39 (bsc#977376)
- CVE-2016-2808: Write to invalid HashMap entry through JavaScript.watch() - MFSA 2016-47 (bsc#977386)
- CVE-2016-2814: Buffer overflow in libstagefright with CENC offsets - MFSA 2016-44 (bsc#977381)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-18"/>
	<updated date="2016-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977374">SUSE bug 977374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977376">SUSE bug 977376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977381">SUSE bug 977381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977386">SUSE bug 977386</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2805/">CVE-2016-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2805">CVE-2016-2805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2807/">CVE-2016-2807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2807">CVE-2016-2807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2808/">CVE-2016-2808 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2808">CVE-2016-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2814/">CVE-2016-2814 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2814">CVE-2016-2814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575788" comment="MozillaFirefox-38.8.0esr-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575789" comment="MozillaFirefox-translations-38.8.0esr-40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217984" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLED, mozilla-nspr and mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="983549" ref_url="https://bugzilla.suse.com/983549" source="BUGZILLA"/>
		<reference ref_id="983638" ref_url="https://bugzilla.suse.com/983638" source="BUGZILLA"/>
		<reference ref_id="983639" ref_url="https://bugzilla.suse.com/983639" source="BUGZILLA"/>
		<reference ref_id="983643" ref_url="https://bugzilla.suse.com/983643" source="BUGZILLA"/>
		<reference ref_id="983646" ref_url="https://bugzilla.suse.com/983646" source="BUGZILLA"/>
		<reference ref_id="983651" ref_url="https://bugzilla.suse.com/983651" source="BUGZILLA"/>
		<reference ref_id="983652" ref_url="https://bugzilla.suse.com/983652" source="BUGZILLA"/>
		<reference ref_id="983653" ref_url="https://bugzilla.suse.com/983653" source="BUGZILLA"/>
		<reference ref_id="983655" ref_url="https://bugzilla.suse.com/983655" source="BUGZILLA"/>
		<reference ref_id="984006" ref_url="https://bugzilla.suse.com/984006" source="BUGZILLA"/>
		<reference ref_id="985659" ref_url="https://bugzilla.suse.com/985659" source="BUGZILLA"/>
		<reference ref_id="989196" ref_url="https://bugzilla.suse.com/989196" source="BUGZILLA"/>
		<reference ref_id="990628" ref_url="https://bugzilla.suse.com/990628" source="BUGZILLA"/>
		<reference ref_id="990856" ref_url="https://bugzilla.suse.com/990856" source="BUGZILLA"/>
		<reference ref_id="991809" ref_url="https://bugzilla.suse.com/991809" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2815" ref_url="https://www.suse.com/security/cve/CVE-2016-2815/" source="CVE"/>
		<reference ref_id="CVE-2016-2818" ref_url="https://www.suse.com/security/cve/CVE-2016-2818/" source="CVE"/>
		<reference ref_id="CVE-2016-2819" ref_url="https://www.suse.com/security/cve/CVE-2016-2819/" source="CVE"/>
		<reference ref_id="CVE-2016-2821" ref_url="https://www.suse.com/security/cve/CVE-2016-2821/" source="CVE"/>
		<reference ref_id="CVE-2016-2822" ref_url="https://www.suse.com/security/cve/CVE-2016-2822/" source="CVE"/>
		<reference ref_id="CVE-2016-2824" ref_url="https://www.suse.com/security/cve/CVE-2016-2824/" source="CVE"/>
		<reference ref_id="CVE-2016-2828" ref_url="https://www.suse.com/security/cve/CVE-2016-2828/" source="CVE"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-2831" ref_url="https://www.suse.com/security/cve/CVE-2016-2831/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="CVE-2016-2835" ref_url="https://www.suse.com/security/cve/CVE-2016-2835/" source="CVE"/>
		<reference ref_id="CVE-2016-2836" ref_url="https://www.suse.com/security/cve/CVE-2016-2836/" source="CVE"/>
		<reference ref_id="CVE-2016-2837" ref_url="https://www.suse.com/security/cve/CVE-2016-2837/" source="CVE"/>
		<reference ref_id="CVE-2016-2838" ref_url="https://www.suse.com/security/cve/CVE-2016-2838/" source="CVE"/>
		<reference ref_id="CVE-2016-2839" ref_url="https://www.suse.com/security/cve/CVE-2016-2839/" source="CVE"/>
		<reference ref_id="CVE-2016-5252" ref_url="https://www.suse.com/security/cve/CVE-2016-5252/" source="CVE"/>
		<reference ref_id="CVE-2016-5254" ref_url="https://www.suse.com/security/cve/CVE-2016-5254/" source="CVE"/>
		<reference ref_id="CVE-2016-5258" ref_url="https://www.suse.com/security/cve/CVE-2016-5258/" source="CVE"/>
		<reference ref_id="CVE-2016-5259" ref_url="https://www.suse.com/security/cve/CVE-2016-5259/" source="CVE"/>
		<reference ref_id="CVE-2016-5262" ref_url="https://www.suse.com/security/cve/CVE-2016-5262/" source="CVE"/>
		<reference ref_id="CVE-2016-5263" ref_url="https://www.suse.com/security/cve/CVE-2016-5263/" source="CVE"/>
		<reference ref_id="CVE-2016-5264" ref_url="https://www.suse.com/security/cve/CVE-2016-5264/" source="CVE"/>
		<reference ref_id="CVE-2016-5265" ref_url="https://www.suse.com/security/cve/CVE-2016-5265/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002206.html" source="SUSE-SU"/>
		<description>
MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nspr and  mozilla-nss were updated to fix nine security issues.

MozillaFirefox was updated to version 45.3.0 ESR. mozilla-nss was updated to version 3.21.1, mozilla-nspr to version 4.12.

These security issues were fixed in 45.3.0ESR:
- CVE-2016-2835/CVE-2016-2836: Miscellaneous memory safety hazards (rv:48.0 / rv:45.3) (MFSA 2016-62)
- CVE-2016-2830: Favicon network connection can persist when page is closed (MFSA 2016-63)
- CVE-2016-2838: Buffer overflow rendering SVG with bidirectional content (MFSA 2016-64)
- CVE-2016-2839: Cairo rendering crash due to memory allocation issue with FFmpeg 0.10 (MFSA 2016-65)
- CVE-2016-5252: Stack underflow during 2D graphics rendering (MFSA 2016-67)
- CVE-2016-5254: Use-after-free when using alt key and toplevel menus (MFSA 2016-70)
- CVE-2016-5258: Use-after-free in DTLS during WebRTC session shutdown (MFSA 2016-72)
- CVE-2016-5259: Use-after-free in service workers with nested sync events (MFSA 2016-73)
- CVE-2016-5262: Scripts on marquee tag can execute in sandboxed iframes (MFSA 2016-76)
- CVE-2016-2837: Buffer overflow in ClearKey Content Decryption Module (CDM) during video playback (MFSA 2016-77)
- CVE-2016-5263: Type confusion in display transformation (MFSA 2016-78)
- CVE-2016-5264: Use-after-free when applying SVG effects (MFSA 2016-79)
- CVE-2016-5265: Same-origin policy violation using local HTML file and saved shortcut file (MFSA 2016-80)
- CVE-2016-6354: Fix for possible buffer overrun (bsc#990856)

Security issues fixed in 45.2.0.ESR:
- CVE-2016-2834: Memory safety bugs in NSS (MFSA 2016-61) (bsc#983639).
- CVE-2016-2824: Out-of-bounds write with WebGL shader (MFSA 2016-53) (bsc#983651).
- CVE-2016-2822: Addressbar spoofing though the SELECT element (MFSA 2016-52) (bsc#983652).
- CVE-2016-2821: Use-after-free deleting tables from a contenteditable document (MFSA 2016-51) (bsc#983653).
- CVE-2016-2819: Buffer overflow parsing HTML5 fragments (MFSA 2016-50) (bsc#983655).
- CVE-2016-2828: Use-after-free when textures are used in WebGL operations after recycle pool destruction (MFSA 2016-56) (bsc#983646).
- CVE-2016-2831: Entering fullscreen and persistent pointerlock without user permission (MFSA 2016-58) (bsc#983643).
- CVE-2016-2815, CVE-2016-2818: Miscellaneous memory safety hazards (MFSA 2016-49) (bsc#983638)

These non-security issues were fixed:
- Fix crashes on aarch64
  * Determine page size at runtime (bsc#984006)
  * Allow aarch64 to work in safe mode (bsc#985659)
- Fix crashes on mainframes
- Temporarily bind Firefox to the first CPU as a hotfix
  for an apparent race condition (bsc#989196, bsc#990628)

All extensions must now be signed by addons.mozilla.org. Please read README.SUSE for more details.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-12"/>
	<updated date="2016-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983638">SUSE bug 983638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983639">SUSE bug 983639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983643">SUSE bug 983643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983646">SUSE bug 983646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983651">SUSE bug 983651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983652">SUSE bug 983652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983653">SUSE bug 983653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983655">SUSE bug 983655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984006">SUSE bug 984006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985659">SUSE bug 985659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989196">SUSE bug 989196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990628">SUSE bug 990628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990856">SUSE bug 990856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2815/">CVE-2016-2815 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2815">CVE-2016-2815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2818/">CVE-2016-2818 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2818">CVE-2016-2818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2819/">CVE-2016-2819 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2819">CVE-2016-2819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2821/">CVE-2016-2821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2821">CVE-2016-2821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2822/">CVE-2016-2822 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2822">CVE-2016-2822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2824/">CVE-2016-2824 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2824">CVE-2016-2824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2828/">CVE-2016-2828 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2828">CVE-2016-2828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2830">CVE-2016-2830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2831/">CVE-2016-2831 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2831">CVE-2016-2831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2834">CVE-2016-2834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2835/">CVE-2016-2835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2835">CVE-2016-2835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2836/">CVE-2016-2836 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2836">CVE-2016-2836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2837/">CVE-2016-2837 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2837">CVE-2016-2837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2838/">CVE-2016-2838 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2838">CVE-2016-2838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2839/">CVE-2016-2839 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2839">CVE-2016-2839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5252/">CVE-2016-5252 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5252">CVE-2016-5252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5254/">CVE-2016-5254 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5254">CVE-2016-5254 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5258/">CVE-2016-5258 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5258">CVE-2016-5258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5259/">CVE-2016-5259 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5259">CVE-2016-5259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5262/">CVE-2016-5262 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5262">CVE-2016-5262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5263/">CVE-2016-5263 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5263">CVE-2016-5263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5264/">CVE-2016-5264 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5264">CVE-2016-5264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5265/">CVE-2016-5265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5265">CVE-2016-5265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6354">CVE-2016-6354 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575790" comment="MozillaFirefox-45.3.0esr-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575791" comment="MozillaFirefox-branding-SLED-45.0-20.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575792" comment="MozillaFirefox-translations-45.3.0esr-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575793" comment="firefox-fontconfig-2.11.0-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575794" comment="libfreebl3-3.21.1-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575795" comment="libfreebl3-32bit-3.21.1-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575796" comment="mozilla-nspr-4.12-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575797" comment="mozilla-nspr-32bit-4.12-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575798" comment="mozilla-nspr-devel-4.12-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575799" comment="mozilla-nss-3.21.1-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575800" comment="mozilla-nss-32bit-3.21.1-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575801" comment="mozilla-nss-devel-3.21.1-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575802" comment="mozilla-nss-tools-3.21.1-26.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217985" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="999701" ref_url="https://bugzilla.suse.com/999701" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5250" ref_url="https://www.suse.com/security/cve/CVE-2016-5250/" source="CVE"/>
		<reference ref_id="CVE-2016-5257" ref_url="https://www.suse.com/security/cve/CVE-2016-5257/" source="CVE"/>
		<reference ref_id="CVE-2016-5261" ref_url="https://www.suse.com/security/cve/CVE-2016-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-5270" ref_url="https://www.suse.com/security/cve/CVE-2016-5270/" source="CVE"/>
		<reference ref_id="CVE-2016-5272" ref_url="https://www.suse.com/security/cve/CVE-2016-5272/" source="CVE"/>
		<reference ref_id="CVE-2016-5274" ref_url="https://www.suse.com/security/cve/CVE-2016-5274/" source="CVE"/>
		<reference ref_id="CVE-2016-5276" ref_url="https://www.suse.com/security/cve/CVE-2016-5276/" source="CVE"/>
		<reference ref_id="CVE-2016-5277" ref_url="https://www.suse.com/security/cve/CVE-2016-5277/" source="CVE"/>
		<reference ref_id="CVE-2016-5278" ref_url="https://www.suse.com/security/cve/CVE-2016-5278/" source="CVE"/>
		<reference ref_id="CVE-2016-5280" ref_url="https://www.suse.com/security/cve/CVE-2016-5280/" source="CVE"/>
		<reference ref_id="CVE-2016-5281" ref_url="https://www.suse.com/security/cve/CVE-2016-5281/" source="CVE"/>
		<reference ref_id="CVE-2016-5284" ref_url="https://www.suse.com/security/cve/CVE-2016-5284/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002304.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to 45.4.0 ESR to fix the following issues (bsc#999701):

The following security issue were fixed:
* MFSA 2016-86/CVE-2016-5270: Heap-buffer-overflow in nsCaseTransformTextRunFactory::TransformString
* MFSA 2016-86/CVE-2016-5272: Bad cast in nsImageGeometryMixin
* MFSA 2016-86/CVE-2016-5276: Heap-use-after-free in mozilla::a11y::DocAccessible::ProcessInvalidationList
* MFSA 2016-86/CVE-2016-5274: use-after-free in nsFrameManager::CaptureFrameState
* MFSA 2016-86/CVE-2016-5277: Heap-use-after-free in nsRefreshDriver::Tick
* MFSA 2016-86/CVE-2016-5278: Heap-buffer-overflow in nsBMPEncoder::AddImageFrame
* MFSA 2016-86/CVE-2016-5280: Use-after-free in mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap
* MFSA 2016-86/CVE-2016-5281: use-after-free in DOMSVGLength
* MFSA 2016-86/CVE-2016-5284: Add-on update site certificate pin expiration
* MFSA 2016-86/CVE-2016-5250: Resource Timing API is storing resources sent by the previous page
* MFSA 2016-86/CVE-2016-5261: Integer overflow and memory corruption in WebSocketChannel
* MFSA 2016-86/CVE-2016-5257: Various memory safety bugs fixed in Firefox 49 and Firefox ESR 45.4
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-04"/>
	<updated date="2016-10-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5250/">CVE-2016-5250 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5250">CVE-2016-5250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5257/">CVE-2016-5257 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5257">CVE-2016-5257 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5261/">CVE-2016-5261 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5261">CVE-2016-5261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5270/">CVE-2016-5270 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5270">CVE-2016-5270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5272/">CVE-2016-5272 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5272">CVE-2016-5272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5274/">CVE-2016-5274 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5274">CVE-2016-5274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5276/">CVE-2016-5276 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5276">CVE-2016-5276 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5277/">CVE-2016-5277 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5277">CVE-2016-5277 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5278/">CVE-2016-5278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5278">CVE-2016-5278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5280/">CVE-2016-5280 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5280">CVE-2016-5280 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5281/">CVE-2016-5281 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5281">CVE-2016-5281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5284/">CVE-2016-5284 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5284">CVE-2016-5284 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575803" comment="MozillaFirefox-45.4.0esr-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575804" comment="MozillaFirefox-translations-45.4.0esr-52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217986" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1000751" ref_url="https://bugzilla.suse.com/1000751" source="BUGZILLA"/>
		<reference ref_id="1015422" ref_url="https://bugzilla.suse.com/1015422" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9893" ref_url="https://www.suse.com/security/cve/CVE-2016-9893/" source="CVE"/>
		<reference ref_id="CVE-2016-9895" ref_url="https://www.suse.com/security/cve/CVE-2016-9895/" source="CVE"/>
		<reference ref_id="CVE-2016-9897" ref_url="https://www.suse.com/security/cve/CVE-2016-9897/" source="CVE"/>
		<reference ref_id="CVE-2016-9898" ref_url="https://www.suse.com/security/cve/CVE-2016-9898/" source="CVE"/>
		<reference ref_id="CVE-2016-9899" ref_url="https://www.suse.com/security/cve/CVE-2016-9899/" source="CVE"/>
		<reference ref_id="CVE-2016-9900" ref_url="https://www.suse.com/security/cve/CVE-2016-9900/" source="CVE"/>
		<reference ref_id="CVE-2016-9901" ref_url="https://www.suse.com/security/cve/CVE-2016-9901/" source="CVE"/>
		<reference ref_id="CVE-2016-9902" ref_url="https://www.suse.com/security/cve/CVE-2016-9902/" source="CVE"/>
		<reference ref_id="CVE-2016-9904" ref_url="https://www.suse.com/security/cve/CVE-2016-9904/" source="CVE"/>
		<reference ref_id="CVE-2016-9905" ref_url="https://www.suse.com/security/cve/CVE-2016-9905/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002512.html" source="SUSE-SU"/>
		<description>

MozillaFirefox 45 ESR was updated to 45.6 to fix the following issues:

* MFSA 2016-95/CVE-2016-9897: Memory corruption in libGLES
* MFSA 2016-95/CVE-2016-9901: Data from Pocket server improperly sanitized before execution
* MFSA 2016-95/CVE-2016-9898: Use-after-free in Editor while manipulating DOM subtrees
* MFSA 2016-95/CVE-2016-9899: Use-after-free while manipulating DOM events and audio elements
* MFSA 2016-95/CVE-2016-9904: Cross-origin information leak in shared atoms
* MFSA 2016-95/CVE-2016-9905: Crash in EnumerateSubDocuments
* MFSA 2016-95/CVE-2016-9895: CSP bypass using marquee tag
* MFSA 2016-95/CVE-2016-9900: Restricted external resources can be loaded by SVG images through data URLs
* MFSA 2016-95/CVE-2016-9893: Memory safety bugs fixed in Firefox 50.1 and Firefox ESR 45.6
* MFSA 2016-95/CVE-2016-9902: Pocket extension does not validate the origin of events

Please see https://www.mozilla.org/en-US/security/advisories/mfsa2016-95/
for more information.

- Fix fontconfig issue (bsc#1000751) on 32bit systems as well.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-21"/>
	<updated date="2016-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000751">SUSE bug 1000751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9893/">CVE-2016-9893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9893">CVE-2016-9893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9895/">CVE-2016-9895 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9895">CVE-2016-9895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9897/">CVE-2016-9897 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9897">CVE-2016-9897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9898/">CVE-2016-9898 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9898">CVE-2016-9898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9899/">CVE-2016-9899 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9899">CVE-2016-9899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9900/">CVE-2016-9900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9900">CVE-2016-9900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9901/">CVE-2016-9901 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9901">CVE-2016-9901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9902/">CVE-2016-9902 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9902">CVE-2016-9902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9904/">CVE-2016-9904 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9904">CVE-2016-9904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9905/">CVE-2016-9905 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9905">CVE-2016-9905 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575805" comment="MozillaFirefox-45.6.0esr-66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575806" comment="MozillaFirefox-translations-45.6.0esr-66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217987" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="865539" ref_url="https://bugzilla.suse.com/865539" source="BUGZILLA"/>
		<reference ref_id="869827" ref_url="https://bugzilla.suse.com/869827" source="BUGZILLA"/>
		<reference ref_id="875378" ref_url="https://bugzilla.suse.com/875378" source="BUGZILLA"/>
		<reference ref_id="875803" ref_url="https://bugzilla.suse.com/875803" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1518" ref_url="https://www.suse.com/security/cve/CVE-2014-1518/" source="CVE"/>
		<reference ref_id="CVE-2014-1520" ref_url="https://www.suse.com/security/cve/CVE-2014-1520/" source="CVE"/>
		<reference ref_id="CVE-2014-1523" ref_url="https://www.suse.com/security/cve/CVE-2014-1523/" source="CVE"/>
		<reference ref_id="CVE-2014-1524" ref_url="https://www.suse.com/security/cve/CVE-2014-1524/" source="CVE"/>
		<reference ref_id="CVE-2014-1529" ref_url="https://www.suse.com/security/cve/CVE-2014-1529/" source="CVE"/>
		<reference ref_id="CVE-2014-1530" ref_url="https://www.suse.com/security/cve/CVE-2014-1530/" source="CVE"/>
		<reference ref_id="CVE-2014-1531" ref_url="https://www.suse.com/security/cve/CVE-2014-1531/" source="CVE"/>
		<reference ref_id="CVE-2014-1532" ref_url="https://www.suse.com/security/cve/CVE-2014-1532/" source="CVE"/>
		<description>

This MozillaFirefox and mozilla-nss update fixes several security and 
non-security issues.

MozillaFirefox has been updated to version 24.5.0esr which fixes the 
following issues:

    * MFSA 2014-34/CVE-2014-1518
      Miscellaneous memory safety hazards
    * MFSA 2014-37/CVE-2014-1523
      Out of bounds read while decoding JPG images
    * MFSA 2014-38/CVE-2014-1524
      Buffer overflow when using non-XBL object as XBL
    * MFSA 2014-42/CVE-2014-1529
      Privilege escalation through Web Notification API
    * MFSA 2014-43/CVE-2014-1530
      Cross-site scripting (XSS) using history navigations
    * MFSA 2014-44/CVE-2014-1531
      Use-after-free in imgLoader while resizing images
    * MFSA 2014-46/CVE-2014-1532
      Use-after-free in nsHostResolver

Mozilla NSS has been updated to version 3.16

    * required for Firefox 29
    * CVE-2014-1492_ In a wildcard certificate, the wildcard character
      should not be embedded within the U-label of an internationalized
      domain name. See the last bullet point in RFC 6125, Section 7.2.
    * Update of root certificates.

Security Issue references:

    * CVE-2014-1532
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532&gt;
    * CVE-2014-1531
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531&gt;
    * CVE-2014-1530
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530&gt;
    * CVE-2014-1529
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529&gt;
    * CVE-2014-1524
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524&gt;
    * CVE-2014-1523
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523&gt;
    * CVE-2014-1520
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1520&gt;
    * CVE-2014-1518
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-01"/>
	<updated date="2014-05-01"/>
	<bugzilla href="https://bugzilla.suse.com/865539">SUSE bug 865539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869827">SUSE bug 869827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875378">SUSE bug 875378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875803">SUSE bug 875803</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1518/">CVE-2014-1518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1518">CVE-2014-1518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1520/">CVE-2014-1520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1520">CVE-2014-1520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1523/">CVE-2014-1523 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1523">CVE-2014-1523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1524/">CVE-2014-1524 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1524">CVE-2014-1524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1529/">CVE-2014-1529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1529">CVE-2014-1529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1530/">CVE-2014-1530 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1530">CVE-2014-1530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1531/">CVE-2014-1531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1531">CVE-2014-1531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1532/">CVE-2014-1532 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1532">CVE-2014-1532 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570648" comment="MozillaFirefox-24.5.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570649" comment="MozillaFirefox-branding-SLED-24-0.4.10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570650" comment="MozillaFirefox-translations-24.5.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570651" comment="libfreebl3-3.16-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570652" comment="libfreebl3-32bit-3.16-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570653" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570654" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575807" comment="mozilla-nspr-devel-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570655" comment="mozilla-nss-3.16-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570656" comment="mozilla-nss-32bit-3.16-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575808" comment="mozilla-nss-devel-3.16-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570657" comment="mozilla-nss-tools-3.16-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217988" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="939712" ref_url="https://bugzilla.suse.com/939712" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5165" ref_url="https://www.suse.com/security/cve/CVE-2015-5165/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001543.html" source="SUSE-SU"/>
		<description>

This security update of Xen fixes the following issues:

* bsc#939712 (XSA-140): QEMU leak of uninitialized heap
  memory in rtl8139 device model (CVE-2015-5165)
* bsc#938344: qemu,kvm,xen: host code
  execution via IDE subsystem CD-ROM (CVE-2015-5154) 
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-11"/>
	<updated date="2015-08-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939712">SUSE bug 939712</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5154">CVE-2015-5154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-5165/">CVE-2015-5165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5165">CVE-2015-5165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575809" comment="xen-4.1.6_08-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575810" comment="xen-devel-4.1.6_08-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575811" comment="xen-doc-html-4.1.6_08-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575812" comment="xen-doc-pdf-4.1.6_08-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575813" comment="xen-kmp-default-4.1.6_08_3.0.101_0.7.29-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575814" comment="xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575815" comment="xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575816" comment="xen-libs-4.1.6_08-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575817" comment="xen-libs-32bit-4.1.6_08-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575818" comment="xen-tools-4.1.6_08-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575819" comment="xen-tools-domU-4.1.6_08-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217989" version="1" class="patch">
	<metadata>
		<title>Recommended update for ant</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="763820" ref_url="https://bugzilla.suse.com/763820" source="BUGZILLA"/>
		<reference ref_id="785695" ref_url="https://bugzilla.suse.com/785695" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2098" ref_url="https://www.suse.com/security/cve/CVE-2012-2098/" source="CVE"/>
		<description>

This update for ant adds a fix for the following reports for ant:

    * 785695: RPM task converts dashes (-) to underscores (_)

In addition, a security fix for a denial of service via specially crafted 
input has been added (CVE-2012-2098)

Security Issue reference:

    * CVE-2012-2098
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2098&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-09"/>
	<updated date="2012-11-09"/>
	<bugzilla href="https://bugzilla.suse.com/763820">SUSE bug 763820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785695">SUSE bug 785695</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2098/">CVE-2012-2098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2098">CVE-2012-2098 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009589459" comment="ant-1.7.0-200.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589460" comment="ant-trax-1.7.0-200.26.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009589459" comment="ant-1.7.0-200.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589460" comment="ant-trax-1.7.0-200.26.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217990" version="1" class="patch">
	<metadata>
		<title>Recommended update for apache2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="722545" ref_url="https://bugzilla.suse.com/722545" source="BUGZILLA"/>
		<reference ref_id="757710" ref_url="https://bugzilla.suse.com/757710" source="BUGZILLA"/>
		<reference ref_id="774045" ref_url="https://bugzilla.suse.com/774045" source="BUGZILLA"/>
		<reference ref_id="777260" ref_url="https://bugzilla.suse.com/777260" source="BUGZILLA"/>
		<reference ref_id="782956" ref_url="https://bugzilla.suse.com/782956" source="BUGZILLA"/>
		<reference ref_id="788121" ref_url="https://bugzilla.suse.com/788121" source="BUGZILLA"/>
		<reference ref_id="791794" ref_url="https://bugzilla.suse.com/791794" source="BUGZILLA"/>
		<reference ref_id="793004" ref_url="https://bugzilla.suse.com/793004" source="BUGZILLA"/>
		<reference ref_id="798733" ref_url="https://bugzilla.suse.com/798733" source="BUGZILLA"/>
		<reference ref_id="806458" ref_url="https://bugzilla.suse.com/806458" source="BUGZILLA"/>
		<reference ref_id="807152" ref_url="https://bugzilla.suse.com/807152" source="BUGZILLA"/>
		<reference ref_id="815621" ref_url="https://bugzilla.suse.com/815621" source="BUGZILLA"/>
		<reference ref_id="829056" ref_url="https://bugzilla.suse.com/829056" source="BUGZILLA"/>
		<reference ref_id="829057" ref_url="https://bugzilla.suse.com/829057" source="BUGZILLA"/>
		<reference ref_id="844212" ref_url="https://bugzilla.suse.com/844212" source="BUGZILLA"/>
		<reference ref_id="852401" ref_url="https://bugzilla.suse.com/852401" source="BUGZILLA"/>
		<reference ref_id="859916" ref_url="https://bugzilla.suse.com/859916" source="BUGZILLA"/>
		<reference ref_id="869105" ref_url="https://bugzilla.suse.com/869105" source="BUGZILLA"/>
		<reference ref_id="869106" ref_url="https://bugzilla.suse.com/869106" source="BUGZILLA"/>
		<reference ref_id="887765" ref_url="https://bugzilla.suse.com/887765" source="BUGZILLA"/>
		<reference ref_id="887768" ref_url="https://bugzilla.suse.com/887768" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0021" ref_url="https://www.suse.com/security/cve/CVE-2012-0021/" source="CVE"/>
		<reference ref_id="CVE-2012-0883" ref_url="https://www.suse.com/security/cve/CVE-2012-0883/" source="CVE"/>
		<reference ref_id="CVE-2012-2687" ref_url="https://www.suse.com/security/cve/CVE-2012-2687/" source="CVE"/>
		<reference ref_id="CVE-2012-3499" ref_url="https://www.suse.com/security/cve/CVE-2012-3499/" source="CVE"/>
		<reference ref_id="CVE-2012-4557" ref_url="https://www.suse.com/security/cve/CVE-2012-4557/" source="CVE"/>
		<reference ref_id="CVE-2012-4558" ref_url="https://www.suse.com/security/cve/CVE-2012-4558/" source="CVE"/>
		<reference ref_id="CVE-2013-1862" ref_url="https://www.suse.com/security/cve/CVE-2013-1862/" source="CVE"/>
		<reference ref_id="CVE-2013-1896" ref_url="https://www.suse.com/security/cve/CVE-2013-1896/" source="CVE"/>
		<reference ref_id="CVE-2013-6438" ref_url="https://www.suse.com/security/cve/CVE-2013-6438/" source="CVE"/>
		<reference ref_id="CVE-2014-0098" ref_url="https://www.suse.com/security/cve/CVE-2014-0098/" source="CVE"/>
		<reference ref_id="CVE-2014-0226" ref_url="https://www.suse.com/security/cve/CVE-2014-0226/" source="CVE"/>
		<reference ref_id="CVE-2014-0231" ref_url="https://www.suse.com/security/cve/CVE-2014-0231/" source="CVE"/>
		<description>

This update for apache2 provides the following fixes:

    * 

      Make sure that the tty from which Apache starts has echo mode set to
      on; otherwise, subsequently checking if echo mode was off results in
      the false detection that Apache is still waiting for a certificate
      pass-phrase to be entered, leading to a failure with Xen virtual
      guests that may have the terminal set to -echo. (bnc#852401)

    * 

      Partially revert the fix for bnc#815621 (PR50481); this upstream
      change has unwanted side effects with large request headers, where
      the LimitRequestFieldsize option is ignored. (bnc#844212)

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-11"/>
	<updated date="2014-01-11"/>
	<bugzilla href="https://bugzilla.suse.com/722545">SUSE bug 722545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757710">SUSE bug 757710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774045">SUSE bug 774045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777260">SUSE bug 777260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/782956">SUSE bug 782956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788121">SUSE bug 788121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791794">SUSE bug 791794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/793004">SUSE bug 793004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798733">SUSE bug 798733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806458">SUSE bug 806458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807152">SUSE bug 807152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815621">SUSE bug 815621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829056">SUSE bug 829056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829057">SUSE bug 829057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844212">SUSE bug 844212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852401">SUSE bug 852401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859916">SUSE bug 859916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869105">SUSE bug 869105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869106">SUSE bug 869106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887765">SUSE bug 887765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887768">SUSE bug 887768</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0021/">CVE-2012-0021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0021">CVE-2012-0021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0883/">CVE-2012-0883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0883">CVE-2012-0883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2687/">CVE-2012-2687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2687">CVE-2012-2687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3499/">CVE-2012-3499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3499">CVE-2012-3499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4557/">CVE-2012-4557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4557">CVE-2012-4557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4558/">CVE-2012-4558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4558">CVE-2012-4558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1862/">CVE-2013-1862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1862">CVE-2013-1862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1896/">CVE-2013-1896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1896">CVE-2013-1896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6438/">CVE-2013-6438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6438">CVE-2013-6438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0098/">CVE-2014-0098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0098">CVE-2014-0098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0226/">CVE-2014-0226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0226">CVE-2014-0226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0231/">CVE-2014-0231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0231">CVE-2014-0231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992490" comment="apache2-2.2.12-1.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992491" comment="apache2-doc-2.2.12-1.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992492" comment="apache2-example-pages-2.2.12-1.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992493" comment="apache2-prefork-2.2.12-1.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992494" comment="apache2-utils-2.2.12-1.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992495" comment="apache2-worker-2.2.12-1.42.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992490" comment="apache2-2.2.12-1.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992491" comment="apache2-doc-2.2.12-1.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992492" comment="apache2-example-pages-2.2.12-1.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992493" comment="apache2-prefork-2.2.12-1.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992494" comment="apache2-utils-2.2.12-1.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992495" comment="apache2-worker-2.2.12-1.42.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992490" comment="apache2-2.2.12-1.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992491" comment="apache2-doc-2.2.12-1.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992492" comment="apache2-example-pages-2.2.12-1.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992493" comment="apache2-prefork-2.2.12-1.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992494" comment="apache2-utils-2.2.12-1.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992495" comment="apache2-worker-2.2.12-1.42.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217991" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_nss</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="847216" ref_url="https://bugzilla.suse.com/847216" source="BUGZILLA"/>
		<reference ref_id="853039" ref_url="https://bugzilla.suse.com/853039" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4566" ref_url="https://www.suse.com/security/cve/CVE-2013-4566/" source="CVE"/>
		<description>

This update fixes the following security issues with apache2-mod_nss:

    * bnc#853039: client certificate verification problematic
      (CVE-2013-4566)

Security Issue reference:

    * CVE-2013-4566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4566&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-03"/>
	<updated date="2013-12-03"/>
	<bugzilla href="https://bugzilla.suse.com/847216">SUSE bug 847216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853039">SUSE bug 853039</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4566/">CVE-2013-4566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4566">CVE-2013-4566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575820" comment="apache2-mod_nss-1.0.8-0.4.7.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575820" comment="apache2-mod_nss-1.0.8-0.4.7.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217992" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="975394" ref_url="https://bugzilla.suse.com/975394" source="BUGZILLA"/>
		<reference ref_id="979688" ref_url="https://bugzilla.suse.com/979688" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4566" ref_url="https://www.suse.com/security/cve/CVE-2013-4566/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002277.html" source="SUSE-SU"/>
		<description>

This update provides apache2-mod_nss 1.0.14, which brings several fixes and
enhancements:

- SHA256 cipher names change spelling from *_sha256 to *_sha_256.
- Drop mod_nss_migrate.pl and use upstream migrate script instead.
- Check for Apache user owner/group read permissions of NSS database at startup.
- Update default ciphers to something more modern and secure.
- Check for host and netstat commands in gencert before trying to use them.
- Don't ignore NSSProtocol when NSSFIPS is enabled.
- Use proper shell syntax to avoid creating /0 in gencert.
- Add server support for DHE ciphers.
- Extract SAN from server/client certificates into env.
- Fix memory leaks and other coding issues caught by clang analyzer.
- Add support for Server Name Indication (SNI)
- Add support for SNI for reverse proxy connections.
- Add RenegBufferSize? option.
- Add support for TLS Session Tickets (RFC 5077).
- Implement a slew more OpenSSL cipher macros.
- Fix a number of illegal memory accesses and memory leaks.
- Support for SHA384 ciphers if they are available in the version of NSS mod_nss is built against.
- Add the SECURE_RENEG environment variable.
- Add some hints when NSS database cannot be initialized.
- Code cleanup including trailing whitespace and compiler warnings.
- Modernize autotools configuration slightly, add config.h.
- Add small test suite for SNI.
- Add compatibility for mod_ssl-style cipher definitions.
- Add Camelia ciphers.
- Remove Fortezza ciphers.
- Add TLSv1.2-specific ciphers.
- Initialize cipher list when re-negotiating handshake.
- Completely remove support for SSLv2.
- Add support for sqlite NSS databases.
- Compare subject CN and VS hostname during server start up.
- Add support for enabling TLS v1.2.
- Don't enable SSL 3 by default. (CVE-2014-3566)
- Improve protocol testing.
- Add nss_pcache man page.
- Fix argument handling in nss_pcache.
- Support httpd 2.4+.
- Allow users to configure a helper to ask for certificate passphrases via
  NSSPassPhraseDialog. (bsc#975394)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-16"/>
	<updated date="2016-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/975394">SUSE bug 975394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979688">SUSE bug 979688</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4566/">CVE-2013-4566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4566">CVE-2013-4566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575821" comment="apache2-mod_nss-1.0.14-0.4.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217993" version="1" class="patch">
	<metadata>
		<title>Security update for PHP5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="775852" ref_url="https://bugzilla.suse.com/775852" source="BUGZILLA"/>
		<reference ref_id="778003" ref_url="https://bugzilla.suse.com/778003" source="BUGZILLA"/>
		<reference ref_id="783239" ref_url="https://bugzilla.suse.com/783239" source="BUGZILLA"/>
		<reference ref_id="807707" ref_url="https://bugzilla.suse.com/807707" source="BUGZILLA"/>
		<reference ref_id="828020" ref_url="https://bugzilla.suse.com/828020" source="BUGZILLA"/>
		<reference ref_id="829207" ref_url="https://bugzilla.suse.com/829207" source="BUGZILLA"/>
		<reference ref_id="837746" ref_url="https://bugzilla.suse.com/837746" source="BUGZILLA"/>
		<reference ref_id="854880" ref_url="https://bugzilla.suse.com/854880" source="BUGZILLA"/>
		<reference ref_id="868624" ref_url="https://bugzilla.suse.com/868624" source="BUGZILLA"/>
		<reference ref_id="882992" ref_url="https://bugzilla.suse.com/882992" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1398" ref_url="https://www.suse.com/security/cve/CVE-2011-1398/" source="CVE"/>
		<reference ref_id="CVE-2011-4388" ref_url="https://www.suse.com/security/cve/CVE-2011-4388/" source="CVE"/>
		<reference ref_id="CVE-2013-1635" ref_url="https://www.suse.com/security/cve/CVE-2013-1635/" source="CVE"/>
		<reference ref_id="CVE-2013-1643" ref_url="https://www.suse.com/security/cve/CVE-2013-1643/" source="CVE"/>
		<reference ref_id="CVE-2013-4113" ref_url="https://www.suse.com/security/cve/CVE-2013-4113/" source="CVE"/>
		<reference ref_id="CVE-2013-4248" ref_url="https://www.suse.com/security/cve/CVE-2013-4248/" source="CVE"/>
		<reference ref_id="CVE-2013-4635" ref_url="https://www.suse.com/security/cve/CVE-2013-4635/" source="CVE"/>
		<reference ref_id="CVE-2013-6420" ref_url="https://www.suse.com/security/cve/CVE-2013-6420/" source="CVE"/>
		<reference ref_id="CVE-2014-2497" ref_url="https://www.suse.com/security/cve/CVE-2014-2497/" source="CVE"/>
		<reference ref_id="CVE-2014-4049" ref_url="https://www.suse.com/security/cve/CVE-2014-4049/" source="CVE"/>
		<description>

This update fixes the following issues:

    * memory corruption in openssl_parse_x509 (CVE-2013-6420)
    * man-in-the-middle attacks by specially crafting certificates
      (CVE-2013-4248)

Security Issue references:

    * CVE-2013-6420
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420&gt;
    * CVE-2013-4248
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4248&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-20"/>
	<updated date="2013-12-20"/>
	<bugzilla href="https://bugzilla.suse.com/775852">SUSE bug 775852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778003">SUSE bug 778003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/783239">SUSE bug 783239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807707">SUSE bug 807707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828020">SUSE bug 828020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829207">SUSE bug 829207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/837746">SUSE bug 837746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854880">SUSE bug 854880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868624">SUSE bug 868624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882992">SUSE bug 882992</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1398/">CVE-2011-1398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1398">CVE-2011-1398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4388/">CVE-2011-4388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4388">CVE-2011-4388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1635/">CVE-2013-1635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1635">CVE-2013-1635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1643/">CVE-2013-1643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1643">CVE-2013-1643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4113/">CVE-2013-4113 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4113">CVE-2013-4113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4248/">CVE-2013-4248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4248">CVE-2013-4248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4635/">CVE-2013-4635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4635">CVE-2013-4635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6420/">CVE-2013-6420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6420">CVE-2013-6420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2497/">CVE-2014-2497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2497">CVE-2014-2497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4049/">CVE-2014-4049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4049">CVE-2014-4049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575822" comment="apache2-mod_php5-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575823" comment="php5-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575824" comment="php5-bcmath-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575825" comment="php5-bz2-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575826" comment="php5-calendar-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575827" comment="php5-ctype-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575828" comment="php5-curl-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575829" comment="php5-dba-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575830" comment="php5-dbase-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575831" comment="php5-dom-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575832" comment="php5-exif-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575833" comment="php5-fastcgi-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575834" comment="php5-ftp-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575835" comment="php5-gd-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575836" comment="php5-gettext-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575837" comment="php5-gmp-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575838" comment="php5-hash-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575839" comment="php5-iconv-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575840" comment="php5-json-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575841" comment="php5-ldap-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575842" comment="php5-mbstring-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575843" comment="php5-mcrypt-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575844" comment="php5-mysql-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575845" comment="php5-odbc-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575846" comment="php5-openssl-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575847" comment="php5-pcntl-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575848" comment="php5-pdo-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575849" comment="php5-pear-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575850" comment="php5-pgsql-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575851" comment="php5-pspell-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575852" comment="php5-shmop-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575853" comment="php5-snmp-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575854" comment="php5-soap-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575855" comment="php5-suhosin-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575856" comment="php5-sysvmsg-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575857" comment="php5-sysvsem-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575858" comment="php5-sysvshm-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575859" comment="php5-tokenizer-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575860" comment="php5-wddx-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575861" comment="php5-xmlreader-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575862" comment="php5-xmlrpc-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575863" comment="php5-xmlwriter-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575864" comment="php5-xsl-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575865" comment="php5-zip-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575866" comment="php5-zlib-5.2.14-0.7.30.50.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575822" comment="apache2-mod_php5-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575823" comment="php5-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575824" comment="php5-bcmath-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575825" comment="php5-bz2-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575826" comment="php5-calendar-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575827" comment="php5-ctype-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575828" comment="php5-curl-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575829" comment="php5-dba-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575830" comment="php5-dbase-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575831" comment="php5-dom-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575832" comment="php5-exif-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575833" comment="php5-fastcgi-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575834" comment="php5-ftp-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575835" comment="php5-gd-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575836" comment="php5-gettext-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575837" comment="php5-gmp-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575838" comment="php5-hash-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575839" comment="php5-iconv-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575840" comment="php5-json-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575841" comment="php5-ldap-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575842" comment="php5-mbstring-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575843" comment="php5-mcrypt-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575844" comment="php5-mysql-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575845" comment="php5-odbc-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575846" comment="php5-openssl-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575847" comment="php5-pcntl-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575848" comment="php5-pdo-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575849" comment="php5-pear-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575850" comment="php5-pgsql-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575851" comment="php5-pspell-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575852" comment="php5-shmop-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575853" comment="php5-snmp-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575854" comment="php5-soap-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575855" comment="php5-suhosin-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575856" comment="php5-sysvmsg-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575857" comment="php5-sysvsem-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575858" comment="php5-sysvshm-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575859" comment="php5-tokenizer-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575860" comment="php5-wddx-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575861" comment="php5-xmlreader-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575862" comment="php5-xmlrpc-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575863" comment="php5-xmlwriter-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575864" comment="php5-xsl-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575865" comment="php5-zip-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575866" comment="php5-zlib-5.2.14-0.7.30.50.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575822" comment="apache2-mod_php5-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575823" comment="php5-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575824" comment="php5-bcmath-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575825" comment="php5-bz2-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575826" comment="php5-calendar-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575827" comment="php5-ctype-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575828" comment="php5-curl-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575829" comment="php5-dba-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575830" comment="php5-dbase-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575831" comment="php5-dom-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575832" comment="php5-exif-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575833" comment="php5-fastcgi-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575834" comment="php5-ftp-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575835" comment="php5-gd-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575836" comment="php5-gettext-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575837" comment="php5-gmp-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575838" comment="php5-hash-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575839" comment="php5-iconv-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575840" comment="php5-json-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575841" comment="php5-ldap-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575842" comment="php5-mbstring-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575843" comment="php5-mcrypt-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575844" comment="php5-mysql-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575845" comment="php5-odbc-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575846" comment="php5-openssl-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575847" comment="php5-pcntl-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575848" comment="php5-pdo-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575849" comment="php5-pear-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575850" comment="php5-pgsql-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575851" comment="php5-pspell-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575852" comment="php5-shmop-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575853" comment="php5-snmp-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575854" comment="php5-soap-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575855" comment="php5-suhosin-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575856" comment="php5-sysvmsg-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575857" comment="php5-sysvsem-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575858" comment="php5-sysvshm-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575859" comment="php5-tokenizer-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575860" comment="php5-wddx-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575861" comment="php5-xmlreader-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575862" comment="php5-xmlrpc-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575863" comment="php5-xmlwriter-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575864" comment="php5-xsl-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575865" comment="php5-zip-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575866" comment="php5-zlib-5.2.14-0.7.30.50.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217994" version="1" class="patch">
	<metadata>
		<title>Security update for PHP5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="741520" ref_url="https://bugzilla.suse.com/741520" source="BUGZILLA"/>
		<reference ref_id="741859" ref_url="https://bugzilla.suse.com/741859" source="BUGZILLA"/>
		<reference ref_id="743308" ref_url="https://bugzilla.suse.com/743308" source="BUGZILLA"/>
		<reference ref_id="746661" ref_url="https://bugzilla.suse.com/746661" source="BUGZILLA"/>
		<reference ref_id="749111" ref_url="https://bugzilla.suse.com/749111" source="BUGZILLA"/>
		<reference ref_id="752030" ref_url="https://bugzilla.suse.com/752030" source="BUGZILLA"/>
		<reference ref_id="760536" ref_url="https://bugzilla.suse.com/760536" source="BUGZILLA"/>
		<reference ref_id="761631" ref_url="https://bugzilla.suse.com/761631" source="BUGZILLA"/>
		<reference ref_id="763814" ref_url="https://bugzilla.suse.com/763814" source="BUGZILLA"/>
		<reference ref_id="766798" ref_url="https://bugzilla.suse.com/766798" source="BUGZILLA"/>
		<reference ref_id="769785" ref_url="https://bugzilla.suse.com/769785" source="BUGZILLA"/>
		<reference ref_id="772580" ref_url="https://bugzilla.suse.com/772580" source="BUGZILLA"/>
		<reference ref_id="772582" ref_url="https://bugzilla.suse.com/772582" source="BUGZILLA"/>
		<reference ref_id="775852" ref_url="https://bugzilla.suse.com/775852" source="BUGZILLA"/>
		<reference ref_id="778003" ref_url="https://bugzilla.suse.com/778003" source="BUGZILLA"/>
		<reference ref_id="807707" ref_url="https://bugzilla.suse.com/807707" source="BUGZILLA"/>
		<reference ref_id="828020" ref_url="https://bugzilla.suse.com/828020" source="BUGZILLA"/>
		<reference ref_id="829207" ref_url="https://bugzilla.suse.com/829207" source="BUGZILLA"/>
		<reference ref_id="854880" ref_url="https://bugzilla.suse.com/854880" source="BUGZILLA"/>
		<reference ref_id="868624" ref_url="https://bugzilla.suse.com/868624" source="BUGZILLA"/>
		<reference ref_id="880904" ref_url="https://bugzilla.suse.com/880904" source="BUGZILLA"/>
		<reference ref_id="880905" ref_url="https://bugzilla.suse.com/880905" source="BUGZILLA"/>
		<reference ref_id="882992" ref_url="https://bugzilla.suse.com/882992" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1398" ref_url="https://www.suse.com/security/cve/CVE-2011-1398/" source="CVE"/>
		<reference ref_id="CVE-2011-4153" ref_url="https://www.suse.com/security/cve/CVE-2011-4153/" source="CVE"/>
		<reference ref_id="CVE-2011-4388" ref_url="https://www.suse.com/security/cve/CVE-2011-4388/" source="CVE"/>
		<reference ref_id="CVE-2012-0057" ref_url="https://www.suse.com/security/cve/CVE-2012-0057/" source="CVE"/>
		<reference ref_id="CVE-2012-0807" ref_url="https://www.suse.com/security/cve/CVE-2012-0807/" source="CVE"/>
		<reference ref_id="CVE-2012-0831" ref_url="https://www.suse.com/security/cve/CVE-2012-0831/" source="CVE"/>
		<reference ref_id="CVE-2012-1172" ref_url="https://www.suse.com/security/cve/CVE-2012-1172/" source="CVE"/>
		<reference ref_id="CVE-2012-1823" ref_url="https://www.suse.com/security/cve/CVE-2012-1823/" source="CVE"/>
		<reference ref_id="CVE-2012-2143" ref_url="https://www.suse.com/security/cve/CVE-2012-2143/" source="CVE"/>
		<reference ref_id="CVE-2012-2311" ref_url="https://www.suse.com/security/cve/CVE-2012-2311/" source="CVE"/>
		<reference ref_id="CVE-2012-2335" ref_url="https://www.suse.com/security/cve/CVE-2012-2335/" source="CVE"/>
		<reference ref_id="CVE-2012-2336" ref_url="https://www.suse.com/security/cve/CVE-2012-2336/" source="CVE"/>
		<reference ref_id="CVE-2012-2386" ref_url="https://www.suse.com/security/cve/CVE-2012-2386/" source="CVE"/>
		<reference ref_id="CVE-2012-2688" ref_url="https://www.suse.com/security/cve/CVE-2012-2688/" source="CVE"/>
		<reference ref_id="CVE-2012-3365" ref_url="https://www.suse.com/security/cve/CVE-2012-3365/" source="CVE"/>
		<reference ref_id="CVE-2013-1635" ref_url="https://www.suse.com/security/cve/CVE-2013-1635/" source="CVE"/>
		<reference ref_id="CVE-2013-1643" ref_url="https://www.suse.com/security/cve/CVE-2013-1643/" source="CVE"/>
		<reference ref_id="CVE-2013-4113" ref_url="https://www.suse.com/security/cve/CVE-2013-4113/" source="CVE"/>
		<reference ref_id="CVE-2013-4248" ref_url="https://www.suse.com/security/cve/CVE-2013-4248/" source="CVE"/>
		<reference ref_id="CVE-2013-4635" ref_url="https://www.suse.com/security/cve/CVE-2013-4635/" source="CVE"/>
		<reference ref_id="CVE-2013-6420" ref_url="https://www.suse.com/security/cve/CVE-2013-6420/" source="CVE"/>
		<reference ref_id="CVE-2013-6712" ref_url="https://www.suse.com/security/cve/CVE-2013-6712/" source="CVE"/>
		<reference ref_id="CVE-2014-0237" ref_url="https://www.suse.com/security/cve/CVE-2014-0237/" source="CVE"/>
		<reference ref_id="CVE-2014-0238" ref_url="https://www.suse.com/security/cve/CVE-2014-0238/" source="CVE"/>
		<reference ref_id="CVE-2014-2497" ref_url="https://www.suse.com/security/cve/CVE-2014-2497/" source="CVE"/>
		<reference ref_id="CVE-2014-4049" ref_url="https://www.suse.com/security/cve/CVE-2014-4049/" source="CVE"/>
		<description>

This update fixes the following issues:

    * memory corruption in openssl_parse_x509 (CVE-2013-6420)
    * Heap buffer over-read in DateInterval (CVE-2013-6712)
    * man-in-the-middle attacks by specially crafting certificates
      (CVE-2013-4248)

Security Issue references:

    * CVE-2013-6420
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420&gt;
    * CVE-2013-6712
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6712&gt;
    * CVE-2013-4248
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4248&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-18"/>
	<updated date="2013-12-18"/>
	<bugzilla href="https://bugzilla.suse.com/741520">SUSE bug 741520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/741859">SUSE bug 741859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/743308">SUSE bug 743308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746661">SUSE bug 746661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749111">SUSE bug 749111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752030">SUSE bug 752030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760536">SUSE bug 760536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761631">SUSE bug 761631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763814">SUSE bug 763814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/766798">SUSE bug 766798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769785">SUSE bug 769785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772580">SUSE bug 772580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772582">SUSE bug 772582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775852">SUSE bug 775852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778003">SUSE bug 778003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807707">SUSE bug 807707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828020">SUSE bug 828020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829207">SUSE bug 829207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854880">SUSE bug 854880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868624">SUSE bug 868624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880904">SUSE bug 880904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880905">SUSE bug 880905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882992">SUSE bug 882992</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1398/">CVE-2011-1398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1398">CVE-2011-1398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4153/">CVE-2011-4153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4153">CVE-2011-4153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4388/">CVE-2011-4388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4388">CVE-2011-4388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0057/">CVE-2012-0057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0057">CVE-2012-0057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0807/">CVE-2012-0807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0807">CVE-2012-0807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0831/">CVE-2012-0831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0831">CVE-2012-0831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1172/">CVE-2012-1172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1172">CVE-2012-1172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1823/">CVE-2012-1823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1823">CVE-2012-1823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2143/">CVE-2012-2143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2143">CVE-2012-2143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2311/">CVE-2012-2311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2311">CVE-2012-2311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2335/">CVE-2012-2335 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2335">CVE-2012-2335 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2336/">CVE-2012-2336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2336">CVE-2012-2336 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2386/">CVE-2012-2386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2386">CVE-2012-2386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2688/">CVE-2012-2688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2688">CVE-2012-2688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3365/">CVE-2012-3365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3365">CVE-2012-3365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1635/">CVE-2013-1635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1635">CVE-2013-1635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1643/">CVE-2013-1643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1643">CVE-2013-1643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4113/">CVE-2013-4113 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4113">CVE-2013-4113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4248/">CVE-2013-4248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4248">CVE-2013-4248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4635/">CVE-2013-4635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4635">CVE-2013-4635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6420/">CVE-2013-6420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6420">CVE-2013-6420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6712/">CVE-2013-6712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6712">CVE-2013-6712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0237/">CVE-2014-0237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0237">CVE-2014-0237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0238/">CVE-2014-0238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0238">CVE-2014-0238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2497/">CVE-2014-2497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2497">CVE-2014-2497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4049/">CVE-2014-4049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4049">CVE-2014-4049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575867" comment="apache2-mod_php53-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575868" comment="php53-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575869" comment="php53-bcmath-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575870" comment="php53-bz2-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575871" comment="php53-calendar-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575872" comment="php53-ctype-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575873" comment="php53-curl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575874" comment="php53-dba-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575875" comment="php53-dom-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575876" comment="php53-exif-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575877" comment="php53-fastcgi-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575878" comment="php53-fileinfo-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575879" comment="php53-ftp-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575880" comment="php53-gd-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575881" comment="php53-gettext-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575882" comment="php53-gmp-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575883" comment="php53-iconv-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575884" comment="php53-intl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575885" comment="php53-json-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575886" comment="php53-ldap-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575887" comment="php53-mbstring-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575888" comment="php53-mcrypt-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575889" comment="php53-mysql-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575890" comment="php53-odbc-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575891" comment="php53-openssl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575892" comment="php53-pcntl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575893" comment="php53-pdo-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575894" comment="php53-pear-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575895" comment="php53-pgsql-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575896" comment="php53-pspell-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575897" comment="php53-shmop-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575898" comment="php53-snmp-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575899" comment="php53-soap-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575900" comment="php53-suhosin-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575901" comment="php53-sysvmsg-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575902" comment="php53-sysvsem-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575903" comment="php53-sysvshm-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575904" comment="php53-tokenizer-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575905" comment="php53-wddx-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575906" comment="php53-xmlreader-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575907" comment="php53-xmlrpc-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575908" comment="php53-xmlwriter-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575909" comment="php53-xsl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575910" comment="php53-zip-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575911" comment="php53-zlib-5.3.8-0.43.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575867" comment="apache2-mod_php53-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575868" comment="php53-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575869" comment="php53-bcmath-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575870" comment="php53-bz2-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575871" comment="php53-calendar-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575872" comment="php53-ctype-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575873" comment="php53-curl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575874" comment="php53-dba-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575875" comment="php53-dom-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575876" comment="php53-exif-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575877" comment="php53-fastcgi-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575878" comment="php53-fileinfo-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575879" comment="php53-ftp-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575880" comment="php53-gd-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575881" comment="php53-gettext-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575882" comment="php53-gmp-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575883" comment="php53-iconv-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575884" comment="php53-intl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575885" comment="php53-json-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575886" comment="php53-ldap-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575887" comment="php53-mbstring-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575888" comment="php53-mcrypt-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575889" comment="php53-mysql-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575890" comment="php53-odbc-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575891" comment="php53-openssl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575892" comment="php53-pcntl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575893" comment="php53-pdo-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575894" comment="php53-pear-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575895" comment="php53-pgsql-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575896" comment="php53-pspell-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575897" comment="php53-shmop-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575898" comment="php53-snmp-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575899" comment="php53-soap-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575900" comment="php53-suhosin-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575901" comment="php53-sysvmsg-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575902" comment="php53-sysvsem-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575903" comment="php53-sysvshm-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575904" comment="php53-tokenizer-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575905" comment="php53-wddx-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575906" comment="php53-xmlreader-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575907" comment="php53-xmlrpc-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575908" comment="php53-xmlwriter-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575909" comment="php53-xsl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575910" comment="php53-zip-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575911" comment="php53-zlib-5.3.8-0.43.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575867" comment="apache2-mod_php53-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575868" comment="php53-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575869" comment="php53-bcmath-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575870" comment="php53-bz2-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575871" comment="php53-calendar-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575872" comment="php53-ctype-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575873" comment="php53-curl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575874" comment="php53-dba-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575875" comment="php53-dom-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575876" comment="php53-exif-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575877" comment="php53-fastcgi-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575878" comment="php53-fileinfo-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575879" comment="php53-ftp-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575880" comment="php53-gd-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575881" comment="php53-gettext-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575882" comment="php53-gmp-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575883" comment="php53-iconv-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575884" comment="php53-intl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575885" comment="php53-json-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575886" comment="php53-ldap-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575887" comment="php53-mbstring-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575888" comment="php53-mcrypt-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575889" comment="php53-mysql-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575890" comment="php53-odbc-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575891" comment="php53-openssl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575892" comment="php53-pcntl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575893" comment="php53-pdo-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575894" comment="php53-pear-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575895" comment="php53-pgsql-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575896" comment="php53-pspell-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575897" comment="php53-shmop-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575898" comment="php53-snmp-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575899" comment="php53-soap-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575900" comment="php53-suhosin-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575901" comment="php53-sysvmsg-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575902" comment="php53-sysvsem-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575903" comment="php53-sysvshm-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575904" comment="php53-tokenizer-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575905" comment="php53-wddx-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575906" comment="php53-xmlreader-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575907" comment="php53-xmlrpc-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575908" comment="php53-xmlwriter-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575909" comment="php53-xsl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575910" comment="php53-zip-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575911" comment="php53-zlib-5.3.8-0.43.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217995" version="1" class="patch">
	<metadata>
		<title>Security update for automake</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="559815" ref_url="https://bugzilla.suse.com/559815" source="BUGZILLA"/>
		<reference ref_id="770618" ref_url="https://bugzilla.suse.com/770618" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<description>

This update of automake fixes a race condition in 'distcheck' 
(CVE-2012-3386).

Also a bug where world writeable tarballs were generated during 'make dist' 
has been fixed (CVE-2009-4029).

Security Issue reference:

    * CVE-2012-3386
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3386&gt;
    * CVE-2009-4029
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4029&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-12"/>
	<updated date="2013-08-12"/>
	<bugzilla href="https://bugzilla.suse.com/559815">SUSE bug 559815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770618">SUSE bug 770618</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3386">CVE-2012-3386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575912" comment="automake-1.10.1-4.131.9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575912" comment="automake-1.10.1-4.131.9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217996" version="1" class="patch">
	<metadata>
		<title>Recommended update for bash</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="776694" ref_url="https://bugzilla.suse.com/776694" source="BUGZILLA"/>
		<reference ref_id="819783" ref_url="https://bugzilla.suse.com/819783" source="BUGZILLA"/>
		<reference ref_id="820149" ref_url="https://bugzilla.suse.com/820149" source="BUGZILLA"/>
		<reference ref_id="844550" ref_url="https://bugzilla.suse.com/844550" source="BUGZILLA"/>
		<reference ref_id="896776" ref_url="https://bugzilla.suse.com/896776" source="BUGZILLA"/>
		<reference ref_id="898346" ref_url="https://bugzilla.suse.com/898346" source="BUGZILLA"/>
		<reference ref_id="898603" ref_url="https://bugzilla.suse.com/898603" source="BUGZILLA"/>
		<reference ref_id="898604" ref_url="https://bugzilla.suse.com/898604" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6271" ref_url="https://www.suse.com/security/cve/CVE-2014-6271/" source="CVE"/>
		<reference ref_id="CVE-2014-7169" ref_url="https://www.suse.com/security/cve/CVE-2014-7169/" source="CVE"/>
		<reference ref_id="CVE-2014-7186" ref_url="https://www.suse.com/security/cve/CVE-2014-7186/" source="CVE"/>
		<reference ref_id="CVE-2014-7187" ref_url="https://www.suse.com/security/cve/CVE-2014-7187/" source="CVE"/>
		<description>

This update for bash provides fixes for the following issues:

    * Fix crash when expanding '$[' without matching ']'. (bnc#844550)
    * Do not restart the sighandler after a trap is reset. (bnc#820149)
    * Workaround crash in libreadline. (bnc#819783)
    * Mark skeleton files as configurations files. (bnc#776694)

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-15"/>
	<updated date="2013-10-15"/>
	<bugzilla href="https://bugzilla.suse.com/776694">SUSE bug 776694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819783">SUSE bug 819783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820149">SUSE bug 820149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844550">SUSE bug 844550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896776">SUSE bug 896776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898346">SUSE bug 898346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898603">SUSE bug 898603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898604">SUSE bug 898604</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6271/">CVE-2014-6271 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-6271">CVE-2014-6271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7169/">CVE-2014-7169 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7169">CVE-2014-7169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7186/">CVE-2014-7186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7186">CVE-2014-7186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7187/">CVE-2014-7187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7187">CVE-2014-7187 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992496" comment="bash-3.2-147.14.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992497" comment="bash-doc-3.2-147.14.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992498" comment="bash-x86-3.2-147.14.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992499" comment="libreadline5-5.2-147.14.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992500" comment="libreadline5-32bit-5.2-147.14.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992501" comment="libreadline5-x86-5.2-147.14.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992502" comment="readline-doc-5.2-147.14.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992496" comment="bash-3.2-147.14.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992497" comment="bash-doc-3.2-147.14.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992498" comment="bash-x86-3.2-147.14.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992499" comment="libreadline5-5.2-147.14.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992500" comment="libreadline5-32bit-5.2-147.14.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992501" comment="libreadline5-x86-5.2-147.14.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992502" comment="readline-doc-5.2-147.14.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992496" comment="bash-3.2-147.14.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992497" comment="bash-doc-3.2-147.14.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992498" comment="bash-x86-3.2-147.14.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992499" comment="libreadline5-5.2-147.14.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992500" comment="libreadline5-32bit-5.2-147.14.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992501" comment="libreadline5-x86-5.2-147.14.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992502" comment="readline-doc-5.2-147.14.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217997" version="1" class="patch">
	<metadata>
		<title>Security update for bind</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="743758" ref_url="https://bugzilla.suse.com/743758" source="BUGZILLA"/>
		<reference ref_id="765315" ref_url="https://bugzilla.suse.com/765315" source="BUGZILLA"/>
		<reference ref_id="772945" ref_url="https://bugzilla.suse.com/772945" source="BUGZILLA"/>
		<reference ref_id="780157" ref_url="https://bugzilla.suse.com/780157" source="BUGZILLA"/>
		<reference ref_id="784602" ref_url="https://bugzilla.suse.com/784602" source="BUGZILLA"/>
		<reference ref_id="796112" ref_url="https://bugzilla.suse.com/796112" source="BUGZILLA"/>
		<reference ref_id="815230" ref_url="https://bugzilla.suse.com/815230" source="BUGZILLA"/>
		<reference ref_id="819475" ref_url="https://bugzilla.suse.com/819475" source="BUGZILLA"/>
		<reference ref_id="831899" ref_url="https://bugzilla.suse.com/831899" source="BUGZILLA"/>
		<reference ref_id="858639" ref_url="https://bugzilla.suse.com/858639" source="BUGZILLA"/>
		<reference ref_id="882511" ref_url="https://bugzilla.suse.com/882511" source="BUGZILLA"/>
		<reference ref_id="908994" ref_url="https://bugzilla.suse.com/908994" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-1667" ref_url="https://www.suse.com/security/cve/CVE-2012-1667/" source="CVE"/>
		<reference ref_id="CVE-2012-3817" ref_url="https://www.suse.com/security/cve/CVE-2012-3817/" source="CVE"/>
		<reference ref_id="CVE-2012-4244" ref_url="https://www.suse.com/security/cve/CVE-2012-4244/" source="CVE"/>
		<reference ref_id="CVE-2012-5166" ref_url="https://www.suse.com/security/cve/CVE-2012-5166/" source="CVE"/>
		<reference ref_id="CVE-2013-4854" ref_url="https://www.suse.com/security/cve/CVE-2013-4854/" source="CVE"/>
		<reference ref_id="CVE-2014-0591" ref_url="https://www.suse.com/security/cve/CVE-2014-0591/" source="CVE"/>
		<reference ref_id="CVE-2014-8500" ref_url="https://www.suse.com/security/cve/CVE-2014-8500/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0011-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001228.html" source="SUSE-SU"/>
		<description>

This update fixes a DoS vulnerability in bind when handling malformed 
NSEC3-signed zones. CVE-2014-0591 has been assigned to this issue.

Security Issue references:

    * CVE-2014-0591
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-27"/>
	<updated date="2014-01-27"/>
	<bugzilla href="https://bugzilla.suse.com/743758">SUSE bug 743758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/765315">SUSE bug 765315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772945">SUSE bug 772945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780157">SUSE bug 780157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784602">SUSE bug 784602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796112">SUSE bug 796112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815230">SUSE bug 815230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819475">SUSE bug 819475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831899">SUSE bug 831899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858639">SUSE bug 858639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882511">SUSE bug 882511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908994">SUSE bug 908994</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1667/">CVE-2012-1667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1667">CVE-2012-1667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3817/">CVE-2012-3817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3817">CVE-2012-3817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4244/">CVE-2012-4244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4244">CVE-2012-4244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5166/">CVE-2012-5166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5166">CVE-2012-5166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4854/">CVE-2013-4854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4854">CVE-2013-4854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0591/">CVE-2014-0591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0591">CVE-2014-0591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8500/">CVE-2014-8500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8500">CVE-2014-8500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575913" comment="bind-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575914" comment="bind-chrootenv-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575915" comment="bind-devel-9.9.6P1-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575916" comment="bind-doc-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575917" comment="bind-libs-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575918" comment="bind-libs-32bit-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575919" comment="bind-libs-x86-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575920" comment="bind-utils-9.9.4P2-0.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575913" comment="bind-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575914" comment="bind-chrootenv-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575915" comment="bind-devel-9.9.6P1-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575916" comment="bind-doc-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575917" comment="bind-libs-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575918" comment="bind-libs-32bit-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575919" comment="bind-libs-x86-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575920" comment="bind-utils-9.9.4P2-0.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575913" comment="bind-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575914" comment="bind-chrootenv-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575915" comment="bind-devel-9.9.6P1-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575916" comment="bind-doc-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575917" comment="bind-libs-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575918" comment="bind-libs-32bit-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575919" comment="bind-libs-x86-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575920" comment="bind-utils-9.9.4P2-0.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217998" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="939567" ref_url="https://bugzilla.suse.com/939567" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001512.html" source="SUSE-SU"/>
		<description>
bind was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-5477: Remote DoS via TKEY queries (bsc#939567)

Exposure to this issue can not be prevented by either ACLs or configuration options limiting or denying service because the exploitable code occurs early in the packet handling.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-28"/>
	<updated date="2015-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/939567">SUSE bug 939567</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5477">CVE-2015-5477 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575921" comment="bind-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575922" comment="bind-chrootenv-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575923" comment="bind-devel-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575924" comment="bind-doc-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575925" comment="bind-libs-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575926" comment="bind-libs-32bit-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575927" comment="bind-utils-9.9.6P1-0.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217999" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="944066" ref_url="https://bugzilla.suse.com/944066" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001566.html" source="SUSE-SU"/>
		<description>

The nameserver bind was updated to fix a remote denial of service (crash) attack against 
bind nameservers doing validation on DNSSEC signed records. (CVE-2015-5722, bsc#944066).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-02"/>
	<updated date="2015-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/944066">SUSE bug 944066</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5722">CVE-2015-5722 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575928" comment="bind-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575929" comment="bind-chrootenv-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575930" comment="bind-devel-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575931" comment="bind-doc-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575932" comment="bind-libs-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575933" comment="bind-libs-32bit-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575934" comment="bind-utils-9.9.6P1-0.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218000" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="923281" ref_url="https://bugzilla.suse.com/923281" source="BUGZILLA"/>
		<reference ref_id="958861" ref_url="https://bugzilla.suse.com/958861" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001756.html" source="SUSE-SU"/>
		<description>

 
This update fixes the following security issue:
- CVE-2015-8000: Fix remote denial of service by misparsing incoming responses (bsc#958861).

It also fixes a bug:
- Fix a regression in caching entries with a TTL of 0 (bsc#923281).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-22"/>
	<updated date="2015-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/923281">SUSE bug 923281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958861">SUSE bug 958861</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8000">CVE-2015-8000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575935" comment="bind-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575936" comment="bind-chrootenv-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575937" comment="bind-devel-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575938" comment="bind-doc-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575939" comment="bind-libs-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575940" comment="bind-libs-32bit-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575941" comment="bind-utils-9.9.6P1-0.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218001" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="962189" ref_url="https://bugzilla.suse.com/962189" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001820.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- CVE-2015-8704: Specific APL data allowed remote attacker to trigger a crash in certain configurations (bsc#962189)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-22"/>
	<updated date="2016-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/962189">SUSE bug 962189</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8704">CVE-2015-8704 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575942" comment="bind-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575943" comment="bind-chrootenv-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575944" comment="bind-devel-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575945" comment="bind-doc-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575946" comment="bind-libs-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575947" comment="bind-libs-32bit-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575948" comment="bind-utils-9.9.6P1-0.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218002" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="970072" ref_url="https://bugzilla.suse.com/970072" source="BUGZILLA"/>
		<reference ref_id="970073" ref_url="https://bugzilla.suse.com/970073" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1285" ref_url="https://www.suse.com/security/cve/CVE-2016-1285/" source="CVE"/>
		<reference ref_id="CVE-2016-1286" ref_url="https://www.suse.com/security/cve/CVE-2016-1286/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001958.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

Fix two assertion failures that can lead to a remote denial of service attack:
* CVE-2016-1285: An error when parsing signature records for DNAME can lead to named exiting due to an assertion failure. (bsc#970072)
* CVE-2016-1286: An error when parsing signature records for DNAME records having specific properties can lead to named exiting due to an assertion failure in resolver.c or db.c. (bsc#970073)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-18"/>
	<updated date="2016-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/970072">SUSE bug 970072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970073">SUSE bug 970073</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1285/">CVE-2016-1285 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1285">CVE-2016-1285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1286/">CVE-2016-1286 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1286">CVE-2016-1286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575949" comment="bind-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575950" comment="bind-chrootenv-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575951" comment="bind-devel-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575952" comment="bind-doc-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575953" comment="bind-libs-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575954" comment="bind-libs-32bit-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575955" comment="bind-utils-9.9.6P1-0.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218003" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1000362" ref_url="https://bugzilla.suse.com/1000362" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2776" ref_url="https://www.suse.com/security/cve/CVE-2016-2776/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002297.html" source="SUSE-SU"/>
		<description>

The nameserver bind was updated to fix a remote denial of service
vulnerability, where a crafted packet could cause the nameserver to abort. (CVE-2016-2776, bsc#1000362)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-27"/>
	<updated date="2016-09-27"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1000362">SUSE bug 1000362</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2776/">CVE-2016-2776 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2776">CVE-2016-2776 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575956" comment="bind-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575957" comment="bind-chrootenv-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575958" comment="bind-devel-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575959" comment="bind-doc-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575960" comment="bind-libs-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575961" comment="bind-libs-32bit-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575962" comment="bind-utils-9.9.6P1-0.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218004" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1007829" ref_url="https://bugzilla.suse.com/1007829" source="BUGZILLA"/>
		<reference ref_id="965748" ref_url="https://bugzilla.suse.com/965748" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8864" ref_url="https://www.suse.com/security/cve/CVE-2016-8864/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002389.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- A defect in BIND's handling of responses containing a DNAME answer had
the potential to trigger assertion errors in the server remotely,
thereby facilitating a denial-of-service attack. (CVE-2016-8864, bsc#1007829).

- Fix BIND to return a valid hostname in response to ldapdump queries.
(bsc#965748)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-02"/>
	<updated date="2016-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1007829">SUSE bug 1007829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965748">SUSE bug 965748</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8864/">CVE-2016-8864 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8864">CVE-2016-8864 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575963" comment="bind-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575964" comment="bind-chrootenv-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575965" comment="bind-devel-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575966" comment="bind-doc-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575967" comment="bind-libs-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575968" comment="bind-libs-32bit-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575969" comment="bind-utils-9.9.6P1-0.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218005" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1018699" ref_url="https://bugzilla.suse.com/1018699" source="BUGZILLA"/>
		<reference ref_id="1018700" ref_url="https://bugzilla.suse.com/1018700" source="BUGZILLA"/>
		<reference ref_id="1018701" ref_url="https://bugzilla.suse.com/1018701" source="BUGZILLA"/>
		<reference ref_id="1018702" ref_url="https://bugzilla.suse.com/1018702" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9131" ref_url="https://www.suse.com/security/cve/CVE-2016-9131/" source="CVE"/>
		<reference ref_id="CVE-2016-9147" ref_url="https://www.suse.com/security/cve/CVE-2016-9147/" source="CVE"/>
		<reference ref_id="CVE-2016-9444" ref_url="https://www.suse.com/security/cve/CVE-2016-9444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002555.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- Fix a potential assertion failure that could have been triggered by a
  malformed response to an ANY query, thereby facilitating a denial-of-service
  attack. [CVE-2016-9131, bsc#1018700, bsc#1018699]

- Fix a potential assertion failure that could have been triggered by
  responding to a query with inconsistent DNSSEC information, thereby
  facilitating a denial-of-service attack. [CVE-2016-9147, bsc#1018701,
  bsc#1018699]

- Fix potential assertion failure that could have been triggered by DNS
  responses that contain unusually-formed DS resource records, facilitating a
  denial-of-service attack. [CVE-2016-9444, bsc#1018702, bsc#1018699]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1018699">SUSE bug 1018699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9131/">CVE-2016-9131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9131">CVE-2016-9131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9147/">CVE-2016-9147 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9147">CVE-2016-9147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9444/">CVE-2016-9444 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9444">CVE-2016-9444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575970" comment="bind-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575971" comment="bind-chrootenv-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575972" comment="bind-devel-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575973" comment="bind-doc-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575974" comment="bind-libs-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575975" comment="bind-libs-32bit-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575976" comment="bind-utils-9.9.6P1-0.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218006" version="1" class="patch">
	<metadata>
		<title>Security update for bsdtar (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="920870" ref_url="https://bugzilla.suse.com/920870" source="BUGZILLA"/>
		<reference ref_id="984990" ref_url="https://bugzilla.suse.com/984990" source="BUGZILLA"/>
		<reference ref_id="985609" ref_url="https://bugzilla.suse.com/985609" source="BUGZILLA"/>
		<reference ref_id="985669" ref_url="https://bugzilla.suse.com/985669" source="BUGZILLA"/>
		<reference ref_id="985675" ref_url="https://bugzilla.suse.com/985675" source="BUGZILLA"/>
		<reference ref_id="985682" ref_url="https://bugzilla.suse.com/985682" source="BUGZILLA"/>
		<reference ref_id="985698" ref_url="https://bugzilla.suse.com/985698" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2304" ref_url="https://www.suse.com/security/cve/CVE-2015-2304/" source="CVE"/>
		<reference ref_id="CVE-2015-8918" ref_url="https://www.suse.com/security/cve/CVE-2015-8918/" source="CVE"/>
		<reference ref_id="CVE-2015-8920" ref_url="https://www.suse.com/security/cve/CVE-2015-8920/" source="CVE"/>
		<reference ref_id="CVE-2015-8921" ref_url="https://www.suse.com/security/cve/CVE-2015-8921/" source="CVE"/>
		<reference ref_id="CVE-2015-8924" ref_url="https://www.suse.com/security/cve/CVE-2015-8924/" source="CVE"/>
		<reference ref_id="CVE-2015-8929" ref_url="https://www.suse.com/security/cve/CVE-2015-8929/" source="CVE"/>
		<reference ref_id="CVE-2016-4809" ref_url="https://www.suse.com/security/cve/CVE-2016-4809/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002172.html" source="SUSE-SU"/>
		<description>
bsdtar was updated to fix seven security issues.

These security issues were fixed:
- CVE-2015-8929: Memory leak in tar parser (bsc#985669).
- CVE-2016-4809: Memory allocate error with symbolic links in cpio archives (bsc#984990).
- CVE-2015-8920: Stack out of bounds read in ar parser (bsc#985675).
- CVE-2015-8921: Global out of bounds read in mtree parser (bsc#985682).
- CVE-2015-8924: Heap buffer read overflow in tar (bsc#985609).
- CVE-2015-8918: Overlapping memcpy in CAB parser (bsc#985698).
- CVE-2015-2304: Reject absolute paths in input mode of bsdcpio exactly when '..' is rejected (bsc#920870).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-02"/>
	<updated date="2016-08-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/920870">SUSE bug 920870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984990">SUSE bug 984990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985609">SUSE bug 985609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985669">SUSE bug 985669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985675">SUSE bug 985675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985682">SUSE bug 985682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985698">SUSE bug 985698</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2304/">CVE-2015-2304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2304">CVE-2015-2304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8918/">CVE-2015-8918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8918">CVE-2015-8918 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8920/">CVE-2015-8920 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8920">CVE-2015-8920 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8921/">CVE-2015-8921 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8921">CVE-2015-8921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8924/">CVE-2015-8924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8924">CVE-2015-8924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8929/">CVE-2015-8929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8929">CVE-2015-8929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4809/">CVE-2016-4809 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4809">CVE-2016-4809 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575977" comment="libarchive2-2.5.5-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218007" version="1" class="patch">
	<metadata>
		<title>Security update for Mono</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="769799" ref_url="https://bugzilla.suse.com/769799" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3382" ref_url="https://www.suse.com/security/cve/CVE-2012-3382/" source="CVE"/>
		<description>

Mono was updated to fix a cross site scripting attack in the System.Web 
class 'forbidden extensions' filtering has been fixed. (CVE-2012-3382)

Security Issue reference:

    * CVE-2012-3382
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3382&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-13"/>
	<updated date="2012-07-13"/>
	<bugzilla href="https://bugzilla.suse.com/769799">SUSE bug 769799</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3382/">CVE-2012-3382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3382">CVE-2012-3382 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575978" comment="mono-core-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575979" comment="mono-data-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575980" comment="mono-data-postgresql-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575981" comment="mono-data-sqlite-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575982" comment="mono-locale-extras-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575983" comment="mono-nunit-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575984" comment="mono-web-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575985" comment="mono-winforms-2.6.7-0.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575978" comment="mono-core-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575979" comment="mono-data-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575980" comment="mono-data-postgresql-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575981" comment="mono-data-sqlite-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575982" comment="mono-locale-extras-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575983" comment="mono-nunit-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575984" comment="mono-web-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575985" comment="mono-winforms-2.6.7-0.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218008" version="1" class="patch">
	<metadata>
		<title>Security update for Samba</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="437293" ref_url="https://bugzilla.suse.com/437293" source="BUGZILLA"/>
		<reference ref_id="726937" ref_url="https://bugzilla.suse.com/726937" source="BUGZILLA"/>
		<reference ref_id="765270" ref_url="https://bugzilla.suse.com/765270" source="BUGZILLA"/>
		<reference ref_id="769957" ref_url="https://bugzilla.suse.com/769957" source="BUGZILLA"/>
		<reference ref_id="770056" ref_url="https://bugzilla.suse.com/770056" source="BUGZILLA"/>
		<reference ref_id="770262" ref_url="https://bugzilla.suse.com/770262" source="BUGZILLA"/>
		<reference ref_id="771516" ref_url="https://bugzilla.suse.com/771516" source="BUGZILLA"/>
		<reference ref_id="779269" ref_url="https://bugzilla.suse.com/779269" source="BUGZILLA"/>
		<reference ref_id="783384" ref_url="https://bugzilla.suse.com/783384" source="BUGZILLA"/>
		<reference ref_id="783719" ref_url="https://bugzilla.suse.com/783719" source="BUGZILLA"/>
		<reference ref_id="786350" ref_url="https://bugzilla.suse.com/786350" source="BUGZILLA"/>
		<reference ref_id="786677" ref_url="https://bugzilla.suse.com/786677" source="BUGZILLA"/>
		<reference ref_id="787983" ref_url="https://bugzilla.suse.com/787983" source="BUGZILLA"/>
		<reference ref_id="788159" ref_url="https://bugzilla.suse.com/788159" source="BUGZILLA"/>
		<reference ref_id="790741" ref_url="https://bugzilla.suse.com/790741" source="BUGZILLA"/>
		<reference ref_id="791183" ref_url="https://bugzilla.suse.com/791183" source="BUGZILLA"/>
		<reference ref_id="792294" ref_url="https://bugzilla.suse.com/792294" source="BUGZILLA"/>
		<reference ref_id="792340" ref_url="https://bugzilla.suse.com/792340" source="BUGZILLA"/>
		<reference ref_id="798856" ref_url="https://bugzilla.suse.com/798856" source="BUGZILLA"/>
		<reference ref_id="799641" ref_url="https://bugzilla.suse.com/799641" source="BUGZILLA"/>
		<reference ref_id="800782" ref_url="https://bugzilla.suse.com/800782" source="BUGZILLA"/>
		<reference ref_id="800982" ref_url="https://bugzilla.suse.com/800982" source="BUGZILLA"/>
		<reference ref_id="802031" ref_url="https://bugzilla.suse.com/802031" source="BUGZILLA"/>
		<reference ref_id="806501" ref_url="https://bugzilla.suse.com/806501" source="BUGZILLA"/>
		<reference ref_id="807334" ref_url="https://bugzilla.suse.com/807334" source="BUGZILLA"/>
		<reference ref_id="812929" ref_url="https://bugzilla.suse.com/812929" source="BUGZILLA"/>
		<reference ref_id="815994" ref_url="https://bugzilla.suse.com/815994" source="BUGZILLA"/>
		<reference ref_id="817880" ref_url="https://bugzilla.suse.com/817880" source="BUGZILLA"/>
		<reference ref_id="820531" ref_url="https://bugzilla.suse.com/820531" source="BUGZILLA"/>
		<reference ref_id="824833" ref_url="https://bugzilla.suse.com/824833" source="BUGZILLA"/>
		<reference ref_id="829969" ref_url="https://bugzilla.suse.com/829969" source="BUGZILLA"/>
		<reference ref_id="838472" ref_url="https://bugzilla.suse.com/838472" source="BUGZILLA"/>
		<reference ref_id="844307" ref_url="https://bugzilla.suse.com/844307" source="BUGZILLA"/>
		<reference ref_id="844720" ref_url="https://bugzilla.suse.com/844720" source="BUGZILLA"/>
		<reference ref_id="848101" ref_url="https://bugzilla.suse.com/848101" source="BUGZILLA"/>
		<reference ref_id="849224" ref_url="https://bugzilla.suse.com/849224" source="BUGZILLA"/>
		<reference ref_id="849226" ref_url="https://bugzilla.suse.com/849226" source="BUGZILLA"/>
		<reference ref_id="853021" ref_url="https://bugzilla.suse.com/853021" source="BUGZILLA"/>
		<reference ref_id="853347" ref_url="https://bugzilla.suse.com/853347" source="BUGZILLA"/>
		<reference ref_id="854520" ref_url="https://bugzilla.suse.com/854520" source="BUGZILLA"/>
		<reference ref_id="863748" ref_url="https://bugzilla.suse.com/863748" source="BUGZILLA"/>
		<reference ref_id="865561" ref_url="https://bugzilla.suse.com/865561" source="BUGZILLA"/>
		<reference ref_id="872396" ref_url="https://bugzilla.suse.com/872396" source="BUGZILLA"/>
		<reference ref_id="872912" ref_url="https://bugzilla.suse.com/872912" source="BUGZILLA"/>
		<reference ref_id="879390" ref_url="https://bugzilla.suse.com/879390" source="BUGZILLA"/>
		<reference ref_id="880962" ref_url="https://bugzilla.suse.com/880962" source="BUGZILLA"/>
		<reference ref_id="882356" ref_url="https://bugzilla.suse.com/882356" source="BUGZILLA"/>
		<reference ref_id="883758" ref_url="https://bugzilla.suse.com/883758" source="BUGZILLA"/>
		<reference ref_id="883870" ref_url="https://bugzilla.suse.com/883870" source="BUGZILLA"/>
		<reference ref_id="886193" ref_url="https://bugzilla.suse.com/886193" source="BUGZILLA"/>
		<reference ref_id="898031" ref_url="https://bugzilla.suse.com/898031" source="BUGZILLA"/>
		<reference ref_id="899558" ref_url="https://bugzilla.suse.com/899558" source="BUGZILLA"/>
		<reference ref_id="913001" ref_url="https://bugzilla.suse.com/913001" source="BUGZILLA"/>
		<reference ref_id="917376" ref_url="https://bugzilla.suse.com/917376" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6150" ref_url="https://www.suse.com/security/cve/CVE-2012-6150/" source="CVE"/>
		<reference ref_id="CVE-2013-0213" ref_url="https://www.suse.com/security/cve/CVE-2013-0213/" source="CVE"/>
		<reference ref_id="CVE-2013-0214" ref_url="https://www.suse.com/security/cve/CVE-2013-0214/" source="CVE"/>
		<reference ref_id="CVE-2013-4124" ref_url="https://www.suse.com/security/cve/CVE-2013-4124/" source="CVE"/>
		<reference ref_id="CVE-2013-4408" ref_url="https://www.suse.com/security/cve/CVE-2013-4408/" source="CVE"/>
		<reference ref_id="CVE-2013-4475" ref_url="https://www.suse.com/security/cve/CVE-2013-4475/" source="CVE"/>
		<reference ref_id="CVE-2013-4496" ref_url="https://www.suse.com/security/cve/CVE-2013-4496/" source="CVE"/>
		<reference ref_id="CVE-2014-0178" ref_url="https://www.suse.com/security/cve/CVE-2014-0178/" source="CVE"/>
		<reference ref_id="CVE-2014-0244" ref_url="https://www.suse.com/security/cve/CVE-2014-0244/" source="CVE"/>
		<reference ref_id="CVE-2014-3493" ref_url="https://www.suse.com/security/cve/CVE-2014-3493/" source="CVE"/>
		<reference ref_id="CVE-2015-0240" ref_url="https://www.suse.com/security/cve/CVE-2015-0240/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001256.html" source="SUSE-SU"/>
		<description>

This update fixes the following security issues with Samba:

    * bnc#844720: DCERPC frag_len not checked (CVE-2013-4408)
    * bnc#853347: winbind pam security problem (CVE-2012-6150)
    * bnc#848101: No access check verification on stream files
      (CVE-2013-4475)

And fixes the following non-security issues:

    * bnc#853021: libsmbclient0 package description contains comments
    * bnc#817880: rpcclient adddriver and setdrive do not set all needed
      registry entries
    * bnc#838472: Client trying to delete print job fails: Samba returns:
      WERR_INVALID_PRINTER_NAME
    * bnc#854520 and bnc#849226: various upstream fixes

Security Issue references:

    * CVE-2012-6150
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6150&gt;
    * CVE-2013-4408
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408&gt;
    * CVE-2013-4475
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-13"/>
	<updated date="2013-12-13"/>
	<bugzilla href="https://bugzilla.suse.com/437293">SUSE bug 437293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/726937">SUSE bug 726937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/765270">SUSE bug 765270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769957">SUSE bug 769957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770056">SUSE bug 770056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770262">SUSE bug 770262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/771516">SUSE bug 771516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779269">SUSE bug 779269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/783384">SUSE bug 783384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/783719">SUSE bug 783719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786350">SUSE bug 786350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786677">SUSE bug 786677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787983">SUSE bug 787983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788159">SUSE bug 788159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/790741">SUSE bug 790741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791183">SUSE bug 791183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792294">SUSE bug 792294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792340">SUSE bug 792340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798856">SUSE bug 798856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799641">SUSE bug 799641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800782">SUSE bug 800782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800982">SUSE bug 800982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802031">SUSE bug 802031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806501">SUSE bug 806501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807334">SUSE bug 807334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/812929">SUSE bug 812929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815994">SUSE bug 815994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817880">SUSE bug 817880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820531">SUSE bug 820531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824833">SUSE bug 824833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829969">SUSE bug 829969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/838472">SUSE bug 838472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844307">SUSE bug 844307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844720">SUSE bug 844720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848101">SUSE bug 848101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849224">SUSE bug 849224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849226">SUSE bug 849226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853021">SUSE bug 853021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853347">SUSE bug 853347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854520">SUSE bug 854520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863748">SUSE bug 863748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865561">SUSE bug 865561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/872396">SUSE bug 872396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/872912">SUSE bug 872912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879390">SUSE bug 879390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880962">SUSE bug 880962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882356">SUSE bug 882356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883758">SUSE bug 883758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883870">SUSE bug 883870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886193">SUSE bug 886193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898031">SUSE bug 898031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899558">SUSE bug 899558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913001">SUSE bug 913001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917376">SUSE bug 917376</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6150/">CVE-2012-6150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6150">CVE-2012-6150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0213/">CVE-2013-0213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0213">CVE-2013-0213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0214/">CVE-2013-0214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0214">CVE-2013-0214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4124/">CVE-2013-4124 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4124">CVE-2013-4124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4408/">CVE-2013-4408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4408">CVE-2013-4408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4475/">CVE-2013-4475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4475">CVE-2013-4475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4496/">CVE-2013-4496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4496">CVE-2013-4496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0178/">CVE-2014-0178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0178">CVE-2014-0178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0244/">CVE-2014-0244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0244">CVE-2014-0244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3493/">CVE-2014-3493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3493">CVE-2014-3493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0240/">CVE-2015-0240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0240">CVE-2015-0240 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575986" comment="ldapsmb-1.34b-12.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575987" comment="libldb1-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575988" comment="libsmbclient0-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575989" comment="libsmbclient0-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575990" comment="libsmbclient0-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575991" comment="libtalloc1-3.4.3-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575992" comment="libtalloc1-32bit-3.4.3-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575993" comment="libtalloc1-x86-3.4.3-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575994" comment="libtalloc2-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575995" comment="libtalloc2-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575996" comment="libtalloc2-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575997" comment="libtdb1-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575998" comment="libtdb1-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575999" comment="libtdb1-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576000" comment="libtevent0-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576001" comment="libtevent0-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576002" comment="libwbclient0-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576003" comment="libwbclient0-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576004" comment="libwbclient0-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576005" comment="samba-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576006" comment="samba-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576007" comment="samba-client-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576008" comment="samba-client-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576009" comment="samba-client-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565895" comment="samba-doc-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576010" comment="samba-krb-printing-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576011" comment="samba-winbind-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576012" comment="samba-winbind-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576013" comment="samba-winbind-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576014" comment="samba-x86-3.6.3-0.33.39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575986" comment="ldapsmb-1.34b-12.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575987" comment="libldb1-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575988" comment="libsmbclient0-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575989" comment="libsmbclient0-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575990" comment="libsmbclient0-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575991" comment="libtalloc1-3.4.3-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575992" comment="libtalloc1-32bit-3.4.3-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575993" comment="libtalloc1-x86-3.4.3-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575994" comment="libtalloc2-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575995" comment="libtalloc2-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575996" comment="libtalloc2-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575997" comment="libtdb1-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575998" comment="libtdb1-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575999" comment="libtdb1-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576000" comment="libtevent0-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576001" comment="libtevent0-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576002" comment="libwbclient0-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576003" comment="libwbclient0-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576004" comment="libwbclient0-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576005" comment="samba-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576006" comment="samba-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576007" comment="samba-client-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576008" comment="samba-client-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576009" comment="samba-client-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565895" comment="samba-doc-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576010" comment="samba-krb-printing-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576011" comment="samba-winbind-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576012" comment="samba-winbind-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576013" comment="samba-winbind-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576014" comment="samba-x86-3.6.3-0.33.39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575986" comment="ldapsmb-1.34b-12.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575987" comment="libldb1-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575988" comment="libsmbclient0-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575989" comment="libsmbclient0-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575990" comment="libsmbclient0-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575991" comment="libtalloc1-3.4.3-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575992" comment="libtalloc1-32bit-3.4.3-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575993" comment="libtalloc1-x86-3.4.3-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575994" comment="libtalloc2-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575995" comment="libtalloc2-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575996" comment="libtalloc2-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575997" comment="libtdb1-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575998" comment="libtdb1-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575999" comment="libtdb1-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576000" comment="libtevent0-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576001" comment="libtevent0-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576002" comment="libwbclient0-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576003" comment="libwbclient0-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576004" comment="libwbclient0-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576005" comment="samba-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576006" comment="samba-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576007" comment="samba-client-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576008" comment="samba-client-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576009" comment="samba-client-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565895" comment="samba-doc-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576010" comment="samba-krb-printing-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576011" comment="samba-winbind-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576012" comment="samba-winbind-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576013" comment="samba-winbind-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576014" comment="samba-x86-3.6.3-0.33.39.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218009" version="1" class="patch">
	<metadata>
		<title>Recommended update for cifs-utils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="747906" ref_url="https://bugzilla.suse.com/747906" source="BUGZILLA"/>
		<reference ref_id="754443" ref_url="https://bugzilla.suse.com/754443" source="BUGZILLA"/>
		<reference ref_id="761150" ref_url="https://bugzilla.suse.com/761150" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-1586" ref_url="https://www.suse.com/security/cve/CVE-2012-1586/" source="CVE"/>
		<description>

This update to cifs-utils fixes the package's post installation scripts to 
correctly restart the CIFS client during an update.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-09-06"/>
	<updated date="2012-09-06"/>
	<bugzilla href="https://bugzilla.suse.com/747906">SUSE bug 747906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754443">SUSE bug 754443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761150">SUSE bug 761150</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1586/">CVE-2012-1586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1586">CVE-2012-1586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992503" comment="cifs-utils-5.1-0.11.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992503" comment="cifs-utils-5.1-0.11.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218010" version="1" class="patch">
	<metadata>
		<title>Security update for clamav</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="780181" ref_url="https://bugzilla.suse.com/780181" source="BUGZILLA"/>
		<reference ref_id="809945" ref_url="https://bugzilla.suse.com/809945" source="BUGZILLA"/>
		<reference ref_id="816865" ref_url="https://bugzilla.suse.com/816865" source="BUGZILLA"/>
		<reference ref_id="899395" ref_url="https://bugzilla.suse.com/899395" source="BUGZILLA"/>
		<reference ref_id="903489" ref_url="https://bugzilla.suse.com/903489" source="BUGZILLA"/>
		<reference ref_id="903719" ref_url="https://bugzilla.suse.com/903719" source="BUGZILLA"/>
		<reference ref_id="904207" ref_url="https://bugzilla.suse.com/904207" source="BUGZILLA"/>
		<reference ref_id="906077" ref_url="https://bugzilla.suse.com/906077" source="BUGZILLA"/>
		<reference ref_id="906770" ref_url="https://bugzilla.suse.com/906770" source="BUGZILLA"/>
		<reference ref_id="915512" ref_url="https://bugzilla.suse.com/915512" source="BUGZILLA"/>
		<reference ref_id="916214" ref_url="https://bugzilla.suse.com/916214" source="BUGZILLA"/>
		<reference ref_id="916215" ref_url="https://bugzilla.suse.com/916215" source="BUGZILLA"/>
		<reference ref_id="916217" ref_url="https://bugzilla.suse.com/916217" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2020" ref_url="https://www.suse.com/security/cve/CVE-2013-2020/" source="CVE"/>
		<reference ref_id="CVE-2013-2021" ref_url="https://www.suse.com/security/cve/CVE-2013-2021/" source="CVE"/>
		<reference ref_id="CVE-2013-6497" ref_url="https://www.suse.com/security/cve/CVE-2013-6497/" source="CVE"/>
		<reference ref_id="CVE-2014-9050" ref_url="https://www.suse.com/security/cve/CVE-2014-9050/" source="CVE"/>
		<reference ref_id="CVE-2014-9328" ref_url="https://www.suse.com/security/cve/CVE-2014-9328/" source="CVE"/>
		<reference ref_id="CVE-2015-1461" ref_url="https://www.suse.com/security/cve/CVE-2015-1461/" source="CVE"/>
		<reference ref_id="CVE-2015-1462" ref_url="https://www.suse.com/security/cve/CVE-2015-1462/" source="CVE"/>
		<reference ref_id="CVE-2015-1463" ref_url="https://www.suse.com/security/cve/CVE-2015-1463/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001230.html" source="SUSE-SU"/>
		<description>

This update contains clamav 0.97.8 which fixes security issues 
(bnc#816865):

    * CVE-2013-2020: Fix heap corruption
    * CVE-2013-2021: Fix overflow due to PDF key length computation.

Security Issue references:

    * CVE-2013-2020
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2020&gt;
    * CVE-2013-2021
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2021&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-04"/>
	<updated date="2013-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/780181">SUSE bug 780181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809945">SUSE bug 809945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816865">SUSE bug 816865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899395">SUSE bug 899395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903489">SUSE bug 903489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903719">SUSE bug 903719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904207">SUSE bug 904207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906077">SUSE bug 906077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906770">SUSE bug 906770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915512">SUSE bug 915512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916214">SUSE bug 916214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916215">SUSE bug 916215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916217">SUSE bug 916217</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2020/">CVE-2013-2020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2020">CVE-2013-2020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2021/">CVE-2013-2021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2021">CVE-2013-2021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6497/">CVE-2013-6497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6497">CVE-2013-6497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9050/">CVE-2014-9050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9050">CVE-2014-9050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9328/">CVE-2014-9328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9328">CVE-2014-9328 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1461/">CVE-2015-1461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1461">CVE-2015-1461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1462/">CVE-2015-1462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1462">CVE-2015-1462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1463/">CVE-2015-1463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1463">CVE-2015-1463 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576015" comment="clamav-0.97.8-0.2.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576015" comment="clamav-0.97.8-0.2.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576015" comment="clamav-0.97.8-0.2.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218011" version="1" class="patch">
	<metadata>
		<title>Security update for coreutils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="697897" ref_url="https://bugzilla.suse.com/697897" source="BUGZILLA"/>
		<reference ref_id="752943" ref_url="https://bugzilla.suse.com/752943" source="BUGZILLA"/>
		<reference ref_id="754559" ref_url="https://bugzilla.suse.com/754559" source="BUGZILLA"/>
		<reference ref_id="763536" ref_url="https://bugzilla.suse.com/763536" source="BUGZILLA"/>
		<reference ref_id="796243" ref_url="https://bugzilla.suse.com/796243" source="BUGZILLA"/>
		<reference ref_id="798538" ref_url="https://bugzilla.suse.com/798538" source="BUGZILLA"/>
		<reference ref_id="798541" ref_url="https://bugzilla.suse.com/798541" source="BUGZILLA"/>
		<reference ref_id="800908" ref_url="https://bugzilla.suse.com/800908" source="BUGZILLA"/>
		<reference ref_id="808907" ref_url="https://bugzilla.suse.com/808907" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0221" ref_url="https://www.suse.com/security/cve/CVE-2013-0221/" source="CVE"/>
		<reference ref_id="CVE-2013-0222" ref_url="https://www.suse.com/security/cve/CVE-2013-0222/" source="CVE"/>
		<reference ref_id="CVE-2013-0223" ref_url="https://www.suse.com/security/cve/CVE-2013-0223/" source="CVE"/>
		<description>

This coreutils update fixes three minor security issues.

    * #798538 - VUL-1: CVE-2013-0221: segmentation fault in 'sort -d' and
      'sort -M' with long line input
    * #796243 - VUL-1: CVE-2013-0222: segmentation fault in 'uniq' with
      long line input
    * #798541 - VUL-1: CVE-2013-0223: segmentation fault in 'join -i' with
      long line input

Security Issue references:

    * CVE-2013-0221
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0221&gt;
    * CVE-2013-0222
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0222&gt;
    * CVE-2013-0223
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0223&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-17"/>
	<updated date="2013-09-17"/>
	<bugzilla href="https://bugzilla.suse.com/697897">SUSE bug 697897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752943">SUSE bug 752943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754559">SUSE bug 754559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763536">SUSE bug 763536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796243">SUSE bug 796243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798538">SUSE bug 798538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798541">SUSE bug 798541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800908">SUSE bug 800908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808907">SUSE bug 808907</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0221/">CVE-2013-0221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0221">CVE-2013-0221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0222/">CVE-2013-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0222">CVE-2013-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0223/">CVE-2013-0223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0223">CVE-2013-0223 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576016" comment="coreutils-8.12-6.25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576017" comment="coreutils-lang-8.12-6.25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576018" comment="coreutils-x86-8.12-6.25.29.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576016" comment="coreutils-8.12-6.25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576017" comment="coreutils-lang-8.12-6.25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576018" comment="coreutils-x86-8.12-6.25.29.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218012" version="1" class="patch">
	<metadata>
		<title>Security update for CUPS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="789566" ref_url="https://bugzilla.suse.com/789566" source="BUGZILLA"/>
		<reference ref_id="802408" ref_url="https://bugzilla.suse.com/802408" source="BUGZILLA"/>
		<reference ref_id="827109" ref_url="https://bugzilla.suse.com/827109" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5519" ref_url="https://www.suse.com/security/cve/CVE-2012-5519/" source="CVE"/>
		<description>

The following security issue has been fixed in the CUPS print daemon 
CVE-2012-5519:

The patch adds better default protection against misuse of privileges by 
normal users who have been specifically allowed by root to do cupsd 
configuration changes

The new ConfigurationChangeRestriction cupsd.conf directive specifies the 
level of restriction for cupsd.conf changes that happen via HTTP/IPP 
requests to the running cupsd (e.g. via CUPS web interface or via the 
cupsctl command).

By default certain cupsd.conf directives that deal with filenames, paths, 
and users can no longer be changed via requests to the running cupsd but 
only by manual editing the cupsd.conf file and its default file permissions 
permit only root to write the cupsd.conf file.

Those directives are: ConfigurationChangeRestriction, AccessLog, 
BrowseLDAPCACertFile, CacheDir, ConfigFilePerm, DataDir, DocumentRoot, 
ErrorLog, FileDevice, FontPath, Group, LogFilePerm, PageLog, Printcap, 
PrintcapFormat, PrintcapGUI, RemoteRoot, RequestRoot, ServerBin, 
ServerCertificate, ServerKey, ServerRoot, StateDir, SystemGroup, 
SystemGroupAuthKey, TempDir, User.

The default group of users who are allowed to do cupsd configuration 
changes
via requests to the running cupsd (i.e. the SystemGroup directive in 
cupsd.conf) is set to 'root' only.

Additionally the following bug has been fixed:

    * strip trailing '@REALM' from username for Kerberos authentication
      (CUPS STR#3972 bnc#827109)

Security Issue reference:

    * CVE-2012-5519
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5519&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-17"/>
	<updated date="2013-10-17"/>
	<bugzilla href="https://bugzilla.suse.com/789566">SUSE bug 789566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802408">SUSE bug 802408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827109">SUSE bug 827109</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5519/">CVE-2012-5519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5519">CVE-2012-5519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576019" comment="cups-1.3.9-8.46.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576020" comment="cups-client-1.3.9-8.46.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576021" comment="cups-libs-1.3.9-8.46.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576022" comment="cups-libs-32bit-1.3.9-8.46.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576023" comment="cups-libs-x86-1.3.9-8.46.48.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576019" comment="cups-1.3.9-8.46.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576020" comment="cups-client-1.3.9-8.46.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576021" comment="cups-libs-1.3.9-8.46.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576022" comment="cups-libs-32bit-1.3.9-8.46.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576023" comment="cups-libs-x86-1.3.9-8.46.48.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218013" version="1" class="patch">
	<metadata>
		<title>Security update for curl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="765342" ref_url="https://bugzilla.suse.com/765342" source="BUGZILLA"/>
		<reference ref_id="769247" ref_url="https://bugzilla.suse.com/769247" source="BUGZILLA"/>
		<reference ref_id="810760" ref_url="https://bugzilla.suse.com/810760" source="BUGZILLA"/>
		<reference ref_id="814655" ref_url="https://bugzilla.suse.com/814655" source="BUGZILLA"/>
		<reference ref_id="824517" ref_url="https://bugzilla.suse.com/824517" source="BUGZILLA"/>
		<reference ref_id="849596" ref_url="https://bugzilla.suse.com/849596" source="BUGZILLA"/>
		<reference ref_id="858673" ref_url="https://bugzilla.suse.com/858673" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1944" ref_url="https://www.suse.com/security/cve/CVE-2013-1944/" source="CVE"/>
		<reference ref_id="CVE-2013-2174" ref_url="https://www.suse.com/security/cve/CVE-2013-2174/" source="CVE"/>
		<reference ref_id="CVE-2013-4545" ref_url="https://www.suse.com/security/cve/CVE-2013-4545/" source="CVE"/>
		<reference ref_id="CVE-2014-0015" ref_url="https://www.suse.com/security/cve/CVE-2014-0015/" source="CVE"/>
		<description>

This update fixes the re-use of wrong HTTP NTLM connections in libcurl. 
(CVE-2014-0015)

Security Issue reference:

    * CVE-2014-0015
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-18"/>
	<updated date="2014-01-18"/>
	<bugzilla href="https://bugzilla.suse.com/765342">SUSE bug 765342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769247">SUSE bug 769247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/810760">SUSE bug 810760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814655">SUSE bug 814655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824517">SUSE bug 824517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849596">SUSE bug 849596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858673">SUSE bug 858673</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1944/">CVE-2013-1944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1944">CVE-2013-1944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2174/">CVE-2013-2174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2174">CVE-2013-2174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4545/">CVE-2013-4545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4545">CVE-2013-4545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0015/">CVE-2014-0015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0015">CVE-2014-0015 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576024" comment="curl-7.19.7-1.20.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576025" comment="libcurl4-7.19.7-1.20.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576026" comment="libcurl4-32bit-7.19.7-1.20.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576027" comment="libcurl4-x86-7.19.7-1.20.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576024" comment="curl-7.19.7-1.20.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576025" comment="libcurl4-7.19.7-1.20.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576026" comment="libcurl4-32bit-7.19.7-1.20.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576027" comment="libcurl4-x86-7.19.7-1.20.31.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218014" version="1" class="patch">
	<metadata>
		<title>Recommended update for dbus</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="697105" ref_url="https://bugzilla.suse.com/697105" source="BUGZILLA"/>
		<reference ref_id="764047" ref_url="https://bugzilla.suse.com/764047" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3524" ref_url="https://www.suse.com/security/cve/CVE-2012-3524/" source="CVE"/>
		<description>

This update fixes a regression in the previous security update that caused 
dbus-daemon-launch-helper to stop working (bnc#697105).

		</description>
<advisory from="security@suse.de">
	<issued date="2012-10-15"/>
	<updated date="2012-10-15"/>
	<bugzilla href="https://bugzilla.suse.com/697105">SUSE bug 697105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/764047">SUSE bug 764047</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3524/">CVE-2012-3524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3524">CVE-2012-3524 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992504" comment="dbus-1-1.2.10-3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009588264" comment="dbus-1-32bit-1.2.10-3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009588265" comment="dbus-1-x11-1.2.10-3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589999" comment="dbus-1-x86-1.2.10-3.27.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992504" comment="dbus-1-1.2.10-3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009588264" comment="dbus-1-32bit-1.2.10-3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009588265" comment="dbus-1-x11-1.2.10-3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589999" comment="dbus-1-x86-1.2.10-3.27.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218015" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="762108" ref_url="https://bugzilla.suse.com/762108" source="BUGZILLA"/>
		<reference ref_id="767661" ref_url="https://bugzilla.suse.com/767661" source="BUGZILLA"/>
		<reference ref_id="770236" ref_url="https://bugzilla.suse.com/770236" source="BUGZILLA"/>
		<reference ref_id="772924" ref_url="https://bugzilla.suse.com/772924" source="BUGZILLA"/>
		<reference ref_id="780167" ref_url="https://bugzilla.suse.com/780167" source="BUGZILLA"/>
		<reference ref_id="783002" ref_url="https://bugzilla.suse.com/783002" source="BUGZILLA"/>
		<reference ref_id="784640" ref_url="https://bugzilla.suse.com/784640" source="BUGZILLA"/>
		<reference ref_id="788787" ref_url="https://bugzilla.suse.com/788787" source="BUGZILLA"/>
		<reference ref_id="791280" ref_url="https://bugzilla.suse.com/791280" source="BUGZILLA"/>
		<reference ref_id="791289" ref_url="https://bugzilla.suse.com/791289" source="BUGZILLA"/>
		<reference ref_id="794578" ref_url="https://bugzilla.suse.com/794578" source="BUGZILLA"/>
		<reference ref_id="811934" ref_url="https://bugzilla.suse.com/811934" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3570" ref_url="https://www.suse.com/security/cve/CVE-2012-3570/" source="CVE"/>
		<reference ref_id="CVE-2012-3571" ref_url="https://www.suse.com/security/cve/CVE-2012-3571/" source="CVE"/>
		<reference ref_id="CVE-2012-3954" ref_url="https://www.suse.com/security/cve/CVE-2012-3954/" source="CVE"/>
		<reference ref_id="CVE-2012-3955" ref_url="https://www.suse.com/security/cve/CVE-2012-3955/" source="CVE"/>
		<reference ref_id="CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266/" source="CVE"/>
		<description>

The ISC DHCP server had a denial of service issue in handling specific DDNS 
requests which could cause a out of memory usage situation. (CVE-2013-2266)

This update also adds a dhcp6-server service template for SuSEfirewall2 
(bnc#783002)

Security Issues:

    * CVE-2013-2266
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2266&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-27"/>
	<updated date="2013-03-27"/>
	<bugzilla href="https://bugzilla.suse.com/762108">SUSE bug 762108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767661">SUSE bug 767661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770236">SUSE bug 770236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772924">SUSE bug 772924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780167">SUSE bug 780167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/783002">SUSE bug 783002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784640">SUSE bug 784640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788787">SUSE bug 788787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791280">SUSE bug 791280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791289">SUSE bug 791289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/794578">SUSE bug 794578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/811934">SUSE bug 811934</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3570/">CVE-2012-3570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3570">CVE-2012-3570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3571/">CVE-2012-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3571">CVE-2012-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3954/">CVE-2012-3954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3954">CVE-2012-3954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3955/">CVE-2012-3955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3955">CVE-2012-3955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2266">CVE-2013-2266 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576028" comment="dhcp-4.2.4.P2-0.11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576029" comment="dhcp-client-4.2.4.P2-0.11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576030" comment="dhcp-relay-4.2.4.P2-0.11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576031" comment="dhcp-server-4.2.4.P2-0.11.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576028" comment="dhcp-4.2.4.P2-0.11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576029" comment="dhcp-client-4.2.4.P2-0.11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576030" comment="dhcp-relay-4.2.4.P2-0.11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576031" comment="dhcp-server-4.2.4.P2-0.11.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218016" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="969820" ref_url="https://bugzilla.suse.com/969820" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2774" ref_url="https://www.suse.com/security/cve/CVE-2016-2774/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002148.html" source="SUSE-SU"/>
		<description>

This update for dhcp fixes the following issues:

- CVE-2016-2774: Fixed a denial of service attack against the DHCP server over the OMAPI TCP socket, which could be used
  by network adjacent attackers to make the DHCP server non-functional (bsc#969820).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-05"/>
	<updated date="2016-07-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/969820">SUSE bug 969820</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2774/">CVE-2016-2774 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2774">CVE-2016-2774 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576032" comment="dhcp-4.2.4.P2-0.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576033" comment="dhcp-client-4.2.4.P2-0.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576034" comment="dhcp-relay-4.2.4.P2-0.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576035" comment="dhcp-server-4.2.4.P2-0.11.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218017" version="1" class="patch">
	<metadata>
		<title>Security update for dhcpcd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="955762" ref_url="https://bugzilla.suse.com/955762" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6698" ref_url="https://www.suse.com/security/cve/CVE-2012-6698/" source="CVE"/>
		<reference ref_id="CVE-2012-6699" ref_url="https://www.suse.com/security/cve/CVE-2012-6699/" source="CVE"/>
		<reference ref_id="CVE-2012-6700" ref_url="https://www.suse.com/security/cve/CVE-2012-6700/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001711.html" source="SUSE-SU"/>
		<description>
dhcpcd was updated to fix three security issues.

These security issues were fixed:
- CVE-2012-6698: A potential out of bounds write was fixed, which could lead to memory corruption, triggerable by network local attackers.
- CVE-2012-6699: A loop error was fixed that could lead out of bound reads, triggerable by network local attackers.
- CVE-2012-6700: An incorrect free could lead to crashes, triggerable by network local attackers.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/955762">SUSE bug 955762</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6698/">CVE-2012-6698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6698">CVE-2012-6698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6699/">CVE-2012-6699 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6699">CVE-2012-6699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6700/">CVE-2012-6700 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6700">CVE-2012-6700 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576036" comment="dhcpcd-3.2.3-45.5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218018" version="1" class="patch">
	<metadata>
		<title>Recommended update for evolution</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="713610" ref_url="https://bugzilla.suse.com/713610" source="BUGZILLA"/>
		<reference ref_id="714939" ref_url="https://bugzilla.suse.com/714939" source="BUGZILLA"/>
		<reference ref_id="736655" ref_url="https://bugzilla.suse.com/736655" source="BUGZILLA"/>
		<reference ref_id="749224" ref_url="https://bugzilla.suse.com/749224" source="BUGZILLA"/>
		<reference ref_id="754953" ref_url="https://bugzilla.suse.com/754953" source="BUGZILLA"/>
		<reference ref_id="759519" ref_url="https://bugzilla.suse.com/759519" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3201" ref_url="https://www.suse.com/security/cve/CVE-2011-3201/" source="CVE"/>
		<description>

This consolidated update for Evolution provides smart card support, patches 
for Change Password Feature, Out of Office Feature, Find Item Feature, Free 
Busy and Other stability patches.

In addition a low security issue has been fixed:

    * CVE-2011-3201: A malicious site can specify an attach= parameter to
      the URL, which can attach arbitrary files to a mail message.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-26"/>
	<updated date="2012-07-26"/>
	<bugzilla href="https://bugzilla.suse.com/713610">SUSE bug 713610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/714939">SUSE bug 714939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/736655">SUSE bug 736655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749224">SUSE bug 749224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754953">SUSE bug 754953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759519">SUSE bug 759519</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3201/">CVE-2011-3201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3201">CVE-2011-3201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009588870" comment="evolution-data-server-2.28.2-0.29.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009588871" comment="evolution-data-server-32bit-2.28.2-0.29.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009588872" comment="evolution-data-server-lang-2.28.2-0.29.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009588873" comment="evolution-data-server-x86-2.28.2-0.29.24 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009588870" comment="evolution-data-server-2.28.2-0.29.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009588871" comment="evolution-data-server-32bit-2.28.2-0.29.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009588872" comment="evolution-data-server-lang-2.28.2-0.29.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009588873" comment="evolution-data-server-x86-2.28.2-0.29.24 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218019" version="1" class="patch">
	<metadata>
		<title>Security update for fastjar</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="607043" ref_url="https://bugzilla.suse.com/607043" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0831" ref_url="https://www.suse.com/security/cve/CVE-2010-0831/" source="CVE"/>
		<description>

This fastjar update fixes a directory traversal issue (bnc#607043).

Security Issue reference:

    * CVE-2010-0831
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0831&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/607043">SUSE bug 607043</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0831/">CVE-2010-0831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0831">CVE-2010-0831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576037" comment="fastjar-0.95-1.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576037" comment="fastjar-0.95-1.24.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218020" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="777588" ref_url="https://bugzilla.suse.com/777588" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-1956" ref_url="https://www.suse.com/security/cve/CVE-2012-1956/" source="CVE"/>
		<reference ref_id="CVE-2012-1970" ref_url="https://www.suse.com/security/cve/CVE-2012-1970/" source="CVE"/>
		<reference ref_id="CVE-2012-1971" ref_url="https://www.suse.com/security/cve/CVE-2012-1971/" source="CVE"/>
		<reference ref_id="CVE-2012-1972" ref_url="https://www.suse.com/security/cve/CVE-2012-1972/" source="CVE"/>
		<reference ref_id="CVE-2012-1973" ref_url="https://www.suse.com/security/cve/CVE-2012-1973/" source="CVE"/>
		<reference ref_id="CVE-2012-1974" ref_url="https://www.suse.com/security/cve/CVE-2012-1974/" source="CVE"/>
		<reference ref_id="CVE-2012-1975" ref_url="https://www.suse.com/security/cve/CVE-2012-1975/" source="CVE"/>
		<reference ref_id="CVE-2012-1976" ref_url="https://www.suse.com/security/cve/CVE-2012-1976/" source="CVE"/>
		<reference ref_id="CVE-2012-3956" ref_url="https://www.suse.com/security/cve/CVE-2012-3956/" source="CVE"/>
		<reference ref_id="CVE-2012-3957" ref_url="https://www.suse.com/security/cve/CVE-2012-3957/" source="CVE"/>
		<reference ref_id="CVE-2012-3958" ref_url="https://www.suse.com/security/cve/CVE-2012-3958/" source="CVE"/>
		<reference ref_id="CVE-2012-3959" ref_url="https://www.suse.com/security/cve/CVE-2012-3959/" source="CVE"/>
		<reference ref_id="CVE-2012-3960" ref_url="https://www.suse.com/security/cve/CVE-2012-3960/" source="CVE"/>
		<reference ref_id="CVE-2012-3961" ref_url="https://www.suse.com/security/cve/CVE-2012-3961/" source="CVE"/>
		<reference ref_id="CVE-2012-3962" ref_url="https://www.suse.com/security/cve/CVE-2012-3962/" source="CVE"/>
		<reference ref_id="CVE-2012-3963" ref_url="https://www.suse.com/security/cve/CVE-2012-3963/" source="CVE"/>
		<reference ref_id="CVE-2012-3964" ref_url="https://www.suse.com/security/cve/CVE-2012-3964/" source="CVE"/>
		<reference ref_id="CVE-2012-3965" ref_url="https://www.suse.com/security/cve/CVE-2012-3965/" source="CVE"/>
		<reference ref_id="CVE-2012-3966" ref_url="https://www.suse.com/security/cve/CVE-2012-3966/" source="CVE"/>
		<reference ref_id="CVE-2012-3967" ref_url="https://www.suse.com/security/cve/CVE-2012-3967/" source="CVE"/>
		<reference ref_id="CVE-2012-3968" ref_url="https://www.suse.com/security/cve/CVE-2012-3968/" source="CVE"/>
		<reference ref_id="CVE-2012-3969" ref_url="https://www.suse.com/security/cve/CVE-2012-3969/" source="CVE"/>
		<reference ref_id="CVE-2012-3970" ref_url="https://www.suse.com/security/cve/CVE-2012-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-3971" ref_url="https://www.suse.com/security/cve/CVE-2012-3971/" source="CVE"/>
		<reference ref_id="CVE-2012-3972" ref_url="https://www.suse.com/security/cve/CVE-2012-3972/" source="CVE"/>
		<reference ref_id="CVE-2012-3973" ref_url="https://www.suse.com/security/cve/CVE-2012-3973/" source="CVE"/>
		<reference ref_id="CVE-2012-3974" ref_url="https://www.suse.com/security/cve/CVE-2012-3974/" source="CVE"/>
		<reference ref_id="CVE-2012-3975" ref_url="https://www.suse.com/security/cve/CVE-2012-3975/" source="CVE"/>
		<reference ref_id="CVE-2012-3976" ref_url="https://www.suse.com/security/cve/CVE-2012-3976/" source="CVE"/>
		<reference ref_id="CVE-2012-3978" ref_url="https://www.suse.com/security/cve/CVE-2012-3978/" source="CVE"/>
		<reference ref_id="CVE-2012-3979" ref_url="https://www.suse.com/security/cve/CVE-2012-3979/" source="CVE"/>
		<reference ref_id="CVE-2012-3980" ref_url="https://www.suse.com/security/cve/CVE-2012-3980/" source="CVE"/>
		<description>

MozillaFirefox was updated to 10.0.7ESR release, fixing a lot of bugs and 
security problems.

The following security issues have been addressed:

    * 

      MFSA 2012-57: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      CVE-2012-1971: Gary Kwong, Christian Holler, Jesse Ruderman, Steve
      Fink, Bob Clary, Andrew Sutherland, and Jason Smith reported memory
      safety problems and crashes that affect Firefox 14.

    * 

      CVE-2012-1970: Gary Kwong, Christian Holler, Jesse Ruderman, John
      Schoenick, Vladimir Vukicevic and Daniel Holbert reported memory
      safety problems and crashes that affect Firefox ESR 10 and Firefox
      14.

    * 

      MFSA 2012-58: Security researcher Abhishek Arya (Inferno) of Google
      Chrome Security Team discovered a series of use-after-free issues
      using the Address Sanitizer tool. Many of these issues are
      potentially exploitable, allowing for remote code execution.

          o Heap-use-after-free in nsHTMLEditor::CollapseAdjacentTextNodes
            CVE-2012-1972
          o Heap-use-after-free in nsObjectLoadingContent::LoadObject
            CVE-2012-1973
          o Heap-use-after-free in gfxTextRun::CanBreakLineBefore
            CVE-2012-1974
          o Heap-use-after-free in PresShell::CompleteMove CVE-2012-1975
          o Heap-use-after-free in nsHTMLSelectElement::SubmitNamesValues
            CVE-2012-1976
          o Heap-use-after-free in MediaStreamGraphThreadRunnable::Run()
            CVE-2012-3956
          o Heap-buffer-overflow in nsBlockFrame::MarkLineDirty
            CVE-2012-3957
          o Heap-use-after-free in nsHTMLEditRules::DeleteNonTableElements
            CVE-2012-3958
          o Heap-use-after-free in nsRangeUpdater::SelAdjDeleteNode
            CVE-2012-3959
          o Heap-use-after-free in mozSpellChecker::SetCurrentDictionary
            CVE-2012-3960
          o Heap-use-after-free in RangeData::~RangeData CVE-2012-3961
          o Bad iterator in text runs CVE-2012-3962
          o use after free in js::gc::MapAllocToTraceKind CVE-2012-3963
          o Heap-use-after-free READ 8 in gfxTextRun::GetUserData
            CVE-2012-3964
    * 

      MFSA 2012-59 / CVE-2012-1956: Security researcher Mariusz Mlynski
      reported that it is possible to shadow the location object using
      Object.defineProperty. This could be used to confuse the current
      location to plugins, allowing for possible cross-site scripting (XSS)
      attacks.

    * 

      MFSA 2012-60 / CVE-2012-3965: Security researcher Mariusz Mlynski
      reported that when a page opens a new tab, a subsequent window can
      then be opened that can be navigated to about:newtab, a chrome
      privileged page. Once about:newtab is loaded, the special context can
      potentially be used to escalate privilege, allowing for arbitrary
      code execution on the local system in a maliciously crafted attack.

    * 

      MFSA 2012-61 / CVE-2012-3966: Security researcher Frederic Hoguin
      reported two related issues with the decoding of bitmap (.BMP) format
      images embedded in icon (.ICO) format files. When processing a
      negative 'height' header value for the bitmap image, a memory
      corruption can be induced, allowing an attacker to write random
      memory and cause a crash. This crash may be potentially exploitable.

    * 

      MFSA 2012-62: Security researcher miaubiz used the Address Sanitizer
      tool to discover two WebGL issues. The first issue is a
      use-after-free when WebGL shaders are called after being destroyed.
      The second issue exposes a problem with Mesa drivers on Linux,
      leading to a potentially exploitable crash.

          o 

            use after free, webgl fragment shader deleted by accessor
            CVE-2012-3968

          o 

            stack scribbling with 4-byte values choosable among a few
            values, when using more than 16 sampler uniforms, on Mesa, with
            all drivers CVE-2012-3967

    * 

      MFSA 2012-63: Security researcher Arthur Gerkis used the Address
      Sanitizer tool to find two issues involving Scalable Vector Graphics
      (SVG) files. The first issue is a buffer overflow in Gecko's SVG
      filter code when the sum of two values is too large to be stored as a
      signed 32-bit integer, causing the function to write past the end of
      an array. The second issue is a use-after-free when an element with a
      'requiredFeatures' attribute is moved between documents. In that
      situation, the internal representation of the 'requiredFeatures'
      value could be freed prematurely. Both issues are potentially
      exploitable.

          o 

            Heap-buffer-overflow in nsSVGFEMorphologyElement::Filter
            CVE-2012-3969

          o 

            Heap-use-after-free in nsTArray_base::Length() CVE-2012-3970

    * 

      MFSA 2012-64 / CVE-2012-3971: Using the Address Sanitizer tool,
      Mozilla security researcher Christoph Diehl discovered two memory
      corruption issues involving the Graphite 2 library used in Mozilla
      products. Both of these issues can cause a potentially exploitable
      crash. These problems were fixed in the Graphite 2 library, which has
      been updated for Mozilla products.

    * 

      MFSA 2012-65 / CVE-2012-3972: Security research Nicolas Gregoire used
      the Address Sanitizer tool to discover an out-of-bounds read in the
      format-number feature of XSLT, which can cause inaccurate formatting
      of numbers and information leakage. This is not directly exploitable.

    * 

      MFSA 2012-66 / CVE-2012-3973: Mozilla security researcher Mark
      Goodwin discovered an issue with the Firefox developer tools'
      debugger. If remote debugging is disabled, but the experimental
      HTTPMonitor extension has been installed and enabled, a remote user
      can connect to and use the remote debugging service through the port
      used by HTTPMonitor. A remote-enabled flag has been added to resolve
      this problem and close the port unless debugging is explicitly
      enabled.

    * 

      MFSA 2012-67 / CVE-2012-3974: Security researcher Masato Kinugawa
      reported that if a crafted executable is placed in the root partition
      on a Windows file system, the Firefox and Thunderbird installer will
      launch this program after a standard installation instead of Firefox
      or Thunderbird, running this program with the user's privileges.

    * 

      MFSA 2012-68 / CVE-2012-3975: Security researcher vsemozhetbyt
      reported that when the DOMParser is used to parse text/html data in a
      Firefox extension, linked resources within this HTML data will be
      loaded. If the data being parsed in the extension is untrusted, it
      could lead to information leakage and can potentially be combined
      with other attacks to become exploitable.

    * 

      MFSA 2012-69 / CVE-2012-3976: Security researcher Mark Poticha
      reported an issue where incorrect SSL certificate information can be
      displayed on the addressbar, showing the SSL data for a previous site
      while another has been loaded. This is caused by two onLocationChange
      events being fired out of the expected order, leading to the
      displayed certificate data to not be updated. This can be used for
      phishing attacks by allowing the user to input form or other data on
      a newer, attacking, site while the credentials of an older site
      appear on the addressbar.

    * 

      MFSA 2012-70 / CVE-2012-3978: Mozilla security researcher
      moz_bug_r_a4 reported that certain security checks in the location
      object can be bypassed if chrome code is called content in a specific
      manner. This allowed for the loading of restricted content. This can
      be combined with other issues to become potentially exploitable.

    * 

      MFSA 2012-71 / CVE-2012-3979: Mozilla developer Blake Kaplan reported
      that __android_log_print is called insecurely in places. If a
      malicious web page used a dump() statement with a specially crafted
      string, it can trigger a potentially exploitable crash.

      This vulnerability only affects Firefox for Android.

    * 

      MFSA 2012-72 / CVE-2012-3980: Security researcher Colby Russell
      discovered that eval in the web console can execute injected code
      with chrome privileges, leading to the running of malicious code in a
      privileged context. This allows for arbitrary code execution through
      a malicious web page if the web console is invoked by the user.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-31"/>
	<updated date="2012-08-31"/>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1956/">CVE-2012-1956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1956">CVE-2012-1956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1970/">CVE-2012-1970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1970">CVE-2012-1970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1971/">CVE-2012-1971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1971">CVE-2012-1971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1972/">CVE-2012-1972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1972">CVE-2012-1972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1973/">CVE-2012-1973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1973">CVE-2012-1973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1974/">CVE-2012-1974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1974">CVE-2012-1974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1975/">CVE-2012-1975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1975">CVE-2012-1975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1976/">CVE-2012-1976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1976">CVE-2012-1976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3956/">CVE-2012-3956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3956">CVE-2012-3956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3957/">CVE-2012-3957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3957">CVE-2012-3957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3958/">CVE-2012-3958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3958">CVE-2012-3958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3959/">CVE-2012-3959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3959">CVE-2012-3959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3960/">CVE-2012-3960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3960">CVE-2012-3960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3961/">CVE-2012-3961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3961">CVE-2012-3961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3962/">CVE-2012-3962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3962">CVE-2012-3962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3963/">CVE-2012-3963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3963">CVE-2012-3963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3964/">CVE-2012-3964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3964">CVE-2012-3964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3965/">CVE-2012-3965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3965">CVE-2012-3965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3966/">CVE-2012-3966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3966">CVE-2012-3966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3967/">CVE-2012-3967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3967">CVE-2012-3967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3968/">CVE-2012-3968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3968">CVE-2012-3968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3969/">CVE-2012-3969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3969">CVE-2012-3969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3970/">CVE-2012-3970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3970">CVE-2012-3970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3971/">CVE-2012-3971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3971">CVE-2012-3971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3972/">CVE-2012-3972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3972">CVE-2012-3972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3973/">CVE-2012-3973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3973">CVE-2012-3973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3974/">CVE-2012-3974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3974">CVE-2012-3974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3975/">CVE-2012-3975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3975">CVE-2012-3975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3976/">CVE-2012-3976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3976">CVE-2012-3976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3978/">CVE-2012-3978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3978">CVE-2012-3978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3979/">CVE-2012-3979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3979">CVE-2012-3979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3980/">CVE-2012-3980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3980">CVE-2012-3980 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576038" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576039" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576040" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576041" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576042" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576043" comment="libfreebl3-x86-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576044" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576045" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576046" comment="mozilla-nspr-x86-4.9.2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576047" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576048" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576049" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576050" comment="mozilla-nss-x86-3.13.6-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576038" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576039" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576040" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576041" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576042" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576043" comment="libfreebl3-x86-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576044" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576045" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576046" comment="mozilla-nspr-x86-4.9.2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576047" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576048" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576049" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576050" comment="mozilla-nss-x86-3.13.6-0.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218021" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="783533" ref_url="https://bugzilla.suse.com/783533" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3977" ref_url="https://www.suse.com/security/cve/CVE-2012-3977/" source="CVE"/>
		<reference ref_id="CVE-2012-3982" ref_url="https://www.suse.com/security/cve/CVE-2012-3982/" source="CVE"/>
		<reference ref_id="CVE-2012-3983" ref_url="https://www.suse.com/security/cve/CVE-2012-3983/" source="CVE"/>
		<reference ref_id="CVE-2012-3984" ref_url="https://www.suse.com/security/cve/CVE-2012-3984/" source="CVE"/>
		<reference ref_id="CVE-2012-3985" ref_url="https://www.suse.com/security/cve/CVE-2012-3985/" source="CVE"/>
		<reference ref_id="CVE-2012-3986" ref_url="https://www.suse.com/security/cve/CVE-2012-3986/" source="CVE"/>
		<reference ref_id="CVE-2012-3987" ref_url="https://www.suse.com/security/cve/CVE-2012-3987/" source="CVE"/>
		<reference ref_id="CVE-2012-3988" ref_url="https://www.suse.com/security/cve/CVE-2012-3988/" source="CVE"/>
		<reference ref_id="CVE-2012-3989" ref_url="https://www.suse.com/security/cve/CVE-2012-3989/" source="CVE"/>
		<reference ref_id="CVE-2012-3990" ref_url="https://www.suse.com/security/cve/CVE-2012-3990/" source="CVE"/>
		<reference ref_id="CVE-2012-3991" ref_url="https://www.suse.com/security/cve/CVE-2012-3991/" source="CVE"/>
		<reference ref_id="CVE-2012-3992" ref_url="https://www.suse.com/security/cve/CVE-2012-3992/" source="CVE"/>
		<reference ref_id="CVE-2012-3993" ref_url="https://www.suse.com/security/cve/CVE-2012-3993/" source="CVE"/>
		<reference ref_id="CVE-2012-3994" ref_url="https://www.suse.com/security/cve/CVE-2012-3994/" source="CVE"/>
		<reference ref_id="CVE-2012-3995" ref_url="https://www.suse.com/security/cve/CVE-2012-3995/" source="CVE"/>
		<reference ref_id="CVE-2012-4179" ref_url="https://www.suse.com/security/cve/CVE-2012-4179/" source="CVE"/>
		<reference ref_id="CVE-2012-4180" ref_url="https://www.suse.com/security/cve/CVE-2012-4180/" source="CVE"/>
		<reference ref_id="CVE-2012-4181" ref_url="https://www.suse.com/security/cve/CVE-2012-4181/" source="CVE"/>
		<reference ref_id="CVE-2012-4182" ref_url="https://www.suse.com/security/cve/CVE-2012-4182/" source="CVE"/>
		<reference ref_id="CVE-2012-4183" ref_url="https://www.suse.com/security/cve/CVE-2012-4183/" source="CVE"/>
		<reference ref_id="CVE-2012-4184" ref_url="https://www.suse.com/security/cve/CVE-2012-4184/" source="CVE"/>
		<reference ref_id="CVE-2012-4185" ref_url="https://www.suse.com/security/cve/CVE-2012-4185/" source="CVE"/>
		<reference ref_id="CVE-2012-4186" ref_url="https://www.suse.com/security/cve/CVE-2012-4186/" source="CVE"/>
		<reference ref_id="CVE-2012-4187" ref_url="https://www.suse.com/security/cve/CVE-2012-4187/" source="CVE"/>
		<reference ref_id="CVE-2012-4188" ref_url="https://www.suse.com/security/cve/CVE-2012-4188/" source="CVE"/>
		<reference ref_id="CVE-2012-4192" ref_url="https://www.suse.com/security/cve/CVE-2012-4192/" source="CVE"/>
		<reference ref_id="CVE-2012-4193" ref_url="https://www.suse.com/security/cve/CVE-2012-4193/" source="CVE"/>
		<description>

MozillaFirefox was updated to the 10.0.9ESR security release which fixes 
bugs and security issues:

    * 

      MFSA 2012-73 / CVE-2012-3977: Security researchers Thai Duong and
      Juliano Rizzo reported that SPDY's request header compression leads
      to information leakage, which can allow the extraction of private
      data such as session cookies, even over an encrypted SSL connection.
      (This does not affect Firefox 10 as it does not feature the SPDY
      extension. It was silently fixed for Firefox 15.)

    * 

      MFSA 2012-74: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      CVE-2012-3983: Henrik Skupin, Jesse Ruderman and moz_bug_r_a4
      reported memory safety problems and crashes that affect Firefox 15.

    * 

      CVE-2012-3982: Christian Holler and Jesse Ruderman reported memory
      safety problems and crashes that affect Firefox ESR 10 and Firefox
      15.

    * 

      MFSA 2012-75 / CVE-2012-3984: Security researcher David Bloom of Cue
      discovered that 'select' elements are always-on-top chromeless
      windows and that navigation away from a page with an active 'select'
      menu does not remove this window.When another menu is opened
      programmatically on a new page, the original 'select' menu can be
      retained and arbitrary HTML content within it rendered, allowing an
      attacker to cover arbitrary portions of the new page through absolute
      positioning/scrolling, leading to spoofing attacks. Security
      researcher Jordi Chancel found a variation that would allow for
      click-jacking attacks was well.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products. References

      Navigation away from a page with an active 'select' dropdown menu can
      be used for URL spoofing, other evil

      Firefox 10.0.1 : Navigation away from a page with multiple active
      'select' dropdown menu can be used for Spoofing And ClickJacking with
      XPI using window.open and geolocalisation

    * 

      MFSA 2012-76 / CVE-2012-3985: Security researcher Collin Jackson
      reported a violation of the HTML5 specifications for document.domain
      behavior. Specified behavior requires pages to only have access to
      windows in a new document.domain but the observed violation allowed
      pages to retain access to windows from the page's initial origin in
      addition to the new document.domain. This could potentially lead to
      cross-site scripting (XSS) attacks.

    * 

      MFSA 2012-77 / CVE-2012-3986: Mozilla developer Johnny Stenback
      discovered that several methods of a feature used for testing
      (DOMWindowUtils) are not protected by existing security checks,
      allowing these methods to be called through script by web pages. This
      was addressed by adding the existing security checks to these
      methods.

    * 

      MFSA 2012-78 / CVE-2012-3987: Security researcher Warren He reported
      that when a page is transitioned into Reader Mode in Firefox for
      Android, the resulting page has chrome privileges and its content is
      not thoroughly sanitized. A successful attack requires user enabling
      of reader mode for a malicious page, which could then perform an
      attack similar to cross-site scripting (XSS) to gain the privileges
      allowed to Firefox on an Android device. This has been fixed by
      changing the Reader Mode page into an unprivileged page.

      This vulnerability only affects Firefox for Android.

    * 

      MFSA 2012-79 / CVE-2012-3988: Security researcher Soroush Dalili
      reported that a combination of invoking full screen mode and
      navigating backwards in history could, in some circumstances, cause a
      hang or crash due to a timing dependent use-after-free pointer
      reference. This crash may be potentially exploitable.

    * 

      MFSA 2012-80 / CVE-2012-3989: Mozilla community member Ms2ger
      reported a crash due to an invalid cast when using the instanceof
      operator on certain types of JavaScript objects. This can lead to a
      potentially exploitable crash.

    * 

      MFSA 2012-81 / CVE-2012-3991: Mozilla community member Alice White
      reported that when the GetProperty function is invoked through JSAPI,
      security checking can be bypassed when getting cross-origin
      properties. This potentially allowed for arbitrary code execution.

    * 

      MFSA 2012-82 / CVE-2012-3994: Security researcher Mariusz Mlynski
      reported that the location property can be accessed by binary plugins
      through top.location and top can be shadowed by Object.defineProperty
      as well. This can allow for possible cross-site scripting (XSS)
      attacks through plugins.

    * 

      MFSA 2012-83: Security researcher Mariusz Mlynski reported that when
      InstallTrigger fails, it throws an error wrapped in a Chrome Object
      Wrapper (COW) that fails to specify exposed properties. These can
      then be added to the resulting object by an attacker, allowing access
      to chrome privileged functions through script.

      While investigating this issue, Mozilla security researcher
      moz_bug_r_a4 found that COW did not disallow accessing of properties
      from a standard prototype in some situations, even when the original
      issue had been fixed.

      These issues could allow for a cross-site scripting (XSS) attack or
      arbitrary code execution.

    * 

      CVE-2012-3993: XrayWrapper pollution via unsafe COW

    * 

      CVE-2012-4184: ChromeObjectWrapper is not implemented as intended

    * 

      MFSA 2012-84 / CVE-2012-3992: Security researcher Mariusz Mlynski
      reported an issue with spoofing of the location property. In this
      issue, writes to location.hash can be used in concert with scripted
      history navigation to cause a specific website to be loaded into the
      history object. The baseURI can then be changed to this stored site,
      allowing an attacker to inject a script or intercept posted data
      posted to a location specified with a relative path.

    * 

      MFSA 2012-85: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team discovered a series of use-after-free,
      buffer overflow, and out of bounds read issues using the Address
      Sanitizer tool in shipped software. These issues are potentially
      exploitable, allowing for remote code execution. We would also like
      to thank Abhishek for reporting two additional use-after-free flaws
      introduced during Firefox 16 development and fixed before general
      release.

    * 

      CVE-2012-3995: Out of bounds read in IsCSSWordSpacingSpace

    * 

      CVE-2012-4179: Heap-use-after-free in
      nsHTMLCSSUtils::CreateCSSPropertyTxn

    * 

      CVE-2012-4180: Heap-buffer-overflow in
      nsHTMLEditor::IsPrevCharInNodeWhitespace

    * 

      CVE-2012-4181: Heap-use-after-free in
      nsSMILAnimationController::DoSample

    * 

      CVE-2012-4182: Heap-use-after-free in nsTextEditRules::WillInsert

    * 

      CVE-2012-4183: Heap-use-after-free in
      DOMSVGTests::GetRequiredFeatures

    * 

      MFSA 2012-86: Security researcher Atte Kettunen from OUSPG reported
      several heap memory corruption issues found using the Address
      Sanitizer tool. These issues are potentially exploitable, allowing
      for remote code execution.

    * 

      CVE-2012-4185: Global-buffer-overflow in nsCharTraits::length

    * 

      CVE-2012-4186: Heap-buffer-overflow in nsWaveReader::DecodeAudioData

    * 

      CVE-2012-4187: Crash with ASSERTION: insPos too small

    * 

      CVE-2012-4188: Heap-buffer-overflow in Convolve3x3

    * 

      MFSA 2012-87 / CVE-2012-3990: Security researcher miaubiz used the
      Address Sanitizer tool to discover a use-after-free in the IME State
      Manager code. This could lead to a potentially exploitable crash.

    * 

      MFSA 2012-89 / CVE-2012-4192 / CVE-2012-4193: Mozilla security
      researcher moz_bug_r_a4 reported a regression where security wrappers
      are unwrapped without doing a security check in defaultValue(). This
      can allow for improper access access to the Location object. In
      versions 15 and earlier of affected products, there was also the
      potential for arbitrary code execution.

Security Issue reference:

    * CVE-2012-3977
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3977&gt;
    * CVE-2012-3982
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3982&gt;
    * CVE-2012-3983
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3983&gt;
    * CVE-2012-3984
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3984&gt;
    * CVE-2012-3985
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3985&gt;
    * CVE-2012-3986
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3986&gt;
    * CVE-2012-3987
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3987&gt;
    * CVE-2012-3988
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3988&gt;
    * CVE-2012-3989
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3989&gt;
    * CVE-2012-3990
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3990&gt;
    * CVE-2012-3991
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3991&gt;
    * CVE-2012-3992
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3992&gt;
    * CVE-2012-3993
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3993&gt;
    * CVE-2012-3994
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3994&gt;
    * CVE-2012-3995
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3995&gt;
    * CVE-2012-4179
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4179&gt;
    * CVE-2012-4180
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4180&gt;
    * CVE-2012-4181
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4181&gt;
    * CVE-2012-4182
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4182&gt;
    * CVE-2012-4183
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4183&gt;
    * CVE-2012-4184
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4184&gt;
    * CVE-2012-4185
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4185&gt;
    * CVE-2012-4186
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4186&gt;
    * CVE-2012-4187
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4187&gt;
    * CVE-2012-4188
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4188&gt;
    * CVE-2012-4192
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4192&gt;
    * CVE-2012-4193
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4193&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-10-15"/>
	<updated date="2012-10-15"/>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3977/">CVE-2012-3977 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3977">CVE-2012-3977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3982/">CVE-2012-3982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3982">CVE-2012-3982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3983/">CVE-2012-3983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3983">CVE-2012-3983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3984/">CVE-2012-3984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3984">CVE-2012-3984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3985/">CVE-2012-3985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3985">CVE-2012-3985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3986/">CVE-2012-3986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3986">CVE-2012-3986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3987/">CVE-2012-3987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3987">CVE-2012-3987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3988/">CVE-2012-3988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3988">CVE-2012-3988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3989/">CVE-2012-3989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3989">CVE-2012-3989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3990/">CVE-2012-3990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3990">CVE-2012-3990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3991/">CVE-2012-3991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3991">CVE-2012-3991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3992/">CVE-2012-3992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3992">CVE-2012-3992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3993/">CVE-2012-3993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3993">CVE-2012-3993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3994/">CVE-2012-3994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3994">CVE-2012-3994 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3995/">CVE-2012-3995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3995">CVE-2012-3995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4179/">CVE-2012-4179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4179">CVE-2012-4179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4180/">CVE-2012-4180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4180">CVE-2012-4180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4181/">CVE-2012-4181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4181">CVE-2012-4181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4182/">CVE-2012-4182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4182">CVE-2012-4182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4183/">CVE-2012-4183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4183">CVE-2012-4183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4184/">CVE-2012-4184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4184">CVE-2012-4184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4185/">CVE-2012-4185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4185">CVE-2012-4185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4186/">CVE-2012-4186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4186">CVE-2012-4186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4187/">CVE-2012-4187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4187">CVE-2012-4187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4188/">CVE-2012-4188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4188">CVE-2012-4188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4192/">CVE-2012-4192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4192">CVE-2012-4192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4193/">CVE-2012-4193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4193">CVE-2012-4193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576051" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576052" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576053" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576051" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576052" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576053" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218022" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="786522" ref_url="https://bugzilla.suse.com/786522" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4194" ref_url="https://www.suse.com/security/cve/CVE-2012-4194/" source="CVE"/>
		<reference ref_id="CVE-2012-4195" ref_url="https://www.suse.com/security/cve/CVE-2012-4195/" source="CVE"/>
		<reference ref_id="CVE-2012-4196" ref_url="https://www.suse.com/security/cve/CVE-2012-4196/" source="CVE"/>
		<description>

MozillaFirefox was updated to the 10.0.10ESR security release.

The following issue has been fixed:

    * 

      MFSA 2012-90: Mozilla has fixed a number of issues related to the
      Location object in order to enhance overall security. Details for
      each of the current fixed issues are below.

      Thunderbird is only affected by window.location issues through RSS
      feeds and extensions that load web content.

    * 

      CVE-2012-4194: Security researcher Mariusz Mlynski reported that the
      true value of window.location could be shadowed by user content
      through the use of the valueOf method, which can be combined with
      some plugins to perform a cross-site scripting (XSS) attack on users.

    * 

      CVE-2012-4195: Mozilla security researcher moz_bug_r_a4 discovered
      that the CheckURL function in window.location can be forced to return
      the wrong calling document and principal, allowing a cross-site
      scripting (XSS) attack. There is also the possibility of gaining
      arbitrary code execution if the attacker can take advantage of an
      add-on that interacts with the page content.

    * 

      CVE-2012-4196: Security researcher Antoine Delignat-Lavaud of the
      PROSECCO research team at INRIA Paris reported the ability to use
      property injection by prototype to bypass security wrapper
      protections on the Location object, allowing the cross-origin reading
      of the Location object.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-10-29"/>
	<updated date="2012-10-29"/>
	<bugzilla href="https://bugzilla.suse.com/786522">SUSE bug 786522</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4194/">CVE-2012-4194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4194">CVE-2012-4194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4195/">CVE-2012-4195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4195">CVE-2012-4195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4196/">CVE-2012-4196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4196">CVE-2012-4196 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576054" comment="MozillaFirefox-10.0.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576055" comment="MozillaFirefox-translations-10.0.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576056" comment="mozilla-nspr-4.9.3-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576057" comment="mozilla-nspr-32bit-4.9.3-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576058" comment="mozilla-nspr-x86-4.9.3-0.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576054" comment="MozillaFirefox-10.0.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576055" comment="MozillaFirefox-translations-10.0.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576056" comment="mozilla-nspr-4.9.3-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576057" comment="mozilla-nspr-32bit-4.9.3-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576058" comment="mozilla-nspr-x86-4.9.3-0.2.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218023" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="790140" ref_url="https://bugzilla.suse.com/790140" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4201" ref_url="https://www.suse.com/security/cve/CVE-2012-4201/" source="CVE"/>
		<reference ref_id="CVE-2012-4202" ref_url="https://www.suse.com/security/cve/CVE-2012-4202/" source="CVE"/>
		<reference ref_id="CVE-2012-4203" ref_url="https://www.suse.com/security/cve/CVE-2012-4203/" source="CVE"/>
		<reference ref_id="CVE-2012-4204" ref_url="https://www.suse.com/security/cve/CVE-2012-4204/" source="CVE"/>
		<reference ref_id="CVE-2012-4205" ref_url="https://www.suse.com/security/cve/CVE-2012-4205/" source="CVE"/>
		<reference ref_id="CVE-2012-4206" ref_url="https://www.suse.com/security/cve/CVE-2012-4206/" source="CVE"/>
		<reference ref_id="CVE-2012-4207" ref_url="https://www.suse.com/security/cve/CVE-2012-4207/" source="CVE"/>
		<reference ref_id="CVE-2012-4208" ref_url="https://www.suse.com/security/cve/CVE-2012-4208/" source="CVE"/>
		<reference ref_id="CVE-2012-4209" ref_url="https://www.suse.com/security/cve/CVE-2012-4209/" source="CVE"/>
		<reference ref_id="CVE-2012-4210" ref_url="https://www.suse.com/security/cve/CVE-2012-4210/" source="CVE"/>
		<reference ref_id="CVE-2012-4212" ref_url="https://www.suse.com/security/cve/CVE-2012-4212/" source="CVE"/>
		<reference ref_id="CVE-2012-4213" ref_url="https://www.suse.com/security/cve/CVE-2012-4213/" source="CVE"/>
		<reference ref_id="CVE-2012-4214" ref_url="https://www.suse.com/security/cve/CVE-2012-4214/" source="CVE"/>
		<reference ref_id="CVE-2012-4215" ref_url="https://www.suse.com/security/cve/CVE-2012-4215/" source="CVE"/>
		<reference ref_id="CVE-2012-4216" ref_url="https://www.suse.com/security/cve/CVE-2012-4216/" source="CVE"/>
		<reference ref_id="CVE-2012-4217" ref_url="https://www.suse.com/security/cve/CVE-2012-4217/" source="CVE"/>
		<reference ref_id="CVE-2012-4218" ref_url="https://www.suse.com/security/cve/CVE-2012-4218/" source="CVE"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2012-5830" ref_url="https://www.suse.com/security/cve/CVE-2012-5830/" source="CVE"/>
		<reference ref_id="CVE-2012-5833" ref_url="https://www.suse.com/security/cve/CVE-2012-5833/" source="CVE"/>
		<reference ref_id="CVE-2012-5835" ref_url="https://www.suse.com/security/cve/CVE-2012-5835/" source="CVE"/>
		<reference ref_id="CVE-2012-5836" ref_url="https://www.suse.com/security/cve/CVE-2012-5836/" source="CVE"/>
		<reference ref_id="CVE-2012-5837" ref_url="https://www.suse.com/security/cve/CVE-2012-5837/" source="CVE"/>
		<reference ref_id="CVE-2012-5838" ref_url="https://www.suse.com/security/cve/CVE-2012-5838/" source="CVE"/>
		<reference ref_id="CVE-2012-5839" ref_url="https://www.suse.com/security/cve/CVE-2012-5839/" source="CVE"/>
		<reference ref_id="CVE-2012-5840" ref_url="https://www.suse.com/security/cve/CVE-2012-5840/" source="CVE"/>
		<reference ref_id="CVE-2012-5841" ref_url="https://www.suse.com/security/cve/CVE-2012-5841/" source="CVE"/>
		<reference ref_id="CVE-2012-5842" ref_url="https://www.suse.com/security/cve/CVE-2012-5842/" source="CVE"/>
		<reference ref_id="CVE-2012-5843" ref_url="https://www.suse.com/security/cve/CVE-2012-5843/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 10.0.11 ESR security release, which 
fixes various bugs and security issues.

    * 

      MFSA 2012-106: Security researcher miaubiz used the Address Sanitizer
      tool to discover a series critically rated of use-after-free, buffer
      overflow, and memory corruption issues in shipped software. These
      issues are potentially exploitable, allowing for remote code
      execution. We would also like to thank miaubiz for reporting two
      additional use-after-free and memory corruption issues introduced
      during Firefox development that have been fixed before general
      release.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products. References

      The following issues have been fixed in Firefox 17 and ESR 10.0.11:

          o use-after-free when loading html file on osx (CVE-2012-5830)
          o Mesa crashes on certain texImage2D calls involving level&gt;0
            (CVE-2012-5833)
          o integer overflow, invalid write w/webgl bufferdata
            (CVE-2012-5835)

      The following issues have been fixed in Firefox 17:

          o crash in copyTexImage2D with image dimensions too large for
            given level (CVE-2012-5838)
    * 

      MFSA 2012-105: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team discovered a series critically rated of
      use-after-free and buffer overflow issues using the Address Sanitizer
      tool in shipped software. These issues are potentially exploitable,
      allowing for remote code execution. We would also like to thank
      Abhishek for reporting five additional use-after-free, out of bounds
      read, and buffer overflow flaws introduced during Firefox development
      that have been fixed before general release.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products. References

      The following issues have been fixed in Firefox 17 and ESR 10.0.11:

          o Heap-use-after-free in nsTextEditorState::PrepareEditor
            (CVE-2012-4214)
          o Heap-use-after-free in nsPlaintextEditor::FireClipboardEvent
            (CVE-2012-4215)
          o Heap-use-after-free in gfxFont::GetFontEntry (CVE-2012-4216)
          o Heap-buffer-overflow in nsWindow::OnExposeEvent (CVE-2012-5829)
          o heap-buffer-overflow in
            gfxShapedWord::CompressedGlyph::IsClusterStart
          o CVE-2012-5839
          o Heap-use-after-free in nsTextEditorState::PrepareEditor
            (CVE-2012-5840)

      The following issues have been fixed in Firefox 17:

          o Heap-use-after-free in XPCWrappedNative::Mark (CVE-2012-4212)
          o Heap-use-after-free in nsEditor::FindNextLeafNode
            (CVE-2012-4213)
          o Heap-use-after-free in nsViewManager::ProcessPendingUpdates
            (CVE-2012-4217)
          o Heap-use-after-free BuildTextRunsScanner::BreakSink::SetBreaks
            (CVE-2012-4218)
    * 

      MFSA 2012-104 / CVE-2012-4210: Security researcher Mariusz Mlynski
      reported that when a maliciously crafted stylesheet is inspected in
      the Style Inspector, HTML and CSS can run in a chrome privileged
      context without being properly sanitized first. This can lead to
      arbitrary code execution.

    * 

      MFSA 2012-103 / CVE-2012-4209: Security researcher Mariusz Mlynski
      reported that the location property can be accessed by binary plugins
      through top.location with a frame whose name attribute's value is set
      to 'top'. This can allow for possible cross-site scripting (XSS)
      attacks through plugins.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      MFSA 2012-102 / CVE-2012-5837: Security researcher Masato Kinugawa
      reported that when script is entered into the Developer Toolbar, it
      runs in a chrome privileged context. This allows for arbitrary code
      execution or cross-site scripting (XSS) if a user can be convinced to
      paste malicious code into the Developer Toolbar.

    * 

      MFSA 2012-101 / CVE-2012-4207: Security researcher Masato Kinugawa
      found when HZ-GB-2312 charset encoding is used for text, the '~'
      character will destroy another character near the chunk delimiter.
      This can lead to a cross-site scripting (XSS) attack in pages encoded
      in HZ-GB-2312.

    * 

      MFSA 2012-100 / CVE-2012-5841: Mozilla developer Bobby Holley
      reported that security wrappers filter at the time of property
      access, but once a function is returned, the caller can use this
      function without further security checks. This affects cross-origin
      wrappers, allowing for write actions on objects when only read
      actions should be properly allowed. This can lead to cross-site
      scripting (XSS) attacks.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      MFSA 2012-99 / CVE-2012-4208: Mozilla developer Peter Van der Beken
      discovered that same-origin XrayWrappers expose chrome-only
      properties even when not in a chrome compartment. This can allow web
      content to get properties of DOM objects that are intended to be
      chrome-only.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      MFSA 2012-98 / CVE-2012-4206: Security researcher Robert Kugler
      reported that when a specifically named DLL file on a Windows
      computer is placed in the default downloads directory with the
      Firefox installer, the Firefox installer will load this DLL when it
      is launched. In circumstances where the installer is run by an
      administrator privileged account, this allows for the downloaded DLL
      file to be run with administrator privileges. This can lead to
      arbitrary code execution from a privileged account.

    * 

      MFSA 2012-97 / CVE-2012-4205: Mozilla developer Gabor Krizsanits
      discovered that XMLHttpRequest objects created within sandboxes have
      the system principal instead of the sandbox principal. This can lead
      to cross-site request forgery (CSRF) or information theft via an
      add-on running untrusted code in a sandbox.

    * 

      MFSA 2012-96 / CVE-2012-4204: Security researcher Scott Bell of
      Security-Assessment.com used the Address Sanitizer tool to discover a
      memory corruption in str_unescape in the Javascript engine. This
      could potentially lead to arbitrary code execution.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      MFSA 2012-95 / CVE-2012-4203: Security researcher kakzz.ng@gmail.com
      reported that if a javascript: URL is selected from the list of
      Firefox 'new tab' page, the script will inherit the privileges of the
      privileged 'new tab' page. This allows for the execution of locally
      installed programs if a user can be convinced to save a bookmark of a
      malicious javascript: URL.

    * 

      MFSA 2012-94 / CVE-2012-5836: Security researcher Jonathan Stephens
      discovered that combining SVG text on a path with the setting of CSS
      properties could lead to a potentially exploitable crash.

    * 

      MFSA 2012-93 / CVE-2012-4201: Mozilla security researcher
      moz_bug_r_a4 reported that if code executed by the evalInSandbox
      function sets location.href, it can get the wrong subject principal
      for the URL check, ignoring the sandbox's Javascript context and
      gaining the context of evalInSandbox object. This can lead to
      malicious web content being able to perform a cross-site scripting
      (XSS) attack or stealing a copy of a local file if the user has
      installed an add-on vulnerable to this attack.

    * 

      MFSA 2012-92 / CVE-2012-4202: Security researcher Atte Kettunen from
      OUSPG used the Address Sanitizer tool to discover a buffer overflow
      while rendering GIF format images. This issue is potentially
      exploitable and could lead to arbitrary code execution.

    * 

      MFSA 2012-91: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products. References

      Gary Kwong, Jesse Ruderman, Christian Holler, Bob Clary, Kyle Huey,
      Ed Morley, Chris Lord, Boris Zbarsky, Julian Seward, and Bill
      McCloskey reported memory safety problems and crashes that affect
      Firefox 16. (CVE-2012-5843)

      Jesse Ruderman, Andrew McCreight, Bob Clary, and Kyle Huey reported
      memory safety problems and crashes that affect Firefox ESR 10 and
      Firefox 16. (CVE-2012-5842)

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-23"/>
	<updated date="2012-11-23"/>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4201/">CVE-2012-4201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4201">CVE-2012-4201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4202/">CVE-2012-4202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4202">CVE-2012-4202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4203/">CVE-2012-4203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4203">CVE-2012-4203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4204/">CVE-2012-4204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4204">CVE-2012-4204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4205/">CVE-2012-4205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4205">CVE-2012-4205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4206/">CVE-2012-4206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4206">CVE-2012-4206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4207/">CVE-2012-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4207">CVE-2012-4207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4208/">CVE-2012-4208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4208">CVE-2012-4208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4209/">CVE-2012-4209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4209">CVE-2012-4209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4210/">CVE-2012-4210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4210">CVE-2012-4210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4212/">CVE-2012-4212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4212">CVE-2012-4212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4213/">CVE-2012-4213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4213">CVE-2012-4213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4214/">CVE-2012-4214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4214">CVE-2012-4214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4215/">CVE-2012-4215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4215">CVE-2012-4215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4216/">CVE-2012-4216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4216">CVE-2012-4216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4217/">CVE-2012-4217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4217">CVE-2012-4217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4218/">CVE-2012-4218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4218">CVE-2012-4218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5829">CVE-2012-5829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5830/">CVE-2012-5830 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-5830">CVE-2012-5830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5833/">CVE-2012-5833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5833">CVE-2012-5833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5835/">CVE-2012-5835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5835">CVE-2012-5835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5836/">CVE-2012-5836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5836">CVE-2012-5836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5837/">CVE-2012-5837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5837">CVE-2012-5837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5838/">CVE-2012-5838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5838">CVE-2012-5838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5839/">CVE-2012-5839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5839">CVE-2012-5839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5840/">CVE-2012-5840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5840">CVE-2012-5840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5841/">CVE-2012-5841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5841">CVE-2012-5841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5842/">CVE-2012-5842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5842">CVE-2012-5842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5843/">CVE-2012-5843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5843">CVE-2012-5843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576059" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576060" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576061" comment="libfreebl3-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576062" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576063" comment="libfreebl3-x86-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576064" comment="mozilla-nss-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576065" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576066" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576067" comment="mozilla-nss-x86-3.14-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576059" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576060" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576061" comment="libfreebl3-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576062" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576063" comment="libfreebl3-x86-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576064" comment="mozilla-nss-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576065" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576066" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576067" comment="mozilla-nss-x86-3.14-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218024" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="796895" ref_url="https://bugzilla.suse.com/796895" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-0744" ref_url="https://www.suse.com/security/cve/CVE-2013-0744/" source="CVE"/>
		<reference ref_id="CVE-2013-0745" ref_url="https://www.suse.com/security/cve/CVE-2013-0745/" source="CVE"/>
		<reference ref_id="CVE-2013-0746" ref_url="https://www.suse.com/security/cve/CVE-2013-0746/" source="CVE"/>
		<reference ref_id="CVE-2013-0747" ref_url="https://www.suse.com/security/cve/CVE-2013-0747/" source="CVE"/>
		<reference ref_id="CVE-2013-0748" ref_url="https://www.suse.com/security/cve/CVE-2013-0748/" source="CVE"/>
		<reference ref_id="CVE-2013-0749" ref_url="https://www.suse.com/security/cve/CVE-2013-0749/" source="CVE"/>
		<reference ref_id="CVE-2013-0750" ref_url="https://www.suse.com/security/cve/CVE-2013-0750/" source="CVE"/>
		<reference ref_id="CVE-2013-0751" ref_url="https://www.suse.com/security/cve/CVE-2013-0751/" source="CVE"/>
		<reference ref_id="CVE-2013-0752" ref_url="https://www.suse.com/security/cve/CVE-2013-0752/" source="CVE"/>
		<reference ref_id="CVE-2013-0753" ref_url="https://www.suse.com/security/cve/CVE-2013-0753/" source="CVE"/>
		<reference ref_id="CVE-2013-0754" ref_url="https://www.suse.com/security/cve/CVE-2013-0754/" source="CVE"/>
		<reference ref_id="CVE-2013-0755" ref_url="https://www.suse.com/security/cve/CVE-2013-0755/" source="CVE"/>
		<reference ref_id="CVE-2013-0756" ref_url="https://www.suse.com/security/cve/CVE-2013-0756/" source="CVE"/>
		<reference ref_id="CVE-2013-0757" ref_url="https://www.suse.com/security/cve/CVE-2013-0757/" source="CVE"/>
		<reference ref_id="CVE-2013-0758" ref_url="https://www.suse.com/security/cve/CVE-2013-0758/" source="CVE"/>
		<reference ref_id="CVE-2013-0759" ref_url="https://www.suse.com/security/cve/CVE-2013-0759/" source="CVE"/>
		<reference ref_id="CVE-2013-0760" ref_url="https://www.suse.com/security/cve/CVE-2013-0760/" source="CVE"/>
		<reference ref_id="CVE-2013-0761" ref_url="https://www.suse.com/security/cve/CVE-2013-0761/" source="CVE"/>
		<reference ref_id="CVE-2013-0762" ref_url="https://www.suse.com/security/cve/CVE-2013-0762/" source="CVE"/>
		<reference ref_id="CVE-2013-0763" ref_url="https://www.suse.com/security/cve/CVE-2013-0763/" source="CVE"/>
		<reference ref_id="CVE-2013-0764" ref_url="https://www.suse.com/security/cve/CVE-2013-0764/" source="CVE"/>
		<reference ref_id="CVE-2013-0766" ref_url="https://www.suse.com/security/cve/CVE-2013-0766/" source="CVE"/>
		<reference ref_id="CVE-2013-0767" ref_url="https://www.suse.com/security/cve/CVE-2013-0767/" source="CVE"/>
		<reference ref_id="CVE-2013-0768" ref_url="https://www.suse.com/security/cve/CVE-2013-0768/" source="CVE"/>
		<reference ref_id="CVE-2013-0769" ref_url="https://www.suse.com/security/cve/CVE-2013-0769/" source="CVE"/>
		<reference ref_id="CVE-2013-0770" ref_url="https://www.suse.com/security/cve/CVE-2013-0770/" source="CVE"/>
		<reference ref_id="CVE-2013-0771" ref_url="https://www.suse.com/security/cve/CVE-2013-0771/" source="CVE"/>
		<description>

Mozilla Firefox was updated to the 10.0.12ESR release.

    * 

      MFSA 2013-01: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

          o Christoph Diehl, Christian Holler, Mats Palmgren, and Chiaki
            Ishikawa reported memory safety problems and crashes that
            affect Firefox ESR 10, Firefox ESR 17, and Firefox 17. (
            CVE-2013-0769
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769&gt; 
            )
          o Bill Gianopoulos, Benoit Jacob, Christoph Diehl, Christian
            Holler, Gary Kwong, Robert O'Callahan, and Scoobidiver reported
            memory safety problems and crashes that affect Firefox ESR 17
            and Firefox 17. (CVE-2013-0749
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0749&gt; 
            )
          o Jesse Ruderman, Christian Holler, Julian Seward, and
            Scoobidiver reported memory safety problems and crashes that
            affect Firefox 17. (CVE-2013-0770
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0770&gt; 
            )
    * 

      MFSA 2013-02: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team discovered a series critically rated of
      use-after-free, out of bounds read, and buffer overflow issues using
      the Address Sanitizer tool in shipped software. These issues are
      potentially exploitable, allowing for remote code execution. We would
      also like to thank Abhishek for reporting three additional
      user-after-free and out of bounds read flaws introduced during
      Firefox development that were fixed before general release.

      The following issue was fixed in Firefox 18:

          o Global-buffer-overflow in
            CharDistributionAnalysis::HandleOneChar (CVE-2013-0760
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0760&gt; 
            )

      The following issues were fixed in Firefox 18, ESR 17.0.1, and ESR
      10.0.12:

          o Heap-use-after-free in imgRequest::OnStopFrame (CVE-2013-0762
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762&gt; 
            )
          o Heap-use-after-free in ~nsHTMLEditRules (CVE-2013-0766
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766&gt; 
            )
          o Out of bounds read in nsSVGPathElement::GetPathLengthScale (
            CVE-2013-0767
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767&gt; 
            )

      The following issues were fixed in Firefox 18 and ESR 17.0.1:

          o Heap-use-after-free in mozilla::TrackUnionStream::EndTrack (
            CVE-2013-0761
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0761&gt; 
            )
          o Heap-use-after-free in Mesa, triggerable by resizing a WebGL
            canvas (CVE-2013-0763
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0763&gt; 
            )
          o Heap-buffer-overflow in gfxTextRun::ShrinkToLigatureBoundaries
            (CVE-2013-0771
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0771&gt; 
            )

      The following issue was fixed in Firefox 18 and in the earlier ESR
      10.0.11 release:

          o Heap-buffer-overflow in nsWindow::OnExposeEvent (CVE-2012-5829
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5829&gt; 
            )
    * 

      MFSA 2013-03: Security researcher miaubiz used the Address Sanitizer
      tool to discover a buffer overflow in Canvas when specific bad height
      and width values were given through HTML. This could lead to a
      potentially exploitable crash. (CVE-2013-0768
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0768&gt; )

      Miaubiz also found a potentially exploitable crash when 2D and 3D
      content was mixed which was introduced during Firefox development and
      fixed before general release.

    * 

      MFSA 2013-04: Security researcher Masato Kinugawa found a flaw in
      which the displayed URL values within the addressbar can be spoofed
      by a page during loading. This allows for phishing attacks where a
      malicious page can spoof the identify of another site. (
      CVE-2013-0759
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0759&gt; )

    * 

      MFSA 2013-05: Using the Address Sanitizer tool, security researcher
      Atte Kettunen from OUSPG discovered that the combination of large
      numbers of columns and column groups in a table could cause the array
      containing the columns during rendering to overwrite itself. This can
      lead to a user-after-free causing a potentially exploitable crash. (
      CVE-2013-0744
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744&gt; )

    * 

      MFSA 2013-06: Mozilla developer Wesley Johnston reported that when
      there are two or more iframes on the same HTML page, an iframe is
      able to see the touch events and their targets that occur within the
      other iframes on the page. If the iframes are from the same origin,
      they can also access the properties and methods of the targets of
      other iframes but same-origin policy (SOP) restricts access across
      domains. This allows for information leakage and possibilities for
      cross-site scripting (XSS) if another vulnerability can be used to
      get around SOP restrictions. (CVE-2013-0751
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0751&gt; )

    * 

      MFSA 2013-07: Mozilla community member Jerry Baker reported a
      crashing issue found through Thunderbird when downloading messages
      over a Secure Sockets Layer (SSL) connection. This was caused by a
      bug in the networking code assuming that secure connections were
      entirely handled on the socket transport thread when they can occur
      on a variety of threads. The resulting crash was potentially
      exploitable. (CVE-2013-0764
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0764&gt; )

    * 

      MFSA 2013-08: Mozilla developer Olli Pettay discovered that the
      AutoWrapperChanger class fails to keep some javascript objects alive
      during garbage collection. This can lead to an exploitable crash
      allowing for arbitrary code execution. (CVE-2013-0745
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0745&gt; )

    * 

      MFSA 2013-09: Mozilla developer Boris Zbarsky reported reported a
      problem where jsval-returning quickstubs fail to wrap their return
      values, causing a compartment mismatch. This mismatch can cause
      garbage collection to occur incorrectly and lead to a potentially
      exploitable crash. (CVE-2013-0746
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746&gt; )

    * 

      MFSA 2013-10: Mozilla security researcher Jesse Ruderman reported
      that events in the plugin handler can be manipulated by web content
      to bypass same-origin policy (SOP) restrictions. This can allow for
      clickjacking on malicious web pages. (CVE-2013-0747
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0747&gt; )

    * 

      MFSA 2013-11: Mozilla security researcher Jesse Ruderman discovered
      that using the toString function of XBL objects can lead to
      inappropriate information leakage by revealing the address space
      layout instead of just the ID of the object. This layout information
      could potentially be used to bypass ASLR and other security
      protections. (CVE-2013-0748
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748&gt; )

    * 

      MFSA 2013-12: Security researcher pa_kt reported a flaw via
      TippingPoint's Zero Day Initiative that an integer overflow is
      possible when calculating the length for a Javascript string
      concatenation, which is then used for memory allocation. This results
      in a buffer overflow, leading to a potentially exploitable memory
      corruption. (CVE-2013-0750
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750&gt; )

    * 

      MFSA 2013-13: Security researcher Sviatoslav Chagaev reported that
      when using an XBL file containing multiple XML bindings with SVG
      content, a memory corruption can occur. In concern with remote XUL,
      this can lead to an exploitable crash. (CVE-2013-0752
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0752&gt; )

    * 

      MFSA 2013-14: Security researcher Mariusz Mlynski reported that it is
      possible to change the prototype of an object and bypass Chrome
      Object Wrappers (COW) to gain access to chrome privileged functions.
      This could allow for arbitrary code execution. (CVE-2013-0757
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0757&gt; )

    * 

      MFSA 2013-15: Security researcher Mariusz Mlynski reported that it is
      possible to open a chrome privileged web page through plugin objects
      through interaction with SVG elements. This could allow for arbitrary
      code execution. (CVE-2013-0758
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758&gt; )

    * 

      MFSA 2013-16: Security researcher regenrecht reported, via
      TippingPoint's Zero Day Initiative, a use-after-free in XMLSerializer
      by the exposing of serializeToStream to web content. This can lead to
      arbitrary code execution when exploited. (CVE-2013-0753
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753&gt; )

    * 

      MFSA 2013-17: Security researcher regenrecht reported, via
      TippingPoint's Zero Day Initiative, a use-after-free within the
      ListenerManager when garbage collection is forced after data in
      listener objects have been allocated in some circumstances. This
      results in a use-after-free which can lead to arbitrary code
      execution. (CVE-2013-0754
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754&gt; )

    * 

      MFSA 2013-18: Security researcher regenrecht reported, via
      TippingPoint's Zero Day Initiative, a use-after-free using the domDoc
      pointer within Vibrate library. This can lead to arbitrary code
      execution when exploited. (CVE-2013-0755
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0755&gt; )

    * 

      MFSA 2013-19: Security researcher regenrecht reported, via
      TippingPoint's Zero Day Initiative, a garbage collection flaw in
      Javascript Proxy objects. This can lead to a use-after-free leading
      to arbitrary code execution. (CVE-2013-0756
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0756&gt; )

    * 

      MFSA 2013-20: Google reported to Mozilla that TURKTRUST, a
      certificate authority in Mozilla's root program, had mis-issued two
      intermediate certificates to customers. The issue was not specific to
      Firefox but there was evidence that one of the certificates was used
      for man-in-the-middle (MITM) traffic management of domain names that
      the customer did not legitimately own or control. This issue was
      resolved by revoking the trust for these specific mis-issued
      certificates. (CVE-2013-0743
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743&gt; )

		</description>
<advisory from="security@suse.de">
	<issued date="2013-01-10"/>
	<updated date="2013-01-10"/>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5829">CVE-2012-5829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0743">CVE-2013-0743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0744/">CVE-2013-0744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0744">CVE-2013-0744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0745/">CVE-2013-0745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0745">CVE-2013-0745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0746/">CVE-2013-0746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0746">CVE-2013-0746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0747/">CVE-2013-0747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0747">CVE-2013-0747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0748/">CVE-2013-0748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0748">CVE-2013-0748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0749/">CVE-2013-0749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0749">CVE-2013-0749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0750/">CVE-2013-0750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0750">CVE-2013-0750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0751/">CVE-2013-0751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0751">CVE-2013-0751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0752/">CVE-2013-0752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0752">CVE-2013-0752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0753/">CVE-2013-0753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0753">CVE-2013-0753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0754/">CVE-2013-0754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0754">CVE-2013-0754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0755/">CVE-2013-0755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0755">CVE-2013-0755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0756/">CVE-2013-0756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0756">CVE-2013-0756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0757/">CVE-2013-0757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0757">CVE-2013-0757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0758/">CVE-2013-0758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0758">CVE-2013-0758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0759/">CVE-2013-0759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0759">CVE-2013-0759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0760/">CVE-2013-0760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0760">CVE-2013-0760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0761/">CVE-2013-0761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0761">CVE-2013-0761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0762/">CVE-2013-0762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0762">CVE-2013-0762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0763/">CVE-2013-0763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0763">CVE-2013-0763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0764/">CVE-2013-0764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0764">CVE-2013-0764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0766/">CVE-2013-0766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0766">CVE-2013-0766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0767/">CVE-2013-0767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0767">CVE-2013-0767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0768/">CVE-2013-0768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0768">CVE-2013-0768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0769/">CVE-2013-0769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0769">CVE-2013-0769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0770/">CVE-2013-0770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0770">CVE-2013-0770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0771/">CVE-2013-0771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0771">CVE-2013-0771 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576068" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576069" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576070" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576071" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576072" comment="libfreebl3-x86-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576073" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576074" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576075" comment="mozilla-nspr-x86-4.9.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576076" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576077" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576078" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576079" comment="mozilla-nss-x86-3.14.1-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576068" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576069" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576070" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576071" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576072" comment="libfreebl3-x86-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576073" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576074" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576075" comment="mozilla-nspr-x86-4.9.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576076" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576077" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576078" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576079" comment="mozilla-nss-x86-3.14.1-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218025" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="804248" ref_url="https://bugzilla.suse.com/804248" source="BUGZILLA"/>
		<reference ref_id="806669" ref_url="https://bugzilla.suse.com/806669" source="BUGZILLA"/>
		<reference ref_id="808243" ref_url="https://bugzilla.suse.com/808243" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0765" ref_url="https://www.suse.com/security/cve/CVE-2013-0765/" source="CVE"/>
		<reference ref_id="CVE-2013-0772" ref_url="https://www.suse.com/security/cve/CVE-2013-0772/" source="CVE"/>
		<reference ref_id="CVE-2013-0773" ref_url="https://www.suse.com/security/cve/CVE-2013-0773/" source="CVE"/>
		<reference ref_id="CVE-2013-0774" ref_url="https://www.suse.com/security/cve/CVE-2013-0774/" source="CVE"/>
		<reference ref_id="CVE-2013-0775" ref_url="https://www.suse.com/security/cve/CVE-2013-0775/" source="CVE"/>
		<reference ref_id="CVE-2013-0776" ref_url="https://www.suse.com/security/cve/CVE-2013-0776/" source="CVE"/>
		<reference ref_id="CVE-2013-0780" ref_url="https://www.suse.com/security/cve/CVE-2013-0780/" source="CVE"/>
		<reference ref_id="CVE-2013-0782" ref_url="https://www.suse.com/security/cve/CVE-2013-0782/" source="CVE"/>
		<reference ref_id="CVE-2013-0783" ref_url="https://www.suse.com/security/cve/CVE-2013-0783/" source="CVE"/>
		<reference ref_id="CVE-2013-0787" ref_url="https://www.suse.com/security/cve/CVE-2013-0787/" source="CVE"/>
		<description>

MozillaFirefox has been updated to the 17.0.4ESR release which fixes one 
important security issue:

    * MFSA 2013-29 / CVE-2013-0787: VUPEN Security, via TippingPoint's Zero
      Day Initiative, reported a use-after-free within the HTML editor when
      content script is run by the document.execCommand() function while
      internal editor operations are occurring. This could allow for
      arbitrary code execution.

Security Issue reference:

    * CVE-2013-0787
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0787&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-11"/>
	<updated date="2013-03-11"/>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806669">SUSE bug 806669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808243">SUSE bug 808243</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0765/">CVE-2013-0765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0765">CVE-2013-0765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0772/">CVE-2013-0772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0772">CVE-2013-0772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0773/">CVE-2013-0773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0773">CVE-2013-0773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0774/">CVE-2013-0774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0774">CVE-2013-0774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0775/">CVE-2013-0775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0775">CVE-2013-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0776/">CVE-2013-0776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0776">CVE-2013-0776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0780/">CVE-2013-0780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0780">CVE-2013-0780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0782/">CVE-2013-0782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0782">CVE-2013-0782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0783/">CVE-2013-0783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0783">CVE-2013-0783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0787/">CVE-2013-0787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0787">CVE-2013-0787 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576080" comment="MozillaFirefox-17.0.4esr-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576081" comment="MozillaFirefox-branding-SLED-7-0.6.9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576082" comment="MozillaFirefox-translations-17.0.4esr-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576083" comment="libfreebl3-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576084" comment="libfreebl3-32bit-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576085" comment="libfreebl3-x86-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576086" comment="mozilla-nspr-4.9.5-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576087" comment="mozilla-nspr-32bit-4.9.5-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576088" comment="mozilla-nspr-x86-4.9.5-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576089" comment="mozilla-nss-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576090" comment="mozilla-nss-32bit-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576091" comment="mozilla-nss-tools-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576092" comment="mozilla-nss-x86-3.14.2-0.4.3.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576080" comment="MozillaFirefox-17.0.4esr-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576081" comment="MozillaFirefox-branding-SLED-7-0.6.9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576082" comment="MozillaFirefox-translations-17.0.4esr-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576083" comment="libfreebl3-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576084" comment="libfreebl3-32bit-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576085" comment="libfreebl3-x86-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576086" comment="mozilla-nspr-4.9.5-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576087" comment="mozilla-nspr-32bit-4.9.5-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576088" comment="mozilla-nspr-x86-4.9.5-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576089" comment="mozilla-nss-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576090" comment="mozilla-nss-32bit-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576091" comment="mozilla-nss-tools-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576092" comment="mozilla-nss-x86-3.14.2-0.4.3.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218026" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="813026" ref_url="https://bugzilla.suse.com/813026" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788/" source="CVE"/>
		<reference ref_id="CVE-2013-0789" ref_url="https://www.suse.com/security/cve/CVE-2013-0789/" source="CVE"/>
		<reference ref_id="CVE-2013-0790" ref_url="https://www.suse.com/security/cve/CVE-2013-0790/" source="CVE"/>
		<reference ref_id="CVE-2013-0791" ref_url="https://www.suse.com/security/cve/CVE-2013-0791/" source="CVE"/>
		<reference ref_id="CVE-2013-0792" ref_url="https://www.suse.com/security/cve/CVE-2013-0792/" source="CVE"/>
		<reference ref_id="CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794/" source="CVE"/>
		<reference ref_id="CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795/" source="CVE"/>
		<reference ref_id="CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796/" source="CVE"/>
		<reference ref_id="CVE-2013-0797" ref_url="https://www.suse.com/security/cve/CVE-2013-0797/" source="CVE"/>
		<reference ref_id="CVE-2013-0798" ref_url="https://www.suse.com/security/cve/CVE-2013-0798/" source="CVE"/>
		<reference ref_id="CVE-2013-0799" ref_url="https://www.suse.com/security/cve/CVE-2013-0799/" source="CVE"/>
		<reference ref_id="CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800/" source="CVE"/>
		<description>

MozillaFirefox has been updated to the 17.0.5ESR release fixing bugs and 
security issues.

Also Mozilla NSS has been updated to version 3.14.3 and Mozilla NSPR to 
4.9.6.

    * 

      MFSA 2013-30: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan
      Sreckovic, and Joe Drew reported memory safety problems and crashes
      that affect Firefox ESR 17, and Firefox 19. (CVE-2013-0788)

      Andrew McCreight, Randell Jesup, Gary Kwong, Jesse Ruderman,
      Christian Holler, and Mats Palmgren reported memory safety problems
      and crashes that affect Firefox 19. (CVE-2013-0789)

      Jim Chen reported a memory safety problem that affects Firefox for
      Android

    * 

      (CVE-2013-0790)

    * 

      MFSA 2013-31 / CVE-2013-0800: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover an out-of-bounds write in Cairo graphics
      library. When certain values are passed to it during rendering, Cairo
      attempts to use negative boundaries or sizes for boxes, leading to a
      potentially exploitable crash in some instances.

    * 

      MFSA 2013-32 / CVE-2013-0799: Security researcher Frederic Hoguin
      discovered that the Mozilla Maintenance Service on Windows was
      vulnerable to a buffer overflow. This system is used to update
      software without invoking the User Account Control (UAC) prompt. The
      Mozilla Maintenance Service is configured to allow unprivileged users
      to start it with arbitrary arguments. By manipulating the data passed
      in these arguments, an attacker can execute arbitrary code with the
      system privileges used by the service. This issue requires local file
      system access to be exploitable.

    * 

      MFSA 2013-33 / CVE-2013-0798: Security researcher Shuichiro Suzuki of
      the Fourteenforty Research Institute reported the app_tmp directory
      is set to be world readable and writeable by Firefox for Android.
      This potentially allows for third party applications to replace or
      alter Firefox add-ons when downloaded because they are temporarily
      stored in the app_tmp directory before installation.

      This vulnerability only affects Firefox for Android.

    * 

      MFSA 2013-34 / CVE-2013-0797: Security researcher Ash reported an
      issue with the Mozilla Updater. The Mozilla Updater can be made to
      load a malicious local DLL file in a privileged context through
      either the Mozilla Maintenance Service or independently on systems
      that do not use the service. This occurs when the DLL file is placed
      in a specific location on the local system before the Mozilla Updater
      is run. Local file system access is necessary in order for this issue
      to be exploitable.

    * 

      MFSA 2013-35 / CVE-2013-0796: Security researcher miaubiz used the
      Address Sanitizer tool to discover a crash in WebGL rendering when
      memory is freed that has not previously been allocated. This issue
      only affects Linux users who have Intel Mesa graphics drivers. The
      resulting crash could be potentially exploitable.

    * 

      MFSA 2013-36 / CVE-2013-0795: Security researcher Cody Crews reported
      a mechanism to use the cloneNode method to bypass System Only
      Wrappers (SOW) and clone a protected node. This allows violation of
      the browser's same origin policy and could also lead to privilege
      escalation and the execution of arbitrary code.

    * 

      MFSA 2013-37 / CVE-2013-0794: Security researcher shutdown reported a
      method for removing the origin indication on tab-modal dialog boxes
      in combination with browser navigation. This could allow an
      attacker's dialog to overlay a page and show another site's content.
      This can be used for phishing by allowing users to enter data into a
      modal prompt dialog on an attacking, site while appearing to be from
      the displayed site.

    * 

      MFSA 2013-38 / CVE-2013-079: Security researcher Mariusz Mlynski
      reported a method to use browser navigations through history to load
      an arbitrary website with that page's baseURI property pointing to
      another site instead of the seemingly loaded one. The user will
      continue to see the incorrect site in the addressbar of the browser.
      This allows for a cross-site scripting (XSS) attack or the theft of
      data through a phishing attack.

    * 

      MFSA 2013-39 / CVE-2013-0792: Mozilla community member Tobias Schula
      reported that if gfx.color_management.enablev4 preference is enabled
      manually in about:config, some grayscale PNG images will be rendered
      incorrectly and cause memory corruption during PNG decoding when
      certain color profiles are in use. A crafted PNG image could use this
      flaw to leak data through rendered images drawing from random memory.
      By default, this preference is not enabled.

    * 

      MFSA 2013-40 / CVE-2013-0791: Mozilla community member Ambroz Bizjak
      reported an out-of-bounds array read in the CERT_DecodeCertPackage
      function of the Network Security Services (NSS) libary when decoding
      a certificate. When this occurs, it will lead to memory corruption
      and a non-exploitable crash.

Security Issue references:

    * CVE-2013-0788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788&gt;
    * CVE-2013-0789
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0789&gt;
    * CVE-2013-0790
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0790&gt;
    * CVE-2013-0791
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791&gt;
    * CVE-2013-0792
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0792&gt;
    * CVE-2013-0794
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0794&gt;
    * CVE-2013-0795
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795&gt;
    * CVE-2013-0796
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796&gt;
    * CVE-2013-0797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0797&gt;
    * CVE-2013-0798
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0798&gt;
    * CVE-2013-0799
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0799&gt;
    * CVE-2013-0800
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-04-04"/>
	<updated date="2013-04-04"/>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0788">CVE-2013-0788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0789/">CVE-2013-0789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0789">CVE-2013-0789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0790/">CVE-2013-0790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0790">CVE-2013-0790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0791/">CVE-2013-0791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0791">CVE-2013-0791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0792/">CVE-2013-0792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0792">CVE-2013-0792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0794">CVE-2013-0794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0795">CVE-2013-0795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0796">CVE-2013-0796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0797/">CVE-2013-0797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0797">CVE-2013-0797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0798/">CVE-2013-0798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0798">CVE-2013-0798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0799/">CVE-2013-0799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0799">CVE-2013-0799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0800">CVE-2013-0800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576093" comment="MozillaFirefox-17.0.5esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576094" comment="MozillaFirefox-branding-SLED-7-0.6.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576095" comment="MozillaFirefox-translations-17.0.5esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576096" comment="libfreebl3-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576097" comment="libfreebl3-32bit-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576098" comment="libfreebl3-x86-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576099" comment="mozilla-nspr-4.9.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576100" comment="mozilla-nspr-32bit-4.9.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576101" comment="mozilla-nspr-x86-4.9.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576102" comment="mozilla-nss-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576103" comment="mozilla-nss-32bit-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576104" comment="mozilla-nss-tools-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576105" comment="mozilla-nss-x86-3.14.3-0.4.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576093" comment="MozillaFirefox-17.0.5esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576094" comment="MozillaFirefox-branding-SLED-7-0.6.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576095" comment="MozillaFirefox-translations-17.0.5esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576096" comment="libfreebl3-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576097" comment="libfreebl3-32bit-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576098" comment="libfreebl3-x86-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576099" comment="mozilla-nspr-4.9.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576100" comment="mozilla-nspr-32bit-4.9.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576101" comment="mozilla-nspr-x86-4.9.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576102" comment="mozilla-nss-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576103" comment="mozilla-nss-32bit-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576104" comment="mozilla-nss-tools-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576105" comment="mozilla-nss-x86-3.14.3-0.4.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218027" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="792432" ref_url="https://bugzilla.suse.com/792432" source="BUGZILLA"/>
		<reference ref_id="819204" ref_url="https://bugzilla.suse.com/819204" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788/" source="CVE"/>
		<reference ref_id="CVE-2013-0791" ref_url="https://www.suse.com/security/cve/CVE-2013-0791/" source="CVE"/>
		<reference ref_id="CVE-2013-0792" ref_url="https://www.suse.com/security/cve/CVE-2013-0792/" source="CVE"/>
		<reference ref_id="CVE-2013-0793" ref_url="https://www.suse.com/security/cve/CVE-2013-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794/" source="CVE"/>
		<reference ref_id="CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795/" source="CVE"/>
		<reference ref_id="CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796/" source="CVE"/>
		<reference ref_id="CVE-2013-0797" ref_url="https://www.suse.com/security/cve/CVE-2013-0797/" source="CVE"/>
		<reference ref_id="CVE-2013-0799" ref_url="https://www.suse.com/security/cve/CVE-2013-0799/" source="CVE"/>
		<reference ref_id="CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the17.0.6ESR security release.

    * 

      MFSA 2013-30: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan
      Sreckovic, and Joe Drew reported memory safety problems and crashes
      that affect Firefox ESR 17, and Firefox 19. (CVE-2013-0788)

    * 

      MFSA 2013-31 / CVE-2013-0800: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover an out-of-bounds write in Cairo graphics
      library. When certain values are passed to it during rendering, Cairo
      attempts to use negative boundaries or sizes for boxes, leading to a
      potentially exploitable crash in some instances.

    * 

      MFSA 2013-32 / CVE-2013-0799: Security researcher Frederic Hoguin
      discovered that the Mozilla Maintenance Service on Windows was
      vulnerable to a buffer overflow. This system is used to update
      software without invoking the User Account Control (UAC) prompt. The
      Mozilla Maintenance Service is configured to allow unprivileged users
      to start it with arbitrary arguments. By manipulating the data passed
      in these arguments, an attacker can execute arbitrary code with the
      system privileges used by the service. This issue requires local file
      system access to be exploitable.

    * 

      MFSA 2013-34 / CVE-2013-0797: Security researcher Ash reported an
      issue with the Mozilla Updater. The Mozilla Updater can be made to
      load a malicious local DLL file in a privileged context through
      either the Mozilla Maintenance Service or independently on systems
      that do not use the service. This occurs when the DLL file is placed
      in a specific location on the local system before the Mozilla Updater
      is run. Local file system access is necessary in order for this issue
      to be exploitable.

    * 

      MFSA 2013-35 / CVE-2013-0796: Security researcher miaubiz used the
      Address Sanitizer tool to discover a crash in WebGL rendering when
      memory is freed that has not previously been allocated. This issue
      only affects Linux users who have Intel Mesa graphics drivers. The
      resulting crash could be potentially exploitable.

    * 

      MFSA 2013-36 / CVE-2013-0795: Security researcher Cody Crews reported
      a mechanism to use the cloneNode method to bypass System Only
      Wrappers (SOW) and clone a protected node. This allows violation of
      the browser's same origin policy and could also lead to privilege
      escalation and the execution of arbitrary code.

    * 

      MFSA 2013-37 / CVE-2013-0794: Security researcher shutdown reported a
      method for removing the origin indication on tab-modal dialog boxes
      in combination with browser navigation. This could allow an
      attacker's dialog to overlay a page and show another site's content.
      This can be used for phishing by allowing users to enter data into a
      modal prompt dialog on an attacking, site while appearing to be from
      the displayed site.

    * 

      MFSA 2013-38 / CVE-2013-0793: Security researcher Mariusz Mlynski
      reported a method to use browser navigations through history to load
      an arbitrary website with that page's baseURI property pointing to
      another site instead of the seemingly loaded one. The user will
      continue to see the incorrect site in the addressbar of the browser.
      This allows for a cross-site scripting (XSS) attack or the theft of
      data through a phishing attack.

    * 

      MFSA 2013-39 / CVE-2013-0792: Mozilla community member Tobias Schula
      reported that if gfx.color_management.enablev4 preference is enabled
      manually in about:config, some grayscale PNG images will be rendered
      incorrectly and cause memory corruption during PNG decoding when
      certain color profiles are in use. A crafted PNG image could use this
      flaw to leak data through rendered images drawing from random memory.
      By default, this preference is not enabled.

    * 

      MFSA 2013-40 / CVE-2013-0791: Mozilla community member Ambroz Bizjak
      reported an out-of-bounds array read in the CERT_DecodeCertPackage
      function of the Network Security Services (NSS) libary when decoding
      a certificate. When this occurs, it will lead to memory corruption
      and a non-exploitable crash.

Security Issue references:

    * CVE-2013-0788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788&gt;
    * CVE-2013-0791
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791&gt;
    * CVE-2013-0792
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0792&gt;
    * CVE-2013-0793
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793&gt;
    * CVE-2013-0794
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0794&gt;
    * CVE-2013-0795
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795&gt;
    * CVE-2013-0796
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796&gt;
    * CVE-2013-0797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0797&gt;
    * CVE-2013-0799
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0799&gt;
    * CVE-2013-0800
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-17"/>
	<updated date="2013-05-17"/>
	<bugzilla href="https://bugzilla.suse.com/792432">SUSE bug 792432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0788">CVE-2013-0788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0791/">CVE-2013-0791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0791">CVE-2013-0791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0792/">CVE-2013-0792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0792">CVE-2013-0792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0793/">CVE-2013-0793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0793">CVE-2013-0793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0794">CVE-2013-0794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0795">CVE-2013-0795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0796">CVE-2013-0796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0797/">CVE-2013-0797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0797">CVE-2013-0797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0799/">CVE-2013-0799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0799">CVE-2013-0799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0800">CVE-2013-0800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576106" comment="MozillaFirefox-17.0.6esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576107" comment="MozillaFirefox-translations-17.0.6esr-0.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576106" comment="MozillaFirefox-17.0.6esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576107" comment="MozillaFirefox-translations-17.0.6esr-0.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218028" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="825935" ref_url="https://bugzilla.suse.com/825935" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1682" ref_url="https://www.suse.com/security/cve/CVE-2013-1682/" source="CVE"/>
		<reference ref_id="CVE-2013-1684" ref_url="https://www.suse.com/security/cve/CVE-2013-1684/" source="CVE"/>
		<reference ref_id="CVE-2013-1685" ref_url="https://www.suse.com/security/cve/CVE-2013-1685/" source="CVE"/>
		<reference ref_id="CVE-2013-1686" ref_url="https://www.suse.com/security/cve/CVE-2013-1686/" source="CVE"/>
		<reference ref_id="CVE-2013-1687" ref_url="https://www.suse.com/security/cve/CVE-2013-1687/" source="CVE"/>
		<reference ref_id="CVE-2013-1690" ref_url="https://www.suse.com/security/cve/CVE-2013-1690/" source="CVE"/>
		<reference ref_id="CVE-2013-1692" ref_url="https://www.suse.com/security/cve/CVE-2013-1692/" source="CVE"/>
		<reference ref_id="CVE-2013-1693" ref_url="https://www.suse.com/security/cve/CVE-2013-1693/" source="CVE"/>
		<reference ref_id="CVE-2013-1697" ref_url="https://www.suse.com/security/cve/CVE-2013-1697/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 17.0.7 ESR version, fixing bugs and 
security fixes.

    * 

      MFSA 2013-49: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Gary Kwong, Jesse Ruderman, and Andrew McCreight reported memory
      safety problems and crashes that affect Firefox ESR 17, and Firefox
      21. (CVE-2013-1682)

    * 

      MFSA 2013-50: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team used the Address Sanitizer tool to
      discover a series of use-after-free problems rated critical as
      security issues in shipped software. Some of these issues are
      potentially exploitable, allowing for remote code execution. We would
      also like to thank Abhishek for reporting additional use-after-free
      and buffer overflow flaws in code introduced during Firefox
      development. These were fixed before general release.

          o Heap-use-after-free in
            mozilla::dom::HTMLMediaElement::LookupMediaElementURITable
            (CVE-2013-1684)
          o Heap-use-after-free in nsIDocument::GetRootElement
            (CVE-2013-1685)
          o Heap-use-after-free in mozilla::ResetDir (CVE-2013-1686)
    * 

      MFSA 2013-51 / CVE-2013-1687: Security researcher Mariusz Mlynski
      reported that it is possible to compile a user-defined function in
      the XBL scope of a specific element and then trigger an event within
      this scope to run code. In some circumstances, when this code is run,
      it can access content protected by System Only Wrappers (SOW) and
      chrome-privileged pages. This could potentially lead to arbitrary
      code execution. Additionally, Chrome Object Wrappers (COW) can be
      bypassed by web content to access privileged methods, leading to a
      cross-site scripting (XSS) attack from privileged pages.

    * 

      MFSA 2013-53 / CVE-2013-1690: Security researcher Nils reported that
      specially crafted web content using the onreadystatechange event and
      reloading of pages could sometimes cause a crash when unmapped memory
      is executed. This crash is potentially exploitable.

    * 

      MFSA 2013-54 / CVE-2013-1692: Security researcher Johnathan Kuskos
      reported that Firefox is sending data in the body of XMLHttpRequest
      (XHR) HEAD requests, which goes agains the XHR specification. This
      can potentially be used for Cross-Site Request Forgery (CSRF) attacks
      against sites which do not distinguish between HEAD and POST
      requests.

    * 

      MFSA 2013-55 / CVE-2013-1693: Security researcher Paul Stone of
      Context Information Security discovered that timing differences in
      the processing of SVG format images with filters could allow for
      pixel values to be read. This could potentially allow for text values
      to be read across domains, leading to information disclosure.

    * 

      MFSA 2013-59 / CVE-2013-1697: Mozilla security researcher
      moz_bug_r_a4 reported that XrayWrappers can be bypassed to call
      content-defined toString and valueOf methods through DefaultValue.
      This can lead to unexpected behavior when privileged code acts on the
      incorrect values.

Security Issue references:

    * CVE-2013-1682
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1682&gt;
    * CVE-2013-1684
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1684&gt;
    * CVE-2013-1685
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1685&gt;
    * CVE-2013-1686
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1686&gt;
    * CVE-2013-1687
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1687&gt;
    * CVE-2013-1690
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1690&gt;
    * CVE-2013-1692
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1692&gt;
    * CVE-2013-1693
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1693&gt;
    * CVE-2013-1697
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1697&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-28"/>
	<updated date="2013-06-28"/>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1682/">CVE-2013-1682 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1682">CVE-2013-1682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1684/">CVE-2013-1684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1684">CVE-2013-1684 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1685/">CVE-2013-1685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1685">CVE-2013-1685 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1686/">CVE-2013-1686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1686">CVE-2013-1686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1687/">CVE-2013-1687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1687">CVE-2013-1687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1690/">CVE-2013-1690 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-1690">CVE-2013-1690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1692/">CVE-2013-1692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1692">CVE-2013-1692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1693/">CVE-2013-1693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1693">CVE-2013-1693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1697/">CVE-2013-1697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1697">CVE-2013-1697 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576108" comment="MozillaFirefox-17.0.7esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576109" comment="MozillaFirefox-branding-SLED-7-0.6.9.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576110" comment="MozillaFirefox-translations-17.0.7esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576108" comment="MozillaFirefox-17.0.7esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576109" comment="MozillaFirefox-branding-SLED-7-0.6.9.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576110" comment="MozillaFirefox-translations-17.0.7esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218029" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="847708" ref_url="https://bugzilla.suse.com/847708" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<description>

Mozilla Firefox was updated to the 17.0.10ESR release, fixing various bugs 
and security issues:

MFSA 2013-93: Mozilla developers identified and fixed several memory safety 
bugs in the browser engine used in Firefox and other Mozilla-based 
products. Some of these bugs showed evidence of memory corruption under 
certain circumstances, and we presume that with enough effort at least some 
of these could be exploited to run arbitrary code.

Jesse Ruderman and Christoph Diehl reported memory safety problems and 
crashes that affect Firefox ESR 17, Firefox ESR 24, and Firefox 24. 
(CVE-2013-5590)

Carsten Book reported a crash fixed in the NSS library used by 
Mozilla-based products fixed in Firefox 25, Firefox ESR 24.1, and Firefox 
ESR 17.0.10.(CVE-2013-1739)

MFSA 2013-95 / CVE-2013-5604: Security researcher Abhishek Arya (Inferno) 
of the Google Chrome Security Team used the Address Sanitizer tool to 
discover an access violation due to uninitialized data during Extensible 
Stylesheet Language Transformation (XSLT) processing. This leads to a 
potentially exploitable crash.

MFSA 2013-96 / CVE-2013-5595: Compiler Engineer Dan Gohman of Google 
discovered a flaw in the JavaScript engine where memory was being 
incorrectly allocated for some functions and the calls for allocations were 
not always properly checked for overflow, leading to potential buffer 
overflows. When combined with other vulnerabilities, these flaws could be 
potentially exploitable.

MFSA 2013-98 / CVE-2013-5597: Security researcher Byoungyoung Lee of 
Georgia Tech Information Security Center (GTISC) used the Address Sanitizer 
tool to discover a use-after-free during state change events while updating 
the offline cache. This leads to a potentially exploitable crash.

MFSA 2013-100: Security researcher Nils used the Address Sanitizer tool 
while fuzzing to discover missing strong references in browsing engine 
leading to use-after-frees. This can lead to a potentially exploitable 
crash.

    * ASAN heap-use-after-free in nsIPresShell::GetPresContext() with
      canvas, onresize and mozTextStyle (CVE-2013-5599)
    * ASAN use-after-free in nsIOService::NewChannelFromURIWithProxyFlags
      with Blob URL (CVE-2013-5600)
    * ASAN use-after free in GC allocation in
      nsEventListenerManager::SetEventHandler (CVE-2013-5601)

MFSA 2013-101 / CVE-2013-5602: Security researcher Nils used the Address 
Sanitizer tool while fuzzing to discover a memory corruption issue with the 
JavaScript engine when using workers with direct proxies. This results in a 
potentially exploitable crash.

Security Issues:

    * CVE-2013-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-09"/>
	<updated date="2013-11-09"/>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1739">CVE-2013-1739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576111" comment="MozillaFirefox-17.0.10esr-0.4.2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576112" comment="MozillaFirefox-branding-SLED-7-0.6.9.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576113" comment="MozillaFirefox-translations-17.0.10esr-0.4.2.4 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576111" comment="MozillaFirefox-17.0.10esr-0.4.2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576112" comment="MozillaFirefox-branding-SLED-7-0.6.9.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576113" comment="MozillaFirefox-translations-17.0.10esr-0.4.2.4 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218030" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="859055" ref_url="https://bugzilla.suse.com/859055" source="BUGZILLA"/>
		<reference ref_id="861847" ref_url="https://bugzilla.suse.com/861847" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1477" ref_url="https://www.suse.com/security/cve/CVE-2014-1477/" source="CVE"/>
		<reference ref_id="CVE-2014-1479" ref_url="https://www.suse.com/security/cve/CVE-2014-1479/" source="CVE"/>
		<reference ref_id="CVE-2014-1480" ref_url="https://www.suse.com/security/cve/CVE-2014-1480/" source="CVE"/>
		<reference ref_id="CVE-2014-1481" ref_url="https://www.suse.com/security/cve/CVE-2014-1481/" source="CVE"/>
		<reference ref_id="CVE-2014-1482" ref_url="https://www.suse.com/security/cve/CVE-2014-1482/" source="CVE"/>
		<reference ref_id="CVE-2014-1483" ref_url="https://www.suse.com/security/cve/CVE-2014-1483/" source="CVE"/>
		<reference ref_id="CVE-2014-1484" ref_url="https://www.suse.com/security/cve/CVE-2014-1484/" source="CVE"/>
		<reference ref_id="CVE-2014-1485" ref_url="https://www.suse.com/security/cve/CVE-2014-1485/" source="CVE"/>
		<reference ref_id="CVE-2014-1486" ref_url="https://www.suse.com/security/cve/CVE-2014-1486/" source="CVE"/>
		<reference ref_id="CVE-2014-1487" ref_url="https://www.suse.com/security/cve/CVE-2014-1487/" source="CVE"/>
		<reference ref_id="CVE-2014-1488" ref_url="https://www.suse.com/security/cve/CVE-2014-1488/" source="CVE"/>
		<reference ref_id="CVE-2014-1489" ref_url="https://www.suse.com/security/cve/CVE-2014-1489/" source="CVE"/>
		<reference ref_id="CVE-2014-1490" ref_url="https://www.suse.com/security/cve/CVE-2014-1490/" source="CVE"/>
		<reference ref_id="CVE-2014-1491" ref_url="https://www.suse.com/security/cve/CVE-2014-1491/" source="CVE"/>
		<description>

Mozilla Firefox was updated to the 24.3.0ESR security release.

The following security issues have been fixed:

    * 

      MFSA 2014-01: Memory safety bugs fixed in Firefox ESR 24.3 and
      Firefox 27.0 (CVE-2014-1477)(bnc#862345)

    * 

      MFSA 2014-02: Using XBL scopes its possible to steal(clone) native
      anonymous content (CVE-2014-1479)(bnc#862348)

    * 

      MFSA 2014-03: Download 'open file' dialog delay is too quick, doesn't
      prevent clickjacking (CVE-2014-1480)

    * 

      MFSA 2014-04: Image decoding causing FireFox to crash with Goo Create
      (CVE-2014-1482)(bnc#862356)

    * 

      MFSA 2014-05: caretPositionFromPoint and elementFromPoint leak
      information about iframe contents via timing information
      (CVE-2014-1483)(bnc#862360)

    * 

      MFSA 2014-06: Fennec leaks profile path to logcat (CVE-2014-1484)

    * 

      MFSA 2014-07: CSP should block XSLT as script, not as style
      (CVE-2014-1485)

    * 

      MFSA 2014-08: imgRequestProxy Use-After-Free Remote Code Execution
      Vulnerability (CVE-2014-1486)

    * 

      MFSA 2014-09: Cross-origin information disclosure with error message
      of Web Workers (CVE-2014-1487)

    * 

      MFSA 2014-10: settings &amp; history ID bug (CVE-2014-1489)

    * 

      MFSA 2014-11: Firefox reproducibly crashes when using asm.js code in
      workers and transferable objects (CVE-2014-1488)

    * 

      MFSA 2014-12: TOCTOU, potential use-after-free in libssl's session
      ticket processing (CVE-2014-1490)(bnc#862300) Do not allow p-1 as a
      public DH value (CVE-2014-1491)(bnc#862289)

    * 

      MFSA 2014-13: Inconsistent this value when invoking getters on window
      (CVE-2014-1481)(bnc#862309)

Also Mozilla NSS was updated to 3.15.4 release.

    * required for Firefox 27
    * regular CA root store update (1.96)
    * some OSCP improvments
    * other bugfixes

Security Issue references:

    * CVE-2014-1477
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477&gt;
    * CVE-2014-1479
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479&gt;
    * CVE-2014-1480
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1480&gt;
    * CVE-2014-1481
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481&gt;
    * CVE-2014-1482
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482&gt;
    * CVE-2014-1483
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1483&gt;
    * CVE-2014-1484
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1484&gt;
    * CVE-2014-1485
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1485&gt;
    * CVE-2014-1486
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486&gt;
    * CVE-2014-1487
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487&gt;
    * CVE-2014-1488
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1488&gt;
    * CVE-2014-1489
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1489&gt;
    * CVE-2014-1490
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490&gt;
    * CVE-2014-1491
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-15"/>
	<updated date="2014-02-15"/>
	<bugzilla href="https://bugzilla.suse.com/859055">SUSE bug 859055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1477/">CVE-2014-1477 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1477">CVE-2014-1477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1479/">CVE-2014-1479 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1479">CVE-2014-1479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1480/">CVE-2014-1480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1480">CVE-2014-1480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1481/">CVE-2014-1481 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1481">CVE-2014-1481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1482/">CVE-2014-1482 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1482">CVE-2014-1482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1483/">CVE-2014-1483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1483">CVE-2014-1483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1484/">CVE-2014-1484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1484">CVE-2014-1484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1485/">CVE-2014-1485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1485">CVE-2014-1485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1486/">CVE-2014-1486 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1486">CVE-2014-1486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1487/">CVE-2014-1487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1487">CVE-2014-1487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1488/">CVE-2014-1488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1488">CVE-2014-1488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1489/">CVE-2014-1489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1489">CVE-2014-1489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1490/">CVE-2014-1490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1490">CVE-2014-1490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1491/">CVE-2014-1491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1491">CVE-2014-1491 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571388" comment="MozillaFirefox-24.3.0esr-0.4.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571389" comment="MozillaFirefox-branding-SLED-24-0.4.10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571390" comment="MozillaFirefox-translations-24.3.0esr-0.4.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571391" comment="firefox-libgcc_s1-4.7.2_20130108-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571392" comment="firefox-libstdc++6-4.7.2_20130108-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571393" comment="libfreebl3-3.15.4-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571394" comment="libfreebl3-32bit-3.15.4-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571395" comment="mozilla-nspr-4.10.2-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571396" comment="mozilla-nspr-32bit-4.10.2-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571397" comment="mozilla-nss-3.15.4-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571398" comment="mozilla-nss-32bit-3.15.4-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571399" comment="mozilla-nss-tools-3.15.4-0.4.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218031" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="887746" ref_url="https://bugzilla.suse.com/887746" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1544" ref_url="https://www.suse.com/security/cve/CVE-2014-1544/" source="CVE"/>
		<reference ref_id="CVE-2014-1547" ref_url="https://www.suse.com/security/cve/CVE-2014-1547/" source="CVE"/>
		<reference ref_id="CVE-2014-1548" ref_url="https://www.suse.com/security/cve/CVE-2014-1548/" source="CVE"/>
		<reference ref_id="CVE-2014-1555" ref_url="https://www.suse.com/security/cve/CVE-2014-1555/" source="CVE"/>
		<reference ref_id="CVE-2014-1556" ref_url="https://www.suse.com/security/cve/CVE-2014-1556/" source="CVE"/>
		<reference ref_id="CVE-2014-1557" ref_url="https://www.suse.com/security/cve/CVE-2014-1557/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 24.7ESR security release.

Security issues fixed in this release:

    * CVE-2014-1544 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-63.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-63.html&gt;
    * CVE-2014-1548 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-56.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-56.html&gt;
    * CVE-2014-1549 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-57.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-57.html&gt;
    * CVE-2014-1550 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-58.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-58.html&gt;
    * CVE-2014-1551 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-59.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-59.html&gt;
    * CVE-2014-1552 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-66.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-66.html&gt;
    * CVE-2014-1555 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-61.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-61.html&gt;
    * CVE-2014-1556 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-62.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-62.html&gt;
    * CVE-2014-1557 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-64.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-64.html&gt;
    * CVE-2014-1558,CVE-2014-1559,CVE-2014-1560 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-65.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-65.html&gt;
    * CVE-2014-1561 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-60.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-60.html&gt;

Security Issues:

    * CVE-2014-1557
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557&gt;
    * CVE-2014-1547
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547&gt;
    * CVE-2014-1548
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1548&gt;
    * CVE-2014-1556
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556&gt;
    * CVE-2014-1544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544&gt;
    * CVE-2014-1555
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-28"/>
	<updated date="2014-07-28"/>
	<bugzilla href="https://bugzilla.suse.com/887746">SUSE bug 887746</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1544/">CVE-2014-1544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1544">CVE-2014-1544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1547/">CVE-2014-1547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1547">CVE-2014-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1548/">CVE-2014-1548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1548">CVE-2014-1548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1555/">CVE-2014-1555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1555">CVE-2014-1555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1556/">CVE-2014-1556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1556">CVE-2014-1556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1557/">CVE-2014-1557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1557">CVE-2014-1557 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571404" comment="MozillaFirefox-24.7.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571405" comment="MozillaFirefox-translations-24.7.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571406" comment="libfreebl3-3.16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571407" comment="libfreebl3-32bit-3.16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571408" comment="mozilla-nss-3.16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571409" comment="mozilla-nss-32bit-3.16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576114" comment="mozilla-nss-devel-3.16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571410" comment="mozilla-nss-tools-3.16.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218032" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="894370" ref_url="https://bugzilla.suse.com/894370" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1562" ref_url="https://www.suse.com/security/cve/CVE-2014-1562/" source="CVE"/>
		<reference ref_id="CVE-2014-1567" ref_url="https://www.suse.com/security/cve/CVE-2014-1567/" source="CVE"/>
		<description>

Mozilla Firefox was updated to the 24.8.0ESR release, fixing security 
issues and bugs.

Only some of the published security advisories affect the Mozilla Firefox 
24ESR codestream:

    * MFSA 2014-72 / CVE-2014-1567: Security researcher regenrecht
      reported, via TippingPoint's Zero Day Initiative, a use-after-free
      during text layout when interacting with the setting of text
      direction. This results in a use-after-free which can lead to
      arbitrary code execution.
    * MFSA 2014-67: Mozilla developers and community identified and fixed
      several memory safety bugs in the browser engine used in Firefox and
      other Mozilla-based products. Some of these bugs showed evidence of
      memory corruption under certain circumstances, and we presume that
      with enough effort at least some of these could be exploited to run
      arbitrary code.
    * Jan de Mooij reported a memory safety problem that affects Firefox
      ESR 24.7, ESR 31 and Firefox 31. (CVE-2014-1562)

More information is referenced on: 
https://www.mozilla.org/security/announce/
&lt;https://www.mozilla.org/security/announce/&gt; .

Security Issues:

    * CVE-2014-1562
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562&gt;
    * CVE-2014-1567
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-03"/>
	<updated date="2014-09-03"/>
	<bugzilla href="https://bugzilla.suse.com/894370">SUSE bug 894370</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1562/">CVE-2014-1562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1562">CVE-2014-1562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1567/">CVE-2014-1567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1567">CVE-2014-1567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571411" comment="MozillaFirefox-24.8.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571412" comment="MozillaFirefox-translations-24.8.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571413" comment="libfreebl3-3.16.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571414" comment="libfreebl3-32bit-3.16.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571415" comment="mozilla-nspr-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571416" comment="mozilla-nspr-32bit-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576115" comment="mozilla-nspr-devel-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571417" comment="mozilla-nss-3.16.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571418" comment="mozilla-nss-32bit-3.16.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576116" comment="mozilla-nss-devel-3.16.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571419" comment="mozilla-nss-tools-3.16.4-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218033" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="908009" ref_url="https://bugzilla.suse.com/908009" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587/" source="CVE"/>
		<reference ref_id="CVE-2014-1588" ref_url="https://www.suse.com/security/cve/CVE-2014-1588/" source="CVE"/>
		<reference ref_id="CVE-2014-1589" ref_url="https://www.suse.com/security/cve/CVE-2014-1589/" source="CVE"/>
		<reference ref_id="CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590/" source="CVE"/>
		<reference ref_id="CVE-2014-1591" ref_url="https://www.suse.com/security/cve/CVE-2014-1591/" source="CVE"/>
		<reference ref_id="CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592/" source="CVE"/>
		<reference ref_id="CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593/" source="CVE"/>
		<reference ref_id="CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594/" source="CVE"/>
		<reference ref_id="CVE-2014-1595" ref_url="https://www.suse.com/security/cve/CVE-2014-1595/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 31.3ESR release fixing bugs and 
security issues.

    * 

      MFSA 2014-83 / CVE-2014-1588 / CVE-2014-1587: Mozilla developers and
      community identified and fixed several memory safety bugs in the
      browser engine used in Firefox and other Mozilla-based products. Some
      of these bugs showed evidence of memory corruption under certain
      circumstances, and we presume that with enough effort at least some
      of these could be exploited to run arbitrary code.

    * 

      MFSA 2014-85 / CVE-2014-1590: Security researcher Joe Vennix from
      Rapid7 reported that passing a JavaScript object to XMLHttpRequest
      that mimics an input stream will a crash. This crash is not
      exploitable and can only be used for denial of service attacks.

    * 

      MFSA 2014-87 / CVE-2014-1592: Security researcher Berend-Jan Wever
      reported a use-after-free created by triggering the creation of a
      second root element while parsing HTML written to a document created
      with document.open(). This leads to a potentially exploitable crash.

    * 

      MFSA 2014-88 / CVE-2014-1593: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover a buffer overflow during the parsing of
      media content. This leads to a potentially exploitable crash.

    * 

      MFSA 2014-89 / CVE-2014-1594: Security researchers Byoungyoung Lee,
      Chengyu Song, and Taesoo Kim at the Georgia Tech Information Security
      Center (GTISC) reported a bad casting from the BasicThebesLayer to
      BasicContainerLayer, resulting in undefined behavior. This behavior
      is potentially exploitable with some compilers but no clear mechanism
      to trigger it through web content was identified.

    * 

      MFSA 2014-90 / CVE-2014-1595: Security researcher Kent Howard
      reported an Apple issue present in OS X 10.10 (Yosemite) where log
      files are created by the CoreGraphics framework of OS X in the /tmp
      local directory. These log files contain a record of all inputs into
      Mozilla programs during their operation. In versions of OS X from
      versions 10.6 through 10.9, the CoreGraphics had this logging ability
      but it was turned off by default. In OS X 10.10, this logging was
      turned on by default for some applications that use a custom memory
      allocator, such as jemalloc, because of an initialization bug in the
      framework. This issue has been addressed in Mozilla products by
      explicitly turning off the framework's logging of input events. On
      vulnerable systems, this issue can result in private data such as
      usernames, passwords, and other inputed data being saved to a log
      file on the local system.

Security Issues:

    * CVE-2014-1587
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587&gt;
    * CVE-2014-1588
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1588&gt;
    * CVE-2014-1589
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1589&gt;
    * CVE-2014-1590
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590&gt;
    * CVE-2014-1591
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1591&gt;
    * CVE-2014-1592
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592&gt;
    * CVE-2014-1593
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593&gt;
    * CVE-2014-1594
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594&gt;
    * CVE-2014-1595
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1595&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-08"/>
	<updated date="2014-12-08"/>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1587">CVE-2014-1587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1588/">CVE-2014-1588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1588">CVE-2014-1588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1589/">CVE-2014-1589 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1589">CVE-2014-1589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1590">CVE-2014-1590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1591/">CVE-2014-1591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1591">CVE-2014-1591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1592">CVE-2014-1592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1593">CVE-2014-1593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1594">CVE-2014-1594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1595/">CVE-2014-1595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1595">CVE-2014-1595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571420" comment="MozillaFirefox-31.3.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571421" comment="MozillaFirefox-translations-31.3.0esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218034" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="906111" ref_url="https://bugzilla.suse.com/906111" source="BUGZILLA"/>
		<reference ref_id="909563" ref_url="https://bugzilla.suse.com/909563" source="BUGZILLA"/>
		<reference ref_id="910647" ref_url="https://bugzilla.suse.com/910647" source="BUGZILLA"/>
		<reference ref_id="910669" ref_url="https://bugzilla.suse.com/910669" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1569" ref_url="https://www.suse.com/security/cve/CVE-2014-1569/" source="CVE"/>
		<reference ref_id="CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634/" source="CVE"/>
		<reference ref_id="CVE-2014-8636" ref_url="https://www.suse.com/security/cve/CVE-2014-8636/" source="CVE"/>
		<reference ref_id="CVE-2014-8637" ref_url="https://www.suse.com/security/cve/CVE-2014-8637/" source="CVE"/>
		<reference ref_id="CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638/" source="CVE"/>
		<reference ref_id="CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639/" source="CVE"/>
		<reference ref_id="CVE-2014-8640" ref_url="https://www.suse.com/security/cve/CVE-2014-8640/" source="CVE"/>
		<reference ref_id="CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 31.4.0ESR release, fixing bugs and 
security issues.

Mozilla NSS has been updated to 3.17.3, fixing a security issue and 
updating the root certificate list.

For more information, please see 
https://www.mozilla.org/en-US/security/advisories/
&lt;https://www.mozilla.org/en-US/security/advisories/&gt;

Security Issues:

    * CVE-2014-1569
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1569&gt;
    * CVE-2014-8634
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634&gt;
    * CVE-2014-8639
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639&gt;
    * CVE-2014-8641
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641&gt;
    * CVE-2014-8638
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638&gt;
    * CVE-2014-8636
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8636&gt;
    * CVE-2014-8637
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8637&gt;
    * CVE-2014-8640
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8640&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-15"/>
	<updated date="2015-01-15"/>
	<bugzilla href="https://bugzilla.suse.com/906111">SUSE bug 906111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909563">SUSE bug 909563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910647">SUSE bug 910647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1569/">CVE-2014-1569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1569">CVE-2014-1569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8634">CVE-2014-8634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8636/">CVE-2014-8636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8636">CVE-2014-8636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8637/">CVE-2014-8637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8637">CVE-2014-8637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8638">CVE-2014-8638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8639">CVE-2014-8639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8640/">CVE-2014-8640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8640">CVE-2014-8640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8641">CVE-2014-8641 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571422" comment="MozillaFirefox-31.4.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571423" comment="MozillaFirefox-translations-31.4.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571424" comment="libfreebl3-3.17.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571425" comment="libfreebl3-32bit-3.17.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571426" comment="mozilla-nss-3.17.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571427" comment="mozilla-nss-32bit-3.17.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576117" comment="mozilla-nss-devel-3.17.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571428" comment="mozilla-nss-tools-3.17.3-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218035" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="923534" ref_url="https://bugzilla.suse.com/923534" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817/" source="CVE"/>
		<reference ref_id="CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0593-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001319.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to the 31.5.3ESR release to fix two security 
vulnerabilities:

    * 

      MFSA 2015-29 / CVE-2015-0817: Security researcher ilxu1a reported,
      through HP Zero Day Initiative's Pwn2Own contest, a flaw in Mozilla's
      implementation of typed array bounds checking in JavaScript
      just-in-time compilation (JIT) and its management of bounds checking
      for heap access. This flaw can be leveraged into the reading and
      writing of memory allowing for arbitrary code execution on the local
      system.

    * 

      MFSA 2015-28 / CVE-2015-0818: Security researcher Mariusz Mlynski
      reported, through HP Zero Day Initiative's Pwn2Own contest, a method
      to run arbitrary scripts in a privileged context. This bypassed the
      same-origin policy protections by using a flaw in the processing of
      SVG format content navigation.

Security Issues:

    * CVE-2015-0817
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817&gt;
    * CVE-2015-0818
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-24"/>
	<updated date="2015-03-24"/>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0817">CVE-2015-0817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0818">CVE-2015-0818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571429" comment="MozillaFirefox-31.5.3esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571430" comment="MozillaFirefox-translations-31.5.3esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218036" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="943557" ref_url="https://bugzilla.suse.com/943557" source="BUGZILLA"/>
		<reference ref_id="943558" ref_url="https://bugzilla.suse.com/943558" source="BUGZILLA"/>
		<reference ref_id="943608" ref_url="https://bugzilla.suse.com/943608" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4497" ref_url="https://www.suse.com/security/cve/CVE-2015-4497/" source="CVE"/>
		<reference ref_id="CVE-2015-4498" ref_url="https://www.suse.com/security/cve/CVE-2015-4498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001576.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to 38.2.1 ESR, fixing two severe security bugs. (bsc#943608)

* MFSA 2015-94/CVE-2015-4497 (bsc#943557): Use-after-free when resizing canvas element during restyling
* MFSA 2015-95/CVE-2015-4498 (bsc#943558): Add-on notification bypass through data URLs
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-04"/>
	<updated date="2015-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/943557">SUSE bug 943557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943558">SUSE bug 943558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943608">SUSE bug 943608</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4497/">CVE-2015-4497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4497">CVE-2015-4497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4498/">CVE-2015-4498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4498">CVE-2015-4498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571433" comment="MozillaFirefox-38.2.1esr-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571434" comment="MozillaFirefox-translations-38.2.1esr-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218037" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="947003" ref_url="https://bugzilla.suse.com/947003" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<description>

Mozilla Firefox was updated to version 38.3.0 ESR (bsc#947003),
fixing bugs and security issues.

* MFSA 2015-96/CVE-2015-4500/CVE-2015-4501
  Miscellaneous memory safety hazards (rv:41.0 / rv:38.3)
* MFSA 2015-101/CVE-2015-4506
  Buffer overflow in libvpx while parsing vp9 format video
* MFSA 2015-105/CVE-2015-4511
  Buffer overflow while decoding WebM video
* MFSA 2015-106/CVE-2015-4509
  Use-after-free while manipulating HTML media content
* MFSA 2015-110/CVE-2015-4519
  Dragging and dropping images exposes final URL after
  redirects
* MFSA 2015-111/CVE-2015-4520
  Errors in the handling of CORS preflight request headers
* MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522
  CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177
  CVE-2015-7180
  Vulnerabilities found through code inspection

More details can be found on
        https://www.mozilla.org/en-US/security/advisories/

The Mozilla NSPR library was updated to version 4.10.9, fixing various bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-23"/>
	<updated date="2015-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4500">CVE-2015-4500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4501">CVE-2015-4501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4506">CVE-2015-4506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4509">CVE-2015-4509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4511">CVE-2015-4511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4517">CVE-2015-4517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4519">CVE-2015-4519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4520">CVE-2015-4520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4521">CVE-2015-4521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4522">CVE-2015-4522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7174">CVE-2015-7174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7175">CVE-2015-7175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7176">CVE-2015-7176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7177">CVE-2015-7177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7180">CVE-2015-7180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576118" comment="MozillaFirefox-38.3.0esr-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576119" comment="MozillaFirefox-translations-38.3.0esr-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576120" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576121" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576122" comment="mozilla-nspr-devel-4.10.9-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218038" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="908275" ref_url="https://bugzilla.suse.com/908275" source="BUGZILLA"/>
		<reference ref_id="952810" ref_url="https://bugzilla.suse.com/952810" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001675.html" source="SUSE-SU"/>
		<description>

This Mozilla Firefox, NSS and NSPR update fixes the following security
and non security issues.

- mozilla-nspr was updated to version 4.10.10 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7183
    (bmo#1205157)
    NSPR memory corruption issues

- mozilla-nss was updated to 3.19.2.1 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182
    (bmo#1192028, bmo#1202868)
    NSS and NSPR memory corruption issues

- MozillaFirefox was updated to 38.4.0 ESR (bsc#952810)
  * MFSA 2015-116/CVE-2015-4513
    (bmo#1107011, bmo#1191942, bmo#1193038, bmo#1204580,
     bmo#1204669, bmo#1204700, bmo#1205707, bmo#1206564,
     bmo#1208665, bmo#1209471, bmo#1213979)
    Miscellaneous memory safety hazards (rv:42.0 / rv:38.4)
  * MFSA 2015-122/CVE-2015-7188
    (bmo#1199430)
    Trailing whitespace in IP address hostnames can bypass
    same-origin policy
  * MFSA 2015-123/CVE-2015-7189
    (bmo#1205900)
    Buffer overflow during image interactions in canvas
  * MFSA 2015-127/CVE-2015-7193
    (bmo#1210302)
    CORS preflight is bypassed when non-standard Content-Type
    headers are received
  * MFSA 2015-128/CVE-2015-7194
    (bmo#1211262)
    Memory corruption in libjar through zip files
  * MFSA 2015-130/CVE-2015-7196
    (bmo#1140616)
    JavaScript garbage collection crash with Java applet
  * MFSA 2015-131/CVE-2015-7198/CVE-2015-7199/CVE-2015-7200
    (bmo#1204061, bmo#1188010, bmo#1204155)
    Vulnerabilities found through code inspection
  * MFSA 2015-132/CVE-2015-7197
    (bmo#1204269)
    Mixed content WebSocket policy bypass through workers
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182/CVE-2015-7183
    (bmo#1202868, bmo#1192028, bmo#1205157)
    NSS and NSPR memory corruption issues
- fix printing on landscape media (bsc#908275)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-12"/>
	<updated date="2015-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/908275">SUSE bug 908275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4513">CVE-2015-4513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7181">CVE-2015-7181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7182">CVE-2015-7182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7183">CVE-2015-7183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7188">CVE-2015-7188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7189">CVE-2015-7189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7193">CVE-2015-7193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7194">CVE-2015-7194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7196">CVE-2015-7196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7197">CVE-2015-7197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7198">CVE-2015-7198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7199">CVE-2015-7199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7200">CVE-2015-7200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576123" comment="MozillaFirefox-38.4.0esr-25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576124" comment="MozillaFirefox-branding-SLED-38-12.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576125" comment="MozillaFirefox-translations-38.4.0esr-25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576126" comment="libfreebl3-3.19.2.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576127" comment="libfreebl3-32bit-3.19.2.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576128" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576129" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576130" comment="mozilla-nspr-devel-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576131" comment="mozilla-nss-3.19.2.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576132" comment="mozilla-nss-32bit-3.19.2.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576133" comment="mozilla-nss-devel-3.19.2.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576134" comment="mozilla-nss-tools-3.19.2.1-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218039" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="969894" ref_url="https://bugzilla.suse.com/969894" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952/" source="CVE"/>
		<reference ref_id="CVE-2016-1953" ref_url="https://www.suse.com/security/cve/CVE-2016-1953/" source="CVE"/>
		<reference ref_id="CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954/" source="CVE"/>
		<reference ref_id="CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957/" source="CVE"/>
		<reference ref_id="CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958/" source="CVE"/>
		<reference ref_id="CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960/" source="CVE"/>
		<reference ref_id="CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961/" source="CVE"/>
		<reference ref_id="CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962/" source="CVE"/>
		<reference ref_id="CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964/" source="CVE"/>
		<reference ref_id="CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965/" source="CVE"/>
		<reference ref_id="CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966/" source="CVE"/>
		<reference ref_id="CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974/" source="CVE"/>
		<reference ref_id="CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977/" source="CVE"/>
		<reference ref_id="CVE-2016-1978" ref_url="https://www.suse.com/security/cve/CVE-2016-1978/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790/" source="CVE"/>
		<reference ref_id="CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791/" source="CVE"/>
		<reference ref_id="CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792/" source="CVE"/>
		<reference ref_id="CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793/" source="CVE"/>
		<reference ref_id="CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794/" source="CVE"/>
		<reference ref_id="CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795/" source="CVE"/>
		<reference ref_id="CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796/" source="CVE"/>
		<reference ref_id="CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797/" source="CVE"/>
		<reference ref_id="CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798/" source="CVE"/>
		<reference ref_id="CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799/" source="CVE"/>
		<reference ref_id="CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800/" source="CVE"/>
		<reference ref_id="CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801/" source="CVE"/>
		<reference ref_id="CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox, mozilla-nspr, mozilla-nss fixes the following issues:

Mozilla Firefox was updated to 38.7.0 ESR (bsc#969894), fixing
following security issues:
* MFSA 2016-16/CVE-2016-1952/CVE-2016-1953
  Miscellaneous memory safety hazards (rv:45.0 / rv:38.7)
* MFSA 2016-17/CVE-2016-1954
  Local file overwriting and potential privilege escalation
  through CSP reports
* MFSA 2016-20/CVE-2016-1957
  Memory leak in libstagefright when deleting an array during
  MP4 processing
* MFSA 2016-21/CVE-2016-1958
  Displayed page address can be overridden
* MFSA 2016-23/CVE-2016-1960
  Use-after-free in HTML5 string parser
* MFSA 2016-24/CVE-2016-1961
  Use-after-free in SetBody
* MFSA 2016-25/CVE-2016-1962
  Use-after-free when using multiple WebRTC data channels
* MFSA 2016-27/CVE-2016-1964
  Use-after-free during XML transformations
* MFSA 2016-28/CVE-2016-1965
  Addressbar spoofing though history navigation and Location
  protocol property
* MFSA 2016-31/CVE-2016-1966
  Memory corruption with malicious NPAPI plugin
* MFSA 2016-34/CVE-2016-1974
  Out-of-bounds read in HTML parser following a failed
  allocation
* MFSA 2016-35/CVE-2016-1950
  Buffer overflow during ASN.1 decoding in NSS
* MFSA 2016-37/CVE-2016-1977/CVE-2016-2790/CVE-2016-2791/
  CVE-2016-2792/CVE-2016-2793/CVE-2016-2794/CVE-2016-2795/
  CVE-2016-2796/CVE-2016-2797/CVE-2016-2798/CVE-2016-2799/
  CVE-2016-2800/CVE-2016-2801/CVE-2016-2802
  Font vulnerabilities in the Graphite 2 library

Mozilla NSPR was updated to version 4.12 (bsc#969894), fixing following bugs:
* added a PR_GetEnvSecure function, which attempts to detect if
  the program is being executed with elevated privileges, and
  returns NULL if detected. It is recommended to use this function
  in general purpose library code.
* fixed a memory allocation bug related to the PR_*printf functions
* exported API PR_DuplicateEnvironment, which had already been
  added in NSPR 4.10.9
* added support for FreeBSD aarch64
* several minor correctness and compatibility fixes

Mozilla NSS was updated to fix security issues (bsc#969894):
* MFSA 2016-15/CVE-2016-1978
  Use-after-free in NSS during SSL connections in low memory
* MFSA 2016-35/CVE-2016-1950
  Buffer overflow during ASN.1 decoding in NSS
* MFSA 2016-36/CVE-2016-1979
  Use-after-free during processing of DER encoded keys in NSS
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-30"/>
	<updated date="2016-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1950">CVE-2016-1950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1952">CVE-2016-1952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1953/">CVE-2016-1953 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1953">CVE-2016-1953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1954">CVE-2016-1954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1957">CVE-2016-1957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1958">CVE-2016-1958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1960">CVE-2016-1960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1961">CVE-2016-1961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1962">CVE-2016-1962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1964">CVE-2016-1964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1965">CVE-2016-1965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1966">CVE-2016-1966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1974">CVE-2016-1974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1977">CVE-2016-1977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1978/">CVE-2016-1978 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1978">CVE-2016-1978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1979">CVE-2016-1979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2790">CVE-2016-2790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2791">CVE-2016-2791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2792">CVE-2016-2792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2793">CVE-2016-2793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2794">CVE-2016-2794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2795">CVE-2016-2795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2796">CVE-2016-2796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2797">CVE-2016-2797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2798">CVE-2016-2798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2799">CVE-2016-2799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2800">CVE-2016-2800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2801">CVE-2016-2801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2802">CVE-2016-2802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576135" comment="MozillaFirefox-38.7.0esr-36.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576136" comment="MozillaFirefox-translations-38.7.0esr-36.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576137" comment="libfreebl3-3.20.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576138" comment="libfreebl3-32bit-3.20.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576139" comment="mozilla-nspr-4.12-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576140" comment="mozilla-nspr-32bit-4.12-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576141" comment="mozilla-nspr-devel-4.12-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576142" comment="mozilla-nss-3.20.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576143" comment="mozilla-nss-32bit-3.20.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576144" comment="mozilla-nss-devel-3.20.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576145" comment="mozilla-nss-tools-3.20.2-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218040" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="900941" ref_url="https://bugzilla.suse.com/900941" source="BUGZILLA"/>
		<reference ref_id="905056" ref_url="https://bugzilla.suse.com/905056" source="BUGZILLA"/>
		<reference ref_id="905528" ref_url="https://bugzilla.suse.com/905528" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1574" ref_url="https://www.suse.com/security/cve/CVE-2014-1574/" source="CVE"/>
		<reference ref_id="CVE-2014-1575" ref_url="https://www.suse.com/security/cve/CVE-2014-1575/" source="CVE"/>
		<reference ref_id="CVE-2014-1576" ref_url="https://www.suse.com/security/cve/CVE-2014-1576/" source="CVE"/>
		<reference ref_id="CVE-2014-1577" ref_url="https://www.suse.com/security/cve/CVE-2014-1577/" source="CVE"/>
		<reference ref_id="CVE-2014-1578" ref_url="https://www.suse.com/security/cve/CVE-2014-1578/" source="CVE"/>
		<reference ref_id="CVE-2014-1581" ref_url="https://www.suse.com/security/cve/CVE-2014-1581/" source="CVE"/>
		<reference ref_id="CVE-2014-1583" ref_url="https://www.suse.com/security/cve/CVE-2014-1583/" source="CVE"/>
		<reference ref_id="CVE-2014-1585" ref_url="https://www.suse.com/security/cve/CVE-2014-1585/" source="CVE"/>
		<reference ref_id="CVE-2014-1586" ref_url="https://www.suse.com/security/cve/CVE-2014-1586/" source="CVE"/>
		<description>

This version update of Mozilla Firefox to 31.2.0ESR brings improvements, 
stability fixes and also security fixes for the following CVEs:

CVE-2014-1574, CVE-2014-1575, CVE-2014-1576 ,CVE-2014-1577, CVE-2014-1578, 
CVE-2014-1581, CVE-2014-1583, CVE-2014-1585, CVE-2014-1586

It also disables SSLv3 by default to mitigate the protocol downgrade attack 
known as POODLE.

This update fixes some regressions introduced by the previously released 
update.

Security Issues:

    * CVE-2014-1574
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574&gt;
    * CVE-2014-1575
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1575&gt;
    * CVE-2014-1576
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576&gt;
    * CVE-2014-1577
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577&gt;
    * CVE-2014-1578
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578&gt;
    * CVE-2014-1581
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581&gt;
    * CVE-2014-1583
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583&gt;
    * CVE-2014-1585
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585&gt;
    * CVE-2014-1586
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-15"/>
	<updated date="2014-11-15"/>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905056">SUSE bug 905056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905528">SUSE bug 905528</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1574/">CVE-2014-1574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1574">CVE-2014-1574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1575/">CVE-2014-1575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1575">CVE-2014-1575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1576/">CVE-2014-1576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1576">CVE-2014-1576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1577/">CVE-2014-1577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1577">CVE-2014-1577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1578/">CVE-2014-1578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1578">CVE-2014-1578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1581/">CVE-2014-1581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1581">CVE-2014-1581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1583/">CVE-2014-1583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1583">CVE-2014-1583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1585/">CVE-2014-1585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1585">CVE-2014-1585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1586/">CVE-2014-1586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1586">CVE-2014-1586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571585" comment="MozillaFirefox-31.2.0esr-0.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571586" comment="MozillaFirefox-branding-SLED-31.0-0.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571587" comment="MozillaFirefox-translations-31.2.0esr-0.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571588" comment="libfreebl3-3.17.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571589" comment="libfreebl3-32bit-3.17.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571590" comment="mozilla-nspr-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571591" comment="mozilla-nspr-32bit-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576146" comment="mozilla-nspr-devel-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571592" comment="mozilla-nss-3.17.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571593" comment="mozilla-nss-32bit-3.17.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576147" comment="mozilla-nss-devel-3.17.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571594" comment="mozilla-nss-tools-3.17.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218041" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="791666" ref_url="https://bugzilla.suse.com/791666" source="BUGZILLA"/>
		<reference ref_id="797313" ref_url="https://bugzilla.suse.com/797313" source="BUGZILLA"/>
		<reference ref_id="797515" ref_url="https://bugzilla.suse.com/797515" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-4966" ref_url="https://www.suse.com/security/cve/CVE-2011-4966/" source="CVE"/>
		<description>

This update for freeradius-server provides the following fixes and 
improvements:

    * Increase the vendor IDs limit from 32767 to 65535 (bnc#791666)
    * Fix issues with escaping special characters in password (bnc#797515)
    * Respect expired passwords and accounts when using the unix module
      (bnc#797313, CVE-2011-4966).

Security Issue reference:

    * CVE-2011-4966
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4966&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-01-23"/>
	<updated date="2013-01-23"/>
	<bugzilla href="https://bugzilla.suse.com/791666">SUSE bug 791666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797313">SUSE bug 797313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797515">SUSE bug 797515</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4966/">CVE-2011-4966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4966">CVE-2011-4966 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576148" comment="freeradius-server-2.1.1-7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576149" comment="freeradius-server-dialupadmin-2.1.1-7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576150" comment="freeradius-server-doc-2.1.1-7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576151" comment="freeradius-server-libs-2.1.1-7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576152" comment="freeradius-server-utils-2.1.1-7.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576148" comment="freeradius-server-2.1.1-7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576149" comment="freeradius-server-dialupadmin-2.1.1-7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576150" comment="freeradius-server-doc-2.1.1-7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576151" comment="freeradius-server-libs-2.1.1-7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576152" comment="freeradius-server-utils-2.1.1-7.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218042" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="795826" ref_url="https://bugzilla.suse.com/795826" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668/" source="CVE"/>
		<reference ref_id="CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669/" source="CVE"/>
		<description>

This update fixes:

    * OOB access in bdf_free_font() and _bdf_parse_glyphs() (CVE-2012-5668
      and CVE-2012-5669)

As well as the following non-security bugs:

    * [bdf] Savannah bug #37905.
          o src/bdf/bdflib.c (_bdf_parse_start): Reset `props_size' to zero
            in case of allocation error; this value gets used in a loop in
    * [bdf] Fix Savannah bug #37906.
          o src/bdf/bdflib.c (_bdf_parse_glyphs): Use correct array size
            for checking `glyph_enc'.

Security Issue references:

    * CVE-2012-5668
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668&gt;
    * CVE-2012-5669
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-01-15"/>
	<updated date="2013-01-15"/>
	<bugzilla href="https://bugzilla.suse.com/795826">SUSE bug 795826</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5668">CVE-2012-5668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5669">CVE-2012-5669 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576153" comment="freetype2-2.3.7-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576154" comment="freetype2-32bit-2.3.7-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576155" comment="freetype2-x86-2.3.7-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576156" comment="ft2demos-2.3.7-25.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576153" comment="freetype2-2.3.7-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576154" comment="freetype2-32bit-2.3.7-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576155" comment="freetype2-x86-2.3.7-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576156" comment="ft2demos-2.3.7-25.32.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218043" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="779700" ref_url="https://bugzilla.suse.com/779700" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4405" ref_url="https://www.suse.com/security/cve/CVE-2012-4405/" source="CVE"/>
		<description>

This update fixes an array index error leading to a heap-based buffer 
overflow in ghostscript-library. CVE-2012-4405 has been assigned to this 
issue.

Security Issue reference:

    * CVE-2012-4405
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4405&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-09-12"/>
	<updated date="2012-09-12"/>
	<bugzilla href="https://bugzilla.suse.com/779700">SUSE bug 779700</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4405/">CVE-2012-4405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4405">CVE-2012-4405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576157" comment="ghostscript-fonts-other-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576158" comment="ghostscript-fonts-rus-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576159" comment="ghostscript-fonts-std-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576160" comment="ghostscript-library-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576161" comment="ghostscript-omni-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576162" comment="ghostscript-x11-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576163" comment="libgimpprint-4.2.7-32.34.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576157" comment="ghostscript-fonts-other-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576158" comment="ghostscript-fonts-rus-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576159" comment="ghostscript-fonts-std-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576160" comment="ghostscript-library-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576161" comment="ghostscript-omni-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576162" comment="ghostscript-x11-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576163" comment="libgimpprint-4.2.7-32.34.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218044" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1001951" ref_url="https://bugzilla.suse.com/1001951" source="BUGZILLA"/>
		<reference ref_id="939342" ref_url="https://bugzilla.suse.com/939342" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5653" ref_url="https://www.suse.com/security/cve/CVE-2013-5653/" source="CVE"/>
		<reference ref_id="CVE-2015-3228" ref_url="https://www.suse.com/security/cve/CVE-2015-3228/" source="CVE"/>
		<reference ref_id="CVE-2016-7977" ref_url="https://www.suse.com/security/cve/CVE-2016-7977/" source="CVE"/>
		<reference ref_id="CVE-2016-7979" ref_url="https://www.suse.com/security/cve/CVE-2016-7979/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002322.html" source="SUSE-SU"/>
		<description>

This update for ghostscript-library fixes the following issues:

- Multiple security vulnerabilities have been discovered where ghostscript's
  '-dsafer' flag did not provide sufficient protection against unintended
  access to the file system. Thus, a machine that would process a specially
  crafted Postscript file would potentially leak sensitive information to an
  attacker. (CVE-2013-5653, CVE-2016-7977, bsc#1001951)

- Insufficient validation of the type of input in .initialize_dsc_parser used
  to allow remote code execution. (CVE-2016-7979, bsc#1001951)

- An integer overflow in the gs_heap_alloc_bytes function used to allow remote
  attackers to cause a denial of service (crash) via specially  crafted
  Postscript files. (CVE-2015-3228, boo#939342)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-11"/>
	<updated date="2016-10-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1001951">SUSE bug 1001951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939342">SUSE bug 939342</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5653/">CVE-2013-5653 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5653">CVE-2013-5653 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3228/">CVE-2015-3228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3228">CVE-2015-3228 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7977/">CVE-2016-7977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7977">CVE-2016-7977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7979/">CVE-2016-7979 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7979">CVE-2016-7979 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576164" comment="ghostscript-fonts-other-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576165" comment="ghostscript-fonts-rus-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576166" comment="ghostscript-fonts-std-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576167" comment="ghostscript-library-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576168" comment="ghostscript-omni-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576169" comment="ghostscript-x11-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576170" comment="libgimpprint-4.2.7-32.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218045" version="1" class="patch">
	<metadata>
		<title>Security update for glibc</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="684534" ref_url="https://bugzilla.suse.com/684534" source="BUGZILLA"/>
		<reference ref_id="691365" ref_url="https://bugzilla.suse.com/691365" source="BUGZILLA"/>
		<reference ref_id="741345" ref_url="https://bugzilla.suse.com/741345" source="BUGZILLA"/>
		<reference ref_id="743689" ref_url="https://bugzilla.suse.com/743689" source="BUGZILLA"/>
		<reference ref_id="744996" ref_url="https://bugzilla.suse.com/744996" source="BUGZILLA"/>
		<reference ref_id="745658" ref_url="https://bugzilla.suse.com/745658" source="BUGZILLA"/>
		<reference ref_id="746824" ref_url="https://bugzilla.suse.com/746824" source="BUGZILLA"/>
		<reference ref_id="747768" ref_url="https://bugzilla.suse.com/747768" source="BUGZILLA"/>
		<reference ref_id="750741" ref_url="https://bugzilla.suse.com/750741" source="BUGZILLA"/>
		<reference ref_id="760795" ref_url="https://bugzilla.suse.com/760795" source="BUGZILLA"/>
		<reference ref_id="763512" ref_url="https://bugzilla.suse.com/763512" source="BUGZILLA"/>
		<reference ref_id="767266" ref_url="https://bugzilla.suse.com/767266" source="BUGZILLA"/>
		<reference ref_id="770891" ref_url="https://bugzilla.suse.com/770891" source="BUGZILLA"/>
		<reference ref_id="775690" ref_url="https://bugzilla.suse.com/775690" source="BUGZILLA"/>
		<reference ref_id="777233" ref_url="https://bugzilla.suse.com/777233" source="BUGZILLA"/>
		<reference ref_id="779320" ref_url="https://bugzilla.suse.com/779320" source="BUGZILLA"/>
		<reference ref_id="783060" ref_url="https://bugzilla.suse.com/783060" source="BUGZILLA"/>
		<reference ref_id="785041" ref_url="https://bugzilla.suse.com/785041" source="BUGZILLA"/>
		<reference ref_id="791928" ref_url="https://bugzilla.suse.com/791928" source="BUGZILLA"/>
		<reference ref_id="793146" ref_url="https://bugzilla.suse.com/793146" source="BUGZILLA"/>
		<reference ref_id="795129" ref_url="https://bugzilla.suse.com/795129" source="BUGZILLA"/>
		<reference ref_id="801246" ref_url="https://bugzilla.suse.com/801246" source="BUGZILLA"/>
		<reference ref_id="811979" ref_url="https://bugzilla.suse.com/811979" source="BUGZILLA"/>
		<reference ref_id="813121" ref_url="https://bugzilla.suse.com/813121" source="BUGZILLA"/>
		<reference ref_id="818628" ref_url="https://bugzilla.suse.com/818628" source="BUGZILLA"/>
		<reference ref_id="819347" ref_url="https://bugzilla.suse.com/819347" source="BUGZILLA"/>
		<reference ref_id="822210" ref_url="https://bugzilla.suse.com/822210" source="BUGZILLA"/>
		<reference ref_id="827811" ref_url="https://bugzilla.suse.com/827811" source="BUGZILLA"/>
		<reference ref_id="828235" ref_url="https://bugzilla.suse.com/828235" source="BUGZILLA"/>
		<reference ref_id="828637" ref_url="https://bugzilla.suse.com/828637" source="BUGZILLA"/>
		<reference ref_id="830268" ref_url="https://bugzilla.suse.com/830268" source="BUGZILLA"/>
		<reference ref_id="834594" ref_url="https://bugzilla.suse.com/834594" source="BUGZILLA"/>
		<reference ref_id="836746" ref_url="https://bugzilla.suse.com/836746" source="BUGZILLA"/>
		<reference ref_id="839870" ref_url="https://bugzilla.suse.com/839870" source="BUGZILLA"/>
		<reference ref_id="844309" ref_url="https://bugzilla.suse.com/844309" source="BUGZILLA"/>
		<reference ref_id="864081" ref_url="https://bugzilla.suse.com/864081" source="BUGZILLA"/>
		<reference ref_id="882600" ref_url="https://bugzilla.suse.com/882600" source="BUGZILLA"/>
		<reference ref_id="887022" ref_url="https://bugzilla.suse.com/887022" source="BUGZILLA"/>
		<reference ref_id="892073" ref_url="https://bugzilla.suse.com/892073" source="BUGZILLA"/>
		<reference ref_id="894553" ref_url="https://bugzilla.suse.com/894553" source="BUGZILLA"/>
		<reference ref_id="894556" ref_url="https://bugzilla.suse.com/894556" source="BUGZILLA"/>
		<reference ref_id="906371" ref_url="https://bugzilla.suse.com/906371" source="BUGZILLA"/>
		<reference ref_id="909053" ref_url="https://bugzilla.suse.com/909053" source="BUGZILLA"/>
		<reference ref_id="910599" ref_url="https://bugzilla.suse.com/910599" source="BUGZILLA"/>
		<reference ref_id="913646" ref_url="https://bugzilla.suse.com/913646" source="BUGZILLA"/>
		<reference ref_id="915526" ref_url="https://bugzilla.suse.com/915526" source="BUGZILLA"/>
		<reference ref_id="916222" ref_url="https://bugzilla.suse.com/916222" source="BUGZILLA"/>
		<reference ref_id="918233" ref_url="https://bugzilla.suse.com/918233" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0864" ref_url="https://www.suse.com/security/cve/CVE-2012-0864/" source="CVE"/>
		<reference ref_id="CVE-2012-3404" ref_url="https://www.suse.com/security/cve/CVE-2012-3404/" source="CVE"/>
		<reference ref_id="CVE-2012-3405" ref_url="https://www.suse.com/security/cve/CVE-2012-3405/" source="CVE"/>
		<reference ref_id="CVE-2012-3406" ref_url="https://www.suse.com/security/cve/CVE-2012-3406/" source="CVE"/>
		<reference ref_id="CVE-2012-3480" ref_url="https://www.suse.com/security/cve/CVE-2012-3480/" source="CVE"/>
		<reference ref_id="CVE-2012-4412" ref_url="https://www.suse.com/security/cve/CVE-2012-4412/" source="CVE"/>
		<reference ref_id="CVE-2012-6656" ref_url="https://www.suse.com/security/cve/CVE-2012-6656/" source="CVE"/>
		<reference ref_id="CVE-2013-0242" ref_url="https://www.suse.com/security/cve/CVE-2013-0242/" source="CVE"/>
		<reference ref_id="CVE-2013-1914" ref_url="https://www.suse.com/security/cve/CVE-2013-1914/" source="CVE"/>
		<reference ref_id="CVE-2013-4237" ref_url="https://www.suse.com/security/cve/CVE-2013-4237/" source="CVE"/>
		<reference ref_id="CVE-2013-4332" ref_url="https://www.suse.com/security/cve/CVE-2013-4332/" source="CVE"/>
		<reference ref_id="CVE-2013-4357" ref_url="https://www.suse.com/security/cve/CVE-2013-4357/" source="CVE"/>
		<reference ref_id="CVE-2013-4788" ref_url="https://www.suse.com/security/cve/CVE-2013-4788/" source="CVE"/>
		<reference ref_id="CVE-2013-7423" ref_url="https://www.suse.com/security/cve/CVE-2013-7423/" source="CVE"/>
		<reference ref_id="CVE-2014-5119" ref_url="https://www.suse.com/security/cve/CVE-2014-5119/" source="CVE"/>
		<reference ref_id="CVE-2014-6040" ref_url="https://www.suse.com/security/cve/CVE-2014-6040/" source="CVE"/>
		<reference ref_id="CVE-2014-7817" ref_url="https://www.suse.com/security/cve/CVE-2014-7817/" source="CVE"/>
		<reference ref_id="CVE-2014-9402" ref_url="https://www.suse.com/security/cve/CVE-2014-9402/" source="CVE"/>
		<reference ref_id="CVE-2015-0235" ref_url="https://www.suse.com/security/cve/CVE-2015-0235/" source="CVE"/>
		<reference ref_id="CVE-2015-1472" ref_url="https://www.suse.com/security/cve/CVE-2015-1472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001305.html" source="SUSE-SU"/>
		<description>

This update for glibc contains the following fixes:

    * Fix integer overflows in malloc (CVE-2013-4332, bnc#839870)
    * Fix buffer overflow in glob (bnc#691365)
    * Fix buffer overflow in strcoll (CVE-2012-4412, bnc#779320)
    * Update mount flags in &lt;sys/mount.h&gt; (bnc#791928)
    * Fix buffer overrun in regexp matcher (CVE-2013-0242, bnc#801246)
    * Fix memory leaks in dlopen (bnc#811979)
    * Fix stack overflow in getaddrinfo with many results (CVE-2013-1914,
      bnc#813121)
    * Fix check for XEN build in glibc_post_upgrade that causes missing
      init re-exec (bnc#818628)
    * Don't raise UNDERFLOW in tan/tanf for small but normal argument
      (bnc#819347)
    * Properly cross page boundary in SSE4.2 implementation of strcmp
      (bnc#822210)
    * Fix robust mutex handling after fork (bnc#827811)
    * Fix missing character in IBM-943 charset (bnc#828235)
    * Fix use of alloca in gaih_inet (bnc#828637)
    * Initialize pointer guard also in static executables (CVE-2013-4788,
      bnc#830268)
    * Fix readdir_r with long file names (CVE-2013-4237, bnc#834594).

Security Issues:

    * CVE-2012-4412
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412&gt;
    * CVE-2013-0242
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242&gt;
    * CVE-2013-1914
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914&gt;
    * CVE-2013-4237
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237&gt;
    * CVE-2013-4332
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332&gt;
    * CVE-2013-4788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-13"/>
	<updated date="2013-09-13"/>
	<bugzilla href="https://bugzilla.suse.com/684534">SUSE bug 684534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/691365">SUSE bug 691365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/741345">SUSE bug 741345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/743689">SUSE bug 743689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744996">SUSE bug 744996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745658">SUSE bug 745658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746824">SUSE bug 746824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747768">SUSE bug 747768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750741">SUSE bug 750741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760795">SUSE bug 760795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763512">SUSE bug 763512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767266">SUSE bug 767266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770891">SUSE bug 770891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775690">SUSE bug 775690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777233">SUSE bug 777233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779320">SUSE bug 779320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/783060">SUSE bug 783060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785041">SUSE bug 785041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791928">SUSE bug 791928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/793146">SUSE bug 793146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795129">SUSE bug 795129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801246">SUSE bug 801246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/811979">SUSE bug 811979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813121">SUSE bug 813121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818628">SUSE bug 818628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819347">SUSE bug 819347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822210">SUSE bug 822210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827811">SUSE bug 827811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828235">SUSE bug 828235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828637">SUSE bug 828637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/830268">SUSE bug 830268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834594">SUSE bug 834594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836746">SUSE bug 836746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839870">SUSE bug 839870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844309">SUSE bug 844309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864081">SUSE bug 864081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882600">SUSE bug 882600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887022">SUSE bug 887022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892073">SUSE bug 892073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894553">SUSE bug 894553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894556">SUSE bug 894556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906371">SUSE bug 906371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909053">SUSE bug 909053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910599">SUSE bug 910599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913646">SUSE bug 913646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915526">SUSE bug 915526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916222">SUSE bug 916222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918233">SUSE bug 918233</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0864/">CVE-2012-0864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0864">CVE-2012-0864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3404/">CVE-2012-3404 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3404">CVE-2012-3404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3405/">CVE-2012-3405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3405">CVE-2012-3405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3406/">CVE-2012-3406 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3406">CVE-2012-3406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3480/">CVE-2012-3480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3480">CVE-2012-3480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4412/">CVE-2012-4412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4412">CVE-2012-4412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6656/">CVE-2012-6656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6656">CVE-2012-6656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0242/">CVE-2013-0242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0242">CVE-2013-0242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1914/">CVE-2013-1914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1914">CVE-2013-1914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4237/">CVE-2013-4237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4237">CVE-2013-4237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4332/">CVE-2013-4332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4332">CVE-2013-4332 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4357/">CVE-2013-4357 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4357">CVE-2013-4357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4788/">CVE-2013-4788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4788">CVE-2013-4788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7423/">CVE-2013-7423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7423">CVE-2013-7423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5119/">CVE-2014-5119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5119">CVE-2014-5119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6040/">CVE-2014-6040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6040">CVE-2014-6040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7817/">CVE-2014-7817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7817">CVE-2014-7817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9402/">CVE-2014-9402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9402">CVE-2014-9402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0235/">CVE-2015-0235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0235">CVE-2015-0235 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1472/">CVE-2015-1472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1472">CVE-2015-1472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576171" comment="glibc-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576172" comment="glibc-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576173" comment="glibc-devel-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576174" comment="glibc-devel-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576175" comment="glibc-html-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576176" comment="glibc-i18ndata-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576177" comment="glibc-info-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576178" comment="glibc-locale-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576179" comment="glibc-locale-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576180" comment="glibc-locale-x86-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576181" comment="glibc-profile-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576182" comment="glibc-profile-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576183" comment="glibc-profile-x86-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576184" comment="glibc-x86-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576185" comment="nscd-2.11.3-17.45.49.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576171" comment="glibc-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576172" comment="glibc-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576173" comment="glibc-devel-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576174" comment="glibc-devel-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576175" comment="glibc-html-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576176" comment="glibc-i18ndata-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576177" comment="glibc-info-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576178" comment="glibc-locale-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576179" comment="glibc-locale-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576180" comment="glibc-locale-x86-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576181" comment="glibc-profile-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576182" comment="glibc-profile-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576183" comment="glibc-profile-x86-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576184" comment="glibc-x86-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576185" comment="nscd-2.11.3-17.45.49.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576171" comment="glibc-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576172" comment="glibc-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576173" comment="glibc-devel-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576174" comment="glibc-devel-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576175" comment="glibc-html-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576176" comment="glibc-i18ndata-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576177" comment="glibc-info-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576178" comment="glibc-locale-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576179" comment="glibc-locale-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576180" comment="glibc-locale-x86-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576181" comment="glibc-profile-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576182" comment="glibc-profile-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576183" comment="glibc-profile-x86-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576184" comment="glibc-x86-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576185" comment="nscd-2.11.3-17.45.49.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218046" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="830257" ref_url="https://bugzilla.suse.com/830257" source="BUGZILLA"/>
		<reference ref_id="847227" ref_url="https://bugzilla.suse.com/847227" source="BUGZILLA"/>
		<reference ref_id="863499" ref_url="https://bugzilla.suse.com/863499" source="BUGZILLA"/>
		<reference ref_id="892065" ref_url="https://bugzilla.suse.com/892065" source="BUGZILLA"/>
		<reference ref_id="918187" ref_url="https://bugzilla.suse.com/918187" source="BUGZILLA"/>
		<reference ref_id="920338" ref_url="https://bugzilla.suse.com/920338" source="BUGZILLA"/>
		<reference ref_id="927080" ref_url="https://bugzilla.suse.com/927080" source="BUGZILLA"/>
		<reference ref_id="945779" ref_url="https://bugzilla.suse.com/945779" source="BUGZILLA"/>
		<reference ref_id="950944" ref_url="https://bugzilla.suse.com/950944" source="BUGZILLA"/>
		<reference ref_id="961721" ref_url="https://bugzilla.suse.com/961721" source="BUGZILLA"/>
		<reference ref_id="962736" ref_url="https://bugzilla.suse.com/962736" source="BUGZILLA"/>
		<reference ref_id="962737" ref_url="https://bugzilla.suse.com/962737" source="BUGZILLA"/>
		<reference ref_id="962738" ref_url="https://bugzilla.suse.com/962738" source="BUGZILLA"/>
		<reference ref_id="962739" ref_url="https://bugzilla.suse.com/962739" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207/" source="CVE"/>
		<reference ref_id="CVE-2013-4458" ref_url="https://www.suse.com/security/cve/CVE-2013-4458/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001882.html" source="SUSE-SU"/>
		<description>

This update for glibc fixes the following issues:

- CVE-2015-7547: A stack-based buffer overflow in getaddrinfo allowed remote attackers to cause a crash or execute arbitrary code via crafted and timed DNS responses (bsc#961721)
- CVE-2015-8777: Insufficient checking of LD_POINTER_GUARD environment variable allowed local attackers to bypass the pointer guarding protection of the dynamic loader on set-user-ID and set-group-ID programs (bsc#950944)
- CVE-2015-8776: Out-of-range time values passed to the strftime function may cause it to crash, leading to a denial of service, or potentially disclosure information (bsc#962736)
- CVE-2015-8778: Integer overflow in hcreate and hcreate_r could have caused an out-of-bound memory access. leading to application crashes or, potentially, arbitrary code execution (bsc#962737)
- CVE-2014-9761: A stack overflow (unbounded alloca) could have caused applications which process long strings with the nan function to crash or, potentially, execute arbitrary code. (bsc#962738)
- CVE-2015-8779: A stack overflow (unbounded alloca) in the catopen function could have caused applications which pass long strings to the catopen function to crash or, potentially execute arbitrary code. (bsc#962739)
- CVE-2013-2207: pt_chown tricked into granting access to another users pseudo-terminal (bsc#830257)
- CVE-2013-4458: Stack (frame) overflow in getaddrinfo() when called with AF_INET6 (bsc#847227)
- CVE-2014-8121: denial of service issue in the NSS backends (bsc#918187)
- bsc#920338: Read past end of pattern in fnmatch
- CVE-2015-1781: buffer overflow in nss_dns (bsc#927080)

The following non-security bugs were fixed:

- bnc#892065: SIGSEV tst-setlocale3 in glibc-2.11.3-17.68.1
- bnc#863499: Memory leak in getaddrinfo when many RRs are returned 
- bsc#892065: Avoid unbound alloca in setenv
- bsc#945779: Properly reread entry after failure in nss_files getent function
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/830257">SUSE bug 830257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847227">SUSE bug 847227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863499">SUSE bug 863499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892065">SUSE bug 892065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918187">SUSE bug 918187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920338">SUSE bug 920338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927080">SUSE bug 927080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945779">SUSE bug 945779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950944">SUSE bug 950944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961721">SUSE bug 961721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962736">SUSE bug 962736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962737">SUSE bug 962737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962738">SUSE bug 962738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962739">SUSE bug 962739</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2207">CVE-2013-2207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4458/">CVE-2013-4458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4458">CVE-2013-4458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8121">CVE-2014-8121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9761">CVE-2014-9761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1781">CVE-2015-1781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7547">CVE-2015-7547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8776">CVE-2015-8776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8777">CVE-2015-8777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8778">CVE-2015-8778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8779">CVE-2015-8779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576186" comment="glibc-2.11.3-17.45.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576187" comment="glibc-32bit-2.11.3-17.45.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576188" comment="glibc-devel-2.11.3-17.45.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576189" comment="glibc-devel-32bit-2.11.3-17.45.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576190" comment="glibc-html-2.11.3-17.45.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576191" comment="glibc-i18ndata-2.11.3-17.45.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576192" comment="glibc-info-2.11.3-17.45.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576193" comment="glibc-locale-2.11.3-17.45.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576194" comment="glibc-locale-32bit-2.11.3-17.45.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576195" comment="glibc-profile-2.11.3-17.45.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576196" comment="glibc-profile-32bit-2.11.3-17.45.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576197" comment="nscd-2.11.3-17.45.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218047" version="1" class="patch">
	<metadata>
		<title>Security update for GnuTLS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="760265" ref_url="https://bugzilla.suse.com/760265" source="BUGZILLA"/>
		<reference ref_id="802651" ref_url="https://bugzilla.suse.com/802651" source="BUGZILLA"/>
		<reference ref_id="821818" ref_url="https://bugzilla.suse.com/821818" source="BUGZILLA"/>
		<reference ref_id="835760" ref_url="https://bugzilla.suse.com/835760" source="BUGZILLA"/>
		<reference ref_id="865804" ref_url="https://bugzilla.suse.com/865804" source="BUGZILLA"/>
		<reference ref_id="865993" ref_url="https://bugzilla.suse.com/865993" source="BUGZILLA"/>
		<reference ref_id="880730" ref_url="https://bugzilla.suse.com/880730" source="BUGZILLA"/>
		<reference ref_id="880910" ref_url="https://bugzilla.suse.com/880910" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1619" ref_url="https://www.suse.com/security/cve/CVE-2013-1619/" source="CVE"/>
		<reference ref_id="CVE-2013-2116" ref_url="https://www.suse.com/security/cve/CVE-2013-2116/" source="CVE"/>
		<reference ref_id="CVE-2014-0092" ref_url="https://www.suse.com/security/cve/CVE-2014-0092/" source="CVE"/>
		<reference ref_id="CVE-2014-3466" ref_url="https://www.suse.com/security/cve/CVE-2014-3466/" source="CVE"/>
		<reference ref_id="CVE-2014-3467" ref_url="https://www.suse.com/security/cve/CVE-2014-3467/" source="CVE"/>
		<reference ref_id="CVE-2014-3468" ref_url="https://www.suse.com/security/cve/CVE-2014-3468/" source="CVE"/>
		<reference ref_id="CVE-2014-3469" ref_url="https://www.suse.com/security/cve/CVE-2014-3469/" source="CVE"/>
		<description>

This update of GnuTLS fixes a regression introduced by the previous update 
that could have resulted in a Denial of Service (application crash).

Security Issue reference:

    * CVE-2013-2116
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2116&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-28"/>
	<updated date="2013-05-28"/>
	<bugzilla href="https://bugzilla.suse.com/760265">SUSE bug 760265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802651">SUSE bug 802651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821818">SUSE bug 821818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835760">SUSE bug 835760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865804">SUSE bug 865804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865993">SUSE bug 865993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880730">SUSE bug 880730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880910">SUSE bug 880910</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1619/">CVE-2013-1619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1619">CVE-2013-1619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2116/">CVE-2013-2116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2116">CVE-2013-2116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0092/">CVE-2014-0092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0092">CVE-2014-0092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3466/">CVE-2014-3466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3466">CVE-2014-3466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3467/">CVE-2014-3467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3467">CVE-2014-3467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3468/">CVE-2014-3468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3468">CVE-2014-3468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3469/">CVE-2014-3469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3469">CVE-2014-3469 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576198" comment="gnutls-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562931" comment="libgnutls-extra26-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576199" comment="libgnutls26-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576200" comment="libgnutls26-32bit-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576201" comment="libgnutls26-x86-2.4.1-24.39.47.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576198" comment="gnutls-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562931" comment="libgnutls-extra26-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576199" comment="libgnutls26-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576200" comment="libgnutls26-32bit-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576201" comment="libgnutls26-x86-2.4.1-24.39.47.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576198" comment="gnutls-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562931" comment="libgnutls-extra26-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576199" comment="libgnutls26-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576200" comment="libgnutls26-32bit-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576201" comment="libgnutls26-x86-2.4.1-24.39.47.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218048" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="778723" ref_url="https://bugzilla.suse.com/778723" source="BUGZILLA"/>
		<reference ref_id="780943" ref_url="https://bugzilla.suse.com/780943" source="BUGZILLA"/>
		<reference ref_id="798465" ref_url="https://bugzilla.suse.com/798465" source="BUGZILLA"/>
		<reference ref_id="808958" ref_url="https://bugzilla.suse.com/808958" source="BUGZILLA"/>
		<reference ref_id="840510" ref_url="https://bugzilla.suse.com/840510" source="BUGZILLA"/>
		<reference ref_id="844175" ref_url="https://bugzilla.suse.com/844175" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6085" ref_url="https://www.suse.com/security/cve/CVE-2012-6085/" source="CVE"/>
		<reference ref_id="CVE-2013-4351" ref_url="https://www.suse.com/security/cve/CVE-2013-4351/" source="CVE"/>
		<reference ref_id="CVE-2013-4402" ref_url="https://www.suse.com/security/cve/CVE-2013-4402/" source="CVE"/>
		<description>

This GnuPG update fixes two security issues:

    * CVE-2013-4351: GnuPG treated no-usage-permitted keys as
      all-usages-permitted.
    * CVE-2013-4402: An infinite recursion in the compressed packet parser
      was fixed.

Security Issue reference:

    * CVE-2013-4351
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4351&gt;
    * CVE-2013-4402
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-08"/>
	<updated date="2013-10-08"/>
	<bugzilla href="https://bugzilla.suse.com/778723">SUSE bug 778723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780943">SUSE bug 780943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798465">SUSE bug 798465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808958">SUSE bug 808958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840510">SUSE bug 840510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844175">SUSE bug 844175</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6085/">CVE-2012-6085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6085">CVE-2012-6085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4351/">CVE-2013-4351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4351">CVE-2013-4351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4402/">CVE-2013-4402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4402">CVE-2013-4402 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576202" comment="gpg2-2.0.9-25.33.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576203" comment="gpg2-lang-2.0.9-25.33.37.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576202" comment="gpg2-2.0.9-25.33.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576203" comment="gpg2-lang-2.0.9-25.33.37.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218049" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="702028" ref_url="https://bugzilla.suse.com/702028" source="BUGZILLA"/>
		<reference ref_id="762735" ref_url="https://bugzilla.suse.com/762735" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2485" ref_url="https://www.suse.com/security/cve/CVE-2011-2485/" source="CVE"/>
		<reference ref_id="CVE-2012-2370" ref_url="https://www.suse.com/security/cve/CVE-2012-2370/" source="CVE"/>
		<description>

The following issue has been fixed:

    * Specially crafted GIF and XBM files could have crashed gtk2
      (CVE-2012-2370,CVE-2011-2485)

Security Issue references:

    * CVE-2012-2370
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2370&gt;
    * CVE-2011-2485
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2485&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-06-05"/>
	<updated date="2012-06-05"/>
	<bugzilla href="https://bugzilla.suse.com/702028">SUSE bug 702028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762735">SUSE bug 762735</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2485/">CVE-2011-2485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2485">CVE-2011-2485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2370/">CVE-2012-2370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2370">CVE-2012-2370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576204" comment="gtk2-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576205" comment="gtk2-32bit-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576206" comment="gtk2-doc-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576207" comment="gtk2-lang-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576208" comment="gtk2-x86-2.18.9-0.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576204" comment="gtk2-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576205" comment="gtk2-32bit-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576206" comment="gtk2-doc-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576207" comment="gtk2-lang-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576208" comment="gtk2-x86-2.18.9-0.23.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218050" version="1" class="patch">
	<metadata>
		<title>Security update for hplip</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="808355" ref_url="https://bugzilla.suse.com/808355" source="BUGZILLA"/>
		<reference ref_id="835827" ref_url="https://bugzilla.suse.com/835827" source="BUGZILLA"/>
		<reference ref_id="836937" ref_url="https://bugzilla.suse.com/836937" source="BUGZILLA"/>
		<reference ref_id="852368" ref_url="https://bugzilla.suse.com/852368" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0200" ref_url="https://www.suse.com/security/cve/CVE-2013-0200/" source="CVE"/>
		<reference ref_id="CVE-2013-4325" ref_url="https://www.suse.com/security/cve/CVE-2013-4325/" source="CVE"/>
		<reference ref_id="CVE-2013-6402" ref_url="https://www.suse.com/security/cve/CVE-2013-6402/" source="CVE"/>
		<description>

hplip was updated to fix three security issues:

    * 

      CVE-2013-0200: Some local file overwrite problems via predictable
      /tmp filenames were fixed.

    * 

      CVE-2013-4325: hplip used an insecure polkit DBUS API (polkit-process
      subject race condition) which could lead to local privilege
      escalation.

    * 

      CVE-2013-6402: hplip uses arbitrary file creation/overwrite (via
      hardcoded file name /tmp/hp-pkservice.log)

Security Issue references:

    * CVE-2013-4325
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325&gt;
    * CVE-2013-0200
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200&gt;
    * CVE-2013-6402
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-17"/>
	<updated date="2014-01-17"/>
	<bugzilla href="https://bugzilla.suse.com/808355">SUSE bug 808355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835827">SUSE bug 835827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836937">SUSE bug 836937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0200/">CVE-2013-0200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0200">CVE-2013-0200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4325/">CVE-2013-4325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4325">CVE-2013-4325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6402/">CVE-2013-6402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6402">CVE-2013-6402 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576209" comment="hplip-3.11.10-0.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576210" comment="hplip-hpijs-3.11.10-0.6.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576209" comment="hplip-3.11.10-0.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576210" comment="hplip-hpijs-3.11.10-0.6.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218051" version="1" class="patch">
	<metadata>
		<title>Recommended update for hyper-v</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="676890" ref_url="https://bugzilla.suse.com/676890" source="BUGZILLA"/>
		<reference ref_id="761200" ref_url="https://bugzilla.suse.com/761200" source="BUGZILLA"/>
		<reference ref_id="770763" ref_url="https://bugzilla.suse.com/770763" source="BUGZILLA"/>
		<reference ref_id="790469" ref_url="https://bugzilla.suse.com/790469" source="BUGZILLA"/>
		<reference ref_id="791605" ref_url="https://bugzilla.suse.com/791605" source="BUGZILLA"/>
		<reference ref_id="828714" ref_url="https://bugzilla.suse.com/828714" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2669" ref_url="https://www.suse.com/security/cve/CVE-2012-2669/" source="CVE"/>
		<reference ref_id="CVE-2012-5532" ref_url="https://www.suse.com/security/cve/CVE-2012-5532/" source="CVE"/>
		<description>

This update fixes the following issues:

    * a send/recv buffer allocation bug (bnc#828714)
    * wrong IPv6 subnet enumeration (bnc#828714)
    * Latest version of hyper-v-3-0.5.1 causes more CPU usage and issues
      warnings (bnc#770763)

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-13"/>
	<updated date="2013-08-13"/>
	<bugzilla href="https://bugzilla.suse.com/676890">SUSE bug 676890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761200">SUSE bug 761200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770763">SUSE bug 770763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/790469">SUSE bug 790469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791605">SUSE bug 791605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828714">SUSE bug 828714</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2669/">CVE-2012-2669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2669">CVE-2012-2669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5532/">CVE-2012-5532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5532">CVE-2012-5532 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992505" comment="hyper-v-4-0.13.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992505" comment="hyper-v-4-0.13.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218052" version="1" class="patch">
	<metadata>
		<title>Recommended update for ibutils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="811660" ref_url="https://bugzilla.suse.com/811660" source="BUGZILLA"/>
		<reference ref_id="832643" ref_url="https://bugzilla.suse.com/832643" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1894" ref_url="https://www.suse.com/security/cve/CVE-2013-1894/" source="CVE"/>
		<description>

This update for InfiniBand Diagnostic Tools (ibutils) fixes a syntax error 
that affected the ibdiagnet, ibdiagpath and ibdiagui utilities.

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-14"/>
	<updated date="2013-08-14"/>
	<bugzilla href="https://bugzilla.suse.com/811660">SUSE bug 811660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/832643">SUSE bug 832643</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1894/">CVE-2013-1894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1894">CVE-2013-1894 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992506" comment="ibutils-1.5.4-0.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992507" comment="ibutils-32bit-1.5.4-0.7.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992506" comment="ibutils-1.5.4-0.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992507" comment="ibutils-32bit-1.5.4-0.7.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218053" version="1" class="patch">
	<metadata>
		<title>Security update for icu</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="657910" ref_url="https://bugzilla.suse.com/657910" source="BUGZILLA"/>
		<reference ref_id="736146" ref_url="https://bugzilla.suse.com/736146" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-4599" ref_url="https://www.suse.com/security/cve/CVE-2011-4599/" source="CVE"/>
		<description>

This update is rereleased because some architectures were missed on the 
first try. It fixes the following security issues:

    * Specially crafted strings could cause a buffer overflow in icu (
      CVE-2011-4599
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4599&gt; )
    * An integer overflow in the getSymbol() function could crash
      applications using icu (CVE-2010-4409
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4409&gt; )

		</description>
<advisory from="security@suse.de">
	<issued date="2012-12-19"/>
	<updated date="2012-12-19"/>
	<bugzilla href="https://bugzilla.suse.com/657910">SUSE bug 657910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/736146">SUSE bug 736146</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4599/">CVE-2011-4599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4599">CVE-2011-4599 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576211" comment="libicu-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576212" comment="libicu-32bit-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576213" comment="libicu-doc-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576214" comment="libicu-x86-4.0-7.26.15 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576211" comment="libicu-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576212" comment="libicu-32bit-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576213" comment="libicu-doc-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576214" comment="libicu-x86-4.0-7.26.15 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218054" version="1" class="patch">
	<metadata>
		<title>Security update for inn</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="776967" ref_url="https://bugzilla.suse.com/776967" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3523" ref_url="https://www.suse.com/security/cve/CVE-2012-3523/" source="CVE"/>
		<description>

A STARTTLS injection issue has been fixed in inn. CVE-2012-3523 was 
assigned to this issue.

Security Issue reference:

    * CVE-2012-3523
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3523&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-09-05"/>
	<updated date="2012-09-05"/>
	<bugzilla href="https://bugzilla.suse.com/776967">SUSE bug 776967</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3523/">CVE-2012-3523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3523">CVE-2012-3523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576215" comment="inn-2.4.2-170.21.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576215" comment="inn-2.4.2-170.21.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218055" version="1" class="patch">
	<metadata>
		<title>Recommended update for inst-source-utils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="604730" ref_url="https://bugzilla.suse.com/604730" source="BUGZILLA"/>
		<reference ref_id="792914" ref_url="https://bugzilla.suse.com/792914" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0427" ref_url="https://www.suse.com/security/cve/CVE-2012-0427/" source="CVE"/>
		<description>

This update to inst-source-utils fixes create_sha1sums for signing to write 
correct pubkey.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-12-12"/>
	<updated date="2012-12-12"/>
	<bugzilla href="https://bugzilla.suse.com/604730">SUSE bug 604730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792914">SUSE bug 792914</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0427/">CVE-2012-0427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0427">CVE-2012-0427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992508" comment="inst-source-utils-2012.12.12-0.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992508" comment="inst-source-utils-2012.12.12-0.5.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218056" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-commons-fileupload</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="846174" ref_url="https://bugzilla.suse.com/846174" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2186" ref_url="https://www.suse.com/security/cve/CVE-2013-2186/" source="CVE"/>
		<description>

jakarta-commons-fileupload received a security fix:

    * A poison null byte flaw was found in the implementation of the
      DiskFileItem class. A remote attacker could able to supply a
      serialized instance of the DiskFileItem class, which would be
      deserialized on a server, could use this flaw to write arbitrary
      content to any location on the server that is permitted by the user
      running the application server process. (CVE-2013-2186)

Security Issue reference:

    * CVE-2013-2186
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2186&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-17"/>
	<updated date="2013-10-17"/>
	<bugzilla href="https://bugzilla.suse.com/846174">SUSE bug 846174</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2186/">CVE-2013-2186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2186">CVE-2013-2186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571998" comment="jakarta-commons-fileupload-1.1.1-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571999" comment="jakarta-commons-fileupload-javadoc-1.1.1-1.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571998" comment="jakarta-commons-fileupload-1.1.1-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571999" comment="jakarta-commons-fileupload-javadoc-1.1.1-1.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218057" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="803332" ref_url="https://bugzilla.suse.com/803332" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5783" ref_url="https://www.suse.com/security/cve/CVE-2012-5783/" source="CVE"/>
		<description>

The following issue has been fixed:

    * SSL certificate hostname verification was not done and is fixed by
      this update. (CVE-2012-5783)

Security Issue reference:

    * CVE-2012-5783
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5783&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-28"/>
	<updated date="2013-03-28"/>
	<bugzilla href="https://bugzilla.suse.com/803332">SUSE bug 803332</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2012-5783/">CVE-2012-5783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5783">CVE-2012-5783 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572000" comment="jakarta-commons-httpclient3-3.0.1-253.36.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572000" comment="jakarta-commons-httpclient3-3.0.1-253.36.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218058" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_4_2-ibm</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="494536" ref_url="https://bugzilla.suse.com/494536" source="BUGZILLA"/>
		<reference ref_id="592934" ref_url="https://bugzilla.suse.com/592934" source="BUGZILLA"/>
		<reference ref_id="666744" ref_url="https://bugzilla.suse.com/666744" source="BUGZILLA"/>
		<reference ref_id="758651" ref_url="https://bugzilla.suse.com/758651" source="BUGZILLA"/>
		<reference ref_id="778629" ref_url="https://bugzilla.suse.com/778629" source="BUGZILLA"/>
		<reference ref_id="788750" ref_url="https://bugzilla.suse.com/788750" source="BUGZILLA"/>
		<reference ref_id="798535" ref_url="https://bugzilla.suse.com/798535" source="BUGZILLA"/>
		<reference ref_id="809321" ref_url="https://bugzilla.suse.com/809321" source="BUGZILLA"/>
		<reference ref_id="813939" ref_url="https://bugzilla.suse.com/813939" source="BUGZILLA"/>
		<reference ref_id="819288" ref_url="https://bugzilla.suse.com/819288" source="BUGZILLA"/>
		<reference ref_id="823034" ref_url="https://bugzilla.suse.com/823034" source="BUGZILLA"/>
		<reference ref_id="829212" ref_url="https://bugzilla.suse.com/829212" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-1531" ref_url="https://www.suse.com/security/cve/CVE-2012-1531/" source="CVE"/>
		<reference ref_id="CVE-2012-1713" ref_url="https://www.suse.com/security/cve/CVE-2012-1713/" source="CVE"/>
		<reference ref_id="CVE-2012-1717" ref_url="https://www.suse.com/security/cve/CVE-2012-1717/" source="CVE"/>
		<reference ref_id="CVE-2012-1718" ref_url="https://www.suse.com/security/cve/CVE-2012-1718/" source="CVE"/>
		<reference ref_id="CVE-2012-1719" ref_url="https://www.suse.com/security/cve/CVE-2012-1719/" source="CVE"/>
		<reference ref_id="CVE-2012-3216" ref_url="https://www.suse.com/security/cve/CVE-2012-3216/" source="CVE"/>
		<reference ref_id="CVE-2012-5073" ref_url="https://www.suse.com/security/cve/CVE-2012-5073/" source="CVE"/>
		<reference ref_id="CVE-2012-5079" ref_url="https://www.suse.com/security/cve/CVE-2012-5079/" source="CVE"/>
		<reference ref_id="CVE-2012-5081" ref_url="https://www.suse.com/security/cve/CVE-2012-5081/" source="CVE"/>
		<reference ref_id="CVE-2012-5083" ref_url="https://www.suse.com/security/cve/CVE-2012-5083/" source="CVE"/>
		<reference ref_id="CVE-2012-5084" ref_url="https://www.suse.com/security/cve/CVE-2012-5084/" source="CVE"/>
		<reference ref_id="CVE-2013-0424" ref_url="https://www.suse.com/security/cve/CVE-2013-0424/" source="CVE"/>
		<reference ref_id="CVE-2013-0425" ref_url="https://www.suse.com/security/cve/CVE-2013-0425/" source="CVE"/>
		<reference ref_id="CVE-2013-0426" ref_url="https://www.suse.com/security/cve/CVE-2013-0426/" source="CVE"/>
		<reference ref_id="CVE-2013-0428" ref_url="https://www.suse.com/security/cve/CVE-2013-0428/" source="CVE"/>
		<reference ref_id="CVE-2013-0432" ref_url="https://www.suse.com/security/cve/CVE-2013-0432/" source="CVE"/>
		<reference ref_id="CVE-2013-0434" ref_url="https://www.suse.com/security/cve/CVE-2013-0434/" source="CVE"/>
		<reference ref_id="CVE-2013-0440" ref_url="https://www.suse.com/security/cve/CVE-2013-0440/" source="CVE"/>
		<reference ref_id="CVE-2013-0442" ref_url="https://www.suse.com/security/cve/CVE-2013-0442/" source="CVE"/>
		<reference ref_id="CVE-2013-0443" ref_url="https://www.suse.com/security/cve/CVE-2013-0443/" source="CVE"/>
		<reference ref_id="CVE-2013-0485" ref_url="https://www.suse.com/security/cve/CVE-2013-0485/" source="CVE"/>
		<reference ref_id="CVE-2013-0809" ref_url="https://www.suse.com/security/cve/CVE-2013-0809/" source="CVE"/>
		<reference ref_id="CVE-2013-1476" ref_url="https://www.suse.com/security/cve/CVE-2013-1476/" source="CVE"/>
		<reference ref_id="CVE-2013-1478" ref_url="https://www.suse.com/security/cve/CVE-2013-1478/" source="CVE"/>
		<reference ref_id="CVE-2013-1480" ref_url="https://www.suse.com/security/cve/CVE-2013-1480/" source="CVE"/>
		<reference ref_id="CVE-2013-1481" ref_url="https://www.suse.com/security/cve/CVE-2013-1481/" source="CVE"/>
		<reference ref_id="CVE-2013-1491" ref_url="https://www.suse.com/security/cve/CVE-2013-1491/" source="CVE"/>
		<reference ref_id="CVE-2013-1493" ref_url="https://www.suse.com/security/cve/CVE-2013-1493/" source="CVE"/>
		<reference ref_id="CVE-2013-1500" ref_url="https://www.suse.com/security/cve/CVE-2013-1500/" source="CVE"/>
		<reference ref_id="CVE-2013-1537" ref_url="https://www.suse.com/security/cve/CVE-2013-1537/" source="CVE"/>
		<reference ref_id="CVE-2013-1557" ref_url="https://www.suse.com/security/cve/CVE-2013-1557/" source="CVE"/>
		<reference ref_id="CVE-2013-1569" ref_url="https://www.suse.com/security/cve/CVE-2013-1569/" source="CVE"/>
		<reference ref_id="CVE-2013-2383" ref_url="https://www.suse.com/security/cve/CVE-2013-2383/" source="CVE"/>
		<reference ref_id="CVE-2013-2384" ref_url="https://www.suse.com/security/cve/CVE-2013-2384/" source="CVE"/>
		<reference ref_id="CVE-2013-2394" ref_url="https://www.suse.com/security/cve/CVE-2013-2394/" source="CVE"/>
		<reference ref_id="CVE-2013-2417" ref_url="https://www.suse.com/security/cve/CVE-2013-2417/" source="CVE"/>
		<reference ref_id="CVE-2013-2419" ref_url="https://www.suse.com/security/cve/CVE-2013-2419/" source="CVE"/>
		<reference ref_id="CVE-2013-2420" ref_url="https://www.suse.com/security/cve/CVE-2013-2420/" source="CVE"/>
		<reference ref_id="CVE-2013-2429" ref_url="https://www.suse.com/security/cve/CVE-2013-2429/" source="CVE"/>
		<reference ref_id="CVE-2013-2430" ref_url="https://www.suse.com/security/cve/CVE-2013-2430/" source="CVE"/>
		<reference ref_id="CVE-2013-2432" ref_url="https://www.suse.com/security/cve/CVE-2013-2432/" source="CVE"/>
		<reference ref_id="CVE-2013-2446" ref_url="https://www.suse.com/security/cve/CVE-2013-2446/" source="CVE"/>
		<reference ref_id="CVE-2013-2447" ref_url="https://www.suse.com/security/cve/CVE-2013-2447/" source="CVE"/>
		<reference ref_id="CVE-2013-2450" ref_url="https://www.suse.com/security/cve/CVE-2013-2450/" source="CVE"/>
		<reference ref_id="CVE-2013-2452" ref_url="https://www.suse.com/security/cve/CVE-2013-2452/" source="CVE"/>
		<reference ref_id="CVE-2013-2456" ref_url="https://www.suse.com/security/cve/CVE-2013-2456/" source="CVE"/>
		<reference ref_id="CVE-2013-2459" ref_url="https://www.suse.com/security/cve/CVE-2013-2459/" source="CVE"/>
		<reference ref_id="CVE-2013-2463" ref_url="https://www.suse.com/security/cve/CVE-2013-2463/" source="CVE"/>
		<reference ref_id="CVE-2013-2464" ref_url="https://www.suse.com/security/cve/CVE-2013-2464/" source="CVE"/>
		<reference ref_id="CVE-2013-2465" ref_url="https://www.suse.com/security/cve/CVE-2013-2465/" source="CVE"/>
		<reference ref_id="CVE-2013-2469" ref_url="https://www.suse.com/security/cve/CVE-2013-2469/" source="CVE"/>
		<reference ref_id="CVE-2013-2470" ref_url="https://www.suse.com/security/cve/CVE-2013-2470/" source="CVE"/>
		<reference ref_id="CVE-2013-2471" ref_url="https://www.suse.com/security/cve/CVE-2013-2471/" source="CVE"/>
		<reference ref_id="CVE-2013-2472" ref_url="https://www.suse.com/security/cve/CVE-2013-2472/" source="CVE"/>
		<reference ref_id="CVE-2013-2473" ref_url="https://www.suse.com/security/cve/CVE-2013-2473/" source="CVE"/>
		<reference ref_id="CVE-2013-3009" ref_url="https://www.suse.com/security/cve/CVE-2013-3009/" source="CVE"/>
		<reference ref_id="CVE-2013-3011" ref_url="https://www.suse.com/security/cve/CVE-2013-3011/" source="CVE"/>
		<reference ref_id="CVE-2013-3012" ref_url="https://www.suse.com/security/cve/CVE-2013-3012/" source="CVE"/>
		<description>

IBM Java 1.4.2 was updated to SR13-FP18 to fix bugs and security issues.

Please see also
http://www.ibm.com/developerworks/java/jdk/alerts/
&lt;http://www.ibm.com/developerworks/java/jdk/alerts/&gt;

Also the following bug has been fixed:

    * mark files in jre/bin and bin/ as executable (bnc#823034)

Security Issue references:

    * CVE-2013-3009
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3009&gt;
    * CVE-2013-3011
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3011&gt;
    * CVE-2013-3012
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3012&gt;
    * CVE-2013-2469
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2469&gt;
    * CVE-2013-2465
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2465&gt;
    * CVE-2013-2464
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2464&gt;
    * CVE-2013-2463
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2463&gt;
    * CVE-2013-2473
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2473&gt;
    * CVE-2013-2472
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2472&gt;
    * CVE-2013-2471
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2471&gt;
    * CVE-2013-2470
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2470&gt;
    * CVE-2013-2459
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2459&gt;
    * CVE-2013-2456
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2456&gt;
    * CVE-2013-2447
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2447&gt;
    * CVE-2013-2452
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2452&gt;
    * CVE-2013-2446
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2446&gt;
    * CVE-2013-2450
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2450&gt;
    * CVE-2013-1500
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1500&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-07-23"/>
	<updated date="2013-07-23"/>
	<bugzilla href="https://bugzilla.suse.com/494536">SUSE bug 494536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/592934">SUSE bug 592934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/666744">SUSE bug 666744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758651">SUSE bug 758651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778629">SUSE bug 778629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809321">SUSE bug 809321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813939">SUSE bug 813939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823034">SUSE bug 823034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1531/">CVE-2012-1531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1531">CVE-2012-1531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1713/">CVE-2012-1713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1713">CVE-2012-1713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1717/">CVE-2012-1717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1717">CVE-2012-1717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1718/">CVE-2012-1718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1718">CVE-2012-1718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1719/">CVE-2012-1719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1719">CVE-2012-1719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3216/">CVE-2012-3216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3216">CVE-2012-3216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5073/">CVE-2012-5073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5073">CVE-2012-5073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5079/">CVE-2012-5079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5079">CVE-2012-5079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5081/">CVE-2012-5081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5081">CVE-2012-5081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5083/">CVE-2012-5083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5083">CVE-2012-5083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5084/">CVE-2012-5084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5084">CVE-2012-5084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0424/">CVE-2013-0424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0424">CVE-2013-0424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0425/">CVE-2013-0425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0425">CVE-2013-0425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0426/">CVE-2013-0426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0426">CVE-2013-0426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0428/">CVE-2013-0428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0428">CVE-2013-0428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0432/">CVE-2013-0432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0432">CVE-2013-0432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0434/">CVE-2013-0434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0434">CVE-2013-0434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0440/">CVE-2013-0440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0440">CVE-2013-0440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0442/">CVE-2013-0442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0442">CVE-2013-0442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0443/">CVE-2013-0443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0443">CVE-2013-0443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0485/">CVE-2013-0485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0485">CVE-2013-0485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0809/">CVE-2013-0809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0809">CVE-2013-0809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1476/">CVE-2013-1476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1476">CVE-2013-1476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1478/">CVE-2013-1478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1478">CVE-2013-1478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1480/">CVE-2013-1480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1480">CVE-2013-1480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1481/">CVE-2013-1481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1481">CVE-2013-1481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1491/">CVE-2013-1491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1491">CVE-2013-1491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1493/">CVE-2013-1493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1493">CVE-2013-1493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1500/">CVE-2013-1500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1500">CVE-2013-1500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1537/">CVE-2013-1537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1537">CVE-2013-1537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1557/">CVE-2013-1557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1557">CVE-2013-1557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1569/">CVE-2013-1569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1569">CVE-2013-1569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2383/">CVE-2013-2383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2383">CVE-2013-2383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2384/">CVE-2013-2384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2384">CVE-2013-2384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2394/">CVE-2013-2394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2394">CVE-2013-2394 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2417/">CVE-2013-2417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2417">CVE-2013-2417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2419/">CVE-2013-2419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2419">CVE-2013-2419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2420/">CVE-2013-2420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2420">CVE-2013-2420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2429/">CVE-2013-2429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2429">CVE-2013-2429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2430/">CVE-2013-2430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2430">CVE-2013-2430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2432/">CVE-2013-2432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2432">CVE-2013-2432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2446/">CVE-2013-2446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2446">CVE-2013-2446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2447/">CVE-2013-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2447">CVE-2013-2447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2450/">CVE-2013-2450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2450">CVE-2013-2450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2452/">CVE-2013-2452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2452">CVE-2013-2452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2456/">CVE-2013-2456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2456">CVE-2013-2456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2459/">CVE-2013-2459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2459">CVE-2013-2459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2463/">CVE-2013-2463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2463">CVE-2013-2463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2464/">CVE-2013-2464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2464">CVE-2013-2464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2465/">CVE-2013-2465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2465">CVE-2013-2465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2469/">CVE-2013-2469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2469">CVE-2013-2469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2470/">CVE-2013-2470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2470">CVE-2013-2470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2471/">CVE-2013-2471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2471">CVE-2013-2471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2472/">CVE-2013-2472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2472">CVE-2013-2472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2473/">CVE-2013-2473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2473">CVE-2013-2473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3009/">CVE-2013-3009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3009">CVE-2013-3009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3011/">CVE-2013-3011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3011">CVE-2013-3011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3012/">CVE-2013-3012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3012">CVE-2013-3012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576216" comment="java-1_4_2-ibm-1.4.2_sr13.18-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576217" comment="java-1_4_2-ibm-jdbc-1.4.2_sr13.18-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576218" comment="java-1_4_2-ibm-plugin-1.4.2_sr13.18-0.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576216" comment="java-1_4_2-ibm-1.4.2_sr13.18-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576217" comment="java-1_4_2-ibm-jdbc-1.4.2_sr13.18-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576218" comment="java-1_4_2-ibm-plugin-1.4.2_sr13.18-0.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218059" version="1" class="patch">
	<metadata>
		<title>Security update for IBM Java 6</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="592934" ref_url="https://bugzilla.suse.com/592934" source="BUGZILLA"/>
		<reference ref_id="666744" ref_url="https://bugzilla.suse.com/666744" source="BUGZILLA"/>
		<reference ref_id="771808" ref_url="https://bugzilla.suse.com/771808" source="BUGZILLA"/>
		<reference ref_id="773021" ref_url="https://bugzilla.suse.com/773021" source="BUGZILLA"/>
		<reference ref_id="778629" ref_url="https://bugzilla.suse.com/778629" source="BUGZILLA"/>
		<reference ref_id="785631" ref_url="https://bugzilla.suse.com/785631" source="BUGZILLA"/>
		<reference ref_id="788750" ref_url="https://bugzilla.suse.com/788750" source="BUGZILLA"/>
		<reference ref_id="798535" ref_url="https://bugzilla.suse.com/798535" source="BUGZILLA"/>
		<reference ref_id="808625" ref_url="https://bugzilla.suse.com/808625" source="BUGZILLA"/>
		<reference ref_id="813939" ref_url="https://bugzilla.suse.com/813939" source="BUGZILLA"/>
		<reference ref_id="817062" ref_url="https://bugzilla.suse.com/817062" source="BUGZILLA"/>
		<reference ref_id="819288" ref_url="https://bugzilla.suse.com/819288" source="BUGZILLA"/>
		<reference ref_id="823034" ref_url="https://bugzilla.suse.com/823034" source="BUGZILLA"/>
		<reference ref_id="829212" ref_url="https://bugzilla.suse.com/829212" source="BUGZILLA"/>
		<reference ref_id="849212" ref_url="https://bugzilla.suse.com/849212" source="BUGZILLA"/>
		<reference ref_id="862064" ref_url="https://bugzilla.suse.com/862064" source="BUGZILLA"/>
		<reference ref_id="877430" ref_url="https://bugzilla.suse.com/877430" source="BUGZILLA"/>
		<reference ref_id="891700" ref_url="https://bugzilla.suse.com/891700" source="BUGZILLA"/>
		<reference ref_id="901223" ref_url="https://bugzilla.suse.com/901223" source="BUGZILLA"/>
		<reference ref_id="904889" ref_url="https://bugzilla.suse.com/904889" source="BUGZILLA"/>
		<reference ref_id="912434" ref_url="https://bugzilla.suse.com/912434" source="BUGZILLA"/>
		<reference ref_id="912447" ref_url="https://bugzilla.suse.com/912447" source="BUGZILLA"/>
		<reference ref_id="916265" ref_url="https://bugzilla.suse.com/916265" source="BUGZILLA"/>
		<reference ref_id="916266" ref_url="https://bugzilla.suse.com/916266" source="BUGZILLA"/>
		<reference ref_id="930365" ref_url="https://bugzilla.suse.com/930365" source="BUGZILLA"/>
		<reference ref_id="931702" ref_url="https://bugzilla.suse.com/931702" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0551" ref_url="https://www.suse.com/security/cve/CVE-2012-0551/" source="CVE"/>
		<reference ref_id="CVE-2012-1531" ref_url="https://www.suse.com/security/cve/CVE-2012-1531/" source="CVE"/>
		<reference ref_id="CVE-2012-1532" ref_url="https://www.suse.com/security/cve/CVE-2012-1532/" source="CVE"/>
		<reference ref_id="CVE-2012-1533" ref_url="https://www.suse.com/security/cve/CVE-2012-1533/" source="CVE"/>
		<reference ref_id="CVE-2012-1541" ref_url="https://www.suse.com/security/cve/CVE-2012-1541/" source="CVE"/>
		<reference ref_id="CVE-2012-1713" ref_url="https://www.suse.com/security/cve/CVE-2012-1713/" source="CVE"/>
		<reference ref_id="CVE-2012-1716" ref_url="https://www.suse.com/security/cve/CVE-2012-1716/" source="CVE"/>
		<reference ref_id="CVE-2012-1717" ref_url="https://www.suse.com/security/cve/CVE-2012-1717/" source="CVE"/>
		<reference ref_id="CVE-2012-1718" ref_url="https://www.suse.com/security/cve/CVE-2012-1718/" source="CVE"/>
		<reference ref_id="CVE-2012-1719" ref_url="https://www.suse.com/security/cve/CVE-2012-1719/" source="CVE"/>
		<reference ref_id="CVE-2012-1721" ref_url="https://www.suse.com/security/cve/CVE-2012-1721/" source="CVE"/>
		<reference ref_id="CVE-2012-1722" ref_url="https://www.suse.com/security/cve/CVE-2012-1722/" source="CVE"/>
		<reference ref_id="CVE-2012-1725" ref_url="https://www.suse.com/security/cve/CVE-2012-1725/" source="CVE"/>
		<reference ref_id="CVE-2012-3143" ref_url="https://www.suse.com/security/cve/CVE-2012-3143/" source="CVE"/>
		<reference ref_id="CVE-2012-3159" ref_url="https://www.suse.com/security/cve/CVE-2012-3159/" source="CVE"/>
		<reference ref_id="CVE-2012-3213" ref_url="https://www.suse.com/security/cve/CVE-2012-3213/" source="CVE"/>
		<reference ref_id="CVE-2012-3216" ref_url="https://www.suse.com/security/cve/CVE-2012-3216/" source="CVE"/>
		<reference ref_id="CVE-2012-3342" ref_url="https://www.suse.com/security/cve/CVE-2012-3342/" source="CVE"/>
		<reference ref_id="CVE-2012-5068" ref_url="https://www.suse.com/security/cve/CVE-2012-5068/" source="CVE"/>
		<reference ref_id="CVE-2012-5069" ref_url="https://www.suse.com/security/cve/CVE-2012-5069/" source="CVE"/>
		<reference ref_id="CVE-2012-5071" ref_url="https://www.suse.com/security/cve/CVE-2012-5071/" source="CVE"/>
		<reference ref_id="CVE-2012-5072" ref_url="https://www.suse.com/security/cve/CVE-2012-5072/" source="CVE"/>
		<reference ref_id="CVE-2012-5073" ref_url="https://www.suse.com/security/cve/CVE-2012-5073/" source="CVE"/>
		<reference ref_id="CVE-2012-5075" ref_url="https://www.suse.com/security/cve/CVE-2012-5075/" source="CVE"/>
		<reference ref_id="CVE-2012-5079" ref_url="https://www.suse.com/security/cve/CVE-2012-5079/" source="CVE"/>
		<reference ref_id="CVE-2012-5081" ref_url="https://www.suse.com/security/cve/CVE-2012-5081/" source="CVE"/>
		<reference ref_id="CVE-2012-5083" ref_url="https://www.suse.com/security/cve/CVE-2012-5083/" source="CVE"/>
		<reference ref_id="CVE-2012-5084" ref_url="https://www.suse.com/security/cve/CVE-2012-5084/" source="CVE"/>
		<reference ref_id="CVE-2012-5089" ref_url="https://www.suse.com/security/cve/CVE-2012-5089/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-0351" ref_url="https://www.suse.com/security/cve/CVE-2013-0351/" source="CVE"/>
		<reference ref_id="CVE-2013-0401" ref_url="https://www.suse.com/security/cve/CVE-2013-0401/" source="CVE"/>
		<reference ref_id="CVE-2013-0409" ref_url="https://www.suse.com/security/cve/CVE-2013-0409/" source="CVE"/>
		<reference ref_id="CVE-2013-0419" ref_url="https://www.suse.com/security/cve/CVE-2013-0419/" source="CVE"/>
		<reference ref_id="CVE-2013-0423" ref_url="https://www.suse.com/security/cve/CVE-2013-0423/" source="CVE"/>
		<reference ref_id="CVE-2013-0424" ref_url="https://www.suse.com/security/cve/CVE-2013-0424/" source="CVE"/>
		<reference ref_id="CVE-2013-0425" ref_url="https://www.suse.com/security/cve/CVE-2013-0425/" source="CVE"/>
		<reference ref_id="CVE-2013-0426" ref_url="https://www.suse.com/security/cve/CVE-2013-0426/" source="CVE"/>
		<reference ref_id="CVE-2013-0427" ref_url="https://www.suse.com/security/cve/CVE-2013-0427/" source="CVE"/>
		<reference ref_id="CVE-2013-0428" ref_url="https://www.suse.com/security/cve/CVE-2013-0428/" source="CVE"/>
		<reference ref_id="CVE-2013-0432" ref_url="https://www.suse.com/security/cve/CVE-2013-0432/" source="CVE"/>
		<reference ref_id="CVE-2013-0433" ref_url="https://www.suse.com/security/cve/CVE-2013-0433/" source="CVE"/>
		<reference ref_id="CVE-2013-0434" ref_url="https://www.suse.com/security/cve/CVE-2013-0434/" source="CVE"/>
		<reference ref_id="CVE-2013-0435" ref_url="https://www.suse.com/security/cve/CVE-2013-0435/" source="CVE"/>
		<reference ref_id="CVE-2013-0438" ref_url="https://www.suse.com/security/cve/CVE-2013-0438/" source="CVE"/>
		<reference ref_id="CVE-2013-0440" ref_url="https://www.suse.com/security/cve/CVE-2013-0440/" source="CVE"/>
		<reference ref_id="CVE-2013-0441" ref_url="https://www.suse.com/security/cve/CVE-2013-0441/" source="CVE"/>
		<reference ref_id="CVE-2013-0442" ref_url="https://www.suse.com/security/cve/CVE-2013-0442/" source="CVE"/>
		<reference ref_id="CVE-2013-0443" ref_url="https://www.suse.com/security/cve/CVE-2013-0443/" source="CVE"/>
		<reference ref_id="CVE-2013-0445" ref_url="https://www.suse.com/security/cve/CVE-2013-0445/" source="CVE"/>
		<reference ref_id="CVE-2013-0446" ref_url="https://www.suse.com/security/cve/CVE-2013-0446/" source="CVE"/>
		<reference ref_id="CVE-2013-0450" ref_url="https://www.suse.com/security/cve/CVE-2013-0450/" source="CVE"/>
		<reference ref_id="CVE-2013-0485" ref_url="https://www.suse.com/security/cve/CVE-2013-0485/" source="CVE"/>
		<reference ref_id="CVE-2013-0809" ref_url="https://www.suse.com/security/cve/CVE-2013-0809/" source="CVE"/>
		<reference ref_id="CVE-2013-1473" ref_url="https://www.suse.com/security/cve/CVE-2013-1473/" source="CVE"/>
		<reference ref_id="CVE-2013-1476" ref_url="https://www.suse.com/security/cve/CVE-2013-1476/" source="CVE"/>
		<reference ref_id="CVE-2013-1478" ref_url="https://www.suse.com/security/cve/CVE-2013-1478/" source="CVE"/>
		<reference ref_id="CVE-2013-1480" ref_url="https://www.suse.com/security/cve/CVE-2013-1480/" source="CVE"/>
		<reference ref_id="CVE-2013-1481" ref_url="https://www.suse.com/security/cve/CVE-2013-1481/" source="CVE"/>
		<reference ref_id="CVE-2013-1486" ref_url="https://www.suse.com/security/cve/CVE-2013-1486/" source="CVE"/>
		<reference ref_id="CVE-2013-1487" ref_url="https://www.suse.com/security/cve/CVE-2013-1487/" source="CVE"/>
		<reference ref_id="CVE-2013-1491" ref_url="https://www.suse.com/security/cve/CVE-2013-1491/" source="CVE"/>
		<reference ref_id="CVE-2013-1493" ref_url="https://www.suse.com/security/cve/CVE-2013-1493/" source="CVE"/>
		<reference ref_id="CVE-2013-1500" ref_url="https://www.suse.com/security/cve/CVE-2013-1500/" source="CVE"/>
		<reference ref_id="CVE-2013-1537" ref_url="https://www.suse.com/security/cve/CVE-2013-1537/" source="CVE"/>
		<reference ref_id="CVE-2013-1540" ref_url="https://www.suse.com/security/cve/CVE-2013-1540/" source="CVE"/>
		<reference ref_id="CVE-2013-1557" ref_url="https://www.suse.com/security/cve/CVE-2013-1557/" source="CVE"/>
		<reference ref_id="CVE-2013-1563" ref_url="https://www.suse.com/security/cve/CVE-2013-1563/" source="CVE"/>
		<reference ref_id="CVE-2013-1569" ref_url="https://www.suse.com/security/cve/CVE-2013-1569/" source="CVE"/>
		<reference ref_id="CVE-2013-1571" ref_url="https://www.suse.com/security/cve/CVE-2013-1571/" source="CVE"/>
		<reference ref_id="CVE-2013-2383" ref_url="https://www.suse.com/security/cve/CVE-2013-2383/" source="CVE"/>
		<reference ref_id="CVE-2013-2384" ref_url="https://www.suse.com/security/cve/CVE-2013-2384/" source="CVE"/>
		<reference ref_id="CVE-2013-2394" ref_url="https://www.suse.com/security/cve/CVE-2013-2394/" source="CVE"/>
		<reference ref_id="CVE-2013-2407" ref_url="https://www.suse.com/security/cve/CVE-2013-2407/" source="CVE"/>
		<reference ref_id="CVE-2013-2412" ref_url="https://www.suse.com/security/cve/CVE-2013-2412/" source="CVE"/>
		<reference ref_id="CVE-2013-2417" ref_url="https://www.suse.com/security/cve/CVE-2013-2417/" source="CVE"/>
		<reference ref_id="CVE-2013-2418" ref_url="https://www.suse.com/security/cve/CVE-2013-2418/" source="CVE"/>
		<reference ref_id="CVE-2013-2419" ref_url="https://www.suse.com/security/cve/CVE-2013-2419/" source="CVE"/>
		<reference ref_id="CVE-2013-2420" ref_url="https://www.suse.com/security/cve/CVE-2013-2420/" source="CVE"/>
		<reference ref_id="CVE-2013-2422" ref_url="https://www.suse.com/security/cve/CVE-2013-2422/" source="CVE"/>
		<reference ref_id="CVE-2013-2424" ref_url="https://www.suse.com/security/cve/CVE-2013-2424/" source="CVE"/>
		<reference ref_id="CVE-2013-2429" ref_url="https://www.suse.com/security/cve/CVE-2013-2429/" source="CVE"/>
		<reference ref_id="CVE-2013-2430" ref_url="https://www.suse.com/security/cve/CVE-2013-2430/" source="CVE"/>
		<reference ref_id="CVE-2013-2432" ref_url="https://www.suse.com/security/cve/CVE-2013-2432/" source="CVE"/>
		<reference ref_id="CVE-2013-2433" ref_url="https://www.suse.com/security/cve/CVE-2013-2433/" source="CVE"/>
		<reference ref_id="CVE-2013-2435" ref_url="https://www.suse.com/security/cve/CVE-2013-2435/" source="CVE"/>
		<reference ref_id="CVE-2013-2437" ref_url="https://www.suse.com/security/cve/CVE-2013-2437/" source="CVE"/>
		<reference ref_id="CVE-2013-2440" ref_url="https://www.suse.com/security/cve/CVE-2013-2440/" source="CVE"/>
		<reference ref_id="CVE-2013-2442" ref_url="https://www.suse.com/security/cve/CVE-2013-2442/" source="CVE"/>
		<reference ref_id="CVE-2013-2443" ref_url="https://www.suse.com/security/cve/CVE-2013-2443/" source="CVE"/>
		<reference ref_id="CVE-2013-2444" ref_url="https://www.suse.com/security/cve/CVE-2013-2444/" source="CVE"/>
		<reference ref_id="CVE-2013-2446" ref_url="https://www.suse.com/security/cve/CVE-2013-2446/" source="CVE"/>
		<reference ref_id="CVE-2013-2447" ref_url="https://www.suse.com/security/cve/CVE-2013-2447/" source="CVE"/>
		<reference ref_id="CVE-2013-2448" ref_url="https://www.suse.com/security/cve/CVE-2013-2448/" source="CVE"/>
		<reference ref_id="CVE-2013-2450" ref_url="https://www.suse.com/security/cve/CVE-2013-2450/" source="CVE"/>
		<reference ref_id="CVE-2013-2451" ref_url="https://www.suse.com/security/cve/CVE-2013-2451/" source="CVE"/>
		<reference ref_id="CVE-2013-2452" ref_url="https://www.suse.com/security/cve/CVE-2013-2452/" source="CVE"/>
		<reference ref_id="CVE-2013-2453" ref_url="https://www.suse.com/security/cve/CVE-2013-2453/" source="CVE"/>
		<reference ref_id="CVE-2013-2454" ref_url="https://www.suse.com/security/cve/CVE-2013-2454/" source="CVE"/>
		<reference ref_id="CVE-2013-2455" ref_url="https://www.suse.com/security/cve/CVE-2013-2455/" source="CVE"/>
		<reference ref_id="CVE-2013-2456" ref_url="https://www.suse.com/security/cve/CVE-2013-2456/" source="CVE"/>
		<reference ref_id="CVE-2013-2457" ref_url="https://www.suse.com/security/cve/CVE-2013-2457/" source="CVE"/>
		<reference ref_id="CVE-2013-2459" ref_url="https://www.suse.com/security/cve/CVE-2013-2459/" source="CVE"/>
		<reference ref_id="CVE-2013-2463" ref_url="https://www.suse.com/security/cve/CVE-2013-2463/" source="CVE"/>
		<reference ref_id="CVE-2013-2464" ref_url="https://www.suse.com/security/cve/CVE-2013-2464/" source="CVE"/>
		<reference ref_id="CVE-2013-2465" ref_url="https://www.suse.com/security/cve/CVE-2013-2465/" source="CVE"/>
		<reference ref_id="CVE-2013-2466" ref_url="https://www.suse.com/security/cve/CVE-2013-2466/" source="CVE"/>
		<reference ref_id="CVE-2013-2468" ref_url="https://www.suse.com/security/cve/CVE-2013-2468/" source="CVE"/>
		<reference ref_id="CVE-2013-2469" ref_url="https://www.suse.com/security/cve/CVE-2013-2469/" source="CVE"/>
		<reference ref_id="CVE-2013-2470" ref_url="https://www.suse.com/security/cve/CVE-2013-2470/" source="CVE"/>
		<reference ref_id="CVE-2013-2471" ref_url="https://www.suse.com/security/cve/CVE-2013-2471/" source="CVE"/>
		<reference ref_id="CVE-2013-2472" ref_url="https://www.suse.com/security/cve/CVE-2013-2472/" source="CVE"/>
		<reference ref_id="CVE-2013-2473" ref_url="https://www.suse.com/security/cve/CVE-2013-2473/" source="CVE"/>
		<reference ref_id="CVE-2013-3009" ref_url="https://www.suse.com/security/cve/CVE-2013-3009/" source="CVE"/>
		<reference ref_id="CVE-2013-3011" ref_url="https://www.suse.com/security/cve/CVE-2013-3011/" source="CVE"/>
		<reference ref_id="CVE-2013-3012" ref_url="https://www.suse.com/security/cve/CVE-2013-3012/" source="CVE"/>
		<reference ref_id="CVE-2013-3743" ref_url="https://www.suse.com/security/cve/CVE-2013-3743/" source="CVE"/>
		<reference ref_id="CVE-2013-3829" ref_url="https://www.suse.com/security/cve/CVE-2013-3829/" source="CVE"/>
		<reference ref_id="CVE-2013-4002" ref_url="https://www.suse.com/security/cve/CVE-2013-4002/" source="CVE"/>
		<reference ref_id="CVE-2013-4041" ref_url="https://www.suse.com/security/cve/CVE-2013-4041/" source="CVE"/>
		<reference ref_id="CVE-2013-5372" ref_url="https://www.suse.com/security/cve/CVE-2013-5372/" source="CVE"/>
		<reference ref_id="CVE-2013-5375" ref_url="https://www.suse.com/security/cve/CVE-2013-5375/" source="CVE"/>
		<reference ref_id="CVE-2013-5456" ref_url="https://www.suse.com/security/cve/CVE-2013-5456/" source="CVE"/>
		<reference ref_id="CVE-2013-5457" ref_url="https://www.suse.com/security/cve/CVE-2013-5457/" source="CVE"/>
		<reference ref_id="CVE-2013-5458" ref_url="https://www.suse.com/security/cve/CVE-2013-5458/" source="CVE"/>
		<reference ref_id="CVE-2013-5772" ref_url="https://www.suse.com/security/cve/CVE-2013-5772/" source="CVE"/>
		<reference ref_id="CVE-2013-5774" ref_url="https://www.suse.com/security/cve/CVE-2013-5774/" source="CVE"/>
		<reference ref_id="CVE-2013-5776" ref_url="https://www.suse.com/security/cve/CVE-2013-5776/" source="CVE"/>
		<reference ref_id="CVE-2013-5778" ref_url="https://www.suse.com/security/cve/CVE-2013-5778/" source="CVE"/>
		<reference ref_id="CVE-2013-5780" ref_url="https://www.suse.com/security/cve/CVE-2013-5780/" source="CVE"/>
		<reference ref_id="CVE-2013-5782" ref_url="https://www.suse.com/security/cve/CVE-2013-5782/" source="CVE"/>
		<reference ref_id="CVE-2013-5783" ref_url="https://www.suse.com/security/cve/CVE-2013-5783/" source="CVE"/>
		<reference ref_id="CVE-2013-5784" ref_url="https://www.suse.com/security/cve/CVE-2013-5784/" source="CVE"/>
		<reference ref_id="CVE-2013-5787" ref_url="https://www.suse.com/security/cve/CVE-2013-5787/" source="CVE"/>
		<reference ref_id="CVE-2013-5788" ref_url="https://www.suse.com/security/cve/CVE-2013-5788/" source="CVE"/>
		<reference ref_id="CVE-2013-5789" ref_url="https://www.suse.com/security/cve/CVE-2013-5789/" source="CVE"/>
		<reference ref_id="CVE-2013-5790" ref_url="https://www.suse.com/security/cve/CVE-2013-5790/" source="CVE"/>
		<reference ref_id="CVE-2013-5797" ref_url="https://www.suse.com/security/cve/CVE-2013-5797/" source="CVE"/>
		<reference ref_id="CVE-2013-5800" ref_url="https://www.suse.com/security/cve/CVE-2013-5800/" source="CVE"/>
		<reference ref_id="CVE-2013-5801" ref_url="https://www.suse.com/security/cve/CVE-2013-5801/" source="CVE"/>
		<reference ref_id="CVE-2013-5802" ref_url="https://www.suse.com/security/cve/CVE-2013-5802/" source="CVE"/>
		<reference ref_id="CVE-2013-5803" ref_url="https://www.suse.com/security/cve/CVE-2013-5803/" source="CVE"/>
		<reference ref_id="CVE-2013-5804" ref_url="https://www.suse.com/security/cve/CVE-2013-5804/" source="CVE"/>
		<reference ref_id="CVE-2013-5809" ref_url="https://www.suse.com/security/cve/CVE-2013-5809/" source="CVE"/>
		<reference ref_id="CVE-2013-5812" ref_url="https://www.suse.com/security/cve/CVE-2013-5812/" source="CVE"/>
		<reference ref_id="CVE-2013-5814" ref_url="https://www.suse.com/security/cve/CVE-2013-5814/" source="CVE"/>
		<reference ref_id="CVE-2013-5817" ref_url="https://www.suse.com/security/cve/CVE-2013-5817/" source="CVE"/>
		<reference ref_id="CVE-2013-5818" ref_url="https://www.suse.com/security/cve/CVE-2013-5818/" source="CVE"/>
		<reference ref_id="CVE-2013-5819" ref_url="https://www.suse.com/security/cve/CVE-2013-5819/" source="CVE"/>
		<reference ref_id="CVE-2013-5820" ref_url="https://www.suse.com/security/cve/CVE-2013-5820/" source="CVE"/>
		<reference ref_id="CVE-2013-5823" ref_url="https://www.suse.com/security/cve/CVE-2013-5823/" source="CVE"/>
		<reference ref_id="CVE-2013-5824" ref_url="https://www.suse.com/security/cve/CVE-2013-5824/" source="CVE"/>
		<reference ref_id="CVE-2013-5825" ref_url="https://www.suse.com/security/cve/CVE-2013-5825/" source="CVE"/>
		<reference ref_id="CVE-2013-5829" ref_url="https://www.suse.com/security/cve/CVE-2013-5829/" source="CVE"/>
		<reference ref_id="CVE-2013-5830" ref_url="https://www.suse.com/security/cve/CVE-2013-5830/" source="CVE"/>
		<reference ref_id="CVE-2013-5831" ref_url="https://www.suse.com/security/cve/CVE-2013-5831/" source="CVE"/>
		<reference ref_id="CVE-2013-5832" ref_url="https://www.suse.com/security/cve/CVE-2013-5832/" source="CVE"/>
		<reference ref_id="CVE-2013-5838" ref_url="https://www.suse.com/security/cve/CVE-2013-5838/" source="CVE"/>
		<reference ref_id="CVE-2013-5840" ref_url="https://www.suse.com/security/cve/CVE-2013-5840/" source="CVE"/>
		<reference ref_id="CVE-2013-5842" ref_url="https://www.suse.com/security/cve/CVE-2013-5842/" source="CVE"/>
		<reference ref_id="CVE-2013-5843" ref_url="https://www.suse.com/security/cve/CVE-2013-5843/" source="CVE"/>
		<reference ref_id="CVE-2013-5848" ref_url="https://www.suse.com/security/cve/CVE-2013-5848/" source="CVE"/>
		<reference ref_id="CVE-2013-5849" ref_url="https://www.suse.com/security/cve/CVE-2013-5849/" source="CVE"/>
		<reference ref_id="CVE-2013-5850" ref_url="https://www.suse.com/security/cve/CVE-2013-5850/" source="CVE"/>
		<reference ref_id="CVE-2013-5851" ref_url="https://www.suse.com/security/cve/CVE-2013-5851/" source="CVE"/>
		<reference ref_id="CVE-2013-5878" ref_url="https://www.suse.com/security/cve/CVE-2013-5878/" source="CVE"/>
		<reference ref_id="CVE-2013-5884" ref_url="https://www.suse.com/security/cve/CVE-2013-5884/" source="CVE"/>
		<reference ref_id="CVE-2013-5887" ref_url="https://www.suse.com/security/cve/CVE-2013-5887/" source="CVE"/>
		<reference ref_id="CVE-2013-5888" ref_url="https://www.suse.com/security/cve/CVE-2013-5888/" source="CVE"/>
		<reference ref_id="CVE-2013-5889" ref_url="https://www.suse.com/security/cve/CVE-2013-5889/" source="CVE"/>
		<reference ref_id="CVE-2013-5896" ref_url="https://www.suse.com/security/cve/CVE-2013-5896/" source="CVE"/>
		<reference ref_id="CVE-2013-5898" ref_url="https://www.suse.com/security/cve/CVE-2013-5898/" source="CVE"/>
		<reference ref_id="CVE-2013-5899" ref_url="https://www.suse.com/security/cve/CVE-2013-5899/" source="CVE"/>
		<reference ref_id="CVE-2013-5907" ref_url="https://www.suse.com/security/cve/CVE-2013-5907/" source="CVE"/>
		<reference ref_id="CVE-2013-5910" ref_url="https://www.suse.com/security/cve/CVE-2013-5910/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6954" ref_url="https://www.suse.com/security/cve/CVE-2013-6954/" source="CVE"/>
		<reference ref_id="CVE-2014-0368" ref_url="https://www.suse.com/security/cve/CVE-2014-0368/" source="CVE"/>
		<reference ref_id="CVE-2014-0373" ref_url="https://www.suse.com/security/cve/CVE-2014-0373/" source="CVE"/>
		<reference ref_id="CVE-2014-0375" ref_url="https://www.suse.com/security/cve/CVE-2014-0375/" source="CVE"/>
		<reference ref_id="CVE-2014-0376" ref_url="https://www.suse.com/security/cve/CVE-2014-0376/" source="CVE"/>
		<reference ref_id="CVE-2014-0387" ref_url="https://www.suse.com/security/cve/CVE-2014-0387/" source="CVE"/>
		<reference ref_id="CVE-2014-0403" ref_url="https://www.suse.com/security/cve/CVE-2014-0403/" source="CVE"/>
		<reference ref_id="CVE-2014-0410" ref_url="https://www.suse.com/security/cve/CVE-2014-0410/" source="CVE"/>
		<reference ref_id="CVE-2014-0411" ref_url="https://www.suse.com/security/cve/CVE-2014-0411/" source="CVE"/>
		<reference ref_id="CVE-2014-0415" ref_url="https://www.suse.com/security/cve/CVE-2014-0415/" source="CVE"/>
		<reference ref_id="CVE-2014-0416" ref_url="https://www.suse.com/security/cve/CVE-2014-0416/" source="CVE"/>
		<reference ref_id="CVE-2014-0417" ref_url="https://www.suse.com/security/cve/CVE-2014-0417/" source="CVE"/>
		<reference ref_id="CVE-2014-0422" ref_url="https://www.suse.com/security/cve/CVE-2014-0422/" source="CVE"/>
		<reference ref_id="CVE-2014-0423" ref_url="https://www.suse.com/security/cve/CVE-2014-0423/" source="CVE"/>
		<reference ref_id="CVE-2014-0424" ref_url="https://www.suse.com/security/cve/CVE-2014-0424/" source="CVE"/>
		<reference ref_id="CVE-2014-0428" ref_url="https://www.suse.com/security/cve/CVE-2014-0428/" source="CVE"/>
		<reference ref_id="CVE-2014-0429" ref_url="https://www.suse.com/security/cve/CVE-2014-0429/" source="CVE"/>
		<reference ref_id="CVE-2014-0446" ref_url="https://www.suse.com/security/cve/CVE-2014-0446/" source="CVE"/>
		<reference ref_id="CVE-2014-0449" ref_url="https://www.suse.com/security/cve/CVE-2014-0449/" source="CVE"/>
		<reference ref_id="CVE-2014-0451" ref_url="https://www.suse.com/security/cve/CVE-2014-0451/" source="CVE"/>
		<reference ref_id="CVE-2014-0452" ref_url="https://www.suse.com/security/cve/CVE-2014-0452/" source="CVE"/>
		<reference ref_id="CVE-2014-0453" ref_url="https://www.suse.com/security/cve/CVE-2014-0453/" source="CVE"/>
		<reference ref_id="CVE-2014-0457" ref_url="https://www.suse.com/security/cve/CVE-2014-0457/" source="CVE"/>
		<reference ref_id="CVE-2014-0458" ref_url="https://www.suse.com/security/cve/CVE-2014-0458/" source="CVE"/>
		<reference ref_id="CVE-2014-0459" ref_url="https://www.suse.com/security/cve/CVE-2014-0459/" source="CVE"/>
		<reference ref_id="CVE-2014-0460" ref_url="https://www.suse.com/security/cve/CVE-2014-0460/" source="CVE"/>
		<reference ref_id="CVE-2014-0461" ref_url="https://www.suse.com/security/cve/CVE-2014-0461/" source="CVE"/>
		<reference ref_id="CVE-2014-0878" ref_url="https://www.suse.com/security/cve/CVE-2014-0878/" source="CVE"/>
		<reference ref_id="CVE-2014-1876" ref_url="https://www.suse.com/security/cve/CVE-2014-1876/" source="CVE"/>
		<reference ref_id="CVE-2014-2398" ref_url="https://www.suse.com/security/cve/CVE-2014-2398/" source="CVE"/>
		<reference ref_id="CVE-2014-2401" ref_url="https://www.suse.com/security/cve/CVE-2014-2401/" source="CVE"/>
		<reference ref_id="CVE-2014-2409" ref_url="https://www.suse.com/security/cve/CVE-2014-2409/" source="CVE"/>
		<reference ref_id="CVE-2014-2412" ref_url="https://www.suse.com/security/cve/CVE-2014-2412/" source="CVE"/>
		<reference ref_id="CVE-2014-2414" ref_url="https://www.suse.com/security/cve/CVE-2014-2414/" source="CVE"/>
		<reference ref_id="CVE-2014-2420" ref_url="https://www.suse.com/security/cve/CVE-2014-2420/" source="CVE"/>
		<reference ref_id="CVE-2014-2421" ref_url="https://www.suse.com/security/cve/CVE-2014-2421/" source="CVE"/>
		<reference ref_id="CVE-2014-2423" ref_url="https://www.suse.com/security/cve/CVE-2014-2423/" source="CVE"/>
		<reference ref_id="CVE-2014-2427" ref_url="https://www.suse.com/security/cve/CVE-2014-2427/" source="CVE"/>
		<reference ref_id="CVE-2014-2428" ref_url="https://www.suse.com/security/cve/CVE-2014-2428/" source="CVE"/>
		<reference ref_id="CVE-2014-8891" ref_url="https://www.suse.com/security/cve/CVE-2014-8891/" source="CVE"/>
		<reference ref_id="CVE-2014-8892" ref_url="https://www.suse.com/security/cve/CVE-2014-8892/" source="CVE"/>
		<reference ref_id="CVE-2015-0138" ref_url="https://www.suse.com/security/cve/CVE-2015-0138/" source="CVE"/>
		<reference ref_id="CVE-2015-0192" ref_url="https://www.suse.com/security/cve/CVE-2015-0192/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0458" ref_url="https://www.suse.com/security/cve/CVE-2015-0458/" source="CVE"/>
		<reference ref_id="CVE-2015-0459" ref_url="https://www.suse.com/security/cve/CVE-2015-0459/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-0491" ref_url="https://www.suse.com/security/cve/CVE-2015-0491/" source="CVE"/>
		<reference ref_id="CVE-2015-1914" ref_url="https://www.suse.com/security/cve/CVE-2015-1914/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001445.html" source="SUSE-SU"/>
		<description>

IBM Java 6 SR15 has been released and fixes lots of bugs and security 
issues.

More information can be found on: 
http://www.ibm.com/developerworks/java/jdk/alerts/
&lt;http://www.ibm.com/developerworks/java/jdk/alerts/&gt;

Security Issue references:

    * CVE-2013-5458
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5458&gt;
    * CVE-2013-5456
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5456&gt;
    * CVE-2013-5457
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5457&gt;
    * CVE-2013-4041
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4041&gt;
    * CVE-2013-5375
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5375&gt;
    * CVE-2013-5372
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5372&gt;
    * CVE-2013-5843
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5843&gt;
    * CVE-2013-5789
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5789&gt;
    * CVE-2013-5830
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830&gt;
    * CVE-2013-5829
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829&gt;
    * CVE-2013-5787
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5787&gt;
    * CVE-2013-5788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5788&gt;
    * CVE-2013-5824
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5824&gt;
    * CVE-2013-5842
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842&gt;
    * CVE-2013-5782
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782&gt;
    * CVE-2013-5817
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817&gt;
    * CVE-2013-5809
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809&gt;
    * CVE-2013-5814
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814&gt;
    * CVE-2013-5832
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5832&gt;
    * CVE-2013-5850
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850&gt;
    * CVE-2013-5838
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5838&gt;
    * CVE-2013-5802
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802&gt;
    * CVE-2013-5812
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5812&gt;
    * CVE-2013-5804
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804&gt;
    * CVE-2013-5783
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783&gt;
    * CVE-2013-3829
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829&gt;
    * CVE-2013-5823
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823&gt;
    * CVE-2013-5831
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5831&gt;
    * CVE-2013-5820
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820&gt;
    * CVE-2013-5819
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5819&gt;
    * CVE-2013-5818
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5818&gt;
    * CVE-2013-5848
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5848&gt;
    * CVE-2013-5776
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5776&gt;
    * CVE-2013-5774
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774&gt;
    * CVE-2013-5825
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825&gt;
    * CVE-2013-5840
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840&gt;
    * CVE-2013-5801
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5801&gt;
    * CVE-2013-5778
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778&gt;
    * CVE-2013-5851
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5851&gt;
    * CVE-2013-5800
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5800&gt;
    * CVE-2013-5784
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784&gt;
    * CVE-2013-5849
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849&gt;
    * CVE-2013-5790
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790&gt;
    * CVE-2013-5780
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780&gt;
    * CVE-2013-5797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797&gt;
    * CVE-2013-5803
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803&gt;
    * CVE-2013-5772
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-15"/>
	<updated date="2013-11-15"/>
	<bugzilla href="https://bugzilla.suse.com/592934">SUSE bug 592934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/666744">SUSE bug 666744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/771808">SUSE bug 771808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773021">SUSE bug 773021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778629">SUSE bug 778629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785631">SUSE bug 785631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808625">SUSE bug 808625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813939">SUSE bug 813939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817062">SUSE bug 817062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823034">SUSE bug 823034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901223">SUSE bug 901223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912434">SUSE bug 912434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912447">SUSE bug 912447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916265">SUSE bug 916265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916266">SUSE bug 916266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930365">SUSE bug 930365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931702">SUSE bug 931702</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0551/">CVE-2012-0551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0551">CVE-2012-0551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1531/">CVE-2012-1531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1531">CVE-2012-1531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1532/">CVE-2012-1532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1532">CVE-2012-1532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1533/">CVE-2012-1533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1533">CVE-2012-1533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1541/">CVE-2012-1541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1541">CVE-2012-1541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1713/">CVE-2012-1713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1713">CVE-2012-1713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1716/">CVE-2012-1716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1716">CVE-2012-1716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1717/">CVE-2012-1717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1717">CVE-2012-1717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1718/">CVE-2012-1718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1718">CVE-2012-1718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1719/">CVE-2012-1719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1719">CVE-2012-1719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1721/">CVE-2012-1721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1721">CVE-2012-1721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1722/">CVE-2012-1722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1722">CVE-2012-1722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1725/">CVE-2012-1725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1725">CVE-2012-1725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3143/">CVE-2012-3143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3143">CVE-2012-3143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3159/">CVE-2012-3159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3159">CVE-2012-3159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3213/">CVE-2012-3213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3213">CVE-2012-3213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3216/">CVE-2012-3216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3216">CVE-2012-3216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3342/">CVE-2012-3342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3342">CVE-2012-3342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5068/">CVE-2012-5068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5068">CVE-2012-5068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5069/">CVE-2012-5069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5069">CVE-2012-5069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5071/">CVE-2012-5071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5071">CVE-2012-5071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5072/">CVE-2012-5072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5072">CVE-2012-5072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5073/">CVE-2012-5073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5073">CVE-2012-5073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5075/">CVE-2012-5075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5075">CVE-2012-5075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5079/">CVE-2012-5079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5079">CVE-2012-5079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5081/">CVE-2012-5081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5081">CVE-2012-5081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5083/">CVE-2012-5083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5083">CVE-2012-5083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5084/">CVE-2012-5084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5084">CVE-2012-5084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5089/">CVE-2012-5089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5089">CVE-2012-5089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0169">CVE-2013-0169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0351/">CVE-2013-0351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0351">CVE-2013-0351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0401/">CVE-2013-0401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0401">CVE-2013-0401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0409/">CVE-2013-0409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0409">CVE-2013-0409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0419/">CVE-2013-0419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0419">CVE-2013-0419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0423/">CVE-2013-0423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0423">CVE-2013-0423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0424/">CVE-2013-0424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0424">CVE-2013-0424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0425/">CVE-2013-0425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0425">CVE-2013-0425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0426/">CVE-2013-0426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0426">CVE-2013-0426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0427/">CVE-2013-0427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0427">CVE-2013-0427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0428/">CVE-2013-0428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0428">CVE-2013-0428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0432/">CVE-2013-0432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0432">CVE-2013-0432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0433/">CVE-2013-0433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0433">CVE-2013-0433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0434/">CVE-2013-0434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0434">CVE-2013-0434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0435/">CVE-2013-0435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0435">CVE-2013-0435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0438/">CVE-2013-0438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0438">CVE-2013-0438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0440/">CVE-2013-0440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0440">CVE-2013-0440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0441/">CVE-2013-0441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0441">CVE-2013-0441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0442/">CVE-2013-0442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0442">CVE-2013-0442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0443/">CVE-2013-0443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0443">CVE-2013-0443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0445/">CVE-2013-0445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0445">CVE-2013-0445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0446/">CVE-2013-0446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0446">CVE-2013-0446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0450/">CVE-2013-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0450">CVE-2013-0450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0485/">CVE-2013-0485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0485">CVE-2013-0485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0809/">CVE-2013-0809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0809">CVE-2013-0809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1473/">CVE-2013-1473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1473">CVE-2013-1473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1476/">CVE-2013-1476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1476">CVE-2013-1476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1478/">CVE-2013-1478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1478">CVE-2013-1478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1480/">CVE-2013-1480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1480">CVE-2013-1480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1481/">CVE-2013-1481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1481">CVE-2013-1481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1486/">CVE-2013-1486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1486">CVE-2013-1486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1487/">CVE-2013-1487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1487">CVE-2013-1487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1491/">CVE-2013-1491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1491">CVE-2013-1491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1493/">CVE-2013-1493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1493">CVE-2013-1493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1500/">CVE-2013-1500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1500">CVE-2013-1500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1537/">CVE-2013-1537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1537">CVE-2013-1537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1540/">CVE-2013-1540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1540">CVE-2013-1540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1557/">CVE-2013-1557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1557">CVE-2013-1557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1563/">CVE-2013-1563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1563">CVE-2013-1563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1569/">CVE-2013-1569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1569">CVE-2013-1569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1571/">CVE-2013-1571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1571">CVE-2013-1571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2383/">CVE-2013-2383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2383">CVE-2013-2383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2384/">CVE-2013-2384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2384">CVE-2013-2384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2394/">CVE-2013-2394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2394">CVE-2013-2394 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2407/">CVE-2013-2407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2407">CVE-2013-2407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2412/">CVE-2013-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2412">CVE-2013-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2417/">CVE-2013-2417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2417">CVE-2013-2417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2418/">CVE-2013-2418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2418">CVE-2013-2418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2419/">CVE-2013-2419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2419">CVE-2013-2419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2420/">CVE-2013-2420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2420">CVE-2013-2420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2422/">CVE-2013-2422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2422">CVE-2013-2422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2424/">CVE-2013-2424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2424">CVE-2013-2424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2429/">CVE-2013-2429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2429">CVE-2013-2429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2430/">CVE-2013-2430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2430">CVE-2013-2430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2432/">CVE-2013-2432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2432">CVE-2013-2432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2433/">CVE-2013-2433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2433">CVE-2013-2433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2435/">CVE-2013-2435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2435">CVE-2013-2435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2437/">CVE-2013-2437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2437">CVE-2013-2437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2440/">CVE-2013-2440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2440">CVE-2013-2440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2442/">CVE-2013-2442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2442">CVE-2013-2442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2443/">CVE-2013-2443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2443">CVE-2013-2443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2444/">CVE-2013-2444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2444">CVE-2013-2444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2446/">CVE-2013-2446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2446">CVE-2013-2446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2447/">CVE-2013-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2447">CVE-2013-2447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2448/">CVE-2013-2448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2448">CVE-2013-2448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2450/">CVE-2013-2450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2450">CVE-2013-2450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2451/">CVE-2013-2451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2451">CVE-2013-2451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2452/">CVE-2013-2452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2452">CVE-2013-2452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2453/">CVE-2013-2453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2453">CVE-2013-2453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2454/">CVE-2013-2454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2454">CVE-2013-2454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2455/">CVE-2013-2455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2455">CVE-2013-2455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2456/">CVE-2013-2456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2456">CVE-2013-2456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2457/">CVE-2013-2457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2457">CVE-2013-2457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2459/">CVE-2013-2459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2459">CVE-2013-2459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2463/">CVE-2013-2463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2463">CVE-2013-2463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2464/">CVE-2013-2464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2464">CVE-2013-2464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2465/">CVE-2013-2465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2465">CVE-2013-2465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2466/">CVE-2013-2466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2466">CVE-2013-2466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2468/">CVE-2013-2468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2468">CVE-2013-2468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2469/">CVE-2013-2469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2469">CVE-2013-2469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2470/">CVE-2013-2470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2470">CVE-2013-2470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2471/">CVE-2013-2471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2471">CVE-2013-2471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2472/">CVE-2013-2472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2472">CVE-2013-2472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2473/">CVE-2013-2473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2473">CVE-2013-2473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3009/">CVE-2013-3009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3009">CVE-2013-3009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3011/">CVE-2013-3011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3011">CVE-2013-3011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3012/">CVE-2013-3012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3012">CVE-2013-3012 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3743/">CVE-2013-3743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3743">CVE-2013-3743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3829/">CVE-2013-3829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3829">CVE-2013-3829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4002/">CVE-2013-4002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4002">CVE-2013-4002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4041/">CVE-2013-4041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4041">CVE-2013-4041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5372/">CVE-2013-5372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5372">CVE-2013-5372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5375/">CVE-2013-5375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5375">CVE-2013-5375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5456/">CVE-2013-5456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5456">CVE-2013-5456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5457/">CVE-2013-5457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5457">CVE-2013-5457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5458/">CVE-2013-5458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5458">CVE-2013-5458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5772/">CVE-2013-5772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5772">CVE-2013-5772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5774/">CVE-2013-5774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5774">CVE-2013-5774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5776/">CVE-2013-5776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5776">CVE-2013-5776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5778/">CVE-2013-5778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5778">CVE-2013-5778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5780/">CVE-2013-5780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5780">CVE-2013-5780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5782/">CVE-2013-5782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5782">CVE-2013-5782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5783/">CVE-2013-5783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5783">CVE-2013-5783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5784/">CVE-2013-5784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5784">CVE-2013-5784 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5787/">CVE-2013-5787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5787">CVE-2013-5787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5788/">CVE-2013-5788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5788">CVE-2013-5788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5789/">CVE-2013-5789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5789">CVE-2013-5789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5790/">CVE-2013-5790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5790">CVE-2013-5790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5797/">CVE-2013-5797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5797">CVE-2013-5797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5800/">CVE-2013-5800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5800">CVE-2013-5800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5801/">CVE-2013-5801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5801">CVE-2013-5801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5802/">CVE-2013-5802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5802">CVE-2013-5802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5803/">CVE-2013-5803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5803">CVE-2013-5803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5804/">CVE-2013-5804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5804">CVE-2013-5804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5809/">CVE-2013-5809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5809">CVE-2013-5809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5812/">CVE-2013-5812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5812">CVE-2013-5812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5814/">CVE-2013-5814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5814">CVE-2013-5814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5817/">CVE-2013-5817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5817">CVE-2013-5817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5818/">CVE-2013-5818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5818">CVE-2013-5818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5819/">CVE-2013-5819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5819">CVE-2013-5819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5820/">CVE-2013-5820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5820">CVE-2013-5820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5823/">CVE-2013-5823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5823">CVE-2013-5823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5824/">CVE-2013-5824 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5824">CVE-2013-5824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5825/">CVE-2013-5825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5825">CVE-2013-5825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5829/">CVE-2013-5829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5829">CVE-2013-5829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5830/">CVE-2013-5830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5830">CVE-2013-5830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5831/">CVE-2013-5831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5831">CVE-2013-5831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5832/">CVE-2013-5832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5832">CVE-2013-5832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5838/">CVE-2013-5838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5838">CVE-2013-5838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5840/">CVE-2013-5840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5840">CVE-2013-5840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5842/">CVE-2013-5842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5842">CVE-2013-5842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5843/">CVE-2013-5843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5843">CVE-2013-5843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5848/">CVE-2013-5848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5848">CVE-2013-5848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5849/">CVE-2013-5849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5849">CVE-2013-5849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5850/">CVE-2013-5850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5850">CVE-2013-5850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5851/">CVE-2013-5851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5851">CVE-2013-5851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5878/">CVE-2013-5878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5878">CVE-2013-5878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5884/">CVE-2013-5884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5884">CVE-2013-5884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5887/">CVE-2013-5887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5887">CVE-2013-5887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5888/">CVE-2013-5888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5888">CVE-2013-5888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5889/">CVE-2013-5889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5889">CVE-2013-5889 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5896/">CVE-2013-5896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5896">CVE-2013-5896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5898/">CVE-2013-5898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5898">CVE-2013-5898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5899/">CVE-2013-5899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5899">CVE-2013-5899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5907/">CVE-2013-5907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5907">CVE-2013-5907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5910/">CVE-2013-5910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5910">CVE-2013-5910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6629">CVE-2013-6629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6954/">CVE-2013-6954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6954">CVE-2013-6954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0368/">CVE-2014-0368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0368">CVE-2014-0368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0373/">CVE-2014-0373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0373">CVE-2014-0373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0375/">CVE-2014-0375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0375">CVE-2014-0375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0376/">CVE-2014-0376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0376">CVE-2014-0376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0387/">CVE-2014-0387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0387">CVE-2014-0387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0403/">CVE-2014-0403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0403">CVE-2014-0403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0410/">CVE-2014-0410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0410">CVE-2014-0410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0411/">CVE-2014-0411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0411">CVE-2014-0411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0415/">CVE-2014-0415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0415">CVE-2014-0415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0416/">CVE-2014-0416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0416">CVE-2014-0416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0417/">CVE-2014-0417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0417">CVE-2014-0417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0422/">CVE-2014-0422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0422">CVE-2014-0422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0423/">CVE-2014-0423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0423">CVE-2014-0423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0424/">CVE-2014-0424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0424">CVE-2014-0424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0428/">CVE-2014-0428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0428">CVE-2014-0428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0429/">CVE-2014-0429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0429">CVE-2014-0429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0446/">CVE-2014-0446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0446">CVE-2014-0446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0449/">CVE-2014-0449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0449">CVE-2014-0449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0451/">CVE-2014-0451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0451">CVE-2014-0451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0452/">CVE-2014-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0452">CVE-2014-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0453/">CVE-2014-0453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0453">CVE-2014-0453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0457/">CVE-2014-0457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0457">CVE-2014-0457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0458/">CVE-2014-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0458">CVE-2014-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0459/">CVE-2014-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0459">CVE-2014-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0460/">CVE-2014-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0460">CVE-2014-0460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0461/">CVE-2014-0461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0461">CVE-2014-0461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0878/">CVE-2014-0878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0878">CVE-2014-0878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1876/">CVE-2014-1876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1876">CVE-2014-1876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2398/">CVE-2014-2398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2398">CVE-2014-2398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2401/">CVE-2014-2401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2401">CVE-2014-2401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2409/">CVE-2014-2409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2409">CVE-2014-2409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2412/">CVE-2014-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2412">CVE-2014-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2414/">CVE-2014-2414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2414">CVE-2014-2414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2420/">CVE-2014-2420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2420">CVE-2014-2420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2421/">CVE-2014-2421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2421">CVE-2014-2421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2423/">CVE-2014-2423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2423">CVE-2014-2423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2427/">CVE-2014-2427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2427">CVE-2014-2427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2428/">CVE-2014-2428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2428">CVE-2014-2428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8891/">CVE-2014-8891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8891">CVE-2014-8891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8892/">CVE-2014-8892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8892">CVE-2014-8892 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0138/">CVE-2015-0138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0138">CVE-2015-0138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0192/">CVE-2015-0192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0192">CVE-2015-0192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0458/">CVE-2015-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0458">CVE-2015-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0459/">CVE-2015-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0459">CVE-2015-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0469">CVE-2015-0469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0477">CVE-2015-0477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0478">CVE-2015-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0480">CVE-2015-0480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0488">CVE-2015-0488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0491/">CVE-2015-0491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0491">CVE-2015-0491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1914/">CVE-2015-1914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1914">CVE-2015-1914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2808">CVE-2015-2808 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576219" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576220" comment="java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576221" comment="java-1_6_0-ibm-devel-1.6.0_sr16.0-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576222" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576223" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576224" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576219" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576220" comment="java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576221" comment="java-1_6_0-ibm-devel-1.6.0_sr16.0-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576222" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576223" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576224" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576219" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576220" comment="java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576221" comment="java-1_6_0-ibm-devel-1.6.0_sr16.0-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576222" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576223" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576224" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218060" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="935540" ref_url="https://bugzilla.suse.com/935540" source="BUGZILLA"/>
		<reference ref_id="936844" ref_url="https://bugzilla.suse.com/936844" source="BUGZILLA"/>
		<reference ref_id="938895" ref_url="https://bugzilla.suse.com/938895" source="BUGZILLA"/>
		<reference ref_id="941939" ref_url="https://bugzilla.suse.com/941939" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1931" ref_url="https://www.suse.com/security/cve/CVE-2015-1931/" source="CVE"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001577.html" source="SUSE-SU"/>
		<description>
IBM Java was updated to version 6 SR16 FP7 (6.0-16.7) to fix several security issues and bugs.

The following vulnerabilities were fixed:

* CVE-2015-1931: IBM Java Security Components store plain text data in memory dumps, which could allow a local attacker to obtain information to aid in further attacks against the system.
* CVE-2015-2590: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2601: Easily exploitable vulnerability in the JCE component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2621: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2625: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2632: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2637: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2638: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2664: Difficult to exploit vulnerability in the Deployment component requiring logon to Operating System. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2808: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java accessible data.
* CVE-2015-4000: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java Embedded accessible data. (bnc#935540)
* CVE-2015-4731: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4732: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4733: Easily exploitable vulnerability in the RMI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4748: Very difficult to exploit vulnerability in the Security component allowed successful unauthenticated network attacks via OCSP. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4749: Difficult to exploit vulnerability in the JNDI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized ability to cause a partial denial of service (partial DOS).
* CVE-2015-4760: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.

The following non-security bugs were fixed:

* bsc#936844: misconfigured update-alternative entries
* bsc#941939: provide %{name} instead of %{sdklnk} only in _jvmprivdir
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-21"/>
	<updated date="2015-08-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/935540">SUSE bug 935540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936844">SUSE bug 936844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941939">SUSE bug 941939</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1931/">CVE-2015-1931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1931">CVE-2015-1931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2590">CVE-2015-2590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2601">CVE-2015-2601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2621">CVE-2015-2621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2625">CVE-2015-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2632">CVE-2015-2632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2637">CVE-2015-2637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2638">CVE-2015-2638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2664">CVE-2015-2664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2808">CVE-2015-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4731">CVE-2015-4731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4732">CVE-2015-4732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4733">CVE-2015-4733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4748">CVE-2015-4748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4749">CVE-2015-4749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4760">CVE-2015-4760 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572026" comment="java-1_6_0-ibm-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572027" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576225" comment="java-1_6_0-ibm-devel-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572028" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572029" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572030" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218061" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="960286" ref_url="https://bugzilla.suse.com/960286" source="BUGZILLA"/>
		<reference ref_id="960402" ref_url="https://bugzilla.suse.com/960402" source="BUGZILLA"/>
		<reference ref_id="963937" ref_url="https://bugzilla.suse.com/963937" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5041" ref_url="https://www.suse.com/security/cve/CVE-2015-5041/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001872.html" source="SUSE-SU"/>
		<description>

This update for java-1_6_0-ibm fixes the following issues by updating to 6.0-16.20 (bsc#963937)

- CVE-2015-5041: Could could have invoked non-public interface methods under certain circumstances
- CVE-2015-7575: The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials
- CVE-2015-7981: libpng could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read in the png_convert_to_rfc1123 function. An attacker could exploit this vulnerability to obtain sensitive information
- CVE-2015-8126: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8472: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8540: libpng is vulnerable to a buffer overflow, caused by a read underflow in png_check_keyword in pngwutil.c. By sending an overly long argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
- CVE-2016-0402: An unspecified vulnerability related to the Networking component has no confidentiality impact, partial integrity impact, and no availability impact
- CVE-2016-0448: An unspecified vulnerability related to the JMX component could allow a remote attacker to obtain sensitive information
- CVE-2016-0466: An unspecified vulnerability related to the JAXP component could allow a remote attacker to cause a denial of service
- CVE-2016-0483: An unspecified vulnerability related to the AWT component has complete confidentiality impact, complete integrity impact, and complete availability impact
- CVE-2016-0494: An unspecified vulnerability related to the 2D component has complete confidentiality impact, complete integrity impact, and complete availability impact

The following bugs were fixed:

- bsc#960402: resolve package conflicts in devel package
- bsc#960286: resolve package conflicts in the fonts subpackage
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-11"/>
	<updated date="2016-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/960286">SUSE bug 960286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5041/">CVE-2015-5041 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5041">CVE-2015-5041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7981">CVE-2015-7981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8472">CVE-2015-8472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8540">CVE-2015-8540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0402">CVE-2016-0402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0448">CVE-2016-0448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0466">CVE-2016-0466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0483">CVE-2016-0483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0494">CVE-2016-0494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576226" comment="java-1_6_0-ibm-1.6.0_sr16.20-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576227" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.20-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576228" comment="java-1_6_0-ibm-devel-1.6.0_sr16.20-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576229" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576230" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576231" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218062" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="977646" ref_url="https://bugzilla.suse.com/977646" source="BUGZILLA"/>
		<reference ref_id="977648" ref_url="https://bugzilla.suse.com/977648" source="BUGZILLA"/>
		<reference ref_id="977650" ref_url="https://bugzilla.suse.com/977650" source="BUGZILLA"/>
		<reference ref_id="979252" ref_url="https://bugzilla.suse.com/979252" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0264" ref_url="https://www.suse.com/security/cve/CVE-2016-0264/" source="CVE"/>
		<reference ref_id="CVE-2016-0363" ref_url="https://www.suse.com/security/cve/CVE-2016-0363/" source="CVE"/>
		<reference ref_id="CVE-2016-0376" ref_url="https://www.suse.com/security/cve/CVE-2016-0376/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-3422" ref_url="https://www.suse.com/security/cve/CVE-2016-3422/" source="CVE"/>
		<reference ref_id="CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3443" ref_url="https://www.suse.com/security/cve/CVE-2016-3443/" source="CVE"/>
		<reference ref_id="CVE-2016-3449" ref_url="https://www.suse.com/security/cve/CVE-2016-3449/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002079.html" source="SUSE-SU"/>
		<description>

This IBM Java 1.6.0 SR16 FP25 release fixes the following issues:

Security issues fixed:
- CVE-2016-0264: buffer overflow vulnerability in the IBM JVM (bsc#977648)
- CVE-2016-0363: insecure use of invoke method in CORBA component, incorrect CVE-2013-3009 fix (bsc#977650)
- CVE-2016-0376: insecure deserialization in CORBA, incorrect CVE-2013-5456 fix (bsc#977646)
- The following CVEs got also fixed during this update. (bsc#979252)
  CVE-2016-3443, CVE-2016-0687, CVE-2016-0686, CVE-2016-3427, CVE-2016-3449, CVE-2016-3422, CVE-2016-3426
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-20"/>
	<updated date="2016-05-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/977646">SUSE bug 977646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977648">SUSE bug 977648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977650">SUSE bug 977650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0264/">CVE-2016-0264 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0264">CVE-2016-0264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0363/">CVE-2016-0363 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0363">CVE-2016-0363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0376/">CVE-2016-0376 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0376">CVE-2016-0376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0686">CVE-2016-0686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0687">CVE-2016-0687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3422/">CVE-2016-3422 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3422">CVE-2016-3422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3426">CVE-2016-3426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3427">CVE-2016-3427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3443/">CVE-2016-3443 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3443">CVE-2016-3443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3449/">CVE-2016-3449 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3449">CVE-2016-3449 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576232" comment="java-1_6_0-ibm-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576233" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576234" comment="java-1_6_0-ibm-devel-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576235" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576236" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576237" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218063" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="992537" ref_url="https://bugzilla.suse.com/992537" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002283.html" source="SUSE-SU"/>
		<description>

IBM Java 6 was updated to version 6.0-16.30.

Following security issue was fixed: CVE-2016-3485

Please see https://www.ibm.com/developerworks/java/jdk/alerts/ for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-21"/>
	<updated date="2016-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/992537">SUSE bug 992537</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485 at SUSE</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3485">CVE-2016-3485 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576238" comment="java-1_6_0-ibm-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567999" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576239" comment="java-1_6_0-ibm-devel-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576240" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576241" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576242" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.30-75.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218064" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1009280" ref_url="https://bugzilla.suse.com/1009280" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002445.html" source="SUSE-SU"/>
		<description>

This update for java-1_6_0-ibm fixes the following issues:

- Version update to 6.0-16.35 (bsc#1009280) fixing the following CVE's:
  CVE-2016-5568, CVE-2016-5556, CVE-2016-5573, CVE-2016-5597, CVE-2016-5554,
  CVE-2016-5542
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-07"/>
	<updated date="2016-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5542">CVE-2016-5542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5554">CVE-2016-5554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5556">CVE-2016-5556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5568">CVE-2016-5568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5573">CVE-2016-5573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5597">CVE-2016-5597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576243" comment="java-1_6_0-ibm-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568005" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576244" comment="java-1_6_0-ibm-devel-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576245" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576246" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576247" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.35-78.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218065" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="955131" ref_url="https://bugzilla.suse.com/955131" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0458" ref_url="https://www.suse.com/security/cve/CVE-2015-0458/" source="CVE"/>
		<reference ref_id="CVE-2015-0459" ref_url="https://www.suse.com/security/cve/CVE-2015-0459/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-0491" ref_url="https://www.suse.com/security/cve/CVE-2015-0491/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-5006" ref_url="https://www.suse.com/security/cve/CVE-2015-5006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001705.html" source="SUSE-SU"/>
		<description>

This update for java-1_6_0-ibm fixes the following issues: 

- Version update to 6.0-16.15 bsc#955131:
  CVE-2015-4734 CVE-2015-4803 CVE-2015-4805 CVE-2015-4806 CVE-2015-4810
  CVE-2015-4835 CVE-2015-4840 CVE-2015-4842 CVE-2015-4843 CVE-2015-4844
  CVE-2015-4860 CVE-2015-4871 CVE-2015-4872 CVE-2015-4882 CVE-2015-4883
  CVE-2015-4893 CVE-2015-4902 CVE-2015-4903 CVE-2015-4911 CVE-2015-5006

  CVE-2015-2808 CVE-2015-2625 CVE-2015-0491 CVE-2015-0459 CVE-2015-0469
  CVE-2015-0458 CVE-2015-0480 CVE-2015-0488 CVE-2015-0478 CVE-2015-0477
  CVE-2015-0204		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-26"/>
	<updated date="2015-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0458/">CVE-2015-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0458">CVE-2015-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0459/">CVE-2015-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0459">CVE-2015-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0469">CVE-2015-0469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0477">CVE-2015-0477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0478">CVE-2015-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0480">CVE-2015-0480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0488">CVE-2015-0488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0491/">CVE-2015-0491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0491">CVE-2015-0491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2625">CVE-2015-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2808">CVE-2015-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4734">CVE-2015-4734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4803">CVE-2015-4803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4805">CVE-2015-4805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4806">CVE-2015-4806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4810">CVE-2015-4810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4835">CVE-2015-4835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4840">CVE-2015-4840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4842">CVE-2015-4842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4843">CVE-2015-4843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4844">CVE-2015-4844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4860">CVE-2015-4860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4871">CVE-2015-4871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4872">CVE-2015-4872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4882">CVE-2015-4882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4883">CVE-2015-4883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4893">CVE-2015-4893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4902">CVE-2015-4902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4903">CVE-2015-4903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4911">CVE-2015-4911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5006/">CVE-2015-5006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5006">CVE-2015-5006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576248" comment="java-1_6_0-ibm-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576249" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576250" comment="java-1_6_0-ibm-devel-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576251" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576252" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576253" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218066" version="1" class="patch">
	<metadata>
		<title>Security update for IBM Java 7</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="592934" ref_url="https://bugzilla.suse.com/592934" source="BUGZILLA"/>
		<reference ref_id="772640" ref_url="https://bugzilla.suse.com/772640" source="BUGZILLA"/>
		<reference ref_id="780897" ref_url="https://bugzilla.suse.com/780897" source="BUGZILLA"/>
		<reference ref_id="788750" ref_url="https://bugzilla.suse.com/788750" source="BUGZILLA"/>
		<reference ref_id="798535" ref_url="https://bugzilla.suse.com/798535" source="BUGZILLA"/>
		<reference ref_id="813939" ref_url="https://bugzilla.suse.com/813939" source="BUGZILLA"/>
		<reference ref_id="817062" ref_url="https://bugzilla.suse.com/817062" source="BUGZILLA"/>
		<reference ref_id="819285" ref_url="https://bugzilla.suse.com/819285" source="BUGZILLA"/>
		<reference ref_id="819288" ref_url="https://bugzilla.suse.com/819288" source="BUGZILLA"/>
		<reference ref_id="823034" ref_url="https://bugzilla.suse.com/823034" source="BUGZILLA"/>
		<reference ref_id="829212" ref_url="https://bugzilla.suse.com/829212" source="BUGZILLA"/>
		<reference ref_id="849212" ref_url="https://bugzilla.suse.com/849212" source="BUGZILLA"/>
		<reference ref_id="862064" ref_url="https://bugzilla.suse.com/862064" source="BUGZILLA"/>
		<reference ref_id="877429" ref_url="https://bugzilla.suse.com/877429" source="BUGZILLA"/>
		<reference ref_id="891701" ref_url="https://bugzilla.suse.com/891701" source="BUGZILLA"/>
		<reference ref_id="901223" ref_url="https://bugzilla.suse.com/901223" source="BUGZILLA"/>
		<reference ref_id="901239" ref_url="https://bugzilla.suse.com/901239" source="BUGZILLA"/>
		<reference ref_id="904889" ref_url="https://bugzilla.suse.com/904889" source="BUGZILLA"/>
		<reference ref_id="912434" ref_url="https://bugzilla.suse.com/912434" source="BUGZILLA"/>
		<reference ref_id="912447" ref_url="https://bugzilla.suse.com/912447" source="BUGZILLA"/>
		<reference ref_id="916265" ref_url="https://bugzilla.suse.com/916265" source="BUGZILLA"/>
		<reference ref_id="916266" ref_url="https://bugzilla.suse.com/916266" source="BUGZILLA"/>
		<reference ref_id="930365" ref_url="https://bugzilla.suse.com/930365" source="BUGZILLA"/>
		<reference ref_id="931702" ref_url="https://bugzilla.suse.com/931702" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0547" ref_url="https://www.suse.com/security/cve/CVE-2012-0547/" source="CVE"/>
		<reference ref_id="CVE-2012-0551" ref_url="https://www.suse.com/security/cve/CVE-2012-0551/" source="CVE"/>
		<reference ref_id="CVE-2012-1531" ref_url="https://www.suse.com/security/cve/CVE-2012-1531/" source="CVE"/>
		<reference ref_id="CVE-2012-1532" ref_url="https://www.suse.com/security/cve/CVE-2012-1532/" source="CVE"/>
		<reference ref_id="CVE-2012-1533" ref_url="https://www.suse.com/security/cve/CVE-2012-1533/" source="CVE"/>
		<reference ref_id="CVE-2012-1541" ref_url="https://www.suse.com/security/cve/CVE-2012-1541/" source="CVE"/>
		<reference ref_id="CVE-2012-1682" ref_url="https://www.suse.com/security/cve/CVE-2012-1682/" source="CVE"/>
		<reference ref_id="CVE-2012-1713" ref_url="https://www.suse.com/security/cve/CVE-2012-1713/" source="CVE"/>
		<reference ref_id="CVE-2012-1716" ref_url="https://www.suse.com/security/cve/CVE-2012-1716/" source="CVE"/>
		<reference ref_id="CVE-2012-1717" ref_url="https://www.suse.com/security/cve/CVE-2012-1717/" source="CVE"/>
		<reference ref_id="CVE-2012-1718" ref_url="https://www.suse.com/security/cve/CVE-2012-1718/" source="CVE"/>
		<reference ref_id="CVE-2012-1719" ref_url="https://www.suse.com/security/cve/CVE-2012-1719/" source="CVE"/>
		<reference ref_id="CVE-2012-1721" ref_url="https://www.suse.com/security/cve/CVE-2012-1721/" source="CVE"/>
		<reference ref_id="CVE-2012-1722" ref_url="https://www.suse.com/security/cve/CVE-2012-1722/" source="CVE"/>
		<reference ref_id="CVE-2012-1725" ref_url="https://www.suse.com/security/cve/CVE-2012-1725/" source="CVE"/>
		<reference ref_id="CVE-2012-1726" ref_url="https://www.suse.com/security/cve/CVE-2012-1726/" source="CVE"/>
		<reference ref_id="CVE-2012-3136" ref_url="https://www.suse.com/security/cve/CVE-2012-3136/" source="CVE"/>
		<reference ref_id="CVE-2012-3143" ref_url="https://www.suse.com/security/cve/CVE-2012-3143/" source="CVE"/>
		<reference ref_id="CVE-2012-3159" ref_url="https://www.suse.com/security/cve/CVE-2012-3159/" source="CVE"/>
		<reference ref_id="CVE-2012-3174" ref_url="https://www.suse.com/security/cve/CVE-2012-3174/" source="CVE"/>
		<reference ref_id="CVE-2012-3213" ref_url="https://www.suse.com/security/cve/CVE-2012-3213/" source="CVE"/>
		<reference ref_id="CVE-2012-3216" ref_url="https://www.suse.com/security/cve/CVE-2012-3216/" source="CVE"/>
		<reference ref_id="CVE-2012-3342" ref_url="https://www.suse.com/security/cve/CVE-2012-3342/" source="CVE"/>
		<reference ref_id="CVE-2012-4681" ref_url="https://www.suse.com/security/cve/CVE-2012-4681/" source="CVE"/>
		<reference ref_id="CVE-2012-5067" ref_url="https://www.suse.com/security/cve/CVE-2012-5067/" source="CVE"/>
		<reference ref_id="CVE-2012-5069" ref_url="https://www.suse.com/security/cve/CVE-2012-5069/" source="CVE"/>
		<reference ref_id="CVE-2012-5070" ref_url="https://www.suse.com/security/cve/CVE-2012-5070/" source="CVE"/>
		<reference ref_id="CVE-2012-5071" ref_url="https://www.suse.com/security/cve/CVE-2012-5071/" source="CVE"/>
		<reference ref_id="CVE-2012-5072" ref_url="https://www.suse.com/security/cve/CVE-2012-5072/" source="CVE"/>
		<reference ref_id="CVE-2012-5073" ref_url="https://www.suse.com/security/cve/CVE-2012-5073/" source="CVE"/>
		<reference ref_id="CVE-2012-5074" ref_url="https://www.suse.com/security/cve/CVE-2012-5074/" source="CVE"/>
		<reference ref_id="CVE-2012-5075" ref_url="https://www.suse.com/security/cve/CVE-2012-5075/" source="CVE"/>
		<reference ref_id="CVE-2012-5076" ref_url="https://www.suse.com/security/cve/CVE-2012-5076/" source="CVE"/>
		<reference ref_id="CVE-2012-5077" ref_url="https://www.suse.com/security/cve/CVE-2012-5077/" source="CVE"/>
		<reference ref_id="CVE-2012-5079" ref_url="https://www.suse.com/security/cve/CVE-2012-5079/" source="CVE"/>
		<reference ref_id="CVE-2012-5081" ref_url="https://www.suse.com/security/cve/CVE-2012-5081/" source="CVE"/>
		<reference ref_id="CVE-2012-5083" ref_url="https://www.suse.com/security/cve/CVE-2012-5083/" source="CVE"/>
		<reference ref_id="CVE-2012-5084" ref_url="https://www.suse.com/security/cve/CVE-2012-5084/" source="CVE"/>
		<reference ref_id="CVE-2012-5086" ref_url="https://www.suse.com/security/cve/CVE-2012-5086/" source="CVE"/>
		<reference ref_id="CVE-2012-5087" ref_url="https://www.suse.com/security/cve/CVE-2012-5087/" source="CVE"/>
		<reference ref_id="CVE-2012-5088" ref_url="https://www.suse.com/security/cve/CVE-2012-5088/" source="CVE"/>
		<reference ref_id="CVE-2012-5089" ref_url="https://www.suse.com/security/cve/CVE-2012-5089/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-0351" ref_url="https://www.suse.com/security/cve/CVE-2013-0351/" source="CVE"/>
		<reference ref_id="CVE-2013-0401" ref_url="https://www.suse.com/security/cve/CVE-2013-0401/" source="CVE"/>
		<reference ref_id="CVE-2013-0409" ref_url="https://www.suse.com/security/cve/CVE-2013-0409/" source="CVE"/>
		<reference ref_id="CVE-2013-0419" ref_url="https://www.suse.com/security/cve/CVE-2013-0419/" source="CVE"/>
		<reference ref_id="CVE-2013-0422" ref_url="https://www.suse.com/security/cve/CVE-2013-0422/" source="CVE"/>
		<reference ref_id="CVE-2013-0423" ref_url="https://www.suse.com/security/cve/CVE-2013-0423/" source="CVE"/>
		<reference ref_id="CVE-2013-0424" ref_url="https://www.suse.com/security/cve/CVE-2013-0424/" source="CVE"/>
		<reference ref_id="CVE-2013-0425" ref_url="https://www.suse.com/security/cve/CVE-2013-0425/" source="CVE"/>
		<reference ref_id="CVE-2013-0426" ref_url="https://www.suse.com/security/cve/CVE-2013-0426/" source="CVE"/>
		<reference ref_id="CVE-2013-0427" ref_url="https://www.suse.com/security/cve/CVE-2013-0427/" source="CVE"/>
		<reference ref_id="CVE-2013-0428" ref_url="https://www.suse.com/security/cve/CVE-2013-0428/" source="CVE"/>
		<reference ref_id="CVE-2013-0431" ref_url="https://www.suse.com/security/cve/CVE-2013-0431/" source="CVE"/>
		<reference ref_id="CVE-2013-0432" ref_url="https://www.suse.com/security/cve/CVE-2013-0432/" source="CVE"/>
		<reference ref_id="CVE-2013-0433" ref_url="https://www.suse.com/security/cve/CVE-2013-0433/" source="CVE"/>
		<reference ref_id="CVE-2013-0434" ref_url="https://www.suse.com/security/cve/CVE-2013-0434/" source="CVE"/>
		<reference ref_id="CVE-2013-0435" ref_url="https://www.suse.com/security/cve/CVE-2013-0435/" source="CVE"/>
		<reference ref_id="CVE-2013-0437" ref_url="https://www.suse.com/security/cve/CVE-2013-0437/" source="CVE"/>
		<reference ref_id="CVE-2013-0438" ref_url="https://www.suse.com/security/cve/CVE-2013-0438/" source="CVE"/>
		<reference ref_id="CVE-2013-0440" ref_url="https://www.suse.com/security/cve/CVE-2013-0440/" source="CVE"/>
		<reference ref_id="CVE-2013-0441" ref_url="https://www.suse.com/security/cve/CVE-2013-0441/" source="CVE"/>
		<reference ref_id="CVE-2013-0442" ref_url="https://www.suse.com/security/cve/CVE-2013-0442/" source="CVE"/>
		<reference ref_id="CVE-2013-0443" ref_url="https://www.suse.com/security/cve/CVE-2013-0443/" source="CVE"/>
		<reference ref_id="CVE-2013-0444" ref_url="https://www.suse.com/security/cve/CVE-2013-0444/" source="CVE"/>
		<reference ref_id="CVE-2013-0445" ref_url="https://www.suse.com/security/cve/CVE-2013-0445/" source="CVE"/>
		<reference ref_id="CVE-2013-0446" ref_url="https://www.suse.com/security/cve/CVE-2013-0446/" source="CVE"/>
		<reference ref_id="CVE-2013-0449" ref_url="https://www.suse.com/security/cve/CVE-2013-0449/" source="CVE"/>
		<reference ref_id="CVE-2013-0450" ref_url="https://www.suse.com/security/cve/CVE-2013-0450/" source="CVE"/>
		<reference ref_id="CVE-2013-0485" ref_url="https://www.suse.com/security/cve/CVE-2013-0485/" source="CVE"/>
		<reference ref_id="CVE-2013-0809" ref_url="https://www.suse.com/security/cve/CVE-2013-0809/" source="CVE"/>
		<reference ref_id="CVE-2013-1473" ref_url="https://www.suse.com/security/cve/CVE-2013-1473/" source="CVE"/>
		<reference ref_id="CVE-2013-1476" ref_url="https://www.suse.com/security/cve/CVE-2013-1476/" source="CVE"/>
		<reference ref_id="CVE-2013-1478" ref_url="https://www.suse.com/security/cve/CVE-2013-1478/" source="CVE"/>
		<reference ref_id="CVE-2013-1480" ref_url="https://www.suse.com/security/cve/CVE-2013-1480/" source="CVE"/>
		<reference ref_id="CVE-2013-1484" ref_url="https://www.suse.com/security/cve/CVE-2013-1484/" source="CVE"/>
		<reference ref_id="CVE-2013-1485" ref_url="https://www.suse.com/security/cve/CVE-2013-1485/" source="CVE"/>
		<reference ref_id="CVE-2013-1486" ref_url="https://www.suse.com/security/cve/CVE-2013-1486/" source="CVE"/>
		<reference ref_id="CVE-2013-1487" ref_url="https://www.suse.com/security/cve/CVE-2013-1487/" source="CVE"/>
		<reference ref_id="CVE-2013-1491" ref_url="https://www.suse.com/security/cve/CVE-2013-1491/" source="CVE"/>
		<reference ref_id="CVE-2013-1493" ref_url="https://www.suse.com/security/cve/CVE-2013-1493/" source="CVE"/>
		<reference ref_id="CVE-2013-1500" ref_url="https://www.suse.com/security/cve/CVE-2013-1500/" source="CVE"/>
		<reference ref_id="CVE-2013-1537" ref_url="https://www.suse.com/security/cve/CVE-2013-1537/" source="CVE"/>
		<reference ref_id="CVE-2013-1540" ref_url="https://www.suse.com/security/cve/CVE-2013-1540/" source="CVE"/>
		<reference ref_id="CVE-2013-1557" ref_url="https://www.suse.com/security/cve/CVE-2013-1557/" source="CVE"/>
		<reference ref_id="CVE-2013-1563" ref_url="https://www.suse.com/security/cve/CVE-2013-1563/" source="CVE"/>
		<reference ref_id="CVE-2013-1569" ref_url="https://www.suse.com/security/cve/CVE-2013-1569/" source="CVE"/>
		<reference ref_id="CVE-2013-1571" ref_url="https://www.suse.com/security/cve/CVE-2013-1571/" source="CVE"/>
		<reference ref_id="CVE-2013-2383" ref_url="https://www.suse.com/security/cve/CVE-2013-2383/" source="CVE"/>
		<reference ref_id="CVE-2013-2384" ref_url="https://www.suse.com/security/cve/CVE-2013-2384/" source="CVE"/>
		<reference ref_id="CVE-2013-2394" ref_url="https://www.suse.com/security/cve/CVE-2013-2394/" source="CVE"/>
		<reference ref_id="CVE-2013-2400" ref_url="https://www.suse.com/security/cve/CVE-2013-2400/" source="CVE"/>
		<reference ref_id="CVE-2013-2407" ref_url="https://www.suse.com/security/cve/CVE-2013-2407/" source="CVE"/>
		<reference ref_id="CVE-2013-2412" ref_url="https://www.suse.com/security/cve/CVE-2013-2412/" source="CVE"/>
		<reference ref_id="CVE-2013-2417" ref_url="https://www.suse.com/security/cve/CVE-2013-2417/" source="CVE"/>
		<reference ref_id="CVE-2013-2418" ref_url="https://www.suse.com/security/cve/CVE-2013-2418/" source="CVE"/>
		<reference ref_id="CVE-2013-2419" ref_url="https://www.suse.com/security/cve/CVE-2013-2419/" source="CVE"/>
		<reference ref_id="CVE-2013-2420" ref_url="https://www.suse.com/security/cve/CVE-2013-2420/" source="CVE"/>
		<reference ref_id="CVE-2013-2422" ref_url="https://www.suse.com/security/cve/CVE-2013-2422/" source="CVE"/>
		<reference ref_id="CVE-2013-2424" ref_url="https://www.suse.com/security/cve/CVE-2013-2424/" source="CVE"/>
		<reference ref_id="CVE-2013-2429" ref_url="https://www.suse.com/security/cve/CVE-2013-2429/" source="CVE"/>
		<reference ref_id="CVE-2013-2430" ref_url="https://www.suse.com/security/cve/CVE-2013-2430/" source="CVE"/>
		<reference ref_id="CVE-2013-2432" ref_url="https://www.suse.com/security/cve/CVE-2013-2432/" source="CVE"/>
		<reference ref_id="CVE-2013-2433" ref_url="https://www.suse.com/security/cve/CVE-2013-2433/" source="CVE"/>
		<reference ref_id="CVE-2013-2435" ref_url="https://www.suse.com/security/cve/CVE-2013-2435/" source="CVE"/>
		<reference ref_id="CVE-2013-2437" ref_url="https://www.suse.com/security/cve/CVE-2013-2437/" source="CVE"/>
		<reference ref_id="CVE-2013-2440" ref_url="https://www.suse.com/security/cve/CVE-2013-2440/" source="CVE"/>
		<reference ref_id="CVE-2013-2442" ref_url="https://www.suse.com/security/cve/CVE-2013-2442/" source="CVE"/>
		<reference ref_id="CVE-2013-2443" ref_url="https://www.suse.com/security/cve/CVE-2013-2443/" source="CVE"/>
		<reference ref_id="CVE-2013-2444" ref_url="https://www.suse.com/security/cve/CVE-2013-2444/" source="CVE"/>
		<reference ref_id="CVE-2013-2446" ref_url="https://www.suse.com/security/cve/CVE-2013-2446/" source="CVE"/>
		<reference ref_id="CVE-2013-2447" ref_url="https://www.suse.com/security/cve/CVE-2013-2447/" source="CVE"/>
		<reference ref_id="CVE-2013-2448" ref_url="https://www.suse.com/security/cve/CVE-2013-2448/" source="CVE"/>
		<reference ref_id="CVE-2013-2449" ref_url="https://www.suse.com/security/cve/CVE-2013-2449/" source="CVE"/>
		<reference ref_id="CVE-2013-2450" ref_url="https://www.suse.com/security/cve/CVE-2013-2450/" source="CVE"/>
		<reference ref_id="CVE-2013-2451" ref_url="https://www.suse.com/security/cve/CVE-2013-2451/" source="CVE"/>
		<reference ref_id="CVE-2013-2452" ref_url="https://www.suse.com/security/cve/CVE-2013-2452/" source="CVE"/>
		<reference ref_id="CVE-2013-2453" ref_url="https://www.suse.com/security/cve/CVE-2013-2453/" source="CVE"/>
		<reference ref_id="CVE-2013-2454" ref_url="https://www.suse.com/security/cve/CVE-2013-2454/" source="CVE"/>
		<reference ref_id="CVE-2013-2455" ref_url="https://www.suse.com/security/cve/CVE-2013-2455/" source="CVE"/>
		<reference ref_id="CVE-2013-2456" ref_url="https://www.suse.com/security/cve/CVE-2013-2456/" source="CVE"/>
		<reference ref_id="CVE-2013-2457" ref_url="https://www.suse.com/security/cve/CVE-2013-2457/" source="CVE"/>
		<reference ref_id="CVE-2013-2458" ref_url="https://www.suse.com/security/cve/CVE-2013-2458/" source="CVE"/>
		<reference ref_id="CVE-2013-2459" ref_url="https://www.suse.com/security/cve/CVE-2013-2459/" source="CVE"/>
		<reference ref_id="CVE-2013-2460" ref_url="https://www.suse.com/security/cve/CVE-2013-2460/" source="CVE"/>
		<reference ref_id="CVE-2013-2462" ref_url="https://www.suse.com/security/cve/CVE-2013-2462/" source="CVE"/>
		<reference ref_id="CVE-2013-2463" ref_url="https://www.suse.com/security/cve/CVE-2013-2463/" source="CVE"/>
		<reference ref_id="CVE-2013-2464" ref_url="https://www.suse.com/security/cve/CVE-2013-2464/" source="CVE"/>
		<reference ref_id="CVE-2013-2465" ref_url="https://www.suse.com/security/cve/CVE-2013-2465/" source="CVE"/>
		<reference ref_id="CVE-2013-2466" ref_url="https://www.suse.com/security/cve/CVE-2013-2466/" source="CVE"/>
		<reference ref_id="CVE-2013-2468" ref_url="https://www.suse.com/security/cve/CVE-2013-2468/" source="CVE"/>
		<reference ref_id="CVE-2013-2469" ref_url="https://www.suse.com/security/cve/CVE-2013-2469/" source="CVE"/>
		<reference ref_id="CVE-2013-2470" ref_url="https://www.suse.com/security/cve/CVE-2013-2470/" source="CVE"/>
		<reference ref_id="CVE-2013-2471" ref_url="https://www.suse.com/security/cve/CVE-2013-2471/" source="CVE"/>
		<reference ref_id="CVE-2013-2472" ref_url="https://www.suse.com/security/cve/CVE-2013-2472/" source="CVE"/>
		<reference ref_id="CVE-2013-2473" ref_url="https://www.suse.com/security/cve/CVE-2013-2473/" source="CVE"/>
		<reference ref_id="CVE-2013-3006" ref_url="https://www.suse.com/security/cve/CVE-2013-3006/" source="CVE"/>
		<reference ref_id="CVE-2013-3007" ref_url="https://www.suse.com/security/cve/CVE-2013-3007/" source="CVE"/>
		<reference ref_id="CVE-2013-3008" ref_url="https://www.suse.com/security/cve/CVE-2013-3008/" source="CVE"/>
		<reference ref_id="CVE-2013-3009" ref_url="https://www.suse.com/security/cve/CVE-2013-3009/" source="CVE"/>
		<reference ref_id="CVE-2013-3010" ref_url="https://www.suse.com/security/cve/CVE-2013-3010/" source="CVE"/>
		<reference ref_id="CVE-2013-3011" ref_url="https://www.suse.com/security/cve/CVE-2013-3011/" source="CVE"/>
		<reference ref_id="CVE-2013-3012" ref_url="https://www.suse.com/security/cve/CVE-2013-3012/" source="CVE"/>
		<reference ref_id="CVE-2013-3743" ref_url="https://www.suse.com/security/cve/CVE-2013-3743/" source="CVE"/>
		<reference ref_id="CVE-2013-3744" ref_url="https://www.suse.com/security/cve/CVE-2013-3744/" source="CVE"/>
		<reference ref_id="CVE-2013-3829" ref_url="https://www.suse.com/security/cve/CVE-2013-3829/" source="CVE"/>
		<reference ref_id="CVE-2013-4002" ref_url="https://www.suse.com/security/cve/CVE-2013-4002/" source="CVE"/>
		<reference ref_id="CVE-2013-4041" ref_url="https://www.suse.com/security/cve/CVE-2013-4041/" source="CVE"/>
		<reference ref_id="CVE-2013-5372" ref_url="https://www.suse.com/security/cve/CVE-2013-5372/" source="CVE"/>
		<reference ref_id="CVE-2013-5375" ref_url="https://www.suse.com/security/cve/CVE-2013-5375/" source="CVE"/>
		<reference ref_id="CVE-2013-5456" ref_url="https://www.suse.com/security/cve/CVE-2013-5456/" source="CVE"/>
		<reference ref_id="CVE-2013-5457" ref_url="https://www.suse.com/security/cve/CVE-2013-5457/" source="CVE"/>
		<reference ref_id="CVE-2013-5458" ref_url="https://www.suse.com/security/cve/CVE-2013-5458/" source="CVE"/>
		<reference ref_id="CVE-2013-5772" ref_url="https://www.suse.com/security/cve/CVE-2013-5772/" source="CVE"/>
		<reference ref_id="CVE-2013-5774" ref_url="https://www.suse.com/security/cve/CVE-2013-5774/" source="CVE"/>
		<reference ref_id="CVE-2013-5776" ref_url="https://www.suse.com/security/cve/CVE-2013-5776/" source="CVE"/>
		<reference ref_id="CVE-2013-5778" ref_url="https://www.suse.com/security/cve/CVE-2013-5778/" source="CVE"/>
		<reference ref_id="CVE-2013-5780" ref_url="https://www.suse.com/security/cve/CVE-2013-5780/" source="CVE"/>
		<reference ref_id="CVE-2013-5782" ref_url="https://www.suse.com/security/cve/CVE-2013-5782/" source="CVE"/>
		<reference ref_id="CVE-2013-5783" ref_url="https://www.suse.com/security/cve/CVE-2013-5783/" source="CVE"/>
		<reference ref_id="CVE-2013-5784" ref_url="https://www.suse.com/security/cve/CVE-2013-5784/" source="CVE"/>
		<reference ref_id="CVE-2013-5787" ref_url="https://www.suse.com/security/cve/CVE-2013-5787/" source="CVE"/>
		<reference ref_id="CVE-2013-5788" ref_url="https://www.suse.com/security/cve/CVE-2013-5788/" source="CVE"/>
		<reference ref_id="CVE-2013-5789" ref_url="https://www.suse.com/security/cve/CVE-2013-5789/" source="CVE"/>
		<reference ref_id="CVE-2013-5790" ref_url="https://www.suse.com/security/cve/CVE-2013-5790/" source="CVE"/>
		<reference ref_id="CVE-2013-5797" ref_url="https://www.suse.com/security/cve/CVE-2013-5797/" source="CVE"/>
		<reference ref_id="CVE-2013-5800" ref_url="https://www.suse.com/security/cve/CVE-2013-5800/" source="CVE"/>
		<reference ref_id="CVE-2013-5801" ref_url="https://www.suse.com/security/cve/CVE-2013-5801/" source="CVE"/>
		<reference ref_id="CVE-2013-5802" ref_url="https://www.suse.com/security/cve/CVE-2013-5802/" source="CVE"/>
		<reference ref_id="CVE-2013-5803" ref_url="https://www.suse.com/security/cve/CVE-2013-5803/" source="CVE"/>
		<reference ref_id="CVE-2013-5804" ref_url="https://www.suse.com/security/cve/CVE-2013-5804/" source="CVE"/>
		<reference ref_id="CVE-2013-5809" ref_url="https://www.suse.com/security/cve/CVE-2013-5809/" source="CVE"/>
		<reference ref_id="CVE-2013-5812" ref_url="https://www.suse.com/security/cve/CVE-2013-5812/" source="CVE"/>
		<reference ref_id="CVE-2013-5814" ref_url="https://www.suse.com/security/cve/CVE-2013-5814/" source="CVE"/>
		<reference ref_id="CVE-2013-5817" ref_url="https://www.suse.com/security/cve/CVE-2013-5817/" source="CVE"/>
		<reference ref_id="CVE-2013-5818" ref_url="https://www.suse.com/security/cve/CVE-2013-5818/" source="CVE"/>
		<reference ref_id="CVE-2013-5819" ref_url="https://www.suse.com/security/cve/CVE-2013-5819/" source="CVE"/>
		<reference ref_id="CVE-2013-5820" ref_url="https://www.suse.com/security/cve/CVE-2013-5820/" source="CVE"/>
		<reference ref_id="CVE-2013-5823" ref_url="https://www.suse.com/security/cve/CVE-2013-5823/" source="CVE"/>
		<reference ref_id="CVE-2013-5824" ref_url="https://www.suse.com/security/cve/CVE-2013-5824/" source="CVE"/>
		<reference ref_id="CVE-2013-5825" ref_url="https://www.suse.com/security/cve/CVE-2013-5825/" source="CVE"/>
		<reference ref_id="CVE-2013-5829" ref_url="https://www.suse.com/security/cve/CVE-2013-5829/" source="CVE"/>
		<reference ref_id="CVE-2013-5830" ref_url="https://www.suse.com/security/cve/CVE-2013-5830/" source="CVE"/>
		<reference ref_id="CVE-2013-5831" ref_url="https://www.suse.com/security/cve/CVE-2013-5831/" source="CVE"/>
		<reference ref_id="CVE-2013-5832" ref_url="https://www.suse.com/security/cve/CVE-2013-5832/" source="CVE"/>
		<reference ref_id="CVE-2013-5838" ref_url="https://www.suse.com/security/cve/CVE-2013-5838/" source="CVE"/>
		<reference ref_id="CVE-2013-5840" ref_url="https://www.suse.com/security/cve/CVE-2013-5840/" source="CVE"/>
		<reference ref_id="CVE-2013-5842" ref_url="https://www.suse.com/security/cve/CVE-2013-5842/" source="CVE"/>
		<reference ref_id="CVE-2013-5843" ref_url="https://www.suse.com/security/cve/CVE-2013-5843/" source="CVE"/>
		<reference ref_id="CVE-2013-5848" ref_url="https://www.suse.com/security/cve/CVE-2013-5848/" source="CVE"/>
		<reference ref_id="CVE-2013-5849" ref_url="https://www.suse.com/security/cve/CVE-2013-5849/" source="CVE"/>
		<reference ref_id="CVE-2013-5850" ref_url="https://www.suse.com/security/cve/CVE-2013-5850/" source="CVE"/>
		<reference ref_id="CVE-2013-5851" ref_url="https://www.suse.com/security/cve/CVE-2013-5851/" source="CVE"/>
		<reference ref_id="CVE-2013-5878" ref_url="https://www.suse.com/security/cve/CVE-2013-5878/" source="CVE"/>
		<reference ref_id="CVE-2013-5884" ref_url="https://www.suse.com/security/cve/CVE-2013-5884/" source="CVE"/>
		<reference ref_id="CVE-2013-5887" ref_url="https://www.suse.com/security/cve/CVE-2013-5887/" source="CVE"/>
		<reference ref_id="CVE-2013-5888" ref_url="https://www.suse.com/security/cve/CVE-2013-5888/" source="CVE"/>
		<reference ref_id="CVE-2013-5889" ref_url="https://www.suse.com/security/cve/CVE-2013-5889/" source="CVE"/>
		<reference ref_id="CVE-2013-5896" ref_url="https://www.suse.com/security/cve/CVE-2013-5896/" source="CVE"/>
		<reference ref_id="CVE-2013-5898" ref_url="https://www.suse.com/security/cve/CVE-2013-5898/" source="CVE"/>
		<reference ref_id="CVE-2013-5899" ref_url="https://www.suse.com/security/cve/CVE-2013-5899/" source="CVE"/>
		<reference ref_id="CVE-2013-5907" ref_url="https://www.suse.com/security/cve/CVE-2013-5907/" source="CVE"/>
		<reference ref_id="CVE-2013-5910" ref_url="https://www.suse.com/security/cve/CVE-2013-5910/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6954" ref_url="https://www.suse.com/security/cve/CVE-2013-6954/" source="CVE"/>
		<reference ref_id="CVE-2014-0368" ref_url="https://www.suse.com/security/cve/CVE-2014-0368/" source="CVE"/>
		<reference ref_id="CVE-2014-0373" ref_url="https://www.suse.com/security/cve/CVE-2014-0373/" source="CVE"/>
		<reference ref_id="CVE-2014-0375" ref_url="https://www.suse.com/security/cve/CVE-2014-0375/" source="CVE"/>
		<reference ref_id="CVE-2014-0376" ref_url="https://www.suse.com/security/cve/CVE-2014-0376/" source="CVE"/>
		<reference ref_id="CVE-2014-0387" ref_url="https://www.suse.com/security/cve/CVE-2014-0387/" source="CVE"/>
		<reference ref_id="CVE-2014-0403" ref_url="https://www.suse.com/security/cve/CVE-2014-0403/" source="CVE"/>
		<reference ref_id="CVE-2014-0410" ref_url="https://www.suse.com/security/cve/CVE-2014-0410/" source="CVE"/>
		<reference ref_id="CVE-2014-0411" ref_url="https://www.suse.com/security/cve/CVE-2014-0411/" source="CVE"/>
		<reference ref_id="CVE-2014-0415" ref_url="https://www.suse.com/security/cve/CVE-2014-0415/" source="CVE"/>
		<reference ref_id="CVE-2014-0416" ref_url="https://www.suse.com/security/cve/CVE-2014-0416/" source="CVE"/>
		<reference ref_id="CVE-2014-0417" ref_url="https://www.suse.com/security/cve/CVE-2014-0417/" source="CVE"/>
		<reference ref_id="CVE-2014-0422" ref_url="https://www.suse.com/security/cve/CVE-2014-0422/" source="CVE"/>
		<reference ref_id="CVE-2014-0423" ref_url="https://www.suse.com/security/cve/CVE-2014-0423/" source="CVE"/>
		<reference ref_id="CVE-2014-0424" ref_url="https://www.suse.com/security/cve/CVE-2014-0424/" source="CVE"/>
		<reference ref_id="CVE-2014-0428" ref_url="https://www.suse.com/security/cve/CVE-2014-0428/" source="CVE"/>
		<reference ref_id="CVE-2014-0429" ref_url="https://www.suse.com/security/cve/CVE-2014-0429/" source="CVE"/>
		<reference ref_id="CVE-2014-0446" ref_url="https://www.suse.com/security/cve/CVE-2014-0446/" source="CVE"/>
		<reference ref_id="CVE-2014-0448" ref_url="https://www.suse.com/security/cve/CVE-2014-0448/" source="CVE"/>
		<reference ref_id="CVE-2014-0449" ref_url="https://www.suse.com/security/cve/CVE-2014-0449/" source="CVE"/>
		<reference ref_id="CVE-2014-0451" ref_url="https://www.suse.com/security/cve/CVE-2014-0451/" source="CVE"/>
		<reference ref_id="CVE-2014-0452" ref_url="https://www.suse.com/security/cve/CVE-2014-0452/" source="CVE"/>
		<reference ref_id="CVE-2014-0453" ref_url="https://www.suse.com/security/cve/CVE-2014-0453/" source="CVE"/>
		<reference ref_id="CVE-2014-0454" ref_url="https://www.suse.com/security/cve/CVE-2014-0454/" source="CVE"/>
		<reference ref_id="CVE-2014-0455" ref_url="https://www.suse.com/security/cve/CVE-2014-0455/" source="CVE"/>
		<reference ref_id="CVE-2014-0457" ref_url="https://www.suse.com/security/cve/CVE-2014-0457/" source="CVE"/>
		<reference ref_id="CVE-2014-0458" ref_url="https://www.suse.com/security/cve/CVE-2014-0458/" source="CVE"/>
		<reference ref_id="CVE-2014-0459" ref_url="https://www.suse.com/security/cve/CVE-2014-0459/" source="CVE"/>
		<reference ref_id="CVE-2014-0460" ref_url="https://www.suse.com/security/cve/CVE-2014-0460/" source="CVE"/>
		<reference ref_id="CVE-2014-0461" ref_url="https://www.suse.com/security/cve/CVE-2014-0461/" source="CVE"/>
		<reference ref_id="CVE-2014-0878" ref_url="https://www.suse.com/security/cve/CVE-2014-0878/" source="CVE"/>
		<reference ref_id="CVE-2014-1876" ref_url="https://www.suse.com/security/cve/CVE-2014-1876/" source="CVE"/>
		<reference ref_id="CVE-2014-2398" ref_url="https://www.suse.com/security/cve/CVE-2014-2398/" source="CVE"/>
		<reference ref_id="CVE-2014-2401" ref_url="https://www.suse.com/security/cve/CVE-2014-2401/" source="CVE"/>
		<reference ref_id="CVE-2014-2402" ref_url="https://www.suse.com/security/cve/CVE-2014-2402/" source="CVE"/>
		<reference ref_id="CVE-2014-2409" ref_url="https://www.suse.com/security/cve/CVE-2014-2409/" source="CVE"/>
		<reference ref_id="CVE-2014-2412" ref_url="https://www.suse.com/security/cve/CVE-2014-2412/" source="CVE"/>
		<reference ref_id="CVE-2014-2414" ref_url="https://www.suse.com/security/cve/CVE-2014-2414/" source="CVE"/>
		<reference ref_id="CVE-2014-2420" ref_url="https://www.suse.com/security/cve/CVE-2014-2420/" source="CVE"/>
		<reference ref_id="CVE-2014-2421" ref_url="https://www.suse.com/security/cve/CVE-2014-2421/" source="CVE"/>
		<reference ref_id="CVE-2014-2423" ref_url="https://www.suse.com/security/cve/CVE-2014-2423/" source="CVE"/>
		<reference ref_id="CVE-2014-2427" ref_url="https://www.suse.com/security/cve/CVE-2014-2427/" source="CVE"/>
		<reference ref_id="CVE-2014-2428" ref_url="https://www.suse.com/security/cve/CVE-2014-2428/" source="CVE"/>
		<reference ref_id="CVE-2014-8891" ref_url="https://www.suse.com/security/cve/CVE-2014-8891/" source="CVE"/>
		<reference ref_id="CVE-2014-8892" ref_url="https://www.suse.com/security/cve/CVE-2014-8892/" source="CVE"/>
		<reference ref_id="CVE-2015-0138" ref_url="https://www.suse.com/security/cve/CVE-2015-0138/" source="CVE"/>
		<reference ref_id="CVE-2015-0192" ref_url="https://www.suse.com/security/cve/CVE-2015-0192/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0458" ref_url="https://www.suse.com/security/cve/CVE-2015-0458/" source="CVE"/>
		<reference ref_id="CVE-2015-0459" ref_url="https://www.suse.com/security/cve/CVE-2015-0459/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-0491" ref_url="https://www.suse.com/security/cve/CVE-2015-0491/" source="CVE"/>
		<reference ref_id="CVE-2015-1914" ref_url="https://www.suse.com/security/cve/CVE-2015-1914/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001458.html" source="SUSE-SU"/>
		<description>

IBM Java 7 SR6 has been released and fixes lots of bugs and security 
issues.

More information can be found on: 
http://www.ibm.com/developerworks/java/jdk/alerts/
&lt;http://www.ibm.com/developerworks/java/jdk/alerts/&gt;

Security Issue references:

    * CVE-2013-5458
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5458&gt;
    * CVE-2013-5456
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5456&gt;
    * CVE-2013-5457
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5457&gt;
    * CVE-2013-4041
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4041&gt;
    * CVE-2013-5375
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5375&gt;
    * CVE-2013-5372
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5372&gt;
    * CVE-2013-5843
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5843&gt;
    * CVE-2013-5789
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5789&gt;
    * CVE-2013-5830
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830&gt;
    * CVE-2013-5829
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829&gt;
    * CVE-2013-5787
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5787&gt;
    * CVE-2013-5788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5788&gt;
    * CVE-2013-5824
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5824&gt;
    * CVE-2013-5842
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842&gt;
    * CVE-2013-5782
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782&gt;
    * CVE-2013-5817
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817&gt;
    * CVE-2013-5809
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809&gt;
    * CVE-2013-5814
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814&gt;
    * CVE-2013-5832
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5832&gt;
    * CVE-2013-5850
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850&gt;
    * CVE-2013-5838
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5838&gt;
    * CVE-2013-5802
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802&gt;
    * CVE-2013-5812
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5812&gt;
    * CVE-2013-5804
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804&gt;
    * CVE-2013-5783
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783&gt;
    * CVE-2013-3829
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829&gt;
    * CVE-2013-5823
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823&gt;
    * CVE-2013-5831
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5831&gt;
    * CVE-2013-5820
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820&gt;
    * CVE-2013-5819
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5819&gt;
    * CVE-2013-5818
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5818&gt;
    * CVE-2013-5848
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5848&gt;
    * CVE-2013-5776
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5776&gt;
    * CVE-2013-5774
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774&gt;
    * CVE-2013-5825
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825&gt;
    * CVE-2013-5840
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840&gt;
    * CVE-2013-5801
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5801&gt;
    * CVE-2013-5778
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778&gt;
    * CVE-2013-5851
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5851&gt;
    * CVE-2013-5800
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5800&gt;
    * CVE-2013-5784
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784&gt;
    * CVE-2013-5849
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849&gt;
    * CVE-2013-5790
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790&gt;
    * CVE-2013-5780
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780&gt;
    * CVE-2013-5797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797&gt;
    * CVE-2013-5803
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803&gt;
    * CVE-2013-5772
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-19"/>
	<updated date="2013-11-19"/>
	<bugzilla href="https://bugzilla.suse.com/592934">SUSE bug 592934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772640">SUSE bug 772640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813939">SUSE bug 813939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817062">SUSE bug 817062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819285">SUSE bug 819285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823034">SUSE bug 823034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901223">SUSE bug 901223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912434">SUSE bug 912434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912447">SUSE bug 912447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916265">SUSE bug 916265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916266">SUSE bug 916266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930365">SUSE bug 930365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931702">SUSE bug 931702</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0547/">CVE-2012-0547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0547">CVE-2012-0547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0551/">CVE-2012-0551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0551">CVE-2012-0551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1531/">CVE-2012-1531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1531">CVE-2012-1531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1532/">CVE-2012-1532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1532">CVE-2012-1532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1533/">CVE-2012-1533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1533">CVE-2012-1533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1541/">CVE-2012-1541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1541">CVE-2012-1541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1682/">CVE-2012-1682 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1682">CVE-2012-1682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1713/">CVE-2012-1713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1713">CVE-2012-1713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1716/">CVE-2012-1716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1716">CVE-2012-1716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1717/">CVE-2012-1717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1717">CVE-2012-1717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1718/">CVE-2012-1718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1718">CVE-2012-1718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1719/">CVE-2012-1719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1719">CVE-2012-1719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1721/">CVE-2012-1721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1721">CVE-2012-1721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1722/">CVE-2012-1722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1722">CVE-2012-1722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1725/">CVE-2012-1725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1725">CVE-2012-1725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1726/">CVE-2012-1726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1726">CVE-2012-1726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3136/">CVE-2012-3136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3136">CVE-2012-3136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3143/">CVE-2012-3143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3143">CVE-2012-3143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3159/">CVE-2012-3159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3159">CVE-2012-3159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3174/">CVE-2012-3174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3174">CVE-2012-3174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3213/">CVE-2012-3213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3213">CVE-2012-3213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3216/">CVE-2012-3216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3216">CVE-2012-3216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3342/">CVE-2012-3342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3342">CVE-2012-3342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4681/">CVE-2012-4681 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4681">CVE-2012-4681 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5067/">CVE-2012-5067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5067">CVE-2012-5067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5069/">CVE-2012-5069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5069">CVE-2012-5069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5070/">CVE-2012-5070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5070">CVE-2012-5070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5071/">CVE-2012-5071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5071">CVE-2012-5071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5072/">CVE-2012-5072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5072">CVE-2012-5072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5073/">CVE-2012-5073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5073">CVE-2012-5073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5074/">CVE-2012-5074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5074">CVE-2012-5074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5075/">CVE-2012-5075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5075">CVE-2012-5075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5076/">CVE-2012-5076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5076">CVE-2012-5076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5077/">CVE-2012-5077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5077">CVE-2012-5077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5079/">CVE-2012-5079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5079">CVE-2012-5079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5081/">CVE-2012-5081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5081">CVE-2012-5081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5083/">CVE-2012-5083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5083">CVE-2012-5083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5084/">CVE-2012-5084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5084">CVE-2012-5084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5086/">CVE-2012-5086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5086">CVE-2012-5086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5087/">CVE-2012-5087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5087">CVE-2012-5087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5088/">CVE-2012-5088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5088">CVE-2012-5088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5089/">CVE-2012-5089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5089">CVE-2012-5089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0169">CVE-2013-0169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0351/">CVE-2013-0351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0351">CVE-2013-0351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0401/">CVE-2013-0401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0401">CVE-2013-0401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0409/">CVE-2013-0409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0409">CVE-2013-0409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0419/">CVE-2013-0419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0419">CVE-2013-0419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0422/">CVE-2013-0422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0422">CVE-2013-0422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0423/">CVE-2013-0423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0423">CVE-2013-0423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0424/">CVE-2013-0424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0424">CVE-2013-0424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0425/">CVE-2013-0425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0425">CVE-2013-0425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0426/">CVE-2013-0426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0426">CVE-2013-0426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0427/">CVE-2013-0427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0427">CVE-2013-0427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0428/">CVE-2013-0428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0428">CVE-2013-0428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0431/">CVE-2013-0431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0431">CVE-2013-0431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0432/">CVE-2013-0432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0432">CVE-2013-0432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0433/">CVE-2013-0433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0433">CVE-2013-0433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0434/">CVE-2013-0434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0434">CVE-2013-0434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0435/">CVE-2013-0435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0435">CVE-2013-0435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0437/">CVE-2013-0437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0437">CVE-2013-0437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0438/">CVE-2013-0438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0438">CVE-2013-0438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0440/">CVE-2013-0440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0440">CVE-2013-0440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0441/">CVE-2013-0441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0441">CVE-2013-0441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0442/">CVE-2013-0442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0442">CVE-2013-0442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0443/">CVE-2013-0443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0443">CVE-2013-0443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0444/">CVE-2013-0444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0444">CVE-2013-0444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0445/">CVE-2013-0445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0445">CVE-2013-0445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0446/">CVE-2013-0446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0446">CVE-2013-0446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0449/">CVE-2013-0449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0449">CVE-2013-0449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0450/">CVE-2013-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0450">CVE-2013-0450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0485/">CVE-2013-0485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0485">CVE-2013-0485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0809/">CVE-2013-0809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0809">CVE-2013-0809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1473/">CVE-2013-1473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1473">CVE-2013-1473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1476/">CVE-2013-1476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1476">CVE-2013-1476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1478/">CVE-2013-1478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1478">CVE-2013-1478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1480/">CVE-2013-1480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1480">CVE-2013-1480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1484/">CVE-2013-1484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1484">CVE-2013-1484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1485/">CVE-2013-1485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1485">CVE-2013-1485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1486/">CVE-2013-1486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1486">CVE-2013-1486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1487/">CVE-2013-1487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1487">CVE-2013-1487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1491/">CVE-2013-1491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1491">CVE-2013-1491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1493/">CVE-2013-1493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1493">CVE-2013-1493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1500/">CVE-2013-1500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1500">CVE-2013-1500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1537/">CVE-2013-1537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1537">CVE-2013-1537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1540/">CVE-2013-1540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1540">CVE-2013-1540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1557/">CVE-2013-1557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1557">CVE-2013-1557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1563/">CVE-2013-1563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1563">CVE-2013-1563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1569/">CVE-2013-1569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1569">CVE-2013-1569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1571/">CVE-2013-1571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1571">CVE-2013-1571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2383/">CVE-2013-2383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2383">CVE-2013-2383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2384/">CVE-2013-2384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2384">CVE-2013-2384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2394/">CVE-2013-2394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2394">CVE-2013-2394 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2400/">CVE-2013-2400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2400">CVE-2013-2400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2407/">CVE-2013-2407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2407">CVE-2013-2407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2412/">CVE-2013-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2412">CVE-2013-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2417/">CVE-2013-2417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2417">CVE-2013-2417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2418/">CVE-2013-2418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2418">CVE-2013-2418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2419/">CVE-2013-2419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2419">CVE-2013-2419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2420/">CVE-2013-2420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2420">CVE-2013-2420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2422/">CVE-2013-2422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2422">CVE-2013-2422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2424/">CVE-2013-2424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2424">CVE-2013-2424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2429/">CVE-2013-2429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2429">CVE-2013-2429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2430/">CVE-2013-2430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2430">CVE-2013-2430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2432/">CVE-2013-2432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2432">CVE-2013-2432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2433/">CVE-2013-2433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2433">CVE-2013-2433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2435/">CVE-2013-2435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2435">CVE-2013-2435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2437/">CVE-2013-2437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2437">CVE-2013-2437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2440/">CVE-2013-2440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2440">CVE-2013-2440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2442/">CVE-2013-2442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2442">CVE-2013-2442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2443/">CVE-2013-2443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2443">CVE-2013-2443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2444/">CVE-2013-2444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2444">CVE-2013-2444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2446/">CVE-2013-2446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2446">CVE-2013-2446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2447/">CVE-2013-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2447">CVE-2013-2447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2448/">CVE-2013-2448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2448">CVE-2013-2448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2449/">CVE-2013-2449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2449">CVE-2013-2449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2450/">CVE-2013-2450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2450">CVE-2013-2450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2451/">CVE-2013-2451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2451">CVE-2013-2451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2452/">CVE-2013-2452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2452">CVE-2013-2452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2453/">CVE-2013-2453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2453">CVE-2013-2453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2454/">CVE-2013-2454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2454">CVE-2013-2454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2455/">CVE-2013-2455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2455">CVE-2013-2455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2456/">CVE-2013-2456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2456">CVE-2013-2456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2457/">CVE-2013-2457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2457">CVE-2013-2457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2458/">CVE-2013-2458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2458">CVE-2013-2458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2459/">CVE-2013-2459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2459">CVE-2013-2459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2460/">CVE-2013-2460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2460">CVE-2013-2460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2462/">CVE-2013-2462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2462">CVE-2013-2462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2463/">CVE-2013-2463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2463">CVE-2013-2463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2464/">CVE-2013-2464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2464">CVE-2013-2464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2465/">CVE-2013-2465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2465">CVE-2013-2465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2466/">CVE-2013-2466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2466">CVE-2013-2466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2468/">CVE-2013-2468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2468">CVE-2013-2468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2469/">CVE-2013-2469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2469">CVE-2013-2469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2470/">CVE-2013-2470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2470">CVE-2013-2470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2471/">CVE-2013-2471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2471">CVE-2013-2471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2472/">CVE-2013-2472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2472">CVE-2013-2472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2473/">CVE-2013-2473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2473">CVE-2013-2473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3006/">CVE-2013-3006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3006">CVE-2013-3006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3007/">CVE-2013-3007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3007">CVE-2013-3007 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3008/">CVE-2013-3008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3008">CVE-2013-3008 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3009/">CVE-2013-3009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3009">CVE-2013-3009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3010/">CVE-2013-3010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3010">CVE-2013-3010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3011/">CVE-2013-3011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3011">CVE-2013-3011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3012/">CVE-2013-3012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3012">CVE-2013-3012 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3743/">CVE-2013-3743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3743">CVE-2013-3743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3744/">CVE-2013-3744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3744">CVE-2013-3744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3829/">CVE-2013-3829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3829">CVE-2013-3829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4002/">CVE-2013-4002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4002">CVE-2013-4002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4041/">CVE-2013-4041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4041">CVE-2013-4041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5372/">CVE-2013-5372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5372">CVE-2013-5372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5375/">CVE-2013-5375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5375">CVE-2013-5375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5456/">CVE-2013-5456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5456">CVE-2013-5456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5457/">CVE-2013-5457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5457">CVE-2013-5457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5458/">CVE-2013-5458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5458">CVE-2013-5458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5772/">CVE-2013-5772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5772">CVE-2013-5772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5774/">CVE-2013-5774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5774">CVE-2013-5774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5776/">CVE-2013-5776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5776">CVE-2013-5776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5778/">CVE-2013-5778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5778">CVE-2013-5778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5780/">CVE-2013-5780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5780">CVE-2013-5780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5782/">CVE-2013-5782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5782">CVE-2013-5782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5783/">CVE-2013-5783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5783">CVE-2013-5783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5784/">CVE-2013-5784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5784">CVE-2013-5784 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5787/">CVE-2013-5787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5787">CVE-2013-5787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5788/">CVE-2013-5788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5788">CVE-2013-5788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5789/">CVE-2013-5789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5789">CVE-2013-5789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5790/">CVE-2013-5790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5790">CVE-2013-5790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5797/">CVE-2013-5797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5797">CVE-2013-5797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5800/">CVE-2013-5800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5800">CVE-2013-5800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5801/">CVE-2013-5801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5801">CVE-2013-5801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5802/">CVE-2013-5802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5802">CVE-2013-5802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5803/">CVE-2013-5803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5803">CVE-2013-5803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5804/">CVE-2013-5804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5804">CVE-2013-5804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5809/">CVE-2013-5809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5809">CVE-2013-5809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5812/">CVE-2013-5812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5812">CVE-2013-5812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5814/">CVE-2013-5814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5814">CVE-2013-5814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5817/">CVE-2013-5817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5817">CVE-2013-5817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5818/">CVE-2013-5818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5818">CVE-2013-5818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5819/">CVE-2013-5819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5819">CVE-2013-5819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5820/">CVE-2013-5820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5820">CVE-2013-5820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5823/">CVE-2013-5823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5823">CVE-2013-5823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5824/">CVE-2013-5824 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5824">CVE-2013-5824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5825/">CVE-2013-5825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5825">CVE-2013-5825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5829/">CVE-2013-5829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5829">CVE-2013-5829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5830/">CVE-2013-5830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5830">CVE-2013-5830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5831/">CVE-2013-5831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5831">CVE-2013-5831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5832/">CVE-2013-5832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5832">CVE-2013-5832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5838/">CVE-2013-5838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5838">CVE-2013-5838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5840/">CVE-2013-5840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5840">CVE-2013-5840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5842/">CVE-2013-5842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5842">CVE-2013-5842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5843/">CVE-2013-5843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5843">CVE-2013-5843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5848/">CVE-2013-5848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5848">CVE-2013-5848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5849/">CVE-2013-5849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5849">CVE-2013-5849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5850/">CVE-2013-5850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5850">CVE-2013-5850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5851/">CVE-2013-5851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5851">CVE-2013-5851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5878/">CVE-2013-5878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5878">CVE-2013-5878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5884/">CVE-2013-5884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5884">CVE-2013-5884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5887/">CVE-2013-5887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5887">CVE-2013-5887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5888/">CVE-2013-5888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5888">CVE-2013-5888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5889/">CVE-2013-5889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5889">CVE-2013-5889 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5896/">CVE-2013-5896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5896">CVE-2013-5896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5898/">CVE-2013-5898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5898">CVE-2013-5898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5899/">CVE-2013-5899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5899">CVE-2013-5899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5907/">CVE-2013-5907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5907">CVE-2013-5907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5910/">CVE-2013-5910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5910">CVE-2013-5910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6629">CVE-2013-6629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6954/">CVE-2013-6954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6954">CVE-2013-6954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0368/">CVE-2014-0368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0368">CVE-2014-0368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0373/">CVE-2014-0373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0373">CVE-2014-0373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0375/">CVE-2014-0375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0375">CVE-2014-0375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0376/">CVE-2014-0376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0376">CVE-2014-0376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0387/">CVE-2014-0387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0387">CVE-2014-0387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0403/">CVE-2014-0403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0403">CVE-2014-0403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0410/">CVE-2014-0410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0410">CVE-2014-0410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0411/">CVE-2014-0411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0411">CVE-2014-0411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0415/">CVE-2014-0415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0415">CVE-2014-0415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0416/">CVE-2014-0416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0416">CVE-2014-0416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0417/">CVE-2014-0417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0417">CVE-2014-0417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0422/">CVE-2014-0422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0422">CVE-2014-0422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0423/">CVE-2014-0423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0423">CVE-2014-0423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0424/">CVE-2014-0424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0424">CVE-2014-0424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0428/">CVE-2014-0428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0428">CVE-2014-0428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0429/">CVE-2014-0429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0429">CVE-2014-0429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0446/">CVE-2014-0446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0446">CVE-2014-0446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0448/">CVE-2014-0448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0448">CVE-2014-0448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0449/">CVE-2014-0449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0449">CVE-2014-0449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0451/">CVE-2014-0451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0451">CVE-2014-0451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0452/">CVE-2014-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0452">CVE-2014-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0453/">CVE-2014-0453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0453">CVE-2014-0453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0454/">CVE-2014-0454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0454">CVE-2014-0454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0455/">CVE-2014-0455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0455">CVE-2014-0455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0457/">CVE-2014-0457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0457">CVE-2014-0457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0458/">CVE-2014-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0458">CVE-2014-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0459/">CVE-2014-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0459">CVE-2014-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0460/">CVE-2014-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0460">CVE-2014-0460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0461/">CVE-2014-0461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0461">CVE-2014-0461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0878/">CVE-2014-0878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0878">CVE-2014-0878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1876/">CVE-2014-1876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1876">CVE-2014-1876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2398/">CVE-2014-2398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2398">CVE-2014-2398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2401/">CVE-2014-2401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2401">CVE-2014-2401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2402/">CVE-2014-2402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2402">CVE-2014-2402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2409/">CVE-2014-2409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2409">CVE-2014-2409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2412/">CVE-2014-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2412">CVE-2014-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2414/">CVE-2014-2414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2414">CVE-2014-2414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2420/">CVE-2014-2420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2420">CVE-2014-2420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2421/">CVE-2014-2421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2421">CVE-2014-2421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2423/">CVE-2014-2423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2423">CVE-2014-2423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2427/">CVE-2014-2427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2427">CVE-2014-2427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2428/">CVE-2014-2428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2428">CVE-2014-2428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8891/">CVE-2014-8891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8891">CVE-2014-8891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8892/">CVE-2014-8892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8892">CVE-2014-8892 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0138/">CVE-2015-0138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0138">CVE-2015-0138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0192/">CVE-2015-0192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0192">CVE-2015-0192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0458/">CVE-2015-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0458">CVE-2015-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0459/">CVE-2015-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0459">CVE-2015-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0469">CVE-2015-0469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0477">CVE-2015-0477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0478">CVE-2015-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0480">CVE-2015-0480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0488">CVE-2015-0488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0491/">CVE-2015-0491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0491">CVE-2015-0491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1914/">CVE-2015-1914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1914">CVE-2015-1914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2808">CVE-2015-2808 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576254" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576255" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576256" comment="java-1_7_0-ibm-devel-1.7.0_sr7.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576257" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576258" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576254" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576255" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576256" comment="java-1_7_0-ibm-devel-1.7.0_sr7.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576257" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576258" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576254" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576255" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576256" comment="java-1_7_0-ibm-devel-1.7.0_sr7.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576257" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576258" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218067" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="935540" ref_url="https://bugzilla.suse.com/935540" source="BUGZILLA"/>
		<reference ref_id="938895" ref_url="https://bugzilla.suse.com/938895" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0192" ref_url="https://www.suse.com/security/cve/CVE-2015-0192/" source="CVE"/>
		<reference ref_id="CVE-2015-1931" ref_url="https://www.suse.com/security/cve/CVE-2015-1931/" source="CVE"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2619" ref_url="https://www.suse.com/security/cve/CVE-2015-2619/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4729" ref_url="https://www.suse.com/security/cve/CVE-2015-4729/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001534.html" source="SUSE-SU"/>
		<description>
java-1_7_0-ibm was updated to fix 21 security issues.

These security issues were fixed:
- CVE-2015-4729: Unspecified vulnerability in Oracle Java SE 7u80 and 8u45 allowed remote attackers to affect confidentiality and integrity via unknown vectors related to Deployment (bsc#938895).
- CVE-2015-4748: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and Embedded 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security (bsc#938895).
- CVE-2015-2664: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allowed local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment (bsc#938895).
- CVE-2015-0192: Unspecified vulnerability in IBM Java 8 before SR1, 7 R1 before SR2 FP11, 7 before SR9, 6 R1 before SR8 FP4, 6 before SR16 FP4, and 5.0 before SR16 FP10 allowed remote attackers to gain privileges via unknown vectors related to the Java Virtual Machine (bsc#938895).
- CVE-2015-2613: Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via vectors related to JCE (bsc#938895).
- CVE-2015-4731: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; Java SE Embedded 7u75; and Java SE Embedded 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX (bsc#938895).
- CVE-2015-2637: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via unknown vectors related to 2D (bsc#938895).
- CVE-2015-4733: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI (bsc#938895).
- CVE-2015-4732: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-2590 (bsc#938895).
- CVE-2015-2621: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33, allowed remote attackers to affect confidentiality via vectors related to JMX (bsc#938895).
- CVE-2015-2619: Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, JavaFX 2.2.80, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via unknown vectors related to 2D (bsc#938895).
- CVE-2015-2590: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-4732 (bsc#938895).
- CVE-2015-2638: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D (bsc#938895).
- CVE-2015-2625: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via vectors related to JSSE (bsc#938895).
- CVE-2015-2632: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allowed remote attackers to affect confidentiality via unknown vectors related to 2D (bsc#938895).
- CVE-2015-1931: Unspecified vulnerability (bsc#938895).
- CVE-2015-4760: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D (bsc#938895).
- CVE-2015-4000: The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, did not properly convey a DHE_EXPORT choice, which allowed man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the 'Logjam' issue (bsc#935540).
- CVE-2015-2601: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, JRockit R28.3.6, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via vectors related to JCE (bsc#938895).
- CVE-2015-2808: The RC4 algorithm, as used in the TLS protocol and SSL protocol, did not properly combine state data with key data during the initialization phase, which made it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the 'Bar Mitzvah' issue (bsc#938895).
- CVE-2015-4749: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect availability via vectors related to JNDI (bsc#938895).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-31"/>
	<updated date="2015-07-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/935540">SUSE bug 935540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0192/">CVE-2015-0192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0192">CVE-2015-0192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1931/">CVE-2015-1931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1931">CVE-2015-1931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2590">CVE-2015-2590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2601">CVE-2015-2601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2613">CVE-2015-2613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2619/">CVE-2015-2619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2619">CVE-2015-2619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2621">CVE-2015-2621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2625">CVE-2015-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2632">CVE-2015-2632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2637">CVE-2015-2637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2638">CVE-2015-2638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2664">CVE-2015-2664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2808">CVE-2015-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4729/">CVE-2015-4729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4729">CVE-2015-4729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4731">CVE-2015-4731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4732">CVE-2015-4732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4733">CVE-2015-4733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4748">CVE-2015-4748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4749">CVE-2015-4749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4760">CVE-2015-4760 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576259" comment="java-1_7_0-ibm-1.7.0_sr9.10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576260" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576261" comment="java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576262" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576263" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218068" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="941939" ref_url="https://bugzilla.suse.com/941939" source="BUGZILLA"/>
		<reference ref_id="955131" ref_url="https://bugzilla.suse.com/955131" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0458" ref_url="https://www.suse.com/security/cve/CVE-2015-0458/" source="CVE"/>
		<reference ref_id="CVE-2015-0459" ref_url="https://www.suse.com/security/cve/CVE-2015-0459/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-0491" ref_url="https://www.suse.com/security/cve/CVE-2015-0491/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-5006" ref_url="https://www.suse.com/security/cve/CVE-2015-5006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001721.html" source="SUSE-SU"/>
		<description>
The java-1_7_0-ibm package was updated to version 7.0-9.20 to fix several security and non security issues:

- bnc#955131: Version update to 7.0-9.20:
  CVE-2015-4734 CVE-2015-4803 CVE-2015-4805 CVE-2015-4806 CVE-2015-4810
  CVE-2015-4835 CVE-2015-4840 CVE-2015-4842 CVE-2015-4843 CVE-2015-4844
  CVE-2015-4860 CVE-2015-4871 CVE-2015-4872 CVE-2015-4882 CVE-2015-4883
  CVE-2015-4893 CVE-2015-4902 CVE-2015-4903 CVE-2015-4911 CVE-2015-5006
- Add backcompat symlinks for sdkdir
- bnc#941939: Fix to provide %{name} instead of %{sdklnk} only in _jvmprivdir
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/941939">SUSE bug 941939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0458/">CVE-2015-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0458">CVE-2015-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0459/">CVE-2015-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0459">CVE-2015-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0469">CVE-2015-0469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0477">CVE-2015-0477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0478">CVE-2015-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0480">CVE-2015-0480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0488">CVE-2015-0488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0491/">CVE-2015-0491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0491">CVE-2015-0491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4734">CVE-2015-4734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4803">CVE-2015-4803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4805">CVE-2015-4805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4806">CVE-2015-4806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4810">CVE-2015-4810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4835">CVE-2015-4835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4840">CVE-2015-4840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4842">CVE-2015-4842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4843">CVE-2015-4843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4844">CVE-2015-4844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4860">CVE-2015-4860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4871">CVE-2015-4871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4872">CVE-2015-4872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4882">CVE-2015-4882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4883">CVE-2015-4883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4893">CVE-2015-4893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4902">CVE-2015-4902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4903">CVE-2015-4903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4911">CVE-2015-4911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5006/">CVE-2015-5006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5006">CVE-2015-5006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576264" comment="java-1_7_0-ibm-1.7.0_sr9.20-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576265" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576266" comment="java-1_7_0-ibm-devel-1.7.0_sr9.20-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576267" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576268" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218069" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="960402" ref_url="https://bugzilla.suse.com/960402" source="BUGZILLA"/>
		<reference ref_id="963937" ref_url="https://bugzilla.suse.com/963937" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5041" ref_url="https://www.suse.com/security/cve/CVE-2015-5041/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001874.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_0-ibm fixes the following issues by updating to 7.0-9.30 (bsc#963937):

- CVE-2015-5041: Could could have invoked non-public interface methods under certain circumstances
- CVE-2015-7575: The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials
- CVE-2015-7981: libpng could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read in the png_convert_to_rfc1123 function. An attacker could exploit this vulnerability to obtain sensitive information
- CVE-2015-8126: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8472: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8540: libpng is vulnerable to a buffer overflow, caused by a read underflow in png_check_keyword in pngwutil.c. By sending an overly long argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
- CVE-2016-0402: An unspecified vulnerability related to the Networking component has no confidentiality impact, partial integrity impact, and no availability impact
- CVE-2016-0448: An unspecified vulnerability related to the JMX component could allow a remote attacker to obtain sensitive information
- CVE-2016-0466: An unspecified vulnerability related to the JAXP component could allow a remote attacker to cause a denial of service
- CVE-2016-0483: An unspecified vulnerability related to the AWT component has complete confidentiality impact, complete integrity impact, and complete availability impact
- CVE-2016-0494: An unspecified vulnerability related to the 2D component has complete confidentiality impact, complete integrity impact, and complete availability impact

The following bugs were fixed:

- bsc#960402: resolve package conflicts in devel package
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-11"/>
	<updated date="2016-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5041/">CVE-2015-5041 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5041">CVE-2015-5041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7981">CVE-2015-7981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8472">CVE-2015-8472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8540">CVE-2015-8540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0402">CVE-2016-0402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0448">CVE-2016-0448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0466">CVE-2016-0466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0483">CVE-2016-0483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0494">CVE-2016-0494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576269" comment="java-1_7_0-ibm-1.7.0_sr9.30-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576270" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.30-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576271" comment="java-1_7_0-ibm-devel-1.7.0_sr9.30-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576272" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.30-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576273" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.30-45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218070" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="977646" ref_url="https://bugzilla.suse.com/977646" source="BUGZILLA"/>
		<reference ref_id="977648" ref_url="https://bugzilla.suse.com/977648" source="BUGZILLA"/>
		<reference ref_id="977650" ref_url="https://bugzilla.suse.com/977650" source="BUGZILLA"/>
		<reference ref_id="979252" ref_url="https://bugzilla.suse.com/979252" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0264" ref_url="https://www.suse.com/security/cve/CVE-2016-0264/" source="CVE"/>
		<reference ref_id="CVE-2016-0363" ref_url="https://www.suse.com/security/cve/CVE-2016-0363/" source="CVE"/>
		<reference ref_id="CVE-2016-0376" ref_url="https://www.suse.com/security/cve/CVE-2016-0376/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-3422" ref_url="https://www.suse.com/security/cve/CVE-2016-3422/" source="CVE"/>
		<reference ref_id="CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3443" ref_url="https://www.suse.com/security/cve/CVE-2016-3443/" source="CVE"/>
		<reference ref_id="CVE-2016-3449" ref_url="https://www.suse.com/security/cve/CVE-2016-3449/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002078.html" source="SUSE-SU"/>
		<description>

This IBM Java 1.7.0 SR9 FP40 release fixes the following issues:

Security issues fixed:
- CVE-2016-0264: buffer overflow vulnerability in the IBM JVM (bsc#977648)
- CVE-2016-0363: insecure use of invoke method in CORBA component, incorrect CVE-2013-3009 fix (bsc#977650)
- CVE-2016-0376: insecure deserialization in CORBA, incorrect CVE-2013-5456 fix (bsc#977646)
- The following CVEs got also fixed during this update. (bsc#979252)
  CVE-2016-3443, CVE-2016-0687, CVE-2016-0686, CVE-2016-3427, CVE-2016-3449, CVE-2016-3422, CVE-2016-3426
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-20"/>
	<updated date="2016-05-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/977646">SUSE bug 977646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977648">SUSE bug 977648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977650">SUSE bug 977650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0264/">CVE-2016-0264 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0264">CVE-2016-0264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0363/">CVE-2016-0363 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0363">CVE-2016-0363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0376/">CVE-2016-0376 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0376">CVE-2016-0376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0686">CVE-2016-0686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0687">CVE-2016-0687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3422/">CVE-2016-3422 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3422">CVE-2016-3422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3426">CVE-2016-3426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3427">CVE-2016-3427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3443/">CVE-2016-3443 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3443">CVE-2016-3443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3449/">CVE-2016-3449 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3449">CVE-2016-3449 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576274" comment="java-1_7_0-ibm-1.7.0_sr9.40-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576275" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576276" comment="java-1_7_0-ibm-devel-1.7.0_sr9.40-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576277" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576278" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218071" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="992537" ref_url="https://bugzilla.suse.com/992537" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="CVE-2016-3511" ref_url="https://www.suse.com/security/cve/CVE-2016-3511/" source="CVE"/>
		<reference ref_id="CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002268.html" source="SUSE-SU"/>
		<description>

IBM Java 7 was updated to 7.1-9.50, fixing bugs and security issues (bsc#992537).

Security issues fixed:
  CVE-2016-3485 CVE-2016-3511 CVE-2016-3598

Please see https://www.ibm.com/developerworks/java/jdk/alerts/ for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-10"/>
	<updated date="2016-09-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/992537">SUSE bug 992537</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485 at SUSE</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3485">CVE-2016-3485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3511/">CVE-2016-3511 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3511">CVE-2016-3511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3598">CVE-2016-3598 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576279" comment="java-1_7_0-ibm-1.7.0_sr9.50-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576280" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.50-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576281" comment="java-1_7_0-ibm-devel-1.7.0_sr9.50-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576282" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.50-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576283" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.50-55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218072" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1009280" ref_url="https://bugzilla.suse.com/1009280" source="BUGZILLA"/>
		<reference ref_id="992537" ref_url="https://bugzilla.suse.com/992537" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002460.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_0-ibm fixes the following issues:

- Version update to 7.0-9.60 (bsc#1009280, bsc#992537) fixing the following CVE's:
  CVE-2016-5568, CVE-2016-5556, CVE-2016-5573, CVE-2016-5597, CVE-2016-5554,
  CVE-2016-5542

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-09"/>
	<updated date="2016-12-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992537">SUSE bug 992537</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5542">CVE-2016-5542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5554">CVE-2016-5554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5556">CVE-2016-5556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5568">CVE-2016-5568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5573">CVE-2016-5573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5597">CVE-2016-5597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576284" comment="java-1_7_0-ibm-1.7.0_sr9.60-58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576285" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.60-58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576286" comment="java-1_7_0-ibm-devel-1.7.0_sr9.60-58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576287" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576288" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.60-58.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218073" version="1" class="patch">
	<metadata>
		<title>Security update for kdelibs4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="617423" ref_url="https://bugzilla.suse.com/617423" source="BUGZILLA"/>
		<reference ref_id="758017" ref_url="https://bugzilla.suse.com/758017" source="BUGZILLA"/>
		<reference ref_id="787520" ref_url="https://bugzilla.suse.com/787520" source="BUGZILLA"/>
		<reference ref_id="807314" ref_url="https://bugzilla.suse.com/807314" source="BUGZILLA"/>
		<reference ref_id="809065" ref_url="https://bugzilla.suse.com/809065" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4512" ref_url="https://www.suse.com/security/cve/CVE-2012-4512/" source="CVE"/>
		<reference ref_id="CVE-2012-4513" ref_url="https://www.suse.com/security/cve/CVE-2012-4513/" source="CVE"/>
		<reference ref_id="CVE-2012-4515" ref_url="https://www.suse.com/security/cve/CVE-2012-4515/" source="CVE"/>
		<description>

This kdelibs4 update fixes several security issues related to 
khtml/konqueror.

    * Fix security issues and null pointer references in khtml/konqueror
      (bnc#787520) (CVE-2012-4512, CVE-2012-4513, CVE-2012-4515)

Security Issue references:

    * CVE-2012-4512
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4512&gt;
    * CVE-2012-4513
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4513&gt;
    * CVE-2012-4515
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4515&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-01"/>
	<updated date="2013-10-01"/>
	<bugzilla href="https://bugzilla.suse.com/617423">SUSE bug 617423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758017">SUSE bug 758017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787520">SUSE bug 787520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807314">SUSE bug 807314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809065">SUSE bug 809065</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4512/">CVE-2012-4512 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-4512">CVE-2012-4512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4513/">CVE-2012-4513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4513">CVE-2012-4513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4515/">CVE-2012-4515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4515">CVE-2012-4515 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576289" comment="kdelibs4-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576290" comment="kdelibs4-core-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562952" comment="kdelibs4-doc-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576291" comment="libkde4-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576292" comment="libkde4-32bit-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576293" comment="libkde4-x86-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576294" comment="libkdecore4-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576295" comment="libkdecore4-32bit-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576296" comment="libkdecore4-x86-4.3.5-0.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576289" comment="kdelibs4-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576290" comment="kdelibs4-core-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562952" comment="kdelibs4-doc-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576291" comment="libkde4-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576292" comment="libkde4-32bit-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576293" comment="libkde4-x86-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576294" comment="libkdecore4-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576295" comment="libkdecore4-32bit-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576296" comment="libkdecore4-x86-4.3.5-0.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218074" version="1" class="patch">
	<metadata>
		<title>Security update for Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="556135" ref_url="https://bugzilla.suse.com/556135" source="BUGZILLA"/>
		<reference ref_id="578046" ref_url="https://bugzilla.suse.com/578046" source="BUGZILLA"/>
		<reference ref_id="624072" ref_url="https://bugzilla.suse.com/624072" source="BUGZILLA"/>
		<reference ref_id="651219" ref_url="https://bugzilla.suse.com/651219" source="BUGZILLA"/>
		<reference ref_id="676204" ref_url="https://bugzilla.suse.com/676204" source="BUGZILLA"/>
		<reference ref_id="688996" ref_url="https://bugzilla.suse.com/688996" source="BUGZILLA"/>
		<reference ref_id="698102" ref_url="https://bugzilla.suse.com/698102" source="BUGZILLA"/>
		<reference ref_id="703156" ref_url="https://bugzilla.suse.com/703156" source="BUGZILLA"/>
		<reference ref_id="704280" ref_url="https://bugzilla.suse.com/704280" source="BUGZILLA"/>
		<reference ref_id="705551" ref_url="https://bugzilla.suse.com/705551" source="BUGZILLA"/>
		<reference ref_id="708296" ref_url="https://bugzilla.suse.com/708296" source="BUGZILLA"/>
		<reference ref_id="708836" ref_url="https://bugzilla.suse.com/708836" source="BUGZILLA"/>
		<reference ref_id="713148" ref_url="https://bugzilla.suse.com/713148" source="BUGZILLA"/>
		<reference ref_id="714604" ref_url="https://bugzilla.suse.com/714604" source="BUGZILLA"/>
		<reference ref_id="715635" ref_url="https://bugzilla.suse.com/715635" source="BUGZILLA"/>
		<reference ref_id="716850" ref_url="https://bugzilla.suse.com/716850" source="BUGZILLA"/>
		<reference ref_id="716971" ref_url="https://bugzilla.suse.com/716971" source="BUGZILLA"/>
		<reference ref_id="718521" ref_url="https://bugzilla.suse.com/718521" source="BUGZILLA"/>
		<reference ref_id="718863" ref_url="https://bugzilla.suse.com/718863" source="BUGZILLA"/>
		<reference ref_id="718910" ref_url="https://bugzilla.suse.com/718910" source="BUGZILLA"/>
		<reference ref_id="718918" ref_url="https://bugzilla.suse.com/718918" source="BUGZILLA"/>
		<reference ref_id="720946" ref_url="https://bugzilla.suse.com/720946" source="BUGZILLA"/>
		<reference ref_id="721587" ref_url="https://bugzilla.suse.com/721587" source="BUGZILLA"/>
		<reference ref_id="721857" ref_url="https://bugzilla.suse.com/721857" source="BUGZILLA"/>
		<reference ref_id="722398" ref_url="https://bugzilla.suse.com/722398" source="BUGZILLA"/>
		<reference ref_id="722560" ref_url="https://bugzilla.suse.com/722560" source="BUGZILLA"/>
		<reference ref_id="723776" ref_url="https://bugzilla.suse.com/723776" source="BUGZILLA"/>
		<reference ref_id="725152" ref_url="https://bugzilla.suse.com/725152" source="BUGZILLA"/>
		<reference ref_id="725355" ref_url="https://bugzilla.suse.com/725355" source="BUGZILLA"/>
		<reference ref_id="725592" ref_url="https://bugzilla.suse.com/725592" source="BUGZILLA"/>
		<reference ref_id="728840" ref_url="https://bugzilla.suse.com/728840" source="BUGZILLA"/>
		<reference ref_id="729247" ref_url="https://bugzilla.suse.com/729247" source="BUGZILLA"/>
		<reference ref_id="729854" ref_url="https://bugzilla.suse.com/729854" source="BUGZILLA"/>
		<reference ref_id="730117" ref_url="https://bugzilla.suse.com/730117" source="BUGZILLA"/>
		<reference ref_id="730118" ref_url="https://bugzilla.suse.com/730118" source="BUGZILLA"/>
		<reference ref_id="730660" ref_url="https://bugzilla.suse.com/730660" source="BUGZILLA"/>
		<reference ref_id="731035" ref_url="https://bugzilla.suse.com/731035" source="BUGZILLA"/>
		<reference ref_id="731387" ref_url="https://bugzilla.suse.com/731387" source="BUGZILLA"/>
		<reference ref_id="731739" ref_url="https://bugzilla.suse.com/731739" source="BUGZILLA"/>
		<reference ref_id="732070" ref_url="https://bugzilla.suse.com/732070" source="BUGZILLA"/>
		<reference ref_id="732296" ref_url="https://bugzilla.suse.com/732296" source="BUGZILLA"/>
		<reference ref_id="732908" ref_url="https://bugzilla.suse.com/732908" source="BUGZILLA"/>
		<reference ref_id="733761" ref_url="https://bugzilla.suse.com/733761" source="BUGZILLA"/>
		<reference ref_id="734900" ref_url="https://bugzilla.suse.com/734900" source="BUGZILLA"/>
		<reference ref_id="735909" ref_url="https://bugzilla.suse.com/735909" source="BUGZILLA"/>
		<reference ref_id="736149" ref_url="https://bugzilla.suse.com/736149" source="BUGZILLA"/>
		<reference ref_id="736255" ref_url="https://bugzilla.suse.com/736255" source="BUGZILLA"/>
		<reference ref_id="736697" ref_url="https://bugzilla.suse.com/736697" source="BUGZILLA"/>
		<reference ref_id="738210" ref_url="https://bugzilla.suse.com/738210" source="BUGZILLA"/>
		<reference ref_id="738284" ref_url="https://bugzilla.suse.com/738284" source="BUGZILLA"/>
		<reference ref_id="738528" ref_url="https://bugzilla.suse.com/738528" source="BUGZILLA"/>
		<reference ref_id="738583" ref_url="https://bugzilla.suse.com/738583" source="BUGZILLA"/>
		<reference ref_id="738597" ref_url="https://bugzilla.suse.com/738597" source="BUGZILLA"/>
		<reference ref_id="738644" ref_url="https://bugzilla.suse.com/738644" source="BUGZILLA"/>
		<reference ref_id="738679" ref_url="https://bugzilla.suse.com/738679" source="BUGZILLA"/>
		<reference ref_id="739728" ref_url="https://bugzilla.suse.com/739728" source="BUGZILLA"/>
		<reference ref_id="739837" ref_url="https://bugzilla.suse.com/739837" source="BUGZILLA"/>
		<reference ref_id="740180" ref_url="https://bugzilla.suse.com/740180" source="BUGZILLA"/>
		<reference ref_id="740291" ref_url="https://bugzilla.suse.com/740291" source="BUGZILLA"/>
		<reference ref_id="741814" ref_url="https://bugzilla.suse.com/741814" source="BUGZILLA"/>
		<reference ref_id="741824" ref_url="https://bugzilla.suse.com/741824" source="BUGZILLA"/>
		<reference ref_id="742845" ref_url="https://bugzilla.suse.com/742845" source="BUGZILLA"/>
		<reference ref_id="742871" ref_url="https://bugzilla.suse.com/742871" source="BUGZILLA"/>
		<reference ref_id="743232" ref_url="https://bugzilla.suse.com/743232" source="BUGZILLA"/>
		<reference ref_id="743579" ref_url="https://bugzilla.suse.com/743579" source="BUGZILLA"/>
		<reference ref_id="744198" ref_url="https://bugzilla.suse.com/744198" source="BUGZILLA"/>
		<reference ref_id="744314" ref_url="https://bugzilla.suse.com/744314" source="BUGZILLA"/>
		<reference ref_id="744315" ref_url="https://bugzilla.suse.com/744315" source="BUGZILLA"/>
		<reference ref_id="744392" ref_url="https://bugzilla.suse.com/744392" source="BUGZILLA"/>
		<reference ref_id="744404" ref_url="https://bugzilla.suse.com/744404" source="BUGZILLA"/>
		<reference ref_id="744655" ref_url="https://bugzilla.suse.com/744655" source="BUGZILLA"/>
		<reference ref_id="744658" ref_url="https://bugzilla.suse.com/744658" source="BUGZILLA"/>
		<reference ref_id="744692" ref_url="https://bugzilla.suse.com/744692" source="BUGZILLA"/>
		<reference ref_id="744758" ref_url="https://bugzilla.suse.com/744758" source="BUGZILLA"/>
		<reference ref_id="744795" ref_url="https://bugzilla.suse.com/744795" source="BUGZILLA"/>
		<reference ref_id="745088" ref_url="https://bugzilla.suse.com/745088" source="BUGZILLA"/>
		<reference ref_id="745400" ref_url="https://bugzilla.suse.com/745400" source="BUGZILLA"/>
		<reference ref_id="745422" ref_url="https://bugzilla.suse.com/745422" source="BUGZILLA"/>
		<reference ref_id="745424" ref_url="https://bugzilla.suse.com/745424" source="BUGZILLA"/>
		<reference ref_id="745640" ref_url="https://bugzilla.suse.com/745640" source="BUGZILLA"/>
		<reference ref_id="745741" ref_url="https://bugzilla.suse.com/745741" source="BUGZILLA"/>
		<reference ref_id="745832" ref_url="https://bugzilla.suse.com/745832" source="BUGZILLA"/>
		<reference ref_id="745867" ref_url="https://bugzilla.suse.com/745867" source="BUGZILLA"/>
		<reference ref_id="745876" ref_url="https://bugzilla.suse.com/745876" source="BUGZILLA"/>
		<reference ref_id="745929" ref_url="https://bugzilla.suse.com/745929" source="BUGZILLA"/>
		<reference ref_id="746373" ref_url="https://bugzilla.suse.com/746373" source="BUGZILLA"/>
		<reference ref_id="746454" ref_url="https://bugzilla.suse.com/746454" source="BUGZILLA"/>
		<reference ref_id="746500" ref_url="https://bugzilla.suse.com/746500" source="BUGZILLA"/>
		<reference ref_id="746509" ref_url="https://bugzilla.suse.com/746509" source="BUGZILLA"/>
		<reference ref_id="746526" ref_url="https://bugzilla.suse.com/746526" source="BUGZILLA"/>
		<reference ref_id="746579" ref_url="https://bugzilla.suse.com/746579" source="BUGZILLA"/>
		<reference ref_id="746717" ref_url="https://bugzilla.suse.com/746717" source="BUGZILLA"/>
		<reference ref_id="746883" ref_url="https://bugzilla.suse.com/746883" source="BUGZILLA"/>
		<reference ref_id="746938" ref_url="https://bugzilla.suse.com/746938" source="BUGZILLA"/>
		<reference ref_id="747071" ref_url="https://bugzilla.suse.com/747071" source="BUGZILLA"/>
		<reference ref_id="747159" ref_url="https://bugzilla.suse.com/747159" source="BUGZILLA"/>
		<reference ref_id="747404" ref_url="https://bugzilla.suse.com/747404" source="BUGZILLA"/>
		<reference ref_id="747867" ref_url="https://bugzilla.suse.com/747867" source="BUGZILLA"/>
		<reference ref_id="747878" ref_url="https://bugzilla.suse.com/747878" source="BUGZILLA"/>
		<reference ref_id="747944" ref_url="https://bugzilla.suse.com/747944" source="BUGZILLA"/>
		<reference ref_id="748112" ref_url="https://bugzilla.suse.com/748112" source="BUGZILLA"/>
		<reference ref_id="748384" ref_url="https://bugzilla.suse.com/748384" source="BUGZILLA"/>
		<reference ref_id="748456" ref_url="https://bugzilla.suse.com/748456" source="BUGZILLA"/>
		<reference ref_id="748463" ref_url="https://bugzilla.suse.com/748463" source="BUGZILLA"/>
		<reference ref_id="748629" ref_url="https://bugzilla.suse.com/748629" source="BUGZILLA"/>
		<reference ref_id="748632" ref_url="https://bugzilla.suse.com/748632" source="BUGZILLA"/>
		<reference ref_id="748806" ref_url="https://bugzilla.suse.com/748806" source="BUGZILLA"/>
		<reference ref_id="748827" ref_url="https://bugzilla.suse.com/748827" source="BUGZILLA"/>
		<reference ref_id="748854" ref_url="https://bugzilla.suse.com/748854" source="BUGZILLA"/>
		<reference ref_id="748859" ref_url="https://bugzilla.suse.com/748859" source="BUGZILLA"/>
		<reference ref_id="748862" ref_url="https://bugzilla.suse.com/748862" source="BUGZILLA"/>
		<reference ref_id="748896" ref_url="https://bugzilla.suse.com/748896" source="BUGZILLA"/>
		<reference ref_id="749049" ref_url="https://bugzilla.suse.com/749049" source="BUGZILLA"/>
		<reference ref_id="749115" ref_url="https://bugzilla.suse.com/749115" source="BUGZILLA"/>
		<reference ref_id="749291" ref_url="https://bugzilla.suse.com/749291" source="BUGZILLA"/>
		<reference ref_id="749417" ref_url="https://bugzilla.suse.com/749417" source="BUGZILLA"/>
		<reference ref_id="749543" ref_url="https://bugzilla.suse.com/749543" source="BUGZILLA"/>
		<reference ref_id="749569" ref_url="https://bugzilla.suse.com/749569" source="BUGZILLA"/>
		<reference ref_id="749651" ref_url="https://bugzilla.suse.com/749651" source="BUGZILLA"/>
		<reference ref_id="749787" ref_url="https://bugzilla.suse.com/749787" source="BUGZILLA"/>
		<reference ref_id="749980" ref_url="https://bugzilla.suse.com/749980" source="BUGZILLA"/>
		<reference ref_id="750041" ref_url="https://bugzilla.suse.com/750041" source="BUGZILLA"/>
		<reference ref_id="750079" ref_url="https://bugzilla.suse.com/750079" source="BUGZILLA"/>
		<reference ref_id="750173" ref_url="https://bugzilla.suse.com/750173" source="BUGZILLA"/>
		<reference ref_id="750402" ref_url="https://bugzilla.suse.com/750402" source="BUGZILLA"/>
		<reference ref_id="750426" ref_url="https://bugzilla.suse.com/750426" source="BUGZILLA"/>
		<reference ref_id="750459" ref_url="https://bugzilla.suse.com/750459" source="BUGZILLA"/>
		<reference ref_id="750959" ref_url="https://bugzilla.suse.com/750959" source="BUGZILLA"/>
		<reference ref_id="750995" ref_url="https://bugzilla.suse.com/750995" source="BUGZILLA"/>
		<reference ref_id="751015" ref_url="https://bugzilla.suse.com/751015" source="BUGZILLA"/>
		<reference ref_id="751171" ref_url="https://bugzilla.suse.com/751171" source="BUGZILLA"/>
		<reference ref_id="751322" ref_url="https://bugzilla.suse.com/751322" source="BUGZILLA"/>
		<reference ref_id="751550" ref_url="https://bugzilla.suse.com/751550" source="BUGZILLA"/>
		<reference ref_id="751743" ref_url="https://bugzilla.suse.com/751743" source="BUGZILLA"/>
		<reference ref_id="751885" ref_url="https://bugzilla.suse.com/751885" source="BUGZILLA"/>
		<reference ref_id="751903" ref_url="https://bugzilla.suse.com/751903" source="BUGZILLA"/>
		<reference ref_id="751916" ref_url="https://bugzilla.suse.com/751916" source="BUGZILLA"/>
		<reference ref_id="752022" ref_url="https://bugzilla.suse.com/752022" source="BUGZILLA"/>
		<reference ref_id="752067" ref_url="https://bugzilla.suse.com/752067" source="BUGZILLA"/>
		<reference ref_id="752352" ref_url="https://bugzilla.suse.com/752352" source="BUGZILLA"/>
		<reference ref_id="752408" ref_url="https://bugzilla.suse.com/752408" source="BUGZILLA"/>
		<reference ref_id="752484" ref_url="https://bugzilla.suse.com/752484" source="BUGZILLA"/>
		<reference ref_id="752544" ref_url="https://bugzilla.suse.com/752544" source="BUGZILLA"/>
		<reference ref_id="752599" ref_url="https://bugzilla.suse.com/752599" source="BUGZILLA"/>
		<reference ref_id="752634" ref_url="https://bugzilla.suse.com/752634" source="BUGZILLA"/>
		<reference ref_id="752972" ref_url="https://bugzilla.suse.com/752972" source="BUGZILLA"/>
		<reference ref_id="753172" ref_url="https://bugzilla.suse.com/753172" source="BUGZILLA"/>
		<reference ref_id="753353" ref_url="https://bugzilla.suse.com/753353" source="BUGZILLA"/>
		<reference ref_id="753371" ref_url="https://bugzilla.suse.com/753371" source="BUGZILLA"/>
		<reference ref_id="753617" ref_url="https://bugzilla.suse.com/753617" source="BUGZILLA"/>
		<reference ref_id="753698" ref_url="https://bugzilla.suse.com/753698" source="BUGZILLA"/>
		<reference ref_id="754052" ref_url="https://bugzilla.suse.com/754052" source="BUGZILLA"/>
		<reference ref_id="754085" ref_url="https://bugzilla.suse.com/754085" source="BUGZILLA"/>
		<reference ref_id="754391" ref_url="https://bugzilla.suse.com/754391" source="BUGZILLA"/>
		<reference ref_id="754428" ref_url="https://bugzilla.suse.com/754428" source="BUGZILLA"/>
		<reference ref_id="754583" ref_url="https://bugzilla.suse.com/754583" source="BUGZILLA"/>
		<reference ref_id="754670" ref_url="https://bugzilla.suse.com/754670" source="BUGZILLA"/>
		<reference ref_id="754690" ref_url="https://bugzilla.suse.com/754690" source="BUGZILLA"/>
		<reference ref_id="754898" ref_url="https://bugzilla.suse.com/754898" source="BUGZILLA"/>
		<reference ref_id="754969" ref_url="https://bugzilla.suse.com/754969" source="BUGZILLA"/>
		<reference ref_id="755178" ref_url="https://bugzilla.suse.com/755178" source="BUGZILLA"/>
		<reference ref_id="755537" ref_url="https://bugzilla.suse.com/755537" source="BUGZILLA"/>
		<reference ref_id="755546" ref_url="https://bugzilla.suse.com/755546" source="BUGZILLA"/>
		<reference ref_id="755620" ref_url="https://bugzilla.suse.com/755620" source="BUGZILLA"/>
		<reference ref_id="755758" ref_url="https://bugzilla.suse.com/755758" source="BUGZILLA"/>
		<reference ref_id="755812" ref_url="https://bugzilla.suse.com/755812" source="BUGZILLA"/>
		<reference ref_id="756050" ref_url="https://bugzilla.suse.com/756050" source="BUGZILLA"/>
		<reference ref_id="756236" ref_url="https://bugzilla.suse.com/756236" source="BUGZILLA"/>
		<reference ref_id="756276" ref_url="https://bugzilla.suse.com/756276" source="BUGZILLA"/>
		<reference ref_id="756585" ref_url="https://bugzilla.suse.com/756585" source="BUGZILLA"/>
		<reference ref_id="756821" ref_url="https://bugzilla.suse.com/756821" source="BUGZILLA"/>
		<reference ref_id="756840" ref_url="https://bugzilla.suse.com/756840" source="BUGZILLA"/>
		<reference ref_id="756940" ref_url="https://bugzilla.suse.com/756940" source="BUGZILLA"/>
		<reference ref_id="757059" ref_url="https://bugzilla.suse.com/757059" source="BUGZILLA"/>
		<reference ref_id="757077" ref_url="https://bugzilla.suse.com/757077" source="BUGZILLA"/>
		<reference ref_id="757202" ref_url="https://bugzilla.suse.com/757202" source="BUGZILLA"/>
		<reference ref_id="757205" ref_url="https://bugzilla.suse.com/757205" source="BUGZILLA"/>
		<reference ref_id="757289" ref_url="https://bugzilla.suse.com/757289" source="BUGZILLA"/>
		<reference ref_id="757315" ref_url="https://bugzilla.suse.com/757315" source="BUGZILLA"/>
		<reference ref_id="757373" ref_url="https://bugzilla.suse.com/757373" source="BUGZILLA"/>
		<reference ref_id="757517" ref_url="https://bugzilla.suse.com/757517" source="BUGZILLA"/>
		<reference ref_id="757565" ref_url="https://bugzilla.suse.com/757565" source="BUGZILLA"/>
		<reference ref_id="757719" ref_url="https://bugzilla.suse.com/757719" source="BUGZILLA"/>
		<reference ref_id="757783" ref_url="https://bugzilla.suse.com/757783" source="BUGZILLA"/>
		<reference ref_id="757789" ref_url="https://bugzilla.suse.com/757789" source="BUGZILLA"/>
		<reference ref_id="757950" ref_url="https://bugzilla.suse.com/757950" source="BUGZILLA"/>
		<reference ref_id="758040" ref_url="https://bugzilla.suse.com/758040" source="BUGZILLA"/>
		<reference ref_id="758104" ref_url="https://bugzilla.suse.com/758104" source="BUGZILLA"/>
		<reference ref_id="758243" ref_url="https://bugzilla.suse.com/758243" source="BUGZILLA"/>
		<reference ref_id="758279" ref_url="https://bugzilla.suse.com/758279" source="BUGZILLA"/>
		<reference ref_id="758532" ref_url="https://bugzilla.suse.com/758532" source="BUGZILLA"/>
		<reference ref_id="758540" ref_url="https://bugzilla.suse.com/758540" source="BUGZILLA"/>
		<reference ref_id="758703" ref_url="https://bugzilla.suse.com/758703" source="BUGZILLA"/>
		<reference ref_id="758731" ref_url="https://bugzilla.suse.com/758731" source="BUGZILLA"/>
		<reference ref_id="758813" ref_url="https://bugzilla.suse.com/758813" source="BUGZILLA"/>
		<reference ref_id="758833" ref_url="https://bugzilla.suse.com/758833" source="BUGZILLA"/>
		<reference ref_id="759336" ref_url="https://bugzilla.suse.com/759336" source="BUGZILLA"/>
		<reference ref_id="759340" ref_url="https://bugzilla.suse.com/759340" source="BUGZILLA"/>
		<reference ref_id="759539" ref_url="https://bugzilla.suse.com/759539" source="BUGZILLA"/>
		<reference ref_id="759541" ref_url="https://bugzilla.suse.com/759541" source="BUGZILLA"/>
		<reference ref_id="759545" ref_url="https://bugzilla.suse.com/759545" source="BUGZILLA"/>
		<reference ref_id="759657" ref_url="https://bugzilla.suse.com/759657" source="BUGZILLA"/>
		<reference ref_id="759805" ref_url="https://bugzilla.suse.com/759805" source="BUGZILLA"/>
		<reference ref_id="759908" ref_url="https://bugzilla.suse.com/759908" source="BUGZILLA"/>
		<reference ref_id="759971" ref_url="https://bugzilla.suse.com/759971" source="BUGZILLA"/>
		<reference ref_id="760015" ref_url="https://bugzilla.suse.com/760015" source="BUGZILLA"/>
		<reference ref_id="760237" ref_url="https://bugzilla.suse.com/760237" source="BUGZILLA"/>
		<reference ref_id="760279" ref_url="https://bugzilla.suse.com/760279" source="BUGZILLA"/>
		<reference ref_id="760346" ref_url="https://bugzilla.suse.com/760346" source="BUGZILLA"/>
		<reference ref_id="760407" ref_url="https://bugzilla.suse.com/760407" source="BUGZILLA"/>
		<reference ref_id="760806" ref_url="https://bugzilla.suse.com/760806" source="BUGZILLA"/>
		<reference ref_id="760833" ref_url="https://bugzilla.suse.com/760833" source="BUGZILLA"/>
		<reference ref_id="760974" ref_url="https://bugzilla.suse.com/760974" source="BUGZILLA"/>
		<reference ref_id="761087" ref_url="https://bugzilla.suse.com/761087" source="BUGZILLA"/>
		<reference ref_id="761158" ref_url="https://bugzilla.suse.com/761158" source="BUGZILLA"/>
		<reference ref_id="761245" ref_url="https://bugzilla.suse.com/761245" source="BUGZILLA"/>
		<reference ref_id="761387" ref_url="https://bugzilla.suse.com/761387" source="BUGZILLA"/>
		<reference ref_id="761772" ref_url="https://bugzilla.suse.com/761772" source="BUGZILLA"/>
		<reference ref_id="761774" ref_url="https://bugzilla.suse.com/761774" source="BUGZILLA"/>
		<reference ref_id="761775" ref_url="https://bugzilla.suse.com/761775" source="BUGZILLA"/>
		<reference ref_id="761849" ref_url="https://bugzilla.suse.com/761849" source="BUGZILLA"/>
		<reference ref_id="762099" ref_url="https://bugzilla.suse.com/762099" source="BUGZILLA"/>
		<reference ref_id="762158" ref_url="https://bugzilla.suse.com/762158" source="BUGZILLA"/>
		<reference ref_id="762214" ref_url="https://bugzilla.suse.com/762214" source="BUGZILLA"/>
		<reference ref_id="762259" ref_url="https://bugzilla.suse.com/762259" source="BUGZILLA"/>
		<reference ref_id="762285" ref_url="https://bugzilla.suse.com/762285" source="BUGZILLA"/>
		<reference ref_id="762329" ref_url="https://bugzilla.suse.com/762329" source="BUGZILLA"/>
		<reference ref_id="762366" ref_url="https://bugzilla.suse.com/762366" source="BUGZILLA"/>
		<reference ref_id="762414" ref_url="https://bugzilla.suse.com/762414" source="BUGZILLA"/>
		<reference ref_id="762424" ref_url="https://bugzilla.suse.com/762424" source="BUGZILLA"/>
		<reference ref_id="762693" ref_url="https://bugzilla.suse.com/762693" source="BUGZILLA"/>
		<reference ref_id="762991" ref_url="https://bugzilla.suse.com/762991" source="BUGZILLA"/>
		<reference ref_id="762992" ref_url="https://bugzilla.suse.com/762992" source="BUGZILLA"/>
		<reference ref_id="763026" ref_url="https://bugzilla.suse.com/763026" source="BUGZILLA"/>
		<reference ref_id="763198" ref_url="https://bugzilla.suse.com/763198" source="BUGZILLA"/>
		<reference ref_id="763267" ref_url="https://bugzilla.suse.com/763267" source="BUGZILLA"/>
		<reference ref_id="763307" ref_url="https://bugzilla.suse.com/763307" source="BUGZILLA"/>
		<reference ref_id="763463" ref_url="https://bugzilla.suse.com/763463" source="BUGZILLA"/>
		<reference ref_id="763485" ref_url="https://bugzilla.suse.com/763485" source="BUGZILLA"/>
		<reference ref_id="763494" ref_url="https://bugzilla.suse.com/763494" source="BUGZILLA"/>
		<reference ref_id="763628" ref_url="https://bugzilla.suse.com/763628" source="BUGZILLA"/>
		<reference ref_id="763654" ref_url="https://bugzilla.suse.com/763654" source="BUGZILLA"/>
		<reference ref_id="763717" ref_url="https://bugzilla.suse.com/763717" source="BUGZILLA"/>
		<reference ref_id="763754" ref_url="https://bugzilla.suse.com/763754" source="BUGZILLA"/>
		<reference ref_id="763858" ref_url="https://bugzilla.suse.com/763858" source="BUGZILLA"/>
		<reference ref_id="763954" ref_url="https://bugzilla.suse.com/763954" source="BUGZILLA"/>
		<reference ref_id="763968" ref_url="https://bugzilla.suse.com/763968" source="BUGZILLA"/>
		<reference ref_id="764091" ref_url="https://bugzilla.suse.com/764091" source="BUGZILLA"/>
		<reference ref_id="764150" ref_url="https://bugzilla.suse.com/764150" source="BUGZILLA"/>
		<reference ref_id="764209" ref_url="https://bugzilla.suse.com/764209" source="BUGZILLA"/>
		<reference ref_id="764339" ref_url="https://bugzilla.suse.com/764339" source="BUGZILLA"/>
		<reference ref_id="764500" ref_url="https://bugzilla.suse.com/764500" source="BUGZILLA"/>
		<reference ref_id="764900" ref_url="https://bugzilla.suse.com/764900" source="BUGZILLA"/>
		<reference ref_id="765102" ref_url="https://bugzilla.suse.com/765102" source="BUGZILLA"/>
		<reference ref_id="765253" ref_url="https://bugzilla.suse.com/765253" source="BUGZILLA"/>
		<reference ref_id="765320" ref_url="https://bugzilla.suse.com/765320" source="BUGZILLA"/>
		<reference ref_id="765523" ref_url="https://bugzilla.suse.com/765523" source="BUGZILLA"/>
		<reference ref_id="765524" ref_url="https://bugzilla.suse.com/765524" source="BUGZILLA"/>
		<reference ref_id="766027" ref_url="https://bugzilla.suse.com/766027" source="BUGZILLA"/>
		<reference ref_id="766156" ref_url="https://bugzilla.suse.com/766156" source="BUGZILLA"/>
		<reference ref_id="766410" ref_url="https://bugzilla.suse.com/766410" source="BUGZILLA"/>
		<reference ref_id="766445" ref_url="https://bugzilla.suse.com/766445" source="BUGZILLA"/>
		<reference ref_id="766654" ref_url="https://bugzilla.suse.com/766654" source="BUGZILLA"/>
		<reference ref_id="766733" ref_url="https://bugzilla.suse.com/766733" source="BUGZILLA"/>
		<reference ref_id="767281" ref_url="https://bugzilla.suse.com/767281" source="BUGZILLA"/>
		<reference ref_id="767469" ref_url="https://bugzilla.suse.com/767469" source="BUGZILLA"/>
		<reference ref_id="767610" ref_url="https://bugzilla.suse.com/767610" source="BUGZILLA"/>
		<reference ref_id="767612" ref_url="https://bugzilla.suse.com/767612" source="BUGZILLA"/>
		<reference ref_id="767684" ref_url="https://bugzilla.suse.com/767684" source="BUGZILLA"/>
		<reference ref_id="767983" ref_url="https://bugzilla.suse.com/767983" source="BUGZILLA"/>
		<reference ref_id="768052" ref_url="https://bugzilla.suse.com/768052" source="BUGZILLA"/>
		<reference ref_id="768084" ref_url="https://bugzilla.suse.com/768084" source="BUGZILLA"/>
		<reference ref_id="768470" ref_url="https://bugzilla.suse.com/768470" source="BUGZILLA"/>
		<reference ref_id="768504" ref_url="https://bugzilla.suse.com/768504" source="BUGZILLA"/>
		<reference ref_id="768632" ref_url="https://bugzilla.suse.com/768632" source="BUGZILLA"/>
		<reference ref_id="769035" ref_url="https://bugzilla.suse.com/769035" source="BUGZILLA"/>
		<reference ref_id="769195" ref_url="https://bugzilla.suse.com/769195" source="BUGZILLA"/>
		<reference ref_id="769251" ref_url="https://bugzilla.suse.com/769251" source="BUGZILLA"/>
		<reference ref_id="769407" ref_url="https://bugzilla.suse.com/769407" source="BUGZILLA"/>
		<reference ref_id="769644" ref_url="https://bugzilla.suse.com/769644" source="BUGZILLA"/>
		<reference ref_id="769685" ref_url="https://bugzilla.suse.com/769685" source="BUGZILLA"/>
		<reference ref_id="769784" ref_url="https://bugzilla.suse.com/769784" source="BUGZILLA"/>
		<reference ref_id="769896" ref_url="https://bugzilla.suse.com/769896" source="BUGZILLA"/>
		<reference ref_id="770034" ref_url="https://bugzilla.suse.com/770034" source="BUGZILLA"/>
		<reference ref_id="770238" ref_url="https://bugzilla.suse.com/770238" source="BUGZILLA"/>
		<reference ref_id="770269" ref_url="https://bugzilla.suse.com/770269" source="BUGZILLA"/>
		<reference ref_id="770695" ref_url="https://bugzilla.suse.com/770695" source="BUGZILLA"/>
		<reference ref_id="770763" ref_url="https://bugzilla.suse.com/770763" source="BUGZILLA"/>
		<reference ref_id="771102" ref_url="https://bugzilla.suse.com/771102" source="BUGZILLA"/>
		<reference ref_id="771242" ref_url="https://bugzilla.suse.com/771242" source="BUGZILLA"/>
		<reference ref_id="771361" ref_url="https://bugzilla.suse.com/771361" source="BUGZILLA"/>
		<reference ref_id="771398" ref_url="https://bugzilla.suse.com/771398" source="BUGZILLA"/>
		<reference ref_id="771428" ref_url="https://bugzilla.suse.com/771428" source="BUGZILLA"/>
		<reference ref_id="771619" ref_url="https://bugzilla.suse.com/771619" source="BUGZILLA"/>
		<reference ref_id="771706" ref_url="https://bugzilla.suse.com/771706" source="BUGZILLA"/>
		<reference ref_id="771778" ref_url="https://bugzilla.suse.com/771778" source="BUGZILLA"/>
		<reference ref_id="772407" ref_url="https://bugzilla.suse.com/772407" source="BUGZILLA"/>
		<reference ref_id="772420" ref_url="https://bugzilla.suse.com/772420" source="BUGZILLA"/>
		<reference ref_id="772427" ref_url="https://bugzilla.suse.com/772427" source="BUGZILLA"/>
		<reference ref_id="772454" ref_url="https://bugzilla.suse.com/772454" source="BUGZILLA"/>
		<reference ref_id="772473" ref_url="https://bugzilla.suse.com/772473" source="BUGZILLA"/>
		<reference ref_id="772483" ref_url="https://bugzilla.suse.com/772483" source="BUGZILLA"/>
		<reference ref_id="772566" ref_url="https://bugzilla.suse.com/772566" source="BUGZILLA"/>
		<reference ref_id="772786" ref_url="https://bugzilla.suse.com/772786" source="BUGZILLA"/>
		<reference ref_id="772831" ref_url="https://bugzilla.suse.com/772831" source="BUGZILLA"/>
		<reference ref_id="772893" ref_url="https://bugzilla.suse.com/772893" source="BUGZILLA"/>
		<reference ref_id="773006" ref_url="https://bugzilla.suse.com/773006" source="BUGZILLA"/>
		<reference ref_id="773007" ref_url="https://bugzilla.suse.com/773007" source="BUGZILLA"/>
		<reference ref_id="773251" ref_url="https://bugzilla.suse.com/773251" source="BUGZILLA"/>
		<reference ref_id="773255" ref_url="https://bugzilla.suse.com/773255" source="BUGZILLA"/>
		<reference ref_id="773267" ref_url="https://bugzilla.suse.com/773267" source="BUGZILLA"/>
		<reference ref_id="773319" ref_url="https://bugzilla.suse.com/773319" source="BUGZILLA"/>
		<reference ref_id="773320" ref_url="https://bugzilla.suse.com/773320" source="BUGZILLA"/>
		<reference ref_id="773383" ref_url="https://bugzilla.suse.com/773383" source="BUGZILLA"/>
		<reference ref_id="773406" ref_url="https://bugzilla.suse.com/773406" source="BUGZILLA"/>
		<reference ref_id="773487" ref_url="https://bugzilla.suse.com/773487" source="BUGZILLA"/>
		<reference ref_id="773577" ref_url="https://bugzilla.suse.com/773577" source="BUGZILLA"/>
		<reference ref_id="773606" ref_url="https://bugzilla.suse.com/773606" source="BUGZILLA"/>
		<reference ref_id="773688" ref_url="https://bugzilla.suse.com/773688" source="BUGZILLA"/>
		<reference ref_id="773699" ref_url="https://bugzilla.suse.com/773699" source="BUGZILLA"/>
		<reference ref_id="773831" ref_url="https://bugzilla.suse.com/773831" source="BUGZILLA"/>
		<reference ref_id="773837" ref_url="https://bugzilla.suse.com/773837" source="BUGZILLA"/>
		<reference ref_id="773878" ref_url="https://bugzilla.suse.com/773878" source="BUGZILLA"/>
		<reference ref_id="774073" ref_url="https://bugzilla.suse.com/774073" source="BUGZILLA"/>
		<reference ref_id="774285" ref_url="https://bugzilla.suse.com/774285" source="BUGZILLA"/>
		<reference ref_id="774289" ref_url="https://bugzilla.suse.com/774289" source="BUGZILLA"/>
		<reference ref_id="774500" ref_url="https://bugzilla.suse.com/774500" source="BUGZILLA"/>
		<reference ref_id="774523" ref_url="https://bugzilla.suse.com/774523" source="BUGZILLA"/>
		<reference ref_id="774612" ref_url="https://bugzilla.suse.com/774612" source="BUGZILLA"/>
		<reference ref_id="774859" ref_url="https://bugzilla.suse.com/774859" source="BUGZILLA"/>
		<reference ref_id="774902" ref_url="https://bugzilla.suse.com/774902" source="BUGZILLA"/>
		<reference ref_id="774964" ref_url="https://bugzilla.suse.com/774964" source="BUGZILLA"/>
		<reference ref_id="774973" ref_url="https://bugzilla.suse.com/774973" source="BUGZILLA"/>
		<reference ref_id="775182" ref_url="https://bugzilla.suse.com/775182" source="BUGZILLA"/>
		<reference ref_id="775373" ref_url="https://bugzilla.suse.com/775373" source="BUGZILLA"/>
		<reference ref_id="775394" ref_url="https://bugzilla.suse.com/775394" source="BUGZILLA"/>
		<reference ref_id="775577" ref_url="https://bugzilla.suse.com/775577" source="BUGZILLA"/>
		<reference ref_id="775685" ref_url="https://bugzilla.suse.com/775685" source="BUGZILLA"/>
		<reference ref_id="775984" ref_url="https://bugzilla.suse.com/775984" source="BUGZILLA"/>
		<reference ref_id="776019" ref_url="https://bugzilla.suse.com/776019" source="BUGZILLA"/>
		<reference ref_id="776044" ref_url="https://bugzilla.suse.com/776044" source="BUGZILLA"/>
		<reference ref_id="776081" ref_url="https://bugzilla.suse.com/776081" source="BUGZILLA"/>
		<reference ref_id="776095" ref_url="https://bugzilla.suse.com/776095" source="BUGZILLA"/>
		<reference ref_id="776127" ref_url="https://bugzilla.suse.com/776127" source="BUGZILLA"/>
		<reference ref_id="776144" ref_url="https://bugzilla.suse.com/776144" source="BUGZILLA"/>
		<reference ref_id="776787" ref_url="https://bugzilla.suse.com/776787" source="BUGZILLA"/>
		<reference ref_id="776896" ref_url="https://bugzilla.suse.com/776896" source="BUGZILLA"/>
		<reference ref_id="777024" ref_url="https://bugzilla.suse.com/777024" source="BUGZILLA"/>
		<reference ref_id="777269" ref_url="https://bugzilla.suse.com/777269" source="BUGZILLA"/>
		<reference ref_id="777283" ref_url="https://bugzilla.suse.com/777283" source="BUGZILLA"/>
		<reference ref_id="777616" ref_url="https://bugzilla.suse.com/777616" source="BUGZILLA"/>
		<reference ref_id="777746" ref_url="https://bugzilla.suse.com/777746" source="BUGZILLA"/>
		<reference ref_id="778082" ref_url="https://bugzilla.suse.com/778082" source="BUGZILLA"/>
		<reference ref_id="778136" ref_url="https://bugzilla.suse.com/778136" source="BUGZILLA"/>
		<reference ref_id="778334" ref_url="https://bugzilla.suse.com/778334" source="BUGZILLA"/>
		<reference ref_id="778630" ref_url="https://bugzilla.suse.com/778630" source="BUGZILLA"/>
		<reference ref_id="778822" ref_url="https://bugzilla.suse.com/778822" source="BUGZILLA"/>
		<reference ref_id="779294" ref_url="https://bugzilla.suse.com/779294" source="BUGZILLA"/>
		<reference ref_id="779330" ref_url="https://bugzilla.suse.com/779330" source="BUGZILLA"/>
		<reference ref_id="779461" ref_url="https://bugzilla.suse.com/779461" source="BUGZILLA"/>
		<reference ref_id="779462" ref_url="https://bugzilla.suse.com/779462" source="BUGZILLA"/>
		<reference ref_id="779488" ref_url="https://bugzilla.suse.com/779488" source="BUGZILLA"/>
		<reference ref_id="779577" ref_url="https://bugzilla.suse.com/779577" source="BUGZILLA"/>
		<reference ref_id="779699" ref_url="https://bugzilla.suse.com/779699" source="BUGZILLA"/>
		<reference ref_id="779750" ref_url="https://bugzilla.suse.com/779750" source="BUGZILLA"/>
		<reference ref_id="779969" ref_url="https://bugzilla.suse.com/779969" source="BUGZILLA"/>
		<reference ref_id="780008" ref_url="https://bugzilla.suse.com/780008" source="BUGZILLA"/>
		<reference ref_id="780012" ref_url="https://bugzilla.suse.com/780012" source="BUGZILLA"/>
		<reference ref_id="780216" ref_url="https://bugzilla.suse.com/780216" source="BUGZILLA"/>
		<reference ref_id="780461" ref_url="https://bugzilla.suse.com/780461" source="BUGZILLA"/>
		<reference ref_id="780876" ref_url="https://bugzilla.suse.com/780876" source="BUGZILLA"/>
		<reference ref_id="780977" ref_url="https://bugzilla.suse.com/780977" source="BUGZILLA"/>
		<reference ref_id="781018" ref_url="https://bugzilla.suse.com/781018" source="BUGZILLA"/>
		<reference ref_id="781134" ref_url="https://bugzilla.suse.com/781134" source="BUGZILLA"/>
		<reference ref_id="781327" ref_url="https://bugzilla.suse.com/781327" source="BUGZILLA"/>
		<reference ref_id="781484" ref_url="https://bugzilla.suse.com/781484" source="BUGZILLA"/>
		<reference ref_id="781574" ref_url="https://bugzilla.suse.com/781574" source="BUGZILLA"/>
		<reference ref_id="782369" ref_url="https://bugzilla.suse.com/782369" source="BUGZILLA"/>
		<reference ref_id="782721" ref_url="https://bugzilla.suse.com/782721" source="BUGZILLA"/>
		<reference ref_id="783475" ref_url="https://bugzilla.suse.com/783475" source="BUGZILLA"/>
		<reference ref_id="783515" ref_url="https://bugzilla.suse.com/783515" source="BUGZILLA"/>
		<reference ref_id="783965" ref_url="https://bugzilla.suse.com/783965" source="BUGZILLA"/>
		<reference ref_id="784192" ref_url="https://bugzilla.suse.com/784192" source="BUGZILLA"/>
		<reference ref_id="784334" ref_url="https://bugzilla.suse.com/784334" source="BUGZILLA"/>
		<reference ref_id="784576" ref_url="https://bugzilla.suse.com/784576" source="BUGZILLA"/>
		<reference ref_id="785100" ref_url="https://bugzilla.suse.com/785100" source="BUGZILLA"/>
		<reference ref_id="785496" ref_url="https://bugzilla.suse.com/785496" source="BUGZILLA"/>
		<reference ref_id="785554" ref_url="https://bugzilla.suse.com/785554" source="BUGZILLA"/>
		<reference ref_id="785851" ref_url="https://bugzilla.suse.com/785851" source="BUGZILLA"/>
		<reference ref_id="785901" ref_url="https://bugzilla.suse.com/785901" source="BUGZILLA"/>
		<reference ref_id="786013" ref_url="https://bugzilla.suse.com/786013" source="BUGZILLA"/>
		<reference ref_id="786150" ref_url="https://bugzilla.suse.com/786150" source="BUGZILLA"/>
		<reference ref_id="786814" ref_url="https://bugzilla.suse.com/786814" source="BUGZILLA"/>
		<reference ref_id="786900" ref_url="https://bugzilla.suse.com/786900" source="BUGZILLA"/>
		<reference ref_id="786976" ref_url="https://bugzilla.suse.com/786976" source="BUGZILLA"/>
		<reference ref_id="787168" ref_url="https://bugzilla.suse.com/787168" source="BUGZILLA"/>
		<reference ref_id="787202" ref_url="https://bugzilla.suse.com/787202" source="BUGZILLA"/>
		<reference ref_id="787348" ref_url="https://bugzilla.suse.com/787348" source="BUGZILLA"/>
		<reference ref_id="787576" ref_url="https://bugzilla.suse.com/787576" source="BUGZILLA"/>
		<reference ref_id="787821" ref_url="https://bugzilla.suse.com/787821" source="BUGZILLA"/>
		<reference ref_id="787843" ref_url="https://bugzilla.suse.com/787843" source="BUGZILLA"/>
		<reference ref_id="787848" ref_url="https://bugzilla.suse.com/787848" source="BUGZILLA"/>
		<reference ref_id="788277" ref_url="https://bugzilla.suse.com/788277" source="BUGZILLA"/>
		<reference ref_id="788452" ref_url="https://bugzilla.suse.com/788452" source="BUGZILLA"/>
		<reference ref_id="788590" ref_url="https://bugzilla.suse.com/788590" source="BUGZILLA"/>
		<reference ref_id="788826" ref_url="https://bugzilla.suse.com/788826" source="BUGZILLA"/>
		<reference ref_id="789010" ref_url="https://bugzilla.suse.com/789010" source="BUGZILLA"/>
		<reference ref_id="789115" ref_url="https://bugzilla.suse.com/789115" source="BUGZILLA"/>
		<reference ref_id="789235" ref_url="https://bugzilla.suse.com/789235" source="BUGZILLA"/>
		<reference ref_id="789311" ref_url="https://bugzilla.suse.com/789311" source="BUGZILLA"/>
		<reference ref_id="789359" ref_url="https://bugzilla.suse.com/789359" source="BUGZILLA"/>
		<reference ref_id="789648" ref_url="https://bugzilla.suse.com/789648" source="BUGZILLA"/>
		<reference ref_id="789703" ref_url="https://bugzilla.suse.com/789703" source="BUGZILLA"/>
		<reference ref_id="789836" ref_url="https://bugzilla.suse.com/789836" source="BUGZILLA"/>
		<reference ref_id="789993" ref_url="https://bugzilla.suse.com/789993" source="BUGZILLA"/>
		<reference ref_id="790457" ref_url="https://bugzilla.suse.com/790457" source="BUGZILLA"/>
		<reference ref_id="790498" ref_url="https://bugzilla.suse.com/790498" source="BUGZILLA"/>
		<reference ref_id="790867" ref_url="https://bugzilla.suse.com/790867" source="BUGZILLA"/>
		<reference ref_id="790920" ref_url="https://bugzilla.suse.com/790920" source="BUGZILLA"/>
		<reference ref_id="790935" ref_url="https://bugzilla.suse.com/790935" source="BUGZILLA"/>
		<reference ref_id="791498" ref_url="https://bugzilla.suse.com/791498" source="BUGZILLA"/>
		<reference ref_id="791853" ref_url="https://bugzilla.suse.com/791853" source="BUGZILLA"/>
		<reference ref_id="791904" ref_url="https://bugzilla.suse.com/791904" source="BUGZILLA"/>
		<reference ref_id="792270" ref_url="https://bugzilla.suse.com/792270" source="BUGZILLA"/>
		<reference ref_id="792500" ref_url="https://bugzilla.suse.com/792500" source="BUGZILLA"/>
		<reference ref_id="792584" ref_url="https://bugzilla.suse.com/792584" source="BUGZILLA"/>
		<reference ref_id="792656" ref_url="https://bugzilla.suse.com/792656" source="BUGZILLA"/>
		<reference ref_id="792674" ref_url="https://bugzilla.suse.com/792674" source="BUGZILLA"/>
		<reference ref_id="792793" ref_url="https://bugzilla.suse.com/792793" source="BUGZILLA"/>
		<reference ref_id="792834" ref_url="https://bugzilla.suse.com/792834" source="BUGZILLA"/>
		<reference ref_id="793104" ref_url="https://bugzilla.suse.com/793104" source="BUGZILLA"/>
		<reference ref_id="793139" ref_url="https://bugzilla.suse.com/793139" source="BUGZILLA"/>
		<reference ref_id="793593" ref_url="https://bugzilla.suse.com/793593" source="BUGZILLA"/>
		<reference ref_id="793671" ref_url="https://bugzilla.suse.com/793671" source="BUGZILLA"/>
		<reference ref_id="794231" ref_url="https://bugzilla.suse.com/794231" source="BUGZILLA"/>
		<reference ref_id="794513" ref_url="https://bugzilla.suse.com/794513" source="BUGZILLA"/>
		<reference ref_id="794529" ref_url="https://bugzilla.suse.com/794529" source="BUGZILLA"/>
		<reference ref_id="794805" ref_url="https://bugzilla.suse.com/794805" source="BUGZILLA"/>
		<reference ref_id="794824" ref_url="https://bugzilla.suse.com/794824" source="BUGZILLA"/>
		<reference ref_id="795269" ref_url="https://bugzilla.suse.com/795269" source="BUGZILLA"/>
		<reference ref_id="795354" ref_url="https://bugzilla.suse.com/795354" source="BUGZILLA"/>
		<reference ref_id="795928" ref_url="https://bugzilla.suse.com/795928" source="BUGZILLA"/>
		<reference ref_id="795957" ref_url="https://bugzilla.suse.com/795957" source="BUGZILLA"/>
		<reference ref_id="795961" ref_url="https://bugzilla.suse.com/795961" source="BUGZILLA"/>
		<reference ref_id="796412" ref_url="https://bugzilla.suse.com/796412" source="BUGZILLA"/>
		<reference ref_id="796418" ref_url="https://bugzilla.suse.com/796418" source="BUGZILLA"/>
		<reference ref_id="796823" ref_url="https://bugzilla.suse.com/796823" source="BUGZILLA"/>
		<reference ref_id="797042" ref_url="https://bugzilla.suse.com/797042" source="BUGZILLA"/>
		<reference ref_id="797175" ref_url="https://bugzilla.suse.com/797175" source="BUGZILLA"/>
		<reference ref_id="797526" ref_url="https://bugzilla.suse.com/797526" source="BUGZILLA"/>
		<reference ref_id="798050" ref_url="https://bugzilla.suse.com/798050" source="BUGZILLA"/>
		<reference ref_id="798921" ref_url="https://bugzilla.suse.com/798921" source="BUGZILLA"/>
		<reference ref_id="798960" ref_url="https://bugzilla.suse.com/798960" source="BUGZILLA"/>
		<reference ref_id="799197" ref_url="https://bugzilla.suse.com/799197" source="BUGZILLA"/>
		<reference ref_id="799209" ref_url="https://bugzilla.suse.com/799209" source="BUGZILLA"/>
		<reference ref_id="799270" ref_url="https://bugzilla.suse.com/799270" source="BUGZILLA"/>
		<reference ref_id="799275" ref_url="https://bugzilla.suse.com/799275" source="BUGZILLA"/>
		<reference ref_id="799578" ref_url="https://bugzilla.suse.com/799578" source="BUGZILLA"/>
		<reference ref_id="799909" ref_url="https://bugzilla.suse.com/799909" source="BUGZILLA"/>
		<reference ref_id="799926" ref_url="https://bugzilla.suse.com/799926" source="BUGZILLA"/>
		<reference ref_id="800280" ref_url="https://bugzilla.suse.com/800280" source="BUGZILLA"/>
		<reference ref_id="800701" ref_url="https://bugzilla.suse.com/800701" source="BUGZILLA"/>
		<reference ref_id="800907" ref_url="https://bugzilla.suse.com/800907" source="BUGZILLA"/>
		<reference ref_id="801038" ref_url="https://bugzilla.suse.com/801038" source="BUGZILLA"/>
		<reference ref_id="801178" ref_url="https://bugzilla.suse.com/801178" source="BUGZILLA"/>
		<reference ref_id="801427" ref_url="https://bugzilla.suse.com/801427" source="BUGZILLA"/>
		<reference ref_id="801713" ref_url="https://bugzilla.suse.com/801713" source="BUGZILLA"/>
		<reference ref_id="801717" ref_url="https://bugzilla.suse.com/801717" source="BUGZILLA"/>
		<reference ref_id="801720" ref_url="https://bugzilla.suse.com/801720" source="BUGZILLA"/>
		<reference ref_id="801782" ref_url="https://bugzilla.suse.com/801782" source="BUGZILLA"/>
		<reference ref_id="802153" ref_url="https://bugzilla.suse.com/802153" source="BUGZILLA"/>
		<reference ref_id="802353" ref_url="https://bugzilla.suse.com/802353" source="BUGZILLA"/>
		<reference ref_id="802445" ref_url="https://bugzilla.suse.com/802445" source="BUGZILLA"/>
		<reference ref_id="802642" ref_url="https://bugzilla.suse.com/802642" source="BUGZILLA"/>
		<reference ref_id="802712" ref_url="https://bugzilla.suse.com/802712" source="BUGZILLA"/>
		<reference ref_id="803056" ref_url="https://bugzilla.suse.com/803056" source="BUGZILLA"/>
		<reference ref_id="803067" ref_url="https://bugzilla.suse.com/803067" source="BUGZILLA"/>
		<reference ref_id="803320" ref_url="https://bugzilla.suse.com/803320" source="BUGZILLA"/>
		<reference ref_id="803394" ref_url="https://bugzilla.suse.com/803394" source="BUGZILLA"/>
		<reference ref_id="803674" ref_url="https://bugzilla.suse.com/803674" source="BUGZILLA"/>
		<reference ref_id="803712" ref_url="https://bugzilla.suse.com/803712" source="BUGZILLA"/>
		<reference ref_id="804154" ref_url="https://bugzilla.suse.com/804154" source="BUGZILLA"/>
		<reference ref_id="804220" ref_url="https://bugzilla.suse.com/804220" source="BUGZILLA"/>
		<reference ref_id="804482" ref_url="https://bugzilla.suse.com/804482" source="BUGZILLA"/>
		<reference ref_id="804609" ref_url="https://bugzilla.suse.com/804609" source="BUGZILLA"/>
		<reference ref_id="804656" ref_url="https://bugzilla.suse.com/804656" source="BUGZILLA"/>
		<reference ref_id="804950" ref_url="https://bugzilla.suse.com/804950" source="BUGZILLA"/>
		<reference ref_id="805227" ref_url="https://bugzilla.suse.com/805227" source="BUGZILLA"/>
		<reference ref_id="805371" ref_url="https://bugzilla.suse.com/805371" source="BUGZILLA"/>
		<reference ref_id="805804" ref_url="https://bugzilla.suse.com/805804" source="BUGZILLA"/>
		<reference ref_id="805823" ref_url="https://bugzilla.suse.com/805823" source="BUGZILLA"/>
		<reference ref_id="805945" ref_url="https://bugzilla.suse.com/805945" source="BUGZILLA"/>
		<reference ref_id="806138" ref_url="https://bugzilla.suse.com/806138" source="BUGZILLA"/>
		<reference ref_id="806238" ref_url="https://bugzilla.suse.com/806238" source="BUGZILLA"/>
		<reference ref_id="806395" ref_url="https://bugzilla.suse.com/806395" source="BUGZILLA"/>
		<reference ref_id="806396" ref_url="https://bugzilla.suse.com/806396" source="BUGZILLA"/>
		<reference ref_id="806404" ref_url="https://bugzilla.suse.com/806404" source="BUGZILLA"/>
		<reference ref_id="806431" ref_url="https://bugzilla.suse.com/806431" source="BUGZILLA"/>
		<reference ref_id="806466" ref_url="https://bugzilla.suse.com/806466" source="BUGZILLA"/>
		<reference ref_id="806469" ref_url="https://bugzilla.suse.com/806469" source="BUGZILLA"/>
		<reference ref_id="806492" ref_url="https://bugzilla.suse.com/806492" source="BUGZILLA"/>
		<reference ref_id="806631" ref_url="https://bugzilla.suse.com/806631" source="BUGZILLA"/>
		<reference ref_id="806825" ref_url="https://bugzilla.suse.com/806825" source="BUGZILLA"/>
		<reference ref_id="806847" ref_url="https://bugzilla.suse.com/806847" source="BUGZILLA"/>
		<reference ref_id="806908" ref_url="https://bugzilla.suse.com/806908" source="BUGZILLA"/>
		<reference ref_id="806976" ref_url="https://bugzilla.suse.com/806976" source="BUGZILLA"/>
		<reference ref_id="806980" ref_url="https://bugzilla.suse.com/806980" source="BUGZILLA"/>
		<reference ref_id="806988" ref_url="https://bugzilla.suse.com/806988" source="BUGZILLA"/>
		<reference ref_id="807431" ref_url="https://bugzilla.suse.com/807431" source="BUGZILLA"/>
		<reference ref_id="807434" ref_url="https://bugzilla.suse.com/807434" source="BUGZILLA"/>
		<reference ref_id="807471" ref_url="https://bugzilla.suse.com/807471" source="BUGZILLA"/>
		<reference ref_id="807502" ref_url="https://bugzilla.suse.com/807502" source="BUGZILLA"/>
		<reference ref_id="807517" ref_url="https://bugzilla.suse.com/807517" source="BUGZILLA"/>
		<reference ref_id="807560" ref_url="https://bugzilla.suse.com/807560" source="BUGZILLA"/>
		<reference ref_id="807853" ref_url="https://bugzilla.suse.com/807853" source="BUGZILLA"/>
		<reference ref_id="808166" ref_url="https://bugzilla.suse.com/808166" source="BUGZILLA"/>
		<reference ref_id="808307" ref_url="https://bugzilla.suse.com/808307" source="BUGZILLA"/>
		<reference ref_id="808358" ref_url="https://bugzilla.suse.com/808358" source="BUGZILLA"/>
		<reference ref_id="808647" ref_url="https://bugzilla.suse.com/808647" source="BUGZILLA"/>
		<reference ref_id="808827" ref_url="https://bugzilla.suse.com/808827" source="BUGZILLA"/>
		<reference ref_id="808829" ref_url="https://bugzilla.suse.com/808829" source="BUGZILLA"/>
		<reference ref_id="808940" ref_url="https://bugzilla.suse.com/808940" source="BUGZILLA"/>
		<reference ref_id="808966" ref_url="https://bugzilla.suse.com/808966" source="BUGZILLA"/>
		<reference ref_id="808991" ref_url="https://bugzilla.suse.com/808991" source="BUGZILLA"/>
		<reference ref_id="809122" ref_url="https://bugzilla.suse.com/809122" source="BUGZILLA"/>
		<reference ref_id="809155" ref_url="https://bugzilla.suse.com/809155" source="BUGZILLA"/>
		<reference ref_id="809166" ref_url="https://bugzilla.suse.com/809166" source="BUGZILLA"/>
		<reference ref_id="809375" ref_url="https://bugzilla.suse.com/809375" source="BUGZILLA"/>
		<reference ref_id="809493" ref_url="https://bugzilla.suse.com/809493" source="BUGZILLA"/>
		<reference ref_id="809748" ref_url="https://bugzilla.suse.com/809748" source="BUGZILLA"/>
		<reference ref_id="809895" ref_url="https://bugzilla.suse.com/809895" source="BUGZILLA"/>
		<reference ref_id="809902" ref_url="https://bugzilla.suse.com/809902" source="BUGZILLA"/>
		<reference ref_id="809903" ref_url="https://bugzilla.suse.com/809903" source="BUGZILLA"/>
		<reference ref_id="810323" ref_url="https://bugzilla.suse.com/810323" source="BUGZILLA"/>
		<reference ref_id="810473" ref_url="https://bugzilla.suse.com/810473" source="BUGZILLA"/>
		<reference ref_id="810580" ref_url="https://bugzilla.suse.com/810580" source="BUGZILLA"/>
		<reference ref_id="810624" ref_url="https://bugzilla.suse.com/810624" source="BUGZILLA"/>
		<reference ref_id="810722" ref_url="https://bugzilla.suse.com/810722" source="BUGZILLA"/>
		<reference ref_id="812281" ref_url="https://bugzilla.suse.com/812281" source="BUGZILLA"/>
		<reference ref_id="812315" ref_url="https://bugzilla.suse.com/812315" source="BUGZILLA"/>
		<reference ref_id="812526" ref_url="https://bugzilla.suse.com/812526" source="BUGZILLA"/>
		<reference ref_id="812974" ref_url="https://bugzilla.suse.com/812974" source="BUGZILLA"/>
		<reference ref_id="813245" ref_url="https://bugzilla.suse.com/813245" source="BUGZILLA"/>
		<reference ref_id="813604" ref_url="https://bugzilla.suse.com/813604" source="BUGZILLA"/>
		<reference ref_id="813733" ref_url="https://bugzilla.suse.com/813733" source="BUGZILLA"/>
		<reference ref_id="813963" ref_url="https://bugzilla.suse.com/813963" source="BUGZILLA"/>
		<reference ref_id="814336" ref_url="https://bugzilla.suse.com/814336" source="BUGZILLA"/>
		<reference ref_id="814719" ref_url="https://bugzilla.suse.com/814719" source="BUGZILLA"/>
		<reference ref_id="814788" ref_url="https://bugzilla.suse.com/814788" source="BUGZILLA"/>
		<reference ref_id="815320" ref_url="https://bugzilla.suse.com/815320" source="BUGZILLA"/>
		<reference ref_id="815356" ref_url="https://bugzilla.suse.com/815356" source="BUGZILLA"/>
		<reference ref_id="815444" ref_url="https://bugzilla.suse.com/815444" source="BUGZILLA"/>
		<reference ref_id="815745" ref_url="https://bugzilla.suse.com/815745" source="BUGZILLA"/>
		<reference ref_id="816043" ref_url="https://bugzilla.suse.com/816043" source="BUGZILLA"/>
		<reference ref_id="816099" ref_url="https://bugzilla.suse.com/816099" source="BUGZILLA"/>
		<reference ref_id="816443" ref_url="https://bugzilla.suse.com/816443" source="BUGZILLA"/>
		<reference ref_id="816451" ref_url="https://bugzilla.suse.com/816451" source="BUGZILLA"/>
		<reference ref_id="816586" ref_url="https://bugzilla.suse.com/816586" source="BUGZILLA"/>
		<reference ref_id="816668" ref_url="https://bugzilla.suse.com/816668" source="BUGZILLA"/>
		<reference ref_id="816708" ref_url="https://bugzilla.suse.com/816708" source="BUGZILLA"/>
		<reference ref_id="817010" ref_url="https://bugzilla.suse.com/817010" source="BUGZILLA"/>
		<reference ref_id="817035" ref_url="https://bugzilla.suse.com/817035" source="BUGZILLA"/>
		<reference ref_id="817339" ref_url="https://bugzilla.suse.com/817339" source="BUGZILLA"/>
		<reference ref_id="817377" ref_url="https://bugzilla.suse.com/817377" source="BUGZILLA"/>
		<reference ref_id="818053" ref_url="https://bugzilla.suse.com/818053" source="BUGZILLA"/>
		<reference ref_id="818327" ref_url="https://bugzilla.suse.com/818327" source="BUGZILLA"/>
		<reference ref_id="818371" ref_url="https://bugzilla.suse.com/818371" source="BUGZILLA"/>
		<reference ref_id="818465" ref_url="https://bugzilla.suse.com/818465" source="BUGZILLA"/>
		<reference ref_id="818514" ref_url="https://bugzilla.suse.com/818514" source="BUGZILLA"/>
		<reference ref_id="818516" ref_url="https://bugzilla.suse.com/818516" source="BUGZILLA"/>
		<reference ref_id="818545" ref_url="https://bugzilla.suse.com/818545" source="BUGZILLA"/>
		<reference ref_id="818798" ref_url="https://bugzilla.suse.com/818798" source="BUGZILLA"/>
		<reference ref_id="819295" ref_url="https://bugzilla.suse.com/819295" source="BUGZILLA"/>
		<reference ref_id="819351" ref_url="https://bugzilla.suse.com/819351" source="BUGZILLA"/>
		<reference ref_id="819363" ref_url="https://bugzilla.suse.com/819363" source="BUGZILLA"/>
		<reference ref_id="819519" ref_url="https://bugzilla.suse.com/819519" source="BUGZILLA"/>
		<reference ref_id="819523" ref_url="https://bugzilla.suse.com/819523" source="BUGZILLA"/>
		<reference ref_id="819655" ref_url="https://bugzilla.suse.com/819655" source="BUGZILLA"/>
		<reference ref_id="819789" ref_url="https://bugzilla.suse.com/819789" source="BUGZILLA"/>
		<reference ref_id="819979" ref_url="https://bugzilla.suse.com/819979" source="BUGZILLA"/>
		<reference ref_id="820102" ref_url="https://bugzilla.suse.com/820102" source="BUGZILLA"/>
		<reference ref_id="820172" ref_url="https://bugzilla.suse.com/820172" source="BUGZILLA"/>
		<reference ref_id="820338" ref_url="https://bugzilla.suse.com/820338" source="BUGZILLA"/>
		<reference ref_id="820434" ref_url="https://bugzilla.suse.com/820434" source="BUGZILLA"/>
		<reference ref_id="820848" ref_url="https://bugzilla.suse.com/820848" source="BUGZILLA"/>
		<reference ref_id="821052" ref_url="https://bugzilla.suse.com/821052" source="BUGZILLA"/>
		<reference ref_id="821235" ref_url="https://bugzilla.suse.com/821235" source="BUGZILLA"/>
		<reference ref_id="821259" ref_url="https://bugzilla.suse.com/821259" source="BUGZILLA"/>
		<reference ref_id="821465" ref_url="https://bugzilla.suse.com/821465" source="BUGZILLA"/>
		<reference ref_id="821560" ref_url="https://bugzilla.suse.com/821560" source="BUGZILLA"/>
		<reference ref_id="821930" ref_url="https://bugzilla.suse.com/821930" source="BUGZILLA"/>
		<reference ref_id="821980" ref_url="https://bugzilla.suse.com/821980" source="BUGZILLA"/>
		<reference ref_id="822066" ref_url="https://bugzilla.suse.com/822066" source="BUGZILLA"/>
		<reference ref_id="822077" ref_url="https://bugzilla.suse.com/822077" source="BUGZILLA"/>
		<reference ref_id="822431" ref_url="https://bugzilla.suse.com/822431" source="BUGZILLA"/>
		<reference ref_id="822575" ref_url="https://bugzilla.suse.com/822575" source="BUGZILLA"/>
		<reference ref_id="822722" ref_url="https://bugzilla.suse.com/822722" source="BUGZILLA"/>
		<reference ref_id="822825" ref_url="https://bugzilla.suse.com/822825" source="BUGZILLA"/>
		<reference ref_id="823082" ref_url="https://bugzilla.suse.com/823082" source="BUGZILLA"/>
		<reference ref_id="823342" ref_url="https://bugzilla.suse.com/823342" source="BUGZILLA"/>
		<reference ref_id="823497" ref_url="https://bugzilla.suse.com/823497" source="BUGZILLA"/>
		<reference ref_id="823517" ref_url="https://bugzilla.suse.com/823517" source="BUGZILLA"/>
		<reference ref_id="823618" ref_url="https://bugzilla.suse.com/823618" source="BUGZILLA"/>
		<reference ref_id="824159" ref_url="https://bugzilla.suse.com/824159" source="BUGZILLA"/>
		<reference ref_id="824295" ref_url="https://bugzilla.suse.com/824295" source="BUGZILLA"/>
		<reference ref_id="824915" ref_url="https://bugzilla.suse.com/824915" source="BUGZILLA"/>
		<reference ref_id="825048" ref_url="https://bugzilla.suse.com/825048" source="BUGZILLA"/>
		<reference ref_id="825142" ref_url="https://bugzilla.suse.com/825142" source="BUGZILLA"/>
		<reference ref_id="825227" ref_url="https://bugzilla.suse.com/825227" source="BUGZILLA"/>
		<reference ref_id="825591" ref_url="https://bugzilla.suse.com/825591" source="BUGZILLA"/>
		<reference ref_id="825657" ref_url="https://bugzilla.suse.com/825657" source="BUGZILLA"/>
		<reference ref_id="825696" ref_url="https://bugzilla.suse.com/825696" source="BUGZILLA"/>
		<reference ref_id="825887" ref_url="https://bugzilla.suse.com/825887" source="BUGZILLA"/>
		<reference ref_id="825896" ref_url="https://bugzilla.suse.com/825896" source="BUGZILLA"/>
		<reference ref_id="826102" ref_url="https://bugzilla.suse.com/826102" source="BUGZILLA"/>
		<reference ref_id="826350" ref_url="https://bugzilla.suse.com/826350" source="BUGZILLA"/>
		<reference ref_id="826602" ref_url="https://bugzilla.suse.com/826602" source="BUGZILLA"/>
		<reference ref_id="826756" ref_url="https://bugzilla.suse.com/826756" source="BUGZILLA"/>
		<reference ref_id="826960" ref_url="https://bugzilla.suse.com/826960" source="BUGZILLA"/>
		<reference ref_id="827246" ref_url="https://bugzilla.suse.com/827246" source="BUGZILLA"/>
		<reference ref_id="827372" ref_url="https://bugzilla.suse.com/827372" source="BUGZILLA"/>
		<reference ref_id="827376" ref_url="https://bugzilla.suse.com/827376" source="BUGZILLA"/>
		<reference ref_id="827378" ref_url="https://bugzilla.suse.com/827378" source="BUGZILLA"/>
		<reference ref_id="827416" ref_url="https://bugzilla.suse.com/827416" source="BUGZILLA"/>
		<reference ref_id="827749" ref_url="https://bugzilla.suse.com/827749" source="BUGZILLA"/>
		<reference ref_id="827750" ref_url="https://bugzilla.suse.com/827750" source="BUGZILLA"/>
		<reference ref_id="827767" ref_url="https://bugzilla.suse.com/827767" source="BUGZILLA"/>
		<reference ref_id="828119" ref_url="https://bugzilla.suse.com/828119" source="BUGZILLA"/>
		<reference ref_id="828192" ref_url="https://bugzilla.suse.com/828192" source="BUGZILLA"/>
		<reference ref_id="828236" ref_url="https://bugzilla.suse.com/828236" source="BUGZILLA"/>
		<reference ref_id="828574" ref_url="https://bugzilla.suse.com/828574" source="BUGZILLA"/>
		<reference ref_id="828714" ref_url="https://bugzilla.suse.com/828714" source="BUGZILLA"/>
		<reference ref_id="828894" ref_url="https://bugzilla.suse.com/828894" source="BUGZILLA"/>
		<reference ref_id="829082" ref_url="https://bugzilla.suse.com/829082" source="BUGZILLA"/>
		<reference ref_id="829357" ref_url="https://bugzilla.suse.com/829357" source="BUGZILLA"/>
		<reference ref_id="829622" ref_url="https://bugzilla.suse.com/829622" source="BUGZILLA"/>
		<reference ref_id="829682" ref_url="https://bugzilla.suse.com/829682" source="BUGZILLA"/>
		<reference ref_id="830901" ref_url="https://bugzilla.suse.com/830901" source="BUGZILLA"/>
		<reference ref_id="831029" ref_url="https://bugzilla.suse.com/831029" source="BUGZILLA"/>
		<reference ref_id="831055" ref_url="https://bugzilla.suse.com/831055" source="BUGZILLA"/>
		<reference ref_id="831058" ref_url="https://bugzilla.suse.com/831058" source="BUGZILLA"/>
		<reference ref_id="831143" ref_url="https://bugzilla.suse.com/831143" source="BUGZILLA"/>
		<reference ref_id="831168" ref_url="https://bugzilla.suse.com/831168" source="BUGZILLA"/>
		<reference ref_id="831380" ref_url="https://bugzilla.suse.com/831380" source="BUGZILLA"/>
		<reference ref_id="831410" ref_url="https://bugzilla.suse.com/831410" source="BUGZILLA"/>
		<reference ref_id="831949" ref_url="https://bugzilla.suse.com/831949" source="BUGZILLA"/>
		<reference ref_id="832292" ref_url="https://bugzilla.suse.com/832292" source="BUGZILLA"/>
		<reference ref_id="833321" ref_url="https://bugzilla.suse.com/833321" source="BUGZILLA"/>
		<reference ref_id="833588" ref_url="https://bugzilla.suse.com/833588" source="BUGZILLA"/>
		<reference ref_id="833635" ref_url="https://bugzilla.suse.com/833635" source="BUGZILLA"/>
		<reference ref_id="833820" ref_url="https://bugzilla.suse.com/833820" source="BUGZILLA"/>
		<reference ref_id="833858" ref_url="https://bugzilla.suse.com/833858" source="BUGZILLA"/>
		<reference ref_id="834204" ref_url="https://bugzilla.suse.com/834204" source="BUGZILLA"/>
		<reference ref_id="834473" ref_url="https://bugzilla.suse.com/834473" source="BUGZILLA"/>
		<reference ref_id="834600" ref_url="https://bugzilla.suse.com/834600" source="BUGZILLA"/>
		<reference ref_id="834708" ref_url="https://bugzilla.suse.com/834708" source="BUGZILLA"/>
		<reference ref_id="834808" ref_url="https://bugzilla.suse.com/834808" source="BUGZILLA"/>
		<reference ref_id="834905" ref_url="https://bugzilla.suse.com/834905" source="BUGZILLA"/>
		<reference ref_id="835074" ref_url="https://bugzilla.suse.com/835074" source="BUGZILLA"/>
		<reference ref_id="835094" ref_url="https://bugzilla.suse.com/835094" source="BUGZILLA"/>
		<reference ref_id="835186" ref_url="https://bugzilla.suse.com/835186" source="BUGZILLA"/>
		<reference ref_id="835684" ref_url="https://bugzilla.suse.com/835684" source="BUGZILLA"/>
		<reference ref_id="835839" ref_url="https://bugzilla.suse.com/835839" source="BUGZILLA"/>
		<reference ref_id="835930" ref_url="https://bugzilla.suse.com/835930" source="BUGZILLA"/>
		<reference ref_id="836218" ref_url="https://bugzilla.suse.com/836218" source="BUGZILLA"/>
		<reference ref_id="836347" ref_url="https://bugzilla.suse.com/836347" source="BUGZILLA"/>
		<reference ref_id="836718" ref_url="https://bugzilla.suse.com/836718" source="BUGZILLA"/>
		<reference ref_id="836801" ref_url="https://bugzilla.suse.com/836801" source="BUGZILLA"/>
		<reference ref_id="837372" ref_url="https://bugzilla.suse.com/837372" source="BUGZILLA"/>
		<reference ref_id="837739" ref_url="https://bugzilla.suse.com/837739" source="BUGZILLA"/>
		<reference ref_id="837803" ref_url="https://bugzilla.suse.com/837803" source="BUGZILLA"/>
		<reference ref_id="838346" ref_url="https://bugzilla.suse.com/838346" source="BUGZILLA"/>
		<reference ref_id="838448" ref_url="https://bugzilla.suse.com/838448" source="BUGZILLA"/>
		<reference ref_id="838623" ref_url="https://bugzilla.suse.com/838623" source="BUGZILLA"/>
		<reference ref_id="839407" ref_url="https://bugzilla.suse.com/839407" source="BUGZILLA"/>
		<reference ref_id="840226" ref_url="https://bugzilla.suse.com/840226" source="BUGZILLA"/>
		<reference ref_id="840830" ref_url="https://bugzilla.suse.com/840830" source="BUGZILLA"/>
		<reference ref_id="841094" ref_url="https://bugzilla.suse.com/841094" source="BUGZILLA"/>
		<reference ref_id="841402" ref_url="https://bugzilla.suse.com/841402" source="BUGZILLA"/>
		<reference ref_id="841445" ref_url="https://bugzilla.suse.com/841445" source="BUGZILLA"/>
		<reference ref_id="841498" ref_url="https://bugzilla.suse.com/841498" source="BUGZILLA"/>
		<reference ref_id="842063" ref_url="https://bugzilla.suse.com/842063" source="BUGZILLA"/>
		<reference ref_id="842239" ref_url="https://bugzilla.suse.com/842239" source="BUGZILLA"/>
		<reference ref_id="842604" ref_url="https://bugzilla.suse.com/842604" source="BUGZILLA"/>
		<reference ref_id="843185" ref_url="https://bugzilla.suse.com/843185" source="BUGZILLA"/>
		<reference ref_id="843419" ref_url="https://bugzilla.suse.com/843419" source="BUGZILLA"/>
		<reference ref_id="843429" ref_url="https://bugzilla.suse.com/843429" source="BUGZILLA"/>
		<reference ref_id="843445" ref_url="https://bugzilla.suse.com/843445" source="BUGZILLA"/>
		<reference ref_id="843642" ref_url="https://bugzilla.suse.com/843642" source="BUGZILLA"/>
		<reference ref_id="843645" ref_url="https://bugzilla.suse.com/843645" source="BUGZILLA"/>
		<reference ref_id="844513" ref_url="https://bugzilla.suse.com/844513" source="BUGZILLA"/>
		<reference ref_id="845621" ref_url="https://bugzilla.suse.com/845621" source="BUGZILLA"/>
		<reference ref_id="845729" ref_url="https://bugzilla.suse.com/845729" source="BUGZILLA"/>
		<reference ref_id="846036" ref_url="https://bugzilla.suse.com/846036" source="BUGZILLA"/>
		<reference ref_id="846404" ref_url="https://bugzilla.suse.com/846404" source="BUGZILLA"/>
		<reference ref_id="846984" ref_url="https://bugzilla.suse.com/846984" source="BUGZILLA"/>
		<reference ref_id="847261" ref_url="https://bugzilla.suse.com/847261" source="BUGZILLA"/>
		<reference ref_id="847652" ref_url="https://bugzilla.suse.com/847652" source="BUGZILLA"/>
		<reference ref_id="847672" ref_url="https://bugzilla.suse.com/847672" source="BUGZILLA"/>
		<reference ref_id="848321" ref_url="https://bugzilla.suse.com/848321" source="BUGZILLA"/>
		<reference ref_id="848336" ref_url="https://bugzilla.suse.com/848336" source="BUGZILLA"/>
		<reference ref_id="848544" ref_url="https://bugzilla.suse.com/848544" source="BUGZILLA"/>
		<reference ref_id="848652" ref_url="https://bugzilla.suse.com/848652" source="BUGZILLA"/>
		<reference ref_id="849021" ref_url="https://bugzilla.suse.com/849021" source="BUGZILLA"/>
		<reference ref_id="849029" ref_url="https://bugzilla.suse.com/849029" source="BUGZILLA"/>
		<reference ref_id="849034" ref_url="https://bugzilla.suse.com/849034" source="BUGZILLA"/>
		<reference ref_id="849364" ref_url="https://bugzilla.suse.com/849364" source="BUGZILLA"/>
		<reference ref_id="849404" ref_url="https://bugzilla.suse.com/849404" source="BUGZILLA"/>
		<reference ref_id="849675" ref_url="https://bugzilla.suse.com/849675" source="BUGZILLA"/>
		<reference ref_id="849809" ref_url="https://bugzilla.suse.com/849809" source="BUGZILLA"/>
		<reference ref_id="849848" ref_url="https://bugzilla.suse.com/849848" source="BUGZILLA"/>
		<reference ref_id="849950" ref_url="https://bugzilla.suse.com/849950" source="BUGZILLA"/>
		<reference ref_id="850640" ref_url="https://bugzilla.suse.com/850640" source="BUGZILLA"/>
		<reference ref_id="851066" ref_url="https://bugzilla.suse.com/851066" source="BUGZILLA"/>
		<reference ref_id="851101" ref_url="https://bugzilla.suse.com/851101" source="BUGZILLA"/>
		<reference ref_id="851314" ref_url="https://bugzilla.suse.com/851314" source="BUGZILLA"/>
		<reference ref_id="851426" ref_url="https://bugzilla.suse.com/851426" source="BUGZILLA"/>
		<reference ref_id="852373" ref_url="https://bugzilla.suse.com/852373" source="BUGZILLA"/>
		<reference ref_id="852488" ref_url="https://bugzilla.suse.com/852488" source="BUGZILLA"/>
		<reference ref_id="852553" ref_url="https://bugzilla.suse.com/852553" source="BUGZILLA"/>
		<reference ref_id="852558" ref_url="https://bugzilla.suse.com/852558" source="BUGZILLA"/>
		<reference ref_id="852559" ref_url="https://bugzilla.suse.com/852559" source="BUGZILLA"/>
		<reference ref_id="852624" ref_url="https://bugzilla.suse.com/852624" source="BUGZILLA"/>
		<reference ref_id="852967" ref_url="https://bugzilla.suse.com/852967" source="BUGZILLA"/>
		<reference ref_id="853050" ref_url="https://bugzilla.suse.com/853050" source="BUGZILLA"/>
		<reference ref_id="853051" ref_url="https://bugzilla.suse.com/853051" source="BUGZILLA"/>
		<reference ref_id="853052" ref_url="https://bugzilla.suse.com/853052" source="BUGZILLA"/>
		<reference ref_id="853455" ref_url="https://bugzilla.suse.com/853455" source="BUGZILLA"/>
		<reference ref_id="854025" ref_url="https://bugzilla.suse.com/854025" source="BUGZILLA"/>
		<reference ref_id="854546" ref_url="https://bugzilla.suse.com/854546" source="BUGZILLA"/>
		<reference ref_id="854634" ref_url="https://bugzilla.suse.com/854634" source="BUGZILLA"/>
		<reference ref_id="854722" ref_url="https://bugzilla.suse.com/854722" source="BUGZILLA"/>
		<reference ref_id="855037" ref_url="https://bugzilla.suse.com/855037" source="BUGZILLA"/>
		<reference ref_id="855347" ref_url="https://bugzilla.suse.com/855347" source="BUGZILLA"/>
		<reference ref_id="855885" ref_url="https://bugzilla.suse.com/855885" source="BUGZILLA"/>
		<reference ref_id="856083" ref_url="https://bugzilla.suse.com/856083" source="BUGZILLA"/>
		<reference ref_id="857499" ref_url="https://bugzilla.suse.com/857499" source="BUGZILLA"/>
		<reference ref_id="857643" ref_url="https://bugzilla.suse.com/857643" source="BUGZILLA"/>
		<reference ref_id="858280" ref_url="https://bugzilla.suse.com/858280" source="BUGZILLA"/>
		<reference ref_id="858534" ref_url="https://bugzilla.suse.com/858534" source="BUGZILLA"/>
		<reference ref_id="858604" ref_url="https://bugzilla.suse.com/858604" source="BUGZILLA"/>
		<reference ref_id="858831" ref_url="https://bugzilla.suse.com/858831" source="BUGZILLA"/>
		<reference ref_id="858869" ref_url="https://bugzilla.suse.com/858869" source="BUGZILLA"/>
		<reference ref_id="858870" ref_url="https://bugzilla.suse.com/858870" source="BUGZILLA"/>
		<reference ref_id="858872" ref_url="https://bugzilla.suse.com/858872" source="BUGZILLA"/>
		<reference ref_id="862429" ref_url="https://bugzilla.suse.com/862429" source="BUGZILLA"/>
		<reference ref_id="863300" ref_url="https://bugzilla.suse.com/863300" source="BUGZILLA"/>
		<reference ref_id="863335" ref_url="https://bugzilla.suse.com/863335" source="BUGZILLA"/>
		<reference ref_id="864025" ref_url="https://bugzilla.suse.com/864025" source="BUGZILLA"/>
		<reference ref_id="864049" ref_url="https://bugzilla.suse.com/864049" source="BUGZILLA"/>
		<reference ref_id="864464" ref_url="https://bugzilla.suse.com/864464" source="BUGZILLA"/>
		<reference ref_id="864833" ref_url="https://bugzilla.suse.com/864833" source="BUGZILLA"/>
		<reference ref_id="865307" ref_url="https://bugzilla.suse.com/865307" source="BUGZILLA"/>
		<reference ref_id="865310" ref_url="https://bugzilla.suse.com/865310" source="BUGZILLA"/>
		<reference ref_id="865330" ref_url="https://bugzilla.suse.com/865330" source="BUGZILLA"/>
		<reference ref_id="865342" ref_url="https://bugzilla.suse.com/865342" source="BUGZILLA"/>
		<reference ref_id="865442" ref_url="https://bugzilla.suse.com/865442" source="BUGZILLA"/>
		<reference ref_id="865783" ref_url="https://bugzilla.suse.com/865783" source="BUGZILLA"/>
		<reference ref_id="866102" ref_url="https://bugzilla.suse.com/866102" source="BUGZILLA"/>
		<reference ref_id="866911" ref_url="https://bugzilla.suse.com/866911" source="BUGZILLA"/>
		<reference ref_id="867531" ref_url="https://bugzilla.suse.com/867531" source="BUGZILLA"/>
		<reference ref_id="867723" ref_url="https://bugzilla.suse.com/867723" source="BUGZILLA"/>
		<reference ref_id="867953" ref_url="https://bugzilla.suse.com/867953" source="BUGZILLA"/>
		<reference ref_id="868528" ref_url="https://bugzilla.suse.com/868528" source="BUGZILLA"/>
		<reference ref_id="868653" ref_url="https://bugzilla.suse.com/868653" source="BUGZILLA"/>
		<reference ref_id="869033" ref_url="https://bugzilla.suse.com/869033" source="BUGZILLA"/>
		<reference ref_id="869563" ref_url="https://bugzilla.suse.com/869563" source="BUGZILLA"/>
		<reference ref_id="870161" ref_url="https://bugzilla.suse.com/870161" source="BUGZILLA"/>
		<reference ref_id="870173" ref_url="https://bugzilla.suse.com/870173" source="BUGZILLA"/>
		<reference ref_id="870576" ref_url="https://bugzilla.suse.com/870576" source="BUGZILLA"/>
		<reference ref_id="870801" ref_url="https://bugzilla.suse.com/870801" source="BUGZILLA"/>
		<reference ref_id="871325" ref_url="https://bugzilla.suse.com/871325" source="BUGZILLA"/>
		<reference ref_id="871561" ref_url="https://bugzilla.suse.com/871561" source="BUGZILLA"/>
		<reference ref_id="871676" ref_url="https://bugzilla.suse.com/871676" source="BUGZILLA"/>
		<reference ref_id="871797" ref_url="https://bugzilla.suse.com/871797" source="BUGZILLA"/>
		<reference ref_id="871854" ref_url="https://bugzilla.suse.com/871854" source="BUGZILLA"/>
		<reference ref_id="871861" ref_url="https://bugzilla.suse.com/871861" source="BUGZILLA"/>
		<reference ref_id="872634" ref_url="https://bugzilla.suse.com/872634" source="BUGZILLA"/>
		<reference ref_id="873061" ref_url="https://bugzilla.suse.com/873061" source="BUGZILLA"/>
		<reference ref_id="873374" ref_url="https://bugzilla.suse.com/873374" source="BUGZILLA"/>
		<reference ref_id="874108" ref_url="https://bugzilla.suse.com/874108" source="BUGZILLA"/>
		<reference ref_id="875051" ref_url="https://bugzilla.suse.com/875051" source="BUGZILLA"/>
		<reference ref_id="875690" ref_url="https://bugzilla.suse.com/875690" source="BUGZILLA"/>
		<reference ref_id="875798" ref_url="https://bugzilla.suse.com/875798" source="BUGZILLA"/>
		<reference ref_id="876102" ref_url="https://bugzilla.suse.com/876102" source="BUGZILLA"/>
		<reference ref_id="876590" ref_url="https://bugzilla.suse.com/876590" source="BUGZILLA"/>
		<reference ref_id="876633" ref_url="https://bugzilla.suse.com/876633" source="BUGZILLA"/>
		<reference ref_id="877257" ref_url="https://bugzilla.suse.com/877257" source="BUGZILLA"/>
		<reference ref_id="877775" ref_url="https://bugzilla.suse.com/877775" source="BUGZILLA"/>
		<reference ref_id="878115" ref_url="https://bugzilla.suse.com/878115" source="BUGZILLA"/>
		<reference ref_id="878509" ref_url="https://bugzilla.suse.com/878509" source="BUGZILLA"/>
		<reference ref_id="879921" ref_url="https://bugzilla.suse.com/879921" source="BUGZILLA"/>
		<reference ref_id="880484" ref_url="https://bugzilla.suse.com/880484" source="BUGZILLA"/>
		<reference ref_id="880892" ref_url="https://bugzilla.suse.com/880892" source="BUGZILLA"/>
		<reference ref_id="881051" ref_url="https://bugzilla.suse.com/881051" source="BUGZILLA"/>
		<reference ref_id="882804" ref_url="https://bugzilla.suse.com/882804" source="BUGZILLA"/>
		<reference ref_id="883096" ref_url="https://bugzilla.suse.com/883096" source="BUGZILLA"/>
		<reference ref_id="883724" ref_url="https://bugzilla.suse.com/883724" source="BUGZILLA"/>
		<reference ref_id="883795" ref_url="https://bugzilla.suse.com/883795" source="BUGZILLA"/>
		<reference ref_id="883948" ref_url="https://bugzilla.suse.com/883948" source="BUGZILLA"/>
		<reference ref_id="885422" ref_url="https://bugzilla.suse.com/885422" source="BUGZILLA"/>
		<reference ref_id="885725" ref_url="https://bugzilla.suse.com/885725" source="BUGZILLA"/>
		<reference ref_id="886474" ref_url="https://bugzilla.suse.com/886474" source="BUGZILLA"/>
		<reference ref_id="887082" ref_url="https://bugzilla.suse.com/887082" source="BUGZILLA"/>
		<reference ref_id="889173" ref_url="https://bugzilla.suse.com/889173" source="BUGZILLA"/>
		<reference ref_id="889324" ref_url="https://bugzilla.suse.com/889324" source="BUGZILLA"/>
		<reference ref_id="892490" ref_url="https://bugzilla.suse.com/892490" source="BUGZILLA"/>
		<reference ref_id="892782" ref_url="https://bugzilla.suse.com/892782" source="BUGZILLA"/>
		<reference ref_id="895680" ref_url="https://bugzilla.suse.com/895680" source="BUGZILLA"/>
		<reference ref_id="896382" ref_url="https://bugzilla.suse.com/896382" source="BUGZILLA"/>
		<reference ref_id="896390" ref_url="https://bugzilla.suse.com/896390" source="BUGZILLA"/>
		<reference ref_id="896391" ref_url="https://bugzilla.suse.com/896391" source="BUGZILLA"/>
		<reference ref_id="896392" ref_url="https://bugzilla.suse.com/896392" source="BUGZILLA"/>
		<reference ref_id="897995" ref_url="https://bugzilla.suse.com/897995" source="BUGZILLA"/>
		<reference ref_id="898693" ref_url="https://bugzilla.suse.com/898693" source="BUGZILLA"/>
		<reference ref_id="899192" ref_url="https://bugzilla.suse.com/899192" source="BUGZILLA"/>
		<reference ref_id="901885" ref_url="https://bugzilla.suse.com/901885" source="BUGZILLA"/>
		<reference ref_id="902232" ref_url="https://bugzilla.suse.com/902232" source="BUGZILLA"/>
		<reference ref_id="902346" ref_url="https://bugzilla.suse.com/902346" source="BUGZILLA"/>
		<reference ref_id="902349" ref_url="https://bugzilla.suse.com/902349" source="BUGZILLA"/>
		<reference ref_id="902351" ref_url="https://bugzilla.suse.com/902351" source="BUGZILLA"/>
		<reference ref_id="902675" ref_url="https://bugzilla.suse.com/902675" source="BUGZILLA"/>
		<reference ref_id="903640" ref_url="https://bugzilla.suse.com/903640" source="BUGZILLA"/>
		<reference ref_id="904013" ref_url="https://bugzilla.suse.com/904013" source="BUGZILLA"/>
		<reference ref_id="904700" ref_url="https://bugzilla.suse.com/904700" source="BUGZILLA"/>
		<reference ref_id="905100" ref_url="https://bugzilla.suse.com/905100" source="BUGZILLA"/>
		<reference ref_id="905312" ref_url="https://bugzilla.suse.com/905312" source="BUGZILLA"/>
		<reference ref_id="905799" ref_url="https://bugzilla.suse.com/905799" source="BUGZILLA"/>
		<reference ref_id="906586" ref_url="https://bugzilla.suse.com/906586" source="BUGZILLA"/>
		<reference ref_id="907189" ref_url="https://bugzilla.suse.com/907189" source="BUGZILLA"/>
		<reference ref_id="907338" ref_url="https://bugzilla.suse.com/907338" source="BUGZILLA"/>
		<reference ref_id="907396" ref_url="https://bugzilla.suse.com/907396" source="BUGZILLA"/>
		<reference ref_id="907818" ref_url="https://bugzilla.suse.com/907818" source="BUGZILLA"/>
		<reference ref_id="909077" ref_url="https://bugzilla.suse.com/909077" source="BUGZILLA"/>
		<reference ref_id="909078" ref_url="https://bugzilla.suse.com/909078" source="BUGZILLA"/>
		<reference ref_id="910251" ref_url="https://bugzilla.suse.com/910251" source="BUGZILLA"/>
		<reference ref_id="912654" ref_url="https://bugzilla.suse.com/912654" source="BUGZILLA"/>
		<reference ref_id="912705" ref_url="https://bugzilla.suse.com/912705" source="BUGZILLA"/>
		<reference ref_id="915335" ref_url="https://bugzilla.suse.com/915335" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1083" ref_url="https://www.suse.com/security/cve/CVE-2011-1083/" source="CVE"/>
		<reference ref_id="CVE-2011-2494" ref_url="https://www.suse.com/security/cve/CVE-2011-2494/" source="CVE"/>
		<reference ref_id="CVE-2011-4086" ref_url="https://www.suse.com/security/cve/CVE-2011-4086/" source="CVE"/>
		<reference ref_id="CVE-2011-4127" ref_url="https://www.suse.com/security/cve/CVE-2011-4127/" source="CVE"/>
		<reference ref_id="CVE-2011-4131" ref_url="https://www.suse.com/security/cve/CVE-2011-4131/" source="CVE"/>
		<reference ref_id="CVE-2011-4132" ref_url="https://www.suse.com/security/cve/CVE-2011-4132/" source="CVE"/>
		<reference ref_id="CVE-2012-0957" ref_url="https://www.suse.com/security/cve/CVE-2012-0957/" source="CVE"/>
		<reference ref_id="CVE-2012-1097" ref_url="https://www.suse.com/security/cve/CVE-2012-1097/" source="CVE"/>
		<reference ref_id="CVE-2012-1146" ref_url="https://www.suse.com/security/cve/CVE-2012-1146/" source="CVE"/>
		<reference ref_id="CVE-2012-1179" ref_url="https://www.suse.com/security/cve/CVE-2012-1179/" source="CVE"/>
		<reference ref_id="CVE-2012-1601" ref_url="https://www.suse.com/security/cve/CVE-2012-1601/" source="CVE"/>
		<reference ref_id="CVE-2012-2119" ref_url="https://www.suse.com/security/cve/CVE-2012-2119/" source="CVE"/>
		<reference ref_id="CVE-2012-2127" ref_url="https://www.suse.com/security/cve/CVE-2012-2127/" source="CVE"/>
		<reference ref_id="CVE-2012-2133" ref_url="https://www.suse.com/security/cve/CVE-2012-2133/" source="CVE"/>
		<reference ref_id="CVE-2012-2136" ref_url="https://www.suse.com/security/cve/CVE-2012-2136/" source="CVE"/>
		<reference ref_id="CVE-2012-2137" ref_url="https://www.suse.com/security/cve/CVE-2012-2137/" source="CVE"/>
		<reference ref_id="CVE-2012-2313" ref_url="https://www.suse.com/security/cve/CVE-2012-2313/" source="CVE"/>
		<reference ref_id="CVE-2012-2319" ref_url="https://www.suse.com/security/cve/CVE-2012-2319/" source="CVE"/>
		<reference ref_id="CVE-2012-2372" ref_url="https://www.suse.com/security/cve/CVE-2012-2372/" source="CVE"/>
		<reference ref_id="CVE-2012-2373" ref_url="https://www.suse.com/security/cve/CVE-2012-2373/" source="CVE"/>
		<reference ref_id="CVE-2012-2375" ref_url="https://www.suse.com/security/cve/CVE-2012-2375/" source="CVE"/>
		<reference ref_id="CVE-2012-2390" ref_url="https://www.suse.com/security/cve/CVE-2012-2390/" source="CVE"/>
		<reference ref_id="CVE-2012-2745" ref_url="https://www.suse.com/security/cve/CVE-2012-2745/" source="CVE"/>
		<reference ref_id="CVE-2012-3375" ref_url="https://www.suse.com/security/cve/CVE-2012-3375/" source="CVE"/>
		<reference ref_id="CVE-2012-3400" ref_url="https://www.suse.com/security/cve/CVE-2012-3400/" source="CVE"/>
		<reference ref_id="CVE-2012-3412" ref_url="https://www.suse.com/security/cve/CVE-2012-3412/" source="CVE"/>
		<reference ref_id="CVE-2012-3430" ref_url="https://www.suse.com/security/cve/CVE-2012-3430/" source="CVE"/>
		<reference ref_id="CVE-2012-4398" ref_url="https://www.suse.com/security/cve/CVE-2012-4398/" source="CVE"/>
		<reference ref_id="CVE-2012-4461" ref_url="https://www.suse.com/security/cve/CVE-2012-4461/" source="CVE"/>
		<reference ref_id="CVE-2012-4508" ref_url="https://www.suse.com/security/cve/CVE-2012-4508/" source="CVE"/>
		<reference ref_id="CVE-2012-4530" ref_url="https://www.suse.com/security/cve/CVE-2012-4530/" source="CVE"/>
		<reference ref_id="CVE-2012-4565" ref_url="https://www.suse.com/security/cve/CVE-2012-4565/" source="CVE"/>
		<reference ref_id="CVE-2012-5517" ref_url="https://www.suse.com/security/cve/CVE-2012-5517/" source="CVE"/>
		<reference ref_id="CVE-2012-6548" ref_url="https://www.suse.com/security/cve/CVE-2012-6548/" source="CVE"/>
		<reference ref_id="CVE-2012-6549" ref_url="https://www.suse.com/security/cve/CVE-2012-6549/" source="CVE"/>
		<reference ref_id="CVE-2013-0160" ref_url="https://www.suse.com/security/cve/CVE-2013-0160/" source="CVE"/>
		<reference ref_id="CVE-2013-0216" ref_url="https://www.suse.com/security/cve/CVE-2013-0216/" source="CVE"/>
		<reference ref_id="CVE-2013-0231" ref_url="https://www.suse.com/security/cve/CVE-2013-0231/" source="CVE"/>
		<reference ref_id="CVE-2013-0268" ref_url="https://www.suse.com/security/cve/CVE-2013-0268/" source="CVE"/>
		<reference ref_id="CVE-2013-0311" ref_url="https://www.suse.com/security/cve/CVE-2013-0311/" source="CVE"/>
		<reference ref_id="CVE-2013-0349" ref_url="https://www.suse.com/security/cve/CVE-2013-0349/" source="CVE"/>
		<reference ref_id="CVE-2013-0871" ref_url="https://www.suse.com/security/cve/CVE-2013-0871/" source="CVE"/>
		<reference ref_id="CVE-2013-0913" ref_url="https://www.suse.com/security/cve/CVE-2013-0913/" source="CVE"/>
		<reference ref_id="CVE-2013-0914" ref_url="https://www.suse.com/security/cve/CVE-2013-0914/" source="CVE"/>
		<reference ref_id="CVE-2013-1059" ref_url="https://www.suse.com/security/cve/CVE-2013-1059/" source="CVE"/>
		<reference ref_id="CVE-2013-1767" ref_url="https://www.suse.com/security/cve/CVE-2013-1767/" source="CVE"/>
		<reference ref_id="CVE-2013-1772" ref_url="https://www.suse.com/security/cve/CVE-2013-1772/" source="CVE"/>
		<reference ref_id="CVE-2013-1774" ref_url="https://www.suse.com/security/cve/CVE-2013-1774/" source="CVE"/>
		<reference ref_id="CVE-2013-1792" ref_url="https://www.suse.com/security/cve/CVE-2013-1792/" source="CVE"/>
		<reference ref_id="CVE-2013-1796" ref_url="https://www.suse.com/security/cve/CVE-2013-1796/" source="CVE"/>
		<reference ref_id="CVE-2013-1797" ref_url="https://www.suse.com/security/cve/CVE-2013-1797/" source="CVE"/>
		<reference ref_id="CVE-2013-1798" ref_url="https://www.suse.com/security/cve/CVE-2013-1798/" source="CVE"/>
		<reference ref_id="CVE-2013-1819" ref_url="https://www.suse.com/security/cve/CVE-2013-1819/" source="CVE"/>
		<reference ref_id="CVE-2013-1848" ref_url="https://www.suse.com/security/cve/CVE-2013-1848/" source="CVE"/>
		<reference ref_id="CVE-2013-1860" ref_url="https://www.suse.com/security/cve/CVE-2013-1860/" source="CVE"/>
		<reference ref_id="CVE-2013-1929" ref_url="https://www.suse.com/security/cve/CVE-2013-1929/" source="CVE"/>
		<reference ref_id="CVE-2013-1979" ref_url="https://www.suse.com/security/cve/CVE-2013-1979/" source="CVE"/>
		<reference ref_id="CVE-2013-2094" ref_url="https://www.suse.com/security/cve/CVE-2013-2094/" source="CVE"/>
		<reference ref_id="CVE-2013-2148" ref_url="https://www.suse.com/security/cve/CVE-2013-2148/" source="CVE"/>
		<reference ref_id="CVE-2013-2164" ref_url="https://www.suse.com/security/cve/CVE-2013-2164/" source="CVE"/>
		<reference ref_id="CVE-2013-2206" ref_url="https://www.suse.com/security/cve/CVE-2013-2206/" source="CVE"/>
		<reference ref_id="CVE-2013-2232" ref_url="https://www.suse.com/security/cve/CVE-2013-2232/" source="CVE"/>
		<reference ref_id="CVE-2013-2234" ref_url="https://www.suse.com/security/cve/CVE-2013-2234/" source="CVE"/>
		<reference ref_id="CVE-2013-2237" ref_url="https://www.suse.com/security/cve/CVE-2013-2237/" source="CVE"/>
		<reference ref_id="CVE-2013-2634" ref_url="https://www.suse.com/security/cve/CVE-2013-2634/" source="CVE"/>
		<reference ref_id="CVE-2013-2635" ref_url="https://www.suse.com/security/cve/CVE-2013-2635/" source="CVE"/>
		<reference ref_id="CVE-2013-2850" ref_url="https://www.suse.com/security/cve/CVE-2013-2850/" source="CVE"/>
		<reference ref_id="CVE-2013-2851" ref_url="https://www.suse.com/security/cve/CVE-2013-2851/" source="CVE"/>
		<reference ref_id="CVE-2013-2893" ref_url="https://www.suse.com/security/cve/CVE-2013-2893/" source="CVE"/>
		<reference ref_id="CVE-2013-2897" ref_url="https://www.suse.com/security/cve/CVE-2013-2897/" source="CVE"/>
		<reference ref_id="CVE-2013-2899" ref_url="https://www.suse.com/security/cve/CVE-2013-2899/" source="CVE"/>
		<reference ref_id="CVE-2013-2929" ref_url="https://www.suse.com/security/cve/CVE-2013-2929/" source="CVE"/>
		<reference ref_id="CVE-2013-3076" ref_url="https://www.suse.com/security/cve/CVE-2013-3076/" source="CVE"/>
		<reference ref_id="CVE-2013-3222" ref_url="https://www.suse.com/security/cve/CVE-2013-3222/" source="CVE"/>
		<reference ref_id="CVE-2013-3223" ref_url="https://www.suse.com/security/cve/CVE-2013-3223/" source="CVE"/>
		<reference ref_id="CVE-2013-3224" ref_url="https://www.suse.com/security/cve/CVE-2013-3224/" source="CVE"/>
		<reference ref_id="CVE-2013-3225" ref_url="https://www.suse.com/security/cve/CVE-2013-3225/" source="CVE"/>
		<reference ref_id="CVE-2013-3227" ref_url="https://www.suse.com/security/cve/CVE-2013-3227/" source="CVE"/>
		<reference ref_id="CVE-2013-3228" ref_url="https://www.suse.com/security/cve/CVE-2013-3228/" source="CVE"/>
		<reference ref_id="CVE-2013-3229" ref_url="https://www.suse.com/security/cve/CVE-2013-3229/" source="CVE"/>
		<reference ref_id="CVE-2013-3231" ref_url="https://www.suse.com/security/cve/CVE-2013-3231/" source="CVE"/>
		<reference ref_id="CVE-2013-3232" ref_url="https://www.suse.com/security/cve/CVE-2013-3232/" source="CVE"/>
		<reference ref_id="CVE-2013-3234" ref_url="https://www.suse.com/security/cve/CVE-2013-3234/" source="CVE"/>
		<reference ref_id="CVE-2013-3235" ref_url="https://www.suse.com/security/cve/CVE-2013-3235/" source="CVE"/>
		<reference ref_id="CVE-2013-4162" ref_url="https://www.suse.com/security/cve/CVE-2013-4162/" source="CVE"/>
		<reference ref_id="CVE-2013-4163" ref_url="https://www.suse.com/security/cve/CVE-2013-4163/" source="CVE"/>
		<reference ref_id="CVE-2013-4299" ref_url="https://www.suse.com/security/cve/CVE-2013-4299/" source="CVE"/>
		<reference ref_id="CVE-2013-4345" ref_url="https://www.suse.com/security/cve/CVE-2013-4345/" source="CVE"/>
		<reference ref_id="CVE-2013-4470" ref_url="https://www.suse.com/security/cve/CVE-2013-4470/" source="CVE"/>
		<reference ref_id="CVE-2013-4483" ref_url="https://www.suse.com/security/cve/CVE-2013-4483/" source="CVE"/>
		<reference ref_id="CVE-2013-4511" ref_url="https://www.suse.com/security/cve/CVE-2013-4511/" source="CVE"/>
		<reference ref_id="CVE-2013-4514" ref_url="https://www.suse.com/security/cve/CVE-2013-4514/" source="CVE"/>
		<reference ref_id="CVE-2013-4515" ref_url="https://www.suse.com/security/cve/CVE-2013-4515/" source="CVE"/>
		<reference ref_id="CVE-2013-4579" ref_url="https://www.suse.com/security/cve/CVE-2013-4579/" source="CVE"/>
		<reference ref_id="CVE-2013-4587" ref_url="https://www.suse.com/security/cve/CVE-2013-4587/" source="CVE"/>
		<reference ref_id="CVE-2013-4592" ref_url="https://www.suse.com/security/cve/CVE-2013-4592/" source="CVE"/>
		<reference ref_id="CVE-2013-6367" ref_url="https://www.suse.com/security/cve/CVE-2013-6367/" source="CVE"/>
		<reference ref_id="CVE-2013-6368" ref_url="https://www.suse.com/security/cve/CVE-2013-6368/" source="CVE"/>
		<reference ref_id="CVE-2013-6378" ref_url="https://www.suse.com/security/cve/CVE-2013-6378/" source="CVE"/>
		<reference ref_id="CVE-2013-6380" ref_url="https://www.suse.com/security/cve/CVE-2013-6380/" source="CVE"/>
		<reference ref_id="CVE-2013-6382" ref_url="https://www.suse.com/security/cve/CVE-2013-6382/" source="CVE"/>
		<reference ref_id="CVE-2013-6383" ref_url="https://www.suse.com/security/cve/CVE-2013-6383/" source="CVE"/>
		<reference ref_id="CVE-2013-6463" ref_url="https://www.suse.com/security/cve/CVE-2013-6463/" source="CVE"/>
		<reference ref_id="CVE-2013-6885" ref_url="https://www.suse.com/security/cve/CVE-2013-6885/" source="CVE"/>
		<reference ref_id="CVE-2013-7027" ref_url="https://www.suse.com/security/cve/CVE-2013-7027/" source="CVE"/>
		<reference ref_id="CVE-2013-7263" ref_url="https://www.suse.com/security/cve/CVE-2013-7263/" source="CVE"/>
		<reference ref_id="CVE-2013-7264" ref_url="https://www.suse.com/security/cve/CVE-2013-7264/" source="CVE"/>
		<reference ref_id="CVE-2013-7265" ref_url="https://www.suse.com/security/cve/CVE-2013-7265/" source="CVE"/>
		<reference ref_id="CVE-2013-7339" ref_url="https://www.suse.com/security/cve/CVE-2013-7339/" source="CVE"/>
		<reference ref_id="CVE-2014-0055" ref_url="https://www.suse.com/security/cve/CVE-2014-0055/" source="CVE"/>
		<reference ref_id="CVE-2014-0069" ref_url="https://www.suse.com/security/cve/CVE-2014-0069/" source="CVE"/>
		<reference ref_id="CVE-2014-0077" ref_url="https://www.suse.com/security/cve/CVE-2014-0077/" source="CVE"/>
		<reference ref_id="CVE-2014-0101" ref_url="https://www.suse.com/security/cve/CVE-2014-0101/" source="CVE"/>
		<reference ref_id="CVE-2014-0131" ref_url="https://www.suse.com/security/cve/CVE-2014-0131/" source="CVE"/>
		<reference ref_id="CVE-2014-0181" ref_url="https://www.suse.com/security/cve/CVE-2014-0181/" source="CVE"/>
		<reference ref_id="CVE-2014-0196" ref_url="https://www.suse.com/security/cve/CVE-2014-0196/" source="CVE"/>
		<reference ref_id="CVE-2014-1444" ref_url="https://www.suse.com/security/cve/CVE-2014-1444/" source="CVE"/>
		<reference ref_id="CVE-2014-1445" ref_url="https://www.suse.com/security/cve/CVE-2014-1445/" source="CVE"/>
		<reference ref_id="CVE-2014-1446" ref_url="https://www.suse.com/security/cve/CVE-2014-1446/" source="CVE"/>
		<reference ref_id="CVE-2014-1737" ref_url="https://www.suse.com/security/cve/CVE-2014-1737/" source="CVE"/>
		<reference ref_id="CVE-2014-1738" ref_url="https://www.suse.com/security/cve/CVE-2014-1738/" source="CVE"/>
		<reference ref_id="CVE-2014-1739" ref_url="https://www.suse.com/security/cve/CVE-2014-1739/" source="CVE"/>
		<reference ref_id="CVE-2014-1874" ref_url="https://www.suse.com/security/cve/CVE-2014-1874/" source="CVE"/>
		<reference ref_id="CVE-2014-2039" ref_url="https://www.suse.com/security/cve/CVE-2014-2039/" source="CVE"/>
		<reference ref_id="CVE-2014-2309" ref_url="https://www.suse.com/security/cve/CVE-2014-2309/" source="CVE"/>
		<reference ref_id="CVE-2014-2523" ref_url="https://www.suse.com/security/cve/CVE-2014-2523/" source="CVE"/>
		<reference ref_id="CVE-2014-2678" ref_url="https://www.suse.com/security/cve/CVE-2014-2678/" source="CVE"/>
		<reference ref_id="CVE-2014-2706" ref_url="https://www.suse.com/security/cve/CVE-2014-2706/" source="CVE"/>
		<reference ref_id="CVE-2014-2851" ref_url="https://www.suse.com/security/cve/CVE-2014-2851/" source="CVE"/>
		<reference ref_id="CVE-2014-3122" ref_url="https://www.suse.com/security/cve/CVE-2014-3122/" source="CVE"/>
		<reference ref_id="CVE-2014-3144" ref_url="https://www.suse.com/security/cve/CVE-2014-3144/" source="CVE"/>
		<reference ref_id="CVE-2014-3145" ref_url="https://www.suse.com/security/cve/CVE-2014-3145/" source="CVE"/>
		<reference ref_id="CVE-2014-3153" ref_url="https://www.suse.com/security/cve/CVE-2014-3153/" source="CVE"/>
		<reference ref_id="CVE-2014-3181" ref_url="https://www.suse.com/security/cve/CVE-2014-3181/" source="CVE"/>
		<reference ref_id="CVE-2014-3184" ref_url="https://www.suse.com/security/cve/CVE-2014-3184/" source="CVE"/>
		<reference ref_id="CVE-2014-3185" ref_url="https://www.suse.com/security/cve/CVE-2014-3185/" source="CVE"/>
		<reference ref_id="CVE-2014-3186" ref_url="https://www.suse.com/security/cve/CVE-2014-3186/" source="CVE"/>
		<reference ref_id="CVE-2014-3601" ref_url="https://www.suse.com/security/cve/CVE-2014-3601/" source="CVE"/>
		<reference ref_id="CVE-2014-3610" ref_url="https://www.suse.com/security/cve/CVE-2014-3610/" source="CVE"/>
		<reference ref_id="CVE-2014-3646" ref_url="https://www.suse.com/security/cve/CVE-2014-3646/" source="CVE"/>
		<reference ref_id="CVE-2014-3647" ref_url="https://www.suse.com/security/cve/CVE-2014-3647/" source="CVE"/>
		<reference ref_id="CVE-2014-3673" ref_url="https://www.suse.com/security/cve/CVE-2014-3673/" source="CVE"/>
		<reference ref_id="CVE-2014-3687" ref_url="https://www.suse.com/security/cve/CVE-2014-3687/" source="CVE"/>
		<reference ref_id="CVE-2014-3688" ref_url="https://www.suse.com/security/cve/CVE-2014-3688/" source="CVE"/>
		<reference ref_id="CVE-2014-3690" ref_url="https://www.suse.com/security/cve/CVE-2014-3690/" source="CVE"/>
		<reference ref_id="CVE-2014-3917" ref_url="https://www.suse.com/security/cve/CVE-2014-3917/" source="CVE"/>
		<reference ref_id="CVE-2014-4508" ref_url="https://www.suse.com/security/cve/CVE-2014-4508/" source="CVE"/>
		<reference ref_id="CVE-2014-4608" ref_url="https://www.suse.com/security/cve/CVE-2014-4608/" source="CVE"/>
		<reference ref_id="CVE-2014-4652" ref_url="https://www.suse.com/security/cve/CVE-2014-4652/" source="CVE"/>
		<reference ref_id="CVE-2014-4653" ref_url="https://www.suse.com/security/cve/CVE-2014-4653/" source="CVE"/>
		<reference ref_id="CVE-2014-4654" ref_url="https://www.suse.com/security/cve/CVE-2014-4654/" source="CVE"/>
		<reference ref_id="CVE-2014-4655" ref_url="https://www.suse.com/security/cve/CVE-2014-4655/" source="CVE"/>
		<reference ref_id="CVE-2014-4656" ref_url="https://www.suse.com/security/cve/CVE-2014-4656/" source="CVE"/>
		<reference ref_id="CVE-2014-4667" ref_url="https://www.suse.com/security/cve/CVE-2014-4667/" source="CVE"/>
		<reference ref_id="CVE-2014-4699" ref_url="https://www.suse.com/security/cve/CVE-2014-4699/" source="CVE"/>
		<reference ref_id="CVE-2014-4943" ref_url="https://www.suse.com/security/cve/CVE-2014-4943/" source="CVE"/>
		<reference ref_id="CVE-2014-5077" ref_url="https://www.suse.com/security/cve/CVE-2014-5077/" source="CVE"/>
		<reference ref_id="CVE-2014-5471" ref_url="https://www.suse.com/security/cve/CVE-2014-5471/" source="CVE"/>
		<reference ref_id="CVE-2014-5472" ref_url="https://www.suse.com/security/cve/CVE-2014-5472/" source="CVE"/>
		<reference ref_id="CVE-2014-7826" ref_url="https://www.suse.com/security/cve/CVE-2014-7826/" source="CVE"/>
		<reference ref_id="CVE-2014-7841" ref_url="https://www.suse.com/security/cve/CVE-2014-7841/" source="CVE"/>
		<reference ref_id="CVE-2014-7842" ref_url="https://www.suse.com/security/cve/CVE-2014-7842/" source="CVE"/>
		<reference ref_id="CVE-2014-8133" ref_url="https://www.suse.com/security/cve/CVE-2014-8133/" source="CVE"/>
		<reference ref_id="CVE-2014-8134" ref_url="https://www.suse.com/security/cve/CVE-2014-8134/" source="CVE"/>
		<reference ref_id="CVE-2014-8369" ref_url="https://www.suse.com/security/cve/CVE-2014-8369/" source="CVE"/>
		<reference ref_id="CVE-2014-8559" ref_url="https://www.suse.com/security/cve/CVE-2014-8559/" source="CVE"/>
		<reference ref_id="CVE-2014-8709" ref_url="https://www.suse.com/security/cve/CVE-2014-8709/" source="CVE"/>
		<reference ref_id="CVE-2014-9090" ref_url="https://www.suse.com/security/cve/CVE-2014-9090/" source="CVE"/>
		<reference ref_id="CVE-2014-9322" ref_url="https://www.suse.com/security/cve/CVE-2014-9322/" source="CVE"/>
		<reference ref_id="CVE-2014-9584" ref_url="https://www.suse.com/security/cve/CVE-2014-9584/" source="CVE"/>
		<reference ref_id="CVE-2014-9585" ref_url="https://www.suse.com/security/cve/CVE-2014-9585/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 Service Pack 2 kernel was updated to fix a 
regression introduced by the previous update:

    * scsi_dh_alua: Incorrect reference counting in the SCSI ALUA
      initialization code lead to system crashes on boot (bnc#858831).

As the update introducing the regression was marked security, this is also 
marked security even though this bug is not security relevant.

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-05"/>
	<updated date="2014-02-05"/>
	<bugzilla href="https://bugzilla.suse.com/556135">SUSE bug 556135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/578046">SUSE bug 578046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/624072">SUSE bug 624072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/651219">SUSE bug 651219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/676204">SUSE bug 676204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/688996">SUSE bug 688996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698102">SUSE bug 698102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703156">SUSE bug 703156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704280">SUSE bug 704280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/705551">SUSE bug 705551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/708296">SUSE bug 708296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/708836">SUSE bug 708836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/713148">SUSE bug 713148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/714604">SUSE bug 714604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/715635">SUSE bug 715635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/716850">SUSE bug 716850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/716971">SUSE bug 716971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/718521">SUSE bug 718521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/718863">SUSE bug 718863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/718910">SUSE bug 718910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/718918">SUSE bug 718918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/720946">SUSE bug 720946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/721587">SUSE bug 721587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/721857">SUSE bug 721857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/722398">SUSE bug 722398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/722560">SUSE bug 722560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/723776">SUSE bug 723776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/725152">SUSE bug 725152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/725355">SUSE bug 725355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/725592">SUSE bug 725592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/728840">SUSE bug 728840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/729247">SUSE bug 729247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/729854">SUSE bug 729854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/730117">SUSE bug 730117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/730118">SUSE bug 730118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/730660">SUSE bug 730660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/731035">SUSE bug 731035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/731387">SUSE bug 731387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/731739">SUSE bug 731739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/732070">SUSE bug 732070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/732296">SUSE bug 732296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/732908">SUSE bug 732908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/733761">SUSE bug 733761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/734900">SUSE bug 734900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/735909">SUSE bug 735909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/736149">SUSE bug 736149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/736255">SUSE bug 736255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/736697">SUSE bug 736697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/738210">SUSE bug 738210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/738284">SUSE bug 738284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/738528">SUSE bug 738528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/738583">SUSE bug 738583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/738597">SUSE bug 738597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/738644">SUSE bug 738644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/738679">SUSE bug 738679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/739728">SUSE bug 739728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/739837">SUSE bug 739837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/740180">SUSE bug 740180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/740291">SUSE bug 740291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/741814">SUSE bug 741814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/741824">SUSE bug 741824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742845">SUSE bug 742845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742871">SUSE bug 742871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/743232">SUSE bug 743232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/743579">SUSE bug 743579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744198">SUSE bug 744198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744314">SUSE bug 744314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744315">SUSE bug 744315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744392">SUSE bug 744392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744404">SUSE bug 744404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744655">SUSE bug 744655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744658">SUSE bug 744658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744692">SUSE bug 744692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744758">SUSE bug 744758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744795">SUSE bug 744795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745088">SUSE bug 745088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745400">SUSE bug 745400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745422">SUSE bug 745422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745424">SUSE bug 745424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745640">SUSE bug 745640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745741">SUSE bug 745741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745832">SUSE bug 745832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745867">SUSE bug 745867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745876">SUSE bug 745876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745929">SUSE bug 745929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746373">SUSE bug 746373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746454">SUSE bug 746454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746500">SUSE bug 746500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746509">SUSE bug 746509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746526">SUSE bug 746526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746579">SUSE bug 746579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746717">SUSE bug 746717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746883">SUSE bug 746883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746938">SUSE bug 746938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747071">SUSE bug 747071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747159">SUSE bug 747159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747404">SUSE bug 747404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747867">SUSE bug 747867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747878">SUSE bug 747878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747944">SUSE bug 747944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748112">SUSE bug 748112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748384">SUSE bug 748384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748456">SUSE bug 748456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748463">SUSE bug 748463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748629">SUSE bug 748629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748632">SUSE bug 748632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748806">SUSE bug 748806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748827">SUSE bug 748827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748854">SUSE bug 748854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748859">SUSE bug 748859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748862">SUSE bug 748862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748896">SUSE bug 748896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749049">SUSE bug 749049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749115">SUSE bug 749115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749291">SUSE bug 749291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749417">SUSE bug 749417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749543">SUSE bug 749543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749569">SUSE bug 749569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749651">SUSE bug 749651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749787">SUSE bug 749787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749980">SUSE bug 749980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750041">SUSE bug 750041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750079">SUSE bug 750079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750173">SUSE bug 750173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750402">SUSE bug 750402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750426">SUSE bug 750426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750459">SUSE bug 750459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750959">SUSE bug 750959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750995">SUSE bug 750995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751015">SUSE bug 751015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751171">SUSE bug 751171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751322">SUSE bug 751322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751550">SUSE bug 751550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751743">SUSE bug 751743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751885">SUSE bug 751885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751903">SUSE bug 751903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751916">SUSE bug 751916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752022">SUSE bug 752022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752067">SUSE bug 752067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752352">SUSE bug 752352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752408">SUSE bug 752408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752484">SUSE bug 752484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752544">SUSE bug 752544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752599">SUSE bug 752599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752634">SUSE bug 752634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752972">SUSE bug 752972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/753172">SUSE bug 753172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/753353">SUSE bug 753353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/753371">SUSE bug 753371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/753617">SUSE bug 753617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/753698">SUSE bug 753698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754052">SUSE bug 754052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754085">SUSE bug 754085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754391">SUSE bug 754391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754428">SUSE bug 754428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754583">SUSE bug 754583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754670">SUSE bug 754670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754690">SUSE bug 754690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754898">SUSE bug 754898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754969">SUSE bug 754969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/755178">SUSE bug 755178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/755537">SUSE bug 755537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/755546">SUSE bug 755546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/755620">SUSE bug 755620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/755758">SUSE bug 755758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/755812">SUSE bug 755812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/756050">SUSE bug 756050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/756236">SUSE bug 756236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/756276">SUSE bug 756276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/756585">SUSE bug 756585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/756821">SUSE bug 756821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/756840">SUSE bug 756840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/756940">SUSE bug 756940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757059">SUSE bug 757059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757077">SUSE bug 757077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757202">SUSE bug 757202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757205">SUSE bug 757205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757289">SUSE bug 757289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757315">SUSE bug 757315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757373">SUSE bug 757373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757517">SUSE bug 757517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757565">SUSE bug 757565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757719">SUSE bug 757719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757783">SUSE bug 757783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757789">SUSE bug 757789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757950">SUSE bug 757950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758040">SUSE bug 758040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758104">SUSE bug 758104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758243">SUSE bug 758243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758279">SUSE bug 758279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758532">SUSE bug 758532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758540">SUSE bug 758540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758703">SUSE bug 758703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758731">SUSE bug 758731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758813">SUSE bug 758813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758833">SUSE bug 758833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759336">SUSE bug 759336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759340">SUSE bug 759340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759539">SUSE bug 759539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759541">SUSE bug 759541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759545">SUSE bug 759545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759657">SUSE bug 759657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759805">SUSE bug 759805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759908">SUSE bug 759908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759971">SUSE bug 759971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760015">SUSE bug 760015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760237">SUSE bug 760237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760279">SUSE bug 760279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760346">SUSE bug 760346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760407">SUSE bug 760407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760806">SUSE bug 760806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760833">SUSE bug 760833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760974">SUSE bug 760974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761087">SUSE bug 761087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761158">SUSE bug 761158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761245">SUSE bug 761245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761387">SUSE bug 761387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761772">SUSE bug 761772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761774">SUSE bug 761774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761775">SUSE bug 761775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761849">SUSE bug 761849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762099">SUSE bug 762099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762158">SUSE bug 762158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762214">SUSE bug 762214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762259">SUSE bug 762259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762285">SUSE bug 762285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762329">SUSE bug 762329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762366">SUSE bug 762366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762414">SUSE bug 762414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762424">SUSE bug 762424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762693">SUSE bug 762693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762991">SUSE bug 762991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762992">SUSE bug 762992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763026">SUSE bug 763026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763198">SUSE bug 763198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763267">SUSE bug 763267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763307">SUSE bug 763307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763463">SUSE bug 763463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763485">SUSE bug 763485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763494">SUSE bug 763494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763628">SUSE bug 763628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763654">SUSE bug 763654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763717">SUSE bug 763717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763754">SUSE bug 763754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763858">SUSE bug 763858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763954">SUSE bug 763954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763968">SUSE bug 763968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/764091">SUSE bug 764091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/764150">SUSE bug 764150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/764209">SUSE bug 764209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/764339">SUSE bug 764339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/764500">SUSE bug 764500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/764900">SUSE bug 764900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/765102">SUSE bug 765102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/765253">SUSE bug 765253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/765320">SUSE bug 765320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/765523">SUSE bug 765523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/765524">SUSE bug 765524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/766027">SUSE bug 766027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/766156">SUSE bug 766156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/766410">SUSE bug 766410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/766445">SUSE bug 766445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/766654">SUSE bug 766654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/766733">SUSE bug 766733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767281">SUSE bug 767281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767469">SUSE bug 767469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767610">SUSE bug 767610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767612">SUSE bug 767612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767684">SUSE bug 767684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767983">SUSE bug 767983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/768052">SUSE bug 768052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/768084">SUSE bug 768084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/768470">SUSE bug 768470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/768504">SUSE bug 768504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/768632">SUSE bug 768632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769035">SUSE bug 769035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769195">SUSE bug 769195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769251">SUSE bug 769251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769407">SUSE bug 769407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769644">SUSE bug 769644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769685">SUSE bug 769685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769784">SUSE bug 769784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769896">SUSE bug 769896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770034">SUSE bug 770034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770238">SUSE bug 770238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770269">SUSE bug 770269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770695">SUSE bug 770695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770763">SUSE bug 770763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/771102">SUSE bug 771102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/771242">SUSE bug 771242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/771361">SUSE bug 771361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/771398">SUSE bug 771398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/771428">SUSE bug 771428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/771619">SUSE bug 771619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/771706">SUSE bug 771706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/771778">SUSE bug 771778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772407">SUSE bug 772407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772420">SUSE bug 772420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772427">SUSE bug 772427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772454">SUSE bug 772454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772473">SUSE bug 772473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772483">SUSE bug 772483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772566">SUSE bug 772566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772786">SUSE bug 772786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772831">SUSE bug 772831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772893">SUSE bug 772893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773006">SUSE bug 773006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773007">SUSE bug 773007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773251">SUSE bug 773251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773255">SUSE bug 773255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773267">SUSE bug 773267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773319">SUSE bug 773319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773320">SUSE bug 773320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773383">SUSE bug 773383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773406">SUSE bug 773406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773487">SUSE bug 773487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773577">SUSE bug 773577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773606">SUSE bug 773606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773688">SUSE bug 773688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773699">SUSE bug 773699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773831">SUSE bug 773831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773837">SUSE bug 773837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773878">SUSE bug 773878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774073">SUSE bug 774073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774285">SUSE bug 774285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774289">SUSE bug 774289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774500">SUSE bug 774500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774523">SUSE bug 774523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774612">SUSE bug 774612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774859">SUSE bug 774859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774902">SUSE bug 774902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774964">SUSE bug 774964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774973">SUSE bug 774973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775182">SUSE bug 775182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775373">SUSE bug 775373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775394">SUSE bug 775394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775577">SUSE bug 775577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775685">SUSE bug 775685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775984">SUSE bug 775984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776019">SUSE bug 776019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776044">SUSE bug 776044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776081">SUSE bug 776081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776095">SUSE bug 776095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776127">SUSE bug 776127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776144">SUSE bug 776144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776787">SUSE bug 776787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776896">SUSE bug 776896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777024">SUSE bug 777024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777269">SUSE bug 777269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777283">SUSE bug 777283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777616">SUSE bug 777616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777746">SUSE bug 777746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778082">SUSE bug 778082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778136">SUSE bug 778136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778334">SUSE bug 778334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778630">SUSE bug 778630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778822">SUSE bug 778822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779294">SUSE bug 779294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779330">SUSE bug 779330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779461">SUSE bug 779461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779462">SUSE bug 779462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779488">SUSE bug 779488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779577">SUSE bug 779577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779699">SUSE bug 779699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779750">SUSE bug 779750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779969">SUSE bug 779969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780008">SUSE bug 780008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780012">SUSE bug 780012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780216">SUSE bug 780216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780461">SUSE bug 780461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780876">SUSE bug 780876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780977">SUSE bug 780977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/781018">SUSE bug 781018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/781134">SUSE bug 781134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/781327">SUSE bug 781327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/781484">SUSE bug 781484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/781574">SUSE bug 781574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/782369">SUSE bug 782369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/782721">SUSE bug 782721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/783475">SUSE bug 783475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/783515">SUSE bug 783515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/783965">SUSE bug 783965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784192">SUSE bug 784192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784334">SUSE bug 784334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784576">SUSE bug 784576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785100">SUSE bug 785100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785496">SUSE bug 785496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785554">SUSE bug 785554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785851">SUSE bug 785851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785901">SUSE bug 785901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786013">SUSE bug 786013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786150">SUSE bug 786150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786814">SUSE bug 786814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786900">SUSE bug 786900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786976">SUSE bug 786976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787168">SUSE bug 787168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787202">SUSE bug 787202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787348">SUSE bug 787348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787576">SUSE bug 787576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787821">SUSE bug 787821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787843">SUSE bug 787843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787848">SUSE bug 787848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788277">SUSE bug 788277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788452">SUSE bug 788452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788590">SUSE bug 788590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788826">SUSE bug 788826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789010">SUSE bug 789010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789115">SUSE bug 789115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789235">SUSE bug 789235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789311">SUSE bug 789311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789359">SUSE bug 789359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789648">SUSE bug 789648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789703">SUSE bug 789703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789836">SUSE bug 789836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789993">SUSE bug 789993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/790457">SUSE bug 790457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/790498">SUSE bug 790498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/790867">SUSE bug 790867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/790920">SUSE bug 790920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/790935">SUSE bug 790935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791498">SUSE bug 791498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791853">SUSE bug 791853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791904">SUSE bug 791904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792270">SUSE bug 792270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792500">SUSE bug 792500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792584">SUSE bug 792584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792656">SUSE bug 792656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792674">SUSE bug 792674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792793">SUSE bug 792793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792834">SUSE bug 792834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/793104">SUSE bug 793104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/793139">SUSE bug 793139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/793593">SUSE bug 793593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/793671">SUSE bug 793671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/794231">SUSE bug 794231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/794513">SUSE bug 794513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/794529">SUSE bug 794529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/794805">SUSE bug 794805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/794824">SUSE bug 794824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795269">SUSE bug 795269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795354">SUSE bug 795354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795928">SUSE bug 795928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795957">SUSE bug 795957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795961">SUSE bug 795961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796412">SUSE bug 796412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796418">SUSE bug 796418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796823">SUSE bug 796823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797042">SUSE bug 797042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797175">SUSE bug 797175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797526">SUSE bug 797526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798050">SUSE bug 798050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798921">SUSE bug 798921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798960">SUSE bug 798960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799197">SUSE bug 799197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799209">SUSE bug 799209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799270">SUSE bug 799270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799275">SUSE bug 799275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799578">SUSE bug 799578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799909">SUSE bug 799909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799926">SUSE bug 799926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800280">SUSE bug 800280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800701">SUSE bug 800701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800907">SUSE bug 800907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801038">SUSE bug 801038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801178">SUSE bug 801178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801427">SUSE bug 801427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801713">SUSE bug 801713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801717">SUSE bug 801717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801720">SUSE bug 801720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801782">SUSE bug 801782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802153">SUSE bug 802153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802353">SUSE bug 802353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802445">SUSE bug 802445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802642">SUSE bug 802642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802712">SUSE bug 802712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803056">SUSE bug 803056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803067">SUSE bug 803067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803320">SUSE bug 803320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803394">SUSE bug 803394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803674">SUSE bug 803674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803712">SUSE bug 803712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804154">SUSE bug 804154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804220">SUSE bug 804220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804482">SUSE bug 804482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804609">SUSE bug 804609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804656">SUSE bug 804656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804950">SUSE bug 804950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/805227">SUSE bug 805227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/805371">SUSE bug 805371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/805804">SUSE bug 805804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/805823">SUSE bug 805823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/805945">SUSE bug 805945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806138">SUSE bug 806138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806238">SUSE bug 806238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806395">SUSE bug 806395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806396">SUSE bug 806396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806404">SUSE bug 806404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806431">SUSE bug 806431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806466">SUSE bug 806466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806469">SUSE bug 806469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806492">SUSE bug 806492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806631">SUSE bug 806631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806825">SUSE bug 806825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806847">SUSE bug 806847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806908">SUSE bug 806908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806976">SUSE bug 806976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806980">SUSE bug 806980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806988">SUSE bug 806988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807431">SUSE bug 807431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807434">SUSE bug 807434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807471">SUSE bug 807471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807502">SUSE bug 807502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807517">SUSE bug 807517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807560">SUSE bug 807560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807853">SUSE bug 807853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808166">SUSE bug 808166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808307">SUSE bug 808307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808358">SUSE bug 808358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808647">SUSE bug 808647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808827">SUSE bug 808827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808829">SUSE bug 808829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808940">SUSE bug 808940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808966">SUSE bug 808966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808991">SUSE bug 808991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809122">SUSE bug 809122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809155">SUSE bug 809155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809166">SUSE bug 809166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809375">SUSE bug 809375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809493">SUSE bug 809493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809748">SUSE bug 809748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809895">SUSE bug 809895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809902">SUSE bug 809902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809903">SUSE bug 809903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/810323">SUSE bug 810323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/810473">SUSE bug 810473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/810580">SUSE bug 810580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/810624">SUSE bug 810624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/810722">SUSE bug 810722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/812281">SUSE bug 812281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/812315">SUSE bug 812315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/812526">SUSE bug 812526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/812974">SUSE bug 812974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813245">SUSE bug 813245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813604">SUSE bug 813604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813733">SUSE bug 813733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813963">SUSE bug 813963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814336">SUSE bug 814336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814719">SUSE bug 814719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814788">SUSE bug 814788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815320">SUSE bug 815320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815356">SUSE bug 815356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815444">SUSE bug 815444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815745">SUSE bug 815745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816043">SUSE bug 816043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816099">SUSE bug 816099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816443">SUSE bug 816443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816451">SUSE bug 816451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816586">SUSE bug 816586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816708">SUSE bug 816708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817010">SUSE bug 817010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817035">SUSE bug 817035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817339">SUSE bug 817339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817377">SUSE bug 817377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818053">SUSE bug 818053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818327">SUSE bug 818327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818371">SUSE bug 818371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818465">SUSE bug 818465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818514">SUSE bug 818514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818516">SUSE bug 818516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818545">SUSE bug 818545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818798">SUSE bug 818798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819295">SUSE bug 819295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819351">SUSE bug 819351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819363">SUSE bug 819363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819519">SUSE bug 819519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819523">SUSE bug 819523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819655">SUSE bug 819655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819789">SUSE bug 819789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819979">SUSE bug 819979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820102">SUSE bug 820102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820172">SUSE bug 820172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820338">SUSE bug 820338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820434">SUSE bug 820434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820848">SUSE bug 820848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821052">SUSE bug 821052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821235">SUSE bug 821235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821259">SUSE bug 821259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821465">SUSE bug 821465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821560">SUSE bug 821560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821930">SUSE bug 821930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821980">SUSE bug 821980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822066">SUSE bug 822066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822077">SUSE bug 822077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822431">SUSE bug 822431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822575">SUSE bug 822575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822722">SUSE bug 822722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822825">SUSE bug 822825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823082">SUSE bug 823082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823342">SUSE bug 823342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823497">SUSE bug 823497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823517">SUSE bug 823517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823618">SUSE bug 823618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824159">SUSE bug 824159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824915">SUSE bug 824915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825048">SUSE bug 825048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825142">SUSE bug 825142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825227">SUSE bug 825227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825591">SUSE bug 825591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825657">SUSE bug 825657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825696">SUSE bug 825696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825887">SUSE bug 825887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825896">SUSE bug 825896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826102">SUSE bug 826102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826350">SUSE bug 826350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826602">SUSE bug 826602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826756">SUSE bug 826756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826960">SUSE bug 826960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827246">SUSE bug 827246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827372">SUSE bug 827372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827376">SUSE bug 827376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827378">SUSE bug 827378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827416">SUSE bug 827416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827749">SUSE bug 827749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827750">SUSE bug 827750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827767">SUSE bug 827767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828119">SUSE bug 828119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828192">SUSE bug 828192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828236">SUSE bug 828236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828574">SUSE bug 828574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828714">SUSE bug 828714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828894">SUSE bug 828894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829082">SUSE bug 829082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829357">SUSE bug 829357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829622">SUSE bug 829622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829682">SUSE bug 829682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/830901">SUSE bug 830901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831029">SUSE bug 831029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831055">SUSE bug 831055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831058">SUSE bug 831058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831143">SUSE bug 831143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831168">SUSE bug 831168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831380">SUSE bug 831380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831410">SUSE bug 831410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831949">SUSE bug 831949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/832292">SUSE bug 832292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833321">SUSE bug 833321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833588">SUSE bug 833588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833635">SUSE bug 833635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833820">SUSE bug 833820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833858">SUSE bug 833858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834204">SUSE bug 834204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834473">SUSE bug 834473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834600">SUSE bug 834600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834708">SUSE bug 834708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834808">SUSE bug 834808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834905">SUSE bug 834905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835074">SUSE bug 835074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835094">SUSE bug 835094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835186">SUSE bug 835186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835684">SUSE bug 835684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835930">SUSE bug 835930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836218">SUSE bug 836218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836347">SUSE bug 836347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836718">SUSE bug 836718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836801">SUSE bug 836801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/837372">SUSE bug 837372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/837739">SUSE bug 837739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/837803">SUSE bug 837803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/838346">SUSE bug 838346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/838448">SUSE bug 838448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/838623">SUSE bug 838623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839407">SUSE bug 839407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840226">SUSE bug 840226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840830">SUSE bug 840830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841094">SUSE bug 841094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841402">SUSE bug 841402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841445">SUSE bug 841445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841498">SUSE bug 841498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842063">SUSE bug 842063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842239">SUSE bug 842239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842604">SUSE bug 842604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843185">SUSE bug 843185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843419">SUSE bug 843419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843429">SUSE bug 843429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843445">SUSE bug 843445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843642">SUSE bug 843642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843645">SUSE bug 843645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844513">SUSE bug 844513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845621">SUSE bug 845621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845729">SUSE bug 845729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846036">SUSE bug 846036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846404">SUSE bug 846404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846984">SUSE bug 846984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847261">SUSE bug 847261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847652">SUSE bug 847652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847672">SUSE bug 847672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848321">SUSE bug 848321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848336">SUSE bug 848336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848544">SUSE bug 848544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848652">SUSE bug 848652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849021">SUSE bug 849021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849029">SUSE bug 849029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849034">SUSE bug 849034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849364">SUSE bug 849364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849404">SUSE bug 849404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849675">SUSE bug 849675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849809">SUSE bug 849809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849848">SUSE bug 849848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849950">SUSE bug 849950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/850640">SUSE bug 850640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851066">SUSE bug 851066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851101">SUSE bug 851101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851314">SUSE bug 851314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851426">SUSE bug 851426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852373">SUSE bug 852373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852488">SUSE bug 852488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852553">SUSE bug 852553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852558">SUSE bug 852558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852559">SUSE bug 852559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852624">SUSE bug 852624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852967">SUSE bug 852967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853050">SUSE bug 853050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853051">SUSE bug 853051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853052">SUSE bug 853052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853455">SUSE bug 853455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854025">SUSE bug 854025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854546">SUSE bug 854546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854634">SUSE bug 854634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854722">SUSE bug 854722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855037">SUSE bug 855037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855347">SUSE bug 855347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855885">SUSE bug 855885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856083">SUSE bug 856083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857499">SUSE bug 857499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857643">SUSE bug 857643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858280">SUSE bug 858280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858534">SUSE bug 858534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858604">SUSE bug 858604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858831">SUSE bug 858831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858869">SUSE bug 858869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858870">SUSE bug 858870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858872">SUSE bug 858872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862429">SUSE bug 862429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863300">SUSE bug 863300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863335">SUSE bug 863335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864025">SUSE bug 864025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864049">SUSE bug 864049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864464">SUSE bug 864464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864833">SUSE bug 864833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865307">SUSE bug 865307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865310">SUSE bug 865310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865330">SUSE bug 865330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865342">SUSE bug 865342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865442">SUSE bug 865442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865783">SUSE bug 865783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866102">SUSE bug 866102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866911">SUSE bug 866911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867531">SUSE bug 867531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867723">SUSE bug 867723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867953">SUSE bug 867953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868528">SUSE bug 868528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868653">SUSE bug 868653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869033">SUSE bug 869033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869563">SUSE bug 869563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870161">SUSE bug 870161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870173">SUSE bug 870173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870576">SUSE bug 870576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870801">SUSE bug 870801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871325">SUSE bug 871325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871561">SUSE bug 871561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871676">SUSE bug 871676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871797">SUSE bug 871797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871854">SUSE bug 871854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871861">SUSE bug 871861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/872634">SUSE bug 872634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873061">SUSE bug 873061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873374">SUSE bug 873374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/874108">SUSE bug 874108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875051">SUSE bug 875051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875690">SUSE bug 875690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875798">SUSE bug 875798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876102">SUSE bug 876102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876590">SUSE bug 876590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876633">SUSE bug 876633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877257">SUSE bug 877257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877775">SUSE bug 877775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878115">SUSE bug 878115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878509">SUSE bug 878509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879921">SUSE bug 879921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880484">SUSE bug 880484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880892">SUSE bug 880892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881051">SUSE bug 881051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882804">SUSE bug 882804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883096">SUSE bug 883096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883724">SUSE bug 883724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883795">SUSE bug 883795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883948">SUSE bug 883948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885422">SUSE bug 885422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885725">SUSE bug 885725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886474">SUSE bug 886474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887082">SUSE bug 887082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889173">SUSE bug 889173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889324">SUSE bug 889324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892490">SUSE bug 892490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892782">SUSE bug 892782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895680">SUSE bug 895680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896382">SUSE bug 896382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896390">SUSE bug 896390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896391">SUSE bug 896391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896392">SUSE bug 896392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897995">SUSE bug 897995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898693">SUSE bug 898693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899192">SUSE bug 899192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901885">SUSE bug 901885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902232">SUSE bug 902232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902346">SUSE bug 902346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902349">SUSE bug 902349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902351">SUSE bug 902351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902675">SUSE bug 902675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903640">SUSE bug 903640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904013">SUSE bug 904013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904700">SUSE bug 904700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905100">SUSE bug 905100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905312">SUSE bug 905312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905799">SUSE bug 905799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906586">SUSE bug 906586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907189">SUSE bug 907189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907338">SUSE bug 907338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907396">SUSE bug 907396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907818">SUSE bug 907818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909077">SUSE bug 909077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909078">SUSE bug 909078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910251">SUSE bug 910251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912654">SUSE bug 912654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912705">SUSE bug 912705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915335">SUSE bug 915335</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1083/">CVE-2011-1083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1083">CVE-2011-1083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2494/">CVE-2011-2494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2494">CVE-2011-2494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4086/">CVE-2011-4086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4086">CVE-2011-4086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4127/">CVE-2011-4127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4127">CVE-2011-4127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4131/">CVE-2011-4131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4131">CVE-2011-4131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4132/">CVE-2011-4132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4132">CVE-2011-4132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0957/">CVE-2012-0957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0957">CVE-2012-0957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1097/">CVE-2012-1097 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1097">CVE-2012-1097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1146/">CVE-2012-1146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1146">CVE-2012-1146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1179/">CVE-2012-1179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1179">CVE-2012-1179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1601/">CVE-2012-1601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1601">CVE-2012-1601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2119/">CVE-2012-2119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2119">CVE-2012-2119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2127/">CVE-2012-2127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2127">CVE-2012-2127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2133/">CVE-2012-2133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2133">CVE-2012-2133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2136/">CVE-2012-2136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2136">CVE-2012-2136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2137/">CVE-2012-2137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2137">CVE-2012-2137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2313/">CVE-2012-2313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2313">CVE-2012-2313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2319/">CVE-2012-2319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2319">CVE-2012-2319 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2372/">CVE-2012-2372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2372">CVE-2012-2372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2373/">CVE-2012-2373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2373">CVE-2012-2373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2375/">CVE-2012-2375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2375">CVE-2012-2375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2390/">CVE-2012-2390 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2390">CVE-2012-2390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2745/">CVE-2012-2745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2745">CVE-2012-2745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3375/">CVE-2012-3375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3375">CVE-2012-3375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3400/">CVE-2012-3400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3400">CVE-2012-3400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3412/">CVE-2012-3412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3412">CVE-2012-3412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3430/">CVE-2012-3430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3430">CVE-2012-3430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4398/">CVE-2012-4398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4398">CVE-2012-4398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4461/">CVE-2012-4461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4461">CVE-2012-4461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4508/">CVE-2012-4508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4508">CVE-2012-4508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4530/">CVE-2012-4530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4530">CVE-2012-4530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4565/">CVE-2012-4565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4565">CVE-2012-4565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5517/">CVE-2012-5517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5517">CVE-2012-5517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6548/">CVE-2012-6548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6548">CVE-2012-6548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6549/">CVE-2012-6549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6549">CVE-2012-6549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0160/">CVE-2013-0160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0160">CVE-2013-0160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0216/">CVE-2013-0216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0216">CVE-2013-0216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0231/">CVE-2013-0231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0231">CVE-2013-0231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0268/">CVE-2013-0268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0268">CVE-2013-0268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0311/">CVE-2013-0311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0311">CVE-2013-0311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0349/">CVE-2013-0349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0349">CVE-2013-0349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0871/">CVE-2013-0871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0871">CVE-2013-0871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0913/">CVE-2013-0913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0913">CVE-2013-0913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0914/">CVE-2013-0914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0914">CVE-2013-0914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1059/">CVE-2013-1059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1059">CVE-2013-1059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1767/">CVE-2013-1767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1767">CVE-2013-1767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1772/">CVE-2013-1772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1772">CVE-2013-1772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1774/">CVE-2013-1774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1774">CVE-2013-1774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1792/">CVE-2013-1792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1792">CVE-2013-1792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1796/">CVE-2013-1796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1796">CVE-2013-1796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1797/">CVE-2013-1797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1797">CVE-2013-1797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1798/">CVE-2013-1798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1798">CVE-2013-1798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1819/">CVE-2013-1819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1819">CVE-2013-1819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1848/">CVE-2013-1848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1848">CVE-2013-1848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1860/">CVE-2013-1860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1860">CVE-2013-1860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1929/">CVE-2013-1929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1929">CVE-2013-1929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1979/">CVE-2013-1979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1979">CVE-2013-1979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2094/">CVE-2013-2094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2094">CVE-2013-2094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2148/">CVE-2013-2148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2148">CVE-2013-2148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2164/">CVE-2013-2164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2164">CVE-2013-2164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2206/">CVE-2013-2206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2206">CVE-2013-2206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2232/">CVE-2013-2232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2232">CVE-2013-2232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2234/">CVE-2013-2234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2234">CVE-2013-2234 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2237/">CVE-2013-2237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2237">CVE-2013-2237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2634/">CVE-2013-2634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2634">CVE-2013-2634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2635/">CVE-2013-2635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2635">CVE-2013-2635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2850/">CVE-2013-2850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2850">CVE-2013-2850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2851/">CVE-2013-2851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2851">CVE-2013-2851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2893/">CVE-2013-2893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2893">CVE-2013-2893 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2013-2897/">CVE-2013-2897 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2897">CVE-2013-2897 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2013-2899/">CVE-2013-2899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2899">CVE-2013-2899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2929/">CVE-2013-2929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2929">CVE-2013-2929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3076/">CVE-2013-3076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3076">CVE-2013-3076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3222/">CVE-2013-3222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3222">CVE-2013-3222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3223/">CVE-2013-3223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3223">CVE-2013-3223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3224/">CVE-2013-3224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3224">CVE-2013-3224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3225/">CVE-2013-3225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3225">CVE-2013-3225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3227/">CVE-2013-3227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3227">CVE-2013-3227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3228/">CVE-2013-3228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3228">CVE-2013-3228 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3229/">CVE-2013-3229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3229">CVE-2013-3229 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3231/">CVE-2013-3231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3231">CVE-2013-3231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3232/">CVE-2013-3232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3232">CVE-2013-3232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3234/">CVE-2013-3234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3234">CVE-2013-3234 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3235/">CVE-2013-3235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3235">CVE-2013-3235 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4162/">CVE-2013-4162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4162">CVE-2013-4162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4163/">CVE-2013-4163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4163">CVE-2013-4163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4299/">CVE-2013-4299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4299">CVE-2013-4299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4345/">CVE-2013-4345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4345">CVE-2013-4345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4470/">CVE-2013-4470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4470">CVE-2013-4470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4483/">CVE-2013-4483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4483">CVE-2013-4483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4511/">CVE-2013-4511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4511">CVE-2013-4511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4514/">CVE-2013-4514 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4514">CVE-2013-4514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4515/">CVE-2013-4515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4515">CVE-2013-4515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4579/">CVE-2013-4579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4579">CVE-2013-4579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4587/">CVE-2013-4587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4587">CVE-2013-4587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4592/">CVE-2013-4592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4592">CVE-2013-4592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6367/">CVE-2013-6367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6367">CVE-2013-6367 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6368/">CVE-2013-6368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6368">CVE-2013-6368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6378/">CVE-2013-6378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6378">CVE-2013-6378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6380/">CVE-2013-6380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6380">CVE-2013-6380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6382/">CVE-2013-6382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6382">CVE-2013-6382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6383/">CVE-2013-6383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6383">CVE-2013-6383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6463/">CVE-2013-6463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6463">CVE-2013-6463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6885/">CVE-2013-6885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6885">CVE-2013-6885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7027/">CVE-2013-7027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7027">CVE-2013-7027 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7263/">CVE-2013-7263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7263">CVE-2013-7263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7264/">CVE-2013-7264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7264">CVE-2013-7264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7265/">CVE-2013-7265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7265">CVE-2013-7265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7339/">CVE-2013-7339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7339">CVE-2013-7339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0055/">CVE-2014-0055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0055">CVE-2014-0055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0069/">CVE-2014-0069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0069">CVE-2014-0069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0077/">CVE-2014-0077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0077">CVE-2014-0077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0101/">CVE-2014-0101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0101">CVE-2014-0101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0131/">CVE-2014-0131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0131">CVE-2014-0131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0181/">CVE-2014-0181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0181">CVE-2014-0181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0196/">CVE-2014-0196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0196">CVE-2014-0196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1444/">CVE-2014-1444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1444">CVE-2014-1444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1445/">CVE-2014-1445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1445">CVE-2014-1445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1446/">CVE-2014-1446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1446">CVE-2014-1446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1737/">CVE-2014-1737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1737">CVE-2014-1737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1738/">CVE-2014-1738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1738">CVE-2014-1738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1739/">CVE-2014-1739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1739">CVE-2014-1739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1874/">CVE-2014-1874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1874">CVE-2014-1874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2039/">CVE-2014-2039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2039">CVE-2014-2039 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2309/">CVE-2014-2309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2309">CVE-2014-2309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2523/">CVE-2014-2523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2523">CVE-2014-2523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2678/">CVE-2014-2678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2678">CVE-2014-2678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2706/">CVE-2014-2706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2706">CVE-2014-2706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2851/">CVE-2014-2851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2851">CVE-2014-2851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3122/">CVE-2014-3122 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3122">CVE-2014-3122 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3144/">CVE-2014-3144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3144">CVE-2014-3144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3145/">CVE-2014-3145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3145">CVE-2014-3145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3153/">CVE-2014-3153 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3153">CVE-2014-3153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3181/">CVE-2014-3181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3181">CVE-2014-3181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3184/">CVE-2014-3184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3184">CVE-2014-3184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3185/">CVE-2014-3185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3185">CVE-2014-3185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3186/">CVE-2014-3186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3186">CVE-2014-3186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3601/">CVE-2014-3601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3601">CVE-2014-3601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3610/">CVE-2014-3610 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3610">CVE-2014-3610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3646/">CVE-2014-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3646">CVE-2014-3646 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-3647/">CVE-2014-3647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3647">CVE-2014-3647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3673/">CVE-2014-3673 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3673">CVE-2014-3673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3687/">CVE-2014-3687 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3687">CVE-2014-3687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3688/">CVE-2014-3688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3688">CVE-2014-3688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3690/">CVE-2014-3690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3690">CVE-2014-3690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3917/">CVE-2014-3917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3917">CVE-2014-3917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-4508/">CVE-2014-4508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4508">CVE-2014-4508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4608/">CVE-2014-4608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4608">CVE-2014-4608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4652/">CVE-2014-4652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4652">CVE-2014-4652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4653/">CVE-2014-4653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4653">CVE-2014-4653 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4654/">CVE-2014-4654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4654">CVE-2014-4654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4655/">CVE-2014-4655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4655">CVE-2014-4655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4656/">CVE-2014-4656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4656">CVE-2014-4656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4667/">CVE-2014-4667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4667">CVE-2014-4667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4699/">CVE-2014-4699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4699">CVE-2014-4699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4943/">CVE-2014-4943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4943">CVE-2014-4943 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5077/">CVE-2014-5077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5077">CVE-2014-5077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5471/">CVE-2014-5471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5471">CVE-2014-5471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5472/">CVE-2014-5472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5472">CVE-2014-5472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7826/">CVE-2014-7826 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7826">CVE-2014-7826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7841/">CVE-2014-7841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7841">CVE-2014-7841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7842/">CVE-2014-7842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7842">CVE-2014-7842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8133/">CVE-2014-8133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8133">CVE-2014-8133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8134/">CVE-2014-8134 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8134">CVE-2014-8134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8369/">CVE-2014-8369 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8369">CVE-2014-8369 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8559/">CVE-2014-8559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8559">CVE-2014-8559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8709/">CVE-2014-8709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8709">CVE-2014-8709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9090/">CVE-2014-9090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9090">CVE-2014-9090 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9322/">CVE-2014-9322 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9322">CVE-2014-9322 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9584/">CVE-2014-9584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9584">CVE-2014-9584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9585/">CVE-2014-9585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9585">CVE-2014-9585 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576297" comment="kernel-default-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576298" comment="kernel-default-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576300" comment="kernel-default-man-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576301" comment="kernel-ec2-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576302" comment="kernel-ec2-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576304" comment="kernel-ppc64-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576305" comment="kernel-ppc64-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576307" comment="kernel-source-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576308" comment="kernel-syms-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576309" comment="kernel-trace-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576310" comment="kernel-trace-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566048" comment="kernel-xen-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566049" comment="kernel-xen-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576297" comment="kernel-default-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576298" comment="kernel-default-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576300" comment="kernel-default-man-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576301" comment="kernel-ec2-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576302" comment="kernel-ec2-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576304" comment="kernel-ppc64-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576305" comment="kernel-ppc64-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576307" comment="kernel-source-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576308" comment="kernel-syms-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576309" comment="kernel-trace-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576310" comment="kernel-trace-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566048" comment="kernel-xen-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566049" comment="kernel-xen-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576297" comment="kernel-default-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576298" comment="kernel-default-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576300" comment="kernel-default-man-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576301" comment="kernel-ec2-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576302" comment="kernel-ec2-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576304" comment="kernel-ppc64-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576305" comment="kernel-ppc64-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576307" comment="kernel-source-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576308" comment="kernel-syms-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576309" comment="kernel-trace-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576310" comment="kernel-trace-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566048" comment="kernel-xen-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566049" comment="kernel-xen-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218075" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1013533" ref_url="https://bugzilla.suse.com/1013533" source="BUGZILLA"/>
		<reference ref_id="1013604" ref_url="https://bugzilla.suse.com/1013604" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9576" ref_url="https://www.suse.com/security/cve/CVE-2016-9576/" source="CVE"/>
		<reference ref_id="CVE-2016-9794" ref_url="https://www.suse.com/security/cve/CVE-2016-9794/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002519.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP 2 kernel was updated to fix two security issues.

The following security bugs were fixed:

- CVE-2016-9576: A use-after-free vulnerability in the SCSI generic driver allows users with write access to /dev/sg* or /dev/bsg* to elevate their privileges (bsc#1013604).
- CVE-2016-9794: A use-after-free vulnerability in the ALSA pcm layer allowed local users to cause a denial of service, memory corruption or possibly even to elevate their privileges (bsc#1013533).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-22"/>
	<updated date="2016-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013533">SUSE bug 1013533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013604">SUSE bug 1013604</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9576/">CVE-2016-9576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9576">CVE-2016-9576 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9794/">CVE-2016-9794 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9794">CVE-2016-9794 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576312" comment="kernel-default-3.0.101-0.7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576313" comment="kernel-default-base-3.0.101-0.7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576315" comment="kernel-default-man-3.0.101-0.7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576316" comment="kernel-ec2-3.0.101-0.7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576317" comment="kernel-ec2-base-3.0.101-0.7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576319" comment="kernel-pae-3.0.101-0.7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576320" comment="kernel-pae-base-3.0.101-0.7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576322" comment="kernel-source-3.0.101-0.7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576323" comment="kernel-syms-3.0.101-0.7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576324" comment="kernel-trace-3.0.101-0.7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576325" comment="kernel-trace-base-3.0.101-0.7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576327" comment="kernel-xen-3.0.101-0.7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576328" comment="kernel-xen-base-3.0.101-0.7.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218076" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1003077" ref_url="https://bugzilla.suse.com/1003077" source="BUGZILLA"/>
		<reference ref_id="1003925" ref_url="https://bugzilla.suse.com/1003925" source="BUGZILLA"/>
		<reference ref_id="1004517" ref_url="https://bugzilla.suse.com/1004517" source="BUGZILLA"/>
		<reference ref_id="1007944" ref_url="https://bugzilla.suse.com/1007944" source="BUGZILLA"/>
		<reference ref_id="1008645" ref_url="https://bugzilla.suse.com/1008645" source="BUGZILLA"/>
		<reference ref_id="1008831" ref_url="https://bugzilla.suse.com/1008831" source="BUGZILLA"/>
		<reference ref_id="1008833" ref_url="https://bugzilla.suse.com/1008833" source="BUGZILLA"/>
		<reference ref_id="1009443" ref_url="https://bugzilla.suse.com/1009443" source="BUGZILLA"/>
		<reference ref_id="1010150" ref_url="https://bugzilla.suse.com/1010150" source="BUGZILLA"/>
		<reference ref_id="1010467" ref_url="https://bugzilla.suse.com/1010467" source="BUGZILLA"/>
		<reference ref_id="1010501" ref_url="https://bugzilla.suse.com/1010501" source="BUGZILLA"/>
		<reference ref_id="1010507" ref_url="https://bugzilla.suse.com/1010507" source="BUGZILLA"/>
		<reference ref_id="1010711" ref_url="https://bugzilla.suse.com/1010711" source="BUGZILLA"/>
		<reference ref_id="1010716" ref_url="https://bugzilla.suse.com/1010716" source="BUGZILLA"/>
		<reference ref_id="1011482" ref_url="https://bugzilla.suse.com/1011482" source="BUGZILLA"/>
		<reference ref_id="1011685" ref_url="https://bugzilla.suse.com/1011685" source="BUGZILLA"/>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1012832" ref_url="https://bugzilla.suse.com/1012832" source="BUGZILLA"/>
		<reference ref_id="1013038" ref_url="https://bugzilla.suse.com/1013038" source="BUGZILLA"/>
		<reference ref_id="1013531" ref_url="https://bugzilla.suse.com/1013531" source="BUGZILLA"/>
		<reference ref_id="1013542" ref_url="https://bugzilla.suse.com/1013542" source="BUGZILLA"/>
		<reference ref_id="1014746" ref_url="https://bugzilla.suse.com/1014746" source="BUGZILLA"/>
		<reference ref_id="1017710" ref_url="https://bugzilla.suse.com/1017710" source="BUGZILLA"/>
		<reference ref_id="1021258" ref_url="https://bugzilla.suse.com/1021258" source="BUGZILLA"/>
		<reference ref_id="835175" ref_url="https://bugzilla.suse.com/835175" source="BUGZILLA"/>
		<reference ref_id="839104" ref_url="https://bugzilla.suse.com/839104" source="BUGZILLA"/>
		<reference ref_id="863873" ref_url="https://bugzilla.suse.com/863873" source="BUGZILLA"/>
		<reference ref_id="874145" ref_url="https://bugzilla.suse.com/874145" source="BUGZILLA"/>
		<reference ref_id="896484" ref_url="https://bugzilla.suse.com/896484" source="BUGZILLA"/>
		<reference ref_id="908069" ref_url="https://bugzilla.suse.com/908069" source="BUGZILLA"/>
		<reference ref_id="914939" ref_url="https://bugzilla.suse.com/914939" source="BUGZILLA"/>
		<reference ref_id="922947" ref_url="https://bugzilla.suse.com/922947" source="BUGZILLA"/>
		<reference ref_id="927287" ref_url="https://bugzilla.suse.com/927287" source="BUGZILLA"/>
		<reference ref_id="940966" ref_url="https://bugzilla.suse.com/940966" source="BUGZILLA"/>
		<reference ref_id="950998" ref_url="https://bugzilla.suse.com/950998" source="BUGZILLA"/>
		<reference ref_id="954984" ref_url="https://bugzilla.suse.com/954984" source="BUGZILLA"/>
		<reference ref_id="956514" ref_url="https://bugzilla.suse.com/956514" source="BUGZILLA"/>
		<reference ref_id="958000" ref_url="https://bugzilla.suse.com/958000" source="BUGZILLA"/>
		<reference ref_id="960689" ref_url="https://bugzilla.suse.com/960689" source="BUGZILLA"/>
		<reference ref_id="963053" ref_url="https://bugzilla.suse.com/963053" source="BUGZILLA"/>
		<reference ref_id="967716" ref_url="https://bugzilla.suse.com/967716" source="BUGZILLA"/>
		<reference ref_id="968500" ref_url="https://bugzilla.suse.com/968500" source="BUGZILLA"/>
		<reference ref_id="969340" ref_url="https://bugzilla.suse.com/969340" source="BUGZILLA"/>
		<reference ref_id="971360" ref_url="https://bugzilla.suse.com/971360" source="BUGZILLA"/>
		<reference ref_id="971944" ref_url="https://bugzilla.suse.com/971944" source="BUGZILLA"/>
		<reference ref_id="978401" ref_url="https://bugzilla.suse.com/978401" source="BUGZILLA"/>
		<reference ref_id="978821" ref_url="https://bugzilla.suse.com/978821" source="BUGZILLA"/>
		<reference ref_id="979213" ref_url="https://bugzilla.suse.com/979213" source="BUGZILLA"/>
		<reference ref_id="979274" ref_url="https://bugzilla.suse.com/979274" source="BUGZILLA"/>
		<reference ref_id="979548" ref_url="https://bugzilla.suse.com/979548" source="BUGZILLA"/>
		<reference ref_id="979595" ref_url="https://bugzilla.suse.com/979595" source="BUGZILLA"/>
		<reference ref_id="979879" ref_url="https://bugzilla.suse.com/979879" source="BUGZILLA"/>
		<reference ref_id="979915" ref_url="https://bugzilla.suse.com/979915" source="BUGZILLA"/>
		<reference ref_id="980363" ref_url="https://bugzilla.suse.com/980363" source="BUGZILLA"/>
		<reference ref_id="980371" ref_url="https://bugzilla.suse.com/980371" source="BUGZILLA"/>
		<reference ref_id="980725" ref_url="https://bugzilla.suse.com/980725" source="BUGZILLA"/>
		<reference ref_id="981267" ref_url="https://bugzilla.suse.com/981267" source="BUGZILLA"/>
		<reference ref_id="983143" ref_url="https://bugzilla.suse.com/983143" source="BUGZILLA"/>
		<reference ref_id="983213" ref_url="https://bugzilla.suse.com/983213" source="BUGZILLA"/>
		<reference ref_id="984755" ref_url="https://bugzilla.suse.com/984755" source="BUGZILLA"/>
		<reference ref_id="986362" ref_url="https://bugzilla.suse.com/986362" source="BUGZILLA"/>
		<reference ref_id="986365" ref_url="https://bugzilla.suse.com/986365" source="BUGZILLA"/>
		<reference ref_id="986445" ref_url="https://bugzilla.suse.com/986445" source="BUGZILLA"/>
		<reference ref_id="986572" ref_url="https://bugzilla.suse.com/986572" source="BUGZILLA"/>
		<reference ref_id="989261" ref_url="https://bugzilla.suse.com/989261" source="BUGZILLA"/>
		<reference ref_id="991608" ref_url="https://bugzilla.suse.com/991608" source="BUGZILLA"/>
		<reference ref_id="991665" ref_url="https://bugzilla.suse.com/991665" source="BUGZILLA"/>
		<reference ref_id="992566" ref_url="https://bugzilla.suse.com/992566" source="BUGZILLA"/>
		<reference ref_id="993890" ref_url="https://bugzilla.suse.com/993890" source="BUGZILLA"/>
		<reference ref_id="993891" ref_url="https://bugzilla.suse.com/993891" source="BUGZILLA"/>
		<reference ref_id="994296" ref_url="https://bugzilla.suse.com/994296" source="BUGZILLA"/>
		<reference ref_id="994436" ref_url="https://bugzilla.suse.com/994436" source="BUGZILLA"/>
		<reference ref_id="994618" ref_url="https://bugzilla.suse.com/994618" source="BUGZILLA"/>
		<reference ref_id="994759" ref_url="https://bugzilla.suse.com/994759" source="BUGZILLA"/>
		<reference ref_id="995968" ref_url="https://bugzilla.suse.com/995968" source="BUGZILLA"/>
		<reference ref_id="997059" ref_url="https://bugzilla.suse.com/997059" source="BUGZILLA"/>
		<reference ref_id="999932" ref_url="https://bugzilla.suse.com/999932" source="BUGZILLA"/>
		<reference ref_id="CVE-2004-0230" ref_url="https://www.suse.com/security/cve/CVE-2004-0230/" source="CVE"/>
		<reference ref_id="CVE-2012-6704" ref_url="https://www.suse.com/security/cve/CVE-2012-6704/" source="CVE"/>
		<reference ref_id="CVE-2013-4312" ref_url="https://www.suse.com/security/cve/CVE-2013-4312/" source="CVE"/>
		<reference ref_id="CVE-2015-1350" ref_url="https://www.suse.com/security/cve/CVE-2015-1350/" source="CVE"/>
		<reference ref_id="CVE-2015-7513" ref_url="https://www.suse.com/security/cve/CVE-2015-7513/" source="CVE"/>
		<reference ref_id="CVE-2015-7833" ref_url="https://www.suse.com/security/cve/CVE-2015-7833/" source="CVE"/>
		<reference ref_id="CVE-2015-8956" ref_url="https://www.suse.com/security/cve/CVE-2015-8956/" source="CVE"/>
		<reference ref_id="CVE-2015-8962" ref_url="https://www.suse.com/security/cve/CVE-2015-8962/" source="CVE"/>
		<reference ref_id="CVE-2015-8964" ref_url="https://www.suse.com/security/cve/CVE-2015-8964/" source="CVE"/>
		<reference ref_id="CVE-2016-0823" ref_url="https://www.suse.com/security/cve/CVE-2016-0823/" source="CVE"/>
		<reference ref_id="CVE-2016-10088" ref_url="https://www.suse.com/security/cve/CVE-2016-10088/" source="CVE"/>
		<reference ref_id="CVE-2016-1583" ref_url="https://www.suse.com/security/cve/CVE-2016-1583/" source="CVE"/>
		<reference ref_id="CVE-2016-2187" ref_url="https://www.suse.com/security/cve/CVE-2016-2187/" source="CVE"/>
		<reference ref_id="CVE-2016-2189" ref_url="https://www.suse.com/security/cve/CVE-2016-2189/" source="CVE"/>
		<reference ref_id="CVE-2016-3841" ref_url="https://www.suse.com/security/cve/CVE-2016-3841/" source="CVE"/>
		<reference ref_id="CVE-2016-4470" ref_url="https://www.suse.com/security/cve/CVE-2016-4470/" source="CVE"/>
		<reference ref_id="CVE-2016-4482" ref_url="https://www.suse.com/security/cve/CVE-2016-4482/" source="CVE"/>
		<reference ref_id="CVE-2016-4485" ref_url="https://www.suse.com/security/cve/CVE-2016-4485/" source="CVE"/>
		<reference ref_id="CVE-2016-4565" ref_url="https://www.suse.com/security/cve/CVE-2016-4565/" source="CVE"/>
		<reference ref_id="CVE-2016-4569" ref_url="https://www.suse.com/security/cve/CVE-2016-4569/" source="CVE"/>
		<reference ref_id="CVE-2016-4578" ref_url="https://www.suse.com/security/cve/CVE-2016-4578/" source="CVE"/>
		<reference ref_id="CVE-2016-4580" ref_url="https://www.suse.com/security/cve/CVE-2016-4580/" source="CVE"/>
		<reference ref_id="CVE-2016-4805" ref_url="https://www.suse.com/security/cve/CVE-2016-4805/" source="CVE"/>
		<reference ref_id="CVE-2016-4913" ref_url="https://www.suse.com/security/cve/CVE-2016-4913/" source="CVE"/>
		<reference ref_id="CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997/" source="CVE"/>
		<reference ref_id="CVE-2016-5244" ref_url="https://www.suse.com/security/cve/CVE-2016-5244/" source="CVE"/>
		<reference ref_id="CVE-2016-5829" ref_url="https://www.suse.com/security/cve/CVE-2016-5829/" source="CVE"/>
		<reference ref_id="CVE-2016-6480" ref_url="https://www.suse.com/security/cve/CVE-2016-6480/" source="CVE"/>
		<reference ref_id="CVE-2016-6828" ref_url="https://www.suse.com/security/cve/CVE-2016-6828/" source="CVE"/>
		<reference ref_id="CVE-2016-7042" ref_url="https://www.suse.com/security/cve/CVE-2016-7042/" source="CVE"/>
		<reference ref_id="CVE-2016-7097" ref_url="https://www.suse.com/security/cve/CVE-2016-7097/" source="CVE"/>
		<reference ref_id="CVE-2016-7117" ref_url="https://www.suse.com/security/cve/CVE-2016-7117/" source="CVE"/>
		<reference ref_id="CVE-2016-7425" ref_url="https://www.suse.com/security/cve/CVE-2016-7425/" source="CVE"/>
		<reference ref_id="CVE-2016-7910" ref_url="https://www.suse.com/security/cve/CVE-2016-7910/" source="CVE"/>
		<reference ref_id="CVE-2016-7911" ref_url="https://www.suse.com/security/cve/CVE-2016-7911/" source="CVE"/>
		<reference ref_id="CVE-2016-7916" ref_url="https://www.suse.com/security/cve/CVE-2016-7916/" source="CVE"/>
		<reference ref_id="CVE-2016-8399" ref_url="https://www.suse.com/security/cve/CVE-2016-8399/" source="CVE"/>
		<reference ref_id="CVE-2016-8632" ref_url="https://www.suse.com/security/cve/CVE-2016-8632/" source="CVE"/>
		<reference ref_id="CVE-2016-8633" ref_url="https://www.suse.com/security/cve/CVE-2016-8633/" source="CVE"/>
		<reference ref_id="CVE-2016-8646" ref_url="https://www.suse.com/security/cve/CVE-2016-8646/" source="CVE"/>
		<reference ref_id="CVE-2016-9555" ref_url="https://www.suse.com/security/cve/CVE-2016-9555/" source="CVE"/>
		<reference ref_id="CVE-2016-9685" ref_url="https://www.suse.com/security/cve/CVE-2016-9685/" source="CVE"/>
		<reference ref_id="CVE-2016-9756" ref_url="https://www.suse.com/security/cve/CVE-2016-9756/" source="CVE"/>
		<reference ref_id="CVE-2016-9793" ref_url="https://www.suse.com/security/cve/CVE-2016-9793/" source="CVE"/>
		<reference ref_id="CVE-2017-5551" ref_url="https://www.suse.com/security/cve/CVE-2017-5551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP2 LTSS kernel was updated to receive various security and bugfixes.

This is the last planned LTSS kernel update for the SUSE Linux Enterprise Server 11 SP2 LTSS.

The following security bugs were fixed:

- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2004-0230: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP (bnc#969340).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).
- CVE-2016-8399: An out of bounds read in the ping protocol handler could have lead to information disclosure (bsc#1014746).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).
- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option (bnc#1013542).
- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038).
- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).
- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations (bnc#1012832).
- CVE-2015-1350: The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecified removing extended privilege attributes, which allowed local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program (bnc#914939).
- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacked chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bnc#1011685).
- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716).
- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711).
- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).
- CVE-2016-7916: Race condition in the environ_read function in fs/proc/base.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete (bnc#1010467).
- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux kernel allowed local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data (bnc#1010150).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel used an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).
- CVE-2016-7097: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).
- CVE-2017-5551: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. This CVE tracks the fix for the tmpfs filesystem. (bsc#1021258).
- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).
- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721 (bnc#994759).
- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).
- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bnc#991608).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bsc#986365).
- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).
- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).
- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).
- CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandled NM (aka alternate name) entries containing \0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).
- CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).
- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).
- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).
- CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).
- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).
- CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).
- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).
- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).


The following non-security bugs were fixed:

- arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- cgroups: do not attach task to subsystem if migration failed (bnc#979274).
- cgroups: more safe tasklist locking in cgroup_attach_proc (bnc#979274).
- dasd: fix hanging system after LCU changes (bnc#968500, LTC#136671).
- dasd: Fix unresumed device after suspend/resume (bnc#927287, LTC#123892).
- ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360).
- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kvm: x86: SYSENTER emulation is broken (bsc#994618).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (VM Functionality, bsc#1008645).
- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944).
- nfs: Do not disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261, bsc#1011482).
- nfs: do not do blind d_drop() in nfs_prime_dcache() (bnc#908069 bnc#896484 bsc#963053).
- nfs_prime_dcache needs fh to be set (bnc#908069 bnc#896484 bsc#963053).
- nfs: Refresh open-owner id when server says SEQID is bad (bsc#989261).
- nfsv4: Ensure that we do not drop a state owner more than once (bsc#979595).
- nfsv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595, bsc#1011482).
- nfsv4: nfs4_proc_renew should be declared static (bnc#863873).
- nfsv4: OPEN must handle the NFS4ERR_IO return code correctly (bsc#979595).
- nfsv4: Recovery of recalled read delegations is broken (bsc#956514 bsc#1011482).
- nfsv4: The NFSv4.0 client must send RENEW calls if it holds a delegation (bnc#863873).
- powerpc: Add ability to build little endian kernels (bsc#967716).
- powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716).
- powerpc: Do not build assembly files with ABIv2 (bsc#967716).
- powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716).
- powerpc: dtc is required to build dtb files (bsc#967716).
- powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716).
- powerpc: Fix error when cross building TAGS &amp; cscope (bsc#967716).
- powerpc: Make the vdso32 also build big-endian (bsc#967716).
- powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716).
- powerpc: Remove buggy 9-year-old test for binutils &lt; 2.12.1 (bsc#967716).
- powerpc: Require gcc 4.0 on 64-bit (bsc#967716).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- qeth: delete napi struct when removing a qeth device (bnc#979915, LTC#143590).
- qeth: Fix crash on initial MTU size change (bnc#835175, LTC#96809).
- qeth: postpone freeing of qdio memory (bnc#874145, LTC#107873).
- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- Revert 's390/mm: fix asce_bits handling with dynamic pagetable levels' This reverts commit 6e00b1d803fa2ab4b130e04b7fbcc99f0b5ecba8.
- rpm/config.sh: Set the release string to 0.7.&lt;RELEASE&gt; (bsc#997059)
- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)
- s390/dasd: fix failfast for disconnected devices (bnc#958000, LTC#135138).
- s390/dasd: fix hanging device after clear subchannel (bnc#994436, LTC#144640).
- s390/dasd: fix kernel panic when alias is set offline (bnc#940966, LTC#128595).
- s390/dasd: fix list_del corruption after lcu changes (bnc#954984, LTC#133077).
- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979915, LTC#141456). Conflicts: 	series.conf
- s390/pageattr: do a single TLB flush for change_page_attr (bsc#1009443,LTC#148182).
- Set CONFIG_DEBUG_INFO=y and CONFIG_DEBUG_INFO_REDUCED=n on all platforms The specfile adjusts the config if necessary, but a new version of run_oldconfig.sh requires the settings to be present in the repository.
- usb: fix typo in wMaxPacketSize validation (bsc#991665).
- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-30"/>
	<updated date="2017-01-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1003077">SUSE bug 1003077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003925">SUSE bug 1003925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004517">SUSE bug 1004517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007944">SUSE bug 1007944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008645">SUSE bug 1008645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008831">SUSE bug 1008831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008833">SUSE bug 1008833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009443">SUSE bug 1009443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010150">SUSE bug 1010150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010467">SUSE bug 1010467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010501">SUSE bug 1010501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010507">SUSE bug 1010507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010711">SUSE bug 1010711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010716">SUSE bug 1010716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011482">SUSE bug 1011482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011685">SUSE bug 1011685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012832">SUSE bug 1012832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013038">SUSE bug 1013038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013531">SUSE bug 1013531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013542">SUSE bug 1013542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014746">SUSE bug 1014746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017710">SUSE bug 1017710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021258">SUSE bug 1021258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835175">SUSE bug 835175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839104">SUSE bug 839104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863873">SUSE bug 863873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/874145">SUSE bug 874145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896484">SUSE bug 896484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908069">SUSE bug 908069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914939">SUSE bug 914939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922947">SUSE bug 922947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927287">SUSE bug 927287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940966">SUSE bug 940966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950998">SUSE bug 950998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954984">SUSE bug 954984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956514">SUSE bug 956514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958000">SUSE bug 958000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960689">SUSE bug 960689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963053">SUSE bug 963053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967716">SUSE bug 967716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968500">SUSE bug 968500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969340">SUSE bug 969340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971360">SUSE bug 971360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971944">SUSE bug 971944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978401">SUSE bug 978401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978821">SUSE bug 978821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979213">SUSE bug 979213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979274">SUSE bug 979274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979548">SUSE bug 979548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979595">SUSE bug 979595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979879">SUSE bug 979879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979915">SUSE bug 979915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980363">SUSE bug 980363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980371">SUSE bug 980371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980725">SUSE bug 980725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981267">SUSE bug 981267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983143">SUSE bug 983143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983213">SUSE bug 983213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984755">SUSE bug 984755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986365">SUSE bug 986365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986445">SUSE bug 986445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986572">SUSE bug 986572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989261">SUSE bug 989261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991608">SUSE bug 991608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991665">SUSE bug 991665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992566">SUSE bug 992566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993890">SUSE bug 993890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993891">SUSE bug 993891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994296">SUSE bug 994296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994436">SUSE bug 994436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994618">SUSE bug 994618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994759">SUSE bug 994759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995968">SUSE bug 995968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997059">SUSE bug 997059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999932">SUSE bug 999932</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2004-0230/">CVE-2004-0230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-0230">CVE-2004-0230 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6704/">CVE-2012-6704 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6704">CVE-2012-6704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4312/">CVE-2013-4312 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4312">CVE-2013-4312 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-1350/">CVE-2015-1350 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1350">CVE-2015-1350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7513/">CVE-2015-7513 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7513">CVE-2015-7513 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-7833/">CVE-2015-7833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7833">CVE-2015-7833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8956/">CVE-2015-8956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8956">CVE-2015-8956 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8962/">CVE-2015-8962 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8962">CVE-2015-8962 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-8964/">CVE-2015-8964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8964">CVE-2015-8964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0823/">CVE-2016-0823 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0823">CVE-2016-0823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10088/">CVE-2016-10088 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10088">CVE-2016-10088 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1583/">CVE-2016-1583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1583">CVE-2016-1583 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2187/">CVE-2016-2187 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2187">CVE-2016-2187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2189/">CVE-2016-2189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-2189">CVE-2016-2189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3841/">CVE-2016-3841 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3841">CVE-2016-3841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4470/">CVE-2016-4470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4470">CVE-2016-4470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4482/">CVE-2016-4482 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4482">CVE-2016-4482 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4485/">CVE-2016-4485 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4485">CVE-2016-4485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4565/">CVE-2016-4565 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4565">CVE-2016-4565 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4569/">CVE-2016-4569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4569">CVE-2016-4569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4578/">CVE-2016-4578 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4578">CVE-2016-4578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4580/">CVE-2016-4580 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4580">CVE-2016-4580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4805/">CVE-2016-4805 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4805">CVE-2016-4805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4913/">CVE-2016-4913 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4913">CVE-2016-4913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4997">CVE-2016-4997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5244/">CVE-2016-5244 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5244">CVE-2016-5244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5829/">CVE-2016-5829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5829">CVE-2016-5829 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6480/">CVE-2016-6480 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6480">CVE-2016-6480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6828/">CVE-2016-6828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6828">CVE-2016-6828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7042/">CVE-2016-7042 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7042">CVE-2016-7042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7097/">CVE-2016-7097 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7097">CVE-2016-7097 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7117/">CVE-2016-7117 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7117">CVE-2016-7117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7425/">CVE-2016-7425 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7425">CVE-2016-7425 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7910/">CVE-2016-7910 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7910">CVE-2016-7910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7911/">CVE-2016-7911 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7911">CVE-2016-7911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7916/">CVE-2016-7916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7916">CVE-2016-7916 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8399/">CVE-2016-8399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8399">CVE-2016-8399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8632/">CVE-2016-8632 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8632">CVE-2016-8632 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8633/">CVE-2016-8633 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8633">CVE-2016-8633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8646/">CVE-2016-8646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8646">CVE-2016-8646 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9555/">CVE-2016-9555 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9555">CVE-2016-9555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9685/">CVE-2016-9685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9685">CVE-2016-9685 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9756/">CVE-2016-9756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9756">CVE-2016-9756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9793/">CVE-2016-9793 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9793">CVE-2016-9793 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5551/">CVE-2017-5551 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5551">CVE-2017-5551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576330" comment="kernel-default-3.0.101-0.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576331" comment="kernel-default-base-3.0.101-0.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576333" comment="kernel-default-man-3.0.101-0.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576334" comment="kernel-ec2-3.0.101-0.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576335" comment="kernel-ec2-base-3.0.101-0.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576337" comment="kernel-pae-3.0.101-0.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576338" comment="kernel-pae-base-3.0.101-0.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576340" comment="kernel-source-3.0.101-0.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576341" comment="kernel-syms-3.0.101-0.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576342" comment="kernel-trace-3.0.101-0.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576343" comment="kernel-trace-base-3.0.101-0.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576345" comment="kernel-xen-3.0.101-0.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576346" comment="kernel-xen-base-3.0.101-0.7.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218077" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="798406" ref_url="https://bugzilla.suse.com/798406" source="BUGZILLA"/>
		<reference ref_id="821931" ref_url="https://bugzilla.suse.com/821931" source="BUGZILLA"/>
		<reference ref_id="860593" ref_url="https://bugzilla.suse.com/860593" source="BUGZILLA"/>
		<reference ref_id="879878" ref_url="https://bugzilla.suse.com/879878" source="BUGZILLA"/>
		<reference ref_id="891087" ref_url="https://bugzilla.suse.com/891087" source="BUGZILLA"/>
		<reference ref_id="897995" ref_url="https://bugzilla.suse.com/897995" source="BUGZILLA"/>
		<reference ref_id="898693" ref_url="https://bugzilla.suse.com/898693" source="BUGZILLA"/>
		<reference ref_id="900881" ref_url="https://bugzilla.suse.com/900881" source="BUGZILLA"/>
		<reference ref_id="904671" ref_url="https://bugzilla.suse.com/904671" source="BUGZILLA"/>
		<reference ref_id="908870" ref_url="https://bugzilla.suse.com/908870" source="BUGZILLA"/>
		<reference ref_id="909477" ref_url="https://bugzilla.suse.com/909477" source="BUGZILLA"/>
		<reference ref_id="912916" ref_url="https://bugzilla.suse.com/912916" source="BUGZILLA"/>
		<reference ref_id="914742" ref_url="https://bugzilla.suse.com/914742" source="BUGZILLA"/>
		<reference ref_id="915200" ref_url="https://bugzilla.suse.com/915200" source="BUGZILLA"/>
		<reference ref_id="915517" ref_url="https://bugzilla.suse.com/915517" source="BUGZILLA"/>
		<reference ref_id="915577" ref_url="https://bugzilla.suse.com/915577" source="BUGZILLA"/>
		<reference ref_id="916010" ref_url="https://bugzilla.suse.com/916010" source="BUGZILLA"/>
		<reference ref_id="917093" ref_url="https://bugzilla.suse.com/917093" source="BUGZILLA"/>
		<reference ref_id="917830" ref_url="https://bugzilla.suse.com/917830" source="BUGZILLA"/>
		<reference ref_id="918333" ref_url="https://bugzilla.suse.com/918333" source="BUGZILLA"/>
		<reference ref_id="919007" ref_url="https://bugzilla.suse.com/919007" source="BUGZILLA"/>
		<reference ref_id="919018" ref_url="https://bugzilla.suse.com/919018" source="BUGZILLA"/>
		<reference ref_id="919463" ref_url="https://bugzilla.suse.com/919463" source="BUGZILLA"/>
		<reference ref_id="921769" ref_url="https://bugzilla.suse.com/921769" source="BUGZILLA"/>
		<reference ref_id="922583" ref_url="https://bugzilla.suse.com/922583" source="BUGZILLA"/>
		<reference ref_id="923245" ref_url="https://bugzilla.suse.com/923245" source="BUGZILLA"/>
		<reference ref_id="926240" ref_url="https://bugzilla.suse.com/926240" source="BUGZILLA"/>
		<reference ref_id="927257" ref_url="https://bugzilla.suse.com/927257" source="BUGZILLA"/>
		<reference ref_id="928801" ref_url="https://bugzilla.suse.com/928801" source="BUGZILLA"/>
		<reference ref_id="929148" ref_url="https://bugzilla.suse.com/929148" source="BUGZILLA"/>
		<reference ref_id="929283" ref_url="https://bugzilla.suse.com/929283" source="BUGZILLA"/>
		<reference ref_id="929360" ref_url="https://bugzilla.suse.com/929360" source="BUGZILLA"/>
		<reference ref_id="929525" ref_url="https://bugzilla.suse.com/929525" source="BUGZILLA"/>
		<reference ref_id="930284" ref_url="https://bugzilla.suse.com/930284" source="BUGZILLA"/>
		<reference ref_id="930934" ref_url="https://bugzilla.suse.com/930934" source="BUGZILLA"/>
		<reference ref_id="931474" ref_url="https://bugzilla.suse.com/931474" source="BUGZILLA"/>
		<reference ref_id="933429" ref_url="https://bugzilla.suse.com/933429" source="BUGZILLA"/>
		<reference ref_id="935705" ref_url="https://bugzilla.suse.com/935705" source="BUGZILLA"/>
		<reference ref_id="936831" ref_url="https://bugzilla.suse.com/936831" source="BUGZILLA"/>
		<reference ref_id="937032" ref_url="https://bugzilla.suse.com/937032" source="BUGZILLA"/>
		<reference ref_id="937986" ref_url="https://bugzilla.suse.com/937986" source="BUGZILLA"/>
		<reference ref_id="940338" ref_url="https://bugzilla.suse.com/940338" source="BUGZILLA"/>
		<reference ref_id="940398" ref_url="https://bugzilla.suse.com/940398" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8086" ref_url="https://www.suse.com/security/cve/CVE-2014-8086/" source="CVE"/>
		<reference ref_id="CVE-2014-8159" ref_url="https://www.suse.com/security/cve/CVE-2014-8159/" source="CVE"/>
		<reference ref_id="CVE-2014-9683" ref_url="https://www.suse.com/security/cve/CVE-2014-9683/" source="CVE"/>
		<reference ref_id="CVE-2015-0777" ref_url="https://www.suse.com/security/cve/CVE-2015-0777/" source="CVE"/>
		<reference ref_id="CVE-2015-1420" ref_url="https://www.suse.com/security/cve/CVE-2015-1420/" source="CVE"/>
		<reference ref_id="CVE-2015-1421" ref_url="https://www.suse.com/security/cve/CVE-2015-1421/" source="CVE"/>
		<reference ref_id="CVE-2015-1805" ref_url="https://www.suse.com/security/cve/CVE-2015-1805/" source="CVE"/>
		<reference ref_id="CVE-2015-2041" ref_url="https://www.suse.com/security/cve/CVE-2015-2041/" source="CVE"/>
		<reference ref_id="CVE-2015-2042" ref_url="https://www.suse.com/security/cve/CVE-2015-2042/" source="CVE"/>
		<reference ref_id="CVE-2015-2150" ref_url="https://www.suse.com/security/cve/CVE-2015-2150/" source="CVE"/>
		<reference ref_id="CVE-2015-2830" ref_url="https://www.suse.com/security/cve/CVE-2015-2830/" source="CVE"/>
		<reference ref_id="CVE-2015-2922" ref_url="https://www.suse.com/security/cve/CVE-2015-2922/" source="CVE"/>
		<reference ref_id="CVE-2015-3331" ref_url="https://www.suse.com/security/cve/CVE-2015-3331/" source="CVE"/>
		<reference ref_id="CVE-2015-3636" ref_url="https://www.suse.com/security/cve/CVE-2015-3636/" source="CVE"/>
		<reference ref_id="CVE-2015-4700" ref_url="https://www.suse.com/security/cve/CVE-2015-4700/" source="CVE"/>
		<reference ref_id="CVE-2015-5364" ref_url="https://www.suse.com/security/cve/CVE-2015-5364/" source="CVE"/>
		<reference ref_id="CVE-2015-5366" ref_url="https://www.suse.com/security/cve/CVE-2015-5366/" source="CVE"/>
		<reference ref_id="CVE-2015-5707" ref_url="https://www.suse.com/security/cve/CVE-2015-5707/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001563.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise Server 11 SP2 LTSS kernel was updated to
receive various security and bugfixes.

The following security bugs were fixed:
- CVE-2015-5707: An integer overflow in the SCSI generic driver could
  be potentially used by local attackers to crash the kernel or execute
  code.
- CVE-2015-2830: arch/x86/kernel/entry_64.S in the Linux kernel did
  not prevent the TS_COMPAT flag from reaching a user-mode task, which
  might have allowed local users to bypass the seccomp or audit protection
  mechanism via a crafted application that uses the (1) fork or (2) close
  system call, as demonstrated by an attack against seccomp before 3.16
  (bnc#926240).
- CVE-2015-0777: drivers/xen/usbback/usbback.c in the Linux kernel
  allowed guest OS users to obtain sensitive information from uninitialized
  locations in host OS kernel memory via unspecified vectors (bnc#917830).
- CVE-2015-2150: Xen and the Linux kernel did not properly restrict access
  to PCI command registers, which might have allowed local guest users to
  cause a denial of service (non-maskable interrupt and host crash) by
  disabling the (1) memory or (2) I/O decoding for a PCI Express device
  and then accessing the device, which triggers an Unsupported Request
  (UR) response (bnc#919463).
- CVE-2015-5364: A remote denial of service (hang) via UDP flood with
  incorrect package checksums was fixed. (bsc#936831).
- CVE-2015-5366: A remote denial of service (unexpected error returns)
  via UDP flood with incorrect package checksums was fixed. (bsc#936831).
- CVE-2015-1420: CVE-2015-1420: Race condition in the handle_to_path
  function in fs/fhandle.c in the Linux kernel allowed local users to bypass
  intended size restrictions and trigger read operations on additional
  memory locations by changing the handle_bytes value of a file handle
  during the execution of this function (bnc#915517).
- CVE-2015-4700: A local user could have created a bad instruction in
  the JIT processed BPF code, leading to a kernel crash (bnc#935705).
- CVE-2015-1805: The (1) pipe_read and (2) pipe_write implementations in
  fs/pipe.c in the Linux kernel did not properly consider the side effects
  of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls,
  which allowed local users to cause a denial of service (system crash)
  or possibly gain privileges via a crafted application, aka an 'I/O vector
  array overrun' (bnc#933429).
- CVE-2015-3331: The __driver_rfc4106_decrypt function in
  arch/x86/crypto/aesni-intel_glue.c in the Linux kernel did not properly
  determine the memory locations used for encrypted data, which allowed
  context-dependent attackers to cause a denial of service (buffer overflow
  and system crash) or possibly execute arbitrary code by triggering a
  crypto API call, as demonstrated by use of a libkcapi test program with
  an AF_ALG(aead) socket (bnc#927257).
- CVE-2015-2922: The ndisc_router_discovery function in net/ipv6/ndisc.c
  in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack
  in the Linux kernel allowed remote attackers to reconfigure a hop-limit
  setting via a small hop_limit value in a Router Advertisement (RA)
  message (bnc#922583).
- CVE-2015-2041: net/llc/sysctl_net_llc.c in the Linux kernel used an
  incorrect data type in a sysctl table, which allowed local users to
  obtain potentially sensitive information from kernel memory or possibly
  have unspecified other impact by accessing a sysctl entry (bnc#919007).
- CVE-2015-3636: The ping_unhash function in net/ipv4/ping.c in the
  Linux kernel did not initialize a certain list data structure during an
  unhash operation, which allowed local users to gain privileges or cause
  a denial of service (use-after-free and system crash) by leveraging the
  ability to make a SOCK_DGRAM socket system call for the IPPROTO_ICMP or
  IPPROTO_ICMPV6 protocol, and then making a connect system call after a
  disconnect (bnc#929525).
- CVE-2014-8086: Race condition in the ext4_file_write_iter function
  in fs/ext4/file.c in the Linux kernel allowed local users to cause a
  denial of service (file unavailability) via a combination of a write
  action and an F_SETFL fcntl operation for the O_DIRECT flag (bnc#900881).
- CVE-2014-8159: The InfiniBand (IB) implementation in the Linux kernel
  did not properly restrict use of User Verbs for registration of memory
  regions, which allowed local users to access arbitrary physical memory
  locations, and consequently cause a denial of service (system crash)
  or gain privileges, by leveraging permissions on a uverbs device under
  /dev/infiniband/ (bnc#914742).
- CVE-2014-9683: Off-by-one error in the ecryptfs_decode_from_filename
  function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux
  kernel allowed local users to cause a denial of service (buffer overflow
  and system crash) or possibly gain privileges via a crafted filename
  (bnc#918333).
- CVE-2015-2042: net/rds/sysctl.c in the Linux kernel used an incorrect
  data type in a sysctl table, which allowed local users to obtain
  potentially sensitive information from kernel memory or possibly have
  unspecified other impact by accessing a sysctl entry (bnc#919018).
- CVE-2015-1421: Use-after-free vulnerability in the sctp_assoc_update
  function in net/sctp/associola.c in the Linux kernel allowed remote
  attackers to cause a denial of service (slab corruption and panic) or
  possibly have unspecified other impact by triggering an INIT collision
  that leads to improper handling of shared-key data (bnc#915577).

The following non-security bugs were fixed:
- HID: add ALWAYS_POLL quirk for a Logitech 0xc007 (bnc#931474).
- HID: add HP OEM mouse to quirk ALWAYS_POLL (bnc#931474).
- HID: add quirk for PIXART OEM mouse used by HP (bnc#931474).
- HID: usbhid: add always-poll quirk (bnc#931474).
- HID: usbhid: add another mouse that needs QUIRK_ALWAYS_POLL (bnc#931474).
- HID: usbhid: enable always-poll quirk for Elan Touchscreen 009b (bnc#931474).
- HID: usbhid: enable always-poll quirk for Elan Touchscreen 0103 (bnc#931474).
- HID: usbhid: enable always-poll quirk for Elan Touchscreen 016f (bnc#931474).
- HID: usbhid: enable always-poll quirk for Elan Touchscreen.
- HID: usbhid: fix PIXART optical mouse (bnc#931474).
- HID: usbhid: more mice with ALWAYS_POLL (bnc#931474).
- HID: usbhid: yet another mouse with ALWAYS_POLL (bnc#931474).
- bnx2x: Fix kdump when iommu=on (bug#921769).
- cifs: fix use-after-free bug in find_writable_file (bnc#909477).
- coredump: ensure the fpu state is flushed for proper multi-threaded core dump (bsc#904671, bsc#929360).
- dm: fixed that LVM merge snapshot of root logical volume were not working (bsc#928801)
- deal with deadlock in d_walk fix (bnc#929148, bnc#929283).
- e1000: do not enable dma receives until after dma address has been setup (bsc#821931).
- fsnotify: Fix handling of renames in audit (bnc#915200).
- inet: add a redirect generation id in inetpeer (bnc#860593).
- inetpeer: initialize -&amp;gt;redirect_genid in inet_getpeer() (bnc#860593).
- kabi: hide bnc#860593 changes of struct inetpeer_addr_base (bnc#860593).
- kernel: fix data corruption when reading /proc/sysinfo (bsc#891087, bsc#937986, LTC#114480).
- libata: prevent HSM state change race between ISR and PIO (bsc#923245).
- time, ntp: Do not update time_state in middle of leap second (bsc#912916).
- s390-3215-tty-close-crash.patch: kernel: 3215 tty close crash (bsc#916010, LTC#120873).
- s390-3215-tty-close-race.patch: kernel: 3215 console crash (bsc#916010, LTC#94302).
- s390-3215-tty-hang.patch: Renamed from patches.arch/s390-tty-hang.patch.
- s390-3215-tty-hang.patch: Update references (bnc#898693, bnc#897995, LTC#114562).
- s390-dasd-retry-partition-detection.patch: s390/dasd: retry partition detection (bsc#916010, LTC#94302).
- s390-dasd-retry-partition-detection.patch: Update references (bsc#916010, LTC#120565).
- s390-sclp-tty-refcount.patch: kernel: sclp console tty reference counting (bsc#916010, LTC#115466).
- scsi: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398 bsc#930934).
- scsi/sg: sg_start_req(): make sure that there is not too many elements in iovec (bsc#940338).
- x86, xsave: remove thread_has_fpu() bug check in __sanitize_i387_state() (bsc#904671, bsc#929360).
- x86-mm-send-tlb-flush-ipis-to-online-cpus-only.patch: x86, mm: Send tlb flush IPIs to online cpus only (bnc#798406).
- x86/mm: Improve AMD Bulldozer ASLR workaround (bsc#937032).
- x86/reboot: Fix a warning message triggered by stop_other_cpus() (bnc#930284).
- xen: Correctly re-enable interrupts in xen_spin_wait() (bsc#879878, bsc#908870).
- xfs: prevent deadlock trying to cover an active log (bsc#917093).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-20"/>
	<updated date="2015-08-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/798406">SUSE bug 798406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821931">SUSE bug 821931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860593">SUSE bug 860593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879878">SUSE bug 879878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891087">SUSE bug 891087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897995">SUSE bug 897995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898693">SUSE bug 898693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900881">SUSE bug 900881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904671">SUSE bug 904671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908870">SUSE bug 908870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909477">SUSE bug 909477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912916">SUSE bug 912916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914742">SUSE bug 914742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915200">SUSE bug 915200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915517">SUSE bug 915517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915577">SUSE bug 915577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916010">SUSE bug 916010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917093">SUSE bug 917093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917830">SUSE bug 917830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918333">SUSE bug 918333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919007">SUSE bug 919007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919018">SUSE bug 919018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919463">SUSE bug 919463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921769">SUSE bug 921769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922583">SUSE bug 922583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923245">SUSE bug 923245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926240">SUSE bug 926240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927257">SUSE bug 927257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928801">SUSE bug 928801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929148">SUSE bug 929148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929283">SUSE bug 929283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929360">SUSE bug 929360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929525">SUSE bug 929525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930284">SUSE bug 930284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930934">SUSE bug 930934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931474">SUSE bug 931474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933429">SUSE bug 933429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935705">SUSE bug 935705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936831">SUSE bug 936831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937032">SUSE bug 937032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937986">SUSE bug 937986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940338">SUSE bug 940338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940398">SUSE bug 940398</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8086/">CVE-2014-8086 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8086">CVE-2014-8086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8159/">CVE-2014-8159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8159">CVE-2014-8159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9683/">CVE-2014-9683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9683">CVE-2014-9683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0777/">CVE-2015-0777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0777">CVE-2015-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1420/">CVE-2015-1420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1420">CVE-2015-1420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1421/">CVE-2015-1421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1421">CVE-2015-1421 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2015-1805/">CVE-2015-1805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1805">CVE-2015-1805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2041/">CVE-2015-2041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2041">CVE-2015-2041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2042/">CVE-2015-2042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2042">CVE-2015-2042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2150/">CVE-2015-2150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2150">CVE-2015-2150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2830/">CVE-2015-2830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2830">CVE-2015-2830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2922/">CVE-2015-2922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2922">CVE-2015-2922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3331/">CVE-2015-3331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3331">CVE-2015-3331 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3636/">CVE-2015-3636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3636">CVE-2015-3636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4700/">CVE-2015-4700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4700">CVE-2015-4700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5364/">CVE-2015-5364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5364">CVE-2015-5364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5366/">CVE-2015-5366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5366">CVE-2015-5366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5707/">CVE-2015-5707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5707">CVE-2015-5707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576348" comment="kernel-default-3.0.101-0.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576349" comment="kernel-default-base-3.0.101-0.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576351" comment="kernel-default-man-3.0.101-0.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576352" comment="kernel-ec2-3.0.101-0.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576353" comment="kernel-ec2-base-3.0.101-0.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576355" comment="kernel-pae-3.0.101-0.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576356" comment="kernel-pae-base-3.0.101-0.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576358" comment="kernel-source-3.0.101-0.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576359" comment="kernel-syms-3.0.101-0.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576360" comment="kernel-trace-3.0.101-0.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576361" comment="kernel-trace-base-3.0.101-0.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576363" comment="kernel-xen-3.0.101-0.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576364" comment="kernel-xen-base-3.0.101-0.7.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218078" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="816446" ref_url="https://bugzilla.suse.com/816446" source="BUGZILLA"/>
		<reference ref_id="861093" ref_url="https://bugzilla.suse.com/861093" source="BUGZILLA"/>
		<reference ref_id="928130" ref_url="https://bugzilla.suse.com/928130" source="BUGZILLA"/>
		<reference ref_id="935757" ref_url="https://bugzilla.suse.com/935757" source="BUGZILLA"/>
		<reference ref_id="939826" ref_url="https://bugzilla.suse.com/939826" source="BUGZILLA"/>
		<reference ref_id="942367" ref_url="https://bugzilla.suse.com/942367" source="BUGZILLA"/>
		<reference ref_id="945825" ref_url="https://bugzilla.suse.com/945825" source="BUGZILLA"/>
		<reference ref_id="946117" ref_url="https://bugzilla.suse.com/946117" source="BUGZILLA"/>
		<reference ref_id="946309" ref_url="https://bugzilla.suse.com/946309" source="BUGZILLA"/>
		<reference ref_id="948562" ref_url="https://bugzilla.suse.com/948562" source="BUGZILLA"/>
		<reference ref_id="949744" ref_url="https://bugzilla.suse.com/949744" source="BUGZILLA"/>
		<reference ref_id="949936" ref_url="https://bugzilla.suse.com/949936" source="BUGZILLA"/>
		<reference ref_id="951440" ref_url="https://bugzilla.suse.com/951440" source="BUGZILLA"/>
		<reference ref_id="952384" ref_url="https://bugzilla.suse.com/952384" source="BUGZILLA"/>
		<reference ref_id="953527" ref_url="https://bugzilla.suse.com/953527" source="BUGZILLA"/>
		<reference ref_id="954404" ref_url="https://bugzilla.suse.com/954404" source="BUGZILLA"/>
		<reference ref_id="955354" ref_url="https://bugzilla.suse.com/955354" source="BUGZILLA"/>
		<reference ref_id="955654" ref_url="https://bugzilla.suse.com/955654" source="BUGZILLA"/>
		<reference ref_id="956708" ref_url="https://bugzilla.suse.com/956708" source="BUGZILLA"/>
		<reference ref_id="956709" ref_url="https://bugzilla.suse.com/956709" source="BUGZILLA"/>
		<reference ref_id="958463" ref_url="https://bugzilla.suse.com/958463" source="BUGZILLA"/>
		<reference ref_id="958886" ref_url="https://bugzilla.suse.com/958886" source="BUGZILLA"/>
		<reference ref_id="958951" ref_url="https://bugzilla.suse.com/958951" source="BUGZILLA"/>
		<reference ref_id="959190" ref_url="https://bugzilla.suse.com/959190" source="BUGZILLA"/>
		<reference ref_id="959399" ref_url="https://bugzilla.suse.com/959399" source="BUGZILLA"/>
		<reference ref_id="961500" ref_url="https://bugzilla.suse.com/961500" source="BUGZILLA"/>
		<reference ref_id="961509" ref_url="https://bugzilla.suse.com/961509" source="BUGZILLA"/>
		<reference ref_id="961512" ref_url="https://bugzilla.suse.com/961512" source="BUGZILLA"/>
		<reference ref_id="963765" ref_url="https://bugzilla.suse.com/963765" source="BUGZILLA"/>
		<reference ref_id="963767" ref_url="https://bugzilla.suse.com/963767" source="BUGZILLA"/>
		<reference ref_id="964201" ref_url="https://bugzilla.suse.com/964201" source="BUGZILLA"/>
		<reference ref_id="966437" ref_url="https://bugzilla.suse.com/966437" source="BUGZILLA"/>
		<reference ref_id="966460" ref_url="https://bugzilla.suse.com/966460" source="BUGZILLA"/>
		<reference ref_id="966662" ref_url="https://bugzilla.suse.com/966662" source="BUGZILLA"/>
		<reference ref_id="966693" ref_url="https://bugzilla.suse.com/966693" source="BUGZILLA"/>
		<reference ref_id="967972" ref_url="https://bugzilla.suse.com/967972" source="BUGZILLA"/>
		<reference ref_id="967973" ref_url="https://bugzilla.suse.com/967973" source="BUGZILLA"/>
		<reference ref_id="967974" ref_url="https://bugzilla.suse.com/967974" source="BUGZILLA"/>
		<reference ref_id="967975" ref_url="https://bugzilla.suse.com/967975" source="BUGZILLA"/>
		<reference ref_id="968010" ref_url="https://bugzilla.suse.com/968010" source="BUGZILLA"/>
		<reference ref_id="968011" ref_url="https://bugzilla.suse.com/968011" source="BUGZILLA"/>
		<reference ref_id="968012" ref_url="https://bugzilla.suse.com/968012" source="BUGZILLA"/>
		<reference ref_id="968013" ref_url="https://bugzilla.suse.com/968013" source="BUGZILLA"/>
		<reference ref_id="968670" ref_url="https://bugzilla.suse.com/968670" source="BUGZILLA"/>
		<reference ref_id="970504" ref_url="https://bugzilla.suse.com/970504" source="BUGZILLA"/>
		<reference ref_id="970892" ref_url="https://bugzilla.suse.com/970892" source="BUGZILLA"/>
		<reference ref_id="970909" ref_url="https://bugzilla.suse.com/970909" source="BUGZILLA"/>
		<reference ref_id="970911" ref_url="https://bugzilla.suse.com/970911" source="BUGZILLA"/>
		<reference ref_id="970948" ref_url="https://bugzilla.suse.com/970948" source="BUGZILLA"/>
		<reference ref_id="970956" ref_url="https://bugzilla.suse.com/970956" source="BUGZILLA"/>
		<reference ref_id="970958" ref_url="https://bugzilla.suse.com/970958" source="BUGZILLA"/>
		<reference ref_id="970970" ref_url="https://bugzilla.suse.com/970970" source="BUGZILLA"/>
		<reference ref_id="971124" ref_url="https://bugzilla.suse.com/971124" source="BUGZILLA"/>
		<reference ref_id="971125" ref_url="https://bugzilla.suse.com/971125" source="BUGZILLA"/>
		<reference ref_id="971126" ref_url="https://bugzilla.suse.com/971126" source="BUGZILLA"/>
		<reference ref_id="971360" ref_url="https://bugzilla.suse.com/971360" source="BUGZILLA"/>
		<reference ref_id="972510" ref_url="https://bugzilla.suse.com/972510" source="BUGZILLA"/>
		<reference ref_id="973570" ref_url="https://bugzilla.suse.com/973570" source="BUGZILLA"/>
		<reference ref_id="975945" ref_url="https://bugzilla.suse.com/975945" source="BUGZILLA"/>
		<reference ref_id="977847" ref_url="https://bugzilla.suse.com/977847" source="BUGZILLA"/>
		<reference ref_id="978822" ref_url="https://bugzilla.suse.com/978822" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2015" ref_url="https://www.suse.com/security/cve/CVE-2013-2015/" source="CVE"/>
		<reference ref_id="CVE-2013-7446" ref_url="https://www.suse.com/security/cve/CVE-2013-7446/" source="CVE"/>
		<reference ref_id="CVE-2015-0272" ref_url="https://www.suse.com/security/cve/CVE-2015-0272/" source="CVE"/>
		<reference ref_id="CVE-2015-3339" ref_url="https://www.suse.com/security/cve/CVE-2015-3339/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6252" ref_url="https://www.suse.com/security/cve/CVE-2015-6252/" source="CVE"/>
		<reference ref_id="CVE-2015-6937" ref_url="https://www.suse.com/security/cve/CVE-2015-6937/" source="CVE"/>
		<reference ref_id="CVE-2015-7509" ref_url="https://www.suse.com/security/cve/CVE-2015-7509/" source="CVE"/>
		<reference ref_id="CVE-2015-7515" ref_url="https://www.suse.com/security/cve/CVE-2015-7515/" source="CVE"/>
		<reference ref_id="CVE-2015-7550" ref_url="https://www.suse.com/security/cve/CVE-2015-7550/" source="CVE"/>
		<reference ref_id="CVE-2015-7566" ref_url="https://www.suse.com/security/cve/CVE-2015-7566/" source="CVE"/>
		<reference ref_id="CVE-2015-7799" ref_url="https://www.suse.com/security/cve/CVE-2015-7799/" source="CVE"/>
		<reference ref_id="CVE-2015-7872" ref_url="https://www.suse.com/security/cve/CVE-2015-7872/" source="CVE"/>
		<reference ref_id="CVE-2015-7990" ref_url="https://www.suse.com/security/cve/CVE-2015-7990/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8215" ref_url="https://www.suse.com/security/cve/CVE-2015-8215/" source="CVE"/>
		<reference ref_id="CVE-2015-8539" ref_url="https://www.suse.com/security/cve/CVE-2015-8539/" source="CVE"/>
		<reference ref_id="CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543/" source="CVE"/>
		<reference ref_id="CVE-2015-8569" ref_url="https://www.suse.com/security/cve/CVE-2015-8569/" source="CVE"/>
		<reference ref_id="CVE-2015-8575" ref_url="https://www.suse.com/security/cve/CVE-2015-8575/" source="CVE"/>
		<reference ref_id="CVE-2015-8767" ref_url="https://www.suse.com/security/cve/CVE-2015-8767/" source="CVE"/>
		<reference ref_id="CVE-2015-8785" ref_url="https://www.suse.com/security/cve/CVE-2015-8785/" source="CVE"/>
		<reference ref_id="CVE-2015-8812" ref_url="https://www.suse.com/security/cve/CVE-2015-8812/" source="CVE"/>
		<reference ref_id="CVE-2015-8816" ref_url="https://www.suse.com/security/cve/CVE-2015-8816/" source="CVE"/>
		<reference ref_id="CVE-2016-0723" ref_url="https://www.suse.com/security/cve/CVE-2016-0723/" source="CVE"/>
		<reference ref_id="CVE-2016-2069" ref_url="https://www.suse.com/security/cve/CVE-2016-2069/" source="CVE"/>
		<reference ref_id="CVE-2016-2143" ref_url="https://www.suse.com/security/cve/CVE-2016-2143/" source="CVE"/>
		<reference ref_id="CVE-2016-2184" ref_url="https://www.suse.com/security/cve/CVE-2016-2184/" source="CVE"/>
		<reference ref_id="CVE-2016-2185" ref_url="https://www.suse.com/security/cve/CVE-2016-2185/" source="CVE"/>
		<reference ref_id="CVE-2016-2186" ref_url="https://www.suse.com/security/cve/CVE-2016-2186/" source="CVE"/>
		<reference ref_id="CVE-2016-2188" ref_url="https://www.suse.com/security/cve/CVE-2016-2188/" source="CVE"/>
		<reference ref_id="CVE-2016-2384" ref_url="https://www.suse.com/security/cve/CVE-2016-2384/" source="CVE"/>
		<reference ref_id="CVE-2016-2543" ref_url="https://www.suse.com/security/cve/CVE-2016-2543/" source="CVE"/>
		<reference ref_id="CVE-2016-2544" ref_url="https://www.suse.com/security/cve/CVE-2016-2544/" source="CVE"/>
		<reference ref_id="CVE-2016-2545" ref_url="https://www.suse.com/security/cve/CVE-2016-2545/" source="CVE"/>
		<reference ref_id="CVE-2016-2546" ref_url="https://www.suse.com/security/cve/CVE-2016-2546/" source="CVE"/>
		<reference ref_id="CVE-2016-2547" ref_url="https://www.suse.com/security/cve/CVE-2016-2547/" source="CVE"/>
		<reference ref_id="CVE-2016-2548" ref_url="https://www.suse.com/security/cve/CVE-2016-2548/" source="CVE"/>
		<reference ref_id="CVE-2016-2549" ref_url="https://www.suse.com/security/cve/CVE-2016-2549/" source="CVE"/>
		<reference ref_id="CVE-2016-2782" ref_url="https://www.suse.com/security/cve/CVE-2016-2782/" source="CVE"/>
		<reference ref_id="CVE-2016-2847" ref_url="https://www.suse.com/security/cve/CVE-2016-2847/" source="CVE"/>
		<reference ref_id="CVE-2016-3134" ref_url="https://www.suse.com/security/cve/CVE-2016-3134/" source="CVE"/>
		<reference ref_id="CVE-2016-3137" ref_url="https://www.suse.com/security/cve/CVE-2016-3137/" source="CVE"/>
		<reference ref_id="CVE-2016-3138" ref_url="https://www.suse.com/security/cve/CVE-2016-3138/" source="CVE"/>
		<reference ref_id="CVE-2016-3139" ref_url="https://www.suse.com/security/cve/CVE-2016-3139/" source="CVE"/>
		<reference ref_id="CVE-2016-3140" ref_url="https://www.suse.com/security/cve/CVE-2016-3140/" source="CVE"/>
		<reference ref_id="CVE-2016-3156" ref_url="https://www.suse.com/security/cve/CVE-2016-3156/" source="CVE"/>
		<reference ref_id="CVE-2016-4486" ref_url="https://www.suse.com/security/cve/CVE-2016-4486/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP2 kernel was updated to receive various security and bug fixes.

The following security bugs were fixed:
- CVE-2016-4486: Fixed 4 byte information leak in net/core/rtnetlink.c (bsc#978822).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).
- CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948).
- CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956).
- CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911).
- CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970).
- CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892).
- CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958).
- CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124).
- CVE-2016-3156: The IPv4 implementation in the Linux kernel mishandles destruction of device objects, which allowed guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses (bnc#971360).
- CVE-2016-2184: The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971125).
- CVE-2016-3139: The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970909).
- CVE-2016-2143: The fork implementation in the Linux kernel on s390 platforms mishandled the case of four page-table levels, which allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h (bnc#970504).
- CVE-2016-2782: The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint (bnc#968670).
- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bnc#968010).
- CVE-2015-7566: The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a bulk-out endpoint (bnc#961512).
- CVE-2016-2549: sound/core/hrtimer.c in the Linux kernel did not prevent recursive callback access, which allowed local users to cause a denial of service (deadlock) via a crafted ioctl call (bnc#968013).
- CVE-2016-2547: sound/core/timer.c in the Linux kernel employed a locking approach that did not consider slave timer instances, which allowed local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call (bnc#968011).
- CVE-2016-2548: sound/core/timer.c in the Linux kernel retained certain linked lists after a close or stop action, which allowed local users to cause a denial of service (system crash) via a crafted ioctl call, related to the (1) snd_timer_close and (2) _snd_timer_stop functions (bnc#968012).
- CVE-2016-2546: sound/core/timer.c in the Linux kernel used an incorrect type of mutex, which allowed local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call (bnc#967975).
- CVE-2016-2545: The snd_timer_interrupt function in sound/core/timer.c in the Linux kernel did not properly maintain a certain linked list, which allowed local users to cause a denial of service (race condition and system crash) via a crafted ioctl call (bnc#967974).
- CVE-2016-2544: Race condition in the queue_delete function in sound/core/seq/seq_queue.c in the Linux kernel allowed local users to cause a denial of service (use-after-free and system crash) by making an ioctl call at a certain time (bnc#967973).
- CVE-2016-2543: The snd_seq_ioctl_remove_events function in sound/core/seq/seq_clientmgr.c in the Linux kernel did not verify FIFO assignment before proceeding with FIFO clearing, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted ioctl call (bnc#967972).
- CVE-2016-2384: Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor (bnc#966693).
- CVE-2015-8812: drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel did not properly identify error conditions, which allowed remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets (bnc#966437).
- CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel allowed local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov (bnc#963765).
- CVE-2016-2069: Race condition in arch/x86/mm/tlb.c in the Linux kernel .4.1 allowed local users to gain privileges by triggering access to a paging structure by a different CPU (bnc#963767).
- CVE-2016-0723: Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call (bnc#961500).
- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls (bnc#955654).
- CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel did not properly manage the relationship between a lock and a socket, which allowed local users to cause a denial of service (deadlock) via a crafted sctp_accept call (bnc#961509).
- CVE-2015-7515: The aiptek_probe function in drivers/input/tablet/aiptek.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device that lacks endpoints (bnc#956708).
- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel did not validate attempted changes to the MTU value, which allowed context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272 (bnc#955354).
- CVE-2015-7550: The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel did not properly use a semaphore, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls (bnc#958951).
- CVE-2015-8569: The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel did not verify an address length, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application (bnc#959190).
- CVE-2015-8575: The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel did not verify an address length, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application (bnc#959399).
- CVE-2015-8543: The networking implementation in the Linux kernel did not validate protocol identifiers for certain protocol families, which allowed local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application (bnc#958886).
- CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c (bnc#958463).
- CVE-2015-7509: fs/ext4/namei.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) via a crafted no-journal filesystem, a related issue to CVE-2013-2015 (bnc#956709).
- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel did not ensure that certain slot numbers are valid, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call (bnc#949936).
- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).
- CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c (bnc#953527).
- CVE-2015-7990: Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bnc#952384).
- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel allowed local users to cause a denial of service (OOPS) via crafted keyctl commands (bnc#951440).
- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bnc#945825).
- CVE-2015-6252: The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation (bnc#942367).
- CVE-2015-3339: Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel allowed local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but the setuid bit is not yet stripped (bnc#928130).

The following non-security bugs were fixed:
- Fix handling of re-write-before-commit for mmapped NFS pages (bsc#964201).
- Fix lpfc_send_rscn_event allocation size claims bnc#935757
- Fix ntpd clock synchronization in Xen PV domains (bnc#816446).
- Fix vmalloc_fault oops during lazy MMU updates (bsc#948562).
- Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).
- SCSI: bfa: Fix to handle firmware tskim abort request response (bsc#972510).
- USB: usbip: fix potential out-of-bounds write (bnc#975945).
- af_unix: Guard against other == sk in unix_dgram_sendmsg (bsc#973570).
- dm-snap: avoid deadock on s-&gt;lock when a read is split (bsc#939826).
- mm/hugetlb: check for pte NULL pointer in __page_check_address() (bsc#977847).
- nf_conntrack: fix bsc#758540 kabi fix (bsc#946117).
- privcmd: allow preempting long running user-mode originating hypercalls (bnc#861093).
- s390/cio: collect format 1 channel-path description data (bsc#966460, bsc#966662).
- s390/cio: ensure consistent measurement state (bsc#966460, bsc#966662).
- s390/cio: fix measurement characteristics memleak (bsc#966460, bsc#966662).
- s390/cio: update measurement characteristics (bsc#966460, bsc#966662).
- xfs: Fix lost direct IO write in the last block (bsc#949744).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-15"/>
	<updated date="2016-08-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/816446">SUSE bug 816446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861093">SUSE bug 861093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928130">SUSE bug 928130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935757">SUSE bug 935757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939826">SUSE bug 939826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942367">SUSE bug 942367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945825">SUSE bug 945825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946117">SUSE bug 946117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946309">SUSE bug 946309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948562">SUSE bug 948562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949744">SUSE bug 949744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949936">SUSE bug 949936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951440">SUSE bug 951440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952384">SUSE bug 952384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955354">SUSE bug 955354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955654">SUSE bug 955654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956708">SUSE bug 956708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956709">SUSE bug 956709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958463">SUSE bug 958463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958886">SUSE bug 958886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958951">SUSE bug 958951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959190">SUSE bug 959190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959399">SUSE bug 959399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961500">SUSE bug 961500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961509">SUSE bug 961509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961512">SUSE bug 961512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963765">SUSE bug 963765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963767">SUSE bug 963767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964201">SUSE bug 964201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966437">SUSE bug 966437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966460">SUSE bug 966460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966662">SUSE bug 966662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966693">SUSE bug 966693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967972">SUSE bug 967972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967973">SUSE bug 967973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967974">SUSE bug 967974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967975">SUSE bug 967975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968010">SUSE bug 968010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968011">SUSE bug 968011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968012">SUSE bug 968012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968013">SUSE bug 968013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968670">SUSE bug 968670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970504">SUSE bug 970504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970892">SUSE bug 970892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970909">SUSE bug 970909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970911">SUSE bug 970911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970948">SUSE bug 970948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970956">SUSE bug 970956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970958">SUSE bug 970958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970970">SUSE bug 970970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971124">SUSE bug 971124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971125">SUSE bug 971125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971126">SUSE bug 971126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971360">SUSE bug 971360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972510">SUSE bug 972510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973570">SUSE bug 973570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975945">SUSE bug 975945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977847">SUSE bug 977847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978822">SUSE bug 978822</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2015/">CVE-2013-2015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2015">CVE-2013-2015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7446/">CVE-2013-7446 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7446">CVE-2013-7446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0272/">CVE-2015-0272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0272">CVE-2015-0272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3339/">CVE-2015-3339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3339">CVE-2015-3339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5307">CVE-2015-5307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6252/">CVE-2015-6252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6252">CVE-2015-6252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6937/">CVE-2015-6937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6937">CVE-2015-6937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7509/">CVE-2015-7509 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7509">CVE-2015-7509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7515/">CVE-2015-7515 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7515">CVE-2015-7515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7550/">CVE-2015-7550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7550">CVE-2015-7550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7566/">CVE-2015-7566 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7566">CVE-2015-7566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7799/">CVE-2015-7799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7799">CVE-2015-7799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7872/">CVE-2015-7872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7872">CVE-2015-7872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7990/">CVE-2015-7990 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7990">CVE-2015-7990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8104">CVE-2015-8104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8215/">CVE-2015-8215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8215">CVE-2015-8215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8539/">CVE-2015-8539 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8539">CVE-2015-8539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8543">CVE-2015-8543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8569/">CVE-2015-8569 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8569">CVE-2015-8569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8575/">CVE-2015-8575 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8575">CVE-2015-8575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8767/">CVE-2015-8767 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8767">CVE-2015-8767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8785/">CVE-2015-8785 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8785">CVE-2015-8785 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8812/">CVE-2015-8812 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8812">CVE-2015-8812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8816/">CVE-2015-8816 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8816">CVE-2015-8816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0723/">CVE-2016-0723 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0723">CVE-2016-0723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2069/">CVE-2016-2069 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2069">CVE-2016-2069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2143/">CVE-2016-2143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2143">CVE-2016-2143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2184/">CVE-2016-2184 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2184">CVE-2016-2184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2185/">CVE-2016-2185 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2185">CVE-2016-2185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2186/">CVE-2016-2186 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2186">CVE-2016-2186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2188/">CVE-2016-2188 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2188">CVE-2016-2188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2384/">CVE-2016-2384 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2384">CVE-2016-2384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2543/">CVE-2016-2543 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2543">CVE-2016-2543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2544/">CVE-2016-2544 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2544">CVE-2016-2544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2545/">CVE-2016-2545 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2545">CVE-2016-2545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2546/">CVE-2016-2546 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2546">CVE-2016-2546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2547/">CVE-2016-2547 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2547">CVE-2016-2547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2548/">CVE-2016-2548 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2548">CVE-2016-2548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2549/">CVE-2016-2549 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2549">CVE-2016-2549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2782/">CVE-2016-2782 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2782">CVE-2016-2782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2847/">CVE-2016-2847 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2847">CVE-2016-2847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3134/">CVE-2016-3134 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3134">CVE-2016-3134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3137/">CVE-2016-3137 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3137">CVE-2016-3137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3138/">CVE-2016-3138 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3138">CVE-2016-3138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3139/">CVE-2016-3139 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3139">CVE-2016-3139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3140/">CVE-2016-3140 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3140">CVE-2016-3140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3156/">CVE-2016-3156 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3156">CVE-2016-3156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4486/">CVE-2016-4486 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4486">CVE-2016-4486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576366" comment="kernel-default-3.0.101-0.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576367" comment="kernel-default-base-3.0.101-0.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576369" comment="kernel-default-man-3.0.101-0.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576370" comment="kernel-ec2-3.0.101-0.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576371" comment="kernel-ec2-base-3.0.101-0.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576373" comment="kernel-pae-3.0.101-0.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576374" comment="kernel-pae-base-3.0.101-0.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576376" comment="kernel-source-3.0.101-0.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576377" comment="kernel-syms-3.0.101-0.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576378" comment="kernel-trace-3.0.101-0.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576379" comment="kernel-trace-base-3.0.101-0.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576381" comment="kernel-xen-3.0.101-0.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576382" comment="kernel-xen-base-3.0.101-0.7.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218079" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1004418" ref_url="https://bugzilla.suse.com/1004418" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5195" ref_url="https://www.suse.com/security/cve/CVE-2016-5195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002347.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP2 LTSS kernel was updated to fix one security issue.

This security bug was fixed:

- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-21"/>
	<updated date="2016-10-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1004418">SUSE bug 1004418</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5195/">CVE-2016-5195 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5195">CVE-2016-5195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576384" comment="kernel-default-3.0.101-0.7.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576385" comment="kernel-default-base-3.0.101-0.7.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576387" comment="kernel-default-man-3.0.101-0.7.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576388" comment="kernel-ec2-3.0.101-0.7.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576389" comment="kernel-ec2-base-3.0.101-0.7.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576391" comment="kernel-pae-3.0.101-0.7.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576392" comment="kernel-pae-base-3.0.101-0.7.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576394" comment="kernel-source-3.0.101-0.7.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576395" comment="kernel-syms-3.0.101-0.7.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576396" comment="kernel-trace-3.0.101-0.7.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576397" comment="kernel-trace-base-3.0.101-0.7.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576399" comment="kernel-xen-3.0.101-0.7.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576400" comment="kernel-xen-base-3.0.101-0.7.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218080" version="1" class="patch">
	<metadata>
		<title>Security update for krb5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="787272" ref_url="https://bugzilla.suse.com/787272" source="BUGZILLA"/>
		<reference ref_id="806715" ref_url="https://bugzilla.suse.com/806715" source="BUGZILLA"/>
		<reference ref_id="825985" ref_url="https://bugzilla.suse.com/825985" source="BUGZILLA"/>
		<reference ref_id="849240" ref_url="https://bugzilla.suse.com/849240" source="BUGZILLA"/>
		<reference ref_id="CVE-2002-2443" ref_url="https://www.suse.com/security/cve/CVE-2002-2443/" source="CVE"/>
		<reference ref_id="CVE-2013-1415" ref_url="https://www.suse.com/security/cve/CVE-2013-1415/" source="CVE"/>
		<reference ref_id="CVE-2013-1418" ref_url="https://www.suse.com/security/cve/CVE-2013-1418/" source="CVE"/>
		<description>

This update for krb5 fixes the following security issue:

    * If a KDC serves multiple realms, certain requests could cause
      setup_server_realm() to dereference a null pointer, crashing the KDC.
      (CVE-2013-1418)

Security Issues:

    * CVE-2013-1418
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1418&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-08"/>
	<updated date="2013-11-08"/>
	<bugzilla href="https://bugzilla.suse.com/787272">SUSE bug 787272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806715">SUSE bug 806715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825985">SUSE bug 825985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849240">SUSE bug 849240</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2002-2443/">CVE-2002-2443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2002-2443">CVE-2002-2443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1415/">CVE-2013-1415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1415">CVE-2013-1415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1418/">CVE-2013-1418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1418">CVE-2013-1418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576402" comment="krb5-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576403" comment="krb5-32bit-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576404" comment="krb5-apps-clients-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576405" comment="krb5-apps-servers-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576406" comment="krb5-client-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576407" comment="krb5-doc-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576408" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576409" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576410" comment="krb5-server-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576411" comment="krb5-x86-1.6.3-133.49.58.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576402" comment="krb5-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576403" comment="krb5-32bit-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576404" comment="krb5-apps-clients-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576405" comment="krb5-apps-servers-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576406" comment="krb5-client-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576407" comment="krb5-doc-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576408" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576409" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576410" comment="krb5-server-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576411" comment="krb5-x86-1.6.3-133.49.58.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218081" version="1" class="patch">
	<metadata>
		<title>Security update for KVM</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="709405" ref_url="https://bugzilla.suse.com/709405" source="BUGZILLA"/>
		<reference ref_id="712137" ref_url="https://bugzilla.suse.com/712137" source="BUGZILLA"/>
		<reference ref_id="722643" ref_url="https://bugzilla.suse.com/722643" source="BUGZILLA"/>
		<reference ref_id="722958" ref_url="https://bugzilla.suse.com/722958" source="BUGZILLA"/>
		<reference ref_id="724813" ref_url="https://bugzilla.suse.com/724813" source="BUGZILLA"/>
		<reference ref_id="725008" ref_url="https://bugzilla.suse.com/725008" source="BUGZILLA"/>
		<reference ref_id="747339" ref_url="https://bugzilla.suse.com/747339" source="BUGZILLA"/>
		<reference ref_id="753313" ref_url="https://bugzilla.suse.com/753313" source="BUGZILLA"/>
		<reference ref_id="757031" ref_url="https://bugzilla.suse.com/757031" source="BUGZILLA"/>
		<reference ref_id="764526" ref_url="https://bugzilla.suse.com/764526" source="BUGZILLA"/>
		<reference ref_id="770153" ref_url="https://bugzilla.suse.com/770153" source="BUGZILLA"/>
		<reference ref_id="772586" ref_url="https://bugzilla.suse.com/772586" source="BUGZILLA"/>
		<reference ref_id="777084" ref_url="https://bugzilla.suse.com/777084" source="BUGZILLA"/>
		<reference ref_id="786813" ref_url="https://bugzilla.suse.com/786813" source="BUGZILLA"/>
		<reference ref_id="818182" ref_url="https://bugzilla.suse.com/818182" source="BUGZILLA"/>
		<reference ref_id="824340" ref_url="https://bugzilla.suse.com/824340" source="BUGZILLA"/>
		<reference ref_id="834196" ref_url="https://bugzilla.suse.com/834196" source="BUGZILLA"/>
		<reference ref_id="929339" ref_url="https://bugzilla.suse.com/929339" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2652" ref_url="https://www.suse.com/security/cve/CVE-2012-2652/" source="CVE"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<reference ref_id="CVE-2013-2007" ref_url="https://www.suse.com/security/cve/CVE-2013-2007/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001407.html" source="SUSE-SU"/>
		<description>

This update fixes a file permission issue with qga (the QEMU Guest Agent) 
from the qemu/kvm package and includes several bug-fixes.

(bnc#818182) (CVE-2013-2007) (bnc#786813) (bnc#725008) (bnc#712137) 
(bnc#824340)

Security Issues:

    * CVE-2013-2007
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2007&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-24"/>
	<updated date="2013-06-24"/>
	<bugzilla href="https://bugzilla.suse.com/709405">SUSE bug 709405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/712137">SUSE bug 712137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/722643">SUSE bug 722643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/722958">SUSE bug 722958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/724813">SUSE bug 724813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/725008">SUSE bug 725008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747339">SUSE bug 747339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/753313">SUSE bug 753313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757031">SUSE bug 757031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/764526">SUSE bug 764526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770153">SUSE bug 770153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772586">SUSE bug 772586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777084">SUSE bug 777084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786813">SUSE bug 786813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818182">SUSE bug 818182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824340">SUSE bug 824340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834196">SUSE bug 834196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929339">SUSE bug 929339</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2652/">CVE-2012-2652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2652">CVE-2012-2652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3515">CVE-2012-3515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2007/">CVE-2013-2007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2007">CVE-2013-2007 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3456">CVE-2015-3456 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566058" comment="kvm-0.15.1-0.27.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566058" comment="kvm-0.15.1-0.27.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566058" comment="kvm-0.15.1-0.27.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218082" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="932770" ref_url="https://bugzilla.suse.com/932770" source="BUGZILLA"/>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001550.html" source="SUSE-SU"/>
		<description>
kvm was updated to fix two security issues.

The following vulnerabilities were fixed:

- CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344).
- CVE-2015-3209: Fix buffer overflow in pcnet emulation (bsc#932770).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-07"/>
	<updated date="2015-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/932770">SUSE bug 932770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3209">CVE-2015-3209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5154">CVE-2015-5154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576412" comment="kvm-0.15.1-0.32.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218083" version="1" class="patch">
	<metadata>
		<title>Security update for lcms</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="843716" ref_url="https://bugzilla.suse.com/843716" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4276" ref_url="https://www.suse.com/security/cve/CVE-2013-4276/" source="CVE"/>
		<description>

The lcms userland utilities were updated to fix stack overflows.

    * CVE-2013-4276: Multiple stack-based buffer overflows in LittleCMS
      allowed remote attackers to cause a denial of service (crash) via a
      crafted (1) ICC color profile to the icctrans utility or (2) TIFF
      image to the tiffdiff utility.

Security Issues:

    * CVE-2013-4276
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4276&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-08"/>
	<updated date="2013-10-08"/>
	<bugzilla href="https://bugzilla.suse.com/843716">SUSE bug 843716</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4276/">CVE-2013-4276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4276">CVE-2013-4276 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576413" comment="lcms-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576414" comment="liblcms1-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576415" comment="liblcms1-32bit-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576416" comment="liblcms1-x86-1.17-77.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576413" comment="lcms-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576414" comment="liblcms1-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576415" comment="liblcms1-32bit-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576416" comment="liblcms1-x86-1.17-77.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218084" version="1" class="patch">
	<metadata>
		<title>Security update for Samba</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="732395" ref_url="https://bugzilla.suse.com/732395" source="BUGZILLA"/>
		<reference ref_id="732572" ref_url="https://bugzilla.suse.com/732572" source="BUGZILLA"/>
		<reference ref_id="741854" ref_url="https://bugzilla.suse.com/741854" source="BUGZILLA"/>
		<reference ref_id="743986" ref_url="https://bugzilla.suse.com/743986" source="BUGZILLA"/>
		<reference ref_id="746825" ref_url="https://bugzilla.suse.com/746825" source="BUGZILLA"/>
		<reference ref_id="747934" ref_url="https://bugzilla.suse.com/747934" source="BUGZILLA"/>
		<reference ref_id="751454" ref_url="https://bugzilla.suse.com/751454" source="BUGZILLA"/>
		<reference ref_id="752797" ref_url="https://bugzilla.suse.com/752797" source="BUGZILLA"/>
		<reference ref_id="757080" ref_url="https://bugzilla.suse.com/757080" source="BUGZILLA"/>
		<reference ref_id="757576" ref_url="https://bugzilla.suse.com/757576" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0817" ref_url="https://www.suse.com/security/cve/CVE-2012-0817/" source="CVE"/>
		<reference ref_id="CVE-2012-0870" ref_url="https://www.suse.com/security/cve/CVE-2012-0870/" source="CVE"/>
		<reference ref_id="CVE-2012-1182" ref_url="https://www.suse.com/security/cve/CVE-2012-1182/" source="CVE"/>
		<reference ref_id="CVE-2012-2111" ref_url="https://www.suse.com/security/cve/CVE-2012-2111/" source="CVE"/>
		<description>

This update of Samba fixes one security issue and several bugs.

The security fix is:

    * Ensure that users cannot hand out their own privileges to everyone,
      only administrators are allowed to do that. (CVE-2012-2111
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2111&gt; )

The non-security bug fixes merged from upstream Samba are:

    * Fix default name resolve order. (docs-xml, bso#7564).
    * Fix a segfault in vfs_aio_fork. (s3-aio-fork, bso#8836).
    * Remove whitespace in example samba.ldif. (docs, bso#8789)
    * Move print_backend_init() behind init_system_info(). (s3-smbd,
      bso#8845)
    * Prepend '/' to filename argument. (s3-docs, bso#8826)

		</description>
<advisory from="security@suse.de">
	<issued date="2012-04-24"/>
	<updated date="2012-04-24"/>
	<bugzilla href="https://bugzilla.suse.com/732395">SUSE bug 732395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/732572">SUSE bug 732572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/741854">SUSE bug 741854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/743986">SUSE bug 743986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746825">SUSE bug 746825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747934">SUSE bug 747934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751454">SUSE bug 751454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752797">SUSE bug 752797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757080">SUSE bug 757080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757576">SUSE bug 757576</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0817/">CVE-2012-0817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0817">CVE-2012-0817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0870/">CVE-2012-0870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0870">CVE-2012-0870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1182/">CVE-2012-1182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1182">CVE-2012-1182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2111/">CVE-2012-2111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2111">CVE-2012-2111 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576417" comment="ldapsmb-1.34b-12.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576418" comment="libldb1-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576419" comment="libsmbclient0-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576420" comment="libsmbclient0-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576421" comment="libsmbclient0-x86-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576422" comment="libtalloc2-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576423" comment="libtalloc2-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576424" comment="libtalloc2-x86-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576425" comment="libtdb1-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576426" comment="libtdb1-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576427" comment="libtdb1-x86-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576428" comment="libtevent0-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576429" comment="libwbclient0-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576430" comment="libwbclient0-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576431" comment="libwbclient0-x86-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576432" comment="samba-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576433" comment="samba-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576434" comment="samba-client-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576435" comment="samba-client-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576436" comment="samba-client-x86-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566078" comment="samba-doc-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576437" comment="samba-krb-printing-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576438" comment="samba-winbind-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576439" comment="samba-winbind-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576440" comment="samba-winbind-x86-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576441" comment="samba-x86-3.6.3-0.24.4 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576417" comment="ldapsmb-1.34b-12.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576418" comment="libldb1-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576419" comment="libsmbclient0-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576420" comment="libsmbclient0-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576421" comment="libsmbclient0-x86-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576422" comment="libtalloc2-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576423" comment="libtalloc2-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576424" comment="libtalloc2-x86-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576425" comment="libtdb1-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576426" comment="libtdb1-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576427" comment="libtdb1-x86-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576428" comment="libtevent0-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576429" comment="libwbclient0-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576430" comment="libwbclient0-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576431" comment="libwbclient0-x86-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576432" comment="samba-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576433" comment="samba-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576434" comment="samba-client-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576435" comment="samba-client-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576436" comment="samba-client-x86-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566078" comment="samba-doc-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576437" comment="samba-krb-printing-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576438" comment="samba-winbind-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576439" comment="samba-winbind-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576440" comment="samba-winbind-x86-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576441" comment="samba-x86-3.6.3-0.24.4 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218085" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="779952" ref_url="https://bugzilla.suse.com/779952" source="BUGZILLA"/>
		<reference ref_id="784197" ref_url="https://bugzilla.suse.com/784197" source="BUGZILLA"/>
		<reference ref_id="797006" ref_url="https://bugzilla.suse.com/797006" source="BUGZILLA"/>
		<reference ref_id="802634" ref_url="https://bugzilla.suse.com/802634" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-0254" ref_url="https://www.suse.com/security/cve/CVE-2013-0254/" source="CVE"/>
		<description>

libqt4 has been updated to fix several security issues.

    * An information disclosure via QSharedMemory was fixed which allowed
      local attackers to read information (e.g. bitmap content) from the
      attacked user (CVE-2013-0254).
    * openssl-incompatibility-fix.diff: Fix wrong error reporting when
      using a binary incompatible version of openSSL (bnc#797006,
      CVE-2012-6093)
    * Various compromised SSL root certificates were blacklisted.

Also a non-security bugfix has been applied:

    * Add fix for qdbusviewer not matching args (bnc#784197)

Security Issue reference:

    * CVE-2013-0254
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0254&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-01"/>
	<updated date="2013-03-01"/>
	<bugzilla href="https://bugzilla.suse.com/779952">SUSE bug 779952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784197">SUSE bug 784197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797006">SUSE bug 797006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802634">SUSE bug 802634</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4929">CVE-2012-4929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0254/">CVE-2013-0254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0254">CVE-2013-0254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576442" comment="libQtWebKit4-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562975" comment="libQtWebKit4-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562976" comment="libQtWebKit4-x86-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576443" comment="libqt4-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576444" comment="libqt4-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576445" comment="libqt4-qt3support-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576446" comment="libqt4-qt3support-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576447" comment="libqt4-qt3support-x86-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576448" comment="libqt4-sql-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576449" comment="libqt4-sql-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576450" comment="libqt4-sql-mysql-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576451" comment="libqt4-sql-sqlite-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576452" comment="libqt4-sql-x86-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576453" comment="libqt4-x11-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576454" comment="libqt4-x11-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576455" comment="libqt4-x11-x86-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576456" comment="libqt4-x86-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576457" comment="qt4-x11-tools-4.6.3-5.20.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576442" comment="libQtWebKit4-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562975" comment="libQtWebKit4-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562976" comment="libQtWebKit4-x86-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576443" comment="libqt4-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576444" comment="libqt4-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576445" comment="libqt4-qt3support-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576446" comment="libqt4-qt3support-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576447" comment="libqt4-qt3support-x86-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576448" comment="libqt4-sql-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576449" comment="libqt4-sql-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576450" comment="libqt4-sql-mysql-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576451" comment="libqt4-sql-sqlite-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576452" comment="libqt4-sql-x86-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576453" comment="libqt4-x11-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576454" comment="libqt4-x11-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576455" comment="libqt4-x11-x86-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576456" comment="libqt4-x86-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576457" comment="qt4-x11-tools-4.6.3-5.20.23.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218086" version="1" class="patch">
	<metadata>
		<title>Security update for PostgreSQL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="802679" ref_url="https://bugzilla.suse.com/802679" source="BUGZILLA"/>
		<reference ref_id="812525" ref_url="https://bugzilla.suse.com/812525" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255/" source="CVE"/>
		<reference ref_id="CVE-2013-1899" ref_url="https://www.suse.com/security/cve/CVE-2013-1899/" source="CVE"/>
		<reference ref_id="CVE-2013-1900" ref_url="https://www.suse.com/security/cve/CVE-2013-1900/" source="CVE"/>
		<reference ref_id="CVE-2013-1901" ref_url="https://www.suse.com/security/cve/CVE-2013-1901/" source="CVE"/>
		<description>

This update to version 9.1.9 fixes:

    * CVE-2013-1899: Fix insecure parsing of server command-line switches.
    * CVE-2013-1900: Reset OpenSSL randomness state in each postmaster
      child process.
    * CVE-2013-1901: Make REPLICATION privilege checks test current user
      not authenticated user.

Security Issue references:

    * CVE-2013-1899
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899&gt;
    * CVE-2013-1900
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900&gt;
    * CVE-2013-1901
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-04-02"/>
	<updated date="2013-04-02"/>
	<bugzilla href="https://bugzilla.suse.com/802679">SUSE bug 802679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/812525">SUSE bug 812525</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0255">CVE-2013-0255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1899/">CVE-2013-1899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1899">CVE-2013-1899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1900/">CVE-2013-1900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1900">CVE-2013-1900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1901/">CVE-2013-1901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1901">CVE-2013-1901 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576458" comment="libecpg6-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576459" comment="libpq5-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576460" comment="libpq5-32bit-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576461" comment="libpq5-x86-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576462" comment="postgresql91-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576463" comment="postgresql91-contrib-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576464" comment="postgresql91-docs-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576465" comment="postgresql91-server-9.1.9-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576458" comment="libecpg6-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576459" comment="libpq5-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576460" comment="libpq5-32bit-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576461" comment="libpq5-x86-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576462" comment="postgresql91-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576463" comment="postgresql91-contrib-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576464" comment="postgresql91-docs-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576465" comment="postgresql91-server-9.1.9-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218087" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="897890" ref_url="https://bugzilla.suse.com/897890" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1568" ref_url="https://www.suse.com/security/cve/CVE-2014-1568/" source="CVE"/>
		<description>

Mozilla NSS was updated to 3.16.5 to fix a RSA certificate forgery issue.

MFSA 2014-73 / CVE-2014-1568: Antoine Delignat-Lavaud, security researcher 
at Inria Paris in team Prosecco, reported an issue in Network Security 
Services (NSS) libraries affecting all versions. He discovered that NSS is 
vulnerable to a variant of a signature forgery attack previously published 
by Daniel Bleichenbacher. This is due to lenient parsing of ASN.1 values 
involved in a signature and could lead to the forging of RSA certificates.

The Advanced Threat Research team at Intel Security also independently 
discovered and reported this issue.

Security Issues:

    * CVE-2014-1568
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-26"/>
	<updated date="2014-09-26"/>
	<bugzilla href="https://bugzilla.suse.com/897890">SUSE bug 897890</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1568/">CVE-2014-1568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1568">CVE-2014-1568 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576466" comment="libfreebl3-3.16.5-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576467" comment="libfreebl3-32bit-3.16.5-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576468" comment="mozilla-nss-3.16.5-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576469" comment="mozilla-nss-32bit-3.16.5-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576470" comment="mozilla-nss-devel-3.16.5-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576471" comment="mozilla-nss-tools-3.16.5-0.4.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218088" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="831359" ref_url="https://bugzilla.suse.com/831359" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4242" ref_url="https://www.suse.com/security/cve/CVE-2013-4242/" source="CVE"/>
		<description>

This update of libgcrypt mitigates the Yarom/Falkner flush+reload 
side-channel attack on RSA secret keys (CVE-2013-4242).

Security Issue reference:

    * CVE-2013-4242
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-13"/>
	<updated date="2013-08-13"/>
	<bugzilla href="https://bugzilla.suse.com/831359">SUSE bug 831359</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4242/">CVE-2013-4242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4242">CVE-2013-4242 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576472" comment="libgcrypt11-1.5.0-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576473" comment="libgcrypt11-32bit-1.5.0-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576474" comment="libgcrypt11-x86-1.5.0-0.15.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576472" comment="libgcrypt11-1.5.0-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576473" comment="libgcrypt11-32bit-1.5.0-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576474" comment="libgcrypt11-x86-1.5.0-0.15.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218089" version="1" class="patch">
	<metadata>
		<title>Security update for liblzo2-2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="883947" ref_url="https://bugzilla.suse.com/883947" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607/" source="CVE"/>
		<description>

lzo has been updated to fix a potential denial of service issue or possible 
remote code execution by allowing an attacker, if the LZO decompression 
algorithm is used in a threaded or kernel context, to corrupt memory 
structures that control the flow of execution in other contexts. 
(CVE-2014-4607)

Security Issues:

    * CVE-2014-4607
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4607&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-11"/>
	<updated date="2014-07-11"/>
	<bugzilla href="https://bugzilla.suse.com/883947">SUSE bug 883947</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4607">CVE-2014-4607 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572365" comment="liblzo2-2-2.03-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572366" comment="liblzo2-2-32bit-2.03-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218090" version="1" class="patch">
	<metadata>
		<title>Security update for MySQL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="792444" ref_url="https://bugzilla.suse.com/792444" source="BUGZILLA"/>
		<reference ref_id="934789" ref_url="https://bugzilla.suse.com/934789" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5611" ref_url="https://www.suse.com/security/cve/CVE-2012-5611/" source="CVE"/>
		<reference ref_id="CVE-2012-5612" ref_url="https://www.suse.com/security/cve/CVE-2012-5612/" source="CVE"/>
		<reference ref_id="CVE-2012-5613" ref_url="https://www.suse.com/security/cve/CVE-2012-5613/" source="CVE"/>
		<reference ref_id="CVE-2012-5615" ref_url="https://www.suse.com/security/cve/CVE-2012-5615/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1177-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001491.html" source="SUSE-SU"/>
		<description>

A stack-based buffer overflow in MySQL has been fixed that could have 
caused a Denial of Service or potentially allowed the execution of 
arbitrary code (CVE-2012-5611).

Security Issue references:

    * CVE-2012-5615
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5615&gt;
    * CVE-2012-5615
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5615&gt;
    * CVE-2012-5613
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5613&gt;
    * CVE-2012-5612
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5612&gt;
    * CVE-2012-5611
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5611&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-12-27"/>
	<updated date="2012-12-27"/>
	<bugzilla href="https://bugzilla.suse.com/792444">SUSE bug 792444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934789">SUSE bug 934789</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5611/">CVE-2012-5611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5611">CVE-2012-5611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5612/">CVE-2012-5612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5612">CVE-2012-5612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5613/">CVE-2012-5613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5613">CVE-2012-5613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5615/">CVE-2012-5615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5615">CVE-2012-5615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576475" comment="libmysqlclient15-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576476" comment="libmysqlclient15-32bit-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576477" comment="libmysqlclient15-x86-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576478" comment="libmysqlclient_r15-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576479" comment="mysql-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576480" comment="mysql-Max-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576481" comment="mysql-client-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576482" comment="mysql-tools-5.0.96-0.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576475" comment="libmysqlclient15-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576476" comment="libmysqlclient15-32bit-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576477" comment="libmysqlclient15-x86-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576478" comment="libmysqlclient_r15-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576479" comment="mysql-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576480" comment="mysql-Max-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576481" comment="mysql-client-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576482" comment="mysql-tools-5.0.96-0.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576475" comment="libmysqlclient15-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576476" comment="libmysqlclient15-32bit-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576477" comment="libmysqlclient15-x86-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576478" comment="libmysqlclient_r15-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576479" comment="mysql-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576480" comment="mysql-Max-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576481" comment="mysql-client-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576482" comment="mysql-tools-5.0.96-0.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218091" version="1" class="patch">
	<metadata>
		<title>Security update for OpenSSL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="779952" ref_url="https://bugzilla.suse.com/779952" source="BUGZILLA"/>
		<reference ref_id="802648" ref_url="https://bugzilla.suse.com/802648" source="BUGZILLA"/>
		<reference ref_id="802746" ref_url="https://bugzilla.suse.com/802746" source="BUGZILLA"/>
		<reference ref_id="859228" ref_url="https://bugzilla.suse.com/859228" source="BUGZILLA"/>
		<reference ref_id="859924" ref_url="https://bugzilla.suse.com/859924" source="BUGZILLA"/>
		<reference ref_id="860332" ref_url="https://bugzilla.suse.com/860332" source="BUGZILLA"/>
		<reference ref_id="862181" ref_url="https://bugzilla.suse.com/862181" source="BUGZILLA"/>
		<reference ref_id="869945" ref_url="https://bugzilla.suse.com/869945" source="BUGZILLA"/>
		<reference ref_id="870192" ref_url="https://bugzilla.suse.com/870192" source="BUGZILLA"/>
		<reference ref_id="880891" ref_url="https://bugzilla.suse.com/880891" source="BUGZILLA"/>
		<reference ref_id="890764" ref_url="https://bugzilla.suse.com/890764" source="BUGZILLA"/>
		<reference ref_id="890767" ref_url="https://bugzilla.suse.com/890767" source="BUGZILLA"/>
		<reference ref_id="890768" ref_url="https://bugzilla.suse.com/890768" source="BUGZILLA"/>
		<reference ref_id="890769" ref_url="https://bugzilla.suse.com/890769" source="BUGZILLA"/>
		<reference ref_id="890770" ref_url="https://bugzilla.suse.com/890770" source="BUGZILLA"/>
		<reference ref_id="892403" ref_url="https://bugzilla.suse.com/892403" source="BUGZILLA"/>
		<reference ref_id="901223" ref_url="https://bugzilla.suse.com/901223" source="BUGZILLA"/>
		<reference ref_id="901277" ref_url="https://bugzilla.suse.com/901277" source="BUGZILLA"/>
		<reference ref_id="912014" ref_url="https://bugzilla.suse.com/912014" source="BUGZILLA"/>
		<reference ref_id="912015" ref_url="https://bugzilla.suse.com/912015" source="BUGZILLA"/>
		<reference ref_id="912018" ref_url="https://bugzilla.suse.com/912018" source="BUGZILLA"/>
		<reference ref_id="912293" ref_url="https://bugzilla.suse.com/912293" source="BUGZILLA"/>
		<reference ref_id="912294" ref_url="https://bugzilla.suse.com/912294" source="BUGZILLA"/>
		<reference ref_id="912296" ref_url="https://bugzilla.suse.com/912296" source="BUGZILLA"/>
		<reference ref_id="915976" ref_url="https://bugzilla.suse.com/915976" source="BUGZILLA"/>
		<reference ref_id="919648" ref_url="https://bugzilla.suse.com/919648" source="BUGZILLA"/>
		<reference ref_id="920236" ref_url="https://bugzilla.suse.com/920236" source="BUGZILLA"/>
		<reference ref_id="922488" ref_url="https://bugzilla.suse.com/922488" source="BUGZILLA"/>
		<reference ref_id="922496" ref_url="https://bugzilla.suse.com/922496" source="BUGZILLA"/>
		<reference ref_id="922499" ref_url="https://bugzilla.suse.com/922499" source="BUGZILLA"/>
		<reference ref_id="922500" ref_url="https://bugzilla.suse.com/922500" source="BUGZILLA"/>
		<reference ref_id="922501" ref_url="https://bugzilla.suse.com/922501" source="BUGZILLA"/>
		<reference ref_id="929678" ref_url="https://bugzilla.suse.com/929678" source="BUGZILLA"/>
		<reference ref_id="931698" ref_url="https://bugzilla.suse.com/931698" source="BUGZILLA"/>
		<reference ref_id="933911" ref_url="https://bugzilla.suse.com/933911" source="BUGZILLA"/>
		<reference ref_id="934487" ref_url="https://bugzilla.suse.com/934487" source="BUGZILLA"/>
		<reference ref_id="934489" ref_url="https://bugzilla.suse.com/934489" source="BUGZILLA"/>
		<reference ref_id="934491" ref_url="https://bugzilla.suse.com/934491" source="BUGZILLA"/>
		<reference ref_id="934493" ref_url="https://bugzilla.suse.com/934493" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-5146" ref_url="https://www.suse.com/security/cve/CVE-2009-5146/" source="CVE"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2014-0076" ref_url="https://www.suse.com/security/cve/CVE-2014-0076/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-3505" ref_url="https://www.suse.com/security/cve/CVE-2014-3505/" source="CVE"/>
		<reference ref_id="CVE-2014-3506" ref_url="https://www.suse.com/security/cve/CVE-2014-3506/" source="CVE"/>
		<reference ref_id="CVE-2014-3507" ref_url="https://www.suse.com/security/cve/CVE-2014-3507/" source="CVE"/>
		<reference ref_id="CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508/" source="CVE"/>
		<reference ref_id="CVE-2014-3510" ref_url="https://www.suse.com/security/cve/CVE-2014-3510/" source="CVE"/>
		<reference ref_id="CVE-2014-3513" ref_url="https://www.suse.com/security/cve/CVE-2014-3513/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0292" ref_url="https://www.suse.com/security/cve/CVE-2015-0292/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-3216" ref_url="https://www.suse.com/security/cve/CVE-2015-3216/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001479.html" source="SUSE-SU"/>
		<description>

OpenSSL has been updated to fix several security issues:

    * CVE-2012-4929: Avoid the openssl CRIME attack by disabling SSL
      compression by default. Setting the environment variable
      'OPENSSL_NO_DEFAULT_ZLIB' to 'no' enables compression again.
    * CVE-2013-0169: Timing attacks against TLS could be used by physically
      local attackers to gain access to transmitted plain text or private
      keymaterial. This issue is also known as the 'Lucky-13' issue.
    * CVE-2013-0166: A OCSP invalid key denial of service issue was fixed.

Security Issue references:

    * CVE-2013-0169
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169&gt;
    * CVE-2013-0166
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0166&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-25"/>
	<updated date="2013-03-25"/>
	<bugzilla href="https://bugzilla.suse.com/779952">SUSE bug 779952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802648">SUSE bug 802648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802746">SUSE bug 802746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859228">SUSE bug 859228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859924">SUSE bug 859924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860332">SUSE bug 860332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862181">SUSE bug 862181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869945">SUSE bug 869945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870192">SUSE bug 870192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890764">SUSE bug 890764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890767">SUSE bug 890767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890768">SUSE bug 890768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890769">SUSE bug 890769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890770">SUSE bug 890770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892403">SUSE bug 892403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901223">SUSE bug 901223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912014">SUSE bug 912014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912015">SUSE bug 912015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912018">SUSE bug 912018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912293">SUSE bug 912293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912294">SUSE bug 912294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912296">SUSE bug 912296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915976">SUSE bug 915976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920236">SUSE bug 920236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922488">SUSE bug 922488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922496">SUSE bug 922496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922499">SUSE bug 922499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922500">SUSE bug 922500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922501">SUSE bug 922501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929678">SUSE bug 929678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931698">SUSE bug 931698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933911">SUSE bug 933911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934487">SUSE bug 934487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934489">SUSE bug 934489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934491">SUSE bug 934491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934493">SUSE bug 934493</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5146/">CVE-2009-5146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5146">CVE-2009-5146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0166">CVE-2013-0166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0169">CVE-2013-0169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0076/">CVE-2014-0076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0076">CVE-2014-0076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0221">CVE-2014-0221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0224">CVE-2014-0224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3470">CVE-2014-3470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3505/">CVE-2014-3505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3505">CVE-2014-3505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3506/">CVE-2014-3506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3506">CVE-2014-3506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3507/">CVE-2014-3507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3507">CVE-2014-3507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3508">CVE-2014-3508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3510/">CVE-2014-3510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3510">CVE-2014-3510 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-3513/">CVE-2014-3513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3513">CVE-2014-3513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3567">CVE-2014-3567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3568">CVE-2014-3568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3570">CVE-2014-3570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3571">CVE-2014-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3572">CVE-2014-3572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8275">CVE-2014-8275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0205">CVE-2015-0205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0209">CVE-2015-0209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0286">CVE-2015-0286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0287">CVE-2015-0287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0288">CVE-2015-0288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0289">CVE-2015-0289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0292/">CVE-2015-0292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0292">CVE-2015-0292 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0293">CVE-2015-0293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1788">CVE-2015-1788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1789">CVE-2015-1789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1790">CVE-2015-1790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1791">CVE-2015-1791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1792">CVE-2015-1792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3216/">CVE-2015-3216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3216">CVE-2015-3216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572388" comment="libopenssl-devel-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576483" comment="libopenssl0_9_8-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576484" comment="libopenssl0_9_8-32bit-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576485" comment="libopenssl0_9_8-hmac-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576486" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576487" comment="libopenssl0_9_8-hmac-x86-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576488" comment="libopenssl0_9_8-x86-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576489" comment="openssl-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576490" comment="openssl-doc-0.9.8j-0.50.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572388" comment="libopenssl-devel-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576483" comment="libopenssl0_9_8-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576484" comment="libopenssl0_9_8-32bit-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576485" comment="libopenssl0_9_8-hmac-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576486" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576487" comment="libopenssl0_9_8-hmac-x86-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576488" comment="libopenssl0_9_8-x86-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576489" comment="openssl-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576490" comment="openssl-doc-0.9.8j-0.50.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572388" comment="libopenssl-devel-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576483" comment="libopenssl0_9_8-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576484" comment="libopenssl0_9_8-32bit-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576485" comment="libopenssl0_9_8-hmac-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576486" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576487" comment="libopenssl0_9_8-hmac-x86-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576488" comment="libopenssl0_9_8-x86-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576489" comment="openssl-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576490" comment="openssl-doc-0.9.8j-0.50.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218092" version="1" class="patch">
	<metadata>
		<title>Security update for libotr</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="777468" ref_url="https://bugzilla.suse.com/777468" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3461" ref_url="https://www.suse.com/security/cve/CVE-2012-3461/" source="CVE"/>
		<description>

This update fixes various heap overflows in libotr. CVE-2012-3461 has been 
assigned to this issue.

Security Issue reference:

    * CVE-2012-3461
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3461&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-21"/>
	<updated date="2012-11-21"/>
	<bugzilla href="https://bugzilla.suse.com/777468">SUSE bug 777468</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3461/">CVE-2012-3461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3461">CVE-2012-3461 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576491" comment="libotr2-3.2.0-10.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576491" comment="libotr2-3.2.0-10.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218093" version="1" class="patch">
	<metadata>
		<title>Security update for pcp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="732763" ref_url="https://bugzilla.suse.com/732763" source="BUGZILLA"/>
		<reference ref_id="775009" ref_url="https://bugzilla.suse.com/775009" source="BUGZILLA"/>
		<reference ref_id="775010" ref_url="https://bugzilla.suse.com/775010" source="BUGZILLA"/>
		<reference ref_id="775011" ref_url="https://bugzilla.suse.com/775011" source="BUGZILLA"/>
		<reference ref_id="775013" ref_url="https://bugzilla.suse.com/775013" source="BUGZILLA"/>
		<reference ref_id="782967" ref_url="https://bugzilla.suse.com/782967" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3418" ref_url="https://www.suse.com/security/cve/CVE-2012-3418/" source="CVE"/>
		<reference ref_id="CVE-2012-3419" ref_url="https://www.suse.com/security/cve/CVE-2012-3419/" source="CVE"/>
		<reference ref_id="CVE-2012-3420" ref_url="https://www.suse.com/security/cve/CVE-2012-3420/" source="CVE"/>
		<reference ref_id="CVE-2012-3421" ref_url="https://www.suse.com/security/cve/CVE-2012-3421/" source="CVE"/>
		<description>

pcp was updated to version 3.6.10 which fixes security issues and also 
brings a lot of new features.

    * 

      Update to pcp-3.6.10.

          o Transition daemons to run under an unprivileged account.
          o Fixes for security advisory CVE-2012-5530: tmpfile flaws;
            (bnc#782967).
          o Fix pcp(1) command short-form pmlogger reporting.
          o Fix pmdalogger error handling for directory files.
          o Fix pmstat handling of odd corner case in CPU metrics.
          o Correct the python ctype used for pmAtomValue 32bit ints.
          o Add missing RPM spec dependency for python-ctypes.
          o Corrections to pmdamysql metrics units.
          o Add pmdamysql slave status metrics.
          o Improve pmcollectl error messages.
          o Parameterize pmcollectl CPU counts in interrupt subsys.
          o Fix generic RPM packaging for powerpc builds.
          o Fix python API use of reentrant libpcp string routines.
          o Python code backporting for RHEL5 in qa and pmcollectl.
          o Fix edge cases in capturing interrupt error counts.
    * 

      Update to pcp-3.6.9.

          o Python wrapper for the pmimport API
          o Make sar2pcp work with the sysstat versions from RHEL5, RHEL6,
            and all recent Fedora versions (which is almost all current
            versions of sysstat verified).
          o Added a number of additional metrics into the importer for
            people starting to use it to analyse sar data from real
            customer incidents.
          o Rework use of C99 'restrict' keyword in pmdalogger (Debian bug:
            689552)
          o Alot of work on the PCP QA suite, special thanks to Tomas
            Dohnalek for all his efforts there.
          o Win32 build updates
          o Add 'raw' disk active metrics so that existing tools like
            iostat can be emulated
          o Allow sar2pcp to accept XML input directly (.xml suffix),
            allowing it to not have to run on the same platform as the
            sadc/sadf that originally generated it.
          o Add PMI error codes into the PCP::LogImport perl module.
          o Fix a typo in pmiUnits man page synopsis section
          o Resolve pmdalinux ordering issue in NUMA/CPU indom setup
            (Redhat bug: 858384)
          o Remove unused pmcollectl imports (Redhat bug: 863210)
          o Allow event traces to be used in libpcp interpolate mode
    * 

      Update to pcp-3.6.8.

          o Corrects the disk/partition identification for the MMC driver,
            which makes disk indom handling correct on the Raspberry Pi
            (http://www.raspberrypi.org/)
          o Several minor/basic fixes for pmdaoracle.
          o Improve pmcollectl compatibility.
          o Make a few clarifications to pmcollectl.1.
          o Improve python API test coverage.
          o Numerous updates to the test suite in general.
          o Allow pmda Install scripts to specify own dso name again.
          o Reconcile spec file differences between PCP flavours.
          o Fix handling of multiple contexts with a remote namespace.
          o Core socket interface abstractions to support NSS (later).
          o Fix man page SYNOPSIS section for pmUnpackEventRecords.
          o Add --disable-shared build option for static builds.
    * 

      Update to pcp-3.6.6.

          o Added the python PMAPI bindings and an initial python client in
            pmcollectl. Separate, new package exists for python libs for
            those platforms that split out packages (rpm, deb).
          o Added a pcp-testsuite package for those platforms that might
            want this (rpm, deb again, mainly)
          o Re-introduced the pcp/qa subdirectory in pcp and deprecated the
            external pcpqa git tree.
          o Fix potential buffer overflow in pmlogger host name handling.
          o Reworked the configure --prefix handling to be more like the
            rest of the open source world.
          o Ensure the __pmDecodeText ident parameter is always set
            Resolves Red Hat bugzilla bug #841306.

Security Issue references:

    * CVE-2012-3418
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3418&gt;
    * CVE-2012-3419
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3419&gt;
    * CVE-2012-3420
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3420&gt;
    * CVE-2012-3421
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3421&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-01-07"/>
	<updated date="2013-01-07"/>
	<bugzilla href="https://bugzilla.suse.com/732763">SUSE bug 732763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775009">SUSE bug 775009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775010">SUSE bug 775010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775011">SUSE bug 775011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775013">SUSE bug 775013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/782967">SUSE bug 782967</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3418/">CVE-2012-3418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3418">CVE-2012-3418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3419/">CVE-2012-3419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3419">CVE-2012-3419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3420/">CVE-2012-3420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3420">CVE-2012-3420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3421/">CVE-2012-3421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3421">CVE-2012-3421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576492" comment="permissions-2013.1.7-0.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576492" comment="permissions-2013.1.7-0.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218094" version="1" class="patch">
	<metadata>
		<title>Security update for pixman</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="853824" ref_url="https://bugzilla.suse.com/853824" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6425" ref_url="https://www.suse.com/security/cve/CVE-2013-6425/" source="CVE"/>
		<description>

This update fixes the following security issue with pixman:

    * Integer underflow when handling trapezoids. (bnc#853824,
      CVE-2013-6425)

Security Issues:

    * CVE-2013-6425
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6425&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-21"/>
	<updated date="2013-12-21"/>
	<bugzilla href="https://bugzilla.suse.com/853824">SUSE bug 853824</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6425/">CVE-2013-6425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6425">CVE-2013-6425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576493" comment="libpixman-1-0-0.16.0-1.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576494" comment="libpixman-1-0-32bit-0.16.0-1.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576495" comment="libpixman-1-0-x86-0.16.0-1.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576493" comment="libpixman-1-0-0.16.0-1.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576494" comment="libpixman-1-0-32bit-0.16.0-1.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576495" comment="libpixman-1-0-x86-0.16.0-1.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218095" version="1" class="patch">
	<metadata>
		<title>Security update for poppler</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="806793" ref_url="https://bugzilla.suse.com/806793" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1788" ref_url="https://www.suse.com/security/cve/CVE-2013-1788/" source="CVE"/>
		<reference ref_id="CVE-2013-1789" ref_url="https://www.suse.com/security/cve/CVE-2013-1789/" source="CVE"/>
		<reference ref_id="CVE-2013-1790" ref_url="https://www.suse.com/security/cve/CVE-2013-1790/" source="CVE"/>
		<description>

This update of poppler fixes the following vulnerabilities:

    * CVE-2013-1788: Various invalid memory issues could be used by
      attackers supplying PDFs to crash the PDF viewer or potentially
      execute code.
    * CVE-2013-1789: A crash in poppler could be used by attackers
      providing PDFs to crash the PDF viewer.
    * CVE-2013-1790: An uninitialized memory read could be used by
      attackers providing PDFs to crash the PDF viewer.

Security Issue references:

    * CVE-2013-1788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1788&gt;
    * CVE-2013-1789
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1789&gt;
    * CVE-2013-1790
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1790&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-26"/>
	<updated date="2013-03-26"/>
	<bugzilla href="https://bugzilla.suse.com/806793">SUSE bug 806793</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1788/">CVE-2013-1788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1788">CVE-2013-1788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1789/">CVE-2013-1789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1789">CVE-2013-1789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1790/">CVE-2013-1790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1790">CVE-2013-1790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576496" comment="libpoppler-glib4-0.12.3-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576497" comment="libpoppler-qt4-3-0.12.3-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576498" comment="libpoppler5-0.12.3-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576499" comment="poppler-tools-0.12.3-1.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576496" comment="libpoppler-glib4-0.12.3-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576497" comment="libpoppler-qt4-3-0.12.3-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576498" comment="libpoppler5-0.12.3-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576499" comment="poppler-tools-0.12.3-1.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218096" version="1" class="patch">
	<metadata>
		<title>Security update for libproxy</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="761626" ref_url="https://bugzilla.suse.com/761626" source="BUGZILLA"/>
		<reference ref_id="784523" ref_url="https://bugzilla.suse.com/784523" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4505" ref_url="https://www.suse.com/security/cve/CVE-2012-4505/" source="CVE"/>
		<description>

This update for libproxy fixes a heap-based buffer overflow that could have 
allowed remote servers to have an unspecified impact via a crafted 
Content-Length size in an HTTP response header for a proxy.pac file request 
(CVE-2012-4505).

Additionally, it fixes parsing of the $no_proxy environment variable when 
it contains more than one URL separated by white-spaces.

Security Issue reference:

    * CVE-2012-4505
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4505&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-23"/>
	<updated date="2012-11-23"/>
	<bugzilla href="https://bugzilla.suse.com/761626">SUSE bug 761626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784523">SUSE bug 784523</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4505/">CVE-2012-4505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4505">CVE-2012-4505 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576500" comment="libproxy0-0.3.1-2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576501" comment="libproxy0-32bit-0.3.1-2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576502" comment="libproxy0-config-gnome-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576503" comment="libproxy0-config-kde4-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576504" comment="libproxy0-networkmanager-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576505" comment="libproxy0-x86-0.3.1-2.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576500" comment="libproxy0-0.3.1-2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576501" comment="libproxy0-32bit-0.3.1-2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576502" comment="libproxy0-config-gnome-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576503" comment="libproxy0-config-kde4-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576504" comment="libproxy0-networkmanager-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576505" comment="libproxy0-x86-0.3.1-2.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218097" version="1" class="patch">
	<metadata>
		<title>Recommended update for libsoup</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="758431" ref_url="https://bugzilla.suse.com/758431" source="BUGZILLA"/>
		<reference ref_id="771609" ref_url="https://bugzilla.suse.com/771609" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2132" ref_url="https://www.suse.com/security/cve/CVE-2012-2132/" source="CVE"/>
		<description>

This update of libsoup disables the previously enabled SSL certificate 
checking, potentially allowing Man in the Middle attacks. This was 
necessary as a many customers still use self-signed certificate setups and 
necessary user interface changes are too intrusive.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-26"/>
	<updated date="2012-07-26"/>
	<bugzilla href="https://bugzilla.suse.com/758431">SUSE bug 758431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/771609">SUSE bug 771609</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2132/">CVE-2012-2132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2132">CVE-2012-2132 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992509" comment="libsoup-2_4-1-2.32.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992510" comment="libsoup-2_4-1-32bit-2.32.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589563" comment="libsoup-2_4-1-x86-2.32.2-4.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992509" comment="libsoup-2_4-1-2.32.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992510" comment="libsoup-2_4-1-32bit-2.32.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589563" comment="libsoup-2_4-1-x86-2.32.2-4.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218098" version="1" class="patch">
	<metadata>
		<title>Security update for libtiff</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="781995" ref_url="https://bugzilla.suse.com/781995" source="BUGZILLA"/>
		<reference ref_id="787892" ref_url="https://bugzilla.suse.com/787892" source="BUGZILLA"/>
		<reference ref_id="788741" ref_url="https://bugzilla.suse.com/788741" source="BUGZILLA"/>
		<reference ref_id="791607" ref_url="https://bugzilla.suse.com/791607" source="BUGZILLA"/>
		<reference ref_id="817573" ref_url="https://bugzilla.suse.com/817573" source="BUGZILLA"/>
		<reference ref_id="818117" ref_url="https://bugzilla.suse.com/818117" source="BUGZILLA"/>
		<reference ref_id="834477" ref_url="https://bugzilla.suse.com/834477" source="BUGZILLA"/>
		<reference ref_id="834779" ref_url="https://bugzilla.suse.com/834779" source="BUGZILLA"/>
		<reference ref_id="834788" ref_url="https://bugzilla.suse.com/834788" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4447" ref_url="https://www.suse.com/security/cve/CVE-2012-4447/" source="CVE"/>
		<reference ref_id="CVE-2012-4564" ref_url="https://www.suse.com/security/cve/CVE-2012-4564/" source="CVE"/>
		<reference ref_id="CVE-2012-5581" ref_url="https://www.suse.com/security/cve/CVE-2012-5581/" source="CVE"/>
		<reference ref_id="CVE-2013-1960" ref_url="https://www.suse.com/security/cve/CVE-2013-1960/" source="CVE"/>
		<reference ref_id="CVE-2013-1961" ref_url="https://www.suse.com/security/cve/CVE-2013-1961/" source="CVE"/>
		<reference ref_id="CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231/" source="CVE"/>
		<reference ref_id="CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232/" source="CVE"/>
		<reference ref_id="CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243/" source="CVE"/>
		<reference ref_id="CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244/" source="CVE"/>
		<description>

This tiff update fixes several security issues.

    * bnc#834477: CVE-2013-4232 CVE-2013-4231: tiff: buffer overflows/use
      after free problem
    * bnc#834779: CVE-2013-4243: libtiff (gif2tiff): heap-based buffer
      overflow in readgifimage()
    * bnc#834788: CVE-2013-4244: libtiff (gif2tiff): OOB Write in LZW
      decompressor

Security Issue references:

    * CVE-2013-4232
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4232&gt;
    * CVE-2013-4231
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4231&gt;
    * CVE-2013-4243
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4243&gt;
    * CVE-2013-4244
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4244&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/781995">SUSE bug 781995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787892">SUSE bug 787892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788741">SUSE bug 788741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791607">SUSE bug 791607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817573">SUSE bug 817573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818117">SUSE bug 818117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834477">SUSE bug 834477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834779">SUSE bug 834779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834788">SUSE bug 834788</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4447/">CVE-2012-4447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4447">CVE-2012-4447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4564/">CVE-2012-4564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4564">CVE-2012-4564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5581/">CVE-2012-5581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5581">CVE-2012-5581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1960/">CVE-2013-1960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1960">CVE-2013-1960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1961/">CVE-2013-1961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1961">CVE-2013-1961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4231">CVE-2013-4231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4232">CVE-2013-4232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4243">CVE-2013-4243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4244">CVE-2013-4244 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576506" comment="libtiff3-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576507" comment="libtiff3-32bit-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576508" comment="libtiff3-x86-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576509" comment="tiff-3.8.2-141.154.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576506" comment="libtiff3-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576507" comment="libtiff3-32bit-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576508" comment="libtiff3-x86-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576509" comment="tiff-3.8.2-141.154.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218099" version="1" class="patch">
	<metadata>
		<title>Recommended update for trousers</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="778897" ref_url="https://bugzilla.suse.com/778897" source="BUGZILLA"/>
		<reference ref_id="791029" ref_url="https://bugzilla.suse.com/791029" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0698" ref_url="https://www.suse.com/security/cve/CVE-2012-0698/" source="CVE"/>
		<description>

This collective update for the trousers library and daemon fixes the 
following issues:

    * 

      One minor security issue for cases where tcsd is enabled for TCP:
      CVE-2012-0698: tcsd in TrouSerS allowed remote attackers to cause a
      denial of service (daemon crash) via a crafted type_offset value in a
      TCP packet to port 30003.

    * 

      An issue in the trousers library which prevents disabling of TPM
      physical presence.

		</description>
<advisory from="security@suse.de">
	<issued date="2013-01-23"/>
	<updated date="2013-01-23"/>
	<bugzilla href="https://bugzilla.suse.com/778897">SUSE bug 778897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791029">SUSE bug 791029</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0698/">CVE-2012-0698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0698">CVE-2012-0698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009589099" comment="libtspi1-0.3.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589100" comment="libtspi1-32bit-0.3.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589101" comment="libtspi1-x86-0.3.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589102" comment="trousers-0.3.7-3.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009589099" comment="libtspi1-0.3.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589100" comment="libtspi1-32bit-0.3.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589101" comment="libtspi1-x86-0.3.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589102" comment="trousers-0.3.7-3.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218100" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="782311" ref_url="https://bugzilla.suse.com/782311" source="BUGZILLA"/>
		<reference ref_id="800976" ref_url="https://bugzilla.suse.com/800976" source="BUGZILLA"/>
		<reference ref_id="805843" ref_url="https://bugzilla.suse.com/805843" source="BUGZILLA"/>
		<reference ref_id="817008" ref_url="https://bugzilla.suse.com/817008" source="BUGZILLA"/>
		<reference ref_id="838638" ref_url="https://bugzilla.suse.com/838638" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0170" ref_url="https://www.suse.com/security/cve/CVE-2013-0170/" source="CVE"/>
		<reference ref_id="CVE-2013-4296" ref_url="https://www.suse.com/security/cve/CVE-2013-4296/" source="CVE"/>
		<description>

This libvirt update fixes a security issue.

    * bnc#838638: CVE-2013-4296: EMBARGOED: libvirt: Fix crash in
      remoteDispatchDomainMemoryStats
    * bnc#817008: Regression: vm-install fails to display on SLES 11 SP2
      UV2000

Security Issue reference:

    * CVE-2013-4296
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4296&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-23"/>
	<updated date="2013-09-23"/>
	<bugzilla href="https://bugzilla.suse.com/782311">SUSE bug 782311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800976">SUSE bug 800976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/805843">SUSE bug 805843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817008">SUSE bug 817008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/838638">SUSE bug 838638</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0170/">CVE-2013-0170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0170">CVE-2013-0170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4296/">CVE-2013-4296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4296">CVE-2013-4296 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576510" comment="libvirt-0.9.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576511" comment="libvirt-client-0.9.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576512" comment="libvirt-client-32bit-0.9.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576513" comment="libvirt-doc-0.9.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576514" comment="libvirt-python-0.9.6-0.29.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576510" comment="libvirt-0.9.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576511" comment="libvirt-client-0.9.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576512" comment="libvirt-client-32bit-0.9.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576513" comment="libvirt-doc-0.9.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576514" comment="libvirt-python-0.9.6-0.29.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218101" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="772586" ref_url="https://bugzilla.suse.com/772586" source="BUGZILLA"/>
		<reference ref_id="773621" ref_url="https://bugzilla.suse.com/773621" source="BUGZILLA"/>
		<reference ref_id="773626" ref_url="https://bugzilla.suse.com/773626" source="BUGZILLA"/>
		<reference ref_id="780432" ref_url="https://bugzilla.suse.com/780432" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3497" ref_url="https://www.suse.com/security/cve/CVE-2012-3497/" source="CVE"/>
		<reference ref_id="CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411/" source="CVE"/>
		<reference ref_id="CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535/" source="CVE"/>
		<reference ref_id="CVE-2012-4536" ref_url="https://www.suse.com/security/cve/CVE-2012-4536/" source="CVE"/>
		<reference ref_id="CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537/" source="CVE"/>
		<reference ref_id="CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538/" source="CVE"/>
		<reference ref_id="CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544/" source="CVE"/>
		<description>

libvirt received security and bugfixes:

    * CVE-2012-4423: Fixed a libvirt remote denial of service (crash)
      problem.

The following bugs have been fixed:

    * qemu: Fix probing for guest capabilities
    * xen-xm: Generate UUID if not specified
    * xenParseXM: don't dereference NULL pointer when script is empty

Security Issue references:

    * CVE-2012-4539
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539&gt;
    * CVE-2012-3497
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3497&gt;
    * CVE-2012-4411
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4411&gt;
    * CVE-2012-4535
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4535&gt;
    * CVE-2012-4537
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4537&gt;
    * CVE-2012-4536
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4536&gt;
    * CVE-2012-4538
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4538&gt;
    * CVE-2012-4539
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539&gt;
    * CVE-2012-4544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4544&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-02"/>
	<updated date="2012-11-02"/>
	<bugzilla href="https://bugzilla.suse.com/772586">SUSE bug 772586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773621">SUSE bug 773621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773626">SUSE bug 773626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780432">SUSE bug 780432</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3497/">CVE-2012-3497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3497">CVE-2012-3497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4411">CVE-2012-4411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4535">CVE-2012-4535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4536/">CVE-2012-4536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4536">CVE-2012-4536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4537">CVE-2012-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4538">CVE-2012-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4539">CVE-2012-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4544">CVE-2012-4544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566138" comment="libvirt-0.9.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566139" comment="libvirt-client-0.9.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566140" comment="libvirt-client-32bit-0.9.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566141" comment="libvirt-doc-0.9.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566142" comment="libvirt-python-0.9.6-0.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566138" comment="libvirt-0.9.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566139" comment="libvirt-client-0.9.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566140" comment="libvirt-client-32bit-0.9.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566141" comment="libvirt-doc-0.9.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566142" comment="libvirt-python-0.9.6-0.23.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218102" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="793334" ref_url="https://bugzilla.suse.com/793334" source="BUGZILLA"/>
		<reference ref_id="805233" ref_url="https://bugzilla.suse.com/805233" source="BUGZILLA"/>
		<reference ref_id="829077" ref_url="https://bugzilla.suse.com/829077" source="BUGZILLA"/>
		<reference ref_id="854869" ref_url="https://bugzilla.suse.com/854869" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5134" ref_url="https://www.suse.com/security/cve/CVE-2012-5134/" source="CVE"/>
		<reference ref_id="CVE-2013-0338" ref_url="https://www.suse.com/security/cve/CVE-2013-0338/" source="CVE"/>
		<reference ref_id="CVE-2013-0339" ref_url="https://www.suse.com/security/cve/CVE-2013-0339/" source="CVE"/>
		<reference ref_id="CVE-2013-2877" ref_url="https://www.suse.com/security/cve/CVE-2013-2877/" source="CVE"/>
		<description>

This update fixes a DoS vulnerability in libxml2. CVE-2013-2877 has been 
assigned to this issue.

Security Issue reference:

    * CVE-2013-2877
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2877&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-06"/>
	<updated date="2014-01-06"/>
	<bugzilla href="https://bugzilla.suse.com/793334">SUSE bug 793334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/805233">SUSE bug 805233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829077">SUSE bug 829077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854869">SUSE bug 854869</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5134/">CVE-2012-5134 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5134">CVE-2012-5134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0338/">CVE-2013-0338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0338">CVE-2013-0338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0339/">CVE-2013-0339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0339">CVE-2013-0339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2877/">CVE-2013-2877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2877">CVE-2013-2877 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576515" comment="libxml2-2.7.6-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576516" comment="libxml2-32bit-2.7.6-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576517" comment="libxml2-doc-2.7.6-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576518" comment="libxml2-python-2.7.6-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576519" comment="libxml2-x86-2.7.6-0.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576515" comment="libxml2-2.7.6-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576516" comment="libxml2-32bit-2.7.6-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576517" comment="libxml2-doc-2.7.6-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576518" comment="libxml2-python-2.7.6-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576519" comment="libxml2-x86-2.7.6-0.25.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218103" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="963963" ref_url="https://bugzilla.suse.com/963963" source="BUGZILLA"/>
		<reference ref_id="965283" ref_url="https://bugzilla.suse.com/965283" source="BUGZILLA"/>
		<reference ref_id="978395" ref_url="https://bugzilla.suse.com/978395" source="BUGZILLA"/>
		<reference ref_id="981040" ref_url="https://bugzilla.suse.com/981040" source="BUGZILLA"/>
		<reference ref_id="981041" ref_url="https://bugzilla.suse.com/981041" source="BUGZILLA"/>
		<reference ref_id="981108" ref_url="https://bugzilla.suse.com/981108" source="BUGZILLA"/>
		<reference ref_id="981109" ref_url="https://bugzilla.suse.com/981109" source="BUGZILLA"/>
		<reference ref_id="981111" ref_url="https://bugzilla.suse.com/981111" source="BUGZILLA"/>
		<reference ref_id="981112" ref_url="https://bugzilla.suse.com/981112" source="BUGZILLA"/>
		<reference ref_id="981114" ref_url="https://bugzilla.suse.com/981114" source="BUGZILLA"/>
		<reference ref_id="981115" ref_url="https://bugzilla.suse.com/981115" source="BUGZILLA"/>
		<reference ref_id="981548" ref_url="https://bugzilla.suse.com/981548" source="BUGZILLA"/>
		<reference ref_id="981549" ref_url="https://bugzilla.suse.com/981549" source="BUGZILLA"/>
		<reference ref_id="981550" ref_url="https://bugzilla.suse.com/981550" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8806" ref_url="https://www.suse.com/security/cve/CVE-2015-8806/" source="CVE"/>
		<reference ref_id="CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762/" source="CVE"/>
		<reference ref_id="CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833/" source="CVE"/>
		<reference ref_id="CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834/" source="CVE"/>
		<reference ref_id="CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835/" source="CVE"/>
		<reference ref_id="CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837/" source="CVE"/>
		<reference ref_id="CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838/" source="CVE"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840/" source="CVE"/>
		<reference ref_id="CVE-2016-2073" ref_url="https://www.suse.com/security/cve/CVE-2016-2073/" source="CVE"/>
		<reference ref_id="CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705/" source="CVE"/>
		<reference ref_id="CVE-2016-4447" ref_url="https://www.suse.com/security/cve/CVE-2016-4447/" source="CVE"/>
		<reference ref_id="CVE-2016-4448" ref_url="https://www.suse.com/security/cve/CVE-2016-4448/" source="CVE"/>
		<reference ref_id="CVE-2016-4449" ref_url="https://www.suse.com/security/cve/CVE-2016-4449/" source="CVE"/>
		<reference ref_id="CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002123.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following security issues: 

- CVE-2016-2073, CVE-2015-8806, CVE-2016-1839: A Heap-buffer overread
  was fixed in libxml2/dict.c  [bsc#963963, bsc#965283, bsc#981114].
- CVE-2016-4483: Code was added to avoid an out of bound access when
  serializing malformed strings [bsc#978395].
- CVE-2016-1762: Fixed a heap-based buffer overread in xmlNextChar [bsc#981040].
- CVE-2016-1834: Fixed a heap-buffer-overflow in xmlStrncat [bsc#981041].
- CVE-2016-1833: Fixed a heap-based buffer overread in htmlCurrentChar [bsc#981108].
- CVE-2016-1835: Fixed a heap use-after-free in xmlSAX2AttributeNs [bsc#981109].
- CVE-2016-1837: Fixed a heap use-after-free in htmlParsePubidLiteral
  and htmlParseSystemiteral [bsc#981111].
- CVE-2016-1838: Fixed a heap-based buffer overread in
  xmlParserPrintFileContextInternal [bsc#981112].
- CVE-2016-1840: Fixed a heap-buffer-overflow in xmlFAParsePosCharGroup [bsc#981115].
- CVE-2016-4447: Fixed a heap-based buffer-underreads due to xmlParseName [bsc#981548].
- CVE-2016-4448: Fixed some format string warnings with possible format
  string vulnerability [bsc#981549],
- CVE-2016-4449: Fixed inappropriate fetch of entities content [bsc#981550].
- CVE-2016-3705: Fixed missing increment of recursion counter.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/963963">SUSE bug 963963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965283">SUSE bug 965283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978395">SUSE bug 978395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981040">SUSE bug 981040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981041">SUSE bug 981041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981108">SUSE bug 981108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981109">SUSE bug 981109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981111">SUSE bug 981111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981112">SUSE bug 981112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981114">SUSE bug 981114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981115">SUSE bug 981115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981548">SUSE bug 981548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981549">SUSE bug 981549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981550">SUSE bug 981550</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8806/">CVE-2015-8806 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8806">CVE-2015-8806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1762">CVE-2016-1762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1833">CVE-2016-1833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1834">CVE-2016-1834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1835">CVE-2016-1835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1837">CVE-2016-1837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1838">CVE-2016-1838 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1839">CVE-2016-1839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1840">CVE-2016-1840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2073/">CVE-2016-2073 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2073">CVE-2016-2073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3705">CVE-2016-3705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4447/">CVE-2016-4447 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4447">CVE-2016-4447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4448/">CVE-2016-4448 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4448">CVE-2016-4448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4449/">CVE-2016-4449 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4449">CVE-2016-4449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4483">CVE-2016-4483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576520" comment="libxml2-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576521" comment="libxml2-32bit-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576522" comment="libxml2-doc-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576523" comment="libxml2-python-2.7.6-0.44.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218104" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="811686" ref_url="https://bugzilla.suse.com/811686" source="BUGZILLA"/>
		<reference ref_id="849019" ref_url="https://bugzilla.suse.com/849019" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3970" ref_url="https://www.suse.com/security/cve/CVE-2011-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-2825" ref_url="https://www.suse.com/security/cve/CVE-2012-2825/" source="CVE"/>
		<reference ref_id="CVE-2012-6139" ref_url="https://www.suse.com/security/cve/CVE-2012-6139/" source="CVE"/>
		<description>

libxslt received a security update to fix a security issue:

    * CVE-2013-4520: The XSL implementation in libxslt allowed remote
      attackers to cause a denial of service (crash) via an invalid DTD.
      (addendum due to incomplete fix for CVE-2012-2825)

Security Issue references:

    * CVE-2012-6139
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6139&gt;
    * CVE-2012-2825
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2825&gt;
    * CVE-2011-3970
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3970&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-06"/>
	<updated date="2013-11-06"/>
	<bugzilla href="https://bugzilla.suse.com/811686">SUSE bug 811686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849019">SUSE bug 849019</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3970/">CVE-2011-3970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3970">CVE-2011-3970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2825/">CVE-2012-2825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2825">CVE-2012-2825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6139/">CVE-2012-6139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6139">CVE-2012-6139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576524" comment="libxslt-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576525" comment="libxslt-32bit-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576526" comment="libxslt-x86-1.1.24-19.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576524" comment="libxslt-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576525" comment="libxslt-32bit-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576526" comment="libxslt-x86-1.1.24-19.23.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218105" version="1" class="patch">
	<metadata>
		<title>Security update for libzypp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="779177" ref_url="https://bugzilla.suse.com/779177" source="BUGZILLA"/>
		<reference ref_id="792901" ref_url="https://bugzilla.suse.com/792901" source="BUGZILLA"/>
		<reference ref_id="828672" ref_url="https://bugzilla.suse.com/828672" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-3704" ref_url="https://www.suse.com/security/cve/CVE-2013-3704/" source="CVE"/>
		<description>

libzypp did not handle multiple gpg pubkeys in the repomd.xml.key and 
content.key consistently and secure. Attackers could have exploited this to 
add their own keys and pretend it's from SUSE.

Security Issue reference:

    * CVE-2013-3704
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3704&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-22"/>
	<updated date="2013-08-22"/>
	<bugzilla href="https://bugzilla.suse.com/779177">SUSE bug 779177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792901">SUSE bug 792901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828672">SUSE bug 828672</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3704/">CVE-2013-3704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3704">CVE-2013-3704 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591536" comment="libzypp-9.16.1-0.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591536" comment="libzypp-9.16.1-0.5.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218106" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1000751" ref_url="https://bugzilla.suse.com/1000751" source="BUGZILLA"/>
		<reference ref_id="1009026" ref_url="https://bugzilla.suse.com/1009026" source="BUGZILLA"/>
		<reference ref_id="1010395" ref_url="https://bugzilla.suse.com/1010395" source="BUGZILLA"/>
		<reference ref_id="1010401" ref_url="https://bugzilla.suse.com/1010401" source="BUGZILLA"/>
		<reference ref_id="1010402" ref_url="https://bugzilla.suse.com/1010402" source="BUGZILLA"/>
		<reference ref_id="1010404" ref_url="https://bugzilla.suse.com/1010404" source="BUGZILLA"/>
		<reference ref_id="1010410" ref_url="https://bugzilla.suse.com/1010410" source="BUGZILLA"/>
		<reference ref_id="1010422" ref_url="https://bugzilla.suse.com/1010422" source="BUGZILLA"/>
		<reference ref_id="1010427" ref_url="https://bugzilla.suse.com/1010427" source="BUGZILLA"/>
		<reference ref_id="1010517" ref_url="https://bugzilla.suse.com/1010517" source="BUGZILLA"/>
		<reference ref_id="1012964" ref_url="https://bugzilla.suse.com/1012964" source="BUGZILLA"/>
		<reference ref_id="992549" ref_url="https://bugzilla.suse.com/992549" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5285" ref_url="https://www.suse.com/security/cve/CVE-2016-5285/" source="CVE"/>
		<reference ref_id="CVE-2016-5290" ref_url="https://www.suse.com/security/cve/CVE-2016-5290/" source="CVE"/>
		<reference ref_id="CVE-2016-5291" ref_url="https://www.suse.com/security/cve/CVE-2016-5291/" source="CVE"/>
		<reference ref_id="CVE-2016-5296" ref_url="https://www.suse.com/security/cve/CVE-2016-5296/" source="CVE"/>
		<reference ref_id="CVE-2016-5297" ref_url="https://www.suse.com/security/cve/CVE-2016-5297/" source="CVE"/>
		<reference ref_id="CVE-2016-9064" ref_url="https://www.suse.com/security/cve/CVE-2016-9064/" source="CVE"/>
		<reference ref_id="CVE-2016-9066" ref_url="https://www.suse.com/security/cve/CVE-2016-9066/" source="CVE"/>
		<reference ref_id="CVE-2016-9074" ref_url="https://www.suse.com/security/cve/CVE-2016-9074/" source="CVE"/>
		<reference ref_id="CVE-2016-9079" ref_url="https://www.suse.com/security/cve/CVE-2016-9079/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002474.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, mozilla-nss fixes security issues and bugs.

The following vulnerabilities were fixed in Firefox ESR 45.5.1 (bsc#1009026):

- CVE-2016-9079: Use-after-free in SVG Animation (bsc#1012964 MFSA 2016-92)
- CVE-2016-5297: Incorrect argument length checking in Javascript (bsc#1010401)
- CVE-2016-9066: Integer overflow leading to a buffer overflow in nsScriptLoadHandler (bsc#1010404)
- CVE-2016-5296: Heap-buffer-overflow WRITE in rasterize_edges_1 (bsc#1010395)
- CVE-2016-9064: Addons update must verify IDs match between current and new versions (bsc#1010402)
- CVE-2016-5290: Memory safety bugs fixed in Firefox 50 and Firefox ESR 45.5 (bsc#1010427)
- CVE-2016-5291: Same-origin policy violation using local HTML file and saved shortcut file (bsc#1010410)

The following vulnerabilities were fixed in mozilla-nss 3.21.3:

- CVE-2016-9074: Insufficient timing side-channel resistance in divSpoiler (bsc#1010422)
- CVE-2016-5285: Missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime causes server crash (bsc#1010517)

The following bugs were fixed:

- Firefox would fail to go into fullscreen mode with some window managers (bsc#992549)
- font warning messages would flood console, now using fontconfig configuration from
  firefox-fontconfig instead of the system one (bsc#1000751)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-13"/>
	<updated date="2016-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000751">SUSE bug 1000751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010395">SUSE bug 1010395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010401">SUSE bug 1010401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010402">SUSE bug 1010402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010404">SUSE bug 1010404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010410">SUSE bug 1010410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010422">SUSE bug 1010422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010427">SUSE bug 1010427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010517">SUSE bug 1010517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012964">SUSE bug 1012964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992549">SUSE bug 992549</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5285/">CVE-2016-5285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5285">CVE-2016-5285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5290/">CVE-2016-5290 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5290">CVE-2016-5290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5291/">CVE-2016-5291 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5291">CVE-2016-5291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5296/">CVE-2016-5296 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5296">CVE-2016-5296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5297/">CVE-2016-5297 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5297">CVE-2016-5297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9064/">CVE-2016-9064 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9064">CVE-2016-9064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9066/">CVE-2016-9066 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9066">CVE-2016-9066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9074/">CVE-2016-9074 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9074">CVE-2016-9074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9079/">CVE-2016-9079 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9079">CVE-2016-9079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576527" comment="MozillaFirefox-45.5.1esr-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576528" comment="MozillaFirefox-translations-45.5.1esr-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576529" comment="libfreebl3-3.21.3-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576530" comment="libfreebl3-32bit-3.21.3-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576531" comment="mozilla-nss-3.21.3-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576532" comment="mozilla-nss-32bit-3.21.3-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576533" comment="mozilla-nss-devel-3.21.3-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576534" comment="mozilla-nss-tools-3.21.3-30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218107" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLED, MozillaFirefox-branding-SLES-for-VMware, mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="954447" ref_url="https://bugzilla.suse.com/954447" source="BUGZILLA"/>
		<reference ref_id="959888" ref_url="https://bugzilla.suse.com/959888" source="BUGZILLA"/>
		<reference ref_id="963520" ref_url="https://bugzilla.suse.com/963520" source="BUGZILLA"/>
		<reference ref_id="963632" ref_url="https://bugzilla.suse.com/963632" source="BUGZILLA"/>
		<reference ref_id="963635" ref_url="https://bugzilla.suse.com/963635" source="BUGZILLA"/>
		<reference ref_id="963731" ref_url="https://bugzilla.suse.com/963731" source="BUGZILLA"/>
		<reference ref_id="967087" ref_url="https://bugzilla.suse.com/967087" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523/" source="CVE"/>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<reference ref_id="CVE-2016-1938" ref_url="https://www.suse.com/security/cve/CVE-2016-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001894.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nss fixes the following issues: 

Firefox 38.6.1 ESR (bsc#967087)

The following vulnerabilities were fixed:

- CVE-2016-1523: Fixed denial of service in Graphite 2 library (MFSA 2016-14/bmo#1246093)

Firefox 38.6.0 ESR + Mozilla NSS 3.20.2. (bsc#963520)

The following vulnerabilities were fixed:

- CVE-2016-1930: Memory safety bugs fixed in Firefox ESR 38.6 (bsc#963632)
- CVE-2016-1935: Buffer overflow in WebGL after out of memory allocation (bsc#963635)
- CVE-2016-1938: Calculations with mp_div and mp_exptmod in Network Security Services (NSS) canproduce wrong results (bsc#963731)
- CVE-2015-7575: MD5 signatures accepted within TLS 1.2 ServerKeyExchange in server signature (bsc#959888)

The following improvements were added:

- bsc#954447: Mozilla NSS now supports a number of new DHE ciphersuites
- Tracking protection is now enabled by default
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-25"/>
	<updated date="2016-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954447">SUSE bug 954447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959888">SUSE bug 959888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963520">SUSE bug 963520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963632">SUSE bug 963632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963635">SUSE bug 963635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963731">SUSE bug 963731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967087">SUSE bug 967087</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1523">CVE-2016-1523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1930">CVE-2016-1930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1935">CVE-2016-1935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1938/">CVE-2016-1938 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1938">CVE-2016-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576535" comment="MozillaFirefox-38.6.1esr-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576536" comment="MozillaFirefox-branding-SLED-38-15.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576537" comment="MozillaFirefox-translations-38.6.1esr-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576538" comment="libfreebl3-3.20.2-17.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576539" comment="libfreebl3-32bit-3.20.2-17.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576540" comment="mozilla-nss-3.20.2-17.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576541" comment="mozilla-nss-32bit-3.20.2-17.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576542" comment="mozilla-nss-devel-3.20.2-17.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576543" comment="mozilla-nss-tools-3.20.2-17.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218108" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="935033" ref_url="https://bugzilla.suse.com/935033" source="BUGZILLA"/>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="940806" ref_url="https://bugzilla.suse.com/940806" source="BUGZILLA"/>
		<reference ref_id="940918" ref_url="https://bugzilla.suse.com/940918" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4474" ref_url="https://www.suse.com/security/cve/CVE-2015-4474/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox is being updated to the current Firefox 38ESR branch (specifically the 38.2.0ESR release).

Security issues fixed:
- MFSA 2015-78 / CVE-2015-4495: Same origin violation and local file stealing via PDF reader
- MFSA 2015-79 / CVE-2015-4473/CVE-2015-4474: Miscellaneous memory safety hazards (rv:40.0 / rv:38.2)
- MFSA 2015-80 / CVE-2015-4475: Out-of-bounds read with malformed MP3 file
- MFSA 2015-82 / CVE-2015-4478: Redefinition of non-configurable JavaScript object properties
- MFSA 2015-83 / CVE-2015-4479: Overflow issues in libstagefright
- MFSA 2015-87 / CVE-2015-4484: Crash when using shared memory in JavaScript
- MFSA 2015-88 / CVE-2015-4491: Heap overflow in gdk-pixbuf when scaling bitmap images
- MFSA 2015-89 / CVE-2015-4485/CVE-2015-4486: Buffer overflows on Libvpx when decoding WebM video
- MFSA 2015-90 / CVE-2015-4487/CVE-2015-4488/CVE-2015-4489: Vulnerabilities found through code inspection
- MFSA 2015-92 / CVE-2015-4492: Use-after-free in XMLHttpRequest with shared workers

The following vulnerabilities were fixed in ESR31 and are also included here:
- CVE-2015-2724/CVE-2015-2725/CVE-2015-2726: Miscellaneous memory safety hazards (bsc#935979).
- CVE-2015-2728: Type confusion in Indexed Database Manager (bsc#935979).
- CVE-2015-2730: ECDSA signature validation fails to handle some signatures correctly (bsc#935979).
- CVE-2015-2722/CVE-2015-2733: Use-after-free in workers while using XMLHttpRequest (bsc#935979).
- CVE-2015-2734/CVE-2015-2735/CVE-2015-2736/CVE-2015-2737/CVE-2015-2738/CVE-2015-2739/CVE-2015-2740: Vulnerabilities found through code inspection (bsc#935979).
- CVE-2015-2743: Privilege escalation in PDF.js (bsc#935979).
- CVE-2015-4000: NSS accepts export-length DHE keys with regular DHE cipher suites (bsc#935033).
- CVE-2015-2721: NSS incorrectly permits skipping of ServerKeyExchange (bsc#935979).

This update also contains a lot of feature improvements and bug fixes from 31ESR to 38ESR.

Also the Mozilla NSS library switched its CKBI API from 1.98 to 2.4, which is what Firefox 38ESR uses.

Mozilla Firefox and mozilla-nss were updated to fix 17 security issues.

		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-25"/>
	<updated date="2015-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/935033">SUSE bug 935033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940918">SUSE bug 940918</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2721">CVE-2015-2721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2722">CVE-2015-2722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2724">CVE-2015-2724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2725">CVE-2015-2725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2726">CVE-2015-2726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2728">CVE-2015-2728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2730">CVE-2015-2730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2733">CVE-2015-2733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2734">CVE-2015-2734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2735">CVE-2015-2735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2736">CVE-2015-2736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2737">CVE-2015-2737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2738">CVE-2015-2738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2739">CVE-2015-2739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2740">CVE-2015-2740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2743">CVE-2015-2743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4473">CVE-2015-4473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4474/">CVE-2015-4474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4474">CVE-2015-4474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4475">CVE-2015-4475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4478">CVE-2015-4478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4479">CVE-2015-4479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4484">CVE-2015-4484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4485">CVE-2015-4485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4486">CVE-2015-4486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4487">CVE-2015-4487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4488">CVE-2015-4488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4489">CVE-2015-4489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4491">CVE-2015-4491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4492">CVE-2015-4492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4495">CVE-2015-4495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572670" comment="MozillaFirefox-38.2.0esr-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572671" comment="MozillaFirefox-branding-SLED-31.0-0.5.7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572672" comment="MozillaFirefox-translations-38.2.0esr-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572673" comment="firefox-libgcc_s1-4.7.2_20130108-0.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572674" comment="firefox-libstdc++6-4.7.2_20130108-0.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572675" comment="libfreebl3-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572676" comment="libfreebl3-32bit-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572677" comment="mozilla-nss-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572678" comment="mozilla-nss-32bit-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572679" comment="mozilla-nss-devel-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572680" comment="mozilla-nss-tools-3.19.2.0-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218109" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2015:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001554.html" source="SUSE-SU"/>
		<description>
mozilla-nspr was update to version 4.10.8		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-14"/>
	<updated date="2015-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572681" comment="mozilla-nspr-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572682" comment="mozilla-nspr-32bit-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572683" comment="mozilla-nspr-devel-4.10.8-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218110" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla NSS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="847708" ref_url="https://bugzilla.suse.com/847708" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<description>

Mozilla NSS has been updated to 3.15.2 (bnc#847708) bringing various 
features and bugfixes:

The main feature is TLS 1.2 support and its dependent algorithms.

    * Support for AES-GCM ciphersuites that use the SHA-256 PRF
    * MD2, MD4, and MD5 signatures are no longer accepted for OCSP or CRLs
    * Add PK11_CipherFinal macro
    * sizeof() used incorrectly
    * nssutil_ReadSecmodDB() leaks memory
    * Allow SSL_HandshakeNegotiatedExtension to be called before the
      handshake is finished.
    * Deprecate the SSL cipher policy code
    * Avoid uninitialized data read in the event of a decryption failure.
      (CVE-2013-1739)

Changes coming with version 3.15.1:

    * TLS 1.2 (RFC 5246) is supported. HMAC-SHA256 cipher suites (RFC 5246
      and RFC 5289) are supported, allowing TLS to be used without MD5 and
      SHA-1.
      Note the following limitations:
      The hash function used in the signature for TLS 1.2 client
      authentication must be the hash function of the TLS 1.2 PRF, which is
      always SHA-256 in NSS 3.15.1. AES GCM cipher suites are not yet
      supported.
          o some bugfixes and improvements

Changes with version 3.15

    * New Functionality
          o Support for OCSP Stapling (RFC 6066, Certificate Status
            Request) has been added for both client and server sockets. TLS
            client applications may enable this via a call to
            SSL_OptionSetDefault(SSL_ENABLE_OCSP_STAPLING, PR_TRUE);
          o Added function SECITEM_ReallocItemV2. It replaces function
            SECITEM_ReallocItem, which is now declared as obsolete.
          o Support for single-operation (eg: not multi-part) symmetric key
            encryption and decryption, via PK11_Encrypt and PK11_Decrypt.
          o certutil has been updated to support creating name constraints
            extensions.

Security Issue reference:

    * CVE-2013-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-29"/>
	<updated date="2013-10-29"/>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1739">CVE-2013-1739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576544" comment="libfreebl3-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576545" comment="libfreebl3-32bit-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576546" comment="libfreebl3-x86-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576547" comment="mozilla-nspr-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576548" comment="mozilla-nspr-32bit-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576549" comment="mozilla-nspr-x86-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576550" comment="mozilla-nss-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576551" comment="mozilla-nss-32bit-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576552" comment="mozilla-nss-tools-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576553" comment="mozilla-nss-x86-3.15.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576544" comment="libfreebl3-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576545" comment="libfreebl3-32bit-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576546" comment="libfreebl3-x86-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576547" comment="mozilla-nspr-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576548" comment="mozilla-nspr-32bit-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576549" comment="mozilla-nspr-x86-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576550" comment="mozilla-nss-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576551" comment="mozilla-nss-32bit-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576552" comment="mozilla-nss-tools-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576553" comment="mozilla-nss-x86-3.15.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218111" version="1" class="patch">
	<metadata>
		<title>Security update for nagios</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="797237" ref_url="https://bugzilla.suse.com/797237" source="BUGZILLA"/>
		<reference ref_id="856837" ref_url="https://bugzilla.suse.com/856837" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6096" ref_url="https://www.suse.com/security/cve/CVE-2012-6096/" source="CVE"/>
		<reference ref_id="CVE-2013-7108" ref_url="https://www.suse.com/security/cve/CVE-2013-7108/" source="CVE"/>
		<description>

This update fixes a DoS vulnerability in process_cgivars() of the nagios 
package. CVE-2013-7108 has been assigned to this issue.

Security Issue reference:

    * CVE-2013-7108
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7108&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-08"/>
	<updated date="2014-01-08"/>
	<bugzilla href="https://bugzilla.suse.com/797237">SUSE bug 797237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856837">SUSE bug 856837</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6096/">CVE-2012-6096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6096">CVE-2012-6096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7108/">CVE-2013-7108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7108">CVE-2013-7108 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576554" comment="nagios-3.0.6-1.25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576555" comment="nagios-www-3.0.6-1.25.34.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576554" comment="nagios-3.0.6-1.25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576555" comment="nagios-www-3.0.6-1.25.34.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218112" version="1" class="patch">
	<metadata>
		<title>Security update for nagios-nrpe, nagios-plugins-nrpe</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="807241" ref_url="https://bugzilla.suse.com/807241" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1362" ref_url="https://www.suse.com/security/cve/CVE-2013-1362/" source="CVE"/>
		<description>

Nagios NRPE was updated to add more blacklisting to avoid shell injection 
via nagios request packets (CVE-2013-1362).

Security Issues:

    * CVE-2013-1362
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1362&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-07-10"/>
	<updated date="2013-07-10"/>
	<bugzilla href="https://bugzilla.suse.com/807241">SUSE bug 807241</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1362/">CVE-2013-1362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1362">CVE-2013-1362 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576556" comment="nagios-nrpe-2.12-24.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576557" comment="nagios-nrpe-doc-2.12-24.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576558" comment="nagios-plugins-nrpe-2.12-24.4.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576556" comment="nagios-nrpe-2.12-24.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576557" comment="nagios-nrpe-doc-2.12-24.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576558" comment="nagios-plugins-nrpe-2.12-24.4.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218113" version="1" class="patch">
	<metadata>
		<title>Recommended update for nfs-client</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="752537" ref_url="https://bugzilla.suse.com/752537" source="BUGZILLA"/>
		<reference ref_id="756479" ref_url="https://bugzilla.suse.com/756479" source="BUGZILLA"/>
		<reference ref_id="758492" ref_url="https://bugzilla.suse.com/758492" source="BUGZILLA"/>
		<reference ref_id="772120" ref_url="https://bugzilla.suse.com/772120" source="BUGZILLA"/>
		<reference ref_id="775216" ref_url="https://bugzilla.suse.com/775216" source="BUGZILLA"/>
		<reference ref_id="787272" ref_url="https://bugzilla.suse.com/787272" source="BUGZILLA"/>
		<reference ref_id="788245" ref_url="https://bugzilla.suse.com/788245" source="BUGZILLA"/>
		<reference ref_id="800414" ref_url="https://bugzilla.suse.com/800414" source="BUGZILLA"/>
		<reference ref_id="802823" ref_url="https://bugzilla.suse.com/802823" source="BUGZILLA"/>
		<reference ref_id="813464" ref_url="https://bugzilla.suse.com/813464" source="BUGZILLA"/>
		<reference ref_id="816897" ref_url="https://bugzilla.suse.com/816897" source="BUGZILLA"/>
		<reference ref_id="818094" ref_url="https://bugzilla.suse.com/818094" source="BUGZILLA"/>
		<reference ref_id="832264" ref_url="https://bugzilla.suse.com/832264" source="BUGZILLA"/>
		<reference ref_id="834164" ref_url="https://bugzilla.suse.com/834164" source="BUGZILLA"/>
		<reference ref_id="841971" ref_url="https://bugzilla.suse.com/841971" source="BUGZILLA"/>
		<reference ref_id="844015" ref_url="https://bugzilla.suse.com/844015" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1923" ref_url="https://www.suse.com/security/cve/CVE-2013-1923/" source="CVE"/>
		<description>

This update for nfs-utils provides the following fixes:

    * Fix decoding of octal encoded fields in idmapd. (bnc#802823)
    * Improve support for GSS security negotiation with old servers.
      (bnc#844015)
    * Correctly handle sub-directory exports from file systems with 64-bit
      inode numbers. (bnc#841971)
    * Ensure ldconfig cache is updated when libraries exist on NFS mounted
      file system. (bnc#834164)
    * Make it easy to enable NFSv4.1 support on server. (bnc#832264)

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-28"/>
	<updated date="2013-10-28"/>
	<bugzilla href="https://bugzilla.suse.com/752537">SUSE bug 752537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/756479">SUSE bug 756479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758492">SUSE bug 758492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772120">SUSE bug 772120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775216">SUSE bug 775216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787272">SUSE bug 787272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788245">SUSE bug 788245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800414">SUSE bug 800414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802823">SUSE bug 802823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813464">SUSE bug 813464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816897">SUSE bug 816897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818094">SUSE bug 818094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/832264">SUSE bug 832264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834164">SUSE bug 834164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841971">SUSE bug 841971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844015">SUSE bug 844015</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1923/">CVE-2013-1923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1923">CVE-2013-1923 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992511" comment="nfs-client-1.2.3-18.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992512" comment="nfs-doc-1.2.3-18.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992513" comment="nfs-kernel-server-1.2.3-18.33.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992511" comment="nfs-client-1.2.3-18.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992512" comment="nfs-doc-1.2.3-18.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992513" comment="nfs-kernel-server-1.2.3-18.33.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218114" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="850148" ref_url="https://bugzilla.suse.com/850148" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1741" ref_url="https://www.suse.com/security/cve/CVE-2013-1741/" source="CVE"/>
		<reference ref_id="CVE-2013-5605" ref_url="https://www.suse.com/security/cve/CVE-2013-5605/" source="CVE"/>
		<reference ref_id="CVE-2013-5606" ref_url="https://www.suse.com/security/cve/CVE-2013-5606/" source="CVE"/>
		<reference ref_id="CVE-2013-5607" ref_url="https://www.suse.com/security/cve/CVE-2013-5607/" source="CVE"/>
		<description>

Mozilla NSPR and NSS were updated to fix various security bugs that could 
be used to crash the browser or potentially execute code.

Mozilla NSPR 4.10.2 has the following bug fixes:

    * Bug 770534: Possible pointer overflow in PL_ArenaAllocate(). Fixed by
      Pascal Cuoq and Kamil Dudka.
    * Bug 888546: ptio.c:PR_ImportUDPSocket doesn't work. Fixed by Miloslav
      Trmac.
    * Bug 915522: VS2013 support for NSPR. Fixed by Makoto Kato.
    * Bug 927687: Avoid unsigned integer wrapping in PL_ArenaAllocate.
      (CVE-2013-5607)

Mozilla NSS 3.15.3 is a patch release for NSS 3.15 and includes the 
following bug fixes:

    * Bug 925100: Ensure a size is &lt;= half of the maximum PRUint32 value.
      (CVE-2013-1741)
    * Bug 934016: Handle invalid handshake packets. (CVE-2013-5605)
    * Bug 910438: Return the correct result in CERT_VerifyCert on failure,
      if a verifyLog isn't used. (CVE-2013-5606)

Security Issue references:

    * CVE-2013-1741
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741&gt;
    * CVE-2013-5605
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605&gt;
    * CVE-2013-5606
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606&gt;
    * CVE-2013-5607
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5607&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-21"/>
	<updated date="2013-11-21"/>
	<bugzilla href="https://bugzilla.suse.com/850148">SUSE bug 850148</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1741/">CVE-2013-1741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1741">CVE-2013-1741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5605/">CVE-2013-5605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5605">CVE-2013-5605 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5606/">CVE-2013-5606 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5606">CVE-2013-5606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5607/">CVE-2013-5607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5607">CVE-2013-5607 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576559" comment="libfreebl3-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576560" comment="libfreebl3-32bit-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576561" comment="libfreebl3-x86-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576562" comment="mozilla-nspr-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576563" comment="mozilla-nspr-32bit-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576564" comment="mozilla-nspr-x86-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576565" comment="mozilla-nss-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576566" comment="mozilla-nss-32bit-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576567" comment="mozilla-nss-tools-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576568" comment="mozilla-nss-x86-3.15.3-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576559" comment="libfreebl3-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576560" comment="libfreebl3-32bit-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576561" comment="libfreebl3-x86-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576562" comment="mozilla-nspr-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576563" comment="mozilla-nspr-32bit-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576564" comment="mozilla-nspr-x86-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576565" comment="mozilla-nss-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576566" comment="mozilla-nss-32bit-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576567" comment="mozilla-nss-tools-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576568" comment="mozilla-nss-x86-3.15.3-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218115" version="1" class="patch">
	<metadata>
		<title>Security update for libfreebl3</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="854367" ref_url="https://bugzilla.suse.com/854367" source="BUGZILLA"/>
		<description>

Mozilla NSS has been updated to the 3.15.3.1 security release.

The update blacklists an intermediate CA that was abused to create man in 
the middle certificates.

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-13"/>
	<updated date="2013-12-13"/>
	<bugzilla href="https://bugzilla.suse.com/854367">SUSE bug 854367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576569" comment="libfreebl3-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576570" comment="libfreebl3-32bit-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576571" comment="libfreebl3-x86-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576572" comment="mozilla-nss-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576573" comment="mozilla-nss-32bit-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576574" comment="mozilla-nss-tools-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576575" comment="mozilla-nss-x86-3.15.3.1-0.4.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576569" comment="libfreebl3-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576570" comment="libfreebl3-32bit-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576571" comment="libfreebl3-x86-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576572" comment="mozilla-nss-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576573" comment="mozilla-nss-32bit-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576574" comment="mozilla-nss-tools-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576575" comment="mozilla-nss-x86-3.15.3.1-0.4.2.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218116" version="1" class="patch">
	<metadata>
		<title>Recommended update for ntp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="758253" ref_url="https://bugzilla.suse.com/758253" source="BUGZILLA"/>
		<reference ref_id="771480" ref_url="https://bugzilla.suse.com/771480" source="BUGZILLA"/>
		<reference ref_id="910764" ref_url="https://bugzilla.suse.com/910764" source="BUGZILLA"/>
		<reference ref_id="911792" ref_url="https://bugzilla.suse.com/911792" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9293" ref_url="https://www.suse.com/security/cve/CVE-2014-9293/" source="CVE"/>
		<reference ref_id="CVE-2014-9294" ref_url="https://www.suse.com/security/cve/CVE-2014-9294/" source="CVE"/>
		<reference ref_id="CVE-2014-9295" ref_url="https://www.suse.com/security/cve/CVE-2014-9295/" source="CVE"/>
		<reference ref_id="CVE-2014-9297" ref_url="https://www.suse.com/security/cve/CVE-2014-9297/" source="CVE"/>
		<reference ref_id="CVE-2014-9298" ref_url="https://www.suse.com/security/cve/CVE-2014-9298/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0259-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001222.html" source="SUSE-SU"/>
		<description>

This collective update for the Network Time Protocol daemon (ntp) provides 
fixes for the following reports:

    * 758253: ntp fails if a host has more than 1024 IP addresses
    * 771480: sntp not able to sync against Windows ntp server.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-22"/>
	<updated date="2012-11-22"/>
	<bugzilla href="https://bugzilla.suse.com/758253">SUSE bug 758253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/771480">SUSE bug 771480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910764">SUSE bug 910764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9293/">CVE-2014-9293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9293">CVE-2014-9293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9294/">CVE-2014-9294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9294">CVE-2014-9294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9295/">CVE-2014-9295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9295">CVE-2014-9295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9297/">CVE-2014-9297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9297">CVE-2014-9297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9298/">CVE-2014-9298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9298">CVE-2014-9298 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992514" comment="ntp-4.2.4p8-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992515" comment="ntp-doc-4.2.4p8-1.20.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992514" comment="ntp-4.2.4p8-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992515" comment="ntp-doc-4.2.4p8-1.20.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992514" comment="ntp-4.2.4p8-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992515" comment="ntp-doc-4.2.4p8-1.20.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218117" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="782060" ref_url="https://bugzilla.suse.com/782060" source="BUGZILLA"/>
		<reference ref_id="784760" ref_url="https://bugzilla.suse.com/784760" source="BUGZILLA"/>
		<reference ref_id="905885" ref_url="https://bugzilla.suse.com/905885" source="BUGZILLA"/>
		<reference ref_id="910063" ref_url="https://bugzilla.suse.com/910063" source="BUGZILLA"/>
		<reference ref_id="916617" ref_url="https://bugzilla.suse.com/916617" source="BUGZILLA"/>
		<reference ref_id="920183" ref_url="https://bugzilla.suse.com/920183" source="BUGZILLA"/>
		<reference ref_id="920238" ref_url="https://bugzilla.suse.com/920238" source="BUGZILLA"/>
		<reference ref_id="926510" ref_url="https://bugzilla.suse.com/926510" source="BUGZILLA"/>
		<reference ref_id="936327" ref_url="https://bugzilla.suse.com/936327" source="BUGZILLA"/>
		<reference ref_id="937837" ref_url="https://bugzilla.suse.com/937837" source="BUGZILLA"/>
		<reference ref_id="942441" ref_url="https://bugzilla.suse.com/942441" source="BUGZILLA"/>
		<reference ref_id="942587" ref_url="https://bugzilla.suse.com/942587" source="BUGZILLA"/>
		<reference ref_id="943216" ref_url="https://bugzilla.suse.com/943216" source="BUGZILLA"/>
		<reference ref_id="943218" ref_url="https://bugzilla.suse.com/943218" source="BUGZILLA"/>
		<reference ref_id="944300" ref_url="https://bugzilla.suse.com/944300" source="BUGZILLA"/>
		<reference ref_id="946386" ref_url="https://bugzilla.suse.com/946386" source="BUGZILLA"/>
		<reference ref_id="951351" ref_url="https://bugzilla.suse.com/951351" source="BUGZILLA"/>
		<reference ref_id="951559" ref_url="https://bugzilla.suse.com/951559" source="BUGZILLA"/>
		<reference ref_id="951608" ref_url="https://bugzilla.suse.com/951608" source="BUGZILLA"/>
		<reference ref_id="951629" ref_url="https://bugzilla.suse.com/951629" source="BUGZILLA"/>
		<reference ref_id="954982" ref_url="https://bugzilla.suse.com/954982" source="BUGZILLA"/>
		<reference ref_id="956773" ref_url="https://bugzilla.suse.com/956773" source="BUGZILLA"/>
		<reference ref_id="962318" ref_url="https://bugzilla.suse.com/962318" source="BUGZILLA"/>
		<reference ref_id="962784" ref_url="https://bugzilla.suse.com/962784" source="BUGZILLA"/>
		<reference ref_id="962802" ref_url="https://bugzilla.suse.com/962802" source="BUGZILLA"/>
		<reference ref_id="962960" ref_url="https://bugzilla.suse.com/962960" source="BUGZILLA"/>
		<reference ref_id="962966" ref_url="https://bugzilla.suse.com/962966" source="BUGZILLA"/>
		<reference ref_id="962970" ref_url="https://bugzilla.suse.com/962970" source="BUGZILLA"/>
		<reference ref_id="962988" ref_url="https://bugzilla.suse.com/962988" source="BUGZILLA"/>
		<reference ref_id="962994" ref_url="https://bugzilla.suse.com/962994" source="BUGZILLA"/>
		<reference ref_id="962995" ref_url="https://bugzilla.suse.com/962995" source="BUGZILLA"/>
		<reference ref_id="962997" ref_url="https://bugzilla.suse.com/962997" source="BUGZILLA"/>
		<reference ref_id="963000" ref_url="https://bugzilla.suse.com/963000" source="BUGZILLA"/>
		<reference ref_id="963002" ref_url="https://bugzilla.suse.com/963002" source="BUGZILLA"/>
		<reference ref_id="975496" ref_url="https://bugzilla.suse.com/975496" source="BUGZILLA"/>
		<reference ref_id="975981" ref_url="https://bugzilla.suse.com/975981" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5194" ref_url="https://www.suse.com/security/cve/CVE-2015-5194/" source="CVE"/>
		<reference ref_id="CVE-2015-5219" ref_url="https://www.suse.com/security/cve/CVE-2015-5219/" source="CVE"/>
		<reference ref_id="CVE-2015-5300" ref_url="https://www.suse.com/security/cve/CVE-2015-5300/" source="CVE"/>
		<reference ref_id="CVE-2015-7691" ref_url="https://www.suse.com/security/cve/CVE-2015-7691/" source="CVE"/>
		<reference ref_id="CVE-2015-7692" ref_url="https://www.suse.com/security/cve/CVE-2015-7692/" source="CVE"/>
		<reference ref_id="CVE-2015-7701" ref_url="https://www.suse.com/security/cve/CVE-2015-7701/" source="CVE"/>
		<reference ref_id="CVE-2015-7702" ref_url="https://www.suse.com/security/cve/CVE-2015-7702/" source="CVE"/>
		<reference ref_id="CVE-2015-7703" ref_url="https://www.suse.com/security/cve/CVE-2015-7703/" source="CVE"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<reference ref_id="CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705/" source="CVE"/>
		<reference ref_id="CVE-2015-7848" ref_url="https://www.suse.com/security/cve/CVE-2015-7848/" source="CVE"/>
		<reference ref_id="CVE-2015-7849" ref_url="https://www.suse.com/security/cve/CVE-2015-7849/" source="CVE"/>
		<reference ref_id="CVE-2015-7850" ref_url="https://www.suse.com/security/cve/CVE-2015-7850/" source="CVE"/>
		<reference ref_id="CVE-2015-7851" ref_url="https://www.suse.com/security/cve/CVE-2015-7851/" source="CVE"/>
		<reference ref_id="CVE-2015-7852" ref_url="https://www.suse.com/security/cve/CVE-2015-7852/" source="CVE"/>
		<reference ref_id="CVE-2015-7853" ref_url="https://www.suse.com/security/cve/CVE-2015-7853/" source="CVE"/>
		<reference ref_id="CVE-2015-7854" ref_url="https://www.suse.com/security/cve/CVE-2015-7854/" source="CVE"/>
		<reference ref_id="CVE-2015-7855" ref_url="https://www.suse.com/security/cve/CVE-2015-7855/" source="CVE"/>
		<reference ref_id="CVE-2015-7871" ref_url="https://www.suse.com/security/cve/CVE-2015-7871/" source="CVE"/>
		<reference ref_id="CVE-2015-7973" ref_url="https://www.suse.com/security/cve/CVE-2015-7973/" source="CVE"/>
		<reference ref_id="CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974/" source="CVE"/>
		<reference ref_id="CVE-2015-7975" ref_url="https://www.suse.com/security/cve/CVE-2015-7975/" source="CVE"/>
		<reference ref_id="CVE-2015-7976" ref_url="https://www.suse.com/security/cve/CVE-2015-7976/" source="CVE"/>
		<reference ref_id="CVE-2015-7977" ref_url="https://www.suse.com/security/cve/CVE-2015-7977/" source="CVE"/>
		<reference ref_id="CVE-2015-7978" ref_url="https://www.suse.com/security/cve/CVE-2015-7978/" source="CVE"/>
		<reference ref_id="CVE-2015-7979" ref_url="https://www.suse.com/security/cve/CVE-2015-7979/" source="CVE"/>
		<reference ref_id="CVE-2015-8138" ref_url="https://www.suse.com/security/cve/CVE-2015-8138/" source="CVE"/>
		<reference ref_id="CVE-2015-8139" ref_url="https://www.suse.com/security/cve/CVE-2015-8139/" source="CVE"/>
		<reference ref_id="CVE-2015-8140" ref_url="https://www.suse.com/security/cve/CVE-2015-8140/" source="CVE"/>
		<reference ref_id="CVE-2015-8158" ref_url="https://www.suse.com/security/cve/CVE-2015-8158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002064.html" source="SUSE-SU"/>
		<description>

This network time protocol server ntp was updated to 4.2.8p6 to fix the following
issues:

Also yast2-ntp-client was updated to match some sntp syntax changes. (bsc#937837)

Major functional changes:
- The 'sntp' commandline tool changed its option handling in a major way.
- 'controlkey 1' is added during update to ntp.conf to allow sntp to work.
- The local clock is being disabled during update.
- ntpd is no longer running chrooted.


Other functional changes:
- ntp-signd is installed.
- 'enable mode7' can be added to the configuration to allow ntdpc to work as compatibility mode option.
- 'kod' was removed from the default restrictions.
- SHA1 keys are used by default instead of MD5 keys.

These security issues were fixed:
- CVE-2015-5219: An endless loop due to incorrect precision to double conversion (bsc#943216).
- CVE-2015-8158: Fixed potential infinite loop in ntpq (bsc#962966).
- CVE-2015-8138: Zero Origin Timestamp Bypass (bsc#963002).
- CVE-2015-7979: Off-path Denial of Service (DoS) attack on authenticated broadcast mode (bsc#962784).
- CVE-2015-7978: Stack exhaustion in recursive traversal of restriction list (bsc#963000).
- CVE-2015-7977: reslist NULL pointer dereference (bsc#962970).
- CVE-2015-7976: ntpq saveconfig command allows dangerous characters in filenames (bsc#962802).
- CVE-2015-7975: nextvar() missing length check (bsc#962988).
- CVE-2015-7974: Skeleton Key: Missing key check allows impersonation between authenticated peers (bsc#962960).
- CVE-2015-7973: Replay attack on authenticated broadcast mode (bsc#962995).
- CVE-2015-8140: ntpq vulnerable to replay attacks (bsc#962994).
- CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin (bsc#962997).
- CVE-2015-5300: MITM attacker could have forced ntpd to make a step larger than the panic threshold (bsc#951629).
- CVE-2015-7871: NAK to the Future: Symmetric association authentication bypass via crypto-NAK (bsc#951608).
- CVE-2015-7855: decodenetnum() will ASSERT botch instead of returning FAIL on some bogus values (bsc#951608).
- CVE-2015-7854: Password Length Memory Corruption Vulnerability (bsc#951608).
- CVE-2015-7853: Invalid length data provided by a custom refclock driver could cause a buffer overflow (bsc#951608).
- CVE-2015-7852: ntpq atoascii() Memory Corruption Vulnerability (bsc#951608).
- CVE-2015-7851: saveconfig Directory Traversal Vulnerability (bsc#951608).
- CVE-2015-7850: remote config logfile-keyfile (bsc#951608).
- CVE-2015-7849: trusted key use-after-free (bsc#951608).
- CVE-2015-7848: mode 7 loop counter underrun (bsc#951608).
- CVE-2015-7701: Slow memory leak in CRYPTO_ASSOC (bsc#951608).
- CVE-2015-7703: configuration directives 'pidfile' and 'driftfile' should only be allowed locally (bsc#951608).
- CVE-2015-7704, CVE-2015-7705: Clients that receive a KoD should validate the origin timestamp field (bsc#951608).
- CVE-2015-7691, CVE-2015-7692, CVE-2015-7702: Incomplete autokey data packet length checks (bsc#951608).

These non-security issues were fixed:
- fate#320758 bsc#975981: Enable compile-time support for MS-SNTP (--enable-ntp-signd).
  This replaces the w32 patches in 4.2.4 that added the authreg
  directive.
- bsc#962318: Call /usr/sbin/sntp with full path to synchronize in start-ntpd.
  When run as cron job, /usr/sbin/ is not in the path, which caused
  the synchronization to fail.
- bsc#782060: Speedup ntpq.
- bsc#916617: Add /var/db/ntp-kod.
- bsc#956773: Add ntp-ENOBUFS.patch to limit a warning that might happen quite a lot on loaded systems.
- bsc#951559,bsc#975496: Fix the TZ offset output of sntp during DST.
- Add ntp-fork.patch and build with threads disabled to allow name resolution even when running chrooted.
- Add a controlkey line to /etc/ntp.conf if one does not already exist to allow runtime configuuration via ntpq.
- bsc#946386: Temporarily disable memlock to avoid problems due to high memory usage during name resolution.
- bsc#905885: Use SHA1 instead of MD5 for symmetric keys.
- Improve runtime configuration:
  * Read keytype from ntp.conf
  * Don't write ntp keys to syslog.
- Fix legacy action scripts to pass on command line arguments.
- bsc#944300: Remove 'kod' from the restrict line in ntp.conf.
- bsc#936327: Use ntpq instead of deprecated ntpdc in start-ntpd.
- Don't let 'keysdir' lines in ntp.conf trigger the 'keys' parser.
- Disable mode 7 (ntpdc) again, now that we don't use it anymore.
- Add 'addserver' as a new legacy action.
- bsc#910063: Fix the comment regarding addserver in ntp.conf.
- bsc#926510: Disable chroot by default.
- bsc#920238: Enable ntpdc for backwards compatibility.
- bsc#784760: Remove local clock from default configuration.
- bsc#942441/fate#319496: Require perl-Socket6.
- Improve runtime configuration:
  * Read keytype from ntp.conf
  * Don't write ntp keys to syslog.
- bsc#920183: Allow -4 and -6 address qualifiers in 'server' directives.
- Use upstream ntp-wait, because our version is incompatible with
  the new ntpq command line syntax.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-17"/>
	<updated date="2016-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/782060">SUSE bug 782060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784760">SUSE bug 784760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905885">SUSE bug 905885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910063">SUSE bug 910063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916617">SUSE bug 916617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920183">SUSE bug 920183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920238">SUSE bug 920238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926510">SUSE bug 926510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936327">SUSE bug 936327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937837">SUSE bug 937837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942441">SUSE bug 942441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942587">SUSE bug 942587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943218">SUSE bug 943218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944300">SUSE bug 944300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946386">SUSE bug 946386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951351">SUSE bug 951351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951559">SUSE bug 951559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951629">SUSE bug 951629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954982">SUSE bug 954982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956773">SUSE bug 956773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962318">SUSE bug 962318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962784">SUSE bug 962784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962802">SUSE bug 962802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962960">SUSE bug 962960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962966">SUSE bug 962966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962970">SUSE bug 962970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962988">SUSE bug 962988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962994">SUSE bug 962994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962997">SUSE bug 962997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963000">SUSE bug 963000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963002">SUSE bug 963002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975496">SUSE bug 975496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975981">SUSE bug 975981</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5194/">CVE-2015-5194 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5194">CVE-2015-5194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5219/">CVE-2015-5219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5219">CVE-2015-5219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5300/">CVE-2015-5300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5300">CVE-2015-5300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7691/">CVE-2015-7691 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7691">CVE-2015-7691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7692/">CVE-2015-7692 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7692">CVE-2015-7692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7701/">CVE-2015-7701 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7701">CVE-2015-7701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7702/">CVE-2015-7702 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7702">CVE-2015-7702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7703/">CVE-2015-7703 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7703">CVE-2015-7703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7704">CVE-2015-7704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7705">CVE-2015-7705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7848/">CVE-2015-7848 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7848">CVE-2015-7848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7849/">CVE-2015-7849 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7849">CVE-2015-7849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7850/">CVE-2015-7850 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7850">CVE-2015-7850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7851/">CVE-2015-7851 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7851">CVE-2015-7851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7852/">CVE-2015-7852 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7852">CVE-2015-7852 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7853/">CVE-2015-7853 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7853">CVE-2015-7853 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7854/">CVE-2015-7854 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7854">CVE-2015-7854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7855/">CVE-2015-7855 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7855">CVE-2015-7855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7871/">CVE-2015-7871 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7871">CVE-2015-7871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7973/">CVE-2015-7973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7973">CVE-2015-7973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7974">CVE-2015-7974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7975/">CVE-2015-7975 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7975">CVE-2015-7975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7976/">CVE-2015-7976 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7976">CVE-2015-7976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7977/">CVE-2015-7977 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7977">CVE-2015-7977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7978/">CVE-2015-7978 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7978">CVE-2015-7978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7979/">CVE-2015-7979 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7979">CVE-2015-7979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8138/">CVE-2015-8138 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8138">CVE-2015-8138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8139/">CVE-2015-8139 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8139">CVE-2015-8139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8140/">CVE-2015-8140 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8140">CVE-2015-8140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8158/">CVE-2015-8158 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8158">CVE-2015-8158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576576" comment="ntp-4.2.8p6-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576577" comment="ntp-doc-4.2.8p6-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572821" comment="yast2-ntp-client-2.17.14.1-1.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218118" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="957226" ref_url="https://bugzilla.suse.com/957226" source="BUGZILLA"/>
		<reference ref_id="977446" ref_url="https://bugzilla.suse.com/977446" source="BUGZILLA"/>
		<reference ref_id="977450" ref_url="https://bugzilla.suse.com/977450" source="BUGZILLA"/>
		<reference ref_id="977451" ref_url="https://bugzilla.suse.com/977451" source="BUGZILLA"/>
		<reference ref_id="977452" ref_url="https://bugzilla.suse.com/977452" source="BUGZILLA"/>
		<reference ref_id="977455" ref_url="https://bugzilla.suse.com/977455" source="BUGZILLA"/>
		<reference ref_id="977457" ref_url="https://bugzilla.suse.com/977457" source="BUGZILLA"/>
		<reference ref_id="977458" ref_url="https://bugzilla.suse.com/977458" source="BUGZILLA"/>
		<reference ref_id="977459" ref_url="https://bugzilla.suse.com/977459" source="BUGZILLA"/>
		<reference ref_id="977461" ref_url="https://bugzilla.suse.com/977461" source="BUGZILLA"/>
		<reference ref_id="977464" ref_url="https://bugzilla.suse.com/977464" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<reference ref_id="CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705/" source="CVE"/>
		<reference ref_id="CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974/" source="CVE"/>
		<reference ref_id="CVE-2016-1547" ref_url="https://www.suse.com/security/cve/CVE-2016-1547/" source="CVE"/>
		<reference ref_id="CVE-2016-1548" ref_url="https://www.suse.com/security/cve/CVE-2016-1548/" source="CVE"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2016-1550" ref_url="https://www.suse.com/security/cve/CVE-2016-1550/" source="CVE"/>
		<reference ref_id="CVE-2016-1551" ref_url="https://www.suse.com/security/cve/CVE-2016-1551/" source="CVE"/>
		<reference ref_id="CVE-2016-2516" ref_url="https://www.suse.com/security/cve/CVE-2016-2516/" source="CVE"/>
		<reference ref_id="CVE-2016-2517" ref_url="https://www.suse.com/security/cve/CVE-2016-2517/" source="CVE"/>
		<reference ref_id="CVE-2016-2518" ref_url="https://www.suse.com/security/cve/CVE-2016-2518/" source="CVE"/>
		<reference ref_id="CVE-2016-2519" ref_url="https://www.suse.com/security/cve/CVE-2016-2519/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002089.html" source="SUSE-SU"/>
		<description>

This update for ntp fixes the following issues: 

- Separate the creation of ntp.keys and key #1 in it to avoid
  problems when upgrading installations that have the file, but
  no key #1, which is needed e.g. by 'rcntp addserver'.

- Update to 4.2.8p7 (bsc#977446):
  * CVE-2016-1547, bsc#977459:
    Validate crypto-NAKs, AKA: CRYPTO-NAK DoS.
  * CVE-2016-1548, bsc#977461: Interleave-pivot
  * CVE-2016-1549, bsc#977451:
    Sybil vulnerability: ephemeral association attack.
  * CVE-2016-1550, bsc#977464: Improve NTP security against buffer
    comparison timing attacks.
  * CVE-2016-1551, bsc#977450:
    Refclock impersonation vulnerability
  * CVE-2016-2516, bsc#977452: Duplicate IPs on unconfig
    directives will cause an assertion botch in ntpd.
  * CVE-2016-2517, bsc#977455: remote configuration trustedkey/
    requestkey/controlkey values are not properly validated.
  * CVE-2016-2518, bsc#977457: Crafted addpeer with hmode &gt; 7
    causes array wraparound with MATCH_ASSOC.
  * CVE-2016-2519, bsc#977458: ctl_getitem() return value not
    always checked.
  * integrate ntp-fork.patch
  * Improve the fixes for:
    CVE-2015-7704, CVE-2015-7705, CVE-2015-7974
- Restrict the parser in the startup script to the first
  occurrance of 'keys' and 'controlkey' in ntp.conf (bsc#957226).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-01"/>
	<updated date="2016-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/957226">SUSE bug 957226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977450">SUSE bug 977450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977451">SUSE bug 977451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977452">SUSE bug 977452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977455">SUSE bug 977455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977457">SUSE bug 977457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977458">SUSE bug 977458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977459">SUSE bug 977459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977461">SUSE bug 977461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977464">SUSE bug 977464</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7704">CVE-2015-7704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7705">CVE-2015-7705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7974">CVE-2015-7974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1547/">CVE-2016-1547 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1547">CVE-2016-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1548/">CVE-2016-1548 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1548">CVE-2016-1548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1549">CVE-2016-1549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1550/">CVE-2016-1550 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1550">CVE-2016-1550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1551/">CVE-2016-1551 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1551">CVE-2016-1551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2516/">CVE-2016-2516 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2516">CVE-2016-2516 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2517/">CVE-2016-2517 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2517">CVE-2016-2517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2518/">CVE-2016-2518 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2518">CVE-2016-2518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2519/">CVE-2016-2519 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2519">CVE-2016-2519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576578" comment="ntp-4.2.8p7-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576579" comment="ntp-doc-4.2.8p7-44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218119" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="979302" ref_url="https://bugzilla.suse.com/979302" source="BUGZILLA"/>
		<reference ref_id="981422" ref_url="https://bugzilla.suse.com/981422" source="BUGZILLA"/>
		<reference ref_id="982056" ref_url="https://bugzilla.suse.com/982056" source="BUGZILLA"/>
		<reference ref_id="982064" ref_url="https://bugzilla.suse.com/982064" source="BUGZILLA"/>
		<reference ref_id="982065" ref_url="https://bugzilla.suse.com/982065" source="BUGZILLA"/>
		<reference ref_id="982066" ref_url="https://bugzilla.suse.com/982066" source="BUGZILLA"/>
		<reference ref_id="982067" ref_url="https://bugzilla.suse.com/982067" source="BUGZILLA"/>
		<reference ref_id="982068" ref_url="https://bugzilla.suse.com/982068" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4953" ref_url="https://www.suse.com/security/cve/CVE-2016-4953/" source="CVE"/>
		<reference ref_id="CVE-2016-4954" ref_url="https://www.suse.com/security/cve/CVE-2016-4954/" source="CVE"/>
		<reference ref_id="CVE-2016-4955" ref_url="https://www.suse.com/security/cve/CVE-2016-4955/" source="CVE"/>
		<reference ref_id="CVE-2016-4956" ref_url="https://www.suse.com/security/cve/CVE-2016-4956/" source="CVE"/>
		<reference ref_id="CVE-2016-4957" ref_url="https://www.suse.com/security/cve/CVE-2016-4957/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002122.html" source="SUSE-SU"/>
		<description>
ntp was updated to version 4.2.8p8 to fix five security issues.

These security issues were fixed:
- CVE-2016-4953: Bad authentication demobilizes ephemeral associations (bsc#982065).
- CVE-2016-4954: Processing spoofed server packets (bsc#982066).
- CVE-2016-4955: Autokey association reset (bsc#982067).
- CVE-2016-4956: Broadcast interleave (bsc#982068).
- CVE-2016-4957: CRYPTO_NAK crash (bsc#982064).

These non-security issues were fixed:
- Keep the parent process alive until the daemon has finished initialisation, to make sure that the PID file exists when the parent returns.
- bsc#979302: Change the process name of the forking DNS worker process to avoid the impression that ntpd is started twice.
- bsc#981422: Don't ignore SIGCHILD because it breaks wait().
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979302">SUSE bug 979302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981422">SUSE bug 981422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982056">SUSE bug 982056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982064">SUSE bug 982064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982065">SUSE bug 982065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982066">SUSE bug 982066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982067">SUSE bug 982067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982068">SUSE bug 982068</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4953/">CVE-2016-4953 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4953">CVE-2016-4953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4954/">CVE-2016-4954 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4954">CVE-2016-4954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4955/">CVE-2016-4955 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4955">CVE-2016-4955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4956/">CVE-2016-4956 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4956">CVE-2016-4956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4957/">CVE-2016-4957 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4957">CVE-2016-4957 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576580" comment="ntp-4.2.8p8-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576581" comment="ntp-doc-4.2.8p8-47.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218120" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1009434" ref_url="https://bugzilla.suse.com/1009434" source="BUGZILLA"/>
		<reference ref_id="1011377" ref_url="https://bugzilla.suse.com/1011377" source="BUGZILLA"/>
		<reference ref_id="1011390" ref_url="https://bugzilla.suse.com/1011390" source="BUGZILLA"/>
		<reference ref_id="1011395" ref_url="https://bugzilla.suse.com/1011395" source="BUGZILLA"/>
		<reference ref_id="1011398" ref_url="https://bugzilla.suse.com/1011398" source="BUGZILLA"/>
		<reference ref_id="1011404" ref_url="https://bugzilla.suse.com/1011404" source="BUGZILLA"/>
		<reference ref_id="1011406" ref_url="https://bugzilla.suse.com/1011406" source="BUGZILLA"/>
		<reference ref_id="1011411" ref_url="https://bugzilla.suse.com/1011411" source="BUGZILLA"/>
		<reference ref_id="1011417" ref_url="https://bugzilla.suse.com/1011417" source="BUGZILLA"/>
		<reference ref_id="943216" ref_url="https://bugzilla.suse.com/943216" source="BUGZILLA"/>
		<reference ref_id="956365" ref_url="https://bugzilla.suse.com/956365" source="BUGZILLA"/>
		<reference ref_id="981252" ref_url="https://bugzilla.suse.com/981252" source="BUGZILLA"/>
		<reference ref_id="988028" ref_url="https://bugzilla.suse.com/988028" source="BUGZILLA"/>
		<reference ref_id="992038" ref_url="https://bugzilla.suse.com/992038" source="BUGZILLA"/>
		<reference ref_id="992606" ref_url="https://bugzilla.suse.com/992606" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5219" ref_url="https://www.suse.com/security/cve/CVE-2015-5219/" source="CVE"/>
		<reference ref_id="CVE-2015-8139" ref_url="https://www.suse.com/security/cve/CVE-2015-8139/" source="CVE"/>
		<reference ref_id="CVE-2015-8140" ref_url="https://www.suse.com/security/cve/CVE-2015-8140/" source="CVE"/>
		<reference ref_id="CVE-2016-7426" ref_url="https://www.suse.com/security/cve/CVE-2016-7426/" source="CVE"/>
		<reference ref_id="CVE-2016-7427" ref_url="https://www.suse.com/security/cve/CVE-2016-7427/" source="CVE"/>
		<reference ref_id="CVE-2016-7428" ref_url="https://www.suse.com/security/cve/CVE-2016-7428/" source="CVE"/>
		<reference ref_id="CVE-2016-7429" ref_url="https://www.suse.com/security/cve/CVE-2016-7429/" source="CVE"/>
		<reference ref_id="CVE-2016-7431" ref_url="https://www.suse.com/security/cve/CVE-2016-7431/" source="CVE"/>
		<reference ref_id="CVE-2016-7433" ref_url="https://www.suse.com/security/cve/CVE-2016-7433/" source="CVE"/>
		<reference ref_id="CVE-2016-7434" ref_url="https://www.suse.com/security/cve/CVE-2016-7434/" source="CVE"/>
		<reference ref_id="CVE-2016-9310" ref_url="https://www.suse.com/security/cve/CVE-2016-9310/" source="CVE"/>
		<reference ref_id="CVE-2016-9311" ref_url="https://www.suse.com/security/cve/CVE-2016-9311/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
		<description>

This update for ntp fixes the following issues:

ntp was updated to 4.2.8p9.

Security issues fixed:

- CVE-2016-9311, CVE-2016-9310, bsc#1011377: Mode 6
  unauthenticated trap information disclosure and DDoS vector.
- CVE-2016-7427, bsc#1011390:
  Broadcast Mode Replay Prevention DoS.
- CVE-2016-7428, bsc#1011417:
  Broadcast Mode Poll Interval Enforcement DoS.
- CVE-2016-7431, bsc#1011395:
  Regression: 010-origin: Zero Origin Timestamp Bypass.
- CVE-2016-7434, bsc#1011398:
  Null pointer dereference in _IO_str_init_static_internal().
- CVE-2016-7429, bsc#1011404: Interface selection attack.
- CVE-2016-7426, bsc#1011406:
  Client rate limiting and server responses.
- CVE-2016-7433, bsc#1011411: Reboot sync calculation problem.
- CVE-2015-8140: ntpq vulnerable to replay attacks.
- CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin.
- CVE-2015-5219: An endless loop due to incorrect precision to
  double conversion (bsc#943216).

Non-security issues fixed:

- Fix a spurious error message.
- Other bugfixes, see /usr/share/doc/packages/ntp/ChangeLog.
- Fix a regression in 'trap' (bsc#981252).
- Reduce the number of netlink groups to listen on for changes to
  the local network setup (bsc#992606).
- Fix segfault in 'sntp -a' (bsc#1009434).
- Silence an OpenSSL version warning (bsc#992038).
- Make the resolver task change user and group IDs to the same
  values as the main task. (bsc#988028)
- Simplify ntpd's search for its own executable to prevent AppArmor
  warnings (bsc#956365).

		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-23"/>
	<updated date="2017-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009434">SUSE bug 1009434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011377">SUSE bug 1011377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011390">SUSE bug 1011390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011395">SUSE bug 1011395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011398">SUSE bug 1011398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011404">SUSE bug 1011404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011406">SUSE bug 1011406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011411">SUSE bug 1011411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011417">SUSE bug 1011417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956365">SUSE bug 956365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981252">SUSE bug 981252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988028">SUSE bug 988028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992038">SUSE bug 992038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992606">SUSE bug 992606</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5219/">CVE-2015-5219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5219">CVE-2015-5219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8139/">CVE-2015-8139 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8139">CVE-2015-8139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8140/">CVE-2015-8140 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8140">CVE-2015-8140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7426/">CVE-2016-7426 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7426">CVE-2016-7426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7427/">CVE-2016-7427 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7427">CVE-2016-7427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7428/">CVE-2016-7428 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7428">CVE-2016-7428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7429/">CVE-2016-7429 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7429">CVE-2016-7429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7431/">CVE-2016-7431 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7431">CVE-2016-7431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7433/">CVE-2016-7433 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7433">CVE-2016-7433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7434/">CVE-2016-7434 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7434">CVE-2016-7434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9310/">CVE-2016-9310 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9310">CVE-2016-9310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9311/">CVE-2016-9311 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9311">CVE-2016-9311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576582" comment="ntp-4.2.8p9-48.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576583" comment="ntp-doc-4.2.8p9-48.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218121" version="1" class="patch">
	<metadata>
		<title>Recommended update for openCryptoki</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="769412" ref_url="https://bugzilla.suse.com/769412" source="BUGZILLA"/>
		<reference ref_id="779211" ref_url="https://bugzilla.suse.com/779211" source="BUGZILLA"/>
		<reference ref_id="810121" ref_url="https://bugzilla.suse.com/810121" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4454" ref_url="https://www.suse.com/security/cve/CVE-2012-4454/" source="CVE"/>
		<reference ref_id="CVE-2012-4455" ref_url="https://www.suse.com/security/cve/CVE-2012-4455/" source="CVE"/>
		<description>

This update for openCryptoki changes the default mode of 
/var/lock/openCryptoki to allow writes from members of group pkcs11.

		</description>
<advisory from="security@suse.de">
	<issued date="2013-04-04"/>
	<updated date="2013-04-04"/>
	<bugzilla href="https://bugzilla.suse.com/769412">SUSE bug 769412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779211">SUSE bug 779211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/810121">SUSE bug 810121</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4454/">CVE-2012-4454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4454">CVE-2012-4454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4455/">CVE-2012-4455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4455">CVE-2012-4455 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992516" comment="openCryptoki-2.4-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992517" comment="openCryptoki-32bit-2.4-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992518" comment="openCryptoki-64bit-2.4-0.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992516" comment="openCryptoki-2.4-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992517" comment="openCryptoki-32bit-2.4-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992518" comment="openCryptoki-64bit-2.4-0.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218122" version="1" class="patch">
	<metadata>
		<title>Security update for OpenSSH</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="755505" ref_url="https://bugzilla.suse.com/755505" source="BUGZILLA"/>
		<reference ref_id="802639" ref_url="https://bugzilla.suse.com/802639" source="BUGZILLA"/>
		<reference ref_id="821039" ref_url="https://bugzilla.suse.com/821039" source="BUGZILLA"/>
		<reference ref_id="826906" ref_url="https://bugzilla.suse.com/826906" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-5107" ref_url="https://www.suse.com/security/cve/CVE-2010-5107/" source="CVE"/>
		<description>

This update for OpenSSH provides the following fixes:

    * Implement remote denial of service hardening. (bnc#802639,
      CVE-2010-5107)
    * Use only FIPS 140-2 approved algorithms when FIPS mode is detected.
      (bnc#755505, bnc#821039)
    * Do not link OpenSSH binaries with LDAP libraries. (bnc#826906)

Security Issue reference:

    * CVE-2010-5107
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5107&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-07-16"/>
	<updated date="2013-07-16"/>
	<bugzilla href="https://bugzilla.suse.com/755505">SUSE bug 755505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802639">SUSE bug 802639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821039">SUSE bug 821039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826906">SUSE bug 826906</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5107/">CVE-2010-5107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-5107">CVE-2010-5107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576584" comment="openssh-5.1p1-41.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576585" comment="openssh-askpass-5.1p1-41.57.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576584" comment="openssh-5.1p1-41.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576585" comment="openssh-askpass-5.1p1-41.57.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218123" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="673532" ref_url="https://bugzilla.suse.com/673532" source="BUGZILLA"/>
		<reference ref_id="903649" ref_url="https://bugzilla.suse.com/903649" source="BUGZILLA"/>
		<reference ref_id="905118" ref_url="https://bugzilla.suse.com/905118" source="BUGZILLA"/>
		<reference ref_id="914309" ref_url="https://bugzilla.suse.com/914309" source="BUGZILLA"/>
		<reference ref_id="932483" ref_url="https://bugzilla.suse.com/932483" source="BUGZILLA"/>
		<reference ref_id="936695" ref_url="https://bugzilla.suse.com/936695" source="BUGZILLA"/>
		<reference ref_id="938746" ref_url="https://bugzilla.suse.com/938746" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-5352" ref_url="https://www.suse.com/security/cve/CVE-2015-5352/" source="CVE"/>
		<reference ref_id="CVE-2015-5600" ref_url="https://www.suse.com/security/cve/CVE-2015-5600/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001650.html" source="SUSE-SU"/>
		<description>
openssh was updated to fix four security issues.

These security issues were fixed:
- CVE-2015-5352: The x11_open_helper function in channels.c in ssh in OpenSSH when ForwardX11Trusted mode is not used, lacked a check of the refusal deadline for X connections, which made it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window (bsc#936695).
- CVE-2015-5600: The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH did not properly restrict the processing of keyboard-interactive devices within a single connection, which made it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list (bsc#938746).
- CVE-2015-4000: Removed and disabled weak DH groups (bsc#932483).
- Hardening patch to fix sftp RCE (bsc#903649).

These non-security issues were fixed:
- bsc#914309: sshd inherits oom_adj -17 on SIGHUP causing DoS potential for oom_killer.
- bsc#673532: limits.conf fsize change in SLES10SP3 causing problems to WebSphere mqm user.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-19"/>
	<updated date="2015-10-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/673532">SUSE bug 673532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903649">SUSE bug 903649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905118">SUSE bug 905118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914309">SUSE bug 914309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936695">SUSE bug 936695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938746">SUSE bug 938746</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5352/">CVE-2015-5352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5352">CVE-2015-5352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5600/">CVE-2015-5600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5600">CVE-2015-5600 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576586" comment="openssh-5.1p1-41.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576587" comment="openssh-askpass-5.1p1-41.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576588" comment="openssh-askpass-gnome-5.1p1-41.69.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218124" version="1" class="patch">
	<metadata>
		<title>Recommended update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="937492" ref_url="https://bugzilla.suse.com/937492" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="SUSE-RU-2015:1469-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-September/003386.html" source="SUSE-SU"/>
		<description>

This update of openssl fixes a regression caused by the security fix for CVE-2015-0287,
after which DSA keys could occasionaly not loaded from disk. (bsc#937492)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-06"/>
	<updated date="2015-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/937492">SUSE bug 937492</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0287">CVE-2015-0287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009593836" comment="libopenssl-devel-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593837" comment="libopenssl0_9_8-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593838" comment="libopenssl0_9_8-32bit-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593839" comment="libopenssl0_9_8-hmac-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593840" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593841" comment="openssl-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593842" comment="openssl-doc-0.9.8j-0.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218125" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="952099" ref_url="https://bugzilla.suse.com/952099" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001735.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues: 

- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure
  OpenSSL would leak memory. This structure is used by the PKCS#7 and CMS
  routines so any application which reads PKCS#7 or CMS data from untrusted
  sources is affected. SSL/TLS is not affected. (bsc#957812)

- Prevent segfault in s_client with invalid options (bsc#952099)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-15"/>
	<updated date="2015-12-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952099">SUSE bug 952099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3195">CVE-2015-3195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576589" comment="libopenssl-devel-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576590" comment="libopenssl0_9_8-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576591" comment="libopenssl0_9_8-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576592" comment="libopenssl0_9_8-hmac-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576593" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576594" comment="openssl-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576595" comment="openssl-doc-0.9.8j-0.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218126" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="952871" ref_url="https://bugzilla.suse.com/952871" source="BUGZILLA"/>
		<reference ref_id="963415" ref_url="https://bugzilla.suse.com/963415" source="BUGZILLA"/>
		<reference ref_id="967787" ref_url="https://bugzilla.suse.com/967787" source="BUGZILLA"/>
		<reference ref_id="968046" ref_url="https://bugzilla.suse.com/968046" source="BUGZILLA"/>
		<reference ref_id="968047" ref_url="https://bugzilla.suse.com/968047" source="BUGZILLA"/>
		<reference ref_id="968048" ref_url="https://bugzilla.suse.com/968048" source="BUGZILLA"/>
		<reference ref_id="968051" ref_url="https://bugzilla.suse.com/968051" source="BUGZILLA"/>
		<reference ref_id="968053" ref_url="https://bugzilla.suse.com/968053" source="BUGZILLA"/>
		<reference ref_id="968374" ref_url="https://bugzilla.suse.com/968374" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0703" ref_url="https://www.suse.com/security/cve/CVE-2016-0703/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001907.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes various security issues and bugs: 

Security issues fixed:
- CVE-2016-0800 aka the 'DROWN' attack (bsc#968046):
  OpenSSL was vulnerable to a cross-protocol attack that could lead to
  decryption of TLS sessions by using a server supporting SSLv2 and
  EXPORT cipher suites as a Bleichenbacher RSA padding oracle.

  This update changes the openssl library to:

  * Disable SSLv2 protocol support by default.

    This can be overridden by setting the environment variable
    'OPENSSL_ALLOW_SSL2' or by using SSL_CTX_clear_options using the
    SSL_OP_NO_SSLv2 flag.

    Note that various services and clients had already disabled SSL
    protocol 2 by default previously.

  * Disable all weak EXPORT ciphers by default. These can be reenabled
    if required by old legacy software using the environment variable
    'OPENSSL_ALLOW_EXPORT'.

- CVE-2016-0705 (bnc#968047):
  A double free() bug in the DSA ASN1 parser code was fixed that could
  be abused to facilitate a denial-of-service attack.

- CVE-2016-0797 (bnc#968048):
  The BN_hex2bn() and BN_dec2bn() functions had a bug that could result
  in an attempt to de-reference a NULL pointer leading to crashes.
  This could have security consequences if these functions were ever
  called by user applications with large untrusted hex/decimal data. Also,
  internal usage of these functions in OpenSSL uses data from config files
  or application command line arguments. If user developed applications
  generated config file data based on untrusted data, then this could
  have had security consequences as well.

- CVE-2016-0799 (bnc#968374)
  On many 64 bit systems, the internal fmtstr() and doapr_outch()
  functions could miscalculate the length of a string and attempt to
  access out-of-bounds memory locations. These problems could have
  enabled attacks where large amounts of untrusted data is passed to
  the BIO_*printf functions. If applications use these functions in
  this way then they could have been vulnerable. OpenSSL itself uses
  these functions when printing out human-readable dumps of ASN.1
  data. Therefore applications that print this data could have been
  vulnerable if the data is from untrusted sources. OpenSSL command line
  applications could also have been vulnerable when they print out ASN.1
  data, or if untrusted data is passed as command line arguments. Libssl
  is not considered directly vulnerable.

- CVE-2015-3197 (bsc#963415):
  The SSLv2 protocol did not block disabled ciphers.

Note that the March 1st 2016 release also references following CVEs
that were fixed by us with CVE-2015-0293 in 2015:

- CVE-2016-0703 (bsc#968051): This issue only affected versions of
  OpenSSL prior to March 19th 2015 at which time the code was refactored
  to address vulnerability CVE-2015-0293. It would have made the above
  'DROWN' attack much easier.
- CVE-2016-0704 (bsc#968053): 'Bleichenbacher oracle in SSLv2'
  This issue only affected versions of OpenSSL prior to March 19th
  2015 at which time the code was refactored to address vulnerability
  CVE-2015-0293. It would have made the above 'DROWN' attack much easier.

Also fixes the following bug:
- Avoid running OPENSSL_config twice. This avoids breaking
  engine loading and also fixes a memory leak in libssl. (bsc#952871 bsc#967787)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-01"/>
	<updated date="2016-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/952871">SUSE bug 952871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963415">SUSE bug 963415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967787">SUSE bug 967787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968047">SUSE bug 968047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968048">SUSE bug 968048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968053">SUSE bug 968053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968374">SUSE bug 968374</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3197">CVE-2015-3197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0702">CVE-2016-0702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0703/">CVE-2016-0703 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0703">CVE-2016-0703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0705">CVE-2016-0705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0797">CVE-2016-0797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0799">CVE-2016-0799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0800">CVE-2016-0800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576596" comment="libopenssl-devel-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576597" comment="libopenssl0_9_8-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576598" comment="libopenssl0_9_8-32bit-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576599" comment="libopenssl0_9_8-hmac-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576600" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576601" comment="openssl-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576602" comment="openssl-doc-0.9.8j-0.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218127" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="889013" ref_url="https://bugzilla.suse.com/889013" source="BUGZILLA"/>
		<reference ref_id="968050" ref_url="https://bugzilla.suse.com/968050" source="BUGZILLA"/>
		<reference ref_id="976942" ref_url="https://bugzilla.suse.com/976942" source="BUGZILLA"/>
		<reference ref_id="976943" ref_url="https://bugzilla.suse.com/976943" source="BUGZILLA"/>
		<reference ref_id="977614" ref_url="https://bugzilla.suse.com/977614" source="BUGZILLA"/>
		<reference ref_id="977615" ref_url="https://bugzilla.suse.com/977615" source="BUGZILLA"/>
		<reference ref_id="977617" ref_url="https://bugzilla.suse.com/977617" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002056.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues: 

Security issues fixed:
- CVE-2016-2108: Memory corruption in the ASN.1 encoder (bsc#977617)
- CVE-2016-2105: EVP_EncodeUpdate overflow (bsc#977614)
- CVE-2016-2106: EVP_EncryptUpdate overflow (bsc#977615)
- CVE-2016-2109: ASN.1 BIO excessive memory allocation (bsc#976942)
- CVE-2016-0702: Side channel attack on modular exponentiation 'CacheBleed' (bsc#968050)

Bugs fixed:
- fate#320304: build 32bit devel package
- bsc#976943: Fix buffer overrun in ASN1_parse
- bsc#973223: allow weak DH groups, vulnerable to the logjam attack,
  when environment variable OPENSSL_ALLOW_LOGJAM_ATTACK is set
- bsc#889013: Rename README.SuSE to the new spelling
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-12"/>
	<updated date="2016-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/889013">SUSE bug 889013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968050">SUSE bug 968050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976943">SUSE bug 976943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977614">SUSE bug 977614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977615">SUSE bug 977615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977617">SUSE bug 977617</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0702">CVE-2016-0702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2105">CVE-2016-2105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2106">CVE-2016-2106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2108">CVE-2016-2108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2109">CVE-2016-2109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576603" comment="libopenssl-devel-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576604" comment="libopenssl0_9_8-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576605" comment="libopenssl0_9_8-32bit-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576606" comment="libopenssl0_9_8-hmac-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576607" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576608" comment="openssl-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576609" comment="openssl-doc-0.9.8j-0.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218128" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="979475" ref_url="https://bugzilla.suse.com/979475" source="BUGZILLA"/>
		<reference ref_id="982575" ref_url="https://bugzilla.suse.com/982575" source="BUGZILLA"/>
		<reference ref_id="983249" ref_url="https://bugzilla.suse.com/983249" source="BUGZILLA"/>
		<reference ref_id="993819" ref_url="https://bugzilla.suse.com/993819" source="BUGZILLA"/>
		<reference ref_id="994749" ref_url="https://bugzilla.suse.com/994749" source="BUGZILLA"/>
		<reference ref_id="994844" ref_url="https://bugzilla.suse.com/994844" source="BUGZILLA"/>
		<reference ref_id="995075" ref_url="https://bugzilla.suse.com/995075" source="BUGZILLA"/>
		<reference ref_id="995324" ref_url="https://bugzilla.suse.com/995324" source="BUGZILLA"/>
		<reference ref_id="995359" ref_url="https://bugzilla.suse.com/995359" source="BUGZILLA"/>
		<reference ref_id="995377" ref_url="https://bugzilla.suse.com/995377" source="BUGZILLA"/>
		<reference ref_id="998190" ref_url="https://bugzilla.suse.com/998190" source="BUGZILLA"/>
		<reference ref_id="999665" ref_url="https://bugzilla.suse.com/999665" source="BUGZILLA"/>
		<reference ref_id="999666" ref_url="https://bugzilla.suse.com/999666" source="BUGZILLA"/>
		<reference ref_id="999668" ref_url="https://bugzilla.suse.com/999668" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002309.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues:

OpenSSL Security Advisory [22 Sep 2016] (bsc#999665)

Severity: High
* OCSP Status Request extension unbounded memory growth (CVE-2016-6304) (bsc#999666)

Severity: Low
* Pointer arithmetic undefined behavior (CVE-2016-2177) (bsc#982575)
* Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249)
* DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
* DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
* OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
* Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359)
* Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
* OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
* Certificate message OOB reads (CVE-2016-6306) (bsc#999668)

More information can be found on: https://www.openssl.org/news/secadv/20160922.txt

Bugs fixed:
* Update expired S/MIME certs (bsc#979475)
* Fix crash in print_notice (bsc#998190)
* Resume reading from /dev/urandom when interrupted by a signal (bsc#995075)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-05"/>
	<updated date="2016-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979475">SUSE bug 979475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983249">SUSE bug 983249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993819">SUSE bug 993819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994749">SUSE bug 994749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995075">SUSE bug 995075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995324">SUSE bug 995324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995359">SUSE bug 995359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995377">SUSE bug 995377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998190">SUSE bug 998190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999666">SUSE bug 999666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999668">SUSE bug 999668</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2177">CVE-2016-2177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2178">CVE-2016-2178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2179">CVE-2016-2179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2181">CVE-2016-2181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2182">CVE-2016-2182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6302">CVE-2016-6302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6303">CVE-2016-6303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6304">CVE-2016-6304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6306">CVE-2016-6306 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576610" comment="libopenssl-devel-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576611" comment="libopenssl0_9_8-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576612" comment="libopenssl0_9_8-32bit-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576613" comment="libopenssl0_9_8-hmac-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576614" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576615" comment="openssl-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576616" comment="openssl-doc-0.9.8j-0.102.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218129" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-certs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="783509" ref_url="https://bugzilla.suse.com/783509" source="BUGZILLA"/>
		<reference ref_id="796628" ref_url="https://bugzilla.suse.com/796628" source="BUGZILLA"/>
		<reference ref_id="854367" ref_url="https://bugzilla.suse.com/854367" source="BUGZILLA"/>
		<reference ref_id="860581" ref_url="https://bugzilla.suse.com/860581" source="BUGZILLA"/>
		<reference ref_id="865080" ref_url="https://bugzilla.suse.com/865080" source="BUGZILLA"/>
		<description>

openssl-certs was updated with the current certificate data available from 
mozilla.org.

Changes:

    * Updated certificates to revision 1.95
    * Distrust a sub-ca that issued google.com certificates. 'Distrusted AC
      DG Tresor SSL' (bnc#854367)

Many CA updates from Mozilla:

    * new: CA_Disig_Root_R1:2.9.0.195.3.154.238.80.144.110.40.crt server
      auth, code signing, email signing
    * new: CA_Disig_Root_R2:2.9.0.146.184.136.219.176.138.193.99.crt server
      auth, code signing, email signing
    * new:
      China_Internet_Network_Information_Center_EV_Certificates_Root:2.4.72.159.0.1.crt
      server auth
    * changed:
      Digital_Signature_Trust_Co._Global_CA_1:2.4.54.112.21.150.crt removed
      code signing and server auth abilities
    * changed:
      Digital_Signature_Trust_Co._Global_CA_3:2.4.54.110.211.206.crt
      removed code signing and server auth abilities
    * new: D-TRUST_Root_Class_3_CA_2_2009:2.3.9.131.243.crt server auth
    * new: D-TRUST_Root_Class_3_CA_2_EV_2009:2.3.9.131.244.crt server auth
    * removed:
      Entrust.net_Premium_2048_Secure_Server_CA:2.4.56.99.185.102.crt
    * new: Entrust.net_Premium_2048_Secure_Server_CA:2.4.56.99.222.248.crt
    * removed: Equifax_Secure_eBusiness_CA_2:2.4.55.112.207.181.crt
    * new: PSCProcert:2.1.11.crt server auth, code signing, email signing
    * new:
      Swisscom_Root_CA_2:2.16.30.158.40.232.72.242.229.239.195.124.74.30.90.24.103.182.crt
      server auth, code signing, email signing
    * new:
      Swisscom_Root_EV_CA_2:2.17.0.242.250.100.226.116.99.211.141.253.16.29.4.31.118.202.88.crt
      server auth, code signing
    * changed:
      TC_TrustCenter_Universal_CA_III:2.14.99.37.0.1.0.2.20.141.51.21.2.228.108.244.crt
      removed all abilities
    * new: TURKTRUST_Certificate_Services_Provider_Root_2007:2.1.1.crt
      server auth, code signing
    * changed: TWCA_Root_Certification_Authority:2.1.1.crt added code
      signing ability
    * new 'EE Certification Centre Root CA'
    * new 'T-TeleSec GlobalRoot Class 3'
    * revoke mis-issued intermediate CAs from TURKTRUST.

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-18"/>
	<updated date="2013-12-18"/>
	<bugzilla href="https://bugzilla.suse.com/783509">SUSE bug 783509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796628">SUSE bug 796628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854367">SUSE bug 854367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860581">SUSE bug 860581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865080">SUSE bug 865080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566169" comment="openssl-certs-1.95-0.4.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566169" comment="openssl-certs-1.95-0.4.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566169" comment="openssl-certs-1.95-0.4.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218130" version="1" class="patch">
	<metadata>
		<title>Security update for openswan</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="824316" ref_url="https://bugzilla.suse.com/824316" source="BUGZILLA"/>
		<reference ref_id="859220" ref_url="https://bugzilla.suse.com/859220" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2053" ref_url="https://www.suse.com/security/cve/CVE-2013-2053/" source="CVE"/>
		<reference ref_id="CVE-2013-7294" ref_url="https://www.suse.com/security/cve/CVE-2013-7294/" source="CVE"/>
		<description>

This update fixes a Denial of Service (DoS) vulnerability via IKEv2 I1 
notifications in openswan. CVE-2013-7294 has been assigned to this issue.

Security Issues:

    * CVE-2013-7294
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7294&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-21"/>
	<updated date="2014-01-21"/>
	<bugzilla href="https://bugzilla.suse.com/824316">SUSE bug 824316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859220">SUSE bug 859220</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2053/">CVE-2013-2053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2053">CVE-2013-2053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7294/">CVE-2013-7294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7294">CVE-2013-7294 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576617" comment="openswan-2.6.16-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576618" comment="openswan-doc-2.6.16-1.40.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576617" comment="openswan-2.6.16-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576618" comment="openswan-doc-2.6.16-1.40.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218131" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="843509" ref_url="https://bugzilla.suse.com/843509" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2061" ref_url="https://www.suse.com/security/cve/CVE-2013-2061/" source="CVE"/>
		<description>

OpenVPN used a non-constant-time memcmp in HMAC comparison in 
openvpn_decrypt that might have allowed remote attackers to gain knowledge 
of plaintext data. (CVE-2013-2061)

Security Issues:

    * CVE-2013-2061
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2061&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-31"/>
	<updated date="2013-10-31"/>
	<bugzilla href="https://bugzilla.suse.com/843509">SUSE bug 843509</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2061/">CVE-2013-2061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2061">CVE-2013-2061 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576619" comment="openvpn-2.0.9-143.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576620" comment="openvpn-auth-pam-plugin-2.0.9-143.33.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576619" comment="openvpn-2.0.9-143.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576620" comment="openvpn-auth-pam-plugin-2.0.9-143.33.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218132" version="1" class="patch">
	<metadata>
		<title>Security update for Perl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="778763" ref_url="https://bugzilla.suse.com/778763" source="BUGZILLA"/>
		<reference ref_id="789994" ref_url="https://bugzilla.suse.com/789994" source="BUGZILLA"/>
		<reference ref_id="791524" ref_url="https://bugzilla.suse.com/791524" source="BUGZILLA"/>
		<reference ref_id="796014" ref_url="https://bugzilla.suse.com/796014" source="BUGZILLA"/>
		<reference ref_id="797060" ref_url="https://bugzilla.suse.com/797060" source="BUGZILLA"/>
		<reference ref_id="804415" ref_url="https://bugzilla.suse.com/804415" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1667" ref_url="https://www.suse.com/security/cve/CVE-2013-1667/" source="CVE"/>
		<description>

This update of Perl 5 fixes the following security issues:

    * fix rehash DoS [bnc#804415] [CVE-2013-1667]
    * improve CGI crlf escaping [bnc#789994] [CVE-2012-5526]
    * fix glob denial of service [bnc#796014] [CVE-2011-2728]
    * sanitize input in Maketext.pm [bnc#797060] [CVE-2012-6329]

Security Issue references:

    * CVE-2013-1667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1667&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-01"/>
	<updated date="2013-03-01"/>
	<bugzilla href="https://bugzilla.suse.com/778763">SUSE bug 778763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789994">SUSE bug 789994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791524">SUSE bug 791524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796014">SUSE bug 796014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797060">SUSE bug 797060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804415">SUSE bug 804415</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1667/">CVE-2013-1667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1667">CVE-2013-1667 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576621" comment="perl-5.10.0-64.61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576622" comment="perl-32bit-5.10.0-64.61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576623" comment="perl-base-5.10.0-64.61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576624" comment="perl-doc-5.10.0-64.61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576625" comment="perl-x86-5.10.0-64.61.61.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576621" comment="perl-5.10.0-64.61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576622" comment="perl-32bit-5.10.0-64.61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576623" comment="perl-base-5.10.0-64.61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576624" comment="perl-doc-5.10.0-64.61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576625" comment="perl-x86-5.10.0-64.61.61.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218133" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="945412" ref_url="https://bugzilla.suse.com/945412" source="BUGZILLA"/>
		<reference ref_id="945428" ref_url="https://bugzilla.suse.com/945428" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6836" ref_url="https://www.suse.com/security/cve/CVE-2015-6836/" source="CVE"/>
		<reference ref_id="CVE-2015-6837" ref_url="https://www.suse.com/security/cve/CVE-2015-6837/" source="CVE"/>
		<reference ref_id="CVE-2015-6838" ref_url="https://www.suse.com/security/cve/CVE-2015-6838/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001617.html" source="SUSE-SU"/>
		<description>

The PHP5 script interpreter was updated to fix security issues:

* CVE-2015-6836: A SOAP serialize_function_call() type confusion leading to remote code execution problem was fixed. [bnc#945428]
* CVE-2015-6837 CVE-2015-6838: Two NULL pointer dereferences in the XSLTProcessor class were fixed. [bnc#945412]
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-17"/>
	<updated date="2015-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/945412">SUSE bug 945412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945428">SUSE bug 945428</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6836/">CVE-2015-6836 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6836">CVE-2015-6836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6837/">CVE-2015-6837 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6837">CVE-2015-6837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6838/">CVE-2015-6838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6838">CVE-2015-6838 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576626" comment="apache2-mod_php5-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576627" comment="php5-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576628" comment="php5-bcmath-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576629" comment="php5-bz2-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576630" comment="php5-calendar-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576631" comment="php5-ctype-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576632" comment="php5-curl-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576633" comment="php5-dba-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576634" comment="php5-dbase-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576635" comment="php5-dom-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576636" comment="php5-exif-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576637" comment="php5-fastcgi-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576638" comment="php5-ftp-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576639" comment="php5-gd-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576640" comment="php5-gettext-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576641" comment="php5-gmp-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576642" comment="php5-hash-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576643" comment="php5-iconv-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576644" comment="php5-json-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576645" comment="php5-ldap-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576646" comment="php5-mbstring-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576647" comment="php5-mcrypt-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576648" comment="php5-mysql-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576649" comment="php5-odbc-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576650" comment="php5-openssl-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576651" comment="php5-pcntl-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576652" comment="php5-pdo-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576653" comment="php5-pear-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576654" comment="php5-pgsql-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576655" comment="php5-pspell-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576656" comment="php5-shmop-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576657" comment="php5-snmp-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576658" comment="php5-soap-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576659" comment="php5-suhosin-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576660" comment="php5-sysvmsg-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576661" comment="php5-sysvsem-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576662" comment="php5-sysvshm-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576663" comment="php5-tokenizer-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576664" comment="php5-wddx-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576665" comment="php5-xmlreader-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576666" comment="php5-xmlrpc-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576667" comment="php5-xmlwriter-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576668" comment="php5-xsl-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576669" comment="php5-zip-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576670" comment="php5-zlib-5.2.14-0.7.30.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218134" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="986004" ref_url="https://bugzilla.suse.com/986004" source="BUGZILLA"/>
		<reference ref_id="986244" ref_url="https://bugzilla.suse.com/986244" source="BUGZILLA"/>
		<reference ref_id="986386" ref_url="https://bugzilla.suse.com/986386" source="BUGZILLA"/>
		<reference ref_id="986388" ref_url="https://bugzilla.suse.com/986388" source="BUGZILLA"/>
		<reference ref_id="986393" ref_url="https://bugzilla.suse.com/986393" source="BUGZILLA"/>
		<reference ref_id="991426" ref_url="https://bugzilla.suse.com/991426" source="BUGZILLA"/>
		<reference ref_id="991427" ref_url="https://bugzilla.suse.com/991427" source="BUGZILLA"/>
		<reference ref_id="991428" ref_url="https://bugzilla.suse.com/991428" source="BUGZILLA"/>
		<reference ref_id="991429" ref_url="https://bugzilla.suse.com/991429" source="BUGZILLA"/>
		<reference ref_id="991430" ref_url="https://bugzilla.suse.com/991430" source="BUGZILLA"/>
		<reference ref_id="991433" ref_url="https://bugzilla.suse.com/991433" source="BUGZILLA"/>
		<reference ref_id="991437" ref_url="https://bugzilla.suse.com/991437" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8935" ref_url="https://www.suse.com/security/cve/CVE-2015-8935/" source="CVE"/>
		<reference ref_id="CVE-2016-5399" ref_url="https://www.suse.com/security/cve/CVE-2016-5399/" source="CVE"/>
		<reference ref_id="CVE-2016-5766" ref_url="https://www.suse.com/security/cve/CVE-2016-5766/" source="CVE"/>
		<reference ref_id="CVE-2016-5767" ref_url="https://www.suse.com/security/cve/CVE-2016-5767/" source="CVE"/>
		<reference ref_id="CVE-2016-5769" ref_url="https://www.suse.com/security/cve/CVE-2016-5769/" source="CVE"/>
		<reference ref_id="CVE-2016-5772" ref_url="https://www.suse.com/security/cve/CVE-2016-5772/" source="CVE"/>
		<reference ref_id="CVE-2016-6288" ref_url="https://www.suse.com/security/cve/CVE-2016-6288/" source="CVE"/>
		<reference ref_id="CVE-2016-6289" ref_url="https://www.suse.com/security/cve/CVE-2016-6289/" source="CVE"/>
		<reference ref_id="CVE-2016-6290" ref_url="https://www.suse.com/security/cve/CVE-2016-6290/" source="CVE"/>
		<reference ref_id="CVE-2016-6291" ref_url="https://www.suse.com/security/cve/CVE-2016-6291/" source="CVE"/>
		<reference ref_id="CVE-2016-6296" ref_url="https://www.suse.com/security/cve/CVE-2016-6296/" source="CVE"/>
		<reference ref_id="CVE-2016-6297" ref_url="https://www.suse.com/security/cve/CVE-2016-6297/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002211.html" source="SUSE-SU"/>
		<description>

php5 was updated to fix the following security issues:

- CVE-2016-6297: Stack-based buffer overflow vulnerability in php_stream_zip_opener (bsc#991426).
- CVE-2016-6291: Out-of-bounds access in exif_process_IFD_in_MAKERNOTE (bsc#991427).
- CVE-2016-6289: Integer overflow leads to buffer overflow in virtual_file_ex (bsc#991428).
- CVE-2016-6290: Use after free in unserialize() with Unexpected Session Deserialization (bsc#991429).
- CVE-2016-5399: Improper error handling in bzread() (bsc#991430).
- CVE-2016-6288: Buffer over-read in php_url_parse_ex (bsc#991433).
- CVE-2016-6296: Heap buffer overflow vulnerability in simplestring_addn in simplestring.c (bsc#991437).
- CVE-2016-5769: Mcrypt: Heap Overflow due to integer overflows (bsc#986388).
- CVE-2015-8935: XSS in header() with Internet Explorer (bsc#986004).
- CVE-2016-5772: Double free corruption in wddx_deserialize (bsc#986244).
- CVE-2016-5766: Integer Overflow in _gd2GetHeader() resulting in heap overflow (bsc#986386).
- CVE-2016-5767: Integer Overflow in gdImagePaletteToTrueColor() resulting in heap overflow (bsc#986393).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-16"/>
	<updated date="2016-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/986004">SUSE bug 986004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986244">SUSE bug 986244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986386">SUSE bug 986386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986388">SUSE bug 986388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986393">SUSE bug 986393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991426">SUSE bug 991426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991427">SUSE bug 991427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991428">SUSE bug 991428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991429">SUSE bug 991429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991430">SUSE bug 991430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991433">SUSE bug 991433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991437">SUSE bug 991437</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8935/">CVE-2015-8935 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8935">CVE-2015-8935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5399/">CVE-2016-5399 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5399">CVE-2016-5399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5766/">CVE-2016-5766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5766">CVE-2016-5766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5767/">CVE-2016-5767 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5767">CVE-2016-5767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5769/">CVE-2016-5769 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5769">CVE-2016-5769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5772/">CVE-2016-5772 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5772">CVE-2016-5772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6288/">CVE-2016-6288 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6288">CVE-2016-6288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6289/">CVE-2016-6289 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6289">CVE-2016-6289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6290/">CVE-2016-6290 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6290">CVE-2016-6290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6291/">CVE-2016-6291 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6291">CVE-2016-6291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6296/">CVE-2016-6296 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6296">CVE-2016-6296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6297/">CVE-2016-6297 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6297">CVE-2016-6297 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576671" comment="apache2-mod_php5-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576672" comment="php5-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576673" comment="php5-bcmath-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576674" comment="php5-bz2-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576675" comment="php5-calendar-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576676" comment="php5-ctype-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576677" comment="php5-curl-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576678" comment="php5-dba-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576679" comment="php5-dbase-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576680" comment="php5-dom-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576681" comment="php5-exif-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576682" comment="php5-fastcgi-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576683" comment="php5-ftp-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576684" comment="php5-gd-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576685" comment="php5-gettext-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576686" comment="php5-gmp-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576687" comment="php5-hash-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576688" comment="php5-iconv-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576689" comment="php5-json-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576690" comment="php5-ldap-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576691" comment="php5-mbstring-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576692" comment="php5-mcrypt-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576693" comment="php5-mysql-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576694" comment="php5-odbc-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576695" comment="php5-openssl-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576696" comment="php5-pcntl-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576697" comment="php5-pdo-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576698" comment="php5-pear-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576699" comment="php5-pgsql-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576700" comment="php5-pspell-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576701" comment="php5-shmop-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576702" comment="php5-snmp-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576703" comment="php5-soap-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576704" comment="php5-suhosin-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576705" comment="php5-sysvmsg-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576706" comment="php5-sysvsem-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576707" comment="php5-sysvshm-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576708" comment="php5-tokenizer-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576709" comment="php5-wddx-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576710" comment="php5-xmlreader-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576711" comment="php5-xmlrpc-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576712" comment="php5-xmlwriter-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576713" comment="php5-xsl-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576714" comment="php5-zip-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576715" comment="php5-zlib-5.2.14-0.7.30.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218135" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="884986" ref_url="https://bugzilla.suse.com/884986" source="BUGZILLA"/>
		<reference ref_id="884987" ref_url="https://bugzilla.suse.com/884987" source="BUGZILLA"/>
		<reference ref_id="884989" ref_url="https://bugzilla.suse.com/884989" source="BUGZILLA"/>
		<reference ref_id="884990" ref_url="https://bugzilla.suse.com/884990" source="BUGZILLA"/>
		<reference ref_id="884991" ref_url="https://bugzilla.suse.com/884991" source="BUGZILLA"/>
		<reference ref_id="884992" ref_url="https://bugzilla.suse.com/884992" source="BUGZILLA"/>
		<reference ref_id="885961" ref_url="https://bugzilla.suse.com/885961" source="BUGZILLA"/>
		<reference ref_id="886059" ref_url="https://bugzilla.suse.com/886059" source="BUGZILLA"/>
		<reference ref_id="886060" ref_url="https://bugzilla.suse.com/886060" source="BUGZILLA"/>
		<reference ref_id="893849" ref_url="https://bugzilla.suse.com/893849" source="BUGZILLA"/>
		<reference ref_id="893853" ref_url="https://bugzilla.suse.com/893853" source="BUGZILLA"/>
		<reference ref_id="902357" ref_url="https://bugzilla.suse.com/902357" source="BUGZILLA"/>
		<reference ref_id="902360" ref_url="https://bugzilla.suse.com/902360" source="BUGZILLA"/>
		<reference ref_id="902368" ref_url="https://bugzilla.suse.com/902368" source="BUGZILLA"/>
		<reference ref_id="910659" ref_url="https://bugzilla.suse.com/910659" source="BUGZILLA"/>
		<reference ref_id="914690" ref_url="https://bugzilla.suse.com/914690" source="BUGZILLA"/>
		<reference ref_id="917150" ref_url="https://bugzilla.suse.com/917150" source="BUGZILLA"/>
		<reference ref_id="918768" ref_url="https://bugzilla.suse.com/918768" source="BUGZILLA"/>
		<reference ref_id="919080" ref_url="https://bugzilla.suse.com/919080" source="BUGZILLA"/>
		<reference ref_id="921950" ref_url="https://bugzilla.suse.com/921950" source="BUGZILLA"/>
		<reference ref_id="922451" ref_url="https://bugzilla.suse.com/922451" source="BUGZILLA"/>
		<reference ref_id="922452" ref_url="https://bugzilla.suse.com/922452" source="BUGZILLA"/>
		<reference ref_id="923945" ref_url="https://bugzilla.suse.com/923945" source="BUGZILLA"/>
		<reference ref_id="924972" ref_url="https://bugzilla.suse.com/924972" source="BUGZILLA"/>
		<reference ref_id="925109" ref_url="https://bugzilla.suse.com/925109" source="BUGZILLA"/>
		<reference ref_id="928506" ref_url="https://bugzilla.suse.com/928506" source="BUGZILLA"/>
		<reference ref_id="928511" ref_url="https://bugzilla.suse.com/928511" source="BUGZILLA"/>
		<reference ref_id="931421" ref_url="https://bugzilla.suse.com/931421" source="BUGZILLA"/>
		<reference ref_id="931769" ref_url="https://bugzilla.suse.com/931769" source="BUGZILLA"/>
		<reference ref_id="931772" ref_url="https://bugzilla.suse.com/931772" source="BUGZILLA"/>
		<reference ref_id="931776" ref_url="https://bugzilla.suse.com/931776" source="BUGZILLA"/>
		<reference ref_id="933227" ref_url="https://bugzilla.suse.com/933227" source="BUGZILLA"/>
		<reference ref_id="935074" ref_url="https://bugzilla.suse.com/935074" source="BUGZILLA"/>
		<reference ref_id="935224" ref_url="https://bugzilla.suse.com/935224" source="BUGZILLA"/>
		<reference ref_id="935226" ref_url="https://bugzilla.suse.com/935226" source="BUGZILLA"/>
		<reference ref_id="935227" ref_url="https://bugzilla.suse.com/935227" source="BUGZILLA"/>
		<reference ref_id="935229" ref_url="https://bugzilla.suse.com/935229" source="BUGZILLA"/>
		<reference ref_id="935232" ref_url="https://bugzilla.suse.com/935232" source="BUGZILLA"/>
		<reference ref_id="935234" ref_url="https://bugzilla.suse.com/935234" source="BUGZILLA"/>
		<reference ref_id="935274" ref_url="https://bugzilla.suse.com/935274" source="BUGZILLA"/>
		<reference ref_id="935275" ref_url="https://bugzilla.suse.com/935275" source="BUGZILLA"/>
		<reference ref_id="938719" ref_url="https://bugzilla.suse.com/938719" source="BUGZILLA"/>
		<reference ref_id="938721" ref_url="https://bugzilla.suse.com/938721" source="BUGZILLA"/>
		<reference ref_id="942291" ref_url="https://bugzilla.suse.com/942291" source="BUGZILLA"/>
		<reference ref_id="942296" ref_url="https://bugzilla.suse.com/942296" source="BUGZILLA"/>
		<reference ref_id="945412" ref_url="https://bugzilla.suse.com/945412" source="BUGZILLA"/>
		<reference ref_id="945428" ref_url="https://bugzilla.suse.com/945428" source="BUGZILLA"/>
		<reference ref_id="949961" ref_url="https://bugzilla.suse.com/949961" source="BUGZILLA"/>
		<reference ref_id="968284" ref_url="https://bugzilla.suse.com/968284" source="BUGZILLA"/>
		<reference ref_id="969821" ref_url="https://bugzilla.suse.com/969821" source="BUGZILLA"/>
		<reference ref_id="971611" ref_url="https://bugzilla.suse.com/971611" source="BUGZILLA"/>
		<reference ref_id="971612" ref_url="https://bugzilla.suse.com/971612" source="BUGZILLA"/>
		<reference ref_id="971912" ref_url="https://bugzilla.suse.com/971912" source="BUGZILLA"/>
		<reference ref_id="973351" ref_url="https://bugzilla.suse.com/973351" source="BUGZILLA"/>
		<reference ref_id="973792" ref_url="https://bugzilla.suse.com/973792" source="BUGZILLA"/>
		<reference ref_id="976996" ref_url="https://bugzilla.suse.com/976996" source="BUGZILLA"/>
		<reference ref_id="976997" ref_url="https://bugzilla.suse.com/976997" source="BUGZILLA"/>
		<reference ref_id="977003" ref_url="https://bugzilla.suse.com/977003" source="BUGZILLA"/>
		<reference ref_id="977005" ref_url="https://bugzilla.suse.com/977005" source="BUGZILLA"/>
		<reference ref_id="977991" ref_url="https://bugzilla.suse.com/977991" source="BUGZILLA"/>
		<reference ref_id="977994" ref_url="https://bugzilla.suse.com/977994" source="BUGZILLA"/>
		<reference ref_id="978827" ref_url="https://bugzilla.suse.com/978827" source="BUGZILLA"/>
		<reference ref_id="978828" ref_url="https://bugzilla.suse.com/978828" source="BUGZILLA"/>
		<reference ref_id="978829" ref_url="https://bugzilla.suse.com/978829" source="BUGZILLA"/>
		<reference ref_id="978830" ref_url="https://bugzilla.suse.com/978830" source="BUGZILLA"/>
		<reference ref_id="980366" ref_url="https://bugzilla.suse.com/980366" source="BUGZILLA"/>
		<reference ref_id="980373" ref_url="https://bugzilla.suse.com/980373" source="BUGZILLA"/>
		<reference ref_id="980375" ref_url="https://bugzilla.suse.com/980375" source="BUGZILLA"/>
		<reference ref_id="981050" ref_url="https://bugzilla.suse.com/981050" source="BUGZILLA"/>
		<reference ref_id="982010" ref_url="https://bugzilla.suse.com/982010" source="BUGZILLA"/>
		<reference ref_id="982011" ref_url="https://bugzilla.suse.com/982011" source="BUGZILLA"/>
		<reference ref_id="982012" ref_url="https://bugzilla.suse.com/982012" source="BUGZILLA"/>
		<reference ref_id="982013" ref_url="https://bugzilla.suse.com/982013" source="BUGZILLA"/>
		<reference ref_id="982162" ref_url="https://bugzilla.suse.com/982162" source="BUGZILLA"/>
		<reference ref_id="CVE-2004-1019" ref_url="https://www.suse.com/security/cve/CVE-2004-1019/" source="CVE"/>
		<reference ref_id="CVE-2006-7243" ref_url="https://www.suse.com/security/cve/CVE-2006-7243/" source="CVE"/>
		<reference ref_id="CVE-2014-0207" ref_url="https://www.suse.com/security/cve/CVE-2014-0207/" source="CVE"/>
		<reference ref_id="CVE-2014-3478" ref_url="https://www.suse.com/security/cve/CVE-2014-3478/" source="CVE"/>
		<reference ref_id="CVE-2014-3479" ref_url="https://www.suse.com/security/cve/CVE-2014-3479/" source="CVE"/>
		<reference ref_id="CVE-2014-3480" ref_url="https://www.suse.com/security/cve/CVE-2014-3480/" source="CVE"/>
		<reference ref_id="CVE-2014-3487" ref_url="https://www.suse.com/security/cve/CVE-2014-3487/" source="CVE"/>
		<reference ref_id="CVE-2014-3515" ref_url="https://www.suse.com/security/cve/CVE-2014-3515/" source="CVE"/>
		<reference ref_id="CVE-2014-3597" ref_url="https://www.suse.com/security/cve/CVE-2014-3597/" source="CVE"/>
		<reference ref_id="CVE-2014-3668" ref_url="https://www.suse.com/security/cve/CVE-2014-3668/" source="CVE"/>
		<reference ref_id="CVE-2014-3669" ref_url="https://www.suse.com/security/cve/CVE-2014-3669/" source="CVE"/>
		<reference ref_id="CVE-2014-3670" ref_url="https://www.suse.com/security/cve/CVE-2014-3670/" source="CVE"/>
		<reference ref_id="CVE-2014-4049" ref_url="https://www.suse.com/security/cve/CVE-2014-4049/" source="CVE"/>
		<reference ref_id="CVE-2014-4670" ref_url="https://www.suse.com/security/cve/CVE-2014-4670/" source="CVE"/>
		<reference ref_id="CVE-2014-4698" ref_url="https://www.suse.com/security/cve/CVE-2014-4698/" source="CVE"/>
		<reference ref_id="CVE-2014-4721" ref_url="https://www.suse.com/security/cve/CVE-2014-4721/" source="CVE"/>
		<reference ref_id="CVE-2014-5459" ref_url="https://www.suse.com/security/cve/CVE-2014-5459/" source="CVE"/>
		<reference ref_id="CVE-2014-8142" ref_url="https://www.suse.com/security/cve/CVE-2014-8142/" source="CVE"/>
		<reference ref_id="CVE-2014-9652" ref_url="https://www.suse.com/security/cve/CVE-2014-9652/" source="CVE"/>
		<reference ref_id="CVE-2014-9705" ref_url="https://www.suse.com/security/cve/CVE-2014-9705/" source="CVE"/>
		<reference ref_id="CVE-2014-9709" ref_url="https://www.suse.com/security/cve/CVE-2014-9709/" source="CVE"/>
		<reference ref_id="CVE-2014-9767" ref_url="https://www.suse.com/security/cve/CVE-2014-9767/" source="CVE"/>
		<reference ref_id="CVE-2015-0231" ref_url="https://www.suse.com/security/cve/CVE-2015-0231/" source="CVE"/>
		<reference ref_id="CVE-2015-0232" ref_url="https://www.suse.com/security/cve/CVE-2015-0232/" source="CVE"/>
		<reference ref_id="CVE-2015-0273" ref_url="https://www.suse.com/security/cve/CVE-2015-0273/" source="CVE"/>
		<reference ref_id="CVE-2015-1352" ref_url="https://www.suse.com/security/cve/CVE-2015-1352/" source="CVE"/>
		<reference ref_id="CVE-2015-2301" ref_url="https://www.suse.com/security/cve/CVE-2015-2301/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2783" ref_url="https://www.suse.com/security/cve/CVE-2015-2783/" source="CVE"/>
		<reference ref_id="CVE-2015-2787" ref_url="https://www.suse.com/security/cve/CVE-2015-2787/" source="CVE"/>
		<reference ref_id="CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152/" source="CVE"/>
		<reference ref_id="CVE-2015-3329" ref_url="https://www.suse.com/security/cve/CVE-2015-3329/" source="CVE"/>
		<reference ref_id="CVE-2015-3411" ref_url="https://www.suse.com/security/cve/CVE-2015-3411/" source="CVE"/>
		<reference ref_id="CVE-2015-3412" ref_url="https://www.suse.com/security/cve/CVE-2015-3412/" source="CVE"/>
		<reference ref_id="CVE-2015-4021" ref_url="https://www.suse.com/security/cve/CVE-2015-4021/" source="CVE"/>
		<reference ref_id="CVE-2015-4022" ref_url="https://www.suse.com/security/cve/CVE-2015-4022/" source="CVE"/>
		<reference ref_id="CVE-2015-4024" ref_url="https://www.suse.com/security/cve/CVE-2015-4024/" source="CVE"/>
		<reference ref_id="CVE-2015-4026" ref_url="https://www.suse.com/security/cve/CVE-2015-4026/" source="CVE"/>
		<reference ref_id="CVE-2015-4116" ref_url="https://www.suse.com/security/cve/CVE-2015-4116/" source="CVE"/>
		<reference ref_id="CVE-2015-4148" ref_url="https://www.suse.com/security/cve/CVE-2015-4148/" source="CVE"/>
		<reference ref_id="CVE-2015-4598" ref_url="https://www.suse.com/security/cve/CVE-2015-4598/" source="CVE"/>
		<reference ref_id="CVE-2015-4599" ref_url="https://www.suse.com/security/cve/CVE-2015-4599/" source="CVE"/>
		<reference ref_id="CVE-2015-4600" ref_url="https://www.suse.com/security/cve/CVE-2015-4600/" source="CVE"/>
		<reference ref_id="CVE-2015-4601" ref_url="https://www.suse.com/security/cve/CVE-2015-4601/" source="CVE"/>
		<reference ref_id="CVE-2015-4602" ref_url="https://www.suse.com/security/cve/CVE-2015-4602/" source="CVE"/>
		<reference ref_id="CVE-2015-4603" ref_url="https://www.suse.com/security/cve/CVE-2015-4603/" source="CVE"/>
		<reference ref_id="CVE-2015-4643" ref_url="https://www.suse.com/security/cve/CVE-2015-4643/" source="CVE"/>
		<reference ref_id="CVE-2015-4644" ref_url="https://www.suse.com/security/cve/CVE-2015-4644/" source="CVE"/>
		<reference ref_id="CVE-2015-5161" ref_url="https://www.suse.com/security/cve/CVE-2015-5161/" source="CVE"/>
		<reference ref_id="CVE-2015-5589" ref_url="https://www.suse.com/security/cve/CVE-2015-5589/" source="CVE"/>
		<reference ref_id="CVE-2015-5590" ref_url="https://www.suse.com/security/cve/CVE-2015-5590/" source="CVE"/>
		<reference ref_id="CVE-2015-6831" ref_url="https://www.suse.com/security/cve/CVE-2015-6831/" source="CVE"/>
		<reference ref_id="CVE-2015-6833" ref_url="https://www.suse.com/security/cve/CVE-2015-6833/" source="CVE"/>
		<reference ref_id="CVE-2015-6836" ref_url="https://www.suse.com/security/cve/CVE-2015-6836/" source="CVE"/>
		<reference ref_id="CVE-2015-6837" ref_url="https://www.suse.com/security/cve/CVE-2015-6837/" source="CVE"/>
		<reference ref_id="CVE-2015-6838" ref_url="https://www.suse.com/security/cve/CVE-2015-6838/" source="CVE"/>
		<reference ref_id="CVE-2015-7803" ref_url="https://www.suse.com/security/cve/CVE-2015-7803/" source="CVE"/>
		<reference ref_id="CVE-2015-8835" ref_url="https://www.suse.com/security/cve/CVE-2015-8835/" source="CVE"/>
		<reference ref_id="CVE-2015-8838" ref_url="https://www.suse.com/security/cve/CVE-2015-8838/" source="CVE"/>
		<reference ref_id="CVE-2015-8866" ref_url="https://www.suse.com/security/cve/CVE-2015-8866/" source="CVE"/>
		<reference ref_id="CVE-2015-8867" ref_url="https://www.suse.com/security/cve/CVE-2015-8867/" source="CVE"/>
		<reference ref_id="CVE-2015-8873" ref_url="https://www.suse.com/security/cve/CVE-2015-8873/" source="CVE"/>
		<reference ref_id="CVE-2015-8874" ref_url="https://www.suse.com/security/cve/CVE-2015-8874/" source="CVE"/>
		<reference ref_id="CVE-2015-8879" ref_url="https://www.suse.com/security/cve/CVE-2015-8879/" source="CVE"/>
		<reference ref_id="CVE-2016-2554" ref_url="https://www.suse.com/security/cve/CVE-2016-2554/" source="CVE"/>
		<reference ref_id="CVE-2016-3141" ref_url="https://www.suse.com/security/cve/CVE-2016-3141/" source="CVE"/>
		<reference ref_id="CVE-2016-3142" ref_url="https://www.suse.com/security/cve/CVE-2016-3142/" source="CVE"/>
		<reference ref_id="CVE-2016-3185" ref_url="https://www.suse.com/security/cve/CVE-2016-3185/" source="CVE"/>
		<reference ref_id="CVE-2016-4070" ref_url="https://www.suse.com/security/cve/CVE-2016-4070/" source="CVE"/>
		<reference ref_id="CVE-2016-4073" ref_url="https://www.suse.com/security/cve/CVE-2016-4073/" source="CVE"/>
		<reference ref_id="CVE-2016-4342" ref_url="https://www.suse.com/security/cve/CVE-2016-4342/" source="CVE"/>
		<reference ref_id="CVE-2016-4346" ref_url="https://www.suse.com/security/cve/CVE-2016-4346/" source="CVE"/>
		<reference ref_id="CVE-2016-4537" ref_url="https://www.suse.com/security/cve/CVE-2016-4537/" source="CVE"/>
		<reference ref_id="CVE-2016-4538" ref_url="https://www.suse.com/security/cve/CVE-2016-4538/" source="CVE"/>
		<reference ref_id="CVE-2016-4539" ref_url="https://www.suse.com/security/cve/CVE-2016-4539/" source="CVE"/>
		<reference ref_id="CVE-2016-4540" ref_url="https://www.suse.com/security/cve/CVE-2016-4540/" source="CVE"/>
		<reference ref_id="CVE-2016-4541" ref_url="https://www.suse.com/security/cve/CVE-2016-4541/" source="CVE"/>
		<reference ref_id="CVE-2016-4542" ref_url="https://www.suse.com/security/cve/CVE-2016-4542/" source="CVE"/>
		<reference ref_id="CVE-2016-4543" ref_url="https://www.suse.com/security/cve/CVE-2016-4543/" source="CVE"/>
		<reference ref_id="CVE-2016-4544" ref_url="https://www.suse.com/security/cve/CVE-2016-4544/" source="CVE"/>
		<reference ref_id="CVE-2016-5093" ref_url="https://www.suse.com/security/cve/CVE-2016-5093/" source="CVE"/>
		<reference ref_id="CVE-2016-5094" ref_url="https://www.suse.com/security/cve/CVE-2016-5094/" source="CVE"/>
		<reference ref_id="CVE-2016-5095" ref_url="https://www.suse.com/security/cve/CVE-2016-5095/" source="CVE"/>
		<reference ref_id="CVE-2016-5096" ref_url="https://www.suse.com/security/cve/CVE-2016-5096/" source="CVE"/>
		<reference ref_id="CVE-2016-5114" ref_url="https://www.suse.com/security/cve/CVE-2016-5114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
		<description>
This update for php53 to version 5.3.17 fixes the following issues:

These security issues were fixed:
- CVE-2016-5093: get_icu_value_internal out-of-bounds read (bnc#982010).
- CVE-2016-5094: Don't create strings with lengths outside int range (bnc#982011).
- CVE-2016-5095: Don't create strings with lengths outside int range (bnc#982012).
- CVE-2016-5096: int/size_t confusion in fread (bsc#982013).
- CVE-2016-5114: fpm_log.c memory leak and buffer overflow (bnc#982162).
- CVE-2015-8879: The odbc_bindcols function in ext/odbc/php_odbc.c in PHP mishandles driver behavior for SQL_WVARCHAR columns, which allowed remote attackers to cause a denial of service (application crash) in opportunistic circumstances by leveraging use of the odbc_fetch_array function to access a certain type of Microsoft SQL Server table (bsc#981050).
- CVE-2015-4116: Use-after-free vulnerability in the spl_ptr_heap_insert function in ext/spl/spl_heap.c in PHP allowed remote attackers to execute arbitrary code by triggering a failed SplMinHeap::compare operation (bsc#980366).
- CVE-2015-8874: Stack consumption vulnerability in GD in PHP allowed remote attackers to cause a denial of service via a crafted imagefilltoborder call (bsc#980375).
- CVE-2015-8873: Stack consumption vulnerability in Zend/zend_exceptions.c in PHP allowed remote attackers to cause a denial of service (segmentation fault) via recursive method calls (bsc#980373).
- CVE-2016-4540: The grapheme_stripos function in ext/intl/grapheme/grapheme_string.c in PHP allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a negative offset (bsc#978829).
- CVE-2016-4541: The grapheme_strpos function in ext/intl/grapheme/grapheme_string.c in PHP allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a negative offset (bsc#978829.
- CVE-2016-4542: The exif_process_IFD_TAG function in ext/exif/exif.c in PHP did not properly construct spprintf arguments, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data (bsc#978830).
- CVE-2016-4543: The exif_process_IFD_in_JPEG function in ext/exif/exif.c in PHP did not validate IFD sizes, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data (bsc#978830.
- CVE-2016-4544: The exif_process_TIFF_in_JPEG function in ext/exif/exif.c in PHP did not validate TIFF start data, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data (bsc#978830.
- CVE-2016-4537: The bcpowmod function in ext/bcmath/bcmath.c in PHP accepted a negative integer for the scale argument, which allowed remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call (bsc#978827).
- CVE-2016-4538: The bcpowmod function in ext/bcmath/bcmath.c in PHP modified certain data structures without considering whether they are copies of the _zero_, _one_, or _two_ global variable, which allowed remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call (bsc#978827).
- CVE-2016-4539: The xml_parse_into_struct function in ext/xml/xml.c in PHP allowed remote attackers to cause a denial of service (buffer under-read and segmentation fault) or possibly have unspecified other impact via crafted XML data in the second argument, leading to a parser level of zero (bsc#978828).
- CVE-2016-4342: ext/phar/phar_object.c in PHP mishandles zero-length uncompressed data, which allowed remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) TAR, (2) ZIP, or (3) PHAR archive (bsc#977991).
- CVE-2016-4346: Integer overflow in the str_pad function in ext/standard/string.c in PHP allowed remote attackers to cause a denial of service or possibly have unspecified other impact via a long string, leading to a heap-based buffer overflow (bsc#977994).
- CVE-2016-4073: Multiple integer overflows in the mbfl_strcut function in ext/mbstring/libmbfl/mbfl/mbfilter.c in PHP allowed remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted mb_strcut call (bsc#977003).
- CVE-2015-8867: The openssl_random_pseudo_bytes function in ext/openssl/openssl.c in PHP incorrectly relied on the deprecated RAND_pseudo_bytes function, which made it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors (bsc#977005).
- CVE-2016-4070: Integer overflow in the php_raw_url_encode function in ext/standard/url.c in PHP allowed remote attackers to cause a denial of service (application crash) via a long string to the rawurlencode function (bsc#976997).
- CVE-2015-8866: ext/libxml/libxml.c in PHP when PHP-FPM is used, did not isolate each thread from libxml_disable_entity_loader changes in other threads, which allowed remote attackers to conduct XML External Entity (XXE) and XML Entity Expansion (XEE) attacks via a crafted XML document, a related issue to CVE-2015-5161 (bsc#976996).
- CVE-2015-8838: ext/mysqlnd/mysqlnd.c in PHP used a client SSL option to mean that SSL is optional, which allowed man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152 (bsc#973792).
- CVE-2015-8835: The make_http_soap_request function in ext/soap/php_http.c in PHP did not properly retrieve keys, which allowed remote attackers to cause a denial of service (NULL pointer dereference, type confusion, and application crash) or possibly execute arbitrary code via crafted serialized data representing a numerically indexed _cookies array, related to the SoapClient::__call method in ext/soap/soap.c (bsc#973351).
- CVE-2016-3141: Use-after-free vulnerability in wddx.c in the WDDX extension in PHP allowed remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var element (bsc#969821).
- CVE-2016-3142: The phar_parse_zipfile function in zip.c in the PHAR extension in PHP allowed remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) by placing a PK\x05\x06 signature at an invalid location (bsc#971912).
- CVE-2014-9767: Directory traversal vulnerability in the ZipArchive::extractTo function in ext/zip/php_zip.c in PHP ext/zip/ext_zip.cpp in HHVM allowed remote attackers to create arbitrary empty directories via a crafted ZIP archive (bsc#971612).
- CVE-2016-3185: The make_http_soap_request function in ext/soap/php_http.c in PHP allowed remote attackers to obtain sensitive information from process memory or cause a denial of service (type confusion and application crash) via crafted serialized _cookies data, related to the SoapClient::__call method in ext/soap/soap.c (bsc#971611).
- CVE-2016-2554: Stack-based buffer overflow in ext/phar/tar.c in PHP allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TAR archive (bsc#968284).
- CVE-2015-7803: The phar_get_entry_data function in ext/phar/util.c in PHP allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a .phar file with a crafted TAR archive entry in which the Link indicator references a file that did not exist (bsc#949961).
- CVE-2015-6831: Multiple use-after-free vulnerabilities in SPL in PHP allowed remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization (bsc#942291).
- CVE-2015-6833: Directory traversal vulnerability in the PharData class in PHP allowed remote attackers to write to arbitrary files via a .. (dot dot) in a ZIP archive entry that is mishandled during an extractTo call (bsc#942296.
- CVE-2015-6836: The SoapClient __call method in ext/soap/soap.c in PHP did not properly manage headers, which allowed remote attackers to execute arbitrary code via crafted serialized data that triggers a 'type confusion' in the serialize_function_call function (bsc#945428).
- CVE-2015-6837: The xsl_ext_function_php function in ext/xsl/xsltprocessor.c in PHP when libxml2 is used, did not consider the possibility of a NULL valuePop return value proceeding with a free operation during initial error checking, which allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted XML document, a different vulnerability than CVE-2015-6838 (bsc#945412).
- CVE-2015-6838: The xsl_ext_function_php function in ext/xsl/xsltprocessor.c in PHP when libxml2 is used, did not consider the possibility of a NULL valuePop return value proceeding with a free operation after the principal argument loop, which allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted XML document, a different vulnerability than CVE-2015-6837 (bsc#945412).
- CVE-2015-5590: Stack-based buffer overflow in the phar_fix_filepath function in ext/phar/phar.c in PHP allowed remote attackers to cause a denial of service or possibly have unspecified other impact via a large length value, as demonstrated by mishandling of an e-mail attachment by the imap PHP extension (bsc#938719).
- CVE-2015-5589: The phar_convert_to_other function in ext/phar/phar_object.c in PHP did not validate a file pointer a close operation, which allowed remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted TAR archive that is mishandled in a Phar::convertToData call (bsc#938721).
- CVE-2015-4602: The __PHP_Incomplete_Class function in ext/standard/incomplete_class.c in PHP allowed remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to a 'type confusion' issue (bsc#935224).
- CVE-2015-4599: The SoapFault::__toString method in ext/soap/soap.c in PHP allowed remote attackers to obtain sensitive information, cause a denial of service (application crash), or possibly execute arbitrary code via an unexpected data type, related to a 'type confusion' issue (bsc#935226).
- CVE-2015-4600: The SoapClient implementation in PHP allowed remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to 'type confusion' issues in the (1) SoapClient::__getLastRequest, (2) SoapClient::__getLastResponse, (3) SoapClient::__getLastRequestHeaders, (4) SoapClient::__getLastResponseHeaders, (5) SoapClient::__getCookies, and (6) SoapClient::__setCookie methods (bsc#935226).
- CVE-2015-4601: PHP allowed remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to 'type confusion' issues in (1) ext/soap/php_encoding.c, (2) ext/soap/php_http.c, and (3) ext/soap/soap.c, a different issue than CVE-2015-4600 (bsc#935226.
- CVE-2015-4603: The exception::getTraceAsString function in Zend/zend_exceptions.c in PHP allowed remote attackers to execute arbitrary code via an unexpected data type, related to a 'type confusion' issue (bsc#935234).
- CVE-2015-4644: The php_pgsql_meta_data function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP did not validate token extraction for table names, which might allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted name. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1352 (bsc#935274).
- CVE-2015-4643: Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP allowed remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-4022 (bsc#935275).
- CVE-2015-3411: PHP did not ensure that pathnames lack %00 sequences, which might have allowed remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument load method, (2) the xmlwriter_open_uri function, (3) the finfo_file function, or (4) the hash_hmac_file function, as demonstrated by a filename\0.xml attack that bypasses an intended configuration in which client users may read only .xml files (bsc#935227).
- CVE-2015-3412: PHP did not ensure that pathnames lack %00 sequences, which might have allowed remote attackers to read arbitrary files via crafted input to an application that calls the stream_resolve_include_path function in ext/standard/streamsfuncs.c, as demonstrated by a filename\0.extension attack that bypasses an intended configuration in which client users may read files with only one specific extension (bsc#935229).
- CVE-2015-4598: PHP did not ensure that pathnames lack %00 sequences, which might have allowed remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument save method or (2) the GD imagepsloadfont function, as demonstrated by a filename\0.html attack that bypasses an intended configuration in which client users may write to only .html files (bsc#935232).
- CVE-2015-4148: The do_soap_call function in ext/soap/soap.c in PHP did not verify that the uri property is a string, which allowed remote attackers to obtain sensitive information by providing crafted serialized data with an int data type, related to a 'type confusion' issue (bsc#933227).
- CVE-2015-4024: Algorithmic complexity vulnerability in the multipart_buffer_headers function in main/rfc1867.c in PHP allowed remote attackers to cause a denial of service (CPU consumption) via crafted form data that triggers an improper order-of-growth outcome (bsc#931421).
- CVE-2015-4026: The pcntl_exec implementation in PHP truncates a pathname upon encountering a \x00 character, which might allowed remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243 (bsc#931776).
- CVE-2015-4022: Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP allowed remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow (bsc#931772).
- CVE-2015-4021: The phar_parse_tarfile function in ext/phar/tar.c in PHP did not verify that the first character of a filename is different from the \0 character, which allowed remote attackers to cause a denial of service (integer underflow and memory corruption) via a crafted entry in a tar archive (bsc#931769).
- CVE-2015-3329: Multiple stack-based buffer overflows in the phar_set_inode function in phar_internal.h in PHP allowed remote attackers to execute arbitrary code via a crafted length value in a (1) tar, (2) phar, or (3) ZIP archive (bsc#928506).
- CVE-2015-2783: ext/phar/phar.c in PHP allowed remote attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read and application crash) via a crafted length value in conjunction with crafted serialized data in a phar archive, related to the phar_parse_metadata and phar_parse_pharfile functions (bsc#928511).
- CVE-2015-2787: Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP allowed remote attackers to execute arbitrary code via a crafted unserialize call that leverages use of the unset function within an __wakeup function, a related issue to CVE-2015-0231 (bsc#924972).
- CVE-2014-9709: The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP allowed remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function (bsc#923945).
- CVE-2015-2301: Use-after-free vulnerability in the phar_rename_archive function in phar_object.c in PHP allowed remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted renaming of a Phar archive to the name of an existing file (bsc#922452).
- CVE-2015-2305: Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) 32-bit platforms might have allowed context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer overflow (bsc#921950).
- CVE-2014-9705: Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP allowed remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries (bsc#922451).
- CVE-2015-0273: Multiple use-after-free vulnerabilities in ext/date/php_date.c in PHP allowed remote attackers to execute arbitrary code via crafted serialized input containing a (1) R or (2) r type specifier in (a) DateTimeZone data handled by the php_date_timezone_initialize_from_hash function or (b) DateTime data handled by the php_date_initialize_from_hash function (bsc#918768).
- CVE-2014-9652: The mconvert function in softmagic.c in file as used in the Fileinfo component in PHP did not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allowed remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted file (bsc#917150).
- CVE-2014-8142: Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP allowed remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys within the serialized properties of an object, a different vulnerability than CVE-2004-1019 (bsc#910659).
- CVE-2015-0231: Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP allowed remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate numerical keys within the serialized properties of an object. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-8142 (bsc#910659).
- CVE-2014-8142: Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP allowed remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys within the serialized properties of an object, a different vulnerability than CVE-2004-1019 (bsc#910659).
- CVE-2015-0232: The exif_process_unicode function in ext/exif/exif.c in PHP allowed remote attackers to execute arbitrary code or cause a denial of service (uninitialized pointer free and application crash) via crafted EXIF data in a JPEG image (bsc#914690).
- CVE-2014-3670: The exif_ifd_make_value function in exif.c in the EXIF extension in PHP operates on floating-point arrays incorrectly, which allowed remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via a crafted JPEG image with TIFF thumbnail data that is improperly handled by the exif_thumbnail function (bsc#902357).
- CVE-2014-3669: Integer overflow in the object_custom function in ext/standard/var_unserializer.c in PHP allowed remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an argument to the unserialize function that triggers calculation of a large length value (bsc#902360).
- CVE-2014-3668: Buffer overflow in the date_from_ISO8601 function in the mkgmtime implementation in libxmlrpc/xmlrpc.c in the XMLRPC extension in PHP allowed remote attackers to cause a denial of service (application crash) via (1) a crafted first argument to the xmlrpc_set_type function or (2) a crafted argument to the xmlrpc_decode function, related to an out-of-bounds read operation (bsc#902368).
- CVE-2014-5459: The PEAR_REST class in REST.php in PEAR in PHP allowed local users to write to arbitrary files via a symlink attack on a (1) rest.cachefile or (2) rest.cacheid file in /tmp/pear/cache/, related to the retrieveCacheFirst and useLocalCache functions  (bsc#893849).
- CVE-2014-3597: Multiple buffer overflows in the php_parserr function in ext/standard/dns.c in PHP allowed remote DNS servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted DNS record, related to the dns_get_record function and the dn_expand function. NOTE: this issue exists because of an incomplete fix for CVE-2014-4049 (bsc#893853).
- CVE-2014-4670: Use-after-free vulnerability in ext/spl/spl_dllist.c in the SPL component in PHP allowed context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted iterator usage within applications in certain web-hosting environments  (bsc#886059).
- CVE-2014-4698: Use-after-free vulnerability in ext/spl/spl_array.c in the SPL component in PHP allowed context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted ArrayIterator usage within applications in certain web-hosting environments  (bsc#886060).
- CVE-2014-4721: The phpinfo implementation in ext/standard/info.c in PHP did not ensure use of the string data type for the PHP_AUTH_PW, PHP_AUTH_TYPE, PHP_AUTH_USER, and PHP_SELF variables, which might allowed context-dependent attackers to obtain sensitive information from process memory by using the integer data type with crafted values, related to a 'type confusion' vulnerability, as demonstrated by reading a private SSL key in an Apache HTTP Server web-hosting environment with mod_ssl and a PHP 5.3.x mod_php (bsc#885961).
- CVE-2014-0207: The cdf_read_short_sector function in cdf.c in file as used in the Fileinfo component in PHP allowed remote attackers to cause a denial of service (assertion failure and application exit) via a crafted CDF file (bsc#884986).
- CVE-2014-3478: Buffer overflow in the mconvert function in softmagic.c in file as used in the Fileinfo component in PHP allowed remote attackers to cause a denial of service (application crash) via a crafted Pascal string in a FILE_PSTRING conversion (bsc#884987).
- CVE-2014-3479: The cdf_check_stream_offset function in cdf.c in file as used in the Fileinfo component in PHP relies on incorrect sector-size data, which allowed remote attackers to cause a denial of service (application crash) via a crafted stream offset in a CDF file (bsc#884989).
- CVE-2014-3480: The cdf_count_chain function in cdf.c in file as used in the Fileinfo component in PHP did not properly validate sector-count data, which allowed remote attackers to cause a denial of service (application crash) via a crafted CDF file (bsc#884990).
- CVE-2014-3487: The cdf_read_property_info function in file as used in the Fileinfo component in PHP did not properly validate a stream offset, which allowed remote attackers to cause a denial of service (application crash) via a crafted CDF file (bsc#884991).
- CVE-2014-3515: The SPL component in PHP incorrectly anticipates that certain data structures will have the array data type after unserialization, which allowed remote attackers to execute arbitrary code via a crafted string that triggers use of a Hashtable destructor, related to 'type confusion' issues in (1) ArrayObject and (2) SPLObjectStorage (bsc#884992).

These non-security issues were fixed:
- bnc#935074: compare with SQL_NULL_DATA correctly
- bnc#935074: fix segfault in odbc_fetch_array
- bnc#919080: fix timezone map
- bnc#925109: unserialize SoapClient type confusion
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-21"/>
	<updated date="2016-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/884986">SUSE bug 884986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884987">SUSE bug 884987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884989">SUSE bug 884989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884990">SUSE bug 884990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884991">SUSE bug 884991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884992">SUSE bug 884992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885961">SUSE bug 885961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886059">SUSE bug 886059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886060">SUSE bug 886060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893849">SUSE bug 893849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893853">SUSE bug 893853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902357">SUSE bug 902357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902360">SUSE bug 902360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902368">SUSE bug 902368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910659">SUSE bug 910659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914690">SUSE bug 914690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917150">SUSE bug 917150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918768">SUSE bug 918768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919080">SUSE bug 919080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921950">SUSE bug 921950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922451">SUSE bug 922451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922452">SUSE bug 922452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923945">SUSE bug 923945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924972">SUSE bug 924972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925109">SUSE bug 925109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928506">SUSE bug 928506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928511">SUSE bug 928511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931421">SUSE bug 931421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931769">SUSE bug 931769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931772">SUSE bug 931772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931776">SUSE bug 931776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933227">SUSE bug 933227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935074">SUSE bug 935074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935224">SUSE bug 935224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935226">SUSE bug 935226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935227">SUSE bug 935227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935229">SUSE bug 935229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935232">SUSE bug 935232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935234">SUSE bug 935234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935274">SUSE bug 935274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935275">SUSE bug 935275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938719">SUSE bug 938719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938721">SUSE bug 938721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942291">SUSE bug 942291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942296">SUSE bug 942296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945412">SUSE bug 945412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945428">SUSE bug 945428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949961">SUSE bug 949961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968284">SUSE bug 968284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969821">SUSE bug 969821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971611">SUSE bug 971611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971612">SUSE bug 971612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971912">SUSE bug 971912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973351">SUSE bug 973351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973792">SUSE bug 973792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976996">SUSE bug 976996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976997">SUSE bug 976997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977003">SUSE bug 977003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977005">SUSE bug 977005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977991">SUSE bug 977991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977994">SUSE bug 977994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978827">SUSE bug 978827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978828">SUSE bug 978828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978829">SUSE bug 978829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978830">SUSE bug 978830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980373">SUSE bug 980373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980375">SUSE bug 980375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981050">SUSE bug 981050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982010">SUSE bug 982010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982011">SUSE bug 982011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982012">SUSE bug 982012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982013">SUSE bug 982013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982162">SUSE bug 982162</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2004-1019/">CVE-2004-1019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-1019">CVE-2004-1019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-7243/">CVE-2006-7243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-7243">CVE-2006-7243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0207/">CVE-2014-0207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0207">CVE-2014-0207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3478/">CVE-2014-3478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3478">CVE-2014-3478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3479/">CVE-2014-3479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3479">CVE-2014-3479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3480/">CVE-2014-3480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3480">CVE-2014-3480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3487/">CVE-2014-3487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3487">CVE-2014-3487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3515/">CVE-2014-3515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3515">CVE-2014-3515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3597/">CVE-2014-3597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3597">CVE-2014-3597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3668/">CVE-2014-3668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3668">CVE-2014-3668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3669/">CVE-2014-3669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3669">CVE-2014-3669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3670/">CVE-2014-3670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3670">CVE-2014-3670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4049/">CVE-2014-4049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4049">CVE-2014-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4670/">CVE-2014-4670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4670">CVE-2014-4670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4698/">CVE-2014-4698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4698">CVE-2014-4698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4721/">CVE-2014-4721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4721">CVE-2014-4721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5459/">CVE-2014-5459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5459">CVE-2014-5459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8142/">CVE-2014-8142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8142">CVE-2014-8142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9652/">CVE-2014-9652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9652">CVE-2014-9652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9705/">CVE-2014-9705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9705">CVE-2014-9705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9709/">CVE-2014-9709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9709">CVE-2014-9709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9767/">CVE-2014-9767 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9767">CVE-2014-9767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0231/">CVE-2015-0231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0231">CVE-2015-0231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0232/">CVE-2015-0232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0232">CVE-2015-0232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0273/">CVE-2015-0273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0273">CVE-2015-0273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1352/">CVE-2015-1352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1352">CVE-2015-1352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2301/">CVE-2015-2301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2301">CVE-2015-2301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2305">CVE-2015-2305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2783/">CVE-2015-2783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2783">CVE-2015-2783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2787/">CVE-2015-2787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2787">CVE-2015-2787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3152">CVE-2015-3152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3329/">CVE-2015-3329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3329">CVE-2015-3329 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3411/">CVE-2015-3411 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3411">CVE-2015-3411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3412/">CVE-2015-3412 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3412">CVE-2015-3412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4021/">CVE-2015-4021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4021">CVE-2015-4021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4022/">CVE-2015-4022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4022">CVE-2015-4022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4024/">CVE-2015-4024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4024">CVE-2015-4024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4026/">CVE-2015-4026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4026">CVE-2015-4026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4116/">CVE-2015-4116 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4116">CVE-2015-4116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4148/">CVE-2015-4148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4148">CVE-2015-4148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4598/">CVE-2015-4598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4598">CVE-2015-4598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4599/">CVE-2015-4599 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4599">CVE-2015-4599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4600/">CVE-2015-4600 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4600">CVE-2015-4600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4601/">CVE-2015-4601 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4601">CVE-2015-4601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4602/">CVE-2015-4602 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4602">CVE-2015-4602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4603/">CVE-2015-4603 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4603">CVE-2015-4603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4643/">CVE-2015-4643 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4643">CVE-2015-4643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4644/">CVE-2015-4644 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4644">CVE-2015-4644 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5161/">CVE-2015-5161 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5161">CVE-2015-5161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5589/">CVE-2015-5589 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5589">CVE-2015-5589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5590/">CVE-2015-5590 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5590">CVE-2015-5590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6831/">CVE-2015-6831 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6831">CVE-2015-6831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6833/">CVE-2015-6833 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6833">CVE-2015-6833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6836/">CVE-2015-6836 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6836">CVE-2015-6836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6837/">CVE-2015-6837 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6837">CVE-2015-6837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6838/">CVE-2015-6838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6838">CVE-2015-6838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7803/">CVE-2015-7803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7803">CVE-2015-7803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8835/">CVE-2015-8835 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8835">CVE-2015-8835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8838/">CVE-2015-8838 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8838">CVE-2015-8838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8866/">CVE-2015-8866 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8866">CVE-2015-8866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8867/">CVE-2015-8867 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8867">CVE-2015-8867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8873/">CVE-2015-8873 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8873">CVE-2015-8873 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8874/">CVE-2015-8874 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8874">CVE-2015-8874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8879/">CVE-2015-8879 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8879">CVE-2015-8879 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2554/">CVE-2016-2554 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2554">CVE-2016-2554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3141/">CVE-2016-3141 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3141">CVE-2016-3141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3142/">CVE-2016-3142 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3142">CVE-2016-3142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3185/">CVE-2016-3185 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3185">CVE-2016-3185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4070/">CVE-2016-4070 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4070">CVE-2016-4070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4073/">CVE-2016-4073 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4073">CVE-2016-4073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4342/">CVE-2016-4342 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4342">CVE-2016-4342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4346/">CVE-2016-4346 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4346">CVE-2016-4346 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4537/">CVE-2016-4537 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4537">CVE-2016-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4538/">CVE-2016-4538 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4538">CVE-2016-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4539/">CVE-2016-4539 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4539">CVE-2016-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4540/">CVE-2016-4540 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4540">CVE-2016-4540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4541/">CVE-2016-4541 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4541">CVE-2016-4541 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4542/">CVE-2016-4542 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4542">CVE-2016-4542 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4543/">CVE-2016-4543 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4543">CVE-2016-4543 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4544/">CVE-2016-4544 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4544">CVE-2016-4544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5093/">CVE-2016-5093 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5093">CVE-2016-5093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5094/">CVE-2016-5094 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5094">CVE-2016-5094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5095/">CVE-2016-5095 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5095">CVE-2016-5095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5096/">CVE-2016-5096 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5096">CVE-2016-5096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5114/">CVE-2016-5114 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5114">CVE-2016-5114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576716" comment="apache2-mod_php53-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576717" comment="php53-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576718" comment="php53-bcmath-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576719" comment="php53-bz2-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576720" comment="php53-calendar-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576721" comment="php53-ctype-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576722" comment="php53-curl-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576723" comment="php53-dba-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576724" comment="php53-dom-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576725" comment="php53-exif-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576726" comment="php53-fastcgi-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576727" comment="php53-fileinfo-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576728" comment="php53-ftp-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576729" comment="php53-gd-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576730" comment="php53-gettext-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576731" comment="php53-gmp-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576732" comment="php53-iconv-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576733" comment="php53-intl-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576734" comment="php53-json-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576735" comment="php53-ldap-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576736" comment="php53-mbstring-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576737" comment="php53-mcrypt-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576738" comment="php53-mysql-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576739" comment="php53-odbc-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576740" comment="php53-openssl-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576741" comment="php53-pcntl-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576742" comment="php53-pdo-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576743" comment="php53-pear-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576744" comment="php53-pgsql-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576745" comment="php53-pspell-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576746" comment="php53-shmop-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576747" comment="php53-snmp-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576748" comment="php53-soap-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576749" comment="php53-suhosin-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576750" comment="php53-sysvmsg-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576751" comment="php53-sysvsem-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576752" comment="php53-sysvshm-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576753" comment="php53-tokenizer-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576754" comment="php53-wddx-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576755" comment="php53-xmlreader-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576756" comment="php53-xmlrpc-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576757" comment="php53-xmlwriter-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576758" comment="php53-xsl-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576759" comment="php53-zip-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576760" comment="php53-zlib-5.3.17-47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218136" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="987530" ref_url="https://bugzilla.suse.com/987530" source="BUGZILLA"/>
		<reference ref_id="991426" ref_url="https://bugzilla.suse.com/991426" source="BUGZILLA"/>
		<reference ref_id="991427" ref_url="https://bugzilla.suse.com/991427" source="BUGZILLA"/>
		<reference ref_id="991428" ref_url="https://bugzilla.suse.com/991428" source="BUGZILLA"/>
		<reference ref_id="991429" ref_url="https://bugzilla.suse.com/991429" source="BUGZILLA"/>
		<reference ref_id="991430" ref_url="https://bugzilla.suse.com/991430" source="BUGZILLA"/>
		<reference ref_id="991433" ref_url="https://bugzilla.suse.com/991433" source="BUGZILLA"/>
		<reference ref_id="991437" ref_url="https://bugzilla.suse.com/991437" source="BUGZILLA"/>
		<reference ref_id="997206" ref_url="https://bugzilla.suse.com/997206" source="BUGZILLA"/>
		<reference ref_id="997207" ref_url="https://bugzilla.suse.com/997207" source="BUGZILLA"/>
		<reference ref_id="997208" ref_url="https://bugzilla.suse.com/997208" source="BUGZILLA"/>
		<reference ref_id="997210" ref_url="https://bugzilla.suse.com/997210" source="BUGZILLA"/>
		<reference ref_id="997211" ref_url="https://bugzilla.suse.com/997211" source="BUGZILLA"/>
		<reference ref_id="997220" ref_url="https://bugzilla.suse.com/997220" source="BUGZILLA"/>
		<reference ref_id="997225" ref_url="https://bugzilla.suse.com/997225" source="BUGZILLA"/>
		<reference ref_id="997230" ref_url="https://bugzilla.suse.com/997230" source="BUGZILLA"/>
		<reference ref_id="997257" ref_url="https://bugzilla.suse.com/997257" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3587" ref_url="https://www.suse.com/security/cve/CVE-2014-3587/" source="CVE"/>
		<reference ref_id="CVE-2016-5399" ref_url="https://www.suse.com/security/cve/CVE-2016-5399/" source="CVE"/>
		<reference ref_id="CVE-2016-6288" ref_url="https://www.suse.com/security/cve/CVE-2016-6288/" source="CVE"/>
		<reference ref_id="CVE-2016-6289" ref_url="https://www.suse.com/security/cve/CVE-2016-6289/" source="CVE"/>
		<reference ref_id="CVE-2016-6290" ref_url="https://www.suse.com/security/cve/CVE-2016-6290/" source="CVE"/>
		<reference ref_id="CVE-2016-6291" ref_url="https://www.suse.com/security/cve/CVE-2016-6291/" source="CVE"/>
		<reference ref_id="CVE-2016-6296" ref_url="https://www.suse.com/security/cve/CVE-2016-6296/" source="CVE"/>
		<reference ref_id="CVE-2016-6297" ref_url="https://www.suse.com/security/cve/CVE-2016-6297/" source="CVE"/>
		<reference ref_id="CVE-2016-7124" ref_url="https://www.suse.com/security/cve/CVE-2016-7124/" source="CVE"/>
		<reference ref_id="CVE-2016-7125" ref_url="https://www.suse.com/security/cve/CVE-2016-7125/" source="CVE"/>
		<reference ref_id="CVE-2016-7126" ref_url="https://www.suse.com/security/cve/CVE-2016-7126/" source="CVE"/>
		<reference ref_id="CVE-2016-7127" ref_url="https://www.suse.com/security/cve/CVE-2016-7127/" source="CVE"/>
		<reference ref_id="CVE-2016-7128" ref_url="https://www.suse.com/security/cve/CVE-2016-7128/" source="CVE"/>
		<reference ref_id="CVE-2016-7129" ref_url="https://www.suse.com/security/cve/CVE-2016-7129/" source="CVE"/>
		<reference ref_id="CVE-2016-7130" ref_url="https://www.suse.com/security/cve/CVE-2016-7130/" source="CVE"/>
		<reference ref_id="CVE-2016-7131" ref_url="https://www.suse.com/security/cve/CVE-2016-7131/" source="CVE"/>
		<reference ref_id="CVE-2016-7132" ref_url="https://www.suse.com/security/cve/CVE-2016-7132/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002276.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following security issues:

* CVE-2014-3587: Integer overflow in the cdf_read_property_info affecting SLES11 SP3 [bsc#987530]
* CVE-2016-6297: Stack-based buffer overflow vulnerability in php_stream_zip_opener [bsc#991426]
* CVE-2016-6291: Out-of-bounds access in exif_process_IFD_in_MAKERNOTE [bsc#991427]
* CVE-2016-6289: Integer overflow leads to buffer overflow in virtual_file_ex [bsc#991428]
* CVE-2016-6290: Use after free in unserialize() with Unexpected Session Deserialization [bsc#991429]
* CVE-2016-5399: Improper error handling in bzread() [bsc#991430]
* CVE-2016-6288: Buffer over-read in php_url_parse_ex [bsc#991433]
* CVE-2016-6296: Heap buffer overflow vulnerability in simplestring_addn in simplestring.c [bsc#991437]
* CVE-2016-7124: Create an Unexpected Object and Don't Invoke __wakeup() in Deserialization
* CVE-2016-7125: PHP Session Data Injection Vulnerability
* CVE-2016-7126: select_colors write out-of-bounds
* CVE-2016-7127: imagegammacorrect allowed arbitrary write access
* CVE-2016-7128: Memory Leakage In exif_process_IFD_in_TIFF
* CVE-2016-7129: wddx_deserialize allows illegal memory access
* CVE-2016-7130: wddx_deserialize null dereference
* CVE-2016-7131: wddx_deserialize null dereference with invalid xml
* CVE-2016-7132: wddx_deserialize null dereference in php_wddx_pop_element
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-16"/>
	<updated date="2016-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/987530">SUSE bug 987530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991426">SUSE bug 991426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991427">SUSE bug 991427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991428">SUSE bug 991428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991429">SUSE bug 991429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991430">SUSE bug 991430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991433">SUSE bug 991433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991437">SUSE bug 991437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997206">SUSE bug 997206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997207">SUSE bug 997207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997208">SUSE bug 997208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997210">SUSE bug 997210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997211">SUSE bug 997211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997220">SUSE bug 997220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997225">SUSE bug 997225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997230">SUSE bug 997230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997257">SUSE bug 997257</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3587/">CVE-2014-3587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3587">CVE-2014-3587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5399/">CVE-2016-5399 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5399">CVE-2016-5399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6288/">CVE-2016-6288 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6288">CVE-2016-6288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6289/">CVE-2016-6289 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6289">CVE-2016-6289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6290/">CVE-2016-6290 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6290">CVE-2016-6290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6291/">CVE-2016-6291 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6291">CVE-2016-6291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6296/">CVE-2016-6296 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6296">CVE-2016-6296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6297/">CVE-2016-6297 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6297">CVE-2016-6297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7124/">CVE-2016-7124 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7124">CVE-2016-7124 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-7125/">CVE-2016-7125 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7125">CVE-2016-7125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7126/">CVE-2016-7126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7126">CVE-2016-7126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7127/">CVE-2016-7127 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7127">CVE-2016-7127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7128/">CVE-2016-7128 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7128">CVE-2016-7128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7129/">CVE-2016-7129 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7129">CVE-2016-7129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7130/">CVE-2016-7130 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7130">CVE-2016-7130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7131/">CVE-2016-7131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7131">CVE-2016-7131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7132/">CVE-2016-7132 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7132">CVE-2016-7132 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576761" comment="apache2-mod_php53-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576762" comment="php53-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576763" comment="php53-bcmath-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576764" comment="php53-bz2-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576765" comment="php53-calendar-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576766" comment="php53-ctype-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576767" comment="php53-curl-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576768" comment="php53-dba-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576769" comment="php53-dom-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576770" comment="php53-exif-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576771" comment="php53-fastcgi-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576772" comment="php53-fileinfo-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576773" comment="php53-ftp-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576774" comment="php53-gd-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576775" comment="php53-gettext-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576776" comment="php53-gmp-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576777" comment="php53-iconv-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576778" comment="php53-intl-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576779" comment="php53-json-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576780" comment="php53-ldap-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576781" comment="php53-mbstring-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576782" comment="php53-mcrypt-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576783" comment="php53-mysql-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576784" comment="php53-odbc-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576785" comment="php53-openssl-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576786" comment="php53-pcntl-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576787" comment="php53-pdo-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576788" comment="php53-pear-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576789" comment="php53-pgsql-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576790" comment="php53-pspell-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576791" comment="php53-shmop-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576792" comment="php53-snmp-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576793" comment="php53-soap-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576794" comment="php53-suhosin-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576795" comment="php53-sysvmsg-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576796" comment="php53-sysvsem-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576797" comment="php53-sysvshm-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576798" comment="php53-tokenizer-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576799" comment="php53-wddx-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576800" comment="php53-xmlreader-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576801" comment="php53-xmlrpc-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576802" comment="php53-xmlwriter-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576803" comment="php53-xsl-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576804" comment="php53-zip-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576805" comment="php53-zlib-5.3.17-55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218137" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="999679" ref_url="https://bugzilla.suse.com/999679" source="BUGZILLA"/>
		<reference ref_id="999680" ref_url="https://bugzilla.suse.com/999680" source="BUGZILLA"/>
		<reference ref_id="999682" ref_url="https://bugzilla.suse.com/999682" source="BUGZILLA"/>
		<reference ref_id="999684" ref_url="https://bugzilla.suse.com/999684" source="BUGZILLA"/>
		<reference ref_id="999685" ref_url="https://bugzilla.suse.com/999685" source="BUGZILLA"/>
		<reference ref_id="999819" ref_url="https://bugzilla.suse.com/999819" source="BUGZILLA"/>
		<reference ref_id="999820" ref_url="https://bugzilla.suse.com/999820" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7411" ref_url="https://www.suse.com/security/cve/CVE-2016-7411/" source="CVE"/>
		<reference ref_id="CVE-2016-7412" ref_url="https://www.suse.com/security/cve/CVE-2016-7412/" source="CVE"/>
		<reference ref_id="CVE-2016-7413" ref_url="https://www.suse.com/security/cve/CVE-2016-7413/" source="CVE"/>
		<reference ref_id="CVE-2016-7414" ref_url="https://www.suse.com/security/cve/CVE-2016-7414/" source="CVE"/>
		<reference ref_id="CVE-2016-7416" ref_url="https://www.suse.com/security/cve/CVE-2016-7416/" source="CVE"/>
		<reference ref_id="CVE-2016-7417" ref_url="https://www.suse.com/security/cve/CVE-2016-7417/" source="CVE"/>
		<reference ref_id="CVE-2016-7418" ref_url="https://www.suse.com/security/cve/CVE-2016-7418/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002312.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following issues:

* CVE-2016-7411: php5: Memory corruption when destructing deserialized object
* CVE-2016-7412: Heap overflow in mysqlnd when not receiving UNSIGNED_FLAG in BIT field
* CVE-2016-7413: Use after free in wddx_deserialize
* CVE-2016-7414: Out of bounds heap read when verifying signature of zip phar in phar_parse_zipfile
* CVE-2016-7416: Stack based buffer overflow in msgfmt_format_message
* CVE-2016-7417: Missing type check when unserializing SplArray
* CVE-2016-7418: Null pointer dereference in php_wddx_push_element
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-05"/>
	<updated date="2016-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/999679">SUSE bug 999679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999680">SUSE bug 999680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999682">SUSE bug 999682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999684">SUSE bug 999684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999685">SUSE bug 999685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999819">SUSE bug 999819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999820">SUSE bug 999820</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7411/">CVE-2016-7411 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7411">CVE-2016-7411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7412/">CVE-2016-7412 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7412">CVE-2016-7412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7413/">CVE-2016-7413 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7413">CVE-2016-7413 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7414/">CVE-2016-7414 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7414">CVE-2016-7414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7416/">CVE-2016-7416 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7416">CVE-2016-7416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7417/">CVE-2016-7417 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7417">CVE-2016-7417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7418/">CVE-2016-7418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7418">CVE-2016-7418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576806" comment="apache2-mod_php53-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576807" comment="php53-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576808" comment="php53-bcmath-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576809" comment="php53-bz2-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576810" comment="php53-calendar-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576811" comment="php53-ctype-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576812" comment="php53-curl-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576813" comment="php53-dba-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576814" comment="php53-dom-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576815" comment="php53-exif-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576816" comment="php53-fastcgi-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576817" comment="php53-fileinfo-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576818" comment="php53-ftp-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576819" comment="php53-gd-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576820" comment="php53-gettext-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576821" comment="php53-gmp-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576822" comment="php53-iconv-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576823" comment="php53-intl-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576824" comment="php53-json-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576825" comment="php53-ldap-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576826" comment="php53-mbstring-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576827" comment="php53-mcrypt-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576828" comment="php53-mysql-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576829" comment="php53-odbc-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576830" comment="php53-openssl-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576831" comment="php53-pcntl-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576832" comment="php53-pdo-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576833" comment="php53-pear-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576834" comment="php53-pgsql-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576835" comment="php53-pspell-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576836" comment="php53-shmop-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576837" comment="php53-snmp-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576838" comment="php53-soap-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576839" comment="php53-suhosin-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576840" comment="php53-sysvmsg-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576841" comment="php53-sysvsem-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576842" comment="php53-sysvshm-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576843" comment="php53-tokenizer-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576844" comment="php53-wddx-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576845" comment="php53-xmlreader-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576846" comment="php53-xmlrpc-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576847" comment="php53-xmlwriter-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576848" comment="php53-xsl-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576849" comment="php53-zip-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576850" comment="php53-zlib-5.3.17-58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218138" version="1" class="patch">
	<metadata>
		<title>Recommended update for popt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="747225" ref_url="https://bugzilla.suse.com/747225" source="BUGZILLA"/>
		<reference ref_id="754281" ref_url="https://bugzilla.suse.com/754281" source="BUGZILLA"/>
		<reference ref_id="754284" ref_url="https://bugzilla.suse.com/754284" source="BUGZILLA"/>
		<reference ref_id="754285" ref_url="https://bugzilla.suse.com/754285" source="BUGZILLA"/>
		<reference ref_id="787156" ref_url="https://bugzilla.suse.com/787156" source="BUGZILLA"/>
		<reference ref_id="792885" ref_url="https://bugzilla.suse.com/792885" source="BUGZILLA"/>
		<reference ref_id="793395" ref_url="https://bugzilla.suse.com/793395" source="BUGZILLA"/>
		<reference ref_id="812591" ref_url="https://bugzilla.suse.com/812591" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0060" ref_url="https://www.suse.com/security/cve/CVE-2012-0060/" source="CVE"/>
		<reference ref_id="CVE-2012-0061" ref_url="https://www.suse.com/security/cve/CVE-2012-0061/" source="CVE"/>
		<reference ref_id="CVE-2012-0815" ref_url="https://www.suse.com/security/cve/CVE-2012-0815/" source="CVE"/>
		<description>

New rpm versions write the package database entries for pubkeys in a 
slightly different way than the version of rpm used in SLE 11 does, this 
results in rpm writing to already freed memory and terminating with a 
segmentation fault.

This issue may happen when building a SLE 11 image with kiwi on a system 
that uses a new version of rpm.

This update makes rpm cope with the new entries.

		</description>
<advisory from="security@suse.de">
	<issued date="2013-04-25"/>
	<updated date="2013-04-25"/>
	<bugzilla href="https://bugzilla.suse.com/747225">SUSE bug 747225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754281">SUSE bug 754281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754284">SUSE bug 754284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754285">SUSE bug 754285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787156">SUSE bug 787156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792885">SUSE bug 792885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/793395">SUSE bug 793395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/812591">SUSE bug 812591</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0060/">CVE-2012-0060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0060">CVE-2012-0060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0061/">CVE-2012-0061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0061">CVE-2012-0061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0815/">CVE-2012-0815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0815">CVE-2012-0815 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992519" comment="popt-1.7-37.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992520" comment="popt-32bit-1.7-37.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589041" comment="popt-x86-1.7-37.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992521" comment="rpm-4.4.2.3-37.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992522" comment="rpm-32bit-4.4.2.3-37.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589044" comment="rpm-x86-4.4.2.3-37.56.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992519" comment="popt-1.7-37.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992520" comment="popt-32bit-1.7-37.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589041" comment="popt-x86-1.7-37.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992521" comment="rpm-4.4.2.3-37.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992522" comment="rpm-32bit-4.4.2.3-37.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589044" comment="rpm-x86-4.4.2.3-37.56.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218139" version="1" class="patch">
	<metadata>
		<title>Security update for PostgreSQL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="802679" ref_url="https://bugzilla.suse.com/802679" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255/" source="CVE"/>
		<description>

PostgreSQL has been updated to version 8.3.23 which fixes various bugs and 
one security issue.

The security issue fixed in this release, CVE-2013-0255, allowed a 
previously authenticated user to crash the server by calling an internal 
function with invalid arguments. This issue was discovered by independent 
security researcher Sumit Soni this week and reported via Secunia SVCRP, 
and we are grateful for their efforts in making PostgreSQL more secure.

More information can be found at

http://www.postgresql.org/about/news/1446/
&lt;http://www.postgresql.org/about/news/1446/&gt;

Security Issue reference:

    * CVE-2013-0255
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0255&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-02-13"/>
	<updated date="2013-02-13"/>
	<bugzilla href="https://bugzilla.suse.com/802679">SUSE bug 802679</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0255">CVE-2013-0255 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576851" comment="postgresql-8.3.23-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576852" comment="postgresql-contrib-8.3.23-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576853" comment="postgresql-docs-8.3.23-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576854" comment="postgresql-server-8.3.23-0.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576851" comment="postgresql-8.3.23-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576852" comment="postgresql-contrib-8.3.23-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576853" comment="postgresql-docs-8.3.23-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576854" comment="postgresql-server-8.3.23-0.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218140" version="1" class="patch">
	<metadata>
		<title>Security update for puppet</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="809839" ref_url="https://bugzilla.suse.com/809839" source="BUGZILLA"/>
		<reference ref_id="825878" ref_url="https://bugzilla.suse.com/825878" source="BUGZILLA"/>
		<reference ref_id="835122" ref_url="https://bugzilla.suse.com/835122" source="BUGZILLA"/>
		<reference ref_id="835848" ref_url="https://bugzilla.suse.com/835848" source="BUGZILLA"/>
		<reference ref_id="853982" ref_url="https://bugzilla.suse.com/853982" source="BUGZILLA"/>
		<reference ref_id="864082" ref_url="https://bugzilla.suse.com/864082" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1640" ref_url="https://www.suse.com/security/cve/CVE-2013-1640/" source="CVE"/>
		<reference ref_id="CVE-2013-1652" ref_url="https://www.suse.com/security/cve/CVE-2013-1652/" source="CVE"/>
		<reference ref_id="CVE-2013-1653" ref_url="https://www.suse.com/security/cve/CVE-2013-1653/" source="CVE"/>
		<reference ref_id="CVE-2013-1654" ref_url="https://www.suse.com/security/cve/CVE-2013-1654/" source="CVE"/>
		<reference ref_id="CVE-2013-1655" ref_url="https://www.suse.com/security/cve/CVE-2013-1655/" source="CVE"/>
		<reference ref_id="CVE-2013-2274" ref_url="https://www.suse.com/security/cve/CVE-2013-2274/" source="CVE"/>
		<reference ref_id="CVE-2013-2275" ref_url="https://www.suse.com/security/cve/CVE-2013-2275/" source="CVE"/>
		<reference ref_id="CVE-2013-3567" ref_url="https://www.suse.com/security/cve/CVE-2013-3567/" source="CVE"/>
		<reference ref_id="CVE-2013-4761" ref_url="https://www.suse.com/security/cve/CVE-2013-4761/" source="CVE"/>
		<description>

This update for puppet fixes a remote code execution vulnerability in the 
'resource_type' service. (CVE-2013-4761)

Additionally, the update prevents puppet from executing initialization 
scripts that could trigger a system reboot when handling 'puppet resource 
service' calls.

Security Issue reference:

    * CVE-2013-4761
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4761&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-20"/>
	<updated date="2014-01-20"/>
	<bugzilla href="https://bugzilla.suse.com/809839">SUSE bug 809839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825878">SUSE bug 825878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835122">SUSE bug 835122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835848">SUSE bug 835848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853982">SUSE bug 853982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864082">SUSE bug 864082</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1640/">CVE-2013-1640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1640">CVE-2013-1640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1652/">CVE-2013-1652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1652">CVE-2013-1652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1653/">CVE-2013-1653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1653">CVE-2013-1653 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1654/">CVE-2013-1654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1654">CVE-2013-1654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1655/">CVE-2013-1655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1655">CVE-2013-1655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2274/">CVE-2013-2274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2274">CVE-2013-2274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2275/">CVE-2013-2275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2275">CVE-2013-2275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3567/">CVE-2013-3567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3567">CVE-2013-3567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4761/">CVE-2013-4761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4761">CVE-2013-4761 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576855" comment="puppet-2.6.18-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576856" comment="puppet-server-2.6.18-0.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576855" comment="puppet-2.6.18-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576856" comment="puppet-server-2.6.18-0.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576855" comment="puppet-2.6.18-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576856" comment="puppet-server-2.6.18-0.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218141" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="834601" ref_url="https://bugzilla.suse.com/834601" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<description>

This python update fixes a certificate hostname issue.

    * bnc#834601: CVE-2013-4238: python: SSL module does not handle
      certificates that contain hostnames with NULL bytes

Security Issue reference:

    * CVE-2013-4238
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4238">CVE-2013-4238 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576857" comment="libpython2_6-1_0-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576858" comment="libpython2_6-1_0-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576859" comment="libpython2_6-1_0-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576860" comment="python-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576861" comment="python-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576862" comment="python-base-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576863" comment="python-base-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576864" comment="python-base-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576865" comment="python-curses-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576866" comment="python-demo-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576867" comment="python-gdbm-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576868" comment="python-idle-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576869" comment="python-tk-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576870" comment="python-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576871" comment="python-xml-2.6.8-0.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576857" comment="libpython2_6-1_0-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576858" comment="libpython2_6-1_0-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576859" comment="libpython2_6-1_0-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576860" comment="python-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576861" comment="python-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576862" comment="python-base-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576863" comment="python-base-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576864" comment="python-base-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576865" comment="python-curses-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576866" comment="python-demo-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576867" comment="python-gdbm-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576868" comment="python-idle-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576869" comment="python-tk-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576870" comment="python-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576871" comment="python-xml-2.6.8-0.23.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218142" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="827982" ref_url="https://bugzilla.suse.com/827982" source="BUGZILLA"/>
		<reference ref_id="834601" ref_url="https://bugzilla.suse.com/834601" source="BUGZILLA"/>
		<reference ref_id="847135" ref_url="https://bugzilla.suse.com/847135" source="BUGZILLA"/>
		<reference ref_id="856836" ref_url="https://bugzilla.suse.com/856836" source="BUGZILLA"/>
		<reference ref_id="859068" ref_url="https://bugzilla.suse.com/859068" source="BUGZILLA"/>
		<reference ref_id="863741" ref_url="https://bugzilla.suse.com/863741" source="BUGZILLA"/>
		<reference ref_id="872848" ref_url="https://bugzilla.suse.com/872848" source="BUGZILLA"/>
		<reference ref_id="885882" ref_url="https://bugzilla.suse.com/885882" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-1912" ref_url="https://www.suse.com/security/cve/CVE-2014-1912/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<description>

Python has been updated to version 2.6.9, which brings many fixes for bugs 
and security issues:

    * SSL Root Certificate validation is now enabled by default.
      (bnc#827982)
    * Fixed a overflow in socket.recvfrom_into where incorrect python
      programs could have been exploited remotely via a buffer overrun.
      (CVE-2014-1912)
    * Multiple unbound readline() DoS flaws in python stdlib have been
      fixed. (CVE-2013-1752)
    * Handling of embedded \0 in SSL certificate fields has been fixed.
      (CVE-2013-4238)
    * CGIHTTPServer file disclosure and directory traversal through
      URL-encoded characters has been fixed. (CVE-2014-4650)

Additionally, the following non-security issues have been fixed:

    * Turn off OpenSSL's aggressive optimizations that conflict with
      Python's GC. (bnc#859068)
    * Fix usage of MD5 in hmac module when the cipher is not available in
      FIPS mode. (bnc#847135)
    * Update 'urlparse' module to correctly parse IPv6 addresses.
      (bnc#872848)
    * Correctly enable IPv6 support.

Security Issues:

    * CVE-2013-4238
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238&gt;
    * CVE-2014-1912
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1912&gt;
    * CVE-2013-1752
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1752&gt;
    * CVE-2014-4650
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4650&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-28"/>
	<updated date="2014-07-28"/>
	<bugzilla href="https://bugzilla.suse.com/827982">SUSE bug 827982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847135">SUSE bug 847135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856836">SUSE bug 856836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859068">SUSE bug 859068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863741">SUSE bug 863741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/872848">SUSE bug 872848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885882">SUSE bug 885882</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1752">CVE-2013-1752 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4238">CVE-2013-4238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1912/">CVE-2014-1912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1912">CVE-2014-1912 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4650">CVE-2014-4650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574753" comment="libpython2_6-1_0-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574754" comment="libpython2_6-1_0-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574755" comment="python-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574756" comment="python-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574757" comment="python-base-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574758" comment="python-base-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574759" comment="python-curses-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574760" comment="python-demo-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574761" comment="python-devel-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563808" comment="python-doc-2.6-8.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563809" comment="python-doc-pdf-2.6-8.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574762" comment="python-gdbm-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574763" comment="python-idle-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574764" comment="python-tk-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574765" comment="python-xml-2.6.9-0.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218143" version="1" class="patch">
	<metadata>
		<title>Security update for quagga</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="781567" ref_url="https://bugzilla.suse.com/781567" source="BUGZILLA"/>
		<reference ref_id="822572" ref_url="https://bugzilla.suse.com/822572" source="BUGZILLA"/>
		<reference ref_id="828117" ref_url="https://bugzilla.suse.com/828117" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0149" ref_url="https://www.suse.com/security/cve/CVE-2013-0149/" source="CVE"/>
		<reference ref_id="CVE-2013-2236" ref_url="https://www.suse.com/security/cve/CVE-2013-2236/" source="CVE"/>
		<description>

This update of quagga fixes two security issues:

    * CVE-2013-0149: specially-crafted OSPF packets could have caused the
      routing table to be erased (bnc#822572)
    * CVE-2013-2236: local network stack overflow (bnc#828117)

Security Issue references:

    * CVE-2013-2236
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2236&gt;
    * CVE-2013-0149
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0149&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-22"/>
	<updated date="2013-08-22"/>
	<bugzilla href="https://bugzilla.suse.com/781567">SUSE bug 781567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822572">SUSE bug 822572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828117">SUSE bug 828117</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0149/">CVE-2013-0149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0149">CVE-2013-0149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2236/">CVE-2013-2236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2236">CVE-2013-2236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576872" comment="quagga-0.99.15-0.14.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576872" comment="quagga-0.99.15-0.14.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218144" version="1" class="patch">
	<metadata>
		<title>Recommended update for quota</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="772570" ref_url="https://bugzilla.suse.com/772570" source="BUGZILLA"/>
		<reference ref_id="783171" ref_url="https://bugzilla.suse.com/783171" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3417" ref_url="https://www.suse.com/security/cve/CVE-2012-3417/" source="CVE"/>
		<description>

This update fixes repquota and warnquota are not properly working for XFS 
filesystems (bnc#783171).

		</description>
<advisory from="security@suse.de">
	<issued date="2012-10-19"/>
	<updated date="2012-10-19"/>
	<bugzilla href="https://bugzilla.suse.com/772570">SUSE bug 772570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/783171">SUSE bug 783171</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3417/">CVE-2012-3417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3417">CVE-2012-3417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992523" comment="quota-3.16-50.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992524" comment="quota-nfs-3.16-50.41.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992523" comment="quota-3.16-50.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992524" comment="quota-nfs-3.16-50.41.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218145" version="1" class="patch">
	<metadata>
		<title>Security update for ruby</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="783525" ref_url="https://bugzilla.suse.com/783525" source="BUGZILLA"/>
		<reference ref_id="808137" ref_url="https://bugzilla.suse.com/808137" source="BUGZILLA"/>
		<reference ref_id="827265" ref_url="https://bugzilla.suse.com/827265" source="BUGZILLA"/>
		<reference ref_id="851803" ref_url="https://bugzilla.suse.com/851803" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2012-4522" ref_url="https://www.suse.com/security/cve/CVE-2012-4522/" source="CVE"/>
		<reference ref_id="CVE-2013-1821" ref_url="https://www.suse.com/security/cve/CVE-2013-1821/" source="CVE"/>
		<reference ref_id="CVE-2013-4073" ref_url="https://www.suse.com/security/cve/CVE-2013-4073/" source="CVE"/>
		<reference ref_id="CVE-2013-4164" ref_url="https://www.suse.com/security/cve/CVE-2013-4164/" source="CVE"/>
		<description>

The following security issue has been fixed:

    * CVE-2013-4164: heap overflow in float point parsing

Security Issue references:

    * CVE-2013-4164
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4164&gt;
    * CVE-2009-0689
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0689&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-25"/>
	<updated date="2013-11-25"/>
	<bugzilla href="https://bugzilla.suse.com/783525">SUSE bug 783525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808137">SUSE bug 808137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827265">SUSE bug 827265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851803">SUSE bug 851803</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0689">CVE-2009-0689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4522/">CVE-2012-4522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4522">CVE-2012-4522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1821/">CVE-2013-1821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1821">CVE-2013-1821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4073/">CVE-2013-4073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4073">CVE-2013-4073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4164/">CVE-2013-4164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4164">CVE-2013-4164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576873" comment="ruby-1.8.7.p357-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563135" comment="ruby-doc-html-1.8.7.p357-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563139" comment="ruby-tk-1.8.7.p357-0.9.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576873" comment="ruby-1.8.7.p357-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563135" comment="ruby-doc-html-1.8.7.p357-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563139" comment="ruby-tk-1.8.7.p357-0.9.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576873" comment="ruby-1.8.7.p357-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563135" comment="ruby-doc-html-1.8.7.p357-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563139" comment="ruby-tk-1.8.7.p357-0.9.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218146" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="295284" ref_url="https://bugzilla.suse.com/295284" source="BUGZILLA"/>
		<reference ref_id="773464" ref_url="https://bugzilla.suse.com/773464" source="BUGZILLA"/>
		<reference ref_id="901813" ref_url="https://bugzilla.suse.com/901813" source="BUGZILLA"/>
		<reference ref_id="912457" ref_url="https://bugzilla.suse.com/912457" source="BUGZILLA"/>
		<reference ref_id="913304" ref_url="https://bugzilla.suse.com/913304" source="BUGZILLA"/>
		<reference ref_id="934299" ref_url="https://bugzilla.suse.com/934299" source="BUGZILLA"/>
		<reference ref_id="948244" ref_url="https://bugzilla.suse.com/948244" source="BUGZILLA"/>
		<reference ref_id="949022" ref_url="https://bugzilla.suse.com/949022" source="BUGZILLA"/>
		<reference ref_id="958582" ref_url="https://bugzilla.suse.com/958582" source="BUGZILLA"/>
		<reference ref_id="958583" ref_url="https://bugzilla.suse.com/958583" source="BUGZILLA"/>
		<reference ref_id="958584" ref_url="https://bugzilla.suse.com/958584" source="BUGZILLA"/>
		<reference ref_id="958586" ref_url="https://bugzilla.suse.com/958586" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252/" source="CVE"/>
		<reference ref_id="CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296/" source="CVE"/>
		<reference ref_id="CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001781.html" source="SUSE-SU"/>
		<description>
This update for Samba fixes the following security issues:

- CVE-2015-5330: Remote read memory exploit in LDB (bnc#958586).
- CVE-2015-5252: Insufficient symlink verification (file access outside the share) (bnc#958582).
- CVE-2015-5296: No man in the middle protection when forcing smb encryption on the client side (bnc#958584).
- CVE-2015-5299: Currently the snapshot browsing is not secure thru windows previous version (shadow_copy2) (bnc#958583).

Non-security issues fixed:

- Prevent null pointer access in samlogon fallback when security credentials are null
  (bnc#949022).
- Address unrecoverable winbind failure: 'key length too large' (bnc#934299).
- Take resource group sids into account when caching netsamlogon data (bnc#912457).
- Use domain name if search by domain SID fails to send SIDHistory lookups to correct
  idmap backend (bnc#773464).
- Remove deprecated base_rid example from idmap_rid manpage (bnc#913304).
- Purge printer name cache on spoolss SetPrinter change (bnc#901813).
- Fix lookup of groups with 'Local Domain' scope from Active Directory (bnc#948244).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-05"/>
	<updated date="2016-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/295284">SUSE bug 295284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773464">SUSE bug 773464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901813">SUSE bug 901813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912457">SUSE bug 912457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913304">SUSE bug 913304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934299">SUSE bug 934299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948244">SUSE bug 948244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949022">SUSE bug 949022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958582">SUSE bug 958582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958583">SUSE bug 958583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958584">SUSE bug 958584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958586">SUSE bug 958586</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5252">CVE-2015-5252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5296">CVE-2015-5296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5299">CVE-2015-5299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5330">CVE-2015-5330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576874" comment="ldapsmb-1.34b-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576875" comment="libldb1-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576876" comment="libsmbclient0-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576877" comment="libsmbclient0-32bit-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576878" comment="libtalloc2-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576879" comment="libtalloc2-32bit-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576880" comment="libtdb1-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576881" comment="libtdb1-32bit-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576882" comment="libtevent0-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576883" comment="libtevent0-32bit-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576884" comment="libwbclient0-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576885" comment="libwbclient0-32bit-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576886" comment="samba-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576887" comment="samba-32bit-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576888" comment="samba-client-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576889" comment="samba-client-32bit-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576890" comment="samba-doc-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576891" comment="samba-krb-printing-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576892" comment="samba-winbind-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576893" comment="samba-winbind-32bit-3.6.3-45.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218147" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="936909" ref_url="https://bugzilla.suse.com/936909" source="BUGZILLA"/>
		<reference ref_id="953382" ref_url="https://bugzilla.suse.com/953382" source="BUGZILLA"/>
		<reference ref_id="967017" ref_url="https://bugzilla.suse.com/967017" source="BUGZILLA"/>
		<reference ref_id="968222" ref_url="https://bugzilla.suse.com/968222" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001969.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issues:

Security issue fixed:
- CVE-2015-7560: Getting and setting Windows ACLs on symlinks can change permissions on link 
  target; (bso#11648); (bsc#968222).

Bugs fixed:
- Fix leaking memory in libsmbclient: Add missing talloc
  stackframe; (bso#11177); (bsc#967017).
- Ensure samlogon fallback requests are rerouted after kerberos failure;
  (bsc#953382).
- Ensure attempt to ssh into locked account  triggers
  'Your account is disabled.....' to the console; (bsc#953382).
- Make the winbind package depend on the matching libwbclient version and
  vice versa; (bsc#936909).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-29"/>
	<updated date="2016-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/936909">SUSE bug 936909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953382">SUSE bug 953382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967017">SUSE bug 967017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968222">SUSE bug 968222</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7560">CVE-2015-7560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576894" comment="ldapsmb-1.34b-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576895" comment="libldb1-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576896" comment="libsmbclient0-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576897" comment="libsmbclient0-32bit-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576898" comment="libtalloc2-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576899" comment="libtalloc2-32bit-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576900" comment="libtdb1-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576901" comment="libtdb1-32bit-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576902" comment="libtevent0-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576903" comment="libtevent0-32bit-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576904" comment="libwbclient0-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576905" comment="libwbclient0-32bit-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576906" comment="samba-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576907" comment="samba-32bit-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576908" comment="samba-client-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576909" comment="samba-client-32bit-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576910" comment="samba-doc-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576911" comment="samba-krb-printing-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576912" comment="samba-winbind-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576913" comment="samba-winbind-32bit-3.6.3-48.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218148" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="936862" ref_url="https://bugzilla.suse.com/936862" source="BUGZILLA"/>
		<reference ref_id="967017" ref_url="https://bugzilla.suse.com/967017" source="BUGZILLA"/>
		<reference ref_id="971965" ref_url="https://bugzilla.suse.com/971965" source="BUGZILLA"/>
		<reference ref_id="973031" ref_url="https://bugzilla.suse.com/973031" source="BUGZILLA"/>
		<reference ref_id="973032" ref_url="https://bugzilla.suse.com/973032" source="BUGZILLA"/>
		<reference ref_id="973033" ref_url="https://bugzilla.suse.com/973033" source="BUGZILLA"/>
		<reference ref_id="973034" ref_url="https://bugzilla.suse.com/973034" source="BUGZILLA"/>
		<reference ref_id="973036" ref_url="https://bugzilla.suse.com/973036" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5370" ref_url="https://www.suse.com/security/cve/CVE-2015-5370/" source="CVE"/>
		<reference ref_id="CVE-2016-2110" ref_url="https://www.suse.com/security/cve/CVE-2016-2110/" source="CVE"/>
		<reference ref_id="CVE-2016-2111" ref_url="https://www.suse.com/security/cve/CVE-2016-2111/" source="CVE"/>
		<reference ref_id="CVE-2016-2112" ref_url="https://www.suse.com/security/cve/CVE-2016-2112/" source="CVE"/>
		<reference ref_id="CVE-2016-2113" ref_url="https://www.suse.com/security/cve/CVE-2016-2113/" source="CVE"/>
		<reference ref_id="CVE-2016-2115" ref_url="https://www.suse.com/security/cve/CVE-2016-2115/" source="CVE"/>
		<reference ref_id="CVE-2016-2118" ref_url="https://www.suse.com/security/cve/CVE-2016-2118/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002001.html" source="SUSE-SU"/>
		<description>
samba was updated to fix seven security issues.

These security issues were fixed:
- CVE-2015-5370: DCERPC server and client were vulnerable to DOS and MITM attacks (bsc#936862).
- CVE-2016-2110: A man-in-the-middle could have downgraded NTLMSSP authentication (bsc#973031).
- CVE-2016-2111: Domain controller netlogon member computer could have been spoofed (bsc#973032).
- CVE-2016-2112: LDAP conenctions were vulnerable to downgrade and MITM attack (bsc#973033).
- CVE-2016-2113: TLS certificate validation were missing (bsc#973034).
- CVE-2016-2115: Named pipe IPC were vulnerable to MITM attacks (bsc#973036).
- CVE-2016-2118: 'Badlock' DCERPC impersonation of authenticated account were possible (bsc#971965).

These non-security issues were fixed:
- bsc#967017: Fix leaking memory in libsmbclient in cli_set_mntpoint function
- Getting and setting Windows ACLs on symlinks can change permissions on link
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-13"/>
	<updated date="2016-04-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/936862">SUSE bug 936862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967017">SUSE bug 967017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971965">SUSE bug 971965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973031">SUSE bug 973031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973032">SUSE bug 973032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973033">SUSE bug 973033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973034">SUSE bug 973034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973036">SUSE bug 973036</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5370/">CVE-2015-5370 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5370">CVE-2015-5370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2110/">CVE-2016-2110 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2110">CVE-2016-2110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2111/">CVE-2016-2111 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2111">CVE-2016-2111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2112/">CVE-2016-2112 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2112">CVE-2016-2112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2113/">CVE-2016-2113 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2113">CVE-2016-2113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2115/">CVE-2016-2115 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2115">CVE-2016-2115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2118/">CVE-2016-2118 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2118">CVE-2016-2118 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576914" comment="ldapsmb-1.34b-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576915" comment="libldb1-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576916" comment="libsmbclient0-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576917" comment="libsmbclient0-32bit-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576918" comment="libtalloc2-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576919" comment="libtalloc2-32bit-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576920" comment="libtdb1-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576921" comment="libtdb1-32bit-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576922" comment="libtevent0-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576923" comment="libtevent0-32bit-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576924" comment="libwbclient0-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576925" comment="libwbclient0-32bit-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576926" comment="samba-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576927" comment="samba-32bit-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576928" comment="samba-client-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576929" comment="samba-client-32bit-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576930" comment="samba-doc-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576931" comment="samba-krb-printing-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576932" comment="samba-winbind-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576933" comment="samba-winbind-32bit-3.6.3-52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218149" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1003731" ref_url="https://bugzilla.suse.com/1003731" source="BUGZILLA"/>
		<reference ref_id="1009711" ref_url="https://bugzilla.suse.com/1009711" source="BUGZILLA"/>
		<reference ref_id="1014441" ref_url="https://bugzilla.suse.com/1014441" source="BUGZILLA"/>
		<reference ref_id="1014442" ref_url="https://bugzilla.suse.com/1014442" source="BUGZILLA"/>
		<reference ref_id="975131" ref_url="https://bugzilla.suse.com/975131" source="BUGZILLA"/>
		<reference ref_id="978898" ref_url="https://bugzilla.suse.com/978898" source="BUGZILLA"/>
		<reference ref_id="993692" ref_url="https://bugzilla.suse.com/993692" source="BUGZILLA"/>
		<reference ref_id="997833" ref_url="https://bugzilla.suse.com/997833" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2125" ref_url="https://www.suse.com/security/cve/CVE-2016-2125/" source="CVE"/>
		<reference ref_id="CVE-2016-2126" ref_url="https://www.suse.com/security/cve/CVE-2016-2126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002536.html" source="SUSE-SU"/>
		<description>

This update for samba provides the following fixes:

Security issues fixed:

- CVE-2016-2125: Don't send delegated credentials to all servers. (bsc#1014441)
- CVE-2016-2126: Prevent denial of service due to a client triggered crash in the winbindd
  parent process. (bsc#1014442)

Non security issues fixed:

- Allow SESSION KEY setup without signing. (bsc#1009711)
- Fix crash bug in tevent_queue_immediate_trigger(). (bsc#1003731)
- Don't fail when using default domain with user@domain.com format. (bsc#997833)
- Prevent core, make sure response-&gt;extra_data.data is always cleared out. (bsc#993692)
- Honor smb.conf socket options in winbind. (bsc#975131)
- Fix crash with net rpc join. (bsc#978898)
- Fix a regression verifying the security trailer. (bsc#978898)
- Fix updating netlogon credentials. (bsc#978898)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-29"/>
	<updated date="2016-12-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003731">SUSE bug 1003731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009711">SUSE bug 1009711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014441">SUSE bug 1014441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014442">SUSE bug 1014442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975131">SUSE bug 975131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978898">SUSE bug 978898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993692">SUSE bug 993692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997833">SUSE bug 997833</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2125/">CVE-2016-2125 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2125">CVE-2016-2125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2126/">CVE-2016-2126 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2126">CVE-2016-2126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576934" comment="ldapsmb-1.34b-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576935" comment="libldb1-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576936" comment="libsmbclient0-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576937" comment="libsmbclient0-32bit-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576938" comment="libtalloc2-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576939" comment="libtalloc2-32bit-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576940" comment="libtdb1-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576941" comment="libtdb1-32bit-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576942" comment="libtevent0-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576943" comment="libtevent0-32bit-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576944" comment="libwbclient0-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576945" comment="libwbclient0-32bit-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576946" comment="samba-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576947" comment="samba-32bit-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576948" comment="samba-client-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576949" comment="samba-client-32bit-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576950" comment="samba-doc-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576951" comment="samba-krb-printing-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576952" comment="samba-winbind-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576953" comment="samba-winbind-32bit-3.6.3-56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218150" version="1" class="patch">
	<metadata>
		<title>Recommended update for sblim-sfcb</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="744995" ref_url="https://bugzilla.suse.com/744995" source="BUGZILLA"/>
		<reference ref_id="767533" ref_url="https://bugzilla.suse.com/767533" source="BUGZILLA"/>
		<reference ref_id="770234" ref_url="https://bugzilla.suse.com/770234" source="BUGZILLA"/>
		<reference ref_id="770430" ref_url="https://bugzilla.suse.com/770430" source="BUGZILLA"/>
		<reference ref_id="782327" ref_url="https://bugzilla.suse.com/782327" source="BUGZILLA"/>
		<reference ref_id="820035" ref_url="https://bugzilla.suse.com/820035" source="BUGZILLA"/>
		<reference ref_id="830525" ref_url="https://bugzilla.suse.com/830525" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3381" ref_url="https://www.suse.com/security/cve/CVE-2012-3381/" source="CVE"/>
		<description>

This update for sblim-sfcb provides the following fixes:

    * Improve robustness of sblim-sfcb request header parsing, fixing
      errors when the XML header of posted request is too big.
    * Fix a resource leak leading to failure to operate when using the
      'SfcbLocal' client interface together with Openwsman.

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-13"/>
	<updated date="2013-08-13"/>
	<bugzilla href="https://bugzilla.suse.com/744995">SUSE bug 744995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767533">SUSE bug 767533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770234">SUSE bug 770234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770430">SUSE bug 770430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/782327">SUSE bug 782327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820035">SUSE bug 820035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/830525">SUSE bug 830525</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3381/">CVE-2012-3381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3381">CVE-2012-3381 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992525" comment="sblim-sfcb-1.3.11-0.23.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992525" comment="sblim-sfcb-1.3.11-0.23.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218151" version="1" class="patch">
	<metadata>
		<title>Security update for squid</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="677335" ref_url="https://bugzilla.suse.com/677335" source="BUGZILLA"/>
		<reference ref_id="794954" ref_url="https://bugzilla.suse.com/794954" source="BUGZILLA"/>
		<reference ref_id="796999" ref_url="https://bugzilla.suse.com/796999" source="BUGZILLA"/>
		<reference ref_id="829084" ref_url="https://bugzilla.suse.com/829084" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5643" ref_url="https://www.suse.com/security/cve/CVE-2012-5643/" source="CVE"/>
		<reference ref_id="CVE-2013-0188" ref_url="https://www.suse.com/security/cve/CVE-2013-0188/" source="CVE"/>
		<reference ref_id="CVE-2013-4115" ref_url="https://www.suse.com/security/cve/CVE-2013-4115/" source="CVE"/>
		<description>

This squid update fixes a buffer overflow issue when squid attempts to 
resolve an overly long hostname. This can be triggered with specially 
crafted http requests. (bnc#829084, CVE-2013-4115)

This update also includes a correction to the last change for logrotate. 
(bnc#677335)

Security Issue reference:

    * CVE-2013-4115
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4115&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-09"/>
	<updated date="2013-09-09"/>
	<bugzilla href="https://bugzilla.suse.com/677335">SUSE bug 677335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/794954">SUSE bug 794954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796999">SUSE bug 796999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829084">SUSE bug 829084</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5643/">CVE-2012-5643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5643">CVE-2012-5643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0188/">CVE-2013-0188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0188">CVE-2013-0188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4115/">CVE-2013-4115 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4115">CVE-2013-4115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576954" comment="squid-2.7.STABLE5-2.12.16.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576954" comment="squid-2.7.STABLE5-2.12.16.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218152" version="1" class="patch">
	<metadata>
		<title>Security update for squid3</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="677335" ref_url="https://bugzilla.suse.com/677335" source="BUGZILLA"/>
		<reference ref_id="794954" ref_url="https://bugzilla.suse.com/794954" source="BUGZILLA"/>
		<reference ref_id="796999" ref_url="https://bugzilla.suse.com/796999" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5643" ref_url="https://www.suse.com/security/cve/CVE-2012-5643/" source="CVE"/>
		<reference ref_id="CVE-2013-0188" ref_url="https://www.suse.com/security/cve/CVE-2013-0188/" source="CVE"/>
		<description>

A denial of service problem in Squid3 initiated via invalid Content-Length 
headers and memory leaks has been fixed. (CVE-2012-5643,CVE-2013-0189, 
SQUID-2012:1)

Also a logrotate permission issue has been fixed.

Security Issue references:

    * CVE-2012-5643
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5643&gt;
    * CVE-2013-0188
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0188&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-02-12"/>
	<updated date="2013-02-12"/>
	<bugzilla href="https://bugzilla.suse.com/677335">SUSE bug 677335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/794954">SUSE bug 794954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796999">SUSE bug 796999</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5643/">CVE-2012-5643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5643">CVE-2012-5643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0188/">CVE-2013-0188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0188">CVE-2013-0188 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576955" comment="squid3-3.1.12-8.12.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576955" comment="squid3-3.1.12-8.12.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218153" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="779038" ref_url="https://bugzilla.suse.com/779038" source="BUGZILLA"/>
		<reference ref_id="815236" ref_url="https://bugzilla.suse.com/815236" source="BUGZILLA"/>
		<reference ref_id="833278" ref_url="https://bugzilla.suse.com/833278" source="BUGZILLA"/>
		<reference ref_id="840826" ref_url="https://bugzilla.suse.com/840826" source="BUGZILLA"/>
		<reference ref_id="847506" ref_url="https://bugzilla.suse.com/847506" source="BUGZILLA"/>
		<reference ref_id="870572" ref_url="https://bugzilla.suse.com/870572" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2944" ref_url="https://www.suse.com/security/cve/CVE-2013-2944/" source="CVE"/>
		<reference ref_id="CVE-2013-5018" ref_url="https://www.suse.com/security/cve/CVE-2013-5018/" source="CVE"/>
		<reference ref_id="CVE-2014-2338" ref_url="https://www.suse.com/security/cve/CVE-2014-2338/" source="CVE"/>
		<description>

This strongswan update fixes security issues and bugs:

    * CVE-2013-5018: Specially crafted XAuth usernames and EAP identities
      can cause a crash in strongswan.
    * CVE-2013-6075: A crafted ID packet can be used by remote attackers to
      crash the server or potentially gain authentication privileges under
      certain circumstances.

Also a bug with route recursion limits was fixed:

    * Charon SEGFAULT when left=%any / recursion limit. (bnc#840826)

Security Issues:

    * CVE-2013-5018
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5018&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-01"/>
	<updated date="2013-11-01"/>
	<bugzilla href="https://bugzilla.suse.com/779038">SUSE bug 779038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815236">SUSE bug 815236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833278">SUSE bug 833278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840826">SUSE bug 840826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847506">SUSE bug 847506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870572">SUSE bug 870572</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2944/">CVE-2013-2944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2944">CVE-2013-2944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5018/">CVE-2013-5018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5018">CVE-2013-5018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2338/">CVE-2014-2338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2338">CVE-2014-2338 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576956" comment="strongswan-4.4.0-6.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576957" comment="strongswan-doc-4.4.0-6.21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576956" comment="strongswan-4.4.0-6.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576957" comment="strongswan-doc-4.4.0-6.21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576956" comment="strongswan-4.4.0-6.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576957" comment="strongswan-doc-4.4.0-6.21.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218154" version="1" class="patch">
	<metadata>
		<title>Security update for stunnel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="775262" ref_url="https://bugzilla.suse.com/775262" source="BUGZILLA"/>
		<reference ref_id="776756" ref_url="https://bugzilla.suse.com/776756" source="BUGZILLA"/>
		<reference ref_id="807450" ref_url="https://bugzilla.suse.com/807450" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1762" ref_url="https://www.suse.com/security/cve/CVE-2013-1762/" source="CVE"/>
		<description>

This update for stunnel fixes a buffer overflow vulnerability caused by 
incorrect integer conversion in the NTLM authentication of the CONNECT 
protocol negotiation (CVE-2013-1762).

Security Issue reference:

    * CVE-2013-1762
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1762&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-05"/>
	<updated date="2013-03-05"/>
	<bugzilla href="https://bugzilla.suse.com/775262">SUSE bug 775262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776756">SUSE bug 776756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807450">SUSE bug 807450</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1762/">CVE-2013-1762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1762">CVE-2013-1762 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576958" comment="stunnel-4.36-0.12.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576958" comment="stunnel-4.36-0.12.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218155" version="1" class="patch">
	<metadata>
		<title>Security update for sudo</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="806919" ref_url="https://bugzilla.suse.com/806919" source="BUGZILLA"/>
		<reference ref_id="806921" ref_url="https://bugzilla.suse.com/806921" source="BUGZILLA"/>
		<reference ref_id="817349" ref_url="https://bugzilla.suse.com/817349" source="BUGZILLA"/>
		<reference ref_id="817350" ref_url="https://bugzilla.suse.com/817350" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1775" ref_url="https://www.suse.com/security/cve/CVE-2013-1775/" source="CVE"/>
		<reference ref_id="CVE-2013-1776" ref_url="https://www.suse.com/security/cve/CVE-2013-1776/" source="CVE"/>
		<reference ref_id="CVE-2013-2776" ref_url="https://www.suse.com/security/cve/CVE-2013-2776/" source="CVE"/>
		<reference ref_id="CVE-2013-2777" ref_url="https://www.suse.com/security/cve/CVE-2013-2777/" source="CVE"/>
		<description>

This update fixes the following security issues which allowed to bypass the 
sudo authentication: CVE-2013-1775, CVE-2013-1776, CVE-2013-2776 and 
CVE-2013-2777.

Security Issue references:

    * CVE-2013-1775
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1775&gt;
    * CVE-2013-1776
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1776&gt;
    * CVE-2013-2776
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2776&gt;
    * CVE-2013-2777
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2777&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-04-30"/>
	<updated date="2013-04-30"/>
	<bugzilla href="https://bugzilla.suse.com/806919">SUSE bug 806919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806921">SUSE bug 806921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817349">SUSE bug 817349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817350">SUSE bug 817350</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1775/">CVE-2013-1775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1775">CVE-2013-1775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1776/">CVE-2013-1776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1776">CVE-2013-1776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2776/">CVE-2013-2776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2776">CVE-2013-2776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2777/">CVE-2013-2777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2777">CVE-2013-2777 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576959" comment="sudo-1.7.6p2-0.2.12.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576959" comment="sudo-1.7.6p2-0.2.12.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218156" version="1" class="patch">
	<metadata>
		<title>Security update for systemtap</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="748564" ref_url="https://bugzilla.suse.com/748564" source="BUGZILLA"/>
		<reference ref_id="796574" ref_url="https://bugzilla.suse.com/796574" source="BUGZILLA"/>
		<reference ref_id="800335" ref_url="https://bugzilla.suse.com/800335" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0875" ref_url="https://www.suse.com/security/cve/CVE-2012-0875/" source="CVE"/>
		<description>

This collective update for systemtap provides the following fixes:

    * Change how systemtap looks for tracepoint header files. (bnc#796574)
    * Systemtap manually loads libebl backends. Add libebl1 dependency.
      (bnc#800335)
    * Fix kernel panic when processing malformed DWARF unwind data.
      (bnc#748564, CVE-2012-0875)

Security Issue reference:

    * CVE-2012-0875
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0875&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-04"/>
	<updated date="2013-03-04"/>
	<bugzilla href="https://bugzilla.suse.com/748564">SUSE bug 748564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796574">SUSE bug 796574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800335">SUSE bug 800335</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0875/">CVE-2012-0875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0875">CVE-2012-0875 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576960" comment="systemtap-1.5-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576961" comment="systemtap-server-1.5-0.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576960" comment="systemtap-1.5-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576961" comment="systemtap-server-1.5-0.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218157" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="768772" ref_url="https://bugzilla.suse.com/768772" source="BUGZILLA"/>
		<reference ref_id="789406" ref_url="https://bugzilla.suse.com/789406" source="BUGZILLA"/>
		<reference ref_id="791423" ref_url="https://bugzilla.suse.com/791423" source="BUGZILLA"/>
		<reference ref_id="791424" ref_url="https://bugzilla.suse.com/791424" source="BUGZILLA"/>
		<reference ref_id="791426" ref_url="https://bugzilla.suse.com/791426" source="BUGZILLA"/>
		<reference ref_id="791679" ref_url="https://bugzilla.suse.com/791679" source="BUGZILLA"/>
		<reference ref_id="793391" ref_url="https://bugzilla.suse.com/793391" source="BUGZILLA"/>
		<reference ref_id="793394" ref_url="https://bugzilla.suse.com/793394" source="BUGZILLA"/>
		<reference ref_id="794548" ref_url="https://bugzilla.suse.com/794548" source="BUGZILLA"/>
		<reference ref_id="804992" ref_url="https://bugzilla.suse.com/804992" source="BUGZILLA"/>
		<reference ref_id="818948" ref_url="https://bugzilla.suse.com/818948" source="BUGZILLA"/>
		<reference ref_id="822177" ref_url="https://bugzilla.suse.com/822177" source="BUGZILLA"/>
		<reference ref_id="831119" ref_url="https://bugzilla.suse.com/831119" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0022" ref_url="https://www.suse.com/security/cve/CVE-2012-0022/" source="CVE"/>
		<reference ref_id="CVE-2012-2733" ref_url="https://www.suse.com/security/cve/CVE-2012-2733/" source="CVE"/>
		<reference ref_id="CVE-2012-3544" ref_url="https://www.suse.com/security/cve/CVE-2012-3544/" source="CVE"/>
		<reference ref_id="CVE-2012-3546" ref_url="https://www.suse.com/security/cve/CVE-2012-3546/" source="CVE"/>
		<reference ref_id="CVE-2012-4431" ref_url="https://www.suse.com/security/cve/CVE-2012-4431/" source="CVE"/>
		<reference ref_id="CVE-2012-4534" ref_url="https://www.suse.com/security/cve/CVE-2012-4534/" source="CVE"/>
		<reference ref_id="CVE-2012-5568" ref_url="https://www.suse.com/security/cve/CVE-2012-5568/" source="CVE"/>
		<reference ref_id="CVE-2012-5885" ref_url="https://www.suse.com/security/cve/CVE-2012-5885/" source="CVE"/>
		<reference ref_id="CVE-2012-5886" ref_url="https://www.suse.com/security/cve/CVE-2012-5886/" source="CVE"/>
		<reference ref_id="CVE-2012-5887" ref_url="https://www.suse.com/security/cve/CVE-2012-5887/" source="CVE"/>
		<reference ref_id="CVE-2013-1976" ref_url="https://www.suse.com/security/cve/CVE-2013-1976/" source="CVE"/>
		<description>

This update of tomcat6 fixes:

    * apache-tomcat-CVE-2012-3544.patch (bnc#831119)
    * use chown --no-dereference to prevent symlink attacks on log
      (bnc#822177#c7/prevents CVE-2013-1976)
    * Fix tomcat init scripts generating malformed classpath (
      http://youtrack.jetbrains.com/issue/JT-18545
      &lt;http://youtrack.jetbrains.com/issue/JT-18545&gt; ) bnc#804992 (patch
      from m407)
    * fix a typo in initscript (bnc#768772 )
    * copy all shell scripts (bnc#818948)

Security Issue references:

    * CVE-2012-3544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3544&gt;
    * CVE-2013-1976
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1976&gt;
    * CVE-2012-0022
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0022&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-02"/>
	<updated date="2013-08-02"/>
	<bugzilla href="https://bugzilla.suse.com/768772">SUSE bug 768772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789406">SUSE bug 789406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791423">SUSE bug 791423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791424">SUSE bug 791424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791426">SUSE bug 791426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791679">SUSE bug 791679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/793391">SUSE bug 793391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/793394">SUSE bug 793394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/794548">SUSE bug 794548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804992">SUSE bug 804992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818948">SUSE bug 818948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822177">SUSE bug 822177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831119">SUSE bug 831119</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0022/">CVE-2012-0022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0022">CVE-2012-0022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2733/">CVE-2012-2733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2733">CVE-2012-2733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3544/">CVE-2012-3544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3544">CVE-2012-3544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3546/">CVE-2012-3546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3546">CVE-2012-3546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4431/">CVE-2012-4431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4431">CVE-2012-4431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4534/">CVE-2012-4534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4534">CVE-2012-4534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5568/">CVE-2012-5568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5568">CVE-2012-5568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5885/">CVE-2012-5885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5885">CVE-2012-5885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5886/">CVE-2012-5886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5886">CVE-2012-5886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5887/">CVE-2012-5887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5887">CVE-2012-5887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1976/">CVE-2013-1976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1976">CVE-2013-1976 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576962" comment="tomcat6-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576963" comment="tomcat6-admin-webapps-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576964" comment="tomcat6-docs-webapp-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576965" comment="tomcat6-javadoc-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576966" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576967" comment="tomcat6-lib-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576968" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576969" comment="tomcat6-webapps-6.0.18-20.35.42.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576962" comment="tomcat6-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576963" comment="tomcat6-admin-webapps-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576964" comment="tomcat6-docs-webapp-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576965" comment="tomcat6-javadoc-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576966" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576967" comment="tomcat6-lib-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576968" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576969" comment="tomcat6-webapps-6.0.18-20.35.42.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218158" version="1" class="patch">
	<metadata>
		<title>Security update for vino</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="843174" ref_url="https://bugzilla.suse.com/843174" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5745" ref_url="https://www.suse.com/security/cve/CVE-2013-5745/" source="CVE"/>
		<description>

vino has been updated to fix a remote denial of service problem where 
remote attackers could have caused a infinite loop in vino (CPU 
consumption). (CVE-2013-5745)

Security Issue reference:

    * CVE-2013-5745
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5745&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-17"/>
	<updated date="2013-10-17"/>
	<bugzilla href="https://bugzilla.suse.com/843174">SUSE bug 843174</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5745/">CVE-2013-5745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5745">CVE-2013-5745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576970" comment="vino-2.28.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576971" comment="vino-lang-2.28.1-2.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576970" comment="vino-2.28.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576971" comment="vino-lang-2.28.1-2.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218159" version="1" class="patch">
	<metadata>
		<title>Recommended update for vm-install</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="779280" ref_url="https://bugzilla.suse.com/779280" source="BUGZILLA"/>
		<reference ref_id="779494" ref_url="https://bugzilla.suse.com/779494" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3497" ref_url="https://www.suse.com/security/cve/CVE-2012-3497/" source="CVE"/>
		<reference ref_id="CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411/" source="CVE"/>
		<reference ref_id="CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535/" source="CVE"/>
		<reference ref_id="CVE-2012-4536" ref_url="https://www.suse.com/security/cve/CVE-2012-4536/" source="CVE"/>
		<reference ref_id="CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537/" source="CVE"/>
		<reference ref_id="CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538/" source="CVE"/>
		<reference ref_id="CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544/" source="CVE"/>
		<description>

vm-install received various bugfixes:

    * bnc#779494 - SM wont install on KVM/Virt-Manager
    * bnc#779280 - vm-install doesn't honour / correctly document disk
    * Changed documentation link to suse.com.

Security Issue references:

    * CVE-2012-4539
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539&gt;
    * CVE-2012-3497
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3497&gt;
    * CVE-2012-4411
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4411&gt;
    * CVE-2012-4535
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4535&gt;
    * CVE-2012-4537
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4537&gt;
    * CVE-2012-4536
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4536&gt;
    * CVE-2012-4538
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4538&gt;
    * CVE-2012-4539
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539&gt;
    * CVE-2012-4544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4544&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-21"/>
	<updated date="2012-11-21"/>
	<bugzilla href="https://bugzilla.suse.com/779280">SUSE bug 779280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779494">SUSE bug 779494</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3497/">CVE-2012-3497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3497">CVE-2012-3497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4411">CVE-2012-4411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4535">CVE-2012-4535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4536/">CVE-2012-4536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4536">CVE-2012-4536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4537">CVE-2012-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4538">CVE-2012-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4539">CVE-2012-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4544">CVE-2012-4544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589917" comment="vm-install-0.5.14-0.5.7 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589917" comment="vm-install-0.5.14-0.5.7 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218160" version="1" class="patch">
	<metadata>
		<title>Security update for wget</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="885069" ref_url="https://bugzilla.suse.com/885069" source="BUGZILLA"/>
		<reference ref_id="901276" ref_url="https://bugzilla.suse.com/901276" source="BUGZILLA"/>
		<reference ref_id="902709" ref_url="https://bugzilla.suse.com/902709" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4877" ref_url="https://www.suse.com/security/cve/CVE-2014-4877/" source="CVE"/>
		<description>

wget was updated to fix one security issue and two non-security issues:

    * FTP symbolic link arbitrary filesystem access (CVE-2014-4877).
    * Fix displaying of download time (bnc#901276).
    * Fix 0 size FTP downloads after failure (bnc#885069).

Security Issues:

    * CVE-2014-4877
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-05"/>
	<updated date="2014-11-05"/>
	<bugzilla href="https://bugzilla.suse.com/885069">SUSE bug 885069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901276">SUSE bug 901276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902709">SUSE bug 902709</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4877/">CVE-2014-4877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4877">CVE-2014-4877 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575349" comment="wget-1.11.4-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218161" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="772738" ref_url="https://bugzilla.suse.com/772738" source="BUGZILLA"/>
		<reference ref_id="776083" ref_url="https://bugzilla.suse.com/776083" source="BUGZILLA"/>
		<reference ref_id="792005" ref_url="https://bugzilla.suse.com/792005" source="BUGZILLA"/>
		<reference ref_id="801131" ref_url="https://bugzilla.suse.com/801131" source="BUGZILLA"/>
		<reference ref_id="807942" ref_url="https://bugzilla.suse.com/807942" source="BUGZILLA"/>
		<reference ref_id="813217" ref_url="https://bugzilla.suse.com/813217" source="BUGZILLA"/>
		<reference ref_id="816517" ref_url="https://bugzilla.suse.com/816517" source="BUGZILLA"/>
		<reference ref_id="816887" ref_url="https://bugzilla.suse.com/816887" source="BUGZILLA"/>
		<reference ref_id="820973" ref_url="https://bugzilla.suse.com/820973" source="BUGZILLA"/>
		<reference ref_id="824900" ref_url="https://bugzilla.suse.com/824900" source="BUGZILLA"/>
		<reference ref_id="831718" ref_url="https://bugzilla.suse.com/831718" source="BUGZILLA"/>
		<reference ref_id="839607" ref_url="https://bugzilla.suse.com/839607" source="BUGZILLA"/>
		<reference ref_id="848738" ref_url="https://bugzilla.suse.com/848738" source="BUGZILLA"/>
		<reference ref_id="855980" ref_url="https://bugzilla.suse.com/855980" source="BUGZILLA"/>
		<reference ref_id="856496" ref_url="https://bugzilla.suse.com/856496" source="BUGZILLA"/>
		<reference ref_id="856498" ref_url="https://bugzilla.suse.com/856498" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4048" ref_url="https://www.suse.com/security/cve/CVE-2012-4048/" source="CVE"/>
		<reference ref_id="CVE-2012-4049" ref_url="https://www.suse.com/security/cve/CVE-2012-4049/" source="CVE"/>
		<reference ref_id="CVE-2012-4285" ref_url="https://www.suse.com/security/cve/CVE-2012-4285/" source="CVE"/>
		<reference ref_id="CVE-2012-4288" ref_url="https://www.suse.com/security/cve/CVE-2012-4288/" source="CVE"/>
		<reference ref_id="CVE-2012-4289" ref_url="https://www.suse.com/security/cve/CVE-2012-4289/" source="CVE"/>
		<reference ref_id="CVE-2012-4290" ref_url="https://www.suse.com/security/cve/CVE-2012-4290/" source="CVE"/>
		<reference ref_id="CVE-2012-4291" ref_url="https://www.suse.com/security/cve/CVE-2012-4291/" source="CVE"/>
		<reference ref_id="CVE-2012-4292" ref_url="https://www.suse.com/security/cve/CVE-2012-4292/" source="CVE"/>
		<reference ref_id="CVE-2012-4293" ref_url="https://www.suse.com/security/cve/CVE-2012-4293/" source="CVE"/>
		<reference ref_id="CVE-2012-4296" ref_url="https://www.suse.com/security/cve/CVE-2012-4296/" source="CVE"/>
		<reference ref_id="CVE-2012-5592" ref_url="https://www.suse.com/security/cve/CVE-2012-5592/" source="CVE"/>
		<reference ref_id="CVE-2012-5593" ref_url="https://www.suse.com/security/cve/CVE-2012-5593/" source="CVE"/>
		<reference ref_id="CVE-2012-5594" ref_url="https://www.suse.com/security/cve/CVE-2012-5594/" source="CVE"/>
		<reference ref_id="CVE-2012-5595" ref_url="https://www.suse.com/security/cve/CVE-2012-5595/" source="CVE"/>
		<reference ref_id="CVE-2012-5596" ref_url="https://www.suse.com/security/cve/CVE-2012-5596/" source="CVE"/>
		<reference ref_id="CVE-2012-5597" ref_url="https://www.suse.com/security/cve/CVE-2012-5597/" source="CVE"/>
		<reference ref_id="CVE-2012-5598" ref_url="https://www.suse.com/security/cve/CVE-2012-5598/" source="CVE"/>
		<reference ref_id="CVE-2012-5599" ref_url="https://www.suse.com/security/cve/CVE-2012-5599/" source="CVE"/>
		<reference ref_id="CVE-2012-5600" ref_url="https://www.suse.com/security/cve/CVE-2012-5600/" source="CVE"/>
		<reference ref_id="CVE-2012-5601" ref_url="https://www.suse.com/security/cve/CVE-2012-5601/" source="CVE"/>
		<reference ref_id="CVE-2012-5602" ref_url="https://www.suse.com/security/cve/CVE-2012-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-1572" ref_url="https://www.suse.com/security/cve/CVE-2013-1572/" source="CVE"/>
		<reference ref_id="CVE-2013-1573" ref_url="https://www.suse.com/security/cve/CVE-2013-1573/" source="CVE"/>
		<reference ref_id="CVE-2013-1574" ref_url="https://www.suse.com/security/cve/CVE-2013-1574/" source="CVE"/>
		<reference ref_id="CVE-2013-1575" ref_url="https://www.suse.com/security/cve/CVE-2013-1575/" source="CVE"/>
		<reference ref_id="CVE-2013-1576" ref_url="https://www.suse.com/security/cve/CVE-2013-1576/" source="CVE"/>
		<reference ref_id="CVE-2013-1577" ref_url="https://www.suse.com/security/cve/CVE-2013-1577/" source="CVE"/>
		<reference ref_id="CVE-2013-1578" ref_url="https://www.suse.com/security/cve/CVE-2013-1578/" source="CVE"/>
		<reference ref_id="CVE-2013-1579" ref_url="https://www.suse.com/security/cve/CVE-2013-1579/" source="CVE"/>
		<reference ref_id="CVE-2013-1580" ref_url="https://www.suse.com/security/cve/CVE-2013-1580/" source="CVE"/>
		<reference ref_id="CVE-2013-1581" ref_url="https://www.suse.com/security/cve/CVE-2013-1581/" source="CVE"/>
		<reference ref_id="CVE-2013-1582" ref_url="https://www.suse.com/security/cve/CVE-2013-1582/" source="CVE"/>
		<reference ref_id="CVE-2013-1583" ref_url="https://www.suse.com/security/cve/CVE-2013-1583/" source="CVE"/>
		<reference ref_id="CVE-2013-1584" ref_url="https://www.suse.com/security/cve/CVE-2013-1584/" source="CVE"/>
		<reference ref_id="CVE-2013-1585" ref_url="https://www.suse.com/security/cve/CVE-2013-1585/" source="CVE"/>
		<reference ref_id="CVE-2013-1586" ref_url="https://www.suse.com/security/cve/CVE-2013-1586/" source="CVE"/>
		<reference ref_id="CVE-2013-1587" ref_url="https://www.suse.com/security/cve/CVE-2013-1587/" source="CVE"/>
		<reference ref_id="CVE-2013-1588" ref_url="https://www.suse.com/security/cve/CVE-2013-1588/" source="CVE"/>
		<reference ref_id="CVE-2013-1589" ref_url="https://www.suse.com/security/cve/CVE-2013-1589/" source="CVE"/>
		<reference ref_id="CVE-2013-1590" ref_url="https://www.suse.com/security/cve/CVE-2013-1590/" source="CVE"/>
		<reference ref_id="CVE-2013-2475" ref_url="https://www.suse.com/security/cve/CVE-2013-2475/" source="CVE"/>
		<reference ref_id="CVE-2013-2476" ref_url="https://www.suse.com/security/cve/CVE-2013-2476/" source="CVE"/>
		<reference ref_id="CVE-2013-2477" ref_url="https://www.suse.com/security/cve/CVE-2013-2477/" source="CVE"/>
		<reference ref_id="CVE-2013-2478" ref_url="https://www.suse.com/security/cve/CVE-2013-2478/" source="CVE"/>
		<reference ref_id="CVE-2013-2479" ref_url="https://www.suse.com/security/cve/CVE-2013-2479/" source="CVE"/>
		<reference ref_id="CVE-2013-2480" ref_url="https://www.suse.com/security/cve/CVE-2013-2480/" source="CVE"/>
		<reference ref_id="CVE-2013-2481" ref_url="https://www.suse.com/security/cve/CVE-2013-2481/" source="CVE"/>
		<reference ref_id="CVE-2013-2482" ref_url="https://www.suse.com/security/cve/CVE-2013-2482/" source="CVE"/>
		<reference ref_id="CVE-2013-2483" ref_url="https://www.suse.com/security/cve/CVE-2013-2483/" source="CVE"/>
		<reference ref_id="CVE-2013-2484" ref_url="https://www.suse.com/security/cve/CVE-2013-2484/" source="CVE"/>
		<reference ref_id="CVE-2013-2485" ref_url="https://www.suse.com/security/cve/CVE-2013-2485/" source="CVE"/>
		<reference ref_id="CVE-2013-2486" ref_url="https://www.suse.com/security/cve/CVE-2013-2486/" source="CVE"/>
		<reference ref_id="CVE-2013-2487" ref_url="https://www.suse.com/security/cve/CVE-2013-2487/" source="CVE"/>
		<reference ref_id="CVE-2013-2488" ref_url="https://www.suse.com/security/cve/CVE-2013-2488/" source="CVE"/>
		<reference ref_id="CVE-2013-3555" ref_url="https://www.suse.com/security/cve/CVE-2013-3555/" source="CVE"/>
		<reference ref_id="CVE-2013-3556" ref_url="https://www.suse.com/security/cve/CVE-2013-3556/" source="CVE"/>
		<reference ref_id="CVE-2013-3557" ref_url="https://www.suse.com/security/cve/CVE-2013-3557/" source="CVE"/>
		<reference ref_id="CVE-2013-3558" ref_url="https://www.suse.com/security/cve/CVE-2013-3558/" source="CVE"/>
		<reference ref_id="CVE-2013-3559" ref_url="https://www.suse.com/security/cve/CVE-2013-3559/" source="CVE"/>
		<reference ref_id="CVE-2013-3560" ref_url="https://www.suse.com/security/cve/CVE-2013-3560/" source="CVE"/>
		<reference ref_id="CVE-2013-3561" ref_url="https://www.suse.com/security/cve/CVE-2013-3561/" source="CVE"/>
		<reference ref_id="CVE-2013-3562" ref_url="https://www.suse.com/security/cve/CVE-2013-3562/" source="CVE"/>
		<reference ref_id="CVE-2013-4074" ref_url="https://www.suse.com/security/cve/CVE-2013-4074/" source="CVE"/>
		<reference ref_id="CVE-2013-4075" ref_url="https://www.suse.com/security/cve/CVE-2013-4075/" source="CVE"/>
		<reference ref_id="CVE-2013-4076" ref_url="https://www.suse.com/security/cve/CVE-2013-4076/" source="CVE"/>
		<reference ref_id="CVE-2013-4077" ref_url="https://www.suse.com/security/cve/CVE-2013-4077/" source="CVE"/>
		<reference ref_id="CVE-2013-4078" ref_url="https://www.suse.com/security/cve/CVE-2013-4078/" source="CVE"/>
		<reference ref_id="CVE-2013-4079" ref_url="https://www.suse.com/security/cve/CVE-2013-4079/" source="CVE"/>
		<reference ref_id="CVE-2013-4080" ref_url="https://www.suse.com/security/cve/CVE-2013-4080/" source="CVE"/>
		<reference ref_id="CVE-2013-4081" ref_url="https://www.suse.com/security/cve/CVE-2013-4081/" source="CVE"/>
		<reference ref_id="CVE-2013-4082" ref_url="https://www.suse.com/security/cve/CVE-2013-4082/" source="CVE"/>
		<reference ref_id="CVE-2013-4083" ref_url="https://www.suse.com/security/cve/CVE-2013-4083/" source="CVE"/>
		<reference ref_id="CVE-2013-4929" ref_url="https://www.suse.com/security/cve/CVE-2013-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-4930" ref_url="https://www.suse.com/security/cve/CVE-2013-4930/" source="CVE"/>
		<reference ref_id="CVE-2013-4931" ref_url="https://www.suse.com/security/cve/CVE-2013-4931/" source="CVE"/>
		<reference ref_id="CVE-2013-4932" ref_url="https://www.suse.com/security/cve/CVE-2013-4932/" source="CVE"/>
		<reference ref_id="CVE-2013-4933" ref_url="https://www.suse.com/security/cve/CVE-2013-4933/" source="CVE"/>
		<reference ref_id="CVE-2013-4934" ref_url="https://www.suse.com/security/cve/CVE-2013-4934/" source="CVE"/>
		<reference ref_id="CVE-2013-4935" ref_url="https://www.suse.com/security/cve/CVE-2013-4935/" source="CVE"/>
		<reference ref_id="CVE-2013-6336" ref_url="https://www.suse.com/security/cve/CVE-2013-6336/" source="CVE"/>
		<reference ref_id="CVE-2013-6337" ref_url="https://www.suse.com/security/cve/CVE-2013-6337/" source="CVE"/>
		<reference ref_id="CVE-2013-6338" ref_url="https://www.suse.com/security/cve/CVE-2013-6338/" source="CVE"/>
		<reference ref_id="CVE-2013-6339" ref_url="https://www.suse.com/security/cve/CVE-2013-6339/" source="CVE"/>
		<reference ref_id="CVE-2013-6340" ref_url="https://www.suse.com/security/cve/CVE-2013-6340/" source="CVE"/>
		<reference ref_id="CVE-2013-7112" ref_url="https://www.suse.com/security/cve/CVE-2013-7112/" source="CVE"/>
		<reference ref_id="CVE-2013-7113" ref_url="https://www.suse.com/security/cve/CVE-2013-7113/" source="CVE"/>
		<reference ref_id="CVE-2013-7114" ref_url="https://www.suse.com/security/cve/CVE-2013-7114/" source="CVE"/>
		<description>

wireshark was updated to security update version 1.8.12, fixing bugs and 
security issues.

    * The SIP dissector could go into an infinite loop.
      wnpa-sec-2013-66 CVE-2013-7112
    * The NTLMSSP v2 dissector could crash. Discovered by Garming Sam.
      wnpa-sec-2013-68 CVE-2013-7114

Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-1.8.12.html
&lt;https://www.wireshark.org/docs/relnotes/wireshark-1.8.12.html&gt;

Security Issue references:

    * CVE-2013-7112
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112&gt;
    * CVE-2013-7113
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7113&gt;
    * CVE-2013-7114
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-27"/>
	<updated date="2013-12-27"/>
	<bugzilla href="https://bugzilla.suse.com/772738">SUSE bug 772738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813217">SUSE bug 813217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816517">SUSE bug 816517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816887">SUSE bug 816887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824900">SUSE bug 824900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839607">SUSE bug 839607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848738">SUSE bug 848738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855980">SUSE bug 855980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856496">SUSE bug 856496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856498">SUSE bug 856498</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4048/">CVE-2012-4048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4048">CVE-2012-4048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4049/">CVE-2012-4049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4049">CVE-2012-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4285/">CVE-2012-4285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4285">CVE-2012-4285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4288/">CVE-2012-4288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4288">CVE-2012-4288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4289/">CVE-2012-4289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4289">CVE-2012-4289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4290/">CVE-2012-4290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4290">CVE-2012-4290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4291/">CVE-2012-4291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4291">CVE-2012-4291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4292/">CVE-2012-4292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4292">CVE-2012-4292 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4293/">CVE-2012-4293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4293">CVE-2012-4293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4296/">CVE-2012-4296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4296">CVE-2012-4296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5592/">CVE-2012-5592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5592">CVE-2012-5592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5593/">CVE-2012-5593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5593">CVE-2012-5593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5594/">CVE-2012-5594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5594">CVE-2012-5594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5595/">CVE-2012-5595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5595">CVE-2012-5595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5596/">CVE-2012-5596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5596">CVE-2012-5596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5597/">CVE-2012-5597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5597">CVE-2012-5597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5598/">CVE-2012-5598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5598">CVE-2012-5598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5599/">CVE-2012-5599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5599">CVE-2012-5599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5600/">CVE-2012-5600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5600">CVE-2012-5600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5601/">CVE-2012-5601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5601">CVE-2012-5601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5602/">CVE-2012-5602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5602">CVE-2012-5602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1572/">CVE-2013-1572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1572">CVE-2013-1572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1573/">CVE-2013-1573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1573">CVE-2013-1573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1574/">CVE-2013-1574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1574">CVE-2013-1574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1575/">CVE-2013-1575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1575">CVE-2013-1575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1576/">CVE-2013-1576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1576">CVE-2013-1576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1577/">CVE-2013-1577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1577">CVE-2013-1577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1578/">CVE-2013-1578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1578">CVE-2013-1578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1579/">CVE-2013-1579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1579">CVE-2013-1579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1580/">CVE-2013-1580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1580">CVE-2013-1580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1581/">CVE-2013-1581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1581">CVE-2013-1581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1582/">CVE-2013-1582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1582">CVE-2013-1582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1583/">CVE-2013-1583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1583">CVE-2013-1583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1584/">CVE-2013-1584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1584">CVE-2013-1584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1585/">CVE-2013-1585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1585">CVE-2013-1585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1586/">CVE-2013-1586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1586">CVE-2013-1586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1587/">CVE-2013-1587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1587">CVE-2013-1587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1588/">CVE-2013-1588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1588">CVE-2013-1588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1589/">CVE-2013-1589 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1589">CVE-2013-1589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1590/">CVE-2013-1590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1590">CVE-2013-1590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2475/">CVE-2013-2475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2475">CVE-2013-2475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2476/">CVE-2013-2476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2476">CVE-2013-2476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2477/">CVE-2013-2477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2477">CVE-2013-2477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2478/">CVE-2013-2478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2478">CVE-2013-2478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2479/">CVE-2013-2479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2479">CVE-2013-2479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2480/">CVE-2013-2480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2480">CVE-2013-2480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2481/">CVE-2013-2481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2481">CVE-2013-2481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2482/">CVE-2013-2482 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2482">CVE-2013-2482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2483/">CVE-2013-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2483">CVE-2013-2483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2484/">CVE-2013-2484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2484">CVE-2013-2484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2485/">CVE-2013-2485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2485">CVE-2013-2485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2486/">CVE-2013-2486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2486">CVE-2013-2486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2487/">CVE-2013-2487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2487">CVE-2013-2487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2488/">CVE-2013-2488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2488">CVE-2013-2488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3555/">CVE-2013-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3555">CVE-2013-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3556/">CVE-2013-3556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3556">CVE-2013-3556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3557/">CVE-2013-3557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3557">CVE-2013-3557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3558/">CVE-2013-3558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3558">CVE-2013-3558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3559/">CVE-2013-3559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3559">CVE-2013-3559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3560/">CVE-2013-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3560">CVE-2013-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3561/">CVE-2013-3561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3561">CVE-2013-3561 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3562/">CVE-2013-3562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3562">CVE-2013-3562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4074/">CVE-2013-4074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4074">CVE-2013-4074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4075/">CVE-2013-4075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4075">CVE-2013-4075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4076/">CVE-2013-4076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4076">CVE-2013-4076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4077/">CVE-2013-4077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4077">CVE-2013-4077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4078/">CVE-2013-4078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4078">CVE-2013-4078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4079/">CVE-2013-4079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4079">CVE-2013-4079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4080/">CVE-2013-4080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4080">CVE-2013-4080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4081/">CVE-2013-4081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4081">CVE-2013-4081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4082/">CVE-2013-4082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4082">CVE-2013-4082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4083/">CVE-2013-4083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4083">CVE-2013-4083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4929/">CVE-2013-4929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4929">CVE-2013-4929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4930/">CVE-2013-4930 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4930">CVE-2013-4930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4931/">CVE-2013-4931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4931">CVE-2013-4931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4932/">CVE-2013-4932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4932">CVE-2013-4932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4933/">CVE-2013-4933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4933">CVE-2013-4933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4934/">CVE-2013-4934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4934">CVE-2013-4934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4935/">CVE-2013-4935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4935">CVE-2013-4935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6336/">CVE-2013-6336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6336">CVE-2013-6336 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6337/">CVE-2013-6337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6337">CVE-2013-6337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6338/">CVE-2013-6338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6338">CVE-2013-6338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6339/">CVE-2013-6339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6339">CVE-2013-6339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6340/">CVE-2013-6340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6340">CVE-2013-6340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7112/">CVE-2013-7112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7112">CVE-2013-7112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7113/">CVE-2013-7113 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7113">CVE-2013-7113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7114/">CVE-2013-7114 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7114">CVE-2013-7114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576972" comment="wireshark-1.8.12-0.2.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576972" comment="wireshark-1.8.12-0.2.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218162" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="777628" ref_url="https://bugzilla.suse.com/777628" source="BUGZILLA"/>
		<reference ref_id="789940" ref_url="https://bugzilla.suse.com/789940" source="BUGZILLA"/>
		<reference ref_id="789944" ref_url="https://bugzilla.suse.com/789944" source="BUGZILLA"/>
		<reference ref_id="789945" ref_url="https://bugzilla.suse.com/789945" source="BUGZILLA"/>
		<reference ref_id="789948" ref_url="https://bugzilla.suse.com/789948" source="BUGZILLA"/>
		<reference ref_id="789950" ref_url="https://bugzilla.suse.com/789950" source="BUGZILLA"/>
		<reference ref_id="789951" ref_url="https://bugzilla.suse.com/789951" source="BUGZILLA"/>
		<reference ref_id="789988" ref_url="https://bugzilla.suse.com/789988" source="BUGZILLA"/>
		<reference ref_id="792476" ref_url="https://bugzilla.suse.com/792476" source="BUGZILLA"/>
		<reference ref_id="793927" ref_url="https://bugzilla.suse.com/793927" source="BUGZILLA"/>
		<reference ref_id="794316" ref_url="https://bugzilla.suse.com/794316" source="BUGZILLA"/>
		<reference ref_id="797014" ref_url="https://bugzilla.suse.com/797014" source="BUGZILLA"/>
		<reference ref_id="797031" ref_url="https://bugzilla.suse.com/797031" source="BUGZILLA"/>
		<reference ref_id="797523" ref_url="https://bugzilla.suse.com/797523" source="BUGZILLA"/>
		<reference ref_id="798188" ref_url="https://bugzilla.suse.com/798188" source="BUGZILLA"/>
		<reference ref_id="799694" ref_url="https://bugzilla.suse.com/799694" source="BUGZILLA"/>
		<reference ref_id="800156" ref_url="https://bugzilla.suse.com/800156" source="BUGZILLA"/>
		<reference ref_id="800275" ref_url="https://bugzilla.suse.com/800275" source="BUGZILLA"/>
		<reference ref_id="802690" ref_url="https://bugzilla.suse.com/802690" source="BUGZILLA"/>
		<reference ref_id="805094" ref_url="https://bugzilla.suse.com/805094" source="BUGZILLA"/>
		<reference ref_id="806736" ref_url="https://bugzilla.suse.com/806736" source="BUGZILLA"/>
		<reference ref_id="910441" ref_url="https://bugzilla.suse.com/910441" source="BUGZILLA"/>
		<reference ref_id="927967" ref_url="https://bugzilla.suse.com/927967" source="BUGZILLA"/>
		<reference ref_id="929339" ref_url="https://bugzilla.suse.com/929339" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5510" ref_url="https://www.suse.com/security/cve/CVE-2012-5510/" source="CVE"/>
		<reference ref_id="CVE-2012-5511" ref_url="https://www.suse.com/security/cve/CVE-2012-5511/" source="CVE"/>
		<reference ref_id="CVE-2012-5512" ref_url="https://www.suse.com/security/cve/CVE-2012-5512/" source="CVE"/>
		<reference ref_id="CVE-2012-5513" ref_url="https://www.suse.com/security/cve/CVE-2012-5513/" source="CVE"/>
		<reference ref_id="CVE-2012-5514" ref_url="https://www.suse.com/security/cve/CVE-2012-5514/" source="CVE"/>
		<reference ref_id="CVE-2012-5515" ref_url="https://www.suse.com/security/cve/CVE-2012-5515/" source="CVE"/>
		<reference ref_id="CVE-2012-5634" ref_url="https://www.suse.com/security/cve/CVE-2012-5634/" source="CVE"/>
		<reference ref_id="CVE-2012-6075" ref_url="https://www.suse.com/security/cve/CVE-2012-6075/" source="CVE"/>
		<reference ref_id="CVE-2013-0153" ref_url="https://www.suse.com/security/cve/CVE-2013-0153/" source="CVE"/>
		<reference ref_id="CVE-2015-3340" ref_url="https://www.suse.com/security/cve/CVE-2015-3340/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001408.html" source="SUSE-SU"/>
		<description>

XEN has been updated to fix various bugs and security issues:

    * 

      CVE-2013-0153: (XSA 36) To avoid an erratum in early hardware, the
      Xen AMD IOMMU code by default choose to use a single interrupt
      remapping table for the whole system. This sharing implied that any
      guest with a passed through PCI device that is bus mastering capable
      can inject interrupts into other guests, including domain 0. This has
      been disabled for AMD chipsets not capable of it.

    * 

      CVE-2012-6075: qemu: The e1000 had overflows under some conditions,
      potentially corrupting memory.

    * 

      CVE-2013-0154: (XSA 37) Hypervisor crash due to incorrect ASSERT
      (debug build only)

    * 

      CVE-2012-5634: (XSA-33) A VT-d interrupt remapping source validation
      flaw was fixed.

Also the following bugs have been fixed:

    * bnc#805094 - xen hot plug attach/detach fails
    * bnc#802690 - domain locking can prevent a live migration from
      completing
    * bnc#797014 - no way to control live migrations
          o fix logic error in stdiostream_progress
          o restore logging in xc_save
          o add options to control migration tunables
    * bnc#806736: enabling xentrace crashes hypervisor
    * Upstream patches from Jan 26287-sched-credit-pick-idle.patch
      26501-VMX-simplify-CR0-update.patch
      26502-VMX-disable-SMEP-when-not-paging.patch
      26516-ACPI-parse-table-retval.patch (Replaces
      CVE-2013-0153-xsa36.patch) 26517-AMD-IOMMU-clear-irtes.patch
      (Replaces CVE-2013-0153-xsa36.patch)
      26518-AMD-IOMMU-disable-if-SATA-combined-mode.patch (Replaces
      CVE-2013-0153-xsa36.patch)
      26519-AMD-IOMMU-perdev-intremap-default.patch (Replaces
      CVE-2013-0153-xsa36.patch) 26526-pvdrv-no-devinit.patch
      26531-AMD-IOMMU-IVHD-special-missing.patch (Replaces
      CVE-2013-0153-xsa36.patch)
    * bnc#798188 - Add $network to xend initscript dependencies
    * bnc#799694 - Unable to dvd or cdrom-boot DomU after xen-tools update
      Fixed with update to Xen version 4.1.4
    * bnc#800156 - L3: HP iLo Generate NMI function not working in XEN
      kernel
    * Upstream patches from Jan 26404-x86-forward-both-NMI-kinds.patch
      26427-x86-AMD-enable-WC+.patch
    * bnc#793927 - Xen VMs with more than 2 disks randomly fail to start
    * Upstream patches from Jan 26332-x86-compat-show-guest-stack-mfn.patch
      26333-x86-get_page_type-assert.patch (Replaces
      CVE-2013-0154-xsa37.patch)
      26340-VT-d-intremap-verify-legacy-bridge.patch (Replaces
      CVE-2012-5634-xsa33.patch) 26370-libxc-x86-initial-mapping-fit.patch
    * Update to Xen 4.1.4 c/s 23432
    * Update xenpaging.guest-memusage.patch add rule for xenmem to avoid
      spurious build failures
    * Upstream patches from Jan 26179-PCI-find-next-cap.patch
      26183-x86-HPET-masking.patch 26188-x86-time-scale-asm.patch
      26200-IOMMU-debug-verbose.patch 26203-x86-HAP-dirty-vram-leak.patch
      26229-gnttab-version-switch.patch (Replaces
      CVE-2012-5510-xsa26.patch) 26230-x86-HVM-limit-batches.patch
      (Replaces CVE-2012-5511-xsa27.patch)
      26231-memory-exchange-checks.patch (Replaces
      CVE-2012-5513-xsa29.patch) 26232-x86-mark-PoD-error-path.patch
      (Replaces CVE-2012-5514-xsa30.patch) 26233-memop-order-checks.patch
      (Replaces CVE-2012-5515-xsa31.patch)
      26235-IOMMU-ATS-max-queue-depth.patch
      26272-x86-EFI-makefile-cflags-filter.patch
      26294-x86-AMD-Fam15-way-access-filter.patch CVE-2013-0154-xsa37.patch
    * Restore c/s 25751 in 23614-x86_64-EFI-boot.patch. Modify the EFI
      Makefile to do additional filtering.

Security Issue references:

    * CVE-2013-0153
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0153&gt;
    * CVE-2012-6075
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6075&gt;
    * CVE-2012-5634
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5634&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-13"/>
	<updated date="2013-03-13"/>
	<bugzilla href="https://bugzilla.suse.com/777628">SUSE bug 777628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789940">SUSE bug 789940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789944">SUSE bug 789944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789945">SUSE bug 789945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789948">SUSE bug 789948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789950">SUSE bug 789950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789951">SUSE bug 789951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789988">SUSE bug 789988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792476">SUSE bug 792476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/793927">SUSE bug 793927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/794316">SUSE bug 794316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797014">SUSE bug 797014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797031">SUSE bug 797031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797523">SUSE bug 797523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798188">SUSE bug 798188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799694">SUSE bug 799694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800156">SUSE bug 800156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800275">SUSE bug 800275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802690">SUSE bug 802690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/805094">SUSE bug 805094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806736">SUSE bug 806736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910441">SUSE bug 910441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927967">SUSE bug 927967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929339">SUSE bug 929339</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5510/">CVE-2012-5510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5510">CVE-2012-5510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5511/">CVE-2012-5511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5511">CVE-2012-5511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5512/">CVE-2012-5512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5512">CVE-2012-5512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5513/">CVE-2012-5513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5513">CVE-2012-5513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5514/">CVE-2012-5514 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5514">CVE-2012-5514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5515/">CVE-2012-5515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5515">CVE-2012-5515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5634/">CVE-2012-5634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5634">CVE-2012-5634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6075/">CVE-2012-6075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6075">CVE-2012-6075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0153/">CVE-2013-0153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0153">CVE-2013-0153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3340/">CVE-2015-3340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3340">CVE-2015-3340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3456">CVE-2015-3456 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566193" comment="xen-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576973" comment="xen-devel-4.1.6_08-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566194" comment="xen-doc-html-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566195" comment="xen-doc-pdf-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566196" comment="xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566197" comment="xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566198" comment="xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566199" comment="xen-libs-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566200" comment="xen-libs-32bit-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566201" comment="xen-tools-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566202" comment="xen-tools-domU-4.1.4_02-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566193" comment="xen-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576973" comment="xen-devel-4.1.6_08-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566194" comment="xen-doc-html-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566195" comment="xen-doc-pdf-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566196" comment="xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566197" comment="xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566198" comment="xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566199" comment="xen-libs-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566200" comment="xen-libs-32bit-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566201" comment="xen-tools-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566202" comment="xen-tools-domU-4.1.4_02-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566193" comment="xen-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576973" comment="xen-devel-4.1.6_08-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566194" comment="xen-doc-html-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566195" comment="xen-doc-pdf-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566196" comment="xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566197" comment="xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566198" comment="xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566199" comment="xen-libs-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566200" comment="xen-libs-32bit-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566201" comment="xen-tools-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566202" comment="xen-tools-domU-4.1.4_02-0.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218163" version="1" class="patch">
	<metadata>
		<title>Security update for xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="826717" ref_url="https://bugzilla.suse.com/826717" source="BUGZILLA"/>
		<reference ref_id="867910" ref_url="https://bugzilla.suse.com/867910" source="BUGZILLA"/>
		<reference ref_id="875668" ref_url="https://bugzilla.suse.com/875668" source="BUGZILLA"/>
		<reference ref_id="880751" ref_url="https://bugzilla.suse.com/880751" source="BUGZILLA"/>
		<reference ref_id="895798" ref_url="https://bugzilla.suse.com/895798" source="BUGZILLA"/>
		<reference ref_id="895799" ref_url="https://bugzilla.suse.com/895799" source="BUGZILLA"/>
		<reference ref_id="895802" ref_url="https://bugzilla.suse.com/895802" source="BUGZILLA"/>
		<reference ref_id="897657" ref_url="https://bugzilla.suse.com/897657" source="BUGZILLA"/>
		<reference ref_id="901317" ref_url="https://bugzilla.suse.com/901317" source="BUGZILLA"/>
		<reference ref_id="903850" ref_url="https://bugzilla.suse.com/903850" source="BUGZILLA"/>
		<reference ref_id="903967" ref_url="https://bugzilla.suse.com/903967" source="BUGZILLA"/>
		<reference ref_id="903970" ref_url="https://bugzilla.suse.com/903970" source="BUGZILLA"/>
		<reference ref_id="905465" ref_url="https://bugzilla.suse.com/905465" source="BUGZILLA"/>
		<reference ref_id="905467" ref_url="https://bugzilla.suse.com/905467" source="BUGZILLA"/>
		<reference ref_id="906439" ref_url="https://bugzilla.suse.com/906439" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-3495" ref_url="https://www.suse.com/security/cve/CVE-2013-3495/" source="CVE"/>
		<reference ref_id="CVE-2014-2599" ref_url="https://www.suse.com/security/cve/CVE-2014-2599/" source="CVE"/>
		<reference ref_id="CVE-2014-3124" ref_url="https://www.suse.com/security/cve/CVE-2014-3124/" source="CVE"/>
		<reference ref_id="CVE-2014-4021" ref_url="https://www.suse.com/security/cve/CVE-2014-4021/" source="CVE"/>
		<reference ref_id="CVE-2014-7154" ref_url="https://www.suse.com/security/cve/CVE-2014-7154/" source="CVE"/>
		<reference ref_id="CVE-2014-7155" ref_url="https://www.suse.com/security/cve/CVE-2014-7155/" source="CVE"/>
		<reference ref_id="CVE-2014-7156" ref_url="https://www.suse.com/security/cve/CVE-2014-7156/" source="CVE"/>
		<reference ref_id="CVE-2014-7188" ref_url="https://www.suse.com/security/cve/CVE-2014-7188/" source="CVE"/>
		<reference ref_id="CVE-2014-8594" ref_url="https://www.suse.com/security/cve/CVE-2014-8594/" source="CVE"/>
		<reference ref_id="CVE-2014-8595" ref_url="https://www.suse.com/security/cve/CVE-2014-8595/" source="CVE"/>
		<reference ref_id="CVE-2014-8866" ref_url="https://www.suse.com/security/cve/CVE-2014-8866/" source="CVE"/>
		<reference ref_id="CVE-2014-8867" ref_url="https://www.suse.com/security/cve/CVE-2014-8867/" source="CVE"/>
		<reference ref_id="CVE-2014-9030" ref_url="https://www.suse.com/security/cve/CVE-2014-9030/" source="CVE"/>
		<description>

xen was updated to fix 14 security issues:

    * Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling
      (CVE-2014-9030).
    * Insufficient bounding of 'REP MOVS' to MMIO emulated inside the
      hypervisor (CVE-2014-8867).
    * Missing privilege level checks in x86 HLT, LGDT, LIDT, and LMSW
      emulation (CVE-2014-7155).
    * Hypervisor heap contents leaked to guests (CVE-2014-4021).
    * Missing privilege level checks in x86 emulation of far branches
      (CVE-2014-8595).
    * Insufficient restrictions on certain MMU update hypercalls
      (CVE-2014-8594).
    * Intel VT-d Interrupt Remapping engines can be evaded by native NMI
      interrupts (CVE-2013-3495).
    * Missing privilege level checks in x86 emulation of software
      interrupts (CVE-2014-7156).
    * Race condition in HVMOP_track_dirty_vram (CVE-2014-7154).
    * Improper MSR range used for x2APIC emulation (CVE-2014-7188).
    * HVMOP_set_mem_type allows invalid P2M entries to be created
      (CVE-2014-3124).
    * HVMOP_set_mem_access is not preemptible (CVE-2014-2599).
    * Excessive checking in compatibility mode hypercall argument
      translation (CVE-2014-8866).
    * Guest user mode triggerable VM exits not handled by hypervisor
      (bnc#903850).

This non-security bug was fixed:

    * Increase limit domUloader to 32MB (bnc#901317).

Security Issues:

    * CVE-2014-9030
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9030&gt;
    * CVE-2014-8867
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8867&gt;
    * CVE-2014-7155
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7155&gt;
    * CVE-2014-4021
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021&gt;
    * CVE-2014-8595
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8595&gt;
    * CVE-2014-8594
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8594&gt;
    * CVE-2013-3495
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3495&gt;
    * CVE-2014-7156
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7156&gt;
    * CVE-2014-7154
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7154&gt;
    * CVE-2014-7188
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7188&gt;
    * CVE-2014-3124
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124&gt;
    * CVE-2014-2599
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599&gt;
    * CVE-2014-8866
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8866&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-08"/>
	<updated date="2014-12-08"/>
	<bugzilla href="https://bugzilla.suse.com/826717">SUSE bug 826717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867910">SUSE bug 867910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875668">SUSE bug 875668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895798">SUSE bug 895798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895799">SUSE bug 895799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895802">SUSE bug 895802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897657">SUSE bug 897657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901317">SUSE bug 901317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903850">SUSE bug 903850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905465">SUSE bug 905465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905467">SUSE bug 905467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906439">SUSE bug 906439</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3495/">CVE-2013-3495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3495">CVE-2013-3495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2599/">CVE-2014-2599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2599">CVE-2014-2599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3124/">CVE-2014-3124 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3124">CVE-2014-3124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4021/">CVE-2014-4021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4021">CVE-2014-4021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7154/">CVE-2014-7154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7154">CVE-2014-7154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7155/">CVE-2014-7155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7155">CVE-2014-7155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7156/">CVE-2014-7156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7156">CVE-2014-7156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7188/">CVE-2014-7188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7188">CVE-2014-7188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8594/">CVE-2014-8594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8594">CVE-2014-8594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8595/">CVE-2014-8595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8595">CVE-2014-8595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8866/">CVE-2014-8866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8866">CVE-2014-8866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8867/">CVE-2014-8867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8867">CVE-2014-8867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9030/">CVE-2014-9030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9030">CVE-2014-9030 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576974" comment="xen-4.1.6_08-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576975" comment="xen-devel-4.1.6_08-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576976" comment="xen-doc-html-4.1.6_08-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576977" comment="xen-doc-pdf-4.1.6_08-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576978" comment="xen-kmp-default-4.1.6_08_3.0.101_0.7.23-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576979" comment="xen-kmp-pae-4.1.6_08_3.0.101_0.7.23-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576980" comment="xen-kmp-trace-4.1.6_08_3.0.101_0.7.23-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576981" comment="xen-libs-4.1.6_08-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576982" comment="xen-libs-32bit-4.1.6_08-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576983" comment="xen-tools-4.1.6_08-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576984" comment="xen-tools-domU-4.1.6_08-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218164" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="932267" ref_url="https://bugzilla.suse.com/932267" source="BUGZILLA"/>
		<reference ref_id="944463" ref_url="https://bugzilla.suse.com/944463" source="BUGZILLA"/>
		<reference ref_id="944697" ref_url="https://bugzilla.suse.com/944697" source="BUGZILLA"/>
		<reference ref_id="950367" ref_url="https://bugzilla.suse.com/950367" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001672.html" source="SUSE-SU"/>
		<description>
xen was updated to fix eight security issues.

These security issues were fixed:
- CVE-2015-4037: The slirp_smb function in net/slirp.c created temporary files with predictable names, which allowed local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program (bsc#932267).
- CVE-2014-0222: Integer overflow in the qcow_open function allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests (bsc#950367).
- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).
- CVE-2015-6815: With e1000 NIC emulation support it was possible to enter an infinite loop (bsc#944697).
- CVE-2015-7969: Leak of main per-domain vcpu pointer array leading to denial of service (bsc#950703).
- CVE-2015-7969: Leak of per-domain profiling- related vcpu pointer array leading to denial of service (bsc#950705).
- CVE-2015-7971: Some pmu and profiling hypercalls log without rate limiting (bsc#950706).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-29"/>
	<updated date="2015-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944463">SUSE bug 944463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944697">SUSE bug 944697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0222">CVE-2014-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4037">CVE-2015-4037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5239">CVE-2015-5239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6815">CVE-2015-6815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7835">CVE-2015-7835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7969">CVE-2015-7969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7971">CVE-2015-7971 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576985" comment="xen-4.1.6_08-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576986" comment="xen-devel-4.1.6_08-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576987" comment="xen-doc-html-4.1.6_08-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576988" comment="xen-doc-pdf-4.1.6_08-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576989" comment="xen-kmp-default-4.1.6_08_3.0.101_0.7.37-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576990" comment="xen-kmp-pae-4.1.6_08_3.0.101_0.7.37-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576991" comment="xen-kmp-trace-4.1.6_08_3.0.101_0.7.37-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576992" comment="xen-libs-4.1.6_08-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576993" comment="xen-libs-32bit-4.1.6_08-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576994" comment="xen-tools-4.1.6_08-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576995" comment="xen-tools-domU-4.1.6_08-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218165" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="864391" ref_url="https://bugzilla.suse.com/864391" source="BUGZILLA"/>
		<reference ref_id="864655" ref_url="https://bugzilla.suse.com/864655" source="BUGZILLA"/>
		<reference ref_id="864769" ref_url="https://bugzilla.suse.com/864769" source="BUGZILLA"/>
		<reference ref_id="864805" ref_url="https://bugzilla.suse.com/864805" source="BUGZILLA"/>
		<reference ref_id="864811" ref_url="https://bugzilla.suse.com/864811" source="BUGZILLA"/>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="897654" ref_url="https://bugzilla.suse.com/897654" source="BUGZILLA"/>
		<reference ref_id="901508" ref_url="https://bugzilla.suse.com/901508" source="BUGZILLA"/>
		<reference ref_id="902737" ref_url="https://bugzilla.suse.com/902737" source="BUGZILLA"/>
		<reference ref_id="945989" ref_url="https://bugzilla.suse.com/945989" source="BUGZILLA"/>
		<reference ref_id="957162" ref_url="https://bugzilla.suse.com/957162" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="958007" ref_url="https://bugzilla.suse.com/958007" source="BUGZILLA"/>
		<reference ref_id="958009" ref_url="https://bugzilla.suse.com/958009" source="BUGZILLA"/>
		<reference ref_id="958491" ref_url="https://bugzilla.suse.com/958491" source="BUGZILLA"/>
		<reference ref_id="958523" ref_url="https://bugzilla.suse.com/958523" source="BUGZILLA"/>
		<reference ref_id="959005" ref_url="https://bugzilla.suse.com/959005" source="BUGZILLA"/>
		<reference ref_id="960707" ref_url="https://bugzilla.suse.com/960707" source="BUGZILLA"/>
		<reference ref_id="960725" ref_url="https://bugzilla.suse.com/960725" source="BUGZILLA"/>
		<reference ref_id="960861" ref_url="https://bugzilla.suse.com/960861" source="BUGZILLA"/>
		<reference ref_id="960862" ref_url="https://bugzilla.suse.com/960862" source="BUGZILLA"/>
		<reference ref_id="961691" ref_url="https://bugzilla.suse.com/961691" source="BUGZILLA"/>
		<reference ref_id="963782" ref_url="https://bugzilla.suse.com/963782" source="BUGZILLA"/>
		<reference ref_id="965315" ref_url="https://bugzilla.suse.com/965315" source="BUGZILLA"/>
		<reference ref_id="965317" ref_url="https://bugzilla.suse.com/965317" source="BUGZILLA"/>
		<reference ref_id="967013" ref_url="https://bugzilla.suse.com/967013" source="BUGZILLA"/>
		<reference ref_id="967630" ref_url="https://bugzilla.suse.com/967630" source="BUGZILLA"/>
		<reference ref_id="969350" ref_url="https://bugzilla.suse.com/969350" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3689" ref_url="https://www.suse.com/security/cve/CVE-2014-3689/" source="CVE"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554/" source="CVE"/>
		<reference ref_id="CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2016-1570" ref_url="https://www.suse.com/security/cve/CVE-2016-1570/" source="CVE"/>
		<reference ref_id="CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270/" source="CVE"/>
		<reference ref_id="CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<description>
xen was updated to fix 27 security issues.

These security issues were fixed:
- CVE-2013-4533: Buffer overflow in the pxa2xx_ssp_load function in hw/arm/pxa2xx.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted s-&gt;rx_level value in a savevm image (bsc#864655).
- CVE-2013-4534: Buffer overflow in hw/intc/openpic.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via vectors related to IRQDest elements (bsc#864811).
- CVE-2013-4537: The ssi_sd_transfer function in hw/sd/ssi-sd.c allowed remote attackers to execute arbitrary code via a crafted arglen value in a savevm image (bsc#864391).
- CVE-2013-4538: Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c allowed remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image (bsc#864769).
- CVE-2013-4539: Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c might have allowed remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image (bsc#864805).
- CVE-2014-0222: Integer overflow in the qcow_open function in block/qcow.c allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2014-3640: The sosendto function in slirp/udp.c allowed local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket (bsc#897654).
- CVE-2014-3689: The vmware-vga driver (hw/display/vmware_vga.c) allowed local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling (bsc#901508).
- CVE-2014-7815: The set_pixel_format function in ui/vnc.c allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value (bsc#902737).
- CVE-2015-5278: Infinite loop in ne2000_receive() function (bsc#945989).
- CVE-2015-7512: Buffer overflow in the pcnet_receive function in hw/net/pcnet.c, when a guest NIC has a larger MTU, allowed remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet (bsc#957162).
- CVE-2015-8504: VNC: floating point exception (bsc#958491).
- CVE-2015-8550: Paravirtualized drivers were incautious about shared memory contents (XSA-155) (bsc#957988).
- CVE-2015-8554: qemu-dm buffer overrun in MSI-X handling (XSA-164) (bsc#958007).
- CVE-2015-8555: Information leak in legacy x86 FPU/XMM initialization (XSA-165) (bsc#958009).
- CVE-2015-8558: Infinite loop in ehci_advance_state resulted in DoS (bsc#959005).
- CVE-2015-8743: ne2000: OOB memory access in ioport r/w functions (bsc#960725).
- CVE-2015-8745: Reading IMR registers lead to a crash via assert(2) call (bsc#960707).
- CVE-2016-1570: The PV superpage functionality in arch/x86/mm.c allowed local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2) MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3) unknown vectors related to page table updates (bsc#960861).
- CVE-2016-1571: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) (bsc#960862).
- CVE-2016-1714: nvram: OOB r/w access in processing firmware configurations (bsc#961691).
- CVE-2016-1981: e1000 infinite loop in start_xmit and e1000_receive_iov routines (bsc#963782).
- CVE-2016-2270: Xen allowed local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings (bsc#965315).
- CVE-2016-2271: VMX when using an Intel or Cyrix CPU, allowed local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP (bsc#965317).
- CVE-2016-2391: usb: multiple eof_timers in ohci module lead to NULL pointer dereference (bsc#967013).
- CVE-2016-2841: ne2000: Infinite loop in ne2000_receive (bsc#969350).
- XSA-166: ioreq handling possibly susceptible to multiple read issue (bsc#958523).

This non-security issue was fixed:
- bsc#967630: Discrepancy in reported memory size with correction XSA-153 for xend
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-26"/>
	<updated date="2016-04-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/864391">SUSE bug 864391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864655">SUSE bug 864655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864769">SUSE bug 864769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864805">SUSE bug 864805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864811">SUSE bug 864811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897654">SUSE bug 897654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901508">SUSE bug 901508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902737">SUSE bug 902737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945989">SUSE bug 945989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957162">SUSE bug 957162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958007">SUSE bug 958007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958009">SUSE bug 958009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958491">SUSE bug 958491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958523">SUSE bug 958523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959005">SUSE bug 959005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960707">SUSE bug 960707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960725">SUSE bug 960725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960861">SUSE bug 960861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960862">SUSE bug 960862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961691">SUSE bug 961691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963782">SUSE bug 963782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965315">SUSE bug 965315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965317">SUSE bug 965317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967013">SUSE bug 967013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967630">SUSE bug 967630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969350">SUSE bug 969350</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4533">CVE-2013-4533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4534">CVE-2013-4534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4537">CVE-2013-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4538">CVE-2013-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4539">CVE-2013-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0222">CVE-2014-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3640">CVE-2014-3640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3689/">CVE-2014-3689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3689">CVE-2014-3689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7815">CVE-2014-7815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5278">CVE-2015-5278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7512">CVE-2015-7512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8504">CVE-2015-8504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8550">CVE-2015-8550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8554">CVE-2015-8554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8555">CVE-2015-8555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8558">CVE-2015-8558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8743">CVE-2015-8743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8745">CVE-2015-8745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1570/">CVE-2016-1570 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1570">CVE-2016-1570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1571">CVE-2016-1571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1714">CVE-2016-1714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1981">CVE-2016-1981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2270">CVE-2016-2270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2271">CVE-2016-2271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2391">CVE-2016-2391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2841">CVE-2016-2841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576996" comment="xen-4.1.6_08-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576997" comment="xen-devel-4.1.6_08-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576998" comment="xen-doc-html-4.1.6_08-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576999" comment="xen-doc-pdf-4.1.6_08-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577000" comment="xen-kmp-default-4.1.6_08_3.0.101_0.7.37-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577001" comment="xen-kmp-pae-4.1.6_08_3.0.101_0.7.37-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577002" comment="xen-kmp-trace-4.1.6_08_3.0.101_0.7.37-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577003" comment="xen-libs-4.1.6_08-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577004" comment="xen-libs-32bit-4.1.6_08-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577005" comment="xen-tools-4.1.6_08-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577006" comment="xen-tools-domU-4.1.6_08-26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218166" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="973188" ref_url="https://bugzilla.suse.com/973188" source="BUGZILLA"/>
		<reference ref_id="974038" ref_url="https://bugzilla.suse.com/974038" source="BUGZILLA"/>
		<reference ref_id="975130" ref_url="https://bugzilla.suse.com/975130" source="BUGZILLA"/>
		<reference ref_id="975138" ref_url="https://bugzilla.suse.com/975138" source="BUGZILLA"/>
		<reference ref_id="978164" ref_url="https://bugzilla.suse.com/978164" source="BUGZILLA"/>
		<reference ref_id="978295" ref_url="https://bugzilla.suse.com/978295" source="BUGZILLA"/>
		<reference ref_id="980716" ref_url="https://bugzilla.suse.com/980716" source="BUGZILLA"/>
		<reference ref_id="980724" ref_url="https://bugzilla.suse.com/980724" source="BUGZILLA"/>
		<reference ref_id="981264" ref_url="https://bugzilla.suse.com/981264" source="BUGZILLA"/>
		<reference ref_id="982960" ref_url="https://bugzilla.suse.com/982960" source="BUGZILLA"/>
		<reference ref_id="983984" ref_url="https://bugzilla.suse.com/983984" source="BUGZILLA"/>
		<reference ref_id="988675" ref_url="https://bugzilla.suse.com/988675" source="BUGZILLA"/>
		<reference ref_id="995785" ref_url="https://bugzilla.suse.com/995785" source="BUGZILLA"/>
		<reference ref_id="995792" ref_url="https://bugzilla.suse.com/995792" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3615" ref_url="https://www.suse.com/security/cve/CVE-2014-3615/" source="CVE"/>
		<reference ref_id="CVE-2014-3672" ref_url="https://www.suse.com/security/cve/CVE-2014-3672/" source="CVE"/>
		<reference ref_id="CVE-2016-3158" ref_url="https://www.suse.com/security/cve/CVE-2016-3158/" source="CVE"/>
		<reference ref_id="CVE-2016-3159" ref_url="https://www.suse.com/security/cve/CVE-2016-3159/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3960" ref_url="https://www.suse.com/security/cve/CVE-2016-3960/" source="CVE"/>
		<reference ref_id="CVE-2016-4001" ref_url="https://www.suse.com/security/cve/CVE-2016-4001/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-4480" ref_url="https://www.suse.com/security/cve/CVE-2016-4480/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258/" source="CVE"/>
		<reference ref_id="CVE-2016-7092" ref_url="https://www.suse.com/security/cve/CVE-2016-7092/" source="CVE"/>
		<reference ref_id="CVE-2016-7094" ref_url="https://www.suse.com/security/cve/CVE-2016-7094/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002332.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:
- CVE-2016-7094: Buffer overflow in Xen allowed local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update (bsc#995792)
- CVE-2016-7092: The get_page_from_l3e function in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables (bsc#995785)
- CVE-2016-6258: The PV pagetable code in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries (bsc#988675)
- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the host via vectors related to the information transfer buffer (bsc#983984)
- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c might have allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982960)
- CVE-2014-3672: The qemu implementation in libvirt Xen allowed local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr (bsc#981264)
- CVE-2016-4441: The get_cmd function in the 53C9X Fast SCSI Controller (FSC) support did not properly check DMA length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command (bsc#980724)
- CVE-2016-4439: The esp_reg_write function in the 53C9X Fast SCSI Controller (FSC) support did not properly check command buffer length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the host via unspecified vectors (bsc#980716)
- CVE-2016-3710: The VGA module improperly performed bounds checking on banked access to video memory, which allowed local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the 'Dark Portal' issue (bsc#978164)
- CVE-2016-4480: The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen did not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might have allowed local guest OS users to gain privileges via a crafted mapping of memory (bsc#978295)
- CVE-2016-3960: Integer overflow in the x86 shadow pagetable code allowed local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping (bsc#974038)
- CVE-2016-3158: The xrstor function did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188)
- CVE-2016-4001: Buffer overflow in the stellaris_enet_receive function, when the Stellaris ethernet controller is configured to accept large packets, allowed remote attackers to cause a denial of service (QEMU crash) via a large packet (bsc#975130)
- CVE-2016-4002: Buffer overflow in the mipsnet_receive function, when the guest NIC is configured to accept large packets, allowed remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes (bsc#975138)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-13"/>
	<updated date="2016-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/973188">SUSE bug 973188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974038">SUSE bug 974038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975130">SUSE bug 975130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975138">SUSE bug 975138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978164">SUSE bug 978164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978295">SUSE bug 978295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980716">SUSE bug 980716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980724">SUSE bug 980724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981264">SUSE bug 981264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982960">SUSE bug 982960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983984">SUSE bug 983984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988675">SUSE bug 988675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995785">SUSE bug 995785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995792">SUSE bug 995792</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3615/">CVE-2014-3615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3615">CVE-2014-3615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3672/">CVE-2014-3672 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3672">CVE-2014-3672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3158/">CVE-2016-3158 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3158">CVE-2016-3158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3159/">CVE-2016-3159 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3159">CVE-2016-3159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3710">CVE-2016-3710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3960/">CVE-2016-3960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3960">CVE-2016-3960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4001/">CVE-2016-4001 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4001">CVE-2016-4001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4002">CVE-2016-4002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4439">CVE-2016-4439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4441">CVE-2016-4441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4480/">CVE-2016-4480 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4480">CVE-2016-4480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5238">CVE-2016-5238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5338">CVE-2016-5338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6258">CVE-2016-6258 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7092/">CVE-2016-7092 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7092">CVE-2016-7092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7094/">CVE-2016-7094 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7094">CVE-2016-7094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577007" comment="xen-4.1.6_08-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577008" comment="xen-devel-4.1.6_08-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577009" comment="xen-doc-html-4.1.6_08-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577010" comment="xen-doc-pdf-4.1.6_08-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577011" comment="xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577012" comment="xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577013" comment="xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577014" comment="xen-libs-4.1.6_08-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577015" comment="xen-libs-32bit-4.1.6_08-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577016" comment="xen-tools-4.1.6_08-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577017" comment="xen-tools-domU-4.1.6_08-29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218167" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1000106" ref_url="https://bugzilla.suse.com/1000106" source="BUGZILLA"/>
		<reference ref_id="1000893" ref_url="https://bugzilla.suse.com/1000893" source="BUGZILLA"/>
		<reference ref_id="1003030" ref_url="https://bugzilla.suse.com/1003030" source="BUGZILLA"/>
		<reference ref_id="1003032" ref_url="https://bugzilla.suse.com/1003032" source="BUGZILLA"/>
		<reference ref_id="1005004" ref_url="https://bugzilla.suse.com/1005004" source="BUGZILLA"/>
		<reference ref_id="1005005" ref_url="https://bugzilla.suse.com/1005005" source="BUGZILLA"/>
		<reference ref_id="1007157" ref_url="https://bugzilla.suse.com/1007157" source="BUGZILLA"/>
		<reference ref_id="1009100" ref_url="https://bugzilla.suse.com/1009100" source="BUGZILLA"/>
		<reference ref_id="1009103" ref_url="https://bugzilla.suse.com/1009103" source="BUGZILLA"/>
		<reference ref_id="1009107" ref_url="https://bugzilla.suse.com/1009107" source="BUGZILLA"/>
		<reference ref_id="1009109" ref_url="https://bugzilla.suse.com/1009109" source="BUGZILLA"/>
		<reference ref_id="1009111" ref_url="https://bugzilla.suse.com/1009111" source="BUGZILLA"/>
		<reference ref_id="1011652" ref_url="https://bugzilla.suse.com/1011652" source="BUGZILLA"/>
		<reference ref_id="990843" ref_url="https://bugzilla.suse.com/990843" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-7777" ref_url="https://www.suse.com/security/cve/CVE-2016-7777/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9379" ref_url="https://www.suse.com/security/cve/CVE-2016-9379/" source="CVE"/>
		<reference ref_id="CVE-2016-9380" ref_url="https://www.suse.com/security/cve/CVE-2016-9380/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9382" ref_url="https://www.suse.com/security/cve/CVE-2016-9382/" source="CVE"/>
		<reference ref_id="CVE-2016-9383" ref_url="https://www.suse.com/security/cve/CVE-2016-9383/" source="CVE"/>
		<reference ref_id="CVE-2016-9386" ref_url="https://www.suse.com/security/cve/CVE-2016-9386/" source="CVE"/>
		<reference ref_id="CVE-2016-9637" ref_url="https://www.suse.com/security/cve/CVE-2016-9637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002448.html" source="SUSE-SU"/>
		<description>

xen was updated to fix several security issues.

These security issues were fixed:

- CVE-2016-9637: ioport array overflow allowing a malicious guest administrator can escalate their privilege to that of the host (bsc#1011652).
- CVE-2016-9386: x86 null segments were not always treated as unusable allowing an unprivileged guest user program to elevate its privilege to that of the guest operating system. Exploit of this vulnerability is easy on Intel and more complicated on AMD (bsc#1009100)
- CVE-2016-9382: x86 task switch to VM86 mode was mis-handled, allowing a unprivileged guest process to escalate its privilege to that of the guest operating system on AMD hardware. On Intel hardware a malicious unprivileged guest process can crash the guest (bsc#1009103)
- CVE-2016-9383: The x86 64-bit bit test instruction emulation was broken, allowing a guest to modify arbitrary memory leading to arbitray code execution (bsc#1009107)
- CVE-2016-9381: Improper processing of shared rings allowing guest administrators take over the qemu process, elevating their privilege to that of the qemu process (bsc#1009109)
- CVE-2016-9380: Delimiter injection vulnerabilities in pygrub allowed  guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111)
- CVE-2016-9379: Delimiter injection vulnerabilities in pygrub allowed guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111)
- CVE-2016-7777: Xen did not properly honor CR0.TS and CR0.EM, which allowed local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it (bsc#1000106)
- CVE-2016-8910: The rtl8139_cplus_transmit function in hw/net/rtl8139.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count (bsc#1007157)
- CVE-2016-8667: The rc4030_write function in hw/dma/rc4030.c in allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value (bsc#1005004)
- CVE-2016-8669: The serial_update_parameters function in hw/char/serial.c allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base (bsc#1005005)
- CVE-2016-7908: The mcf_fec_do_tx function in hw/net/mcf_fec.c did not properly limit the buffer descriptor count when transmitting packets, which allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags (bsc#1003030)
- CVE-2016-7909: The pcnet_rdra_addr function in hw/net/pcnet.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0 (bsc#1003032)
- CVE-2016-6351: The esp_do_dma function in hw/scsi/esp.c, when built with ESP/NCR53C9x controller emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the host via vectors involving DMA read into ESP command buffer (bsc#990843)

This non-security issue was fixed:

- bsc#1000893: virsh setmem didn't allow to set current guest memory to max limit
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-07"/>
	<updated date="2016-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000106">SUSE bug 1000106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000893">SUSE bug 1000893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003030">SUSE bug 1003030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003032">SUSE bug 1003032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005004">SUSE bug 1005004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005005">SUSE bug 1005005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007157">SUSE bug 1007157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009100">SUSE bug 1009100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009103">SUSE bug 1009103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009107">SUSE bug 1009107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009109">SUSE bug 1009109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009111">SUSE bug 1009111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011652">SUSE bug 1011652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990843">SUSE bug 990843</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6351">CVE-2016-6351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7777/">CVE-2016-7777 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7777">CVE-2016-7777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7908">CVE-2016-7908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7909">CVE-2016-7909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8667">CVE-2016-8667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8669">CVE-2016-8669 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8910">CVE-2016-8910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9379/">CVE-2016-9379 at SUSE</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9379">CVE-2016-9379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9380/">CVE-2016-9380 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9380">CVE-2016-9380 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9381">CVE-2016-9381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9382/">CVE-2016-9382 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9382">CVE-2016-9382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9383/">CVE-2016-9383 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9383">CVE-2016-9383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9386/">CVE-2016-9386 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9386">CVE-2016-9386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9637/">CVE-2016-9637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9637">CVE-2016-9637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577018" comment="xen-4.1.6_08-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577019" comment="xen-devel-4.1.6_08-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577020" comment="xen-doc-html-4.1.6_08-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577021" comment="xen-doc-pdf-4.1.6_08-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577022" comment="xen-kmp-default-4.1.6_08_3.0.101_0.7.44-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577023" comment="xen-kmp-pae-4.1.6_08_3.0.101_0.7.44-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577024" comment="xen-kmp-trace-4.1.6_08_3.0.101_0.7.44-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577025" comment="xen-libs-4.1.6_08-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577026" comment="xen-libs-32bit-4.1.6_08-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577027" comment="xen-tools-4.1.6_08-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577028" comment="xen-tools-domU-4.1.6_08-32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218168" version="1" class="patch">
	<metadata>
		<title>Recommended update for KVM and Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="720929" ref_url="https://bugzilla.suse.com/720929" source="BUGZILLA"/>
		<reference ref_id="733715" ref_url="https://bugzilla.suse.com/733715" source="BUGZILLA"/>
		<reference ref_id="739585" ref_url="https://bugzilla.suse.com/739585" source="BUGZILLA"/>
		<reference ref_id="742773" ref_url="https://bugzilla.suse.com/742773" source="BUGZILLA"/>
		<reference ref_id="743414" ref_url="https://bugzilla.suse.com/743414" source="BUGZILLA"/>
		<reference ref_id="744771" ref_url="https://bugzilla.suse.com/744771" source="BUGZILLA"/>
		<reference ref_id="745005" ref_url="https://bugzilla.suse.com/745005" source="BUGZILLA"/>
		<reference ref_id="745367" ref_url="https://bugzilla.suse.com/745367" source="BUGZILLA"/>
		<reference ref_id="745880" ref_url="https://bugzilla.suse.com/745880" source="BUGZILLA"/>
		<reference ref_id="745890" ref_url="https://bugzilla.suse.com/745890" source="BUGZILLA"/>
		<reference ref_id="746613" ref_url="https://bugzilla.suse.com/746613" source="BUGZILLA"/>
		<reference ref_id="746702" ref_url="https://bugzilla.suse.com/746702" source="BUGZILLA"/>
		<reference ref_id="747172" ref_url="https://bugzilla.suse.com/747172" source="BUGZILLA"/>
		<reference ref_id="747331" ref_url="https://bugzilla.suse.com/747331" source="BUGZILLA"/>
		<reference ref_id="753165" ref_url="https://bugzilla.suse.com/753165" source="BUGZILLA"/>
		<reference ref_id="754906" ref_url="https://bugzilla.suse.com/754906" source="BUGZILLA"/>
		<reference ref_id="757346" ref_url="https://bugzilla.suse.com/757346" source="BUGZILLA"/>
		<reference ref_id="757537" ref_url="https://bugzilla.suse.com/757537" source="BUGZILLA"/>
		<reference ref_id="757970" ref_url="https://bugzilla.suse.com/757970" source="BUGZILLA"/>
		<reference ref_id="760023" ref_url="https://bugzilla.suse.com/760023" source="BUGZILLA"/>
		<reference ref_id="760557" ref_url="https://bugzilla.suse.com/760557" source="BUGZILLA"/>
		<reference ref_id="761142" ref_url="https://bugzilla.suse.com/761142" source="BUGZILLA"/>
		<reference ref_id="764077" ref_url="https://bugzilla.suse.com/764077" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0217" ref_url="https://www.suse.com/security/cve/CVE-2012-0217/" source="CVE"/>
		<reference ref_id="CVE-2012-0218" ref_url="https://www.suse.com/security/cve/CVE-2012-0218/" source="CVE"/>
		<reference ref_id="CVE-2012-2934" ref_url="https://www.suse.com/security/cve/CVE-2012-2934/" source="CVE"/>
		<description>

This collective update for Xen 2012/06 on SUSE Linux Enterprise 11 SP2 
provides the following fixes:


Xen

    * 757537: xen: CVE-2012-0217 PV guest escalation
    * 757970: xen: CVE-2012-0218 guest denial of service on syscall GPF
      generation
    * 

      764077: xen: CVE-2012-2934 Report a denial of service issue on old,
      pre-SVM AMD CPUs (AMD Erratum 121).

      AMD Erratum #121 is described in 'Revision Guide for AMD Athlon 64
      and AMD Opteron Processors':
      http://support.amd.com/us/Processor_TechDocs/25759.pdf
      &lt;http://support.amd.com/us/Processor_TechDocs/25759.pdf&gt;

      The following 130nm and 90nm (DDR1-only) AMD processors are subject
      to this erratum:

          o 

            First-generation AMD-Opteron(tm) single and dual core
            processors in either 939 or 940 packages:

                + AMD Opteron(tm) 100-Series Processors
                + AMD Opteron(tm) 200-Series Processors
                + AMD Opteron(tm) 800-Series Processors
                + AMD Athlon(tm) processors in either 754, 939 or 940
                  packages
                + AMD Sempron(tm) processor in either 754 or 939 packages
                + AMD Turion(tm) Mobile Technology in 754 package

      This issue does not effect Intel processors.

      The impact of this flaw is that a malicious PV guest user can halt
      the host system.

      As this is a hardware flaw, it is not fixable except by upgrading
      your hardware to a newer revision, or not allowing untrusted 64bit
      guestsystems.

      The patch changes the behaviour of the host system booting, which
      makes it unable to create guest machines until a specific boot option
      is set.

      There is a new XEN boot option 'allow_unsafe' for GRUB which allows
      the host to start guests again.

      This is added to /boot/grub/menu.lst in the line looking like this:

      kernel /boot/xen.gz .... allow_unsafe

      or add this option to the XEN_APPEND line /etc/sysconfig/bootloader,
      like e.g.:

      XEN_APPEND='allow_unsafe'

      Note: .... in the first example represents the existing boot options
      for the host.

    * 

      753165: xen/scripts/network-bridge wont create bridge

    * 745880: cpuid setting is not preserved across xend restarts
    * 747331: standard 'newburn' kernel QA stress test freezes the guest
    * 745367: MCE bank handling during migration
    * 744771: VM with passed through PCI card fails to reboot under dom0
      load
    * 746702: Xen HVM DomU crash during Windows Server 2008 install, when
      maxmem &gt; memory
    * 745005: Update vif configuration examples in xmexample*
    * 743414: using vifname is ignored when defining a xen virtual
      interface with xl/libxl
    * 739585: Xen block-attach fails after repeated attach/detach
    * Fate 310510: fix xenpaging


vm-install

    * 760557: Fix error on two virtual discs with conflicting virtual names
    * 760023: Can't upgrade an OES 2 (64-bit) XEN Guest Server to OES 11
    * 757346: XEN guest OS installation (SLES 11 SP2 guest) fails on SLED
      11 SP2
    * 742773: vm-install shows bogus error msg without defined installation
      source
    * KVM: Add 'unsafe' and 'directsync' as options to cache_mode
    * KVM: During installation set the target disk to 'unsafe' mode for
      better performance.
    * 761142: vm-install fails to create its new VM: bogus 'Not enough
      space on device' message
    * 754906: virt-manager is not allowing to upgrade oes11 to oes11sp1
      machine


virt-manager

    * 746613: validation error when adding USB redirection
    * KVM: Add cache mode support for directsync and unsafe


libvirt

    * 747172: PCI device passthrough fails with 'Broadcom NetXtreme II
      BCM5709 Gigabit Ethernet' (bnx2) (kvm)
    * 745890: Unable to start xen domains with virsh when using libxenlight
      toolstack and apparmor
    * KVM: Add support for qemu's 'unsafe' cache mode (directsync mode
      already there)


virt-utils

    * vpc: Round up image size during fixed image creation
    * fate 309765: Create images that can be run on Microsoft Hyper-V host
      Added the VHD Fixed Disk format support


yast2-vm

    * 720929: Upgrade from OES 2 SP2 to OES 11 RC3 re-adds
      'x0..respawn..xterm' to inittab
    * 733715: Fix typo in relocation-server.pot

Security Issue references:

    * CVE-2012-0217
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0217&gt;
    * CVE-2012-0218
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0218&gt;
    * CVE-2012-2934
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2934&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-06-07"/>
	<updated date="2012-06-07"/>
	<bugzilla href="https://bugzilla.suse.com/720929">SUSE bug 720929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/733715">SUSE bug 733715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/739585">SUSE bug 739585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742773">SUSE bug 742773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/743414">SUSE bug 743414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744771">SUSE bug 744771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745005">SUSE bug 745005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745367">SUSE bug 745367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745880">SUSE bug 745880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745890">SUSE bug 745890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746613">SUSE bug 746613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746702">SUSE bug 746702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747172">SUSE bug 747172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747331">SUSE bug 747331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/753165">SUSE bug 753165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754906">SUSE bug 754906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757346">SUSE bug 757346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757537">SUSE bug 757537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757970">SUSE bug 757970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760023">SUSE bug 760023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760557">SUSE bug 760557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761142">SUSE bug 761142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/764077">SUSE bug 764077</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0217/">CVE-2012-0217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0217">CVE-2012-0217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0218/">CVE-2012-0218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0218">CVE-2012-0218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2934/">CVE-2012-2934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2934">CVE-2012-2934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009589049" comment="libvirt-0.9.6-0.15.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589050" comment="libvirt-client-0.9.6-0.15.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589051" comment="libvirt-client-32bit-0.9.6-0.15.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589052" comment="libvirt-doc-0.9.6-0.15.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589053" comment="libvirt-python-0.9.6-0.15.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589054" comment="virt-manager-0.9.0-3.17.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589055" comment="virt-utils-1.1.7-0.11.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589056" comment="vm-install-0.5.9-0.7.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589057" comment="xen-4.1.2_18-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589058" comment="xen-doc-html-4.1.2_18-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589059" comment="xen-doc-pdf-4.1.2_18-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589060" comment="xen-kmp-default-4.1.2_18_3.0.31_0.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589061" comment="xen-kmp-pae-4.1.2_18_3.0.31_0.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589062" comment="xen-kmp-trace-4.1.2_18_3.0.31_0.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589063" comment="xen-libs-4.1.2_18-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589064" comment="xen-libs-32bit-4.1.2_18-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589065" comment="xen-tools-4.1.2_18-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589066" comment="xen-tools-domU-4.1.2_18-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589067" comment="yast2-vm-2.17.10-0.5.42 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009589049" comment="libvirt-0.9.6-0.15.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589050" comment="libvirt-client-0.9.6-0.15.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589051" comment="libvirt-client-32bit-0.9.6-0.15.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589052" comment="libvirt-doc-0.9.6-0.15.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589053" comment="libvirt-python-0.9.6-0.15.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589054" comment="virt-manager-0.9.0-3.17.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589055" comment="virt-utils-1.1.7-0.11.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589056" comment="vm-install-0.5.9-0.7.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589057" comment="xen-4.1.2_18-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589058" comment="xen-doc-html-4.1.2_18-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589059" comment="xen-doc-pdf-4.1.2_18-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589060" comment="xen-kmp-default-4.1.2_18_3.0.31_0.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589061" comment="xen-kmp-pae-4.1.2_18_3.0.31_0.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589062" comment="xen-kmp-trace-4.1.2_18_3.0.31_0.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589063" comment="xen-libs-4.1.2_18-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589064" comment="xen-libs-32bit-4.1.2_18-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589065" comment="xen-tools-4.1.2_18-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589066" comment="xen-tools-domU-4.1.2_18-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589067" comment="yast2-vm-2.17.10-0.5.42 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218169" version="1" class="patch">
	<metadata>
		<title>Security update for Xen and libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="746702" ref_url="https://bugzilla.suse.com/746702" source="BUGZILLA"/>
		<reference ref_id="762484" ref_url="https://bugzilla.suse.com/762484" source="BUGZILLA"/>
		<reference ref_id="762963" ref_url="https://bugzilla.suse.com/762963" source="BUGZILLA"/>
		<reference ref_id="764982" ref_url="https://bugzilla.suse.com/764982" source="BUGZILLA"/>
		<reference ref_id="766283" ref_url="https://bugzilla.suse.com/766283" source="BUGZILLA"/>
		<reference ref_id="773393" ref_url="https://bugzilla.suse.com/773393" source="BUGZILLA"/>
		<reference ref_id="773401" ref_url="https://bugzilla.suse.com/773401" source="BUGZILLA"/>
		<reference ref_id="773955" ref_url="https://bugzilla.suse.com/773955" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3432" ref_url="https://www.suse.com/security/cve/CVE-2012-3432/" source="CVE"/>
		<description>

Xen was updated to fix several security issues:

    * 

      CVE-2012-3433: A xen HVM guest destroy p2m teardown host DoS
      vulnerability was fixed, where malicious guest could lock/crash the
      host.

    * 

      CVE-2012-3432: A xen HVM guest user mode MMIO emulation DoS was
      fixed.

    * 

      CVE-2012-2625: The xen pv bootloader doesn't check the size of the
      bzip2 or lzma compressed kernel, leading to denial of service
      (crash).

Also the following bug in XEN has been fixed:

    * bnc#746702 - Xen HVM DomU crash during Windows Server 2008 R2
      install, when maxmem &gt; memory

This update also included bugfixes for:

    * 

      vm-install: - bnc#762963 - ReaR: Unable to recover a paravirtualized
      XEN guest

    * 

      virt-manager - SLE11-SP2 ONLY

    * bnc#764982 - virt-manager fails to start after upgrade to SLES11 SP2
      from SLES10

Security Issue reference:

    * CVE-2012-3432
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3432&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-05"/>
	<updated date="2012-08-05"/>
	<bugzilla href="https://bugzilla.suse.com/746702">SUSE bug 746702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762484">SUSE bug 762484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762963">SUSE bug 762963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/764982">SUSE bug 764982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/766283">SUSE bug 766283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773393">SUSE bug 773393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773401">SUSE bug 773401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773955">SUSE bug 773955</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3432/">CVE-2012-3432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3432">CVE-2012-3432 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566203" comment="libvirt-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566204" comment="libvirt-client-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566205" comment="libvirt-client-32bit-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566206" comment="libvirt-doc-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566207" comment="libvirt-python-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566208" comment="virt-manager-0.9.0-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566209" comment="vm-install-0.5.10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566210" comment="xen-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566211" comment="xen-doc-html-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566212" comment="xen-doc-pdf-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566213" comment="xen-kmp-default-4.1.2_20_3.0.38_0.5-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566214" comment="xen-kmp-trace-4.1.2_20_3.0.38_0.5-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566215" comment="xen-libs-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566216" comment="xen-libs-32bit-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566217" comment="xen-tools-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566218" comment="xen-tools-domU-4.1.2_20-0.5.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566203" comment="libvirt-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566204" comment="libvirt-client-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566205" comment="libvirt-client-32bit-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566206" comment="libvirt-doc-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566207" comment="libvirt-python-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566208" comment="virt-manager-0.9.0-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566209" comment="vm-install-0.5.10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566210" comment="xen-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566211" comment="xen-doc-html-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566212" comment="xen-doc-pdf-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566213" comment="xen-kmp-default-4.1.2_20_3.0.38_0.5-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566214" comment="xen-kmp-trace-4.1.2_20_3.0.38_0.5-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566215" comment="xen-libs-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566216" comment="xen-libs-32bit-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566217" comment="xen-tools-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566218" comment="xen-tools-domU-4.1.2_20-0.5.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218170" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="776300" ref_url="https://bugzilla.suse.com/776300" source="BUGZILLA"/>
		<reference ref_id="776995" ref_url="https://bugzilla.suse.com/776995" source="BUGZILLA"/>
		<reference ref_id="777084" ref_url="https://bugzilla.suse.com/777084" source="BUGZILLA"/>
		<reference ref_id="777086" ref_url="https://bugzilla.suse.com/777086" source="BUGZILLA"/>
		<reference ref_id="777088" ref_url="https://bugzilla.suse.com/777088" source="BUGZILLA"/>
		<reference ref_id="777090" ref_url="https://bugzilla.suse.com/777090" source="BUGZILLA"/>
		<reference ref_id="777091" ref_url="https://bugzilla.suse.com/777091" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3494" ref_url="https://www.suse.com/security/cve/CVE-2012-3494/" source="CVE"/>
		<reference ref_id="CVE-2012-3495" ref_url="https://www.suse.com/security/cve/CVE-2012-3495/" source="CVE"/>
		<reference ref_id="CVE-2012-3496" ref_url="https://www.suse.com/security/cve/CVE-2012-3496/" source="CVE"/>
		<reference ref_id="CVE-2012-3498" ref_url="https://www.suse.com/security/cve/CVE-2012-3498/" source="CVE"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<description>

XEN was updated 4.1.3 to fix multiple bugs and security issues.

The following security issues have been fixed:

    * CVE-2012-3494: xen: hypercall set_debugreg vulnerability (XSA-12)
    * CVE-2012-3495: xen: hypercall physdev_get_free_pirq vulnerability
      (XSA-13)
    * CVE-2012-3496: xen: XENMEM_populate_physmap DoS vulnerability
      (XSA-14)
    * CVE-2012-3498: xen: PHYSDEVOP_map_pirq index vulnerability (XSA-16)
    * CVE-2012-3515: xen: Qemu VT100 emulation vulnerability (XSA-17)

Also the following bugs have been fixed:

    * pvscsi support of attaching Luns - bnc#776995

The following related bugs in vm-install 0.5.12 have been fixed:

    * bnc#776300 - vm-install does not pass --extra-args in --upgrade
    * Add for support Open Enterprise Server 11
    * Add support for Windows 8 and Windows Server 2012
    * Add support for Ubuntu 12 (Precise Pangolin)

Security Issue references:

    * CVE-2012-3496
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3496&gt;
    * CVE-2012-3494
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3494&gt;
    * CVE-2012-3495
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3495&gt;
    * CVE-2012-3498
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3498&gt;
    * CVE-2012-3515
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3515&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-30"/>
	<updated date="2012-08-30"/>
	<bugzilla href="https://bugzilla.suse.com/776300">SUSE bug 776300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776995">SUSE bug 776995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777084">SUSE bug 777084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777086">SUSE bug 777086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777088">SUSE bug 777088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777090">SUSE bug 777090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777091">SUSE bug 777091</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3494/">CVE-2012-3494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3494">CVE-2012-3494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3495/">CVE-2012-3495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3495">CVE-2012-3495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3496/">CVE-2012-3496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3496">CVE-2012-3496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3498/">CVE-2012-3498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3498">CVE-2012-3498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3515">CVE-2012-3515 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566219" comment="vm-install-0.5.12-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566220" comment="xen-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566221" comment="xen-doc-html-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566222" comment="xen-doc-pdf-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566223" comment="xen-kmp-default-4.1.3_02_3.0.38_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566224" comment="xen-kmp-trace-4.1.3_02_3.0.38_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566225" comment="xen-libs-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566226" comment="xen-libs-32bit-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566227" comment="xen-tools-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566228" comment="xen-tools-domU-4.1.3_02-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566219" comment="vm-install-0.5.12-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566220" comment="xen-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566221" comment="xen-doc-html-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566222" comment="xen-doc-pdf-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566223" comment="xen-kmp-default-4.1.3_02_3.0.38_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566224" comment="xen-kmp-trace-4.1.3_02_3.0.38_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566225" comment="xen-libs-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566226" comment="xen-libs-32bit-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566227" comment="xen-tools-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566228" comment="xen-tools-domU-4.1.3_02-0.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218171" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="777890" ref_url="https://bugzilla.suse.com/777890" source="BUGZILLA"/>
		<reference ref_id="778105" ref_url="https://bugzilla.suse.com/778105" source="BUGZILLA"/>
		<reference ref_id="779212" ref_url="https://bugzilla.suse.com/779212" source="BUGZILLA"/>
		<reference ref_id="784087" ref_url="https://bugzilla.suse.com/784087" source="BUGZILLA"/>
		<reference ref_id="786516" ref_url="https://bugzilla.suse.com/786516" source="BUGZILLA"/>
		<reference ref_id="786517" ref_url="https://bugzilla.suse.com/786517" source="BUGZILLA"/>
		<reference ref_id="786518" ref_url="https://bugzilla.suse.com/786518" source="BUGZILLA"/>
		<reference ref_id="786519" ref_url="https://bugzilla.suse.com/786519" source="BUGZILLA"/>
		<reference ref_id="786520" ref_url="https://bugzilla.suse.com/786520" source="BUGZILLA"/>
		<reference ref_id="787163" ref_url="https://bugzilla.suse.com/787163" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3497" ref_url="https://www.suse.com/security/cve/CVE-2012-3497/" source="CVE"/>
		<reference ref_id="CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411/" source="CVE"/>
		<reference ref_id="CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535/" source="CVE"/>
		<reference ref_id="CVE-2012-4536" ref_url="https://www.suse.com/security/cve/CVE-2012-4536/" source="CVE"/>
		<reference ref_id="CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537/" source="CVE"/>
		<reference ref_id="CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538/" source="CVE"/>
		<reference ref_id="CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544/" source="CVE"/>
		<description>

XEN was updated to fix various bugs and security issues:

The following security issues have been fixed:

    * CVE-2012-4544: xen: Domain builder Out-of-memory due to malicious
      kernel/ramdisk (XSA 25)
    * CVE-2012-4411: XEN / qemu: guest administrator can access qemu
      monitor console (XSA-19)
    * CVE-2012-4535: xen: Timer overflow DoS vulnerability (XSA 20)
    * CVE-2012-4536: xen: pirq range check DoS vulnerability (XSA 21)
    * CVE-2012-4537: xen: Memory mapping failure DoS vulnerability (XSA 22)
    * CVE-2012-4538: xen: Unhooking empty PAE entries DoS vulnerability
      (XSA 23)
    * CVE-2012-4539: xen: Grant table hypercall infinite loop DoS
      vulnerability (XSA 24)
    * CVE-2012-3497: xen: multiple TMEM hypercall vulnerabilities (XSA-15)

Also the following bugs have been fixed and upstream patches have been 
applied:

    * 

      bnc#784087 - L3: Xen BUG at io_apic.c:129
      26102-x86-IOAPIC-legacy-not-first.patch

    * 

      Upstream patches merged:
      26054-x86-AMD-perf-ctr-init.patch
      26055-x86-oprof-hvm-mode.patch
      26056-page-alloc-flush-filter.patch
      26061-x86-oprof-counter-range.patch
      26062-ACPI-ERST-move-data.patch
      26063-x86-HPET-affinity-lock.patch
      26093-HVM-PoD-grant-mem-type.patch
      25931-x86-domctl-iomem-mapping-checks.patch
      25952-x86-MMIO-remap-permissions.patch
      25808-domain_create-return-value.patch
      25814-x86_64-set-debugreg-guest.patch
      25815-x86-PoD-no-bug-in-non-translated.patch
      25816-x86-hvm-map-pirq-range-check.patch
      25833-32on64-bogus-pt_base-adjust.patch
      25834-x86-S3-MSI-resume.patch
      25835-adjust-rcu-lock-domain.patch
      25836-VT-d-S3-MSI-resume.patch
      25850-tmem-xsa-15-1.patch
      25851-tmem-xsa-15-2.patch
      25852-tmem-xsa-15-3.patch
      25853-tmem-xsa-15-4.patch
      25854-tmem-xsa-15-5.patch
      25855-tmem-xsa-15-6.patch
      25856-tmem-xsa-15-7.patch
      25857-tmem-xsa-15-8.patch
      25858-tmem-xsa-15-9.patch
      25859-tmem-missing-break.patch
      25860-tmem-cleanup.patch
      25883-pt-MSI-cleanup.patch
      25927-x86-domctl-ioport-mapping-range.patch
      25929-tmem-restore-pool-version.patch

    * 

      bnc#778105 - first XEN-PV VM fails to spawn
      xend: Increase wait time for disk to appear in host bootloader
      Modified existing xen-domUloader.diff

      25752-ACPI-pm-op-valid-cpu.patch
      25754-x86-PoD-early-access.patch
      25755-x86-PoD-types.patch
      25756-x86-MMIO-max-mapped-pfn.patch

Security Issue references:

    * CVE-2012-4539
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539&gt;
    * CVE-2012-3497
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3497&gt;
    * CVE-2012-4411
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4411&gt;
    * CVE-2012-4535
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4535&gt;
    * CVE-2012-4537
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4537&gt;
    * CVE-2012-4536
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4536&gt;
    * CVE-2012-4538
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4538&gt;
    * CVE-2012-4539
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539&gt;
    * CVE-2012-4544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4544&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-02"/>
	<updated date="2012-11-02"/>
	<bugzilla href="https://bugzilla.suse.com/777890">SUSE bug 777890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778105">SUSE bug 778105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784087">SUSE bug 784087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786517">SUSE bug 786517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3497/">CVE-2012-3497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3497">CVE-2012-3497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4411">CVE-2012-4411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4535">CVE-2012-4535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4536/">CVE-2012-4536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4536">CVE-2012-4536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4537">CVE-2012-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4538">CVE-2012-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4539">CVE-2012-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4544">CVE-2012-4544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566229" comment="xen-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566230" comment="xen-doc-html-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566231" comment="xen-doc-pdf-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566232" comment="xen-kmp-default-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566233" comment="xen-kmp-pae-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566234" comment="xen-kmp-trace-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566235" comment="xen-libs-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566236" comment="xen-libs-32bit-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566237" comment="xen-tools-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566238" comment="xen-tools-domU-4.1.3_04-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566229" comment="xen-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566230" comment="xen-doc-html-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566231" comment="xen-doc-pdf-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566232" comment="xen-kmp-default-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566233" comment="xen-kmp-pae-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566234" comment="xen-kmp-trace-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566235" comment="xen-libs-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566236" comment="xen-libs-32bit-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566237" comment="xen-tools-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566238" comment="xen-tools-domU-4.1.3_04-0.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218172" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="801663" ref_url="https://bugzilla.suse.com/801663" source="BUGZILLA"/>
		<reference ref_id="809662" ref_url="https://bugzilla.suse.com/809662" source="BUGZILLA"/>
		<reference ref_id="813673" ref_url="https://bugzilla.suse.com/813673" source="BUGZILLA"/>
		<reference ref_id="813675" ref_url="https://bugzilla.suse.com/813675" source="BUGZILLA"/>
		<reference ref_id="813677" ref_url="https://bugzilla.suse.com/813677" source="BUGZILLA"/>
		<reference ref_id="814709" ref_url="https://bugzilla.suse.com/814709" source="BUGZILLA"/>
		<reference ref_id="816156" ref_url="https://bugzilla.suse.com/816156" source="BUGZILLA"/>
		<reference ref_id="816159" ref_url="https://bugzilla.suse.com/816159" source="BUGZILLA"/>
		<reference ref_id="816163" ref_url="https://bugzilla.suse.com/816163" source="BUGZILLA"/>
		<reference ref_id="819416" ref_url="https://bugzilla.suse.com/819416" source="BUGZILLA"/>
		<reference ref_id="820917" ref_url="https://bugzilla.suse.com/820917" source="BUGZILLA"/>
		<reference ref_id="820919" ref_url="https://bugzilla.suse.com/820919" source="BUGZILLA"/>
		<reference ref_id="820920" ref_url="https://bugzilla.suse.com/820920" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1917" ref_url="https://www.suse.com/security/cve/CVE-2013-1917/" source="CVE"/>
		<reference ref_id="CVE-2013-1918" ref_url="https://www.suse.com/security/cve/CVE-2013-1918/" source="CVE"/>
		<reference ref_id="CVE-2013-1919" ref_url="https://www.suse.com/security/cve/CVE-2013-1919/" source="CVE"/>
		<reference ref_id="CVE-2013-1920" ref_url="https://www.suse.com/security/cve/CVE-2013-1920/" source="CVE"/>
		<reference ref_id="CVE-2013-1952" ref_url="https://www.suse.com/security/cve/CVE-2013-1952/" source="CVE"/>
		<reference ref_id="CVE-2013-1964" ref_url="https://www.suse.com/security/cve/CVE-2013-1964/" source="CVE"/>
		<reference ref_id="CVE-2013-2072" ref_url="https://www.suse.com/security/cve/CVE-2013-2072/" source="CVE"/>
		<reference ref_id="CVE-2013-2076" ref_url="https://www.suse.com/security/cve/CVE-2013-2076/" source="CVE"/>
		<reference ref_id="CVE-2013-2077" ref_url="https://www.suse.com/security/cve/CVE-2013-2077/" source="CVE"/>
		<reference ref_id="CVE-2013-2078" ref_url="https://www.suse.com/security/cve/CVE-2013-2078/" source="CVE"/>
		<description>

XEN has been updated to 4.1.5 c/s 23509 to fix various bugs and security 
issues.

The following security issues have been fixed:

    * 

      CVE-2013-1918: Certain page table manipulation operations in Xen
      4.1.x, 4.2.x, and earlier were not preemptible, which allowed local
      PV kernels to cause a denial of service via vectors related to deep
      page table traversal.

    * 

      CVE-2013-1952: Xen 4.x, when using Intel VT-d for a bus mastering
      capable PCI device, did not properly check the source when accessing
      a bridge devices interrupt remapping table entries for MSI
      interrupts, which allowed local guest domains to cause a denial of
      service (interrupt injection) via unspecified vectors.

    * 

      CVE-2013-2076: A information leak in the XSAVE/XRSTOR instructions
      could be used to determine state of floating point operations in
      other domains.

    * 

      CVE-2013-2077: A denial of service (hypervisor crash) was possible
      due to missing exception recovery on XRSTOR, that could be used to
      crash the machine by PV guest users.

    * 

      CVE-2013-2078: A denial of service (hypervisor crash) was possible
      due to missing exception recovery on XSETBV, that could be used to
      crash the machine by PV guest users.

    * 

      CVE-2013-2072: Systems which allow untrusted administrators to
      configure guest vcpu affinity may be exploited to trigger a buffer
      overrun and corrupt memory.

    * 

      CVE-2013-1917: Xen 3.1 through 4.x, when running 64-bit hosts on
      Intel CPUs, did not clear the NT flag when using an IRET after a
      SYSENTER instruction, which allowed PV guest users to cause a denial
      of service (hypervisor crash) by triggering a #GP fault, which is not
      properly handled by another IRET instruction.

    * 

      CVE-2013-1919: Xen 4.2.x and 4.1.x did not properly restrict access
      to IRQs, which allowed local stub domain clients to gain access to
      IRQs and cause a denial of service via vectors related to
      'passed-through IRQs or PCI devices.'

    * 

      CVE-2013-1920: Xen 4.2.x, 4.1.x, and earlier, when the hypervisor is
      running 'under memory pressure' and the Xen Security Module (XSM) is
      enabled, used the wrong ordering of operations when extending the
      per-domain event channel tracking table, which caused a
      use-after-free and allowed local guest kernels to inject arbitrary
      events and gain privileges via unspecified vectors.

    * 

      CVE-2013-1964: Xen 4.0.x and 4.1.x incorrectly released a grant
      reference when releasing a non-v1, non-transitive grant, which
      allowed local guest administrators to cause a denial of service (host
      crash), obtain sensitive information, or possible have other impacts
      via unspecified vectors.

Bugfixes:

    * 

      Upstream patches from Jan
      26956-x86-mm-preemptible-cleanup.patch
      27071-x86-IO-APIC-fix-guest-RTE-write-corner-cases.patch
      27072-x86-shadow-fix-off-by-one-in-MMIO-permission-check.patch
      27079-fix-XSA-46-regression-with-xend-xm.patch
      27083-AMD-iommu-SR56x0-Erratum-64-Reset-all-head-tail-pointers.patch

    * 

      Update to Xen 4.1.5 c/s 23509
      There were many xen.spec file patches dropped as now being included
      in the 4.1.5 tarball.

    * 

      bnc#809662 - can't use pv-grub to start domU (pygrub does work)
      xen.spec

    * 

      Upstream patches from Jan
      26702-powernow-add-fixups-for-AMD-P-state-figures.patch
      26704-x86-MCA-suppress-bank-clearing-for-certain-injected-events.patch
      26731-AMD-IOMMU-Process-softirqs-while-building-dom0-iommu-mappings.patch
      26733-VT-d-Enumerate-IOMMUs-when-listing-capabilities.patch
      26734-ACPI-ERST-Name-table-in-otherwise-opaque-error-messages.patch
      26736-ACPI-APEI-Unlock-apei_iomaps_lock-on-error-path.patch
      26737-ACPI-APEI-Add-apei_exec_run_optional.patch
      26742-IOMMU-properly-check-whether-interrupt-remapping-is-enabled.patch
      26743-VT-d-deal-with-5500-5520-X58-errata.patch
      26744-AMD-IOMMU-allow-disabling-only-interrupt-remapping.patch
      26749-x86-reserve-pages-when-SandyBridge-integrated-graphics.patch
      26765-hvm-Clean-up-vlapic_reg_write-error-propagation.patch
      26770-x86-irq_move_cleanup_interrupt-must-ignore-legacy-vectors.patch
      26771-x86-S3-Restore-broken-vcpu-affinity-on-resume.patch
      26772-VMX-Always-disable-SMEP-when-guest-is-in-non-paging-mode.patch
      26773-x86-mm-shadow-spurious-warning-when-unmapping-xenheap-pages.patch
      26799-x86-don-t-pass-negative-time-to-gtime_to_gtsc.patch
      26851-iommu-crash-Interrupt-remapping-is-also-disabled-on-crash.patch

    * 

      bnc#814709 - Unable to create XEN virtual machines in SLED 11 SP2 on
      Kyoto
      xend-cpuinfo-model-name.patch

    * 

      Upstream patches from Jan
      26536-xenoprof-div-by-0.patch
      26578-AMD-IOMMU-replace-BUG_ON.patch
      26656-x86-fix-null-pointer-dereference-in-intel_get_extended_msrs.patch
      26659-AMD-IOMMU-erratum-746-workaround.patch
      26660-x86-fix-CMCI-injection.patch
      26672-vmx-fix-handling-of-NMI-VMEXIT.patch
      26673-Avoid-stale-pointer-when-moving-domain-to-another-cpupool.patch
      26676-fix-compat-memory-exchange-op-splitting.patch
      26677-x86-make-certain-memory-sub-ops-return-valid-values.patch
      26678-SEDF-avoid-gathering-vCPU-s-on-pCPU0.patch
      26679-x86-defer-processing-events-on-the-NMI-exit-path.patch
      26683-credit1-Use-atomic-bit-operations-for-the-flags-structure.patch
      26692-x86-MSI-fully-protect-MSI-X-table.patch

Security Issue references:

    * CVE-2013-1917
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1917&gt;
    * CVE-2013-1918
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1918&gt;
    * CVE-2013-1919
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1919&gt;
    * CVE-2013-1920
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1920&gt;
    * CVE-2013-1952
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1952&gt;
    * CVE-2013-1964
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1964&gt;
    * CVE-2013-2072
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2072&gt;
    * CVE-2013-2076
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076&gt;
    * CVE-2013-2077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077&gt;
    * CVE-2013-2078
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-31"/>
	<updated date="2013-05-31"/>
	<bugzilla href="https://bugzilla.suse.com/801663">SUSE bug 801663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809662">SUSE bug 809662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813675">SUSE bug 813675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813677">SUSE bug 813677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814709">SUSE bug 814709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816156">SUSE bug 816156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816159">SUSE bug 816159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816163">SUSE bug 816163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819416">SUSE bug 819416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820917">SUSE bug 820917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820919">SUSE bug 820919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820920">SUSE bug 820920</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1917/">CVE-2013-1917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1917">CVE-2013-1917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1918/">CVE-2013-1918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1918">CVE-2013-1918 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1919/">CVE-2013-1919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1919">CVE-2013-1919 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1920/">CVE-2013-1920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1920">CVE-2013-1920 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1952/">CVE-2013-1952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1952">CVE-2013-1952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1964/">CVE-2013-1964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1964">CVE-2013-1964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2072/">CVE-2013-2072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2072">CVE-2013-2072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2076/">CVE-2013-2076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2076">CVE-2013-2076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2077/">CVE-2013-2077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2077">CVE-2013-2077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2078/">CVE-2013-2078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2078">CVE-2013-2078 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566239" comment="xen-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566240" comment="xen-doc-html-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566241" comment="xen-doc-pdf-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566242" comment="xen-kmp-default-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566243" comment="xen-kmp-pae-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566244" comment="xen-kmp-trace-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566245" comment="xen-libs-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566246" comment="xen-libs-32bit-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566247" comment="xen-tools-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566248" comment="xen-tools-domU-4.1.5_02-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566239" comment="xen-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566240" comment="xen-doc-html-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566241" comment="xen-doc-pdf-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566242" comment="xen-kmp-default-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566243" comment="xen-kmp-pae-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566244" comment="xen-kmp-trace-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566245" comment="xen-libs-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566246" comment="xen-libs-32bit-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566247" comment="xen-tools-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566248" comment="xen-tools-domU-4.1.5_02-0.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218173" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="803712" ref_url="https://bugzilla.suse.com/803712" source="BUGZILLA"/>
		<reference ref_id="823011" ref_url="https://bugzilla.suse.com/823011" source="BUGZILLA"/>
		<reference ref_id="823608" ref_url="https://bugzilla.suse.com/823608" source="BUGZILLA"/>
		<reference ref_id="823786" ref_url="https://bugzilla.suse.com/823786" source="BUGZILLA"/>
		<reference ref_id="824676" ref_url="https://bugzilla.suse.com/824676" source="BUGZILLA"/>
		<reference ref_id="826882" ref_url="https://bugzilla.suse.com/826882" source="BUGZILLA"/>
		<reference ref_id="828623" ref_url="https://bugzilla.suse.com/828623" source="BUGZILLA"/>
		<reference ref_id="833251" ref_url="https://bugzilla.suse.com/833251" source="BUGZILLA"/>
		<reference ref_id="833796" ref_url="https://bugzilla.suse.com/833796" source="BUGZILLA"/>
		<reference ref_id="834751" ref_url="https://bugzilla.suse.com/834751" source="BUGZILLA"/>
		<reference ref_id="839596" ref_url="https://bugzilla.suse.com/839596" source="BUGZILLA"/>
		<reference ref_id="839600" ref_url="https://bugzilla.suse.com/839600" source="BUGZILLA"/>
		<reference ref_id="839618" ref_url="https://bugzilla.suse.com/839618" source="BUGZILLA"/>
		<reference ref_id="840196" ref_url="https://bugzilla.suse.com/840196" source="BUGZILLA"/>
		<reference ref_id="840592" ref_url="https://bugzilla.suse.com/840592" source="BUGZILLA"/>
		<reference ref_id="841766" ref_url="https://bugzilla.suse.com/841766" source="BUGZILLA"/>
		<reference ref_id="842511" ref_url="https://bugzilla.suse.com/842511" source="BUGZILLA"/>
		<reference ref_id="845520" ref_url="https://bugzilla.suse.com/845520" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1432" ref_url="https://www.suse.com/security/cve/CVE-2013-1432/" source="CVE"/>
		<reference ref_id="CVE-2013-1442" ref_url="https://www.suse.com/security/cve/CVE-2013-1442/" source="CVE"/>
		<reference ref_id="CVE-2013-2194" ref_url="https://www.suse.com/security/cve/CVE-2013-2194/" source="CVE"/>
		<reference ref_id="CVE-2013-2195" ref_url="https://www.suse.com/security/cve/CVE-2013-2195/" source="CVE"/>
		<reference ref_id="CVE-2013-2196" ref_url="https://www.suse.com/security/cve/CVE-2013-2196/" source="CVE"/>
		<reference ref_id="CVE-2013-2211" ref_url="https://www.suse.com/security/cve/CVE-2013-2211/" source="CVE"/>
		<reference ref_id="CVE-2013-4329" ref_url="https://www.suse.com/security/cve/CVE-2013-4329/" source="CVE"/>
		<reference ref_id="CVE-2013-4355" ref_url="https://www.suse.com/security/cve/CVE-2013-4355/" source="CVE"/>
		<reference ref_id="CVE-2013-4361" ref_url="https://www.suse.com/security/cve/CVE-2013-4361/" source="CVE"/>
		<reference ref_id="CVE-2013-4368" ref_url="https://www.suse.com/security/cve/CVE-2013-4368/" source="CVE"/>
		<reference ref_id="CVE-2013-4416" ref_url="https://www.suse.com/security/cve/CVE-2013-4416/" source="CVE"/>
		<description>

XEN has been updated to version 4.1.6 which fixes various bugs and security 
issues.

    * CVE-2013-4416: XSA-72: Fixed ocaml xenstored that mishandled
      oversized message replies.
    * CVE-2013-4355: XSA-63: Fixed information leaks through I/O
      instruction emulation
    * CVE-2013-4361: XSA-66: Fixed information leak through fbld
      instruction emulation
    * CVE-2013-4368: XSA-67: Fixed information leak through outs
      instruction emulation
    * CVE-2013-1442: XSA-62: Fixed information leak on AVX and/or LWP
      capable CPUs
    * CVE-2013-4329: XSA-61: libxl partially sets up HVM passthrough even
      with disabled iommu
    * CVE-2013-1432: XSA-58: x86: fix page refcount handling in page table
      pin error path
    * CVE-2013-2211: XSA-57: libxl allows guest write access to sensitive
      console related xenstore keys
    * xen: XSA-55: Multiple vulnerabilities in libelf PV kernel handling
      (CVE-2013-2194 CVE-2013-2195 CVE-2013-2196)

Various bugs have also been fixed:

    * Improvements to block-dmmd script (bnc#828623)
    * MTU size on Dom0 gets reset when booting DomU with e1000 device
      (bnc#840196)
    * In HP's UEFI x86_64 platform and with xen environment, in booting
      stage ,xen hypervisor will panic. (bnc#833251)
    * Xen: migration broken from xsave-capable to xsave-incapable host
      (bnc#833796)
    * In xen, 'shutdown -y 0 -h' cannot power off system (bnc#834751)
    * In HP's UEFI x86_64 platform and sles11sp3 with xen environment, xen
      hypervisor will panic on multiple blades nPar. (bnc#839600)
    * Failed to setup devices for vm instance when start multiple vms
      simultaneously (bnc#824676)
    * migrate.py support of short options dropped by PTF (bnc#824676)
    * after live migration rcu_sched_state detected stalls add new option
      xm migrate --min_remaing (bnc#803712)
    * various upstream fixes have been included

Security Issue references:

    * CVE-2013-1432
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432&gt;
    * CVE-2013-1442
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442&gt;
    * CVE-2013-2194
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194&gt;
    * CVE-2013-2195
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195&gt;
    * CVE-2013-2196
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196&gt;
    * CVE-2013-2211
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211&gt;
    * CVE-2013-4329
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329&gt;
    * CVE-2013-4355
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355&gt;
    * CVE-2013-4361
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361&gt;
    * CVE-2013-4368
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368&gt;
    * CVE-2013-4416
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4416&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-29"/>
	<updated date="2013-10-29"/>
	<bugzilla href="https://bugzilla.suse.com/803712">SUSE bug 803712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823011">SUSE bug 823011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823608">SUSE bug 823608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823786">SUSE bug 823786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824676">SUSE bug 824676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826882">SUSE bug 826882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828623">SUSE bug 828623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833251">SUSE bug 833251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833796">SUSE bug 833796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834751">SUSE bug 834751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839596">SUSE bug 839596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839600">SUSE bug 839600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839618">SUSE bug 839618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840196">SUSE bug 840196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841766">SUSE bug 841766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842511">SUSE bug 842511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845520">SUSE bug 845520</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1432/">CVE-2013-1432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1432">CVE-2013-1432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1442/">CVE-2013-1442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1442">CVE-2013-1442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2194/">CVE-2013-2194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2194">CVE-2013-2194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2195/">CVE-2013-2195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2195">CVE-2013-2195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2196/">CVE-2013-2196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2196">CVE-2013-2196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2211/">CVE-2013-2211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2211">CVE-2013-2211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4329/">CVE-2013-4329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4329">CVE-2013-4329 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4355/">CVE-2013-4355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4355">CVE-2013-4355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4361/">CVE-2013-4361 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4361">CVE-2013-4361 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4368/">CVE-2013-4368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4368">CVE-2013-4368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4416/">CVE-2013-4416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4416">CVE-2013-4416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566249" comment="xen-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566250" comment="xen-doc-html-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566251" comment="xen-doc-pdf-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566252" comment="xen-kmp-default-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566253" comment="xen-kmp-pae-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566254" comment="xen-kmp-trace-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566255" comment="xen-libs-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566256" comment="xen-libs-32bit-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566257" comment="xen-tools-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566258" comment="xen-tools-domU-4.1.6_02-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566249" comment="xen-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566250" comment="xen-doc-html-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566251" comment="xen-doc-pdf-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566252" comment="xen-kmp-default-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566253" comment="xen-kmp-pae-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566254" comment="xen-kmp-trace-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566255" comment="xen-libs-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566256" comment="xen-libs-32bit-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566257" comment="xen-tools-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566258" comment="xen-tools-domU-4.1.6_02-0.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218174" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="840997" ref_url="https://bugzilla.suse.com/840997" source="BUGZILLA"/>
		<reference ref_id="848657" ref_url="https://bugzilla.suse.com/848657" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4494" ref_url="https://www.suse.com/security/cve/CVE-2013-4494/" source="CVE"/>
		<description>

Xen has been updated to fix a security issue and a bug:

    * CVE-2013-4494: XSA-73: A lock order reversal between page allocation
      and grant table locks could lead to host crashes or even host code
      execution.

A non-security bug has also been fixed:

    * It is possible to start a VM twice on the same node (bnc#840997)

Security Issue references:

    * CVE-2013-4494
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-25"/>
	<updated date="2013-11-25"/>
	<bugzilla href="https://bugzilla.suse.com/840997">SUSE bug 840997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848657">SUSE bug 848657</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4494/">CVE-2013-4494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4494">CVE-2013-4494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566259" comment="xen-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566260" comment="xen-doc-html-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566261" comment="xen-doc-pdf-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566262" comment="xen-kmp-default-4.1.6_04_3.0.101_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566263" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566264" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566265" comment="xen-libs-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566266" comment="xen-libs-32bit-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566267" comment="xen-tools-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566268" comment="xen-tools-domU-4.1.6_04-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566259" comment="xen-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566260" comment="xen-doc-html-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566261" comment="xen-doc-pdf-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566262" comment="xen-kmp-default-4.1.6_04_3.0.101_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566263" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566264" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566265" comment="xen-libs-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566266" comment="xen-libs-32bit-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566267" comment="xen-tools-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566268" comment="xen-tools-domU-4.1.6_04-0.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218175" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="831120" ref_url="https://bugzilla.suse.com/831120" source="BUGZILLA"/>
		<reference ref_id="833483" ref_url="https://bugzilla.suse.com/833483" source="BUGZILLA"/>
		<reference ref_id="842417" ref_url="https://bugzilla.suse.com/842417" source="BUGZILLA"/>
		<reference ref_id="846849" ref_url="https://bugzilla.suse.com/846849" source="BUGZILLA"/>
		<reference ref_id="848014" ref_url="https://bugzilla.suse.com/848014" source="BUGZILLA"/>
		<reference ref_id="849667" ref_url="https://bugzilla.suse.com/849667" source="BUGZILLA"/>
		<reference ref_id="849668" ref_url="https://bugzilla.suse.com/849668" source="BUGZILLA"/>
		<reference ref_id="853049" ref_url="https://bugzilla.suse.com/853049" source="BUGZILLA"/>
		<reference ref_id="860163" ref_url="https://bugzilla.suse.com/860163" source="BUGZILLA"/>
		<reference ref_id="860302" ref_url="https://bugzilla.suse.com/860302" source="BUGZILLA"/>
		<reference ref_id="861256" ref_url="https://bugzilla.suse.com/861256" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2212" ref_url="https://www.suse.com/security/cve/CVE-2013-2212/" source="CVE"/>
		<reference ref_id="CVE-2013-4553" ref_url="https://www.suse.com/security/cve/CVE-2013-4553/" source="CVE"/>
		<reference ref_id="CVE-2013-4554" ref_url="https://www.suse.com/security/cve/CVE-2013-4554/" source="CVE"/>
		<reference ref_id="CVE-2013-6885" ref_url="https://www.suse.com/security/cve/CVE-2013-6885/" source="CVE"/>
		<reference ref_id="CVE-2014-1666" ref_url="https://www.suse.com/security/cve/CVE-2014-1666/" source="CVE"/>
		<reference ref_id="CVE-2014-1891" ref_url="https://www.suse.com/security/cve/CVE-2014-1891/" source="CVE"/>
		<reference ref_id="CVE-2014-1892" ref_url="https://www.suse.com/security/cve/CVE-2014-1892/" source="CVE"/>
		<reference ref_id="CVE-2014-1893" ref_url="https://www.suse.com/security/cve/CVE-2014-1893/" source="CVE"/>
		<reference ref_id="CVE-2014-1894" ref_url="https://www.suse.com/security/cve/CVE-2014-1894/" source="CVE"/>
		<reference ref_id="CVE-2014-1950" ref_url="https://www.suse.com/security/cve/CVE-2014-1950/" source="CVE"/>
		<description>

The SUSE Linux Enterprise Server 11 Service Pack 2 LTSS Xen hypervisor and 
toolset has been updated to fix various security issues and several bugs.

The following security issues have been addressed:

    * 

      XSA-88: CVE-2014-1950: Use-after-free vulnerability in the
      xc_cpupool_getinfo function in Xen 4.1.x through 4.3.x, when using a
      multithreaded toolstack, does not properly handle a failure by the
      xc_cpumap_alloc function, which allows local users with access to
      management functions to cause a denial of service (heap corruption)
      and possibly gain privileges via unspecified vectors. (bnc#861256)

    * 

      XSA-87: CVE-2014-1666: The do_physdev_op function in Xen 4.1.5,
      4.1.6.1, 4.2.2 through 4.2.3, and 4.3.x does not properly restrict
      access to the (1) PHYSDEVOP_prepare_msix and (2)
      PHYSDEVOP_release_msix operations, which allows local PV guests to
      cause a denial of service (host or guest malfunction) or possibly
      gain privileges via unspecified vectors. (bnc#860302)

    * 

      XSA-84: CVE-2014-1894: Xen 3.2 (and presumably earlier) exhibit both
      problems with the overflow issue being present for more than just the
      suboperations listed above. (bnc#860163)

    * 

      XSA-84: CVE-2014-1892 CVE-2014-1893: Xen 3.3 through 4.1, while not
      affected by the above overflow, have a different overflow issue on
      FLASK_{GET,SET}BOOL and expose unreasonably large memory allocation
      to aribitrary guests. (bnc#860163)

    * 

      XSA-84: CVE-2014-1891: The FLASK_{GET,SET}BOOL, FLASK_USER and
      FLASK_CONTEXT_TO_SID suboperations of the flask hypercall are
      vulnerable to an integer overflow on the input size. The hypercalls
      attempt to allocate a buffer which is 1 larger than this size and is
      therefore vulnerable to integer overflow and an attempt to allocate
      then access a zero byte buffer. (bnc#860163)

    * 

      XSA-82: CVE-2013-6885: The microcode on AMD 16h 00h through 0Fh
      processors does not properly handle the interaction between locked
      instructions and write-combined memory types, which allows local
      users to cause a denial of service (system hang) via a crafted
      application, aka the errata 793 issue. (bnc#853049)

    * 

      XSA-76: CVE-2013-4554: Xen 3.0.3 through 4.1.x (possibly 4.1.6.1),
      4.2.x (possibly 4.2.3), and 4.3.x (possibly 4.3.1) does not properly
      prevent access to hypercalls, which allows local guest users to gain
      privileges via a crafted application running in ring 1 or 2.
      (bnc#849668)

    * 

      XSA-74: CVE-2013-4553: The XEN_DOMCTL_getmemlist hypercall in Xen
      3.4.x through 4.3.x (possibly 4.3.1) does not always obtain the
      page_alloc_lock and mm_rwlock in the same order, which allows local
      guest administrators to cause a denial of service (host deadlock).
      (bnc#849667)

    * 

      XSA-60: CVE-2013-2212: The vmx_set_uc_mode function in Xen 3.3
      through 4.3, when disabling chaches, allows local HVM guests with
      access to memory mapped I/O regions to cause a denial of service (CPU
      consumption and possibly hypervisor or guest kernel panic) via a
      crafted GFN range. (bnc#831120)

Also the following non-security bugs have been fixed:

    * Boot Failure with xen kernel in UEFI mode with error 'No memory for
      trampoline' (bnc#833483)
    * Fixed Xen hypervisor panic on 8-blades nPar with 46-bit memory
      addressing. (bnc#848014)
    * In HP's UEFI x86_64 platform and sles11sp3 with xen environment, dom0
      will soft lockup on multiple blades nPar. (bnc#842417)
    * Soft lockup with PCI passthrough and many VCPUs (bnc#846849)

Security Issue references:

    * CVE-2013-2212
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2212&gt;
    * CVE-2013-4553
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553&gt;
    * CVE-2013-4554
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4554&gt;
    * CVE-2013-6885
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6885&gt;
    * CVE-2014-1666
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1666&gt;
    * CVE-2014-1891
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1891&gt;
    * CVE-2014-1892
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1892&gt;
    * CVE-2014-1893
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1893&gt;
    * CVE-2014-1894
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1894&gt;
    * CVE-2014-1950
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-28"/>
	<updated date="2014-02-28"/>
	<bugzilla href="https://bugzilla.suse.com/831120">SUSE bug 831120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833483">SUSE bug 833483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842417">SUSE bug 842417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846849">SUSE bug 846849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848014">SUSE bug 848014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849667">SUSE bug 849667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849668">SUSE bug 849668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853049">SUSE bug 853049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860163">SUSE bug 860163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860302">SUSE bug 860302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861256">SUSE bug 861256</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2212/">CVE-2013-2212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2212">CVE-2013-2212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4553/">CVE-2013-4553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4553">CVE-2013-4553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4554/">CVE-2013-4554 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4554">CVE-2013-4554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6885/">CVE-2013-6885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6885">CVE-2013-6885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1666/">CVE-2014-1666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1666">CVE-2014-1666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1891/">CVE-2014-1891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1891">CVE-2014-1891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1892/">CVE-2014-1892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1892">CVE-2014-1892 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1893/">CVE-2014-1893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1893">CVE-2014-1893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1894/">CVE-2014-1894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1894">CVE-2014-1894 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1950/">CVE-2014-1950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1950">CVE-2014-1950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577029" comment="xen-4.1.6_06-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577030" comment="xen-devel-4.1.6_06-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577031" comment="xen-doc-html-4.1.6_06-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577032" comment="xen-doc-pdf-4.1.6_06-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577033" comment="xen-kmp-default-4.1.6_06_3.0.101_0.7.17-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577034" comment="xen-kmp-pae-4.1.6_06_3.0.101_0.7.17-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577035" comment="xen-kmp-trace-4.1.6_06_3.0.101_0.7.17-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577036" comment="xen-libs-4.1.6_06-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577037" comment="xen-libs-32bit-4.1.6_06-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577038" comment="xen-tools-4.1.6_06-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577039" comment="xen-tools-domU-4.1.6_06-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218176" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="907755" ref_url="https://bugzilla.suse.com/907755" source="BUGZILLA"/>
		<reference ref_id="918995" ref_url="https://bugzilla.suse.com/918995" source="BUGZILLA"/>
		<reference ref_id="918998" ref_url="https://bugzilla.suse.com/918998" source="BUGZILLA"/>
		<reference ref_id="919464" ref_url="https://bugzilla.suse.com/919464" source="BUGZILLA"/>
		<reference ref_id="922705" ref_url="https://bugzilla.suse.com/922705" source="BUGZILLA"/>
		<reference ref_id="922706" ref_url="https://bugzilla.suse.com/922706" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2044" ref_url="https://www.suse.com/security/cve/CVE-2015-2044/" source="CVE"/>
		<reference ref_id="CVE-2015-2045" ref_url="https://www.suse.com/security/cve/CVE-2015-2045/" source="CVE"/>
		<reference ref_id="CVE-2015-2151" ref_url="https://www.suse.com/security/cve/CVE-2015-2151/" source="CVE"/>
		<reference ref_id="CVE-2015-2756" ref_url="https://www.suse.com/security/cve/CVE-2015-2756/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001356.html" source="SUSE-SU"/>
		<description>

The Virtualization service XEN was updated to fix various bugs and security 
issues.

The following security issues have been fixed:

    * 

      CVE-2015-2756: XSA-126: Unmediated PCI command register access in
      qemu could have lead to denial of service attacks against the host,
      if PCI cards are passed through to guests.

    * 

      XSA-125: Long latency MMIO mapping operations were not preemptible.

    * 

      CVE-2015-2151: XSA-123: Instructions with register operands ignored
      eventual segment overrides encoded for them. Due to an insufficiently
      conditional assignment such a bogus segment override could have,
      however, corrupted a pointer used subsequently to store the result of
      the instruction.

    * 

      CVE-2015-2045: XSA-122: The code handling certain sub-operations of
      the HYPERVISOR_xen_version hypercall failed to fully initialize all
      fields of structures subsequently copied back to guest memory. Due to
      this hypervisor stack contents were copied into the destination of
      the operation, thus becoming visible to the guest.

    * 

      CVE-2015-2044: XSA-121: Emulation routines in the hypervisor dealing
      with certain system devices checked whether the access size by the
      guest is a supported one. When the access size is unsupported these
      routines failed to set the data to be returned to the guest for read
      accesses, so that hypervisor stack contents were copied into the
      destination of the operation, thus becoming visible to the guest.

Also fixed:

    * Regular crashes of dom-0 on different servers due to races in MCE
      access were fixed. bsc#907755

Security Issues:

    * CVE-2015-2044
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2044&gt;
    * CVE-2015-2045
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2045&gt;
    * CVE-2015-2151
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2151&gt;
    * CVE-2015-2756
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-30"/>
	<updated date="2015-03-30"/>
	<bugzilla href="https://bugzilla.suse.com/907755">SUSE bug 907755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918995">SUSE bug 918995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919464">SUSE bug 919464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922705">SUSE bug 922705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922706">SUSE bug 922706</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2044/">CVE-2015-2044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2044">CVE-2015-2044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2045/">CVE-2015-2045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2045">CVE-2015-2045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2151/">CVE-2015-2151 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2151">CVE-2015-2151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2756/">CVE-2015-2756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2756">CVE-2015-2756 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577040" comment="xen-4.1.6_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577041" comment="xen-devel-4.1.6_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577042" comment="xen-doc-html-4.1.6_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577043" comment="xen-doc-pdf-4.1.6_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577044" comment="xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577045" comment="xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577046" comment="xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577047" comment="xen-libs-4.1.6_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577048" comment="xen-libs-32bit-4.1.6_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577049" comment="xen-tools-4.1.6_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577050" comment="xen-tools-domU-4.1.6_08-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218177" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="931625" ref_url="https://bugzilla.suse.com/931625" source="BUGZILLA"/>
		<reference ref_id="931626" ref_url="https://bugzilla.suse.com/931626" source="BUGZILLA"/>
		<reference ref_id="931627" ref_url="https://bugzilla.suse.com/931627" source="BUGZILLA"/>
		<reference ref_id="931628" ref_url="https://bugzilla.suse.com/931628" source="BUGZILLA"/>
		<reference ref_id="932770" ref_url="https://bugzilla.suse.com/932770" source="BUGZILLA"/>
		<reference ref_id="932996" ref_url="https://bugzilla.suse.com/932996" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-4103" ref_url="https://www.suse.com/security/cve/CVE-2015-4103/" source="CVE"/>
		<reference ref_id="CVE-2015-4104" ref_url="https://www.suse.com/security/cve/CVE-2015-4104/" source="CVE"/>
		<reference ref_id="CVE-2015-4105" ref_url="https://www.suse.com/security/cve/CVE-2015-4105/" source="CVE"/>
		<reference ref_id="CVE-2015-4106" ref_url="https://www.suse.com/security/cve/CVE-2015-4106/" source="CVE"/>
		<reference ref_id="CVE-2015-4163" ref_url="https://www.suse.com/security/cve/CVE-2015-4163/" source="CVE"/>
		<reference ref_id="CVE-2015-4164" ref_url="https://www.suse.com/security/cve/CVE-2015-4164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001468.html" source="SUSE-SU"/>
		<description>

Xen was updated to fix six security issues:

    * CVE-2015-4103: Potential unintended writes to host MSI message data
      field via qemu. (XSA-128, bsc#931625)
    * CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests.
      (XSA-129, bsc#931626)
    * CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error
      messages. (XSA-130, bsc#931627)
    * CVE-2015-4106: Unmediated PCI register access in qemu. (XSA-131,
      bsc#931628)
    * CVE-2015-3209: Heap overflow in qemu pcnet controller allowing guest
      to host escape. (XSA-135, bsc#932770)
    * CVE-2015-4164: DoS through iret hypercall handler. (XSA-136,
      bsc#932996)

Security Issues:

    * CVE-2015-4103
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103&gt;
    * CVE-2015-4104
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104&gt;
    * CVE-2015-4105
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105&gt;
    * CVE-2015-4106
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106&gt;
    * CVE-2015-4163
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163&gt;
    * CVE-2015-4164
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164&gt;
    * CVE-2015-3209
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-05"/>
	<updated date="2015-06-05"/>
	<bugzilla href="https://bugzilla.suse.com/931625">SUSE bug 931625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931626">SUSE bug 931626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931627">SUSE bug 931627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931628">SUSE bug 931628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932770">SUSE bug 932770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932996">SUSE bug 932996</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3209">CVE-2015-3209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4103/">CVE-2015-4103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4103">CVE-2015-4103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4104/">CVE-2015-4104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4104">CVE-2015-4104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4105/">CVE-2015-4105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4105">CVE-2015-4105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4106/">CVE-2015-4106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4106">CVE-2015-4106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4163/">CVE-2015-4163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4163">CVE-2015-4163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4164/">CVE-2015-4164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4164">CVE-2015-4164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577051" comment="xen-4.1.6_08-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577052" comment="xen-devel-4.1.6_08-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577053" comment="xen-doc-html-4.1.6_08-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577054" comment="xen-doc-pdf-4.1.6_08-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577055" comment="xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577056" comment="xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577057" comment="xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577058" comment="xen-libs-4.1.6_08-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577059" comment="xen-libs-32bit-4.1.6_08-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577060" comment="xen-tools-4.1.6_08-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577061" comment="xen-tools-domU-4.1.6_08-0.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218178" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950704" ref_url="https://bugzilla.suse.com/950704" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="951845" ref_url="https://bugzilla.suse.com/951845" source="BUGZILLA"/>
		<reference ref_id="953527" ref_url="https://bugzilla.suse.com/953527" source="BUGZILLA"/>
		<reference ref_id="954405" ref_url="https://bugzilla.suse.com/954405" source="BUGZILLA"/>
		<reference ref_id="956408" ref_url="https://bugzilla.suse.com/956408" source="BUGZILLA"/>
		<reference ref_id="956411" ref_url="https://bugzilla.suse.com/956411" source="BUGZILLA"/>
		<reference ref_id="956832" ref_url="https://bugzilla.suse.com/956832" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<description>


This update fixes the following security issues:

- bsc#956832 -  CVE-2015-8345: xen: qemu: net: eepro100:
  infinite loop in processing command block list

- bsc#956408 -  CVE-2015-8339, CVE-2015-8340: xen:
  XENMEM_exchange error handling issues (XSA-159)
  xsa159.patch
- bsc#956411 -  CVE-2015-7504: xen: heap buffer overflow
  vulnerability in pcnet emulator (XSA-162)

- bsc#954405 -  CVE-2015-8104: Xen: guest to host DoS by
  triggering an infinite loop in microcode via #DB exception
- bsc#953527 -  CVE-2015-5307: kernel: kvm/xen: x86: avoid
  guest-&gt;host DOS by intercepting #AC (XSA-156)

- bsc#950704 -  CVE-2015-7970: xen: x86: Long latency
  populate-on-demand operation is not preemptible (XSA-150)

- bsc#951845 -  CVE-2015-7972: xen: x86: populate-on-demand
  balloon size inaccuracy can crash guests (XSA-153)

- bsc#950703 -  CVE-2015-7969: xen: leak of main per-domain
  vcpu pointer array (DoS) (XSA-149)
- bsc#950705 -  CVE-2015-7969: xen: x86: leak of per-domain
  profiling-related vcpu pointer array (DoS) (XSA-151)
- bsc#950706 -  CVE-2015-7971: xen: x86: some pmu and
  profiling hypercalls log without rate limiting (XSA-152)		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-18"/>
	<updated date="2015-12-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950704">SUSE bug 950704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951845">SUSE bug 951845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956411">SUSE bug 956411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956832">SUSE bug 956832</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5307">CVE-2015-5307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7504">CVE-2015-7504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7969">CVE-2015-7969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7970">CVE-2015-7970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7971">CVE-2015-7971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7972">CVE-2015-7972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8104">CVE-2015-8104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8339">CVE-2015-8339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8340">CVE-2015-8340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8345">CVE-2015-8345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577062" comment="xen-4.1.6_08-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577063" comment="xen-devel-4.1.6_08-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577064" comment="xen-doc-html-4.1.6_08-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577065" comment="xen-doc-pdf-4.1.6_08-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577066" comment="xen-kmp-default-4.1.6_08_3.0.101_0.7.37-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577067" comment="xen-kmp-pae-4.1.6_08_3.0.101_0.7.37-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577068" comment="xen-kmp-trace-4.1.6_08_3.0.101_0.7.37-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577069" comment="xen-libs-4.1.6_08-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577070" comment="xen-libs-32bit-4.1.6_08-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577071" comment="xen-tools-4.1.6_08-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577072" comment="xen-tools-domU-4.1.6_08-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218179" version="1" class="patch">
	<metadata>
		<title>Security update for xinetd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="762294" ref_url="https://bugzilla.suse.com/762294" source="BUGZILLA"/>
		<reference ref_id="844230" ref_url="https://bugzilla.suse.com/844230" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0862" ref_url="https://www.suse.com/security/cve/CVE-2012-0862/" source="CVE"/>
		<reference ref_id="CVE-2013-4342" ref_url="https://www.suse.com/security/cve/CVE-2013-4342/" source="CVE"/>
		<description>

Xinetd receives a LTSS rollup update to fix two security issues:

    * CVE-2012-0862: xinetd enabled all services when tcp multiplexing is
      used.
    * CVE-2013-4342: xinetd ignored user and group directives for tcpmux
      services, running services as root.

While both issues are not so problematic on their own, in combination the 
impact is greater and enabling tcpmux would be risky.

Security Issues:

    * CVE-2013-4342
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4342&gt;
    * CVE-2012-0862
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0862&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-13"/>
	<updated date="2014-03-13"/>
	<bugzilla href="https://bugzilla.suse.com/762294">SUSE bug 762294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844230">SUSE bug 844230</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0862/">CVE-2012-0862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0862">CVE-2012-0862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4342/">CVE-2013-4342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4342">CVE-2013-4342 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577073" comment="xinetd-2.3.14-130.133.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218180" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="743450" ref_url="https://bugzilla.suse.com/743450" source="BUGZILLA"/>
		<reference ref_id="743810" ref_url="https://bugzilla.suse.com/743810" source="BUGZILLA"/>
		<reference ref_id="744625" ref_url="https://bugzilla.suse.com/744625" source="BUGZILLA"/>
		<reference ref_id="774315" ref_url="https://bugzilla.suse.com/774315" source="BUGZILLA"/>
		<reference ref_id="782319" ref_url="https://bugzilla.suse.com/782319" source="BUGZILLA"/>
		<reference ref_id="787170" ref_url="https://bugzilla.suse.com/787170" source="BUGZILLA"/>
		<reference ref_id="813178" ref_url="https://bugzilla.suse.com/813178" source="BUGZILLA"/>
		<reference ref_id="813683" ref_url="https://bugzilla.suse.com/813683" source="BUGZILLA"/>
		<reference ref_id="814653" ref_url="https://bugzilla.suse.com/814653" source="BUGZILLA"/>
		<reference ref_id="816813" ref_url="https://bugzilla.suse.com/816813" source="BUGZILLA"/>
		<reference ref_id="843652" ref_url="https://bugzilla.suse.com/843652" source="BUGZILLA"/>
		<reference ref_id="853846" ref_url="https://bugzilla.suse.com/853846" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1940" ref_url="https://www.suse.com/security/cve/CVE-2013-1940/" source="CVE"/>
		<reference ref_id="CVE-2013-4396" ref_url="https://www.suse.com/security/cve/CVE-2013-4396/" source="CVE"/>
		<reference ref_id="CVE-2013-6424" ref_url="https://www.suse.com/security/cve/CVE-2013-6424/" source="CVE"/>
		<description>

This update fixes the following security issue with xorg-x11-server:

    * bnc#853846: integer underflow when handling trapezoids
      (CVE-2013-6424)

Security Issue reference:

    * CVE-2013-6424
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6424&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-20"/>
	<updated date="2013-12-20"/>
	<bugzilla href="https://bugzilla.suse.com/743450">SUSE bug 743450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/743810">SUSE bug 743810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744625">SUSE bug 744625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774315">SUSE bug 774315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/782319">SUSE bug 782319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787170">SUSE bug 787170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813178">SUSE bug 813178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813683">SUSE bug 813683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814653">SUSE bug 814653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816813">SUSE bug 816813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843652">SUSE bug 843652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853846">SUSE bug 853846</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1940/">CVE-2013-1940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1940">CVE-2013-1940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4396/">CVE-2013-4396 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4396">CVE-2013-4396 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6424/">CVE-2013-6424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6424">CVE-2013-6424 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577074" comment="xorg-x11-Xvnc-7.4-27.70.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577075" comment="xorg-x11-server-7.4-27.70.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577076" comment="xorg-x11-server-extra-7.4-27.70.76.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577074" comment="xorg-x11-Xvnc-7.4-27.70.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577075" comment="xorg-x11-server-7.4-27.70.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577076" comment="xorg-x11-server-extra-7.4-27.70.76.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218181" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821663" ref_url="https://bugzilla.suse.com/821663" source="BUGZILLA"/>
		<reference ref_id="854915" ref_url="https://bugzilla.suse.com/854915" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1984" ref_url="https://www.suse.com/security/cve/CVE-2013-1984/" source="CVE"/>
		<reference ref_id="CVE-2013-1985" ref_url="https://www.suse.com/security/cve/CVE-2013-1985/" source="CVE"/>
		<reference ref_id="CVE-2013-1986" ref_url="https://www.suse.com/security/cve/CVE-2013-1986/" source="CVE"/>
		<reference ref_id="CVE-2013-1988" ref_url="https://www.suse.com/security/cve/CVE-2013-1988/" source="CVE"/>
		<reference ref_id="CVE-2013-1990" ref_url="https://www.suse.com/security/cve/CVE-2013-1990/" source="CVE"/>
		<reference ref_id="CVE-2013-1991" ref_url="https://www.suse.com/security/cve/CVE-2013-1991/" source="CVE"/>
		<reference ref_id="CVE-2013-1992" ref_url="https://www.suse.com/security/cve/CVE-2013-1992/" source="CVE"/>
		<reference ref_id="CVE-2013-1995" ref_url="https://www.suse.com/security/cve/CVE-2013-1995/" source="CVE"/>
		<reference ref_id="CVE-2013-1996" ref_url="https://www.suse.com/security/cve/CVE-2013-1996/" source="CVE"/>
		<reference ref_id="CVE-2013-1998" ref_url="https://www.suse.com/security/cve/CVE-2013-1998/" source="CVE"/>
		<reference ref_id="CVE-2013-1999" ref_url="https://www.suse.com/security/cve/CVE-2013-1999/" source="CVE"/>
		<reference ref_id="CVE-2013-2000" ref_url="https://www.suse.com/security/cve/CVE-2013-2000/" source="CVE"/>
		<reference ref_id="CVE-2013-2001" ref_url="https://www.suse.com/security/cve/CVE-2013-2001/" source="CVE"/>
		<reference ref_id="CVE-2013-2003" ref_url="https://www.suse.com/security/cve/CVE-2013-2003/" source="CVE"/>
		<reference ref_id="CVE-2013-2063" ref_url="https://www.suse.com/security/cve/CVE-2013-2063/" source="CVE"/>
		<reference ref_id="CVE-2013-6462" ref_url="https://www.suse.com/security/cve/CVE-2013-6462/" source="CVE"/>
		<description>

This update fixes a stack buffer overflow in xorg-x11 in the 
bdfReadCharacters() function. CVE-2013-6462 has been assigned to this 
issue.

Security Issue reference:

    * CVE-2013-6462
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-08"/>
	<updated date="2014-01-08"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854915">SUSE bug 854915</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1984/">CVE-2013-1984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1984">CVE-2013-1984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1985/">CVE-2013-1985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1985">CVE-2013-1985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1986/">CVE-2013-1986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1986">CVE-2013-1986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1988/">CVE-2013-1988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1988">CVE-2013-1988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1990/">CVE-2013-1990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1990">CVE-2013-1990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1991/">CVE-2013-1991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1991">CVE-2013-1991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1992/">CVE-2013-1992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1992">CVE-2013-1992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1995/">CVE-2013-1995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1995">CVE-2013-1995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1996/">CVE-2013-1996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1996">CVE-2013-1996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1998/">CVE-2013-1998 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1998">CVE-2013-1998 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1999/">CVE-2013-1999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1999">CVE-2013-1999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2000/">CVE-2013-2000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2000">CVE-2013-2000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2001/">CVE-2013-2001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2001">CVE-2013-2001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2003/">CVE-2013-2003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2003">CVE-2013-2003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2063/">CVE-2013-2063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2063">CVE-2013-2063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6462/">CVE-2013-6462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6462">CVE-2013-6462 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577077" comment="xorg-x11-libs-7.4-8.26.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577078" comment="xorg-x11-libs-32bit-7.4-8.26.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577079" comment="xorg-x11-libs-x86-7.4-8.26.40.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577077" comment="xorg-x11-libs-7.4-8.26.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577078" comment="xorg-x11-libs-32bit-7.4-8.26.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577079" comment="xorg-x11-libs-x86-7.4-8.26.40.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218182" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821664" ref_url="https://bugzilla.suse.com/821664" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1981" ref_url="https://www.suse.com/security/cve/CVE-2013-1981/" source="CVE"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<reference ref_id="CVE-2013-2004" ref_url="https://www.suse.com/security/cve/CVE-2013-2004/" source="CVE"/>
		<description>

This update of xorg-x11-libX11 fixes several security issues (bnc#815451, 
bnc#821664).

Security Issue references:

    * CVE-2013-1981
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981&gt;
    * CVE-2013-1997
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997&gt;
    * CVE-2013-2004
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821664">SUSE bug 821664</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1981/">CVE-2013-1981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1981">CVE-2013-1981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1997">CVE-2013-1997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2004/">CVE-2013-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2004">CVE-2013-2004 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577080" comment="xorg-x11-libX11-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577081" comment="xorg-x11-libX11-32bit-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577082" comment="xorg-x11-libX11-x86-7.4-5.11.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577080" comment="xorg-x11-libX11-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577081" comment="xorg-x11-libX11-32bit-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577082" comment="xorg-x11-libX11-x86-7.4-5.11.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218183" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="927220" ref_url="https://bugzilla.suse.com/927220" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7439" ref_url="https://www.suse.com/security/cve/CVE-2013-7439/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001521.html" source="SUSE-SU"/>
		<description>
xorg-x11-libX11 was updated to fix one security issue.

This security issue was fixed:
- CVE-2013-7439: Multiple off-by-one errors in the (1) MakeBigReq and (2) SetReqLen macros in include/X11/Xlibint.h in X11R6.x and libX11 before 1.6.0 allowed remote attackers to have unspecified impact via a crafted request, which triggered a buffer overflow (bsc#927220).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-27"/>
	<updated date="2015-07-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/927220">SUSE bug 927220</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7439/">CVE-2013-7439 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7439">CVE-2013-7439 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575664" comment="xorg-x11-libX11-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575665" comment="xorg-x11-libX11-32bit-7.4-5.11.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218184" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXext</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821665" ref_url="https://bugzilla.suse.com/821665" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982/" source="CVE"/>
		<description>

This update of xorg-x11-libXext fixes several integer overflow issues 
(bnc#815451, bnc#821665, CVE-2013-1982)

Security Issue reference:

    * CVE-2013-1982
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-31"/>
	<updated date="2013-05-31"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821665">SUSE bug 821665</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1982">CVE-2013-1982 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577083" comment="xorg-x11-libXext-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577084" comment="xorg-x11-libXext-32bit-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577085" comment="xorg-x11-libXext-x86-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577083" comment="xorg-x11-libXext-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577084" comment="xorg-x11-libXext-32bit-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577085" comment="xorg-x11-libXext-x86-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218185" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXfixes</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821667" ref_url="https://bugzilla.suse.com/821667" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983/" source="CVE"/>
		<description>

This update of xorg-x11-libXfixes fixes a integer overflow issue 
(bnc#815451, bnc#821667, CVE-2013-1983).

Security Issue reference:

    * CVE-2013-1983
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-31"/>
	<updated date="2013-05-31"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821667">SUSE bug 821667</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1983">CVE-2013-1983 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577086" comment="xorg-x11-libXfixes-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577087" comment="xorg-x11-libXfixes-32bit-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577088" comment="xorg-x11-libXfixes-x86-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577086" comment="xorg-x11-libXfixes-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577087" comment="xorg-x11-libXfixes-32bit-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577088" comment="xorg-x11-libXfixes-x86-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218186" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821668" ref_url="https://bugzilla.suse.com/821668" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2062" ref_url="https://www.suse.com/security/cve/CVE-2013-2062/" source="CVE"/>
		<description>

This update of xorg-x11-libXp fixes several integer overflow issues 
(bnc#815451, bnc#821668, CVE-2013-2062).

Security Issue reference:

    * CVE-2013-2062
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821668">SUSE bug 821668</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2062/">CVE-2013-2062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2062">CVE-2013-2062 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577089" comment="xorg-x11-libXp-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577090" comment="xorg-x11-libXp-32bit-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577091" comment="xorg-x11-libXp-x86-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577089" comment="xorg-x11-libXp-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577090" comment="xorg-x11-libXp-32bit-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577091" comment="xorg-x11-libXp-x86-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218187" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXrender</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821669" ref_url="https://bugzilla.suse.com/821669" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987/" source="CVE"/>
		<description>

This update of xorg-x11-libXrender fixes several integer overflow issues 
(bnc#815451, bnc#821669, CVE-2013-1987).

Security Issue reference:

    * CVE-2013-1987
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-03"/>
	<updated date="2013-06-03"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821669">SUSE bug 821669</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1987">CVE-2013-1987 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577092" comment="xorg-x11-libXrender-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577093" comment="xorg-x11-libXrender-32bit-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577094" comment="xorg-x11-libXrender-x86-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577092" comment="xorg-x11-libXrender-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577093" comment="xorg-x11-libXrender-32bit-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577094" comment="xorg-x11-libXrender-x86-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218188" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821670" ref_url="https://bugzilla.suse.com/821670" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002/" source="CVE"/>
		<reference ref_id="CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005/" source="CVE"/>
		<description>

This update of xorg-x11-libXt fixes several integer and buffer overflow 
issues (bnc#815451, bnc#821670, CVE-2013-2002, CVE-2013-2005).

Security Issue references:

    * CVE-2013-2002
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002&gt;
    * CVE-2013-2005
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-04"/>
	<updated date="2013-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821670">SUSE bug 821670</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2002">CVE-2013-2002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2005">CVE-2013-2005 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577095" comment="xorg-x11-libXt-7.4-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577096" comment="xorg-x11-libXt-32bit-7.4-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577097" comment="xorg-x11-libXt-x86-7.4-1.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577095" comment="xorg-x11-libXt-7.4-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577096" comment="xorg-x11-libXt-32bit-7.4-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577097" comment="xorg-x11-libXt-x86-7.4-1.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218189" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXv</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821671" ref_url="https://bugzilla.suse.com/821671" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989/" source="CVE"/>
		<reference ref_id="CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066/" source="CVE"/>
		<description>

This update of xorg-x11-libXv fixes several integer and buffer overflow 
issues (bnc#815451, bnc#821671, CVE-2013-1989, CVE-2013-2066).

Security Issue references:

    * CVE-2013-1989
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989&gt;
    * CVE-2013-2066
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-04"/>
	<updated date="2013-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821671">SUSE bug 821671</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1989">CVE-2013-1989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2066">CVE-2013-2066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577098" comment="xorg-x11-libXv-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577099" comment="xorg-x11-libXv-32bit-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577100" comment="xorg-x11-libXv-x86-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577098" comment="xorg-x11-libXv-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577099" comment="xorg-x11-libXv-32bit-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577100" comment="xorg-x11-libXv-x86-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218190" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libxcb</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="818829" ref_url="https://bugzilla.suse.com/818829" source="BUGZILLA"/>
		<reference ref_id="821584" ref_url="https://bugzilla.suse.com/821584" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2064" ref_url="https://www.suse.com/security/cve/CVE-2013-2064/" source="CVE"/>
		<description>

This update for xorg-x11-libxcb addresses the following security issues:

    * Fix a deadlock with multi-threaded applications running on real time
      kernels. (bnc#818829)
    * Fix an integer overflow in read_packet(). (bnc#821584, CVE-2013-2064)

Security Issues:

    * CVE-2013-2064
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2064&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-24"/>
	<updated date="2013-05-24"/>
	<bugzilla href="https://bugzilla.suse.com/818829">SUSE bug 818829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821584">SUSE bug 821584</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2064/">CVE-2013-2064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2064">CVE-2013-2064 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577101" comment="xorg-x11-libxcb-7.4-1.22.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577102" comment="xorg-x11-libxcb-32bit-7.4-1.22.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577103" comment="xorg-x11-libxcb-x86-7.4-1.22.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577101" comment="xorg-x11-libxcb-7.4-1.22.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577102" comment="xorg-x11-libxcb-32bit-7.4-1.22.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577103" comment="xorg-x11-libxcb-x86-7.4-1.22.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218191" version="1" class="patch">
	<metadata>
		<title>Recommended update for xorg-x11-server-rdp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="746949" ref_url="https://bugzilla.suse.com/746949" source="BUGZILLA"/>
		<reference ref_id="770683" ref_url="https://bugzilla.suse.com/770683" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2240" ref_url="https://www.suse.com/security/cve/CVE-2010-2240/" source="CVE"/>
		<reference ref_id="CVE-2011-4028" ref_url="https://www.suse.com/security/cve/CVE-2011-4028/" source="CVE"/>
		<reference ref_id="CVE-2011-4029" ref_url="https://www.suse.com/security/cve/CVE-2011-4029/" source="CVE"/>
		<description>

This update for X.Org's RDP server (xorg-x11-server-rdp) resolves a problem 
in the idletime counter that could cause excessive wake-ups, using a lot of 
CPU time.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-10-24"/>
	<updated date="2012-10-24"/>
	<bugzilla href="https://bugzilla.suse.com/746949">SUSE bug 746949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770683">SUSE bug 770683</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2240/">CVE-2010-2240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2240">CVE-2010-2240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4028/">CVE-2011-4028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4028">CVE-2011-4028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4029/">CVE-2011-4029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4029">CVE-2011-4029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992526" comment="xorg-x11-server-rdp-7.3.99-3.20.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992526" comment="xorg-x11-server-rdp-7.3.99-3.20.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218192" version="1" class="patch">
	<metadata>
		<title>Recommended update for yast2-network</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="719881" ref_url="https://bugzilla.suse.com/719881" source="BUGZILLA"/>
		<reference ref_id="747844" ref_url="https://bugzilla.suse.com/747844" source="BUGZILLA"/>
		<reference ref_id="748251" ref_url="https://bugzilla.suse.com/748251" source="BUGZILLA"/>
		<reference ref_id="749365" ref_url="https://bugzilla.suse.com/749365" source="BUGZILLA"/>
		<reference ref_id="752464" ref_url="https://bugzilla.suse.com/752464" source="BUGZILLA"/>
		<reference ref_id="769081" ref_url="https://bugzilla.suse.com/769081" source="BUGZILLA"/>
		<reference ref_id="769175" ref_url="https://bugzilla.suse.com/769175" source="BUGZILLA"/>
		<reference ref_id="778665" ref_url="https://bugzilla.suse.com/778665" source="BUGZILLA"/>
		<reference ref_id="779531" ref_url="https://bugzilla.suse.com/779531" source="BUGZILLA"/>
		<reference ref_id="781330" ref_url="https://bugzilla.suse.com/781330" source="BUGZILLA"/>
		<reference ref_id="782283" ref_url="https://bugzilla.suse.com/782283" source="BUGZILLA"/>
		<reference ref_id="790202" ref_url="https://bugzilla.suse.com/790202" source="BUGZILLA"/>
		<reference ref_id="790219" ref_url="https://bugzilla.suse.com/790219" source="BUGZILLA"/>
		<reference ref_id="793367" ref_url="https://bugzilla.suse.com/793367" source="BUGZILLA"/>
		<reference ref_id="796580" ref_url="https://bugzilla.suse.com/796580" source="BUGZILLA"/>
		<reference ref_id="810525" ref_url="https://bugzilla.suse.com/810525" source="BUGZILLA"/>
		<reference ref_id="813232" ref_url="https://bugzilla.suse.com/813232" source="BUGZILLA"/>
		<reference ref_id="813835" ref_url="https://bugzilla.suse.com/813835" source="BUGZILLA"/>
		<reference ref_id="817006" ref_url="https://bugzilla.suse.com/817006" source="BUGZILLA"/>
		<reference ref_id="817943" ref_url="https://bugzilla.suse.com/817943" source="BUGZILLA"/>
		<reference ref_id="821427" ref_url="https://bugzilla.suse.com/821427" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0425" ref_url="https://www.suse.com/security/cve/CVE-2012-0425/" source="CVE"/>
		<description>

This update for YaST's Network Configuration module (yast2-network) 
provides the following fixes:

    * Do not propose bridge devices when virtualization is used on s390x.
      (bnc#817943)
    * Fixed parsing of hostname in DNS module. (bnc#813232)
    * Added loading tun/tap settings from netconfig. (bnc#793367)
    * Fixed biosdevname renaming in case of buggy SMBIOS. (bnc#821427)

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-07"/>
	<updated date="2013-06-07"/>
	<bugzilla href="https://bugzilla.suse.com/719881">SUSE bug 719881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747844">SUSE bug 747844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748251">SUSE bug 748251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749365">SUSE bug 749365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752464">SUSE bug 752464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769081">SUSE bug 769081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769175">SUSE bug 769175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778665">SUSE bug 778665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779531">SUSE bug 779531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/781330">SUSE bug 781330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/782283">SUSE bug 782283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/790202">SUSE bug 790202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/790219">SUSE bug 790219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/793367">SUSE bug 793367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796580">SUSE bug 796580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/810525">SUSE bug 810525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813232">SUSE bug 813232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813835">SUSE bug 813835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817006">SUSE bug 817006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817943">SUSE bug 817943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821427">SUSE bug 821427</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0425/">CVE-2012-0425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0425">CVE-2012-0425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992527" comment="yast2-network-2.17.182.12-0.5.11 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992527" comment="yast2-network-2.17.182.12-0.5.11 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218193" version="1" class="patch">
	<metadata>
		<title>Security update for zypper</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="770630" ref_url="https://bugzilla.suse.com/770630" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0420" ref_url="https://www.suse.com/security/cve/CVE-2012-0420/" source="CVE"/>
		<description>

The following issue has been fixed:

    * The zypper setuid wrapper linked against libzypp. This is not needed
      and added unnecessary attack vectors. CVE-2012-0420 has been assigned
      to this issue.

Security Issue reference:

    * CVE-2012-0420
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0420&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-10"/>
	<updated date="2012-07-10"/>
	<bugzilla href="https://bugzilla.suse.com/770630">SUSE bug 770630</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0420/">CVE-2012-0420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0420">CVE-2012-0420 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577104" comment="zypper-1.6.166-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577105" comment="zypper-log-1.6.166-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577104" comment="zypper-1.6.166-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577105" comment="zypper-log-1.6.166-0.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218194" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210212" ref_url="https://bugzilla.suse.com/1210212" source="BUGZILLA"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 102.10.0 ESR
  Placeholder changelog-entry (bsc#1210212)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-11"/>
	<updated date="2023-04-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210212">SUSE bug 1210212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992528" comment="MozillaFirefox-102.10.0-72.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992529" comment="MozillaFirefox-translations-common-102.10.0-72.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992530" comment="MozillaFirefox-translations-other-102.10.0-72.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218195" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="881874" ref_url="https://bugzilla.suse.com/881874" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1533" ref_url="https://www.suse.com/security/cve/CVE-2014-1533/" source="CVE"/>
		<reference ref_id="CVE-2014-1534" ref_url="https://www.suse.com/security/cve/CVE-2014-1534/" source="CVE"/>
		<reference ref_id="CVE-2014-1536" ref_url="https://www.suse.com/security/cve/CVE-2014-1536/" source="CVE"/>
		<reference ref_id="CVE-2014-1537" ref_url="https://www.suse.com/security/cve/CVE-2014-1537/" source="CVE"/>
		<reference ref_id="CVE-2014-1538" ref_url="https://www.suse.com/security/cve/CVE-2014-1538/" source="CVE"/>
		<reference ref_id="CVE-2014-1541" ref_url="https://www.suse.com/security/cve/CVE-2014-1541/" source="CVE"/>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<description>

MozillaFirefox was updated to version 24.6.0 to fix six security issues:

    * Miscellaneous memory safety hazards. (CVE-2014-1533, CVE-2014-1534)
    * Use-after-free and out of bounds issues found using Address
      Sanitizer. (CVE-2014-1536, CVE-2014-1537, CVE-2014-1538)
    * Use-after-free with SMIL Animation Controller. (CVE-2014-1541)

mozilla-nspr was updated to version 4.10.6 to fix one security issue:

    * Out of bounds write in NSPR. (CVE-2014-1545)

Further information can be found at 
https://www.mozilla.org/security/announce/
&lt;https://www.mozilla.org/security/announce/&gt; .

Security Issues references:

    * CVE-2014-1533
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533&gt;
    * CVE-2014-1534
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1534&gt;
    * CVE-2014-1536
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1536&gt;
    * CVE-2014-1537
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1537&gt;
    * CVE-2014-1538
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538&gt;
    * CVE-2014-1541
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541&gt;
    * CVE-2014-1545
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-12"/>
	<updated date="2014-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/881874">SUSE bug 881874</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1533/">CVE-2014-1533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1533">CVE-2014-1533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1534/">CVE-2014-1534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1534">CVE-2014-1534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1536/">CVE-2014-1536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1536">CVE-2014-1536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1537/">CVE-2014-1537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1537">CVE-2014-1537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1538/">CVE-2014-1538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1538">CVE-2014-1538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1541/">CVE-2014-1541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1541">CVE-2014-1541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1545">CVE-2014-1545 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577106" comment="MozillaFirefox-24.6.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577107" comment="MozillaFirefox-branding-SLED-24-0.7.48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577108" comment="MozillaFirefox-translations-24.6.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577109" comment="libfreebl3-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577110" comment="libfreebl3-32bit-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577111" comment="libfreebl3-x86-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577112" comment="libsoftokn3-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577113" comment="libsoftokn3-32bit-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577114" comment="libsoftokn3-x86-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577115" comment="mozilla-nspr-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577116" comment="mozilla-nspr-32bit-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577117" comment="mozilla-nspr-x86-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577118" comment="mozilla-nss-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577119" comment="mozilla-nss-32bit-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577120" comment="mozilla-nss-tools-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577121" comment="mozilla-nss-x86-3.16.1-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577106" comment="MozillaFirefox-24.6.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577107" comment="MozillaFirefox-branding-SLED-24-0.7.48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577108" comment="MozillaFirefox-translations-24.6.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577109" comment="libfreebl3-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577110" comment="libfreebl3-32bit-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577111" comment="libfreebl3-x86-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577112" comment="libsoftokn3-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577113" comment="libsoftokn3-32bit-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577114" comment="libsoftokn3-x86-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577115" comment="mozilla-nspr-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577116" comment="mozilla-nspr-32bit-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577117" comment="mozilla-nspr-x86-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577118" comment="mozilla-nss-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577119" comment="mozilla-nss-32bit-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577120" comment="mozilla-nss-tools-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577121" comment="mozilla-nss-x86-3.16.1-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577106" comment="MozillaFirefox-24.6.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577107" comment="MozillaFirefox-branding-SLED-24-0.7.48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577108" comment="MozillaFirefox-translations-24.6.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577109" comment="libfreebl3-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577110" comment="libfreebl3-32bit-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577111" comment="libfreebl3-x86-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577112" comment="libsoftokn3-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577113" comment="libsoftokn3-32bit-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577114" comment="libsoftokn3-x86-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577115" comment="mozilla-nspr-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577116" comment="mozilla-nspr-32bit-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577117" comment="mozilla-nspr-x86-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577118" comment="mozilla-nss-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577119" comment="mozilla-nss-32bit-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577120" comment="mozilla-nss-tools-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577121" comment="mozilla-nss-x86-3.16.1-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218196" version="1" class="patch">
	<metadata>
		<title>Security update for Image Magick</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="863838" ref_url="https://bugzilla.suse.com/863838" source="BUGZILLA"/>
		<reference ref_id="903204" ref_url="https://bugzilla.suse.com/903204" source="BUGZILLA"/>
		<reference ref_id="903216" ref_url="https://bugzilla.suse.com/903216" source="BUGZILLA"/>
		<reference ref_id="903638" ref_url="https://bugzilla.suse.com/903638" source="BUGZILLA"/>
		<reference ref_id="905260" ref_url="https://bugzilla.suse.com/905260" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1947" ref_url="https://www.suse.com/security/cve/CVE-2014-1947/" source="CVE"/>
		<reference ref_id="CVE-2014-8354" ref_url="https://www.suse.com/security/cve/CVE-2014-8354/" source="CVE"/>
		<reference ref_id="CVE-2014-8355" ref_url="https://www.suse.com/security/cve/CVE-2014-8355/" source="CVE"/>
		<reference ref_id="CVE-2014-8562" ref_url="https://www.suse.com/security/cve/CVE-2014-8562/" source="CVE"/>
		<reference ref_id="CVE-2014-8716" ref_url="https://www.suse.com/security/cve/CVE-2014-8716/" source="CVE"/>
		<description>

ImageMagick has been updated to fix four security issues:

    * Crafted jpeg file could have lead to a Denial of Service
      (CVE-2014-8716).
    * Out-of-bounds memory access in resize code (CVE-2014-8354)
    * Out-of-bounds memory access in PCX parser (CVE-2014-8355).
    * Out-of-bounds memory error in DCM decode (CVE-2014-8562).

Security Issues:

    * CVE-2014-8716
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8716&gt;
    * CVE-2014-8355
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8355&gt;
    * CVE-2014-8354
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8354&gt;
    * CVE-2014-8562
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8562&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-18"/>
	<updated date="2014-11-18"/>
	<bugzilla href="https://bugzilla.suse.com/863838">SUSE bug 863838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903204">SUSE bug 903204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903216">SUSE bug 903216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903638">SUSE bug 903638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905260">SUSE bug 905260</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1947/">CVE-2014-1947 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1947">CVE-2014-1947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8354/">CVE-2014-8354 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8354">CVE-2014-8354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8355/">CVE-2014-8355 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8355">CVE-2014-8355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8562/">CVE-2014-8562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8562">CVE-2014-8562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8716/">CVE-2014-8716 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8716">CVE-2014-8716 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577122" comment="libMagickCore1-6.4.3.6-7.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577123" comment="libMagickCore1-32bit-6.4.3.6-7.30.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577122" comment="libMagickCore1-6.4.3.6-7.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577123" comment="libMagickCore1-32bit-6.4.3.6-7.30.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577122" comment="libMagickCore1-6.4.3.6-7.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577123" comment="libMagickCore1-32bit-6.4.3.6-7.30.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218197" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="978061" ref_url="https://bugzilla.suse.com/978061" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="CVE-2016-3715" ref_url="https://www.suse.com/security/cve/CVE-2016-3715/" source="CVE"/>
		<reference ref_id="CVE-2016-3716" ref_url="https://www.suse.com/security/cve/CVE-2016-3716/" source="CVE"/>
		<reference ref_id="CVE-2016-3717" ref_url="https://www.suse.com/security/cve/CVE-2016-3717/" source="CVE"/>
		<reference ref_id="CVE-2016-3718" ref_url="https://www.suse.com/security/cve/CVE-2016-3718/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002051.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

Security issues fixed:
- Several coders were vulnerable to remote code execution attacks,
  these coders have now been disabled. They can be re-enabled by
  exporting the following environment variable
  MAGICK_CODER_MODULE_PATH=/usr/lib64/ImageMagick-6.4.3/modules-Q16/coders/vulnerable/
  (bsc#978061)
- CVE-2016-3714: Insufficient shell characters filtering leads to
  (potentially remote) code execution
- CVE-2016-3715: Possible file deletion by using ImageMagick's
  'ephemeral' pseudo protocol which deletes files after reading.
- CVE-2016-3716: Possible file moving by using ImageMagick's 'msl'
  pseudo protocol with any extension in any folder.
- CVE-2016-3717: Possible local file read by using ImageMagick's 
  'label' pseudo protocol to get content of the files from the server.
- CVE-2016-3718: Possible Server Side Request Forgery (SSRF) to make
  HTTP GET or FTP request.

Bugs fixed:
- Use external svg loader (rsvg)		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-11"/>
	<updated date="2016-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3714">CVE-2016-3714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3715/">CVE-2016-3715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3715">CVE-2016-3715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3716/">CVE-2016-3716 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3716">CVE-2016-3716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3717/">CVE-2016-3717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3717">CVE-2016-3717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3718/">CVE-2016-3718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3718">CVE-2016-3718 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575775" comment="libMagickCore1-6.4.3.6-7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575776" comment="libMagickCore1-32bit-6.4.3.6-7.34.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575775" comment="libMagickCore1-6.4.3.6-7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575776" comment="libMagickCore1-32bit-6.4.3.6-7.34.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218198" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="978061" ref_url="https://bugzilla.suse.com/978061" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002060.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- bsc#978061: A vulnerability in ImageMagick's 'https' module allowed users to
execute arbitrary shell commands on the host performing the image conversion.
The issue had the potential for remote command injection. This update mitigates
the vulnerability by disabling all access to the 'https' module in the
'delegates.xml' config file. (CVE-2016-3714)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-13"/>
	<updated date="2016-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3714">CVE-2016-3714 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575777" comment="libMagickCore1-6.4.3.6-7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575778" comment="libMagickCore1-32bit-6.4.3.6-7.37.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575777" comment="libMagickCore1-6.4.3.6-7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575778" comment="libMagickCore1-32bit-6.4.3.6-7.37.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218199" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="982178" ref_url="https://bugzilla.suse.com/982178" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5118" ref_url="https://www.suse.com/security/cve/CVE-2016-5118/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002124.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues: 

- CVE-2016-5118: popen() shell vulnerability via filenames (bsc#982178)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/982178">SUSE bug 982178</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5118/">CVE-2016-5118 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5118">CVE-2016-5118 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575779" comment="libMagickCore1-6.4.3.6-7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575780" comment="libMagickCore1-32bit-6.4.3.6-7.40.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575779" comment="libMagickCore1-6.4.3.6-7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575780" comment="libMagickCore1-32bit-6.4.3.6-7.40.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218200" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="983234" ref_url="https://bugzilla.suse.com/983234" source="BUGZILLA"/>
		<reference ref_id="983253" ref_url="https://bugzilla.suse.com/983253" source="BUGZILLA"/>
		<reference ref_id="983259" ref_url="https://bugzilla.suse.com/983259" source="BUGZILLA"/>
		<reference ref_id="983292" ref_url="https://bugzilla.suse.com/983292" source="BUGZILLA"/>
		<reference ref_id="983305" ref_url="https://bugzilla.suse.com/983305" source="BUGZILLA"/>
		<reference ref_id="983308" ref_url="https://bugzilla.suse.com/983308" source="BUGZILLA"/>
		<reference ref_id="983521" ref_url="https://bugzilla.suse.com/983521" source="BUGZILLA"/>
		<reference ref_id="983523" ref_url="https://bugzilla.suse.com/983523" source="BUGZILLA"/>
		<reference ref_id="983533" ref_url="https://bugzilla.suse.com/983533" source="BUGZILLA"/>
		<reference ref_id="983739" ref_url="https://bugzilla.suse.com/983739" source="BUGZILLA"/>
		<reference ref_id="983746" ref_url="https://bugzilla.suse.com/983746" source="BUGZILLA"/>
		<reference ref_id="983752" ref_url="https://bugzilla.suse.com/983752" source="BUGZILLA"/>
		<reference ref_id="983774" ref_url="https://bugzilla.suse.com/983774" source="BUGZILLA"/>
		<reference ref_id="983794" ref_url="https://bugzilla.suse.com/983794" source="BUGZILLA"/>
		<reference ref_id="983796" ref_url="https://bugzilla.suse.com/983796" source="BUGZILLA"/>
		<reference ref_id="983799" ref_url="https://bugzilla.suse.com/983799" source="BUGZILLA"/>
		<reference ref_id="983803" ref_url="https://bugzilla.suse.com/983803" source="BUGZILLA"/>
		<reference ref_id="984018" ref_url="https://bugzilla.suse.com/984018" source="BUGZILLA"/>
		<reference ref_id="984023" ref_url="https://bugzilla.suse.com/984023" source="BUGZILLA"/>
		<reference ref_id="984028" ref_url="https://bugzilla.suse.com/984028" source="BUGZILLA"/>
		<reference ref_id="984032" ref_url="https://bugzilla.suse.com/984032" source="BUGZILLA"/>
		<reference ref_id="984035" ref_url="https://bugzilla.suse.com/984035" source="BUGZILLA"/>
		<reference ref_id="984135" ref_url="https://bugzilla.suse.com/984135" source="BUGZILLA"/>
		<reference ref_id="984137" ref_url="https://bugzilla.suse.com/984137" source="BUGZILLA"/>
		<reference ref_id="984142" ref_url="https://bugzilla.suse.com/984142" source="BUGZILLA"/>
		<reference ref_id="984144" ref_url="https://bugzilla.suse.com/984144" source="BUGZILLA"/>
		<reference ref_id="984145" ref_url="https://bugzilla.suse.com/984145" source="BUGZILLA"/>
		<reference ref_id="984150" ref_url="https://bugzilla.suse.com/984150" source="BUGZILLA"/>
		<reference ref_id="984160" ref_url="https://bugzilla.suse.com/984160" source="BUGZILLA"/>
		<reference ref_id="984166" ref_url="https://bugzilla.suse.com/984166" source="BUGZILLA"/>
		<reference ref_id="984181" ref_url="https://bugzilla.suse.com/984181" source="BUGZILLA"/>
		<reference ref_id="984184" ref_url="https://bugzilla.suse.com/984184" source="BUGZILLA"/>
		<reference ref_id="984185" ref_url="https://bugzilla.suse.com/984185" source="BUGZILLA"/>
		<reference ref_id="984186" ref_url="https://bugzilla.suse.com/984186" source="BUGZILLA"/>
		<reference ref_id="984187" ref_url="https://bugzilla.suse.com/984187" source="BUGZILLA"/>
		<reference ref_id="984193" ref_url="https://bugzilla.suse.com/984193" source="BUGZILLA"/>
		<reference ref_id="984370" ref_url="https://bugzilla.suse.com/984370" source="BUGZILLA"/>
		<reference ref_id="984372" ref_url="https://bugzilla.suse.com/984372" source="BUGZILLA"/>
		<reference ref_id="984373" ref_url="https://bugzilla.suse.com/984373" source="BUGZILLA"/>
		<reference ref_id="984374" ref_url="https://bugzilla.suse.com/984374" source="BUGZILLA"/>
		<reference ref_id="984375" ref_url="https://bugzilla.suse.com/984375" source="BUGZILLA"/>
		<reference ref_id="984379" ref_url="https://bugzilla.suse.com/984379" source="BUGZILLA"/>
		<reference ref_id="984394" ref_url="https://bugzilla.suse.com/984394" source="BUGZILLA"/>
		<reference ref_id="984398" ref_url="https://bugzilla.suse.com/984398" source="BUGZILLA"/>
		<reference ref_id="984400" ref_url="https://bugzilla.suse.com/984400" source="BUGZILLA"/>
		<reference ref_id="984401" ref_url="https://bugzilla.suse.com/984401" source="BUGZILLA"/>
		<reference ref_id="984408" ref_url="https://bugzilla.suse.com/984408" source="BUGZILLA"/>
		<reference ref_id="984409" ref_url="https://bugzilla.suse.com/984409" source="BUGZILLA"/>
		<reference ref_id="984433" ref_url="https://bugzilla.suse.com/984433" source="BUGZILLA"/>
		<reference ref_id="984436" ref_url="https://bugzilla.suse.com/984436" source="BUGZILLA"/>
		<reference ref_id="985442" ref_url="https://bugzilla.suse.com/985442" source="BUGZILLA"/>
		<reference ref_id="985448" ref_url="https://bugzilla.suse.com/985448" source="BUGZILLA"/>
		<reference ref_id="985451" ref_url="https://bugzilla.suse.com/985451" source="BUGZILLA"/>
		<reference ref_id="985456" ref_url="https://bugzilla.suse.com/985456" source="BUGZILLA"/>
		<reference ref_id="985460" ref_url="https://bugzilla.suse.com/985460" source="BUGZILLA"/>
		<reference ref_id="986608" ref_url="https://bugzilla.suse.com/986608" source="BUGZILLA"/>
		<reference ref_id="986609" ref_url="https://bugzilla.suse.com/986609" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9805" ref_url="https://www.suse.com/security/cve/CVE-2014-9805/" source="CVE"/>
		<reference ref_id="CVE-2014-9806" ref_url="https://www.suse.com/security/cve/CVE-2014-9806/" source="CVE"/>
		<reference ref_id="CVE-2014-9807" ref_url="https://www.suse.com/security/cve/CVE-2014-9807/" source="CVE"/>
		<reference ref_id="CVE-2014-9808" ref_url="https://www.suse.com/security/cve/CVE-2014-9808/" source="CVE"/>
		<reference ref_id="CVE-2014-9809" ref_url="https://www.suse.com/security/cve/CVE-2014-9809/" source="CVE"/>
		<reference ref_id="CVE-2014-9810" ref_url="https://www.suse.com/security/cve/CVE-2014-9810/" source="CVE"/>
		<reference ref_id="CVE-2014-9811" ref_url="https://www.suse.com/security/cve/CVE-2014-9811/" source="CVE"/>
		<reference ref_id="CVE-2014-9812" ref_url="https://www.suse.com/security/cve/CVE-2014-9812/" source="CVE"/>
		<reference ref_id="CVE-2014-9813" ref_url="https://www.suse.com/security/cve/CVE-2014-9813/" source="CVE"/>
		<reference ref_id="CVE-2014-9814" ref_url="https://www.suse.com/security/cve/CVE-2014-9814/" source="CVE"/>
		<reference ref_id="CVE-2014-9815" ref_url="https://www.suse.com/security/cve/CVE-2014-9815/" source="CVE"/>
		<reference ref_id="CVE-2014-9816" ref_url="https://www.suse.com/security/cve/CVE-2014-9816/" source="CVE"/>
		<reference ref_id="CVE-2014-9817" ref_url="https://www.suse.com/security/cve/CVE-2014-9817/" source="CVE"/>
		<reference ref_id="CVE-2014-9818" ref_url="https://www.suse.com/security/cve/CVE-2014-9818/" source="CVE"/>
		<reference ref_id="CVE-2014-9819" ref_url="https://www.suse.com/security/cve/CVE-2014-9819/" source="CVE"/>
		<reference ref_id="CVE-2014-9820" ref_url="https://www.suse.com/security/cve/CVE-2014-9820/" source="CVE"/>
		<reference ref_id="CVE-2014-9822" ref_url="https://www.suse.com/security/cve/CVE-2014-9822/" source="CVE"/>
		<reference ref_id="CVE-2014-9823" ref_url="https://www.suse.com/security/cve/CVE-2014-9823/" source="CVE"/>
		<reference ref_id="CVE-2014-9824" ref_url="https://www.suse.com/security/cve/CVE-2014-9824/" source="CVE"/>
		<reference ref_id="CVE-2014-9826" ref_url="https://www.suse.com/security/cve/CVE-2014-9826/" source="CVE"/>
		<reference ref_id="CVE-2014-9828" ref_url="https://www.suse.com/security/cve/CVE-2014-9828/" source="CVE"/>
		<reference ref_id="CVE-2014-9829" ref_url="https://www.suse.com/security/cve/CVE-2014-9829/" source="CVE"/>
		<reference ref_id="CVE-2014-9830" ref_url="https://www.suse.com/security/cve/CVE-2014-9830/" source="CVE"/>
		<reference ref_id="CVE-2014-9831" ref_url="https://www.suse.com/security/cve/CVE-2014-9831/" source="CVE"/>
		<reference ref_id="CVE-2014-9834" ref_url="https://www.suse.com/security/cve/CVE-2014-9834/" source="CVE"/>
		<reference ref_id="CVE-2014-9835" ref_url="https://www.suse.com/security/cve/CVE-2014-9835/" source="CVE"/>
		<reference ref_id="CVE-2014-9836" ref_url="https://www.suse.com/security/cve/CVE-2014-9836/" source="CVE"/>
		<reference ref_id="CVE-2014-9837" ref_url="https://www.suse.com/security/cve/CVE-2014-9837/" source="CVE"/>
		<reference ref_id="CVE-2014-9838" ref_url="https://www.suse.com/security/cve/CVE-2014-9838/" source="CVE"/>
		<reference ref_id="CVE-2014-9839" ref_url="https://www.suse.com/security/cve/CVE-2014-9839/" source="CVE"/>
		<reference ref_id="CVE-2014-9840" ref_url="https://www.suse.com/security/cve/CVE-2014-9840/" source="CVE"/>
		<reference ref_id="CVE-2014-9842" ref_url="https://www.suse.com/security/cve/CVE-2014-9842/" source="CVE"/>
		<reference ref_id="CVE-2014-9844" ref_url="https://www.suse.com/security/cve/CVE-2014-9844/" source="CVE"/>
		<reference ref_id="CVE-2014-9845" ref_url="https://www.suse.com/security/cve/CVE-2014-9845/" source="CVE"/>
		<reference ref_id="CVE-2014-9846" ref_url="https://www.suse.com/security/cve/CVE-2014-9846/" source="CVE"/>
		<reference ref_id="CVE-2014-9847" ref_url="https://www.suse.com/security/cve/CVE-2014-9847/" source="CVE"/>
		<reference ref_id="CVE-2014-9849" ref_url="https://www.suse.com/security/cve/CVE-2014-9849/" source="CVE"/>
		<reference ref_id="CVE-2014-9851" ref_url="https://www.suse.com/security/cve/CVE-2014-9851/" source="CVE"/>
		<reference ref_id="CVE-2014-9853" ref_url="https://www.suse.com/security/cve/CVE-2014-9853/" source="CVE"/>
		<reference ref_id="CVE-2014-9854" ref_url="https://www.suse.com/security/cve/CVE-2014-9854/" source="CVE"/>
		<reference ref_id="CVE-2015-8894" ref_url="https://www.suse.com/security/cve/CVE-2015-8894/" source="CVE"/>
		<reference ref_id="CVE-2015-8896" ref_url="https://www.suse.com/security/cve/CVE-2015-8896/" source="CVE"/>
		<reference ref_id="CVE-2015-8897" ref_url="https://www.suse.com/security/cve/CVE-2015-8897/" source="CVE"/>
		<reference ref_id="CVE-2015-8898" ref_url="https://www.suse.com/security/cve/CVE-2015-8898/" source="CVE"/>
		<reference ref_id="CVE-2015-8901" ref_url="https://www.suse.com/security/cve/CVE-2015-8901/" source="CVE"/>
		<reference ref_id="CVE-2015-8902" ref_url="https://www.suse.com/security/cve/CVE-2015-8902/" source="CVE"/>
		<reference ref_id="CVE-2015-8903" ref_url="https://www.suse.com/security/cve/CVE-2015-8903/" source="CVE"/>
		<reference ref_id="CVE-2016-4562" ref_url="https://www.suse.com/security/cve/CVE-2016-4562/" source="CVE"/>
		<reference ref_id="CVE-2016-4563" ref_url="https://www.suse.com/security/cve/CVE-2016-4563/" source="CVE"/>
		<reference ref_id="CVE-2016-4564" ref_url="https://www.suse.com/security/cve/CVE-2016-4564/" source="CVE"/>
		<reference ref_id="CVE-2016-5687" ref_url="https://www.suse.com/security/cve/CVE-2016-5687/" source="CVE"/>
		<reference ref_id="CVE-2016-5688" ref_url="https://www.suse.com/security/cve/CVE-2016-5688/" source="CVE"/>
		<reference ref_id="CVE-2016-5689" ref_url="https://www.suse.com/security/cve/CVE-2016-5689/" source="CVE"/>
		<reference ref_id="CVE-2016-5690" ref_url="https://www.suse.com/security/cve/CVE-2016-5690/" source="CVE"/>
		<reference ref_id="CVE-2016-5691" ref_url="https://www.suse.com/security/cve/CVE-2016-5691/" source="CVE"/>
		<reference ref_id="CVE-2016-5841" ref_url="https://www.suse.com/security/cve/CVE-2016-5841/" source="CVE"/>
		<reference ref_id="CVE-2016-5842" ref_url="https://www.suse.com/security/cve/CVE-2016-5842/" source="CVE"/>
		<description>
ImageMagick was updated to fix 55 security issues.

These security issues were fixed:
- CVE-2014-9810: SEGV in dpx file handler (bsc#983803).
- CVE-2014-9811: Crash in xwd file handler (bsc#984032).
- CVE-2014-9812: NULL pointer dereference in ps file handling (bsc#984137).
- CVE-2014-9813: Crash on corrupted viff file (bsc#984035).
- CVE-2014-9814: NULL pointer dereference in wpg file handling (bsc#984193).
- CVE-2014-9815: Crash on corrupted wpg file (bsc#984372).
- CVE-2014-9816: Out of bound access in viff image (bsc#984398).
- CVE-2014-9817: Heap buffer overflow in pdb file handling (bsc#984400).
- CVE-2014-9818: Out of bound access on malformed sun file (bsc#984181).
- CVE-2014-9819: Heap overflow in palm files (bsc#984142).
- CVE-2014-9830: Handling of corrupted sun file (bsc#984135).
- CVE-2014-9831: Handling of corrupted wpg file (bsc#984375).
- CVE-2014-9836: Crash in xpm file handling (bsc#984023).
- CVE-2014-9851: Crash when parsing resource block (bsc#984160).
- CVE-2016-5689: NULL ptr dereference in dcm coder (bsc#985460).
- CVE-2014-9853: Memory leak in rle file handling (bsc#984408).
- CVE-2015-8902: PDB file DoS (CPU consumption) (bsc#983253).
- CVE-2015-8903: Denial of service (cpu) in vicar (bsc#983259).
- CVE-2015-8901: MIFF file DoS (endless loop) (bsc#983234).
- CVE-2014-9834: Heap overflow in pict file (bsc#984436).
- CVE-2014-9806: Prevent file descriptr leak due to corrupted file (bsc#983774).
- CVE-2014-9838: Out of memory crash in magick/cache.c (bsc#984370).
- CVE-2014-9854: Filling memory during identification of TIFF image (bsc#984184).
- CVE-2015-8898: Prevent null pointer access in magick/constitute.c (bsc#983746).
- CVE-2015-8894: Double free in coders/tga.c:221 (bsc#983523).
- CVE-2015-8896: Double free / integer truncation issue in coders/pict.c:2000 (bsc#983533).
- CVE-2015-8897: Out of bounds error in SpliceImage (bsc#983739).
- CVE-2016-5690: Bad foor loop in DCM coder (bsc#985451).
- CVE-2016-5691: Checks for pixel.red/green/blue in dcm coder (bsc#985456).
- CVE-2014-9805: SEGV due to a corrupted pnm file. (bsc#983752).
- CVE-2014-9808: SEGV due to corrupted dpc images. (bsc#983796).
- CVE-2014-9820: heap overflow in xpm files (bsc#984150).
- CVE-2014-9823: heap overflow in palm file (bsc#984401).
- CVE-2014-9822: heap overflow in quantum file (bsc#984187).
- CVE-2014-9839: Theoretical out of bound access in magick/colormap-private.h (bsc#984379).
- CVE-2014-9824: Heap overflow in psd file (bsc#984185).
- CVE-2014-9809: Fix a SEGV due to corrupted xwd images. (bsc#983799).
- CVE-2014-9826: Incorrect error handling in sun files (bsc#984186).
- CVE-2014-9842: Memory leak in psd handling (bsc#984374).
- CVE-2016-5687: Out of bounds read in DDS coder (bsc#985448).
- CVE-2014-9840: Out of bound access in palm file (bsc#984433).
- CVE-2014-9847: Incorrect handling of 'previous' image in the JNG decoder (bsc#984144).
- CVE-2014-9846: Added checks to prevent overflow in rle file. (bsc#983521).
- CVE-2014-9845: Crash due to corrupted dib file (bsc#984394).
- CVE-2014-9844: Out of bound issue in rle file (bsc#984373).
- CVE-2014-9849: Crash in png coder (bsc#984018).
- CVE-2016-5688: Various invalid memory reads in ImageMagick WPG (bsc#985442).
- CVE-2014-9807: Fix a double free in pdb coder. (bsc#983794).
- CVE-2014-9829: Out of bound access in sun file (bsc#984409).
- CVE-2016-4564: The DrawImage function in MagickCore/draw.c in ImageMagick made an incorrect function call in attempting to locate the next token, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983308).
- CVE-2016-4563: The TraceStrokePolygon function in MagickCore/draw.c in ImageMagick mishandled the relationship between the BezierQuantum value and certain strokes data, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983305).
- CVE-2016-4562: The DrawDashPolygon function in MagickCore/draw.c in ImageMagick mishandled calculations of certain vertices integer data, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983292).
- CVE-2014-9837: Additional PNM sanity checks (bsc#984166).
- CVE-2014-9835: Heap overflow in wpf file (bsc#984145).
- CVE-2014-9828: Corrupted (too many colors) psd file (bsc#984028).
- CVE-2016-5841: Integer overflow could have read to RCE (bnc#986609).
- CVE-2016-5842: Out-of-bounds read in MagickCore/property.c:1396 could have lead to memory leak (bnc#986608).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-11"/>
	<updated date="2016-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/983234">SUSE bug 983234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983253">SUSE bug 983253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983259">SUSE bug 983259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983292">SUSE bug 983292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983305">SUSE bug 983305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983308">SUSE bug 983308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983521">SUSE bug 983521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983523">SUSE bug 983523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983533">SUSE bug 983533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983739">SUSE bug 983739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983746">SUSE bug 983746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983752">SUSE bug 983752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983774">SUSE bug 983774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983794">SUSE bug 983794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983796">SUSE bug 983796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983799">SUSE bug 983799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983803">SUSE bug 983803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984018">SUSE bug 984018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984023">SUSE bug 984023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984028">SUSE bug 984028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984032">SUSE bug 984032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984035">SUSE bug 984035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984135">SUSE bug 984135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984137">SUSE bug 984137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984142">SUSE bug 984142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984144">SUSE bug 984144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984145">SUSE bug 984145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984150">SUSE bug 984150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984160">SUSE bug 984160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984166">SUSE bug 984166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984181">SUSE bug 984181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984184">SUSE bug 984184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984185">SUSE bug 984185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984186">SUSE bug 984186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984187">SUSE bug 984187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984193">SUSE bug 984193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984370">SUSE bug 984370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984372">SUSE bug 984372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984373">SUSE bug 984373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984374">SUSE bug 984374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984375">SUSE bug 984375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984379">SUSE bug 984379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984394">SUSE bug 984394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984398">SUSE bug 984398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984400">SUSE bug 984400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984401">SUSE bug 984401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984408">SUSE bug 984408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984409">SUSE bug 984409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984433">SUSE bug 984433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984436">SUSE bug 984436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985442">SUSE bug 985442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985448">SUSE bug 985448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985451">SUSE bug 985451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985456">SUSE bug 985456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985460">SUSE bug 985460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986608">SUSE bug 986608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986609">SUSE bug 986609</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9805/">CVE-2014-9805 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9805">CVE-2014-9805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9806/">CVE-2014-9806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9806">CVE-2014-9806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9807/">CVE-2014-9807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9807">CVE-2014-9807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9808/">CVE-2014-9808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9808">CVE-2014-9808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9809/">CVE-2014-9809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9809">CVE-2014-9809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9810/">CVE-2014-9810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9810">CVE-2014-9810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9811/">CVE-2014-9811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9811">CVE-2014-9811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9812/">CVE-2014-9812 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9812">CVE-2014-9812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9813/">CVE-2014-9813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9813">CVE-2014-9813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9814/">CVE-2014-9814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9814">CVE-2014-9814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9815/">CVE-2014-9815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9815">CVE-2014-9815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9816/">CVE-2014-9816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9816">CVE-2014-9816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9817/">CVE-2014-9817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9817">CVE-2014-9817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9818/">CVE-2014-9818 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9818">CVE-2014-9818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9819/">CVE-2014-9819 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9819">CVE-2014-9819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9820/">CVE-2014-9820 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9820">CVE-2014-9820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9822/">CVE-2014-9822 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9822">CVE-2014-9822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9823/">CVE-2014-9823 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9823">CVE-2014-9823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9824/">CVE-2014-9824 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9824">CVE-2014-9824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9826/">CVE-2014-9826 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9826">CVE-2014-9826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9828/">CVE-2014-9828 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9828">CVE-2014-9828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9829/">CVE-2014-9829 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9829">CVE-2014-9829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9830/">CVE-2014-9830 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9830">CVE-2014-9830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9831/">CVE-2014-9831 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9831">CVE-2014-9831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9834/">CVE-2014-9834 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9834">CVE-2014-9834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9835/">CVE-2014-9835 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9835">CVE-2014-9835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9836/">CVE-2014-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9836">CVE-2014-9836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9837/">CVE-2014-9837 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9837">CVE-2014-9837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9838/">CVE-2014-9838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9838">CVE-2014-9838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9839/">CVE-2014-9839 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9839">CVE-2014-9839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9840/">CVE-2014-9840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9840">CVE-2014-9840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9842/">CVE-2014-9842 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9842">CVE-2014-9842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9844/">CVE-2014-9844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9844">CVE-2014-9844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9845/">CVE-2014-9845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9845">CVE-2014-9845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9846/">CVE-2014-9846 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9846">CVE-2014-9846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9847/">CVE-2014-9847 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9847">CVE-2014-9847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9849/">CVE-2014-9849 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9849">CVE-2014-9849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9851/">CVE-2014-9851 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9851">CVE-2014-9851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9853/">CVE-2014-9853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9853">CVE-2014-9853 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9854/">CVE-2014-9854 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9854">CVE-2014-9854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8894/">CVE-2015-8894 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8894">CVE-2015-8894 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8896/">CVE-2015-8896 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8896">CVE-2015-8896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8897/">CVE-2015-8897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8897">CVE-2015-8897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8898/">CVE-2015-8898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8898">CVE-2015-8898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8901/">CVE-2015-8901 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8901">CVE-2015-8901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8902/">CVE-2015-8902 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8902">CVE-2015-8902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8903/">CVE-2015-8903 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8903">CVE-2015-8903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4562/">CVE-2016-4562 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4562">CVE-2016-4562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4563/">CVE-2016-4563 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4563">CVE-2016-4563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4564/">CVE-2016-4564 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4564">CVE-2016-4564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5687/">CVE-2016-5687 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5687">CVE-2016-5687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5688/">CVE-2016-5688 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5688">CVE-2016-5688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5689/">CVE-2016-5689 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5689">CVE-2016-5689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5690/">CVE-2016-5690 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5690">CVE-2016-5690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5691/">CVE-2016-5691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5691">CVE-2016-5691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5841/">CVE-2016-5841 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5841">CVE-2016-5841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5842/">CVE-2016-5842 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5842">CVE-2016-5842 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570422" comment="libMagickCore1-6.4.3.6-7.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570423" comment="libMagickCore1-32bit-6.4.3.6-7.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218201" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="991445" ref_url="https://bugzilla.suse.com/991445" source="BUGZILLA"/>
		<reference ref_id="991872" ref_url="https://bugzilla.suse.com/991872" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6491" ref_url="https://www.suse.com/security/cve/CVE-2016-6491/" source="CVE"/>
		<reference ref_id="CVE-2016-6520" ref_url="https://www.suse.com/security/cve/CVE-2016-6520/" source="CVE"/>
		<description>

This update for ImageMagick fixes the following issues:

- security update:
  * CVE-2016-6520: buffer overflow [bsc#991872]
  * CVE-2016-6491: Out-of-bounds read in CopyMagickMemory [bsc#991445]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-15"/>
	<updated date="2016-08-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/991445">SUSE bug 991445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991872">SUSE bug 991872</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6491/">CVE-2016-6491 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6491">CVE-2016-6491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6520/">CVE-2016-6520 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6520">CVE-2016-6520 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570424" comment="libMagickCore1-6.4.3.6-7.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570425" comment="libMagickCore1-32bit-6.4.3.6-7.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218202" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1000399" ref_url="https://bugzilla.suse.com/1000399" source="BUGZILLA"/>
		<reference ref_id="1000434" ref_url="https://bugzilla.suse.com/1000434" source="BUGZILLA"/>
		<reference ref_id="1000436" ref_url="https://bugzilla.suse.com/1000436" source="BUGZILLA"/>
		<reference ref_id="1000688" ref_url="https://bugzilla.suse.com/1000688" source="BUGZILLA"/>
		<reference ref_id="1000689" ref_url="https://bugzilla.suse.com/1000689" source="BUGZILLA"/>
		<reference ref_id="1000690" ref_url="https://bugzilla.suse.com/1000690" source="BUGZILLA"/>
		<reference ref_id="1000691" ref_url="https://bugzilla.suse.com/1000691" source="BUGZILLA"/>
		<reference ref_id="1000692" ref_url="https://bugzilla.suse.com/1000692" source="BUGZILLA"/>
		<reference ref_id="1000693" ref_url="https://bugzilla.suse.com/1000693" source="BUGZILLA"/>
		<reference ref_id="1000694" ref_url="https://bugzilla.suse.com/1000694" source="BUGZILLA"/>
		<reference ref_id="1000695" ref_url="https://bugzilla.suse.com/1000695" source="BUGZILLA"/>
		<reference ref_id="1000698" ref_url="https://bugzilla.suse.com/1000698" source="BUGZILLA"/>
		<reference ref_id="1000699" ref_url="https://bugzilla.suse.com/1000699" source="BUGZILLA"/>
		<reference ref_id="1000700" ref_url="https://bugzilla.suse.com/1000700" source="BUGZILLA"/>
		<reference ref_id="1000701" ref_url="https://bugzilla.suse.com/1000701" source="BUGZILLA"/>
		<reference ref_id="1000703" ref_url="https://bugzilla.suse.com/1000703" source="BUGZILLA"/>
		<reference ref_id="1000704" ref_url="https://bugzilla.suse.com/1000704" source="BUGZILLA"/>
		<reference ref_id="1000707" ref_url="https://bugzilla.suse.com/1000707" source="BUGZILLA"/>
		<reference ref_id="1000709" ref_url="https://bugzilla.suse.com/1000709" source="BUGZILLA"/>
		<reference ref_id="1000711" ref_url="https://bugzilla.suse.com/1000711" source="BUGZILLA"/>
		<reference ref_id="1000713" ref_url="https://bugzilla.suse.com/1000713" source="BUGZILLA"/>
		<reference ref_id="1000714" ref_url="https://bugzilla.suse.com/1000714" source="BUGZILLA"/>
		<reference ref_id="1001066" ref_url="https://bugzilla.suse.com/1001066" source="BUGZILLA"/>
		<reference ref_id="1001221" ref_url="https://bugzilla.suse.com/1001221" source="BUGZILLA"/>
		<reference ref_id="1002209" ref_url="https://bugzilla.suse.com/1002209" source="BUGZILLA"/>
		<reference ref_id="1002421" ref_url="https://bugzilla.suse.com/1002421" source="BUGZILLA"/>
		<reference ref_id="1002422" ref_url="https://bugzilla.suse.com/1002422" source="BUGZILLA"/>
		<reference ref_id="1003629" ref_url="https://bugzilla.suse.com/1003629" source="BUGZILLA"/>
		<reference ref_id="1005123" ref_url="https://bugzilla.suse.com/1005123" source="BUGZILLA"/>
		<reference ref_id="1005125" ref_url="https://bugzilla.suse.com/1005125" source="BUGZILLA"/>
		<reference ref_id="1005127" ref_url="https://bugzilla.suse.com/1005127" source="BUGZILLA"/>
		<reference ref_id="1007245" ref_url="https://bugzilla.suse.com/1007245" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9907" ref_url="https://www.suse.com/security/cve/CVE-2014-9907/" source="CVE"/>
		<reference ref_id="CVE-2015-8957" ref_url="https://www.suse.com/security/cve/CVE-2015-8957/" source="CVE"/>
		<reference ref_id="CVE-2015-8958" ref_url="https://www.suse.com/security/cve/CVE-2015-8958/" source="CVE"/>
		<reference ref_id="CVE-2015-8959" ref_url="https://www.suse.com/security/cve/CVE-2015-8959/" source="CVE"/>
		<reference ref_id="CVE-2016-5687" ref_url="https://www.suse.com/security/cve/CVE-2016-5687/" source="CVE"/>
		<reference ref_id="CVE-2016-6823" ref_url="https://www.suse.com/security/cve/CVE-2016-6823/" source="CVE"/>
		<reference ref_id="CVE-2016-7101" ref_url="https://www.suse.com/security/cve/CVE-2016-7101/" source="CVE"/>
		<reference ref_id="CVE-2016-7514" ref_url="https://www.suse.com/security/cve/CVE-2016-7514/" source="CVE"/>
		<reference ref_id="CVE-2016-7515" ref_url="https://www.suse.com/security/cve/CVE-2016-7515/" source="CVE"/>
		<reference ref_id="CVE-2016-7516" ref_url="https://www.suse.com/security/cve/CVE-2016-7516/" source="CVE"/>
		<reference ref_id="CVE-2016-7517" ref_url="https://www.suse.com/security/cve/CVE-2016-7517/" source="CVE"/>
		<reference ref_id="CVE-2016-7518" ref_url="https://www.suse.com/security/cve/CVE-2016-7518/" source="CVE"/>
		<reference ref_id="CVE-2016-7519" ref_url="https://www.suse.com/security/cve/CVE-2016-7519/" source="CVE"/>
		<reference ref_id="CVE-2016-7522" ref_url="https://www.suse.com/security/cve/CVE-2016-7522/" source="CVE"/>
		<reference ref_id="CVE-2016-7523" ref_url="https://www.suse.com/security/cve/CVE-2016-7523/" source="CVE"/>
		<reference ref_id="CVE-2016-7524" ref_url="https://www.suse.com/security/cve/CVE-2016-7524/" source="CVE"/>
		<reference ref_id="CVE-2016-7525" ref_url="https://www.suse.com/security/cve/CVE-2016-7525/" source="CVE"/>
		<reference ref_id="CVE-2016-7526" ref_url="https://www.suse.com/security/cve/CVE-2016-7526/" source="CVE"/>
		<reference ref_id="CVE-2016-7527" ref_url="https://www.suse.com/security/cve/CVE-2016-7527/" source="CVE"/>
		<reference ref_id="CVE-2016-7528" ref_url="https://www.suse.com/security/cve/CVE-2016-7528/" source="CVE"/>
		<reference ref_id="CVE-2016-7529" ref_url="https://www.suse.com/security/cve/CVE-2016-7529/" source="CVE"/>
		<reference ref_id="CVE-2016-7530" ref_url="https://www.suse.com/security/cve/CVE-2016-7530/" source="CVE"/>
		<reference ref_id="CVE-2016-7531" ref_url="https://www.suse.com/security/cve/CVE-2016-7531/" source="CVE"/>
		<reference ref_id="CVE-2016-7533" ref_url="https://www.suse.com/security/cve/CVE-2016-7533/" source="CVE"/>
		<reference ref_id="CVE-2016-7535" ref_url="https://www.suse.com/security/cve/CVE-2016-7535/" source="CVE"/>
		<reference ref_id="CVE-2016-7537" ref_url="https://www.suse.com/security/cve/CVE-2016-7537/" source="CVE"/>
		<reference ref_id="CVE-2016-7799" ref_url="https://www.suse.com/security/cve/CVE-2016-7799/" source="CVE"/>
		<reference ref_id="CVE-2016-7800" ref_url="https://www.suse.com/security/cve/CVE-2016-7800/" source="CVE"/>
		<reference ref_id="CVE-2016-7996" ref_url="https://www.suse.com/security/cve/CVE-2016-7996/" source="CVE"/>
		<reference ref_id="CVE-2016-7997" ref_url="https://www.suse.com/security/cve/CVE-2016-7997/" source="CVE"/>
		<reference ref_id="CVE-2016-8682" ref_url="https://www.suse.com/security/cve/CVE-2016-8682/" source="CVE"/>
		<reference ref_id="CVE-2016-8683" ref_url="https://www.suse.com/security/cve/CVE-2016-8683/" source="CVE"/>
		<reference ref_id="CVE-2016-8684" ref_url="https://www.suse.com/security/cve/CVE-2016-8684/" source="CVE"/>
		<reference ref_id="CVE-2016-8862" ref_url="https://www.suse.com/security/cve/CVE-2016-8862/" source="CVE"/>
		<description>

This update for ImageMagick fixes the following issues:

These vulnerabilities could be triggered by processing specially crafted image files,
which could lead to a process crash or resource consumtion, or potentially have
unspecified futher impact.

- CVE-2016-8862: Memory allocation failure in AcquireMagickMemory (bsc#1007245)
- CVE-2014-9907: DOS due to corrupted DDS files (bsc#1000714)
- CVE-2015-8959: DOS due to corrupted DDS files (bsc#1000713)
- CVE-2016-7537: Out of bound access for corrupted pdb file (bsc#1000711)
- CVE-2016-6823: BMP Coder Out-Of-Bounds Write Vulnerability (bsc#1001066)
- CVE-2016-7514: Out-of-bounds read in coders/psd.c (bsc#1000688)
- CVE-2016-7515: Rle file handling for corrupted file (bsc#1000689)
- CVE-2016-7529: out of bound in quantum handling (bsc#1000399)
- CVE-2016-7101: SGI Coder Out-Of-Bounds Read Vulnerability (bsc#1001221)
- CVE-2016-7527:  out of bound access in wpg file coder: (bsc#1000436)
- CVE-2016-7996, CVE-2016-7997: WPG Reader Issues (bsc#1003629)
- CVE-2016-7528: out of bound access in xcf file coder (bsc#1000434)
- CVE-2016-8683: Check that filesize is reasonable compared to the header value (bsc#1005127)
- CVE-2016-8682: Stack-buffer read overflow while reading SCT header (bsc#1005125)
- CVE-2016-8684: Mismatch between real filesize and header values (bsc#1005123)
- Buffer overflows in SIXEL, PDB, MAP, and TIFF coders (bsc#1002209)
- CVE-2016-7525: Heap buffer overflow in psd file coder (bsc#1000701)
- CVE-2016-7524: AddressSanitizer:heap-buffer-overflow READ of size 1 in meta.c:465 (bsc#1000700)
- CVE-2016-7530: Out of bound in quantum handling (bsc#1000703)
- CVE-2016-7531: Pbd file out of bound access (bsc#1000704)
- CVE-2016-7533: Wpg file out of bound for corrupted file (bsc#1000707)
- CVE-2016-7535: Out of bound access for corrupted psd file (bsc#1000709)
- CVE-2016-7522: Out of bound access for malformed psd file (bsc#1000698)
- CVE-2016-7517: out-of-bounds read in coders/pict.c (bsc#1000693)
- CVE-2016-7516: Out of bounds problem in rle, pict, viff and sun files (bsc#1000692)
- CVE-2015-8958: Potential DOS in sun file handling due to malformed files (bsc#1000691)
- CVE-2015-8957: Buffer overflow in sun file handling (bsc#1000690)
- CVE-2016-7519: out-of-bounds read in coders/rle.c (bsc#1000695)
- CVE-2016-7518: out-of-bounds read in coders/sun.c (bsc#1000694)
- CVE-2016-7800: 8BIM/8BIMW unsigned underflow leads to heap overflow (bsc#1002422)
- CVE-2016-7523: AddressSanitizer:heap-buffer-overflow READ of size 1 meta.c:496 (bsc#1000699)
- CVE-2016-7799: mogrify global buffer overflow (bsc#1002421)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-01"/>
	<updated date="2016-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000399">SUSE bug 1000399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000434">SUSE bug 1000434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000436">SUSE bug 1000436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000688">SUSE bug 1000688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000689">SUSE bug 1000689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000690">SUSE bug 1000690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000691">SUSE bug 1000691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000692">SUSE bug 1000692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000693">SUSE bug 1000693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000694">SUSE bug 1000694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000695">SUSE bug 1000695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000698">SUSE bug 1000698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000699">SUSE bug 1000699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000700">SUSE bug 1000700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000701">SUSE bug 1000701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000703">SUSE bug 1000703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000704">SUSE bug 1000704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000707">SUSE bug 1000707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000709">SUSE bug 1000709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000711">SUSE bug 1000711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000713">SUSE bug 1000713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000714">SUSE bug 1000714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001066">SUSE bug 1001066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001221">SUSE bug 1001221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002209">SUSE bug 1002209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002421">SUSE bug 1002421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002422">SUSE bug 1002422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003629">SUSE bug 1003629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005123">SUSE bug 1005123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005125">SUSE bug 1005125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005127">SUSE bug 1005127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007245">SUSE bug 1007245</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9907/">CVE-2014-9907 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9907">CVE-2014-9907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8957/">CVE-2015-8957 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8957">CVE-2015-8957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8958/">CVE-2015-8958 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8958">CVE-2015-8958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8959/">CVE-2015-8959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8959">CVE-2015-8959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5687/">CVE-2016-5687 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5687">CVE-2016-5687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6823/">CVE-2016-6823 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6823">CVE-2016-6823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7101/">CVE-2016-7101 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7101">CVE-2016-7101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7514/">CVE-2016-7514 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7514">CVE-2016-7514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7515/">CVE-2016-7515 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7515">CVE-2016-7515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7516/">CVE-2016-7516 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7516">CVE-2016-7516 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7517/">CVE-2016-7517 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7517">CVE-2016-7517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7518/">CVE-2016-7518 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7518">CVE-2016-7518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7519/">CVE-2016-7519 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7519">CVE-2016-7519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7522/">CVE-2016-7522 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7522">CVE-2016-7522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7523/">CVE-2016-7523 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7523">CVE-2016-7523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7524/">CVE-2016-7524 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7524">CVE-2016-7524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7525/">CVE-2016-7525 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7525">CVE-2016-7525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7526/">CVE-2016-7526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7526">CVE-2016-7526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7527/">CVE-2016-7527 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7527">CVE-2016-7527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7528/">CVE-2016-7528 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7528">CVE-2016-7528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7529/">CVE-2016-7529 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7529">CVE-2016-7529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7530/">CVE-2016-7530 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7530">CVE-2016-7530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7531/">CVE-2016-7531 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7531">CVE-2016-7531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7533/">CVE-2016-7533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7533">CVE-2016-7533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7535/">CVE-2016-7535 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7535">CVE-2016-7535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7537/">CVE-2016-7537 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7537">CVE-2016-7537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7799/">CVE-2016-7799 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7799">CVE-2016-7799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7800/">CVE-2016-7800 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7800">CVE-2016-7800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7996/">CVE-2016-7996 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7996">CVE-2016-7996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7997/">CVE-2016-7997 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7997">CVE-2016-7997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8682/">CVE-2016-8682 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8682">CVE-2016-8682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8683/">CVE-2016-8683 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8683">CVE-2016-8683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8684/">CVE-2016-8684 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8684">CVE-2016-8684 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8862/">CVE-2016-8862 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8862">CVE-2016-8862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570426" comment="libMagickCore1-6.4.3.6-7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570427" comment="libMagickCore1-32bit-6.4.3.6-7.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218203" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1009318" ref_url="https://bugzilla.suse.com/1009318" source="BUGZILLA"/>
		<reference ref_id="1011130" ref_url="https://bugzilla.suse.com/1011130" source="BUGZILLA"/>
		<reference ref_id="1011136" ref_url="https://bugzilla.suse.com/1011136" source="BUGZILLA"/>
		<reference ref_id="1013376" ref_url="https://bugzilla.suse.com/1013376" source="BUGZILLA"/>
		<reference ref_id="1014159" ref_url="https://bugzilla.suse.com/1014159" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7530" ref_url="https://www.suse.com/security/cve/CVE-2016-7530/" source="CVE"/>
		<reference ref_id="CVE-2016-8707" ref_url="https://www.suse.com/security/cve/CVE-2016-8707/" source="CVE"/>
		<reference ref_id="CVE-2016-8866" ref_url="https://www.suse.com/security/cve/CVE-2016-8866/" source="CVE"/>
		<reference ref_id="CVE-2016-9556" ref_url="https://www.suse.com/security/cve/CVE-2016-9556/" source="CVE"/>
		<reference ref_id="CVE-2016-9559" ref_url="https://www.suse.com/security/cve/CVE-2016-9559/" source="CVE"/>
		<reference ref_id="CVE-2016-9773" ref_url="https://www.suse.com/security/cve/CVE-2016-9773/" source="CVE"/>
		<description>

This update for ImageMagick fixes the following issues:

* CVE-2016-9556: Possible Heap-overflow found by fuzzing [bsc#1011130]
* CVE-2016-9559: Possible Null pointer access found by fuzzing [bsc#1011136]
* CVE-2016-8707: Possible code execution in the tiff deflate convert code [bsc#1014159]
* CVE-2016-9773: Possible Heap overflow in IsPixelGray [bsc#1013376]
* CVE-2016-8866: Possible memory allocation failure in AcquireMagickMemory [bsc#1009318]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-23"/>
	<updated date="2016-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009318">SUSE bug 1009318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011130">SUSE bug 1011130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011136">SUSE bug 1011136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013376">SUSE bug 1013376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014159">SUSE bug 1014159</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7530/">CVE-2016-7530 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7530">CVE-2016-7530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8707/">CVE-2016-8707 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8707">CVE-2016-8707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8866/">CVE-2016-8866 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8866">CVE-2016-8866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9556/">CVE-2016-9556 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9556">CVE-2016-9556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9559/">CVE-2016-9559 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9559">CVE-2016-9559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9773/">CVE-2016-9773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9773">CVE-2016-9773 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570428" comment="libMagickCore1-6.4.3.6-7.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570429" comment="libMagickCore1-32bit-6.4.3.6-7.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218204" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1017308" ref_url="https://bugzilla.suse.com/1017308" source="BUGZILLA"/>
		<reference ref_id="1017310" ref_url="https://bugzilla.suse.com/1017310" source="BUGZILLA"/>
		<reference ref_id="1017311" ref_url="https://bugzilla.suse.com/1017311" source="BUGZILLA"/>
		<reference ref_id="1017312" ref_url="https://bugzilla.suse.com/1017312" source="BUGZILLA"/>
		<reference ref_id="1017313" ref_url="https://bugzilla.suse.com/1017313" source="BUGZILLA"/>
		<reference ref_id="1017314" ref_url="https://bugzilla.suse.com/1017314" source="BUGZILLA"/>
		<reference ref_id="1017318" ref_url="https://bugzilla.suse.com/1017318" source="BUGZILLA"/>
		<reference ref_id="1017319" ref_url="https://bugzilla.suse.com/1017319" source="BUGZILLA"/>
		<reference ref_id="1017320" ref_url="https://bugzilla.suse.com/1017320" source="BUGZILLA"/>
		<reference ref_id="1017321" ref_url="https://bugzilla.suse.com/1017321" source="BUGZILLA"/>
		<reference ref_id="1017322" ref_url="https://bugzilla.suse.com/1017322" source="BUGZILLA"/>
		<reference ref_id="1017324" ref_url="https://bugzilla.suse.com/1017324" source="BUGZILLA"/>
		<reference ref_id="1017326" ref_url="https://bugzilla.suse.com/1017326" source="BUGZILLA"/>
		<reference ref_id="1017421" ref_url="https://bugzilla.suse.com/1017421" source="BUGZILLA"/>
		<reference ref_id="1020433" ref_url="https://bugzilla.suse.com/1020433" source="BUGZILLA"/>
		<reference ref_id="1020435" ref_url="https://bugzilla.suse.com/1020435" source="BUGZILLA"/>
		<reference ref_id="1020436" ref_url="https://bugzilla.suse.com/1020436" source="BUGZILLA"/>
		<reference ref_id="1020439" ref_url="https://bugzilla.suse.com/1020439" source="BUGZILLA"/>
		<reference ref_id="1020441" ref_url="https://bugzilla.suse.com/1020441" source="BUGZILLA"/>
		<reference ref_id="1020443" ref_url="https://bugzilla.suse.com/1020443" source="BUGZILLA"/>
		<reference ref_id="1020448" ref_url="https://bugzilla.suse.com/1020448" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10046" ref_url="https://www.suse.com/security/cve/CVE-2016-10046/" source="CVE"/>
		<reference ref_id="CVE-2016-10048" ref_url="https://www.suse.com/security/cve/CVE-2016-10048/" source="CVE"/>
		<reference ref_id="CVE-2016-10049" ref_url="https://www.suse.com/security/cve/CVE-2016-10049/" source="CVE"/>
		<reference ref_id="CVE-2016-10050" ref_url="https://www.suse.com/security/cve/CVE-2016-10050/" source="CVE"/>
		<reference ref_id="CVE-2016-10051" ref_url="https://www.suse.com/security/cve/CVE-2016-10051/" source="CVE"/>
		<reference ref_id="CVE-2016-10052" ref_url="https://www.suse.com/security/cve/CVE-2016-10052/" source="CVE"/>
		<reference ref_id="CVE-2016-10059" ref_url="https://www.suse.com/security/cve/CVE-2016-10059/" source="CVE"/>
		<reference ref_id="CVE-2016-10060" ref_url="https://www.suse.com/security/cve/CVE-2016-10060/" source="CVE"/>
		<reference ref_id="CVE-2016-10063" ref_url="https://www.suse.com/security/cve/CVE-2016-10063/" source="CVE"/>
		<reference ref_id="CVE-2016-10064" ref_url="https://www.suse.com/security/cve/CVE-2016-10064/" source="CVE"/>
		<reference ref_id="CVE-2016-10065" ref_url="https://www.suse.com/security/cve/CVE-2016-10065/" source="CVE"/>
		<reference ref_id="CVE-2016-10068" ref_url="https://www.suse.com/security/cve/CVE-2016-10068/" source="CVE"/>
		<reference ref_id="CVE-2016-10070" ref_url="https://www.suse.com/security/cve/CVE-2016-10070/" source="CVE"/>
		<reference ref_id="CVE-2016-10071" ref_url="https://www.suse.com/security/cve/CVE-2016-10071/" source="CVE"/>
		<reference ref_id="CVE-2016-10144" ref_url="https://www.suse.com/security/cve/CVE-2016-10144/" source="CVE"/>
		<reference ref_id="CVE-2016-10145" ref_url="https://www.suse.com/security/cve/CVE-2016-10145/" source="CVE"/>
		<reference ref_id="CVE-2016-10146" ref_url="https://www.suse.com/security/cve/CVE-2016-10146/" source="CVE"/>
		<reference ref_id="CVE-2017-5506" ref_url="https://www.suse.com/security/cve/CVE-2017-5506/" source="CVE"/>
		<reference ref_id="CVE-2017-5507" ref_url="https://www.suse.com/security/cve/CVE-2017-5507/" source="CVE"/>
		<reference ref_id="CVE-2017-5508" ref_url="https://www.suse.com/security/cve/CVE-2017-5508/" source="CVE"/>
		<reference ref_id="CVE-2017-5511" ref_url="https://www.suse.com/security/cve/CVE-2017-5511/" source="CVE"/>
		<description>

This update for ImageMagick fixes the following issues:

- CVE-2016-10046: Prevent buffer overflow in draw.c caused by an incorrect length calculation (bsc#1017308)
- CVE-2016-10048: Arbitrary module could have been load because relative path were not escaped (bsc#1017310)
- CVE-2016-10049: Corrupt RLE files could have overflowed a buffer due to a incorrect length calculation (bsc#1017311)
- CVE-2016-10050: Corrupt RLE files could have overflowed a heap buffer due to a missing offset check (bsc#1017312)
- CVE-2016-10051: Fixed use after free when reading PWP files (bsc#1017313)
- CVE-2016-10052: Added bound check to exif parsing of JPEG files (bsc#1017314).
- CVE-2016-10059: Unchecked calculation when reading TIFF files could have lead to a buffer overflow (bsc#1017318)
- CVE-2016-10060: Improved error handling when writing files to not mask errors (bsc#1017319).
- CVE-2016-10063: Check validity of extend during TIFF file reading (bsc#1017320).
- CVE-2016-10064: Improved checks for buffer overflow when reading TIFF files (bsc#1017321)
- CVE-2016-10065: Unchecked calculations when reading VIFF files could have lead to out of bound reads (bsc#1017322)
- CVE-2016-10068: Prevent NULL pointer access when using the MSL interpreter (bsc#1017324)
- CVE-2016-10070: Prevent allocating the wrong amount of memory when reading mat files (bsc#1017326)
- CVE-2016-10071: Prevent allocating the wrong amount of memory when reading mat files (bsc#1017326).
- CVE-2016-10144: Added a check after allocating memory when parsing IPL files (bsc#1020433).
- CVE-2016-10145: Fixed of-by-one in string copy operation when parsing WPG files (bsc#1020435).
- CVE-2016-10146: Captions and labels were handled incorrectly, causing a memory leak that could have lead to DoS (bsc#1020443)
- CVE-2017-5506: Missing offset check leading to a double-free (bsc#1020436).
- CVE-2017-5507: Fixed a memory leak when reading MPC files allowing for DoS (bsc#1020439).
- CVE-2017-5508: Increase the amount of memory allocated for TIFF pixels to prevent a heap buffer-overflow (bsc#1020441).
- CVE-2017-5511: A missing cast when reading PSD files could have caused memory corruption by a heap overflow (bsc#1020448)

This update removes the fix for CVE-2016-9773. ImageMagick-6 was not affected by CVE-2016-9773 and it caused a regression (at least in GraphicsMagick) (bsc#1017421).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-01"/>
	<updated date="2017-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017308">SUSE bug 1017308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017310">SUSE bug 1017310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017311">SUSE bug 1017311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017312">SUSE bug 1017312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017313">SUSE bug 1017313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017314">SUSE bug 1017314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017318">SUSE bug 1017318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017319">SUSE bug 1017319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017320">SUSE bug 1017320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017321">SUSE bug 1017321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017322">SUSE bug 1017322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017324">SUSE bug 1017324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017326">SUSE bug 1017326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017421">SUSE bug 1017421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020433">SUSE bug 1020433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020435">SUSE bug 1020435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020436">SUSE bug 1020436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020439">SUSE bug 1020439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020441">SUSE bug 1020441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020443">SUSE bug 1020443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020448">SUSE bug 1020448</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10046/">CVE-2016-10046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10046">CVE-2016-10046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10048/">CVE-2016-10048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10048">CVE-2016-10048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10049/">CVE-2016-10049 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10049">CVE-2016-10049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10050/">CVE-2016-10050 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10050">CVE-2016-10050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10051/">CVE-2016-10051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10051">CVE-2016-10051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10052/">CVE-2016-10052 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10052">CVE-2016-10052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10059/">CVE-2016-10059 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10059">CVE-2016-10059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10060/">CVE-2016-10060 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10060">CVE-2016-10060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10063/">CVE-2016-10063 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10063">CVE-2016-10063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10064/">CVE-2016-10064 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10064">CVE-2016-10064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10065/">CVE-2016-10065 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10065">CVE-2016-10065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10068/">CVE-2016-10068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10068">CVE-2016-10068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10070/">CVE-2016-10070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10070">CVE-2016-10070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10071/">CVE-2016-10071 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10071">CVE-2016-10071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10144/">CVE-2016-10144 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10144">CVE-2016-10144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10145/">CVE-2016-10145 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10145">CVE-2016-10145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10146/">CVE-2016-10146 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10146">CVE-2016-10146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5506/">CVE-2017-5506 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5506">CVE-2017-5506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5507/">CVE-2017-5507 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5507">CVE-2017-5507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5508/">CVE-2017-5508 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5508">CVE-2017-5508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5511/">CVE-2017-5511 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5511">CVE-2017-5511 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570430" comment="libMagickCore1-6.4.3.6-7.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570431" comment="libMagickCore1-32bit-6.4.3.6-7.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218205" version="1" class="patch">
	<metadata>
		<title>Recommended update for ImageMagick (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027480" ref_url="https://bugzilla.suse.com/1027480" source="BUGZILLA"/>
		<reference ref_id="1028079" ref_url="https://bugzilla.suse.com/1028079" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7518" ref_url="https://www.suse.com/security/cve/CVE-2016-7518/" source="CVE"/>
		<description>

This update for ImageMagick provides the following fixes:

- Fix segmentation fault when wrong parameter supplied to conjure command (bsc#1027480).
- Improve CVE-2016-7518 patch to fix sun coder (bsc#1028079 comment 5).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-29"/>
	<updated date="2017-03-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1027480">SUSE bug 1027480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028079">SUSE bug 1028079</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7518/">CVE-2016-7518 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7518">CVE-2016-7518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594210" comment="libMagickCore1-6.4.3.6-7.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594211" comment="libMagickCore1-32bit-6.4.3.6-7.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218206" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1033091" ref_url="https://bugzilla.suse.com/1033091" source="BUGZILLA"/>
		<reference ref_id="1034870" ref_url="https://bugzilla.suse.com/1034870" source="BUGZILLA"/>
		<reference ref_id="1034872" ref_url="https://bugzilla.suse.com/1034872" source="BUGZILLA"/>
		<reference ref_id="1034876" ref_url="https://bugzilla.suse.com/1034876" source="BUGZILLA"/>
		<reference ref_id="1036976" ref_url="https://bugzilla.suse.com/1036976" source="BUGZILLA"/>
		<reference ref_id="1036978" ref_url="https://bugzilla.suse.com/1036978" source="BUGZILLA"/>
		<reference ref_id="1036980" ref_url="https://bugzilla.suse.com/1036980" source="BUGZILLA"/>
		<reference ref_id="1036981" ref_url="https://bugzilla.suse.com/1036981" source="BUGZILLA"/>
		<reference ref_id="1036983" ref_url="https://bugzilla.suse.com/1036983" source="BUGZILLA"/>
		<reference ref_id="1036984" ref_url="https://bugzilla.suse.com/1036984" source="BUGZILLA"/>
		<reference ref_id="1036985" ref_url="https://bugzilla.suse.com/1036985" source="BUGZILLA"/>
		<reference ref_id="1036986" ref_url="https://bugzilla.suse.com/1036986" source="BUGZILLA"/>
		<reference ref_id="1036987" ref_url="https://bugzilla.suse.com/1036987" source="BUGZILLA"/>
		<reference ref_id="1036988" ref_url="https://bugzilla.suse.com/1036988" source="BUGZILLA"/>
		<reference ref_id="1036989" ref_url="https://bugzilla.suse.com/1036989" source="BUGZILLA"/>
		<reference ref_id="1036990" ref_url="https://bugzilla.suse.com/1036990" source="BUGZILLA"/>
		<reference ref_id="1037527" ref_url="https://bugzilla.suse.com/1037527" source="BUGZILLA"/>
		<reference ref_id="1038000" ref_url="https://bugzilla.suse.com/1038000" source="BUGZILLA"/>
		<reference ref_id="1040025" ref_url="https://bugzilla.suse.com/1040025" source="BUGZILLA"/>
		<reference ref_id="1040303" ref_url="https://bugzilla.suse.com/1040303" source="BUGZILLA"/>
		<reference ref_id="1040304" ref_url="https://bugzilla.suse.com/1040304" source="BUGZILLA"/>
		<reference ref_id="1040306" ref_url="https://bugzilla.suse.com/1040306" source="BUGZILLA"/>
		<reference ref_id="1040332" ref_url="https://bugzilla.suse.com/1040332" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9846" ref_url="https://www.suse.com/security/cve/CVE-2014-9846/" source="CVE"/>
		<reference ref_id="CVE-2016-10050" ref_url="https://www.suse.com/security/cve/CVE-2016-10050/" source="CVE"/>
		<reference ref_id="CVE-2017-7606" ref_url="https://www.suse.com/security/cve/CVE-2017-7606/" source="CVE"/>
		<reference ref_id="CVE-2017-7941" ref_url="https://www.suse.com/security/cve/CVE-2017-7941/" source="CVE"/>
		<reference ref_id="CVE-2017-7942" ref_url="https://www.suse.com/security/cve/CVE-2017-7942/" source="CVE"/>
		<reference ref_id="CVE-2017-7943" ref_url="https://www.suse.com/security/cve/CVE-2017-7943/" source="CVE"/>
		<reference ref_id="CVE-2017-8344" ref_url="https://www.suse.com/security/cve/CVE-2017-8344/" source="CVE"/>
		<reference ref_id="CVE-2017-8345" ref_url="https://www.suse.com/security/cve/CVE-2017-8345/" source="CVE"/>
		<reference ref_id="CVE-2017-8346" ref_url="https://www.suse.com/security/cve/CVE-2017-8346/" source="CVE"/>
		<reference ref_id="CVE-2017-8348" ref_url="https://www.suse.com/security/cve/CVE-2017-8348/" source="CVE"/>
		<reference ref_id="CVE-2017-8349" ref_url="https://www.suse.com/security/cve/CVE-2017-8349/" source="CVE"/>
		<reference ref_id="CVE-2017-8350" ref_url="https://www.suse.com/security/cve/CVE-2017-8350/" source="CVE"/>
		<reference ref_id="CVE-2017-8351" ref_url="https://www.suse.com/security/cve/CVE-2017-8351/" source="CVE"/>
		<reference ref_id="CVE-2017-8352" ref_url="https://www.suse.com/security/cve/CVE-2017-8352/" source="CVE"/>
		<reference ref_id="CVE-2017-8353" ref_url="https://www.suse.com/security/cve/CVE-2017-8353/" source="CVE"/>
		<reference ref_id="CVE-2017-8354" ref_url="https://www.suse.com/security/cve/CVE-2017-8354/" source="CVE"/>
		<reference ref_id="CVE-2017-8355" ref_url="https://www.suse.com/security/cve/CVE-2017-8355/" source="CVE"/>
		<reference ref_id="CVE-2017-8357" ref_url="https://www.suse.com/security/cve/CVE-2017-8357/" source="CVE"/>
		<reference ref_id="CVE-2017-8765" ref_url="https://www.suse.com/security/cve/CVE-2017-8765/" source="CVE"/>
		<reference ref_id="CVE-2017-8830" ref_url="https://www.suse.com/security/cve/CVE-2017-8830/" source="CVE"/>
		<reference ref_id="CVE-2017-9098" ref_url="https://www.suse.com/security/cve/CVE-2017-9098/" source="CVE"/>
		<reference ref_id="CVE-2017-9141" ref_url="https://www.suse.com/security/cve/CVE-2017-9141/" source="CVE"/>
		<reference ref_id="CVE-2017-9142" ref_url="https://www.suse.com/security/cve/CVE-2017-9142/" source="CVE"/>
		<reference ref_id="CVE-2017-9143" ref_url="https://www.suse.com/security/cve/CVE-2017-9143/" source="CVE"/>
		<reference ref_id="CVE-2017-9144" ref_url="https://www.suse.com/security/cve/CVE-2017-9144/" source="CVE"/>
		<description>

This update for ImageMagick fixes the following issues:

This security issue was fixed:

- CVE-2017-7941: The ReadSGIImage function in sgi.c allowed remote attackers to consume an
  amount of available memory via a crafted file (bsc#1034876).
- CVE-2017-8351: ImageMagick, GraphicsMagick: denial of service (memory leak) via a crafted
  file (ReadPCDImage func in pcd.c) (bsc#1036986).
- CVE-2017-8352: denial of service (memory leak) via a crafted file (ReadXWDImage func in
  xwd.c) (bsc#1036987)
- CVE-2017-8349: denial of service (memory leak) via a crafted file (ReadSFWImage func in
  sfw.c) (bsc#1036984)
- CVE-2017-8350: denial of service (memory leak) via a crafted file (ReadJNGImage function in
  png.c) (bsc#1036985)
- CVE-2017-8345: denial of service (memory leak) via a crafted file (ReadMNGImage func in
  png.c) (bsc#1036980)
- CVE-2017-8346: denial of service (memory leak) via a crafted file (ReadDCMImage func in
  dcm.c) (bsc#1036981)
- CVE-2017-8353: denial of service (memory leak) via a crafted file (ReadPICTImage func in
  pict.c) (bsc#1036988)
- CVE-2017-8830: denial of service (memory leak) via a crafted file (ReadBMPImage func in
  bmp.c:1379) (bsc#1038000)
- CVE-2017-7606: denial of service (application crash) or possibly have unspecified other
  impact via a crafted image (bsc#1033091)
- CVE-2017-8765: memory leak vulnerability via a crafted ICON file (ReadICONImage in
  coders\icon.c) (bsc#1037527)
- CVE-2017-8355: denial of service (memory leak) via a crafted file (ReadMTVImage func in
  mtv.c) (bsc#1036990)
- CVE-2017-8344: denial of service (memory leak) via a crafted file (ReadPCXImage func in
  pcx.c) (bsc#1036978)
- CVE-2017-9098: uninitialized memory usage in the  ReadRLEImage RLE decoder 
  function coders/rle.c (bsc#1040025)
- CVE-2017-9141: Missing checks in the ReadDDSImage function in
  coders/dds.c could lead to a denial of service (assertion) (bsc#1040303)
- CVE-2017-9142: Missing checks in theReadOneJNGImage function in
  coders/png.c could lead to denial of service (assertion) (bsc#1040304)
- CVE-2017-9143: A possible denial of service attack via crafted .art
  file in ReadARTImage function in coders/art.c (bsc#1040306)
- CVE-2017-9144: A crafted RLE image can trigger a crash in coders/rle.c
  could lead to a denial of service (crash) (bsc#1040332)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-19"/>
	<updated date="2017-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033091">SUSE bug 1033091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034870">SUSE bug 1034870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034872">SUSE bug 1034872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034876">SUSE bug 1034876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036976">SUSE bug 1036976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036978">SUSE bug 1036978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036980">SUSE bug 1036980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036981">SUSE bug 1036981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036983">SUSE bug 1036983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036984">SUSE bug 1036984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036985">SUSE bug 1036985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036986">SUSE bug 1036986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036987">SUSE bug 1036987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036988">SUSE bug 1036988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036989">SUSE bug 1036989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036990">SUSE bug 1036990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037527">SUSE bug 1037527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038000">SUSE bug 1038000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040025">SUSE bug 1040025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040303">SUSE bug 1040303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040304">SUSE bug 1040304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040306">SUSE bug 1040306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040332">SUSE bug 1040332</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9846/">CVE-2014-9846 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9846">CVE-2014-9846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10050/">CVE-2016-10050 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10050">CVE-2016-10050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7606/">CVE-2017-7606 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7606">CVE-2017-7606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7941/">CVE-2017-7941 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7941">CVE-2017-7941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7942/">CVE-2017-7942 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7942">CVE-2017-7942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7943/">CVE-2017-7943 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7943">CVE-2017-7943 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8344/">CVE-2017-8344 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8344">CVE-2017-8344 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8345/">CVE-2017-8345 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8345">CVE-2017-8345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8346/">CVE-2017-8346 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8346">CVE-2017-8346 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8348/">CVE-2017-8348 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8348">CVE-2017-8348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8349/">CVE-2017-8349 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8349">CVE-2017-8349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8350/">CVE-2017-8350 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8350">CVE-2017-8350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8351/">CVE-2017-8351 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8351">CVE-2017-8351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8352/">CVE-2017-8352 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8352">CVE-2017-8352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8353/">CVE-2017-8353 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8353">CVE-2017-8353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8354/">CVE-2017-8354 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8354">CVE-2017-8354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8355/">CVE-2017-8355 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8355">CVE-2017-8355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8357/">CVE-2017-8357 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8357">CVE-2017-8357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8765/">CVE-2017-8765 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8765">CVE-2017-8765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8830/">CVE-2017-8830 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8830">CVE-2017-8830 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9098/">CVE-2017-9098 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9098">CVE-2017-9098 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9141/">CVE-2017-9141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9141">CVE-2017-9141 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9142/">CVE-2017-9142 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9142">CVE-2017-9142 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9143/">CVE-2017-9143 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9143">CVE-2017-9143 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9144/">CVE-2017-9144 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9144">CVE-2017-9144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570432" comment="libMagickCore1-6.4.3.6-7.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570433" comment="libMagickCore1-32bit-6.4.3.6-7.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218207" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1042826" ref_url="https://bugzilla.suse.com/1042826" source="BUGZILLA"/>
		<reference ref_id="1043289" ref_url="https://bugzilla.suse.com/1043289" source="BUGZILLA"/>
		<reference ref_id="1049072" ref_url="https://bugzilla.suse.com/1049072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11403" ref_url="https://www.suse.com/security/cve/CVE-2017-11403/" source="CVE"/>
		<reference ref_id="CVE-2017-9439" ref_url="https://www.suse.com/security/cve/CVE-2017-9439/" source="CVE"/>
		<reference ref_id="CVE-2017-9501" ref_url="https://www.suse.com/security/cve/CVE-2017-9501/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:
- CVE-2017-9439: A memory leak was found in the function ReadPDBImage incoders/pdb.c (bsc#1042826)
- CVE-2017-9501: An assertion failure could cause a denial of service via a crafted file (bsc#1043289)
- CVE-2017-11403: ReadMNGImage function in coders/png.c has an out-of-order CloseBlob call, resulting
  in a use-after-free via acrafted file (bsc#1049072)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-16"/>
	<updated date="2017-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1042826">SUSE bug 1042826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043289">SUSE bug 1043289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049072">SUSE bug 1049072</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11403/">CVE-2017-11403 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11403">CVE-2017-11403 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9439/">CVE-2017-9439 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9439">CVE-2017-9439 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9501/">CVE-2017-9501 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9501">CVE-2017-9501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570434" comment="libMagickCore1-6.4.3.6-7.78.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570435" comment="libMagickCore1-32bit-6.4.3.6-7.78.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218208" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1050135" ref_url="https://bugzilla.suse.com/1050135" source="BUGZILLA"/>
		<reference ref_id="1055219" ref_url="https://bugzilla.suse.com/1055219" source="BUGZILLA"/>
		<reference ref_id="1055430" ref_url="https://bugzilla.suse.com/1055430" source="BUGZILLA"/>
		<reference ref_id="1061873" ref_url="https://bugzilla.suse.com/1061873" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11534" ref_url="https://www.suse.com/security/cve/CVE-2017-11534/" source="CVE"/>
		<reference ref_id="CVE-2017-13133" ref_url="https://www.suse.com/security/cve/CVE-2017-13133/" source="CVE"/>
		<reference ref_id="CVE-2017-13139" ref_url="https://www.suse.com/security/cve/CVE-2017-13139/" source="CVE"/>
		<reference ref_id="CVE-2017-15033" ref_url="https://www.suse.com/security/cve/CVE-2017-15033/" source="CVE"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2017-11534: Processing a crafted file in convert could have lead to a
  Memory Leak in the lite_font_map() function in coders/wmf.c (bsc#1050135).
- CVE-2017-13133: The load_level function in coders/xcf.c lacked offset
  validation, which allowed attackers to cause a denial of service (load_tile
  memory exhaustion) via a crafted file (bsc#1055219).
- CVE-2017-13139: The ReadOneMNGImage function in coders/png.c had an
  out-of-bounds read with the MNG CLIP chunk (bsc#1055430).
- CVE-2017-15033: Fixed a memory leak in ReadYUVImage in coders/yuv.c
  (bsc#1061873).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-30"/>
	<updated date="2017-11-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050135">SUSE bug 1050135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055219">SUSE bug 1055219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055430">SUSE bug 1055430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061873">SUSE bug 1061873</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11534/">CVE-2017-11534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11534">CVE-2017-11534 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13133/">CVE-2017-13133 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13133">CVE-2017-13133 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13139/">CVE-2017-13139 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13139">CVE-2017-13139 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15033/">CVE-2017-15033 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15033">CVE-2017-15033 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570436" comment="libMagickCore1-6.4.3.6-7.78.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570437" comment="libMagickCore1-32bit-6.4.3.6-7.78.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218209" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1048457" ref_url="https://bugzilla.suse.com/1048457" source="BUGZILLA"/>
		<reference ref_id="1049796" ref_url="https://bugzilla.suse.com/1049796" source="BUGZILLA"/>
		<reference ref_id="1050116" ref_url="https://bugzilla.suse.com/1050116" source="BUGZILLA"/>
		<reference ref_id="1050139" ref_url="https://bugzilla.suse.com/1050139" source="BUGZILLA"/>
		<reference ref_id="1050632" ref_url="https://bugzilla.suse.com/1050632" source="BUGZILLA"/>
		<reference ref_id="1051441" ref_url="https://bugzilla.suse.com/1051441" source="BUGZILLA"/>
		<reference ref_id="1051847" ref_url="https://bugzilla.suse.com/1051847" source="BUGZILLA"/>
		<reference ref_id="1052450" ref_url="https://bugzilla.suse.com/1052450" source="BUGZILLA"/>
		<reference ref_id="1052553" ref_url="https://bugzilla.suse.com/1052553" source="BUGZILLA"/>
		<reference ref_id="1052689" ref_url="https://bugzilla.suse.com/1052689" source="BUGZILLA"/>
		<reference ref_id="1052758" ref_url="https://bugzilla.suse.com/1052758" source="BUGZILLA"/>
		<reference ref_id="1052764" ref_url="https://bugzilla.suse.com/1052764" source="BUGZILLA"/>
		<reference ref_id="1054757" ref_url="https://bugzilla.suse.com/1054757" source="BUGZILLA"/>
		<reference ref_id="1055214" ref_url="https://bugzilla.suse.com/1055214" source="BUGZILLA"/>
		<reference ref_id="1056432" ref_url="https://bugzilla.suse.com/1056432" source="BUGZILLA"/>
		<reference ref_id="1057719" ref_url="https://bugzilla.suse.com/1057719" source="BUGZILLA"/>
		<reference ref_id="1057729" ref_url="https://bugzilla.suse.com/1057729" source="BUGZILLA"/>
		<reference ref_id="1057730" ref_url="https://bugzilla.suse.com/1057730" source="BUGZILLA"/>
		<reference ref_id="1058485" ref_url="https://bugzilla.suse.com/1058485" source="BUGZILLA"/>
		<reference ref_id="1058637" ref_url="https://bugzilla.suse.com/1058637" source="BUGZILLA"/>
		<reference ref_id="1059666" ref_url="https://bugzilla.suse.com/1059666" source="BUGZILLA"/>
		<reference ref_id="1059778" ref_url="https://bugzilla.suse.com/1059778" source="BUGZILLA"/>
		<reference ref_id="1060577" ref_url="https://bugzilla.suse.com/1060577" source="BUGZILLA"/>
		<reference ref_id="1066003" ref_url="https://bugzilla.suse.com/1066003" source="BUGZILLA"/>
		<reference ref_id="1067181" ref_url="https://bugzilla.suse.com/1067181" source="BUGZILLA"/>
		<reference ref_id="1067184" ref_url="https://bugzilla.suse.com/1067184" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11188" ref_url="https://www.suse.com/security/cve/CVE-2017-11188/" source="CVE"/>
		<reference ref_id="CVE-2017-11478" ref_url="https://www.suse.com/security/cve/CVE-2017-11478/" source="CVE"/>
		<reference ref_id="CVE-2017-11527" ref_url="https://www.suse.com/security/cve/CVE-2017-11527/" source="CVE"/>
		<reference ref_id="CVE-2017-11535" ref_url="https://www.suse.com/security/cve/CVE-2017-11535/" source="CVE"/>
		<reference ref_id="CVE-2017-11640" ref_url="https://www.suse.com/security/cve/CVE-2017-11640/" source="CVE"/>
		<reference ref_id="CVE-2017-11752" ref_url="https://www.suse.com/security/cve/CVE-2017-11752/" source="CVE"/>
		<reference ref_id="CVE-2017-12140" ref_url="https://www.suse.com/security/cve/CVE-2017-12140/" source="CVE"/>
		<reference ref_id="CVE-2017-12435" ref_url="https://www.suse.com/security/cve/CVE-2017-12435/" source="CVE"/>
		<reference ref_id="CVE-2017-12587" ref_url="https://www.suse.com/security/cve/CVE-2017-12587/" source="CVE"/>
		<reference ref_id="CVE-2017-12644" ref_url="https://www.suse.com/security/cve/CVE-2017-12644/" source="CVE"/>
		<reference ref_id="CVE-2017-12662" ref_url="https://www.suse.com/security/cve/CVE-2017-12662/" source="CVE"/>
		<reference ref_id="CVE-2017-12669" ref_url="https://www.suse.com/security/cve/CVE-2017-12669/" source="CVE"/>
		<reference ref_id="CVE-2017-12983" ref_url="https://www.suse.com/security/cve/CVE-2017-12983/" source="CVE"/>
		<reference ref_id="CVE-2017-13134" ref_url="https://www.suse.com/security/cve/CVE-2017-13134/" source="CVE"/>
		<reference ref_id="CVE-2017-13769" ref_url="https://www.suse.com/security/cve/CVE-2017-13769/" source="CVE"/>
		<reference ref_id="CVE-2017-14172" ref_url="https://www.suse.com/security/cve/CVE-2017-14172/" source="CVE"/>
		<reference ref_id="CVE-2017-14173" ref_url="https://www.suse.com/security/cve/CVE-2017-14173/" source="CVE"/>
		<reference ref_id="CVE-2017-14175" ref_url="https://www.suse.com/security/cve/CVE-2017-14175/" source="CVE"/>
		<reference ref_id="CVE-2017-14341" ref_url="https://www.suse.com/security/cve/CVE-2017-14341/" source="CVE"/>
		<reference ref_id="CVE-2017-14342" ref_url="https://www.suse.com/security/cve/CVE-2017-14342/" source="CVE"/>
		<reference ref_id="CVE-2017-14531" ref_url="https://www.suse.com/security/cve/CVE-2017-14531/" source="CVE"/>
		<reference ref_id="CVE-2017-14607" ref_url="https://www.suse.com/security/cve/CVE-2017-14607/" source="CVE"/>
		<reference ref_id="CVE-2017-14733" ref_url="https://www.suse.com/security/cve/CVE-2017-14733/" source="CVE"/>
		<reference ref_id="CVE-2017-15930" ref_url="https://www.suse.com/security/cve/CVE-2017-15930/" source="CVE"/>
		<reference ref_id="CVE-2017-16545" ref_url="https://www.suse.com/security/cve/CVE-2017-16545/" source="CVE"/>
		<reference ref_id="CVE-2017-16546" ref_url="https://www.suse.com/security/cve/CVE-2017-16546/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

  * CVE-2017-14607: out of bounds read flaw related to ReadTIFFImagehas  
    could possibly disclose potentially sensitive memory [bsc#1059778]
  
  * CVE-2017-11640: NULL pointer deref in WritePTIFImage() in coders/tiff.c [bsc#1050632]
  
  * CVE-2017-14342: a memory exhaustion vulnerability in ReadWPGImage 
    in coders/wpg.c could lead to denial of service [bsc#1058485]

  * CVE-2017-14341: Infinite loop in the ReadWPGImage function [bsc#1058637]

  * CVE-2017-16546: problem in the function ReadWPGImage in coders/wpg.c 
    could lead to denial of service [bsc#1067181]

  * CVE-2017-16545: The ReadWPGImage function in coders/wpg.c in  
    validation problems could lead to denial of service [bsc#1067184]

  * CVE-2017-14175: Lack of End of File check could lead to denial of service [bsc#1057719]

  * CVE-2017-13769: denial of service issue in function WriteTHUMBNAILImage in coders/thumbnail.c [bsc#1056432]

  * CVE-2017-13134: a heap-based buffer over-read was found in thefunction SFWScan 
    in coders/sfw.c, which allows attackers to cause adenial of service via a crafted file. [bsc#1055214]

  * CVE-2017-11478: ReadOneDJVUImage in coders/djvu.c in ImageMagick allows remote attackers to cause a DoS [bsc#1049796]

  * CVE-2017-15930: Null Pointer dereference  while transfering JPEG scanlines could lead to denial of service [bsc#1066003]

  * CVE-2017-12983: Heap-based buffer overflow in the ReadSFWImage function in coders/sfw.c 
    allows remote attackers to cause a denial of service [bsc#1054757]

  * CVE-2017-14531: memory exhaustion issue in ReadSUNImage incoders/sun.c. [bsc#1059666]

  * CVE-2017-12435: Memory exhaustion in ReadSUNImage in coders/sun.c, 
    which allows attackers to cause denial of service [bsc#1052553]

  * CVE-2017-12587: User controlable large loop in the ReadPWPImage in coders\pwp.c could lead to denial of service [bsc#1052450]

  * CVE-2017-14173: unction ReadTXTImage is vulnerable to a integer overflow that could lead to denial of service [bsc#1057729]
  
  * CVE-2017-11188: ImageMagick: The ReadDPXImage function in codersdpx.c in ImageMagick 7.0.6-0 has a largeloop vulnerability that can cause CPU exhaustion via a crafted DPX file, relatedto lack of an EOF check. [bnc#1048457]

  * CVE-2017-11527: ImageMagick: ReadDPXImage in coders/dpx.c allows remote attackers to cause DoS [bnc#1050116] 

  * CVE-2017-11535: GraphicsMagick, ImageMagick: Heap-based buffer over-read in WritePSImage() in coders/ps.c [bnc#1050139]

  * CVE-2017-11752: ImageMagick: ReadMAGICKImage in coders/magick.c allows to cause DoS  [bnc#1051441] 

  * CVE-2017-12140: ImageMagick: ReadDCMImage in codersdcm.c has a ninteger signedness error leading to excessive memory consumption [bnc#1051847] 

  * CVE-2017-12669: ImageMagick: Memory leak in WriteCALSImage in coders/cals.c [bnc#1052689]

  * CVE-2017-12662: GraphicsMagick, ImageMagick: Memory leak in WritePDFImage in coders/pdf.c [bnc#1052758]

  * CVE-2017-12644: ImageMagick: Memory leak in ReadDCMImage in codersdcm.c [bnc#1052764]

  * CVE-2017-14172: ImageMagick: Lack of end of file check in ReadPSImage() could lead to a denial of service [bnc#1057730]

  * CVE-2017-14733: GraphicsMagick: Heap overflow on ReadRLEImage in coders/rle.c could lead to denial of service [bnc#1060577]
  
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-20"/>
	<updated date="2017-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1048457">SUSE bug 1048457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049796">SUSE bug 1049796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050116">SUSE bug 1050116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050139">SUSE bug 1050139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050632">SUSE bug 1050632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051441">SUSE bug 1051441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051847">SUSE bug 1051847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052450">SUSE bug 1052450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052553">SUSE bug 1052553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052689">SUSE bug 1052689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052758">SUSE bug 1052758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052764">SUSE bug 1052764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054757">SUSE bug 1054757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055214">SUSE bug 1055214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056432">SUSE bug 1056432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057719">SUSE bug 1057719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057729">SUSE bug 1057729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057730">SUSE bug 1057730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058485">SUSE bug 1058485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058637">SUSE bug 1058637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059666">SUSE bug 1059666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059778">SUSE bug 1059778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060577">SUSE bug 1060577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066003">SUSE bug 1066003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067181">SUSE bug 1067181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067184">SUSE bug 1067184</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11188/">CVE-2017-11188 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11188">CVE-2017-11188 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11478/">CVE-2017-11478 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11478">CVE-2017-11478 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11527/">CVE-2017-11527 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11527">CVE-2017-11527 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11535/">CVE-2017-11535 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11535">CVE-2017-11535 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11640/">CVE-2017-11640 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11640">CVE-2017-11640 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11752/">CVE-2017-11752 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11752">CVE-2017-11752 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12140/">CVE-2017-12140 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12140">CVE-2017-12140 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12435/">CVE-2017-12435 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12435">CVE-2017-12435 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12587/">CVE-2017-12587 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12587">CVE-2017-12587 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12644/">CVE-2017-12644 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12644">CVE-2017-12644 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12662/">CVE-2017-12662 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12662">CVE-2017-12662 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12669/">CVE-2017-12669 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12669">CVE-2017-12669 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12983/">CVE-2017-12983 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12983">CVE-2017-12983 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13134/">CVE-2017-13134 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13134">CVE-2017-13134 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13769/">CVE-2017-13769 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13769">CVE-2017-13769 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14172/">CVE-2017-14172 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14172">CVE-2017-14172 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14173/">CVE-2017-14173 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14173">CVE-2017-14173 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14175/">CVE-2017-14175 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14175">CVE-2017-14175 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14341/">CVE-2017-14341 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14341">CVE-2017-14341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14342/">CVE-2017-14342 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14342">CVE-2017-14342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14531/">CVE-2017-14531 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14531">CVE-2017-14531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14607/">CVE-2017-14607 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14607">CVE-2017-14607 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14733/">CVE-2017-14733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14733">CVE-2017-14733 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15930/">CVE-2017-15930 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15930">CVE-2017-15930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16545/">CVE-2017-16545 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16545">CVE-2017-16545 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16546/">CVE-2017-16546 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16546">CVE-2017-16546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570438" comment="libMagickCore1-6.4.3.6-7.78.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570439" comment="libMagickCore1-32bit-6.4.3.6-7.78.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218210" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1052460" ref_url="https://bugzilla.suse.com/1052460" source="BUGZILLA"/>
		<reference ref_id="1055053" ref_url="https://bugzilla.suse.com/1055053" source="BUGZILLA"/>
		<reference ref_id="1055063" ref_url="https://bugzilla.suse.com/1055063" source="BUGZILLA"/>
		<reference ref_id="1056550" ref_url="https://bugzilla.suse.com/1056550" source="BUGZILLA"/>
		<reference ref_id="1057723" ref_url="https://bugzilla.suse.com/1057723" source="BUGZILLA"/>
		<reference ref_id="1058422" ref_url="https://bugzilla.suse.com/1058422" source="BUGZILLA"/>
		<reference ref_id="1063049" ref_url="https://bugzilla.suse.com/1063049" source="BUGZILLA"/>
		<reference ref_id="1063050" ref_url="https://bugzilla.suse.com/1063050" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12563" ref_url="https://www.suse.com/security/cve/CVE-2017-12563/" source="CVE"/>
		<reference ref_id="CVE-2017-12691" ref_url="https://www.suse.com/security/cve/CVE-2017-12691/" source="CVE"/>
		<reference ref_id="CVE-2017-13061" ref_url="https://www.suse.com/security/cve/CVE-2017-13061/" source="CVE"/>
		<reference ref_id="CVE-2017-13062" ref_url="https://www.suse.com/security/cve/CVE-2017-13062/" source="CVE"/>
		<reference ref_id="CVE-2017-14042" ref_url="https://www.suse.com/security/cve/CVE-2017-14042/" source="CVE"/>
		<reference ref_id="CVE-2017-14174" ref_url="https://www.suse.com/security/cve/CVE-2017-14174/" source="CVE"/>
		<reference ref_id="CVE-2017-14343" ref_url="https://www.suse.com/security/cve/CVE-2017-14343/" source="CVE"/>
		<reference ref_id="CVE-2017-15277" ref_url="https://www.suse.com/security/cve/CVE-2017-15277/" source="CVE"/>
		<reference ref_id="CVE-2017-15281" ref_url="https://www.suse.com/security/cve/CVE-2017-15281/" source="CVE"/>
		<description>
This update for ImageMagick fixes several issues.
  
These security issues were fixed:

- CVE-2017-14343: Fixed a memory leak vulnerability in ReadXCFImage in
  coders/xcf.c via a crafted xcf image file (bsc#1058422).
- CVE-2017-12691: The ReadOneLayer function in coders/xcf.c allowed remote
  attackers to cause a denial of service (memory consumption) via a crafted file
  (bsc#1058422).
- CVE-2017-14042: Prevent memory allocation failure in the ReadPNMImage
  function in coders/pnm.c. The vulnerability caused a big memory allocation,
  which may have lead to remote denial of service in the MagickRealloc function
  in magick/memory.c (bsc#1056550).
- CVE-2017-15281: ReadPSDImage in coders/psd.c allowed remote attackers to
  cause a denial of service (application crash) or possibly have unspecified
  other impact via a crafted file (bsc#1063049).
- CVE-2017-13061: A length-validation vulnerability in the function
  ReadPSDLayersInternal in coders/psd.c allowed attackers to cause a denial of
  service (ReadPSDImage memory exhaustion) via a crafted file (bsc#1055063).
- CVE-2017-12563: A memory exhaustion vulnerability in the function
  ReadPSDImage in coders/psd.c allowed attackers to cause a denial of service
  (bsc#1052460).
- CVE-2017-14174: coders/psd.c allowed for DoS in ReadPSDLayersInternal() due
  to lack of an EOF (End of File) check might have caused huge CPU consumption.
  When a crafted PSD file, which claims a large 'length' field in the header but
  did not contain sufficient backing data, is provided, the loop over 'length'
  would consume huge CPU resources, since there is no EOF check inside the loop
  (bsc#1057723).
- CVE-2017-13062: A memory leak vulnerability in the function formatIPTC in
  coders/meta.c allowed attackers to cause a denial of service (WriteMETAImage
  memory consumption) via a crafted file (bsc#1055053).
- CVE-2017-15277: ReadGIFImage in coders/gif.c left the palette uninitialized
  when processing a GIF file that has neither a global nor local palette. If this
  functionality was used as a library loaded into a process that operates on
  interesting data, this data sometimes could have been leaked via the
  uninitialized palette (bsc#1063050).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-09"/>
	<updated date="2018-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1052460">SUSE bug 1052460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055053">SUSE bug 1055053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055063">SUSE bug 1055063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056550">SUSE bug 1056550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057723">SUSE bug 1057723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058422">SUSE bug 1058422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063049">SUSE bug 1063049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063050">SUSE bug 1063050</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12563/">CVE-2017-12563 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12563">CVE-2017-12563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12691/">CVE-2017-12691 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12691">CVE-2017-12691 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13061/">CVE-2017-13061 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13061">CVE-2017-13061 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13062/">CVE-2017-13062 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13062">CVE-2017-13062 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14042/">CVE-2017-14042 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14042">CVE-2017-14042 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14174/">CVE-2017-14174 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14174">CVE-2017-14174 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14343/">CVE-2017-14343 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14343">CVE-2017-14343 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15277/">CVE-2017-15277 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15277">CVE-2017-15277 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15281/">CVE-2017-15281 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15281">CVE-2017-15281 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570440" comment="libMagickCore1-6.4.3.6-7.78.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570441" comment="libMagickCore1-32bit-6.4.3.6-7.78.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218211" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1042948" ref_url="https://bugzilla.suse.com/1042948" source="BUGZILLA"/>
		<reference ref_id="1047044" ref_url="https://bugzilla.suse.com/1047044" source="BUGZILLA"/>
		<reference ref_id="1047898" ref_url="https://bugzilla.suse.com/1047898" source="BUGZILLA"/>
		<reference ref_id="1049373" ref_url="https://bugzilla.suse.com/1049373" source="BUGZILLA"/>
		<reference ref_id="1050120" ref_url="https://bugzilla.suse.com/1050120" source="BUGZILLA"/>
		<reference ref_id="1050606" ref_url="https://bugzilla.suse.com/1050606" source="BUGZILLA"/>
		<reference ref_id="1051412" ref_url="https://bugzilla.suse.com/1051412" source="BUGZILLA"/>
		<reference ref_id="1051446" ref_url="https://bugzilla.suse.com/1051446" source="BUGZILLA"/>
		<reference ref_id="1052252" ref_url="https://bugzilla.suse.com/1052252" source="BUGZILLA"/>
		<reference ref_id="1052468" ref_url="https://bugzilla.suse.com/1052468" source="BUGZILLA"/>
		<reference ref_id="1052550" ref_url="https://bugzilla.suse.com/1052550" source="BUGZILLA"/>
		<reference ref_id="1052710" ref_url="https://bugzilla.suse.com/1052710" source="BUGZILLA"/>
		<reference ref_id="1052720" ref_url="https://bugzilla.suse.com/1052720" source="BUGZILLA"/>
		<reference ref_id="1052731" ref_url="https://bugzilla.suse.com/1052731" source="BUGZILLA"/>
		<reference ref_id="1052732" ref_url="https://bugzilla.suse.com/1052732" source="BUGZILLA"/>
		<reference ref_id="1052771" ref_url="https://bugzilla.suse.com/1052771" source="BUGZILLA"/>
		<reference ref_id="1055065" ref_url="https://bugzilla.suse.com/1055065" source="BUGZILLA"/>
		<reference ref_id="1055323" ref_url="https://bugzilla.suse.com/1055323" source="BUGZILLA"/>
		<reference ref_id="1055434" ref_url="https://bugzilla.suse.com/1055434" source="BUGZILLA"/>
		<reference ref_id="1055855" ref_url="https://bugzilla.suse.com/1055855" source="BUGZILLA"/>
		<reference ref_id="1058082" ref_url="https://bugzilla.suse.com/1058082" source="BUGZILLA"/>
		<reference ref_id="1058640" ref_url="https://bugzilla.suse.com/1058640" source="BUGZILLA"/>
		<reference ref_id="1059751" ref_url="https://bugzilla.suse.com/1059751" source="BUGZILLA"/>
		<reference ref_id="1072902" ref_url="https://bugzilla.suse.com/1072902" source="BUGZILLA"/>
		<reference ref_id="1074122" ref_url="https://bugzilla.suse.com/1074122" source="BUGZILLA"/>
		<reference ref_id="1074123" ref_url="https://bugzilla.suse.com/1074123" source="BUGZILLA"/>
		<reference ref_id="1074425" ref_url="https://bugzilla.suse.com/1074425" source="BUGZILLA"/>
		<reference ref_id="1074610" ref_url="https://bugzilla.suse.com/1074610" source="BUGZILLA"/>
		<reference ref_id="1074969" ref_url="https://bugzilla.suse.com/1074969" source="BUGZILLA"/>
		<reference ref_id="1074973" ref_url="https://bugzilla.suse.com/1074973" source="BUGZILLA"/>
		<reference ref_id="1074975" ref_url="https://bugzilla.suse.com/1074975" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000445" ref_url="https://www.suse.com/security/cve/CVE-2017-1000445/" source="CVE"/>
		<reference ref_id="CVE-2017-1000476" ref_url="https://www.suse.com/security/cve/CVE-2017-1000476/" source="CVE"/>
		<reference ref_id="CVE-2017-10800" ref_url="https://www.suse.com/security/cve/CVE-2017-10800/" source="CVE"/>
		<reference ref_id="CVE-2017-11141" ref_url="https://www.suse.com/security/cve/CVE-2017-11141/" source="CVE"/>
		<reference ref_id="CVE-2017-11449" ref_url="https://www.suse.com/security/cve/CVE-2017-11449/" source="CVE"/>
		<reference ref_id="CVE-2017-11529" ref_url="https://www.suse.com/security/cve/CVE-2017-11529/" source="CVE"/>
		<reference ref_id="CVE-2017-11644" ref_url="https://www.suse.com/security/cve/CVE-2017-11644/" source="CVE"/>
		<reference ref_id="CVE-2017-11724" ref_url="https://www.suse.com/security/cve/CVE-2017-11724/" source="CVE"/>
		<reference ref_id="CVE-2017-11751" ref_url="https://www.suse.com/security/cve/CVE-2017-11751/" source="CVE"/>
		<reference ref_id="CVE-2017-12430" ref_url="https://www.suse.com/security/cve/CVE-2017-12430/" source="CVE"/>
		<reference ref_id="CVE-2017-12434" ref_url="https://www.suse.com/security/cve/CVE-2017-12434/" source="CVE"/>
		<reference ref_id="CVE-2017-12564" ref_url="https://www.suse.com/security/cve/CVE-2017-12564/" source="CVE"/>
		<reference ref_id="CVE-2017-12642" ref_url="https://www.suse.com/security/cve/CVE-2017-12642/" source="CVE"/>
		<reference ref_id="CVE-2017-12667" ref_url="https://www.suse.com/security/cve/CVE-2017-12667/" source="CVE"/>
		<reference ref_id="CVE-2017-12670" ref_url="https://www.suse.com/security/cve/CVE-2017-12670/" source="CVE"/>
		<reference ref_id="CVE-2017-12672" ref_url="https://www.suse.com/security/cve/CVE-2017-12672/" source="CVE"/>
		<reference ref_id="CVE-2017-12675" ref_url="https://www.suse.com/security/cve/CVE-2017-12675/" source="CVE"/>
		<reference ref_id="CVE-2017-13060" ref_url="https://www.suse.com/security/cve/CVE-2017-13060/" source="CVE"/>
		<reference ref_id="CVE-2017-13146" ref_url="https://www.suse.com/security/cve/CVE-2017-13146/" source="CVE"/>
		<reference ref_id="CVE-2017-13648" ref_url="https://www.suse.com/security/cve/CVE-2017-13648/" source="CVE"/>
		<reference ref_id="CVE-2017-13658" ref_url="https://www.suse.com/security/cve/CVE-2017-13658/" source="CVE"/>
		<reference ref_id="CVE-2017-14249" ref_url="https://www.suse.com/security/cve/CVE-2017-14249/" source="CVE"/>
		<reference ref_id="CVE-2017-14326" ref_url="https://www.suse.com/security/cve/CVE-2017-14326/" source="CVE"/>
		<reference ref_id="CVE-2017-14533" ref_url="https://www.suse.com/security/cve/CVE-2017-14533/" source="CVE"/>
		<reference ref_id="CVE-2017-17680" ref_url="https://www.suse.com/security/cve/CVE-2017-17680/" source="CVE"/>
		<reference ref_id="CVE-2017-17881" ref_url="https://www.suse.com/security/cve/CVE-2017-17881/" source="CVE"/>
		<reference ref_id="CVE-2017-17882" ref_url="https://www.suse.com/security/cve/CVE-2017-17882/" source="CVE"/>
		<reference ref_id="CVE-2017-18022" ref_url="https://www.suse.com/security/cve/CVE-2017-18022/" source="CVE"/>
		<reference ref_id="CVE-2017-9409" ref_url="https://www.suse.com/security/cve/CVE-2017-9409/" source="CVE"/>
		<reference ref_id="CVE-2018-5246" ref_url="https://www.suse.com/security/cve/CVE-2018-5246/" source="CVE"/>
		<reference ref_id="CVE-2018-5247" ref_url="https://www.suse.com/security/cve/CVE-2018-5247/" source="CVE"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2017-12672: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service (bsc#1052720).
- CVE-2017-13060: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service via a crafted file (bsc#1055065).
- CVE-2017-11724: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c involving the quantum_info and clone_info data
  structures (bsc#1051446).
- CVE-2017-12670: Added validation in coders/mat.c to prevent an assertion
  failure in the function DestroyImage in MagickCore/image.c, which allowed
  attackers to cause a denial of service (bsc#1052731).
- CVE-2017-12667: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1052732).
- CVE-2017-13146: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1055323).
- CVE-2017-10800: Processing MATLAB images in coders/mat.c could have lead to a
  denial of service (OOM) in ReadMATImage() if the size specified for a MAT
  Object was larger than the actual amount of data (bsc#1047044)
- CVE-2017-13648: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1055434).
- CVE-2017-11141: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders\mat.c that could have caused memory exhaustion via a
  crafted MAT file, related to incorrect ordering of a SetImageExtent call
  (bsc#1047898).
- CVE-2017-11529: The ReadMATImage function in coders/mat.c allowed remote
  attackers to cause a denial of service (memory leak) via a crafted file
  (bsc#1050120).
- CVE-2017-12564: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service (bsc#1052468).
- CVE-2017-12434: Added a missing NULL check in the function ReadMATImage in
  coders/mat.c, which allowed attackers to cause a denial of service (assertion
  failure) in DestroyImageInfo in image.c (bsc#1052550).
- CVE-2017-12675: Added a missing check for multidimensional data coders/mat.c,
  that could have lead to a memory leak in the function ReadImage in
  MagickCore/constitute.c, which allowed attackers to cause a denial of service
  (bsc#1052710).
- CVE-2017-14326: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service via a crafted file (bsc#1058640).
- CVE-2017-11644: Processesing a crafted file in convert could have lead to a
  memory leak in the ReadMATImage() function in coders/mat.c (bsc#1050606).
- CVE-2017-13658: Added a missing NULL check in the ReadMATImage function in
  coders/mat.c, which could have lead to a denial of service (assertion failure
  and application exit) in the DestroyImageInfo function in MagickCore/image.c
  (bsc#1055855).
- CVE-2017-14533: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1059751).
- CVE-2017-17881: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service via a crafted MAT image file (bsc#1074123).
- CVE-2017-1000476: Prevent CPU exhaustion in the function ReadDDSInfo in
  coders/dds.c, which allowed attackers to cause a denial of service
  (bsc#1074610).
- CVE-2017-9409: Fixed a memory leak vulnerability in the function ReadMPCImage
  in mpc.c, which allowed attackers to cause a denial of service via a crafted
  file (bsc#1042948).
- CVE-2017-11449: coders/mpc did not enable seekable streams and thus could not
  validate blob sizes, which allowed remote attackers to cause a denial of service
  (application crash) or possibly have unspecified other impact via an image
  received from stdin (bsc#1049373)
- CVE-2017-12430: A memory exhaustion in the function ReadMPCImage in
  coders/mpc.c allowed attackers to cause DoS (bsc#1052252)
- CVE-2017-12642: Prevent a memory leak vulnerability in ReadMPCImage in
  coders\mpc.c via crafted file allowing for DoS (bsc#1052771)
- CVE-2017-14249: A mishandled EOF check in ReadMPCImage in coders/mpc.c that
  lead to a division by zero in GetPixelCacheTileSize in MagickCore/cache.c
  allowed remote attackers to cause a denial of service via a crafted file
  (bsc#1058082)
- CVE-2017-1000445: Added a NUL pointer check in the MagickCore component that
  might have lead to denial of service  (bsc#1074425).
- CVE-2017-11751: Fixed a memory leak vulnerability in the function
  WritePICONImage in coders/xpm.c that allowed remote attackers to cause a denial
  of service via a crafted file (bsc#1051412).
- CVE-2017-17680: Fixed a memory leak vulnerability in the function
  ReadXPMImage in coders/xpm.c, which allowed attackers to cause a denial of
  service via a crafted xpm image file (bsc#1072902).
- CVE-2017-17882: Fixed a memory leak vulnerability in the function
  ReadXPMImage in coders/xpm.c, which allowed attackers to cause a denial of
  service via a crafted XPM image file (bsc#1074122).
- CVE-2018-5246: Fixed memory leak vulnerability in ReadPATTERNImage in
  coders/pattern.c (bsc#1074973).
- CVE-2017-18022: Fixed memory leak vulnerability in MontageImageCommand in
  MagickWand/montage.c (bsc#1074975)
- CVE-2018-5247: Fixed memory leak vulnerability in ReadRLAImage in
  coders/rla.c (bsc#1074969)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-18"/>
	<updated date="2018-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042948">SUSE bug 1042948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047044">SUSE bug 1047044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047898">SUSE bug 1047898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049373">SUSE bug 1049373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050120">SUSE bug 1050120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050606">SUSE bug 1050606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051412">SUSE bug 1051412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051446">SUSE bug 1051446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052252">SUSE bug 1052252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052468">SUSE bug 1052468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052550">SUSE bug 1052550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052710">SUSE bug 1052710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052720">SUSE bug 1052720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052731">SUSE bug 1052731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052732">SUSE bug 1052732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052771">SUSE bug 1052771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055065">SUSE bug 1055065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055323">SUSE bug 1055323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055434">SUSE bug 1055434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055855">SUSE bug 1055855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058082">SUSE bug 1058082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058640">SUSE bug 1058640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059751">SUSE bug 1059751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072902">SUSE bug 1072902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074122">SUSE bug 1074122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074123">SUSE bug 1074123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074425">SUSE bug 1074425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074610">SUSE bug 1074610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074969">SUSE bug 1074969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074973">SUSE bug 1074973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074975">SUSE bug 1074975</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000445/">CVE-2017-1000445 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000445">CVE-2017-1000445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000476/">CVE-2017-1000476 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000476">CVE-2017-1000476 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10800/">CVE-2017-10800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10800">CVE-2017-10800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11141/">CVE-2017-11141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11141">CVE-2017-11141 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11449/">CVE-2017-11449 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11449">CVE-2017-11449 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11529/">CVE-2017-11529 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11529">CVE-2017-11529 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11644/">CVE-2017-11644 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11644">CVE-2017-11644 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11724/">CVE-2017-11724 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11724">CVE-2017-11724 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11751/">CVE-2017-11751 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11751">CVE-2017-11751 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12430/">CVE-2017-12430 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12430">CVE-2017-12430 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12434/">CVE-2017-12434 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12434">CVE-2017-12434 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12564/">CVE-2017-12564 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12564">CVE-2017-12564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12642/">CVE-2017-12642 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12642">CVE-2017-12642 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12667/">CVE-2017-12667 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12667">CVE-2017-12667 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12670/">CVE-2017-12670 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12670">CVE-2017-12670 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12672/">CVE-2017-12672 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12672">CVE-2017-12672 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12675/">CVE-2017-12675 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12675">CVE-2017-12675 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13060/">CVE-2017-13060 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13060">CVE-2017-13060 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13146/">CVE-2017-13146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13146">CVE-2017-13146 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13648/">CVE-2017-13648 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13648">CVE-2017-13648 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13658/">CVE-2017-13658 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13658">CVE-2017-13658 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14249/">CVE-2017-14249 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14249">CVE-2017-14249 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14326/">CVE-2017-14326 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14326">CVE-2017-14326 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14533/">CVE-2017-14533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14533">CVE-2017-14533 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17680/">CVE-2017-17680 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17680">CVE-2017-17680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17881/">CVE-2017-17881 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17881">CVE-2017-17881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17882/">CVE-2017-17882 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17882">CVE-2017-17882 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18022/">CVE-2017-18022 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18022">CVE-2017-18022 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9409/">CVE-2017-9409 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9409">CVE-2017-9409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5246/">CVE-2018-5246 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5246">CVE-2018-5246 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5247/">CVE-2018-5247 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5247">CVE-2018-5247 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570442" comment="libMagickCore1-6.4.3.6-7.78.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570443" comment="libMagickCore1-32bit-6.4.3.6-7.78.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218212" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1043353" ref_url="https://bugzilla.suse.com/1043353" source="BUGZILLA"/>
		<reference ref_id="1043354" ref_url="https://bugzilla.suse.com/1043354" source="BUGZILLA"/>
		<reference ref_id="1047908" ref_url="https://bugzilla.suse.com/1047908" source="BUGZILLA"/>
		<reference ref_id="1050037" ref_url="https://bugzilla.suse.com/1050037" source="BUGZILLA"/>
		<reference ref_id="1050072" ref_url="https://bugzilla.suse.com/1050072" source="BUGZILLA"/>
		<reference ref_id="1050098" ref_url="https://bugzilla.suse.com/1050098" source="BUGZILLA"/>
		<reference ref_id="1050100" ref_url="https://bugzilla.suse.com/1050100" source="BUGZILLA"/>
		<reference ref_id="1050635" ref_url="https://bugzilla.suse.com/1050635" source="BUGZILLA"/>
		<reference ref_id="1051442" ref_url="https://bugzilla.suse.com/1051442" source="BUGZILLA"/>
		<reference ref_id="1052470" ref_url="https://bugzilla.suse.com/1052470" source="BUGZILLA"/>
		<reference ref_id="1052708" ref_url="https://bugzilla.suse.com/1052708" source="BUGZILLA"/>
		<reference ref_id="1052717" ref_url="https://bugzilla.suse.com/1052717" source="BUGZILLA"/>
		<reference ref_id="1052721" ref_url="https://bugzilla.suse.com/1052721" source="BUGZILLA"/>
		<reference ref_id="1052768" ref_url="https://bugzilla.suse.com/1052768" source="BUGZILLA"/>
		<reference ref_id="1052777" ref_url="https://bugzilla.suse.com/1052777" source="BUGZILLA"/>
		<reference ref_id="1052781" ref_url="https://bugzilla.suse.com/1052781" source="BUGZILLA"/>
		<reference ref_id="1054600" ref_url="https://bugzilla.suse.com/1054600" source="BUGZILLA"/>
		<reference ref_id="1055374" ref_url="https://bugzilla.suse.com/1055374" source="BUGZILLA"/>
		<reference ref_id="1055455" ref_url="https://bugzilla.suse.com/1055455" source="BUGZILLA"/>
		<reference ref_id="1055456" ref_url="https://bugzilla.suse.com/1055456" source="BUGZILLA"/>
		<reference ref_id="1057000" ref_url="https://bugzilla.suse.com/1057000" source="BUGZILLA"/>
		<reference ref_id="1060162" ref_url="https://bugzilla.suse.com/1060162" source="BUGZILLA"/>
		<reference ref_id="1062752" ref_url="https://bugzilla.suse.com/1062752" source="BUGZILLA"/>
		<reference ref_id="1072362" ref_url="https://bugzilla.suse.com/1072362" source="BUGZILLA"/>
		<reference ref_id="1074120" ref_url="https://bugzilla.suse.com/1074120" source="BUGZILLA"/>
		<reference ref_id="1074125" ref_url="https://bugzilla.suse.com/1074125" source="BUGZILLA"/>
		<reference ref_id="1074185" ref_url="https://bugzilla.suse.com/1074185" source="BUGZILLA"/>
		<reference ref_id="1074309" ref_url="https://bugzilla.suse.com/1074309" source="BUGZILLA"/>
		<reference ref_id="1075939" ref_url="https://bugzilla.suse.com/1075939" source="BUGZILLA"/>
		<reference ref_id="1076021" ref_url="https://bugzilla.suse.com/1076021" source="BUGZILLA"/>
		<reference ref_id="1076051" ref_url="https://bugzilla.suse.com/1076051" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10995" ref_url="https://www.suse.com/security/cve/CVE-2017-10995/" source="CVE"/>
		<reference ref_id="CVE-2017-11505" ref_url="https://www.suse.com/security/cve/CVE-2017-11505/" source="CVE"/>
		<reference ref_id="CVE-2017-11525" ref_url="https://www.suse.com/security/cve/CVE-2017-11525/" source="CVE"/>
		<reference ref_id="CVE-2017-11526" ref_url="https://www.suse.com/security/cve/CVE-2017-11526/" source="CVE"/>
		<reference ref_id="CVE-2017-11539" ref_url="https://www.suse.com/security/cve/CVE-2017-11539/" source="CVE"/>
		<reference ref_id="CVE-2017-11639" ref_url="https://www.suse.com/security/cve/CVE-2017-11639/" source="CVE"/>
		<reference ref_id="CVE-2017-11750" ref_url="https://www.suse.com/security/cve/CVE-2017-11750/" source="CVE"/>
		<reference ref_id="CVE-2017-12565" ref_url="https://www.suse.com/security/cve/CVE-2017-12565/" source="CVE"/>
		<reference ref_id="CVE-2017-12640" ref_url="https://www.suse.com/security/cve/CVE-2017-12640/" source="CVE"/>
		<reference ref_id="CVE-2017-12641" ref_url="https://www.suse.com/security/cve/CVE-2017-12641/" source="CVE"/>
		<reference ref_id="CVE-2017-12643" ref_url="https://www.suse.com/security/cve/CVE-2017-12643/" source="CVE"/>
		<reference ref_id="CVE-2017-12671" ref_url="https://www.suse.com/security/cve/CVE-2017-12671/" source="CVE"/>
		<reference ref_id="CVE-2017-12673" ref_url="https://www.suse.com/security/cve/CVE-2017-12673/" source="CVE"/>
		<reference ref_id="CVE-2017-12676" ref_url="https://www.suse.com/security/cve/CVE-2017-12676/" source="CVE"/>
		<reference ref_id="CVE-2017-12935" ref_url="https://www.suse.com/security/cve/CVE-2017-12935/" source="CVE"/>
		<reference ref_id="CVE-2017-13141" ref_url="https://www.suse.com/security/cve/CVE-2017-13141/" source="CVE"/>
		<reference ref_id="CVE-2017-13142" ref_url="https://www.suse.com/security/cve/CVE-2017-13142/" source="CVE"/>
		<reference ref_id="CVE-2017-13147" ref_url="https://www.suse.com/security/cve/CVE-2017-13147/" source="CVE"/>
		<reference ref_id="CVE-2017-14103" ref_url="https://www.suse.com/security/cve/CVE-2017-14103/" source="CVE"/>
		<reference ref_id="CVE-2017-14649" ref_url="https://www.suse.com/security/cve/CVE-2017-14649/" source="CVE"/>
		<reference ref_id="CVE-2017-15218" ref_url="https://www.suse.com/security/cve/CVE-2017-15218/" source="CVE"/>
		<reference ref_id="CVE-2017-17504" ref_url="https://www.suse.com/security/cve/CVE-2017-17504/" source="CVE"/>
		<reference ref_id="CVE-2017-17879" ref_url="https://www.suse.com/security/cve/CVE-2017-17879/" source="CVE"/>
		<reference ref_id="CVE-2017-17884" ref_url="https://www.suse.com/security/cve/CVE-2017-17884/" source="CVE"/>
		<reference ref_id="CVE-2017-17914" ref_url="https://www.suse.com/security/cve/CVE-2017-17914/" source="CVE"/>
		<reference ref_id="CVE-2017-18027" ref_url="https://www.suse.com/security/cve/CVE-2017-18027/" source="CVE"/>
		<reference ref_id="CVE-2017-18029" ref_url="https://www.suse.com/security/cve/CVE-2017-18029/" source="CVE"/>
		<reference ref_id="CVE-2017-9261" ref_url="https://www.suse.com/security/cve/CVE-2017-9261/" source="CVE"/>
		<reference ref_id="CVE-2017-9262" ref_url="https://www.suse.com/security/cve/CVE-2017-9262/" source="CVE"/>
		<reference ref_id="CVE-2018-5685" ref_url="https://www.suse.com/security/cve/CVE-2018-5685/" source="CVE"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2018-5685: Prevent infinite loop and application hang in the ReadBMPImage
  function. Remote attackers could leverage this vulnerability to cause a denial
  of service via an image file with a crafted bit-field mask value (bsc#1075939)
- CVE-2017-11639: Prevent heap-based buffer over-read in the WriteCIPImage()
  function, related to the GetPixelLuma function in MagickCore/pixel-accessor.h
  (bsc#1050635).
- CVE-2017-11525: Prevent memory consumption in the ReadCINImage function that
  allowed remote attackers to cause a denial of service (bsc#1050098).
- CVE-2017-9262: The ReadJNGImage function in coders/png.c allowed attackers to
  cause a denial of service (memory leak) via a crafted file (bsc#1043353)
- CVE-2017-9261: The ReadMNGImage function in coders/png.c allowed
  attackers to cause a denial of service (memory leak) via a crafted file (bsc#1043354)
- CVE-2017-10995: The mng_get_long function in coders/png.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) via a crafted MNG image (bsc#1047908)
- CVE-2017-11539: Prevent memory leak in the ReadOnePNGImage() function in
  coders/png.c (bsc#1050037)
- CVE-2017-11505: The ReadOneJNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (large loop and CPU consumption) via
  a crafted file (bsc#1050072)
- CVE-2017-11526: The ReadOneMNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (large loop and CPU consumption) via a
  crafted file (bsc#1050100)
- CVE-2017-11750: The ReadOneJNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (NULL pointer dereference) via a crafted
  file (bsc#1051442)
- CVE-2017-12565: Prevent memory leak in the function ReadOneJNGImage in
  coders/png.c, which allowed attackers to cause a denial of service (bsc#1052470)
- CVE-2017-12676: Prevent memory leak in the function ReadOneJNGImage in
  coders/png.c, which allowed attackers to cause a denial of service (bsc#1052708)
- CVE-2017-12673: Prevent memory leak in the function ReadOneMNGImage in
  coders/png.c, which allowed attackers to cause a denial of service (bsc#1052717)
- CVE-2017-12671: Added NULL assignment in coders/png.c to prevent an invalid
  free in the function RelinquishMagickMemory in MagickCore/memory.c, which
  allowed attackers to cause a denial of service (bsc#1052721)
- CVE-2017-12643: Prevent a memory exhaustion vulnerability in ReadOneJNGImage
  in coders\png.c (bsc#1052768)
- CVE-2017-12641: Prevent a memory leak vulnerability in ReadOneJNGImage in
  coders\png.c (bsc#1052777)
- CVE-2017-12640: Prevent an out-of-bounds read vulnerability in
  ReadOneMNGImage in coders/png.c (bsc#1052781)
- CVE-2017-12935: The ReadMNGImage function in coders/png.c mishandled large
  MNG images, leading to an invalid memory read in the SetImageColorCallBack
  function in magick/image.c (bsc#1054600)
- CVE-2017-13147: Prevent allocation failure in the function ReadMNGImage in
  coders/png.c when a small MNG file has a MEND chunk with a large length value
  (bsc#1055374)
- CVE-2017-13142: Added additional checks for short files to prevent a crafted
  PNG file from triggering a crash (bsc#1055455)
- CVE-2017-13141: Prevent memory leak in ReadOnePNGImage in coders/png.c
  (bsc#1055456)
- CVE-2017-14103: The ReadJNGImage and ReadOneJNGImage functions in
  coders/png.c did not properly manage image pointers after certain error
  conditions, which allowed remote attackers to conduct use-after-free attacks
  via a crafted file, related to a ReadMNGImage out-of-order CloseBlob call
  (bsc#1057000)
- CVE-2017-14649: ReadOneJNGImage in coders/png.c did not properly validate JNG
  data, leading to a denial of service (assertion failure in
  magick/pixel_cache.c, and application crash) (bsc#1060162)
- CVE-2017-15218: Prevent memory leak in ReadOneJNGImage in coders/png.c
  (bsc#1062752)
- CVE-2017-17504: Prevent heap-based buffer over-read via a crafted file in
  Magick_png_read_raw_profile, related to ReadOneMNGImage (bsc#1072362)
- CVE-2017-17879: Prevent heap-based buffer over-read in ReadOneMNGImage in
  coders/png.c, related to length calculation and caused by an off-by-one error
  (bsc#1074125)
- CVE-2017-17914: Prevent crafted files to cause a large loop in
  ReadOneMNGImage (bsc#1074185)
- CVE-2017-17884: Prevent memory leak in the function WriteOnePNGImage in
  coders/png.c, which allowed attackers to cause a denial of service via a
  crafted PNG image file (bsc#1074120)
- Prevent memory leak in svg.c, which allowed attackers to cause a denial of
  service via a crafted SVG image file (bsc#1074120)
- Prevent small memory leak when processing PWP image files (bsc#1074309)
- CVE-2017-18029: Prevent memory leak in the function ReadMATImage which allowed
  remote attackers to cause a denial of service via a crafted file (bsc#1076021)
- CVE-2017-18027: Prevent memory leak vulnerability in the function
  ReadMATImage which allowed remote attackers to cause a denial of service via a
  crafted file (bsc#1076051)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-02"/>
	<updated date="2018-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043353">SUSE bug 1043353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043354">SUSE bug 1043354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047908">SUSE bug 1047908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050037">SUSE bug 1050037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050072">SUSE bug 1050072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050098">SUSE bug 1050098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050100">SUSE bug 1050100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050635">SUSE bug 1050635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051442">SUSE bug 1051442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052470">SUSE bug 1052470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052708">SUSE bug 1052708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052717">SUSE bug 1052717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052721">SUSE bug 1052721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052768">SUSE bug 1052768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052777">SUSE bug 1052777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052781">SUSE bug 1052781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055374">SUSE bug 1055374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055455">SUSE bug 1055455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055456">SUSE bug 1055456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057000">SUSE bug 1057000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060162">SUSE bug 1060162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062752">SUSE bug 1062752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072362">SUSE bug 1072362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074120">SUSE bug 1074120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074125">SUSE bug 1074125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074185">SUSE bug 1074185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074309">SUSE bug 1074309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075939">SUSE bug 1075939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076021">SUSE bug 1076021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076051">SUSE bug 1076051</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10995/">CVE-2017-10995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10995">CVE-2017-10995 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11505/">CVE-2017-11505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11505">CVE-2017-11505 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11525/">CVE-2017-11525 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11525">CVE-2017-11525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11526/">CVE-2017-11526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11526">CVE-2017-11526 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11539/">CVE-2017-11539 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11539">CVE-2017-11539 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11639/">CVE-2017-11639 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11639">CVE-2017-11639 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11750/">CVE-2017-11750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11750">CVE-2017-11750 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12565/">CVE-2017-12565 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12565">CVE-2017-12565 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12640/">CVE-2017-12640 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12640">CVE-2017-12640 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12641/">CVE-2017-12641 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12641">CVE-2017-12641 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12643/">CVE-2017-12643 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12643">CVE-2017-12643 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12671/">CVE-2017-12671 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12671">CVE-2017-12671 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12673/">CVE-2017-12673 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12673">CVE-2017-12673 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12676/">CVE-2017-12676 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12676">CVE-2017-12676 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12935/">CVE-2017-12935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12935">CVE-2017-12935 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13141/">CVE-2017-13141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13141">CVE-2017-13141 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13142/">CVE-2017-13142 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13142">CVE-2017-13142 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13147/">CVE-2017-13147 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13147">CVE-2017-13147 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14103/">CVE-2017-14103 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14103">CVE-2017-14103 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14649/">CVE-2017-14649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14649">CVE-2017-14649 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15218/">CVE-2017-15218 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15218">CVE-2017-15218 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17504/">CVE-2017-17504 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17504">CVE-2017-17504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17879/">CVE-2017-17879 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17879">CVE-2017-17879 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17884/">CVE-2017-17884 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17884">CVE-2017-17884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17914/">CVE-2017-17914 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17914">CVE-2017-17914 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18027/">CVE-2017-18027 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18027">CVE-2017-18027 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18029/">CVE-2017-18029 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18029">CVE-2017-18029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9261/">CVE-2017-9261 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9261">CVE-2017-9261 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9262/">CVE-2017-9262 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9262">CVE-2017-9262 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5685/">CVE-2018-5685 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5685">CVE-2018-5685 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570444" comment="libMagickCore1-6.4.3.6-7.78.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570445" comment="libMagickCore1-32bit-6.4.3.6-7.78.29.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218213" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1042824" ref_url="https://bugzilla.suse.com/1042824" source="BUGZILLA"/>
		<reference ref_id="1048110" ref_url="https://bugzilla.suse.com/1048110" source="BUGZILLA"/>
		<reference ref_id="1049374" ref_url="https://bugzilla.suse.com/1049374" source="BUGZILLA"/>
		<reference ref_id="1049375" ref_url="https://bugzilla.suse.com/1049375" source="BUGZILLA"/>
		<reference ref_id="1050048" ref_url="https://bugzilla.suse.com/1050048" source="BUGZILLA"/>
		<reference ref_id="1050617" ref_url="https://bugzilla.suse.com/1050617" source="BUGZILLA"/>
		<reference ref_id="1050669" ref_url="https://bugzilla.suse.com/1050669" source="BUGZILLA"/>
		<reference ref_id="1052207" ref_url="https://bugzilla.suse.com/1052207" source="BUGZILLA"/>
		<reference ref_id="1052248" ref_url="https://bugzilla.suse.com/1052248" source="BUGZILLA"/>
		<reference ref_id="1052251" ref_url="https://bugzilla.suse.com/1052251" source="BUGZILLA"/>
		<reference ref_id="1052254" ref_url="https://bugzilla.suse.com/1052254" source="BUGZILLA"/>
		<reference ref_id="1052472" ref_url="https://bugzilla.suse.com/1052472" source="BUGZILLA"/>
		<reference ref_id="1052688" ref_url="https://bugzilla.suse.com/1052688" source="BUGZILLA"/>
		<reference ref_id="1052711" ref_url="https://bugzilla.suse.com/1052711" source="BUGZILLA"/>
		<reference ref_id="1052747" ref_url="https://bugzilla.suse.com/1052747" source="BUGZILLA"/>
		<reference ref_id="1052750" ref_url="https://bugzilla.suse.com/1052750" source="BUGZILLA"/>
		<reference ref_id="1052761" ref_url="https://bugzilla.suse.com/1052761" source="BUGZILLA"/>
		<reference ref_id="1055069" ref_url="https://bugzilla.suse.com/1055069" source="BUGZILLA"/>
		<reference ref_id="1055229" ref_url="https://bugzilla.suse.com/1055229" source="BUGZILLA"/>
		<reference ref_id="1058009" ref_url="https://bugzilla.suse.com/1058009" source="BUGZILLA"/>
		<reference ref_id="1074119" ref_url="https://bugzilla.suse.com/1074119" source="BUGZILLA"/>
		<reference ref_id="1076182" ref_url="https://bugzilla.suse.com/1076182" source="BUGZILLA"/>
		<reference ref_id="1078433" ref_url="https://bugzilla.suse.com/1078433" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11166" ref_url="https://www.suse.com/security/cve/CVE-2017-11166/" source="CVE"/>
		<reference ref_id="CVE-2017-11448" ref_url="https://www.suse.com/security/cve/CVE-2017-11448/" source="CVE"/>
		<reference ref_id="CVE-2017-11450" ref_url="https://www.suse.com/security/cve/CVE-2017-11450/" source="CVE"/>
		<reference ref_id="CVE-2017-11537" ref_url="https://www.suse.com/security/cve/CVE-2017-11537/" source="CVE"/>
		<reference ref_id="CVE-2017-11637" ref_url="https://www.suse.com/security/cve/CVE-2017-11637/" source="CVE"/>
		<reference ref_id="CVE-2017-11638" ref_url="https://www.suse.com/security/cve/CVE-2017-11638/" source="CVE"/>
		<reference ref_id="CVE-2017-11642" ref_url="https://www.suse.com/security/cve/CVE-2017-11642/" source="CVE"/>
		<reference ref_id="CVE-2017-12418" ref_url="https://www.suse.com/security/cve/CVE-2017-12418/" source="CVE"/>
		<reference ref_id="CVE-2017-12427" ref_url="https://www.suse.com/security/cve/CVE-2017-12427/" source="CVE"/>
		<reference ref_id="CVE-2017-12429" ref_url="https://www.suse.com/security/cve/CVE-2017-12429/" source="CVE"/>
		<reference ref_id="CVE-2017-12432" ref_url="https://www.suse.com/security/cve/CVE-2017-12432/" source="CVE"/>
		<reference ref_id="CVE-2017-12566" ref_url="https://www.suse.com/security/cve/CVE-2017-12566/" source="CVE"/>
		<reference ref_id="CVE-2017-12654" ref_url="https://www.suse.com/security/cve/CVE-2017-12654/" source="CVE"/>
		<reference ref_id="CVE-2017-12664" ref_url="https://www.suse.com/security/cve/CVE-2017-12664/" source="CVE"/>
		<reference ref_id="CVE-2017-12665" ref_url="https://www.suse.com/security/cve/CVE-2017-12665/" source="CVE"/>
		<reference ref_id="CVE-2017-12668" ref_url="https://www.suse.com/security/cve/CVE-2017-12668/" source="CVE"/>
		<reference ref_id="CVE-2017-12674" ref_url="https://www.suse.com/security/cve/CVE-2017-12674/" source="CVE"/>
		<reference ref_id="CVE-2017-13058" ref_url="https://www.suse.com/security/cve/CVE-2017-13058/" source="CVE"/>
		<reference ref_id="CVE-2017-13131" ref_url="https://www.suse.com/security/cve/CVE-2017-13131/" source="CVE"/>
		<reference ref_id="CVE-2017-14224" ref_url="https://www.suse.com/security/cve/CVE-2017-14224/" source="CVE"/>
		<reference ref_id="CVE-2017-17885" ref_url="https://www.suse.com/security/cve/CVE-2017-17885/" source="CVE"/>
		<reference ref_id="CVE-2017-18028" ref_url="https://www.suse.com/security/cve/CVE-2017-18028/" source="CVE"/>
		<reference ref_id="CVE-2017-9407" ref_url="https://www.suse.com/security/cve/CVE-2017-9407/" source="CVE"/>
		<reference ref_id="CVE-2018-6405" ref_url="https://www.suse.com/security/cve/CVE-2018-6405/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2017-9407: In ImageMagick, the ReadPALMImage function in palm.c allowed attackers to cause a denial of service (memory leak) via a crafted file.  (bsc#1042824)
- CVE-2017-11448: The ReadJPEGImage function in coders/jpeg.c in ImageMagick allowed remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file.  (bsc#1049375)
- CVE-2017-11450: A remote denial of service in coders/jpeg.c was fixed (bsc#1049374)
- CVE-2017-11537: When ImageMagick processed a crafted file in convert, it can lead to a Floating Point Exception (FPE) in the WritePALMImage() function in coders/palm.c, related to an incorrect bits-per-pixel calculation.  (bsc#1050048)
- CVE-2017-12418: ImageMagick had memory leaks in the parse8BIMW and format8BIM functions in coders/meta.c, related to the WriteImage function in MagickCore/constitute.c.  (bsc#1052207)
- CVE-2017-12432: In ImageMagick, a memory exhaustion vulnerability was found in the function ReadPCXImage in coders/pcx.c, which allowed attackers to cause a denial of service.  (bsc#1052254)
- CVE-2017-12654: The ReadPICTImage function in coders/pict.c in ImageMagick allowed attackers to cause a denial of service (memory leak) via a crafted file.  (bsc#1052761)
- CVE-2017-12664: ImageMagick had a memory leak vulnerability in WritePALMImage in coders/palm.c.  (bsc#1052750)
- CVE-2017-12665: ImageMagick had a memory leak vulnerability in WritePICTImage in coders/pict.c.  (bsc#1052747)
- CVE-2017-12668: ImageMagick had a memory leak vulnerability in WritePCXImage in coders/pcx.c. (bsc#1052688)
- CVE-2017-13058: In ImageMagick, a memory leak vulnerability was found in the function WritePCXImage in coders/pcx.c, which allowed attackers to cause a denial of service via a crafted file.  (bsc#1055069)
- CVE-2017-14224: A heap-based buffer overflow in WritePCXImage in coders/pcx.c  could lead to  denial of service or code execution. (bsc#1058009)
- CVE-2017-17885: In ImageMagick, a memory leak vulnerability was found in the function ReadPICTImage in coders/pict.c, which allowed attackers to cause a denial of service via a crafted PICT image file. (bsc#1074119)
- CVE-2017-18028: A memory exhaustion in the function ReadTIFFImage in coders/tiff.c was fixed. (bsc#1076182)
- CVE-2018-6405: In the ReadDCMImage function in coders/dcm.c in ImageMagick, each redmap, greenmap, and bluemap variable can be overwritten by a new pointer. The previous pointer is lost, which leads to a memory leak. This allowed remote attackers to cause a denial of service. (bsc#1078433)
- CVE-2017-12427: ProcessMSLScript coders/msl.c allowed remote attackers to cause a DoS (bsc#1052248)
- CVE-2017-12566: A memory leak in ReadMVGImage in coders/mvg.c, could have allowed attackers to cause DoS (bsc#1052472)
- CVE-2017-11638, CVE-2017-11642: A NULL pointer dereference in theWriteMAPImage() in coders/map.c was fixed which could lead to a crash (bsc#1050617)
- CVE-2017-13131: A memory leak vulnerability was found in thefunction ReadMIFFImage in coders/miff.c, which allowed attackers tocause a denial of service (memory consumption in NewL (bsc#1055229)
- CVE-2017-11166: In ReadXWDImage in coders\xwd.c a memoryleak could have caused memory exhaustion via a crafted length (bsc#1048110)
- CVE-2017-12674: A CPU exhaustion in ReadPDBImage in coders/pdb.c was fixed, which allowed attackers to cause DoS (bsc#1052711)
- CVE-2017-12429: A memory exhaustion flaw in ReadMIFFImage in coders/miff.c was fixed, which allowed attackers to cause DoS (bsc#1052251)
- CVE-2017-11637: A NULL pointer dereference in WritePCLImage() in coders/pcl.c was fixed which could lead to a crash (bsc#1050669)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-20"/>
	<updated date="2018-02-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042824">SUSE bug 1042824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048110">SUSE bug 1048110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049374">SUSE bug 1049374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049375">SUSE bug 1049375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050048">SUSE bug 1050048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050617">SUSE bug 1050617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050669">SUSE bug 1050669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052207">SUSE bug 1052207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052248">SUSE bug 1052248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052251">SUSE bug 1052251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052254">SUSE bug 1052254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052472">SUSE bug 1052472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052688">SUSE bug 1052688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052711">SUSE bug 1052711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052747">SUSE bug 1052747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052750">SUSE bug 1052750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052761">SUSE bug 1052761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055069">SUSE bug 1055069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055229">SUSE bug 1055229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058009">SUSE bug 1058009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074119">SUSE bug 1074119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076182">SUSE bug 1076182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078433">SUSE bug 1078433</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11166/">CVE-2017-11166 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11166">CVE-2017-11166 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-11448/">CVE-2017-11448 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11448">CVE-2017-11448 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11450/">CVE-2017-11450 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11450">CVE-2017-11450 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11537/">CVE-2017-11537 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11537">CVE-2017-11537 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11637/">CVE-2017-11637 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11637">CVE-2017-11637 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11638/">CVE-2017-11638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11638">CVE-2017-11638 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11642/">CVE-2017-11642 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11642">CVE-2017-11642 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12418/">CVE-2017-12418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12418">CVE-2017-12418 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12427/">CVE-2017-12427 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12427">CVE-2017-12427 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12429/">CVE-2017-12429 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12429">CVE-2017-12429 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12432/">CVE-2017-12432 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12432">CVE-2017-12432 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12566/">CVE-2017-12566 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12566">CVE-2017-12566 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12654/">CVE-2017-12654 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12654">CVE-2017-12654 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12664/">CVE-2017-12664 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12664">CVE-2017-12664 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12665/">CVE-2017-12665 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12665">CVE-2017-12665 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12668/">CVE-2017-12668 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12668">CVE-2017-12668 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12674/">CVE-2017-12674 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12674">CVE-2017-12674 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13058/">CVE-2017-13058 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13058">CVE-2017-13058 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13131/">CVE-2017-13131 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13131">CVE-2017-13131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14224/">CVE-2017-14224 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14224">CVE-2017-14224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17885/">CVE-2017-17885 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17885">CVE-2017-17885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-18028/">CVE-2017-18028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18028">CVE-2017-18028 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9407/">CVE-2017-9407 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9407">CVE-2017-9407 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6405/">CVE-2018-6405 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6405">CVE-2018-6405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570446" comment="libMagickCore1-6.4.3.6-7.78.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570447" comment="libMagickCore1-32bit-6.4.3.6-7.78.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218214" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1042911" ref_url="https://bugzilla.suse.com/1042911" source="BUGZILLA"/>
		<reference ref_id="1050119" ref_url="https://bugzilla.suse.com/1050119" source="BUGZILLA"/>
		<reference ref_id="1050122" ref_url="https://bugzilla.suse.com/1050122" source="BUGZILLA"/>
		<reference ref_id="1050132" ref_url="https://bugzilla.suse.com/1050132" source="BUGZILLA"/>
		<reference ref_id="1052754" ref_url="https://bugzilla.suse.com/1052754" source="BUGZILLA"/>
		<reference ref_id="1072898" ref_url="https://bugzilla.suse.com/1072898" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11528" ref_url="https://www.suse.com/security/cve/CVE-2017-11528/" source="CVE"/>
		<reference ref_id="CVE-2017-11530" ref_url="https://www.suse.com/security/cve/CVE-2017-11530/" source="CVE"/>
		<reference ref_id="CVE-2017-11533" ref_url="https://www.suse.com/security/cve/CVE-2017-11533/" source="CVE"/>
		<reference ref_id="CVE-2017-12663" ref_url="https://www.suse.com/security/cve/CVE-2017-12663/" source="CVE"/>
		<reference ref_id="CVE-2017-17682" ref_url="https://www.suse.com/security/cve/CVE-2017-17682/" source="CVE"/>
		<reference ref_id="CVE-2017-9405" ref_url="https://www.suse.com/security/cve/CVE-2017-9405/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2017-9405: A memory leak in the ReadICONImage function was fixed that could lead to DoS via memory exhaustion (bsc#1042911)
- CVE-2017-11528: ReadDIBImage in coders/dib.c allows remote attackers to cause DoS via memory exhaustion (bsc#1050119)
- CVE-2017-11530: ReadEPTImage in coders/ept.c allows remote attackers to cause DoS via memory exhaustion (bsc#1050122)
- CVE-2017-11533: A information leak by 1 byte due to heap-based buffer over-read in the WriteUILImage() in coders/uil.c was fixed (bsc#1050132)
- CVE-2017-12663: A memory leak in WriteMAPImage in coders/map.c was fixed that could lead to a DoS via memory exhaustion (bsc#1052754)
- CVE-2017-17682: A large loop vulnerability was fixed in ExtractPostscript in coders/wpg.c, which allowed attackers to cause a denial of service (CPU exhaustion) (bsc#1072898)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-22"/>
	<updated date="2018-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042911">SUSE bug 1042911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050119">SUSE bug 1050119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050122">SUSE bug 1050122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050132">SUSE bug 1050132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052754">SUSE bug 1052754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072898">SUSE bug 1072898</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11528/">CVE-2017-11528 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11528">CVE-2017-11528 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11530/">CVE-2017-11530 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11530">CVE-2017-11530 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11533/">CVE-2017-11533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11533">CVE-2017-11533 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12663/">CVE-2017-12663 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12663">CVE-2017-12663 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17682/">CVE-2017-17682 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17682">CVE-2017-17682 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9405/">CVE-2017-9405 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9405">CVE-2017-9405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570448" comment="libMagickCore1-6.4.3.6-7.78.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570449" comment="libMagickCore1-32bit-6.4.3.6-7.78.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218215" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1043290" ref_url="https://bugzilla.suse.com/1043290" source="BUGZILLA"/>
		<reference ref_id="1050087" ref_url="https://bugzilla.suse.com/1050087" source="BUGZILLA"/>
		<reference ref_id="1056434" ref_url="https://bugzilla.suse.com/1056434" source="BUGZILLA"/>
		<reference ref_id="1058630" ref_url="https://bugzilla.suse.com/1058630" source="BUGZILLA"/>
		<reference ref_id="1059735" ref_url="https://bugzilla.suse.com/1059735" source="BUGZILLA"/>
		<reference ref_id="1066168" ref_url="https://bugzilla.suse.com/1066168" source="BUGZILLA"/>
		<reference ref_id="1066170" ref_url="https://bugzilla.suse.com/1066170" source="BUGZILLA"/>
		<reference ref_id="1082283" ref_url="https://bugzilla.suse.com/1082283" source="BUGZILLA"/>
		<reference ref_id="1082291" ref_url="https://bugzilla.suse.com/1082291" source="BUGZILLA"/>
		<reference ref_id="1082348" ref_url="https://bugzilla.suse.com/1082348" source="BUGZILLA"/>
		<reference ref_id="1082362" ref_url="https://bugzilla.suse.com/1082362" source="BUGZILLA"/>
		<reference ref_id="1082792" ref_url="https://bugzilla.suse.com/1082792" source="BUGZILLA"/>
		<reference ref_id="1084060" ref_url="https://bugzilla.suse.com/1084060" source="BUGZILLA"/>
		<reference ref_id="1086011" ref_url="https://bugzilla.suse.com/1086011" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11524" ref_url="https://www.suse.com/security/cve/CVE-2017-11524/" source="CVE"/>
		<reference ref_id="CVE-2017-12691" ref_url="https://www.suse.com/security/cve/CVE-2017-12691/" source="CVE"/>
		<reference ref_id="CVE-2017-12692" ref_url="https://www.suse.com/security/cve/CVE-2017-12692/" source="CVE"/>
		<reference ref_id="CVE-2017-12693" ref_url="https://www.suse.com/security/cve/CVE-2017-12693/" source="CVE"/>
		<reference ref_id="CVE-2017-13768" ref_url="https://www.suse.com/security/cve/CVE-2017-13768/" source="CVE"/>
		<reference ref_id="CVE-2017-14314" ref_url="https://www.suse.com/security/cve/CVE-2017-14314/" source="CVE"/>
		<reference ref_id="CVE-2017-14343" ref_url="https://www.suse.com/security/cve/CVE-2017-14343/" source="CVE"/>
		<reference ref_id="CVE-2017-14505" ref_url="https://www.suse.com/security/cve/CVE-2017-14505/" source="CVE"/>
		<reference ref_id="CVE-2017-15016" ref_url="https://www.suse.com/security/cve/CVE-2017-15016/" source="CVE"/>
		<reference ref_id="CVE-2017-15017" ref_url="https://www.suse.com/security/cve/CVE-2017-15017/" source="CVE"/>
		<reference ref_id="CVE-2017-16352" ref_url="https://www.suse.com/security/cve/CVE-2017-16352/" source="CVE"/>
		<reference ref_id="CVE-2017-16353" ref_url="https://www.suse.com/security/cve/CVE-2017-16353/" source="CVE"/>
		<reference ref_id="CVE-2017-18219" ref_url="https://www.suse.com/security/cve/CVE-2017-18219/" source="CVE"/>
		<reference ref_id="CVE-2017-9500" ref_url="https://www.suse.com/security/cve/CVE-2017-9500/" source="CVE"/>
		<reference ref_id="CVE-2018-7443" ref_url="https://www.suse.com/security/cve/CVE-2018-7443/" source="CVE"/>
		<reference ref_id="CVE-2018-8804" ref_url="https://www.suse.com/security/cve/CVE-2018-8804/" source="CVE"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2018-8804: The WriteEPTImage function allowed remote attackers to cause a
  denial of service (double free and application crash) or possibly have
  unspecified other impact via a crafted file (bsc#1086011)
- CVE-2017-11524: The WriteBlob function allowed remote attackers to cause a
  denial of service (assertion failure and application exit) via a crafted file
  (bsc#1050087)
- CVE-2017-18219: Prevent allocation failure in the function ReadOnePNGImage,
  which allowed attackers to cause a denial of service via a crafted file that
  triggers an attempt at a large png_pixels array allocation (bsc#1084060).
- CVE-2017-9500: Prevent assertion failure in the function
  ResetImageProfileIterator, which allowed attackers to cause a denial of service
  via a crafted file (bsc#1043290)
- CVE-2017-16353: Prevent memory information disclosure in the DescribeImage
  function caused by a heap-based buffer over-read. The portion of the code
  containing the vulnerability is responsible for printing the IPTC Profile
  information contained in the image. This vulnerability can be triggered with a
  specially crafted MIFF file. There is an out-of-bounds buffer dereference
  because certain increments were never checked (bsc#1066170)
- CVE-2017-16352: Prevent a heap-based buffer overflow in the 'Display visual
  image directory' feature of the DescribeImage() function. One possible way to
  trigger the vulnerability is to run the identify command on a specially crafted
  MIFF format file with the verbose flag (bsc#1066168)
- CVE-2017-14314: Prevent off-by-one error in the DrawImage function that
  allowed remote attackers to cause a denial of service (DrawDashPolygon
  heap-based buffer over-read and application crash) via a crafted file
  (bsc#1058630)
- CVE-2017-13768: Prevent NULL pointer dereference in the IdentifyImage
  function that allowed an attacker to perform denial of service by sending a
  crafted image file (bsc#1056434)
- CVE-2017-14505: Fixed handling of NULL arrays, which allowed attackers to
  perform Denial of Service (NULL pointer dereference and application crash in
  AcquireQuantumMemory within MagickCore/memory.c) by providing a crafted Image
  File as input (bsc#1059735)
- CVE-2018-7443: The ReadTIFFImage function did not properly validate the
  amount of image data in a file, which allowed remote attackers to cause a
  denial of service (memory allocation failure in the AcquireMagickMemory
  function in MagickCore/memory.c) (bsc#1082792)
- CVE-2017-15016: Prevent NULL pointer dereference vulnerability in
  ReadEnhMetaFile allowing for denial of service (bsc#1082291)
- CVE-2017-15017: Prevent NULL pointer dereference vulnerability in
  ReadOneMNGImage allowing for denial of service (bsc#1082283)
- CVE-2017-12692: The ReadVIFFImage function allowed remote attackers to cause
  a denial of service (memory consumption) via a crafted VIFF file (bsc#1082362)
- CVE-2017-12693: The ReadBMPImage function allowed remote attackers to cause a
  denial of service (memory consumption) via a crafted BMP file (bsc#1082348)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-05"/>
	<updated date="2018-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043290">SUSE bug 1043290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050087">SUSE bug 1050087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056434">SUSE bug 1056434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058630">SUSE bug 1058630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059735">SUSE bug 1059735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066168">SUSE bug 1066168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066170">SUSE bug 1066170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082283">SUSE bug 1082283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082291">SUSE bug 1082291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082348">SUSE bug 1082348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082362">SUSE bug 1082362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082792">SUSE bug 1082792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084060">SUSE bug 1084060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086011">SUSE bug 1086011</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11524/">CVE-2017-11524 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11524">CVE-2017-11524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12691/">CVE-2017-12691 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12691">CVE-2017-12691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12692/">CVE-2017-12692 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12692">CVE-2017-12692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12693/">CVE-2017-12693 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12693">CVE-2017-12693 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13768/">CVE-2017-13768 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13768">CVE-2017-13768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14314/">CVE-2017-14314 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14314">CVE-2017-14314 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14343/">CVE-2017-14343 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14343">CVE-2017-14343 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14505/">CVE-2017-14505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14505">CVE-2017-14505 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15016/">CVE-2017-15016 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15016">CVE-2017-15016 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15017/">CVE-2017-15017 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15017">CVE-2017-15017 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-16352/">CVE-2017-16352 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16352">CVE-2017-16352 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16353/">CVE-2017-16353 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16353">CVE-2017-16353 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18219/">CVE-2017-18219 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18219">CVE-2017-18219 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9500/">CVE-2017-9500 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9500">CVE-2017-9500 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7443/">CVE-2018-7443 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7443">CVE-2018-7443 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8804/">CVE-2018-8804 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8804">CVE-2018-8804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570450" comment="libMagickCore1-6.4.3.6-78.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570451" comment="libMagickCore1-32bit-6.4.3.6-78.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218216" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1047356" ref_url="https://bugzilla.suse.com/1047356" source="BUGZILLA"/>
		<reference ref_id="1086773" ref_url="https://bugzilla.suse.com/1086773" source="BUGZILLA"/>
		<reference ref_id="1086782" ref_url="https://bugzilla.suse.com/1086782" source="BUGZILLA"/>
		<reference ref_id="1087027" ref_url="https://bugzilla.suse.com/1087027" source="BUGZILLA"/>
		<reference ref_id="1087033" ref_url="https://bugzilla.suse.com/1087033" source="BUGZILLA"/>
		<reference ref_id="1087037" ref_url="https://bugzilla.suse.com/1087037" source="BUGZILLA"/>
		<reference ref_id="1089781" ref_url="https://bugzilla.suse.com/1089781" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000476" ref_url="https://www.suse.com/security/cve/CVE-2017-1000476/" source="CVE"/>
		<reference ref_id="CVE-2017-10928" ref_url="https://www.suse.com/security/cve/CVE-2017-10928/" source="CVE"/>
		<reference ref_id="CVE-2017-18251" ref_url="https://www.suse.com/security/cve/CVE-2017-18251/" source="CVE"/>
		<reference ref_id="CVE-2017-18252" ref_url="https://www.suse.com/security/cve/CVE-2017-18252/" source="CVE"/>
		<reference ref_id="CVE-2017-18254" ref_url="https://www.suse.com/security/cve/CVE-2017-18254/" source="CVE"/>
		<reference ref_id="CVE-2018-10177" ref_url="https://www.suse.com/security/cve/CVE-2018-10177/" source="CVE"/>
		<reference ref_id="CVE-2018-8960" ref_url="https://www.suse.com/security/cve/CVE-2018-8960/" source="CVE"/>
		<reference ref_id="CVE-2018-9018" ref_url="https://www.suse.com/security/cve/CVE-2018-9018/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:


- security update (png.c)
  * CVE-2018-9018: divide-by-zero in the ReadMNGImage function of coders/png.c. 
    Attackers could leverage this vulnerability to cause a crash and denial of service 
    via a crafted mng file. [bsc#1086773]
  * CVE-2018-10177: there is an infinite loop in the ReadOneMNGImagefunction of the coders/png.c file. Remote attackers could leverage thisvulnerability to cause a denial of service (bsc#1089781)

- security update (wand)
  * CVE-2017-18252: The MogrifyImageList function in MagickWand/mogrify.c could allow 
    attackers to cause a denial of service via a crafted file. [bsc#1087033]

- security update (gif.c)
  * CVE-2017-18254: A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, 
    which could lead to  denial of service via a crafted file. [bsc#1087027]

- security update (core)
  * CVE-2017-10928: a heap-based buffer over-read in the GetNextToken function in token.c 
    could allow attackers to obtain sensitive information from process memory or possibly have 
    unspecified other impact via a crafted SVG document that is mishandled in the 
    GetUserSpaceCoordinateValue function in coders/svg.c. [bsc#1047356]

- security update (pcd.c)
  * CVE-2017-18251: A memory leak vulnerability was found in the function ReadPCDImage in coders/pcd.c, 
    which could lead to a denial of service via a crafted file. [bsc#1087037]

- security update (gif.c)
  * CVE-2017-18254: A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, which could lead to denial of service via a crafted file. [bsc#1087027]

- security update (tiff.c)
  * CVE-2018-8960: The ReadTIFFImage function in coders/tiff.c in ImageMagick memory allocation issue could lead to denial of service (bsc#1086782)



		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-02"/>
	<updated date="2018-05-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047356">SUSE bug 1047356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086773">SUSE bug 1086773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086782">SUSE bug 1086782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087027">SUSE bug 1087027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087033">SUSE bug 1087033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087037">SUSE bug 1087037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089781">SUSE bug 1089781</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000476/">CVE-2017-1000476 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000476">CVE-2017-1000476 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10928/">CVE-2017-10928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10928">CVE-2017-10928 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18251/">CVE-2017-18251 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18251">CVE-2017-18251 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18252/">CVE-2017-18252 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18252">CVE-2017-18252 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18254/">CVE-2017-18254 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18254">CVE-2017-18254 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10177/">CVE-2018-10177 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10177">CVE-2018-10177 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8960/">CVE-2018-8960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8960">CVE-2018-8960 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9018/">CVE-2018-9018 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9018">CVE-2018-9018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570452" comment="libMagickCore1-6.4.3.6-78.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570453" comment="libMagickCore1-32bit-6.4.3.6-78.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218217" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1056277" ref_url="https://bugzilla.suse.com/1056277" source="BUGZILLA"/>
		<reference ref_id="1094204" ref_url="https://bugzilla.suse.com/1094204" source="BUGZILLA"/>
		<reference ref_id="1094237" ref_url="https://bugzilla.suse.com/1094237" source="BUGZILLA"/>
		<reference ref_id="1095812" ref_url="https://bugzilla.suse.com/1095812" source="BUGZILLA"/>
		<reference ref_id="1098545" ref_url="https://bugzilla.suse.com/1098545" source="BUGZILLA"/>
		<reference ref_id="1098546" ref_url="https://bugzilla.suse.com/1098546" source="BUGZILLA"/>
		<reference ref_id="1102003" ref_url="https://bugzilla.suse.com/1102003" source="BUGZILLA"/>
		<reference ref_id="1102004" ref_url="https://bugzilla.suse.com/1102004" source="BUGZILLA"/>
		<reference ref_id="1102005" ref_url="https://bugzilla.suse.com/1102005" source="BUGZILLA"/>
		<reference ref_id="1102007" ref_url="https://bugzilla.suse.com/1102007" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13758" ref_url="https://www.suse.com/security/cve/CVE-2017-13758/" source="CVE"/>
		<reference ref_id="CVE-2017-18271" ref_url="https://www.suse.com/security/cve/CVE-2017-18271/" source="CVE"/>
		<reference ref_id="CVE-2018-10805" ref_url="https://www.suse.com/security/cve/CVE-2018-10805/" source="CVE"/>
		<reference ref_id="CVE-2018-11251" ref_url="https://www.suse.com/security/cve/CVE-2018-11251/" source="CVE"/>
		<reference ref_id="CVE-2018-12599" ref_url="https://www.suse.com/security/cve/CVE-2018-12599/" source="CVE"/>
		<reference ref_id="CVE-2018-12600" ref_url="https://www.suse.com/security/cve/CVE-2018-12600/" source="CVE"/>
		<reference ref_id="CVE-2018-14434" ref_url="https://www.suse.com/security/cve/CVE-2018-14434/" source="CVE"/>
		<reference ref_id="CVE-2018-14435" ref_url="https://www.suse.com/security/cve/CVE-2018-14435/" source="CVE"/>
		<reference ref_id="CVE-2018-14436" ref_url="https://www.suse.com/security/cve/CVE-2018-14436/" source="CVE"/>
		<reference ref_id="CVE-2018-14437" ref_url="https://www.suse.com/security/cve/CVE-2018-14437/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2018-11251: Heap-based buffer over-read in ReadSUNImage in coders/sun.c,
  which allows attackers to cause denial of service (bsc#1094237)
- CVE-2017-18271: Infinite loop in the function ReadMIFFImage in coders/miff.c,
  which allows attackers to cause a denial of service (bsc#1094204)
- CVE-2017-13758: Heap-based buffer overflow in the TracePoint() in
  MagickCore/draw.c, which allows attackers to cause a denial of
  service(bsc#1056277)
- CVE-2018-10805: Fixed several memory leaks in rgb.c, cmyk.c, gray.c, and
  ycbcr.c (bsc#1095812)
- CVE-2018-12600: The ReadDIBImage and WriteDIBImage functions allowed
  attackers to cause an out of bounds write via a crafted file (bsc#1098545)
- CVE-2018-12599: The ReadBMPImage and WriteBMPImage fucntions allowed
  attackers to cause an out of bounds write via a crafted file (bsc#1098546)
- CVE-2018-14434: Fixed a memory leak for a colormap in WriteMPCImage in coders/mpc.c (bsc#1102003)
- CVE-2018-14435: Fixed a memory leak in DecodeImage in coders/pcd.c (bsc#1102007) 
- CVE-2018-14436: Fixed a memory leak in ReadMIFFImage in coders/miff.c (bsc#1102005)
- CVE-2018-14437: Fixed a memory leak in parse8BIM in coders/meta.c (bsc#1102004)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-21"/>
	<updated date="2018-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056277">SUSE bug 1056277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094204">SUSE bug 1094204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094237">SUSE bug 1094237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095812">SUSE bug 1095812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098545">SUSE bug 1098545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098546">SUSE bug 1098546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102003">SUSE bug 1102003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102004">SUSE bug 1102004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102005">SUSE bug 1102005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102007">SUSE bug 1102007</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13758/">CVE-2017-13758 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13758">CVE-2017-13758 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18271/">CVE-2017-18271 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18271">CVE-2017-18271 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10805/">CVE-2018-10805 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10805">CVE-2018-10805 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11251/">CVE-2018-11251 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11251">CVE-2018-11251 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12599/">CVE-2018-12599 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12599">CVE-2018-12599 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12600/">CVE-2018-12600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12600">CVE-2018-12600 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14434/">CVE-2018-14434 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14434">CVE-2018-14434 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14435/">CVE-2018-14435 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14435">CVE-2018-14435 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14436/">CVE-2018-14436 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14436">CVE-2018-14436 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14437/">CVE-2018-14437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14437">CVE-2018-14437 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570454" comment="libMagickCore1-6.4.3.6-78.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570455" comment="libMagickCore1-32bit-6.4.3.6-78.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218218" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1105592" ref_url="https://bugzilla.suse.com/1105592" source="BUGZILLA"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issue fixed:

- Hide PS, XPS and PDF coders into */vulnerable (bsc#1105592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-29"/>
	<updated date="2018-08-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570456" comment="libMagickCore1-6.4.3.6-78.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570457" comment="libMagickCore1-32bit-6.4.3.6-78.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218219" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1074170" ref_url="https://bugzilla.suse.com/1074170" source="BUGZILLA"/>
		<reference ref_id="1106855" ref_url="https://bugzilla.suse.com/1106855" source="BUGZILLA"/>
		<reference ref_id="1106989" ref_url="https://bugzilla.suse.com/1106989" source="BUGZILLA"/>
		<reference ref_id="1107604" ref_url="https://bugzilla.suse.com/1107604" source="BUGZILLA"/>
		<reference ref_id="1107609" ref_url="https://bugzilla.suse.com/1107609" source="BUGZILLA"/>
		<reference ref_id="1107612" ref_url="https://bugzilla.suse.com/1107612" source="BUGZILLA"/>
		<reference ref_id="1107616" ref_url="https://bugzilla.suse.com/1107616" source="BUGZILLA"/>
		<reference ref_id="1108282" ref_url="https://bugzilla.suse.com/1108282" source="BUGZILLA"/>
		<reference ref_id="1108283" ref_url="https://bugzilla.suse.com/1108283" source="BUGZILLA"/>
		<reference ref_id="1110746" ref_url="https://bugzilla.suse.com/1110746" source="BUGZILLA"/>
		<reference ref_id="1110747" ref_url="https://bugzilla.suse.com/1110747" source="BUGZILLA"/>
		<reference ref_id="1111069" ref_url="https://bugzilla.suse.com/1111069" source="BUGZILLA"/>
		<reference ref_id="1111072" ref_url="https://bugzilla.suse.com/1111072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17934" ref_url="https://www.suse.com/security/cve/CVE-2017-17934/" source="CVE"/>
		<reference ref_id="CVE-2018-16323" ref_url="https://www.suse.com/security/cve/CVE-2018-16323/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-16642" ref_url="https://www.suse.com/security/cve/CVE-2018-16642/" source="CVE"/>
		<reference ref_id="CVE-2018-16643" ref_url="https://www.suse.com/security/cve/CVE-2018-16643/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="CVE-2018-16645" ref_url="https://www.suse.com/security/cve/CVE-2018-16645/" source="CVE"/>
		<reference ref_id="CVE-2018-16749" ref_url="https://www.suse.com/security/cve/CVE-2018-16749/" source="CVE"/>
		<reference ref_id="CVE-2018-16750" ref_url="https://www.suse.com/security/cve/CVE-2018-16750/" source="CVE"/>
		<reference ref_id="CVE-2018-17965" ref_url="https://www.suse.com/security/cve/CVE-2018-17965/" source="CVE"/>
		<reference ref_id="CVE-2018-17966" ref_url="https://www.suse.com/security/cve/CVE-2018-17966/" source="CVE"/>
		<reference ref_id="CVE-2018-18016" ref_url="https://www.suse.com/security/cve/CVE-2018-18016/" source="CVE"/>
		<reference ref_id="CVE-2018-18024" ref_url="https://www.suse.com/security/cve/CVE-2018-18024/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following security issue:

- CVE-2017-17934: Prevent memory leaks, related to MSLPopImage and
  ProcessMSLScript, and associated with mishandling of MSLPushImage calls
  (bsc#1074170).
- CVE-2018-16750: Prevent memory leak in the formatIPTCfromBuffer function
  (bsc#1108283)
- CVE-2018-16749: Added missing NULL check in ReadOneJNGImage that allowed an
  attacker to cause a denial of service (WriteBlob assertion failure and
  application exit) via a crafted file (bsc#1108282)
- CVE-2018-16413: Prevent heap-based buffer over-read in the PushShortPixel
  function leading to DoS (bsc#1106989).
- CVE-2018-16323: ReadXBMImage left data uninitialized when processing an XBM
  file that has a negative pixel value. If the affected code was used as a
  library loaded into a process that includes sensitive information, that
  information sometimes can be leaked via the image data (bsc#1106855)
- CVE-2018-16642: The function InsertRow allowed remote attackers to cause a
  denial of service via a crafted image file due to an out-of-bounds write
  (bsc#1107616)
- CVE-2018-16643: The functions ReadDCMImage, ReadPWPImage, ReadCALSImage, and
  ReadPICTImage did check the return value of the fputc function, which allowed
  remote attackers to cause a denial of service via a crafted image file
  (bsc#1107612)
- CVE-2018-16644: Added missing check for length in the functions ReadDCMImage
  and ReadPICTImage, which allowed remote attackers to cause a denial of service
  via a crafted image (bsc#1107609)
- CVE-2018-16645: Prevent excessive memory allocation issue in the functions
  ReadBMPImage and ReadDIBImage, which allowed remote attackers to cause a denial
  of service via a crafted image file (bsc#1107604)
- CVE-2018-18024: Fixed an infinite loop in the ReadBMPImage function of
  the coders/bmp.c file. Remote attackers could leverage this vulnerability
  to cause a denial of service via a crafted bmp file (bsc#1111069)
- CVE-2018-18016: Fixed a memory leak in WritePCXImage (bsc#1111072)
- CVE-2018-17965: Fixed a memory leak in WriteSGIImage (bsc#1110747)
- CVE-2018-17966: Fixed a memory leak in WritePDBImage (bsc#1110746)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074170">SUSE bug 1074170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106855">SUSE bug 1106855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107604">SUSE bug 1107604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107612">SUSE bug 1107612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107616">SUSE bug 1107616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108282">SUSE bug 1108282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108283">SUSE bug 1108283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110746">SUSE bug 1110746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110747">SUSE bug 1110747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111069">SUSE bug 1111069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111072">SUSE bug 1111072</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17934/">CVE-2017-17934 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17934">CVE-2017-17934 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16323/">CVE-2018-16323 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16323">CVE-2018-16323 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16413">CVE-2018-16413 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16642/">CVE-2018-16642 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16642">CVE-2018-16642 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16643/">CVE-2018-16643 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16643">CVE-2018-16643 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16644">CVE-2018-16644 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16645/">CVE-2018-16645 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16645">CVE-2018-16645 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16749/">CVE-2018-16749 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16749">CVE-2018-16749 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16750/">CVE-2018-16750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16750">CVE-2018-16750 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17965/">CVE-2018-17965 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17965">CVE-2018-17965 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17966/">CVE-2018-17966 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17966">CVE-2018-17966 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18016/">CVE-2018-18016 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18016">CVE-2018-18016 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18024/">CVE-2018-18024 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18024">CVE-2018-18024 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570458" comment="libMagickCore1-6.4.3.6-78.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570459" comment="libMagickCore1-32bit-6.4.3.6-78.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218220" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1050129" ref_url="https://bugzilla.suse.com/1050129" source="BUGZILLA"/>
		<reference ref_id="1050635" ref_url="https://bugzilla.suse.com/1050635" source="BUGZILLA"/>
		<reference ref_id="1107609" ref_url="https://bugzilla.suse.com/1107609" source="BUGZILLA"/>
		<reference ref_id="1112399" ref_url="https://bugzilla.suse.com/1112399" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11532" ref_url="https://www.suse.com/security/cve/CVE-2017-11532/" source="CVE"/>
		<reference ref_id="CVE-2017-11639" ref_url="https://www.suse.com/security/cve/CVE-2017-11639/" source="CVE"/>
		<reference ref_id="CVE-2017-14997" ref_url="https://www.suse.com/security/cve/CVE-2017-14997/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:


- CVE-2017-14997: ImageMagick allowed remote attackers to cause a denial of service (excessive memory allocation) because of an integer underflow in ReadPICTImage in coders/pict.c.  (bsc#1112399)
- CVE-2018-16644: A regression in the security fix for the pict coder was fixed (bsc#1107609)
- CVE-2017-11532: When ImageMagick processed a crafted file in convert, it could lead to a Memory Leak in the WriteMPCImage() function in coders/mpc.c. (bsc#1050129)
- CVE-2017-11639: A regression in the security fix in the cip coder was fixed (bsc#1050635)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-19"/>
	<updated date="2018-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050129">SUSE bug 1050129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050635">SUSE bug 1050635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112399">SUSE bug 1112399</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11532/">CVE-2017-11532 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11532">CVE-2017-11532 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11639/">CVE-2017-11639 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11639">CVE-2017-11639 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14997/">CVE-2017-14997 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14997">CVE-2017-14997 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16644">CVE-2018-16644 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570460" comment="libMagickCore1-6.4.3.6-78.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570461" comment="libMagickCore1-32bit-6.4.3.6-78.79.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218221" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1106989" ref_url="https://bugzilla.suse.com/1106989" source="BUGZILLA"/>
		<reference ref_id="1106996" ref_url="https://bugzilla.suse.com/1106996" source="BUGZILLA"/>
		<reference ref_id="1113064" ref_url="https://bugzilla.suse.com/1113064" source="BUGZILLA"/>
		<reference ref_id="1120381" ref_url="https://bugzilla.suse.com/1120381" source="BUGZILLA"/>
		<reference ref_id="1124365" ref_url="https://bugzilla.suse.com/1124365" source="BUGZILLA"/>
		<reference ref_id="1124366" ref_url="https://bugzilla.suse.com/1124366" source="BUGZILLA"/>
		<reference ref_id="1128649" ref_url="https://bugzilla.suse.com/1128649" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16412" ref_url="https://www.suse.com/security/cve/CVE-2018-16412/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-18544" ref_url="https://www.suse.com/security/cve/CVE-2018-18544/" source="CVE"/>
		<reference ref_id="CVE-2018-20467" ref_url="https://www.suse.com/security/cve/CVE-2018-20467/" source="CVE"/>
		<reference ref_id="CVE-2019-7175" ref_url="https://www.suse.com/security/cve/CVE-2019-7175/" source="CVE"/>
		<reference ref_id="CVE-2019-7397" ref_url="https://www.suse.com/security/cve/CVE-2019-7397/" source="CVE"/>
		<reference ref_id="CVE-2019-7398" ref_url="https://www.suse.com/security/cve/CVE-2019-7398/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-7175: Fixed multiple memory leaks in DecodeImage function (bsc#1128649).
- CVE-2018-18544: Fixed memory leak in the function WriteMSLImage (bsc#1113064).
- CVE-2018-20467: Fixed infinite loop in coders/bmp.c (bsc#1120381).
- CVE-2019-7397: Fixed a memory leak in the function WritePDFImage (bsc#1124366).
- CVE-2018-16413: Prevent heap-based buffer over-read in the PushShortPixel
  function leading to DoS (bsc#1106989).
- CVE-2018-16412: Prevent heap-based buffer over-read in the ParseImageResourceBlocks
  function leading to DOS (bsc#1106996).
- CVE-2019-7398: Fixed a memory leak in the function WriteDIBImage (bsc#1124365).


		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106996">SUSE bug 1106996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113064">SUSE bug 1113064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120381">SUSE bug 1120381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124365">SUSE bug 1124365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124366">SUSE bug 1124366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128649">SUSE bug 1128649</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16412/">CVE-2018-16412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16412">CVE-2018-16412 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16413">CVE-2018-16413 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18544/">CVE-2018-18544 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18544">CVE-2018-18544 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20467/">CVE-2018-20467 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20467">CVE-2018-20467 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7175/">CVE-2019-7175 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7175">CVE-2019-7175 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7397/">CVE-2019-7397 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7397">CVE-2019-7397 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7398/">CVE-2019-7398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7398">CVE-2019-7398 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570462" comment="libMagickCore1-6.4.3.6-78.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570463" comment="libMagickCore1-32bit-6.4.3.6-78.92.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218222" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1130330" ref_url="https://bugzilla.suse.com/1130330" source="BUGZILLA"/>
		<reference ref_id="1131317" ref_url="https://bugzilla.suse.com/1131317" source="BUGZILLA"/>
		<reference ref_id="1132053" ref_url="https://bugzilla.suse.com/1132053" source="BUGZILLA"/>
		<reference ref_id="1132060" ref_url="https://bugzilla.suse.com/1132060" source="BUGZILLA"/>
		<reference ref_id="1133204" ref_url="https://bugzilla.suse.com/1133204" source="BUGZILLA"/>
		<reference ref_id="1133205" ref_url="https://bugzilla.suse.com/1133205" source="BUGZILLA"/>
		<reference ref_id="1133498" ref_url="https://bugzilla.suse.com/1133498" source="BUGZILLA"/>
		<reference ref_id="1133501" ref_url="https://bugzilla.suse.com/1133501" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10650" ref_url="https://www.suse.com/security/cve/CVE-2019-10650/" source="CVE"/>
		<reference ref_id="CVE-2019-11007" ref_url="https://www.suse.com/security/cve/CVE-2019-11007/" source="CVE"/>
		<reference ref_id="CVE-2019-11009" ref_url="https://www.suse.com/security/cve/CVE-2019-11009/" source="CVE"/>
		<reference ref_id="CVE-2019-11470" ref_url="https://www.suse.com/security/cve/CVE-2019-11470/" source="CVE"/>
		<reference ref_id="CVE-2019-11472" ref_url="https://www.suse.com/security/cve/CVE-2019-11472/" source="CVE"/>
		<reference ref_id="CVE-2019-11505" ref_url="https://www.suse.com/security/cve/CVE-2019-11505/" source="CVE"/>
		<reference ref_id="CVE-2019-11506" ref_url="https://www.suse.com/security/cve/CVE-2019-11506/" source="CVE"/>
		<reference ref_id="CVE-2019-9956" ref_url="https://www.suse.com/security/cve/CVE-2019-9956/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-9956: Fixed a stack-based buffer overflow in PopHexPixel() (bsc#1130330).
- CVE-2019-10650: Fixed a heap-based buffer over-read in WriteTIFFImage() (bsc#1131317).
- CVE-2019-11007: Fixed a heap-based buffer overflow in ReadMNGImage() (bsc#1132060).
- CVE-2019-11009: Fixed a heap-based buffer over-read in ReadXWDImage() (bsc#1132053).
- CVE-2019-11472: Fixed a denial-of-service in ReadXWDImage() (bsc#1133204).
- CVE-2019-11470: Fixed a denial-of-service in ReadCINImage() (bsc#1133205).
- CVE-2019-11506: Fixed a heap-based buffer overflow in the WriteMATLABImage() (bsc#1133498).
- CVE-2019-11505: Fixed a heap-based buffer overflow in the WritePDBImage() (bsc#1133501).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1130330">SUSE bug 1130330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131317">SUSE bug 1131317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132053">SUSE bug 1132053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132060">SUSE bug 1132060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133204">SUSE bug 1133204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133205">SUSE bug 1133205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133498">SUSE bug 1133498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133501">SUSE bug 1133501</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10650/">CVE-2019-10650 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10650">CVE-2019-10650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11007/">CVE-2019-11007 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11007">CVE-2019-11007 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11009/">CVE-2019-11009 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11009">CVE-2019-11009 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11470/">CVE-2019-11470 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11470">CVE-2019-11470 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11472/">CVE-2019-11472 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11472">CVE-2019-11472 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11505/">CVE-2019-11505 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11505">CVE-2019-11505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11506/">CVE-2019-11506 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11506">CVE-2019-11506 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9956/">CVE-2019-9956 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9956">CVE-2019-9956 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570464" comment="libMagickCore1-6.4.3.6-78.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570465" comment="libMagickCore1-32bit-6.4.3.6-78.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218223" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1134075" ref_url="https://bugzilla.suse.com/1134075" source="BUGZILLA"/>
		<reference ref_id="1135232" ref_url="https://bugzilla.suse.com/1135232" source="BUGZILLA"/>
		<reference ref_id="1135236" ref_url="https://bugzilla.suse.com/1135236" source="BUGZILLA"/>
		<reference ref_id="1136183" ref_url="https://bugzilla.suse.com/1136183" source="BUGZILLA"/>
		<reference ref_id="1136732" ref_url="https://bugzilla.suse.com/1136732" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12805" ref_url="https://www.suse.com/security/cve/CVE-2017-12805/" source="CVE"/>
		<reference ref_id="CVE-2017-12806" ref_url="https://www.suse.com/security/cve/CVE-2017-12806/" source="CVE"/>
		<reference ref_id="CVE-2019-10131" ref_url="https://www.suse.com/security/cve/CVE-2019-10131/" source="CVE"/>
		<reference ref_id="CVE-2019-11598" ref_url="https://www.suse.com/security/cve/CVE-2019-11598/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issue fixed:

- CVE-2019-10131: Fixed a off-by-one read in formatIPTCfromBuffer function in coders/meta.c (bsc#1134075).
- CVE-2017-12805: Fixed a denial of service through memory exhaustion in ReadTIFFImage() (bsc#1135236).
- CVE-2019-11598: Fixed a heap-based buffer over-read in WritePNMImage() (bsc#1136732)

We also now disable PCL in the -SUSE configuration, as it also uses ghostscript for decoding (bsc#1136183)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-17"/>
	<updated date="2019-06-17"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1134075">SUSE bug 1134075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135232">SUSE bug 1135232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135236">SUSE bug 1135236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136183">SUSE bug 1136183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136732">SUSE bug 1136732</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12805/">CVE-2017-12805 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12805">CVE-2017-12805 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12806/">CVE-2017-12806 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12806">CVE-2017-12806 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10131/">CVE-2019-10131 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10131">CVE-2019-10131 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11598/">CVE-2019-11598 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11598">CVE-2019-11598 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570466" comment="libMagickCore1-6.4.3.6-78.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570467" comment="libMagickCore1-32bit-6.4.3.6-78.106.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218224" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1138425" ref_url="https://bugzilla.suse.com/1138425" source="BUGZILLA"/>
		<reference ref_id="1138464" ref_url="https://bugzilla.suse.com/1138464" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11597" ref_url="https://www.suse.com/security/cve/CVE-2019-11597/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-11597: Fixed a heap-based buffer over-read in the WriteTIFFImage() (bsc#1138464).
- Fixed a file content disclosure via SVG and WMF decoding (bsc#1138425).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-08"/>
	<updated date="2019-07-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1138425">SUSE bug 1138425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138464">SUSE bug 1138464</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11597/">CVE-2019-11597 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11597">CVE-2019-11597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570468" comment="libMagickCore1-6.4.3.6-78.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570469" comment="libMagickCore1-32bit-6.4.3.6-78.109.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218225" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1139886" ref_url="https://bugzilla.suse.com/1139886" source="BUGZILLA"/>
		<reference ref_id="1140100" ref_url="https://bugzilla.suse.com/1140100" source="BUGZILLA"/>
		<reference ref_id="1140102" ref_url="https://bugzilla.suse.com/1140102" source="BUGZILLA"/>
		<reference ref_id="1140103" ref_url="https://bugzilla.suse.com/1140103" source="BUGZILLA"/>
		<reference ref_id="1140106" ref_url="https://bugzilla.suse.com/1140106" source="BUGZILLA"/>
		<reference ref_id="1140110" ref_url="https://bugzilla.suse.com/1140110" source="BUGZILLA"/>
		<reference ref_id="1140513" ref_url="https://bugzilla.suse.com/1140513" source="BUGZILLA"/>
		<reference ref_id="1140554" ref_url="https://bugzilla.suse.com/1140554" source="BUGZILLA"/>
		<reference ref_id="1140664" ref_url="https://bugzilla.suse.com/1140664" source="BUGZILLA"/>
		<reference ref_id="1140666" ref_url="https://bugzilla.suse.com/1140666" source="BUGZILLA"/>
		<reference ref_id="1141171" ref_url="https://bugzilla.suse.com/1141171" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12975" ref_url="https://www.suse.com/security/cve/CVE-2019-12975/" source="CVE"/>
		<reference ref_id="CVE-2019-12976" ref_url="https://www.suse.com/security/cve/CVE-2019-12976/" source="CVE"/>
		<reference ref_id="CVE-2019-12979" ref_url="https://www.suse.com/security/cve/CVE-2019-12979/" source="CVE"/>
		<reference ref_id="CVE-2019-13133" ref_url="https://www.suse.com/security/cve/CVE-2019-13133/" source="CVE"/>
		<reference ref_id="CVE-2019-13134" ref_url="https://www.suse.com/security/cve/CVE-2019-13134/" source="CVE"/>
		<reference ref_id="CVE-2019-13135" ref_url="https://www.suse.com/security/cve/CVE-2019-13135/" source="CVE"/>
		<reference ref_id="CVE-2019-13295" ref_url="https://www.suse.com/security/cve/CVE-2019-13295/" source="CVE"/>
		<reference ref_id="CVE-2019-13297" ref_url="https://www.suse.com/security/cve/CVE-2019-13297/" source="CVE"/>
		<reference ref_id="CVE-2019-13301" ref_url="https://www.suse.com/security/cve/CVE-2019-13301/" source="CVE"/>
		<reference ref_id="CVE-2019-13311" ref_url="https://www.suse.com/security/cve/CVE-2019-13311/" source="CVE"/>
		<reference ref_id="CVE-2019-13454" ref_url="https://www.suse.com/security/cve/CVE-2019-13454/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2019-13301: Fixed a memory leak in AcquireMagickMemory() (bsc#1140554).
- CVE-2019-13311: Fixed a memory leak at AcquireMagickMemory because of a wand/mogrify.c error (bsc#1140513).
- CVE-2019-13454: Fixed a division by zero in RemoveDuplicateLayers in MagickCore/layer.c (bsc#1141171).
- CVE-2019-13295: Fixed a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage (bsc#1140664).
- CVE-2019-13297: Fixed a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage (bsc#1140666).
- CVE-2019-12979: Fixed the use of uninitialized values in SyncImageSettings() (bsc#1139886).
- CVE-2019-12975: Fixed a memory leak in the WriteDPXImage() in coders/dpx.c (bsc#1140106).
- CVE-2019-13135: Fixed the use of uninitialized values in ReadCUTImage() (bsc#1140103).
- CVE-2019-13133: Fixed a memory leak in the ReadBMPImage() (bsc#1140100).
- CVE-2019-13134: Fixed a memory leak in the ReadVIFFImage() (bsc#1140102).
- CVE-2019-12976: Fixed a memory leak in the ReadPCLImage() in coders/pcl.c(bsc#1140110).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-30"/>
	<updated date="2019-07-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1139886">SUSE bug 1139886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140100">SUSE bug 1140100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140102">SUSE bug 1140102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140103">SUSE bug 1140103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140106">SUSE bug 1140106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140110">SUSE bug 1140110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140513">SUSE bug 1140513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140554">SUSE bug 1140554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140664">SUSE bug 1140664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140666">SUSE bug 1140666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141171">SUSE bug 1141171</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12975/">CVE-2019-12975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12975">CVE-2019-12975 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12976/">CVE-2019-12976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12976">CVE-2019-12976 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12979/">CVE-2019-12979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12979">CVE-2019-12979 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13133/">CVE-2019-13133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13133">CVE-2019-13133 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13134/">CVE-2019-13134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13134">CVE-2019-13134 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13135/">CVE-2019-13135 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13135">CVE-2019-13135 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13295/">CVE-2019-13295 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13295">CVE-2019-13295 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13297/">CVE-2019-13297 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13297">CVE-2019-13297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13301/">CVE-2019-13301 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13301">CVE-2019-13301 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13311/">CVE-2019-13311 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13311">CVE-2019-13311 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13454/">CVE-2019-13454 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13454">CVE-2019-13454 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570470" comment="libMagickCore1-6.4.3.6-78.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570471" comment="libMagickCore1-32bit-6.4.3.6-78.112.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218226" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1133204" ref_url="https://bugzilla.suse.com/1133204" source="BUGZILLA"/>
		<reference ref_id="1146068" ref_url="https://bugzilla.suse.com/1146068" source="BUGZILLA"/>
		<reference ref_id="1146211" ref_url="https://bugzilla.suse.com/1146211" source="BUGZILLA"/>
		<reference ref_id="1146212" ref_url="https://bugzilla.suse.com/1146212" source="BUGZILLA"/>
		<reference ref_id="1146213" ref_url="https://bugzilla.suse.com/1146213" source="BUGZILLA"/>
		<reference ref_id="1151781" ref_url="https://bugzilla.suse.com/1151781" source="BUGZILLA"/>
		<reference ref_id="1151782" ref_url="https://bugzilla.suse.com/1151782" source="BUGZILLA"/>
		<reference ref_id="1151783" ref_url="https://bugzilla.suse.com/1151783" source="BUGZILLA"/>
		<reference ref_id="1151786" ref_url="https://bugzilla.suse.com/1151786" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11472" ref_url="https://www.suse.com/security/cve/CVE-2019-11472/" source="CVE"/>
		<reference ref_id="CVE-2019-14980" ref_url="https://www.suse.com/security/cve/CVE-2019-14980/" source="CVE"/>
		<reference ref_id="CVE-2019-15139" ref_url="https://www.suse.com/security/cve/CVE-2019-15139/" source="CVE"/>
		<reference ref_id="CVE-2019-15140" ref_url="https://www.suse.com/security/cve/CVE-2019-15140/" source="CVE"/>
		<reference ref_id="CVE-2019-15141" ref_url="https://www.suse.com/security/cve/CVE-2019-15141/" source="CVE"/>
		<reference ref_id="CVE-2019-16708" ref_url="https://www.suse.com/security/cve/CVE-2019-16708/" source="CVE"/>
		<reference ref_id="CVE-2019-16709" ref_url="https://www.suse.com/security/cve/CVE-2019-16709/" source="CVE"/>
		<reference ref_id="CVE-2019-16710" ref_url="https://www.suse.com/security/cve/CVE-2019-16710/" source="CVE"/>
		<reference ref_id="CVE-2019-16713" ref_url="https://www.suse.com/security/cve/CVE-2019-16713/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-15139: Fixed a denial-of-service vulnerability in ReadXWDImage. (bsc#1146213)
- CVE-2019-15140: Fixed a use-after-free bug in the Matlab image parser. (bsc#1146212)
- CVE-2019-15141: Fixed a divide-by-zero vulnerability in the MeanShiftImage function. (bsc#1146211)
- CVE-2019-14980: Fixed an application crash resulting from a heap-based buffer over-read in WriteTIFFImage. (bsc#1146068)
- CVE-2019-16708: Fixed a memory leak in magick/xwindow.c (bsc#1151781).
- CVE-2019-16709: Fixed a memory leak in coders/dps.c (bsc#1151782).
- CVE-2019-16710: Fixed a memory leak in coders/dot.c (bsc#1151783).
- CVE-2019-16713: Fixed a memory leak in coders/dot.c (bsc#1151786).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-05"/>
	<updated date="2019-11-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1133204">SUSE bug 1133204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146068">SUSE bug 1146068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146211">SUSE bug 1146211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146212">SUSE bug 1146212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146213">SUSE bug 1146213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151781">SUSE bug 1151781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151782">SUSE bug 1151782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151783">SUSE bug 1151783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151786">SUSE bug 1151786</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11472/">CVE-2019-11472 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11472">CVE-2019-11472 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14980/">CVE-2019-14980 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14980">CVE-2019-14980 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15139/">CVE-2019-15139 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15139">CVE-2019-15139 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15140/">CVE-2019-15140 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15140">CVE-2019-15140 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15141/">CVE-2019-15141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15141">CVE-2019-15141 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16708/">CVE-2019-16708 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16708">CVE-2019-16708 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16709/">CVE-2019-16709 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16709">CVE-2019-16709 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16710/">CVE-2019-16710 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16710">CVE-2019-16710 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16713/">CVE-2019-16713 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16713">CVE-2019-16713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570472" comment="libMagickCore1-6.4.3.6-78.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570473" comment="libMagickCore1-32bit-6.4.3.6-78.117.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218227" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1159861" ref_url="https://bugzilla.suse.com/1159861" source="BUGZILLA"/>
		<reference ref_id="1160369" ref_url="https://bugzilla.suse.com/1160369" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19948" ref_url="https://www.suse.com/security/cve/CVE-2019-19948/" source="CVE"/>
		<reference ref_id="CVE-2019-19949" ref_url="https://www.suse.com/security/cve/CVE-2019-19949/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2019-19948: Fixed a heap-based buffer overflow in WriteSGIImage() (bsc#1159861).
- CVE-2019-19949: Fixed a heap-based buffer over-read in WritePNGImage() (bsc#1160369).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-24"/>
	<updated date="2020-02-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1159861">SUSE bug 1159861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160369">SUSE bug 1160369</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19948/">CVE-2019-19948 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19948">CVE-2019-19948 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19949/">CVE-2019-19949 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19949">CVE-2019-19949 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570474" comment="libMagickCore1-6.4.3.6-78.122.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570475" comment="libMagickCore1-32bit-6.4.3.6-78.122.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218228" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1047054" ref_url="https://bugzilla.suse.com/1047054" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11527" ref_url="https://www.suse.com/security/cve/CVE-2017-11527/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2017-11527: Fixed a denial of service in  inReadDPXImage() (bsc#1047054).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-30"/>
	<updated date="2020-09-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047054">SUSE bug 1047054</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11527/">CVE-2017-11527 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11527">CVE-2017-11527 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570476" comment="libMagickCore1-6.4.3.6-78.125.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570477" comment="libMagickCore1-32bit-6.4.3.6-78.125.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218229" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178067" ref_url="https://bugzilla.suse.com/1178067" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27560" ref_url="https://www.suse.com/security/cve/CVE-2020-27560/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2020-27560: Fixed potential denial of service in OptimizeLayerFrames function in MagickCore/layer.c (bsc#1178067).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178067">SUSE bug 1178067</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27560/">CVE-2020-27560 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27560">CVE-2020-27560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570478" comment="libMagickCore1-6.4.3.6-78.128.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570479" comment="libMagickCore1-32bit-6.4.3.6-78.128.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218230" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179103" ref_url="https://bugzilla.suse.com/1179103" source="BUGZILLA"/>
		<reference ref_id="1179202" ref_url="https://bugzilla.suse.com/1179202" source="BUGZILLA"/>
		<reference ref_id="1179212" ref_url="https://bugzilla.suse.com/1179212" source="BUGZILLA"/>
		<reference ref_id="1179269" ref_url="https://bugzilla.suse.com/1179269" source="BUGZILLA"/>
		<reference ref_id="1179281" ref_url="https://bugzilla.suse.com/1179281" source="BUGZILLA"/>
		<reference ref_id="1179311" ref_url="https://bugzilla.suse.com/1179311" source="BUGZILLA"/>
		<reference ref_id="1179312" ref_url="https://bugzilla.suse.com/1179312" source="BUGZILLA"/>
		<reference ref_id="1179313" ref_url="https://bugzilla.suse.com/1179313" source="BUGZILLA"/>
		<reference ref_id="1179315" ref_url="https://bugzilla.suse.com/1179315" source="BUGZILLA"/>
		<reference ref_id="1179321" ref_url="https://bugzilla.suse.com/1179321" source="BUGZILLA"/>
		<reference ref_id="1179322" ref_url="https://bugzilla.suse.com/1179322" source="BUGZILLA"/>
		<reference ref_id="1179327" ref_url="https://bugzilla.suse.com/1179327" source="BUGZILLA"/>
		<reference ref_id="1179336" ref_url="https://bugzilla.suse.com/1179336" source="BUGZILLA"/>
		<reference ref_id="1179338" ref_url="https://bugzilla.suse.com/1179338" source="BUGZILLA"/>
		<reference ref_id="1179339" ref_url="https://bugzilla.suse.com/1179339" source="BUGZILLA"/>
		<reference ref_id="1179345" ref_url="https://bugzilla.suse.com/1179345" source="BUGZILLA"/>
		<reference ref_id="1179346" ref_url="https://bugzilla.suse.com/1179346" source="BUGZILLA"/>
		<reference ref_id="1179347" ref_url="https://bugzilla.suse.com/1179347" source="BUGZILLA"/>
		<reference ref_id="1179397" ref_url="https://bugzilla.suse.com/1179397" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-19667" ref_url="https://www.suse.com/security/cve/CVE-2020-19667/" source="CVE"/>
		<reference ref_id="CVE-2020-25664" ref_url="https://www.suse.com/security/cve/CVE-2020-25664/" source="CVE"/>
		<reference ref_id="CVE-2020-25666" ref_url="https://www.suse.com/security/cve/CVE-2020-25666/" source="CVE"/>
		<reference ref_id="CVE-2020-27751" ref_url="https://www.suse.com/security/cve/CVE-2020-27751/" source="CVE"/>
		<reference ref_id="CVE-2020-27752" ref_url="https://www.suse.com/security/cve/CVE-2020-27752/" source="CVE"/>
		<reference ref_id="CVE-2020-27753" ref_url="https://www.suse.com/security/cve/CVE-2020-27753/" source="CVE"/>
		<reference ref_id="CVE-2020-27754" ref_url="https://www.suse.com/security/cve/CVE-2020-27754/" source="CVE"/>
		<reference ref_id="CVE-2020-27755" ref_url="https://www.suse.com/security/cve/CVE-2020-27755/" source="CVE"/>
		<reference ref_id="CVE-2020-27759" ref_url="https://www.suse.com/security/cve/CVE-2020-27759/" source="CVE"/>
		<reference ref_id="CVE-2020-27760" ref_url="https://www.suse.com/security/cve/CVE-2020-27760/" source="CVE"/>
		<reference ref_id="CVE-2020-27761" ref_url="https://www.suse.com/security/cve/CVE-2020-27761/" source="CVE"/>
		<reference ref_id="CVE-2020-27763" ref_url="https://www.suse.com/security/cve/CVE-2020-27763/" source="CVE"/>
		<reference ref_id="CVE-2020-27765" ref_url="https://www.suse.com/security/cve/CVE-2020-27765/" source="CVE"/>
		<reference ref_id="CVE-2020-27767" ref_url="https://www.suse.com/security/cve/CVE-2020-27767/" source="CVE"/>
		<reference ref_id="CVE-2020-27768" ref_url="https://www.suse.com/security/cve/CVE-2020-27768/" source="CVE"/>
		<reference ref_id="CVE-2020-27769" ref_url="https://www.suse.com/security/cve/CVE-2020-27769/" source="CVE"/>
		<reference ref_id="CVE-2020-27771" ref_url="https://www.suse.com/security/cve/CVE-2020-27771/" source="CVE"/>
		<reference ref_id="CVE-2020-27772" ref_url="https://www.suse.com/security/cve/CVE-2020-27772/" source="CVE"/>
		<reference ref_id="CVE-2020-27775" ref_url="https://www.suse.com/security/cve/CVE-2020-27775/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:
	  
- CVE-2020-19667: Fixed a stack buffer overflow in XPM coder could result in a crash (bsc#1179103).
- CVE-2020-25664: Fixed a heap-based buffer overflow in PopShortPixel (bsc#1179202).
- CVE-2020-25666: Fixed an outside the range of representable values of type 'int' and signed integer overflow (bsc#1179212).
- CVE-2020-27751: Fixed an integer overflow in MagickCore/quantum-export.c (bsc#1179269).
- CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h (bsc#1179346).
- CVE-2020-27753: Fixed memory leaks in AcquireMagickMemory function (bsc#1179397).
- CVE-2020-27754: Fixed an outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c (bsc#1179336).
- CVE-2020-27755: Fixed memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c (bsc#1179345).
- CVE-2020-27757: Fixed an outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h (bsc#1179268).
- CVE-2020-27759: Fixed an outside the range of representable values of type 'int' at MagickCore/quantize.c (bsc#1179313).
- CVE-2020-27760: Fixed a division by zero at MagickCore/enhance.c (bsc#1179281).
- CVE-2020-27761: Fixed an outside the range of representable values of type 'unsigned long' at coders/palm.c (bsc#1179315).
- CVE-2020-27763: Fixed a division by zero at MagickCore/resize.c (bsc#1179312).
- CVE-2020-27765: Fixed a division by zero at MagickCore/segment.c (bsc#1179311).
- CVE-2020-27767: Fixed an outside the range of representable values of type 'float' at MagickCore/quantum.h (bsc#1179322).
- CVE-2020-27768: Fixed an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h (bsc#1179339).
- CVE-2020-27769: Fixed an outside the range of representable values of type 'float' at MagickCore/quantize.c (bsc#1179321).
- CVE-2020-27771: Fixed an outside the range of representable values of type 'unsigned char' at coders/pdf.c (bsc#1179327).
- CVE-2020-27772: Fixed an outside the range of representable values of type 'unsigned int' at coders/bmp.c (bsc#1179347).
- CVE-2020-27775: Fixed an outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h (bsc#1179338).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-15"/>
	<updated date="2021-01-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179103">SUSE bug 1179103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179202">SUSE bug 1179202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179212">SUSE bug 1179212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179269">SUSE bug 1179269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179281">SUSE bug 1179281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179311">SUSE bug 1179311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179312">SUSE bug 1179312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179313">SUSE bug 1179313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179315">SUSE bug 1179315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179321">SUSE bug 1179321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179322">SUSE bug 1179322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179327">SUSE bug 1179327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179336">SUSE bug 1179336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179338">SUSE bug 1179338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179339">SUSE bug 1179339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179345">SUSE bug 1179345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179346">SUSE bug 1179346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179347">SUSE bug 1179347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179397">SUSE bug 1179397</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-19667/">CVE-2020-19667 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19667">CVE-2020-19667 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-25664/">CVE-2020-25664 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25664">CVE-2020-25664 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25666/">CVE-2020-25666 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25666">CVE-2020-25666 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27751/">CVE-2020-27751 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27751">CVE-2020-27751 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27752/">CVE-2020-27752 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27752">CVE-2020-27752 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27753/">CVE-2020-27753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27753">CVE-2020-27753 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27754/">CVE-2020-27754 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27754">CVE-2020-27754 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27755/">CVE-2020-27755 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27755">CVE-2020-27755 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27759/">CVE-2020-27759 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27759">CVE-2020-27759 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27760/">CVE-2020-27760 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27760">CVE-2020-27760 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27761/">CVE-2020-27761 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27761">CVE-2020-27761 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27763/">CVE-2020-27763 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27763">CVE-2020-27763 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27765/">CVE-2020-27765 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27765">CVE-2020-27765 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27767/">CVE-2020-27767 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27767">CVE-2020-27767 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27768/">CVE-2020-27768 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27768">CVE-2020-27768 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27769/">CVE-2020-27769 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27769">CVE-2020-27769 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27771/">CVE-2020-27771 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27771">CVE-2020-27771 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27772/">CVE-2020-27772 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27772">CVE-2020-27772 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27775/">CVE-2020-27775 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27775">CVE-2020-27775 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570480" comment="libMagickCore1-6.4.3.6-78.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570481" comment="libMagickCore1-32bit-6.4.3.6-78.135.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218231" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179208" ref_url="https://bugzilla.suse.com/1179208" source="BUGZILLA"/>
		<reference ref_id="1181836" ref_url="https://bugzilla.suse.com/1181836" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25665" ref_url="https://www.suse.com/security/cve/CVE-2020-25665/" source="CVE"/>
		<reference ref_id="CVE-2021-20176" ref_url="https://www.suse.com/security/cve/CVE-2021-20176/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2021-20176: Fixed an issue where processing a crafted file could lead to division by zero (bsc#1181836).
- CVE-2020-25665: Fixed heap-based buffer overflow in WritePALMImage (bsc#1179208).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-23"/>
	<updated date="2021-02-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179208">SUSE bug 1179208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181836">SUSE bug 1181836</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25665/">CVE-2020-25665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25665">CVE-2020-25665 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20176/">CVE-2021-20176 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20176">CVE-2021-20176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570482" comment="libMagickCore1-6.4.3.6-78.140.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570483" comment="libMagickCore1-32bit-6.4.3.6-78.140.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218232" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182325" ref_url="https://bugzilla.suse.com/1182325" source="BUGZILLA"/>
		<reference ref_id="1182336" ref_url="https://bugzilla.suse.com/1182336" source="BUGZILLA"/>
		<reference ref_id="1182337" ref_url="https://bugzilla.suse.com/1182337" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20243" ref_url="https://www.suse.com/security/cve/CVE-2021-20243/" source="CVE"/>
		<reference ref_id="CVE-2021-20244" ref_url="https://www.suse.com/security/cve/CVE-2021-20244/" source="CVE"/>
		<reference ref_id="CVE-2021-20246" ref_url="https://www.suse.com/security/cve/CVE-2021-20246/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2021-20243 [bsc#1182336]: Division by zero in GetResizeFilterWeight in MagickCore/resize.c
- CVE-2021-20244 [bsc#1182325]: Division by zero in ImplodeImage in MagickCore/visual-effects.c
- CVE-2021-20246 [bsc#1182337]: Division by zero in ScaleResampleFilter in MagickCore/resample.c
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-25"/>
	<updated date="2021-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182325">SUSE bug 1182325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182336">SUSE bug 1182336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182337">SUSE bug 1182337</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20243/">CVE-2021-20243 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20243">CVE-2021-20243 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20244/">CVE-2021-20244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20244">CVE-2021-20244 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20246/">CVE-2021-20246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20246">CVE-2021-20246 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570484" comment="libMagickCore1-6.4.3.6-78.143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570485" comment="libMagickCore1-32bit-6.4.3.6-78.143.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218233" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184624" ref_url="https://bugzilla.suse.com/1184624" source="BUGZILLA"/>
		<reference ref_id="1184627" ref_url="https://bugzilla.suse.com/1184627" source="BUGZILLA"/>
		<reference ref_id="1184628" ref_url="https://bugzilla.suse.com/1184628" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20309" ref_url="https://www.suse.com/security/cve/CVE-2021-20309/" source="CVE"/>
		<reference ref_id="CVE-2021-20312" ref_url="https://www.suse.com/security/cve/CVE-2021-20312/" source="CVE"/>
		<reference ref_id="CVE-2021-20313" ref_url="https://www.suse.com/security/cve/CVE-2021-20313/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2021-20309: Division by zero in WaveImage() of MagickCore/visual-effects. (bsc#1184624)
- CVE-2021-20312: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c (bsc#1184627)
- CVE-2021-20313: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c (bsc#1184628)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-20"/>
	<updated date="2021-04-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184624">SUSE bug 1184624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184627">SUSE bug 1184627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184628">SUSE bug 1184628</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20309/">CVE-2021-20309 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20309">CVE-2021-20309 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20312/">CVE-2021-20312 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20312">CVE-2021-20312 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20313/">CVE-2021-20313 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20313">CVE-2021-20313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570486" comment="libMagickCore1-6.4.3.6-78.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570487" comment="libMagickCore1-32bit-6.4.3.6-78.146.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218234" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199350" ref_url="https://bugzilla.suse.com/1199350" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-28463" ref_url="https://www.suse.com/security/cve/CVE-2022-28463/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:
	  
- CVE-2022-28463: Fixed buffer overflow in coders/cin.c (bsc#1199350).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1199350">SUSE bug 1199350</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28463/">CVE-2022-28463 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28463">CVE-2022-28463 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684102" comment="libMagickCore1-6.4.3.6-78.149.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684103" comment="libMagickCore1-32bit-6.4.3.6-78.149.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218235" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1153866" ref_url="https://bugzilla.suse.com/1153866" source="BUGZILLA"/>
		<reference ref_id="1200387" ref_url="https://bugzilla.suse.com/1200387" source="BUGZILLA"/>
		<reference ref_id="1200389" ref_url="https://bugzilla.suse.com/1200389" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17540" ref_url="https://www.suse.com/security/cve/CVE-2019-17540/" source="CVE"/>
		<reference ref_id="CVE-2022-32546" ref_url="https://www.suse.com/security/cve/CVE-2022-32546/" source="CVE"/>
		<reference ref_id="CVE-2022-32547" ref_url="https://www.suse.com/security/cve/CVE-2022-32547/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2019-17540: Fixed heap-based buffer overflow in ReadPSInfo in coders/ps.c. (bsc#1153866)
- CVE-2022-32546: Fixed an outside the range of representable values of type. (bsc#1200389)
- CVE-2022-32547: Fixed a load of misaligned address at MagickCore/property.c. (bsc#1200387)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-10"/>
	<updated date="2022-08-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1153866">SUSE bug 1153866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200387">SUSE bug 1200387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200389">SUSE bug 1200389</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17540/">CVE-2019-17540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-17540">CVE-2019-17540 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-32546/">CVE-2022-32546 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32546">CVE-2022-32546 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32547/">CVE-2022-32547 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32547">CVE-2022-32547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992531" comment="libMagickCore1-6.4.3.6-78.154.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992532" comment="libMagickCore1-32bit-6.4.3.6-78.154.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218236" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1209141" ref_url="https://bugzilla.suse.com/1209141" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1289" ref_url="https://www.suse.com/security/cve/CVE-2023-1289/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2023-1289: Fixed segmentation fault and possible DoS via specially crafted SVG. (bsc#1209141)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-04"/>
	<updated date="2023-04-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209141">SUSE bug 1209141</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1289/">CVE-2023-1289 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1289">CVE-2023-1289 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992533" comment="libMagickCore1-6.4.3.6-78.157.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992534" comment="libMagickCore1-32bit-6.4.3.6-78.157.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218237" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1017711" ref_url="https://bugzilla.suse.com/1017711" source="BUGZILLA"/>
		<reference ref_id="1017712" ref_url="https://bugzilla.suse.com/1017712" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9941" ref_url="https://www.suse.com/security/cve/CVE-2016-9941/" source="CVE"/>
		<reference ref_id="CVE-2016-9942" ref_url="https://www.suse.com/security/cve/CVE-2016-9942/" source="CVE"/>
		<description>

LibVNCServer was updated to fix two security issues.

These security issues were fixed:

- CVE-2016-9941: Heap-based buffer overflow in rfbproto.c allowed remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message containing a subrectangle outside of the client drawing area (bsc#1017711)
- CVE-2016-9942: Heap-based buffer overflow in ultra.c allowed remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message with the Ultra type tile, such that the LZO payload decompressed length exceeds what is specified by the tile dimensions (bsc#1017712)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1017711">SUSE bug 1017711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017712">SUSE bug 1017712</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9941/">CVE-2016-9941 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9941">CVE-2016-9941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9942/">CVE-2016-9942 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9942">CVE-2016-9942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570488" comment="LibVNCServer-0.9.1-159.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218238" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1081493" ref_url="https://bugzilla.suse.com/1081493" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7225" ref_url="https://www.suse.com/security/cve/CVE-2018-7225/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2018-7225: Missing input sanitization inside rfbserver.c rfbProcessClientNormalMessage() (bsc#1081493).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-05"/>
	<updated date="2018-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081493">SUSE bug 1081493</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7225/">CVE-2018-7225 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7225">CVE-2018-7225 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570489" comment="LibVNCServer-0.9.1-160.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218239" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1120114" ref_url="https://bugzilla.suse.com/1120114" source="BUGZILLA"/>
		<reference ref_id="1120115" ref_url="https://bugzilla.suse.com/1120115" source="BUGZILLA"/>
		<reference ref_id="1120116" ref_url="https://bugzilla.suse.com/1120116" source="BUGZILLA"/>
		<reference ref_id="1120117" ref_url="https://bugzilla.suse.com/1120117" source="BUGZILLA"/>
		<reference ref_id="1120118" ref_url="https://bugzilla.suse.com/1120118" source="BUGZILLA"/>
		<reference ref_id="1120120" ref_url="https://bugzilla.suse.com/1120120" source="BUGZILLA"/>
		<reference ref_id="1120121" ref_url="https://bugzilla.suse.com/1120121" source="BUGZILLA"/>
		<reference ref_id="1120122" ref_url="https://bugzilla.suse.com/1120122" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15126" ref_url="https://www.suse.com/security/cve/CVE-2018-15126/" source="CVE"/>
		<reference ref_id="CVE-2018-15127" ref_url="https://www.suse.com/security/cve/CVE-2018-15127/" source="CVE"/>
		<reference ref_id="CVE-2018-20019" ref_url="https://www.suse.com/security/cve/CVE-2018-20019/" source="CVE"/>
		<reference ref_id="CVE-2018-20020" ref_url="https://www.suse.com/security/cve/CVE-2018-20020/" source="CVE"/>
		<reference ref_id="CVE-2018-20021" ref_url="https://www.suse.com/security/cve/CVE-2018-20021/" source="CVE"/>
		<reference ref_id="CVE-2018-20022" ref_url="https://www.suse.com/security/cve/CVE-2018-20022/" source="CVE"/>
		<reference ref_id="CVE-2018-20024" ref_url="https://www.suse.com/security/cve/CVE-2018-20024/" source="CVE"/>
		<reference ref_id="CVE-2018-6307" ref_url="https://www.suse.com/security/cve/CVE-2018-6307/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005030.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

Security issues fixed:

- CVE-2018-15126: Fixed use-after-free in file transfer extension (bsc#1120114)
- CVE-2018-6307: Fixed use-after-free in file transfer extension server code (bsc#1120115)
- CVE-2018-20020: Fixed heap out-of-bound write inside structure in VNC client code (bsc#1120116)
- CVE-2018-15127: Fixed heap out-of-bounds write in rfbserver.c (bsc#1120117)
- CVE-2018-20019: Fixed multiple heap out-of-bound writes in VNC client code (bsc#1120118)
- CVE-2018-20022: Fixed information disclosure through improper initialization in VNC client code (bsc#1120120)
- CVE-2018-20024: Fixed NULL pointer dereference in VNC client code (bsc#1120121)
- CVE-2018-20021: Fixed infinite loop in VNC client code (bsc#1120122)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-11"/>
	<updated date="2019-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120114">SUSE bug 1120114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120115">SUSE bug 1120115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120116">SUSE bug 1120116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120117">SUSE bug 1120117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120118">SUSE bug 1120118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120120">SUSE bug 1120120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120121">SUSE bug 1120121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120122">SUSE bug 1120122</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15126/">CVE-2018-15126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15126">CVE-2018-15126 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15127/">CVE-2018-15127 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15127">CVE-2018-15127 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20019/">CVE-2018-20019 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20019">CVE-2018-20019 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20020/">CVE-2018-20020 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20020">CVE-2018-20020 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20021/">CVE-2018-20021 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20021">CVE-2018-20021 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20022/">CVE-2018-20022 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20022">CVE-2018-20022 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20024/">CVE-2018-20024 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20024">CVE-2018-20024 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6307/">CVE-2018-6307 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6307">CVE-2018-6307 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577124" comment="LibVNCServer-0.9.1-160.6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577124" comment="LibVNCServer-0.9.1-160.6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218240" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1123823" ref_url="https://bugzilla.suse.com/1123823" source="BUGZILLA"/>
		<reference ref_id="1123828" ref_url="https://bugzilla.suse.com/1123828" source="BUGZILLA"/>
		<reference ref_id="1123832" ref_url="https://bugzilla.suse.com/1123832" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20748" ref_url="https://www.suse.com/security/cve/CVE-2018-20748/" source="CVE"/>
		<reference ref_id="CVE-2018-20749" ref_url="https://www.suse.com/security/cve/CVE-2018-20749/" source="CVE"/>
		<reference ref_id="CVE-2018-20750" ref_url="https://www.suse.com/security/cve/CVE-2018-20750/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

Security issues fixed:

- CVE-2018-20749: Fixed a heap out of bounds write vulnerability in rfbserver.c (bsc#1123828)
- CVE-2018-20750: Fixed a heap out of bounds write vulnerability in rfbserver.c (bsc#1123832)
- CVE-2018-20748: Fixed multiple heap out-of-bound writes in VNC client code (bsc#1123823)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-12"/>
	<updated date="2019-02-12"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1123823">SUSE bug 1123823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123828">SUSE bug 1123828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123832">SUSE bug 1123832</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20748/">CVE-2018-20748 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20748">CVE-2018-20748 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20749/">CVE-2018-20749 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20749">CVE-2018-20749 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20750/">CVE-2018-20750 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20750">CVE-2018-20750 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570491" comment="LibVNCServer-0.9.1-160.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218241" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1155419" ref_url="https://bugzilla.suse.com/1155419" source="BUGZILLA"/>
		<reference ref_id="1160471" ref_url="https://bugzilla.suse.com/1160471" source="BUGZILLA"/>
		<reference ref_id="1170441" ref_url="https://bugzilla.suse.com/1170441" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681/" source="CVE"/>
		<reference ref_id="CVE-2019-15690" ref_url="https://www.suse.com/security/cve/CVE-2019-15690/" source="CVE"/>
		<reference ref_id="CVE-2019-20788" ref_url="https://www.suse.com/security/cve/CVE-2019-20788/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2019-15690: Fixed a heap buffer overflow (bsc#1160471).
- CVE-2019-15681: Fixed a memory leak which could have allowed to a remote attacker to read stack memory (bsc#1155419).
- CVE-2019-20788: Fixed a integer overflow and heap-based buffer overflow via a large height or width value (bsc#1170441).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-04"/>
	<updated date="2020-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155419">SUSE bug 1155419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160471">SUSE bug 1160471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170441">SUSE bug 1170441</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15681">CVE-2019-15681 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15690/">CVE-2019-15690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15690">CVE-2019-15690 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20788/">CVE-2019-20788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20788">CVE-2019-20788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570492" comment="LibVNCServer-0.9.1-160.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218242" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1173691" ref_url="https://bugzilla.suse.com/1173691" source="BUGZILLA"/>
		<reference ref_id="1173694" ref_url="https://bugzilla.suse.com/1173694" source="BUGZILLA"/>
		<reference ref_id="1173700" ref_url="https://bugzilla.suse.com/1173700" source="BUGZILLA"/>
		<reference ref_id="1173701" ref_url="https://bugzilla.suse.com/1173701" source="BUGZILLA"/>
		<reference ref_id="1173743" ref_url="https://bugzilla.suse.com/1173743" source="BUGZILLA"/>
		<reference ref_id="1173880" ref_url="https://bugzilla.suse.com/1173880" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14397" ref_url="https://www.suse.com/security/cve/CVE-2020-14397/" source="CVE"/>
		<reference ref_id="CVE-2020-14398" ref_url="https://www.suse.com/security/cve/CVE-2020-14398/" source="CVE"/>
		<reference ref_id="CVE-2020-14399" ref_url="https://www.suse.com/security/cve/CVE-2020-14399/" source="CVE"/>
		<reference ref_id="CVE-2020-14400" ref_url="https://www.suse.com/security/cve/CVE-2020-14400/" source="CVE"/>
		<reference ref_id="CVE-2020-14401" ref_url="https://www.suse.com/security/cve/CVE-2020-14401/" source="CVE"/>
		<reference ref_id="CVE-2020-14402" ref_url="https://www.suse.com/security/cve/CVE-2020-14402/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

- security update
- added patches
  fix CVE-2020-14398 [bsc#1173880], improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c
  + LibVNCServer-CVE-2020-14398.patch
  fix CVE-2020-14397 [bsc#1173700], NULL pointer dereference in libvncserver/rfbregion.c
  + LibVNCServer-CVE-2020-14397.patch
  fix CVE-2020-14399 [bsc#1173743], Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c.
  + LibVNCServer-CVE-2020-14399.patch
  fix CVE-2020-14400 [bsc#1173691], Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c.
  + LibVNCServer-CVE-2020-14400.patch
  fix CVE-2020-14401 [bsc#1173694], potential integer overflows in libvncserver/scale.c
  + LibVNCServer-CVE-2020-14401.patch
  fix CVE-2020-14402 [bsc#1173701], out-of-bounds access via encodings.
  + LibVNCServer-CVE-2020-14402,14403,14404.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-17"/>
	<updated date="2020-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173691">SUSE bug 1173691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173694">SUSE bug 1173694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173700">SUSE bug 1173700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173701">SUSE bug 1173701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173743">SUSE bug 1173743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173880">SUSE bug 1173880</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14397/">CVE-2020-14397 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14397">CVE-2020-14397 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14398/">CVE-2020-14398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14398">CVE-2020-14398 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14399/">CVE-2020-14399 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14399">CVE-2020-14399 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14400/">CVE-2020-14400 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14400">CVE-2020-14400 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14401/">CVE-2020-14401 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14401">CVE-2020-14401 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14402/">CVE-2020-14402 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14402">CVE-2020-14402 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570493" comment="LibVNCServer-0.9.1-160.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218243" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178682" ref_url="https://bugzilla.suse.com/1178682" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25708" ref_url="https://www.suse.com/security/cve/CVE-2020-25708/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2020-25708 [bsc#1178682], libvncserver/rfbserver.c has a divide by zero which could result in DoS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-26"/>
	<updated date="2020-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178682">SUSE bug 1178682</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-25708/">CVE-2020-25708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25708">CVE-2020-25708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570494" comment="LibVNCServer-0.9.1-160.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218244" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1203106" ref_url="https://bugzilla.suse.com/1203106" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29260" ref_url="https://www.suse.com/security/cve/CVE-2020-29260/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2020-29260: Fixed memory leakage via rfbClientCleanup() (bsc#1203106).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-06"/>
	<updated date="2022-10-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203106">SUSE bug 1203106</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-29260/">CVE-2020-29260 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29260">CVE-2020-29260 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992535" comment="LibVNCServer-0.9.1-160.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218245" version="1" class="patch">
	<metadata>
		<title>Recommended update for Mesa</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="828007" ref_url="https://bugzilla.suse.com/828007" source="BUGZILLA"/>
		<reference ref_id="838893" ref_url="https://bugzilla.suse.com/838893" source="BUGZILLA"/>
		<reference ref_id="874107" ref_url="https://bugzilla.suse.com/874107" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1872" ref_url="https://www.suse.com/security/cve/CVE-2013-1872/" source="CVE"/>
		<description>

This update for Mesa provides the following fixes:

    * Re-enable build and packaging of OSMesa libs. (bnc#874107)
    * Build against fixed llvm, addressing a problem that prevented X from
      starting on some VIA cpus. (bnc#838893)

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-12"/>
	<updated date="2014-08-12"/>
	<bugzilla href="https://bugzilla.suse.com/828007">SUSE bug 828007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/838893">SUSE bug 838893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/874107">SUSE bug 874107</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1872/">CVE-2013-1872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1872">CVE-2013-1872 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992536" comment="Mesa-9.0.3-0.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591120" comment="Mesa-32bit-9.0.3-0.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591121" comment="Mesa-x86-9.0.3-0.27.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992536" comment="Mesa-9.0.3-0.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591120" comment="Mesa-32bit-9.0.3-0.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591121" comment="Mesa-x86-9.0.3-0.27.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992536" comment="Mesa-9.0.3-0.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591120" comment="Mesa-32bit-9.0.3-0.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591121" comment="Mesa-x86-9.0.3-0.27.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218246" version="1" class="patch">
	<metadata>
		<title>Security update for Mesa (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1156015" ref_url="https://bugzilla.suse.com/1156015" source="BUGZILLA"/>
		<reference ref_id="985650" ref_url="https://bugzilla.suse.com/985650" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5068" ref_url="https://www.suse.com/security/cve/CVE-2019-5068/" source="CVE"/>
		<description>
This update for Mesa fixes the following issues:

Security issue fixed:

- CVE-2019-5068: Fixed exploitable shared memory permissions vulnerability (bsc#1156015).

Bug fixes:

- Initialize AMD RSxxx chipsets correctly, fixing corruption of the graphical login screen (bsc#985650).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-30"/>
	<updated date="2020-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1156015">SUSE bug 1156015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985650">SUSE bug 985650</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-5068/">CVE-2019-5068 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5068">CVE-2019-5068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577125" comment="Mesa-9.0.3-0.29.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577126" comment="Mesa-32bit-9.0.3-0.29.5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218247" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="833389" ref_url="https://bugzilla.suse.com/833389" source="BUGZILLA"/>
		<reference ref_id="840485" ref_url="https://bugzilla.suse.com/840485" source="BUGZILLA"/>
		<reference ref_id="916196" ref_url="https://bugzilla.suse.com/916196" source="BUGZILLA"/>
		<reference ref_id="917100" ref_url="https://bugzilla.suse.com/917100" source="BUGZILLA"/>
		<reference ref_id="917300" ref_url="https://bugzilla.suse.com/917300" source="BUGZILLA"/>
		<reference ref_id="917597" ref_url="https://bugzilla.suse.com/917597" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1701" ref_url="https://www.suse.com/security/cve/CVE-2013-1701/" source="CVE"/>
		<reference ref_id="CVE-2013-1702" ref_url="https://www.suse.com/security/cve/CVE-2013-1702/" source="CVE"/>
		<reference ref_id="CVE-2013-1705" ref_url="https://www.suse.com/security/cve/CVE-2013-1705/" source="CVE"/>
		<reference ref_id="CVE-2013-1706" ref_url="https://www.suse.com/security/cve/CVE-2013-1706/" source="CVE"/>
		<reference ref_id="CVE-2013-1707" ref_url="https://www.suse.com/security/cve/CVE-2013-1707/" source="CVE"/>
		<reference ref_id="CVE-2013-1709" ref_url="https://www.suse.com/security/cve/CVE-2013-1709/" source="CVE"/>
		<reference ref_id="CVE-2013-1710" ref_url="https://www.suse.com/security/cve/CVE-2013-1710/" source="CVE"/>
		<reference ref_id="CVE-2013-1712" ref_url="https://www.suse.com/security/cve/CVE-2013-1712/" source="CVE"/>
		<reference ref_id="CVE-2013-1713" ref_url="https://www.suse.com/security/cve/CVE-2013-1713/" source="CVE"/>
		<reference ref_id="CVE-2013-1714" ref_url="https://www.suse.com/security/cve/CVE-2013-1714/" source="CVE"/>
		<reference ref_id="CVE-2013-1717" ref_url="https://www.suse.com/security/cve/CVE-2013-1717/" source="CVE"/>
		<reference ref_id="CVE-2013-1718" ref_url="https://www.suse.com/security/cve/CVE-2013-1718/" source="CVE"/>
		<reference ref_id="CVE-2013-1722" ref_url="https://www.suse.com/security/cve/CVE-2013-1722/" source="CVE"/>
		<reference ref_id="CVE-2013-1725" ref_url="https://www.suse.com/security/cve/CVE-2013-1725/" source="CVE"/>
		<reference ref_id="CVE-2013-1726" ref_url="https://www.suse.com/security/cve/CVE-2013-1726/" source="CVE"/>
		<reference ref_id="CVE-2013-1730" ref_url="https://www.suse.com/security/cve/CVE-2013-1730/" source="CVE"/>
		<reference ref_id="CVE-2013-1732" ref_url="https://www.suse.com/security/cve/CVE-2013-1732/" source="CVE"/>
		<reference ref_id="CVE-2013-1735" ref_url="https://www.suse.com/security/cve/CVE-2013-1735/" source="CVE"/>
		<reference ref_id="CVE-2013-1736" ref_url="https://www.suse.com/security/cve/CVE-2013-1736/" source="CVE"/>
		<reference ref_id="CVE-2013-1737" ref_url="https://www.suse.com/security/cve/CVE-2013-1737/" source="CVE"/>
		<reference ref_id="CVE-2015-0822" ref_url="https://www.suse.com/security/cve/CVE-2015-0822/" source="CVE"/>
		<reference ref_id="CVE-2015-0827" ref_url="https://www.suse.com/security/cve/CVE-2015-0827/" source="CVE"/>
		<reference ref_id="CVE-2015-0831" ref_url="https://www.suse.com/security/cve/CVE-2015-0831/" source="CVE"/>
		<reference ref_id="CVE-2015-0836" ref_url="https://www.suse.com/security/cve/CVE-2015-0836/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001272.html" source="SUSE-SU"/>
		<description>

This update to Firefox 17.0.9esr (bnc#840485) addresses:

    * MFSA 2013-91 User-defined properties on DOM proxies get the wrong
      'this' object
          o (CVE-2013-1737)
    * MFSA 2013-90 Memory corruption involving scrolling
          o use-after-free in mozilla::layout::ScrollbarActivity
            (CVE-2013-1735)
          o Memory corruption in nsGfxScrollFrameInner::IsLTR()
            (CVE-2013-1736)
    * MFSA 2013-89 Buffer overflow with multi-column, lists, and floats
          o buffer overflow at nsFloatManager::GetFlowArea() with multicol,
            list, floats (CVE-2013-1732)
    * MFSA 2013-88 compartment mismatch re-attaching XBL-backed nodes
          o compartment mismatch in nsXBLBinding::DoInitJSClass
            (CVE-2013-1730)
    * MFSA 2013-83 Mozilla Updater does not lock MAR file after signature
      verification
          o MAR signature bypass in Updater could lead to downgrade
            (CVE-2013-1726)
    * MFSA 2013-82 Calling scope for new Javascript objects can lead to
      memory corruption
          o ABORT: bad scope for new JSObjects: ReparentWrapper /
            document.open (CVE-2013-1725)
    * MFSA 2013-79 Use-after-free in Animation Manager during stylesheet
      cloning
          o Heap-use-after-free in nsAnimationManager::BuildAnimations
            (CVE-2013-1722)
    * MFSA 2013-76 Miscellaneous memory safety hazards (rv:24.0 /
      rv:17.0.9)
          o Memory safety bugs fixed in Firefox 17.0.9 and Firefox 24.0
            (CVE-2013-1718)
    * MFSA 2013-65 Buffer underflow when generating CRMF requests
          o ASAN heap-buffer-overflow (read 1) in
            cryptojs_interpret_key_gen_type (CVE-2013-1705)

Security Issue references:

    * CVE-2013-1737
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737&gt;
    * CVE-2013-1735
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735&gt;
    * CVE-2013-1736
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736&gt;
    * CVE-2013-1732
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732&gt;
    * CVE-2013-1730
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730&gt;
    * CVE-2013-1726
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1726&gt;
    * CVE-2013-1725
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725&gt;
    * CVE-2013-1722
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722&gt;
    * CVE-2013-1718
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718&gt;
    * CVE-2013-1705
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1705&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-19"/>
	<updated date="2013-09-19"/>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916196">SUSE bug 916196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917100">SUSE bug 917100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917300">SUSE bug 917300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1701/">CVE-2013-1701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1701">CVE-2013-1701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1702/">CVE-2013-1702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1702">CVE-2013-1702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1705/">CVE-2013-1705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1705">CVE-2013-1705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1706/">CVE-2013-1706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1706">CVE-2013-1706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1707/">CVE-2013-1707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1707">CVE-2013-1707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1709/">CVE-2013-1709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1709">CVE-2013-1709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1710/">CVE-2013-1710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1710">CVE-2013-1710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1712/">CVE-2013-1712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1712">CVE-2013-1712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1713/">CVE-2013-1713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1713">CVE-2013-1713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1714/">CVE-2013-1714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1714">CVE-2013-1714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1717/">CVE-2013-1717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1717">CVE-2013-1717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1718/">CVE-2013-1718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1718">CVE-2013-1718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1722/">CVE-2013-1722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1722">CVE-2013-1722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1725/">CVE-2013-1725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1725">CVE-2013-1725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1726/">CVE-2013-1726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1726">CVE-2013-1726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1730/">CVE-2013-1730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1730">CVE-2013-1730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1732/">CVE-2013-1732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1732">CVE-2013-1732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1735/">CVE-2013-1735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1735">CVE-2013-1735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1736/">CVE-2013-1736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1736">CVE-2013-1736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1737/">CVE-2013-1737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1737">CVE-2013-1737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0822/">CVE-2015-0822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0822">CVE-2015-0822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0827/">CVE-2015-0827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0827">CVE-2015-0827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0831/">CVE-2015-0831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0831">CVE-2015-0831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0836/">CVE-2015-0836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0836">CVE-2015-0836 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577127" comment="MozillaFirefox-17.0.9esr-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577128" comment="MozillaFirefox-translations-17.0.9esr-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577127" comment="MozillaFirefox-17.0.9esr-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577128" comment="MozillaFirefox-translations-17.0.9esr-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577127" comment="MozillaFirefox-17.0.9esr-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577128" comment="MozillaFirefox-translations-17.0.9esr-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218248" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="940918" ref_url="https://bugzilla.suse.com/940918" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001539.html" source="SUSE-SU"/>
		<description>

This security update (bsc#940918) fixes the following issues:
  * MFSA 2015-78 (CVE-2015-4495, bmo#1178058): Same origin violation
  * Remove PlayPreview registration from PDF Viewer (bmo#1179262)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-12"/>
	<updated date="2015-08-12"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/940918">SUSE bug 940918</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4495">CVE-2015-4495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577129" comment="MozillaFirefox-31.8.0esr-0.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577130" comment="MozillaFirefox-translations-31.8.0esr-0.13.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577129" comment="MozillaFirefox-31.8.0esr-0.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577130" comment="MozillaFirefox-translations-31.8.0esr-0.13.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577129" comment="MozillaFirefox-31.8.0esr-0.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577130" comment="MozillaFirefox-translations-31.8.0esr-0.13.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218249" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="959277" ref_url="https://bugzilla.suse.com/959277" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7202" ref_url="https://www.suse.com/security/cve/CVE-2015-7202/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001748.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to version 38.5.0 esr to fix the following issues: 

Following security issues were fixed:
* MFSA 2015-134/CVE-2015-7201/CVE-2015-7202
  Miscellaneous memory safety hazards (rv:43.0 / rv:38.5)
* MFSA 2015-138/CVE-2015-7210
  Use-after-free in WebRTC when datachannel is used after being
  destroyed
* MFSA 2015-139/CVE-2015-7212
  Integer overflow allocating extremely large textures
* MFSA 2015-145/CVE-2015-7205
  Underflow through code inspection
* MFSA 2015-146/CVE-2015-7213
  Integer overflow in MP4 playback in 64-bit versions
* MFSA 2015-147/CVE-2015-7222
  Integer underflow and buffer overflow processing MP4 metadata
  in libstagefright
* MFSA 2015-149/CVE-2015-7214
  Cross-site reading attack through data and view-source URIs
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-21"/>
	<updated date="2015-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7201">CVE-2015-7201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7202/">CVE-2015-7202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7202">CVE-2015-7202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7205">CVE-2015-7205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7210">CVE-2015-7210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7212">CVE-2015-7212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7213">CVE-2015-7213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7214">CVE-2015-7214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7222">CVE-2015-7222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577131" comment="MozillaFirefox-38.5.0esr-28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577132" comment="MozillaFirefox-translations-38.5.0esr-28.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577131" comment="MozillaFirefox-38.5.0esr-28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577132" comment="MozillaFirefox-translations-38.5.0esr-28.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577131" comment="MozillaFirefox-38.5.0esr-28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577132" comment="MozillaFirefox-translations-38.5.0esr-28.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218250" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="967087" ref_url="https://bugzilla.suse.com/967087" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523/" source="CVE"/>
		<description>

This update for MozillaFirefox fixes the following issues: 

- update to Firefox 38.6.1 ESR (bsc#967087)
  * MFSA 2016-14/CVE-2016-1523
    (bmo#1246093)
    Vulnerabilities in Graphite 2
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-24"/>
	<updated date="2016-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/967087">SUSE bug 967087</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1523">CVE-2016-1523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577133" comment="MozillaFirefox-38.6.1esr-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577134" comment="MozillaFirefox-translations-38.6.1esr-34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218251" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="977333" ref_url="https://bugzilla.suse.com/977333" source="BUGZILLA"/>
		<reference ref_id="977374" ref_url="https://bugzilla.suse.com/977374" source="BUGZILLA"/>
		<reference ref_id="977376" ref_url="https://bugzilla.suse.com/977376" source="BUGZILLA"/>
		<reference ref_id="977381" ref_url="https://bugzilla.suse.com/977381" source="BUGZILLA"/>
		<reference ref_id="977386" ref_url="https://bugzilla.suse.com/977386" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2805" ref_url="https://www.suse.com/security/cve/CVE-2016-2805/" source="CVE"/>
		<reference ref_id="CVE-2016-2807" ref_url="https://www.suse.com/security/cve/CVE-2016-2807/" source="CVE"/>
		<reference ref_id="CVE-2016-2808" ref_url="https://www.suse.com/security/cve/CVE-2016-2808/" source="CVE"/>
		<reference ref_id="CVE-2016-2814" ref_url="https://www.suse.com/security/cve/CVE-2016-2814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002077.html" source="SUSE-SU"/>
		<description>
This update to MozillaFirefox 38.8.0 ESR fixes the following security issues (bsc#977333):

- CVE-2016-2805: Miscellaneous memory safety hazards - MFSA 2016-39 (bsc#977374)
- CVE-2016-2807: Miscellaneous memory safety hazards - MFSA 2016-39 (bsc#977376)
- CVE-2016-2808: Write to invalid HashMap entry through JavaScript.watch() - MFSA 2016-47 (bsc#977386)
- CVE-2016-2814: Buffer overflow in libstagefright with CENC offsets - MFSA 2016-44 (bsc#977381)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-20"/>
	<updated date="2016-05-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977374">SUSE bug 977374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977376">SUSE bug 977376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977381">SUSE bug 977381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977386">SUSE bug 977386</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2805/">CVE-2016-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2805">CVE-2016-2805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2807/">CVE-2016-2807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2807">CVE-2016-2807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2808/">CVE-2016-2808 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2808">CVE-2016-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2814/">CVE-2016-2814 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2814">CVE-2016-2814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577135" comment="MozillaFirefox-38.8.0esr-40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577136" comment="MozillaFirefox-translations-38.8.0esr-40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577137" comment="libfreebl3-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577138" comment="libfreebl3-32bit-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577139" comment="libsoftokn3-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577140" comment="libsoftokn3-32bit-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577141" comment="mozilla-nspr-4.12-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577142" comment="mozilla-nspr-32bit-4.12-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577143" comment="mozilla-nss-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577144" comment="mozilla-nss-32bit-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577145" comment="mozilla-nss-tools-3.20.2-30.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577135" comment="MozillaFirefox-38.8.0esr-40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577136" comment="MozillaFirefox-translations-38.8.0esr-40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577137" comment="libfreebl3-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577138" comment="libfreebl3-32bit-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577139" comment="libsoftokn3-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577140" comment="libsoftokn3-32bit-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577141" comment="mozilla-nspr-4.12-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577142" comment="mozilla-nspr-32bit-4.12-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577143" comment="mozilla-nss-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577144" comment="mozilla-nss-32bit-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577145" comment="mozilla-nss-tools-3.20.2-30.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218252" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLE and mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="983549" ref_url="https://bugzilla.suse.com/983549" source="BUGZILLA"/>
		<reference ref_id="983638" ref_url="https://bugzilla.suse.com/983638" source="BUGZILLA"/>
		<reference ref_id="983639" ref_url="https://bugzilla.suse.com/983639" source="BUGZILLA"/>
		<reference ref_id="983643" ref_url="https://bugzilla.suse.com/983643" source="BUGZILLA"/>
		<reference ref_id="983646" ref_url="https://bugzilla.suse.com/983646" source="BUGZILLA"/>
		<reference ref_id="983651" ref_url="https://bugzilla.suse.com/983651" source="BUGZILLA"/>
		<reference ref_id="983652" ref_url="https://bugzilla.suse.com/983652" source="BUGZILLA"/>
		<reference ref_id="983653" ref_url="https://bugzilla.suse.com/983653" source="BUGZILLA"/>
		<reference ref_id="983655" ref_url="https://bugzilla.suse.com/983655" source="BUGZILLA"/>
		<reference ref_id="984006" ref_url="https://bugzilla.suse.com/984006" source="BUGZILLA"/>
		<reference ref_id="985659" ref_url="https://bugzilla.suse.com/985659" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2815" ref_url="https://www.suse.com/security/cve/CVE-2016-2815/" source="CVE"/>
		<reference ref_id="CVE-2016-2818" ref_url="https://www.suse.com/security/cve/CVE-2016-2818/" source="CVE"/>
		<reference ref_id="CVE-2016-2819" ref_url="https://www.suse.com/security/cve/CVE-2016-2819/" source="CVE"/>
		<reference ref_id="CVE-2016-2821" ref_url="https://www.suse.com/security/cve/CVE-2016-2821/" source="CVE"/>
		<reference ref_id="CVE-2016-2822" ref_url="https://www.suse.com/security/cve/CVE-2016-2822/" source="CVE"/>
		<reference ref_id="CVE-2016-2824" ref_url="https://www.suse.com/security/cve/CVE-2016-2824/" source="CVE"/>
		<reference ref_id="CVE-2016-2828" ref_url="https://www.suse.com/security/cve/CVE-2016-2828/" source="CVE"/>
		<reference ref_id="CVE-2016-2831" ref_url="https://www.suse.com/security/cve/CVE-2016-2831/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002156.html" source="SUSE-SU"/>
		<description>
MozillaFirefox, MozillaFirefox-branding-SLE and  mozilla-nss were updated to fix nine security issues.

MozillaFirefox was updated to version 45.2.0 ESR. mozilla-nss was updated to version 3.21.1.

These security issues were fixed:
- CVE-2016-2834: Memory safety bugs in NSS (MFSA 2016-61) (bsc#983639).
- CVE-2016-2824: Out-of-bounds write with WebGL shader (MFSA 2016-53) (bsc#983651).
- CVE-2016-2822: Addressbar spoofing though the SELECT element (MFSA 2016-52) (bsc#983652).
- CVE-2016-2821: Use-after-free deleting tables from a contenteditable document (MFSA 2016-51) (bsc#983653).
- CVE-2016-2819: Buffer overflow parsing HTML5 fragments (MFSA 2016-50) (bsc#983655).
- CVE-2016-2828: Use-after-free when textures are used in WebGL operations after recycle pool destruction (MFSA 2016-56) (bsc#983646).
- CVE-2016-2831: Entering fullscreen and persistent pointerlock without user permission (MFSA 2016-58) (bsc#983643).
- CVE-2016-2815, CVE-2016-2818: Miscellaneous memory safety hazards (MFSA 2016-49) (bsc#983638)

These non-security issues were fixed:
- Fix crashes on aarch64
  * Determine page size at runtime (bsc#984006)
  * Allow aarch64 to work in safe mode (bsc#985659)
- Fix crashes on mainframes

All extensions must now be signed by addons.mozilla.org. Please read README.SUSE for more details.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-14"/>
	<updated date="2016-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983638">SUSE bug 983638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983639">SUSE bug 983639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983643">SUSE bug 983643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983646">SUSE bug 983646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983651">SUSE bug 983651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983652">SUSE bug 983652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983653">SUSE bug 983653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983655">SUSE bug 983655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984006">SUSE bug 984006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985659">SUSE bug 985659</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2815/">CVE-2016-2815 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2815">CVE-2016-2815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2818/">CVE-2016-2818 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2818">CVE-2016-2818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2819/">CVE-2016-2819 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2819">CVE-2016-2819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2821/">CVE-2016-2821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2821">CVE-2016-2821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2822/">CVE-2016-2822 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2822">CVE-2016-2822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2824/">CVE-2016-2824 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2824">CVE-2016-2824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2828/">CVE-2016-2828 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2828">CVE-2016-2828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2831/">CVE-2016-2831 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2831">CVE-2016-2831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2834">CVE-2016-2834 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577146" comment="MozillaFirefox-45.2.0esr-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577147" comment="MozillaFirefox-branding-SLED-45.0-23.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577148" comment="MozillaFirefox-translations-45.2.0esr-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577149" comment="firefox-fontconfig-2.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577150" comment="libfreebl3-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577151" comment="libfreebl3-32bit-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577152" comment="libsoftokn3-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577153" comment="libsoftokn3-32bit-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577154" comment="mozilla-nspr-4.12-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577155" comment="mozilla-nspr-32bit-4.12-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577156" comment="mozilla-nss-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577157" comment="mozilla-nss-32bit-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577158" comment="mozilla-nss-tools-3.21.1-35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577146" comment="MozillaFirefox-45.2.0esr-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577147" comment="MozillaFirefox-branding-SLED-45.0-23.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577148" comment="MozillaFirefox-translations-45.2.0esr-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577149" comment="firefox-fontconfig-2.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577150" comment="libfreebl3-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577151" comment="libfreebl3-32bit-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577152" comment="libsoftokn3-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577153" comment="libsoftokn3-32bit-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577154" comment="mozilla-nspr-4.12-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577155" comment="mozilla-nspr-32bit-4.12-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577156" comment="mozilla-nss-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577157" comment="mozilla-nss-32bit-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577158" comment="mozilla-nss-tools-3.21.1-35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218253" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="989196" ref_url="https://bugzilla.suse.com/989196" source="BUGZILLA"/>
		<reference ref_id="990628" ref_url="https://bugzilla.suse.com/990628" source="BUGZILLA"/>
		<reference ref_id="990856" ref_url="https://bugzilla.suse.com/990856" source="BUGZILLA"/>
		<reference ref_id="991809" ref_url="https://bugzilla.suse.com/991809" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-2835" ref_url="https://www.suse.com/security/cve/CVE-2016-2835/" source="CVE"/>
		<reference ref_id="CVE-2016-2836" ref_url="https://www.suse.com/security/cve/CVE-2016-2836/" source="CVE"/>
		<reference ref_id="CVE-2016-2837" ref_url="https://www.suse.com/security/cve/CVE-2016-2837/" source="CVE"/>
		<reference ref_id="CVE-2016-2838" ref_url="https://www.suse.com/security/cve/CVE-2016-2838/" source="CVE"/>
		<reference ref_id="CVE-2016-2839" ref_url="https://www.suse.com/security/cve/CVE-2016-2839/" source="CVE"/>
		<reference ref_id="CVE-2016-5252" ref_url="https://www.suse.com/security/cve/CVE-2016-5252/" source="CVE"/>
		<reference ref_id="CVE-2016-5254" ref_url="https://www.suse.com/security/cve/CVE-2016-5254/" source="CVE"/>
		<reference ref_id="CVE-2016-5258" ref_url="https://www.suse.com/security/cve/CVE-2016-5258/" source="CVE"/>
		<reference ref_id="CVE-2016-5259" ref_url="https://www.suse.com/security/cve/CVE-2016-5259/" source="CVE"/>
		<reference ref_id="CVE-2016-5262" ref_url="https://www.suse.com/security/cve/CVE-2016-5262/" source="CVE"/>
		<reference ref_id="CVE-2016-5263" ref_url="https://www.suse.com/security/cve/CVE-2016-5263/" source="CVE"/>
		<reference ref_id="CVE-2016-5264" ref_url="https://www.suse.com/security/cve/CVE-2016-5264/" source="CVE"/>
		<reference ref_id="CVE-2016-5265" ref_url="https://www.suse.com/security/cve/CVE-2016-5265/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002245.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to 45.3.0 ESR to fix the following issues
(bsc#991809):

* MFSA 2016-62/CVE-2016-2835/CVE-2016-2836
  Miscellaneous memory safety hazards (rv:48.0 / rv:45.3)
* MFSA 2016-63/CVE-2016-2830
  Favicon network connection can persist when page is closed
* MFSA 2016-64/CVE-2016-2838
  Buffer overflow rendering SVG with bidirectional content
* MFSA 2016-65/CVE-2016-2839
  Cairo rendering crash due to memory allocation issue with
  FFmpeg 0.10
* MFSA 2016-67/CVE-2016-5252
  Stack underflow during 2D graphics rendering
* MFSA 2016-70/CVE-2016-5254
  Use-after-free when using alt key and toplevel menus
* MFSA 2016-72/CVE-2016-5258
  Use-after-free in DTLS during WebRTC session shutdown
* MFSA 2016-73/CVE-2016-5259
  Use-after-free in service workers with nested sync events
* MFSA 2016-76/CVE-2016-5262
  Scripts on marquee tag can execute in sandboxed iframes
* MFSA 2016-77/CVE-2016-2837
  Buffer overflow in ClearKey Content Decryption Module (CDM)
  during video playback
* MFSA 2016-78/CVE-2016-5263
  Type confusion in display transformation
* MFSA 2016-79/CVE-2016-5264
  Use-after-free when applying SVG effects
* MFSA 2016-80/CVE-2016-5265
  Same-origin policy violation using local HTML file and saved
  shortcut file
* CVE-2016-6354: Fix for possible buffer overrun (bsc#990856)

Also a temporary workaround was added:
- Temporarily bind Firefox to the first CPU as a hotfix
  for an apparent race condition (bsc#989196, bsc#990628)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-30"/>
	<updated date="2016-08-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/989196">SUSE bug 989196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990628">SUSE bug 990628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990856">SUSE bug 990856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2830">CVE-2016-2830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2835/">CVE-2016-2835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2835">CVE-2016-2835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2836/">CVE-2016-2836 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2836">CVE-2016-2836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2837/">CVE-2016-2837 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2837">CVE-2016-2837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2838/">CVE-2016-2838 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2838">CVE-2016-2838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2839/">CVE-2016-2839 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2839">CVE-2016-2839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5252/">CVE-2016-5252 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5252">CVE-2016-5252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5254/">CVE-2016-5254 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5254">CVE-2016-5254 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5258/">CVE-2016-5258 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5258">CVE-2016-5258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5259/">CVE-2016-5259 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5259">CVE-2016-5259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5262/">CVE-2016-5262 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5262">CVE-2016-5262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5263/">CVE-2016-5263 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5263">CVE-2016-5263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5264/">CVE-2016-5264 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5264">CVE-2016-5264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5265/">CVE-2016-5265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5265">CVE-2016-5265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6354">CVE-2016-6354 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577159" comment="MozillaFirefox-45.3.0esr-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577160" comment="MozillaFirefox-translations-45.3.0esr-50.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577159" comment="MozillaFirefox-45.3.0esr-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577160" comment="MozillaFirefox-translations-45.3.0esr-50.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218254" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="999701" ref_url="https://bugzilla.suse.com/999701" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5250" ref_url="https://www.suse.com/security/cve/CVE-2016-5250/" source="CVE"/>
		<reference ref_id="CVE-2016-5257" ref_url="https://www.suse.com/security/cve/CVE-2016-5257/" source="CVE"/>
		<reference ref_id="CVE-2016-5261" ref_url="https://www.suse.com/security/cve/CVE-2016-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-5270" ref_url="https://www.suse.com/security/cve/CVE-2016-5270/" source="CVE"/>
		<reference ref_id="CVE-2016-5272" ref_url="https://www.suse.com/security/cve/CVE-2016-5272/" source="CVE"/>
		<reference ref_id="CVE-2016-5274" ref_url="https://www.suse.com/security/cve/CVE-2016-5274/" source="CVE"/>
		<reference ref_id="CVE-2016-5276" ref_url="https://www.suse.com/security/cve/CVE-2016-5276/" source="CVE"/>
		<reference ref_id="CVE-2016-5277" ref_url="https://www.suse.com/security/cve/CVE-2016-5277/" source="CVE"/>
		<reference ref_id="CVE-2016-5278" ref_url="https://www.suse.com/security/cve/CVE-2016-5278/" source="CVE"/>
		<reference ref_id="CVE-2016-5280" ref_url="https://www.suse.com/security/cve/CVE-2016-5280/" source="CVE"/>
		<reference ref_id="CVE-2016-5281" ref_url="https://www.suse.com/security/cve/CVE-2016-5281/" source="CVE"/>
		<reference ref_id="CVE-2016-5284" ref_url="https://www.suse.com/security/cve/CVE-2016-5284/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002330.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to 45.4.0 ESR to fix the following issues (bsc#999701):

The following security issue were fixed:
* MFSA 2016-86/CVE-2016-5270: Heap-buffer-overflow in nsCaseTransformTextRunFactory::TransformString
* MFSA 2016-86/CVE-2016-5272: Bad cast in nsImageGeometryMixin
* MFSA 2016-86/CVE-2016-5276: Heap-use-after-free in mozilla::a11y::DocAccessible::ProcessInvalidationList
* MFSA 2016-86/CVE-2016-5274: use-after-free in nsFrameManager::CaptureFrameState
* MFSA 2016-86/CVE-2016-5277: Heap-use-after-free in nsRefreshDriver::Tick
* MFSA 2016-86/CVE-2016-5278: Heap-buffer-overflow in nsBMPEncoder::AddImageFrame
* MFSA 2016-86/CVE-2016-5280: Use-after-free in mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap
* MFSA 2016-86/CVE-2016-5281: use-after-free in DOMSVGLength
* MFSA 2016-86/CVE-2016-5284: Add-on update site certificate pin expiration
* MFSA 2016-86/CVE-2016-5250: Resource Timing API is storing resources sent by the previous page
* MFSA 2016-86/CVE-2016-5261: Integer overflow and memory corruption in WebSocketChannel
* MFSA 2016-86/CVE-2016-5257: Various memory safety bugs fixed in Firefox 49 and Firefox ESR 45.4
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-12"/>
	<updated date="2016-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5250/">CVE-2016-5250 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5250">CVE-2016-5250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5257/">CVE-2016-5257 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5257">CVE-2016-5257 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5261/">CVE-2016-5261 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5261">CVE-2016-5261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5270/">CVE-2016-5270 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5270">CVE-2016-5270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5272/">CVE-2016-5272 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5272">CVE-2016-5272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5274/">CVE-2016-5274 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5274">CVE-2016-5274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5276/">CVE-2016-5276 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5276">CVE-2016-5276 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5277/">CVE-2016-5277 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5277">CVE-2016-5277 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5278/">CVE-2016-5278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5278">CVE-2016-5278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5280/">CVE-2016-5280 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5280">CVE-2016-5280 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5281/">CVE-2016-5281 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5281">CVE-2016-5281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5284/">CVE-2016-5284 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5284">CVE-2016-5284 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577161" comment="MozillaFirefox-45.4.0esr-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577162" comment="MozillaFirefox-translations-45.4.0esr-53.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577161" comment="MozillaFirefox-45.4.0esr-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577162" comment="MozillaFirefox-translations-45.4.0esr-53.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218255" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1000751" ref_url="https://bugzilla.suse.com/1000751" source="BUGZILLA"/>
		<reference ref_id="1015422" ref_url="https://bugzilla.suse.com/1015422" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9893" ref_url="https://www.suse.com/security/cve/CVE-2016-9893/" source="CVE"/>
		<reference ref_id="CVE-2016-9895" ref_url="https://www.suse.com/security/cve/CVE-2016-9895/" source="CVE"/>
		<reference ref_id="CVE-2016-9897" ref_url="https://www.suse.com/security/cve/CVE-2016-9897/" source="CVE"/>
		<reference ref_id="CVE-2016-9898" ref_url="https://www.suse.com/security/cve/CVE-2016-9898/" source="CVE"/>
		<reference ref_id="CVE-2016-9899" ref_url="https://www.suse.com/security/cve/CVE-2016-9899/" source="CVE"/>
		<reference ref_id="CVE-2016-9900" ref_url="https://www.suse.com/security/cve/CVE-2016-9900/" source="CVE"/>
		<reference ref_id="CVE-2016-9901" ref_url="https://www.suse.com/security/cve/CVE-2016-9901/" source="CVE"/>
		<reference ref_id="CVE-2016-9902" ref_url="https://www.suse.com/security/cve/CVE-2016-9902/" source="CVE"/>
		<reference ref_id="CVE-2016-9904" ref_url="https://www.suse.com/security/cve/CVE-2016-9904/" source="CVE"/>
		<reference ref_id="CVE-2016-9905" ref_url="https://www.suse.com/security/cve/CVE-2016-9905/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002507.html" source="SUSE-SU"/>
		<description>

MozillaFirefox 45 ESR was updated to 45.6 to fix the following issues:

* MFSA 2016-95/CVE-2016-9897: Memory corruption in libGLES
* MFSA 2016-95/CVE-2016-9901: Data from Pocket server improperly sanitized before execution
* MFSA 2016-95/CVE-2016-9898: Use-after-free in Editor while manipulating DOM subtrees
* MFSA 2016-95/CVE-2016-9899: Use-after-free while manipulating DOM events and audio elements
* MFSA 2016-95/CVE-2016-9904: Cross-origin information leak in shared atoms
* MFSA 2016-95/CVE-2016-9905: Crash in EnumerateSubDocuments
* MFSA 2016-95/CVE-2016-9895: CSP bypass using marquee tag
* MFSA 2016-95/CVE-2016-9900: Restricted external resources can be loaded by SVG images through data URLs
* MFSA 2016-95/CVE-2016-9893: Memory safety bugs fixed in Firefox 50.1 and Firefox ESR 45.6
* MFSA 2016-95/CVE-2016-9902: Pocket extension does not validate the origin of events

Please see https://www.mozilla.org/en-US/security/advisories/mfsa2016-95/
for more information.

Also the following bug was fixed:
- Fix fontconfig issue (bsc#1000751) on 32bit systems as well.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-21"/>
	<updated date="2016-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000751">SUSE bug 1000751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9893/">CVE-2016-9893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9893">CVE-2016-9893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9895/">CVE-2016-9895 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9895">CVE-2016-9895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9897/">CVE-2016-9897 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9897">CVE-2016-9897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9898/">CVE-2016-9898 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9898">CVE-2016-9898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9899/">CVE-2016-9899 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9899">CVE-2016-9899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9900/">CVE-2016-9900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9900">CVE-2016-9900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9901/">CVE-2016-9901 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9901">CVE-2016-9901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9902/">CVE-2016-9902 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9902">CVE-2016-9902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9904/">CVE-2016-9904 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9904">CVE-2016-9904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9905/">CVE-2016-9905 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9905">CVE-2016-9905 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577163" comment="MozillaFirefox-45.6.0esr-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577164" comment="MozillaFirefox-translations-45.6.0esr-62.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577163" comment="MozillaFirefox-45.6.0esr-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577164" comment="MozillaFirefox-translations-45.6.0esr-62.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218256" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1021814" ref_url="https://bugzilla.suse.com/1021814" source="BUGZILLA"/>
		<reference ref_id="1021817" ref_url="https://bugzilla.suse.com/1021817" source="BUGZILLA"/>
		<reference ref_id="1021818" ref_url="https://bugzilla.suse.com/1021818" source="BUGZILLA"/>
		<reference ref_id="1021819" ref_url="https://bugzilla.suse.com/1021819" source="BUGZILLA"/>
		<reference ref_id="1021820" ref_url="https://bugzilla.suse.com/1021820" source="BUGZILLA"/>
		<reference ref_id="1021821" ref_url="https://bugzilla.suse.com/1021821" source="BUGZILLA"/>
		<reference ref_id="1021822" ref_url="https://bugzilla.suse.com/1021822" source="BUGZILLA"/>
		<reference ref_id="1021823" ref_url="https://bugzilla.suse.com/1021823" source="BUGZILLA"/>
		<reference ref_id="1021824" ref_url="https://bugzilla.suse.com/1021824" source="BUGZILLA"/>
		<reference ref_id="1021991" ref_url="https://bugzilla.suse.com/1021991" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5373" ref_url="https://www.suse.com/security/cve/CVE-2017-5373/" source="CVE"/>
		<reference ref_id="CVE-2017-5375" ref_url="https://www.suse.com/security/cve/CVE-2017-5375/" source="CVE"/>
		<reference ref_id="CVE-2017-5376" ref_url="https://www.suse.com/security/cve/CVE-2017-5376/" source="CVE"/>
		<reference ref_id="CVE-2017-5378" ref_url="https://www.suse.com/security/cve/CVE-2017-5378/" source="CVE"/>
		<reference ref_id="CVE-2017-5380" ref_url="https://www.suse.com/security/cve/CVE-2017-5380/" source="CVE"/>
		<reference ref_id="CVE-2017-5383" ref_url="https://www.suse.com/security/cve/CVE-2017-5383/" source="CVE"/>
		<reference ref_id="CVE-2017-5386" ref_url="https://www.suse.com/security/cve/CVE-2017-5386/" source="CVE"/>
		<reference ref_id="CVE-2017-5390" ref_url="https://www.suse.com/security/cve/CVE-2017-5390/" source="CVE"/>
		<reference ref_id="CVE-2017-5396" ref_url="https://www.suse.com/security/cve/CVE-2017-5396/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002632.html" source="SUSE-SU"/>
		<description>

MozillaFirefox 45 ESR was updated to 45.7 to fix the following issues (bsc#1021991):

* MFSA 2017-02/CVE-2017-5378: Pointer and frame data leakage of Javascript objects (bsc#1021818)
* MFSA 2017-02/CVE-2017-5396: Use-after-free with Media Decoder (bsc#1021821)
* MFSA 2017-02/CVE-2017-5386: WebExtensions can use data: protocol to affect other extensions (bsc#1021823)
* MFSA 2017-02/CVE-2017-5380: Potential use-after-free during DOM manipulations (bsc#1021819)
* MFSA 2017-02/CVE-2017-5390: Insecure communication methods in Developer Tools JSON viewer (bsc#1021820)
* MFSA 2017-02/CVE-2017-5373: Memory safety bugs fixed in Firefox 51 and Firefox ESR 45.7 (bsc#1021824)
* MFSA 2017-02/CVE-2017-5375: Excessive JIT code allocation allows bypass of ASLR and DEP (bsc#1021814)
* MFSA 2017-02/CVE-2017-5376: Use-after-free in XSL (bsc#1021817)
* MFSA 2017-02/CVE-2017-5383: Location bar spoofing with unicode characters (bsc#1021822)

Please see https://www.mozilla.org/en-US/security/advisories/mfsa2017-02/
for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-08"/>
	<updated date="2017-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021814">SUSE bug 1021814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021817">SUSE bug 1021817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021818">SUSE bug 1021818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021819">SUSE bug 1021819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021820">SUSE bug 1021820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021821">SUSE bug 1021821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021822">SUSE bug 1021822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021823">SUSE bug 1021823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021824">SUSE bug 1021824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5373/">CVE-2017-5373 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5373">CVE-2017-5373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5375/">CVE-2017-5375 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5375">CVE-2017-5375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5376/">CVE-2017-5376 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5376">CVE-2017-5376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5378/">CVE-2017-5378 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5378">CVE-2017-5378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5380/">CVE-2017-5380 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5380">CVE-2017-5380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5383/">CVE-2017-5383 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5383">CVE-2017-5383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5386/">CVE-2017-5386 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5386">CVE-2017-5386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5390/">CVE-2017-5390 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5390">CVE-2017-5390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5396/">CVE-2017-5396 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5396">CVE-2017-5396 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577165" comment="MozillaFirefox-45.7.0esr-65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577166" comment="MozillaFirefox-translations-45.7.0esr-65.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577165" comment="MozillaFirefox-45.7.0esr-65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577166" comment="MozillaFirefox-translations-45.7.0esr-65.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218257" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027527" ref_url="https://bugzilla.suse.com/1027527" source="BUGZILLA"/>
		<reference ref_id="1028391" ref_url="https://bugzilla.suse.com/1028391" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5398" ref_url="https://www.suse.com/security/cve/CVE-2017-5398/" source="CVE"/>
		<reference ref_id="CVE-2017-5400" ref_url="https://www.suse.com/security/cve/CVE-2017-5400/" source="CVE"/>
		<reference ref_id="CVE-2017-5401" ref_url="https://www.suse.com/security/cve/CVE-2017-5401/" source="CVE"/>
		<reference ref_id="CVE-2017-5402" ref_url="https://www.suse.com/security/cve/CVE-2017-5402/" source="CVE"/>
		<reference ref_id="CVE-2017-5404" ref_url="https://www.suse.com/security/cve/CVE-2017-5404/" source="CVE"/>
		<reference ref_id="CVE-2017-5405" ref_url="https://www.suse.com/security/cve/CVE-2017-5405/" source="CVE"/>
		<reference ref_id="CVE-2017-5407" ref_url="https://www.suse.com/security/cve/CVE-2017-5407/" source="CVE"/>
		<reference ref_id="CVE-2017-5408" ref_url="https://www.suse.com/security/cve/CVE-2017-5408/" source="CVE"/>
		<reference ref_id="CVE-2017-5409" ref_url="https://www.suse.com/security/cve/CVE-2017-5409/" source="CVE"/>
		<reference ref_id="CVE-2017-5410" ref_url="https://www.suse.com/security/cve/CVE-2017-5410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002712.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox to ESR 45.8 fixes the following issues:

Security issues fixed (bsc#1028391):
- CVE-2017-5402: Use-after-free working with events in FontFace objects
- CVE-2017-5410: Memory corruption during JavaScript garbage collection incremental sweeping
- CVE-2017-5400: asm.js JIT-spray bypass of ASLR and DEP
- CVE-2017-5401: Memory Corruption when handling ErrorResult
- CVE-2017-5407: Pixel and history stealing via floating-point timing side channel with SVG filters
- CVE-2017-5404: Use-after-free working with ranges in selections
- CVE-2017-5405: FTP response codes can cause use of uninitialized values for ports
- CVE-2017-5408: Cross-origin reading of video captions in violation of CORS
- CVE-2017-5409: File deletion via callback parameter in Mozilla Windows Updater and Maintenance Service
- CVE-2017-5398: Memory safety bugs fixed in Firefox 52 and Firefox ESR 45.8

Bugfixes:
- fix crashes on Itanium (bsc#1027527)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027527">SUSE bug 1027527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5398/">CVE-2017-5398 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5398">CVE-2017-5398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5400/">CVE-2017-5400 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5400">CVE-2017-5400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5401/">CVE-2017-5401 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5401">CVE-2017-5401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5402/">CVE-2017-5402 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5402">CVE-2017-5402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5404/">CVE-2017-5404 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5404">CVE-2017-5404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5405/">CVE-2017-5405 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5405">CVE-2017-5405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5407/">CVE-2017-5407 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5407">CVE-2017-5407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5408/">CVE-2017-5408 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5408">CVE-2017-5408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5409/">CVE-2017-5409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5409">CVE-2017-5409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5410/">CVE-2017-5410 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5410">CVE-2017-5410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577167" comment="MozillaFirefox-45.8.0esr-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577168" comment="MozillaFirefox-translations-45.8.0esr-68.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577167" comment="MozillaFirefox-45.8.0esr-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577168" comment="MozillaFirefox-translations-45.8.0esr-68.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218258" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss, mozilla-nspr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1015499" ref_url="https://bugzilla.suse.com/1015499" source="BUGZILLA"/>
		<reference ref_id="1015547" ref_url="https://bugzilla.suse.com/1015547" source="BUGZILLA"/>
		<reference ref_id="1021636" ref_url="https://bugzilla.suse.com/1021636" source="BUGZILLA"/>
		<reference ref_id="1030071" ref_url="https://bugzilla.suse.com/1030071" source="BUGZILLA"/>
		<reference ref_id="1035082" ref_url="https://bugzilla.suse.com/1035082" source="BUGZILLA"/>
		<reference ref_id="983639" ref_url="https://bugzilla.suse.com/983639" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="CVE-2016-8635" ref_url="https://www.suse.com/security/cve/CVE-2016-8635/" source="CVE"/>
		<reference ref_id="CVE-2016-9574" ref_url="https://www.suse.com/security/cve/CVE-2016-9574/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5437" ref_url="https://www.suse.com/security/cve/CVE-2017-5437/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to the Firefox ESR release 45.9.

Mozilla NSS was updated to support TLS 1.3 (close to release draft) and various new 
ciphers, PRFs, Diffie Hellman key agreement and support for more hashes.

Security issues fixed in Firefox (bsc#1035082)

- MFSA 2017-11/CVE-2017-5469: Potential Buffer overflow in flex-generated code
- MFSA 2017-11/CVE-2017-5429: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and Firefox ESR 52.1
- MFSA 2017-11/CVE-2017-5439: Use-after-free in nsTArray Length() during XSLT processing
- MFSA 2017-11/CVE-2017-5438: Use-after-free in nsAutoPtr during XSLT processing
- MFSA 2017-11/CVE-2017-5437: Vulnerabilities in Libevent library
- MFSA 2017-11/CVE-2017-5436: Out-of-bounds write with malicious font in Graphite 2
- MFSA 2017-11/CVE-2017-5435: Use-after-free during transaction processing in the editor
- MFSA 2017-11/CVE-2017-5434: Use-after-free during focus handling
- MFSA 2017-11/CVE-2017-5433: Use-after-free in SMIL animation functions
- MFSA 2017-11/CVE-2017-5432: Use-after-free in text input selection
- MFSA 2017-11/CVE-2017-5464: Memory corruption with accessibility and DOM manipulation
- MFSA 2017-11/CVE-2017-5465: Out-of-bounds read in ConvolvePixel
- MFSA 2017-11/CVE-2017-5460: Use-after-free in frame selection
- MFSA 2017-11/CVE-2017-5448: Out-of-bounds write in ClearKeyDecryptor
- MFSA 2017-11/CVE-2017-5446: Out-of-bounds read when HTTP/2 DATA frames are sent with incorrect data
- MFSA 2017-11/CVE-2017-5447: Out-of-bounds read during glyph processing
- MFSA 2017-11/CVE-2017-5444: Buffer overflow while parsing application/http-index-format content
- MFSA 2017-11/CVE-2017-5445: Uninitialized values used while parsing application/http-index-format content
- MFSA 2017-11/CVE-2017-5442: Use-after-free during style changes
- MFSA 2017-11/CVE-2017-5443: Out-of-bounds write during BinHex decoding
- MFSA 2017-11/CVE-2017-5440: Use-after-free in txExecutionState destructor during XSLT processing
- MFSA 2017-11/CVE-2017-5441: Use-after-free with selection during scroll events
- MFSA 2017-11/CVE-2017-5459: Buffer overflow in WebGL

Mozilla NSS was updated to 3.29.5, bringing new features and fixing bugs:

- Update to NSS 3.29.5:
  * MFSA 2017-11/CVE-2017-5461: Rare crashes in the base 64 decoder and encoder were fixed.
  * MFSA 2017-11/CVE-2017-5462: A carry over bug in the RNG was fixed.
  * CVE-2016-9574: Remote DoS during session handshake when using SessionTicket extention and ECDHE-ECDSA (bsc#1015499).
  * requires NSPR &gt;= 4.13.1

- Update to NSS 3.29.3

  * enables TLS 1.3 by default

- Fixed a bug in hash computation (and build with
  GCC 7 which complains about shifts of boolean values).
  (bsc#1030071, bmo#1348767)

- Update to NSS 3.28.3

  This is a patch release to fix binary compatibility issues.

- Update to NSS 3.28.1

  This is a patch release to update the list of root CA certificates.

  * The following CA certificates were Removed

    CN = Buypass Class 2 CA 1
    CN = Root CA Generalitat Valenciana
    OU = RSA Security 2048 V3

  * The following CA certificates were Added

    OU = AC RAIZ FNMT-RCM
    CN = Amazon Root CA 1
    CN = Amazon Root CA 2
    CN = Amazon Root CA 3
    CN = Amazon Root CA 4
    CN = LuxTrust Global Root 2
    CN = Symantec Class 1 Public Primary Certification Authority - G4
    CN = Symantec Class 1 Public Primary Certification Authority - G6
    CN = Symantec Class 2 Public Primary Certification Authority - G4
    CN = Symantec Class 2 Public Primary Certification Authority - G6

  * The version number of the updated root CA list has been set to 2.11

- Update to NSS 3.28

  New functionality:

  * NSS includes support for TLS 1.3 draft -18. This includes a number
    of improvements to TLS 1.3:

    - The signed certificate timestamp, used in certificate
      transparency, is supported in TLS 1.3.
    - Key exporters for TLS 1.3 are supported. This includes the early
      key exporter, which can be used if 0-RTT is enabled. Note that
      there is a difference between TLS 1.3 and key exporters in older
      versions of TLS. TLS 1.3 does not distinguish between an empty
      context and no context.
    - The TLS 1.3 (draft) protocol can be enabled, by defining
      NSS_ENABLE_TLS_1_3=1 when building NSS.
    - NSS includes support for the X25519 key exchange algorithm,
      which is supported and enabled by default in all versions of TLS.

  Notable Changes:

  * NSS can no longer be compiled with support for additional elliptic curves.
    This was previously possible by replacing certain NSS source files.
  * NSS will now detect the presence of tokens that support additional
    elliptic curves and enable those curves for use in TLS.
    Note that this detection has a one-off performance cost, which can be
    avoided by using the SSL_NamedGroupConfig function to limit supported
    groups to those that NSS provides.
  * PKCS#11 bypass for TLS is no longer supported and has been removed.
  * Support for 'export' grade SSL/TLS cipher suites has been removed.
  * NSS now uses the signature schemes definition in TLS 1.3.
    This also affects TLS 1.2. NSS will now only generate signatures with the
    combinations of hash and signature scheme that are defined in TLS 1.3,
    even when negotiating TLS 1.2.

    - This means that SHA-256 will only be used with P-256 ECDSA certificates,
      SHA-384 with P-384 certificates, and SHA-512 with P-521 certificates.
      SHA-1 is permitted (in TLS 1.2 only) with any certificate for backward
      compatibility reasons.
    - NSS will now no longer assume that default signature schemes are
      supported by a peer if there was no commonly supported signature scheme.

  * NSS will now check if RSA-PSS signing is supported by the token that holds
    the private key prior to using it for TLS.
  * The certificate validation code contains checks to no longer trust
    certificates that are issued by old WoSign and StartCom CAs after
    October 21, 2016. This is equivalent to the behavior that Mozilla will
    release with Firefox 51.

- Update to NSS 3.27.2
  * Fixed SSL_SetTrustAnchors leaks (bmo#1318561)

  - raised the minimum softokn/freebl version to 3.28 as reported in (boo#1021636)

- Update to NSS 3.26.2

  New Functionality:

  * the selfserv test utility has been enhanced to support ALPN
    (HTTP/1.1) and 0-RTT
  * added support for the System-wide crypto policy available on
    Fedora Linux see http://fedoraproject.org/wiki/Changes/CryptoPolicy
  * introduced build flag NSS_DISABLE_LIBPKIX that allows compilation
    of NSS without the libpkix library

  Notable Changes:

  * The following CA certificate was Added
    CN = ISRG Root X1
  * NPN is disabled and ALPN is enabled by default
  * the NSS test suite now completes with the experimental TLS 1.3
    code enabled
  * several test improvements and additions, including a NIST known answer test

  Changes in 3.26.2
  * MD5 signature algorithms sent by the server in CertificateRequest
    messages are now properly ignored. Previously, with rare server
    configurations, an MD5 signature algorithm might have been selected
    for client authentication and caused the client to abort the
    connection soon after.

- Update to NSS 3.25

  New functionality:

  * Implemented DHE key agreement for TLS 1.3
  * Added support for ChaCha with TLS 1.3
  * Added support for TLS 1.2 ciphersuites that use SHA384 as the PRF
  * In previous versions, when using client authentication with TLS 1.2,
    NSS only supported certificate_verify messages that used the same
    signature hash algorithm as used by the PRF. This limitation has
    been removed.

  Notable changes:

  * An SSL socket can no longer be configured to allow both TLS 1.3 and SSLv3
  * Regression fix: NSS no longer reports a failure if an application
    attempts to disable the SSLv2 protocol.
  * The list of trusted CA certificates has been updated to version 2.8
  * The following CA certificate was Removed
    Sonera Class1 CA
  * The following CA certificates were Added
    Hellenic Academic and Research Institutions RootCA 2015
    Hellenic Academic and Research Institutions ECC RootCA 2015
    Certplus Root CA G1
    Certplus Root CA G2
    OpenTrust Root CA G1
    OpenTrust Root CA G2
    OpenTrust Root CA G3

- Update to NSS 3.24

  New functionality:

  * NSS softoken has been updated with the latest National Institute
    of Standards and Technology (NIST) guidance (as of 2015):
    - Software integrity checks and POST functions are executed on
      shared library load. These checks have been disabled by default,
      as they can cause a performance regression. To enable these
      checks, you must define symbol NSS_FORCE_FIPS when building NSS.
    - Counter mode and Galois/Counter Mode (GCM) have checks to
      prevent counter overflow.
    - Additional CSPs are zeroed in the code.
    - NSS softoken uses new guidance for how many Rabin-Miller tests
      are needed to verify a prime based on prime size.
  * NSS softoken has also been updated to allow NSS to run in FIPS
    Level 1 (no password). This mode is triggered by setting the
    database password to the empty string. In FIPS mode, you may move
    from Level 1 to Level 2 (by setting an appropriate password),
    but not the reverse.
  * A SSL_ConfigServerCert function has been added for configuring
    SSL/TLS server sockets with a certificate and private key. Use
    this new function in place of SSL_ConfigSecureServer,
    SSL_ConfigSecureServerWithCertChain, SSL_SetStapledOCSPResponses,
    and SSL_SetSignedCertTimestamps. SSL_ConfigServerCert automatically
    determines the certificate type from the certificate and private key.
    The caller is no longer required to use SSLKEAType explicitly to
    select a 'slot' into which the certificate is configured (which
    incorrectly identifies a key agreement type rather than a certificate).
    Separate functions for configuring Online Certificate Status Protocol
    (OCSP) responses or Signed Certificate Timestamps are not needed,
    since these can be added to the optional SSLExtraServerCertData struct
    provided to SSL_ConfigServerCert.  Also, partial support for RSA
    Probabilistic Signature Scheme (RSA-PSS) certificates has been added.
    Although these certificates can be configured, they will not be
    used by NSS in this version.
  * Deprecate the member attribute authAlgorithm of type SSLCipherSuiteInfo.
    Instead, applications should use the newly added attribute authType.
  * Add a shared library (libfreeblpriv3) on Linux platforms that
    define FREEBL_LOWHASH.
  * Remove most code related to SSL v2, including the ability to actively
    send a SSLv2-compatible client hello. However, the server-side
    implementation of the SSL/TLS protocol still supports processing
    of received v2-compatible client hello messages.
  * Disable (by default) NSS support in optimized builds for logging SSL/TLS
    key material to a logfile if the SSLKEYLOGFILE environment variable
    is set. To enable the functionality in optimized builds, you must define
    the symbol NSS_ALLOW_SSLKEYLOGFILE when building NSS.
  * Update NSS to protect it against the Cachebleed attack.
  * Disable support for DTLS compression.
  * Improve support for TLS 1.3. This includes support for DTLS 1.3.
    Note that TLS 1.3 support is experimental and not suitable for
    production use.

- Update to NSS 3.23

  New functionality:

  * ChaCha20/Poly1305 cipher and TLS cipher suites now supported
  * Experimental-only support TLS 1.3 1-RTT mode (draft-11).
    This code is not ready for production use.

  Notable changes:

  * The list of TLS extensions sent in the TLS handshake has been
    reordered to increase compatibility of the Extended Master Secret
    with with servers
  * The build time environment variable NSS_ENABLE_ZLIB has been
    renamed to NSS_SSL_ENABLE_ZLIB
  * The build time environment variable NSS_DISABLE_CHACHAPOLY was
    added, which can be used to prevent compilation of the
    ChaCha20/Poly1305 code.
  * The following CA certificates were Removed

    - Staat der Nederlanden Root CA
    - NetLock Minositett Kozjegyzoi (Class QA) Tanusitvanykiado
    - NetLock Kozjegyzoi (Class A) Tanusitvanykiado
    - NetLock Uzleti (Class B) Tanusitvanykiado
    - NetLock Expressz (Class C) Tanusitvanykiado
    - VeriSign Class 1 Public PCA - G2
    - VeriSign Class 3 Public PCA
    - VeriSign Class 3 Public PCA - G2
    - CA Disig

  * The following CA certificates were Added

    + SZAFIR ROOT CA2
    + Certum Trusted Network CA 2

  * The following CA certificate had the Email trust bit turned on

    + Actalis Authentication Root CA

  Security fixes:
  * CVE-2016-2834: Memory safety bugs (boo#983639)
    MFSA-2016-61 bmo#1206283 bmo#1221620 bmo#1241034 bmo#1241037

- Update to NSS 3.22.3
  * Increase compatibility of TLS extended master secret,
    don't send an empty TLS extension last in the handshake
    (bmo#1243641)
  * Fixed a heap-based buffer overflow related to the parsing of
    certain ASN.1 structures. An attacker could create a specially-crafted
    certificate which, when parsed by NSS, would cause a crash or
    execution of arbitrary code with the permissions of the user.
    (CVE-2016-1950, bmo#1245528)

- Update to NSS 3.22.2

  New functionality:

  * RSA-PSS signatures are now supported (bmo#1215295)
  * Pseudorandom functions based on hashes other than SHA-1 are now supported
  * Enforce an External Policy on NSS from a config file (bmo#1009429)

- CVE-2016-8635: Fix for DH small subgroup confinement attack (bsc#1015547)

Mozilla NSPR was updated to version 4.13.1:

  The previously released version 4.13 had changed pipes to be
  nonblocking by default, and as a consequence, PollEvent was
  changed to not block on clear.
  The NSPR development team received reports that these changes
  caused regressions in some applications that use NSPR, and it
  has been decided to revert the changes made in NSPR 4.13.
  NSPR 4.13.1 restores the traditional behavior of pipes and
  PollEvent.

Mozilla NSPR update to version 4.13 had these changes:

- PL_strcmp (and others) were fixed to return consistent results
    when one of the arguments is NULL.
- PollEvent was fixed to not block on clear.
- Pipes are always nonblocking.
- PR_GetNameForIdentity: added thread safety lock and bound checks.
- Removed the PLArena freelist.
- Avoid some integer overflows.
- fixed several comments.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-04"/>
	<updated date="2017-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1015499">SUSE bug 1015499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015547">SUSE bug 1015547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021636">SUSE bug 1021636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030071">SUSE bug 1030071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983639">SUSE bug 983639</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1950">CVE-2016-1950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2834">CVE-2016-2834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8635/">CVE-2016-8635 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8635">CVE-2016-8635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9574/">CVE-2016-9574 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9574">CVE-2016-9574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5429">CVE-2017-5429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5432">CVE-2017-5432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5433">CVE-2017-5433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5434">CVE-2017-5434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5435">CVE-2017-5435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5436">CVE-2017-5436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5437/">CVE-2017-5437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5437">CVE-2017-5437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5438">CVE-2017-5438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5439">CVE-2017-5439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5440">CVE-2017-5440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5441">CVE-2017-5441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5442">CVE-2017-5442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5443">CVE-2017-5443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5444">CVE-2017-5444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5445">CVE-2017-5445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5446">CVE-2017-5446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5447">CVE-2017-5447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5448">CVE-2017-5448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5459">CVE-2017-5459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5460">CVE-2017-5460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5461">CVE-2017-5461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5462">CVE-2017-5462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5464">CVE-2017-5464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5465">CVE-2017-5465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5469">CVE-2017-5469 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577169" comment="MozillaFirefox-45.9.0esr-71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577170" comment="MozillaFirefox-translations-45.9.0esr-71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577171" comment="libfreebl3-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577172" comment="libfreebl3-32bit-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577173" comment="libsoftokn3-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577174" comment="libsoftokn3-32bit-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577175" comment="mozilla-nspr-4.13.1-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577176" comment="mozilla-nspr-32bit-4.13.1-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577177" comment="mozilla-nss-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577178" comment="mozilla-nss-32bit-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577179" comment="mozilla-nss-tools-3.29.5-46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577169" comment="MozillaFirefox-45.9.0esr-71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577170" comment="MozillaFirefox-translations-45.9.0esr-71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577171" comment="libfreebl3-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577172" comment="libfreebl3-32bit-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577173" comment="libsoftokn3-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577174" comment="libsoftokn3-32bit-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577175" comment="mozilla-nspr-4.13.1-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577176" comment="mozilla-nspr-32bit-4.13.1-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577177" comment="mozilla-nss-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577178" comment="mozilla-nss-32bit-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577179" comment="mozilla-nss-tools-3.29.5-46.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218259" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLED, firefox-gcc5, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1025108" ref_url="https://bugzilla.suse.com/1025108" source="BUGZILLA"/>
		<reference ref_id="1031485" ref_url="https://bugzilla.suse.com/1031485" source="BUGZILLA"/>
		<reference ref_id="1035082" ref_url="https://bugzilla.suse.com/1035082" source="BUGZILLA"/>
		<reference ref_id="1043960" ref_url="https://bugzilla.suse.com/1043960" source="BUGZILLA"/>
		<reference ref_id="930392" ref_url="https://bugzilla.suse.com/930392" source="BUGZILLA"/>
		<reference ref_id="930496" ref_url="https://bugzilla.suse.com/930496" source="BUGZILLA"/>
		<reference ref_id="935510" ref_url="https://bugzilla.suse.com/935510" source="BUGZILLA"/>
		<reference ref_id="939460" ref_url="https://bugzilla.suse.com/939460" source="BUGZILLA"/>
		<reference ref_id="945842" ref_url="https://bugzilla.suse.com/945842" source="BUGZILLA"/>
		<reference ref_id="953831" ref_url="https://bugzilla.suse.com/953831" source="BUGZILLA"/>
		<reference ref_id="954002" ref_url="https://bugzilla.suse.com/954002" source="BUGZILLA"/>
		<reference ref_id="955382" ref_url="https://bugzilla.suse.com/955382" source="BUGZILLA"/>
		<reference ref_id="962765" ref_url="https://bugzilla.suse.com/962765" source="BUGZILLA"/>
		<reference ref_id="964468" ref_url="https://bugzilla.suse.com/964468" source="BUGZILLA"/>
		<reference ref_id="966220" ref_url="https://bugzilla.suse.com/966220" source="BUGZILLA"/>
		<reference ref_id="968771" ref_url="https://bugzilla.suse.com/968771" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<reference ref_id="CVE-2016-10196" ref_url="https://www.suse.com/security/cve/CVE-2016-10196/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5430" ref_url="https://www.suse.com/security/cve/CVE-2017-5430/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448/" source="CVE"/>
		<reference ref_id="CVE-2017-5449" ref_url="https://www.suse.com/security/cve/CVE-2017-5449/" source="CVE"/>
		<reference ref_id="CVE-2017-5451" ref_url="https://www.suse.com/security/cve/CVE-2017-5451/" source="CVE"/>
		<reference ref_id="CVE-2017-5454" ref_url="https://www.suse.com/security/cve/CVE-2017-5454/" source="CVE"/>
		<reference ref_id="CVE-2017-5455" ref_url="https://www.suse.com/security/cve/CVE-2017-5455/" source="CVE"/>
		<reference ref_id="CVE-2017-5456" ref_url="https://www.suse.com/security/cve/CVE-2017-5456/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5466" ref_url="https://www.suse.com/security/cve/CVE-2017-5466/" source="CVE"/>
		<reference ref_id="CVE-2017-5467" ref_url="https://www.suse.com/security/cve/CVE-2017-5467/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<reference ref_id="CVE-2017-5470" ref_url="https://www.suse.com/security/cve/CVE-2017-5470/" source="CVE"/>
		<reference ref_id="CVE-2017-5472" ref_url="https://www.suse.com/security/cve/CVE-2017-5472/" source="CVE"/>
		<reference ref_id="CVE-2017-7749" ref_url="https://www.suse.com/security/cve/CVE-2017-7749/" source="CVE"/>
		<reference ref_id="CVE-2017-7750" ref_url="https://www.suse.com/security/cve/CVE-2017-7750/" source="CVE"/>
		<reference ref_id="CVE-2017-7751" ref_url="https://www.suse.com/security/cve/CVE-2017-7751/" source="CVE"/>
		<reference ref_id="CVE-2017-7752" ref_url="https://www.suse.com/security/cve/CVE-2017-7752/" source="CVE"/>
		<reference ref_id="CVE-2017-7754" ref_url="https://www.suse.com/security/cve/CVE-2017-7754/" source="CVE"/>
		<reference ref_id="CVE-2017-7755" ref_url="https://www.suse.com/security/cve/CVE-2017-7755/" source="CVE"/>
		<reference ref_id="CVE-2017-7756" ref_url="https://www.suse.com/security/cve/CVE-2017-7756/" source="CVE"/>
		<reference ref_id="CVE-2017-7757" ref_url="https://www.suse.com/security/cve/CVE-2017-7757/" source="CVE"/>
		<reference ref_id="CVE-2017-7758" ref_url="https://www.suse.com/security/cve/CVE-2017-7758/" source="CVE"/>
		<reference ref_id="CVE-2017-7761" ref_url="https://www.suse.com/security/cve/CVE-2017-7761/" source="CVE"/>
		<reference ref_id="CVE-2017-7763" ref_url="https://www.suse.com/security/cve/CVE-2017-7763/" source="CVE"/>
		<reference ref_id="CVE-2017-7764" ref_url="https://www.suse.com/security/cve/CVE-2017-7764/" source="CVE"/>
		<reference ref_id="CVE-2017-7765" ref_url="https://www.suse.com/security/cve/CVE-2017-7765/" source="CVE"/>
		<reference ref_id="CVE-2017-7768" ref_url="https://www.suse.com/security/cve/CVE-2017-7768/" source="CVE"/>
		<reference ref_id="CVE-2017-7778" ref_url="https://www.suse.com/security/cve/CVE-2017-7778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox and mozilla-nss fixes the following issues:

Security issues fixed:
- Fixes in Firefox ESR 52.2 (bsc#1043960,MFSA 2017-16)
  - CVE-2017-7758: Out-of-bounds read in Opus encoder
  - CVE-2017-7749: Use-after-free during docshell reloading
  - CVE-2017-7751: Use-after-free with content viewer listeners
  - CVE-2017-5472: Use-after-free using destroyed node when regenerating trees
  - CVE-2017-5470: Memory safety bugs fixed in Firefox 54 and Firefox ESR 52.2
  - CVE-2017-7752: Use-after-free with IME input
  - CVE-2017-7750: Use-after-free with track elements
  - CVE-2017-7768: 32 byte arbitrary file read through Mozilla Maintenance Service
  - CVE-2017-7778: Vulnerabilities in the Graphite 2 library
  - CVE-2017-7754: Out-of-bounds read in WebGL with ImageInfo object
  - CVE-2017-7755: Privilege escalation through Firefox Installer with same directory DLL files
  - CVE-2017-7756: Use-after-free and use-after-scope logging XHR header errors
  - CVE-2017-7757: Use-after-free in IndexedDB
  - CVE-2017-7761: File deletion and privilege escalation through Mozilla Maintenance Service helper.exe application
  - CVE-2017-7763: Mac fonts render some unicode characters as spaces
  - CVE-2017-7765: Mark of the Web bypass when saving executable files
  - CVE-2017-7764: Domain spoofing with combination of Canadian Syllabics and other unicode blocks

- update to Firefox ESR 52.1 (bsc#1035082,MFSA 2017-12)
  - CVE-2016-10196: Vulnerabilities in Libevent library
  - CVE-2017-5443: Out-of-bounds write during BinHex decoding
  - CVE-2017-5429: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and Firefox ESR 52.1
  - CVE-2017-5464: Memory corruption with accessibility and DOM manipulation
  - CVE-2017-5465: Out-of-bounds read in ConvolvePixel
  - CVE-2017-5466: Origin confusion when reloading isolated data:text/html URL
  - CVE-2017-5467: Memory corruption when drawing Skia content
  - CVE-2017-5460: Use-after-free in frame selection
  - CVE-2017-5461: Out-of-bounds write in Base64 encoding in NSS
  - CVE-2017-5448: Out-of-bounds write in ClearKeyDecryptor
  - CVE-2017-5449: Crash during bidirectional unicode manipulation with animation
  - CVE-2017-5446: Out-of-bounds read when HTTP/2 DATA frames are sent with incorrect data
  - CVE-2017-5447: Out-of-bounds read during glyph processing
  - CVE-2017-5444: Buffer overflow while parsing application/http-index-format content
  - CVE-2017-5445: Uninitialized values used while parsing application/http- index-format content
  - CVE-2017-5442: Use-after-free during style changes
  - CVE-2017-5469: Potential Buffer overflow in flex-generated code
  - CVE-2017-5440: Use-after-free in txExecutionState destructor during XSLT processing
  - CVE-2017-5441: Use-after-free with selection during scroll events
  - CVE-2017-5439: Use-after-free in nsTArray Length() during XSLT processing
  - CVE-2017-5438: Use-after-free in nsAutoPtr during XSLT processing
  - CVE-2017-5436: Out-of-bounds write with malicious font in Graphite 2
  - CVE-2017-5435: Use-after-free during transaction processing in the editor
  - CVE-2017-5434: Use-after-free during focus handling
  - CVE-2017-5433: Use-after-free in SMIL animation functions
  - CVE-2017-5432: Use-after-free in text input selection
  - CVE-2017-5430: Memory safety bugs fixed in Firefox 53 and Firefox ESR 52.1
  - CVE-2017-5459: Buffer overflow in WebGL
  - CVE-2017-5462: DRBG flaw in NSS
  - CVE-2017-5455: Sandbox escape through internal feed reader APIs
  - CVE-2017-5454: Sandbox escape allowing file system read access through file picker
  - CVE-2017-5456: Sandbox escape allowing local file system access
  - CVE-2017-5451: Addressbar spoofing with onblur event

- General
  - CVE-2015-5276: Fix for C++11 std::random_device short reads (bsc#945842)

Bugfixes:
- workaround for Firefox hangs (bsc#1031485, bsc#1025108)
- Update to gcc-5-branch head.
  * Includes fixes for (bsc#966220), (bsc#962765), (bsc#964468), (bsc#939460),
    (bsc#930496), (bsc#930392) and (bsc#955382).
- Add fix to revert accidential libffi ABI breakage on AARCH64. (bsc#968771)
- Build s390[x] with --with-tune=z9-109 --with-arch=z900 on SLE11 again. (bsc#954002)
- Fix libffi include install.  (bsc#935510)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-22"/>
	<updated date="2017-08-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1025108">SUSE bug 1025108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031485">SUSE bug 1031485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930392">SUSE bug 930392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930496">SUSE bug 930496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935510">SUSE bug 935510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939460">SUSE bug 939460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945842">SUSE bug 945842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953831">SUSE bug 953831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954002">SUSE bug 954002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955382">SUSE bug 955382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962765">SUSE bug 962765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964468">SUSE bug 964468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966220">SUSE bug 966220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968771">SUSE bug 968771</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5276">CVE-2015-5276 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10196/">CVE-2016-10196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10196">CVE-2016-10196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5429">CVE-2017-5429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5430/">CVE-2017-5430 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5430">CVE-2017-5430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5432">CVE-2017-5432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5433">CVE-2017-5433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5434">CVE-2017-5434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5435">CVE-2017-5435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5436">CVE-2017-5436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5438">CVE-2017-5438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5439">CVE-2017-5439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5440">CVE-2017-5440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5441">CVE-2017-5441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5442">CVE-2017-5442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5443">CVE-2017-5443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5444">CVE-2017-5444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5445">CVE-2017-5445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5446">CVE-2017-5446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5447">CVE-2017-5447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5448">CVE-2017-5448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5449/">CVE-2017-5449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5449">CVE-2017-5449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5451/">CVE-2017-5451 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5451">CVE-2017-5451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5454/">CVE-2017-5454 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5454">CVE-2017-5454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5455/">CVE-2017-5455 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5455">CVE-2017-5455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5456/">CVE-2017-5456 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5456">CVE-2017-5456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5459">CVE-2017-5459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5460">CVE-2017-5460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5461">CVE-2017-5461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5462">CVE-2017-5462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5464">CVE-2017-5464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5465">CVE-2017-5465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5466/">CVE-2017-5466 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5466">CVE-2017-5466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5467/">CVE-2017-5467 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5467">CVE-2017-5467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5469">CVE-2017-5469 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5470/">CVE-2017-5470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5470">CVE-2017-5470 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5472/">CVE-2017-5472 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5472">CVE-2017-5472 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7749/">CVE-2017-7749 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7749">CVE-2017-7749 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7750/">CVE-2017-7750 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7750">CVE-2017-7750 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7751/">CVE-2017-7751 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7751">CVE-2017-7751 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7752/">CVE-2017-7752 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7752">CVE-2017-7752 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7754/">CVE-2017-7754 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7754">CVE-2017-7754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7755/">CVE-2017-7755 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7755">CVE-2017-7755 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7756/">CVE-2017-7756 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7756">CVE-2017-7756 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7757/">CVE-2017-7757 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7757">CVE-2017-7757 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7758/">CVE-2017-7758 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7758">CVE-2017-7758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7761/">CVE-2017-7761 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7761">CVE-2017-7761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7763/">CVE-2017-7763 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7763">CVE-2017-7763 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7764/">CVE-2017-7764 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7764">CVE-2017-7764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7765/">CVE-2017-7765 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7765">CVE-2017-7765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7768/">CVE-2017-7768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7768">CVE-2017-7768 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7778/">CVE-2017-7778 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7778">CVE-2017-7778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577180" comment="MozillaFirefox-52.2.0esr-72.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577181" comment="MozillaFirefox-branding-SLED-52-24.3.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577182" comment="MozillaFirefox-translations-52.2.0esr-72.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577183" comment="firefox-libffi4-5.3.1+r233831-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577184" comment="firefox-libstdc++6-5.3.1+r233831-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577185" comment="libfreebl3-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577186" comment="libfreebl3-32bit-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577187" comment="libsoftokn3-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577188" comment="libsoftokn3-32bit-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577189" comment="mozilla-nss-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577190" comment="mozilla-nss-32bit-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577191" comment="mozilla-nss-tools-3.29.5-47.3.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577180" comment="MozillaFirefox-52.2.0esr-72.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577181" comment="MozillaFirefox-branding-SLED-52-24.3.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577182" comment="MozillaFirefox-translations-52.2.0esr-72.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577183" comment="firefox-libffi4-5.3.1+r233831-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577184" comment="firefox-libstdc++6-5.3.1+r233831-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577185" comment="libfreebl3-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577186" comment="libfreebl3-32bit-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577187" comment="libsoftokn3-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577188" comment="libsoftokn3-32bit-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577189" comment="mozilla-nss-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577190" comment="mozilla-nss-32bit-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577191" comment="mozilla-nss-tools-3.29.5-47.3.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218260" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1031485" ref_url="https://bugzilla.suse.com/1031485" source="BUGZILLA"/>
		<reference ref_id="1052829" ref_url="https://bugzilla.suse.com/1052829" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7753" ref_url="https://www.suse.com/security/cve/CVE-2017-7753/" source="CVE"/>
		<reference ref_id="CVE-2017-7779" ref_url="https://www.suse.com/security/cve/CVE-2017-7779/" source="CVE"/>
		<reference ref_id="CVE-2017-7782" ref_url="https://www.suse.com/security/cve/CVE-2017-7782/" source="CVE"/>
		<reference ref_id="CVE-2017-7784" ref_url="https://www.suse.com/security/cve/CVE-2017-7784/" source="CVE"/>
		<reference ref_id="CVE-2017-7785" ref_url="https://www.suse.com/security/cve/CVE-2017-7785/" source="CVE"/>
		<reference ref_id="CVE-2017-7786" ref_url="https://www.suse.com/security/cve/CVE-2017-7786/" source="CVE"/>
		<reference ref_id="CVE-2017-7787" ref_url="https://www.suse.com/security/cve/CVE-2017-7787/" source="CVE"/>
		<reference ref_id="CVE-2017-7791" ref_url="https://www.suse.com/security/cve/CVE-2017-7791/" source="CVE"/>
		<reference ref_id="CVE-2017-7792" ref_url="https://www.suse.com/security/cve/CVE-2017-7792/" source="CVE"/>
		<reference ref_id="CVE-2017-7798" ref_url="https://www.suse.com/security/cve/CVE-2017-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-7800" ref_url="https://www.suse.com/security/cve/CVE-2017-7800/" source="CVE"/>
		<reference ref_id="CVE-2017-7801" ref_url="https://www.suse.com/security/cve/CVE-2017-7801/" source="CVE"/>
		<reference ref_id="CVE-2017-7802" ref_url="https://www.suse.com/security/cve/CVE-2017-7802/" source="CVE"/>
		<reference ref_id="CVE-2017-7803" ref_url="https://www.suse.com/security/cve/CVE-2017-7803/" source="CVE"/>
		<reference ref_id="CVE-2017-7804" ref_url="https://www.suse.com/security/cve/CVE-2017-7804/" source="CVE"/>
		<reference ref_id="CVE-2017-7807" ref_url="https://www.suse.com/security/cve/CVE-2017-7807/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003171.html" source="SUSE-SU"/>
		<description>


Mozilla Firefox was updated to the ESR 52.3 release (bsc#1052829)

Following security issues were fixed:

* MFSA 2017-19/CVE-2017-7807: Domain hijacking through AppCache fallback
* MFSA 2017-19/CVE-2017-7791: Spoofing following page navigation with data: protocol and modal alerts
* MFSA 2017-19/CVE-2017-7792: Buffer overflow viewing certificates with an extremely long OID
* MFSA 2017-19/CVE-2017-7782: WindowsDllDetourPatcher allocates memory without DEP protections
* MFSA 2017-19/CVE-2017-7787: Same-origin policy bypass with iframes through page reloads
* MFSA 2017-19/CVE-2017-7786: Buffer overflow while painting non-displayable SVG
* MFSA 2017-19/CVE-2017-7785: Buffer overflow manipulating ARIA attributes in DOM
* MFSA 2017-19/CVE-2017-7784: Use-after-free with image observers
* MFSA 2017-19/CVE-2017-7753: Out-of-bounds read with cached style data and pseudo-elements
* MFSA 2017-19/CVE-2017-7798: XUL injection in the style editor in devtools
* MFSA 2017-19/CVE-2017-7804: Memory protection bypass through WindowsDllDetourPatcher
* MFSA 2017-19/CVE-2017-7779: Memory safety bugs fixed in Firefox 55 and Firefox ESR 52.3
* MFSA 2017-19/CVE-2017-7800: Use-after-free in WebSockets during disconnection
* MFSA 2017-19/CVE-2017-7801: Use-after-free with marquee during window resizing
* MFSA 2017-19/CVE-2017-7802: Use-after-free resizing image elements
* MFSA 2017-19/CVE-2017-7803: CSP containing 'sandbox' improperly applied

This update also fixes:

-  fixed firefox hangs after a while in FUTEX_WAIT_PRIVATE if
   cgroups enabled and running on cpu &gt;=1 (bsc#1031485)
-  The Itanium ia64 build was fixed.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-30"/>
	<updated date="2017-08-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1031485">SUSE bug 1031485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7753/">CVE-2017-7753 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7753">CVE-2017-7753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7779/">CVE-2017-7779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7779">CVE-2017-7779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7782/">CVE-2017-7782 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7782">CVE-2017-7782 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7784/">CVE-2017-7784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7784">CVE-2017-7784 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7785/">CVE-2017-7785 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7785">CVE-2017-7785 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7786/">CVE-2017-7786 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7786">CVE-2017-7786 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7787/">CVE-2017-7787 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7787">CVE-2017-7787 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7791/">CVE-2017-7791 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7791">CVE-2017-7791 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7792/">CVE-2017-7792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7792">CVE-2017-7792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7798/">CVE-2017-7798 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7798">CVE-2017-7798 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7800/">CVE-2017-7800 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7800">CVE-2017-7800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7801/">CVE-2017-7801 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7801">CVE-2017-7801 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7802/">CVE-2017-7802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7802">CVE-2017-7802 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7803/">CVE-2017-7803 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7803">CVE-2017-7803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7804/">CVE-2017-7804 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7804">CVE-2017-7804 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7807/">CVE-2017-7807 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7807">CVE-2017-7807 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577192" comment="MozillaFirefox-52.3.0esr-72.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577193" comment="MozillaFirefox-branding-SLED-52-24.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577194" comment="MozillaFirefox-translations-52.3.0esr-72.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577192" comment="MozillaFirefox-52.3.0esr-72.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577193" comment="MozillaFirefox-branding-SLED-52-24.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577194" comment="MozillaFirefox-translations-52.3.0esr-72.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218261" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1068101" ref_url="https://bugzilla.suse.com/1068101" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7826" ref_url="https://www.suse.com/security/cve/CVE-2017-7826/" source="CVE"/>
		<reference ref_id="CVE-2017-7828" ref_url="https://www.suse.com/security/cve/CVE-2017-7828/" source="CVE"/>
		<reference ref_id="CVE-2017-7830" ref_url="https://www.suse.com/security/cve/CVE-2017-7830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003479.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox ESR 52.5 fixes the following issues:

Security issues fixed:
- CVE-2017-7826: Memory safety bugs fixed (bsc#1068101).
- CVE-2017-7828: Use-after-free of PressShell while restyling layout (bsc#1068101).
- CVE-2017-7830: Cross-origin URL information leak through Resource Timing API (bsc#1068101).

Mozilla Foundation Security Advisory (MFSA 2017-25):
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-25/
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-07"/>
	<updated date="2017-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068101">SUSE bug 1068101</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7826/">CVE-2017-7826 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7826">CVE-2017-7826 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7828/">CVE-2017-7828 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7828">CVE-2017-7828 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7830/">CVE-2017-7830 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7830">CVE-2017-7830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577195" comment="MozillaFirefox-52.5.0esr-72.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577196" comment="MozillaFirefox-translations-52.5.0esr-72.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577195" comment="MozillaFirefox-52.5.0esr-72.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577196" comment="MozillaFirefox-translations-52.5.0esr-72.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218262" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1077291" ref_url="https://bugzilla.suse.com/1077291" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5089" ref_url="https://www.suse.com/security/cve/CVE-2018-5089/" source="CVE"/>
		<reference ref_id="CVE-2018-5091" ref_url="https://www.suse.com/security/cve/CVE-2018-5091/" source="CVE"/>
		<reference ref_id="CVE-2018-5095" ref_url="https://www.suse.com/security/cve/CVE-2018-5095/" source="CVE"/>
		<reference ref_id="CVE-2018-5096" ref_url="https://www.suse.com/security/cve/CVE-2018-5096/" source="CVE"/>
		<reference ref_id="CVE-2018-5097" ref_url="https://www.suse.com/security/cve/CVE-2018-5097/" source="CVE"/>
		<reference ref_id="CVE-2018-5098" ref_url="https://www.suse.com/security/cve/CVE-2018-5098/" source="CVE"/>
		<reference ref_id="CVE-2018-5099" ref_url="https://www.suse.com/security/cve/CVE-2018-5099/" source="CVE"/>
		<reference ref_id="CVE-2018-5102" ref_url="https://www.suse.com/security/cve/CVE-2018-5102/" source="CVE"/>
		<reference ref_id="CVE-2018-5103" ref_url="https://www.suse.com/security/cve/CVE-2018-5103/" source="CVE"/>
		<reference ref_id="CVE-2018-5104" ref_url="https://www.suse.com/security/cve/CVE-2018-5104/" source="CVE"/>
		<reference ref_id="CVE-2018-5117" ref_url="https://www.suse.com/security/cve/CVE-2018-5117/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003706.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version ESR 52.6 fixes several issues.

These security issues were fixed:

- CVE-2018-5091: Use-after-free with DTMF timers (bsc#1077291).
- CVE-2018-5095: Integer overflow in Skia library during edge builder allocation (bsc#1077291).
- CVE-2018-5096: Use-after-free while editing form elements (bsc#1077291).
- CVE-2018-5097: Use-after-free when source document is manipulated during XSLT (bsc#1077291).
- CVE-2018-5098: Use-after-free while manipulating form input elements (bsc#1077291).
- CVE-2018-5099: Use-after-free with widget listener (bsc#1077291).
- CVE-2018-5102: Use-after-free in HTML media elements (bsc#1077291).
- CVE-2018-5103: Use-after-free during mouse event handling (bsc#1077291).
- CVE-2018-5104: Use-after-free during font face manipulation (bsc#1077291).
- CVE-2018-5117: URL spoofing with right-to-left text aligned left-to-right (bsc#1077291).
- CVE-2018-5089: Various memory safety bugs (bsc#1077291).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-05"/>
	<updated date="2018-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5089/">CVE-2018-5089 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5089">CVE-2018-5089 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5091/">CVE-2018-5091 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5091">CVE-2018-5091 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5095/">CVE-2018-5095 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5095">CVE-2018-5095 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5096/">CVE-2018-5096 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5096">CVE-2018-5096 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5097/">CVE-2018-5097 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5097">CVE-2018-5097 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5098/">CVE-2018-5098 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5098">CVE-2018-5098 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5099/">CVE-2018-5099 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5099">CVE-2018-5099 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5102/">CVE-2018-5102 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5102">CVE-2018-5102 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5103/">CVE-2018-5103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5103">CVE-2018-5103 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5104/">CVE-2018-5104 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5104">CVE-2018-5104 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5117/">CVE-2018-5117 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5117">CVE-2018-5117 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577197" comment="MozillaFirefox-52.6.0esr-72.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577198" comment="MozillaFirefox-translations-52.6.0esr-72.20.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577197" comment="MozillaFirefox-52.6.0esr-72.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577198" comment="MozillaFirefox-translations-52.6.0esr-72.20.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218263" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1085130" ref_url="https://bugzilla.suse.com/1085130" source="BUGZILLA"/>
		<reference ref_id="1085671" ref_url="https://bugzilla.suse.com/1085671" source="BUGZILLA"/>
		<reference ref_id="1087059" ref_url="https://bugzilla.suse.com/1087059" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5125" ref_url="https://www.suse.com/security/cve/CVE-2018-5125/" source="CVE"/>
		<reference ref_id="CVE-2018-5127" ref_url="https://www.suse.com/security/cve/CVE-2018-5127/" source="CVE"/>
		<reference ref_id="CVE-2018-5129" ref_url="https://www.suse.com/security/cve/CVE-2018-5129/" source="CVE"/>
		<reference ref_id="CVE-2018-5130" ref_url="https://www.suse.com/security/cve/CVE-2018-5130/" source="CVE"/>
		<reference ref_id="CVE-2018-5131" ref_url="https://www.suse.com/security/cve/CVE-2018-5131/" source="CVE"/>
		<reference ref_id="CVE-2018-5144" ref_url="https://www.suse.com/security/cve/CVE-2018-5144/" source="CVE"/>
		<reference ref_id="CVE-2018-5145" ref_url="https://www.suse.com/security/cve/CVE-2018-5145/" source="CVE"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<reference ref_id="CVE-2018-5147" ref_url="https://www.suse.com/security/cve/CVE-2018-5147/" source="CVE"/>
		<reference ref_id="CVE-2018-5148" ref_url="https://www.suse.com/security/cve/CVE-2018-5148/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed in Firefox ESR 52.7.3 (bsc#1085130):

- CVE-2018-5125: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7
- CVE-2018-5127: Buffer overflow manipulating SVG animatedPathSegList
- CVE-2018-5129: Out-of-bounds write with malformed IPC messages
- CVE-2018-5130: Mismatched RTP payload type can trigger memory corruption
- CVE-2018-5131: Fetch API improperly returns cached copies of no-store/no-cache resources
- CVE-2018-5144: Integer overflow during Unicode conversion
- CVE-2018-5145: Memory safety bugs fixed in Firefox ESR 52.7
- CVE-2018-5146: Out of bounds memory write in libvorbis (bsc#1085671)
- CVE-2018-5147: Out of bounds memory write in libtremor (bsc#1085671)
- CVE-2018-5148: Use-after-free in compositor (MFSA 2018-10) (bsc#1087059)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-10"/>
	<updated date="2018-04-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085671">SUSE bug 1085671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087059">SUSE bug 1087059</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5125/">CVE-2018-5125 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5125">CVE-2018-5125 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5127/">CVE-2018-5127 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5127">CVE-2018-5127 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5129/">CVE-2018-5129 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5129">CVE-2018-5129 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5130/">CVE-2018-5130 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5130">CVE-2018-5130 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5131/">CVE-2018-5131 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5131">CVE-2018-5131 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5144/">CVE-2018-5144 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5144">CVE-2018-5144 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5145/">CVE-2018-5145 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5145">CVE-2018-5145 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5146">CVE-2018-5146 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5147/">CVE-2018-5147 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5147">CVE-2018-5147 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5148/">CVE-2018-5148 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5148">CVE-2018-5148 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577199" comment="MozillaFirefox-52.7.3esr-72.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577200" comment="MozillaFirefox-translations-52.7.3esr-72.27.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577199" comment="MozillaFirefox-52.7.3esr-72.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577200" comment="MozillaFirefox-translations-52.7.3esr-72.27.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218264" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1092548" ref_url="https://bugzilla.suse.com/1092548" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox to ESR 52.8 release fixes the following issues:

Update to Firefox ESR 52.8 (bsc#1092548)

Security issues fixed:

- MFSA 2018-12/CVE-2018-5159: Integer overflow and out-of-bounds write in Skia
- MFSA 2018-12/CVE-2018-5158: Malicious PDF can inject JavaScript into PDF Viewer
- MFSA 2018-12/CVE-2018-5168: Lightweight themes can be installed without user interaction
- MFSA 2018-12/CVE-2018-5150: Memory safety bugs fixed in Firefox 60 and Firefox ESR 52.8
- MFSA 2018-12/CVE-2018-5155: Use-after-free with SVG animations and text paths
- MFSA 2018-12/CVE-2018-5183: Backport critical security fixes in Skia
- MFSA 2018-12/CVE-2018-5157: Same-origin bypass of PDF Viewer to view protected PDF files
- MFSA 2018-12/CVE-2018-5154: Use-after-free with SVG animations and clip paths
- MFSA 2018-12/CVE-2018-5178: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5150">CVE-2018-5150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5154">CVE-2018-5154 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5155">CVE-2018-5155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5157">CVE-2018-5157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5158">CVE-2018-5158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5159">CVE-2018-5159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5168">CVE-2018-5168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5174">CVE-2018-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5178">CVE-2018-5178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5183">CVE-2018-5183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577201" comment="MozillaFirefox-52.8.0esr-72.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577202" comment="MozillaFirefox-translations-52.8.0esr-72.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577201" comment="MozillaFirefox-52.8.0esr-72.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577202" comment="MozillaFirefox-translations-52.8.0esr-72.32.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218265" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1096449" ref_url="https://bugzilla.suse.com/1096449" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6126" ref_url="https://www.suse.com/security/cve/CVE-2018-6126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004220.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following security issue:

- CVE-2018-6126: Prevent heap buffer overflow in rasterizing paths in SVG with Skia (bsc#1096449).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-27"/>
	<updated date="2018-06-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096449">SUSE bug 1096449</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6126/">CVE-2018-6126 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6126">CVE-2018-6126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577203" comment="MozillaFirefox-52.8.1esr-72.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577204" comment="MozillaFirefox-translations-52.8.1esr-72.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577203" comment="MozillaFirefox-52.8.1esr-72.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577204" comment="MozillaFirefox-translations-52.8.1esr-72.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218266" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1098998" ref_url="https://bugzilla.suse.com/1098998" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359/" source="CVE"/>
		<reference ref_id="CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360/" source="CVE"/>
		<reference ref_id="CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362/" source="CVE"/>
		<reference ref_id="CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363/" source="CVE"/>
		<reference ref_id="CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364/" source="CVE"/>
		<reference ref_id="CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365/" source="CVE"/>
		<reference ref_id="CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366/" source="CVE"/>
		<reference ref_id="CVE-2018-12368" ref_url="https://www.suse.com/security/cve/CVE-2018-12368/" source="CVE"/>
		<reference ref_id="CVE-2018-5156" ref_url="https://www.suse.com/security/cve/CVE-2018-5156/" source="CVE"/>
		<reference ref_id="CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version ESR 52.9 fixes the following issues:

- CVE-2018-5188: Various memory safety bugs (bsc#1098998)
- CVE-2018-12368: No warning when opening executable SettingContent-ms files
- CVE-2018-12366: Invalid data handling during QCMS transformations
- CVE-2018-12365: Compromised IPC child process can list local filenames
- CVE-2018-12364: CSRF attacks through 307 redirects and NPAPI plugins
- CVE-2018-12363: Use-after-free when appending DOM nodes
- CVE-2018-12362: Integer overflow in SSSE3 scaler
- CVE-2018-12360: Use-after-free when using focus()
- CVE-2018-5156: Media recorder segmentation fault when track type is changed during capture
- CVE-2018-12359: Buffer overflow using computed size of canvas element
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12359">CVE-2018-12359 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12360">CVE-2018-12360 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12362">CVE-2018-12362 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12363">CVE-2018-12363 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12364">CVE-2018-12364 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12365">CVE-2018-12365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12366">CVE-2018-12366 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12368/">CVE-2018-12368 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12368">CVE-2018-12368 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5156/">CVE-2018-5156 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5156">CVE-2018-5156 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5188">CVE-2018-5188 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577205" comment="MozillaFirefox-52.9.0esr-72.38.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577206" comment="MozillaFirefox-translations-52.9.0esr-72.38.6 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577205" comment="MozillaFirefox-52.9.0esr-72.38.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577206" comment="MozillaFirefox-translations-52.9.0esr-72.38.6 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218267" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1137792" ref_url="https://bugzilla.suse.com/1137792" source="BUGZILLA"/>
		<reference ref_id="1138614" ref_url="https://bugzilla.suse.com/1138614" source="BUGZILLA"/>
		<reference ref_id="1138872" ref_url="https://bugzilla.suse.com/1138872" source="BUGZILLA"/>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11707" ref_url="https://www.suse.com/security/cve/CVE-2019-11707/" source="CVE"/>
		<reference ref_id="CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708/" source="CVE"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<description>
This update for MozillaFirefox to version ESR 60.8 fixes the following issues:

Security issues fixed:

- CVE-2019-9811: Sandbox escape via installation of malicious language pack (bsc#1140868).
- CVE-2019-11711: Script injection within domain through inner window reuse (bsc#1140868).
- CVE-2019-11712: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects (bsc#1140868).
- CVE-2019-11713: Use-after-free with HTTP/2 cached stream (bsc#1140868).
- CVE-2019-11729: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (bsc#1140868).
- CVE-2019-11715: HTML parsing error can contribute to content XSS (bsc#1140868).
- CVE-2019-11717: Caret character improperly escaped in origins (bsc#1140868).
- CVE-2019-11719: Out-of-bounds read when importing curve25519 private key (bsc#1140868).
- CVE-2019-11730: Same-origin policy treats all files in a directory as having the same-origin (bsc#1140868).
- CVE-2019-11709: Multiple Memory safety bugs fixed (bsc#1140868).
- CVE-2019-11708: Fix sandbox escape using Prompt:Open (bsc#1138872).
- CVE-2019-11707: Fixed a type confusion vulnerability in Arrary.pop (bsc#1138614)    

Non-security issues fixed:

- Fix broken language plugins (bsc#1137792)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-17"/>
	<updated date="2019-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137792">SUSE bug 1137792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138614">SUSE bug 1138614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138872">SUSE bug 1138872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11707/">CVE-2019-11707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11707">CVE-2019-11707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11708">CVE-2019-11708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11709">CVE-2019-11709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11711">CVE-2019-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11712">CVE-2019-11712 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11713">CVE-2019-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11715">CVE-2019-11715 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11717">CVE-2019-11717 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11719">CVE-2019-11719 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11729">CVE-2019-11729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11730">CVE-2019-11730 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9811">CVE-2019-9811 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570564" comment="MozillaFirefox-60.8.0esr-78.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570565" comment="MozillaFirefox-translations-common-60.8.0esr-78.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570566" comment="MozillaFirefox-translations-other-60.8.0esr-78.43.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218268" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1158328" ref_url="https://bugzilla.suse.com/1158328" source="BUGZILLA"/>
		<reference ref_id="1158527" ref_url="https://bugzilla.suse.com/1158527" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-13722" ref_url="https://www.suse.com/security/cve/CVE-2019-13722/" source="CVE"/>
		<reference ref_id="CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005/" source="CVE"/>
		<reference ref_id="CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008/" source="CVE"/>
		<reference ref_id="CVE-2019-17009" ref_url="https://www.suse.com/security/cve/CVE-2019-17009/" source="CVE"/>
		<reference ref_id="CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010/" source="CVE"/>
		<reference ref_id="CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011/" source="CVE"/>
		<reference ref_id="CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012/" source="CVE"/>
		<description>
This update for MozillaFirefox, mozilla-nspr, mozilla-nss fixes the following issues:

Update Firefox Extended Support Release to 68.3.0 ESR (MFSA 2019-37 / bsc#1158328)

Security issues fixed:

- CVE-2019-17008: Use-after-free in worker destruction (bmo#1546331).
- CVE-2019-13722: Stack corruption due to incorrect number of arguments in WebRTC code (bmo#1580156).
- CVE-2019-11745: Out of bounds write in NSS when encrypting with a block cipher (bmo#1586176).
- CVE-2019-17009: Updater temporary files accessible to unprivileged processes (bmo#1510494).
- CVE-2019-17010: Use-after-free when performing device orientation checks (bmo#1581084).
- CVE-2019-17005: Buffer overflow in plain text serializer (bmo#1584170).
- CVE-2019-17011: Use-after-free when retrieving a document in antitracking (bmo#1591334).
- CVE-2019-17012: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3 (bmo#1449736, bmo#1533957, bmo#1560667, bmo#1567209, bmo#1580288, bmo#1585760, bmo#1592502).

Update mozilla-nss to version 3.47.1 (bsc#1158527):

Security issues fixed:

- CVE-2019-11745: EncryptUpdate should use maxout, not block size.

Bug fixes:

- Fix a crash that could be caused by client certificates during startup (bmo#1590495, bsc#1158527)
- Fix compile-time warnings from uninitialized variables in a perl script (bmo#1589810)
- Support AES HW acceleration on ARMv8 (bmo#1152625)
- Allow per-socket run-time ordering of the cipher suites presented in ClientHello (bmo#1267894)
- Add CMAC to FreeBL and PKCS #11 libraries (bmo#1570501)
- Remove arbitrary HKDF output limit by allocating space as needed (bmo#1577953)

Update mozilla-nspr to version 4.23:

Bug fixes:

- fixed a build failure that was introduced in 4.22
- correctness fix for Win64 socket polling
- whitespace in C files was cleaned up and no longer uses tab characters for indenting
- added support for the ARC architecture
- removed support for the following platforms: OSF1/Tru64, DGUX, IRIX, Symbian, BeOS
- correctness and build fixes
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-20"/>
	<updated date="2019-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158527">SUSE bug 1158527</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11745">CVE-2019-11745 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13722/">CVE-2019-13722 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13722">CVE-2019-13722 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17005">CVE-2019-17005 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17008">CVE-2019-17008 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17009/">CVE-2019-17009 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17009">CVE-2019-17009 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17010">CVE-2019-17010 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17011">CVE-2019-17011 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17012">CVE-2019-17012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570567" comment="MozillaFirefox-68.3.0-78.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570568" comment="MozillaFirefox-translations-common-68.3.0-78.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570569" comment="MozillaFirefox-translations-other-68.3.0-78.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570570" comment="libfreebl3-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570571" comment="libfreebl3-32bit-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570572" comment="libsoftokn3-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570573" comment="libsoftokn3-32bit-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570574" comment="mozilla-nspr-4.23-29.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570575" comment="mozilla-nspr-32bit-4.23-29.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570576" comment="mozilla-nss-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570577" comment="mozilla-nss-32bit-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570578" comment="mozilla-nss-certs-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570579" comment="mozilla-nss-certs-32bit-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570580" comment="mozilla-nss-tools-3.47.1-38.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218269" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1160305" ref_url="https://bugzilla.suse.com/1160305" source="BUGZILLA"/>
		<reference ref_id="1160498" ref_url="https://bugzilla.suse.com/1160498" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17015" ref_url="https://www.suse.com/security/cve/CVE-2019-17015/" source="CVE"/>
		<reference ref_id="CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016/" source="CVE"/>
		<reference ref_id="CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017/" source="CVE"/>
		<reference ref_id="CVE-2019-17021" ref_url="https://www.suse.com/security/cve/CVE-2019-17021/" source="CVE"/>
		<reference ref_id="CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022/" source="CVE"/>
		<reference ref_id="CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024/" source="CVE"/>
		<reference ref_id="CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-03 (bsc#1160498)
  * CVE-2019-17026 (bmo#1607443)
    IonMonkey type confusion with StoreElementHole and
    FallibleStoreElement 

- Firefox Extended Support Release 68.4.0 ESR
  * Fixed: Various security fixes
  MFSA 2020-02 (bsc#1160305)
  * CVE-2019-17015 (bmo#1599005)
    Memory corruption in parent process during new content
    process initialization on Windows
  * CVE-2019-17016 (bmo#1599181)
    Bypass of @namespace CSS sanitization during pasting
  * CVE-2019-17017 (bmo#1603055)
    Type Confusion in XPCVariant.cpp
  * CVE-2019-17021 (bmo#1599008)
    Heap address disclosure in parent process during content
    process initialization on Windows
  * CVE-2019-17022 (bmo#1602843)
    CSS sanitization does not escape HTML tags
  * CVE-2019-17024 (bmo#1507180, bmo#1595470, bmo#1598605,
    bmo#1601826)
    Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-10"/>
	<updated date="2020-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160498">SUSE bug 1160498</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17015/">CVE-2019-17015 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17015">CVE-2019-17015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17016">CVE-2019-17016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17017">CVE-2019-17017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17021/">CVE-2019-17021 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17021">CVE-2019-17021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17022">CVE-2019-17022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17024">CVE-2019-17024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17026">CVE-2019-17026 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570581" comment="MozillaFirefox-68.4.1-78.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570582" comment="MozillaFirefox-translations-common-68.4.1-78.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570583" comment="MozillaFirefox-translations-other-68.4.1-78.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218270" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1161799" ref_url="https://bugzilla.suse.com/1161799" source="BUGZILLA"/>
		<reference ref_id="1163368" ref_url="https://bugzilla.suse.com/1163368" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6796" ref_url="https://www.suse.com/security/cve/CVE-2020-6796/" source="CVE"/>
		<reference ref_id="CVE-2020-6797" ref_url="https://www.suse.com/security/cve/CVE-2020-6797/" source="CVE"/>
		<reference ref_id="CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798/" source="CVE"/>
		<reference ref_id="CVE-2020-6799" ref_url="https://www.suse.com/security/cve/CVE-2020-6799/" source="CVE"/>
		<reference ref_id="CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox was updated to version 68.5.0 ESR (bsc#1163368).


Security issues fixed:

- CVE-2020-6796: Fixed a missing bounds check on shared memory in the parent process (bsc#1163368).
- CVE-2020-6798: Fixed a JavaScript code injection issue caused by the incorrect parsing of template tags (bsc#1163368).
- CVE-2020-6799: Fixed a local arbitrary code execution issue when handling PDF links from other applications (bsc#1163368).
- CVE-2020-6800: Fixed several memory safety bugs (bsc#1163368).


Non-security issues fixed:

- Fixed various issues opening files with spaces in their path (bmo#1601905, bmo#1602726).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-24"/>
	<updated date="2020-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1161799">SUSE bug 1161799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6796/">CVE-2020-6796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6796">CVE-2020-6796 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6797/">CVE-2020-6797 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6797">CVE-2020-6797 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6798">CVE-2020-6798 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6799/">CVE-2020-6799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6799">CVE-2020-6799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6800">CVE-2020-6800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570584" comment="MozillaFirefox-68.5.0-78.61.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570585" comment="MozillaFirefox-translations-common-68.5.0-78.61.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570586" comment="MozillaFirefox-translations-other-68.5.0-78.61.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218271" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1132665" ref_url="https://bugzilla.suse.com/1132665" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805/" source="CVE"/>
		<reference ref_id="CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806/" source="CVE"/>
		<reference ref_id="CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807/" source="CVE"/>
		<reference ref_id="CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811/" source="CVE"/>
		<reference ref_id="CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812/" source="CVE"/>
		<reference ref_id="CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

MozillaFirefox was updated to 68.6.0 ESR (MFSA 2020-09 bsc#1132665)

- CVE-2020-6805: Fixed a use-after-free when removing data about origins
- CVE-2020-6806: Fixed improper protections against state confusion
- CVE-2020-6807: Fixed a use-after-free in cubeb during stream destruction
- CVE-2020-6811: Fixed an issue where copy as cURL' feature did not fully
  escape website-controlled data potentially leading to command injection
- CVE-2019-20503: Fixed out of bounds reads in sctp_load_addresses_from_init
- CVE-2020-6812: Fixed an issue where the names of AirPods with personally
  identifiable information were exposed to websites with camera or microphone
  permission
- CVE-2020-6814: Fixed multiple memory safety bugs
- Fixed an issue with minimizing a window (bsc#1132665).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-12"/>
	<updated date="2020-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132665">SUSE bug 1132665</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20503">CVE-2019-20503 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6805">CVE-2020-6805 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6806">CVE-2020-6806 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6807">CVE-2020-6807 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6811">CVE-2020-6811 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6812">CVE-2020-6812 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6814">CVE-2020-6814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570587" comment="MozillaFirefox-68.6.0-78.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570588" comment="MozillaFirefox-translations-common-68.6.0-78.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570589" comment="MozillaFirefox-translations-other-68.6.0-78.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218272" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1168630" ref_url="https://bugzilla.suse.com/1168630" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819/" source="CVE"/>
		<reference ref_id="CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.6.1 ESR
  MFSA 2020-11 (bsc#1168630)
  * CVE-2020-6819 (bmo#1620818)
    Use-after-free while running the nsDocShell destructor
  * CVE-2020-6820 (bmo#1626728)
    Use-after-free when handling a ReadableStream
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-07"/>
	<updated date="2020-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6819">CVE-2020-6819 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6820">CVE-2020-6820 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570590" comment="MozillaFirefox-68.6.1-78.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570591" comment="MozillaFirefox-translations-common-68.6.1-78.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570592" comment="MozillaFirefox-translations-other-68.6.1-78.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218273" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1168874" ref_url="https://bugzilla.suse.com/1168874" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821/" source="CVE"/>
		<reference ref_id="CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822/" source="CVE"/>
		<reference ref_id="CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825/" source="CVE"/>
		<reference ref_id="CVE-2020-6827" ref_url="https://www.suse.com/security/cve/CVE-2020-6827/" source="CVE"/>
		<reference ref_id="CVE-2020-6828" ref_url="https://www.suse.com/security/cve/CVE-2020-6828/" source="CVE"/>
		<description>
This update for MozillaFirefox to version 68.7.0 ESR fixes the following issues:

- CVE-2020-6821: Uninitialized memory could be read when using the WebGL copyTexSubImage method (bsc#1168874).
- CVE-2020-6822: Fixed out of bounds write in GMPDecodeData when processing large images (bsc#1168874).
- CVE-2020-6825: Fixed Memory safety bugs (bsc#1168874).
- CVE-2020-6827: Custom Tabs could have the URI spoofed (bsc#1168874).
- CVE-2020-6828: Preference overwrite via crafted Intent (bsc#1168874).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-09"/>
	<updated date="2020-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6821">CVE-2020-6821 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6822">CVE-2020-6822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6825">CVE-2020-6825 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6827/">CVE-2020-6827 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6827">CVE-2020-6827 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6828/">CVE-2020-6828 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6828">CVE-2020-6828 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570593" comment="MozillaFirefox-68.7.0-78.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570594" comment="MozillaFirefox-translations-common-68.7.0-78.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570595" comment="MozillaFirefox-translations-other-68.7.0-78.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218274" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1162828" ref_url="https://bugzilla.suse.com/1162828" source="BUGZILLA"/>
		<reference ref_id="1171186" ref_url="https://bugzilla.suse.com/1171186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-12388" ref_url="https://www.suse.com/security/cve/CVE-2020-12388/" source="CVE"/>
		<reference ref_id="CVE-2020-12389" ref_url="https://www.suse.com/security/cve/CVE-2020-12389/" source="CVE"/>
		<reference ref_id="CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392/" source="CVE"/>
		<reference ref_id="CVE-2020-12393" ref_url="https://www.suse.com/security/cve/CVE-2020-12393/" source="CVE"/>
		<reference ref_id="CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:


- Firefox Extended Support Release 68.8.0 ESR
  MFSA 2020-17 (bsc#1171186)
  * CVE-2020-12387 (bmo#1545345)
    Use-after-free during worker shutdown
  * CVE-2020-12388 (bmo#1618911)
    Sandbox escape with improperly guarded Access Tokens
  * CVE-2020-12389 (bmo#1554110)
    Sandbox escape with improperly separated process types
  * CVE-2020-6831 (bmo#1632241)
    Buffer overflow in SCTP chunk input validation
  * CVE-2020-12392 (bmo#1614468)
    Arbitrary local file access with 'Copy as cURL'
  * CVE-2020-12393 (bmo#1615471)
    Devtools' 'Copy as cURL' feature did not fully escape
    website-controlled data, potentially leading to command
    injection
  * CVE-2020-12395 (bmo#1595886, bmo#1611482, bmo#1614704,
    bmo#1624098, bmo#1625749, bmo#1626382, bmo#1628076,
    bmo#1631508)
    Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8

- Since firefox-gcc8 now has disabled autoreqprov for firefox-libstdc++6
  and firefox-libgcc_s1, those packages don't provide some capabilities,
  we have to disable AutoReqProv in MozillaFirefox too so they're not added as
  automatic requirements. (bsc#1162828)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-08"/>
	<updated date="2020-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162828">SUSE bug 1162828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12387">CVE-2020-12387 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12388/">CVE-2020-12388 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12388">CVE-2020-12388 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12389/">CVE-2020-12389 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12389">CVE-2020-12389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12392">CVE-2020-12392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12393/">CVE-2020-12393 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12393">CVE-2020-12393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12395">CVE-2020-12395 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6831">CVE-2020-6831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570596" comment="MozillaFirefox-68.8.0-78.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570597" comment="MozillaFirefox-translations-common-68.8.0-78.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570598" comment="MozillaFirefox-translations-other-68.8.0-78.73.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218275" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172402" ref_url="https://bugzilla.suse.com/1172402" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405/" source="CVE"/>
		<reference ref_id="CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406/" source="CVE"/>
		<reference ref_id="CVE-2020-12410" ref_url="https://www.suse.com/security/cve/CVE-2020-12410/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- MozillaFirefox was updated to version 68.9.0 Extended Support Release (bsc#1172402).

- CVE-2020-12405: Fixed a use-after-free in SharedWorkerService. 
- CVE-2020-12406: Fixed a JavaScript Type confusion with NativeTypes.
- CVE-2020-12410: Fixed multiple memory safety bugs.	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12405">CVE-2020-12405 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12406">CVE-2020-12406 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12410/">CVE-2020-12410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12410">CVE-2020-12410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570599" comment="MozillaFirefox-68.9.0-78.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570600" comment="MozillaFirefox-translations-common-68.9.0-78.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570601" comment="MozillaFirefox-translations-other-68.9.0-78.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218276" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1166238" ref_url="https://bugzilla.suse.com/1166238" source="BUGZILLA"/>
		<reference ref_id="1167231" ref_url="https://bugzilla.suse.com/1167231" source="BUGZILLA"/>
		<reference ref_id="1173576" ref_url="https://bugzilla.suse.com/1173576" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="CVE-2020-12415" ref_url="https://www.suse.com/security/cve/CVE-2020-12415/" source="CVE"/>
		<reference ref_id="CVE-2020-12416" ref_url="https://www.suse.com/security/cve/CVE-2020-12416/" source="CVE"/>
		<reference ref_id="CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417/" source="CVE"/>
		<reference ref_id="CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419/" source="CVE"/>
		<reference ref_id="CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421/" source="CVE"/>
		<reference ref_id="CVE-2020-12422" ref_url="https://www.suse.com/security/cve/CVE-2020-12422/" source="CVE"/>
		<reference ref_id="CVE-2020-12423" ref_url="https://www.suse.com/security/cve/CVE-2020-12423/" source="CVE"/>
		<reference ref_id="CVE-2020-12424" ref_url="https://www.suse.com/security/cve/CVE-2020-12424/" source="CVE"/>
		<reference ref_id="CVE-2020-12425" ref_url="https://www.suse.com/security/cve/CVE-2020-12425/" source="CVE"/>
		<reference ref_id="CVE-2020-12426" ref_url="https://www.suse.com/security/cve/CVE-2020-12426/" source="CVE"/>
		<description>
This update for MozillaFirefox to version 78.0.1 ESR fixes the following issues:

Security issues fixed:

- CVE-2020-12415: AppCache manifest poisoning due to url encoded character processing (bsc#1173576).
- CVE-2020-12416: Use-after-free in WebRTC VideoBroadcaster (bsc#1173576).
- CVE-2020-12417: Memory corruption due to missing sign-extension for ValueTags on ARM64 (bsc#1173576).
- CVE-2020-12418: Information disclosure due to manipulated URL object (bsc#1173576).
- CVE-2020-12419: Use-after-free in nsGlobalWindowInner (bsc#1173576).
- CVE-2020-12420: Use-After-Free when trying to connect to a STUN server (bsc#1173576).
- CVE-2020-12402: RSA Key Generation vulnerable to side-channel attack (bsc#1173576).
- CVE-2020-12421: Add-On updates did not respect the same certificate trust rules as software updates (bsc#1173576).
- CVE-2020-12422: Integer overflow in nsJPEGEncoder::emptyOutputBuffer (bsc#1173576).
- CVE-2020-12423: DLL Hijacking due to searching %PATH% for a library (bsc#1173576).
- CVE-2020-12424: WebRTC permission prompt could have been bypassed by a compromised content process (bsc#1173576).
- CVE-2020-12425: Out of bound read in Date.parse() (bsc#1173576).
- CVE-2020-12426: Memory safety bugs fixed in Firefox 78 (bsc#1173576).
- FIPS: MozillaFirefox: allow /proc/sys/crypto/fips_enabled (bsc#1167231).

Non-security issues fixed:

- Fixed interaction with freetype6 (bsc#1173613).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-08"/>
	<updated date="2020-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167231">SUSE bug 1167231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12402">CVE-2020-12402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12415/">CVE-2020-12415 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12415">CVE-2020-12415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12416/">CVE-2020-12416 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12416">CVE-2020-12416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12417">CVE-2020-12417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12418">CVE-2020-12418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12419">CVE-2020-12419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12420">CVE-2020-12420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12421">CVE-2020-12421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12422/">CVE-2020-12422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12422">CVE-2020-12422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12423/">CVE-2020-12423 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12423">CVE-2020-12423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12424/">CVE-2020-12424 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12424">CVE-2020-12424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12425/">CVE-2020-12425 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12425">CVE-2020-12425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12426/">CVE-2020-12426 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12426">CVE-2020-12426 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570602" comment="MozillaFirefox-78.0.1-78.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570603" comment="MozillaFirefox-branding-SLED-78-21.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570604" comment="MozillaFirefox-translations-common-78.0.1-78.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570605" comment="MozillaFirefox-translations-other-78.0.1-78.80.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218277" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1173948" ref_url="https://bugzilla.suse.com/1173948" source="BUGZILLA"/>
		<reference ref_id="1173991" ref_url="https://bugzilla.suse.com/1173991" source="BUGZILLA"/>
		<reference ref_id="1174538" ref_url="https://bugzilla.suse.com/1174538" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652/" source="CVE"/>
		<reference ref_id="CVE-2020-15653" ref_url="https://www.suse.com/security/cve/CVE-2020-15653/" source="CVE"/>
		<reference ref_id="CVE-2020-15654" ref_url="https://www.suse.com/security/cve/CVE-2020-15654/" source="CVE"/>
		<reference ref_id="CVE-2020-15655" ref_url="https://www.suse.com/security/cve/CVE-2020-15655/" source="CVE"/>
		<reference ref_id="CVE-2020-15656" ref_url="https://www.suse.com/security/cve/CVE-2020-15656/" source="CVE"/>
		<reference ref_id="CVE-2020-15657" ref_url="https://www.suse.com/security/cve/CVE-2020-15657/" source="CVE"/>
		<reference ref_id="CVE-2020-15658" ref_url="https://www.suse.com/security/cve/CVE-2020-15658/" source="CVE"/>
		<reference ref_id="CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Fix broken translation-loading (boo#1173991) 
  * allow addon sideloading
  * mark signatures for langpacks non-mandatory
  * do not autodisable user profile scopes
- Google API key is not usable for geolocation service any more

- Mozilla Firefox 78.1 ESR
  * Fixed: Various stability, functionality, and security fixe
    (MFSA 2020-32) (bsc#1174538).
  * CVE-2020-15652 (bmo#1634872)
    Potential leak of redirect targets when loading scripts in a
    worker
  * CVE-2020-6514 (bmo#1642792)
    WebRTC data channel leaks internal address to peer
  * CVE-2020-15655 (bmo#1645204)
    Extension APIs could be used to bypass Same-Origin Policy
  * CVE-2020-15653 (bmo#1521542)
    Bypassing iframe sandbox when allowing popups
  * CVE-2020-6463 (bmo#1635293)
    Use-after-free in ANGLE gl::Texture::onUnbindAsSamplerTexture
  * CVE-2020-15656 (bmo#1647293)
    Type confusion for special arguments in IonMonkey
  * CVE-2020-15658 (bmo#1637745)
    Overriding file type when saving to disk
  * CVE-2020-15657 (bmo#1644954)
    DLL hijacking due to incorrect loading path
  * CVE-2020-15654 (bmo#1648333)
    Custom cursor can overlay user interface
  * CVE-2020-15659 (bmo#1550133, bmo#1633880, bmo#1643613,
    bmo#1644839, bmo#1645835, bmo#1646006, bmo#1646787,
    bmo#1649347, bmo#1650811, bmo#1651678)
    Memory safety bugs fixed in Firefox 79 and Firefox ESR 78.1

- Add sle11-icu-generation-python3.patch to fix icu-generation
  on big endian platforms 

- Mozilla Firefox 78.0.2 ESR
  * MFSA 2020-28 (bsc#1173948)
  * MFSA-2020-0003 (bmo#1644076)
    X-Frame-Options bypass using object or embed tags
  * Fixed: Fixed an accessibility regression in reader mode
    (bmo#1650922)
  * Fixed: Made the address bar more resilient to data corruption
    in the user profile (bmo#1649981)
  * Fixed: Fixed a regression opening certain external
    applications (bmo#1650162)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-18"/>
	<updated date="2020-08-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173948">SUSE bug 1173948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173991">SUSE bug 1173991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15652">CVE-2020-15652 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15653/">CVE-2020-15653 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15653">CVE-2020-15653 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15654/">CVE-2020-15654 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15654">CVE-2020-15654 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15655/">CVE-2020-15655 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15655">CVE-2020-15655 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15656/">CVE-2020-15656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15656">CVE-2020-15656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15657/">CVE-2020-15657 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15657">CVE-2020-15657 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15658/">CVE-2020-15658 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15658">CVE-2020-15658 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15659">CVE-2020-15659 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6463">CVE-2020-6463 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6514">CVE-2020-6514 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570606" comment="MozillaFirefox-78.1.0-78.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570607" comment="MozillaFirefox-translations-common-78.1.0-78.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570608" comment="MozillaFirefox-translations-other-78.1.0-78.87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218278" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174284" ref_url="https://bugzilla.suse.com/1174284" source="BUGZILLA"/>
		<reference ref_id="1175686" ref_url="https://bugzilla.suse.com/1175686" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15663" ref_url="https://www.suse.com/security/cve/CVE-2020-15663/" source="CVE"/>
		<reference ref_id="CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664/" source="CVE"/>
		<reference ref_id="CVE-2020-15670" ref_url="https://www.suse.com/security/cve/CVE-2020-15670/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.2.0 ESR
  * Fixed: Various stability, functionality, and security fixes
- Mozilla Firefox ESR 78.2
  MFSA 2020-38 (bsc#1175686)
  * CVE-2020-15663 (bmo#1643199)
    Downgrade attack on the Mozilla Maintenance Service could
    have resulted in escalation of privilege
  * CVE-2020-15664 (bmo#1658214)
    Attacker-induced prompt for extension installation
  * CVE-2020-15670 (bmo#1651001, bmo#1651449, bmo#1653626,
    bmo#1656957)
    Memory safety bugs fixed in Firefox 80 and Firefox ESR 78.2

- Fixed Firefox tab crash in FIPS mode (bsc#1174284).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-14"/>
	<updated date="2020-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174284">SUSE bug 1174284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15663/">CVE-2020-15663 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15663">CVE-2020-15663 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15664">CVE-2020-15664 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15670/">CVE-2020-15670 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15670">CVE-2020-15670 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570609" comment="MozillaFirefox-78.2.0-78.90.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570610" comment="MozillaFirefox-translations-common-78.2.0-78.90.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570611" comment="MozillaFirefox-translations-other-78.2.0-78.90.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218279" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1167976" ref_url="https://bugzilla.suse.com/1167976" source="BUGZILLA"/>
		<reference ref_id="1173986" ref_url="https://bugzilla.suse.com/1173986" source="BUGZILLA"/>
		<reference ref_id="1175046" ref_url="https://bugzilla.suse.com/1175046" source="BUGZILLA"/>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673/" source="CVE"/>
		<reference ref_id="CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676/" source="CVE"/>
		<reference ref_id="CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677/" source="CVE"/>
		<reference ref_id="CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.3.0 ESR (bsc#1176756, MFSA 2020-43)
   - CVE-2020-15677: Download origin spoofing via redirect
   - CVE-2020-15676: Fixed an XSS when pasting attacker-controlled data into a
     contenteditable element 
   - CVE-2020-15678: When recursing through layers while scrolling, an iterator
     may have become invalid, resulting in a potential use-after-free scenario
   - CVE-2020-15673: Fixed memory safety bugs 
- Attempt to fix langpack-parallelization by introducing separate
  obj-dirs for each lang (bsc#1173986, bsc#1167976)
- Fixed problems with compiler builtins on SLE-11 (bsc#1175046)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-28"/>
	<updated date="2020-09-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167976">SUSE bug 1167976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173986">SUSE bug 1173986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175046">SUSE bug 1175046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15673">CVE-2020-15673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15676">CVE-2020-15676 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15677">CVE-2020-15677 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15678">CVE-2020-15678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570612" comment="MozillaFirefox-78.3.0-78.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570613" comment="MozillaFirefox-translations-common-78.3.0-78.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570614" comment="MozillaFirefox-translations-other-78.3.0-78.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218280" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1177872" ref_url="https://bugzilla.suse.com/1177872" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.0 ESR
  * Fixed: Various stability, functionality, and security fixes MFSA 2020-46 (bsc#1177872)
  * CVE-2020-15969 Use-after-free in usersctp
  * CVE-2020-15683 Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4
  * Fixed: Fixed legacy preferences not being properly applied when set via GPO
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-26"/>
	<updated date="2020-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15683">CVE-2020-15683 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15969">CVE-2020-15969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570615" comment="MozillaFirefox-78.4.0-78.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570616" comment="MozillaFirefox-translations-common-78.4.0-78.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570617" comment="MozillaFirefox-translations-other-78.4.0-78.99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218281" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178588" ref_url="https://bugzilla.suse.com/1178588" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-49 (bsc#1178588)
  * CVE-2020-26950 (bmo#1675905)
    Write side effects in MCallGetProperty opcode not accounted
    for
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178588">SUSE bug 1178588</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26950">CVE-2020-26950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570618" comment="MozillaFirefox-78.4.1-78.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570619" comment="MozillaFirefox-translations-common-78.4.1-78.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570620" comment="MozillaFirefox-translations-other-78.4.1-78.102.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218282" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178824" ref_url="https://bugzilla.suse.com/1178824" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951/" source="CVE"/>
		<reference ref_id="CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953/" source="CVE"/>
		<reference ref_id="CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956/" source="CVE"/>
		<reference ref_id="CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958/" source="CVE"/>
		<reference ref_id="CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959/" source="CVE"/>
		<reference ref_id="CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960/" source="CVE"/>
		<reference ref_id="CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961/" source="CVE"/>
		<reference ref_id="CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965/" source="CVE"/>
		<reference ref_id="CVE-2020-26966" ref_url="https://www.suse.com/security/cve/CVE-2020-26966/" source="CVE"/>
		<reference ref_id="CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.5.0 ESR (bsc#1178824)
  * CVE-2020-26951: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code
  * CVE-2020-16012: Variable time processing of cross-origin images during drawImage calls
  * CVE-2020-26953: Fullscreen could be enabled without displaying the security UI
  * CVE-2020-26956: XSS through paste (manual and clipboard API)
  * CVE-2020-26958: Requests intercepted through ServiceWorkers lacked MIME type restrictions
  * CVE-2020-26959: Use-after-free in WebRequestService
  * CVE-2020-26960: Potential use-after-free in uses of nsTArray
  * CVE-2020-15999: Heap buffer overflow in freetype
  * CVE-2020-26961: DoH did not filter IPv4 mapped IP Addresses
  * CVE-2020-26965: Software keyboards may have remembered typed passwords
  * CVE-2020-26966: Single-word search queries were also broadcast to local network
  * CVE-2020-26968: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-20"/>
	<updated date="2020-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16012">CVE-2020-16012 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26951">CVE-2020-26951 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26953">CVE-2020-26953 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26956">CVE-2020-26956 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26958">CVE-2020-26958 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26959">CVE-2020-26959 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26960">CVE-2020-26960 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26961">CVE-2020-26961 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26965">CVE-2020-26965 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26966/">CVE-2020-26966 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26966">CVE-2020-26966 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26968">CVE-2020-26968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570621" comment="MozillaFirefox-78.5.0-78.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570622" comment="MozillaFirefox-translations-common-78.5.0-78.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570623" comment="MozillaFirefox-translations-other-78.5.0-78.105.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218283" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180039" ref_url="https://bugzilla.suse.com/1180039" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971/" source="CVE"/>
		<reference ref_id="CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973/" source="CVE"/>
		<reference ref_id="CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974/" source="CVE"/>
		<reference ref_id="CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978/" source="CVE"/>
		<reference ref_id="CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111/" source="CVE"/>
		<reference ref_id="CVE-2020-35112" ref_url="https://www.suse.com/security/cve/CVE-2020-35112/" source="CVE"/>
		<reference ref_id="CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2020-55 (bsc#1180039)
  * CVE-2020-16042 (bmo#1679003)
    Operations on a BigInt could have caused uninitialized memory
    to be exposed
  * CVE-2020-26971 (bmo#1663466)
    Heap buffer overflow in WebGL
  * CVE-2020-26973 (bmo#1680084)
    CSS Sanitizer performed incorrect sanitization
  * CVE-2020-26974 (bmo#1681022)
    Incorrect cast of StyleGenericFlexBasis resulted in a heap
    use-after-free
  * CVE-2020-26978 (bmo#1677047)
    Internal network hosts could have been probed by a malicious
    webpage
  * CVE-2020-35111 (bmo#1657916)
    The proxy.onRequest API did not catch view-source URLs
  * CVE-2020-35112 (bmo#1661365)
    Opening an extension-less download may have inadvertently
    launched an executable instead
  * CVE-2020-35113 (bmo#1664831, bmo#1673589)
    Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-21"/>
	<updated date="2020-12-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16042">CVE-2020-16042 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26971">CVE-2020-26971 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26973">CVE-2020-26973 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26974">CVE-2020-26974 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26978">CVE-2020-26978 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35111">CVE-2020-35111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35112/">CVE-2020-35112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35112">CVE-2020-35112 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35113">CVE-2020-35113 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570624" comment="MozillaFirefox-78.6.0-78.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570625" comment="MozillaFirefox-translations-common-78.6.0-78.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570626" comment="MozillaFirefox-translations-other-78.6.0-78.108.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218284" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180623" ref_url="https://bugzilla.suse.com/1180623" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.1 ESR
  * Fixed: Critical security issue MFSA 2021-01 (bsc#1180623)
  * CVE-2020-16044
    Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-12"/>
	<updated date="2021-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180623">SUSE bug 1180623</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16044">CVE-2020-16044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570627" comment="MozillaFirefox-78.6.1-78.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570628" comment="MozillaFirefox-translations-common-78.6.1-78.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570629" comment="MozillaFirefox-translations-other-78.6.1-78.111.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218285" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181414" ref_url="https://bugzilla.suse.com/1181414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976/" source="CVE"/>
		<reference ref_id="CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953/" source="CVE"/>
		<reference ref_id="CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954/" source="CVE"/>
		<reference ref_id="CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960/" source="CVE"/>
		<reference ref_id="CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.7.0 ESR  (MFSA 2021-04, bsc#1181414)
  * CVE-2021-23953: Fixed a Cross-origin information leakage via redirected PDF requests
  * CVE-2021-23954: Fixed a type confusion when using logical assignment operators in JavaScript switch statements
  * CVE-2020-26976: Fixed an issue where HTTPS pages could have been intercepted by a registered service worker when they should not have been
  * CVE-2021-23960: Fixed a use-after-poison for incorrectly redeclared JavaScript variables during GC
  * CVE-2021-23964: Fixed Memory safety bugs 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-29"/>
	<updated date="2021-01-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26976">CVE-2020-26976 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23953">CVE-2021-23953 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23954">CVE-2021-23954 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23960">CVE-2021-23960 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23964">CVE-2021-23964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570630" comment="MozillaFirefox-78.7.0-78.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570631" comment="MozillaFirefox-translations-common-78.7.0-78.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570632" comment="MozillaFirefox-translations-other-78.7.0-78.114.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218286" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181848" ref_url="https://bugzilla.suse.com/1181848" source="BUGZILLA"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.7.1 ESR (bsc#1181848)

- Fixed: Prevent access to NTFS special paths that could lead to filesystem corruption. 
- Buffer overflow in depth pitch calculations for compressed textures 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1181848">SUSE bug 1181848</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570633" comment="MozillaFirefox-78.7.1-78.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570634" comment="MozillaFirefox-translations-common-78.7.1-78.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570635" comment="MozillaFirefox-translations-other-78.7.1-78.117.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218287" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182357" ref_url="https://bugzilla.suse.com/1182357" source="BUGZILLA"/>
		<reference ref_id="1182614" ref_url="https://bugzilla.suse.com/1182614" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968/" source="CVE"/>
		<reference ref_id="CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969/" source="CVE"/>
		<reference ref_id="CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973/" source="CVE"/>
		<reference ref_id="CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.8.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2021-08 (bsc#1182614)
  * CVE-2021-23969: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23968: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23973: MediaError message property could have leaked information about cross-origin resources
  * CVE-2021-23978: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182357">SUSE bug 1182357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23968">CVE-2021-23968 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23969">CVE-2021-23969 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23973">CVE-2021-23973 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23978">CVE-2021-23978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570636" comment="MozillaFirefox-78.8.0-78.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570637" comment="MozillaFirefox-translations-common-78.8.0-78.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570638" comment="MozillaFirefox-translations-other-78.8.0-78.120.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218288" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1183942" ref_url="https://bugzilla.suse.com/1183942" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981/" source="CVE"/>
		<reference ref_id="CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982/" source="CVE"/>
		<reference ref_id="CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984/" source="CVE"/>
		<reference ref_id="CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.9.0 ESR  (MFSA 2021-11, bsc#1183942)
  * CVE-2021-23981: Texture upload into an unbound backing buffer resulted in an out-of-bound read
  * CVE-2021-23982: Internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23984: Malicious extensions could have spoofed popup information
  * CVE-2021-23987: Memory safety bugs
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-01"/>
	<updated date="2021-04-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23981">CVE-2021-23981 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23982">CVE-2021-23982 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23984">CVE-2021-23984 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23987">CVE-2021-23987 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570639" comment="MozillaFirefox-78.9.0-78.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570640" comment="MozillaFirefox-translations-common-78.9.0-78.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570641" comment="MozillaFirefox-translations-other-78.9.0-78.123.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218289" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184960" ref_url="https://bugzilla.suse.com/1184960" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23961" ref_url="https://www.suse.com/security/cve/CVE-2021-23961/" source="CVE"/>
		<reference ref_id="CVE-2021-23994" ref_url="https://www.suse.com/security/cve/CVE-2021-23994/" source="CVE"/>
		<reference ref_id="CVE-2021-23995" ref_url="https://www.suse.com/security/cve/CVE-2021-23995/" source="CVE"/>
		<reference ref_id="CVE-2021-23998" ref_url="https://www.suse.com/security/cve/CVE-2021-23998/" source="CVE"/>
		<reference ref_id="CVE-2021-23999" ref_url="https://www.suse.com/security/cve/CVE-2021-23999/" source="CVE"/>
		<reference ref_id="CVE-2021-24002" ref_url="https://www.suse.com/security/cve/CVE-2021-24002/" source="CVE"/>
		<reference ref_id="CVE-2021-29945" ref_url="https://www.suse.com/security/cve/CVE-2021-29945/" source="CVE"/>
		<reference ref_id="CVE-2021-29946" ref_url="https://www.suse.com/security/cve/CVE-2021-29946/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.10.0 ESR (bsc#1184960)
  * CVE-2021-23994: Out of bound write due to lazy initialization
  * CVE-2021-23995: Use-after-free in Responsive Design Mode
  * CVE-2021-23998: Secure Lock icon could have been spoofed
  * CVE-2021-23961: More internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23999: Blob URLs may have been granted additional privileges
  * CVE-2021-24002: Arbitrary FTP command execution on FTP servers using an encoded URL
  * CVE-2021-29945: Incorrect size computation in WebAssembly JIT could lead to null-reads
  * CVE-2021-29946: Port blocking could be bypassed
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23961/">CVE-2021-23961 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23961">CVE-2021-23961 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23994/">CVE-2021-23994 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23994">CVE-2021-23994 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23995/">CVE-2021-23995 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23995">CVE-2021-23995 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23998/">CVE-2021-23998 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23998">CVE-2021-23998 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23999/">CVE-2021-23999 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23999">CVE-2021-23999 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-24002/">CVE-2021-24002 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24002">CVE-2021-24002 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29945/">CVE-2021-29945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29945">CVE-2021-29945 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29946/">CVE-2021-29946 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29946">CVE-2021-29946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570642" comment="MozillaFirefox-78.10.0-78.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570643" comment="MozillaFirefox-translations-common-78.10.0-78.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570644" comment="MozillaFirefox-translations-other-78.10.0-78.126.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218290" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185633" ref_url="https://bugzilla.suse.com/1185633" source="BUGZILLA"/>
		<reference ref_id="1186696" ref_url="https://bugzilla.suse.com/1186696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29951" ref_url="https://www.suse.com/security/cve/CVE-2021-29951/" source="CVE"/>
		<reference ref_id="CVE-2021-29964" ref_url="https://www.suse.com/security/cve/CVE-2021-29964/" source="CVE"/>
		<reference ref_id="CVE-2021-29967" ref_url="https://www.suse.com/security/cve/CVE-2021-29967/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.11.0 ESR (bsc#1186696)

  * CVE-2021-29964: Out of bounds-read when parsing a `WM_COPYDATA` message
  * CVE-2021-29967: Memory safety bugs fixed in Firefox
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185633">SUSE bug 1185633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186696">SUSE bug 1186696</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29951/">CVE-2021-29951 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29951">CVE-2021-29951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29964/">CVE-2021-29964 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29964">CVE-2021-29964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29967/">CVE-2021-29967 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29967">CVE-2021-29967 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570645" comment="MozillaFirefox-78.11.0-78.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570646" comment="MozillaFirefox-translations-common-78.11.0-78.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570647" comment="MozillaFirefox-translations-other-78.11.0-78.131.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218291" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188275" ref_url="https://bugzilla.suse.com/1188275" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29970" ref_url="https://www.suse.com/security/cve/CVE-2021-29970/" source="CVE"/>
		<reference ref_id="CVE-2021-29976" ref_url="https://www.suse.com/security/cve/CVE-2021-29976/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.12.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-29 (bsc#1188275)

* CVE-2021-29970: Use-after-free in accessibility features of a document
* CVE-2021-30547: Out of bounds write in ANGLE
* CVE-2021-29976: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-16"/>
	<updated date="2021-07-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188275">SUSE bug 1188275</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29970/">CVE-2021-29970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29970">CVE-2021-29970 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29976/">CVE-2021-29976 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29976">CVE-2021-29976 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30547">CVE-2021-30547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625243" comment="MozillaFirefox-78.12.0-78.134.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625244" comment="MozillaFirefox-translations-common-78.12.0-78.134.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625245" comment="MozillaFirefox-translations-other-78.12.0-78.134.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218292" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.13.0 ESR (MFSA 2021-34, bsc#1188891):

- CVE-2021-29986: Race condition when resolving DNS names could have led to memory corruption
- CVE-2021-29988: Memory corruption as a result of incorrect style treatment
- CVE-2021-29984: Incorrect instruction reordering during JIT optimization
- CVE-2021-29980: Uninitialized memory in a canvas object could have led to memory corruption
- CVE-2021-29985: Use-after-free media channels
- CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-12"/>
	<updated date="2021-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630646" comment="MozillaFirefox-78.13.0-78.137.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630647" comment="MozillaFirefox-translations-common-78.13.0-78.137.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630648" comment="MozillaFirefox-translations-other-78.13.0-78.137.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218293" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1190274" ref_url="https://bugzilla.suse.com/1190274" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

This update contains the Firefox Extended Support Release 91.1.0 ESR.

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274):

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Firefox 91.0.1esr ESR

* Fixed: Fixed an issue causing buttons on the tab bar to be
  resized when loading certain websites (bug 1704404)
* Fixed: Fixed an issue which caused tabs from private windows
  to be visible in non-private windows when viewing switch-to-
  tab results in the address bar panel (bug 1720369)
* Fixed: Various stability fixes
* Fixed: Security fix MFSA 2021-37 (bsc#1189547)
* CVE-2021-29991 (bmo#1724896)
  Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

* New: Some of the highlights of the new Extended Support Release are:

  - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
  - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
  - On Windows, updates can now be applied in the background
    while Firefox is not running.
  - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
  - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
  - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
  - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
  - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
  - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
  - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
  - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
  - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
  - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
  - We’ve improved functionality and design for a number of
    Firefox search features:
    * Selecting a search engine at the bottom of the search
      panel now enters search mode for that engine, allowing you to
      see suggestions (if available) for your search terms. The old
      behavior (immediately performing a search) is available with
      a shift-click.
    * When Firefox autocompletes the URL of one of your search
      engines, you can now search with that engine directly in the
      address bar by selecting the shortcut in the address bar
      results.
    * We’ve added buttons at the bottom of the search panel to
      allow you to search your bookmarks, open tabs, and history.
  - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
  - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
  - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
* Changed: Firefox no longer supports Adobe Flash. There is no
  setting available to re-enable Flash support.
* Enterprise: Various bug fixes and new policies have been
  implemented in the latest version of Firefox. See more
  details in the Firefox for Enterprise 91 Release Notes.

  MFSA 2021-33 (bsc#1188891):

* CVE-2021-29986: Race condition when resolving DNS names could have led to
  memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting
  assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to
  memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted
  permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and
  type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-01"/>
	<updated date="2021-10-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190274">SUSE bug 1190274</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29981">CVE-2021-29981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29982">CVE-2021-29982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29983">CVE-2021-29983 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29987">CVE-2021-29987 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29990">CVE-2021-29990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29991">CVE-2021-29991 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38492">CVE-2021-38492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38495">CVE-2021-38495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634730" comment="MozillaFirefox-78.14.0-78.140.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634731" comment="MozillaFirefox-translations-common-78.14.0-78.140.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634732" comment="MozillaFirefox-translations-other-78.14.0-78.140.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218294" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192250" ref_url="https://bugzilla.suse.com/1192250" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38503" ref_url="https://www.suse.com/security/cve/CVE-2021-38503/" source="CVE"/>
		<reference ref_id="CVE-2021-38504" ref_url="https://www.suse.com/security/cve/CVE-2021-38504/" source="CVE"/>
		<reference ref_id="CVE-2021-38505" ref_url="https://www.suse.com/security/cve/CVE-2021-38505/" source="CVE"/>
		<reference ref_id="CVE-2021-38506" ref_url="https://www.suse.com/security/cve/CVE-2021-38506/" source="CVE"/>
		<reference ref_id="CVE-2021-38507" ref_url="https://www.suse.com/security/cve/CVE-2021-38507/" source="CVE"/>
		<reference ref_id="CVE-2021-38508" ref_url="https://www.suse.com/security/cve/CVE-2021-38508/" source="CVE"/>
		<reference ref_id="CVE-2021-38509" ref_url="https://www.suse.com/security/cve/CVE-2021-38509/" source="CVE"/>
		<reference ref_id="CVE-2021-38510" ref_url="https://www.suse.com/security/cve/CVE-2021-38510/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:
	  
MozillaFirefox was updated to Extended Support Release 91.3.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-49 (bsc#1192250)

  * CVE-2021-38503: iframe sandbox rules did not apply to XSLT stylesheets
  * CVE-2021-38504: Use-after-free in file picker dialog
  * CVE-2021-38505: Windows 10 Cloud Clipboard may have recorded sensitive user data
  * CVE-2021-38506: Firefox could be coaxed into going into fullscreen mode without notification or warning
  * CVE-2021-38507: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports
  * CVE-2021-38508: Permission Prompt could be overlaid, resulting in user confusion and potential spoofing
  * CVE-2021-38509: Javascript alert box could have been spoofed onto an arbitrary domain
  * CVE-2021-38510: Download Protections were bypassed by .inetloc files on Mac OS
  * MOZ-2021-0008: Use-after-free in HTTP2 Session object
  * MOZ-2021-0007: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-09"/>
	<updated date="2021-11-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38503/">CVE-2021-38503 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38503">CVE-2021-38503 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38504/">CVE-2021-38504 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38504">CVE-2021-38504 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38505/">CVE-2021-38505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38505">CVE-2021-38505 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38506/">CVE-2021-38506 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38506">CVE-2021-38506 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38507/">CVE-2021-38507 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38507">CVE-2021-38507 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38508/">CVE-2021-38508 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38508">CVE-2021-38508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38509/">CVE-2021-38509 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38509">CVE-2021-38509 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38510/">CVE-2021-38510 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38510">CVE-2021-38510 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654421" comment="MozillaFirefox-91.3.0-78.151.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654422" comment="MozillaFirefox-translations-common-91.3.0-78.151.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654423" comment="MozillaFirefox-translations-other-91.3.0-78.151.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218295" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1193321" ref_url="https://bugzilla.suse.com/1193321" source="BUGZILLA"/>
		<reference ref_id="1193485" ref_url="https://bugzilla.suse.com/1193485" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43536" ref_url="https://www.suse.com/security/cve/CVE-2021-43536/" source="CVE"/>
		<reference ref_id="CVE-2021-43537" ref_url="https://www.suse.com/security/cve/CVE-2021-43537/" source="CVE"/>
		<reference ref_id="CVE-2021-43538" ref_url="https://www.suse.com/security/cve/CVE-2021-43538/" source="CVE"/>
		<reference ref_id="CVE-2021-43539" ref_url="https://www.suse.com/security/cve/CVE-2021-43539/" source="CVE"/>
		<reference ref_id="CVE-2021-43541" ref_url="https://www.suse.com/security/cve/CVE-2021-43541/" source="CVE"/>
		<reference ref_id="CVE-2021-43542" ref_url="https://www.suse.com/security/cve/CVE-2021-43542/" source="CVE"/>
		<reference ref_id="CVE-2021-43543" ref_url="https://www.suse.com/security/cve/CVE-2021-43543/" source="CVE"/>
		<reference ref_id="CVE-2021-43545" ref_url="https://www.suse.com/security/cve/CVE-2021-43545/" source="CVE"/>
		<reference ref_id="CVE-2021-43546" ref_url="https://www.suse.com/security/cve/CVE-2021-43546/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Extended Support Release 91.4.0 (bsc#1193485):

- CVE-2021-43536: URL leakage when navigating while executing asynchronous function
- CVE-2021-43537: Heap buffer overflow when using structured clone
- CVE-2021-43538: Missing fullscreen and pointer lock notification when requesting both
- CVE-2021-43539: GC rooting failure when calling wasm instance methods
- CVE-2021-43541: External protocol handler parameters were unescaped
- CVE-2021-43542: XMLHttpRequest error codes could have leaked the existence of an external protocol handler
- CVE-2021-43543: Bypass of CSP sandbox directive when embedding
- CVE-2021-43545: Denial of Service when using the Location API in a loop
- CVE-2021-43546: Cursor spoofing could overlay user interface when native cursor is zoomed
- Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4
- Removed x-scheme-handler/ftp from MozillaFirefox.desktop (bsc#1193321)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-10"/>
	<updated date="2021-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193321">SUSE bug 1193321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43536/">CVE-2021-43536 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43536">CVE-2021-43536 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43537/">CVE-2021-43537 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43537">CVE-2021-43537 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43538/">CVE-2021-43538 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43538">CVE-2021-43538 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43539/">CVE-2021-43539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43539">CVE-2021-43539 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43541/">CVE-2021-43541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43541">CVE-2021-43541 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43542/">CVE-2021-43542 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43542">CVE-2021-43542 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43543/">CVE-2021-43543 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43543">CVE-2021-43543 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43545/">CVE-2021-43545 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43545">CVE-2021-43545 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43546/">CVE-2021-43546 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43546">CVE-2021-43546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659367" comment="MozillaFirefox-91.4.0-78.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659368" comment="MozillaFirefox-translations-common-91.4.0-78.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659369" comment="MozillaFirefox-translations-other-91.4.0-78.154.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218296" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194547" ref_url="https://bugzilla.suse.com/1194547" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140/" source="CVE"/>
		<reference ref_id="CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737/" source="CVE"/>
		<reference ref_id="CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738/" source="CVE"/>
		<reference ref_id="CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739/" source="CVE"/>
		<reference ref_id="CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740/" source="CVE"/>
		<reference ref_id="CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741/" source="CVE"/>
		<reference ref_id="CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742/" source="CVE"/>
		<reference ref_id="CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743/" source="CVE"/>
		<reference ref_id="CVE-2022-22744" ref_url="https://www.suse.com/security/cve/CVE-2022-22744/" source="CVE"/>
		<reference ref_id="CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745/" source="CVE"/>
		<reference ref_id="CVE-2022-22746" ref_url="https://www.suse.com/security/cve/CVE-2022-22746/" source="CVE"/>
		<reference ref_id="CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747/" source="CVE"/>
		<reference ref_id="CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748/" source="CVE"/>
		<reference ref_id="CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- CVE-2021-4140: Fixed iframe sandbox bypass with XSLT (bsc#1194547).
- CVE-2022-22737: Fixed race condition when playing audio files (bsc#1194547).
- CVE-2022-22738: Fixed heap-buffer-overflow in blendGaussianBlur (bsc#1194547).
- CVE-2022-22739: Fixed missing throttling on external protocol launch dialog (bsc#1194547).
- CVE-2022-22740: Fixed use-after-free of ChannelEventQueue::mOwner (bsc#1194547).
- CVE-2022-22741: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22742: Fixed out-of-bounds memory access when inserting text in edit mode (bsc#1194547).
- CVE-2022-22743: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22744: Fixed possible command injection via the 'Copy as curl' feature in DevTools (bsc#1194547).
- CVE-2022-22745: Fixed leaking cross-origin URLs through securitypolicyviolation event (bsc#1194547).
- CVE-2022-22746: Fixed calling into reportValidity could have lead to fullscreen window spoof (bsc#1194547).
- CVE-2022-22747: Fixed crash when handling empty pkcs7 sequence(bsc#1194547).
- CVE-2022-22748: Fixed spoofed origin on external protocol launch dialog (bsc#1194547).
- CVE-2022-22751: Fixed memory safety bugs (bsc#1194547).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4140">CVE-2021-4140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22737">CVE-2022-22737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22738">CVE-2022-22738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22739">CVE-2022-22739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22740">CVE-2022-22740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22741">CVE-2022-22741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22742">CVE-2022-22742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22743">CVE-2022-22743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22744/">CVE-2022-22744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22744">CVE-2022-22744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22745">CVE-2022-22745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22746/">CVE-2022-22746 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22746">CVE-2022-22746 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22747">CVE-2022-22747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22748">CVE-2022-22748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22751">CVE-2022-22751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663814" comment="MozillaFirefox-91.5.0-78.159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663815" comment="MozillaFirefox-translations-common-91.5.0-78.159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663816" comment="MozillaFirefox-translations-other-91.5.0-78.159.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218297" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1195230" ref_url="https://bugzilla.suse.com/1195230" source="BUGZILLA"/>
		<reference ref_id="1195682" ref_url="https://bugzilla.suse.com/1195682" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22753" ref_url="https://www.suse.com/security/cve/CVE-2022-22753/" source="CVE"/>
		<reference ref_id="CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754/" source="CVE"/>
		<reference ref_id="CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756/" source="CVE"/>
		<reference ref_id="CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759/" source="CVE"/>
		<reference ref_id="CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760/" source="CVE"/>
		<reference ref_id="CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761/" source="CVE"/>
		<reference ref_id="CVE-2022-22763" ref_url="https://www.suse.com/security/cve/CVE-2022-22763/" source="CVE"/>
		<reference ref_id="CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.0 ESR / MFSA 2022-05 (bsc#1195682)

- CVE-2022-22753: Privilege Escalation to SYSTEM on Windows via Maintenance Service
- CVE-2022-22754: Extensions could have bypassed permission confirmation during update
- CVE-2022-22756: Drag and dropping an image could have resulted in the dropped object being an executable
- CVE-2022-22759: Sandboxed iframes could have executed script if the parent appended elements
- CVE-2022-22760: Cross-Origin responses could be distinguished between script and non-script content-types
- CVE-2022-22761: frame-ancestors Content Security Policy directive was not enforced for framed extension pages
- CVE-2022-22763: Script Execution during invalid object state
- CVE-2022-22764: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6


Firefox Extended Support Release 91.5.1 ESR (bsc#1195230)

- Fixed an issue that allowed unexpected data to be submitted in some of our search telemetry
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-24"/>
	<updated date="2022-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195230">SUSE bug 1195230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22753/">CVE-2022-22753 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22753">CVE-2022-22753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22754">CVE-2022-22754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22756">CVE-2022-22756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22759">CVE-2022-22759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22760">CVE-2022-22760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22761">CVE-2022-22761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22763/">CVE-2022-22763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22763">CVE-2022-22763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22764">CVE-2022-22764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668898" comment="MozillaFirefox-91.6.0-78.162.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668899" comment="MozillaFirefox-translations-common-91.6.0-78.162.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668900" comment="MozillaFirefox-translations-other-91.6.0-78.162.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218298" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196809" ref_url="https://bugzilla.suse.com/1196809" source="BUGZILLA"/>
		<reference ref_id="1196900" ref_url="https://bugzilla.suse.com/1196900" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381/" source="CVE"/>
		<reference ref_id="CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383/" source="CVE"/>
		<reference ref_id="CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384/" source="CVE"/>
		<reference ref_id="CVE-2022-26386" ref_url="https://www.suse.com/security/cve/CVE-2022-26386/" source="CVE"/>
		<reference ref_id="CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387/" source="CVE"/>
		<reference ref_id="CVE-2022-26485" ref_url="https://www.suse.com/security/cve/CVE-2022-26485/" source="CVE"/>
		<reference ref_id="CVE-2022-26486" ref_url="https://www.suse.com/security/cve/CVE-2022-26486/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.7.0 ESR (bsc#1196900):

- CVE-2022-26383: Browser window spoof using fullscreen mode
- CVE-2022-26384: iframe allow-scripts sandbox bypass
- CVE-2022-26387: Time-of-check time-of-use bug when verifying add-on signatures
- CVE-2022-26381: Use-after-free in text reflows
- CVE-2022-26386: Temporary files downloaded to /tmp and accessible by other local users

Firefox Extended Support Release 91.6.1 ESR (bsc#1196809):

- CVE-2022-26485: Use-after-free in XSLT parameter processing
- CVE-2022-26486: Use-after-free in WebGPU IPC Framework
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-11"/>
	<updated date="2022-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196809">SUSE bug 1196809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26381">CVE-2022-26381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26383">CVE-2022-26383 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26384">CVE-2022-26384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26386/">CVE-2022-26386 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26386">CVE-2022-26386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26387">CVE-2022-26387 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26485/">CVE-2022-26485 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26485">CVE-2022-26485 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26486/">CVE-2022-26486 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26486">CVE-2022-26486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672457" comment="MozillaFirefox-91.7.0-78.167.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672458" comment="MozillaFirefox-translations-common-91.7.0-78.167.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672459" comment="MozillaFirefox-translations-other-91.7.0-78.167.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218299" version="1" class="patch">
	<metadata>
		<title>Recommended update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="CVE-2022-1196" ref_url="https://www.suse.com/security/cve/CVE-2022-1196/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2022-28281" ref_url="https://www.suse.com/security/cve/CVE-2022-28281/" source="CVE"/>
		<reference ref_id="CVE-2022-28282" ref_url="https://www.suse.com/security/cve/CVE-2022-28282/" source="CVE"/>
		<reference ref_id="CVE-2022-28285" ref_url="https://www.suse.com/security/cve/CVE-2022-28285/" source="CVE"/>
		<reference ref_id="CVE-2022-28286" ref_url="https://www.suse.com/security/cve/CVE-2022-28286/" source="CVE"/>
		<reference ref_id="CVE-2022-28289" ref_url="https://www.suse.com/security/cve/CVE-2022-28289/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.8.0 ESR (bsc#1197903):

MFSA 2022-14 (bsc#1197903)

* CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11 tokens are removed while in use
* CVE-2022-28281: Fixed an out of bounds write due to unexpected WebAuthN Extensions
* CVE-2022-1196: Fixed a use-after-free after VR Process destruction
* CVE-2022-28282: Fixed a use-after-free in DocumentL10n::TranslateDocument
* CVE-2022-28285: Fixed incorrect AliasSet used in JIT Codegen
* CVE-2022-28286: Fixed that iframe contents could be rendered outside the border
* CVE-2022-24713: Fixed a denial of service via complex regular expressions
* CVE-2022-28289: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-05"/>
	<updated date="2022-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1097">CVE-2022-1097 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1196/">CVE-2022-1196 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1196">CVE-2022-1196 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28281/">CVE-2022-28281 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28281">CVE-2022-28281 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28282/">CVE-2022-28282 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28282">CVE-2022-28282 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28285/">CVE-2022-28285 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28285">CVE-2022-28285 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28286/">CVE-2022-28286 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28286">CVE-2022-28286 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28289/">CVE-2022-28289 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28289">CVE-2022-28289 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678509" comment="MozillaFirefox-91.8.0-78.170.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678510" comment="MozillaFirefox-translations-common-91.8.0-78.170.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678511" comment="MozillaFirefox-translations-other-91.8.0-78.170.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218300" version="1" class="patch">
	<metadata>
		<title>Recommended update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198970" ref_url="https://bugzilla.suse.com/1198970" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29909" ref_url="https://www.suse.com/security/cve/CVE-2022-29909/" source="CVE"/>
		<reference ref_id="CVE-2022-29911" ref_url="https://www.suse.com/security/cve/CVE-2022-29911/" source="CVE"/>
		<reference ref_id="CVE-2022-29912" ref_url="https://www.suse.com/security/cve/CVE-2022-29912/" source="CVE"/>
		<reference ref_id="CVE-2022-29914" ref_url="https://www.suse.com/security/cve/CVE-2022-29914/" source="CVE"/>
		<reference ref_id="CVE-2022-29916" ref_url="https://www.suse.com/security/cve/CVE-2022-29916/" source="CVE"/>
		<reference ref_id="CVE-2022-29917" ref_url="https://www.suse.com/security/cve/CVE-2022-29917/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.9.0 ESR

MFSA 2022-17 (bsc#1198970)

* CVE-2022-29914: Fullscreen notification bypass using popups
* CVE-2022-29909: Bypassing permission prompt in nested browsing contexts
* CVE-2022-29916: Leaking browser history with CSS variables
* CVE-2022-29911: iframe Sandbox bypass
* CVE-2022-29912: Reader mode bypassed SameSite cookies
* CVE-2022-29917: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9

		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-04"/>
	<updated date="2022-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198970">SUSE bug 1198970</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29909/">CVE-2022-29909 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29909">CVE-2022-29909 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29911/">CVE-2022-29911 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29911">CVE-2022-29911 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29912/">CVE-2022-29912 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29912">CVE-2022-29912 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29914/">CVE-2022-29914 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29914">CVE-2022-29914 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29916/">CVE-2022-29916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29916">CVE-2022-29916 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29917/">CVE-2022-29917 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29917">CVE-2022-29917 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681447" comment="MozillaFirefox-91.9.0-78.175.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681448" comment="MozillaFirefox-translations-common-91.9.0-78.175.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681449" comment="MozillaFirefox-translations-other-91.9.0-78.175.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218301" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198970" ref_url="https://bugzilla.suse.com/1198970" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29909" ref_url="https://www.suse.com/security/cve/CVE-2022-29909/" source="CVE"/>
		<reference ref_id="CVE-2022-29911" ref_url="https://www.suse.com/security/cve/CVE-2022-29911/" source="CVE"/>
		<reference ref_id="CVE-2022-29912" ref_url="https://www.suse.com/security/cve/CVE-2022-29912/" source="CVE"/>
		<reference ref_id="CVE-2022-29914" ref_url="https://www.suse.com/security/cve/CVE-2022-29914/" source="CVE"/>
		<reference ref_id="CVE-2022-29916" ref_url="https://www.suse.com/security/cve/CVE-2022-29916/" source="CVE"/>
		<reference ref_id="CVE-2022-29917" ref_url="https://www.suse.com/security/cve/CVE-2022-29917/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.9.0 ESR (MFSA 2022-17)(bsc#1198970):

- CVE-2022-29914: Fullscreen notification bypass using popups
- CVE-2022-29909: Bypassing permission prompt in nested browsing contexts
- CVE-2022-29916: Leaking browser history with CSS variables
- CVE-2022-29911: iframe Sandbox bypass
- CVE-2022-29912: Reader mode bypassed SameSite cookies
- CVE-2022-29917: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198970">SUSE bug 1198970</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29909/">CVE-2022-29909 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29909">CVE-2022-29909 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29911/">CVE-2022-29911 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29911">CVE-2022-29911 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29912/">CVE-2022-29912 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29912">CVE-2022-29912 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29914/">CVE-2022-29914 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29914">CVE-2022-29914 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29916/">CVE-2022-29916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29916">CVE-2022-29916 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29917/">CVE-2022-29917 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29917">CVE-2022-29917 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684104" comment="MozillaFirefox-91.9.0-78.179.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684105" comment="MozillaFirefox-translations-common-91.9.0-78.179.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684106" comment="MozillaFirefox-translations-other-91.9.0-78.179.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218302" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199768" ref_url="https://bugzilla.suse.com/1199768" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1529" ref_url="https://www.suse.com/security/cve/CVE-2022-1529/" source="CVE"/>
		<reference ref_id="CVE-2022-1802" ref_url="https://www.suse.com/security/cve/CVE-2022-1802/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.9.1 ESR - MFSA 2022-19 (bsc#1199768):

- CVE-2022-1802: Prototype pollution in Top-Level Await implementation
- CVE-2022-1529: Untrusted input used in JavaScript object indexing, leading to prototype pollution
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199768">SUSE bug 1199768</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1529/">CVE-2022-1529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1529">CVE-2022-1529 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1802/">CVE-2022-1802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1802">CVE-2022-1802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992537" comment="MozillaFirefox-91.9.1-78.182.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992538" comment="MozillaFirefox-translations-common-91.9.1-78.182.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992539" comment="MozillaFirefox-translations-other-91.9.1-78.182.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218303" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1200027" ref_url="https://bugzilla.suse.com/1200027" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31736" ref_url="https://www.suse.com/security/cve/CVE-2022-31736/" source="CVE"/>
		<reference ref_id="CVE-2022-31737" ref_url="https://www.suse.com/security/cve/CVE-2022-31737/" source="CVE"/>
		<reference ref_id="CVE-2022-31738" ref_url="https://www.suse.com/security/cve/CVE-2022-31738/" source="CVE"/>
		<reference ref_id="CVE-2022-31739" ref_url="https://www.suse.com/security/cve/CVE-2022-31739/" source="CVE"/>
		<reference ref_id="CVE-2022-31740" ref_url="https://www.suse.com/security/cve/CVE-2022-31740/" source="CVE"/>
		<reference ref_id="CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741/" source="CVE"/>
		<reference ref_id="CVE-2022-31742" ref_url="https://www.suse.com/security/cve/CVE-2022-31742/" source="CVE"/>
		<reference ref_id="CVE-2022-31747" ref_url="https://www.suse.com/security/cve/CVE-2022-31747/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.10.0 ESR (MFSA 2022-21)(bsc#1200027)

- CVE-2022-31736: Cross-Origin resource's length leaked
- CVE-2022-31737: Heap buffer overflow in WebGL
- CVE-2022-31738: Browser window spoof using fullscreen mode
- CVE-2022-31739: Attacker-influenced path traversal when saving downloaded files
- CVE-2022-31740: Register allocation problem in WASM on arm64
- CVE-2022-31741: Uninitialized variable leads to invalid memory read
- CVE-2022-31742: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information
- CVE-2022-31747: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-02"/>
	<updated date="2022-06-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31736/">CVE-2022-31736 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31736">CVE-2022-31736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31737/">CVE-2022-31737 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31737">CVE-2022-31737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31738/">CVE-2022-31738 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31738">CVE-2022-31738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31739/">CVE-2022-31739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31739">CVE-2022-31739 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31740/">CVE-2022-31740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31740">CVE-2022-31740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31741">CVE-2022-31741 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31742/">CVE-2022-31742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31742">CVE-2022-31742 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31747/">CVE-2022-31747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31747">CVE-2022-31747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992540" comment="MozillaFirefox-91.10.0-78.185.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992541" comment="MozillaFirefox-translations-common-91.10.0-78.185.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992542" comment="MozillaFirefox-translations-other-91.10.0-78.185.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218304" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1200793" ref_url="https://bugzilla.suse.com/1200793" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2200" ref_url="https://www.suse.com/security/cve/CVE-2022-2200/" source="CVE"/>
		<reference ref_id="CVE-2022-31744" ref_url="https://www.suse.com/security/cve/CVE-2022-31744/" source="CVE"/>
		<reference ref_id="CVE-2022-34468" ref_url="https://www.suse.com/security/cve/CVE-2022-34468/" source="CVE"/>
		<reference ref_id="CVE-2022-34470" ref_url="https://www.suse.com/security/cve/CVE-2022-34470/" source="CVE"/>
		<reference ref_id="CVE-2022-34472" ref_url="https://www.suse.com/security/cve/CVE-2022-34472/" source="CVE"/>
		<reference ref_id="CVE-2022-34478" ref_url="https://www.suse.com/security/cve/CVE-2022-34478/" source="CVE"/>
		<reference ref_id="CVE-2022-34479" ref_url="https://www.suse.com/security/cve/CVE-2022-34479/" source="CVE"/>
		<reference ref_id="CVE-2022-34481" ref_url="https://www.suse.com/security/cve/CVE-2022-34481/" source="CVE"/>
		<reference ref_id="CVE-2022-34484" ref_url="https://www.suse.com/security/cve/CVE-2022-34484/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Firefox Extended Support Release 91.11.0 ESR (MFSA 2022-25) (bsc#1200793):

- CVE-2022-2200: Undesired attributes could be set as part of prototype pollution (bmo#1771381)
- CVE-2022-31744: CSP bypass enabling stylesheet injection (bmo#1757604)
- CVE-2022-34468: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI (bmo#1768537)
- CVE-2022-34470: Use-after-free in nsSHistory (bmo#1765951)
- CVE-2022-34472: Unavailable PAC file resulted in OCSP requests being blocked (bmo#1770123)
- CVE-2022-34478: Microsoft protocols can be attacked if a user accepts a prompt (bmo#1773717)
- CVE-2022-34479: A popup window could be resized in a way to overlay the address bar with web content (bmo#1745595)
- CVE-2022-34481: Potential integer overflow in ReplaceElementsAt (bmo#1497246)
- CVE-2022-34484: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11 (bmo#1763634, bmo#1772651)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-06"/>
	<updated date="2022-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200793">SUSE bug 1200793</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2200/">CVE-2022-2200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2200">CVE-2022-2200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31744/">CVE-2022-31744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31744">CVE-2022-31744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34468/">CVE-2022-34468 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34468">CVE-2022-34468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34470/">CVE-2022-34470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34470">CVE-2022-34470 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-34472/">CVE-2022-34472 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34472">CVE-2022-34472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34478/">CVE-2022-34478 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34478">CVE-2022-34478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34479/">CVE-2022-34479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34479">CVE-2022-34479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34481/">CVE-2022-34481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34481">CVE-2022-34481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34484/">CVE-2022-34484 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34484">CVE-2022-34484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992543" comment="MozillaFirefox-91.11.0-78.190.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992544" comment="MozillaFirefox-translations-common-91.11.0-78.190.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992545" comment="MozillaFirefox-translations-other-91.11.0-78.190.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218305" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1201758" ref_url="https://bugzilla.suse.com/1201758" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-36318" ref_url="https://www.suse.com/security/cve/CVE-2022-36318/" source="CVE"/>
		<reference ref_id="CVE-2022-36319" ref_url="https://www.suse.com/security/cve/CVE-2022-36319/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.12.0 ESR (bsc#1201758):

- CVE-2022-36319: Mouse Position spoofing with CSS transforms
- CVE-2022-36318: Directory indexes for bundled resources reflected URL parameters
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-29"/>
	<updated date="2022-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201758">SUSE bug 1201758</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36318/">CVE-2022-36318 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36318">CVE-2022-36318 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36319/">CVE-2022-36319 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36319">CVE-2022-36319 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992546" comment="MozillaFirefox-91.12.0-78.195.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992547" comment="MozillaFirefox-translations-common-91.12.0-78.195.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992548" comment="MozillaFirefox-translations-other-91.12.0-78.195.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218306" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1202645" ref_url="https://bugzilla.suse.com/1202645" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-38472" ref_url="https://www.suse.com/security/cve/CVE-2022-38472/" source="CVE"/>
		<reference ref_id="CVE-2022-38473" ref_url="https://www.suse.com/security/cve/CVE-2022-38473/" source="CVE"/>
		<reference ref_id="CVE-2022-38478" ref_url="https://www.suse.com/security/cve/CVE-2022-38478/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.13.0 ESR (bsc#1202645):

- CVE-2022-38472: Fixed a potential address bar spoofing via XSLT error handling.
- CVE-2022-38473: Fixed an issue where cross-origin XSLT documents could inherit the parent's permissions.
- CVE-2022-38478: Fixed various memory safety issues.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-01"/>
	<updated date="2022-09-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202645">SUSE bug 1202645</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38472/">CVE-2022-38472 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38472">CVE-2022-38472 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38473/">CVE-2022-38473 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38473">CVE-2022-38473 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38478/">CVE-2022-38478 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38478">CVE-2022-38478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992549" comment="MozillaFirefox-91.13.0-78.198.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992550" comment="MozillaFirefox-translations-common-91.13.0-78.198.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992551" comment="MozillaFirefox-translations-other-91.13.0-78.198.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218307" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1200793" ref_url="https://bugzilla.suse.com/1200793" source="BUGZILLA"/>
		<reference ref_id="1201758" ref_url="https://bugzilla.suse.com/1201758" source="BUGZILLA"/>
		<reference ref_id="1202645" ref_url="https://bugzilla.suse.com/1202645" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2200" ref_url="https://www.suse.com/security/cve/CVE-2022-2200/" source="CVE"/>
		<reference ref_id="CVE-2022-2505" ref_url="https://www.suse.com/security/cve/CVE-2022-2505/" source="CVE"/>
		<reference ref_id="CVE-2022-34468" ref_url="https://www.suse.com/security/cve/CVE-2022-34468/" source="CVE"/>
		<reference ref_id="CVE-2022-34469" ref_url="https://www.suse.com/security/cve/CVE-2022-34469/" source="CVE"/>
		<reference ref_id="CVE-2022-34470" ref_url="https://www.suse.com/security/cve/CVE-2022-34470/" source="CVE"/>
		<reference ref_id="CVE-2022-34471" ref_url="https://www.suse.com/security/cve/CVE-2022-34471/" source="CVE"/>
		<reference ref_id="CVE-2022-34472" ref_url="https://www.suse.com/security/cve/CVE-2022-34472/" source="CVE"/>
		<reference ref_id="CVE-2022-34473" ref_url="https://www.suse.com/security/cve/CVE-2022-34473/" source="CVE"/>
		<reference ref_id="CVE-2022-34474" ref_url="https://www.suse.com/security/cve/CVE-2022-34474/" source="CVE"/>
		<reference ref_id="CVE-2022-34475" ref_url="https://www.suse.com/security/cve/CVE-2022-34475/" source="CVE"/>
		<reference ref_id="CVE-2022-34476" ref_url="https://www.suse.com/security/cve/CVE-2022-34476/" source="CVE"/>
		<reference ref_id="CVE-2022-34477" ref_url="https://www.suse.com/security/cve/CVE-2022-34477/" source="CVE"/>
		<reference ref_id="CVE-2022-34478" ref_url="https://www.suse.com/security/cve/CVE-2022-34478/" source="CVE"/>
		<reference ref_id="CVE-2022-34479" ref_url="https://www.suse.com/security/cve/CVE-2022-34479/" source="CVE"/>
		<reference ref_id="CVE-2022-34480" ref_url="https://www.suse.com/security/cve/CVE-2022-34480/" source="CVE"/>
		<reference ref_id="CVE-2022-34481" ref_url="https://www.suse.com/security/cve/CVE-2022-34481/" source="CVE"/>
		<reference ref_id="CVE-2022-34482" ref_url="https://www.suse.com/security/cve/CVE-2022-34482/" source="CVE"/>
		<reference ref_id="CVE-2022-34483" ref_url="https://www.suse.com/security/cve/CVE-2022-34483/" source="CVE"/>
		<reference ref_id="CVE-2022-34484" ref_url="https://www.suse.com/security/cve/CVE-2022-34484/" source="CVE"/>
		<reference ref_id="CVE-2022-34485" ref_url="https://www.suse.com/security/cve/CVE-2022-34485/" source="CVE"/>
		<reference ref_id="CVE-2022-36314" ref_url="https://www.suse.com/security/cve/CVE-2022-36314/" source="CVE"/>
		<reference ref_id="CVE-2022-36318" ref_url="https://www.suse.com/security/cve/CVE-2022-36318/" source="CVE"/>
		<reference ref_id="CVE-2022-36319" ref_url="https://www.suse.com/security/cve/CVE-2022-36319/" source="CVE"/>
		<reference ref_id="CVE-2022-38472" ref_url="https://www.suse.com/security/cve/CVE-2022-38472/" source="CVE"/>
		<reference ref_id="CVE-2022-38473" ref_url="https://www.suse.com/security/cve/CVE-2022-38473/" source="CVE"/>
		<reference ref_id="CVE-2022-38476" ref_url="https://www.suse.com/security/cve/CVE-2022-38476/" source="CVE"/>
		<reference ref_id="CVE-2022-38477" ref_url="https://www.suse.com/security/cve/CVE-2022-38477/" source="CVE"/>
		<reference ref_id="CVE-2022-38478" ref_url="https://www.suse.com/security/cve/CVE-2022-38478/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Mozilla Firefox was updated to 102.2.0esr ESR:

* Fixed: Various stability, functionality, and security fixes.

- MFSA 2022-34 (bsc#1202645)

  * CVE-2022-38472 (bmo#1769155)
    Address bar spoofing via XSLT error handling
  * CVE-2022-38473 (bmo#1771685)
    Cross-origin XSLT Documents would have inherited the parent's
    permissions
  * CVE-2022-38476 (bmo#1760998)
    Data race and potential use-after-free in PK11_ChangePW
  * CVE-2022-38477 (bmo#1760611, bmo#1770219, bmo#1771159,
    bmo#1773363)
    Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2
  * CVE-2022-38478 (bmo#1770630, bmo#1776658)
    Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2,
    and Firefox ESR 91.13

Firefox Extended Support Release 102.1 ESR

  * Fixed: Various stability, functionality, and security fixes.

- MFSA 2022-30 (bsc#1201758)

  * CVE-2022-36319 (bmo#1737722)
    Mouse Position spoofing with CSS transforms
  * CVE-2022-36318 (bmo#1771774)
    Directory indexes for bundled resources reflected URL
    parameters
  * CVE-2022-36314 (bmo#1773894)
    Opening local &lt;code&gt;.lnk&lt;/code&gt; files could cause unexpected
    network loads
  * CVE-2022-2505 (bmo#1769739, bmo#1772824)
    Memory safety bugs fixed in Firefox 103 and 102.1

- Firefox Extended Support Release 102.0.1 ESR

  * Fixed: Fixed bookmark shortcut creation by dragging to
    Windows File Explorer and dropping partially broken
    (bmo#1774683)
  * Fixed: Fixed bookmarks sidebar flashing white when opened in
    dark mode (bmo#1776157)
  * Fixed: Fixed multilingual spell checking not working with
    content in both English and a non-Latin alphabet
    (bmo#1773802)
  * Fixed: Developer tools:  Fixed an issue where the console
    output keep getting scrolled to the bottom when the last
    visible message is an evaluation result (bmo#1776262)
  * Fixed: Fixed *Delete cookies and site data when Firefox is
    closed* checkbox getting disabled on startup (bmo#1777419)
  * Fixed: Various stability fixes

Firefox 102.0 ESR:

* New: 

  - We now provide more secure connections: Firefox can
    now automatically upgrade to HTTPS using HTTPS RR as Alt-Svc
    headers.
  - For added viewing pleasure, full-range color levels are now
    supported for video playback on many systems.
  - Find it easier now! Mac users can now access the macOS
    share options from the Firefox File menu.
  - Voil?! Support for images containing ICC v4 profiles is
    enabled on macOS.
  - Firefox now supports the new AVIF image format, which is
    based on the modern and royalty-free AV1 video codec. It
    offers significant bandwidth savings for sites compared to
    existing image formats. It also supports transparency and
    other advanced features.
  - Firefox PDF viewer now supports filling more forms (e.g.,
    XFA-based forms, used by multiple governments and banks).
    Learn more.
  - When available system memory is critically low, Firefox on
    Windows will automatically unload tabs based on their last
    access time, memory usage, and other attributes. This helps
    to reduce Firefox out-of-memory crashes. Forgot something?
    Switching to an unloaded tab automatically reloads it.
  - To prevent session loss for macOS users who are running
    Firefox from a mounted .dmg file, they’ll now be prompted to
    finish installation. Bear in mind, this permission prompt
    only appears the first time these users run Firefox on their
    computer.
  - For your safety, Firefox now blocks downloads that rely on
    insecure connections, protecting against potentially
    malicious or unsafe downloads. Learn more and see where to
    find downloads in Firefox.
  - Improved web compatibility for privacy protections with
    SmartBlock 3.0: In Private Browsing and Strict Tracking
    Protection, Firefox goes to great lengths to protect your web
    browsing activity from trackers. As part of this, the built-
    in content blocking will automatically block third-party
    scripts, images, and other content from being loaded from
    cross-site tracking companies reported by Disconnect. Learn
    more.
  - Introducing a new referrer tracking protection in Strict
    Tracking Protection and Private Browsing. This feature
    prevents sites from unknowingly leaking private information
    to trackers. Learn more.
  - Introducing Firefox Suggest, a feature that provides
    website suggestions as you type into the address bar. Learn
    more about this faster way to navigate the web and locale-
    specific features.
  - Firefox macOS now uses Apple's low-power mode for
    fullscreen video on sites such as YouTube and Twitch. This
    meaningfully extends battery life in long viewing sessions.
    Now your kids can find out what the fox says on a loop
    without you ever missing a beat…
  - With this release, power users can use about:unloads to
    release system resources by manually unloading tabs without
    closing them.
  - On Windows, there will now be fewer interruptions because
    Firefox won’t prompt you for updates. Instead, a background
    agent will download and install updates even if Firefox is
    closed.
  - On Linux, we’ve improved WebGL performance and reduced
    power consumption for many users.
  - To better protect all Firefox users against side-channel
    attacks, such as Spectre, we introduced Site Isolation.
  - Firefox no longer warns you by default when you exit the
    browser or close a window using a menu, button, or three-key
    command. This should cut back on unwelcome notifications,
    which is always nice—however, if you prefer a bit of notice,
    you’ll still have full control over the quit/close modal
    behavior. All warnings can be managed within Firefox
    Settings. No worries! More details here.
  - Firefox supports the new Snap Layouts menus when running on
    Windows 11.
  - RLBox—a new technology that hardens Firefox against
    potential security vulnerabilities in third-party
    libraries—is now enabled on all platforms.
  - We’ve reduced CPU usage on macOS in Firefox and
    WindowServer during event processing.
  - We’ve also reduced the power usage of software decoded
    video on macOS, especially in fullscreen. This includes
    streaming sites such as Netflix and Amazon Prime Video.
  - You can now move the Picture-in-Picture toggle button to
    the opposite side of the video. Simply look for the new
    context menu option Move Picture-in-Picture Toggle to Left
    (Right) Side.
  - We’ve made significant improvements in noise suppression
    and auto-gain-control, as well as slight improvements in
    echo-cancellation to provide you with a better overall
    experience.
  - We’ve also significantly reduced main-thread load.
  - When printing, you can now choose to print only the
    odd/even pages.
  - Firefox now supports and displays the new style of
    scrollbars on Windows 11.
  - Firefox has a new optimized download flow. Instead of
    prompting every time, files will download automatically.
    However, they can still be opened from the downloads panel
    with just one click. Easy! More information
  - Firefox no longer asks what to do for each file by default.
    You won’t be prompted to choose a helper application or save
    to disk before downloading a file unless you have changed
    your download action setting for that type of file.
 -  Any files you download will be immediately saved on your
    disk. Depending on the current configuration, they’ll be
    saved in your preferred download folder, or you’ll be asked
    to select a location for each download. Windows and Linux
    users will find their downloaded files in the destination
    folder. They’ll no longer be put in the Temp folder.
  - Firefox allows users to choose from a number of built-in
    search engines to set as their default. In this release, some
    users who had previously configured a default engine might
    notice their default search engine has changed since Mozilla
    was unable to secure formal permission to continue including
    certain search engines in Firefox.
  - You can now toggle Narrate in ReaderMode with the keyboard
    shortcut 'n.'
  - You can find added support for search—with or without
    diacritics—in the PDF viewer.
  - The Linux sandbox has been strengthened: processes exposed
    to web content no longer have access to the X Window system
    (X11).
  - Firefox now supports credit card autofill and capture in
    Germany, France, and the United Kingdom.
  - We now support captions/subtitles display on YouTube, Prime
    Video, and Netflix videos you watch in Picture-in-Picture.
    Just turn on the subtitles on the in-page video player, and
    they will appear in PiP.
  - Picture-in-Picture now also supports video captions on
    websites that use Web Video Text Track (WebVTT) format (e.g.,
    Coursera.org, Canadian Broadcasting Corporation, and many
    more).
  - On the first run after install, Firefox detects when its
    language does not match the operating system language and
    offers the user a choice between the two languages.
  - Firefox spell checking now checks spelling in multiple
    languages. To enable additional languages, select them in the
    text field’s context menu.
  - HDR video is now supported in Firefox on Mac—starting with
    YouTube! Firefox users on macOS 11+ (with HDR-compatible
    screens) can enjoy higher-fidelity video content. No need to
    manually flip any preferences to turn HDR video support
    on—just make sure battery preferences are NOT set to
    “optimize video streaming while on battery”.
  - Hardware-accelerated AV1 video decoding is enabled on
    Windows with supported GPUs (Intel Gen 11+, AMD RDNA 2
    Excluding Navi 24, GeForce 30). Installing the AV1 Video
    Extension from the Microsoft Store may also be required.
  - Video overlay is enabled on Windows for Intel GPUs,
    reducing power usage during video playback.
  - Improved fairness between painting and handling other
    events. This noticeably improves the performance of the
    volume slider on Twitch.
  - Scrollbars on Linux and Windows 11 won't take space by
    default. On Linux, users can change this in Settings. On
    Windows, Firefox follows the system setting (System Settings
    &gt; Accessibility &gt; Visual Effects &gt; Always show scrollbars).
  - Firefox now ignores less restricted referrer
    policies—including unsafe-url, no-referrer-when-downgrade,
    and origin-when-cross-origin—for cross-site
    subresource/iframe requests to prevent privacy leaks from the
    referrer.
  - Reading is now easier with the prefers-contrast media
    query, which allows sites to detect if the user has requested
    that web content is presented with a higher (or lower)
    contrast.
  - All non-configured MIME types can now be assigned a custom
    action upon download completion.
  - Firefox now allows users to use as many microphones as they
    want, at the same time, during video conferencing. The most
    exciting benefit is that you can easily switch your
    microphones at any time (if your conferencing service
    provider enables this flexibility).
  - Print preview has been updated.

  * Fixed: Various security fixes.

- MFSA 2022-24 (bsc#1200793)

  * CVE-2022-34479 (bmo#1745595)
    A popup window could be resized in a way to overlay the
    address bar with web content
  * CVE-2022-34470 (bmo#1765951)
    Use-after-free in nsSHistory
  * CVE-2022-34468 (bmo#1768537)
    CSP sandbox header without `allow-scripts` can be bypassed
    via retargeted javascript: URI
  * CVE-2022-34482 (bmo#845880)
    Drag and drop of malicious image could have led to malicious
    executable and potential code execution
  * CVE-2022-34483 (bmo#1335845)
    Drag and drop of malicious image could have led to malicious
    executable and potential code execution
  * CVE-2022-34476 (bmo#1387919)
    ASN.1 parser could have been tricked into accepting malformed
    ASN.1
  * CVE-2022-34481 (bmo#1483699, bmo#1497246)
    Potential integer overflow in ReplaceElementsAt
  * CVE-2022-34474 (bmo#1677138)
    Sandboxed iframes could redirect to external schemes
  * CVE-2022-34469 (bmo#1721220)
    TLS certificate errors on HSTS-protected domains could be
    bypassed by the user on Firefox for Android
  * CVE-2022-34471 (bmo#1766047)
    Compromised server could trick a browser into an addon
    downgrade
  * CVE-2022-34472 (bmo#1770123)
    Unavailable PAC file resulted in OCSP requests being blocked
  * CVE-2022-34478 (bmo#1773717)
    Microsoft protocols can be attacked if a user accepts a
    prompt
  * CVE-2022-2200 (bmo#1771381)
    Undesired attributes could be set as part of prototype
    pollution
  * CVE-2022-34480 (bmo#1454072)
    Free of uninitialized pointer in lg_init
  * CVE-2022-34477 (bmo#1731614)
    MediaError message property leaked information on cross-
    origin same-site pages
  * CVE-2022-34475 (bmo#1757210)
    HTML Sanitizer could have been bypassed via same-origin
    script via use tags
  * CVE-2022-34473 (bmo#1770888)
    HTML Sanitizer could have been bypassed via use tags
  * CVE-2022-34484 (bmo#1763634, bmo#1772651)
    Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11
  * CVE-2022-34485 (bmo#1768409, bmo#1768578)
    Memory safety bugs fixed in Firefox 102
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-14"/>
	<updated date="2022-09-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200793">SUSE bug 1200793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201758">SUSE bug 1201758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202645">SUSE bug 1202645</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2200/">CVE-2022-2200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2200">CVE-2022-2200 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2505/">CVE-2022-2505 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2505">CVE-2022-2505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34468/">CVE-2022-34468 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34468">CVE-2022-34468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34469/">CVE-2022-34469 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34469">CVE-2022-34469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34470/">CVE-2022-34470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34470">CVE-2022-34470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34471/">CVE-2022-34471 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34471">CVE-2022-34471 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-34472/">CVE-2022-34472 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34472">CVE-2022-34472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34473/">CVE-2022-34473 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34473">CVE-2022-34473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34474/">CVE-2022-34474 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34474">CVE-2022-34474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34475/">CVE-2022-34475 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34475">CVE-2022-34475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34476/">CVE-2022-34476 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34476">CVE-2022-34476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34477/">CVE-2022-34477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34477">CVE-2022-34477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34478/">CVE-2022-34478 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34478">CVE-2022-34478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34479/">CVE-2022-34479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34479">CVE-2022-34479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34480/">CVE-2022-34480 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34480">CVE-2022-34480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34481/">CVE-2022-34481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34481">CVE-2022-34481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34482/">CVE-2022-34482 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34482">CVE-2022-34482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34483/">CVE-2022-34483 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34483">CVE-2022-34483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34484/">CVE-2022-34484 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34484">CVE-2022-34484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34485/">CVE-2022-34485 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34485">CVE-2022-34485 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36314/">CVE-2022-36314 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36314">CVE-2022-36314 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36318/">CVE-2022-36318 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36318">CVE-2022-36318 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36319/">CVE-2022-36319 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36319">CVE-2022-36319 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38472/">CVE-2022-38472 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38472">CVE-2022-38472 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38473/">CVE-2022-38473 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38473">CVE-2022-38473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38476/">CVE-2022-38476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38476">CVE-2022-38476 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38477/">CVE-2022-38477 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38477">CVE-2022-38477 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38478/">CVE-2022-38478 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38478">CVE-2022-38478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992552" comment="MozillaFirefox-102.2.0-72.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992553" comment="MozillaFirefox-branding-SLED-102-24.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992554" comment="MozillaFirefox-translations-common-102.2.0-72.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992555" comment="MozillaFirefox-translations-other-102.2.0-72.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218308" version="1" class="patch">
	<metadata>
		<title>Security Update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1203477" ref_url="https://bugzilla.suse.com/1203477" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40956" ref_url="https://www.suse.com/security/cve/CVE-2022-40956/" source="CVE"/>
		<reference ref_id="CVE-2022-40957" ref_url="https://www.suse.com/security/cve/CVE-2022-40957/" source="CVE"/>
		<reference ref_id="CVE-2022-40958" ref_url="https://www.suse.com/security/cve/CVE-2022-40958/" source="CVE"/>
		<reference ref_id="CVE-2022-40959" ref_url="https://www.suse.com/security/cve/CVE-2022-40959/" source="CVE"/>
		<reference ref_id="CVE-2022-40960" ref_url="https://www.suse.com/security/cve/CVE-2022-40960/" source="CVE"/>
		<reference ref_id="CVE-2022-40962" ref_url="https://www.suse.com/security/cve/CVE-2022-40962/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

  Mozilla Firefox was updated from 102.2.0esr to 102.3.0esr (bsc#1203477):

  - CVE-2022-40959: Fixed bypassing FeaturePolicy restrictions on transient pages.
  - CVE-2022-40960: Fixed data-race when parsing non-UTF-8 URLs in threads.
  - CVE-2022-40958: Fixed bypassing secure context restriction for cookies with __Host and __Secure prefix.
  - CVE-2022-40956: Fixed content-security-policy base-uri bypass.
  - CVE-2022-40957: Fixed incoherent instruction cache when building WASM on ARM64.
  - CVE-2022-40962: Fixed memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-22"/>
	<updated date="2022-09-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203477">SUSE bug 1203477</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40956/">CVE-2022-40956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40956">CVE-2022-40956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40957/">CVE-2022-40957 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40957">CVE-2022-40957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40958/">CVE-2022-40958 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40958">CVE-2022-40958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40959/">CVE-2022-40959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40959">CVE-2022-40959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40960/">CVE-2022-40960 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40960">CVE-2022-40960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40962/">CVE-2022-40962 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40962">CVE-2022-40962 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992556" comment="MozillaFirefox-102.3.0-72.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992557" comment="MozillaFirefox-translations-common-102.3.0-72.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992558" comment="MozillaFirefox-translations-other-102.3.0-72.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218309" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204421" ref_url="https://bugzilla.suse.com/1204421" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3266" ref_url="https://www.suse.com/security/cve/CVE-2022-3266/" source="CVE"/>
		<reference ref_id="CVE-2022-40956" ref_url="https://www.suse.com/security/cve/CVE-2022-40956/" source="CVE"/>
		<reference ref_id="CVE-2022-40957" ref_url="https://www.suse.com/security/cve/CVE-2022-40957/" source="CVE"/>
		<reference ref_id="CVE-2022-40958" ref_url="https://www.suse.com/security/cve/CVE-2022-40958/" source="CVE"/>
		<reference ref_id="CVE-2022-40959" ref_url="https://www.suse.com/security/cve/CVE-2022-40959/" source="CVE"/>
		<reference ref_id="CVE-2022-40960" ref_url="https://www.suse.com/security/cve/CVE-2022-40960/" source="CVE"/>
		<reference ref_id="CVE-2022-40962" ref_url="https://www.suse.com/security/cve/CVE-2022-40962/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

   Updated to version 102.4.0 ESR (bsc#1204421):

   - CVE-2022-42927: Fixed same-origin policy violation that could have leaked cross-origin URLs.
   - CVE-2022-42928: Fixed memory Corruption in JS Engine.
   - CVE-2022-42929: Fixed denial of Service via window.print.
   - CVE-2022-42932: Fixed memory safety bugs.


		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-24"/>
	<updated date="2022-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204421">SUSE bug 1204421</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3266/">CVE-2022-3266 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3266">CVE-2022-3266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40956/">CVE-2022-40956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40956">CVE-2022-40956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40957/">CVE-2022-40957 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40957">CVE-2022-40957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40958/">CVE-2022-40958 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40958">CVE-2022-40958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40959/">CVE-2022-40959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40959">CVE-2022-40959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40960/">CVE-2022-40960 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40960">CVE-2022-40960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40962/">CVE-2022-40962 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40962">CVE-2022-40962 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992559" comment="MozillaFirefox-102.4.0-72.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992560" comment="MozillaFirefox-translations-common-102.4.0-72.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992561" comment="MozillaFirefox-translations-other-102.4.0-72.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218310" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, firefox-gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204758" ref_url="https://bugzilla.suse.com/1204758" source="BUGZILLA"/>
		<reference ref_id="1205270" ref_url="https://bugzilla.suse.com/1205270" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-45403" ref_url="https://www.suse.com/security/cve/CVE-2022-45403/" source="CVE"/>
		<reference ref_id="CVE-2022-45404" ref_url="https://www.suse.com/security/cve/CVE-2022-45404/" source="CVE"/>
		<reference ref_id="CVE-2022-45405" ref_url="https://www.suse.com/security/cve/CVE-2022-45405/" source="CVE"/>
		<reference ref_id="CVE-2022-45406" ref_url="https://www.suse.com/security/cve/CVE-2022-45406/" source="CVE"/>
		<reference ref_id="CVE-2022-45408" ref_url="https://www.suse.com/security/cve/CVE-2022-45408/" source="CVE"/>
		<reference ref_id="CVE-2022-45409" ref_url="https://www.suse.com/security/cve/CVE-2022-45409/" source="CVE"/>
		<reference ref_id="CVE-2022-45410" ref_url="https://www.suse.com/security/cve/CVE-2022-45410/" source="CVE"/>
		<reference ref_id="CVE-2022-45411" ref_url="https://www.suse.com/security/cve/CVE-2022-45411/" source="CVE"/>
		<reference ref_id="CVE-2022-45412" ref_url="https://www.suse.com/security/cve/CVE-2022-45412/" source="CVE"/>
		<reference ref_id="CVE-2022-45416" ref_url="https://www.suse.com/security/cve/CVE-2022-45416/" source="CVE"/>
		<reference ref_id="CVE-2022-45418" ref_url="https://www.suse.com/security/cve/CVE-2022-45418/" source="CVE"/>
		<reference ref_id="CVE-2022-45420" ref_url="https://www.suse.com/security/cve/CVE-2022-45420/" source="CVE"/>
		<reference ref_id="CVE-2022-45421" ref_url="https://www.suse.com/security/cve/CVE-2022-45421/" source="CVE"/>
		<description>
This update for MozillaFirefox, firefox-gtk3 fixes the following issues:
    
MozillaFirefox:

Update to Firefox Extended Support Release 102.5.0 ESR (MFSA 2022-48, bsc#1205270):

- CVE-2022-45403: Service Workers might have learned size of cross-origin media files
- CVE-2022-45404: Fullscreen notification bypass
- CVE-2022-45405: Use-after-free in InputStream implementation
- CVE-2022-45406: Use-after-free of a JavaScript Realm
- CVE-2022-45408: Fullscreen notification bypass via windowName
- CVE-2022-45409: Use-after-free in Garbage Collection
- CVE-2022-45410: ServiceWorker-intercepted requests bypassed SameSite cookie policy
- CVE-2022-45411: Cross-Site Tracing was possible via non-standard override headers
- CVE-2022-45412: Symlinks may resolve to partially uninitialized buffers
- CVE-2022-45416: Keystroke Side-Channel Leakage
- CVE-2022-45418: Custom mouse cursor could have been drawn over browser UI
- CVE-2022-45420: Iframe contents could be rendered outside the iframe
- CVE-2022-45421: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5
    
- Specify the explicit version of the firefox-lib* dependencies
  to force rpm to complain if not all dependencies are up to date
  (bsc#1204758)

firefox-gtk3:

- Specify the explicit version of the firefox-lib* dependencies
  to force rpm to complain if not all dependencies are up to date
  (bsc#1204758)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-24"/>
	<updated date="2022-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204758">SUSE bug 1204758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45403/">CVE-2022-45403 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45403">CVE-2022-45403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45404/">CVE-2022-45404 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45404">CVE-2022-45404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45405/">CVE-2022-45405 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45405">CVE-2022-45405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45406/">CVE-2022-45406 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45406">CVE-2022-45406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45408/">CVE-2022-45408 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45408">CVE-2022-45408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45409/">CVE-2022-45409 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45409">CVE-2022-45409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45410/">CVE-2022-45410 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45410">CVE-2022-45410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45411/">CVE-2022-45411 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45411">CVE-2022-45411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45412/">CVE-2022-45412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45412">CVE-2022-45412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45416/">CVE-2022-45416 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45416">CVE-2022-45416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45418/">CVE-2022-45418 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45418">CVE-2022-45418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45420/">CVE-2022-45420 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45420">CVE-2022-45420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45421/">CVE-2022-45421 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45421">CVE-2022-45421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992562" comment="MozillaFirefox-102.5.0-72.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992563" comment="MozillaFirefox-translations-common-102.5.0-72.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992564" comment="MozillaFirefox-translations-other-102.5.0-72.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992565" comment="firefox-gtk3-branding-upstream-3.14.9-2.26.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992566" comment="firefox-gtk3-data-3.14.9-2.26.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992567" comment="firefox-gtk3-immodule-amharic-3.14.9-2.26.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992568" comment="firefox-gtk3-immodule-inuktitut-3.14.9-2.26.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992569" comment="firefox-gtk3-immodule-multipress-3.14.9-2.26.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992570" comment="firefox-gtk3-immodule-thai-3.14.9-2.26.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992571" comment="firefox-gtk3-immodule-vietnamese-3.14.9-2.26.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992572" comment="firefox-gtk3-immodule-xim-3.14.9-2.26.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992573" comment="firefox-gtk3-immodules-tigrigna-3.14.9-2.26.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992574" comment="firefox-gtk3-lang-3.14.9-2.26.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992575" comment="firefox-gtk3-tools-3.14.9-2.26.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992576" comment="firefox-libgtk-3-0-3.14.9-2.26.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218311" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1206242" ref_url="https://bugzilla.suse.com/1206242" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-46872" ref_url="https://www.suse.com/security/cve/CVE-2022-46872/" source="CVE"/>
		<reference ref_id="CVE-2022-46874" ref_url="https://www.suse.com/security/cve/CVE-2022-46874/" source="CVE"/>
		<reference ref_id="CVE-2022-46875" ref_url="https://www.suse.com/security/cve/CVE-2022-46875/" source="CVE"/>
		<reference ref_id="CVE-2022-46878" ref_url="https://www.suse.com/security/cve/CVE-2022-46878/" source="CVE"/>
		<reference ref_id="CVE-2022-46880" ref_url="https://www.suse.com/security/cve/CVE-2022-46880/" source="CVE"/>
		<reference ref_id="CVE-2022-46881" ref_url="https://www.suse.com/security/cve/CVE-2022-46881/" source="CVE"/>
		<reference ref_id="CVE-2022-46882" ref_url="https://www.suse.com/security/cve/CVE-2022-46882/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 102.6.0 ESR (bsc#1206242):

- CVE-2022-46880: Use-after-free in WebGL
- CVE-2022-46872: Arbitrary file read from a compromised content process
- CVE-2022-46881: Memory corruption in WebGL
- CVE-2022-46874: Drag and Dropped Filenames could have been truncated to malicious extensions
- CVE-2022-46875: Download Protections were bypassed by .atloc and .ftploc files on Mac OS
- CVE-2022-46882: Use-after-free in WebGL
- CVE-2022-46878: Memory safety bugs fixed in Firefox 108 and Firefox ESR 102.6
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-13"/>
	<updated date="2022-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206242">SUSE bug 1206242</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46872/">CVE-2022-46872 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46872">CVE-2022-46872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46874/">CVE-2022-46874 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46874">CVE-2022-46874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46875/">CVE-2022-46875 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46875">CVE-2022-46875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46878/">CVE-2022-46878 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46878">CVE-2022-46878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46880/">CVE-2022-46880 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46880">CVE-2022-46880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46881/">CVE-2022-46881 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46881">CVE-2022-46881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46882/">CVE-2022-46882 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46882">CVE-2022-46882 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992577" comment="MozillaFirefox-102.6.0-72.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992578" comment="MozillaFirefox-translations-common-102.6.0-72.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992579" comment="MozillaFirefox-translations-other-102.6.0-72.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218312" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1209173" ref_url="https://bugzilla.suse.com/1209173" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-25748" ref_url="https://www.suse.com/security/cve/CVE-2023-25748/" source="CVE"/>
		<reference ref_id="CVE-2023-25749" ref_url="https://www.suse.com/security/cve/CVE-2023-25749/" source="CVE"/>
		<reference ref_id="CVE-2023-25750" ref_url="https://www.suse.com/security/cve/CVE-2023-25750/" source="CVE"/>
		<reference ref_id="CVE-2023-25751" ref_url="https://www.suse.com/security/cve/CVE-2023-25751/" source="CVE"/>
		<reference ref_id="CVE-2023-25752" ref_url="https://www.suse.com/security/cve/CVE-2023-25752/" source="CVE"/>
		<reference ref_id="CVE-2023-28159" ref_url="https://www.suse.com/security/cve/CVE-2023-28159/" source="CVE"/>
		<reference ref_id="CVE-2023-28160" ref_url="https://www.suse.com/security/cve/CVE-2023-28160/" source="CVE"/>
		<reference ref_id="CVE-2023-28161" ref_url="https://www.suse.com/security/cve/CVE-2023-28161/" source="CVE"/>
		<reference ref_id="CVE-2023-28162" ref_url="https://www.suse.com/security/cve/CVE-2023-28162/" source="CVE"/>
		<reference ref_id="CVE-2023-28163" ref_url="https://www.suse.com/security/cve/CVE-2023-28163/" source="CVE"/>
		<reference ref_id="CVE-2023-28164" ref_url="https://www.suse.com/security/cve/CVE-2023-28164/" source="CVE"/>
		<reference ref_id="CVE-2023-28176" ref_url="https://www.suse.com/security/cve/CVE-2023-28176/" source="CVE"/>
		<reference ref_id="CVE-2023-28177" ref_url="https://www.suse.com/security/cve/CVE-2023-28177/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to version 102.9.0 ESR (bsc#1209173):
    
- CVE-2023-28159: Fullscreen Notification could have been hidden by download popups on Android
- CVE-2023-25748: Fullscreen Notification could have been hidden by window prompts on Android
- CVE-2023-25749: Firefox for Android may have opened third-party apps without a prompt
- CVE-2023-25750: Potential ServiceWorker cache leak during private browsing mode
- CVE-2023-25751: Incorrect code generation during JIT compilation
- CVE-2023-28160: Redirect to Web Extension files may have leaked local path
- CVE-2023-28164: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation
- CVE-2023-28161: One-time permissions granted to a local file were extended to other local files loaded in the same tab
- CVE-2023-28162: Invalid downcast in Worklets
- CVE-2023-25752: Potential out-of-bounds when accessing throttled streams
- CVE-2023-28163: Windows Save As dialog resolved environment variables
- CVE-2023-28176: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9
- CVE-2023-28177: Memory safety bugs fixed in Firefox 111
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-14"/>
	<updated date="2023-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1209173">SUSE bug 1209173</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25748/">CVE-2023-25748 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25748">CVE-2023-25748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25749/">CVE-2023-25749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25749">CVE-2023-25749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25750/">CVE-2023-25750 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25750">CVE-2023-25750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25751/">CVE-2023-25751 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25751">CVE-2023-25751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25752/">CVE-2023-25752 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25752">CVE-2023-25752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28159/">CVE-2023-28159 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28159">CVE-2023-28159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28160/">CVE-2023-28160 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28160">CVE-2023-28160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28161/">CVE-2023-28161 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28161">CVE-2023-28161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28162/">CVE-2023-28162 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28162">CVE-2023-28162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28163/">CVE-2023-28163 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28163">CVE-2023-28163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28164/">CVE-2023-28164 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28164">CVE-2023-28164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28176/">CVE-2023-28176 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28176">CVE-2023-28176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28177/">CVE-2023-28177 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28177">CVE-2023-28177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992580" comment="MozillaFirefox-102.9.0-72.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992581" comment="MozillaFirefox-translations-common-102.9.0-72.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992582" comment="MozillaFirefox-translations-other-102.9.0-72.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218313" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1211175" ref_url="https://bugzilla.suse.com/1211175" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32205" ref_url="https://www.suse.com/security/cve/CVE-2023-32205/" source="CVE"/>
		<reference ref_id="CVE-2023-32206" ref_url="https://www.suse.com/security/cve/CVE-2023-32206/" source="CVE"/>
		<reference ref_id="CVE-2023-32207" ref_url="https://www.suse.com/security/cve/CVE-2023-32207/" source="CVE"/>
		<reference ref_id="CVE-2023-32211" ref_url="https://www.suse.com/security/cve/CVE-2023-32211/" source="CVE"/>
		<reference ref_id="CVE-2023-32212" ref_url="https://www.suse.com/security/cve/CVE-2023-32212/" source="CVE"/>
		<reference ref_id="CVE-2023-32213" ref_url="https://www.suse.com/security/cve/CVE-2023-32213/" source="CVE"/>
		<reference ref_id="CVE-2023-32214" ref_url="https://www.suse.com/security/cve/CVE-2023-32214/" source="CVE"/>
		<reference ref_id="CVE-2023-32215" ref_url="https://www.suse.com/security/cve/CVE-2023-32215/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Extended Support Release 102.11.0 ESR (bsc#1211175):

- CVE-2023-32205: Browser prompts could have been obscured by popups
- CVE-2023-32206: Crash in RLBox Expat driver
- CVE-2023-32207: Potential permissions request bypass via clickjacking
- CVE-2023-32211: Content process crash due to invalid wasm code
- CVE-2023-32212: Potential spoof due to obscured address bar
- CVE-2023-32213: Potential memory corruption in FileReader::DoReadData()
- CVE-2023-32214: Potential DoS via exposed protocol handlers
- CVE-2023-32215: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-11"/>
	<updated date="2023-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211175">SUSE bug 1211175</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32205/">CVE-2023-32205 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32205">CVE-2023-32205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32206/">CVE-2023-32206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32206">CVE-2023-32206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32207/">CVE-2023-32207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32207">CVE-2023-32207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32211/">CVE-2023-32211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32211">CVE-2023-32211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32212/">CVE-2023-32212 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32212">CVE-2023-32212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32213/">CVE-2023-32213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32213">CVE-2023-32213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32214/">CVE-2023-32214 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32214">CVE-2023-32214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32215/">CVE-2023-32215 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32215">CVE-2023-32215 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992583" comment="MozillaFirefox-102.11.0-72.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992584" comment="MozillaFirefox-translations-common-102.11.0-72.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992585" comment="MozillaFirefox-translations-other-102.11.0-72.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218314" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="865539" ref_url="https://bugzilla.suse.com/865539" source="BUGZILLA"/>
		<reference ref_id="869827" ref_url="https://bugzilla.suse.com/869827" source="BUGZILLA"/>
		<reference ref_id="875378" ref_url="https://bugzilla.suse.com/875378" source="BUGZILLA"/>
		<reference ref_id="875803" ref_url="https://bugzilla.suse.com/875803" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1518" ref_url="https://www.suse.com/security/cve/CVE-2014-1518/" source="CVE"/>
		<reference ref_id="CVE-2014-1520" ref_url="https://www.suse.com/security/cve/CVE-2014-1520/" source="CVE"/>
		<reference ref_id="CVE-2014-1523" ref_url="https://www.suse.com/security/cve/CVE-2014-1523/" source="CVE"/>
		<reference ref_id="CVE-2014-1524" ref_url="https://www.suse.com/security/cve/CVE-2014-1524/" source="CVE"/>
		<reference ref_id="CVE-2014-1529" ref_url="https://www.suse.com/security/cve/CVE-2014-1529/" source="CVE"/>
		<reference ref_id="CVE-2014-1530" ref_url="https://www.suse.com/security/cve/CVE-2014-1530/" source="CVE"/>
		<reference ref_id="CVE-2014-1531" ref_url="https://www.suse.com/security/cve/CVE-2014-1531/" source="CVE"/>
		<reference ref_id="CVE-2014-1532" ref_url="https://www.suse.com/security/cve/CVE-2014-1532/" source="CVE"/>
		<description>

This Mozilla Firefox and Mozilla NSS update to 24.5.0esr fixes the 
following several security and non-security issues:

    * MFSA 2014-34/CVE-2014-1518
      Miscellaneous memory safety hazards
    * MFSA 2014-37/CVE-2014-1523
      Out of bounds read while decoding JPG images
    * MFSA 2014-38/CVE-2014-1524
      Buffer overflow when using non-XBL object as XBL
    * MFSA 2014-42/CVE-2014-1529
      Privilege escalation through Web Notification API
    * MFSA 2014-43/CVE-2014-1530
      Cross-site scripting (XSS) using history navigations
    * MFSA 2014-44/CVE-2014-1531
      Use-after-free in imgLoader while resizing images
    * MFSA 2014-46/CVE-2014-1532
      Use-after-free in nsHostResolver

Mozilla NSS has been updated to 3.16:

    * required for Firefox 29
    * CVE-2014-1492: In a wildcard certificate, the wildcard character
      should not be embedded within the U-label of an internationalized
      domain name. See the last bullet point in RFC 6125, Section 7.2.
    * Update of root certificates.

Security Issue references:

    * CVE-2014-1532
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532&gt;
    * CVE-2014-1531
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531&gt;
    * CVE-2014-1530
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530&gt;
    * CVE-2014-1529
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529&gt;
    * CVE-2014-1524
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524&gt;
    * CVE-2014-1523
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523&gt;
    * CVE-2014-1520
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1520&gt;
    * CVE-2014-1518
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-01"/>
	<updated date="2014-05-01"/>
	<bugzilla href="https://bugzilla.suse.com/865539">SUSE bug 865539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869827">SUSE bug 869827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875378">SUSE bug 875378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875803">SUSE bug 875803</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1518/">CVE-2014-1518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1518">CVE-2014-1518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1520/">CVE-2014-1520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1520">CVE-2014-1520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1523/">CVE-2014-1523 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1523">CVE-2014-1523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1524/">CVE-2014-1524 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1524">CVE-2014-1524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1529/">CVE-2014-1529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1529">CVE-2014-1529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1530/">CVE-2014-1530 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1530">CVE-2014-1530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1531/">CVE-2014-1531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1531">CVE-2014-1531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1532/">CVE-2014-1532 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1532">CVE-2014-1532 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577207" comment="MozillaFirefox-24.5.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577208" comment="MozillaFirefox-branding-SLED-24-0.7.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577209" comment="MozillaFirefox-translations-24.5.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577210" comment="libfreebl3-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577211" comment="libfreebl3-32bit-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577212" comment="libfreebl3-x86-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577213" comment="libsoftokn3-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577214" comment="libsoftokn3-32bit-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577215" comment="libsoftokn3-x86-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577216" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577217" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577218" comment="mozilla-nspr-x86-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577219" comment="mozilla-nss-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577220" comment="mozilla-nss-32bit-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577221" comment="mozilla-nss-tools-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577222" comment="mozilla-nss-x86-3.16-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577207" comment="MozillaFirefox-24.5.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577208" comment="MozillaFirefox-branding-SLED-24-0.7.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577209" comment="MozillaFirefox-translations-24.5.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577210" comment="libfreebl3-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577211" comment="libfreebl3-32bit-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577212" comment="libfreebl3-x86-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577213" comment="libsoftokn3-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577214" comment="libsoftokn3-32bit-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577215" comment="libsoftokn3-x86-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577216" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577217" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577218" comment="mozilla-nspr-x86-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577219" comment="mozilla-nss-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577220" comment="mozilla-nss-32bit-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577221" comment="mozilla-nss-tools-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577222" comment="mozilla-nss-x86-3.16-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577207" comment="MozillaFirefox-24.5.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577208" comment="MozillaFirefox-branding-SLED-24-0.7.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577209" comment="MozillaFirefox-translations-24.5.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577210" comment="libfreebl3-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577211" comment="libfreebl3-32bit-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577212" comment="libfreebl3-x86-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577213" comment="libsoftokn3-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577214" comment="libsoftokn3-32bit-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577215" comment="libsoftokn3-x86-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577216" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577217" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577218" comment="mozilla-nspr-x86-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577219" comment="mozilla-nss-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577220" comment="mozilla-nss-32bit-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577221" comment="mozilla-nss-tools-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577222" comment="mozilla-nss-x86-3.16-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218315" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="925368" ref_url="https://bugzilla.suse.com/925368" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801/" source="CVE"/>
		<reference ref_id="CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807/" source="CVE"/>
		<reference ref_id="CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813/" source="CVE"/>
		<reference ref_id="CVE-2015-0814" ref_url="https://www.suse.com/security/cve/CVE-2015-0814/" source="CVE"/>
		<reference ref_id="CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001346.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to 31.6.0 ESR to fix five security issues.

The following vulnerabilities have been fixed:

    * Miscellaneous memory safety hazards (MFSA
      2015-30/CVE-2015-0814/CVE-2015-0815)
    * Use-after-free when using the Fluendo MP3 GStreamer plugin (MFSA
      2015-31/CVE-2015-0813)
    * resource:// documents can load privileged pages (MFSA
      2015-33/CVE-2015-0816)
    * CORS requests should not follow 30x redirections after preflight
      (MFSA 2015-37/CVE-2015-0807)
    * Same-origin bypass through anchor navigation (MFSA
      2015-40/CVE-2015-0801)

Security Issues:

    * CVE-2015-0801
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801&gt;
    * CVE-2015-0807
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807&gt;
    * CVE-2015-0813
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813&gt;
    * CVE-2015-0814
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0814&gt;
    * CVE-2015-0816
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-02"/>
	<updated date="2015-04-02"/>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0801">CVE-2015-0801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0807">CVE-2015-0807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0813">CVE-2015-0813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0814/">CVE-2015-0814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0814">CVE-2015-0814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0816">CVE-2015-0816 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577223" comment="MozillaFirefox-31.6.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577224" comment="MozillaFirefox-translations-31.6.0esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577223" comment="MozillaFirefox-31.6.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577224" comment="MozillaFirefox-translations-31.6.0esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577223" comment="MozillaFirefox-31.6.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577224" comment="MozillaFirefox-translations-31.6.0esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218316" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="908275" ref_url="https://bugzilla.suse.com/908275" source="BUGZILLA"/>
		<reference ref_id="935033" ref_url="https://bugzilla.suse.com/935033" source="BUGZILLA"/>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001503.html" source="SUSE-SU"/>
		<description>
MozillaFirefox, mozilla-nspr and mozilla-nss were updated to fix 17 security issues.

For more details please check the changelogs.

These security issues were fixed:
- CVE-2015-2724/CVE-2015-2725/CVE-2015-2726: Miscellaneous memory safety hazards (bsc#935979).
- CVE-2015-2728: Type confusion in Indexed Database Manager (bsc#935979).
- CVE-2015-2730: ECDSA signature validation fails to handle some signatures correctly (bsc#935979).
- CVE-2015-2722/CVE-2015-2733: Use-after-free in workers while using XMLHttpRequest (bsc#935979).
- CVE-2015-2734/CVE-2015-2735/CVE-2015-2736/CVE-2015-2737/CVE-2015-2738/CVE-2015-2739/CVE-2015-2740: Vulnerabilities found through code inspection (bsc#935979).
- CVE-2015-2743: Privilege escalation in PDF.js (bsc#935979).
- CVE-2015-4000: NSS accepts export-length DHE keys with regular DHE cipher suites (bsc#935033).
- CVE-2015-2721: NSS incorrectly permits skipping of ServerKeyExchange (bsc#935979).

This non-security issue was fixed:
- bsc#908275: Firefox did not print in landscape orientation.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-15"/>
	<updated date="2015-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/908275">SUSE bug 908275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935033">SUSE bug 935033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2721">CVE-2015-2721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2722">CVE-2015-2722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2724">CVE-2015-2724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2725">CVE-2015-2725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2726">CVE-2015-2726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2728">CVE-2015-2728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2730">CVE-2015-2730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2733">CVE-2015-2733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2734">CVE-2015-2734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2735">CVE-2015-2735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2736">CVE-2015-2736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2737">CVE-2015-2737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2738">CVE-2015-2738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2739">CVE-2015-2739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2740">CVE-2015-2740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2743">CVE-2015-2743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577225" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577226" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577227" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577228" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577229" comment="libfreebl3-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577230" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577231" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577232" comment="libsoftokn3-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577233" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577234" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577235" comment="mozilla-nspr-x86-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577236" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577237" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577238" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577239" comment="mozilla-nss-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577225" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577226" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577227" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577228" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577229" comment="libfreebl3-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577230" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577231" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577232" comment="libsoftokn3-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577233" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577234" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577235" comment="mozilla-nspr-x86-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577236" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577237" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577238" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577239" comment="mozilla-nss-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577225" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577226" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577227" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577228" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577229" comment="libfreebl3-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577230" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577231" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577232" comment="libsoftokn3-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577233" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577234" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577235" comment="mozilla-nspr-x86-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577236" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577237" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577238" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577239" comment="mozilla-nss-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218317" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="969894" ref_url="https://bugzilla.suse.com/969894" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952/" source="CVE"/>
		<reference ref_id="CVE-2016-1953" ref_url="https://www.suse.com/security/cve/CVE-2016-1953/" source="CVE"/>
		<reference ref_id="CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954/" source="CVE"/>
		<reference ref_id="CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957/" source="CVE"/>
		<reference ref_id="CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958/" source="CVE"/>
		<reference ref_id="CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960/" source="CVE"/>
		<reference ref_id="CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961/" source="CVE"/>
		<reference ref_id="CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962/" source="CVE"/>
		<reference ref_id="CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964/" source="CVE"/>
		<reference ref_id="CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965/" source="CVE"/>
		<reference ref_id="CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966/" source="CVE"/>
		<reference ref_id="CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974/" source="CVE"/>
		<reference ref_id="CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977/" source="CVE"/>
		<reference ref_id="CVE-2016-1978" ref_url="https://www.suse.com/security/cve/CVE-2016-1978/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790/" source="CVE"/>
		<reference ref_id="CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791/" source="CVE"/>
		<reference ref_id="CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792/" source="CVE"/>
		<reference ref_id="CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793/" source="CVE"/>
		<reference ref_id="CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794/" source="CVE"/>
		<reference ref_id="CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795/" source="CVE"/>
		<reference ref_id="CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796/" source="CVE"/>
		<reference ref_id="CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797/" source="CVE"/>
		<reference ref_id="CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798/" source="CVE"/>
		<reference ref_id="CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799/" source="CVE"/>
		<reference ref_id="CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800/" source="CVE"/>
		<reference ref_id="CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801/" source="CVE"/>
		<reference ref_id="CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox, mozilla-nspr, mozilla-nss fixes the following issues:

Mozilla Firefox was updated to 38.7.0 ESR (bsc#969894)
* MFSA 2016-16/CVE-2016-1952/CVE-2016-1953
  Miscellaneous memory safety hazards (rv:45.0 / rv:38.7)
* MFSA 2016-17/CVE-2016-1954
  Local file overwriting and potential privilege escalation
  through CSP reports
* MFSA 2016-20/CVE-2016-1957
  A memory leak in libstagefright when deleting an array during
  MP4 processing was fixed.
* MFSA 2016-21/CVE-2016-1958
  The displayed page address can be overridden
* MFSA 2016-23/CVE-2016-1960
  A use-after-free in HTML5 string parser was fixed.
* MFSA 2016-24/CVE-2016-1961
  A use-after-free in SetBody was fixed.
* MFSA 2016-25/CVE-2016-1962
  A use-after-free when using multiple WebRTC data channels was fixed.
* MFSA 2016-27/CVE-2016-1964
  A use-after-free during XML transformations was fixed.
* MFSA 2016-28/CVE-2016-1965
  Addressbar spoofing though history navigation and Location
  protocol property was fixed.
* MFSA 2016-31/CVE-2016-1966
  Memory corruption with malicious NPAPI plugin was fixed.
* MFSA 2016-34/CVE-2016-1974
  A out-of-bounds read in the HTML parser following a failed
  allocation was fixed.
* MFSA 2016-35/CVE-2016-1950
  A buffer overflow during ASN.1 decoding in NSS was fixed.
* MFSA 2016-37/CVE-2016-1977/CVE-2016-2790/CVE-2016-2791/
  CVE-2016-2792/CVE-2016-2793/CVE-2016-2794/CVE-2016-2795/
  CVE-2016-2796/CVE-2016-2797/CVE-2016-2798/CVE-2016-2799/
  CVE-2016-2800/CVE-2016-2801/CVE-2016-2802
  Various font vulnerabilities were fixed in the embedded Graphite 2 library

Mozilla NSS was updated to fix:
* MFSA 2016-15/CVE-2016-1978
  Use-after-free in NSS during SSL connections in low memory
* MFSA 2016-35/CVE-2016-1950
  Buffer overflow during ASN.1 decoding in NSS
* MFSA 2016-36/CVE-2016-1979
  Use-after-free during processing of DER encoded keys in NSS

Mozilla NSPR was updated to version 4.12 (bsc#969894)
* added a PR_GetEnvSecure function, which attempts to detect if
  the program is being executed with elevated privileges, and
  returns NULL if detected. It is recommended to use this function
  in general purpose library code.
* fixed a memory allocation bug related to the PR_*printf functions
* exported API PR_DuplicateEnvironment, which had already been
  added in NSPR 4.10.9
* added support for FreeBSD aarch64
* several minor correctness and compatibility fixes
* Enable atomic instructions on mips (bmo#1129878)
* Fix mips assertion failure when creating thread with custom
  stack size (bmo#1129968)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-15"/>
	<updated date="2016-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1950">CVE-2016-1950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1952">CVE-2016-1952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1953/">CVE-2016-1953 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1953">CVE-2016-1953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1954">CVE-2016-1954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1957">CVE-2016-1957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1958">CVE-2016-1958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1960">CVE-2016-1960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1961">CVE-2016-1961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1962">CVE-2016-1962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1964">CVE-2016-1964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1965">CVE-2016-1965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1966">CVE-2016-1966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1974">CVE-2016-1974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1977">CVE-2016-1977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1978/">CVE-2016-1978 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1978">CVE-2016-1978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1979">CVE-2016-1979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2790">CVE-2016-2790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2791">CVE-2016-2791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2792">CVE-2016-2792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2793">CVE-2016-2793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2794">CVE-2016-2794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2795">CVE-2016-2795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2796">CVE-2016-2796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2797">CVE-2016-2797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2798">CVE-2016-2798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2799">CVE-2016-2799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2800">CVE-2016-2800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2801">CVE-2016-2801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2802">CVE-2016-2802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577240" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577241" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577242" comment="libfreebl3-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577243" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577244" comment="libsoftokn3-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577245" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577246" comment="mozilla-nspr-4.12-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577247" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577248" comment="mozilla-nss-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577249" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577250" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577240" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577241" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577242" comment="libfreebl3-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577243" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577244" comment="libsoftokn3-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577245" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577246" comment="mozilla-nspr-4.12-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577247" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577248" comment="mozilla-nss-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577249" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577250" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218318" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, rust-cbindgen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1190274" ref_url="https://bugzilla.suse.com/1190274" source="BUGZILLA"/>
		<reference ref_id="1190710" ref_url="https://bugzilla.suse.com/1190710" source="BUGZILLA"/>
		<reference ref_id="1191332" ref_url="https://bugzilla.suse.com/1191332" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-32810" ref_url="https://www.suse.com/security/cve/CVE-2021-32810/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<reference ref_id="CVE-2021-38496" ref_url="https://www.suse.com/security/cve/CVE-2021-38496/" source="CVE"/>
		<reference ref_id="CVE-2021-38497" ref_url="https://www.suse.com/security/cve/CVE-2021-38497/" source="CVE"/>
		<reference ref_id="CVE-2021-38498" ref_url="https://www.suse.com/security/cve/CVE-2021-38498/" source="CVE"/>
		<reference ref_id="CVE-2021-38500" ref_url="https://www.suse.com/security/cve/CVE-2021-38500/" source="CVE"/>
		<reference ref_id="CVE-2021-38501" ref_url="https://www.suse.com/security/cve/CVE-2021-38501/" source="CVE"/>
		<description>
This update for MozillaFirefox, rust-cbindgen fixes the following issues:

MozillaFirefox was updated to Extended Support Release 91.2.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-45 (bsc#1191332)

  * CVE-2021-38496: Use-after-free in MessageTask
  * CVE-2021-38497: Validation message could have been overlaid on another origin
  * CVE-2021-38498: Use-after-free of nsLanguageAtomService object
  * CVE-2021-32810: Data race in crossbeam-deque
  * CVE-2021-38500: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2
  * CVE-2021-38501: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2

- Fixed crash in FIPS mode (bsc#1190710)

Firefox Extended Support Release 91.1.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274)

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Firefox 91.0.1esr ESR

  * Fixed: Fixed an issue causing buttons on the tab bar to be
    resized when loading certain websites (bug 1704404)
    (bmo#1704404)
  * Fixed: Fixed an issue which caused tabs from private windows
    to be visible in non-private windows when viewing switch-to-
    tab results in the address bar panel (bug 1720369)
    (bmo#1720369)
  * Fixed: Various stability fixes
  * Fixed: Security fix
  MFSA 2021-37 (bsc#1189547)
  * CVE-2021-29991 (bmo#1724896)
    Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

  * New: Some of the highlights of the new Extended Support
    Release are:
    - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
    - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
    - On Windows, updates can now be applied in the background
    while Firefox is not running.
    - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
    - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
    - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
    - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
    - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
    - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
    - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
    - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
    - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
    - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
    - We’ve improved functionality and design for a number of
    Firefox search features:
      * Selecting a search engine at the bottom of the search
    panel now enters search mode for that engine, allowing you to
    see suggestions (if available) for your search terms. The old
    behavior (immediately performing a search) is available with
    a shift-click.
      * When Firefox autocompletes the URL of one of your search
    engines, you can now search with that engine directly in the
    address bar by selecting the shortcut in the address bar
    results.
      * We’ve added buttons at the bottom of the search panel to
    allow you to search your bookmarks, open tabs, and history.
    - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
    - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
    - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
  * Changed: Firefox no longer supports Adobe Flash. There is no
    setting available to re-enable Flash support.
  * Enterprise: Various bug fixes and new policies have been
    implemented in the latest version of Firefox. See more
    details in the Firefox for Enterprise 91 Release Notes.

MFSA 2021-33 (bsc#1188891)

* CVE-2021-29986: Race condition when resolving DNS names could have led to memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91

rust-cbindgen was updated to 0.19.0.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-18"/>
	<updated date="2021-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190274">SUSE bug 1190274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190710">SUSE bug 1190710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29981">CVE-2021-29981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29982">CVE-2021-29982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29983">CVE-2021-29983 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29987">CVE-2021-29987 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29990">CVE-2021-29990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29991">CVE-2021-29991 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32810/">CVE-2021-32810 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32810">CVE-2021-32810 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38492">CVE-2021-38492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38495">CVE-2021-38495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38496/">CVE-2021-38496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38496">CVE-2021-38496 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38497/">CVE-2021-38497 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38497">CVE-2021-38497 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38498/">CVE-2021-38498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38498">CVE-2021-38498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38500/">CVE-2021-38500 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38500">CVE-2021-38500 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38501/">CVE-2021-38501 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38501">CVE-2021-38501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652557" comment="MozillaFirefox-91.2.0-78.143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652558" comment="MozillaFirefox-branding-SLED-91-21.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652559" comment="MozillaFirefox-translations-common-91.2.0-78.143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652560" comment="MozillaFirefox-translations-other-91.2.0-78.143.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218319" version="1" class="patch">
	<metadata>
		<title>Recommended update for NetworkManager-kde4 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="663413" ref_url="https://bugzilla.suse.com/663413" source="BUGZILLA"/>
		<reference ref_id="726349" ref_url="https://bugzilla.suse.com/726349" source="BUGZILLA"/>
		<description>
This NetworkManager-kde4 update fixes the following security and non security issues: 

- Fixed a long standing security issue. This makes knetworkmanager probe the RADIUS server for a CA certificate subject and hash if no CA certificate is specified. knetworkmanager then stores this data and send it to NetworkManager for it to do a network validation in the absence of a real certificate (bsc#726349)

- Disabled the loading by default of the NetworkManager plasma applet since it doesn't work.
- Fixed a crash due to the use of an uninitialized variable in the plasma applet in case someone runs it manually (bsc#663413)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-01"/>
	<updated date="2016-06-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/663413">SUSE bug 663413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/726349">SUSE bug 726349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570666" comment="NetworkManager-kde4-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570667" comment="NetworkManager-kde4-lang-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570668" comment="NetworkManager-kde4-libs-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570669" comment="NetworkManager-openvpn-kde4-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570670" comment="NetworkManager-pptp-kde4-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570671" comment="plasmoid-networkmanagement-0.9.svn1043876-1.3.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218320" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1040107" ref_url="https://bugzilla.suse.com/1040107" source="BUGZILLA"/>
		<reference ref_id="1040114" ref_url="https://bugzilla.suse.com/1040114" source="BUGZILLA"/>
		<reference ref_id="1052522" ref_url="https://bugzilla.suse.com/1052522" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12596" ref_url="https://www.suse.com/security/cve/CVE-2017-12596/" source="CVE"/>
		<reference ref_id="CVE-2017-9110" ref_url="https://www.suse.com/security/cve/CVE-2017-9110/" source="CVE"/>
		<reference ref_id="CVE-2017-9114" ref_url="https://www.suse.com/security/cve/CVE-2017-9114/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

* CVE-2017-9110: In OpenEXR, an invalid read of size 2 in the hufDecode function in ImfHuf.cpp could cause the application to crash. (bsc#1040107)
* CVE-2017-9114: In OpenEXR, an invalid read of size 1 in the refill function in ImfFastHuf.cpp could cause the application to crash.  (bsc#1040114)
* CVE-2017-12596: In OpenEXR, a crafted image causes a heap-based buffer over-read in the hufDecode function in IlmImf/ImfHuf.cpp during exrmaketiled execution; it could have resulted in denial of service or possibly unspecified other impact.  (bsc#1052522)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-02"/>
	<updated date="2018-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040107">SUSE bug 1040107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040114">SUSE bug 1040114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052522">SUSE bug 1052522</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12596/">CVE-2017-12596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12596">CVE-2017-12596 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9110/">CVE-2017-9110 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9110">CVE-2017-9110 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9114/">CVE-2017-9114 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9114">CVE-2017-9114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570672" comment="OpenEXR-1.6.1-83.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564202" comment="OpenEXR-32bit-1.6.1-83.17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218321" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1040109" ref_url="https://bugzilla.suse.com/1040109" source="BUGZILLA"/>
		<reference ref_id="1040112" ref_url="https://bugzilla.suse.com/1040112" source="BUGZILLA"/>
		<reference ref_id="1040113" ref_url="https://bugzilla.suse.com/1040113" source="BUGZILLA"/>
		<reference ref_id="1040115" ref_url="https://bugzilla.suse.com/1040115" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9111" ref_url="https://www.suse.com/security/cve/CVE-2017-9111/" source="CVE"/>
		<reference ref_id="CVE-2017-9112" ref_url="https://www.suse.com/security/cve/CVE-2017-9112/" source="CVE"/>
		<reference ref_id="CVE-2017-9113" ref_url="https://www.suse.com/security/cve/CVE-2017-9113/" source="CVE"/>
		<reference ref_id="CVE-2017-9115" ref_url="https://www.suse.com/security/cve/CVE-2017-9115/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

Security issues fixed:

- CVE-2017-9111: Fixed an invalid write of size 8 in the storeSSE function in ImfOptimizedPixelReading.h (bsc#1040109).
- CVE-2017-9113: Fixed an invalid write of size 1 in the bufferedReadPixels function in ImfInputFile.cpp (bsc#1040113).
- CVE-2017-9115: Fixed an invalid write of size 2 in the = operator function inhalf.h (bsc#1040115).    
- CVE-2017-9112: Fixed invalid read of size 1 in the getBits function in ImfHuf.cpp. (This was already fixed by the previous update bug not referenced.) (bsc#1040112)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-24"/>
	<updated date="2019-07-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040109">SUSE bug 1040109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040112">SUSE bug 1040112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040113">SUSE bug 1040113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040115">SUSE bug 1040115</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9111/">CVE-2017-9111 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9111">CVE-2017-9111 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9112/">CVE-2017-9112 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9112">CVE-2017-9112 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9113/">CVE-2017-9113 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9113">CVE-2017-9113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9115/">CVE-2017-9115 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9115">CVE-2017-9115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570673" comment="OpenEXR-1.6.1-83.17.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570674" comment="OpenEXR-32bit-1.6.1-83.17.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218322" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1061305" ref_url="https://bugzilla.suse.com/1061305" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9110" ref_url="https://www.suse.com/security/cve/CVE-2017-9110/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

- CVE-2017-14988: Fixed a denial of service in Header::readfrom() (bsc#1061305).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-09"/>
	<updated date="2019-08-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1061305">SUSE bug 1061305</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9110/">CVE-2017-9110 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9110">CVE-2017-9110 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570675" comment="OpenEXR-1.6.1-83.17.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570676" comment="OpenEXR-32bit-1.6.1-83.17.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218323" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1169574" ref_url="https://bugzilla.suse.com/1169574" source="BUGZILLA"/>
		<reference ref_id="1169576" ref_url="https://bugzilla.suse.com/1169576" source="BUGZILLA"/>
		<reference ref_id="1169578" ref_url="https://bugzilla.suse.com/1169578" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11761" ref_url="https://www.suse.com/security/cve/CVE-2020-11761/" source="CVE"/>
		<reference ref_id="CVE-2020-11763" ref_url="https://www.suse.com/security/cve/CVE-2020-11763/" source="CVE"/>
		<reference ref_id="CVE-2020-11764" ref_url="https://www.suse.com/security/cve/CVE-2020-11764/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

- CVE-2020-11764: Fixed an out-of-bounds write in copyIntoFrameBuffer in ImfMisc.cpp (bsc#1169574).
- CVE-2020-11763: Fixed an out-of-bounds read and write, as demonstrated by ImfTileOffsets.cpp (bsc#1169576).
- CVE-2020-11761: Fixed an out-of-bounds read during Huffman uncompression, as demonstrated by FastHufDecoder:refill in ImfFastHuf.cpp (bsc#1169578).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-13"/>
	<updated date="2020-05-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169574">SUSE bug 1169574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169576">SUSE bug 1169576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169578">SUSE bug 1169578</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11761/">CVE-2020-11761 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11761">CVE-2020-11761 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11763/">CVE-2020-11763 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11763">CVE-2020-11763 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11764/">CVE-2020-11764 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11764">CVE-2020-11764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570677" comment="OpenEXR-1.6.1-83.17.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570678" comment="OpenEXR-32bit-1.6.1-83.17.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218324" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179879" ref_url="https://bugzilla.suse.com/1179879" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16588" ref_url="https://www.suse.com/security/cve/CVE-2020-16588/" source="CVE"/>
		<reference ref_id="CVE-2020-16589" ref_url="https://www.suse.com/security/cve/CVE-2020-16589/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

Security issues fixed:

- CVE-2020-16588: Fixed a null pointer deference in generatePreview (bsc#1179879).
- CVE-2020-16589: Fixed a heap-based buffer overflow in writeTileData in ImfTiledOutputFile.cpp (bsc#1179879).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-21"/>
	<updated date="2020-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179879">SUSE bug 1179879</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16588/">CVE-2020-16588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16588">CVE-2020-16588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16589/">CVE-2020-16589 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16589">CVE-2020-16589 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570679" comment="OpenEXR-1.6.1-83.17.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570680" comment="OpenEXR-32bit-1.6.1-83.17.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218325" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184172" ref_url="https://bugzilla.suse.com/1184172" source="BUGZILLA"/>
		<reference ref_id="1184173" ref_url="https://bugzilla.suse.com/1184173" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3475" ref_url="https://www.suse.com/security/cve/CVE-2021-3475/" source="CVE"/>
		<reference ref_id="CVE-2021-3476" ref_url="https://www.suse.com/security/cve/CVE-2021-3476/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

- CVE-2021-3475: Integer-overflow in Imf_2_5::calculateNumTiles (bsc#1184173)
- CVE-2021-3476: Undefined-shift in Imf_2_5::unpack14 (bsc#1184172)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184172">SUSE bug 1184172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184173">SUSE bug 1184173</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3475/">CVE-2021-3475 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3475">CVE-2021-3475 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3476/">CVE-2021-3476 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3476">CVE-2021-3476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570681" comment="OpenEXR-1.6.1-83.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570682" comment="OpenEXR-32bit-1.6.1-83.17.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218326" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184354" ref_url="https://bugzilla.suse.com/1184354" source="BUGZILLA"/>
		<reference ref_id="1187395" ref_url="https://bugzilla.suse.com/1187395" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3479" ref_url="https://www.suse.com/security/cve/CVE-2021-3479/" source="CVE"/>
		<reference ref_id="CVE-2021-3605" ref_url="https://www.suse.com/security/cve/CVE-2021-3605/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

- Fixed CVE-2021-3479 [bsc#1184354]: Out-of-memory caused by allocation of a very large buffer
- Fixed CVE-2021-3605 [bsc#1187395]: Heap buffer overflow in the rleUncompress function
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-22"/>
	<updated date="2021-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184354">SUSE bug 1184354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187395">SUSE bug 1187395</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3479/">CVE-2021-3479 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3479">CVE-2021-3479 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3605/">CVE-2021-3605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3605">CVE-2021-3605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570683" comment="OpenEXR-1.6.1-83.17.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570684" comment="OpenEXR-32bit-1.6.1-83.17.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218327" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188457" ref_url="https://bugzilla.suse.com/1188457" source="BUGZILLA"/>
		<reference ref_id="1188458" ref_url="https://bugzilla.suse.com/1188458" source="BUGZILLA"/>
		<reference ref_id="1188460" ref_url="https://bugzilla.suse.com/1188460" source="BUGZILLA"/>
		<reference ref_id="1188461" ref_url="https://bugzilla.suse.com/1188461" source="BUGZILLA"/>
		<reference ref_id="1192556" ref_url="https://bugzilla.suse.com/1192556" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20298" ref_url="https://www.suse.com/security/cve/CVE-2021-20298/" source="CVE"/>
		<reference ref_id="CVE-2021-20300" ref_url="https://www.suse.com/security/cve/CVE-2021-20300/" source="CVE"/>
		<reference ref_id="CVE-2021-20303" ref_url="https://www.suse.com/security/cve/CVE-2021-20303/" source="CVE"/>
		<reference ref_id="CVE-2021-20304" ref_url="https://www.suse.com/security/cve/CVE-2021-20304/" source="CVE"/>
		<reference ref_id="CVE-2021-3941" ref_url="https://www.suse.com/security/cve/CVE-2021-3941/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

- CVE-2021-20298: Fixed out-of-memory in B44Compressor (bsc#1188460).
- CVE-2021-20300: Fixed integer-overflow in Imf_2_5:hufUncompress (bsc#1188458).
- CVE-2021-20303: Fixed heap-buffer-overflow in Imf_2_5::copyIntoFrameBuffe (bsc#1188457).
- CVE-2021-20304: Fixed undefined-shift in Imf_2_5:hufDecode (bsc#1188461).
- CVE-2021-3941: Fixed divide-by-zero in Imf_3_1:RGBtoXYZ (bsc#1192556).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188457">SUSE bug 1188457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188458">SUSE bug 1188458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188460">SUSE bug 1188460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188461">SUSE bug 1188461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192556">SUSE bug 1192556</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20298/">CVE-2021-20298 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20298">CVE-2021-20298 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20300/">CVE-2021-20300 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20300">CVE-2021-20300 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-20303/">CVE-2021-20303 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20303">CVE-2021-20303 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20304/">CVE-2021-20304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20304">CVE-2021-20304 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3941/">CVE-2021-3941 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3941">CVE-2021-3941 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657133" comment="OpenEXR-1.6.1-83.17.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657134" comment="OpenEXR-32bit-1.6.1-83.17.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218328" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1124799" ref_url="https://bugzilla.suse.com/1124799" source="BUGZILLA"/>
		<reference ref_id="1124800" ref_url="https://bugzilla.suse.com/1124800" source="BUGZILLA"/>
		<reference ref_id="1124802" ref_url="https://bugzilla.suse.com/1124802" source="BUGZILLA"/>
		<reference ref_id="1124803" ref_url="https://bugzilla.suse.com/1124803" source="BUGZILLA"/>
		<reference ref_id="1124805" ref_url="https://bugzilla.suse.com/1124805" source="BUGZILLA"/>
		<reference ref_id="1124806" ref_url="https://bugzilla.suse.com/1124806" source="BUGZILLA"/>
		<reference ref_id="1124824" ref_url="https://bugzilla.suse.com/1124824" source="BUGZILLA"/>
		<reference ref_id="1124825" ref_url="https://bugzilla.suse.com/1124825" source="BUGZILLA"/>
		<reference ref_id="1124826" ref_url="https://bugzilla.suse.com/1124826" source="BUGZILLA"/>
		<reference ref_id="1124827" ref_url="https://bugzilla.suse.com/1124827" source="BUGZILLA"/>
		<reference ref_id="1125099" ref_url="https://bugzilla.suse.com/1125099" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-7572" ref_url="https://www.suse.com/security/cve/CVE-2019-7572/" source="CVE"/>
		<reference ref_id="CVE-2019-7573" ref_url="https://www.suse.com/security/cve/CVE-2019-7573/" source="CVE"/>
		<reference ref_id="CVE-2019-7574" ref_url="https://www.suse.com/security/cve/CVE-2019-7574/" source="CVE"/>
		<reference ref_id="CVE-2019-7575" ref_url="https://www.suse.com/security/cve/CVE-2019-7575/" source="CVE"/>
		<reference ref_id="CVE-2019-7576" ref_url="https://www.suse.com/security/cve/CVE-2019-7576/" source="CVE"/>
		<reference ref_id="CVE-2019-7577" ref_url="https://www.suse.com/security/cve/CVE-2019-7577/" source="CVE"/>
		<reference ref_id="CVE-2019-7578" ref_url="https://www.suse.com/security/cve/CVE-2019-7578/" source="CVE"/>
		<reference ref_id="CVE-2019-7635" ref_url="https://www.suse.com/security/cve/CVE-2019-7635/" source="CVE"/>
		<reference ref_id="CVE-2019-7636" ref_url="https://www.suse.com/security/cve/CVE-2019-7636/" source="CVE"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2019-7638" ref_url="https://www.suse.com/security/cve/CVE-2019-7638/" source="CVE"/>
		<description>
This update for SDL fixes the following issues:

Security issues fixed:	  

- CVE-2019-7572: Fixed a buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c.(bsc#1124806).
- CVE-2019-7578: Fixed a heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c (bsc#1125099).
- CVE-2019-7576: Fixed heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (bsc#1124799).
- CVE-2019-7573: Fixed a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (bsc#1124805).
- CVE-2019-7635: Fixed a heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c. (bsc#1124827).
- CVE-2019-7636: Fixed a heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c (bsc#1124826).
- CVE-2019-7638: Fixed a heap-based buffer over-read in Map1toN in video/SDL_pixels.c (bsc#1124824).
- CVE-2019-7574: Fixed a heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c (bsc#1124803).
- CVE-2019-7575: Fixed a heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c (bsc#1124802).
- CVE-2019-7637: Fixed a heap-based buffer overflow in SDL_FillRect function in SDL_surface.c (bsc#1124825).	  
- CVE-2019-7577: Fixed a buffer over read in SDL_LoadWAV_RW in audio/SDL_wave.c (bsc#1124800).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124799">SUSE bug 1124799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124800">SUSE bug 1124800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124802">SUSE bug 1124802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124803">SUSE bug 1124803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124805">SUSE bug 1124805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124806">SUSE bug 1124806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124824">SUSE bug 1124824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124825">SUSE bug 1124825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124826">SUSE bug 1124826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124827">SUSE bug 1124827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125099">SUSE bug 1125099</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7572/">CVE-2019-7572 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7572">CVE-2019-7572 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7573/">CVE-2019-7573 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7573">CVE-2019-7573 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7574/">CVE-2019-7574 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7574">CVE-2019-7574 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7575/">CVE-2019-7575 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7575">CVE-2019-7575 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7576/">CVE-2019-7576 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7576">CVE-2019-7576 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7577/">CVE-2019-7577 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7577">CVE-2019-7577 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7578/">CVE-2019-7578 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7578">CVE-2019-7578 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7635/">CVE-2019-7635 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7635">CVE-2019-7635 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7636/">CVE-2019-7636 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7636">CVE-2019-7636 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7637">CVE-2019-7637 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7638/">CVE-2019-7638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7638">CVE-2019-7638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570687" comment="SDL-1.2.13-106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564204" comment="SDL-32bit-1.2.13-106.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218329" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1141844" ref_url="https://bugzilla.suse.com/1141844" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13616" ref_url="https://www.suse.com/security/cve/CVE-2019-13616/" source="CVE"/>
		<description>
This update for SDL fixes the following issues:

Secuirty issue fixed:

- CVE-2019-13616: Fixed heap-based buffer over-read in BlitNtoN in video/SDL_blit_N.c when called from SDL_SoftBlit (bsc#1141844).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141844">SUSE bug 1141844</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13616/">CVE-2019-13616 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13616">CVE-2019-13616 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570688" comment="SDL-1.2.13-106.14.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570689" comment="SDL-32bit-1.2.13-106.14.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218330" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1124825" ref_url="https://bugzilla.suse.com/1124825" source="BUGZILLA"/>
		<reference ref_id="1181201" ref_url="https://bugzilla.suse.com/1181201" source="BUGZILLA"/>
		<reference ref_id="1181202" ref_url="https://bugzilla.suse.com/1181202" source="BUGZILLA"/>
		<reference ref_id="1198001" ref_url="https://bugzilla.suse.com/1198001" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<description>
This update for SDL fixes the following issues:

- CVE-2020-14410: Fixed a heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c (bsc#1181201).
- CVE-2019-7637: Fixed a heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c (bsc#1124825).
- CVE-2021-33657: Fix a buffer overflow when parsing a crafted BMP image (bsc#1198001).
- CVE-2020-14409: Fixed an integer overflow (and resultant SDL_memcpy heap corruption) in SDL_BlitCopy in video/SDL_blit_copy.c (bsc#1181202).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124825">SUSE bug 1124825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181201">SUSE bug 1181201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181202">SUSE bug 1181202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198001">SUSE bug 1198001</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7637">CVE-2019-7637 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14409">CVE-2020-14409 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14410">CVE-2020-14410 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33657">CVE-2021-33657 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679743" comment="SDL-1.2.13-106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679744" comment="SDL-32bit-1.2.13-106.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218331" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1201977" ref_url="https://bugzilla.suse.com/1201977" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-34568" ref_url="https://www.suse.com/security/cve/CVE-2022-34568/" source="CVE"/>
		<description>
This update for SDL fixes the following issues:

- CVE-2022-34568: Fixed a use after free issue (bsc#1201977).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-08"/>
	<updated date="2022-09-08"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1201977">SUSE bug 1201977</bugzilla>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-34568/">CVE-2022-34568 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34568">CVE-2022-34568 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992586" comment="SDL-1.2.13-106.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992587" comment="SDL-32bit-1.2.13-106.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218332" version="1" class="patch">
	<metadata>
		<title>Security update for SuSEfirewall2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1064127" ref_url="https://bugzilla.suse.com/1064127" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15638" ref_url="https://www.suse.com/security/cve/CVE-2017-15638/" source="CVE"/>
		<description>
This update for SuSEfirewall2 fixes the following issues:

- CVE-2017-15638: Fixed a security issue with too open implicit portmapper rules
  (bsc#1064127): A source net restriction for _rpc_ services
  was not taken into account for the implicitly added rules for port 111,
  making the portmap service accessible to everyone in the affected zone.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-02"/>
	<updated date="2017-11-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064127">SUSE bug 1064127</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15638/">CVE-2017-15638 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15638">CVE-2017-15638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570690" comment="SuSEfirewall2-3.6_SVNr208-2.18.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218333" version="1" class="patch">
	<metadata>
		<title>Security update for a2ps</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="871097" ref_url="https://bugzilla.suse.com/871097" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0466" ref_url="https://www.suse.com/security/cve/CVE-2014-0466/" source="CVE"/>
		<description>

The text to postscript converter a2ps received a security update.

The fixps script did not call ghostscript with the -DSAFER option, allowing 
command execution by attacker supplied postscript files.

Security Issue reference:

    * CVE-2014-0466
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0466&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-31"/>
	<updated date="2014-03-31"/>
	<bugzilla href="https://bugzilla.suse.com/871097">SUSE bug 871097</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0466/">CVE-2014-0466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0466">CVE-2014-0466 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577251" comment="a2ps-4.13-1326.37.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577251" comment="a2ps-4.13-1326.37.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577251" comment="a2ps-4.13-1326.37.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218334" version="1" class="patch">
	<metadata>
		<title>Security update for adns (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172265" ref_url="https://bugzilla.suse.com/1172265" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9103" ref_url="https://www.suse.com/security/cve/CVE-2017-9103/" source="CVE"/>
		<reference ref_id="CVE-2017-9104" ref_url="https://www.suse.com/security/cve/CVE-2017-9104/" source="CVE"/>
		<reference ref_id="CVE-2017-9105" ref_url="https://www.suse.com/security/cve/CVE-2017-9105/" source="CVE"/>
		<reference ref_id="CVE-2017-9106" ref_url="https://www.suse.com/security/cve/CVE-2017-9106/" source="CVE"/>
		<reference ref_id="CVE-2017-9107" ref_url="https://www.suse.com/security/cve/CVE-2017-9107/" source="CVE"/>
		<reference ref_id="CVE-2017-9108" ref_url="https://www.suse.com/security/cve/CVE-2017-9108/" source="CVE"/>
		<reference ref_id="CVE-2017-9109" ref_url="https://www.suse.com/security/cve/CVE-2017-9109/" source="CVE"/>
		<description>
This update for adns fixes the following issues:

- CVE-2017-9103,CVE-2017-9104,CVE-2017-9105,CVE-2017-9109: Fixed an issue in local recursive resolver
  which could have led to remote code execution (bsc#1172265).
- CVE-2017-9106: Fixed an issue with upstream DNS data sources which could have led to denial of 
  service (bsc#1172265).
- CVE-2017-9107: Fixed an issue when quering domain names which could have led to denial of service (bsc#1172265).
- CVE-2017-9108: Fixed an issue which could have led to denial of service (bsc#1172265).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-18"/>
	<updated date="2020-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9103/">CVE-2017-9103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9103">CVE-2017-9103 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9104/">CVE-2017-9104 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9104">CVE-2017-9104 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9105/">CVE-2017-9105 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9105">CVE-2017-9105 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9106/">CVE-2017-9106 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9106">CVE-2017-9106 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9107/">CVE-2017-9107 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9107">CVE-2017-9107 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9108/">CVE-2017-9108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9108">CVE-2017-9108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9109/">CVE-2017-9109 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9109">CVE-2017-9109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570691" comment="libadns1-1.4-75.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218335" version="1" class="patch">
	<metadata>
		<title>Security update for aide (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194735" ref_url="https://bugzilla.suse.com/1194735" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45417" ref_url="https://www.suse.com/security/cve/CVE-2021-45417/" source="CVE"/>
		<description>
This update for aide fixes the following issues:

- CVE-2021-45417: Fix a bufferoverflow in base64 functions (bsc#1194735)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194735">SUSE bug 1194735</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45417/">CVE-2021-45417 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45417">CVE-2021-45417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664250" comment="aide-0.13.1-40.16.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218336" version="1" class="patch">
	<metadata>
		<title>Security update for amanda (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1112916" ref_url="https://bugzilla.suse.com/1112916" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10729" ref_url="https://www.suse.com/security/cve/CVE-2016-10729/" source="CVE"/>
		<description>
This update for amanda fixes the following issues:

Security issue fixed:

- CVE-2016-10729: Fixed a local privilege escalation from amanda to root via unsafe tar command options (bsc#1112916).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1112916">SUSE bug 1112916</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10729/">CVE-2016-10729 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10729">CVE-2016-10729 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570692" comment="amanda-2.5.2.1-188.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218337" version="1" class="patch">
	<metadata>
		<title>Security update for amanda (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208032" ref_url="https://bugzilla.suse.com/1208032" source="BUGZILLA"/>
		<reference ref_id="1208033" ref_url="https://bugzilla.suse.com/1208033" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-37704" ref_url="https://www.suse.com/security/cve/CVE-2022-37704/" source="CVE"/>
		<reference ref_id="CVE-2022-37705" ref_url="https://www.suse.com/security/cve/CVE-2022-37705/" source="CVE"/>
		<description>
This update for amanda fixes the following issues:

- CVE-2022-37704: Fixed a local privilege escalation (bsc#1208033).
- CVE-2022-37705: Fixed a local privilege escalation in the runtar SUID binary (bsc#1208032).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-24"/>
	<updated date="2023-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208032">SUSE bug 1208032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208033">SUSE bug 1208033</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37704/">CVE-2022-37704 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37704">CVE-2022-37704 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37705/">CVE-2022-37705 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37705">CVE-2022-37705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992588" comment="amanda-2.5.2.1-188.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218338" version="1" class="patch">
	<metadata>
		<title>Security update for amanda (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1203390" ref_url="https://bugzilla.suse.com/1203390" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-37703" ref_url="https://www.suse.com/security/cve/CVE-2022-37703/" source="CVE"/>
		<description>
This update for amanda fixes the following issues:

- CVE-2022-37703: Fixed information leak vulnerability in the calcsize SUID binary (bsc#1203390).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-20"/>
	<updated date="2023-04-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203390">SUSE bug 1203390</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-37703/">CVE-2022-37703 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37703">CVE-2022-37703 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992589" comment="amanda-2.5.2.1-188.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218339" version="1" class="patch">
	<metadata>
		<title>Security update for ansible (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1008037" ref_url="https://bugzilla.suse.com/1008037" source="BUGZILLA"/>
		<reference ref_id="1008038" ref_url="https://bugzilla.suse.com/1008038" source="BUGZILLA"/>
		<reference ref_id="1010940" ref_url="https://bugzilla.suse.com/1010940" source="BUGZILLA"/>
		<reference ref_id="1019021" ref_url="https://bugzilla.suse.com/1019021" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8614" ref_url="https://www.suse.com/security/cve/CVE-2016-8614/" source="CVE"/>
		<reference ref_id="CVE-2016-8628" ref_url="https://www.suse.com/security/cve/CVE-2016-8628/" source="CVE"/>
		<reference ref_id="CVE-2016-8647" ref_url="https://www.suse.com/security/cve/CVE-2016-8647/" source="CVE"/>
		<reference ref_id="CVE-2016-9587" ref_url="https://www.suse.com/security/cve/CVE-2016-9587/" source="CVE"/>
		<description>

This update for ansible to version 2.2.0.0 fixes the following issues:

- CVE-2016-8628: Command injection by compromised server via fact variables (bsc#1008037).
- CVE-2016-8614: Improper verification of key fingerprints in apt_key module (bsc#1008038).
- CVE-2016-8647: in some circumstances the mysql_user module may fail to correctly change a password (bsc#1010940).
- CVE-2016-9587: Prevent compromised host to execute commands on the controller (bsc#1019021).

For more information about the upstream bugs fixed please see
/usr/share/doc/packages/ansible/CHANGELOG.md 
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-08"/>
	<updated date="2017-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1008037">SUSE bug 1008037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008038">SUSE bug 1008038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010940">SUSE bug 1010940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019021">SUSE bug 1019021</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8614/">CVE-2016-8614 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8614">CVE-2016-8614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8628/">CVE-2016-8628 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8628">CVE-2016-8628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8647/">CVE-2016-8647 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8647">CVE-2016-8647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9587/">CVE-2016-9587 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9587">CVE-2016-9587 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577252" comment="ansible-2.2.0.0-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218340" version="1" class="patch">
	<metadata>
		<title>Security update for ansible (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1038785" ref_url="https://bugzilla.suse.com/1038785" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7481" ref_url="https://www.suse.com/security/cve/CVE-2017-7481/" source="CVE"/>
		<description>

This update for ansible fixes the following issues:

- CVE-2017-7481: Data for lookup plugins used as variables was not being marked as 'unsafe' and could lead to unintentional disclosure of information. (bsc#1038785)
  
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-31"/>
	<updated date="2017-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1038785">SUSE bug 1038785</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7481/">CVE-2017-7481 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7481">CVE-2017-7481 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577253" comment="ansible-2.2.0.0-10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218341" version="1" class="patch">
	<metadata>
		<title>Security update for ansible (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1059235" ref_url="https://bugzilla.suse.com/1059235" source="BUGZILLA"/>
		<reference ref_id="1065872" ref_url="https://bugzilla.suse.com/1065872" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7550" ref_url="https://www.suse.com/security/cve/CVE-2017-7550/" source="CVE"/>
		<description>


This update for ansible fixes the following issues:

Ansible was updated to 2.3.2.0. A full list of changes can be found in
  /usr/share/doc/packages/ansible/CHANGELOG.md

Security issues fixed:

- CVE-2017-7550: Passing passwords in the params field in the Jenkins plugin was disallowed 
  as it can be leaked into log files because contents of params are not protected.
  Instead, the password now must be configured separately as url_password.
  (bsc#1065872)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-15"/>
	<updated date="2018-01-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059235">SUSE bug 1059235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065872">SUSE bug 1065872</bugzilla>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7550/">CVE-2017-7550 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7550">CVE-2017-7550 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577254" comment="ansible-2.3.2.0-11.5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577255" comment="libyaml-0-2-0.1.3-0.10.22.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577256" comment="python-Jinja2-2.6-2.19.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577257" comment="python-PyYAML-3.10-0.15.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577258" comment="python-ecdsa-0.10-0.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577259" comment="python-paramiko-1.13.1-0.3.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577260" comment="python-pycrypto-2.6-0.3.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218342" version="1" class="patch">
	<metadata>
		<title>Security update for ansible, python-straight-plugin (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1065872" ref_url="https://bugzilla.suse.com/1065872" source="BUGZILLA"/>
		<reference ref_id="1080682" ref_url="https://bugzilla.suse.com/1080682" source="BUGZILLA"/>
		<reference ref_id="1097775" ref_url="https://bugzilla.suse.com/1097775" source="BUGZILLA"/>
		<reference ref_id="1099808" ref_url="https://bugzilla.suse.com/1099808" source="BUGZILLA"/>
		<reference ref_id="1102126" ref_url="https://bugzilla.suse.com/1102126" source="BUGZILLA"/>
		<reference ref_id="1109957" ref_url="https://bugzilla.suse.com/1109957" source="BUGZILLA"/>
		<reference ref_id="1112959" ref_url="https://bugzilla.suse.com/1112959" source="BUGZILLA"/>
		<reference ref_id="1118896" ref_url="https://bugzilla.suse.com/1118896" source="BUGZILLA"/>
		<reference ref_id="1126503" ref_url="https://bugzilla.suse.com/1126503" source="BUGZILLA"/>
		<reference ref_id="1137479" ref_url="https://bugzilla.suse.com/1137479" source="BUGZILLA"/>
		<reference ref_id="1137528" ref_url="https://bugzilla.suse.com/1137528" source="BUGZILLA"/>
		<reference ref_id="1142542" ref_url="https://bugzilla.suse.com/1142542" source="BUGZILLA"/>
		<reference ref_id="1142690" ref_url="https://bugzilla.suse.com/1142690" source="BUGZILLA"/>
		<reference ref_id="1144453" ref_url="https://bugzilla.suse.com/1144453" source="BUGZILLA"/>
		<reference ref_id="1153452" ref_url="https://bugzilla.suse.com/1153452" source="BUGZILLA"/>
		<reference ref_id="1154231" ref_url="https://bugzilla.suse.com/1154231" source="BUGZILLA"/>
		<reference ref_id="1154232" ref_url="https://bugzilla.suse.com/1154232" source="BUGZILLA"/>
		<reference ref_id="1154830" ref_url="https://bugzilla.suse.com/1154830" source="BUGZILLA"/>
		<reference ref_id="1157968" ref_url="https://bugzilla.suse.com/1157968" source="BUGZILLA"/>
		<reference ref_id="1157969" ref_url="https://bugzilla.suse.com/1157969" source="BUGZILLA"/>
		<reference ref_id="1164133" ref_url="https://bugzilla.suse.com/1164133" source="BUGZILLA"/>
		<reference ref_id="1164134" ref_url="https://bugzilla.suse.com/1164134" source="BUGZILLA"/>
		<reference ref_id="1164135" ref_url="https://bugzilla.suse.com/1164135" source="BUGZILLA"/>
		<reference ref_id="1164136" ref_url="https://bugzilla.suse.com/1164136" source="BUGZILLA"/>
		<reference ref_id="1164137" ref_url="https://bugzilla.suse.com/1164137" source="BUGZILLA"/>
		<reference ref_id="1164138" ref_url="https://bugzilla.suse.com/1164138" source="BUGZILLA"/>
		<reference ref_id="1164139" ref_url="https://bugzilla.suse.com/1164139" source="BUGZILLA"/>
		<reference ref_id="1164140" ref_url="https://bugzilla.suse.com/1164140" source="BUGZILLA"/>
		<reference ref_id="1165393" ref_url="https://bugzilla.suse.com/1165393" source="BUGZILLA"/>
		<reference ref_id="1166389" ref_url="https://bugzilla.suse.com/1166389" source="BUGZILLA"/>
		<reference ref_id="1167440" ref_url="https://bugzilla.suse.com/1167440" source="BUGZILLA"/>
		<reference ref_id="1167532" ref_url="https://bugzilla.suse.com/1167532" source="BUGZILLA"/>
		<reference ref_id="1171162" ref_url="https://bugzilla.suse.com/1171162" source="BUGZILLA"/>
		<reference ref_id="1171823" ref_url="https://bugzilla.suse.com/1171823" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8647" ref_url="https://www.suse.com/security/cve/CVE-2016-8647/" source="CVE"/>
		<reference ref_id="CVE-2017-7550" ref_url="https://www.suse.com/security/cve/CVE-2017-7550/" source="CVE"/>
		<reference ref_id="CVE-2018-10855" ref_url="https://www.suse.com/security/cve/CVE-2018-10855/" source="CVE"/>
		<reference ref_id="CVE-2018-10875" ref_url="https://www.suse.com/security/cve/CVE-2018-10875/" source="CVE"/>
		<reference ref_id="CVE-2018-16837" ref_url="https://www.suse.com/security/cve/CVE-2018-16837/" source="CVE"/>
		<reference ref_id="CVE-2018-16876" ref_url="https://www.suse.com/security/cve/CVE-2018-16876/" source="CVE"/>
		<reference ref_id="CVE-2019-10156" ref_url="https://www.suse.com/security/cve/CVE-2019-10156/" source="CVE"/>
		<reference ref_id="CVE-2019-10206" ref_url="https://www.suse.com/security/cve/CVE-2019-10206/" source="CVE"/>
		<reference ref_id="CVE-2019-10217" ref_url="https://www.suse.com/security/cve/CVE-2019-10217/" source="CVE"/>
		<reference ref_id="CVE-2019-14846" ref_url="https://www.suse.com/security/cve/CVE-2019-14846/" source="CVE"/>
		<reference ref_id="CVE-2019-14856" ref_url="https://www.suse.com/security/cve/CVE-2019-14856/" source="CVE"/>
		<reference ref_id="CVE-2019-14858" ref_url="https://www.suse.com/security/cve/CVE-2019-14858/" source="CVE"/>
		<reference ref_id="CVE-2019-14864" ref_url="https://www.suse.com/security/cve/CVE-2019-14864/" source="CVE"/>
		<reference ref_id="CVE-2019-14904" ref_url="https://www.suse.com/security/cve/CVE-2019-14904/" source="CVE"/>
		<reference ref_id="CVE-2019-14905" ref_url="https://www.suse.com/security/cve/CVE-2019-14905/" source="CVE"/>
		<reference ref_id="CVE-2019-3828" ref_url="https://www.suse.com/security/cve/CVE-2019-3828/" source="CVE"/>
		<reference ref_id="CVE-2020-10684" ref_url="https://www.suse.com/security/cve/CVE-2020-10684/" source="CVE"/>
		<reference ref_id="CVE-2020-10685" ref_url="https://www.suse.com/security/cve/CVE-2020-10685/" source="CVE"/>
		<reference ref_id="CVE-2020-10691" ref_url="https://www.suse.com/security/cve/CVE-2020-10691/" source="CVE"/>
		<reference ref_id="CVE-2020-10729" ref_url="https://www.suse.com/security/cve/CVE-2020-10729/" source="CVE"/>
		<reference ref_id="CVE-2020-10744" ref_url="https://www.suse.com/security/cve/CVE-2020-10744/" source="CVE"/>
		<reference ref_id="CVE-2020-1733" ref_url="https://www.suse.com/security/cve/CVE-2020-1733/" source="CVE"/>
		<reference ref_id="CVE-2020-1734" ref_url="https://www.suse.com/security/cve/CVE-2020-1734/" source="CVE"/>
		<reference ref_id="CVE-2020-1735" ref_url="https://www.suse.com/security/cve/CVE-2020-1735/" source="CVE"/>
		<reference ref_id="CVE-2020-1736" ref_url="https://www.suse.com/security/cve/CVE-2020-1736/" source="CVE"/>
		<reference ref_id="CVE-2020-1737" ref_url="https://www.suse.com/security/cve/CVE-2020-1737/" source="CVE"/>
		<reference ref_id="CVE-2020-1738" ref_url="https://www.suse.com/security/cve/CVE-2020-1738/" source="CVE"/>
		<reference ref_id="CVE-2020-1739" ref_url="https://www.suse.com/security/cve/CVE-2020-1739/" source="CVE"/>
		<reference ref_id="CVE-2020-1740" ref_url="https://www.suse.com/security/cve/CVE-2020-1740/" source="CVE"/>
		<reference ref_id="CVE-2020-1746" ref_url="https://www.suse.com/security/cve/CVE-2020-1746/" source="CVE"/>
		<reference ref_id="CVE-2020-1753" ref_url="https://www.suse.com/security/cve/CVE-2020-1753/" source="CVE"/>
		<description>
This update for ansible, python-straight-plugin fixes the following issues:

ansible was updated to version 2.9.9	  

Security issues fixed: 

- CVE-2020-1753: Fixed an issue where kubectl connection plugin leaks sensitive information (bsc#1166389).
- CVE-2020-1746: Fixed a potential information leak in ldap_attr and ldap_entry modules (bsc#1165393).
- CVE-2020-1733,CVE-2020-10744: Fixed a race condition and insecure permissions which could have allowed
  another user on the node to gain control of the become user (bsc#1171823 and bsc#1164140).
- CVE-2020-1740: Fixed a potential secret leak to other local users (bsc#1164135).
- CVE-2020-1739: Fixed an issue which could have disclosed the password to other users within the same node, when it was set with the argument 'password' of svn module (bsc#1164133).
- CVE-2020-1738: Fixed an issue which could have allowed a malicious user to select the module sent to the node (bsc#1164136).
- CVE-2020-1737: Fixed an issue in extract-zip which could have allowed path traversal attacks (bsc#1164138).
- CVE-2020-1736: Fixed an improper implementation of  impatomic_move primitive which could have resulted in world-readable or with less restricted permissions before the move files in the destination (bsc#1164134).
- CVE-2020-1735: Fixed a potential path injection which could have allowed a remote user to choose the destination path on the controller node (bsc#1164137).
- CVE-2020-1734: Fixed an improper default setting in pipe lookup plugin which could have allowed running arbitrary commands by overwriting ansible facts (bsc#1164139). 
- CVE-2020-10729: Fixed an issue where two random password lookups in same task return same value (bsc#1171162).
- CVE-2020-10691: Fixed an improper sanitization in ansible-galaxy which could have allowed attackers to execute archive traversal attacks (bsc#1167873).
- CVE-2020-10685: Fixed an potential information disclosure when a module was using a file that was encrypted with vault (bsc#1167440)
- CVE-2020-10684: Fixed a potential code injection when ansible_facts was used as a subkey (bsc#1167532).
- CVE-2019-3828: Fixed a path traversal in the fetch module (bsc#1126503).
- CVE-2019-14905: Fixed a potential command injection in nxos_file_copy (bsc#1157569).
- CVE-2019-14904: Fixed an issue which could have allowed a malicious user to execute commands into the server manipulating the module behaviour (bsc#1157968).
- CVE-2019-14864: Fixed an issue which could have led to sensitive information disclosure (bsc#1154830).
- CVE-2019-14858: Fixed an issue where data in the sub parameter would have presented with increased verbosity (bsc#1154231)
- CVE-2019-14856: Fixed insufficient fix for CVE-2019-10206 (bsc#1154232).
- CVE-2019-14846: Fixed an issue which could have allowed secrets disclosure on logs due to hardcoded display to DEBUG level (bsc#1153452)
- CVE-2019-10217: Fixed an issue with fields managing sensitive data which could have leaked sensitive data when running ansible playbooks (bsc#1144453).
- CVE-2019-10206: Fixed improper implementation of ansible-playbook -k and ansible cli tools when prompt passwords (bsc#1142690).
- CVE-2019-10156: Fixed an issue when templating which could have caused an unexpected key file to be set on remote node (bsc#1137528).
- CVE-2018-16876: Fixed an issue in retry task when run with -vvv fails which could have leaked sensitive data (bsc#1118896).
- CVE-2018-16837: Fixed an issue which user module was leaking any data had been passed on as a parameter to ssh-keygen (bsc#1112959).
- CVE-2018-10875: Fixed an issue with ansible.cfg  which could have allowed an attaker to execute arbitrary code. (bsc#1099808)
- CVE-2018-10855: Fixed a potential sensitive information disclosure log files and on the terminal of the user running Ansible when the no_log flag has been used (bsc#1097775).
- CVE-2017-7550: Fixed an issue on the way parameters are passed to jenkins_plugin module allowing remote attackers to expose sensitive information from a remote host's logs (bsc#1065872).

Other issues addressed: 	  
	  
- Created missing (empty) template and files directories for 'ansible-galaxy init' during package build (bsc#1137479)
- Added python-passlib which is needed for the 'vars_prompt' feature of ansible (bsc#1080682)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-27"/>
	<updated date="2020-07-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1065872">SUSE bug 1065872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080682">SUSE bug 1080682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097775">SUSE bug 1097775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099808">SUSE bug 1099808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102126">SUSE bug 1102126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109957">SUSE bug 1109957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112959">SUSE bug 1112959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118896">SUSE bug 1118896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126503">SUSE bug 1126503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137479">SUSE bug 1137479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137528">SUSE bug 1137528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142542">SUSE bug 1142542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142690">SUSE bug 1142690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144453">SUSE bug 1144453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153452">SUSE bug 1153452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154231">SUSE bug 1154231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154232">SUSE bug 1154232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154830">SUSE bug 1154830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157968">SUSE bug 1157968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157969">SUSE bug 1157969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164133">SUSE bug 1164133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164134">SUSE bug 1164134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164135">SUSE bug 1164135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164136">SUSE bug 1164136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164137">SUSE bug 1164137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164138">SUSE bug 1164138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164139">SUSE bug 1164139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164140">SUSE bug 1164140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165393">SUSE bug 1165393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166389">SUSE bug 1166389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167440">SUSE bug 1167440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167532">SUSE bug 1167532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171162">SUSE bug 1171162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171823">SUSE bug 1171823</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8647/">CVE-2016-8647 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8647">CVE-2016-8647 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7550/">CVE-2017-7550 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7550">CVE-2017-7550 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10855/">CVE-2018-10855 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10855">CVE-2018-10855 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10875/">CVE-2018-10875 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10875">CVE-2018-10875 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16837/">CVE-2018-16837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16837">CVE-2018-16837 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16876/">CVE-2018-16876 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16876">CVE-2018-16876 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10156/">CVE-2019-10156 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10156">CVE-2019-10156 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10206/">CVE-2019-10206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10206">CVE-2019-10206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10217/">CVE-2019-10217 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10217">CVE-2019-10217 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14846/">CVE-2019-14846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14846">CVE-2019-14846 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14856/">CVE-2019-14856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14856">CVE-2019-14856 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14858/">CVE-2019-14858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-14858">CVE-2019-14858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14864/">CVE-2019-14864 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14864">CVE-2019-14864 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14904/">CVE-2019-14904 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14904">CVE-2019-14904 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14905/">CVE-2019-14905 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14905">CVE-2019-14905 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3828/">CVE-2019-3828 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3828">CVE-2019-3828 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10684/">CVE-2020-10684 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10684">CVE-2020-10684 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10685/">CVE-2020-10685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10685">CVE-2020-10685 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10691/">CVE-2020-10691 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10691">CVE-2020-10691 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10729/">CVE-2020-10729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10729">CVE-2020-10729 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10744/">CVE-2020-10744 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10744">CVE-2020-10744 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1733/">CVE-2020-1733 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1733">CVE-2020-1733 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1734/">CVE-2020-1734 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1734">CVE-2020-1734 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1735/">CVE-2020-1735 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1735">CVE-2020-1735 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1736/">CVE-2020-1736 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1736">CVE-2020-1736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1737/">CVE-2020-1737 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1737">CVE-2020-1737 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1738/">CVE-2020-1738 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1738">CVE-2020-1738 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1739/">CVE-2020-1739 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1739">CVE-2020-1739 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1740/">CVE-2020-1740 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1740">CVE-2020-1740 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1746/">CVE-2020-1746 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1746">CVE-2020-1746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1753/">CVE-2020-1753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1753">CVE-2020-1753 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577261" comment="ansible-2.9.9-11.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577262" comment="python-coverage-3.6-0.11.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577263" comment="python-passlib-1.6.1-0.3.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218343" version="1" class="patch">
	<metadata>
		<title>Security update for ansible (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174145" ref_url="https://bugzilla.suse.com/1174145" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14330" ref_url="https://www.suse.com/security/cve/CVE-2020-14330/" source="CVE"/>
		<description>
This update for ansible fixes the following issues:

- CVE-2020-14330: Fixed an issue where 'no log' values are not stripped 
  from module response keys (bsc#1174145).
  Sensitive values marked with ``no_log=True`` will automatically
  have that value stripped from module return values. If
  your module could return these sensitive values as
  part of a dictionary key name, you should call the
  ``ansible.module_utils.basic.sanitize_keys()`` function to
  strip the values from the keys. See the ``uri`` module for an
  example.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-06"/>
	<updated date="2020-10-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174145">SUSE bug 1174145</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14330/">CVE-2020-14330 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14330">CVE-2020-14330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577264" comment="ansible-2.9.9-11.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218344" version="1" class="patch">
	<metadata>
		<title>Security update for ansible (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1153452" ref_url="https://bugzilla.suse.com/1153452" source="BUGZILLA"/>
		<reference ref_id="1164134" ref_url="https://bugzilla.suse.com/1164134" source="BUGZILLA"/>
		<reference ref_id="1166389" ref_url="https://bugzilla.suse.com/1166389" source="BUGZILLA"/>
		<reference ref_id="1171823" ref_url="https://bugzilla.suse.com/1171823" source="BUGZILLA"/>
		<reference ref_id="1174145" ref_url="https://bugzilla.suse.com/1174145" source="BUGZILLA"/>
		<reference ref_id="1174302" ref_url="https://bugzilla.suse.com/1174302" source="BUGZILLA"/>
		<reference ref_id="1175993" ref_url="https://bugzilla.suse.com/1175993" source="BUGZILLA"/>
		<reference ref_id="1177948" ref_url="https://bugzilla.suse.com/1177948" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14846" ref_url="https://www.suse.com/security/cve/CVE-2019-14846/" source="CVE"/>
		<reference ref_id="CVE-2020-10744" ref_url="https://www.suse.com/security/cve/CVE-2020-10744/" source="CVE"/>
		<reference ref_id="CVE-2020-14330" ref_url="https://www.suse.com/security/cve/CVE-2020-14330/" source="CVE"/>
		<reference ref_id="CVE-2020-14332" ref_url="https://www.suse.com/security/cve/CVE-2020-14332/" source="CVE"/>
		<reference ref_id="CVE-2020-14365" ref_url="https://www.suse.com/security/cve/CVE-2020-14365/" source="CVE"/>
		<reference ref_id="CVE-2020-1733" ref_url="https://www.suse.com/security/cve/CVE-2020-1733/" source="CVE"/>
		<reference ref_id="CVE-2020-1736" ref_url="https://www.suse.com/security/cve/CVE-2020-1736/" source="CVE"/>
		<reference ref_id="CVE-2020-1753" ref_url="https://www.suse.com/security/cve/CVE-2020-1753/" source="CVE"/>
		<description>
This update for ansible fixes the following issues:

Update to ansible 2.9.14:

 - CVE-2020-1753, bsc#1166389: Kubectl connection plugin - connection plugin now redact kubectl_token and kubectl_password in console log.
 - revert CVE-2020-1736. Users are encouraged to specify a mode parameter in their file-based tasks when the files being manipulated contain sensitive data.
 - CVE-2020-14365, bsc#1175993: Previously, regardless of the disable_gpg_check option, packages were not GPG validated. They are now.
 - CVE-2020-14332, bsc#1174302: copy - Redact the value of the no_log 'content' parameter in the result's invocation.module_args in check mode. Previously when used with check mode and with '-vvv', the module would not censor the content if a change would be made to the destination path.
 - CVE-2020-1736, bsc#1164134: atomic_move - Change default permissions when creating temporary files so they are not world readable
 - CVE-2020-14330, bsc#1174145: Sanitize no_log values from any response keys that might be returned from the uri module.
 - CVE-2019-14846, bsc#1153452: Reset logging level to INFO.
 - CVE-2020-10744, bsc#1171823, gh#ansible/ansible#69782: incomplete fix for CVE-2020-1733
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1153452">SUSE bug 1153452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164134">SUSE bug 1164134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166389">SUSE bug 1166389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171823">SUSE bug 1171823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174145">SUSE bug 1174145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174302">SUSE bug 1174302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175993">SUSE bug 1175993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177948">SUSE bug 1177948</bugzilla>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14846/">CVE-2019-14846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14846">CVE-2019-14846 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10744/">CVE-2020-10744 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10744">CVE-2020-10744 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14330/">CVE-2020-14330 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14330">CVE-2020-14330 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14332/">CVE-2020-14332 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14332">CVE-2020-14332 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14365/">CVE-2020-14365 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14365">CVE-2020-14365 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1733/">CVE-2020-1733 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1733">CVE-2020-1733 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1736/">CVE-2020-1736 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1736">CVE-2020-1736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1753/">CVE-2020-1753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1753">CVE-2020-1753 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577265" comment="ansible-2.9.14-11.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218345" version="1" class="patch">
	<metadata>
		<title>Security update for ansible (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180816" ref_url="https://bugzilla.suse.com/1180816" source="BUGZILLA"/>
		<reference ref_id="1180942" ref_url="https://bugzilla.suse.com/1180942" source="BUGZILLA"/>
		<reference ref_id="1181119" ref_url="https://bugzilla.suse.com/1181119" source="BUGZILLA"/>
		<reference ref_id="1181935" ref_url="https://bugzilla.suse.com/1181935" source="BUGZILLA"/>
		<reference ref_id="1183684" ref_url="https://bugzilla.suse.com/1183684" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20178" ref_url="https://www.suse.com/security/cve/CVE-2021-20178/" source="CVE"/>
		<reference ref_id="CVE-2021-20180" ref_url="https://www.suse.com/security/cve/CVE-2021-20180/" source="CVE"/>
		<reference ref_id="CVE-2021-20191" ref_url="https://www.suse.com/security/cve/CVE-2021-20191/" source="CVE"/>
		<reference ref_id="CVE-2021-20228" ref_url="https://www.suse.com/security/cve/CVE-2021-20228/" source="CVE"/>
		<reference ref_id="CVE-2021-3447" ref_url="https://www.suse.com/security/cve/CVE-2021-3447/" source="CVE"/>
		<description>
This update for ansible fixes the following issues:

- Update to 2.9.22:
- CVE-2021-3447: multiple modules expose secured values (bsc#1183684)
- CVE-2021-20228: basic.py no_log with fallback option (bsc#1181935)
- CVE-2021-20191: multiple collections exposes secured values (bsc#1181119)
- CVE-2021-20180: bitbucket_pipeline_variable exposes sensitive values (bsc#1180942)
- CVE-2021-20178: user data leak in snmp_facts module (bsc#1180816)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-04"/>
	<updated date="2021-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180816">SUSE bug 1180816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180942">SUSE bug 1180942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181119">SUSE bug 1181119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181935">SUSE bug 1181935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183684">SUSE bug 1183684</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20178/">CVE-2021-20178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20178">CVE-2021-20178 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20180/">CVE-2021-20180 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20180">CVE-2021-20180 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20191/">CVE-2021-20191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20191">CVE-2021-20191 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20228/">CVE-2021-20228 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20228">CVE-2021-20228 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3447/">CVE-2021-3447 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3447">CVE-2021-3447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577266" comment="ansible-2.9.22-11.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218346" version="1" class="patch">
	<metadata>
		<title>Security update for ansible (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176460" ref_url="https://bugzilla.suse.com/1176460" source="BUGZILLA"/>
		<reference ref_id="1187725" ref_url="https://bugzilla.suse.com/1187725" source="BUGZILLA"/>
		<reference ref_id="1188061" ref_url="https://bugzilla.suse.com/1188061" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3583" ref_url="https://www.suse.com/security/cve/CVE-2021-3583/" source="CVE"/>
		<reference ref_id="CVE-2021-3620" ref_url="https://www.suse.com/security/cve/CVE-2021-3620/" source="CVE"/>
		<description>
This update for ansible fixes the following issues:

Update to 2.9.27:

- CVE-2021-3620: ansible-connection module discloses sensitive info in traceback error message (bsc#1187725).
- CVE-2021-3583: Template Injection through yaml multi-line strings with ansible facts used in template (bsc#1188061).
- ansible module nmcli is broken in ansible 2.9.13 (bsc#1176460)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-13"/>
	<updated date="2021-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176460">SUSE bug 1176460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187725">SUSE bug 1187725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188061">SUSE bug 1188061</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3583/">CVE-2021-3583 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3583">CVE-2021-3583 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3620/">CVE-2021-3620 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3620">CVE-2021-3620 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659370" comment="ansible-2.9.27-11.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218347" version="1" class="patch">
	<metadata>
		<title>Security update for ant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1100053" ref_url="https://bugzilla.suse.com/1100053" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10886" ref_url="https://www.suse.com/security/cve/CVE-2018-10886/" source="CVE"/>
		<description>
This update for ant fixes the following issues:

Security issue fixed:

- CVE-2018-10886: Fixed a path traversal vulnerability in malformed zip file
  paths, which allowed arbitrary file writes and could potentially lead to
  code execution (bsc#1100053)

Other changes made:

- Removed support for javadoc
- Default value for stripAbsolutePathSpec changed to 'true'
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-21"/>
	<updated date="2018-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100053">SUSE bug 1100053</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10886/">CVE-2018-10886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-10886">CVE-2018-10886 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564215" comment="ant-1.7.1-20.11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564232" comment="ant-trax-1.7.1-16.11.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218348" version="1" class="patch">
	<metadata>
		<title>Security update for ant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188469" ref_url="https://bugzilla.suse.com/1188469" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36374" ref_url="https://www.suse.com/security/cve/CVE-2021-36374/" source="CVE"/>
		<description>
This update for ant fixes the following issues:

- CVE-2021-36374: Fixed an excessive memory allocation when reading a specially
  crafted ZIP archive (bsc#1188469).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188469">SUSE bug 1188469</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36374/">CVE-2021-36374 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36374">CVE-2021-36374 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677827" comment="ant-1.7.1-20.11.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677828" comment="ant-trax-1.7.1-16.11.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218349" version="1" class="patch">
	<metadata>
		<title>Recommended update for apache2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="713970" ref_url="https://bugzilla.suse.com/713970" source="BUGZILLA"/>
		<reference ref_id="791794" ref_url="https://bugzilla.suse.com/791794" source="BUGZILLA"/>
		<reference ref_id="815621" ref_url="https://bugzilla.suse.com/815621" source="BUGZILLA"/>
		<reference ref_id="829056" ref_url="https://bugzilla.suse.com/829056" source="BUGZILLA"/>
		<reference ref_id="829057" ref_url="https://bugzilla.suse.com/829057" source="BUGZILLA"/>
		<reference ref_id="844212" ref_url="https://bugzilla.suse.com/844212" source="BUGZILLA"/>
		<reference ref_id="852401" ref_url="https://bugzilla.suse.com/852401" source="BUGZILLA"/>
		<reference ref_id="859916" ref_url="https://bugzilla.suse.com/859916" source="BUGZILLA"/>
		<reference ref_id="869105" ref_url="https://bugzilla.suse.com/869105" source="BUGZILLA"/>
		<reference ref_id="869106" ref_url="https://bugzilla.suse.com/869106" source="BUGZILLA"/>
		<reference ref_id="871310" ref_url="https://bugzilla.suse.com/871310" source="BUGZILLA"/>
		<reference ref_id="887765" ref_url="https://bugzilla.suse.com/887765" source="BUGZILLA"/>
		<reference ref_id="887768" ref_url="https://bugzilla.suse.com/887768" source="BUGZILLA"/>
		<reference ref_id="894225" ref_url="https://bugzilla.suse.com/894225" source="BUGZILLA"/>
		<reference ref_id="899836" ref_url="https://bugzilla.suse.com/899836" source="BUGZILLA"/>
		<reference ref_id="904427" ref_url="https://bugzilla.suse.com/904427" source="BUGZILLA"/>
		<reference ref_id="907339" ref_url="https://bugzilla.suse.com/907339" source="BUGZILLA"/>
		<reference ref_id="907477" ref_url="https://bugzilla.suse.com/907477" source="BUGZILLA"/>
		<reference ref_id="CVE-2003-1418" ref_url="https://www.suse.com/security/cve/CVE-2003-1418/" source="CVE"/>
		<reference ref_id="CVE-2013-1862" ref_url="https://www.suse.com/security/cve/CVE-2013-1862/" source="CVE"/>
		<reference ref_id="CVE-2013-1896" ref_url="https://www.suse.com/security/cve/CVE-2013-1896/" source="CVE"/>
		<reference ref_id="CVE-2013-5704" ref_url="https://www.suse.com/security/cve/CVE-2013-5704/" source="CVE"/>
		<reference ref_id="CVE-2013-6438" ref_url="https://www.suse.com/security/cve/CVE-2013-6438/" source="CVE"/>
		<reference ref_id="CVE-2014-0098" ref_url="https://www.suse.com/security/cve/CVE-2014-0098/" source="CVE"/>
		<reference ref_id="CVE-2014-0226" ref_url="https://www.suse.com/security/cve/CVE-2014-0226/" source="CVE"/>
		<reference ref_id="CVE-2014-0231" ref_url="https://www.suse.com/security/cve/CVE-2014-0231/" source="CVE"/>
		<reference ref_id="CVE-2014-3581" ref_url="https://www.suse.com/security/cve/CVE-2014-3581/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001337.html" source="SUSE-SU"/>
		<description>

This update for the Apache Web Server introduces directives to control two 
protocol options:

    * HttpContentLengthHeadZero: Allow responses to HEAD request with
      Content-Length of 0
    * HttpExpectStrict: Allow the administrator to control whether clients
      must send '100-continue'

MODULE_MAGIC_NUMBER_MINOR has been increased to 24, as this change is not 
forward-compatible. Modules built against this release might not work 
correctly with older releases of the Apache Web Server.

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-12"/>
	<updated date="2014-09-12"/>
	<bugzilla href="https://bugzilla.suse.com/713970">SUSE bug 713970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791794">SUSE bug 791794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815621">SUSE bug 815621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829056">SUSE bug 829056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829057">SUSE bug 829057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844212">SUSE bug 844212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852401">SUSE bug 852401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859916">SUSE bug 859916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869105">SUSE bug 869105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869106">SUSE bug 869106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871310">SUSE bug 871310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887765">SUSE bug 887765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887768">SUSE bug 887768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894225">SUSE bug 894225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899836">SUSE bug 899836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904427">SUSE bug 904427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907339">SUSE bug 907339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907477">SUSE bug 907477</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2003-1418/">CVE-2003-1418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2003-1418">CVE-2003-1418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1862/">CVE-2013-1862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1862">CVE-2013-1862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1896/">CVE-2013-1896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1896">CVE-2013-1896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5704/">CVE-2013-5704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5704">CVE-2013-5704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6438/">CVE-2013-6438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6438">CVE-2013-6438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0098/">CVE-2014-0098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0098">CVE-2014-0098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0226/">CVE-2014-0226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0226">CVE-2014-0226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0231/">CVE-2014-0231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0231">CVE-2014-0231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3581/">CVE-2014-3581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3581">CVE-2014-3581 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992590" comment="apache2-2.2.12-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992591" comment="apache2-doc-2.2.12-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992592" comment="apache2-example-pages-2.2.12-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992593" comment="apache2-prefork-2.2.12-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992594" comment="apache2-utils-2.2.12-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992595" comment="apache2-worker-2.2.12-1.50.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992590" comment="apache2-2.2.12-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992591" comment="apache2-doc-2.2.12-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992592" comment="apache2-example-pages-2.2.12-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992593" comment="apache2-prefork-2.2.12-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992594" comment="apache2-utils-2.2.12-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992595" comment="apache2-worker-2.2.12-1.50.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992590" comment="apache2-2.2.12-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992591" comment="apache2-doc-2.2.12-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992592" comment="apache2-example-pages-2.2.12-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992593" comment="apache2-prefork-2.2.12-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992594" comment="apache2-utils-2.2.12-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992595" comment="apache2-worker-2.2.12-1.50.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218350" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="444878" ref_url="https://bugzilla.suse.com/444878" source="BUGZILLA"/>
		<reference ref_id="931002" ref_url="https://bugzilla.suse.com/931002" source="BUGZILLA"/>
		<reference ref_id="938728" ref_url="https://bugzilla.suse.com/938728" source="BUGZILLA"/>
		<reference ref_id="941676" ref_url="https://bugzilla.suse.com/941676" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3183" ref_url="https://www.suse.com/security/cve/CVE-2015-3183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1885-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001662.html" source="SUSE-SU"/>
		<description>
Apache was updated to fix one security vulnerability and two bugs.

Following security issue was fixed.
- Fix the chunked transfer coding implementation in the Apache (bsc#938728, CVE-2015-3183)

Bugs fixed:
- add SSLSessionTickets directive (bsc#941676)
- hardcode modules %files (bsc#444878)
- only enable the port 443 for TCP protocol, not UDP. (bsc#931002)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-01"/>
	<updated date="2015-10-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/444878">SUSE bug 444878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931002">SUSE bug 931002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938728">SUSE bug 938728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941676">SUSE bug 941676</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3183/">CVE-2015-3183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3183">CVE-2015-3183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577267" comment="apache2-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577268" comment="apache2-doc-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577269" comment="apache2-example-pages-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577270" comment="apache2-prefork-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577271" comment="apache2-utils-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577272" comment="apache2-worker-2.2.12-59.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577267" comment="apache2-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577268" comment="apache2-doc-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577269" comment="apache2-example-pages-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577270" comment="apache2-prefork-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577271" comment="apache2-utils-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577272" comment="apache2-worker-2.2.12-59.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577267" comment="apache2-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577268" comment="apache2-doc-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577269" comment="apache2-example-pages-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577270" comment="apache2-prefork-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577271" comment="apache2-utils-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577272" comment="apache2-worker-2.2.12-59.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218351" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="988488" ref_url="https://bugzilla.suse.com/988488" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5387" ref_url="https://www.suse.com/security/cve/CVE-2016-5387/" source="CVE"/>
		<description>

This update for apache2 fixes the following issues:

* It used to be possible to set an arbitrary $HTTP_PROXY environment variable
  for request handlers -- like CGI scripts -- by including a specially crafted
  HTTP header in the request (CVE-2016-5387). As a result, these server
  components would potentially direct all their outgoing HTTP traffic through a
  malicious proxy server. This patch fixes the issue: the updated Apache server
  ignores such HTTP headers and never sets $HTTP_PROXY for sub-processes
  (unless a value has been explicitly configured by the administrator in the
  configuration file). (bsc#988488)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-18"/>
	<updated date="2016-07-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/988488">SUSE bug 988488</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5387/">CVE-2016-5387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5387">CVE-2016-5387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570707" comment="apache2-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570708" comment="apache2-doc-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570709" comment="apache2-example-pages-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570710" comment="apache2-prefork-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570711" comment="apache2-utils-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570712" comment="apache2-worker-2.2.12-64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218352" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1016714" ref_url="https://bugzilla.suse.com/1016714" source="BUGZILLA"/>
		<reference ref_id="1016715" ref_url="https://bugzilla.suse.com/1016715" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2161" ref_url="https://www.suse.com/security/cve/CVE-2016-2161/" source="CVE"/>
		<reference ref_id="CVE-2016-8743" ref_url="https://www.suse.com/security/cve/CVE-2016-8743/" source="CVE"/>
		<description>

This update for apache2 fixes the following issues:

Security issues fixed:
- CVE-2016-2161: Malicious input to mod_auth_digest could have caused the server to crash,
  resulting in DoS (bsc#1016714).
- CVE-2016-8743: Added new directive 'HttpProtocolOptions Strict' to avoid proxy chain
  misinterpretation (bsc#1016715).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1016714">SUSE bug 1016714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016715">SUSE bug 1016715</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2161/">CVE-2016-2161 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2161">CVE-2016-2161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8743/">CVE-2016-8743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8743">CVE-2016-8743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570713" comment="apache2-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570714" comment="apache2-doc-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570715" comment="apache2-example-pages-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570716" comment="apache2-prefork-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570717" comment="apache2-utils-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570718" comment="apache2-worker-2.2.12-69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218353" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1041830" ref_url="https://bugzilla.suse.com/1041830" source="BUGZILLA"/>
		<reference ref_id="1048576" ref_url="https://bugzilla.suse.com/1048576" source="BUGZILLA"/>
		<reference ref_id="951692" ref_url="https://bugzilla.suse.com/951692" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9788" ref_url="https://www.suse.com/security/cve/CVE-2017-9788/" source="CVE"/>
		<description>
This update provides apache2 2.2.34, which brings many fixes and enhancements:

Security issues fixed:

- CVE-2017-9788: Uninitialized memory reflection in mod_auth_digest. (bsc#1048576)

Bug fixes:

- Remove /usr/bin/http2 link only during package uninstall, not upgrade. (bsc#1041830)
- Don't put the backend in error state (by default) when 500/503 error code is overridden. (bsc#951692)
- Allow single-char field names inadvertently disallowed in 2.2.32.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-28"/>
	<updated date="2017-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1041830">SUSE bug 1041830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048576">SUSE bug 1048576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951692">SUSE bug 951692</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9788/">CVE-2017-9788 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9788">CVE-2017-9788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570719" comment="apache2-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570720" comment="apache2-doc-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570721" comment="apache2-example-pages-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570722" comment="apache2-prefork-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570723" comment="apache2-utils-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570724" comment="apache2-worker-2.2.34-70.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218354" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1045060" ref_url="https://bugzilla.suse.com/1045060" source="BUGZILLA"/>
		<reference ref_id="1045061" ref_url="https://bugzilla.suse.com/1045061" source="BUGZILLA"/>
		<reference ref_id="1045062" ref_url="https://bugzilla.suse.com/1045062" source="BUGZILLA"/>
		<reference ref_id="1045065" ref_url="https://bugzilla.suse.com/1045065" source="BUGZILLA"/>
		<reference ref_id="1052830" ref_url="https://bugzilla.suse.com/1052830" source="BUGZILLA"/>
		<reference ref_id="1058058" ref_url="https://bugzilla.suse.com/1058058" source="BUGZILLA"/>
		<reference ref_id="1064561" ref_url="https://bugzilla.suse.com/1064561" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2699" ref_url="https://www.suse.com/security/cve/CVE-2009-2699/" source="CVE"/>
		<reference ref_id="CVE-2010-0425" ref_url="https://www.suse.com/security/cve/CVE-2010-0425/" source="CVE"/>
		<reference ref_id="CVE-2012-0021" ref_url="https://www.suse.com/security/cve/CVE-2012-0021/" source="CVE"/>
		<reference ref_id="CVE-2014-0118" ref_url="https://www.suse.com/security/cve/CVE-2014-0118/" source="CVE"/>
		<reference ref_id="CVE-2017-3167" ref_url="https://www.suse.com/security/cve/CVE-2017-3167/" source="CVE"/>
		<reference ref_id="CVE-2017-3169" ref_url="https://www.suse.com/security/cve/CVE-2017-3169/" source="CVE"/>
		<reference ref_id="CVE-2017-7668" ref_url="https://www.suse.com/security/cve/CVE-2017-7668/" source="CVE"/>
		<reference ref_id="CVE-2017-7679" ref_url="https://www.suse.com/security/cve/CVE-2017-7679/" source="CVE"/>
		<reference ref_id="CVE-2017-9798" ref_url="https://www.suse.com/security/cve/CVE-2017-9798/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003365.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- Allow disabling SNI on proxy connections using 'SetEnv proxy-disable-sni 1' in the configuration files. (bsc#1052830)
- Allow ECDH again in mod_ssl, it had been incorrectly disabled with the 2.2.34 update. (bsc#1064561)

Following security issue has been fixed:

- CVE-2017-9798: A use-after-free in the OPTIONS command could be used by attackers to disclose memory of the apache server process, when htaccess uses incorrect Limit statement. (bsc#1058058)

Additionally, references to the following security issues, fixed by the previous version-update of apache2
to Apache HTTPD 2.2.34 have been added:

- CVE-2017-7668: The HTTP strict parsing introduced a bug in token list parsing, which allowed ap_find_token() to
  search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may
  have be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value. (bsc#1045061)
- CVE-2017-3169: mod_ssl may have de-referenced a NULL pointer when third-party modules call 
  ap_hook_process_connection() during an HTTP request to an HTTPS port allowing for DoS. (bsc#1045062)
- CVE-2017-3167: Use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may have
  lead to authentication requirements being bypassed. (bsc#1045065)
- CVE-2017-7679: mod_mime could have read one byte past the end of a buffer when sending a malicious Content-Type
  response header. (bsc#1045060)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-30"/>
	<updated date="2017-10-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1045060">SUSE bug 1045060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045061">SUSE bug 1045061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045062">SUSE bug 1045062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045065">SUSE bug 1045065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052830">SUSE bug 1052830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058058">SUSE bug 1058058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064561">SUSE bug 1064561</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2699/">CVE-2009-2699 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-2699">CVE-2009-2699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0425/">CVE-2010-0425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0425">CVE-2010-0425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0021/">CVE-2012-0021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0021">CVE-2012-0021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0118/">CVE-2014-0118 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0118">CVE-2014-0118 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3167/">CVE-2017-3167 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3167">CVE-2017-3167 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3169/">CVE-2017-3169 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3169">CVE-2017-3169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7668/">CVE-2017-7668 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7668">CVE-2017-7668 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7679/">CVE-2017-7679 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7679">CVE-2017-7679 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9798/">CVE-2017-9798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9798">CVE-2017-9798 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577273" comment="apache2-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577274" comment="apache2-devel-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577275" comment="apache2-doc-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577276" comment="apache2-example-pages-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577277" comment="apache2-prefork-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577278" comment="apache2-utils-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577279" comment="apache2-worker-2.2.34-70.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577273" comment="apache2-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577274" comment="apache2-devel-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577275" comment="apache2-doc-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577276" comment="apache2-example-pages-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577277" comment="apache2-prefork-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577278" comment="apache2-utils-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577279" comment="apache2-worker-2.2.34-70.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218355" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1086775" ref_url="https://bugzilla.suse.com/1086775" source="BUGZILLA"/>
		<reference ref_id="1086776" ref_url="https://bugzilla.suse.com/1086776" source="BUGZILLA"/>
		<reference ref_id="1086817" ref_url="https://bugzilla.suse.com/1086817" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15710" ref_url="https://www.suse.com/security/cve/CVE-2017-15710/" source="CVE"/>
		<reference ref_id="CVE-2018-1301" ref_url="https://www.suse.com/security/cve/CVE-2018-1301/" source="CVE"/>
		<reference ref_id="CVE-2018-1312" ref_url="https://www.suse.com/security/cve/CVE-2018-1312/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- security update:
  * CVE-2018-1301: Specially crafted requests, in debug mode, could lead to denial of service. [bsc#1086817]
  * CVE-2017-15710: failure in the language fallback handling could lead to denial of service.  [bsc#1086776]
  * CVE-2018-1312: Seed wrongly generated could lead to replay attack in cluster environments. [bsc#1086775]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-25"/>
	<updated date="2018-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086775">SUSE bug 1086775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086776">SUSE bug 1086776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086817">SUSE bug 1086817</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15710/">CVE-2017-15710 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15710">CVE-2017-15710 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1301/">CVE-2018-1301 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1301">CVE-2018-1301 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1312/">CVE-2018-1312 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1312">CVE-2018-1312 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570731" comment="apache2-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570732" comment="apache2-doc-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570733" comment="apache2-example-pages-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570734" comment="apache2-prefork-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570735" comment="apache2-utils-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570736" comment="apache2-worker-2.2.34-70.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218356" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1131239" ref_url="https://bugzilla.suse.com/1131239" source="BUGZILLA"/>
		<reference ref_id="1131241" ref_url="https://bugzilla.suse.com/1131241" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0217" ref_url="https://www.suse.com/security/cve/CVE-2019-0217/" source="CVE"/>
		<reference ref_id="CVE-2019-0220" ref_url="https://www.suse.com/security/cve/CVE-2019-0220/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

* CVE-2019-0220: The Apache HTTP server did not use a consistent strategy for
  URL normalization throughout all of its components. In particular,
  consecutive slashes were not always collapsed. Attackers could potentially
  abuse these inconsistencies to by-pass access control mechanisms and thus
  gain unauthorized access to protected parts of the service. [bsc#1131241]

* CVE-2019-0217: A race condition in Apache's 'mod_auth_digest' when running in
  a threaded server could have allowed users with valid credentials to
  authenticate using another username, bypassing configured access control
  restrictions. [bsc#1131239]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-04"/>
	<updated date="2019-04-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131239">SUSE bug 1131239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131241">SUSE bug 1131241</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-0217/">CVE-2019-0217 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0217">CVE-2019-0217 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-0220/">CVE-2019-0220 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0220">CVE-2019-0220 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570737" comment="apache2-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570738" comment="apache2-doc-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570739" comment="apache2-example-pages-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570740" comment="apache2-prefork-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570741" comment="apache2-utils-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570742" comment="apache2-worker-2.2.34-70.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218357" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1145738" ref_url="https://bugzilla.suse.com/1145738" source="BUGZILLA"/>
		<reference ref_id="1145740" ref_url="https://bugzilla.suse.com/1145740" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10092" ref_url="https://www.suse.com/security/cve/CVE-2019-10092/" source="CVE"/>
		<reference ref_id="CVE-2019-10098" ref_url="https://www.suse.com/security/cve/CVE-2019-10098/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

Security issues fixed:

- CVE-2019-10092: Fixed limited cross-site scripting in mod_proxy (bsc#1145740).
- CVE-2019-10098: Fixed mod_rewrite configuration vulnerablility to open redirect (bsc#1145738).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-16"/>
	<updated date="2019-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1145738">SUSE bug 1145738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145740">SUSE bug 1145740</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10092/">CVE-2019-10092 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10092">CVE-2019-10092 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10098/">CVE-2019-10098 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10098">CVE-2019-10098 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570743" comment="apache2-2.2.34-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570744" comment="apache2-doc-2.2.34-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570745" comment="apache2-example-pages-2.2.34-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570746" comment="apache2-prefork-2.2.34-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570747" comment="apache2-utils-2.2.34-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570748" comment="apache2-worker-2.2.34-70.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218358" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1168404" ref_url="https://bugzilla.suse.com/1168404" source="BUGZILLA"/>
		<reference ref_id="1169066" ref_url="https://bugzilla.suse.com/1169066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1934" ref_url="https://www.suse.com/security/cve/CVE-2020-1934/" source="CVE"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2020-1934: mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server (bsc#1168404).
- CVE-2020-1938: mod_proxy_ajp: Add 'secret' parameter to proxy workers to implement legacy AJP13 authentication (bsc#1169066).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-21"/>
	<updated date="2020-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168404">SUSE bug 1168404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169066">SUSE bug 1169066</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1934/">CVE-2020-1934 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1934">CVE-2020-1934 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1938">CVE-2020-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570749" comment="apache2-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570750" comment="apache2-doc-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570751" comment="apache2-example-pages-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570752" comment="apache2-prefork-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570753" comment="apache2-utils-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570754" comment="apache2-worker-2.2.34-70.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218359" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1145740" ref_url="https://bugzilla.suse.com/1145740" source="BUGZILLA"/>
		<reference ref_id="1182703" ref_url="https://bugzilla.suse.com/1182703" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10092" ref_url="https://www.suse.com/security/cve/CVE-2019-10092/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- Fixed potential content spoofing with default error pages(bsc#118270)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-12"/>
	<updated date="2021-03-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1145740">SUSE bug 1145740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182703">SUSE bug 1182703</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10092/">CVE-2019-10092 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10092">CVE-2019-10092 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570755" comment="apache2-2.2.34-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570756" comment="apache2-doc-2.2.34-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570757" comment="apache2-example-pages-2.2.34-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570758" comment="apache2-prefork-2.2.34-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570759" comment="apache2-utils-2.2.34-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570760" comment="apache2-worker-2.2.34-70.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218360" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186922" ref_url="https://bugzilla.suse.com/1186922" source="BUGZILLA"/>
		<reference ref_id="1187174" ref_url="https://bugzilla.suse.com/1187174" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35452" ref_url="https://www.suse.com/security/cve/CVE-2020-35452/" source="CVE"/>
		<reference ref_id="CVE-2021-30641" ref_url="https://www.suse.com/security/cve/CVE-2021-30641/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- fixed CVE-2021-30641 [bsc#1187174]: MergeSlashes regression
- fixed CVE-2020-35452 [bsc#1186922]: Single zero byte stack overflow in mod_auth_digest
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186922">SUSE bug 1186922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187174">SUSE bug 1187174</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35452/">CVE-2020-35452 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35452">CVE-2020-35452 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30641/">CVE-2021-30641 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30641">CVE-2021-30641 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570761" comment="apache2-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570762" comment="apache2-doc-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570763" comment="apache2-example-pages-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570764" comment="apache2-prefork-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570765" comment="apache2-utils-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570766" comment="apache2-worker-2.2.34-70.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218361" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1190666" ref_url="https://bugzilla.suse.com/1190666" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39275" ref_url="https://www.suse.com/security/cve/CVE-2021-39275/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2021-39275: Fixed an out-of-bounds write in ap_escape_quotes() via malicious input. (bsc#1190666)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-27"/>
	<updated date="2021-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190666">SUSE bug 1190666</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39275/">CVE-2021-39275 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39275">CVE-2021-39275 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633944" comment="apache2-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633945" comment="apache2-doc-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633946" comment="apache2-example-pages-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633947" comment="apache2-prefork-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633948" comment="apache2-utils-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633949" comment="apache2-worker-2.2.34-70.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218362" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1197095" ref_url="https://bugzilla.suse.com/1197095" source="BUGZILLA"/>
		<reference ref_id="1197096" ref_url="https://bugzilla.suse.com/1197096" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22720" ref_url="https://www.suse.com/security/cve/CVE-2022-22720/" source="CVE"/>
		<reference ref_id="CVE-2022-22721" ref_url="https://www.suse.com/security/cve/CVE-2022-22721/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-22720: HTTP request smuggling due to incorrect error handling (bsc#1197095).
- CVE-2022-22721: possible buffer overflow with very large or unlimited LimitXMLRequestBody (bsc#1197096).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197095">SUSE bug 1197095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197096">SUSE bug 1197096</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22720/">CVE-2022-22720 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22720">CVE-2022-22720 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22721/">CVE-2022-22721 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22721">CVE-2022-22721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673620" comment="apache2-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673621" comment="apache2-doc-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673622" comment="apache2-example-pages-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673623" comment="apache2-prefork-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673624" comment="apache2-utils-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673625" comment="apache2-worker-2.2.34-70.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218363" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1200338" ref_url="https://bugzilla.suse.com/1200338" source="BUGZILLA"/>
		<reference ref_id="1200340" ref_url="https://bugzilla.suse.com/1200340" source="BUGZILLA"/>
		<reference ref_id="1200341" ref_url="https://bugzilla.suse.com/1200341" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26377" ref_url="https://www.suse.com/security/cve/CVE-2022-26377/" source="CVE"/>
		<reference ref_id="CVE-2022-28614" ref_url="https://www.suse.com/security/cve/CVE-2022-28614/" source="CVE"/>
		<reference ref_id="CVE-2022-28615" ref_url="https://www.suse.com/security/cve/CVE-2022-28615/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-26377: Fixed possible request smuggling in mod_proxy_ajp (bsc#1200338)
- CVE-2022-28614: Fixed read beyond bounds via ap_rwrite() (bsc#1200340)
- CVE-2022-28615: Fixed read beyond bounds in ap_strcmp_match() (bsc#1200341)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-16"/>
	<updated date="2022-06-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200338">SUSE bug 1200338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200340">SUSE bug 1200340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200341">SUSE bug 1200341</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-26377/">CVE-2022-26377 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26377">CVE-2022-26377 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28614/">CVE-2022-28614 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28614">CVE-2022-28614 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28615/">CVE-2022-28615 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28615">CVE-2022-28615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992596" comment="apache2-2.2.34-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992597" comment="apache2-doc-2.2.34-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992598" comment="apache2-example-pages-2.2.34-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992599" comment="apache2-prefork-2.2.34-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992600" comment="apache2-utils-2.2.34-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992601" comment="apache2-worker-2.2.34-70.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218364" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1200348" ref_url="https://bugzilla.suse.com/1200348" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31813" ref_url="https://www.suse.com/security/cve/CVE-2022-31813/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-31813: Fixed mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism (bsc#1200348).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-26"/>
	<updated date="2022-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1200348">SUSE bug 1200348</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-31813/">CVE-2022-31813 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31813">CVE-2022-31813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992602" comment="apache2-2.2.34-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992603" comment="apache2-doc-2.2.34-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992604" comment="apache2-example-pages-2.2.34-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992605" comment="apache2-prefork-2.2.34-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992606" comment="apache2-utils-2.2.34-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992607" comment="apache2-worker-2.2.34-70.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218365" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1207247" ref_url="https://bugzilla.suse.com/1207247" source="BUGZILLA"/>
		<reference ref_id="1207250" ref_url="https://bugzilla.suse.com/1207250" source="BUGZILLA"/>
		<reference ref_id="1207251" ref_url="https://bugzilla.suse.com/1207251" source="BUGZILLA"/>
		<reference ref_id="CVE-2006-20001" ref_url="https://www.suse.com/security/cve/CVE-2006-20001/" source="CVE"/>
		<reference ref_id="CVE-2022-36760" ref_url="https://www.suse.com/security/cve/CVE-2022-36760/" source="CVE"/>
		<reference ref_id="CVE-2022-37436" ref_url="https://www.suse.com/security/cve/CVE-2022-37436/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-37436: Fixed an issue in mod_proxy where a malicious
  backend could cause the response headers to be truncated early,
  resulting in some headers being incorporated into the response body
  (bsc#1207251).
- CVE-2022-36760: Fixed an issue in mod_proxy_ajp that could allow
  request smuggling attacks (bsc#1207250).
- CVE-2006-20001: Fixed an issue in mod_proxy_ajp where a request
  header could cause memory corruption (bsc#1207247).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-27"/>
	<updated date="2023-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207247">SUSE bug 1207247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207250">SUSE bug 1207250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207251">SUSE bug 1207251</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2006-20001/">CVE-2006-20001 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2006-20001">CVE-2006-20001 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-36760/">CVE-2022-36760 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36760">CVE-2022-36760 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-37436/">CVE-2022-37436 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37436">CVE-2022-37436 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992608" comment="apache2-2.2.34-70.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992609" comment="apache2-doc-2.2.34-70.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992610" comment="apache2-example-pages-2.2.34-70.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992611" comment="apache2-prefork-2.2.34-70.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992612" comment="apache2-utils-2.2.34-70.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992613" comment="apache2-worker-2.2.34-70.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218366" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1209047" ref_url="https://bugzilla.suse.com/1209047" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-25690" ref_url="https://www.suse.com/security/cve/CVE-2023-25690/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2023-25690: Fixed HTTP request splitting with mod_rewrite and mod_proxy (bsc#1209047).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-21"/>
	<updated date="2023-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1209047">SUSE bug 1209047</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-25690/">CVE-2023-25690 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25690">CVE-2023-25690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992614" comment="apache2-2.2.34-70.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992615" comment="apache2-doc-2.2.34-70.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992616" comment="apache2-example-pages-2.2.34-70.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992617" comment="apache2-prefork-2.2.34-70.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992618" comment="apache2-utils-2.2.34-70.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992619" comment="apache2-worker-2.2.34-70.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218367" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_jk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1114612" ref_url="https://bugzilla.suse.com/1114612" source="BUGZILLA"/>
		<reference ref_id="927845" ref_url="https://bugzilla.suse.com/927845" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8111" ref_url="https://www.suse.com/security/cve/CVE-2014-8111/" source="CVE"/>
		<reference ref_id="CVE-2018-11759" ref_url="https://www.suse.com/security/cve/CVE-2018-11759/" source="CVE"/>
		<description>

This update for apache2-mod_jk fixes the following issues:

Security issues fixed:

- CVE-2018-11759: Fixed connector path traversal due to mishandled HTTP requests in httpd (bsc#1114612).
- CVE-2014-8111: Apache Tomcat Connectors (mod_jk) ignored JkUnmount rules for subtrees of previous JkMount rules, which allowed remote attackers to access otherwise restricted artifacts via unspecified vectors (bsc#927845).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-03"/>
	<updated date="2018-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1114612">SUSE bug 1114612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927845">SUSE bug 927845</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8111/">CVE-2014-8111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8111">CVE-2014-8111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11759/">CVE-2018-11759 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11759">CVE-2018-11759 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570775" comment="apache2-mod_jk-1.2.40-0.2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218368" version="1" class="patch">
	<metadata>
		<title>Recommended update for apache2-mod_nss</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="847216" ref_url="https://bugzilla.suse.com/847216" source="BUGZILLA"/>
		<reference ref_id="853039" ref_url="https://bugzilla.suse.com/853039" source="BUGZILLA"/>
		<reference ref_id="863035" ref_url="https://bugzilla.suse.com/863035" source="BUGZILLA"/>
		<reference ref_id="863518" ref_url="https://bugzilla.suse.com/863518" source="BUGZILLA"/>
		<reference ref_id="864929" ref_url="https://bugzilla.suse.com/864929" source="BUGZILLA"/>
		<reference ref_id="878681" ref_url="https://bugzilla.suse.com/878681" source="BUGZILLA"/>
		<reference ref_id="897712" ref_url="https://bugzilla.suse.com/897712" source="BUGZILLA"/>
		<reference ref_id="902068" ref_url="https://bugzilla.suse.com/902068" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4566" ref_url="https://www.suse.com/security/cve/CVE-2013-4566/" source="CVE"/>
		<reference ref_id="SUSE-RU-2015:0591-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-March/002814.html" source="SUSE-SU"/>
		<description>

This update brings several improvements to apache2-mod_nss.

    * 

      More TLS 1.2 ciphers have been added, including AES-GCM and Camelia
      ciphers. These can be selected by their tags:

          o rsa_aes_128_sha256
          o rsa_aes_128_gcm_sha
          o rsa_aes_256_sha256
          o rsa_camellia_128_sha
          o rsa_camellia_256_sha
          o ecdh_ecdsa_aes_128_gcm_sha
          o ecdhe_ecdsa_aes_128_sha256
          o ecdhe_ecdsa_aes_128_gcm_sha
          o ecdh_rsa_aes_128_gcm_sha
          o ecdhe_rsa_aes_128_sha256
    * 

      The mod_nss.conf.in template was updated to include those ciphers.
      (bnc#863035)

    * 

      VirtualHost settings in /etc/apache2/conf.d/mod_nss.conf is now
      externalized to /etc/apache2/vhosts.d/vhost-nss.template and not
      activated/read by default. (bnc#878681)

    * 

      The Server Name Indication (SNI) extension was implemented.

    * 

      Reading the pass phrase during start-up was improved. (bnc#863518)

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-22"/>
	<updated date="2014-08-22"/>
	<bugzilla href="https://bugzilla.suse.com/847216">SUSE bug 847216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853039">SUSE bug 853039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863035">SUSE bug 863035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863518">SUSE bug 863518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864929">SUSE bug 864929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878681">SUSE bug 878681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897712">SUSE bug 897712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902068">SUSE bug 902068</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4566/">CVE-2013-4566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4566">CVE-2013-4566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992620" comment="apache2-mod_nss-1.0.8-0.4.9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992620" comment="apache2-mod_nss-1.0.8-0.4.9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992620" comment="apache2-mod_nss-1.0.8-0.4.9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218369" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="975394" ref_url="https://bugzilla.suse.com/975394" source="BUGZILLA"/>
		<reference ref_id="979688" ref_url="https://bugzilla.suse.com/979688" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4566" ref_url="https://www.suse.com/security/cve/CVE-2013-4566/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002277.html" source="SUSE-SU"/>
		<description>

This update provides apache2-mod_nss 1.0.14, which brings several fixes and
enhancements:

- SHA256 cipher names change spelling from *_sha256 to *_sha_256.
- Drop mod_nss_migrate.pl and use upstream migrate script instead.
- Check for Apache user owner/group read permissions of NSS database at startup.
- Update default ciphers to something more modern and secure.
- Check for host and netstat commands in gencert before trying to use them.
- Don't ignore NSSProtocol when NSSFIPS is enabled.
- Use proper shell syntax to avoid creating /0 in gencert.
- Add server support for DHE ciphers.
- Extract SAN from server/client certificates into env.
- Fix memory leaks and other coding issues caught by clang analyzer.
- Add support for Server Name Indication (SNI)
- Add support for SNI for reverse proxy connections.
- Add RenegBufferSize? option.
- Add support for TLS Session Tickets (RFC 5077).
- Implement a slew more OpenSSL cipher macros.
- Fix a number of illegal memory accesses and memory leaks.
- Support for SHA384 ciphers if they are available in the version of NSS mod_nss is built against.
- Add the SECURE_RENEG environment variable.
- Add some hints when NSS database cannot be initialized.
- Code cleanup including trailing whitespace and compiler warnings.
- Modernize autotools configuration slightly, add config.h.
- Add small test suite for SNI.
- Add compatibility for mod_ssl-style cipher definitions.
- Add Camelia ciphers.
- Remove Fortezza ciphers.
- Add TLSv1.2-specific ciphers.
- Initialize cipher list when re-negotiating handshake.
- Completely remove support for SSLv2.
- Add support for sqlite NSS databases.
- Compare subject CN and VS hostname during server start up.
- Add support for enabling TLS v1.2.
- Don't enable SSL 3 by default. (CVE-2014-3566)
- Improve protocol testing.
- Add nss_pcache man page.
- Fix argument handling in nss_pcache.
- Support httpd 2.4+.
- Allow users to configure a helper to ask for certificate passphrases via
  NSSPassPhraseDialog. (bsc#975394)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-16"/>
	<updated date="2016-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/975394">SUSE bug 975394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979688">SUSE bug 979688</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4566/">CVE-2013-4566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4566">CVE-2013-4566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575821" comment="apache2-mod_nss-1.0.14-0.4.25.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575821" comment="apache2-mod_nss-1.0.14-0.4.25.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218370" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1156944" ref_url="https://bugzilla.suse.com/1156944" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2767" ref_url="https://www.suse.com/security/cve/CVE-2011-2767/" source="CVE"/>
		<description>
This update for apache2-mod_perl fixes the following issues:

- CVE-2011-2767: Fixed a vulnerability which could have allowed 
  perl code execution in the context of user account (bsc#1156944).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1156944">SUSE bug 1156944</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2011-2767/">CVE-2011-2767 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2767">CVE-2011-2767 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570777" comment="apache2-mod_perl-2.0.4-40.63.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218371" version="1" class="patch">
	<metadata>
		<title>Security update for php53</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="828020" ref_url="https://bugzilla.suse.com/828020" source="BUGZILLA"/>
		<reference ref_id="829207" ref_url="https://bugzilla.suse.com/829207" source="BUGZILLA"/>
		<reference ref_id="837746" ref_url="https://bugzilla.suse.com/837746" source="BUGZILLA"/>
		<reference ref_id="842676" ref_url="https://bugzilla.suse.com/842676" source="BUGZILLA"/>
		<reference ref_id="853045" ref_url="https://bugzilla.suse.com/853045" source="BUGZILLA"/>
		<reference ref_id="854880" ref_url="https://bugzilla.suse.com/854880" source="BUGZILLA"/>
		<reference ref_id="868624" ref_url="https://bugzilla.suse.com/868624" source="BUGZILLA"/>
		<reference ref_id="880904" ref_url="https://bugzilla.suse.com/880904" source="BUGZILLA"/>
		<reference ref_id="880905" ref_url="https://bugzilla.suse.com/880905" source="BUGZILLA"/>
		<reference ref_id="882992" ref_url="https://bugzilla.suse.com/882992" source="BUGZILLA"/>
		<reference ref_id="884986" ref_url="https://bugzilla.suse.com/884986" source="BUGZILLA"/>
		<reference ref_id="884987" ref_url="https://bugzilla.suse.com/884987" source="BUGZILLA"/>
		<reference ref_id="884989" ref_url="https://bugzilla.suse.com/884989" source="BUGZILLA"/>
		<reference ref_id="884990" ref_url="https://bugzilla.suse.com/884990" source="BUGZILLA"/>
		<reference ref_id="884991" ref_url="https://bugzilla.suse.com/884991" source="BUGZILLA"/>
		<reference ref_id="884992" ref_url="https://bugzilla.suse.com/884992" source="BUGZILLA"/>
		<reference ref_id="885961" ref_url="https://bugzilla.suse.com/885961" source="BUGZILLA"/>
		<reference ref_id="886059" ref_url="https://bugzilla.suse.com/886059" source="BUGZILLA"/>
		<reference ref_id="886060" ref_url="https://bugzilla.suse.com/886060" source="BUGZILLA"/>
		<reference ref_id="893849" ref_url="https://bugzilla.suse.com/893849" source="BUGZILLA"/>
		<reference ref_id="893853" ref_url="https://bugzilla.suse.com/893853" source="BUGZILLA"/>
		<reference ref_id="902357" ref_url="https://bugzilla.suse.com/902357" source="BUGZILLA"/>
		<reference ref_id="902360" ref_url="https://bugzilla.suse.com/902360" source="BUGZILLA"/>
		<reference ref_id="902368" ref_url="https://bugzilla.suse.com/902368" source="BUGZILLA"/>
		<reference ref_id="907519" ref_url="https://bugzilla.suse.com/907519" source="BUGZILLA"/>
		<reference ref_id="910659" ref_url="https://bugzilla.suse.com/910659" source="BUGZILLA"/>
		<reference ref_id="914690" ref_url="https://bugzilla.suse.com/914690" source="BUGZILLA"/>
		<reference ref_id="917150" ref_url="https://bugzilla.suse.com/917150" source="BUGZILLA"/>
		<reference ref_id="918768" ref_url="https://bugzilla.suse.com/918768" source="BUGZILLA"/>
		<reference ref_id="919080" ref_url="https://bugzilla.suse.com/919080" source="BUGZILLA"/>
		<reference ref_id="922022" ref_url="https://bugzilla.suse.com/922022" source="BUGZILLA"/>
		<reference ref_id="922451" ref_url="https://bugzilla.suse.com/922451" source="BUGZILLA"/>
		<reference ref_id="922452" ref_url="https://bugzilla.suse.com/922452" source="BUGZILLA"/>
		<reference ref_id="923946" ref_url="https://bugzilla.suse.com/923946" source="BUGZILLA"/>
		<reference ref_id="924972" ref_url="https://bugzilla.suse.com/924972" source="BUGZILLA"/>
		<reference ref_id="925109" ref_url="https://bugzilla.suse.com/925109" source="BUGZILLA"/>
		<reference ref_id="928506" ref_url="https://bugzilla.suse.com/928506" source="BUGZILLA"/>
		<reference ref_id="928511" ref_url="https://bugzilla.suse.com/928511" source="BUGZILLA"/>
		<reference ref_id="931421" ref_url="https://bugzilla.suse.com/931421" source="BUGZILLA"/>
		<reference ref_id="931769" ref_url="https://bugzilla.suse.com/931769" source="BUGZILLA"/>
		<reference ref_id="931772" ref_url="https://bugzilla.suse.com/931772" source="BUGZILLA"/>
		<reference ref_id="931776" ref_url="https://bugzilla.suse.com/931776" source="BUGZILLA"/>
		<reference ref_id="933227" ref_url="https://bugzilla.suse.com/933227" source="BUGZILLA"/>
		<reference ref_id="935074" ref_url="https://bugzilla.suse.com/935074" source="BUGZILLA"/>
		<reference ref_id="935224" ref_url="https://bugzilla.suse.com/935224" source="BUGZILLA"/>
		<reference ref_id="935226" ref_url="https://bugzilla.suse.com/935226" source="BUGZILLA"/>
		<reference ref_id="935227" ref_url="https://bugzilla.suse.com/935227" source="BUGZILLA"/>
		<reference ref_id="935232" ref_url="https://bugzilla.suse.com/935232" source="BUGZILLA"/>
		<reference ref_id="935234" ref_url="https://bugzilla.suse.com/935234" source="BUGZILLA"/>
		<reference ref_id="935274" ref_url="https://bugzilla.suse.com/935274" source="BUGZILLA"/>
		<reference ref_id="935275" ref_url="https://bugzilla.suse.com/935275" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4113" ref_url="https://www.suse.com/security/cve/CVE-2013-4113/" source="CVE"/>
		<reference ref_id="CVE-2013-4248" ref_url="https://www.suse.com/security/cve/CVE-2013-4248/" source="CVE"/>
		<reference ref_id="CVE-2013-4635" ref_url="https://www.suse.com/security/cve/CVE-2013-4635/" source="CVE"/>
		<reference ref_id="CVE-2013-6420" ref_url="https://www.suse.com/security/cve/CVE-2013-6420/" source="CVE"/>
		<reference ref_id="CVE-2013-6501" ref_url="https://www.suse.com/security/cve/CVE-2013-6501/" source="CVE"/>
		<reference ref_id="CVE-2013-6712" ref_url="https://www.suse.com/security/cve/CVE-2013-6712/" source="CVE"/>
		<reference ref_id="CVE-2014-0207" ref_url="https://www.suse.com/security/cve/CVE-2014-0207/" source="CVE"/>
		<reference ref_id="CVE-2014-0237" ref_url="https://www.suse.com/security/cve/CVE-2014-0237/" source="CVE"/>
		<reference ref_id="CVE-2014-0238" ref_url="https://www.suse.com/security/cve/CVE-2014-0238/" source="CVE"/>
		<reference ref_id="CVE-2014-2497" ref_url="https://www.suse.com/security/cve/CVE-2014-2497/" source="CVE"/>
		<reference ref_id="CVE-2014-3478" ref_url="https://www.suse.com/security/cve/CVE-2014-3478/" source="CVE"/>
		<reference ref_id="CVE-2014-3479" ref_url="https://www.suse.com/security/cve/CVE-2014-3479/" source="CVE"/>
		<reference ref_id="CVE-2014-3480" ref_url="https://www.suse.com/security/cve/CVE-2014-3480/" source="CVE"/>
		<reference ref_id="CVE-2014-3487" ref_url="https://www.suse.com/security/cve/CVE-2014-3487/" source="CVE"/>
		<reference ref_id="CVE-2014-3515" ref_url="https://www.suse.com/security/cve/CVE-2014-3515/" source="CVE"/>
		<reference ref_id="CVE-2014-3668" ref_url="https://www.suse.com/security/cve/CVE-2014-3668/" source="CVE"/>
		<reference ref_id="CVE-2014-3669" ref_url="https://www.suse.com/security/cve/CVE-2014-3669/" source="CVE"/>
		<reference ref_id="CVE-2014-3670" ref_url="https://www.suse.com/security/cve/CVE-2014-3670/" source="CVE"/>
		<reference ref_id="CVE-2014-4049" ref_url="https://www.suse.com/security/cve/CVE-2014-4049/" source="CVE"/>
		<reference ref_id="CVE-2014-4670" ref_url="https://www.suse.com/security/cve/CVE-2014-4670/" source="CVE"/>
		<reference ref_id="CVE-2014-4698" ref_url="https://www.suse.com/security/cve/CVE-2014-4698/" source="CVE"/>
		<reference ref_id="CVE-2014-4721" ref_url="https://www.suse.com/security/cve/CVE-2014-4721/" source="CVE"/>
		<reference ref_id="CVE-2014-5459" ref_url="https://www.suse.com/security/cve/CVE-2014-5459/" source="CVE"/>
		<reference ref_id="CVE-2014-8142" ref_url="https://www.suse.com/security/cve/CVE-2014-8142/" source="CVE"/>
		<reference ref_id="CVE-2014-9652" ref_url="https://www.suse.com/security/cve/CVE-2014-9652/" source="CVE"/>
		<reference ref_id="CVE-2014-9705" ref_url="https://www.suse.com/security/cve/CVE-2014-9705/" source="CVE"/>
		<reference ref_id="CVE-2014-9709" ref_url="https://www.suse.com/security/cve/CVE-2014-9709/" source="CVE"/>
		<reference ref_id="CVE-2015-0231" ref_url="https://www.suse.com/security/cve/CVE-2015-0231/" source="CVE"/>
		<reference ref_id="CVE-2015-0232" ref_url="https://www.suse.com/security/cve/CVE-2015-0232/" source="CVE"/>
		<reference ref_id="CVE-2015-2301" ref_url="https://www.suse.com/security/cve/CVE-2015-2301/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2783" ref_url="https://www.suse.com/security/cve/CVE-2015-2783/" source="CVE"/>
		<reference ref_id="CVE-2015-2787" ref_url="https://www.suse.com/security/cve/CVE-2015-2787/" source="CVE"/>
		<reference ref_id="CVE-2015-3329" ref_url="https://www.suse.com/security/cve/CVE-2015-3329/" source="CVE"/>
		<reference ref_id="CVE-2015-3411" ref_url="https://www.suse.com/security/cve/CVE-2015-3411/" source="CVE"/>
		<reference ref_id="CVE-2015-3412" ref_url="https://www.suse.com/security/cve/CVE-2015-3412/" source="CVE"/>
		<reference ref_id="CVE-2015-4021" ref_url="https://www.suse.com/security/cve/CVE-2015-4021/" source="CVE"/>
		<reference ref_id="CVE-2015-4022" ref_url="https://www.suse.com/security/cve/CVE-2015-4022/" source="CVE"/>
		<reference ref_id="CVE-2015-4024" ref_url="https://www.suse.com/security/cve/CVE-2015-4024/" source="CVE"/>
		<reference ref_id="CVE-2015-4026" ref_url="https://www.suse.com/security/cve/CVE-2015-4026/" source="CVE"/>
		<reference ref_id="CVE-2015-4148" ref_url="https://www.suse.com/security/cve/CVE-2015-4148/" source="CVE"/>
		<reference ref_id="CVE-2015-4598" ref_url="https://www.suse.com/security/cve/CVE-2015-4598/" source="CVE"/>
		<reference ref_id="CVE-2015-4599" ref_url="https://www.suse.com/security/cve/CVE-2015-4599/" source="CVE"/>
		<reference ref_id="CVE-2015-4600" ref_url="https://www.suse.com/security/cve/CVE-2015-4600/" source="CVE"/>
		<reference ref_id="CVE-2015-4601" ref_url="https://www.suse.com/security/cve/CVE-2015-4601/" source="CVE"/>
		<reference ref_id="CVE-2015-4602" ref_url="https://www.suse.com/security/cve/CVE-2015-4602/" source="CVE"/>
		<reference ref_id="CVE-2015-4603" ref_url="https://www.suse.com/security/cve/CVE-2015-4603/" source="CVE"/>
		<reference ref_id="CVE-2015-4643" ref_url="https://www.suse.com/security/cve/CVE-2015-4643/" source="CVE"/>
		<reference ref_id="CVE-2015-4644" ref_url="https://www.suse.com/security/cve/CVE-2015-4644/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001500.html" source="SUSE-SU"/>
		<description>

This update fixes the following vulnerabilities in php:

    * Heap corruption issue in exif_thumbnail(). (CVE-2014-3670)
    * Integer overflow in unserialize(). (CVE-2014-3669)
    * Xmlrpc ISO8601 date format parsing out-of-bounds read in mkgmtime().
      (CVE-2014-3668)

Security Issues:

    * CVE-2014-3669
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3669&gt;
    * CVE-2014-3670
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3670&gt;
    * CVE-2014-3668
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3668&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-28"/>
	<updated date="2014-10-28"/>
	<bugzilla href="https://bugzilla.suse.com/828020">SUSE bug 828020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829207">SUSE bug 829207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/837746">SUSE bug 837746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842676">SUSE bug 842676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853045">SUSE bug 853045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854880">SUSE bug 854880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868624">SUSE bug 868624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880904">SUSE bug 880904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880905">SUSE bug 880905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882992">SUSE bug 882992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884986">SUSE bug 884986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884987">SUSE bug 884987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884989">SUSE bug 884989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884990">SUSE bug 884990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884991">SUSE bug 884991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884992">SUSE bug 884992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885961">SUSE bug 885961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886059">SUSE bug 886059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886060">SUSE bug 886060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893849">SUSE bug 893849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893853">SUSE bug 893853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902357">SUSE bug 902357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902360">SUSE bug 902360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902368">SUSE bug 902368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907519">SUSE bug 907519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910659">SUSE bug 910659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914690">SUSE bug 914690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917150">SUSE bug 917150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918768">SUSE bug 918768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919080">SUSE bug 919080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922022">SUSE bug 922022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922451">SUSE bug 922451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922452">SUSE bug 922452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923946">SUSE bug 923946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924972">SUSE bug 924972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925109">SUSE bug 925109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928506">SUSE bug 928506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928511">SUSE bug 928511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931421">SUSE bug 931421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931769">SUSE bug 931769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931772">SUSE bug 931772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931776">SUSE bug 931776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933227">SUSE bug 933227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935074">SUSE bug 935074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935224">SUSE bug 935224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935226">SUSE bug 935226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935227">SUSE bug 935227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935232">SUSE bug 935232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935234">SUSE bug 935234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935274">SUSE bug 935274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935275">SUSE bug 935275</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4113/">CVE-2013-4113 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4113">CVE-2013-4113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4248/">CVE-2013-4248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4248">CVE-2013-4248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4635/">CVE-2013-4635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4635">CVE-2013-4635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6420/">CVE-2013-6420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6420">CVE-2013-6420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6501/">CVE-2013-6501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6501">CVE-2013-6501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6712/">CVE-2013-6712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6712">CVE-2013-6712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0207/">CVE-2014-0207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0207">CVE-2014-0207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0237/">CVE-2014-0237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0237">CVE-2014-0237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0238/">CVE-2014-0238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0238">CVE-2014-0238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2497/">CVE-2014-2497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2497">CVE-2014-2497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3478/">CVE-2014-3478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3478">CVE-2014-3478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3479/">CVE-2014-3479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3479">CVE-2014-3479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3480/">CVE-2014-3480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3480">CVE-2014-3480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3487/">CVE-2014-3487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3487">CVE-2014-3487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3515/">CVE-2014-3515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3515">CVE-2014-3515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3668/">CVE-2014-3668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3668">CVE-2014-3668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3669/">CVE-2014-3669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3669">CVE-2014-3669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3670/">CVE-2014-3670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3670">CVE-2014-3670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4049/">CVE-2014-4049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4049">CVE-2014-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4670/">CVE-2014-4670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4670">CVE-2014-4670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4698/">CVE-2014-4698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4698">CVE-2014-4698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4721/">CVE-2014-4721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4721">CVE-2014-4721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5459/">CVE-2014-5459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5459">CVE-2014-5459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8142/">CVE-2014-8142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8142">CVE-2014-8142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9652/">CVE-2014-9652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9652">CVE-2014-9652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9705/">CVE-2014-9705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9705">CVE-2014-9705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9709/">CVE-2014-9709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9709">CVE-2014-9709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0231/">CVE-2015-0231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0231">CVE-2015-0231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0232/">CVE-2015-0232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0232">CVE-2015-0232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2301/">CVE-2015-2301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2301">CVE-2015-2301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2305">CVE-2015-2305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2783/">CVE-2015-2783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2783">CVE-2015-2783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2787/">CVE-2015-2787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2787">CVE-2015-2787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3329/">CVE-2015-3329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3329">CVE-2015-3329 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3411/">CVE-2015-3411 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3411">CVE-2015-3411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3412/">CVE-2015-3412 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3412">CVE-2015-3412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4021/">CVE-2015-4021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4021">CVE-2015-4021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4022/">CVE-2015-4022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4022">CVE-2015-4022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4024/">CVE-2015-4024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4024">CVE-2015-4024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4026/">CVE-2015-4026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4026">CVE-2015-4026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4148/">CVE-2015-4148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4148">CVE-2015-4148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4598/">CVE-2015-4598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4598">CVE-2015-4598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4599/">CVE-2015-4599 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4599">CVE-2015-4599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4600/">CVE-2015-4600 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4600">CVE-2015-4600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4601/">CVE-2015-4601 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4601">CVE-2015-4601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4602/">CVE-2015-4602 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4602">CVE-2015-4602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4603/">CVE-2015-4603 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4603">CVE-2015-4603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4643/">CVE-2015-4643 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4643">CVE-2015-4643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4644/">CVE-2015-4644 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4644">CVE-2015-4644 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577280" comment="apache2-mod_php53-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577281" comment="php53-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577282" comment="php53-bcmath-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577283" comment="php53-bz2-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577284" comment="php53-calendar-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577285" comment="php53-ctype-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577286" comment="php53-curl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577287" comment="php53-dba-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577288" comment="php53-dom-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577289" comment="php53-exif-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577290" comment="php53-fastcgi-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577291" comment="php53-fileinfo-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577292" comment="php53-ftp-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577293" comment="php53-gd-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577294" comment="php53-gettext-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577295" comment="php53-gmp-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577296" comment="php53-iconv-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577297" comment="php53-intl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577298" comment="php53-json-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577299" comment="php53-ldap-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577300" comment="php53-mbstring-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577301" comment="php53-mcrypt-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577302" comment="php53-mysql-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577303" comment="php53-odbc-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577304" comment="php53-openssl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577305" comment="php53-pcntl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577306" comment="php53-pdo-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577307" comment="php53-pear-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577308" comment="php53-pgsql-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577309" comment="php53-pspell-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577310" comment="php53-shmop-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577311" comment="php53-snmp-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577312" comment="php53-soap-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577313" comment="php53-suhosin-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577314" comment="php53-sysvmsg-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577315" comment="php53-sysvsem-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577316" comment="php53-sysvshm-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577317" comment="php53-tokenizer-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577318" comment="php53-wddx-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577319" comment="php53-xmlreader-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577320" comment="php53-xmlrpc-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577321" comment="php53-xmlwriter-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577322" comment="php53-xsl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577323" comment="php53-zip-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577324" comment="php53-zlib-5.3.17-0.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577280" comment="apache2-mod_php53-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577281" comment="php53-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577282" comment="php53-bcmath-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577283" comment="php53-bz2-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577284" comment="php53-calendar-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577285" comment="php53-ctype-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577286" comment="php53-curl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577287" comment="php53-dba-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577288" comment="php53-dom-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577289" comment="php53-exif-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577290" comment="php53-fastcgi-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577291" comment="php53-fileinfo-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577292" comment="php53-ftp-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577293" comment="php53-gd-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577294" comment="php53-gettext-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577295" comment="php53-gmp-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577296" comment="php53-iconv-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577297" comment="php53-intl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577298" comment="php53-json-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577299" comment="php53-ldap-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577300" comment="php53-mbstring-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577301" comment="php53-mcrypt-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577302" comment="php53-mysql-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577303" comment="php53-odbc-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577304" comment="php53-openssl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577305" comment="php53-pcntl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577306" comment="php53-pdo-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577307" comment="php53-pear-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577308" comment="php53-pgsql-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577309" comment="php53-pspell-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577310" comment="php53-shmop-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577311" comment="php53-snmp-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577312" comment="php53-soap-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577313" comment="php53-suhosin-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577314" comment="php53-sysvmsg-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577315" comment="php53-sysvsem-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577316" comment="php53-sysvshm-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577317" comment="php53-tokenizer-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577318" comment="php53-wddx-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577319" comment="php53-xmlreader-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577320" comment="php53-xmlrpc-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577321" comment="php53-xmlwriter-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577322" comment="php53-xsl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577323" comment="php53-zip-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577324" comment="php53-zlib-5.3.17-0.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577280" comment="apache2-mod_php53-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577281" comment="php53-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577282" comment="php53-bcmath-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577283" comment="php53-bz2-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577284" comment="php53-calendar-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577285" comment="php53-ctype-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577286" comment="php53-curl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577287" comment="php53-dba-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577288" comment="php53-dom-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577289" comment="php53-exif-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577290" comment="php53-fastcgi-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577291" comment="php53-fileinfo-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577292" comment="php53-ftp-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577293" comment="php53-gd-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577294" comment="php53-gettext-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577295" comment="php53-gmp-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577296" comment="php53-iconv-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577297" comment="php53-intl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577298" comment="php53-json-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577299" comment="php53-ldap-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577300" comment="php53-mbstring-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577301" comment="php53-mcrypt-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577302" comment="php53-mysql-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577303" comment="php53-odbc-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577304" comment="php53-openssl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577305" comment="php53-pcntl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577306" comment="php53-pdo-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577307" comment="php53-pear-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577308" comment="php53-pgsql-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577309" comment="php53-pspell-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577310" comment="php53-shmop-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577311" comment="php53-snmp-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577312" comment="php53-soap-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577313" comment="php53-suhosin-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577314" comment="php53-sysvmsg-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577315" comment="php53-sysvsem-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577316" comment="php53-sysvshm-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577317" comment="php53-tokenizer-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577318" comment="php53-wddx-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577319" comment="php53-xmlreader-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577320" comment="php53-xmlrpc-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577321" comment="php53-xmlwriter-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577322" comment="php53-xsl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577323" comment="php53-zip-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577324" comment="php53-zlib-5.3.17-0.31.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218372" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_security2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="822664" ref_url="https://bugzilla.suse.com/822664" source="BUGZILLA"/>
		<reference ref_id="871309" ref_url="https://bugzilla.suse.com/871309" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2765" ref_url="https://www.suse.com/security/cve/CVE-2013-2765/" source="CVE"/>
		<reference ref_id="CVE-2013-5705" ref_url="https://www.suse.com/security/cve/CVE-2013-5705/" source="CVE"/>
		<description>

This apache2-mod_security2 update fixes the following security issue:

    * bnc#871309: bypass of intended rules via chunked requests
      (CVE-2013-5705)

Security Issues:

    * CVE-2013-5705
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5705&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-07"/>
	<updated date="2014-08-07"/>
	<bugzilla href="https://bugzilla.suse.com/822664">SUSE bug 822664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871309">SUSE bug 871309</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2765/">CVE-2013-2765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2765">CVE-2013-2765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5705/">CVE-2013-5705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5705">CVE-2013-5705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577325" comment="apache2-mod_security2-2.7.1-0.2.18.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577325" comment="apache2-mod_security2-2.7.1-0.2.18.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577325" comment="apache2-mod_security2-2.7.1-0.2.18.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218373" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_security2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1207378" ref_url="https://bugzilla.suse.com/1207378" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48279" ref_url="https://www.suse.com/security/cve/CVE-2022-48279/" source="CVE"/>
		<description>
This update for apache2-mod_security2 fixes the following issues:

- CVE-2022-48279: Fixed a potential firewall bypass due to an
  incorrect parsing of HTTP multipart requests (bsc#1207378).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-08"/>
	<updated date="2023-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207378">SUSE bug 1207378</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48279/">CVE-2022-48279 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48279">CVE-2022-48279 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992621" comment="apache2-mod_security2-2.7.1-0.2.18.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218374" version="1" class="patch">
	<metadata>
		<title>Security update for apport (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="947731" ref_url="https://bugzilla.suse.com/947731" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1338" ref_url="https://www.suse.com/security/cve/CVE-2015-1338/" source="CVE"/>
		<description>
This update for apport fixes the following issues:

Security issue fixed:
- CVE-2015-1338: Insecurely created crash dumps could lead to a DoS or privilege escalation through
  malicious symlinks. (bsc#947731)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-24"/>
	<updated date="2017-07-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/947731">SUSE bug 947731</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1338/">CVE-2015-1338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1338">CVE-2015-1338 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570824" comment="apport-0.114-12.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570825" comment="apport-crashdb-sle-0.114-0.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570826" comment="apport-gtk-0.114-12.8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218375" version="1" class="patch">
	<metadata>
		<title>Security update for apport (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1140986" ref_url="https://bugzilla.suse.com/1140986" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-7307" ref_url="https://www.suse.com/security/cve/CVE-2019-7307/" source="CVE"/>
		<description>
This update for apport fixes the following issues:

Security issues fixed:

- CVE-2019-7307: Fixed a TOCTOU issue, which allows local users to read arbitrary files. (bsc#1140986)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-18"/>
	<updated date="2019-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1140986">SUSE bug 1140986</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7307/">CVE-2019-7307 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7307">CVE-2019-7307 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570827" comment="apport-0.114-12.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570828" comment="apport-crashdb-sle-0.114-0.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570829" comment="apport-gtk-0.114-12.8.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218376" version="1" class="patch">
	<metadata>
		<title>Security update for apport (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1155479" ref_url="https://bugzilla.suse.com/1155479" source="BUGZILLA"/>
		<reference ref_id="1155481" ref_url="https://bugzilla.suse.com/1155481" source="BUGZILLA"/>
		<reference ref_id="1155482" ref_url="https://bugzilla.suse.com/1155482" source="BUGZILLA"/>
		<reference ref_id="1174108" ref_url="https://bugzilla.suse.com/1174108" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11482" ref_url="https://www.suse.com/security/cve/CVE-2019-11482/" source="CVE"/>
		<reference ref_id="CVE-2019-11485" ref_url="https://www.suse.com/security/cve/CVE-2019-11485/" source="CVE"/>
		<reference ref_id="CVE-2019-15790" ref_url="https://www.suse.com/security/cve/CVE-2019-15790/" source="CVE"/>
		<reference ref_id="CVE-2020-15701" ref_url="https://www.suse.com/security/cve/CVE-2020-15701/" source="CVE"/>
		<description>
This update for apport fixes the following issues:

- CVE-2019-11482: Fixed TOCTTOU race conditions when creating a core file (bsc#1155479).
- CVE-2019-11485: Fixed a permission issue with the directory of lock files (bsc#1155481)
- CVE-2019-15790: Fixed the privilleges that reads /proc/$PID/ files to avoid potential information disclosure (bsc#1155482).
- CVE-2020-15701: Fixed a denial of service while parsing apport-ignore.xml (bsc#1174108).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-21"/>
	<updated date="2020-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155479">SUSE bug 1155479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155481">SUSE bug 1155481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155482">SUSE bug 1155482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174108">SUSE bug 1174108</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11482/">CVE-2019-11482 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11482">CVE-2019-11482 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11485/">CVE-2019-11485 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11485">CVE-2019-11485 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15790/">CVE-2019-15790 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15790">CVE-2019-15790 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15701/">CVE-2020-15701 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15701">CVE-2020-15701 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570830" comment="apport-0.114-12.8.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570831" comment="apport-crashdb-sle-0.114-0.8.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570832" comment="apport-gtk-0.114-12.8.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218377" version="1" class="patch">
	<metadata>
		<title>Security update for arpwatch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186240" ref_url="https://bugzilla.suse.com/1186240" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25321" ref_url="https://www.suse.com/security/cve/CVE-2021-25321/" source="CVE"/>
		<description>
This update for arpwatch fixes the following issues:

- CVE-2021-25321: Fixed local privilege escalation from runtime user to root (bsc#1186240).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186240">SUSE bug 1186240</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25321/">CVE-2021-25321 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25321">CVE-2021-25321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616451" comment="arpwatch-2.1a15-131.23.2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218378" version="1" class="patch">
	<metadata>
		<title>Security update for aspell (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1153892" ref_url="https://bugzilla.suse.com/1153892" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17544" ref_url="https://www.suse.com/security/cve/CVE-2019-17544/" source="CVE"/>
		<description>
This update for aspell fixes the following issues:

- CVE-2019-17544: Fixed a stack-based buffer over-read in acommon:unescape in common/getdata.cpp via an isolated backslash (bsc#1153892).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-21"/>
	<updated date="2019-11-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1153892">SUSE bug 1153892</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-17544/">CVE-2019-17544 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17544">CVE-2019-17544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570845" comment="aspell-0.60.6-26.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570846" comment="aspell-32bit-0.60.6-26.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570847" comment="aspell-ispell-0.60.6-26.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218379" version="1" class="patch">
	<metadata>
		<title>Security update for aspell (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1161982" ref_url="https://bugzilla.suse.com/1161982" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20433" ref_url="https://www.suse.com/security/cve/CVE-2019-20433/" source="CVE"/>
		<description>
This update for aspell fixes the following security issue:

- CVE-2019-20433: Fixed a buffer over-read when processing strings ending with a single '\0' byte with ucs-2 and ucs-4 encoding (bsc#1161982).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-22"/>
	<updated date="2020-07-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1161982">SUSE bug 1161982</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20433/">CVE-2019-20433 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20433">CVE-2019-20433 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570848" comment="aspell-0.60.6-26.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570849" comment="aspell-32bit-0.60.6-26.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570850" comment="aspell-ispell-0.60.6-26.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218380" version="1" class="patch">
	<metadata>
		<title>Security update for aspell (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188576" ref_url="https://bugzilla.suse.com/1188576" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25051" ref_url="https://www.suse.com/security/cve/CVE-2019-25051/" source="CVE"/>
		<description>
This update for aspell fixes the following issues:

- CVE-2019-25051: Fixed heap-buffer-overflow in acommon:ObjStack:dup_top (bsc#1188576).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-12"/>
	<updated date="2021-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188576">SUSE bug 1188576</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25051/">CVE-2019-25051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25051">CVE-2019-25051 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627833" comment="aspell-0.60.6-26.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627834" comment="aspell-32bit-0.60.6-26.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627835" comment="aspell-ispell-0.60.6-26.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218381" version="1" class="patch">
	<metadata>
		<title>Security update for atftp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1133114" ref_url="https://bugzilla.suse.com/1133114" source="BUGZILLA"/>
		<reference ref_id="1133145" ref_url="https://bugzilla.suse.com/1133145" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11365" ref_url="https://www.suse.com/security/cve/CVE-2019-11365/" source="CVE"/>
		<reference ref_id="CVE-2019-11366" ref_url="https://www.suse.com/security/cve/CVE-2019-11366/" source="CVE"/>
		<description>
This update for atftp fixes the following issues:

Security issues fixed:

- CVE-2019-11366: Fixed a denial of service caused by a NULL pointer dereference because thread_list_mutex was not locked (bsc#1133145).
- CVE-2019-11365: Fixed a buffer overflow which could lead to remote code execution caused by an insecure use of strncpy() (bsc#1133114).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-29"/>
	<updated date="2019-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133114">SUSE bug 1133114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133145">SUSE bug 1133145</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11365/">CVE-2019-11365 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11365">CVE-2019-11365 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11366/">CVE-2019-11366 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11366">CVE-2019-11366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577326" comment="atftp-0.7.0-135.23.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218382" version="1" class="patch">
	<metadata>
		<title>Security update for atftp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1190522" ref_url="https://bugzilla.suse.com/1190522" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41054" ref_url="https://www.suse.com/security/cve/CVE-2021-41054/" source="CVE"/>
		<description>
This update for atftp fixes the following issues:

- CVE-2021-41054: Fixed buffer overflow caused by combination of data, OACK, and other options (bsc#1190522).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-29"/>
	<updated date="2021-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190522">SUSE bug 1190522</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41054/">CVE-2021-41054 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41054">CVE-2021-41054 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633874" comment="atftp-0.7.0-135.23.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218383" version="1" class="patch">
	<metadata>
		<title>Security update for atftp (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1195619" ref_url="https://bugzilla.suse.com/1195619" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46671" ref_url="https://www.suse.com/security/cve/CVE-2021-46671/" source="CVE"/>
		<description>
This update for atftp fixes the following issues:

- CVE-2021-46671: Fixed a potential information leak in atftpd (bnc#1195619).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1195619">SUSE bug 1195619</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46671/">CVE-2021-46671 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46671">CVE-2021-46671 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667671" comment="atftp-0.7.0-135.23.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218384" version="1" class="patch">
	<metadata>
		<title>Security update for audiofile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1026978" ref_url="https://bugzilla.suse.com/1026978" source="BUGZILLA"/>
		<reference ref_id="1026979" ref_url="https://bugzilla.suse.com/1026979" source="BUGZILLA"/>
		<reference ref_id="1026980" ref_url="https://bugzilla.suse.com/1026980" source="BUGZILLA"/>
		<reference ref_id="1026981" ref_url="https://bugzilla.suse.com/1026981" source="BUGZILLA"/>
		<reference ref_id="1026982" ref_url="https://bugzilla.suse.com/1026982" source="BUGZILLA"/>
		<reference ref_id="1026983" ref_url="https://bugzilla.suse.com/1026983" source="BUGZILLA"/>
		<reference ref_id="1026984" ref_url="https://bugzilla.suse.com/1026984" source="BUGZILLA"/>
		<reference ref_id="1026985" ref_url="https://bugzilla.suse.com/1026985" source="BUGZILLA"/>
		<reference ref_id="1026986" ref_url="https://bugzilla.suse.com/1026986" source="BUGZILLA"/>
		<reference ref_id="1026987" ref_url="https://bugzilla.suse.com/1026987" source="BUGZILLA"/>
		<reference ref_id="1026988" ref_url="https://bugzilla.suse.com/1026988" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6827" ref_url="https://www.suse.com/security/cve/CVE-2017-6827/" source="CVE"/>
		<reference ref_id="CVE-2017-6828" ref_url="https://www.suse.com/security/cve/CVE-2017-6828/" source="CVE"/>
		<reference ref_id="CVE-2017-6829" ref_url="https://www.suse.com/security/cve/CVE-2017-6829/" source="CVE"/>
		<reference ref_id="CVE-2017-6830" ref_url="https://www.suse.com/security/cve/CVE-2017-6830/" source="CVE"/>
		<reference ref_id="CVE-2017-6831" ref_url="https://www.suse.com/security/cve/CVE-2017-6831/" source="CVE"/>
		<reference ref_id="CVE-2017-6832" ref_url="https://www.suse.com/security/cve/CVE-2017-6832/" source="CVE"/>
		<reference ref_id="CVE-2017-6833" ref_url="https://www.suse.com/security/cve/CVE-2017-6833/" source="CVE"/>
		<reference ref_id="CVE-2017-6834" ref_url="https://www.suse.com/security/cve/CVE-2017-6834/" source="CVE"/>
		<reference ref_id="CVE-2017-6835" ref_url="https://www.suse.com/security/cve/CVE-2017-6835/" source="CVE"/>
		<reference ref_id="CVE-2017-6836" ref_url="https://www.suse.com/security/cve/CVE-2017-6836/" source="CVE"/>
		<reference ref_id="CVE-2017-6837" ref_url="https://www.suse.com/security/cve/CVE-2017-6837/" source="CVE"/>
		<reference ref_id="CVE-2017-6838" ref_url="https://www.suse.com/security/cve/CVE-2017-6838/" source="CVE"/>
		<reference ref_id="CVE-2017-6839" ref_url="https://www.suse.com/security/cve/CVE-2017-6839/" source="CVE"/>
		<description>

This update for audiofile fixes the following issues:

Security issues fixed:
- CVE-2017-6827: heap-based buffer overflow in MSADPCM::initializeCoefficients (MSADPCM.cpp) (bsc#1026979)
- CVE-2017-6828: heap-based buffer overflow in readValue (FileHandle.cpp) (bsc#1026980)
- CVE-2017-6829: global buffer overflow in decodeSample (IMA.cpp) (bsc#1026981)
- CVE-2017-6830: heap-based buffer overflow in alaw2linear_buf (G711.cpp) (bsc#1026982)
- CVE-2017-6831: heap-based buffer overflow in IMA::decodeBlockWAVE (IMA.cpp) (bsc#1026983)
- CVE-2017-6832: heap-based buffer overflow in MSADPCM::decodeBlock (MSADPCM.cpp) (bsc#1026984)
- CVE-2017-6833: divide-by-zero in BlockCodec::runPull (BlockCodec.cpp) (bsc#1026985)
- CVE-2017-6834: heap-based buffer overflow in ulaw2linear_buf (G711.cpp) (bsc#1026986)
- CVE-2017-6835: divide-by-zero in BlockCodec::reset1 (BlockCodec.cpp) (bsc#1026988)
- CVE-2017-6836: heap-based buffer overflow in Expand3To4Module::run (SimpleModule.h) (bsc#1026987)
- CVE-2017-6837, CVE-2017-6838, CVE-2017-6839: multiple ubsan crashes (bsc#1026978)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-05"/>
	<updated date="2017-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1026978">SUSE bug 1026978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026979">SUSE bug 1026979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026980">SUSE bug 1026980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026981">SUSE bug 1026981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026982">SUSE bug 1026982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026983">SUSE bug 1026983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026984">SUSE bug 1026984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026985">SUSE bug 1026985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026986">SUSE bug 1026986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026987">SUSE bug 1026987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026988">SUSE bug 1026988</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6827/">CVE-2017-6827 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6827">CVE-2017-6827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6828/">CVE-2017-6828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6828">CVE-2017-6828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6829/">CVE-2017-6829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6829">CVE-2017-6829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6830/">CVE-2017-6830 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6830">CVE-2017-6830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6831/">CVE-2017-6831 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6831">CVE-2017-6831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6832/">CVE-2017-6832 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6832">CVE-2017-6832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6833/">CVE-2017-6833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6833">CVE-2017-6833 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6834/">CVE-2017-6834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6834">CVE-2017-6834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6835/">CVE-2017-6835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6835">CVE-2017-6835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6836/">CVE-2017-6836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6836">CVE-2017-6836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6837/">CVE-2017-6837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6837">CVE-2017-6837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6838/">CVE-2017-6838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6838">CVE-2017-6838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6839/">CVE-2017-6839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6839">CVE-2017-6839 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570852" comment="audiofile-0.2.6-142.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570853" comment="audiofile-32bit-0.2.6-142.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218385" version="1" class="patch">
	<metadata>
		<title>Security update for augeas</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="849252" ref_url="https://bugzilla.suse.com/849252" source="BUGZILLA"/>
		<reference ref_id="853044" ref_url="https://bugzilla.suse.com/853044" source="BUGZILLA"/>
		<reference ref_id="871323" ref_url="https://bugzilla.suse.com/871323" source="BUGZILLA"/>
		<reference ref_id="876044" ref_url="https://bugzilla.suse.com/876044" source="BUGZILLA"/>
		<reference ref_id="885003" ref_url="https://bugzilla.suse.com/885003" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0786" ref_url="https://www.suse.com/security/cve/CVE-2012-0786/" source="CVE"/>
		<reference ref_id="CVE-2013-6412" ref_url="https://www.suse.com/security/cve/CVE-2013-6412/" source="CVE"/>
		<description>

Augeas has been updated to fix a symlink overwrite problem (CVE-2012-0786, 
CVE-2013-6412).

Also a bug has been fixed where 'augtool -s set was failing' (bnc#876044)

Additionally parsing the multipath configuration has been fixed. bnc#871323

Security Issues:

    * CVE-2012-0786
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0786&gt;
    * CVE-2013-6412
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6412&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-30"/>
	<updated date="2014-07-30"/>
	<bugzilla href="https://bugzilla.suse.com/849252">SUSE bug 849252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853044">SUSE bug 853044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871323">SUSE bug 871323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876044">SUSE bug 876044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885003">SUSE bug 885003</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0786/">CVE-2012-0786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0786">CVE-2012-0786 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6412/">CVE-2013-6412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6412">CVE-2013-6412 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577327" comment="augeas-0.9.0-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577328" comment="augeas-lenses-0.9.0-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577329" comment="libaugeas0-0.9.0-3.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577327" comment="augeas-0.9.0-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577328" comment="augeas-lenses-0.9.0-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577329" comment="libaugeas0-0.9.0-3.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577327" comment="augeas-0.9.0-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577328" comment="augeas-lenses-0.9.0-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577329" comment="libaugeas0-0.9.0-3.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218386" version="1" class="patch">
	<metadata>
		<title>Security update for augeas (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="925225" ref_url="https://bugzilla.suse.com/925225" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001642.html" source="SUSE-SU"/>
		<description>

This update fixes an untrusted argument escaping problem (CVE-2014-8119):

* new API - aug_escape_name() - which can be used to escape
  untrusted inputs before using them as part of path expressions
* aug_match() is changed to return properly escaped output
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-09"/>
	<updated date="2015-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/925225">SUSE bug 925225</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8119">CVE-2014-8119 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577330" comment="augeas-0.9.0-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577331" comment="augeas-lenses-0.9.0-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577332" comment="libaugeas0-0.9.0-3.17.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577330" comment="augeas-0.9.0-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577331" comment="augeas-lenses-0.9.0-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577332" comment="libaugeas0-0.9.0-3.17.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577330" comment="augeas-0.9.0-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577331" comment="augeas-lenses-0.9.0-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577332" comment="libaugeas0-0.9.0-3.17.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218387" version="1" class="patch">
	<metadata>
		<title>Security update for augeas (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1054171" ref_url="https://bugzilla.suse.com/1054171" source="BUGZILLA"/>
		<reference ref_id="925225" ref_url="https://bugzilla.suse.com/925225" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<reference ref_id="CVE-2017-7555" ref_url="https://www.suse.com/security/cve/CVE-2017-7555/" source="CVE"/>
		<description>
This update for augeas fixes the following issues:

Security issues fixed:

- CVE-2017-7555: Fix a memory corruption bug could have lead to arbitrary code execution
  by passing crafted strings that would be mis-handled by parse_name() (bsc#1054171).
- CVE-2014-8119: Fix improper handling of escaped strings leading to memory corruption (bsc#925225).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-09"/>
	<updated date="2018-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1054171">SUSE bug 1054171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925225">SUSE bug 925225</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8119">CVE-2014-8119 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7555/">CVE-2017-7555 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7555">CVE-2017-7555 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577333" comment="augeas-0.9.0-3.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577334" comment="augeas-lenses-0.9.0-3.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577335" comment="libaugeas0-0.9.0-3.21.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218388" version="1" class="patch">
	<metadata>
		<title>Security update for automake</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="559815" ref_url="https://bugzilla.suse.com/559815" source="BUGZILLA"/>
		<reference ref_id="770618" ref_url="https://bugzilla.suse.com/770618" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<description>

This update of automake fixes a race condition in 'distcheck'. 
(CVE-2012-3386)

Also a bug where world writeable tarballs were generated during 'make dist' 
has been fixed (CVE-2009-4029).

Security Issue references:

    * CVE-2012-3386
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3386&gt;
    * CVE-2009-4029
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4029&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-12"/>
	<updated date="2013-08-12"/>
	<bugzilla href="https://bugzilla.suse.com/559815">SUSE bug 559815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770618">SUSE bug 770618</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3386">CVE-2012-3386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575912" comment="automake-1.10.1-4.131.9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575912" comment="automake-1.10.1-4.131.9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575912" comment="automake-1.10.1-4.131.9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218389" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1120281" ref_url="https://bugzilla.suse.com/1120281" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000845" ref_url="https://www.suse.com/security/cve/CVE-2018-1000845/" source="CVE"/>
		<description>
This update for avahi fixes the following issues:

Security issue fixed:

- CVE-2018-1000845: Fixed DNS amplification and reflection to spoofed addresses (DOS) (bsc#1120281)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-08"/>
	<updated date="2019-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120281">SUSE bug 1120281</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000845/">CVE-2018-1000845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000845">CVE-2018-1000845 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577336" comment="avahi-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577337" comment="avahi-lang-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577338" comment="avahi-utils-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577339" comment="libavahi-client3-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577340" comment="libavahi-client3-32bit-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577341" comment="libavahi-common3-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577342" comment="libavahi-common3-32bit-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577343" comment="libavahi-core5-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577344" comment="libavahi-glib1-0.6.23-35.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577345" comment="libavahi-glib1-32bit-0.6.23-35.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577346" comment="libdns_sd-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577347" comment="libdns_sd-32bit-0.6.23-35.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218390" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1085255" ref_url="https://bugzilla.suse.com/1085255" source="BUGZILLA"/>
		<description>
This update for avahi fixes the following issues:

- increase data and stack limits to fix remote denial of service (bsc#1085255). 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-26"/>
	<updated date="2020-08-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085255">SUSE bug 1085255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577348" comment="avahi-0.6.23-35.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577349" comment="avahi-lang-0.6.23-35.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577350" comment="avahi-utils-0.6.23-35.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577351" comment="libavahi-client3-0.6.23-35.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577352" comment="libavahi-client3-32bit-0.6.23-35.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577353" comment="libavahi-common3-0.6.23-35.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577354" comment="libavahi-common3-32bit-0.6.23-35.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577355" comment="libavahi-core5-0.6.23-35.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577356" comment="libavahi-glib1-0.6.23-35.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577357" comment="libavahi-glib1-32bit-0.6.23-35.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577358" comment="libdns_sd-0.6.23-35.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577359" comment="libdns_sd-32bit-0.6.23-35.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218391" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180827" ref_url="https://bugzilla.suse.com/1180827" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26720" ref_url="https://www.suse.com/security/cve/CVE-2021-26720/" source="CVE"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2021-26720: drop privileges when invoking avahi-daemon-check-dns.sh (bsc#1180827).
- Add sudo to requires: used to drop privileges.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-24"/>
	<updated date="2021-02-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180827">SUSE bug 1180827</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26720/">CVE-2021-26720 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26720">CVE-2021-26720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577360" comment="avahi-0.6.23-35.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577361" comment="avahi-lang-0.6.23-35.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577362" comment="avahi-utils-0.6.23-35.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577363" comment="libavahi-client3-0.6.23-35.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577364" comment="libavahi-client3-32bit-0.6.23-35.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577365" comment="libavahi-common3-0.6.23-35.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577366" comment="libavahi-common3-32bit-0.6.23-35.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577367" comment="libavahi-core5-0.6.23-35.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577368" comment="libavahi-glib1-0.6.23-35.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577369" comment="libavahi-glib1-32bit-0.6.23-35.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577370" comment="libdns_sd-0.6.23-35.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577371" comment="libdns_sd-32bit-0.6.23-35.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218392" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184521" ref_url="https://bugzilla.suse.com/1184521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3468" ref_url="https://www.suse.com/security/cve/CVE-2021-3468/" source="CVE"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2021-3468: avoid infinite loop by handling  HUP event in client_work (bsc#1184521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184521">SUSE bug 1184521</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3468/">CVE-2021-3468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3468">CVE-2021-3468 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577372" comment="avahi-0.6.23-35.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577373" comment="avahi-lang-0.6.23-35.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577374" comment="avahi-utils-0.6.23-35.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577375" comment="libavahi-client3-0.6.23-35.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577376" comment="libavahi-client3-32bit-0.6.23-35.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577377" comment="libavahi-common3-0.6.23-35.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577378" comment="libavahi-common3-32bit-0.6.23-35.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577379" comment="libavahi-core5-0.6.23-35.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577380" comment="libavahi-glib1-0.6.23-35.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577381" comment="libavahi-glib1-32bit-0.6.23-35.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577382" comment="libdns_sd-0.6.23-35.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577383" comment="libdns_sd-32bit-0.6.23-35.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218393" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210328" ref_url="https://bugzilla.suse.com/1210328" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1981" ref_url="https://www.suse.com/security/cve/CVE-2023-1981/" source="CVE"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2023-1981: Fixed crash in avahi-daemon via DBus (bsc#1210328).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-27"/>
	<updated date="2023-04-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210328">SUSE bug 1210328</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1981/">CVE-2023-1981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1981">CVE-2023-1981 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992622" comment="avahi-0.6.23-35.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992623" comment="avahi-lang-0.6.23-35.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992624" comment="avahi-utils-0.6.23-35.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992625" comment="libavahi-client3-0.6.23-35.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992626" comment="libavahi-client3-32bit-0.6.23-35.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992627" comment="libavahi-common3-0.6.23-35.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992628" comment="libavahi-common3-32bit-0.6.23-35.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992629" comment="libavahi-core5-0.6.23-35.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992630" comment="libavahi-glib1-0.6.23-35.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992631" comment="libavahi-glib1-32bit-0.6.23-35.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992632" comment="libdns_sd-0.6.23-35.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992633" comment="libdns_sd-32bit-0.6.23-35.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218394" version="1" class="patch">
	<metadata>
		<title>Security update for axis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1103658" ref_url="https://bugzilla.suse.com/1103658" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8032" ref_url="https://www.suse.com/security/cve/CVE-2018-8032/" source="CVE"/>
		<description>
This update for axis fixes the following security issue:

- CVE-2018-8032: Prevent cross-site scripting (XSS) attack in the default
  servlet/services (bsc#1103658).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-12"/>
	<updated date="2018-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103658">SUSE bug 1103658</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8032/">CVE-2018-8032 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8032">CVE-2018-8032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577384" comment="axis-1.4-236.236.44.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218395" version="1" class="patch">
	<metadata>
		<title>Security update for axis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1134598" ref_url="https://bugzilla.suse.com/1134598" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5784" ref_url="https://www.suse.com/security/cve/CVE-2012-5784/" source="CVE"/>
		<reference ref_id="CVE-2014-3596" ref_url="https://www.suse.com/security/cve/CVE-2014-3596/" source="CVE"/>
		<description>
This update for axis fixes the following issues:

Security issue fixed:

- CVE-2012-5784, CVE-2014-3596: Fixed missing connection hostname check against X.509 certificate name (bsc#1134598).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-29"/>
	<updated date="2019-05-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1134598">SUSE bug 1134598</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2012-5784/">CVE-2012-5784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5784">CVE-2012-5784 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-3596/">CVE-2014-3596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3596">CVE-2014-3596 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577385" comment="axis-1.4-236.236.44.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218396" version="1" class="patch">
	<metadata>
		<title>Security update for bash</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="819783" ref_url="https://bugzilla.suse.com/819783" source="BUGZILLA"/>
		<reference ref_id="820149" ref_url="https://bugzilla.suse.com/820149" source="BUGZILLA"/>
		<reference ref_id="844550" ref_url="https://bugzilla.suse.com/844550" source="BUGZILLA"/>
		<reference ref_id="896776" ref_url="https://bugzilla.suse.com/896776" source="BUGZILLA"/>
		<reference ref_id="898346" ref_url="https://bugzilla.suse.com/898346" source="BUGZILLA"/>
		<reference ref_id="898603" ref_url="https://bugzilla.suse.com/898603" source="BUGZILLA"/>
		<reference ref_id="898604" ref_url="https://bugzilla.suse.com/898604" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6271" ref_url="https://www.suse.com/security/cve/CVE-2014-6271/" source="CVE"/>
		<reference ref_id="CVE-2014-7169" ref_url="https://www.suse.com/security/cve/CVE-2014-7169/" source="CVE"/>
		<reference ref_id="CVE-2014-7186" ref_url="https://www.suse.com/security/cve/CVE-2014-7186/" source="CVE"/>
		<reference ref_id="CVE-2014-7187" ref_url="https://www.suse.com/security/cve/CVE-2014-7187/" source="CVE"/>
		<description>

The command-line shell 'bash' evaluates environment variables, which allows 
the injection of characters and might be used to access files on the system 
in some circumstances (CVE-2014-7169).

Please note that this issue is different from a previously fixed 
vulnerability tracked under CVE-2014-6271 and is less serious due to the 
special, non-default system configuration that is needed to create an 
exploitable situation.

To remove further exploitation potential we now limit the 
function-in-environment variable to variables prefixed with BASH_FUNC_. 
This hardening feature is work in progress and might be improved in later 
updates.

Additionally, two other security issues have been fixed:

    * CVE-2014-7186: Nested HERE documents could lead to a crash of bash.
    * CVE-2014-7187: Nesting of for loops could lead to a crash of bash.

Security Issues:

    * CVE-2014-7169
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169&gt;
    * CVE-2014-7186
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186&gt;
    * CVE-2014-7187
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-26"/>
	<updated date="2014-09-26"/>
	<bugzilla href="https://bugzilla.suse.com/819783">SUSE bug 819783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820149">SUSE bug 820149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844550">SUSE bug 844550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896776">SUSE bug 896776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898346">SUSE bug 898346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898603">SUSE bug 898603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898604">SUSE bug 898604</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6271/">CVE-2014-6271 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-6271">CVE-2014-6271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7169/">CVE-2014-7169 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7169">CVE-2014-7169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7186/">CVE-2014-7186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7186">CVE-2014-7186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7187/">CVE-2014-7187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7187">CVE-2014-7187 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577386" comment="bash-3.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577387" comment="bash-doc-3.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577388" comment="bash-x86-3.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577389" comment="libreadline5-5.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577390" comment="libreadline5-32bit-5.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577391" comment="libreadline5-x86-5.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577392" comment="readline-doc-5.2-147.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577386" comment="bash-3.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577387" comment="bash-doc-3.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577388" comment="bash-x86-3.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577389" comment="libreadline5-5.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577390" comment="libreadline5-32bit-5.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577391" comment="libreadline5-x86-5.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577392" comment="readline-doc-5.2-147.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577386" comment="bash-3.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577387" comment="bash-doc-3.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577388" comment="bash-x86-3.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577389" comment="libreadline5-5.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577390" comment="libreadline5-32bit-5.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577391" comment="libreadline5-x86-5.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577392" comment="readline-doc-5.2-147.22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218397" version="1" class="patch">
	<metadata>
		<title>Security update for bash (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1000396" ref_url="https://bugzilla.suse.com/1000396" source="BUGZILLA"/>
		<reference ref_id="1001299" ref_url="https://bugzilla.suse.com/1001299" source="BUGZILLA"/>
		<reference ref_id="898812" ref_url="https://bugzilla.suse.com/898812" source="BUGZILLA"/>
		<reference ref_id="898884" ref_url="https://bugzilla.suse.com/898884" source="BUGZILLA"/>
		<reference ref_id="913701" ref_url="https://bugzilla.suse.com/913701" source="BUGZILLA"/>
		<reference ref_id="959755" ref_url="https://bugzilla.suse.com/959755" source="BUGZILLA"/>
		<reference ref_id="971410" ref_url="https://bugzilla.suse.com/971410" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6277" ref_url="https://www.suse.com/security/cve/CVE-2014-6277/" source="CVE"/>
		<reference ref_id="CVE-2014-6278" ref_url="https://www.suse.com/security/cve/CVE-2014-6278/" source="CVE"/>
		<reference ref_id="CVE-2016-0634" ref_url="https://www.suse.com/security/cve/CVE-2016-0634/" source="CVE"/>
		<reference ref_id="CVE-2016-7543" ref_url="https://www.suse.com/security/cve/CVE-2016-7543/" source="CVE"/>
		<description>
This update for bash fixes the following issues:

- CVE-2016-7543: Local attackers could have executed arbitrary commands via specially crafted SHELLOPTS+PS4 variables (bsc#1001299)
- CVE-2016-0634: Malicious hostnames could have allowed arbitrary command execution when $HOSTNAME was expanded in the prompt (bsc#1000396)
- CVE-2014-6278: code execution vulnerability via fd redirection (bsc#898884)
- CVE-2014-6277: Remote attackers could have executed arbitrary code or caused a denial of service due to improper parsing of function definitions in the values of environment variables (bsc#898812)

The following bugs were fixed:

- bsc#971410: bash script would teminated unexpectedly due to mishandled recursive traps
- bsc#913701: bash hangs if DEBUG trap is enabled

The following documentation updates are included:

- bsc#959755: Make clear that the files /etc/profile as well as /etc/bash.bashrc may source other files as well even if the bash does not.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-28"/>
	<updated date="2016-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000396">SUSE bug 1000396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001299">SUSE bug 1001299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898812">SUSE bug 898812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898884">SUSE bug 898884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913701">SUSE bug 913701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959755">SUSE bug 959755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971410">SUSE bug 971410</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6277/">CVE-2014-6277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6277">CVE-2014-6277 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6278/">CVE-2014-6278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6278">CVE-2014-6278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0634/">CVE-2016-0634 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0634">CVE-2016-0634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7543/">CVE-2016-7543 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7543">CVE-2016-7543 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577393" comment="bash-3.2-147.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577394" comment="bash-doc-3.2-147.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577395" comment="libreadline5-5.2-147.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577396" comment="libreadline5-32bit-5.2-147.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577397" comment="readline-doc-5.2-147.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218398" version="1" class="patch">
	<metadata>
		<title>Security update for bash (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1010845" ref_url="https://bugzilla.suse.com/1010845" source="BUGZILLA"/>
		<reference ref_id="1031729" ref_url="https://bugzilla.suse.com/1031729" source="BUGZILLA"/>
		<reference ref_id="976776" ref_url="https://bugzilla.suse.com/976776" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9401" ref_url="https://www.suse.com/security/cve/CVE-2016-9401/" source="CVE"/>
		<description>

This update for bash fixed several issues

This security issue was fixed:

- CVE-2016-9401: popd in bash might allowed local users to bypass the restricted shell and cause a use-after-free via a crafted address (bsc#1010845).

This non-security issue was fixed:

- Fix when HISTSIZE=0 and chattr +a .bash_history (bsc#1031729)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-31"/>
	<updated date="2017-05-31"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1010845">SUSE bug 1010845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031729">SUSE bug 1031729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976776">SUSE bug 976776</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9401/">CVE-2016-9401 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9401">CVE-2016-9401 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577398" comment="bash-3.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577399" comment="bash-doc-3.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577400" comment="libreadline5-5.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577401" comment="libreadline5-32bit-5.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577402" comment="readline-doc-5.2-147.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218399" version="1" class="patch">
	<metadata>
		<title>Security update for bcel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1205125" ref_url="https://bugzilla.suse.com/1205125" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42920" ref_url="https://www.suse.com/security/cve/CVE-2022-42920/" source="CVE"/>
		<description>
This update for bcel fixes the following issues:

- CVE-2022-42920: Fixed producing arbitrary bytecode via out-of-bounds writing (bsc#1205125).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-01"/>
	<updated date="2022-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1205125">SUSE bug 1205125</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42920/">CVE-2022-42920 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42920">CVE-2022-42920 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992634" comment="bcel-5.1-276.26.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218400" version="1" class="patch">
	<metadata>
		<title>Security update for bind</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="743758" ref_url="https://bugzilla.suse.com/743758" source="BUGZILLA"/>
		<reference ref_id="815230" ref_url="https://bugzilla.suse.com/815230" source="BUGZILLA"/>
		<reference ref_id="819475" ref_url="https://bugzilla.suse.com/819475" source="BUGZILLA"/>
		<reference ref_id="831899" ref_url="https://bugzilla.suse.com/831899" source="BUGZILLA"/>
		<reference ref_id="858639" ref_url="https://bugzilla.suse.com/858639" source="BUGZILLA"/>
		<reference ref_id="882511" ref_url="https://bugzilla.suse.com/882511" source="BUGZILLA"/>
		<reference ref_id="908994" ref_url="https://bugzilla.suse.com/908994" source="BUGZILLA"/>
		<reference ref_id="918330" ref_url="https://bugzilla.suse.com/918330" source="BUGZILLA"/>
		<reference ref_id="936476" ref_url="https://bugzilla.suse.com/936476" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4854" ref_url="https://www.suse.com/security/cve/CVE-2013-4854/" source="CVE"/>
		<reference ref_id="CVE-2014-0591" ref_url="https://www.suse.com/security/cve/CVE-2014-0591/" source="CVE"/>
		<reference ref_id="CVE-2014-8500" ref_url="https://www.suse.com/security/cve/CVE-2014-8500/" source="CVE"/>
		<reference ref_id="CVE-2015-1349" ref_url="https://www.suse.com/security/cve/CVE-2015-1349/" source="CVE"/>
		<reference ref_id="CVE-2015-4620" ref_url="https://www.suse.com/security/cve/CVE-2015-4620/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001485.html" source="SUSE-SU"/>
		<description>

This update fixes a DoS vulnerability in bind when handling malformed 
NSEC3-signed zones. CVE-2014-0591 has been assigned to this issue.

Security Issue references:

    * CVE-2014-0591
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-27"/>
	<updated date="2014-01-27"/>
	<bugzilla href="https://bugzilla.suse.com/743758">SUSE bug 743758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815230">SUSE bug 815230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819475">SUSE bug 819475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831899">SUSE bug 831899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858639">SUSE bug 858639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882511">SUSE bug 882511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908994">SUSE bug 908994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918330">SUSE bug 918330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936476">SUSE bug 936476</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4854/">CVE-2013-4854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4854">CVE-2013-4854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0591/">CVE-2014-0591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0591">CVE-2014-0591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8500/">CVE-2014-8500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8500">CVE-2014-8500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1349/">CVE-2015-1349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1349">CVE-2015-1349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4620/">CVE-2015-4620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4620">CVE-2015-4620 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575913" comment="bind-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575914" comment="bind-chrootenv-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575916" comment="bind-doc-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575917" comment="bind-libs-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575918" comment="bind-libs-32bit-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575919" comment="bind-libs-x86-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575920" comment="bind-utils-9.9.4P2-0.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575913" comment="bind-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575914" comment="bind-chrootenv-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575916" comment="bind-doc-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575917" comment="bind-libs-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575918" comment="bind-libs-32bit-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575919" comment="bind-libs-x86-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575920" comment="bind-utils-9.9.4P2-0.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575913" comment="bind-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575914" comment="bind-chrootenv-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575916" comment="bind-doc-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575917" comment="bind-libs-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575918" comment="bind-libs-32bit-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575919" comment="bind-libs-x86-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575920" comment="bind-utils-9.9.4P2-0.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218401" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="939567" ref_url="https://bugzilla.suse.com/939567" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001512.html" source="SUSE-SU"/>
		<description>
bind was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-5477: Remote DoS via TKEY queries (bsc#939567)

Exposure to this issue can not be prevented by either ACLs or configuration options limiting or denying service because the exploitable code occurs early in the packet handling.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-28"/>
	<updated date="2015-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/939567">SUSE bug 939567</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5477">CVE-2015-5477 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577403" comment="bind-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577404" comment="bind-chrootenv-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577405" comment="bind-doc-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577406" comment="bind-libs-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577407" comment="bind-libs-32bit-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577408" comment="bind-libs-x86-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577409" comment="bind-utils-9.9.6P1-0.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577403" comment="bind-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577404" comment="bind-chrootenv-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577405" comment="bind-doc-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577406" comment="bind-libs-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577407" comment="bind-libs-32bit-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577408" comment="bind-libs-x86-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577409" comment="bind-utils-9.9.6P1-0.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577403" comment="bind-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577404" comment="bind-chrootenv-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577405" comment="bind-doc-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577406" comment="bind-libs-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577407" comment="bind-libs-32bit-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577408" comment="bind-libs-x86-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577409" comment="bind-utils-9.9.6P1-0.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218402" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="944066" ref_url="https://bugzilla.suse.com/944066" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001566.html" source="SUSE-SU"/>
		<description>

The nameserver bind was updated to fix a remote denial of service (crash) attack against 
bind nameservers doing validation on DNSSEC signed records. (CVE-2015-5722, bsc#944066).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-02"/>
	<updated date="2015-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/944066">SUSE bug 944066</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5722">CVE-2015-5722 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577410" comment="bind-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577411" comment="bind-chrootenv-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577412" comment="bind-doc-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577413" comment="bind-libs-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577414" comment="bind-libs-32bit-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577415" comment="bind-libs-x86-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577416" comment="bind-utils-9.9.6P1-0.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577410" comment="bind-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577411" comment="bind-chrootenv-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577412" comment="bind-doc-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577413" comment="bind-libs-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577414" comment="bind-libs-32bit-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577415" comment="bind-libs-x86-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577416" comment="bind-utils-9.9.6P1-0.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577410" comment="bind-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577411" comment="bind-chrootenv-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577412" comment="bind-doc-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577413" comment="bind-libs-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577414" comment="bind-libs-32bit-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577415" comment="bind-libs-x86-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577416" comment="bind-utils-9.9.6P1-0.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218403" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="923281" ref_url="https://bugzilla.suse.com/923281" source="BUGZILLA"/>
		<reference ref_id="958861" ref_url="https://bugzilla.suse.com/958861" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001756.html" source="SUSE-SU"/>
		<description>

 
This update fixes the following security issue:
- CVE-2015-8000: Fix remote denial of service by misparsing incoming responses (bsc#958861).

It also fixes a bug:
- Fix a regression in caching entries with a TTL of 0 (bsc#923281).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-22"/>
	<updated date="2015-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/923281">SUSE bug 923281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958861">SUSE bug 958861</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8000">CVE-2015-8000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577417" comment="bind-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577418" comment="bind-chrootenv-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577419" comment="bind-doc-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577420" comment="bind-libs-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577421" comment="bind-libs-32bit-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577422" comment="bind-libs-x86-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577423" comment="bind-utils-9.9.6P1-0.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577417" comment="bind-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577418" comment="bind-chrootenv-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577419" comment="bind-doc-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577420" comment="bind-libs-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577421" comment="bind-libs-32bit-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577422" comment="bind-libs-x86-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577423" comment="bind-utils-9.9.6P1-0.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577417" comment="bind-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577418" comment="bind-chrootenv-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577419" comment="bind-doc-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577420" comment="bind-libs-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577421" comment="bind-libs-32bit-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577422" comment="bind-libs-x86-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577423" comment="bind-utils-9.9.6P1-0.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218404" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="962189" ref_url="https://bugzilla.suse.com/962189" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001820.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- CVE-2015-8704: Specific APL data allowed remote attacker to trigger a crash in certain configurations (bsc#962189)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-22"/>
	<updated date="2016-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/962189">SUSE bug 962189</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8704">CVE-2015-8704 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577424" comment="bind-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577425" comment="bind-chrootenv-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577426" comment="bind-doc-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577427" comment="bind-libs-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577428" comment="bind-libs-32bit-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577429" comment="bind-libs-x86-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577430" comment="bind-utils-9.9.6P1-0.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577424" comment="bind-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577425" comment="bind-chrootenv-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577426" comment="bind-doc-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577427" comment="bind-libs-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577428" comment="bind-libs-32bit-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577429" comment="bind-libs-x86-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577430" comment="bind-utils-9.9.6P1-0.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577424" comment="bind-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577425" comment="bind-chrootenv-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577426" comment="bind-doc-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577427" comment="bind-libs-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577428" comment="bind-libs-32bit-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577429" comment="bind-libs-x86-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577430" comment="bind-utils-9.9.6P1-0.22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218405" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="970072" ref_url="https://bugzilla.suse.com/970072" source="BUGZILLA"/>
		<reference ref_id="970073" ref_url="https://bugzilla.suse.com/970073" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1285" ref_url="https://www.suse.com/security/cve/CVE-2016-1285/" source="CVE"/>
		<reference ref_id="CVE-2016-1286" ref_url="https://www.suse.com/security/cve/CVE-2016-1286/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001958.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

Fix two assertion failures that can lead to a remote denial of service attack:
* CVE-2016-1285: An error when parsing signature records for DNAME can lead to named exiting due to an assertion failure. (bsc#970072)
* CVE-2016-1286: An error when parsing signature records for DNAME records having specific properties can lead to named exiting due to an assertion failure in resolver.c or db.c. (bsc#970073)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-18"/>
	<updated date="2016-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/970072">SUSE bug 970072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970073">SUSE bug 970073</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1285/">CVE-2016-1285 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1285">CVE-2016-1285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1286/">CVE-2016-1286 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1286">CVE-2016-1286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575949" comment="bind-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575950" comment="bind-chrootenv-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575952" comment="bind-doc-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575953" comment="bind-libs-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575954" comment="bind-libs-32bit-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575955" comment="bind-utils-9.9.6P1-0.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575949" comment="bind-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575950" comment="bind-chrootenv-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575952" comment="bind-doc-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575953" comment="bind-libs-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575954" comment="bind-libs-32bit-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575955" comment="bind-utils-9.9.6P1-0.25.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218406" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1000362" ref_url="https://bugzilla.suse.com/1000362" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2776" ref_url="https://www.suse.com/security/cve/CVE-2016-2776/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002297.html" source="SUSE-SU"/>
		<description>

The nameserver bind was updated to fix a remote denial of service
vulnerability, where a crafted packet could cause the nameserver to abort. (CVE-2016-2776, bsc#1000362)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-27"/>
	<updated date="2016-09-27"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1000362">SUSE bug 1000362</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2776/">CVE-2016-2776 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2776">CVE-2016-2776 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575956" comment="bind-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575957" comment="bind-chrootenv-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575959" comment="bind-doc-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575960" comment="bind-libs-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575961" comment="bind-libs-32bit-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575962" comment="bind-utils-9.9.6P1-0.30.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575956" comment="bind-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575957" comment="bind-chrootenv-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575959" comment="bind-doc-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575960" comment="bind-libs-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575961" comment="bind-libs-32bit-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575962" comment="bind-utils-9.9.6P1-0.30.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218407" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1007829" ref_url="https://bugzilla.suse.com/1007829" source="BUGZILLA"/>
		<reference ref_id="965748" ref_url="https://bugzilla.suse.com/965748" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8864" ref_url="https://www.suse.com/security/cve/CVE-2016-8864/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002389.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- A defect in BIND's handling of responses containing a DNAME answer had
the potential to trigger assertion errors in the server remotely,
thereby facilitating a denial-of-service attack. (CVE-2016-8864, bsc#1007829).

- Fix BIND to return a valid hostname in response to ldapdump queries.
(bsc#965748)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-02"/>
	<updated date="2016-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1007829">SUSE bug 1007829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965748">SUSE bug 965748</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8864/">CVE-2016-8864 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8864">CVE-2016-8864 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575963" comment="bind-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575964" comment="bind-chrootenv-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575966" comment="bind-doc-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575967" comment="bind-libs-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575968" comment="bind-libs-32bit-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575969" comment="bind-utils-9.9.6P1-0.33.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575963" comment="bind-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575964" comment="bind-chrootenv-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575966" comment="bind-doc-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575967" comment="bind-libs-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575968" comment="bind-libs-32bit-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575969" comment="bind-utils-9.9.6P1-0.33.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218408" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1018699" ref_url="https://bugzilla.suse.com/1018699" source="BUGZILLA"/>
		<reference ref_id="1018700" ref_url="https://bugzilla.suse.com/1018700" source="BUGZILLA"/>
		<reference ref_id="1018701" ref_url="https://bugzilla.suse.com/1018701" source="BUGZILLA"/>
		<reference ref_id="1018702" ref_url="https://bugzilla.suse.com/1018702" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9131" ref_url="https://www.suse.com/security/cve/CVE-2016-9131/" source="CVE"/>
		<reference ref_id="CVE-2016-9147" ref_url="https://www.suse.com/security/cve/CVE-2016-9147/" source="CVE"/>
		<reference ref_id="CVE-2016-9444" ref_url="https://www.suse.com/security/cve/CVE-2016-9444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002555.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- Fix a potential assertion failure that could have been triggered by a
  malformed response to an ANY query, thereby facilitating a denial-of-service
  attack. [CVE-2016-9131, bsc#1018700, bsc#1018699]

- Fix a potential assertion failure that could have been triggered by
  responding to a query with inconsistent DNSSEC information, thereby
  facilitating a denial-of-service attack. [CVE-2016-9147, bsc#1018701,
  bsc#1018699]

- Fix potential assertion failure that could have been triggered by DNS
  responses that contain unusually-formed DS resource records, facilitating a
  denial-of-service attack. [CVE-2016-9444, bsc#1018702, bsc#1018699]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1018699">SUSE bug 1018699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9131/">CVE-2016-9131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9131">CVE-2016-9131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9147/">CVE-2016-9147 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9147">CVE-2016-9147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9444/">CVE-2016-9444 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9444">CVE-2016-9444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575970" comment="bind-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575971" comment="bind-chrootenv-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575973" comment="bind-doc-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575974" comment="bind-libs-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575975" comment="bind-libs-32bit-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575976" comment="bind-utils-9.9.6P1-0.36.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575970" comment="bind-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575971" comment="bind-chrootenv-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575973" comment="bind-doc-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575974" comment="bind-libs-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575975" comment="bind-libs-32bit-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575976" comment="bind-utils-9.9.6P1-0.36.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218409" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1024130" ref_url="https://bugzilla.suse.com/1024130" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3135" ref_url="https://www.suse.com/security/cve/CVE-2017-3135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002673.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- Fixed a possible denial of service vulnerability (affected only
  configurations using both DNS64 and RPZ, CVE-2017-3135, bsc#1024130)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-02"/>
	<updated date="2017-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3135/">CVE-2017-3135 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3135">CVE-2017-3135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577431" comment="bind-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577432" comment="bind-chrootenv-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577433" comment="bind-doc-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577434" comment="bind-libs-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577435" comment="bind-libs-32bit-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577436" comment="bind-utils-9.9.6P1-0.39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577431" comment="bind-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577432" comment="bind-chrootenv-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577433" comment="bind-doc-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577434" comment="bind-libs-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577435" comment="bind-libs-32bit-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577436" comment="bind-utils-9.9.6P1-0.39.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218410" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1033466" ref_url="https://bugzilla.suse.com/1033466" source="BUGZILLA"/>
		<reference ref_id="1033467" ref_url="https://bugzilla.suse.com/1033467" source="BUGZILLA"/>
		<reference ref_id="1033468" ref_url="https://bugzilla.suse.com/1033468" source="BUGZILLA"/>
		<reference ref_id="987866" ref_url="https://bugzilla.suse.com/987866" source="BUGZILLA"/>
		<reference ref_id="989528" ref_url="https://bugzilla.suse.com/989528" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2775" ref_url="https://www.suse.com/security/cve/CVE-2016-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-6170" ref_url="https://www.suse.com/security/cve/CVE-2016-6170/" source="CVE"/>
		<reference ref_id="CVE-2017-3136" ref_url="https://www.suse.com/security/cve/CVE-2017-3136/" source="CVE"/>
		<reference ref_id="CVE-2017-3137" ref_url="https://www.suse.com/security/cve/CVE-2017-3137/" source="CVE"/>
		<reference ref_id="CVE-2017-3138" ref_url="https://www.suse.com/security/cve/CVE-2017-3138/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002797.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following security issues:

CVE-2017-3137 (bsc#1033467):
Mistaken assumptions about the ordering of records in the answer
section of a response containing CNAME or DNAME resource records
could have been exploited to cause a denial of service of a bind
server performing recursion.

CVE-2017-3136 (bsc#1033466):
An attacker could have constructed a query that would cause a denial
of service of servers configured to use DNS64.

CVE-2017-3138 (bsc#1033468):
An attacker with access to the BIND control channel could have caused
the server to stop by triggering an assertion failure.

CVE-2016-6170 (bsc#987866):
Primary DNS servers could have caused a denial of service of secondary DNS servers via a large AXFR response.
IXFR servers could have caused a denial of service of IXFR clients via a large IXFR response.
Remote authenticated users could have caused a denial of service of primary DNS servers via a large UPDATE message.

CVE-2016-2775 (bsc#989528):
When lwresd or the named lwres option were enabled, bind allowed remote attackers to cause a denial of service
(daemon crash) via a long request that uses the lightweight resolver protocol.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-13"/>
	<updated date="2017-04-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033467">SUSE bug 1033467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033468">SUSE bug 1033468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987866">SUSE bug 987866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989528">SUSE bug 989528</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2775/">CVE-2016-2775 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2775">CVE-2016-2775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6170/">CVE-2016-6170 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6170">CVE-2016-6170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3136/">CVE-2017-3136 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3136">CVE-2017-3136 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3137/">CVE-2017-3137 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3137">CVE-2017-3137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3138/">CVE-2017-3138 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3138">CVE-2017-3138 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577437" comment="bind-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577438" comment="bind-chrootenv-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577439" comment="bind-devel-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577440" comment="bind-doc-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577441" comment="bind-libs-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577442" comment="bind-libs-32bit-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577443" comment="bind-utils-9.9.6P1-0.44.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577437" comment="bind-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577438" comment="bind-chrootenv-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577439" comment="bind-devel-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577440" comment="bind-doc-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577441" comment="bind-libs-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577442" comment="bind-libs-32bit-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577443" comment="bind-utils-9.9.6P1-0.44.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218411" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1034162" ref_url="https://bugzilla.suse.com/1034162" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3137" ref_url="https://www.suse.com/security/cve/CVE-2017-3137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002803.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- A regression in the fix for CVE-2017-3137 caused an assert in name.c (bsc#1034162)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1034162">SUSE bug 1034162</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3137/">CVE-2017-3137 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3137">CVE-2017-3137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577444" comment="bind-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577445" comment="bind-chrootenv-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577446" comment="bind-devel-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577447" comment="bind-doc-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577448" comment="bind-libs-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577449" comment="bind-libs-32bit-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577450" comment="bind-utils-9.9.6P1-0.47.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577444" comment="bind-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577445" comment="bind-chrootenv-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577446" comment="bind-devel-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577447" comment="bind-doc-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577448" comment="bind-libs-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577449" comment="bind-libs-32bit-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577450" comment="bind-utils-9.9.6P1-0.47.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218412" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1046554" ref_url="https://bugzilla.suse.com/1046554" source="BUGZILLA"/>
		<reference ref_id="1046555" ref_url="https://bugzilla.suse.com/1046555" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3142" ref_url="https://www.suse.com/security/cve/CVE-2017-3142/" source="CVE"/>
		<reference ref_id="CVE-2017-3143" ref_url="https://www.suse.com/security/cve/CVE-2017-3143/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002998.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- An attacker with the ability to send and receive messages to an authoritative
  DNS server was able to circumvent TSIG authentication of AXFR requests. A
  server that relied solely on TSIG keys for protection could be manipulated
  into (1) providing an AXFR of a zone to an unauthorized recipient and (2)
  accepting bogus Notify packets. [bsc#1046554, CVE-2017-3142]

- An attacker who with the ability to send and receive messages to an
  authoritative DNS server and who had knowledge of a valid TSIG key name for
  the zone and service being targeted was able to manipulate BIND into
  accepting an unauthorized dynamic update. [bsc#1046555, CVE-2017-3143]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-29"/>
	<updated date="2017-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046554">SUSE bug 1046554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046555">SUSE bug 1046555</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3142/">CVE-2017-3142 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3142">CVE-2017-3142 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3143/">CVE-2017-3143 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3143">CVE-2017-3143 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577451" comment="bind-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577452" comment="bind-chrootenv-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577453" comment="bind-devel-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577454" comment="bind-doc-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577455" comment="bind-libs-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577456" comment="bind-libs-32bit-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577457" comment="bind-utils-9.9.6P1-0.50.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577451" comment="bind-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577452" comment="bind-chrootenv-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577453" comment="bind-devel-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577454" comment="bind-doc-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577455" comment="bind-libs-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577456" comment="bind-libs-32bit-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577457" comment="bind-utils-9.9.6P1-0.50.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218413" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1040039" ref_url="https://bugzilla.suse.com/1040039" source="BUGZILLA"/>
		<reference ref_id="1047184" ref_url="https://bugzilla.suse.com/1047184" source="BUGZILLA"/>
		<reference ref_id="1076118" ref_url="https://bugzilla.suse.com/1076118" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3145" ref_url="https://www.suse.com/security/cve/CVE-2017-3145/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003707.html" source="SUSE-SU"/>
		<description>
This update for bind fixes several issues.

This security issue was fixed:

- CVE-2017-3145: Improper sequencing during cleanup could have lead to a
  use-after-free error that triggered an assertion failure and crash in named
  (bsc#1076118).

These non-security issues were fixed:

- Updated named.root file (bsc#1040039)
- Update bind.keys for DNSSEC root KSK rollover (bsc#1047184)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-05"/>
	<updated date="2018-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040039">SUSE bug 1040039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047184">SUSE bug 1047184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076118">SUSE bug 1076118</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3145/">CVE-2017-3145 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3145">CVE-2017-3145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577458" comment="bind-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577459" comment="bind-chrootenv-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577460" comment="bind-devel-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577461" comment="bind-doc-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577462" comment="bind-libs-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577463" comment="bind-libs-32bit-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577464" comment="bind-utils-9.9.6P1-0.51.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577458" comment="bind-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577459" comment="bind-chrootenv-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577460" comment="bind-devel-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577461" comment="bind-doc-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577462" comment="bind-libs-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577463" comment="bind-libs-32bit-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577464" comment="bind-utils-9.9.6P1-0.51.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218414" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1104129" ref_url="https://bugzilla.suse.com/1104129" source="BUGZILLA"/>
		<reference ref_id="1126068" ref_url="https://bugzilla.suse.com/1126068" source="BUGZILLA"/>
		<reference ref_id="1126069" ref_url="https://bugzilla.suse.com/1126069" source="BUGZILLA"/>
		<reference ref_id="1133185" ref_url="https://bugzilla.suse.com/1133185" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5740" ref_url="https://www.suse.com/security/cve/CVE-2018-5740/" source="CVE"/>
		<reference ref_id="CVE-2018-5743" ref_url="https://www.suse.com/security/cve/CVE-2018-5743/" source="CVE"/>
		<reference ref_id="CVE-2018-5745" ref_url="https://www.suse.com/security/cve/CVE-2018-5745/" source="CVE"/>
		<reference ref_id="CVE-2019-6465" ref_url="https://www.suse.com/security/cve/CVE-2019-6465/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

Security issues fixed:

- CVE-2018-5740: Fixed a denial of service vulnerability in the 'deny-answer-aliases' feature (bsc#1104129).
- CVE-2018-5743: Limiting simultaneous TCP clients is ineffective. (bsc#1133185)
- CVE-2018-5745: An assertion failure can occur if a trust anchor rolls over to an unsupported key algorithm when using managed-keys. (bsc#1126068)
- CVE-2019-6465: Fixed an issue where controls for zone transfers may not be properly applied to Dynamically Loadable Zones (bsc#1126069).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-06"/>
	<updated date="2019-06-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104129">SUSE bug 1104129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126068">SUSE bug 1126068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126069">SUSE bug 1126069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133185">SUSE bug 1133185</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5740/">CVE-2018-5740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5740">CVE-2018-5740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5743/">CVE-2018-5743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5743">CVE-2018-5743 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5745/">CVE-2018-5745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-5745">CVE-2018-5745 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6465/">CVE-2019-6465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6465">CVE-2019-6465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577465" comment="bind-9.9.6P1-0.51.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577466" comment="bind-chrootenv-9.9.6P1-0.51.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577467" comment="bind-doc-9.9.6P1-0.51.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577468" comment="bind-libs-9.9.6P1-0.51.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577469" comment="bind-libs-32bit-9.9.6P1-0.51.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577470" comment="bind-utils-9.9.6P1-0.51.15.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218415" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1033843" ref_url="https://bugzilla.suse.com/1033843" source="BUGZILLA"/>
		<reference ref_id="1092283" ref_url="https://bugzilla.suse.com/1092283" source="BUGZILLA"/>
		<reference ref_id="1109160" ref_url="https://bugzilla.suse.com/1109160" source="BUGZILLA"/>
		<reference ref_id="1171740" ref_url="https://bugzilla.suse.com/1171740" source="BUGZILLA"/>
		<reference ref_id="1172220" ref_url="https://bugzilla.suse.com/1172220" source="BUGZILLA"/>
		<reference ref_id="1172680" ref_url="https://bugzilla.suse.com/1172680" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5741" ref_url="https://www.suse.com/security/cve/CVE-2018-5741/" source="CVE"/>
		<reference ref_id="CVE-2020-8616" ref_url="https://www.suse.com/security/cve/CVE-2020-8616/" source="CVE"/>
		<reference ref_id="CVE-2020-8617" ref_url="https://www.suse.com/security/cve/CVE-2020-8617/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8616: Fixed the insufficient limit on the number of fetches performed when processing referrals (bsc#1171740).
- CVE-2020-8617: Fixed a logic error in code which checks TSIG validity (bsc#1171740).
- CVE-2018-5741: Fixed the documentation (bsc#1109160).
- Removed rndc.key generation from bind.spec file (bsc#1092283, bsc#1033843)
  bind should create the key on first boot or if it went missing.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1033843">SUSE bug 1033843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092283">SUSE bug 1092283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172220">SUSE bug 1172220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172680">SUSE bug 1172680</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5741/">CVE-2018-5741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5741">CVE-2018-5741 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8616/">CVE-2020-8616 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8616">CVE-2020-8616 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8617/">CVE-2020-8617 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8617">CVE-2020-8617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577471" comment="bind-9.9.6P1-0.51.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577472" comment="bind-chrootenv-9.9.6P1-0.51.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577473" comment="bind-doc-9.9.6P1-0.51.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577474" comment="bind-libs-9.9.6P1-0.51.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577475" comment="bind-libs-32bit-9.9.6P1-0.51.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577476" comment="bind-utils-9.9.6P1-0.51.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218416" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182246" ref_url="https://bugzilla.suse.com/1182246" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8625" ref_url="https://www.suse.com/security/cve/CVE-2020-8625/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8625: A vulnerability in BIND's GSSAPI security policy
  negotiation can be targeted by a buffer overflow attack [bsc#1182246, CVE-2020-8625]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182246">SUSE bug 1182246</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8625/">CVE-2020-8625 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8625">CVE-2020-8625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577477" comment="bind-9.9.6P1-0.51.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577478" comment="bind-chrootenv-9.9.6P1-0.51.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577479" comment="bind-doc-9.9.6P1-0.51.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577480" comment="bind-libs-9.9.6P1-0.51.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577481" comment="bind-libs-32bit-9.9.6P1-0.51.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577482" comment="bind-utils-9.9.6P1-0.51.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218417" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185345" ref_url="https://bugzilla.suse.com/1185345" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25214" ref_url="https://www.suse.com/security/cve/CVE-2021-25214/" source="CVE"/>
		<reference ref_id="CVE-2021-25215" ref_url="https://www.suse.com/security/cve/CVE-2021-25215/" source="CVE"/>
		<reference ref_id="CVE-2021-25216" ref_url="https://www.suse.com/security/cve/CVE-2021-25216/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25214: Fixed a broken inbound incremental zone update (IXFR) which could have caused named to terminate unexpectedly (bsc#1185345).
- CVE-2021-25215: Fixed an assertion check which could have failed while answering queries for DNAME records that required the DNAME to be processed to resolve itself (bsc#1185345).
- CVE-2021-25216: Fixed an issue where policy negotiation can be targeted by a buffer overflow attack (bsc#1185345).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185345">SUSE bug 1185345</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25214/">CVE-2021-25214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25214">CVE-2021-25214 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25215/">CVE-2021-25215 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25215">CVE-2021-25215 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25216/">CVE-2021-25216 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25216">CVE-2021-25216 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577483" comment="bind-9.9.6P1-0.51.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577484" comment="bind-chrootenv-9.9.6P1-0.51.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577485" comment="bind-doc-9.9.6P1-0.51.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577486" comment="bind-libs-9.9.6P1-0.51.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577487" comment="bind-libs-32bit-9.9.6P1-0.51.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577488" comment="bind-utils-9.9.6P1-0.51.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218418" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192146" ref_url="https://bugzilla.suse.com/1192146" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25219" ref_url="https://www.suse.com/security/cve/CVE-2021-25219/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25219: Fixed lame cache that could have been abused to severely degrade resolver performance (bsc#1192146).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-09"/>
	<updated date="2021-11-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192146">SUSE bug 1192146</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-25219/">CVE-2021-25219 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25219">CVE-2021-25219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654155" comment="bind-9.9.6P1-0.51.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654156" comment="bind-chrootenv-9.9.6P1-0.51.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654157" comment="bind-doc-9.9.6P1-0.51.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654158" comment="bind-libs-9.9.6P1-0.51.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654159" comment="bind-libs-32bit-9.9.6P1-0.51.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654160" comment="bind-utils-9.9.6P1-0.51.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218419" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1197135" ref_url="https://bugzilla.suse.com/1197135" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25220" ref_url="https://www.suse.com/security/cve/CVE-2021-25220/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25220: Fixed potentially incorrect answers by cached forwarders (bsc#1197135).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-24"/>
	<updated date="2022-05-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1197135">SUSE bug 1197135</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25220/">CVE-2021-25220 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25220">CVE-2021-25220 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009683753" comment="bind-9.9.6P1-0.51.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683754" comment="bind-chrootenv-9.9.6P1-0.51.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683755" comment="bind-doc-9.9.6P1-0.51.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683756" comment="bind-libs-9.9.6P1-0.51.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683757" comment="bind-libs-32bit-9.9.6P1-0.51.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683758" comment="bind-utils-9.9.6P1-0.51.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218420" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1203614" ref_url="https://bugzilla.suse.com/1203614" source="BUGZILLA"/>
		<reference ref_id="1203619" ref_url="https://bugzilla.suse.com/1203619" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2795" ref_url="https://www.suse.com/security/cve/CVE-2022-2795/" source="CVE"/>
		<reference ref_id="CVE-2022-38177" ref_url="https://www.suse.com/security/cve/CVE-2022-38177/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

  - CVE-2022-2795: Fixed potential performance degredation due to missing database lookup limits when processing large delegations (bsc#1203614).
  - CVE-2022-38177: Fixed a memory leak that could be externally triggered in the DNSSEC verification code for the ECDSA algorithm (bsc#1203619).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-04"/>
	<updated date="2022-10-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203614">SUSE bug 1203614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203619">SUSE bug 1203619</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2795/">CVE-2022-2795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2795">CVE-2022-2795 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38177/">CVE-2022-38177 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38177">CVE-2022-38177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992635" comment="bind-9.9.6P1-0.51.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992636" comment="bind-chrootenv-9.9.6P1-0.51.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992637" comment="bind-doc-9.9.6P1-0.51.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992638" comment="bind-libs-9.9.6P1-0.51.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992639" comment="bind-libs-32bit-9.9.6P1-0.51.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992640" comment="bind-utils-9.9.6P1-0.51.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218421" version="1" class="patch">
	<metadata>
		<title>Security update for binutils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="902676" ref_url="https://bugzilla.suse.com/902676" source="BUGZILLA"/>
		<reference ref_id="902677" ref_url="https://bugzilla.suse.com/902677" source="BUGZILLA"/>
		<reference ref_id="903655" ref_url="https://bugzilla.suse.com/903655" source="BUGZILLA"/>
		<reference ref_id="905735" ref_url="https://bugzilla.suse.com/905735" source="BUGZILLA"/>
		<reference ref_id="905736" ref_url="https://bugzilla.suse.com/905736" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8484" ref_url="https://www.suse.com/security/cve/CVE-2014-8484/" source="CVE"/>
		<reference ref_id="CVE-2014-8485" ref_url="https://www.suse.com/security/cve/CVE-2014-8485/" source="CVE"/>
		<reference ref_id="CVE-2014-8501" ref_url="https://www.suse.com/security/cve/CVE-2014-8501/" source="CVE"/>
		<reference ref_id="CVE-2014-8502" ref_url="https://www.suse.com/security/cve/CVE-2014-8502/" source="CVE"/>
		<reference ref_id="CVE-2014-8503" ref_url="https://www.suse.com/security/cve/CVE-2014-8503/" source="CVE"/>
		<reference ref_id="CVE-2014-8504" ref_url="https://www.suse.com/security/cve/CVE-2014-8504/" source="CVE"/>
		<reference ref_id="CVE-2014-8737" ref_url="https://www.suse.com/security/cve/CVE-2014-8737/" source="CVE"/>
		<reference ref_id="CVE-2014-8738" ref_url="https://www.suse.com/security/cve/CVE-2014-8738/" source="CVE"/>
		<description>

binutils has been updated to fix eight security issues:

    * Lack of range checking leading to controlled write in
      _bfd_elf_setup_sections() (CVE-2014-8485).
    * Invalid read flaw in libbfd (CVE-2014-8484).
    * Write to uninitialized memory in the PE parser (CVE-2014-8501).
    * Crash in the PE parser (CVE-2014-8502).
    * Segfault in the ihex parser when it encounters a malformed ihex file
      (CVE-2014-8503).
    * Stack buffer overflow in srec_scan (CVE-2014-8504).
    * Out-of-bounds memory write while processing a crafted 'ar' archive
      (CVE-2014-8738).
    * Directory traversal vulnerability allowing random file
      deletion/creation (CVE-2014-8737).

Security Issues:

    * CVE-2014-8501
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8501&gt;
    * CVE-2014-8502
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8502&gt;
    * CVE-2014-8503
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8503&gt;
    * CVE-2014-8504
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8504&gt;
    * CVE-2014-8485
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8485&gt;
    * CVE-2014-8738
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8738&gt;
    * CVE-2014-8484
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8484&gt;
    * CVE-2014-8737
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8737&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-22"/>
	<updated date="2015-01-22"/>
	<bugzilla href="https://bugzilla.suse.com/902676">SUSE bug 902676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902677">SUSE bug 902677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903655">SUSE bug 903655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905735">SUSE bug 905735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905736">SUSE bug 905736</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8484/">CVE-2014-8484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8484">CVE-2014-8484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8485/">CVE-2014-8485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8485">CVE-2014-8485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8501/">CVE-2014-8501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8501">CVE-2014-8501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8502/">CVE-2014-8502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8502">CVE-2014-8502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8503/">CVE-2014-8503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8503">CVE-2014-8503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8504/">CVE-2014-8504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8504">CVE-2014-8504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8737/">CVE-2014-8737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8737">CVE-2014-8737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8738/">CVE-2014-8738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8738">CVE-2014-8738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577489" comment="binutils-2.23.1-0.23.15 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577489" comment="binutils-2.23.1-0.23.15 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577489" comment="binutils-2.23.1-0.23.15 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218422" version="1" class="patch">
	<metadata>
		<title>Recommended update for binutils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="921737" ref_url="https://bugzilla.suse.com/921737" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8484" ref_url="https://www.suse.com/security/cve/CVE-2014-8484/" source="CVE"/>
		<reference ref_id="CVE-2014-8485" ref_url="https://www.suse.com/security/cve/CVE-2014-8485/" source="CVE"/>
		<reference ref_id="CVE-2014-8501" ref_url="https://www.suse.com/security/cve/CVE-2014-8501/" source="CVE"/>
		<reference ref_id="CVE-2014-8502" ref_url="https://www.suse.com/security/cve/CVE-2014-8502/" source="CVE"/>
		<reference ref_id="CVE-2014-8503" ref_url="https://www.suse.com/security/cve/CVE-2014-8503/" source="CVE"/>
		<reference ref_id="CVE-2014-8504" ref_url="https://www.suse.com/security/cve/CVE-2014-8504/" source="CVE"/>
		<reference ref_id="CVE-2014-8737" ref_url="https://www.suse.com/security/cve/CVE-2014-8737/" source="CVE"/>
		<reference ref_id="CVE-2014-8738" ref_url="https://www.suse.com/security/cve/CVE-2014-8738/" source="CVE"/>
		<description>

binutils has been updated to version 2.24, from SLE 11-SP4:

    * Update to SLE 11-SP4 version of binutils (2.24 based). (bsc#921737)
    * Fix for several CVEs found when feeding fuzzed binary files into
      various binutils programs like strings, objdump or readelf. [bnc
      #902676, #902677, #903655, #905735, #905736] [CVE-2014-8485,
      CVE-2014-8484, CVE-2014-8501, CVE-2014-8502, CVE-2014-8503,
      CVE-2014-8504, CVE-2014-8738, CVE-2014-8737] [PR17510, PR17512,
      PR17521, PR17531, PR17533, PR17552, PR17597, PR17605]

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-18"/>
	<updated date="2015-03-18"/>
	<bugzilla href="https://bugzilla.suse.com/921737">SUSE bug 921737</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8484/">CVE-2014-8484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8484">CVE-2014-8484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8485/">CVE-2014-8485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8485">CVE-2014-8485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8501/">CVE-2014-8501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8501">CVE-2014-8501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8502/">CVE-2014-8502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8502">CVE-2014-8502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8503/">CVE-2014-8503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8503">CVE-2014-8503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8504/">CVE-2014-8504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8504">CVE-2014-8504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8737/">CVE-2014-8737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8737">CVE-2014-8737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8738/">CVE-2014-8738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8738">CVE-2014-8738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593493" comment="binutils-2.24-0.3.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218423" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1057342" ref_url="https://bugzilla.suse.com/1057342" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000250" ref_url="https://www.suse.com/security/cve/CVE-2017-1000250/" source="CVE"/>
		<description>
This update for bluez fixes the following issues:

Security issue fixed:

- CVE-2017-1000250: Fixed Out-of-bounds heap read in service_search_attr_req check if there is enough data to continue otherwise return an error (bsc#1057342).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1057342">SUSE bug 1057342</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000250/">CVE-2017-1000250 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000250">CVE-2017-1000250 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577490" comment="bluez-4.99-0.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577491" comment="libbluetooth3-4.99-0.9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218424" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1193227" ref_url="https://bugzilla.suse.com/1193227" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8922" ref_url="https://www.suse.com/security/cve/CVE-2019-8922/" source="CVE"/>
		<description>
This update for bluez fixes the following issues:

- CVE-2019-8922: Fixed a buffer overflow in the implementation of the
  Service Discovery Protocol (bsc#1193227).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-22"/>
	<updated date="2022-08-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193227">SUSE bug 1193227</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8922/">CVE-2019-8922 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8922">CVE-2019-8922 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992641" comment="bluez-4.99-0.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992642" comment="libbluetooth3-4.99-0.9.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218425" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1193237" ref_url="https://bugzilla.suse.com/1193237" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8921" ref_url="https://www.suse.com/security/cve/CVE-2019-8921/" source="CVE"/>
		<description>
This update for bluez fixes the following issues:

  - CVE-2019-8921: Fixed heap-based buffer overflow via crafted request (bsc#1193237).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-21"/>
	<updated date="2022-10-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193237">SUSE bug 1193237</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8921/">CVE-2019-8921 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8921">CVE-2019-8921 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992643" comment="bluez-4.99-0.9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992644" comment="libbluetooth3-4.99-0.9.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218426" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1203120" ref_url="https://bugzilla.suse.com/1203120" source="BUGZILLA"/>
		<reference ref_id="1203121" ref_url="https://bugzilla.suse.com/1203121" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-39176" ref_url="https://www.suse.com/security/cve/CVE-2022-39176/" source="CVE"/>
		<reference ref_id="CVE-2022-39177" ref_url="https://www.suse.com/security/cve/CVE-2022-39177/" source="CVE"/>
		<description>
This update for bluez fixes the following issues:

- CVE-2022-39176: Fixed a memory safety issue that could allow
  physically proximate attackers to obtain sensitive information
  (bsc#1203121).
- CVE-2022-39177: Fixed a memory safety issue that could allow
  physically proximate attackers to cause a denial of service
  (bsc#1203120).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-19"/>
	<updated date="2023-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203120">SUSE bug 1203120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203121">SUSE bug 1203121</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39176/">CVE-2022-39176 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39176">CVE-2022-39176 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39177/">CVE-2022-39177 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39177">CVE-2022-39177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992645" comment="bluez-4.99-0.9.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992646" comment="libbluetooth3-4.99-0.9.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218427" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1203121" ref_url="https://bugzilla.suse.com/1203121" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-39176" ref_url="https://www.suse.com/security/cve/CVE-2022-39176/" source="CVE"/>
		<description>
This update for bluez fixes the following issues:

  - Fixed %{_sysconfdir}/udev/rules.d/* not being config, which was introduced by the fix for CVE-2022-39176 (bsc#1203121).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-10"/>
	<updated date="2023-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203121">SUSE bug 1203121</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39176/">CVE-2022-39176 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39176">CVE-2022-39176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992647" comment="bluez-4.99-0.9.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992648" comment="libbluetooth3-4.99-0.9.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218428" version="1" class="patch">
	<metadata>
		<title>Security update for bsdtar (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="920870" ref_url="https://bugzilla.suse.com/920870" source="BUGZILLA"/>
		<reference ref_id="984990" ref_url="https://bugzilla.suse.com/984990" source="BUGZILLA"/>
		<reference ref_id="985609" ref_url="https://bugzilla.suse.com/985609" source="BUGZILLA"/>
		<reference ref_id="985669" ref_url="https://bugzilla.suse.com/985669" source="BUGZILLA"/>
		<reference ref_id="985675" ref_url="https://bugzilla.suse.com/985675" source="BUGZILLA"/>
		<reference ref_id="985682" ref_url="https://bugzilla.suse.com/985682" source="BUGZILLA"/>
		<reference ref_id="985698" ref_url="https://bugzilla.suse.com/985698" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2304" ref_url="https://www.suse.com/security/cve/CVE-2015-2304/" source="CVE"/>
		<reference ref_id="CVE-2015-8918" ref_url="https://www.suse.com/security/cve/CVE-2015-8918/" source="CVE"/>
		<reference ref_id="CVE-2015-8920" ref_url="https://www.suse.com/security/cve/CVE-2015-8920/" source="CVE"/>
		<reference ref_id="CVE-2015-8921" ref_url="https://www.suse.com/security/cve/CVE-2015-8921/" source="CVE"/>
		<reference ref_id="CVE-2015-8924" ref_url="https://www.suse.com/security/cve/CVE-2015-8924/" source="CVE"/>
		<reference ref_id="CVE-2015-8929" ref_url="https://www.suse.com/security/cve/CVE-2015-8929/" source="CVE"/>
		<reference ref_id="CVE-2016-4809" ref_url="https://www.suse.com/security/cve/CVE-2016-4809/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002172.html" source="SUSE-SU"/>
		<description>
bsdtar was updated to fix seven security issues.

These security issues were fixed:
- CVE-2015-8929: Memory leak in tar parser (bsc#985669).
- CVE-2016-4809: Memory allocate error with symbolic links in cpio archives (bsc#984990).
- CVE-2015-8920: Stack out of bounds read in ar parser (bsc#985675).
- CVE-2015-8921: Global out of bounds read in mtree parser (bsc#985682).
- CVE-2015-8924: Heap buffer read overflow in tar (bsc#985609).
- CVE-2015-8918: Overlapping memcpy in CAB parser (bsc#985698).
- CVE-2015-2304: Reject absolute paths in input mode of bsdcpio exactly when '..' is rejected (bsc#920870).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-02"/>
	<updated date="2016-08-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/920870">SUSE bug 920870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984990">SUSE bug 984990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985609">SUSE bug 985609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985669">SUSE bug 985669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985675">SUSE bug 985675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985682">SUSE bug 985682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985698">SUSE bug 985698</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2304/">CVE-2015-2304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2304">CVE-2015-2304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8918/">CVE-2015-8918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8918">CVE-2015-8918 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8920/">CVE-2015-8920 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8920">CVE-2015-8920 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8921/">CVE-2015-8921 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8921">CVE-2015-8921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8924/">CVE-2015-8924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8924">CVE-2015-8924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8929/">CVE-2015-8929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8929">CVE-2015-8929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4809/">CVE-2016-4809 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4809">CVE-2016-4809 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575977" comment="libarchive2-2.5.5-9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575977" comment="libarchive2-2.5.5-9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218429" version="1" class="patch">
	<metadata>
		<title>Security update for bsdtar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1005070" ref_url="https://bugzilla.suse.com/1005070" source="BUGZILLA"/>
		<reference ref_id="1059139" ref_url="https://bugzilla.suse.com/1059139" source="BUGZILLA"/>
		<reference ref_id="985601" ref_url="https://bugzilla.suse.com/985601" source="BUGZILLA"/>
		<reference ref_id="985706" ref_url="https://bugzilla.suse.com/985706" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8915" ref_url="https://www.suse.com/security/cve/CVE-2015-8915/" source="CVE"/>
		<reference ref_id="CVE-2015-8925" ref_url="https://www.suse.com/security/cve/CVE-2015-8925/" source="CVE"/>
		<reference ref_id="CVE-2016-8687" ref_url="https://www.suse.com/security/cve/CVE-2016-8687/" source="CVE"/>
		<reference ref_id="CVE-2017-14503" ref_url="https://www.suse.com/security/cve/CVE-2017-14503/" source="CVE"/>
		<description>
This update for bsdtar fixes the following issues:

- CVE-2015-8915: Fixed an invalid read which could have allowed 
  remote attackers to cause a denial of service (bsc#985601).
- CVE-2015-8925: Fixed an invalid read which could have allowed 
  remote attackers to cause a denial of service (bsc#985706).
- CVE-2017-14503: Fixed an out of bounds read within lha_read_data_none() 
  in archive_read_support_format_lha.c (bsc#1059139).
- CVE-2016-8687: Fixed a buffer overflow when printing a filename (bsc#1005070).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-27"/>
	<updated date="2019-11-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005070">SUSE bug 1005070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059139">SUSE bug 1059139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985601">SUSE bug 985601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985706">SUSE bug 985706</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8915/">CVE-2015-8915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8915">CVE-2015-8915 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8925/">CVE-2015-8925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8925">CVE-2015-8925 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8687/">CVE-2016-8687 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8687">CVE-2016-8687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14503/">CVE-2017-14503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14503">CVE-2017-14503 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571004" comment="libarchive2-2.5.5-10.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218430" version="1" class="patch">
	<metadata>
		<title>Recommended update for mono-core</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="606002" ref_url="https://bugzilla.suse.com/606002" source="BUGZILLA"/>
		<reference ref_id="810747" ref_url="https://bugzilla.suse.com/810747" source="BUGZILLA"/>
		<reference ref_id="871362" ref_url="https://bugzilla.suse.com/871362" source="BUGZILLA"/>
		<reference ref_id="921312" ref_url="https://bugzilla.suse.com/921312" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2318" ref_url="https://www.suse.com/security/cve/CVE-2015-2318/" source="CVE"/>
		<reference ref_id="CVE-2015-2319" ref_url="https://www.suse.com/security/cve/CVE-2015-2319/" source="CVE"/>
		<reference ref_id="CVE-2015-2320" ref_url="https://www.suse.com/security/cve/CVE-2015-2320/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001376.html" source="SUSE-SU"/>
		<description>

This update adds handling of SHA256 hashes to parts of the X509 Certificate 
classes in the C# implementation of Mono (bnc#871362) and improves handling 
of non-existing certificate revocation lists (bnc#810747, bnc#606002).

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-11"/>
	<updated date="2014-04-11"/>
	<bugzilla href="https://bugzilla.suse.com/606002">SUSE bug 606002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/810747">SUSE bug 810747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871362">SUSE bug 871362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921312">SUSE bug 921312</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2318/">CVE-2015-2318 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2318">CVE-2015-2318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2319/">CVE-2015-2319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2319">CVE-2015-2319 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2320/">CVE-2015-2320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2320">CVE-2015-2320 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992649" comment="mono-core-2.6.7-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992650" comment="mono-data-2.6.7-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992651" comment="mono-data-postgresql-2.6.7-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992652" comment="mono-data-sqlite-2.6.7-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992653" comment="mono-locale-extras-2.6.7-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992654" comment="mono-nunit-2.6.7-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992655" comment="mono-web-2.6.7-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992656" comment="mono-winforms-2.6.7-0.11.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992649" comment="mono-core-2.6.7-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992650" comment="mono-data-2.6.7-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992651" comment="mono-data-postgresql-2.6.7-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992652" comment="mono-data-sqlite-2.6.7-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992653" comment="mono-locale-extras-2.6.7-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992654" comment="mono-nunit-2.6.7-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992655" comment="mono-web-2.6.7-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992656" comment="mono-winforms-2.6.7-0.11.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992649" comment="mono-core-2.6.7-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992650" comment="mono-data-2.6.7-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992651" comment="mono-data-postgresql-2.6.7-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992652" comment="mono-data-sqlite-2.6.7-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992653" comment="mono-locale-extras-2.6.7-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992654" comment="mono-nunit-2.6.7-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992655" comment="mono-web-2.6.7-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992656" comment="mono-winforms-2.6.7-0.11.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218431" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="985657" ref_url="https://bugzilla.suse.com/985657" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3189" ref_url="https://www.suse.com/security/cve/CVE-2016-3189/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<description>
This update for bzip2 fixes the following issues:

Security issue fixed:

- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1139083).
- CVE-2016-3189: Fixed a use-after-free in bzip2recover (bsc#985657).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-16"/>
	<updated date="2019-07-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985657">SUSE bug 985657</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3189/">CVE-2016-3189 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3189">CVE-2016-3189 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577492" comment="bzip2-1.0.6-257.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577493" comment="bzip2-doc-1.0.6-257.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577494" comment="libbz2-1-1.0.6-257.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577495" comment="libbz2-1-32bit-1.0.6-257.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577496" comment="libbz2-devel-1.0.6-257.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218432" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<description>
This update for bzip2 fixes the following issues:

- Fixed a regression with the fix for CVE-2019-12900, which caused incompatibilities
  with files that used many selectors (bsc#1139083).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-02"/>
	<updated date="2019-08-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577497" comment="bzip2-1.0.6-257.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577498" comment="bzip2-doc-1.0.6-257.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577499" comment="libbz2-1-1.0.6-257.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577500" comment="libbz2-1-32bit-1.0.6-257.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577501" comment="libbz2-devel-1.0.6-257.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218433" version="1" class="patch">
	<metadata>
		<title>Security update for cairo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1007255" ref_url="https://bugzilla.suse.com/1007255" source="BUGZILLA"/>
		<reference ref_id="1036789" ref_url="https://bugzilla.suse.com/1036789" source="BUGZILLA"/>
		<reference ref_id="1049092" ref_url="https://bugzilla.suse.com/1049092" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9082" ref_url="https://www.suse.com/security/cve/CVE-2016-9082/" source="CVE"/>
		<reference ref_id="CVE-2017-7475" ref_url="https://www.suse.com/security/cve/CVE-2017-7475/" source="CVE"/>
		<reference ref_id="CVE-2017-9814" ref_url="https://www.suse.com/security/cve/CVE-2017-9814/" source="CVE"/>
		<description>
This update for cairo fixes the following issues:

- CVE-2016-9082: Fixed a segfault when using &gt;4GB images since int values were used
  for pointer operations (bsc#1007255).
- CVE-2017-9814: Replace malloc with _cairo_malloc and check cmap size before
  allocating to prevent DoS (bsc#1049092).
- CVE-2017-7475: Fix a segfault in get_bitmap_surface due to malformed font (bsc#1036789).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-28"/>
	<updated date="2018-05-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007255">SUSE bug 1007255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036789">SUSE bug 1036789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049092">SUSE bug 1049092</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9082/">CVE-2016-9082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9082">CVE-2016-9082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7475/">CVE-2017-7475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7475">CVE-2017-7475 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9814/">CVE-2017-9814 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9814">CVE-2017-9814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571021" comment="cairo-1.8.8-2.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571022" comment="cairo-32bit-1.8.8-2.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571023" comment="cairo-doc-1.8.8-2.3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218434" version="1" class="patch">
	<metadata>
		<title>Security update for cairo (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122321" ref_url="https://bugzilla.suse.com/1122321" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6462" ref_url="https://www.suse.com/security/cve/CVE-2019-6462/" source="CVE"/>
		<description>
This update for cairo fixes the following issues:

- CVE-2019-6462: Fixed a potentially infinite loop (bsc#1122321).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-30"/>
	<updated date="2021-09-30"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1122321">SUSE bug 1122321</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6462/">CVE-2019-6462 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6462">CVE-2019-6462 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633398" comment="cairo-1.8.8-2.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633399" comment="cairo-32bit-1.8.8-2.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633400" comment="cairo-doc-1.8.8-2.3.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218435" version="1" class="patch">
	<metadata>
		<title>Recommended update for Samba</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="726937" ref_url="https://bugzilla.suse.com/726937" source="BUGZILLA"/>
		<reference ref_id="765270" ref_url="https://bugzilla.suse.com/765270" source="BUGZILLA"/>
		<reference ref_id="786677" ref_url="https://bugzilla.suse.com/786677" source="BUGZILLA"/>
		<reference ref_id="806501" ref_url="https://bugzilla.suse.com/806501" source="BUGZILLA"/>
		<reference ref_id="817880" ref_url="https://bugzilla.suse.com/817880" source="BUGZILLA"/>
		<reference ref_id="820531" ref_url="https://bugzilla.suse.com/820531" source="BUGZILLA"/>
		<reference ref_id="829969" ref_url="https://bugzilla.suse.com/829969" source="BUGZILLA"/>
		<reference ref_id="838472" ref_url="https://bugzilla.suse.com/838472" source="BUGZILLA"/>
		<reference ref_id="844307" ref_url="https://bugzilla.suse.com/844307" source="BUGZILLA"/>
		<reference ref_id="844720" ref_url="https://bugzilla.suse.com/844720" source="BUGZILLA"/>
		<reference ref_id="847009" ref_url="https://bugzilla.suse.com/847009" source="BUGZILLA"/>
		<reference ref_id="848101" ref_url="https://bugzilla.suse.com/848101" source="BUGZILLA"/>
		<reference ref_id="849224" ref_url="https://bugzilla.suse.com/849224" source="BUGZILLA"/>
		<reference ref_id="849226" ref_url="https://bugzilla.suse.com/849226" source="BUGZILLA"/>
		<reference ref_id="853021" ref_url="https://bugzilla.suse.com/853021" source="BUGZILLA"/>
		<reference ref_id="853347" ref_url="https://bugzilla.suse.com/853347" source="BUGZILLA"/>
		<reference ref_id="854520" ref_url="https://bugzilla.suse.com/854520" source="BUGZILLA"/>
		<reference ref_id="863748" ref_url="https://bugzilla.suse.com/863748" source="BUGZILLA"/>
		<reference ref_id="865561" ref_url="https://bugzilla.suse.com/865561" source="BUGZILLA"/>
		<reference ref_id="872396" ref_url="https://bugzilla.suse.com/872396" source="BUGZILLA"/>
		<reference ref_id="879390" ref_url="https://bugzilla.suse.com/879390" source="BUGZILLA"/>
		<reference ref_id="880962" ref_url="https://bugzilla.suse.com/880962" source="BUGZILLA"/>
		<reference ref_id="882356" ref_url="https://bugzilla.suse.com/882356" source="BUGZILLA"/>
		<reference ref_id="883758" ref_url="https://bugzilla.suse.com/883758" source="BUGZILLA"/>
		<reference ref_id="883870" ref_url="https://bugzilla.suse.com/883870" source="BUGZILLA"/>
		<reference ref_id="886193" ref_url="https://bugzilla.suse.com/886193" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6150" ref_url="https://www.suse.com/security/cve/CVE-2012-6150/" source="CVE"/>
		<reference ref_id="CVE-2013-4124" ref_url="https://www.suse.com/security/cve/CVE-2013-4124/" source="CVE"/>
		<reference ref_id="CVE-2013-4408" ref_url="https://www.suse.com/security/cve/CVE-2013-4408/" source="CVE"/>
		<reference ref_id="CVE-2013-4475" ref_url="https://www.suse.com/security/cve/CVE-2013-4475/" source="CVE"/>
		<reference ref_id="CVE-2013-4496" ref_url="https://www.suse.com/security/cve/CVE-2013-4496/" source="CVE"/>
		<reference ref_id="CVE-2014-0178" ref_url="https://www.suse.com/security/cve/CVE-2014-0178/" source="CVE"/>
		<reference ref_id="CVE-2014-0244" ref_url="https://www.suse.com/security/cve/CVE-2014-0244/" source="CVE"/>
		<reference ref_id="CVE-2014-3493" ref_url="https://www.suse.com/security/cve/CVE-2014-3493/" source="CVE"/>
		<description>

This update for Samba provides the following fixes:

    * Disable TDB mmap() on s390 systems. (bso#10765, bnc#886193,
      bnc#882356)
    * Reduce printer_list.tdb lock contention during printcap update.
      (bso#10652, bnc#883870)
    * Avoid double-free in get_print_db_byname. (bso#10699)

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-27"/>
	<updated date="2014-08-27"/>
	<bugzilla href="https://bugzilla.suse.com/726937">SUSE bug 726937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/765270">SUSE bug 765270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786677">SUSE bug 786677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806501">SUSE bug 806501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817880">SUSE bug 817880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820531">SUSE bug 820531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829969">SUSE bug 829969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/838472">SUSE bug 838472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844307">SUSE bug 844307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844720">SUSE bug 844720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847009">SUSE bug 847009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848101">SUSE bug 848101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849224">SUSE bug 849224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849226">SUSE bug 849226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853021">SUSE bug 853021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853347">SUSE bug 853347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854520">SUSE bug 854520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863748">SUSE bug 863748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865561">SUSE bug 865561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/872396">SUSE bug 872396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879390">SUSE bug 879390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880962">SUSE bug 880962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882356">SUSE bug 882356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883758">SUSE bug 883758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883870">SUSE bug 883870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886193">SUSE bug 886193</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6150/">CVE-2012-6150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6150">CVE-2012-6150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4124/">CVE-2013-4124 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4124">CVE-2013-4124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4408/">CVE-2013-4408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4408">CVE-2013-4408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4475/">CVE-2013-4475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4475">CVE-2013-4475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4496/">CVE-2013-4496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4496">CVE-2013-4496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0178/">CVE-2014-0178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0178">CVE-2014-0178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0244/">CVE-2014-0244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0244">CVE-2014-0244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3493/">CVE-2014-3493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3493">CVE-2014-3493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992657" comment="ldapsmb-1.34b-12.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992658" comment="libldb1-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992659" comment="libsmbclient0-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590399" comment="libsmbclient0-32bit-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590400" comment="libsmbclient0-x86-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992660" comment="libtalloc2-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590402" comment="libtalloc2-32bit-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590403" comment="libtalloc2-x86-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992661" comment="libtdb1-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590405" comment="libtdb1-32bit-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590406" comment="libtdb1-x86-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992662" comment="libtevent0-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590408" comment="libtevent0-32bit-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992663" comment="libwbclient0-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590410" comment="libwbclient0-32bit-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590411" comment="libwbclient0-x86-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992664" comment="samba-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590413" comment="samba-32bit-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992665" comment="samba-client-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590415" comment="samba-client-32bit-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590416" comment="samba-client-x86-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992666" comment="samba-doc-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992667" comment="samba-krb-printing-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992668" comment="samba-winbind-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590419" comment="samba-winbind-32bit-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590420" comment="samba-winbind-x86-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590421" comment="samba-x86-3.6.3-0.54.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992657" comment="ldapsmb-1.34b-12.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992658" comment="libldb1-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992659" comment="libsmbclient0-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590399" comment="libsmbclient0-32bit-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590400" comment="libsmbclient0-x86-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992660" comment="libtalloc2-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590402" comment="libtalloc2-32bit-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590403" comment="libtalloc2-x86-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992661" comment="libtdb1-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590405" comment="libtdb1-32bit-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590406" comment="libtdb1-x86-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992662" comment="libtevent0-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590408" comment="libtevent0-32bit-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992663" comment="libwbclient0-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590410" comment="libwbclient0-32bit-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590411" comment="libwbclient0-x86-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992664" comment="samba-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590413" comment="samba-32bit-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992665" comment="samba-client-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590415" comment="samba-client-32bit-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590416" comment="samba-client-x86-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992666" comment="samba-doc-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992667" comment="samba-krb-printing-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992668" comment="samba-winbind-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590419" comment="samba-winbind-32bit-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590420" comment="samba-winbind-x86-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590421" comment="samba-x86-3.6.3-0.54.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992657" comment="ldapsmb-1.34b-12.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992658" comment="libldb1-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992659" comment="libsmbclient0-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590399" comment="libsmbclient0-32bit-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590400" comment="libsmbclient0-x86-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992660" comment="libtalloc2-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590402" comment="libtalloc2-32bit-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590403" comment="libtalloc2-x86-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992661" comment="libtdb1-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590405" comment="libtdb1-32bit-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590406" comment="libtdb1-x86-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992662" comment="libtevent0-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590408" comment="libtevent0-32bit-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992663" comment="libwbclient0-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590410" comment="libwbclient0-32bit-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590411" comment="libwbclient0-x86-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992664" comment="samba-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590413" comment="samba-32bit-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992665" comment="samba-client-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590415" comment="samba-client-32bit-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590416" comment="samba-client-x86-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992666" comment="samba-doc-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992667" comment="samba-krb-printing-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992668" comment="samba-winbind-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590419" comment="samba-winbind-32bit-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590420" comment="samba-winbind-x86-3.6.3-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590421" comment="samba-x86-3.6.3-0.54.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218436" version="1" class="patch">
	<metadata>
		<title>Security update for cifs-utils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="870168" ref_url="https://bugzilla.suse.com/870168" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2830" ref_url="https://www.suse.com/security/cve/CVE-2014-2830/" source="CVE"/>
		<description>

This update for cifs-utils fixes the following issues:

Security issue fixed:
- CVE-2014-2830: Fixed pam module pam_cifscreds stack overflow (bsc#870168).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-07"/>
	<updated date="2017-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/870168">SUSE bug 870168</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2830/">CVE-2014-2830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2830">CVE-2014-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577502" comment="cifs-utils-5.1-0.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218437" version="1" class="patch">
	<metadata>
		<title>Security update for cifs-utils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1197216" ref_url="https://bugzilla.suse.com/1197216" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27239" ref_url="https://www.suse.com/security/cve/CVE-2022-27239/" source="CVE"/>
		<description>
This update for cifs-utils fixes the following issues:

- CVE-2022-27239: Fixed a buffer overflow in the command line ip option (bsc#1197216).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197216">SUSE bug 1197216</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27239/">CVE-2022-27239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27239">CVE-2022-27239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681249" comment="cifs-utils-5.1-0.14.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218438" version="1" class="patch">
	<metadata>
		<title>Security update for cifs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198976" ref_url="https://bugzilla.suse.com/1198976" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29869" ref_url="https://www.suse.com/security/cve/CVE-2022-29869/" source="CVE"/>
		<description>
This update for cifs-utils fixes the following issues:

- CVE-2022-29869: Fixed verbose messages on option parsing (bsc#1198976).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-25"/>
	<updated date="2022-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198976">SUSE bug 1198976</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29869/">CVE-2022-29869 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29869">CVE-2022-29869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992669" comment="cifs-utils-5.1-0.14.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218439" version="1" class="patch">
	<metadata>
		<title>Recommended update for clamav</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="816865" ref_url="https://bugzilla.suse.com/816865" source="BUGZILLA"/>
		<reference ref_id="841815" ref_url="https://bugzilla.suse.com/841815" source="BUGZILLA"/>
		<reference ref_id="865883" ref_url="https://bugzilla.suse.com/865883" source="BUGZILLA"/>
		<reference ref_id="877475" ref_url="https://bugzilla.suse.com/877475" source="BUGZILLA"/>
		<reference ref_id="903489" ref_url="https://bugzilla.suse.com/903489" source="BUGZILLA"/>
		<reference ref_id="903719" ref_url="https://bugzilla.suse.com/903719" source="BUGZILLA"/>
		<reference ref_id="904207" ref_url="https://bugzilla.suse.com/904207" source="BUGZILLA"/>
		<reference ref_id="906077" ref_url="https://bugzilla.suse.com/906077" source="BUGZILLA"/>
		<reference ref_id="906770" ref_url="https://bugzilla.suse.com/906770" source="BUGZILLA"/>
		<reference ref_id="915512" ref_url="https://bugzilla.suse.com/915512" source="BUGZILLA"/>
		<reference ref_id="916214" ref_url="https://bugzilla.suse.com/916214" source="BUGZILLA"/>
		<reference ref_id="916215" ref_url="https://bugzilla.suse.com/916215" source="BUGZILLA"/>
		<reference ref_id="916217" ref_url="https://bugzilla.suse.com/916217" source="BUGZILLA"/>
		<reference ref_id="929192" ref_url="https://bugzilla.suse.com/929192" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2020" ref_url="https://www.suse.com/security/cve/CVE-2013-2020/" source="CVE"/>
		<reference ref_id="CVE-2013-2021" ref_url="https://www.suse.com/security/cve/CVE-2013-2021/" source="CVE"/>
		<reference ref_id="CVE-2013-6497" ref_url="https://www.suse.com/security/cve/CVE-2013-6497/" source="CVE"/>
		<reference ref_id="CVE-2014-9050" ref_url="https://www.suse.com/security/cve/CVE-2014-9050/" source="CVE"/>
		<reference ref_id="CVE-2014-9328" ref_url="https://www.suse.com/security/cve/CVE-2014-9328/" source="CVE"/>
		<reference ref_id="CVE-2015-1461" ref_url="https://www.suse.com/security/cve/CVE-2015-1461/" source="CVE"/>
		<reference ref_id="CVE-2015-1462" ref_url="https://www.suse.com/security/cve/CVE-2015-1462/" source="CVE"/>
		<reference ref_id="CVE-2015-1463" ref_url="https://www.suse.com/security/cve/CVE-2015-1463/" source="CVE"/>
		<reference ref_id="CVE-2015-2170" ref_url="https://www.suse.com/security/cve/CVE-2015-2170/" source="CVE"/>
		<reference ref_id="CVE-2015-2221" ref_url="https://www.suse.com/security/cve/CVE-2015-2221/" source="CVE"/>
		<reference ref_id="CVE-2015-2222" ref_url="https://www.suse.com/security/cve/CVE-2015-2222/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2668" ref_url="https://www.suse.com/security/cve/CVE-2015-2668/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001382.html" source="SUSE-SU"/>
		<description>

The antivirus scanner ClamAV has been updated to version 0.98.3, which 
includes the following fixes and enhancements:

    * Support for common raw disk image formats using 512 byte sectors,
      specifically GPT, APM, and MBR partitioning.
    * All ClamAV sockets (clamd, freshclam, clamav-milter, clamdscan,
      clamdtop) now support IPV6 addresses and configuration parameters.
    * Use OpenSSL file hash functions for improved performance.
    * Improved detection of malware scripts within image files.
    * Miscellaneous bug fixes and documentation improvements.

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-28"/>
	<updated date="2014-05-28"/>
	<bugzilla href="https://bugzilla.suse.com/816865">SUSE bug 816865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841815">SUSE bug 841815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865883">SUSE bug 865883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877475">SUSE bug 877475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903489">SUSE bug 903489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903719">SUSE bug 903719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904207">SUSE bug 904207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906077">SUSE bug 906077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906770">SUSE bug 906770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915512">SUSE bug 915512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916214">SUSE bug 916214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916215">SUSE bug 916215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916217">SUSE bug 916217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929192">SUSE bug 929192</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2020/">CVE-2013-2020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2020">CVE-2013-2020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2021/">CVE-2013-2021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2021">CVE-2013-2021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6497/">CVE-2013-6497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6497">CVE-2013-6497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9050/">CVE-2014-9050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9050">CVE-2014-9050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9328/">CVE-2014-9328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9328">CVE-2014-9328 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1461/">CVE-2015-1461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1461">CVE-2015-1461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1462/">CVE-2015-1462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1462">CVE-2015-1462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1463/">CVE-2015-1463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1463">CVE-2015-1463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2170/">CVE-2015-2170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2170">CVE-2015-2170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2221/">CVE-2015-2221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2221">CVE-2015-2221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2222/">CVE-2015-2222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2222">CVE-2015-2222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2305">CVE-2015-2305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2668/">CVE-2015-2668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2668">CVE-2015-2668 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992670" comment="clamav-0.98.3-0.11.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992670" comment="clamav-0.98.3-0.11.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992670" comment="clamav-0.98.3-0.11.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218440" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1045490" ref_url="https://bugzilla.suse.com/1045490" source="BUGZILLA"/>
		<reference ref_id="815106" ref_url="https://bugzilla.suse.com/815106" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003001.html" source="SUSE-SU"/>
		<description>

This update for clamav fixes the following issues:

Security issue fixed:

- CVE-2012-6706: Fixed an arbitrary memory write in VMSF_DELTA filter in libclamunrar (bsc#1045490)

Non security issue fixed:

- Fix permissions of /var/spool/amavis. (bsc#815106)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-03"/>
	<updated date="2017-07-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045490">SUSE bug 1045490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815106">SUSE bug 815106</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6706">CVE-2012-6706 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577503" comment="clamav-0.99.2-0.19.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577503" comment="clamav-0.99.2-0.19.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218441" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1049423" ref_url="https://bugzilla.suse.com/1049423" source="BUGZILLA"/>
		<reference ref_id="1052448" ref_url="https://bugzilla.suse.com/1052448" source="BUGZILLA"/>
		<reference ref_id="1052449" ref_url="https://bugzilla.suse.com/1052449" source="BUGZILLA"/>
		<reference ref_id="1052466" ref_url="https://bugzilla.suse.com/1052466" source="BUGZILLA"/>
		<reference ref_id="1077732" ref_url="https://bugzilla.suse.com/1077732" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-12374" ref_url="https://www.suse.com/security/cve/CVE-2017-12374/" source="CVE"/>
		<reference ref_id="CVE-2017-12375" ref_url="https://www.suse.com/security/cve/CVE-2017-12375/" source="CVE"/>
		<reference ref_id="CVE-2017-12376" ref_url="https://www.suse.com/security/cve/CVE-2017-12376/" source="CVE"/>
		<reference ref_id="CVE-2017-12377" ref_url="https://www.suse.com/security/cve/CVE-2017-12377/" source="CVE"/>
		<reference ref_id="CVE-2017-12378" ref_url="https://www.suse.com/security/cve/CVE-2017-12378/" source="CVE"/>
		<reference ref_id="CVE-2017-12379" ref_url="https://www.suse.com/security/cve/CVE-2017-12379/" source="CVE"/>
		<reference ref_id="CVE-2017-12380" ref_url="https://www.suse.com/security/cve/CVE-2017-12380/" source="CVE"/>
		<reference ref_id="CVE-2017-6418" ref_url="https://www.suse.com/security/cve/CVE-2017-6418/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2017-6420" ref_url="https://www.suse.com/security/cve/CVE-2017-6420/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003654.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- Update to security release 0.99.3 (bsc#1077732)
  * CVE-2017-12376 (ClamAV Buffer Overflow in handle_pdfname Vulnerability)
  * CVE-2017-12377 (ClamAV Mew Packet Heap Overflow Vulnerability)
  * CVE-2017-12379 (ClamAV Buffer Overflow in messageAddArgument Vulnerability)
    - these vulnerabilities could have allowed an unauthenticated,
      remote attacker to cause a denial of service (DoS) condition
      or potentially execute arbitrary code on an affected device.
  * CVE-2017-12374 (ClamAV use-after-free Vulnerabilities)
  * CVE-2017-12375 (ClamAV Buffer Overflow Vulnerability)
  * CVE-2017-12378 (ClamAV Buffer Over Read Vulnerability)
  * CVE-2017-12380 (ClamAV Null Dereference Vulnerability)
    - these vulnerabilities could have allowed an unauthenticated,
      remote attacker to cause a denial of service (DoS) condition on an affected device.
  * CVE-2017-6420 (bsc#1052448)
    - this vulnerability could have allowed remote attackers to cause a denial of service
      (use-after-free) via a crafted PE file with WWPack compression.
  * CVE-2017-6419 (bsc#1052449)
    - ClamAV could have allowed remote attackers to cause a denial of service
      (heap-based buffer overflow and application crash) or possibly
      have unspecified other impact via a crafted CHM file.
  * CVE-2017-11423 (bsc#1049423)
    - ClamAV could have allowed remote attackers to cause a denial of service
      (stack-based buffer over-read and application crash) via a crafted CAB file.
  * CVE-2017-6418 (bsc#1052466)
    - ClamAV could have allowed remote attackers to cause a denial
      of service (out-of-bounds read) via a crafted e-mail message.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-27"/>
	<updated date="2018-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1049423">SUSE bug 1049423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052448">SUSE bug 1052448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052449">SUSE bug 1052449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052466">SUSE bug 1052466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11423">CVE-2017-11423 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12374/">CVE-2017-12374 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12374">CVE-2017-12374 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12375/">CVE-2017-12375 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12375">CVE-2017-12375 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12376/">CVE-2017-12376 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12376">CVE-2017-12376 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12377/">CVE-2017-12377 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12377">CVE-2017-12377 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12378/">CVE-2017-12378 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12378">CVE-2017-12378 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12379/">CVE-2017-12379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12379">CVE-2017-12379 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12380/">CVE-2017-12380 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12380">CVE-2017-12380 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6418/">CVE-2017-6418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6418">CVE-2017-6418 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6419">CVE-2017-6419 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6420/">CVE-2017-6420 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6420">CVE-2017-6420 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577504" comment="clamav-0.99.3-0.20.3.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577504" comment="clamav-0.99.3-0.20.3.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218442" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1045315" ref_url="https://bugzilla.suse.com/1045315" source="BUGZILLA"/>
		<reference ref_id="1049423" ref_url="https://bugzilla.suse.com/1049423" source="BUGZILLA"/>
		<reference ref_id="1052449" ref_url="https://bugzilla.suse.com/1052449" source="BUGZILLA"/>
		<reference ref_id="1082858" ref_url="https://bugzilla.suse.com/1082858" source="BUGZILLA"/>
		<reference ref_id="1083915" ref_url="https://bugzilla.suse.com/1083915" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2018-0202" ref_url="https://www.suse.com/security/cve/CVE-2018-0202/" source="CVE"/>
		<reference ref_id="CVE-2018-1000085" ref_url="https://www.suse.com/security/cve/CVE-2018-1000085/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003864.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

Security issues fixed:

- CVE-2012-6706: VMSF_DELTA filter inside the unrar implementation allows an arbitrary memory write (bsc#1045315).
- CVE-2017-6419: A heap-based buffer overflow that can lead to a denial of service in libmspack via a crafted CHM file (bsc#1052449).
- CVE-2017-11423: A stack-based buffer over-read that can lead to a denial of service in mspack via a crafted CAB file (bsc#1049423).
- CVE-2018-1000085: An out-of-bounds heap read vulnerability was found in XAR parser that can lead to a denial of service (bsc#1082858).
- CVE-2018-0202: Fixed two vulnerabilities in the PDF parsing code (bsc#1083915).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045315">SUSE bug 1045315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049423">SUSE bug 1049423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052449">SUSE bug 1052449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082858">SUSE bug 1082858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083915">SUSE bug 1083915</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6706">CVE-2012-6706 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11423">CVE-2017-11423 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6419">CVE-2017-6419 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0202/">CVE-2018-0202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0202">CVE-2018-0202 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000085/">CVE-2018-1000085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000085">CVE-2018-1000085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577505" comment="clamav-0.99.4-0.20.7.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577505" comment="clamav-0.99.4-0.20.7.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218443" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1101410" ref_url="https://bugzilla.suse.com/1101410" source="BUGZILLA"/>
		<reference ref_id="1101412" ref_url="https://bugzilla.suse.com/1101412" source="BUGZILLA"/>
		<reference ref_id="1101654" ref_url="https://bugzilla.suse.com/1101654" source="BUGZILLA"/>
		<reference ref_id="1103040" ref_url="https://bugzilla.suse.com/1103040" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0360" ref_url="https://www.suse.com/security/cve/CVE-2018-0360/" source="CVE"/>
		<reference ref_id="CVE-2018-0361" ref_url="https://www.suse.com/security/cve/CVE-2018-0361/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004380.html" source="SUSE-SU"/>
		<description>
This update for clamav to version 0.100.1 fixes the following issues:

The following security vulnerabilities were addressed:

- CVE-2018-0360: HWP integer overflow, infinite loop vulnerability
  (bsc#1101410)
- CVE-2018-0361: PDF object length check, unreasonably long time to parse
  relatively small file (bsc#1101412)
- Buffer over-read in unRAR code due to missing max value checks in table
  initialization
- Libmspack heap buffer over-read in CHM parser (bsc#1103040)
- PDF parser bugs

The following other changes were made:

- Disable YARA support for licensing reasons (bsc#1101654).
- Add HTTPS support for clamsubmit
- Fix for DNS resolution for users on IPv4-only machines where IPv6 is not
  available or is link-local only
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-07"/>
	<updated date="2018-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101410">SUSE bug 1101410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101412">SUSE bug 1101412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101654">SUSE bug 1101654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0360/">CVE-2018-0360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0360">CVE-2018-0360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0361/">CVE-2018-0361 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0361">CVE-2018-0361 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577506" comment="clamav-0.100.1-0.20.15.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577506" comment="clamav-0.100.1-0.20.15.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218444" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1103040" ref_url="https://bugzilla.suse.com/1103040" source="BUGZILLA"/>
		<reference ref_id="1104457" ref_url="https://bugzilla.suse.com/1104457" source="BUGZILLA"/>
		<reference ref_id="1110723" ref_url="https://bugzilla.suse.com/1110723" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14680" ref_url="https://www.suse.com/security/cve/CVE-2018-14680/" source="CVE"/>
		<reference ref_id="CVE-2018-14681" ref_url="https://www.suse.com/security/cve/CVE-2018-14681/" source="CVE"/>
		<reference ref_id="CVE-2018-14682" ref_url="https://www.suse.com/security/cve/CVE-2018-14682/" source="CVE"/>
		<reference ref_id="CVE-2018-15378" ref_url="https://www.suse.com/security/cve/CVE-2018-15378/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004791.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

Clamav was updated to version 0.100.2:

- CVE-2018-15378: Vulnerability in ClamAV's MEW
  unpacking feature that could allow an unauthenticated, remote
  attacker to cause a denial of service (DoS) condition on an
  affected device. (bsc#1110723)
- CVE-2018-14680, CVE-2018-14681, CVE-2018-14682:
  more fixes for embedded libmspack. (bsc#1103040)

* Make freshclam more robust against lagging signature mirrors.
* On-Access 'Extra Scanning', an opt-in minor feature of
  OnAccess scanning on Linux systems, has been disabled due to a
  known issue with resource cleanup OnAccessExtraScanning will
  be re-enabled in a future release when the issue is
  resolved. In the mean-time, users who enabled the feature in
  clamd.conf will see a warning informing them that the feature
  is not active. For details, see:
  https://bugzilla.clamav.net/show_bug.cgi?id=12048

- Restore exit code compatibility of freshclam with versions before
  0.100.0 when the virus database is already up to date
  (bsc#1104457).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104457">SUSE bug 1104457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110723">SUSE bug 1110723</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14680/">CVE-2018-14680 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14680">CVE-2018-14680 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14681/">CVE-2018-14681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14681">CVE-2018-14681 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14682/">CVE-2018-14682 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14682">CVE-2018-14682 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15378/">CVE-2018-15378 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15378">CVE-2018-15378 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577507" comment="clamav-0.100.2-0.20.18.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577507" comment="clamav-0.100.2-0.20.18.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218445" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1130721" ref_url="https://bugzilla.suse.com/1130721" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1787" ref_url="https://www.suse.com/security/cve/CVE-2019-1787/" source="CVE"/>
		<reference ref_id="CVE-2019-1788" ref_url="https://www.suse.com/security/cve/CVE-2019-1788/" source="CVE"/>
		<reference ref_id="CVE-2019-1789" ref_url="https://www.suse.com/security/cve/CVE-2019-1789/" source="CVE"/>
		<description>
This update for clamav to version 0.100.3 fixes the following issues:

Security issues fixed (bsc#1130721): 	  

- CVE-2019-1787: Fixed an out-of-bounds heap read condition which may occur
  when scanning PDF documents.   
- CVE-2019-1789: Fixed an out-of-bounds heap read condition which may occur
  when scanning PE files (i.e. Windows EXE and DLL files).
- CVE-2019-1788: Fixed an out-of-bounds heap write condition which may occur
  when scanning OLE2 files such as Microsoft Office 97-2003 documents. 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-09"/>
	<updated date="2019-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1787/">CVE-2019-1787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1787">CVE-2019-1787 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-1788/">CVE-2019-1788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1788">CVE-2019-1788 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1789/">CVE-2019-1789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1789">CVE-2019-1789 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571030" comment="clamav-0.100.3-0.20.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218446" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1144504" ref_url="https://bugzilla.suse.com/1144504" source="BUGZILLA"/>
		<reference ref_id="1149458" ref_url="https://bugzilla.suse.com/1149458" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12625" ref_url="https://www.suse.com/security/cve/CVE-2019-12625/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

Security issues fixed:

- CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and heuristics for zips with overlapping files (bsc#1144504).
- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1149458).

Non-security issue fixed:

- Added the --max-scantime clamscan option and MaxScanTime clamd configuration option.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12625/">CVE-2019-12625 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12625">CVE-2019-12625 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571031" comment="clamav-0.100.3-0.20.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218447" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1157763" ref_url="https://bugzilla.suse.com/1157763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2019-15961: Fixed a denial of service which might occur when 
  scanning a specially crafted email file as (bsc#1157763).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15961">CVE-2019-15961 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571032" comment="clamav-0.100.3-0.20.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218448" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1118459" ref_url="https://bugzilla.suse.com/1118459" source="BUGZILLA"/>
		<reference ref_id="1171981" ref_url="https://bugzilla.suse.com/1171981" source="BUGZILLA"/>
		<reference ref_id="1174250" ref_url="https://bugzilla.suse.com/1174250" source="BUGZILLA"/>
		<reference ref_id="1174255" ref_url="https://bugzilla.suse.com/1174255" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3123" ref_url="https://www.suse.com/security/cve/CVE-2020-3123/" source="CVE"/>
		<reference ref_id="CVE-2020-3327" ref_url="https://www.suse.com/security/cve/CVE-2020-3327/" source="CVE"/>
		<reference ref_id="CVE-2020-3341" ref_url="https://www.suse.com/security/cve/CVE-2020-3341/" source="CVE"/>
		<reference ref_id="CVE-2020-3350" ref_url="https://www.suse.com/security/cve/CVE-2020-3350/" source="CVE"/>
		<reference ref_id="CVE-2020-3481" ref_url="https://www.suse.com/security/cve/CVE-2020-3481/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- Update to 0.103.0 to implement jsc#ECO-3010 and bsc#1118459
- This update incorporates incompatible changes that were introduced
  in version 0.101.0.
- Accumulated security fixes:
  * CVE-2020-3350: Fix a vulnerability wherein a malicious user could
    replace a scan target's directory with a symlink to another path
    to trick clamscan, clamdscan, or clamonacc into removing or moving
    a different file (eg. a critical system file). The issue would
    affect users that use the --move or --remove options for clamscan,
    clamdscan, and clamonacc. (bsc#1174255)
  * CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing
    module in ClamAV 0.102.3 that could cause a Denial-of-Service
    (DoS) condition. Improper bounds checking results in an
    out-of-bounds read which could cause a crash. The previous fix for
    this CVE in 0.102.3 was incomplete. This fix correctly resolves
    the issue.
  * CVE-2020-3481: Fix a vulnerability in the EGG archive module in
    ClamAV 0.102.0 - 0.102.3 could cause a Denial-of-Service (DoS)
    condition. Improper error handling may result in a crash due to a
    NULL pointer dereference. This vulnerability is mitigated for
    those using the official ClamAV signature databases because the
    file type signatures in daily.cvd will not enable the EGG archive
    parser in versions affected by the vulnerability. (bsc#1174250)
  * CVE-2020-3341: Fix a vulnerability in the PDF parsing module in
    ClamAV 0.101 - 0.102.2 that could cause a Denial-of-Service (DoS)
    condition. Improper size checking of a buffer used to initialize AES
    decryption routines results in an out-of-bounds read which may cause
    a crash. (bsc#1171981)
  * CVE-2020-3123: A denial-of-service (DoS) condition may occur when
    using the optional credit card data-loss-prevention (DLP) feature.
    Improper bounds checking of an unsigned variable resulted in an
    out-of-bounds read, which causes a crash.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118459">SUSE bug 1118459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171981">SUSE bug 1171981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174250">SUSE bug 1174250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174255">SUSE bug 1174255</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3123/">CVE-2020-3123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3123">CVE-2020-3123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3327/">CVE-2020-3327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3327">CVE-2020-3327 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3341/">CVE-2020-3341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3341">CVE-2020-3341 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3350/">CVE-2020-3350 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3350">CVE-2020-3350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3481/">CVE-2020-3481 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3481">CVE-2020-3481 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571033" comment="clamav-0.103.0-0.20.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218449" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181256" ref_url="https://bugzilla.suse.com/1181256" source="BUGZILLA"/>
		<reference ref_id="1184532" ref_url="https://bugzilla.suse.com/1184532" source="BUGZILLA"/>
		<reference ref_id="1184533" ref_url="https://bugzilla.suse.com/1184533" source="BUGZILLA"/>
		<reference ref_id="1184534" ref_url="https://bugzilla.suse.com/1184534" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-1252" ref_url="https://www.suse.com/security/cve/CVE-2021-1252/" source="CVE"/>
		<reference ref_id="CVE-2021-1404" ref_url="https://www.suse.com/security/cve/CVE-2021-1404/" source="CVE"/>
		<reference ref_id="CVE-2021-1405" ref_url="https://www.suse.com/security/cve/CVE-2021-1405/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2021-1252: Fix for Excel XLM parser infinite loop. (bsc#1184532)
- CVE-2021-1404: Fix for PDF parser buffer over-read; possible crash. (bsc#1184533)
- CVE-2021-1405: Fix for mail parser NULL-dereference crash. (bsc#1184534)
- Fix errors when scanning files &gt; 4G (bsc#1181256)
- Update clamav.keyring
- Update to 0.103.2
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-14"/>
	<updated date="2021-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181256">SUSE bug 1181256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184532">SUSE bug 1184532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184533">SUSE bug 1184533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184534">SUSE bug 1184534</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1252/">CVE-2021-1252 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1252">CVE-2021-1252 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1404/">CVE-2021-1404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1404">CVE-2021-1404 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1405/">CVE-2021-1405 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1405">CVE-2021-1405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571034" comment="clamav-0.103.2-0.20.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218450" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1103032" ref_url="https://bugzilla.suse.com/1103032" source="BUGZILLA"/>
		<reference ref_id="1187509" ref_url="https://bugzilla.suse.com/1187509" source="BUGZILLA"/>
		<reference ref_id="1188284" ref_url="https://bugzilla.suse.com/1188284" source="BUGZILLA"/>
		<reference ref_id="1192346" ref_url="https://bugzilla.suse.com/1192346" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2018-14679: Fixed off-by-one issue in embedded libmspack that could lead to denial of service (bsc#1103032). 
  
- Update to 0.103.4 (bsc#1192346).
- Add documentation about max file size purpose and side effect in the 'clamscan' and 'clamdscan' manpages (bsc#1187509).
- Update to 0.103.3 (bsc#1188284).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187509">SUSE bug 1187509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188284">SUSE bug 1188284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192346">SUSE bug 1192346</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14679">CVE-2018-14679 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657135" comment="clamav-0.103.4-0.20.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657136" comment="clamav-openssl1-0.103.4-0.20.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218451" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194731" ref_url="https://bugzilla.suse.com/1194731" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20698" ref_url="https://www.suse.com/security/cve/CVE-2022-20698/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2022-20698: Fixed invalid pointer read allowing denial of service crash. (bsc#1194731)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194731">SUSE bug 1194731</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20698/">CVE-2022-20698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20698">CVE-2022-20698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664013" comment="clamav-0.103.5-0.20.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664014" comment="clamav-openssl1-0.103.5-0.20.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218452" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199242" ref_url="https://bugzilla.suse.com/1199242" source="BUGZILLA"/>
		<reference ref_id="1199244" ref_url="https://bugzilla.suse.com/1199244" source="BUGZILLA"/>
		<reference ref_id="1199245" ref_url="https://bugzilla.suse.com/1199245" source="BUGZILLA"/>
		<reference ref_id="1199246" ref_url="https://bugzilla.suse.com/1199246" source="BUGZILLA"/>
		<reference ref_id="1199274" ref_url="https://bugzilla.suse.com/1199274" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20770" ref_url="https://www.suse.com/security/cve/CVE-2022-20770/" source="CVE"/>
		<reference ref_id="CVE-2022-20771" ref_url="https://www.suse.com/security/cve/CVE-2022-20771/" source="CVE"/>
		<reference ref_id="CVE-2022-20785" ref_url="https://www.suse.com/security/cve/CVE-2022-20785/" source="CVE"/>
		<reference ref_id="CVE-2022-20792" ref_url="https://www.suse.com/security/cve/CVE-2022-20792/" source="CVE"/>
		<reference ref_id="CVE-2022-20796" ref_url="https://www.suse.com/security/cve/CVE-2022-20796/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2022-20770: Fixed a possible infinite loop vulnerability in the CHM file parser (bsc#1199242).
- CVE-2022-20796: Fixed a possible NULL-pointer dereference crash in the scan verdict cache check (bsc#1199246).
- CVE-2022-20771: Fixed a possible infinite loop vulnerability in the TIFF file parser (bsc#1199244).
- CVE-2022-20785: Fixed a possible memory leak in the HTML file parser / Javascript normalizer (bsc#1199245).
- CVE-2022-20792: Fixed a possible multi-byte heap buffer overflow write vulnerability in the signature database load module (bsc#1199274).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-12"/>
	<updated date="2022-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199242">SUSE bug 1199242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199244">SUSE bug 1199244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199245">SUSE bug 1199245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199246">SUSE bug 1199246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199274">SUSE bug 1199274</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20770/">CVE-2022-20770 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20770">CVE-2022-20770 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20771/">CVE-2022-20771 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20771">CVE-2022-20771 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20785/">CVE-2022-20785 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20785">CVE-2022-20785 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20792/">CVE-2022-20792 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20792">CVE-2022-20792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20796/">CVE-2022-20796 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20796">CVE-2022-20796 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682693" comment="clamav-0.103.6-0.20.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682694" comment="clamav-openssl1-0.103.6-0.20.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218453" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1202986" ref_url="https://bugzilla.suse.com/1202986" source="BUGZILLA"/>
		<description>
This update for clamav fixes the following issues:

clamav was updated to 0.103.7 (bsc#1202986)

* Upgrade the vendored UnRAR library to version 6.1.7.
* Fix logical signature 'Intermediates' feature.
* Relax constraints on slightly malformed zip archives that
  contain overlapping file entries.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-06"/>
	<updated date="2022-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202986">SUSE bug 1202986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992671" comment="clamav-0.103.7-0.20.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992672" comment="clamav-openssl1-0.103.7-0.20.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218454" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208363" ref_url="https://bugzilla.suse.com/1208363" source="BUGZILLA"/>
		<reference ref_id="1208365" ref_url="https://bugzilla.suse.com/1208365" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-20032" ref_url="https://www.suse.com/security/cve/CVE-2023-20032/" source="CVE"/>
		<reference ref_id="CVE-2023-20052" ref_url="https://www.suse.com/security/cve/CVE-2023-20052/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2023-20032: Fixed a possible remote code execution vulnerability in the HFS+ file parser (bsc#1208363).
- CVE-2023-20052: Fixed a possible remote information leak vulnerability in the DMG file parser (bsc#1208365).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-20"/>
	<updated date="2023-02-20"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1208363">SUSE bug 1208363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208365">SUSE bug 1208365</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-20032/">CVE-2023-20032 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20032">CVE-2023-20032 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20052/">CVE-2023-20052 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20052">CVE-2023-20052 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992673" comment="clamav-0.103.8-0.20.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992674" comment="clamav-openssl1-0.103.8-0.20.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218455" version="1" class="patch">
	<metadata>
		<title>Recommended udpate for SUSE Manager Client Tools (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="970550" ref_url="https://bugzilla.suse.com/970550" source="BUGZILLA"/>
		<reference ref_id="970989" ref_url="https://bugzilla.suse.com/970989" source="BUGZILLA"/>
		<description>

This update for SUSE Manager Client Tools provides the following fixes and enhancements:

rhnlib:

- Use TLSv1_METHOD in SSL Context (bsc#970989)

suseRegisterInfo:

- Fix file permissions (bsc#970550)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-19"/>
	<updated date="2016-05-19"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/970550">SUSE bug 970550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970989">SUSE bug 970989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577508" comment="rhnlib-2.5.69.8-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577509" comment="suseRegisterInfo-2.1.12-14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218456" version="1" class="patch">
	<metadata>
		<title>Security update for cloud-init (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1099358" ref_url="https://bugzilla.suse.com/1099358" source="BUGZILLA"/>
		<reference ref_id="1125950" ref_url="https://bugzilla.suse.com/1125950" source="BUGZILLA"/>
		<reference ref_id="1125992" ref_url="https://bugzilla.suse.com/1125992" source="BUGZILLA"/>
		<reference ref_id="1126101" ref_url="https://bugzilla.suse.com/1126101" source="BUGZILLA"/>
		<reference ref_id="1129124" ref_url="https://bugzilla.suse.com/1129124" source="BUGZILLA"/>
		<reference ref_id="1132692" ref_url="https://bugzilla.suse.com/1132692" source="BUGZILLA"/>
		<reference ref_id="1136440" ref_url="https://bugzilla.suse.com/1136440" source="BUGZILLA"/>
		<reference ref_id="1141969" ref_url="https://bugzilla.suse.com/1141969" source="BUGZILLA"/>
		<reference ref_id="1142988" ref_url="https://bugzilla.suse.com/1142988" source="BUGZILLA"/>
		<reference ref_id="1144363" ref_url="https://bugzilla.suse.com/1144363" source="BUGZILLA"/>
		<reference ref_id="1144881" ref_url="https://bugzilla.suse.com/1144881" source="BUGZILLA"/>
		<reference ref_id="1151488" ref_url="https://bugzilla.suse.com/1151488" source="BUGZILLA"/>
		<reference ref_id="1154092" ref_url="https://bugzilla.suse.com/1154092" source="BUGZILLA"/>
		<reference ref_id="1155376" ref_url="https://bugzilla.suse.com/1155376" source="BUGZILLA"/>
		<reference ref_id="1156139" ref_url="https://bugzilla.suse.com/1156139" source="BUGZILLA"/>
		<reference ref_id="1157894" ref_url="https://bugzilla.suse.com/1157894" source="BUGZILLA"/>
		<reference ref_id="1161132" ref_url="https://bugzilla.suse.com/1161132" source="BUGZILLA"/>
		<reference ref_id="1161133" ref_url="https://bugzilla.suse.com/1161133" source="BUGZILLA"/>
		<reference ref_id="1162936" ref_url="https://bugzilla.suse.com/1162936" source="BUGZILLA"/>
		<reference ref_id="1162937" ref_url="https://bugzilla.suse.com/1162937" source="BUGZILLA"/>
		<reference ref_id="1163178" ref_url="https://bugzilla.suse.com/1163178" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0816" ref_url="https://www.suse.com/security/cve/CVE-2019-0816/" source="CVE"/>
		<reference ref_id="CVE-2020-8631" ref_url="https://www.suse.com/security/cve/CVE-2020-8631/" source="CVE"/>
		<reference ref_id="CVE-2020-8632" ref_url="https://www.suse.com/security/cve/CVE-2020-8632/" source="CVE"/>
		<description>
This update for cloud-init fixes the following issues:

cloud-init was updated to version 19.4.


Security issues fixed:

- CVE-2020-8631: Replaced the theoretically predictable deterministic RNG with the system RNG (bsc#1162937).
- CVE-2020-8632: Increased the default random password length from 9 to 20 (bsc#1162936).


Non-security issues fixed:

- Entries in the routes definition have changed causing a traceback during rout config file writing. This patch update addresses the issue by extracting the new entries properly (bsc#1163178).
- Do not attempt to configure an ephemeral network on OCI. We boot off iSCSI and the network is up. Just read the data (bsc#1161132, bsc#1161133).
- Support a mix of DHCP and static on a single interface (bsc#1157894).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-19"/>
	<updated date="2020-05-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1099358">SUSE bug 1099358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125950">SUSE bug 1125950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125992">SUSE bug 1125992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126101">SUSE bug 1126101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129124">SUSE bug 1129124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132692">SUSE bug 1132692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136440">SUSE bug 1136440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141969">SUSE bug 1141969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142988">SUSE bug 1142988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144363">SUSE bug 1144363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144881">SUSE bug 1144881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151488">SUSE bug 1151488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154092">SUSE bug 1154092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155376">SUSE bug 1155376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156139">SUSE bug 1156139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157894">SUSE bug 1157894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161132">SUSE bug 1161132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161133">SUSE bug 1161133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162936">SUSE bug 1162936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162937">SUSE bug 1162937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163178">SUSE bug 1163178</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-0816/">CVE-2019-0816 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0816">CVE-2019-0816 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8631/">CVE-2020-8631 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8631">CVE-2020-8631 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8632/">CVE-2020-8632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8632">CVE-2020-8632 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577510" comment="cloud-init-19.4-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577511" comment="cloud-init-config-suse-19.4-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577512" comment="cloud-init-doc-19.4-3.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218457" version="1" class="patch">
	<metadata>
		<title>Security update for cloud-init (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184758" ref_url="https://bugzilla.suse.com/1184758" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3429" ref_url="https://www.suse.com/security/cve/CVE-2021-3429/" source="CVE"/>
		<description>
This update for cloud-init fixes the following issues:

- CVE-2021-3429: Fixed an issue where randomly generated passwords
  would be logged in clear-text to a world-readable file (bsc#1184758).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-08"/>
	<updated date="2022-09-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184758">SUSE bug 1184758</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3429/">CVE-2021-3429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3429">CVE-2021-3429 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992675" comment="cloud-init-19.4-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992676" comment="cloud-init-config-suse-19.4-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992677" comment="cloud-init-doc-19.4-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218458" version="1" class="patch">
	<metadata>
		<title>Optional OpenSSL 1.0 versions of cyrus-sasl, libcurl4 and libldap</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="843697" ref_url="https://bugzilla.suse.com/843697" source="BUGZILLA"/>
		<reference ref_id="861014" ref_url="https://bugzilla.suse.com/861014" source="BUGZILLA"/>
		<reference ref_id="862623" ref_url="https://bugzilla.suse.com/862623" source="BUGZILLA"/>
		<reference ref_id="864912" ref_url="https://bugzilla.suse.com/864912" source="BUGZILLA"/>
		<reference ref_id="868627" ref_url="https://bugzilla.suse.com/868627" source="BUGZILLA"/>
		<reference ref_id="868629" ref_url="https://bugzilla.suse.com/868629" source="BUGZILLA"/>
		<reference ref_id="870444" ref_url="https://bugzilla.suse.com/870444" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0138" ref_url="https://www.suse.com/security/cve/CVE-2014-0138/" source="CVE"/>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<description>

This update includes variants of existing libraries built against OpenSSL 
1.0.

As OpenSSL 0.8.9j and OpenSSL 1.0.1 are not binary compatible, but have the 
same function names, care must be taken that they are not loaded by the 
same program.

As some system libraries also link against libssl.so or libcrypto.so, these 
need to be available in variants linked against OpenSSL 1.0. These 
libraries are installed below the /opt/suse/ directory hierarchy.

The version and the APIs of these 'shadow' libraries are exactly the same 
as the versions in the system, and so are interchangeable.

For building your OpenSSL 1.0 enabled program, link using the linkflags 
-L/opt/suse/lib64 -Wl, -rpath, /opt/suse/lib64 (on 32bit systems, use lib 
instead of lib64).

This update provides variants for the OpenLDAP2 client, libcurl4 and 
cyrus-sasl libraries.

Additionally, two bugs have been fixed in openldap2 regarding IPv6 support:

    * tls_checkpeer does not work with IPv6 address as Subject Alternative
      Name. (bnc#862623)
    * getaddrinfo does not return if ldap is used for host lookups on IPv6
      environments. (bnc#843697)

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-11"/>
	<updated date="2014-04-11"/>
	<bugzilla href="https://bugzilla.suse.com/843697">SUSE bug 843697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861014">SUSE bug 861014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862623">SUSE bug 862623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864912">SUSE bug 864912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868627">SUSE bug 868627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868629">SUSE bug 868629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870444">SUSE bug 870444</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0138/">CVE-2014-0138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0138">CVE-2014-0138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0139">CVE-2014-0139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009592443" comment="compat-libldap-2_3-0-2.3.37-2.28.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592444" comment="libldap-2_4-2-2.4.26-0.28.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592445" comment="libldap-2_4-2-32bit-2.4.26-0.28.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592446" comment="libldap-2_4-2-x86-2.4.26-0.28.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592447" comment="openldap2-2.4.26-0.28.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592448" comment="openldap2-back-meta-2.4.26-0.28.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592449" comment="openldap2-client-2.4.26-0.28.5 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009592443" comment="compat-libldap-2_3-0-2.3.37-2.28.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592444" comment="libldap-2_4-2-2.4.26-0.28.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592445" comment="libldap-2_4-2-32bit-2.4.26-0.28.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592446" comment="libldap-2_4-2-x86-2.4.26-0.28.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592447" comment="openldap2-2.4.26-0.28.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592448" comment="openldap2-back-meta-2.4.26-0.28.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592449" comment="openldap2-client-2.4.26-0.28.5 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009592443" comment="compat-libldap-2_3-0-2.3.37-2.28.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592444" comment="libldap-2_4-2-2.4.26-0.28.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592445" comment="libldap-2_4-2-32bit-2.4.26-0.28.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592446" comment="libldap-2_4-2-x86-2.4.26-0.28.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592447" comment="openldap2-2.4.26-0.28.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592448" comment="openldap2-back-meta-2.4.26-0.28.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592449" comment="openldap2-client-2.4.26-0.28.5 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218459" version="1" class="patch">
	<metadata>
		<title>Recommended update for coreutils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="796243" ref_url="https://bugzilla.suse.com/796243" source="BUGZILLA"/>
		<reference ref_id="798538" ref_url="https://bugzilla.suse.com/798538" source="BUGZILLA"/>
		<reference ref_id="798541" ref_url="https://bugzilla.suse.com/798541" source="BUGZILLA"/>
		<reference ref_id="886129" ref_url="https://bugzilla.suse.com/886129" source="BUGZILLA"/>
		<reference ref_id="892862" ref_url="https://bugzilla.suse.com/892862" source="BUGZILLA"/>
		<reference ref_id="911832" ref_url="https://bugzilla.suse.com/911832" source="BUGZILLA"/>
		<reference ref_id="919809" ref_url="https://bugzilla.suse.com/919809" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0221" ref_url="https://www.suse.com/security/cve/CVE-2013-0221/" source="CVE"/>
		<reference ref_id="CVE-2013-0222" ref_url="https://www.suse.com/security/cve/CVE-2013-0222/" source="CVE"/>
		<reference ref_id="CVE-2013-0223" ref_url="https://www.suse.com/security/cve/CVE-2013-0223/" source="CVE"/>
		<reference ref_id="CVE-2014-9471" ref_url="https://www.suse.com/security/cve/CVE-2014-9471/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001364.html" source="SUSE-SU"/>
		<description>

This update for coreutils provides the following fixes and enhancements:

    * cp(1) could read from freed memory and could even make corrupt
      copies. This could happen with a very fragmented and sparse input
      file, on file systems supporting filemap extent scanning.
      (bnc#892862)
    * Improve ls(1) efficiency on large directories by caching some system
      call error codes (ENOTSUP for example) and not calling them again for
      files in the same device. (bnc#886129)

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-17"/>
	<updated date="2014-10-17"/>
	<bugzilla href="https://bugzilla.suse.com/796243">SUSE bug 796243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798538">SUSE bug 798538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798541">SUSE bug 798541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886129">SUSE bug 886129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892862">SUSE bug 892862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911832">SUSE bug 911832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919809">SUSE bug 919809</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0221/">CVE-2013-0221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0221">CVE-2013-0221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0222/">CVE-2013-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0222">CVE-2013-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0223/">CVE-2013-0223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0223">CVE-2013-0223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9471/">CVE-2014-9471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9471">CVE-2014-9471 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992678" comment="coreutils-8.12-6.25.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992679" comment="coreutils-lang-8.12-6.25.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590678" comment="coreutils-x86-8.12-6.25.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992678" comment="coreutils-8.12-6.25.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992679" comment="coreutils-lang-8.12-6.25.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590678" comment="coreutils-x86-8.12-6.25.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992678" comment="coreutils-8.12-6.25.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992679" comment="coreutils-lang-8.12-6.25.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590678" comment="coreutils-x86-8.12-6.25.31.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218460" version="1" class="patch">
	<metadata>
		<title>Security update for coreutils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1023041" ref_url="https://bugzilla.suse.com/1023041" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2616" ref_url="https://www.suse.com/security/cve/CVE-2017-2616/" source="CVE"/>
		<description>
This update for coreutils fixes one issue.

This security issue was fixed:

- CVE-2017-2616: In su with PAM support it was possible for local users to send
  SIGKILL to selected other processes with root privileges (bsc#1023041)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1023041">SUSE bug 1023041</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2616/">CVE-2017-2616 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2616">CVE-2017-2616 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577513" comment="coreutils-8.12-6.25.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577514" comment="coreutils-lang-8.12-6.25.33.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218461" version="1" class="patch">
	<metadata>
		<title>Security update for coreutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="928749" ref_url="https://bugzilla.suse.com/928749" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4041" ref_url="https://www.suse.com/security/cve/CVE-2015-4041/" source="CVE"/>
		<reference ref_id="CVE-2015-4042" ref_url="https://www.suse.com/security/cve/CVE-2015-4042/" source="CVE"/>
		<description>
This update for coreutils fixes the following issues:

Security issues fixed:

- CVE-2015-4041, CVE-2015-4042: Fixed a buffer overflow related to case conversion (bsc#928749).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-17"/>
	<updated date="2019-07-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/928749">SUSE bug 928749</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4041/">CVE-2015-4041 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4041">CVE-2015-4041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4042/">CVE-2015-4042 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4042">CVE-2015-4042 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577515" comment="coreutils-8.12-6.25.33.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577516" comment="coreutils-lang-8.12-6.25.33.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218462" version="1" class="patch">
	<metadata>
		<title>Security update for cpio</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="907456" ref_url="https://bugzilla.suse.com/907456" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9112" ref_url="https://www.suse.com/security/cve/CVE-2014-9112/" source="CVE"/>
		<description>

This cpio update fixes the following security issue:

    * bnc#907456: heap-based buffer overflow flaw in list_file()
      (CVE-2014-9112)

Security Issues:

    * CVE-2014-9112
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9112&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-04"/>
	<updated date="2014-12-04"/>
	<bugzilla href="https://bugzilla.suse.com/907456">SUSE bug 907456</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9112/">CVE-2014-9112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9112">CVE-2014-9112 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577517" comment="cpio-2.9-75.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577518" comment="cpio-lang-2.9-75.78.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577517" comment="cpio-2.9-75.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577518" comment="cpio-lang-2.9-75.78.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577517" comment="cpio-2.9-75.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577518" comment="cpio-lang-2.9-75.78.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218463" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1155199" ref_url="https://bugzilla.suse.com/1155199" source="BUGZILLA"/>
		<reference ref_id="963448" ref_url="https://bugzilla.suse.com/963448" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2037" ref_url="https://www.suse.com/security/cve/CVE-2016-2037/" source="CVE"/>
		<reference ref_id="CVE-2019-14866" ref_url="https://www.suse.com/security/cve/CVE-2019-14866/" source="CVE"/>
		<description>
This update for cpio fixes the following issues:

- CVE-2019-14866: Fixed an improper validation of the values written 
  in the header of a TAR file through the to_oct() function which could 
  have led to unexpected TAR generation (bsc#1155199).	  
- CVE-2016-2037: Fixed an out-of-bounds write in the way cpio parses 
  certain cpio files (bsc#963448).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-21"/>
	<updated date="2019-11-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155199">SUSE bug 1155199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963448">SUSE bug 963448</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-2037/">CVE-2016-2037 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2037">CVE-2016-2037 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14866/">CVE-2019-14866 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14866">CVE-2019-14866 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571037" comment="cpio-2.9-75.81.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571038" comment="cpio-lang-2.9-75.81.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218464" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189206" ref_url="https://bugzilla.suse.com/1189206" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<description>
This update for cpio fixes the following issues:

  It was possible to trigger Remote code execution due to a integer overflow (CVE-2021-38185, bsc#1189206)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-12"/>
	<updated date="2021-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189206">SUSE bug 1189206</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630756" comment="cpio-2.9-75.81.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630757" comment="cpio-lang-2.9-75.81.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218465" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189465" ref_url="https://bugzilla.suse.com/1189465" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<description>
This update for cpio fixes the following issues:

- A patch previously applied to remedy CVE-2021-38185 introduced a regression
  that had the potential to cause a segmentation fault in cpio. [bsc#1189465]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-23"/>
	<updated date="2021-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189465">SUSE bug 1189465</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631548" comment="cpio-2.9-75.81.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631549" comment="cpio-lang-2.9-75.81.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218466" version="1" class="patch">
	<metadata>
		<title>Security update for cracklib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="928923" ref_url="https://bugzilla.suse.com/928923" source="BUGZILLA"/>
		<reference ref_id="992966" ref_url="https://bugzilla.suse.com/992966" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6318" ref_url="https://www.suse.com/security/cve/CVE-2016-6318/" source="CVE"/>
		<description>

This update for cracklib fixes a security issue and a bug:

Security issue fixed:
- Add patch to fix a stack buffer overflow in GECOS parser (bsc#992966 CVE-2016-6318)

The following non security issue was fixed:
- Call textdomain in cracklib-check main function so that program
  output is translated accordingly. (bsc#928923)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-02"/>
	<updated date="2016-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/928923">SUSE bug 928923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992966">SUSE bug 992966</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6318/">CVE-2016-6318 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6318">CVE-2016-6318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571039" comment="cracklib-2.8.12-56.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571040" comment="cracklib-32bit-2.8.12-56.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218467" version="1" class="patch">
	<metadata>
		<title>Security update for cron (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1046229" ref_url="https://bugzilla.suse.com/1046229" source="BUGZILLA"/>
		<reference ref_id="1128935" ref_url="https://bugzilla.suse.com/1128935" source="BUGZILLA"/>
		<reference ref_id="1128937" ref_url="https://bugzilla.suse.com/1128937" source="BUGZILLA"/>
		<reference ref_id="932499" ref_url="https://bugzilla.suse.com/932499" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9704" ref_url="https://www.suse.com/security/cve/CVE-2019-9704/" source="CVE"/>
		<reference ref_id="CVE-2019-9705" ref_url="https://www.suse.com/security/cve/CVE-2019-9705/" source="CVE"/>
		<description>
This update for cron fixes the following issues:

Security issues fixed: 	  

- CVE-2019-9704: Fixed an insufficient check in the return value of calloc which
  could allow a local user to create Denial of Service by crashing the deamon (bsc#1128937).
- CVE-2019-9705: Fixed an implementation vulnerability which could allow a local user to
  exhaust the memory resulting in Denial of Service (bsc#1128935).

Other issues addressed: 

- Fixed an issue with SElinux where cron jobs were bocked when [permisive mode is selected (bsc#1046229).
- Removed a duplicate sprintf and made some monepage changes (bsc#932499). 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1046229">SUSE bug 1046229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128935">SUSE bug 1128935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128937">SUSE bug 1128937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932499">SUSE bug 932499</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9704/">CVE-2019-9704 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9704">CVE-2019-9704 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9705/">CVE-2019-9705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9705">CVE-2019-9705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571041" comment="cron-4.1-194.211.213.3.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218468" version="1" class="patch">
	<metadata>
		<title>Security update for ctags (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="899486" ref_url="https://bugzilla.suse.com/899486" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-7204" ref_url="https://www.suse.com/security/cve/CVE-2014-7204/" source="CVE"/>
		<description>
This update for ctags fixes the following issues:

- CVE-2014-7204: Fixes a potential denial of service caused by an endless loop in javascript parser (bsc#899486).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/899486">SUSE bug 899486</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7204/">CVE-2014-7204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7204">CVE-2014-7204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571042" comment="ctags-2013.10.2-0.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218469" version="1" class="patch">
	<metadata>
		<title>Security update for ctags (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1206543" ref_url="https://bugzilla.suse.com/1206543" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4515" ref_url="https://www.suse.com/security/cve/CVE-2022-4515/" source="CVE"/>
		<description>
This update for ctags fixes the following issues:

- CVE-2022-4515: Fixed a command injection issue via a tag file wih a
  crafted filename (bsc#1206543).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-20"/>
	<updated date="2023-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206543">SUSE bug 1206543</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4515/">CVE-2022-4515 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4515">CVE-2022-4515 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992680" comment="ctags-2013.10.2-0.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218470" version="1" class="patch">
	<metadata>
		<title>Security update for CUPS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="789566" ref_url="https://bugzilla.suse.com/789566" source="BUGZILLA"/>
		<reference ref_id="827109" ref_url="https://bugzilla.suse.com/827109" source="BUGZILLA"/>
		<reference ref_id="887240" ref_url="https://bugzilla.suse.com/887240" source="BUGZILLA"/>
		<reference ref_id="917799" ref_url="https://bugzilla.suse.com/917799" source="BUGZILLA"/>
		<reference ref_id="924208" ref_url="https://bugzilla.suse.com/924208" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5519" ref_url="https://www.suse.com/security/cve/CVE-2012-5519/" source="CVE"/>
		<reference ref_id="CVE-2014-3537" ref_url="https://www.suse.com/security/cve/CVE-2014-3537/" source="CVE"/>
		<reference ref_id="CVE-2014-5029" ref_url="https://www.suse.com/security/cve/CVE-2014-5029/" source="CVE"/>
		<reference ref_id="CVE-2014-5030" ref_url="https://www.suse.com/security/cve/CVE-2014-5030/" source="CVE"/>
		<reference ref_id="CVE-2014-5031" ref_url="https://www.suse.com/security/cve/CVE-2014-5031/" source="CVE"/>
		<reference ref_id="CVE-2014-9679" ref_url="https://www.suse.com/security/cve/CVE-2014-9679/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001422.html" source="SUSE-SU"/>
		<description>

This update fixes various issues in CUPS.

    * CVE-2014-3537 CVE-2014-5029 CVE-2014-5030 CVE-2014-5031: Various
      insufficient symbolic link checking could have lead to privilege
      escalation from the lp user to root.

Security Issues:

    * CVE-2014-3537
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537&gt;
    * CVE-2014-5029
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029&gt;
    * CVE-2014-5030
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030&gt;
    * CVE-2014-5031
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-29"/>
	<updated date="2014-07-29"/>
	<bugzilla href="https://bugzilla.suse.com/789566">SUSE bug 789566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827109">SUSE bug 827109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887240">SUSE bug 887240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917799">SUSE bug 917799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924208">SUSE bug 924208</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5519/">CVE-2012-5519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5519">CVE-2012-5519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3537/">CVE-2014-3537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3537">CVE-2014-3537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5029/">CVE-2014-5029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5029">CVE-2014-5029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5030/">CVE-2014-5030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5030">CVE-2014-5030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5031/">CVE-2014-5031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5031">CVE-2014-5031 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9679/">CVE-2014-9679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9679">CVE-2014-9679 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577519" comment="cups-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577520" comment="cups-client-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577521" comment="cups-libs-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577522" comment="cups-libs-32bit-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577523" comment="cups-libs-x86-1.3.9-8.46.52.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577519" comment="cups-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577520" comment="cups-client-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577521" comment="cups-libs-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577522" comment="cups-libs-32bit-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577523" comment="cups-libs-x86-1.3.9-8.46.52.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577519" comment="cups-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577520" comment="cups-client-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577521" comment="cups-libs-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577522" comment="cups-libs-32bit-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577523" comment="cups-libs-x86-1.3.9-8.46.52.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218471" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1096405" ref_url="https://bugzilla.suse.com/1096405" source="BUGZILLA"/>
		<reference ref_id="1096406" ref_url="https://bugzilla.suse.com/1096406" source="BUGZILLA"/>
		<reference ref_id="1096407" ref_url="https://bugzilla.suse.com/1096407" source="BUGZILLA"/>
		<reference ref_id="1096408" ref_url="https://bugzilla.suse.com/1096408" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-4180" ref_url="https://www.suse.com/security/cve/CVE-2018-4180/" source="CVE"/>
		<reference ref_id="CVE-2018-4181" ref_url="https://www.suse.com/security/cve/CVE-2018-4181/" source="CVE"/>
		<reference ref_id="CVE-2018-4182" ref_url="https://www.suse.com/security/cve/CVE-2018-4182/" source="CVE"/>
		<reference ref_id="CVE-2018-4183" ref_url="https://www.suse.com/security/cve/CVE-2018-4183/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

Security issues fixed:

- CVE-2018-4180: Fix local privilege escalation to root in dnssd backend (bsc#1096405).
- CVE-2018-4181: Limited local file reads as root via cupsd.conf include directive (bsc#1096406).
- CVE-2018-4182: Fix cups-exec sandbox bypass due to insecure error handling (bsc#1096407).
- CVE-2018-4183: Fix cups-exec sandbox bypass due to profile misconfiguration (bsc#1096408).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-07"/>
	<updated date="2018-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1096405">SUSE bug 1096405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096406">SUSE bug 1096406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096407">SUSE bug 1096407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096408">SUSE bug 1096408</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4180/">CVE-2018-4180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4180">CVE-2018-4180 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4181/">CVE-2018-4181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4181">CVE-2018-4181 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4182/">CVE-2018-4182 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4182">CVE-2018-4182 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4183/">CVE-2018-4183 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4183">CVE-2018-4183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571048" comment="cups-1.3.9-8.46.56.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571049" comment="cups-client-1.3.9-8.46.56.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571050" comment="cups-libs-1.3.9-8.46.56.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571051" comment="cups-libs-32bit-1.3.9-8.46.56.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218472" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1146358" ref_url="https://bugzilla.suse.com/1146358" source="BUGZILLA"/>
		<reference ref_id="1146359" ref_url="https://bugzilla.suse.com/1146359" source="BUGZILLA"/>
		<reference ref_id="959478" ref_url="https://bugzilla.suse.com/959478" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8675" ref_url="https://www.suse.com/security/cve/CVE-2019-8675/" source="CVE"/>
		<reference ref_id="CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

- CVE-2019-8675: Fixed a stack buffer overflow in libcups's asn1_get_type function(bsc#1146358). 
- CVE-2019-8696: Fixed a stack buffer overflow in libcups's asn1_get_packed function (bsc#1146359).	  
- Fixed a double free which was triggered by Java application (bsc#959478).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146358">SUSE bug 1146358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146359">SUSE bug 1146359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959478">SUSE bug 959478</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8675/">CVE-2019-8675 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8675">CVE-2019-8675 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8696">CVE-2019-8696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571052" comment="cups-1.3.9-8.46.56.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571053" comment="cups-client-1.3.9-8.46.56.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571054" comment="cups-libs-1.3.9-8.46.56.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571055" comment="cups-libs-32bit-1.3.9-8.46.56.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218473" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1168422" ref_url="https://bugzilla.suse.com/1168422" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3898" ref_url="https://www.suse.com/security/cve/CVE-2020-3898/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

- CVE-2020-3898: Fixed heap buffer overflow in libcups ppdFindOption() function (bsc#1168422).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-23"/>
	<updated date="2020-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168422">SUSE bug 1168422</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3898/">CVE-2020-3898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3898">CVE-2020-3898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571056" comment="cups-1.3.9-8.46.56.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571057" comment="cups-client-1.3.9-8.46.56.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571058" comment="cups-libs-1.3.9-8.46.56.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571059" comment="cups-libs-32bit-1.3.9-8.46.56.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218474" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180520" ref_url="https://bugzilla.suse.com/1180520" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10001" ref_url="https://www.suse.com/security/cve/CVE-2020-10001/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

- CVE-2020-10001: Fixed an out-of-bounds read in the ippReadIO function (bsc#1180520).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-02"/>
	<updated date="2021-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180520">SUSE bug 1180520</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10001/">CVE-2020-10001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10001">CVE-2020-10001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571060" comment="cups-1.3.9-8.46.56.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571061" comment="cups-client-1.3.9-8.46.56.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571062" comment="cups-libs-1.3.9-8.46.56.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571063" comment="cups-libs-32bit-1.3.9-8.46.56.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218475" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184161" ref_url="https://bugzilla.suse.com/1184161" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25317" ref_url="https://www.suse.com/security/cve/CVE-2021-25317/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

- CVE-2021-25317: ownership of /var/log/cups could allow privilege escalation from lp user to root via symlink attacks (bsc#1184161)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184161">SUSE bug 1184161</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-25317/">CVE-2021-25317 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25317">CVE-2021-25317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571064" comment="cups-1.3.9-8.46.56.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571065" comment="cups-client-1.3.9-8.46.56.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571066" comment="cups-libs-1.3.9-8.46.56.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571067" comment="cups-libs-32bit-1.3.9-8.46.56.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218476" version="1" class="patch">
	<metadata>
		<title>Security update for curl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="824517" ref_url="https://bugzilla.suse.com/824517" source="BUGZILLA"/>
		<reference ref_id="849596" ref_url="https://bugzilla.suse.com/849596" source="BUGZILLA"/>
		<reference ref_id="858673" ref_url="https://bugzilla.suse.com/858673" source="BUGZILLA"/>
		<reference ref_id="868627" ref_url="https://bugzilla.suse.com/868627" source="BUGZILLA"/>
		<reference ref_id="868629" ref_url="https://bugzilla.suse.com/868629" source="BUGZILLA"/>
		<reference ref_id="870444" ref_url="https://bugzilla.suse.com/870444" source="BUGZILLA"/>
		<reference ref_id="927174" ref_url="https://bugzilla.suse.com/927174" source="BUGZILLA"/>
		<reference ref_id="927556" ref_url="https://bugzilla.suse.com/927556" source="BUGZILLA"/>
		<reference ref_id="927746" ref_url="https://bugzilla.suse.com/927746" source="BUGZILLA"/>
		<reference ref_id="928533" ref_url="https://bugzilla.suse.com/928533" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2174" ref_url="https://www.suse.com/security/cve/CVE-2013-2174/" source="CVE"/>
		<reference ref_id="CVE-2013-4545" ref_url="https://www.suse.com/security/cve/CVE-2013-4545/" source="CVE"/>
		<reference ref_id="CVE-2014-0015" ref_url="https://www.suse.com/security/cve/CVE-2014-0015/" source="CVE"/>
		<reference ref_id="CVE-2014-0138" ref_url="https://www.suse.com/security/cve/CVE-2014-0138/" source="CVE"/>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<reference ref_id="CVE-2015-3143" ref_url="https://www.suse.com/security/cve/CVE-2015-3143/" source="CVE"/>
		<reference ref_id="CVE-2015-3148" ref_url="https://www.suse.com/security/cve/CVE-2015-3148/" source="CVE"/>
		<reference ref_id="CVE-2015-3153" ref_url="https://www.suse.com/security/cve/CVE-2015-3153/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001414.html" source="SUSE-SU"/>
		<description>

This curl update fixes the following security issues:

    * bnc#868627: wrong re-use of connections (CVE-2014-0138).
    * bnc#868629: IP address wildcard certificate validation
      (CVE-2014-0139).
    * bnc#870444: --insecure option inappropriately enforcing security
      safeguard.

Security Issue references:

    * CVE-2014-0138
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138&gt;
    * CVE-2014-0139
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-15"/>
	<updated date="2014-04-15"/>
	<bugzilla href="https://bugzilla.suse.com/824517">SUSE bug 824517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849596">SUSE bug 849596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858673">SUSE bug 858673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868627">SUSE bug 868627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868629">SUSE bug 868629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870444">SUSE bug 870444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927174">SUSE bug 927174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927556">SUSE bug 927556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927746">SUSE bug 927746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928533">SUSE bug 928533</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2174/">CVE-2013-2174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2174">CVE-2013-2174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4545/">CVE-2013-4545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4545">CVE-2013-4545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0015/">CVE-2014-0015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0015">CVE-2014-0015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0138/">CVE-2014-0138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0138">CVE-2014-0138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0139">CVE-2014-0139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3143/">CVE-2015-3143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3143">CVE-2015-3143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3148/">CVE-2015-3148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3148">CVE-2015-3148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3153/">CVE-2015-3153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3153">CVE-2015-3153 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577524" comment="curl-7.19.7-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577525" comment="libcurl4-7.19.7-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577526" comment="libcurl4-32bit-7.19.7-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577527" comment="libcurl4-x86-7.19.7-1.38.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577524" comment="curl-7.19.7-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577525" comment="libcurl4-7.19.7-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577526" comment="libcurl4-32bit-7.19.7-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577527" comment="libcurl4-x86-7.19.7-1.38.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577524" comment="curl-7.19.7-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577525" comment="libcurl4-7.19.7-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577526" comment="libcurl4-32bit-7.19.7-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577527" comment="libcurl4-x86-7.19.7-1.38.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218477" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="926511" ref_url="https://bugzilla.suse.com/926511" source="BUGZILLA"/>
		<reference ref_id="962983" ref_url="https://bugzilla.suse.com/962983" source="BUGZILLA"/>
		<reference ref_id="962996" ref_url="https://bugzilla.suse.com/962996" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001852.html" source="SUSE-SU"/>
		<description>

This update for curl fixes the following issues:

- CVE-2016-0755: libcurl would reuse NTLM-authenticated proxy connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer (bsc#962983)

The following non-security bugs were fixed:

- bsc#926511: Check for errors on the control connection during FTP transfers

The following tracked bugs only affect the test suite:

- bsc#962996: Expired cookie in test 46 caused test failures
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926511">SUSE bug 926511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962983">SUSE bug 962983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962996">SUSE bug 962996</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0755">CVE-2016-0755 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577528" comment="curl-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577529" comment="libcurl4-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577530" comment="libcurl4-32bit-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577531" comment="libcurl4-x86-7.19.7-1.46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577528" comment="curl-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577529" comment="libcurl4-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577530" comment="libcurl4-32bit-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577531" comment="libcurl4-x86-7.19.7-1.46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577528" comment="curl-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577529" comment="libcurl4-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577530" comment="libcurl4-32bit-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577531" comment="libcurl4-x86-7.19.7-1.46.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218478" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="991389" ref_url="https://bugzilla.suse.com/991389" source="BUGZILLA"/>
		<reference ref_id="991390" ref_url="https://bugzilla.suse.com/991390" source="BUGZILLA"/>
		<reference ref_id="997420" ref_url="https://bugzilla.suse.com/997420" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5419" ref_url="https://www.suse.com/security/cve/CVE-2016-5419/" source="CVE"/>
		<reference ref_id="CVE-2016-5420" ref_url="https://www.suse.com/security/cve/CVE-2016-5420/" source="CVE"/>
		<reference ref_id="CVE-2016-7141" ref_url="https://www.suse.com/security/cve/CVE-2016-7141/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002306.html" source="SUSE-SU"/>
		<description>

This update for curl fixes the following issues:

- CVE-2016-5419: TLS session resumption client cert bypass (bsc#991389)
- CVE-2016-5420: Re-using connections with wrong client cert (bsc#991390)
- CVE-2016-7141: Fixed incorrect reuse of client certificates (bsc#997420).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-04"/>
	<updated date="2016-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/991389">SUSE bug 991389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991390">SUSE bug 991390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997420">SUSE bug 997420</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5419/">CVE-2016-5419 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5419">CVE-2016-5419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5420/">CVE-2016-5420 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5420">CVE-2016-5420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7141/">CVE-2016-7141 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7141">CVE-2016-7141 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577532" comment="curl-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571075" comment="curl-openssl1-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577533" comment="libcurl4-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577534" comment="libcurl4-32bit-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571078" comment="libcurl4-openssl1-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571079" comment="libcurl4-openssl1-32bit-7.19.7-1.61.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577532" comment="curl-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571075" comment="curl-openssl1-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577533" comment="libcurl4-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577534" comment="libcurl4-32bit-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571078" comment="libcurl4-openssl1-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571079" comment="libcurl4-openssl1-32bit-7.19.7-1.61.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218479" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1005633" ref_url="https://bugzilla.suse.com/1005633" source="BUGZILLA"/>
		<reference ref_id="1005634" ref_url="https://bugzilla.suse.com/1005634" source="BUGZILLA"/>
		<reference ref_id="1005635" ref_url="https://bugzilla.suse.com/1005635" source="BUGZILLA"/>
		<reference ref_id="1005637" ref_url="https://bugzilla.suse.com/1005637" source="BUGZILLA"/>
		<reference ref_id="1005638" ref_url="https://bugzilla.suse.com/1005638" source="BUGZILLA"/>
		<reference ref_id="1005642" ref_url="https://bugzilla.suse.com/1005642" source="BUGZILLA"/>
		<reference ref_id="1005645" ref_url="https://bugzilla.suse.com/1005645" source="BUGZILLA"/>
		<reference ref_id="1005646" ref_url="https://bugzilla.suse.com/1005646" source="BUGZILLA"/>
		<reference ref_id="998760" ref_url="https://bugzilla.suse.com/998760" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7167" ref_url="https://www.suse.com/security/cve/CVE-2016-7167/" source="CVE"/>
		<reference ref_id="CVE-2016-8615" ref_url="https://www.suse.com/security/cve/CVE-2016-8615/" source="CVE"/>
		<reference ref_id="CVE-2016-8616" ref_url="https://www.suse.com/security/cve/CVE-2016-8616/" source="CVE"/>
		<reference ref_id="CVE-2016-8617" ref_url="https://www.suse.com/security/cve/CVE-2016-8617/" source="CVE"/>
		<reference ref_id="CVE-2016-8618" ref_url="https://www.suse.com/security/cve/CVE-2016-8618/" source="CVE"/>
		<reference ref_id="CVE-2016-8619" ref_url="https://www.suse.com/security/cve/CVE-2016-8619/" source="CVE"/>
		<reference ref_id="CVE-2016-8620" ref_url="https://www.suse.com/security/cve/CVE-2016-8620/" source="CVE"/>
		<reference ref_id="CVE-2016-8621" ref_url="https://www.suse.com/security/cve/CVE-2016-8621/" source="CVE"/>
		<reference ref_id="CVE-2016-8622" ref_url="https://www.suse.com/security/cve/CVE-2016-8622/" source="CVE"/>
		<reference ref_id="CVE-2016-8623" ref_url="https://www.suse.com/security/cve/CVE-2016-8623/" source="CVE"/>
		<reference ref_id="CVE-2016-8624" ref_url="https://www.suse.com/security/cve/CVE-2016-8624/" source="CVE"/>
		<description>
This update for curl fixes the following security issues:

- CVE-2016-8624: invalid URL parsing with '#' (bsc#1005646)
- CVE-2016-8623: Use-after-free via shared cookies (bsc#1005645)
- CVE-2016-8621: curl_getdate read out of bounds (bsc#1005642)
- CVE-2016-8619: double-free in krb5 code (bsc#1005638)
- CVE-2016-8618: double-free in curl_maprintf (bsc#1005637)
- CVE-2016-8617: OOB write via unchecked multiplication (bsc#1005635)
- CVE-2016-8616: case insensitive password comparison (bsc#1005634)
- CVE-2016-8615: cookie injection for other servers (bsc#1005633)
- CVE-2016-7167: escape and unescape integer overflows (bsc#998760)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-03"/>
	<updated date="2016-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005633">SUSE bug 1005633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005634">SUSE bug 1005634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005635">SUSE bug 1005635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005637">SUSE bug 1005637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005638">SUSE bug 1005638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005642">SUSE bug 1005642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005645">SUSE bug 1005645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005646">SUSE bug 1005646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998760">SUSE bug 998760</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7167/">CVE-2016-7167 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7167">CVE-2016-7167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8615/">CVE-2016-8615 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8615">CVE-2016-8615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8616/">CVE-2016-8616 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8616">CVE-2016-8616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8617/">CVE-2016-8617 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8617">CVE-2016-8617 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-8618/">CVE-2016-8618 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8618">CVE-2016-8618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8619/">CVE-2016-8619 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8619">CVE-2016-8619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8620/">CVE-2016-8620 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8620">CVE-2016-8620 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-8621/">CVE-2016-8621 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8621">CVE-2016-8621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8622/">CVE-2016-8622 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8622">CVE-2016-8622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8623/">CVE-2016-8623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8623">CVE-2016-8623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8624/">CVE-2016-8624 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8624">CVE-2016-8624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571080" comment="curl-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571081" comment="curl-openssl1-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571082" comment="libcurl4-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571083" comment="libcurl4-32bit-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571084" comment="libcurl4-openssl1-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571085" comment="libcurl4-openssl1-32bit-7.19.7-1.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218480" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1015332" ref_url="https://bugzilla.suse.com/1015332" source="BUGZILLA"/>
		<reference ref_id="1032309" ref_url="https://bugzilla.suse.com/1032309" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586/" source="CVE"/>
		<reference ref_id="CVE-2017-7407" ref_url="https://www.suse.com/security/cve/CVE-2017-7407/" source="CVE"/>
		<description>

This update for curl fixes the following issues:

These security issues were fixed:

- CVE-2016-9586: libcurl printf floating point buffer overflow (bsc#1015332)
- CVE-2017-7407: The ourWriteOut function in tool_writeout.c in curl might have allowed physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which lead to a heap-based buffer over-read (bsc#1032309).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015332">SUSE bug 1015332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032309">SUSE bug 1032309</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9586">CVE-2016-9586 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7407/">CVE-2017-7407 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7407">CVE-2017-7407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571086" comment="curl-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571087" comment="curl-openssl1-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571088" comment="libcurl4-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571089" comment="libcurl4-32bit-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571090" comment="libcurl4-openssl1-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571091" comment="libcurl4-openssl1-32bit-7.19.7-1.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218481" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1015332" ref_url="https://bugzilla.suse.com/1015332" source="BUGZILLA"/>
		<reference ref_id="1032309" ref_url="https://bugzilla.suse.com/1032309" source="BUGZILLA"/>
		<reference ref_id="1051644" ref_url="https://bugzilla.suse.com/1051644" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586/" source="CVE"/>
		<reference ref_id="CVE-2017-1000100" ref_url="https://www.suse.com/security/cve/CVE-2017-1000100/" source="CVE"/>
		<reference ref_id="CVE-2017-7407" ref_url="https://www.suse.com/security/cve/CVE-2017-7407/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2017-1000100: TFP sends more than buffer size and it could lead to a denial of service (bsc#1051644)

- CVE-2017-7407: ourWriteOut function problem could lead to a heap buffer over-read (bsc#1032309)

- CVE-2016-9586: libcurl printf issue could lead to buffer overflow (bsc#1015332)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-31"/>
	<updated date="2017-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015332">SUSE bug 1015332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032309">SUSE bug 1032309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051644">SUSE bug 1051644</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9586">CVE-2016-9586 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000100/">CVE-2017-1000100 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000100">CVE-2017-1000100 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7407/">CVE-2017-7407 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7407">CVE-2017-7407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571092" comment="curl-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571093" comment="curl-openssl1-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571094" comment="libcurl4-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571095" comment="libcurl4-32bit-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571096" comment="libcurl4-openssl1-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571097" comment="libcurl4-openssl1-32bit-7.19.7-1.70.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218482" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1061876" ref_url="https://bugzilla.suse.com/1061876" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000254" ref_url="https://www.suse.com/security/cve/CVE-2017-1000254/" source="CVE"/>
		<description>
This update for curl fixes the following security issues:

- CVE-2017-1000254: FTP PWD response parser out of bounds read (bsc#1061876)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-01"/>
	<updated date="2017-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1061876">SUSE bug 1061876</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000254/">CVE-2017-1000254 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000254">CVE-2017-1000254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571098" comment="curl-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571099" comment="curl-openssl1-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571100" comment="libcurl4-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571101" comment="libcurl4-32bit-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571102" comment="libcurl4-openssl1-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571103" comment="libcurl4-openssl1-32bit-7.19.7-1.70.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218483" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027712" ref_url="https://bugzilla.suse.com/1027712" source="BUGZILLA"/>
		<reference ref_id="1077001" ref_url="https://bugzilla.suse.com/1077001" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7141" ref_url="https://www.suse.com/security/cve/CVE-2016-7141/" source="CVE"/>
		<reference ref_id="CVE-2018-1000007" ref_url="https://www.suse.com/security/cve/CVE-2018-1000007/" source="CVE"/>
		<description>
This update for curl several issues.

This security issue was fixed:

- CVE-2018-1000007: Prevent leaking authentication data to third parties when following redirects (bsc#1077001)

This non-security issue was fixed:

- Set DEFAULT_SUSE as the default cipher list (bsc#1027712]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027712">SUSE bug 1027712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077001">SUSE bug 1077001</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7141/">CVE-2016-7141 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7141">CVE-2016-7141 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000007/">CVE-2018-1000007 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000007">CVE-2018-1000007 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571104" comment="curl-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571105" comment="curl-openssl1-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571106" comment="libcurl4-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571107" comment="libcurl4-32bit-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571108" comment="libcurl4-openssl1-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571109" comment="libcurl4-openssl1-32bit-7.19.7-1.70.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218484" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1081056" ref_url="https://bugzilla.suse.com/1081056" source="BUGZILLA"/>
		<reference ref_id="1083463" ref_url="https://bugzilla.suse.com/1083463" source="BUGZILLA"/>
		<reference ref_id="1084137" ref_url="https://bugzilla.suse.com/1084137" source="BUGZILLA"/>
		<reference ref_id="1084521" ref_url="https://bugzilla.suse.com/1084521" source="BUGZILLA"/>
		<reference ref_id="1084524" ref_url="https://bugzilla.suse.com/1084524" source="BUGZILLA"/>
		<reference ref_id="1084532" ref_url="https://bugzilla.suse.com/1084532" source="BUGZILLA"/>
		<reference ref_id="1085124" ref_url="https://bugzilla.suse.com/1085124" source="BUGZILLA"/>
		<reference ref_id="1086825" ref_url="https://bugzilla.suse.com/1086825" source="BUGZILLA"/>
		<reference ref_id="1087922" ref_url="https://bugzilla.suse.com/1087922" source="BUGZILLA"/>
		<reference ref_id="1090194" ref_url="https://bugzilla.suse.com/1090194" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000120" ref_url="https://www.suse.com/security/cve/CVE-2018-1000120/" source="CVE"/>
		<reference ref_id="CVE-2018-1000121" ref_url="https://www.suse.com/security/cve/CVE-2018-1000121/" source="CVE"/>
		<reference ref_id="CVE-2018-1000122" ref_url="https://www.suse.com/security/cve/CVE-2018-1000122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004059.html" source="SUSE-SU"/>
		<description>


This update for curl fixes the following issues:

curl was updated to version 7.37.0 (fate#325339 bsc#1084137)

This update syncs the curl version to the one in SUSE Linux Enterprise 12
and is full binary compatible to the previous version.

This update is done to allow other third party software like 'R' to 
be able to be used on the SUSE Linux Enterprise 11 codebase.

Following security issues were fixed:

- CVE-2018-1000120: A buffer overflow exists in the FTP URL handling that allowed an attacker to cause a denial of service or possible code execution (bsc#1084521).
- CVE-2018-1000121: A NULL pointer dereference exists in the LDAP code that allowed an attacker to cause a denial of service (bsc#1084524).
- CVE-2018-1000122: A buffer over-read exists in the RTSP+RTP handling code that allowed an attacker to cause a denial of service or information leakage (bsc#1084532).

The package also requires a libopenssl that implements the DEFAULT_SUSE cipher list
(bsc#1081056, bsc#1083463,bsc#1086825)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081056">SUSE bug 1081056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083463">SUSE bug 1083463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084137">SUSE bug 1084137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084521">SUSE bug 1084521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084524">SUSE bug 1084524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084532">SUSE bug 1084532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085124">SUSE bug 1085124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086825">SUSE bug 1086825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087922">SUSE bug 1087922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090194">SUSE bug 1090194</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000120/">CVE-2018-1000120 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000120">CVE-2018-1000120 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000121/">CVE-2018-1000121 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000121">CVE-2018-1000121 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000122/">CVE-2018-1000122 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000122">CVE-2018-1000122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577535" comment="curl-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571111" comment="curl-openssl1-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577536" comment="libcurl4-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577537" comment="libcurl4-32bit-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571114" comment="libcurl4-openssl1-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571115" comment="libcurl4-openssl1-32bit-7.37.0-70.27.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577535" comment="curl-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571111" comment="curl-openssl1-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577536" comment="libcurl4-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577537" comment="libcurl4-32bit-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571114" comment="libcurl4-openssl1-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571115" comment="libcurl4-openssl1-32bit-7.37.0-70.27.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218485" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1092098" ref_url="https://bugzilla.suse.com/1092098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000301" ref_url="https://www.suse.com/security/cve/CVE-2018-1000301/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-1000301: Fixed a buffer over-read caused by bad RTSP headers (bsc#1092098)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-30"/>
	<updated date="2018-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092098">SUSE bug 1092098</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000301/">CVE-2018-1000301 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000301">CVE-2018-1000301 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571116" comment="curl-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571117" comment="curl-openssl1-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571118" comment="libcurl4-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571119" comment="libcurl4-32bit-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571120" comment="libcurl4-openssl1-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571121" comment="libcurl4-openssl1-32bit-7.37.0-70.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218486" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1106019" ref_url="https://bugzilla.suse.com/1106019" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14618" ref_url="https://www.suse.com/security/cve/CVE-2018-14618/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-14618: Prevent integer overflow in the NTLM authentication code
  (bsc#1106019).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-14"/>
	<updated date="2018-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106019">SUSE bug 1106019</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14618/">CVE-2018-14618 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14618">CVE-2018-14618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571122" comment="curl-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571123" comment="curl-openssl1-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571124" comment="libcurl4-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571125" comment="libcurl4-32bit-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571126" comment="libcurl4-openssl1-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571127" comment="libcurl4-openssl1-32bit-7.37.0-70.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218487" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1112758" ref_url="https://bugzilla.suse.com/1112758" source="BUGZILLA"/>
		<reference ref_id="1113660" ref_url="https://bugzilla.suse.com/1113660" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16840" ref_url="https://www.suse.com/security/cve/CVE-2018-16840/" source="CVE"/>
		<reference ref_id="CVE-2018-16842" ref_url="https://www.suse.com/security/cve/CVE-2018-16842/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-16840: A use-after-free in SASL handle close was fixed (bsc#1112758)
- CVE-2018-16842: A Out-of-bounds Read in tool_msgs.c was fixed which could lead to crashes (bsc#1113660)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-08"/>
	<updated date="2018-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113660">SUSE bug 1113660</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16840/">CVE-2018-16840 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16840">CVE-2018-16840 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16842/">CVE-2018-16842 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16842">CVE-2018-16842 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571128" comment="curl-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571129" comment="curl-openssl1-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577538" comment="libcurl-devel-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571130" comment="libcurl4-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571131" comment="libcurl4-32bit-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571132" comment="libcurl4-openssl1-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571133" comment="libcurl4-openssl1-32bit-7.37.0-70.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218488" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1135170" ref_url="https://bugzilla.suse.com/1135170" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5436" ref_url="https://www.suse.com/security/cve/CVE-2019-5436/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5436: Fixed a heap buffer overflow exists in tftp_receive_packet that receives data from a TFTP server (bsc#1135170).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-24"/>
	<updated date="2019-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135170">SUSE bug 1135170</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5436/">CVE-2019-5436 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5436">CVE-2019-5436 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571134" comment="curl-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571135" comment="curl-openssl1-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577539" comment="libcurl-devel-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571136" comment="libcurl4-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571137" comment="libcurl4-32bit-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571138" comment="libcurl4-openssl1-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571139" comment="libcurl4-openssl1-32bit-7.37.0-70.41.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218489" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1149496" ref_url="https://bugzilla.suse.com/1149496" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5482: Fixed a TFTP small blocksize heap buffer overflow (bsc#1149496).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5482">CVE-2019-5482 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571140" comment="curl-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571141" comment="curl-openssl1-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577540" comment="libcurl-devel-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571142" comment="libcurl4-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571143" comment="libcurl4-32bit-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571144" comment="libcurl4-openssl1-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571145" comment="libcurl4-openssl1-32bit-7.37.0-70.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218490" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1173027" ref_url="https://bugzilla.suse.com/1173027" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2020-8177: Fixed an issue where curl could have been tricked by a malicious 
  server to overwrite a local file when using the -J option (bsc#1173027). 	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-24"/>
	<updated date="2020-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173027">SUSE bug 1173027</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8177">CVE-2020-8177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571146" comment="curl-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571147" comment="curl-openssl1-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577541" comment="libcurl-devel-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571148" comment="libcurl4-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571149" comment="libcurl4-32bit-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571150" comment="libcurl4-openssl1-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571151" comment="libcurl4-openssl1-32bit-7.37.0-70.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218491" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1175109" ref_url="https://bugzilla.suse.com/1175109" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8231" ref_url="https://www.suse.com/security/cve/CVE-2020-8231/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- An application that performs multiple requests with libcurl's
  multi API and sets the 'CURLOPT_CONNECT_ONLY' option, might in
  rare circumstances experience that when subsequently using the
  setup connect-only transfer, libcurl will pick and use the wrong
  connection and instead pick another one the application has
  created since then. [bsc#1175109, CVE-2020-8231]
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175109">SUSE bug 1175109</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8231/">CVE-2020-8231 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8231">CVE-2020-8231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571152" comment="curl-7.37.0-70.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571153" comment="curl-openssl1-7.37.0-70.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577542" comment="libcurl-devel-7.37.0-70.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571154" comment="libcurl4-7.37.0-70.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571155" comment="libcurl4-32bit-7.37.0-70.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571156" comment="libcurl4-openssl1-7.37.0-70.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571157" comment="libcurl4-openssl1-32bit-7.37.0-70.52.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218492" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179398" ref_url="https://bugzilla.suse.com/1179398" source="BUGZILLA"/>
		<reference ref_id="1179399" ref_url="https://bugzilla.suse.com/1179399" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8284" ref_url="https://www.suse.com/security/cve/CVE-2020-8284/" source="CVE"/>
		<reference ref_id="CVE-2020-8285" ref_url="https://www.suse.com/security/cve/CVE-2020-8285/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2020-8284: Fixed an issue where a malicious FTP server could make curl connect to a different IP (bsc#1179398).
- CVE-2020-8285: Fixed an FTP wildcard stack overflow (bsc#1179399).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-21"/>
	<updated date="2020-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179398">SUSE bug 1179398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179399">SUSE bug 1179399</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8284/">CVE-2020-8284 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8284">CVE-2020-8284 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8285/">CVE-2020-8285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8285">CVE-2020-8285 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571158" comment="curl-7.37.0-70.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571159" comment="curl-openssl1-7.37.0-70.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577543" comment="libcurl-devel-7.37.0-70.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571160" comment="libcurl4-7.37.0-70.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571161" comment="libcurl4-32bit-7.37.0-70.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571162" comment="libcurl4-openssl1-7.37.0-70.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571163" comment="libcurl4-openssl1-32bit-7.37.0-70.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218493" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1183933" ref_url="https://bugzilla.suse.com/1183933" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22876" ref_url="https://www.suse.com/security/cve/CVE-2021-22876/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22876: Fixed an issue where the automatic referer was leaking credentials (bsc#1183933).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183933">SUSE bug 1183933</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22876/">CVE-2021-22876 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22876">CVE-2021-22876 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571164" comment="curl-7.37.0-70.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571165" comment="curl-openssl1-7.37.0-70.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577544" comment="libcurl-devel-7.37.0-70.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571166" comment="libcurl4-7.37.0-70.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571167" comment="libcurl4-32bit-7.37.0-70.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571168" comment="libcurl4-openssl1-7.37.0-70.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571169" comment="libcurl4-openssl1-32bit-7.37.0-70.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218494" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186114" ref_url="https://bugzilla.suse.com/1186114" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22898" ref_url="https://www.suse.com/security/cve/CVE-2021-22898/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22898: Fixed curl TELNET stack contents disclosure (bsc#1186114).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-26"/>
	<updated date="2021-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186114">SUSE bug 1186114</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22898/">CVE-2021-22898 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22898">CVE-2021-22898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571170" comment="curl-7.37.0-70.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571171" comment="curl-openssl1-7.37.0-70.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577545" comment="libcurl-devel-7.37.0-70.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571172" comment="libcurl4-7.37.0-70.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571173" comment="libcurl4-32bit-7.37.0-70.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571174" comment="libcurl4-openssl1-7.37.0-70.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571175" comment="libcurl4-openssl1-32bit-7.37.0-70.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218495" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186114" ref_url="https://bugzilla.suse.com/1186114" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22898" ref_url="https://www.suse.com/security/cve/CVE-2021-22898/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22898: Fixed curl TELNET stack contents disclosure (bsc#1186114).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-30"/>
	<updated date="2021-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186114">SUSE bug 1186114</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22898/">CVE-2021-22898 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22898">CVE-2021-22898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571176" comment="curl-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571177" comment="curl-openssl1-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577546" comment="libcurl-devel-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571178" comment="libcurl4-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571179" comment="libcurl4-32bit-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571180" comment="libcurl4-openssl1-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571181" comment="libcurl4-openssl1-32bit-7.37.0-70.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218496" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188217" ref_url="https://bugzilla.suse.com/1188217" source="BUGZILLA"/>
		<reference ref_id="1188218" ref_url="https://bugzilla.suse.com/1188218" source="BUGZILLA"/>
		<reference ref_id="1188219" ref_url="https://bugzilla.suse.com/1188219" source="BUGZILLA"/>
		<reference ref_id="1188220" ref_url="https://bugzilla.suse.com/1188220" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22922" ref_url="https://www.suse.com/security/cve/CVE-2021-22922/" source="CVE"/>
		<reference ref_id="CVE-2021-22923" ref_url="https://www.suse.com/security/cve/CVE-2021-22923/" source="CVE"/>
		<reference ref_id="CVE-2021-22924" ref_url="https://www.suse.com/security/cve/CVE-2021-22924/" source="CVE"/>
		<reference ref_id="CVE-2021-22925" ref_url="https://www.suse.com/security/cve/CVE-2021-22925/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22925: TELNET stack contents disclosure again. (bsc#1188220)
- CVE-2021-22924: Bad connection reuse due to flawed path name checks. (bsc#1188219)
- CVE-2021-22923: Insufficiently Protected Credentials. (bsc#1188218)
- CVE-2021-22922: Wrong content via metalink not discarded. (bsc#1188217)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188217">SUSE bug 1188217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188218">SUSE bug 1188218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188219">SUSE bug 1188219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188220">SUSE bug 1188220</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22922/">CVE-2021-22922 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22922">CVE-2021-22922 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22923/">CVE-2021-22923 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22923">CVE-2021-22923 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22924/">CVE-2021-22924 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22924">CVE-2021-22924 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22925/">CVE-2021-22925 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22925">CVE-2021-22925 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626169" comment="curl-7.37.0-70.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626170" comment="curl-openssl1-7.37.0-70.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626175" comment="libcurl-devel-7.37.0-70.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626171" comment="libcurl4-7.37.0-70.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626172" comment="libcurl4-32bit-7.37.0-70.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626173" comment="libcurl4-openssl1-7.37.0-70.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626174" comment="libcurl4-openssl1-32bit-7.37.0-70.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218497" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1190373" ref_url="https://bugzilla.suse.com/1190373" source="BUGZILLA"/>
		<reference ref_id="1190374" ref_url="https://bugzilla.suse.com/1190374" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22946" ref_url="https://www.suse.com/security/cve/CVE-2021-22946/" source="CVE"/>
		<reference ref_id="CVE-2021-22947" ref_url="https://www.suse.com/security/cve/CVE-2021-22947/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22947: Fixed STARTTLS protocol injection via MITM (bsc#1190374).
- CVE-2021-22946: Fixed protocol downgrade required TLS bypassed (bsc#1190373).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190373">SUSE bug 1190373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190374">SUSE bug 1190374</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22946/">CVE-2021-22946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22946">CVE-2021-22946 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22947/">CVE-2021-22947 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22947">CVE-2021-22947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633950" comment="curl-7.37.0-70.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633951" comment="curl-openssl1-7.37.0-70.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633956" comment="libcurl-devel-7.37.0-70.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633952" comment="libcurl4-7.37.0-70.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633953" comment="libcurl4-32bit-7.37.0-70.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633954" comment="libcurl4-openssl1-7.37.0-70.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633955" comment="libcurl4-openssl1-32bit-7.37.0-70.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218498" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198614" ref_url="https://bugzilla.suse.com/1198614" source="BUGZILLA"/>
		<reference ref_id="1198766" ref_url="https://bugzilla.suse.com/1198766" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22576" ref_url="https://www.suse.com/security/cve/CVE-2022-22576/" source="CVE"/>
		<reference ref_id="CVE-2022-27776" ref_url="https://www.suse.com/security/cve/CVE-2022-27776/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2022-27776: Fixed Auth/cookie leak on redirect (bsc#1198766)
- CVE-2022-22576: Fixed OAUTH2 bearer bypass in connection re-use (bsc#1198614)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198614">SUSE bug 1198614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198766">SUSE bug 1198766</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22576/">CVE-2022-22576 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22576">CVE-2022-22576 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27776/">CVE-2022-27776 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27776">CVE-2022-27776 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682695" comment="curl-7.37.0-70.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682696" comment="curl-openssl1-7.37.0-70.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682697" comment="libcurl-devel-7.37.0-70.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682698" comment="libcurl4-7.37.0-70.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682699" comment="libcurl4-32bit-7.37.0-70.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682700" comment="libcurl4-openssl1-7.37.0-70.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682701" comment="libcurl4-openssl1-32bit-7.37.0-70.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218499" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199223" ref_url="https://bugzilla.suse.com/1199223" source="BUGZILLA"/>
		<reference ref_id="1199224" ref_url="https://bugzilla.suse.com/1199224" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27781" ref_url="https://www.suse.com/security/cve/CVE-2022-27781/" source="CVE"/>
		<reference ref_id="CVE-2022-27782" ref_url="https://www.suse.com/security/cve/CVE-2022-27782/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2022-27781: Fixed CERTINFO never-ending busy-loop (bsc#1199223)
- CVE-2022-27782: Fixed TLS and SSH connection too eager reuse (bsc#1199224)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199223">SUSE bug 1199223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199224">SUSE bug 1199224</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-27781/">CVE-2022-27781 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27781">CVE-2022-27781 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27782/">CVE-2022-27782 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27782">CVE-2022-27782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992681" comment="curl-7.37.0-70.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992682" comment="curl-openssl1-7.37.0-70.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992683" comment="libcurl-devel-7.37.0-70.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992684" comment="libcurl4-7.37.0-70.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992685" comment="libcurl4-32bit-7.37.0-70.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992686" comment="libcurl4-openssl1-7.37.0-70.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992687" comment="libcurl4-openssl1-32bit-7.37.0-70.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218500" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1200737" ref_url="https://bugzilla.suse.com/1200737" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32208" ref_url="https://www.suse.com/security/cve/CVE-2022-32208/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2022-32208: FTP-KRB bad message verification (bsc#1200737)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-06"/>
	<updated date="2022-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200737">SUSE bug 1200737</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32208/">CVE-2022-32208 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32208">CVE-2022-32208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992688" comment="curl-7.37.0-70.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992689" comment="curl-openssl1-7.37.0-70.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992690" comment="libcurl-devel-7.37.0-70.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992691" comment="libcurl4-7.37.0-70.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992692" comment="libcurl4-32bit-7.37.0-70.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992693" comment="libcurl4-openssl1-7.37.0-70.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992694" comment="libcurl4-openssl1-32bit-7.37.0-70.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218501" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1202593" ref_url="https://bugzilla.suse.com/1202593" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-35252" ref_url="https://www.suse.com/security/cve/CVE-2022-35252/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2022-35252: Fixed a potential injection of control characters
  into cookies, which could be exploited by sister sites to cause a
  denial of service (bsc#1202593).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-02"/>
	<updated date="2022-09-02"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1202593">SUSE bug 1202593</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-35252/">CVE-2022-35252 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35252">CVE-2022-35252 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992695" comment="curl-7.37.0-70.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992696" comment="curl-openssl1-7.37.0-70.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992697" comment="libcurl-devel-7.37.0-70.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992698" comment="libcurl4-7.37.0-70.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992699" comment="libcurl4-32bit-7.37.0-70.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992700" comment="libcurl4-openssl1-7.37.0-70.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992701" comment="libcurl4-openssl1-32bit-7.37.0-70.86.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218502" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204383" ref_url="https://bugzilla.suse.com/1204383" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32221" ref_url="https://www.suse.com/security/cve/CVE-2022-32221/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

  - CVE-2022-32221: Fixed POST following PUT confusion (bsc#1204383).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-26"/>
	<updated date="2022-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204383">SUSE bug 1204383</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-32221/">CVE-2022-32221 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32221">CVE-2022-32221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992702" comment="curl-7.37.0-70.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992703" comment="curl-openssl1-7.37.0-70.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992704" comment="libcurl-devel-7.37.0-70.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992705" comment="libcurl4-7.37.0-70.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992706" comment="libcurl4-32bit-7.37.0-70.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992707" comment="libcurl4-openssl1-7.37.0-70.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992708" comment="libcurl4-openssl1-32bit-7.37.0-70.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218503" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204383" ref_url="https://bugzilla.suse.com/1204383" source="BUGZILLA"/>
		<reference ref_id="1206309" ref_url="https://bugzilla.suse.com/1206309" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32221" ref_url="https://www.suse.com/security/cve/CVE-2022-32221/" source="CVE"/>
		<reference ref_id="CVE-2022-43552" ref_url="https://www.suse.com/security/cve/CVE-2022-43552/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2022-43552: HTTP Proxy deny use-after-free (bsc#1206309).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-21"/>
	<updated date="2022-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1204383">SUSE bug 1204383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206309">SUSE bug 1206309</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-32221/">CVE-2022-32221 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32221">CVE-2022-32221 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-43552/">CVE-2022-43552 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43552">CVE-2022-43552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992709" comment="curl-7.37.0-70.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992710" comment="curl-openssl1-7.37.0-70.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992711" comment="libcurl-devel-7.37.0-70.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992712" comment="libcurl4-7.37.0-70.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992713" comment="libcurl4-32bit-7.37.0-70.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992714" comment="libcurl4-openssl1-7.37.0-70.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992715" comment="libcurl4-openssl1-32bit-7.37.0-70.92.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218504" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1209209" ref_url="https://bugzilla.suse.com/1209209" source="BUGZILLA"/>
		<reference ref_id="1209210" ref_url="https://bugzilla.suse.com/1209210" source="BUGZILLA"/>
		<reference ref_id="1209211" ref_url="https://bugzilla.suse.com/1209211" source="BUGZILLA"/>
		<reference ref_id="1209212" ref_url="https://bugzilla.suse.com/1209212" source="BUGZILLA"/>
		<reference ref_id="1209214" ref_url="https://bugzilla.suse.com/1209214" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-27533" ref_url="https://www.suse.com/security/cve/CVE-2023-27533/" source="CVE"/>
		<reference ref_id="CVE-2023-27534" ref_url="https://www.suse.com/security/cve/CVE-2023-27534/" source="CVE"/>
		<reference ref_id="CVE-2023-27535" ref_url="https://www.suse.com/security/cve/CVE-2023-27535/" source="CVE"/>
		<reference ref_id="CVE-2023-27536" ref_url="https://www.suse.com/security/cve/CVE-2023-27536/" source="CVE"/>
		<reference ref_id="CVE-2023-27538" ref_url="https://www.suse.com/security/cve/CVE-2023-27538/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2023-27533: Fixed TELNET option IAC injection (bsc#1209209)
- CVE-2023-27534: Fixed SFTP path ~ resolving discrepancy (bsc#1209210)
- CVE-2023-27535: Fixed FTP too eager connection reuse (bsc#1209211)
- CVE-2023-27536: Fixed GSS delegation too eager connection re-use (bsc#1209212)
- CVE-2023-27538: Fixed SSH connection too eager reuse still (bsc#1209214)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-22"/>
	<updated date="2023-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209209">SUSE bug 1209209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209210">SUSE bug 1209210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209211">SUSE bug 1209211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209212">SUSE bug 1209212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209214">SUSE bug 1209214</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-27533/">CVE-2023-27533 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27533">CVE-2023-27533 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-27534/">CVE-2023-27534 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27534">CVE-2023-27534 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-27535/">CVE-2023-27535 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27535">CVE-2023-27535 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-27536/">CVE-2023-27536 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27536">CVE-2023-27536 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-27538/">CVE-2023-27538 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27538">CVE-2023-27538 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992716" comment="curl-7.37.0-70.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992717" comment="curl-openssl1-7.37.0-70.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992718" comment="libcurl-devel-7.37.0-70.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992719" comment="libcurl4-7.37.0-70.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992720" comment="libcurl4-32bit-7.37.0-70.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992721" comment="libcurl4-openssl1-7.37.0-70.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992722" comment="libcurl4-openssl1-32bit-7.37.0-70.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218505" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1211231" ref_url="https://bugzilla.suse.com/1211231" source="BUGZILLA"/>
		<reference ref_id="1211232" ref_url="https://bugzilla.suse.com/1211232" source="BUGZILLA"/>
		<reference ref_id="1211233" ref_url="https://bugzilla.suse.com/1211233" source="BUGZILLA"/>
		<reference ref_id="1211339" ref_url="https://bugzilla.suse.com/1211339" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28320" ref_url="https://www.suse.com/security/cve/CVE-2023-28320/" source="CVE"/>
		<reference ref_id="CVE-2023-28321" ref_url="https://www.suse.com/security/cve/CVE-2023-28321/" source="CVE"/>
		<reference ref_id="CVE-2023-28322" ref_url="https://www.suse.com/security/cve/CVE-2023-28322/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2023-28320: Fixed siglongjmp race condition (bsc#1211231).
- CVE-2023-28321: Fixed IDN wildcard matching (bsc#1211232).
- CVE-2023-28322: Fixed POST-after-PUT confusion (bsc#1211233).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-17"/>
	<updated date="2023-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211231">SUSE bug 1211231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211232">SUSE bug 1211232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211233">SUSE bug 1211233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211339">SUSE bug 1211339</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28320/">CVE-2023-28320 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28320">CVE-2023-28320 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28321/">CVE-2023-28321 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28321">CVE-2023-28321 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28322/">CVE-2023-28322 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28322">CVE-2023-28322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992723" comment="curl-7.37.0-70.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992724" comment="curl-openssl1-7.37.0-70.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992725" comment="libcurl-devel-7.37.0-70.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992726" comment="libcurl4-7.37.0-70.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992727" comment="libcurl4-32bit-7.37.0-70.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992728" comment="libcurl4-openssl1-7.37.0-70.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992729" comment="libcurl4-openssl1-32bit-7.37.0-70.102.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218506" version="1" class="patch">
	<metadata>
		<title>Security update for curl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="870444" ref_url="https://bugzilla.suse.com/870444" source="BUGZILLA"/>
		<reference ref_id="884698" ref_url="https://bugzilla.suse.com/884698" source="BUGZILLA"/>
		<reference ref_id="885302" ref_url="https://bugzilla.suse.com/885302" source="BUGZILLA"/>
		<reference ref_id="894575" ref_url="https://bugzilla.suse.com/894575" source="BUGZILLA"/>
		<reference ref_id="897816" ref_url="https://bugzilla.suse.com/897816" source="BUGZILLA"/>
		<reference ref_id="901924" ref_url="https://bugzilla.suse.com/901924" source="BUGZILLA"/>
		<reference ref_id="911363" ref_url="https://bugzilla.suse.com/911363" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3613" ref_url="https://www.suse.com/security/cve/CVE-2014-3613/" source="CVE"/>
		<reference ref_id="CVE-2014-3707" ref_url="https://www.suse.com/security/cve/CVE-2014-3707/" source="CVE"/>
		<reference ref_id="CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150/" source="CVE"/>
		<description>

This update fixes the following security issues:

    * 

      CVE-2014-8150: URL request injection (bnc#911363)

      When libcurl sends a request to a server via a HTTP proxy, it copies
      the entire URL into the request and sends if off.

      If the given URL contains line feeds and carriage returns those will
      be sent along to the proxy too, which allows the program to for
      example send a separate HTTP request injected embedded in the URL.

    * 

      CVE-2014-3707: duphandle read out of bounds (bnc#901924)

    * 

      CVE-2014-3613: libcurl cookie leaks (bnc#894575)

Additional bug fixed:

    * curl_multi_remove_handle: don't crash on multiple removes
      (bnc#897816)

Security Issues:

    * CVE-2014-8150
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150&gt;
    * CVE-2014-3613
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613&gt;
    * CVE-2014-3707
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3707&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-13"/>
	<updated date="2015-01-13"/>
	<bugzilla href="https://bugzilla.suse.com/870444">SUSE bug 870444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884698">SUSE bug 884698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885302">SUSE bug 885302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894575">SUSE bug 894575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897816">SUSE bug 897816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901924">SUSE bug 901924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911363">SUSE bug 911363</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3613/">CVE-2014-3613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3613">CVE-2014-3613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3707/">CVE-2014-3707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3707">CVE-2014-3707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8150">CVE-2014-8150 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577547" comment="curl-7.19.7-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577548" comment="libcurl4-7.19.7-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577549" comment="libcurl4-32bit-7.19.7-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577550" comment="libcurl4-x86-7.19.7-1.40.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577547" comment="curl-7.19.7-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577548" comment="libcurl4-7.19.7-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577549" comment="libcurl4-32bit-7.19.7-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577550" comment="libcurl4-x86-7.19.7-1.40.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577547" comment="curl-7.19.7-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577548" comment="libcurl4-7.19.7-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577549" comment="libcurl4-32bit-7.19.7-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577550" comment="libcurl4-x86-7.19.7-1.40.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218507" version="1" class="patch">
	<metadata>
		<title>Security update for cvs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1053364" ref_url="https://bugzilla.suse.com/1053364" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12836" ref_url="https://www.suse.com/security/cve/CVE-2017-12836/" source="CVE"/>
		<description>
This update for cvs fixes the following issues:

  - CVE-2017-12836: A leading dash in the argument of the '-d' option could lead to argument injection (bsc#1053364)

  		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-12"/>
	<updated date="2017-09-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1053364">SUSE bug 1053364</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12836/">CVE-2017-12836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12836">CVE-2017-12836 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571184" comment="cvs-1.12.12-144.23.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571185" comment="cvs-doc-1.12.12-144.23.5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218508" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-imapd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="860611" ref_url="https://bugzilla.suse.com/860611" source="BUGZILLA"/>
		<reference ref_id="901748" ref_url="https://bugzilla.suse.com/901748" source="BUGZILLA"/>
		<reference ref_id="954200" ref_url="https://bugzilla.suse.com/954200" source="BUGZILLA"/>
		<reference ref_id="954201" ref_url="https://bugzilla.suse.com/954201" source="BUGZILLA"/>
		<reference ref_id="981670" ref_url="https://bugzilla.suse.com/981670" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2015-8076" ref_url="https://www.suse.com/security/cve/CVE-2015-8076/" source="CVE"/>
		<reference ref_id="CVE-2015-8077" ref_url="https://www.suse.com/security/cve/CVE-2015-8077/" source="CVE"/>
		<reference ref_id="CVE-2015-8078" ref_url="https://www.suse.com/security/cve/CVE-2015-8078/" source="CVE"/>
		<description>

This update for cyrus-imapd fixes the following issues:

- Previous versions of cyrus-imapd would not allow its users to disable old SSL
  variants that are vulnerable to attacks like BEAST and POODLE. This patch
  adds the configuration option 'tls_versions' to remedy that issue. Note that
  users who upgrade an existing installation will *not* have their imapd.conf
  file overwritten, i.e. their IMAP server will continue to support SSLv2 and
  SSLv3 like before. To disable support for those protocols, edit imapd.conf
  manually to include 'tls_versions: tls1_0 tls1_1 tls1_2'. New installations,
  however, will have an imapd.conf file that contains these settings already,
  i.e. newly installed IMAP servers do *not* support unsafe versions of SSL
  unless that support is explicitly enabled by the user. (bsc#901748)

- An integer overflow vulnerability in cyrus-imapd's urlfetch range checking
  code was fixed. (CVE-2015-8076, CVE-2015-8077, CVE-2015-8078, bsc#981670,
  bsc#954200, bsc#954201)

- Support for Elliptic Curve Diffie–Hellman (ECDH) has been added to
  cyrus-imapd. (bsc#860611)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-01"/>
	<updated date="2016-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/860611">SUSE bug 860611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901748">SUSE bug 901748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954200">SUSE bug 954200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954201">SUSE bug 954201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981670">SUSE bug 981670</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8076/">CVE-2015-8076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8076">CVE-2015-8076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8077/">CVE-2015-8077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8077">CVE-2015-8077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8078/">CVE-2015-8078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8078">CVE-2015-8078 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571189" comment="cyrus-imapd-2.3.11-60.65.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571190" comment="perl-Cyrus-IMAP-2.3.11-60.65.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571191" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218509" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-imapd (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1058021" ref_url="https://bugzilla.suse.com/1058021" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14230" ref_url="https://www.suse.com/security/cve/CVE-2017-14230/" source="CVE"/>
		<description>
This update for cyrus-imapd fixes the following issues:

Security issue fixed:

- CVE-2017-14230: Fixed a off-by-one error in prefix calculation for the LIST command that could cause use of uninitialized memory (bsc#1058021).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-05"/>
	<updated date="2020-11-05"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1058021">SUSE bug 1058021</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14230/">CVE-2017-14230 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14230">CVE-2017-14230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571192" comment="cyrus-imapd-2.3.11-60.65.71.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571193" comment="perl-Cyrus-IMAP-2.3.11-60.65.71.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571194" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.71.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218510" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-imapd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189313" ref_url="https://bugzilla.suse.com/1189313" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33582" ref_url="https://www.suse.com/security/cve/CVE-2021-33582/" source="CVE"/>
		<description>
This update for cyrus-imapd fixes the following issues:

- CVE-2021-33582: Fixed possible hash denial of service (bsc#1189313).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-09"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189313">SUSE bug 1189313</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33582/">CVE-2021-33582 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33582">CVE-2021-33582 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632634" comment="cyrus-imapd-2.3.11-60.65.71.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632635" comment="perl-Cyrus-IMAP-2.3.11-60.65.71.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632636" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.71.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218511" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1159635" ref_url="https://bugzilla.suse.com/1159635" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19906" ref_url="https://www.suse.com/security/cve/CVE-2019-19906/" source="CVE"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2019-19906: Fixed an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet (bsc#1159635).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-17"/>
	<updated date="2020-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159635">SUSE bug 1159635</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19906/">CVE-2019-19906 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19906">CVE-2019-19906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577551" comment="cyrus-sasl-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577552" comment="cyrus-sasl-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577553" comment="cyrus-sasl-crammd5-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577554" comment="cyrus-sasl-crammd5-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577555" comment="cyrus-sasl-digestmd5-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577556" comment="cyrus-sasl-digestmd5-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577557" comment="cyrus-sasl-gssapi-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577558" comment="cyrus-sasl-gssapi-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571195" comment="cyrus-sasl-openssl1-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571196" comment="cyrus-sasl-openssl1-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571197" comment="cyrus-sasl-openssl1-crammd5-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571198" comment="cyrus-sasl-openssl1-crammd5-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571199" comment="cyrus-sasl-openssl1-digestmd5-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571200" comment="cyrus-sasl-openssl1-digestmd5-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571201" comment="cyrus-sasl-openssl1-gssapi-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571202" comment="cyrus-sasl-openssl1-gssapi-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571203" comment="cyrus-sasl-openssl1-ntlm-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571204" comment="cyrus-sasl-openssl1-otp-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571205" comment="cyrus-sasl-openssl1-otp-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571206" comment="cyrus-sasl-openssl1-plain-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571207" comment="cyrus-sasl-openssl1-plain-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577559" comment="cyrus-sasl-otp-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577560" comment="cyrus-sasl-otp-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577561" comment="cyrus-sasl-plain-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577562" comment="cyrus-sasl-plain-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577563" comment="cyrus-sasl-saslauthd-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577564" comment="cyrus-sasl-sqlauxprop-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577565" comment="cyrus-sasl-sqlauxprop-32bit-2.1.22-182.26.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218512" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196036" ref_url="https://bugzilla.suse.com/1196036" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2022-24407: Fixed SQL injection in sql_auxprop_store in plugins/sql.c (bsc#1196036).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-23"/>
	<updated date="2022-02-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196036">SUSE bug 1196036</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24407">CVE-2022-24407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669486" comment="cyrus-sasl-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669487" comment="cyrus-sasl-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669488" comment="cyrus-sasl-crammd5-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669489" comment="cyrus-sasl-crammd5-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669490" comment="cyrus-sasl-digestmd5-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669491" comment="cyrus-sasl-digestmd5-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669492" comment="cyrus-sasl-gssapi-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669493" comment="cyrus-sasl-gssapi-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669470" comment="cyrus-sasl-openssl1-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669471" comment="cyrus-sasl-openssl1-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669472" comment="cyrus-sasl-openssl1-crammd5-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669473" comment="cyrus-sasl-openssl1-crammd5-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669474" comment="cyrus-sasl-openssl1-digestmd5-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669475" comment="cyrus-sasl-openssl1-digestmd5-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669476" comment="cyrus-sasl-openssl1-gssapi-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669477" comment="cyrus-sasl-openssl1-gssapi-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669478" comment="cyrus-sasl-openssl1-ntlm-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669479" comment="cyrus-sasl-openssl1-otp-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669480" comment="cyrus-sasl-openssl1-otp-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669481" comment="cyrus-sasl-openssl1-plain-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669482" comment="cyrus-sasl-openssl1-plain-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669494" comment="cyrus-sasl-otp-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669495" comment="cyrus-sasl-otp-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669496" comment="cyrus-sasl-plain-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669497" comment="cyrus-sasl-plain-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669498" comment="cyrus-sasl-saslauthd-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669499" comment="cyrus-sasl-sqlauxprop-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669500" comment="cyrus-sasl-sqlauxprop-32bit-2.1.22-182.26.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218513" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="881137" ref_url="https://bugzilla.suse.com/881137" source="BUGZILLA"/>
		<reference ref_id="896453" ref_url="https://bugzilla.suse.com/896453" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3477" ref_url="https://www.suse.com/security/cve/CVE-2014-3477/" source="CVE"/>
		<reference ref_id="CVE-2014-3638" ref_url="https://www.suse.com/security/cve/CVE-2014-3638/" source="CVE"/>
		<description>

Various denial of service issues were fixed in the DBUS service.

    * CVE-2014-3638: dbus-daemon tracks whether method call messages expect
      a reply, so that unsolicited replies can be dropped. As currently
      implemented, if there are n parallel method calls in progress, each
      method reply takes O(n) CPU time. A malicious user could exploit this
      by opening the maximum allowed number of parallel connections and
      sending the maximum number of parallel method calls on each one,
      causing subsequent method calls to be unreasonably slow, a denial of
      service.
    * CVE-2014-3639: dbus-daemon allows a small number of 'incomplete'
      connections (64 by default) whose identity has not yet been
      confirmed. When this limit has been reached, subsequent connections
      are dropped. Alban's testing indicates that one malicious process
      that makes repeated connection attempts, but never completes the
      authentication handshake and instead waits for dbus-daemon to time
      out and disconnect it, can cause the majority of legitimate
      connection attempts to fail.

Security Issues:

    * CVE-2014-3638
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638&gt;
    * CVE-2014-3638
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-16"/>
	<updated date="2014-09-16"/>
	<bugzilla href="https://bugzilla.suse.com/881137">SUSE bug 881137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896453">SUSE bug 896453</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3477/">CVE-2014-3477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3477">CVE-2014-3477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3638/">CVE-2014-3638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3638">CVE-2014-3638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577566" comment="dbus-1-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577567" comment="dbus-1-32bit-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577568" comment="dbus-1-x11-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577569" comment="dbus-1-x86-1.2.10-3.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577566" comment="dbus-1-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577567" comment="dbus-1-32bit-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577568" comment="dbus-1-x11-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577569" comment="dbus-1-x86-1.2.10-3.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577566" comment="dbus-1-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577567" comment="dbus-1-32bit-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577568" comment="dbus-1-x11-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577569" comment="dbus-1-x86-1.2.10-3.31.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218514" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1137832" ref_url="https://bugzilla.suse.com/1137832" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749/" source="CVE"/>
		<description>
This update for dbus-1 fixes the following issues:

Security issue fixed: 	  

- CVE-2019-12749: Fixed an implementation flaw in DBUS_COOKIE_SHA1 which
  could have allowed local attackers to bypass authentication (bsc#1137832).

		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-02"/>
	<updated date="2019-07-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137832">SUSE bug 1137832</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12749">CVE-2019-12749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571219" comment="dbus-1-1.2.10-3.34.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571220" comment="dbus-1-32bit-1.2.10-3.34.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571221" comment="dbus-1-x11-1.2.10-3.34.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218515" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1187105" ref_url="https://bugzilla.suse.com/1187105" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35512" ref_url="https://www.suse.com/security/cve/CVE-2020-35512/" source="CVE"/>
		<description>
This update for dbus-1 fixes the following issues:

- CVE-2020-35512: Fixed a memory safety issue which affected systems
  with users with the same numeric UID (bsc#1187105).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-11"/>
	<updated date="2022-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187105">SUSE bug 1187105</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35512/">CVE-2020-35512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35512">CVE-2020-35512 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992730" comment="dbus-1-1.2.10-3.34.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992731" comment="dbus-1-32bit-1.2.10-3.34.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992732" comment="dbus-1-x11-1.2.10-3.34.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218516" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="880984" ref_url="https://bugzilla.suse.com/880984" source="BUGZILLA"/>
		<reference ref_id="919959" ref_url="https://bugzilla.suse.com/919959" source="BUGZILLA"/>
		<reference ref_id="926159" ref_url="https://bugzilla.suse.com/926159" source="BUGZILLA"/>
		<reference ref_id="928390" ref_url="https://bugzilla.suse.com/928390" source="BUGZILLA"/>
		<reference ref_id="936923" ref_url="https://bugzilla.suse.com/936923" source="BUGZILLA"/>
		<reference ref_id="947780" ref_url="https://bugzilla.suse.com/947780" source="BUGZILLA"/>
		<reference ref_id="961305" ref_url="https://bugzilla.suse.com/961305" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8605" ref_url="https://www.suse.com/security/cve/CVE-2015-8605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001886.html" source="SUSE-SU"/>
		<description>

This update for dhcp fixes the following issues:

- CVE-2015-8605: A remote attacker could have used badly formed packets with an invalid IPv4 UDP length field to cause a DHCP server, client, or relay program to terminate abnormally (bsc#961305)

The following bugs were fixed:

- bsc#936923: Improper lease duration checking
- bsc#880984: Integer overflows in the date and time handling code
- bsc#947780: DHCP server could abort with 'Unable to set up timer: out of range' on very long or infinite timer intervals / lease lifetimes 
- bsc#926159: DHCP preferrend and valid lifetime would be logged incorrectly
- bsc#928390: dhclient dit not expose next-server DHCPv4 option to script
- bsc#926159: DHCP preferrend and valid lifetime would be logged incorrectly
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/880984">SUSE bug 880984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919959">SUSE bug 919959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926159">SUSE bug 926159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928390">SUSE bug 928390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936923">SUSE bug 936923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947780">SUSE bug 947780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961305">SUSE bug 961305</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8605/">CVE-2015-8605 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8605">CVE-2015-8605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577570" comment="dhcp-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577571" comment="dhcp-client-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577572" comment="dhcp-relay-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577573" comment="dhcp-server-4.2.4.P2-0.24.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577570" comment="dhcp-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577571" comment="dhcp-client-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577572" comment="dhcp-relay-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577573" comment="dhcp-server-4.2.4.P2-0.24.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577570" comment="dhcp-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577571" comment="dhcp-client-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577572" comment="dhcp-relay-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577573" comment="dhcp-server-4.2.4.P2-0.24.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218517" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="969820" ref_url="https://bugzilla.suse.com/969820" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2774" ref_url="https://www.suse.com/security/cve/CVE-2016-2774/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002204.html" source="SUSE-SU"/>
		<description>

This update for dhcp fixes the following issues:

- CVE-2016-2774: Fixed a denial of service attack against the DHCP server over the OMAPI TCP socket, which could be used
  by network adjacent attackers to make the DHCP server non-functional (bsc#969820).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-10"/>
	<updated date="2016-08-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/969820">SUSE bug 969820</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2774/">CVE-2016-2774 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2774">CVE-2016-2774 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577574" comment="dhcp-4.2.4.P2-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577575" comment="dhcp-client-4.2.4.P2-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577576" comment="dhcp-relay-4.2.4.P2-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577577" comment="dhcp-server-4.2.4.P2-0.27.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577574" comment="dhcp-4.2.4.P2-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577575" comment="dhcp-client-4.2.4.P2-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577576" comment="dhcp-relay-4.2.4.P2-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577577" comment="dhcp-server-4.2.4.P2-0.27.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218518" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1023415" ref_url="https://bugzilla.suse.com/1023415" source="BUGZILLA"/>
		<reference ref_id="1076119" ref_url="https://bugzilla.suse.com/1076119" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3144" ref_url="https://www.suse.com/security/cve/CVE-2017-3144/" source="CVE"/>
		<description>
This update for dhcp fixes several issues.
 
This security issue was fixed:

- CVE-2017-3144: OMAPI code didn't free socket descriptors when empty message
  is received allowing DoS (bsc#1076119)

This non-security issue was fixed:

- Enhance dhclient-script to handle static route updates. (bsc#1023415)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-14"/>
	<updated date="2018-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023415">SUSE bug 1023415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076119">SUSE bug 1076119</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3144/">CVE-2017-3144 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3144">CVE-2017-3144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577578" comment="dhcp-4.2.4.P2-0.28.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577579" comment="dhcp-client-4.2.4.P2-0.28.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577580" comment="dhcp-relay-4.2.4.P2-0.28.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577581" comment="dhcp-server-4.2.4.P2-0.28.5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218519" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1083302" ref_url="https://bugzilla.suse.com/1083302" source="BUGZILLA"/>
		<reference ref_id="1083303" ref_url="https://bugzilla.suse.com/1083303" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5732" ref_url="https://www.suse.com/security/cve/CVE-2018-5732/" source="CVE"/>
		<reference ref_id="CVE-2018-5733" ref_url="https://www.suse.com/security/cve/CVE-2018-5733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0810-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004764.html" source="SUSE-SU"/>
		<description>
This update for dhcp fixes the following issues:

Security issues fixed:

- CVE-2018-5733: reference count overflow in dhcpd (bsc#1083303).
- CVE-2018-5732: buffer overflow in dhclient (bsc#1083302).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-26"/>
	<updated date="2018-03-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083302">SUSE bug 1083302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083303">SUSE bug 1083303</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5732/">CVE-2018-5732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5732">CVE-2018-5732 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5733/">CVE-2018-5733 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5733">CVE-2018-5733 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577582" comment="dhcp-4.2.4.P2-0.28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577583" comment="dhcp-client-4.2.4.P2-0.28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577584" comment="dhcp-relay-4.2.4.P2-0.28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577585" comment="dhcp-server-4.2.4.P2-0.28.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577582" comment="dhcp-4.2.4.P2-0.28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577583" comment="dhcp-client-4.2.4.P2-0.28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577584" comment="dhcp-relay-4.2.4.P2-0.28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577585" comment="dhcp-server-4.2.4.P2-0.28.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218520" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186382" ref_url="https://bugzilla.suse.com/1186382" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25217" ref_url="https://www.suse.com/security/cve/CVE-2021-25217/" source="CVE"/>
		<description>
This update for dhcp fixes the following issues:

- CVE-2021-25217: A buffer overrun in lease file parsing code can be used to exploit a common vulnerability shared by dhcpd and dhclient (bsc#1186382)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-01"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186382">SUSE bug 1186382</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25217/">CVE-2021-25217 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25217">CVE-2021-25217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577586" comment="dhcp-4.2.4.P2-0.28.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577587" comment="dhcp-client-4.2.4.P2-0.28.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577588" comment="dhcp-relay-4.2.4.P2-0.28.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577589" comment="dhcp-server-4.2.4.P2-0.28.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218521" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1203988" ref_url="https://bugzilla.suse.com/1203988" source="BUGZILLA"/>
		<reference ref_id="1203989" ref_url="https://bugzilla.suse.com/1203989" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2928" ref_url="https://www.suse.com/security/cve/CVE-2022-2928/" source="CVE"/>
		<reference ref_id="CVE-2022-2929" ref_url="https://www.suse.com/security/cve/CVE-2022-2929/" source="CVE"/>
		<description>
This update for dhcp fixes the following issues:

  - CVE-2022-2928: Fixed an option refcount overflow (bsc#1203988).
  - CVE-2022-2929: Fixed a DHCP memory leak (bsc#1203989).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-15"/>
	<updated date="2022-11-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203988">SUSE bug 1203988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203989">SUSE bug 1203989</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2928/">CVE-2022-2928 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2928">CVE-2022-2928 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2929/">CVE-2022-2929 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2929">CVE-2022-2929 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992733" comment="dhcp-4.2.4.P2-0.28.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992734" comment="dhcp-client-4.2.4.P2-0.28.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992735" comment="dhcp-relay-4.2.4.P2-0.28.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992736" comment="dhcp-server-4.2.4.P2-0.28.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218522" version="1" class="patch">
	<metadata>
		<title>Security update for dhcpcd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="955762" ref_url="https://bugzilla.suse.com/955762" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6698" ref_url="https://www.suse.com/security/cve/CVE-2012-6698/" source="CVE"/>
		<reference ref_id="CVE-2012-6699" ref_url="https://www.suse.com/security/cve/CVE-2012-6699/" source="CVE"/>
		<reference ref_id="CVE-2012-6700" ref_url="https://www.suse.com/security/cve/CVE-2012-6700/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001711.html" source="SUSE-SU"/>
		<description>
dhcpcd was updated to fix three security issues.

These security issues were fixed:
- CVE-2012-6698: A potential out of bounds write was fixed, which could lead to memory corruption, triggerable by network local attackers.
- CVE-2012-6699: A loop error was fixed that could lead out of bound reads, triggerable by network local attackers.
- CVE-2012-6700: An incorrect free could lead to crashes, triggerable by network local attackers.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/955762">SUSE bug 955762</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6698/">CVE-2012-6698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6698">CVE-2012-6698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6699/">CVE-2012-6699 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6699">CVE-2012-6699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6700/">CVE-2012-6700 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6700">CVE-2012-6700 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577590" comment="dhcpcd-3.2.3-45.5.3 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577590" comment="dhcpcd-3.2.3-45.5.3 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577590" comment="dhcpcd-3.2.3-45.5.3 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218523" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1146569" ref_url="https://bugzilla.suse.com/1146569" source="BUGZILLA"/>
		<reference ref_id="1146571" ref_url="https://bugzilla.suse.com/1146571" source="BUGZILLA"/>
		<reference ref_id="1146572" ref_url="https://bugzilla.suse.com/1146572" source="BUGZILLA"/>
		<reference ref_id="1146702" ref_url="https://bugzilla.suse.com/1146702" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15142" ref_url="https://www.suse.com/security/cve/CVE-2019-15142/" source="CVE"/>
		<reference ref_id="CVE-2019-15143" ref_url="https://www.suse.com/security/cve/CVE-2019-15143/" source="CVE"/>
		<reference ref_id="CVE-2019-15144" ref_url="https://www.suse.com/security/cve/CVE-2019-15144/" source="CVE"/>
		<reference ref_id="CVE-2019-15145" ref_url="https://www.suse.com/security/cve/CVE-2019-15145/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:

Security issues fixed:

- CVE-2019-15142: Fixed heap-based buffer over-read (bsc#1146702).
- CVE-2019-15143: Fixed resource exhaustion caused by corrupted image files (bsc#1146569).
- CVE-2019-15144: Fixed denial-of-service caused by crafted PBM image files (bsc#1146571).
- CVE-2019-15145: Fixed out-of-bounds read caused by corrupted JB2 image files (bsc#1146572).
- Fixed segfault when libtiff encounters corrupted TIFF (upstream issue #295).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1146569">SUSE bug 1146569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146571">SUSE bug 1146571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146572">SUSE bug 1146572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146702">SUSE bug 1146702</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15142/">CVE-2019-15142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15142">CVE-2019-15142 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15143/">CVE-2019-15143 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15143">CVE-2019-15143 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15144/">CVE-2019-15144 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15144">CVE-2019-15144 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15145/">CVE-2019-15145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15145">CVE-2019-15145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571241" comment="libdjvulibre21-3.5.21-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218524" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1156188" ref_url="https://bugzilla.suse.com/1156188" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18804" ref_url="https://www.suse.com/security/cve/CVE-2019-18804/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:
- CVE-2019-18804: Fixed a null pointer dereference (bsc#1156188).

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1156188">SUSE bug 1156188</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18804/">CVE-2019-18804 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18804">CVE-2019-18804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571242" comment="libdjvulibre21-3.5.21-3.6.10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218525" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185900" ref_url="https://bugzilla.suse.com/1185900" source="BUGZILLA"/>
		<reference ref_id="1185904" ref_url="https://bugzilla.suse.com/1185904" source="BUGZILLA"/>
		<reference ref_id="1185905" ref_url="https://bugzilla.suse.com/1185905" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32491" ref_url="https://www.suse.com/security/cve/CVE-2021-32491/" source="CVE"/>
		<reference ref_id="CVE-2021-32492" ref_url="https://www.suse.com/security/cve/CVE-2021-32492/" source="CVE"/>
		<reference ref_id="CVE-2021-32493" ref_url="https://www.suse.com/security/cve/CVE-2021-32493/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:

Security issues fixed:

- CVE-2021-32491 [bsc#1185900]: Integer overflow in function render() in tools/ddjvu via crafted djvu file
- CVE-2021-32492 [bsc#1185904]: Out of bounds read in function DJVU:DataPool:has_data() via crafted djvu file
- CVE-2021-32493 [bsc#1185905]: Heap buffer overflow in function DJVU:GBitmap:decode() via crafted djvu file
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185900">SUSE bug 1185900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185904">SUSE bug 1185904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185905">SUSE bug 1185905</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32491/">CVE-2021-32491 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32491">CVE-2021-32491 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32492/">CVE-2021-32492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32492">CVE-2021-32492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32493/">CVE-2021-32493 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32493">CVE-2021-32493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571243" comment="libdjvulibre21-3.5.21-3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218526" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186253" ref_url="https://bugzilla.suse.com/1186253" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3500" ref_url="https://www.suse.com/security/cve/CVE-2021-3500/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3500: Stack overflow in function DJVU:DjVuDocument:get_djvu_file() via crafted djvu file (bsc#1186253)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-31"/>
	<updated date="2021-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186253">SUSE bug 1186253</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3500/">CVE-2021-3500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3500">CVE-2021-3500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571244" comment="libdjvulibre21-3.5.21-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218527" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1187869" ref_url="https://bugzilla.suse.com/1187869" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3630" ref_url="https://www.suse.com/security/cve/CVE-2021-3630/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3630: out-of-bounds write in DJVU:DjVuTXT:decode() in DjVuText.cpp (bsc#1187869)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-02"/>
	<updated date="2021-07-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187869">SUSE bug 1187869</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3630/">CVE-2021-3630 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3630">CVE-2021-3630 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624088" comment="libdjvulibre21-3.5.21-3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218528" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1187869" ref_url="https://bugzilla.suse.com/1187869" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3630" ref_url="https://www.suse.com/security/cve/CVE-2021-3630/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:

- Extend CVE-2021-3630 fix (bsc#1187869).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-04"/>
	<updated date="2021-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187869">SUSE bug 1187869</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3630/">CVE-2021-3630 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3630">CVE-2021-3630 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627836" comment="libdjvulibre21-3.5.21-3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218529" version="1" class="patch">
	<metadata>
		<title>Recommended update for dnsmasq</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="776496" ref_url="https://bugzilla.suse.com/776496" source="BUGZILLA"/>
		<reference ref_id="883708" ref_url="https://bugzilla.suse.com/883708" source="BUGZILLA"/>
		<reference ref_id="923144" ref_url="https://bugzilla.suse.com/923144" source="BUGZILLA"/>
		<reference ref_id="928867" ref_url="https://bugzilla.suse.com/928867" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3294" ref_url="https://www.suse.com/security/cve/CVE-2015-3294/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001425.html" source="SUSE-SU"/>
		<description>

This update provides dnsmasq version 2.71, which brings several fixes and 
enhancements. For a comprehensive list of changes, please refer to the 
package change log. (FATE#317370)

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-02"/>
	<updated date="2014-07-02"/>
	<bugzilla href="https://bugzilla.suse.com/776496">SUSE bug 776496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883708">SUSE bug 883708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923144">SUSE bug 923144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928867">SUSE bug 928867</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3294/">CVE-2015-3294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3294">CVE-2015-3294 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992737" comment="dnsmasq-2.71-0.11.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992737" comment="dnsmasq-2.71-0.11.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992737" comment="dnsmasq-2.71-0.11.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218530" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="983273" ref_url="https://bugzilla.suse.com/983273" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8899" ref_url="https://www.suse.com/security/cve/CVE-2015-8899/" source="CVE"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2015-8899: Denial of service between local and remote dns entries (bsc#983273)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-20"/>
	<updated date="2016-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/983273">SUSE bug 983273</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8899/">CVE-2015-8899 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8899">CVE-2015-8899 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577591" comment="dnsmasq-2.71-0.15.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218531" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1060354" ref_url="https://bugzilla.suse.com/1060354" source="BUGZILLA"/>
		<reference ref_id="1060355" ref_url="https://bugzilla.suse.com/1060355" source="BUGZILLA"/>
		<reference ref_id="1060360" ref_url="https://bugzilla.suse.com/1060360" source="BUGZILLA"/>
		<reference ref_id="1060361" ref_url="https://bugzilla.suse.com/1060361" source="BUGZILLA"/>
		<reference ref_id="1060362" ref_url="https://bugzilla.suse.com/1060362" source="BUGZILLA"/>
		<reference ref_id="1060364" ref_url="https://bugzilla.suse.com/1060364" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3294" ref_url="https://www.suse.com/security/cve/CVE-2015-3294/" source="CVE"/>
		<reference ref_id="CVE-2015-8899" ref_url="https://www.suse.com/security/cve/CVE-2015-8899/" source="CVE"/>
		<reference ref_id="CVE-2017-14491" ref_url="https://www.suse.com/security/cve/CVE-2017-14491/" source="CVE"/>
		<reference ref_id="CVE-2017-14492" ref_url="https://www.suse.com/security/cve/CVE-2017-14492/" source="CVE"/>
		<reference ref_id="CVE-2017-14493" ref_url="https://www.suse.com/security/cve/CVE-2017-14493/" source="CVE"/>
		<reference ref_id="CVE-2017-14494" ref_url="https://www.suse.com/security/cve/CVE-2017-14494/" source="CVE"/>
		<reference ref_id="CVE-2017-14495" ref_url="https://www.suse.com/security/cve/CVE-2017-14495/" source="CVE"/>
		<reference ref_id="CVE-2017-14496" ref_url="https://www.suse.com/security/cve/CVE-2017-14496/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003269.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following security issues:

- CVE-2017-14491: 2 byte heap based overflow. [bsc#1060354]
- CVE-2017-14492: heap based overflow. [bsc#1060355]
- CVE-2017-14493: stack based overflow. [bsc#1060360]
- CVE-2017-14494: DHCP - info leak. [bsc#1060361]
- CVE-2017-14495: DNS - OOM DoS. [bsc#1060362]
- CVE-2017-14496: DNS - DoS Integer underflow. [bsc#1060364]

This update brings a (small) potential incompatibility in the handling of
'basename' in --pxe-service. Please read the CHANGELOG and the documentation if
you are using this option.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-02"/>
	<updated date="2017-10-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060354">SUSE bug 1060354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060355">SUSE bug 1060355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3294/">CVE-2015-3294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3294">CVE-2015-3294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8899/">CVE-2015-8899 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8899">CVE-2015-8899 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14491/">CVE-2017-14491 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14491">CVE-2017-14491 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14492/">CVE-2017-14492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14492">CVE-2017-14492 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14493/">CVE-2017-14493 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14493">CVE-2017-14493 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14494/">CVE-2017-14494 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14494">CVE-2017-14494 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14495/">CVE-2017-14495 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14495">CVE-2017-14495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14496/">CVE-2017-14496 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14496">CVE-2017-14496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577592" comment="dnsmasq-2.78-0.16.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577592" comment="dnsmasq-2.78-0.16.5.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218532" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1076958" ref_url="https://bugzilla.suse.com/1076958" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15107" ref_url="https://www.suse.com/security/cve/CVE-2017-15107/" source="CVE"/>
		<description>
This update for dnsmasq fixes the following issues:

Security issue fixed:

- CVE-2017-15107: Fixed a vulnerability in DNSSEC implementation. Processing of
  wildcard synthesized NSEC records may result improper validation for non-existance. (bsc#1076958)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-23"/>
	<updated date="2019-05-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076958">SUSE bug 1076958</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15107/">CVE-2017-15107 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15107">CVE-2017-15107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577593" comment="dnsmasq-2.78-0.16.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218533" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1154849" ref_url="https://bugzilla.suse.com/1154849" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14834" ref_url="https://www.suse.com/security/cve/CVE-2019-14834/" source="CVE"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2019-14834: Fixed a memory leak which could have allowed to remote attackers 
  to cause denial of service via DHCP response creation (bsc#1154849)	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-24"/>
	<updated date="2020-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154849">SUSE bug 1154849</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14834/">CVE-2019-14834 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14834">CVE-2019-14834 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577594" comment="dnsmasq-2.78-0.16.11.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218534" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176076" ref_url="https://bugzilla.suse.com/1176076" source="BUGZILLA"/>
		<reference ref_id="1177077" ref_url="https://bugzilla.suse.com/1177077" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25681" ref_url="https://www.suse.com/security/cve/CVE-2020-25681/" source="CVE"/>
		<reference ref_id="CVE-2020-25682" ref_url="https://www.suse.com/security/cve/CVE-2020-25682/" source="CVE"/>
		<reference ref_id="CVE-2020-25683" ref_url="https://www.suse.com/security/cve/CVE-2020-25683/" source="CVE"/>
		<reference ref_id="CVE-2020-25684" ref_url="https://www.suse.com/security/cve/CVE-2020-25684/" source="CVE"/>
		<reference ref_id="CVE-2020-25685" ref_url="https://www.suse.com/security/cve/CVE-2020-25685/" source="CVE"/>
		<reference ref_id="CVE-2020-25686" ref_url="https://www.suse.com/security/cve/CVE-2020-25686/" source="CVE"/>
		<reference ref_id="CVE-2020-25687" ref_url="https://www.suse.com/security/cve/CVE-2020-25687/" source="CVE"/>
		<description>
This update for dnsmasq fixes the following issues:

Security issues fixed:

- CVE-2020-25684, CVE-2020-25685, CVE-2020-25686: Fixed multiple Cache Poisoning attacks (bsc#1177077).
- CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687: Fixed multiple potential Heap-based overflows when DNSSEC is enabled (bsc#1177077).

Non-security issue fixed:

- Retry query to other servers on receipt of SERVFAIL rcode (bsc#1176076).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-19"/>
	<updated date="2021-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176076">SUSE bug 1176076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25681/">CVE-2020-25681 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25681">CVE-2020-25681 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25682/">CVE-2020-25682 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25682">CVE-2020-25682 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25683/">CVE-2020-25683 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25683">CVE-2020-25683 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25684/">CVE-2020-25684 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25684">CVE-2020-25684 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25685/">CVE-2020-25685 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25685">CVE-2020-25685 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25686/">CVE-2020-25686 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25686">CVE-2020-25686 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25687/">CVE-2020-25687 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25687">CVE-2020-25687 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577595" comment="dnsmasq-2.78-0.16.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218535" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1138743" ref_url="https://bugzilla.suse.com/1138743" source="BUGZILLA"/>
		<reference ref_id="1183709" ref_url="https://bugzilla.suse.com/1183709" source="BUGZILLA"/>
		<reference ref_id="1197872" ref_url="https://bugzilla.suse.com/1197872" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3448" ref_url="https://www.suse.com/security/cve/CVE-2021-3448/" source="CVE"/>
		<reference ref_id="CVE-2022-0934" ref_url="https://www.suse.com/security/cve/CVE-2022-0934/" source="CVE"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2021-3448: Fixed a potential DNS cache poisoning issue due to a constant
  outgoing port being used when for certain use cases of the --server option
  (bsc#1183709).
- CVE-2022-0934: Fixed an invalid memory access that could lead to remote denial
  of service via crafted packet (bsc#1197872).

Non-security fixes:

- Removed cache size limit (bsc#1138743).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138743">SUSE bug 1138743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183709">SUSE bug 1183709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197872">SUSE bug 1197872</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3448/">CVE-2021-3448 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3448">CVE-2021-3448 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0934/">CVE-2022-0934 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0934">CVE-2022-0934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679569" comment="dnsmasq-2.78-0.16.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218536" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1209358" ref_url="https://bugzilla.suse.com/1209358" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28450" ref_url="https://www.suse.com/security/cve/CVE-2023-28450/" source="CVE"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2023-28450: Fixed default maximum size for EDNS.0 UDP packets (bsc#1209358).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-18"/>
	<updated date="2023-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209358">SUSE bug 1209358</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28450/">CVE-2023-28450 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28450">CVE-2023-28450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992738" comment="dnsmasq-2.78-0.16.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218537" version="1" class="patch">
	<metadata>
		<title>Security update for dosfstools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="980364" ref_url="https://bugzilla.suse.com/980364" source="BUGZILLA"/>
		<reference ref_id="980377" ref_url="https://bugzilla.suse.com/980377" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8872" ref_url="https://www.suse.com/security/cve/CVE-2015-8872/" source="CVE"/>
		<reference ref_id="CVE-2016-4804" ref_url="https://www.suse.com/security/cve/CVE-2016-4804/" source="CVE"/>
		<description>
dosfstools was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-8872: The set_fat function in fat.c in dosfstools might have allowed attackers to corrupt a FAT12 filesystem or cause a denial of service (invalid memory read and crash) by writing an odd number of clusters to the third to last entry on a FAT12 filesystem, which triggers an 'off-by-two error (bsc#980364).
- CVE-2016-4804: The read_boot function in boot.c in dosfstools allowed attackers to cause a denial of service (crash) via a crafted filesystem, which triggers a heap-based buffer overflow in the (1) read_fat function or an out-of-bounds heap read in (2) get_fat function (bsc#980377).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-24"/>
	<updated date="2016-08-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/980364">SUSE bug 980364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980377">SUSE bug 980377</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8872/">CVE-2015-8872 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8872">CVE-2015-8872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4804/">CVE-2016-4804 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4804">CVE-2016-4804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577596" comment="dosfstools-2.11-121.31.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218538" version="1" class="patch">
	<metadata>
		<title>Security update for e2fsprogs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="915402" ref_url="https://bugzilla.suse.com/915402" source="BUGZILLA"/>
		<reference ref_id="918346" ref_url="https://bugzilla.suse.com/918346" source="BUGZILLA"/>
		<reference ref_id="932539" ref_url="https://bugzilla.suse.com/932539" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0247" ref_url="https://www.suse.com/security/cve/CVE-2015-0247/" source="CVE"/>
		<reference ref_id="CVE-2015-1572" ref_url="https://www.suse.com/security/cve/CVE-2015-1572/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001530.html" source="SUSE-SU"/>
		<description>

Two security issues were fixed in e2fsprogs:

    * CVE-2015-0247: Various heap overflows were fixed in e2fsprogs (fsck,
      dumpe2fs, e2image).
    * CVE-2015-1572: Fixed a potential buffer overflow in closefs().
      (bsc#918346)

Additionally, badblocks was enhanced to work with very large partitions. 
(bsc#932539)

Security Issues:

    * CVE-2015-0247
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0247&gt;
    * CVE-2015-1572
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1572&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-26"/>
	<updated date="2015-06-26"/>
	<bugzilla href="https://bugzilla.suse.com/915402">SUSE bug 915402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918346">SUSE bug 918346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932539">SUSE bug 932539</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-0247/">CVE-2015-0247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0247">CVE-2015-0247 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-1572/">CVE-2015-1572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1572">CVE-2015-1572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577597" comment="e2fsprogs-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577598" comment="libblkid1-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577599" comment="libblkid1-32bit-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577600" comment="libblkid1-x86-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577601" comment="libcom_err2-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577602" comment="libcom_err2-32bit-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577603" comment="libcom_err2-x86-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577604" comment="libext2fs2-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577605" comment="libuuid1-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577606" comment="libuuid1-32bit-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577607" comment="libuuid1-x86-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577608" comment="uuid-runtime-2.19.1-6.62.7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577597" comment="e2fsprogs-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577598" comment="libblkid1-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577599" comment="libblkid1-32bit-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577600" comment="libblkid1-x86-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577601" comment="libcom_err2-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577602" comment="libcom_err2-32bit-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577603" comment="libcom_err2-x86-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577604" comment="libext2fs2-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577605" comment="libuuid1-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577606" comment="libuuid1-32bit-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577607" comment="libuuid1-x86-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577608" comment="uuid-runtime-2.19.1-6.62.7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577597" comment="e2fsprogs-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577598" comment="libblkid1-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577599" comment="libblkid1-32bit-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577600" comment="libblkid1-x86-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577601" comment="libcom_err2-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577602" comment="libcom_err2-32bit-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577603" comment="libcom_err2-x86-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577604" comment="libext2fs2-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577605" comment="libuuid1-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577606" comment="libuuid1-32bit-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577607" comment="libuuid1-x86-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577608" comment="uuid-runtime-2.19.1-6.62.7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218539" version="1" class="patch">
	<metadata>
		<title>Security update for e2fsprogs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1029927" ref_url="https://bugzilla.suse.com/1029927" source="BUGZILLA"/>
		<reference ref_id="1038885" ref_url="https://bugzilla.suse.com/1038885" source="BUGZILLA"/>
		<reference ref_id="1160571" ref_url="https://bugzilla.suse.com/1160571" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5188" ref_url="https://www.suse.com/security/cve/CVE-2019-5188/" source="CVE"/>
		<description>
This update for e2fsprogs fixes the following issues:

Security issue fixed:

- CVE-2019-5188: Fixed a code execution vulnerability in the directory rehashing functionality (bsc#1160571).

Non-security issue fixed:

- Fix resize2fs to not clear resize inode for 0 resvd blocks (bsc#1029927).
- Don't use the extended rec_len encoding for standard file systems (bsc#1038885).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-07"/>
	<updated date="2020-02-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029927">SUSE bug 1029927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038885">SUSE bug 1038885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160571">SUSE bug 1160571</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5188/">CVE-2019-5188 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5188">CVE-2019-5188 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577609" comment="e2fsprogs-1.41.9-2.11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577610" comment="libcom_err2-1.41.9-2.11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577611" comment="libcom_err2-32bit-1.41.9-2.11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577612" comment="libext2fs2-1.41.9-2.11.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218540" version="1" class="patch">
	<metadata>
		<title>Security update for ecryptfs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="920160" ref_url="https://bugzilla.suse.com/920160" source="BUGZILLA"/>
		<reference ref_id="962052" ref_url="https://bugzilla.suse.com/962052" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9687" ref_url="https://www.suse.com/security/cve/CVE-2014-9687/" source="CVE"/>
		<reference ref_id="CVE-2016-1572" ref_url="https://www.suse.com/security/cve/CVE-2016-1572/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001837.html" source="SUSE-SU"/>
		<description>

This update for ecryptfs-utils fixes the following issues:

- CVE-2016-1572: A local user could have escalated privileges by mounting over special filesystems (bsc#962052)
- CVE-2014-9687: A default salt value reduced complexity of offline precomputation attacks (bsc#920160)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-30"/>
	<updated date="2016-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/920160">SUSE bug 920160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962052">SUSE bug 962052</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9687/">CVE-2014-9687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9687">CVE-2014-9687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1572/">CVE-2016-1572 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1572">CVE-2016-1572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577613" comment="ecryptfs-utils-61-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577614" comment="ecryptfs-utils-32bit-61-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577615" comment="ecryptfs-utils-x86-61-1.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577613" comment="ecryptfs-utils-61-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577614" comment="ecryptfs-utils-32bit-61-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577615" comment="ecryptfs-utils-x86-61-1.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577613" comment="ecryptfs-utils-61-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577614" comment="ecryptfs-utils-32bit-61-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577615" comment="ecryptfs-utils-x86-61-1.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218541" version="1" class="patch">
	<metadata>
		<title>Security update for ed (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1019807" ref_url="https://bugzilla.suse.com/1019807" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5357" ref_url="https://www.suse.com/security/cve/CVE-2017-5357/" source="CVE"/>
		<description>

This update for ed fixes the following security issues:

- CVE-2017-5357: An invalid free in the regular expression handling
  of the 'ed' command processing could allow local users to crash ed. (bsc#1019807)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1019807">SUSE bug 1019807</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5357/">CVE-2017-5357 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5357">CVE-2017-5357 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571264" comment="ed-0.2-1001.30.3.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218542" version="1" class="patch">
	<metadata>
		<title>Security update for elfutils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="911662" ref_url="https://bugzilla.suse.com/911662" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9447" ref_url="https://www.suse.com/security/cve/CVE-2014-9447/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001269.html" source="SUSE-SU"/>
		<description>

elfutils has been updated to fix one security issue:

    * CVE-2014-9447: Directory traversal vulnerability in the
      read_long_names function in libelf/elf_begin.c in elfutils 0.152 and
      0.161 allowed remote attackers to write to arbitrary files to the
      root directory via a / (slash) in a crafted archive, as demonstrated
      using the ar program (bnc#911662).

Security Issues:

    * CVE-2014-9447
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9447&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-18"/>
	<updated date="2015-02-18"/>
	<bugzilla href="https://bugzilla.suse.com/911662">SUSE bug 911662</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9447/">CVE-2014-9447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9447">CVE-2014-9447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577616" comment="elfutils-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577617" comment="libasm1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577618" comment="libasm1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577619" comment="libdw1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577620" comment="libdw1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577621" comment="libdw1-x86-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577622" comment="libebl1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577623" comment="libebl1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577624" comment="libebl1-x86-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577625" comment="libelf1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577626" comment="libelf1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577627" comment="libelf1-x86-0.152-4.9.17 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577616" comment="elfutils-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577617" comment="libasm1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577618" comment="libasm1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577619" comment="libdw1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577620" comment="libdw1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577621" comment="libdw1-x86-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577622" comment="libebl1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577623" comment="libebl1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577624" comment="libebl1-x86-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577625" comment="libelf1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577626" comment="libelf1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577627" comment="libelf1-x86-0.152-4.9.17 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577616" comment="elfutils-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577617" comment="libasm1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577618" comment="libasm1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577619" comment="libdw1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577620" comment="libdw1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577621" comment="libdw1-x86-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577622" comment="libebl1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577623" comment="libebl1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577624" comment="libebl1-x86-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577625" comment="libelf1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577626" comment="libelf1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577627" comment="libelf1-x86-0.152-4.9.17 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218543" version="1" class="patch">
	<metadata>
		<title>Security update for elfutils (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1030472" ref_url="https://bugzilla.suse.com/1030472" source="BUGZILLA"/>
		<reference ref_id="1030476" ref_url="https://bugzilla.suse.com/1030476" source="BUGZILLA"/>
		<reference ref_id="1033084" ref_url="https://bugzilla.suse.com/1033084" source="BUGZILLA"/>
		<reference ref_id="1033085" ref_url="https://bugzilla.suse.com/1033085" source="BUGZILLA"/>
		<reference ref_id="1033087" ref_url="https://bugzilla.suse.com/1033087" source="BUGZILLA"/>
		<reference ref_id="1033088" ref_url="https://bugzilla.suse.com/1033088" source="BUGZILLA"/>
		<reference ref_id="1033089" ref_url="https://bugzilla.suse.com/1033089" source="BUGZILLA"/>
		<reference ref_id="1033090" ref_url="https://bugzilla.suse.com/1033090" source="BUGZILLA"/>
		<reference ref_id="1106390" ref_url="https://bugzilla.suse.com/1106390" source="BUGZILLA"/>
		<reference ref_id="1107067" ref_url="https://bugzilla.suse.com/1107067" source="BUGZILLA"/>
		<reference ref_id="1111973" ref_url="https://bugzilla.suse.com/1111973" source="BUGZILLA"/>
		<reference ref_id="1112723" ref_url="https://bugzilla.suse.com/1112723" source="BUGZILLA"/>
		<reference ref_id="1112726" ref_url="https://bugzilla.suse.com/1112726" source="BUGZILLA"/>
		<reference ref_id="1123685" ref_url="https://bugzilla.suse.com/1123685" source="BUGZILLA"/>
		<reference ref_id="1125007" ref_url="https://bugzilla.suse.com/1125007" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10254" ref_url="https://www.suse.com/security/cve/CVE-2016-10254/" source="CVE"/>
		<reference ref_id="CVE-2016-10255" ref_url="https://www.suse.com/security/cve/CVE-2016-10255/" source="CVE"/>
		<reference ref_id="CVE-2017-7607" ref_url="https://www.suse.com/security/cve/CVE-2017-7607/" source="CVE"/>
		<reference ref_id="CVE-2017-7608" ref_url="https://www.suse.com/security/cve/CVE-2017-7608/" source="CVE"/>
		<reference ref_id="CVE-2017-7610" ref_url="https://www.suse.com/security/cve/CVE-2017-7610/" source="CVE"/>
		<reference ref_id="CVE-2017-7611" ref_url="https://www.suse.com/security/cve/CVE-2017-7611/" source="CVE"/>
		<reference ref_id="CVE-2017-7612" ref_url="https://www.suse.com/security/cve/CVE-2017-7612/" source="CVE"/>
		<reference ref_id="CVE-2017-7613" ref_url="https://www.suse.com/security/cve/CVE-2017-7613/" source="CVE"/>
		<reference ref_id="CVE-2018-16062" ref_url="https://www.suse.com/security/cve/CVE-2018-16062/" source="CVE"/>
		<reference ref_id="CVE-2018-16403" ref_url="https://www.suse.com/security/cve/CVE-2018-16403/" source="CVE"/>
		<reference ref_id="CVE-2018-18310" ref_url="https://www.suse.com/security/cve/CVE-2018-18310/" source="CVE"/>
		<reference ref_id="CVE-2018-18520" ref_url="https://www.suse.com/security/cve/CVE-2018-18520/" source="CVE"/>
		<reference ref_id="CVE-2018-18521" ref_url="https://www.suse.com/security/cve/CVE-2018-18521/" source="CVE"/>
		<reference ref_id="CVE-2019-7150" ref_url="https://www.suse.com/security/cve/CVE-2019-7150/" source="CVE"/>
		<reference ref_id="CVE-2019-7665" ref_url="https://www.suse.com/security/cve/CVE-2019-7665/" source="CVE"/>
		<description>
This update for elfutils fixes the following issues:

Security issues fixed: 
 
- CVE-2018-16403: Fixed a heap-based buffer over-read in in libdw/dwarf_getabbrev.c 
  and libwd/dwarf_hasattr.c which could have lead to denial of service (bsc#1107067).
- CVE-2016-10254: Fixed a memory allocation failure in alloxate_elf (bsc#1030472).
- CVE-2019-7665: NT_PLATFORM core file note should be a zero terminated string (bsc#1125007).
- CVE-2016-10255: Fixed a memory allocation failure in libelf_set_rawdata_wrlock (bsc#1030476).
- CVE-2019-7150: Added a missing check in dwfl_segment_report_module which could have allowed truncated files 
  to be read (bsc#1123685).
- CVE-2018-16062: Fixed a heap-buffer-overflow (bsc#1106390).
- CVE-2017-7611: Fixed a heap-based buffer over-read that could have led to Denial of Service (bsc#1033088).
- CVE-2017-7613: Fixed denial of service caused by the missing validation of the number of sections 
  and the number of segments in a crafted ELF file (bsc#1033090).
- CVE-2017-7607: Fixed a heap-based buffer overflow in handle_gnu_hash (bsc#1033084).
- CVE-2017-7608: Fixed a heap-based buffer overflow in ebl_object_note_type_name() (bsc#1033085).
- CVE-2017-7610: Fixed a heap-based buffer overflow in check_group (bsc#1033087).
- CVE-2018-18521: Fixed multiple divide-by-zero vulnerabilities in function arlib_add_symbols() (bsc#1112723).
- CVE-2017-7612: Fixed a denial of service in check_sysv_hash() via a crafted ELF file (bsc#1033089).
- CVE-2018-18310: Fixed an invalid address read in dwfl_segment_report_module.c (bsc#1111973).
- CVE-2018-18520: Fixed bad handling of ar files inside are files (bsc#1112726).    
- CVE-2017-7613: Missing validation of the number of sections and the number of
  segments allowed remote attackers to cause a denial of service (memory
  consumption) via a crafted ELF file (bsc#1033090).
- CVE-2017-7612: The check_sysv_hash function allowed remote attackers to cause
  a denial of service (heap-based buffer over-read and application crash) via a
  crafted ELF file (bsc#1033089).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-11"/>
	<updated date="2019-06-11"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1030472">SUSE bug 1030472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030476">SUSE bug 1030476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033084">SUSE bug 1033084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033085">SUSE bug 1033085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033087">SUSE bug 1033087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033088">SUSE bug 1033088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033089">SUSE bug 1033089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033090">SUSE bug 1033090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106390">SUSE bug 1106390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107067">SUSE bug 1107067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111973">SUSE bug 1111973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112723">SUSE bug 1112723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112726">SUSE bug 1112726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123685">SUSE bug 1123685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125007">SUSE bug 1125007</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10254/">CVE-2016-10254 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10254">CVE-2016-10254 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10255/">CVE-2016-10255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10255">CVE-2016-10255 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7607/">CVE-2017-7607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7607">CVE-2017-7607 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7608/">CVE-2017-7608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7608">CVE-2017-7608 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7610/">CVE-2017-7610 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7610">CVE-2017-7610 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7611/">CVE-2017-7611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7611">CVE-2017-7611 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7612/">CVE-2017-7612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7612">CVE-2017-7612 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7613/">CVE-2017-7613 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7613">CVE-2017-7613 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16062/">CVE-2018-16062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16062">CVE-2018-16062 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16403/">CVE-2018-16403 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16403">CVE-2018-16403 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18310/">CVE-2018-18310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18310">CVE-2018-18310 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18520/">CVE-2018-18520 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18520">CVE-2018-18520 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18521/">CVE-2018-18521 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18521">CVE-2018-18521 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7150/">CVE-2019-7150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7150">CVE-2019-7150 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7665/">CVE-2019-7665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7665">CVE-2019-7665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577628" comment="elfutils-0.152-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577629" comment="libasm1-0.152-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577630" comment="libasm1-32bit-0.152-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577631" comment="libdw1-0.152-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577632" comment="libdw1-32bit-0.152-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577633" comment="libebl1-0.152-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577634" comment="libebl1-32bit-0.152-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577635" comment="libelf1-0.152-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577636" comment="libelf1-32bit-0.152-4.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218544" version="1" class="patch">
	<metadata>
		<title>Security update for emacs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="854683" ref_url="https://bugzilla.suse.com/854683" source="BUGZILLA"/>
		<reference ref_id="876847" ref_url="https://bugzilla.suse.com/876847" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3421" ref_url="https://www.suse.com/security/cve/CVE-2014-3421/" source="CVE"/>
		<reference ref_id="CVE-2014-3422" ref_url="https://www.suse.com/security/cve/CVE-2014-3422/" source="CVE"/>
		<reference ref_id="CVE-2014-3423" ref_url="https://www.suse.com/security/cve/CVE-2014-3423/" source="CVE"/>
		<reference ref_id="CVE-2014-3424" ref_url="https://www.suse.com/security/cve/CVE-2014-3424/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001372.html" source="SUSE-SU"/>
		<description>

Emacs has been updated to fix the following issues:

    * Several cases of insecure usage of temporary files. (CVE-2014-3421,
      CVE-2014-3422, CVE-2014-3423, CVE-2014-3424)
    * Use of vc-annotate for renamed files when using Git. (bnc#854683)

Security Issues:

    * CVE-2014-3421
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3421&gt;
    * CVE-2014-3422
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3422&gt;
    * CVE-2014-3423
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3423&gt;
    * CVE-2014-3424
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3424&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-23"/>
	<updated date="2015-03-23"/>
	<bugzilla href="https://bugzilla.suse.com/854683">SUSE bug 854683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876847">SUSE bug 876847</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3421/">CVE-2014-3421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3421">CVE-2014-3421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3422/">CVE-2014-3422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3422">CVE-2014-3422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3423/">CVE-2014-3423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3423">CVE-2014-3423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3424/">CVE-2014-3424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3424">CVE-2014-3424 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577637" comment="emacs-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577638" comment="emacs-el-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577639" comment="emacs-info-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577640" comment="emacs-nox-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577641" comment="emacs-x11-22.3-4.42.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577637" comment="emacs-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577638" comment="emacs-el-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577639" comment="emacs-info-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577640" comment="emacs-nox-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577641" comment="emacs-x11-22.3-4.42.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577637" comment="emacs-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577638" comment="emacs-el-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577639" comment="emacs-info-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577640" comment="emacs-nox-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577641" comment="emacs-x11-22.3-4.42.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218545" version="1" class="patch">
	<metadata>
		<title>Security update for emacs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1058425" ref_url="https://bugzilla.suse.com/1058425" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14482" ref_url="https://www.suse.com/security/cve/CVE-2017-14482/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003251.html" source="SUSE-SU"/>
		<description>
This update for emacs fixes one issues.

This security issue was fixed:

- CVE-2017-14482: Remote code execution via mails with 'Content-Type: text/enriched' (bsc#1058425)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-20"/>
	<updated date="2017-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1058425">SUSE bug 1058425</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14482/">CVE-2017-14482 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14482">CVE-2017-14482 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577642" comment="emacs-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577643" comment="emacs-el-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577644" comment="emacs-info-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577645" comment="emacs-nox-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577646" comment="emacs-x11-22.3-42.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577642" comment="emacs-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577643" comment="emacs-el-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577644" comment="emacs-info-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577645" comment="emacs-nox-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577646" comment="emacs-x11-22.3-42.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218546" version="1" class="patch">
	<metadata>
		<title>Security update for emacs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1205822" ref_url="https://bugzilla.suse.com/1205822" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-45939" ref_url="https://www.suse.com/security/cve/CVE-2022-45939/" source="CVE"/>
		<description>
This update for emacs fixes the following issues:

- CVE-2022-45939: Fixed shell command injection via source code files when using ctags (bsc#1205822).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-30"/>
	<updated date="2022-11-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205822">SUSE bug 1205822</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45939/">CVE-2022-45939 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45939">CVE-2022-45939 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992739" comment="emacs-22.3-42.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992740" comment="emacs-el-22.3-42.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992741" comment="emacs-info-22.3-42.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992742" comment="emacs-nox-22.3-42.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992743" comment="emacs-x11-22.3-42.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218547" version="1" class="patch">
	<metadata>
		<title>Security update for emacs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208515" ref_url="https://bugzilla.suse.com/1208515" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48337" ref_url="https://www.suse.com/security/cve/CVE-2022-48337/" source="CVE"/>
		<description>
This update for emacs fixes the following issues:

- CVE-2022-48337: Fixed etags local command injection vulnerability (bsc#1208515).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-26"/>
	<updated date="2023-04-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208515">SUSE bug 1208515</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48337/">CVE-2022-48337 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48337">CVE-2022-48337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992744" comment="emacs-22.3-42.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992745" comment="emacs-el-22.3-42.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992746" comment="emacs-info-22.3-42.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992747" comment="emacs-nox-22.3-42.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992748" comment="emacs-x11-22.3-42.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218548" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1070046" ref_url="https://bugzilla.suse.com/1070046" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000159" ref_url="https://www.suse.com/security/cve/CVE-2017-1000159/" source="CVE"/>
		<description>
This update for evince provides the following fix:

- CVE-2017-1000159: Prevent command line injections via filenames when printing to a file. (bsc#1070046)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-08"/>
	<updated date="2018-03-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1070046">SUSE bug 1070046</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000159/">CVE-2017-1000159 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000159">CVE-2017-1000159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571282" comment="evince-2.28.2-0.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571283" comment="evince-doc-2.28.2-0.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571284" comment="evince-lang-2.28.2-0.7.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218549" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1133037" ref_url="https://bugzilla.suse.com/1133037" source="BUGZILLA"/>
		<reference ref_id="1141619" ref_url="https://bugzilla.suse.com/1141619" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010006" ref_url="https://www.suse.com/security/cve/CVE-2019-1010006/" source="CVE"/>
		<reference ref_id="CVE-2019-11459" ref_url="https://www.suse.com/security/cve/CVE-2019-11459/" source="CVE"/>
		<description>
This update for evince fixes the following issues:

Security issues fixed: 	  

- CVE-2019-11459: Fixed an improper error handling in which could have led to use of uninitialized use of memory (bsc#1133037).	  
- CVE-2019-1010006: Fixed a buffer overflow in backend/tiff/tiff-document.c (bsc#1141619).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-07"/>
	<updated date="2019-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133037">SUSE bug 1133037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141619">SUSE bug 1141619</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010006/">CVE-2019-1010006 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010006">CVE-2019-1010006 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11459/">CVE-2019-11459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11459">CVE-2019-11459 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571285" comment="evince-2.28.2-0.7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571286" comment="evince-doc-2.28.2-0.7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571287" comment="evince-lang-2.28.2-0.7.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218550" version="1" class="patch">
	<metadata>
		<title>Security update for evolution-data-server</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="901553" ref_url="https://bugzilla.suse.com/901553" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<description>

evolution-data-server has been updated to disable support for SSLv3.

This security issues has been fixed:

    * SSLv3 POODLE attack (CVE-2014-3566)

Security Issues:

    * CVE-2014-3566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-14"/>
	<updated date="2014-11-14"/>
	<bugzilla href="https://bugzilla.suse.com/901553">SUSE bug 901553</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577647" comment="evolution-data-server-2.28.2-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577648" comment="evolution-data-server-32bit-2.28.2-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577649" comment="evolution-data-server-lang-2.28.2-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577650" comment="evolution-data-server-x86-2.28.2-0.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577647" comment="evolution-data-server-2.28.2-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577648" comment="evolution-data-server-32bit-2.28.2-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577649" comment="evolution-data-server-lang-2.28.2-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577650" comment="evolution-data-server-x86-2.28.2-0.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577647" comment="evolution-data-server-2.28.2-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577648" comment="evolution-data-server-32bit-2.28.2-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577649" comment="evolution-data-server-lang-2.28.2-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577650" comment="evolution-data-server-x86-2.28.2-0.32.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218551" version="1" class="patch">
	<metadata>
		<title>Security update for evolution-data-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="830491" ref_url="https://bugzilla.suse.com/830491" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4166" ref_url="https://www.suse.com/security/cve/CVE-2013-4166/" source="CVE"/>
		<description>

This update for evolution-data-server fixes the following issue:

- CVE-2013-4166: Enclose email addresses in brackets to ensure an exact match (bsc#830491).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-03"/>
	<updated date="2020-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/830491">SUSE bug 830491</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4166/">CVE-2013-4166 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4166">CVE-2013-4166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577651" comment="evolution-data-server-2.28.2-0.32.3.109 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577652" comment="evolution-data-server-32bit-2.28.2-0.32.3.109 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577653" comment="evolution-data-server-lang-2.28.2-0.32.3.109 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218552" version="1" class="patch">
	<metadata>
		<title>Security update for exempi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1085295" ref_url="https://bugzilla.suse.com/1085295" source="BUGZILLA"/>
		<reference ref_id="1085585" ref_url="https://bugzilla.suse.com/1085585" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18234" ref_url="https://www.suse.com/security/cve/CVE-2017-18234/" source="CVE"/>
		<reference ref_id="CVE-2018-7730" ref_url="https://www.suse.com/security/cve/CVE-2018-7730/" source="CVE"/>
		<description>
This update for exempi fixes the following issues:

Security issue fixed:

- CVE-2018-7730: Fix heap-based buffer overflow in XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp (bsc#1085295).
- CVE-2017-18234: Fix use-after-free issue that allows remote attackers to cause a denial of service via a .pdf file (bsc#1085585).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-26"/>
	<updated date="2018-07-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085295">SUSE bug 1085295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18234/">CVE-2017-18234 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18234">CVE-2017-18234 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7730/">CVE-2018-7730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7730">CVE-2018-7730 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571288" comment="libexempi3-2.0.2-4.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218553" version="1" class="patch">
	<metadata>
		<title>Security update for exiv2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1050257" ref_url="https://bugzilla.suse.com/1050257" source="BUGZILLA"/>
		<reference ref_id="1186192" ref_url="https://bugzilla.suse.com/1186192" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11591" ref_url="https://www.suse.com/security/cve/CVE-2017-11591/" source="CVE"/>
		<reference ref_id="CVE-2021-32617" ref_url="https://www.suse.com/security/cve/CVE-2021-32617/" source="CVE"/>
		<description>
This update for exiv2 fixes the following issues:

- CVE-2021-32617: Fixed denial of service inside inefficient algorithm (quadratic complexity) (bsc#1186192).
- CVE-2017-11591: Fixed floating point exception in Exiv2::ValueType (bsc#1050257).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-06"/>
	<updated date="2022-10-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050257">SUSE bug 1050257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186192">SUSE bug 1186192</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11591/">CVE-2017-11591 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11591">CVE-2017-11591 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32617/">CVE-2021-32617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32617">CVE-2021-32617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992749" comment="libexiv2-4-0.17.1-33.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218554" version="1" class="patch">
	<metadata>
		<title>Security update for exiv2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1142681" ref_url="https://bugzilla.suse.com/1142681" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13112" ref_url="https://www.suse.com/security/cve/CVE-2019-13112/" source="CVE"/>
		<description>
This update for exiv2 fixes the following issues:

- CVE-2019-13112: Fixed an uncontrolled memory allocation in PngChunk:parseChunkContent causing denial of service. (bsc#1142681)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-07"/>
	<updated date="2022-11-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1142681">SUSE bug 1142681</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13112/">CVE-2019-13112 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13112">CVE-2019-13112 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992750" comment="libexiv2-4-0.17.1-33.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218555" version="1" class="patch">
	<metadata>
		<title>Security update for exiv2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1142678" ref_url="https://bugzilla.suse.com/1142678" source="BUGZILLA"/>
		<reference ref_id="1142683" ref_url="https://bugzilla.suse.com/1142683" source="BUGZILLA"/>
		<reference ref_id="1189338" ref_url="https://bugzilla.suse.com/1189338" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13110" ref_url="https://www.suse.com/security/cve/CVE-2019-13110/" source="CVE"/>
		<reference ref_id="CVE-2019-13113" ref_url="https://www.suse.com/security/cve/CVE-2019-13113/" source="CVE"/>
		<reference ref_id="CVE-2021-34334" ref_url="https://www.suse.com/security/cve/CVE-2021-34334/" source="CVE"/>
		<description>
This update for exiv2 fixes the following issues:

- CVE-2021-34334: Fixed a deny-of-service due to integer overflow in loop counter (bsc#1189338).
- CVE-2019-13110: Fixed integer-overflow and out-of-bounds read in CiffDirectory:readDirectory leads to denail of service (bsc#1142678).
- CVE-2019-13113: Fixed invalid data location in CRW image file causing denial of service (bsc#1142683).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-23"/>
	<updated date="2022-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1142678">SUSE bug 1142678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142683">SUSE bug 1142683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189338">SUSE bug 1189338</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13110/">CVE-2019-13110 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13110">CVE-2019-13110 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13113/">CVE-2019-13113 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13113">CVE-2019-13113 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34334/">CVE-2021-34334 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34334">CVE-2021-34334 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992751" comment="libexiv2-4-0.17.1-33.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218556" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="979441" ref_url="https://bugzilla.suse.com/979441" source="BUGZILLA"/>
		<reference ref_id="980391" ref_url="https://bugzilla.suse.com/980391" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1283" ref_url="https://www.suse.com/security/cve/CVE-2015-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<description>

This update for expat fixes the following issues: 

Security issue fixed:
- CVE-2016-0718: Fix Expat XML parser that mishandles certain kinds of malformed input documents. (bsc#979441)
- CVE-2015-1283: Fix multiple integer overflows. (bnc#980391)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-07"/>
	<updated date="2016-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979441">SUSE bug 979441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980391">SUSE bug 980391</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1283/">CVE-2015-1283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1283">CVE-2015-1283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0718">CVE-2016-0718 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571293" comment="expat-2.0.1-88.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571294" comment="libexpat1-2.0.1-88.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571295" comment="libexpat1-32bit-2.0.1-88.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218557" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1022037" ref_url="https://bugzilla.suse.com/1022037" source="BUGZILLA"/>
		<reference ref_id="983215" ref_url="https://bugzilla.suse.com/983215" source="BUGZILLA"/>
		<reference ref_id="983216" ref_url="https://bugzilla.suse.com/983216" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6702" ref_url="https://www.suse.com/security/cve/CVE-2012-6702/" source="CVE"/>
		<reference ref_id="CVE-2016-5300" ref_url="https://www.suse.com/security/cve/CVE-2016-5300/" source="CVE"/>
		<description>

This update for expat fixes the following security issues:

- CVE-2012-6702: Expat, when used in a parser that has not
  called XML_SetHashSalt or passed it a seed of 0, made it easier for
  context-dependent attackers to defeat cryptographic protection mechanisms
  via vectors involving use of the srand function.  (bsc#983215)
- CVE-2016-5300: The XML parser in Expat did not use sufficient entropy
  for hash initialization, which allowed context-dependent attackers to
  cause a denial of service (CPU consumption) via crafted identifiers in
  an XML document. NOTE: this vulnerability exists because of an incomplete
  fix for CVE-2012-0876.  (bsc#983216)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-07"/>
	<updated date="2017-02-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022037">SUSE bug 1022037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983215">SUSE bug 983215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983216">SUSE bug 983216</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6702/">CVE-2012-6702 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6702">CVE-2012-6702 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5300/">CVE-2016-5300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5300">CVE-2016-5300 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571296" comment="expat-2.0.1-88.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571297" comment="libexpat1-2.0.1-88.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571298" comment="libexpat1-32bit-2.0.1-88.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218558" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1047236" ref_url="https://bugzilla.suse.com/1047236" source="BUGZILLA"/>
		<reference ref_id="1047240" ref_url="https://bugzilla.suse.com/1047240" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- CVE-2016-9063: Possible integer overflow to fix inside XML_Parse leading to unexpected behaviour (bsc#1047240)
- CVE-2017-9233: External Entity Vulnerability could lead to denial of service (bsc#1047236)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-06"/>
	<updated date="2017-09-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047236">SUSE bug 1047236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047240">SUSE bug 1047240</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9063">CVE-2016-9063 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9233">CVE-2017-9233 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571299" comment="expat-2.0.1-88.42.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571300" comment="libexpat1-2.0.1-88.42.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571301" comment="libexpat1-32bit-2.0.1-88.42.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218559" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1139937" ref_url="https://bugzilla.suse.com/1139937" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20843" ref_url="https://www.suse.com/security/cve/CVE-2018-20843/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

Security issue fixed:

- CVE-2018-20843: Fixed a denial of service triggered by high resource consumption 
  in the XML parser when XML names contain a large amount of colons (bsc#1139937).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-12"/>
	<updated date="2019-07-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1139937">SUSE bug 1139937</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20843/">CVE-2018-20843 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20843">CVE-2018-20843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571302" comment="expat-2.0.1-88.42.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571303" comment="libexpat1-2.0.1-88.42.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571304" comment="libexpat1-32bit-2.0.1-88.42.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218560" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1149429" ref_url="https://bugzilla.suse.com/1149429" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

Security issue fixed:

- CVE-2019-15903: Fixed a heap-based buffer over-read caused by crafted XML documents. (bsc#1149429)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149429">SUSE bug 1149429</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571305" comment="expat-2.0.1-88.42.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571306" comment="libexpat1-2.0.1-88.42.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571307" comment="libexpat1-32bit-2.0.1-88.42.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218561" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194251" ref_url="https://bugzilla.suse.com/1194251" source="BUGZILLA"/>
		<reference ref_id="1194362" ref_url="https://bugzilla.suse.com/1194362" source="BUGZILLA"/>
		<reference ref_id="1194474" ref_url="https://bugzilla.suse.com/1194474" source="BUGZILLA"/>
		<reference ref_id="1194476" ref_url="https://bugzilla.suse.com/1194476" source="BUGZILLA"/>
		<reference ref_id="1194477" ref_url="https://bugzilla.suse.com/1194477" source="BUGZILLA"/>
		<reference ref_id="1194478" ref_url="https://bugzilla.suse.com/1194478" source="BUGZILLA"/>
		<reference ref_id="1194479" ref_url="https://bugzilla.suse.com/1194479" source="BUGZILLA"/>
		<reference ref_id="1194480" ref_url="https://bugzilla.suse.com/1194480" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45960" ref_url="https://www.suse.com/security/cve/CVE-2021-45960/" source="CVE"/>
		<reference ref_id="CVE-2021-46143" ref_url="https://www.suse.com/security/cve/CVE-2021-46143/" source="CVE"/>
		<reference ref_id="CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822/" source="CVE"/>
		<reference ref_id="CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823/" source="CVE"/>
		<reference ref_id="CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824/" source="CVE"/>
		<reference ref_id="CVE-2022-22825" ref_url="https://www.suse.com/security/cve/CVE-2022-22825/" source="CVE"/>
		<reference ref_id="CVE-2022-22826" ref_url="https://www.suse.com/security/cve/CVE-2022-22826/" source="CVE"/>
		<reference ref_id="CVE-2022-22827" ref_url="https://www.suse.com/security/cve/CVE-2022-22827/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- CVE-2021-45960: Fixed left shift in the storeAtts function in xmlparse.c that can lead to realloc misbehavior (bsc#1194251).
- CVE-2021-46143: Fixed integer overflow in m_groupSize in doProlog (bsc#1194362).
- CVE-2022-22822: Fixed integer overflow in addBinding in xmlparse.c (bsc#1194474).
- CVE-2022-22823: Fixed integer overflow in build_model in xmlparse.c (bsc#1194476).
- CVE-2022-22824: Fixed integer overflow in defineAttribute in xmlparse.c (bsc#1194477).
- CVE-2022-22825: Fixed integer overflow in lookup in xmlparse.c (bsc#1194478).
- CVE-2022-22826: Fixed integer overflow in nextScaffoldPart in xmlparse.c (bsc#1194479).
- CVE-2022-22827: Fixed integer overflow in storeAtts in xmlparse.c (bsc#1194480).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194251">SUSE bug 1194251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194362">SUSE bug 1194362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194474">SUSE bug 1194474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194476">SUSE bug 1194476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194477">SUSE bug 1194477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194478">SUSE bug 1194478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194479">SUSE bug 1194479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194480">SUSE bug 1194480</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45960/">CVE-2021-45960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45960">CVE-2021-45960 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46143/">CVE-2021-46143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46143">CVE-2021-46143 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22822">CVE-2022-22822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22823">CVE-2022-22823 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22824">CVE-2022-22824 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22825/">CVE-2022-22825 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22825">CVE-2022-22825 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22826/">CVE-2022-22826 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22826">CVE-2022-22826 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22827/">CVE-2022-22827 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22827">CVE-2022-22827 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664120" comment="expat-2.0.1-88.42.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664121" comment="libexpat1-2.0.1-88.42.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664122" comment="libexpat1-32bit-2.0.1-88.42.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218562" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1195054" ref_url="https://bugzilla.suse.com/1195054" source="BUGZILLA"/>
		<reference ref_id="1195217" ref_url="https://bugzilla.suse.com/1195217" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852/" source="CVE"/>
		<reference ref_id="CVE-2022-23990" ref_url="https://www.suse.com/security/cve/CVE-2022-23990/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-23852: Fixed signed integer overflow in XML_GetBuffer (bsc#1195054).
- CVE-2022-23990: Fixed integer overflow in the doProlog function (bsc#1195217).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-09"/>
	<updated date="2022-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195054">SUSE bug 1195054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195217">SUSE bug 1195217</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23852">CVE-2022-23852 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23990/">CVE-2022-23990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23990">CVE-2022-23990 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666458" comment="expat-2.0.1-88.42.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666459" comment="libexpat1-2.0.1-88.42.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666460" comment="libexpat1-32bit-2.0.1-88.42.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218563" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196026" ref_url="https://bugzilla.suse.com/1196026" source="BUGZILLA"/>
		<reference ref_id="1196168" ref_url="https://bugzilla.suse.com/1196168" source="BUGZILLA"/>
		<reference ref_id="1196169" ref_url="https://bugzilla.suse.com/1196169" source="BUGZILLA"/>
		<reference ref_id="1196171" ref_url="https://bugzilla.suse.com/1196171" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313/" source="CVE"/>
		<reference ref_id="CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-25236: Fixed possible namespace-separator characters insertion into namespace URIs (bsc#1196025).
- CVE-2022-25235: Fixed UTF-8 character validation in a certain context (bsc#1196026).
- CVE-2022-25313: Fixed stack exhaustion in build_model() via uncontrolled recursion (bsc#1196168).
- CVE-2022-25314: Fixed integer overflow in copyString (bsc#1196169).
- CVE-2022-25315: Fixed integer overflow in storeRawNames (bsc#1196171).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196026">SUSE bug 1196026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196168">SUSE bug 1196168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196169">SUSE bug 1196169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196171">SUSE bug 1196171</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">CVE-2022-25235 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25313">CVE-2022-25313 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25314">CVE-2022-25314 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25315">CVE-2022-25315 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669483" comment="expat-2.0.1-88.42.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669484" comment="libexpat1-2.0.1-88.42.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669485" comment="libexpat1-32bit-2.0.1-88.42.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218564" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196784" ref_url="https://bugzilla.suse.com/1196784" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- Fixed a regression caused by the patch for CVE-2022-25236 (bsc#1196784).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-31"/>
	<updated date="2022-03-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196784">SUSE bug 1196784</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671290" comment="expat-2.0.1-88.42.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671291" comment="libexpat1-2.0.1-88.42.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671292" comment="libexpat1-32bit-2.0.1-88.42.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218565" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1203438" ref_url="https://bugzilla.suse.com/1203438" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40674" ref_url="https://www.suse.com/security/cve/CVE-2022-40674/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-40674: Fixed use-after-free in the doContent function in xmlparse.c (bsc#1203438).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-29"/>
	<updated date="2022-09-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203438">SUSE bug 1203438</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40674/">CVE-2022-40674 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40674">CVE-2022-40674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992752" comment="expat-2.0.1-88.42.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992753" comment="libexpat1-2.0.1-88.42.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992754" comment="libexpat1-32bit-2.0.1-88.42.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218566" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204708" ref_url="https://bugzilla.suse.com/1204708" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-43680" ref_url="https://www.suse.com/security/cve/CVE-2022-43680/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

  - CVE-2022-43680: Fixed use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate (bsc#1204708).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-07"/>
	<updated date="2022-11-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204708">SUSE bug 1204708</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43680/">CVE-2022-43680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43680">CVE-2022-43680 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992755" comment="expat-2.0.1-88.42.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992756" comment="libexpat1-2.0.1-88.42.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992757" comment="libexpat1-32bit-2.0.1-88.42.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218567" version="1" class="patch">
	<metadata>
		<title>Security update for facter (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="917383" ref_url="https://bugzilla.suse.com/917383" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1426" ref_url="https://www.suse.com/security/cve/CVE-2015-1426/" source="CVE"/>
		<description>
This update for facter fixes the following issues:

- CVE-2015-1426: Prevent the EC2 metadata fact from collecting security credentials (bsc#917383).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-28"/>
	<updated date="2020-05-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/917383">SUSE bug 917383</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1426/">CVE-2015-1426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1426">CVE-2015-1426 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571308" comment="facter-1.6.18-0.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218568" version="1" class="patch">
	<metadata>
		<title>Security update for fastjar</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="607043" ref_url="https://bugzilla.suse.com/607043" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0831" ref_url="https://www.suse.com/security/cve/CVE-2010-0831/" source="CVE"/>
		<description>

This fastjar update fixes a directory traversal issue (bnc#607043).

Security Issue reference:

    * CVE-2010-0831
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0831&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/607043">SUSE bug 607043</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0831/">CVE-2010-0831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0831">CVE-2010-0831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576037" comment="fastjar-0.95-1.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576037" comment="fastjar-0.95-1.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576037" comment="fastjar-0.95-1.24.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218569" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="775988" ref_url="https://bugzilla.suse.com/775988" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3482" ref_url="https://www.suse.com/security/cve/CVE-2012-3482/" source="CVE"/>
		<description>

This update for fetchmail fixes the following issues:

- CVE-2012-3482: A denial of service vulnerability in the base64 decoder during processing server NTLM protocol exchange was fixed (bsc#775988).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-24"/>
	<updated date="2016-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/775988">SUSE bug 775988</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3482/">CVE-2012-3482 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3482">CVE-2012-3482 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571310" comment="fetchmail-6.3.8.90-13.20.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571311" comment="fetchmailconf-6.3.8.90-13.20.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218570" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188875" ref_url="https://bugzilla.suse.com/1188875" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36386" ref_url="https://www.suse.com/security/cve/CVE-2021-36386/" source="CVE"/>
		<description>
This update for fetchmail fixes the following issues:

- CVE-2021-36386: Fixed a missing variable initialization that can cause read from bad memory locations. (bsc#1188875)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-31"/>
	<updated date="2021-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188875">SUSE bug 1188875</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-36386/">CVE-2021-36386 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36386">CVE-2021-36386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627042" comment="fetchmail-6.3.8.90-13.20.22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627043" comment="fetchmailconf-6.3.8.90-13.20.22.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218571" version="1" class="patch">
	<metadata>
		<title>Security update for file</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="863450" ref_url="https://bugzilla.suse.com/863450" source="BUGZILLA"/>
		<reference ref_id="866750" ref_url="https://bugzilla.suse.com/866750" source="BUGZILLA"/>
		<reference ref_id="902367" ref_url="https://bugzilla.suse.com/902367" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2270" ref_url="https://www.suse.com/security/cve/CVE-2014-2270/" source="CVE"/>
		<reference ref_id="CVE-2014-3710" ref_url="https://www.suse.com/security/cve/CVE-2014-3710/" source="CVE"/>
		<description>

file was updated to fix one security issue.

    * An out-of-bounds read flaw file's donote() function. This could
      possibly lead to file executable crash (CVE-2014-3710).

Security Issues:

    * CVE-2014-3710
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3710&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-18"/>
	<updated date="2014-11-18"/>
	<bugzilla href="https://bugzilla.suse.com/863450">SUSE bug 863450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866750">SUSE bug 866750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902367">SUSE bug 902367</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2270/">CVE-2014-2270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2270">CVE-2014-2270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3710/">CVE-2014-3710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3710">CVE-2014-3710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577654" comment="file-4.24-43.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577655" comment="file-32bit-4.24-43.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577656" comment="file-x86-4.24-43.27.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577654" comment="file-4.24-43.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577655" comment="file-32bit-4.24-43.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577656" comment="file-x86-4.24-43.27.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577654" comment="file-4.24-43.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577655" comment="file-32bit-4.24-43.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577656" comment="file-x86-4.24-43.27.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218572" version="1" class="patch">
	<metadata>
		<title>Security update for file-roller (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="937635" ref_url="https://bugzilla.suse.com/937635" source="BUGZILLA"/>
		<description>
This update for file-roller fixes the following issues:

- Fixed a potential denial of service when extracting a zip files (bsc#937635).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-22"/>
	<updated date="2020-07-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/937635">SUSE bug 937635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577657" comment="file-roller-2.28.2-0.10.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577658" comment="file-roller-lang-2.28.2-0.10.3.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218573" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="792432" ref_url="https://bugzilla.suse.com/792432" source="BUGZILLA"/>
		<reference ref_id="813026" ref_url="https://bugzilla.suse.com/813026" source="BUGZILLA"/>
		<reference ref_id="819204" ref_url="https://bugzilla.suse.com/819204" source="BUGZILLA"/>
		<reference ref_id="825935" ref_url="https://bugzilla.suse.com/825935" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1682" ref_url="https://www.suse.com/security/cve/CVE-2013-1682/" source="CVE"/>
		<reference ref_id="CVE-2013-1684" ref_url="https://www.suse.com/security/cve/CVE-2013-1684/" source="CVE"/>
		<reference ref_id="CVE-2013-1685" ref_url="https://www.suse.com/security/cve/CVE-2013-1685/" source="CVE"/>
		<reference ref_id="CVE-2013-1686" ref_url="https://www.suse.com/security/cve/CVE-2013-1686/" source="CVE"/>
		<reference ref_id="CVE-2013-1687" ref_url="https://www.suse.com/security/cve/CVE-2013-1687/" source="CVE"/>
		<reference ref_id="CVE-2013-1690" ref_url="https://www.suse.com/security/cve/CVE-2013-1690/" source="CVE"/>
		<reference ref_id="CVE-2013-1692" ref_url="https://www.suse.com/security/cve/CVE-2013-1692/" source="CVE"/>
		<reference ref_id="CVE-2013-1693" ref_url="https://www.suse.com/security/cve/CVE-2013-1693/" source="CVE"/>
		<reference ref_id="CVE-2013-1697" ref_url="https://www.suse.com/security/cve/CVE-2013-1697/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 17.0.7 ESR version, which fixes 
bugs and security fixes.

    * 

      MFSA 2013-49: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Gary Kwong, Jesse Ruderman, and Andrew McCreight reported memory
      safety problems and crashes that affect Firefox ESR 17, and Firefox
      21. (CVE-2013-1682)

    * 

      MFSA 2013-50: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team used the Address Sanitizer tool to
      discover a series of use-after-free problems rated critical as
      security issues in shipped software. Some of these issues are
      potentially exploitable, allowing for remote code execution. We would
      also like to thank Abhishek for reporting additional use-after-free
      and buffer overflow flaws in code introduced during Firefox
      development. These were fixed before general release.

          o Heap-use-after-free in
            mozilla::dom::HTMLMediaElement::LookupMediaElementURITable
            (CVE-2013-1684)
          o Heap-use-after-free in nsIDocument::GetRootElement
            (CVE-2013-1685)
          o Heap-use-after-free in mozilla::ResetDir (CVE-2013-1686)
    * 

      MFSA 2013-51 / CVE-2013-1687: Security researcher Mariusz Mlynski
      reported that it is possible to compile a user-defined function in
      the XBL scope of a specific element and then trigger an event within
      this scope to run code. In some circumstances, when this code is run,
      it can access content protected by System Only Wrappers (SOW) and
      chrome-privileged pages. This could potentially lead to arbitrary
      code execution. Additionally, Chrome Object Wrappers (COW) can be
      bypassed by web content to access privileged methods, leading to a
      cross-site scripting (XSS) attack from privileged pages.

    * 

      MFSA 2013-53 / CVE-2013-1690: Security researcher Nils reported that
      specially crafted web content using the onreadystatechange event and
      reloading of pages could sometimes cause a crash when unmapped memory
      is executed. This crash is potentially exploitable.

    * 

      MFSA 2013-54 / CVE-2013-1692: Security researcher Johnathan Kuskos
      reported that Firefox is sending data in the body of XMLHttpRequest
      (XHR) HEAD requests, which goes agains the XHR specification. This
      can potentially be used for Cross-Site Request Forgery (CSRF) attacks
      against sites which do not distinguish between HEAD and POST
      requests.

    * 

      MFSA 2013-55 / CVE-2013-1693: Security researcher Paul Stone of
      Context Information Security discovered that timing differences in
      the processing of SVG format images with filters could allow for
      pixel values to be read. This could potentially allow for text values
      to be read across domains, leading to information disclosure.

    * 

      MFSA 2013-59 / CVE-2013-1697: Mozilla security researcher
      moz_bug_r_a4 reported that XrayWrappers can be bypassed to call
      content-defined toString and valueOf methods through DefaultValue.
      This can lead to unexpected behavior when privileged code acts on the
      incorrect values.

    * 

      MFSA 2013-30: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan
      Sreckovic, and Joe Drew reported memory safety problems and crashes
      that affect Firefox ESR 17, and Firefox 19. (CVE-2013-0788)

    * 

      MFSA 2013-31 / CVE-2013-0800: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover an out-of-bounds write in Cairo graphics
      library. When certain values are passed to it during rendering, Cairo
      attempts to use negative boundaries or sizes for boxes, leading to a
      potentially exploitable crash in some instances.

    * 

      MFSA 2013-32 / CVE-2013-0799: Security researcher Frederic Hoguin
      discovered that the Mozilla Maintenance Service on Windows was
      vulnerable to a buffer overflow. This system is used to update
      software without invoking the User Account Control (UAC) prompt. The
      Mozilla Maintenance Service is configured to allow unprivileged users
      to start it with arbitrary arguments. By manipulating the data passed
      in these arguments, an attacker can execute arbitrary code with the
      system privileges used by the service. This issue requires local file
      system access to be exploitable.

    * 

      MFSA 2013-34 / CVE-2013-0797: Security researcher Ash reported an
      issue with the Mozilla Updater. The Mozilla Updater can be made to
      load a malicious local DLL file in a privileged context through
      either the Mozilla Maintenance Service or independently on systems
      that do not use the service. This occurs when the DLL file is placed
      in a specific location on the local system before the Mozilla Updater
      is run. Local file system access is necessary in order for this issue
      to be exploitable.

    * 

      MFSA 2013-35 / CVE-2013-0796: Security researcher miaubiz used the
      Address Sanitizer tool to discover a crash in WebGL rendering when
      memory is freed that has not previously been allocated. This issue
      only affects Linux users who have Intel Mesa graphics drivers. The
      resulting crash could be potentially exploitable.

    * 

      MFSA 2013-36 / CVE-2013-0795: Security researcher Cody Crews reported
      a mechanism to use the cloneNode method to bypass System Only
      Wrappers (SOW) and clone a protected node. This allows violation of
      the browser's same origin policy and could also lead to privilege
      escalation and the execution of arbitrary code.

    * 

      MFSA 2013-37 / CVE-2013-0794: Security researcher shutdown reported a
      method for removing the origin indication on tab-modal dialog boxes
      in combination with browser navigation. This could allow an
      attacker's dialog to overlay a page and show another site's content.
      This can be used for phishing by allowing users to enter data into a
      modal prompt dialog on an attacking, site while appearing to be from
      the displayed site.

    * 

      MFSA 2013-38 / CVE-2013-0793: Security researcher Mariusz Mlynski
      reported a method to use browser navigations through history to load
      an arbitrary website with that page's baseURI property pointing to
      another site instead of the seemingly loaded one. The user will
      continue to see the incorrect site in the addressbar of the browser.
      This allows for a cross-site scripting (XSS) attack or the theft of
      data through a phishing attack.

    * 

      MFSA 2013-39 / CVE-2013-0792: Mozilla community member Tobias Schula
      reported that if gfx.color_management.enablev4 preference is enabled
      manually in about:config, some grayscale PNG images will be rendered
      incorrectly and cause memory corruption during PNG decoding when
      certain color profiles are in use. A crafted PNG image could use this
      flaw to leak data through rendered images drawing from random memory.
      By default, this preference is not enabled.

    * 

      MFSA 2013-40 / CVE-2013-0791: Mozilla community member Ambroz Bizjak
      reported an out-of-bounds array read in the CERT_DecodeCertPackage
      function of the Network Security Services (NSS) libary when decoding
      a certificate. When this occurs, it will lead to memory corruption
      and a non-exploitable crash.

    * 

      MFSA 2013-41: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      References

          o Christoph Diehl, Christian Holler, Jesse Ruderman, Timothy
            Nikkel, and Jeff Walden reported memory safety problems and
            crashes that affect Firefox ESR 17, and Firefox 20.
          o Bob Clary, Ben Turner, Benoit Jacob, Bobby Holley, Christoph
            Diehl, Christian Holler, Andrew McCreight, Gary Kwong, Jason
            Orendorff, Jesse Ruderman, Matt Wobensmith, and Mats Palmgren
            reported memory safety problems and crashes that affect Firefox
            20.
    * 

      MFSA 2013-42 / CVE-2013-1670: Security researcher Cody Crews reported
      a method to call a content level constructor that allows for this
      constructor to have chrome privileged accesss. This affects chrome
      object wrappers (COW) and allows for write actions on objects when
      only read actions should be allowed. This can lead to cross-site
      scripting (XSS) attacks.

    * 

      MFSA 2013-43 / CVE-2013-1671: Mozilla security researcher
      moz_bug_r_a4 reported a mechanism to exploit the control when set to
      the file type in order to get the full path. This can lead to
      information leakage and could be combined with other exploits to
      target attacks on the local file system.

    * 

      MFSA 2013-44 / CVE-2013-1672: Security researcher Seb Patane reported
      an issue with the Mozilla Maintenance Service on Windows. This issue
      allows unprivileged users to local privilege escalation through the
      system privileges used by the service when interacting with local
      malicious software. This allows the user to bypass integrity checks
      leading to local privilege escalation. Local file system access is
      necessary in order for this issue to be exploitable and it cannot be
      triggered through web content.

    * 

      MFSA 2013-45: Security researcher Robert Kugler discovered that in
      some instances the Mozilla Maintenance Service on Windows will be
      vulnerable to some previously fixed privilege escalation attacks that
      allowed for local privilege escalation. This was caused by the
      Mozilla Updater not updating Windows Registry entries for the Mozilla
      Maintenance Service, which fixed the earlier issues present if
      Firefox 12 had been installed. New installations of Firefox after
      version 12 are not affected by this issue. Local file system access
      is necessary in order for this issue to be exploitable and it cannot
      be triggered through web content. References: - old
      MozillaMaintenance Service registry entry not updated leading to
      Trusted Path Privilege Escalation (CVE-2013-1673) - Possible
      Arbitrary Code Execution by Update Service (CVE-2012-1942)

    * 

      MFSA 2013-46 / CVE-2013-1674: Security researcher Nils reported a
      use-after-free when resizing video while playing. This could allow
      for arbitrary code execution.

    * 

      MFSA 2013-47 / CVE-2013-1675: Mozilla community member Ms2ger
      discovered that some DOMSVGZoomEvent functions are used without being
      properly initialized, causing uninitialized memory to be used when
      they are called by web content. This could lead to a information
      leakage to sites depending on the contents of this uninitialized
      memory.

    * 

      MFSA 2013-48: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team used the Address Sanitizer tool to
      discover a series of use-after-free, out of bounds read, and invalid
      write problems rated as moderate to critical as security issues in
      shipped software. Some of these issues are potentially exploitable,
      allowing for remote code execution. We would also like to thank
      Abhishek for reporting additional use-after-free flaws in dir=auto
      code introduced during Firefox development. These were fixed before
      general release.

      References

          o Out of Bounds Read in SelectionIterator::GetNextSegment
            (CVE-2013-1676)
          o Out-of-bound read in gfxSkipCharsIterator::SetOffsets
            (CVE-2013-1677))
          o Invalid write in _cairo_xlib_surface_add_glyph (CVE-2013-1678)
          o Heap-use-after-free in mozilla::plugins::child::_geturlnotify
            (CVE-2013-1679)
          o Heap-use-after-free in nsFrameList::FirstChild (CVE-2013-1680)
          o Heap-use-after-free in nsContentUtils::RemoveScriptBlocker
            (CVE-2013-1681)
    * 

      CVE-2012-1942
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1942&gt;

    * CVE-2013-0788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788&gt;
    * CVE-2013-0791
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791&gt;
    * CVE-2013-0792
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0792&gt;
    * CVE-2013-0793
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793&gt;
    * CVE-2013-0794
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0794&gt;
    * CVE-2013-0795
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795&gt;
    * CVE-2013-0796
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796&gt;
    * CVE-2013-0797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0797&gt;
    * CVE-2013-0798
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0798&gt;
    * CVE-2013-0799
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0799&gt;
    * CVE-2013-0800
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800&gt;
    * CVE-2013-0801
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0801&gt;
    * CVE-2013-1669
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1669&gt;
    * CVE-2013-1670
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1670&gt;
    * CVE-2013-1671
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1671&gt;
    * CVE-2013-1672
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1672&gt;
    * CVE-2013-1673
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1673&gt;
    * CVE-2013-1674
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1674&gt;
    * CVE-2013-1675
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1675&gt;
    * CVE-2013-1676
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1676&gt;
    * CVE-2013-1677
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1677&gt;
    * CVE-2013-1678
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1678&gt;
    * CVE-2013-1679
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1679&gt;
    * CVE-2013-1680
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1680&gt;
    * CVE-2013-1681
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1681&gt;
    * CVE-2013-1682
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1682&gt;
    * CVE-2013-1684
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1684&gt;
    * CVE-2013-1685
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1685&gt;
    * CVE-2013-1686
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1686&gt;
    * CVE-2013-1687
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1687&gt;
    * CVE-2013-1690
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1690&gt;
    * CVE-2013-1692
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1692&gt;
    * CVE-2013-1693
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1693&gt;
    * CVE-2013-1697
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1697&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-07-02"/>
	<updated date="2013-07-02"/>
	<bugzilla href="https://bugzilla.suse.com/792432">SUSE bug 792432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1682/">CVE-2013-1682 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1682">CVE-2013-1682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1684/">CVE-2013-1684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1684">CVE-2013-1684 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1685/">CVE-2013-1685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1685">CVE-2013-1685 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1686/">CVE-2013-1686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1686">CVE-2013-1686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1687/">CVE-2013-1687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1687">CVE-2013-1687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1690/">CVE-2013-1690 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-1690">CVE-2013-1690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1692/">CVE-2013-1692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1692">CVE-2013-1692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1693/">CVE-2013-1693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1693">CVE-2013-1693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1697/">CVE-2013-1697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1697">CVE-2013-1697 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577659" comment="MozillaFirefox-17.0.7esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577660" comment="MozillaFirefox-branding-SLED-7-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577661" comment="MozillaFirefox-translations-17.0.7esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577659" comment="MozillaFirefox-17.0.7esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577660" comment="MozillaFirefox-branding-SLED-7-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577661" comment="MozillaFirefox-translations-17.0.7esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577659" comment="MozillaFirefox-17.0.7esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577660" comment="MozillaFirefox-branding-SLED-7-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577661" comment="MozillaFirefox-translations-17.0.7esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218574" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="847708" ref_url="https://bugzilla.suse.com/847708" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 17.0.10ESR release, which fixes 
various bugs and security issues:

    * 

      MFSA 2013-93: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Jesse Ruderman and Christoph Diehl reported memory safety problems
      and crashes that affect Firefox ESR 17, Firefox ESR 24, and Firefox
      24. (CVE-2013-5590)

      Carsten Book reported a crash fixed in the NSS library used by
      Mozilla-based products fixed in Firefox 25, Firefox ESR 24.1, and
      Firefox ESR 17.0.10.(CVE-2013-1739)

    * 

      MFSA 2013-95 / CVE-2013-5604: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover an access violation due to uninitialized
      data during Extensible Stylesheet Language Transformation (XSLT)
      processing. This leads to a potentially exploitable crash.

    * 

      MFSA 2013-96 / CVE-2013-5595: Compiler Engineer Dan Gohman of Google
      discovered a flaw in the JavaScript engine where memory was being
      incorrectly allocated for some functions and the calls for
      allocations were not always properly checked for overflow, leading to
      potential buffer overflows. When combined with other vulnerabilities,
      these flaws could be potentially exploitable.

    * 

      MFSA 2013-98 / CVE-2013-5597: Security researcher Byoungyoung Lee of
      Georgia Tech Information Security Center (GTISC) used the Address
      Sanitizer tool to discover a use-after-free during state change
      events while updating the offline cache. This leads to a potentially
      exploitable crash.

    * 

      MFSA 2013-100: Security researcher Nils used the Address Sanitizer
      tool while fuzzing to discover missing strong references in browsing
      engine leading to use-after-frees. This can lead to a potentially
      exploitable crash.

          o ASAN heap-use-after-free in nsIPresShell::GetPresContext() with
            canvas, onresize and mozTextStyle (CVE-2013-5599)
          o ASAN use-after-free in
            nsIOService::NewChannelFromURIWithProxyFlags with Blob URL
            (CVE-2013-5600)
          o ASAN use-after free in GC allocation in
            nsEventListenerManager::SetEventHandler (CVE-2013-5601)
    * 

      MFSA 2013-101 / CVE-2013-5602: Security researcher Nils used the
      Address Sanitizer tool while fuzzing to discover a memory corruption
      issue with the JavaScript engine when using workers with direct
      proxies. This results in a potentially exploitable crash.

Security Issue reference:

    * CVE-2013-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-01"/>
	<updated date="2013-11-01"/>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1739">CVE-2013-1739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577662" comment="MozillaFirefox-17.0.10esr-0.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577663" comment="MozillaFirefox-branding-SLED-7-0.12.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577664" comment="MozillaFirefox-translations-17.0.10esr-0.7.4 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577662" comment="MozillaFirefox-17.0.10esr-0.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577663" comment="MozillaFirefox-branding-SLED-7-0.12.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577664" comment="MozillaFirefox-translations-17.0.10esr-0.7.4 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577662" comment="MozillaFirefox-17.0.10esr-0.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577663" comment="MozillaFirefox-branding-SLED-7-0.12.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577664" comment="MozillaFirefox-translations-17.0.10esr-0.7.4 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218575" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="859055" ref_url="https://bugzilla.suse.com/859055" source="BUGZILLA"/>
		<reference ref_id="861847" ref_url="https://bugzilla.suse.com/861847" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1477" ref_url="https://www.suse.com/security/cve/CVE-2014-1477/" source="CVE"/>
		<reference ref_id="CVE-2014-1479" ref_url="https://www.suse.com/security/cve/CVE-2014-1479/" source="CVE"/>
		<reference ref_id="CVE-2014-1480" ref_url="https://www.suse.com/security/cve/CVE-2014-1480/" source="CVE"/>
		<reference ref_id="CVE-2014-1481" ref_url="https://www.suse.com/security/cve/CVE-2014-1481/" source="CVE"/>
		<reference ref_id="CVE-2014-1482" ref_url="https://www.suse.com/security/cve/CVE-2014-1482/" source="CVE"/>
		<reference ref_id="CVE-2014-1483" ref_url="https://www.suse.com/security/cve/CVE-2014-1483/" source="CVE"/>
		<reference ref_id="CVE-2014-1484" ref_url="https://www.suse.com/security/cve/CVE-2014-1484/" source="CVE"/>
		<reference ref_id="CVE-2014-1485" ref_url="https://www.suse.com/security/cve/CVE-2014-1485/" source="CVE"/>
		<reference ref_id="CVE-2014-1486" ref_url="https://www.suse.com/security/cve/CVE-2014-1486/" source="CVE"/>
		<reference ref_id="CVE-2014-1487" ref_url="https://www.suse.com/security/cve/CVE-2014-1487/" source="CVE"/>
		<reference ref_id="CVE-2014-1488" ref_url="https://www.suse.com/security/cve/CVE-2014-1488/" source="CVE"/>
		<reference ref_id="CVE-2014-1489" ref_url="https://www.suse.com/security/cve/CVE-2014-1489/" source="CVE"/>
		<reference ref_id="CVE-2014-1490" ref_url="https://www.suse.com/security/cve/CVE-2014-1490/" source="CVE"/>
		<reference ref_id="CVE-2014-1491" ref_url="https://www.suse.com/security/cve/CVE-2014-1491/" source="CVE"/>
		<description>

This updates the Mozilla Firefox browser to the 24.3.0ESR security release. 
The Mozilla NSS libraries are now on version 3.15.4.

The following security issues have been fixed:

    * 

      MFSA 2014-01: Memory safety bugs fixed in Firefox ESR 24.3 and
      Firefox 27.0 (CVE-2014-1477)(bnc#862345)

    * 

      MFSA 2014-02: Using XBL scopes its possible to steal(clone) native
      anonymous content (CVE-2014-1479)(bnc#862348)

    * 

      MFSA 2014-03: Download 'open file' dialog delay is too quick, doesn't
      prevent clickjacking (CVE-2014-1480)

    * 

      MFSA 2014-04: Image decoding causing FireFox to crash with Goo Create
      (CVE-2014-1482)(bnc#862356)

    * 

      MFSA 2014-05: caretPositionFromPoint and elementFromPoint leak
      information about iframe contents via timing information
      (CVE-2014-1483)(bnc#862360)

    * 

      MFSA 2014-06: Fennec leaks profile path to logcat (CVE-2014-1484)

    * 

      MFSA 2014-07: CSP should block XSLT as script, not as style
      (CVE-2014-1485)

    * 

      MFSA 2014-08: imgRequestProxy Use-After-Free Remote Code Execution
      Vulnerability (CVE-2014-1486)

    * 

      MFSA 2014-09: Cross-origin information disclosure with error message
      of Web Workers (CVE-2014-1487)

    * 

      MFSA 2014-10: settings &amp; history ID bug (CVE-2014-1489)

    * 

      MFSA 2014-11: Firefox reproducibly crashes when using asm.js code in
      workers and transferable objects (CVE-2014-1488)

    * 

      MFSA 2014-12: TOCTOU, potential use-after-free in libssl's session
      ticket processing (CVE-2014-1490)(bnc#862300) Do not allow p-1 as a
      public DH value (CVE-2014-1491)(bnc#862289)

    * 

      MFSA 2014-13: Inconsistent this value when invoking getters on window
      (CVE-2014-1481)(bnc#862309)

Security Issue references:

    * CVE-2014-1477
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477&gt;
    * CVE-2014-1479
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479&gt;
    * CVE-2014-1480
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1480&gt;
    * CVE-2014-1481
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481&gt;
    * CVE-2014-1482
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482&gt;
    * CVE-2014-1483
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1483&gt;
    * CVE-2014-1484
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1484&gt;
    * CVE-2014-1485
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1485&gt;
    * CVE-2014-1486
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486&gt;
    * CVE-2014-1487
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487&gt;
    * CVE-2014-1488
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1488&gt;
    * CVE-2014-1489
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1489&gt;
    * CVE-2014-1490
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490&gt;
    * CVE-2014-1491
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-07"/>
	<updated date="2014-02-07"/>
	<bugzilla href="https://bugzilla.suse.com/859055">SUSE bug 859055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1477/">CVE-2014-1477 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1477">CVE-2014-1477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1479/">CVE-2014-1479 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1479">CVE-2014-1479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1480/">CVE-2014-1480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1480">CVE-2014-1480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1481/">CVE-2014-1481 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1481">CVE-2014-1481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1482/">CVE-2014-1482 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1482">CVE-2014-1482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1483/">CVE-2014-1483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1483">CVE-2014-1483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1484/">CVE-2014-1484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1484">CVE-2014-1484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1485/">CVE-2014-1485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1485">CVE-2014-1485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1486/">CVE-2014-1486 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1486">CVE-2014-1486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1487/">CVE-2014-1487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1487">CVE-2014-1487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1488/">CVE-2014-1488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1488">CVE-2014-1488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1489/">CVE-2014-1489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1489">CVE-2014-1489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1490/">CVE-2014-1490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1490">CVE-2014-1490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1491/">CVE-2014-1491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1491">CVE-2014-1491 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577665" comment="MozillaFirefox-24.3.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577666" comment="MozillaFirefox-branding-SLED-24-0.7.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577667" comment="MozillaFirefox-translations-24.3.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577668" comment="libfreebl3-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577669" comment="libfreebl3-32bit-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577670" comment="libfreebl3-x86-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577671" comment="libsoftokn3-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577672" comment="libsoftokn3-32bit-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577673" comment="libsoftokn3-x86-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577674" comment="mozilla-nss-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577675" comment="mozilla-nss-32bit-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577676" comment="mozilla-nss-tools-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577677" comment="mozilla-nss-x86-3.15.4-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577665" comment="MozillaFirefox-24.3.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577666" comment="MozillaFirefox-branding-SLED-24-0.7.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577667" comment="MozillaFirefox-translations-24.3.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577668" comment="libfreebl3-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577669" comment="libfreebl3-32bit-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577670" comment="libfreebl3-x86-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577671" comment="libsoftokn3-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577672" comment="libsoftokn3-32bit-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577673" comment="libsoftokn3-x86-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577674" comment="mozilla-nss-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577675" comment="mozilla-nss-32bit-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577676" comment="mozilla-nss-tools-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577677" comment="mozilla-nss-x86-3.15.4-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577665" comment="MozillaFirefox-24.3.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577666" comment="MozillaFirefox-branding-SLED-24-0.7.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577667" comment="MozillaFirefox-translations-24.3.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577668" comment="libfreebl3-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577669" comment="libfreebl3-32bit-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577670" comment="libfreebl3-x86-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577671" comment="libsoftokn3-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577672" comment="libsoftokn3-32bit-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577673" comment="libsoftokn3-x86-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577674" comment="mozilla-nss-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577675" comment="mozilla-nss-32bit-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577676" comment="mozilla-nss-tools-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577677" comment="mozilla-nss-x86-3.15.4-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218576" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="868603" ref_url="https://bugzilla.suse.com/868603" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1493" ref_url="https://www.suse.com/security/cve/CVE-2014-1493/" source="CVE"/>
		<reference ref_id="CVE-2014-1494" ref_url="https://www.suse.com/security/cve/CVE-2014-1494/" source="CVE"/>
		<reference ref_id="CVE-2014-1496" ref_url="https://www.suse.com/security/cve/CVE-2014-1496/" source="CVE"/>
		<reference ref_id="CVE-2014-1497" ref_url="https://www.suse.com/security/cve/CVE-2014-1497/" source="CVE"/>
		<reference ref_id="CVE-2014-1498" ref_url="https://www.suse.com/security/cve/CVE-2014-1498/" source="CVE"/>
		<reference ref_id="CVE-2014-1499" ref_url="https://www.suse.com/security/cve/CVE-2014-1499/" source="CVE"/>
		<reference ref_id="CVE-2014-1500" ref_url="https://www.suse.com/security/cve/CVE-2014-1500/" source="CVE"/>
		<reference ref_id="CVE-2014-1501" ref_url="https://www.suse.com/security/cve/CVE-2014-1501/" source="CVE"/>
		<reference ref_id="CVE-2014-1502" ref_url="https://www.suse.com/security/cve/CVE-2014-1502/" source="CVE"/>
		<reference ref_id="CVE-2014-1504" ref_url="https://www.suse.com/security/cve/CVE-2014-1504/" source="CVE"/>
		<reference ref_id="CVE-2014-1505" ref_url="https://www.suse.com/security/cve/CVE-2014-1505/" source="CVE"/>
		<reference ref_id="CVE-2014-1508" ref_url="https://www.suse.com/security/cve/CVE-2014-1508/" source="CVE"/>
		<reference ref_id="CVE-2014-1509" ref_url="https://www.suse.com/security/cve/CVE-2014-1509/" source="CVE"/>
		<reference ref_id="CVE-2014-1510" ref_url="https://www.suse.com/security/cve/CVE-2014-1510/" source="CVE"/>
		<reference ref_id="CVE-2014-1511" ref_url="https://www.suse.com/security/cve/CVE-2014-1511/" source="CVE"/>
		<reference ref_id="CVE-2014-1512" ref_url="https://www.suse.com/security/cve/CVE-2014-1512/" source="CVE"/>
		<reference ref_id="CVE-2014-1513" ref_url="https://www.suse.com/security/cve/CVE-2014-1513/" source="CVE"/>
		<reference ref_id="CVE-2014-1514" ref_url="https://www.suse.com/security/cve/CVE-2014-1514/" source="CVE"/>
		<description>

Mozilla Firefox was updated to 24.4.0ESR release, fixing various security 
issues and bugs:

    * 

      MFSA 2014-15: Mozilla developers and community identified identified
      and fixed several memory safety bugs in the browser engine used in
      Firefox and other Mozilla-based products. Some of these bugs showed
      evidence of memory corruption under certain circumstances, and we
      presume that with enough effort at least some of these could be
      exploited to run arbitrary code.

    * 

      Benoit Jacob, Olli Pettay, Jan Varga, Jan de Mooij, Jesse Ruderman,
      Dan Gohman, and Christoph Diehl reported memory safety problems and
      crashes that affect Firefox ESR 24.3 and Firefox 27. (CVE-2014-1493)

    * 

      Gregor Wagner, Olli Pettay, Gary Kwong, Jesse Ruderman, Luke Wagner,
      Rob Fletcher, and Makoto Kato reported memory safety problems and
      crashes that affect Firefox 27. (CVE-2014-1494)

    * 

      MFSA 2014-16 / CVE-2014-1496: Security researcher Ash reported an
      issue where the extracted files for updates to existing files are not
      read only during the update process. This allows for the potential
      replacement or modification of these files during the update process
      if a malicious application is present on the local system.

    * 

      MFSA 2014-17 / CVE-2014-1497: Security researcher Atte Kettunen from
      OUSPG reported an out of bounds read during the decoding of WAV
      format audio files for playback. This could allow web content access
      to heap data as well as causing a crash.

    * 

      MFSA 2014-18 / CVE-2014-1498: Mozilla developer David Keeler reported
      that the crypto.generateCRFMRequest method did not correctly validate
      the key type of the KeyParams argument when generating ec-dual-use
      requests. This could lead to a crash and a denial of service (DOS)
      attack.

    * 

      MFSA 2014-19 / CVE-2014-1499: Mozilla developer Ehsan Akhgari
      reported a spoofing attack where the permission prompt for a WebRTC
      session can appear to be from a different site than its actual
      originating site if a timed navigation occurs during the prompt
      generation. This allows an attacker to potentially gain access to the
      webcam or microphone by masquerading as another site and gaining user
      permission through spoofing.

    * 

      MFSA 2014-20 / CVE-2014-1500: Security researchers Tim Philipp
      Schaefers and Sebastian Neef, the team of Internetwache.org, reported
      a mechanism using JavaScript onbeforeunload events with page
      navigation to prevent users from closing a malicious page's tab and
      causing the browser to become unresponsive. This allows for a denial
      of service (DOS) attack due to resource consumption and blocks the
      ability of users to exit the application.

    * 

      MFSA 2014-21 / CVE-2014-1501: Security researcher Alex Infuehr
      reported that on Firefox for Android it is possible to open links to
      local files from web content by selecting 'Open Link in New Tab' from
      the context menu using the file: protocol. The web content would have
      to know the precise location of a malicious local file in order to
      exploit this issue. This issue does not affect Firefox on non-Android
      systems.

    * 

      MFSA 2014-22 / CVE-2014-1502: Mozilla developer Jeff Gilbert
      discovered a mechanism where a malicious site with WebGL content
      could inject content from its context to that of another site's WebGL
      context, causing the second site to replace textures and similar
      content. This cannot be used to steal data but could be used to
      render arbitrary content in these limited circumstances.

    * 

      MFSA 2014-23 / CVE-2014-1504: Security researcher Nicolas Golubovic
      reported that the Content Security Policy (CSP) of data: documents
      was not saved as part of session restore. If an attacker convinced a
      victim to open a document from a data: URL injected onto a page, this
      can lead to a Cross-Site Scripting (XSS) attack. The target page may
      have a strict CSP that protects against this XSS attack, but if the
      attacker induces a browser crash with another bug, an XSS attack
      would occur during session restoration, bypassing the CSP on the
      site.

    * 

      MFSA 2014-26 / CVE-2014-1508: Security researcher Tyson Smith and
      Jesse Schwartzentruber of the BlackBerry Security Automated Analysis
      Team used the Address Sanitizer tool while fuzzing to discover an
      out-of-bounds read during polygon rendering in MathML. This can allow
      web content to potentially read protected memory addresses. In
      combination with previous techniques used for SVG timing attacks,
      this could allow for text values to be read across domains, leading
      to information disclosure.

    * 

      MFSA 2014-27 / CVE-2014-1509: Security researcher John Thomson
      discovered a memory corruption in the Cairo graphics library during
      font rendering of a PDF file for display. This memory corruption
      leads to a potentially exploitable crash and to a denial of service
      (DOS). This issues is not able to be triggered in a default
      configuration and would require a malicious extension to be
      installed.

    * 

      MFSA 2014-28 / CVE-2014-1505: Mozilla developer Robert O'Callahan
      reported a mechanism for timing attacks involving SVG filters and
      displacements input to feDisplacementMap. This allows displacements
      to potentially be correlated with values derived from content. This
      is similar to the previously reported techniques used for SVG timing
      attacks and could allow for text values to be read across domains,
      leading to information disclosure.

    * 

      MFSA 2014-29 / CVE-2014-1510 / CVE-2014-1511: Security researcher
      Mariusz Mlynski, via TippingPoint's Pwn2Own contest, reported that it
      is possible for untrusted web content to load a chrome-privileged
      page by getting JavaScript-implemented WebIDL to call window.open().
      A second bug allowed the bypassing of the popup-blocker without user
      interaction. Combined these two bugs allow an attacker to load a
      JavaScript URL that is executed with the full privileges of the
      browser, which allows arbitrary code execution.

    * 

      MFSA 2014-30 / CVE-2014-1512: Security research firm VUPEN, via
      TippingPoint's Pwn2Own contest, reported that memory pressure during
      Garbage Collection could lead to memory corruption of TypeObjects in
      the JS engine, resulting in an exploitable use-after-free condition.

    * 

      MFSA 2014-31 / CVE-2014-1513: Security researcher Jueri Aedla, via
      TippingPoint's Pwn2Own contest, reported that TypedArrayObject does
      not handle the case where ArrayBuffer objects are neutered, setting
      their length to zero while still in use. This leads to out-of-bounds
      reads and writes into the JavaScript heap, allowing for arbitrary
      code execution.

    * 

      MFSA 2014-32 / CVE-2014-1514: Security researcher George Hotz, via
      TippingPoint's Pwn2Own contest, discovered an issue where values are
      copied from an array into a second, neutered array. This allows for
      an out-of-bounds write into memory, causing an exploitable crash
      leading to arbitrary code execution.

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-20"/>
	<updated date="2014-03-20"/>
	<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1493/">CVE-2014-1493 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1493">CVE-2014-1493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1494/">CVE-2014-1494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1494">CVE-2014-1494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1496/">CVE-2014-1496 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1496">CVE-2014-1496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1497/">CVE-2014-1497 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1497">CVE-2014-1497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1498/">CVE-2014-1498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1498">CVE-2014-1498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1499/">CVE-2014-1499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1499">CVE-2014-1499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1500/">CVE-2014-1500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1500">CVE-2014-1500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1501/">CVE-2014-1501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1501">CVE-2014-1501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1502/">CVE-2014-1502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1502">CVE-2014-1502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1504/">CVE-2014-1504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1504">CVE-2014-1504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1505/">CVE-2014-1505 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1505">CVE-2014-1505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1508/">CVE-2014-1508 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1508">CVE-2014-1508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1509/">CVE-2014-1509 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1509">CVE-2014-1509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1510/">CVE-2014-1510 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1510">CVE-2014-1510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1511/">CVE-2014-1511 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1511">CVE-2014-1511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1512/">CVE-2014-1512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1512">CVE-2014-1512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1513/">CVE-2014-1513 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1513">CVE-2014-1513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1514/">CVE-2014-1514 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1514">CVE-2014-1514 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577678" comment="MozillaFirefox-24.4.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577679" comment="MozillaFirefox-branding-SLED-24-0.7.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577680" comment="MozillaFirefox-translations-24.4.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577216" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577217" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577218" comment="mozilla-nspr-x86-4.10.4-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577678" comment="MozillaFirefox-24.4.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577679" comment="MozillaFirefox-branding-SLED-24-0.7.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577680" comment="MozillaFirefox-translations-24.4.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577216" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577217" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577218" comment="mozilla-nspr-x86-4.10.4-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577678" comment="MozillaFirefox-24.4.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577679" comment="MozillaFirefox-branding-SLED-24-0.7.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577680" comment="MozillaFirefox-translations-24.4.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577216" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577217" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577218" comment="mozilla-nspr-x86-4.10.4-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218577" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="887746" ref_url="https://bugzilla.suse.com/887746" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1544" ref_url="https://www.suse.com/security/cve/CVE-2014-1544/" source="CVE"/>
		<reference ref_id="CVE-2014-1547" ref_url="https://www.suse.com/security/cve/CVE-2014-1547/" source="CVE"/>
		<reference ref_id="CVE-2014-1548" ref_url="https://www.suse.com/security/cve/CVE-2014-1548/" source="CVE"/>
		<reference ref_id="CVE-2014-1555" ref_url="https://www.suse.com/security/cve/CVE-2014-1555/" source="CVE"/>
		<reference ref_id="CVE-2014-1556" ref_url="https://www.suse.com/security/cve/CVE-2014-1556/" source="CVE"/>
		<reference ref_id="CVE-2014-1557" ref_url="https://www.suse.com/security/cve/CVE-2014-1557/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 24.7ESR security release.

Security issues fixed in this release:

    * CVE-2014-1544 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-63.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-63.html&gt;
    * CVE-2014-1548 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-56.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-56.html&gt;
    * CVE-2014-1549 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-57.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-57.html&gt;
    * CVE-2014-1550 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-58.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-58.html&gt;
    * CVE-2014-1551 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-59.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-59.html&gt;
    * CVE-2014-1552 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-66.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-66.html&gt;
    * CVE-2014-1555 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-61.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-61.html&gt;
    * CVE-2014-1556 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-62.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-62.html&gt;
    * CVE-2014-1557 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-64.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-64.html&gt;
    * CVE-2014-1558,CVE-2014-1559,CVE-2014-1560 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-65.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-65.html&gt;
    * CVE-2014-1561 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-60.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-60.html&gt;

Security Issues:

    * CVE-2014-1557
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557&gt;
    * CVE-2014-1547
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547&gt;
    * CVE-2014-1548
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1548&gt;
    * CVE-2014-1556
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556&gt;
    * CVE-2014-1544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544&gt;
    * CVE-2014-1555
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-29"/>
	<updated date="2014-07-29"/>
	<bugzilla href="https://bugzilla.suse.com/887746">SUSE bug 887746</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1544/">CVE-2014-1544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1544">CVE-2014-1544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1547/">CVE-2014-1547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1547">CVE-2014-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1548/">CVE-2014-1548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1548">CVE-2014-1548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1555/">CVE-2014-1555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1555">CVE-2014-1555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1556/">CVE-2014-1556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1556">CVE-2014-1556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1557/">CVE-2014-1557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1557">CVE-2014-1557 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577681" comment="MozillaFirefox-24.7.0esr-0.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577682" comment="MozillaFirefox-translations-24.7.0esr-0.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577683" comment="libfreebl3-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577684" comment="libfreebl3-32bit-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577685" comment="libfreebl3-x86-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577686" comment="libsoftokn3-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577687" comment="libsoftokn3-32bit-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577688" comment="libsoftokn3-x86-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577689" comment="mozilla-nss-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577690" comment="mozilla-nss-32bit-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577691" comment="mozilla-nss-tools-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577692" comment="mozilla-nss-x86-3.16.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577681" comment="MozillaFirefox-24.7.0esr-0.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577682" comment="MozillaFirefox-translations-24.7.0esr-0.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577683" comment="libfreebl3-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577684" comment="libfreebl3-32bit-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577685" comment="libfreebl3-x86-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577686" comment="libsoftokn3-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577687" comment="libsoftokn3-32bit-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577688" comment="libsoftokn3-x86-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577689" comment="mozilla-nss-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577690" comment="mozilla-nss-32bit-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577691" comment="mozilla-nss-tools-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577692" comment="mozilla-nss-x86-3.16.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577681" comment="MozillaFirefox-24.7.0esr-0.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577682" comment="MozillaFirefox-translations-24.7.0esr-0.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577683" comment="libfreebl3-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577684" comment="libfreebl3-32bit-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577685" comment="libfreebl3-x86-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577686" comment="libsoftokn3-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577687" comment="libsoftokn3-32bit-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577688" comment="libsoftokn3-x86-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577689" comment="mozilla-nss-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577690" comment="mozilla-nss-32bit-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577691" comment="mozilla-nss-tools-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577692" comment="mozilla-nss-x86-3.16.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218578" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="894370" ref_url="https://bugzilla.suse.com/894370" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1562" ref_url="https://www.suse.com/security/cve/CVE-2014-1562/" source="CVE"/>
		<reference ref_id="CVE-2014-1567" ref_url="https://www.suse.com/security/cve/CVE-2014-1567/" source="CVE"/>
		<description>

Mozilla Firefox was updated to the 24.8.0ESR release, fixing security 
issues and bugs.

Only some of the published security advisories affect the Mozilla Firefox 
24ESR codestream:

    * MFSA 2014-72 / CVE-2014-1567: Security researcher regenrecht
      reported, via TippingPoint's Zero Day Initiative, a use-after-free
      during text layout when interacting with the setting of text
      direction. This results in a use-after-free which can lead to
      arbitrary code execution.
    * MFSA 2014-67: Mozilla developers and community identified and fixed
      several memory safety bugs in the browser engine used in Firefox and
      other Mozilla-based products. Some of these bugs showed evidence of
      memory corruption under certain circumstances, and we presume that
      with enough effort at least some of these could be exploited to run
      arbitrary code.
    * Jan de Mooij reported a memory safety problem that affects Firefox
      ESR 24.7, ESR 31 and Firefox 31. (CVE-2014-1562)

More information is referenced on: 
https://www.mozilla.org/security/announce/
&lt;https://www.mozilla.org/security/announce/&gt; .

Security Issues:

    * CVE-2014-1562
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562&gt;
    * CVE-2014-1567
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-03"/>
	<updated date="2014-09-03"/>
	<bugzilla href="https://bugzilla.suse.com/894370">SUSE bug 894370</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1562/">CVE-2014-1562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1562">CVE-2014-1562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1567/">CVE-2014-1567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1567">CVE-2014-1567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577693" comment="MozillaFirefox-24.8.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577694" comment="MozillaFirefox-translations-24.8.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577695" comment="libfreebl3-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577696" comment="libfreebl3-32bit-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577697" comment="libfreebl3-x86-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577698" comment="libsoftokn3-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577699" comment="libsoftokn3-32bit-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577700" comment="libsoftokn3-x86-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577701" comment="mozilla-nspr-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577702" comment="mozilla-nspr-32bit-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577703" comment="mozilla-nspr-x86-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577704" comment="mozilla-nss-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577705" comment="mozilla-nss-32bit-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577706" comment="mozilla-nss-tools-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577707" comment="mozilla-nss-x86-3.16.4-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577693" comment="MozillaFirefox-24.8.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577694" comment="MozillaFirefox-translations-24.8.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577695" comment="libfreebl3-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577696" comment="libfreebl3-32bit-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577697" comment="libfreebl3-x86-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577698" comment="libsoftokn3-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577699" comment="libsoftokn3-32bit-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577700" comment="libsoftokn3-x86-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577701" comment="mozilla-nspr-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577702" comment="mozilla-nspr-32bit-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577703" comment="mozilla-nspr-x86-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577704" comment="mozilla-nss-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577705" comment="mozilla-nss-32bit-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577706" comment="mozilla-nss-tools-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577707" comment="mozilla-nss-x86-3.16.4-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577693" comment="MozillaFirefox-24.8.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577694" comment="MozillaFirefox-translations-24.8.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577695" comment="libfreebl3-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577696" comment="libfreebl3-32bit-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577697" comment="libfreebl3-x86-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577698" comment="libsoftokn3-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577699" comment="libsoftokn3-32bit-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577700" comment="libsoftokn3-x86-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577701" comment="mozilla-nspr-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577702" comment="mozilla-nspr-32bit-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577703" comment="mozilla-nspr-x86-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577704" comment="mozilla-nss-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577705" comment="mozilla-nss-32bit-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577706" comment="mozilla-nss-tools-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577707" comment="mozilla-nss-x86-3.16.4-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218579" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="908009" ref_url="https://bugzilla.suse.com/908009" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587/" source="CVE"/>
		<reference ref_id="CVE-2014-1588" ref_url="https://www.suse.com/security/cve/CVE-2014-1588/" source="CVE"/>
		<reference ref_id="CVE-2014-1589" ref_url="https://www.suse.com/security/cve/CVE-2014-1589/" source="CVE"/>
		<reference ref_id="CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590/" source="CVE"/>
		<reference ref_id="CVE-2014-1591" ref_url="https://www.suse.com/security/cve/CVE-2014-1591/" source="CVE"/>
		<reference ref_id="CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592/" source="CVE"/>
		<reference ref_id="CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593/" source="CVE"/>
		<reference ref_id="CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594/" source="CVE"/>
		<reference ref_id="CVE-2014-1595" ref_url="https://www.suse.com/security/cve/CVE-2014-1595/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 31.3ESR release fixing bugs and 
security issues.

    * 

      MFSA 2014-83 / CVE-2014-1588 / CVE-2014-1587: Mozilla developers and
      community identified and fixed several memory safety bugs in the
      browser engine used in Firefox and other Mozilla-based products. Some
      of these bugs showed evidence of memory corruption under certain
      circumstances, and we presume that with enough effort at least some
      of these could be exploited to run arbitrary code.

    * 

      MFSA 2014-85 / CVE-2014-1590: Security researcher Joe Vennix from
      Rapid7 reported that passing a JavaScript object to XMLHttpRequest
      that mimics an input stream will a crash. This crash is not
      exploitable and can only be used for denial of service attacks.

    * 

      MFSA 2014-87 / CVE-2014-1592: Security researcher Berend-Jan Wever
      reported a use-after-free created by triggering the creation of a
      second root element while parsing HTML written to a document created
      with document.open(). This leads to a potentially exploitable crash.

    * 

      MFSA 2014-88 / CVE-2014-1593: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover a buffer overflow during the parsing of
      media content. This leads to a potentially exploitable crash.

    * 

      MFSA 2014-89 / CVE-2014-1594: Security researchers Byoungyoung Lee,
      Chengyu Song, and Taesoo Kim at the Georgia Tech Information Security
      Center (GTISC) reported a bad casting from the BasicThebesLayer to
      BasicContainerLayer, resulting in undefined behavior. This behavior
      is potentially exploitable with some compilers but no clear mechanism
      to trigger it through web content was identified.

    * 

      MFSA 2014-90 / CVE-2014-1595: Security researcher Kent Howard
      reported an Apple issue present in OS X 10.10 (Yosemite) where log
      files are created by the CoreGraphics framework of OS X in the /tmp
      local directory. These log files contain a record of all inputs into
      Mozilla programs during their operation. In versions of OS X from
      versions 10.6 through 10.9, the CoreGraphics had this logging ability
      but it was turned off by default. In OS X 10.10, this logging was
      turned on by default for some applications that use a custom memory
      allocator, such as jemalloc, because of an initialization bug in the
      framework. This issue has been addressed in Mozilla products by
      explicitly turning off the framework's logging of input events. On
      vulnerable systems, this issue can result in private data such as
      usernames, passwords, and other inputed data being saved to a log
      file on the local system.

Security Issues:

    * CVE-2014-1587
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587&gt;
    * CVE-2014-1588
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1588&gt;
    * CVE-2014-1589
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1589&gt;
    * CVE-2014-1590
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590&gt;
    * CVE-2014-1591
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1591&gt;
    * CVE-2014-1592
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592&gt;
    * CVE-2014-1593
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593&gt;
    * CVE-2014-1594
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594&gt;
    * CVE-2014-1595
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1595&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-08"/>
	<updated date="2014-12-08"/>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1587">CVE-2014-1587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1588/">CVE-2014-1588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1588">CVE-2014-1588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1589/">CVE-2014-1589 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1589">CVE-2014-1589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1590">CVE-2014-1590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1591/">CVE-2014-1591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1591">CVE-2014-1591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1592">CVE-2014-1592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1593">CVE-2014-1593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1594">CVE-2014-1594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1595/">CVE-2014-1595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1595">CVE-2014-1595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577708" comment="MozillaFirefox-31.3.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577709" comment="MozillaFirefox-translations-31.3.0esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577708" comment="MozillaFirefox-31.3.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577709" comment="MozillaFirefox-translations-31.3.0esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577708" comment="MozillaFirefox-31.3.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577709" comment="MozillaFirefox-translations-31.3.0esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218580" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="910647" ref_url="https://bugzilla.suse.com/910647" source="BUGZILLA"/>
		<reference ref_id="910669" ref_url="https://bugzilla.suse.com/910669" source="BUGZILLA"/>
		<reference ref_id="913064" ref_url="https://bugzilla.suse.com/913064" source="BUGZILLA"/>
		<reference ref_id="913066" ref_url="https://bugzilla.suse.com/913066" source="BUGZILLA"/>
		<reference ref_id="913067" ref_url="https://bugzilla.suse.com/913067" source="BUGZILLA"/>
		<reference ref_id="913068" ref_url="https://bugzilla.suse.com/913068" source="BUGZILLA"/>
		<reference ref_id="913102" ref_url="https://bugzilla.suse.com/913102" source="BUGZILLA"/>
		<reference ref_id="913103" ref_url="https://bugzilla.suse.com/913103" source="BUGZILLA"/>
		<reference ref_id="913104" ref_url="https://bugzilla.suse.com/913104" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1569" ref_url="https://www.suse.com/security/cve/CVE-2014-1569/" source="CVE"/>
		<reference ref_id="CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634/" source="CVE"/>
		<reference ref_id="CVE-2014-8636" ref_url="https://www.suse.com/security/cve/CVE-2014-8636/" source="CVE"/>
		<reference ref_id="CVE-2014-8637" ref_url="https://www.suse.com/security/cve/CVE-2014-8637/" source="CVE"/>
		<reference ref_id="CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638/" source="CVE"/>
		<reference ref_id="CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639/" source="CVE"/>
		<reference ref_id="CVE-2014-8640" ref_url="https://www.suse.com/security/cve/CVE-2014-8640/" source="CVE"/>
		<reference ref_id="CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 31.4.0ESR release, fixing bugs and 
security issues.

Mozilla NSS has been updated to 3.17.3, fixing a security issue and 
updating the root certificate list.

For more information, please see 
https://www.mozilla.org/en-US/security/advisories/
&lt;https://www.mozilla.org/en-US/security/advisories/&gt;

Security Issues:

    * CVE-2014-1569
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1569&gt;
    * CVE-2014-8634
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634&gt;
    * CVE-2014-8639
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639&gt;
    * CVE-2014-8641
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641&gt;
    * CVE-2014-8638
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638&gt;
    * CVE-2014-8636
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8636&gt;
    * CVE-2014-8637
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8637&gt;
    * CVE-2014-8640
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8640&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-27"/>
	<updated date="2015-01-27"/>
	<bugzilla href="https://bugzilla.suse.com/910647">SUSE bug 910647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913064">SUSE bug 913064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913066">SUSE bug 913066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913067">SUSE bug 913067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913068">SUSE bug 913068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913102">SUSE bug 913102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913103">SUSE bug 913103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913104">SUSE bug 913104</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1569/">CVE-2014-1569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1569">CVE-2014-1569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8634">CVE-2014-8634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8636/">CVE-2014-8636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8636">CVE-2014-8636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8637/">CVE-2014-8637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8637">CVE-2014-8637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8638">CVE-2014-8638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8639">CVE-2014-8639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8640/">CVE-2014-8640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8640">CVE-2014-8640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8641">CVE-2014-8641 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577710" comment="MozillaFirefox-31.4.0esr-0.8.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577711" comment="MozillaFirefox-translations-31.4.0esr-0.8.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577712" comment="libfreebl3-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577713" comment="libfreebl3-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577714" comment="libfreebl3-x86-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577715" comment="libsoftokn3-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577716" comment="libsoftokn3-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577717" comment="libsoftokn3-x86-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577718" comment="mozilla-nss-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577719" comment="mozilla-nss-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577720" comment="mozilla-nss-tools-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577721" comment="mozilla-nss-x86-3.17.3-0.8.11 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577710" comment="MozillaFirefox-31.4.0esr-0.8.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577711" comment="MozillaFirefox-translations-31.4.0esr-0.8.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577712" comment="libfreebl3-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577713" comment="libfreebl3-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577714" comment="libfreebl3-x86-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577715" comment="libsoftokn3-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577716" comment="libsoftokn3-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577717" comment="libsoftokn3-x86-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577718" comment="mozilla-nss-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577719" comment="mozilla-nss-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577720" comment="mozilla-nss-tools-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577721" comment="mozilla-nss-x86-3.17.3-0.8.11 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577710" comment="MozillaFirefox-31.4.0esr-0.8.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577711" comment="MozillaFirefox-translations-31.4.0esr-0.8.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577712" comment="libfreebl3-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577713" comment="libfreebl3-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577714" comment="libfreebl3-x86-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577715" comment="libsoftokn3-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577716" comment="libsoftokn3-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577717" comment="libsoftokn3-x86-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577718" comment="mozilla-nss-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577719" comment="mozilla-nss-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577720" comment="mozilla-nss-tools-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577721" comment="mozilla-nss-x86-3.17.3-0.8.11 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218581" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="923534" ref_url="https://bugzilla.suse.com/923534" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817/" source="CVE"/>
		<reference ref_id="CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001315.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to the 31.5.3ESR release to fix two security 
vulnerabilities:

    * 

      MFSA 2015-29 / CVE-2015-0817: Security researcher ilxu1a reported,
      through HP Zero Day Initiative's Pwn2Own contest, a flaw in Mozilla's
      implementation of typed array bounds checking in JavaScript
      just-in-time compilation (JIT) and its management of bounds checking
      for heap access. This flaw can be leveraged into the reading and
      writing of memory allowing for arbitary code execution on the local
      system.

    * 

      MFSA 2015-28 / CVE-2015-0818: Security researcher Mariusz Mlynski
      reported, through HP Zero Day Initiative's Pwn2Own contest, a method
      to run arbitrary scripts in a privileged context. This bypassed the
      same-origin policy protections by using a flaw in the processing of
      SVG format content navigation.

Security Issues:

    * CVE-2015-0817
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817&gt;
    * CVE-2015-0818
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-24"/>
	<updated date="2015-03-24"/>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0817">CVE-2015-0817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0818">CVE-2015-0818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577722" comment="MozillaFirefox-31.5.3esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577723" comment="MozillaFirefox-translations-31.5.3esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577722" comment="MozillaFirefox-31.5.3esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577723" comment="MozillaFirefox-translations-31.5.3esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577722" comment="MozillaFirefox-31.5.3esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577723" comment="MozillaFirefox-translations-31.5.3esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218582" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="930622" ref_url="https://bugzilla.suse.com/930622" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797/" source="CVE"/>
		<reference ref_id="CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708/" source="CVE"/>
		<reference ref_id="CVE-2015-2709" ref_url="https://www.suse.com/security/cve/CVE-2015-2709/" source="CVE"/>
		<reference ref_id="CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710/" source="CVE"/>
		<reference ref_id="CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713/" source="CVE"/>
		<reference ref_id="CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001417.html" source="SUSE-SU"/>
		<description>

This update to Firefox 31.7.0 ESR fixes the following issues:

    * 

      MFSA 2015-46 (CVE-2015-2708, CVE-2015-2709): Miscellaneous memory
      safety hazards (rv:38.0 / rv:31.7). Upstream references: bmo#1120655,
      bmo#1143299, bmo#1151139, bmo#1152177, bmo#1111251, bmo#1117977,
      bmo#1128064, bmo#1135066, bmo#1143194, bmo#1146101, bmo#1149526,
      bmo#1153688, bmo#1155474.

    * 

      MFSA 2015-47 (CVE-2015-0797): Buffer overflow parsing H.264 video
      with Linux Gstreamer. Upstream references: bmo#1080995.

    * 

      MFSA 2015-48 (CVE-2015-2710): Buffer overflow with SVG content and
      CSS. Upstream references: bmo#1149542.

    * 

      MFSA 2015-51 (CVE-2015-2713): Use-after-free during text processing
      with vertical text enabled. Upstream references: bmo#1153478.

    * 

      MFSA 2015-54 (CVE-2015-2716): Buffer overflow when parsing compressed
      XML. Upstream references: bmo#1140537.

Security Issues:

    * CVE-2015-0797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797&gt;
    * CVE-2015-2708
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708&gt;
    * CVE-2015-2709
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2709&gt;
    * CVE-2015-2710
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710&gt;
    * CVE-2015-2713
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713&gt;
    * CVE-2015-2716
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-19"/>
	<updated date="2015-05-19"/>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0797">CVE-2015-0797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2708">CVE-2015-2708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2709/">CVE-2015-2709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2709">CVE-2015-2709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2710">CVE-2015-2710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2713">CVE-2015-2713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2716">CVE-2015-2716 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577724" comment="MozillaFirefox-31.7.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577725" comment="MozillaFirefox-translations-31.7.0esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577724" comment="MozillaFirefox-31.7.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577725" comment="MozillaFirefox-translations-31.7.0esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577724" comment="MozillaFirefox-31.7.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577725" comment="MozillaFirefox-translations-31.7.0esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218583" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="947003" ref_url="https://bugzilla.suse.com/947003" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<description>

Mozilla Firefox was updated to version 38.3.0 ESR (bsc#947003),
fixing bugs and security issues.

* MFSA 2015-96/CVE-2015-4500/CVE-2015-4501
  Miscellaneous memory safety hazards (rv:41.0 / rv:38.3)
* MFSA 2015-101/CVE-2015-4506
  Buffer overflow in libvpx while parsing vp9 format video
* MFSA 2015-105/CVE-2015-4511
  Buffer overflow while decoding WebM video
* MFSA 2015-106/CVE-2015-4509
  Use-after-free while manipulating HTML media content
* MFSA 2015-110/CVE-2015-4519
  Dragging and dropping images exposes final URL after
  redirects
* MFSA 2015-111/CVE-2015-4520
  Errors in the handling of CORS preflight request headers
* MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522
  CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177
  CVE-2015-7180
  Vulnerabilities found through code inspection

More details can be found on
        https://www.mozilla.org/en-US/security/advisories/

The Mozilla NSPR library was updated to version 4.10.9, fixing various bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-23"/>
	<updated date="2015-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4500">CVE-2015-4500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4501">CVE-2015-4501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4506">CVE-2015-4506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4509">CVE-2015-4509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4511">CVE-2015-4511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4517">CVE-2015-4517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4519">CVE-2015-4519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4520">CVE-2015-4520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4521">CVE-2015-4521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4522">CVE-2015-4522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7174">CVE-2015-7174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7175">CVE-2015-7175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7176">CVE-2015-7176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7177">CVE-2015-7177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7180">CVE-2015-7180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577726" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577727" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577728" comment="mozilla-nspr-x86-4.10.9-11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577726" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577727" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577728" comment="mozilla-nspr-x86-4.10.9-11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577726" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577727" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577728" comment="mozilla-nspr-x86-4.10.9-11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218584" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="947003" ref_url="https://bugzilla.suse.com/947003" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001618.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to version 38.3.0 ESR (bsc#947003),
fixing bugs and security issues.

* MFSA 2015-96/CVE-2015-4500/CVE-2015-4501
  Miscellaneous memory safety hazards (rv:41.0 / rv:38.3)
* MFSA 2015-101/CVE-2015-4506
  Buffer overflow in libvpx while parsing vp9 format video
* MFSA 2015-105/CVE-2015-4511
  Buffer overflow while decoding WebM video
* MFSA 2015-106/CVE-2015-4509
  Use-after-free while manipulating HTML media content
* MFSA 2015-110/CVE-2015-4519
  Dragging and dropping images exposes final URL after
  redirects
* MFSA 2015-111/CVE-2015-4520
  Errors in the handling of CORS preflight request headers
* MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522
  CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177
  CVE-2015-7180
  Vulnerabilities found through code inspection

More details can be found on
        https://www.mozilla.org/en-US/security/advisories/
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-05"/>
	<updated date="2015-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4500">CVE-2015-4500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4501">CVE-2015-4501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4506">CVE-2015-4506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4509">CVE-2015-4509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4511">CVE-2015-4511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4517">CVE-2015-4517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4519">CVE-2015-4519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4520">CVE-2015-4520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4521">CVE-2015-4521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4522">CVE-2015-4522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7174">CVE-2015-7174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7175">CVE-2015-7175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7176">CVE-2015-7176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7177">CVE-2015-7177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7180">CVE-2015-7180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577729" comment="MozillaFirefox-38.3.0esr-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577730" comment="MozillaFirefox-translations-38.3.0esr-22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577729" comment="MozillaFirefox-38.3.0esr-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577730" comment="MozillaFirefox-translations-38.3.0esr-22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577729" comment="MozillaFirefox-38.3.0esr-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577730" comment="MozillaFirefox-translations-38.3.0esr-22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218585" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="908275" ref_url="https://bugzilla.suse.com/908275" source="BUGZILLA"/>
		<reference ref_id="952810" ref_url="https://bugzilla.suse.com/952810" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001677.html" source="SUSE-SU"/>
		<description>

This Mozilla Firefox, NSS and NSPR update fixes the following security
and non security issues.

- mozilla-nspr was updated to version 4.10.10 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7183
    (bmo#1205157)
    NSPR memory corruption issues

- mozilla-nss was updated to 3.19.2.1 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182
    (bmo#1192028, bmo#1202868)
    NSS and NSPR memory corruption issues

- MozillaFirefox was updated to 38.4.0 ESR (bsc#952810)
  * MFSA 2015-116/CVE-2015-4513
    (bmo#1107011, bmo#1191942, bmo#1193038, bmo#1204580,
     bmo#1204669, bmo#1204700, bmo#1205707, bmo#1206564,
     bmo#1208665, bmo#1209471, bmo#1213979)
    Miscellaneous memory safety hazards (rv:42.0 / rv:38.4)
  * MFSA 2015-122/CVE-2015-7188
    (bmo#1199430)
    Trailing whitespace in IP address hostnames can bypass
    same-origin policy
  * MFSA 2015-123/CVE-2015-7189
    (bmo#1205900)
    Buffer overflow during image interactions in canvas
  * MFSA 2015-127/CVE-2015-7193
    (bmo#1210302)
    CORS preflight is bypassed when non-standard Content-Type
    headers are received
  * MFSA 2015-128/CVE-2015-7194
    (bmo#1211262)
    Memory corruption in libjar through zip files
  * MFSA 2015-130/CVE-2015-7196
    (bmo#1140616)
    JavaScript garbage collection crash with Java applet
  * MFSA 2015-131/CVE-2015-7198/CVE-2015-7199/CVE-2015-7200
    (bmo#1204061, bmo#1188010, bmo#1204155)
    Vulnerabilities found through code inspection
  * MFSA 2015-132/CVE-2015-7197
    (bmo#1204269)
    Mixed content WebSocket policy bypass through workers
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182/CVE-2015-7183
    (bmo#1202868, bmo#1192028, bmo#1205157)
    NSS and NSPR memory corruption issues
- fix printing on landscape media (bsc#908275)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-12"/>
	<updated date="2015-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/908275">SUSE bug 908275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4513">CVE-2015-4513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7181">CVE-2015-7181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7182">CVE-2015-7182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7183">CVE-2015-7183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7188">CVE-2015-7188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7189">CVE-2015-7189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7193">CVE-2015-7193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7194">CVE-2015-7194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7196">CVE-2015-7196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7197">CVE-2015-7197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7198">CVE-2015-7198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7199">CVE-2015-7199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7200">CVE-2015-7200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577731" comment="MozillaFirefox-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577732" comment="MozillaFirefox-branding-SLED-38-15.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577734" comment="MozillaFirefox-translations-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577735" comment="libfreebl3-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577736" comment="libfreebl3-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577737" comment="libfreebl3-x86-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577738" comment="libsoftokn3-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577739" comment="libsoftokn3-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577740" comment="libsoftokn3-x86-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577741" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577742" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577743" comment="mozilla-nspr-x86-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577744" comment="mozilla-nss-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577745" comment="mozilla-nss-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577746" comment="mozilla-nss-tools-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577747" comment="mozilla-nss-x86-3.19.2.1-19.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577731" comment="MozillaFirefox-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577732" comment="MozillaFirefox-branding-SLED-38-15.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577734" comment="MozillaFirefox-translations-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577735" comment="libfreebl3-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577736" comment="libfreebl3-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577737" comment="libfreebl3-x86-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577738" comment="libsoftokn3-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577739" comment="libsoftokn3-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577740" comment="libsoftokn3-x86-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577741" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577742" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577743" comment="mozilla-nspr-x86-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577744" comment="mozilla-nss-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577745" comment="mozilla-nss-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577746" comment="mozilla-nss-tools-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577747" comment="mozilla-nss-x86-3.19.2.1-19.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577731" comment="MozillaFirefox-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577732" comment="MozillaFirefox-branding-SLED-38-15.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577734" comment="MozillaFirefox-translations-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577735" comment="libfreebl3-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577736" comment="libfreebl3-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577737" comment="libfreebl3-x86-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577738" comment="libsoftokn3-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577739" comment="libsoftokn3-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577740" comment="libsoftokn3-x86-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577741" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577742" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577743" comment="mozilla-nspr-x86-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577744" comment="mozilla-nss-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577745" comment="mozilla-nss-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577746" comment="mozilla-nss-tools-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577747" comment="mozilla-nss-x86-3.19.2.1-19.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218586" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1060445" ref_url="https://bugzilla.suse.com/1060445" source="BUGZILLA"/>
		<reference ref_id="1061005" ref_url="https://bugzilla.suse.com/1061005" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7793" ref_url="https://www.suse.com/security/cve/CVE-2017-7793/" source="CVE"/>
		<reference ref_id="CVE-2017-7805" ref_url="https://www.suse.com/security/cve/CVE-2017-7805/" source="CVE"/>
		<reference ref_id="CVE-2017-7810" ref_url="https://www.suse.com/security/cve/CVE-2017-7810/" source="CVE"/>
		<reference ref_id="CVE-2017-7814" ref_url="https://www.suse.com/security/cve/CVE-2017-7814/" source="CVE"/>
		<reference ref_id="CVE-2017-7818" ref_url="https://www.suse.com/security/cve/CVE-2017-7818/" source="CVE"/>
		<reference ref_id="CVE-2017-7819" ref_url="https://www.suse.com/security/cve/CVE-2017-7819/" source="CVE"/>
		<reference ref_id="CVE-2017-7823" ref_url="https://www.suse.com/security/cve/CVE-2017-7823/" source="CVE"/>
		<reference ref_id="CVE-2017-7824" ref_url="https://www.suse.com/security/cve/CVE-2017-7824/" source="CVE"/>
		<reference ref_id="CVE-2017-7825" ref_url="https://www.suse.com/security/cve/CVE-2017-7825/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003396.html" source="SUSE-SU"/>
		<description>


This update for MozillaFirefox and mozilla-nss fixes the following issues:

Mozilla Firefox was updated to ESR 52.4 (bsc#1060445)

* MFSA 2017-22/CVE-2017-7825: OS X fonts render some Tibetan and Arabic unicode characters as spaces
* MFSA 2017-22/CVE-2017-7805: Use-after-free in TLS 1.2 generating handshake hashes
* MFSA 2017-22/CVE-2017-7819: Use-after-free while resizing images in design mode
* MFSA 2017-22/CVE-2017-7818: Use-after-free during ARIA array manipulation
* MFSA 2017-22/CVE-2017-7793: Use-after-free with Fetch API
* MFSA 2017-22/CVE-2017-7824: Buffer overflow when drawing and validating elements with ANGLE
* MFSA 2017-22/CVE-2017-7810: Memory safety bugs fixed in Firefox 56 and Firefox ESR 52.4
* MFSA 2017-22/CVE-2017-7823: CSP sandbox directive did not create a unique origin
* MFSA 2017-22/CVE-2017-7814: Blob and data URLs bypass phishing and malware protection warnings

Mozilla Network Security Services (Mozilla NSS) received a security fix:

* MFSA 2017-22/CVE-2017-7805: Use-after-free in TLS 1.2 generating handshake hashes (bsc#1061005, bsc#1060445)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-13"/>
	<updated date="2017-11-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061005">SUSE bug 1061005</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7793/">CVE-2017-7793 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7793">CVE-2017-7793 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7805/">CVE-2017-7805 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7805">CVE-2017-7805 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7810/">CVE-2017-7810 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7810">CVE-2017-7810 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7814/">CVE-2017-7814 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7814">CVE-2017-7814 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7818/">CVE-2017-7818 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7818">CVE-2017-7818 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7819/">CVE-2017-7819 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7819">CVE-2017-7819 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7823/">CVE-2017-7823 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7823">CVE-2017-7823 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7824/">CVE-2017-7824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7824">CVE-2017-7824 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7825/">CVE-2017-7825 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7825">CVE-2017-7825 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577748" comment="MozillaFirefox-52.4.0esr-72.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577749" comment="MozillaFirefox-translations-52.4.0esr-72.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577750" comment="libfreebl3-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577751" comment="libfreebl3-32bit-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577752" comment="libsoftokn3-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577753" comment="libsoftokn3-32bit-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577754" comment="mozilla-nss-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577755" comment="mozilla-nss-32bit-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577756" comment="mozilla-nss-tools-3.29.5-47.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577748" comment="MozillaFirefox-52.4.0esr-72.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577749" comment="MozillaFirefox-translations-52.4.0esr-72.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577750" comment="libfreebl3-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577751" comment="libfreebl3-32bit-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577752" comment="libsoftokn3-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577753" comment="libsoftokn3-32bit-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577754" comment="mozilla-nss-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577755" comment="mozilla-nss-32bit-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577756" comment="mozilla-nss-tools-3.29.5-47.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218587" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, firefox-glib2, firefox-gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1145550" ref_url="https://bugzilla.suse.com/1145550" source="BUGZILLA"/>
		<reference ref_id="1149294" ref_url="https://bugzilla.suse.com/1149294" source="BUGZILLA"/>
		<reference ref_id="1149295" ref_url="https://bugzilla.suse.com/1149295" source="BUGZILLA"/>
		<reference ref_id="1149296" ref_url="https://bugzilla.suse.com/1149296" source="BUGZILLA"/>
		<reference ref_id="1149297" ref_url="https://bugzilla.suse.com/1149297" source="BUGZILLA"/>
		<reference ref_id="1149298" ref_url="https://bugzilla.suse.com/1149298" source="BUGZILLA"/>
		<reference ref_id="1149299" ref_url="https://bugzilla.suse.com/1149299" source="BUGZILLA"/>
		<reference ref_id="1149303" ref_url="https://bugzilla.suse.com/1149303" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<description>
This update for MozillaFirefox, firefox-glib2, firefox-gtk3 fixes the following issues:

Mozilla Firefox was updated to the 60.9.0esr release:

Security Advisory MFSA 2019-27:

* Use-after-free while manipulating video
  CVE-2019-11746 (bmo#1564449, bsc#1149297)
* XSS by breaking out of title and textarea elements using innerHTML
  CVE-2019-11744 (bmo#1562033, bsc#1149297)
* Same-origin policy violation with SVG filters and canvas to steal
  cross-origin images
  CVE-2019-11742 (bmo#1559715, bsc#1149303)
* Privilege escalation with Mozilla Maintenance Service in custom
  Firefox installation location
  CVE-2019-11753 (bmo#1574980, bsc#1149295)
* Use-after-free while extracting a key value in IndexedDB
  CVE-2019-11752 (bmo#1501152, bsc#1149296)
* Sandbox escape through Firefox Sync
  CVE-2019-9812 (bmo#1538008, bmo#1538015, bsc#1149294)
* Cross-origin access to unload event attributes
  CVE-2019-11743 (bmo#1560495, bsc#1149298)
  Navigation-Timing Level 2 specification
* Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, and Firefox ESR 60.9
  CVE-2019-11740 (bmo#1563133, bmo#1573160, bsc#1149299)

- Rebuild glib2 schemas on SLE-11 (bsc#1145550)

Changes in firefox-glib2:

- Fix the rpm macros %glib2_gsettings_schema_* which were replaced with
  %nil in Factory because they're no longer needed, but we still need
  them in SLE11 (bsc#1145550)

Changes in firefox-gtk3:

- Rebuild so %glib2_gsettings_schema_post gets called with fixed 
  rpm macros %glib2_gsettings_schema_* in firefox-glib2 package
  which were replaced with %nil in Factory because they're no 
  longer needed, but we still need them in SLE11 (bsc#1145550)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145550">SUSE bug 1145550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149294">SUSE bug 1149294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149295">SUSE bug 1149295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149296">SUSE bug 1149296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149297">SUSE bug 1149297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149298">SUSE bug 1149298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149299">SUSE bug 1149299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149303">SUSE bug 1149303</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11753">CVE-2019-11753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9812">CVE-2019-9812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571463" comment="MozillaFirefox-60.9.0esr-78.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571464" comment="MozillaFirefox-translations-common-60.9.0esr-78.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571465" comment="MozillaFirefox-translations-other-60.9.0esr-78.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571466" comment="firefox-gio-branding-upstream-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571467" comment="firefox-glib2-lang-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571468" comment="firefox-glib2-tools-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571469" comment="firefox-gtk3-branding-upstream-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571470" comment="firefox-gtk3-data-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571471" comment="firefox-gtk3-immodule-amharic-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571472" comment="firefox-gtk3-immodule-inuktitut-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571473" comment="firefox-gtk3-immodule-multipress-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571474" comment="firefox-gtk3-immodule-thai-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571475" comment="firefox-gtk3-immodule-vietnamese-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571476" comment="firefox-gtk3-immodule-xim-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571477" comment="firefox-gtk3-immodules-tigrigna-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571478" comment="firefox-gtk3-lang-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571479" comment="firefox-gtk3-tools-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571480" comment="firefox-libgtk-3-0-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571481" comment="libfirefox-gio-2_0-0-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571482" comment="libfirefox-glib-2_0-0-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571483" comment="libfirefox-gmodule-2_0-0-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571484" comment="libfirefox-gobject-2_0-0-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571485" comment="libfirefox-gthread-2_0-0-2.54.3-2.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218588" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1000036" ref_url="https://bugzilla.suse.com/1000036" source="BUGZILLA"/>
		<reference ref_id="1001652" ref_url="https://bugzilla.suse.com/1001652" source="BUGZILLA"/>
		<reference ref_id="1025108" ref_url="https://bugzilla.suse.com/1025108" source="BUGZILLA"/>
		<reference ref_id="1029377" ref_url="https://bugzilla.suse.com/1029377" source="BUGZILLA"/>
		<reference ref_id="1029902" ref_url="https://bugzilla.suse.com/1029902" source="BUGZILLA"/>
		<reference ref_id="1040164" ref_url="https://bugzilla.suse.com/1040164" source="BUGZILLA"/>
		<reference ref_id="104105" ref_url="https://bugzilla.suse.com/104105" source="BUGZILLA"/>
		<reference ref_id="1042670" ref_url="https://bugzilla.suse.com/1042670" source="BUGZILLA"/>
		<reference ref_id="1043008" ref_url="https://bugzilla.suse.com/1043008" source="BUGZILLA"/>
		<reference ref_id="1044946" ref_url="https://bugzilla.suse.com/1044946" source="BUGZILLA"/>
		<reference ref_id="1047925" ref_url="https://bugzilla.suse.com/1047925" source="BUGZILLA"/>
		<reference ref_id="1047936" ref_url="https://bugzilla.suse.com/1047936" source="BUGZILLA"/>
		<reference ref_id="1048299" ref_url="https://bugzilla.suse.com/1048299" source="BUGZILLA"/>
		<reference ref_id="1049186" ref_url="https://bugzilla.suse.com/1049186" source="BUGZILLA"/>
		<reference ref_id="1050653" ref_url="https://bugzilla.suse.com/1050653" source="BUGZILLA"/>
		<reference ref_id="1056058" ref_url="https://bugzilla.suse.com/1056058" source="BUGZILLA"/>
		<reference ref_id="1058013" ref_url="https://bugzilla.suse.com/1058013" source="BUGZILLA"/>
		<reference ref_id="1066242" ref_url="https://bugzilla.suse.com/1066242" source="BUGZILLA"/>
		<reference ref_id="1066953" ref_url="https://bugzilla.suse.com/1066953" source="BUGZILLA"/>
		<reference ref_id="1070738" ref_url="https://bugzilla.suse.com/1070738" source="BUGZILLA"/>
		<reference ref_id="1070853" ref_url="https://bugzilla.suse.com/1070853" source="BUGZILLA"/>
		<reference ref_id="1072320" ref_url="https://bugzilla.suse.com/1072320" source="BUGZILLA"/>
		<reference ref_id="1072322" ref_url="https://bugzilla.suse.com/1072322" source="BUGZILLA"/>
		<reference ref_id="1073796" ref_url="https://bugzilla.suse.com/1073796" source="BUGZILLA"/>
		<reference ref_id="1073798" ref_url="https://bugzilla.suse.com/1073798" source="BUGZILLA"/>
		<reference ref_id="1073799" ref_url="https://bugzilla.suse.com/1073799" source="BUGZILLA"/>
		<reference ref_id="1073803" ref_url="https://bugzilla.suse.com/1073803" source="BUGZILLA"/>
		<reference ref_id="1073808" ref_url="https://bugzilla.suse.com/1073808" source="BUGZILLA"/>
		<reference ref_id="1073818" ref_url="https://bugzilla.suse.com/1073818" source="BUGZILLA"/>
		<reference ref_id="1073823" ref_url="https://bugzilla.suse.com/1073823" source="BUGZILLA"/>
		<reference ref_id="1073829" ref_url="https://bugzilla.suse.com/1073829" source="BUGZILLA"/>
		<reference ref_id="1073830" ref_url="https://bugzilla.suse.com/1073830" source="BUGZILLA"/>
		<reference ref_id="1073832" ref_url="https://bugzilla.suse.com/1073832" source="BUGZILLA"/>
		<reference ref_id="1073846" ref_url="https://bugzilla.suse.com/1073846" source="BUGZILLA"/>
		<reference ref_id="1074235" ref_url="https://bugzilla.suse.com/1074235" source="BUGZILLA"/>
		<reference ref_id="1077230" ref_url="https://bugzilla.suse.com/1077230" source="BUGZILLA"/>
		<reference ref_id="1079761" ref_url="https://bugzilla.suse.com/1079761" source="BUGZILLA"/>
		<reference ref_id="1081750" ref_url="https://bugzilla.suse.com/1081750" source="BUGZILLA"/>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1087453" ref_url="https://bugzilla.suse.com/1087453" source="BUGZILLA"/>
		<reference ref_id="1087459" ref_url="https://bugzilla.suse.com/1087459" source="BUGZILLA"/>
		<reference ref_id="1087463" ref_url="https://bugzilla.suse.com/1087463" source="BUGZILLA"/>
		<reference ref_id="1088573" ref_url="https://bugzilla.suse.com/1088573" source="BUGZILLA"/>
		<reference ref_id="1091764" ref_url="https://bugzilla.suse.com/1091764" source="BUGZILLA"/>
		<reference ref_id="1094814" ref_url="https://bugzilla.suse.com/1094814" source="BUGZILLA"/>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="1097375" ref_url="https://bugzilla.suse.com/1097375" source="BUGZILLA"/>
		<reference ref_id="1097401" ref_url="https://bugzilla.suse.com/1097401" source="BUGZILLA"/>
		<reference ref_id="1097404" ref_url="https://bugzilla.suse.com/1097404" source="BUGZILLA"/>
		<reference ref_id="1097748" ref_url="https://bugzilla.suse.com/1097748" source="BUGZILLA"/>
		<reference ref_id="1104841" ref_url="https://bugzilla.suse.com/1104841" source="BUGZILLA"/>
		<reference ref_id="1105019" ref_url="https://bugzilla.suse.com/1105019" source="BUGZILLA"/>
		<reference ref_id="1107030" ref_url="https://bugzilla.suse.com/1107030" source="BUGZILLA"/>
		<reference ref_id="1109465" ref_url="https://bugzilla.suse.com/1109465" source="BUGZILLA"/>
		<reference ref_id="1117473" ref_url="https://bugzilla.suse.com/1117473" source="BUGZILLA"/>
		<reference ref_id="1117626" ref_url="https://bugzilla.suse.com/1117626" source="BUGZILLA"/>
		<reference ref_id="1117627" ref_url="https://bugzilla.suse.com/1117627" source="BUGZILLA"/>
		<reference ref_id="1117629" ref_url="https://bugzilla.suse.com/1117629" source="BUGZILLA"/>
		<reference ref_id="1117630" ref_url="https://bugzilla.suse.com/1117630" source="BUGZILLA"/>
		<reference ref_id="1120644" ref_url="https://bugzilla.suse.com/1120644" source="BUGZILLA"/>
		<reference ref_id="1122191" ref_url="https://bugzilla.suse.com/1122191" source="BUGZILLA"/>
		<reference ref_id="1123482" ref_url="https://bugzilla.suse.com/1123482" source="BUGZILLA"/>
		<reference ref_id="1124525" ref_url="https://bugzilla.suse.com/1124525" source="BUGZILLA"/>
		<reference ref_id="1127532" ref_url="https://bugzilla.suse.com/1127532" source="BUGZILLA"/>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="1130694" ref_url="https://bugzilla.suse.com/1130694" source="BUGZILLA"/>
		<reference ref_id="1130840" ref_url="https://bugzilla.suse.com/1130840" source="BUGZILLA"/>
		<reference ref_id="1133452" ref_url="https://bugzilla.suse.com/1133452" source="BUGZILLA"/>
		<reference ref_id="1133810" ref_url="https://bugzilla.suse.com/1133810" source="BUGZILLA"/>
		<reference ref_id="1134209" ref_url="https://bugzilla.suse.com/1134209" source="BUGZILLA"/>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="1140290" ref_url="https://bugzilla.suse.com/1140290" source="BUGZILLA"/>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="1144919" ref_url="https://bugzilla.suse.com/1144919" source="BUGZILLA"/>
		<reference ref_id="1145665" ref_url="https://bugzilla.suse.com/1145665" source="BUGZILLA"/>
		<reference ref_id="1146090" ref_url="https://bugzilla.suse.com/1146090" source="BUGZILLA"/>
		<reference ref_id="1146091" ref_url="https://bugzilla.suse.com/1146091" source="BUGZILLA"/>
		<reference ref_id="1146093" ref_url="https://bugzilla.suse.com/1146093" source="BUGZILLA"/>
		<reference ref_id="1146094" ref_url="https://bugzilla.suse.com/1146094" source="BUGZILLA"/>
		<reference ref_id="1146095" ref_url="https://bugzilla.suse.com/1146095" source="BUGZILLA"/>
		<reference ref_id="1146097" ref_url="https://bugzilla.suse.com/1146097" source="BUGZILLA"/>
		<reference ref_id="1146099" ref_url="https://bugzilla.suse.com/1146099" source="BUGZILLA"/>
		<reference ref_id="1146100" ref_url="https://bugzilla.suse.com/1146100" source="BUGZILLA"/>
		<reference ref_id="1149323" ref_url="https://bugzilla.suse.com/1149323" source="BUGZILLA"/>
		<reference ref_id="1153423" ref_url="https://bugzilla.suse.com/1153423" source="BUGZILLA"/>
		<reference ref_id="1154738" ref_url="https://bugzilla.suse.com/1154738" source="BUGZILLA"/>
		<reference ref_id="1447070" ref_url="https://bugzilla.suse.com/1447070" source="BUGZILLA"/>
		<reference ref_id="1447409" ref_url="https://bugzilla.suse.com/1447409" source="BUGZILLA"/>
		<reference ref_id="744625" ref_url="https://bugzilla.suse.com/744625" source="BUGZILLA"/>
		<reference ref_id="744629" ref_url="https://bugzilla.suse.com/744629" source="BUGZILLA"/>
		<reference ref_id="845955" ref_url="https://bugzilla.suse.com/845955" source="BUGZILLA"/>
		<reference ref_id="865853" ref_url="https://bugzilla.suse.com/865853" source="BUGZILLA"/>
		<reference ref_id="905528" ref_url="https://bugzilla.suse.com/905528" source="BUGZILLA"/>
		<reference ref_id="917607" ref_url="https://bugzilla.suse.com/917607" source="BUGZILLA"/>
		<reference ref_id="935856" ref_url="https://bugzilla.suse.com/935856" source="BUGZILLA"/>
		<reference ref_id="937414" ref_url="https://bugzilla.suse.com/937414" source="BUGZILLA"/>
		<reference ref_id="947747" ref_url="https://bugzilla.suse.com/947747" source="BUGZILLA"/>
		<reference ref_id="948045" ref_url="https://bugzilla.suse.com/948045" source="BUGZILLA"/>
		<reference ref_id="948602" ref_url="https://bugzilla.suse.com/948602" source="BUGZILLA"/>
		<reference ref_id="955142" ref_url="https://bugzilla.suse.com/955142" source="BUGZILLA"/>
		<reference ref_id="957814" ref_url="https://bugzilla.suse.com/957814" source="BUGZILLA"/>
		<reference ref_id="957815" ref_url="https://bugzilla.suse.com/957815" source="BUGZILLA"/>
		<reference ref_id="961254" ref_url="https://bugzilla.suse.com/961254" source="BUGZILLA"/>
		<reference ref_id="962297" ref_url="https://bugzilla.suse.com/962297" source="BUGZILLA"/>
		<reference ref_id="966076" ref_url="https://bugzilla.suse.com/966076" source="BUGZILLA"/>
		<reference ref_id="966077" ref_url="https://bugzilla.suse.com/966077" source="BUGZILLA"/>
		<reference ref_id="985201" ref_url="https://bugzilla.suse.com/985201" source="BUGZILLA"/>
		<reference ref_id="986541" ref_url="https://bugzilla.suse.com/986541" source="BUGZILLA"/>
		<reference ref_id="991344" ref_url="https://bugzilla.suse.com/991344" source="BUGZILLA"/>
		<reference ref_id="998743" ref_url="https://bugzilla.suse.com/998743" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2882" ref_url="https://www.suse.com/security/cve/CVE-2013-2882/" source="CVE"/>
		<reference ref_id="CVE-2013-6639" ref_url="https://www.suse.com/security/cve/CVE-2013-6639/" source="CVE"/>
		<reference ref_id="CVE-2013-6640" ref_url="https://www.suse.com/security/cve/CVE-2013-6640/" source="CVE"/>
		<reference ref_id="CVE-2013-6668" ref_url="https://www.suse.com/security/cve/CVE-2013-6668/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2015-3193" ref_url="https://www.suse.com/security/cve/CVE-2015-3193/" source="CVE"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-5380" ref_url="https://www.suse.com/security/cve/CVE-2015-5380/" source="CVE"/>
		<reference ref_id="CVE-2015-7384" ref_url="https://www.suse.com/security/cve/CVE-2015-7384/" source="CVE"/>
		<reference ref_id="CVE-2016-2086" ref_url="https://www.suse.com/security/cve/CVE-2016-2086/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-2216" ref_url="https://www.suse.com/security/cve/CVE-2016-2216/" source="CVE"/>
		<reference ref_id="CVE-2016-5172" ref_url="https://www.suse.com/security/cve/CVE-2016-5172/" source="CVE"/>
		<reference ref_id="CVE-2016-5325" ref_url="https://www.suse.com/security/cve/CVE-2016-5325/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="CVE-2016-7052" ref_url="https://www.suse.com/security/cve/CVE-2016-7052/" source="CVE"/>
		<reference ref_id="CVE-2016-7099" ref_url="https://www.suse.com/security/cve/CVE-2016-7099/" source="CVE"/>
		<reference ref_id="CVE-2017-1000381" ref_url="https://www.suse.com/security/cve/CVE-2017-1000381/" source="CVE"/>
		<reference ref_id="CVE-2017-10686" ref_url="https://www.suse.com/security/cve/CVE-2017-10686/" source="CVE"/>
		<reference ref_id="CVE-2017-11111" ref_url="https://www.suse.com/security/cve/CVE-2017-11111/" source="CVE"/>
		<reference ref_id="CVE-2017-11499" ref_url="https://www.suse.com/security/cve/CVE-2017-11499/" source="CVE"/>
		<reference ref_id="CVE-2017-14228" ref_url="https://www.suse.com/security/cve/CVE-2017-14228/" source="CVE"/>
		<reference ref_id="CVE-2017-14849" ref_url="https://www.suse.com/security/cve/CVE-2017-14849/" source="CVE"/>
		<reference ref_id="CVE-2017-14919" ref_url="https://www.suse.com/security/cve/CVE-2017-14919/" source="CVE"/>
		<reference ref_id="CVE-2017-15896" ref_url="https://www.suse.com/security/cve/CVE-2017-15896/" source="CVE"/>
		<reference ref_id="CVE-2017-15897" ref_url="https://www.suse.com/security/cve/CVE-2017-15897/" source="CVE"/>
		<reference ref_id="CVE-2017-17810" ref_url="https://www.suse.com/security/cve/CVE-2017-17810/" source="CVE"/>
		<reference ref_id="CVE-2017-17811" ref_url="https://www.suse.com/security/cve/CVE-2017-17811/" source="CVE"/>
		<reference ref_id="CVE-2017-17812" ref_url="https://www.suse.com/security/cve/CVE-2017-17812/" source="CVE"/>
		<reference ref_id="CVE-2017-17813" ref_url="https://www.suse.com/security/cve/CVE-2017-17813/" source="CVE"/>
		<reference ref_id="CVE-2017-17814" ref_url="https://www.suse.com/security/cve/CVE-2017-17814/" source="CVE"/>
		<reference ref_id="CVE-2017-17815" ref_url="https://www.suse.com/security/cve/CVE-2017-17815/" source="CVE"/>
		<reference ref_id="CVE-2017-17816" ref_url="https://www.suse.com/security/cve/CVE-2017-17816/" source="CVE"/>
		<reference ref_id="CVE-2017-17817" ref_url="https://www.suse.com/security/cve/CVE-2017-17817/" source="CVE"/>
		<reference ref_id="CVE-2017-17818" ref_url="https://www.suse.com/security/cve/CVE-2017-17818/" source="CVE"/>
		<reference ref_id="CVE-2017-17819" ref_url="https://www.suse.com/security/cve/CVE-2017-17819/" source="CVE"/>
		<reference ref_id="CVE-2017-17820" ref_url="https://www.suse.com/security/cve/CVE-2017-17820/" source="CVE"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<reference ref_id="CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735/" source="CVE"/>
		<reference ref_id="CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736/" source="CVE"/>
		<reference ref_id="CVE-2017-3738" ref_url="https://www.suse.com/security/cve/CVE-2017-3738/" source="CVE"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-1000168" ref_url="https://www.suse.com/security/cve/CVE-2018-1000168/" source="CVE"/>
		<reference ref_id="CVE-2018-12115" ref_url="https://www.suse.com/security/cve/CVE-2018-12115/" source="CVE"/>
		<reference ref_id="CVE-2018-12116" ref_url="https://www.suse.com/security/cve/CVE-2018-12116/" source="CVE"/>
		<reference ref_id="CVE-2018-12121" ref_url="https://www.suse.com/security/cve/CVE-2018-12121/" source="CVE"/>
		<reference ref_id="CVE-2018-12122" ref_url="https://www.suse.com/security/cve/CVE-2018-12122/" source="CVE"/>
		<reference ref_id="CVE-2018-12123" ref_url="https://www.suse.com/security/cve/CVE-2018-12123/" source="CVE"/>
		<reference ref_id="CVE-2018-20406" ref_url="https://www.suse.com/security/cve/CVE-2018-20406/" source="CVE"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2018-7158" ref_url="https://www.suse.com/security/cve/CVE-2018-7158/" source="CVE"/>
		<reference ref_id="CVE-2018-7159" ref_url="https://www.suse.com/security/cve/CVE-2018-7159/" source="CVE"/>
		<reference ref_id="CVE-2018-7160" ref_url="https://www.suse.com/security/cve/CVE-2018-7160/" source="CVE"/>
		<reference ref_id="CVE-2018-7161" ref_url="https://www.suse.com/security/cve/CVE-2018-7161/" source="CVE"/>
		<reference ref_id="CVE-2018-7167" ref_url="https://www.suse.com/security/cve/CVE-2018-7167/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11710" ref_url="https://www.suse.com/security/cve/CVE-2019-11710/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11714" ref_url="https://www.suse.com/security/cve/CVE-2019-11714/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11716" ref_url="https://www.suse.com/security/cve/CVE-2019-11716/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11718" ref_url="https://www.suse.com/security/cve/CVE-2019-11718/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11720" ref_url="https://www.suse.com/security/cve/CVE-2019-11720/" source="CVE"/>
		<reference ref_id="CVE-2019-11721" ref_url="https://www.suse.com/security/cve/CVE-2019-11721/" source="CVE"/>
		<reference ref_id="CVE-2019-11723" ref_url="https://www.suse.com/security/cve/CVE-2019-11723/" source="CVE"/>
		<reference ref_id="CVE-2019-11724" ref_url="https://www.suse.com/security/cve/CVE-2019-11724/" source="CVE"/>
		<reference ref_id="CVE-2019-11725" ref_url="https://www.suse.com/security/cve/CVE-2019-11725/" source="CVE"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11728" ref_url="https://www.suse.com/security/cve/CVE-2019-11728/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-11733" ref_url="https://www.suse.com/security/cve/CVE-2019-11733/" source="CVE"/>
		<reference ref_id="CVE-2019-11735" ref_url="https://www.suse.com/security/cve/CVE-2019-11735/" source="CVE"/>
		<reference ref_id="CVE-2019-11736" ref_url="https://www.suse.com/security/cve/CVE-2019-11736/" source="CVE"/>
		<reference ref_id="CVE-2019-11738" ref_url="https://www.suse.com/security/cve/CVE-2019-11738/" source="CVE"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11747" ref_url="https://www.suse.com/security/cve/CVE-2019-11747/" source="CVE"/>
		<reference ref_id="CVE-2019-11748" ref_url="https://www.suse.com/security/cve/CVE-2019-11748/" source="CVE"/>
		<reference ref_id="CVE-2019-11749" ref_url="https://www.suse.com/security/cve/CVE-2019-11749/" source="CVE"/>
		<reference ref_id="CVE-2019-11750" ref_url="https://www.suse.com/security/cve/CVE-2019-11750/" source="CVE"/>
		<reference ref_id="CVE-2019-11751" ref_url="https://www.suse.com/security/cve/CVE-2019-11751/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757/" source="CVE"/>
		<reference ref_id="CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758/" source="CVE"/>
		<reference ref_id="CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759/" source="CVE"/>
		<reference ref_id="CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760/" source="CVE"/>
		<reference ref_id="CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761/" source="CVE"/>
		<reference ref_id="CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762/" source="CVE"/>
		<reference ref_id="CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763/" source="CVE"/>
		<reference ref_id="CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764/" source="CVE"/>
		<reference ref_id="CVE-2019-13173" ref_url="https://www.suse.com/security/cve/CVE-2019-13173/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="CVE-2019-5737" ref_url="https://www.suse.com/security/cve/CVE-2019-5737/" source="CVE"/>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2019-9512" ref_url="https://www.suse.com/security/cve/CVE-2019-9512/" source="CVE"/>
		<reference ref_id="CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513/" source="CVE"/>
		<reference ref_id="CVE-2019-9514" ref_url="https://www.suse.com/security/cve/CVE-2019-9514/" source="CVE"/>
		<reference ref_id="CVE-2019-9515" ref_url="https://www.suse.com/security/cve/CVE-2019-9515/" source="CVE"/>
		<reference ref_id="CVE-2019-9516" ref_url="https://www.suse.com/security/cve/CVE-2019-9516/" source="CVE"/>
		<reference ref_id="CVE-2019-9517" ref_url="https://www.suse.com/security/cve/CVE-2019-9517/" source="CVE"/>
		<reference ref_id="CVE-2019-9518" ref_url="https://www.suse.com/security/cve/CVE-2019-9518/" source="CVE"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<description>

This update contains the Mozilla Firefox ESR 68.2 release.

Mozilla Firefox was updated to ESR 68.2 release:

* Enterprise: New administrative policies were added. More
  information and templates are available at the Policy
  Templates page.

* Various security fixes:
  MFSA 2019-33 (bsc#1154738)
  * CVE-2019-15903: Heap overflow in expat library in XML_GetCurrentLineNumber
  * CVE-2019-11757: Use-after-free when creating index updates in IndexedDB
  * CVE-2019-11758: Potentially exploitable crash due to 360 Total Security
  * CVE-2019-11759: Stack buffer overflow in HKDF output
  * CVE-2019-11760: Stack buffer overflow in WebRTC networking
  * CVE-2019-11761: Unintended access to a privileged JSONView object
  * CVE-2019-11762: document.domain-based origin isolation has same-origin- property violation
  * CVE-2019-11763: Incorrect HTML parsing results in XSS bypass technique
  * CVE-2019-11764: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2

Other Issues resolved:

* [bsc#1104841] Newer versions of firefox have a dependency on
                GLIBCXX_3.4.20
* [bsc#1074235] MozillaFirefox: background tab crash reports sent
                inadvertently without user opt-in
* [bsc#1043008] Firefox hangs randomly when browsing and
                scrolling
* [bsc#1025108] Firefox stops loading page until mouse is moved
* [bsc#905528]  Firefox malfunctions due to broken omni.ja
                archives

		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-17"/>
	<updated date="2020-01-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000036">SUSE bug 1000036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001652">SUSE bug 1001652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025108">SUSE bug 1025108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029377">SUSE bug 1029377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029902">SUSE bug 1029902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040164">SUSE bug 1040164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/104105">SUSE bug 104105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042670">SUSE bug 1042670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043008">SUSE bug 1043008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044946">SUSE bug 1044946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047925">SUSE bug 1047925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047936">SUSE bug 1047936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048299">SUSE bug 1048299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049186">SUSE bug 1049186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050653">SUSE bug 1050653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056058">SUSE bug 1056058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058013">SUSE bug 1058013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066242">SUSE bug 1066242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066953">SUSE bug 1066953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070738">SUSE bug 1070738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070853">SUSE bug 1070853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072320">SUSE bug 1072320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072322">SUSE bug 1072322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073796">SUSE bug 1073796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073798">SUSE bug 1073798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073799">SUSE bug 1073799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073803">SUSE bug 1073803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073808">SUSE bug 1073808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073818">SUSE bug 1073818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073823">SUSE bug 1073823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073829">SUSE bug 1073829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073830">SUSE bug 1073830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073832">SUSE bug 1073832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073846">SUSE bug 1073846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074235">SUSE bug 1074235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077230">SUSE bug 1077230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079761">SUSE bug 1079761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081750">SUSE bug 1081750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087453">SUSE bug 1087453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087459">SUSE bug 1087459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087463">SUSE bug 1087463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088573">SUSE bug 1088573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091764">SUSE bug 1091764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094814">SUSE bug 1094814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097375">SUSE bug 1097375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097401">SUSE bug 1097401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097404">SUSE bug 1097404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097748">SUSE bug 1097748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104841">SUSE bug 1104841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105019">SUSE bug 1105019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107030">SUSE bug 1107030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109465">SUSE bug 1109465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117473">SUSE bug 1117473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117626">SUSE bug 1117626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117627">SUSE bug 1117627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117629">SUSE bug 1117629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117630">SUSE bug 1117630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120644">SUSE bug 1120644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123482">SUSE bug 1123482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124525">SUSE bug 1124525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127532">SUSE bug 1127532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130694">SUSE bug 1130694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133452">SUSE bug 1133452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133810">SUSE bug 1133810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134209">SUSE bug 1134209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140290">SUSE bug 1140290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144919">SUSE bug 1144919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145665">SUSE bug 1145665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146090">SUSE bug 1146090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146091">SUSE bug 1146091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146093">SUSE bug 1146093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146094">SUSE bug 1146094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146095">SUSE bug 1146095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146097">SUSE bug 1146097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146099">SUSE bug 1146099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146100">SUSE bug 1146100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153423">SUSE bug 1153423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1447070">SUSE bug 1447070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1447409">SUSE bug 1447409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744625">SUSE bug 744625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744629">SUSE bug 744629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845955">SUSE bug 845955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865853">SUSE bug 865853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905528">SUSE bug 905528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917607">SUSE bug 917607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935856">SUSE bug 935856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937414">SUSE bug 937414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947747">SUSE bug 947747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948045">SUSE bug 948045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948602">SUSE bug 948602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955142">SUSE bug 955142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957814">SUSE bug 957814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957815">SUSE bug 957815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961254">SUSE bug 961254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962297">SUSE bug 962297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966076">SUSE bug 966076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966077">SUSE bug 966077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985201">SUSE bug 985201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986541">SUSE bug 986541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991344">SUSE bug 991344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998743">SUSE bug 998743</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2882/">CVE-2013-2882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2882">CVE-2013-2882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6639/">CVE-2013-6639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6639">CVE-2013-6639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6640/">CVE-2013-6640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6640">CVE-2013-6640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6668/">CVE-2013-6668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6668">CVE-2013-6668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0224">CVE-2014-0224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3193/">CVE-2015-3193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3193">CVE-2015-3193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3194">CVE-2015-3194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5380/">CVE-2015-5380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5380">CVE-2015-5380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7384/">CVE-2015-7384 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7384">CVE-2015-7384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2086/">CVE-2016-2086 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2086">CVE-2016-2086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2178">CVE-2016-2178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2216/">CVE-2016-2216 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2216">CVE-2016-2216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5172/">CVE-2016-5172 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5172">CVE-2016-5172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5325/">CVE-2016-5325 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5325">CVE-2016-5325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6304">CVE-2016-6304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6306">CVE-2016-6306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7052/">CVE-2016-7052 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7052">CVE-2016-7052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7099/">CVE-2016-7099 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7099">CVE-2016-7099 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000381/">CVE-2017-1000381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000381">CVE-2017-1000381 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10686/">CVE-2017-10686 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10686">CVE-2017-10686 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11111/">CVE-2017-11111 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11111">CVE-2017-11111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11499/">CVE-2017-11499 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11499">CVE-2017-11499 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14228/">CVE-2017-14228 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14228">CVE-2017-14228 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14849/">CVE-2017-14849 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14849">CVE-2017-14849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14919/">CVE-2017-14919 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14919">CVE-2017-14919 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15896/">CVE-2017-15896 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15896">CVE-2017-15896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15897/">CVE-2017-15897 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15897">CVE-2017-15897 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17810/">CVE-2017-17810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17810">CVE-2017-17810 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17811/">CVE-2017-17811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17811">CVE-2017-17811 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17812/">CVE-2017-17812 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17812">CVE-2017-17812 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17813/">CVE-2017-17813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17813">CVE-2017-17813 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17814/">CVE-2017-17814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17814">CVE-2017-17814 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17815/">CVE-2017-17815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17815">CVE-2017-17815 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17816/">CVE-2017-17816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17816">CVE-2017-17816 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17817/">CVE-2017-17817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17817">CVE-2017-17817 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17818/">CVE-2017-17818 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17818">CVE-2017-17818 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17819/">CVE-2017-17819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17819">CVE-2017-17819 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17820/">CVE-2017-17820 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17820">CVE-2017-17820 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18207">CVE-2017-18207 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3735">CVE-2017-3735 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3736">CVE-2017-3736 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3738/">CVE-2017-3738 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3738">CVE-2017-3738 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0732">CVE-2018-0732 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000168/">CVE-2018-1000168 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000168">CVE-2018-1000168 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12115/">CVE-2018-12115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12115">CVE-2018-12115 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12116/">CVE-2018-12116 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12116">CVE-2018-12116 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12121/">CVE-2018-12121 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12121">CVE-2018-12121 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12122/">CVE-2018-12122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12122">CVE-2018-12122 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12123/">CVE-2018-12123 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12123">CVE-2018-12123 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20406/">CVE-2018-20406 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20406">CVE-2018-20406 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20852">CVE-2018-20852 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7158/">CVE-2018-7158 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7158">CVE-2018-7158 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7159/">CVE-2018-7159 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7159">CVE-2018-7159 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7160/">CVE-2018-7160 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7160">CVE-2018-7160 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7161/">CVE-2018-7161 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7161">CVE-2018-7161 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7167/">CVE-2018-7167 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7167">CVE-2018-7167 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10160">CVE-2019-10160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11709">CVE-2019-11709 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11710/">CVE-2019-11710 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11710">CVE-2019-11710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11711">CVE-2019-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11712">CVE-2019-11712 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11713">CVE-2019-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11714/">CVE-2019-11714 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11714">CVE-2019-11714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11715">CVE-2019-11715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11716/">CVE-2019-11716 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11716">CVE-2019-11716 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11717">CVE-2019-11717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11718/">CVE-2019-11718 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11718">CVE-2019-11718 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11719">CVE-2019-11719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11720/">CVE-2019-11720 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11720">CVE-2019-11720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11721/">CVE-2019-11721 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11721">CVE-2019-11721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11723/">CVE-2019-11723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11723">CVE-2019-11723 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11724/">CVE-2019-11724 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11724">CVE-2019-11724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11725/">CVE-2019-11725 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11725">CVE-2019-11725 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11727">CVE-2019-11727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11728/">CVE-2019-11728 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11728">CVE-2019-11728 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11729">CVE-2019-11729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11730">CVE-2019-11730 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11733/">CVE-2019-11733 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11733">CVE-2019-11733 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11735/">CVE-2019-11735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11735">CVE-2019-11735 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11736/">CVE-2019-11736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11736">CVE-2019-11736 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11738/">CVE-2019-11738 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11738">CVE-2019-11738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11747/">CVE-2019-11747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11747">CVE-2019-11747 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11748/">CVE-2019-11748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11748">CVE-2019-11748 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11749/">CVE-2019-11749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11749">CVE-2019-11749 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11750/">CVE-2019-11750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11750">CVE-2019-11750 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11751/">CVE-2019-11751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11751">CVE-2019-11751 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11753">CVE-2019-11753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11757">CVE-2019-11757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11758">CVE-2019-11758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11759">CVE-2019-11759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11760">CVE-2019-11760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11761">CVE-2019-11761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11762">CVE-2019-11762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11763">CVE-2019-11763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11764">CVE-2019-11764 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13173/">CVE-2019-13173 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13173">CVE-2019-13173 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5010">CVE-2019-5010 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5737/">CVE-2019-5737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5737">CVE-2019-5737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9511">CVE-2019-9511 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9512/">CVE-2019-9512 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9512">CVE-2019-9512 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9513">CVE-2019-9513 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9514/">CVE-2019-9514 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9514">CVE-2019-9514 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9515/">CVE-2019-9515 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9515">CVE-2019-9515 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9516/">CVE-2019-9516 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9516">CVE-2019-9516 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9517/">CVE-2019-9517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9517">CVE-2019-9517 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9518/">CVE-2019-9518 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9518">CVE-2019-9518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9636">CVE-2019-9636 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9811">CVE-2019-9811 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9812">CVE-2019-9812 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571486" comment="MozillaFirefox-68.2.0-78.51.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571487" comment="MozillaFirefox-branding-SLED-68-21.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571488" comment="MozillaFirefox-translations-common-68.2.0-78.51.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571489" comment="MozillaFirefox-translations-other-68.2.0-78.51.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571490" comment="firefox-atk-lang-2.26.1-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571491" comment="firefox-gdk-pixbuf-lang-2.36.11-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571492" comment="firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571493" comment="firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571494" comment="firefox-gio-branding-upstream-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571495" comment="firefox-glib2-lang-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571496" comment="firefox-glib2-tools-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571497" comment="firefox-gtk3-branding-upstream-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571498" comment="firefox-gtk3-data-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571499" comment="firefox-gtk3-immodule-amharic-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571500" comment="firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571501" comment="firefox-gtk3-immodule-multipress-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571502" comment="firefox-gtk3-immodule-thai-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571503" comment="firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571504" comment="firefox-gtk3-immodule-xim-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571505" comment="firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571506" comment="firefox-gtk3-lang-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571507" comment="firefox-gtk3-tools-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571508" comment="firefox-libatk-1_0-0-2.26.1-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571509" comment="firefox-libcairo-gobject2-1.15.10-2.13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571510" comment="firefox-libcairo2-1.15.10-2.13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571511" comment="firefox-libffi4-5.3.1+r233831-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571512" comment="firefox-libffi7-3.2.1.git259-2.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571513" comment="firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571514" comment="firefox-libgtk-3-0-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571515" comment="firefox-libharfbuzz0-1.7.5-2.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571516" comment="firefox-libpango-1_0-0-1.40.14-2.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571517" comment="libfirefox-gio-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571518" comment="libfirefox-glib-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571519" comment="libfirefox-gmodule-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571520" comment="libfirefox-gobject-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571521" comment="libfirefox-gthread-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571522" comment="libfreebl3-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571523" comment="libfreebl3-32bit-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571524" comment="libsoftokn3-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571525" comment="libsoftokn3-32bit-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571526" comment="mozilla-nspr-4.21-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571527" comment="mozilla-nspr-32bit-4.21-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571528" comment="mozilla-nss-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571529" comment="mozilla-nss-32bit-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571530" comment="mozilla-nss-certs-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571531" comment="mozilla-nss-certs-32bit-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571532" comment="mozilla-nss-tools-3.45-38.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218589" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss, mozilla-nspr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1137338" ref_url="https://bugzilla.suse.com/1137338" source="BUGZILLA"/>
		<description>

This update contains Mozilla Firefox 60.7ESR.

It brings lots of security fixes and other improvements.

It also includes new additional helper libraries to allow Firefox to run on SUSE Linux Enterprise 11.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1137338">SUSE bug 1137338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571533" comment="MozillaFirefox-60.7.0esr-78.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571534" comment="MozillaFirefox-branding-SLED-60-21.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571535" comment="MozillaFirefox-translations-common-60.7.0esr-78.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571536" comment="MozillaFirefox-translations-other-60.7.0esr-78.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571537" comment="firefox-at-spi2-core-2.10.2-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571538" comment="firefox-at-spi2-core-lang-2.10.2-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571539" comment="firefox-atk-lang-2.26.1-2.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571540" comment="firefox-dbus-1-glib-0.76-34.2.4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571541" comment="firefox-gdk-pixbuf-lang-2.36.11-2.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571542" comment="firefox-gdk-pixbuf-query-loaders-2.36.11-2.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571543" comment="firefox-gdk-pixbuf-thumbnailer-2.36.11-2.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571544" comment="firefox-gio-branding-upstream-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571545" comment="firefox-glib2-lang-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571546" comment="firefox-glib2-tools-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571547" comment="firefox-gtk3-branding-upstream-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571548" comment="firefox-gtk3-data-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571549" comment="firefox-gtk3-immodule-amharic-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571550" comment="firefox-gtk3-immodule-inuktitut-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571551" comment="firefox-gtk3-immodule-multipress-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571552" comment="firefox-gtk3-immodule-thai-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571553" comment="firefox-gtk3-immodule-vietnamese-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571554" comment="firefox-gtk3-immodule-xim-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571555" comment="firefox-gtk3-immodules-tigrigna-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571556" comment="firefox-gtk3-lang-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571557" comment="firefox-gtk3-tools-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571558" comment="firefox-libatk-1_0-0-2.26.1-2.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571559" comment="firefox-libatk-bridge-2_0-0-2.10.2-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571560" comment="firefox-libatspi0-2.10.2-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571561" comment="firefox-libcairo-gobject2-1.15.10-2.8.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571562" comment="firefox-libcairo2-1.15.10-2.8.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571563" comment="firefox-libfreetype6-2.9-2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571564" comment="firefox-libgdk_pixbuf-2_0-0-2.36.11-2.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571565" comment="firefox-libgtk-3-0-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571566" comment="firefox-libharfbuzz0-1.7.5-2.4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571567" comment="firefox-libpango-1_0-0-1.40.14-2.4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571568" comment="firefox-libpixman-1-0-0.34.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571569" comment="libfirefox-gio-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571570" comment="libfirefox-glib-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571571" comment="libfirefox-gmodule-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571572" comment="libfirefox-gobject-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571573" comment="libfirefox-gthread-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571574" comment="libfreebl3-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571575" comment="libfreebl3-32bit-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571576" comment="libsoftokn3-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571577" comment="libsoftokn3-32bit-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571578" comment="mozilla-nspr-4.20-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571579" comment="mozilla-nspr-32bit-4.20-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571580" comment="mozilla-nss-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571581" comment="mozilla-nss-32bit-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571582" comment="mozilla-nss-certs-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571583" comment="mozilla-nss-certs-32bit-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571584" comment="mozilla-nss-tools-3.41.1-38.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218590" version="1" class="patch">
	<metadata>
		<title>Security update for firefox-harfbuzz (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1207922" ref_url="https://bugzilla.suse.com/1207922" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-25193" ref_url="https://www.suse.com/security/cve/CVE-2023-25193/" source="CVE"/>
		<description>
This update for firefox-harfbuzz fixes the following issues:

- CVE-2023-25193: Fixed vulnerability that allowed attackers to trigger O(n^2) growth via consecutive marks (bsc#1207922).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-17"/>
	<updated date="2023-04-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207922">SUSE bug 1207922</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25193/">CVE-2023-25193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25193">CVE-2023-25193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992758" comment="firefox-libharfbuzz0-1.7.5-2.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218591" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="854367" ref_url="https://bugzilla.suse.com/854367" source="BUGZILLA"/>
		<reference ref_id="854370" ref_url="https://bugzilla.suse.com/854370" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5609" ref_url="https://www.suse.com/security/cve/CVE-2013-5609/" source="CVE"/>
		<reference ref_id="CVE-2013-5610" ref_url="https://www.suse.com/security/cve/CVE-2013-5610/" source="CVE"/>
		<reference ref_id="CVE-2013-5611" ref_url="https://www.suse.com/security/cve/CVE-2013-5611/" source="CVE"/>
		<reference ref_id="CVE-2013-5612" ref_url="https://www.suse.com/security/cve/CVE-2013-5612/" source="CVE"/>
		<reference ref_id="CVE-2013-5613" ref_url="https://www.suse.com/security/cve/CVE-2013-5613/" source="CVE"/>
		<reference ref_id="CVE-2013-5614" ref_url="https://www.suse.com/security/cve/CVE-2013-5614/" source="CVE"/>
		<reference ref_id="CVE-2013-5615" ref_url="https://www.suse.com/security/cve/CVE-2013-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-5616" ref_url="https://www.suse.com/security/cve/CVE-2013-5616/" source="CVE"/>
		<reference ref_id="CVE-2013-5618" ref_url="https://www.suse.com/security/cve/CVE-2013-5618/" source="CVE"/>
		<reference ref_id="CVE-2013-5619" ref_url="https://www.suse.com/security/cve/CVE-2013-5619/" source="CVE"/>
		<reference ref_id="CVE-2013-6671" ref_url="https://www.suse.com/security/cve/CVE-2013-6671/" source="CVE"/>
		<reference ref_id="CVE-2013-6672" ref_url="https://www.suse.com/security/cve/CVE-2013-6672/" source="CVE"/>
		<reference ref_id="CVE-2013-6673" ref_url="https://www.suse.com/security/cve/CVE-2013-6673/" source="CVE"/>
		<description>

MozillaFirefox has been updated to the 24.2.0 ESR security release.

This is a major upgrade from the 17 ESR release branch.

Security issues fixed:

    * CVE-2013-5611 Application Installation doorhanger persists on
      navigation (MFSA 2013-105)
    * CVE-2013-5609 Miscellaneous memory safety hazards (rv:24.2) (MFSA
      2013-104)
    * CVE-2013-5610 Miscellaneous memory safety hazards (rv:26.0) (MFSA
      2013-104)
    * CVE-2013-5612 Character encoding cross-origin XSS attack (MFSA
      2013-106)
    * CVE-2013-5614 Sandbox restrictions not applied to nested object
      elements (MFSA 2013-107)
    * CVE-2013-5616 Use-after-free in event listeners (MFSA 2013-108)
    * CVE-2013-5619 Potential overflow in JavaScript binary search
      algorithms (MFSA 2013-110)
    * CVE-2013-6671 Segmentation violation when replacing ordered list
      elements (MFSA 2013-111)
    * CVE-2013-6673 Trust settings for built-in roots ignored during EV
      certificate validation (MFSA 2013-113)
    * CVE-2013-5613 Use-after-free in synthetic mouse movement (MFSA
      2013-114)
    * CVE-2013-5615 GetElementIC typed array stubs can be generated outside
      observed typesets (MFSA 2013-115)
    * CVE-2013-6672 Linux clipboard information disclosure though selection
      paste (MFSA 2013-112)
    * CVE-2013-5618 Use-after-free during Table Editing (MFSA 2013-109)

Security Issue references:

    * CVE-2013-5609
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609&gt;
    * CVE-2013-5610
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5610&gt;
    * CVE-2013-5611
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5611&gt;
    * CVE-2013-5612
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612&gt;
    * CVE-2013-5613
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613&gt;
    * CVE-2013-5614
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614&gt;
    * CVE-2013-5615
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5615&gt;
    * CVE-2013-5616
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616&gt;
    * CVE-2013-5618
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618&gt;
    * CVE-2013-5619
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5619&gt;
    * CVE-2013-6671
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671&gt;
    * CVE-2013-6672
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6672&gt;
    * CVE-2013-6673
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6673&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-16"/>
	<updated date="2013-12-16"/>
	<bugzilla href="https://bugzilla.suse.com/854367">SUSE bug 854367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5609/">CVE-2013-5609 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5609">CVE-2013-5609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5610/">CVE-2013-5610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5610">CVE-2013-5610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5611/">CVE-2013-5611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5611">CVE-2013-5611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5612/">CVE-2013-5612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5612">CVE-2013-5612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5613/">CVE-2013-5613 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5613">CVE-2013-5613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5614/">CVE-2013-5614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5614">CVE-2013-5614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5615/">CVE-2013-5615 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5615">CVE-2013-5615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5616/">CVE-2013-5616 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5616">CVE-2013-5616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5618/">CVE-2013-5618 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5618">CVE-2013-5618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5619/">CVE-2013-5619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5619">CVE-2013-5619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6671/">CVE-2013-6671 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-6671">CVE-2013-6671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6672/">CVE-2013-6672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6672">CVE-2013-6672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6673/">CVE-2013-6673 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-6673">CVE-2013-6673 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577757" comment="MozillaFirefox-24.2.0esr-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577758" comment="MozillaFirefox-branding-SLED-24-0.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577759" comment="MozillaFirefox-translations-24.2.0esr-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577760" comment="libfreebl3-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577761" comment="libfreebl3-32bit-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577762" comment="libfreebl3-x86-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577763" comment="libsoftokn3-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577764" comment="libsoftokn3-32bit-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577765" comment="libsoftokn3-x86-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577766" comment="mozilla-nss-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577767" comment="mozilla-nss-32bit-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577768" comment="mozilla-nss-tools-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577769" comment="mozilla-nss-x86-3.15.3.1-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577757" comment="MozillaFirefox-24.2.0esr-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577758" comment="MozillaFirefox-branding-SLED-24-0.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577759" comment="MozillaFirefox-translations-24.2.0esr-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577760" comment="libfreebl3-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577761" comment="libfreebl3-32bit-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577762" comment="libfreebl3-x86-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577763" comment="libsoftokn3-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577764" comment="libsoftokn3-32bit-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577765" comment="libsoftokn3-x86-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577766" comment="mozilla-nss-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577767" comment="mozilla-nss-32bit-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577768" comment="mozilla-nss-tools-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577769" comment="mozilla-nss-x86-3.15.3.1-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577757" comment="MozillaFirefox-24.2.0esr-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577758" comment="MozillaFirefox-branding-SLED-24-0.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577759" comment="MozillaFirefox-translations-24.2.0esr-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577760" comment="libfreebl3-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577761" comment="libfreebl3-32bit-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577762" comment="libfreebl3-x86-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577763" comment="libsoftokn3-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577764" comment="libsoftokn3-32bit-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577765" comment="libsoftokn3-x86-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577766" comment="mozilla-nss-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577767" comment="mozilla-nss-32bit-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577768" comment="mozilla-nss-tools-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577769" comment="mozilla-nss-x86-3.15.3.1-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218592" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="900941" ref_url="https://bugzilla.suse.com/900941" source="BUGZILLA"/>
		<reference ref_id="905056" ref_url="https://bugzilla.suse.com/905056" source="BUGZILLA"/>
		<reference ref_id="905528" ref_url="https://bugzilla.suse.com/905528" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1574" ref_url="https://www.suse.com/security/cve/CVE-2014-1574/" source="CVE"/>
		<reference ref_id="CVE-2014-1575" ref_url="https://www.suse.com/security/cve/CVE-2014-1575/" source="CVE"/>
		<reference ref_id="CVE-2014-1576" ref_url="https://www.suse.com/security/cve/CVE-2014-1576/" source="CVE"/>
		<reference ref_id="CVE-2014-1577" ref_url="https://www.suse.com/security/cve/CVE-2014-1577/" source="CVE"/>
		<reference ref_id="CVE-2014-1578" ref_url="https://www.suse.com/security/cve/CVE-2014-1578/" source="CVE"/>
		<reference ref_id="CVE-2014-1581" ref_url="https://www.suse.com/security/cve/CVE-2014-1581/" source="CVE"/>
		<reference ref_id="CVE-2014-1583" ref_url="https://www.suse.com/security/cve/CVE-2014-1583/" source="CVE"/>
		<reference ref_id="CVE-2014-1585" ref_url="https://www.suse.com/security/cve/CVE-2014-1585/" source="CVE"/>
		<reference ref_id="CVE-2014-1586" ref_url="https://www.suse.com/security/cve/CVE-2014-1586/" source="CVE"/>
		<description>

This version update of Mozilla Firefox to 31.2.0ESR brings improvements, 
stability fixes and also security fixes for the following CVEs:

CVE-2014-1574, CVE-2014-1575, CVE-2014-1576 ,CVE-2014-1577, CVE-2014-1578, 
CVE-2014-1581, CVE-2014-1583, CVE-2014-1585, CVE-2014-1586

It also disables SSLv3 by default to mitigate the protocol downgrade attack 
known as POODLE.

This update fixes some regressions introduced by the previously released 
update.

Security Issues:

    * CVE-2014-1574
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574&gt;
    * CVE-2014-1575
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1575&gt;
    * CVE-2014-1576
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576&gt;
    * CVE-2014-1577
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577&gt;
    * CVE-2014-1578
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578&gt;
    * CVE-2014-1581
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581&gt;
    * CVE-2014-1583
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583&gt;
    * CVE-2014-1585
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585&gt;
    * CVE-2014-1586
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-15"/>
	<updated date="2014-11-15"/>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905056">SUSE bug 905056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905528">SUSE bug 905528</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1574/">CVE-2014-1574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1574">CVE-2014-1574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1575/">CVE-2014-1575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1575">CVE-2014-1575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1576/">CVE-2014-1576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1576">CVE-2014-1576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1577/">CVE-2014-1577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1577">CVE-2014-1577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1578/">CVE-2014-1578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1578">CVE-2014-1578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1581/">CVE-2014-1581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1581">CVE-2014-1581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1583/">CVE-2014-1583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1583">CVE-2014-1583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1585/">CVE-2014-1585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1585">CVE-2014-1585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1586/">CVE-2014-1586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1586">CVE-2014-1586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577770" comment="MozillaFirefox-31.2.0esr-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577771" comment="MozillaFirefox-branding-SLED-31.0-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577773" comment="MozillaFirefox-translations-31.2.0esr-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577774" comment="libfreebl3-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577775" comment="libfreebl3-32bit-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577776" comment="libfreebl3-x86-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577777" comment="libsoftokn3-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577778" comment="libsoftokn3-32bit-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577779" comment="libsoftokn3-x86-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577780" comment="mozilla-nspr-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577781" comment="mozilla-nspr-32bit-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577782" comment="mozilla-nspr-x86-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577783" comment="mozilla-nss-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577784" comment="mozilla-nss-32bit-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577785" comment="mozilla-nss-tools-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577786" comment="mozilla-nss-x86-3.17.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577770" comment="MozillaFirefox-31.2.0esr-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577771" comment="MozillaFirefox-branding-SLED-31.0-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577773" comment="MozillaFirefox-translations-31.2.0esr-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577774" comment="libfreebl3-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577775" comment="libfreebl3-32bit-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577776" comment="libfreebl3-x86-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577777" comment="libsoftokn3-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577778" comment="libsoftokn3-32bit-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577779" comment="libsoftokn3-x86-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577780" comment="mozilla-nspr-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577781" comment="mozilla-nspr-32bit-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577782" comment="mozilla-nspr-x86-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577783" comment="mozilla-nss-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577784" comment="mozilla-nss-32bit-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577785" comment="mozilla-nss-tools-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577786" comment="mozilla-nss-x86-3.17.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577770" comment="MozillaFirefox-31.2.0esr-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577771" comment="MozillaFirefox-branding-SLED-31.0-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577773" comment="MozillaFirefox-translations-31.2.0esr-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577774" comment="libfreebl3-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577775" comment="libfreebl3-32bit-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577776" comment="libfreebl3-x86-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577777" comment="libsoftokn3-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577778" comment="libsoftokn3-32bit-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577779" comment="libsoftokn3-x86-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577780" comment="mozilla-nspr-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577781" comment="mozilla-nspr-32bit-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577782" comment="mozilla-nspr-x86-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577783" comment="mozilla-nss-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577784" comment="mozilla-nss-32bit-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577785" comment="mozilla-nss-tools-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577786" comment="mozilla-nss-x86-3.17.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218593" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="940806" ref_url="https://bugzilla.suse.com/940806" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4474" ref_url="https://www.suse.com/security/cve/CVE-2015-4474/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001588.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox is being updated to the current Firefox 38ESR branch (specifically the 38.2.0ESR release).

Security issues fixed:
- MFSA 2015-78 / CVE-2015-4495: Same origin violation and local file stealing via PDF reader
- MFSA 2015-79 / CVE-2015-4473/CVE-2015-4474: Miscellaneous memory safety hazards (rv:40.0 / rv:38.2)
- MFSA 2015-80 / CVE-2015-4475: Out-of-bounds read with malformed MP3 file
- MFSA 2015-82 / CVE-2015-4478: Redefinition of non-configurable JavaScript object properties
- MFSA 2015-83 / CVE-2015-4479: Overflow issues in libstagefright
- MFSA 2015-87 / CVE-2015-4484: Crash when using shared memory in JavaScript
- MFSA 2015-88 / CVE-2015-4491: Heap overflow in gdk-pixbuf when scaling bitmap images
- MFSA 2015-89 / CVE-2015-4485/CVE-2015-4486: Buffer overflows on Libvpx when decoding WebM video
- MFSA 2015-90 / CVE-2015-4487/CVE-2015-4488/CVE-2015-4489: Vulnerabilities found through code inspection
- MFSA 2015-92 / CVE-2015-4492: Use-after-free in XMLHttpRequest with shared workers

This update also contains a lot of feature improvements and bug fixes from 31ESR to 38ESR.

Also the Mozilla NSS library switched its CKBI API from 1.98 to 2.4, which is what Firefox 38ESR uses.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-10"/>
	<updated date="2015-09-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4473">CVE-2015-4473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4474/">CVE-2015-4474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4474">CVE-2015-4474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4475">CVE-2015-4475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4478">CVE-2015-4478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4479">CVE-2015-4479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4484">CVE-2015-4484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4485">CVE-2015-4485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4486">CVE-2015-4486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4487">CVE-2015-4487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4488">CVE-2015-4488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4489">CVE-2015-4489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4491">CVE-2015-4491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4492">CVE-2015-4492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4495">CVE-2015-4495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577787" comment="MozillaFirefox-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577788" comment="MozillaFirefox-branding-SLED-31.0-0.12.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577790" comment="MozillaFirefox-translations-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577791" comment="libfreebl3-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577792" comment="libfreebl3-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577793" comment="libfreebl3-x86-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577794" comment="libsoftokn3-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577795" comment="libsoftokn3-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577796" comment="libsoftokn3-x86-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577797" comment="mozilla-nss-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577798" comment="mozilla-nss-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577799" comment="mozilla-nss-tools-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577800" comment="mozilla-nss-x86-3.19.2.0-0.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577787" comment="MozillaFirefox-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577788" comment="MozillaFirefox-branding-SLED-31.0-0.12.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577790" comment="MozillaFirefox-translations-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577791" comment="libfreebl3-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577792" comment="libfreebl3-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577793" comment="libfreebl3-x86-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577794" comment="libsoftokn3-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577795" comment="libsoftokn3-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577796" comment="libsoftokn3-x86-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577797" comment="mozilla-nss-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577798" comment="mozilla-nss-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577799" comment="mozilla-nss-tools-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577800" comment="mozilla-nss-x86-3.19.2.0-0.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577787" comment="MozillaFirefox-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577788" comment="MozillaFirefox-branding-SLED-31.0-0.12.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577790" comment="MozillaFirefox-translations-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577791" comment="libfreebl3-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577792" comment="libfreebl3-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577793" comment="libfreebl3-x86-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577794" comment="libsoftokn3-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577795" comment="libsoftokn3-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577796" comment="libsoftokn3-x86-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577797" comment="mozilla-nss-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577798" comment="mozilla-nss-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577799" comment="mozilla-nss-tools-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577800" comment="mozilla-nss-x86-3.19.2.0-0.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218594" version="1" class="patch">
	<metadata>
		<title>Security update for flac</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="906831" ref_url="https://bugzilla.suse.com/906831" source="BUGZILLA"/>
		<reference ref_id="907016" ref_url="https://bugzilla.suse.com/907016" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8962" ref_url="https://www.suse.com/security/cve/CVE-2014-8962/" source="CVE"/>
		<reference ref_id="CVE-2014-9028" ref_url="https://www.suse.com/security/cve/CVE-2014-9028/" source="CVE"/>
		<description>

flac was updated to fix two security issues:

    * Stack overflow may result in arbitrary code execution
      (CVE-2014-8962).
    * Heap overflow via specially crafted .flac files (CVE-2014-9028).

Security Issues:

    * CVE-2014-8962
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8962&gt;
    * CVE-2014-9028
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9028&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-01"/>
	<updated date="2014-12-01"/>
	<bugzilla href="https://bugzilla.suse.com/906831">SUSE bug 906831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907016">SUSE bug 907016</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8962/">CVE-2014-8962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8962">CVE-2014-8962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9028/">CVE-2014-9028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9028">CVE-2014-9028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577801" comment="libFLAC++6-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577802" comment="libFLAC8-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577803" comment="libFLAC8-32bit-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577804" comment="libFLAC8-x86-1.2.1-68.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577801" comment="libFLAC++6-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577802" comment="libFLAC8-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577803" comment="libFLAC8-32bit-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577804" comment="libFLAC8-x86-1.2.1-68.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577801" comment="libFLAC++6-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577802" comment="libFLAC8-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577803" comment="libFLAC8-32bit-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577804" comment="libFLAC8-x86-1.2.1-68.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218595" version="1" class="patch">
	<metadata>
		<title>Security update for flac (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196660" ref_url="https://bugzilla.suse.com/1196660" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0561" ref_url="https://www.suse.com/security/cve/CVE-2021-0561/" source="CVE"/>
		<description>
This update for flac fixes the following issues:

- CVE-2021-0561: Fixed out of bound write in append_to_verify_fifo_interleaved_ (bsc#1196660).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196660">SUSE bug 1196660</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0561/">CVE-2021-0561 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0561">CVE-2021-0561 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671852" comment="libFLAC++6-1.2.1-68.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671853" comment="libFLAC8-1.2.1-68.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671854" comment="libFLAC8-32bit-1.2.1-68.17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218596" version="1" class="patch">
	<metadata>
		<title>Security update for fontconfig (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="992534" ref_url="https://bugzilla.suse.com/992534" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5384" ref_url="https://www.suse.com/security/cve/CVE-2016-5384/" source="CVE"/>
		<description>

This update for fontconfig fixes the following issues:

- security update:
  * CVE-2016-5384: Possible double free due to insufficiently validated cache files [bsc#992534]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-30"/>
	<updated date="2016-08-30"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/992534">SUSE bug 992534</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5384/">CVE-2016-5384 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5384">CVE-2016-5384 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577805" comment="fontconfig-2.6.0-10.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577806" comment="fontconfig-32bit-2.6.0-10.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218597" version="1" class="patch">
	<metadata>
		<title>Security update for foomatic-filters (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="957531" ref_url="https://bugzilla.suse.com/957531" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8327" ref_url="https://www.suse.com/security/cve/CVE-2015-8327/" source="CVE"/>
		<reference ref_id="CVE-2015-8560" ref_url="https://www.suse.com/security/cve/CVE-2015-8560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001799.html" source="SUSE-SU"/>
		<description>

This update fixes the following security issues:

CVE-2015-8327: adds backtick and semicolon to the list of illegal shell escape characters (bsc#957531).
CVE-2015-8560: fixed code execution via improper escaping of ;  (bsc#957531).   
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-13"/>
	<updated date="2016-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/957531">SUSE bug 957531</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8327/">CVE-2015-8327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8327">CVE-2015-8327 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8560/">CVE-2015-8560 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8560">CVE-2015-8560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577807" comment="foomatic-filters-3.0.2-269.39.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577807" comment="foomatic-filters-3.0.2-269.39.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577807" comment="foomatic-filters-3.0.2-269.39.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218598" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="864576" ref_url="https://bugzilla.suse.com/864576" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2015" ref_url="https://www.suse.com/security/cve/CVE-2014-2015/" source="CVE"/>
		<description>

This update fixes a denial of service (crash) security issue rlm_pap hash 
processing in FreeRadius, which could have been caused by special passwords 
fed into the RLM-PAP password checking method via LDAP by remote attackers.

Security Issue reference:

    * CVE-2014-2015
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2015&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-01"/>
	<updated date="2014-03-01"/>
	<bugzilla href="https://bugzilla.suse.com/864576">SUSE bug 864576</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2015/">CVE-2014-2015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2015">CVE-2014-2015 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577808" comment="freeradius-server-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577809" comment="freeradius-server-dialupadmin-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577810" comment="freeradius-server-doc-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577811" comment="freeradius-server-libs-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577812" comment="freeradius-server-utils-2.1.1-7.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577808" comment="freeradius-server-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577809" comment="freeradius-server-dialupadmin-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577810" comment="freeradius-server-doc-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577811" comment="freeradius-server-libs-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577812" comment="freeradius-server-utils-2.1.1-7.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577808" comment="freeradius-server-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577809" comment="freeradius-server-dialupadmin-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577810" comment="freeradius-server-doc-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577811" comment="freeradius-server-libs-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577812" comment="freeradius-server-utils-2.1.1-7.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218599" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1041445" ref_url="https://bugzilla.suse.com/1041445" source="BUGZILLA"/>
		<reference ref_id="912873" ref_url="https://bugzilla.suse.com/912873" source="BUGZILLA"/>
		<reference ref_id="935573" ref_url="https://bugzilla.suse.com/935573" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4680" ref_url="https://www.suse.com/security/cve/CVE-2015-4680/" source="CVE"/>
		<reference ref_id="CVE-2017-9148" ref_url="https://www.suse.com/security/cve/CVE-2017-9148/" source="CVE"/>
		<description>
This update for freeradius-server fixes the following issues:

- CVE-2017-9148: Disable OpenSSL's internal session cache to mitigate
  authentication bypass. (bnc#1041445)
- CVE-2015-4680: Add a configuration option to allow checking of all
  intermediate certificates for revocations. (bnc#935573)

The following non security issue was fixed:

- Cannot create table radpostauth because of deprecated TIMESTAMP(14) syntax. (bsc#912873)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-04"/>
	<updated date="2017-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1041445">SUSE bug 1041445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912873">SUSE bug 912873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935573">SUSE bug 935573</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4680/">CVE-2015-4680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4680">CVE-2015-4680 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-9148/">CVE-2017-9148 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9148">CVE-2017-9148 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571599" comment="freeradius-server-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571600" comment="freeradius-server-dialupadmin-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571601" comment="freeradius-server-doc-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571602" comment="freeradius-server-libs-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571603" comment="freeradius-server-utils-2.1.1-7.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218600" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1049086" ref_url="https://bugzilla.suse.com/1049086" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10978" ref_url="https://www.suse.com/security/cve/CVE-2017-10978/" source="CVE"/>
		<reference ref_id="CVE-2017-10979" ref_url="https://www.suse.com/security/cve/CVE-2017-10979/" source="CVE"/>
		<reference ref_id="CVE-2017-10981" ref_url="https://www.suse.com/security/cve/CVE-2017-10981/" source="CVE"/>
		<reference ref_id="CVE-2017-10982" ref_url="https://www.suse.com/security/cve/CVE-2017-10982/" source="CVE"/>
		<reference ref_id="CVE-2017-10983" ref_url="https://www.suse.com/security/cve/CVE-2017-10983/" source="CVE"/>
		<description>
This update for freeradius-server fixes the following issues:

Security issues fixed:
- CVE-2017-10981: DHCP - Fix memory leak in fr_dhcp_decode(). (bnc#1049086)
- CVE-2017-10982: Fix buffer over-read in fr_dhcp_decode_options(). (bsc#1049086)
- CVE-2017-10983: Fix read overflow when decoding option 63. (bnc#1049086)
- CVE-2017-10978: Fix read / write overflow in make_secret(). (bnc#1049086)
- CVE-2017-10979: Fix write overflow in rad_coalesce(). (bsc#1049086)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-23"/>
	<updated date="2017-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049086">SUSE bug 1049086</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10978/">CVE-2017-10978 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10978">CVE-2017-10978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10979/">CVE-2017-10979 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10979">CVE-2017-10979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10981/">CVE-2017-10981 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10981">CVE-2017-10981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10982/">CVE-2017-10982 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10982">CVE-2017-10982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10983/">CVE-2017-10983 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10983">CVE-2017-10983 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571604" comment="freeradius-server-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571605" comment="freeradius-server-dialupadmin-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571606" comment="freeradius-server-doc-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571607" comment="freeradius-server-libs-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571608" comment="freeradius-server-utils-2.1.1-7.25.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218601" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180525" ref_url="https://bugzilla.suse.com/1180525" source="BUGZILLA"/>
		<description>
This update for freeradius-server fixes the following issues:

- Moved logrotate options into specific parts for each config as 'global' options
  will persist past and clobber global options in the main logrotate config (bsc#1180525)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180525">SUSE bug 1180525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571609" comment="freeradius-server-2.1.1-7.25.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571610" comment="freeradius-server-dialupadmin-2.1.1-7.25.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571611" comment="freeradius-server-doc-2.1.1-7.25.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571612" comment="freeradius-server-libs-2.1.1-7.25.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571613" comment="freeradius-server-utils-2.1.1-7.25.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218602" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1206205" ref_url="https://bugzilla.suse.com/1206205" source="BUGZILLA"/>
		<reference ref_id="1206206" ref_url="https://bugzilla.suse.com/1206206" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41860" ref_url="https://www.suse.com/security/cve/CVE-2022-41860/" source="CVE"/>
		<reference ref_id="CVE-2022-41861" ref_url="https://www.suse.com/security/cve/CVE-2022-41861/" source="CVE"/>
		<description>
This update for freeradius-server fixes the following issues:

- CVE-2022-41860: Fixed a crash in servers with EAP_SIM manually
  configured, which could be triggered via a malformed SIM option
  (bsc#1206205).
- CVE-2022-41861: Fixed a server crash that could be triggered by
  sending malformed data from a system in the RADIUS circle of trust
  (bsc#1206206).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-26"/>
	<updated date="2023-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206205">SUSE bug 1206205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206206">SUSE bug 1206206</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41860/">CVE-2022-41860 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41860">CVE-2022-41860 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41861/">CVE-2022-41861 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41861">CVE-2022-41861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992759" comment="freeradius-server-2.1.1-7.25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992760" comment="freeradius-server-dialupadmin-2.1.1-7.25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992761" comment="freeradius-server-doc-2.1.1-7.25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992762" comment="freeradius-server-libs-2.1.1-7.25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992763" comment="freeradius-server-utils-2.1.1-7.25.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218603" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="945849" ref_url="https://bugzilla.suse.com/945849" source="BUGZILLA"/>
		<reference ref_id="947966" ref_url="https://bugzilla.suse.com/947966" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9745" ref_url="https://www.suse.com/security/cve/CVE-2014-9745/" source="CVE"/>
		<reference ref_id="CVE-2014-9747" ref_url="https://www.suse.com/security/cve/CVE-2014-9747/" source="CVE"/>
		<description>

This update of the freetype2 library fixes two security issues:

- An infinite loop in parse_encoding in t1load.c (CVE-2014-9745, bsc#945849)
- Use of uninitialized memory in ps_parser_load_field, t42_parse_font_matrix and t1_parse_font_matrix (CVE-2014-9747, bsc#947966)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-25"/>
	<updated date="2016-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/945849">SUSE bug 945849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947966">SUSE bug 947966</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9745/">CVE-2014-9745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9745">CVE-2014-9745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9747/">CVE-2014-9747 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9747">CVE-2014-9747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571618" comment="freetype2-2.3.7-25.41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571619" comment="freetype2-32bit-2.3.7-25.41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571620" comment="ft2demos-2.3.7-25.41.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218604" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1028103" ref_url="https://bugzilla.suse.com/1028103" source="BUGZILLA"/>
		<reference ref_id="1035807" ref_url="https://bugzilla.suse.com/1035807" source="BUGZILLA"/>
		<reference ref_id="1036457" ref_url="https://bugzilla.suse.com/1036457" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10244" ref_url="https://www.suse.com/security/cve/CVE-2016-10244/" source="CVE"/>
		<reference ref_id="CVE-2017-8105" ref_url="https://www.suse.com/security/cve/CVE-2017-8105/" source="CVE"/>
		<reference ref_id="CVE-2017-8287" ref_url="https://www.suse.com/security/cve/CVE-2017-8287/" source="CVE"/>
		<description>

This update for freetype2 fixes the following issues:

Security issue fixed:
- CVE-2016-10244: The parse_charstrings function in type1/t1load.c did not
  ensure that a font contains a glyph name, which allowed remote attackers
  to cause a denial of service (heap-based buffer over-read) or possibly
  have unspecified other impact via a crafted file (bsc#1028103).

- CVE-2017-8105: Fixed an out-of-bounds write caused by a heap-based
  buffer overflow related to the t1_decoder_parse_charstrings function in
  psaux/t1decode.ca (bsc#1035807)
- CVE-2017-8287: an out-of-bounds write caused by a heap-based buffer
  overflow related to the t1_builder_close_contour function in psaux/psobjs.c
  (bsc#1036457)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1028103">SUSE bug 1028103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035807">SUSE bug 1035807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036457">SUSE bug 1036457</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10244/">CVE-2016-10244 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10244">CVE-2016-10244 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8105/">CVE-2017-8105 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8105">CVE-2017-8105 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8287/">CVE-2017-8287 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8287">CVE-2017-8287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571621" comment="freetype2-2.3.7-25.45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571622" comment="freetype2-32bit-2.3.7-25.45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571623" comment="ft2demos-2.3.7-25.45.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218605" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1034191" ref_url="https://bugzilla.suse.com/1034191" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10328" ref_url="https://www.suse.com/security/cve/CVE-2016-10328/" source="CVE"/>
		<description>
This update for freetype2 fixes the following issues:

Security issue fixed:

- CVE-2016-10328: Fixed heap-based buffer overflow in cff_parser_run function in cff/cffparse.c (bsc#1034191).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-29"/>
	<updated date="2018-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034191">SUSE bug 1034191</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10328/">CVE-2016-10328 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10328">CVE-2016-10328 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571624" comment="freetype2-2.3.7-25.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571625" comment="freetype2-32bit-2.3.7-25.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571626" comment="ft2demos-2.3.7-25.45.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218606" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1035807" ref_url="https://bugzilla.suse.com/1035807" source="BUGZILLA"/>
		<reference ref_id="1036457" ref_url="https://bugzilla.suse.com/1036457" source="BUGZILLA"/>
		<reference ref_id="1149384" ref_url="https://bugzilla.suse.com/1149384" source="BUGZILLA"/>
		<reference ref_id="1149395" ref_url="https://bugzilla.suse.com/1149395" source="BUGZILLA"/>
		<reference ref_id="1149397" ref_url="https://bugzilla.suse.com/1149397" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9381" ref_url="https://www.suse.com/security/cve/CVE-2015-9381/" source="CVE"/>
		<reference ref_id="CVE-2015-9382" ref_url="https://www.suse.com/security/cve/CVE-2015-9382/" source="CVE"/>
		<reference ref_id="CVE-2015-9383" ref_url="https://www.suse.com/security/cve/CVE-2015-9383/" source="CVE"/>
		<reference ref_id="CVE-2017-8105" ref_url="https://www.suse.com/security/cve/CVE-2017-8105/" source="CVE"/>
		<reference ref_id="CVE-2017-8287" ref_url="https://www.suse.com/security/cve/CVE-2017-8287/" source="CVE"/>
		<description>
This update for freetype2 fixes the following issues:

- CVE-2015-9381, CVE-2015-9382, CVE-2015-9383: Fixed various invalid memory accesses
  when opening a crafted font (bsc#1149384 bsc#1149395 bsc#1149397).
- CVE-2017-8105, CVE-2017-8287: Fixed various invalid memory writes in the type
  1 glyph loader (bsc#1035807 bsc#1036457).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-12"/>
	<updated date="2022-05-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1035807">SUSE bug 1035807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036457">SUSE bug 1036457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149384">SUSE bug 1149384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149395">SUSE bug 1149395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149397">SUSE bug 1149397</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-9381/">CVE-2015-9381 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9381">CVE-2015-9381 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-9382/">CVE-2015-9382 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9382">CVE-2015-9382 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-9383/">CVE-2015-9383 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9383">CVE-2015-9383 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8105/">CVE-2017-8105 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8105">CVE-2017-8105 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8287/">CVE-2017-8287 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8287">CVE-2017-8287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679676" comment="freetype2-2.3.7-25.45.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679677" comment="freetype2-32bit-2.3.7-25.45.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679678" comment="ft2demos-2.3.7-25.45.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218607" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="916856" ref_url="https://bugzilla.suse.com/916856" source="BUGZILLA"/>
		<reference ref_id="916857" ref_url="https://bugzilla.suse.com/916857" source="BUGZILLA"/>
		<reference ref_id="916858" ref_url="https://bugzilla.suse.com/916858" source="BUGZILLA"/>
		<reference ref_id="916859" ref_url="https://bugzilla.suse.com/916859" source="BUGZILLA"/>
		<reference ref_id="916861" ref_url="https://bugzilla.suse.com/916861" source="BUGZILLA"/>
		<reference ref_id="916863" ref_url="https://bugzilla.suse.com/916863" source="BUGZILLA"/>
		<reference ref_id="916864" ref_url="https://bugzilla.suse.com/916864" source="BUGZILLA"/>
		<reference ref_id="916865" ref_url="https://bugzilla.suse.com/916865" source="BUGZILLA"/>
		<reference ref_id="916870" ref_url="https://bugzilla.suse.com/916870" source="BUGZILLA"/>
		<reference ref_id="916871" ref_url="https://bugzilla.suse.com/916871" source="BUGZILLA"/>
		<reference ref_id="916872" ref_url="https://bugzilla.suse.com/916872" source="BUGZILLA"/>
		<reference ref_id="916873" ref_url="https://bugzilla.suse.com/916873" source="BUGZILLA"/>
		<reference ref_id="916874" ref_url="https://bugzilla.suse.com/916874" source="BUGZILLA"/>
		<reference ref_id="916879" ref_url="https://bugzilla.suse.com/916879" source="BUGZILLA"/>
		<reference ref_id="916881" ref_url="https://bugzilla.suse.com/916881" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<description>

The font rendering library freetype2 has been updated to fix various 
security issues.

Security Issues:

    * CVE-2014-9656
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656&gt;
    * CVE-2014-9657
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657&gt;
    * CVE-2014-9658
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658&gt;
    * CVE-2014-9660
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660&gt;
    * CVE-2014-9661
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661&gt;
    * CVE-2014-9662
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662&gt;
    * CVE-2014-9667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667&gt;
    * CVE-2014-9666
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666&gt;
    * CVE-2014-9665
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665&gt;
    * CVE-2014-9664
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664&gt;
    * CVE-2014-9663
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663&gt;
    * CVE-2014-9659
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659&gt;
    * CVE-2014-9668
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668&gt;
    * CVE-2014-9669
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669&gt;
    * CVE-2014-9670
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670&gt;
    * CVE-2014-9671
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671&gt;
    * CVE-2014-9672
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672&gt;
    * CVE-2014-9673
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673&gt;
    * CVE-2014-9674
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674&gt;
    * CVE-2014-9675
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-02"/>
	<updated date="2015-03-02"/>
	<bugzilla href="https://bugzilla.suse.com/916856">SUSE bug 916856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916857">SUSE bug 916857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916858">SUSE bug 916858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916859">SUSE bug 916859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916861">SUSE bug 916861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916863">SUSE bug 916863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916864">SUSE bug 916864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916865">SUSE bug 916865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916870">SUSE bug 916870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916871">SUSE bug 916871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916872">SUSE bug 916872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916873">SUSE bug 916873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916874">SUSE bug 916874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916879">SUSE bug 916879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916881">SUSE bug 916881</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9656">CVE-2014-9656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9657">CVE-2014-9657 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9658">CVE-2014-9658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9659">CVE-2014-9659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9660">CVE-2014-9660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9661">CVE-2014-9661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9662">CVE-2014-9662 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9663">CVE-2014-9663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9664">CVE-2014-9664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9665">CVE-2014-9665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9666">CVE-2014-9666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9667">CVE-2014-9667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9668">CVE-2014-9668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9669">CVE-2014-9669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9670">CVE-2014-9670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9671">CVE-2014-9671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9672">CVE-2014-9672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9673">CVE-2014-9673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9674">CVE-2014-9674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9675">CVE-2014-9675 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577813" comment="freetype2-2.3.7-25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577814" comment="freetype2-32bit-2.3.7-25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577815" comment="freetype2-x86-2.3.7-25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577816" comment="ft2demos-2.3.7-25.34.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577813" comment="freetype2-2.3.7-25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577814" comment="freetype2-32bit-2.3.7-25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577815" comment="freetype2-x86-2.3.7-25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577816" comment="ft2demos-2.3.7-25.34.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577813" comment="freetype2-2.3.7-25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577814" comment="freetype2-32bit-2.3.7-25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577815" comment="freetype2-x86-2.3.7-25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577816" comment="ft2demos-2.3.7-25.34.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218608" version="1" class="patch">
	<metadata>
		<title>Recommended update for freetype2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="930711" ref_url="https://bugzilla.suse.com/930711" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="SUSE-RU-2015:1021-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-June/003078.html" source="SUSE-SU"/>
		<description>

This update for freetype2 adjusts the patch that fixed CVE-2014-9671 for 
better backwards compatibility.

As the PCF format doesn't have an official specification, we have to 
exactly follow X11's pcfWriteFont and pcfReadFont functions' behavior.

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-09"/>
	<updated date="2015-06-09"/>
	<bugzilla href="https://bugzilla.suse.com/930711">SUSE bug 930711</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9671">CVE-2014-9671 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009593599" comment="freetype2-2.3.7-25.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593600" comment="freetype2-32bit-2.3.7-25.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593601" comment="freetype2-x86-2.3.7-25.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593602" comment="ft2demos-2.3.7-25.35.36.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009593599" comment="freetype2-2.3.7-25.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593600" comment="freetype2-32bit-2.3.7-25.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593601" comment="freetype2-x86-2.3.7-25.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593602" comment="ft2demos-2.3.7-25.35.36.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009593599" comment="freetype2-2.3.7-25.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593600" comment="freetype2-32bit-2.3.7-25.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593601" comment="freetype2-x86-2.3.7-25.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593602" comment="ft2demos-2.3.7-25.35.36.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218609" version="1" class="patch">
	<metadata>
		<title>Security update for fribidi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196147" ref_url="https://bugzilla.suse.com/1196147" source="BUGZILLA"/>
		<reference ref_id="1196148" ref_url="https://bugzilla.suse.com/1196148" source="BUGZILLA"/>
		<reference ref_id="1196150" ref_url="https://bugzilla.suse.com/1196150" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25308" ref_url="https://www.suse.com/security/cve/CVE-2022-25308/" source="CVE"/>
		<reference ref_id="CVE-2022-25309" ref_url="https://www.suse.com/security/cve/CVE-2022-25309/" source="CVE"/>
		<reference ref_id="CVE-2022-25310" ref_url="https://www.suse.com/security/cve/CVE-2022-25310/" source="CVE"/>
		<description>
This update for fribidi fixes the following issues:

- CVE-2022-25308: Fixed stack out of bounds read (bsc#1196147).
- CVE-2022-25309: Fixed heap-buffer-overflow in fribidi_cap_rtl_to_unicode (bsc#1196148).
- CVE-2022-25310: Fixed NULL pointer dereference in fribidi_remove_bidi_marks (bsc#1196150).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-13"/>
	<updated date="2022-06-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196147">SUSE bug 1196147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196148">SUSE bug 1196148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196150">SUSE bug 1196150</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25308/">CVE-2022-25308 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25308">CVE-2022-25308 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-25309/">CVE-2022-25309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25309">CVE-2022-25309 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25310/">CVE-2022-25310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25310">CVE-2022-25310 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992764" comment="fribidi-0.10.9-59.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992765" comment="fribidi-32bit-0.10.9-59.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218610" version="1" class="patch">
	<metadata>
		<title>Security update for FUSE</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="931452" ref_url="https://bugzilla.suse.com/931452" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3202" ref_url="https://www.suse.com/security/cve/CVE-2015-3202/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001429.html" source="SUSE-SU"/>
		<description>

This update for FUSE fixes the following security issue:

    * CVE-2015-3202: FUSE did not clear the environment upon execution of
      external programs.

Security Issues:

    * CVE-2015-3202
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3202&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-20"/>
	<updated date="2015-05-20"/>
	<bugzilla href="https://bugzilla.suse.com/931452">SUSE bug 931452</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3202/">CVE-2015-3202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3202">CVE-2015-3202 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577817" comment="fuse-2.8.7-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577818" comment="libfuse2-2.8.7-0.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577817" comment="fuse-2.8.7-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577818" comment="libfuse2-2.8.7-0.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577817" comment="fuse-2.8.7-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577818" comment="libfuse2-2.8.7-0.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218611" version="1" class="patch">
	<metadata>
		<title>Security update for fuse (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1101797" ref_url="https://bugzilla.suse.com/1101797" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10906" ref_url="https://www.suse.com/security/cve/CVE-2018-10906/" source="CVE"/>
		<description>
This update for fuse fixes the following issues:

Security issue fixed:

- CVE-2018-10906: Fix a bypass of the user_allow_other restriction (bsc#1101797)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-08"/>
	<updated date="2019-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101797">SUSE bug 1101797</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10906/">CVE-2018-10906 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10906">CVE-2018-10906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577819" comment="fuse-2.8.7-0.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577820" comment="libfuse2-2.8.7-0.11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218612" version="1" class="patch">
	<metadata>
		<title>Security update for gcc43 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1039513" ref_url="https://bugzilla.suse.com/1039513" source="BUGZILLA"/>
		<reference ref_id="1044016" ref_url="https://bugzilla.suse.com/1044016" source="BUGZILLA"/>
		<reference ref_id="1045091" ref_url="https://bugzilla.suse.com/1045091" source="BUGZILLA"/>
		<reference ref_id="1059075" ref_url="https://bugzilla.suse.com/1059075" source="BUGZILLA"/>
		<reference ref_id="1074621" ref_url="https://bugzilla.suse.com/1074621" source="BUGZILLA"/>
		<reference ref_id="938159" ref_url="https://bugzilla.suse.com/938159" source="BUGZILLA"/>
		<reference ref_id="977654" ref_url="https://bugzilla.suse.com/977654" source="BUGZILLA"/>
		<reference ref_id="999596" ref_url="https://bugzilla.suse.com/999596" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000376" ref_url="https://www.suse.com/security/cve/CVE-2017-1000376/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0300-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007862.html" source="SUSE-SU"/>
		<description>

  
This update for gcc43 fixes the following issues:

Security issue fixed:

- CVE-2017-1000376: Don't request excutable stack from libffi.  [bnc#1045091]

New features:

- Add support for retpolines to mitigate the Spectre Variant 2 attack. [bnc#1074621]
- Add support for zero-sized VLAs and allocas with -fstack-clash-protection.  [bnc#1059075]
- Add support for -fstack-clash-protection to mitigate the Stack Clash attack.  [bnc#1039513]

Non security bugs fixed:

- Fixed build of 32bit libgcov.a with LFS support.  [bsc#1044016]
- Fixed issue with libstdc++ functional when an exception is thrown during construction.  [bsc#999596]
- Fixed issue with using gcov and #pragma pack.  [bsc#977654]
- Fixed ICE compiling AFS modules for the s390x kernel.  [bsc#938159]
- Backport large file support from GCC 4.6.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1039513">SUSE bug 1039513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044016">SUSE bug 1044016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045091">SUSE bug 1045091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059075">SUSE bug 1059075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074621">SUSE bug 1074621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938159">SUSE bug 938159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977654">SUSE bug 977654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999596">SUSE bug 999596</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000376/">CVE-2017-1000376 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000376">CVE-2017-1000376 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577821" comment="cpp43-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577822" comment="gcc43-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577823" comment="gcc43-32bit-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577824" comment="gcc43-c++-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577825" comment="gcc43-fortran-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577826" comment="gcc43-fortran-32bit-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577827" comment="gcc43-info-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577828" comment="gcc43-locale-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577829" comment="libstdc++43-devel-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577830" comment="libstdc++43-devel-32bit-4.3.4_20091019-37.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577821" comment="cpp43-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577822" comment="gcc43-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577823" comment="gcc43-32bit-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577824" comment="gcc43-c++-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577825" comment="gcc43-fortran-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577826" comment="gcc43-fortran-32bit-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577827" comment="gcc43-info-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577828" comment="gcc43-locale-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577829" comment="libstdc++43-devel-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577830" comment="libstdc++43-devel-32bit-4.3.4_20091019-37.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218613" version="1" class="patch">
	<metadata>
		<title>Security update for gcc43 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1086069" ref_url="https://bugzilla.suse.com/1086069" source="BUGZILLA"/>
		<reference ref_id="1092807" ref_url="https://bugzilla.suse.com/1092807" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004112.html" source="SUSE-SU"/>
		<description>
This update for gcc43 fixes the following issues:

This update adds support for 'expolines' on s390x, allowing fixing CVE-2017-5715 in a more lightweight fashion. (bsc#1086069)

The option flags are the same as for the x86 retpolines.

A compiler crash when building userland packages with x86 retpolines was fixed. (bsc#1092807)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-05"/>
	<updated date="2018-06-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086069">SUSE bug 1086069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092807">SUSE bug 1092807</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577831" comment="cpp43-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577832" comment="gcc43-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577833" comment="gcc43-32bit-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577834" comment="gcc43-c++-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577835" comment="gcc43-fortran-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577836" comment="gcc43-fortran-32bit-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577837" comment="gcc43-info-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577838" comment="gcc43-locale-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577839" comment="libstdc++43-devel-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577840" comment="libstdc++43-devel-32bit-4.3.4_20091019-37.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577831" comment="cpp43-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577832" comment="gcc43-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577833" comment="gcc43-32bit-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577834" comment="gcc43-c++-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577835" comment="gcc43-fortran-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577836" comment="gcc43-fortran-32bit-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577837" comment="gcc43-info-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577838" comment="gcc43-locale-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577839" comment="libstdc++43-devel-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577840" comment="libstdc++43-devel-32bit-4.3.4_20091019-37.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218614" version="1" class="patch">
	<metadata>
		<title>Security update for gcc48 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1011348" ref_url="https://bugzilla.suse.com/1011348" source="BUGZILLA"/>
		<reference ref_id="1022062" ref_url="https://bugzilla.suse.com/1022062" source="BUGZILLA"/>
		<reference ref_id="1028744" ref_url="https://bugzilla.suse.com/1028744" source="BUGZILLA"/>
		<reference ref_id="1039513" ref_url="https://bugzilla.suse.com/1039513" source="BUGZILLA"/>
		<reference ref_id="1044016" ref_url="https://bugzilla.suse.com/1044016" source="BUGZILLA"/>
		<reference ref_id="1050947" ref_url="https://bugzilla.suse.com/1050947" source="BUGZILLA"/>
		<reference ref_id="878067" ref_url="https://bugzilla.suse.com/878067" source="BUGZILLA"/>
		<reference ref_id="889990" ref_url="https://bugzilla.suse.com/889990" source="BUGZILLA"/>
		<reference ref_id="899871" ref_url="https://bugzilla.suse.com/899871" source="BUGZILLA"/>
		<reference ref_id="917169" ref_url="https://bugzilla.suse.com/917169" source="BUGZILLA"/>
		<reference ref_id="919274" ref_url="https://bugzilla.suse.com/919274" source="BUGZILLA"/>
		<reference ref_id="922534" ref_url="https://bugzilla.suse.com/922534" source="BUGZILLA"/>
		<reference ref_id="924525" ref_url="https://bugzilla.suse.com/924525" source="BUGZILLA"/>
		<reference ref_id="924687" ref_url="https://bugzilla.suse.com/924687" source="BUGZILLA"/>
		<reference ref_id="927993" ref_url="https://bugzilla.suse.com/927993" source="BUGZILLA"/>
		<reference ref_id="930176" ref_url="https://bugzilla.suse.com/930176" source="BUGZILLA"/>
		<reference ref_id="934689" ref_url="https://bugzilla.suse.com/934689" source="BUGZILLA"/>
		<reference ref_id="945842" ref_url="https://bugzilla.suse.com/945842" source="BUGZILLA"/>
		<reference ref_id="947772" ref_url="https://bugzilla.suse.com/947772" source="BUGZILLA"/>
		<reference ref_id="947791" ref_url="https://bugzilla.suse.com/947791" source="BUGZILLA"/>
		<reference ref_id="948168" ref_url="https://bugzilla.suse.com/948168" source="BUGZILLA"/>
		<reference ref_id="949000" ref_url="https://bugzilla.suse.com/949000" source="BUGZILLA"/>
		<reference ref_id="951644" ref_url="https://bugzilla.suse.com/951644" source="BUGZILLA"/>
		<reference ref_id="955382" ref_url="https://bugzilla.suse.com/955382" source="BUGZILLA"/>
		<reference ref_id="970009" ref_url="https://bugzilla.suse.com/970009" source="BUGZILLA"/>
		<reference ref_id="976627" ref_url="https://bugzilla.suse.com/976627" source="BUGZILLA"/>
		<reference ref_id="977654" ref_url="https://bugzilla.suse.com/977654" source="BUGZILLA"/>
		<reference ref_id="981311" ref_url="https://bugzilla.suse.com/981311" source="BUGZILLA"/>
		<reference ref_id="988274" ref_url="https://bugzilla.suse.com/988274" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5044" ref_url="https://www.suse.com/security/cve/CVE-2014-5044/" source="CVE"/>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<reference ref_id="CVE-2017-11671" ref_url="https://www.suse.com/security/cve/CVE-2017-11671/" source="CVE"/>
		<description>
This update for gcc48 fixes the following issues:

Security issues fixed:

- A new option -fstack-clash-protection is now offered, which mitigates the stack clash type of attacks. [bnc#1039513]
- CVE-2017-11671: Fixed rdrand/rdseed code generation issue [bsc#1050947]

Bugs fixed:

- Enable LFS support in 32bit libgcov.a.  [bsc#1044016]
- Bump libffi version in libffi.pc to 3.0.11.
- Properly diagnose missing -fsanitize=address support on ppc64le.  [bsc#1028744]
- Backport patch for PR65612. [bsc#1022062]
- Re-spin to provide missing libasan0-32bit and other multilibs via the updated product description.  [bsc#951644]
- Fixed for DR#1288.  [bsc#1011348]
- Fix libffi issue for armv7l.  [bsc#988274]
- Fixed a kernel miscompile on aarch64.  [bnc #981311]
- Fixed a ppc64le internal compiler error. [bnc #976627]
- Fixed issue with using gcov and #pragma pack.  [bsc#977654]
- Fixed samba build on AARCH64.  [bsc#970009]
- Build without GRAPHITE where cloog-isl is not available.
- Fixed HTM builtins on powerpc.  [bsc#955382]
- Fixed build of SLOF.  [bsc#949000]
- Fixed C++11 std::random_device short reads, CVE-2015-5276.  [bsc#945842]
- Fixed libffi issues on aarch64.  [bsc#948168]
- Fixed no_instrument_function attribute handling on PPC64 with -mprofile-kernel.  [bsc#947791]
- Enable 32bit code generation for ppc64le but do not build 32bit
  target libraries.  Fixes ppc64le kernel compile.
- Update to GCC 4.8.5 release. 
  * Fixes bogus integer overflow in constant expression.  [bsc#934689]
  * Fixes ICE with atomics on aarch64.  [bsc#930176]
- Fixed reload issue on S390.
- Add patch to keep functions leaf when they are instrumented for
  profiling on s390[x].  [bsc#899871]
- Avoid accessing invalid memory when passing aggregates by value.  [bsc#922534]
- Build s390[x] with --with-tune=z9-109 --with-arch=z900 on SLE11
  again.  [bsc#927993]
- Update to gcc-4_8-branch head (r221715).
  * Includes GCC 4.8.4 release.
  * Includes fix for -imacros bug.  [bsc#917169]
  * Includes fix for incorrect -Warray-bounds warnings.  [bsc#919274]
  * Includes updated -mhotpatch for s390x.  [bsc#924525]
  * Includes fix for ppc64le issue with doubleword vector extract.
    [bsc#924687]
- Backport rework of the memory allocator for C++ exceptions used in OOM situations.  [bsc#889990]
- Remove invalid use of glibc internals in TSAN.
- Update to gcc-4_8-branch head (r218481).
  * Includes patches to allow building against ISL 0.14.
- Disable all languages but C, C++, Fortran and Ada.  [fate#316860]
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-06"/>
	<updated date="2017-09-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011348">SUSE bug 1011348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022062">SUSE bug 1022062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028744">SUSE bug 1028744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039513">SUSE bug 1039513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044016">SUSE bug 1044016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050947">SUSE bug 1050947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878067">SUSE bug 878067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889990">SUSE bug 889990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899871">SUSE bug 899871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917169">SUSE bug 917169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919274">SUSE bug 919274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922534">SUSE bug 922534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924525">SUSE bug 924525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924687">SUSE bug 924687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927993">SUSE bug 927993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930176">SUSE bug 930176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934689">SUSE bug 934689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945842">SUSE bug 945842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947772">SUSE bug 947772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947791">SUSE bug 947791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948168">SUSE bug 948168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949000">SUSE bug 949000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951644">SUSE bug 951644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955382">SUSE bug 955382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970009">SUSE bug 970009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976627">SUSE bug 976627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977654">SUSE bug 977654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981311">SUSE bug 981311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988274">SUSE bug 988274</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5044/">CVE-2014-5044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5044">CVE-2014-5044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5276">CVE-2015-5276 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-11671/">CVE-2017-11671 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11671">CVE-2017-11671 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571653" comment="cpp48-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571654" comment="gcc48-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571655" comment="gcc48-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571656" comment="gcc48-c++-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571657" comment="gcc48-fortran-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571658" comment="gcc48-fortran-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571659" comment="gcc48-info-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571660" comment="gcc48-locale-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571661" comment="libasan0-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571662" comment="libasan0-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571663" comment="libatomic1-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571664" comment="libatomic1-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571665" comment="libgcc_s1-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571666" comment="libgcc_s1-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571667" comment="libgfortran3-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571668" comment="libgfortran3-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571669" comment="libgomp1-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571670" comment="libgomp1-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571671" comment="libitm1-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571672" comment="libitm1-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571673" comment="libmpfr4-3.1.2-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571674" comment="libquadmath0-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571675" comment="libquadmath0-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571676" comment="libstdc++48-devel-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571677" comment="libstdc++48-devel-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571678" comment="libstdc++6-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571679" comment="libstdc++6-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571680" comment="libtsan0-4.8.5-5.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218615" version="1" class="patch">
	<metadata>
		<title>Security update for gcc48 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1082130" ref_url="https://bugzilla.suse.com/1082130" source="BUGZILLA"/>
		<reference ref_id="1083945" ref_url="https://bugzilla.suse.com/1083945" source="BUGZILLA"/>
		<reference ref_id="1087932" ref_url="https://bugzilla.suse.com/1087932" source="BUGZILLA"/>
		<reference ref_id="1093797" ref_url="https://bugzilla.suse.com/1093797" source="BUGZILLA"/>
		<reference ref_id="1131264" ref_url="https://bugzilla.suse.com/1131264" source="BUGZILLA"/>
		<reference ref_id="1142649" ref_url="https://bugzilla.suse.com/1142649" source="BUGZILLA"/>
		<reference ref_id="1161913" ref_url="https://bugzilla.suse.com/1161913" source="BUGZILLA"/>
		<reference ref_id="1177947" ref_url="https://bugzilla.suse.com/1177947" source="BUGZILLA"/>
		<reference ref_id="1178675" ref_url="https://bugzilla.suse.com/1178675" source="BUGZILLA"/>
		<reference ref_id="1185395" ref_url="https://bugzilla.suse.com/1185395" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<description>
This update for gcc48 fixes the following issues:

- CVE-2019-14250: Fixed an integer overflow that could lead to an invalid memory
  access (bsc#1142649).

Non-security fixes:
- Fixed an issue with manual page builds (bsc#1185395).
- Fixed an issue with static initializers (bsc#1177947).
- Fixed an issue with exception handling on s390x (bsc#1161913).
- Fixed a reload bug on aarch64 (bsc#1093797).
- Added a Spectre V2 mitigation for s390x (bsc#1083945).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082130">SUSE bug 1082130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083945">SUSE bug 1083945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087932">SUSE bug 1087932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093797">SUSE bug 1093797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131264">SUSE bug 1131264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142649">SUSE bug 1142649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161913">SUSE bug 1161913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177947">SUSE bug 1177947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178675">SUSE bug 1178675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185395">SUSE bug 1185395</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14250">CVE-2019-14250 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678381" comment="cpp48-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678382" comment="gcc48-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678383" comment="gcc48-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678384" comment="gcc48-c++-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678385" comment="gcc48-fortran-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678386" comment="gcc48-fortran-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678387" comment="gcc48-info-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678388" comment="gcc48-locale-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678389" comment="libasan0-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678390" comment="libasan0-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678391" comment="libatomic1-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678392" comment="libatomic1-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678393" comment="libgcc_s1-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678394" comment="libgcc_s1-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678395" comment="libgfortran3-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678396" comment="libgfortran3-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678397" comment="libgomp1-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678398" comment="libgomp1-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678399" comment="libitm1-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678400" comment="libitm1-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678401" comment="libquadmath0-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678402" comment="libquadmath0-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678403" comment="libstdc++48-devel-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678404" comment="libstdc++48-devel-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678405" comment="libstdc++6-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678406" comment="libstdc++6-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678407" comment="libtsan0-4.8.5-5.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218616" version="1" class="patch">
	<metadata>
		<title>Security update for gd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="923945" ref_url="https://bugzilla.suse.com/923945" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9709" ref_url="https://www.suse.com/security/cve/CVE-2014-9709/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001373.html" source="SUSE-SU"/>
		<description>

The graphics drawing library gd has been updated to fix one security issue:

    * possible buffer read overflow (CVE-2014-9709)

Security Issues:

    * CVE-2014-9709
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-24"/>
	<updated date="2015-03-24"/>
	<bugzilla href="https://bugzilla.suse.com/923945">SUSE bug 923945</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9709/">CVE-2014-9709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9709">CVE-2014-9709 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577841" comment="gd-2.0.36.RC1-52.20.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577841" comment="gd-2.0.36.RC1-52.20.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577841" comment="gd-2.0.36.RC1-52.20.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218617" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="988032" ref_url="https://bugzilla.suse.com/988032" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6161" ref_url="https://www.suse.com/security/cve/CVE-2016-6161/" source="CVE"/>
		<description>

This update for gd fixes the following issues:

- security update:
  * CVE-2016-6161: global out of bounds read when encoding gif from malformed input withgd2togif [bsc#988032]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-14"/>
	<updated date="2016-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/988032">SUSE bug 988032</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6161/">CVE-2016-6161 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6161">CVE-2016-6161 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571682" comment="gd-2.0.36.RC1-52.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218618" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1004924" ref_url="https://bugzilla.suse.com/1004924" source="BUGZILLA"/>
		<reference ref_id="1005274" ref_url="https://bugzilla.suse.com/1005274" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6911" ref_url="https://www.suse.com/security/cve/CVE-2016-6911/" source="CVE"/>
		<reference ref_id="CVE-2016-8670" ref_url="https://www.suse.com/security/cve/CVE-2016-8670/" source="CVE"/>
		<description>

This update for gd fixes the following issues:

- CVE-2016-8670: Stack Buffer Overflow in GD dynamicGetbuf (bsc#1004924)
- CVE-2016-6911: Check for out-of-bound read in dynamicGetbuf() (bsc#1005274)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-28"/>
	<updated date="2016-10-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1004924">SUSE bug 1004924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005274">SUSE bug 1005274</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6911/">CVE-2016-6911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6911">CVE-2016-6911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8670/">CVE-2016-8670 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8670">CVE-2016-8670 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571683" comment="gd-2.0.36.RC1-52.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218619" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1015187" ref_url="https://bugzilla.suse.com/1015187" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9933" ref_url="https://www.suse.com/security/cve/CVE-2016-9933/" source="CVE"/>
		<description>

This update for gd fixes the following issues:

  * CVE-2016-9933 possible stackoverflow on malicious truecolor images [bsc#1015187]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-22"/>
	<updated date="2016-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015187">SUSE bug 1015187</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9933/">CVE-2016-9933 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9933">CVE-2016-9933 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571684" comment="gd-2.0.36.RC1-52.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218620" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1022264" ref_url="https://bugzilla.suse.com/1022264" source="BUGZILLA"/>
		<reference ref_id="1022265" ref_url="https://bugzilla.suse.com/1022265" source="BUGZILLA"/>
		<reference ref_id="1022283" ref_url="https://bugzilla.suse.com/1022283" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167/" source="CVE"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-9317" ref_url="https://www.suse.com/security/cve/CVE-2016-9317/" source="CVE"/>
		<description>

This update for gd fixes the following security issues:

- CVE-2016-9317: The gdImageCreate function in the GD Graphics Library
  (aka libgd) allowed remote attackers to cause a denial of service
  (system hang) via an oversized image.  (bsc#1022283)
- CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx()
  could lead to libgd running out of memory even on small files. (bsc#1022264)
- CVE-2016-10168: A signed integer overflow in the GD Graphics Library (aka libgd) could lead
  to memory corruption (bsc#1022265)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-14"/>
	<updated date="2017-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022264">SUSE bug 1022264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022265">SUSE bug 1022265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022283">SUSE bug 1022283</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10167">CVE-2016-10167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10168">CVE-2016-10168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9317/">CVE-2016-9317 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9317">CVE-2016-9317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571685" comment="gd-2.0.36.RC1-52.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218621" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1025223" ref_url="https://bugzilla.suse.com/1025223" source="BUGZILLA"/>
		<reference ref_id="1076391" ref_url="https://bugzilla.suse.com/1076391" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5711" ref_url="https://www.suse.com/security/cve/CVE-2018-5711/" source="CVE"/>
		<description>
This update for gd fixes several issues.

This security issue was fixed:

- CVE-2018-5711: Prevent integer signedness error that could have lead to an
  infinite loop via a crafted GIF file allowing for DoS (bsc#1076391)

This non-security issue was fixed:

- Fixed gd2togif error message (bsc#1025223)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025223">SUSE bug 1025223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5711/">CVE-2018-5711 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5711">CVE-2018-5711 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571686" comment="gd-2.0.36.RC1-52.33.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218622" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1050241" ref_url="https://bugzilla.suse.com/1050241" source="BUGZILLA"/>
		<reference ref_id="1123522" ref_url="https://bugzilla.suse.com/1123522" source="BUGZILLA"/>
		<reference ref_id="1140120" ref_url="https://bugzilla.suse.com/1140120" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7890" ref_url="https://www.suse.com/security/cve/CVE-2017-7890/" source="CVE"/>
		<reference ref_id="CVE-2019-11038" ref_url="https://www.suse.com/security/cve/CVE-2019-11038/" source="CVE"/>
		<reference ref_id="CVE-2019-6978" ref_url="https://www.suse.com/security/cve/CVE-2019-6978/" source="CVE"/>
		<description>
This update for gd fixes the following issues:

Security vulnerability addressed:

- CVE-2017-7890: Fixed a buffer over-read into uninitialized memory (bsc#1050241).
- CVE-2019-6978: Fixed a double free in the GD graphics library (bsc#1123522).
- CVE-2019-11038: Fixed a information disclosure in gdImageCreateFromXbm() (bsc#1140120).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-09"/>
	<updated date="2020-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050241">SUSE bug 1050241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123522">SUSE bug 1123522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140120">SUSE bug 1140120</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7890/">CVE-2017-7890 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7890">CVE-2017-7890 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11038/">CVE-2019-11038 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11038">CVE-2019-11038 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6978/">CVE-2019-6978 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6978">CVE-2019-6978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571687" comment="gd-2.0.36.RC1-52.33.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218623" version="1" class="patch">
	<metadata>
		<title>Security update for gdb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1142772" ref_url="https://bugzilla.suse.com/1142772" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<description>
This update for gdb fixes the following issues:

Security issue fixed:

- CVE-2019-1010180: Fixed a buffer overflow and out of bound memory access that can lead to deny of service, memory disclosure, and possible code execution (bsc#1142772).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-27"/>
	<updated date="2019-08-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010180">CVE-2019-1010180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577842" comment="gdb-7.5.1-0.9.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218624" version="1" class="patch">
	<metadata>
		<title>Security update for gdb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1142772" ref_url="https://bugzilla.suse.com/1142772" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<description>
This update for gdb fixes the following issues:

- CVE-2019-1010180: Fixed a buffer overflow (bsc#1142772).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-06"/>
	<updated date="2019-11-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010180">CVE-2019-1010180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577843" comment="gdb-7.5.1-0.9.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218625" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1004237" ref_url="https://bugzilla.suse.com/1004237" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8602" ref_url="https://www.suse.com/security/cve/CVE-2016-8602/" source="CVE"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2016-8602: Insufficient parameter check in .sethalftone5 (bsc#1004237)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-04"/>
	<updated date="2016-11-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1004237">SUSE bug 1004237</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8602/">CVE-2016-8602 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8602">CVE-2016-8602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571688" comment="ghostscript-fonts-other-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571689" comment="ghostscript-fonts-rus-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571690" comment="ghostscript-fonts-std-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571691" comment="ghostscript-library-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571692" comment="ghostscript-omni-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571693" comment="ghostscript-x11-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571694" comment="libgimpprint-4.2.7-32.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218626" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1001951" ref_url="https://bugzilla.suse.com/1001951" source="BUGZILLA"/>
		<reference ref_id="939342" ref_url="https://bugzilla.suse.com/939342" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5653" ref_url="https://www.suse.com/security/cve/CVE-2013-5653/" source="CVE"/>
		<reference ref_id="CVE-2015-3228" ref_url="https://www.suse.com/security/cve/CVE-2015-3228/" source="CVE"/>
		<reference ref_id="CVE-2016-7977" ref_url="https://www.suse.com/security/cve/CVE-2016-7977/" source="CVE"/>
		<reference ref_id="CVE-2016-7979" ref_url="https://www.suse.com/security/cve/CVE-2016-7979/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002322.html" source="SUSE-SU"/>
		<description>

This update for ghostscript-library fixes the following issues:

- Multiple security vulnerabilities have been discovered where ghostscript's
  '-dsafer' flag did not provide sufficient protection against unintended
  access to the file system. Thus, a machine that would process a specially
  crafted Postscript file would potentially leak sensitive information to an
  attacker. (CVE-2013-5653, CVE-2016-7977, bsc#1001951)

- Insufficient validation of the type of input in .initialize_dsc_parser used
  to allow remote code execution. (CVE-2016-7979, bsc#1001951)

- An integer overflow in the gs_heap_alloc_bytes function used to allow remote
  attackers to cause a denial of service (crash) via specially  crafted
  Postscript files. (CVE-2015-3228, boo#939342)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-11"/>
	<updated date="2016-10-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1001951">SUSE bug 1001951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939342">SUSE bug 939342</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5653/">CVE-2013-5653 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5653">CVE-2013-5653 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3228/">CVE-2015-3228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3228">CVE-2015-3228 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7977/">CVE-2016-7977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7977">CVE-2016-7977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7979/">CVE-2016-7979 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7979">CVE-2016-7979 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576164" comment="ghostscript-fonts-other-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576165" comment="ghostscript-fonts-rus-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576166" comment="ghostscript-fonts-std-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576167" comment="ghostscript-library-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576168" comment="ghostscript-omni-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576169" comment="ghostscript-x11-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576170" comment="libgimpprint-4.2.7-32.38.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576164" comment="ghostscript-fonts-other-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576165" comment="ghostscript-fonts-rus-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576166" comment="ghostscript-fonts-std-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576167" comment="ghostscript-library-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576168" comment="ghostscript-omni-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576169" comment="ghostscript-x11-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576170" comment="libgimpprint-4.2.7-32.38.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218627" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1036453" ref_url="https://bugzilla.suse.com/1036453" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291/" source="CVE"/>
		<description>

This update for ghostscript fixes the following security vulnerability:

CVE-2017-8291: A remote command execution and a -dSAFER bypass via a crafted .eps document were
exploited in the wild. (bsc#1036453)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-03"/>
	<updated date="2017-05-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8291">CVE-2017-8291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571702" comment="ghostscript-fonts-other-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571703" comment="ghostscript-fonts-rus-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571704" comment="ghostscript-fonts-std-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571705" comment="ghostscript-library-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571706" comment="ghostscript-omni-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571707" comment="ghostscript-x11-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571708" comment="libgimpprint-4.2.7-32.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218628" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1036453" ref_url="https://bugzilla.suse.com/1036453" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002892.html" source="SUSE-SU"/>
		<description>

This update for ghostscript fixes the following security vulnerability:

CVE-2017-8291: A remote command execution and a -dSAFER bypass via a crafted .eps document were
exploited in the wild. (bsc#1036453)

This update is a reissue including the SUSE Linux Enterprise 11 SP3 product.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-17"/>
	<updated date="2017-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8291">CVE-2017-8291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577844" comment="ghostscript-fonts-other-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577845" comment="ghostscript-fonts-rus-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577846" comment="ghostscript-fonts-std-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577847" comment="ghostscript-library-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577848" comment="ghostscript-omni-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577849" comment="ghostscript-x11-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577850" comment="libgimpprint-4.2.7-32.46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577844" comment="ghostscript-fonts-other-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577845" comment="ghostscript-fonts-rus-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577846" comment="ghostscript-fonts-std-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577847" comment="ghostscript-library-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577848" comment="ghostscript-omni-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577849" comment="ghostscript-x11-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577850" comment="libgimpprint-4.2.7-32.46.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218629" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1018128" ref_url="https://bugzilla.suse.com/1018128" source="BUGZILLA"/>
		<reference ref_id="1030263" ref_url="https://bugzilla.suse.com/1030263" source="BUGZILLA"/>
		<reference ref_id="1032138" ref_url="https://bugzilla.suse.com/1032138" source="BUGZILLA"/>
		<reference ref_id="1032230" ref_url="https://bugzilla.suse.com/1032230" source="BUGZILLA"/>
		<reference ref_id="1040643" ref_url="https://bugzilla.suse.com/1040643" source="BUGZILLA"/>
		<reference ref_id="1050879" ref_url="https://bugzilla.suse.com/1050879" source="BUGZILLA"/>
		<reference ref_id="1050887" ref_url="https://bugzilla.suse.com/1050887" source="BUGZILLA"/>
		<reference ref_id="1050888" ref_url="https://bugzilla.suse.com/1050888" source="BUGZILLA"/>
		<reference ref_id="1050889" ref_url="https://bugzilla.suse.com/1050889" source="BUGZILLA"/>
		<reference ref_id="1050891" ref_url="https://bugzilla.suse.com/1050891" source="BUGZILLA"/>
		<reference ref_id="1051184" ref_url="https://bugzilla.suse.com/1051184" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10219" ref_url="https://www.suse.com/security/cve/CVE-2016-10219/" source="CVE"/>
		<reference ref_id="CVE-2016-9601" ref_url="https://www.suse.com/security/cve/CVE-2016-9601/" source="CVE"/>
		<reference ref_id="CVE-2017-11714" ref_url="https://www.suse.com/security/cve/CVE-2017-11714/" source="CVE"/>
		<reference ref_id="CVE-2017-7207" ref_url="https://www.suse.com/security/cve/CVE-2017-7207/" source="CVE"/>
		<reference ref_id="CVE-2017-9216" ref_url="https://www.suse.com/security/cve/CVE-2017-9216/" source="CVE"/>
		<reference ref_id="CVE-2017-9612" ref_url="https://www.suse.com/security/cve/CVE-2017-9612/" source="CVE"/>
		<reference ref_id="CVE-2017-9726" ref_url="https://www.suse.com/security/cve/CVE-2017-9726/" source="CVE"/>
		<reference ref_id="CVE-2017-9727" ref_url="https://www.suse.com/security/cve/CVE-2017-9727/" source="CVE"/>
		<reference ref_id="CVE-2017-9739" ref_url="https://www.suse.com/security/cve/CVE-2017-9739/" source="CVE"/>
		<reference ref_id="CVE-2017-9835" ref_url="https://www.suse.com/security/cve/CVE-2017-9835/" source="CVE"/>
		<description>
This update for ghostscript-library fixes several issues.
 
These security issues were fixed:

- CVE-2017-7207: The mem_get_bits_rectangle function allowed remote attackers
  to cause a denial of service (NULL pointer dereference) via a crafted
  PostScript document (bsc#1030263).
- CVE-2016-9601: Prevent heap-buffer overflow by checking for an integer
  overflow in jbig2_image_new function (bsc#1018128).
- CVE-2017-9612: The Ins_IP function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (use-after-free and application crash)
  or possibly have unspecified other impact via a crafted document (bsc#1050891)
- CVE-2017-9726: The Ins_MDRP function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050889)
- CVE-2017-9727: The gx_ttfReader__Read function in base/gxttfb.c allowed
  remote attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050888)
- CVE-2017-9739: The Ins_JMPR function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050887)
- CVE-2017-11714: psi/ztoken.c mishandled references to the scanner state
  structure, which allowed remote attackers to cause a denial of service
  (application crash) or possibly have unspecified other impact via a crafted
  PostScript document, related to an out-of-bounds read in the
  igc_reloc_struct_ptr function in psi/igc.c (bsc#1051184)
- CVE-2017-9835: The gs_alloc_ref_array function allowed remote attackers to
  cause a denial of service (heap-based buffer overflow and application crash) or
  possibly have unspecified other impact via a crafted PostScript document
  (bsc#1050879)
- CVE-2016-10219: The intersect function in base/gxfill.c allowed remote
  attackers to cause a denial of service (divide-by-zero error and application
  crash) via a crafted file (bsc#1032138)
- CVE-2017-9216: Prevent NULL pointer dereference in the jbig2_huffman_get
  function in jbig2_huffman.c which allowed for DoS (bsc#1040643)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-03"/>
	<updated date="2018-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1018128">SUSE bug 1018128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030263">SUSE bug 1030263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032138">SUSE bug 1032138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032230">SUSE bug 1032230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040643">SUSE bug 1040643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050879">SUSE bug 1050879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050887">SUSE bug 1050887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050888">SUSE bug 1050888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050889">SUSE bug 1050889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050891">SUSE bug 1050891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051184">SUSE bug 1051184</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10219/">CVE-2016-10219 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10219">CVE-2016-10219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9601/">CVE-2016-9601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9601">CVE-2016-9601 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11714/">CVE-2017-11714 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11714">CVE-2017-11714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7207/">CVE-2017-7207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7207">CVE-2017-7207 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9216/">CVE-2017-9216 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9216">CVE-2017-9216 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9612/">CVE-2017-9612 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9612">CVE-2017-9612 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9726/">CVE-2017-9726 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9726">CVE-2017-9726 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9727/">CVE-2017-9727 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9727">CVE-2017-9727 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9739/">CVE-2017-9739 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9739">CVE-2017-9739 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9835/">CVE-2017-9835 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9835">CVE-2017-9835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571716" comment="ghostscript-fonts-other-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571717" comment="ghostscript-fonts-rus-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571718" comment="ghostscript-fonts-std-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571719" comment="ghostscript-library-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571720" comment="ghostscript-omni-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571721" comment="ghostscript-x11-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571722" comment="libgimpprint-4.2.7-32.47.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218630" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1090099" ref_url="https://bugzilla.suse.com/1090099" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9601" ref_url="https://www.suse.com/security/cve/CVE-2016-9601/" source="CVE"/>
		<reference ref_id="CVE-2018-10194" ref_url="https://www.suse.com/security/cve/CVE-2018-10194/" source="CVE"/>
		<description>
This update for ghostscript-library fixes the following issues:

- CVE-2018-10194: Fixed a stack-based buffer overflow in gdevpdts.c (bsc#1090099)
- Fixed a crash in the fix for CVE-2016-9601.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1090099">SUSE bug 1090099</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9601/">CVE-2016-9601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9601">CVE-2016-9601 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10194/">CVE-2018-10194 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10194">CVE-2018-10194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571723" comment="ghostscript-fonts-other-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571724" comment="ghostscript-fonts-rus-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571725" comment="ghostscript-fonts-std-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571726" comment="ghostscript-library-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571727" comment="ghostscript-omni-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571728" comment="ghostscript-x11-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571729" comment="libgimpprint-4.2.7-32.47.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218631" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1050893" ref_url="https://bugzilla.suse.com/1050893" source="BUGZILLA"/>
		<reference ref_id="1106173" ref_url="https://bugzilla.suse.com/1106173" source="BUGZILLA"/>
		<reference ref_id="1107410" ref_url="https://bugzilla.suse.com/1107410" source="BUGZILLA"/>
		<reference ref_id="1107412" ref_url="https://bugzilla.suse.com/1107412" source="BUGZILLA"/>
		<reference ref_id="1107413" ref_url="https://bugzilla.suse.com/1107413" source="BUGZILLA"/>
		<reference ref_id="1107420" ref_url="https://bugzilla.suse.com/1107420" source="BUGZILLA"/>
		<reference ref_id="1107421" ref_url="https://bugzilla.suse.com/1107421" source="BUGZILLA"/>
		<reference ref_id="1107426" ref_url="https://bugzilla.suse.com/1107426" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9611" ref_url="https://www.suse.com/security/cve/CVE-2017-9611/" source="CVE"/>
		<reference ref_id="CVE-2018-15910" ref_url="https://www.suse.com/security/cve/CVE-2018-15910/" source="CVE"/>
		<reference ref_id="CVE-2018-16509" ref_url="https://www.suse.com/security/cve/CVE-2018-16509/" source="CVE"/>
		<reference ref_id="CVE-2018-16511" ref_url="https://www.suse.com/security/cve/CVE-2018-16511/" source="CVE"/>
		<reference ref_id="CVE-2018-16513" ref_url="https://www.suse.com/security/cve/CVE-2018-16513/" source="CVE"/>
		<reference ref_id="CVE-2018-16540" ref_url="https://www.suse.com/security/cve/CVE-2018-16540/" source="CVE"/>
		<reference ref_id="CVE-2018-16541" ref_url="https://www.suse.com/security/cve/CVE-2018-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-16542" ref_url="https://www.suse.com/security/cve/CVE-2018-16542/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004767.html" source="SUSE-SU"/>
		<description>
This update for ghostscript-library fixes the following issues:

- CVE-2018-16511: A type confusion in 'ztype' could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact. (bsc#1107426)
- CVE-2018-16540: Attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact. (bsc#1107420)
- CVE-2018-16541: Attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. (bsc#1107421)
- CVE-2018-16542: Attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter. (bsc#1107413)
- CVE-2018-16509: Incorrect 'restoration of privilege' checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the 'pipe' instruction. (bsc#1107410
- CVE-2018-16513: Attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. (bsc#1107412)
- CVE-2018-15910: Attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code. (bsc#1106173)
- CVE-2017-9611: The Ins_MIRP function allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. (bsc#1050893)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1050893">SUSE bug 1050893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106173">SUSE bug 1106173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107410">SUSE bug 1107410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107412">SUSE bug 1107412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107413">SUSE bug 1107413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107420">SUSE bug 1107420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107421">SUSE bug 1107421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107426">SUSE bug 1107426</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9611/">CVE-2017-9611 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9611">CVE-2017-9611 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15910/">CVE-2018-15910 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15910">CVE-2018-15910 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16509/">CVE-2018-16509 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16509">CVE-2018-16509 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16511/">CVE-2018-16511 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16511">CVE-2018-16511 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16513/">CVE-2018-16513 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16513">CVE-2018-16513 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16540/">CVE-2018-16540 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16540">CVE-2018-16540 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16541/">CVE-2018-16541 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16541">CVE-2018-16541 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16542/">CVE-2018-16542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16542">CVE-2018-16542 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577851" comment="ghostscript-fonts-other-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577852" comment="ghostscript-fonts-rus-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577853" comment="ghostscript-fonts-std-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577854" comment="ghostscript-library-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577855" comment="ghostscript-omni-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577856" comment="ghostscript-x11-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577857" comment="libgimpprint-4.2.7-32.47.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577851" comment="ghostscript-fonts-other-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577852" comment="ghostscript-fonts-rus-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577853" comment="ghostscript-fonts-std-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577854" comment="ghostscript-library-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577855" comment="ghostscript-omni-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577856" comment="ghostscript-x11-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577857" comment="libgimpprint-4.2.7-32.47.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218632" version="1" class="patch">
	<metadata>
		<title>Recommended update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1129186" ref_url="https://bugzilla.suse.com/1129186" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3838" ref_url="https://www.suse.com/security/cve/CVE-2019-3838/" source="CVE"/>
		<description>
This update for ghostscript-library fixes the following issues:

Security issue fixed:

- CVE-2019-3838: Fixed various bugs which allows to reenable and misuse system Postscript operators to read files from within Postscript files and send them with the help of e.g. the %pipe% to the attacker (bsc#1129186).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-28"/>
	<updated date="2019-08-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129186">SUSE bug 1129186</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3838/">CVE-2019-3838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3838">CVE-2019-3838 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571737" comment="ghostscript-fonts-other-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571738" comment="ghostscript-fonts-rus-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571739" comment="ghostscript-fonts-std-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571740" comment="ghostscript-library-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571741" comment="ghostscript-omni-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571742" comment="ghostscript-x11-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571743" comment="libgimpprint-4.2.7-47.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218633" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1202598" ref_url="https://bugzilla.suse.com/1202598" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27792" ref_url="https://www.suse.com/security/cve/CVE-2020-27792/" source="CVE"/>
		<description>
This update for ghostscript-library fixes the following issues:

- CVE-2020-27792: Fixed heap-based buffer over write in lp8000_print_page() function in gdevlp8k.c (bsc#1202598)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-23"/>
	<updated date="2022-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1202598">SUSE bug 1202598</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27792/">CVE-2020-27792 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27792">CVE-2020-27792 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992766" comment="ghostscript-fonts-other-8.62-47.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992767" comment="ghostscript-fonts-rus-8.62-47.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992768" comment="ghostscript-fonts-std-8.62-47.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992769" comment="ghostscript-library-8.62-47.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992770" comment="ghostscript-omni-8.62-47.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992771" comment="ghostscript-x11-8.62-47.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992772" comment="libgimpprint-4.2.7-47.26.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218634" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210062" ref_url="https://bugzilla.suse.com/1210062" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28879" ref_url="https://www.suse.com/security/cve/CVE-2023-28879/" source="CVE"/>
		<description>
This update for ghostscript-library fixes the following issues:

- CVE-2023-28879: Fixed buffer Overflow in s_xBCPE_process (bsc#1210062).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-07"/>
	<updated date="2023-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210062">SUSE bug 1210062</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28879/">CVE-2023-28879 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28879">CVE-2023-28879 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992773" comment="ghostscript-fonts-other-8.62-47.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992774" comment="ghostscript-fonts-rus-8.62-47.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992775" comment="ghostscript-fonts-std-8.62-47.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992776" comment="ghostscript-library-8.62-47.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992777" comment="ghostscript-omni-8.62-47.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992778" comment="ghostscript-x11-8.62-47.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992779" comment="libgimpprint-4.2.7-47.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218635" version="1" class="patch">
	<metadata>
		<title>Security update for giflib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="960319" ref_url="https://bugzilla.suse.com/960319" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7555" ref_url="https://www.suse.com/security/cve/CVE-2015-7555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001819.html" source="SUSE-SU"/>
		<description>

This update for giflib fixes the following issues:

- CVE-2015-7555: Heap overflow in giffix (bsc#960319)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960319">SUSE bug 960319</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7555/">CVE-2015-7555 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7555">CVE-2015-7555 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577858" comment="giflib-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577859" comment="giflib-32bit-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577860" comment="giflib-progs-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577861" comment="giflib-x86-4.1.6-13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577858" comment="giflib-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577859" comment="giflib-32bit-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577860" comment="giflib-progs-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577861" comment="giflib-x86-4.1.6-13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577858" comment="giflib-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577859" comment="giflib-32bit-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577860" comment="giflib-progs-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577861" comment="giflib-x86-4.1.6-13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218636" version="1" class="patch">
	<metadata>
		<title>Security update for giflib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="974847" ref_url="https://bugzilla.suse.com/974847" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3977" ref_url="https://www.suse.com/security/cve/CVE-2016-3977/" source="CVE"/>
		<description>
giflib was updated to fix one security issue.

This security issue was fixed:
- CVE-2016-3977: Heap buffer overflow in gif2rgb (bsc#974847).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-25"/>
	<updated date="2016-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/974847">SUSE bug 974847</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3977/">CVE-2016-3977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3977">CVE-2016-3977 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571746" comment="giflib-4.1.6-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571747" comment="giflib-32bit-4.1.6-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571748" comment="giflib-progs-4.1.6-21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218637" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1107116" ref_url="https://bugzilla.suse.com/1107116" source="BUGZILLA"/>
		<reference ref_id="1111499" ref_url="https://bugzilla.suse.com/1111499" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16429" ref_url="https://www.suse.com/security/cve/CVE-2018-16429/" source="CVE"/>
		<description>
This update for glib2 fixes the following issues:

Security issues fixed:

- CVE-2018-16429: Fixed out-of-bounds read vulnerability ing_markup_parse_context_parse() (bsc#1107116).
- Fixing potentially exploitable bugs in UTF-8 validation in Variant and DBUS message parsing (bsc#1111499).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-03"/>
	<updated date="2018-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1107116">SUSE bug 1107116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111499">SUSE bug 1111499</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16429/">CVE-2018-16429 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16429">CVE-2018-16429 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571749" comment="glib2-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571750" comment="glib2-doc-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571751" comment="glib2-lang-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571752" comment="libgio-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571753" comment="libgio-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571754" comment="libglib-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571755" comment="libglib-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571756" comment="libgmodule-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571757" comment="libgmodule-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571758" comment="libgobject-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571759" comment="libgobject-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571760" comment="libgthread-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571761" comment="libgthread-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218638" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1137001" ref_url="https://bugzilla.suse.com/1137001" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12450" ref_url="https://www.suse.com/security/cve/CVE-2019-12450/" source="CVE"/>
		<description>
This update for glib2 fixes the following issues:

Security issue fixed: 	  

- CVE-2019-12450: Fixed an improper file permission when copy operation
  takes place (bsc#1137001).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-24"/>
	<updated date="2019-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137001">SUSE bug 1137001</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12450/">CVE-2019-12450 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12450">CVE-2019-12450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571762" comment="glib2-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571763" comment="glib2-doc-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571764" comment="glib2-lang-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571765" comment="libgio-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571766" comment="libgio-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571767" comment="libglib-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571768" comment="libglib-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571769" comment="libgmodule-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571770" comment="libgmodule-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571771" comment="libgobject-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571772" comment="libgobject-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571773" comment="libgthread-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571774" comment="libgthread-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218639" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1107121" ref_url="https://bugzilla.suse.com/1107121" source="BUGZILLA"/>
		<reference ref_id="1191489" ref_url="https://bugzilla.suse.com/1191489" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16428" ref_url="https://www.suse.com/security/cve/CVE-2018-16428/" source="CVE"/>
		<reference ref_id="CVE-2021-3800" ref_url="https://www.suse.com/security/cve/CVE-2021-3800/" source="CVE"/>
		<description>
This update for glib2 fixes the following issues:


- CVE-2021-3800: Fixed a file content leak in pkexec due to charset aliases (bsc#1191489).
- CVE-2018-16428: Fixed a NULL pointer dereference in g_markup_parse_context_end_parse() (bsc#1107121).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-22"/>
	<updated date="2022-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1107121">SUSE bug 1107121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191489">SUSE bug 1191489</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16428/">CVE-2018-16428 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16428">CVE-2018-16428 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3800/">CVE-2021-3800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3800">CVE-2021-3800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672765" comment="glib2-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672766" comment="glib2-doc-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672767" comment="glib2-lang-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672768" comment="libgio-2_0-0-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672769" comment="libgio-2_0-0-32bit-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672770" comment="libglib-2_0-0-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672771" comment="libglib-2_0-0-32bit-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672772" comment="libgmodule-2_0-0-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672773" comment="libgmodule-2_0-0-32bit-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672774" comment="libgobject-2_0-0-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672775" comment="libgobject-2_0-0-32bit-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672776" comment="libgthread-2_0-0-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672777" comment="libgthread-2_0-0-32bit-2.22.5-0.8.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218640" version="1" class="patch">
	<metadata>
		<title>Security update for glibc</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="691365" ref_url="https://bugzilla.suse.com/691365" source="BUGZILLA"/>
		<reference ref_id="779320" ref_url="https://bugzilla.suse.com/779320" source="BUGZILLA"/>
		<reference ref_id="791928" ref_url="https://bugzilla.suse.com/791928" source="BUGZILLA"/>
		<reference ref_id="801246" ref_url="https://bugzilla.suse.com/801246" source="BUGZILLA"/>
		<reference ref_id="811979" ref_url="https://bugzilla.suse.com/811979" source="BUGZILLA"/>
		<reference ref_id="813121" ref_url="https://bugzilla.suse.com/813121" source="BUGZILLA"/>
		<reference ref_id="819347" ref_url="https://bugzilla.suse.com/819347" source="BUGZILLA"/>
		<reference ref_id="822210" ref_url="https://bugzilla.suse.com/822210" source="BUGZILLA"/>
		<reference ref_id="827811" ref_url="https://bugzilla.suse.com/827811" source="BUGZILLA"/>
		<reference ref_id="828235" ref_url="https://bugzilla.suse.com/828235" source="BUGZILLA"/>
		<reference ref_id="828637" ref_url="https://bugzilla.suse.com/828637" source="BUGZILLA"/>
		<reference ref_id="830268" ref_url="https://bugzilla.suse.com/830268" source="BUGZILLA"/>
		<reference ref_id="834594" ref_url="https://bugzilla.suse.com/834594" source="BUGZILLA"/>
		<reference ref_id="836746" ref_url="https://bugzilla.suse.com/836746" source="BUGZILLA"/>
		<reference ref_id="839870" ref_url="https://bugzilla.suse.com/839870" source="BUGZILLA"/>
		<reference ref_id="844309" ref_url="https://bugzilla.suse.com/844309" source="BUGZILLA"/>
		<reference ref_id="847227" ref_url="https://bugzilla.suse.com/847227" source="BUGZILLA"/>
		<reference ref_id="854445" ref_url="https://bugzilla.suse.com/854445" source="BUGZILLA"/>
		<reference ref_id="863499" ref_url="https://bugzilla.suse.com/863499" source="BUGZILLA"/>
		<reference ref_id="864081" ref_url="https://bugzilla.suse.com/864081" source="BUGZILLA"/>
		<reference ref_id="872832" ref_url="https://bugzilla.suse.com/872832" source="BUGZILLA"/>
		<reference ref_id="882028" ref_url="https://bugzilla.suse.com/882028" source="BUGZILLA"/>
		<reference ref_id="882600" ref_url="https://bugzilla.suse.com/882600" source="BUGZILLA"/>
		<reference ref_id="883217" ref_url="https://bugzilla.suse.com/883217" source="BUGZILLA"/>
		<reference ref_id="886416" ref_url="https://bugzilla.suse.com/886416" source="BUGZILLA"/>
		<reference ref_id="887022" ref_url="https://bugzilla.suse.com/887022" source="BUGZILLA"/>
		<reference ref_id="888347" ref_url="https://bugzilla.suse.com/888347" source="BUGZILLA"/>
		<reference ref_id="891843" ref_url="https://bugzilla.suse.com/891843" source="BUGZILLA"/>
		<reference ref_id="892065" ref_url="https://bugzilla.suse.com/892065" source="BUGZILLA"/>
		<reference ref_id="892073" ref_url="https://bugzilla.suse.com/892073" source="BUGZILLA"/>
		<reference ref_id="894553" ref_url="https://bugzilla.suse.com/894553" source="BUGZILLA"/>
		<reference ref_id="894556" ref_url="https://bugzilla.suse.com/894556" source="BUGZILLA"/>
		<reference ref_id="903288" ref_url="https://bugzilla.suse.com/903288" source="BUGZILLA"/>
		<reference ref_id="904461" ref_url="https://bugzilla.suse.com/904461" source="BUGZILLA"/>
		<reference ref_id="906371" ref_url="https://bugzilla.suse.com/906371" source="BUGZILLA"/>
		<reference ref_id="909053" ref_url="https://bugzilla.suse.com/909053" source="BUGZILLA"/>
		<reference ref_id="913646" ref_url="https://bugzilla.suse.com/913646" source="BUGZILLA"/>
		<reference ref_id="915526" ref_url="https://bugzilla.suse.com/915526" source="BUGZILLA"/>
		<reference ref_id="916222" ref_url="https://bugzilla.suse.com/916222" source="BUGZILLA"/>
		<reference ref_id="917072" ref_url="https://bugzilla.suse.com/917072" source="BUGZILLA"/>
		<reference ref_id="919678" ref_url="https://bugzilla.suse.com/919678" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4412" ref_url="https://www.suse.com/security/cve/CVE-2012-4412/" source="CVE"/>
		<reference ref_id="CVE-2012-6656" ref_url="https://www.suse.com/security/cve/CVE-2012-6656/" source="CVE"/>
		<reference ref_id="CVE-2013-0242" ref_url="https://www.suse.com/security/cve/CVE-2013-0242/" source="CVE"/>
		<reference ref_id="CVE-2013-1914" ref_url="https://www.suse.com/security/cve/CVE-2013-1914/" source="CVE"/>
		<reference ref_id="CVE-2013-4237" ref_url="https://www.suse.com/security/cve/CVE-2013-4237/" source="CVE"/>
		<reference ref_id="CVE-2013-4332" ref_url="https://www.suse.com/security/cve/CVE-2013-4332/" source="CVE"/>
		<reference ref_id="CVE-2013-4357" ref_url="https://www.suse.com/security/cve/CVE-2013-4357/" source="CVE"/>
		<reference ref_id="CVE-2013-4458" ref_url="https://www.suse.com/security/cve/CVE-2013-4458/" source="CVE"/>
		<reference ref_id="CVE-2013-4788" ref_url="https://www.suse.com/security/cve/CVE-2013-4788/" source="CVE"/>
		<reference ref_id="CVE-2013-7423" ref_url="https://www.suse.com/security/cve/CVE-2013-7423/" source="CVE"/>
		<reference ref_id="CVE-2014-0475" ref_url="https://www.suse.com/security/cve/CVE-2014-0475/" source="CVE"/>
		<reference ref_id="CVE-2014-4043" ref_url="https://www.suse.com/security/cve/CVE-2014-4043/" source="CVE"/>
		<reference ref_id="CVE-2014-5119" ref_url="https://www.suse.com/security/cve/CVE-2014-5119/" source="CVE"/>
		<reference ref_id="CVE-2014-6040" ref_url="https://www.suse.com/security/cve/CVE-2014-6040/" source="CVE"/>
		<reference ref_id="CVE-2014-7817" ref_url="https://www.suse.com/security/cve/CVE-2014-7817/" source="CVE"/>
		<reference ref_id="CVE-2014-9402" ref_url="https://www.suse.com/security/cve/CVE-2014-9402/" source="CVE"/>
		<reference ref_id="CVE-2015-0235" ref_url="https://www.suse.com/security/cve/CVE-2015-0235/" source="CVE"/>
		<reference ref_id="CVE-2015-1472" ref_url="https://www.suse.com/security/cve/CVE-2015-1472/" source="CVE"/>
		<reference ref_id="SUSE-RU-2015:0794-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-April/002927.html" source="SUSE-SU"/>
		<description>

This glibc update fixes a critical privilege escalation problem and two 
non-security issues:

    * bnc#892073: An off-by-one error leading to a heap-based buffer
      overflow was found in __gconv_translit_find(). An exploit that
      targets the problem is publicly available. (CVE-2014-5119)
    * bnc#892065: setenv-alloca.patch: Avoid unbound alloca in setenv.
    * bnc#888347: printf-multibyte-format.patch: Don't parse %s format
      argument as multi-byte string.

Security Issues:

    * CVE-2014-5119
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-29"/>
	<updated date="2014-08-29"/>
	<bugzilla href="https://bugzilla.suse.com/691365">SUSE bug 691365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779320">SUSE bug 779320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791928">SUSE bug 791928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801246">SUSE bug 801246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/811979">SUSE bug 811979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813121">SUSE bug 813121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819347">SUSE bug 819347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822210">SUSE bug 822210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827811">SUSE bug 827811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828235">SUSE bug 828235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828637">SUSE bug 828637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/830268">SUSE bug 830268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834594">SUSE bug 834594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836746">SUSE bug 836746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839870">SUSE bug 839870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844309">SUSE bug 844309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847227">SUSE bug 847227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854445">SUSE bug 854445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863499">SUSE bug 863499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864081">SUSE bug 864081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/872832">SUSE bug 872832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882028">SUSE bug 882028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882600">SUSE bug 882600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883217">SUSE bug 883217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886416">SUSE bug 886416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887022">SUSE bug 887022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888347">SUSE bug 888347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891843">SUSE bug 891843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892065">SUSE bug 892065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892073">SUSE bug 892073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894553">SUSE bug 894553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894556">SUSE bug 894556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903288">SUSE bug 903288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904461">SUSE bug 904461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906371">SUSE bug 906371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909053">SUSE bug 909053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913646">SUSE bug 913646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915526">SUSE bug 915526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916222">SUSE bug 916222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917072">SUSE bug 917072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919678">SUSE bug 919678</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4412/">CVE-2012-4412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4412">CVE-2012-4412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6656/">CVE-2012-6656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6656">CVE-2012-6656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0242/">CVE-2013-0242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0242">CVE-2013-0242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1914/">CVE-2013-1914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1914">CVE-2013-1914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4237/">CVE-2013-4237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4237">CVE-2013-4237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4332/">CVE-2013-4332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4332">CVE-2013-4332 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4357/">CVE-2013-4357 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4357">CVE-2013-4357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4458/">CVE-2013-4458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4458">CVE-2013-4458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4788/">CVE-2013-4788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4788">CVE-2013-4788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7423/">CVE-2013-7423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7423">CVE-2013-7423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0475/">CVE-2014-0475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0475">CVE-2014-0475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4043/">CVE-2014-4043 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4043">CVE-2014-4043 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5119/">CVE-2014-5119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5119">CVE-2014-5119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6040/">CVE-2014-6040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6040">CVE-2014-6040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7817/">CVE-2014-7817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7817">CVE-2014-7817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9402/">CVE-2014-9402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9402">CVE-2014-9402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0235/">CVE-2015-0235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0235">CVE-2015-0235 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1472/">CVE-2015-1472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1472">CVE-2015-1472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577862" comment="glibc-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577863" comment="glibc-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577864" comment="glibc-devel-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577865" comment="glibc-devel-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577866" comment="glibc-html-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577867" comment="glibc-i18ndata-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577868" comment="glibc-info-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577869" comment="glibc-locale-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577870" comment="glibc-locale-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577871" comment="glibc-locale-x86-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577872" comment="glibc-profile-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577873" comment="glibc-profile-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577874" comment="glibc-profile-x86-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577875" comment="glibc-x86-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577876" comment="nscd-2.11.3-17.72.14 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577862" comment="glibc-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577863" comment="glibc-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577864" comment="glibc-devel-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577865" comment="glibc-devel-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577866" comment="glibc-html-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577867" comment="glibc-i18ndata-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577868" comment="glibc-info-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577869" comment="glibc-locale-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577870" comment="glibc-locale-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577871" comment="glibc-locale-x86-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577872" comment="glibc-profile-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577873" comment="glibc-profile-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577874" comment="glibc-profile-x86-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577875" comment="glibc-x86-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577876" comment="nscd-2.11.3-17.72.14 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577862" comment="glibc-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577863" comment="glibc-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577864" comment="glibc-devel-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577865" comment="glibc-devel-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577866" comment="glibc-html-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577867" comment="glibc-i18ndata-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577868" comment="glibc-info-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577869" comment="glibc-locale-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577870" comment="glibc-locale-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577871" comment="glibc-locale-x86-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577872" comment="glibc-profile-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577873" comment="glibc-profile-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577874" comment="glibc-profile-x86-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577875" comment="glibc-x86-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577876" comment="nscd-2.11.3-17.72.14 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218641" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="830257" ref_url="https://bugzilla.suse.com/830257" source="BUGZILLA"/>
		<reference ref_id="851280" ref_url="https://bugzilla.suse.com/851280" source="BUGZILLA"/>
		<reference ref_id="918187" ref_url="https://bugzilla.suse.com/918187" source="BUGZILLA"/>
		<reference ref_id="920338" ref_url="https://bugzilla.suse.com/920338" source="BUGZILLA"/>
		<reference ref_id="927080" ref_url="https://bugzilla.suse.com/927080" source="BUGZILLA"/>
		<reference ref_id="928723" ref_url="https://bugzilla.suse.com/928723" source="BUGZILLA"/>
		<reference ref_id="932059" ref_url="https://bugzilla.suse.com/932059" source="BUGZILLA"/>
		<reference ref_id="933770" ref_url="https://bugzilla.suse.com/933770" source="BUGZILLA"/>
		<reference ref_id="933903" ref_url="https://bugzilla.suse.com/933903" source="BUGZILLA"/>
		<reference ref_id="935286" ref_url="https://bugzilla.suse.com/935286" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001548.html" source="SUSE-SU"/>
		<description>
This update for glibc provides fixes for security and non-security issues.

These security issues have been fixed:

- CVE-2015-1781: Buffer length after padding in resolv/nss_dns/dns-host.c. (bsc#927080)
- CVE-2013-2207: pt_chown did not properly check permissions for tty files, which allowed
  local users to change the permission on the files and obtain access to arbitrary
  pseudo-terminals by leveraging a FUSE file system. (bsc#830257)
- CVE-2014-8121: DB_LOOKUP in the Name Service Switch (NSS) did not properly check if a
  file is open, which allowed remote attackers to cause a denial of service (infinite loop)
  by performing a look-up while the database is iterated over the database, which triggers
  the file pointer to be reset. (bsc#918187)
- Fix read past end of pattern in fnmatch. (bsc#920338)

These non-security issues have been fixed:

- Fix locking in _IO_flush_all_lockp() to prevent deadlocks in applications. (bsc#851280)
- Record TTL also for DNS PTR queries. (bsc#928723)
- Fix invalid free in ld.so. (bsc#932059)
- Make PowerPC64 default to non-executable stack. (bsc#933770)
- Fix floating point exceptions in some circumstances with exp() and friends. (bsc#933903)
- Fix bad TEXTREL in glibc.i686. (bsc#935286)
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-31"/>
	<updated date="2015-07-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/830257">SUSE bug 830257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851280">SUSE bug 851280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918187">SUSE bug 918187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920338">SUSE bug 920338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927080">SUSE bug 927080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928723">SUSE bug 928723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932059">SUSE bug 932059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933770">SUSE bug 933770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933903">SUSE bug 933903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935286">SUSE bug 935286</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2207">CVE-2013-2207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8121">CVE-2014-8121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1781">CVE-2015-1781 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577877" comment="glibc-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577878" comment="glibc-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577879" comment="glibc-devel-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577880" comment="glibc-devel-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577881" comment="glibc-html-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577882" comment="glibc-i18ndata-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577883" comment="glibc-info-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577884" comment="glibc-locale-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577885" comment="glibc-locale-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577886" comment="glibc-locale-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577887" comment="glibc-profile-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577888" comment="glibc-profile-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577889" comment="glibc-profile-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577890" comment="glibc-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577891" comment="nscd-2.11.3-17.87.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577877" comment="glibc-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577878" comment="glibc-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577879" comment="glibc-devel-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577880" comment="glibc-devel-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577881" comment="glibc-html-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577882" comment="glibc-i18ndata-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577883" comment="glibc-info-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577884" comment="glibc-locale-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577885" comment="glibc-locale-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577886" comment="glibc-locale-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577887" comment="glibc-profile-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577888" comment="glibc-profile-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577889" comment="glibc-profile-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577890" comment="glibc-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577891" comment="nscd-2.11.3-17.87.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577877" comment="glibc-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577878" comment="glibc-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577879" comment="glibc-devel-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577880" comment="glibc-devel-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577881" comment="glibc-html-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577882" comment="glibc-i18ndata-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577883" comment="glibc-info-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577884" comment="glibc-locale-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577885" comment="glibc-locale-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577886" comment="glibc-locale-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577887" comment="glibc-profile-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577888" comment="glibc-profile-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577889" comment="glibc-profile-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577890" comment="glibc-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577891" comment="nscd-2.11.3-17.87.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218642" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="930721" ref_url="https://bugzilla.suse.com/930721" source="BUGZILLA"/>
		<reference ref_id="942317" ref_url="https://bugzilla.suse.com/942317" source="BUGZILLA"/>
		<reference ref_id="950944" ref_url="https://bugzilla.suse.com/950944" source="BUGZILLA"/>
		<reference ref_id="956988" ref_url="https://bugzilla.suse.com/956988" source="BUGZILLA"/>
		<reference ref_id="961721" ref_url="https://bugzilla.suse.com/961721" source="BUGZILLA"/>
		<reference ref_id="962736" ref_url="https://bugzilla.suse.com/962736" source="BUGZILLA"/>
		<reference ref_id="962737" ref_url="https://bugzilla.suse.com/962737" source="BUGZILLA"/>
		<reference ref_id="962738" ref_url="https://bugzilla.suse.com/962738" source="BUGZILLA"/>
		<reference ref_id="962739" ref_url="https://bugzilla.suse.com/962739" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001884.html" source="SUSE-SU"/>
		<description>

This update for glibc fixes the following issues:

- CVE-2015-7547: A stack-based buffer overflow in getaddrinfo allowed remote attackers to cause a crash or execute arbitrary code via crafted and timed DNS responses (bsc#961721)
- CVE-2015-8777: Insufficient checking of LD_POINTER_GUARD environment variable allowed local attackers to bypass the pointer guarding protection of the dynamic loader on set-user-ID and set-group-ID programs (bsc#950944)
- CVE-2015-8776: Out-of-range time values passed to the strftime function may cause it to crash, leading to a denial of service, or potentially disclosure information (bsc#962736)
- CVE-2015-8778: Integer overflow in hcreate and hcreate_r could have caused an out-of-bound memory access. leading to application crashes or, potentially, arbitrary code execution (bsc#962737)
- CVE-2014-9761: A stack overflow (unbounded alloca) could have caused applications which process long strings with the nan function to crash or, potentially, execute arbitrary code. (bsc#962738)
- CVE-2015-8779: A stack overflow (unbounded alloca) in the catopen function could have caused applications which pass long strings to the catopen function to crash or, potentially execute arbitrary code. (bsc#962739)

The following non-security bugs were fixed:

- bsc#930721: Accept leading and trailing spaces in getdate input string
- bsc#942317: Recognize power8 platform 
- bsc#950944: Always enable pointer guard
- bsc#956988: Fix deadlock in __dl_iterate_phdr
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/930721">SUSE bug 930721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942317">SUSE bug 942317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950944">SUSE bug 950944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956988">SUSE bug 956988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961721">SUSE bug 961721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962736">SUSE bug 962736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962737">SUSE bug 962737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962738">SUSE bug 962738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962739">SUSE bug 962739</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9761">CVE-2014-9761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7547">CVE-2015-7547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8776">CVE-2015-8776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8777">CVE-2015-8777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8778">CVE-2015-8778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8779">CVE-2015-8779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577892" comment="glibc-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577893" comment="glibc-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577894" comment="glibc-devel-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577895" comment="glibc-devel-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577896" comment="glibc-html-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577897" comment="glibc-i18ndata-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577898" comment="glibc-info-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577899" comment="glibc-locale-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577900" comment="glibc-locale-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577901" comment="glibc-locale-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577902" comment="glibc-profile-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577903" comment="glibc-profile-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577904" comment="glibc-profile-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577905" comment="glibc-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577906" comment="nscd-2.11.3-17.95.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577892" comment="glibc-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577893" comment="glibc-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577894" comment="glibc-devel-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577895" comment="glibc-devel-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577896" comment="glibc-html-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577897" comment="glibc-i18ndata-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577898" comment="glibc-info-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577899" comment="glibc-locale-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577900" comment="glibc-locale-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577901" comment="glibc-locale-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577902" comment="glibc-profile-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577903" comment="glibc-profile-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577904" comment="glibc-profile-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577905" comment="glibc-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577906" comment="nscd-2.11.3-17.95.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577892" comment="glibc-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577893" comment="glibc-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577894" comment="glibc-devel-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577895" comment="glibc-devel-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577896" comment="glibc-html-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577897" comment="glibc-i18ndata-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577898" comment="glibc-info-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577899" comment="glibc-locale-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577900" comment="glibc-locale-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577901" comment="glibc-locale-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577902" comment="glibc-profile-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577903" comment="glibc-profile-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577904" comment="glibc-profile-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577905" comment="glibc-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577906" comment="nscd-2.11.3-17.95.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218643" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="931399" ref_url="https://bugzilla.suse.com/931399" source="BUGZILLA"/>
		<reference ref_id="965699" ref_url="https://bugzilla.suse.com/965699" source="BUGZILLA"/>
		<reference ref_id="969727" ref_url="https://bugzilla.suse.com/969727" source="BUGZILLA"/>
		<reference ref_id="973010" ref_url="https://bugzilla.suse.com/973010" source="BUGZILLA"/>
		<reference ref_id="973164" ref_url="https://bugzilla.suse.com/973164" source="BUGZILLA"/>
		<reference ref_id="973179" ref_url="https://bugzilla.suse.com/973179" source="BUGZILLA"/>
		<reference ref_id="980483" ref_url="https://bugzilla.suse.com/980483" source="BUGZILLA"/>
		<reference ref_id="980854" ref_url="https://bugzilla.suse.com/980854" source="BUGZILLA"/>
		<reference ref_id="986302" ref_url="https://bugzilla.suse.com/986302" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1234" ref_url="https://www.suse.com/security/cve/CVE-2016-1234/" source="CVE"/>
		<reference ref_id="CVE-2016-3075" ref_url="https://www.suse.com/security/cve/CVE-2016-3075/" source="CVE"/>
		<reference ref_id="CVE-2016-3706" ref_url="https://www.suse.com/security/cve/CVE-2016-3706/" source="CVE"/>
		<reference ref_id="CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429/" source="CVE"/>
		<description>

This update for glibc fixes the following issues:

- Drop old fix that could break services that start before IPv6 is up. (bsc#931399)
- Do not copy d_name field of struct dirent. (CVE-2016-1234, bsc#969727)
- Fix memory leak in _nss_dns_gethostbyname4_r. (bsc#973010)
- Relocate DSOs in dependency order, fixing a potential crash during symbol
  relocation phase. (bsc#986302)
- Fix nscd assertion failure in gc. (bsc#965699)
- Fix stack overflow in _nss_dns_getnetbyname_r. (CVE-2016-3075, bsc#973164)
- Fix getaddrinfo stack overflow in hostent conversion. (CVE-2016-3706, bsc#980483)
- Do not use alloca in clntudp_call. (CVE-2016-4429, bsc#980854)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-25"/>
	<updated date="2016-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/931399">SUSE bug 931399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965699">SUSE bug 965699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969727">SUSE bug 969727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973010">SUSE bug 973010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973164">SUSE bug 973164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973179">SUSE bug 973179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980483">SUSE bug 980483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980854">SUSE bug 980854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986302">SUSE bug 986302</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1234/">CVE-2016-1234 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1234">CVE-2016-1234 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3075/">CVE-2016-3075 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3075">CVE-2016-3075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3706/">CVE-2016-3706 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3706">CVE-2016-3706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4429">CVE-2016-4429 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577907" comment="glibc-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577908" comment="glibc-32bit-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577909" comment="glibc-devel-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577910" comment="glibc-devel-32bit-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577911" comment="glibc-html-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577912" comment="glibc-i18ndata-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577913" comment="glibc-info-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577914" comment="glibc-locale-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577915" comment="glibc-locale-32bit-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577916" comment="glibc-profile-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577917" comment="glibc-profile-32bit-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577918" comment="nscd-2.11.3-17.102.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218644" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1039357" ref_url="https://bugzilla.suse.com/1039357" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000366" ref_url="https://www.suse.com/security/cve/CVE-2017-1000366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002963.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2017-1000366: Fix a potential privilege escalation vulnerability that
  allowed unprivileged system users to manipulate the stack of setuid binaries
  to gain special privileges. [bsc#1039357]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-19"/>
	<updated date="2017-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1039357">SUSE bug 1039357</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000366/">CVE-2017-1000366 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000366">CVE-2017-1000366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577919" comment="glibc-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577920" comment="glibc-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577921" comment="glibc-devel-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577922" comment="glibc-devel-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577923" comment="glibc-html-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577924" comment="glibc-i18ndata-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577925" comment="glibc-info-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577926" comment="glibc-locale-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577927" comment="glibc-locale-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577928" comment="glibc-profile-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577929" comment="glibc-profile-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577930" comment="nscd-2.11.3-17.109.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577919" comment="glibc-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577920" comment="glibc-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577921" comment="glibc-devel-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577922" comment="glibc-devel-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577923" comment="glibc-html-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577924" comment="glibc-i18ndata-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577925" comment="glibc-info-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577926" comment="glibc-locale-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577927" comment="glibc-locale-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577928" comment="glibc-profile-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577929" comment="glibc-profile-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577930" comment="nscd-2.11.3-17.109.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218645" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1074293" ref_url="https://bugzilla.suse.com/1074293" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003593.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- A privilege escalation bug in the realpath() function has been fixed.
  [CVE-2018-1000001, bsc#1074293]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1074293">SUSE bug 1074293</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000001">CVE-2018-1000001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577931" comment="glibc-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577932" comment="glibc-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577933" comment="glibc-devel-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577934" comment="glibc-devel-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577935" comment="glibc-html-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577936" comment="glibc-i18ndata-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577937" comment="glibc-info-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577938" comment="glibc-locale-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577939" comment="glibc-locale-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577940" comment="glibc-profile-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577941" comment="glibc-profile-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577942" comment="nscd-2.11.3-17.110.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577931" comment="glibc-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577932" comment="glibc-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577933" comment="glibc-devel-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577934" comment="glibc-devel-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577935" comment="glibc-html-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577936" comment="glibc-i18ndata-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577937" comment="glibc-info-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577938" comment="glibc-locale-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577939" comment="glibc-locale-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577940" comment="glibc-profile-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577941" comment="glibc-profile-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577942" comment="nscd-2.11.3-17.110.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218646" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1037930" ref_url="https://bugzilla.suse.com/1037930" source="BUGZILLA"/>
		<reference ref_id="1051791" ref_url="https://bugzilla.suse.com/1051791" source="BUGZILLA"/>
		<reference ref_id="1074293" ref_url="https://bugzilla.suse.com/1074293" source="BUGZILLA"/>
		<reference ref_id="1079036" ref_url="https://bugzilla.suse.com/1079036" source="BUGZILLA"/>
		<reference ref_id="978209" ref_url="https://bugzilla.suse.com/978209" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12132" ref_url="https://www.suse.com/security/cve/CVE-2017-12132/" source="CVE"/>
		<reference ref_id="CVE-2017-8804" ref_url="https://www.suse.com/security/cve/CVE-2017-8804/" source="CVE"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="CVE-2018-6485" ref_url="https://www.suse.com/security/cve/CVE-2018-6485/" source="CVE"/>
		<reference ref_id="CVE-2018-6551" ref_url="https://www.suse.com/security/cve/CVE-2018-6551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003758.html" source="SUSE-SU"/>
		<description>

  
This update for glibc fixes the following issues:

Security issues:

- CVE-2017-8804: Fix memory leak after deserialization failure in xdr_bytes, xdr_string (bsc#1037930)
- CVE-2017-12132: Reduce EDNS payload size to 1200 bytes (bsc#1051791)
- CVE-2018-6485,CVE-2018-6551: Fix integer overflows in internal memalign and malloc functions (bsc#1079036)
- CVE-2018-1000001: Avoid underflow of malloced area in realpath (bsc#1074293)

Also a non security issue was fixed:

- Do not fail if one of the two responses to AF_UNSPEC fails (bsc#978209)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-28"/>
	<updated date="2018-02-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037930">SUSE bug 1037930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051791">SUSE bug 1051791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074293">SUSE bug 1074293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079036">SUSE bug 1079036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978209">SUSE bug 978209</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12132/">CVE-2017-12132 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12132">CVE-2017-12132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8804/">CVE-2017-8804 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8804">CVE-2017-8804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000001">CVE-2018-1000001 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6485/">CVE-2018-6485 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6485">CVE-2018-6485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6551/">CVE-2018-6551 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6551">CVE-2018-6551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577943" comment="glibc-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577944" comment="glibc-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577945" comment="glibc-devel-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577946" comment="glibc-devel-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577947" comment="glibc-html-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577948" comment="glibc-i18ndata-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577949" comment="glibc-info-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577950" comment="glibc-locale-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577951" comment="glibc-locale-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577952" comment="glibc-profile-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577953" comment="glibc-profile-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577954" comment="nscd-2.11.3-17.110.6.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577943" comment="glibc-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577944" comment="glibc-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577945" comment="glibc-devel-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577946" comment="glibc-devel-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577947" comment="glibc-html-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577948" comment="glibc-i18ndata-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577949" comment="glibc-info-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577950" comment="glibc-locale-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577951" comment="glibc-locale-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577952" comment="glibc-profile-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577953" comment="glibc-profile-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577954" comment="nscd-2.11.3-17.110.6.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218647" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1076871" ref_url="https://bugzilla.suse.com/1076871" source="BUGZILLA"/>
		<reference ref_id="1081556" ref_url="https://bugzilla.suse.com/1081556" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12133" ref_url="https://www.suse.com/security/cve/CVE-2017-12133/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2017-12133: Avoid use-after-free read access in clntudp_call (bsc#1081556)

Non security issue fixed:

- Fix incorrect getaddrinfo assertion trigger (bsc#1076871)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-05"/>
	<updated date="2018-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076871">SUSE bug 1076871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081556">SUSE bug 1081556</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12133/">CVE-2017-12133 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12133">CVE-2017-12133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577955" comment="glibc-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577956" comment="glibc-32bit-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577957" comment="glibc-devel-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577958" comment="glibc-devel-32bit-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577959" comment="glibc-html-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577960" comment="glibc-i18ndata-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577961" comment="glibc-info-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577962" comment="glibc-locale-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577963" comment="glibc-locale-32bit-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577964" comment="glibc-profile-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577965" comment="glibc-profile-32bit-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577966" comment="nscd-2.11.3-17.110.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218648" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1077763" ref_url="https://bugzilla.suse.com/1077763" source="BUGZILLA"/>
		<reference ref_id="1079625" ref_url="https://bugzilla.suse.com/1079625" source="BUGZILLA"/>
		<reference ref_id="1086690" ref_url="https://bugzilla.suse.com/1086690" source="BUGZILLA"/>
		<reference ref_id="1094161" ref_url="https://bugzilla.suse.com/1094161" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11236" ref_url="https://www.suse.com/security/cve/CVE-2018-11236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004403.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issue fixed:

- CVE-2018-11236: Fix 32bit arch integer overflow in stdlib/canonicalize.c when processing very long pathname arguments (bsc#1094161).

Bug fixes:

- bsc#1086690: Fix crash in resolver on memory allocation failure.
- bsc#1077763: Fix allocation in in6ailist_add.
- bsc#1079625: Fix allocation in nss_compat for large number of memberships to a group.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-10"/>
	<updated date="2018-08-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077763">SUSE bug 1077763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079625">SUSE bug 1079625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086690">SUSE bug 1086690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094161">SUSE bug 1094161</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11236/">CVE-2018-11236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11236">CVE-2018-11236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577967" comment="glibc-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577968" comment="glibc-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577969" comment="glibc-devel-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577970" comment="glibc-devel-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577971" comment="glibc-html-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577972" comment="glibc-i18ndata-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577973" comment="glibc-info-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577974" comment="glibc-locale-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577975" comment="glibc-locale-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577976" comment="glibc-profile-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577977" comment="glibc-profile-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577978" comment="nscd-2.11.3-17.110.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577967" comment="glibc-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577968" comment="glibc-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577969" comment="glibc-devel-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577970" comment="glibc-devel-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577971" comment="glibc-html-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577972" comment="glibc-i18ndata-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577973" comment="glibc-info-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577974" comment="glibc-locale-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577975" comment="glibc-locale-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577976" comment="glibc-profile-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577977" comment="glibc-profile-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577978" comment="nscd-2.11.3-17.110.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218649" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1058774" ref_url="https://bugzilla.suse.com/1058774" source="BUGZILLA"/>
		<reference ref_id="1064580" ref_url="https://bugzilla.suse.com/1064580" source="BUGZILLA"/>
		<reference ref_id="1064583" ref_url="https://bugzilla.suse.com/1064583" source="BUGZILLA"/>
		<reference ref_id="941234" ref_url="https://bugzilla.suse.com/941234" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5180" ref_url="https://www.suse.com/security/cve/CVE-2015-5180/" source="CVE"/>
		<reference ref_id="CVE-2017-15670" ref_url="https://www.suse.com/security/cve/CVE-2017-15670/" source="CVE"/>
		<reference ref_id="CVE-2017-15804" ref_url="https://www.suse.com/security/cve/CVE-2017-15804/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004606.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following security issues:

- CVE-2017-15670: Prevent off-by-one error that lead to a heap-based buffer
  overflow in the glob function, related to the processing of home directories
  using the ~ operator followed by a long string (bsc#1064583)
- CVE-2017-15804: The glob function contained a buffer overflow during
  unescaping of user names with the ~ operator (bsc#1064580)
- CVE-2015-5180: res_query in libresolv allowed remote attackers to cause a
  denial of service (NULL pointer dereference and process crash) (bsc#941234).

This non-security issue was fixed:

- Fix inaccuracies in casin, cacos, casinh, cacosh (bsc#1058774)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-26"/>
	<updated date="2018-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1058774">SUSE bug 1058774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064580">SUSE bug 1064580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064583">SUSE bug 1064583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941234">SUSE bug 941234</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5180/">CVE-2015-5180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5180">CVE-2015-5180 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15670/">CVE-2017-15670 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15670">CVE-2017-15670 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15804/">CVE-2017-15804 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15804">CVE-2017-15804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577979" comment="glibc-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577980" comment="glibc-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577981" comment="glibc-devel-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577982" comment="glibc-devel-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577983" comment="glibc-html-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577984" comment="glibc-i18ndata-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577985" comment="glibc-info-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577986" comment="glibc-locale-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577987" comment="glibc-locale-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577988" comment="glibc-profile-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577989" comment="glibc-profile-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577990" comment="nscd-2.11.3-17.110.19.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577979" comment="glibc-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577980" comment="glibc-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577981" comment="glibc-devel-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577982" comment="glibc-devel-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577983" comment="glibc-html-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577984" comment="glibc-i18ndata-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577985" comment="glibc-info-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577986" comment="glibc-locale-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577987" comment="glibc-locale-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577988" comment="glibc-profile-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577989" comment="glibc-profile-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577990" comment="nscd-2.11.3-17.110.19.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218650" version="1" class="patch">
	<metadata>
		<title>Recommended update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1064569" ref_url="https://bugzilla.suse.com/1064569" source="BUGZILLA"/>
		<reference ref_id="1110170" ref_url="https://bugzilla.suse.com/1110170" source="BUGZILLA"/>
		<reference ref_id="1110174" ref_url="https://bugzilla.suse.com/1110174" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15671" ref_url="https://www.suse.com/security/cve/CVE-2017-15671/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004949.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issue fixed:

- CVE-2017-15671: Fixed memory leak in glob with GLOB_TILDE (bsc#1064569, BZ #22325).

Non-security issue fixed:

- Avoid access beyond memory bounds in pthread_attr_getaffinity_np (bsc#1110170, BZ #15618).
- Remove improper assert in dlclose (bsc#1110174, BZ #11941).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064569">SUSE bug 1064569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110170">SUSE bug 1110170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110174">SUSE bug 1110174</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15671/">CVE-2017-15671 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15671">CVE-2017-15671 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577991" comment="glibc-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577992" comment="glibc-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577993" comment="glibc-devel-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577994" comment="glibc-devel-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577995" comment="glibc-html-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577996" comment="glibc-i18ndata-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577997" comment="glibc-info-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577998" comment="glibc-locale-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577999" comment="glibc-locale-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578000" comment="glibc-profile-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578001" comment="glibc-profile-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578002" comment="nscd-2.11.3-17.110.24.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577991" comment="glibc-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577992" comment="glibc-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577993" comment="glibc-devel-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577994" comment="glibc-devel-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577995" comment="glibc-html-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577996" comment="glibc-i18ndata-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577997" comment="glibc-info-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577998" comment="glibc-locale-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577999" comment="glibc-locale-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578000" comment="glibc-profile-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578001" comment="glibc-profile-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578002" comment="nscd-2.11.3-17.110.24.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218651" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1127223" ref_url="https://bugzilla.suse.com/1127223" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-5155" ref_url="https://www.suse.com/security/cve/CVE-2009-5155/" source="CVE"/>
		<description>
This update for glibc fixes the following issue:

Security issue fixed:

- CVE-2009-5155: Fixed a local denial of service inside the parse_reg_exp in posix/regcomp.c (bsc#1127223).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1127223">SUSE bug 1127223</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2009-5155/">CVE-2009-5155 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-5155">CVE-2009-5155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578003" comment="glibc-2.11.3-17.110.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578004" comment="glibc-32bit-2.11.3-17.110.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578005" comment="glibc-devel-2.11.3-17.110.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578006" comment="glibc-devel-32bit-2.11.3-17.110.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578007" comment="glibc-html-2.11.3-17.110.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578008" comment="glibc-i18ndata-2.11.3-17.110.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578009" comment="glibc-info-2.11.3-17.110.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578010" comment="glibc-locale-2.11.3-17.110.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578011" comment="glibc-locale-32bit-2.11.3-17.110.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578012" comment="glibc-profile-2.11.3-17.110.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578013" comment="glibc-profile-32bit-2.11.3-17.110.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578014" comment="nscd-2.11.3-17.110.30.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218652" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1127308" ref_url="https://bugzilla.suse.com/1127308" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9169" ref_url="https://www.suse.com/security/cve/CVE-2019-9169/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

Security issue fixed:

- CVE-2019-9169: Fixed heap-based buffer over-read via an attempted case-insensitive regular-expression match (bsc#1127308).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-20"/>
	<updated date="2019-08-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1127308">SUSE bug 1127308</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9169/">CVE-2019-9169 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9169">CVE-2019-9169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578015" comment="glibc-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578016" comment="glibc-32bit-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578017" comment="glibc-devel-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578018" comment="glibc-devel-32bit-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578019" comment="glibc-html-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578020" comment="glibc-i18ndata-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578021" comment="glibc-info-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578022" comment="glibc-locale-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578023" comment="glibc-locale-32bit-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578024" comment="glibc-profile-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578025" comment="glibc-profile-32bit-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578026" comment="nscd-2.11.3-17.110.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218653" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186489" ref_url="https://bugzilla.suse.com/1186489" source="BUGZILLA"/>
		<reference ref_id="1187911" ref_url="https://bugzilla.suse.com/1187911" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33574" ref_url="https://www.suse.com/security/cve/CVE-2021-33574/" source="CVE"/>
		<reference ref_id="CVE-2021-35942" ref_url="https://www.suse.com/security/cve/CVE-2021-35942/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2021-33574: Use __pthread_attr_copy in mq_notify (bsc#1186489)
- CVE-2021-35942: wordexp: handle overflow in positional parameter number (bsc#1187911)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-04"/>
	<updated date="2021-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186489">SUSE bug 1186489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187911">SUSE bug 1187911</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33574/">CVE-2021-33574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">CVE-2021-33574 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35942/">CVE-2021-35942 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">CVE-2021-35942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634748" comment="glibc-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634749" comment="glibc-32bit-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634750" comment="glibc-devel-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634751" comment="glibc-devel-32bit-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634752" comment="glibc-html-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634753" comment="glibc-i18ndata-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634754" comment="glibc-info-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634755" comment="glibc-locale-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634756" comment="glibc-locale-32bit-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634757" comment="glibc-profile-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634758" comment="glibc-profile-32bit-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634759" comment="nscd-2.11.3-17.110.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218654" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1193615" ref_url="https://bugzilla.suse.com/1193615" source="BUGZILLA"/>
		<reference ref_id="1193616" ref_url="https://bugzilla.suse.com/1193616" source="BUGZILLA"/>
		<reference ref_id="1194640" ref_url="https://bugzilla.suse.com/1194640" source="BUGZILLA"/>
		<reference ref_id="1194768" ref_url="https://bugzilla.suse.com/1194768" source="BUGZILLA"/>
		<reference ref_id="1194770" ref_url="https://bugzilla.suse.com/1194770" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8982" ref_url="https://www.suse.com/security/cve/CVE-2015-8982/" source="CVE"/>
		<reference ref_id="CVE-2015-8983" ref_url="https://www.suse.com/security/cve/CVE-2015-8983/" source="CVE"/>
		<reference ref_id="CVE-2021-3999" ref_url="https://www.suse.com/security/cve/CVE-2021-3999/" source="CVE"/>
		<reference ref_id="CVE-2022-23218" ref_url="https://www.suse.com/security/cve/CVE-2022-23218/" source="CVE"/>
		<reference ref_id="CVE-2022-23219" ref_url="https://www.suse.com/security/cve/CVE-2022-23219/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2022-23219: Fixed buffer overflow in sunrpc clnt_create for 'unix' (bsc#1194768, BZ #22542)
- CVE-2022-23218: Fixed buffer overflow in sunrpc svcunix_create (bsc#1194770, BZ #28768)
- CVE-2021-3999: Fixed in getcwd to set errno to ERANGE for size == 1 (bsc#1194640, BZ #28769)
- CVE-2015-8983: Fixed _IO_wstr_overflow integer overflow (bsc#1193615, BZ #17269)
- CVE-2015-8982: Fixed memory handling in strxfrm_l (bsc#1193616, BZ #16009)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193615">SUSE bug 1193615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193616">SUSE bug 1193616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194640">SUSE bug 1194640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194768">SUSE bug 1194768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194770">SUSE bug 1194770</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8982/">CVE-2015-8982 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8982">CVE-2015-8982 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2015-8983/">CVE-2015-8983 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8983">CVE-2015-8983 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3999/">CVE-2021-3999 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3999">CVE-2021-3999 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23218/">CVE-2022-23218 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">CVE-2022-23218 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23219/">CVE-2022-23219 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">CVE-2022-23219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673411" comment="glibc-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673412" comment="glibc-32bit-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673413" comment="glibc-devel-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673414" comment="glibc-devel-32bit-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673415" comment="glibc-html-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673416" comment="glibc-i18ndata-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673417" comment="glibc-info-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673418" comment="glibc-locale-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673419" comment="glibc-locale-32bit-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673420" comment="glibc-profile-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673421" comment="glibc-profile-32bit-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673422" comment="nscd-2.11.3-17.110.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218655" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1018158" ref_url="https://bugzilla.suse.com/1018158" source="BUGZILLA"/>
		<reference ref_id="1178386" ref_url="https://bugzilla.suse.com/1178386" source="BUGZILLA"/>
		<reference ref_id="1179694" ref_url="https://bugzilla.suse.com/1179694" source="BUGZILLA"/>
		<reference ref_id="1179721" ref_url="https://bugzilla.suse.com/1179721" source="BUGZILLA"/>
		<reference ref_id="1181505" ref_url="https://bugzilla.suse.com/1181505" source="BUGZILLA"/>
		<reference ref_id="1182117" ref_url="https://bugzilla.suse.com/1182117" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25013" ref_url="https://www.suse.com/security/cve/CVE-2019-25013/" source="CVE"/>
		<reference ref_id="CVE-2020-27618" ref_url="https://www.suse.com/security/cve/CVE-2020-27618/" source="CVE"/>
		<reference ref_id="CVE-2020-29562" ref_url="https://www.suse.com/security/cve/CVE-2020-29562/" source="CVE"/>
		<reference ref_id="CVE-2020-29573" ref_url="https://www.suse.com/security/cve/CVE-2020-29573/" source="CVE"/>
		<reference ref_id="CVE-2021-3326" ref_url="https://www.suse.com/security/cve/CVE-2021-3326/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2020-29573: x86: printf was hardened against non-normal long double values (bsc#1179721, BZ #26649)
- CVE-2021-3326: Fix assertion failure in gconv ISO-2022-JP-3 module (bsc#1181505, BZ #27256)
- CVE-2019-25013: Fix buffer overrun in EUC-KR conversion module (bsc#1182117, BZ #24973)
- CVE-2020-27618: Accept redundant shift sequences in IBM1364 iconv (bsc#1178386, BZ #26224)
- CVE-2020-29562: Fix incorrect UCS4 inner loop bounds in iconv (bsc#1179694, BZ #26923)

- Schedule nscd cache pruning more accurately from re-added values (bsc#1018158)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-24"/>
	<updated date="2022-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1018158">SUSE bug 1018158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178386">SUSE bug 1178386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179694">SUSE bug 1179694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179721">SUSE bug 1179721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181505">SUSE bug 1181505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182117">SUSE bug 1182117</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-25013/">CVE-2019-25013 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">CVE-2019-25013 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27618/">CVE-2020-27618 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27618">CVE-2020-27618 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29562/">CVE-2020-29562 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29562">CVE-2020-29562 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29573/">CVE-2020-29573 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29573">CVE-2020-29573 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3326/">CVE-2021-3326 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3326">CVE-2021-3326 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009991056" comment="glibc-2.11.3-17.110.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991057" comment="glibc-32bit-2.11.3-17.110.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991058" comment="glibc-devel-2.11.3-17.110.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991059" comment="glibc-devel-32bit-2.11.3-17.110.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991060" comment="glibc-html-2.11.3-17.110.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991061" comment="glibc-i18ndata-2.11.3-17.110.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991062" comment="glibc-info-2.11.3-17.110.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991063" comment="glibc-locale-2.11.3-17.110.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991064" comment="glibc-locale-32bit-2.11.3-17.110.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991065" comment="glibc-profile-2.11.3-17.110.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991066" comment="glibc-profile-32bit-2.11.3-17.110.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009991067" comment="nscd-2.11.3-17.110.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218656" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1193625" ref_url="https://bugzilla.suse.com/1193625" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8985" ref_url="https://www.suse.com/security/cve/CVE-2015-8985/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2015-8985: Fixed assertion failure in pop_fail_stack when executing
  a malformed regexp (bsc#1193625)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-19"/>
	<updated date="2022-10-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1193625">SUSE bug 1193625</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8985/">CVE-2015-8985 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8985">CVE-2015-8985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992780" comment="glibc-2.11.3-17.110.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992781" comment="glibc-32bit-2.11.3-17.110.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992782" comment="glibc-devel-2.11.3-17.110.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992783" comment="glibc-devel-32bit-2.11.3-17.110.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992784" comment="glibc-html-2.11.3-17.110.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992785" comment="glibc-i18ndata-2.11.3-17.110.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992786" comment="glibc-info-2.11.3-17.110.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992787" comment="glibc-locale-2.11.3-17.110.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992788" comment="glibc-locale-32bit-2.11.3-17.110.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992789" comment="glibc-profile-2.11.3-17.110.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992790" comment="glibc-profile-32bit-2.11.3-17.110.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992791" comment="nscd-2.11.3-17.110.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218657" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122729" ref_url="https://bugzilla.suse.com/1122729" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10739" ref_url="https://www.suse.com/security/cve/CVE-2016-10739/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2016-10739: getaddrinfo: Fully parse IPv4 address strings (bsc#1122729, BZ #20018)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-13"/>
	<updated date="2023-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1122729">SUSE bug 1122729</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10739/">CVE-2016-10739 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10739">CVE-2016-10739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992792" comment="glibc-2.11.3-17.110.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992793" comment="glibc-32bit-2.11.3-17.110.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992794" comment="glibc-devel-2.11.3-17.110.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992795" comment="glibc-devel-32bit-2.11.3-17.110.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992796" comment="glibc-html-2.11.3-17.110.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992797" comment="glibc-i18ndata-2.11.3-17.110.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992798" comment="glibc-info-2.11.3-17.110.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992799" comment="glibc-locale-2.11.3-17.110.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992800" comment="glibc-locale-32bit-2.11.3-17.110.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992801" comment="glibc-profile-2.11.3-17.110.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992802" comment="glibc-profile-32bit-2.11.3-17.110.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992803" comment="nscd-2.11.3-17.110.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218658" version="1" class="patch">
	<metadata>
		<title>Security update for gmp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192717" ref_url="https://bugzilla.suse.com/1192717" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43618" ref_url="https://www.suse.com/security/cve/CVE-2021-43618/" source="CVE"/>
		<description>
This update for gmp fixes the following issues:

- CVE-2021-43618: Fixed buffer overflow on malformed input to mpz_inp_raw (bsc#1192717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192717">SUSE bug 1192717</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43618/">CVE-2021-43618 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43618">CVE-2021-43618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658238" comment="gmp-4.2.3-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658239" comment="gmp-32bit-4.2.3-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218659" version="1" class="patch">
	<metadata>
		<title>Security update for gnome-session (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1048274" ref_url="https://bugzilla.suse.com/1048274" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11171" ref_url="https://www.suse.com/security/cve/CVE-2017-11171/" source="CVE"/>
		<description>


This update for gnome-session fixes the following issues:

- CVE-2017-11171: Fix a denial of service condition. an unauthenticated local user
  can create ICE connections, causing a file descriptor leak in
  gnome-session (bsc#1048274).

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-16"/>
	<updated date="2017-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1048274">SUSE bug 1048274</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11171/">CVE-2017-11171 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11171">CVE-2017-11171 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571906" comment="gnome-session-2.28.0-3.11.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571907" comment="gnome-session-lang-2.28.0-3.11.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218660" version="1" class="patch">
	<metadata>
		<title>Security update for gnuplot (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1044638" ref_url="https://bugzilla.suse.com/1044638" source="BUGZILLA"/>
		<reference ref_id="1117463" ref_url="https://bugzilla.suse.com/1117463" source="BUGZILLA"/>
		<reference ref_id="1117464" ref_url="https://bugzilla.suse.com/1117464" source="BUGZILLA"/>
		<reference ref_id="1117465" ref_url="https://bugzilla.suse.com/1117465" source="BUGZILLA"/>
		<reference ref_id="375175" ref_url="https://bugzilla.suse.com/375175" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9670" ref_url="https://www.suse.com/security/cve/CVE-2017-9670/" source="CVE"/>
		<reference ref_id="CVE-2018-19490" ref_url="https://www.suse.com/security/cve/CVE-2018-19490/" source="CVE"/>
		<reference ref_id="CVE-2018-19491" ref_url="https://www.suse.com/security/cve/CVE-2018-19491/" source="CVE"/>
		<reference ref_id="CVE-2018-19492" ref_url="https://www.suse.com/security/cve/CVE-2018-19492/" source="CVE"/>
		<description>
This update for gnuplot fixes the following issues:

Security issues fixed:

- CVE-2018-19492: Fixed a buffer overflow in cairotrm_options function (bsc#1117463)
- CVE-2018-19491: Fixed a buffer overflow in the PS_options function (bsc#1117464)
- CVE-2018-19490: Fixed a heap-based buffer overflow in the df_generate_ascii_array_entry function (bsc#1117465)
- CVE-2017-9670: Fixed a uninitialized stack variable vulnerability which could lead to a
  Denial of Service (bsc#1044638)

Non-security issues fixed:

- postscript output does not show any German 'umlauts' (bsc#375175)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1044638">SUSE bug 1044638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117464">SUSE bug 1117464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117465">SUSE bug 1117465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/375175">SUSE bug 375175</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9670/">CVE-2017-9670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9670">CVE-2017-9670 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19490/">CVE-2018-19490 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19490">CVE-2018-19490 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19491/">CVE-2018-19491 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19491">CVE-2018-19491 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19492/">CVE-2018-19492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19492">CVE-2018-19492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571908" comment="gnuplot-4.2.3-7.3.22 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218661" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="821818" ref_url="https://bugzilla.suse.com/821818" source="BUGZILLA"/>
		<reference ref_id="835760" ref_url="https://bugzilla.suse.com/835760" source="BUGZILLA"/>
		<reference ref_id="865804" ref_url="https://bugzilla.suse.com/865804" source="BUGZILLA"/>
		<reference ref_id="865993" ref_url="https://bugzilla.suse.com/865993" source="BUGZILLA"/>
		<reference ref_id="880730" ref_url="https://bugzilla.suse.com/880730" source="BUGZILLA"/>
		<reference ref_id="880910" ref_url="https://bugzilla.suse.com/880910" source="BUGZILLA"/>
		<reference ref_id="919938" ref_url="https://bugzilla.suse.com/919938" source="BUGZILLA"/>
		<reference ref_id="921684" ref_url="https://bugzilla.suse.com/921684" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-5138" ref_url="https://www.suse.com/security/cve/CVE-2009-5138/" source="CVE"/>
		<reference ref_id="CVE-2013-2116" ref_url="https://www.suse.com/security/cve/CVE-2013-2116/" source="CVE"/>
		<reference ref_id="CVE-2014-0092" ref_url="https://www.suse.com/security/cve/CVE-2014-0092/" source="CVE"/>
		<reference ref_id="CVE-2014-3466" ref_url="https://www.suse.com/security/cve/CVE-2014-3466/" source="CVE"/>
		<reference ref_id="CVE-2014-8155" ref_url="https://www.suse.com/security/cve/CVE-2014-8155/" source="CVE"/>
		<reference ref_id="CVE-2015-0282" ref_url="https://www.suse.com/security/cve/CVE-2015-0282/" source="CVE"/>
		<reference ref_id="CVE-2015-0294" ref_url="https://www.suse.com/security/cve/CVE-2015-0294/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001333.html" source="SUSE-SU"/>
		<description>

GnuTLS has been patched to ensure proper parsing of session ids during the 
TLS/SSL handshake. Additionally, three issues inherited from libtasn1 have 
been fixed.

Further information is available at 
http://www.gnutls.org/security.html#GNUTLS-SA-2014-3
&lt;http://www.gnutls.org/security.html#GNUTLS-SA-2014-3&gt;

These security issues have been fixed:

    * Possible memory corruption during connect (CVE-2014-3466)
    * Multiple boundary check issues could allow DoS (CVE-2014-3467)
    * asn1_get_bit_der() can return negative bit length (CVE-2014-3468)
    * Possible DoS by NULL pointer dereference (CVE-2014-3469)

Security Issue references:

    * CVE-2014-3466
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-03"/>
	<updated date="2014-06-03"/>
	<bugzilla href="https://bugzilla.suse.com/821818">SUSE bug 821818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835760">SUSE bug 835760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865804">SUSE bug 865804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865993">SUSE bug 865993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880730">SUSE bug 880730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880910">SUSE bug 880910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919938">SUSE bug 919938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921684">SUSE bug 921684</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5138/">CVE-2009-5138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5138">CVE-2009-5138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2116/">CVE-2013-2116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2116">CVE-2013-2116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0092/">CVE-2014-0092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0092">CVE-2014-0092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3466/">CVE-2014-3466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3466">CVE-2014-3466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8155/">CVE-2014-8155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8155">CVE-2014-8155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0282/">CVE-2015-0282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0282">CVE-2015-0282 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0294/">CVE-2015-0294 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0294">CVE-2015-0294 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578027" comment="gnutls-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563356" comment="libgnutls-extra26-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578028" comment="libgnutls26-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578029" comment="libgnutls26-32bit-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578030" comment="libgnutls26-x86-2.4.1-24.39.51.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578027" comment="gnutls-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563356" comment="libgnutls-extra26-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578028" comment="libgnutls26-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578029" comment="libgnutls26-32bit-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578030" comment="libgnutls26-x86-2.4.1-24.39.51.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578027" comment="gnutls-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563356" comment="libgnutls-extra26-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578028" comment="libgnutls26-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578029" comment="libgnutls26-32bit-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578030" comment="libgnutls26-x86-2.4.1-24.39.51.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218662" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="925499" ref_url="https://bugzilla.suse.com/925499" source="BUGZILLA"/>
		<reference ref_id="932026" ref_url="https://bugzilla.suse.com/932026" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001587.html" source="SUSE-SU"/>
		<description>


This security update of gnutls fixes the following issues:

- use minimal padding for CBC, the default random length padding
  causes problems with some servers (bsc#925499)
  * added gnutls-use_minimal_cbc_padding.patch
- use the default DH minimum for gnutls-cli instead of hardcoding 512
  * CVE-2015-4000 (Logjam) (bsc#932026)
  * added gnutls-CVE-2015-4000-logjam-use_the_default_DH_min_for_cli.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-14"/>
	<updated date="2015-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/925499">SUSE bug 925499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932026">SUSE bug 932026</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578031" comment="gnutls-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563359" comment="libgnutls-extra26-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578032" comment="libgnutls26-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578033" comment="libgnutls26-32bit-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578034" comment="libgnutls26-x86-2.4.1-24.39.57.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578031" comment="gnutls-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563359" comment="libgnutls-extra26-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578032" comment="libgnutls26-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578033" comment="libgnutls26-32bit-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578034" comment="libgnutls26-x86-2.4.1-24.39.57.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578031" comment="gnutls-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563359" comment="libgnutls-extra26-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578032" comment="libgnutls26-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578033" comment="libgnutls26-32bit-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578034" comment="libgnutls26-x86-2.4.1-24.39.57.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218663" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="924828" ref_url="https://bugzilla.suse.com/924828" source="BUGZILLA"/>
		<reference ref_id="947271" ref_url="https://bugzilla.suse.com/947271" source="BUGZILLA"/>
		<reference ref_id="957568" ref_url="https://bugzilla.suse.com/957568" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<reference ref_id="CVE-2015-8313" ref_url="https://www.suse.com/security/cve/CVE-2015-8313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001791.html" source="SUSE-SU"/>
		<description>

This update for gnutls fixes the following security issues:

- CVE-2015-8313: First byte of the padding in CBC mode is not checked (bsc#957568)
- CVE-2015-2806: Two-byte stack overflow in asn1_der_decoding (bsc#924828)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-11"/>
	<updated date="2016-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924828">SUSE bug 924828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947271">SUSE bug 947271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957568">SUSE bug 957568</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2806">CVE-2015-2806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8313/">CVE-2015-8313 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8313">CVE-2015-8313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578035" comment="gnutls-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563362" comment="libgnutls-extra26-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578036" comment="libgnutls26-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578037" comment="libgnutls26-32bit-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578038" comment="libgnutls26-x86-2.4.1-24.39.60.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578035" comment="gnutls-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563362" comment="libgnutls-extra26-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578036" comment="libgnutls26-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578037" comment="libgnutls26-32bit-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578038" comment="libgnutls26-x86-2.4.1-24.39.60.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578035" comment="gnutls-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563362" comment="libgnutls-extra26-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578036" comment="libgnutls26-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578037" comment="libgnutls26-32bit-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578038" comment="libgnutls26-x86-2.4.1-24.39.60.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218664" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1005879" ref_url="https://bugzilla.suse.com/1005879" source="BUGZILLA"/>
		<reference ref_id="1018832" ref_url="https://bugzilla.suse.com/1018832" source="BUGZILLA"/>
		<reference ref_id="961491" ref_url="https://bugzilla.suse.com/961491" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2017-5335" ref_url="https://www.suse.com/security/cve/CVE-2017-5335/" source="CVE"/>
		<reference ref_id="CVE-2017-5336" ref_url="https://www.suse.com/security/cve/CVE-2017-5336/" source="CVE"/>
		<reference ref_id="CVE-2017-5337" ref_url="https://www.suse.com/security/cve/CVE-2017-5337/" source="CVE"/>
		<description>

This update for gnutls fixes the following issues:

- Malformed asn1 definitions could cause a segmentation fault in the asn1 definition parser (bsc#961491).
- CVE-2016-8610: Remote denial of service in SSL alert handling (bsc#1005879).
- CVE-2017-5335: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).
- CVE-2017-5336: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).
- CVE-2017-5337: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-27"/>
	<updated date="2017-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005879">SUSE bug 1005879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018832">SUSE bug 1018832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961491">SUSE bug 961491</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8610">CVE-2016-8610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5335/">CVE-2017-5335 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5335">CVE-2017-5335 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5336/">CVE-2017-5336 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5336">CVE-2017-5336 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5337/">CVE-2017-5337 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5337">CVE-2017-5337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571918" comment="gnutls-2.4.1-24.39.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578039" comment="libgnutls-extra26-2.4.1-24.39.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571919" comment="libgnutls26-2.4.1-24.39.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571920" comment="libgnutls26-32bit-2.4.1-24.39.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218665" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1034173" ref_url="https://bugzilla.suse.com/1034173" source="BUGZILLA"/>
		<reference ref_id="1038337" ref_url="https://bugzilla.suse.com/1038337" source="BUGZILLA"/>
		<reference ref_id="1040621" ref_url="https://bugzilla.suse.com/1040621" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6891" ref_url="https://www.suse.com/security/cve/CVE-2017-6891/" source="CVE"/>
		<reference ref_id="CVE-2017-7869" ref_url="https://www.suse.com/security/cve/CVE-2017-7869/" source="CVE"/>
		<description>
This update for gnutls fixes the following issues:

- GNUTLS-SA-2017-3 / CVE-2017-7869: An out-of-bounds write in OpenPGP certificate decoding was fixed (bsc#1034173)
- CVE-2017-6891: A potential stack buffer overflow in the bundled libtasn1 was fixed (bsc#1040621)
- An address read of 4 bytes past the end of buffer in OpenPGP certificate parsing was fixed (bsc#1038337)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-15"/>
	<updated date="2017-07-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034173">SUSE bug 1034173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038337">SUSE bug 1038337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040621">SUSE bug 1040621</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6891/">CVE-2017-6891 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6891">CVE-2017-6891 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7869/">CVE-2017-7869 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7869">CVE-2017-7869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571921" comment="gnutls-2.4.1-24.39.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578040" comment="libgnutls-extra26-2.4.1-24.39.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571922" comment="libgnutls26-2.4.1-24.39.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571923" comment="libgnutls26-32bit-2.4.1-24.39.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218666" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1047002" ref_url="https://bugzilla.suse.com/1047002" source="BUGZILLA"/>
		<reference ref_id="1105460" ref_url="https://bugzilla.suse.com/1105460" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10790" ref_url="https://www.suse.com/security/cve/CVE-2017-10790/" source="CVE"/>
		<reference ref_id="CVE-2018-10846" ref_url="https://www.suse.com/security/cve/CVE-2018-10846/" source="CVE"/>
		<description>
This update for gnutls fixes the following issues:

Security issues fixed:

- CVE-2018-10846: Improve mitigations against Lucky 13 class of attacks (PRIME + PROBE) (bsc#1105460).
- CVE-2017-10790: Fixed a denial of service in the _asn1_check_identifier() function (bsc#1047002).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-21"/>
	<updated date="2019-05-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047002">SUSE bug 1047002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105460">SUSE bug 1105460</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10790/">CVE-2017-10790 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10790">CVE-2017-10790 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10846/">CVE-2018-10846 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10846">CVE-2018-10846 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571924" comment="gnutls-2.4.1-24.39.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578041" comment="libgnutls-extra26-2.4.1-24.39.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571925" comment="libgnutls26-2.4.1-24.39.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571926" comment="libgnutls26-32bit-2.4.1-24.39.76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218667" version="1" class="patch">
	<metadata>
		<title>Security update for GPG2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="780943" ref_url="https://bugzilla.suse.com/780943" source="BUGZILLA"/>
		<reference ref_id="798465" ref_url="https://bugzilla.suse.com/798465" source="BUGZILLA"/>
		<reference ref_id="808958" ref_url="https://bugzilla.suse.com/808958" source="BUGZILLA"/>
		<reference ref_id="840510" ref_url="https://bugzilla.suse.com/840510" source="BUGZILLA"/>
		<reference ref_id="844175" ref_url="https://bugzilla.suse.com/844175" source="BUGZILLA"/>
		<reference ref_id="884130" ref_url="https://bugzilla.suse.com/884130" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6085" ref_url="https://www.suse.com/security/cve/CVE-2012-6085/" source="CVE"/>
		<reference ref_id="CVE-2013-4351" ref_url="https://www.suse.com/security/cve/CVE-2013-4351/" source="CVE"/>
		<reference ref_id="CVE-2013-4402" ref_url="https://www.suse.com/security/cve/CVE-2013-4402/" source="CVE"/>
		<reference ref_id="CVE-2014-4617" ref_url="https://www.suse.com/security/cve/CVE-2014-4617/" source="CVE"/>
		<description>

GPG2 has been updated to fix a possible denial of service.

This security issue has been fixed:

    * Denial of service through infinite loop with garbled compressed data
      packets (CVE-2014-4617)

Security Issues:

    * CVE-2014-4617
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-26"/>
	<updated date="2014-06-26"/>
	<bugzilla href="https://bugzilla.suse.com/780943">SUSE bug 780943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798465">SUSE bug 798465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808958">SUSE bug 808958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840510">SUSE bug 840510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844175">SUSE bug 844175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884130">SUSE bug 884130</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6085/">CVE-2012-6085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6085">CVE-2012-6085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4351/">CVE-2013-4351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4351">CVE-2013-4351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4402/">CVE-2013-4402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4402">CVE-2013-4402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4617/">CVE-2014-4617 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4617">CVE-2014-4617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578042" comment="gpg2-2.0.9-25.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578043" comment="gpg2-lang-2.0.9-25.33.39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578042" comment="gpg2-2.0.9-25.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578043" comment="gpg2-lang-2.0.9-25.33.39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578042" comment="gpg2-2.0.9-25.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578043" comment="gpg2-lang-2.0.9-25.33.39.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218668" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="918089" ref_url="https://bugzilla.suse.com/918089" source="BUGZILLA"/>
		<reference ref_id="918090" ref_url="https://bugzilla.suse.com/918090" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1606" ref_url="https://www.suse.com/security/cve/CVE-2015-1606/" source="CVE"/>
		<reference ref_id="CVE-2015-1607" ref_url="https://www.suse.com/security/cve/CVE-2015-1607/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001708.html" source="SUSE-SU"/>
		<description>

This update for gpg2 fixes the following issues: 

- Fix cve-2015-1606 (bsc#918089)
  * Invalid memory read using a garbled keyring
  * 0001-Gpg-prevent-an-invalid-memory-read-using-a-garbled-k.patch
- Fix cve-2015-1607 (bsc#918090)
  * Memcpy with overlapping ranges
  * 0001-Use-inline-functions-to-convert-buffer-data-to-scala.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-02"/>
	<updated date="2015-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/918089">SUSE bug 918089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918090">SUSE bug 918090</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1606/">CVE-2015-1606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1606">CVE-2015-1606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1607/">CVE-2015-1607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1607">CVE-2015-1607 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578044" comment="gpg2-2.0.9-25.33.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578045" comment="gpg2-lang-2.0.9-25.33.41.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578044" comment="gpg2-2.0.9-25.33.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578045" comment="gpg2-lang-2.0.9-25.33.41.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578044" comment="gpg2-2.0.9-25.33.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578045" comment="gpg2-lang-2.0.9-25.33.41.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218669" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1096745" ref_url="https://bugzilla.suse.com/1096745" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12020" ref_url="https://www.suse.com/security/cve/CVE-2018-12020/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004193.html" source="SUSE-SU"/>
		<description>
This update for gpg2 fixes the following issues:

- CVE-2018-12020: GnuPG mishandled the original filename during decryption and
  verification actions, which allowed remote attackers to spoof the output that
  GnuPG sends on file descriptor 2 to other programs that use the '--status-fd 2'
  option (bsc#1096745)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-15"/>
	<updated date="2018-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096745">SUSE bug 1096745</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12020/">CVE-2018-12020 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12020">CVE-2018-12020 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578046" comment="gpg2-2.0.9-25.33.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578047" comment="gpg2-lang-2.0.9-25.33.42.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578046" comment="gpg2-2.0.9-25.33.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578047" comment="gpg2-lang-2.0.9-25.33.42.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218670" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1124847" ref_url="https://bugzilla.suse.com/1124847" source="BUGZILLA"/>
		<reference ref_id="1141093" ref_url="https://bugzilla.suse.com/1141093" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13050" ref_url="https://www.suse.com/security/cve/CVE-2019-13050/" source="CVE"/>
		<description>
This update for gpg2 fixes the following issues:

Security issue fixed:

- CVE-2019-13050: Fixed denial-of-service attacks via big keys. (bsc#1141093)

Non-security issue fixed:

- Allow coredumps in X11 desktop sessions (bsc#1124847).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-26"/>
	<updated date="2019-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124847">SUSE bug 1124847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141093">SUSE bug 1141093</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13050/">CVE-2019-13050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13050">CVE-2019-13050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571931" comment="gpg2-2.0.9-25.33.42.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571932" comment="gpg2-lang-2.0.9-25.33.42.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218671" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1201225" ref_url="https://bugzilla.suse.com/1201225" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-34903" ref_url="https://www.suse.com/security/cve/CVE-2022-34903/" source="CVE"/>
		<description>
This update for gpg2 fixes the following issues:

- CVE-2022-34903: Fixed a status injection vulnerability (bsc#1201225).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-26"/>
	<updated date="2022-07-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201225">SUSE bug 1201225</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34903/">CVE-2022-34903 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34903">CVE-2022-34903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992804" comment="gpg2-2.0.9-25.33.42.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992805" comment="gpg2-lang-2.0.9-25.33.42.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218672" version="1" class="patch">
	<metadata>
		<title>Security update for gpgme</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="890123" ref_url="https://bugzilla.suse.com/890123" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3564" ref_url="https://www.suse.com/security/cve/CVE-2014-3564/" source="CVE"/>
		<description>

This gpgme update fixes the following security issue:

    * bnc#890123: Fix possible overflow in gpgsm and uiserver engines
      (CVE-2014-3564)

Security Issues:

    * CVE-2014-3564
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3564&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-22"/>
	<updated date="2014-08-22"/>
	<bugzilla href="https://bugzilla.suse.com/890123">SUSE bug 890123</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3564/">CVE-2014-3564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3564">CVE-2014-3564 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578048" comment="gpgme-1.1.6-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578049" comment="libgpgme11-1.1.6-25.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578048" comment="gpgme-1.1.6-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578049" comment="libgpgme11-1.1.6-25.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578048" comment="gpgme-1.1.6-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578049" comment="libgpgme11-1.1.6-25.32.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218673" version="1" class="patch">
	<metadata>
		<title>Security update for graphviz (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1093447" ref_url="https://bugzilla.suse.com/1093447" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10196" ref_url="https://www.suse.com/security/cve/CVE-2018-10196/" source="CVE"/>
		<description>
This update for graphviz fixes the following issues:

- CVE-2018-10196: Fixed a null dereference in rebuild_vlis (bsc#1093447).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-30"/>
	<updated date="2020-10-30"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1093447">SUSE bug 1093447</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10196/">CVE-2018-10196 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10196">CVE-2018-10196 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571935" comment="graphviz-2.20.2-8.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571936" comment="graphviz-gd-2.20.2-8.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571937" comment="graphviz-gnome-2.20.2-8.3.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218674" version="1" class="patch">
	<metadata>
		<title>Security update for grep (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="795827" ref_url="https://bugzilla.suse.com/795827" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5667" ref_url="https://www.suse.com/security/cve/CVE-2012-5667/" source="CVE"/>
		<description>
This update for grep fixes the following issues:

- CVE-2012-5667: Fixed an integer overflow when reading long lines (bsc#795827).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/795827">SUSE bug 795827</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5667/">CVE-2012-5667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5667">CVE-2012-5667 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679679" comment="grep-2.7-5.7.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218675" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="884828" ref_url="https://bugzilla.suse.com/884828" source="BUGZILLA"/>
		<reference ref_id="884830" ref_url="https://bugzilla.suse.com/884830" source="BUGZILLA"/>
		<reference ref_id="946148" ref_url="https://bugzilla.suse.com/946148" source="BUGZILLA"/>
		<reference ref_id="952539" ref_url="https://bugzilla.suse.com/952539" source="BUGZILLA"/>
		<reference ref_id="954592" ref_url="https://bugzilla.suse.com/954592" source="BUGZILLA"/>
		<reference ref_id="956631" ref_url="https://bugzilla.suse.com/956631" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8370" ref_url="https://www.suse.com/security/cve/CVE-2015-8370/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001767.html" source="SUSE-SU"/>
		<description>
This update for grub2 provides the following fixes:

A security issues with a bufferoverflow when reading username and password was fixed (bsc#956631, CVE-2015-8370)

Bugs fixed:
- Expand list of grub.cfg search path in PV Xen guests for systems installed on btrfs
  snapshots. (bsc#946148, bsc#952539)
- Add grub.xen config searching path on boot partition. (bsc#884828)
- Add linux16 and initrd16 to grub.xen. (bsc#884830)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-29"/>
	<updated date="2015-12-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/884828">SUSE bug 884828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884830">SUSE bug 884830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946148">SUSE bug 946148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952539">SUSE bug 952539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954592">SUSE bug 954592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956631">SUSE bug 956631</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8370/">CVE-2015-8370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8370">CVE-2015-8370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566616" comment="grub2-x86_64-efi-2.00-0.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566617" comment="grub2-x86_64-xen-2.00-0.49.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566616" comment="grub2-x86_64-efi-2.00-0.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566617" comment="grub2-x86_64-xen-2.00-0.49.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566616" comment="grub2-x86_64-efi-2.00-0.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566617" comment="grub2-x86_64-xen-2.00-0.49.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218676" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1045063" ref_url="https://bugzilla.suse.com/1045063" source="BUGZILLA"/>
		<reference ref_id="1084632" ref_url="https://bugzilla.suse.com/1084632" source="BUGZILLA"/>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1173812" ref_url="https://bugzilla.suse.com/1173812" source="BUGZILLA"/>
		<reference ref_id="1174463" ref_url="https://bugzilla.suse.com/1174463" source="BUGZILLA"/>
		<reference ref_id="1174570" ref_url="https://bugzilla.suse.com/1174570" source="BUGZILLA"/>
		<reference ref_id="1174782" ref_url="https://bugzilla.suse.com/1174782" source="BUGZILLA"/>
		<reference ref_id="1175036" ref_url="https://bugzilla.suse.com/1175036" source="BUGZILLA"/>
		<reference ref_id="1175060" ref_url="https://bugzilla.suse.com/1175060" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9763" ref_url="https://www.suse.com/security/cve/CVE-2017-9763/" source="CVE"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="CVE-2020-14308" ref_url="https://www.suse.com/security/cve/CVE-2020-14308/" source="CVE"/>
		<reference ref_id="CVE-2020-14309" ref_url="https://www.suse.com/security/cve/CVE-2020-14309/" source="CVE"/>
		<reference ref_id="CVE-2020-14310" ref_url="https://www.suse.com/security/cve/CVE-2020-14310/" source="CVE"/>
		<reference ref_id="CVE-2020-14311" ref_url="https://www.suse.com/security/cve/CVE-2020-14311/" source="CVE"/>
		<reference ref_id="CVE-2020-15706" ref_url="https://www.suse.com/security/cve/CVE-2020-15706/" source="CVE"/>
		<reference ref_id="CVE-2020-15707" ref_url="https://www.suse.com/security/cve/CVE-2020-15707/" source="CVE"/>
		<description>
This update for grub2 fixes the following security issues:

- CVE-2017-9763: Fix a memory leak in grub_ext2_read_block. (bsc#1045063)

- CVE-2020-10713: Prevent parsing overflows from bypassing secure boot
  restrictions. (bsc#1168994)

- CVE-2020-14308 CVE-2020-14309, CVE-2020-14310, CVE-2020-14311: Avoid
  integer overflows. (bsc#1173812)

- CVE-2020-15706: Avoid a use-after-free when redefining a function during
  execution. (bsc#1174463)

- CVE-2020-15707: Fix integer overflows in initrd size handling.
  (bsc#1174570)

This update for grub2 fixes the following non-security issue:

- A potential regression has been fixed that would cause systems with an
  updated 'grub2' to boot no longer due to a missing 'grub-calloc' linker
  symbol. (bsc#1174782)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-17"/>
	<updated date="2020-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045063">SUSE bug 1045063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084632">SUSE bug 1084632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174463">SUSE bug 1174463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174570">SUSE bug 1174570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174782">SUSE bug 1174782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175036">SUSE bug 1175036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175060">SUSE bug 1175060</bugzilla>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9763/">CVE-2017-9763 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9763">CVE-2017-9763 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10713">CVE-2020-10713 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14308/">CVE-2020-14308 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14308">CVE-2020-14308 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14309/">CVE-2020-14309 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14309">CVE-2020-14309 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14310/">CVE-2020-14310 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14310">CVE-2020-14310 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14311/">CVE-2020-14311 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14311">CVE-2020-14311 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15706/">CVE-2020-15706 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15706">CVE-2020-15706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15707/">CVE-2020-15707 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15707">CVE-2020-15707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578050" comment="grub2-x86_64-efi-2.00-0.53.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578051" comment="grub2-x86_64-xen-2.00-0.53.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218677" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174421" ref_url="https://bugzilla.suse.com/1174421" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15705" ref_url="https://www.suse.com/security/cve/CVE-2020-15705/" source="CVE"/>
		<description>
This update for grub2 fixes the following issues:

- CVE-2020-15705: Fail kernel validation without shim protocol (bsc#1174421).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174421">SUSE bug 1174421</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15705/">CVE-2020-15705 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15705">CVE-2020-15705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578052" comment="grub2-x86_64-efi-2.00-0.53.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578053" comment="grub2-x86_64-xen-2.00-0.53.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218678" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1175970" ref_url="https://bugzilla.suse.com/1175970" source="BUGZILLA"/>
		<reference ref_id="1176711" ref_url="https://bugzilla.suse.com/1176711" source="BUGZILLA"/>
		<reference ref_id="1177883" ref_url="https://bugzilla.suse.com/1177883" source="BUGZILLA"/>
		<reference ref_id="1179264" ref_url="https://bugzilla.suse.com/1179264" source="BUGZILLA"/>
		<reference ref_id="1179265" ref_url="https://bugzilla.suse.com/1179265" source="BUGZILLA"/>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<reference ref_id="1182262" ref_url="https://bugzilla.suse.com/1182262" source="BUGZILLA"/>
		<reference ref_id="1182263" ref_url="https://bugzilla.suse.com/1182263" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9763" ref_url="https://www.suse.com/security/cve/CVE-2017-9763/" source="CVE"/>
		<reference ref_id="CVE-2020-14372" ref_url="https://www.suse.com/security/cve/CVE-2020-14372/" source="CVE"/>
		<reference ref_id="CVE-2020-25632" ref_url="https://www.suse.com/security/cve/CVE-2020-25632/" source="CVE"/>
		<reference ref_id="CVE-2020-25647" ref_url="https://www.suse.com/security/cve/CVE-2020-25647/" source="CVE"/>
		<reference ref_id="CVE-2020-27749" ref_url="https://www.suse.com/security/cve/CVE-2020-27749/" source="CVE"/>
		<reference ref_id="CVE-2020-27779" ref_url="https://www.suse.com/security/cve/CVE-2020-27779/" source="CVE"/>
		<reference ref_id="CVE-2021-20225" ref_url="https://www.suse.com/security/cve/CVE-2021-20225/" source="CVE"/>
		<reference ref_id="CVE-2021-20233" ref_url="https://www.suse.com/security/cve/CVE-2021-20233/" source="CVE"/>
		<description>
This update for grub2 fixes the following issues:

grub2 now implements the new 'SBAT' method for SHIM based secure boot revocation. (bsc#1182057)

Following security issues are fixed that can violate secure boot constraints:

- CVE-2020-25632: Fixed a use-after-free in rmmod command (bsc#1176711)
- CVE-2020-25647: Fixed an out-of-bound write in grub_usb_device_initialize() (bsc#1177883)
- CVE-2020-27749: Fixed a stack buffer overflow in grub_parser_split_cmdline (bsc#1179264)
- CVE-2020-27779, CVE-2020-14372: Disallow cutmem and acpi commands in secure boot mode (bsc#1179265 bsc#1175970)
- CVE-2021-20225: Fixed a heap out-of-bounds write in short form option parser (bsc#1182262)
- CVE-2021-20233: Fixed a heap out-of-bound write due to mis-calculation of space required for quoting (bsc#1182263)


grub2 was updated to version 2.02, same as in SUSE Linux Enterprise 12 SP3.

		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175970">SUSE bug 1175970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176711">SUSE bug 1176711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177883">SUSE bug 1177883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179264">SUSE bug 1179264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179265">SUSE bug 1179265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182262">SUSE bug 1182262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182263">SUSE bug 1182263</bugzilla>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9763/">CVE-2017-9763 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9763">CVE-2017-9763 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14372/">CVE-2020-14372 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14372">CVE-2020-14372 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25632/">CVE-2020-25632 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25632">CVE-2020-25632 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25647/">CVE-2020-25647 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25647">CVE-2020-25647 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27749/">CVE-2020-27749 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27749">CVE-2020-27749 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27779/">CVE-2020-27779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27779">CVE-2020-27779 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20225/">CVE-2021-20225 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20225">CVE-2021-20225 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20233/">CVE-2021-20233 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20233">CVE-2021-20233 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578054" comment="grub2-x86_64-efi-2.02-0.53.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578055" comment="grub2-x86_64-xen-2.02-0.53.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218679" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1191184" ref_url="https://bugzilla.suse.com/1191184" source="BUGZILLA"/>
		<reference ref_id="1191185" ref_url="https://bugzilla.suse.com/1191185" source="BUGZILLA"/>
		<reference ref_id="1191186" ref_url="https://bugzilla.suse.com/1191186" source="BUGZILLA"/>
		<reference ref_id="1193282" ref_url="https://bugzilla.suse.com/1193282" source="BUGZILLA"/>
		<reference ref_id="1198460" ref_url="https://bugzilla.suse.com/1198460" source="BUGZILLA"/>
		<reference ref_id="1198493" ref_url="https://bugzilla.suse.com/1198493" source="BUGZILLA"/>
		<reference ref_id="1198496" ref_url="https://bugzilla.suse.com/1198496" source="BUGZILLA"/>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3695" ref_url="https://www.suse.com/security/cve/CVE-2021-3695/" source="CVE"/>
		<reference ref_id="CVE-2021-3696" ref_url="https://www.suse.com/security/cve/CVE-2021-3696/" source="CVE"/>
		<reference ref_id="CVE-2021-3697" ref_url="https://www.suse.com/security/cve/CVE-2021-3697/" source="CVE"/>
		<reference ref_id="CVE-2022-28733" ref_url="https://www.suse.com/security/cve/CVE-2022-28733/" source="CVE"/>
		<reference ref_id="CVE-2022-28734" ref_url="https://www.suse.com/security/cve/CVE-2022-28734/" source="CVE"/>
		<reference ref_id="CVE-2022-28736" ref_url="https://www.suse.com/security/cve/CVE-2022-28736/" source="CVE"/>
		<description>
This update for grub2 fixes the following issues:

Security fixes and hardenings for boothole 3 / boothole 2022 (bsc#1198581)

- CVE-2021-3695: Fixed that a crafted PNG grayscale image could lead to out-of-bounds write in heap (bsc#1191184)
- CVE-2021-3696: Fixed that a crafted PNG image could lead to out-of-bound write during huffman table handling (bsc#1191185)
- CVE-2021-3697: Fixed that a crafted JPEG image could lead to buffer underflow write in the heap (bsc#1191186)
- CVE-2022-28733: Fixed fragmentation math in net/ip (bsc#1198460)
- CVE-2022-28734: Fixed an out-of-bound write for split http headers (bsc#1198493)
- CVE-2022-28736: Fixed a use-after-free in chainloader command (bsc#1198496)
- Update SBAT security contact (bsc#1193282)
- Bump grub's SBAT generation to 2
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-10"/>
	<updated date="2022-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191184">SUSE bug 1191184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191185">SUSE bug 1191185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191186">SUSE bug 1191186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193282">SUSE bug 1193282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198460">SUSE bug 1198460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198493">SUSE bug 1198493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198496">SUSE bug 1198496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3695/">CVE-2021-3695 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3695">CVE-2021-3695 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3696/">CVE-2021-3696 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3696">CVE-2021-3696 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3697/">CVE-2021-3697 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3697">CVE-2021-3697 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28733/">CVE-2022-28733 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28733">CVE-2022-28733 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-28734/">CVE-2022-28734 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28734">CVE-2022-28734 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28736/">CVE-2022-28736 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28736">CVE-2022-28736 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992806" comment="grub2-x86_64-efi-2.02-0.53.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992807" comment="grub2-x86_64-xen-2.02-0.53.15.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218680" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1205178" ref_url="https://bugzilla.suse.com/1205178" source="BUGZILLA"/>
		<reference ref_id="1205182" ref_url="https://bugzilla.suse.com/1205182" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2601" ref_url="https://www.suse.com/security/cve/CVE-2022-2601/" source="CVE"/>
		<reference ref_id="CVE-2022-3775" ref_url="https://www.suse.com/security/cve/CVE-2022-3775/" source="CVE"/>
		<description>
This update for grub2 fixes the following issues:

Security Fixes:
    
- CVE-2022-2601: Fixed buffer overflow in grub_font_construct_glyph (bsc#1205178).
- CVE-2022-3775: Fixed integer underflow in blit_comb() (bsc#1205182).
    
Other:

- Bump upstream SBAT generation to 3
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-21"/>
	<updated date="2022-11-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205178">SUSE bug 1205178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205182">SUSE bug 1205182</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2601/">CVE-2022-2601 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2601">CVE-2022-2601 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3775/">CVE-2022-3775 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3775">CVE-2022-3775 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992808" comment="grub2-x86_64-efi-2.02-0.53.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992809" comment="grub2-x86_64-xen-2.02-0.53.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218681" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1209188" ref_url="https://bugzilla.suse.com/1209188" source="BUGZILLA"/>
		<description>

This update of grub2 fixes the following issues:

- rebuild the package with the new secure boot key (bsc#1209188).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-24"/>
	<updated date="2023-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209188">SUSE bug 1209188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992810" comment="grub2-x86_64-efi-2.02-0.53.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992811" comment="grub2-x86_64-xen-2.02-0.53.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218682" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1013669" ref_url="https://bugzilla.suse.com/1013669" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9811" ref_url="https://www.suse.com/security/cve/CVE-2016-9811/" source="CVE"/>
		<description>

This update for gstreamer-0_10-plugins-base fixes the following issue:

- CVE-2016-9811: Out of bounds memory read in windows_icon_typefind (bsc#1013669).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-25"/>
	<updated date="2017-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013669">SUSE bug 1013669</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9811/">CVE-2016-9811 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9811">CVE-2016-9811 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578056" comment="gstreamer-0_10-plugins-base-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578057" comment="gstreamer-0_10-plugins-base-32bit-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578058" comment="gstreamer-0_10-plugins-base-doc-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578059" comment="gstreamer-0_10-plugins-base-lang-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578060" comment="libgstapp-0_10-0-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578061" comment="libgstapp-0_10-0-32bit-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578062" comment="libgstinterfaces-0_10-0-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578063" comment="libgstinterfaces-0_10-0-32bit-0.10.35-5.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218683" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1024076" ref_url="https://bugzilla.suse.com/1024076" source="BUGZILLA"/>
		<reference ref_id="1024079" ref_url="https://bugzilla.suse.com/1024079" source="BUGZILLA"/>
		<reference ref_id="1133375" ref_url="https://bugzilla.suse.com/1133375" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5837" ref_url="https://www.suse.com/security/cve/CVE-2017-5837/" source="CVE"/>
		<reference ref_id="CVE-2017-5844" ref_url="https://www.suse.com/security/cve/CVE-2017-5844/" source="CVE"/>
		<reference ref_id="CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928/" source="CVE"/>
		<description>
This update for gstreamer-0_10-plugins-base fixes the following issues:

Security issues fixed:

- CVE-2017-5837: Fixed a floating point exception in gst_riff_create_audio_caps (bsc#1024076).
- CVE-2017-5844: Fixed a floating point exception in gst_riff_create_audio_caps (bsc#1024079).
- CVE-2019-9928: Fixed a heap-based overflow in the rtsp connection parser (bsc#1133375).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-11"/>
	<updated date="2019-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1024076">SUSE bug 1024076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024079">SUSE bug 1024079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133375">SUSE bug 1133375</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5837/">CVE-2017-5837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5837">CVE-2017-5837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5844/">CVE-2017-5844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5844">CVE-2017-5844 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9928">CVE-2019-9928 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578064" comment="gstreamer-0_10-plugins-base-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578065" comment="gstreamer-0_10-plugins-base-32bit-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578066" comment="gstreamer-0_10-plugins-base-doc-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578067" comment="gstreamer-0_10-plugins-base-lang-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578068" comment="libgstapp-0_10-0-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578069" comment="libgstapp-0_10-0-32bit-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578070" comment="libgstinterfaces-0_10-0-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578071" comment="libgstinterfaces-0_10-0-32bit-0.10.35-5.18.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218684" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-good (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1012102" ref_url="https://bugzilla.suse.com/1012102" source="BUGZILLA"/>
		<reference ref_id="1012103" ref_url="https://bugzilla.suse.com/1012103" source="BUGZILLA"/>
		<reference ref_id="1012104" ref_url="https://bugzilla.suse.com/1012104" source="BUGZILLA"/>
		<reference ref_id="1013653" ref_url="https://bugzilla.suse.com/1013653" source="BUGZILLA"/>
		<reference ref_id="1013655" ref_url="https://bugzilla.suse.com/1013655" source="BUGZILLA"/>
		<reference ref_id="1013663" ref_url="https://bugzilla.suse.com/1013663" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9634" ref_url="https://www.suse.com/security/cve/CVE-2016-9634/" source="CVE"/>
		<reference ref_id="CVE-2016-9635" ref_url="https://www.suse.com/security/cve/CVE-2016-9635/" source="CVE"/>
		<reference ref_id="CVE-2016-9636" ref_url="https://www.suse.com/security/cve/CVE-2016-9636/" source="CVE"/>
		<reference ref_id="CVE-2016-9807" ref_url="https://www.suse.com/security/cve/CVE-2016-9807/" source="CVE"/>
		<reference ref_id="CVE-2016-9808" ref_url="https://www.suse.com/security/cve/CVE-2016-9808/" source="CVE"/>
		<reference ref_id="CVE-2016-9810" ref_url="https://www.suse.com/security/cve/CVE-2016-9810/" source="CVE"/>
		<description>

gstreamer-0_10-plugins-good was updated to fix six security issues.

These security issues were fixed:

- CVE-2016-9634: Invalid FLIC files could have caused and an out-of-bounds write (bsc#1012102)
- CVE-2016-9635: Invalid FLIC files could have caused and an out-of-bounds write (bsc#1012103)
- CVE-2016-9636: Prevent maliciously crafted flic files from causing invalid memory writes (bsc#1012104).
- CVE-2016-9807: Prevent the reading of invalid memory in flx_decode_chunks, leading to DoS (bsc#1013655)
- CVE-2016-9808: Prevent maliciously crafted flic files from causing invalid memory accesses (bsc#1013653)
- CVE-2016-9810: Invalid files can be used to extraneous unreferences, leading to invalid memory access and DoS (bsc#1013663)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-20"/>
	<updated date="2017-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012102">SUSE bug 1012102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012103">SUSE bug 1012103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012104">SUSE bug 1012104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013653">SUSE bug 1013653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013655">SUSE bug 1013655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013663">SUSE bug 1013663</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9634/">CVE-2016-9634 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9634">CVE-2016-9634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9635/">CVE-2016-9635 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9635">CVE-2016-9635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9636/">CVE-2016-9636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9636">CVE-2016-9636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9807/">CVE-2016-9807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9807">CVE-2016-9807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9808/">CVE-2016-9808 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9808">CVE-2016-9808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9810/">CVE-2016-9810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9810">CVE-2016-9810 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578072" comment="gstreamer-0_10-plugins-good-0.10.30-5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578073" comment="gstreamer-0_10-plugins-good-doc-0.10.30-5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578074" comment="gstreamer-0_10-plugins-good-lang-0.10.30-5.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218685" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-good (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1201688" ref_url="https://bugzilla.suse.com/1201688" source="BUGZILLA"/>
		<reference ref_id="1201693" ref_url="https://bugzilla.suse.com/1201693" source="BUGZILLA"/>
		<reference ref_id="1201702" ref_url="https://bugzilla.suse.com/1201702" source="BUGZILLA"/>
		<reference ref_id="1201704" ref_url="https://bugzilla.suse.com/1201704" source="BUGZILLA"/>
		<reference ref_id="1201706" ref_url="https://bugzilla.suse.com/1201706" source="BUGZILLA"/>
		<reference ref_id="1201707" ref_url="https://bugzilla.suse.com/1201707" source="BUGZILLA"/>
		<reference ref_id="1201708" ref_url="https://bugzilla.suse.com/1201708" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1920" ref_url="https://www.suse.com/security/cve/CVE-2022-1920/" source="CVE"/>
		<reference ref_id="CVE-2022-1921" ref_url="https://www.suse.com/security/cve/CVE-2022-1921/" source="CVE"/>
		<reference ref_id="CVE-2022-1922" ref_url="https://www.suse.com/security/cve/CVE-2022-1922/" source="CVE"/>
		<reference ref_id="CVE-2022-1923" ref_url="https://www.suse.com/security/cve/CVE-2022-1923/" source="CVE"/>
		<reference ref_id="CVE-2022-1924" ref_url="https://www.suse.com/security/cve/CVE-2022-1924/" source="CVE"/>
		<reference ref_id="CVE-2022-1925" ref_url="https://www.suse.com/security/cve/CVE-2022-1925/" source="CVE"/>
		<reference ref_id="CVE-2022-2122" ref_url="https://www.suse.com/security/cve/CVE-2022-2122/" source="CVE"/>
		<description>
This update for gstreamer-0_10-plugins-good fixes the following issues:


- CVE-2022-1920: Fixed integer overflow in WavPack header handling code (bsc#1201688).                                                                                    
- CVE-2022-1921: Fixed integer overflow resulting in heap corruption in avidemux element (bsc#1201693).                                                                   
- CVE-2022-1922: Fixed integer overflows in mkv demuxing (bsc#1201702).                                                                                                   
- CVE-2022-1923: Fixed integer overflows in mkv demuxing using bzip (bsc#1201704).                                                                                        
- CVE-2022-1924: Fixed integer overflows in mkv demuxing using lzo (bsc#1201706).                                                                                         
- CVE-2022-1925: Fixed integer overflows in mkv demuxing using HEADERSTRIP (bsc#1201707).                                                                                 
- CVE-2022-2122: Fixed integer overflows in qtdemux using zlib (bsc#1201708).  

		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-23"/>
	<updated date="2022-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1201688">SUSE bug 1201688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201693">SUSE bug 1201693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201702">SUSE bug 1201702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201704">SUSE bug 1201704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201706">SUSE bug 1201706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201707">SUSE bug 1201707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201708">SUSE bug 1201708</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1920/">CVE-2022-1920 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1920">CVE-2022-1920 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1921/">CVE-2022-1921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1921">CVE-2022-1921 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1922/">CVE-2022-1922 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1922">CVE-2022-1922 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1923/">CVE-2022-1923 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1923">CVE-2022-1923 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1924/">CVE-2022-1924 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1924">CVE-2022-1924 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1925/">CVE-2022-1925 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1925">CVE-2022-1925 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-2122/">CVE-2022-2122 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2122">CVE-2022-2122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992812" comment="gstreamer-0_10-plugins-good-0.10.30-5.15.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992813" comment="gstreamer-0_10-plugins-good-doc-0.10.30-5.15.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992814" comment="gstreamer-0_10-plugins-good-lang-0.10.30-5.15.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218686" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="922741" ref_url="https://bugzilla.suse.com/922741" source="BUGZILLA"/>
		<reference ref_id="942801" ref_url="https://bugzilla.suse.com/942801" source="BUGZILLA"/>
		<reference ref_id="948791" ref_url="https://bugzilla.suse.com/948791" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-7674" ref_url="https://www.suse.com/security/cve/CVE-2015-7674/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001638.html" source="SUSE-SU"/>
		<description>
gtk2 was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-4491: Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, allowed remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that were mishandled during scaling (bsc#942801).
- CVE-2015-7674: Fix overflow when scaling GIF files (bsc#948791).

This non-security issue was fixed:
- Add the script which generates gdk-pixbuf64.loaders to the spec file (bsc#922741).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-07"/>
	<updated date="2015-10-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/922741">SUSE bug 922741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942801">SUSE bug 942801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948791">SUSE bug 948791</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4491">CVE-2015-4491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7674/">CVE-2015-7674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7674">CVE-2015-7674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578075" comment="gtk2-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578076" comment="gtk2-32bit-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578077" comment="gtk2-doc-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578078" comment="gtk2-lang-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578079" comment="gtk2-x86-2.18.9-0.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578075" comment="gtk2-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578076" comment="gtk2-32bit-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578077" comment="gtk2-doc-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578078" comment="gtk2-lang-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578079" comment="gtk2-x86-2.18.9-0.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578075" comment="gtk2-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578076" comment="gtk2-32bit-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578077" comment="gtk2-doc-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578078" comment="gtk2-lang-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578079" comment="gtk2-x86-2.18.9-0.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218687" version="1" class="patch">
	<metadata>
		<title>Security update for gdk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="958963" ref_url="https://bugzilla.suse.com/958963" source="BUGZILLA"/>
		<reference ref_id="960155" ref_url="https://bugzilla.suse.com/960155" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7552" ref_url="https://www.suse.com/security/cve/CVE-2015-7552/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001835.html" source="SUSE-SU"/>
		<description>
This update for gdk2 fixes the following security issues:

- CVE-2015-7552: various overflows, including heap overflow in flipping bmp files (bsc#958963)

The following non-security issues were fixed:

- bsc#960155: fix a possible divide by zero		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-29"/>
	<updated date="2016-01-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958963">SUSE bug 958963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960155">SUSE bug 960155</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7552/">CVE-2015-7552 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7552">CVE-2015-7552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578080" comment="gtk2-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578081" comment="gtk2-32bit-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578082" comment="gtk2-doc-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578083" comment="gtk2-lang-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578084" comment="gtk2-x86-2.18.9-0.39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578080" comment="gtk2-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578081" comment="gtk2-32bit-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578082" comment="gtk2-doc-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578083" comment="gtk2-lang-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578084" comment="gtk2-x86-2.18.9-0.39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578080" comment="gtk2-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578081" comment="gtk2-32bit-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578082" comment="gtk2-doc-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578083" comment="gtk2-lang-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578084" comment="gtk2-x86-2.18.9-0.39.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218688" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="966682" ref_url="https://bugzilla.suse.com/966682" source="BUGZILLA"/>
		<reference ref_id="988745" ref_url="https://bugzilla.suse.com/988745" source="BUGZILLA"/>
		<reference ref_id="991450" ref_url="https://bugzilla.suse.com/991450" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447/" source="CVE"/>
		<reference ref_id="CVE-2016-6352" ref_url="https://www.suse.com/security/cve/CVE-2016-6352/" source="CVE"/>
		<description>

This update for gtk2 fixes the following security issues:

- CVE-2016-6352: Some crashes were fixed, including a out of bounds
  write in the OneLine32() function that could be used by attackers to
  crash GTK/GDK programs.
- CVE-2013-7447: Avoid overflow when allocating a cairo pixbuf (bsc#966682).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-13"/>
	<updated date="2016-10-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/966682">SUSE bug 966682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988745">SUSE bug 988745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991450">SUSE bug 991450</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7447">CVE-2013-7447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6352/">CVE-2016-6352 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6352">CVE-2016-6352 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578085" comment="gtk2-2.18.9-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578086" comment="gtk2-32bit-2.18.9-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578087" comment="gtk2-doc-2.18.9-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578088" comment="gtk2-lang-2.18.9-0.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218689" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1053417" ref_url="https://bugzilla.suse.com/1053417" source="BUGZILLA"/>
		<description>
This update for gtk2 fixes the following issues:

This security issue was fixed:

- Add checks for multiplications at several locations to avoid mishandling
  memory. This allowed attackers to cause DoS or potentially RCE (bsc#1053417).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1053417">SUSE bug 1053417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578089" comment="gtk2-2.18.9-0.45.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578090" comment="gtk2-32bit-2.18.9-0.45.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578091" comment="gtk2-doc-2.18.9-0.45.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578092" comment="gtk2-lang-2.18.9-0.45.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218690" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027024" ref_url="https://bugzilla.suse.com/1027024" source="BUGZILLA"/>
		<reference ref_id="1027025" ref_url="https://bugzilla.suse.com/1027025" source="BUGZILLA"/>
		<reference ref_id="1027026" ref_url="https://bugzilla.suse.com/1027026" source="BUGZILLA"/>
		<reference ref_id="1039465" ref_url="https://bugzilla.suse.com/1039465" source="BUGZILLA"/>
		<reference ref_id="1048289" ref_url="https://bugzilla.suse.com/1048289" source="BUGZILLA"/>
		<reference ref_id="1048544" ref_url="https://bugzilla.suse.com/1048544" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2862" ref_url="https://www.suse.com/security/cve/CVE-2017-2862/" source="CVE"/>
		<reference ref_id="CVE-2017-2870" ref_url="https://www.suse.com/security/cve/CVE-2017-2870/" source="CVE"/>
		<reference ref_id="CVE-2017-6312" ref_url="https://www.suse.com/security/cve/CVE-2017-6312/" source="CVE"/>
		<reference ref_id="CVE-2017-6313" ref_url="https://www.suse.com/security/cve/CVE-2017-6313/" source="CVE"/>
		<reference ref_id="CVE-2017-6314" ref_url="https://www.suse.com/security/cve/CVE-2017-6314/" source="CVE"/>
		<description>
This update for gtk2 provides the following fixes:

These security issues were fixed:

- CVE-2017-6312: Prevent integer overflow that allowed context-dependent
  attackers to cause a denial of service (segmentation fault and application
  crash) via a crafted image entry offset in an ICO file (bsc#1027026).
- CVE-2017-6314: The make_available_at_least function allowed context-dependent
  attackers to cause a denial of service (infinite loop) via a large TIFF file
  (bsc#1027025).
- CVE-2017-6313: Prevent integer underflow in the load_resources function that
  allowed context-dependent attackers to cause a denial of service (out-of-bounds
  read and program crash) via a crafted image entry size in an ICO file
  (bsc#1027024).
- CVE-2017-2862: Prevent heap overflow in the
  gdk_pixbuf__jpeg_image_load_increment function. A specially crafted jpeg file
  could have caused a heap overflow resulting in remote code execution
  (bsc#1048289)
- CVE-2017-2870: Prevent integer overflow in the tiff_image_parse
  functionality. A specially crafted tiff file could have caused a heap-overflow
  resulting in remote code execution (bsc#1048544).

This non-security issue was fixed:

- Prevent an infinite loop when a window is destroyed while traversed (bsc#1039465).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-21"/>
	<updated date="2018-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027024">SUSE bug 1027024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027025">SUSE bug 1027025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027026">SUSE bug 1027026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039465">SUSE bug 1039465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048289">SUSE bug 1048289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048544">SUSE bug 1048544</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2862/">CVE-2017-2862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2862">CVE-2017-2862 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-2870/">CVE-2017-2870 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2870">CVE-2017-2870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6312/">CVE-2017-6312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6312">CVE-2017-6312 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6313/">CVE-2017-6313 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6313">CVE-2017-6313 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6314/">CVE-2017-6314 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6314">CVE-2017-6314 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578093" comment="gtk2-2.18.9-0.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578094" comment="gtk2-32bit-2.18.9-0.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578095" comment="gtk2-doc-2.18.9-0.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578096" comment="gtk2-lang-2.18.9-0.45.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218691" version="1" class="patch">
	<metadata>
		<title>Security update for guestfs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="845720" ref_url="https://bugzilla.suse.com/845720" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4419" ref_url="https://www.suse.com/security/cve/CVE-2013-4419/" source="CVE"/>
		<description>

A predictable socketname in the guestfish commandline tool could be used by 
a local attacker to gain access to guestfish sessions of other users on the 
same system. (CVE-2013-4419)

Security Issue reference:

    * CVE-2013-4419
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4419&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-24"/>
	<updated date="2013-10-24"/>
	<bugzilla href="https://bugzilla.suse.com/845720">SUSE bug 845720</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4419/">CVE-2013-4419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4419">CVE-2013-4419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578097" comment="guestfs-data-1.20.4-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578098" comment="guestfs-tools-1.20.4-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578099" comment="guestfsd-1.20.4-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578100" comment="libguestfs0-1.20.4-0.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578097" comment="guestfs-data-1.20.4-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578098" comment="guestfs-tools-1.20.4-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578099" comment="guestfsd-1.20.4-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578100" comment="libguestfs0-1.20.4-0.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578097" comment="guestfs-data-1.20.4-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578098" comment="guestfs-tools-1.20.4-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578099" comment="guestfsd-1.20.4-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578100" comment="libguestfs0-1.20.4-0.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218692" version="1" class="patch">
	<metadata>
		<title>Security update for guile (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1004221" ref_url="https://bugzilla.suse.com/1004221" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8605" ref_url="https://www.suse.com/security/cve/CVE-2016-8605/" source="CVE"/>
		<description>

This update for guile fixes the following issues:

- CVE-2016-8605: Fixed thread-unsafe umask modification (bsc#1004221).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-06"/>
	<updated date="2017-02-06"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1004221">SUSE bug 1004221</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8605/">CVE-2016-8605 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8605">CVE-2016-8605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571967" comment="guile-1.8.5-24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218693" version="1" class="patch">
	<metadata>
		<title>Security update for gzip (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<description>
This update for gzip fixes the following issues:

- CVE-2022-1271: Fix escaping of malicious filenames. (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-19"/>
	<updated date="2022-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683759" comment="gzip-1.3.12-69.23.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218694" version="1" class="patch">
	<metadata>
		<title>Security update for hplip</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="808355" ref_url="https://bugzilla.suse.com/808355" source="BUGZILLA"/>
		<reference ref_id="835827" ref_url="https://bugzilla.suse.com/835827" source="BUGZILLA"/>
		<reference ref_id="836937" ref_url="https://bugzilla.suse.com/836937" source="BUGZILLA"/>
		<reference ref_id="852368" ref_url="https://bugzilla.suse.com/852368" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0200" ref_url="https://www.suse.com/security/cve/CVE-2013-0200/" source="CVE"/>
		<reference ref_id="CVE-2013-4325" ref_url="https://www.suse.com/security/cve/CVE-2013-4325/" source="CVE"/>
		<reference ref_id="CVE-2013-6402" ref_url="https://www.suse.com/security/cve/CVE-2013-6402/" source="CVE"/>
		<description>

hplip was updated to fix three security issues:

    * 

      CVE-2013-0200: Some local file overwrite problems via predictable
      /tmp filenames were fixed.

    * 

      CVE-2013-4325: hplip used an insecure polkit DBUS API (polkit-process
      subject race condition) which could lead to local privilege
      escalation.

    * 

      CVE-2013-6402: hplip uses arbitrary file creation/overwrite (via
      hardcoded file name /tmp/hp-pkservice.log).

Security Issue references:

    * CVE-2013-4325
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325&gt;
    * CVE-2013-0200
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200&gt;
    * CVE-2013-6402
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-17"/>
	<updated date="2014-01-17"/>
	<bugzilla href="https://bugzilla.suse.com/808355">SUSE bug 808355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835827">SUSE bug 835827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836937">SUSE bug 836937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0200/">CVE-2013-0200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0200">CVE-2013-0200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4325/">CVE-2013-4325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4325">CVE-2013-4325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6402/">CVE-2013-6402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6402">CVE-2013-6402 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576209" comment="hplip-3.11.10-0.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576210" comment="hplip-hpijs-3.11.10-0.6.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576209" comment="hplip-3.11.10-0.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576210" comment="hplip-hpijs-3.11.10-0.6.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576209" comment="hplip-3.11.10-0.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576210" comment="hplip-hpijs-3.11.10-0.6.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218695" version="1" class="patch">
	<metadata>
		<title>Security update for hunspell (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1151867" ref_url="https://bugzilla.suse.com/1151867" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16707" ref_url="https://www.suse.com/security/cve/CVE-2019-16707/" source="CVE"/>
		<description>
This update for hunspell fixes the following issues:

- CVE-2019-16707: Fixed an invalid read in SuggestMgr:leftcommonsubstring (bsc#1151867).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-04"/>
	<updated date="2020-11-04"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1151867">SUSE bug 1151867</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16707/">CVE-2019-16707 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16707">CVE-2019-16707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571977" comment="hunspell-1.2.7-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571978" comment="hunspell-32bit-1.2.7-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571979" comment="hunspell-tools-1.2.7-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218696" version="1" class="patch">
	<metadata>
		<title>Recommended update for ibutils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="811660" ref_url="https://bugzilla.suse.com/811660" source="BUGZILLA"/>
		<reference ref_id="822659" ref_url="https://bugzilla.suse.com/822659" source="BUGZILLA"/>
		<reference ref_id="832643" ref_url="https://bugzilla.suse.com/832643" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1894" ref_url="https://www.suse.com/security/cve/CVE-2013-1894/" source="CVE"/>
		<reference ref_id="SUSE-RU-2015:0779-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-April/002916.html" source="SUSE-SU"/>
		<description>

This update for InfiniBand Diagnostic Tools (ibutils) fixes a syntax error 
that affected the ibdiagnet, ibdiagpath and ibdiagui utilities.

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-14"/>
	<updated date="2013-08-14"/>
	<bugzilla href="https://bugzilla.suse.com/811660">SUSE bug 811660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822659">SUSE bug 822659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/832643">SUSE bug 832643</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1894/">CVE-2013-1894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1894">CVE-2013-1894 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992815" comment="ibutils-1.5.7-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591130" comment="ibutils-32bit-1.5.7-0.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992815" comment="ibutils-1.5.7-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591130" comment="ibutils-32bit-1.5.7-0.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992815" comment="ibutils-1.5.7-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591130" comment="ibutils-32bit-1.5.7-0.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218697" version="1" class="patch">
	<metadata>
		<title>Security update for icu</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="917129" ref_url="https://bugzilla.suse.com/917129" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9654" ref_url="https://www.suse.com/security/cve/CVE-2014-9654/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001463.html" source="SUSE-SU"/>
		<description>

This update fixes the following security issue in icu:

    * CVE-2014-9654: insufficient size limit checks in regular expression
      compiler (bsc#917129)

Security Issues:

    * CVE-2014-9654
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-18"/>
	<updated date="2015-06-18"/>
	<bugzilla href="https://bugzilla.suse.com/917129">SUSE bug 917129</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9654/">CVE-2014-9654 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9654">CVE-2014-9654 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578101" comment="libicu-4.0-7.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578102" comment="libicu-32bit-4.0-7.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578103" comment="libicu-doc-4.0-7.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578104" comment="libicu-x86-4.0-7.28.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578101" comment="libicu-4.0-7.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578102" comment="libicu-32bit-4.0-7.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578103" comment="libicu-doc-4.0-7.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578104" comment="libicu-x86-4.0-7.28.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578101" comment="libicu-4.0-7.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578102" comment="libicu-32bit-4.0-7.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578103" comment="libicu-doc-4.0-7.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578104" comment="libicu-x86-4.0-7.28.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218698" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="952260" ref_url="https://bugzilla.suse.com/952260" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9654" ref_url="https://www.suse.com/security/cve/CVE-2014-9654/" source="CVE"/>
		<description>

This update for icu fixes the following issue:

The previous patch for CVE-2014-9654 was incorrect and lead
to non-working regular expressions. This update fixes this 
problem (bsc#952260)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-18"/>
	<updated date="2016-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952260">SUSE bug 952260</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9654/">CVE-2014-9654 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9654">CVE-2014-9654 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578105" comment="libicu-4.0-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564558" comment="libicu-32bit-4.0-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578106" comment="libicu-doc-4.0-38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218699" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1012224" ref_url="https://bugzilla.suse.com/1012224" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9911" ref_url="https://www.suse.com/security/cve/CVE-2014-9911/" source="CVE"/>
		<description>

This update for icu fixes the following security issues:

- Passing a locale string longer than 255 characters to uloc_getDisplayName()
  could have caused a buffer overflow resulting in denial of service or
  possible code execution (bsc#1012224, CVE-2014-9911).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-23"/>
	<updated date="2017-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1012224">SUSE bug 1012224</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9911/">CVE-2014-9911 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9911">CVE-2014-9911 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571983" comment="libicu-4.0-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564562" comment="libicu-32bit-4.0-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571984" comment="libicu-doc-4.0-43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218700" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1023033" ref_url="https://bugzilla.suse.com/1023033" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9911" ref_url="https://www.suse.com/security/cve/CVE-2014-9911/" source="CVE"/>
		<description>

This update for icu fixes the following issues:

- CVE-2014-9911: The fix was updated to not crash (NULL ptr deref) when resPath is NULL (bsc#1023033). 
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023033">SUSE bug 1023033</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9911/">CVE-2014-9911 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9911">CVE-2014-9911 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571985" comment="libicu-4.0-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564566" comment="libicu-32bit-4.0-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571986" comment="libicu-doc-4.0-46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218701" version="1" class="patch">
	<metadata>
		<title>Recommended update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1037416" ref_url="https://bugzilla.suse.com/1037416" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9911" ref_url="https://www.suse.com/security/cve/CVE-2014-9911/" source="CVE"/>
		<description>

This update for icu fixes the following issue:

- Fix international date/time format output (a regression caused by the fix for CVE-2014-9911) (bsc#1037416).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-05"/>
	<updated date="2018-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1037416">SUSE bug 1037416</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9911/">CVE-2014-9911 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9911">CVE-2014-9911 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009593714" comment="libicu-4.0-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593715" comment="libicu-32bit-4.0-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593716" comment="libicu-doc-4.0-47.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218702" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1034674" ref_url="https://bugzilla.suse.com/1034674" source="BUGZILLA"/>
		<reference ref_id="1034678" ref_url="https://bugzilla.suse.com/1034678" source="BUGZILLA"/>
		<reference ref_id="1067203" ref_url="https://bugzilla.suse.com/1067203" source="BUGZILLA"/>
		<reference ref_id="1072193" ref_url="https://bugzilla.suse.com/1072193" source="BUGZILLA"/>
		<reference ref_id="1077999" ref_url="https://bugzilla.suse.com/1077999" source="BUGZILLA"/>
		<reference ref_id="990636" ref_url="https://bugzilla.suse.com/990636" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6293" ref_url="https://www.suse.com/security/cve/CVE-2016-6293/" source="CVE"/>
		<reference ref_id="CVE-2017-14952" ref_url="https://www.suse.com/security/cve/CVE-2017-14952/" source="CVE"/>
		<reference ref_id="CVE-2017-15422" ref_url="https://www.suse.com/security/cve/CVE-2017-15422/" source="CVE"/>
		<reference ref_id="CVE-2017-17484" ref_url="https://www.suse.com/security/cve/CVE-2017-17484/" source="CVE"/>
		<reference ref_id="CVE-2017-7867" ref_url="https://www.suse.com/security/cve/CVE-2017-7867/" source="CVE"/>
		<reference ref_id="CVE-2017-7868" ref_url="https://www.suse.com/security/cve/CVE-2017-7868/" source="CVE"/>
		<description>
This update for icu fixes the following issues:

- CVE-2016-6293: The uloc_acceptLanguageFromHTTP function in common/uloc.cpp did not ensure that there is a '\0' character at the end of a certain temporary array, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long httpAcceptLanguage argument. (bsc#990636)
- CVE-2017-7868: ICU had an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_moveIndex32* function. (bsc#1034674)
- CVE-2017-7867: ICU had an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_setNativeIndex* function. (bsc#1034678)
- CVE-2017-14952: Double free in i18n/zonemeta.cpp allowed remote attackers to execute arbitrary code via a crafted string, aka a 'redundant UVector entry clean up function call' issue. (bsc#1067203)
- CVE-2017-17484:The ucnv_UTF8FromUTF8 function in ucnv_u8.cpp mishandled ucnv_convertEx calls for UTF-8 to UTF-8 conversion, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted string, as demonstrated by ZNC. (bsc#1072193)
- CVE-2017-15422: An integer overflow in persian calendar calculation was fixed, which could show wrong years. (bsc#1077999)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-08"/>
	<updated date="2018-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1034674">SUSE bug 1034674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034678">SUSE bug 1034678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067203">SUSE bug 1067203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072193">SUSE bug 1072193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077999">SUSE bug 1077999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990636">SUSE bug 990636</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6293/">CVE-2016-6293 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6293">CVE-2016-6293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14952/">CVE-2017-14952 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14952">CVE-2017-14952 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15422/">CVE-2017-15422 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15422">CVE-2017-15422 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17484/">CVE-2017-17484 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17484">CVE-2017-17484 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7867/">CVE-2017-7867 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7867">CVE-2017-7867 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7868/">CVE-2017-7868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7868">CVE-2017-7868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571987" comment="libicu-4.0-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564570" comment="libicu-32bit-4.0-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571988" comment="libicu-doc-4.0-47.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218703" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1166844" ref_url="https://bugzilla.suse.com/1166844" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10531" ref_url="https://www.suse.com/security/cve/CVE-2020-10531/" source="CVE"/>
		<description>
This update for icu fixes the following issues:

- CVE-2020-10531: Fixed an integer overflow in unicode string handling (bsc#1166844).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-29"/>
	<updated date="2022-08-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1166844">SUSE bug 1166844</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10531/">CVE-2020-10531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10531">CVE-2020-10531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992816" comment="libicu-4.0-47.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992817" comment="libicu-32bit-4.0-47.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992818" comment="libicu-doc-4.0-47.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218704" version="1" class="patch">
	<metadata>
		<title>Security update for inn (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1154302" ref_url="https://bugzilla.suse.com/1154302" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3692" ref_url="https://www.suse.com/security/cve/CVE-2019-3692/" source="CVE"/>
		<description>
This update for inn fixes the following issues:

- CVE-2019-3692: Fixed a local privilege escalation from any user to 'news' (bsc#1154302).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-20"/>
	<updated date="2020-02-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154302">SUSE bug 1154302</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3692/">CVE-2019-3692 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3692">CVE-2019-3692 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571990" comment="inn-2.4.2-170.21.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218705" version="1" class="patch">
	<metadata>
		<title>Security update for inn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182321" ref_url="https://bugzilla.suse.com/1182321" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31998" ref_url="https://www.suse.com/security/cve/CVE-2021-31998/" source="CVE"/>
		<description>
This update for inn fixes the following issues:

- CVE-2021-31998: Fixed locale privialge escalation during the update of inn (bsc#1182321).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182321">SUSE bug 1182321</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31998/">CVE-2021-31998 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31998">CVE-2021-31998 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571991" comment="inn-2.4.2-170.21.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218706" version="1" class="patch">
	<metadata>
		<title>Security update for intel-SINIT (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1069754" ref_url="https://bugzilla.suse.com/1069754" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-5174" ref_url="https://www.suse.com/security/cve/CVE-2011-5174/" source="CVE"/>
		<description>
This update for intel-SINIT fixes the following issues:

Security issue fixed:

- CVE-2011-5174: Fixed security issue in old SINIT files which allowed local users to bypass the TXT protection mechanism (bsc#1069754). 
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-13"/>
	<updated date="2017-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1069754">SUSE bug 1069754</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2011-5174/">CVE-2011-5174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-5174">CVE-2011-5174 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578107" comment="intel-SINIT-1-0.81.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218707" version="1" class="patch">
	<metadata>
		<title>Security update for ipsec-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="931989" ref_url="https://bugzilla.suse.com/931989" source="BUGZILLA"/>
		<reference ref_id="939810" ref_url="https://bugzilla.suse.com/939810" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4047" ref_url="https://www.suse.com/security/cve/CVE-2015-4047/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001531.html" source="SUSE-SU"/>
		<description>
ipsec-tools was updated to fix one security issue and a bug.

This security issue was fixed:

- CVE-2015-4047: racoon/gssapi.c in ipsec-tools allowed remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a series of crafted UDP requests (bsc#931989).

Due to a packaging error, the racoonf.conf config file was symlinked to /usr/share/doc/packages/ipsec-tools/examples/racoon/samples/racoon.conf
on some processor platforms, edits might have happened only in this example file.

Before upgrading, please check if /etc/racoon/racoon.conf is a symlink to this example file and backup the content. (bsc#939810)
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-06"/>
	<updated date="2015-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/931989">SUSE bug 931989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939810">SUSE bug 939810</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4047/">CVE-2015-4047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4047">CVE-2015-4047 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578108" comment="ipsec-tools-0.7.3-1.13.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578108" comment="ipsec-tools-0.7.3-1.13.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578108" comment="ipsec-tools-0.7.3-1.13.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218708" version="1" class="patch">
	<metadata>
		<title>Security update for ipsec-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1047443" ref_url="https://bugzilla.suse.com/1047443" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10396" ref_url="https://www.suse.com/security/cve/CVE-2016-10396/" source="CVE"/>
		<description>
This update for ipsec-tools fixes one issue.

This security issue was fixed:

- CVE-2016-10396: The racoon daemon contained a remotely exploitable
  computational-complexity attack when parsing and storing ISAKMP fragments that
  allowed a remote attacker to exhaust computational resources on the remote
  endpoint by repeatedly sending ISAKMP fragment packets in a particular order
  (bsc#1047443).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-12"/>
	<updated date="2018-02-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047443">SUSE bug 1047443</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10396/">CVE-2016-10396 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10396">CVE-2016-10396 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571994" comment="ipsec-tools-0.7.3-1.38.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218709" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-commons-collections (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="954102" ref_url="https://bugzilla.suse.com/954102" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2016:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001828.html" source="SUSE-SU"/>
		<description>

This update to jakarta-commons-collections 3.2.2 fixes the following security issues:

* bsc#954102 code-execution by unserialization
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-25"/>
	<updated date="2016-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954102">SUSE bug 954102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571995" comment="jakarta-commons-collections-3.2.2-88.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571996" comment="jakarta-commons-collections-javadoc-3.2.2-88.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571997" comment="jakarta-commons-collections-tomcat5-3.2.2-88.36.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571995" comment="jakarta-commons-collections-3.2.2-88.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571996" comment="jakarta-commons-collections-javadoc-3.2.2-88.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571997" comment="jakarta-commons-collections-tomcat5-3.2.2-88.36.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571995" comment="jakarta-commons-collections-3.2.2-88.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571996" comment="jakarta-commons-collections-javadoc-3.2.2-88.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571997" comment="jakarta-commons-collections-tomcat5-3.2.2-88.36.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218710" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-commons-fileupload</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="846174" ref_url="https://bugzilla.suse.com/846174" source="BUGZILLA"/>
		<reference ref_id="862781" ref_url="https://bugzilla.suse.com/862781" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2186" ref_url="https://www.suse.com/security/cve/CVE-2013-2186/" source="CVE"/>
		<reference ref_id="CVE-2014-0050" ref_url="https://www.suse.com/security/cve/CVE-2014-0050/" source="CVE"/>
		<description>

This update fixes a security issue with jakarta-commons-fileupload:

    * bnc#862781: denial of service due to too-small buffer size used
      (CVE-2014-0050)

Security Issue reference:

    * CVE-2014-0050
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0050&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-03"/>
	<updated date="2014-04-03"/>
	<bugzilla href="https://bugzilla.suse.com/846174">SUSE bug 846174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862781">SUSE bug 862781</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2186/">CVE-2013-2186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2186">CVE-2013-2186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0050/">CVE-2014-0050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0050">CVE-2014-0050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578109" comment="jakarta-commons-fileupload-1.1.1-1.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578110" comment="jakarta-commons-fileupload-javadoc-1.1.1-1.37.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578109" comment="jakarta-commons-fileupload-1.1.1-1.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578110" comment="jakarta-commons-fileupload-javadoc-1.1.1-1.37.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578109" comment="jakarta-commons-fileupload-1.1.1-1.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578110" comment="jakarta-commons-fileupload-javadoc-1.1.1-1.37.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218711" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-commons-fileupload (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1128829" ref_url="https://bugzilla.suse.com/1128829" source="BUGZILLA"/>
		<reference ref_id="1128963" ref_url="https://bugzilla.suse.com/1128963" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1000031" ref_url="https://www.suse.com/security/cve/CVE-2016-1000031/" source="CVE"/>
		<description>
This update for jakarta-commons-fileupload fixes the following issue:

Security issue fixed:

- CVE-2016-1000031: Fixed remote execution (bsc#1128963, bsc#1128829).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1128829">SUSE bug 1128829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128963">SUSE bug 1128963</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1000031/">CVE-2016-1000031 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000031">CVE-2016-1000031 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567995" comment="jakarta-commons-fileupload-1.1.1-1.37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567996" comment="jakarta-commons-fileupload-javadoc-1.1.1-1.37.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218712" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-commons-fileupload (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208513" ref_url="https://bugzilla.suse.com/1208513" source="BUGZILLA"/>
		<reference ref_id="986359" ref_url="https://bugzilla.suse.com/986359" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3092" ref_url="https://www.suse.com/security/cve/CVE-2016-3092/" source="CVE"/>
		<reference ref_id="CVE-2023-24998" ref_url="https://www.suse.com/security/cve/CVE-2023-24998/" source="CVE"/>
		<description>
This update for jakarta-commons-fileupload fixes the following issues:

- CVE-2016-3092: Fixed a usage of vulnerable FileUpload package can result in denial of service (bsc#986359). 
- CVE-2023-24998: Fixed a FileUpload deny of service with excessive parts (bsc#1208513).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-14"/>
	<updated date="2023-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208513">SUSE bug 1208513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986359">SUSE bug 986359</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3092/">CVE-2016-3092 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3092">CVE-2016-3092 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24998/">CVE-2023-24998 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24998">CVE-2023-24998 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992819" comment="jakarta-commons-fileupload-1.1.1-1.37.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992820" comment="jakarta-commons-fileupload-javadoc-1.1.1-1.37.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218713" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-taglibs-standard (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="920813" ref_url="https://bugzilla.suse.com/920813" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0254" ref_url="https://www.suse.com/security/cve/CVE-2015-0254/" source="CVE"/>
		<description>
This update for jakarta-taglibs-standard fixes the following issues:

- CVE-2015-0254: Apache Standard Taglibs allowed remote attackers to execute arbitrary code or conduct external XML entity (XXE) attacks via a crafted XSLT extension in a (1) x:parse or (2) x:transform JSTL XML tag. (bsc#920813)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-26"/>
	<updated date="2017-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/920813">SUSE bug 920813</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0254/">CVE-2015-0254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0254">CVE-2015-0254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572001" comment="jakarta-taglibs-standard-1.1.1-234.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572002" comment="jakarta-taglibs-standard-javadoc-1.1.1-234.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218714" version="1" class="patch">
	<metadata>
		<title>Security update for jasper</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="909474" ref_url="https://bugzilla.suse.com/909474" source="BUGZILLA"/>
		<reference ref_id="909475" ref_url="https://bugzilla.suse.com/909475" source="BUGZILLA"/>
		<reference ref_id="911837" ref_url="https://bugzilla.suse.com/911837" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8137" ref_url="https://www.suse.com/security/cve/CVE-2014-8137/" source="CVE"/>
		<reference ref_id="CVE-2014-8138" ref_url="https://www.suse.com/security/cve/CVE-2014-8138/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001216.html" source="SUSE-SU"/>
		<description>

This update for jasper fixes the following security issues:

    * 

      CVE-2014-8137: Double free in jas_iccattrval_destroy(). Double call
      to free() allowed attackers to cause a denial of service or possibly
      have unspecified other impact via unknown vectors. (bsc#909474)

    * 

      CVE-2014-8138: Heap overflow in jas_decode(). This could be used to
      do an arbitrary write and could result in arbitrary code execution.
      (bsc#909475)

    * 

      CVE-2014-8157: Off-by-one error in the jpc_dec_process_sot(). Could
      allow remote attackers to cause a denial of service (crash) or
      possibly execute arbitrary code via a crafted JPEG 2000 image, which
      triggers a heap-based buffer overflow. (bsc#911837)

    * 

      CVE-2014-8158: Multiple stack-based buffer overflows in jpc_qmfb.c.
      Could allow remote attackers to cause a denial of service (crash) or
      possibly execute arbitrary code via a crafted JPEG 2000 image.
      (bsc#911837)

Security Issues:

    * CVE-2014-8138
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8138&gt;
    * CVE-2014-8137
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8137&gt;
    * CVE-2014-8157
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8157&gt;
    * CVE-2014-8158
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8158&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-03"/>
	<updated date="2015-02-03"/>
	<bugzilla href="https://bugzilla.suse.com/909474">SUSE bug 909474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909475">SUSE bug 909475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911837">SUSE bug 911837</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8137/">CVE-2014-8137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8137">CVE-2014-8137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8138/">CVE-2014-8138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8138">CVE-2014-8138 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578111" comment="libjasper-1.900.1-134.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578112" comment="libjasper-32bit-1.900.1-134.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578113" comment="libjasper-x86-1.900.1-134.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578111" comment="libjasper-1.900.1-134.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578112" comment="libjasper-32bit-1.900.1-134.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578113" comment="libjasper-x86-1.900.1-134.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578111" comment="libjasper-1.900.1-134.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578112" comment="libjasper-32bit-1.900.1-134.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578113" comment="libjasper-x86-1.900.1-134.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218715" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1005084" ref_url="https://bugzilla.suse.com/1005084" source="BUGZILLA"/>
		<reference ref_id="1005090" ref_url="https://bugzilla.suse.com/1005090" source="BUGZILLA"/>
		<reference ref_id="1005242" ref_url="https://bugzilla.suse.com/1005242" source="BUGZILLA"/>
		<reference ref_id="1006591" ref_url="https://bugzilla.suse.com/1006591" source="BUGZILLA"/>
		<reference ref_id="1006593" ref_url="https://bugzilla.suse.com/1006593" source="BUGZILLA"/>
		<reference ref_id="1006597" ref_url="https://bugzilla.suse.com/1006597" source="BUGZILLA"/>
		<reference ref_id="1006598" ref_url="https://bugzilla.suse.com/1006598" source="BUGZILLA"/>
		<reference ref_id="1006599" ref_url="https://bugzilla.suse.com/1006599" source="BUGZILLA"/>
		<reference ref_id="1006836" ref_url="https://bugzilla.suse.com/1006836" source="BUGZILLA"/>
		<reference ref_id="1006839" ref_url="https://bugzilla.suse.com/1006839" source="BUGZILLA"/>
		<reference ref_id="1007009" ref_url="https://bugzilla.suse.com/1007009" source="BUGZILLA"/>
		<reference ref_id="392410" ref_url="https://bugzilla.suse.com/392410" source="BUGZILLA"/>
		<reference ref_id="941919" ref_url="https://bugzilla.suse.com/941919" source="BUGZILLA"/>
		<reference ref_id="942553" ref_url="https://bugzilla.suse.com/942553" source="BUGZILLA"/>
		<reference ref_id="961886" ref_url="https://bugzilla.suse.com/961886" source="BUGZILLA"/>
		<reference ref_id="963983" ref_url="https://bugzilla.suse.com/963983" source="BUGZILLA"/>
		<reference ref_id="968373" ref_url="https://bugzilla.suse.com/968373" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-3522" ref_url="https://www.suse.com/security/cve/CVE-2008-3522/" source="CVE"/>
		<reference ref_id="CVE-2015-5203" ref_url="https://www.suse.com/security/cve/CVE-2015-5203/" source="CVE"/>
		<reference ref_id="CVE-2015-5221" ref_url="https://www.suse.com/security/cve/CVE-2015-5221/" source="CVE"/>
		<reference ref_id="CVE-2016-1577" ref_url="https://www.suse.com/security/cve/CVE-2016-1577/" source="CVE"/>
		<reference ref_id="CVE-2016-1867" ref_url="https://www.suse.com/security/cve/CVE-2016-1867/" source="CVE"/>
		<reference ref_id="CVE-2016-2089" ref_url="https://www.suse.com/security/cve/CVE-2016-2089/" source="CVE"/>
		<reference ref_id="CVE-2016-2116" ref_url="https://www.suse.com/security/cve/CVE-2016-2116/" source="CVE"/>
		<reference ref_id="CVE-2016-8690" ref_url="https://www.suse.com/security/cve/CVE-2016-8690/" source="CVE"/>
		<reference ref_id="CVE-2016-8691" ref_url="https://www.suse.com/security/cve/CVE-2016-8691/" source="CVE"/>
		<reference ref_id="CVE-2016-8692" ref_url="https://www.suse.com/security/cve/CVE-2016-8692/" source="CVE"/>
		<reference ref_id="CVE-2016-8693" ref_url="https://www.suse.com/security/cve/CVE-2016-8693/" source="CVE"/>
		<reference ref_id="CVE-2016-8880" ref_url="https://www.suse.com/security/cve/CVE-2016-8880/" source="CVE"/>
		<reference ref_id="CVE-2016-8881" ref_url="https://www.suse.com/security/cve/CVE-2016-8881/" source="CVE"/>
		<reference ref_id="CVE-2016-8882" ref_url="https://www.suse.com/security/cve/CVE-2016-8882/" source="CVE"/>
		<reference ref_id="CVE-2016-8883" ref_url="https://www.suse.com/security/cve/CVE-2016-8883/" source="CVE"/>
		<reference ref_id="CVE-2016-8884" ref_url="https://www.suse.com/security/cve/CVE-2016-8884/" source="CVE"/>
		<reference ref_id="CVE-2016-8885" ref_url="https://www.suse.com/security/cve/CVE-2016-8885/" source="CVE"/>
		<reference ref_id="CVE-2016-8886" ref_url="https://www.suse.com/security/cve/CVE-2016-8886/" source="CVE"/>
		<reference ref_id="CVE-2016-8887" ref_url="https://www.suse.com/security/cve/CVE-2016-8887/" source="CVE"/>
		<description>

This update for jasper fixes the following issues:

Security fixes:
- CVE-2016-8887: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c) (bsc#1006836)
- CVE-2016-8886: memory allocation failure in jas_malloc (jas_malloc.c) (bsc#1006599)
- CVE-2016-8884,CVE-2016-8885: two null pointer dereferences in bmp_getdata (incomplete fix for CVE-2016-8690) (bsc#1007009)
- CVE-2016-8883: assert in jpc_dec_tiledecode() (bsc#1006598)
- CVE-2016-8882: segfault / null pointer access in jpc_pi_destroy (bsc#1006597)
- CVE-2016-8881: Heap overflow in jpc_getuint16() (bsc#1006593)
- CVE-2016-8880: Heap overflow in jpc_dec_cp_setfromcox() (bsc#1006591)
- CVE-2016-8693: Double free vulnerability in mem_close (bsc#1005242)
- CVE-2016-8691, CVE-2016-8692: Divide by zero in jpc_dec_process_siz (bsc#1005090)
- CVE-2016-8690: Null pointer dereference in bmp_getdata triggered by crafted BMP image (bsc#1005084)
- CVE-2016-2089: invalid read in the JasPer's jas_matrix_clip() function (bsc#963983)
- CVE-2016-1867: Out-of-bounds Read in the JasPer's jpc_pi_nextcprl() function (bsc#961886)
- CVE-2016-1577, CVE-2016-2116: double free vulnerability in the jas_iccattrval_destroy function (bsc#968373)
- CVE-2015-5221: Use-after-free (and double-free) in Jasper JPEG-200 (bsc#942553)
- CVE-2015-5203: Double free corruption in JasPer JPEG-2000 implementation (bsc#941919)
- CVE-2008-3522: multiple integer overflows (bsc#392410)
- bsc#1006839: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c) (incomplete fix for CVE-2016-8887)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-10"/>
	<updated date="2016-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005084">SUSE bug 1005084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005090">SUSE bug 1005090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005242">SUSE bug 1005242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006591">SUSE bug 1006591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006593">SUSE bug 1006593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006597">SUSE bug 1006597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006598">SUSE bug 1006598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006599">SUSE bug 1006599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006836">SUSE bug 1006836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006839">SUSE bug 1006839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007009">SUSE bug 1007009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/392410">SUSE bug 392410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941919">SUSE bug 941919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942553">SUSE bug 942553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961886">SUSE bug 961886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963983">SUSE bug 963983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968373">SUSE bug 968373</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3522/">CVE-2008-3522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3522">CVE-2008-3522 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5203/">CVE-2015-5203 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5203">CVE-2015-5203 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5221/">CVE-2015-5221 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5221">CVE-2015-5221 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1577/">CVE-2016-1577 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1577">CVE-2016-1577 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1867/">CVE-2016-1867 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1867">CVE-2016-1867 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2089/">CVE-2016-2089 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2089">CVE-2016-2089 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-2116/">CVE-2016-2116 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2116">CVE-2016-2116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8690/">CVE-2016-8690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8690">CVE-2016-8690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8691/">CVE-2016-8691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8691">CVE-2016-8691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8692/">CVE-2016-8692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8692">CVE-2016-8692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8693/">CVE-2016-8693 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8693">CVE-2016-8693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8880/">CVE-2016-8880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-8880">CVE-2016-8880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8881/">CVE-2016-8881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-8881">CVE-2016-8881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8882/">CVE-2016-8882 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8882">CVE-2016-8882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8883/">CVE-2016-8883 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8883">CVE-2016-8883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8884/">CVE-2016-8884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8884">CVE-2016-8884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8885/">CVE-2016-8885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8885">CVE-2016-8885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8886/">CVE-2016-8886 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8886">CVE-2016-8886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8887/">CVE-2016-8887 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8887">CVE-2016-8887 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572006" comment="libjasper-1.900.14-134.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572007" comment="libjasper-32bit-1.900.14-134.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218716" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1010977" ref_url="https://bugzilla.suse.com/1010977" source="BUGZILLA"/>
		<reference ref_id="1010979" ref_url="https://bugzilla.suse.com/1010979" source="BUGZILLA"/>
		<reference ref_id="1011830" ref_url="https://bugzilla.suse.com/1011830" source="BUGZILLA"/>
		<reference ref_id="1012530" ref_url="https://bugzilla.suse.com/1012530" source="BUGZILLA"/>
		<reference ref_id="1015400" ref_url="https://bugzilla.suse.com/1015400" source="BUGZILLA"/>
		<reference ref_id="1015993" ref_url="https://bugzilla.suse.com/1015993" source="BUGZILLA"/>
		<reference ref_id="1018088" ref_url="https://bugzilla.suse.com/1018088" source="BUGZILLA"/>
		<reference ref_id="1020353" ref_url="https://bugzilla.suse.com/1020353" source="BUGZILLA"/>
		<reference ref_id="1021868" ref_url="https://bugzilla.suse.com/1021868" source="BUGZILLA"/>
		<reference ref_id="1029497" ref_url="https://bugzilla.suse.com/1029497" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10251" ref_url="https://www.suse.com/security/cve/CVE-2016-10251/" source="CVE"/>
		<reference ref_id="CVE-2016-8654" ref_url="https://www.suse.com/security/cve/CVE-2016-8654/" source="CVE"/>
		<reference ref_id="CVE-2016-9395" ref_url="https://www.suse.com/security/cve/CVE-2016-9395/" source="CVE"/>
		<reference ref_id="CVE-2016-9398" ref_url="https://www.suse.com/security/cve/CVE-2016-9398/" source="CVE"/>
		<reference ref_id="CVE-2016-9560" ref_url="https://www.suse.com/security/cve/CVE-2016-9560/" source="CVE"/>
		<reference ref_id="CVE-2016-9583" ref_url="https://www.suse.com/security/cve/CVE-2016-9583/" source="CVE"/>
		<reference ref_id="CVE-2016-9591" ref_url="https://www.suse.com/security/cve/CVE-2016-9591/" source="CVE"/>
		<reference ref_id="CVE-2016-9600" ref_url="https://www.suse.com/security/cve/CVE-2016-9600/" source="CVE"/>
		<reference ref_id="CVE-2017-5498" ref_url="https://www.suse.com/security/cve/CVE-2017-5498/" source="CVE"/>
		<reference ref_id="CVE-2017-6850" ref_url="https://www.suse.com/security/cve/CVE-2017-6850/" source="CVE"/>
		<description>

This update for jasper fixes the following issues:

Security issues fixed:
- CVE-2016-8654: Heap-based buffer overflow in QMFB code in JPC codec (bsc#1012530)
- CVE-2016-9395: Missing sanity checks on the data in a SIZ marker segment (bsc#1010977).
- CVE-2016-9398: jpc_math.c:94: int jpc_floorlog2(int): Assertion 'x &gt; 0' failed. (bsc#1010979)
- CVE-2016-9560: stack-based buffer overflow in jpc_tsfb_getbands2 (jpc_tsfb.c) (bsc#1011830)
- CVE-2016-9583: Out of bounds heap read in jpc_pi_nextpcrl() (bsc#1015400)
- CVE-2016-9591: Use-after-free on heap in jas_matrix_destroy (bsc#1015993)
- CVE-2016-9600: Null Pointer Dereference due to missing check for UNKNOWN color space in JP2 encoder (bsc#1018088)
- CVE-2016-10251: Use of uninitialized value in jpc_pi_nextcprl (jpc_t2cod.c) (bsc#1029497)
- CVE-2017-5498: left-shift undefined behaviour (bsc#1020353)
- CVE-2017-6850: NULL pointer dereference in jp2_cdef_destroy (jp2_cod.c) (bsc#1021868)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-05"/>
	<updated date="2017-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010977">SUSE bug 1010977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010979">SUSE bug 1010979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011830">SUSE bug 1011830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012530">SUSE bug 1012530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015400">SUSE bug 1015400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015993">SUSE bug 1015993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018088">SUSE bug 1018088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020353">SUSE bug 1020353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021868">SUSE bug 1021868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029497">SUSE bug 1029497</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10251/">CVE-2016-10251 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10251">CVE-2016-10251 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8654/">CVE-2016-8654 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8654">CVE-2016-8654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9395/">CVE-2016-9395 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9395">CVE-2016-9395 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9398/">CVE-2016-9398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9398">CVE-2016-9398 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9560/">CVE-2016-9560 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9560">CVE-2016-9560 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9583/">CVE-2016-9583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9583">CVE-2016-9583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9591/">CVE-2016-9591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9591">CVE-2016-9591 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9600/">CVE-2016-9600 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9600">CVE-2016-9600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5498/">CVE-2017-5498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5498">CVE-2017-5498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6850/">CVE-2017-6850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6850">CVE-2017-6850 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572008" comment="libjasper-1.900.14-134.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572009" comment="libjasper-32bit-1.900.14-134.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218717" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1009994" ref_url="https://bugzilla.suse.com/1009994" source="BUGZILLA"/>
		<reference ref_id="1010756" ref_url="https://bugzilla.suse.com/1010756" source="BUGZILLA"/>
		<reference ref_id="1010757" ref_url="https://bugzilla.suse.com/1010757" source="BUGZILLA"/>
		<reference ref_id="1010766" ref_url="https://bugzilla.suse.com/1010766" source="BUGZILLA"/>
		<reference ref_id="1010774" ref_url="https://bugzilla.suse.com/1010774" source="BUGZILLA"/>
		<reference ref_id="1010782" ref_url="https://bugzilla.suse.com/1010782" source="BUGZILLA"/>
		<reference ref_id="1010968" ref_url="https://bugzilla.suse.com/1010968" source="BUGZILLA"/>
		<reference ref_id="1010975" ref_url="https://bugzilla.suse.com/1010975" source="BUGZILLA"/>
		<reference ref_id="1047958" ref_url="https://bugzilla.suse.com/1047958" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9262" ref_url="https://www.suse.com/security/cve/CVE-2016-9262/" source="CVE"/>
		<reference ref_id="CVE-2016-9388" ref_url="https://www.suse.com/security/cve/CVE-2016-9388/" source="CVE"/>
		<reference ref_id="CVE-2016-9389" ref_url="https://www.suse.com/security/cve/CVE-2016-9389/" source="CVE"/>
		<reference ref_id="CVE-2016-9390" ref_url="https://www.suse.com/security/cve/CVE-2016-9390/" source="CVE"/>
		<reference ref_id="CVE-2016-9391" ref_url="https://www.suse.com/security/cve/CVE-2016-9391/" source="CVE"/>
		<reference ref_id="CVE-2016-9392" ref_url="https://www.suse.com/security/cve/CVE-2016-9392/" source="CVE"/>
		<reference ref_id="CVE-2016-9393" ref_url="https://www.suse.com/security/cve/CVE-2016-9393/" source="CVE"/>
		<reference ref_id="CVE-2016-9394" ref_url="https://www.suse.com/security/cve/CVE-2016-9394/" source="CVE"/>
		<reference ref_id="CVE-2017-1000050" ref_url="https://www.suse.com/security/cve/CVE-2017-1000050/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

Security issues fixed:
- CVE-2016-9262: Multiple integer overflows in the jas_realloc function in base/jas_malloc.c and
  mem_resize function in base/jas_stream.c allow remote attackers to cause a denial of service via
  a crafted image, which triggers use after free vulnerabilities. (bsc#1009994)
- CVE-2016-9388: The ras_getcmap function in ras_dec.c allows remote attackers to cause a denial
  of service (assertion failure) via a crafted image file. (bsc#1010975)
- CVE-2016-9389: The jpc_irct and jpc_iict functions in jpc_mct.c allow remote attackers to cause a
  denial of service (assertion failure). (bsc#1010968)
- CVE-2016-9390: The jas_seq2d_create function in jas_seq.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted image file. (bsc#1010774)
- CVE-2016-9391: The jpc_bitstream_getbits function in jpc_bs.c allows remote attackers to cause a
  denial of service (assertion failure) via a very large integer. (bsc#1010782)
- CVE-2017-1000050: The jp2_encode function in jp2_enc.c allows remote attackers to cause a denial
  of service. (bsc#1047958)

CVEs already fixed with previous update:
- CVE-2016-9392: The calcstepsizes function in jpc_dec.c allows remote attackers to cause a denial
  of service (assertion failure) via a crafted file. (bsc#1010757)
- CVE-2016-9393: The jpc_pi_nextrpcl function in jpc_t2cod.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted file. (bsc#1010766)
- CVE-2016-9394: The jas_seq2d_create function in jas_seq.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted file. (bsc#1010756)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-19"/>
	<updated date="2017-07-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009994">SUSE bug 1009994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010756">SUSE bug 1010756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010757">SUSE bug 1010757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010766">SUSE bug 1010766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010774">SUSE bug 1010774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010782">SUSE bug 1010782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010968">SUSE bug 1010968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010975">SUSE bug 1010975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047958">SUSE bug 1047958</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9262/">CVE-2016-9262 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9262">CVE-2016-9262 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9388/">CVE-2016-9388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9388">CVE-2016-9388 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9389/">CVE-2016-9389 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9389">CVE-2016-9389 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9390/">CVE-2016-9390 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9390">CVE-2016-9390 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9391/">CVE-2016-9391 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9391">CVE-2016-9391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9392/">CVE-2016-9392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9392">CVE-2016-9392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9393/">CVE-2016-9393 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9393">CVE-2016-9393 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9394/">CVE-2016-9394 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9394">CVE-2016-9394 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000050/">CVE-2017-1000050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000050">CVE-2017-1000050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572010" comment="libjasper-1.900.14-134.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572011" comment="libjasper-32bit-1.900.14-134.33.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218718" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1010783" ref_url="https://bugzilla.suse.com/1010783" source="BUGZILLA"/>
		<reference ref_id="1087020" ref_url="https://bugzilla.suse.com/1087020" source="BUGZILLA"/>
		<reference ref_id="1117505" ref_url="https://bugzilla.suse.com/1117505" source="BUGZILLA"/>
		<reference ref_id="1117507" ref_url="https://bugzilla.suse.com/1117507" source="BUGZILLA"/>
		<reference ref_id="1117508" ref_url="https://bugzilla.suse.com/1117508" source="BUGZILLA"/>
		<reference ref_id="1117511" ref_url="https://bugzilla.suse.com/1117511" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9396" ref_url="https://www.suse.com/security/cve/CVE-2016-9396/" source="CVE"/>
		<reference ref_id="CVE-2018-19539" ref_url="https://www.suse.com/security/cve/CVE-2018-19539/" source="CVE"/>
		<reference ref_id="CVE-2018-19540" ref_url="https://www.suse.com/security/cve/CVE-2018-19540/" source="CVE"/>
		<reference ref_id="CVE-2018-19541" ref_url="https://www.suse.com/security/cve/CVE-2018-19541/" source="CVE"/>
		<reference ref_id="CVE-2018-19542" ref_url="https://www.suse.com/security/cve/CVE-2018-19542/" source="CVE"/>
		<reference ref_id="CVE-2018-9055" ref_url="https://www.suse.com/security/cve/CVE-2018-9055/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

Security issues fixed:

- CVE-2018-19540: Fixed  a heap based overflow in jas_icctxtdesc_input (bsc#1117508).
- CVE-2018-19541: Fix heap based overread in jas_image_depalettize (bsc#1117507).    
- CVE-2018-19542: Fixed a denial of service in jp2_decode (bsc#1117505).
- CVE-2018-19539: Fixed a denial of service in jas_image_readcmpt (bsc#1117511).
- CVE-2018-9055: Fixed a denial of service in jpc_firstone (bsc#1087020).
- CVE-2016-9396: Fixed a denial of service in jpc_cox_getcompparms (bsc#1010783).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-01"/>
	<updated date="2019-10-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010783">SUSE bug 1010783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087020">SUSE bug 1087020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117505">SUSE bug 1117505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117507">SUSE bug 1117507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117508">SUSE bug 1117508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117511">SUSE bug 1117511</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9396/">CVE-2016-9396 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9396">CVE-2016-9396 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19539/">CVE-2018-19539 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19539">CVE-2018-19539 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19540/">CVE-2018-19540 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19540">CVE-2018-19540 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19541/">CVE-2018-19541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19541">CVE-2018-19541 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19542/">CVE-2018-19542 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19542">CVE-2018-19542 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9055/">CVE-2018-9055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9055">CVE-2018-9055 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572012" comment="libjasper-1.900.14-134.33.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572013" comment="libjasper-32bit-1.900.14-134.33.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218719" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1010786" ref_url="https://bugzilla.suse.com/1010786" source="BUGZILLA"/>
		<reference ref_id="1010979" ref_url="https://bugzilla.suse.com/1010979" source="BUGZILLA"/>
		<reference ref_id="1010980" ref_url="https://bugzilla.suse.com/1010980" source="BUGZILLA"/>
		<reference ref_id="1011829" ref_url="https://bugzilla.suse.com/1011829" source="BUGZILLA"/>
		<reference ref_id="1020451" ref_url="https://bugzilla.suse.com/1020451" source="BUGZILLA"/>
		<reference ref_id="1020456" ref_url="https://bugzilla.suse.com/1020456" source="BUGZILLA"/>
		<reference ref_id="1020458" ref_url="https://bugzilla.suse.com/1020458" source="BUGZILLA"/>
		<reference ref_id="1020460" ref_url="https://bugzilla.suse.com/1020460" source="BUGZILLA"/>
		<reference ref_id="1045450" ref_url="https://bugzilla.suse.com/1045450" source="BUGZILLA"/>
		<reference ref_id="1057152" ref_url="https://bugzilla.suse.com/1057152" source="BUGZILLA"/>
		<reference ref_id="1088278" ref_url="https://bugzilla.suse.com/1088278" source="BUGZILLA"/>
		<reference ref_id="1092115" ref_url="https://bugzilla.suse.com/1092115" source="BUGZILLA"/>
		<reference ref_id="1114498" ref_url="https://bugzilla.suse.com/1114498" source="BUGZILLA"/>
		<reference ref_id="1115637" ref_url="https://bugzilla.suse.com/1115637" source="BUGZILLA"/>
		<reference ref_id="1117328" ref_url="https://bugzilla.suse.com/1117328" source="BUGZILLA"/>
		<reference ref_id="1120805" ref_url="https://bugzilla.suse.com/1120805" source="BUGZILLA"/>
		<reference ref_id="1120807" ref_url="https://bugzilla.suse.com/1120807" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9397" ref_url="https://www.suse.com/security/cve/CVE-2016-9397/" source="CVE"/>
		<reference ref_id="CVE-2016-9398" ref_url="https://www.suse.com/security/cve/CVE-2016-9398/" source="CVE"/>
		<reference ref_id="CVE-2016-9399" ref_url="https://www.suse.com/security/cve/CVE-2016-9399/" source="CVE"/>
		<reference ref_id="CVE-2016-9557" ref_url="https://www.suse.com/security/cve/CVE-2016-9557/" source="CVE"/>
		<reference ref_id="CVE-2017-14132" ref_url="https://www.suse.com/security/cve/CVE-2017-14132/" source="CVE"/>
		<reference ref_id="CVE-2017-5499" ref_url="https://www.suse.com/security/cve/CVE-2017-5499/" source="CVE"/>
		<reference ref_id="CVE-2017-5503" ref_url="https://www.suse.com/security/cve/CVE-2017-5503/" source="CVE"/>
		<reference ref_id="CVE-2017-5504" ref_url="https://www.suse.com/security/cve/CVE-2017-5504/" source="CVE"/>
		<reference ref_id="CVE-2017-5505" ref_url="https://www.suse.com/security/cve/CVE-2017-5505/" source="CVE"/>
		<reference ref_id="CVE-2017-9782" ref_url="https://www.suse.com/security/cve/CVE-2017-9782/" source="CVE"/>
		<reference ref_id="CVE-2018-18873" ref_url="https://www.suse.com/security/cve/CVE-2018-18873/" source="CVE"/>
		<reference ref_id="CVE-2018-19139" ref_url="https://www.suse.com/security/cve/CVE-2018-19139/" source="CVE"/>
		<reference ref_id="CVE-2018-19543" ref_url="https://www.suse.com/security/cve/CVE-2018-19543/" source="CVE"/>
		<reference ref_id="CVE-2018-20570" ref_url="https://www.suse.com/security/cve/CVE-2018-20570/" source="CVE"/>
		<reference ref_id="CVE-2018-20622" ref_url="https://www.suse.com/security/cve/CVE-2018-20622/" source="CVE"/>
		<reference ref_id="CVE-2018-9154" ref_url="https://www.suse.com/security/cve/CVE-2018-9154/" source="CVE"/>
		<reference ref_id="CVE-2018-9252" ref_url="https://www.suse.com/security/cve/CVE-2018-9252/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

- CVE-2016-9398: Improved patch for already fixed issue (bsc#1010979).
- CVE-2016-9399: Fix assert in calcstepsizes (bsc#1010980).
- CVE-2016-9397: Fix assert in jpc_dequantize (bsc#1010786).
- CVE-2016-9557: Fix signed integer overflow (bsc#1011829).
- CVE-2017-5499: Validate component depth bit (bsc#1020451).
- CVE-2017-5503: Check bounds in jas_seq2d_bindsub() (bsc#1020456).
- CVE-2017-5504: Check bounds in jas_seq2d_bindsub() (bsc#1020458).
- CVE-2017-5505: Check bounds in jas_seq2d_bindsub() (bsc#1020460).
- CVE-2017-14132: Fix heap base overflow in by checking components (bsc#1057152).
- CVE-2018-9154: Fixed a potential denial of service in jpc_dec_process_sot() (bsc#1092115).
- CVE-2018-9252: Fix reachable assertion in jpc_abstorelstepsize (bsc#1088278).
- CVE-2018-18873: Fix null pointer deref in ras_putdatastd (bsc#1114498).
- CVE-2018-19139: Fix mem leaks by registering jpc_unk_destroyparms (bsc#1115637).
- CVE-2018-19543, bsc#1045450 CVE-2017-9782: Fix numchans mixup (bsc#1117328).
- CVE-2018-20570: Fix heap based buffer over-read in jp2_encode (bsc#1120807).
- CVE-2018-20622: Fix memory leak in jas_malloc.c (bsc#1120805).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-01"/>
	<updated date="2020-09-01"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1010786">SUSE bug 1010786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010979">SUSE bug 1010979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010980">SUSE bug 1010980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011829">SUSE bug 1011829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020451">SUSE bug 1020451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020456">SUSE bug 1020456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020458">SUSE bug 1020458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020460">SUSE bug 1020460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045450">SUSE bug 1045450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057152">SUSE bug 1057152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088278">SUSE bug 1088278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092115">SUSE bug 1092115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114498">SUSE bug 1114498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115637">SUSE bug 1115637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117328">SUSE bug 1117328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120805">SUSE bug 1120805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120807">SUSE bug 1120807</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9397/">CVE-2016-9397 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9397">CVE-2016-9397 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9398/">CVE-2016-9398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9398">CVE-2016-9398 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9399/">CVE-2016-9399 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9399">CVE-2016-9399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9557/">CVE-2016-9557 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9557">CVE-2016-9557 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14132/">CVE-2017-14132 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14132">CVE-2017-14132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5499/">CVE-2017-5499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5499">CVE-2017-5499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5503/">CVE-2017-5503 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5503">CVE-2017-5503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5504/">CVE-2017-5504 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5504">CVE-2017-5504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5505/">CVE-2017-5505 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5505">CVE-2017-5505 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9782/">CVE-2017-9782 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9782">CVE-2017-9782 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18873/">CVE-2018-18873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18873">CVE-2018-18873 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19139/">CVE-2018-19139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19139">CVE-2018-19139 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19543/">CVE-2018-19543 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19543">CVE-2018-19543 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20570/">CVE-2018-20570 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20570">CVE-2018-20570 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20622/">CVE-2018-20622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20622">CVE-2018-20622 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9154/">CVE-2018-9154 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9154">CVE-2018-9154 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9252/">CVE-2018-9252 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9252">CVE-2018-9252 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572014" comment="libjasper-1.900.14-134.33.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572015" comment="libjasper-32bit-1.900.14-134.33.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218720" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179748" ref_url="https://bugzilla.suse.com/1179748" source="BUGZILLA"/>
		<reference ref_id="1181483" ref_url="https://bugzilla.suse.com/1181483" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27828" ref_url="https://www.suse.com/security/cve/CVE-2020-27828/" source="CVE"/>
		<reference ref_id="CVE-2021-3272" ref_url="https://www.suse.com/security/cve/CVE-2021-3272/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

- bsc#1179748 CVE-2020-27828: Fix heap overflow by checking maxrlvls
- bsc#1181483 CVE-2021-3272: Fix buffer over-read in jp2_decode
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179748">SUSE bug 1179748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181483">SUSE bug 1181483</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27828/">CVE-2020-27828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27828">CVE-2020-27828 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3272/">CVE-2021-3272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3272">CVE-2021-3272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572016" comment="libjasper-1.900.14-134.33.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572017" comment="libjasper-32bit-1.900.14-134.33.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218721" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188437" ref_url="https://bugzilla.suse.com/1188437" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27845" ref_url="https://www.suse.com/security/cve/CVE-2021-27845/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

- CVE-2021-27845: Fixed divide-by-zery issue in cp_create() (bsc#1188437).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-24"/>
	<updated date="2022-02-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188437">SUSE bug 1188437</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-27845/">CVE-2021-27845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27845">CVE-2021-27845 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668400" comment="libjasper-1.900.14-134.33.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668401" comment="libjasper-32bit-1.900.14-134.33.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218722" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182104" ref_url="https://bugzilla.suse.com/1182104" source="BUGZILLA"/>
		<reference ref_id="1182105" ref_url="https://bugzilla.suse.com/1182105" source="BUGZILLA"/>
		<reference ref_id="1184757" ref_url="https://bugzilla.suse.com/1184757" source="BUGZILLA"/>
		<reference ref_id="1184798" ref_url="https://bugzilla.suse.com/1184798" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26926" ref_url="https://www.suse.com/security/cve/CVE-2021-26926/" source="CVE"/>
		<reference ref_id="CVE-2021-26927" ref_url="https://www.suse.com/security/cve/CVE-2021-26927/" source="CVE"/>
		<reference ref_id="CVE-2021-3443" ref_url="https://www.suse.com/security/cve/CVE-2021-3443/" source="CVE"/>
		<reference ref_id="CVE-2021-3467" ref_url="https://www.suse.com/security/cve/CVE-2021-3467/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

- CVE-2021-3467: Fixed NULL pointer deref in jp2_decode() (bsc#1184757). 
- CVE-2021-3443: Fixed NULL pointer deref in jp2_decode() (bsc#1184798).
- CVE-2021-26927: Fixed NULL pointer deref in jp2_decode() (bsc#1182104).
- CVE-2021-26926: Fixed an out of bounds read in jp2_decode() (bsc#1182105).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-29"/>
	<updated date="2022-04-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182104">SUSE bug 1182104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182105">SUSE bug 1182105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184757">SUSE bug 1184757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184798">SUSE bug 1184798</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-26926/">CVE-2021-26926 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26926">CVE-2021-26926 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-26927/">CVE-2021-26927 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26927">CVE-2021-26927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3443/">CVE-2021-3443 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3443">CVE-2021-3443 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3467/">CVE-2021-3467 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3467">CVE-2021-3467 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680672" comment="libjasper-1.900.14-134.33.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680673" comment="libjasper-32bit-1.900.14-134.33.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218723" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1202642" ref_url="https://bugzilla.suse.com/1202642" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2963" ref_url="https://www.suse.com/security/cve/CVE-2022-2963/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

- CVE-2022-2963: Fixed memory leaks in function cmdopts_parse (bsc#1202642).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-19"/>
	<updated date="2022-10-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1202642">SUSE bug 1202642</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2963/">CVE-2022-2963 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2963">CVE-2022-2963 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992821" comment="libjasper-1.900.14-134.33.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992822" comment="libjasper-32bit-1.900.14-134.33.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218724" version="1" class="patch">
	<metadata>
		<title>Security update for IBM Java</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="592934" ref_url="https://bugzilla.suse.com/592934" source="BUGZILLA"/>
		<reference ref_id="817062" ref_url="https://bugzilla.suse.com/817062" source="BUGZILLA"/>
		<reference ref_id="819288" ref_url="https://bugzilla.suse.com/819288" source="BUGZILLA"/>
		<reference ref_id="823034" ref_url="https://bugzilla.suse.com/823034" source="BUGZILLA"/>
		<reference ref_id="829212" ref_url="https://bugzilla.suse.com/829212" source="BUGZILLA"/>
		<reference ref_id="849212" ref_url="https://bugzilla.suse.com/849212" source="BUGZILLA"/>
		<reference ref_id="862064" ref_url="https://bugzilla.suse.com/862064" source="BUGZILLA"/>
		<reference ref_id="877430" ref_url="https://bugzilla.suse.com/877430" source="BUGZILLA"/>
		<reference ref_id="891700" ref_url="https://bugzilla.suse.com/891700" source="BUGZILLA"/>
		<reference ref_id="904889" ref_url="https://bugzilla.suse.com/904889" source="BUGZILLA"/>
		<reference ref_id="912434" ref_url="https://bugzilla.suse.com/912434" source="BUGZILLA"/>
		<reference ref_id="912447" ref_url="https://bugzilla.suse.com/912447" source="BUGZILLA"/>
		<reference ref_id="916265" ref_url="https://bugzilla.suse.com/916265" source="BUGZILLA"/>
		<reference ref_id="916266" ref_url="https://bugzilla.suse.com/916266" source="BUGZILLA"/>
		<reference ref_id="930365" ref_url="https://bugzilla.suse.com/930365" source="BUGZILLA"/>
		<reference ref_id="931702" ref_url="https://bugzilla.suse.com/931702" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0401" ref_url="https://www.suse.com/security/cve/CVE-2013-0401/" source="CVE"/>
		<reference ref_id="CVE-2013-1491" ref_url="https://www.suse.com/security/cve/CVE-2013-1491/" source="CVE"/>
		<reference ref_id="CVE-2013-1500" ref_url="https://www.suse.com/security/cve/CVE-2013-1500/" source="CVE"/>
		<reference ref_id="CVE-2013-1537" ref_url="https://www.suse.com/security/cve/CVE-2013-1537/" source="CVE"/>
		<reference ref_id="CVE-2013-1540" ref_url="https://www.suse.com/security/cve/CVE-2013-1540/" source="CVE"/>
		<reference ref_id="CVE-2013-1557" ref_url="https://www.suse.com/security/cve/CVE-2013-1557/" source="CVE"/>
		<reference ref_id="CVE-2013-1563" ref_url="https://www.suse.com/security/cve/CVE-2013-1563/" source="CVE"/>
		<reference ref_id="CVE-2013-1569" ref_url="https://www.suse.com/security/cve/CVE-2013-1569/" source="CVE"/>
		<reference ref_id="CVE-2013-1571" ref_url="https://www.suse.com/security/cve/CVE-2013-1571/" source="CVE"/>
		<reference ref_id="CVE-2013-2383" ref_url="https://www.suse.com/security/cve/CVE-2013-2383/" source="CVE"/>
		<reference ref_id="CVE-2013-2384" ref_url="https://www.suse.com/security/cve/CVE-2013-2384/" source="CVE"/>
		<reference ref_id="CVE-2013-2394" ref_url="https://www.suse.com/security/cve/CVE-2013-2394/" source="CVE"/>
		<reference ref_id="CVE-2013-2407" ref_url="https://www.suse.com/security/cve/CVE-2013-2407/" source="CVE"/>
		<reference ref_id="CVE-2013-2412" ref_url="https://www.suse.com/security/cve/CVE-2013-2412/" source="CVE"/>
		<reference ref_id="CVE-2013-2417" ref_url="https://www.suse.com/security/cve/CVE-2013-2417/" source="CVE"/>
		<reference ref_id="CVE-2013-2418" ref_url="https://www.suse.com/security/cve/CVE-2013-2418/" source="CVE"/>
		<reference ref_id="CVE-2013-2419" ref_url="https://www.suse.com/security/cve/CVE-2013-2419/" source="CVE"/>
		<reference ref_id="CVE-2013-2420" ref_url="https://www.suse.com/security/cve/CVE-2013-2420/" source="CVE"/>
		<reference ref_id="CVE-2013-2422" ref_url="https://www.suse.com/security/cve/CVE-2013-2422/" source="CVE"/>
		<reference ref_id="CVE-2013-2424" ref_url="https://www.suse.com/security/cve/CVE-2013-2424/" source="CVE"/>
		<reference ref_id="CVE-2013-2429" ref_url="https://www.suse.com/security/cve/CVE-2013-2429/" source="CVE"/>
		<reference ref_id="CVE-2013-2430" ref_url="https://www.suse.com/security/cve/CVE-2013-2430/" source="CVE"/>
		<reference ref_id="CVE-2013-2432" ref_url="https://www.suse.com/security/cve/CVE-2013-2432/" source="CVE"/>
		<reference ref_id="CVE-2013-2433" ref_url="https://www.suse.com/security/cve/CVE-2013-2433/" source="CVE"/>
		<reference ref_id="CVE-2013-2435" ref_url="https://www.suse.com/security/cve/CVE-2013-2435/" source="CVE"/>
		<reference ref_id="CVE-2013-2437" ref_url="https://www.suse.com/security/cve/CVE-2013-2437/" source="CVE"/>
		<reference ref_id="CVE-2013-2440" ref_url="https://www.suse.com/security/cve/CVE-2013-2440/" source="CVE"/>
		<reference ref_id="CVE-2013-2442" ref_url="https://www.suse.com/security/cve/CVE-2013-2442/" source="CVE"/>
		<reference ref_id="CVE-2013-2443" ref_url="https://www.suse.com/security/cve/CVE-2013-2443/" source="CVE"/>
		<reference ref_id="CVE-2013-2444" ref_url="https://www.suse.com/security/cve/CVE-2013-2444/" source="CVE"/>
		<reference ref_id="CVE-2013-2446" ref_url="https://www.suse.com/security/cve/CVE-2013-2446/" source="CVE"/>
		<reference ref_id="CVE-2013-2447" ref_url="https://www.suse.com/security/cve/CVE-2013-2447/" source="CVE"/>
		<reference ref_id="CVE-2013-2448" ref_url="https://www.suse.com/security/cve/CVE-2013-2448/" source="CVE"/>
		<reference ref_id="CVE-2013-2450" ref_url="https://www.suse.com/security/cve/CVE-2013-2450/" source="CVE"/>
		<reference ref_id="CVE-2013-2451" ref_url="https://www.suse.com/security/cve/CVE-2013-2451/" source="CVE"/>
		<reference ref_id="CVE-2013-2452" ref_url="https://www.suse.com/security/cve/CVE-2013-2452/" source="CVE"/>
		<reference ref_id="CVE-2013-2453" ref_url="https://www.suse.com/security/cve/CVE-2013-2453/" source="CVE"/>
		<reference ref_id="CVE-2013-2454" ref_url="https://www.suse.com/security/cve/CVE-2013-2454/" source="CVE"/>
		<reference ref_id="CVE-2013-2455" ref_url="https://www.suse.com/security/cve/CVE-2013-2455/" source="CVE"/>
		<reference ref_id="CVE-2013-2456" ref_url="https://www.suse.com/security/cve/CVE-2013-2456/" source="CVE"/>
		<reference ref_id="CVE-2013-2457" ref_url="https://www.suse.com/security/cve/CVE-2013-2457/" source="CVE"/>
		<reference ref_id="CVE-2013-2459" ref_url="https://www.suse.com/security/cve/CVE-2013-2459/" source="CVE"/>
		<reference ref_id="CVE-2013-2463" ref_url="https://www.suse.com/security/cve/CVE-2013-2463/" source="CVE"/>
		<reference ref_id="CVE-2013-2464" ref_url="https://www.suse.com/security/cve/CVE-2013-2464/" source="CVE"/>
		<reference ref_id="CVE-2013-2465" ref_url="https://www.suse.com/security/cve/CVE-2013-2465/" source="CVE"/>
		<reference ref_id="CVE-2013-2466" ref_url="https://www.suse.com/security/cve/CVE-2013-2466/" source="CVE"/>
		<reference ref_id="CVE-2013-2468" ref_url="https://www.suse.com/security/cve/CVE-2013-2468/" source="CVE"/>
		<reference ref_id="CVE-2013-2469" ref_url="https://www.suse.com/security/cve/CVE-2013-2469/" source="CVE"/>
		<reference ref_id="CVE-2013-2470" ref_url="https://www.suse.com/security/cve/CVE-2013-2470/" source="CVE"/>
		<reference ref_id="CVE-2013-2471" ref_url="https://www.suse.com/security/cve/CVE-2013-2471/" source="CVE"/>
		<reference ref_id="CVE-2013-2472" ref_url="https://www.suse.com/security/cve/CVE-2013-2472/" source="CVE"/>
		<reference ref_id="CVE-2013-2473" ref_url="https://www.suse.com/security/cve/CVE-2013-2473/" source="CVE"/>
		<reference ref_id="CVE-2013-3009" ref_url="https://www.suse.com/security/cve/CVE-2013-3009/" source="CVE"/>
		<reference ref_id="CVE-2013-3011" ref_url="https://www.suse.com/security/cve/CVE-2013-3011/" source="CVE"/>
		<reference ref_id="CVE-2013-3012" ref_url="https://www.suse.com/security/cve/CVE-2013-3012/" source="CVE"/>
		<reference ref_id="CVE-2013-3743" ref_url="https://www.suse.com/security/cve/CVE-2013-3743/" source="CVE"/>
		<reference ref_id="CVE-2013-3829" ref_url="https://www.suse.com/security/cve/CVE-2013-3829/" source="CVE"/>
		<reference ref_id="CVE-2013-4002" ref_url="https://www.suse.com/security/cve/CVE-2013-4002/" source="CVE"/>
		<reference ref_id="CVE-2013-4041" ref_url="https://www.suse.com/security/cve/CVE-2013-4041/" source="CVE"/>
		<reference ref_id="CVE-2013-5372" ref_url="https://www.suse.com/security/cve/CVE-2013-5372/" source="CVE"/>
		<reference ref_id="CVE-2013-5375" ref_url="https://www.suse.com/security/cve/CVE-2013-5375/" source="CVE"/>
		<reference ref_id="CVE-2013-5456" ref_url="https://www.suse.com/security/cve/CVE-2013-5456/" source="CVE"/>
		<reference ref_id="CVE-2013-5457" ref_url="https://www.suse.com/security/cve/CVE-2013-5457/" source="CVE"/>
		<reference ref_id="CVE-2013-5458" ref_url="https://www.suse.com/security/cve/CVE-2013-5458/" source="CVE"/>
		<reference ref_id="CVE-2013-5772" ref_url="https://www.suse.com/security/cve/CVE-2013-5772/" source="CVE"/>
		<reference ref_id="CVE-2013-5774" ref_url="https://www.suse.com/security/cve/CVE-2013-5774/" source="CVE"/>
		<reference ref_id="CVE-2013-5776" ref_url="https://www.suse.com/security/cve/CVE-2013-5776/" source="CVE"/>
		<reference ref_id="CVE-2013-5778" ref_url="https://www.suse.com/security/cve/CVE-2013-5778/" source="CVE"/>
		<reference ref_id="CVE-2013-5780" ref_url="https://www.suse.com/security/cve/CVE-2013-5780/" source="CVE"/>
		<reference ref_id="CVE-2013-5782" ref_url="https://www.suse.com/security/cve/CVE-2013-5782/" source="CVE"/>
		<reference ref_id="CVE-2013-5783" ref_url="https://www.suse.com/security/cve/CVE-2013-5783/" source="CVE"/>
		<reference ref_id="CVE-2013-5784" ref_url="https://www.suse.com/security/cve/CVE-2013-5784/" source="CVE"/>
		<reference ref_id="CVE-2013-5787" ref_url="https://www.suse.com/security/cve/CVE-2013-5787/" source="CVE"/>
		<reference ref_id="CVE-2013-5788" ref_url="https://www.suse.com/security/cve/CVE-2013-5788/" source="CVE"/>
		<reference ref_id="CVE-2013-5789" ref_url="https://www.suse.com/security/cve/CVE-2013-5789/" source="CVE"/>
		<reference ref_id="CVE-2013-5790" ref_url="https://www.suse.com/security/cve/CVE-2013-5790/" source="CVE"/>
		<reference ref_id="CVE-2013-5797" ref_url="https://www.suse.com/security/cve/CVE-2013-5797/" source="CVE"/>
		<reference ref_id="CVE-2013-5800" ref_url="https://www.suse.com/security/cve/CVE-2013-5800/" source="CVE"/>
		<reference ref_id="CVE-2013-5801" ref_url="https://www.suse.com/security/cve/CVE-2013-5801/" source="CVE"/>
		<reference ref_id="CVE-2013-5802" ref_url="https://www.suse.com/security/cve/CVE-2013-5802/" source="CVE"/>
		<reference ref_id="CVE-2013-5803" ref_url="https://www.suse.com/security/cve/CVE-2013-5803/" source="CVE"/>
		<reference ref_id="CVE-2013-5804" ref_url="https://www.suse.com/security/cve/CVE-2013-5804/" source="CVE"/>
		<reference ref_id="CVE-2013-5809" ref_url="https://www.suse.com/security/cve/CVE-2013-5809/" source="CVE"/>
		<reference ref_id="CVE-2013-5812" ref_url="https://www.suse.com/security/cve/CVE-2013-5812/" source="CVE"/>
		<reference ref_id="CVE-2013-5814" ref_url="https://www.suse.com/security/cve/CVE-2013-5814/" source="CVE"/>
		<reference ref_id="CVE-2013-5817" ref_url="https://www.suse.com/security/cve/CVE-2013-5817/" source="CVE"/>
		<reference ref_id="CVE-2013-5818" ref_url="https://www.suse.com/security/cve/CVE-2013-5818/" source="CVE"/>
		<reference ref_id="CVE-2013-5819" ref_url="https://www.suse.com/security/cve/CVE-2013-5819/" source="CVE"/>
		<reference ref_id="CVE-2013-5820" ref_url="https://www.suse.com/security/cve/CVE-2013-5820/" source="CVE"/>
		<reference ref_id="CVE-2013-5823" ref_url="https://www.suse.com/security/cve/CVE-2013-5823/" source="CVE"/>
		<reference ref_id="CVE-2013-5824" ref_url="https://www.suse.com/security/cve/CVE-2013-5824/" source="CVE"/>
		<reference ref_id="CVE-2013-5825" ref_url="https://www.suse.com/security/cve/CVE-2013-5825/" source="CVE"/>
		<reference ref_id="CVE-2013-5829" ref_url="https://www.suse.com/security/cve/CVE-2013-5829/" source="CVE"/>
		<reference ref_id="CVE-2013-5830" ref_url="https://www.suse.com/security/cve/CVE-2013-5830/" source="CVE"/>
		<reference ref_id="CVE-2013-5831" ref_url="https://www.suse.com/security/cve/CVE-2013-5831/" source="CVE"/>
		<reference ref_id="CVE-2013-5832" ref_url="https://www.suse.com/security/cve/CVE-2013-5832/" source="CVE"/>
		<reference ref_id="CVE-2013-5838" ref_url="https://www.suse.com/security/cve/CVE-2013-5838/" source="CVE"/>
		<reference ref_id="CVE-2013-5840" ref_url="https://www.suse.com/security/cve/CVE-2013-5840/" source="CVE"/>
		<reference ref_id="CVE-2013-5842" ref_url="https://www.suse.com/security/cve/CVE-2013-5842/" source="CVE"/>
		<reference ref_id="CVE-2013-5843" ref_url="https://www.suse.com/security/cve/CVE-2013-5843/" source="CVE"/>
		<reference ref_id="CVE-2013-5848" ref_url="https://www.suse.com/security/cve/CVE-2013-5848/" source="CVE"/>
		<reference ref_id="CVE-2013-5849" ref_url="https://www.suse.com/security/cve/CVE-2013-5849/" source="CVE"/>
		<reference ref_id="CVE-2013-5850" ref_url="https://www.suse.com/security/cve/CVE-2013-5850/" source="CVE"/>
		<reference ref_id="CVE-2013-5851" ref_url="https://www.suse.com/security/cve/CVE-2013-5851/" source="CVE"/>
		<reference ref_id="CVE-2013-5878" ref_url="https://www.suse.com/security/cve/CVE-2013-5878/" source="CVE"/>
		<reference ref_id="CVE-2013-5884" ref_url="https://www.suse.com/security/cve/CVE-2013-5884/" source="CVE"/>
		<reference ref_id="CVE-2013-5887" ref_url="https://www.suse.com/security/cve/CVE-2013-5887/" source="CVE"/>
		<reference ref_id="CVE-2013-5888" ref_url="https://www.suse.com/security/cve/CVE-2013-5888/" source="CVE"/>
		<reference ref_id="CVE-2013-5889" ref_url="https://www.suse.com/security/cve/CVE-2013-5889/" source="CVE"/>
		<reference ref_id="CVE-2013-5896" ref_url="https://www.suse.com/security/cve/CVE-2013-5896/" source="CVE"/>
		<reference ref_id="CVE-2013-5898" ref_url="https://www.suse.com/security/cve/CVE-2013-5898/" source="CVE"/>
		<reference ref_id="CVE-2013-5899" ref_url="https://www.suse.com/security/cve/CVE-2013-5899/" source="CVE"/>
		<reference ref_id="CVE-2013-5907" ref_url="https://www.suse.com/security/cve/CVE-2013-5907/" source="CVE"/>
		<reference ref_id="CVE-2013-5910" ref_url="https://www.suse.com/security/cve/CVE-2013-5910/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6954" ref_url="https://www.suse.com/security/cve/CVE-2013-6954/" source="CVE"/>
		<reference ref_id="CVE-2014-0368" ref_url="https://www.suse.com/security/cve/CVE-2014-0368/" source="CVE"/>
		<reference ref_id="CVE-2014-0373" ref_url="https://www.suse.com/security/cve/CVE-2014-0373/" source="CVE"/>
		<reference ref_id="CVE-2014-0375" ref_url="https://www.suse.com/security/cve/CVE-2014-0375/" source="CVE"/>
		<reference ref_id="CVE-2014-0376" ref_url="https://www.suse.com/security/cve/CVE-2014-0376/" source="CVE"/>
		<reference ref_id="CVE-2014-0387" ref_url="https://www.suse.com/security/cve/CVE-2014-0387/" source="CVE"/>
		<reference ref_id="CVE-2014-0403" ref_url="https://www.suse.com/security/cve/CVE-2014-0403/" source="CVE"/>
		<reference ref_id="CVE-2014-0410" ref_url="https://www.suse.com/security/cve/CVE-2014-0410/" source="CVE"/>
		<reference ref_id="CVE-2014-0411" ref_url="https://www.suse.com/security/cve/CVE-2014-0411/" source="CVE"/>
		<reference ref_id="CVE-2014-0415" ref_url="https://www.suse.com/security/cve/CVE-2014-0415/" source="CVE"/>
		<reference ref_id="CVE-2014-0416" ref_url="https://www.suse.com/security/cve/CVE-2014-0416/" source="CVE"/>
		<reference ref_id="CVE-2014-0417" ref_url="https://www.suse.com/security/cve/CVE-2014-0417/" source="CVE"/>
		<reference ref_id="CVE-2014-0422" ref_url="https://www.suse.com/security/cve/CVE-2014-0422/" source="CVE"/>
		<reference ref_id="CVE-2014-0423" ref_url="https://www.suse.com/security/cve/CVE-2014-0423/" source="CVE"/>
		<reference ref_id="CVE-2014-0424" ref_url="https://www.suse.com/security/cve/CVE-2014-0424/" source="CVE"/>
		<reference ref_id="CVE-2014-0428" ref_url="https://www.suse.com/security/cve/CVE-2014-0428/" source="CVE"/>
		<reference ref_id="CVE-2014-0429" ref_url="https://www.suse.com/security/cve/CVE-2014-0429/" source="CVE"/>
		<reference ref_id="CVE-2014-0446" ref_url="https://www.suse.com/security/cve/CVE-2014-0446/" source="CVE"/>
		<reference ref_id="CVE-2014-0449" ref_url="https://www.suse.com/security/cve/CVE-2014-0449/" source="CVE"/>
		<reference ref_id="CVE-2014-0451" ref_url="https://www.suse.com/security/cve/CVE-2014-0451/" source="CVE"/>
		<reference ref_id="CVE-2014-0452" ref_url="https://www.suse.com/security/cve/CVE-2014-0452/" source="CVE"/>
		<reference ref_id="CVE-2014-0453" ref_url="https://www.suse.com/security/cve/CVE-2014-0453/" source="CVE"/>
		<reference ref_id="CVE-2014-0457" ref_url="https://www.suse.com/security/cve/CVE-2014-0457/" source="CVE"/>
		<reference ref_id="CVE-2014-0458" ref_url="https://www.suse.com/security/cve/CVE-2014-0458/" source="CVE"/>
		<reference ref_id="CVE-2014-0459" ref_url="https://www.suse.com/security/cve/CVE-2014-0459/" source="CVE"/>
		<reference ref_id="CVE-2014-0460" ref_url="https://www.suse.com/security/cve/CVE-2014-0460/" source="CVE"/>
		<reference ref_id="CVE-2014-0461" ref_url="https://www.suse.com/security/cve/CVE-2014-0461/" source="CVE"/>
		<reference ref_id="CVE-2014-0878" ref_url="https://www.suse.com/security/cve/CVE-2014-0878/" source="CVE"/>
		<reference ref_id="CVE-2014-1876" ref_url="https://www.suse.com/security/cve/CVE-2014-1876/" source="CVE"/>
		<reference ref_id="CVE-2014-2398" ref_url="https://www.suse.com/security/cve/CVE-2014-2398/" source="CVE"/>
		<reference ref_id="CVE-2014-2401" ref_url="https://www.suse.com/security/cve/CVE-2014-2401/" source="CVE"/>
		<reference ref_id="CVE-2014-2409" ref_url="https://www.suse.com/security/cve/CVE-2014-2409/" source="CVE"/>
		<reference ref_id="CVE-2014-2412" ref_url="https://www.suse.com/security/cve/CVE-2014-2412/" source="CVE"/>
		<reference ref_id="CVE-2014-2414" ref_url="https://www.suse.com/security/cve/CVE-2014-2414/" source="CVE"/>
		<reference ref_id="CVE-2014-2420" ref_url="https://www.suse.com/security/cve/CVE-2014-2420/" source="CVE"/>
		<reference ref_id="CVE-2014-2421" ref_url="https://www.suse.com/security/cve/CVE-2014-2421/" source="CVE"/>
		<reference ref_id="CVE-2014-2423" ref_url="https://www.suse.com/security/cve/CVE-2014-2423/" source="CVE"/>
		<reference ref_id="CVE-2014-2427" ref_url="https://www.suse.com/security/cve/CVE-2014-2427/" source="CVE"/>
		<reference ref_id="CVE-2014-2428" ref_url="https://www.suse.com/security/cve/CVE-2014-2428/" source="CVE"/>
		<reference ref_id="CVE-2014-3065" ref_url="https://www.suse.com/security/cve/CVE-2014-3065/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-4209" ref_url="https://www.suse.com/security/cve/CVE-2014-4209/" source="CVE"/>
		<reference ref_id="CVE-2014-4218" ref_url="https://www.suse.com/security/cve/CVE-2014-4218/" source="CVE"/>
		<reference ref_id="CVE-2014-4219" ref_url="https://www.suse.com/security/cve/CVE-2014-4219/" source="CVE"/>
		<reference ref_id="CVE-2014-4227" ref_url="https://www.suse.com/security/cve/CVE-2014-4227/" source="CVE"/>
		<reference ref_id="CVE-2014-4244" ref_url="https://www.suse.com/security/cve/CVE-2014-4244/" source="CVE"/>
		<reference ref_id="CVE-2014-4252" ref_url="https://www.suse.com/security/cve/CVE-2014-4252/" source="CVE"/>
		<reference ref_id="CVE-2014-4262" ref_url="https://www.suse.com/security/cve/CVE-2014-4262/" source="CVE"/>
		<reference ref_id="CVE-2014-4263" ref_url="https://www.suse.com/security/cve/CVE-2014-4263/" source="CVE"/>
		<reference ref_id="CVE-2014-4265" ref_url="https://www.suse.com/security/cve/CVE-2014-4265/" source="CVE"/>
		<reference ref_id="CVE-2014-4268" ref_url="https://www.suse.com/security/cve/CVE-2014-4268/" source="CVE"/>
		<reference ref_id="CVE-2014-4288" ref_url="https://www.suse.com/security/cve/CVE-2014-4288/" source="CVE"/>
		<reference ref_id="CVE-2014-6456" ref_url="https://www.suse.com/security/cve/CVE-2014-6456/" source="CVE"/>
		<reference ref_id="CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457/" source="CVE"/>
		<reference ref_id="CVE-2014-6458" ref_url="https://www.suse.com/security/cve/CVE-2014-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-6466" ref_url="https://www.suse.com/security/cve/CVE-2014-6466/" source="CVE"/>
		<reference ref_id="CVE-2014-6476" ref_url="https://www.suse.com/security/cve/CVE-2014-6476/" source="CVE"/>
		<reference ref_id="CVE-2014-6492" ref_url="https://www.suse.com/security/cve/CVE-2014-6492/" source="CVE"/>
		<reference ref_id="CVE-2014-6493" ref_url="https://www.suse.com/security/cve/CVE-2014-6493/" source="CVE"/>
		<reference ref_id="CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502/" source="CVE"/>
		<reference ref_id="CVE-2014-6503" ref_url="https://www.suse.com/security/cve/CVE-2014-6503/" source="CVE"/>
		<reference ref_id="CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506/" source="CVE"/>
		<reference ref_id="CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511/" source="CVE"/>
		<reference ref_id="CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512/" source="CVE"/>
		<reference ref_id="CVE-2014-6513" ref_url="https://www.suse.com/security/cve/CVE-2014-6513/" source="CVE"/>
		<reference ref_id="CVE-2014-6515" ref_url="https://www.suse.com/security/cve/CVE-2014-6515/" source="CVE"/>
		<reference ref_id="CVE-2014-6527" ref_url="https://www.suse.com/security/cve/CVE-2014-6527/" source="CVE"/>
		<reference ref_id="CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531/" source="CVE"/>
		<reference ref_id="CVE-2014-6532" ref_url="https://www.suse.com/security/cve/CVE-2014-6532/" source="CVE"/>
		<reference ref_id="CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558/" source="CVE"/>
		<reference ref_id="CVE-2014-8891" ref_url="https://www.suse.com/security/cve/CVE-2014-8891/" source="CVE"/>
		<reference ref_id="CVE-2014-8892" ref_url="https://www.suse.com/security/cve/CVE-2014-8892/" source="CVE"/>
		<reference ref_id="CVE-2015-0138" ref_url="https://www.suse.com/security/cve/CVE-2015-0138/" source="CVE"/>
		<reference ref_id="CVE-2015-0192" ref_url="https://www.suse.com/security/cve/CVE-2015-0192/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0458" ref_url="https://www.suse.com/security/cve/CVE-2015-0458/" source="CVE"/>
		<reference ref_id="CVE-2015-0459" ref_url="https://www.suse.com/security/cve/CVE-2015-0459/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-0491" ref_url="https://www.suse.com/security/cve/CVE-2015-0491/" source="CVE"/>
		<reference ref_id="CVE-2015-1914" ref_url="https://www.suse.com/security/cve/CVE-2015-1914/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001447.html" source="SUSE-SU"/>
		<description>

java-1_6_0-ibm has been updated to version 1.6.0_sr16.2 to fix 18 security 
issues.

These security issues has been fixed:

    * Unspecified vulnerability in Oracle Java SE 6u81 (CVE-2014-3065).
    * The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other
      products, uses nondeterministic CBC padding, which makes it easier
      for man-in-the-middle attackers to obtain cleartext data via a
      padding-oracle attack, aka the 'POODLE' issue (CVE-2014-3566).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20, and
      Java SE Embedded 7u60, allows remote attackers to affect
      confidentiality, integrity, and availability via vectors related to
      AWT (CVE-2014-6513).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment, a different
      vulnerability than CVE-2014-4288, CVE-2014-6493, and CVE-2014-6532
      (CVE-2014-6503).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment, a different
      vulnerability than CVE-2014-4288, CVE-2014-6493, and CVE-2014-6503
      (CVE-2014-6532).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment, a different
      vulnerability than CVE-2014-6493, CVE-2014-6503, and CVE-2014-6532
      (CVE-2014-4288).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment, a different
      vulnerability than CVE-2014-4288, CVE-2014-6503, and CVE-2014-6532
      (CVE-2014-6493).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20,
      when running on Firefox, allows remote attackers to affect
      confidentiality, integrity, and availability via unknown vectors
      related to Deployment (CVE-2014-6492).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows local users to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment
      (CVE-2014-6458).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20,
      when running on Internet Explorer, allows local users to affect
      confidentiality, integrity, and availability via unknown vectors
      related to Deployment (CVE-2014-6466).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20, and Java SE Embedded 7u60, allows remote attackers to affect
      confidentiality, integrity, and availability via unknown vectors
      related to Libraries (CVE-2014-6506).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect integrity via unknown vectors
      related to Deployment (CVE-2014-6515).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20 allows remote attackers to affect confidentiality via unknown
      vectors related to 2D (CVE-2014-6511).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20, and Java SE Embedded 7u60, allows remote attackers to affect
      confidentiality via unknown vectors related to Libraries
      (CVE-2014-6531).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and R28.3.3 allows
      remote attackers to affect integrity via unknown vectors related to
      Libraries (CVE-2014-6512).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20; Java SE Embedded 7u60; and JRockit R27.8.3, and R28.3.3 allows
      remote attackers to affect confidentiality and integrity via vectors
      related to JSSE (CVE-2014-6457).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20, and Java SE Embedded 7u60, allows remote attackers to affect
      integrity via unknown vectors related to Libraries (CVE-2014-6502).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and JRockit R28.3.3
      allows remote attackers to affect integrity via unknown vectors
      related to Security (CVE-2014-6558).

More information can be found at 
http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_November_2014
&lt;http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_November_2014&gt;

Security Issues:

    * CVE-2014-3065
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3065&gt;
    * CVE-2014-3566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&gt;
    * CVE-2014-6506
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6506&gt;
    * CVE-2014-6511
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6511&gt;
    * CVE-2014-6531
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6531&gt;
    * CVE-2014-6512
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6512&gt;
    * CVE-2014-6457
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6457&gt;
    * CVE-2014-6502
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6502&gt;
    * CVE-2014-6558
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6558&gt;
    * CVE-2014-6513
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6513&gt;
    * CVE-2014-6503
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6503&gt;
    * CVE-2014-4288
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4288&gt;
    * CVE-2014-6493
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6493&gt;
    * CVE-2014-6532
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6532&gt;
    * CVE-2014-6492
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6492&gt;
    * CVE-2014-6458
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6458&gt;
    * CVE-2014-6466
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6466&gt;
    * CVE-2014-6515
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6515&gt;
    * CVE-2014-6456
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6456&gt;
    * CVE-2014-6476
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6476&gt;
    * CVE-2014-6527
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6527&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-19"/>
	<updated date="2014-11-19"/>
	<bugzilla href="https://bugzilla.suse.com/592934">SUSE bug 592934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817062">SUSE bug 817062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823034">SUSE bug 823034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912434">SUSE bug 912434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912447">SUSE bug 912447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916265">SUSE bug 916265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916266">SUSE bug 916266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930365">SUSE bug 930365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931702">SUSE bug 931702</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0401/">CVE-2013-0401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0401">CVE-2013-0401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1491/">CVE-2013-1491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1491">CVE-2013-1491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1500/">CVE-2013-1500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1500">CVE-2013-1500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1537/">CVE-2013-1537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1537">CVE-2013-1537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1540/">CVE-2013-1540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1540">CVE-2013-1540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1557/">CVE-2013-1557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1557">CVE-2013-1557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1563/">CVE-2013-1563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1563">CVE-2013-1563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1569/">CVE-2013-1569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1569">CVE-2013-1569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1571/">CVE-2013-1571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1571">CVE-2013-1571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2383/">CVE-2013-2383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2383">CVE-2013-2383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2384/">CVE-2013-2384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2384">CVE-2013-2384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2394/">CVE-2013-2394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2394">CVE-2013-2394 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2407/">CVE-2013-2407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2407">CVE-2013-2407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2412/">CVE-2013-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2412">CVE-2013-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2417/">CVE-2013-2417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2417">CVE-2013-2417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2418/">CVE-2013-2418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2418">CVE-2013-2418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2419/">CVE-2013-2419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2419">CVE-2013-2419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2420/">CVE-2013-2420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2420">CVE-2013-2420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2422/">CVE-2013-2422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2422">CVE-2013-2422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2424/">CVE-2013-2424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2424">CVE-2013-2424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2429/">CVE-2013-2429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2429">CVE-2013-2429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2430/">CVE-2013-2430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2430">CVE-2013-2430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2432/">CVE-2013-2432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2432">CVE-2013-2432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2433/">CVE-2013-2433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2433">CVE-2013-2433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2435/">CVE-2013-2435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2435">CVE-2013-2435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2437/">CVE-2013-2437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2437">CVE-2013-2437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2440/">CVE-2013-2440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2440">CVE-2013-2440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2442/">CVE-2013-2442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2442">CVE-2013-2442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2443/">CVE-2013-2443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2443">CVE-2013-2443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2444/">CVE-2013-2444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2444">CVE-2013-2444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2446/">CVE-2013-2446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2446">CVE-2013-2446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2447/">CVE-2013-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2447">CVE-2013-2447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2448/">CVE-2013-2448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2448">CVE-2013-2448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2450/">CVE-2013-2450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2450">CVE-2013-2450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2451/">CVE-2013-2451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2451">CVE-2013-2451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2452/">CVE-2013-2452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2452">CVE-2013-2452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2453/">CVE-2013-2453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2453">CVE-2013-2453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2454/">CVE-2013-2454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2454">CVE-2013-2454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2455/">CVE-2013-2455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2455">CVE-2013-2455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2456/">CVE-2013-2456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2456">CVE-2013-2456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2457/">CVE-2013-2457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2457">CVE-2013-2457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2459/">CVE-2013-2459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2459">CVE-2013-2459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2463/">CVE-2013-2463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2463">CVE-2013-2463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2464/">CVE-2013-2464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2464">CVE-2013-2464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2465/">CVE-2013-2465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2465">CVE-2013-2465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2466/">CVE-2013-2466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2466">CVE-2013-2466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2468/">CVE-2013-2468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2468">CVE-2013-2468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2469/">CVE-2013-2469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2469">CVE-2013-2469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2470/">CVE-2013-2470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2470">CVE-2013-2470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2471/">CVE-2013-2471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2471">CVE-2013-2471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2472/">CVE-2013-2472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2472">CVE-2013-2472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2473/">CVE-2013-2473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2473">CVE-2013-2473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3009/">CVE-2013-3009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3009">CVE-2013-3009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3011/">CVE-2013-3011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3011">CVE-2013-3011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3012/">CVE-2013-3012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3012">CVE-2013-3012 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3743/">CVE-2013-3743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3743">CVE-2013-3743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3829/">CVE-2013-3829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3829">CVE-2013-3829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4002/">CVE-2013-4002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4002">CVE-2013-4002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4041/">CVE-2013-4041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4041">CVE-2013-4041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5372/">CVE-2013-5372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5372">CVE-2013-5372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5375/">CVE-2013-5375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5375">CVE-2013-5375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5456/">CVE-2013-5456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5456">CVE-2013-5456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5457/">CVE-2013-5457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5457">CVE-2013-5457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5458/">CVE-2013-5458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5458">CVE-2013-5458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5772/">CVE-2013-5772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5772">CVE-2013-5772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5774/">CVE-2013-5774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5774">CVE-2013-5774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5776/">CVE-2013-5776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5776">CVE-2013-5776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5778/">CVE-2013-5778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5778">CVE-2013-5778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5780/">CVE-2013-5780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5780">CVE-2013-5780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5782/">CVE-2013-5782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5782">CVE-2013-5782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5783/">CVE-2013-5783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5783">CVE-2013-5783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5784/">CVE-2013-5784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5784">CVE-2013-5784 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5787/">CVE-2013-5787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5787">CVE-2013-5787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5788/">CVE-2013-5788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5788">CVE-2013-5788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5789/">CVE-2013-5789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5789">CVE-2013-5789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5790/">CVE-2013-5790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5790">CVE-2013-5790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5797/">CVE-2013-5797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5797">CVE-2013-5797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5800/">CVE-2013-5800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5800">CVE-2013-5800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5801/">CVE-2013-5801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5801">CVE-2013-5801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5802/">CVE-2013-5802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5802">CVE-2013-5802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5803/">CVE-2013-5803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5803">CVE-2013-5803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5804/">CVE-2013-5804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5804">CVE-2013-5804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5809/">CVE-2013-5809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5809">CVE-2013-5809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5812/">CVE-2013-5812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5812">CVE-2013-5812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5814/">CVE-2013-5814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5814">CVE-2013-5814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5817/">CVE-2013-5817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5817">CVE-2013-5817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5818/">CVE-2013-5818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5818">CVE-2013-5818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5819/">CVE-2013-5819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5819">CVE-2013-5819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5820/">CVE-2013-5820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5820">CVE-2013-5820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5823/">CVE-2013-5823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5823">CVE-2013-5823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5824/">CVE-2013-5824 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5824">CVE-2013-5824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5825/">CVE-2013-5825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5825">CVE-2013-5825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5829/">CVE-2013-5829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5829">CVE-2013-5829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5830/">CVE-2013-5830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5830">CVE-2013-5830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5831/">CVE-2013-5831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5831">CVE-2013-5831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5832/">CVE-2013-5832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5832">CVE-2013-5832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5838/">CVE-2013-5838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5838">CVE-2013-5838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5840/">CVE-2013-5840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5840">CVE-2013-5840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5842/">CVE-2013-5842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5842">CVE-2013-5842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5843/">CVE-2013-5843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5843">CVE-2013-5843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5848/">CVE-2013-5848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5848">CVE-2013-5848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5849/">CVE-2013-5849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5849">CVE-2013-5849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5850/">CVE-2013-5850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5850">CVE-2013-5850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5851/">CVE-2013-5851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5851">CVE-2013-5851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5878/">CVE-2013-5878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5878">CVE-2013-5878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5884/">CVE-2013-5884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5884">CVE-2013-5884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5887/">CVE-2013-5887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5887">CVE-2013-5887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5888/">CVE-2013-5888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5888">CVE-2013-5888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5889/">CVE-2013-5889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5889">CVE-2013-5889 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5896/">CVE-2013-5896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5896">CVE-2013-5896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5898/">CVE-2013-5898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5898">CVE-2013-5898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5899/">CVE-2013-5899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5899">CVE-2013-5899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5907/">CVE-2013-5907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5907">CVE-2013-5907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5910/">CVE-2013-5910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5910">CVE-2013-5910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6629">CVE-2013-6629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6954/">CVE-2013-6954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6954">CVE-2013-6954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0368/">CVE-2014-0368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0368">CVE-2014-0368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0373/">CVE-2014-0373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0373">CVE-2014-0373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0375/">CVE-2014-0375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0375">CVE-2014-0375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0376/">CVE-2014-0376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0376">CVE-2014-0376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0387/">CVE-2014-0387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0387">CVE-2014-0387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0403/">CVE-2014-0403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0403">CVE-2014-0403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0410/">CVE-2014-0410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0410">CVE-2014-0410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0411/">CVE-2014-0411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0411">CVE-2014-0411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0415/">CVE-2014-0415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0415">CVE-2014-0415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0416/">CVE-2014-0416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0416">CVE-2014-0416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0417/">CVE-2014-0417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0417">CVE-2014-0417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0422/">CVE-2014-0422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0422">CVE-2014-0422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0423/">CVE-2014-0423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0423">CVE-2014-0423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0424/">CVE-2014-0424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0424">CVE-2014-0424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0428/">CVE-2014-0428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0428">CVE-2014-0428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0429/">CVE-2014-0429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0429">CVE-2014-0429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0446/">CVE-2014-0446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0446">CVE-2014-0446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0449/">CVE-2014-0449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0449">CVE-2014-0449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0451/">CVE-2014-0451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0451">CVE-2014-0451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0452/">CVE-2014-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0452">CVE-2014-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0453/">CVE-2014-0453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0453">CVE-2014-0453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0457/">CVE-2014-0457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0457">CVE-2014-0457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0458/">CVE-2014-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0458">CVE-2014-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0459/">CVE-2014-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0459">CVE-2014-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0460/">CVE-2014-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0460">CVE-2014-0460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0461/">CVE-2014-0461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0461">CVE-2014-0461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0878/">CVE-2014-0878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0878">CVE-2014-0878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1876/">CVE-2014-1876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1876">CVE-2014-1876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2398/">CVE-2014-2398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2398">CVE-2014-2398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2401/">CVE-2014-2401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2401">CVE-2014-2401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2409/">CVE-2014-2409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2409">CVE-2014-2409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2412/">CVE-2014-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2412">CVE-2014-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2414/">CVE-2014-2414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2414">CVE-2014-2414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2420/">CVE-2014-2420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2420">CVE-2014-2420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2421/">CVE-2014-2421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2421">CVE-2014-2421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2423/">CVE-2014-2423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2423">CVE-2014-2423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2427/">CVE-2014-2427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2427">CVE-2014-2427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2428/">CVE-2014-2428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2428">CVE-2014-2428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3065/">CVE-2014-3065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3065">CVE-2014-3065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4209/">CVE-2014-4209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4209">CVE-2014-4209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4218/">CVE-2014-4218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4218">CVE-2014-4218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4219/">CVE-2014-4219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4219">CVE-2014-4219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4227/">CVE-2014-4227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4227">CVE-2014-4227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4244/">CVE-2014-4244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4244">CVE-2014-4244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4252/">CVE-2014-4252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4252">CVE-2014-4252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4262/">CVE-2014-4262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4262">CVE-2014-4262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4263/">CVE-2014-4263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4263">CVE-2014-4263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4265/">CVE-2014-4265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4265">CVE-2014-4265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4268/">CVE-2014-4268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4268">CVE-2014-4268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4288/">CVE-2014-4288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4288">CVE-2014-4288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6456/">CVE-2014-6456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6456">CVE-2014-6456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6457">CVE-2014-6457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6458/">CVE-2014-6458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6458">CVE-2014-6458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6466/">CVE-2014-6466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6466">CVE-2014-6466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6476/">CVE-2014-6476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6476">CVE-2014-6476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6492/">CVE-2014-6492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6492">CVE-2014-6492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6493/">CVE-2014-6493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6493">CVE-2014-6493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6502">CVE-2014-6502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6503/">CVE-2014-6503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6503">CVE-2014-6503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6506">CVE-2014-6506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6511">CVE-2014-6511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6512">CVE-2014-6512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6513/">CVE-2014-6513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6513">CVE-2014-6513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6515/">CVE-2014-6515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6515">CVE-2014-6515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6527/">CVE-2014-6527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6527">CVE-2014-6527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6531">CVE-2014-6531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6532/">CVE-2014-6532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6532">CVE-2014-6532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6558">CVE-2014-6558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8891/">CVE-2014-8891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8891">CVE-2014-8891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8892/">CVE-2014-8892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8892">CVE-2014-8892 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0138/">CVE-2015-0138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0138">CVE-2015-0138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0192/">CVE-2015-0192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0192">CVE-2015-0192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0458/">CVE-2015-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0458">CVE-2015-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0459/">CVE-2015-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0459">CVE-2015-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0469">CVE-2015-0469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0477">CVE-2015-0477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0478">CVE-2015-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0480">CVE-2015-0480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0488">CVE-2015-0488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0491/">CVE-2015-0491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0491">CVE-2015-0491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1914/">CVE-2015-1914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1914">CVE-2015-1914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2808">CVE-2015-2808 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578114" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578115" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578116" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578117" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578118" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578114" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578115" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578116" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578117" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578118" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578114" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578115" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578116" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578117" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578118" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218725" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="935540" ref_url="https://bugzilla.suse.com/935540" source="BUGZILLA"/>
		<reference ref_id="936844" ref_url="https://bugzilla.suse.com/936844" source="BUGZILLA"/>
		<reference ref_id="938895" ref_url="https://bugzilla.suse.com/938895" source="BUGZILLA"/>
		<reference ref_id="941939" ref_url="https://bugzilla.suse.com/941939" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1931" ref_url="https://www.suse.com/security/cve/CVE-2015-1931/" source="CVE"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001577.html" source="SUSE-SU"/>
		<description>
IBM Java was updated to version 6 SR16 FP7 (6.0-16.7) to fix several security issues and bugs.

The following vulnerabilities were fixed:

* CVE-2015-1931: IBM Java Security Components store plain text data in memory dumps, which could allow a local attacker to obtain information to aid in further attacks against the system.
* CVE-2015-2590: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2601: Easily exploitable vulnerability in the JCE component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2621: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2625: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2632: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2637: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2638: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2664: Difficult to exploit vulnerability in the Deployment component requiring logon to Operating System. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2808: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java accessible data.
* CVE-2015-4000: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java Embedded accessible data. (bnc#935540)
* CVE-2015-4731: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4732: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4733: Easily exploitable vulnerability in the RMI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4748: Very difficult to exploit vulnerability in the Security component allowed successful unauthenticated network attacks via OCSP. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4749: Difficult to exploit vulnerability in the JNDI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized ability to cause a partial denial of service (partial DOS).
* CVE-2015-4760: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.

The following non-security bugs were fixed:

* bsc#936844: misconfigured update-alternative entries
* bsc#941939: provide %{name} instead of %{sdklnk} only in _jvmprivdir
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-21"/>
	<updated date="2015-08-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/935540">SUSE bug 935540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936844">SUSE bug 936844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941939">SUSE bug 941939</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1931/">CVE-2015-1931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1931">CVE-2015-1931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2590">CVE-2015-2590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2601">CVE-2015-2601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2621">CVE-2015-2621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2625">CVE-2015-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2632">CVE-2015-2632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2637">CVE-2015-2637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2638">CVE-2015-2638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2664">CVE-2015-2664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2808">CVE-2015-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4731">CVE-2015-4731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4732">CVE-2015-4732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4733">CVE-2015-4733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4748">CVE-2015-4748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4749">CVE-2015-4749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4760">CVE-2015-4760 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578119" comment="java-1_6_0-ibm-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572027" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578120" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578121" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572030" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578119" comment="java-1_6_0-ibm-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572027" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578120" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578121" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572030" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578119" comment="java-1_6_0-ibm-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572027" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578120" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578121" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572030" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218726" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="960286" ref_url="https://bugzilla.suse.com/960286" source="BUGZILLA"/>
		<reference ref_id="960402" ref_url="https://bugzilla.suse.com/960402" source="BUGZILLA"/>
		<reference ref_id="963937" ref_url="https://bugzilla.suse.com/963937" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5041" ref_url="https://www.suse.com/security/cve/CVE-2015-5041/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<description>

This update for java-1_6_0-ibm fixes the following issues by updating to 6.0-16.20 (bsc#963937)

- CVE-2015-5041: Could could have invoked non-public interface methods under certain circumstances
- CVE-2015-7575: The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials
- CVE-2015-7981: libpng could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read in the png_convert_to_rfc1123 function. An attacker could exploit this vulnerability to obtain sensitive information
- CVE-2015-8126: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8472: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8540: libpng is vulnerable to a buffer overflow, caused by a read underflow in png_check_keyword in pngwutil.c. By sending an overly long argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
- CVE-2016-0402: An unspecified vulnerability related to the Networking component has no confidentiality impact, partial integrity impact, and no availability impact
- CVE-2016-0448: An unspecified vulnerability related to the JMX component could allow a remote attacker to obtain sensitive information
- CVE-2016-0466: An unspecified vulnerability related to the JAXP component could allow a remote attacker to cause a denial of service
- CVE-2016-0483: An unspecified vulnerability related to the AWT component has complete confidentiality impact, complete integrity impact, and complete availability impact
- CVE-2016-0494: An unspecified vulnerability related to the 2D component has complete confidentiality impact, complete integrity impact, and complete availability impact

The following bugs were fixed:

- bsc#960402: resolve package conflicts in devel package
- bsc#960286: resolve package conflicts in the fonts subpackage
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-11"/>
	<updated date="2016-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/960286">SUSE bug 960286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5041/">CVE-2015-5041 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5041">CVE-2015-5041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7981">CVE-2015-7981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8472">CVE-2015-8472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8540">CVE-2015-8540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0402">CVE-2016-0402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0448">CVE-2016-0448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0466">CVE-2016-0466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0483">CVE-2016-0483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0494">CVE-2016-0494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572031" comment="java-1_6_0-ibm-1.6.0_sr16.20-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572032" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572033" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572034" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218727" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="960286" ref_url="https://bugzilla.suse.com/960286" source="BUGZILLA"/>
		<reference ref_id="960402" ref_url="https://bugzilla.suse.com/960402" source="BUGZILLA"/>
		<reference ref_id="963937" ref_url="https://bugzilla.suse.com/963937" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5041" ref_url="https://www.suse.com/security/cve/CVE-2015-5041/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001941.html" source="SUSE-SU"/>
		<description>

This update for java-1_6_0-ibm fixes the following issues by updating to 6.0-16.20 (bsc#963937)

- CVE-2015-5041: Could could have invoked non-public interface methods under certain circumstances
- CVE-2015-7575: The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials
- CVE-2015-7981: libpng could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read in the png_convert_to_rfc1123 function. An attacker could exploit this vulnerability to obtain sensitive information
- CVE-2015-8126: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8472: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8540: libpng is vulnerable to a buffer overflow, caused by a read underflow in png_check_keyword in pngwutil.c. By sending an overly long argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
- CVE-2016-0402: An unspecified vulnerability related to the Networking component has no confidentiality impact, partial integrity impact, and no availability impact
- CVE-2016-0448: An unspecified vulnerability related to the JMX component could allow a remote attacker to obtain sensitive information
- CVE-2016-0466: An unspecified vulnerability related to the JAXP component could allow a remote attacker to cause a denial of service
- CVE-2016-0483: An unspecified vulnerability related to the AWT component has complete confidentiality impact, complete integrity impact, and complete availability impact
- CVE-2016-0494: An unspecified vulnerability related to the 2D component has complete confidentiality impact, complete integrity impact, and complete availability impact

The following bugs were fixed:

- bsc#960402: resolve package conflicts in devel package
- bsc#960286: resolve package conflicts in the fonts subpackage
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-15"/>
	<updated date="2016-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/960286">SUSE bug 960286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5041/">CVE-2015-5041 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5041">CVE-2015-5041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7981">CVE-2015-7981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8472">CVE-2015-8472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8540">CVE-2015-8540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0402">CVE-2016-0402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0448">CVE-2016-0448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0466">CVE-2016-0466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0483">CVE-2016-0483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0494">CVE-2016-0494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578122" comment="java-1_6_0-ibm-1.6.0_sr16.20-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578123" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.20-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578124" comment="java-1_6_0-ibm-devel-1.6.0_sr16.20-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578125" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578126" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578127" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218728" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="977646" ref_url="https://bugzilla.suse.com/977646" source="BUGZILLA"/>
		<reference ref_id="977648" ref_url="https://bugzilla.suse.com/977648" source="BUGZILLA"/>
		<reference ref_id="977650" ref_url="https://bugzilla.suse.com/977650" source="BUGZILLA"/>
		<reference ref_id="979252" ref_url="https://bugzilla.suse.com/979252" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0264" ref_url="https://www.suse.com/security/cve/CVE-2016-0264/" source="CVE"/>
		<reference ref_id="CVE-2016-0363" ref_url="https://www.suse.com/security/cve/CVE-2016-0363/" source="CVE"/>
		<reference ref_id="CVE-2016-0376" ref_url="https://www.suse.com/security/cve/CVE-2016-0376/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-3422" ref_url="https://www.suse.com/security/cve/CVE-2016-3422/" source="CVE"/>
		<reference ref_id="CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3443" ref_url="https://www.suse.com/security/cve/CVE-2016-3443/" source="CVE"/>
		<reference ref_id="CVE-2016-3449" ref_url="https://www.suse.com/security/cve/CVE-2016-3449/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002079.html" source="SUSE-SU"/>
		<description>

This IBM Java 1.6.0 SR16 FP25 release fixes the following issues:

Security issues fixed:
- CVE-2016-0264: buffer overflow vulnerability in the IBM JVM (bsc#977648)
- CVE-2016-0363: insecure use of invoke method in CORBA component, incorrect CVE-2013-3009 fix (bsc#977650)
- CVE-2016-0376: insecure deserialization in CORBA, incorrect CVE-2013-5456 fix (bsc#977646)
- The following CVEs got also fixed during this update. (bsc#979252)
  CVE-2016-3443, CVE-2016-0687, CVE-2016-0686, CVE-2016-3427, CVE-2016-3449, CVE-2016-3422, CVE-2016-3426
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-20"/>
	<updated date="2016-05-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/977646">SUSE bug 977646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977648">SUSE bug 977648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977650">SUSE bug 977650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0264/">CVE-2016-0264 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0264">CVE-2016-0264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0363/">CVE-2016-0363 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0363">CVE-2016-0363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0376/">CVE-2016-0376 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0376">CVE-2016-0376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0686">CVE-2016-0686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0687">CVE-2016-0687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3422/">CVE-2016-3422 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3422">CVE-2016-3422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3426">CVE-2016-3426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3427">CVE-2016-3427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3443/">CVE-2016-3443 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3443">CVE-2016-3443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3449/">CVE-2016-3449 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3449">CVE-2016-3449 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576232" comment="java-1_6_0-ibm-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576233" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576234" comment="java-1_6_0-ibm-devel-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576235" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576236" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576237" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576232" comment="java-1_6_0-ibm-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576233" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576234" comment="java-1_6_0-ibm-devel-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576235" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576236" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576237" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218729" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="992537" ref_url="https://bugzilla.suse.com/992537" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002283.html" source="SUSE-SU"/>
		<description>

IBM Java 6 was updated to version 6.0-16.30.

Following security issue was fixed: CVE-2016-3485

Please see https://www.ibm.com/developerworks/java/jdk/alerts/ for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-21"/>
	<updated date="2016-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/992537">SUSE bug 992537</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485 at SUSE</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3485">CVE-2016-3485 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576238" comment="java-1_6_0-ibm-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567999" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576239" comment="java-1_6_0-ibm-devel-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576240" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576241" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576242" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.30-75.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576238" comment="java-1_6_0-ibm-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567999" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576239" comment="java-1_6_0-ibm-devel-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576240" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576241" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576242" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.30-75.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218730" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1009280" ref_url="https://bugzilla.suse.com/1009280" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002445.html" source="SUSE-SU"/>
		<description>

This update for java-1_6_0-ibm fixes the following issues:

- Version update to 6.0-16.35 (bsc#1009280) fixing the following CVE's:
  CVE-2016-5568, CVE-2016-5556, CVE-2016-5573, CVE-2016-5597, CVE-2016-5554,
  CVE-2016-5542
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-07"/>
	<updated date="2016-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5542">CVE-2016-5542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5554">CVE-2016-5554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5556">CVE-2016-5556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5568">CVE-2016-5568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5573">CVE-2016-5573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5597">CVE-2016-5597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576243" comment="java-1_6_0-ibm-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568005" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576244" comment="java-1_6_0-ibm-devel-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576245" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576246" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576247" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.35-78.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576243" comment="java-1_6_0-ibm-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568005" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576244" comment="java-1_6_0-ibm-devel-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576245" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576246" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576247" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.35-78.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218731" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027038" ref_url="https://bugzilla.suse.com/1027038" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<description>

This update for java-1_6_0-ibm to 8.0-4.1 fixes the following issues:

Security issue fixed:
- CVE-2016-2183: The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and
  other protocols and products, have a birthday bound of approximately four billion blocks, which
  makes it easier for remote attackers to obtain cleartext data via a birthday attack against a
  long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode,
  aka a 'Sweet32' attack. (bsc#1027038)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-07"/>
	<updated date="2017-04-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027038">SUSE bug 1027038</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572047" comment="java-1_6_0-ibm-1.6.0_sr16.41-81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572048" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.41-81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572049" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.41-81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572050" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.41-81.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218732" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027038" ref_url="https://bugzilla.suse.com/1027038" source="BUGZILLA"/>
		<reference ref_id="1038505" ref_url="https://bugzilla.suse.com/1038505" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-1289" ref_url="https://www.suse.com/security/cve/CVE-2017-1289/" source="CVE"/>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3514" ref_url="https://www.suse.com/security/cve/CVE-2017-3514/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002927.html" source="SUSE-SU"/>
		<description>

This update for java-1_6_0-ibm fixes the following issues:


  - CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in inftrees.c
  - CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in inffast.c
  - CVE-2016-9842: zlib: Undefined left shift of negative number
  - CVE-2016-9843: zlib: Big-endian out-of-bounds pointer
  - CVE-2017-1289: IBM JDK: XML External Entity Injection (XXE) error when processing XML data
  - CVE-2017-3509: OpenJDK: improper re-use of NTLM authenticated connections 
  - CVE-2017-3539: OpenJDK: MD5 allowed for jar verification 
  - CVE-2017-3533: OpenJDK: newline injection in the FTP client
  - CVE-2017-3544: OpenJDK: newline injection in the SMTP client

- Version update to 6.0-16.40 bsc#1027038 CVE-2016-2183		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-30"/>
	<updated date="2017-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027038">SUSE bug 1027038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9840">CVE-2016-9840 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9841">CVE-2016-9841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9842">CVE-2016-9842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9843">CVE-2016-9843 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1289/">CVE-2017-1289 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1289">CVE-2017-1289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3509">CVE-2017-3509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3514/">CVE-2017-3514 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3514">CVE-2017-3514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3533">CVE-2017-3533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3539">CVE-2017-3539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3544">CVE-2017-3544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578128" comment="java-1_6_0-ibm-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568011" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578129" comment="java-1_6_0-ibm-devel-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578130" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578131" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578132" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.45-84.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578128" comment="java-1_6_0-ibm-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568011" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578129" comment="java-1_6_0-ibm-devel-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578130" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578131" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578132" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.45-84.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218733" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1070162" ref_url="https://bugzilla.suse.com/1070162" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10293" ref_url="https://www.suse.com/security/cve/CVE-2017-10293/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003539.html" source="SUSE-SU"/>
		<description>
This update for java-1_6_0-ibm fixes the following issues:

Security issues fixed:

- Security update to version 6.0.16.50 (bsc#1070162)
  * CVE-2017-10346 CVE-2017-10285 CVE-2017-10388 CVE-2017-10356
    CVE-2017-10293 CVE-2016-9841  CVE-2017-10355 CVE-2017-10357
    CVE-2017-10348 CVE-2017-10349 CVE-2017-10347 CVE-2017-10350
    CVE-2017-10281 CVE-2017-10295 CVE-2017-10345
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-19"/>
	<updated date="2017-12-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9841">CVE-2016-9841 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10281">CVE-2017-10281 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10285">CVE-2017-10285 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10293/">CVE-2017-10293 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10293">CVE-2017-10293 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10295">CVE-2017-10295 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10345">CVE-2017-10345 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10346">CVE-2017-10346 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10347">CVE-2017-10347 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10348">CVE-2017-10348 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10349">CVE-2017-10349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10350">CVE-2017-10350 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10355">CVE-2017-10355 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10356">CVE-2017-10356 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10357">CVE-2017-10357 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10388">CVE-2017-10388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578133" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568017" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578134" comment="java-1_6_0-ibm-devel-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578135" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578136" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578137" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578133" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568017" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578134" comment="java-1_6_0-ibm-devel-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578135" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578136" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578137" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218734" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="955131" ref_url="https://bugzilla.suse.com/955131" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0458" ref_url="https://www.suse.com/security/cve/CVE-2015-0458/" source="CVE"/>
		<reference ref_id="CVE-2015-0459" ref_url="https://www.suse.com/security/cve/CVE-2015-0459/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-0491" ref_url="https://www.suse.com/security/cve/CVE-2015-0491/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-5006" ref_url="https://www.suse.com/security/cve/CVE-2015-5006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001705.html" source="SUSE-SU"/>
		<description>

This update for java-1_6_0-ibm fixes the following issues: 

- Version update to 6.0-16.15 bsc#955131:
  CVE-2015-4734 CVE-2015-4803 CVE-2015-4805 CVE-2015-4806 CVE-2015-4810
  CVE-2015-4835 CVE-2015-4840 CVE-2015-4842 CVE-2015-4843 CVE-2015-4844
  CVE-2015-4860 CVE-2015-4871 CVE-2015-4872 CVE-2015-4882 CVE-2015-4883
  CVE-2015-4893 CVE-2015-4902 CVE-2015-4903 CVE-2015-4911 CVE-2015-5006

  CVE-2015-2808 CVE-2015-2625 CVE-2015-0491 CVE-2015-0459 CVE-2015-0469
  CVE-2015-0458 CVE-2015-0480 CVE-2015-0488 CVE-2015-0478 CVE-2015-0477
  CVE-2015-0204		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-26"/>
	<updated date="2015-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0458/">CVE-2015-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0458">CVE-2015-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0459/">CVE-2015-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0459">CVE-2015-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0469">CVE-2015-0469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0477">CVE-2015-0477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0478">CVE-2015-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0480">CVE-2015-0480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0488">CVE-2015-0488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0491/">CVE-2015-0491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0491">CVE-2015-0491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2625">CVE-2015-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2808">CVE-2015-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4734">CVE-2015-4734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4803">CVE-2015-4803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4805">CVE-2015-4805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4806">CVE-2015-4806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4810">CVE-2015-4810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4835">CVE-2015-4835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4840">CVE-2015-4840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4842">CVE-2015-4842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4843">CVE-2015-4843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4844">CVE-2015-4844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4860">CVE-2015-4860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4871">CVE-2015-4871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4872">CVE-2015-4872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4882">CVE-2015-4882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4883">CVE-2015-4883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4893">CVE-2015-4893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4902">CVE-2015-4902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4903">CVE-2015-4903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4911">CVE-2015-4911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5006/">CVE-2015-5006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5006">CVE-2015-5006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578138" comment="java-1_6_0-ibm-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576249" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578139" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578140" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576253" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578138" comment="java-1_6_0-ibm-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576249" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578139" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578140" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576253" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578138" comment="java-1_6_0-ibm-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576249" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578139" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578140" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576253" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218735" version="1" class="patch">
	<metadata>
		<title>Security update for IBM Java</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="592934" ref_url="https://bugzilla.suse.com/592934" source="BUGZILLA"/>
		<reference ref_id="817062" ref_url="https://bugzilla.suse.com/817062" source="BUGZILLA"/>
		<reference ref_id="819285" ref_url="https://bugzilla.suse.com/819285" source="BUGZILLA"/>
		<reference ref_id="819288" ref_url="https://bugzilla.suse.com/819288" source="BUGZILLA"/>
		<reference ref_id="823034" ref_url="https://bugzilla.suse.com/823034" source="BUGZILLA"/>
		<reference ref_id="829212" ref_url="https://bugzilla.suse.com/829212" source="BUGZILLA"/>
		<reference ref_id="849212" ref_url="https://bugzilla.suse.com/849212" source="BUGZILLA"/>
		<reference ref_id="861782" ref_url="https://bugzilla.suse.com/861782" source="BUGZILLA"/>
		<reference ref_id="862064" ref_url="https://bugzilla.suse.com/862064" source="BUGZILLA"/>
		<reference ref_id="877429" ref_url="https://bugzilla.suse.com/877429" source="BUGZILLA"/>
		<reference ref_id="891701" ref_url="https://bugzilla.suse.com/891701" source="BUGZILLA"/>
		<reference ref_id="904889" ref_url="https://bugzilla.suse.com/904889" source="BUGZILLA"/>
		<reference ref_id="912434" ref_url="https://bugzilla.suse.com/912434" source="BUGZILLA"/>
		<reference ref_id="912447" ref_url="https://bugzilla.suse.com/912447" source="BUGZILLA"/>
		<reference ref_id="916265" ref_url="https://bugzilla.suse.com/916265" source="BUGZILLA"/>
		<reference ref_id="916266" ref_url="https://bugzilla.suse.com/916266" source="BUGZILLA"/>
		<reference ref_id="930365" ref_url="https://bugzilla.suse.com/930365" source="BUGZILLA"/>
		<reference ref_id="931702" ref_url="https://bugzilla.suse.com/931702" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0401" ref_url="https://www.suse.com/security/cve/CVE-2013-0401/" source="CVE"/>
		<reference ref_id="CVE-2013-1491" ref_url="https://www.suse.com/security/cve/CVE-2013-1491/" source="CVE"/>
		<reference ref_id="CVE-2013-1537" ref_url="https://www.suse.com/security/cve/CVE-2013-1537/" source="CVE"/>
		<reference ref_id="CVE-2013-1540" ref_url="https://www.suse.com/security/cve/CVE-2013-1540/" source="CVE"/>
		<reference ref_id="CVE-2013-1557" ref_url="https://www.suse.com/security/cve/CVE-2013-1557/" source="CVE"/>
		<reference ref_id="CVE-2013-1563" ref_url="https://www.suse.com/security/cve/CVE-2013-1563/" source="CVE"/>
		<reference ref_id="CVE-2013-1569" ref_url="https://www.suse.com/security/cve/CVE-2013-1569/" source="CVE"/>
		<reference ref_id="CVE-2013-2383" ref_url="https://www.suse.com/security/cve/CVE-2013-2383/" source="CVE"/>
		<reference ref_id="CVE-2013-2384" ref_url="https://www.suse.com/security/cve/CVE-2013-2384/" source="CVE"/>
		<reference ref_id="CVE-2013-2394" ref_url="https://www.suse.com/security/cve/CVE-2013-2394/" source="CVE"/>
		<reference ref_id="CVE-2013-2400" ref_url="https://www.suse.com/security/cve/CVE-2013-2400/" source="CVE"/>
		<reference ref_id="CVE-2013-2407" ref_url="https://www.suse.com/security/cve/CVE-2013-2407/" source="CVE"/>
		<reference ref_id="CVE-2013-2417" ref_url="https://www.suse.com/security/cve/CVE-2013-2417/" source="CVE"/>
		<reference ref_id="CVE-2013-2418" ref_url="https://www.suse.com/security/cve/CVE-2013-2418/" source="CVE"/>
		<reference ref_id="CVE-2013-2419" ref_url="https://www.suse.com/security/cve/CVE-2013-2419/" source="CVE"/>
		<reference ref_id="CVE-2013-2420" ref_url="https://www.suse.com/security/cve/CVE-2013-2420/" source="CVE"/>
		<reference ref_id="CVE-2013-2422" ref_url="https://www.suse.com/security/cve/CVE-2013-2422/" source="CVE"/>
		<reference ref_id="CVE-2013-2424" ref_url="https://www.suse.com/security/cve/CVE-2013-2424/" source="CVE"/>
		<reference ref_id="CVE-2013-2429" ref_url="https://www.suse.com/security/cve/CVE-2013-2429/" source="CVE"/>
		<reference ref_id="CVE-2013-2430" ref_url="https://www.suse.com/security/cve/CVE-2013-2430/" source="CVE"/>
		<reference ref_id="CVE-2013-2432" ref_url="https://www.suse.com/security/cve/CVE-2013-2432/" source="CVE"/>
		<reference ref_id="CVE-2013-2433" ref_url="https://www.suse.com/security/cve/CVE-2013-2433/" source="CVE"/>
		<reference ref_id="CVE-2013-2435" ref_url="https://www.suse.com/security/cve/CVE-2013-2435/" source="CVE"/>
		<reference ref_id="CVE-2013-2440" ref_url="https://www.suse.com/security/cve/CVE-2013-2440/" source="CVE"/>
		<reference ref_id="CVE-2013-2442" ref_url="https://www.suse.com/security/cve/CVE-2013-2442/" source="CVE"/>
		<reference ref_id="CVE-2013-2448" ref_url="https://www.suse.com/security/cve/CVE-2013-2448/" source="CVE"/>
		<reference ref_id="CVE-2013-2453" ref_url="https://www.suse.com/security/cve/CVE-2013-2453/" source="CVE"/>
		<reference ref_id="CVE-2013-2454" ref_url="https://www.suse.com/security/cve/CVE-2013-2454/" source="CVE"/>
		<reference ref_id="CVE-2013-2456" ref_url="https://www.suse.com/security/cve/CVE-2013-2456/" source="CVE"/>
		<reference ref_id="CVE-2013-2457" ref_url="https://www.suse.com/security/cve/CVE-2013-2457/" source="CVE"/>
		<reference ref_id="CVE-2013-2458" ref_url="https://www.suse.com/security/cve/CVE-2013-2458/" source="CVE"/>
		<reference ref_id="CVE-2013-2459" ref_url="https://www.suse.com/security/cve/CVE-2013-2459/" source="CVE"/>
		<reference ref_id="CVE-2013-2460" ref_url="https://www.suse.com/security/cve/CVE-2013-2460/" source="CVE"/>
		<reference ref_id="CVE-2013-2462" ref_url="https://www.suse.com/security/cve/CVE-2013-2462/" source="CVE"/>
		<reference ref_id="CVE-2013-2463" ref_url="https://www.suse.com/security/cve/CVE-2013-2463/" source="CVE"/>
		<reference ref_id="CVE-2013-2464" ref_url="https://www.suse.com/security/cve/CVE-2013-2464/" source="CVE"/>
		<reference ref_id="CVE-2013-2465" ref_url="https://www.suse.com/security/cve/CVE-2013-2465/" source="CVE"/>
		<reference ref_id="CVE-2013-2466" ref_url="https://www.suse.com/security/cve/CVE-2013-2466/" source="CVE"/>
		<reference ref_id="CVE-2013-2468" ref_url="https://www.suse.com/security/cve/CVE-2013-2468/" source="CVE"/>
		<reference ref_id="CVE-2013-2469" ref_url="https://www.suse.com/security/cve/CVE-2013-2469/" source="CVE"/>
		<reference ref_id="CVE-2013-2470" ref_url="https://www.suse.com/security/cve/CVE-2013-2470/" source="CVE"/>
		<reference ref_id="CVE-2013-2471" ref_url="https://www.suse.com/security/cve/CVE-2013-2471/" source="CVE"/>
		<reference ref_id="CVE-2013-2472" ref_url="https://www.suse.com/security/cve/CVE-2013-2472/" source="CVE"/>
		<reference ref_id="CVE-2013-2473" ref_url="https://www.suse.com/security/cve/CVE-2013-2473/" source="CVE"/>
		<reference ref_id="CVE-2013-3006" ref_url="https://www.suse.com/security/cve/CVE-2013-3006/" source="CVE"/>
		<reference ref_id="CVE-2013-3007" ref_url="https://www.suse.com/security/cve/CVE-2013-3007/" source="CVE"/>
		<reference ref_id="CVE-2013-3008" ref_url="https://www.suse.com/security/cve/CVE-2013-3008/" source="CVE"/>
		<reference ref_id="CVE-2013-3009" ref_url="https://www.suse.com/security/cve/CVE-2013-3009/" source="CVE"/>
		<reference ref_id="CVE-2013-3010" ref_url="https://www.suse.com/security/cve/CVE-2013-3010/" source="CVE"/>
		<reference ref_id="CVE-2013-3011" ref_url="https://www.suse.com/security/cve/CVE-2013-3011/" source="CVE"/>
		<reference ref_id="CVE-2013-3012" ref_url="https://www.suse.com/security/cve/CVE-2013-3012/" source="CVE"/>
		<reference ref_id="CVE-2013-3743" ref_url="https://www.suse.com/security/cve/CVE-2013-3743/" source="CVE"/>
		<reference ref_id="CVE-2013-3744" ref_url="https://www.suse.com/security/cve/CVE-2013-3744/" source="CVE"/>
		<reference ref_id="CVE-2013-3829" ref_url="https://www.suse.com/security/cve/CVE-2013-3829/" source="CVE"/>
		<reference ref_id="CVE-2013-4002" ref_url="https://www.suse.com/security/cve/CVE-2013-4002/" source="CVE"/>
		<reference ref_id="CVE-2013-4041" ref_url="https://www.suse.com/security/cve/CVE-2013-4041/" source="CVE"/>
		<reference ref_id="CVE-2013-5372" ref_url="https://www.suse.com/security/cve/CVE-2013-5372/" source="CVE"/>
		<reference ref_id="CVE-2013-5375" ref_url="https://www.suse.com/security/cve/CVE-2013-5375/" source="CVE"/>
		<reference ref_id="CVE-2013-5456" ref_url="https://www.suse.com/security/cve/CVE-2013-5456/" source="CVE"/>
		<reference ref_id="CVE-2013-5457" ref_url="https://www.suse.com/security/cve/CVE-2013-5457/" source="CVE"/>
		<reference ref_id="CVE-2013-5458" ref_url="https://www.suse.com/security/cve/CVE-2013-5458/" source="CVE"/>
		<reference ref_id="CVE-2013-5772" ref_url="https://www.suse.com/security/cve/CVE-2013-5772/" source="CVE"/>
		<reference ref_id="CVE-2013-5774" ref_url="https://www.suse.com/security/cve/CVE-2013-5774/" source="CVE"/>
		<reference ref_id="CVE-2013-5776" ref_url="https://www.suse.com/security/cve/CVE-2013-5776/" source="CVE"/>
		<reference ref_id="CVE-2013-5778" ref_url="https://www.suse.com/security/cve/CVE-2013-5778/" source="CVE"/>
		<reference ref_id="CVE-2013-5780" ref_url="https://www.suse.com/security/cve/CVE-2013-5780/" source="CVE"/>
		<reference ref_id="CVE-2013-5782" ref_url="https://www.suse.com/security/cve/CVE-2013-5782/" source="CVE"/>
		<reference ref_id="CVE-2013-5783" ref_url="https://www.suse.com/security/cve/CVE-2013-5783/" source="CVE"/>
		<reference ref_id="CVE-2013-5784" ref_url="https://www.suse.com/security/cve/CVE-2013-5784/" source="CVE"/>
		<reference ref_id="CVE-2013-5787" ref_url="https://www.suse.com/security/cve/CVE-2013-5787/" source="CVE"/>
		<reference ref_id="CVE-2013-5788" ref_url="https://www.suse.com/security/cve/CVE-2013-5788/" source="CVE"/>
		<reference ref_id="CVE-2013-5789" ref_url="https://www.suse.com/security/cve/CVE-2013-5789/" source="CVE"/>
		<reference ref_id="CVE-2013-5790" ref_url="https://www.suse.com/security/cve/CVE-2013-5790/" source="CVE"/>
		<reference ref_id="CVE-2013-5797" ref_url="https://www.suse.com/security/cve/CVE-2013-5797/" source="CVE"/>
		<reference ref_id="CVE-2013-5800" ref_url="https://www.suse.com/security/cve/CVE-2013-5800/" source="CVE"/>
		<reference ref_id="CVE-2013-5801" ref_url="https://www.suse.com/security/cve/CVE-2013-5801/" source="CVE"/>
		<reference ref_id="CVE-2013-5802" ref_url="https://www.suse.com/security/cve/CVE-2013-5802/" source="CVE"/>
		<reference ref_id="CVE-2013-5803" ref_url="https://www.suse.com/security/cve/CVE-2013-5803/" source="CVE"/>
		<reference ref_id="CVE-2013-5804" ref_url="https://www.suse.com/security/cve/CVE-2013-5804/" source="CVE"/>
		<reference ref_id="CVE-2013-5809" ref_url="https://www.suse.com/security/cve/CVE-2013-5809/" source="CVE"/>
		<reference ref_id="CVE-2013-5812" ref_url="https://www.suse.com/security/cve/CVE-2013-5812/" source="CVE"/>
		<reference ref_id="CVE-2013-5814" ref_url="https://www.suse.com/security/cve/CVE-2013-5814/" source="CVE"/>
		<reference ref_id="CVE-2013-5817" ref_url="https://www.suse.com/security/cve/CVE-2013-5817/" source="CVE"/>
		<reference ref_id="CVE-2013-5818" ref_url="https://www.suse.com/security/cve/CVE-2013-5818/" source="CVE"/>
		<reference ref_id="CVE-2013-5819" ref_url="https://www.suse.com/security/cve/CVE-2013-5819/" source="CVE"/>
		<reference ref_id="CVE-2013-5820" ref_url="https://www.suse.com/security/cve/CVE-2013-5820/" source="CVE"/>
		<reference ref_id="CVE-2013-5823" ref_url="https://www.suse.com/security/cve/CVE-2013-5823/" source="CVE"/>
		<reference ref_id="CVE-2013-5824" ref_url="https://www.suse.com/security/cve/CVE-2013-5824/" source="CVE"/>
		<reference ref_id="CVE-2013-5825" ref_url="https://www.suse.com/security/cve/CVE-2013-5825/" source="CVE"/>
		<reference ref_id="CVE-2013-5829" ref_url="https://www.suse.com/security/cve/CVE-2013-5829/" source="CVE"/>
		<reference ref_id="CVE-2013-5830" ref_url="https://www.suse.com/security/cve/CVE-2013-5830/" source="CVE"/>
		<reference ref_id="CVE-2013-5831" ref_url="https://www.suse.com/security/cve/CVE-2013-5831/" source="CVE"/>
		<reference ref_id="CVE-2013-5832" ref_url="https://www.suse.com/security/cve/CVE-2013-5832/" source="CVE"/>
		<reference ref_id="CVE-2013-5838" ref_url="https://www.suse.com/security/cve/CVE-2013-5838/" source="CVE"/>
		<reference ref_id="CVE-2013-5840" ref_url="https://www.suse.com/security/cve/CVE-2013-5840/" source="CVE"/>
		<reference ref_id="CVE-2013-5842" ref_url="https://www.suse.com/security/cve/CVE-2013-5842/" source="CVE"/>
		<reference ref_id="CVE-2013-5843" ref_url="https://www.suse.com/security/cve/CVE-2013-5843/" source="CVE"/>
		<reference ref_id="CVE-2013-5848" ref_url="https://www.suse.com/security/cve/CVE-2013-5848/" source="CVE"/>
		<reference ref_id="CVE-2013-5849" ref_url="https://www.suse.com/security/cve/CVE-2013-5849/" source="CVE"/>
		<reference ref_id="CVE-2013-5850" ref_url="https://www.suse.com/security/cve/CVE-2013-5850/" source="CVE"/>
		<reference ref_id="CVE-2013-5851" ref_url="https://www.suse.com/security/cve/CVE-2013-5851/" source="CVE"/>
		<reference ref_id="CVE-2013-5878" ref_url="https://www.suse.com/security/cve/CVE-2013-5878/" source="CVE"/>
		<reference ref_id="CVE-2013-5884" ref_url="https://www.suse.com/security/cve/CVE-2013-5884/" source="CVE"/>
		<reference ref_id="CVE-2013-5887" ref_url="https://www.suse.com/security/cve/CVE-2013-5887/" source="CVE"/>
		<reference ref_id="CVE-2013-5888" ref_url="https://www.suse.com/security/cve/CVE-2013-5888/" source="CVE"/>
		<reference ref_id="CVE-2013-5889" ref_url="https://www.suse.com/security/cve/CVE-2013-5889/" source="CVE"/>
		<reference ref_id="CVE-2013-5896" ref_url="https://www.suse.com/security/cve/CVE-2013-5896/" source="CVE"/>
		<reference ref_id="CVE-2013-5898" ref_url="https://www.suse.com/security/cve/CVE-2013-5898/" source="CVE"/>
		<reference ref_id="CVE-2013-5899" ref_url="https://www.suse.com/security/cve/CVE-2013-5899/" source="CVE"/>
		<reference ref_id="CVE-2013-5907" ref_url="https://www.suse.com/security/cve/CVE-2013-5907/" source="CVE"/>
		<reference ref_id="CVE-2013-5910" ref_url="https://www.suse.com/security/cve/CVE-2013-5910/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6954" ref_url="https://www.suse.com/security/cve/CVE-2013-6954/" source="CVE"/>
		<reference ref_id="CVE-2014-0368" ref_url="https://www.suse.com/security/cve/CVE-2014-0368/" source="CVE"/>
		<reference ref_id="CVE-2014-0373" ref_url="https://www.suse.com/security/cve/CVE-2014-0373/" source="CVE"/>
		<reference ref_id="CVE-2014-0375" ref_url="https://www.suse.com/security/cve/CVE-2014-0375/" source="CVE"/>
		<reference ref_id="CVE-2014-0376" ref_url="https://www.suse.com/security/cve/CVE-2014-0376/" source="CVE"/>
		<reference ref_id="CVE-2014-0387" ref_url="https://www.suse.com/security/cve/CVE-2014-0387/" source="CVE"/>
		<reference ref_id="CVE-2014-0403" ref_url="https://www.suse.com/security/cve/CVE-2014-0403/" source="CVE"/>
		<reference ref_id="CVE-2014-0410" ref_url="https://www.suse.com/security/cve/CVE-2014-0410/" source="CVE"/>
		<reference ref_id="CVE-2014-0411" ref_url="https://www.suse.com/security/cve/CVE-2014-0411/" source="CVE"/>
		<reference ref_id="CVE-2014-0415" ref_url="https://www.suse.com/security/cve/CVE-2014-0415/" source="CVE"/>
		<reference ref_id="CVE-2014-0416" ref_url="https://www.suse.com/security/cve/CVE-2014-0416/" source="CVE"/>
		<reference ref_id="CVE-2014-0417" ref_url="https://www.suse.com/security/cve/CVE-2014-0417/" source="CVE"/>
		<reference ref_id="CVE-2014-0422" ref_url="https://www.suse.com/security/cve/CVE-2014-0422/" source="CVE"/>
		<reference ref_id="CVE-2014-0423" ref_url="https://www.suse.com/security/cve/CVE-2014-0423/" source="CVE"/>
		<reference ref_id="CVE-2014-0424" ref_url="https://www.suse.com/security/cve/CVE-2014-0424/" source="CVE"/>
		<reference ref_id="CVE-2014-0428" ref_url="https://www.suse.com/security/cve/CVE-2014-0428/" source="CVE"/>
		<reference ref_id="CVE-2014-0429" ref_url="https://www.suse.com/security/cve/CVE-2014-0429/" source="CVE"/>
		<reference ref_id="CVE-2014-0446" ref_url="https://www.suse.com/security/cve/CVE-2014-0446/" source="CVE"/>
		<reference ref_id="CVE-2014-0448" ref_url="https://www.suse.com/security/cve/CVE-2014-0448/" source="CVE"/>
		<reference ref_id="CVE-2014-0449" ref_url="https://www.suse.com/security/cve/CVE-2014-0449/" source="CVE"/>
		<reference ref_id="CVE-2014-0451" ref_url="https://www.suse.com/security/cve/CVE-2014-0451/" source="CVE"/>
		<reference ref_id="CVE-2014-0452" ref_url="https://www.suse.com/security/cve/CVE-2014-0452/" source="CVE"/>
		<reference ref_id="CVE-2014-0453" ref_url="https://www.suse.com/security/cve/CVE-2014-0453/" source="CVE"/>
		<reference ref_id="CVE-2014-0454" ref_url="https://www.suse.com/security/cve/CVE-2014-0454/" source="CVE"/>
		<reference ref_id="CVE-2014-0455" ref_url="https://www.suse.com/security/cve/CVE-2014-0455/" source="CVE"/>
		<reference ref_id="CVE-2014-0457" ref_url="https://www.suse.com/security/cve/CVE-2014-0457/" source="CVE"/>
		<reference ref_id="CVE-2014-0458" ref_url="https://www.suse.com/security/cve/CVE-2014-0458/" source="CVE"/>
		<reference ref_id="CVE-2014-0459" ref_url="https://www.suse.com/security/cve/CVE-2014-0459/" source="CVE"/>
		<reference ref_id="CVE-2014-0460" ref_url="https://www.suse.com/security/cve/CVE-2014-0460/" source="CVE"/>
		<reference ref_id="CVE-2014-0461" ref_url="https://www.suse.com/security/cve/CVE-2014-0461/" source="CVE"/>
		<reference ref_id="CVE-2014-0878" ref_url="https://www.suse.com/security/cve/CVE-2014-0878/" source="CVE"/>
		<reference ref_id="CVE-2014-1876" ref_url="https://www.suse.com/security/cve/CVE-2014-1876/" source="CVE"/>
		<reference ref_id="CVE-2014-2398" ref_url="https://www.suse.com/security/cve/CVE-2014-2398/" source="CVE"/>
		<reference ref_id="CVE-2014-2401" ref_url="https://www.suse.com/security/cve/CVE-2014-2401/" source="CVE"/>
		<reference ref_id="CVE-2014-2402" ref_url="https://www.suse.com/security/cve/CVE-2014-2402/" source="CVE"/>
		<reference ref_id="CVE-2014-2409" ref_url="https://www.suse.com/security/cve/CVE-2014-2409/" source="CVE"/>
		<reference ref_id="CVE-2014-2412" ref_url="https://www.suse.com/security/cve/CVE-2014-2412/" source="CVE"/>
		<reference ref_id="CVE-2014-2414" ref_url="https://www.suse.com/security/cve/CVE-2014-2414/" source="CVE"/>
		<reference ref_id="CVE-2014-2420" ref_url="https://www.suse.com/security/cve/CVE-2014-2420/" source="CVE"/>
		<reference ref_id="CVE-2014-2421" ref_url="https://www.suse.com/security/cve/CVE-2014-2421/" source="CVE"/>
		<reference ref_id="CVE-2014-2423" ref_url="https://www.suse.com/security/cve/CVE-2014-2423/" source="CVE"/>
		<reference ref_id="CVE-2014-2427" ref_url="https://www.suse.com/security/cve/CVE-2014-2427/" source="CVE"/>
		<reference ref_id="CVE-2014-2428" ref_url="https://www.suse.com/security/cve/CVE-2014-2428/" source="CVE"/>
		<reference ref_id="CVE-2014-3065" ref_url="https://www.suse.com/security/cve/CVE-2014-3065/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-4208" ref_url="https://www.suse.com/security/cve/CVE-2014-4208/" source="CVE"/>
		<reference ref_id="CVE-2014-4209" ref_url="https://www.suse.com/security/cve/CVE-2014-4209/" source="CVE"/>
		<reference ref_id="CVE-2014-4218" ref_url="https://www.suse.com/security/cve/CVE-2014-4218/" source="CVE"/>
		<reference ref_id="CVE-2014-4219" ref_url="https://www.suse.com/security/cve/CVE-2014-4219/" source="CVE"/>
		<reference ref_id="CVE-2014-4220" ref_url="https://www.suse.com/security/cve/CVE-2014-4220/" source="CVE"/>
		<reference ref_id="CVE-2014-4221" ref_url="https://www.suse.com/security/cve/CVE-2014-4221/" source="CVE"/>
		<reference ref_id="CVE-2014-4227" ref_url="https://www.suse.com/security/cve/CVE-2014-4227/" source="CVE"/>
		<reference ref_id="CVE-2014-4244" ref_url="https://www.suse.com/security/cve/CVE-2014-4244/" source="CVE"/>
		<reference ref_id="CVE-2014-4252" ref_url="https://www.suse.com/security/cve/CVE-2014-4252/" source="CVE"/>
		<reference ref_id="CVE-2014-4262" ref_url="https://www.suse.com/security/cve/CVE-2014-4262/" source="CVE"/>
		<reference ref_id="CVE-2014-4263" ref_url="https://www.suse.com/security/cve/CVE-2014-4263/" source="CVE"/>
		<reference ref_id="CVE-2014-4265" ref_url="https://www.suse.com/security/cve/CVE-2014-4265/" source="CVE"/>
		<reference ref_id="CVE-2014-4266" ref_url="https://www.suse.com/security/cve/CVE-2014-4266/" source="CVE"/>
		<reference ref_id="CVE-2014-4268" ref_url="https://www.suse.com/security/cve/CVE-2014-4268/" source="CVE"/>
		<reference ref_id="CVE-2014-4288" ref_url="https://www.suse.com/security/cve/CVE-2014-4288/" source="CVE"/>
		<reference ref_id="CVE-2014-6456" ref_url="https://www.suse.com/security/cve/CVE-2014-6456/" source="CVE"/>
		<reference ref_id="CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457/" source="CVE"/>
		<reference ref_id="CVE-2014-6458" ref_url="https://www.suse.com/security/cve/CVE-2014-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-6466" ref_url="https://www.suse.com/security/cve/CVE-2014-6466/" source="CVE"/>
		<reference ref_id="CVE-2014-6476" ref_url="https://www.suse.com/security/cve/CVE-2014-6476/" source="CVE"/>
		<reference ref_id="CVE-2014-6492" ref_url="https://www.suse.com/security/cve/CVE-2014-6492/" source="CVE"/>
		<reference ref_id="CVE-2014-6493" ref_url="https://www.suse.com/security/cve/CVE-2014-6493/" source="CVE"/>
		<reference ref_id="CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502/" source="CVE"/>
		<reference ref_id="CVE-2014-6503" ref_url="https://www.suse.com/security/cve/CVE-2014-6503/" source="CVE"/>
		<reference ref_id="CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506/" source="CVE"/>
		<reference ref_id="CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511/" source="CVE"/>
		<reference ref_id="CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512/" source="CVE"/>
		<reference ref_id="CVE-2014-6513" ref_url="https://www.suse.com/security/cve/CVE-2014-6513/" source="CVE"/>
		<reference ref_id="CVE-2014-6515" ref_url="https://www.suse.com/security/cve/CVE-2014-6515/" source="CVE"/>
		<reference ref_id="CVE-2014-6527" ref_url="https://www.suse.com/security/cve/CVE-2014-6527/" source="CVE"/>
		<reference ref_id="CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531/" source="CVE"/>
		<reference ref_id="CVE-2014-6532" ref_url="https://www.suse.com/security/cve/CVE-2014-6532/" source="CVE"/>
		<reference ref_id="CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558/" source="CVE"/>
		<reference ref_id="CVE-2014-8891" ref_url="https://www.suse.com/security/cve/CVE-2014-8891/" source="CVE"/>
		<reference ref_id="CVE-2014-8892" ref_url="https://www.suse.com/security/cve/CVE-2014-8892/" source="CVE"/>
		<reference ref_id="CVE-2015-0138" ref_url="https://www.suse.com/security/cve/CVE-2015-0138/" source="CVE"/>
		<reference ref_id="CVE-2015-0192" ref_url="https://www.suse.com/security/cve/CVE-2015-0192/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0458" ref_url="https://www.suse.com/security/cve/CVE-2015-0458/" source="CVE"/>
		<reference ref_id="CVE-2015-0459" ref_url="https://www.suse.com/security/cve/CVE-2015-0459/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-0491" ref_url="https://www.suse.com/security/cve/CVE-2015-0491/" source="CVE"/>
		<reference ref_id="CVE-2015-1914" ref_url="https://www.suse.com/security/cve/CVE-2015-1914/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001466.html" source="SUSE-SU"/>
		<description>

java-1_7_0-ibm has been updated to version 1.7.0_sr7.2 to fix 21 security 
issues.

These security issues have been fixed:

    * Unspecified vulnerability (CVE-2014-3065).
    * The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other
      products, uses nondeterministic CBC padding, which makes it easier
      for man-in-the-middle attackers to obtain cleartext data via a
      padding-oracle attack, aka the 'POODLE' issue (CVE-2014-3566).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20, and
      Java SE Embedded 7u60, allows remote attackers to affect
      confidentiality, integrity, and availability via vectors related to
      AWT (CVE-2014-6513).
    * Unspecified vulnerability in Oracle Java SE 7u67 and 8u20 allows
      remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors (CVE-2014-6456).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment, a different
      vulnerability than CVE-2014-4288, CVE-2014-6493, and CVE-2014-6532
      (CVE-2014-6503).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment, a different
      vulnerability than CVE-2014-4288, CVE-2014-6493, and CVE-2014-6503
      (CVE-2014-6532).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment, a different
      vulnerability than CVE-2014-6493, CVE-2014-6503, and CVE-2014-6532
      (CVE-2014-4288).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment, a different
      vulnerability than CVE-2014-4288, CVE-2014-6503, and CVE-2014-6532
      (CVE-2014-6493).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20,
      when running on Firefox, allows remote attackers to affect
      confidentiality, integrity, and availability via unknown vectors
      related to Deployment (CVE-2014-6492).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows local users to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment
      (CVE-2014-6458).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20,
      when running on Internet Explorer, allows local users to affect
      confidentiality, integrity, and availability via unknown vectors
      related to Deployment (CVE-2014-6466).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20, and Java SE Embedded 7u60, allows remote attackers to affect
      confidentiality, integrity, and availability via unknown vectors
      related to Libraries (CVE-2014-6506).
    * Unspecified vulnerability in Oracle Java SE 7u67 and 8u20 allows
      remote attackers to affect integrity via unknown vectors related to
      Deployment, a different vulnerability than CVE-2014-6527
      (CVE-2014-6476).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect integrity via unknown vectors
      related to Deployment (CVE-2014-6515).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20 allows remote attackers to affect confidentiality via unknown
      vectors related to 2D (CVE-2014-6511).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20, and Java SE Embedded 7u60, allows remote attackers to affect
      confidentiality via unknown vectors related to Libraries
      (CVE-2014-6531).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and R28.3.3 allows
      remote attackers to affect integrity via unknown vectors related to
      Libraries (CVE-2014-6512).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20; Java SE Embedded 7u60; and JRockit R27.8.3, and R28.3.3 allows
      remote attackers to affect confidentiality and integrity via vectors
      related to JSSE (CVE-2014-6457).
    * Unspecified vulnerability in Oracle Java SE 7u67 and 8u20 allows
      remote attackers to affect integrity via unknown vectors related to
      Deployment, a different vulnerability than CVE-2014-6476
      (CVE-2014-6527).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20, and Java SE Embedded 7u60, allows remote attackers to affect
      integrity via unknown vectors related to Libraries (CVE-2014-6502).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and JRockit R28.3.3
      allows remote attackers to affect integrity via unknown vectors
      related to Security (CVE-2014-6558).

More information can be found at 
http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_November_2014
&lt;http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_November_2014&gt;

Security Issues:

    * CVE-2014-3065
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3065&gt;
    * CVE-2014-3566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&gt;
    * CVE-2014-6506
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6506&gt;
    * CVE-2014-6511
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6511&gt;
    * CVE-2014-6531
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6531&gt;
    * CVE-2014-6512
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6512&gt;
    * CVE-2014-6457
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6457&gt;
    * CVE-2014-6502
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6502&gt;
    * CVE-2014-6558
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6558&gt;
    * CVE-2014-6513
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6513&gt;
    * CVE-2014-6503
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6503&gt;
    * CVE-2014-4288
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4288&gt;
    * CVE-2014-6493
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6493&gt;
    * CVE-2014-6532
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6532&gt;
    * CVE-2014-6492
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6492&gt;
    * CVE-2014-6458
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6458&gt;
    * CVE-2014-6466
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6466&gt;
    * CVE-2014-6515
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6515&gt;
    * CVE-2014-6456
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6456&gt;
    * CVE-2014-6476
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6476&gt;
    * CVE-2014-6527
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6527&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-21"/>
	<updated date="2014-11-21"/>
	<bugzilla href="https://bugzilla.suse.com/592934">SUSE bug 592934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817062">SUSE bug 817062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819285">SUSE bug 819285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823034">SUSE bug 823034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861782">SUSE bug 861782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912434">SUSE bug 912434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912447">SUSE bug 912447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916265">SUSE bug 916265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916266">SUSE bug 916266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930365">SUSE bug 930365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931702">SUSE bug 931702</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0401/">CVE-2013-0401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0401">CVE-2013-0401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1491/">CVE-2013-1491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1491">CVE-2013-1491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1537/">CVE-2013-1537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1537">CVE-2013-1537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1540/">CVE-2013-1540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1540">CVE-2013-1540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1557/">CVE-2013-1557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1557">CVE-2013-1557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1563/">CVE-2013-1563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1563">CVE-2013-1563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1569/">CVE-2013-1569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1569">CVE-2013-1569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2383/">CVE-2013-2383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2383">CVE-2013-2383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2384/">CVE-2013-2384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2384">CVE-2013-2384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2394/">CVE-2013-2394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2394">CVE-2013-2394 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2400/">CVE-2013-2400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2400">CVE-2013-2400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2407/">CVE-2013-2407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2407">CVE-2013-2407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2417/">CVE-2013-2417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2417">CVE-2013-2417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2418/">CVE-2013-2418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2418">CVE-2013-2418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2419/">CVE-2013-2419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2419">CVE-2013-2419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2420/">CVE-2013-2420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2420">CVE-2013-2420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2422/">CVE-2013-2422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2422">CVE-2013-2422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2424/">CVE-2013-2424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2424">CVE-2013-2424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2429/">CVE-2013-2429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2429">CVE-2013-2429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2430/">CVE-2013-2430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2430">CVE-2013-2430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2432/">CVE-2013-2432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2432">CVE-2013-2432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2433/">CVE-2013-2433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2433">CVE-2013-2433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2435/">CVE-2013-2435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2435">CVE-2013-2435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2440/">CVE-2013-2440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2440">CVE-2013-2440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2442/">CVE-2013-2442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2442">CVE-2013-2442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2448/">CVE-2013-2448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2448">CVE-2013-2448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2453/">CVE-2013-2453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2453">CVE-2013-2453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2454/">CVE-2013-2454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2454">CVE-2013-2454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2456/">CVE-2013-2456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2456">CVE-2013-2456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2457/">CVE-2013-2457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2457">CVE-2013-2457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2458/">CVE-2013-2458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2458">CVE-2013-2458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2459/">CVE-2013-2459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2459">CVE-2013-2459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2460/">CVE-2013-2460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2460">CVE-2013-2460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2462/">CVE-2013-2462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2462">CVE-2013-2462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2463/">CVE-2013-2463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2463">CVE-2013-2463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2464/">CVE-2013-2464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2464">CVE-2013-2464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2465/">CVE-2013-2465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2465">CVE-2013-2465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2466/">CVE-2013-2466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2466">CVE-2013-2466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2468/">CVE-2013-2468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2468">CVE-2013-2468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2469/">CVE-2013-2469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2469">CVE-2013-2469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2470/">CVE-2013-2470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2470">CVE-2013-2470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2471/">CVE-2013-2471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2471">CVE-2013-2471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2472/">CVE-2013-2472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2472">CVE-2013-2472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2473/">CVE-2013-2473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2473">CVE-2013-2473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3006/">CVE-2013-3006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3006">CVE-2013-3006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3007/">CVE-2013-3007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3007">CVE-2013-3007 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3008/">CVE-2013-3008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3008">CVE-2013-3008 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3009/">CVE-2013-3009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3009">CVE-2013-3009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3010/">CVE-2013-3010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3010">CVE-2013-3010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3011/">CVE-2013-3011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3011">CVE-2013-3011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3012/">CVE-2013-3012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3012">CVE-2013-3012 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3743/">CVE-2013-3743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3743">CVE-2013-3743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3744/">CVE-2013-3744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3744">CVE-2013-3744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3829/">CVE-2013-3829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3829">CVE-2013-3829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4002/">CVE-2013-4002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4002">CVE-2013-4002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4041/">CVE-2013-4041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4041">CVE-2013-4041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5372/">CVE-2013-5372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5372">CVE-2013-5372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5375/">CVE-2013-5375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5375">CVE-2013-5375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5456/">CVE-2013-5456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5456">CVE-2013-5456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5457/">CVE-2013-5457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5457">CVE-2013-5457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5458/">CVE-2013-5458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5458">CVE-2013-5458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5772/">CVE-2013-5772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5772">CVE-2013-5772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5774/">CVE-2013-5774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5774">CVE-2013-5774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5776/">CVE-2013-5776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5776">CVE-2013-5776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5778/">CVE-2013-5778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5778">CVE-2013-5778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5780/">CVE-2013-5780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5780">CVE-2013-5780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5782/">CVE-2013-5782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5782">CVE-2013-5782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5783/">CVE-2013-5783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5783">CVE-2013-5783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5784/">CVE-2013-5784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5784">CVE-2013-5784 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5787/">CVE-2013-5787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5787">CVE-2013-5787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5788/">CVE-2013-5788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5788">CVE-2013-5788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5789/">CVE-2013-5789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5789">CVE-2013-5789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5790/">CVE-2013-5790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5790">CVE-2013-5790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5797/">CVE-2013-5797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5797">CVE-2013-5797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5800/">CVE-2013-5800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5800">CVE-2013-5800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5801/">CVE-2013-5801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5801">CVE-2013-5801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5802/">CVE-2013-5802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5802">CVE-2013-5802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5803/">CVE-2013-5803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5803">CVE-2013-5803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5804/">CVE-2013-5804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5804">CVE-2013-5804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5809/">CVE-2013-5809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5809">CVE-2013-5809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5812/">CVE-2013-5812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5812">CVE-2013-5812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5814/">CVE-2013-5814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5814">CVE-2013-5814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5817/">CVE-2013-5817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5817">CVE-2013-5817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5818/">CVE-2013-5818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5818">CVE-2013-5818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5819/">CVE-2013-5819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5819">CVE-2013-5819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5820/">CVE-2013-5820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5820">CVE-2013-5820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5823/">CVE-2013-5823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5823">CVE-2013-5823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5824/">CVE-2013-5824 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5824">CVE-2013-5824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5825/">CVE-2013-5825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5825">CVE-2013-5825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5829/">CVE-2013-5829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5829">CVE-2013-5829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5830/">CVE-2013-5830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5830">CVE-2013-5830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5831/">CVE-2013-5831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5831">CVE-2013-5831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5832/">CVE-2013-5832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5832">CVE-2013-5832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5838/">CVE-2013-5838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5838">CVE-2013-5838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5840/">CVE-2013-5840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5840">CVE-2013-5840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5842/">CVE-2013-5842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5842">CVE-2013-5842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5843/">CVE-2013-5843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5843">CVE-2013-5843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5848/">CVE-2013-5848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5848">CVE-2013-5848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5849/">CVE-2013-5849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5849">CVE-2013-5849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5850/">CVE-2013-5850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5850">CVE-2013-5850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5851/">CVE-2013-5851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5851">CVE-2013-5851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5878/">CVE-2013-5878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5878">CVE-2013-5878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5884/">CVE-2013-5884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5884">CVE-2013-5884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5887/">CVE-2013-5887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5887">CVE-2013-5887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5888/">CVE-2013-5888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5888">CVE-2013-5888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5889/">CVE-2013-5889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5889">CVE-2013-5889 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5896/">CVE-2013-5896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5896">CVE-2013-5896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5898/">CVE-2013-5898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5898">CVE-2013-5898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5899/">CVE-2013-5899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5899">CVE-2013-5899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5907/">CVE-2013-5907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5907">CVE-2013-5907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5910/">CVE-2013-5910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5910">CVE-2013-5910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6629">CVE-2013-6629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6954/">CVE-2013-6954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6954">CVE-2013-6954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0368/">CVE-2014-0368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0368">CVE-2014-0368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0373/">CVE-2014-0373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0373">CVE-2014-0373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0375/">CVE-2014-0375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0375">CVE-2014-0375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0376/">CVE-2014-0376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0376">CVE-2014-0376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0387/">CVE-2014-0387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0387">CVE-2014-0387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0403/">CVE-2014-0403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0403">CVE-2014-0403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0410/">CVE-2014-0410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0410">CVE-2014-0410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0411/">CVE-2014-0411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0411">CVE-2014-0411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0415/">CVE-2014-0415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0415">CVE-2014-0415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0416/">CVE-2014-0416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0416">CVE-2014-0416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0417/">CVE-2014-0417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0417">CVE-2014-0417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0422/">CVE-2014-0422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0422">CVE-2014-0422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0423/">CVE-2014-0423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0423">CVE-2014-0423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0424/">CVE-2014-0424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0424">CVE-2014-0424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0428/">CVE-2014-0428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0428">CVE-2014-0428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0429/">CVE-2014-0429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0429">CVE-2014-0429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0446/">CVE-2014-0446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0446">CVE-2014-0446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0448/">CVE-2014-0448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0448">CVE-2014-0448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0449/">CVE-2014-0449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0449">CVE-2014-0449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0451/">CVE-2014-0451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0451">CVE-2014-0451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0452/">CVE-2014-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0452">CVE-2014-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0453/">CVE-2014-0453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0453">CVE-2014-0453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0454/">CVE-2014-0454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0454">CVE-2014-0454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0455/">CVE-2014-0455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0455">CVE-2014-0455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0457/">CVE-2014-0457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0457">CVE-2014-0457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0458/">CVE-2014-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0458">CVE-2014-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0459/">CVE-2014-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0459">CVE-2014-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0460/">CVE-2014-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0460">CVE-2014-0460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0461/">CVE-2014-0461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0461">CVE-2014-0461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0878/">CVE-2014-0878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0878">CVE-2014-0878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1876/">CVE-2014-1876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1876">CVE-2014-1876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2398/">CVE-2014-2398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2398">CVE-2014-2398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2401/">CVE-2014-2401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2401">CVE-2014-2401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2402/">CVE-2014-2402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2402">CVE-2014-2402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2409/">CVE-2014-2409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2409">CVE-2014-2409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2412/">CVE-2014-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2412">CVE-2014-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2414/">CVE-2014-2414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2414">CVE-2014-2414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2420/">CVE-2014-2420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2420">CVE-2014-2420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2421/">CVE-2014-2421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2421">CVE-2014-2421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2423/">CVE-2014-2423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2423">CVE-2014-2423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2427/">CVE-2014-2427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2427">CVE-2014-2427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2428/">CVE-2014-2428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2428">CVE-2014-2428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3065/">CVE-2014-3065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3065">CVE-2014-3065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4208/">CVE-2014-4208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4208">CVE-2014-4208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4209/">CVE-2014-4209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4209">CVE-2014-4209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4218/">CVE-2014-4218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4218">CVE-2014-4218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4219/">CVE-2014-4219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4219">CVE-2014-4219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4220/">CVE-2014-4220 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4220">CVE-2014-4220 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4221/">CVE-2014-4221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4221">CVE-2014-4221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4227/">CVE-2014-4227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4227">CVE-2014-4227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4244/">CVE-2014-4244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4244">CVE-2014-4244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4252/">CVE-2014-4252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4252">CVE-2014-4252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4262/">CVE-2014-4262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4262">CVE-2014-4262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4263/">CVE-2014-4263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4263">CVE-2014-4263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4265/">CVE-2014-4265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4265">CVE-2014-4265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4266/">CVE-2014-4266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4266">CVE-2014-4266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4268/">CVE-2014-4268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4268">CVE-2014-4268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4288/">CVE-2014-4288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4288">CVE-2014-4288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6456/">CVE-2014-6456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6456">CVE-2014-6456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6457">CVE-2014-6457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6458/">CVE-2014-6458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6458">CVE-2014-6458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6466/">CVE-2014-6466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6466">CVE-2014-6466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6476/">CVE-2014-6476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6476">CVE-2014-6476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6492/">CVE-2014-6492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6492">CVE-2014-6492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6493/">CVE-2014-6493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6493">CVE-2014-6493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6502">CVE-2014-6502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6503/">CVE-2014-6503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6503">CVE-2014-6503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6506">CVE-2014-6506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6511">CVE-2014-6511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6512">CVE-2014-6512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6513/">CVE-2014-6513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6513">CVE-2014-6513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6515/">CVE-2014-6515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6515">CVE-2014-6515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6527/">CVE-2014-6527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6527">CVE-2014-6527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6531">CVE-2014-6531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6532/">CVE-2014-6532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6532">CVE-2014-6532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6558">CVE-2014-6558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8891/">CVE-2014-8891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8891">CVE-2014-8891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8892/">CVE-2014-8892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8892">CVE-2014-8892 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0138/">CVE-2015-0138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0138">CVE-2015-0138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0192/">CVE-2015-0192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0192">CVE-2015-0192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0458/">CVE-2015-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0458">CVE-2015-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0459/">CVE-2015-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0459">CVE-2015-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0469">CVE-2015-0469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0477">CVE-2015-0477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0478">CVE-2015-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0480">CVE-2015-0480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0488">CVE-2015-0488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0491/">CVE-2015-0491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0491">CVE-2015-0491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1914/">CVE-2015-1914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1914">CVE-2015-1914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2808">CVE-2015-2808 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578141" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578142" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578143" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578144" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578141" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578142" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578143" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578144" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578141" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578142" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578143" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578144" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218736" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="935540" ref_url="https://bugzilla.suse.com/935540" source="BUGZILLA"/>
		<reference ref_id="938895" ref_url="https://bugzilla.suse.com/938895" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0192" ref_url="https://www.suse.com/security/cve/CVE-2015-0192/" source="CVE"/>
		<reference ref_id="CVE-2015-1931" ref_url="https://www.suse.com/security/cve/CVE-2015-1931/" source="CVE"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2619" ref_url="https://www.suse.com/security/cve/CVE-2015-2619/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4729" ref_url="https://www.suse.com/security/cve/CVE-2015-4729/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001534.html" source="SUSE-SU"/>
		<description>
java-1_7_0-ibm was updated to fix 21 security issues.

These security issues were fixed:
- CVE-2015-4729: Unspecified vulnerability in Oracle Java SE 7u80 and 8u45 allowed remote attackers to affect confidentiality and integrity via unknown vectors related to Deployment (bsc#938895).
- CVE-2015-4748: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and Embedded 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security (bsc#938895).
- CVE-2015-2664: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allowed local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment (bsc#938895).
- CVE-2015-0192: Unspecified vulnerability in IBM Java 8 before SR1, 7 R1 before SR2 FP11, 7 before SR9, 6 R1 before SR8 FP4, 6 before SR16 FP4, and 5.0 before SR16 FP10 allowed remote attackers to gain privileges via unknown vectors related to the Java Virtual Machine (bsc#938895).
- CVE-2015-2613: Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via vectors related to JCE (bsc#938895).
- CVE-2015-4731: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; Java SE Embedded 7u75; and Java SE Embedded 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX (bsc#938895).
- CVE-2015-2637: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via unknown vectors related to 2D (bsc#938895).
- CVE-2015-4733: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI (bsc#938895).
- CVE-2015-4732: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-2590 (bsc#938895).
- CVE-2015-2621: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33, allowed remote attackers to affect confidentiality via vectors related to JMX (bsc#938895).
- CVE-2015-2619: Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, JavaFX 2.2.80, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via unknown vectors related to 2D (bsc#938895).
- CVE-2015-2590: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-4732 (bsc#938895).
- CVE-2015-2638: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D (bsc#938895).
- CVE-2015-2625: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via vectors related to JSSE (bsc#938895).
- CVE-2015-2632: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allowed remote attackers to affect confidentiality via unknown vectors related to 2D (bsc#938895).
- CVE-2015-1931: Unspecified vulnerability (bsc#938895).
- CVE-2015-4760: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D (bsc#938895).
- CVE-2015-4000: The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, did not properly convey a DHE_EXPORT choice, which allowed man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the 'Logjam' issue (bsc#935540).
- CVE-2015-2601: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, JRockit R28.3.6, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via vectors related to JCE (bsc#938895).
- CVE-2015-2808: The RC4 algorithm, as used in the TLS protocol and SSL protocol, did not properly combine state data with key data during the initialization phase, which made it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the 'Bar Mitzvah' issue (bsc#938895).
- CVE-2015-4749: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect availability via vectors related to JNDI (bsc#938895).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-31"/>
	<updated date="2015-07-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/935540">SUSE bug 935540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0192/">CVE-2015-0192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0192">CVE-2015-0192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1931/">CVE-2015-1931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1931">CVE-2015-1931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2590">CVE-2015-2590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2601">CVE-2015-2601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2613">CVE-2015-2613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2619/">CVE-2015-2619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2619">CVE-2015-2619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2621">CVE-2015-2621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2625">CVE-2015-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2632">CVE-2015-2632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2637">CVE-2015-2637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2638">CVE-2015-2638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2664">CVE-2015-2664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2808">CVE-2015-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4729/">CVE-2015-4729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4729">CVE-2015-4729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4731">CVE-2015-4731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4732">CVE-2015-4732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4733">CVE-2015-4733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4748">CVE-2015-4748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4749">CVE-2015-4749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4760">CVE-2015-4760 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578145" comment="java-1_7_0-ibm-1.7.0_sr9.10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576260" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578146" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576263" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578145" comment="java-1_7_0-ibm-1.7.0_sr9.10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576260" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578146" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576263" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578145" comment="java-1_7_0-ibm-1.7.0_sr9.10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576260" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578146" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576263" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218737" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="941939" ref_url="https://bugzilla.suse.com/941939" source="BUGZILLA"/>
		<reference ref_id="955131" ref_url="https://bugzilla.suse.com/955131" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0458" ref_url="https://www.suse.com/security/cve/CVE-2015-0458/" source="CVE"/>
		<reference ref_id="CVE-2015-0459" ref_url="https://www.suse.com/security/cve/CVE-2015-0459/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-0491" ref_url="https://www.suse.com/security/cve/CVE-2015-0491/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-5006" ref_url="https://www.suse.com/security/cve/CVE-2015-5006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001721.html" source="SUSE-SU"/>
		<description>
The java-1_7_0-ibm package was updated to version 7.0-9.20 to fix several security and non security issues:

- bnc#955131: Version update to 7.0-9.20:
  CVE-2015-4734 CVE-2015-4803 CVE-2015-4805 CVE-2015-4806 CVE-2015-4810
  CVE-2015-4835 CVE-2015-4840 CVE-2015-4842 CVE-2015-4843 CVE-2015-4844
  CVE-2015-4860 CVE-2015-4871 CVE-2015-4872 CVE-2015-4882 CVE-2015-4883
  CVE-2015-4893 CVE-2015-4902 CVE-2015-4903 CVE-2015-4911 CVE-2015-5006
- Add backcompat symlinks for sdkdir
- bnc#941939: Fix to provide %{name} instead of %{sdklnk} only in _jvmprivdir
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/941939">SUSE bug 941939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0458/">CVE-2015-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0458">CVE-2015-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0459/">CVE-2015-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0459">CVE-2015-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0469">CVE-2015-0469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0477">CVE-2015-0477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0478">CVE-2015-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0480">CVE-2015-0480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0488">CVE-2015-0488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0491/">CVE-2015-0491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0491">CVE-2015-0491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4734">CVE-2015-4734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4803">CVE-2015-4803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4805">CVE-2015-4805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4806">CVE-2015-4806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4810">CVE-2015-4810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4835">CVE-2015-4835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4840">CVE-2015-4840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4842">CVE-2015-4842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4843">CVE-2015-4843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4844">CVE-2015-4844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4860">CVE-2015-4860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4871">CVE-2015-4871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4872">CVE-2015-4872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4882">CVE-2015-4882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4883">CVE-2015-4883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4893">CVE-2015-4893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4902">CVE-2015-4902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4903">CVE-2015-4903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4911">CVE-2015-4911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5006/">CVE-2015-5006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5006">CVE-2015-5006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578147" comment="java-1_7_0-ibm-1.7.0_sr9.20-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576265" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578148" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576268" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578147" comment="java-1_7_0-ibm-1.7.0_sr9.20-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576265" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578148" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576268" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578147" comment="java-1_7_0-ibm-1.7.0_sr9.20-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576265" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578148" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576268" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218738" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="960402" ref_url="https://bugzilla.suse.com/960402" source="BUGZILLA"/>
		<reference ref_id="963937" ref_url="https://bugzilla.suse.com/963937" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5041" ref_url="https://www.suse.com/security/cve/CVE-2015-5041/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<description>

This update for java-1_7_0-ibm fixes the following issues by updating to 7.0-9.30 (bsc#963937):

- CVE-2015-5041: Could could have invoked non-public interface methods under certain circumstances
- CVE-2015-7575: The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials
- CVE-2015-7981: libpng could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read in the png_convert_to_rfc1123 function. An attacker could exploit this vulnerability to obtain sensitive information
- CVE-2015-8126: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8472: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8540: libpng is vulnerable to a buffer overflow, caused by a read underflow in png_check_keyword in pngwutil.c. By sending an overly long argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
- CVE-2016-0402: An unspecified vulnerability related to the Networking component has no confidentiality impact, partial integrity impact, and no availability impact
- CVE-2016-0448: An unspecified vulnerability related to the JMX component could allow a remote attacker to obtain sensitive information
- CVE-2016-0466: An unspecified vulnerability related to the JAXP component could allow a remote attacker to cause a denial of service
- CVE-2016-0483: An unspecified vulnerability related to the AWT component has complete confidentiality impact, complete integrity impact, and complete availability impact
- CVE-2016-0494: An unspecified vulnerability related to the 2D component has complete confidentiality impact, complete integrity impact, and complete availability impact

The following bugs were fixed:

- bsc#960402: resolve package conflicts in devel package
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-11"/>
	<updated date="2016-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5041/">CVE-2015-5041 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5041">CVE-2015-5041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7981">CVE-2015-7981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8472">CVE-2015-8472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8540">CVE-2015-8540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0402">CVE-2016-0402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0448">CVE-2016-0448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0466">CVE-2016-0466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0483">CVE-2016-0483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0494">CVE-2016-0494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578149" comment="java-1_7_0-ibm-1.7.0_sr9.30-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578150" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.30-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578151" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.30-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578152" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.30-45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218739" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="960402" ref_url="https://bugzilla.suse.com/960402" source="BUGZILLA"/>
		<reference ref_id="963937" ref_url="https://bugzilla.suse.com/963937" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5041" ref_url="https://www.suse.com/security/cve/CVE-2015-5041/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001910.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_0-ibm fixes the following issues by updating to 7.0-9.30 (bsc#963937):

- CVE-2015-5041: Could could have invoked non-public interface methods under certain circumstances
- CVE-2015-7575: The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials
- CVE-2015-7981: libpng could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read in the png_convert_to_rfc1123 function. An attacker could exploit this vulnerability to obtain sensitive information
- CVE-2015-8126: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8472: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8540: libpng is vulnerable to a buffer overflow, caused by a read underflow in png_check_keyword in pngwutil.c. By sending an overly long argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
- CVE-2016-0402: An unspecified vulnerability related to the Networking component has no confidentiality impact, partial integrity impact, and no availability impact
- CVE-2016-0448: An unspecified vulnerability related to the JMX component could allow a remote attacker to obtain sensitive information
- CVE-2016-0466: An unspecified vulnerability related to the JAXP component could allow a remote attacker to cause a denial of service
- CVE-2016-0483: An unspecified vulnerability related to the AWT component has complete confidentiality impact, complete integrity impact, and complete availability impact
- CVE-2016-0494: An unspecified vulnerability related to the 2D component has complete confidentiality impact, complete integrity impact, and complete availability impact

The following bugs were fixed:

- bsc#960402: resolve package conflicts in devel package
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-02"/>
	<updated date="2016-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5041/">CVE-2015-5041 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5041">CVE-2015-5041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7981">CVE-2015-7981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8472">CVE-2015-8472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8540">CVE-2015-8540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0402">CVE-2016-0402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0448">CVE-2016-0448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0466">CVE-2016-0466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0483">CVE-2016-0483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0494">CVE-2016-0494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578153" comment="java-1_7_0-ibm-1.7.0_sr9.30-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578154" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.30-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578155" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.30-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578156" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.30-47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218740" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="977646" ref_url="https://bugzilla.suse.com/977646" source="BUGZILLA"/>
		<reference ref_id="977648" ref_url="https://bugzilla.suse.com/977648" source="BUGZILLA"/>
		<reference ref_id="977650" ref_url="https://bugzilla.suse.com/977650" source="BUGZILLA"/>
		<reference ref_id="979252" ref_url="https://bugzilla.suse.com/979252" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0264" ref_url="https://www.suse.com/security/cve/CVE-2016-0264/" source="CVE"/>
		<reference ref_id="CVE-2016-0363" ref_url="https://www.suse.com/security/cve/CVE-2016-0363/" source="CVE"/>
		<reference ref_id="CVE-2016-0376" ref_url="https://www.suse.com/security/cve/CVE-2016-0376/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-3422" ref_url="https://www.suse.com/security/cve/CVE-2016-3422/" source="CVE"/>
		<reference ref_id="CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3443" ref_url="https://www.suse.com/security/cve/CVE-2016-3443/" source="CVE"/>
		<reference ref_id="CVE-2016-3449" ref_url="https://www.suse.com/security/cve/CVE-2016-3449/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002078.html" source="SUSE-SU"/>
		<description>

This IBM Java 1.7.0 SR9 FP40 release fixes the following issues:

Security issues fixed:
- CVE-2016-0264: buffer overflow vulnerability in the IBM JVM (bsc#977648)
- CVE-2016-0363: insecure use of invoke method in CORBA component, incorrect CVE-2013-3009 fix (bsc#977650)
- CVE-2016-0376: insecure deserialization in CORBA, incorrect CVE-2013-5456 fix (bsc#977646)
- The following CVEs got also fixed during this update. (bsc#979252)
  CVE-2016-3443, CVE-2016-0687, CVE-2016-0686, CVE-2016-3427, CVE-2016-3449, CVE-2016-3422, CVE-2016-3426
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-20"/>
	<updated date="2016-05-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/977646">SUSE bug 977646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977648">SUSE bug 977648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977650">SUSE bug 977650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0264/">CVE-2016-0264 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0264">CVE-2016-0264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0363/">CVE-2016-0363 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0363">CVE-2016-0363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0376/">CVE-2016-0376 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0376">CVE-2016-0376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0686">CVE-2016-0686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0687">CVE-2016-0687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3422/">CVE-2016-3422 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3422">CVE-2016-3422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3426">CVE-2016-3426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3427">CVE-2016-3427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3443/">CVE-2016-3443 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3443">CVE-2016-3443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3449/">CVE-2016-3449 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3449">CVE-2016-3449 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576274" comment="java-1_7_0-ibm-1.7.0_sr9.40-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576275" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576277" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576278" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576274" comment="java-1_7_0-ibm-1.7.0_sr9.40-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576275" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576277" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576278" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218741" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="992537" ref_url="https://bugzilla.suse.com/992537" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="CVE-2016-3511" ref_url="https://www.suse.com/security/cve/CVE-2016-3511/" source="CVE"/>
		<reference ref_id="CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002268.html" source="SUSE-SU"/>
		<description>

IBM Java 7 was updated to 7.1-9.50, fixing bugs and security issues (bsc#992537).

Security issues fixed:
  CVE-2016-3485 CVE-2016-3511 CVE-2016-3598

Please see https://www.ibm.com/developerworks/java/jdk/alerts/ for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-10"/>
	<updated date="2016-09-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/992537">SUSE bug 992537</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485 at SUSE</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3485">CVE-2016-3485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3511/">CVE-2016-3511 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3511">CVE-2016-3511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3598">CVE-2016-3598 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576279" comment="java-1_7_0-ibm-1.7.0_sr9.50-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576280" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.50-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576281" comment="java-1_7_0-ibm-devel-1.7.0_sr9.50-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576282" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.50-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576283" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.50-55.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576279" comment="java-1_7_0-ibm-1.7.0_sr9.50-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576280" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.50-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576281" comment="java-1_7_0-ibm-devel-1.7.0_sr9.50-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576282" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.50-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576283" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.50-55.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218742" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1009280" ref_url="https://bugzilla.suse.com/1009280" source="BUGZILLA"/>
		<reference ref_id="992537" ref_url="https://bugzilla.suse.com/992537" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002460.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_0-ibm fixes the following issues:

- Version update to 7.0-9.60 (bsc#1009280, bsc#992537) fixing the following CVE's:
  CVE-2016-5568, CVE-2016-5556, CVE-2016-5573, CVE-2016-5597, CVE-2016-5554,
  CVE-2016-5542

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-09"/>
	<updated date="2016-12-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992537">SUSE bug 992537</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5542">CVE-2016-5542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5554">CVE-2016-5554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5556">CVE-2016-5556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5568">CVE-2016-5568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5573">CVE-2016-5573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5597">CVE-2016-5597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576284" comment="java-1_7_0-ibm-1.7.0_sr9.60-58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576285" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.60-58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576286" comment="java-1_7_0-ibm-devel-1.7.0_sr9.60-58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576287" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576288" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.60-58.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576284" comment="java-1_7_0-ibm-1.7.0_sr9.60-58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576285" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.60-58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576286" comment="java-1_7_0-ibm-devel-1.7.0_sr9.60-58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576287" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576288" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.60-58.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218743" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027038" ref_url="https://bugzilla.suse.com/1027038" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002703.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_1-ibm fixes the following issues:

Security issue fixed:
- CVE-2016-2183: The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and
  other protocols and products, have a birthday bound of approximately four billion blocks, which
  makes it easier for remote attackers to obtain cleartext data via a birthday attack against a
  long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode,
  aka a 'Sweet32' attack. (bsc#1027038)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027038">SUSE bug 1027038</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578157" comment="java-1_7_0-ibm-1.7.0_sr10.1-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578158" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.1-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578159" comment="java-1_7_0-ibm-devel-1.7.0_sr10.1-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578160" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.1-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578161" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.1-61.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578157" comment="java-1_7_0-ibm-1.7.0_sr10.1-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578158" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.1-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578159" comment="java-1_7_0-ibm-devel-1.7.0_sr10.1-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578160" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.1-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578161" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.1-61.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218744" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1038505" ref_url="https://bugzilla.suse.com/1038505" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-1289" ref_url="https://www.suse.com/security/cve/CVE-2017-1289/" source="CVE"/>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3511" ref_url="https://www.suse.com/security/cve/CVE-2017-3511/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002910.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_0-ibm fixes the following issues:

Version update to 7.0-10.5 bsc#1038505

  - CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in inftrees.c
  - CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in inffast.c
  - CVE-2016-9842: zlib: Undefined left shift of negative number
  - CVE-2016-9843: zlib: Big-endian out-of-bounds pointer
  - CVE-2017-1289: IBM JDK: XML External Entity Injection (XXE) error when processing XML data
  - CVE-2017-3509: OpenJDK: improper re-use of NTLM authenticated connections 
  - CVE-2017-3511: OpenJDK: untrusted extension directories search path in Launcher 
  - CVE-2017-3539: OpenJDK: MD5 allowed for jar verification 
  - CVE-2017-3533: OpenJDK: newline injection in the FTP client
  - CVE-2017-3544: OpenJDK: newline injection in the SMTP client

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-23"/>
	<updated date="2017-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9840">CVE-2016-9840 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9841">CVE-2016-9841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9842">CVE-2016-9842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9843">CVE-2016-9843 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1289/">CVE-2017-1289 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1289">CVE-2017-1289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3509">CVE-2017-3509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3511/">CVE-2017-3511 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3511">CVE-2017-3511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3533">CVE-2017-3533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3539">CVE-2017-3539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3544">CVE-2017-3544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578162" comment="java-1_7_0-ibm-1.7.0_sr10.5-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578163" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.5-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578164" comment="java-1_7_0-ibm-devel-1.7.0_sr10.5-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578165" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.5-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578166" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.5-64.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578162" comment="java-1_7_0-ibm-1.7.0_sr10.5-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578163" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.5-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578164" comment="java-1_7_0-ibm-devel-1.7.0_sr10.5-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578165" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.5-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578166" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.5-64.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218745" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1053431" ref_url="https://bugzilla.suse.com/1053431" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10053" ref_url="https://www.suse.com/security/cve/CVE-2017-10053/" source="CVE"/>
		<reference ref_id="CVE-2017-10067" ref_url="https://www.suse.com/security/cve/CVE-2017-10067/" source="CVE"/>
		<reference ref_id="CVE-2017-10074" ref_url="https://www.suse.com/security/cve/CVE-2017-10074/" source="CVE"/>
		<reference ref_id="CVE-2017-10081" ref_url="https://www.suse.com/security/cve/CVE-2017-10081/" source="CVE"/>
		<reference ref_id="CVE-2017-10087" ref_url="https://www.suse.com/security/cve/CVE-2017-10087/" source="CVE"/>
		<reference ref_id="CVE-2017-10089" ref_url="https://www.suse.com/security/cve/CVE-2017-10089/" source="CVE"/>
		<reference ref_id="CVE-2017-10090" ref_url="https://www.suse.com/security/cve/CVE-2017-10090/" source="CVE"/>
		<reference ref_id="CVE-2017-10096" ref_url="https://www.suse.com/security/cve/CVE-2017-10096/" source="CVE"/>
		<reference ref_id="CVE-2017-10101" ref_url="https://www.suse.com/security/cve/CVE-2017-10101/" source="CVE"/>
		<reference ref_id="CVE-2017-10102" ref_url="https://www.suse.com/security/cve/CVE-2017-10102/" source="CVE"/>
		<reference ref_id="CVE-2017-10105" ref_url="https://www.suse.com/security/cve/CVE-2017-10105/" source="CVE"/>
		<reference ref_id="CVE-2017-10107" ref_url="https://www.suse.com/security/cve/CVE-2017-10107/" source="CVE"/>
		<reference ref_id="CVE-2017-10108" ref_url="https://www.suse.com/security/cve/CVE-2017-10108/" source="CVE"/>
		<reference ref_id="CVE-2017-10109" ref_url="https://www.suse.com/security/cve/CVE-2017-10109/" source="CVE"/>
		<reference ref_id="CVE-2017-10110" ref_url="https://www.suse.com/security/cve/CVE-2017-10110/" source="CVE"/>
		<reference ref_id="CVE-2017-10111" ref_url="https://www.suse.com/security/cve/CVE-2017-10111/" source="CVE"/>
		<reference ref_id="CVE-2017-10115" ref_url="https://www.suse.com/security/cve/CVE-2017-10115/" source="CVE"/>
		<reference ref_id="CVE-2017-10116" ref_url="https://www.suse.com/security/cve/CVE-2017-10116/" source="CVE"/>
		<reference ref_id="CVE-2017-10125" ref_url="https://www.suse.com/security/cve/CVE-2017-10125/" source="CVE"/>
		<reference ref_id="CVE-2017-10243" ref_url="https://www.suse.com/security/cve/CVE-2017-10243/" source="CVE"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

This update for java-1_7_1-ibm fixes the following issues:

- Version update to 7.1-4.10 [bsc#1053431]
  * CVE-2017-10111 CVE-2017-10110 CVE-2017-10107 CVE-2017-10101
    CVE-2017-10096 CVE-2017-10090 CVE-2017-10089 CVE-2017-10087
    CVE-2017-10102 CVE-2017-10116 CVE-2017-10074 CVE-2017-10115
    CVE-2017-10067 CVE-2017-10125 CVE-2017-10243 CVE-2017-10109
    CVE-2017-10108 CVE-2017-10053 CVE-2017-10105 CVE-2017-10081: Multiple unspecified vulnerabilities 
in multiple Java components could lead to code execution or sandbox escape
 
 More information can be found here: https://developer.ibm.com/javasdk/support/security-vulnerabilities/#Oracle_July_18_2017_CPU

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-29"/>
	<updated date="2017-08-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1053431">SUSE bug 1053431</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10053/">CVE-2017-10053 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10053">CVE-2017-10053 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10067/">CVE-2017-10067 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10067">CVE-2017-10067 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10074/">CVE-2017-10074 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10074">CVE-2017-10074 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10081/">CVE-2017-10081 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10081">CVE-2017-10081 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10087/">CVE-2017-10087 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10087">CVE-2017-10087 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10089/">CVE-2017-10089 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10089">CVE-2017-10089 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10090/">CVE-2017-10090 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10090">CVE-2017-10090 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10096/">CVE-2017-10096 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10096">CVE-2017-10096 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10101/">CVE-2017-10101 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10101">CVE-2017-10101 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10102/">CVE-2017-10102 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10102">CVE-2017-10102 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10105/">CVE-2017-10105 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10105">CVE-2017-10105 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10107/">CVE-2017-10107 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10107">CVE-2017-10107 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10108/">CVE-2017-10108 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10108">CVE-2017-10108 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10109/">CVE-2017-10109 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10109">CVE-2017-10109 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10110/">CVE-2017-10110 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10110">CVE-2017-10110 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10111/">CVE-2017-10111 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10111">CVE-2017-10111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10115/">CVE-2017-10115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10115">CVE-2017-10115 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10116/">CVE-2017-10116 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10116">CVE-2017-10116 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10125/">CVE-2017-10125 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10125">CVE-2017-10125 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10243/">CVE-2017-10243 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10243">CVE-2017-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578167" comment="java-1_7_0-ibm-1.7.0_sr10.10-65.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578168" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.10-65.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578169" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.10-65.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578170" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.10-65.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218746" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1070162" ref_url="https://bugzilla.suse.com/1070162" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10165" ref_url="https://www.suse.com/security/cve/CVE-2016-10165/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10293" ref_url="https://www.suse.com/security/cve/CVE-2017-10293/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003584.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

- Security update to version 7.0.10.15 (bsc#1070162):
  * CVE-2017-10346 CVE-2017-10285 CVE-2017-10388 CVE-2017-10356
    CVE-2017-10293 CVE-2016-9841  CVE-2016-10165 CVE-2017-10355
    CVE-2017-10357 CVE-2017-10348 CVE-2017-10349 CVE-2017-10347
    CVE-2017-10350 CVE-2017-10281 CVE-2017-10295 CVE-2017-10345
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-10"/>
	<updated date="2018-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10165/">CVE-2016-10165 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10165">CVE-2016-10165 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9841">CVE-2016-9841 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10281">CVE-2017-10281 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10285">CVE-2017-10285 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10293/">CVE-2017-10293 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10293">CVE-2017-10293 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10295">CVE-2017-10295 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10345">CVE-2017-10345 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10346">CVE-2017-10346 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10347">CVE-2017-10347 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10348">CVE-2017-10348 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10349">CVE-2017-10349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10350">CVE-2017-10350 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10355">CVE-2017-10355 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10356">CVE-2017-10356 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10357">CVE-2017-10357 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10388">CVE-2017-10388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578171" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578172" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578173" comment="java-1_7_0-ibm-devel-1.7.0_sr10.15-65.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578174" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578175" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578171" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578172" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578173" comment="java-1_7_0-ibm-devel-1.7.0_sr10.15-65.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578174" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578175" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218747" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1057460" ref_url="https://bugzilla.suse.com/1057460" source="BUGZILLA"/>
		<reference ref_id="1076390" ref_url="https://bugzilla.suse.com/1076390" source="BUGZILLA"/>
		<reference ref_id="1082810" ref_url="https://bugzilla.suse.com/1082810" source="BUGZILLA"/>
		<reference ref_id="929900" ref_url="https://bugzilla.suse.com/929900" source="BUGZILLA"/>
		<reference ref_id="966304" ref_url="https://bugzilla.suse.com/966304" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579/" source="CVE"/>
		<reference ref_id="CVE-2018-2582" ref_url="https://www.suse.com/security/cve/CVE-2018-2582/" source="CVE"/>
		<reference ref_id="CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588/" source="CVE"/>
		<reference ref_id="CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599/" source="CVE"/>
		<reference ref_id="CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602/" source="CVE"/>
		<reference ref_id="CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603/" source="CVE"/>
		<reference ref_id="CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618/" source="CVE"/>
		<reference ref_id="CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633/" source="CVE"/>
		<reference ref_id="CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634/" source="CVE"/>
		<reference ref_id="CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637/" source="CVE"/>
		<reference ref_id="CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641/" source="CVE"/>
		<reference ref_id="CVE-2018-2657" ref_url="https://www.suse.com/security/cve/CVE-2018-2657/" source="CVE"/>
		<reference ref_id="CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663/" source="CVE"/>
		<reference ref_id="CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677/" source="CVE"/>
		<reference ref_id="CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003797.html" source="SUSE-SU"/>
		<description>

  
This update for java-1_7_0-ibm provides the following fixes:

The version was updated to 7.0.10.20 [bsc#1082810]:

* Following security issues were fixed:

  - CVE-2018-2633 CVE-2018-2637 CVE-2018-2634 CVE-2018-2582
    CVE-2018-2641 CVE-2018-2618 CVE-2018-2657 CVE-2018-2603
    CVE-2018-2599 CVE-2018-2602 CVE-2018-2678 CVE-2018-2677
    CVE-2018-2663 CVE-2018-2588 CVE-2018-2579

* Defect fixes:

    - IJ04281 Class Libraries: Startup time increase after applying
      	      apar IV96905
    - IJ03822 Class Libraries: Update timezone information to tzdata2017c
    - IJ03605 Java Virtual Machine: Legacy security for com.ibm.jvm.dump,
      	      trace, log was not enabled by default
    - IJ03607 JIT Compiler: Result String contains a redundant dot when
      	      converted from BigDecimal with 0 on all platforms
    - IX90185 ORB: Upgrade ibmcfw.jar to version O1800.01
    - IJ04282 Security: Change in location and default of jurisdiction
      	      policy files
    - IJ03853 Security: IBMCAC provider does not support SHA224
    - IJ02679 Security: IBMPKCS11Impl – Bad sessions are being allocated
      	      internally
    - IJ02706 Security: IBMPKCS11Impl – Bad sessions are being allocated
      	      internally
    - IJ03552 Security: IBMPKCS11Impl - Config file problem with the slot
      	      specification attribute
    - IJ01901 Security: IBMPKCS11Impl – SecureRandom.setSeed() exception
    - IJ03801 Security: Issue with same DN certs, iKeyman GUI error with
      	      stash, JKS Chain issue and JVM argument parse issue with iKeyman
    - IJ02284 JIT Compiler: Division by zero in JIT compiler

    - Make it possible to run Java jnlp files from Firefox. (bsc#1057460)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-09"/>
	<updated date="2018-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1057460">SUSE bug 1057460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076390">SUSE bug 1076390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929900">SUSE bug 929900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966304">SUSE bug 966304</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2579">CVE-2018-2579 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2582/">CVE-2018-2582 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2582">CVE-2018-2582 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2588">CVE-2018-2588 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2599">CVE-2018-2599 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2602">CVE-2018-2602 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2603">CVE-2018-2603 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2618">CVE-2018-2618 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2633">CVE-2018-2633 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2634">CVE-2018-2634 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2637">CVE-2018-2637 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2641">CVE-2018-2641 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2657/">CVE-2018-2657 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2657">CVE-2018-2657 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2663">CVE-2018-2663 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2677">CVE-2018-2677 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2678">CVE-2018-2678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578176" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578177" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578178" comment="java-1_7_0-ibm-devel-1.7.0_sr10.20-65.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578179" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578180" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578176" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578177" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578178" comment="java-1_7_0-ibm-devel-1.7.0_sr10.20-65.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578179" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578180" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218748" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1085449" ref_url="https://bugzilla.suse.com/1085449" source="BUGZILLA"/>
		<reference ref_id="1093311" ref_url="https://bugzilla.suse.com/1093311" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1417" ref_url="https://www.suse.com/security/cve/CVE-2018-1417/" source="CVE"/>
		<reference ref_id="CVE-2018-2783" ref_url="https://www.suse.com/security/cve/CVE-2018-2783/" source="CVE"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

IBM Java was updated to 7.1.4.25 (bsc#1093311, bsc#1085449)

Security fixes:

- CVE-2018-2814 CVE-2018-2794 CVE-2018-2783 CVE-2018-2799
  CVE-2018-2798 CVE-2018-2797 CVE-2018-2796 CVE-2018-2795
  CVE-2018-2800 CVE-2018-2790 CVE-2018-1417
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-29"/>
	<updated date="2018-05-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085449">SUSE bug 1085449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1417/">CVE-2018-1417 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1417">CVE-2018-1417 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2783/">CVE-2018-2783 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2783">CVE-2018-2783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2790">CVE-2018-2790 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2794">CVE-2018-2794 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2795">CVE-2018-2795 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2796">CVE-2018-2796 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2797">CVE-2018-2797 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2798">CVE-2018-2798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2799">CVE-2018-2799 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2800">CVE-2018-2800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2814">CVE-2018-2814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578181" comment="java-1_7_0-ibm-1.7.0_sr10.25-65.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578182" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.25-65.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578183" comment="java-1_7_0-ibm-devel-1.7.0_sr10.25-65.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578184" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.25-65.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578185" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.25-65.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578181" comment="java-1_7_0-ibm-1.7.0_sr10.25-65.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578182" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.25-65.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578183" comment="java-1_7_0-ibm-devel-1.7.0_sr10.25-65.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578184" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.25-65.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578185" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.25-65.25.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218749" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1104668" ref_url="https://bugzilla.suse.com/1104668" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12539" ref_url="https://www.suse.com/security/cve/CVE-2018-12539/" source="CVE"/>
		<reference ref_id="CVE-2018-1517" ref_url="https://www.suse.com/security/cve/CVE-2018-1517/" source="CVE"/>
		<reference ref_id="CVE-2018-1656" ref_url="https://www.suse.com/security/cve/CVE-2018-1656/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004521.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

Security issues fixed:
  
- CVE-2018-1517: Fixed a flaw in the java.math component in IBM SDK, which may
  allow an attacker to inflict a denial-of-service attack with specially
  crafted String data.
- CVE-2018-1656: Protect against path traversal attacks when extracting
  compressed dump files.
- CVE-2018-2940: Fixed an easily exploitable vulnerability in the libraries
  subcomponent, which allowed unauthenticated attackers with network access
  via multiple protocols to compromise the Java SE, leading to
  unauthorized read access.
- CVE-2018-2952: Fixed an easily exploitable vulnerability in the concurrency
  subcomponent, which allowed unauthenticated attackers with network access
  via multiple protocols to compromise the Java SE, leading to denial of
  service.
- CVE-2018-2973: Fixed a difficult to exploit vulnerability in the JSSE
  subcomponent, which allowed unauthenticated attackers with network access
  via SSL/TLS to compromise the Java SE, leading to unauthorized creation,
  deletion or modification access to critical data.
- CVE-2018-12539: Fixed a vulnerability in which users other than the process
  owner may be able to use Java Attach API to connect to the IBM JVM on the
  same machine and use Attach API operations, including the ability to execute
  untrusted arbitrary code.

Other changes made:

- Various JIT/JVM crash fixes
- Version update to 7.1.4.30 (bsc#1104668)

You can find detailed information about this update [here](https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_August_2018).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-31"/>
	<updated date="2018-08-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104668">SUSE bug 1104668</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12539/">CVE-2018-12539 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12539">CVE-2018-12539 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1517/">CVE-2018-1517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1517">CVE-2018-1517 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1656/">CVE-2018-1656 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1656">CVE-2018-1656 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2940">CVE-2018-2940 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2952">CVE-2018-2952 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2973">CVE-2018-2973 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578186" comment="java-1_7_0-ibm-1.7.0_sr10.30-65.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578187" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.30-65.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578188" comment="java-1_7_0-ibm-devel-1.7.0_sr10.30-65.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578189" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.30-65.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578190" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.30-65.28.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578186" comment="java-1_7_0-ibm-1.7.0_sr10.30-65.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578187" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.30-65.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578188" comment="java-1_7_0-ibm-devel-1.7.0_sr10.30-65.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578189" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.30-65.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578190" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.30-65.28.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218750" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1116574" ref_url="https://bugzilla.suse.com/1116574" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004893.html" source="SUSE-SU"/>
		<description>


java-1_7_0-ibm is updated to Java 7.0 Service Refresh 10 Fix Pack 35 (bsc#1116574):

* Class Libraries

  - IJ10934 CVE-2018-13785
  - IJ10935 CVE-2018-3136
  - IJ10895 CVE-2018-3139
  - IJ10932 CVE-2018-3149
  - IJ10894 CVE-2018-3180
  - IJ10933 CVE-2018-3214
  - IJ09315 FLOATING POINT EXCEPTION FROM JAVA.TEXT.DECIMALFORMAT. FORMAT
  - IJ09088 INTRODUCING A NEW PROPERTY FOR TURKEY TIMEZONE FOR PRODUCTS NOT IDENTIFYING TRT
  - IJ10800 REMOVE EXPIRING ROOT CERTIFICATES IN IBM JDK’S CACERTS

* Java Virtual Machine

  - IJ10931 CVE-2018-3169

* JIT Compiler

  - IJ08205 CRASH WHILE COMPILING

* Security
  - IJ10492 'EC KEYSIZE &lt; 384' IS NOT HONORED USING THE 'JDK.TLS.DISABLEDALGORIT HMS' SECURITY PROPERTY
  - IJ10491 AES/GCM CIPHER – AAD NOT RESET TO UN-INIT STATE AFTER DOFINAL( ) AND INIT( )
  - IJ08442 HTTP PUBLIC KEY PINNING FINGERPRINT,PROBLEM WITH CONVERTING TO JKS KEYSTORE
  - IJ09107 IBMPKCS11IMPL CRYPTO PROVIDER – INTERMITTENT ERROR WITH SECP521R1 SIGNATURE ON Z/OS
  - IJ10136 IBMPKCS11IMPL – INTERMITTENT ERROR WITH SECP521R1 SIG ON Z/OS AND Z/LINUX
  - IJ08530 IBMPKCS11IMPL PROVIDER USES THE WRONG RSA CIPHER MECHANISM FOR THE RSA/ECB/PKCS1PADDING CIPHER
  - IJ08723 JAAS THROWS A ‘ARRAY INDEX OUT OF RANGE’ EXCEPTION
  - IJ08704 THE SECURITY PROPERTY ‘JDK.CERTPATH.DISABLEDAL GORITHMS’ IS MISTAKENLY BEING USED TO FILTER JAR SIGNING ALGORITHMS
  - PH01244 OUTPUT BUFFER TOO SHORT FOR GCM MODE ENCRYPTION USING IBMJCEHYBRID
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-27"/>
	<updated date="2018-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13785">CVE-2018-13785 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3136">CVE-2018-3136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3139">CVE-2018-3139 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3149">CVE-2018-3149 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3169">CVE-2018-3169 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3180">CVE-2018-3180 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3214">CVE-2018-3214 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578191" comment="java-1_7_0-ibm-1.7.0_sr10.35-65.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578192" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.35-65.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578193" comment="java-1_7_0-ibm-devel-1.7.0_sr10.35-65.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578194" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.35-65.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578195" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.35-65.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578191" comment="java-1_7_0-ibm-1.7.0_sr10.35-65.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578192" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.35-65.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578193" comment="java-1_7_0-ibm-devel-1.7.0_sr10.35-65.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578194" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.35-65.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578195" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.35-65.31.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218751" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<description>
This update for java-1_7_0-ibm to version 7.0.10.40 fixes the following issues:

Security issues fixed: 

- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).	

More information: https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_February_2019
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-12"/>
	<updated date="2019-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11212">CVE-2018-11212 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2422">CVE-2019-2422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578196" comment="java-1_7_0-ibm-1.7.0_sr10.40-65.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578197" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.40-65.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578198" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.40-65.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578199" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.40-65.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218752" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1132734" ref_url="https://bugzilla.suse.com/1132734" source="BUGZILLA"/>
		<reference ref_id="1134718" ref_url="https://bugzilla.suse.com/1134718" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10245" ref_url="https://www.suse.com/security/cve/CVE-2019-10245/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2697" ref_url="https://www.suse.com/security/cve/CVE-2019-2697/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

Update to Java 7.0 Service Refresh 10 Fix Pack 45.

Security issues fixed:

- CVE-2019-10245: Fixed Java bytecode verifier issue causing crashes (bsc#1134718).
- CVE-2019-2698: Fixed out of bounds access flaw in the 2D component (bsc#1132729).
- CVE-2019-2697: Fixed flaw inside the 2D component (bsc#1132734).
- CVE-2019-2602: Fixed flaw inside BigDecimal implementation (Component: Libraries) (bsc#1132728).
- CVE-2019-2684: Fixed flaw was found in the RMI registry implementation (bsc#1132732).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-23"/>
	<updated date="2019-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132734">SUSE bug 1132734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10245/">CVE-2019-10245 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10245">CVE-2019-10245 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2602">CVE-2019-2602 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2684">CVE-2019-2684 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2697/">CVE-2019-2697 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2697">CVE-2019-2697 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2698">CVE-2019-2698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578200" comment="java-1_7_0-ibm-1.7.0_sr10.45-65.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578201" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.45-65.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578202" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.45-65.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578203" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.45-65.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218753" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="1147021" ref_url="https://bugzilla.suse.com/1147021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11771" ref_url="https://www.suse.com/security/cve/CVE-2019-11771/" source="CVE"/>
		<reference ref_id="CVE-2019-11775" ref_url="https://www.suse.com/security/cve/CVE-2019-11775/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-4473" ref_url="https://www.suse.com/security/cve/CVE-2019-4473/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:
	  
Update to Java 7.0 Service Refresh 10 Fix Pack 50 (bsc#1147021).

Security issues fixed:

- CVE-2019-2762: Fixed issue inside Component Utilities (bsc#1141782).
- CVE-2019-2766: Fixed issue inside Component Networking (bsc#1141789).
- CVE-2019-2769: Fixed issue inside Component Utilities (bsc#1141783).
- CVE-2019-2816: Fixed issue inside Component Networking (bsc#1147021).
- CVE-2019-4473: Fixed insecure RPATH in multiple binaries on AIX (bsc#1147021).
- CVE-2019-7317: Fixed use-after-free in libpng, affecting client-libs/java.awt (bsc#1147021).
- CVE-2019-11771: Fixed insecure RPATH in OpenJ9 on AIX (bsc#1147021).
- CVE-2019-11775: Fixed failure to privatize a value pulled out of the loop by versioning (bsc#1147021).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-04"/>
	<updated date="2019-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11771/">CVE-2019-11771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11771">CVE-2019-11771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11775/">CVE-2019-11775 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11775">CVE-2019-11775 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2766">CVE-2019-2766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-4473/">CVE-2019-4473 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-4473">CVE-2019-4473 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578204" comment="java-1_7_0-ibm-1.7.0_sr10.50-65.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578205" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.50-65.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578206" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.50-65.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578207" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.50-65.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218754" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="1158442" ref_url="https://bugzilla.suse.com/1158442" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

- Update to 7.0 Service Refresh 10 Fix Pack 55 [bsc#1158442, bsc#1154212]
  * Security fixes:
    CVE-2019-2933 CVE-2019-2945 CVE-2019-2958 CVE-2019-2962
    CVE-2019-2964 CVE-2019-2978 CVE-2019-2983 CVE-2019-2988
    CVE-2019-2989 CVE-2019-2992 CVE-2019-2999 CVE-2019-2973
    CVE-2019-2981    
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-08"/>
	<updated date="2020-01-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2933">CVE-2019-2933 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2958">CVE-2019-2958 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2988">CVE-2019-2988 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578208" comment="java-1_7_0-ibm-1.7.0_sr10.55-65.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578209" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.55-65.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578210" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.55-65.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578211" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.55-65.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218755" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1162972" ref_url="https://bugzilla.suse.com/1162972" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:
Java was updated to 7.0 Service Refresh 10 Fix Pack 60 [bsc#1162972, bsc#1160968].

Security issues fixed:

- CVE-2020-2583: Fixed a serialization vulnerability in BeanContextSupport (bsc#1162972).
- CVE-2020-2593: Fixed an incorrect check in isBuiltinStreamHandler, causing URL normalization issues (bsc#1162972).
- CVE-2020-2604: Fixed a serialization issue in jdk.serialFilter (bsc#1162972).
- CVE-2020-2659: Fixed the incomplete enforcement of the maxDatagramSockets limit in DatagramChannelImpl (bsc#1162972).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-20"/>
	<updated date="2020-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578212" comment="java-1_7_0-ibm-1.7.0_sr10.60-65.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578213" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.60-65.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578214" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.60-65.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578215" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.60-65.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218756" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="1172277" ref_url="https://bugzilla.suse.com/1172277" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

java-1_7_1-ibm was updated to Java 7.1 Service Refresh 4 Fix Pack 65 (bsc#1172277 and bsc#1169511)

- CVE-2020-2654: Fixed an issue which could have resulted in unauthorized ability to cause a partial denial of service    
- CVE-2020-2756: Improved mapping of serial ENUMs 
- CVE-2020-2757: Less Blocking Array Queues 
- CVE-2020-2781: Improved TLS session handling 
- CVE-2020-2800: Improved Headings for HTTP Servers 
- CVE-2020-2803: Enhanced buffering of byte buffers 
- CVE-2020-2805: Enhanced typing of methods 
- CVE-2020-2830: Improved Scanner conversions 	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-09"/>
	<updated date="2020-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578216" comment="java-1_7_0-ibm-1.7.0_sr10.65-65.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578217" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.65-65.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578218" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.65-65.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578219" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.65-65.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218757" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1171352" ref_url="https://bugzilla.suse.com/1171352" source="BUGZILLA"/>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1175259" ref_url="https://bugzilla.suse.com/1175259" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17639" ref_url="https://www.suse.com/security/cve/CVE-2019-17639/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

- Update to Java 7.0 Service Refresh 10 Fix Pack 70 [bsc#1175259, bsc#1174157]
  CVE-2020-14577 CVE-2020-14578 CVE-2020-14579 CVE-2020-14621
  CVE-2020-14593 CVE-2020-14583 CVE-2019-17639
  * Class Libraries:
    - TRANSLATION MESSAGES UPDATE FOR JCL
    - UPDATE TIMEZONE INFORMATION TO TZDATA2020A
  * Security:
    - CERTIFICATEEXCEPTION OCCURS WHEN FILE.ENCODING PROPERTY SET TO
      NON DEFAULT VALUE

- The pack200 and unpack200 alternatives should be slaves of java [bsc#1171352]
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171352">SUSE bug 1171352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17639/">CVE-2019-17639 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17639">CVE-2019-17639 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578220" comment="java-1_7_0-ibm-1.7.0_sr10.70-65.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578221" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.70-65.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578222" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.70-65.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578223" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.70-65.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218758" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="1180063" ref_url="https://bugzilla.suse.com/1180063" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

- Update to Java 7.0 Service Refresh 10 Fix Pack 75 [bsc#1180063, bsc#1177943]
  CVE-2020-14792 CVE-2020-14797 CVE-2020-14782 CVE-2020-14781
  CVE-2020-14779 CVE-2020-14798 CVE-2020-14796 CVE-2020-14803
  * Class Libraries:
    - Z/OS specific C function send_file is changing the file pointer position
  * Security:
    - Add the new oracle signer certificate
    - Certificate parsing error
    - JVM memory growth can be caused by the IBMPKCS11IMPL crypto provider
    - Remove check for websphere signed jars
    - sessionid.hashcode generates too many collisions
    - The Java 8 IBM certpath provider does not honor the user
      specified system property for CLR connect timeout
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-22"/>
	<updated date="2020-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14782">CVE-2020-14782 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578224" comment="java-1_7_0-ibm-1.7.0_sr10.75-65.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578225" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578226" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578227" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218759" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="1182186" ref_url="https://bugzilla.suse.com/1182186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-27221" ref_url="https://www.suse.com/security/cve/CVE-2020-27221/" source="CVE"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

- Update to Java 7.0 Service Refresh 10 Fix Pack 80
  [bsc#1182186, bsc#1181239, CVE-2020-27221, CVE-2020-14803]
  * CVE-2020-27221: Potential for a stack-based buffer overflow
    when the virtual machine or JNI natives are converting from
    UTF-8 characters to platform encoding.
  * CVE-2020-14803: Unauthenticated attacker with network access
    via multiple protocols allows to compromise Java SE.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-23"/>
	<updated date="2021-02-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27221/">CVE-2020-27221 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27221">CVE-2020-27221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578228" comment="java-1_7_0-ibm-1.7.0_sr10.80-65.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578229" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.80-65.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578230" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.80-65.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578231" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.80-65.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218760" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194925" ref_url="https://bugzilla.suse.com/1194925" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194927" ref_url="https://bugzilla.suse.com/1194927" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194930" ref_url="https://bugzilla.suse.com/1194930" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1196500" ref_url="https://bugzilla.suse.com/1196500" source="BUGZILLA"/>
		<reference ref_id="1197126" ref_url="https://bugzilla.suse.com/1197126" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21271" ref_url="https://www.suse.com/security/cve/CVE-2022-21271/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

Update Java 7.0 to Service Refresh 11 Fix Pack 5 (bsc#1197126).

Including fixes for the following vulnerabilities: 

  CVE-2022-21366, CVE-2022-21365, CVE-2022-21360, CVE-2022-21349,
  CVE-2022-21341, CVE-2022-21340, CVE-2022-21305, CVE-2022-21277,
  CVE-2022-21299, CVE-2022-21296, CVE-2022-21282, CVE-2022-21294,
  CVE-2022-21293, CVE-2022-21291, CVE-2022-21283, CVE-2022-21248,
  CVE-2022-21271.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-23"/>
	<updated date="2022-03-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194925">SUSE bug 1194925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194927">SUSE bug 1194927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194930">SUSE bug 1194930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196500">SUSE bug 1196500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21271/">CVE-2022-21271 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21271">CVE-2022-21271 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21277">CVE-2022-21277 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21291">CVE-2022-21291 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21349">CVE-2022-21349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21366">CVE-2022-21366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009674103" comment="java-1_7_0-ibm-1.7.0_sr11.5-65.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674104" comment="java-1_7_0-ibm-alsa-1.7.0_sr11.5-65.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674105" comment="java-1_7_0-ibm-jdbc-1.7.0_sr11.5-65.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674106" comment="java-1_7_0-ibm-plugin-1.7.0_sr11.5-65.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218761" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1191912" ref_url="https://bugzilla.suse.com/1191912" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1198670" ref_url="https://bugzilla.suse.com/1198670" source="BUGZILLA"/>
		<reference ref_id="1198671" ref_url="https://bugzilla.suse.com/1198671" source="BUGZILLA"/>
		<reference ref_id="1198672" ref_url="https://bugzilla.suse.com/1198672" source="BUGZILLA"/>
		<reference ref_id="1198673" ref_url="https://bugzilla.suse.com/1198673" source="BUGZILLA"/>
		<reference ref_id="1198674" ref_url="https://bugzilla.suse.com/1198674" source="BUGZILLA"/>
		<reference ref_id="1198675" ref_url="https://bugzilla.suse.com/1198675" source="BUGZILLA"/>
		<reference ref_id="1201643" ref_url="https://bugzilla.suse.com/1201643" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21449" ref_url="https://www.suse.com/security/cve/CVE-2022-21449/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

Update to Java 7.0 Service Refresh 11 Fix Pack 10 (bsc#1201643), including fixes for:

- CVE-2022-21476 (bsc#1198671), CVE-2022-21449 (bsc#1198670),
  CVE-2022-21496 (bsc#1198673), CVE-2022-21434 (bsc#1198674),
  CVE-2022-21426 (bsc#1198672), CVE-2022-21443 (bsc#1198675),
  CVE-2021-35561 (bsc#1191912), CVE-2022-21299 (bsc#1194931).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-23"/>
	<updated date="2022-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191912">SUSE bug 1191912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198670">SUSE bug 1198670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198671">SUSE bug 1198671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198672">SUSE bug 1198672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198673">SUSE bug 1198673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198674">SUSE bug 1198674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198675">SUSE bug 1198675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201643">SUSE bug 1201643</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35561">CVE-2021-35561 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21426">CVE-2022-21426 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21434">CVE-2022-21434 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21443">CVE-2022-21443 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21449/">CVE-2022-21449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21449">CVE-2022-21449 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21476">CVE-2022-21476 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21496">CVE-2022-21496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992823" comment="java-1_7_0-ibm-1.7.0_sr11.10-65.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992824" comment="java-1_7_0-ibm-alsa-1.7.0_sr11.10-65.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992825" comment="java-1_7_0-ibm-jdbc-1.7.0_sr11.10-65.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992826" comment="java-1_7_0-ibm-plugin-1.7.0_sr11.10-65.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218762" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1201684" ref_url="https://bugzilla.suse.com/1201684" source="BUGZILLA"/>
		<reference ref_id="1201685" ref_url="https://bugzilla.suse.com/1201685" source="BUGZILLA"/>
		<reference ref_id="1201692" ref_url="https://bugzilla.suse.com/1201692" source="BUGZILLA"/>
		<reference ref_id="1201694" ref_url="https://bugzilla.suse.com/1201694" source="BUGZILLA"/>
		<reference ref_id="1202427" ref_url="https://bugzilla.suse.com/1202427" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541/" source="CVE"/>
		<reference ref_id="CVE-2022-21549" ref_url="https://www.suse.com/security/cve/CVE-2022-21549/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

- Updated to Java 7.0 Service Refresh 11 Fix Pack 15 (bsc#1202427):
  - CVE-2022-34169: Fixed an integer truncation issue in the Xalan
    Java XSLT library that occurred when processing malicious
    stylesheets (bsc#1201684).
  - CVE-2022-21549: Fixed an issue that could lead to computing
    negative random exponentials (bsc#1201685).
  - CVE-2022-21541: Fixed a potential bypass of sandbox restrictions
    in the Hotspot component (bsc#1201692).
  - CVE-2022-21540: Fixed a potential bypass of sandbox restrictions
    in the Hotspot component (bsc#1201694).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-19"/>
	<updated date="2022-08-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201684">SUSE bug 1201684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201685">SUSE bug 1201685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201692">SUSE bug 1201692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201694">SUSE bug 1201694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202427">SUSE bug 1202427</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21540">CVE-2022-21540 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21541">CVE-2022-21541 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21549/">CVE-2022-21549 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21549">CVE-2022-21549 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992827" comment="java-1_7_0-ibm-1.7.0_sr11.15-65.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992828" comment="java-1_7_0-ibm-alsa-1.7.0_sr11.15-65.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992829" comment="java-1_7_0-ibm-jdbc-1.7.0_sr11.15-65.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992830" comment="java-1_7_0-ibm-plugin-1.7.0_sr11.15-65.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218763" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204703" ref_url="https://bugzilla.suse.com/1204703" source="BUGZILLA"/>
		<reference ref_id="1205302" ref_url="https://bugzilla.suse.com/1205302" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3676" ref_url="https://www.suse.com/security/cve/CVE-2022-3676/" source="CVE"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

- IBM Security Update November 2022: (bsc#1205302, bsc#1204703)

- CVE-2022-3676: A security vulnerability was fixed in version 7.0.11.15, adding the reference here.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-22"/>
	<updated date="2022-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1204703">SUSE bug 1204703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205302">SUSE bug 1205302</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3676/">CVE-2022-3676 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3676">CVE-2022-3676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992831" comment="java-1_7_0-ibm-1.7.0_sr11.15-65.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992832" comment="java-1_7_0-ibm-alsa-1.7.0_sr11.15-65.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr11.15-65.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992834" comment="java-1_7_0-ibm-plugin-1.7.0_sr11.15-65.75.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218764" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1188566" ref_url="https://bugzilla.suse.com/1188566" source="BUGZILLA"/>
		<reference ref_id="1188568" ref_url="https://bugzilla.suse.com/1188568" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="1192052" ref_url="https://bugzilla.suse.com/1192052" source="BUGZILLA"/>
		<reference ref_id="1194198" ref_url="https://bugzilla.suse.com/1194198" source="BUGZILLA"/>
		<reference ref_id="1194232" ref_url="https://bugzilla.suse.com/1194232" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2388" ref_url="https://www.suse.com/security/cve/CVE-2021-2388/" source="CVE"/>
		<reference ref_id="CVE-2021-2432" ref_url="https://www.suse.com/security/cve/CVE-2021-2432/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-41035" ref_url="https://www.suse.com/security/cve/CVE-2021-41035/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 5 Fix Pack 0
- CVE-2021-41035: before version 0.29.0, the openj9 JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods. (bsc#1194198, bsc#1192052)
- CVE-2021-35586: Excessive memory allocation in BMPImageReader. (bsc#1191914)
- CVE-2021-35564: Certificates with end dates too far in the future can corrupt keystore. (bsc#1191913)
- CVE-2021-35559: Excessive memory allocation in RTFReader. (bsc#1191911)
- CVE-2021-35556: Excessive memory allocation in RTFParser. (bsc#1191910)
- CVE-2021-35565: Loop in HttpsServer triggered during TLS session close. (bsc#1191909) 
- CVE-2021-35588: Incomplete validation of inner class references in ClassFileParser. (bsc#1191905)
- CVE-2021-2341: Fixed a flaw inside the FtpClient. (bsc#1188564)
- CVE-2021-2369: JAR file handling problem containing multiple MANIFEST.MF files. (bsc#1188565)
- CVE-2021-2432: Fixed a vulnerability in the omponent JNDI. (bsc#1188568)
- CVE-2021-2163: Incomplete enforcement of JAR signing disabled algorithms. (bsc#1185055)
- CVE-2021-2388: Fixed a flaw inside the Hotspot component performed range check elimination. (bsc#1188566)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188566">SUSE bug 1188566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188568">SUSE bug 1188568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192052">SUSE bug 1192052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194198">SUSE bug 1194198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194232">SUSE bug 1194232</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2388/">CVE-2021-2388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2388">CVE-2021-2388 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-2432/">CVE-2021-2432 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2432">CVE-2021-2432 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41035/">CVE-2021-41035 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41035">CVE-2021-41035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662525" comment="java-1_7_0-ibm-1.7.0_sr11.0-65.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662526" comment="java-1_7_0-ibm-alsa-1.7.0_sr11.0-65.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662527" comment="java-1_7_0-ibm-jdbc-1.7.0_sr11.0-65.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662528" comment="java-1_7_0-ibm-plugin-1.7.0_sr11.0-65.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218765" version="1" class="patch">
	<metadata>
		<title>Security update for jpeg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1062937" ref_url="https://bugzilla.suse.com/1062937" source="BUGZILLA"/>
		<reference ref_id="1096209" ref_url="https://bugzilla.suse.com/1096209" source="BUGZILLA"/>
		<reference ref_id="1098155" ref_url="https://bugzilla.suse.com/1098155" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15232" ref_url="https://www.suse.com/security/cve/CVE-2017-15232/" source="CVE"/>
		<reference ref_id="CVE-2018-1152" ref_url="https://www.suse.com/security/cve/CVE-2018-1152/" source="CVE"/>
		<reference ref_id="CVE-2018-11813" ref_url="https://www.suse.com/security/cve/CVE-2018-11813/" source="CVE"/>
		<description>
This update for jpeg fixes the following issues:

* CVE-2017-15232: NULL pointer dereferences in jdpostct.c and jquant1.c could
  lead to denial of service (crash) when processing images [bsc#1062937]
* CVE-2018-11813: Fixed the end-of-file mishandling in read_pixel in rdtarga.c,
  which allowed remote attackers to cause a denial-of-service via crafted JPG
  files due to a large loop [bsc#1096209]
* CVE-2018-1152: Fixed a denial of service in start_input_bmp() rdbmp.c caused
  by a divide by zero when processing a crafted BMP image [bsc#1098155]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-27"/>
	<updated date="2018-06-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062937">SUSE bug 1062937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096209">SUSE bug 1096209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098155">SUSE bug 1098155</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15232/">CVE-2017-15232 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15232">CVE-2017-15232 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1152/">CVE-2018-1152 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1152">CVE-2018-1152 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11813/">CVE-2018-11813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11813">CVE-2018-11813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572067" comment="jpeg-6b-879.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572068" comment="libjpeg-6.2.0-879.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572069" comment="libjpeg-32bit-6.2.0-879.12.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218766" version="1" class="patch">
	<metadata>
		<title>Security update for jpeg (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1128712" ref_url="https://bugzilla.suse.com/1128712" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2018-14498" ref_url="https://www.suse.com/security/cve/CVE-2018-14498/" source="CVE"/>
		<description>
This update for jpeg fixes the following issue:

Security issue fixed: 

- CVE-2018-14498: Fixed a heap-based buffer over read in get_8bit_row function
  which could allow to an attacker to cause denial of service (bsc#1128712).
- CVE-2018-11212: Fixed divide by zero in alloc_sarray function in jmemmgr.c (bsc#1122299).
- CVE-2018-14498: Fixed denial of service in get_8bit_row in rdbmp.c (bsc#1128712).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128712">SUSE bug 1128712</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11212">CVE-2018-11212 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14498/">CVE-2018-14498 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14498">CVE-2018-14498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572070" comment="jpeg-6b-879.12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572071" comment="libjpeg-6.2.0-879.12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572072" comment="libjpeg-32bit-6.2.0-879.12.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218767" version="1" class="patch">
	<metadata>
		<title>Security update for jpeg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172491" ref_url="https://bugzilla.suse.com/1172491" source="BUGZILLA"/>
		<reference ref_id="1172995" ref_url="https://bugzilla.suse.com/1172995" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13790" ref_url="https://www.suse.com/security/cve/CVE-2020-13790/" source="CVE"/>
		<reference ref_id="CVE-2020-14152" ref_url="https://www.suse.com/security/cve/CVE-2020-14152/" source="CVE"/>
		<description>
This update for jpeg fixes the following issues:

- CVE-2020-14152: Fixed an improper implementation which vould have potentially exhausted the memory (bsc#1172995).
- CVE-2020-13790: Fixed a heap-based buffer over-read via a malformed PPM input file (bsc#1172491).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-25"/>
	<updated date="2020-06-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172491">SUSE bug 1172491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172995">SUSE bug 1172995</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13790/">CVE-2020-13790 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13790">CVE-2020-13790 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14152/">CVE-2020-14152 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14152">CVE-2020-14152 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572073" comment="jpeg-6b-879.12.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572074" comment="libjpeg-6.2.0-879.12.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572075" comment="libjpeg-32bit-6.2.0-879.12.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218768" version="1" class="patch">
	<metadata>
		<title>Security update for kdebase4-workspace</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="829857" ref_url="https://bugzilla.suse.com/829857" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4132" ref_url="https://www.suse.com/security/cve/CVE-2013-4132/" source="CVE"/>
		<reference ref_id="CVE-2013-4133" ref_url="https://www.suse.com/security/cve/CVE-2013-4133/" source="CVE"/>
		<description>

This kdebase4-workspace update fixes two security issues:

    * NULL pointer dereference in KDM and KCheckPass. (CVE-2013-4132)
    * Memory leak that could lead to a denial of service. (CVE-2013-4133)

Security Issues references:

    * CVE-2013-4132
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4132&gt;
    * CVE-2013-4133
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4133&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-30"/>
	<updated date="2014-06-30"/>
	<bugzilla href="https://bugzilla.suse.com/829857">SUSE bug 829857</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4132/">CVE-2013-4132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4132">CVE-2013-4132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4133/">CVE-2013-4133 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4133">CVE-2013-4133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578232" comment="kde4-kgreeter-plugins-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566653" comment="kdebase4-wallpapers-4.3.5-0.11.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578233" comment="kdebase4-workspace-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578234" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578235" comment="kdm-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578236" comment="kwin-4.3.5-0.12.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578232" comment="kde4-kgreeter-plugins-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566653" comment="kdebase4-wallpapers-4.3.5-0.11.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578233" comment="kdebase4-workspace-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578234" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578235" comment="kdm-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578236" comment="kwin-4.3.5-0.12.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578232" comment="kde4-kgreeter-plugins-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566653" comment="kdebase4-wallpapers-4.3.5-0.11.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578233" comment="kdebase4-workspace-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578234" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578235" comment="kdm-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578236" comment="kwin-4.3.5-0.12.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218769" version="1" class="patch">
	<metadata>
		<title>Security update for kdebase4-runtime</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="857200" ref_url="https://bugzilla.suse.com/857200" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7252" ref_url="https://www.suse.com/security/cve/CVE-2013-7252/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001292.html" source="SUSE-SU"/>
		<description>

kdebase4-runtime has been updated to fix one security issue:

    * CVE-2013-7252: Added gpg based encryption support to kwallet
      (bnc#857200).

Security Issues:

    * CVE-2013-7252
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7252&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-05"/>
	<updated date="2015-03-05"/>
	<bugzilla href="https://bugzilla.suse.com/857200">SUSE bug 857200</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7252/">CVE-2013-7252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7252">CVE-2013-7252 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566658" comment="kde4-l10n-ar-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572086" comment="kde4-l10n-bg-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572087" comment="kde4-l10n-ca-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566659" comment="kde4-l10n-cs-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572088" comment="kde4-l10n-csb-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566660" comment="kde4-l10n-da-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566663" comment="kde4-l10n-de-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572089" comment="kde4-l10n-el-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566664" comment="kde4-l10n-en_GB-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566665" comment="kde4-l10n-es-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572090" comment="kde4-l10n-et-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572091" comment="kde4-l10n-eu-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572092" comment="kde4-l10n-fi-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566668" comment="kde4-l10n-fr-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572093" comment="kde4-l10n-ga-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572094" comment="kde4-l10n-gl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572095" comment="kde4-l10n-hi-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566671" comment="kde4-l10n-hu-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572096" comment="kde4-l10n-is-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566672" comment="kde4-l10n-it-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566675" comment="kde4-l10n-ja-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572097" comment="kde4-l10n-kk-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572098" comment="kde4-l10n-km-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566676" comment="kde4-l10n-ko-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572099" comment="kde4-l10n-ku-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572100" comment="kde4-l10n-lt-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572101" comment="kde4-l10n-lv-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572102" comment="kde4-l10n-mk-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572103" comment="kde4-l10n-ml-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566677" comment="kde4-l10n-nb-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572104" comment="kde4-l10n-nds-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566678" comment="kde4-l10n-nl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572105" comment="kde4-l10n-nn-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572106" comment="kde4-l10n-pa-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566681" comment="kde4-l10n-pl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566684" comment="kde4-l10n-pt-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566685" comment="kde4-l10n-pt_BR-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572107" comment="kde4-l10n-ro-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566688" comment="kde4-l10n-ru-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572108" comment="kde4-l10n-sl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566691" comment="kde4-l10n-sv-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572109" comment="kde4-l10n-th-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572110" comment="kde4-l10n-tr-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572111" comment="kde4-l10n-uk-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572112" comment="kde4-l10n-wa-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566694" comment="kde4-l10n-zh_CN-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566695" comment="kde4-l10n-zh_TW-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578237" comment="kdebase4-runtime-4.3.5-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566658" comment="kde4-l10n-ar-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572086" comment="kde4-l10n-bg-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572087" comment="kde4-l10n-ca-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566659" comment="kde4-l10n-cs-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572088" comment="kde4-l10n-csb-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566660" comment="kde4-l10n-da-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566663" comment="kde4-l10n-de-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572089" comment="kde4-l10n-el-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566664" comment="kde4-l10n-en_GB-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566665" comment="kde4-l10n-es-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572090" comment="kde4-l10n-et-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572091" comment="kde4-l10n-eu-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572092" comment="kde4-l10n-fi-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566668" comment="kde4-l10n-fr-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572093" comment="kde4-l10n-ga-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572094" comment="kde4-l10n-gl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572095" comment="kde4-l10n-hi-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566671" comment="kde4-l10n-hu-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572096" comment="kde4-l10n-is-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566672" comment="kde4-l10n-it-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566675" comment="kde4-l10n-ja-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572097" comment="kde4-l10n-kk-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572098" comment="kde4-l10n-km-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566676" comment="kde4-l10n-ko-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572099" comment="kde4-l10n-ku-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572100" comment="kde4-l10n-lt-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572101" comment="kde4-l10n-lv-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572102" comment="kde4-l10n-mk-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572103" comment="kde4-l10n-ml-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566677" comment="kde4-l10n-nb-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572104" comment="kde4-l10n-nds-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566678" comment="kde4-l10n-nl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572105" comment="kde4-l10n-nn-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572106" comment="kde4-l10n-pa-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566681" comment="kde4-l10n-pl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566684" comment="kde4-l10n-pt-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566685" comment="kde4-l10n-pt_BR-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572107" comment="kde4-l10n-ro-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566688" comment="kde4-l10n-ru-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572108" comment="kde4-l10n-sl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566691" comment="kde4-l10n-sv-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572109" comment="kde4-l10n-th-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572110" comment="kde4-l10n-tr-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572111" comment="kde4-l10n-uk-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572112" comment="kde4-l10n-wa-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566694" comment="kde4-l10n-zh_CN-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566695" comment="kde4-l10n-zh_TW-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578237" comment="kdebase4-runtime-4.3.5-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566658" comment="kde4-l10n-ar-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572086" comment="kde4-l10n-bg-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572087" comment="kde4-l10n-ca-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566659" comment="kde4-l10n-cs-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572088" comment="kde4-l10n-csb-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566660" comment="kde4-l10n-da-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566663" comment="kde4-l10n-de-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572089" comment="kde4-l10n-el-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566664" comment="kde4-l10n-en_GB-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566665" comment="kde4-l10n-es-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572090" comment="kde4-l10n-et-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572091" comment="kde4-l10n-eu-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572092" comment="kde4-l10n-fi-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566668" comment="kde4-l10n-fr-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572093" comment="kde4-l10n-ga-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572094" comment="kde4-l10n-gl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572095" comment="kde4-l10n-hi-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566671" comment="kde4-l10n-hu-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572096" comment="kde4-l10n-is-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566672" comment="kde4-l10n-it-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566675" comment="kde4-l10n-ja-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572097" comment="kde4-l10n-kk-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572098" comment="kde4-l10n-km-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566676" comment="kde4-l10n-ko-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572099" comment="kde4-l10n-ku-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572100" comment="kde4-l10n-lt-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572101" comment="kde4-l10n-lv-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572102" comment="kde4-l10n-mk-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572103" comment="kde4-l10n-ml-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566677" comment="kde4-l10n-nb-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572104" comment="kde4-l10n-nds-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566678" comment="kde4-l10n-nl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572105" comment="kde4-l10n-nn-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572106" comment="kde4-l10n-pa-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566681" comment="kde4-l10n-pl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566684" comment="kde4-l10n-pt-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566685" comment="kde4-l10n-pt_BR-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572107" comment="kde4-l10n-ro-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566688" comment="kde4-l10n-ru-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572108" comment="kde4-l10n-sl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566691" comment="kde4-l10n-sv-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572109" comment="kde4-l10n-th-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572110" comment="kde4-l10n-tr-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572111" comment="kde4-l10n-uk-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572112" comment="kde4-l10n-wa-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566694" comment="kde4-l10n-zh_CN-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566695" comment="kde4-l10n-zh_TW-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578237" comment="kdebase4-runtime-4.3.5-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218770" version="1" class="patch">
	<metadata>
		<title>Security update for kdebase4-workspace (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="904625" ref_url="https://bugzilla.suse.com/904625" source="BUGZILLA"/>
		<reference ref_id="929718" ref_url="https://bugzilla.suse.com/929718" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8651" ref_url="https://www.suse.com/security/cve/CVE-2014-8651/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001839.html" source="SUSE-SU"/>
		<description>

This update for kdebase4-workspace fixes the following issues:

- CVE-2014-8651: Privilege escalation via KDE Clock KCM helper when non-default polkit settings are used (bsc#904625)

The following non-security bugs were fixed:

- bsc#929718: Make kdm recognize an IPv6 localhost address as localhost

		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-01"/>
	<updated date="2016-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/904625">SUSE bug 904625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929718">SUSE bug 929718</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8651/">CVE-2014-8651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8651">CVE-2014-8651 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578238" comment="kde4-kgreeter-plugins-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566699" comment="kdebase4-wallpapers-4.3.5-0.11.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578239" comment="kdebase4-workspace-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578240" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578241" comment="kdm-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578242" comment="kwin-4.3.5-0.12.20.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578238" comment="kde4-kgreeter-plugins-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566699" comment="kdebase4-wallpapers-4.3.5-0.11.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578239" comment="kdebase4-workspace-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578240" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578241" comment="kdm-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578242" comment="kwin-4.3.5-0.12.20.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578238" comment="kde4-kgreeter-plugins-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566699" comment="kdebase4-wallpapers-4.3.5-0.11.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578239" comment="kdebase4-workspace-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578240" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578241" comment="kdm-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578242" comment="kwin-4.3.5-0.12.20.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218771" version="1" class="patch">
	<metadata>
		<title>Security update for kdelibs3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="958347" ref_url="https://bugzilla.suse.com/958347" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7543" ref_url="https://www.suse.com/security/cve/CVE-2015-7543/" source="CVE"/>
		<description>
This update for kdelibs3 fixes the following issues:

- CVE-2015-7543: Insecure creation of temporary directories allowed local users
  to hijack the IPC by pre-creating the temporary directory (bsc#958347).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-26"/>
	<updated date="2018-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958347">SUSE bug 958347</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7543/">CVE-2015-7543 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7543">CVE-2015-7543 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572119" comment="kdelibs3-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564597" comment="kdelibs3-32bit-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572120" comment="kdelibs3-default-style-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564601" comment="kdelibs3-default-style-32bit-3.5.10-23.30.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218772" version="1" class="patch">
	<metadata>
		<title>Security update for kdelibs4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="787520" ref_url="https://bugzilla.suse.com/787520" source="BUGZILLA"/>
		<reference ref_id="865241" ref_url="https://bugzilla.suse.com/865241" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4512" ref_url="https://www.suse.com/security/cve/CVE-2012-4512/" source="CVE"/>
		<reference ref_id="CVE-2012-4513" ref_url="https://www.suse.com/security/cve/CVE-2012-4513/" source="CVE"/>
		<reference ref_id="CVE-2012-4515" ref_url="https://www.suse.com/security/cve/CVE-2012-4515/" source="CVE"/>
		<description>

This update of the kdelibs4 KSSL interface makes it select a set of default 
ciphers that is recommended for current usage. This update is needed for 
Konqueror to restrict its cipher set when using https.

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-02"/>
	<updated date="2014-09-02"/>
	<bugzilla href="https://bugzilla.suse.com/787520">SUSE bug 787520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865241">SUSE bug 865241</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4512/">CVE-2012-4512 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-4512">CVE-2012-4512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4513/">CVE-2012-4513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4513">CVE-2012-4513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4515/">CVE-2012-4515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4515">CVE-2012-4515 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578243" comment="kdelibs4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578244" comment="kdelibs4-core-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563392" comment="kdelibs4-doc-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578245" comment="libkde4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578246" comment="libkde4-32bit-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578247" comment="libkde4-x86-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578248" comment="libkdecore4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578249" comment="libkdecore4-32bit-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578250" comment="libkdecore4-x86-4.3.5-0.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578243" comment="kdelibs4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578244" comment="kdelibs4-core-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563392" comment="kdelibs4-doc-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578245" comment="libkde4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578246" comment="libkde4-32bit-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578247" comment="libkde4-x86-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578248" comment="libkdecore4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578249" comment="libkdecore4-32bit-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578250" comment="libkdecore4-x86-4.3.5-0.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578243" comment="kdelibs4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578244" comment="kdelibs4-core-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563392" comment="kdelibs4-doc-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578245" comment="libkde4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578246" comment="libkde4-32bit-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578247" comment="libkde4-x86-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578248" comment="libkdecore4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578249" comment="libkdecore4-32bit-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578250" comment="libkdecore4-x86-4.3.5-0.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218773" version="1" class="patch">
	<metadata>
		<title>Security update for kdirstat</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="868682" ref_url="https://bugzilla.suse.com/868682" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2527" ref_url="https://www.suse.com/security/cve/CVE-2014-2527/" source="CVE"/>
		<reference ref_id="CVE-2014-2528" ref_url="https://www.suse.com/security/cve/CVE-2014-2528/" source="CVE"/>
		<description>

The following security issue has been fixed:

    * #868682: CVE-2014-2527 CVE-2014-2528: kdirstat: command injection in
      kcleanup

Security Issues:

    * CVE-2014-2527
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2527&gt;
    * CVE-2014-2528
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2528&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-06"/>
	<updated date="2014-07-06"/>
	<bugzilla href="https://bugzilla.suse.com/868682">SUSE bug 868682</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2527/">CVE-2014-2527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2527">CVE-2014-2527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2528/">CVE-2014-2528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2528">CVE-2014-2528 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578251" comment="kdirstat-2.4.4-255.28.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578251" comment="kdirstat-2.4.4-255.28.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578251" comment="kdirstat-2.4.4-255.28.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218774" version="1" class="patch">
	<metadata>
		<title>Security update for Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="599263" ref_url="https://bugzilla.suse.com/599263" source="BUGZILLA"/>
		<reference ref_id="708296" ref_url="https://bugzilla.suse.com/708296" source="BUGZILLA"/>
		<reference ref_id="733022" ref_url="https://bugzilla.suse.com/733022" source="BUGZILLA"/>
		<reference ref_id="745640" ref_url="https://bugzilla.suse.com/745640" source="BUGZILLA"/>
		<reference ref_id="755743" ref_url="https://bugzilla.suse.com/755743" source="BUGZILLA"/>
		<reference ref_id="760407" ref_url="https://bugzilla.suse.com/760407" source="BUGZILLA"/>
		<reference ref_id="763463" ref_url="https://bugzilla.suse.com/763463" source="BUGZILLA"/>
		<reference ref_id="763968" ref_url="https://bugzilla.suse.com/763968" source="BUGZILLA"/>
		<reference ref_id="765523" ref_url="https://bugzilla.suse.com/765523" source="BUGZILLA"/>
		<reference ref_id="767610" ref_url="https://bugzilla.suse.com/767610" source="BUGZILLA"/>
		<reference ref_id="769035" ref_url="https://bugzilla.suse.com/769035" source="BUGZILLA"/>
		<reference ref_id="769644" ref_url="https://bugzilla.suse.com/769644" source="BUGZILLA"/>
		<reference ref_id="770541" ref_url="https://bugzilla.suse.com/770541" source="BUGZILLA"/>
		<reference ref_id="771619" ref_url="https://bugzilla.suse.com/771619" source="BUGZILLA"/>
		<reference ref_id="773006" ref_url="https://bugzilla.suse.com/773006" source="BUGZILLA"/>
		<reference ref_id="773255" ref_url="https://bugzilla.suse.com/773255" source="BUGZILLA"/>
		<reference ref_id="773837" ref_url="https://bugzilla.suse.com/773837" source="BUGZILLA"/>
		<reference ref_id="774818" ref_url="https://bugzilla.suse.com/774818" source="BUGZILLA"/>
		<reference ref_id="779488" ref_url="https://bugzilla.suse.com/779488" source="BUGZILLA"/>
		<reference ref_id="783475" ref_url="https://bugzilla.suse.com/783475" source="BUGZILLA"/>
		<reference ref_id="785901" ref_url="https://bugzilla.suse.com/785901" source="BUGZILLA"/>
		<reference ref_id="786450" ref_url="https://bugzilla.suse.com/786450" source="BUGZILLA"/>
		<reference ref_id="787843" ref_url="https://bugzilla.suse.com/787843" source="BUGZILLA"/>
		<reference ref_id="789010" ref_url="https://bugzilla.suse.com/789010" source="BUGZILLA"/>
		<reference ref_id="789359" ref_url="https://bugzilla.suse.com/789359" source="BUGZILLA"/>
		<reference ref_id="792271" ref_url="https://bugzilla.suse.com/792271" source="BUGZILLA"/>
		<reference ref_id="793727" ref_url="https://bugzilla.suse.com/793727" source="BUGZILLA"/>
		<reference ref_id="794824" ref_url="https://bugzilla.suse.com/794824" source="BUGZILLA"/>
		<reference ref_id="797090" ref_url="https://bugzilla.suse.com/797090" source="BUGZILLA"/>
		<reference ref_id="797526" ref_url="https://bugzilla.suse.com/797526" source="BUGZILLA"/>
		<reference ref_id="797727" ref_url="https://bugzilla.suse.com/797727" source="BUGZILLA"/>
		<reference ref_id="797909" ref_url="https://bugzilla.suse.com/797909" source="BUGZILLA"/>
		<reference ref_id="798050" ref_url="https://bugzilla.suse.com/798050" source="BUGZILLA"/>
		<reference ref_id="800255" ref_url="https://bugzilla.suse.com/800255" source="BUGZILLA"/>
		<reference ref_id="800875" ref_url="https://bugzilla.suse.com/800875" source="BUGZILLA"/>
		<reference ref_id="801341" ref_url="https://bugzilla.suse.com/801341" source="BUGZILLA"/>
		<reference ref_id="801427" ref_url="https://bugzilla.suse.com/801427" source="BUGZILLA"/>
		<reference ref_id="803320" ref_url="https://bugzilla.suse.com/803320" source="BUGZILLA"/>
		<reference ref_id="804482" ref_url="https://bugzilla.suse.com/804482" source="BUGZILLA"/>
		<reference ref_id="804609" ref_url="https://bugzilla.suse.com/804609" source="BUGZILLA"/>
		<reference ref_id="804950" ref_url="https://bugzilla.suse.com/804950" source="BUGZILLA"/>
		<reference ref_id="805114" ref_url="https://bugzilla.suse.com/805114" source="BUGZILLA"/>
		<reference ref_id="805371" ref_url="https://bugzilla.suse.com/805371" source="BUGZILLA"/>
		<reference ref_id="805740" ref_url="https://bugzilla.suse.com/805740" source="BUGZILLA"/>
		<reference ref_id="805804" ref_url="https://bugzilla.suse.com/805804" source="BUGZILLA"/>
		<reference ref_id="806396" ref_url="https://bugzilla.suse.com/806396" source="BUGZILLA"/>
		<reference ref_id="806976" ref_url="https://bugzilla.suse.com/806976" source="BUGZILLA"/>
		<reference ref_id="806988" ref_url="https://bugzilla.suse.com/806988" source="BUGZILLA"/>
		<reference ref_id="806990" ref_url="https://bugzilla.suse.com/806990" source="BUGZILLA"/>
		<reference ref_id="807434" ref_url="https://bugzilla.suse.com/807434" source="BUGZILLA"/>
		<reference ref_id="807471" ref_url="https://bugzilla.suse.com/807471" source="BUGZILLA"/>
		<reference ref_id="807502" ref_url="https://bugzilla.suse.com/807502" source="BUGZILLA"/>
		<reference ref_id="808015" ref_url="https://bugzilla.suse.com/808015" source="BUGZILLA"/>
		<reference ref_id="808079" ref_url="https://bugzilla.suse.com/808079" source="BUGZILLA"/>
		<reference ref_id="808136" ref_url="https://bugzilla.suse.com/808136" source="BUGZILLA"/>
		<reference ref_id="808837" ref_url="https://bugzilla.suse.com/808837" source="BUGZILLA"/>
		<reference ref_id="808855" ref_url="https://bugzilla.suse.com/808855" source="BUGZILLA"/>
		<reference ref_id="808940" ref_url="https://bugzilla.suse.com/808940" source="BUGZILLA"/>
		<reference ref_id="809122" ref_url="https://bugzilla.suse.com/809122" source="BUGZILLA"/>
		<reference ref_id="809130" ref_url="https://bugzilla.suse.com/809130" source="BUGZILLA"/>
		<reference ref_id="809463" ref_url="https://bugzilla.suse.com/809463" source="BUGZILLA"/>
		<reference ref_id="809895" ref_url="https://bugzilla.suse.com/809895" source="BUGZILLA"/>
		<reference ref_id="809975" ref_url="https://bugzilla.suse.com/809975" source="BUGZILLA"/>
		<reference ref_id="810323" ref_url="https://bugzilla.suse.com/810323" source="BUGZILLA"/>
		<reference ref_id="810722" ref_url="https://bugzilla.suse.com/810722" source="BUGZILLA"/>
		<reference ref_id="812274" ref_url="https://bugzilla.suse.com/812274" source="BUGZILLA"/>
		<reference ref_id="812281" ref_url="https://bugzilla.suse.com/812281" source="BUGZILLA"/>
		<reference ref_id="812332" ref_url="https://bugzilla.suse.com/812332" source="BUGZILLA"/>
		<reference ref_id="812526" ref_url="https://bugzilla.suse.com/812526" source="BUGZILLA"/>
		<reference ref_id="812974" ref_url="https://bugzilla.suse.com/812974" source="BUGZILLA"/>
		<reference ref_id="813245" ref_url="https://bugzilla.suse.com/813245" source="BUGZILLA"/>
		<reference ref_id="813604" ref_url="https://bugzilla.suse.com/813604" source="BUGZILLA"/>
		<reference ref_id="813733" ref_url="https://bugzilla.suse.com/813733" source="BUGZILLA"/>
		<reference ref_id="813922" ref_url="https://bugzilla.suse.com/813922" source="BUGZILLA"/>
		<reference ref_id="814336" ref_url="https://bugzilla.suse.com/814336" source="BUGZILLA"/>
		<reference ref_id="815256" ref_url="https://bugzilla.suse.com/815256" source="BUGZILLA"/>
		<reference ref_id="815320" ref_url="https://bugzilla.suse.com/815320" source="BUGZILLA"/>
		<reference ref_id="815356" ref_url="https://bugzilla.suse.com/815356" source="BUGZILLA"/>
		<reference ref_id="816043" ref_url="https://bugzilla.suse.com/816043" source="BUGZILLA"/>
		<reference ref_id="816099" ref_url="https://bugzilla.suse.com/816099" source="BUGZILLA"/>
		<reference ref_id="816451" ref_url="https://bugzilla.suse.com/816451" source="BUGZILLA"/>
		<reference ref_id="816708" ref_url="https://bugzilla.suse.com/816708" source="BUGZILLA"/>
		<reference ref_id="817035" ref_url="https://bugzilla.suse.com/817035" source="BUGZILLA"/>
		<reference ref_id="817377" ref_url="https://bugzilla.suse.com/817377" source="BUGZILLA"/>
		<reference ref_id="818047" ref_url="https://bugzilla.suse.com/818047" source="BUGZILLA"/>
		<reference ref_id="818064" ref_url="https://bugzilla.suse.com/818064" source="BUGZILLA"/>
		<reference ref_id="818371" ref_url="https://bugzilla.suse.com/818371" source="BUGZILLA"/>
		<reference ref_id="818465" ref_url="https://bugzilla.suse.com/818465" source="BUGZILLA"/>
		<reference ref_id="818545" ref_url="https://bugzilla.suse.com/818545" source="BUGZILLA"/>
		<reference ref_id="819018" ref_url="https://bugzilla.suse.com/819018" source="BUGZILLA"/>
		<reference ref_id="819195" ref_url="https://bugzilla.suse.com/819195" source="BUGZILLA"/>
		<reference ref_id="819363" ref_url="https://bugzilla.suse.com/819363" source="BUGZILLA"/>
		<reference ref_id="819523" ref_url="https://bugzilla.suse.com/819523" source="BUGZILLA"/>
		<reference ref_id="819610" ref_url="https://bugzilla.suse.com/819610" source="BUGZILLA"/>
		<reference ref_id="819655" ref_url="https://bugzilla.suse.com/819655" source="BUGZILLA"/>
		<reference ref_id="819979" ref_url="https://bugzilla.suse.com/819979" source="BUGZILLA"/>
		<reference ref_id="820102" ref_url="https://bugzilla.suse.com/820102" source="BUGZILLA"/>
		<reference ref_id="820172" ref_url="https://bugzilla.suse.com/820172" source="BUGZILLA"/>
		<reference ref_id="820338" ref_url="https://bugzilla.suse.com/820338" source="BUGZILLA"/>
		<reference ref_id="820434" ref_url="https://bugzilla.suse.com/820434" source="BUGZILLA"/>
		<reference ref_id="820848" ref_url="https://bugzilla.suse.com/820848" source="BUGZILLA"/>
		<reference ref_id="821052" ref_url="https://bugzilla.suse.com/821052" source="BUGZILLA"/>
		<reference ref_id="821070" ref_url="https://bugzilla.suse.com/821070" source="BUGZILLA"/>
		<reference ref_id="821235" ref_url="https://bugzilla.suse.com/821235" source="BUGZILLA"/>
		<reference ref_id="821259" ref_url="https://bugzilla.suse.com/821259" source="BUGZILLA"/>
		<reference ref_id="821465" ref_url="https://bugzilla.suse.com/821465" source="BUGZILLA"/>
		<reference ref_id="821619" ref_url="https://bugzilla.suse.com/821619" source="BUGZILLA"/>
		<reference ref_id="821799" ref_url="https://bugzilla.suse.com/821799" source="BUGZILLA"/>
		<reference ref_id="821859" ref_url="https://bugzilla.suse.com/821859" source="BUGZILLA"/>
		<reference ref_id="821930" ref_url="https://bugzilla.suse.com/821930" source="BUGZILLA"/>
		<reference ref_id="821948" ref_url="https://bugzilla.suse.com/821948" source="BUGZILLA"/>
		<reference ref_id="821980" ref_url="https://bugzilla.suse.com/821980" source="BUGZILLA"/>
		<reference ref_id="822052" ref_url="https://bugzilla.suse.com/822052" source="BUGZILLA"/>
		<reference ref_id="822066" ref_url="https://bugzilla.suse.com/822066" source="BUGZILLA"/>
		<reference ref_id="822077" ref_url="https://bugzilla.suse.com/822077" source="BUGZILLA"/>
		<reference ref_id="822080" ref_url="https://bugzilla.suse.com/822080" source="BUGZILLA"/>
		<reference ref_id="822164" ref_url="https://bugzilla.suse.com/822164" source="BUGZILLA"/>
		<reference ref_id="822225" ref_url="https://bugzilla.suse.com/822225" source="BUGZILLA"/>
		<reference ref_id="822340" ref_url="https://bugzilla.suse.com/822340" source="BUGZILLA"/>
		<reference ref_id="822431" ref_url="https://bugzilla.suse.com/822431" source="BUGZILLA"/>
		<reference ref_id="822433" ref_url="https://bugzilla.suse.com/822433" source="BUGZILLA"/>
		<reference ref_id="822575" ref_url="https://bugzilla.suse.com/822575" source="BUGZILLA"/>
		<reference ref_id="822579" ref_url="https://bugzilla.suse.com/822579" source="BUGZILLA"/>
		<reference ref_id="822722" ref_url="https://bugzilla.suse.com/822722" source="BUGZILLA"/>
		<reference ref_id="822825" ref_url="https://bugzilla.suse.com/822825" source="BUGZILLA"/>
		<reference ref_id="822878" ref_url="https://bugzilla.suse.com/822878" source="BUGZILLA"/>
		<reference ref_id="823082" ref_url="https://bugzilla.suse.com/823082" source="BUGZILLA"/>
		<reference ref_id="823223" ref_url="https://bugzilla.suse.com/823223" source="BUGZILLA"/>
		<reference ref_id="823342" ref_url="https://bugzilla.suse.com/823342" source="BUGZILLA"/>
		<reference ref_id="823386" ref_url="https://bugzilla.suse.com/823386" source="BUGZILLA"/>
		<reference ref_id="823517" ref_url="https://bugzilla.suse.com/823517" source="BUGZILLA"/>
		<reference ref_id="823597" ref_url="https://bugzilla.suse.com/823597" source="BUGZILLA"/>
		<reference ref_id="823618" ref_url="https://bugzilla.suse.com/823618" source="BUGZILLA"/>
		<reference ref_id="823795" ref_url="https://bugzilla.suse.com/823795" source="BUGZILLA"/>
		<reference ref_id="824159" ref_url="https://bugzilla.suse.com/824159" source="BUGZILLA"/>
		<reference ref_id="824256" ref_url="https://bugzilla.suse.com/824256" source="BUGZILLA"/>
		<reference ref_id="824295" ref_url="https://bugzilla.suse.com/824295" source="BUGZILLA"/>
		<reference ref_id="824568" ref_url="https://bugzilla.suse.com/824568" source="BUGZILLA"/>
		<reference ref_id="824915" ref_url="https://bugzilla.suse.com/824915" source="BUGZILLA"/>
		<reference ref_id="825006" ref_url="https://bugzilla.suse.com/825006" source="BUGZILLA"/>
		<reference ref_id="825037" ref_url="https://bugzilla.suse.com/825037" source="BUGZILLA"/>
		<reference ref_id="825048" ref_url="https://bugzilla.suse.com/825048" source="BUGZILLA"/>
		<reference ref_id="825142" ref_url="https://bugzilla.suse.com/825142" source="BUGZILLA"/>
		<reference ref_id="825227" ref_url="https://bugzilla.suse.com/825227" source="BUGZILLA"/>
		<reference ref_id="825291" ref_url="https://bugzilla.suse.com/825291" source="BUGZILLA"/>
		<reference ref_id="825591" ref_url="https://bugzilla.suse.com/825591" source="BUGZILLA"/>
		<reference ref_id="825657" ref_url="https://bugzilla.suse.com/825657" source="BUGZILLA"/>
		<reference ref_id="825696" ref_url="https://bugzilla.suse.com/825696" source="BUGZILLA"/>
		<reference ref_id="825887" ref_url="https://bugzilla.suse.com/825887" source="BUGZILLA"/>
		<reference ref_id="825896" ref_url="https://bugzilla.suse.com/825896" source="BUGZILLA"/>
		<reference ref_id="826102" ref_url="https://bugzilla.suse.com/826102" source="BUGZILLA"/>
		<reference ref_id="826186" ref_url="https://bugzilla.suse.com/826186" source="BUGZILLA"/>
		<reference ref_id="826350" ref_url="https://bugzilla.suse.com/826350" source="BUGZILLA"/>
		<reference ref_id="826486" ref_url="https://bugzilla.suse.com/826486" source="BUGZILLA"/>
		<reference ref_id="826602" ref_url="https://bugzilla.suse.com/826602" source="BUGZILLA"/>
		<reference ref_id="826756" ref_url="https://bugzilla.suse.com/826756" source="BUGZILLA"/>
		<reference ref_id="826960" ref_url="https://bugzilla.suse.com/826960" source="BUGZILLA"/>
		<reference ref_id="826978" ref_url="https://bugzilla.suse.com/826978" source="BUGZILLA"/>
		<reference ref_id="827246" ref_url="https://bugzilla.suse.com/827246" source="BUGZILLA"/>
		<reference ref_id="827271" ref_url="https://bugzilla.suse.com/827271" source="BUGZILLA"/>
		<reference ref_id="827372" ref_url="https://bugzilla.suse.com/827372" source="BUGZILLA"/>
		<reference ref_id="827376" ref_url="https://bugzilla.suse.com/827376" source="BUGZILLA"/>
		<reference ref_id="827378" ref_url="https://bugzilla.suse.com/827378" source="BUGZILLA"/>
		<reference ref_id="827416" ref_url="https://bugzilla.suse.com/827416" source="BUGZILLA"/>
		<reference ref_id="827527" ref_url="https://bugzilla.suse.com/827527" source="BUGZILLA"/>
		<reference ref_id="827670" ref_url="https://bugzilla.suse.com/827670" source="BUGZILLA"/>
		<reference ref_id="827749" ref_url="https://bugzilla.suse.com/827749" source="BUGZILLA"/>
		<reference ref_id="827750" ref_url="https://bugzilla.suse.com/827750" source="BUGZILLA"/>
		<reference ref_id="827767" ref_url="https://bugzilla.suse.com/827767" source="BUGZILLA"/>
		<reference ref_id="827930" ref_url="https://bugzilla.suse.com/827930" source="BUGZILLA"/>
		<reference ref_id="827966" ref_url="https://bugzilla.suse.com/827966" source="BUGZILLA"/>
		<reference ref_id="828087" ref_url="https://bugzilla.suse.com/828087" source="BUGZILLA"/>
		<reference ref_id="828119" ref_url="https://bugzilla.suse.com/828119" source="BUGZILLA"/>
		<reference ref_id="828192" ref_url="https://bugzilla.suse.com/828192" source="BUGZILLA"/>
		<reference ref_id="828236" ref_url="https://bugzilla.suse.com/828236" source="BUGZILLA"/>
		<reference ref_id="828265" ref_url="https://bugzilla.suse.com/828265" source="BUGZILLA"/>
		<reference ref_id="828574" ref_url="https://bugzilla.suse.com/828574" source="BUGZILLA"/>
		<reference ref_id="828714" ref_url="https://bugzilla.suse.com/828714" source="BUGZILLA"/>
		<reference ref_id="828886" ref_url="https://bugzilla.suse.com/828886" source="BUGZILLA"/>
		<reference ref_id="828894" ref_url="https://bugzilla.suse.com/828894" source="BUGZILLA"/>
		<reference ref_id="828914" ref_url="https://bugzilla.suse.com/828914" source="BUGZILLA"/>
		<reference ref_id="829001" ref_url="https://bugzilla.suse.com/829001" source="BUGZILLA"/>
		<reference ref_id="829082" ref_url="https://bugzilla.suse.com/829082" source="BUGZILLA"/>
		<reference ref_id="829110" ref_url="https://bugzilla.suse.com/829110" source="BUGZILLA"/>
		<reference ref_id="829357" ref_url="https://bugzilla.suse.com/829357" source="BUGZILLA"/>
		<reference ref_id="829539" ref_url="https://bugzilla.suse.com/829539" source="BUGZILLA"/>
		<reference ref_id="829622" ref_url="https://bugzilla.suse.com/829622" source="BUGZILLA"/>
		<reference ref_id="829682" ref_url="https://bugzilla.suse.com/829682" source="BUGZILLA"/>
		<reference ref_id="830346" ref_url="https://bugzilla.suse.com/830346" source="BUGZILLA"/>
		<reference ref_id="830478" ref_url="https://bugzilla.suse.com/830478" source="BUGZILLA"/>
		<reference ref_id="830766" ref_url="https://bugzilla.suse.com/830766" source="BUGZILLA"/>
		<reference ref_id="830822" ref_url="https://bugzilla.suse.com/830822" source="BUGZILLA"/>
		<reference ref_id="830901" ref_url="https://bugzilla.suse.com/830901" source="BUGZILLA"/>
		<reference ref_id="830985" ref_url="https://bugzilla.suse.com/830985" source="BUGZILLA"/>
		<reference ref_id="831029" ref_url="https://bugzilla.suse.com/831029" source="BUGZILLA"/>
		<reference ref_id="831055" ref_url="https://bugzilla.suse.com/831055" source="BUGZILLA"/>
		<reference ref_id="831058" ref_url="https://bugzilla.suse.com/831058" source="BUGZILLA"/>
		<reference ref_id="831103" ref_url="https://bugzilla.suse.com/831103" source="BUGZILLA"/>
		<reference ref_id="831143" ref_url="https://bugzilla.suse.com/831143" source="BUGZILLA"/>
		<reference ref_id="831380" ref_url="https://bugzilla.suse.com/831380" source="BUGZILLA"/>
		<reference ref_id="831410" ref_url="https://bugzilla.suse.com/831410" source="BUGZILLA"/>
		<reference ref_id="831422" ref_url="https://bugzilla.suse.com/831422" source="BUGZILLA"/>
		<reference ref_id="831424" ref_url="https://bugzilla.suse.com/831424" source="BUGZILLA"/>
		<reference ref_id="831438" ref_url="https://bugzilla.suse.com/831438" source="BUGZILLA"/>
		<reference ref_id="831623" ref_url="https://bugzilla.suse.com/831623" source="BUGZILLA"/>
		<reference ref_id="831949" ref_url="https://bugzilla.suse.com/831949" source="BUGZILLA"/>
		<reference ref_id="832292" ref_url="https://bugzilla.suse.com/832292" source="BUGZILLA"/>
		<reference ref_id="832309" ref_url="https://bugzilla.suse.com/832309" source="BUGZILLA"/>
		<reference ref_id="832318" ref_url="https://bugzilla.suse.com/832318" source="BUGZILLA"/>
		<reference ref_id="832710" ref_url="https://bugzilla.suse.com/832710" source="BUGZILLA"/>
		<reference ref_id="833073" ref_url="https://bugzilla.suse.com/833073" source="BUGZILLA"/>
		<reference ref_id="833097" ref_url="https://bugzilla.suse.com/833097" source="BUGZILLA"/>
		<reference ref_id="833148" ref_url="https://bugzilla.suse.com/833148" source="BUGZILLA"/>
		<reference ref_id="833151" ref_url="https://bugzilla.suse.com/833151" source="BUGZILLA"/>
		<reference ref_id="833321" ref_url="https://bugzilla.suse.com/833321" source="BUGZILLA"/>
		<reference ref_id="833588" ref_url="https://bugzilla.suse.com/833588" source="BUGZILLA"/>
		<reference ref_id="833635" ref_url="https://bugzilla.suse.com/833635" source="BUGZILLA"/>
		<reference ref_id="833820" ref_url="https://bugzilla.suse.com/833820" source="BUGZILLA"/>
		<reference ref_id="833858" ref_url="https://bugzilla.suse.com/833858" source="BUGZILLA"/>
		<reference ref_id="833968" ref_url="https://bugzilla.suse.com/833968" source="BUGZILLA"/>
		<reference ref_id="834116" ref_url="https://bugzilla.suse.com/834116" source="BUGZILLA"/>
		<reference ref_id="834204" ref_url="https://bugzilla.suse.com/834204" source="BUGZILLA"/>
		<reference ref_id="834473" ref_url="https://bugzilla.suse.com/834473" source="BUGZILLA"/>
		<reference ref_id="834600" ref_url="https://bugzilla.suse.com/834600" source="BUGZILLA"/>
		<reference ref_id="834647" ref_url="https://bugzilla.suse.com/834647" source="BUGZILLA"/>
		<reference ref_id="834708" ref_url="https://bugzilla.suse.com/834708" source="BUGZILLA"/>
		<reference ref_id="834742" ref_url="https://bugzilla.suse.com/834742" source="BUGZILLA"/>
		<reference ref_id="834808" ref_url="https://bugzilla.suse.com/834808" source="BUGZILLA"/>
		<reference ref_id="834905" ref_url="https://bugzilla.suse.com/834905" source="BUGZILLA"/>
		<reference ref_id="835074" ref_url="https://bugzilla.suse.com/835074" source="BUGZILLA"/>
		<reference ref_id="835094" ref_url="https://bugzilla.suse.com/835094" source="BUGZILLA"/>
		<reference ref_id="835175" ref_url="https://bugzilla.suse.com/835175" source="BUGZILLA"/>
		<reference ref_id="835186" ref_url="https://bugzilla.suse.com/835186" source="BUGZILLA"/>
		<reference ref_id="835189" ref_url="https://bugzilla.suse.com/835189" source="BUGZILLA"/>
		<reference ref_id="835684" ref_url="https://bugzilla.suse.com/835684" source="BUGZILLA"/>
		<reference ref_id="835839" ref_url="https://bugzilla.suse.com/835839" source="BUGZILLA"/>
		<reference ref_id="835930" ref_url="https://bugzilla.suse.com/835930" source="BUGZILLA"/>
		<reference ref_id="836218" ref_url="https://bugzilla.suse.com/836218" source="BUGZILLA"/>
		<reference ref_id="836347" ref_url="https://bugzilla.suse.com/836347" source="BUGZILLA"/>
		<reference ref_id="836718" ref_url="https://bugzilla.suse.com/836718" source="BUGZILLA"/>
		<reference ref_id="836801" ref_url="https://bugzilla.suse.com/836801" source="BUGZILLA"/>
		<reference ref_id="837206" ref_url="https://bugzilla.suse.com/837206" source="BUGZILLA"/>
		<reference ref_id="837372" ref_url="https://bugzilla.suse.com/837372" source="BUGZILLA"/>
		<reference ref_id="837563" ref_url="https://bugzilla.suse.com/837563" source="BUGZILLA"/>
		<reference ref_id="837596" ref_url="https://bugzilla.suse.com/837596" source="BUGZILLA"/>
		<reference ref_id="837739" ref_url="https://bugzilla.suse.com/837739" source="BUGZILLA"/>
		<reference ref_id="837741" ref_url="https://bugzilla.suse.com/837741" source="BUGZILLA"/>
		<reference ref_id="837803" ref_url="https://bugzilla.suse.com/837803" source="BUGZILLA"/>
		<reference ref_id="838346" ref_url="https://bugzilla.suse.com/838346" source="BUGZILLA"/>
		<reference ref_id="838448" ref_url="https://bugzilla.suse.com/838448" source="BUGZILLA"/>
		<reference ref_id="838623" ref_url="https://bugzilla.suse.com/838623" source="BUGZILLA"/>
		<reference ref_id="839407" ref_url="https://bugzilla.suse.com/839407" source="BUGZILLA"/>
		<reference ref_id="839973" ref_url="https://bugzilla.suse.com/839973" source="BUGZILLA"/>
		<reference ref_id="840116" ref_url="https://bugzilla.suse.com/840116" source="BUGZILLA"/>
		<reference ref_id="840226" ref_url="https://bugzilla.suse.com/840226" source="BUGZILLA"/>
		<reference ref_id="840524" ref_url="https://bugzilla.suse.com/840524" source="BUGZILLA"/>
		<reference ref_id="840830" ref_url="https://bugzilla.suse.com/840830" source="BUGZILLA"/>
		<reference ref_id="841050" ref_url="https://bugzilla.suse.com/841050" source="BUGZILLA"/>
		<reference ref_id="841094" ref_url="https://bugzilla.suse.com/841094" source="BUGZILLA"/>
		<reference ref_id="841402" ref_url="https://bugzilla.suse.com/841402" source="BUGZILLA"/>
		<reference ref_id="841445" ref_url="https://bugzilla.suse.com/841445" source="BUGZILLA"/>
		<reference ref_id="841498" ref_url="https://bugzilla.suse.com/841498" source="BUGZILLA"/>
		<reference ref_id="841654" ref_url="https://bugzilla.suse.com/841654" source="BUGZILLA"/>
		<reference ref_id="841656" ref_url="https://bugzilla.suse.com/841656" source="BUGZILLA"/>
		<reference ref_id="842057" ref_url="https://bugzilla.suse.com/842057" source="BUGZILLA"/>
		<reference ref_id="842063" ref_url="https://bugzilla.suse.com/842063" source="BUGZILLA"/>
		<reference ref_id="842239" ref_url="https://bugzilla.suse.com/842239" source="BUGZILLA"/>
		<reference ref_id="842604" ref_url="https://bugzilla.suse.com/842604" source="BUGZILLA"/>
		<reference ref_id="842820" ref_url="https://bugzilla.suse.com/842820" source="BUGZILLA"/>
		<reference ref_id="843185" ref_url="https://bugzilla.suse.com/843185" source="BUGZILLA"/>
		<reference ref_id="843419" ref_url="https://bugzilla.suse.com/843419" source="BUGZILLA"/>
		<reference ref_id="843429" ref_url="https://bugzilla.suse.com/843429" source="BUGZILLA"/>
		<reference ref_id="843445" ref_url="https://bugzilla.suse.com/843445" source="BUGZILLA"/>
		<reference ref_id="843642" ref_url="https://bugzilla.suse.com/843642" source="BUGZILLA"/>
		<reference ref_id="843645" ref_url="https://bugzilla.suse.com/843645" source="BUGZILLA"/>
		<reference ref_id="843654" ref_url="https://bugzilla.suse.com/843654" source="BUGZILLA"/>
		<reference ref_id="843732" ref_url="https://bugzilla.suse.com/843732" source="BUGZILLA"/>
		<reference ref_id="843753" ref_url="https://bugzilla.suse.com/843753" source="BUGZILLA"/>
		<reference ref_id="843950" ref_url="https://bugzilla.suse.com/843950" source="BUGZILLA"/>
		<reference ref_id="844513" ref_url="https://bugzilla.suse.com/844513" source="BUGZILLA"/>
		<reference ref_id="845352" ref_url="https://bugzilla.suse.com/845352" source="BUGZILLA"/>
		<reference ref_id="845378" ref_url="https://bugzilla.suse.com/845378" source="BUGZILLA"/>
		<reference ref_id="845621" ref_url="https://bugzilla.suse.com/845621" source="BUGZILLA"/>
		<reference ref_id="845729" ref_url="https://bugzilla.suse.com/845729" source="BUGZILLA"/>
		<reference ref_id="846036" ref_url="https://bugzilla.suse.com/846036" source="BUGZILLA"/>
		<reference ref_id="846298" ref_url="https://bugzilla.suse.com/846298" source="BUGZILLA"/>
		<reference ref_id="846404" ref_url="https://bugzilla.suse.com/846404" source="BUGZILLA"/>
		<reference ref_id="846654" ref_url="https://bugzilla.suse.com/846654" source="BUGZILLA"/>
		<reference ref_id="846656" ref_url="https://bugzilla.suse.com/846656" source="BUGZILLA"/>
		<reference ref_id="846690" ref_url="https://bugzilla.suse.com/846690" source="BUGZILLA"/>
		<reference ref_id="846790" ref_url="https://bugzilla.suse.com/846790" source="BUGZILLA"/>
		<reference ref_id="846984" ref_url="https://bugzilla.suse.com/846984" source="BUGZILLA"/>
		<reference ref_id="846989" ref_url="https://bugzilla.suse.com/846989" source="BUGZILLA"/>
		<reference ref_id="847261" ref_url="https://bugzilla.suse.com/847261" source="BUGZILLA"/>
		<reference ref_id="847319" ref_url="https://bugzilla.suse.com/847319" source="BUGZILLA"/>
		<reference ref_id="847652" ref_url="https://bugzilla.suse.com/847652" source="BUGZILLA"/>
		<reference ref_id="847660" ref_url="https://bugzilla.suse.com/847660" source="BUGZILLA"/>
		<reference ref_id="847672" ref_url="https://bugzilla.suse.com/847672" source="BUGZILLA"/>
		<reference ref_id="847721" ref_url="https://bugzilla.suse.com/847721" source="BUGZILLA"/>
		<reference ref_id="847842" ref_url="https://bugzilla.suse.com/847842" source="BUGZILLA"/>
		<reference ref_id="848055" ref_url="https://bugzilla.suse.com/848055" source="BUGZILLA"/>
		<reference ref_id="848317" ref_url="https://bugzilla.suse.com/848317" source="BUGZILLA"/>
		<reference ref_id="848321" ref_url="https://bugzilla.suse.com/848321" source="BUGZILLA"/>
		<reference ref_id="848335" ref_url="https://bugzilla.suse.com/848335" source="BUGZILLA"/>
		<reference ref_id="848336" ref_url="https://bugzilla.suse.com/848336" source="BUGZILLA"/>
		<reference ref_id="848544" ref_url="https://bugzilla.suse.com/848544" source="BUGZILLA"/>
		<reference ref_id="848652" ref_url="https://bugzilla.suse.com/848652" source="BUGZILLA"/>
		<reference ref_id="848864" ref_url="https://bugzilla.suse.com/848864" source="BUGZILLA"/>
		<reference ref_id="849021" ref_url="https://bugzilla.suse.com/849021" source="BUGZILLA"/>
		<reference ref_id="849029" ref_url="https://bugzilla.suse.com/849029" source="BUGZILLA"/>
		<reference ref_id="849034" ref_url="https://bugzilla.suse.com/849034" source="BUGZILLA"/>
		<reference ref_id="849123" ref_url="https://bugzilla.suse.com/849123" source="BUGZILLA"/>
		<reference ref_id="849256" ref_url="https://bugzilla.suse.com/849256" source="BUGZILLA"/>
		<reference ref_id="849362" ref_url="https://bugzilla.suse.com/849362" source="BUGZILLA"/>
		<reference ref_id="849364" ref_url="https://bugzilla.suse.com/849364" source="BUGZILLA"/>
		<reference ref_id="849404" ref_url="https://bugzilla.suse.com/849404" source="BUGZILLA"/>
		<reference ref_id="849675" ref_url="https://bugzilla.suse.com/849675" source="BUGZILLA"/>
		<reference ref_id="849809" ref_url="https://bugzilla.suse.com/849809" source="BUGZILLA"/>
		<reference ref_id="849855" ref_url="https://bugzilla.suse.com/849855" source="BUGZILLA"/>
		<reference ref_id="849950" ref_url="https://bugzilla.suse.com/849950" source="BUGZILLA"/>
		<reference ref_id="850072" ref_url="https://bugzilla.suse.com/850072" source="BUGZILLA"/>
		<reference ref_id="850103" ref_url="https://bugzilla.suse.com/850103" source="BUGZILLA"/>
		<reference ref_id="850324" ref_url="https://bugzilla.suse.com/850324" source="BUGZILLA"/>
		<reference ref_id="850493" ref_url="https://bugzilla.suse.com/850493" source="BUGZILLA"/>
		<reference ref_id="850640" ref_url="https://bugzilla.suse.com/850640" source="BUGZILLA"/>
		<reference ref_id="850915" ref_url="https://bugzilla.suse.com/850915" source="BUGZILLA"/>
		<reference ref_id="851066" ref_url="https://bugzilla.suse.com/851066" source="BUGZILLA"/>
		<reference ref_id="851101" ref_url="https://bugzilla.suse.com/851101" source="BUGZILLA"/>
		<reference ref_id="851290" ref_url="https://bugzilla.suse.com/851290" source="BUGZILLA"/>
		<reference ref_id="851314" ref_url="https://bugzilla.suse.com/851314" source="BUGZILLA"/>
		<reference ref_id="851426" ref_url="https://bugzilla.suse.com/851426" source="BUGZILLA"/>
		<reference ref_id="851603" ref_url="https://bugzilla.suse.com/851603" source="BUGZILLA"/>
		<reference ref_id="851879" ref_url="https://bugzilla.suse.com/851879" source="BUGZILLA"/>
		<reference ref_id="852153" ref_url="https://bugzilla.suse.com/852153" source="BUGZILLA"/>
		<reference ref_id="852373" ref_url="https://bugzilla.suse.com/852373" source="BUGZILLA"/>
		<reference ref_id="852488" ref_url="https://bugzilla.suse.com/852488" source="BUGZILLA"/>
		<reference ref_id="852553" ref_url="https://bugzilla.suse.com/852553" source="BUGZILLA"/>
		<reference ref_id="852558" ref_url="https://bugzilla.suse.com/852558" source="BUGZILLA"/>
		<reference ref_id="852559" ref_url="https://bugzilla.suse.com/852559" source="BUGZILLA"/>
		<reference ref_id="852624" ref_url="https://bugzilla.suse.com/852624" source="BUGZILLA"/>
		<reference ref_id="852652" ref_url="https://bugzilla.suse.com/852652" source="BUGZILLA"/>
		<reference ref_id="852761" ref_url="https://bugzilla.suse.com/852761" source="BUGZILLA"/>
		<reference ref_id="852967" ref_url="https://bugzilla.suse.com/852967" source="BUGZILLA"/>
		<reference ref_id="853040" ref_url="https://bugzilla.suse.com/853040" source="BUGZILLA"/>
		<reference ref_id="853050" ref_url="https://bugzilla.suse.com/853050" source="BUGZILLA"/>
		<reference ref_id="853051" ref_url="https://bugzilla.suse.com/853051" source="BUGZILLA"/>
		<reference ref_id="853052" ref_url="https://bugzilla.suse.com/853052" source="BUGZILLA"/>
		<reference ref_id="853053" ref_url="https://bugzilla.suse.com/853053" source="BUGZILLA"/>
		<reference ref_id="853162" ref_url="https://bugzilla.suse.com/853162" source="BUGZILLA"/>
		<reference ref_id="853166" ref_url="https://bugzilla.suse.com/853166" source="BUGZILLA"/>
		<reference ref_id="853428" ref_url="https://bugzilla.suse.com/853428" source="BUGZILLA"/>
		<reference ref_id="853455" ref_url="https://bugzilla.suse.com/853455" source="BUGZILLA"/>
		<reference ref_id="853465" ref_url="https://bugzilla.suse.com/853465" source="BUGZILLA"/>
		<reference ref_id="854025" ref_url="https://bugzilla.suse.com/854025" source="BUGZILLA"/>
		<reference ref_id="854445" ref_url="https://bugzilla.suse.com/854445" source="BUGZILLA"/>
		<reference ref_id="854516" ref_url="https://bugzilla.suse.com/854516" source="BUGZILLA"/>
		<reference ref_id="854546" ref_url="https://bugzilla.suse.com/854546" source="BUGZILLA"/>
		<reference ref_id="854634" ref_url="https://bugzilla.suse.com/854634" source="BUGZILLA"/>
		<reference ref_id="854722" ref_url="https://bugzilla.suse.com/854722" source="BUGZILLA"/>
		<reference ref_id="855126" ref_url="https://bugzilla.suse.com/855126" source="BUGZILLA"/>
		<reference ref_id="855657" ref_url="https://bugzilla.suse.com/855657" source="BUGZILLA"/>
		<reference ref_id="855825" ref_url="https://bugzilla.suse.com/855825" source="BUGZILLA"/>
		<reference ref_id="856307" ref_url="https://bugzilla.suse.com/856307" source="BUGZILLA"/>
		<reference ref_id="856481" ref_url="https://bugzilla.suse.com/856481" source="BUGZILLA"/>
		<reference ref_id="856760" ref_url="https://bugzilla.suse.com/856760" source="BUGZILLA"/>
		<reference ref_id="856848" ref_url="https://bugzilla.suse.com/856848" source="BUGZILLA"/>
		<reference ref_id="857358" ref_url="https://bugzilla.suse.com/857358" source="BUGZILLA"/>
		<reference ref_id="857643" ref_url="https://bugzilla.suse.com/857643" source="BUGZILLA"/>
		<reference ref_id="857926" ref_url="https://bugzilla.suse.com/857926" source="BUGZILLA"/>
		<reference ref_id="858534" ref_url="https://bugzilla.suse.com/858534" source="BUGZILLA"/>
		<reference ref_id="858604" ref_url="https://bugzilla.suse.com/858604" source="BUGZILLA"/>
		<reference ref_id="858831" ref_url="https://bugzilla.suse.com/858831" source="BUGZILLA"/>
		<reference ref_id="858869" ref_url="https://bugzilla.suse.com/858869" source="BUGZILLA"/>
		<reference ref_id="858870" ref_url="https://bugzilla.suse.com/858870" source="BUGZILLA"/>
		<reference ref_id="858872" ref_url="https://bugzilla.suse.com/858872" source="BUGZILLA"/>
		<reference ref_id="859225" ref_url="https://bugzilla.suse.com/859225" source="BUGZILLA"/>
		<reference ref_id="859342" ref_url="https://bugzilla.suse.com/859342" source="BUGZILLA"/>
		<reference ref_id="859840" ref_url="https://bugzilla.suse.com/859840" source="BUGZILLA"/>
		<reference ref_id="860441" ref_url="https://bugzilla.suse.com/860441" source="BUGZILLA"/>
		<reference ref_id="860593" ref_url="https://bugzilla.suse.com/860593" source="BUGZILLA"/>
		<reference ref_id="861093" ref_url="https://bugzilla.suse.com/861093" source="BUGZILLA"/>
		<reference ref_id="861636" ref_url="https://bugzilla.suse.com/861636" source="BUGZILLA"/>
		<reference ref_id="861980" ref_url="https://bugzilla.suse.com/861980" source="BUGZILLA"/>
		<reference ref_id="862429" ref_url="https://bugzilla.suse.com/862429" source="BUGZILLA"/>
		<reference ref_id="862796" ref_url="https://bugzilla.suse.com/862796" source="BUGZILLA"/>
		<reference ref_id="862934" ref_url="https://bugzilla.suse.com/862934" source="BUGZILLA"/>
		<reference ref_id="862957" ref_url="https://bugzilla.suse.com/862957" source="BUGZILLA"/>
		<reference ref_id="863178" ref_url="https://bugzilla.suse.com/863178" source="BUGZILLA"/>
		<reference ref_id="863300" ref_url="https://bugzilla.suse.com/863300" source="BUGZILLA"/>
		<reference ref_id="863335" ref_url="https://bugzilla.suse.com/863335" source="BUGZILLA"/>
		<reference ref_id="863410" ref_url="https://bugzilla.suse.com/863410" source="BUGZILLA"/>
		<reference ref_id="863526" ref_url="https://bugzilla.suse.com/863526" source="BUGZILLA"/>
		<reference ref_id="863586" ref_url="https://bugzilla.suse.com/863586" source="BUGZILLA"/>
		<reference ref_id="863873" ref_url="https://bugzilla.suse.com/863873" source="BUGZILLA"/>
		<reference ref_id="864025" ref_url="https://bugzilla.suse.com/864025" source="BUGZILLA"/>
		<reference ref_id="864058" ref_url="https://bugzilla.suse.com/864058" source="BUGZILLA"/>
		<reference ref_id="864401" ref_url="https://bugzilla.suse.com/864401" source="BUGZILLA"/>
		<reference ref_id="864404" ref_url="https://bugzilla.suse.com/864404" source="BUGZILLA"/>
		<reference ref_id="864409" ref_url="https://bugzilla.suse.com/864409" source="BUGZILLA"/>
		<reference ref_id="864411" ref_url="https://bugzilla.suse.com/864411" source="BUGZILLA"/>
		<reference ref_id="864464" ref_url="https://bugzilla.suse.com/864464" source="BUGZILLA"/>
		<reference ref_id="864833" ref_url="https://bugzilla.suse.com/864833" source="BUGZILLA"/>
		<reference ref_id="864880" ref_url="https://bugzilla.suse.com/864880" source="BUGZILLA"/>
		<reference ref_id="865310" ref_url="https://bugzilla.suse.com/865310" source="BUGZILLA"/>
		<reference ref_id="865330" ref_url="https://bugzilla.suse.com/865330" source="BUGZILLA"/>
		<reference ref_id="865342" ref_url="https://bugzilla.suse.com/865342" source="BUGZILLA"/>
		<reference ref_id="865419" ref_url="https://bugzilla.suse.com/865419" source="BUGZILLA"/>
		<reference ref_id="865783" ref_url="https://bugzilla.suse.com/865783" source="BUGZILLA"/>
		<reference ref_id="865882" ref_url="https://bugzilla.suse.com/865882" source="BUGZILLA"/>
		<reference ref_id="866081" ref_url="https://bugzilla.suse.com/866081" source="BUGZILLA"/>
		<reference ref_id="866102" ref_url="https://bugzilla.suse.com/866102" source="BUGZILLA"/>
		<reference ref_id="866130" ref_url="https://bugzilla.suse.com/866130" source="BUGZILLA"/>
		<reference ref_id="866253" ref_url="https://bugzilla.suse.com/866253" source="BUGZILLA"/>
		<reference ref_id="866428" ref_url="https://bugzilla.suse.com/866428" source="BUGZILLA"/>
		<reference ref_id="866615" ref_url="https://bugzilla.suse.com/866615" source="BUGZILLA"/>
		<reference ref_id="866800" ref_url="https://bugzilla.suse.com/866800" source="BUGZILLA"/>
		<reference ref_id="866864" ref_url="https://bugzilla.suse.com/866864" source="BUGZILLA"/>
		<reference ref_id="866911" ref_url="https://bugzilla.suse.com/866911" source="BUGZILLA"/>
		<reference ref_id="867362" ref_url="https://bugzilla.suse.com/867362" source="BUGZILLA"/>
		<reference ref_id="867517" ref_url="https://bugzilla.suse.com/867517" source="BUGZILLA"/>
		<reference ref_id="867531" ref_url="https://bugzilla.suse.com/867531" source="BUGZILLA"/>
		<reference ref_id="867723" ref_url="https://bugzilla.suse.com/867723" source="BUGZILLA"/>
		<reference ref_id="867953" ref_url="https://bugzilla.suse.com/867953" source="BUGZILLA"/>
		<reference ref_id="868049" ref_url="https://bugzilla.suse.com/868049" source="BUGZILLA"/>
		<reference ref_id="868488" ref_url="https://bugzilla.suse.com/868488" source="BUGZILLA"/>
		<reference ref_id="868528" ref_url="https://bugzilla.suse.com/868528" source="BUGZILLA"/>
		<reference ref_id="868653" ref_url="https://bugzilla.suse.com/868653" source="BUGZILLA"/>
		<reference ref_id="868748" ref_url="https://bugzilla.suse.com/868748" source="BUGZILLA"/>
		<reference ref_id="869033" ref_url="https://bugzilla.suse.com/869033" source="BUGZILLA"/>
		<reference ref_id="869055" ref_url="https://bugzilla.suse.com/869055" source="BUGZILLA"/>
		<reference ref_id="869414" ref_url="https://bugzilla.suse.com/869414" source="BUGZILLA"/>
		<reference ref_id="869563" ref_url="https://bugzilla.suse.com/869563" source="BUGZILLA"/>
		<reference ref_id="869934" ref_url="https://bugzilla.suse.com/869934" source="BUGZILLA"/>
		<reference ref_id="870161" ref_url="https://bugzilla.suse.com/870161" source="BUGZILLA"/>
		<reference ref_id="870173" ref_url="https://bugzilla.suse.com/870173" source="BUGZILLA"/>
		<reference ref_id="870335" ref_url="https://bugzilla.suse.com/870335" source="BUGZILLA"/>
		<reference ref_id="870450" ref_url="https://bugzilla.suse.com/870450" source="BUGZILLA"/>
		<reference ref_id="870496" ref_url="https://bugzilla.suse.com/870496" source="BUGZILLA"/>
		<reference ref_id="870498" ref_url="https://bugzilla.suse.com/870498" source="BUGZILLA"/>
		<reference ref_id="870576" ref_url="https://bugzilla.suse.com/870576" source="BUGZILLA"/>
		<reference ref_id="870591" ref_url="https://bugzilla.suse.com/870591" source="BUGZILLA"/>
		<reference ref_id="870618" ref_url="https://bugzilla.suse.com/870618" source="BUGZILLA"/>
		<reference ref_id="870801" ref_url="https://bugzilla.suse.com/870801" source="BUGZILLA"/>
		<reference ref_id="870877" ref_url="https://bugzilla.suse.com/870877" source="BUGZILLA"/>
		<reference ref_id="870958" ref_url="https://bugzilla.suse.com/870958" source="BUGZILLA"/>
		<reference ref_id="871134" ref_url="https://bugzilla.suse.com/871134" source="BUGZILLA"/>
		<reference ref_id="871561" ref_url="https://bugzilla.suse.com/871561" source="BUGZILLA"/>
		<reference ref_id="871634" ref_url="https://bugzilla.suse.com/871634" source="BUGZILLA"/>
		<reference ref_id="871676" ref_url="https://bugzilla.suse.com/871676" source="BUGZILLA"/>
		<reference ref_id="871728" ref_url="https://bugzilla.suse.com/871728" source="BUGZILLA"/>
		<reference ref_id="871797" ref_url="https://bugzilla.suse.com/871797" source="BUGZILLA"/>
		<reference ref_id="871854" ref_url="https://bugzilla.suse.com/871854" source="BUGZILLA"/>
		<reference ref_id="871861" ref_url="https://bugzilla.suse.com/871861" source="BUGZILLA"/>
		<reference ref_id="871899" ref_url="https://bugzilla.suse.com/871899" source="BUGZILLA"/>
		<reference ref_id="872188" ref_url="https://bugzilla.suse.com/872188" source="BUGZILLA"/>
		<reference ref_id="872540" ref_url="https://bugzilla.suse.com/872540" source="BUGZILLA"/>
		<reference ref_id="872634" ref_url="https://bugzilla.suse.com/872634" source="BUGZILLA"/>
		<reference ref_id="873061" ref_url="https://bugzilla.suse.com/873061" source="BUGZILLA"/>
		<reference ref_id="873228" ref_url="https://bugzilla.suse.com/873228" source="BUGZILLA"/>
		<reference ref_id="873374" ref_url="https://bugzilla.suse.com/873374" source="BUGZILLA"/>
		<reference ref_id="873463" ref_url="https://bugzilla.suse.com/873463" source="BUGZILLA"/>
		<reference ref_id="874108" ref_url="https://bugzilla.suse.com/874108" source="BUGZILLA"/>
		<reference ref_id="874145" ref_url="https://bugzilla.suse.com/874145" source="BUGZILLA"/>
		<reference ref_id="874440" ref_url="https://bugzilla.suse.com/874440" source="BUGZILLA"/>
		<reference ref_id="874577" ref_url="https://bugzilla.suse.com/874577" source="BUGZILLA"/>
		<reference ref_id="875051" ref_url="https://bugzilla.suse.com/875051" source="BUGZILLA"/>
		<reference ref_id="875386" ref_url="https://bugzilla.suse.com/875386" source="BUGZILLA"/>
		<reference ref_id="875690" ref_url="https://bugzilla.suse.com/875690" source="BUGZILLA"/>
		<reference ref_id="875798" ref_url="https://bugzilla.suse.com/875798" source="BUGZILLA"/>
		<reference ref_id="876017" ref_url="https://bugzilla.suse.com/876017" source="BUGZILLA"/>
		<reference ref_id="876055" ref_url="https://bugzilla.suse.com/876055" source="BUGZILLA"/>
		<reference ref_id="876086" ref_url="https://bugzilla.suse.com/876086" source="BUGZILLA"/>
		<reference ref_id="876102" ref_url="https://bugzilla.suse.com/876102" source="BUGZILLA"/>
		<reference ref_id="876114" ref_url="https://bugzilla.suse.com/876114" source="BUGZILLA"/>
		<reference ref_id="876176" ref_url="https://bugzilla.suse.com/876176" source="BUGZILLA"/>
		<reference ref_id="876463" ref_url="https://bugzilla.suse.com/876463" source="BUGZILLA"/>
		<reference ref_id="876590" ref_url="https://bugzilla.suse.com/876590" source="BUGZILLA"/>
		<reference ref_id="876594" ref_url="https://bugzilla.suse.com/876594" source="BUGZILLA"/>
		<reference ref_id="876633" ref_url="https://bugzilla.suse.com/876633" source="BUGZILLA"/>
		<reference ref_id="877013" ref_url="https://bugzilla.suse.com/877013" source="BUGZILLA"/>
		<reference ref_id="877257" ref_url="https://bugzilla.suse.com/877257" source="BUGZILLA"/>
		<reference ref_id="877456" ref_url="https://bugzilla.suse.com/877456" source="BUGZILLA"/>
		<reference ref_id="877497" ref_url="https://bugzilla.suse.com/877497" source="BUGZILLA"/>
		<reference ref_id="877593" ref_url="https://bugzilla.suse.com/877593" source="BUGZILLA"/>
		<reference ref_id="877775" ref_url="https://bugzilla.suse.com/877775" source="BUGZILLA"/>
		<reference ref_id="878115" ref_url="https://bugzilla.suse.com/878115" source="BUGZILLA"/>
		<reference ref_id="878123" ref_url="https://bugzilla.suse.com/878123" source="BUGZILLA"/>
		<reference ref_id="878274" ref_url="https://bugzilla.suse.com/878274" source="BUGZILLA"/>
		<reference ref_id="878407" ref_url="https://bugzilla.suse.com/878407" source="BUGZILLA"/>
		<reference ref_id="878509" ref_url="https://bugzilla.suse.com/878509" source="BUGZILLA"/>
		<reference ref_id="879304" ref_url="https://bugzilla.suse.com/879304" source="BUGZILLA"/>
		<reference ref_id="879921" ref_url="https://bugzilla.suse.com/879921" source="BUGZILLA"/>
		<reference ref_id="879957" ref_url="https://bugzilla.suse.com/879957" source="BUGZILLA"/>
		<reference ref_id="880007" ref_url="https://bugzilla.suse.com/880007" source="BUGZILLA"/>
		<reference ref_id="880344" ref_url="https://bugzilla.suse.com/880344" source="BUGZILLA"/>
		<reference ref_id="880357" ref_url="https://bugzilla.suse.com/880357" source="BUGZILLA"/>
		<reference ref_id="880370" ref_url="https://bugzilla.suse.com/880370" source="BUGZILLA"/>
		<reference ref_id="880437" ref_url="https://bugzilla.suse.com/880437" source="BUGZILLA"/>
		<reference ref_id="880484" ref_url="https://bugzilla.suse.com/880484" source="BUGZILLA"/>
		<reference ref_id="880892" ref_url="https://bugzilla.suse.com/880892" source="BUGZILLA"/>
		<reference ref_id="881051" ref_url="https://bugzilla.suse.com/881051" source="BUGZILLA"/>
		<reference ref_id="881571" ref_url="https://bugzilla.suse.com/881571" source="BUGZILLA"/>
		<reference ref_id="881759" ref_url="https://bugzilla.suse.com/881759" source="BUGZILLA"/>
		<reference ref_id="881761" ref_url="https://bugzilla.suse.com/881761" source="BUGZILLA"/>
		<reference ref_id="881939" ref_url="https://bugzilla.suse.com/881939" source="BUGZILLA"/>
		<reference ref_id="882317" ref_url="https://bugzilla.suse.com/882317" source="BUGZILLA"/>
		<reference ref_id="882324" ref_url="https://bugzilla.suse.com/882324" source="BUGZILLA"/>
		<reference ref_id="882470" ref_url="https://bugzilla.suse.com/882470" source="BUGZILLA"/>
		<reference ref_id="882639" ref_url="https://bugzilla.suse.com/882639" source="BUGZILLA"/>
		<reference ref_id="882804" ref_url="https://bugzilla.suse.com/882804" source="BUGZILLA"/>
		<reference ref_id="882900" ref_url="https://bugzilla.suse.com/882900" source="BUGZILLA"/>
		<reference ref_id="883096" ref_url="https://bugzilla.suse.com/883096" source="BUGZILLA"/>
		<reference ref_id="883376" ref_url="https://bugzilla.suse.com/883376" source="BUGZILLA"/>
		<reference ref_id="883380" ref_url="https://bugzilla.suse.com/883380" source="BUGZILLA"/>
		<reference ref_id="883518" ref_url="https://bugzilla.suse.com/883518" source="BUGZILLA"/>
		<reference ref_id="883724" ref_url="https://bugzilla.suse.com/883724" source="BUGZILLA"/>
		<reference ref_id="883795" ref_url="https://bugzilla.suse.com/883795" source="BUGZILLA"/>
		<reference ref_id="883948" ref_url="https://bugzilla.suse.com/883948" source="BUGZILLA"/>
		<reference ref_id="884333" ref_url="https://bugzilla.suse.com/884333" source="BUGZILLA"/>
		<reference ref_id="884582" ref_url="https://bugzilla.suse.com/884582" source="BUGZILLA"/>
		<reference ref_id="884725" ref_url="https://bugzilla.suse.com/884725" source="BUGZILLA"/>
		<reference ref_id="884767" ref_url="https://bugzilla.suse.com/884767" source="BUGZILLA"/>
		<reference ref_id="884817" ref_url="https://bugzilla.suse.com/884817" source="BUGZILLA"/>
		<reference ref_id="885077" ref_url="https://bugzilla.suse.com/885077" source="BUGZILLA"/>
		<reference ref_id="885262" ref_url="https://bugzilla.suse.com/885262" source="BUGZILLA"/>
		<reference ref_id="885382" ref_url="https://bugzilla.suse.com/885382" source="BUGZILLA"/>
		<reference ref_id="885422" ref_url="https://bugzilla.suse.com/885422" source="BUGZILLA"/>
		<reference ref_id="885509" ref_url="https://bugzilla.suse.com/885509" source="BUGZILLA"/>
		<reference ref_id="885725" ref_url="https://bugzilla.suse.com/885725" source="BUGZILLA"/>
		<reference ref_id="886840" ref_url="https://bugzilla.suse.com/886840" source="BUGZILLA"/>
		<reference ref_id="887082" ref_url="https://bugzilla.suse.com/887082" source="BUGZILLA"/>
		<reference ref_id="887418" ref_url="https://bugzilla.suse.com/887418" source="BUGZILLA"/>
		<reference ref_id="887503" ref_url="https://bugzilla.suse.com/887503" source="BUGZILLA"/>
		<reference ref_id="887597" ref_url="https://bugzilla.suse.com/887597" source="BUGZILLA"/>
		<reference ref_id="887608" ref_url="https://bugzilla.suse.com/887608" source="BUGZILLA"/>
		<reference ref_id="887645" ref_url="https://bugzilla.suse.com/887645" source="BUGZILLA"/>
		<reference ref_id="887680" ref_url="https://bugzilla.suse.com/887680" source="BUGZILLA"/>
		<reference ref_id="888058" ref_url="https://bugzilla.suse.com/888058" source="BUGZILLA"/>
		<reference ref_id="888105" ref_url="https://bugzilla.suse.com/888105" source="BUGZILLA"/>
		<reference ref_id="888591" ref_url="https://bugzilla.suse.com/888591" source="BUGZILLA"/>
		<reference ref_id="888607" ref_url="https://bugzilla.suse.com/888607" source="BUGZILLA"/>
		<reference ref_id="888847" ref_url="https://bugzilla.suse.com/888847" source="BUGZILLA"/>
		<reference ref_id="888849" ref_url="https://bugzilla.suse.com/888849" source="BUGZILLA"/>
		<reference ref_id="888968" ref_url="https://bugzilla.suse.com/888968" source="BUGZILLA"/>
		<reference ref_id="889061" ref_url="https://bugzilla.suse.com/889061" source="BUGZILLA"/>
		<reference ref_id="889173" ref_url="https://bugzilla.suse.com/889173" source="BUGZILLA"/>
		<reference ref_id="889221" ref_url="https://bugzilla.suse.com/889221" source="BUGZILLA"/>
		<reference ref_id="889451" ref_url="https://bugzilla.suse.com/889451" source="BUGZILLA"/>
		<reference ref_id="889614" ref_url="https://bugzilla.suse.com/889614" source="BUGZILLA"/>
		<reference ref_id="889727" ref_url="https://bugzilla.suse.com/889727" source="BUGZILLA"/>
		<reference ref_id="890297" ref_url="https://bugzilla.suse.com/890297" source="BUGZILLA"/>
		<reference ref_id="890426" ref_url="https://bugzilla.suse.com/890426" source="BUGZILLA"/>
		<reference ref_id="890513" ref_url="https://bugzilla.suse.com/890513" source="BUGZILLA"/>
		<reference ref_id="890526" ref_url="https://bugzilla.suse.com/890526" source="BUGZILLA"/>
		<reference ref_id="891087" ref_url="https://bugzilla.suse.com/891087" source="BUGZILLA"/>
		<reference ref_id="891211" ref_url="https://bugzilla.suse.com/891211" source="BUGZILLA"/>
		<reference ref_id="891212" ref_url="https://bugzilla.suse.com/891212" source="BUGZILLA"/>
		<reference ref_id="891259" ref_url="https://bugzilla.suse.com/891259" source="BUGZILLA"/>
		<reference ref_id="891277" ref_url="https://bugzilla.suse.com/891277" source="BUGZILLA"/>
		<reference ref_id="891281" ref_url="https://bugzilla.suse.com/891281" source="BUGZILLA"/>
		<reference ref_id="891368" ref_url="https://bugzilla.suse.com/891368" source="BUGZILLA"/>
		<reference ref_id="891619" ref_url="https://bugzilla.suse.com/891619" source="BUGZILLA"/>
		<reference ref_id="891641" ref_url="https://bugzilla.suse.com/891641" source="BUGZILLA"/>
		<reference ref_id="891746" ref_url="https://bugzilla.suse.com/891746" source="BUGZILLA"/>
		<reference ref_id="891790" ref_url="https://bugzilla.suse.com/891790" source="BUGZILLA"/>
		<reference ref_id="892200" ref_url="https://bugzilla.suse.com/892200" source="BUGZILLA"/>
		<reference ref_id="892490" ref_url="https://bugzilla.suse.com/892490" source="BUGZILLA"/>
		<reference ref_id="892723" ref_url="https://bugzilla.suse.com/892723" source="BUGZILLA"/>
		<reference ref_id="892782" ref_url="https://bugzilla.suse.com/892782" source="BUGZILLA"/>
		<reference ref_id="893064" ref_url="https://bugzilla.suse.com/893064" source="BUGZILLA"/>
		<reference ref_id="893496" ref_url="https://bugzilla.suse.com/893496" source="BUGZILLA"/>
		<reference ref_id="893596" ref_url="https://bugzilla.suse.com/893596" source="BUGZILLA"/>
		<reference ref_id="893758" ref_url="https://bugzilla.suse.com/893758" source="BUGZILLA"/>
		<reference ref_id="894058" ref_url="https://bugzilla.suse.com/894058" source="BUGZILLA"/>
		<reference ref_id="894200" ref_url="https://bugzilla.suse.com/894200" source="BUGZILLA"/>
		<reference ref_id="894213" ref_url="https://bugzilla.suse.com/894213" source="BUGZILLA"/>
		<reference ref_id="894895" ref_url="https://bugzilla.suse.com/894895" source="BUGZILLA"/>
		<reference ref_id="895221" ref_url="https://bugzilla.suse.com/895221" source="BUGZILLA"/>
		<reference ref_id="895387" ref_url="https://bugzilla.suse.com/895387" source="BUGZILLA"/>
		<reference ref_id="895468" ref_url="https://bugzilla.suse.com/895468" source="BUGZILLA"/>
		<reference ref_id="895608" ref_url="https://bugzilla.suse.com/895608" source="BUGZILLA"/>
		<reference ref_id="895680" ref_url="https://bugzilla.suse.com/895680" source="BUGZILLA"/>
		<reference ref_id="895841" ref_url="https://bugzilla.suse.com/895841" source="BUGZILLA"/>
		<reference ref_id="895983" ref_url="https://bugzilla.suse.com/895983" source="BUGZILLA"/>
		<reference ref_id="896382" ref_url="https://bugzilla.suse.com/896382" source="BUGZILLA"/>
		<reference ref_id="896390" ref_url="https://bugzilla.suse.com/896390" source="BUGZILLA"/>
		<reference ref_id="896391" ref_url="https://bugzilla.suse.com/896391" source="BUGZILLA"/>
		<reference ref_id="896392" ref_url="https://bugzilla.suse.com/896392" source="BUGZILLA"/>
		<reference ref_id="896415" ref_url="https://bugzilla.suse.com/896415" source="BUGZILLA"/>
		<reference ref_id="896484" ref_url="https://bugzilla.suse.com/896484" source="BUGZILLA"/>
		<reference ref_id="896689" ref_url="https://bugzilla.suse.com/896689" source="BUGZILLA"/>
		<reference ref_id="897502" ref_url="https://bugzilla.suse.com/897502" source="BUGZILLA"/>
		<reference ref_id="897694" ref_url="https://bugzilla.suse.com/897694" source="BUGZILLA"/>
		<reference ref_id="897708" ref_url="https://bugzilla.suse.com/897708" source="BUGZILLA"/>
		<reference ref_id="898295" ref_url="https://bugzilla.suse.com/898295" source="BUGZILLA"/>
		<reference ref_id="898375" ref_url="https://bugzilla.suse.com/898375" source="BUGZILLA"/>
		<reference ref_id="898554" ref_url="https://bugzilla.suse.com/898554" source="BUGZILLA"/>
		<reference ref_id="899192" ref_url="https://bugzilla.suse.com/899192" source="BUGZILLA"/>
		<reference ref_id="899574" ref_url="https://bugzilla.suse.com/899574" source="BUGZILLA"/>
		<reference ref_id="899843" ref_url="https://bugzilla.suse.com/899843" source="BUGZILLA"/>
		<reference ref_id="900279" ref_url="https://bugzilla.suse.com/900279" source="BUGZILLA"/>
		<reference ref_id="900644" ref_url="https://bugzilla.suse.com/900644" source="BUGZILLA"/>
		<reference ref_id="900881" ref_url="https://bugzilla.suse.com/900881" source="BUGZILLA"/>
		<reference ref_id="901638" ref_url="https://bugzilla.suse.com/901638" source="BUGZILLA"/>
		<reference ref_id="902232" ref_url="https://bugzilla.suse.com/902232" source="BUGZILLA"/>
		<reference ref_id="902286" ref_url="https://bugzilla.suse.com/902286" source="BUGZILLA"/>
		<reference ref_id="902346" ref_url="https://bugzilla.suse.com/902346" source="BUGZILLA"/>
		<reference ref_id="902349" ref_url="https://bugzilla.suse.com/902349" source="BUGZILLA"/>
		<reference ref_id="902351" ref_url="https://bugzilla.suse.com/902351" source="BUGZILLA"/>
		<reference ref_id="902675" ref_url="https://bugzilla.suse.com/902675" source="BUGZILLA"/>
		<reference ref_id="903096" ref_url="https://bugzilla.suse.com/903096" source="BUGZILLA"/>
		<reference ref_id="903331" ref_url="https://bugzilla.suse.com/903331" source="BUGZILLA"/>
		<reference ref_id="903640" ref_url="https://bugzilla.suse.com/903640" source="BUGZILLA"/>
		<reference ref_id="903653" ref_url="https://bugzilla.suse.com/903653" source="BUGZILLA"/>
		<reference ref_id="904013" ref_url="https://bugzilla.suse.com/904013" source="BUGZILLA"/>
		<reference ref_id="904053" ref_url="https://bugzilla.suse.com/904053" source="BUGZILLA"/>
		<reference ref_id="904242" ref_url="https://bugzilla.suse.com/904242" source="BUGZILLA"/>
		<reference ref_id="904358" ref_url="https://bugzilla.suse.com/904358" source="BUGZILLA"/>
		<reference ref_id="904659" ref_url="https://bugzilla.suse.com/904659" source="BUGZILLA"/>
		<reference ref_id="904671" ref_url="https://bugzilla.suse.com/904671" source="BUGZILLA"/>
		<reference ref_id="904700" ref_url="https://bugzilla.suse.com/904700" source="BUGZILLA"/>
		<reference ref_id="904883" ref_url="https://bugzilla.suse.com/904883" source="BUGZILLA"/>
		<reference ref_id="904901" ref_url="https://bugzilla.suse.com/904901" source="BUGZILLA"/>
		<reference ref_id="905100" ref_url="https://bugzilla.suse.com/905100" source="BUGZILLA"/>
		<reference ref_id="905304" ref_url="https://bugzilla.suse.com/905304" source="BUGZILLA"/>
		<reference ref_id="905312" ref_url="https://bugzilla.suse.com/905312" source="BUGZILLA"/>
		<reference ref_id="905522" ref_url="https://bugzilla.suse.com/905522" source="BUGZILLA"/>
		<reference ref_id="905799" ref_url="https://bugzilla.suse.com/905799" source="BUGZILLA"/>
		<reference ref_id="906027" ref_url="https://bugzilla.suse.com/906027" source="BUGZILLA"/>
		<reference ref_id="906586" ref_url="https://bugzilla.suse.com/906586" source="BUGZILLA"/>
		<reference ref_id="907196" ref_url="https://bugzilla.suse.com/907196" source="BUGZILLA"/>
		<reference ref_id="907338" ref_url="https://bugzilla.suse.com/907338" source="BUGZILLA"/>
		<reference ref_id="907551" ref_url="https://bugzilla.suse.com/907551" source="BUGZILLA"/>
		<reference ref_id="907611" ref_url="https://bugzilla.suse.com/907611" source="BUGZILLA"/>
		<reference ref_id="907818" ref_url="https://bugzilla.suse.com/907818" source="BUGZILLA"/>
		<reference ref_id="908069" ref_url="https://bugzilla.suse.com/908069" source="BUGZILLA"/>
		<reference ref_id="908163" ref_url="https://bugzilla.suse.com/908163" source="BUGZILLA"/>
		<reference ref_id="908393" ref_url="https://bugzilla.suse.com/908393" source="BUGZILLA"/>
		<reference ref_id="908550" ref_url="https://bugzilla.suse.com/908550" source="BUGZILLA"/>
		<reference ref_id="908551" ref_url="https://bugzilla.suse.com/908551" source="BUGZILLA"/>
		<reference ref_id="908572" ref_url="https://bugzilla.suse.com/908572" source="BUGZILLA"/>
		<reference ref_id="908706" ref_url="https://bugzilla.suse.com/908706" source="BUGZILLA"/>
		<reference ref_id="908825" ref_url="https://bugzilla.suse.com/908825" source="BUGZILLA"/>
		<reference ref_id="909077" ref_url="https://bugzilla.suse.com/909077" source="BUGZILLA"/>
		<reference ref_id="909078" ref_url="https://bugzilla.suse.com/909078" source="BUGZILLA"/>
		<reference ref_id="909088" ref_url="https://bugzilla.suse.com/909088" source="BUGZILLA"/>
		<reference ref_id="909092" ref_url="https://bugzilla.suse.com/909092" source="BUGZILLA"/>
		<reference ref_id="909093" ref_url="https://bugzilla.suse.com/909093" source="BUGZILLA"/>
		<reference ref_id="909095" ref_url="https://bugzilla.suse.com/909095" source="BUGZILLA"/>
		<reference ref_id="909264" ref_url="https://bugzilla.suse.com/909264" source="BUGZILLA"/>
		<reference ref_id="909309" ref_url="https://bugzilla.suse.com/909309" source="BUGZILLA"/>
		<reference ref_id="909312" ref_url="https://bugzilla.suse.com/909312" source="BUGZILLA"/>
		<reference ref_id="909477" ref_url="https://bugzilla.suse.com/909477" source="BUGZILLA"/>
		<reference ref_id="909565" ref_url="https://bugzilla.suse.com/909565" source="BUGZILLA"/>
		<reference ref_id="909684" ref_url="https://bugzilla.suse.com/909684" source="BUGZILLA"/>
		<reference ref_id="909740" ref_url="https://bugzilla.suse.com/909740" source="BUGZILLA"/>
		<reference ref_id="909846" ref_url="https://bugzilla.suse.com/909846" source="BUGZILLA"/>
		<reference ref_id="910013" ref_url="https://bugzilla.suse.com/910013" source="BUGZILLA"/>
		<reference ref_id="910150" ref_url="https://bugzilla.suse.com/910150" source="BUGZILLA"/>
		<reference ref_id="910159" ref_url="https://bugzilla.suse.com/910159" source="BUGZILLA"/>
		<reference ref_id="910251" ref_url="https://bugzilla.suse.com/910251" source="BUGZILLA"/>
		<reference ref_id="910321" ref_url="https://bugzilla.suse.com/910321" source="BUGZILLA"/>
		<reference ref_id="910322" ref_url="https://bugzilla.suse.com/910322" source="BUGZILLA"/>
		<reference ref_id="910517" ref_url="https://bugzilla.suse.com/910517" source="BUGZILLA"/>
		<reference ref_id="911181" ref_url="https://bugzilla.suse.com/911181" source="BUGZILLA"/>
		<reference ref_id="911325" ref_url="https://bugzilla.suse.com/911325" source="BUGZILLA"/>
		<reference ref_id="911326" ref_url="https://bugzilla.suse.com/911326" source="BUGZILLA"/>
		<reference ref_id="912171" ref_url="https://bugzilla.suse.com/912171" source="BUGZILLA"/>
		<reference ref_id="912202" ref_url="https://bugzilla.suse.com/912202" source="BUGZILLA"/>
		<reference ref_id="912705" ref_url="https://bugzilla.suse.com/912705" source="BUGZILLA"/>
		<reference ref_id="912741" ref_url="https://bugzilla.suse.com/912741" source="BUGZILLA"/>
		<reference ref_id="913059" ref_url="https://bugzilla.suse.com/913059" source="BUGZILLA"/>
		<reference ref_id="913080" ref_url="https://bugzilla.suse.com/913080" source="BUGZILLA"/>
		<reference ref_id="913598" ref_url="https://bugzilla.suse.com/913598" source="BUGZILLA"/>
		<reference ref_id="914355" ref_url="https://bugzilla.suse.com/914355" source="BUGZILLA"/>
		<reference ref_id="914423" ref_url="https://bugzilla.suse.com/914423" source="BUGZILLA"/>
		<reference ref_id="914726" ref_url="https://bugzilla.suse.com/914726" source="BUGZILLA"/>
		<reference ref_id="914742" ref_url="https://bugzilla.suse.com/914742" source="BUGZILLA"/>
		<reference ref_id="914818" ref_url="https://bugzilla.suse.com/914818" source="BUGZILLA"/>
		<reference ref_id="914987" ref_url="https://bugzilla.suse.com/914987" source="BUGZILLA"/>
		<reference ref_id="915045" ref_url="https://bugzilla.suse.com/915045" source="BUGZILLA"/>
		<reference ref_id="915200" ref_url="https://bugzilla.suse.com/915200" source="BUGZILLA"/>
		<reference ref_id="915209" ref_url="https://bugzilla.suse.com/915209" source="BUGZILLA"/>
		<reference ref_id="915322" ref_url="https://bugzilla.suse.com/915322" source="BUGZILLA"/>
		<reference ref_id="915335" ref_url="https://bugzilla.suse.com/915335" source="BUGZILLA"/>
		<reference ref_id="915577" ref_url="https://bugzilla.suse.com/915577" source="BUGZILLA"/>
		<reference ref_id="915791" ref_url="https://bugzilla.suse.com/915791" source="BUGZILLA"/>
		<reference ref_id="915826" ref_url="https://bugzilla.suse.com/915826" source="BUGZILLA"/>
		<reference ref_id="916515" ref_url="https://bugzilla.suse.com/916515" source="BUGZILLA"/>
		<reference ref_id="916521" ref_url="https://bugzilla.suse.com/916521" source="BUGZILLA"/>
		<reference ref_id="916848" ref_url="https://bugzilla.suse.com/916848" source="BUGZILLA"/>
		<reference ref_id="916982" ref_url="https://bugzilla.suse.com/916982" source="BUGZILLA"/>
		<reference ref_id="917093" ref_url="https://bugzilla.suse.com/917093" source="BUGZILLA"/>
		<reference ref_id="917120" ref_url="https://bugzilla.suse.com/917120" source="BUGZILLA"/>
		<reference ref_id="917648" ref_url="https://bugzilla.suse.com/917648" source="BUGZILLA"/>
		<reference ref_id="917684" ref_url="https://bugzilla.suse.com/917684" source="BUGZILLA"/>
		<reference ref_id="917830" ref_url="https://bugzilla.suse.com/917830" source="BUGZILLA"/>
		<reference ref_id="917839" ref_url="https://bugzilla.suse.com/917839" source="BUGZILLA"/>
		<reference ref_id="917884" ref_url="https://bugzilla.suse.com/917884" source="BUGZILLA"/>
		<reference ref_id="918333" ref_url="https://bugzilla.suse.com/918333" source="BUGZILLA"/>
		<reference ref_id="919007" ref_url="https://bugzilla.suse.com/919007" source="BUGZILLA"/>
		<reference ref_id="919018" ref_url="https://bugzilla.suse.com/919018" source="BUGZILLA"/>
		<reference ref_id="919357" ref_url="https://bugzilla.suse.com/919357" source="BUGZILLA"/>
		<reference ref_id="919463" ref_url="https://bugzilla.suse.com/919463" source="BUGZILLA"/>
		<reference ref_id="919589" ref_url="https://bugzilla.suse.com/919589" source="BUGZILLA"/>
		<reference ref_id="919682" ref_url="https://bugzilla.suse.com/919682" source="BUGZILLA"/>
		<reference ref_id="919808" ref_url="https://bugzilla.suse.com/919808" source="BUGZILLA"/>
		<reference ref_id="920250" ref_url="https://bugzilla.suse.com/920250" source="BUGZILLA"/>
		<reference ref_id="921769" ref_url="https://bugzilla.suse.com/921769" source="BUGZILLA"/>
		<reference ref_id="922583" ref_url="https://bugzilla.suse.com/922583" source="BUGZILLA"/>
		<reference ref_id="923344" ref_url="https://bugzilla.suse.com/923344" source="BUGZILLA"/>
		<reference ref_id="924142" ref_url="https://bugzilla.suse.com/924142" source="BUGZILLA"/>
		<reference ref_id="924271" ref_url="https://bugzilla.suse.com/924271" source="BUGZILLA"/>
		<reference ref_id="924282" ref_url="https://bugzilla.suse.com/924282" source="BUGZILLA"/>
		<reference ref_id="924333" ref_url="https://bugzilla.suse.com/924333" source="BUGZILLA"/>
		<reference ref_id="924340" ref_url="https://bugzilla.suse.com/924340" source="BUGZILLA"/>
		<reference ref_id="925012" ref_url="https://bugzilla.suse.com/925012" source="BUGZILLA"/>
		<reference ref_id="925370" ref_url="https://bugzilla.suse.com/925370" source="BUGZILLA"/>
		<reference ref_id="925443" ref_url="https://bugzilla.suse.com/925443" source="BUGZILLA"/>
		<reference ref_id="925567" ref_url="https://bugzilla.suse.com/925567" source="BUGZILLA"/>
		<reference ref_id="925729" ref_url="https://bugzilla.suse.com/925729" source="BUGZILLA"/>
		<reference ref_id="926016" ref_url="https://bugzilla.suse.com/926016" source="BUGZILLA"/>
		<reference ref_id="926240" ref_url="https://bugzilla.suse.com/926240" source="BUGZILLA"/>
		<reference ref_id="926439" ref_url="https://bugzilla.suse.com/926439" source="BUGZILLA"/>
		<reference ref_id="926767" ref_url="https://bugzilla.suse.com/926767" source="BUGZILLA"/>
		<reference ref_id="927190" ref_url="https://bugzilla.suse.com/927190" source="BUGZILLA"/>
		<reference ref_id="927257" ref_url="https://bugzilla.suse.com/927257" source="BUGZILLA"/>
		<reference ref_id="927262" ref_url="https://bugzilla.suse.com/927262" source="BUGZILLA"/>
		<reference ref_id="927338" ref_url="https://bugzilla.suse.com/927338" source="BUGZILLA"/>
		<reference ref_id="928122" ref_url="https://bugzilla.suse.com/928122" source="BUGZILLA"/>
		<reference ref_id="928130" ref_url="https://bugzilla.suse.com/928130" source="BUGZILLA"/>
		<reference ref_id="928142" ref_url="https://bugzilla.suse.com/928142" source="BUGZILLA"/>
		<reference ref_id="928333" ref_url="https://bugzilla.suse.com/928333" source="BUGZILLA"/>
		<reference ref_id="928970" ref_url="https://bugzilla.suse.com/928970" source="BUGZILLA"/>
		<reference ref_id="929145" ref_url="https://bugzilla.suse.com/929145" source="BUGZILLA"/>
		<reference ref_id="929148" ref_url="https://bugzilla.suse.com/929148" source="BUGZILLA"/>
		<reference ref_id="929283" ref_url="https://bugzilla.suse.com/929283" source="BUGZILLA"/>
		<reference ref_id="929525" ref_url="https://bugzilla.suse.com/929525" source="BUGZILLA"/>
		<reference ref_id="929647" ref_url="https://bugzilla.suse.com/929647" source="BUGZILLA"/>
		<reference ref_id="930145" ref_url="https://bugzilla.suse.com/930145" source="BUGZILLA"/>
		<reference ref_id="930171" ref_url="https://bugzilla.suse.com/930171" source="BUGZILLA"/>
		<reference ref_id="930226" ref_url="https://bugzilla.suse.com/930226" source="BUGZILLA"/>
		<reference ref_id="930284" ref_url="https://bugzilla.suse.com/930284" source="BUGZILLA"/>
		<reference ref_id="930401" ref_url="https://bugzilla.suse.com/930401" source="BUGZILLA"/>
		<reference ref_id="930669" ref_url="https://bugzilla.suse.com/930669" source="BUGZILLA"/>
		<reference ref_id="930786" ref_url="https://bugzilla.suse.com/930786" source="BUGZILLA"/>
		<reference ref_id="930788" ref_url="https://bugzilla.suse.com/930788" source="BUGZILLA"/>
		<reference ref_id="931014" ref_url="https://bugzilla.suse.com/931014" source="BUGZILLA"/>
		<reference ref_id="931015" ref_url="https://bugzilla.suse.com/931015" source="BUGZILLA"/>
		<reference ref_id="931850" ref_url="https://bugzilla.suse.com/931850" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2372" ref_url="https://www.suse.com/security/cve/CVE-2012-2372/" source="CVE"/>
		<reference ref_id="CVE-2012-4398" ref_url="https://www.suse.com/security/cve/CVE-2012-4398/" source="CVE"/>
		<reference ref_id="CVE-2013-0160" ref_url="https://www.suse.com/security/cve/CVE-2013-0160/" source="CVE"/>
		<reference ref_id="CVE-2013-1059" ref_url="https://www.suse.com/security/cve/CVE-2013-1059/" source="CVE"/>
		<reference ref_id="CVE-2013-1774" ref_url="https://www.suse.com/security/cve/CVE-2013-1774/" source="CVE"/>
		<reference ref_id="CVE-2013-1819" ref_url="https://www.suse.com/security/cve/CVE-2013-1819/" source="CVE"/>
		<reference ref_id="CVE-2013-1929" ref_url="https://www.suse.com/security/cve/CVE-2013-1929/" source="CVE"/>
		<reference ref_id="CVE-2013-1979" ref_url="https://www.suse.com/security/cve/CVE-2013-1979/" source="CVE"/>
		<reference ref_id="CVE-2013-2146" ref_url="https://www.suse.com/security/cve/CVE-2013-2146/" source="CVE"/>
		<reference ref_id="CVE-2013-2148" ref_url="https://www.suse.com/security/cve/CVE-2013-2148/" source="CVE"/>
		<reference ref_id="CVE-2013-2164" ref_url="https://www.suse.com/security/cve/CVE-2013-2164/" source="CVE"/>
		<reference ref_id="CVE-2013-2206" ref_url="https://www.suse.com/security/cve/CVE-2013-2206/" source="CVE"/>
		<reference ref_id="CVE-2013-2232" ref_url="https://www.suse.com/security/cve/CVE-2013-2232/" source="CVE"/>
		<reference ref_id="CVE-2013-2234" ref_url="https://www.suse.com/security/cve/CVE-2013-2234/" source="CVE"/>
		<reference ref_id="CVE-2013-2237" ref_url="https://www.suse.com/security/cve/CVE-2013-2237/" source="CVE"/>
		<reference ref_id="CVE-2013-2851" ref_url="https://www.suse.com/security/cve/CVE-2013-2851/" source="CVE"/>
		<reference ref_id="CVE-2013-2852" ref_url="https://www.suse.com/security/cve/CVE-2013-2852/" source="CVE"/>
		<reference ref_id="CVE-2013-2889" ref_url="https://www.suse.com/security/cve/CVE-2013-2889/" source="CVE"/>
		<reference ref_id="CVE-2013-2893" ref_url="https://www.suse.com/security/cve/CVE-2013-2893/" source="CVE"/>
		<reference ref_id="CVE-2013-2897" ref_url="https://www.suse.com/security/cve/CVE-2013-2897/" source="CVE"/>
		<reference ref_id="CVE-2013-2899" ref_url="https://www.suse.com/security/cve/CVE-2013-2899/" source="CVE"/>
		<reference ref_id="CVE-2013-2929" ref_url="https://www.suse.com/security/cve/CVE-2013-2929/" source="CVE"/>
		<reference ref_id="CVE-2013-2930" ref_url="https://www.suse.com/security/cve/CVE-2013-2930/" source="CVE"/>
		<reference ref_id="CVE-2013-3076" ref_url="https://www.suse.com/security/cve/CVE-2013-3076/" source="CVE"/>
		<reference ref_id="CVE-2013-3222" ref_url="https://www.suse.com/security/cve/CVE-2013-3222/" source="CVE"/>
		<reference ref_id="CVE-2013-3223" ref_url="https://www.suse.com/security/cve/CVE-2013-3223/" source="CVE"/>
		<reference ref_id="CVE-2013-3224" ref_url="https://www.suse.com/security/cve/CVE-2013-3224/" source="CVE"/>
		<reference ref_id="CVE-2013-3225" ref_url="https://www.suse.com/security/cve/CVE-2013-3225/" source="CVE"/>
		<reference ref_id="CVE-2013-3227" ref_url="https://www.suse.com/security/cve/CVE-2013-3227/" source="CVE"/>
		<reference ref_id="CVE-2013-3228" ref_url="https://www.suse.com/security/cve/CVE-2013-3228/" source="CVE"/>
		<reference ref_id="CVE-2013-3229" ref_url="https://www.suse.com/security/cve/CVE-2013-3229/" source="CVE"/>
		<reference ref_id="CVE-2013-3231" ref_url="https://www.suse.com/security/cve/CVE-2013-3231/" source="CVE"/>
		<reference ref_id="CVE-2013-3232" ref_url="https://www.suse.com/security/cve/CVE-2013-3232/" source="CVE"/>
		<reference ref_id="CVE-2013-3234" ref_url="https://www.suse.com/security/cve/CVE-2013-3234/" source="CVE"/>
		<reference ref_id="CVE-2013-3235" ref_url="https://www.suse.com/security/cve/CVE-2013-3235/" source="CVE"/>
		<reference ref_id="CVE-2013-3301" ref_url="https://www.suse.com/security/cve/CVE-2013-3301/" source="CVE"/>
		<reference ref_id="CVE-2013-4162" ref_url="https://www.suse.com/security/cve/CVE-2013-4162/" source="CVE"/>
		<reference ref_id="CVE-2013-4163" ref_url="https://www.suse.com/security/cve/CVE-2013-4163/" source="CVE"/>
		<reference ref_id="CVE-2013-4299" ref_url="https://www.suse.com/security/cve/CVE-2013-4299/" source="CVE"/>
		<reference ref_id="CVE-2013-4345" ref_url="https://www.suse.com/security/cve/CVE-2013-4345/" source="CVE"/>
		<reference ref_id="CVE-2013-4470" ref_url="https://www.suse.com/security/cve/CVE-2013-4470/" source="CVE"/>
		<reference ref_id="CVE-2013-4483" ref_url="https://www.suse.com/security/cve/CVE-2013-4483/" source="CVE"/>
		<reference ref_id="CVE-2013-4511" ref_url="https://www.suse.com/security/cve/CVE-2013-4511/" source="CVE"/>
		<reference ref_id="CVE-2013-4514" ref_url="https://www.suse.com/security/cve/CVE-2013-4514/" source="CVE"/>
		<reference ref_id="CVE-2013-4515" ref_url="https://www.suse.com/security/cve/CVE-2013-4515/" source="CVE"/>
		<reference ref_id="CVE-2013-4579" ref_url="https://www.suse.com/security/cve/CVE-2013-4579/" source="CVE"/>
		<reference ref_id="CVE-2013-4587" ref_url="https://www.suse.com/security/cve/CVE-2013-4587/" source="CVE"/>
		<reference ref_id="CVE-2013-4592" ref_url="https://www.suse.com/security/cve/CVE-2013-4592/" source="CVE"/>
		<reference ref_id="CVE-2013-6367" ref_url="https://www.suse.com/security/cve/CVE-2013-6367/" source="CVE"/>
		<reference ref_id="CVE-2013-6368" ref_url="https://www.suse.com/security/cve/CVE-2013-6368/" source="CVE"/>
		<reference ref_id="CVE-2013-6376" ref_url="https://www.suse.com/security/cve/CVE-2013-6376/" source="CVE"/>
		<reference ref_id="CVE-2013-6378" ref_url="https://www.suse.com/security/cve/CVE-2013-6378/" source="CVE"/>
		<reference ref_id="CVE-2013-6380" ref_url="https://www.suse.com/security/cve/CVE-2013-6380/" source="CVE"/>
		<reference ref_id="CVE-2013-6382" ref_url="https://www.suse.com/security/cve/CVE-2013-6382/" source="CVE"/>
		<reference ref_id="CVE-2013-6383" ref_url="https://www.suse.com/security/cve/CVE-2013-6383/" source="CVE"/>
		<reference ref_id="CVE-2013-6463" ref_url="https://www.suse.com/security/cve/CVE-2013-6463/" source="CVE"/>
		<reference ref_id="CVE-2013-6885" ref_url="https://www.suse.com/security/cve/CVE-2013-6885/" source="CVE"/>
		<reference ref_id="CVE-2013-7027" ref_url="https://www.suse.com/security/cve/CVE-2013-7027/" source="CVE"/>
		<reference ref_id="CVE-2013-7263" ref_url="https://www.suse.com/security/cve/CVE-2013-7263/" source="CVE"/>
		<reference ref_id="CVE-2013-7264" ref_url="https://www.suse.com/security/cve/CVE-2013-7264/" source="CVE"/>
		<reference ref_id="CVE-2013-7265" ref_url="https://www.suse.com/security/cve/CVE-2013-7265/" source="CVE"/>
		<reference ref_id="CVE-2013-7339" ref_url="https://www.suse.com/security/cve/CVE-2013-7339/" source="CVE"/>
		<reference ref_id="CVE-2014-0055" ref_url="https://www.suse.com/security/cve/CVE-2014-0055/" source="CVE"/>
		<reference ref_id="CVE-2014-0069" ref_url="https://www.suse.com/security/cve/CVE-2014-0069/" source="CVE"/>
		<reference ref_id="CVE-2014-0077" ref_url="https://www.suse.com/security/cve/CVE-2014-0077/" source="CVE"/>
		<reference ref_id="CVE-2014-0101" ref_url="https://www.suse.com/security/cve/CVE-2014-0101/" source="CVE"/>
		<reference ref_id="CVE-2014-0131" ref_url="https://www.suse.com/security/cve/CVE-2014-0131/" source="CVE"/>
		<reference ref_id="CVE-2014-0155" ref_url="https://www.suse.com/security/cve/CVE-2014-0155/" source="CVE"/>
		<reference ref_id="CVE-2014-0181" ref_url="https://www.suse.com/security/cve/CVE-2014-0181/" source="CVE"/>
		<reference ref_id="CVE-2014-0196" ref_url="https://www.suse.com/security/cve/CVE-2014-0196/" source="CVE"/>
		<reference ref_id="CVE-2014-1444" ref_url="https://www.suse.com/security/cve/CVE-2014-1444/" source="CVE"/>
		<reference ref_id="CVE-2014-1445" ref_url="https://www.suse.com/security/cve/CVE-2014-1445/" source="CVE"/>
		<reference ref_id="CVE-2014-1446" ref_url="https://www.suse.com/security/cve/CVE-2014-1446/" source="CVE"/>
		<reference ref_id="CVE-2014-1737" ref_url="https://www.suse.com/security/cve/CVE-2014-1737/" source="CVE"/>
		<reference ref_id="CVE-2014-1738" ref_url="https://www.suse.com/security/cve/CVE-2014-1738/" source="CVE"/>
		<reference ref_id="CVE-2014-1739" ref_url="https://www.suse.com/security/cve/CVE-2014-1739/" source="CVE"/>
		<reference ref_id="CVE-2014-1874" ref_url="https://www.suse.com/security/cve/CVE-2014-1874/" source="CVE"/>
		<reference ref_id="CVE-2014-2309" ref_url="https://www.suse.com/security/cve/CVE-2014-2309/" source="CVE"/>
		<reference ref_id="CVE-2014-2523" ref_url="https://www.suse.com/security/cve/CVE-2014-2523/" source="CVE"/>
		<reference ref_id="CVE-2014-2678" ref_url="https://www.suse.com/security/cve/CVE-2014-2678/" source="CVE"/>
		<reference ref_id="CVE-2014-2706" ref_url="https://www.suse.com/security/cve/CVE-2014-2706/" source="CVE"/>
		<reference ref_id="CVE-2014-2851" ref_url="https://www.suse.com/security/cve/CVE-2014-2851/" source="CVE"/>
		<reference ref_id="CVE-2014-3122" ref_url="https://www.suse.com/security/cve/CVE-2014-3122/" source="CVE"/>
		<reference ref_id="CVE-2014-3144" ref_url="https://www.suse.com/security/cve/CVE-2014-3144/" source="CVE"/>
		<reference ref_id="CVE-2014-3145" ref_url="https://www.suse.com/security/cve/CVE-2014-3145/" source="CVE"/>
		<reference ref_id="CVE-2014-3153" ref_url="https://www.suse.com/security/cve/CVE-2014-3153/" source="CVE"/>
		<reference ref_id="CVE-2014-3181" ref_url="https://www.suse.com/security/cve/CVE-2014-3181/" source="CVE"/>
		<reference ref_id="CVE-2014-3184" ref_url="https://www.suse.com/security/cve/CVE-2014-3184/" source="CVE"/>
		<reference ref_id="CVE-2014-3185" ref_url="https://www.suse.com/security/cve/CVE-2014-3185/" source="CVE"/>
		<reference ref_id="CVE-2014-3186" ref_url="https://www.suse.com/security/cve/CVE-2014-3186/" source="CVE"/>
		<reference ref_id="CVE-2014-3601" ref_url="https://www.suse.com/security/cve/CVE-2014-3601/" source="CVE"/>
		<reference ref_id="CVE-2014-3610" ref_url="https://www.suse.com/security/cve/CVE-2014-3610/" source="CVE"/>
		<reference ref_id="CVE-2014-3646" ref_url="https://www.suse.com/security/cve/CVE-2014-3646/" source="CVE"/>
		<reference ref_id="CVE-2014-3647" ref_url="https://www.suse.com/security/cve/CVE-2014-3647/" source="CVE"/>
		<reference ref_id="CVE-2014-3673" ref_url="https://www.suse.com/security/cve/CVE-2014-3673/" source="CVE"/>
		<reference ref_id="CVE-2014-3687" ref_url="https://www.suse.com/security/cve/CVE-2014-3687/" source="CVE"/>
		<reference ref_id="CVE-2014-3688" ref_url="https://www.suse.com/security/cve/CVE-2014-3688/" source="CVE"/>
		<reference ref_id="CVE-2014-3690" ref_url="https://www.suse.com/security/cve/CVE-2014-3690/" source="CVE"/>
		<reference ref_id="CVE-2014-3917" ref_url="https://www.suse.com/security/cve/CVE-2014-3917/" source="CVE"/>
		<reference ref_id="CVE-2014-4027" ref_url="https://www.suse.com/security/cve/CVE-2014-4027/" source="CVE"/>
		<reference ref_id="CVE-2014-4171" ref_url="https://www.suse.com/security/cve/CVE-2014-4171/" source="CVE"/>
		<reference ref_id="CVE-2014-4508" ref_url="https://www.suse.com/security/cve/CVE-2014-4508/" source="CVE"/>
		<reference ref_id="CVE-2014-4608" ref_url="https://www.suse.com/security/cve/CVE-2014-4608/" source="CVE"/>
		<reference ref_id="CVE-2014-4652" ref_url="https://www.suse.com/security/cve/CVE-2014-4652/" source="CVE"/>
		<reference ref_id="CVE-2014-4653" ref_url="https://www.suse.com/security/cve/CVE-2014-4653/" source="CVE"/>
		<reference ref_id="CVE-2014-4654" ref_url="https://www.suse.com/security/cve/CVE-2014-4654/" source="CVE"/>
		<reference ref_id="CVE-2014-4655" ref_url="https://www.suse.com/security/cve/CVE-2014-4655/" source="CVE"/>
		<reference ref_id="CVE-2014-4656" ref_url="https://www.suse.com/security/cve/CVE-2014-4656/" source="CVE"/>
		<reference ref_id="CVE-2014-4667" ref_url="https://www.suse.com/security/cve/CVE-2014-4667/" source="CVE"/>
		<reference ref_id="CVE-2014-4699" ref_url="https://www.suse.com/security/cve/CVE-2014-4699/" source="CVE"/>
		<reference ref_id="CVE-2014-4943" ref_url="https://www.suse.com/security/cve/CVE-2014-4943/" source="CVE"/>
		<reference ref_id="CVE-2014-5077" ref_url="https://www.suse.com/security/cve/CVE-2014-5077/" source="CVE"/>
		<reference ref_id="CVE-2014-5471" ref_url="https://www.suse.com/security/cve/CVE-2014-5471/" source="CVE"/>
		<reference ref_id="CVE-2014-5472" ref_url="https://www.suse.com/security/cve/CVE-2014-5472/" source="CVE"/>
		<reference ref_id="CVE-2014-6410" ref_url="https://www.suse.com/security/cve/CVE-2014-6410/" source="CVE"/>
		<reference ref_id="CVE-2014-7822" ref_url="https://www.suse.com/security/cve/CVE-2014-7822/" source="CVE"/>
		<reference ref_id="CVE-2014-7826" ref_url="https://www.suse.com/security/cve/CVE-2014-7826/" source="CVE"/>
		<reference ref_id="CVE-2014-7841" ref_url="https://www.suse.com/security/cve/CVE-2014-7841/" source="CVE"/>
		<reference ref_id="CVE-2014-7842" ref_url="https://www.suse.com/security/cve/CVE-2014-7842/" source="CVE"/>
		<reference ref_id="CVE-2014-7970" ref_url="https://www.suse.com/security/cve/CVE-2014-7970/" source="CVE"/>
		<reference ref_id="CVE-2014-8086" ref_url="https://www.suse.com/security/cve/CVE-2014-8086/" source="CVE"/>
		<reference ref_id="CVE-2014-8133" ref_url="https://www.suse.com/security/cve/CVE-2014-8133/" source="CVE"/>
		<reference ref_id="CVE-2014-8134" ref_url="https://www.suse.com/security/cve/CVE-2014-8134/" source="CVE"/>
		<reference ref_id="CVE-2014-8159" ref_url="https://www.suse.com/security/cve/CVE-2014-8159/" source="CVE"/>
		<reference ref_id="CVE-2014-8160" ref_url="https://www.suse.com/security/cve/CVE-2014-8160/" source="CVE"/>
		<reference ref_id="CVE-2014-8369" ref_url="https://www.suse.com/security/cve/CVE-2014-8369/" source="CVE"/>
		<reference ref_id="CVE-2014-8559" ref_url="https://www.suse.com/security/cve/CVE-2014-8559/" source="CVE"/>
		<reference ref_id="CVE-2014-8709" ref_url="https://www.suse.com/security/cve/CVE-2014-8709/" source="CVE"/>
		<reference ref_id="CVE-2014-8884" ref_url="https://www.suse.com/security/cve/CVE-2014-8884/" source="CVE"/>
		<reference ref_id="CVE-2014-9090" ref_url="https://www.suse.com/security/cve/CVE-2014-9090/" source="CVE"/>
		<reference ref_id="CVE-2014-9322" ref_url="https://www.suse.com/security/cve/CVE-2014-9322/" source="CVE"/>
		<reference ref_id="CVE-2014-9419" ref_url="https://www.suse.com/security/cve/CVE-2014-9419/" source="CVE"/>
		<reference ref_id="CVE-2014-9420" ref_url="https://www.suse.com/security/cve/CVE-2014-9420/" source="CVE"/>
		<reference ref_id="CVE-2014-9529" ref_url="https://www.suse.com/security/cve/CVE-2014-9529/" source="CVE"/>
		<reference ref_id="CVE-2014-9584" ref_url="https://www.suse.com/security/cve/CVE-2014-9584/" source="CVE"/>
		<reference ref_id="CVE-2014-9585" ref_url="https://www.suse.com/security/cve/CVE-2014-9585/" source="CVE"/>
		<reference ref_id="CVE-2014-9683" ref_url="https://www.suse.com/security/cve/CVE-2014-9683/" source="CVE"/>
		<reference ref_id="CVE-2015-0777" ref_url="https://www.suse.com/security/cve/CVE-2015-0777/" source="CVE"/>
		<reference ref_id="CVE-2015-1421" ref_url="https://www.suse.com/security/cve/CVE-2015-1421/" source="CVE"/>
		<reference ref_id="CVE-2015-1593" ref_url="https://www.suse.com/security/cve/CVE-2015-1593/" source="CVE"/>
		<reference ref_id="CVE-2015-2041" ref_url="https://www.suse.com/security/cve/CVE-2015-2041/" source="CVE"/>
		<reference ref_id="CVE-2015-2042" ref_url="https://www.suse.com/security/cve/CVE-2015-2042/" source="CVE"/>
		<reference ref_id="CVE-2015-2150" ref_url="https://www.suse.com/security/cve/CVE-2015-2150/" source="CVE"/>
		<reference ref_id="CVE-2015-2830" ref_url="https://www.suse.com/security/cve/CVE-2015-2830/" source="CVE"/>
		<reference ref_id="CVE-2015-2922" ref_url="https://www.suse.com/security/cve/CVE-2015-2922/" source="CVE"/>
		<reference ref_id="CVE-2015-3331" ref_url="https://www.suse.com/security/cve/CVE-2015-3331/" source="CVE"/>
		<reference ref_id="CVE-2015-3339" ref_url="https://www.suse.com/security/cve/CVE-2015-3339/" source="CVE"/>
		<reference ref_id="CVE-2015-3636" ref_url="https://www.suse.com/security/cve/CVE-2015-3636/" source="CVE"/>
		<reference ref_id="SUSE-RU-2015:0621-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-March/002835.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix 
various bugs and security issues.

The following security bugs have been fixed:

    * 

      CVE-2014-1739: The media_device_enum_entities function in
      drivers/media/media-device.c in the Linux kernel before 3.14.6 does
      not initialize a certain data structure, which allows local users to
      obtain sensitive information from kernel memory by leveraging
      /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call
      (bnc#882804).

    * 

      CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not
      properly implement the interaction between range notification and
      hole punching, which allows local users to cause a denial of service
      (i_mutex hold) by using the mmap system call to access a hole, as
      demonstrated by interfering with intended shmem activity by blocking
      completion of (1) an MADV_REMOVE madvise call or (2) an
      FALLOC_FL_PUNCH_HOLE fallocate call (bnc#883518).

    * 

      CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through
      3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and
      the sep CPU feature flag is set, allows local users to cause a denial
      of service (OOPS and system crash) via an invalid syscall number, as
      demonstrated by number 1000 (bnc#883724).

    * 

      CVE-2014-4667: The sctp_association_free function in
      net/sctp/associola.c in the Linux kernel before 3.15.2 does not
      properly manage a certain backlog value, which allows remote
      attackers to cause a denial of service (socket outage) via a crafted
      SCTP packet (bnc#885422).

    * 

      CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the
      Linux kernel through 3.15.6 allows local users to gain privileges by
      leveraging data-structure differences between an l2tp socket and an
      inet socket (bnc#887082).

    * 

      CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c
      in the Linux kernel through 3.15.8, when SCTP authentication is
      enabled, allows remote attackers to cause a denial of service (NULL
      pointer dereference and OOPS) by starting to establish an association
      between two endpoints immediately after an exchange of INIT and INIT
      ACK chunks to establish an earlier association between these
      endpoints in the opposite direction (bnc#889173).

    * 

      CVE-2014-5471: Stack consumption vulnerability in the
      parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the
      Linux kernel through 3.16.1 allows local users to cause a denial of
      service (uncontrolled recursion, and system crash or reboot) via a
      crafted iso9660 image with a CL entry referring to a directory entry
      that has a CL entry. (bnc#892490)

    * 

      CVE-2014-5472: The parse_rock_ridge_inode_internal function in
      fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users
      to cause a denial of service (unkillable mount process) via a crafted
      iso9660 image with a self-referential CL entry. (bnc#892490)

    * 

      CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux
      kernel before 3.13.7 allows remote attackers to cause a denial of
      service (system crash) via network traffic that improperly interacts
      with the WLAN_STA_PS_STA state (aka power-save mode), related to
      sta_info.c and tx.c. (bnc#871797)

    * 

      CVE-2014-4027: The rd_build_device_space function in
      drivers/target/target_core_rd.c in the Linux kernel before 3.14 does
      not properly initialize a certain data structure, which allows local
      users to obtain sensitive information from ramdisk_mcp memory by
      leveraging access to a SCSI initiator. (bnc#882639)

    * 

      CVE-2014-3153 The futex_requeue function in kernel/futex.c in the
      Linux kernel through 3.14.5 does not ensure that calls have two
      different futex addresses, which allows local users to gain
      privileges via a crafted FUTEX_REQUEUE command that facilitates
      unsafe waiter modification. (bnc#880892)

    * 

      CVE-2014-6410: Avoid infinite loop when processing indirect ICBs
      (bnc#896689)

The following non-security bugs have been fixed:

    * ACPI / PAD: call schedule() when need_resched() is true (bnc#866911).
    * ACPI: Fix bug when ACPI reset register is implemented in system
      memory (bnc#882900).
    * ACPI: Limit access to custom_method (bnc#884333).
    * ALSA: hda - Enabling Realtek ALC 671 codec (bnc#891746).
    * Add option to automatically enforce module signatures when in Secure
      Boot mode (bnc#884333).
    * Add secure_modules() call (bnc#884333).
    * Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344).
    * Backported new patches of Lock down functions for UEFI secure boot
      Also updated series.conf and removed old patches.
    * Btrfs: Return EXDEV for cross file system snapshot.
    * Btrfs: abort the transaction when we does not find our extent ref.
    * Btrfs: avoid warning bomb of btrfs_invalidate_inodes.
    * Btrfs: cancel scrub on transaction abortion.
    * Btrfs: correctly set profile flags on seqlock retry.
    * Btrfs: does not check nodes for extent items.
    * Btrfs: fix a possible deadlock between scrub and transaction
      committing.
    * Btrfs: fix corruption after write/fsync failure + fsync + log
      recovery (bnc#894200).
    * Btrfs: fix csum tree corruption, duplicate and outdated checksums
      (bnc#891619).
    * Btrfs: fix double free in find_lock_delalloc_range.
    * Btrfs: fix possible memory leak in btrfs_create_tree().
    * Btrfs: fix use of uninit 'ret' in end_extent_writepage().
    * Btrfs: free delayed node outside of root-&gt;inode_lock (bnc#866864).
    * Btrfs: make DEV_INFO ioctl available to anyone.
    * Btrfs: make FS_INFO ioctl available to anyone.
    * Btrfs: make device scan less noisy.
    * Btrfs: make sure there are not any read requests before stopping
      workers.
    * Btrfs: more efficient io tree navigation on wait_extent_bit.
    * Btrfs: output warning instead of error when loading free space cache
      failed.
    * Btrfs: retrieve more info from FS_INFO ioctl.
    * Btrfs: return EPERM when deleting a default subvolume (bnc#869934).
    * Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol
      (bnc#866615).
    * Btrfs: use right type to get real comparison.
    * Btrfs: wake up @scrub_pause_wait as much as we can.
    * Btrfs: wake up transaction thread upon remount.
    * CacheFiles: Add missing retrieval completions (bnc#880344).
    * CacheFiles: Does not try to dump the index key if the cookie has been
      cleared (bnc#880344).
    * CacheFiles: Downgrade the requirements passed to the allocator
      (bnc#880344).
    * CacheFiles: Fix the marking of cached pages (bnc#880344).
    * CacheFiles: Implement invalidation (bnc#880344).
    * CacheFiles: Make some debugging statements conditional (bnc#880344).
    * Drivers: hv: util: Fix a bug in the KVP code (bnc#886840).
    * Drivers: hv: vmbus: Fix a bug in the channel callback dispatch code
      (bnc#886840).
    * FS-Cache: Add transition to handle invalidate immediately after
      lookup (bnc#880344).
    * FS-Cache: Check that there are no read ops when cookie relinquished
      (bnc#880344).
    * FS-Cache: Clear remaining page count on retrieval cancellation
      (bnc#880344).
    * FS-Cache: Convert the object event ID #defines into an enum
      (bnc#880344).
    * FS-Cache: Does not sleep in page release if __GFP_FS is not set
      (bnc#880344).
    * FS-Cache: Does not use spin_is_locked() in assertions (bnc#880344).
    * FS-Cache: Exclusive op submission can BUG if there is been an I/O
      error (bnc#880344).
    * FS-Cache: Fix __wait_on_atomic_t() to call the action func if the
      counter != 0 (bnc#880344).
    * FS-Cache: Fix object state machine to have separate work and wait
      states (bnc#880344).
    * FS-Cache: Fix operation state management and accounting (bnc#880344).
    * FS-Cache: Fix signal handling during waits (bnc#880344).
    * FS-Cache: Initialise the object event mask with the calculated mask
      (bnc#880344).
    * FS-Cache: Limit the number of I/O error reports for a cache
      (bnc#880344).
    * FS-Cache: Make cookie relinquishment wait for outstanding reads
      (bnc#880344).
    * FS-Cache: Mark cancellation of in-progress operation (bnc#880344).
    * FS-Cache: One of the write operation paths doeses not set the object
      state (bnc#880344).
    * FS-Cache: Provide proper invalidation (bnc#880344).
    * FS-Cache: Simplify cookie retention for fscache_objects, fixing oops
      (bnc#880344).
    * FS-Cache: The retrieval remaining-pages counter needs to be atomic_t
      (bnc#880344).
    * FS-Cache: Uninline fscache_object_init() (bnc#880344).
    * FS-Cache: Wrap checks on object state (bnc#880344).
    * HID: usbhid: add always-poll quirk (bnc#888607).
    * HID: usbhid: enable always-poll quirk for Elan Touchscreen
      (bnc#888607).
    * IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297).
    * Ignore 'flags' change to event_constraint (bnc#876114).
    * Ignore data_src/weight changes to perf_sample_data (bnc#876114).
    * NFS: Allow more operations in an NFSv4.1 request (bnc#890513).
    * NFS: Clean up helper function nfs4_select_rw_stateid() (bnc#888968).
    * NFS: Does not copy read delegation stateids in setattr (bnc#888968).
    * NFS: Does not use a delegation to open a file when returning that
      delegation (bnc#888968, bnc#892200, bnc#893596, bnc#893496)
    * NFS: Fixes for NFS RCU-walk support in line with code going upstream
    * NFS: Use FS-Cache invalidation (bnc#880344).
    * NFS: allow lockless access to access_cache (bnc#866130).
    * NFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts
      (bnc#888591).
    * NFS: nfs4_do_open should add negative results to the dcache
      (bnc#866130).
    * NFS: nfs_migrate_page() does not wait for FS-Cache to finish with a
      page (bnc#880344).
    * NFS: nfs_open_revalidate: only evaluate parent if it will be used
      (bnc#866130).
    * NFS: prepare for RCU-walk support but pushing tests later in code
      (bnc#866130).
    * NFS: support RCU_WALK in nfs_permission() (bnc#866130).
    * NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130).
    * NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130).
    * NFSD: Does not hand out delegations for 30 seconds after recalling
      them (bnc#880370).
    * NFSv4 set open access operation call flag in nfs4_init_opendata_res
      (bnc#888968, bnc#892200, bnc#893596, bnc#893496).
    * NFSv4: Add a helper for encoding opaque data (bnc#888968).
    * NFSv4: Add a helper for encoding stateids (bnc#888968).
    * NFSv4: Add helpers for basic copying of stateids (bnc#888968).
    * NFSv4: Clean up nfs4_select_rw_stateid() (bnc#888968).
    * NFSv4: Fix the return value of nfs4_select_rw_stateid (bnc#888968).
    * NFSv4: Rename nfs4_copy_stateid() (bnc#888968).
    * NFSv4: Resend the READ/WRITE RPC call if a stateid change causes an
      error (bnc#888968).
    * NFSv4: Simplify the struct nfs4_stateid (bnc#888968).
    * NFSv4: The stateid must remain the same for replayed RPC calls
      (bnc#888968).
    * NFSv4: nfs4_stateid_is_current should return 'true' for an invalid
      stateid (bnc#888968).
    * One more fix for kABI breakage.
    * PCI: Lock down BAR access when module security is enabled
      (bnc#884333).
    * PCI: enable MPS 'performance' setting to properly handle bridge MPS
      (bnc#883376).
    * PM / Hibernate: Add memory_rtree_find_bit function (bnc#860441).
    * PM / Hibernate: Create a Radix-Tree to store memory bitmap
      (bnc#860441).
    * PM / Hibernate: Implement position keeping in radix tree
      (bnc#860441).
    * PM / Hibernate: Iterate over set bits instead of PFNs in
      swsusp_free() (bnc#860441).
    * PM / Hibernate: Remove the old memory-bitmap implementation
      (bnc#860441).
    * PM / Hibernate: Touch Soft Lockup Watchdog in rtree_next_node
      (bnc#860441).
    * Restrict /dev/mem and /dev/kmem when module loading is restricted
      (bnc#884333).
    * Reuse existing 'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT
      (bnc#876114).
    * USB: handle LPM errors during device suspend correctly (bnc#849123).
    * Update kabi files to reflect fscache change (bnc#880344)
    * Update x86_64 config files: re-enable SENSORS_W83627EHF (bnc#891281)
    * VFS: Make more complete truncate operation available to CacheFiles
      (bnc#880344).
    * [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger (FATE#83366,
      ltc#83367).
    * acpi: Ignore acpi_rsdp kernel parameter when module loading is
      restricted (bnc#884333).
    * af_iucv: correct cleanup if listen backlog is full (bnc#885262,
      LTC#111728).
    * asus-wmi: Restrict debugfs interface when module loading is
      restricted (bnc#884333).
    * autofs4: allow RCU-walk to walk through autofs4 (bnc#866130).
    * autofs4: avoid taking fs_lock during rcu-walk (bnc#866130).
    * autofs4: does not take spinlock when not needed in
      autofs4_lookup_expiring (bnc#866130).
    * autofs4: factor should_expire() out of autofs4_expire_indirect
      (bnc#866130).
    * autofs4: make 'autofs4_can_expire' idempotent (bnc#866130).
    * autofs4: remove a redundant assignment (bnc#866130).
    * autofs: fix lockref lookup (bnc#888591).
    * be2net: add dma_mapping_error() check for dma_map_page()
      (bnc#881759).
    * block: add cond_resched() to potentially long running ioctl discard
      loop (bnc#884725).
    * block: fix race between request completion and timeout handling
      (bnc#881051).
    * cdc-ether: clean packet filter upon probe (bnc#876017).
    * cpuset: Fix memory allocator deadlock (bnc#876590).
    * crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs
      have them, but some are FIPS certified, with some kernel support.
    * crypto: fips - only panic on bad/missing crypto mod signatures
      (bnc#887503).
    * crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips
      mode (bnc#889451).
    * dasd: validate request size before building CCW/TCW (bnc#891087,
      LTC#114068).
    * dm mpath: fix race condition between multipath_dtr and pg_init_done
      (bnc#826486).
    * dm-mpath: fix panic on deleting sg device (bnc#870161).
    * drm/ast: AST2000 cannot be detected correctly (bnc#895983).
    * drm/ast: Actually load DP501 firmware when required (bnc#895608
      bnc#871134).
    * drm/ast: Add missing entry to dclk_table[].
    * drm/ast: Add reduced non reduced mode parsing for wide screen mode
      (bnc#892723).
    * drm/ast: initial DP501 support (v0.2) (bnc#871134).
    * drm/ast: open key before detect chips (bnc#895983).
    * drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304).
    * drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064).
    * drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init
      (bnc#869055).
    * drm/i915: create functions for the 'unclaimed register' checks
      (bnc#869055).
    * drm/i915: use FPGA_DBG for the 'unclaimed register' checks
      (bnc#869055).
    * drm/mgag200: Initialize data needed to map fbdev memory (bnc
      #806990).
    * e1000e: enable support for new device IDs (bnc#885509).
    * fs/fscache: remove spin_lock() from the condition in while()
      (bnc#880344).
    * hibernate: Disable in a signed modules environment (bnc#884333).
    * hugetlb: does not use ERR_PTR with VM_FAULT* values
    * ibmvscsi: Abort init sequence during error recovery (bnc#885382).
    * ibmvscsi: Add memory barriers for send / receive (bnc#885382).
    * inet: add a redirect generation id in inetpeer (bnc#860593).
    * inetpeer: initialize -&gt;redirect_genid in inet_getpeer() (bnc#860593).
    * ipv6: tcp: fix tcp_v6_conn_request() (bnc#887645).
    * kabi: hide bnc#860593 changes of struct inetpeer_addr_base
      (bnc#860593).
    * kernel: 3215 tty hang (bnc#891087, LTC#114562).
    * kernel: fix data corruption when reading /proc/sysinfo (bnc#891087,
      LTC#114480).
    * kernel: fix kernel oops with load of fpc register (bnc#889061,
      LTC#113596).
    * kernel: sclp console tty reference counting (bnc#891087, LTC#115466).
    * kexec: Disable at runtime if the kernel enforces module loading
      restrictions (bnc#884333).
    * md/raid6: avoid data corruption during recovery of double-degraded
      RAID6.
    * memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim
      fix).
    * memcg: do not expose uninitialized mem_cgroup_per_node to world
      (bnc#883096).
    * mm, hugetlb: add VM_NORESERVE check in vma_has_reserves()
    * mm, hugetlb: change variable name reservations to resv
    * mm, hugetlb: decrement reserve count if VM_NORESERVE alloc page cache
    * mm, hugetlb: defer freeing pages when gathering surplus pages
    * mm, hugetlb: do not use a page in page cache for cow optimization
    * mm, hugetlb: fix and clean-up node iteration code to alloc or free
    * mm, hugetlb: fix race in region tracking
    * mm, hugetlb: fix subpool accounting handling
    * mm, hugetlb: improve page-fault scalability
    * mm, hugetlb: improve, cleanup resv_map parameters
    * mm, hugetlb: move up the code which check availability of free huge
      page
    * mm, hugetlb: protect reserved pages when soft offlining a hugepage
    * mm, hugetlb: remove decrement_hugepage_resv_vma()
    * mm, hugetlb: remove redundant list_empty check in
      gather_surplus_pages()
    * mm, hugetlb: remove resv_map_put
    * mm, hugetlb: remove useless check about mapping type
    * mm, hugetlb: return a reserved page to a reserved pool if failed
    * mm, hugetlb: trivial commenting fix
    * mm, hugetlb: unify region structure handling
    * mm, hugetlb: unify region structure handling kabi
    * mm, hugetlb: use long vars instead of int in region_count() (Hugetlb
      Fault Scalability).
    * mm, hugetlb: use vma_resv_map() map types
    * mm, oom: fix badness score underflow (bnc#884582, bnc#884767).
    * mm, oom: normalize oom scores to oom_score_adj scale only for
      userspace (bnc#884582, bnc#884767).
    * mm, thp: do not allow thp faults to avoid cpuset restrictions
      (bnc#888849).
    * net/mlx4_core: Load higher level modules according to ports type
      (bnc#887680).
    * net/mlx4_core: Load the IB driver when the device supports IBoE
      (bnc#887680).
    * net/mlx4_en: Fix a race between napi poll function and RX ring
      cleanup (bnc#863586).
    * net/mlx4_en: Fix selftest failing on non 10G link speed (bnc#888058).
    * net: fix checksumming features handling in output path (bnc#891259).
    * pagecache_limit: batch large nr_to_scan targets (bnc#895221).
    * pagecachelimit: reduce lru_lock congestion for heavy parallel reclaim
      fix (bnc#895680).
    * perf/core: Add weighted samples (bnc#876114).
    * perf/x86: Add flags to event constraints (bnc#876114).
    * perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114).
    * perf: Add generic memory sampling interface (bnc#876114).
    * qla2xxx: Avoid escalating the SCSI error handler if the command is
      not found in firmware (bnc#859840).
    * qla2xxx: Clear loop_id for ports that are marked lost during fabric
      scanning (bnc#859840).
    * qla2xxx: Does not check for firmware hung during the reset context
      for ISP82XX (bnc#859840).
    * qla2xxx: Issue abort command for outstanding commands during cleanup
      when only firmware is alive (bnc#859840).
    * qla2xxx: Reduce the time we wait for a command to complete during
      SCSI error handling (bnc#859840).
    * qla2xxx: Set host can_queue value based on available resources
      (bnc#859840).
    * restore smp_mb() in unlock_new_inode() (bnc#890526).
    * s390/pci: introduce lazy IOTLB flushing for DMA unmap (bnc#889061,
      LTC#113725).
    * sched: fix the theoretical signal_wake_up() vs schedule() race
      (bnc#876055).
    * sclp_vt220: Enable integrated ASCII console per default (bnc#885262,
      LTC#112035).
    * scsi_dh: use missing accessor 'scsi_device_from_queue' (bnc#889614).
    * scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608).
    * scsiback: correct grant page unmapping.
    * scsiback: fix retry handling in __report_luns().
    * scsiback: free resources after error.
    * sunrpc/auth: allow lockless (rcu) lookup of credential cache
      (bnc#866130).
    * supported.conf: remove external from drivers/net/veth (bnc#889727)
    * supported.conf: support net/sched/act_police.ko (bnc#890426)
    * tcp: adapt selected parts of RFC 5682 and PRR logic (bnc#879921).
    * tg3: Change nvram command timeout value to 50ms (bnc#855657).
    * tg3: Override clock, link aware and link idle mode during NVRAM dump
      (bnc#855657).
    * tg3: Set the MAC clock to the fastest speed during boot code load
      (bnc#855657).
    * usb: Does not enable LPM if the exit latency is zero (bnc#832309).
    * usbcore: Does not log on consecutive debounce failures of the same
      port (bnc#888105).
    * usbhid: fix PIXART optical mouse (bnc#888607).
    * uswsusp: Disable when module loading is restricted (bnc#884333).
    * vscsi: support larger transfer sizes (bnc#774818).
    * writeback: Do not sync data dirtied after sync start (bnc#833820).
    * x86 thermal: Delete power-limit-notification console messages
      (bnc#882317).
    * x86 thermal: Disable power limit notification interrupt by default
      (bnc#882317).
    * x86 thermal: Re-enable power limit notification interrupt by default
      (bnc#882317).
    * x86, cpu hotplug: Fix stack frame warning in
      check_irq_vectors_for_cpu_disable() (bnc#887418).
    * x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847).
    * x86/UV: Add kdump to UV NMI handler (bnc#888847).
    * x86/UV: Add summary of cpu activity to UV NMI handler (bnc#888847).
    * x86/UV: Move NMI support (bnc#888847).
    * x86/UV: Update UV support for external NMI signals (bnc#888847).
    * x86/uv/nmi: Fix Sparse warnings (bnc#888847).
    * x86: Add check for number of available vectors before CPU down
      (bnc#887418).
    * x86: Lock down IO port access when module security is enabled
      (bnc#884333).
    * x86: Restrict MSR access when module loading is restricted
      (bnc#884333).

Security Issues:

    * CVE-2013-1979
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979&gt;
    * CVE-2014-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739&gt;
    * CVE-2014-2706
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706&gt;
    * CVE-2014-4027
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027&gt;
    * CVE-2014-4171
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171&gt;
    * CVE-2014-4508
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508&gt;
    * CVE-2014-4667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667&gt;
    * CVE-2014-4943
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943&gt;
    * CVE-2014-5077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077&gt;
    * CVE-2014-5471
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471&gt;
    * CVE-2014-5472
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472&gt;
    * CVE-2014-3153
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153&gt;
    * CVE-2014-6410
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410&gt;

The SUSE Linux Enterprise 11 Service Pack 3 kernel was updated to fix 
various bugs and security issues.

Following security bugs were fixed: CVE-2013-1979: The scm_set_cred 
function in include/net/scm.h in the Linux kernel before 3.8.11 uses 
incorrect uid and gid values during credentials passing, which allows local 
users to gain privileges via a crafted application (bnc#816708).

CVE-2014-1739: The media_device_enum_entities function in 
drivers/media/media-device.c in the Linux kernel before 3.14.6 does not 
initialize a certain data structure, which allows local users to obtain 
sensitive information from kernel memory by leveraging /dev/media0 read 
access for a MEDIA_IOC_ENUM_ENTITIES ioctl call (bnc#882804).

CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not 
properly implement the interaction between range notification and hole 
punching, which allows local users to cause a denial of service (i_mutex 
hold) by using the mmap system call to access a hole, as demonstrated by 
interfering with intended shmem activity by blocking completion of (1) an 
MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call 
(bnc#883518).

CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through 
3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the 
sep CPU feature flag is set, allows local users to cause a denial of 
service (OOPS and system crash) via an invalid syscall number, as 
demonstrated by number 1000 (bnc#883724).

CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c 
in the Linux kernel before 3.15.2 does not properly manage a certain 
backlog value, which allows remote attackers to cause a denial of service 
(socket outage) via a crafted SCTP packet (bnc#885422).

CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux 
kernel through 3.15.6 allows local users to gain privileges by leveraging 
data-structure differences between an l2tp socket and an inet socket 
(bnc#887082).

CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in 
the Linux kernel through 3.15.8, when SCTP authentication is enabled, 
allows remote attackers to cause a denial of service (NULL pointer 
dereference and OOPS) by starting to establish an association between two 
endpoints immediately after an exchange of INIT and INIT ACK chunks to 
establish an earlier association between these endpoints in the opposite 
direction (bnc#889173).

CVE-2014-5471: Stack consumption vulnerability in the 
parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux 
kernel through 3.16.1 allows local users to cause a denial of service 
(uncontrolled recursion, and system crash or reboot) via a crafted iso9660 
image with a CL entry referring to a directory entry that has a CL entry. 
(bnc#892490)

CVE-2014-5472: The parse_rock_ridge_inode_internal function in 
fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to 
cause a denial of service (unkillable mount process) via a crafted iso9660 
image with a self-referential CL entry. (bnc#892490)

CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux kernel 
before 3.13.7 allows remote attackers to cause a denial of service (system 
crash) via network traffic that improperly interacts with the 
WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and 
tx.c. (bnc#871797)

CVE-2014-4027: The rd_build_device_space function in 
drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not 
properly initialize a certain data structure, which allows local users to 
obtain sensitive information from ramdisk_mcp memory by leveraging access 
to a SCSI initiator. (bnc#882639)

CVE-2014-3153 The futex_requeue function in kernel/futex.c in the Linux 
kernel through 3.14.5 does not ensure that calls have two different futex 
addresses, which allows local users to gain privileges via a crafted 
FUTEX_REQUEUE command that facilitates unsafe waiter modification. 
(bnc#880892)

CVE-2014-6410: Avoid infinite loop when processing indirect ICBs 
(bnc#896689)

The following non-security bugs were fixed: - ACPI / PAD: call schedule() 
when need_resched() is true (bnc#866911). - ACPI: Fix bug when ACPI reset 
register is implemented in system memory (bnc#882900). - ACPI: Limit access 
to custom_method (bnc#884333). - ALSA: hda - Enabling Realtek ALC 671 codec 
(bnc#891746). - Add option to automatically enforce module signatures when 
in Secure Boot mode (bnc#884333). - Add secure_modules() call (bnc#884333). 
- Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344). - Backported 
new patches of Lock down functions for UEFI secure boot Also updated 
series.conf and removed old patches. - Btrfs: Return EXDEV for cross file 
system snapshot. - Btrfs: abort the transaction when we does not find our 
extent ref. - Btrfs: avoid warning bomb of btrfs_invalidate_inodes. - 
Btrfs: cancel scrub on transaction abortion. - Btrfs: correctly set profile 
flags on seqlock retry. - Btrfs: does not check nodes for extent items. - 
Btrfs: fix a possible deadlock between scrub and transaction committing. - 
Btrfs: fix corruption after write/fsync failure + fsync + log recovery 
(bnc#894200). - Btrfs: fix csum tree corruption, duplicate and outdated 
checksums (bnc#891619). - Btrfs: fix double free in 
find_lock_delalloc_range. - Btrfs: fix possible memory leak in 
btrfs_create_tree(). - Btrfs: fix use of uninit 'ret' in 
end_extent_writepage(). - Btrfs: free delayed node outside of 
root-&gt;inode_lock (bnc#866864). - Btrfs: make DEV_INFO ioctl available to 
anyone. - Btrfs: make FS_INFO ioctl available to anyone. - Btrfs: make 
device scan less noisy. - Btrfs: make sure there are not any read requests 
before stopping workers. - Btrfs: more efficient io tree navigation on 
wait_extent_bit. - Btrfs: output warning instead of error when loading free 
space cache failed. - Btrfs: retrieve more info from FS_INFO ioctl. - 
Btrfs: return EPERM when deleting a default subvolume (bnc#869934). - 
Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol (bnc#866615). 
- Btrfs: use right type to get real comparison. - Btrfs: wake up 
@scrub_pause_wait as much as we can. - Btrfs: wake up transaction thread 
upon remount. - CacheFiles: Add missing retrieval completions (bnc#880344). 
- CacheFiles: Does not try to dump the index key if the cookie has been 
cleared (bnc#880344). - CacheFiles: Downgrade the requirements passed to 
the allocator (bnc#880344). - CacheFiles: Fix the marking of cached pages 
(bnc#880344). - CacheFiles: Implement invalidation (bnc#880344). - 
CacheFiles: Make some debugging statements conditional (bnc#880344). - 
Drivers: hv: util: Fix a bug in the KVP code (bnc#886840). - Drivers: hv: 
vmbus: Fix a bug in the channel callback dispatch code (bnc#886840). - 
FS-Cache: Add transition to handle invalidate immediately after lookup 
(bnc#880344). - FS-Cache: Check that there are no read ops when cookie 
relinquished (bnc#880344). - FS-Cache: Clear remaining page count on 
retrieval cancellation (bnc#880344). - FS-Cache: Convert the object event 
ID #defines into an enum (bnc#880344). - FS-Cache: Does not sleep in page 
release if __GFP_FS is not set (bnc#880344). - FS-Cache: Does not use 
spin_is_locked() in assertions (bnc#880344). - FS-Cache: Exclusive op 
submission can BUG if there is been an I/O error (bnc#880344). - FS-Cache: 
Fix __wait_on_atomic_t() to call the action func if the counter != 0 
(bnc#880344). - FS-Cache: Fix object state machine to have separate work 
and wait states (bnc#880344). - FS-Cache: Fix operation state management 
and accounting (bnc#880344). - FS-Cache: Fix signal handling during waits 
(bnc#880344). - FS-Cache: Initialise the object event mask with the 
calculated mask (bnc#880344). - FS-Cache: Limit the number of I/O error 
reports for a cache (bnc#880344). - FS-Cache: Make cookie relinquishment 
wait for outstanding reads (bnc#880344). - FS-Cache: Mark cancellation of 
in-progress operation (bnc#880344). - FS-Cache: One of the write operation 
paths doeses not set the object state (bnc#880344). - FS-Cache: Provide 
proper invalidation (bnc#880344). - FS-Cache: Simplify cookie retention for 
fscache_objects, fixing oops (bnc#880344). - FS-Cache: The retrieval 
remaining-pages counter needs to be atomic_t (bnc#880344). - FS-Cache: 
Uninline fscache_object_init() (bnc#880344). - FS-Cache: Wrap checks on 
object state (bnc#880344). - HID: usbhid: add always-poll quirk 
(bnc#888607). - HID: usbhid: enable always-poll quirk for Elan Touchscreen 
(bnc#888607). - IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297). - 
Ignore 'flags' change to event_constraint (bnc#876114). - Ignore 
data_src/weight changes to perf_sample_data (bnc#876114). - NFS: Allow more 
operations in an NFSv4.1 request (bnc#890513). - NFS: Clean up helper 
function nfs4_select_rw_stateid() (bnc#888968). - NFS: Does not copy read 
delegation stateids in setattr (bnc#888968). - NFS: Does not use a 
delegation to open a file when returning that delegation (bnc#888968, 
bnc#892200, bnc#893596, bnc#893496) - NFS: Fixes for NFS RCU-walk support 
in line with code going upstream - NFS: Use FS-Cache invalidation 
(bnc#880344). - NFS: allow lockless access to access_cache (bnc#866130). - 
NFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts 
(bnc#888591). - NFS: nfs4_do_open should add negative results to the dcache 
(bnc#866130). - NFS: nfs_migrate_page() does not wait for FS-Cache to 
finish with a page (bnc#880344). - NFS: nfs_open_revalidate: only evaluate 
parent if it will be used (bnc#866130). - NFS: prepare for RCU-walk support 
but pushing tests later in code (bnc#866130). - NFS: support RCU_WALK in 
nfs_permission() (bnc#866130). - NFS: teach nfs_lookup_verify_inode to 
handle LOOKUP_RCU (bnc#866130). - NFS: teach nfs_neg_need_reval to 
understand LOOKUP_RCU (bnc#866130). - NFSD: Does not hand out delegations 
for 30 seconds after recalling them (bnc#880370). - NFSv4 set open access 
operation call flag in nfs4_init_opendata_res (bnc#888968, bnc#892200, 
bnc#893596, bnc#893496). - NFSv4: Add a helper for encoding opaque data 
(bnc#888968). - NFSv4: Add a helper for encoding stateids (bnc#888968). - 
NFSv4: Add helpers for basic copying of stateids (bnc#888968). - NFSv4: 
Clean up nfs4_select_rw_stateid() (bnc#888968). - NFSv4: Fix the return 
value of nfs4_select_rw_stateid (bnc#888968). - NFSv4: Rename 
nfs4_copy_stateid() (bnc#888968). - NFSv4: Resend the READ/WRITE RPC call 
if a stateid change causes an error (bnc#888968). - NFSv4: Simplify the 
struct nfs4_stateid (bnc#888968). - NFSv4: The stateid must remain the same 
for replayed RPC calls (bnc#888968). - NFSv4: nfs4_stateid_is_current 
should return 'true' for an invalid stateid (bnc#888968). - One more fix 
for kABI breakage. - PCI: Lock down BAR access when module security is 
enabled (bnc#884333). - PCI: enable MPS 'performance' setting to properly 
handle bridge MPS (bnc#883376). - PM / Hibernate: Add memory_rtree_find_bit 
function (bnc#860441). - PM / Hibernate: Create a Radix-Tree to store 
memory bitmap (bnc#860441). - PM / Hibernate: Implement position keeping in 
radix tree (bnc#860441). - PM / Hibernate: Iterate over set bits instead of 
PFNs in swsusp_free() (bnc#860441). - PM / Hibernate: Remove the old 
memory-bitmap implementation (bnc#860441). - PM / Hibernate: Touch Soft 
Lockup Watchdog in rtree_next_node (bnc#860441). - Restrict /dev/mem and 
/dev/kmem when module loading is restricted (bnc#884333). - Reuse existing 
'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT (bnc#876114). - USB: 
handle LPM errors during device suspend correctly (bnc#849123). - Update 
kabi files to reflect fscache change (bnc#880344) - Update x86_64 config 
files: re-enable SENSORS_W83627EHF (bnc#891281) - VFS: Make more complete 
truncate operation available to CacheFiles (bnc#880344). - [FEAT NET1222] 
ib_uverbs: Allow explicit mmio trigger (FATE#83366, ltc#83367). - acpi: 
Ignore acpi_rsdp kernel parameter when module loading is restricted 
(bnc#884333). - af_iucv: correct cleanup if listen backlog is full 
(bnc#885262, LTC#111728). - asus-wmi: Restrict debugfs interface when 
module loading is restricted (bnc#884333). - autofs4: allow RCU-walk to 
walk through autofs4 (bnc#866130). - autofs4: avoid taking fs_lock during 
rcu-walk (bnc#866130). - autofs4: does not take spinlock when not needed in 
autofs4_lookup_expiring (bnc#866130). - autofs4: factor should_expire() out 
of autofs4_expire_indirect (bnc#866130). - autofs4: make 
'autofs4_can_expire' idempotent (bnc#866130). - autofs4: remove a redundant 
assignment (bnc#866130). - autofs: fix lockref lookup (bnc#888591). - 
be2net: add dma_mapping_error() check for dma_map_page() (bnc#881759). - 
block: add cond_resched() to potentially long running ioctl discard loop 
(bnc#884725). - block: fix race between request completion and timeout 
handling (bnc#881051). - cdc-ether: clean packet filter upon probe 
(bnc#876017). - cpuset: Fix memory allocator deadlock (bnc#876590). - 
crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs have 
them, but some are FIPS certified, with some kernel support. - crypto: fips 
- only panic on bad/missing crypto mod signatures (bnc#887503). - crypto: 
testmgr - allow aesni-intel and ghash_clmulni-intel in fips mode 
(bnc#889451). - dasd: validate request size before building CCW/TCW 
(bnc#891087, LTC#114068). - dm mpath: fix race condition between 
multipath_dtr and pg_init_done (bnc#826486). - dm-mpath: fix panic on 
deleting sg device (bnc#870161). - drm/ast: AST2000 cannot be detected 
correctly (bnc#895983). - drm/ast: Actually load DP501 firmware when 
required (bnc#895608 bnc#871134). - drm/ast: Add missing entry to 
dclk_table[]. - drm/ast: Add reduced non reduced mode parsing for wide 
screen mode (bnc#892723). - drm/ast: initial DP501 support (v0.2) 
(bnc#871134). - drm/ast: open key before detect chips (bnc#895983). - 
drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304). - 
drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064). - 
drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init (bnc#869055). - 
drm/i915: create functions for the 'unclaimed register' checks 
(bnc#869055). - drm/i915: use FPGA_DBG for the 'unclaimed register' checks 
(bnc#869055). - drm/mgag200: Initialize data needed to map fbdev memory 
(bnc #806990). - e1000e: enable support for new device IDs (bnc#885509). - 
fs/fscache: remove spin_lock() from the condition in while() (bnc#880344). 
- hibernate: Disable in a signed modules environment (bnc#884333). - 
hugetlb: does not use ERR_PTR with VM_FAULT* values - ibmvscsi: Abort init 
sequence during error recovery (bnc#885382). - ibmvscsi: Add memory 
barriers for send / receive (bnc#885382). - inet: add a redirect generation 
id in inetpeer (bnc#860593). - inetpeer: initialize -&gt;redirect_genid in 
inet_getpeer() (bnc#860593). - ipv6: tcp: fix tcp_v6_conn_request() 
(bnc#887645). - kabi: hide bnc#860593 changes of struct inetpeer_addr_base 
(bnc#860593). - kernel: 3215 tty hang (bnc#891087, LTC#114562). - kernel: 
fix data corruption when reading /proc/sysinfo (bnc#891087, LTC#114480). - 
kernel: fix kernel oops with load of fpc register (bnc#889061, LTC#113596). 
- kernel: sclp console tty reference counting (bnc#891087, LTC#115466). - 
kexec: Disable at runtime if the kernel enforces module loading 
restrictions (bnc#884333). - md/raid6: avoid data corruption during 
recovery of double-degraded RAID6. - memcg, vmscan: Fix forced scan of 
anonymous pages (memory reclaim fix). - memcg: do not expose uninitialized 
mem_cgroup_per_node to world (bnc#883096). - mm, hugetlb: add VM_NORESERVE 
check in vma_has_reserves() - mm, hugetlb: change variable name 
reservations to resv - mm, hugetlb: decrement reserve count if VM_NORESERVE 
alloc page cache - mm, hugetlb: defer freeing pages when gathering surplus 
pages - mm, hugetlb: do not use a page in page cache for cow optimization - 
mm, hugetlb: fix and clean-up node iteration code to alloc or free - mm, 
hugetlb: fix race in region tracking - mm, hugetlb: fix subpool accounting 
handling - mm, hugetlb: improve page-fault scalability - mm, hugetlb: 
improve, cleanup resv_map parameters - mm, hugetlb: move up the code which 
check availability of free huge page - mm, hugetlb: protect reserved pages 
when soft offlining a hugepage - mm, hugetlb: remove 
decrement_hugepage_resv_vma() - mm, hugetlb: remove redundant list_empty 
check in gather_surplus_pages() - mm, hugetlb: remove resv_map_put - mm, 
hugetlb: remove useless check about mapping type - mm, hugetlb: return a 
reserved page to a reserved pool if failed - mm, hugetlb: trivial 
commenting fix - mm, hugetlb: unify region structure handling - mm, 
hugetlb: unify region structure handling kabi - mm, hugetlb: use long vars 
instead of int in region_count() (Hugetlb Fault Scalability). - mm, 
hugetlb: use vma_resv_map() map types - mm, oom: fix badness score 
underflow (bnc#884582, bnc#884767). - mm, oom: normalize oom scores to 
oom_score_adj scale only for userspace (bnc#884582, bnc#884767). - mm, thp: 
do not allow thp faults to avoid cpuset restrictions (bnc#888849). - 
net/mlx4_core: Load higher level modules according to ports type 
(bnc#887680). - net/mlx4_core: Load the IB driver when the device supports 
IBoE (bnc#887680). - net/mlx4_en: Fix a race between napi poll function and 
RX ring cleanup (bnc#863586). - net/mlx4_en: Fix selftest failing on non 
10G link speed (bnc#888058). - net: fix checksumming features handling in 
output path (bnc#891259). - pagecache_limit: batch large nr_to_scan targets 
(bnc#895221). - pagecachelimit: reduce lru_lock congestion for heavy 
parallel reclaim fix (bnc#895680). - perf/core: Add weighted samples 
(bnc#876114). - perf/x86: Add flags to event constraints (bnc#876114). - 
perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114). - perf: 
Add generic memory sampling interface (bnc#876114). - qla2xxx: Avoid 
escalating the SCSI error handler if the command is not found in firmware 
(bnc#859840). - qla2xxx: Clear loop_id for ports that are marked lost 
during fabric scanning (bnc#859840). - qla2xxx: Does not check for firmware 
hung during the reset context for ISP82XX (bnc#859840). - qla2xxx: Issue 
abort command for outstanding commands during cleanup when only firmware is 
alive (bnc#859840). - qla2xxx: Reduce the time we wait for a command to 
complete during SCSI error handling (bnc#859840). - qla2xxx: Set host 
can_queue value based on available resources (bnc#859840). - restore 
smp_mb() in unlock_new_inode() (bnc#890526). - s390/pci: introduce lazy 
IOTLB flushing for DMA unmap (bnc#889061, LTC#113725). - sched: fix the 
theoretical signal_wake_up() vs schedule() race (bnc#876055). - sclp_vt220: 
Enable integrated ASCII console per default (bnc#885262, LTC#112035). - 
scsi_dh: use missing accessor 'scsi_device_from_queue' (bnc#889614). - 
scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608). - 
scsiback: correct grant page unmapping. - scsiback: fix retry handling in 
__report_luns(). - scsiback: free resources after error. - sunrpc/auth: 
allow lockless (rcu) lookup of credential cache (bnc#866130). - 
supported.conf: remove external from drivers/net/veth (bnc#889727) - 
supported.conf: support net/sched/act_police.ko (bnc#890426) - tcp: adapt 
selected parts of RFC 5682 and PRR logic (bnc#879921). - tg3: Change nvram 
command timeout value to 50ms (bnc#855657). - tg3: Override clock, link 
aware and link idle mode during NVRAM dump (bnc#855657). - tg3: Set the MAC 
clock to the fastest speed during boot code load (bnc#855657). - usb: Does 
not enable LPM if the exit latency is zero (bnc#832309). - usbcore: Does 
not log on consecutive debounce failures of the same port (bnc#888105). - 
usbhid: fix PIXART optical mouse (bnc#888607). - uswsusp: Disable when 
module loading is restricted (bnc#884333). - vscsi: support larger transfer 
sizes (bnc#774818). - writeback: Do not sync data dirtied after sync start 
(bnc#833820). - x86 thermal: Delete power-limit-notification console 
messages (bnc#882317). - x86 thermal: Disable power limit notification 
interrupt by default (bnc#882317). - x86 thermal: Re-enable power limit 
notification interrupt by default (bnc#882317). - x86, cpu hotplug: Fix 
stack frame warning in check_irq_vectors_for_cpu_disable() (bnc#887418). - 
x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847). - x86/UV: Add 
kdump to UV NMI handler (bnc#888847). - x86/UV: Add summary of cpu activity 
to UV NMI handler (bnc#888847). - x86/UV: Move NMI support (bnc#888847). - 
x86/UV: Update UV support for external NMI signals (bnc#888847). - 
x86/uv/nmi: Fix Sparse warnings (bnc#888847). - x86: Add check for number 
of available vectors before CPU down (bnc#887418). - x86: Lock down IO port 
access when module security is enabled (bnc#884333). - x86: Restrict MSR 
access when module loading is restricted (bnc#884333).

Security Issues:

    * CVE-2013-1979
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979&gt;
    * CVE-2014-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739&gt;
    * CVE-2014-2706
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706&gt;
    * CVE-2014-4027
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027&gt;
    * CVE-2014-4171
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171&gt;
    * CVE-2014-4508
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508&gt;
    * CVE-2014-4667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667&gt;
    * CVE-2014-4943
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943&gt;
    * CVE-2014-5077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077&gt;
    * CVE-2014-5471
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471&gt;
    * CVE-2014-5472
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472&gt;
    * CVE-2014-3153
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153&gt;
    * CVE-2014-6410
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-24"/>
	<updated date="2014-09-24"/>
	<bugzilla href="https://bugzilla.suse.com/599263">SUSE bug 599263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/708296">SUSE bug 708296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/733022">SUSE bug 733022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745640">SUSE bug 745640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/755743">SUSE bug 755743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760407">SUSE bug 760407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763463">SUSE bug 763463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763968">SUSE bug 763968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/765523">SUSE bug 765523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767610">SUSE bug 767610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769035">SUSE bug 769035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769644">SUSE bug 769644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770541">SUSE bug 770541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/771619">SUSE bug 771619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773006">SUSE bug 773006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773255">SUSE bug 773255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773837">SUSE bug 773837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774818">SUSE bug 774818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779488">SUSE bug 779488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/783475">SUSE bug 783475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785901">SUSE bug 785901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786450">SUSE bug 786450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787843">SUSE bug 787843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789010">SUSE bug 789010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789359">SUSE bug 789359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792271">SUSE bug 792271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/793727">SUSE bug 793727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/794824">SUSE bug 794824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797090">SUSE bug 797090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797526">SUSE bug 797526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797727">SUSE bug 797727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797909">SUSE bug 797909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798050">SUSE bug 798050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800255">SUSE bug 800255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800875">SUSE bug 800875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801341">SUSE bug 801341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801427">SUSE bug 801427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803320">SUSE bug 803320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804482">SUSE bug 804482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804609">SUSE bug 804609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804950">SUSE bug 804950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/805114">SUSE bug 805114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/805371">SUSE bug 805371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/805740">SUSE bug 805740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/805804">SUSE bug 805804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806396">SUSE bug 806396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806976">SUSE bug 806976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806988">SUSE bug 806988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806990">SUSE bug 806990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807434">SUSE bug 807434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807471">SUSE bug 807471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807502">SUSE bug 807502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808015">SUSE bug 808015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808079">SUSE bug 808079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808136">SUSE bug 808136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808837">SUSE bug 808837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808855">SUSE bug 808855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808940">SUSE bug 808940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809122">SUSE bug 809122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809130">SUSE bug 809130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809463">SUSE bug 809463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809895">SUSE bug 809895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809975">SUSE bug 809975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/810323">SUSE bug 810323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/810722">SUSE bug 810722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/812274">SUSE bug 812274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/812281">SUSE bug 812281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/812332">SUSE bug 812332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/812526">SUSE bug 812526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/812974">SUSE bug 812974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813245">SUSE bug 813245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813604">SUSE bug 813604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813733">SUSE bug 813733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813922">SUSE bug 813922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814336">SUSE bug 814336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815256">SUSE bug 815256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815320">SUSE bug 815320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815356">SUSE bug 815356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816043">SUSE bug 816043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816099">SUSE bug 816099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816451">SUSE bug 816451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816708">SUSE bug 816708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817035">SUSE bug 817035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817377">SUSE bug 817377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818047">SUSE bug 818047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818064">SUSE bug 818064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818371">SUSE bug 818371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818465">SUSE bug 818465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818545">SUSE bug 818545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819018">SUSE bug 819018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819195">SUSE bug 819195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819363">SUSE bug 819363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819523">SUSE bug 819523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819610">SUSE bug 819610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819655">SUSE bug 819655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819979">SUSE bug 819979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820102">SUSE bug 820102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820172">SUSE bug 820172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820338">SUSE bug 820338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820434">SUSE bug 820434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820848">SUSE bug 820848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821052">SUSE bug 821052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821070">SUSE bug 821070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821235">SUSE bug 821235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821259">SUSE bug 821259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821465">SUSE bug 821465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821619">SUSE bug 821619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821799">SUSE bug 821799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821859">SUSE bug 821859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821930">SUSE bug 821930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821948">SUSE bug 821948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821980">SUSE bug 821980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822052">SUSE bug 822052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822066">SUSE bug 822066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822077">SUSE bug 822077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822080">SUSE bug 822080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822164">SUSE bug 822164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822225">SUSE bug 822225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822340">SUSE bug 822340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822431">SUSE bug 822431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822433">SUSE bug 822433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822575">SUSE bug 822575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822579">SUSE bug 822579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822722">SUSE bug 822722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822825">SUSE bug 822825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822878">SUSE bug 822878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823082">SUSE bug 823082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823223">SUSE bug 823223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823342">SUSE bug 823342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823386">SUSE bug 823386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823517">SUSE bug 823517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823597">SUSE bug 823597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823618">SUSE bug 823618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823795">SUSE bug 823795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824159">SUSE bug 824159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824256">SUSE bug 824256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824568">SUSE bug 824568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824915">SUSE bug 824915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825006">SUSE bug 825006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825037">SUSE bug 825037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825048">SUSE bug 825048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825142">SUSE bug 825142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825227">SUSE bug 825227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825291">SUSE bug 825291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825591">SUSE bug 825591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825657">SUSE bug 825657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825696">SUSE bug 825696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825887">SUSE bug 825887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825896">SUSE bug 825896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826102">SUSE bug 826102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826186">SUSE bug 826186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826350">SUSE bug 826350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826486">SUSE bug 826486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826602">SUSE bug 826602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826756">SUSE bug 826756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826960">SUSE bug 826960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826978">SUSE bug 826978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827246">SUSE bug 827246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827271">SUSE bug 827271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827372">SUSE bug 827372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827376">SUSE bug 827376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827378">SUSE bug 827378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827416">SUSE bug 827416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827527">SUSE bug 827527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827670">SUSE bug 827670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827749">SUSE bug 827749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827750">SUSE bug 827750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827767">SUSE bug 827767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827930">SUSE bug 827930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827966">SUSE bug 827966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828087">SUSE bug 828087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828119">SUSE bug 828119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828192">SUSE bug 828192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828236">SUSE bug 828236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828265">SUSE bug 828265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828574">SUSE bug 828574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828714">SUSE bug 828714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828886">SUSE bug 828886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828894">SUSE bug 828894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828914">SUSE bug 828914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829001">SUSE bug 829001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829082">SUSE bug 829082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829110">SUSE bug 829110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829357">SUSE bug 829357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829539">SUSE bug 829539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829622">SUSE bug 829622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829682">SUSE bug 829682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/830346">SUSE bug 830346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/830478">SUSE bug 830478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/830766">SUSE bug 830766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/830822">SUSE bug 830822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/830901">SUSE bug 830901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/830985">SUSE bug 830985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831029">SUSE bug 831029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831055">SUSE bug 831055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831058">SUSE bug 831058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831103">SUSE bug 831103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831143">SUSE bug 831143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831380">SUSE bug 831380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831410">SUSE bug 831410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831422">SUSE bug 831422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831424">SUSE bug 831424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831438">SUSE bug 831438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831623">SUSE bug 831623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831949">SUSE bug 831949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/832292">SUSE bug 832292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/832309">SUSE bug 832309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/832318">SUSE bug 832318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/832710">SUSE bug 832710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833073">SUSE bug 833073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833097">SUSE bug 833097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833148">SUSE bug 833148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833151">SUSE bug 833151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833321">SUSE bug 833321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833588">SUSE bug 833588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833635">SUSE bug 833635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833820">SUSE bug 833820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833858">SUSE bug 833858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833968">SUSE bug 833968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834116">SUSE bug 834116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834204">SUSE bug 834204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834473">SUSE bug 834473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834600">SUSE bug 834600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834647">SUSE bug 834647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834708">SUSE bug 834708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834742">SUSE bug 834742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834808">SUSE bug 834808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834905">SUSE bug 834905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835074">SUSE bug 835074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835094">SUSE bug 835094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835175">SUSE bug 835175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835186">SUSE bug 835186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835189">SUSE bug 835189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835684">SUSE bug 835684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835930">SUSE bug 835930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836218">SUSE bug 836218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836347">SUSE bug 836347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836718">SUSE bug 836718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836801">SUSE bug 836801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/837206">SUSE bug 837206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/837372">SUSE bug 837372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/837563">SUSE bug 837563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/837596">SUSE bug 837596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/837739">SUSE bug 837739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/837741">SUSE bug 837741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/837803">SUSE bug 837803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/838346">SUSE bug 838346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/838448">SUSE bug 838448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/838623">SUSE bug 838623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839407">SUSE bug 839407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839973">SUSE bug 839973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840116">SUSE bug 840116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840226">SUSE bug 840226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840524">SUSE bug 840524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840830">SUSE bug 840830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841050">SUSE bug 841050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841094">SUSE bug 841094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841402">SUSE bug 841402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841445">SUSE bug 841445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841498">SUSE bug 841498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841654">SUSE bug 841654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841656">SUSE bug 841656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842057">SUSE bug 842057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842063">SUSE bug 842063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842239">SUSE bug 842239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842604">SUSE bug 842604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842820">SUSE bug 842820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843185">SUSE bug 843185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843419">SUSE bug 843419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843429">SUSE bug 843429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843445">SUSE bug 843445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843642">SUSE bug 843642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843645">SUSE bug 843645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843654">SUSE bug 843654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843732">SUSE bug 843732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843753">SUSE bug 843753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843950">SUSE bug 843950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844513">SUSE bug 844513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845352">SUSE bug 845352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845378">SUSE bug 845378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845621">SUSE bug 845621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845729">SUSE bug 845729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846036">SUSE bug 846036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846298">SUSE bug 846298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846404">SUSE bug 846404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846654">SUSE bug 846654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846656">SUSE bug 846656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846690">SUSE bug 846690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846790">SUSE bug 846790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846984">SUSE bug 846984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846989">SUSE bug 846989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847261">SUSE bug 847261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847319">SUSE bug 847319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847652">SUSE bug 847652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847660">SUSE bug 847660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847672">SUSE bug 847672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847721">SUSE bug 847721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847842">SUSE bug 847842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848055">SUSE bug 848055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848317">SUSE bug 848317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848321">SUSE bug 848321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848335">SUSE bug 848335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848336">SUSE bug 848336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848544">SUSE bug 848544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848652">SUSE bug 848652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848864">SUSE bug 848864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849021">SUSE bug 849021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849029">SUSE bug 849029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849034">SUSE bug 849034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849123">SUSE bug 849123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849256">SUSE bug 849256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849362">SUSE bug 849362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849364">SUSE bug 849364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849404">SUSE bug 849404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849675">SUSE bug 849675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849809">SUSE bug 849809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849855">SUSE bug 849855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849950">SUSE bug 849950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/850072">SUSE bug 850072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/850103">SUSE bug 850103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/850324">SUSE bug 850324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/850493">SUSE bug 850493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/850640">SUSE bug 850640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/850915">SUSE bug 850915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851066">SUSE bug 851066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851101">SUSE bug 851101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851290">SUSE bug 851290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851314">SUSE bug 851314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851426">SUSE bug 851426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851603">SUSE bug 851603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851879">SUSE bug 851879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852153">SUSE bug 852153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852373">SUSE bug 852373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852488">SUSE bug 852488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852553">SUSE bug 852553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852558">SUSE bug 852558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852559">SUSE bug 852559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852624">SUSE bug 852624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852652">SUSE bug 852652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852761">SUSE bug 852761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852967">SUSE bug 852967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853040">SUSE bug 853040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853050">SUSE bug 853050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853051">SUSE bug 853051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853052">SUSE bug 853052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853053">SUSE bug 853053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853162">SUSE bug 853162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853166">SUSE bug 853166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853428">SUSE bug 853428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853455">SUSE bug 853455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853465">SUSE bug 853465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854025">SUSE bug 854025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854445">SUSE bug 854445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854516">SUSE bug 854516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854546">SUSE bug 854546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854634">SUSE bug 854634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854722">SUSE bug 854722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855126">SUSE bug 855126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855657">SUSE bug 855657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855825">SUSE bug 855825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856307">SUSE bug 856307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856481">SUSE bug 856481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856760">SUSE bug 856760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856848">SUSE bug 856848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857358">SUSE bug 857358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857643">SUSE bug 857643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857926">SUSE bug 857926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858534">SUSE bug 858534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858604">SUSE bug 858604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858831">SUSE bug 858831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858869">SUSE bug 858869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858870">SUSE bug 858870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858872">SUSE bug 858872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859225">SUSE bug 859225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859342">SUSE bug 859342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859840">SUSE bug 859840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860441">SUSE bug 860441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860593">SUSE bug 860593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861093">SUSE bug 861093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861636">SUSE bug 861636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861980">SUSE bug 861980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862429">SUSE bug 862429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862796">SUSE bug 862796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862934">SUSE bug 862934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862957">SUSE bug 862957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863178">SUSE bug 863178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863300">SUSE bug 863300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863335">SUSE bug 863335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863410">SUSE bug 863410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863526">SUSE bug 863526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863586">SUSE bug 863586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863873">SUSE bug 863873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864025">SUSE bug 864025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864058">SUSE bug 864058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864401">SUSE bug 864401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864404">SUSE bug 864404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864409">SUSE bug 864409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864411">SUSE bug 864411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864464">SUSE bug 864464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864833">SUSE bug 864833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864880">SUSE bug 864880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865310">SUSE bug 865310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865330">SUSE bug 865330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865342">SUSE bug 865342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865419">SUSE bug 865419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865783">SUSE bug 865783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865882">SUSE bug 865882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866081">SUSE bug 866081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866102">SUSE bug 866102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866130">SUSE bug 866130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866253">SUSE bug 866253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866428">SUSE bug 866428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866615">SUSE bug 866615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866800">SUSE bug 866800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866864">SUSE bug 866864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866911">SUSE bug 866911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867362">SUSE bug 867362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867517">SUSE bug 867517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867531">SUSE bug 867531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867723">SUSE bug 867723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867953">SUSE bug 867953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868049">SUSE bug 868049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868488">SUSE bug 868488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868528">SUSE bug 868528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868653">SUSE bug 868653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868748">SUSE bug 868748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869033">SUSE bug 869033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869055">SUSE bug 869055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869414">SUSE bug 869414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869563">SUSE bug 869563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869934">SUSE bug 869934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870161">SUSE bug 870161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870173">SUSE bug 870173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870335">SUSE bug 870335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870450">SUSE bug 870450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870496">SUSE bug 870496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870498">SUSE bug 870498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870576">SUSE bug 870576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870591">SUSE bug 870591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870801">SUSE bug 870801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870877">SUSE bug 870877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870958">SUSE bug 870958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871134">SUSE bug 871134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871561">SUSE bug 871561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871634">SUSE bug 871634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871676">SUSE bug 871676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871728">SUSE bug 871728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871797">SUSE bug 871797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871854">SUSE bug 871854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871861">SUSE bug 871861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871899">SUSE bug 871899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/872188">SUSE bug 872188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/872540">SUSE bug 872540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/872634">SUSE bug 872634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873061">SUSE bug 873061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873228">SUSE bug 873228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873374">SUSE bug 873374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873463">SUSE bug 873463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/874108">SUSE bug 874108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/874145">SUSE bug 874145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/874440">SUSE bug 874440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/874577">SUSE bug 874577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875051">SUSE bug 875051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875386">SUSE bug 875386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875690">SUSE bug 875690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875798">SUSE bug 875798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876017">SUSE bug 876017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876055">SUSE bug 876055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876086">SUSE bug 876086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876102">SUSE bug 876102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876114">SUSE bug 876114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876176">SUSE bug 876176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876463">SUSE bug 876463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876590">SUSE bug 876590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876594">SUSE bug 876594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876633">SUSE bug 876633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877013">SUSE bug 877013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877257">SUSE bug 877257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877456">SUSE bug 877456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877497">SUSE bug 877497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877593">SUSE bug 877593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877775">SUSE bug 877775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878115">SUSE bug 878115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878123">SUSE bug 878123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878274">SUSE bug 878274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878407">SUSE bug 878407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878509">SUSE bug 878509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879304">SUSE bug 879304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879921">SUSE bug 879921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879957">SUSE bug 879957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880007">SUSE bug 880007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880344">SUSE bug 880344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880357">SUSE bug 880357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880370">SUSE bug 880370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880437">SUSE bug 880437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880484">SUSE bug 880484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880892">SUSE bug 880892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881051">SUSE bug 881051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881571">SUSE bug 881571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881759">SUSE bug 881759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881761">SUSE bug 881761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881939">SUSE bug 881939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882317">SUSE bug 882317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882324">SUSE bug 882324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882470">SUSE bug 882470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882639">SUSE bug 882639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882804">SUSE bug 882804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882900">SUSE bug 882900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883096">SUSE bug 883096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883376">SUSE bug 883376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883380">SUSE bug 883380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883518">SUSE bug 883518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883724">SUSE bug 883724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883795">SUSE bug 883795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883948">SUSE bug 883948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884333">SUSE bug 884333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884582">SUSE bug 884582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884725">SUSE bug 884725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884767">SUSE bug 884767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884817">SUSE bug 884817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885077">SUSE bug 885077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885262">SUSE bug 885262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885382">SUSE bug 885382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885422">SUSE bug 885422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885509">SUSE bug 885509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885725">SUSE bug 885725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886840">SUSE bug 886840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887082">SUSE bug 887082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887418">SUSE bug 887418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887503">SUSE bug 887503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887597">SUSE bug 887597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887608">SUSE bug 887608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887645">SUSE bug 887645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887680">SUSE bug 887680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888058">SUSE bug 888058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888105">SUSE bug 888105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888591">SUSE bug 888591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888607">SUSE bug 888607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888847">SUSE bug 888847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888849">SUSE bug 888849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888968">SUSE bug 888968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889061">SUSE bug 889061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889173">SUSE bug 889173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889221">SUSE bug 889221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889451">SUSE bug 889451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889614">SUSE bug 889614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889727">SUSE bug 889727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890297">SUSE bug 890297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890426">SUSE bug 890426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890513">SUSE bug 890513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890526">SUSE bug 890526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891087">SUSE bug 891087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891211">SUSE bug 891211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891212">SUSE bug 891212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891259">SUSE bug 891259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891277">SUSE bug 891277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891281">SUSE bug 891281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891368">SUSE bug 891368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891619">SUSE bug 891619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891641">SUSE bug 891641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891746">SUSE bug 891746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891790">SUSE bug 891790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892200">SUSE bug 892200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892490">SUSE bug 892490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892723">SUSE bug 892723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892782">SUSE bug 892782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893064">SUSE bug 893064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893496">SUSE bug 893496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893596">SUSE bug 893596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893758">SUSE bug 893758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894058">SUSE bug 894058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894200">SUSE bug 894200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894213">SUSE bug 894213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894895">SUSE bug 894895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895221">SUSE bug 895221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895387">SUSE bug 895387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895468">SUSE bug 895468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895608">SUSE bug 895608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895680">SUSE bug 895680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895841">SUSE bug 895841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895983">SUSE bug 895983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896382">SUSE bug 896382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896390">SUSE bug 896390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896391">SUSE bug 896391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896392">SUSE bug 896392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896415">SUSE bug 896415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896484">SUSE bug 896484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896689">SUSE bug 896689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897502">SUSE bug 897502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897694">SUSE bug 897694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897708">SUSE bug 897708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898295">SUSE bug 898295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898375">SUSE bug 898375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898554">SUSE bug 898554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899192">SUSE bug 899192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899574">SUSE bug 899574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899843">SUSE bug 899843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900279">SUSE bug 900279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900644">SUSE bug 900644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900881">SUSE bug 900881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901638">SUSE bug 901638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902232">SUSE bug 902232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902286">SUSE bug 902286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902346">SUSE bug 902346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902349">SUSE bug 902349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902351">SUSE bug 902351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902675">SUSE bug 902675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903096">SUSE bug 903096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903331">SUSE bug 903331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903640">SUSE bug 903640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903653">SUSE bug 903653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904013">SUSE bug 904013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904053">SUSE bug 904053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904242">SUSE bug 904242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904358">SUSE bug 904358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904659">SUSE bug 904659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904671">SUSE bug 904671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904700">SUSE bug 904700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904883">SUSE bug 904883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904901">SUSE bug 904901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905100">SUSE bug 905100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905304">SUSE bug 905304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905312">SUSE bug 905312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905522">SUSE bug 905522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905799">SUSE bug 905799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906027">SUSE bug 906027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906586">SUSE bug 906586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907196">SUSE bug 907196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907338">SUSE bug 907338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907551">SUSE bug 907551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907611">SUSE bug 907611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907818">SUSE bug 907818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908069">SUSE bug 908069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908163">SUSE bug 908163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908393">SUSE bug 908393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908550">SUSE bug 908550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908551">SUSE bug 908551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908572">SUSE bug 908572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908706">SUSE bug 908706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908825">SUSE bug 908825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909077">SUSE bug 909077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909078">SUSE bug 909078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909088">SUSE bug 909088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909092">SUSE bug 909092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909093">SUSE bug 909093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909095">SUSE bug 909095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909264">SUSE bug 909264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909309">SUSE bug 909309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909312">SUSE bug 909312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909477">SUSE bug 909477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909565">SUSE bug 909565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909684">SUSE bug 909684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909740">SUSE bug 909740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909846">SUSE bug 909846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910013">SUSE bug 910013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910150">SUSE bug 910150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910159">SUSE bug 910159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910251">SUSE bug 910251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910321">SUSE bug 910321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910322">SUSE bug 910322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910517">SUSE bug 910517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911181">SUSE bug 911181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911325">SUSE bug 911325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911326">SUSE bug 911326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912171">SUSE bug 912171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912202">SUSE bug 912202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912705">SUSE bug 912705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912741">SUSE bug 912741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913059">SUSE bug 913059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913080">SUSE bug 913080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913598">SUSE bug 913598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914355">SUSE bug 914355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914423">SUSE bug 914423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914726">SUSE bug 914726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914742">SUSE bug 914742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914818">SUSE bug 914818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914987">SUSE bug 914987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915045">SUSE bug 915045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915200">SUSE bug 915200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915209">SUSE bug 915209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915322">SUSE bug 915322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915335">SUSE bug 915335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915577">SUSE bug 915577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915791">SUSE bug 915791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915826">SUSE bug 915826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916515">SUSE bug 916515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916521">SUSE bug 916521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916848">SUSE bug 916848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916982">SUSE bug 916982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917093">SUSE bug 917093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917120">SUSE bug 917120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917648">SUSE bug 917648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917684">SUSE bug 917684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917830">SUSE bug 917830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917839">SUSE bug 917839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917884">SUSE bug 917884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918333">SUSE bug 918333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919007">SUSE bug 919007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919018">SUSE bug 919018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919357">SUSE bug 919357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919463">SUSE bug 919463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919589">SUSE bug 919589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919682">SUSE bug 919682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919808">SUSE bug 919808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920250">SUSE bug 920250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921769">SUSE bug 921769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922583">SUSE bug 922583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923344">SUSE bug 923344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924142">SUSE bug 924142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924271">SUSE bug 924271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924282">SUSE bug 924282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924333">SUSE bug 924333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924340">SUSE bug 924340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925012">SUSE bug 925012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925370">SUSE bug 925370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925443">SUSE bug 925443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925567">SUSE bug 925567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925729">SUSE bug 925729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926016">SUSE bug 926016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926240">SUSE bug 926240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926439">SUSE bug 926439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926767">SUSE bug 926767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927190">SUSE bug 927190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927257">SUSE bug 927257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927262">SUSE bug 927262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927338">SUSE bug 927338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928122">SUSE bug 928122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928130">SUSE bug 928130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928142">SUSE bug 928142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928333">SUSE bug 928333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928970">SUSE bug 928970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929145">SUSE bug 929145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929148">SUSE bug 929148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929283">SUSE bug 929283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929525">SUSE bug 929525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929647">SUSE bug 929647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930145">SUSE bug 930145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930171">SUSE bug 930171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930226">SUSE bug 930226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930284">SUSE bug 930284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930401">SUSE bug 930401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930669">SUSE bug 930669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930786">SUSE bug 930786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930788">SUSE bug 930788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931014">SUSE bug 931014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931015">SUSE bug 931015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931850">SUSE bug 931850</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2372/">CVE-2012-2372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2372">CVE-2012-2372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4398/">CVE-2012-4398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4398">CVE-2012-4398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0160/">CVE-2013-0160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0160">CVE-2013-0160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1059/">CVE-2013-1059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1059">CVE-2013-1059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1774/">CVE-2013-1774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1774">CVE-2013-1774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1819/">CVE-2013-1819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1819">CVE-2013-1819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1929/">CVE-2013-1929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1929">CVE-2013-1929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1979/">CVE-2013-1979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1979">CVE-2013-1979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2146/">CVE-2013-2146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2146">CVE-2013-2146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2148/">CVE-2013-2148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2148">CVE-2013-2148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2164/">CVE-2013-2164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2164">CVE-2013-2164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2206/">CVE-2013-2206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2206">CVE-2013-2206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2232/">CVE-2013-2232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2232">CVE-2013-2232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2234/">CVE-2013-2234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2234">CVE-2013-2234 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2237/">CVE-2013-2237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2237">CVE-2013-2237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2851/">CVE-2013-2851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2851">CVE-2013-2851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2852/">CVE-2013-2852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2852">CVE-2013-2852 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2889/">CVE-2013-2889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2889">CVE-2013-2889 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2893/">CVE-2013-2893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2893">CVE-2013-2893 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2013-2897/">CVE-2013-2897 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2897">CVE-2013-2897 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2013-2899/">CVE-2013-2899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2899">CVE-2013-2899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2929/">CVE-2013-2929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2929">CVE-2013-2929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2930/">CVE-2013-2930 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2930">CVE-2013-2930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3076/">CVE-2013-3076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3076">CVE-2013-3076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3222/">CVE-2013-3222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3222">CVE-2013-3222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3223/">CVE-2013-3223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3223">CVE-2013-3223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3224/">CVE-2013-3224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3224">CVE-2013-3224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3225/">CVE-2013-3225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3225">CVE-2013-3225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3227/">CVE-2013-3227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3227">CVE-2013-3227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3228/">CVE-2013-3228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3228">CVE-2013-3228 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3229/">CVE-2013-3229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3229">CVE-2013-3229 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3231/">CVE-2013-3231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3231">CVE-2013-3231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3232/">CVE-2013-3232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3232">CVE-2013-3232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3234/">CVE-2013-3234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3234">CVE-2013-3234 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3235/">CVE-2013-3235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3235">CVE-2013-3235 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3301/">CVE-2013-3301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3301">CVE-2013-3301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4162/">CVE-2013-4162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4162">CVE-2013-4162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4163/">CVE-2013-4163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4163">CVE-2013-4163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4299/">CVE-2013-4299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4299">CVE-2013-4299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4345/">CVE-2013-4345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4345">CVE-2013-4345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4470/">CVE-2013-4470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4470">CVE-2013-4470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4483/">CVE-2013-4483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4483">CVE-2013-4483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4511/">CVE-2013-4511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4511">CVE-2013-4511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4514/">CVE-2013-4514 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4514">CVE-2013-4514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4515/">CVE-2013-4515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4515">CVE-2013-4515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4579/">CVE-2013-4579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4579">CVE-2013-4579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4587/">CVE-2013-4587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4587">CVE-2013-4587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4592/">CVE-2013-4592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4592">CVE-2013-4592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6367/">CVE-2013-6367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6367">CVE-2013-6367 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6368/">CVE-2013-6368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6368">CVE-2013-6368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6376/">CVE-2013-6376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6376">CVE-2013-6376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6378/">CVE-2013-6378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6378">CVE-2013-6378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6380/">CVE-2013-6380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6380">CVE-2013-6380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6382/">CVE-2013-6382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6382">CVE-2013-6382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6383/">CVE-2013-6383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6383">CVE-2013-6383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6463/">CVE-2013-6463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6463">CVE-2013-6463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6885/">CVE-2013-6885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6885">CVE-2013-6885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7027/">CVE-2013-7027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7027">CVE-2013-7027 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7263/">CVE-2013-7263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7263">CVE-2013-7263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7264/">CVE-2013-7264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7264">CVE-2013-7264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7265/">CVE-2013-7265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7265">CVE-2013-7265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7339/">CVE-2013-7339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7339">CVE-2013-7339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0055/">CVE-2014-0055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0055">CVE-2014-0055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0069/">CVE-2014-0069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0069">CVE-2014-0069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0077/">CVE-2014-0077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0077">CVE-2014-0077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0101/">CVE-2014-0101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0101">CVE-2014-0101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0131/">CVE-2014-0131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0131">CVE-2014-0131 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-0155/">CVE-2014-0155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0155">CVE-2014-0155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0181/">CVE-2014-0181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0181">CVE-2014-0181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0196/">CVE-2014-0196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0196">CVE-2014-0196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1444/">CVE-2014-1444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1444">CVE-2014-1444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1445/">CVE-2014-1445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1445">CVE-2014-1445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1446/">CVE-2014-1446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1446">CVE-2014-1446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1737/">CVE-2014-1737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1737">CVE-2014-1737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1738/">CVE-2014-1738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1738">CVE-2014-1738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1739/">CVE-2014-1739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1739">CVE-2014-1739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1874/">CVE-2014-1874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1874">CVE-2014-1874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2309/">CVE-2014-2309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2309">CVE-2014-2309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2523/">CVE-2014-2523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2523">CVE-2014-2523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2678/">CVE-2014-2678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2678">CVE-2014-2678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2706/">CVE-2014-2706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2706">CVE-2014-2706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2851/">CVE-2014-2851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2851">CVE-2014-2851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3122/">CVE-2014-3122 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3122">CVE-2014-3122 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3144/">CVE-2014-3144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3144">CVE-2014-3144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3145/">CVE-2014-3145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3145">CVE-2014-3145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3153/">CVE-2014-3153 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3153">CVE-2014-3153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3181/">CVE-2014-3181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3181">CVE-2014-3181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3184/">CVE-2014-3184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3184">CVE-2014-3184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3185/">CVE-2014-3185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3185">CVE-2014-3185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3186/">CVE-2014-3186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3186">CVE-2014-3186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3601/">CVE-2014-3601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3601">CVE-2014-3601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3610/">CVE-2014-3610 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3610">CVE-2014-3610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3646/">CVE-2014-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3646">CVE-2014-3646 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-3647/">CVE-2014-3647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3647">CVE-2014-3647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3673/">CVE-2014-3673 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3673">CVE-2014-3673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3687/">CVE-2014-3687 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3687">CVE-2014-3687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3688/">CVE-2014-3688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3688">CVE-2014-3688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3690/">CVE-2014-3690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3690">CVE-2014-3690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3917/">CVE-2014-3917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3917">CVE-2014-3917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4027/">CVE-2014-4027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4027">CVE-2014-4027 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4171/">CVE-2014-4171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4171">CVE-2014-4171 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-4508/">CVE-2014-4508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4508">CVE-2014-4508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4608/">CVE-2014-4608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4608">CVE-2014-4608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4652/">CVE-2014-4652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4652">CVE-2014-4652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4653/">CVE-2014-4653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4653">CVE-2014-4653 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4654/">CVE-2014-4654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4654">CVE-2014-4654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4655/">CVE-2014-4655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4655">CVE-2014-4655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4656/">CVE-2014-4656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4656">CVE-2014-4656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4667/">CVE-2014-4667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4667">CVE-2014-4667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4699/">CVE-2014-4699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4699">CVE-2014-4699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4943/">CVE-2014-4943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4943">CVE-2014-4943 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5077/">CVE-2014-5077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5077">CVE-2014-5077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5471/">CVE-2014-5471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5471">CVE-2014-5471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5472/">CVE-2014-5472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5472">CVE-2014-5472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6410/">CVE-2014-6410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6410">CVE-2014-6410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7822/">CVE-2014-7822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7822">CVE-2014-7822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7826/">CVE-2014-7826 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7826">CVE-2014-7826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7841/">CVE-2014-7841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7841">CVE-2014-7841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7842/">CVE-2014-7842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7842">CVE-2014-7842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7970/">CVE-2014-7970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7970">CVE-2014-7970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8086/">CVE-2014-8086 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8086">CVE-2014-8086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8133/">CVE-2014-8133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8133">CVE-2014-8133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8134/">CVE-2014-8134 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8134">CVE-2014-8134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8159/">CVE-2014-8159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8159">CVE-2014-8159 at NVD</cve>
	<cve impact="high" cvss3="8.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2014-8160/">CVE-2014-8160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8160">CVE-2014-8160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8369/">CVE-2014-8369 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8369">CVE-2014-8369 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8559/">CVE-2014-8559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8559">CVE-2014-8559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8709/">CVE-2014-8709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8709">CVE-2014-8709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8884/">CVE-2014-8884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8884">CVE-2014-8884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9090/">CVE-2014-9090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9090">CVE-2014-9090 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9322/">CVE-2014-9322 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9322">CVE-2014-9322 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9419/">CVE-2014-9419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9419">CVE-2014-9419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9420/">CVE-2014-9420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9420">CVE-2014-9420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9529/">CVE-2014-9529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9529">CVE-2014-9529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9584/">CVE-2014-9584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9584">CVE-2014-9584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9585/">CVE-2014-9585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9585">CVE-2014-9585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9683/">CVE-2014-9683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9683">CVE-2014-9683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0777/">CVE-2015-0777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0777">CVE-2015-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1421/">CVE-2015-1421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1421">CVE-2015-1421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1593/">CVE-2015-1593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1593">CVE-2015-1593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2041/">CVE-2015-2041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2041">CVE-2015-2041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2042/">CVE-2015-2042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2042">CVE-2015-2042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2150/">CVE-2015-2150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2150">CVE-2015-2150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2830/">CVE-2015-2830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2830">CVE-2015-2830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2922/">CVE-2015-2922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2922">CVE-2015-2922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3331/">CVE-2015-3331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3331">CVE-2015-3331 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3339/">CVE-2015-3339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3339">CVE-2015-3339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3636/">CVE-2015-3636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3636">CVE-2015-3636 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578252" comment="kernel-bigsmp-3.0.101-0.47.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578253" comment="kernel-bigsmp-base-3.0.101-0.47.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578254" comment="kernel-default-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578255" comment="kernel-default-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578257" comment="kernel-default-man-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578258" comment="kernel-ec2-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578259" comment="kernel-ec2-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578261" comment="kernel-ppc64-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578262" comment="kernel-ppc64-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578264" comment="kernel-source-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578265" comment="kernel-syms-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578266" comment="kernel-trace-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578267" comment="kernel-trace-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566721" comment="kernel-xen-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566722" comment="kernel-xen-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566725" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578252" comment="kernel-bigsmp-3.0.101-0.47.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578253" comment="kernel-bigsmp-base-3.0.101-0.47.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578254" comment="kernel-default-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578255" comment="kernel-default-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578257" comment="kernel-default-man-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578258" comment="kernel-ec2-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578259" comment="kernel-ec2-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578261" comment="kernel-ppc64-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578262" comment="kernel-ppc64-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578264" comment="kernel-source-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578265" comment="kernel-syms-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578266" comment="kernel-trace-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578267" comment="kernel-trace-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566721" comment="kernel-xen-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566722" comment="kernel-xen-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566725" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578252" comment="kernel-bigsmp-3.0.101-0.47.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578253" comment="kernel-bigsmp-base-3.0.101-0.47.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578254" comment="kernel-default-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578255" comment="kernel-default-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578257" comment="kernel-default-man-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578258" comment="kernel-ec2-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578259" comment="kernel-ec2-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578261" comment="kernel-ppc64-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578262" comment="kernel-ppc64-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578264" comment="kernel-source-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578265" comment="kernel-syms-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578266" comment="kernel-trace-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578267" comment="kernel-trace-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566721" comment="kernel-xen-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566722" comment="kernel-xen-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566725" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218775" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="839104" ref_url="https://bugzilla.suse.com/839104" source="BUGZILLA"/>
		<reference ref_id="866130" ref_url="https://bugzilla.suse.com/866130" source="BUGZILLA"/>
		<reference ref_id="919351" ref_url="https://bugzilla.suse.com/919351" source="BUGZILLA"/>
		<reference ref_id="944309" ref_url="https://bugzilla.suse.com/944309" source="BUGZILLA"/>
		<reference ref_id="950998" ref_url="https://bugzilla.suse.com/950998" source="BUGZILLA"/>
		<reference ref_id="960689" ref_url="https://bugzilla.suse.com/960689" source="BUGZILLA"/>
		<reference ref_id="962404" ref_url="https://bugzilla.suse.com/962404" source="BUGZILLA"/>
		<reference ref_id="963655" ref_url="https://bugzilla.suse.com/963655" source="BUGZILLA"/>
		<reference ref_id="963762" ref_url="https://bugzilla.suse.com/963762" source="BUGZILLA"/>
		<reference ref_id="966460" ref_url="https://bugzilla.suse.com/966460" source="BUGZILLA"/>
		<reference ref_id="969149" ref_url="https://bugzilla.suse.com/969149" source="BUGZILLA"/>
		<reference ref_id="970114" ref_url="https://bugzilla.suse.com/970114" source="BUGZILLA"/>
		<reference ref_id="971126" ref_url="https://bugzilla.suse.com/971126" source="BUGZILLA"/>
		<reference ref_id="971360" ref_url="https://bugzilla.suse.com/971360" source="BUGZILLA"/>
		<reference ref_id="971446" ref_url="https://bugzilla.suse.com/971446" source="BUGZILLA"/>
		<reference ref_id="971729" ref_url="https://bugzilla.suse.com/971729" source="BUGZILLA"/>
		<reference ref_id="971944" ref_url="https://bugzilla.suse.com/971944" source="BUGZILLA"/>
		<reference ref_id="974428" ref_url="https://bugzilla.suse.com/974428" source="BUGZILLA"/>
		<reference ref_id="975945" ref_url="https://bugzilla.suse.com/975945" source="BUGZILLA"/>
		<reference ref_id="978401" ref_url="https://bugzilla.suse.com/978401" source="BUGZILLA"/>
		<reference ref_id="978821" ref_url="https://bugzilla.suse.com/978821" source="BUGZILLA"/>
		<reference ref_id="978822" ref_url="https://bugzilla.suse.com/978822" source="BUGZILLA"/>
		<reference ref_id="979213" ref_url="https://bugzilla.suse.com/979213" source="BUGZILLA"/>
		<reference ref_id="979274" ref_url="https://bugzilla.suse.com/979274" source="BUGZILLA"/>
		<reference ref_id="979548" ref_url="https://bugzilla.suse.com/979548" source="BUGZILLA"/>
		<reference ref_id="979681" ref_url="https://bugzilla.suse.com/979681" source="BUGZILLA"/>
		<reference ref_id="979867" ref_url="https://bugzilla.suse.com/979867" source="BUGZILLA"/>
		<reference ref_id="979879" ref_url="https://bugzilla.suse.com/979879" source="BUGZILLA"/>
		<reference ref_id="980371" ref_url="https://bugzilla.suse.com/980371" source="BUGZILLA"/>
		<reference ref_id="980725" ref_url="https://bugzilla.suse.com/980725" source="BUGZILLA"/>
		<reference ref_id="980788" ref_url="https://bugzilla.suse.com/980788" source="BUGZILLA"/>
		<reference ref_id="980931" ref_url="https://bugzilla.suse.com/980931" source="BUGZILLA"/>
		<reference ref_id="981267" ref_url="https://bugzilla.suse.com/981267" source="BUGZILLA"/>
		<reference ref_id="983143" ref_url="https://bugzilla.suse.com/983143" source="BUGZILLA"/>
		<reference ref_id="983213" ref_url="https://bugzilla.suse.com/983213" source="BUGZILLA"/>
		<reference ref_id="983535" ref_url="https://bugzilla.suse.com/983535" source="BUGZILLA"/>
		<reference ref_id="984107" ref_url="https://bugzilla.suse.com/984107" source="BUGZILLA"/>
		<reference ref_id="984755" ref_url="https://bugzilla.suse.com/984755" source="BUGZILLA"/>
		<reference ref_id="986362" ref_url="https://bugzilla.suse.com/986362" source="BUGZILLA"/>
		<reference ref_id="986365" ref_url="https://bugzilla.suse.com/986365" source="BUGZILLA"/>
		<reference ref_id="986445" ref_url="https://bugzilla.suse.com/986445" source="BUGZILLA"/>
		<reference ref_id="986572" ref_url="https://bugzilla.suse.com/986572" source="BUGZILLA"/>
		<reference ref_id="987709" ref_url="https://bugzilla.suse.com/987709" source="BUGZILLA"/>
		<reference ref_id="988065" ref_url="https://bugzilla.suse.com/988065" source="BUGZILLA"/>
		<reference ref_id="989152" ref_url="https://bugzilla.suse.com/989152" source="BUGZILLA"/>
		<reference ref_id="989401" ref_url="https://bugzilla.suse.com/989401" source="BUGZILLA"/>
		<reference ref_id="991608" ref_url="https://bugzilla.suse.com/991608" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4312" ref_url="https://www.suse.com/security/cve/CVE-2013-4312/" source="CVE"/>
		<reference ref_id="CVE-2015-7513" ref_url="https://www.suse.com/security/cve/CVE-2015-7513/" source="CVE"/>
		<reference ref_id="CVE-2015-7833" ref_url="https://www.suse.com/security/cve/CVE-2015-7833/" source="CVE"/>
		<reference ref_id="CVE-2016-0758" ref_url="https://www.suse.com/security/cve/CVE-2016-0758/" source="CVE"/>
		<reference ref_id="CVE-2016-1583" ref_url="https://www.suse.com/security/cve/CVE-2016-1583/" source="CVE"/>
		<reference ref_id="CVE-2016-2053" ref_url="https://www.suse.com/security/cve/CVE-2016-2053/" source="CVE"/>
		<reference ref_id="CVE-2016-2187" ref_url="https://www.suse.com/security/cve/CVE-2016-2187/" source="CVE"/>
		<reference ref_id="CVE-2016-3134" ref_url="https://www.suse.com/security/cve/CVE-2016-3134/" source="CVE"/>
		<reference ref_id="CVE-2016-3955" ref_url="https://www.suse.com/security/cve/CVE-2016-3955/" source="CVE"/>
		<reference ref_id="CVE-2016-4470" ref_url="https://www.suse.com/security/cve/CVE-2016-4470/" source="CVE"/>
		<reference ref_id="CVE-2016-4482" ref_url="https://www.suse.com/security/cve/CVE-2016-4482/" source="CVE"/>
		<reference ref_id="CVE-2016-4485" ref_url="https://www.suse.com/security/cve/CVE-2016-4485/" source="CVE"/>
		<reference ref_id="CVE-2016-4486" ref_url="https://www.suse.com/security/cve/CVE-2016-4486/" source="CVE"/>
		<reference ref_id="CVE-2016-4565" ref_url="https://www.suse.com/security/cve/CVE-2016-4565/" source="CVE"/>
		<reference ref_id="CVE-2016-4569" ref_url="https://www.suse.com/security/cve/CVE-2016-4569/" source="CVE"/>
		<reference ref_id="CVE-2016-4578" ref_url="https://www.suse.com/security/cve/CVE-2016-4578/" source="CVE"/>
		<reference ref_id="CVE-2016-4580" ref_url="https://www.suse.com/security/cve/CVE-2016-4580/" source="CVE"/>
		<reference ref_id="CVE-2016-4805" ref_url="https://www.suse.com/security/cve/CVE-2016-4805/" source="CVE"/>
		<reference ref_id="CVE-2016-4913" ref_url="https://www.suse.com/security/cve/CVE-2016-4913/" source="CVE"/>
		<reference ref_id="CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997/" source="CVE"/>
		<reference ref_id="CVE-2016-5244" ref_url="https://www.suse.com/security/cve/CVE-2016-5244/" source="CVE"/>
		<reference ref_id="CVE-2016-5696" ref_url="https://www.suse.com/security/cve/CVE-2016-5696/" source="CVE"/>
		<reference ref_id="CVE-2016-5829" ref_url="https://www.suse.com/security/cve/CVE-2016-5829/" source="CVE"/>
		<reference ref_id="CVE-2016-6480" ref_url="https://www.suse.com/security/cve/CVE-2016-6480/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002255.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:
- CVE-2016-3955: The usbip_recv_xbuff function in drivers/usb/usbip/usbip_common.c in the Linux kernel allowed remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted length value in a USB/IP packet (bnc#975945).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986365).
- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).
- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure was initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).
- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).
- CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandled NM (aka alternate name) entries containing \0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).
- CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).
- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).
- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bnc#979867).
- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).
- CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).
- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).
- CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).
- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).
- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).
- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack. (bsc#989152)
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability. (bsc#991608)

The following non-security bugs were fixed:
- Update patches.fixes/pci-determine-actual-vpd-size-on-first-access.patch (bsc#971729, bsc#974428).
- Update PCI VPD size patch to upstream: 
  * PCI: Determine actual VPD size on first access (bsc#971729). 
  * PCI: Update VPD definitions (bsc#971729). (cherry picked from commit d2af5b7e0cd7ee2a54f02ad65ec300d16b3ad956)
- Update patches.fixes/pci-update-vpd-definitions.patch (bsc#971729, bsc#974428).
- cgroups: do not attach task to subsystem if migration failed (bnc#979274).
- cgroups: more safe tasklist locking in cgroup_attach_proc (bnc#979274).
- fs/cifs: Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)
- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- hid: add ALWAYS_POLL quirk for a Logitech 0xc055 (bnc#962404).
- hid: add HP OEM mouse to quirk ALWAYS_POLL (bsc#919351).
- hid: add quirk for PIXART OEM mouse used by HP (bsc#919351).
- hid-elo: kill not flush the work.
- ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360).
- ipv4: fix ineffective source address selection (bsc#980788).
- ipvs: count pre-established TCP states as active (bsc#970114).
- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).
- mm/hugetlb.c: correct missing private flag clearing (VM Functionality, bnc#971446).
- mm/hugetlb: fix backport of upstream commit 07443a85ad (VM Functionality, bnc#971446).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- nfs: Do not attempt to decode missing directory entries (bsc#980931).
- nfs: fix memory corruption rooted in get_ih_name pointer math (bsc#984107).
- nfs: reduce access cache shrinker locking (bnc#866130).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- s390/cio: collect format 1 channel-path description data (bsc#966460,LTC#136434).
- s390/cio: ensure consistent measurement state (bsc#966460,LTC#136434).
- s390/cio: fix measurement characteristics memleak (bsc#966460,LTC#136434).
- s390/cio: update measurement characteristics (bsc#966460,LTC#136434).
- usbhid: add device USB_DEVICE_ID_LOGITECH_C077 (bsc#919351).
- usbhid: more mice with ALWAYS_POLL (bsc#919351).
- usbhid: yet another mouse with ALWAYS_POLL (bsc#919351).
- veth: do not modify ip_summed (bsc#969149).
- virtio_scsi: Implement eh_timed_out callback.
- vmxnet3: segCnt can be 1 for LRO packets (bsc#988065).
- xfs: Avoid grabbing ilock when file size is not changed (bsc#983535).
- xfs: avoid xfs_buf hang in lookup node directory corruption (bsc#989401).
- xfs: only update the last_sync_lsn when a transaction completes (bsc#987709).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-06"/>
	<updated date="2016-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/839104">SUSE bug 839104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866130">SUSE bug 866130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919351">SUSE bug 919351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944309">SUSE bug 944309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950998">SUSE bug 950998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960689">SUSE bug 960689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962404">SUSE bug 962404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963655">SUSE bug 963655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963762">SUSE bug 963762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966460">SUSE bug 966460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969149">SUSE bug 969149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970114">SUSE bug 970114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971126">SUSE bug 971126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971360">SUSE bug 971360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971446">SUSE bug 971446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971729">SUSE bug 971729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971944">SUSE bug 971944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974428">SUSE bug 974428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975945">SUSE bug 975945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978401">SUSE bug 978401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978821">SUSE bug 978821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978822">SUSE bug 978822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979213">SUSE bug 979213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979274">SUSE bug 979274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979548">SUSE bug 979548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979681">SUSE bug 979681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979867">SUSE bug 979867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979879">SUSE bug 979879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980371">SUSE bug 980371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980725">SUSE bug 980725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980788">SUSE bug 980788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980931">SUSE bug 980931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981267">SUSE bug 981267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983143">SUSE bug 983143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983213">SUSE bug 983213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983535">SUSE bug 983535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984107">SUSE bug 984107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984755">SUSE bug 984755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986365">SUSE bug 986365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986445">SUSE bug 986445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986572">SUSE bug 986572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987709">SUSE bug 987709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988065">SUSE bug 988065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989152">SUSE bug 989152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989401">SUSE bug 989401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991608">SUSE bug 991608</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4312/">CVE-2013-4312 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4312">CVE-2013-4312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7513/">CVE-2015-7513 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7513">CVE-2015-7513 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-7833/">CVE-2015-7833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7833">CVE-2015-7833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0758/">CVE-2016-0758 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0758">CVE-2016-0758 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1583/">CVE-2016-1583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1583">CVE-2016-1583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2053/">CVE-2016-2053 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2053">CVE-2016-2053 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2187/">CVE-2016-2187 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2187">CVE-2016-2187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3134/">CVE-2016-3134 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3134">CVE-2016-3134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3955/">CVE-2016-3955 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3955">CVE-2016-3955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4470/">CVE-2016-4470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4470">CVE-2016-4470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4482/">CVE-2016-4482 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4482">CVE-2016-4482 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4485/">CVE-2016-4485 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4485">CVE-2016-4485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4486/">CVE-2016-4486 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4486">CVE-2016-4486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4565/">CVE-2016-4565 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4565">CVE-2016-4565 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4569/">CVE-2016-4569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4569">CVE-2016-4569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4578/">CVE-2016-4578 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4578">CVE-2016-4578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4580/">CVE-2016-4580 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4580">CVE-2016-4580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4805/">CVE-2016-4805 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4805">CVE-2016-4805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4913/">CVE-2016-4913 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4913">CVE-2016-4913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4997">CVE-2016-4997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5244/">CVE-2016-5244 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5244">CVE-2016-5244 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5696/">CVE-2016-5696 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5696">CVE-2016-5696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5829/">CVE-2016-5829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5829">CVE-2016-5829 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6480/">CVE-2016-6480 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6480">CVE-2016-6480 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578269" comment="kernel-bigsmp-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578270" comment="kernel-bigsmp-base-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578272" comment="kernel-default-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578273" comment="kernel-default-base-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578275" comment="kernel-default-man-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578276" comment="kernel-ec2-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578277" comment="kernel-ec2-base-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568113" comment="kernel-pae-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568114" comment="kernel-pae-base-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578279" comment="kernel-source-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578280" comment="kernel-syms-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578281" comment="kernel-trace-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578282" comment="kernel-trace-base-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578284" comment="kernel-xen-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578285" comment="kernel-xen-base-3.0.101-0.47.86.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218776" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1013533" ref_url="https://bugzilla.suse.com/1013533" source="BUGZILLA"/>
		<reference ref_id="1013604" ref_url="https://bugzilla.suse.com/1013604" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9576" ref_url="https://www.suse.com/security/cve/CVE-2016-9576/" source="CVE"/>
		<reference ref_id="CVE-2016-9794" ref_url="https://www.suse.com/security/cve/CVE-2016-9794/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002515.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP 3 kernel was updated to fix two security issues.

The following security bugs were fixed:

- CVE-2016-9576: A use-after-free vulnerability in the SCSI generic driver allows users with write access to /dev/sg* or /dev/bsg* to elevate their privileges (bsc#1013604).
- CVE-2016-9794: A use-after-free vulnerability in the ALSA pcm layer allowed local users to cause a denial of service, memory corruption or possibly even to elevate their privileges (bsc#1013533).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-22"/>
	<updated date="2016-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013533">SUSE bug 1013533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013604">SUSE bug 1013604</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9576/">CVE-2016-9576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9576">CVE-2016-9576 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9794/">CVE-2016-9794 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9794">CVE-2016-9794 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578287" comment="kernel-bigsmp-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578288" comment="kernel-bigsmp-base-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578290" comment="kernel-default-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578291" comment="kernel-default-base-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578293" comment="kernel-default-man-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578294" comment="kernel-ec2-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578295" comment="kernel-ec2-base-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568130" comment="kernel-pae-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568131" comment="kernel-pae-base-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578297" comment="kernel-source-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578298" comment="kernel-syms-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578299" comment="kernel-trace-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578300" comment="kernel-trace-base-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578302" comment="kernel-xen-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578303" comment="kernel-xen-base-3.0.101-0.47.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218777" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1027565" ref_url="https://bugzilla.suse.com/1027565" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2636" ref_url="https://www.suse.com/security/cve/CVE-2017-2636/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002780.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP3 kernel was updated to fix the following security bug:

CVE-2017-2636: A race condition in the n_hdlc tty Linux kernel driver (drivers/tty/n_hdlc.c)
could have been exploited to gain a local privilege escalation (bnc#1027565)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-03"/>
	<updated date="2017-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027565">SUSE bug 1027565</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2636/">CVE-2017-2636 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2636">CVE-2017-2636 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578305" comment="kernel-bigsmp-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578306" comment="kernel-bigsmp-base-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578308" comment="kernel-default-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578309" comment="kernel-default-base-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578311" comment="kernel-default-man-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578312" comment="kernel-ec2-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578313" comment="kernel-ec2-base-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568147" comment="kernel-pae-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568148" comment="kernel-pae-base-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578315" comment="kernel-source-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578316" comment="kernel-syms-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578317" comment="kernel-trace-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578318" comment="kernel-trace-base-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578320" comment="kernel-xen-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578321" comment="kernel-xen-base-3.0.101-0.47.99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218778" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1039348" ref_url="https://bugzilla.suse.com/1039348" source="BUGZILLA"/>
		<reference ref_id="979021" ref_url="https://bugzilla.suse.com/979021" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3288" ref_url="https://www.suse.com/security/cve/CVE-2015-3288/" source="CVE"/>
		<reference ref_id="CVE-2017-1000364" ref_url="https://www.suse.com/security/cve/CVE-2017-1000364/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002957.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP3 kernel was updated to receive various security fixes.

The following security bugs were fixed:

- CVE-2017-1000364: The default stack guard page was too small and could be 'jumped over' by userland programs using 
more than one page of stack in functions and so lead to memory corruption. This update extends the stack guard page
  to 1 MB (for 4k pages) and 16 MB (for 64k pages) to reduce this attack vector. This is not a kernel bugfix, but a 
hardening measure against this kind of userland attack.(bsc#1039348)

- CVE-2015-3288: mm/memory.c in the Linux kernel mishandled anonymous pages, which allowed local users to gain 
privileges or cause a denial of service (page tainting) via a crafted application that triggers writing to page zero 
(bnc#979021).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-19"/>
	<updated date="2017-06-19"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979021">SUSE bug 979021</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3288/">CVE-2015-3288 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3288">CVE-2015-3288 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000364/">CVE-2017-1000364 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000364">CVE-2017-1000364 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578323" comment="kernel-bigsmp-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578324" comment="kernel-bigsmp-base-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578326" comment="kernel-default-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578327" comment="kernel-default-base-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578329" comment="kernel-default-man-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578330" comment="kernel-ec2-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578331" comment="kernel-ec2-base-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568164" comment="kernel-pae-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568165" comment="kernel-pae-base-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578333" comment="kernel-source-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578334" comment="kernel-syms-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578335" comment="kernel-trace-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578336" comment="kernel-trace-base-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578338" comment="kernel-xen-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578339" comment="kernel-xen-base-3.0.101-0.47.102.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218779" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1045340" ref_url="https://bugzilla.suse.com/1045340" source="BUGZILLA"/>
		<reference ref_id="1045406" ref_url="https://bugzilla.suse.com/1045406" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000364" ref_url="https://www.suse.com/security/cve/CVE-2017-1000364/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002987.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP3 kernel was updated to fix the following issues:

- A previous security update to address CVE-2017-1000364 caused unintended
  side-effects in several other tools, most notably Java. These issues have
  been remedied. [bsc#1045340, bsc#1045406]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-27"/>
	<updated date="2017-06-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045340">SUSE bug 1045340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045406">SUSE bug 1045406</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000364/">CVE-2017-1000364 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000364">CVE-2017-1000364 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578341" comment="kernel-bigsmp-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578342" comment="kernel-bigsmp-base-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578344" comment="kernel-default-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578345" comment="kernel-default-base-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578347" comment="kernel-default-man-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578348" comment="kernel-ec2-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578349" comment="kernel-ec2-base-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568181" comment="kernel-pae-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568182" comment="kernel-pae-base-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578351" comment="kernel-source-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578352" comment="kernel-syms-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578353" comment="kernel-trace-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578354" comment="kernel-trace-base-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578356" comment="kernel-xen-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578357" comment="kernel-xen-base-3.0.101-0.47.105.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218780" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1059525" ref_url="https://bugzilla.suse.com/1059525" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000253" ref_url="https://www.suse.com/security/cve/CVE-2017-1000253/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003297.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP3 kernel was updated to fix the following issues:

- Stack corruption could have lead to local privilege escalation
  (bsc#1059525, CVE-2017-1000253).
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-13"/>
	<updated date="2017-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059525">SUSE bug 1059525</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000253/">CVE-2017-1000253 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000253">CVE-2017-1000253 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578359" comment="kernel-bigsmp-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578360" comment="kernel-bigsmp-base-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578362" comment="kernel-default-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578363" comment="kernel-default-base-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578365" comment="kernel-default-man-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578366" comment="kernel-ec2-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578367" comment="kernel-ec2-base-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568198" comment="kernel-pae-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568199" comment="kernel-pae-base-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578369" comment="kernel-source-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578370" comment="kernel-syms-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578371" comment="kernel-trace-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578372" comment="kernel-trace-base-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578374" comment="kernel-xen-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578375" comment="kernel-xen-base-3.0.101-0.47.106.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218781" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1057199" ref_url="https://bugzilla.suse.com/1057199" source="BUGZILLA"/>
		<reference ref_id="1087081" ref_url="https://bugzilla.suse.com/1087081" source="BUGZILLA"/>
		<reference ref_id="1092903" ref_url="https://bugzilla.suse.com/1092903" source="BUGZILLA"/>
		<reference ref_id="1102517" ref_url="https://bugzilla.suse.com/1102517" source="BUGZILLA"/>
		<reference ref_id="1103119" ref_url="https://bugzilla.suse.com/1103119" source="BUGZILLA"/>
		<reference ref_id="1104367" ref_url="https://bugzilla.suse.com/1104367" source="BUGZILLA"/>
		<reference ref_id="1104684" ref_url="https://bugzilla.suse.com/1104684" source="BUGZILLA"/>
		<reference ref_id="1104818" ref_url="https://bugzilla.suse.com/1104818" source="BUGZILLA"/>
		<reference ref_id="1105100" ref_url="https://bugzilla.suse.com/1105100" source="BUGZILLA"/>
		<reference ref_id="1105296" ref_url="https://bugzilla.suse.com/1105296" source="BUGZILLA"/>
		<reference ref_id="1105322" ref_url="https://bugzilla.suse.com/1105322" source="BUGZILLA"/>
		<reference ref_id="1105323" ref_url="https://bugzilla.suse.com/1105323" source="BUGZILLA"/>
		<reference ref_id="1105536" ref_url="https://bugzilla.suse.com/1105536" source="BUGZILLA"/>
		<reference ref_id="1106369" ref_url="https://bugzilla.suse.com/1106369" source="BUGZILLA"/>
		<reference ref_id="1106509" ref_url="https://bugzilla.suse.com/1106509" source="BUGZILLA"/>
		<reference ref_id="1106511" ref_url="https://bugzilla.suse.com/1106511" source="BUGZILLA"/>
		<reference ref_id="1107001" ref_url="https://bugzilla.suse.com/1107001" source="BUGZILLA"/>
		<reference ref_id="1107689" ref_url="https://bugzilla.suse.com/1107689" source="BUGZILLA"/>
		<reference ref_id="1108912" ref_url="https://bugzilla.suse.com/1108912" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-10940" ref_url="https://www.suse.com/security/cve/CVE-2018-10940/" source="CVE"/>
		<reference ref_id="CVE-2018-14634" ref_url="https://www.suse.com/security/cve/CVE-2018-14634/" source="CVE"/>
		<reference ref_id="CVE-2018-14734" ref_url="https://www.suse.com/security/cve/CVE-2018-14734/" source="CVE"/>
		<reference ref_id="CVE-2018-15572" ref_url="https://www.suse.com/security/cve/CVE-2018-15572/" source="CVE"/>
		<reference ref_id="CVE-2018-16658" ref_url="https://www.suse.com/security/cve/CVE-2018-16658/" source="CVE"/>
		<reference ref_id="CVE-2018-6554" ref_url="https://www.suse.com/security/cve/CVE-2018-6554/" source="CVE"/>
		<reference ref_id="CVE-2018-6555" ref_url="https://www.suse.com/security/cve/CVE-2018-6555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004617.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-14634: Prevent integer overflow in create_elf_tables that allowed a
  local attacker to exploit this vulnerability via a SUID-root binary and obtain
  full root privileges (bsc#1108912).
- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local
  attackers to use a incorrect bounds check in the CDROM driver
  CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)
- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that
  could have been used by local attackers to read kernel memory (bnc#1107689)
- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a
  denial of service (ias_object use-after-free and system crash) or possibly have
  unspecified other impact via an AF_IRDA socket (bnc#1106511)
- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed
  local users to cause a denial of service (memory consumption) by repeatedly
  binding an AF_IRDA socket (bnc#1106509)
- CVE-2018-15572: The spectre_v2_select_mitigation function did not always fill
  RSB upon a context switch, which made it easier for attackers to conduct
  userspace-userspace spectreRSB attacks (bnc#1102517)
- CVE-2018-10902: Protect against concurrent access to prevent double realloc
  (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A
  malicious local attacker could have used this for privilege escalation
  (bnc#1105322).
- CVE-2018-14734: ucma_leave_multicast accessed a certain data structure after
  a cleanup step in ucma_process_join, which allowed attackers to cause a denial
  of service (use-after-free) (bsc#1103119).

The following non-security bugs were fixed:

- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).
- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).
- KVM: x86: Free vmx_msr_bitmap_longmode while kvm_init failed (bsc#1104367).
- Refresh patches.xen/xen3-x86-l1tf-04-protect-PROT_NONE-ptes.patch (bsc#1105100).
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- ptrace: fix PTRACE_LISTEN race corrupting task-&gt;state (bnc#1107001).
- rpm/kernel-docs.spec.in: Expand kernel tree directly from sources (bsc#1057199)
- x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).
- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).
- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bnc#1105536).
- xen x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- xen x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- xen, x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).
- xen: x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-27"/>
	<updated date="2018-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1057199">SUSE bug 1057199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092903">SUSE bug 1092903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102517">SUSE bug 1102517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103119">SUSE bug 1103119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104367">SUSE bug 1104367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104684">SUSE bug 1104684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104818">SUSE bug 1104818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105100">SUSE bug 1105100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105296">SUSE bug 1105296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105322">SUSE bug 1105322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105323">SUSE bug 1105323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105536">SUSE bug 1105536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106369">SUSE bug 1106369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106509">SUSE bug 1106509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106511">SUSE bug 1106511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107001">SUSE bug 1107001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107689">SUSE bug 1107689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108912">SUSE bug 1108912</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10902">CVE-2018-10902 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10940/">CVE-2018-10940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10940">CVE-2018-10940 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14634/">CVE-2018-14634 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14634">CVE-2018-14634 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14734/">CVE-2018-14734 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14734">CVE-2018-14734 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15572/">CVE-2018-15572 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15572">CVE-2018-15572 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16658/">CVE-2018-16658 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16658">CVE-2018-16658 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6554/">CVE-2018-6554 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6554">CVE-2018-6554 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6555/">CVE-2018-6555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6555">CVE-2018-6555 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578377" comment="kernel-bigsmp-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578378" comment="kernel-bigsmp-base-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578380" comment="kernel-default-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578381" comment="kernel-default-base-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578383" comment="kernel-default-man-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578384" comment="kernel-ec2-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578385" comment="kernel-ec2-base-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568215" comment="kernel-pae-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568216" comment="kernel-pae-base-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578387" comment="kernel-source-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578388" comment="kernel-syms-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578389" comment="kernel-trace-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578390" comment="kernel-trace-base-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578392" comment="kernel-xen-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578393" comment="kernel-xen-base-3.0.101-0.47.106.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218782" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="831029" ref_url="https://bugzilla.suse.com/831029" source="BUGZILLA"/>
		<reference ref_id="871224" ref_url="https://bugzilla.suse.com/871224" source="BUGZILLA"/>
		<reference ref_id="900881" ref_url="https://bugzilla.suse.com/900881" source="BUGZILLA"/>
		<reference ref_id="914742" ref_url="https://bugzilla.suse.com/914742" source="BUGZILLA"/>
		<reference ref_id="915577" ref_url="https://bugzilla.suse.com/915577" source="BUGZILLA"/>
		<reference ref_id="917830" ref_url="https://bugzilla.suse.com/917830" source="BUGZILLA"/>
		<reference ref_id="918333" ref_url="https://bugzilla.suse.com/918333" source="BUGZILLA"/>
		<reference ref_id="919018" ref_url="https://bugzilla.suse.com/919018" source="BUGZILLA"/>
		<reference ref_id="919463" ref_url="https://bugzilla.suse.com/919463" source="BUGZILLA"/>
		<reference ref_id="924721" ref_url="https://bugzilla.suse.com/924721" source="BUGZILLA"/>
		<reference ref_id="925927" ref_url="https://bugzilla.suse.com/925927" source="BUGZILLA"/>
		<reference ref_id="926240" ref_url="https://bugzilla.suse.com/926240" source="BUGZILLA"/>
		<reference ref_id="926439" ref_url="https://bugzilla.suse.com/926439" source="BUGZILLA"/>
		<reference ref_id="928130" ref_url="https://bugzilla.suse.com/928130" source="BUGZILLA"/>
		<reference ref_id="929148" ref_url="https://bugzilla.suse.com/929148" source="BUGZILLA"/>
		<reference ref_id="929283" ref_url="https://bugzilla.suse.com/929283" source="BUGZILLA"/>
		<reference ref_id="930284" ref_url="https://bugzilla.suse.com/930284" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3647" ref_url="https://www.suse.com/security/cve/CVE-2014-3647/" source="CVE"/>
		<reference ref_id="CVE-2014-8086" ref_url="https://www.suse.com/security/cve/CVE-2014-8086/" source="CVE"/>
		<reference ref_id="CVE-2014-8159" ref_url="https://www.suse.com/security/cve/CVE-2014-8159/" source="CVE"/>
		<reference ref_id="CVE-2014-9683" ref_url="https://www.suse.com/security/cve/CVE-2014-9683/" source="CVE"/>
		<reference ref_id="CVE-2015-0777" ref_url="https://www.suse.com/security/cve/CVE-2015-0777/" source="CVE"/>
		<reference ref_id="CVE-2015-1421" ref_url="https://www.suse.com/security/cve/CVE-2015-1421/" source="CVE"/>
		<reference ref_id="CVE-2015-2042" ref_url="https://www.suse.com/security/cve/CVE-2015-2042/" source="CVE"/>
		<reference ref_id="CVE-2015-2150" ref_url="https://www.suse.com/security/cve/CVE-2015-2150/" source="CVE"/>
		<reference ref_id="CVE-2015-2830" ref_url="https://www.suse.com/security/cve/CVE-2015-2830/" source="CVE"/>
		<reference ref_id="CVE-2015-3339" ref_url="https://www.suse.com/security/cve/CVE-2015-3339/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP3 Teradata Kernel was updated to fix the 
following security issues:

    * vfs: Fix race between fcntl() and file-&gt;f_flags checks (bnc#900881,
      CVE-2014-8086).
    * fs: Take i_mutex during prepare_binprm for setid executables
      (bnc#928130, CVE-2015-3339).
    * ib/uverbs: Prevent integer overflow in ib_umem_get address arithmetic
      (bsc#914742, CVE-2014-8159).
    * eCryptfs: Remove buggy and unnecessary write in file name decode
      routine (bsc#918333, CVE-2014-9683).
    * x86/asm/entry/64: Remove a bogus 'ret_from_fork' optimization
      (bsc#926240, CVE-2015-2830).
    * net/rds: Use correct size for max unacked packets and bytes
      (bsc#919018, CVE-2015-2042).
    * net/sctp: Fix slab corruption from use after free on INIT collisions
      (bsc#915577, CVE-2015-1421).
    * usbback: Copy only filled buffers to guest (bsc#917830,
      CVE-2015-0777).
    * xen-pciback: Limit guest control of command register (bsc#919463,
      CVE-2015-2150, XSA-120).
    * (update) kvm/x86: Distinguish between stack operation and near
      branches (bnc#899192, bsc#924721, CVE-2014-3647).
    * (update) kvm/x86: Emulator fixes for eip canonical checks on near
      branches (bnc#899192, bsc#924721, CVE-2014-3647).

Additionally, the following non-security issues have been fixed:

    * supported.conf: Mark crc32c-intel module as supported (bnc#925927).
    * supported.conf: Mark tcp_westwood module as supported (bnc#871224).
    * x86/reboot: Fix a warning message triggered by stop_other_cpus()
      (bnc#930284).
    * Deal with deadlock in d_walk fix (bnc#929148, bnc#929283).
    * mm, slab: Lock the correct nodelist after reenabling irqs
      (bnc#926439).
    * nfs: Don't try to use lock state when we hold a delegation
      (bnc#831029).

Security Issues:

    * CVE-2014-8086
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8086&gt;
    * CVE-2015-3339
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3339&gt;
    * CVE-2014-8159
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8159&gt;
    * CVE-2014-9683
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9683&gt;
    * CVE-2015-2830
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2830&gt;
    * CVE-2015-2042
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2042&gt;
    * CVE-2015-1421
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1421&gt;
    * CVE-2015-0777
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0777&gt;
    * CVE-2015-2150
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2150&gt;
    * CVE-2014-3647
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3647&gt;
    * CVE-2014-3647
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3647&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-12"/>
	<updated date="2015-05-12"/>
	<bugzilla href="https://bugzilla.suse.com/831029">SUSE bug 831029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871224">SUSE bug 871224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900881">SUSE bug 900881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914742">SUSE bug 914742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915577">SUSE bug 915577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917830">SUSE bug 917830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918333">SUSE bug 918333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919018">SUSE bug 919018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919463">SUSE bug 919463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924721">SUSE bug 924721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925927">SUSE bug 925927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926240">SUSE bug 926240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926439">SUSE bug 926439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928130">SUSE bug 928130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929148">SUSE bug 929148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929283">SUSE bug 929283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930284">SUSE bug 930284</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-3647/">CVE-2014-3647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3647">CVE-2014-3647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8086/">CVE-2014-8086 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8086">CVE-2014-8086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8159/">CVE-2014-8159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8159">CVE-2014-8159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9683/">CVE-2014-9683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9683">CVE-2014-9683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0777/">CVE-2015-0777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0777">CVE-2015-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1421/">CVE-2015-1421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1421">CVE-2015-1421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2042/">CVE-2015-2042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2042">CVE-2015-2042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2150/">CVE-2015-2150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2150">CVE-2015-2150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2830/">CVE-2015-2830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2830">CVE-2015-2830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3339/">CVE-2015-3339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3339">CVE-2015-3339 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992835" comment="kernel-default-3.0.101-0.53.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992836" comment="kernel-default-base-3.0.101-0.53.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992838" comment="kernel-source-3.0.101-0.53.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992839" comment="kernel-syms-3.0.101-0.53.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992840" comment="kernel-trace-3.0.101-0.53.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992841" comment="kernel-trace-base-3.0.101-0.53.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992843" comment="kernel-xen-3.0.101-0.53.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992844" comment="kernel-xen-base-3.0.101-0.53.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218783" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="915517" ref_url="https://bugzilla.suse.com/915517" source="BUGZILLA"/>
		<reference ref_id="919007" ref_url="https://bugzilla.suse.com/919007" source="BUGZILLA"/>
		<reference ref_id="922583" ref_url="https://bugzilla.suse.com/922583" source="BUGZILLA"/>
		<reference ref_id="923908" ref_url="https://bugzilla.suse.com/923908" source="BUGZILLA"/>
		<reference ref_id="927355" ref_url="https://bugzilla.suse.com/927355" source="BUGZILLA"/>
		<reference ref_id="929525" ref_url="https://bugzilla.suse.com/929525" source="BUGZILLA"/>
		<reference ref_id="929647" ref_url="https://bugzilla.suse.com/929647" source="BUGZILLA"/>
		<reference ref_id="930786" ref_url="https://bugzilla.suse.com/930786" source="BUGZILLA"/>
		<reference ref_id="933429" ref_url="https://bugzilla.suse.com/933429" source="BUGZILLA"/>
		<reference ref_id="933896" ref_url="https://bugzilla.suse.com/933896" source="BUGZILLA"/>
		<reference ref_id="933904" ref_url="https://bugzilla.suse.com/933904" source="BUGZILLA"/>
		<reference ref_id="933907" ref_url="https://bugzilla.suse.com/933907" source="BUGZILLA"/>
		<reference ref_id="935705" ref_url="https://bugzilla.suse.com/935705" source="BUGZILLA"/>
		<reference ref_id="936831" ref_url="https://bugzilla.suse.com/936831" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9710" ref_url="https://www.suse.com/security/cve/CVE-2014-9710/" source="CVE"/>
		<reference ref_id="CVE-2014-9728" ref_url="https://www.suse.com/security/cve/CVE-2014-9728/" source="CVE"/>
		<reference ref_id="CVE-2014-9729" ref_url="https://www.suse.com/security/cve/CVE-2014-9729/" source="CVE"/>
		<reference ref_id="CVE-2014-9730" ref_url="https://www.suse.com/security/cve/CVE-2014-9730/" source="CVE"/>
		<reference ref_id="CVE-2014-9731" ref_url="https://www.suse.com/security/cve/CVE-2014-9731/" source="CVE"/>
		<reference ref_id="CVE-2015-1420" ref_url="https://www.suse.com/security/cve/CVE-2015-1420/" source="CVE"/>
		<reference ref_id="CVE-2015-1805" ref_url="https://www.suse.com/security/cve/CVE-2015-1805/" source="CVE"/>
		<reference ref_id="CVE-2015-2041" ref_url="https://www.suse.com/security/cve/CVE-2015-2041/" source="CVE"/>
		<reference ref_id="CVE-2015-2922" ref_url="https://www.suse.com/security/cve/CVE-2015-2922/" source="CVE"/>
		<reference ref_id="CVE-2015-3636" ref_url="https://www.suse.com/security/cve/CVE-2015-3636/" source="CVE"/>
		<reference ref_id="CVE-2015-4700" ref_url="https://www.suse.com/security/cve/CVE-2015-4700/" source="CVE"/>
		<reference ref_id="CVE-2015-5364" ref_url="https://www.suse.com/security/cve/CVE-2015-5364/" source="CVE"/>
		<reference ref_id="CVE-2015-5366" ref_url="https://www.suse.com/security/cve/CVE-2015-5366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001490.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP3 Teradata kernel was updated to fix the following bugs and security issues.

The following security issues have been fixed:

- Update patches.fixes/udp-fix-behavior-of-wrong-checksums.patch (bsc#936831, CVE-2015-5364, CVE-2015-5366).
- Btrfs: make xattr replace operations atomic (bnc#923908, CVE-2014-9710).
- udp: fix behavior of wrong checksums (bsc#936831, CVE-2015-5364, CVE-2015-5366).
- vfs: read file_handle only once in handle_to_path (bsc#915517, CVE-2015-1420).
- x86: bpf_jit: fix compilation of large bpf programs (bnc#935705,CVE-2015-4700).
- udf: Check length of extended attributes and allocation (bsc#936831, CVE-2015-5364, CVE-2015-5366).
- Update patches.fixes/udf-Check-component-length-before-reading-it.patch (bsc#933904, CVE-2014-9728, CVE-2014-9730).
- Update patches.fixes/udf-Verify-i_size-when-loading-inode.patch (bsc#933904, CVE-2014-9728, CVE-2014-9729).
- Update patches.fixes/udf-Verify-symlink-size-before-loading-it.patch (bsc#933904, CVE-2014-9728).
- Update patches.fixes/udf-Check-path-length-when-reading-symlink.patch (bnc#933896, CVE-2014-9731).
- pipe: fix iov overrun for failed atomic copy (bsc#933429, CVE-2015-1805).
- ipv6: Don't reduce hop limit for an interface (bsc#922583, CVE-2015-2922).
- net: llc: use correct size for sysctl timeout entries (bsc#919007, CVE-2015-2041).
- ipv4: Missing sk_nulls_node_init() in ping_unhash() (bsc#929525, CVE-2015-3636).
- ipv6: Don't reduce hop limit for an interface (bsc#922583, CVE-2015-2922).
- net: llc: use correct size for sysctl timeout entries (bsc#919007, CVE-2015-2041).
- ipv4: Missing sk_nulls_node_init() in ping_unhash() (bsc#929525, CVE-2015-3636).

The following non-security issues have been fixed:

- mlx4: Check for assigned VFs before disabling SR-IOV (bsc#927355).
- ixgbe: Use pci_vfs_assigned instead of ixgbe_vfs_are_assigned (bsc#927355).
- pci: Add SRIOV helper function to determine if VFs are assigned to guest (bsc#927355).
- net/mlx4_core: Don't disable SRIOV if there are active VFs (bsc#927355).
- udf: Remove repeated loads blocksize (bsc#933907).
- Refresh patches.fixes/deal-with-deadlock-in-d_walk-fix.patch. based on 3.2 stable fix 20defcec264c ('dcache: Fix locking bugs in backported 'deal with deadlock in d_walk()''). Not harmfull for regular SLES kernels but RT or PREEMPT kernels would see disbalance.
- sched: Fix potential near-infinite distribute_cfs_runtime() loop (bnc#930786)
- tty: Correct tty buffer flush (bnc#929647).
- tty: hold lock across tty buffer finding and buffer filling (bnc#929647).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-31"/>
	<updated date="2015-07-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/915517">SUSE bug 915517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919007">SUSE bug 919007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922583">SUSE bug 922583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923908">SUSE bug 923908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927355">SUSE bug 927355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929525">SUSE bug 929525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929647">SUSE bug 929647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930786">SUSE bug 930786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933429">SUSE bug 933429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933896">SUSE bug 933896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933904">SUSE bug 933904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933907">SUSE bug 933907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935705">SUSE bug 935705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936831">SUSE bug 936831</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9710/">CVE-2014-9710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9710">CVE-2014-9710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9728/">CVE-2014-9728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9728">CVE-2014-9728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9729/">CVE-2014-9729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9729">CVE-2014-9729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9730/">CVE-2014-9730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9730">CVE-2014-9730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2014-9731/">CVE-2014-9731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9731">CVE-2014-9731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1420/">CVE-2015-1420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1420">CVE-2015-1420 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2015-1805/">CVE-2015-1805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1805">CVE-2015-1805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2041/">CVE-2015-2041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2041">CVE-2015-2041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2922/">CVE-2015-2922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2922">CVE-2015-2922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3636/">CVE-2015-3636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3636">CVE-2015-3636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4700/">CVE-2015-4700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4700">CVE-2015-4700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5364/">CVE-2015-5364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5364">CVE-2015-5364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5366/">CVE-2015-5366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5366">CVE-2015-5366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992846" comment="kernel-default-3.0.101-0.63.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992847" comment="kernel-default-base-3.0.101-0.63.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992849" comment="kernel-source-3.0.101-0.63.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992850" comment="kernel-syms-3.0.101-0.63.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992851" comment="kernel-trace-3.0.101-0.63.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992852" comment="kernel-trace-base-3.0.101-0.63.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992854" comment="kernel-xen-3.0.101-0.63.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992855" comment="kernel-xen-base-3.0.101-0.63.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218784" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="851068" ref_url="https://bugzilla.suse.com/851068" source="BUGZILLA"/>
		<reference ref_id="867362" ref_url="https://bugzilla.suse.com/867362" source="BUGZILLA"/>
		<reference ref_id="873385" ref_url="https://bugzilla.suse.com/873385" source="BUGZILLA"/>
		<reference ref_id="883380" ref_url="https://bugzilla.suse.com/883380" source="BUGZILLA"/>
		<reference ref_id="886785" ref_url="https://bugzilla.suse.com/886785" source="BUGZILLA"/>
		<reference ref_id="894936" ref_url="https://bugzilla.suse.com/894936" source="BUGZILLA"/>
		<reference ref_id="915517" ref_url="https://bugzilla.suse.com/915517" source="BUGZILLA"/>
		<reference ref_id="917830" ref_url="https://bugzilla.suse.com/917830" source="BUGZILLA"/>
		<reference ref_id="919463" ref_url="https://bugzilla.suse.com/919463" source="BUGZILLA"/>
		<reference ref_id="920110" ref_url="https://bugzilla.suse.com/920110" source="BUGZILLA"/>
		<reference ref_id="920250" ref_url="https://bugzilla.suse.com/920250" source="BUGZILLA"/>
		<reference ref_id="920733" ref_url="https://bugzilla.suse.com/920733" source="BUGZILLA"/>
		<reference ref_id="921430" ref_url="https://bugzilla.suse.com/921430" source="BUGZILLA"/>
		<reference ref_id="923245" ref_url="https://bugzilla.suse.com/923245" source="BUGZILLA"/>
		<reference ref_id="924701" ref_url="https://bugzilla.suse.com/924701" source="BUGZILLA"/>
		<reference ref_id="925705" ref_url="https://bugzilla.suse.com/925705" source="BUGZILLA"/>
		<reference ref_id="925881" ref_url="https://bugzilla.suse.com/925881" source="BUGZILLA"/>
		<reference ref_id="925903" ref_url="https://bugzilla.suse.com/925903" source="BUGZILLA"/>
		<reference ref_id="926240" ref_url="https://bugzilla.suse.com/926240" source="BUGZILLA"/>
		<reference ref_id="926953" ref_url="https://bugzilla.suse.com/926953" source="BUGZILLA"/>
		<reference ref_id="927355" ref_url="https://bugzilla.suse.com/927355" source="BUGZILLA"/>
		<reference ref_id="927786" ref_url="https://bugzilla.suse.com/927786" source="BUGZILLA"/>
		<reference ref_id="929142" ref_url="https://bugzilla.suse.com/929142" source="BUGZILLA"/>
		<reference ref_id="929143" ref_url="https://bugzilla.suse.com/929143" source="BUGZILLA"/>
		<reference ref_id="930092" ref_url="https://bugzilla.suse.com/930092" source="BUGZILLA"/>
		<reference ref_id="930761" ref_url="https://bugzilla.suse.com/930761" source="BUGZILLA"/>
		<reference ref_id="930934" ref_url="https://bugzilla.suse.com/930934" source="BUGZILLA"/>
		<reference ref_id="931538" ref_url="https://bugzilla.suse.com/931538" source="BUGZILLA"/>
		<reference ref_id="932348" ref_url="https://bugzilla.suse.com/932348" source="BUGZILLA"/>
		<reference ref_id="932458" ref_url="https://bugzilla.suse.com/932458" source="BUGZILLA"/>
		<reference ref_id="933429" ref_url="https://bugzilla.suse.com/933429" source="BUGZILLA"/>
		<reference ref_id="933896" ref_url="https://bugzilla.suse.com/933896" source="BUGZILLA"/>
		<reference ref_id="933904" ref_url="https://bugzilla.suse.com/933904" source="BUGZILLA"/>
		<reference ref_id="933907" ref_url="https://bugzilla.suse.com/933907" source="BUGZILLA"/>
		<reference ref_id="933936" ref_url="https://bugzilla.suse.com/933936" source="BUGZILLA"/>
		<reference ref_id="934742" ref_url="https://bugzilla.suse.com/934742" source="BUGZILLA"/>
		<reference ref_id="934944" ref_url="https://bugzilla.suse.com/934944" source="BUGZILLA"/>
		<reference ref_id="935053" ref_url="https://bugzilla.suse.com/935053" source="BUGZILLA"/>
		<reference ref_id="935572" ref_url="https://bugzilla.suse.com/935572" source="BUGZILLA"/>
		<reference ref_id="935705" ref_url="https://bugzilla.suse.com/935705" source="BUGZILLA"/>
		<reference ref_id="935866" ref_url="https://bugzilla.suse.com/935866" source="BUGZILLA"/>
		<reference ref_id="935906" ref_url="https://bugzilla.suse.com/935906" source="BUGZILLA"/>
		<reference ref_id="936077" ref_url="https://bugzilla.suse.com/936077" source="BUGZILLA"/>
		<reference ref_id="936423" ref_url="https://bugzilla.suse.com/936423" source="BUGZILLA"/>
		<reference ref_id="936637" ref_url="https://bugzilla.suse.com/936637" source="BUGZILLA"/>
		<reference ref_id="936831" ref_url="https://bugzilla.suse.com/936831" source="BUGZILLA"/>
		<reference ref_id="936875" ref_url="https://bugzilla.suse.com/936875" source="BUGZILLA"/>
		<reference ref_id="936925" ref_url="https://bugzilla.suse.com/936925" source="BUGZILLA"/>
		<reference ref_id="937032" ref_url="https://bugzilla.suse.com/937032" source="BUGZILLA"/>
		<reference ref_id="937402" ref_url="https://bugzilla.suse.com/937402" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="937503" ref_url="https://bugzilla.suse.com/937503" source="BUGZILLA"/>
		<reference ref_id="937641" ref_url="https://bugzilla.suse.com/937641" source="BUGZILLA"/>
		<reference ref_id="937855" ref_url="https://bugzilla.suse.com/937855" source="BUGZILLA"/>
		<reference ref_id="939910" ref_url="https://bugzilla.suse.com/939910" source="BUGZILLA"/>
		<reference ref_id="939994" ref_url="https://bugzilla.suse.com/939994" source="BUGZILLA"/>
		<reference ref_id="940338" ref_url="https://bugzilla.suse.com/940338" source="BUGZILLA"/>
		<reference ref_id="940398" ref_url="https://bugzilla.suse.com/940398" source="BUGZILLA"/>
		<reference ref_id="942350" ref_url="https://bugzilla.suse.com/942350" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9728" ref_url="https://www.suse.com/security/cve/CVE-2014-9728/" source="CVE"/>
		<reference ref_id="CVE-2014-9729" ref_url="https://www.suse.com/security/cve/CVE-2014-9729/" source="CVE"/>
		<reference ref_id="CVE-2014-9730" ref_url="https://www.suse.com/security/cve/CVE-2014-9730/" source="CVE"/>
		<reference ref_id="CVE-2014-9731" ref_url="https://www.suse.com/security/cve/CVE-2014-9731/" source="CVE"/>
		<reference ref_id="CVE-2015-0777" ref_url="https://www.suse.com/security/cve/CVE-2015-0777/" source="CVE"/>
		<reference ref_id="CVE-2015-1420" ref_url="https://www.suse.com/security/cve/CVE-2015-1420/" source="CVE"/>
		<reference ref_id="CVE-2015-1805" ref_url="https://www.suse.com/security/cve/CVE-2015-1805/" source="CVE"/>
		<reference ref_id="CVE-2015-2150" ref_url="https://www.suse.com/security/cve/CVE-2015-2150/" source="CVE"/>
		<reference ref_id="CVE-2015-2830" ref_url="https://www.suse.com/security/cve/CVE-2015-2830/" source="CVE"/>
		<reference ref_id="CVE-2015-4167" ref_url="https://www.suse.com/security/cve/CVE-2015-4167/" source="CVE"/>
		<reference ref_id="CVE-2015-4700" ref_url="https://www.suse.com/security/cve/CVE-2015-4700/" source="CVE"/>
		<reference ref_id="CVE-2015-5364" ref_url="https://www.suse.com/security/cve/CVE-2015-5364/" source="CVE"/>
		<reference ref_id="CVE-2015-5366" ref_url="https://www.suse.com/security/cve/CVE-2015-5366/" source="CVE"/>
		<reference ref_id="CVE-2015-5707" ref_url="https://www.suse.com/security/cve/CVE-2015-5707/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001598.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP3 kernel was updated to receive various security and bugfixes.

Following security bugs were fixed:

- CVE-2015-5707: An integer overflow in the SCSI generic driver could
  be potentially used by local attackers to crash the kernel or execute
  code (bsc#940338).
- CVE-2015-5364: A remote denial of service (hang) via UDP flood with
  incorrect package checksums was fixed. (bsc#936831).
- CVE-2015-5366: A remote denial of service (unexpected error returns)
  via UDP flood with incorrect package checksums was fixed. (bsc#936831).
- CVE-2015-1420: A race condition in the handle_to_path function in
  fs/fhandle.c in the Linux kernel allowed local users to bypass intended
  size restrictions and trigger read operations on additional memory
  locations by changing the handle_bytes value of a file handle during
  the execution of this function (bnc#915517).
- CVE-2015-4700: A local user could have created a bad instruction in
  the JIT processed BPF code, leading to a kernel crash (bnc#935705).
- CVE-2015-4167: The UDF filesystem in the Linux kernel was vulnerable
  to a crash which could occur while fetching inode information from a
  corrupted/malicious udf file system image. (bsc#933907).
- CVE-2014-9728 CVE-2014-9729 CVE-2014-9730 CVE-2014-9731: Various
  issues in handling UDF filesystems in the Linux kernel allowed the
  corruption of kernel memory and other issues. An attacker able to mount
  a corrupted/malicious UDF file system image could cause the kernel to
  crash. (bsc#933904 bsc#933896)
- CVE-2015-2150: The Linux kernel did not properly restrict access to
  PCI command registers, which might have allowed local guest users to
  cause a denial of service (non-maskable interrupt and host crash) by
  disabling the (1) memory or (2) I/O decoding for a PCI Express device
  and then accessing the device, which triggers an Unsupported Request
  (UR) response (bsc#919463).
- CVE-2015-0777: drivers/xen/usbback/usbback.c as used in the Linux
  kernel 2.6.x and 3.x in SUSE Linux distributions, allowed guest OS users
  to obtain sensitive information from uninitialized locations in host OS
  kernel memory via unspecified vectors (bnc#917830).
- CVE-2015-2830: arch/x86/kernel/entry_64.S in the Linux kernel did
  not prevent the TS_COMPAT flag from reaching a user-mode task, which
  might have allowed local users to bypass the seccomp or audit protection
  mechanism via a crafted application that uses the (1) fork or (2) close
  system call, as demonstrated by an attack against seccomp before 3.16
  (bnc#926240).
- CVE-2015-1805: The Linux kernels implementation of vectored pipe
  read and write functionality did not take into account the I/O vectors
  that were already processed when retrying after a failed atomic access
  operation, potentially resulting in memory corruption due to an I/O vector
  array overrun. A local, unprivileged user could use this flaw to crash
  the system or, potentially, escalate their privileges on the system.
  (bsc#933429).


Also the following non-security bugs were fixed:
- audit: keep inode pinned (bsc#851068).
- btrfs: be aware of btree inode write errors to avoid fs corruption (bnc#942350).
- btrfs: check if previous transaction aborted to avoid fs corruption (bnc#942350).
- btrfs: deal with convert_extent_bit errors to avoid fs corruption (bnc#942350).
- cifs: Fix missing crypto allocation (bnc#937402).
- client MUST ignore EncryptionKeyLength if CAP_EXTENDED_SECURITY is set (bnc#932348).
- drm: ast,cirrus,mgag200: use drm_can_sleep (bnc#883380, bsc#935572).
- drm/cirrus: do not attempt to acquire a reservation while in an interrupt handler (bsc#935572).
- drm/mgag200: do not attempt to acquire a reservation while in an interrupt handler (bsc#935572).
- drm/mgag200: Do not do full cleanup if mgag200_device_init fails.
- ext3: Fix data corruption in inodes with journalled data (bsc#936637)
- ext4: handle SEEK_HOLE/SEEK_DATA generically (bsc#934944).
- fanotify: Fix deadlock with permission events (bsc#935053).
- fork: reset mm-&gt;pinned_vm (bnc#937855).
- hrtimer: prevent timer interrupt DoS (bnc#886785).
- hugetlb: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).
- hugetlb, kabi: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).
- IB/core: Fix mismatch between locked and pinned pages (bnc#937855).
- iommu/amd: Fix memory leak in free_pagetable (bsc#935866).
- iommu/amd: Handle integer overflow in dma_ops_area_alloc (bsc#931538).
- iommu/amd: Handle large pages correctly in free_pagetable (bsc#935866).
- ipr: Increase default adapter init stage change timeout (bsc#930761).
- ixgbe: Use pci_vfs_assigned instead of ixgbe_vfs_are_assigned (bsc#927355).
- kdump: fix crash_kexec()/smp_send_stop() race in panic() (bnc#937444).
- kernel: add panic_on_warn. (bsc#934742)
- kvm: irqchip: Break up high order allocations of kvm_irq_routing_table (bnc#926953).
- libata: prevent HSM state change race between ISR and PIO (bsc#923245).
- md: use kzalloc() when bitmap is disabled (bsc#939994).
- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#894936).
- mlx4: Check for assigned VFs before disabling SR-IOV (bsc#927355).
- mm/hugetlb: check for pte NULL pointer in __page_check_address() (bnc#929143).
- mm: restrict access to slab files under procfs and sysfs (bnc#936077).
- net: fib6: fib6_commit_metrics: fix potential NULL pointer dereference (bsc#867362).
- net: Fix 'ip rule delete table 256' (bsc#873385).
- net: ipv6: fib: do not sleep inside atomic lock (bsc#867362).
- net/mlx4_core: Do not disable SRIOV if there are active VFs (bsc#927355).
- nfsd: Fix nfsv4 opcode decoding error (bsc#935906).
- nfsd: support disabling 64bit dir cookies (bnc#937503).
- nfs: never queue requests with rq_cong set on the sending queue (bsc#932458).
- nfsv4: Minor cleanups for nfs4_handle_exception and nfs4_async_handle_error (bsc#939910).
- pagecache limit: add tracepoints (bnc#924701).
- pagecache limit: Do not skip over small zones that easily (bnc#925881).
- pagecache limit: export debugging counters via /proc/vmstat (bnc#924701).
- pagecache limit: fix wrong nr_reclaimed count (bnc#924701).
- pagecache limit: reduce starvation due to reclaim retries (bnc#925903).
- pci: Add SRIOV helper function to determine if VFs are assigned to guest (bsc#927355).
- pci: Disable Bus Master only on kexec reboot (bsc#920110).
- pci: disable Bus Master on PCI device shutdown (bsc#920110).
- pci: Disable Bus Master unconditionally in pci_device_shutdown() (bsc#920110).
- pci: Don't try to disable Bus Master on disconnected PCI devices (bsc#920110).
- perf, nmi: Fix unknown NMI warning (bsc#929142).
- perf/x86/intel: Move NMI clearing to end of PMI handler  (bsc#929142).
- rtlwifi: rtl8192cu: Fix kernel deadlock (bnc#927786).
- sched: fix __sched_setscheduler() vs load balancing race (bnc#921430)
- scsi_error: add missing case statements in scsi_decide_disposition() (bsc#920733).
- scsi: Set hostbyte status in scsi_check_sense() (bsc#920733).
- scsi: set host msg status correctly (bnc#933936)
- scsi: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398 bsc#930934).
- st: null pointer dereference panic caused by use after kref_put by st_open (bsc#936875).
- udf: Remove repeated loads blocksize (bsc#933907).
- usb: core: Fix USB 3.0 devices lost in NOTATTACHED state after a hub port reset (bnc#937641).
- vmxnet3: Bump up driver version number (bsc#936423).
- vmxnet3: Changes for vmxnet3 adapter version 2 (fwd) (bug#936423).
- vmxnet3: Fix memory leaks in rx path (fwd) (bug#936423).
- vmxnet3: Register shutdown handler for device (fwd) (bug#936423).
- x86/mm: Improve AMD Bulldozer ASLR workaround (bsc#937032).
- x86, tls: Interpret an all-zero struct user_desc as 'no segment' (bsc#920250).
- x86, tls, ldt: Stop checking lm in LDT_empty (bsc#920250).
- xenbus: add proper handling of XS_ERROR from Xenbus for transactions.
- xfs: avoid mounting of xfs filesystems with inconsistent option (bnc#925705)
- zcrypt: Fixed reset and interrupt handling of AP queues (bnc#936925, LTC#126491).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-21"/>
	<updated date="2015-08-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/851068">SUSE bug 851068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867362">SUSE bug 867362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873385">SUSE bug 873385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883380">SUSE bug 883380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886785">SUSE bug 886785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894936">SUSE bug 894936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915517">SUSE bug 915517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917830">SUSE bug 917830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919463">SUSE bug 919463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920110">SUSE bug 920110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920250">SUSE bug 920250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920733">SUSE bug 920733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921430">SUSE bug 921430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923245">SUSE bug 923245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924701">SUSE bug 924701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925705">SUSE bug 925705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925881">SUSE bug 925881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925903">SUSE bug 925903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926240">SUSE bug 926240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926953">SUSE bug 926953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927355">SUSE bug 927355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927786">SUSE bug 927786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929142">SUSE bug 929142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929143">SUSE bug 929143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930092">SUSE bug 930092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930761">SUSE bug 930761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930934">SUSE bug 930934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931538">SUSE bug 931538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932348">SUSE bug 932348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932458">SUSE bug 932458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933429">SUSE bug 933429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933896">SUSE bug 933896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933904">SUSE bug 933904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933907">SUSE bug 933907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933936">SUSE bug 933936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934742">SUSE bug 934742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934944">SUSE bug 934944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935053">SUSE bug 935053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935572">SUSE bug 935572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935705">SUSE bug 935705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935866">SUSE bug 935866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935906">SUSE bug 935906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936077">SUSE bug 936077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936423">SUSE bug 936423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936637">SUSE bug 936637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936831">SUSE bug 936831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936875">SUSE bug 936875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936925">SUSE bug 936925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937032">SUSE bug 937032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937402">SUSE bug 937402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937503">SUSE bug 937503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937641">SUSE bug 937641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937855">SUSE bug 937855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939910">SUSE bug 939910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939994">SUSE bug 939994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940338">SUSE bug 940338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940398">SUSE bug 940398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942350">SUSE bug 942350</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9728/">CVE-2014-9728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9728">CVE-2014-9728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9729/">CVE-2014-9729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9729">CVE-2014-9729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9730/">CVE-2014-9730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9730">CVE-2014-9730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2014-9731/">CVE-2014-9731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9731">CVE-2014-9731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0777/">CVE-2015-0777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0777">CVE-2015-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1420/">CVE-2015-1420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1420">CVE-2015-1420 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2015-1805/">CVE-2015-1805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1805">CVE-2015-1805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2150/">CVE-2015-2150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2150">CVE-2015-2150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2830/">CVE-2015-2830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2830">CVE-2015-2830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2015-4167/">CVE-2015-4167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4167">CVE-2015-4167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4700/">CVE-2015-4700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4700">CVE-2015-4700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5364/">CVE-2015-5364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5364">CVE-2015-5364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5366/">CVE-2015-5366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5366">CVE-2015-5366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5707/">CVE-2015-5707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5707">CVE-2015-5707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578395" comment="kernel-bigsmp-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578396" comment="kernel-bigsmp-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578397" comment="kernel-default-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578398" comment="kernel-default-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578400" comment="kernel-default-man-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578401" comment="kernel-ec2-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578402" comment="kernel-ec2-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566732" comment="kernel-pae-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566733" comment="kernel-pae-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578404" comment="kernel-ppc64-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578405" comment="kernel-ppc64-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578407" comment="kernel-source-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578408" comment="kernel-syms-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578409" comment="kernel-trace-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578410" comment="kernel-trace-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566739" comment="kernel-xen-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566740" comment="kernel-xen-base-3.0.101-0.47.67.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578395" comment="kernel-bigsmp-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578396" comment="kernel-bigsmp-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578397" comment="kernel-default-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578398" comment="kernel-default-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578400" comment="kernel-default-man-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578401" comment="kernel-ec2-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578402" comment="kernel-ec2-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566732" comment="kernel-pae-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566733" comment="kernel-pae-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578404" comment="kernel-ppc64-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578405" comment="kernel-ppc64-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578407" comment="kernel-source-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578408" comment="kernel-syms-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578409" comment="kernel-trace-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578410" comment="kernel-trace-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566739" comment="kernel-xen-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566740" comment="kernel-xen-base-3.0.101-0.47.67.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218785" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="894936" ref_url="https://bugzilla.suse.com/894936" source="BUGZILLA"/>
		<reference ref_id="919808" ref_url="https://bugzilla.suse.com/919808" source="BUGZILLA"/>
		<reference ref_id="923002" ref_url="https://bugzilla.suse.com/923002" source="BUGZILLA"/>
		<reference ref_id="936637" ref_url="https://bugzilla.suse.com/936637" source="BUGZILLA"/>
		<reference ref_id="937032" ref_url="https://bugzilla.suse.com/937032" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="938485" ref_url="https://bugzilla.suse.com/938485" source="BUGZILLA"/>
		<reference ref_id="940338" ref_url="https://bugzilla.suse.com/940338" source="BUGZILLA"/>
		<reference ref_id="942204" ref_url="https://bugzilla.suse.com/942204" source="BUGZILLA"/>
		<reference ref_id="942367" ref_url="https://bugzilla.suse.com/942367" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5707" ref_url="https://www.suse.com/security/cve/CVE-2015-5707/" source="CVE"/>
		<reference ref_id="CVE-2015-6252" ref_url="https://www.suse.com/security/cve/CVE-2015-6252/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP3 Teradata kernel was updated to fix bugs and
security issues.

The following security bugs have been fixed:

- CVE-2015-6252: Possible file descriptor leak for each VHOST_SET_LOG_FD
  command issued. This could eventually waste available system resources
  and create a denial of service. (bsc#942367)
- CVE-2015-5707: Possible integer overflow in the calculation of total
  number of pages in bio_map_user_iov(). (bsc#940338)

The following non-security bugs have been fixed:

- ib/iser: Add Discovery support. (bsc#923002)
- ib/iser: Move informational messages from error to info level. (bsc#923002)
- scsi: Limit iscsi kABI changes to discovery session. (bsc#923002)
- scsi: Fix force panic issue with the megaraid_sas driver with Intel Romley hardware. (bsc#938485)
- scsi: Update megaraid_sas's threshold based reply post host index register.(bsc#919808)
- scsi: megaraid_sas: Use correct reset sequence in adp_reset(). (bsc#894936)
- scsi: Fix scsi_error_handler vs. scsi_host_dev_release race. (bsc#942204)
- scsi: Exporting new attrs for iscsi session and connection in sysfs. (bsc#923002)
- ext3: Fix data corruption in inodes with journalled data. (bsc#936637)
- libiscsi: Exporting new attrs for iscsi session and connection in sysfs. (bsc#923002)
- watchdog: Report watchdog state properly after failure. (bsc#937444)
- x86/mm: Improve AMD Bulldozer ASLR workaround. (bsc#937032)
- Make sure that there's not too many elements in iovec. (bsc#940338)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-16"/>
	<updated date="2015-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/894936">SUSE bug 894936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919808">SUSE bug 919808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923002">SUSE bug 923002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936637">SUSE bug 936637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937032">SUSE bug 937032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938485">SUSE bug 938485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940338">SUSE bug 940338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942204">SUSE bug 942204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942367">SUSE bug 942367</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5707/">CVE-2015-5707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5707">CVE-2015-5707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6252/">CVE-2015-6252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6252">CVE-2015-6252 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992857" comment="kernel-default-3.0.101-0.66.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992858" comment="kernel-default-base-3.0.101-0.66.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992860" comment="kernel-source-3.0.101-0.66.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992861" comment="kernel-syms-3.0.101-0.66.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992862" comment="kernel-trace-3.0.101-0.66.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992863" comment="kernel-trace-base-3.0.101-0.66.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992865" comment="kernel-xen-3.0.101-0.66.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992866" comment="kernel-xen-base-3.0.101-0.66.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218786" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="914726" ref_url="https://bugzilla.suse.com/914726" source="BUGZILLA"/>
		<reference ref_id="920250" ref_url="https://bugzilla.suse.com/920250" source="BUGZILLA"/>
		<reference ref_id="938706" ref_url="https://bugzilla.suse.com/938706" source="BUGZILLA"/>
		<reference ref_id="939926" ref_url="https://bugzilla.suse.com/939926" source="BUGZILLA"/>
		<reference ref_id="944296" ref_url="https://bugzilla.suse.com/944296" source="BUGZILLA"/>
		<reference ref_id="945825" ref_url="https://bugzilla.suse.com/945825" source="BUGZILLA"/>
		<reference ref_id="948347" ref_url="https://bugzilla.suse.com/948347" source="BUGZILLA"/>
		<reference ref_id="949100" ref_url="https://bugzilla.suse.com/949100" source="BUGZILLA"/>
		<reference ref_id="951440" ref_url="https://bugzilla.suse.com/951440" source="BUGZILLA"/>
		<reference ref_id="951771" ref_url="https://bugzilla.suse.com/951771" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0272" ref_url="https://www.suse.com/security/cve/CVE-2015-0272/" source="CVE"/>
		<reference ref_id="CVE-2015-5157" ref_url="https://www.suse.com/security/cve/CVE-2015-5157/" source="CVE"/>
		<reference ref_id="CVE-2015-6937" ref_url="https://www.suse.com/security/cve/CVE-2015-6937/" source="CVE"/>
		<reference ref_id="CVE-2015-7872" ref_url="https://www.suse.com/security/cve/CVE-2015-7872/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP3 Teradata kernel was updated to fix bugs and
security issues.

The following security issues have been fixed:

- keys: Don't permit request_key() to construct a new keyring (bsc#951440, CVE-2015-7872).
- keys: Fix crash when attempt to garbage collect an uninstantiated keyring (bsc#951440, CVE-2015-7872).
- rds: Verify the underlying transport exists before creating a connection (bsc#945825, CVE-2015-6937).
- ipv6/addrconf: Validate new MTU before applying it (bsc#944296, CVE-2015-0272).
- rcu: Move lockless_dereference() out of rcupdate.h (bsc#938706, CVE-2015-5157).
- x86/ldt: Correct FPU emulation access to LDT (bsc#938706, CVE-2015-5157).
- x86/ldt: Correct LDT access in single stepping logic (bsc#938706, CVE-2015-5157).
- x86/ldt: Further fix FPU emulation (bsc#938706, CVE-2015-5157).
- x86/ldt: Make modify_ldt synchronous (bsc#938706, CVE-2015-5157).
- x86/nmi/64: Switch stacks on userspace NMI entry (bsc#938706, CVE-2015-5157).

The following non-security issues have been fixed:

- Enable x86_64/ec2 configuration (bsc#951771).
- keys: Fix race between key destruction and finding a keyring by name (bsc#951440).
- scsi/hosts: Update to use ida_simple for host_no management (bsc#939926).
- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bsc#949100).
- x86/tls/ldt: Stop checking lm in LDT_empty (bsc#920250).
- x86/irq: Check for valid irq descriptor in check_irq_vectors_for_cpu_disable (bsc#914726).
- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-03"/>
	<updated date="2015-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/914726">SUSE bug 914726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920250">SUSE bug 920250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938706">SUSE bug 938706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939926">SUSE bug 939926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944296">SUSE bug 944296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945825">SUSE bug 945825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948347">SUSE bug 948347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949100">SUSE bug 949100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951440">SUSE bug 951440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951771">SUSE bug 951771</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0272/">CVE-2015-0272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0272">CVE-2015-0272 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5157/">CVE-2015-5157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5157">CVE-2015-5157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6937/">CVE-2015-6937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6937">CVE-2015-6937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7872/">CVE-2015-7872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7872">CVE-2015-7872 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992868" comment="kernel-default-3.0.101-0.69.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992869" comment="kernel-default-base-3.0.101-0.69.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992871" comment="kernel-ec2-3.0.101-0.69.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992872" comment="kernel-ec2-base-3.0.101-0.69.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992874" comment="kernel-source-3.0.101-0.69.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992875" comment="kernel-syms-3.0.101-0.69.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992876" comment="kernel-trace-3.0.101-0.69.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992877" comment="kernel-trace-base-3.0.101-0.69.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992879" comment="kernel-xen-3.0.101-0.69.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992880" comment="kernel-xen-base-3.0.101-0.69.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218787" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="952384" ref_url="https://bugzilla.suse.com/952384" source="BUGZILLA"/>
		<reference ref_id="953527" ref_url="https://bugzilla.suse.com/953527" source="BUGZILLA"/>
		<reference ref_id="954404" ref_url="https://bugzilla.suse.com/954404" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-7990" ref_url="https://www.suse.com/security/cve/CVE-2015-7990/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP3 Teradata kernel was updated to fix the following security issues.

- kvm/svm: Unconditionally intercept #DB (bsc#954404, CVE-2015-8104).
- kvm/x86: Work around infinite loop in microcode when #AC is delivered (bsc#953527, CVE-2015-5307).
- rds: Fix race condition when sending a message on unbound socket (bsc#952384, CVE-2015-7990).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-17"/>
	<updated date="2015-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/952384">SUSE bug 952384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5307">CVE-2015-5307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7990/">CVE-2015-7990 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7990">CVE-2015-7990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8104">CVE-2015-8104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992882" comment="kernel-default-3.0.101-0.72.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992883" comment="kernel-default-base-3.0.101-0.72.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992885" comment="kernel-ec2-3.0.101-0.72.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992886" comment="kernel-ec2-base-3.0.101-0.72.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992888" comment="kernel-source-3.0.101-0.72.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992889" comment="kernel-syms-3.0.101-0.72.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992890" comment="kernel-trace-3.0.101-0.72.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992891" comment="kernel-trace-base-3.0.101-0.72.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992893" comment="kernel-xen-3.0.101-0.72.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992894" comment="kernel-xen-base-3.0.101-0.72.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218788" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="917648" ref_url="https://bugzilla.suse.com/917648" source="BUGZILLA"/>
		<reference ref_id="928122" ref_url="https://bugzilla.suse.com/928122" source="BUGZILLA"/>
		<reference ref_id="949744" ref_url="https://bugzilla.suse.com/949744" source="BUGZILLA"/>
		<reference ref_id="949936" ref_url="https://bugzilla.suse.com/949936" source="BUGZILLA"/>
		<reference ref_id="955354" ref_url="https://bugzilla.suse.com/955354" source="BUGZILLA"/>
		<reference ref_id="955654" ref_url="https://bugzilla.suse.com/955654" source="BUGZILLA"/>
		<reference ref_id="956708" ref_url="https://bugzilla.suse.com/956708" source="BUGZILLA"/>
		<reference ref_id="956709" ref_url="https://bugzilla.suse.com/956709" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="957990" ref_url="https://bugzilla.suse.com/957990" source="BUGZILLA"/>
		<reference ref_id="958463" ref_url="https://bugzilla.suse.com/958463" source="BUGZILLA"/>
		<reference ref_id="958886" ref_url="https://bugzilla.suse.com/958886" source="BUGZILLA"/>
		<reference ref_id="958951" ref_url="https://bugzilla.suse.com/958951" source="BUGZILLA"/>
		<reference ref_id="959190" ref_url="https://bugzilla.suse.com/959190" source="BUGZILLA"/>
		<reference ref_id="959399" ref_url="https://bugzilla.suse.com/959399" source="BUGZILLA"/>
		<reference ref_id="959705" ref_url="https://bugzilla.suse.com/959705" source="BUGZILLA"/>
		<reference ref_id="961500" ref_url="https://bugzilla.suse.com/961500" source="BUGZILLA"/>
		<reference ref_id="961509" ref_url="https://bugzilla.suse.com/961509" source="BUGZILLA"/>
		<reference ref_id="962407" ref_url="https://bugzilla.suse.com/962407" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7446" ref_url="https://www.suse.com/security/cve/CVE-2013-7446/" source="CVE"/>
		<reference ref_id="CVE-2015-7509" ref_url="https://www.suse.com/security/cve/CVE-2015-7509/" source="CVE"/>
		<reference ref_id="CVE-2015-7515" ref_url="https://www.suse.com/security/cve/CVE-2015-7515/" source="CVE"/>
		<reference ref_id="CVE-2015-7550" ref_url="https://www.suse.com/security/cve/CVE-2015-7550/" source="CVE"/>
		<reference ref_id="CVE-2015-7799" ref_url="https://www.suse.com/security/cve/CVE-2015-7799/" source="CVE"/>
		<reference ref_id="CVE-2015-8215" ref_url="https://www.suse.com/security/cve/CVE-2015-8215/" source="CVE"/>
		<reference ref_id="CVE-2015-8539" ref_url="https://www.suse.com/security/cve/CVE-2015-8539/" source="CVE"/>
		<reference ref_id="CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8551" ref_url="https://www.suse.com/security/cve/CVE-2015-8551/" source="CVE"/>
		<reference ref_id="CVE-2015-8552" ref_url="https://www.suse.com/security/cve/CVE-2015-8552/" source="CVE"/>
		<reference ref_id="CVE-2015-8569" ref_url="https://www.suse.com/security/cve/CVE-2015-8569/" source="CVE"/>
		<reference ref_id="CVE-2015-8575" ref_url="https://www.suse.com/security/cve/CVE-2015-8575/" source="CVE"/>
		<reference ref_id="CVE-2015-8767" ref_url="https://www.suse.com/security/cve/CVE-2015-8767/" source="CVE"/>
		<reference ref_id="CVE-2016-0723" ref_url="https://www.suse.com/security/cve/CVE-2016-0723/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP3 Teradata kernel was updated to fix bugs and
security issues.

The following security issues have been fixed:

- bluetooth: Validate socket address length in sco_sock_bind() (bsc#959399, CVE-2015-8575).
- ext4: Make orphan functions be no-op in no-journal mode (bsc#956709, CVE-2015-7509).
- input/aiptek: Adjust error-handling code label (bsc#956708, CVE-2015-7515).
- input/aiptek: Fix crash on detecting device without endpoints (bsc#956708, CVE-2015-7515).
- isdn_ppp: Add checks for allocation failure in isdn_ppp_open() (bsc#949936, CVE-2015-7799).
- kabi: Protect struct unix_sock layout after epoll fix (bsc#917648, bsc#955654, CVE-2013-7446).
- keys: Fix handling of stored error in a negatively instantiated user key (bsc#958463, CVE-2015-8539).
- keys: Fix race between read and revoke (bsc#958951, CVE-2015-7550).
- net: Add validation for the socket syscall protocol argument (bsc#958886, CVE-2015-8543).
- ppp/slip: Validate VJ compression slot parameters completely (bsc#949936, CVE-2015-7799).
- pptp: Verify sockaddr_len in pptp_bind() and pptp_connect() (bsc#959190, CVE-2015-8569).
- sctp: Prevent soft lockup when sctp_accept() is called during a timeout event (bsc#961509, CVE-2015-8767).
- tty: Fix unsafe ldisc reference via ioctl(TIOCGETD) (bsc#961500, CVE-2016-0723).
- unix: Avoid use-after-free in ep_remove_wait_queue (bsc#917648, bsc#955654, CVE-2013-7446).
- xen/pciback: Don't allow MSI-X ops if PCI_COMMAND_MEMORY is not set (bsc#957990, CVE-2015-8551, CVE-2015-8552, XSA-157).
- xen/pciback: For XEN_PCI_OP_disable_msi[|x] only disable if device has MSI(X) enabled (bsc#957990, CVE-2015-8551, CVE-2015-8552, XSA-157).
- xen/pciback: Return error on XEN_PCI_OP_enable_msix/XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled (bsc#957990, CVE-2015-8551, CVE-2015-8552 XSA-157).
- Guarantee one time reads of shared ring contents (bsc#957988, CVE-2015-8550, XSA-155).

The following non-security issues have been fixed:

- new helper: single_open_size() (bsc#928122, bsc#962407).
- proc: Speed up /proc/stat handling (bsc#928122, bsc#962407).
- /proc/stat: Convert to single_open_size() (bsc#928122, bsc#962407).
- xfs: Fix lost direct IO write in the last block (bsc#949744).
- Fix build error caused by missing U8_MAX.
- Add references for bsc#955354 and CVE-2015-8215 to patch.
- Refreshed patch to fix bsc#959705.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-03"/>
	<updated date="2016-02-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/917648">SUSE bug 917648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928122">SUSE bug 928122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949744">SUSE bug 949744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949936">SUSE bug 949936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955354">SUSE bug 955354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955654">SUSE bug 955654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956708">SUSE bug 956708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956709">SUSE bug 956709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957990">SUSE bug 957990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958463">SUSE bug 958463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958886">SUSE bug 958886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958951">SUSE bug 958951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959190">SUSE bug 959190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959399">SUSE bug 959399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959705">SUSE bug 959705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961500">SUSE bug 961500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961509">SUSE bug 961509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962407">SUSE bug 962407</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7446/">CVE-2013-7446 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7446">CVE-2013-7446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7509/">CVE-2015-7509 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7509">CVE-2015-7509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7515/">CVE-2015-7515 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7515">CVE-2015-7515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7550/">CVE-2015-7550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7550">CVE-2015-7550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7799/">CVE-2015-7799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7799">CVE-2015-7799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8215/">CVE-2015-8215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8215">CVE-2015-8215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8539/">CVE-2015-8539 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8539">CVE-2015-8539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8543">CVE-2015-8543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8550">CVE-2015-8550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8551/">CVE-2015-8551 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8551">CVE-2015-8551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8552/">CVE-2015-8552 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8552">CVE-2015-8552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8569/">CVE-2015-8569 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8569">CVE-2015-8569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8575/">CVE-2015-8575 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8575">CVE-2015-8575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8767/">CVE-2015-8767 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8767">CVE-2015-8767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0723/">CVE-2016-0723 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0723">CVE-2016-0723 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992896" comment="kernel-default-3.0.101-0.77.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992897" comment="kernel-default-base-3.0.101-0.77.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992899" comment="kernel-ec2-3.0.101-0.77.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992900" comment="kernel-ec2-base-3.0.101-0.77.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992902" comment="kernel-source-3.0.101-0.77.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992903" comment="kernel-syms-3.0.101-0.77.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992904" comment="kernel-trace-3.0.101-0.77.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992905" comment="kernel-trace-base-3.0.101-0.77.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992907" comment="kernel-xen-3.0.101-0.77.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992908" comment="kernel-xen-base-3.0.101-0.77.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218789" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="956084" ref_url="https://bugzilla.suse.com/956084" source="BUGZILLA"/>
		<reference ref_id="961512" ref_url="https://bugzilla.suse.com/961512" source="BUGZILLA"/>
		<reference ref_id="963765" ref_url="https://bugzilla.suse.com/963765" source="BUGZILLA"/>
		<reference ref_id="963767" ref_url="https://bugzilla.suse.com/963767" source="BUGZILLA"/>
		<reference ref_id="966102" ref_url="https://bugzilla.suse.com/966102" source="BUGZILLA"/>
		<reference ref_id="966437" ref_url="https://bugzilla.suse.com/966437" source="BUGZILLA"/>
		<reference ref_id="966693" ref_url="https://bugzilla.suse.com/966693" source="BUGZILLA"/>
		<reference ref_id="967972" ref_url="https://bugzilla.suse.com/967972" source="BUGZILLA"/>
		<reference ref_id="967973" ref_url="https://bugzilla.suse.com/967973" source="BUGZILLA"/>
		<reference ref_id="967974" ref_url="https://bugzilla.suse.com/967974" source="BUGZILLA"/>
		<reference ref_id="967975" ref_url="https://bugzilla.suse.com/967975" source="BUGZILLA"/>
		<reference ref_id="968011" ref_url="https://bugzilla.suse.com/968011" source="BUGZILLA"/>
		<reference ref_id="968012" ref_url="https://bugzilla.suse.com/968012" source="BUGZILLA"/>
		<reference ref_id="968013" ref_url="https://bugzilla.suse.com/968013" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7566" ref_url="https://www.suse.com/security/cve/CVE-2015-7566/" source="CVE"/>
		<reference ref_id="CVE-2015-8785" ref_url="https://www.suse.com/security/cve/CVE-2015-8785/" source="CVE"/>
		<reference ref_id="CVE-2015-8812" ref_url="https://www.suse.com/security/cve/CVE-2015-8812/" source="CVE"/>
		<reference ref_id="CVE-2016-2069" ref_url="https://www.suse.com/security/cve/CVE-2016-2069/" source="CVE"/>
		<reference ref_id="CVE-2016-2384" ref_url="https://www.suse.com/security/cve/CVE-2016-2384/" source="CVE"/>
		<reference ref_id="CVE-2016-2543" ref_url="https://www.suse.com/security/cve/CVE-2016-2543/" source="CVE"/>
		<reference ref_id="CVE-2016-2544" ref_url="https://www.suse.com/security/cve/CVE-2016-2544/" source="CVE"/>
		<reference ref_id="CVE-2016-2545" ref_url="https://www.suse.com/security/cve/CVE-2016-2545/" source="CVE"/>
		<reference ref_id="CVE-2016-2546" ref_url="https://www.suse.com/security/cve/CVE-2016-2546/" source="CVE"/>
		<reference ref_id="CVE-2016-2547" ref_url="https://www.suse.com/security/cve/CVE-2016-2547/" source="CVE"/>
		<reference ref_id="CVE-2016-2548" ref_url="https://www.suse.com/security/cve/CVE-2016-2548/" source="CVE"/>
		<reference ref_id="CVE-2016-2549" ref_url="https://www.suse.com/security/cve/CVE-2016-2549/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP3 Teradata kernel was updated to fix bugs and
security issues.

The following security issues have been fixed:

- usb/serial/visor: Fix crash on detecting device without write_urbs (bsc#961512, CVE-2015-7566).
- alsa/hrtimer: Fix stall by hrtimer_cancel() (CVE-2016-2549,bsc#968013).
- alsa/timer: Harden slave timer list handling (CVE-2016-2547,CVE-2016-2548,bsc#968011,bsc#968012).
- alsa/timer: Fix race among timer ioctls (CVE-2016-2546,bsc#967975).
- alsa/timer: Fix double unlink of active_list (CVE-2016-2545,bsc#967974).
- alsa/seq: Fix race at timer setup and close (CVE-2016-2544,bsc#967973).
- alsa/seq: Fix missing NULL check at remove_events ioctl (CVE-2016-2543,bsc#967972).
- alsa/usb-audio: Avoid freeing umidi object twice (CVE-2016-2384,bsc#966693).
- iw_cxgb3: Fix incorrectly returning error on success (bsc#966437, CVE-2015-8812).
- fuse: Break infinite loop in fuse_fill_write_pages() (bsc#963765, CVE-2015-8785).
- x86/mm: Add barriers and document switch_mm()-vs-flush synchronization (bsc#963767, CVE-2016-2069).

The following new features have been implemented:

- Indirect request segment descriptors protocol additions (fate#320200, bsc#956084).
- Add BLKIF_OP_INDIRECT to the blkif protocol (fate#320200, bsc#956084).
- blkif: Indirect request segment descriptors definitions (fate#316876, bsc#956084).
- blkfront: Allow using indirect request segment descriptors (fate#316876, bsc#956084).
- Update patches.xen/xen-blkif-discard (fate#309305, bsc#956084).
- Refresh patches.xen/xen-blkif-op-packet (fate#300964, bsc#956084).
- Build Xen blkfront PV driver (bsc#956084).
- Add Xen platform-pci PV driver (bsc#956084).

The following bugs have been fixed:

- Fix PV and pvops builds (bsc#956084).
- Fix blkfront crashes on resume (bsc#956084).
- Limit expansion of names_list (bsc#966102).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-11"/>
	<updated date="2016-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/956084">SUSE bug 956084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961512">SUSE bug 961512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963765">SUSE bug 963765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963767">SUSE bug 963767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966102">SUSE bug 966102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966437">SUSE bug 966437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966693">SUSE bug 966693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967972">SUSE bug 967972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967973">SUSE bug 967973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967974">SUSE bug 967974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967975">SUSE bug 967975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968011">SUSE bug 968011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968012">SUSE bug 968012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968013">SUSE bug 968013</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7566/">CVE-2015-7566 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7566">CVE-2015-7566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8785/">CVE-2015-8785 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8785">CVE-2015-8785 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8812/">CVE-2015-8812 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8812">CVE-2015-8812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2069/">CVE-2016-2069 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2069">CVE-2016-2069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2384/">CVE-2016-2384 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2384">CVE-2016-2384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2543/">CVE-2016-2543 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2543">CVE-2016-2543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2544/">CVE-2016-2544 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2544">CVE-2016-2544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2545/">CVE-2016-2545 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2545">CVE-2016-2545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2546/">CVE-2016-2546 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2546">CVE-2016-2546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2547/">CVE-2016-2547 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2547">CVE-2016-2547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2548/">CVE-2016-2548 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2548">CVE-2016-2548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2549/">CVE-2016-2549 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2549">CVE-2016-2549 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992910" comment="kernel-default-3.0.101-0.80.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992911" comment="kernel-default-base-3.0.101-0.80.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992913" comment="kernel-ec2-3.0.101-0.80.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992914" comment="kernel-ec2-base-3.0.101-0.80.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992916" comment="kernel-source-3.0.101-0.80.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992917" comment="kernel-syms-3.0.101-0.80.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992918" comment="kernel-trace-3.0.101-0.80.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992919" comment="kernel-trace-base-3.0.101-0.80.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992921" comment="kernel-xen-3.0.101-0.80.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992922" comment="kernel-xen-base-3.0.101-0.80.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218790" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="758040" ref_url="https://bugzilla.suse.com/758040" source="BUGZILLA"/>
		<reference ref_id="781018" ref_url="https://bugzilla.suse.com/781018" source="BUGZILLA"/>
		<reference ref_id="879378" ref_url="https://bugzilla.suse.com/879378" source="BUGZILLA"/>
		<reference ref_id="879381" ref_url="https://bugzilla.suse.com/879381" source="BUGZILLA"/>
		<reference ref_id="904035" ref_url="https://bugzilla.suse.com/904035" source="BUGZILLA"/>
		<reference ref_id="924919" ref_url="https://bugzilla.suse.com/924919" source="BUGZILLA"/>
		<reference ref_id="934787" ref_url="https://bugzilla.suse.com/934787" source="BUGZILLA"/>
		<reference ref_id="935123" ref_url="https://bugzilla.suse.com/935123" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="939955" ref_url="https://bugzilla.suse.com/939955" source="BUGZILLA"/>
		<reference ref_id="940017" ref_url="https://bugzilla.suse.com/940017" source="BUGZILLA"/>
		<reference ref_id="940413" ref_url="https://bugzilla.suse.com/940413" source="BUGZILLA"/>
		<reference ref_id="940913" ref_url="https://bugzilla.suse.com/940913" source="BUGZILLA"/>
		<reference ref_id="940946" ref_url="https://bugzilla.suse.com/940946" source="BUGZILLA"/>
		<reference ref_id="941514" ref_url="https://bugzilla.suse.com/941514" source="BUGZILLA"/>
		<reference ref_id="942082" ref_url="https://bugzilla.suse.com/942082" source="BUGZILLA"/>
		<reference ref_id="946122" ref_url="https://bugzilla.suse.com/946122" source="BUGZILLA"/>
		<reference ref_id="947128" ref_url="https://bugzilla.suse.com/947128" source="BUGZILLA"/>
		<reference ref_id="948330" ref_url="https://bugzilla.suse.com/948330" source="BUGZILLA"/>
		<reference ref_id="949298" ref_url="https://bugzilla.suse.com/949298" source="BUGZILLA"/>
		<reference ref_id="949752" ref_url="https://bugzilla.suse.com/949752" source="BUGZILLA"/>
		<reference ref_id="949936" ref_url="https://bugzilla.suse.com/949936" source="BUGZILLA"/>
		<reference ref_id="950750" ref_url="https://bugzilla.suse.com/950750" source="BUGZILLA"/>
		<reference ref_id="950998" ref_url="https://bugzilla.suse.com/950998" source="BUGZILLA"/>
		<reference ref_id="951392" ref_url="https://bugzilla.suse.com/951392" source="BUGZILLA"/>
		<reference ref_id="952976" ref_url="https://bugzilla.suse.com/952976" source="BUGZILLA"/>
		<reference ref_id="954628" ref_url="https://bugzilla.suse.com/954628" source="BUGZILLA"/>
		<reference ref_id="955308" ref_url="https://bugzilla.suse.com/955308" source="BUGZILLA"/>
		<reference ref_id="955354" ref_url="https://bugzilla.suse.com/955354" source="BUGZILLA"/>
		<reference ref_id="955654" ref_url="https://bugzilla.suse.com/955654" source="BUGZILLA"/>
		<reference ref_id="955673" ref_url="https://bugzilla.suse.com/955673" source="BUGZILLA"/>
		<reference ref_id="956375" ref_url="https://bugzilla.suse.com/956375" source="BUGZILLA"/>
		<reference ref_id="956514" ref_url="https://bugzilla.suse.com/956514" source="BUGZILLA"/>
		<reference ref_id="956707" ref_url="https://bugzilla.suse.com/956707" source="BUGZILLA"/>
		<reference ref_id="956708" ref_url="https://bugzilla.suse.com/956708" source="BUGZILLA"/>
		<reference ref_id="956709" ref_url="https://bugzilla.suse.com/956709" source="BUGZILLA"/>
		<reference ref_id="956852" ref_url="https://bugzilla.suse.com/956852" source="BUGZILLA"/>
		<reference ref_id="956949" ref_url="https://bugzilla.suse.com/956949" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="957990" ref_url="https://bugzilla.suse.com/957990" source="BUGZILLA"/>
		<reference ref_id="958463" ref_url="https://bugzilla.suse.com/958463" source="BUGZILLA"/>
		<reference ref_id="958886" ref_url="https://bugzilla.suse.com/958886" source="BUGZILLA"/>
		<reference ref_id="958906" ref_url="https://bugzilla.suse.com/958906" source="BUGZILLA"/>
		<reference ref_id="958912" ref_url="https://bugzilla.suse.com/958912" source="BUGZILLA"/>
		<reference ref_id="958951" ref_url="https://bugzilla.suse.com/958951" source="BUGZILLA"/>
		<reference ref_id="959190" ref_url="https://bugzilla.suse.com/959190" source="BUGZILLA"/>
		<reference ref_id="959312" ref_url="https://bugzilla.suse.com/959312" source="BUGZILLA"/>
		<reference ref_id="959399" ref_url="https://bugzilla.suse.com/959399" source="BUGZILLA"/>
		<reference ref_id="959705" ref_url="https://bugzilla.suse.com/959705" source="BUGZILLA"/>
		<reference ref_id="960857" ref_url="https://bugzilla.suse.com/960857" source="BUGZILLA"/>
		<reference ref_id="961500" ref_url="https://bugzilla.suse.com/961500" source="BUGZILLA"/>
		<reference ref_id="961509" ref_url="https://bugzilla.suse.com/961509" source="BUGZILLA"/>
		<reference ref_id="961512" ref_url="https://bugzilla.suse.com/961512" source="BUGZILLA"/>
		<reference ref_id="961516" ref_url="https://bugzilla.suse.com/961516" source="BUGZILLA"/>
		<reference ref_id="961518" ref_url="https://bugzilla.suse.com/961518" source="BUGZILLA"/>
		<reference ref_id="963276" ref_url="https://bugzilla.suse.com/963276" source="BUGZILLA"/>
		<reference ref_id="963765" ref_url="https://bugzilla.suse.com/963765" source="BUGZILLA"/>
		<reference ref_id="963767" ref_url="https://bugzilla.suse.com/963767" source="BUGZILLA"/>
		<reference ref_id="963998" ref_url="https://bugzilla.suse.com/963998" source="BUGZILLA"/>
		<reference ref_id="964201" ref_url="https://bugzilla.suse.com/964201" source="BUGZILLA"/>
		<reference ref_id="965319" ref_url="https://bugzilla.suse.com/965319" source="BUGZILLA"/>
		<reference ref_id="965923" ref_url="https://bugzilla.suse.com/965923" source="BUGZILLA"/>
		<reference ref_id="966437" ref_url="https://bugzilla.suse.com/966437" source="BUGZILLA"/>
		<reference ref_id="966693" ref_url="https://bugzilla.suse.com/966693" source="BUGZILLA"/>
		<reference ref_id="967863" ref_url="https://bugzilla.suse.com/967863" source="BUGZILLA"/>
		<reference ref_id="967972" ref_url="https://bugzilla.suse.com/967972" source="BUGZILLA"/>
		<reference ref_id="967973" ref_url="https://bugzilla.suse.com/967973" source="BUGZILLA"/>
		<reference ref_id="967974" ref_url="https://bugzilla.suse.com/967974" source="BUGZILLA"/>
		<reference ref_id="967975" ref_url="https://bugzilla.suse.com/967975" source="BUGZILLA"/>
		<reference ref_id="968010" ref_url="https://bugzilla.suse.com/968010" source="BUGZILLA"/>
		<reference ref_id="968011" ref_url="https://bugzilla.suse.com/968011" source="BUGZILLA"/>
		<reference ref_id="968012" ref_url="https://bugzilla.suse.com/968012" source="BUGZILLA"/>
		<reference ref_id="968013" ref_url="https://bugzilla.suse.com/968013" source="BUGZILLA"/>
		<reference ref_id="968141" ref_url="https://bugzilla.suse.com/968141" source="BUGZILLA"/>
		<reference ref_id="968670" ref_url="https://bugzilla.suse.com/968670" source="BUGZILLA"/>
		<reference ref_id="969307" ref_url="https://bugzilla.suse.com/969307" source="BUGZILLA"/>
		<reference ref_id="970504" ref_url="https://bugzilla.suse.com/970504" source="BUGZILLA"/>
		<reference ref_id="970892" ref_url="https://bugzilla.suse.com/970892" source="BUGZILLA"/>
		<reference ref_id="970909" ref_url="https://bugzilla.suse.com/970909" source="BUGZILLA"/>
		<reference ref_id="970911" ref_url="https://bugzilla.suse.com/970911" source="BUGZILLA"/>
		<reference ref_id="970948" ref_url="https://bugzilla.suse.com/970948" source="BUGZILLA"/>
		<reference ref_id="970956" ref_url="https://bugzilla.suse.com/970956" source="BUGZILLA"/>
		<reference ref_id="970958" ref_url="https://bugzilla.suse.com/970958" source="BUGZILLA"/>
		<reference ref_id="970970" ref_url="https://bugzilla.suse.com/970970" source="BUGZILLA"/>
		<reference ref_id="971124" ref_url="https://bugzilla.suse.com/971124" source="BUGZILLA"/>
		<reference ref_id="971125" ref_url="https://bugzilla.suse.com/971125" source="BUGZILLA"/>
		<reference ref_id="971360" ref_url="https://bugzilla.suse.com/971360" source="BUGZILLA"/>
		<reference ref_id="973570" ref_url="https://bugzilla.suse.com/973570" source="BUGZILLA"/>
		<reference ref_id="974646" ref_url="https://bugzilla.suse.com/974646" source="BUGZILLA"/>
		<reference ref_id="975945" ref_url="https://bugzilla.suse.com/975945" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7446" ref_url="https://www.suse.com/security/cve/CVE-2013-7446/" source="CVE"/>
		<reference ref_id="CVE-2015-7509" ref_url="https://www.suse.com/security/cve/CVE-2015-7509/" source="CVE"/>
		<reference ref_id="CVE-2015-7515" ref_url="https://www.suse.com/security/cve/CVE-2015-7515/" source="CVE"/>
		<reference ref_id="CVE-2015-7550" ref_url="https://www.suse.com/security/cve/CVE-2015-7550/" source="CVE"/>
		<reference ref_id="CVE-2015-7566" ref_url="https://www.suse.com/security/cve/CVE-2015-7566/" source="CVE"/>
		<reference ref_id="CVE-2015-7799" ref_url="https://www.suse.com/security/cve/CVE-2015-7799/" source="CVE"/>
		<reference ref_id="CVE-2015-8215" ref_url="https://www.suse.com/security/cve/CVE-2015-8215/" source="CVE"/>
		<reference ref_id="CVE-2015-8539" ref_url="https://www.suse.com/security/cve/CVE-2015-8539/" source="CVE"/>
		<reference ref_id="CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8551" ref_url="https://www.suse.com/security/cve/CVE-2015-8551/" source="CVE"/>
		<reference ref_id="CVE-2015-8552" ref_url="https://www.suse.com/security/cve/CVE-2015-8552/" source="CVE"/>
		<reference ref_id="CVE-2015-8569" ref_url="https://www.suse.com/security/cve/CVE-2015-8569/" source="CVE"/>
		<reference ref_id="CVE-2015-8575" ref_url="https://www.suse.com/security/cve/CVE-2015-8575/" source="CVE"/>
		<reference ref_id="CVE-2015-8767" ref_url="https://www.suse.com/security/cve/CVE-2015-8767/" source="CVE"/>
		<reference ref_id="CVE-2015-8785" ref_url="https://www.suse.com/security/cve/CVE-2015-8785/" source="CVE"/>
		<reference ref_id="CVE-2015-8812" ref_url="https://www.suse.com/security/cve/CVE-2015-8812/" source="CVE"/>
		<reference ref_id="CVE-2015-8816" ref_url="https://www.suse.com/security/cve/CVE-2015-8816/" source="CVE"/>
		<reference ref_id="CVE-2016-0723" ref_url="https://www.suse.com/security/cve/CVE-2016-0723/" source="CVE"/>
		<reference ref_id="CVE-2016-2069" ref_url="https://www.suse.com/security/cve/CVE-2016-2069/" source="CVE"/>
		<reference ref_id="CVE-2016-2143" ref_url="https://www.suse.com/security/cve/CVE-2016-2143/" source="CVE"/>
		<reference ref_id="CVE-2016-2184" ref_url="https://www.suse.com/security/cve/CVE-2016-2184/" source="CVE"/>
		<reference ref_id="CVE-2016-2185" ref_url="https://www.suse.com/security/cve/CVE-2016-2185/" source="CVE"/>
		<reference ref_id="CVE-2016-2186" ref_url="https://www.suse.com/security/cve/CVE-2016-2186/" source="CVE"/>
		<reference ref_id="CVE-2016-2188" ref_url="https://www.suse.com/security/cve/CVE-2016-2188/" source="CVE"/>
		<reference ref_id="CVE-2016-2384" ref_url="https://www.suse.com/security/cve/CVE-2016-2384/" source="CVE"/>
		<reference ref_id="CVE-2016-2543" ref_url="https://www.suse.com/security/cve/CVE-2016-2543/" source="CVE"/>
		<reference ref_id="CVE-2016-2544" ref_url="https://www.suse.com/security/cve/CVE-2016-2544/" source="CVE"/>
		<reference ref_id="CVE-2016-2545" ref_url="https://www.suse.com/security/cve/CVE-2016-2545/" source="CVE"/>
		<reference ref_id="CVE-2016-2546" ref_url="https://www.suse.com/security/cve/CVE-2016-2546/" source="CVE"/>
		<reference ref_id="CVE-2016-2547" ref_url="https://www.suse.com/security/cve/CVE-2016-2547/" source="CVE"/>
		<reference ref_id="CVE-2016-2548" ref_url="https://www.suse.com/security/cve/CVE-2016-2548/" source="CVE"/>
		<reference ref_id="CVE-2016-2549" ref_url="https://www.suse.com/security/cve/CVE-2016-2549/" source="CVE"/>
		<reference ref_id="CVE-2016-2782" ref_url="https://www.suse.com/security/cve/CVE-2016-2782/" source="CVE"/>
		<reference ref_id="CVE-2016-2847" ref_url="https://www.suse.com/security/cve/CVE-2016-2847/" source="CVE"/>
		<reference ref_id="CVE-2016-3137" ref_url="https://www.suse.com/security/cve/CVE-2016-3137/" source="CVE"/>
		<reference ref_id="CVE-2016-3138" ref_url="https://www.suse.com/security/cve/CVE-2016-3138/" source="CVE"/>
		<reference ref_id="CVE-2016-3139" ref_url="https://www.suse.com/security/cve/CVE-2016-3139/" source="CVE"/>
		<reference ref_id="CVE-2016-3140" ref_url="https://www.suse.com/security/cve/CVE-2016-3140/" source="CVE"/>
		<reference ref_id="CVE-2016-3156" ref_url="https://www.suse.com/security/cve/CVE-2016-3156/" source="CVE"/>
		<reference ref_id="CVE-2016-3955" ref_url="https://www.suse.com/security/cve/CVE-2016-3955/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002035.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:
- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in
  the Linux kernel allowed local users to bypass intended AF_UNIX socket
  permissions or cause a denial of service (panic) via crafted epoll_ctl
  calls (bnc#955654).
- CVE-2015-7509: fs/ext4/namei.c in the Linux kernel allowed physically
  proximate attackers to cause a denial of service (system crash) via
  a crafted no-journal filesystem, a related issue to CVE-2013-2015
  (bnc#956707).
- CVE-2015-7515: An out of bounds memory access in the aiptek USB
  driver could be used by physical local attackers to crash the kernel
  (bnc#956708).
- CVE-2015-7550: The keyctl_read_key function in security/keys/keyctl.c
  in the Linux kernel did not properly use a semaphore, which allowed
  local users to cause a denial of service (NULL pointer dereference and
  system crash) or possibly have unspecified other impact via a crafted
  application that leverages a race condition between keyctl_revoke and
  keyctl_read calls (bnc#958951).
- CVE-2015-7566: A malicious USB device could cause kernel crashes in
  the visor device driver (bnc#961512).
- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in
  the Linux kernel did not ensure that certain slot numbers are valid,
  which allowed local users to cause a denial of service (NULL pointer
  dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call
  (bnc#949936).
- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux
  kernel did not validate attempted changes to the MTU value, which allowed
  context-dependent attackers to cause a denial of service (packet loss)
  via a value that is (1) smaller than the minimum compliant value or
  (2) larger than the MTU of an interface, as demonstrated by a Router
  Advertisement (RA) message that is not validated by a daemon, a different
  vulnerability than CVE-2015-0272.  NOTE: the scope of CVE-2015-0272 is
  limited to the NetworkManager product (bnc#955354).
- CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed
  local users to gain privileges or cause a denial of service (BUG)
  via crafted keyctl commands that negatively instantiate a key, related
  to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c,
  and security/keys/user_defined.c (bnc#958463).
- CVE-2015-8543: The networking implementation in the Linux kernel
  did not validate protocol identifiers for certain protocol families,
  which allowed local users to cause a denial of service (NULL function
  pointer dereference and system crash) or possibly gain privileges by
  leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application
  (bnc#958886).
- CVE-2015-8550: Optimizations introduced by the compiler could have
  lead to double fetch vulnerabilities, potentially possibly leading to
  arbitrary code execution in backend (bsc#957988). (bsc#957988 XSA-155).
- CVE-2015-8551: The PCI backend driver in Xen, when running on an
  x86 system and using Linux as the driver domain, allowed local guest
  administrators to hit BUG conditions and cause a denial of service
  (NULL pointer dereference and host OS crash) by leveraging a system with
  access to a passed-through MSI or MSI-X capable physical PCI device
  and a crafted sequence of XEN_PCI_OP_* operations, aka 'Linux pciback
  missing sanity checks (bnc#957990).
- CVE-2015-8552: The PCI backend driver in Xen, when running on an
  x86 system and using Linux as the driver domain, allowed local guest
  administrators to generate a continuous stream of WARN messages and
  cause a denial of service (disk consumption) by leveraging a system with
  access to a passed-through MSI or MSI-X capable physical PCI device and
  XEN_PCI_OP_enable_msi operations, aka 'Linux pciback missing sanity checks
  (bnc#957990).
- CVE-2015-8569: The (1) pptp_bind and (2) pptp_connect functions in
  drivers/net/ppp/pptp.c in the Linux kernel do not verify an address
  length, which allowed local users to obtain sensitive information from
  kernel memory and bypass the KASLR protection mechanism via a crafted
  application (bnc#959190).
- CVE-2015-8575: The sco_sock_bind function in net/bluetooth/sco.c in
  the Linux kernel did not verify an address length, which allowed local
  users to obtain sensitive information from kernel memory and bypass the
  KASLR protection mechanism via a crafted application (bnc#959399).
- CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel did not
  properly manage the relationship between a lock and a socket, which
  allowed local users to cause a denial of service (deadlock) via a crafted
  sctp_accept call (bnc#961509).
- CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c
  in the Linux kernel allowed local users to cause a denial of service
  (infinite loop) via a writev system call that triggers a zero length
  for the first segment of an iov (bnc#963765).
- CVE-2015-8812: A flaw was found in the CXGB3 kernel driver when
  the network was considered congested. The kernel would incorrectly
  misinterpret the congestion as an error condition and incorrectly
  free/clean up the skb. When the device would then send the skb's queued,
  these structures would be referenced and may panic the system
  or allow an attacker to escalate privileges in a use-after-free
  scenario.(bsc#966437).
- CVE-2015-8816: A malicious USB device could cause kernel crashes in
  the in hub_activate() function (bnc#968010).
- CVE-2016-0723: Race condition in the tty_ioctl function in
  drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain
  sensitive information from kernel memory or cause a denial of service
  (use-after-free and system crash) by making a TIOCGETD ioctl call during
  processing of a TIOCSETD ioctl call (bnc#961500).
- CVE-2016-2069: A race in invalidating paging structures that were not
  in use locally could have lead to disclosoure of information or arbitrary
  code exectution (bnc#963767).
- CVE-2016-2143: On zSeries a fork of a large process could have caused
  memory corruption due to incorrect page table handling. (bnc#970504,
  LTC#138810).
- CVE-2016-2184: A malicious USB device could cause kernel crashes in
  the alsa usb-audio device driver (bsc#971125).
- CVE-2016-2185: A malicious USB device could cause kernel crashes in
  the usb_driver_claim_interface function (bnc#971124).
- CVE-2016-2186: A malicious USB device could cause kernel crashes in
  the powermate device driver (bnc#970958).
- CVE-2016-2384: A double free on the ALSA umidi object was
  fixed. (bsc#966693).
- CVE-2016-2543: A missing NULL check at remove_events ioctl in the ALSA
  seq driver was fixed. (bsc#967972).
- CVE-2016-2544: Fix race at timer setup and close in the ALSA seq driver
  was fixed. (bsc#967973).
- CVE-2016-2545: A double unlink of active_list in the ALSA timer driver
  was fixed. (bsc#967974).
- CVE-2016-2546: A race among ALSA timer ioctls was fixed (bsc#967975).
- CVE-2016-2547,CVE-2016-2548: The ALSA slave
  timer list handling was hardened against hangs and
  races. (CVE-2016-2547,CVE-2016-2548,bsc#968011,bsc#968012).
- CVE-2016-2549: A stall in ALSA hrtimer handling was fixed (bsc#968013).
- CVE-2016-2782: A malicious USB device could cause kernel crashes in
  the visor device driver (bnc#968670).
- CVE-2016-3137: A malicious USB device could cause kernel crashes in
  the cypress_m8 device driver (bnc#970970).
- CVE-2016-3139: A malicious USB device could cause kernel crashes in
  the wacom device driver (bnc#970909).
- CVE-2016-3140: A malicious USB device could cause kernel crashes in
  the digi_acceleport device driver (bnc#970892).
- CVE-2016-3156: A quadratic algorithm could lead to long
  kernel ipv4 hangs when removing a device with a large number of
  addresses. (bsc#971360).
- CVE-2016-3955: A remote buffer overflow in the usbip driver could be used
  by authenticated attackers to crash the kernel. (bsc#975945)
- CVE-2016-2847: A local user could exhaust kernel memory by pushing lots of data
  into pipes. (bsc#970948).
- CVE-2016-2188: A malicious USB device could cause kernel crashes in the
  iowarrior device driver (bnc#970956).
- CVE-2016-3138: A malicious USB device could cause kernel crashes in the
  cdc-acm device driver (bnc#970911).

The following non-security bugs were fixed:
- af_unix: Guard against other == sk in unix_dgram_sendmsg (bsc#973570).
- blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976).
- blktap: refine mm tracking (bsc#952976).
- cachefiles: Avoid deadlocks with fs freezing (bsc#935123).
- cifs: Schedule on hard mount retry (bsc#941514).
- cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646).
- dcache: use IS_ROOT to decide where dentry is hashed (bsc#949752).
- driver: Vmxnet3: Fix ethtool -S to return correct rx queue stats (bsc#950750).
- drm/i915: Change semantics of hw_contexts_disabled (bsc#963276).
- drm/i915: Evict CS TLBs between batches (bsc#758040).
- drm/i915: Fix SRC_COPY width on 830/845g (bsc#758040).
- e1000e: Do not read ICR in Other interrupt (bsc#924919).
- e1000e: Do not write lsc to ics in msi-x mode (bsc#924919).
- e1000e: Fix msi-x interrupt automask (bsc#924919).
- e1000e: Remove unreachable code (bsc#924919).
- ext3: fix data=journal fast mount/umount hang (bsc#942082).
- ext3: NULL dereference in ext3_evict_inode() (bsc#942082).
- firmware: Create directories for external firmware (bsc#959312).
- firmware: Simplify directory creation (bsc#959312).
- fs: Avoid deadlocks of fsync_bdev() and fs freezing (bsc#935123).
- fs: Fix deadlocks between sync and fs freezing (bsc#935123).
- ftdi_sio: private backport of TIOCMIWAIT (bnc#956375).
- ipr: Fix incorrect trace indexing (bsc#940913).
- ipr: Fix invalid array indexing for HRRQ (bsc#940913).
- ipv6: make fib6 serial number per namespace (bsc#965319).
- ipv6: mld: fix add_grhead skb_over_panic for devs with large MTUs (bsc#956852).
- ipv6: per netns fib6 walkers (bsc#965319).
- ipv6: per netns FIB garbage collection (bsc#965319).
- ipv6: replace global gc_args with local variable (bsc#965319).
- jbd: Fix unreclaimed pages after truncate in data=journal mode (bsc#961516).
- kabi: protect struct netns_ipv6 after FIB6 GC series (bsc#965319).
- kbuild: create directory for dir/file.o (bsc#959312).
- kexec: Fix race between panic() and crash_kexec() called directly (bnc#937444).
- lpfc: Fix null ndlp dereference in target_reset_handler (bsc#951392).
- mld, igmp: Fix reserved tailroom calculation (bsc#956852).
- mm-memcg-print-statistics-from-live-counters-fix (bnc#969307).
- netfilter: xt_recent: fix namespace destroy path (bsc#879378).
- nfs4: treat lock owners as opaque values (bnc#968141).
- nfs: Fix handling of re-write-before-commit for mmapped NFS pages (bsc#964201).
- nfs: use smaller allocations for 'struct id_map' (bsc#965923).
- nfsv4: Fix two infinite loops in the mount code (bsc#954628).
- nfsv4: Recovery of recalled read delegations is broken (bsc#956514).
- panic/x86: Allow cpus to save registers even if they (bnc#940946).
- panic/x86: Fix re-entrance problem due to panic on (bnc#937444).
- pciback: do not allow MSI-X ops if PCI_COMMAND_MEMORY is not set.
- pciback: for XEN_PCI_OP_disable_msi[|x] only disable if device has MSI(X) enabled.
- pciback: return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled.
- pciback: return error on XEN_PCI_OP_enable_msix when device has MSI or MSI-X enabled.
- pci: Update VPD size with correct length (bsc#958906).
- quota: Fix deadlock with suspend and quotas (bsc#935123).
- rdma/ucma: Fix AB-BA deadlock (bsc#963998).
- README.BRANCH: Switch to LTSS mode
- Refresh patches.xen/xen3-08-x86-ldt-make-modify_ldt-synchronous.patch (bsc#959705).
- Restore kabi after lock-owner change (bnc#968141).
- s390/pageattr: Do a single TLB flush for change_page_attr (bsc#940413).
- scsi_dh_rdac: always retry MODE SELECT on command lock violation (bsc#956949).
- scsi: mpt2sas: Rearrange the the code so that the completion queues are initialized prior to sending the request to controller firmware (bsc#967863).
- skb: Add inline helper for getting the skb end offset from head (bsc#956852).
- sunrcp: restore fair scheduling to priority queues (bsc#955308).
- sunrpc: refactor rpcauth_checkverf error returns (bsc#955673).
- tcp: avoid order-1 allocations on wifi and tx path (bsc#956852).
- tcp: fix skb_availroom() (bsc#956852).
- tg3: 5715 does not link up when autoneg off (bsc#904035).
- Update patches.fixes/mm-exclude-reserved-pages-from-dirtyable-memory-fix.patch (bnc#940017, bnc#949298, bnc#947128).
- usb: ftdi_sio: fix race condition in TIOCMIWAIT, and abort of TIOCMIWAIT when the device is removed (bnc#956375).
- usb: ftdi_sio: fix status line change handling for TIOCMIWAIT and TIOCGICOUNT (bnc#956375).
- usb: ftdi_sio: fix tiocmget and tiocmset return values (bnc#956375).
- usb: ftdi_sio: fix tiocmget indentation (bnc#956375).
- usb: ftdi_sio: optimise chars_in_buffer (bnc#956375).
- usb: ftdi_sio: refactor modem-control status retrieval (bnc#956375).
- usb: ftdi_sio: remove unnecessary memset (bnc#956375).
- usb: ftdi_sio: use ftdi_get_modem_status in chars_in_buffer (bnc#956375).
- usb: ftdi_sio: use generic chars_in_buffer (bnc#956375).
- usb: serial: export usb_serial_generic_chars_in_buffer (bnc#956375).
- usb: serial: ftdi_sio: Add missing chars_in_buffer function (bnc#956375).
- usbvision fix overflow of interfaces array (bnc#950998).
- veth: extend device features (bsc#879381).
- vfs: Provide function to get superblock and wait for it to thaw (bsc#935123).
- vmxnet3: adjust ring sizes when interface is down (bsc#950750).
- vmxnet3: fix building without CONFIG_PCI_MSI (bsc#958912).
- vmxnet3: fix ethtool ring buffer size setting (bsc#950750).
- vmxnet3: fix netpoll race condition (bsc#958912).
- writeback: Skip writeback for frozen filesystem (bsc#935123).
- x86/evtchn: make use of PHYSDEVOP_map_pirq.
- x86, kvm: fix kvm's usage of kernel_fpu_begin/end() (bsc#961518).
- x86, kvm: fix maintenance of guest/host xcr0 state (bsc#961518).
- x86, kvm: use kernel_fpu_begin/end() in kvm_load/put_guest_fpu() (bsc#961518).
- x86/mce: Fix return value of mce_chrdev_read() when erst is disabled (bsc#934787).
- xen/panic/x86: Allow cpus to save registers even if they (bnc#940946).
- xen/panic/x86: Fix re-entrance problem due to panic on (bnc#937444).
- xen: x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- xen: x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).
- xfrm: do not segment UFO packets (bsc#946122).
- xhci: silence TD warning (bnc#939955).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-03"/>
	<updated date="2016-05-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/758040">SUSE bug 758040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/781018">SUSE bug 781018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879378">SUSE bug 879378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879381">SUSE bug 879381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904035">SUSE bug 904035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924919">SUSE bug 924919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934787">SUSE bug 934787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935123">SUSE bug 935123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939955">SUSE bug 939955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940017">SUSE bug 940017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940413">SUSE bug 940413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940913">SUSE bug 940913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940946">SUSE bug 940946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941514">SUSE bug 941514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942082">SUSE bug 942082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946122">SUSE bug 946122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947128">SUSE bug 947128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948330">SUSE bug 948330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949298">SUSE bug 949298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949752">SUSE bug 949752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949936">SUSE bug 949936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950750">SUSE bug 950750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950998">SUSE bug 950998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951392">SUSE bug 951392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952976">SUSE bug 952976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954628">SUSE bug 954628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955308">SUSE bug 955308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955354">SUSE bug 955354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955654">SUSE bug 955654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955673">SUSE bug 955673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956375">SUSE bug 956375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956514">SUSE bug 956514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956707">SUSE bug 956707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956708">SUSE bug 956708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956709">SUSE bug 956709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956852">SUSE bug 956852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956949">SUSE bug 956949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957990">SUSE bug 957990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958463">SUSE bug 958463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958886">SUSE bug 958886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958906">SUSE bug 958906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958912">SUSE bug 958912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958951">SUSE bug 958951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959190">SUSE bug 959190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959312">SUSE bug 959312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959399">SUSE bug 959399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959705">SUSE bug 959705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960857">SUSE bug 960857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961500">SUSE bug 961500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961509">SUSE bug 961509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961512">SUSE bug 961512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961516">SUSE bug 961516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961518">SUSE bug 961518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963276">SUSE bug 963276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963765">SUSE bug 963765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963767">SUSE bug 963767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963998">SUSE bug 963998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964201">SUSE bug 964201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965319">SUSE bug 965319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965923">SUSE bug 965923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966437">SUSE bug 966437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966693">SUSE bug 966693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967863">SUSE bug 967863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967972">SUSE bug 967972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967973">SUSE bug 967973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967974">SUSE bug 967974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967975">SUSE bug 967975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968010">SUSE bug 968010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968011">SUSE bug 968011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968012">SUSE bug 968012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968013">SUSE bug 968013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968141">SUSE bug 968141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968670">SUSE bug 968670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969307">SUSE bug 969307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970504">SUSE bug 970504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970892">SUSE bug 970892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970909">SUSE bug 970909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970911">SUSE bug 970911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970948">SUSE bug 970948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970956">SUSE bug 970956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970958">SUSE bug 970958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970970">SUSE bug 970970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971124">SUSE bug 971124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971125">SUSE bug 971125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971360">SUSE bug 971360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973570">SUSE bug 973570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974646">SUSE bug 974646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975945">SUSE bug 975945</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7446/">CVE-2013-7446 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7446">CVE-2013-7446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7509/">CVE-2015-7509 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7509">CVE-2015-7509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7515/">CVE-2015-7515 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7515">CVE-2015-7515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7550/">CVE-2015-7550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7550">CVE-2015-7550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7566/">CVE-2015-7566 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7566">CVE-2015-7566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7799/">CVE-2015-7799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7799">CVE-2015-7799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8215/">CVE-2015-8215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8215">CVE-2015-8215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8539/">CVE-2015-8539 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8539">CVE-2015-8539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8543">CVE-2015-8543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8550">CVE-2015-8550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8551/">CVE-2015-8551 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8551">CVE-2015-8551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8552/">CVE-2015-8552 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8552">CVE-2015-8552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8569/">CVE-2015-8569 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8569">CVE-2015-8569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8575/">CVE-2015-8575 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8575">CVE-2015-8575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8767/">CVE-2015-8767 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8767">CVE-2015-8767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8785/">CVE-2015-8785 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8785">CVE-2015-8785 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8812/">CVE-2015-8812 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8812">CVE-2015-8812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8816/">CVE-2015-8816 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8816">CVE-2015-8816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0723/">CVE-2016-0723 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0723">CVE-2016-0723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2069/">CVE-2016-2069 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2069">CVE-2016-2069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2143/">CVE-2016-2143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2143">CVE-2016-2143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2184/">CVE-2016-2184 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2184">CVE-2016-2184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2185/">CVE-2016-2185 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2185">CVE-2016-2185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2186/">CVE-2016-2186 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2186">CVE-2016-2186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2188/">CVE-2016-2188 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2188">CVE-2016-2188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2384/">CVE-2016-2384 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2384">CVE-2016-2384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2543/">CVE-2016-2543 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2543">CVE-2016-2543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2544/">CVE-2016-2544 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2544">CVE-2016-2544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2545/">CVE-2016-2545 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2545">CVE-2016-2545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2546/">CVE-2016-2546 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2546">CVE-2016-2546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2547/">CVE-2016-2547 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2547">CVE-2016-2547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2548/">CVE-2016-2548 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2548">CVE-2016-2548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2549/">CVE-2016-2549 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2549">CVE-2016-2549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2782/">CVE-2016-2782 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2782">CVE-2016-2782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2847/">CVE-2016-2847 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2847">CVE-2016-2847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3137/">CVE-2016-3137 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3137">CVE-2016-3137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3138/">CVE-2016-3138 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3138">CVE-2016-3138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3139/">CVE-2016-3139 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3139">CVE-2016-3139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3140/">CVE-2016-3140 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3140">CVE-2016-3140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3156/">CVE-2016-3156 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3156">CVE-2016-3156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3955/">CVE-2016-3955 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3955">CVE-2016-3955 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578412" comment="kernel-bigsmp-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578413" comment="kernel-bigsmp-base-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578415" comment="kernel-default-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578416" comment="kernel-default-base-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578418" comment="kernel-default-man-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578419" comment="kernel-ec2-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578420" comment="kernel-ec2-base-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578422" comment="kernel-pae-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578423" comment="kernel-pae-base-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578425" comment="kernel-source-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578426" comment="kernel-syms-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578427" comment="kernel-trace-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578428" comment="kernel-trace-base-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578430" comment="kernel-xen-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578431" comment="kernel-xen-base-3.0.101-0.47.79.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218791" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="913030" ref_url="https://bugzilla.suse.com/913030" source="BUGZILLA"/>
		<reference ref_id="926056" ref_url="https://bugzilla.suse.com/926056" source="BUGZILLA"/>
		<reference ref_id="926480" ref_url="https://bugzilla.suse.com/926480" source="BUGZILLA"/>
		<reference ref_id="954992" ref_url="https://bugzilla.suse.com/954992" source="BUGZILLA"/>
		<reference ref_id="960458" ref_url="https://bugzilla.suse.com/960458" source="BUGZILLA"/>
		<reference ref_id="963060" ref_url="https://bugzilla.suse.com/963060" source="BUGZILLA"/>
		<reference ref_id="967042" ref_url="https://bugzilla.suse.com/967042" source="BUGZILLA"/>
		<reference ref_id="968010" ref_url="https://bugzilla.suse.com/968010" source="BUGZILLA"/>
		<reference ref_id="968670" ref_url="https://bugzilla.suse.com/968670" source="BUGZILLA"/>
		<reference ref_id="970892" ref_url="https://bugzilla.suse.com/970892" source="BUGZILLA"/>
		<reference ref_id="970909" ref_url="https://bugzilla.suse.com/970909" source="BUGZILLA"/>
		<reference ref_id="970911" ref_url="https://bugzilla.suse.com/970911" source="BUGZILLA"/>
		<reference ref_id="970948" ref_url="https://bugzilla.suse.com/970948" source="BUGZILLA"/>
		<reference ref_id="970956" ref_url="https://bugzilla.suse.com/970956" source="BUGZILLA"/>
		<reference ref_id="970958" ref_url="https://bugzilla.suse.com/970958" source="BUGZILLA"/>
		<reference ref_id="970970" ref_url="https://bugzilla.suse.com/970970" source="BUGZILLA"/>
		<reference ref_id="971124" ref_url="https://bugzilla.suse.com/971124" source="BUGZILLA"/>
		<reference ref_id="971125" ref_url="https://bugzilla.suse.com/971125" source="BUGZILLA"/>
		<reference ref_id="971360" ref_url="https://bugzilla.suse.com/971360" source="BUGZILLA"/>
		<reference ref_id="973570" ref_url="https://bugzilla.suse.com/973570" source="BUGZILLA"/>
		<reference ref_id="973691" ref_url="https://bugzilla.suse.com/973691" source="BUGZILLA"/>
		<reference ref_id="975945" ref_url="https://bugzilla.suse.com/975945" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8816" ref_url="https://www.suse.com/security/cve/CVE-2015-8816/" source="CVE"/>
		<reference ref_id="CVE-2016-2184" ref_url="https://www.suse.com/security/cve/CVE-2016-2184/" source="CVE"/>
		<reference ref_id="CVE-2016-2185" ref_url="https://www.suse.com/security/cve/CVE-2016-2185/" source="CVE"/>
		<reference ref_id="CVE-2016-2186" ref_url="https://www.suse.com/security/cve/CVE-2016-2186/" source="CVE"/>
		<reference ref_id="CVE-2016-2188" ref_url="https://www.suse.com/security/cve/CVE-2016-2188/" source="CVE"/>
		<reference ref_id="CVE-2016-2782" ref_url="https://www.suse.com/security/cve/CVE-2016-2782/" source="CVE"/>
		<reference ref_id="CVE-2016-2847" ref_url="https://www.suse.com/security/cve/CVE-2016-2847/" source="CVE"/>
		<reference ref_id="CVE-2016-3137" ref_url="https://www.suse.com/security/cve/CVE-2016-3137/" source="CVE"/>
		<reference ref_id="CVE-2016-3138" ref_url="https://www.suse.com/security/cve/CVE-2016-3138/" source="CVE"/>
		<reference ref_id="CVE-2016-3139" ref_url="https://www.suse.com/security/cve/CVE-2016-3139/" source="CVE"/>
		<reference ref_id="CVE-2016-3140" ref_url="https://www.suse.com/security/cve/CVE-2016-3140/" source="CVE"/>
		<reference ref_id="CVE-2016-3156" ref_url="https://www.suse.com/security/cve/CVE-2016-3156/" source="CVE"/>
		<reference ref_id="CVE-2016-3955" ref_url="https://www.suse.com/security/cve/CVE-2016-3955/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP3 Teradata kernel was updated to fix bugs and
security issues.

The following security issues have been fixed:

- alsa/usb-audio: Add sanity checks for endpoint accesses (CVE-2016-2184,bsc#971125).
- alsa/usb-audio: Fix NULL dereference in create_fixed_stream_quirk() (CVE-2016-2184,bsc#971125).
- input/powermate: Fix oops with malicious USB descriptors (bsc#970958, CVE-2016-2186).
- ipv4: Don't do expensive useless work during inetdev destroy (CVE-2016-3156, bsc#971360).
- pipe: Limit the per-user amount of pages allocated in pipes (bsc#970948, CVE-2016-2847).
- usb/cdc-acm: More sanity checking (bsc#970911, CVE-2016-3138).
- usb/cypress_m8: Add endpoint sanity check (bsc#970970, CVE-2016-3137).
- usb/digi_acceleport: Do sanity checking for the number of ports (bsc#970892, CVE-2016-3140).
- usb: Fix invalid memory access in hub_activate() (bsc#968010, CVE-2015-8816).
- usb/iowarrior: Fix oops with malicious USB descriptors (bsc#970956, CVE-2016-2188).
- usb/usb_driver_claim_interface: Add sanity checking (bsc#971124, CVE-2016-2185).
- usb/usbip: Fix potential out-of-bounds write (bsc#975945, CVE-2016-3955).
- usb/visor: Fix null-deref at probe (bsc#968670, CVE-2016-2782).
- wacom: Fix crash due to missing endpoint (bsc#970909, CVE-2016-3139).

The NVMe driver was updated to the current SLE11-SP4 version, which includes the
following fixes enhancements:

- NVMe: Free cmdid on nvme_submit_bio error (bsc#913030, fate#317455, fate#320430).
- NVMe: End queued bio requests when freeing queue (bsc#913030, fate#317455, fate#320430).
- NVMe: Set result from user admin command (bsc#913030, fate#317455, fate#320430).
- NVMe: Add result to nvme_get_features (bsc#913030, fate#317455, fate#320430).
- NVMe: Define SMART log (bsc#913030, fate#317455, fate#320430).
- NVMe: Initialize iod nents to 0 (bsc#913030, fate#317455, fate#320430).
- NVMe: Add namespaces with no LBA range feature (bsc#913030, fate#317455, fate#320430).
- NVMe: Add discard support for capable devices (bsc#913030, fate#317455, fate#320430).
- NVMe: Rename nvme.c to nvme-core.c (bsc#913030, fate#317455, fate#320430).
- NVMe: Move structures &amp; definitions to header file (bsc#913030, fate#317455, fate#320430).
- NVMe: Add definitions for format command (bsc#913030, fate#317455, fate#320430).
- NVMe: Add nvme-scsi.c (bsc#913030, fate#317455, fate#320430).
- NVMe: Use round_jiffies_relative() for the periodic, once-per-second (bsc#913030, fate#317455, fate#320430).
- NVMe: Abstract out sector to block number conversion (bsc#913030, fate#317455, fate#320430).
- NVMe: Don't fail initialisation unnecessarily (bsc#913030, fate#317455, fate#320430).
- NVMe: Fix sparse warnings in scsi emulation (bsc#913030, fate#317455, fate#320430).
- NVMe: Fix I/O cancellation status on big-endian machines (bsc#913030, fate#317455, fate#320430).
- NVMe: Fix endian-related problems in user I/O submission path (bsc#913030, fate#317455, fate#320430).
- NVMe: Add a character device for each nvme device (bsc#913030, fate#317455, fate#320430).
- NVMe: Set TASK_INTERRUPTIBLE before processing queues (bsc#913030, fate#317455, fate#320430).
- NVMe: Queue usage fixes in nvme-scsi (bsc#913030, fate#317455, fate#320430).
- NVMe: Add scsi unmap to SG_IO (bsc#913030, fate#317455, fate#320430).
- NVMe: Free admin queue on request_irq error (bsc#913030, fate#317455, fate#320430).
- NVMe: Fix error clean-up on nvme_alloc_queue (bsc#913030, fate#317455, fate#320430).
- NVMe: Check for NULL memory in nvme_dev_add (bsc#913030, fate#317455, fate#320430).
- NVMe: Remove dead code in nvme_dev_add (bsc#913030, fate#317455, fate#320430).
- NVMe: Split non-mergeable bio requests (bsc#913030, fate#317455, fate#320430).
- NVMe: Device specific stripe size handling (bsc#913030, fate#317455, fate#320430).
- NVMe: Meta-data support in NVME_IOCTL_SUBMIT_IO (bsc#913030, fate#317455, fate#320430).
- NVMe: Schedule timeout for sync commands (bsc#913030, fate#317455, fate#320430).
- NVMe: Wait for device to acknowledge shutdown (bsc#913030, fate#317455, fate#320430).
- NVMe: Only clear the enable bit when disabling controller (bsc#913030, fate#317455, fate#320430).
- NVMe: Simplify Firmware Activate code slightly (bsc#913030, fate#317455, fate#320430).
- NVMe: Use user defined admin ioctl timeout (bsc#913030, fate#317455, fate#320430).
- NVMe: Remove redundant version.h header include (bsc#913030, fate#317455, fate#320430).
- NVMe: Fix a signedness bug in nvme_trans_modesel_get_mp (bsc#913030, fate#317455, fate#320430).
- NVMe: Check for integer overflow in nvme_map_user_pages() (bsc#913030, fate#317455, fate#320430).
- NVMe: Fix error return code in nvme_submit_bio_queue() (bsc#913030, fate#317455, fate#320430).
- NVMe: Do not cancel command multiple times (bsc#913030, fate#317455, fate#320430).
- NVMe: Use dma_set_mask() correctly (bsc#913030, fate#317455, fate#320430).
- NVMe: Add MSI support (bsc#913030, fate#317455, fate#320430).
- NVMe: Use kzalloc instead of kmalloc+memset (bsc#913030, fate#317455, fate#320430).
- NVMe: Restructure MSI / MSI-X setup (bsc#913030, fate#317455, fate#320430).
- NVMe: Disk IO statistics (bsc#913030, fate#317455, fate#320430).
- NVMe: Return correct value from interrupt handler (bsc#913030, fate#317455, fate#320430).
- NVMe: Remove 'process_cq did something' message (bsc#913030, fate#317455, fate#320430).
- NVMe: Call nvme_process_cq from submission path (bsc#913030, fate#317455, fate#320430).
- NVMe: Split header file into user-visible and kernel-visible pieces (bsc#913030, fate#317455, fate#320430).
- NVMe: Update nvme_id_power_state with latest spec (bsc#913030, fate#317455, fate#320430).
- NVMe: Namespace IDs are unsigned (bsc#913030, fate#317455, fate#320430).
- NVMe: Fix checkpatch issues (bsc#913030, fate#317455, fate#320430).
- NVMe: Bring up cdev on set feature failure (bsc#913030, fate#317455, fate#320430).
- NVMe: Disk stats for read/write commands only (bsc#913030, fate#317455, fate#320430).
- NVMe: Group pci related actions in functions (bsc#913030, fate#317455, fate#320430).
- NVMe: Separate queue alloc/free from create/delete (bsc#913030, fate#317455, fate#320430).
- NVMe: Separate controller init from disk discovery (bsc#913030, fate#317455, fate#320430).
- NVMe: Use normal shutdown (bsc#913030, fate#317455, fate#320430).
- NVMe: Add pci suspend/resume driver callbacks (bsc#913030, fate#317455, fate#320430).
- NVMe: Handle ioremap failure (bsc#913030, fate#317455, fate#320430).
- NVMe: Merge issue on character device bring-up (bsc#913030, fate#317455, fate#320430).
- DMA-API: block: nvme-core: replace (bsc#913030, fate#317455, fate#320430).
- NVMe: Avoid shift operation when writing cq head doorbell (bsc#913030, fate#317455, fate#320430).
- NVMe: Remove deprecated IRQF_DISABLED (bsc#913030, fate#317455, fate#320430).
- NVMe: Compat SG_IO ioctl (bsc#913030, fate#317455, fate#320430).
- NVMe: Fix lockdep warnings (bsc#913030, fate#317455, fate#320430).
- NVMe: Cache dev-&gt;pci_dev in a local pointer (bsc#913030, fate#317455, fate#320430).
- NVMe: Device resume error handling (bsc#913030, fate#317455, fate#320430).
- NVMe: Schedule reset for failed controllers (bsc#913030, fate#317455, fate#320430).
- NVMe: Abort timed out commands (bsc#913030, fate#317455, fate#320430).
- NVMe: Surprise removal handling (bsc#913030, fate#317455, fate#320430).
- NVMe: Async IO queue deletion (bsc#913030, fate#317455, fate#320430).
- NVMe: Dynamically allocate partition numbers (bsc#913030, fate#317455, fate#320430).
- NVMe: Disable admin queue on init failure (bsc#913030, fate#317455, fate#320430).
- NVMe: Add a pci_driver shutdown method (bsc#913030, fate#317455, fate#320430).
- NVMe: Include device and queue numbers in interrupt name (bsc#913030, fate#317455, fate#320430).
- NVMe: Correct uses of INIT_WORK (bsc#913030, fate#317455, fate#320430).
- NVMe: Namespace use after free on surprise removal (bsc#913030, fate#317455, fate#320430).
- NVMe: Add CONFIG_PM_SLEEP to suspend/resume functions (bsc#913030, fate#317455, fate#320430).
- NVMe: Initialize device reference count earlier (bsc#913030, fate#317455, fate#320430).
- NVMe: RCU protected access to io queues (bsc#913030, fate#317455, fate#320430).
- NVMe: IOCTL path RCU protect queue access (bsc#913030, fate#317455, fate#320430).
- NVMe: Fix divide-by-zero in nvme_trans_io_get_num_cmds (bsc#913030, fate#317455, fate#320430).
- NVMe: Replace DEFINE_PCI_DEVICE_TABLE (bsc#913030, fate#317455, fate#320430).
- NVMe: Per-cpu io queues (bsc#913030, fate#317455, fate#320430).
- NVMe: CPU hot plug notification (bsc#913030, fate#317455, fate#320430).
- NVMe: Make I/O timeout a module parameter (bsc#913030, fate#317455, fate#320430).
- NVMe: Start-stop nvme_thread during device add-remove (bsc#913030, fate#317455, fate#320430).
- NVMe: Add getgeo to block ops (bsc#913030, fate#317455, fate#320430).
- NVMe: Retry failed commands with non-fatal errors (bsc#913030, fate#317455, fate#320430).
- NVMe: Update copyright headers (bsc#913030, fate#317455, fate#320430).
- NVMe: Improve error messages (bsc#913030, fate#317455, fate#320430).
- NVMe: Protect against badly formatted CQEs (bsc#913030, fate#317455, fate#320430).
- NVMe: Configure support for block flush (bsc#913030, fate#317455, fate#320430).
- NVMe: Enable BUILD_BUG_ON checks (bsc#913030, fate#317455, fate#320430).
- NVMe: Fix the buffer size passed in GetLogPage(CDW10.NUMD) (bsc#913030, fate#317455, fate#320430).
- NVMe: Prevent possible NULL pointer dereference (bsc#913030, fate#317455, fate#320430).
- NVMe: Make iod bio timeout a parameter (bsc#913030, fate#317455, fate#320430).
- NVMe: Make admin timeout a module parameter (bsc#913030, fate#317455, fate#320430).
- NVMe: Delete NVME_GET_FEAT_TEMP_THRESH (bsc#913030, fate#317455, fate#320430).
- NVMe: Fix nvme get/put queue semantics (bsc#913030, fate#317455, fate#320430).
- NVMe: Adhere to request queue block accounting enable/disable (bsc#913030, fate#317455, fate#320430).
- NVMe: Use last bytes of f/w rev SCSI Inquiry (bsc#913030, fate#317455, fate#320430).
- NVMe: Rename io_timeout to nvme_io_timeout (bsc#913030, fate#317455, fate#320430).
- NVMe: Fix hot cpu notification dead lock (bsc#913030, fate#317455, fate#320430).
- NVMe: Define Log Page constants (bsc#913030, fate#317455, fate#320430).
- NVMe: Use Log Page constants in SCSI emulation (bsc#913030, fate#317455, fate#320430).
- NVMe: Fix START_STOP_UNIT Scsi-&gt;NVMe translation (bsc#913030, fate#317455, fate#320430).
- NVMe: Async event request (bsc#913030, fate#317455, fate#320430).
- NVMe: Update list of status codes (bsc#913030, fate#317455, fate#320430).
- NVMe: Mismatched host/device page size support (bsc#913030, fate#317455, fate#320430).
- NVMe: Change nvme_enable_ctrl to set EN and manage CC thru (bsc#913030, fate#317455, fate#320430).
- NVMe: Handling devices incapable of I/O (bsc#913030, fate#317455, fate#320430).
- NVMe: Skip orderly shutdown on failed devices (bsc#913030, fate#317455, fate#320430).
- NVMe: Add shutdown timeout as module parameter (bsc#913030, fate#317455, fate#320430).
- NVMe: Call nvme_free_queue directly (bsc#913030, fate#317455, fate#320430).
- NVMe: Fix filesystem sync deadlock on removal (bsc#913030, fate#317455, fate#320430).
- NVMe: Correctly handle IOCTL_SUBMIT_IO when cpus &gt; online queues (bsc#913030, fate#317455, fate#320430).
- NVMe: Replace rcu_assign_pointer() with RCU_INIT_POINTER() (bsc#913030, fate#317455, fate#320430).
- NVMe: Reference count pci device (bsc#913030, fate#317455, fate#320430).
- NVMe: Remove duplicate compat SG_IO code (bsc#913030, fate#317455, fate#320430).
- NVMe: Fix SG_IO status values (bsc#913030, fate#317455, fate#320430).
- NVMe: Translate NVMe status to errno (bsc#913030, fate#317455, fate#320430).
- NVMe: Fix nvmeq waitqueue entry initialization (bsc#913030, fate#317455, fate#320430).
- NVMe: Add revalidate_disk callback (bsc#913030, fate#317455, fate#320430).
- NVMe: Passthrough IOCTL for IO commands (bsc#913030, fate#317455, fate#320430).
- NVMe: Updates for 1.1 spec (bsc#913030, fate#317455, fate#320430).
- NVMe: Fix device probe waiting on kthread (bsc#913030, fate#317455, fate#320430).
- NVMe: Clear QUEUE_FLAG_STACKABLE (bsc#913030, fate#317455, fate#320430).
- NVMe: Do not open disks that are being deleted (bsc#913030, fate#317455, fate#320430).
- NVMe: Do not over allocate for discard requests (bsc#913030, fate#317455, fate#320430).
- NVMe: Make setup work for devices that don't do INTx (bsc#913030, fate#317455, fate#320430).
- NVMe: Fail pci initialization if the device doesn't have any BARs (bsc#913030, fate#317455, fate#320430).
- NVMe: Return 0 from make request on ended bio (bsc#926480, fate#320430).
- NVMe: Add tracepoints (bsc#926056, fate#320430).
- NVMe: Flush with data support (bsc#926056, fate#320430).
- NVMe: Update namespace and controller identify structures to the 1.1a spec (bsc#926056, fate#320430).
- NVMe: Update data structures for NVMe 1.2 (bsc#926056, fate#320430).
- NVMe: Update SCSI Inquiry VPD 83h translation (bsc#926056, fate#320430).
- NVMe: Register management handle under nvme class (bsc#926056, fate#320430).
- NVMe: Asynchronous controller probe (bsc#926056, fate#320430).
- NVMe: Fix potential corruption during shutdown (bsc#926056, fate#320430).
- NVMe: Fix potential corruption on sync commands (bsc#926056, fate#320430).
- NVMe: Fix PRP list calculation for non-4k system page size (bsc#926056, fate#320430).
- NVMe: Initialize device list head before starting (bsc#926056, fate#320430).
- NVMe: Add translation for block limits (bsc#926056, fate#320430).
- NVMe: Clear BIO_SEG_VALID flag in nvme_bio_split() (bsc#954992, fate#320430).
- NVMe: default to 4k device page size (bsc#967042, fate#320430).
- DMA-API: provide a helper to set both DMA and coherent DMA masks (bug#909498 fate#317395).
- tty: Use lockless flip buffer free list (bsc#913030, fate#317455).

The following bugs have been fixed:

- Return ENODEV instead of EIO when device is removed with IO pending (bsc#963060).
- af_unix: Guard against other == sk in unix_dgram_sendmsg (bsc#973570).
- scsi_dh_alua: Do not block request queue if workqueue is active (bsc#960458).
- xen/panic-handler: Only call the HV when we don't boot into a crash-kernel (bsc#973691).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-09"/>
	<updated date="2016-05-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/913030">SUSE bug 913030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926056">SUSE bug 926056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926480">SUSE bug 926480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954992">SUSE bug 954992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960458">SUSE bug 960458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963060">SUSE bug 963060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967042">SUSE bug 967042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968010">SUSE bug 968010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968670">SUSE bug 968670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970892">SUSE bug 970892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970909">SUSE bug 970909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970911">SUSE bug 970911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970948">SUSE bug 970948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970956">SUSE bug 970956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970958">SUSE bug 970958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970970">SUSE bug 970970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971124">SUSE bug 971124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971125">SUSE bug 971125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971360">SUSE bug 971360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973570">SUSE bug 973570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973691">SUSE bug 973691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975945">SUSE bug 975945</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8816/">CVE-2015-8816 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8816">CVE-2015-8816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2184/">CVE-2016-2184 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2184">CVE-2016-2184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2185/">CVE-2016-2185 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2185">CVE-2016-2185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2186/">CVE-2016-2186 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2186">CVE-2016-2186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2188/">CVE-2016-2188 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2188">CVE-2016-2188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2782/">CVE-2016-2782 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2782">CVE-2016-2782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2847/">CVE-2016-2847 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2847">CVE-2016-2847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3137/">CVE-2016-3137 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3137">CVE-2016-3137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3138/">CVE-2016-3138 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3138">CVE-2016-3138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3139/">CVE-2016-3139 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3139">CVE-2016-3139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3140/">CVE-2016-3140 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3140">CVE-2016-3140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3156/">CVE-2016-3156 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3156">CVE-2016-3156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3955/">CVE-2016-3955 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3955">CVE-2016-3955 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992924" comment="kernel-default-3.0.101-0.83.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992925" comment="kernel-default-base-3.0.101-0.83.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992927" comment="kernel-ec2-3.0.101-0.83.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992928" comment="kernel-ec2-base-3.0.101-0.83.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992930" comment="kernel-source-3.0.101-0.83.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992931" comment="kernel-syms-3.0.101-0.83.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992932" comment="kernel-trace-3.0.101-0.83.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992933" comment="kernel-trace-base-3.0.101-0.83.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992935" comment="kernel-xen-3.0.101-0.83.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992936" comment="kernel-xen-base-3.0.101-0.83.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218792" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="950998" ref_url="https://bugzilla.suse.com/950998" source="BUGZILLA"/>
		<reference ref_id="963762" ref_url="https://bugzilla.suse.com/963762" source="BUGZILLA"/>
		<reference ref_id="971126" ref_url="https://bugzilla.suse.com/971126" source="BUGZILLA"/>
		<reference ref_id="971360" ref_url="https://bugzilla.suse.com/971360" source="BUGZILLA"/>
		<reference ref_id="971944" ref_url="https://bugzilla.suse.com/971944" source="BUGZILLA"/>
		<reference ref_id="978401" ref_url="https://bugzilla.suse.com/978401" source="BUGZILLA"/>
		<reference ref_id="978821" ref_url="https://bugzilla.suse.com/978821" source="BUGZILLA"/>
		<reference ref_id="978822" ref_url="https://bugzilla.suse.com/978822" source="BUGZILLA"/>
		<reference ref_id="979213" ref_url="https://bugzilla.suse.com/979213" source="BUGZILLA"/>
		<reference ref_id="979548" ref_url="https://bugzilla.suse.com/979548" source="BUGZILLA"/>
		<reference ref_id="979867" ref_url="https://bugzilla.suse.com/979867" source="BUGZILLA"/>
		<reference ref_id="979879" ref_url="https://bugzilla.suse.com/979879" source="BUGZILLA"/>
		<reference ref_id="980371" ref_url="https://bugzilla.suse.com/980371" source="BUGZILLA"/>
		<reference ref_id="980725" ref_url="https://bugzilla.suse.com/980725" source="BUGZILLA"/>
		<reference ref_id="981267" ref_url="https://bugzilla.suse.com/981267" source="BUGZILLA"/>
		<reference ref_id="981431" ref_url="https://bugzilla.suse.com/981431" source="BUGZILLA"/>
		<reference ref_id="983143" ref_url="https://bugzilla.suse.com/983143" source="BUGZILLA"/>
		<reference ref_id="983213" ref_url="https://bugzilla.suse.com/983213" source="BUGZILLA"/>
		<reference ref_id="983544" ref_url="https://bugzilla.suse.com/983544" source="BUGZILLA"/>
		<reference ref_id="984755" ref_url="https://bugzilla.suse.com/984755" source="BUGZILLA"/>
		<reference ref_id="986572" ref_url="https://bugzilla.suse.com/986572" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7833" ref_url="https://www.suse.com/security/cve/CVE-2015-7833/" source="CVE"/>
		<reference ref_id="CVE-2016-0758" ref_url="https://www.suse.com/security/cve/CVE-2016-0758/" source="CVE"/>
		<reference ref_id="CVE-2016-1583" ref_url="https://www.suse.com/security/cve/CVE-2016-1583/" source="CVE"/>
		<reference ref_id="CVE-2016-2053" ref_url="https://www.suse.com/security/cve/CVE-2016-2053/" source="CVE"/>
		<reference ref_id="CVE-2016-2187" ref_url="https://www.suse.com/security/cve/CVE-2016-2187/" source="CVE"/>
		<reference ref_id="CVE-2016-3134" ref_url="https://www.suse.com/security/cve/CVE-2016-3134/" source="CVE"/>
		<reference ref_id="CVE-2016-4470" ref_url="https://www.suse.com/security/cve/CVE-2016-4470/" source="CVE"/>
		<reference ref_id="CVE-2016-4482" ref_url="https://www.suse.com/security/cve/CVE-2016-4482/" source="CVE"/>
		<reference ref_id="CVE-2016-4485" ref_url="https://www.suse.com/security/cve/CVE-2016-4485/" source="CVE"/>
		<reference ref_id="CVE-2016-4486" ref_url="https://www.suse.com/security/cve/CVE-2016-4486/" source="CVE"/>
		<reference ref_id="CVE-2016-4565" ref_url="https://www.suse.com/security/cve/CVE-2016-4565/" source="CVE"/>
		<reference ref_id="CVE-2016-4569" ref_url="https://www.suse.com/security/cve/CVE-2016-4569/" source="CVE"/>
		<reference ref_id="CVE-2016-4578" ref_url="https://www.suse.com/security/cve/CVE-2016-4578/" source="CVE"/>
		<reference ref_id="CVE-2016-4580" ref_url="https://www.suse.com/security/cve/CVE-2016-4580/" source="CVE"/>
		<reference ref_id="CVE-2016-4805" ref_url="https://www.suse.com/security/cve/CVE-2016-4805/" source="CVE"/>
		<reference ref_id="CVE-2016-4913" ref_url="https://www.suse.com/security/cve/CVE-2016-4913/" source="CVE"/>
		<reference ref_id="CVE-2016-5244" ref_url="https://www.suse.com/security/cve/CVE-2016-5244/" source="CVE"/>
		<reference ref_id="CVE-2016-5829" ref_url="https://www.suse.com/security/cve/CVE-2016-5829/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP3 Teradata kernel was updated to fix bugs and
security issues.

The following security issues have been fixed:

- ALSA/timer: Fix leak in events via snd_timer_user_ccallback (bsc#979213, CVE-2016-4569).
- ALSA/timer: Fix leak in events via snd_timer_user_tinterrupt (bsc#979213, CVE-2016-4569).
- ALSA/timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS (bsc#979213, CVE-2016-4569).
- ASN.1: Fix non-match detection failure on data overrun (bsc#963762, CVE-2016-2053).
- ecryptfs: Don't allow mmap when the lower file system doesn't allow it (bsc#983143, CVE-2016-1583).
- get_rock_ridge_filename(): Handle malformed NM entries (bsc#980725, CVE-2016-4913).
- HID: hiddev: Validate num_values for HIDIOCGUSAGES, HIDIOCSUSAGES commands (bsc#986572, CVE-2016-5829).
- IB/security: Restrict use of the write() interface (bsc#979548, CVE-2016-4565).
- Input/gtco: Fix crash on detecting device without endpoints (bsc#971944, CVE-2016-2187).
- Input/gtco: Fix usb_dev leak (bsc#971944, CVE-2016-2187).
- Input/gtco: Use sign_extend32() for sign extension (bsc#971944, CVE-2016-2187).
- KEYS: Fix ASN.1 indefinite length object parsing (bsc#979867, CVE-2016-0758).
- KEYS: Potential uninitialized variable (bsc#984755, CVE-2016-4470).
- [media] usbvision: Fix crash on detecting device with invalid configuration (bsc#950998, CVE-2015-7833).
- netfilter/x_tables: Fix unconditional helper (bsc#971126, CVE-2016-3134).
- netfilter/x_tables: Make sure e-&gt;next_offset covers remaining blob size (bsc#971126, CVE-2016-3134).
- netfilter/x_tables: Validate e-&gt;target_offset early (bsc#971126, CVE-2016-3134).
- net: Fix a kernel infoleak in x25 module (bsc#981267, CVE-2016-4580).
- net: Fix infoleak in llc (bsc#978821, CVE-2016-4485).
- net: Fix infoleak in rtnetlink (bsc#978822, CVE-2016-4486).
- ppp: Take reference on channels netns (bsc#980371, CVE-2016-4805).
- rds: Fix an infoleak in rds_inc_info_copy (bsc#983213, CVE-2016-5244).
- USB/usbfs: Fix potential infoleak in devio (bsc#978401, CVE-2016-4482).

The following bugs have been fixed:

- hrtimer: Remove HRTIMER_STATE_MIGRATE (bsc#981431).
- ipv4/fib: Don't warn when primary address is missing if in_dev is dead (bsc#971360).
- kexec: Export PG_hwpoison flag into vmcoreinfo (bsc#983544).

Additionally, the following bug references have been added:

- Update tags in two patches for CVE-2016-4578, bsc#979879
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-08"/>
	<updated date="2016-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/950998">SUSE bug 950998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963762">SUSE bug 963762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971126">SUSE bug 971126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971360">SUSE bug 971360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971944">SUSE bug 971944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978401">SUSE bug 978401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978821">SUSE bug 978821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978822">SUSE bug 978822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979213">SUSE bug 979213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979548">SUSE bug 979548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979867">SUSE bug 979867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979879">SUSE bug 979879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980371">SUSE bug 980371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980725">SUSE bug 980725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981267">SUSE bug 981267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981431">SUSE bug 981431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983143">SUSE bug 983143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983213">SUSE bug 983213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983544">SUSE bug 983544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984755">SUSE bug 984755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986572">SUSE bug 986572</bugzilla>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-7833/">CVE-2015-7833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7833">CVE-2015-7833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0758/">CVE-2016-0758 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0758">CVE-2016-0758 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1583/">CVE-2016-1583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1583">CVE-2016-1583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2053/">CVE-2016-2053 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2053">CVE-2016-2053 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2187/">CVE-2016-2187 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2187">CVE-2016-2187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3134/">CVE-2016-3134 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3134">CVE-2016-3134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4470/">CVE-2016-4470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4470">CVE-2016-4470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4482/">CVE-2016-4482 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4482">CVE-2016-4482 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4485/">CVE-2016-4485 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4485">CVE-2016-4485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4486/">CVE-2016-4486 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4486">CVE-2016-4486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4565/">CVE-2016-4565 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4565">CVE-2016-4565 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4569/">CVE-2016-4569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4569">CVE-2016-4569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4578/">CVE-2016-4578 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4578">CVE-2016-4578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4580/">CVE-2016-4580 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4580">CVE-2016-4580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4805/">CVE-2016-4805 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4805">CVE-2016-4805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4913/">CVE-2016-4913 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4913">CVE-2016-4913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5244/">CVE-2016-5244 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5244">CVE-2016-5244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5829/">CVE-2016-5829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5829">CVE-2016-5829 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992938" comment="kernel-default-3.0.101-0.93.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992939" comment="kernel-default-base-3.0.101-0.93.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992941" comment="kernel-ec2-3.0.101-0.93.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992942" comment="kernel-ec2-base-3.0.101-0.93.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992944" comment="kernel-source-3.0.101-0.93.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992945" comment="kernel-syms-3.0.101-0.93.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992946" comment="kernel-trace-3.0.101-0.93.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992947" comment="kernel-trace-base-3.0.101-0.93.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992949" comment="kernel-xen-3.0.101-0.93.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992950" comment="kernel-xen-base-3.0.101-0.93.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218793" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="839104" ref_url="https://bugzilla.suse.com/839104" source="BUGZILLA"/>
		<reference ref_id="920110" ref_url="https://bugzilla.suse.com/920110" source="BUGZILLA"/>
		<reference ref_id="923775" ref_url="https://bugzilla.suse.com/923775" source="BUGZILLA"/>
		<reference ref_id="930770" ref_url="https://bugzilla.suse.com/930770" source="BUGZILLA"/>
		<reference ref_id="930821" ref_url="https://bugzilla.suse.com/930821" source="BUGZILLA"/>
		<reference ref_id="931130" ref_url="https://bugzilla.suse.com/931130" source="BUGZILLA"/>
		<reference ref_id="937256" ref_url="https://bugzilla.suse.com/937256" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="940946" ref_url="https://bugzilla.suse.com/940946" source="BUGZILLA"/>
		<reference ref_id="960689" ref_url="https://bugzilla.suse.com/960689" source="BUGZILLA"/>
		<reference ref_id="980371" ref_url="https://bugzilla.suse.com/980371" source="BUGZILLA"/>
		<reference ref_id="986337" ref_url="https://bugzilla.suse.com/986337" source="BUGZILLA"/>
		<reference ref_id="986362" ref_url="https://bugzilla.suse.com/986362" source="BUGZILLA"/>
		<reference ref_id="986365" ref_url="https://bugzilla.suse.com/986365" source="BUGZILLA"/>
		<reference ref_id="989152" ref_url="https://bugzilla.suse.com/989152" source="BUGZILLA"/>
		<reference ref_id="991608" ref_url="https://bugzilla.suse.com/991608" source="BUGZILLA"/>
		<reference ref_id="991665" ref_url="https://bugzilla.suse.com/991665" source="BUGZILLA"/>
		<reference ref_id="993890" ref_url="https://bugzilla.suse.com/993890" source="BUGZILLA"/>
		<reference ref_id="994296" ref_url="https://bugzilla.suse.com/994296" source="BUGZILLA"/>
		<reference ref_id="994618" ref_url="https://bugzilla.suse.com/994618" source="BUGZILLA"/>
		<reference ref_id="999932" ref_url="https://bugzilla.suse.com/999932" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4312" ref_url="https://www.suse.com/security/cve/CVE-2013-4312/" source="CVE"/>
		<reference ref_id="CVE-2015-7513" ref_url="https://www.suse.com/security/cve/CVE-2015-7513/" source="CVE"/>
		<reference ref_id="CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997/" source="CVE"/>
		<reference ref_id="CVE-2016-5696" ref_url="https://www.suse.com/security/cve/CVE-2016-5696/" source="CVE"/>
		<reference ref_id="CVE-2016-6480" ref_url="https://www.suse.com/security/cve/CVE-2016-6480/" source="CVE"/>
		<reference ref_id="CVE-2016-6828" ref_url="https://www.suse.com/security/cve/CVE-2016-6828/" source="CVE"/>
		<reference ref_id="CVE-2016-7425" ref_url="https://www.suse.com/security/cve/CVE-2016-7425/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP3 Teradata kernel was updated to fix bugs and
security issues.

The following security issues have been fixed:

- aacraid: Check size values after double-fetch from user (CVE-2016-6480 bsc#991608).
- aacraid: Prevent out-of-bounds access due to changing fip header sizes (bsc#991608, CVE-2016-6480).
- kabi: Revert xt_compat_match_from_user signature change (CVE-2016-4997 bsc#986362).
- kvm/x86: Reload pit counters for all channels when restoring state (bsc#960689 CVE-2015-7513).
- netfilter/arp_tables: Simplify translate_compat_table args (CVE-2016-4997 bsc#986362).
- netfilter/ip6_tables: Simplify translate_compat_table args (CVE-2016-4997 bsc#986362).
- netfilter/ip_tables: Simplify translate_compat_table args (CVE-2016-4997 bsc#986362).
- netfilter/x_tables: Add and use xt_check_entry_offsets (CVE-2016-4997 bsc#986362).
- netfilter/x_tables: Add compat version of xt_check_entry_offsets (CVE-2016-4997 bsc#986362).
- netfilter/x_tables: Assert minimum target size (CVE-2016-4997 bsc#986362).
- netfilter/x_tables: Check for bogus target offset (CVE-2016-4997 bsc#986362).
- netfilter/x_tables: Check standard target size too (CVE-2016-4997 bsc#986362).
- netfilter/x_tables: Do compat validation via translate_table (CVE-2016-4997 bsc#986362).
- netfilter/x_tables: Don't move to non-existent next rule (CVE-2016-4997 bsc#986362).
- netfilter/x_tables: Don't reject valid target size on some architectures (CVE-2016-4997 bsc#986362).
- netfilter/x_tables: Kill check_entry helper (CVE-2016-4997 bsc#986362).
- netfilter/x_tables: Speed up jump target validation (CVE-2016-4997 bsc#986362).
- netfilter/x_tables: Validate all offsets and sizes in a rule (CVE-2016-4997 bsc#986362).
- netfilter/x_tables: Validate targets of jumps (CVE-2016-4997 bsc#986362).
- netfilter/x_tables: xt_compat_match_from_user doesn't need a retval (CVE-2016-4997 bsc#986362).
- scsi/arcmsr: Buffer overflow in arcmsr_iop_message_xfer() (bsc#999932 CVE-2016-7425).
- tcp: Fix use after free in tcp_xmit_retransmit_queue() (CVE-2016-6828 bsc#994296).
- tcp: Make challenge acks less predictable (CVE-2016-5696 bsc#989152).
- unix: Properly account for FDs passed over unix sockets (bsc#839104, CVE-2013-4312).

Additionally the following non-security bugs have been fixed:

- Add blist flags (fate#317533).
- Add support for netvsc build without CONFIG_SYSFS flag (fate#317533).
- clockevents: Export clockevents_config_and_register for module use (fate#317533).
- Fix the VLAN_TAG_PRESENT in netvsc_recv_callback() (fate#317533).
- flow_dissector: Add support for IPPROTO_IPV6 (fate#317533).
- flow_dissector: Clean up IPIP case (fate#317533).
- flow_dissector: Factor out the ports extraction in skb_flow_get_ports (fate#317533).
- flow_dissector: Fail on evil iph-&gt;ihl (fate#317533).
- flow_dissector: Fix thoff for IPPROTO_AH (fate#317533).
- flow_dissector: Small optimizations in IPv4 dissect (fate#317533).
- flow_dissector: Use a 64bit load/store (fate#317533).
- flow_dissector: Use IPv6 flow label in flow_dissector (fate#317533).
- flow_keys: Include thoff into flow_keys for later usage (fate#317533).
- flow_keys: Record IP layer protocol in skb_flow_dissect() (fate#317533).
- flow_keys: Remove extern from function prototypes (fate#317533).
- hid/hyperv: Make sure input buffer is big enough (fate#317533).
- hid/hyperv: Match wait_for_completion_timeout return type (fate#317533).
- hid/hyperv: Register as a wakeup source (fate#317533).
- hv/balloon: Make pressure posting thread sleep interruptibly (fate#317533).
- hv/balloon: Ensure pressure reports are posted regularly (fate#317533).
- hv: Change variable type to bool (fate#317533).
- hv/channel: Match var type to return type of wait_for_completion (fate#317533).
- hv/channel_mgmt: Match var type to return type of wait_for_completion (fate#317533).
- hv: Check vmbus_device_create() return value in vmbus_process_offer() (fate#317533).
- hv: Don't do hypercalls when hypercall_page is NULL.
- hv: Eliminate the channel spinlock in the callback path (fate#317533).
- hv: fcopy_open() can be static (fate#317533).
- hv: Fix wrong check for synic_event_page (fate#317533).
- hv/balloon: Avoid memory leak on alloc_error of 2MB memory block.
- hv/balloon: Correctly handle num_pages&gt;INT_MAX case (fate#317533).
- hv/balloon: Correctly handle val.freeram&lt;num_pages case (fate#317533).
- hv/balloon: Do not online pages in offline blocks (fate#317533).
- hv/balloon: Don't lose memory when onlining order is not natural (fate#317533).
- hv/balloon: Don't post pressure status from interrupt context (fate#317533).
- hv/balloon: Eliminate jumps in piecewiese linear floor function (fate#317533).
- hv/balloon: Eliminate the trylock path in acquire/release_region_mutex (fate#317533).
- hv/balloon: Fix a locking bug in the balloon driver (fate#317533).
- hv/balloon: Keep locks balanced on add_memory() failure (fate#317533).
- hv/balloon: Make adjustments in computing the floor (fate#317533).
- hv/balloon: Match var type to return type of wait_for_completion (fate#317533).
- hv/balloon: Refuse to balloon below the floor (fate#317533).
- hv/balloon: Report offline pages as being used (fate#317533).
- hv/balloon: Survive ballooning request with num_pages=0 (fate#317533).
- hv/hv_fcopy: Drop the obsolete message on transfer failure (fate#317533).
- hv/hv_fcopy: Fix a race condition for SMP guest (fate#317533).
- hv/hv_util: Move vmbus_open() to a later place (fate#317533).
- hv/hypervvssd: Call endmntent before call setmntent again (fate#317533).
- hv: Implement the file copy service (fate#317533).
- hv/kvp: Move poll_channel() to hyperv_vmbus.h.
- hv/kvp,vss: Fast propagation of userspace communication failure.
- hv: Make 'monitor_pages' a 'real' pointer array (fate#317533).
- hv: Mark the function hv_synic_free_cpu() as static in hv.c (fate#317533).
- hv_netvsc: Cleanup the test for freeing skb when we use sendbuf mechanism (fate#317533).
- hv_netvsc: Convert to SKB paged frag API.
- hv_netvsc: Include net/flow_keys.h (fate#317533).
- hv_netvsc: Remove vmbus_are_subchannels_present() in rndis_filter_device_add() (fate#317533).
- hv: Remove the per-channel workqueue (fate#317533).
- hv: Remove unnecessary comparison of unsigned against 0 (fate#317533).
- hv: Rename sc_lock to the more generic lock (fate#317533).
- hv: Run non-blocking message handlers in the dispatch tasklet (fate#317533).
- hv_storvsc: Use small sg_tablesize on x86 (bsc#937256).
- hv: Use correct order when freeing monitor_pages (fate#317533).
- hv/util: Make struct hv_do_fcopy match Hyper-V host messages.
- hv/util: Move kvp/vss function declarations to hyperv_vmbus.h.
- hv/util: On device remove, close the channel after de-initializing the service (fate#317533).
- hv/util: Properly pack the data for file copy functionality.
- hv/vmbus: Add gradually increased delay for retries in vmbus_post_msg() (fate#317533).
- hv/vmbus: Add special crash handler (bsc#930770).
- hv/vmbus: Add special kexec handler.
- hv/vmbus: Add support for the NetworkDirect GUID (fate#317533).
- hv/vmbus: Add support for VMBus panic notifier handler (fate#317533).
- hv/vmbus: Avoid double kfree for device_obj (fate#317533).
- hv/vmbus: Avoid scheduling in interrupt context in vmbus_initiate_unload() (bsc#986337).
- hv/vmbus: Avoid wait_for_completion() on crash (bsc#986337).
- hv/vmbus: Cleanup hv_post_message() (fate#317533).
- hv/vmbus: Cleanup the packet send path (fate#317533).
- hv/vmbus: Cleanup vmbus_close_internal() (fate#317533).
- hv/vmbus: Cleanup vmbus_establish_gpadl() (fate#317533).
- hv/vmbus: Cleanup vmbus_post_msg() (fate#317533).
- hv/vmbus: Cleanup vmbus_teardown_gpadl() (fate#317533).
- hv/vmbus: Correcting truncation error for constant HV_CRASH_CTL_CRASH_NOTIFY (fate#317533).
- hv/vmbus: Don't loose HVMSG_TIMER_EXPIRED messages (bsc#986337).
- hv/vmbus: Don't send CHANNELMSG_UNLOAD on pre-Win2012R2 hosts (bsc#986337).
- hv/vmbus: Don't timeout during the initial connection with host (fate#317533).
- hv/vmbus: Don't wait after requesting offers (fate#317533).
- hv/vmbus: Enable interrupt driven flow control (fate#317533).
- hv/vmbus: Export the vmbus_sendpacket_pagebuffer_ctl() (fate#317533).
- hv/vmbus: Extract the mmio information from DSDT (fate#317533).
- hv/vmbus: Fix a bug in channel rescind code (fate#317533).
- hv/vmbus: Fix a bug in rescind processing in vmbus_close_internal() (fate#317533).
- hv/vmbus: Fix a bug in the error path in vmbus_open() (fate#317533).
- hv/vmbus: Fix a bug in vmbus_establish_gpadl() (fate#317533).
- hv/vmbus: Fix a bug in vmbus_open() (fate#317533).
- hv/vmbus: Fix a race condition when unregistering a device.
- hv/vmbus: Fix a signaling host signaling issue (fate#317533).
- hv/vmbus: Fix vmbus_recvpacket_raw() return code (fate#317533).
- hv/vmbus: Get rid of some unnecessary messages (fate#317533).
- hv/vmbus: Get rid of some unused definitions.
- hv/vmbus: Handle both rescind and offer messages in the same context (fate#317533).
- hv/vmbus: Handle various crash scenarios (bsc#986337).
- hv/vmbus: hv_process_timer_expiration() can be static (fate#317533).
- hv/vmbus: Implement a clockevent device (fate#317533).
- hv/vmbus: Implement per-CPU mapping of relid to channel (fate#317533).
- hv/vmbus: Implement the protocol for tearing down vmbus state.
- hv/vmbus: Increase the limit on the number of pfns we can handle (fate#317533).
- hv/vmbus: Introduce a function to remove a rescinded offer (fate#317533).
- hv/vmbus: Kill tasklets on module unload.
- hv/vmbus: Missing curly braces in vmbus_process_offer() (fate#317533).
- hv/vmbus: Negotiate version 3.0 when running on ws2012r2 hosts (fate#317533).
- hv/vmbus_open(): Reset the channel state on ENOMEM (fate#317533).
- hv/vmbus: Perform device register in the per-channel work element (fate#317533).
- hv/vmbus_post_msg: Retry the hypercall on some transient errors (fate#317533).
- hv/vmbus: Prefer 'die' notification chain to 'panic'.
- hv/vmbus: Prevent cpu offlining on newer hypervisors (fate#317533).
- hv/vmbus: Properly handle child device remove (fate#317533).
- hv/vmbus: Properly protect calls to smp_processor_id() (fate#317533).
- hv/vmbus: Remove code duplication in message handling (bsc#986337).
- hv/vmbus: Remove hv_synic_free_cpu() call from hv_synic_cleanup().
- hv/vmbus: Remove the channel from the channel list(s) on failure (fate#317533).
- hv/vmbus: Rename channel work queues (fate#317533).
- hv/vmbus: Serialize Offer and Rescind offer (fate#317533).
- hv/vmbus: Specify the target CPU that should receive notification (fate#317533).
- hv/vmbus: Support an API to send packet with additional
- hv/vmbus: Support an API to send pagebuffers with additional control (fate#317533).
- hv/vmbus: Support a vmbus API for efficiently sending page arrays (fate#317533).
- hv/vmbus: Support per-channel driver state (fate#317533).
- hv/vmbus: Teardown clockevent devices on module unload (fate#317533).
- hv/vmbus: Teardown hv_vmbus_con workqueue and vmbus_connection pages on shutdown (fate#317533).
- hv/vmbus: Teardown synthetic interrupt controllers on module unload (fate#317533).
- hv/vmbus: Unregister panic notifier on module unload.
- hv/vmbus: Use a round-robin algorithm for picking the outgoing channel (fate#317533).
- hv/vmbus: Use get_cpu() to get the current CPU (fate#317533).
- hv/vss: Introduce timeout for communication with userspace.
- hv/vss: Run only on supported host versions (bsc#986337).
- hyperv: Add handler for RNDIS_STATUS_NETWORK_CHANGE event (fate#317533).
- hyperv: Add handling of IP header with option field in netvsc_set_hash() (fate#317533).
- hyperv: Add hash value into RNDIS Per-packet info (fate#317533).
- hyperv: Add IPv6 into the hash computation for vRSS (fate#317533).
- hyperv: Add latest NetVSP versions to auto negotiation (fate#317533).
- hyperv: Add netpoll support (fate#317533).
- hyperv: Add processing of MTU reduced by the host.
- hyperv: Add support for physically discontinuous receive buffer (fate#317533).
- hyperv: Add support for virtual Receive Side Scaling (vRSS) (fate#317533).
- hyperv: Add support for vNIC hot removal.
- hyperv: Adjust the size of sendbuf region to support ws2008r2 (fate#317533).
- hyperv: Change the receive buffer size for legacy hosts (fate#317533).
- hyperv: Enable sendbuf mechanism on the send path (fate#317533).
- hyperv-fb: Add blanking support (fate#317533).
- hyperv-fb: Add pci stub (fate#317533).
- hyperv-fb: Add support for generation 2 virtual machines (fate#317533).
- hyperv-fb: Kick off efifb early (fate#317533).
- hyperv: Fix a bug in netvsc_send() (fate#317533).
- hyperv: Fix a bug in netvsc_start_xmit() (fate#317533).
- hyperv: Fix apparent cut-n-paste error in send path teardown (fate#317533).
- hyperv: Fix error return code in netvsc_init_buf() (fate#317533).
- hyperv: Fix race between probe and open calls (fate#317533).
- hyperv: Fix some variable name typos in send-buffer init/revoke (fate#317533).
- hyperv: Fix sparse warnings (fate#317533).
- hyperv: Fix the carrier status setting (fate#317533).
- hyperv: Fix the error processing in netvsc_send() (fate#317533).
- hyperv: Fix the total_data_buflen in send path (fate#317533).
- hyperv: Fix vlan_proto setting in netvsc_recv_callback() (fate#317533).
- hyperv/hyperv_fb: Match wait_for_completion_timeout return type (fate#317533).
- hyperv: Implement netvsc_get_channels() ethtool op (fate#317533).
- hyperv: Increase the buffer length for netvsc_channel_cb() (fate#317533).
- hyper-v: Make uuid_le const (fate#317533).
- hyperv: Match wait_for_completion_timeout return type (fate#317533).
- hyperv: Move state setting for link query (fate#317533).
- hyperv: Negotiate version with the host without waiting for the daemon (bsc#930821).
- hyperv/netvsc: Match wait_for_completion_timeout return type (fate#317533).
- hyperv: NULL dereference on error (fate#317533).
- hyperv: Properly handle checksum offload (fate#317533).
- hyperv: Remove meaningless pr_err() in vmbus_recvpacket_raw() (fate#317533).
- hyperv: Remove recv_pkt_list and lock (fate#317533).
- hyperv: Simplify the send_completion variables (fate#317533).
- input: Add a driver to support Hyper-V synthetic keyboard (fate#317533).
- input/hyperv-keyboard: Pass through 0xE1 prefix (fate#317533).
- input/hyperv-keyboard: Register as a wakeup source (fate#317533).
- ip: Introduce ip_is_fragment helper inline function (fate#317533).
- ipv6: Add ip6_flowlabel helper (fate#317533).
- ipv6: Add ipv6_addr_hash() helper (fate#317533).
- ipv6: Optimize ipv6 addresses compares (fate#317533).
- kabi: Imported SLE11-SP4 HyperV code has changed kABI in several places. Regenerate it. (bsc#986337)
- kabi/unix: Properly account for FDs passed over unix sockets (bsc#839104).
- kaweth: Fix firmware download (bsc#993890).
- kaweth: Fix oops upon failed memory allocation (bsc#993890).
- kdump: Fix crash_kexec()/smp_send_stop() race in panic() (bsc#937444).
- kexec: Fix race between panic() and crash_kexec() called directly (bsc#937444).
- kvm/x86: SYSENTER emulation is broken (bsc#994618).
- mshyperv: Fix recognition of Hyper-V guest crash MSR's (bsc#986337).
- net: Add function to set the rxhash (fate#317533).
- net: Add skb frag size accessors.
- net: Add skb_get_hash_raw (fate#317533).
- net: Add utility functions to clear rxhash (fate#317533).
- net/hyperv: Address UDP checksum issues (fate#317533).
- net/hyperv: Allocate memory for all possible per-packet information (fate#317533).
- net/hyperv: Cleanup the netvsc receive callback function (fate#317533).
- net/hyperv: Cleanup the receive path (fate#317533).
- net/hyperv: Cleanup the send path (fate#317533).
- net/hyperv: Deletion of an unnecessary check before the function call 'vfree'.
- net/hyperv: Enable large send offload (fate#317533).
- net/hyperv: Enable offloads on the host (fate#317533).
- net/hyperv: Enable receive side IP checksum offload (fate#317533).
- net/hyperv: Enable scatter gather I/O (fate#317533).
- net/hyperv: Enable send side checksum offload (fate#317533).
- net/hyperv: Get rid of the rndis_filter_packet structure (fate#317533).
- net/hyperv: Increase the size of the sendbuf region (fate#317533).
- net/hyperv: Negotiate suitable ndis version for offload support (fate#317533).
- net/hyperv: Remove unnecessary null test before kfree (fate#317533).
- net: Introduce skb_flow_dissect() (fate#317533).
- net: Reset mac header in dev_start_xmit().
- netvsc: Don't flush peers notifying work during setting mtu (fate#317533).
- panic/x86: Allow cpus to save registers even if they (bsc#940946).
- panic/x86: Fix re-entrance problem due to panic on (bsc#937444).
- pci: Disable Bus Master only on kexec reboot (bsc#920110).
- pci: Disable Bus Master on PCI device shutdown (bsc#920110).
- pci: Disable Bus Master unconditionally in pci_device_shutdown() (bsc#920110).
- pci: Don't try to disable Bus Master on disconnected PCI devices (bsc#920110).
- ppp: Defer netns reference release for ppp channel (bsc#980371).
- random32: Add prandom_u32_max (bsc#989152).
- rps: Add flag to skb to indicate rxhash is based on L4 tuple (fate#317533).
- sched: Replace INIT_COMPLETION with reinit_completion (fate#317533).
- scsi: Add a blacklist flag which enables VPD page inquiries (fate#317533).
- scsi/scan: Restrict sequential scan to 256 LUNs (fate#317533).
- scsi/storvsc: Always send on the selected outgoing channel (fate#317533).
- scsi/storvsc: Change the limits to reflect the values on the host (fate#317533).
- scsi/storvsc: Correctly handle TEST_UNIT_READY failure (fate#317533).
- scsi/storvsc: Don't assume that the scatterlist is not chained (fate#317533 bsc#923775).
- scsi/storvsc: Filter commands based on the storage protocol version (fate#317533).
- scsi/storvsc: Fix a bug in copy_from_bounce_buffer() (fate#317533 bsc#923775).
- scsi/storvsc: Fix a bug in handling VMBUS protocol version (fate#317533).
- scsi/storvsc: Implement a eh_timed_out handler (fate#317533).
- scsi/storvsc: Increase the ring buffer size (fate#317533).
- scsi/storvsc: Retrieve information about the capability of the target (fate#317533).
- scsi/storvsc: Set cmd_per_lun to reflect value supported by the Host (fate#317533).
- scsi/storvsc: Set srb_flags in all cases (fate#317533).
- scsi/storvsc: Set the tablesize based on the information given by the host (fate#317533 bsc#923775).
- scsi/storvsc: Size the queue depth based on the ringbuffer size (fate#317533).
- storvsc: Fix a bug in storvsc limits (fate#317533).
- storvsc: Force discovery of LUNs that may have been removed (fate#317533).
- storvsc: Force SPC-3 compliance on win8 and win8 r2 hosts (fate#317533).
- storvsc: Get rid of overly verbose warning messages (fate#317533).
- storvsc: In response to a scan event, scan the host (fate#317533).
- storvsc: Set the SRB flags correctly when no data transfer is needed (bsc#931130).
- tools/hv: Address compiler warnings for hv_fcopy_daemon.c (fate#317533).
- tools/hv: Address compiler warnings for hv_kvp_daemon.c (fate#317533).
- tools/hv: Cache FQDN in kvp_daemon to avoid timeouts (fate#317533).
- tools/hv: Do not add redundant '/' in hv_start_fcopy() (fate#317533).
- tools/hv: Fix file overwriting of hv_fcopy_daemon (fate#317533).
- tools/hv: Handle the case when the target file exists correctly (fate#317533).
- tools/hv: Ignore ENOBUFS and ENOMEM in the KVP daemon.
- tools/hv: Introduce -n/--no-daemon option.
- tools/hv/kvp_daemon: Make IPv6-only-injection work (fate#317533).
- tools/hv: Remove inclusion of linux/types.h (fate#317533).
- tools/hv: Remove unused bytes_written from kvp_update_file() (fate#317533).
- tools/hv: Use single send+recv buffer (fate#317533).
- tools/hv/vssdaemon: Ignore the EBUSY on multiple freezing the same partition.
- tools/hv/vssdaemon: Ignore VFAT mounts during the Freeze operation (fate#317533).
- usb: Fix typo in wMaxPacketSize validation (bsc#991665).
- usb: Validate wMaxPacketValue entries in endpoint descriptors (bsc#991665).
- video/hyperv: Refresh the VM screen by force on VM panic (fate#317533).
- vmbus: Add missing breaks (fate#317533).
- vmbus: Use resource for hyperv mmio region (fate#317533).
- Workaround for disks that report bad optimal transfer length (fate#317533).
- x86/apic: Allow use of lapic timer early calibration result (fate#317533).
- x86/hyperv: Bypass the timer_irq_works() check (fate#317533).
- x86/hyperv: Correctly guard the local APIC calibration code (fate#317533).
- x86/hyperv: Fix build error due to missing &lt;asm/apic.h&gt; include (fate#317533).
- x86/hyperv: Get the local APIC timer frequency from the hypervisor (fate#317533).
- x86/hyperv: Mark the Hyper-V clocksource as being continuous (fate#317533).
- x86/hyperv: Move a variable to avoid an unused variable warning (fate#317533).
- x86/irq, pic: Probe for legacy PIC and set legacy_pic appropriately (fate#317533).
- x86/mm: Create slow_virt_to_phys() (fate#317533).
- x86/mm: Pagetable level size/shift/mask helpers (fate#317533).
- x86/pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (fate#317533, bsc#937256).
- xen/panic/x86: Allow cpus to save registers even if they (bsc#940946).
- xen/panic/x86: Fix re-entrance problem due to panic on (bsc#937444).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-30"/>
	<updated date="2016-09-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/839104">SUSE bug 839104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920110">SUSE bug 920110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923775">SUSE bug 923775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930770">SUSE bug 930770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930821">SUSE bug 930821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931130">SUSE bug 931130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937256">SUSE bug 937256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940946">SUSE bug 940946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960689">SUSE bug 960689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980371">SUSE bug 980371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986337">SUSE bug 986337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986365">SUSE bug 986365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989152">SUSE bug 989152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991608">SUSE bug 991608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991665">SUSE bug 991665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993890">SUSE bug 993890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994296">SUSE bug 994296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994618">SUSE bug 994618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999932">SUSE bug 999932</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4312/">CVE-2013-4312 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4312">CVE-2013-4312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7513/">CVE-2015-7513 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7513">CVE-2015-7513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4997">CVE-2016-4997 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5696/">CVE-2016-5696 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5696">CVE-2016-5696 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6480/">CVE-2016-6480 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6480">CVE-2016-6480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6828/">CVE-2016-6828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6828">CVE-2016-6828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7425/">CVE-2016-7425 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7425">CVE-2016-7425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992952" comment="kernel-default-3.0.101-0.96.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992953" comment="kernel-default-base-3.0.101-0.96.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992955" comment="kernel-ec2-3.0.101-0.96.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992956" comment="kernel-ec2-base-3.0.101-0.96.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992958" comment="kernel-source-3.0.101-0.96.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992959" comment="kernel-syms-3.0.101-0.96.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992960" comment="kernel-trace-3.0.101-0.96.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992961" comment="kernel-trace-base-3.0.101-0.96.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992963" comment="kernel-xen-3.0.101-0.96.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992964" comment="kernel-xen-base-3.0.101-0.96.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218794" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1004418" ref_url="https://bugzilla.suse.com/1004418" source="BUGZILLA"/>
		<reference ref_id="1005199" ref_url="https://bugzilla.suse.com/1005199" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5195" ref_url="https://www.suse.com/security/cve/CVE-2016-5195/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP3 Teradata kernel was updated to fix one security issue.

This kernel reverts the changes introduced by the last kernel update (bsc#1005199).

This security bug was fixed:

- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-20"/>
	<updated date="2016-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1004418">SUSE bug 1004418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005199">SUSE bug 1005199</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5195/">CVE-2016-5195 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5195">CVE-2016-5195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992966" comment="kernel-default-3.0.101-0.101.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992967" comment="kernel-default-base-3.0.101-0.101.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992969" comment="kernel-ec2-3.0.101-0.101.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992970" comment="kernel-ec2-base-3.0.101-0.101.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992972" comment="kernel-source-3.0.101-0.101.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992973" comment="kernel-syms-3.0.101-0.101.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992974" comment="kernel-trace-3.0.101-0.101.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992975" comment="kernel-trace-base-3.0.101-0.101.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992977" comment="kernel-xen-3.0.101-0.101.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992978" comment="kernel-xen-base-3.0.101-0.101.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218795" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1003077" ref_url="https://bugzilla.suse.com/1003077" source="BUGZILLA"/>
		<reference ref_id="1003925" ref_url="https://bugzilla.suse.com/1003925" source="BUGZILLA"/>
		<reference ref_id="1005857" ref_url="https://bugzilla.suse.com/1005857" source="BUGZILLA"/>
		<reference ref_id="839104" ref_url="https://bugzilla.suse.com/839104" source="BUGZILLA"/>
		<reference ref_id="920110" ref_url="https://bugzilla.suse.com/920110" source="BUGZILLA"/>
		<reference ref_id="923775" ref_url="https://bugzilla.suse.com/923775" source="BUGZILLA"/>
		<reference ref_id="930770" ref_url="https://bugzilla.suse.com/930770" source="BUGZILLA"/>
		<reference ref_id="930821" ref_url="https://bugzilla.suse.com/930821" source="BUGZILLA"/>
		<reference ref_id="931130" ref_url="https://bugzilla.suse.com/931130" source="BUGZILLA"/>
		<reference ref_id="937256" ref_url="https://bugzilla.suse.com/937256" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="940946" ref_url="https://bugzilla.suse.com/940946" source="BUGZILLA"/>
		<reference ref_id="960689" ref_url="https://bugzilla.suse.com/960689" source="BUGZILLA"/>
		<reference ref_id="967716" ref_url="https://bugzilla.suse.com/967716" source="BUGZILLA"/>
		<reference ref_id="980371" ref_url="https://bugzilla.suse.com/980371" source="BUGZILLA"/>
		<reference ref_id="986337" ref_url="https://bugzilla.suse.com/986337" source="BUGZILLA"/>
		<reference ref_id="986362" ref_url="https://bugzilla.suse.com/986362" source="BUGZILLA"/>
		<reference ref_id="986365" ref_url="https://bugzilla.suse.com/986365" source="BUGZILLA"/>
		<reference ref_id="989152" ref_url="https://bugzilla.suse.com/989152" source="BUGZILLA"/>
		<reference ref_id="991608" ref_url="https://bugzilla.suse.com/991608" source="BUGZILLA"/>
		<reference ref_id="991665" ref_url="https://bugzilla.suse.com/991665" source="BUGZILLA"/>
		<reference ref_id="993890" ref_url="https://bugzilla.suse.com/993890" source="BUGZILLA"/>
		<reference ref_id="993891" ref_url="https://bugzilla.suse.com/993891" source="BUGZILLA"/>
		<reference ref_id="994296" ref_url="https://bugzilla.suse.com/994296" source="BUGZILLA"/>
		<reference ref_id="994618" ref_url="https://bugzilla.suse.com/994618" source="BUGZILLA"/>
		<reference ref_id="994759" ref_url="https://bugzilla.suse.com/994759" source="BUGZILLA"/>
		<reference ref_id="999932" ref_url="https://bugzilla.suse.com/999932" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4312" ref_url="https://www.suse.com/security/cve/CVE-2013-4312/" source="CVE"/>
		<reference ref_id="CVE-2015-0239" ref_url="https://www.suse.com/security/cve/CVE-2015-0239/" source="CVE"/>
		<reference ref_id="CVE-2015-7513" ref_url="https://www.suse.com/security/cve/CVE-2015-7513/" source="CVE"/>
		<reference ref_id="CVE-2015-8956" ref_url="https://www.suse.com/security/cve/CVE-2015-8956/" source="CVE"/>
		<reference ref_id="CVE-2016-0823" ref_url="https://www.suse.com/security/cve/CVE-2016-0823/" source="CVE"/>
		<reference ref_id="CVE-2016-4805" ref_url="https://www.suse.com/security/cve/CVE-2016-4805/" source="CVE"/>
		<reference ref_id="CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997/" source="CVE"/>
		<reference ref_id="CVE-2016-5696" ref_url="https://www.suse.com/security/cve/CVE-2016-5696/" source="CVE"/>
		<reference ref_id="CVE-2016-6480" ref_url="https://www.suse.com/security/cve/CVE-2016-6480/" source="CVE"/>
		<reference ref_id="CVE-2016-6828" ref_url="https://www.suse.com/security/cve/CVE-2016-6828/" source="CVE"/>
		<reference ref_id="CVE-2016-7117" ref_url="https://www.suse.com/security/cve/CVE-2016-7117/" source="CVE"/>
		<reference ref_id="CVE-2016-7425" ref_url="https://www.suse.com/security/cve/CVE-2016-7425/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP3 Teradata kernel was updated to fix bugs and
security issues.

The following security issues have been fixed:

- aacraid: Check size values after double-fetch from user (CVE-2016-6480 bsc#991608).
- aacraid: Prevent out-of-bounds access due to changing fip header sizes (bsc#991608, CVE-2016-6480).
- bluetooth: Fix potential NULL dereference in RFCOMM bind callback (bsc#1003925, CVE-2015-8956).
- cdc-acm: Added sanity checking for probe() (bsc#993891).
- kabi: Revert xt_compat_match_from_user signature change (CVE-2016-4997 bsc#986362).
- kaweth: Fix firmware download (bsc#993890).
- kaweth: Fix oops upon failed memory allocation (bsc#993890).
- kvm/x86: Fix SYSENTER emulation (bsc#994618 CVE-2015-0239).
- kvm/x86: Reload pit counters for all channels when restoring state (bsc#960689 CVE-2015-7513).
- netfilter/arp_tables: Simplify translate_compat_table args (CVE-2016-4997 bsc#986362).
- netfilter/ip6_tables: Simplify translate_compat_table args (CVE-2016-4997 bsc#986362).
- netfilter/ip_tables: Simplify translate_compat_table args (CVE-2016-4997 bsc#986362).
- netfilter/x_tables: Add and use xt_check_entry_offsets (CVE-2016-4997 bsc#986362).
- netfilter/x_tables: Add compat version of xt_check_entry_offsets (CVE-2016-4997 bsc#986362).
- netfilter/x_tables: Assert minimum target size (CVE-2016-4997 bsc#986362).
- netfilter/x_tables: Check for bogus target offset (CVE-2016-4997 bsc#986362).
- netfilter/x_tables: Check standard target size too (CVE-2016-4997 bsc#986362).
- netfilter/x_tables: Do compat validation via translate_table (CVE-2016-4997 bsc#986362).
- netfilter/x_tables: Don't move to non-existent next rule (CVE-2016-4997 bsc#986362).
- netfilter/x_tables: Don't reject valid target size on some architectures (CVE-2016-4997 bsc#986362).
- netfilter/x_tables: Kill check_entry helper (CVE-2016-4997 bsc#986362).
- netfilter/x_tables: Speed up jump target validation (CVE-2016-4997 bsc#986362).
- netfilter/x_tables: Validate all offsets and sizes in a rule (CVE-2016-4997 bsc#986362).
- netfilter/x_tables: Validate targets of jumps (CVE-2016-4997 bsc#986362).
- netfilter/x_tables: xt_compat_match_from_user doesn't need a retval (CVE-2016-4997 bsc#986362).
- net: Fix use after free in the recvmmsg exit path (CVE-2016-7117 bsc#1003077).
- pagemap: Do not leak physical addresses to non-privileged userspace (bsc#994759 CVE-2016-0823).
- ppp: defer netns reference release for ppp channel (bsc#980371 CVE-2016-4805).
- scsi/arcmsr: Buffer overflow in arcmsr_iop_message_xfer() (bsc#999932 CVE-2016-7425).
- tcp: Fix use after free in tcp_xmit_retransmit_queue() (CVE-2016-6828 bsc#994296).
- tcp: Make challenge acks less predictable (CVE-2016-5696 bsc#989152).
- unix: Properly account for FDs passed over unix sockets (bsc#839104, CVE-2013-4312).
- usb: Fix typo in wMaxPacketSize validation (bsc#991665).
- usb: Validate wMaxPacketValue entries in endpoint descriptors (bsc#991665).

Additionally the following non-security bugs have been fixed:

- Backport HyperV drivers from 11-SP4 (fate#317533, bsc#986337).
- kdump: Fix crash_kexec()/smp_send_stop() race in panic() (bsc#937444).
- kexec: Fix race between panic() and crash_kexec() called directly (bsc#937444).
- mm: Fix sleeping function warning from __put_anon_vma (bsc#1005857).
- panic/x86: Allow cpus to save registers even if they (bsc#940946).
- panic/x86: Fix re-entrance problem due to panic on (bsc#937444).
- pci: Disable Bus Master only on kexec reboot (bsc#920110).
- pci: Disable Bus Master on PCI device shutdown (bsc#920110).
- pci: Disable Bus Master unconditionally in pci_device_shutdown() (bsc#920110).
- pci: Don't try to disable Bus Master on disconnected PCI devices (bsc#920110).
- xen/panic/x86: Allow cpus to save registers even if they (bsc#940946).
- xen/panic/x86: Fix re-entrance problem due to panic on (bsc#937444).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-31"/>
	<updated date="2016-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1003077">SUSE bug 1003077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003925">SUSE bug 1003925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005857">SUSE bug 1005857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839104">SUSE bug 839104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920110">SUSE bug 920110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923775">SUSE bug 923775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930770">SUSE bug 930770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930821">SUSE bug 930821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931130">SUSE bug 931130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937256">SUSE bug 937256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940946">SUSE bug 940946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960689">SUSE bug 960689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967716">SUSE bug 967716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980371">SUSE bug 980371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986337">SUSE bug 986337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986365">SUSE bug 986365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989152">SUSE bug 989152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991608">SUSE bug 991608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991665">SUSE bug 991665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993890">SUSE bug 993890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993891">SUSE bug 993891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994296">SUSE bug 994296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994618">SUSE bug 994618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994759">SUSE bug 994759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999932">SUSE bug 999932</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4312/">CVE-2013-4312 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4312">CVE-2013-4312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0239/">CVE-2015-0239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0239">CVE-2015-0239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7513/">CVE-2015-7513 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7513">CVE-2015-7513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8956/">CVE-2015-8956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8956">CVE-2015-8956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0823/">CVE-2016-0823 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0823">CVE-2016-0823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4805/">CVE-2016-4805 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4805">CVE-2016-4805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4997">CVE-2016-4997 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5696/">CVE-2016-5696 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5696">CVE-2016-5696 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6480/">CVE-2016-6480 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6480">CVE-2016-6480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6828/">CVE-2016-6828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6828">CVE-2016-6828 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7117/">CVE-2016-7117 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7117">CVE-2016-7117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7425/">CVE-2016-7425 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7425">CVE-2016-7425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992980" comment="kernel-default-3.0.101-0.104.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992981" comment="kernel-default-base-3.0.101-0.104.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992983" comment="kernel-ec2-3.0.101-0.104.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992984" comment="kernel-ec2-base-3.0.101-0.104.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992986" comment="kernel-source-3.0.101-0.104.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992987" comment="kernel-syms-3.0.101-0.104.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992988" comment="kernel-trace-3.0.101-0.104.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992989" comment="kernel-trace-base-3.0.101-0.104.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992991" comment="kernel-xen-3.0.101-0.104.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992992" comment="kernel-xen-base-3.0.101-0.104.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218796" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1004517" ref_url="https://bugzilla.suse.com/1004517" source="BUGZILLA"/>
		<reference ref_id="919482" ref_url="https://bugzilla.suse.com/919482" source="BUGZILLA"/>
		<reference ref_id="997801" ref_url="https://bugzilla.suse.com/997801" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7042" ref_url="https://www.suse.com/security/cve/CVE-2016-7042/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP3 Teradata kernel was updated to fix bugs and
security issues.

The following security issue has been fixed:

- KEYS: Fix short sprintf buffer in /proc/keys show function (bsc#1004517, CVE-2016-7042).

Additionally the following non-security bugs have been fixed:

- net: sched: Shrink struct qdisc_skb_cb to 28 bytes (bsc#919482).
- IB/iser: Replace connection waitqueue with completion object (bsc#997801).
- IB/iser: Protect iser state machine with a mutex (bsc#997801).
- IB/iser: Simplify connection management (bsc#997801).
- IB/iser: Fix device removal flow (bsc#997801).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-08"/>
	<updated date="2016-11-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1004517">SUSE bug 1004517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919482">SUSE bug 919482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997801">SUSE bug 997801</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7042/">CVE-2016-7042 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7042">CVE-2016-7042 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992994" comment="kernel-default-3.0.101-0.107.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992995" comment="kernel-default-base-3.0.101-0.107.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992997" comment="kernel-ec2-3.0.101-0.107.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992998" comment="kernel-ec2-base-3.0.101-0.107.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993000" comment="kernel-source-3.0.101-0.107.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993001" comment="kernel-syms-3.0.101-0.107.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993002" comment="kernel-trace-3.0.101-0.107.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993003" comment="kernel-trace-base-3.0.101-0.107.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993005" comment="kernel-xen-3.0.101-0.107.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993006" comment="kernel-xen-base-3.0.101-0.107.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218797" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1008645" ref_url="https://bugzilla.suse.com/1008645" source="BUGZILLA"/>
		<reference ref_id="1008833" ref_url="https://bugzilla.suse.com/1008833" source="BUGZILLA"/>
		<reference ref_id="1010150" ref_url="https://bugzilla.suse.com/1010150" source="BUGZILLA"/>
		<reference ref_id="1010208" ref_url="https://bugzilla.suse.com/1010208" source="BUGZILLA"/>
		<reference ref_id="1010501" ref_url="https://bugzilla.suse.com/1010501" source="BUGZILLA"/>
		<reference ref_id="1010507" ref_url="https://bugzilla.suse.com/1010507" source="BUGZILLA"/>
		<reference ref_id="1010711" ref_url="https://bugzilla.suse.com/1010711" source="BUGZILLA"/>
		<reference ref_id="1010716" ref_url="https://bugzilla.suse.com/1010716" source="BUGZILLA"/>
		<reference ref_id="1011685" ref_url="https://bugzilla.suse.com/1011685" source="BUGZILLA"/>
		<reference ref_id="1012471" ref_url="https://bugzilla.suse.com/1012471" source="BUGZILLA"/>
		<reference ref_id="1012832" ref_url="https://bugzilla.suse.com/1012832" source="BUGZILLA"/>
		<reference ref_id="1013533" ref_url="https://bugzilla.suse.com/1013533" source="BUGZILLA"/>
		<reference ref_id="1013604" ref_url="https://bugzilla.suse.com/1013604" source="BUGZILLA"/>
		<reference ref_id="914939" ref_url="https://bugzilla.suse.com/914939" source="BUGZILLA"/>
		<reference ref_id="992566" ref_url="https://bugzilla.suse.com/992566" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1350" ref_url="https://www.suse.com/security/cve/CVE-2015-1350/" source="CVE"/>
		<reference ref_id="CVE-2015-8962" ref_url="https://www.suse.com/security/cve/CVE-2015-8962/" source="CVE"/>
		<reference ref_id="CVE-2015-8964" ref_url="https://www.suse.com/security/cve/CVE-2015-8964/" source="CVE"/>
		<reference ref_id="CVE-2016-3841" ref_url="https://www.suse.com/security/cve/CVE-2016-3841/" source="CVE"/>
		<reference ref_id="CVE-2016-7910" ref_url="https://www.suse.com/security/cve/CVE-2016-7910/" source="CVE"/>
		<reference ref_id="CVE-2016-7911" ref_url="https://www.suse.com/security/cve/CVE-2016-7911/" source="CVE"/>
		<reference ref_id="CVE-2016-8633" ref_url="https://www.suse.com/security/cve/CVE-2016-8633/" source="CVE"/>
		<reference ref_id="CVE-2016-8646" ref_url="https://www.suse.com/security/cve/CVE-2016-8646/" source="CVE"/>
		<reference ref_id="CVE-2016-9555" ref_url="https://www.suse.com/security/cve/CVE-2016-9555/" source="CVE"/>
		<reference ref_id="CVE-2016-9576" ref_url="https://www.suse.com/security/cve/CVE-2016-9576/" source="CVE"/>
		<reference ref_id="CVE-2016-9685" ref_url="https://www.suse.com/security/cve/CVE-2016-9685/" source="CVE"/>
		<reference ref_id="CVE-2016-9794" ref_url="https://www.suse.com/security/cve/CVE-2016-9794/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP3 Teradata kernel was updated to fix the following
issues:

- alsa/pcm: Call kill_fasync() in stream lock (CVE-2016-9794 bsc#1013533).
- block: Fix use-after-free in seq file (CVE-2016-7910 bsc#1010716).
- block: Fix use-after-free in sys_ioprio_get() (CVE-2016-7911 bsc#1010711).
- crypto/algif_hash: Only export and import on sockets with data (CVE-2016-8646,bsc#1010150).
- firewire/net: Guard against rx buffer overflows (bsc#1008833, CVE-2016-8633).
- fs: Avoid premature clearing of capabilities (bsc#914939 CVE-2015-1350).
- fs: Give dentry to inode_change_ok() instead of inode (bsc#914939 CVE-2015-1350).
- hv: Avoid vfree() on crash (bsc#1012471).
- hv_storvsc: Set sg_tablesize to BIO_MAX_PAGES (bsc#1010208).
- ipv6: Add complete rcu protection around np-&gt;opt (bsc#992566, CVE-2016-3841).
- ipv6/sctp: Clone options to avoid use after free (bsc#992566, CVE-2016-3841).
- ipv6/tcp: Add rcu locking in tcp_v6_send_synack() (bsc#992566, CVE-2016-3841).
- mremap: Enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (bsc#1008645).
- sctp: Validate chunk len before actually using it (CVE-2016-9555 bsc#1011685).
- sg: Fix double-free when drives detach during SG_IO (CVE-2015-8962 bsc#1010501).
- splice: Introduce FMODE_SPLICE_READ and FMODE_SPLICE_WRITE (CVE-2016-9576, bsc#1013604).
- tty: Prevent ldisc drivers from re-using stale tty fields (bsc#1010507 CVE-2015-8964).
- xfs: Fix two memory leaks in xfs_attr_list.c error paths (bsc#1012832, CVE-2016-9685).
- xfs: Propagate dentry down to inode_change_ok() (bsc#914939 CVE-2015-1350).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-14"/>
	<updated date="2016-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1008645">SUSE bug 1008645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008833">SUSE bug 1008833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010150">SUSE bug 1010150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010208">SUSE bug 1010208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010501">SUSE bug 1010501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010507">SUSE bug 1010507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010711">SUSE bug 1010711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010716">SUSE bug 1010716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011685">SUSE bug 1011685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012471">SUSE bug 1012471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012832">SUSE bug 1012832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013533">SUSE bug 1013533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013604">SUSE bug 1013604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914939">SUSE bug 914939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992566">SUSE bug 992566</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-1350/">CVE-2015-1350 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1350">CVE-2015-1350 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8962/">CVE-2015-8962 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8962">CVE-2015-8962 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-8964/">CVE-2015-8964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8964">CVE-2015-8964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3841/">CVE-2016-3841 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3841">CVE-2016-3841 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7910/">CVE-2016-7910 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7910">CVE-2016-7910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7911/">CVE-2016-7911 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7911">CVE-2016-7911 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8633/">CVE-2016-8633 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8633">CVE-2016-8633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8646/">CVE-2016-8646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8646">CVE-2016-8646 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9555/">CVE-2016-9555 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9555">CVE-2016-9555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9576/">CVE-2016-9576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9576">CVE-2016-9576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9685/">CVE-2016-9685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9685">CVE-2016-9685 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9794/">CVE-2016-9794 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9794">CVE-2016-9794 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993008" comment="kernel-default-3.0.101-0.113.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993009" comment="kernel-default-base-3.0.101-0.113.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993011" comment="kernel-ec2-3.0.101-0.113.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993012" comment="kernel-ec2-base-3.0.101-0.113.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993014" comment="kernel-source-3.0.101-0.113.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993015" comment="kernel-syms-3.0.101-0.113.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993016" comment="kernel-trace-3.0.101-0.113.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993017" comment="kernel-trace-base-3.0.101-0.113.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993019" comment="kernel-xen-3.0.101-0.113.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993020" comment="kernel-xen-base-3.0.101-0.113.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218798" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1010175" ref_url="https://bugzilla.suse.com/1010175" source="BUGZILLA"/>
		<reference ref_id="1034862" ref_url="https://bugzilla.suse.com/1034862" source="BUGZILLA"/>
		<reference ref_id="1045327" ref_url="https://bugzilla.suse.com/1045327" source="BUGZILLA"/>
		<reference ref_id="1050231" ref_url="https://bugzilla.suse.com/1050231" source="BUGZILLA"/>
		<reference ref_id="1052593" ref_url="https://bugzilla.suse.com/1052593" source="BUGZILLA"/>
		<reference ref_id="1056982" ref_url="https://bugzilla.suse.com/1056982" source="BUGZILLA"/>
		<reference ref_id="1057179" ref_url="https://bugzilla.suse.com/1057179" source="BUGZILLA"/>
		<reference ref_id="1057389" ref_url="https://bugzilla.suse.com/1057389" source="BUGZILLA"/>
		<reference ref_id="1058524" ref_url="https://bugzilla.suse.com/1058524" source="BUGZILLA"/>
		<reference ref_id="1062520" ref_url="https://bugzilla.suse.com/1062520" source="BUGZILLA"/>
		<reference ref_id="1063544" ref_url="https://bugzilla.suse.com/1063544" source="BUGZILLA"/>
		<reference ref_id="1063667" ref_url="https://bugzilla.suse.com/1063667" source="BUGZILLA"/>
		<reference ref_id="1066295" ref_url="https://bugzilla.suse.com/1066295" source="BUGZILLA"/>
		<reference ref_id="1066472" ref_url="https://bugzilla.suse.com/1066472" source="BUGZILLA"/>
		<reference ref_id="1066569" ref_url="https://bugzilla.suse.com/1066569" source="BUGZILLA"/>
		<reference ref_id="1066573" ref_url="https://bugzilla.suse.com/1066573" source="BUGZILLA"/>
		<reference ref_id="1066606" ref_url="https://bugzilla.suse.com/1066606" source="BUGZILLA"/>
		<reference ref_id="1066618" ref_url="https://bugzilla.suse.com/1066618" source="BUGZILLA"/>
		<reference ref_id="1066625" ref_url="https://bugzilla.suse.com/1066625" source="BUGZILLA"/>
		<reference ref_id="1066650" ref_url="https://bugzilla.suse.com/1066650" source="BUGZILLA"/>
		<reference ref_id="1066671" ref_url="https://bugzilla.suse.com/1066671" source="BUGZILLA"/>
		<reference ref_id="1066693" ref_url="https://bugzilla.suse.com/1066693" source="BUGZILLA"/>
		<reference ref_id="1066700" ref_url="https://bugzilla.suse.com/1066700" source="BUGZILLA"/>
		<reference ref_id="1066705" ref_url="https://bugzilla.suse.com/1066705" source="BUGZILLA"/>
		<reference ref_id="1067085" ref_url="https://bugzilla.suse.com/1067085" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068671" ref_url="https://bugzilla.suse.com/1068671" source="BUGZILLA"/>
		<reference ref_id="1069702" ref_url="https://bugzilla.suse.com/1069702" source="BUGZILLA"/>
		<reference ref_id="1069708" ref_url="https://bugzilla.suse.com/1069708" source="BUGZILLA"/>
		<reference ref_id="1070771" ref_url="https://bugzilla.suse.com/1070771" source="BUGZILLA"/>
		<reference ref_id="1071074" ref_url="https://bugzilla.suse.com/1071074" source="BUGZILLA"/>
		<reference ref_id="1071470" ref_url="https://bugzilla.suse.com/1071470" source="BUGZILLA"/>
		<reference ref_id="1071695" ref_url="https://bugzilla.suse.com/1071695" source="BUGZILLA"/>
		<reference ref_id="1072561" ref_url="https://bugzilla.suse.com/1072561" source="BUGZILLA"/>
		<reference ref_id="1072876" ref_url="https://bugzilla.suse.com/1072876" source="BUGZILLA"/>
		<reference ref_id="1073792" ref_url="https://bugzilla.suse.com/1073792" source="BUGZILLA"/>
		<reference ref_id="1073874" ref_url="https://bugzilla.suse.com/1073874" source="BUGZILLA"/>
		<reference ref_id="1074033" ref_url="https://bugzilla.suse.com/1074033" source="BUGZILLA"/>
		<reference ref_id="999245" ref_url="https://bugzilla.suse.com/999245" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251/" source="CVE"/>
		<reference ref_id="CVE-2017-11600" ref_url="https://www.suse.com/security/cve/CVE-2017-11600/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13167" ref_url="https://www.suse.com/security/cve/CVE-2017-13167/" source="CVE"/>
		<reference ref_id="CVE-2017-14106" ref_url="https://www.suse.com/security/cve/CVE-2017-14106/" source="CVE"/>
		<reference ref_id="CVE-2017-14140" ref_url="https://www.suse.com/security/cve/CVE-2017-14140/" source="CVE"/>
		<reference ref_id="CVE-2017-14340" ref_url="https://www.suse.com/security/cve/CVE-2017-14340/" source="CVE"/>
		<reference ref_id="CVE-2017-15102" ref_url="https://www.suse.com/security/cve/CVE-2017-15102/" source="CVE"/>
		<reference ref_id="CVE-2017-15115" ref_url="https://www.suse.com/security/cve/CVE-2017-15115/" source="CVE"/>
		<reference ref_id="CVE-2017-15265" ref_url="https://www.suse.com/security/cve/CVE-2017-15265/" source="CVE"/>
		<reference ref_id="CVE-2017-15274" ref_url="https://www.suse.com/security/cve/CVE-2017-15274/" source="CVE"/>
		<reference ref_id="CVE-2017-15868" ref_url="https://www.suse.com/security/cve/CVE-2017-15868/" source="CVE"/>
		<reference ref_id="CVE-2017-16525" ref_url="https://www.suse.com/security/cve/CVE-2017-16525/" source="CVE"/>
		<reference ref_id="CVE-2017-16527" ref_url="https://www.suse.com/security/cve/CVE-2017-16527/" source="CVE"/>
		<reference ref_id="CVE-2017-16529" ref_url="https://www.suse.com/security/cve/CVE-2017-16529/" source="CVE"/>
		<reference ref_id="CVE-2017-16531" ref_url="https://www.suse.com/security/cve/CVE-2017-16531/" source="CVE"/>
		<reference ref_id="CVE-2017-16534" ref_url="https://www.suse.com/security/cve/CVE-2017-16534/" source="CVE"/>
		<reference ref_id="CVE-2017-16535" ref_url="https://www.suse.com/security/cve/CVE-2017-16535/" source="CVE"/>
		<reference ref_id="CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536/" source="CVE"/>
		<reference ref_id="CVE-2017-16537" ref_url="https://www.suse.com/security/cve/CVE-2017-16537/" source="CVE"/>
		<reference ref_id="CVE-2017-16538" ref_url="https://www.suse.com/security/cve/CVE-2017-16538/" source="CVE"/>
		<reference ref_id="CVE-2017-16649" ref_url="https://www.suse.com/security/cve/CVE-2017-16649/" source="CVE"/>
		<reference ref_id="CVE-2017-16939" ref_url="https://www.suse.com/security/cve/CVE-2017-16939/" source="CVE"/>
		<reference ref_id="CVE-2017-17450" ref_url="https://www.suse.com/security/cve/CVE-2017-17450/" source="CVE"/>
		<reference ref_id="CVE-2017-17558" ref_url="https://www.suse.com/security/cve/CVE-2017-17558/" source="CVE"/>
		<reference ref_id="CVE-2017-17805" ref_url="https://www.suse.com/security/cve/CVE-2017-17805/" source="CVE"/>
		<reference ref_id="CVE-2017-17806" ref_url="https://www.suse.com/security/cve/CVE-2017-17806/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2017-7472" ref_url="https://www.suse.com/security/cve/CVE-2017-7472/" source="CVE"/>
		<reference ref_id="CVE-2017-8824" ref_url="https://www.suse.com/security/cve/CVE-2017-8824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

This update adds mitigations for various side channel attacks against
modern CPUs that could disclose content of otherwise unreadable memory
(bnc#1068032).

- CVE-2017-5753: Local attackers on systems with modern CPUs featuring
  deep instruction pipelining could use attacker controllable speculative
  execution over code patterns in the Linux Kernel to leak content from
  otherwise not readable memory in the same address space, allowing
  retrieval of passwords, cryptographic keys and other secrets.

  This problem is mitigated by adding speculative fencing on affected
  code paths throughout the Linux kernel.


- CVE-2017-5715: Local attackers on systems with modern CPUs featuring
  branch prediction could use mispredicted branches to speculatively execute
  code patterns that in turn could be made to leak other non-readable
  content in the same address space, an attack similar to CVE-2017-5753.

  This problem is mitigated by disabling predictive branches, depending
  on CPU architecture either by firmware updates and/or fixes in the
  user-kernel privilege boundaries.

  Please contact your CPU / hardware vendor for potential microcode
  or BIOS updates needed for this fix.

  As this feature can have a performance impact, it can be disabled
  using the 'nospec' kernel commandline option.


- CVE-2017-5754: Local attackers on systems with modern CPUs featuring
  deep instruction pipelining could use code patterns in userspace to
  speculative executive code that would read otherwise read protected
  memory, an attack similar to CVE-2017-5753.

  This problem is mitigated by unmapping the Linux Kernel from the user
  address space during user code execution, following a approach called
  'KAISER'. The terms used here are 'KAISER' / 'Kernel Address Isolation'
  and 'PTI' / 'Page Table Isolation'.

  This feature is disabled on unaffected architectures.

  This feature can be enabled / disabled by the 'pti=[on|off|auto]' or
  'nopti' commandline options.


The following security bugs were fixed:

- CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ) was vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space (bnc#1057389).
- CVE-2017-11600: net/xfrm/xfrm_policy.c in the Linux kernel did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bnc#1050231).
- CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients (bnc#1063667).
- CVE-2017-13167: An elevation of privilege vulnerability in the kernel sound timer was fixed. (bnc#1072876).
- CVE-2017-14106: The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel allowed local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path (bnc#1056982).
- CVE-2017-14140: The move_pages system call in mm/migrate.c in the Linux kernel didn't check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR (bnc#1057179).
- CVE-2017-14340: The XFS_IS_REALTIME_INODE macro in fs/xfs/xfs_linux.h in the Linux kernel did not verify that a filesystem has a realtime device, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via vectors related to setting an RHINHERIT flag on a directory (bnc#1058524).
- CVE-2017-15102: The tower_probe function in drivers/usb/misc/legousbtower.c in the Linux kernel allowed local users (who are physically proximate for inserting a crafted USB device) to gain privileges by leveraging a write-what-where condition that occurs after a race condition and a NULL pointer dereference (bnc#1066705).
- CVE-2017-15115: The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel did not check whether the intended netns is used in a peel-off action, which allowed local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls (bnc#1068671).
- CVE-2017-15265: Race condition in the ALSA subsystem in the Linux kernel allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c (bnc#1062520).
- CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not consider the case of a NULL payload in conjunction with a nonzero length value, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted add_key or keyctl system call, a different vulnerability than CVE-2017-12192 (bnc#1045327).
- CVE-2017-15868: The bnep_add_connection function in net/bluetooth/bnep/core.c in the Linux kernel did not ensure that an l2cap socket is available, which allowed local users to gain privileges via a crafted application (bnc#1071470).
- CVE-2017-16525: The usb_serial_console_disconnect function in drivers/usb/serial/console.c in the Linux kernel allowed local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device, related to disconnection and failed setup (bnc#1066618).
- CVE-2017-16527: sound/usb/mixer.c in the Linux kernel allowed local users to cause a denial of service (snd_usb_mixer_interrupt use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066625).
- CVE-2017-16529: The snd_usb_create_streams function in sound/usb/card.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066650).
- CVE-2017-16531: drivers/usb/core/config.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device, related to the USB_DT_INTERFACE_ASSOCIATION descriptor (bnc#1066671).
- CVE-2017-16534: The cdc_parse_cdc_header function in drivers/usb/core/message.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066693).
- CVE-2017-16535: The usb_get_bos_descriptor function in drivers/usb/core/config.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066700).
- CVE-2017-16536: The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066606).
- CVE-2017-16537: The imon_probe function in drivers/media/rc/imon.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066573).
- CVE-2017-16538: drivers/media/usb/dvb-usb-v2/lmedm04.c in the Linux kernel allowed local users to cause a denial of service (general protection fault and system crash) or possibly have unspecified other impact via a crafted USB device, related to a missing warm-start check and incorrect attach timing (dm04_lme2510_frontend_attach versus dm04_lme2510_tuner) (bnc#1066569).
- CVE-2017-16649: The usbnet_generic_cdc_bind function in drivers/net/usb/cdc_ether.c in the Linux kernel allowed local users to cause a denial of service (divide-by-zero error and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067085).
- CVE-2017-16939: The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages (bnc#1069702 1069708).
- CVE-2017-17450: net/netfilter/xt_osf.c in the Linux kernel did not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allowed local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces (bnc#1071695 1074033).
- CVE-2017-17558: The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel did not consider the maximum number of configurations and interfaces before attempting to release resources, which allowed local users to cause a denial of service (out-of-bounds write access) or possibly have unspecified other impact via a crafted USB device (bnc#1072561).
- CVE-2017-17805: The Salsa20 encryption algorithm in the Linux kernel did not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable (bnc#1073792).
- CVE-2017-17806: The HMAC implementation (crypto/hmac.c) in the Linux kernel did not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization (bnc#1073874).
- CVE-2017-7472: The KEYS subsystem in the Linux kernel allowed local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls (bnc#1034862).
- CVE-2017-8824: The dccp_disconnect function in net/dccp/proto.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state (bnc#1070771).

The following non-security bugs were fixed:

- asm alternatives: remove incorrect alignment notes.
- getcwd: Close race with d_move called by lustre (bsc#1052593).
- kabi: silence spurious kabi error in net/sctp/socket.c (bsc#1068671).
- kaiser: add 'nokaiser' boot option, using ALTERNATIVE.
- kaiser: fix ldt freeing.
- kaiser: Kernel Address Isolation.
- kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush.
- kaiser: work around kABI.
- kvm: SVM: Do not intercept new speculative control MSRs (bsc#1068032).
- kvm: x86: Add speculative control CPUID support for guests (bsc#1068032).
- mac80211: do not compare TKIP TX MIC key in reinstall prevention (bsc#1066472).
- mm/mmu_context, sched/core: Fix mmu_context.h assumption.
- nfs: Remove asserts from the NFS XDR code (bsc#1063544).
- ptrace: Add a new thread access check (bsc#1068032).
- Revert 'mac80211: accept key reinstall without changing anything' This reverts commit 1def0d4e1446974356bacd9f4be06eee32b66473.
- s390: add ppa to system call and program check path (bsc#1068032).
- s390: introduce CPU alternatives (bsc#1068032).
- s390/spinlock: add gmb memory barrier (bsc#1068032).
- sched/core: Add switch_mm_irqs_off() and use it in the scheduler.
- sched/core: Idle_task_exit() shouldn't use switch_mm_irqs_off().
- scsi: mpt2sas: fix cleanup on controller resource mapping failure (bsc#999245).
- tcp: fix inet6_csk_route_req() for link-local addresses (bsc#1010175).
- tcp: pass fl6 to inet6_csk_route_req() (bsc#1010175).
- tcp: plug dst leak in tcp_v6_conn_request() (bsc#1010175).
- tcp: use inet6_csk_route_req() in tcp_v6_send_synack() (bsc#1010175).
- temporary fix (bsc#1068032).
- usb: uas: fix bug in handling of alternate settings (bsc#1071074).
- x86-64: Give vvars their own page.
- x86-64: Map the HPET NX.
- x86/alternatives: Add instruction padding.
- x86/alternatives: Cleanup DPRINTK macro.
- x86/alternatives: Make JMPs more robust.
- x86/alternatives: Use optimized NOPs for padding.
- x86/boot: Add early cmdline parsing for options with arguments.
- x86, boot: Carve out early cmdline parsing function.
- x86/CPU/AMD: Add speculative control support for AMD (bsc#1068032).
- x86/CPU/AMD: Make the LFENCE instruction serialized (bsc#1068032).
- x86/CPU/AMD: Remove now unused definition of MFENCE_RDTSC feature (bsc#1068032).
- x86/CPU: Check speculation control CPUID bit (bsc#1068032).
- x86/enter: Add macros to set/clear IBRS and set IBPB (bsc#1068032).
- x86/entry: Add a function to overwrite the RSB (bsc#1068032).
- x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (bsc#1068032).
- x86/entry: Use IBRS on entry to kernel space (bsc#1068032).
- x86/feature: Enable the x86 feature to control Speculation (bsc#1068032).
- x86/idle: Disable IBRS when offlining a CPU and re-enable on wakeup (bsc#1068032).
- x86/idle: Toggle IBRS when going idle (bsc#1068032).
- x86/kaiser: Check boottime cmdline params.
- x86/kaiser: disable vmstat accounting.
- x86/kaiser: Move feature detection up (bsc#1068032).
- x86/kaiser: propagate info to /proc/cpuinfo.
- x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling.
- x86/kvm: Add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm (bsc#1068032).
- x86/kvm: Flush IBP when switching VMs (bsc#1068032).
- x86/kvm: Pad RSB on VM transition (bsc#1068032).
- x86/kvm: Toggle IBRS on VM entry and exit (bsc#1068032).
- x86: Make alternative instruction pointers relative.
- x86/microcode/AMD: Add support for fam17h microcode loading (bsc#1068032).
- x86/mm/64: Fix reboot interaction with CR4.PCIDE.
- x86/mm: Add a 'noinvpcid' boot option to turn off INVPCID.
- x86/mm: Add INVPCID helpers.
- x86/mm: Add the 'nopcid' boot option to turn off PCID.
- x86/mm: Build arch/x86/mm/tlb.c even on !SMP.
- x86/mm: Disable PCID on 32-bit kernels.
- x86/mm: Enable CR4.PCIDE on supported systems.
- x86/mm: fix bad backport to disable PCID on Xen.
- x86/mm: Fix INVPCID asm constraint.
- x86/mm: If INVPCID is available, use it to flush global mappings.
- x86/mm/kaiser: re-enable vsyscalls.
- x86/mm: Only set IBPB when the new thread cannot ptrace current thread (bsc#1068032).
- x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code.
- x86/mm, sched/core: Turn off IRQs in switch_mm().
- x86/mm, sched/core: Uninline switch_mm().
- x86/mm: Set IBPB upon context switch (bsc#1068032).
- x86/MSR: Move native_*msr(.. u64) to msr.h (bsc#1068032).
- x86/spec: Add IBRS control functions (bsc#1068032).
- x86/spec: Add 'nospec' chicken bit (bsc#1068032).
- x86/spec: Check CPUID direclty post microcode reload to support IBPB feature (bsc#1068032).
- x86/spec_ctrl: Add an Indirect Branch Predictor barrier (bsc#1068032).
- x86/spec_ctrl: Check whether IBPB is enabled before using it (bsc#1068032).
- x86/spec_ctrl: Check whether IBRS is enabled before using it (bsc#1068032).
- x86/svm: Add code to clear registers on VM exit (bsc#1068032).
- x86/svm: Clobber the RSB on VM exit (bsc#1068032).
- x86/svm: Set IBPB when running a different VCPU (bsc#1068032).
- x86/svm: Set IBRS value on VM entry and exit (bsc#1068032).
- xen/kaiser: add 'nokaiser' boot option, using ALTERNATIVE.
- xen/KAISER: Kernel Address Isolation.
- xen/kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush.
- xen/kaiser: work around kABI.
- xen/x86-64: Give vvars their own page.
- xen/x86-64: Map the HPET NX.
- xen/x86/alternatives: Add instruction padding.
- xen/x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling.
- xen/x86/mm: Enable CR4.PCIDE on supported systems.
- xen/x86/mm/kaiser: re-enable vsyscalls.
- xen/x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code.
- xen: x86/mm, sched/core: Turn off IRQs in switch_mm().
- xen: x86/mm, sched/core: Uninline switch_mm().
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-08"/>
	<updated date="2018-01-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010175">SUSE bug 1010175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034862">SUSE bug 1034862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045327">SUSE bug 1045327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050231">SUSE bug 1050231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052593">SUSE bug 1052593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056982">SUSE bug 1056982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057179">SUSE bug 1057179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057389">SUSE bug 1057389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058524">SUSE bug 1058524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062520">SUSE bug 1062520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063544">SUSE bug 1063544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066295">SUSE bug 1066295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066472">SUSE bug 1066472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066569">SUSE bug 1066569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066573">SUSE bug 1066573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066606">SUSE bug 1066606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066618">SUSE bug 1066618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066625">SUSE bug 1066625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066650">SUSE bug 1066650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066671">SUSE bug 1066671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066693">SUSE bug 1066693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066700">SUSE bug 1066700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066705">SUSE bug 1066705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067085">SUSE bug 1067085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068671">SUSE bug 1068671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069702">SUSE bug 1069702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069708">SUSE bug 1069708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070771">SUSE bug 1070771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071074">SUSE bug 1071074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071470">SUSE bug 1071470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071695">SUSE bug 1071695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072561">SUSE bug 1072561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072876">SUSE bug 1072876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073792">SUSE bug 1073792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073874">SUSE bug 1073874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074033">SUSE bug 1074033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999245">SUSE bug 999245</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000251">CVE-2017-1000251 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11600/">CVE-2017-11600 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11600">CVE-2017-11600 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13167/">CVE-2017-13167 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13167">CVE-2017-13167 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14106/">CVE-2017-14106 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14106">CVE-2017-14106 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14140/">CVE-2017-14140 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14140">CVE-2017-14140 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14340/">CVE-2017-14340 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14340">CVE-2017-14340 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15102/">CVE-2017-15102 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15102">CVE-2017-15102 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15115/">CVE-2017-15115 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15115">CVE-2017-15115 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15265/">CVE-2017-15265 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15265">CVE-2017-15265 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15274/">CVE-2017-15274 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15274">CVE-2017-15274 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15868/">CVE-2017-15868 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15868">CVE-2017-15868 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16525/">CVE-2017-16525 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16525">CVE-2017-16525 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16527/">CVE-2017-16527 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16527">CVE-2017-16527 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16529/">CVE-2017-16529 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16529">CVE-2017-16529 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16531/">CVE-2017-16531 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16531">CVE-2017-16531 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16534/">CVE-2017-16534 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16534">CVE-2017-16534 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16535/">CVE-2017-16535 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16535">CVE-2017-16535 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16536">CVE-2017-16536 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16537/">CVE-2017-16537 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16537">CVE-2017-16537 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16538/">CVE-2017-16538 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16538">CVE-2017-16538 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16649/">CVE-2017-16649 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16649">CVE-2017-16649 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16939/">CVE-2017-16939 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16939">CVE-2017-16939 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17450/">CVE-2017-17450 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17450">CVE-2017-17450 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17558/">CVE-2017-17558 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17558">CVE-2017-17558 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17805/">CVE-2017-17805 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17805">CVE-2017-17805 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17806/">CVE-2017-17806 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17806">CVE-2017-17806 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5754">CVE-2017-5754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7472/">CVE-2017-7472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7472">CVE-2017-7472 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8824/">CVE-2017-8824 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8824">CVE-2017-8824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578433" comment="kernel-bigsmp-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578434" comment="kernel-bigsmp-base-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578436" comment="kernel-default-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578437" comment="kernel-default-base-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578439" comment="kernel-default-man-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578440" comment="kernel-ec2-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578441" comment="kernel-ec2-base-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568232" comment="kernel-pae-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568233" comment="kernel-pae-base-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578443" comment="kernel-source-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578444" comment="kernel-syms-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578445" comment="kernel-trace-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578446" comment="kernel-trace-base-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578448" comment="kernel-xen-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578449" comment="kernel-xen-base-3.0.101-0.47.106.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218799" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1003180" ref_url="https://bugzilla.suse.com/1003180" source="BUGZILLA"/>
		<reference ref_id="1008374" ref_url="https://bugzilla.suse.com/1008374" source="BUGZILLA"/>
		<reference ref_id="1011820" ref_url="https://bugzilla.suse.com/1011820" source="BUGZILLA"/>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1013038" ref_url="https://bugzilla.suse.com/1013038" source="BUGZILLA"/>
		<reference ref_id="1013531" ref_url="https://bugzilla.suse.com/1013531" source="BUGZILLA"/>
		<reference ref_id="1013542" ref_url="https://bugzilla.suse.com/1013542" source="BUGZILLA"/>
		<reference ref_id="1014746" ref_url="https://bugzilla.suse.com/1014746" source="BUGZILLA"/>
		<reference ref_id="1017710" ref_url="https://bugzilla.suse.com/1017710" source="BUGZILLA"/>
		<reference ref_id="1018385" ref_url="https://bugzilla.suse.com/1018385" source="BUGZILLA"/>
		<reference ref_id="1021258" ref_url="https://bugzilla.suse.com/1021258" source="BUGZILLA"/>
		<reference ref_id="821612" ref_url="https://bugzilla.suse.com/821612" source="BUGZILLA"/>
		<reference ref_id="824171" ref_url="https://bugzilla.suse.com/824171" source="BUGZILLA"/>
		<reference ref_id="929142" ref_url="https://bugzilla.suse.com/929142" source="BUGZILLA"/>
		<reference ref_id="973691" ref_url="https://bugzilla.suse.com/973691" source="BUGZILLA"/>
		<reference ref_id="986337" ref_url="https://bugzilla.suse.com/986337" source="BUGZILLA"/>
		<reference ref_id="995968" ref_url="https://bugzilla.suse.com/995968" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6704" ref_url="https://www.suse.com/security/cve/CVE-2012-6704/" source="CVE"/>
		<reference ref_id="CVE-2015-8970" ref_url="https://www.suse.com/security/cve/CVE-2015-8970/" source="CVE"/>
		<reference ref_id="CVE-2016-10088" ref_url="https://www.suse.com/security/cve/CVE-2016-10088/" source="CVE"/>
		<reference ref_id="CVE-2016-7097" ref_url="https://www.suse.com/security/cve/CVE-2016-7097/" source="CVE"/>
		<reference ref_id="CVE-2016-8399" ref_url="https://www.suse.com/security/cve/CVE-2016-8399/" source="CVE"/>
		<reference ref_id="CVE-2016-9756" ref_url="https://www.suse.com/security/cve/CVE-2016-9756/" source="CVE"/>
		<reference ref_id="CVE-2016-9793" ref_url="https://www.suse.com/security/cve/CVE-2016-9793/" source="CVE"/>
		<reference ref_id="CVE-2017-5551" ref_url="https://www.suse.com/security/cve/CVE-2017-5551/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP3 Teradata kernel was updated to fix bugs and security issues.

The following security issues have been fixed:

- crypto/lrw: Protect gf128mul from NULL pointers. (bsc#1008374, CVE-2015-8970)
- kvm: x86: Drop error recovery in em_jmp_far and em_ret_far. (bsc#1013038, CVE-2016-9756)
- net: Avoid signed overflows for SO_{SND|RCV}BUFFORCE. (bsc#1013531, CVE-2016-9793)
- net: Cleanups in sock_setsockopt(). (bsc#1013542, CVE-2012-6704)
- net/ping: Check minimum size on ICMP header length. (bsc#1014746, CVE-2016-8399)
- posix_acl: Clear SGID bit when setting file permissions. (bsc#995968, CVE-2016-7097)
- sg_write()/bsg_write() is not fit to be called under KERNEL_DS. (bsc#1017710, CVE-2016-10088)
- tmpfs: Clear S_ISGID when setting posix ACLs. (bsc#1021258, CVE-2017-5551)

Additionally the following non-security bugs have been fixed:

- hv: Define the channel type for Hyper-V PCI Express pass-through. (bsc#1018385)
- hv: Export a function that maps Linux CPU num onto Hyper-V proc num. (bsc#1018385)
- hv: Export the API to invoke a hypercall on Hyper-V. (bsc#1018385)
- hv: Remove code duplication between vmbus_recvpacket()/vmbus_recvpacket_raw(). (bsc#1018385)
- hv: vmbus_free_channels(): Remove the redundant free_channel(). (bsc#1018385)
- hv/netvsc: Allocate the receive buffer from the correct NUMA node. (bsc#1018385)
- hv/netvsc: Allocate the sendbuf in a NUMA aware way. (bsc#1018385)
- hv/ring_buffer: Eliminate hv_ringbuffer_peek(). (bsc#1018385)
- hv/ring_buffer: Fix comment style. (bsc#1018385)
- hv/ring_buffer: Remove code duplication from hv_ringbuffer_peek/read(). (bsc#1018385)
- hv/vmbus: Add vendor and device attributes. (bsc#1018385)
- hv/vmbus: Allocate ring buffer memory in NUMA aware fashion. (bsc#1018385)
- hv/vmbus: Avoid infinite loop in init_vp_index(). (bsc#986337)
- hv/vmbus: Base host signaling strictly on the ring state. (bsc#1018385)
- hv/vmbus: Briefly comment num_sc and next_oc. (bsc#1018385)
- hv/vmbus: Change vmbus_connection.channel_lock to mutex. (bsc#1018385)
- hv/vmbus: Cleanup vmbus_set_event(). (bsc#1018385)
- hv/vmbus: Consider ND NIC in binding channels to CPUs. (bsc#1018385)
- hv/vmbus: Decrease num_sc on subchannel removal. (bsc#1018385)
- hv/vmbus: Define a new VMBus message type for hvsock. (bsc#1018385)
- hv/vmbus: Define the new offer type for Hyper-V socket (hvsock). (bsc#1018385)
- hv/vmbus: Distribute subchannels among all vcpus. (bsc#1018385)
- hv/vmbus: Eliminate the spin lock on the read path. (bsc#1018385)
- hv/vmbus: Enable explicit signaling policy for NIC channels. (bsc#1018385)
- hv/vmbus: Export the vmbus_set_event() API. (bsc#1018385)
- hv/vmbus: Finally fix hv_need_to_signal_on_read(). (bsc#1018385)
- hv/vmbus: Fix a Host signaling bug. (bsc#1018385)
- hv/vmbus: Fix init_vp_index() for reloading hv_netvsc. (bsc#1018385)
- hv/vmbus: Fix rescind-offer handling for device without a driver. (bsc#1018385)
- hv/vmbus: Fix signaling logic in hv_need_to_signal_on_read(). (bsc#1018385)
- hv/vmbus: Fix signal to host condition. (bsc#1018385)
- hv/vmbus: Further improve CPU affiliation logic. (bsc#1018385)
- hv/vmbus: Give control over how the ring access is serialized. (bsc#1018385)
- hv/vmbus: Implement APIs to support 'in place' consumption of vmbus packets. (bsc#1018385)
- hv/vmbus: Implement NUMA aware CPU affinity for channels. (bsc#1018385)
- hv/vmbus: Improve the CPU affiliation for channels. (bsc#1018385)
- hv/vmbus: Introduce functions for estimating room in the ring buffer. (bsc#1018385)
- hv/vmbus: Move init_vp_index() call to vmbus_process_offer(). (bsc#1018385)
- hv/vmbus: Move some ring buffer functions to hyperv.h. (bsc#1018385)
- hv/vmbus: On the read path cleanup the logic to interrupt the host. (bsc#1018385)
- hv/vmbus: On write cleanup the logic to interrupt the host. (bsc#1018385)
- hv/vmbus: Permit sending of packets without payload. (bsc#1018385)
- hv/vmbus: Release relid on error in vmbus_process_offer(). (bsc#1018385)
- hv/vmbus: Serialize process_chn_event() and vmbus_close_internal(). (bsc#1018385)
- hv/vmbus: Support handling messages on multiple CPUs. (bsc#1018385)
- hv/vmbus: Suppress some 'hv_vmbus: Unknown GUID' warnings. (bsc#1018385)
- hv/vmbus: Treat Fibre Channel devices as performance critical. (bsc#1018385)
- hv/vmbus: Unify calls to percpu_channel_enq(). (bsc#1018385)
- hv/vmbus: Use the vp_index map even for channels bound to CPU 0. (bsc#1018385)
- hv/vmbus: Use uuid_le_cmp() for comparing GUIDs. (bsc#1018385)
- hv/vmbus: Use uuid_le type consistently. (bsc#1018385)
- hv/vmbus: vmbus_sendpacket_ctl: hvsock: Avoid unnecessary signaling. (bsc#1018385)
- kexec: Add a kexec_crash_loaded() function. (bsc#973691)
- mpi: Fix NULL ptr dereference in mpi_powm(). (bsc#1011820)
- netvsc: Fix checksum on UDP IPV6. (bsc#1018385)
- netvsc: Fix incorrect receive checksum offloading. (bsc#1018385)
- netvsc: Reduce maximum GSO size. (bsc#1018385)
- perf/x86/intel: Move NMI clearing to end of PMI handler. (bsc#929142)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-03"/>
	<updated date="2017-02-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1003180">SUSE bug 1003180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008374">SUSE bug 1008374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011820">SUSE bug 1011820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013038">SUSE bug 1013038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013531">SUSE bug 1013531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013542">SUSE bug 1013542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014746">SUSE bug 1014746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017710">SUSE bug 1017710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018385">SUSE bug 1018385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021258">SUSE bug 1021258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821612">SUSE bug 821612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824171">SUSE bug 824171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929142">SUSE bug 929142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973691">SUSE bug 973691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986337">SUSE bug 986337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995968">SUSE bug 995968</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6704/">CVE-2012-6704 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6704">CVE-2012-6704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8970/">CVE-2015-8970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8970">CVE-2015-8970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10088/">CVE-2016-10088 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10088">CVE-2016-10088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7097/">CVE-2016-7097 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7097">CVE-2016-7097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8399/">CVE-2016-8399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8399">CVE-2016-8399 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9756/">CVE-2016-9756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9756">CVE-2016-9756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9793/">CVE-2016-9793 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9793">CVE-2016-9793 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5551/">CVE-2017-5551 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5551">CVE-2017-5551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993022" comment="kernel-default-3.0.101-0.116.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993023" comment="kernel-default-base-3.0.101-0.116.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993025" comment="kernel-ec2-3.0.101-0.116.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993026" comment="kernel-ec2-base-3.0.101-0.116.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993028" comment="kernel-source-3.0.101-0.116.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993029" comment="kernel-syms-3.0.101-0.116.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993030" comment="kernel-trace-3.0.101-0.116.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993031" comment="kernel-trace-base-3.0.101-0.116.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993033" comment="kernel-xen-3.0.101-0.116.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993034" comment="kernel-xen-base-3.0.101-0.116.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218800" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1021256" ref_url="https://bugzilla.suse.com/1021256" source="BUGZILLA"/>
		<reference ref_id="1025235" ref_url="https://bugzilla.suse.com/1025235" source="BUGZILLA"/>
		<reference ref_id="1026024" ref_url="https://bugzilla.suse.com/1026024" source="BUGZILLA"/>
		<reference ref_id="1026722" ref_url="https://bugzilla.suse.com/1026722" source="BUGZILLA"/>
		<reference ref_id="1027066" ref_url="https://bugzilla.suse.com/1027066" source="BUGZILLA"/>
		<reference ref_id="1027565" ref_url="https://bugzilla.suse.com/1027565" source="BUGZILLA"/>
		<reference ref_id="1028415" ref_url="https://bugzilla.suse.com/1028415" source="BUGZILLA"/>
		<reference ref_id="979021" ref_url="https://bugzilla.suse.com/979021" source="BUGZILLA"/>
		<reference ref_id="983212" ref_url="https://bugzilla.suse.com/983212" source="BUGZILLA"/>
		<reference ref_id="997801" ref_url="https://bugzilla.suse.com/997801" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3288" ref_url="https://www.suse.com/security/cve/CVE-2015-3288/" source="CVE"/>
		<reference ref_id="CVE-2016-10200" ref_url="https://www.suse.com/security/cve/CVE-2016-10200/" source="CVE"/>
		<reference ref_id="CVE-2016-5243" ref_url="https://www.suse.com/security/cve/CVE-2016-5243/" source="CVE"/>
		<reference ref_id="CVE-2017-2636" ref_url="https://www.suse.com/security/cve/CVE-2017-2636/" source="CVE"/>
		<reference ref_id="CVE-2017-5986" ref_url="https://www.suse.com/security/cve/CVE-2017-5986/" source="CVE"/>
		<reference ref_id="CVE-2017-6074" ref_url="https://www.suse.com/security/cve/CVE-2017-6074/" source="CVE"/>
		<reference ref_id="CVE-2017-6214" ref_url="https://www.suse.com/security/cve/CVE-2017-6214/" source="CVE"/>
		<reference ref_id="CVE-2017-6353" ref_url="https://www.suse.com/security/cve/CVE-2017-6353/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP3 Teradata kernel was updated to fix bugs and security issues.

The following security issues have been fixed:

- mm: Avoid setting up anonymous pages into file mapping. (bsc#979021, CVE-2015-3288)
- l2tp: Fix l2tp_ip_bind() return value on SOCK_ZAPPED bailout. (bsc#1028415, CVE-2016-10200)
- l2tp: Fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind(). (bsc#1028415, CVE-2016-10200)
- list: Introduce list_first_entry_or_null. (bsc#1027565, CVE-2017-2636)
- tty/n_hdlc: Get rid of racy n_hdlc.tbuf. (bsc#1027565, CVE-2017-2636)
- tipc: Fix an infoleak in tipc_nl_compat_link_dump. (bsc#983212, CVE-2016-5243)
- sctp: Deny peeloff operation on asocs with threads sleeping on it. (bsc#1027066, CVE-2017-6353)
- tcp: Avoid infinite loop in tcp_splice_read(). (bsc#1026722, CVE-2017-6214)
- dccp: Fix freeing skb too early for IPV6_RECVPKTINFO. (bsc#1026024, CVE-2017-6074)
- sctp: Avoid BUG_ON on sctp_wait_for_sndbuf. (bsc#1025235, CVE-2017-5986)

Additionally the following non-security bugs have been fixed:

- sd: Use async_probe cookie to avoid deadlocks. (bsc#997801)
- USB/serial/kl5kusb105: Fix line-state error handling. (bsc#1021256)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-29"/>
	<updated date="2017-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021256">SUSE bug 1021256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025235">SUSE bug 1025235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026024">SUSE bug 1026024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026722">SUSE bug 1026722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027066">SUSE bug 1027066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027565">SUSE bug 1027565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028415">SUSE bug 1028415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979021">SUSE bug 979021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983212">SUSE bug 983212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997801">SUSE bug 997801</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3288/">CVE-2015-3288 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3288">CVE-2015-3288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10200/">CVE-2016-10200 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10200">CVE-2016-10200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5243/">CVE-2016-5243 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5243">CVE-2016-5243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2636/">CVE-2017-2636 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2636">CVE-2017-2636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5986/">CVE-2017-5986 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5986">CVE-2017-5986 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6074/">CVE-2017-6074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6074">CVE-2017-6074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6214/">CVE-2017-6214 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6214">CVE-2017-6214 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6353/">CVE-2017-6353 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6353">CVE-2017-6353 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993036" comment="kernel-default-3.0.101-0.119.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993037" comment="kernel-default-base-3.0.101-0.119.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993039" comment="kernel-ec2-3.0.101-0.119.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993040" comment="kernel-ec2-base-3.0.101-0.119.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993042" comment="kernel-source-3.0.101-0.119.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993043" comment="kernel-syms-3.0.101-0.119.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993044" comment="kernel-trace-3.0.101-0.119.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993045" comment="kernel-trace-base-3.0.101-0.119.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993047" comment="kernel-xen-3.0.101-0.119.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993048" comment="kernel-xen-base-3.0.101-0.119.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218801" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1003077" ref_url="https://bugzilla.suse.com/1003077" source="BUGZILLA"/>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1023051" ref_url="https://bugzilla.suse.com/1023051" source="BUGZILLA"/>
		<reference ref_id="1024938" ref_url="https://bugzilla.suse.com/1024938" source="BUGZILLA"/>
		<reference ref_id="1026914" ref_url="https://bugzilla.suse.com/1026914" source="BUGZILLA"/>
		<reference ref_id="1027178" ref_url="https://bugzilla.suse.com/1027178" source="BUGZILLA"/>
		<reference ref_id="1030213" ref_url="https://bugzilla.suse.com/1030213" source="BUGZILLA"/>
		<reference ref_id="1030573" ref_url="https://bugzilla.suse.com/1030573" source="BUGZILLA"/>
		<reference ref_id="1030593" ref_url="https://bugzilla.suse.com/1030593" source="BUGZILLA"/>
		<reference ref_id="1031003" ref_url="https://bugzilla.suse.com/1031003" source="BUGZILLA"/>
		<reference ref_id="1031052" ref_url="https://bugzilla.suse.com/1031052" source="BUGZILLA"/>
		<reference ref_id="1031440" ref_url="https://bugzilla.suse.com/1031440" source="BUGZILLA"/>
		<reference ref_id="1031579" ref_url="https://bugzilla.suse.com/1031579" source="BUGZILLA"/>
		<reference ref_id="1033336" ref_url="https://bugzilla.suse.com/1033336" source="BUGZILLA"/>
		<reference ref_id="1034670" ref_url="https://bugzilla.suse.com/1034670" source="BUGZILLA"/>
		<reference ref_id="1035576" ref_url="https://bugzilla.suse.com/1035576" source="BUGZILLA"/>
		<reference ref_id="1038544" ref_url="https://bugzilla.suse.com/1038544" source="BUGZILLA"/>
		<reference ref_id="1038879" ref_url="https://bugzilla.suse.com/1038879" source="BUGZILLA"/>
		<reference ref_id="1039348" ref_url="https://bugzilla.suse.com/1039348" source="BUGZILLA"/>
		<reference ref_id="1039456" ref_url="https://bugzilla.suse.com/1039456" source="BUGZILLA"/>
		<reference ref_id="1039882" ref_url="https://bugzilla.suse.com/1039882" source="BUGZILLA"/>
		<reference ref_id="1039883" ref_url="https://bugzilla.suse.com/1039883" source="BUGZILLA"/>
		<reference ref_id="1039885" ref_url="https://bugzilla.suse.com/1039885" source="BUGZILLA"/>
		<reference ref_id="1040069" ref_url="https://bugzilla.suse.com/1040069" source="BUGZILLA"/>
		<reference ref_id="1041431" ref_url="https://bugzilla.suse.com/1041431" source="BUGZILLA"/>
		<reference ref_id="1042921" ref_url="https://bugzilla.suse.com/1042921" source="BUGZILLA"/>
		<reference ref_id="970956" ref_url="https://bugzilla.suse.com/970956" source="BUGZILLA"/>
		<reference ref_id="972891" ref_url="https://bugzilla.suse.com/972891" source="BUGZILLA"/>
		<reference ref_id="986362" ref_url="https://bugzilla.suse.com/986362" source="BUGZILLA"/>
		<reference ref_id="986365" ref_url="https://bugzilla.suse.com/986365" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2188" ref_url="https://www.suse.com/security/cve/CVE-2016-2188/" source="CVE"/>
		<reference ref_id="CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997/" source="CVE"/>
		<reference ref_id="CVE-2016-7117" ref_url="https://www.suse.com/security/cve/CVE-2016-7117/" source="CVE"/>
		<reference ref_id="CVE-2017-1000363" ref_url="https://www.suse.com/security/cve/CVE-2017-1000363/" source="CVE"/>
		<reference ref_id="CVE-2017-1000364" ref_url="https://www.suse.com/security/cve/CVE-2017-1000364/" source="CVE"/>
		<reference ref_id="CVE-2017-2647" ref_url="https://www.suse.com/security/cve/CVE-2017-2647/" source="CVE"/>
		<reference ref_id="CVE-2017-2671" ref_url="https://www.suse.com/security/cve/CVE-2017-2671/" source="CVE"/>
		<reference ref_id="CVE-2017-5669" ref_url="https://www.suse.com/security/cve/CVE-2017-5669/" source="CVE"/>
		<reference ref_id="CVE-2017-5970" ref_url="https://www.suse.com/security/cve/CVE-2017-5970/" source="CVE"/>
		<reference ref_id="CVE-2017-6348" ref_url="https://www.suse.com/security/cve/CVE-2017-6348/" source="CVE"/>
		<reference ref_id="CVE-2017-6951" ref_url="https://www.suse.com/security/cve/CVE-2017-6951/" source="CVE"/>
		<reference ref_id="CVE-2017-7184" ref_url="https://www.suse.com/security/cve/CVE-2017-7184/" source="CVE"/>
		<reference ref_id="CVE-2017-7187" ref_url="https://www.suse.com/security/cve/CVE-2017-7187/" source="CVE"/>
		<reference ref_id="CVE-2017-7261" ref_url="https://www.suse.com/security/cve/CVE-2017-7261/" source="CVE"/>
		<reference ref_id="CVE-2017-7294" ref_url="https://www.suse.com/security/cve/CVE-2017-7294/" source="CVE"/>
		<reference ref_id="CVE-2017-7308" ref_url="https://www.suse.com/security/cve/CVE-2017-7308/" source="CVE"/>
		<reference ref_id="CVE-2017-7487" ref_url="https://www.suse.com/security/cve/CVE-2017-7487/" source="CVE"/>
		<reference ref_id="CVE-2017-7616" ref_url="https://www.suse.com/security/cve/CVE-2017-7616/" source="CVE"/>
		<reference ref_id="CVE-2017-8890" ref_url="https://www.suse.com/security/cve/CVE-2017-8890/" source="CVE"/>
		<reference ref_id="CVE-2017-9074" ref_url="https://www.suse.com/security/cve/CVE-2017-9074/" source="CVE"/>
		<reference ref_id="CVE-2017-9075" ref_url="https://www.suse.com/security/cve/CVE-2017-9075/" source="CVE"/>
		<reference ref_id="CVE-2017-9076" ref_url="https://www.suse.com/security/cve/CVE-2017-9076/" source="CVE"/>
		<reference ref_id="CVE-2017-9077" ref_url="https://www.suse.com/security/cve/CVE-2017-9077/" source="CVE"/>
		<reference ref_id="CVE-2017-9242" ref_url="https://www.suse.com/security/cve/CVE-2017-9242/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP3 Teradata kernel was updated to fix bugs and security issues.

The following security issues have been fixed:

- char/lp: Fix possible integer overflow in lp_setup(). (bsc#1039456, CVE-2017-1000363)
- dccp/tcp: Do not inherit mc_list from parent. (bsc#1038544, CVE-2017-8890)
- drm/vmwgfx: Fix integer overflow in vmw_surface_define_ioctl(). (bsc#1031440, CVE-2017-7294)
- drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl(). (bsc#1031052, CVE-2017-7261)
- ipc/shm: Fix shmat mmap nil-page protection. (bsc#1026914, CVE-2017-5669)
- ipv4: Keep skb-&gt;dst around in presence of IP options. (bsc#1024938, CVE-2017-5970)
- ipv6: Check ip6_find_1stfragopt() return value properly. (bsc#1039882, CVE-2017-9074)
- ipv6/dccp: Do not inherit ipv6_mc_list from parent. (bsc#1039885, bsc#1040069, CVE-2017-9076, CVE-2017-9077)
- ipv6: Fix out of bound writes in __ip6_append_data(). (bsc#1041431, CVE-2017-9242)
- ipv6: Prevent overrun when parsing v6 header options. (bsc#1039882, CVE-2017-9074)
- ipx: Call ipxitf_put() in ioctl error path. (bsc#1038879, CVE-2017-7487)
- irda: Fix lockdep annotations in hashbin_delete(). (bsc#1027178, CVE-2017-6348)
- keys: Guard against null match function in keyring_search_aux(). (bsc#1030593, CVE-2017-2647, CVE-2017-6951)
- mm: Enlarge stack guard gap. (bsc#1042921, bsc#1039348, CVE-2017-1000364)
- mm/mempolicy.c: Fix error handling in set_mempolicy and mbind. (bsc#1033336, CVE-2017-7616)
- netfilter/arp_tables: Fix invoking 32bit 'iptable -P INPUT ACCEPT' failed in 64bit kernel.
  (bsc#986362, bsc#986365, CVE-2016-4997, CVE-2016-4998)
- net/packet: Fix overflow in check for tp_reserve and tp_frame_nr. (bsc#1031579, CVE-2017-7308)
- net/socket: Fix recvmmsg not returning error from sock_error. (bsc#1003077, CVE-2016-7117)
- ping: Implement proper locking. (bsc#1031003, CVE-2017-2671)
- scsi/sg: Check length passed to SG_NEXT_CMD_LEN. (bsc#1030213, CVE-2017-7187)
- sctp: Do not inherit ipv6_{mc|ac|fl}_list from parent. (bsc#1039883, CVE-2017-9075)
- usb/iowarrior: Fix NULL-deref at probe. (bsc#970956, CVE-2016-2188)
- xfrm_user: Validate XFRM_MSG_NEWAE incoming ESN size harder. (bsc#1030573, CVE-2017-7184)
- xfrm_user: Validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window. (bsc#1030573, CVE-2017-7184)

Additionally the following non-security bugs have been fixed:

- acpi: Disable APEI error injection if securelevel is set. (bsc#972891, bsc#1023051)
- firmware: Fix directory creation rule matching with make 3.80 and 3.82. (bsc#1012422)
- kernel-binary.spec: Propagate MAKE_ARGS to %build. (bsc#1012422)
- keys: Disallow keyrings beginning with '.' to be joined as session keyrings. (bsc#1035576)
- mm: Do not collapse stack gap into THP. (bsc#1039348)
- nfsd4: Minor NFSv2/v3 write decoding cleanup. (bsc#1034670)
- nfsd: Check for oversized NFSv2/v3 arguments. (bsc#1034670)
- nfsd: Stricter decoding of write-like NFSv2/v3 ops. (bsc#1034670)
- Use make --output-sync feature when available. (bsc#1012422)
  The messages in make output can interleave making it impossible to
  extract warnings reliably. Since version 4 GNU Make supports
  --output-sync flag that prints output of each sub-command atomically
  preventing this issue. Detect the flag and use it if available.
  SLE11 has make 3.81 so it is required to include make 4 in the kernel
  OBS projects to take advantage of this.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-19"/>
	<updated date="2017-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1003077">SUSE bug 1003077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023051">SUSE bug 1023051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024938">SUSE bug 1024938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026914">SUSE bug 1026914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027178">SUSE bug 1027178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030213">SUSE bug 1030213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030573">SUSE bug 1030573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030593">SUSE bug 1030593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031003">SUSE bug 1031003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031052">SUSE bug 1031052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031440">SUSE bug 1031440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031579">SUSE bug 1031579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033336">SUSE bug 1033336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034670">SUSE bug 1034670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035576">SUSE bug 1035576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038879">SUSE bug 1038879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039456">SUSE bug 1039456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039882">SUSE bug 1039882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039883">SUSE bug 1039883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039885">SUSE bug 1039885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040069">SUSE bug 1040069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041431">SUSE bug 1041431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042921">SUSE bug 1042921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970956">SUSE bug 970956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972891">SUSE bug 972891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986365">SUSE bug 986365</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2188/">CVE-2016-2188 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2188">CVE-2016-2188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4997">CVE-2016-4997 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7117/">CVE-2016-7117 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7117">CVE-2016-7117 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000363/">CVE-2017-1000363 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000363">CVE-2017-1000363 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000364/">CVE-2017-1000364 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000364">CVE-2017-1000364 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2647/">CVE-2017-2647 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2647">CVE-2017-2647 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2671/">CVE-2017-2671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2671">CVE-2017-2671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5669/">CVE-2017-5669 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5669">CVE-2017-5669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5970/">CVE-2017-5970 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5970">CVE-2017-5970 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6348/">CVE-2017-6348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6348">CVE-2017-6348 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6951/">CVE-2017-6951 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6951">CVE-2017-6951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7184/">CVE-2017-7184 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7184">CVE-2017-7184 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7187/">CVE-2017-7187 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7187">CVE-2017-7187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7261/">CVE-2017-7261 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7261">CVE-2017-7261 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7294/">CVE-2017-7294 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7294">CVE-2017-7294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7308/">CVE-2017-7308 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7308">CVE-2017-7308 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7487/">CVE-2017-7487 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7487">CVE-2017-7487 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7616/">CVE-2017-7616 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7616">CVE-2017-7616 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8890/">CVE-2017-8890 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8890">CVE-2017-8890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9074/">CVE-2017-9074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9074">CVE-2017-9074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9075/">CVE-2017-9075 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9075">CVE-2017-9075 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9076/">CVE-2017-9076 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9076">CVE-2017-9076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9077/">CVE-2017-9077 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9077">CVE-2017-9077 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9242/">CVE-2017-9242 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9242">CVE-2017-9242 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993050" comment="kernel-default-3.0.101-0.122.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993051" comment="kernel-default-base-3.0.101-0.122.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993053" comment="kernel-ec2-3.0.101-0.122.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993054" comment="kernel-ec2-base-3.0.101-0.122.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993056" comment="kernel-source-3.0.101-0.122.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993057" comment="kernel-syms-3.0.101-0.122.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993058" comment="kernel-trace-3.0.101-0.122.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993059" comment="kernel-trace-base-3.0.101-0.122.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993061" comment="kernel-xen-3.0.101-0.122.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993062" comment="kernel-xen-base-3.0.101-0.122.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218802" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1038981" ref_url="https://bugzilla.suse.com/1038981" source="BUGZILLA"/>
		<reference ref_id="1038982" ref_url="https://bugzilla.suse.com/1038982" source="BUGZILLA"/>
		<reference ref_id="1039348" ref_url="https://bugzilla.suse.com/1039348" source="BUGZILLA"/>
		<reference ref_id="1044125" ref_url="https://bugzilla.suse.com/1044125" source="BUGZILLA"/>
		<reference ref_id="1045340" ref_url="https://bugzilla.suse.com/1045340" source="BUGZILLA"/>
		<reference ref_id="1045406" ref_url="https://bugzilla.suse.com/1045406" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000364" ref_url="https://www.suse.com/security/cve/CVE-2017-1000364/" source="CVE"/>
		<reference ref_id="CVE-2017-1000380" ref_url="https://www.suse.com/security/cve/CVE-2017-1000380/" source="CVE"/>
		<reference ref_id="CVE-2017-8924" ref_url="https://www.suse.com/security/cve/CVE-2017-8924/" source="CVE"/>
		<reference ref_id="CVE-2017-8925" ref_url="https://www.suse.com/security/cve/CVE-2017-8925/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP3 Teradata kernel was updated to fix bugs and security issues.

A previous security update to address CVE-2017-1000364 caused unintended side-effects in several other tools, most
notably Java. These issues have been remedied:

- mm/mmap: Do not blow on PROT_NONE MAP_FIXED holes in the stack. (bsc#1039348, bsc#1045340, bsc#1045406)
- mm: Do not collapse stack gap into THP. (bsc#1039348, CVE-2017-1000364)

The following other security issues have been fixed:

- usb/serial/io_ti: Fix information leak in completion handler. (bsc#1038982, CVE-2017-8924)
- usb/serial/omninet: Fix reference leaks at open. (bsc#1038981, CVE-2017-8925)
- alsa/timer: Fix missing queue indices reset at SNDRV_TIMER_IOCTL_SELECT. (bsc#1044125, CVE-2017-1000380)
- alsa/timer: Fix race between read and ioctl. (bsc#1044125, CVE-2017-1000380)

Additionally the following non-security bug has been fixed:

- Remove superfluous make flags. (bsc#1012422)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-27"/>
	<updated date="2017-06-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038981">SUSE bug 1038981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038982">SUSE bug 1038982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044125">SUSE bug 1044125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045340">SUSE bug 1045340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045406">SUSE bug 1045406</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000364/">CVE-2017-1000364 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000364">CVE-2017-1000364 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000380/">CVE-2017-1000380 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000380">CVE-2017-1000380 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-8924/">CVE-2017-8924 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8924">CVE-2017-8924 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8925/">CVE-2017-8925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8925">CVE-2017-8925 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993064" comment="kernel-default-3.0.101-0.125.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993065" comment="kernel-default-base-3.0.101-0.125.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993067" comment="kernel-ec2-3.0.101-0.125.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993068" comment="kernel-ec2-base-3.0.101-0.125.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993070" comment="kernel-source-3.0.101-0.125.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993071" comment="kernel-syms-3.0.101-0.125.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993072" comment="kernel-trace-3.0.101-0.125.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993073" comment="kernel-trace-base-3.0.101-0.125.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993075" comment="kernel-xen-3.0.101-0.125.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993076" comment="kernel-xen-base-3.0.101-0.125.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218803" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1035544" ref_url="https://bugzilla.suse.com/1035544" source="BUGZILLA"/>
		<reference ref_id="1037994" ref_url="https://bugzilla.suse.com/1037994" source="BUGZILLA"/>
		<reference ref_id="1039354" ref_url="https://bugzilla.suse.com/1039354" source="BUGZILLA"/>
		<reference ref_id="1042863" ref_url="https://bugzilla.suse.com/1042863" source="BUGZILLA"/>
		<reference ref_id="1045487" ref_url="https://bugzilla.suse.com/1045487" source="BUGZILLA"/>
		<reference ref_id="1046107" ref_url="https://bugzilla.suse.com/1046107" source="BUGZILLA"/>
		<reference ref_id="1048275" ref_url="https://bugzilla.suse.com/1048275" source="BUGZILLA"/>
		<reference ref_id="1049483" ref_url="https://bugzilla.suse.com/1049483" source="BUGZILLA"/>
		<reference ref_id="1049603" ref_url="https://bugzilla.suse.com/1049603" source="BUGZILLA"/>
		<reference ref_id="1049882" ref_url="https://bugzilla.suse.com/1049882" source="BUGZILLA"/>
		<reference ref_id="1052311" ref_url="https://bugzilla.suse.com/1052311" source="BUGZILLA"/>
		<reference ref_id="1053148" ref_url="https://bugzilla.suse.com/1053148" source="BUGZILLA"/>
		<reference ref_id="1053152" ref_url="https://bugzilla.suse.com/1053152" source="BUGZILLA"/>
		<reference ref_id="1054302" ref_url="https://bugzilla.suse.com/1054302" source="BUGZILLA"/>
		<reference ref_id="1056588" ref_url="https://bugzilla.suse.com/1056588" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000112" ref_url="https://www.suse.com/security/cve/CVE-2017-1000112/" source="CVE"/>
		<reference ref_id="CVE-2017-1000365" ref_url="https://www.suse.com/security/cve/CVE-2017-1000365/" source="CVE"/>
		<reference ref_id="CVE-2017-10661" ref_url="https://www.suse.com/security/cve/CVE-2017-10661/" source="CVE"/>
		<reference ref_id="CVE-2017-11176" ref_url="https://www.suse.com/security/cve/CVE-2017-11176/" source="CVE"/>
		<reference ref_id="CVE-2017-11473" ref_url="https://www.suse.com/security/cve/CVE-2017-11473/" source="CVE"/>
		<reference ref_id="CVE-2017-12762" ref_url="https://www.suse.com/security/cve/CVE-2017-12762/" source="CVE"/>
		<reference ref_id="CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051/" source="CVE"/>
		<reference ref_id="CVE-2017-7482" ref_url="https://www.suse.com/security/cve/CVE-2017-7482/" source="CVE"/>
		<reference ref_id="CVE-2017-7533" ref_url="https://www.suse.com/security/cve/CVE-2017-7533/" source="CVE"/>
		<reference ref_id="CVE-2017-7542" ref_url="https://www.suse.com/security/cve/CVE-2017-7542/" source="CVE"/>
		<reference ref_id="CVE-2017-8831" ref_url="https://www.suse.com/security/cve/CVE-2017-8831/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP3 Teradata kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-14051: An integer overflow in qla2x00_sysfs_write_optrom_ctl function allowed local users to cause a denial of service (memory corruption and system crash) by leveraging root access (bnc#1056588).
- CVE-2017-1000112: Easy to exploit memory corruption in UFO to non-UFO path switch (bsc#1052311).
- CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel queueing (bnc#1053152).
- CVE-2017-12762: A user-controlled buffer wasa copied into a local buffer of constant size using strcpy without a length check which could have caused a buffer overflow (bnc#1053148).
- CVE-2017-8831: The saa7164_bus_get function allowed local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a 'double fetch' vulnerability (bnc#1037994).
- CVE-2017-7542: The ip6_find_1stfragopt function allowed local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket (bnc#1049882).
- CVE-2017-7482: Fixed several cases where a padded len was not 't checked when decoding tickets (bsc#1046107).
- CVE-2017-7533: Race condition in the fsnotify implementation allowed local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions (bnc#1049483).
- CVE-2017-11176: The mq_notify function did not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allowed attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact (bnc#1048275).
- CVE-2017-11473: Buffer overflow in the mp_override_legacy_irq() function allowed local users to gain privileges via a crafted ACPI table (bnc#1049603).
- CVE-2017-1000365: Size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size) did not take the argument and environment pointers into account, which allowed attackers to bypass this limitation (bnc#1039354).
- blkback/blktap: Prevent leak of stack data via response ring. This issue allowed malicious unprivileged guest to obtain sensitive information from the host or other guests (bsc#1042863).

The following non-security bugs were fixed:

- Deleting a gendisk that is not up should not be an error (bsc#1035544).
- USB: wusbcore: fix NULL-deref at probe (bsc#1045487).
- coredump: ensure that SIGKILL always kills the dumping thread (bnc#1054302).
- coredump: only SIGKILL should interrupt the coredumping task (bnc#1054302).
- coredump: sanitize the setting of signal-&gt;group_exit_code (bnc#1054302).
- dentry name snapshots (bsc#1049483).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-07"/>
	<updated date="2017-09-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1035544">SUSE bug 1035544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037994">SUSE bug 1037994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039354">SUSE bug 1039354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042863">SUSE bug 1042863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045487">SUSE bug 1045487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046107">SUSE bug 1046107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048275">SUSE bug 1048275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049483">SUSE bug 1049483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049603">SUSE bug 1049603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049882">SUSE bug 1049882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052311">SUSE bug 1052311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053148">SUSE bug 1053148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053152">SUSE bug 1053152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054302">SUSE bug 1054302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056588">SUSE bug 1056588</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000112/">CVE-2017-1000112 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000112">CVE-2017-1000112 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000365/">CVE-2017-1000365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000365">CVE-2017-1000365 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10661/">CVE-2017-10661 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10661">CVE-2017-10661 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11176/">CVE-2017-11176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11176">CVE-2017-11176 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11473/">CVE-2017-11473 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11473">CVE-2017-11473 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12762/">CVE-2017-12762 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12762">CVE-2017-12762 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14051">CVE-2017-14051 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7482/">CVE-2017-7482 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7482">CVE-2017-7482 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7533/">CVE-2017-7533 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7533">CVE-2017-7533 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7542/">CVE-2017-7542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7542">CVE-2017-7542 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8831/">CVE-2017-8831 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8831">CVE-2017-8831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993078" comment="kernel-default-3.0.101-0.126.5.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993079" comment="kernel-default-base-3.0.101-0.126.5.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993081" comment="kernel-ec2-3.0.101-0.126.5.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993082" comment="kernel-ec2-base-3.0.101-0.126.5.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993084" comment="kernel-source-3.0.101-0.126.5.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993085" comment="kernel-syms-3.0.101-0.126.5.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993086" comment="kernel-trace-3.0.101-0.126.5.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993087" comment="kernel-trace-base-3.0.101-0.126.5.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993089" comment="kernel-xen-3.0.101-0.126.5.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993090" comment="kernel-xen-base-3.0.101-0.126.5.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218804" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1052653" ref_url="https://bugzilla.suse.com/1052653" source="BUGZILLA"/>
		<reference ref_id="1057179" ref_url="https://bugzilla.suse.com/1057179" source="BUGZILLA"/>
		<reference ref_id="1057389" ref_url="https://bugzilla.suse.com/1057389" source="BUGZILLA"/>
		<reference ref_id="1058524" ref_url="https://bugzilla.suse.com/1058524" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251/" source="CVE"/>
		<reference ref_id="CVE-2017-14140" ref_url="https://www.suse.com/security/cve/CVE-2017-14140/" source="CVE"/>
		<reference ref_id="CVE-2017-14340" ref_url="https://www.suse.com/security/cve/CVE-2017-14340/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP3 Teradata kernel was updated to fix bugs and security issues.

The following security issues have been fixed:

- CVE-2017-1000251: bluetooth: Properly check L2CAP configuration option output buffer length. (bsc#1057389)
- CVE-2017-14340: xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present. (bsc#1058524)
- CVE-2017-14140: Sanitize 'move_pages()' permission checks. (bsc#1057179)

Additionally, the following non-security issue has been fixed:

- Fix crash in nfs4_open_prepare (bsc#1052653).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-29"/>
	<updated date="2017-09-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1052653">SUSE bug 1052653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057179">SUSE bug 1057179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057389">SUSE bug 1057389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058524">SUSE bug 1058524</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000251">CVE-2017-1000251 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14140/">CVE-2017-14140 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14140">CVE-2017-14140 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14340/">CVE-2017-14340 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14340">CVE-2017-14340 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993092" comment="kernel-default-3.0.101-0.132.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993093" comment="kernel-default-base-3.0.101-0.132.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993095" comment="kernel-ec2-3.0.101-0.132.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993096" comment="kernel-ec2-base-3.0.101-0.132.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993098" comment="kernel-source-3.0.101-0.132.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993099" comment="kernel-syms-3.0.101-0.132.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993100" comment="kernel-trace-3.0.101-0.132.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993101" comment="kernel-trace-base-3.0.101-0.132.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993103" comment="kernel-xen-3.0.101-0.132.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993104" comment="kernel-xen-base-3.0.101-0.132.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218805" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1045327" ref_url="https://bugzilla.suse.com/1045327" source="BUGZILLA"/>
		<reference ref_id="1059525" ref_url="https://bugzilla.suse.com/1059525" source="BUGZILLA"/>
		<reference ref_id="1062471" ref_url="https://bugzilla.suse.com/1062471" source="BUGZILLA"/>
		<reference ref_id="1062520" ref_url="https://bugzilla.suse.com/1062520" source="BUGZILLA"/>
		<reference ref_id="1063544" ref_url="https://bugzilla.suse.com/1063544" source="BUGZILLA"/>
		<reference ref_id="1063667" ref_url="https://bugzilla.suse.com/1063667" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000253" ref_url="https://www.suse.com/security/cve/CVE-2017-1000253/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-15265" ref_url="https://www.suse.com/security/cve/CVE-2017-15265/" source="CVE"/>
		<reference ref_id="CVE-2017-15274" ref_url="https://www.suse.com/security/cve/CVE-2017-15274/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP3 Teradata kernel was updated to fix bugs and security issues.

The following security issues have been fixed:

- CVE-2017-13080: mac80211: Accept key reinstall without changing anything. (bsc#1063667)
- CVE-2017-15274: keys: Fix dereferencing NULL payload with nonzero length. (bsc#1045327, bsc#1062471)
- CVE-2017-15265: alsa: Fix use-after-free at creating a port. (bsc#1062520)
- CVE-2017-1000253: fs/binfmt: Fix bug in loading of PIE binaries. (bsc#1059525)

Additionally, the following non-security issue has been fixed:

- nfs: Remove asserts from the NFS XDR code. (bsc#1063544)
- fs/binfmt_elf: Return -EINVAL on zero-length mappings. (bsc#1059525)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-24"/>
	<updated date="2017-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045327">SUSE bug 1045327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059525">SUSE bug 1059525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062471">SUSE bug 1062471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062520">SUSE bug 1062520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063544">SUSE bug 1063544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000253/">CVE-2017-1000253 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000253">CVE-2017-1000253 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15265/">CVE-2017-15265 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15265">CVE-2017-15265 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15274/">CVE-2017-15274 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15274">CVE-2017-15274 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993106" comment="kernel-default-3.0.101-0.139.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993107" comment="kernel-default-base-3.0.101-0.139.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993109" comment="kernel-ec2-3.0.101-0.139.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993110" comment="kernel-ec2-base-3.0.101-0.139.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993112" comment="kernel-source-3.0.101-0.139.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993113" comment="kernel-syms-3.0.101-0.139.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993114" comment="kernel-trace-3.0.101-0.139.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993115" comment="kernel-trace-base-3.0.101-0.139.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993117" comment="kernel-xen-3.0.101-0.139.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993118" comment="kernel-xen-base-3.0.101-0.139.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218806" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1059240" ref_url="https://bugzilla.suse.com/1059240" source="BUGZILLA"/>
		<reference ref_id="1066472" ref_url="https://bugzilla.suse.com/1066472" source="BUGZILLA"/>
		<reference ref_id="1066573" ref_url="https://bugzilla.suse.com/1066573" source="BUGZILLA"/>
		<reference ref_id="1066606" ref_url="https://bugzilla.suse.com/1066606" source="BUGZILLA"/>
		<reference ref_id="1066618" ref_url="https://bugzilla.suse.com/1066618" source="BUGZILLA"/>
		<reference ref_id="1066625" ref_url="https://bugzilla.suse.com/1066625" source="BUGZILLA"/>
		<reference ref_id="1066650" ref_url="https://bugzilla.suse.com/1066650" source="BUGZILLA"/>
		<reference ref_id="1066671" ref_url="https://bugzilla.suse.com/1066671" source="BUGZILLA"/>
		<reference ref_id="1066700" ref_url="https://bugzilla.suse.com/1066700" source="BUGZILLA"/>
		<reference ref_id="1066705" ref_url="https://bugzilla.suse.com/1066705" source="BUGZILLA"/>
		<reference ref_id="1067085" ref_url="https://bugzilla.suse.com/1067085" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15102" ref_url="https://www.suse.com/security/cve/CVE-2017-15102/" source="CVE"/>
		<reference ref_id="CVE-2017-16525" ref_url="https://www.suse.com/security/cve/CVE-2017-16525/" source="CVE"/>
		<reference ref_id="CVE-2017-16527" ref_url="https://www.suse.com/security/cve/CVE-2017-16527/" source="CVE"/>
		<reference ref_id="CVE-2017-16529" ref_url="https://www.suse.com/security/cve/CVE-2017-16529/" source="CVE"/>
		<reference ref_id="CVE-2017-16531" ref_url="https://www.suse.com/security/cve/CVE-2017-16531/" source="CVE"/>
		<reference ref_id="CVE-2017-16535" ref_url="https://www.suse.com/security/cve/CVE-2017-16535/" source="CVE"/>
		<reference ref_id="CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536/" source="CVE"/>
		<reference ref_id="CVE-2017-16537" ref_url="https://www.suse.com/security/cve/CVE-2017-16537/" source="CVE"/>
		<reference ref_id="CVE-2017-16649" ref_url="https://www.suse.com/security/cve/CVE-2017-16649/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP3 Teradata kernel was updated to fix bugs and security issues.

The following security issues have been fixed:

- CVE-2017-16649: net/cdc_ether: Fix divide by 0 on bad descriptors. (bsc#1067085)
- CVE-2017-16649: input/gtco: Fix potential out-of-bound access. (bsc#1067085)
- CVE-2017-16535: usb/core: Fix out-of-bounds access bug in usb_get_bos_descriptor(). (bsc#1066700)
- CVE-2017-15102: usb/misc/legousbtower: Fix NULL pointer dereference. (bsc#1066705)
- CVE-2017-16531: usb: Fix out-of-bounds in usb_set_configuration. (bsc#1066671)
- CVE-2017-16529: alsa/usb-audio: Check out-of-bounds access by corrupted buffer descriptor. (bsc#1066650)
- CVE-2017-16525: usb/serial/console: Fix use-after-free after failed setup. (bsc#1066618)
- CVE-2017-16537: media/imon: Fix NULL pointer dereference in imon_probe. (bsc#1066573)
- CVE-2017-16536: cx231xx-cards: Fix NULL pointer dereference on missing association descriptor. (bsc#1066606)
- CVE-2017-16527: alsa/usb-audio: Kill stray URB at exiting. (bsc#1066625)

Additionally, the following non-security issues have been fixed:

- kernel/params.c: Fix an overflow in param_attr_show. (bsc#1059240)
- mac80211: Don't compare TKIP TX MIC key in reinstall prevention. (bsc#1066472)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-01"/>
	<updated date="2017-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059240">SUSE bug 1059240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066472">SUSE bug 1066472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066573">SUSE bug 1066573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066606">SUSE bug 1066606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066618">SUSE bug 1066618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066625">SUSE bug 1066625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066650">SUSE bug 1066650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066671">SUSE bug 1066671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066700">SUSE bug 1066700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066705">SUSE bug 1066705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067085">SUSE bug 1067085</bugzilla>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15102/">CVE-2017-15102 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15102">CVE-2017-15102 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16525/">CVE-2017-16525 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16525">CVE-2017-16525 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16527/">CVE-2017-16527 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16527">CVE-2017-16527 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16529/">CVE-2017-16529 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16529">CVE-2017-16529 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16531/">CVE-2017-16531 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16531">CVE-2017-16531 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16535/">CVE-2017-16535 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16535">CVE-2017-16535 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16536">CVE-2017-16536 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16537/">CVE-2017-16537 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16537">CVE-2017-16537 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16649/">CVE-2017-16649 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16649">CVE-2017-16649 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993120" comment="kernel-default-3.0.101-0.142.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993121" comment="kernel-default-base-3.0.101-0.142.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993123" comment="kernel-ec2-3.0.101-0.142.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993124" comment="kernel-ec2-base-3.0.101-0.142.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993126" comment="kernel-source-3.0.101-0.142.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993127" comment="kernel-syms-3.0.101-0.142.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993128" comment="kernel-trace-3.0.101-0.142.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993129" comment="kernel-trace-base-3.0.101-0.142.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993131" comment="kernel-xen-3.0.101-0.142.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993132" comment="kernel-xen-base-3.0.101-0.142.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218807" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1034862" ref_url="https://bugzilla.suse.com/1034862" source="BUGZILLA"/>
		<reference ref_id="1050231" ref_url="https://bugzilla.suse.com/1050231" source="BUGZILLA"/>
		<reference ref_id="1056982" ref_url="https://bugzilla.suse.com/1056982" source="BUGZILLA"/>
		<reference ref_id="1066569" ref_url="https://bugzilla.suse.com/1066569" source="BUGZILLA"/>
		<reference ref_id="1066693" ref_url="https://bugzilla.suse.com/1066693" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068671" ref_url="https://bugzilla.suse.com/1068671" source="BUGZILLA"/>
		<reference ref_id="1069702" ref_url="https://bugzilla.suse.com/1069702" source="BUGZILLA"/>
		<reference ref_id="1070771" ref_url="https://bugzilla.suse.com/1070771" source="BUGZILLA"/>
		<reference ref_id="1071074" ref_url="https://bugzilla.suse.com/1071074" source="BUGZILLA"/>
		<reference ref_id="1071470" ref_url="https://bugzilla.suse.com/1071470" source="BUGZILLA"/>
		<reference ref_id="1071695" ref_url="https://bugzilla.suse.com/1071695" source="BUGZILLA"/>
		<reference ref_id="1072561" ref_url="https://bugzilla.suse.com/1072561" source="BUGZILLA"/>
		<reference ref_id="1072876" ref_url="https://bugzilla.suse.com/1072876" source="BUGZILLA"/>
		<reference ref_id="1073792" ref_url="https://bugzilla.suse.com/1073792" source="BUGZILLA"/>
		<reference ref_id="1073874" ref_url="https://bugzilla.suse.com/1073874" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11600" ref_url="https://www.suse.com/security/cve/CVE-2017-11600/" source="CVE"/>
		<reference ref_id="CVE-2017-13167" ref_url="https://www.suse.com/security/cve/CVE-2017-13167/" source="CVE"/>
		<reference ref_id="CVE-2017-14106" ref_url="https://www.suse.com/security/cve/CVE-2017-14106/" source="CVE"/>
		<reference ref_id="CVE-2017-15115" ref_url="https://www.suse.com/security/cve/CVE-2017-15115/" source="CVE"/>
		<reference ref_id="CVE-2017-15868" ref_url="https://www.suse.com/security/cve/CVE-2017-15868/" source="CVE"/>
		<reference ref_id="CVE-2017-16534" ref_url="https://www.suse.com/security/cve/CVE-2017-16534/" source="CVE"/>
		<reference ref_id="CVE-2017-16538" ref_url="https://www.suse.com/security/cve/CVE-2017-16538/" source="CVE"/>
		<reference ref_id="CVE-2017-16939" ref_url="https://www.suse.com/security/cve/CVE-2017-16939/" source="CVE"/>
		<reference ref_id="CVE-2017-17450" ref_url="https://www.suse.com/security/cve/CVE-2017-17450/" source="CVE"/>
		<reference ref_id="CVE-2017-17558" ref_url="https://www.suse.com/security/cve/CVE-2017-17558/" source="CVE"/>
		<reference ref_id="CVE-2017-17805" ref_url="https://www.suse.com/security/cve/CVE-2017-17805/" source="CVE"/>
		<reference ref_id="CVE-2017-17806" ref_url="https://www.suse.com/security/cve/CVE-2017-17806/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2017-7472" ref_url="https://www.suse.com/security/cve/CVE-2017-7472/" source="CVE"/>
		<reference ref_id="CVE-2017-8824" ref_url="https://www.suse.com/security/cve/CVE-2017-8824/" source="CVE"/>
		<description>


The SUSE Linux Enterprise 11 SP3 for Teradata kernel was updated to receive various security and bugfixes.

This update adds mitigations for various side channel attacks against modern CPUs that could disclose
content of otherwise unreadable memory (bnc#1068032).

- CVE-2017-5753: Local attackers on systems with modern CPUs featuring
  deep instruction pipelining could use attacker controllable speculative
  execution over code patterns in the Linux Kernel to leak content from
  otherwise not readable memory in the same address space, allowing
  retrieval of passwords, cryptographic keys and other secrets.

  This problem is mitigated by adding speculative fencing on affected
  code paths throughout the Linux kernel.


- CVE-2017-5715: Local attackers on systems with modern CPUs featuring
  branch prediction could use mispredicted branches to speculatively execute
  code patterns that in turn could be made to leak other non-readable
  content in the same address space, an attack similar to CVE-2017-5753.

  This problem is mitigated by disabling predictive branches, depending
  on CPU architecture either by firmware updates and/or fixes in the
  user-kernel privilege boundaries.

  This is done with help of Linux Kernel fixes on the Intel/AMD x86_64
  architecture.
  On x86_64, this requires also updates of the CPU microcode packages,
  delivered in seperate updates.

  As this feature can have a performance impact, it can be disabled
  using the 'nospec' kernel commandline option.


- CVE-2017-5754: Local attackers on systems with modern CPUs featuring
  deep instruction pipelining could use code patterns in userspace to
  speculative executive code that would read otherwise read protected
  memory, an attack similar to CVE-2017-5753.

  This problem is mitigated by unmapping the Linux Kernel from the user
  address space during user code execution, following a approach called
  'KAISER'. The terms used here are 'KAISER' / 'Kernel Address Isolation'
  and 'PTI' / 'Page Table Isolation'.

  This feature can be enabled / disabled by the 'pti=[on|off|auto]' or
  'nopti' commandline options.


The following security bugs were fixed:

- CVE-2017-17806: The HMAC implementation (crypto/hmac.c) in the Linux kernel did not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization (bnc#1073874).
- CVE-2017-17805: The Salsa20 encryption algorithm in the Linux kernel did not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable (bnc#1073792).
- CVE-2017-15868: The bnep_add_connection function in net/bluetooth/bnep/core.c in the Linux kernel did not ensure that an l2cap socket is available, which allowed local users to gain privileges via a crafted application (bnc#1071470).
- CVE-2017-13167: An elevation of privilege vulnerability in the kernel sound timer. (bnc#1072876).
- CVE-2017-16538: drivers/media/usb/dvb-usb-v2/lmedm04.c in the Linux kernel allowed local users to cause a denial of service (general protection fault and system crash) or possibly have unspecified other impact via a crafted USB device, related to a missing warm-start check and incorrect attach timing (dm04_lme2510_frontend_attach versus dm04_lme2510_tuner) (bnc#1066569).
- CVE-2017-17558: The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel did not consider the maximum number of configurations and interfaces before attempting to release resources, which allowed local users to cause a denial of service (out-of-bounds write access) or possibly have unspecified other impact via a crafted USB device (bnc#1072561).
- CVE-2017-17450: net/netfilter/xt_osf.c in the Linux kernel did not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allowed local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces (bnc#1071695).
- CVE-2017-8824: The dccp_disconnect function in net/dccp/proto.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state (bnc#1070771).
- CVE-2017-16939: The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages (bnc#1069702).
- CVE-2017-15115: The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel did not check whether the intended netns is used in a peel-off action, which allowed local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls (bnc#1068671).
- CVE-2017-14106: The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel allowed local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path (bnc#1056982).
- CVE-2017-11600: net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bnc#1050231).
- CVE-2017-7472: The KEYS subsystem in the Linux kernel allowed local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls (bnc#1034862).
- CVE-2017-16534: The cdc_parse_cdc_header function in drivers/usb/core/message.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066693).

The following non-security bugs were fixed:

- asm alternatives: remove incorrect alignment notes.
- kabi: silence spurious kabi error in net/sctp/socket.c (bsc#1068671).
- kaiser: add 'nokaiser' boot option, using ALTERNATIVE.
- kaiser: fix ldt freeing.
- kaiser: Kernel Address Isolation.
- kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush.
- kvm: SVM: Do not intercept new speculative control MSRs (bsc#1068032).
- kvm: x86: Add speculative control CPUID support for guests (bsc#1068032).
- mm/mmu_context, sched/core: Fix mmu_context.h assumption.
- ptrace: Add a new thread access check (bsc#1068032).
- sched/core: Add switch_mm_irqs_off() and use it in the scheduler.
- sched/core: Idle_task_exit() shouldn't use switch_mm_irqs_off().
- temporary fix (bsc#1068032).
- usb: uas: fix bug in handling of alternate settings (bsc#1071074).
- x86-64: Give vvars their own page.
- x86-64: Map the HPET NX.
- x86/alternatives: Add instruction padding.
- x86/alternatives: Cleanup DPRINTK macro.
- x86/alternatives: Make JMPs more robust.
- x86/alternatives: Use optimized NOPs for padding.
- x86/boot: Add early cmdline parsing for options with arguments.
- x86, boot: Carve out early cmdline parsing function.
- x86/CPU/AMD: Add speculative control support for AMD (bsc#1068032).
- x86/CPU/AMD: Make the LFENCE instruction serialized (bsc#1068032).
- x86/CPU/AMD: Remove now unused definition of MFENCE_RDTSC feature (bsc#1068032).
- x86/CPU: Check speculation control CPUID bit (bsc#1068032).
- x86/enter: Add macros to set/clear IBRS and set IBPB (bsc#1068032).
- x86/entry: Add a function to overwrite the RSB (bsc#1068032).
- x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (bsc#1068032).
- x86/entry: Use IBRS on entry to kernel space (bsc#1068032).
- x86/feature: Enable the x86 feature to control Speculation (bsc#1068032).
- x86/idle: Disable IBRS when offlining a CPU and re-enable on wakeup (bsc#1068032).
- x86/idle: Toggle IBRS when going idle (bsc#1068032).
- x86/kaiser: Check boottime cmdline params.
- x86/kaiser: disable vmstat accounting.
- x86/kaiser: Move feature detection up (bsc#1068032).
- x86/kaiser: propagate info to /proc/cpuinfo.
- x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling.
- x86/kvm: Add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm (bsc#1068032).
- x86/kvm: Flush IBP when switching VMs (bsc#1068032).
- x86/kvm: Pad RSB on VM transition (bsc#1068032).
- x86/kvm: Toggle IBRS on VM entry and exit (bsc#1068032).
- x86: Make alternative instruction pointers relative.
- x86/microcode/AMD: Add support for fam17h microcode loading (bsc#1068032).
- x86/mm/64: Fix reboot interaction with CR4.PCIDE.
- x86/mm: Add a 'noinvpcid' boot option to turn off INVPCID.
- x86/mm: Add INVPCID helpers.
- x86/mm: Add the 'nopcid' boot option to turn off PCID.
- x86/mm: Build arch/x86/mm/tlb.c even on !SMP.
- x86/mm: Disable PCID on 32-bit kernels.
- x86/mm: Enable CR4.PCIDE on supported systems.
- x86/mm: fix bad backport to disable PCID on Xen.
- x86/mm: Fix INVPCID asm constraint.
- x86/mm: If INVPCID is available, use it to flush global mappings.
- x86/mm/kaiser: re-enable vsyscalls.
- x86/mm: Only set IBPB when the new thread cannot ptrace current thread (bsc#1068032).
- x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code.
- x86/mm, sched/core: Turn off IRQs in switch_mm().
- x86/mm, sched/core: Uninline switch_mm().
- x86/mm: Set IBPB upon context switch (bsc#1068032).
- x86/MSR: Move native_*msr(.. u64) to msr.h (bsc#1068032).
- x86/spec: Add IBRS control functions (bsc#1068032).
- x86/spec: Add 'nospec' chicken bit (bsc#1068032).
- x86/spec: Check CPUID direclty post microcode reload to support IBPB feature (bsc#1068032).
- x86/spec_ctrl: Add an Indirect Branch Predictor barrier (bsc#1068032).
- x86/spec_ctrl: Check whether IBPB is enabled before using it (bsc#1068032).
- x86/spec_ctrl: Check whether IBRS is enabled before using it (bsc#1068032).
- x86/svm: Add code to clear registers on VM exit (bsc#1068032).
- x86/svm: Clobber the RSB on VM exit (bsc#1068032).
- x86/svm: Set IBPB when running a different VCPU (bsc#1068032).
- x86/svm: Set IBRS value on VM entry and exit (bsc#1068032).
- xen/kaiser: add 'nokaiser' boot option, using ALTERNATIVE.
- xen/KAISER: Kernel Address Isolation.
- xen/kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush.
- xen/kaiser: work around kABI.
- xen/x86-64: Give vvars their own page.
- xen/x86-64: Map the HPET NX.
- xen/x86/alternatives: Add instruction padding.
- xen/x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling.
- xen/x86/mm: Enable CR4.PCIDE on supported systems.
- xen/x86/mm/kaiser: re-enable vsyscalls.
- xen/x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code.
- xen: x86/mm, sched/core: Turn off IRQs in switch_mm().
- xen: x86/mm, sched/core: Uninline switch_mm().
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-05"/>
	<updated date="2018-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1034862">SUSE bug 1034862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050231">SUSE bug 1050231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056982">SUSE bug 1056982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066569">SUSE bug 1066569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066693">SUSE bug 1066693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068671">SUSE bug 1068671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069702">SUSE bug 1069702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070771">SUSE bug 1070771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071074">SUSE bug 1071074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071470">SUSE bug 1071470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071695">SUSE bug 1071695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072561">SUSE bug 1072561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072876">SUSE bug 1072876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073792">SUSE bug 1073792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073874">SUSE bug 1073874</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11600/">CVE-2017-11600 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11600">CVE-2017-11600 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13167/">CVE-2017-13167 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13167">CVE-2017-13167 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14106/">CVE-2017-14106 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14106">CVE-2017-14106 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15115/">CVE-2017-15115 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15115">CVE-2017-15115 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15868/">CVE-2017-15868 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15868">CVE-2017-15868 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16534/">CVE-2017-16534 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16534">CVE-2017-16534 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16538/">CVE-2017-16538 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16538">CVE-2017-16538 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16939/">CVE-2017-16939 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16939">CVE-2017-16939 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17450/">CVE-2017-17450 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17450">CVE-2017-17450 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17558/">CVE-2017-17558 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17558">CVE-2017-17558 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17805/">CVE-2017-17805 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17805">CVE-2017-17805 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17806/">CVE-2017-17806 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17806">CVE-2017-17806 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5754">CVE-2017-5754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7472/">CVE-2017-7472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7472">CVE-2017-7472 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8824/">CVE-2017-8824 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8824">CVE-2017-8824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993134" comment="kernel-default-3.0.101-0.145.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993135" comment="kernel-default-base-3.0.101-0.145.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993137" comment="kernel-ec2-3.0.101-0.145.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993138" comment="kernel-ec2-base-3.0.101-0.145.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993140" comment="kernel-source-3.0.101-0.145.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993141" comment="kernel-syms-3.0.101-0.145.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993142" comment="kernel-trace-3.0.101-0.145.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993143" comment="kernel-trace-base-3.0.101-0.145.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993145" comment="kernel-xen-3.0.101-0.145.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993146" comment="kernel-xen-base-3.0.101-0.145.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218808" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068984" ref_url="https://bugzilla.suse.com/1068984" source="BUGZILLA"/>
		<reference ref_id="1074709" ref_url="https://bugzilla.suse.com/1074709" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075410" ref_url="https://bugzilla.suse.com/1075410" source="BUGZILLA"/>
		<reference ref_id="1075908" ref_url="https://bugzilla.suse.com/1075908" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1076017" ref_url="https://bugzilla.suse.com/1076017" source="BUGZILLA"/>
		<reference ref_id="1076154" ref_url="https://bugzilla.suse.com/1076154" source="BUGZILLA"/>
		<reference ref_id="1076278" ref_url="https://bugzilla.suse.com/1076278" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13215" ref_url="https://www.suse.com/security/cve/CVE-2017-13215/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP3 for Teradata kernel was updated to receive various security and bugfixes.

The following security issues have been fixed:

- CVE-2017-13215: crypto/algif_skcipher: Load TX SG list after waiting. (bsc#1075908)
- CVE-2018-1000004: alsa/seq: Make ioctls race-free. (bsc#1076017)
- CVE-2017-5754: kaiser: Disabled on Xen PV. (bsc#1012382 bsc#1068032, bsc#1076154).

Additionally, the following non-security issues have been fixed:

- kaiser: Set _PAGE_NX only if supported. (bnc#1012382, bnc#1076278)
- x86/kaiser: Populate shadow PGD with NX bit only if supported by platform. (bsc#1076154, bsc#1076278)
- x86/paravirt: Dont patch flush_tlb_single. (bsc#1012382, bsc#1076154)
- x86/spec_ctrl: Handle late setting of X86_FEATURE_SPEC_CTRL properly. (bsc#1075994, bsc#1075091)
- x86/spectre_v2: Fix ordering in IBRS initialization. (bsc#1075994, bsc#1075091)
- x86/microcode: Rescan feature flags upon late loading. (bsc#1075994, bsc#1075091)
- x86/CPU: Sync CPU feature flags late. (bsc#1075994, bsc#1075091)
- x86/cpu: Factor out application of forced CPU caps. (bsc#1075994, bsc#1075091)
- storvsc: Do not assume SG list is continuous when doing bounce buffers. (bsc#1075410)
- pti: Unbreak EFI. (bsc#1074709)
- x86/acpi: Reduce code duplication in mp_override_legacy_irq(). (bsc#1068984)
- x86/acpi: Handle SCI interrupts above legacy space gracefully. (bsc#1068984)
- x86/acpi: Reduce code duplication in mp_override_legacy_irq(). (bsc#1068984)
- x86/acpi: Handle SCI interrupts above legacy space gracefully. (bsc#1068984)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-23"/>
	<updated date="2018-01-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068984">SUSE bug 1068984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074709">SUSE bug 1074709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075410">SUSE bug 1075410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075908">SUSE bug 1075908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076154">SUSE bug 1076154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076278">SUSE bug 1076278</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13215/">CVE-2017-13215 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13215">CVE-2017-13215 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5754">CVE-2017-5754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000004">CVE-2018-1000004 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993148" comment="kernel-default-3.0.101-0.150.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993149" comment="kernel-default-base-3.0.101-0.150.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993151" comment="kernel-ec2-3.0.101-0.150.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993152" comment="kernel-ec2-base-3.0.101-0.150.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993154" comment="kernel-source-3.0.101-0.150.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993155" comment="kernel-syms-3.0.101-0.150.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993156" comment="kernel-trace-3.0.101-0.150.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993157" comment="kernel-trace-base-3.0.101-0.150.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993159" comment="kernel-xen-3.0.101-0.150.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993160" comment="kernel-xen-base-3.0.101-0.150.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218809" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003616.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

This update is only provided as a fix update for IBM Z platform.

- CVE-2017-5753 / 'Spectre Attack': IBM Z fixes were included but not enabled in the previous update. This update enables those fixes.
- CVE-2017-5715 / 'Spectre Attack': IBM Z fixes were already included in the previous update. A bugfix for the patches has been applied on top.
- CVE-2017-5754: The IBM Z architecture is not affected by the 'Meltdown' attack.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-22"/>
	<updated date="2018-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578451" comment="kernel-default-3.0.101-0.47.106.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578452" comment="kernel-default-base-3.0.101-0.47.106.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578454" comment="kernel-default-man-3.0.101-0.47.106.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578455" comment="kernel-source-3.0.101-0.47.106.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578456" comment="kernel-syms-3.0.101-0.47.106.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578457" comment="kernel-trace-3.0.101-0.47.106.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578458" comment="kernel-trace-base-3.0.101-0.47.106.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218810" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1054305" ref_url="https://bugzilla.suse.com/1054305" source="BUGZILLA"/>
		<reference ref_id="1060279" ref_url="https://bugzilla.suse.com/1060279" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068984" ref_url="https://bugzilla.suse.com/1068984" source="BUGZILLA"/>
		<reference ref_id="1070781" ref_url="https://bugzilla.suse.com/1070781" source="BUGZILLA"/>
		<reference ref_id="1073311" ref_url="https://bugzilla.suse.com/1073311" source="BUGZILLA"/>
		<reference ref_id="1074488" ref_url="https://bugzilla.suse.com/1074488" source="BUGZILLA"/>
		<reference ref_id="1074621" ref_url="https://bugzilla.suse.com/1074621" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075410" ref_url="https://bugzilla.suse.com/1075410" source="BUGZILLA"/>
		<reference ref_id="1075617" ref_url="https://bugzilla.suse.com/1075617" source="BUGZILLA"/>
		<reference ref_id="1075621" ref_url="https://bugzilla.suse.com/1075621" source="BUGZILLA"/>
		<reference ref_id="1075908" ref_url="https://bugzilla.suse.com/1075908" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1076017" ref_url="https://bugzilla.suse.com/1076017" source="BUGZILLA"/>
		<reference ref_id="1076154" ref_url="https://bugzilla.suse.com/1076154" source="BUGZILLA"/>
		<reference ref_id="1076278" ref_url="https://bugzilla.suse.com/1076278" source="BUGZILLA"/>
		<reference ref_id="1076849" ref_url="https://bugzilla.suse.com/1076849" source="BUGZILLA"/>
		<reference ref_id="1077406" ref_url="https://bugzilla.suse.com/1077406" source="BUGZILLA"/>
		<reference ref_id="1077560" ref_url="https://bugzilla.suse.com/1077560" source="BUGZILLA"/>
		<reference ref_id="1077922" ref_url="https://bugzilla.suse.com/1077922" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13215" ref_url="https://www.suse.com/security/cve/CVE-2017-13215/" source="CVE"/>
		<reference ref_id="CVE-2017-17741" ref_url="https://www.suse.com/security/cve/CVE-2017-17741/" source="CVE"/>
		<reference ref_id="CVE-2017-18017" ref_url="https://www.suse.com/security/cve/CVE-2017-18017/" source="CVE"/>
		<reference ref_id="CVE-2017-18079" ref_url="https://www.suse.com/security/cve/CVE-2017-18079/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-5332" ref_url="https://www.suse.com/security/cve/CVE-2018-5332/" source="CVE"/>
		<reference ref_id="CVE-2018-5333" ref_url="https://www.suse.com/security/cve/CVE-2018-5333/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003803.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032).

  The previous fix using CPU Microcode has been complemented by building the Linux Kernel with return trampolines aka 'retpolines'.

- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function did not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c) (bnc#1075621).
- CVE-2018-5333: In the Linux kernel the rds_cmsg_atomic function in net/rds/rdma.c mishandled cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference (bnc#1075617).
- CVE-2017-18017: The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action (bnc#1074488).
- CVE-2017-18079: drivers/input/serio/i8042.c in the Linux kernel allowed attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact because the port-&gt;exists value can change after it is validated (bnc#1077922).
- CVE-2017-17741: The KVM implementation in the Linux kernel allowed attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h (bnc#1073311).
- CVE-2017-13215: A elevation of privilege vulnerability in the Upstream kernel skcipher. (bnc#1075908).
- CVE-2018-1000004: In the Linux kernel a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition (bnc#1076017).

The following non-security bugs were fixed:

- cdc-acm: apply quirk for card reader (bsc#1060279).
- Enable CPU vulnerabilities reporting via sysfs
- fork: clear thread stack upon allocation (bsc#1077560).
- kaiser: Set _PAGE_NX only if supported (bnc#1012382, bnc#1076278).
- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621 bsc#1068032).
- Move kABI fixup for retpolines to proper place.
- powerpc/vdso64: Use double word compare on pointers (bsc#1070781).
- s390: add ppa to the idle loop (bnc#1077406, LTC#163910).
- s390/cpuinfo: show facilities as reported by stfle (bnc#1076849, LTC#163741).
- storvsc: do not assume SG list is continuous when doing bounce buffers (bsc#1075410).
- sysfs/cpu: Add vulnerability folder (bnc#1012382).
- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).
- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).
- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).
- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).
- x86/boot: Fix early command-line parsing when matching at end (bsc#1068032).
- x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).
- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).
- x86/CPU: Sync CPU feature flags late (bsc#1075994 bsc#1075091).
- x86/kaiser: Populate shadow PGD with NX bit only if supported by platform (bsc#1076154 bsc#1076278).
- x86/kaiser: use trampoline stack for kernel entry.
- x86/microcode/intel: Disable late loading on model 79 (bsc#1054305).
- x86/microcode/intel: Extend BDW late-loading further with LLC size check (bsc#1054305).
- x86/microcode/intel: Extend BDW late-loading with a revision check (bsc#1054305).
- x86/microcode: Rescan feature flags upon late loading (bsc#1075994 bsc#1075091).
- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).
- x86/spec_ctrl: handle late setting of X86_FEATURE_SPEC_CTRL properly (bsc#1075994 bsc#1075091).
- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).
- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-12"/>
	<updated date="2018-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054305">SUSE bug 1054305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060279">SUSE bug 1060279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068984">SUSE bug 1068984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070781">SUSE bug 1070781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073311">SUSE bug 1073311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074488">SUSE bug 1074488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074621">SUSE bug 1074621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075410">SUSE bug 1075410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075617">SUSE bug 1075617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075621">SUSE bug 1075621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075908">SUSE bug 1075908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076154">SUSE bug 1076154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076278">SUSE bug 1076278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076849">SUSE bug 1076849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077406">SUSE bug 1077406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077560">SUSE bug 1077560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077922">SUSE bug 1077922</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13215/">CVE-2017-13215 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13215">CVE-2017-13215 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17741/">CVE-2017-17741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17741">CVE-2017-17741 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18017/">CVE-2017-18017 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18017">CVE-2017-18017 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18079/">CVE-2017-18079 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18079">CVE-2017-18079 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000004">CVE-2018-1000004 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5332/">CVE-2018-5332 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5332">CVE-2018-5332 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5333/">CVE-2018-5333 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5333">CVE-2018-5333 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578460" comment="kernel-bigsmp-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578461" comment="kernel-bigsmp-base-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578463" comment="kernel-default-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578464" comment="kernel-default-base-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578466" comment="kernel-default-man-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578467" comment="kernel-ec2-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578468" comment="kernel-ec2-base-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568249" comment="kernel-pae-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568250" comment="kernel-pae-base-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578470" comment="kernel-source-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578471" comment="kernel-syms-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578472" comment="kernel-trace-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578473" comment="kernel-trace-base-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578475" comment="kernel-xen-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578476" comment="kernel-xen-base-3.0.101-0.47.106.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218811" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1010470" ref_url="https://bugzilla.suse.com/1010470" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1062568" ref_url="https://bugzilla.suse.com/1062568" source="BUGZILLA"/>
		<reference ref_id="1066051" ref_url="https://bugzilla.suse.com/1066051" source="BUGZILLA"/>
		<reference ref_id="1067118" ref_url="https://bugzilla.suse.com/1067118" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1070781" ref_url="https://bugzilla.suse.com/1070781" source="BUGZILLA"/>
		<reference ref_id="1073311" ref_url="https://bugzilla.suse.com/1073311" source="BUGZILLA"/>
		<reference ref_id="1073379" ref_url="https://bugzilla.suse.com/1073379" source="BUGZILLA"/>
		<reference ref_id="1074488" ref_url="https://bugzilla.suse.com/1074488" source="BUGZILLA"/>
		<reference ref_id="1074621" ref_url="https://bugzilla.suse.com/1074621" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075617" ref_url="https://bugzilla.suse.com/1075617" source="BUGZILLA"/>
		<reference ref_id="1075621" ref_url="https://bugzilla.suse.com/1075621" source="BUGZILLA"/>
		<reference ref_id="1075867" ref_url="https://bugzilla.suse.com/1075867" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1077560" ref_url="https://bugzilla.suse.com/1077560" source="BUGZILLA"/>
		<reference ref_id="1077922" ref_url="https://bugzilla.suse.com/1077922" source="BUGZILLA"/>
		<reference ref_id="1078669" ref_url="https://bugzilla.suse.com/1078669" source="BUGZILLA"/>
		<reference ref_id="1078672" ref_url="https://bugzilla.suse.com/1078672" source="BUGZILLA"/>
		<reference ref_id="1078673" ref_url="https://bugzilla.suse.com/1078673" source="BUGZILLA"/>
		<reference ref_id="1078674" ref_url="https://bugzilla.suse.com/1078674" source="BUGZILLA"/>
		<reference ref_id="1080464" ref_url="https://bugzilla.suse.com/1080464" source="BUGZILLA"/>
		<reference ref_id="1080579" ref_url="https://bugzilla.suse.com/1080579" source="BUGZILLA"/>
		<reference ref_id="1080757" ref_url="https://bugzilla.suse.com/1080757" source="BUGZILLA"/>
		<reference ref_id="1083242" ref_url="https://bugzilla.suse.com/1083242" source="BUGZILLA"/>
		<reference ref_id="1083483" ref_url="https://bugzilla.suse.com/1083483" source="BUGZILLA"/>
		<reference ref_id="1083494" ref_url="https://bugzilla.suse.com/1083494" source="BUGZILLA"/>
		<reference ref_id="1085279" ref_url="https://bugzilla.suse.com/1085279" source="BUGZILLA"/>
		<reference ref_id="1085331" ref_url="https://bugzilla.suse.com/1085331" source="BUGZILLA"/>
		<reference ref_id="940776" ref_url="https://bugzilla.suse.com/940776" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5156" ref_url="https://www.suse.com/security/cve/CVE-2015-5156/" source="CVE"/>
		<reference ref_id="CVE-2016-7915" ref_url="https://www.suse.com/security/cve/CVE-2016-7915/" source="CVE"/>
		<reference ref_id="CVE-2017-12190" ref_url="https://www.suse.com/security/cve/CVE-2017-12190/" source="CVE"/>
		<reference ref_id="CVE-2017-16644" ref_url="https://www.suse.com/security/cve/CVE-2017-16644/" source="CVE"/>
		<reference ref_id="CVE-2017-16911" ref_url="https://www.suse.com/security/cve/CVE-2017-16911/" source="CVE"/>
		<reference ref_id="CVE-2017-16912" ref_url="https://www.suse.com/security/cve/CVE-2017-16912/" source="CVE"/>
		<reference ref_id="CVE-2017-16913" ref_url="https://www.suse.com/security/cve/CVE-2017-16913/" source="CVE"/>
		<reference ref_id="CVE-2017-16914" ref_url="https://www.suse.com/security/cve/CVE-2017-16914/" source="CVE"/>
		<reference ref_id="CVE-2017-17741" ref_url="https://www.suse.com/security/cve/CVE-2017-17741/" source="CVE"/>
		<reference ref_id="CVE-2017-18017" ref_url="https://www.suse.com/security/cve/CVE-2017-18017/" source="CVE"/>
		<reference ref_id="CVE-2017-18079" ref_url="https://www.suse.com/security/cve/CVE-2017-18079/" source="CVE"/>
		<reference ref_id="CVE-2017-18203" ref_url="https://www.suse.com/security/cve/CVE-2017-18203/" source="CVE"/>
		<reference ref_id="CVE-2017-18208" ref_url="https://www.suse.com/security/cve/CVE-2017-18208/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-5332" ref_url="https://www.suse.com/security/cve/CVE-2018-5332/" source="CVE"/>
		<reference ref_id="CVE-2018-5333" ref_url="https://www.suse.com/security/cve/CVE-2018-5333/" source="CVE"/>
		<reference ref_id="CVE-2018-6927" ref_url="https://www.suse.com/security/cve/CVE-2018-6927/" source="CVE"/>
		<reference ref_id="CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP3 for Teradata kernel was updated to receive various security and bugfixes.

The following security issues have been fixed:

- CVE-2017-18203: The dm_get_from_kobject function in drivers/md/dm.c in the Linux kernel
  allowed local users to cause a denial of service by leveraging a race condition with 
  __dm_destroy during creation and removal of DM devices. (bsc#1083242)
- CVE-2017-16911: The vhci_hcd driver allowed local attackers to disclose
  kernel memory addresses. Successful exploitation required that a USB device was
  attached over IP (bsc#1078674).
- CVE-2017-18208: The madvise_willneed function kernel allowed local users to
  cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED
  for a DAX mapping (bsc#1083494).
- CVE-2018-7566: The ALSA sequencer core initializes the event pool on demand
  by invoking snd_seq_pool_init() when the first write happens and the pool is
  empty. A user could have reset the pool size manually via ioctl concurrently,
  which may have lead UAF or out-of-bound access (bsc#1083483).
- CVE-2017-16644: The hdpvr_probe function allowed local users to cause a
  denial of service (improper error handling and system crash) or possibly have
  unspecified other impact via a crafted USB device (bsc#1067118).
- CVE-2017-5753 / 'SpectreAttack': Local attackers on systems with modern CPUs featuring
  deep instruction pipelining could use attacker controllable speculative
  execution over code patterns in the Linux Kernel to leak content from
  otherwise not readable memory in the same address space, allowing
  retrieval of passwords, cryptographic keys and other secrets.

  This problem is mitigated by adding speculative fencing on affected
  code paths throughout the Linux kernel.
- CVE-2018-6927: The futex_requeue function allowed attackers to cause a denial
  of service (integer overflow) or possibly have unspecified other impact by
  triggering a negative wake or requeue value (bsc#1080757).
- CVE-2017-16914: The 'stub_send_ret_submit()' function allowed attackers to
  cause a denial of service (NULL pointer dereference) via a specially crafted
  USB over IP packet (bsc#1078669).
- CVE-2016-7915: The hid_input_field function allowed physically proximate
  attackers to obtain sensitive information from kernel memory or cause a denial
  of service (out-of-bounds read) by connecting a device (bsc#1010470).
- CVE-2015-5156: The virtnet_probe function in drivers/net/virtio_net.c in
  the Linux kernel attempted to support a FRAGLIST feature without proper
  memory allocation, which allowed guest OS users to cause a denial of
  service (buffer overflow and memory corruption) via a crafted sequence
  of fragmented packets (bsc#940776).
- CVE-2017-12190: The bio_map_user_iov and bio_unmap_user functions did
  unbalanced refcounting when a SCSI I/O vector had small consecutive buffers
  belonging to the same page. The bio_add_pc_page function merged them into one,
  but the page reference was never dropped. This caused a memory leak and
  possible system lockup (exploitable against the host OS by a guest OS user, if
  a SCSI disk is passed through to a virtual machine) due to an out-of-memory
  condition (bsc#1062568).
- CVE-2017-16912: The 'get_pipe()' function allowed attackers to cause a denial
  of service (out-of-bounds read) via a specially crafted USB over IP packet
  (bsc#1078673).
- CVE-2017-16913: The 'stub_recv_cmd_submit()' function when handling
  CMD_SUBMIT packets allowed attackers to cause a denial of service (arbitrary
  memory allocation) via a specially crafted USB over IP packet (bsc#1078672).
- CVE-2018-5332: The rds_message_alloc_sgs() function did not validate a value
  that is used during DMA page allocation, leading to a heap-based out-of-bounds
  write (related to the rds_rdma_extra_size function in net/rds/rdma.c)
  (bsc#1075621).
- CVE-2018-5333: The rds_cmsg_atomic function in net/rds/rdma.c mishandled
  cases where page pinning fails or an invalid address is supplied, leading to an
  rds_atomic_free_op NULL pointer dereference (bsc#1075617).
- CVE-2017-18017: The tcpmss_mangle_packet function allowed remote attackers to
  cause a denial of service (use-after-free and memory corruption) or possibly
  have unspecified other impact by leveraging the presence of xt_TCPMSS in an
  iptables action (bsc#1074488).
- CVE-2017-18079: drivers/input/serio/i8042.c in the Linux kernel allowed
  attackers to cause a denial of service (NULL pointer dereference and
  system crash) or possibly have unspecified other impact because the
  port-&gt;exists value can change after it is validated (bsc#1077922).
- CVE-2017-17741: The KVM implementation in the Linux kernel allowed
  attackers to obtain potentially sensitive information from kernel
  memory, aka a write_mmio stack-based out-of-bounds read, related to
  arch/x86/kvm/x86.c and include/trace/events/kvm.h (bsc#1073311).

Additionally, the following non-security issues have been fixed:

- x86/retpoline: Don't perform thunk calls in ring3 vsyscall code. (bsc#1085331)
- sd: Skip async probing for deleted devices. (bsc#1066051)
- x86/espfix: Fix return stack in do_double_fault(). (bsc#1085279)
- scsi: Do not spin-up disconnected devices. (bsc#1073379)
- sd: Reset async_probe cookie after probing. (bsc#1073379)
- sysfs/driver core: Fix glue dir race condition by gdp_mutex. (bsc#1073379)
- block: Do not allow updates through sysfs until registration completes. (bsc#1073379)
- leds: Do not overflow sysfs buffer in led_trigger_show. (bsc#1080464)
- sysfs/spectre_v2: Handle spec_ctrl. (bsc#1075994, bsc#1075091)
- x86/spectre_v2: nospectre_v2 means nospec too. (bsc#1075994, bsc#1075091)
- sysfs/cpu: Fix typos in vulnerability documentation. (bsc#1012382)
- x86/cpu: Implement CPU vulnerabilites sysfs functions. (bsc#1012382)
- sysfs/cpu: Add vulnerability folder. (bsc#1012382)
- kbuild: Modversions for EXPORT_SYMBOL() for asm. (bsc#1074621, bsc#1068032)
- Switch away from trampoline stack to kernel stack in ia32_syscall entry. (bsc#1080579)
- x86/kaiser: Use trampoline stack for kernel entry. (bsc#1077560)
- powerpc/vdso64: Use double word compare on pointers. (bsc#1070781)
- audit: Move the tree pruning to a dedicated thread. (bsc#1075867)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-23"/>
	<updated date="2018-03-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010470">SUSE bug 1010470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062568">SUSE bug 1062568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066051">SUSE bug 1066051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067118">SUSE bug 1067118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070781">SUSE bug 1070781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073311">SUSE bug 1073311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073379">SUSE bug 1073379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074488">SUSE bug 1074488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074621">SUSE bug 1074621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075617">SUSE bug 1075617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075621">SUSE bug 1075621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075867">SUSE bug 1075867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077560">SUSE bug 1077560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077922">SUSE bug 1077922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078669">SUSE bug 1078669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078672">SUSE bug 1078672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078673">SUSE bug 1078673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078674">SUSE bug 1078674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080464">SUSE bug 1080464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080579">SUSE bug 1080579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080757">SUSE bug 1080757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083242">SUSE bug 1083242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083483">SUSE bug 1083483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083494">SUSE bug 1083494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085279">SUSE bug 1085279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085331">SUSE bug 1085331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940776">SUSE bug 940776</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5156/">CVE-2015-5156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5156">CVE-2015-5156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7915/">CVE-2016-7915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7915">CVE-2016-7915 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12190/">CVE-2017-12190 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12190">CVE-2017-12190 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16644/">CVE-2017-16644 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16644">CVE-2017-16644 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16911/">CVE-2017-16911 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16911">CVE-2017-16911 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16912/">CVE-2017-16912 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16912">CVE-2017-16912 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16913/">CVE-2017-16913 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16913">CVE-2017-16913 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16914/">CVE-2017-16914 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16914">CVE-2017-16914 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17741/">CVE-2017-17741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17741">CVE-2017-17741 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18017/">CVE-2017-18017 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18017">CVE-2017-18017 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18079/">CVE-2017-18079 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18079">CVE-2017-18079 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18203/">CVE-2017-18203 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18203">CVE-2017-18203 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18208/">CVE-2017-18208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18208">CVE-2017-18208 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5754">CVE-2017-5754 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5332/">CVE-2018-5332 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5332">CVE-2018-5332 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5333/">CVE-2018-5333 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5333">CVE-2018-5333 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6927/">CVE-2018-6927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6927">CVE-2018-6927 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7566">CVE-2018-7566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993162" comment="kernel-default-3.0.101-0.153.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993163" comment="kernel-default-base-3.0.101-0.153.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993165" comment="kernel-ec2-3.0.101-0.153.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993166" comment="kernel-ec2-base-3.0.101-0.153.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993168" comment="kernel-source-3.0.101-0.153.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993169" comment="kernel-syms-3.0.101-0.153.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993170" comment="kernel-trace-3.0.101-0.153.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993171" comment="kernel-trace-base-3.0.101-0.153.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993173" comment="kernel-xen-3.0.101-0.153.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993174" comment="kernel-xen-base-3.0.101-0.153.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218812" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1072865" ref_url="https://bugzilla.suse.com/1072865" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1086827" ref_url="https://bugzilla.suse.com/1086827" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP3 for Teradata kernel was updated to receive various security and bugfixes.

The following security issues have been fixed:

- CVE-2017-13166: An elevation of privilege vulnerability in the v4l2 video driver was fixed (bsc#1072865).
- CVE-2017-5715: More improvements and cleanups for retpoline support (bsc#1068032).
- CVE-2017-5753: Introduce new memory barrier gmb() (bsc#1068032).
- CVE-2017-5754: Fix making LFENCE a serializing instruction (bsc#1068032).

Additionally, the following non-security issues have been fixed:

- xen/x86/cpu: Factor out application of forced CPU caps (bsc#1075994, bsc#1075091).
- xen/x86/CPU: Sync CPU feature flags late (bsc#1075994, bsc#1075091).		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-29"/>
	<updated date="2018-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072865">SUSE bug 1072865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086827">SUSE bug 1086827</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13166">CVE-2017-13166 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5754">CVE-2017-5754 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993176" comment="kernel-default-3.0.101-0.156.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993177" comment="kernel-default-base-3.0.101-0.156.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993179" comment="kernel-ec2-3.0.101-0.156.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993180" comment="kernel-ec2-base-3.0.101-0.156.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993182" comment="kernel-source-3.0.101-0.156.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993183" comment="kernel-syms-3.0.101-0.156.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993184" comment="kernel-trace-3.0.101-0.156.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993185" comment="kernel-trace-base-3.0.101-0.156.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993187" comment="kernel-xen-3.0.101-0.156.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993188" comment="kernel-xen-base-3.0.101-0.156.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218813" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1039348" ref_url="https://bugzilla.suse.com/1039348" source="BUGZILLA"/>
		<reference ref_id="1046610" ref_url="https://bugzilla.suse.com/1046610" source="BUGZILLA"/>
		<reference ref_id="1081358" ref_url="https://bugzilla.suse.com/1081358" source="BUGZILLA"/>
		<reference ref_id="1083483" ref_url="https://bugzilla.suse.com/1083483" source="BUGZILLA"/>
		<reference ref_id="1084536" ref_url="https://bugzilla.suse.com/1084536" source="BUGZILLA"/>
		<reference ref_id="1086162" ref_url="https://bugzilla.suse.com/1086162" source="BUGZILLA"/>
		<reference ref_id="1087088" ref_url="https://bugzilla.suse.com/1087088" source="BUGZILLA"/>
		<reference ref_id="1087260" ref_url="https://bugzilla.suse.com/1087260" source="BUGZILLA"/>
		<reference ref_id="1088147" ref_url="https://bugzilla.suse.com/1088147" source="BUGZILLA"/>
		<reference ref_id="1088260" ref_url="https://bugzilla.suse.com/1088260" source="BUGZILLA"/>
		<reference ref_id="1089608" ref_url="https://bugzilla.suse.com/1089608" source="BUGZILLA"/>
		<reference ref_id="1089752" ref_url="https://bugzilla.suse.com/1089752" source="BUGZILLA"/>
		<reference ref_id="1089895" ref_url="https://bugzilla.suse.com/1089895" source="BUGZILLA"/>
		<reference ref_id="1090366" ref_url="https://bugzilla.suse.com/1090366" source="BUGZILLA"/>
		<reference ref_id="1090607" ref_url="https://bugzilla.suse.com/1090607" source="BUGZILLA"/>
		<reference ref_id="1091755" ref_url="https://bugzilla.suse.com/1091755" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0861" ref_url="https://www.suse.com/security/cve/CVE-2017-0861/" source="CVE"/>
		<reference ref_id="CVE-2017-1000364" ref_url="https://www.suse.com/security/cve/CVE-2017-1000364/" source="CVE"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="CVE-2018-10087" ref_url="https://www.suse.com/security/cve/CVE-2018-10087/" source="CVE"/>
		<reference ref_id="CVE-2018-10124" ref_url="https://www.suse.com/security/cve/CVE-2018-10124/" source="CVE"/>
		<reference ref_id="CVE-2018-10675" ref_url="https://www.suse.com/security/cve/CVE-2018-10675/" source="CVE"/>
		<reference ref_id="CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566/" source="CVE"/>
		<reference ref_id="CVE-2018-7757" ref_url="https://www.suse.com/security/cve/CVE-2018-7757/" source="CVE"/>
		<reference ref_id="CVE-2018-8822" ref_url="https://www.suse.com/security/cve/CVE-2018-8822/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP3 for Teradata kernel was updated to receive various security and bugfixes.

The following security issues have been fixed:

- CVE-2018-8897: An unprivileged system user could use incorrect set up interrupt stacks to crash the Linux kernel
  resulting in DoS issue. (bsc#1087088)
- CVE-2018-1000199: perf/hwbp: Simplify the perf-hwbp code and fix documentation. (bsc#1089895)
- CVE-2018-10675: mm/mempolicy: Fix use after free when calling get_mempolicy. (bsc#1091755)
- CVE-2018-10124: The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13,
  when an unspecified architecture and compiler is used, might allow local users to cause a denial of
  service via an INT_MIN argument (bsc#1089752).
- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might have allowed
  local users to cause a denial of service by triggering an attempted use of the
  -INT_MIN value (bsc#1089608).
- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in
  drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of
  service (memory consumption) via many read accesses to files in the
  /sys/class/sas_phy directory, as demonstrated by the
  /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bsc#1084536).
- CVE-2018-7566: Buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl
  write operation to /dev/snd/seq by a local user potentially allowing for code
  execution (bnc#1083483).
- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in
  the ALSA subsystem allowed attackers to gain privileges via unspecified vectors
  (bnc#1088260 1088268).
- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel
  function could have beenexploited by malicious NCPFS servers to crash the
  kernel or execute code (bnc#1086162)

Additionally, the following non-security issues have been fixed:

- x86, mce: Fix mce_start_timer semantics. (bsc#1090607)
- x86/Xen: Disable IBRS around CPU stopper function invocation (none so far).
- xen-netfront: Fix req_prod check to avoid RX hang when index wraps. (bsc#1046610)
- Integrate fixes resulting from bsc#1088147. More info in the respective commit messages.
- kabi/x86/kaiser: Properly align trampoline stack (bsc#1087260).
- posix-timers: Protect posix clock array access against speculation (bsc#1081358).
- mm/mmap.c: Do not blow on PROT_NONE MAP_FIXED holes in the stack (bsc#1039348).
- sd: Check device status after spinup when revalidating the device (bsc#1090366).
- sd: Skip probing after sd_revalidate_disk() (bsc#1090366).
- Fix wrong function name in 0007-sd-Check-device-status-after-spinup-when-revalidatin.patch
- mm: Replace fixes for bsc#1039348, CVE-2017-1000364 with patches from upstream.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-18"/>
	<updated date="2018-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046610">SUSE bug 1046610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081358">SUSE bug 1081358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083483">SUSE bug 1083483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084536">SUSE bug 1084536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086162">SUSE bug 1086162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087260">SUSE bug 1087260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088147">SUSE bug 1088147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088260">SUSE bug 1088260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089608">SUSE bug 1089608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089752">SUSE bug 1089752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089895">SUSE bug 1089895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090366">SUSE bug 1090366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090607">SUSE bug 1090607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091755">SUSE bug 1091755</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0861/">CVE-2017-0861 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0861">CVE-2017-0861 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000364/">CVE-2017-1000364 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000364">CVE-2017-1000364 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000199">CVE-2018-1000199 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10087/">CVE-2018-10087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10087">CVE-2018-10087 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10124/">CVE-2018-10124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10124">CVE-2018-10124 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10675/">CVE-2018-10675 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10675">CVE-2018-10675 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7566">CVE-2018-7566 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7757/">CVE-2018-7757 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7757">CVE-2018-7757 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8822/">CVE-2018-8822 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8822">CVE-2018-8822 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8897">CVE-2018-8897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993190" comment="kernel-default-3.0.101-0.163.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993191" comment="kernel-default-base-3.0.101-0.163.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993193" comment="kernel-ec2-3.0.101-0.163.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993194" comment="kernel-ec2-base-3.0.101-0.163.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993196" comment="kernel-source-3.0.101-0.163.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993197" comment="kernel-syms-3.0.101-0.163.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993198" comment="kernel-trace-3.0.101-0.163.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993199" comment="kernel-trace-base-3.0.101-0.163.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993201" comment="kernel-xen-3.0.101-0.163.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993202" comment="kernel-xen-base-3.0.101-0.163.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218814" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1094019" ref_url="https://bugzilla.suse.com/1094019" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP3 for Teradata kernel was updated to receive one security and one bugfix.

The following security issue has been fixed:

- CVE-2018-3639: Information leaks using 'Memory Disambiguation' feature
  in modern CPUs were mitigated, aka 'Spectre Variant 4' (bnc#1087082).

  A new boot commandline option was introduced,
  'spec_store_bypass_disable', which can have following values:

  - auto: Kernel detects whether your CPU model contains an implementation
    of Speculative Store Bypass and picks the most appropriate mitigation.
  - on: disable Speculative Store Bypass
  - off: enable Speculative Store Bypass
  - prctl: Control Speculative Store Bypass per thread via
    prctl. Speculative Store Bypass is enabled for a process by default. The
    state of the control is inherited on fork.
  - seccomp: Same as 'prctl' above, but all seccomp threads will disable
    SSB unless they explicitly opt out.

  The default is 'seccomp', meaning programs need explicit opt-in into the mitigation.

  Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing:

  - 'Vulnerable'
  - 'Mitigation: Speculative Store Bypass disabled'
  - 'Mitigation: Speculative Store Bypass disabled via prctl'
  - 'Mitigation: Speculative Store Bypass disabled via prctl and seccomp'

Additionally, the following non-security issue has been fixed:

- x86/bugs: make intel_rds_mask() honor X86_FEATURE_SSBD
  (bsc#1094019).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-23"/>
	<updated date="2018-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094019">SUSE bug 1094019</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993204" comment="kernel-default-3.0.101-0.166.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993205" comment="kernel-default-base-3.0.101-0.166.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993207" comment="kernel-ec2-3.0.101-0.166.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993208" comment="kernel-ec2-base-3.0.101-0.166.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993210" comment="kernel-source-3.0.101-0.166.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993211" comment="kernel-syms-3.0.101-0.166.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993212" comment="kernel-trace-3.0.101-0.166.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993213" comment="kernel-trace-base-3.0.101-0.166.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993215" comment="kernel-xen-3.0.101-0.166.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993216" comment="kernel-xen-base-3.0.101-0.166.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218815" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1046610" ref_url="https://bugzilla.suse.com/1046610" source="BUGZILLA"/>
		<reference ref_id="1085279" ref_url="https://bugzilla.suse.com/1085279" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1089895" ref_url="https://bugzilla.suse.com/1089895" source="BUGZILLA"/>
		<reference ref_id="1091755" ref_url="https://bugzilla.suse.com/1091755" source="BUGZILLA"/>
		<reference ref_id="1092497" ref_url="https://bugzilla.suse.com/1092497" source="BUGZILLA"/>
		<reference ref_id="1094019" ref_url="https://bugzilla.suse.com/1094019" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="CVE-2018-10675" ref_url="https://www.suse.com/security/cve/CVE-2018-10675/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004078.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-3639: Information leaks using 'Memory Disambiguation' feature
  in modern CPUs were mitigated, aka 'Spectre Variant 4' (bnc#1087082).

  A new boot commandline option was introduced,
  'spec_store_bypass_disable', which can have following values:

  - auto: Kernel detects whether your CPU model contains an implementation
    of Speculative Store Bypass and picks the most appropriate mitigation.
  - on: disable Speculative Store Bypass
  - off: enable Speculative Store Bypass
  - prctl: Control Speculative Store Bypass per thread via
    prctl. Speculative Store Bypass is enabled for a process by default. The
    state of the control is inherited on fork.
  - seccomp: Same as 'prctl' above, but all seccomp threads will disable
    SSB unless they explicitly opt out.

  The default is 'seccomp', meaning programs need explicit opt-in into the mitigation.

  Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing:

  - 'Vulnerable'
  - 'Mitigation: Speculative Store Bypass disabled'
  - 'Mitigation: Speculative Store Bypass disabled via prctl'
  - 'Mitigation: Speculative Store Bypass disabled via prctl and seccomp'

- CVE-2018-1000199: An address corruption flaw was discovered while
  modifying a h/w breakpoint via 'modify_user_hw_breakpoint' routine, an
  unprivileged user/process could use this flaw to crash the system kernel
  resulting in DoS OR to potentially escalate privileges on a the system. (bsc#1089895)
- CVE-2018-10675: The do_get_mempolicy function in mm/mempolicy.c allowed
  local users to cause a denial of service (use-after-free) or possibly
  have unspecified other impact via crafted system calls (bnc#1091755).
- CVE-2017-5715: The retpoline mitigation for Spectre v2 has been enabled also for 32bit x86.
- CVE-2017-5753: Spectre v1 mitigations have been improved by the versions
  merged from the upstream kernel.

The following non-security bugs were fixed:

- Update config files. Set CONFIG_RETPOLINE=y for i386.
- x86/espfix: Fix return stack in do_double_fault() (bsc#1085279).
- xen-netfront: fix req_prod check to avoid RX hang when index wraps (bsc#1046610).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046610">SUSE bug 1046610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085279">SUSE bug 1085279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089895">SUSE bug 1089895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091755">SUSE bug 1091755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092497">SUSE bug 1092497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094019">SUSE bug 1094019</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000199">CVE-2018-1000199 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10675/">CVE-2018-10675 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10675">CVE-2018-10675 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578478" comment="kernel-bigsmp-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578479" comment="kernel-bigsmp-base-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578481" comment="kernel-default-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578482" comment="kernel-default-base-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578484" comment="kernel-default-man-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578485" comment="kernel-ec2-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578486" comment="kernel-ec2-base-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568266" comment="kernel-pae-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568267" comment="kernel-pae-base-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578488" comment="kernel-source-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578489" comment="kernel-syms-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578490" comment="kernel-trace-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578491" comment="kernel-trace-base-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578493" comment="kernel-xen-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578494" comment="kernel-xen-base-3.0.101-0.47.106.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218816" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1087086" ref_url="https://bugzilla.suse.com/1087086" source="BUGZILLA"/>
		<reference ref_id="1095456" ref_url="https://bugzilla.suse.com/1095456" source="BUGZILLA"/>
		<reference ref_id="1096140" ref_url="https://bugzilla.suse.com/1096140" source="BUGZILLA"/>
		<reference ref_id="1096242" ref_url="https://bugzilla.suse.com/1096242" source="BUGZILLA"/>
		<reference ref_id="1096281" ref_url="https://bugzilla.suse.com/1096281" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP3 for Teradata kernel was updated to receive various security and bugfixes.

The following security issue has been fixed:

- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX
  registers) between processes. These registers might contain encryption keys
  when doing SSE accelerated AES enc/decryption (bsc#1087086)

Additionally, the following non-security issues have been fixed:

- KVM: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).
- Xen counterparts of eager FPU implementation.
- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096140).
- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).
- x86: Fix /proc/mtrr with base/size more than 44bits (bnc#1095456).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-20"/>
	<updated date="2018-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087086">SUSE bug 1087086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095456">SUSE bug 1095456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096140">SUSE bug 1096140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096242">SUSE bug 1096242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096281">SUSE bug 1096281</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3665">CVE-2018-3665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993218" comment="kernel-default-3.0.101-0.169.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993219" comment="kernel-default-base-3.0.101-0.169.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993221" comment="kernel-ec2-3.0.101-0.169.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993222" comment="kernel-ec2-base-3.0.101-0.169.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993224" comment="kernel-source-3.0.101-0.169.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993225" comment="kernel-syms-3.0.101-0.169.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993226" comment="kernel-trace-3.0.101-0.169.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993227" comment="kernel-trace-base-3.0.101-0.169.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993229" comment="kernel-xen-3.0.101-0.169.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993230" comment="kernel-xen-base-3.0.101-0.169.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218817" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1093183" ref_url="https://bugzilla.suse.com/1093183" source="BUGZILLA"/>
		<reference ref_id="1094876" ref_url="https://bugzilla.suse.com/1094876" source="BUGZILLA"/>
		<reference ref_id="1095887" ref_url="https://bugzilla.suse.com/1095887" source="BUGZILLA"/>
		<reference ref_id="1096130" ref_url="https://bugzilla.suse.com/1096130" source="BUGZILLA"/>
		<reference ref_id="1097948" ref_url="https://bugzilla.suse.com/1097948" source="BUGZILLA"/>
		<reference ref_id="1098658" ref_url="https://bugzilla.suse.com/1098658" source="BUGZILLA"/>
		<reference ref_id="1100089" ref_url="https://bugzilla.suse.com/1100089" source="BUGZILLA"/>
		<reference ref_id="1100091" ref_url="https://bugzilla.suse.com/1100091" source="BUGZILLA"/>
		<reference ref_id="929142" ref_url="https://bugzilla.suse.com/929142" source="BUGZILLA"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following non-security bugs were fixed:

- fix a leak in /proc/schedstats (bsc#1094876).
- mm: hugetlb: fix softlockup when a large number of hugepages are freed (bsc#1095887).
- perf, nmi: Fix unknown NMI warning (bsc#929142).++ kernel-source.spec (revision 4)Release:    &amp;lt;RELEASE&gt;.g06db3a5
- perf/x86/intel: Handle Broadwell family processors (bsc#1093183).
- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).
- signals: avoid unnecessary taking of sighand-&gt;siglock (bsc#1096130).
- x64/entry: move ENABLE_IBRS after switching from trampoline stack (bsc#1098658).
- x86/fpu: fix signal handling with eager FPU switching (bsc#1100091).
- x86/traps: add missing kernel CR3 switch in bad_iret path (bsc#1098658).
- x86/traps: Fix bad_iret_stack in fixup_bad_iret() (bsc#1098658).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-06"/>
	<updated date="2018-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1093183">SUSE bug 1093183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094876">SUSE bug 1094876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095887">SUSE bug 1095887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096130">SUSE bug 1096130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097948">SUSE bug 1097948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098658">SUSE bug 1098658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100089">SUSE bug 1100089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100091">SUSE bug 1100091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929142">SUSE bug 929142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993232" comment="kernel-default-3.0.101-0.174.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993233" comment="kernel-default-base-3.0.101-0.174.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993235" comment="kernel-ec2-3.0.101-0.174.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993236" comment="kernel-ec2-base-3.0.101-0.174.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993238" comment="kernel-source-3.0.101-0.174.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993239" comment="kernel-syms-3.0.101-0.174.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993240" comment="kernel-trace-3.0.101-0.174.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993241" comment="kernel-trace-base-3.0.101-0.174.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993243" comment="kernel-xen-3.0.101-0.174.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993244" comment="kernel-xen-base-3.0.101-0.174.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218818" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1082962" ref_url="https://bugzilla.suse.com/1082962" source="BUGZILLA"/>
		<reference ref_id="1083900" ref_url="https://bugzilla.suse.com/1083900" source="BUGZILLA"/>
		<reference ref_id="1085107" ref_url="https://bugzilla.suse.com/1085107" source="BUGZILLA"/>
		<reference ref_id="1087081" ref_url="https://bugzilla.suse.com/1087081" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1092904" ref_url="https://bugzilla.suse.com/1092904" source="BUGZILLA"/>
		<reference ref_id="1094353" ref_url="https://bugzilla.suse.com/1094353" source="BUGZILLA"/>
		<reference ref_id="1096480" ref_url="https://bugzilla.suse.com/1096480" source="BUGZILLA"/>
		<reference ref_id="1096728" ref_url="https://bugzilla.suse.com/1096728" source="BUGZILLA"/>
		<reference ref_id="1097234" ref_url="https://bugzilla.suse.com/1097234" source="BUGZILLA"/>
		<reference ref_id="1098016" ref_url="https://bugzilla.suse.com/1098016" source="BUGZILLA"/>
		<reference ref_id="1099924" ref_url="https://bugzilla.suse.com/1099924" source="BUGZILLA"/>
		<reference ref_id="1099942" ref_url="https://bugzilla.suse.com/1099942" source="BUGZILLA"/>
		<reference ref_id="1100418" ref_url="https://bugzilla.suse.com/1100418" source="BUGZILLA"/>
		<reference ref_id="1104475" ref_url="https://bugzilla.suse.com/1104475" source="BUGZILLA"/>
		<reference ref_id="1104684" ref_url="https://bugzilla.suse.com/1104684" source="BUGZILLA"/>
		<reference ref_id="909361" ref_url="https://bugzilla.suse.com/909361" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8405" ref_url="https://www.suse.com/security/cve/CVE-2016-8405/" source="CVE"/>
		<reference ref_id="CVE-2017-13305" ref_url="https://www.suse.com/security/cve/CVE-2017-13305/" source="CVE"/>
		<reference ref_id="CVE-2018-1000204" ref_url="https://www.suse.com/security/cve/CVE-2018-1000204/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-1130" ref_url="https://www.suse.com/security/cve/CVE-2018-1130/" source="CVE"/>
		<reference ref_id="CVE-2018-12233" ref_url="https://www.suse.com/security/cve/CVE-2018-12233/" source="CVE"/>
		<reference ref_id="CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053/" source="CVE"/>
		<reference ref_id="CVE-2018-13406" ref_url="https://www.suse.com/security/cve/CVE-2018-13406/" source="CVE"/>
		<reference ref_id="CVE-2018-3620" ref_url="https://www.suse.com/security/cve/CVE-2018-3620/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-5803" ref_url="https://www.suse.com/security/cve/CVE-2018-5803/" source="CVE"/>
		<reference ref_id="CVE-2018-5814" ref_url="https://www.suse.com/security/cve/CVE-2018-5814/" source="CVE"/>
		<reference ref_id="CVE-2018-7492" ref_url="https://www.suse.com/security/cve/CVE-2018-7492/" source="CVE"/>
		<description>


The SUSE Linux Enterprise 11 SP3 Teradata kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-1000204: A malformed SG_IO ioctl issued for a SCSI device could lead to a local kernel information leak manifesting in up to approximately 1000 memory pages copied to the userspace. The problem has limited scope as non-privileged users usually have no permissions to access SCSI device files. (bnc#1096728).
- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).
- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 1100418).
- CVE-2016-8405: An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. (bnc#1099942).
- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations could be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).
- CVE-2018-12233: In the ea_get function in fs/jfs/xattr.c a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr (bnc#1097234).
- CVE-2017-13305: A information disclosure vulnerability was fixed in the kernel encrypted-keys. (bnc#1094353).
- CVE-2018-1130: A null pointer dereference in dccp_write_xmit() function in net/dccp/output.c was fixed in that allowed a local user to cause a denial of service by a number of certain crafted system calls (bnc#1092904).
- CVE-2018-1068: A flaw was found in the implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bnc#1085107).
- CVE-2018-5803: An error in the '_sctp_make_chunk()' function (net/sctp/sm_make_chunk.c) when handling SCTP packets length could be exploited to cause a kernel crash (bnc#1083900).
- CVE-2018-7492: A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function allowed local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST (bnc#1082962).

The following non-security bugs were fixed:

- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- disable-prot_none_mitigation.patch: disable prot_none native mitigation (bnc#1104684)
- fix pgd underflow (bnc#1104475) custom walk_page_range rework was incorrect and could underflow pgd if the given range was below a first vma.
- slab: introduce kmalloc_array() (bsc#909361).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- xen/x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- xen/x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- xen/x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/mm: Simplify p[g4um]d_page() macros (bnc#1087081, bnc#1104684).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-15"/>
	<updated date="2018-08-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082962">SUSE bug 1082962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083900">SUSE bug 1083900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085107">SUSE bug 1085107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092904">SUSE bug 1092904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094353">SUSE bug 1094353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096480">SUSE bug 1096480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096728">SUSE bug 1096728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097234">SUSE bug 1097234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098016">SUSE bug 1098016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099924">SUSE bug 1099924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099942">SUSE bug 1099942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100418">SUSE bug 1100418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104475">SUSE bug 1104475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104684">SUSE bug 1104684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909361">SUSE bug 909361</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8405/">CVE-2016-8405 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8405">CVE-2016-8405 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-13305/">CVE-2017-13305 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13305">CVE-2017-13305 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000204/">CVE-2018-1000204 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000204">CVE-2018-1000204 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1068">CVE-2018-1068 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1130/">CVE-2018-1130 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1130">CVE-2018-1130 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12233/">CVE-2018-12233 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12233">CVE-2018-12233 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13053">CVE-2018-13053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13406/">CVE-2018-13406 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13406">CVE-2018-13406 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3620/">CVE-2018-3620 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3620">CVE-2018-3620 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3646">CVE-2018-3646 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5803/">CVE-2018-5803 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5803">CVE-2018-5803 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5814/">CVE-2018-5814 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5814">CVE-2018-5814 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7492/">CVE-2018-7492 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7492">CVE-2018-7492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993246" comment="kernel-default-3.0.101-0.181.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993247" comment="kernel-default-base-3.0.101-0.181.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993249" comment="kernel-ec2-3.0.101-0.181.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993250" comment="kernel-ec2-base-3.0.101-0.181.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993252" comment="kernel-source-3.0.101-0.181.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993253" comment="kernel-syms-3.0.101-0.181.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993254" comment="kernel-trace-3.0.101-0.181.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993255" comment="kernel-trace-base-3.0.101-0.181.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993257" comment="kernel-xen-3.0.101-0.181.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993258" comment="kernel-xen-base-3.0.101-0.181.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218819" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1082962" ref_url="https://bugzilla.suse.com/1082962" source="BUGZILLA"/>
		<reference ref_id="1083900" ref_url="https://bugzilla.suse.com/1083900" source="BUGZILLA"/>
		<reference ref_id="1085107" ref_url="https://bugzilla.suse.com/1085107" source="BUGZILLA"/>
		<reference ref_id="1087081" ref_url="https://bugzilla.suse.com/1087081" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1092904" ref_url="https://bugzilla.suse.com/1092904" source="BUGZILLA"/>
		<reference ref_id="1094353" ref_url="https://bugzilla.suse.com/1094353" source="BUGZILLA"/>
		<reference ref_id="1096480" ref_url="https://bugzilla.suse.com/1096480" source="BUGZILLA"/>
		<reference ref_id="1096728" ref_url="https://bugzilla.suse.com/1096728" source="BUGZILLA"/>
		<reference ref_id="1097234" ref_url="https://bugzilla.suse.com/1097234" source="BUGZILLA"/>
		<reference ref_id="1098016" ref_url="https://bugzilla.suse.com/1098016" source="BUGZILLA"/>
		<reference ref_id="1099924" ref_url="https://bugzilla.suse.com/1099924" source="BUGZILLA"/>
		<reference ref_id="1099942" ref_url="https://bugzilla.suse.com/1099942" source="BUGZILLA"/>
		<reference ref_id="1100418" ref_url="https://bugzilla.suse.com/1100418" source="BUGZILLA"/>
		<reference ref_id="1104475" ref_url="https://bugzilla.suse.com/1104475" source="BUGZILLA"/>
		<reference ref_id="1104684" ref_url="https://bugzilla.suse.com/1104684" source="BUGZILLA"/>
		<reference ref_id="909361" ref_url="https://bugzilla.suse.com/909361" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8405" ref_url="https://www.suse.com/security/cve/CVE-2016-8405/" source="CVE"/>
		<reference ref_id="CVE-2017-13305" ref_url="https://www.suse.com/security/cve/CVE-2017-13305/" source="CVE"/>
		<reference ref_id="CVE-2018-1000204" ref_url="https://www.suse.com/security/cve/CVE-2018-1000204/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-1130" ref_url="https://www.suse.com/security/cve/CVE-2018-1130/" source="CVE"/>
		<reference ref_id="CVE-2018-12233" ref_url="https://www.suse.com/security/cve/CVE-2018-12233/" source="CVE"/>
		<reference ref_id="CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053/" source="CVE"/>
		<reference ref_id="CVE-2018-13406" ref_url="https://www.suse.com/security/cve/CVE-2018-13406/" source="CVE"/>
		<reference ref_id="CVE-2018-3620" ref_url="https://www.suse.com/security/cve/CVE-2018-3620/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-5803" ref_url="https://www.suse.com/security/cve/CVE-2018-5803/" source="CVE"/>
		<reference ref_id="CVE-2018-5814" ref_url="https://www.suse.com/security/cve/CVE-2018-5814/" source="CVE"/>
		<reference ref_id="CVE-2018-7492" ref_url="https://www.suse.com/security/cve/CVE-2018-7492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2016-8405: An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. (bnc#1099942).
- CVE-2017-13305: A information disclosure vulnerability existed in the encrypted-keys handling. (bnc#1094353).
- CVE-2018-1000204: A malformed SG_IO ioctl issued for a SCSI device could lead to a local kernel information leak manifesting in up to approximately 1000 memory pages copied to the userspace. The problem has limited scope as non-privileged users usually have no permissions to access SCSI device files. (bnc#1096728).
- CVE-2018-1068: A flaw was found in the implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bnc#1085107).
- CVE-2018-1130: A null pointer dereference in dccp_write_xmit() function in net/dccp/output.c allowed a local user to cause a denial of service by a number of certain crafted system calls (bnc#1092904).
- CVE-2018-12233: In the ea_get function in fs/jfs/xattr.c a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr (bnc#1097234).
- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).
- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c kernel could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 1100418).
- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
- CVE-2018-5803: An error in the '_sctp_make_chunk()' function (net/sctp/sm_make_chunk.c) when handling SCTP packets length could be exploited to cause a kernel crash (bnc#1083900).
- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations could be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).
- CVE-2018-7492: A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST (bnc#1082962).

The following non-security bugs were fixed:

- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- disable-prot_none_mitigation.patch: disable prot_none native mitigation (bnc#1104684)
- fix pgd underflow (bnc#1104475) custom walk_page_range rework was incorrect and could underflow pgd if the given range was below a first vma.
- slab: introduce kmalloc_array() (bsc#909361).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- xen/x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- xen/x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- xen/x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/mm: Simplify p[g4um]d_page() macros (bnc#1087081, bnc#1104684).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082962">SUSE bug 1082962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083900">SUSE bug 1083900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085107">SUSE bug 1085107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092904">SUSE bug 1092904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094353">SUSE bug 1094353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096480">SUSE bug 1096480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096728">SUSE bug 1096728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097234">SUSE bug 1097234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098016">SUSE bug 1098016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099924">SUSE bug 1099924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099942">SUSE bug 1099942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100418">SUSE bug 1100418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104475">SUSE bug 1104475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104684">SUSE bug 1104684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909361">SUSE bug 909361</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8405/">CVE-2016-8405 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8405">CVE-2016-8405 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-13305/">CVE-2017-13305 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13305">CVE-2017-13305 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000204/">CVE-2018-1000204 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000204">CVE-2018-1000204 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1068">CVE-2018-1068 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1130/">CVE-2018-1130 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1130">CVE-2018-1130 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12233/">CVE-2018-12233 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12233">CVE-2018-12233 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13053">CVE-2018-13053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13406/">CVE-2018-13406 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13406">CVE-2018-13406 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3620/">CVE-2018-3620 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3620">CVE-2018-3620 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3646">CVE-2018-3646 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5803/">CVE-2018-5803 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5803">CVE-2018-5803 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5814/">CVE-2018-5814 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5814">CVE-2018-5814 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7492/">CVE-2018-7492 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7492">CVE-2018-7492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578496" comment="kernel-bigsmp-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578497" comment="kernel-bigsmp-base-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578499" comment="kernel-default-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578500" comment="kernel-default-base-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578502" comment="kernel-default-man-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578503" comment="kernel-ec2-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578504" comment="kernel-ec2-base-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568283" comment="kernel-pae-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568284" comment="kernel-pae-base-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578506" comment="kernel-source-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578507" comment="kernel-syms-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578508" comment="kernel-trace-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578509" comment="kernel-trace-base-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578511" comment="kernel-xen-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578512" comment="kernel-xen-base-3.0.101-0.47.106.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218820" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1057199" ref_url="https://bugzilla.suse.com/1057199" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1087081" ref_url="https://bugzilla.suse.com/1087081" source="BUGZILLA"/>
		<reference ref_id="1092903" ref_url="https://bugzilla.suse.com/1092903" source="BUGZILLA"/>
		<reference ref_id="1102517" ref_url="https://bugzilla.suse.com/1102517" source="BUGZILLA"/>
		<reference ref_id="1103119" ref_url="https://bugzilla.suse.com/1103119" source="BUGZILLA"/>
		<reference ref_id="1104684" ref_url="https://bugzilla.suse.com/1104684" source="BUGZILLA"/>
		<reference ref_id="1104818" ref_url="https://bugzilla.suse.com/1104818" source="BUGZILLA"/>
		<reference ref_id="1105322" ref_url="https://bugzilla.suse.com/1105322" source="BUGZILLA"/>
		<reference ref_id="1105536" ref_url="https://bugzilla.suse.com/1105536" source="BUGZILLA"/>
		<reference ref_id="1106369" ref_url="https://bugzilla.suse.com/1106369" source="BUGZILLA"/>
		<reference ref_id="1106509" ref_url="https://bugzilla.suse.com/1106509" source="BUGZILLA"/>
		<reference ref_id="1106511" ref_url="https://bugzilla.suse.com/1106511" source="BUGZILLA"/>
		<reference ref_id="1107689" ref_url="https://bugzilla.suse.com/1107689" source="BUGZILLA"/>
		<reference ref_id="1108912" ref_url="https://bugzilla.suse.com/1108912" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-10940" ref_url="https://www.suse.com/security/cve/CVE-2018-10940/" source="CVE"/>
		<reference ref_id="CVE-2018-14634" ref_url="https://www.suse.com/security/cve/CVE-2018-14634/" source="CVE"/>
		<reference ref_id="CVE-2018-14734" ref_url="https://www.suse.com/security/cve/CVE-2018-14734/" source="CVE"/>
		<reference ref_id="CVE-2018-15572" ref_url="https://www.suse.com/security/cve/CVE-2018-15572/" source="CVE"/>
		<reference ref_id="CVE-2018-16658" ref_url="https://www.suse.com/security/cve/CVE-2018-16658/" source="CVE"/>
		<reference ref_id="CVE-2018-6554" ref_url="https://www.suse.com/security/cve/CVE-2018-6554/" source="CVE"/>
		<reference ref_id="CVE-2018-6555" ref_url="https://www.suse.com/security/cve/CVE-2018-6555/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP3 Teradata kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-14634: Prevent integer overflow in create_elf_tables that allowed a
  local attacker to exploit this vulnerability via a SUID-root binary and obtain
  full root privileges (bsc#1108912).
- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local
  attackers to use a incorrect bounds check in the CDROM driver
  CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)
- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that
  could have been used by local attackers to read kernel memory (bnc#1107689)
- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a
  denial of service (ias_object use-after-free and system crash) or possibly have
  unspecified other impact via an AF_IRDA socket (bnc#1106511)
- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed
  local users to cause a denial of service (memory consumption) by repeatedly
  binding an AF_IRDA socket (bnc#1106509)
- CVE-2018-15572: The spectre_v2_select_mitigation function did not always fill
  RSB upon a context switch, which made it easier for attackers to conduct
  userspace-userspace spectreRSB attacks (bnc#1102517)
- CVE-2018-10902: Protect against concurrent access to prevent double realloc
  (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A
  malicious local attacker could have used this for privilege escalation
  (bnc#1105322).
- CVE-2018-14734: ucma_leave_multicast accessed a certain data structure after
  a cleanup step in ucma_process_join, which allowed attackers to cause a denial
  of service (use-after-free) (bsc#1103119).
- CVE-2017-5754: Make indirect call speculation safe. (bsc#1068032)
- CVE-2017-5715: Convert entry assembler indirect jumps --ia32. (bsc#1068032)

Additionally, the following non-security issues have been fixed:

- x86/vdso: Fix vDSO build if a retpoline is emitted.
- kvm/vmx: fixes for vmentry_l1d_flush module parameter. (bsc#1106369)
- kvm/vmx: Work around kABI breakage in 'enum vmx_l1d_flush_state'. (bsc#1106369)
- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit. (bsc#1087081)
- kabi/x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+. (bsc#1105536)
- xen/x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bsc#1105536).
- xen/x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM. (bsc#1105536)
- xen/x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit. (bsc#1087081)
- kabi/x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+. (bsc#1105536)
- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+. (bsc#1105536)
- x86/speculation/l1tf: Suggest what to do on systems with too much RAM. (bsc#1105536)
- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM. (bsc#1105536)
- xen/x86/l1tf: Protect PROT_NONE PTEs against speculation fixup. (bsc#1104684, bsc#1104818)
- x86/l1tf: Protect PROT_NONE PTEs against speculation fixup. (bsc#1104684, bsc#1104818)
- rpm/kernel-docs.spec.in: Make unpack scripts executable.
- rpm/kernel-docs.spec.in: Expand kernel tree directly from sources. (bsc#1057199)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-26"/>
	<updated date="2018-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057199">SUSE bug 1057199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092903">SUSE bug 1092903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102517">SUSE bug 1102517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103119">SUSE bug 1103119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104684">SUSE bug 1104684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104818">SUSE bug 1104818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105322">SUSE bug 1105322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105536">SUSE bug 1105536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106369">SUSE bug 1106369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106509">SUSE bug 1106509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106511">SUSE bug 1106511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107689">SUSE bug 1107689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108912">SUSE bug 1108912</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5754">CVE-2017-5754 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10902">CVE-2018-10902 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10940/">CVE-2018-10940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10940">CVE-2018-10940 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14634/">CVE-2018-14634 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14634">CVE-2018-14634 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14734/">CVE-2018-14734 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14734">CVE-2018-14734 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15572/">CVE-2018-15572 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15572">CVE-2018-15572 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16658/">CVE-2018-16658 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16658">CVE-2018-16658 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6554/">CVE-2018-6554 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6554">CVE-2018-6554 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6555/">CVE-2018-6555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6555">CVE-2018-6555 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993260" comment="kernel-default-3.0.101-0.184.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993261" comment="kernel-default-base-3.0.101-0.184.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993263" comment="kernel-ec2-3.0.101-0.184.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993264" comment="kernel-ec2-base-3.0.101-0.184.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993266" comment="kernel-source-3.0.101-0.184.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993267" comment="kernel-syms-3.0.101-0.184.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993268" comment="kernel-trace-3.0.101-0.184.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993269" comment="kernel-trace-base-3.0.101-0.184.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993271" comment="kernel-xen-3.0.101-0.184.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993272" comment="kernel-xen-base-3.0.101-0.184.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218821" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-source (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1031240" ref_url="https://bugzilla.suse.com/1031240" source="BUGZILLA"/>
		<reference ref_id="1066674" ref_url="https://bugzilla.suse.com/1066674" source="BUGZILLA"/>
		<reference ref_id="1071021" ref_url="https://bugzilla.suse.com/1071021" source="BUGZILLA"/>
		<reference ref_id="1094825" ref_url="https://bugzilla.suse.com/1094825" source="BUGZILLA"/>
		<reference ref_id="1107829" ref_url="https://bugzilla.suse.com/1107829" source="BUGZILLA"/>
		<reference ref_id="1108498" ref_url="https://bugzilla.suse.com/1108498" source="BUGZILLA"/>
		<reference ref_id="1110711" ref_url="https://bugzilla.suse.com/1110711" source="BUGZILLA"/>
		<reference ref_id="1113201" ref_url="https://bugzilla.suse.com/1113201" source="BUGZILLA"/>
		<reference ref_id="1113337" ref_url="https://bugzilla.suse.com/1113337" source="BUGZILLA"/>
		<reference ref_id="1113751" ref_url="https://bugzilla.suse.com/1113751" source="BUGZILLA"/>
		<reference ref_id="1113769" ref_url="https://bugzilla.suse.com/1113769" source="BUGZILLA"/>
		<reference ref_id="936875" ref_url="https://bugzilla.suse.com/936875" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000407" ref_url="https://www.suse.com/security/cve/CVE-2017-1000407/" source="CVE"/>
		<reference ref_id="CVE-2017-16533" ref_url="https://www.suse.com/security/cve/CVE-2017-16533/" source="CVE"/>
		<reference ref_id="CVE-2017-7273" ref_url="https://www.suse.com/security/cve/CVE-2017-7273/" source="CVE"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-18281" ref_url="https://www.suse.com/security/cve/CVE-2018-18281/" source="CVE"/>
		<reference ref_id="CVE-2018-18386" ref_url="https://www.suse.com/security/cve/CVE-2018-18386/" source="CVE"/>
		<reference ref_id="CVE-2018-18710" ref_url="https://www.suse.com/security/cve/CVE-2018-18710/" source="CVE"/>
		<reference ref_id="CVE-2018-9516" ref_url="https://www.suse.com/security/cve/CVE-2018-9516/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP3 Teradata kernel was updated to fix bugs and
security issues.

The following security issues have been fixed:

- CVE-2018-14633: security flaw in iscsi target code (bsc#1107829)
- CVE-2018-18281: mremap: properly flush TLB before releasing the page (bsc#1113769)
- CVE-2018-18710: cdrom: fix improper type cast, which can lead to information leak (bsc#1113751)
- CVE-2018-18386: n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)
  (bsc#1094825, bsc#1110711)
- CVE-2017-7273: HID: hid-cypress: validate length of report (bsc#1031240)
- CVE-2017-16533: HID: usbhid: fix out-of-bounds bug (bsc#1066674)
- CVE-2017-1000407: KVM: VMX: remove I/O port 0x80 bypass on Intel hosts (bsc#1071021)
- CVE-2018-9516: HID: debug: check length before copy_to_user() (bsc#1108498)

The following bugs have been fixed:

- st: null pointer dereference panic caused by use after kref_put by st_open (bsc#936875, bsc#1113201)
- retpoline: Introduce start/end markers of indirect thunk (bsc#1113337)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-26"/>
	<updated date="2018-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1031240">SUSE bug 1031240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066674">SUSE bug 1066674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071021">SUSE bug 1071021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094825">SUSE bug 1094825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107829">SUSE bug 1107829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108498">SUSE bug 1108498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110711">SUSE bug 1110711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113201">SUSE bug 1113201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113337">SUSE bug 1113337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113751">SUSE bug 1113751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113769">SUSE bug 1113769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936875">SUSE bug 936875</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000407/">CVE-2017-1000407 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000407">CVE-2017-1000407 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16533/">CVE-2017-16533 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16533">CVE-2017-16533 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7273/">CVE-2017-7273 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7273">CVE-2017-7273 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14633">CVE-2018-14633 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18281/">CVE-2018-18281 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18281">CVE-2018-18281 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18386/">CVE-2018-18386 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18386">CVE-2018-18386 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18710/">CVE-2018-18710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18710">CVE-2018-18710 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9516/">CVE-2018-9516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9516">CVE-2018-9516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993274" comment="kernel-default-3.0.101-0.190.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993275" comment="kernel-default-base-3.0.101-0.190.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993277" comment="kernel-ec2-3.0.101-0.190.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993278" comment="kernel-ec2-base-3.0.101-0.190.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993280" comment="kernel-source-3.0.101-0.190.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993281" comment="kernel-syms-3.0.101-0.190.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993282" comment="kernel-trace-3.0.101-0.190.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993283" comment="kernel-trace-base-3.0.101-0.190.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993285" comment="kernel-xen-3.0.101-0.190.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993286" comment="kernel-xen-base-3.0.101-0.190.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218822" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1031240" ref_url="https://bugzilla.suse.com/1031240" source="BUGZILLA"/>
		<reference ref_id="1039803" ref_url="https://bugzilla.suse.com/1039803" source="BUGZILLA"/>
		<reference ref_id="1066674" ref_url="https://bugzilla.suse.com/1066674" source="BUGZILLA"/>
		<reference ref_id="1071021" ref_url="https://bugzilla.suse.com/1071021" source="BUGZILLA"/>
		<reference ref_id="1094186" ref_url="https://bugzilla.suse.com/1094186" source="BUGZILLA"/>
		<reference ref_id="1094825" ref_url="https://bugzilla.suse.com/1094825" source="BUGZILLA"/>
		<reference ref_id="1104070" ref_url="https://bugzilla.suse.com/1104070" source="BUGZILLA"/>
		<reference ref_id="1104366" ref_url="https://bugzilla.suse.com/1104366" source="BUGZILLA"/>
		<reference ref_id="1104367" ref_url="https://bugzilla.suse.com/1104367" source="BUGZILLA"/>
		<reference ref_id="1107189" ref_url="https://bugzilla.suse.com/1107189" source="BUGZILLA"/>
		<reference ref_id="1108498" ref_url="https://bugzilla.suse.com/1108498" source="BUGZILLA"/>
		<reference ref_id="1109200" ref_url="https://bugzilla.suse.com/1109200" source="BUGZILLA"/>
		<reference ref_id="1113201" ref_url="https://bugzilla.suse.com/1113201" source="BUGZILLA"/>
		<reference ref_id="1113751" ref_url="https://bugzilla.suse.com/1113751" source="BUGZILLA"/>
		<reference ref_id="1113769" ref_url="https://bugzilla.suse.com/1113769" source="BUGZILLA"/>
		<reference ref_id="1114920" ref_url="https://bugzilla.suse.com/1114920" source="BUGZILLA"/>
		<reference ref_id="1115007" ref_url="https://bugzilla.suse.com/1115007" source="BUGZILLA"/>
		<reference ref_id="1115038" ref_url="https://bugzilla.suse.com/1115038" source="BUGZILLA"/>
		<reference ref_id="1116412" ref_url="https://bugzilla.suse.com/1116412" source="BUGZILLA"/>
		<reference ref_id="1116841" ref_url="https://bugzilla.suse.com/1116841" source="BUGZILLA"/>
		<reference ref_id="1117515" ref_url="https://bugzilla.suse.com/1117515" source="BUGZILLA"/>
		<reference ref_id="1118152" ref_url="https://bugzilla.suse.com/1118152" source="BUGZILLA"/>
		<reference ref_id="1118319" ref_url="https://bugzilla.suse.com/1118319" source="BUGZILLA"/>
		<reference ref_id="1119255" ref_url="https://bugzilla.suse.com/1119255" source="BUGZILLA"/>
		<reference ref_id="1119714" ref_url="https://bugzilla.suse.com/1119714" source="BUGZILLA"/>
		<reference ref_id="1120743" ref_url="https://bugzilla.suse.com/1120743" source="BUGZILLA"/>
		<reference ref_id="905299" ref_url="https://bugzilla.suse.com/905299" source="BUGZILLA"/>
		<reference ref_id="936875" ref_url="https://bugzilla.suse.com/936875" source="BUGZILLA"/>
		<reference ref_id="968018" ref_url="https://bugzilla.suse.com/968018" source="BUGZILLA"/>
		<reference ref_id="990682" ref_url="https://bugzilla.suse.com/990682" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000407" ref_url="https://www.suse.com/security/cve/CVE-2017-1000407/" source="CVE"/>
		<reference ref_id="CVE-2017-16533" ref_url="https://www.suse.com/security/cve/CVE-2017-16533/" source="CVE"/>
		<reference ref_id="CVE-2017-7273" ref_url="https://www.suse.com/security/cve/CVE-2017-7273/" source="CVE"/>
		<reference ref_id="CVE-2018-18281" ref_url="https://www.suse.com/security/cve/CVE-2018-18281/" source="CVE"/>
		<reference ref_id="CVE-2018-18386" ref_url="https://www.suse.com/security/cve/CVE-2018-18386/" source="CVE"/>
		<reference ref_id="CVE-2018-18710" ref_url="https://www.suse.com/security/cve/CVE-2018-18710/" source="CVE"/>
		<reference ref_id="CVE-2018-19407" ref_url="https://www.suse.com/security/cve/CVE-2018-19407/" source="CVE"/>
		<reference ref_id="CVE-2018-19824" ref_url="https://www.suse.com/security/cve/CVE-2018-19824/" source="CVE"/>
		<reference ref_id="CVE-2018-19985" ref_url="https://www.suse.com/security/cve/CVE-2018-19985/" source="CVE"/>
		<reference ref_id="CVE-2018-20169" ref_url="https://www.suse.com/security/cve/CVE-2018-20169/" source="CVE"/>
		<reference ref_id="CVE-2018-9516" ref_url="https://www.suse.com/security/cve/CVE-2018-9516/" source="CVE"/>
		<reference ref_id="CVE-2018-9568" ref_url="https://www.suse.com/security/cve/CVE-2018-9568/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to 3.0.101 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-9516: In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1108498).
- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized (bnc#1116841).
- CVE-2018-19985: The function hso_probe read if_num from the USB device (as an u8) and used it without a length check to index an array, resulting in an OOB memory read in hso_probe or hso_get_config_data that could be used by local attackers (bnc#1120743).
- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).
- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1118319).
- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).
- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused (bnc#1113769).
- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
- CVE-2017-7273: The cp_report_fixup function in drivers/hid/hid-cypress.c allowed physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report (bnc#1031240).
- CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).
- CVE-2017-1000407: Fixed a denial of service, which was caused by flooding the diagnostic port 0x80 an exception leading to a kernel panic (bnc#1071021).

The following non-security bugs were fixed:

- ALSA: pcm: Fix potential deadlock in OSS emulation (bsc#968018, bsc#1104366).
- cpusets, isolcpus: exclude isolcpus from load balancing in cpusets (bsc#1119255).
- Drivers: scsi: storvsc: Change the limits to reflect the values on the host (bug#1107189).
- drivers: scsi: storvsc: Correctly handle TEST_UNIT_READY failure (bug#1107189).
- Drivers: scsi: storvsc: Filter commands based on the storage protocol version (bug#1107189).
- Drivers: scsi: storvsc: Fix a bug in handling VMBUS protocol version (bug#1107189).
- Drivers: scsi: storvsc: Implement a eh_timed_out handler (bug#1107189).
- Drivers: scsi: storvsc: Set cmd_per_lun to reflect value supported by the Host (bug#1107189).
- drivers: scsi: storvsc: Set srb_flags in all cases (bug#1107189).
- EHCI: improved logic for isochronous scheduling (bsc#1117515).
- ipv4: remove the unnecessary variable in udp_mcast_next (bsc#1104070).
- KEYS: prevent creating a different user's keyrings (bnc#1094186).
- KVM: x86: Fix the duplicate failure path handling in vmx_init (bsc#1104367).
- MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#1116412).
- MM/vmscan.c: avoid throttling reclaim for loop-back nfsd threads (bsc#1116412).
- net/ipv6/udp: Fix ipv6 multicast socket filter regression (bsc#1104070).
- NFS: avoid deadlocks with loop-back mounted NFS filesystems (bsc#1116412).
- NFS: avoid waiting at all in nfs_release_page when congested (bsc#1116412).
- NFS: Do not write enable new pages while an invalidation is proceeding (bsc#1116412).
- NFS: Fix a regression in the read() syscall (bsc#1116412).
- NFS: Fix races in nfs_revalidate_mapping (bsc#1116412).
- NFS: fix the handling of NFS_INO_INVALID_DATA flag in nfs_revalidate_mapping (bsc#1116412).
- NFS: Fix writeback performance issue on cache invalidation (bsc#1116412).
- reiserfs: do not preallocate blocks for extended attributes (bsc#990682).
- reiserfs: fix race in readdir (bsc#1039803).
- sched, isolcpu: make cpu_isolated_map visible outside scheduler (bsc#1119255).
- scsi: storvsc: Always send on the selected outgoing channel (bug#1107189).
- scsi: storvsc: Do not assume that the scatterlist is not chained (bug#1107189).
- scsi: storvsc: Fix a bug in copy_from_bounce_buffer() (bug#1107189).
- scsi: storvsc: Increase the ring buffer size (bug#1107189).
- scsi: storvsc: Size the queue depth based on the ringbuffer size (bug#1107189).
- storvsc: fix a bug in storvsc limits (bug#1107189).
- storvsc: force discovery of LUNs that may have been removed (bug#1107189).
- storvsc: get rid of overly verbose warning messages (bug#1107189).
- storvsc: in responce to a scan event, scan the host (bug#1107189).
- storvsc: Set the SRB flags correctly when no data transfer is needed (bug#1107189).
- udp: ipv4: Add udp early demux (bsc#1104070).
- udp: restore UDPlite many-cast delivery (bsc#1104070).
- udp: Simplify __udp*_lib_mcast_deliver (bsc#1104070).
- udp: Use hash2 for long hash1 chains in __udp*_lib_mcast_deliver (bsc#1104070).
- USB: EHCI: add new root-hub state: STOPPING (bsc#1117515).
- USB: EHCI: add pointer to end of async-unlink list (bsc#1117515).
- USB: EHCI: add symbolic constants for QHs (bsc#1117515).
- USB: EHCI: always scan each interrupt QH (bsc#1117515).
- USB: EHCI: do not lose events during a scan (bsc#1117515).
- USB: EHCI: do not refcount iso_stream structures (bsc#1117515).
- USB: EHCI: do not refcount QHs (bsc#1117515).
- USB: EHCI: fix initialization bug in iso_stream_schedule() (bsc#1117515).
- USB: EHCI: fix up locking (bsc#1117515).
- USB: EHCI: initialize data before resetting hardware (bsc#1117515).
- USB: EHCI: introduce high-res timer (bsc#1117515).
- USB: EHCI: remove PS3 status polling (bsc#1117515).
- USB: EHCI: remove unneeded suspend/resume code (bsc#1117515).
- USB: EHCI: rename 'reclaim' (bsc#1117515).
- USB: EHCI: resolve some unlikely races (bsc#1117515).
- USB: EHCI: return void instead of 0 (bsc#1117515).
- USB: EHCI: simplify isochronous scanning (bsc#1117515).
- USB: EHCI: unlink multiple async QHs together (bsc#1117515).
- USB: EHCI: use hrtimer for async schedule (bsc#1117515).
- USB: EHCI: use hrtimer for controller death (bsc#1117515).
- USB: EHCI: use hrtimer for interrupt QH unlink (bsc#1117515).
- USB: EHCI: use hrtimer for (s)iTD deallocation (bsc#1117515).
- USB: EHCI: use hrtimer for the IAA watchdog (bsc#1117515).
- USB: EHCI: use hrtimer for the I/O watchdog (bsc#1117515).
- USB: EHCI: use hrtimer for the periodic schedule (bsc#1117515).
- USB: EHCI: use hrtimer for unlinking empty async QHs (bsc#1117515).
- XFS: do not BUG() on mixed direct and mapped I/O (bsc#1114920).
- XFS: stop searching for free slots in an inode chunk when there are none (bsc#1115007).
- XFS: validate sb_logsunit is a multiple of the fs blocksize (bsc#1115038).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-29"/>
	<updated date="2019-01-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1031240">SUSE bug 1031240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039803">SUSE bug 1039803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066674">SUSE bug 1066674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071021">SUSE bug 1071021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094186">SUSE bug 1094186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094825">SUSE bug 1094825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104070">SUSE bug 1104070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104366">SUSE bug 1104366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104367">SUSE bug 1104367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107189">SUSE bug 1107189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108498">SUSE bug 1108498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109200">SUSE bug 1109200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113201">SUSE bug 1113201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113751">SUSE bug 1113751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113769">SUSE bug 1113769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114920">SUSE bug 1114920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115007">SUSE bug 1115007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115038">SUSE bug 1115038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116412">SUSE bug 1116412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116841">SUSE bug 1116841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117515">SUSE bug 1117515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118152">SUSE bug 1118152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118319">SUSE bug 1118319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119255">SUSE bug 1119255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119714">SUSE bug 1119714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120743">SUSE bug 1120743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905299">SUSE bug 905299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936875">SUSE bug 936875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968018">SUSE bug 968018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990682">SUSE bug 990682</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000407/">CVE-2017-1000407 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000407">CVE-2017-1000407 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16533/">CVE-2017-16533 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16533">CVE-2017-16533 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7273/">CVE-2017-7273 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7273">CVE-2017-7273 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18281/">CVE-2018-18281 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18281">CVE-2018-18281 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18386/">CVE-2018-18386 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18386">CVE-2018-18386 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18710/">CVE-2018-18710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18710">CVE-2018-18710 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19407/">CVE-2018-19407 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19407">CVE-2018-19407 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19824/">CVE-2018-19824 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19824">CVE-2018-19824 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19985/">CVE-2018-19985 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19985">CVE-2018-19985 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20169/">CVE-2018-20169 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20169">CVE-2018-20169 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9516/">CVE-2018-9516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9516">CVE-2018-9516 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9568/">CVE-2018-9568 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9568">CVE-2018-9568 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578514" comment="kernel-bigsmp-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578515" comment="kernel-bigsmp-base-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578517" comment="kernel-default-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578518" comment="kernel-default-base-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578520" comment="kernel-default-man-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578521" comment="kernel-ec2-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578522" comment="kernel-ec2-base-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568300" comment="kernel-pae-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568301" comment="kernel-pae-base-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578524" comment="kernel-source-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578525" comment="kernel-syms-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578526" comment="kernel-trace-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578527" comment="kernel-trace-base-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578529" comment="kernel-xen-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578530" comment="kernel-xen-base-3.0.101-0.47.106.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218823" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1008831" ref_url="https://bugzilla.suse.com/1008831" source="BUGZILLA"/>
		<reference ref_id="1032340" ref_url="https://bugzilla.suse.com/1032340" source="BUGZILLA"/>
		<reference ref_id="1059051" ref_url="https://bugzilla.suse.com/1059051" source="BUGZILLA"/>
		<reference ref_id="1082943" ref_url="https://bugzilla.suse.com/1082943" source="BUGZILLA"/>
		<reference ref_id="1103186" ref_url="https://bugzilla.suse.com/1103186" source="BUGZILLA"/>
		<reference ref_id="1105348" ref_url="https://bugzilla.suse.com/1105348" source="BUGZILLA"/>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1112178" ref_url="https://bugzilla.suse.com/1112178" source="BUGZILLA"/>
		<reference ref_id="1116841" ref_url="https://bugzilla.suse.com/1116841" source="BUGZILLA"/>
		<reference ref_id="1118152" ref_url="https://bugzilla.suse.com/1118152" source="BUGZILLA"/>
		<reference ref_id="1118319" ref_url="https://bugzilla.suse.com/1118319" source="BUGZILLA"/>
		<reference ref_id="1119714" ref_url="https://bugzilla.suse.com/1119714" source="BUGZILLA"/>
		<reference ref_id="1120743" ref_url="https://bugzilla.suse.com/1120743" source="BUGZILLA"/>
		<reference ref_id="1123706" ref_url="https://bugzilla.suse.com/1123706" source="BUGZILLA"/>
		<reference ref_id="1124010" ref_url="https://bugzilla.suse.com/1124010" source="BUGZILLA"/>
		<reference ref_id="1124735" ref_url="https://bugzilla.suse.com/1124735" source="BUGZILLA"/>
		<reference ref_id="1125931" ref_url="https://bugzilla.suse.com/1125931" source="BUGZILLA"/>
		<reference ref_id="1128166" ref_url="https://bugzilla.suse.com/1128166" source="BUGZILLA"/>
		<reference ref_id="1134729" ref_url="https://bugzilla.suse.com/1134729" source="BUGZILLA"/>
		<reference ref_id="773383" ref_url="https://bugzilla.suse.com/773383" source="BUGZILLA"/>
		<reference ref_id="774523" ref_url="https://bugzilla.suse.com/774523" source="BUGZILLA"/>
		<reference ref_id="797175" ref_url="https://bugzilla.suse.com/797175" source="BUGZILLA"/>
		<reference ref_id="800280" ref_url="https://bugzilla.suse.com/800280" source="BUGZILLA"/>
		<reference ref_id="816708" ref_url="https://bugzilla.suse.com/816708" source="BUGZILLA"/>
		<reference ref_id="899192" ref_url="https://bugzilla.suse.com/899192" source="BUGZILLA"/>
		<reference ref_id="927257" ref_url="https://bugzilla.suse.com/927257" source="BUGZILLA"/>
		<reference ref_id="929141" ref_url="https://bugzilla.suse.com/929141" source="BUGZILLA"/>
		<reference ref_id="931850" ref_url="https://bugzilla.suse.com/931850" source="BUGZILLA"/>
		<reference ref_id="969340" ref_url="https://bugzilla.suse.com/969340" source="BUGZILLA"/>
		<reference ref_id="989152" ref_url="https://bugzilla.suse.com/989152" source="BUGZILLA"/>
		<reference ref_id="CVE-2004-0230" ref_url="https://www.suse.com/security/cve/CVE-2004-0230/" source="CVE"/>
		<reference ref_id="CVE-2012-3412" ref_url="https://www.suse.com/security/cve/CVE-2012-3412/" source="CVE"/>
		<reference ref_id="CVE-2012-3430" ref_url="https://www.suse.com/security/cve/CVE-2012-3430/" source="CVE"/>
		<reference ref_id="CVE-2013-0160" ref_url="https://www.suse.com/security/cve/CVE-2013-0160/" source="CVE"/>
		<reference ref_id="CVE-2013-0216" ref_url="https://www.suse.com/security/cve/CVE-2013-0216/" source="CVE"/>
		<reference ref_id="CVE-2013-1979" ref_url="https://www.suse.com/security/cve/CVE-2013-1979/" source="CVE"/>
		<reference ref_id="CVE-2014-3611" ref_url="https://www.suse.com/security/cve/CVE-2014-3611/" source="CVE"/>
		<reference ref_id="CVE-2014-9922" ref_url="https://www.suse.com/security/cve/CVE-2014-9922/" source="CVE"/>
		<reference ref_id="CVE-2015-3331" ref_url="https://www.suse.com/security/cve/CVE-2015-3331/" source="CVE"/>
		<reference ref_id="CVE-2016-10741" ref_url="https://www.suse.com/security/cve/CVE-2016-10741/" source="CVE"/>
		<reference ref_id="CVE-2016-8632" ref_url="https://www.suse.com/security/cve/CVE-2016-8632/" source="CVE"/>
		<reference ref_id="CVE-2017-14489" ref_url="https://www.suse.com/security/cve/CVE-2017-14489/" source="CVE"/>
		<reference ref_id="CVE-2017-18360" ref_url="https://www.suse.com/security/cve/CVE-2017-18360/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-15594" ref_url="https://www.suse.com/security/cve/CVE-2018-15594/" source="CVE"/>
		<reference ref_id="CVE-2018-19407" ref_url="https://www.suse.com/security/cve/CVE-2018-19407/" source="CVE"/>
		<reference ref_id="CVE-2018-19824" ref_url="https://www.suse.com/security/cve/CVE-2018-19824/" source="CVE"/>
		<reference ref_id="CVE-2018-19985" ref_url="https://www.suse.com/security/cve/CVE-2018-19985/" source="CVE"/>
		<reference ref_id="CVE-2018-20169" ref_url="https://www.suse.com/security/cve/CVE-2018-20169/" source="CVE"/>
		<reference ref_id="CVE-2018-9568" ref_url="https://www.suse.com/security/cve/CVE-2018-9568/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-7222" ref_url="https://www.suse.com/security/cve/CVE-2019-7222/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP3 kernel was updated to receive various security and bugfixes.

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

This kernel update contains software mitigations for these issues, which also utilize CPU microcode updates shipped in parallel.

For more information on this set of information leaks, check out https://www.suse.com/support/kb/doc/?id=7023736

The following security bugs were fixed:

- CVE-2013-0216: The Xen netback functionality allowed guest OS users to cause a denial of service (loop) by triggering ring pointer corruption (bnc#800280).
- CVE-2012-3430: The rds_recvmsg function in net/rds/recv.c did not initialize a certain structure member, which allowed local users to obtain potentially sensitive information from kernel stack memory via a recvfrom or recvmsg system call on an RDS socket (bnc#773383).
- CVE-2012-3412: The sfc (aka Solarflare Solarstorm) driver allowed remote attackers to cause a denial of service (DMA descriptor consumption and network-controller outage) via crafted TCP packets that trigger a small MSS value (bnc#774523).
- CVE-2004-0230: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP (bnc#969340).
- CVE-2013-0160: The kernel allowed local users to obtain sensitive information about keystroke timing by using the inotify API on the /dev/ptmx device (bnc#797175).
- CVE-2013-1979: The scm_set_cred function in include/net/scm.h uses incorrect uid and gid values during credentials passing, which allowed local users to gain privileges via a crafted application (bnc#816708).
- CVE-2017-14489: The iscsi_if_rx function in drivers/scsi/scsi_transport_iscsi.c allowed local users to cause a denial of service (panic) by leveraging incorrect length validation (bnc#1059051).
- CVE-2017-18360: In change_port_settings in drivers/usb/serial/io_ti.c a local users could cause a denial of service by division-by-zero in the serial device layer by trying to set very high baud rates (bnc#1123706).
- CVE-2015-3331: The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c did not properly determine the memory locations used for encrypted data, which allowed context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket (bnc#927257).
- CVE-2014-9922: The eCryptfs subsystem allowed local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c (bnc#1032340).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c did not validate the relationship between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).
- CVE-2018-15594: arch/x86/kernel/paravirt.c mishandled certain indirect calls, which made it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests (bnc#1105348).
- CVE-2016-10741: fs/xfs/xfs_aops.c allowed local users to cause a denial of service (system crash) because there is a race condition between direct and memory-mapped I/O (associated with a hole) that is handled with BUG_ON instead of an I/O failure (bnc#1124010).
- CVE-2014-3611: Race condition in the __kvm_migrate_pit_timer function in arch/x86/kvm/i8254.c in the KVM subsystem allowed guest OS users to cause a denial of service (host OS crash) by leveraging incorrect PIT emulation (bnc#899192).
- CVE-2019-9213: The expand_downwards function in mm/mmap.c lacks a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).
- CVE-2019-7222: The KVM implementation in has an Information Leak (bnc#1124735).
- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized (bnc#1116841).
- CVE-2018-19985: The function hso_get_config_data in drivers/net/usb/hso.c reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allowed arbitrary read in the kernel address space (bnc#1120743).
- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).
- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bnc#1118319).
- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).

The following non-security bugs were fixed:

- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).
- cpu/speculation: Add 'mitigations=' cmdline option (bsc#1112178).
- lib: add 'on'/'off' support to strtobool (bsc#1125931).
- sched/core: Optimize SCHED_SMT (bsc#1111331).
- sched/smt: Expose sched_smt_present static key (bsc#1111331).
- sched/smt: Make sched_smt_present track topology (bsc#1111331).
- sched/smt: Update sched_smt_present at runtime (bsc#1111331).
- x86, kvm: Remove incorrect redundant assembly constraint (bnc#931850).
- x86/cpu: Sanitize FAM6_ATOM naming (bsc#1111331).
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active (bsc#1111331).
- x86/speculation/mds: Add 'mitigations=' support for MDS (bsc#1111331).
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bsc#1111331).
- x86/speculation/mds: Add SMT warning message (bsc#1111331).
- x86/speculation/mds: Add basic bug infrastructure for MDS (bsc#1111331).
- x86/speculation/mds: Add mds=full,nosmt cmdline option (bsc#1111331).
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bsc#1111331).
- x86/speculation/mds: Add mitigation control for MDS (bsc#1111331).
- x86/speculation/mds: Add mitigation mode VMWERV (bsc#1111331).
- x86/speculation/mds: Add sysfs reporting for MDS (bsc#1111331).
- x86/speculation/mds: Clear CPU buffers on exit to user (bsc#1111331).
- x86/speculation/mds: Conditionally clear CPU buffers on idle entry (bsc#1111331).
- x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off (bsc#1111331).
- x86/speculation: Consolidate CPU whitelists (bsc#1111331).
- x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation (bsc#1111331).
- x86/speculation: Move arch_smt_update() call to after mitigation decisions (bsc#1111331).
- x86/speculation: Rework SMT state change (bsc#1111331).
- x86/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- x86/mce: Handle 'nosmt' offlining properly (bsc#1134729).
- x86/mce/intel: Cleanup CMCI storm logic (bsc#929141).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-21"/>
	<updated date="2019-05-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1008831">SUSE bug 1008831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032340">SUSE bug 1032340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059051">SUSE bug 1059051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082943">SUSE bug 1082943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105348">SUSE bug 1105348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112178">SUSE bug 1112178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116841">SUSE bug 1116841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118152">SUSE bug 1118152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118319">SUSE bug 1118319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119714">SUSE bug 1119714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120743">SUSE bug 1120743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123706">SUSE bug 1123706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124010">SUSE bug 1124010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124735">SUSE bug 1124735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125931">SUSE bug 1125931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128166">SUSE bug 1128166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134729">SUSE bug 1134729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773383">SUSE bug 773383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774523">SUSE bug 774523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797175">SUSE bug 797175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800280">SUSE bug 800280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816708">SUSE bug 816708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899192">SUSE bug 899192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927257">SUSE bug 927257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929141">SUSE bug 929141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931850">SUSE bug 931850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969340">SUSE bug 969340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989152">SUSE bug 989152</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2004-0230/">CVE-2004-0230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-0230">CVE-2004-0230 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3412/">CVE-2012-3412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3412">CVE-2012-3412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3430/">CVE-2012-3430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3430">CVE-2012-3430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0160/">CVE-2013-0160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0160">CVE-2013-0160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0216/">CVE-2013-0216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0216">CVE-2013-0216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1979/">CVE-2013-1979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1979">CVE-2013-1979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3611/">CVE-2014-3611 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3611">CVE-2014-3611 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9922/">CVE-2014-9922 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9922">CVE-2014-9922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3331/">CVE-2015-3331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3331">CVE-2015-3331 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2016-10741/">CVE-2016-10741 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10741">CVE-2016-10741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8632/">CVE-2016-8632 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8632">CVE-2016-8632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14489/">CVE-2017-14489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14489">CVE-2017-14489 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18360/">CVE-2017-18360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18360">CVE-2017-18360 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15594/">CVE-2018-15594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15594">CVE-2018-15594 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19407/">CVE-2018-19407 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19407">CVE-2018-19407 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19824/">CVE-2018-19824 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19824">CVE-2018-19824 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19985/">CVE-2018-19985 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19985">CVE-2018-19985 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20169/">CVE-2018-20169 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20169">CVE-2018-20169 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9568/">CVE-2018-9568 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9568">CVE-2018-9568 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7222/">CVE-2019-7222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7222">CVE-2019-7222 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9213">CVE-2019-9213 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993288" comment="kernel-default-3.0.101-0.195.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993289" comment="kernel-default-base-3.0.101-0.195.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993291" comment="kernel-ec2-3.0.101-0.195.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993292" comment="kernel-ec2-base-3.0.101-0.195.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993294" comment="kernel-source-3.0.101-0.195.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993295" comment="kernel-syms-3.0.101-0.195.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993296" comment="kernel-trace-3.0.101-0.195.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993297" comment="kernel-trace-base-3.0.101-0.195.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993299" comment="kernel-xen-3.0.101-0.195.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993300" comment="kernel-xen-base-3.0.101-0.195.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218824" version="1" class="patch">
	<metadata>
		<title>Optional update for Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="767610" ref_url="https://bugzilla.suse.com/767610" source="BUGZILLA"/>
		<reference ref_id="786450" ref_url="https://bugzilla.suse.com/786450" source="BUGZILLA"/>
		<reference ref_id="792271" ref_url="https://bugzilla.suse.com/792271" source="BUGZILLA"/>
		<reference ref_id="821619" ref_url="https://bugzilla.suse.com/821619" source="BUGZILLA"/>
		<reference ref_id="832710" ref_url="https://bugzilla.suse.com/832710" source="BUGZILLA"/>
		<reference ref_id="837563" ref_url="https://bugzilla.suse.com/837563" source="BUGZILLA"/>
		<reference ref_id="840524" ref_url="https://bugzilla.suse.com/840524" source="BUGZILLA"/>
		<reference ref_id="846404" ref_url="https://bugzilla.suse.com/846404" source="BUGZILLA"/>
		<reference ref_id="846690" ref_url="https://bugzilla.suse.com/846690" source="BUGZILLA"/>
		<reference ref_id="847652" ref_url="https://bugzilla.suse.com/847652" source="BUGZILLA"/>
		<reference ref_id="850915" ref_url="https://bugzilla.suse.com/850915" source="BUGZILLA"/>
		<reference ref_id="851426" ref_url="https://bugzilla.suse.com/851426" source="BUGZILLA"/>
		<reference ref_id="851603" ref_url="https://bugzilla.suse.com/851603" source="BUGZILLA"/>
		<reference ref_id="852553" ref_url="https://bugzilla.suse.com/852553" source="BUGZILLA"/>
		<reference ref_id="855126" ref_url="https://bugzilla.suse.com/855126" source="BUGZILLA"/>
		<reference ref_id="857926" ref_url="https://bugzilla.suse.com/857926" source="BUGZILLA"/>
		<reference ref_id="858869" ref_url="https://bugzilla.suse.com/858869" source="BUGZILLA"/>
		<reference ref_id="858870" ref_url="https://bugzilla.suse.com/858870" source="BUGZILLA"/>
		<reference ref_id="858872" ref_url="https://bugzilla.suse.com/858872" source="BUGZILLA"/>
		<reference ref_id="859840" ref_url="https://bugzilla.suse.com/859840" source="BUGZILLA"/>
		<reference ref_id="861636" ref_url="https://bugzilla.suse.com/861636" source="BUGZILLA"/>
		<reference ref_id="861980" ref_url="https://bugzilla.suse.com/861980" source="BUGZILLA"/>
		<reference ref_id="862429" ref_url="https://bugzilla.suse.com/862429" source="BUGZILLA"/>
		<reference ref_id="862934" ref_url="https://bugzilla.suse.com/862934" source="BUGZILLA"/>
		<reference ref_id="863300" ref_url="https://bugzilla.suse.com/863300" source="BUGZILLA"/>
		<reference ref_id="863335" ref_url="https://bugzilla.suse.com/863335" source="BUGZILLA"/>
		<reference ref_id="863410" ref_url="https://bugzilla.suse.com/863410" source="BUGZILLA"/>
		<reference ref_id="863873" ref_url="https://bugzilla.suse.com/863873" source="BUGZILLA"/>
		<reference ref_id="864404" ref_url="https://bugzilla.suse.com/864404" source="BUGZILLA"/>
		<reference ref_id="864464" ref_url="https://bugzilla.suse.com/864464" source="BUGZILLA"/>
		<reference ref_id="865310" ref_url="https://bugzilla.suse.com/865310" source="BUGZILLA"/>
		<reference ref_id="865330" ref_url="https://bugzilla.suse.com/865330" source="BUGZILLA"/>
		<reference ref_id="865882" ref_url="https://bugzilla.suse.com/865882" source="BUGZILLA"/>
		<reference ref_id="866081" ref_url="https://bugzilla.suse.com/866081" source="BUGZILLA"/>
		<reference ref_id="866102" ref_url="https://bugzilla.suse.com/866102" source="BUGZILLA"/>
		<reference ref_id="866615" ref_url="https://bugzilla.suse.com/866615" source="BUGZILLA"/>
		<reference ref_id="866800" ref_url="https://bugzilla.suse.com/866800" source="BUGZILLA"/>
		<reference ref_id="866864" ref_url="https://bugzilla.suse.com/866864" source="BUGZILLA"/>
		<reference ref_id="867362" ref_url="https://bugzilla.suse.com/867362" source="BUGZILLA"/>
		<reference ref_id="867517" ref_url="https://bugzilla.suse.com/867517" source="BUGZILLA"/>
		<reference ref_id="867531" ref_url="https://bugzilla.suse.com/867531" source="BUGZILLA"/>
		<reference ref_id="867723" ref_url="https://bugzilla.suse.com/867723" source="BUGZILLA"/>
		<reference ref_id="867953" ref_url="https://bugzilla.suse.com/867953" source="BUGZILLA"/>
		<reference ref_id="868488" ref_url="https://bugzilla.suse.com/868488" source="BUGZILLA"/>
		<reference ref_id="868528" ref_url="https://bugzilla.suse.com/868528" source="BUGZILLA"/>
		<reference ref_id="868653" ref_url="https://bugzilla.suse.com/868653" source="BUGZILLA"/>
		<reference ref_id="868748" ref_url="https://bugzilla.suse.com/868748" source="BUGZILLA"/>
		<reference ref_id="869033" ref_url="https://bugzilla.suse.com/869033" source="BUGZILLA"/>
		<reference ref_id="869414" ref_url="https://bugzilla.suse.com/869414" source="BUGZILLA"/>
		<reference ref_id="869563" ref_url="https://bugzilla.suse.com/869563" source="BUGZILLA"/>
		<reference ref_id="869934" ref_url="https://bugzilla.suse.com/869934" source="BUGZILLA"/>
		<reference ref_id="870173" ref_url="https://bugzilla.suse.com/870173" source="BUGZILLA"/>
		<reference ref_id="870335" ref_url="https://bugzilla.suse.com/870335" source="BUGZILLA"/>
		<reference ref_id="870450" ref_url="https://bugzilla.suse.com/870450" source="BUGZILLA"/>
		<reference ref_id="870496" ref_url="https://bugzilla.suse.com/870496" source="BUGZILLA"/>
		<reference ref_id="870498" ref_url="https://bugzilla.suse.com/870498" source="BUGZILLA"/>
		<reference ref_id="870576" ref_url="https://bugzilla.suse.com/870576" source="BUGZILLA"/>
		<reference ref_id="870591" ref_url="https://bugzilla.suse.com/870591" source="BUGZILLA"/>
		<reference ref_id="870618" ref_url="https://bugzilla.suse.com/870618" source="BUGZILLA"/>
		<reference ref_id="870877" ref_url="https://bugzilla.suse.com/870877" source="BUGZILLA"/>
		<reference ref_id="870958" ref_url="https://bugzilla.suse.com/870958" source="BUGZILLA"/>
		<reference ref_id="871561" ref_url="https://bugzilla.suse.com/871561" source="BUGZILLA"/>
		<reference ref_id="871634" ref_url="https://bugzilla.suse.com/871634" source="BUGZILLA"/>
		<reference ref_id="871676" ref_url="https://bugzilla.suse.com/871676" source="BUGZILLA"/>
		<reference ref_id="871728" ref_url="https://bugzilla.suse.com/871728" source="BUGZILLA"/>
		<reference ref_id="871854" ref_url="https://bugzilla.suse.com/871854" source="BUGZILLA"/>
		<reference ref_id="871861" ref_url="https://bugzilla.suse.com/871861" source="BUGZILLA"/>
		<reference ref_id="871899" ref_url="https://bugzilla.suse.com/871899" source="BUGZILLA"/>
		<reference ref_id="872188" ref_url="https://bugzilla.suse.com/872188" source="BUGZILLA"/>
		<reference ref_id="872540" ref_url="https://bugzilla.suse.com/872540" source="BUGZILLA"/>
		<reference ref_id="872634" ref_url="https://bugzilla.suse.com/872634" source="BUGZILLA"/>
		<reference ref_id="873061" ref_url="https://bugzilla.suse.com/873061" source="BUGZILLA"/>
		<reference ref_id="873374" ref_url="https://bugzilla.suse.com/873374" source="BUGZILLA"/>
		<reference ref_id="873463" ref_url="https://bugzilla.suse.com/873463" source="BUGZILLA"/>
		<reference ref_id="874108" ref_url="https://bugzilla.suse.com/874108" source="BUGZILLA"/>
		<reference ref_id="874145" ref_url="https://bugzilla.suse.com/874145" source="BUGZILLA"/>
		<reference ref_id="874440" ref_url="https://bugzilla.suse.com/874440" source="BUGZILLA"/>
		<reference ref_id="874577" ref_url="https://bugzilla.suse.com/874577" source="BUGZILLA"/>
		<reference ref_id="875386" ref_url="https://bugzilla.suse.com/875386" source="BUGZILLA"/>
		<reference ref_id="876102" ref_url="https://bugzilla.suse.com/876102" source="BUGZILLA"/>
		<reference ref_id="876114" ref_url="https://bugzilla.suse.com/876114" source="BUGZILLA"/>
		<reference ref_id="876176" ref_url="https://bugzilla.suse.com/876176" source="BUGZILLA"/>
		<reference ref_id="876463" ref_url="https://bugzilla.suse.com/876463" source="BUGZILLA"/>
		<reference ref_id="877013" ref_url="https://bugzilla.suse.com/877013" source="BUGZILLA"/>
		<reference ref_id="877257" ref_url="https://bugzilla.suse.com/877257" source="BUGZILLA"/>
		<reference ref_id="877497" ref_url="https://bugzilla.suse.com/877497" source="BUGZILLA"/>
		<reference ref_id="877775" ref_url="https://bugzilla.suse.com/877775" source="BUGZILLA"/>
		<reference ref_id="878115" ref_url="https://bugzilla.suse.com/878115" source="BUGZILLA"/>
		<reference ref_id="878123" ref_url="https://bugzilla.suse.com/878123" source="BUGZILLA"/>
		<reference ref_id="878274" ref_url="https://bugzilla.suse.com/878274" source="BUGZILLA"/>
		<reference ref_id="878407" ref_url="https://bugzilla.suse.com/878407" source="BUGZILLA"/>
		<reference ref_id="878509" ref_url="https://bugzilla.suse.com/878509" source="BUGZILLA"/>
		<reference ref_id="879921" ref_url="https://bugzilla.suse.com/879921" source="BUGZILLA"/>
		<reference ref_id="879957" ref_url="https://bugzilla.suse.com/879957" source="BUGZILLA"/>
		<reference ref_id="880007" ref_url="https://bugzilla.suse.com/880007" source="BUGZILLA"/>
		<reference ref_id="880357" ref_url="https://bugzilla.suse.com/880357" source="BUGZILLA"/>
		<reference ref_id="880437" ref_url="https://bugzilla.suse.com/880437" source="BUGZILLA"/>
		<reference ref_id="880484" ref_url="https://bugzilla.suse.com/880484" source="BUGZILLA"/>
		<reference ref_id="881571" ref_url="https://bugzilla.suse.com/881571" source="BUGZILLA"/>
		<reference ref_id="881761" ref_url="https://bugzilla.suse.com/881761" source="BUGZILLA"/>
		<reference ref_id="881939" ref_url="https://bugzilla.suse.com/881939" source="BUGZILLA"/>
		<reference ref_id="882324" ref_url="https://bugzilla.suse.com/882324" source="BUGZILLA"/>
		<reference ref_id="883380" ref_url="https://bugzilla.suse.com/883380" source="BUGZILLA"/>
		<reference ref_id="883795" ref_url="https://bugzilla.suse.com/883795" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2372" ref_url="https://www.suse.com/security/cve/CVE-2012-2372/" source="CVE"/>
		<reference ref_id="CVE-2013-2929" ref_url="https://www.suse.com/security/cve/CVE-2013-2929/" source="CVE"/>
		<reference ref_id="CVE-2013-4299" ref_url="https://www.suse.com/security/cve/CVE-2013-4299/" source="CVE"/>
		<reference ref_id="CVE-2013-4579" ref_url="https://www.suse.com/security/cve/CVE-2013-4579/" source="CVE"/>
		<reference ref_id="CVE-2013-6382" ref_url="https://www.suse.com/security/cve/CVE-2013-6382/" source="CVE"/>
		<reference ref_id="CVE-2013-7339" ref_url="https://www.suse.com/security/cve/CVE-2013-7339/" source="CVE"/>
		<reference ref_id="CVE-2014-0055" ref_url="https://www.suse.com/security/cve/CVE-2014-0055/" source="CVE"/>
		<reference ref_id="CVE-2014-0077" ref_url="https://www.suse.com/security/cve/CVE-2014-0077/" source="CVE"/>
		<reference ref_id="CVE-2014-0101" ref_url="https://www.suse.com/security/cve/CVE-2014-0101/" source="CVE"/>
		<reference ref_id="CVE-2014-0131" ref_url="https://www.suse.com/security/cve/CVE-2014-0131/" source="CVE"/>
		<reference ref_id="CVE-2014-0155" ref_url="https://www.suse.com/security/cve/CVE-2014-0155/" source="CVE"/>
		<reference ref_id="CVE-2014-1444" ref_url="https://www.suse.com/security/cve/CVE-2014-1444/" source="CVE"/>
		<reference ref_id="CVE-2014-1445" ref_url="https://www.suse.com/security/cve/CVE-2014-1445/" source="CVE"/>
		<reference ref_id="CVE-2014-1446" ref_url="https://www.suse.com/security/cve/CVE-2014-1446/" source="CVE"/>
		<reference ref_id="CVE-2014-1874" ref_url="https://www.suse.com/security/cve/CVE-2014-1874/" source="CVE"/>
		<reference ref_id="CVE-2014-2309" ref_url="https://www.suse.com/security/cve/CVE-2014-2309/" source="CVE"/>
		<reference ref_id="CVE-2014-2523" ref_url="https://www.suse.com/security/cve/CVE-2014-2523/" source="CVE"/>
		<reference ref_id="CVE-2014-2678" ref_url="https://www.suse.com/security/cve/CVE-2014-2678/" source="CVE"/>
		<reference ref_id="CVE-2014-2851" ref_url="https://www.suse.com/security/cve/CVE-2014-2851/" source="CVE"/>
		<reference ref_id="CVE-2014-3122" ref_url="https://www.suse.com/security/cve/CVE-2014-3122/" source="CVE"/>
		<reference ref_id="CVE-2014-3144" ref_url="https://www.suse.com/security/cve/CVE-2014-3144/" source="CVE"/>
		<reference ref_id="CVE-2014-3145" ref_url="https://www.suse.com/security/cve/CVE-2014-3145/" source="CVE"/>
		<reference ref_id="CVE-2014-3917" ref_url="https://www.suse.com/security/cve/CVE-2014-3917/" source="CVE"/>
		<reference ref_id="CVE-2014-4652" ref_url="https://www.suse.com/security/cve/CVE-2014-4652/" source="CVE"/>
		<reference ref_id="CVE-2014-4653" ref_url="https://www.suse.com/security/cve/CVE-2014-4653/" source="CVE"/>
		<reference ref_id="CVE-2014-4654" ref_url="https://www.suse.com/security/cve/CVE-2014-4654/" source="CVE"/>
		<reference ref_id="CVE-2014-4655" ref_url="https://www.suse.com/security/cve/CVE-2014-4655/" source="CVE"/>
		<reference ref_id="CVE-2014-4656" ref_url="https://www.suse.com/security/cve/CVE-2014-4656/" source="CVE"/>
		<description>

This SUSE Linux Enterprise 11 Service Pack 3 kernel update introduces the 
bigsmp kernel flavor which is optimized for very large systems. 
(FATE#317271)

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-09"/>
	<updated date="2014-07-09"/>
	<bugzilla href="https://bugzilla.suse.com/767610">SUSE bug 767610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786450">SUSE bug 786450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792271">SUSE bug 792271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821619">SUSE bug 821619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/832710">SUSE bug 832710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/837563">SUSE bug 837563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840524">SUSE bug 840524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846404">SUSE bug 846404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846690">SUSE bug 846690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847652">SUSE bug 847652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/850915">SUSE bug 850915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851426">SUSE bug 851426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851603">SUSE bug 851603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852553">SUSE bug 852553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855126">SUSE bug 855126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857926">SUSE bug 857926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858869">SUSE bug 858869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858870">SUSE bug 858870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858872">SUSE bug 858872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859840">SUSE bug 859840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861636">SUSE bug 861636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861980">SUSE bug 861980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862429">SUSE bug 862429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862934">SUSE bug 862934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863300">SUSE bug 863300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863335">SUSE bug 863335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863410">SUSE bug 863410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863873">SUSE bug 863873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864404">SUSE bug 864404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864464">SUSE bug 864464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865310">SUSE bug 865310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865330">SUSE bug 865330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865882">SUSE bug 865882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866081">SUSE bug 866081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866102">SUSE bug 866102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866615">SUSE bug 866615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866800">SUSE bug 866800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866864">SUSE bug 866864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867362">SUSE bug 867362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867517">SUSE bug 867517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867531">SUSE bug 867531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867723">SUSE bug 867723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867953">SUSE bug 867953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868488">SUSE bug 868488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868528">SUSE bug 868528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868653">SUSE bug 868653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868748">SUSE bug 868748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869033">SUSE bug 869033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869414">SUSE bug 869414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869563">SUSE bug 869563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869934">SUSE bug 869934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870173">SUSE bug 870173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870335">SUSE bug 870335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870450">SUSE bug 870450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870496">SUSE bug 870496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870498">SUSE bug 870498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870576">SUSE bug 870576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870591">SUSE bug 870591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870877">SUSE bug 870877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870958">SUSE bug 870958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871561">SUSE bug 871561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871634">SUSE bug 871634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871676">SUSE bug 871676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871728">SUSE bug 871728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871854">SUSE bug 871854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871861">SUSE bug 871861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871899">SUSE bug 871899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/872188">SUSE bug 872188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/872540">SUSE bug 872540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/872634">SUSE bug 872634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873061">SUSE bug 873061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873374">SUSE bug 873374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873463">SUSE bug 873463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/874108">SUSE bug 874108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/874145">SUSE bug 874145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/874440">SUSE bug 874440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/874577">SUSE bug 874577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875386">SUSE bug 875386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876102">SUSE bug 876102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876114">SUSE bug 876114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876176">SUSE bug 876176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876463">SUSE bug 876463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877013">SUSE bug 877013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877257">SUSE bug 877257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877497">SUSE bug 877497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877775">SUSE bug 877775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878115">SUSE bug 878115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878123">SUSE bug 878123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878274">SUSE bug 878274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878407">SUSE bug 878407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878509">SUSE bug 878509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879921">SUSE bug 879921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879957">SUSE bug 879957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880007">SUSE bug 880007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880357">SUSE bug 880357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880437">SUSE bug 880437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880484">SUSE bug 880484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881571">SUSE bug 881571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881761">SUSE bug 881761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881939">SUSE bug 881939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882324">SUSE bug 882324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883380">SUSE bug 883380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883795">SUSE bug 883795</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2372/">CVE-2012-2372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2372">CVE-2012-2372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2929/">CVE-2013-2929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2929">CVE-2013-2929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4299/">CVE-2013-4299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4299">CVE-2013-4299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4579/">CVE-2013-4579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4579">CVE-2013-4579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6382/">CVE-2013-6382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6382">CVE-2013-6382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7339/">CVE-2013-7339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7339">CVE-2013-7339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0055/">CVE-2014-0055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0055">CVE-2014-0055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0077/">CVE-2014-0077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0077">CVE-2014-0077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0101/">CVE-2014-0101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0101">CVE-2014-0101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0131/">CVE-2014-0131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0131">CVE-2014-0131 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-0155/">CVE-2014-0155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0155">CVE-2014-0155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1444/">CVE-2014-1444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1444">CVE-2014-1444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1445/">CVE-2014-1445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1445">CVE-2014-1445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1446/">CVE-2014-1446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1446">CVE-2014-1446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1874/">CVE-2014-1874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1874">CVE-2014-1874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2309/">CVE-2014-2309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2309">CVE-2014-2309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2523/">CVE-2014-2523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2523">CVE-2014-2523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2678/">CVE-2014-2678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2678">CVE-2014-2678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2851/">CVE-2014-2851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2851">CVE-2014-2851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3122/">CVE-2014-3122 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3122">CVE-2014-3122 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3144/">CVE-2014-3144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3144">CVE-2014-3144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3145/">CVE-2014-3145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3145">CVE-2014-3145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3917/">CVE-2014-3917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3917">CVE-2014-3917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4652/">CVE-2014-4652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4652">CVE-2014-4652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4653/">CVE-2014-4653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4653">CVE-2014-4653 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4654/">CVE-2014-4654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4654">CVE-2014-4654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4655/">CVE-2014-4655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4655">CVE-2014-4655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4656/">CVE-2014-4656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4656">CVE-2014-4656 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009589756" comment="iscsitarget-kmp-bigsmp-1.4.20_3.0.101_0.35-0.38.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993302" comment="kernel-bigsmp-3.0.101-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993303" comment="kernel-bigsmp-base-3.0.101-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589765" comment="ofed-kmp-bigsmp-1.5.4.1_3.0.101_0.35-0.13.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589766" comment="oracleasm-kmp-bigsmp-2.0.5_3.0.101_0.35-7.39.71 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009589756" comment="iscsitarget-kmp-bigsmp-1.4.20_3.0.101_0.35-0.38.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993302" comment="kernel-bigsmp-3.0.101-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993303" comment="kernel-bigsmp-base-3.0.101-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589765" comment="ofed-kmp-bigsmp-1.5.4.1_3.0.101_0.35-0.13.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589766" comment="oracleasm-kmp-bigsmp-2.0.5_3.0.101_0.35-7.39.71 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009589756" comment="iscsitarget-kmp-bigsmp-1.4.20_3.0.101_0.35-0.38.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993302" comment="kernel-bigsmp-3.0.101-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993303" comment="kernel-bigsmp-base-3.0.101-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589765" comment="ofed-kmp-bigsmp-1.5.4.1_3.0.101_0.35-0.13.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589766" comment="oracleasm-kmp-bigsmp-2.0.5_3.0.101_0.35-7.39.71 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218825" version="1" class="patch">
	<metadata>
		<title>Security update for Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="774818" ref_url="https://bugzilla.suse.com/774818" source="BUGZILLA"/>
		<reference ref_id="806990" ref_url="https://bugzilla.suse.com/806990" source="BUGZILLA"/>
		<reference ref_id="816708" ref_url="https://bugzilla.suse.com/816708" source="BUGZILLA"/>
		<reference ref_id="826486" ref_url="https://bugzilla.suse.com/826486" source="BUGZILLA"/>
		<reference ref_id="832309" ref_url="https://bugzilla.suse.com/832309" source="BUGZILLA"/>
		<reference ref_id="849123" ref_url="https://bugzilla.suse.com/849123" source="BUGZILLA"/>
		<reference ref_id="855657" ref_url="https://bugzilla.suse.com/855657" source="BUGZILLA"/>
		<reference ref_id="859840" ref_url="https://bugzilla.suse.com/859840" source="BUGZILLA"/>
		<reference ref_id="860441" ref_url="https://bugzilla.suse.com/860441" source="BUGZILLA"/>
		<reference ref_id="860593" ref_url="https://bugzilla.suse.com/860593" source="BUGZILLA"/>
		<reference ref_id="863586" ref_url="https://bugzilla.suse.com/863586" source="BUGZILLA"/>
		<reference ref_id="866130" ref_url="https://bugzilla.suse.com/866130" source="BUGZILLA"/>
		<reference ref_id="866615" ref_url="https://bugzilla.suse.com/866615" source="BUGZILLA"/>
		<reference ref_id="866864" ref_url="https://bugzilla.suse.com/866864" source="BUGZILLA"/>
		<reference ref_id="866911" ref_url="https://bugzilla.suse.com/866911" source="BUGZILLA"/>
		<reference ref_id="869055" ref_url="https://bugzilla.suse.com/869055" source="BUGZILLA"/>
		<reference ref_id="869934" ref_url="https://bugzilla.suse.com/869934" source="BUGZILLA"/>
		<reference ref_id="870161" ref_url="https://bugzilla.suse.com/870161" source="BUGZILLA"/>
		<reference ref_id="871797" ref_url="https://bugzilla.suse.com/871797" source="BUGZILLA"/>
		<reference ref_id="876017" ref_url="https://bugzilla.suse.com/876017" source="BUGZILLA"/>
		<reference ref_id="876055" ref_url="https://bugzilla.suse.com/876055" source="BUGZILLA"/>
		<reference ref_id="876114" ref_url="https://bugzilla.suse.com/876114" source="BUGZILLA"/>
		<reference ref_id="876590" ref_url="https://bugzilla.suse.com/876590" source="BUGZILLA"/>
		<reference ref_id="879921" ref_url="https://bugzilla.suse.com/879921" source="BUGZILLA"/>
		<reference ref_id="880344" ref_url="https://bugzilla.suse.com/880344" source="BUGZILLA"/>
		<reference ref_id="880370" ref_url="https://bugzilla.suse.com/880370" source="BUGZILLA"/>
		<reference ref_id="881051" ref_url="https://bugzilla.suse.com/881051" source="BUGZILLA"/>
		<reference ref_id="881759" ref_url="https://bugzilla.suse.com/881759" source="BUGZILLA"/>
		<reference ref_id="882317" ref_url="https://bugzilla.suse.com/882317" source="BUGZILLA"/>
		<reference ref_id="882639" ref_url="https://bugzilla.suse.com/882639" source="BUGZILLA"/>
		<reference ref_id="882804" ref_url="https://bugzilla.suse.com/882804" source="BUGZILLA"/>
		<reference ref_id="882900" ref_url="https://bugzilla.suse.com/882900" source="BUGZILLA"/>
		<reference ref_id="883376" ref_url="https://bugzilla.suse.com/883376" source="BUGZILLA"/>
		<reference ref_id="883518" ref_url="https://bugzilla.suse.com/883518" source="BUGZILLA"/>
		<reference ref_id="883724" ref_url="https://bugzilla.suse.com/883724" source="BUGZILLA"/>
		<reference ref_id="884333" ref_url="https://bugzilla.suse.com/884333" source="BUGZILLA"/>
		<reference ref_id="884582" ref_url="https://bugzilla.suse.com/884582" source="BUGZILLA"/>
		<reference ref_id="884725" ref_url="https://bugzilla.suse.com/884725" source="BUGZILLA"/>
		<reference ref_id="884767" ref_url="https://bugzilla.suse.com/884767" source="BUGZILLA"/>
		<reference ref_id="885262" ref_url="https://bugzilla.suse.com/885262" source="BUGZILLA"/>
		<reference ref_id="885382" ref_url="https://bugzilla.suse.com/885382" source="BUGZILLA"/>
		<reference ref_id="885422" ref_url="https://bugzilla.suse.com/885422" source="BUGZILLA"/>
		<reference ref_id="885509" ref_url="https://bugzilla.suse.com/885509" source="BUGZILLA"/>
		<reference ref_id="886840" ref_url="https://bugzilla.suse.com/886840" source="BUGZILLA"/>
		<reference ref_id="887082" ref_url="https://bugzilla.suse.com/887082" source="BUGZILLA"/>
		<reference ref_id="887503" ref_url="https://bugzilla.suse.com/887503" source="BUGZILLA"/>
		<reference ref_id="887608" ref_url="https://bugzilla.suse.com/887608" source="BUGZILLA"/>
		<reference ref_id="887645" ref_url="https://bugzilla.suse.com/887645" source="BUGZILLA"/>
		<reference ref_id="887680" ref_url="https://bugzilla.suse.com/887680" source="BUGZILLA"/>
		<reference ref_id="888058" ref_url="https://bugzilla.suse.com/888058" source="BUGZILLA"/>
		<reference ref_id="888105" ref_url="https://bugzilla.suse.com/888105" source="BUGZILLA"/>
		<reference ref_id="888591" ref_url="https://bugzilla.suse.com/888591" source="BUGZILLA"/>
		<reference ref_id="888607" ref_url="https://bugzilla.suse.com/888607" source="BUGZILLA"/>
		<reference ref_id="888847" ref_url="https://bugzilla.suse.com/888847" source="BUGZILLA"/>
		<reference ref_id="888849" ref_url="https://bugzilla.suse.com/888849" source="BUGZILLA"/>
		<reference ref_id="888968" ref_url="https://bugzilla.suse.com/888968" source="BUGZILLA"/>
		<reference ref_id="889061" ref_url="https://bugzilla.suse.com/889061" source="BUGZILLA"/>
		<reference ref_id="889173" ref_url="https://bugzilla.suse.com/889173" source="BUGZILLA"/>
		<reference ref_id="889451" ref_url="https://bugzilla.suse.com/889451" source="BUGZILLA"/>
		<reference ref_id="889614" ref_url="https://bugzilla.suse.com/889614" source="BUGZILLA"/>
		<reference ref_id="889727" ref_url="https://bugzilla.suse.com/889727" source="BUGZILLA"/>
		<reference ref_id="890297" ref_url="https://bugzilla.suse.com/890297" source="BUGZILLA"/>
		<reference ref_id="890426" ref_url="https://bugzilla.suse.com/890426" source="BUGZILLA"/>
		<reference ref_id="890513" ref_url="https://bugzilla.suse.com/890513" source="BUGZILLA"/>
		<reference ref_id="890526" ref_url="https://bugzilla.suse.com/890526" source="BUGZILLA"/>
		<reference ref_id="891087" ref_url="https://bugzilla.suse.com/891087" source="BUGZILLA"/>
		<reference ref_id="891259" ref_url="https://bugzilla.suse.com/891259" source="BUGZILLA"/>
		<reference ref_id="891619" ref_url="https://bugzilla.suse.com/891619" source="BUGZILLA"/>
		<reference ref_id="892200" ref_url="https://bugzilla.suse.com/892200" source="BUGZILLA"/>
		<reference ref_id="892490" ref_url="https://bugzilla.suse.com/892490" source="BUGZILLA"/>
		<reference ref_id="892723" ref_url="https://bugzilla.suse.com/892723" source="BUGZILLA"/>
		<reference ref_id="893064" ref_url="https://bugzilla.suse.com/893064" source="BUGZILLA"/>
		<reference ref_id="893496" ref_url="https://bugzilla.suse.com/893496" source="BUGZILLA"/>
		<reference ref_id="893596" ref_url="https://bugzilla.suse.com/893596" source="BUGZILLA"/>
		<reference ref_id="894200" ref_url="https://bugzilla.suse.com/894200" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1979" ref_url="https://www.suse.com/security/cve/CVE-2013-1979/" source="CVE"/>
		<reference ref_id="CVE-2014-1739" ref_url="https://www.suse.com/security/cve/CVE-2014-1739/" source="CVE"/>
		<reference ref_id="CVE-2014-2706" ref_url="https://www.suse.com/security/cve/CVE-2014-2706/" source="CVE"/>
		<reference ref_id="CVE-2014-4027" ref_url="https://www.suse.com/security/cve/CVE-2014-4027/" source="CVE"/>
		<reference ref_id="CVE-2014-4171" ref_url="https://www.suse.com/security/cve/CVE-2014-4171/" source="CVE"/>
		<reference ref_id="CVE-2014-4508" ref_url="https://www.suse.com/security/cve/CVE-2014-4508/" source="CVE"/>
		<reference ref_id="CVE-2014-4667" ref_url="https://www.suse.com/security/cve/CVE-2014-4667/" source="CVE"/>
		<reference ref_id="CVE-2014-4943" ref_url="https://www.suse.com/security/cve/CVE-2014-4943/" source="CVE"/>
		<reference ref_id="CVE-2014-5077" ref_url="https://www.suse.com/security/cve/CVE-2014-5077/" source="CVE"/>
		<reference ref_id="CVE-2014-5471" ref_url="https://www.suse.com/security/cve/CVE-2014-5471/" source="CVE"/>
		<reference ref_id="CVE-2014-5472" ref_url="https://www.suse.com/security/cve/CVE-2014-5472/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix 
various bugs and security issues.

The following security bugs have been fixed:

    * 

      CVE-2014-1739: The media_device_enum_entities function in
      drivers/media/media-device.c in the Linux kernel before 3.14.6 does
      not initialize a certain data structure, which allows local users to
      obtain sensitive information from kernel memory by leveraging
      /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call
      (bnc#882804).

    * 

      CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not
      properly implement the interaction between range notification and
      hole punching, which allows local users to cause a denial of service
      (i_mutex hold) by using the mmap system call to access a hole, as
      demonstrated by interfering with intended shmem activity by blocking
      completion of (1) an MADV_REMOVE madvise call or (2) an
      FALLOC_FL_PUNCH_HOLE fallocate call (bnc#883518).

    * 

      CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through
      3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and
      the sep CPU feature flag is set, allows local users to cause a denial
      of service (OOPS and system crash) via an invalid syscall number, as
      demonstrated by number 1000 (bnc#883724).

    * 

      CVE-2014-4667: The sctp_association_free function in
      net/sctp/associola.c in the Linux kernel before 3.15.2 does not
      properly manage a certain backlog value, which allows remote
      attackers to cause a denial of service (socket outage) via a crafted
      SCTP packet (bnc#885422).

    * 

      CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the
      Linux kernel through 3.15.6 allows local users to gain privileges by
      leveraging data-structure differences between an l2tp socket and an
      inet socket (bnc#887082).

    * 

      CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c
      in the Linux kernel through 3.15.8, when SCTP authentication is
      enabled, allows remote attackers to cause a denial of service (NULL
      pointer dereference and OOPS) by starting to establish an association
      between two endpoints immediately after an exchange of INIT and INIT
      ACK chunks to establish an earlier association between these
      endpoints in the opposite direction (bnc#889173).

    * 

      CVE-2014-5471: Stack consumption vulnerability in the
      parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the
      Linux kernel through 3.16.1 allows local users to cause a denial of
      service (uncontrolled recursion, and system crash or reboot) via a
      crafted iso9660 image with a CL entry referring to a directory entry
      that has a CL entry. (bnc#892490)

    * 

      CVE-2014-5472: The parse_rock_ridge_inode_internal function in
      fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users
      to cause a denial of service (unkillable mount process) via a crafted
      iso9660 image with a self-referential CL entry. (bnc#892490)

    * 

      CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux
      kernel before 3.13.7 allows remote attackers to cause a denial of
      service (system crash) via network traffic that improperly interacts
      with the WLAN_STA_PS_STA state (aka power-save mode), related to
      sta_info.c and tx.c. (bnc#871797)

    * 

      CVE-2014-4027: The rd_build_device_space function in
      drivers/target/target_core_rd.c in the Linux kernel before 3.14 does
      not properly initialize a certain data structure, which allows local
      users to obtain sensitive information from ramdisk_mcp memory by
      leveraging access to a SCSI initiator. (bnc#882639)

    * 

      CVE-2014-3153 The futex_requeue function in kernel/futex.c in the
      Linux kernel through 3.14.5 does not ensure that calls have two
      different futex addresses, which allows local users to gain
      privileges via a crafted FUTEX_REQUEUE command that facilitates
      unsafe waiter modification. (bnc#880892)

    * 

      CVE-2014-6410: Avoid infinite loop when processing indirect ICBs
      (bnc#896689)

The following non-security bugs have been fixed:

    * ACPI / PAD: call schedule() when need_resched() is true (bnc#866911).
    * ACPI: Fix bug when ACPI reset register is implemented in system
      memory (bnc#882900).
    * ACPI: Limit access to custom_method (bnc#884333).
    * ALSA: hda - Enabling Realtek ALC 671 codec (bnc#891746).
    * Add option to automatically enforce module signatures when in Secure
      Boot mode (bnc#884333).
    * Add secure_modules() call (bnc#884333).
    * Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344).
    * Backported new patches of Lock down functions for UEFI secure boot
      Also updated series.conf and removed old patches.
    * Btrfs: Return EXDEV for cross file system snapshot.
    * Btrfs: abort the transaction when we does not find our extent ref.
    * Btrfs: avoid warning bomb of btrfs_invalidate_inodes.
    * Btrfs: cancel scrub on transaction abortion.
    * Btrfs: correctly set profile flags on seqlock retry.
    * Btrfs: does not check nodes for extent items.
    * Btrfs: fix a possible deadlock between scrub and transaction
      committing.
    * Btrfs: fix corruption after write/fsync failure + fsync + log
      recovery (bnc#894200).
    * Btrfs: fix csum tree corruption, duplicate and outdated checksums
      (bnc#891619).
    * Btrfs: fix double free in find_lock_delalloc_range.
    * Btrfs: fix possible memory leak in btrfs_create_tree().
    * Btrfs: fix use of uninit 'ret' in end_extent_writepage().
    * Btrfs: free delayed node outside of root-&gt;inode_lock (bnc#866864).
    * Btrfs: make DEV_INFO ioctl available to anyone.
    * Btrfs: make FS_INFO ioctl available to anyone.
    * Btrfs: make device scan less noisy.
    * Btrfs: make sure there are not any read requests before stopping
      workers.
    * Btrfs: more efficient io tree navigation on wait_extent_bit.
    * Btrfs: output warning instead of error when loading free space cache
      failed.
    * Btrfs: retrieve more info from FS_INFO ioctl.
    * Btrfs: return EPERM when deleting a default subvolume (bnc#869934).
    * Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol
      (bnc#866615).
    * Btrfs: use right type to get real comparison.
    * Btrfs: wake up @scrub_pause_wait as much as we can.
    * Btrfs: wake up transaction thread upon remount.
    * CacheFiles: Add missing retrieval completions (bnc#880344).
    * CacheFiles: Does not try to dump the index key if the cookie has been
      cleared (bnc#880344).
    * CacheFiles: Downgrade the requirements passed to the allocator
      (bnc#880344).
    * CacheFiles: Fix the marking of cached pages (bnc#880344).
    * CacheFiles: Implement invalidation (bnc#880344).
    * CacheFiles: Make some debugging statements conditional (bnc#880344).
    * Drivers: hv: util: Fix a bug in the KVP code (bnc#886840).
    * Drivers: hv: vmbus: Fix a bug in the channel callback dispatch code
      (bnc#886840).
    * FS-Cache: Add transition to handle invalidate immediately after
      lookup (bnc#880344).
    * FS-Cache: Check that there are no read ops when cookie relinquished
      (bnc#880344).
    * FS-Cache: Clear remaining page count on retrieval cancellation
      (bnc#880344).
    * FS-Cache: Convert the object event ID #defines into an enum
      (bnc#880344).
    * FS-Cache: Does not sleep in page release if __GFP_FS is not set
      (bnc#880344).
    * FS-Cache: Does not use spin_is_locked() in assertions (bnc#880344).
    * FS-Cache: Exclusive op submission can BUG if there is been an I/O
      error (bnc#880344).
    * FS-Cache: Fix __wait_on_atomic_t() to call the action func if the
      counter != 0 (bnc#880344).
    * FS-Cache: Fix object state machine to have separate work and wait
      states (bnc#880344).
    * FS-Cache: Fix operation state management and accounting (bnc#880344).
    * FS-Cache: Fix signal handling during waits (bnc#880344).
    * FS-Cache: Initialise the object event mask with the calculated mask
      (bnc#880344).
    * FS-Cache: Limit the number of I/O error reports for a cache
      (bnc#880344).
    * FS-Cache: Make cookie relinquishment wait for outstanding reads
      (bnc#880344).
    * FS-Cache: Mark cancellation of in-progress operation (bnc#880344).
    * FS-Cache: One of the write operation paths doeses not set the object
      state (bnc#880344).
    * FS-Cache: Provide proper invalidation (bnc#880344).
    * FS-Cache: Simplify cookie retention for fscache_objects, fixing oops
      (bnc#880344).
    * FS-Cache: The retrieval remaining-pages counter needs to be atomic_t
      (bnc#880344).
    * FS-Cache: Uninline fscache_object_init() (bnc#880344).
    * FS-Cache: Wrap checks on object state (bnc#880344).
    * HID: usbhid: add always-poll quirk (bnc#888607).
    * HID: usbhid: enable always-poll quirk for Elan Touchscreen
      (bnc#888607).
    * IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297).
    * Ignore 'flags' change to event_constraint (bnc#876114).
    * Ignore data_src/weight changes to perf_sample_data (bnc#876114).
    * NFS: Allow more operations in an NFSv4.1 request (bnc#890513).
    * NFS: Clean up helper function nfs4_select_rw_stateid() (bnc#888968).
    * NFS: Does not copy read delegation stateids in setattr (bnc#888968).
    * NFS: Does not use a delegation to open a file when returning that
      delegation (bnc#888968, bnc#892200, bnc#893596, bnc#893496)
    * NFS: Fixes for NFS RCU-walk support in line with code going upstream
    * NFS: Use FS-Cache invalidation (bnc#880344).
    * NFS: allow lockless access to access_cache (bnc#866130).
    * NFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts
      (bnc#888591).
    * NFS: nfs4_do_open should add negative results to the dcache
      (bnc#866130).
    * NFS: nfs_migrate_page() does not wait for FS-Cache to finish with a
      page (bnc#880344).
    * NFS: nfs_open_revalidate: only evaluate parent if it will be used
      (bnc#866130).
    * NFS: prepare for RCU-walk support but pushing tests later in code
      (bnc#866130).
    * NFS: support RCU_WALK in nfs_permission() (bnc#866130).
    * NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130).
    * NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130).
    * NFSD: Does not hand out delegations for 30 seconds after recalling
      them (bnc#880370).
    * NFSv4 set open access operation call flag in nfs4_init_opendata_res
      (bnc#888968, bnc#892200, bnc#893596, bnc#893496).
    * NFSv4: Add a helper for encoding opaque data (bnc#888968).
    * NFSv4: Add a helper for encoding stateids (bnc#888968).
    * NFSv4: Add helpers for basic copying of stateids (bnc#888968).
    * NFSv4: Clean up nfs4_select_rw_stateid() (bnc#888968).
    * NFSv4: Fix the return value of nfs4_select_rw_stateid (bnc#888968).
    * NFSv4: Rename nfs4_copy_stateid() (bnc#888968).
    * NFSv4: Resend the READ/WRITE RPC call if a stateid change causes an
      error (bnc#888968).
    * NFSv4: Simplify the struct nfs4_stateid (bnc#888968).
    * NFSv4: The stateid must remain the same for replayed RPC calls
      (bnc#888968).
    * NFSv4: nfs4_stateid_is_current should return 'true' for an invalid
      stateid (bnc#888968).
    * One more fix for kABI breakage.
    * PCI: Lock down BAR access when module security is enabled
      (bnc#884333).
    * PCI: enable MPS 'performance' setting to properly handle bridge MPS
      (bnc#883376).
    * PM / Hibernate: Add memory_rtree_find_bit function (bnc#860441).
    * PM / Hibernate: Create a Radix-Tree to store memory bitmap
      (bnc#860441).
    * PM / Hibernate: Implement position keeping in radix tree
      (bnc#860441).
    * PM / Hibernate: Iterate over set bits instead of PFNs in
      swsusp_free() (bnc#860441).
    * PM / Hibernate: Remove the old memory-bitmap implementation
      (bnc#860441).
    * PM / Hibernate: Touch Soft Lockup Watchdog in rtree_next_node
      (bnc#860441).
    * Restrict /dev/mem and /dev/kmem when module loading is restricted
      (bnc#884333).
    * Reuse existing 'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT
      (bnc#876114).
    * USB: handle LPM errors during device suspend correctly (bnc#849123).
    * Update kabi files to reflect fscache change (bnc#880344)
    * Update x86_64 config files: re-enable SENSORS_W83627EHF (bnc#891281)
    * VFS: Make more complete truncate operation available to CacheFiles
      (bnc#880344).
    * [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger (FATE#83366,
      ltc#83367).
    * acpi: Ignore acpi_rsdp kernel parameter when module loading is
      restricted (bnc#884333).
    * af_iucv: correct cleanup if listen backlog is full (bnc#885262,
      LTC#111728).
    * asus-wmi: Restrict debugfs interface when module loading is
      restricted (bnc#884333).
    * autofs4: allow RCU-walk to walk through autofs4 (bnc#866130).
    * autofs4: avoid taking fs_lock during rcu-walk (bnc#866130).
    * autofs4: does not take spinlock when not needed in
      autofs4_lookup_expiring (bnc#866130).
    * autofs4: factor should_expire() out of autofs4_expire_indirect
      (bnc#866130).
    * autofs4: make 'autofs4_can_expire' idempotent (bnc#866130).
    * autofs4: remove a redundant assignment (bnc#866130).
    * autofs: fix lockref lookup (bnc#888591).
    * be2net: add dma_mapping_error() check for dma_map_page()
      (bnc#881759).
    * block: add cond_resched() to potentially long running ioctl discard
      loop (bnc#884725).
    * block: fix race between request completion and timeout handling
      (bnc#881051).
    * cdc-ether: clean packet filter upon probe (bnc#876017).
    * cpuset: Fix memory allocator deadlock (bnc#876590).
    * crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs
      have them, but some are FIPS certified, with some kernel support.
    * crypto: fips - only panic on bad/missing crypto mod signatures
      (bnc#887503).
    * crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips
      mode (bnc#889451).
    * dasd: validate request size before building CCW/TCW (bnc#891087,
      LTC#114068).
    * dm mpath: fix race condition between multipath_dtr and pg_init_done
      (bnc#826486).
    * dm-mpath: fix panic on deleting sg device (bnc#870161).
    * drm/ast: AST2000 cannot be detected correctly (bnc#895983).
    * drm/ast: Actually load DP501 firmware when required (bnc#895608
      bnc#871134).
    * drm/ast: Add missing entry to dclk_table[].
    * drm/ast: Add reduced non reduced mode parsing for wide screen mode
      (bnc#892723).
    * drm/ast: initial DP501 support (v0.2) (bnc#871134).
    * drm/ast: open key before detect chips (bnc#895983).
    * drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304).
    * drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064).
    * drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init
      (bnc#869055).
    * drm/i915: create functions for the 'unclaimed register' checks
      (bnc#869055).
    * drm/i915: use FPGA_DBG for the 'unclaimed register' checks
      (bnc#869055).
    * drm/mgag200: Initialize data needed to map fbdev memory (bnc
      #806990).
    * e1000e: enable support for new device IDs (bnc#885509).
    * fs/fscache: remove spin_lock() from the condition in while()
      (bnc#880344).
    * hibernate: Disable in a signed modules environment (bnc#884333).
    * hugetlb: does not use ERR_PTR with VM_FAULT* values
    * ibmvscsi: Abort init sequence during error recovery (bnc#885382).
    * ibmvscsi: Add memory barriers for send / receive (bnc#885382).
    * inet: add a redirect generation id in inetpeer (bnc#860593).
    * inetpeer: initialize -&gt;redirect_genid in inet_getpeer() (bnc#860593).
    * ipv6: tcp: fix tcp_v6_conn_request() (bnc#887645).
    * kabi: hide bnc#860593 changes of struct inetpeer_addr_base
      (bnc#860593).
    * kernel: 3215 tty hang (bnc#891087, LTC#114562).
    * kernel: fix data corruption when reading /proc/sysinfo (bnc#891087,
      LTC#114480).
    * kernel: fix kernel oops with load of fpc register (bnc#889061,
      LTC#113596).
    * kernel: sclp console tty reference counting (bnc#891087, LTC#115466).
    * kexec: Disable at runtime if the kernel enforces module loading
      restrictions (bnc#884333).
    * md/raid6: avoid data corruption during recovery of double-degraded
      RAID6.
    * memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim
      fix).
    * memcg: do not expose uninitialized mem_cgroup_per_node to world
      (bnc#883096).
    * mm, hugetlb: add VM_NORESERVE check in vma_has_reserves()
    * mm, hugetlb: change variable name reservations to resv
    * mm, hugetlb: decrement reserve count if VM_NORESERVE alloc page cache
    * mm, hugetlb: defer freeing pages when gathering surplus pages
    * mm, hugetlb: do not use a page in page cache for cow optimization
    * mm, hugetlb: fix and clean-up node iteration code to alloc or free
    * mm, hugetlb: fix race in region tracking
    * mm, hugetlb: fix subpool accounting handling
    * mm, hugetlb: improve page-fault scalability
    * mm, hugetlb: improve, cleanup resv_map parameters
    * mm, hugetlb: move up the code which check availability of free huge
      page
    * mm, hugetlb: protect reserved pages when soft offlining a hugepage
    * mm, hugetlb: remove decrement_hugepage_resv_vma()
    * mm, hugetlb: remove redundant list_empty check in
      gather_surplus_pages()
    * mm, hugetlb: remove resv_map_put
    * mm, hugetlb: remove useless check about mapping type
    * mm, hugetlb: return a reserved page to a reserved pool if failed
    * mm, hugetlb: trivial commenting fix
    * mm, hugetlb: unify region structure handling
    * mm, hugetlb: unify region structure handling kabi
    * mm, hugetlb: use long vars instead of int in region_count() (Hugetlb
      Fault Scalability).
    * mm, hugetlb: use vma_resv_map() map types
    * mm, oom: fix badness score underflow (bnc#884582, bnc#884767).
    * mm, oom: normalize oom scores to oom_score_adj scale only for
      userspace (bnc#884582, bnc#884767).
    * mm, thp: do not allow thp faults to avoid cpuset restrictions
      (bnc#888849).
    * net/mlx4_core: Load higher level modules according to ports type
      (bnc#887680).
    * net/mlx4_core: Load the IB driver when the device supports IBoE
      (bnc#887680).
    * net/mlx4_en: Fix a race between napi poll function and RX ring
      cleanup (bnc#863586).
    * net/mlx4_en: Fix selftest failing on non 10G link speed (bnc#888058).
    * net: fix checksumming features handling in output path (bnc#891259).
    * pagecache_limit: batch large nr_to_scan targets (bnc#895221).
    * pagecachelimit: reduce lru_lock congestion for heavy parallel reclaim
      fix (bnc#895680).
    * perf/core: Add weighted samples (bnc#876114).
    * perf/x86: Add flags to event constraints (bnc#876114).
    * perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114).
    * perf: Add generic memory sampling interface (bnc#876114).
    * qla2xxx: Avoid escalating the SCSI error handler if the command is
      not found in firmware (bnc#859840).
    * qla2xxx: Clear loop_id for ports that are marked lost during fabric
      scanning (bnc#859840).
    * qla2xxx: Does not check for firmware hung during the reset context
      for ISP82XX (bnc#859840).
    * qla2xxx: Issue abort command for outstanding commands during cleanup
      when only firmware is alive (bnc#859840).
    * qla2xxx: Reduce the time we wait for a command to complete during
      SCSI error handling (bnc#859840).
    * qla2xxx: Set host can_queue value based on available resources
      (bnc#859840).
    * restore smp_mb() in unlock_new_inode() (bnc#890526).
    * s390/pci: introduce lazy IOTLB flushing for DMA unmap (bnc#889061,
      LTC#113725).
    * sched: fix the theoretical signal_wake_up() vs schedule() race
      (bnc#876055).
    * sclp_vt220: Enable integrated ASCII console per default (bnc#885262,
      LTC#112035).
    * scsi_dh: use missing accessor 'scsi_device_from_queue' (bnc#889614).
    * scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608).
    * scsiback: correct grant page unmapping.
    * scsiback: fix retry handling in __report_luns().
    * scsiback: free resources after error.
    * sunrpc/auth: allow lockless (rcu) lookup of credential cache
      (bnc#866130).
    * supported.conf: remove external from drivers/net/veth (bnc#889727)
    * supported.conf: support net/sched/act_police.ko (bnc#890426)
    * tcp: adapt selected parts of RFC 5682 and PRR logic (bnc#879921).
    * tg3: Change nvram command timeout value to 50ms (bnc#855657).
    * tg3: Override clock, link aware and link idle mode during NVRAM dump
      (bnc#855657).
    * tg3: Set the MAC clock to the fastest speed during boot code load
      (bnc#855657).
    * usb: Does not enable LPM if the exit latency is zero (bnc#832309).
    * usbcore: Does not log on consecutive debounce failures of the same
      port (bnc#888105).
    * usbhid: fix PIXART optical mouse (bnc#888607).
    * uswsusp: Disable when module loading is restricted (bnc#884333).
    * vscsi: support larger transfer sizes (bnc#774818).
    * writeback: Do not sync data dirtied after sync start (bnc#833820).
    * x86 thermal: Delete power-limit-notification console messages
      (bnc#882317).
    * x86 thermal: Disable power limit notification interrupt by default
      (bnc#882317).
    * x86 thermal: Re-enable power limit notification interrupt by default
      (bnc#882317).
    * x86, cpu hotplug: Fix stack frame warning in
      check_irq_vectors_for_cpu_disable() (bnc#887418).
    * x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847).
    * x86/UV: Add kdump to UV NMI handler (bnc#888847).
    * x86/UV: Add summary of cpu activity to UV NMI handler (bnc#888847).
    * x86/UV: Move NMI support (bnc#888847).
    * x86/UV: Update UV support for external NMI signals (bnc#888847).
    * x86/uv/nmi: Fix Sparse warnings (bnc#888847).
    * x86: Add check for number of available vectors before CPU down
      (bnc#887418).
    * x86: Lock down IO port access when module security is enabled
      (bnc#884333).
    * x86: Restrict MSR access when module loading is restricted
      (bnc#884333).

Security Issues:

    * CVE-2013-1979
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979&gt;
    * CVE-2014-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739&gt;
    * CVE-2014-2706
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706&gt;
    * CVE-2014-4027
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027&gt;
    * CVE-2014-4171
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171&gt;
    * CVE-2014-4508
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508&gt;
    * CVE-2014-4667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667&gt;
    * CVE-2014-4943
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943&gt;
    * CVE-2014-5077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077&gt;
    * CVE-2014-5471
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471&gt;
    * CVE-2014-5472
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472&gt;
    * CVE-2014-3153
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153&gt;
    * CVE-2014-6410
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410&gt;

The SUSE Linux Enterprise 11 Service Pack 3 kernel was updated to fix 
various bugs and security issues.

Following security bugs were fixed: CVE-2013-1979: The scm_set_cred 
function in include/net/scm.h in the Linux kernel before 3.8.11 uses 
incorrect uid and gid values during credentials passing, which allows local 
users to gain privileges via a crafted application (bnc#816708).

CVE-2014-1739: The media_device_enum_entities function in 
drivers/media/media-device.c in the Linux kernel before 3.14.6 does not 
initialize a certain data structure, which allows local users to obtain 
sensitive information from kernel memory by leveraging /dev/media0 read 
access for a MEDIA_IOC_ENUM_ENTITIES ioctl call (bnc#882804).

CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not 
properly implement the interaction between range notification and hole 
punching, which allows local users to cause a denial of service (i_mutex 
hold) by using the mmap system call to access a hole, as demonstrated by 
interfering with intended shmem activity by blocking completion of (1) an 
MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call 
(bnc#883518).

CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through 
3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the 
sep CPU feature flag is set, allows local users to cause a denial of 
service (OOPS and system crash) via an invalid syscall number, as 
demonstrated by number 1000 (bnc#883724).

CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c 
in the Linux kernel before 3.15.2 does not properly manage a certain 
backlog value, which allows remote attackers to cause a denial of service 
(socket outage) via a crafted SCTP packet (bnc#885422).

CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux 
kernel through 3.15.6 allows local users to gain privileges by leveraging 
data-structure differences between an l2tp socket and an inet socket 
(bnc#887082).

CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in 
the Linux kernel through 3.15.8, when SCTP authentication is enabled, 
allows remote attackers to cause a denial of service (NULL pointer 
dereference and OOPS) by starting to establish an association between two 
endpoints immediately after an exchange of INIT and INIT ACK chunks to 
establish an earlier association between these endpoints in the opposite 
direction (bnc#889173).

CVE-2014-5471: Stack consumption vulnerability in the 
parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux 
kernel through 3.16.1 allows local users to cause a denial of service 
(uncontrolled recursion, and system crash or reboot) via a crafted iso9660 
image with a CL entry referring to a directory entry that has a CL entry. 
(bnc#892490)

CVE-2014-5472: The parse_rock_ridge_inode_internal function in 
fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to 
cause a denial of service (unkillable mount process) via a crafted iso9660 
image with a self-referential CL entry. (bnc#892490)

CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux kernel 
before 3.13.7 allows remote attackers to cause a denial of service (system 
crash) via network traffic that improperly interacts with the 
WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and 
tx.c. (bnc#871797)

CVE-2014-4027: The rd_build_device_space function in 
drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not 
properly initialize a certain data structure, which allows local users to 
obtain sensitive information from ramdisk_mcp memory by leveraging access 
to a SCSI initiator. (bnc#882639)

The following non-security bugs were fixed: - ACPI / PAD: call schedule() 
when need_resched() is true (bnc#866911). - ACPI: Fix bug when ACPI reset 
register is implemented in system memory (bnc#882900). - ACPI: Limit access 
to custom_method (bnc#884333). - Add option to automatically enforce module 
signatures when in Secure Boot mode (bnc#884333). - Add secure_modules() 
call (bnc#884333). - Add wait_on_atomic_t() and wake_up_atomic_t() 
(bnc#880344). - Backported new patches of Lock down functions for UEFI 
secure boot Also updated series.conf and removed old patches. - Btrfs: 
Return EXDEV for cross file system snapshot. - Btrfs: abort the transaction 
when we does not find our extent ref. - Btrfs: avoid warning bomb of 
btrfs_invalidate_inodes. - Btrfs: cancel scrub on transaction abortion. - 
Btrfs: correctly set profile flags on seqlock retry. - Btrfs: does not 
check nodes for extent items. - Btrfs: fix a possible deadlock between 
scrub and transaction committing. - Btrfs: fix corruption after write/fsync 
failure + fsync + log recovery (bnc#894200). - Btrfs: fix csum tree 
corruption, duplicate and outdated checksums (bnc#891619). - Btrfs: fix 
double free in find_lock_delalloc_range. - Btrfs: fix possible memory leak 
in btrfs_create_tree(). - Btrfs: fix use of uninit 'ret' in 
end_extent_writepage(). - Btrfs: free delayed node outside of 
root-&gt;inode_lock (bnc#866864). - Btrfs: make DEV_INFO ioctl available to 
anyone. - Btrfs: make FS_INFO ioctl available to anyone. - Btrfs: make 
device scan less noisy. - Btrfs: make sure there are not any read requests 
before stopping workers. - Btrfs: more efficient io tree navigation on 
wait_extent_bit. - Btrfs: output warning instead of error when loading free 
space cache failed. - Btrfs: retrieve more info from FS_INFO ioctl. - 
Btrfs: return EPERM when deleting a default subvolume (bnc#869934). - 
Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol (bnc#866615). 
- Btrfs: use right type to get real comparison. - Btrfs: wake up 
@scrub_pause_wait as much as we can. - Btrfs: wake up transaction thread 
upon remount. - CacheFiles: Add missing retrieval completions (bnc#880344). 
- CacheFiles: Does not try to dump the index key if the cookie has been 
cleared (bnc#880344). - CacheFiles: Downgrade the requirements passed to 
the allocator (bnc#880344). - CacheFiles: Fix the marking of cached pages 
(bnc#880344). - CacheFiles: Implement invalidation (bnc#880344). - 
CacheFiles: Make some debugging statements conditional (bnc#880344). - 
Drivers: hv: util: Fix a bug in the KVP code (bnc#886840). - Drivers: hv: 
vmbus: Fix a bug in the channel callback dispatch code (bnc#886840). - 
FS-Cache: Add transition to handle invalidate immediately after lookup 
(bnc#880344). - FS-Cache: Check that there are no read ops when cookie 
relinquished (bnc#880344). - FS-Cache: Clear remaining page count on 
retrieval cancellation (bnc#880344). - FS-Cache: Convert the object event 
ID #defines into an enum (bnc#880344). - FS-Cache: Does not sleep in page 
release if __GFP_FS is not set (bnc#880344). - FS-Cache: Does not use 
spin_is_locked() in assertions (bnc#880344). - FS-Cache: Exclusive op 
submission can BUG if there is been an I/O error (bnc#880344). - FS-Cache: 
Fix __wait_on_atomic_t() to call the action func if the counter != 0 
(bnc#880344). - FS-Cache: Fix object state machine to have separate work 
and wait states (bnc#880344). - FS-Cache: Fix operation state management 
and accounting (bnc#880344). - FS-Cache: Fix signal handling during waits 
(bnc#880344). - FS-Cache: Initialise the object event mask with the 
calculated mask (bnc#880344). - FS-Cache: Limit the number of I/O error 
reports for a cache (bnc#880344). - FS-Cache: Make cookie relinquishment 
wait for outstanding reads (bnc#880344). - FS-Cache: Mark cancellation of 
in-progress operation (bnc#880344). - FS-Cache: One of the write operation 
paths doeses not set the object state (bnc#880344). - FS-Cache: Provide 
proper invalidation (bnc#880344). - FS-Cache: Simplify cookie retention for 
fscache_objects, fixing oops (bnc#880344). - FS-Cache: The retrieval 
remaining-pages counter needs to be atomic_t (bnc#880344). - FS-Cache: 
Uninline fscache_object_init() (bnc#880344). - FS-Cache: Wrap checks on 
object state (bnc#880344). - HID: usbhid: add always-poll quirk 
(bnc#888607). - HID: usbhid: enable always-poll quirk for Elan Touchscreen 
(bnc#888607). - IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297). - 
Ignore 'flags' change to event_constraint (bnc#876114). - Ignore 
data_src/weight changes to perf_sample_data (bnc#876114). - NFS: Allow more 
operations in an NFSv4.1 request (bnc#890513). - NFS: Clean up helper 
function nfs4_select_rw_stateid() (bnc#888968). - NFS: Does not copy read 
delegation stateids in setattr (bnc#888968). - NFS: Does not use a 
delegation to open a file when returning that delegation (bnc#888968, 
bnc#892200, bnc#893596, bnc#893496) - NFS: Fixes for NFS RCU-walk support 
in line with code going upstream - NFS: Use FS-Cache invalidation 
(bnc#880344). - NFS: allow lockless access to access_cache (bnc#866130). - 
NFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts 
(bnc#888591). - NFS: nfs4_do_open should add negative results to the dcache 
(bnc#866130). - NFS: nfs_migrate_page() does not wait for FS-Cache to 
finish with a page (bnc#880344). - NFS: nfs_open_revalidate: only evaluate 
parent if it will be used (bnc#866130). - NFS: prepare for RCU-walk support 
but pushing tests later in code (bnc#866130). - NFS: support RCU_WALK in 
nfs_permission() (bnc#866130). - NFS: teach nfs_lookup_verify_inode to 
handle LOOKUP_RCU (bnc#866130). - NFS: teach nfs_neg_need_reval to 
understand LOOKUP_RCU (bnc#866130). - NFSD: Does not hand out delegations 
for 30 seconds after recalling them (bnc#880370). - NFSv4 set open access 
operation call flag in nfs4_init_opendata_res (bnc#888968, bnc#892200, 
bnc#893596, bnc#893496). - NFSv4: Add a helper for encoding opaque data 
(bnc#888968). - NFSv4: Add a helper for encoding stateids (bnc#888968). - 
NFSv4: Add helpers for basic copying of stateids (bnc#888968). - NFSv4: 
Clean up nfs4_select_rw_stateid() (bnc#888968). - NFSv4: Fix the return 
value of nfs4_select_rw_stateid (bnc#888968). - NFSv4: Rename 
nfs4_copy_stateid() (bnc#888968). - NFSv4: Resend the READ/WRITE RPC call 
if a stateid change causes an error (bnc#888968). - NFSv4: Simplify the 
struct nfs4_stateid (bnc#888968). - NFSv4: The stateid must remain the same 
for replayed RPC calls (bnc#888968). - NFSv4: nfs4_stateid_is_current 
should return 'true' for an invalid stateid (bnc#888968). - One more fix 
for kABI breakage. - PCI: Lock down BAR access when module security is 
enabled (bnc#884333). - PCI: enable MPS 'performance' setting to properly 
handle bridge MPS (bnc#883376). - PM / Hibernate: Add memory_rtree_find_bit 
function (bnc#860441). - PM / Hibernate: Create a Radix-Tree to store 
memory bitmap (bnc#860441). - PM / Hibernate: Implement position keeping in 
radix tree (bnc#860441). - PM / Hibernate: Iterate over set bits instead of 
PFNs in swsusp_free() (bnc#860441). - PM / Hibernate: Remove the old 
memory-bitmap implementation (bnc#860441). - PM / Hibernate: Touch Soft 
Lockup Watchdog in rtree_next_node (bnc#860441). - Restrict /dev/mem and 
/dev/kmem when module loading is restricted (bnc#884333). - Reuse existing 
'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT (bnc#876114). - USB: 
handle LPM errors during device suspend correctly (bnc#849123). - Update 
kabi files to reflect fscache change (bnc#880344) - VFS: Make more complete 
truncate operation available to CacheFiles (bnc#880344). - [FEAT NET1222] 
ib_uverbs: Allow explicit mmio trigger (FATE#83366, ltc#83367). - acpi: 
Ignore acpi_rsdp kernel parameter when module loading is restricted 
(bnc#884333). - af_iucv: correct cleanup if listen backlog is full 
(bnc#885262, LTC#111728). - asus-wmi: Restrict debugfs interface when 
module loading is restricted (bnc#884333). - autofs4: allow RCU-walk to 
walk through autofs4 (bnc#866130). - autofs4: avoid taking fs_lock during 
rcu-walk (bnc#866130). - autofs4: does not take spinlock when not needed in 
autofs4_lookup_expiring (bnc#866130). - autofs4: factor should_expire() out 
of autofs4_expire_indirect (bnc#866130). - autofs4: make 
'autofs4_can_expire' idempotent (bnc#866130). - autofs4: remove a redundant 
assignment (bnc#866130). - autofs: fix lockref lookup (bnc#888591). - 
be2net: add dma_mapping_error() check for dma_map_page() (bnc#881759). - 
block: add cond_resched() to potentially long running ioctl discard loop 
(bnc#884725). - block: fix race between request completion and timeout 
handling (bnc#881051). - cdc-ether: clean packet filter upon probe 
(bnc#876017). - cpuset: Fix memory allocator deadlock (bnc#876590). - 
crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs have 
them, but some are FIPS certified, with some kernel support. - crypto: fips 
- only panic on bad/missing crypto mod signatures (bnc#887503). - crypto: 
testmgr - allow aesni-intel and ghash_clmulni-intel in fips mode 
(bnc#889451). - dasd: validate request size before building CCW/TCW 
(bnc#891087, LTC#114068). - dm mpath: fix race condition between 
multipath_dtr and pg_init_done (bnc#826486). - dm-mpath: fix panic on 
deleting sg device (bnc#870161). - drm/ast: Add missing entry to 
dclk_table[]. - drm/ast: Add reduced non reduced mode parsing for wide 
screen mode (bnc#892723). - drm/i915: Only apply DPMS to the encoder if 
enabled (bnc#893064). - drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at 
driver init (bnc#869055). - drm/i915: create functions for the 'unclaimed 
register' checks (bnc#869055). - drm/i915: use FPGA_DBG for the 'unclaimed 
register' checks (bnc#869055). - drm/mgag200: Initialize data needed to map 
fbdev memory (bnc #806990). - e1000e: enable support for new device IDs 
(bnc#885509). - fs/fscache: remove spin_lock() from the condition in 
while() (bnc#880344). - hibernate: Disable in a signed modules environment 
(bnc#884333). - hugetlb: does not use ERR_PTR with VM_FAULT* values - 
ibmvscsi: Abort init sequence during error recovery (bnc#885382). - 
ibmvscsi: Add memory barriers for send / receive (bnc#885382). - inet: add 
a redirect generation id in inetpeer (bnc#860593). - inetpeer: initialize 
-&gt;redirect_genid in inet_getpeer() (bnc#860593). - ipv6: tcp: fix 
tcp_v6_conn_request() (bnc#887645). - kabi: hide bnc#860593 changes of 
struct inetpeer_addr_base (bnc#860593). - kernel: 3215 tty hang 
(bnc#891087, LTC#114562). - kernel: fix data corruption when reading 
/proc/sysinfo (bnc#891087, LTC#114480). - kernel: fix kernel oops with load 
of fpc register (bnc#889061, LTC#113596). - kernel: sclp console tty 
reference counting (bnc#891087, LTC#115466). - kexec: Disable at runtime if 
the kernel enforces module loading restrictions (bnc#884333). - md/raid6: 
avoid data corruption during recovery of double-degraded RAID6. - memcg, 
vmscan: Fix forced scan of anonymous pages (memory reclaim fix). - mm, 
hugetlb: add VM_NORESERVE check in vma_has_reserves() - mm, hugetlb: change 
variable name reservations to resv - mm, hugetlb: decrement reserve count 
if VM_NORESERVE alloc page cache - mm, hugetlb: defer freeing pages when 
gathering surplus pages - mm, hugetlb: do not use a page in page cache for 
cow optimization - mm, hugetlb: fix and clean-up node iteration code to 
alloc or free - mm, hugetlb: fix race in region tracking - mm, hugetlb: fix 
subpool accounting handling - mm, hugetlb: improve page-fault scalability - 
mm, hugetlb: improve, cleanup resv_map parameters - mm, hugetlb: move up 
the code which check availability of free huge page - mm, hugetlb: protect 
reserved pages when soft offlining a hugepage - mm, hugetlb: remove 
decrement_hugepage_resv_vma() - mm, hugetlb: remove redundant list_empty 
check in gather_surplus_pages() - mm, hugetlb: remove resv_map_put - mm, 
hugetlb: remove useless check about mapping type - mm, hugetlb: return a 
reserved page to a reserved pool if failed - mm, hugetlb: trivial 
commenting fix - mm, hugetlb: unify region structure handling - mm, 
hugetlb: unify region structure handling kabi - mm, hugetlb: use long vars 
instead of int in region_count() (Hugetlb Fault Scalability). - mm, 
hugetlb: use vma_resv_map() map types - mm, oom: fix badness score 
underflow (bnc#884582, bnc#884767). - mm, oom: normalize oom scores to 
oom_score_adj scale only for userspace (bnc#884582, bnc#884767). - mm, thp: 
do not allow thp faults to avoid cpuset restrictions (bnc#888849). - 
net/mlx4_core: Load higher level modules according to ports type 
(bnc#887680). - net/mlx4_core: Load the IB driver when the device supports 
IBoE (bnc#887680). - net/mlx4_en: Fix a race between napi poll function and 
RX ring cleanup (bnc#863586). - net/mlx4_en: Fix selftest failing on non 
10G link speed (bnc#888058). - net: fix checksumming features handling in 
output path (bnc#891259). - perf/core: Add weighted samples (bnc#876114). - 
perf/x86: Add flags to event constraints (bnc#876114). - perf/x86: Add 
memory profiling via PEBS Load Latency (bnc#876114). - perf: Add generic 
memory sampling interface (bnc#876114). - qla2xxx: Avoid escalating the 
SCSI error handler if the command is not found in firmware (bnc#859840). - 
qla2xxx: Clear loop_id for ports that are marked lost during fabric 
scanning (bnc#859840). - qla2xxx: Does not check for firmware hung during 
the reset context for ISP82XX (bnc#859840). - qla2xxx: Issue abort command 
for outstanding commands during cleanup when only firmware is alive 
(bnc#859840). - qla2xxx: Reduce the time we wait for a command to complete 
during SCSI error handling (bnc#859840). - qla2xxx: Set host can_queue 
value based on available resources (bnc#859840). - restore smp_mb() in 
unlock_new_inode() (bnc#890526). - s390/pci: introduce lazy IOTLB flushing 
for DMA unmap (bnc#889061, LTC#113725). - sched: fix the theoretical 
signal_wake_up() vs schedule() race (bnc#876055). - sclp_vt220: Enable 
integrated ASCII console per default (bnc#885262, LTC#112035). - scsi_dh: 
use missing accessor 'scsi_device_from_queue' (bnc#889614). - 
scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608). - 
scsiback: correct grant page unmapping. - scsiback: fix retry handling in 
__report_luns(). - scsiback: free resources after error. - sunrpc/auth: 
allow lockless (rcu) lookup of credential cache (bnc#866130). - 
supported.conf: remove external from drivers/net/veth (bnc#889727) - 
supported.conf: support net/sched/act_police.ko (bnc#890426) - tcp: adapt 
selected parts of RFC 5682 and PRR logic (bnc#879921). - tg3: Change nvram 
command timeout value to 50ms (bnc#855657). - tg3: Override clock, link 
aware and link idle mode during NVRAM dump (bnc#855657). - tg3: Set the MAC 
clock to the fastest speed during boot code load (bnc#855657). - usb: Does 
not enable LPM if the exit latency is zero (bnc#832309). - usbcore: Does 
not log on consecutive debounce failures of the same port (bnc#888105). - 
usbhid: fix PIXART optical mouse (bnc#888607). - uswsusp: Disable when 
module loading is restricted (bnc#884333). - vscsi: support larger transfer 
sizes (bnc#774818). - x86 thermal: Delete power-limit-notification console 
messages (bnc#882317). - x86 thermal: Disable power limit notification 
interrupt by default (bnc#882317). - x86 thermal: Re-enable power limit 
notification interrupt by default (bnc#882317). - x86/UV: Add call to 
KGDB/KDB from NMI handler (bnc#888847). - x86/UV: Add kdump to UV NMI 
handler (bnc#888847). - x86/UV: Add summary of cpu activity to UV NMI 
handler (bnc#888847). - x86/UV: Move NMI support (bnc#888847). - x86/UV: 
Update UV support for external NMI signals (bnc#888847). - x86/uv/nmi: Fix 
Sparse warnings (bnc#888847). - x86: Lock down IO port access when module 
security is enabled (bnc#884333). - x86: Restrict MSR access when module 
loading is restricted (bnc#884333).

Security Issues:

    * CVE-2013-1979
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979&gt;
    * CVE-2014-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739&gt;
    * CVE-2014-2706
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706&gt;
    * CVE-2014-4027
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027&gt;
    * CVE-2014-4171
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171&gt;
    * CVE-2014-4508
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508&gt;
    * CVE-2014-4667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667&gt;
    * CVE-2014-4943
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943&gt;
    * CVE-2014-5077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077&gt;
    * CVE-2014-5471
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471&gt;
    * CVE-2014-5472
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-24"/>
	<updated date="2014-09-24"/>
	<bugzilla href="https://bugzilla.suse.com/774818">SUSE bug 774818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806990">SUSE bug 806990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816708">SUSE bug 816708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826486">SUSE bug 826486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/832309">SUSE bug 832309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849123">SUSE bug 849123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855657">SUSE bug 855657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859840">SUSE bug 859840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860441">SUSE bug 860441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860593">SUSE bug 860593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863586">SUSE bug 863586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866130">SUSE bug 866130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866615">SUSE bug 866615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866864">SUSE bug 866864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866911">SUSE bug 866911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869055">SUSE bug 869055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869934">SUSE bug 869934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870161">SUSE bug 870161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871797">SUSE bug 871797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876017">SUSE bug 876017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876055">SUSE bug 876055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876114">SUSE bug 876114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876590">SUSE bug 876590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879921">SUSE bug 879921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880344">SUSE bug 880344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880370">SUSE bug 880370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881051">SUSE bug 881051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881759">SUSE bug 881759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882317">SUSE bug 882317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882639">SUSE bug 882639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882804">SUSE bug 882804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882900">SUSE bug 882900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883376">SUSE bug 883376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883518">SUSE bug 883518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883724">SUSE bug 883724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884333">SUSE bug 884333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884582">SUSE bug 884582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884725">SUSE bug 884725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884767">SUSE bug 884767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885262">SUSE bug 885262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885382">SUSE bug 885382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885422">SUSE bug 885422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885509">SUSE bug 885509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886840">SUSE bug 886840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887082">SUSE bug 887082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887503">SUSE bug 887503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887608">SUSE bug 887608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887645">SUSE bug 887645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887680">SUSE bug 887680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888058">SUSE bug 888058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888105">SUSE bug 888105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888591">SUSE bug 888591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888607">SUSE bug 888607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888847">SUSE bug 888847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888849">SUSE bug 888849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888968">SUSE bug 888968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889061">SUSE bug 889061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889173">SUSE bug 889173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889451">SUSE bug 889451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889614">SUSE bug 889614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889727">SUSE bug 889727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890297">SUSE bug 890297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890426">SUSE bug 890426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890513">SUSE bug 890513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890526">SUSE bug 890526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891087">SUSE bug 891087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891259">SUSE bug 891259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891619">SUSE bug 891619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892200">SUSE bug 892200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892490">SUSE bug 892490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892723">SUSE bug 892723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893064">SUSE bug 893064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893496">SUSE bug 893496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893596">SUSE bug 893596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894200">SUSE bug 894200</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1979/">CVE-2013-1979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1979">CVE-2013-1979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1739/">CVE-2014-1739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1739">CVE-2014-1739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2706/">CVE-2014-2706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2706">CVE-2014-2706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4027/">CVE-2014-4027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4027">CVE-2014-4027 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4171/">CVE-2014-4171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4171">CVE-2014-4171 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-4508/">CVE-2014-4508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4508">CVE-2014-4508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4667/">CVE-2014-4667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4667">CVE-2014-4667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4943/">CVE-2014-4943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4943">CVE-2014-4943 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5077/">CVE-2014-5077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5077">CVE-2014-5077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5471/">CVE-2014-5471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5471">CVE-2014-5471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5472/">CVE-2014-5472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5472">CVE-2014-5472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578532" comment="iscsitarget-kmp-bigsmp-1.4.20_3.0.101_0.40-0.38.83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578533" comment="kernel-bigsmp-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578534" comment="kernel-bigsmp-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578535" comment="ofed-kmp-bigsmp-1.5.4.1_3.0.101_0.40-0.13.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578536" comment="oracleasm-kmp-bigsmp-2.0.5_3.0.101_0.40-7.39.89 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578532" comment="iscsitarget-kmp-bigsmp-1.4.20_3.0.101_0.40-0.38.83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578533" comment="kernel-bigsmp-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578534" comment="kernel-bigsmp-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578535" comment="ofed-kmp-bigsmp-1.5.4.1_3.0.101_0.40-0.13.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578536" comment="oracleasm-kmp-bigsmp-2.0.5_3.0.101_0.40-7.39.89 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578532" comment="iscsitarget-kmp-bigsmp-1.4.20_3.0.101_0.40-0.38.83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578533" comment="kernel-bigsmp-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578534" comment="kernel-bigsmp-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578535" comment="ofed-kmp-bigsmp-1.5.4.1_3.0.101_0.40-0.13.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578536" comment="oracleasm-kmp-bigsmp-2.0.5_3.0.101_0.40-7.39.89 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218826" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1087086" ref_url="https://bugzilla.suse.com/1087086" source="BUGZILLA"/>
		<reference ref_id="1087088" ref_url="https://bugzilla.suse.com/1087088" source="BUGZILLA"/>
		<reference ref_id="1096140" ref_url="https://bugzilla.suse.com/1096140" source="BUGZILLA"/>
		<reference ref_id="1096242" ref_url="https://bugzilla.suse.com/1096242" source="BUGZILLA"/>
		<reference ref_id="1096281" ref_url="https://bugzilla.suse.com/1096281" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004232.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bug was fixed:

- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX
  registers) between processes. These registers might contain encryption keys
  when doing SSE accelerated AES enc/decryption (bsc#1087086)

The following non-security bugs were fixed:

- KVM: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).
- Xen counterparts of eager FPU implementation.
- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096140).
- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).
- xen/x86/CPU: Check speculation control CPUID bit (bsc#1068032).
- xen/x86/CPU: Sync CPU feature flags late (bsc#1075994 bsc#1075091).
- xen/x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).
- xen/x86/cpu: Fix bootup crashes by sanitizing the argument of the 'clearcpuid=' command-line option (bsc#1065600). 
- xen/x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).
- xen/x86/entry: Use IBRS on entry to kernel space (bsc#1068032).
- xen/x86/idle: Toggle IBRS when going idle (bsc#1068032).
- xen/x86/kaiser: Move feature detection up (bsc#1068032).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-29"/>
	<updated date="2018-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087086">SUSE bug 1087086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096140">SUSE bug 1096140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096242">SUSE bug 1096242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096281">SUSE bug 1096281</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3665">CVE-2018-3665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578537" comment="kernel-bigsmp-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578538" comment="kernel-bigsmp-base-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578540" comment="kernel-default-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578541" comment="kernel-default-base-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578543" comment="kernel-default-man-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578544" comment="kernel-ec2-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578545" comment="kernel-ec2-base-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568317" comment="kernel-pae-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568318" comment="kernel-pae-base-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578547" comment="kernel-source-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578548" comment="kernel-syms-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578549" comment="kernel-trace-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578550" comment="kernel-trace-base-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578552" comment="kernel-xen-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578553" comment="kernel-xen-base-3.0.101-0.47.106.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218827" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="777565" ref_url="https://bugzilla.suse.com/777565" source="BUGZILLA"/>
		<reference ref_id="814440" ref_url="https://bugzilla.suse.com/814440" source="BUGZILLA"/>
		<reference ref_id="900610" ref_url="https://bugzilla.suse.com/900610" source="BUGZILLA"/>
		<reference ref_id="904348" ref_url="https://bugzilla.suse.com/904348" source="BUGZILLA"/>
		<reference ref_id="904965" ref_url="https://bugzilla.suse.com/904965" source="BUGZILLA"/>
		<reference ref_id="920016" ref_url="https://bugzilla.suse.com/920016" source="BUGZILLA"/>
		<reference ref_id="923002" ref_url="https://bugzilla.suse.com/923002" source="BUGZILLA"/>
		<reference ref_id="926007" ref_url="https://bugzilla.suse.com/926007" source="BUGZILLA"/>
		<reference ref_id="926709" ref_url="https://bugzilla.suse.com/926709" source="BUGZILLA"/>
		<reference ref_id="926774" ref_url="https://bugzilla.suse.com/926774" source="BUGZILLA"/>
		<reference ref_id="930145" ref_url="https://bugzilla.suse.com/930145" source="BUGZILLA"/>
		<reference ref_id="930788" ref_url="https://bugzilla.suse.com/930788" source="BUGZILLA"/>
		<reference ref_id="932350" ref_url="https://bugzilla.suse.com/932350" source="BUGZILLA"/>
		<reference ref_id="932805" ref_url="https://bugzilla.suse.com/932805" source="BUGZILLA"/>
		<reference ref_id="933721" ref_url="https://bugzilla.suse.com/933721" source="BUGZILLA"/>
		<reference ref_id="935053" ref_url="https://bugzilla.suse.com/935053" source="BUGZILLA"/>
		<reference ref_id="935757" ref_url="https://bugzilla.suse.com/935757" source="BUGZILLA"/>
		<reference ref_id="936118" ref_url="https://bugzilla.suse.com/936118" source="BUGZILLA"/>
		<reference ref_id="938706" ref_url="https://bugzilla.suse.com/938706" source="BUGZILLA"/>
		<reference ref_id="939826" ref_url="https://bugzilla.suse.com/939826" source="BUGZILLA"/>
		<reference ref_id="939926" ref_url="https://bugzilla.suse.com/939926" source="BUGZILLA"/>
		<reference ref_id="939955" ref_url="https://bugzilla.suse.com/939955" source="BUGZILLA"/>
		<reference ref_id="940017" ref_url="https://bugzilla.suse.com/940017" source="BUGZILLA"/>
		<reference ref_id="940925" ref_url="https://bugzilla.suse.com/940925" source="BUGZILLA"/>
		<reference ref_id="941202" ref_url="https://bugzilla.suse.com/941202" source="BUGZILLA"/>
		<reference ref_id="942204" ref_url="https://bugzilla.suse.com/942204" source="BUGZILLA"/>
		<reference ref_id="942305" ref_url="https://bugzilla.suse.com/942305" source="BUGZILLA"/>
		<reference ref_id="942367" ref_url="https://bugzilla.suse.com/942367" source="BUGZILLA"/>
		<reference ref_id="942605" ref_url="https://bugzilla.suse.com/942605" source="BUGZILLA"/>
		<reference ref_id="942688" ref_url="https://bugzilla.suse.com/942688" source="BUGZILLA"/>
		<reference ref_id="942938" ref_url="https://bugzilla.suse.com/942938" source="BUGZILLA"/>
		<reference ref_id="943786" ref_url="https://bugzilla.suse.com/943786" source="BUGZILLA"/>
		<reference ref_id="944296" ref_url="https://bugzilla.suse.com/944296" source="BUGZILLA"/>
		<reference ref_id="944831" ref_url="https://bugzilla.suse.com/944831" source="BUGZILLA"/>
		<reference ref_id="944837" ref_url="https://bugzilla.suse.com/944837" source="BUGZILLA"/>
		<reference ref_id="944989" ref_url="https://bugzilla.suse.com/944989" source="BUGZILLA"/>
		<reference ref_id="944993" ref_url="https://bugzilla.suse.com/944993" source="BUGZILLA"/>
		<reference ref_id="945691" ref_url="https://bugzilla.suse.com/945691" source="BUGZILLA"/>
		<reference ref_id="945825" ref_url="https://bugzilla.suse.com/945825" source="BUGZILLA"/>
		<reference ref_id="945827" ref_url="https://bugzilla.suse.com/945827" source="BUGZILLA"/>
		<reference ref_id="946078" ref_url="https://bugzilla.suse.com/946078" source="BUGZILLA"/>
		<reference ref_id="946309" ref_url="https://bugzilla.suse.com/946309" source="BUGZILLA"/>
		<reference ref_id="947957" ref_url="https://bugzilla.suse.com/947957" source="BUGZILLA"/>
		<reference ref_id="948330" ref_url="https://bugzilla.suse.com/948330" source="BUGZILLA"/>
		<reference ref_id="948347" ref_url="https://bugzilla.suse.com/948347" source="BUGZILLA"/>
		<reference ref_id="948521" ref_url="https://bugzilla.suse.com/948521" source="BUGZILLA"/>
		<reference ref_id="949100" ref_url="https://bugzilla.suse.com/949100" source="BUGZILLA"/>
		<reference ref_id="949298" ref_url="https://bugzilla.suse.com/949298" source="BUGZILLA"/>
		<reference ref_id="949502" ref_url="https://bugzilla.suse.com/949502" source="BUGZILLA"/>
		<reference ref_id="949706" ref_url="https://bugzilla.suse.com/949706" source="BUGZILLA"/>
		<reference ref_id="949744" ref_url="https://bugzilla.suse.com/949744" source="BUGZILLA"/>
		<reference ref_id="949981" ref_url="https://bugzilla.suse.com/949981" source="BUGZILLA"/>
		<reference ref_id="951440" ref_url="https://bugzilla.suse.com/951440" source="BUGZILLA"/>
		<reference ref_id="952084" ref_url="https://bugzilla.suse.com/952084" source="BUGZILLA"/>
		<reference ref_id="952384" ref_url="https://bugzilla.suse.com/952384" source="BUGZILLA"/>
		<reference ref_id="952579" ref_url="https://bugzilla.suse.com/952579" source="BUGZILLA"/>
		<reference ref_id="953527" ref_url="https://bugzilla.suse.com/953527" source="BUGZILLA"/>
		<reference ref_id="953980" ref_url="https://bugzilla.suse.com/953980" source="BUGZILLA"/>
		<reference ref_id="954404" ref_url="https://bugzilla.suse.com/954404" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0272" ref_url="https://www.suse.com/security/cve/CVE-2015-0272/" source="CVE"/>
		<reference ref_id="CVE-2015-5157" ref_url="https://www.suse.com/security/cve/CVE-2015-5157/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6252" ref_url="https://www.suse.com/security/cve/CVE-2015-6252/" source="CVE"/>
		<reference ref_id="CVE-2015-6937" ref_url="https://www.suse.com/security/cve/CVE-2015-6937/" source="CVE"/>
		<reference ref_id="CVE-2015-7872" ref_url="https://www.suse.com/security/cve/CVE-2015-7872/" source="CVE"/>
		<reference ref_id="CVE-2015-7990" ref_url="https://www.suse.com/security/cve/CVE-2015-7990/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001700.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 Service Pack 3 kernel was updated to receive various security and bugfixes.

Following security bugs were fixed:
- CVE-2015-8104: Prevent guest to host DoS caused by infinite loop in microcode via #DB exception (bsc#954404).
- CVE-2015-5307: Prevent guest to host DoS caused by infinite loop in microcode via #AC exception (bsc#953527).
- CVE-2015-7990: RDS: Verify the underlying transport exists before creating a connection, preventing possible DoS (bsc#952384).
- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on the x86_64 platform mishandled IRET faults in processing NMIs that occurred during userspace execution, which might have allowed local users to gain privileges by triggering an NMI (bsc#938706).
- CVE-2015-7872: Possible crash when trying to garbage collect an uninstantiated keyring (bsc#951440).
- CVE-2015-0272: Prevent remote DoS using IPv6 RA with bogus MTU by validating before applying it (bsc#944296).
- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bsc#945825).
- CVE-2015-6252: The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggered permanent file-descriptor allocation (bsc#942367).

The following non-security bugs were fixed:
- alsa: hda - Disable 64bit address for Creative HDA controllers (bsc#814440).
- btrfs: fix hang when failing to submit bio of directIO (bsc#942688).
- btrfs: fix memory corruption on failure to submit bio for direct IO (bsc#942688).
- btrfs: fix put dio bio twice when we submit dio bio fail (bsc#942688).
- dm sysfs: introduce ability to add writable attributes (bsc#904348).
- dm-snap: avoid deadock on s-&gt;lock when a read is split (bsc#939826).
- dm: do not start current request if it would have merged with the previous (bsc#904348).
- dm: impose configurable deadline for dm_request_fn merge heuristic (bsc#904348).
- drm/i915: (re)init HPD interrupt storm statistics (bsc#942938).
- drm/i915: Add HPD IRQ storm detection (v5) (bsc#942938).
- drm/i915: Add Reenable Timer to turn Hotplug Detection back on (v4) (bsc#942938).
- drm/i915: Add bit field to record which pins have received HPD events (v3) (bsc#942938).
- drm/i915: Add enum hpd_pin to intel_encoder (bsc#942938).
- drm/i915: Add messages useful for HPD storm detection debugging (v2) (bsc#942938).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt (bsc#942938).
- drm/i915: Convert HPD interrupts to make use of HPD pin assignment in encoders (v2) (bsc#942938).
- drm/i915: Disable HPD interrupt on pin when irq storm is detected (v3) (bsc#942938).
- drm/i915: Do not WARN nor handle unexpected hpd interrupts on gmch platforms (bsc#942938).
- drm/i915: Enable hotplug interrupts after querying hw capabilities (bsc#942938).
- drm/i915: Fix DDC probe for passive adapters (bsc#900610, fdo#85924).
- drm/i915: Fix hotplug interrupt enabling for SDVOC (bsc#942938).
- drm/i915: Fix up sdvo hpd pins for i965g/gm (bsc#942938).
- drm/i915: Get rid if the '^A' in struct drm_i915_private (bsc#942938).
- drm/i915: Make hpd arrays big enough to avoid out of bounds access (bsc#942938).
- drm/i915: Mask out the HPD irq bits before setting them individually (bsc#942938).
- drm/i915: Only print hotplug event message when hotplug bit is set (bsc#942938).
- drm/i915: Only reprobe display on encoder which has received an HPD event (v2) (bsc#942938).
- drm/i915: Queue reenable timer also when enable_hotplug_processing is false (bsc#942938).
- drm/i915: Remove i965_hpd_irq_setup (bsc#942938).
- drm/i915: Remove pch_rq_mask from struct drm_i915_private (bsc#942938).
- drm/i915: Remove valleyview_hpd_irq_setup (bsc#942938).
- drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler() (bsc#942938).
- drm/i915: WARN_ONCE() about unexpected interrupts for all chipsets (bsc#942938).
- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).
- drm/i915: assert_spin_locked for pipestat interrupt enable/disable (bsc#942938).
- drm/i915: clear crt hotplug compare voltage field before setting (bsc#942938).
- drm/i915: close tiny race in the ilk pcu even interrupt setup (bsc#942938).
- drm/i915: fix hotplug event bit tracking (bsc#942938).
- drm/i915: fix hpd interrupt register locking (bsc#942938).
- drm/i915: fix hpd work vs. flush_work in the pageflip code deadlock (bsc#942938).
- drm/i915: fix locking around ironlake_enable|disable_display_irq (bsc#942938).
- drm/i915: fold the hpd_irq_setup call into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the no-irq check into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the queue_work into intel_hpd_irq_handler (bsc#942938).
- drm/i915: implement ibx_hpd_irq_setup (bsc#942938).
- drm/i915: s/hotplug_irq_storm_detect/intel_hpd_irq_handler/ (bsc#942938).
- ehci-pci: enable interrupt on BayTrail (bnc926007).
- fix lpfc_send_rscn_event allocation size claims bsc#935757
- hugetlb: simplify migrate_huge_page() (bsc#947957, VM Functionality).
- hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage (bsc#947957).
- ib/iser: Add Discovery support (bsc#923002).
- ib/iser: Move informational messages from error to info level (bsc#923002).
- ib/srp: Avoid skipping srp_reset_host() after a transport error (bsc#904965).
- ib/srp: Fix a sporadic crash triggered by cable pulling (bsc#904965).
- inotify: Fix nested sleeps in inotify_read() (bsc#940925).
- ipv6: fix tunnel error handling (bsc#952579).
- ipv6: probe routes asynchronous in rt6_probe (bsc#936118).
- ipvs: Fix reuse connection if real server is dead (bsc#945827).
- ipvs: drop first packet to dead server (bsc#946078).
- keys: Fix race between key destruction and finding a keyring by name (bsc#951440).
- ktime: add ktime_after and ktime_before helpe (bsc#904348).
- lib/string.c: introduce memchr_inv() (bsc#930788).
- libiscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- macvlan: Support bonding events bsc#948521
- make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).
- memory-failure: do code refactor of soft_offline_page() (bsc#947957).
- memory-failure: fix an error of mce_bad_pages statistics (bsc#947957).
- memory-failure: use num_poisoned_pages instead of mce_bad_pages (bsc#947957).
- memory-hotplug: update mce_bad_pages when removing the memory (bsc#947957).
- mm/memory-failure.c: fix wrong num_poisoned_pages in handling memory error on thp (bsc#947957).
- mm/memory-failure.c: recheck PageHuge() after hugetlb page migrate successfully (bsc#947957).
- mm/migrate.c: pair unlock_page() and lock_page() when migrating huge pages (bsc#947957).
- mm: exclude reserved pages from dirtyable memory 32b fix (bsc#940017, bsc#949298).
- mm: make page pfmemalloc check more robust (bsc#920016).
- netfilter: nf_conntrack_proto_sctp: minimal multihoming support (bsc#932350).
- pci: Add VPD function 0 quirk for Intel Ethernet devices (bsc#943786).
- pci: Add dev_flags bit to access VPD through function 0 (bsc#943786).
- pci: Add flag indicating device has been assigned by KVM (bsc#777565).
- pci: Clear NumVFs when disabling SR-IOV in sriov_init() (bsc#952084).
- pci: Refresh First VF Offset and VF Stride when updating NumVFs (bsc#952084).
- pci: Update NumVFs register when disabling SR-IOV (bsc#952084).
- pci: delay configuration of SRIOV capability (bsc#952084).
- pci: set pci sriov page size before reading SRIOV BAR (bsc#952084).
- pktgen: clean up ktime_t helpers (bsc#904348).
- qla2xxx: Do not reset adapter if SRB handle is in range (bsc#944993).
- qla2xxx: Remove decrement of sp reference count in abort handler (bsc#944993).
- qla2xxx: do not clear slot in outstanding cmd array (bsc#944993).
- r8169: remember WOL preferences on driver load (bsc#942305).
- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).
- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).
- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bsc#949100).
- scsi: fix scsi_error_handler vs. scsi_host_dev_release race (bsc#942204).
- scsi: hosts: update to use ida_simple for host_no (bsc#939926)
- scsi: kabi: allow iscsi disocvery session support (bsc#923002).
- scsi_transport_iscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- sg: fix read() error reporting (bsc#926774).
- usb: xhci: Prefer endpoint context dequeue pointer over stopped_trb (bsc#933721).
- usb: xhci: Reset a halted endpoint immediately when we encounter a stall (bsc#933721).
- usb: xhci: apply XHCI_AVOID_BEI quirk to all Intel xHCI controllers (bsc#944989).
- usb: xhci: do not start a halted endpoint before its new dequeue is set (bsc#933721).
- usb: xhci: handle Config Error Change (CEC) in xhci driver (bsc#933721).
- x86/tsc: Change Fast TSC calibration failed from error to info (bsc#942605).
- x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).
- xfs: Fix lost direct IO write in the last block (bsc#949744).
- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).
- xfs: add EOFBLOCKS inode tagging/untagging (bsc#930788).
- xfs: add XFS_IOC_FREE_EOFBLOCKS ioctl (bsc#930788).
- xfs: add background scanning to clear eofblocks inodes (bsc#930788).
- xfs: add inode id filtering to eofblocks scan (bsc#930788).
- xfs: add minimum file size filtering to eofblocks scan (bsc#930788).
- xfs: create function to scan and clear EOFBLOCKS inodes (bsc#930788).
- xfs: create helper to check whether to free eofblocks on inode (bsc#930788).
- xfs: introduce a common helper xfs_icluster_size_fsb (bsc#932805).
- xfs: make xfs_free_eofblocks() non-static, return EAGAIN on trylock failure (bsc#930788).
- xfs: support a tag-based inode_ag_iterator (bsc#930788).
- xfs: support multiple inode id filtering in eofblocks scan (bsc#930788).
- xfs: use xfs_icluster_size_fsb in xfs_bulkstat (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ialloc_inode_init (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ifree_cluster (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_imap (bsc#932805).
- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bsc#949981).
- xhci: Allocate correct amount of scratchpad buffers (bsc#933721).
- xhci: Calculate old endpoints correctly on device reset (bsc#944831).
- xhci: Do not enable/disable RWE on bus suspend/resume (bsc#933721).
- xhci: For streams the css flag most be read from the stream-ctx on ep stop (bsc#945691).
- xhci: Solve full event ring by increasing TRBS_PER_SEGMENT to 256 (bsc#933721).
- xhci: Treat not finding the event_seg on COMP_STOP the same as COMP_STOP_INVAL (bsc#933721).
- xhci: Workaround for PME stuck issues in Intel xhci (bsc#933721).
- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bsc#949502).
- xhci: do not report PLC when link is in internal resume state (bsc#933721).
- xhci: fix isoc endpoint dequeue from advancing too far on transaction error (bsc#944837).
- xhci: fix reporting of 0-sized URBs in control endpoint (bsc#933721).
- xhci: report U3 when link is in resume state (bsc#933721).
- xhci: rework cycle bit checking for new dequeue pointers (bsc#933721).
- xhci: use uninterruptible sleep for waiting for internal operations (bsc#939955).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-26"/>
	<updated date="2015-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/777565">SUSE bug 777565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814440">SUSE bug 814440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900610">SUSE bug 900610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904348">SUSE bug 904348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904965">SUSE bug 904965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920016">SUSE bug 920016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923002">SUSE bug 923002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926007">SUSE bug 926007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926709">SUSE bug 926709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926774">SUSE bug 926774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930145">SUSE bug 930145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930788">SUSE bug 930788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932350">SUSE bug 932350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932805">SUSE bug 932805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933721">SUSE bug 933721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935053">SUSE bug 935053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935757">SUSE bug 935757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936118">SUSE bug 936118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938706">SUSE bug 938706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939826">SUSE bug 939826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939926">SUSE bug 939926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939955">SUSE bug 939955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940017">SUSE bug 940017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940925">SUSE bug 940925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941202">SUSE bug 941202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942204">SUSE bug 942204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942305">SUSE bug 942305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942367">SUSE bug 942367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942605">SUSE bug 942605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942688">SUSE bug 942688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942938">SUSE bug 942938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943786">SUSE bug 943786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944296">SUSE bug 944296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944831">SUSE bug 944831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944837">SUSE bug 944837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944989">SUSE bug 944989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944993">SUSE bug 944993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945691">SUSE bug 945691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945825">SUSE bug 945825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945827">SUSE bug 945827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946078">SUSE bug 946078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946309">SUSE bug 946309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947957">SUSE bug 947957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948330">SUSE bug 948330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948347">SUSE bug 948347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948521">SUSE bug 948521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949100">SUSE bug 949100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949298">SUSE bug 949298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949502">SUSE bug 949502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949706">SUSE bug 949706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949744">SUSE bug 949744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949981">SUSE bug 949981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951440">SUSE bug 951440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952084">SUSE bug 952084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952384">SUSE bug 952384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952579">SUSE bug 952579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953980">SUSE bug 953980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0272/">CVE-2015-0272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0272">CVE-2015-0272 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5157/">CVE-2015-5157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5157">CVE-2015-5157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5307">CVE-2015-5307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6252/">CVE-2015-6252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6252">CVE-2015-6252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6937/">CVE-2015-6937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6937">CVE-2015-6937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7872/">CVE-2015-7872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7872">CVE-2015-7872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7990/">CVE-2015-7990 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7990">CVE-2015-7990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8104">CVE-2015-8104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578555" comment="kernel-bigsmp-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578556" comment="kernel-bigsmp-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578557" comment="kernel-default-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578558" comment="kernel-default-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578560" comment="kernel-default-man-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578561" comment="kernel-ec2-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578562" comment="kernel-ec2-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566749" comment="kernel-pae-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566750" comment="kernel-pae-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578564" comment="kernel-ppc64-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578565" comment="kernel-ppc64-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578567" comment="kernel-source-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578568" comment="kernel-syms-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578569" comment="kernel-trace-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578570" comment="kernel-trace-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566756" comment="kernel-xen-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566757" comment="kernel-xen-base-3.0.101-0.47.71.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578555" comment="kernel-bigsmp-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578556" comment="kernel-bigsmp-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578557" comment="kernel-default-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578558" comment="kernel-default-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578560" comment="kernel-default-man-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578561" comment="kernel-ec2-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578562" comment="kernel-ec2-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566749" comment="kernel-pae-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566750" comment="kernel-pae-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578564" comment="kernel-ppc64-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578565" comment="kernel-ppc64-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578567" comment="kernel-source-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578568" comment="kernel-syms-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578569" comment="kernel-trace-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578570" comment="kernel-trace-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566756" comment="kernel-xen-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566757" comment="kernel-xen-base-3.0.101-0.47.71.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218828" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1004418" ref_url="https://bugzilla.suse.com/1004418" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5195" ref_url="https://www.suse.com/security/cve/CVE-2016-5195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002349.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to fix one security issue.

This security bug was fixed:

- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-24"/>
	<updated date="2016-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1004418">SUSE bug 1004418</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5195/">CVE-2016-5195 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5195">CVE-2016-5195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578572" comment="kernel-bigsmp-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578573" comment="kernel-bigsmp-base-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578575" comment="kernel-default-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578576" comment="kernel-default-base-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578578" comment="kernel-default-man-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578579" comment="kernel-ec2-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578580" comment="kernel-ec2-base-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568334" comment="kernel-pae-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568335" comment="kernel-pae-base-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578582" comment="kernel-source-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578583" comment="kernel-syms-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578584" comment="kernel-trace-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578585" comment="kernel-trace-base-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578587" comment="kernel-xen-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578588" comment="kernel-xen-base-3.0.101-0.47.90.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218829" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1006919" ref_url="https://bugzilla.suse.com/1006919" source="BUGZILLA"/>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1013862" ref_url="https://bugzilla.suse.com/1013862" source="BUGZILLA"/>
		<reference ref_id="1017143" ref_url="https://bugzilla.suse.com/1017143" source="BUGZILLA"/>
		<reference ref_id="1020229" ref_url="https://bugzilla.suse.com/1020229" source="BUGZILLA"/>
		<reference ref_id="1021256" ref_url="https://bugzilla.suse.com/1021256" source="BUGZILLA"/>
		<reference ref_id="1023051" ref_url="https://bugzilla.suse.com/1023051" source="BUGZILLA"/>
		<reference ref_id="1024938" ref_url="https://bugzilla.suse.com/1024938" source="BUGZILLA"/>
		<reference ref_id="1025013" ref_url="https://bugzilla.suse.com/1025013" source="BUGZILLA"/>
		<reference ref_id="1025235" ref_url="https://bugzilla.suse.com/1025235" source="BUGZILLA"/>
		<reference ref_id="1026024" ref_url="https://bugzilla.suse.com/1026024" source="BUGZILLA"/>
		<reference ref_id="1026722" ref_url="https://bugzilla.suse.com/1026722" source="BUGZILLA"/>
		<reference ref_id="1026914" ref_url="https://bugzilla.suse.com/1026914" source="BUGZILLA"/>
		<reference ref_id="1027066" ref_url="https://bugzilla.suse.com/1027066" source="BUGZILLA"/>
		<reference ref_id="1027101" ref_url="https://bugzilla.suse.com/1027101" source="BUGZILLA"/>
		<reference ref_id="1027178" ref_url="https://bugzilla.suse.com/1027178" source="BUGZILLA"/>
		<reference ref_id="1027179" ref_url="https://bugzilla.suse.com/1027179" source="BUGZILLA"/>
		<reference ref_id="1027406" ref_url="https://bugzilla.suse.com/1027406" source="BUGZILLA"/>
		<reference ref_id="1028415" ref_url="https://bugzilla.suse.com/1028415" source="BUGZILLA"/>
		<reference ref_id="1028880" ref_url="https://bugzilla.suse.com/1028880" source="BUGZILLA"/>
		<reference ref_id="1029212" ref_url="https://bugzilla.suse.com/1029212" source="BUGZILLA"/>
		<reference ref_id="1029850" ref_url="https://bugzilla.suse.com/1029850" source="BUGZILLA"/>
		<reference ref_id="1030213" ref_url="https://bugzilla.suse.com/1030213" source="BUGZILLA"/>
		<reference ref_id="1030573" ref_url="https://bugzilla.suse.com/1030573" source="BUGZILLA"/>
		<reference ref_id="1030575" ref_url="https://bugzilla.suse.com/1030575" source="BUGZILLA"/>
		<reference ref_id="1030593" ref_url="https://bugzilla.suse.com/1030593" source="BUGZILLA"/>
		<reference ref_id="1031003" ref_url="https://bugzilla.suse.com/1031003" source="BUGZILLA"/>
		<reference ref_id="1031052" ref_url="https://bugzilla.suse.com/1031052" source="BUGZILLA"/>
		<reference ref_id="1031440" ref_url="https://bugzilla.suse.com/1031440" source="BUGZILLA"/>
		<reference ref_id="1031481" ref_url="https://bugzilla.suse.com/1031481" source="BUGZILLA"/>
		<reference ref_id="1031579" ref_url="https://bugzilla.suse.com/1031579" source="BUGZILLA"/>
		<reference ref_id="1031660" ref_url="https://bugzilla.suse.com/1031660" source="BUGZILLA"/>
		<reference ref_id="1033287" ref_url="https://bugzilla.suse.com/1033287" source="BUGZILLA"/>
		<reference ref_id="1033336" ref_url="https://bugzilla.suse.com/1033336" source="BUGZILLA"/>
		<reference ref_id="1034670" ref_url="https://bugzilla.suse.com/1034670" source="BUGZILLA"/>
		<reference ref_id="1034838" ref_url="https://bugzilla.suse.com/1034838" source="BUGZILLA"/>
		<reference ref_id="1035576" ref_url="https://bugzilla.suse.com/1035576" source="BUGZILLA"/>
		<reference ref_id="1037182" ref_url="https://bugzilla.suse.com/1037182" source="BUGZILLA"/>
		<reference ref_id="1037183" ref_url="https://bugzilla.suse.com/1037183" source="BUGZILLA"/>
		<reference ref_id="1037994" ref_url="https://bugzilla.suse.com/1037994" source="BUGZILLA"/>
		<reference ref_id="1038544" ref_url="https://bugzilla.suse.com/1038544" source="BUGZILLA"/>
		<reference ref_id="1038564" ref_url="https://bugzilla.suse.com/1038564" source="BUGZILLA"/>
		<reference ref_id="1038879" ref_url="https://bugzilla.suse.com/1038879" source="BUGZILLA"/>
		<reference ref_id="1038883" ref_url="https://bugzilla.suse.com/1038883" source="BUGZILLA"/>
		<reference ref_id="1038981" ref_url="https://bugzilla.suse.com/1038981" source="BUGZILLA"/>
		<reference ref_id="1038982" ref_url="https://bugzilla.suse.com/1038982" source="BUGZILLA"/>
		<reference ref_id="1039349" ref_url="https://bugzilla.suse.com/1039349" source="BUGZILLA"/>
		<reference ref_id="1039354" ref_url="https://bugzilla.suse.com/1039354" source="BUGZILLA"/>
		<reference ref_id="1039456" ref_url="https://bugzilla.suse.com/1039456" source="BUGZILLA"/>
		<reference ref_id="1039594" ref_url="https://bugzilla.suse.com/1039594" source="BUGZILLA"/>
		<reference ref_id="1039882" ref_url="https://bugzilla.suse.com/1039882" source="BUGZILLA"/>
		<reference ref_id="1039883" ref_url="https://bugzilla.suse.com/1039883" source="BUGZILLA"/>
		<reference ref_id="1039885" ref_url="https://bugzilla.suse.com/1039885" source="BUGZILLA"/>
		<reference ref_id="1040069" ref_url="https://bugzilla.suse.com/1040069" source="BUGZILLA"/>
		<reference ref_id="1041431" ref_url="https://bugzilla.suse.com/1041431" source="BUGZILLA"/>
		<reference ref_id="1042364" ref_url="https://bugzilla.suse.com/1042364" source="BUGZILLA"/>
		<reference ref_id="1042863" ref_url="https://bugzilla.suse.com/1042863" source="BUGZILLA"/>
		<reference ref_id="1042892" ref_url="https://bugzilla.suse.com/1042892" source="BUGZILLA"/>
		<reference ref_id="1044125" ref_url="https://bugzilla.suse.com/1044125" source="BUGZILLA"/>
		<reference ref_id="1045416" ref_url="https://bugzilla.suse.com/1045416" source="BUGZILLA"/>
		<reference ref_id="1045487" ref_url="https://bugzilla.suse.com/1045487" source="BUGZILLA"/>
		<reference ref_id="1046107" ref_url="https://bugzilla.suse.com/1046107" source="BUGZILLA"/>
		<reference ref_id="1048232" ref_url="https://bugzilla.suse.com/1048232" source="BUGZILLA"/>
		<reference ref_id="1048275" ref_url="https://bugzilla.suse.com/1048275" source="BUGZILLA"/>
		<reference ref_id="1049483" ref_url="https://bugzilla.suse.com/1049483" source="BUGZILLA"/>
		<reference ref_id="1049603" ref_url="https://bugzilla.suse.com/1049603" source="BUGZILLA"/>
		<reference ref_id="1049882" ref_url="https://bugzilla.suse.com/1049882" source="BUGZILLA"/>
		<reference ref_id="1050677" ref_url="https://bugzilla.suse.com/1050677" source="BUGZILLA"/>
		<reference ref_id="1052311" ref_url="https://bugzilla.suse.com/1052311" source="BUGZILLA"/>
		<reference ref_id="1053148" ref_url="https://bugzilla.suse.com/1053148" source="BUGZILLA"/>
		<reference ref_id="1053152" ref_url="https://bugzilla.suse.com/1053152" source="BUGZILLA"/>
		<reference ref_id="1053760" ref_url="https://bugzilla.suse.com/1053760" source="BUGZILLA"/>
		<reference ref_id="1056588" ref_url="https://bugzilla.suse.com/1056588" source="BUGZILLA"/>
		<reference ref_id="870618" ref_url="https://bugzilla.suse.com/870618" source="BUGZILLA"/>
		<reference ref_id="948562" ref_url="https://bugzilla.suse.com/948562" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="957990" ref_url="https://bugzilla.suse.com/957990" source="BUGZILLA"/>
		<reference ref_id="963655" ref_url="https://bugzilla.suse.com/963655" source="BUGZILLA"/>
		<reference ref_id="972891" ref_url="https://bugzilla.suse.com/972891" source="BUGZILLA"/>
		<reference ref_id="979681" ref_url="https://bugzilla.suse.com/979681" source="BUGZILLA"/>
		<reference ref_id="983212" ref_url="https://bugzilla.suse.com/983212" source="BUGZILLA"/>
		<reference ref_id="986924" ref_url="https://bugzilla.suse.com/986924" source="BUGZILLA"/>
		<reference ref_id="989896" ref_url="https://bugzilla.suse.com/989896" source="BUGZILLA"/>
		<reference ref_id="999245" ref_url="https://bugzilla.suse.com/999245" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10200" ref_url="https://www.suse.com/security/cve/CVE-2016-10200/" source="CVE"/>
		<reference ref_id="CVE-2016-5243" ref_url="https://www.suse.com/security/cve/CVE-2016-5243/" source="CVE"/>
		<reference ref_id="CVE-2017-1000112" ref_url="https://www.suse.com/security/cve/CVE-2017-1000112/" source="CVE"/>
		<reference ref_id="CVE-2017-1000363" ref_url="https://www.suse.com/security/cve/CVE-2017-1000363/" source="CVE"/>
		<reference ref_id="CVE-2017-1000365" ref_url="https://www.suse.com/security/cve/CVE-2017-1000365/" source="CVE"/>
		<reference ref_id="CVE-2017-1000380" ref_url="https://www.suse.com/security/cve/CVE-2017-1000380/" source="CVE"/>
		<reference ref_id="CVE-2017-10661" ref_url="https://www.suse.com/security/cve/CVE-2017-10661/" source="CVE"/>
		<reference ref_id="CVE-2017-11176" ref_url="https://www.suse.com/security/cve/CVE-2017-11176/" source="CVE"/>
		<reference ref_id="CVE-2017-11473" ref_url="https://www.suse.com/security/cve/CVE-2017-11473/" source="CVE"/>
		<reference ref_id="CVE-2017-12762" ref_url="https://www.suse.com/security/cve/CVE-2017-12762/" source="CVE"/>
		<reference ref_id="CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051/" source="CVE"/>
		<reference ref_id="CVE-2017-2647" ref_url="https://www.suse.com/security/cve/CVE-2017-2647/" source="CVE"/>
		<reference ref_id="CVE-2017-2671" ref_url="https://www.suse.com/security/cve/CVE-2017-2671/" source="CVE"/>
		<reference ref_id="CVE-2017-5669" ref_url="https://www.suse.com/security/cve/CVE-2017-5669/" source="CVE"/>
		<reference ref_id="CVE-2017-5970" ref_url="https://www.suse.com/security/cve/CVE-2017-5970/" source="CVE"/>
		<reference ref_id="CVE-2017-5986" ref_url="https://www.suse.com/security/cve/CVE-2017-5986/" source="CVE"/>
		<reference ref_id="CVE-2017-6074" ref_url="https://www.suse.com/security/cve/CVE-2017-6074/" source="CVE"/>
		<reference ref_id="CVE-2017-6214" ref_url="https://www.suse.com/security/cve/CVE-2017-6214/" source="CVE"/>
		<reference ref_id="CVE-2017-6348" ref_url="https://www.suse.com/security/cve/CVE-2017-6348/" source="CVE"/>
		<reference ref_id="CVE-2017-6353" ref_url="https://www.suse.com/security/cve/CVE-2017-6353/" source="CVE"/>
		<reference ref_id="CVE-2017-6951" ref_url="https://www.suse.com/security/cve/CVE-2017-6951/" source="CVE"/>
		<reference ref_id="CVE-2017-7184" ref_url="https://www.suse.com/security/cve/CVE-2017-7184/" source="CVE"/>
		<reference ref_id="CVE-2017-7187" ref_url="https://www.suse.com/security/cve/CVE-2017-7187/" source="CVE"/>
		<reference ref_id="CVE-2017-7261" ref_url="https://www.suse.com/security/cve/CVE-2017-7261/" source="CVE"/>
		<reference ref_id="CVE-2017-7294" ref_url="https://www.suse.com/security/cve/CVE-2017-7294/" source="CVE"/>
		<reference ref_id="CVE-2017-7308" ref_url="https://www.suse.com/security/cve/CVE-2017-7308/" source="CVE"/>
		<reference ref_id="CVE-2017-7482" ref_url="https://www.suse.com/security/cve/CVE-2017-7482/" source="CVE"/>
		<reference ref_id="CVE-2017-7487" ref_url="https://www.suse.com/security/cve/CVE-2017-7487/" source="CVE"/>
		<reference ref_id="CVE-2017-7533" ref_url="https://www.suse.com/security/cve/CVE-2017-7533/" source="CVE"/>
		<reference ref_id="CVE-2017-7542" ref_url="https://www.suse.com/security/cve/CVE-2017-7542/" source="CVE"/>
		<reference ref_id="CVE-2017-7616" ref_url="https://www.suse.com/security/cve/CVE-2017-7616/" source="CVE"/>
		<reference ref_id="CVE-2017-8831" ref_url="https://www.suse.com/security/cve/CVE-2017-8831/" source="CVE"/>
		<reference ref_id="CVE-2017-8890" ref_url="https://www.suse.com/security/cve/CVE-2017-8890/" source="CVE"/>
		<reference ref_id="CVE-2017-8924" ref_url="https://www.suse.com/security/cve/CVE-2017-8924/" source="CVE"/>
		<reference ref_id="CVE-2017-8925" ref_url="https://www.suse.com/security/cve/CVE-2017-8925/" source="CVE"/>
		<reference ref_id="CVE-2017-9074" ref_url="https://www.suse.com/security/cve/CVE-2017-9074/" source="CVE"/>
		<reference ref_id="CVE-2017-9075" ref_url="https://www.suse.com/security/cve/CVE-2017-9075/" source="CVE"/>
		<reference ref_id="CVE-2017-9076" ref_url="https://www.suse.com/security/cve/CVE-2017-9076/" source="CVE"/>
		<reference ref_id="CVE-2017-9077" ref_url="https://www.suse.com/security/cve/CVE-2017-9077/" source="CVE"/>
		<reference ref_id="CVE-2017-9242" ref_url="https://www.suse.com/security/cve/CVE-2017-9242/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2016-5243: The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel did not properly copy a certain string, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#983212)
- CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c (bnc#1028415)
- CVE-2017-2647: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c (bsc#1030593).
- CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux kernel was  too late in obtaining a certain lock and consequently could not ensure that disconnect function calls are safe, which allowed local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003)
- CVE-2017-5669: The do_shmat function in ipc/shm.c in the Linux kernel did not restrict the address calculated by a certain rounding operation, which allowed local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context (bnc#1026914)
- CVE-2017-5970: The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel allowed attackers to cause a denial of service (system crash) via (1) an application that made crafted system calls or possibly (2) IPv4 traffic with invalid IP options (bsc#1024938)
- CVE-2017-5986: Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bsc#1025235)
- CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allowed local users to obtain root privileges or cause a denial of service (double free) via an application that made an IPV6_RECVPKTINFO setsockopt system call (bnc#1026024)
- CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel allowed remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag (bnc#1026722)
- CVE-2017-6348: The hashbin_delete function in net/irda/irqueue.c in the Linux kernel improperly managed lock dropping, which allowed local users to cause a denial of service (deadlock) via crafted operations on IrDA devices (bnc#1027178)
- CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly restrict association peel-off operations during certain wait states, which allowed local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986 (bnc#1027066)
- CVE-2017-6951: The keyring_search_aux function in security/keys/keyring.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the 'dead' type (bsc#1029850).
- CVE-2017-7184: The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel did not validate certain size data after an XFRM_MSG_NEWAE update, which allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability (bsc#1030573)
- CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function (bnc#1030213)
- CVE-2017-7261: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not check for a zero value of certain levels data, which allowed local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031052)
- CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440)
- CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bnc#1031579)
- CVE-2017-7482: Several missing length checks ticket decode allowing for information leak or potentially code execution (bsc#1046107).
- CVE-2017-7487: The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel mishandled reference counts, which allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface (bsc#1038879).
- CVE-2017-7533: Race condition in the fsnotify implementation in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions (bnc#1049483 1050677 ).
- CVE-2017-7542: The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel allowed local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket (bnc#1049882).
- CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel allowed local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation (bsc#1033336)
- CVE-2017-8831: The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a 'double fetch' vulnerability. This requires a malicious PCI Card. (bnc#1037994).
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038544).
- CVE-2017-8924: The edge_bulk_in_callback function in drivers/usb/serial/io_ti.c in the Linux kernel allowed local users to obtain sensitive information (in the dmesg ringbuffer and syslog) from uninitialized kernel memory by using a crafted USB device (posing as an io_ti USB serial device) to trigger an integer underflow (bnc#1037182).
- CVE-2017-8925: The omninet_open function in drivers/usb/serial/omninet.c in the Linux kernel allowed local users to cause a denial of service (tty exhaustion) by leveraging reference count mishandling (bnc#1038981).
- CVE-2017-9074: The IPv6 fragmentation implementation in the Linux kernel did not consider that the nexthdr field may be associated with an invalid option, which allowed local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls (bnc#1039882).
- CVE-2017-9075: The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1039883).
- CVE-2017-9076: The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039885).
- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1040069).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel was too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bnc#1041431).
- CVE-2017-10661: Race condition in fs/timerfd.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel queueing (bnc#1053152).
- CVE-2017-11176: The mq_notify function in the Linux kernel did not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allowed attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact (bnc#1048275).
- CVE-2017-11473: Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel allowed local users to gain privileges via a crafted ACPI table (bnc#1049603).
- CVE-2017-12762: In /drivers/isdn/i4l/isdn_net.c: A user-controlled buffer is copied into a local buffer of constant size using strcpy without a length check which can cause a buffer overflow. (bnc#1053148).
- CVE-2017-14051: An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash) by leveraging root access (bnc#1056588).
- CVE-2017-1000112: Fixed a race condition in net-packet code that could have been exploited by unprivileged users to gain root access. (bsc#1052311).
- CVE-2017-1000363: Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary  could have overflowed the parport_nr array in the following code (bnc#1039456).
- CVE-2017-1000365: The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but did not take the argument and environment pointers into account, which allowed attackers to bypass this limitation (bnc#1039354).
- CVE-2017-1000380: sound/core/timer.c in the Linux kernel was vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents may be disclosed when a read and an ioctl happen at the same time (bnc#1044125).

The following non-security bugs were fixed:

- acpi: Disable APEI error injection if securelevel is set (bsc#972891, bsc#1023051).
- blkback/blktap: do not leak stack data via response ring (bsc#1042863 XSA-216).
- btrfs: cleanup code of btrfs_balance_delayed_items() (bsc#1034838).
- btrfs: do not run delayed nodes again after all nodes flush (bsc#1034838).
- btrfs: remove btrfs_end_transaction_dmeta() (bsc#1034838).
- btrfs: remove residual code in delayed inode async helper (bsc#1034838).
- btrfs: use flags instead of the bool variants in delayed node (bsc#1034838).
- cifs: cifs_get_root shouldn't use path with tree name, alternate fix (bsc#963655, bsc#979681, bsc#1027406).
- dentry name snapshots (bsc#1049483).
- firmware: fix directory creation rule matching with make 3.80 (bsc#1012422).
- firmware: fix directory creation rule matching with make 3.82 (bsc#1012422).
- Fix vmalloc_fault oops during lazy MMU updates (bsc#948562) (bsc#948562).
- hv: do not lose pending heartbeat vmbus packets (bnc#1006919, bnc#1053760).
- jbd: do not wait (forever) for stale tid caused by wraparound (bsc#1020229).
- jbd: Fix oops in journal_remove_journal_head() (bsc#1017143).
- kernel-binary.spec: Propagate MAKE_ARGS to %build (bsc#1012422)
- keys: Disallow keyrings beginning with '.' to be joined as session keyrings (bnc#1035576).
- nfs: Avoid getting confused by confused server (bsc#1045416).
- nfsd4: minor NFSv2/v3 write decoding cleanup (bsc#1034670).
- nfsd: check for oversized NFSv2/v3 arguments (bsc#1034670).
- nfsd: do not risk using duplicate owner/file/delegation ids (bsc#1029212).
- nfsd: stricter decoding of write-like NFSv2/v3 ops (bsc#1034670).
- nfs: Make nfs_readdir revalidate less often (bsc#1048232).
- pciback: check PF instead of VF for PCI_COMMAND_MEMORY (bsc#957990).
- pciback: only check PF if actually dealing with a VF (bsc#999245).
- pciback: Save the number of MSI-X entries to be copied later (bsc#957988).
- Remove superfluous make flags (bsc#1012422)
- Return short read or 0 at end of a raw device, not EIO (bsc#1039594).
- Revert 'fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- scsi: lpfc: avoid double free of resource identifiers (bsc#989896).
- scsi: virtio_scsi: fix memory leak on full queue condition (bsc#1028880).
- sunrpc: Clean up the slot table allocation (bsc#1013862).
- sunrpc: Initalise the struct xprt upon allocation (bsc#1013862).
- usb: serial: kl5kusb105: fix line-state error handling (bsc#1021256).
- usb: wusbcore: fix NULL-deref at probe (bsc#1045487).
- Use make --output-sync feature when available (bsc#1012422). 
- Use PF_LESS_THROTTLE in loop device thread (bsc#1027101).
- xen/PCI-MSI: fix sysfs teardown in DomU (bsc#986924).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-19"/>
	<updated date="2017-09-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1006919">SUSE bug 1006919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013862">SUSE bug 1013862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017143">SUSE bug 1017143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020229">SUSE bug 1020229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021256">SUSE bug 1021256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023051">SUSE bug 1023051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024938">SUSE bug 1024938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025013">SUSE bug 1025013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025235">SUSE bug 1025235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026024">SUSE bug 1026024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026722">SUSE bug 1026722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026914">SUSE bug 1026914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027066">SUSE bug 1027066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027101">SUSE bug 1027101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027178">SUSE bug 1027178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027406">SUSE bug 1027406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028415">SUSE bug 1028415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028880">SUSE bug 1028880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029212">SUSE bug 1029212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029850">SUSE bug 1029850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030213">SUSE bug 1030213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030573">SUSE bug 1030573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030575">SUSE bug 1030575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030593">SUSE bug 1030593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031003">SUSE bug 1031003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031052">SUSE bug 1031052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031440">SUSE bug 1031440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031481">SUSE bug 1031481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031579">SUSE bug 1031579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031660">SUSE bug 1031660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033287">SUSE bug 1033287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033336">SUSE bug 1033336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034670">SUSE bug 1034670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034838">SUSE bug 1034838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035576">SUSE bug 1035576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037182">SUSE bug 1037182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037183">SUSE bug 1037183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037994">SUSE bug 1037994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038564">SUSE bug 1038564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038879">SUSE bug 1038879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038883">SUSE bug 1038883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038981">SUSE bug 1038981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038982">SUSE bug 1038982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039349">SUSE bug 1039349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039354">SUSE bug 1039354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039456">SUSE bug 1039456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039594">SUSE bug 1039594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039882">SUSE bug 1039882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039883">SUSE bug 1039883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039885">SUSE bug 1039885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040069">SUSE bug 1040069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041431">SUSE bug 1041431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042364">SUSE bug 1042364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042863">SUSE bug 1042863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042892">SUSE bug 1042892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044125">SUSE bug 1044125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045416">SUSE bug 1045416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045487">SUSE bug 1045487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046107">SUSE bug 1046107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048232">SUSE bug 1048232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048275">SUSE bug 1048275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049483">SUSE bug 1049483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049603">SUSE bug 1049603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049882">SUSE bug 1049882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050677">SUSE bug 1050677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052311">SUSE bug 1052311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053148">SUSE bug 1053148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053152">SUSE bug 1053152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053760">SUSE bug 1053760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056588">SUSE bug 1056588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948562">SUSE bug 948562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957990">SUSE bug 957990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963655">SUSE bug 963655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972891">SUSE bug 972891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979681">SUSE bug 979681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983212">SUSE bug 983212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986924">SUSE bug 986924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989896">SUSE bug 989896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999245">SUSE bug 999245</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10200/">CVE-2016-10200 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10200">CVE-2016-10200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5243/">CVE-2016-5243 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5243">CVE-2016-5243 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000112/">CVE-2017-1000112 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000112">CVE-2017-1000112 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000363/">CVE-2017-1000363 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000363">CVE-2017-1000363 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000365/">CVE-2017-1000365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000365">CVE-2017-1000365 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000380/">CVE-2017-1000380 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000380">CVE-2017-1000380 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10661/">CVE-2017-10661 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10661">CVE-2017-10661 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11176/">CVE-2017-11176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11176">CVE-2017-11176 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11473/">CVE-2017-11473 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11473">CVE-2017-11473 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12762/">CVE-2017-12762 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12762">CVE-2017-12762 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14051">CVE-2017-14051 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2647/">CVE-2017-2647 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2647">CVE-2017-2647 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2671/">CVE-2017-2671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2671">CVE-2017-2671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5669/">CVE-2017-5669 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5669">CVE-2017-5669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5970/">CVE-2017-5970 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5970">CVE-2017-5970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5986/">CVE-2017-5986 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5986">CVE-2017-5986 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6074/">CVE-2017-6074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6074">CVE-2017-6074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6214/">CVE-2017-6214 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6214">CVE-2017-6214 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6348/">CVE-2017-6348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6348">CVE-2017-6348 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6353/">CVE-2017-6353 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6353">CVE-2017-6353 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6951/">CVE-2017-6951 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6951">CVE-2017-6951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7184/">CVE-2017-7184 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7184">CVE-2017-7184 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7187/">CVE-2017-7187 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7187">CVE-2017-7187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7261/">CVE-2017-7261 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7261">CVE-2017-7261 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7294/">CVE-2017-7294 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7294">CVE-2017-7294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7308/">CVE-2017-7308 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7308">CVE-2017-7308 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7482/">CVE-2017-7482 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7482">CVE-2017-7482 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7487/">CVE-2017-7487 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7487">CVE-2017-7487 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7533/">CVE-2017-7533 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7533">CVE-2017-7533 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7542/">CVE-2017-7542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7542">CVE-2017-7542 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7616/">CVE-2017-7616 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7616">CVE-2017-7616 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8831/">CVE-2017-8831 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8831">CVE-2017-8831 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8890/">CVE-2017-8890 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8890">CVE-2017-8890 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-8924/">CVE-2017-8924 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8924">CVE-2017-8924 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8925/">CVE-2017-8925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8925">CVE-2017-8925 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9074/">CVE-2017-9074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9074">CVE-2017-9074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9075/">CVE-2017-9075 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9075">CVE-2017-9075 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9076/">CVE-2017-9076 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9076">CVE-2017-9076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9077/">CVE-2017-9077 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9077">CVE-2017-9077 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9242/">CVE-2017-9242 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9242">CVE-2017-9242 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578590" comment="kernel-bigsmp-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578591" comment="kernel-bigsmp-base-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578593" comment="kernel-default-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578594" comment="kernel-default-base-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578596" comment="kernel-default-man-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578597" comment="kernel-ec2-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578598" comment="kernel-ec2-base-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568351" comment="kernel-pae-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568352" comment="kernel-pae-base-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578600" comment="kernel-source-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578601" comment="kernel-syms-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578602" comment="kernel-trace-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578603" comment="kernel-trace-base-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578605" comment="kernel-xen-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578606" comment="kernel-xen-base-3.0.101-0.47.106.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218830" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1099922" ref_url="https://bugzilla.suse.com/1099922" source="BUGZILLA"/>
		<reference ref_id="1102870" ref_url="https://bugzilla.suse.com/1102870" source="BUGZILLA"/>
		<reference ref_id="1106095" ref_url="https://bugzilla.suse.com/1106095" source="BUGZILLA"/>
		<reference ref_id="1107829" ref_url="https://bugzilla.suse.com/1107829" source="BUGZILLA"/>
		<reference ref_id="1108227" ref_url="https://bugzilla.suse.com/1108227" source="BUGZILLA"/>
		<reference ref_id="1109967" ref_url="https://bugzilla.suse.com/1109967" source="BUGZILLA"/>
		<reference ref_id="1110247" ref_url="https://bugzilla.suse.com/1110247" source="BUGZILLA"/>
		<reference ref_id="1113337" ref_url="https://bugzilla.suse.com/1113337" source="BUGZILLA"/>
		<reference ref_id="905299" ref_url="https://bugzilla.suse.com/905299" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12896" ref_url="https://www.suse.com/security/cve/CVE-2018-12896/" source="CVE"/>
		<reference ref_id="CVE-2018-14617" ref_url="https://www.suse.com/security/cve/CVE-2018-14617/" source="CVE"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-16276" ref_url="https://www.suse.com/security/cve/CVE-2018-16276/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004827.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bnc#1107829).
- CVE-2018-14617: There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory (bnc#1102870).
- CVE-2018-16276: An issue was discovered in yurex_read in drivers/usb/misc/yurex.c where local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges (bnc#1106095).
- CVE-2018-12896: An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically made the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922).

The following non-security bugs were fixed:

- net: fix neighbours after MAC change (bnc#905299).
- powerpc: Fix smp_mb__before_spinlock() (bsc#1110247).
- x86/fpu: Do not do __thread_fpu_end() if use_eager_fpu() (bnc#1109967).
- x86/fpu: fix signal handling with eager FPU switching (ia32) (bsc#1108227).
- retpoline: Introduce start/end markers of indirect thunk (bsc#1113337).

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-05"/>
	<updated date="2018-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1099922">SUSE bug 1099922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102870">SUSE bug 1102870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106095">SUSE bug 1106095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107829">SUSE bug 1107829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108227">SUSE bug 1108227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109967">SUSE bug 1109967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110247">SUSE bug 1110247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113337">SUSE bug 1113337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905299">SUSE bug 905299</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12896/">CVE-2018-12896 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12896">CVE-2018-12896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14617/">CVE-2018-14617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14617">CVE-2018-14617 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14633">CVE-2018-14633 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16276/">CVE-2018-16276 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16276">CVE-2018-16276 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578608" comment="kernel-bigsmp-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578609" comment="kernel-bigsmp-base-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578611" comment="kernel-default-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578612" comment="kernel-default-base-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578614" comment="kernel-default-man-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578615" comment="kernel-ec2-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578616" comment="kernel-ec2-base-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568368" comment="kernel-pae-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568369" comment="kernel-pae-base-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578618" comment="kernel-source-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578619" comment="kernel-syms-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578620" comment="kernel-trace-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578621" comment="kernel-trace-base-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578623" comment="kernel-xen-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578624" comment="kernel-xen-base-3.0.101-0.47.106.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218831" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-source (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1110785" ref_url="https://bugzilla.suse.com/1110785" source="BUGZILLA"/>
		<reference ref_id="1120843" ref_url="https://bugzilla.suse.com/1120843" source="BUGZILLA"/>
		<reference ref_id="1132268" ref_url="https://bugzilla.suse.com/1132268" source="BUGZILLA"/>
		<reference ref_id="1132472" ref_url="https://bugzilla.suse.com/1132472" source="BUGZILLA"/>
		<reference ref_id="1133188" ref_url="https://bugzilla.suse.com/1133188" source="BUGZILLA"/>
		<reference ref_id="1134848" ref_url="https://bugzilla.suse.com/1134848" source="BUGZILLA"/>
		<reference ref_id="800280" ref_url="https://bugzilla.suse.com/800280" source="BUGZILLA"/>
		<reference ref_id="801178" ref_url="https://bugzilla.suse.com/801178" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0216" ref_url="https://www.suse.com/security/cve/CVE-2013-0216/" source="CVE"/>
		<reference ref_id="CVE-2013-0231" ref_url="https://www.suse.com/security/cve/CVE-2013-0231/" source="CVE"/>
		<reference ref_id="CVE-2018-17972" ref_url="https://www.suse.com/security/cve/CVE-2018-17972/" source="CVE"/>
		<reference ref_id="CVE-2019-11190" ref_url="https://www.suse.com/security/cve/CVE-2019-11190/" source="CVE"/>
		<reference ref_id="CVE-2019-11486" ref_url="https://www.suse.com/security/cve/CVE-2019-11486/" source="CVE"/>
		<reference ref_id="CVE-2019-11884" ref_url="https://www.suse.com/security/cve/CVE-2019-11884/" source="CVE"/>
		<reference ref_id="CVE-2019-5489" ref_url="https://www.suse.com/security/cve/CVE-2019-5489/" source="CVE"/>
		<description>
The SUSE Linux Enterprise Server 11 SP3 Kernel for Teradata was updated to fix security issues and bugs:

The following security bugs have been fixed:

- CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local
  attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing
  of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be
  possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server (bsc#1120843)

- CVE-2019-11190: The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su)
  because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the
  ptrace_may_access() check has a race condition when reading /proc/pid/stat (bsc#1132472)

- CVE-2018-17972: An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel
  through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a
  local attacker to exploit racy stack unwinding and leak kernel task stack contents (bsc#1110785)

- CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows
  a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a
  name field may not end with a '\0' character. (bsc#1134848)

- CVE-2019-11486: The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8
  has multiple race conditions (bsc#1133188)

The following bugs have been fixed:

- Updated broken kabi files (bsc#1132268)		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-07"/>
	<updated date="2019-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1110785">SUSE bug 1110785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120843">SUSE bug 1120843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132268">SUSE bug 1132268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132472">SUSE bug 1132472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133188">SUSE bug 1133188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134848">SUSE bug 1134848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800280">SUSE bug 800280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801178">SUSE bug 801178</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0216/">CVE-2013-0216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0216">CVE-2013-0216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0231/">CVE-2013-0231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0231">CVE-2013-0231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17972/">CVE-2018-17972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17972">CVE-2018-17972 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11190/">CVE-2019-11190 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11190">CVE-2019-11190 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11486/">CVE-2019-11486 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11486">CVE-2019-11486 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11884/">CVE-2019-11884 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11884">CVE-2019-11884 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5489/">CVE-2019-5489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5489">CVE-2019-5489 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993305" comment="kernel-default-3.0.101-0.200.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993306" comment="kernel-default-base-3.0.101-0.200.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993308" comment="kernel-ec2-3.0.101-0.200.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993309" comment="kernel-ec2-base-3.0.101-0.200.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993311" comment="kernel-source-3.0.101-0.200.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993312" comment="kernel-syms-3.0.101-0.200.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993313" comment="kernel-trace-3.0.101-0.200.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993314" comment="kernel-trace-base-3.0.101-0.200.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993316" comment="kernel-xen-3.0.101-0.200.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993317" comment="kernel-xen-base-3.0.101-0.200.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993319" comment="xen-4.2.5_21-47.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993320" comment="xen-doc-html-4.2.5_21-47.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993321" comment="xen-doc-pdf-4.2.5_21-47.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993322" comment="xen-kmp-default-4.2.5_21_3.0.101_0.200.TDC-47.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993323" comment="xen-libs-4.2.5_21-47.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993324" comment="xen-tools-4.2.5_21-47.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993325" comment="xen-tools-domU-4.2.5_21-47.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218832" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1128201" ref_url="https://bugzilla.suse.com/1128201" source="BUGZILLA"/>
		<reference ref_id="1137586" ref_url="https://bugzilla.suse.com/1137586" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP3 kernel version 3.0.101 was updated to 3.12.31
to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-11477: A sequence of SACKs may have been crafted such that one can
  trigger an integer overflow, leading to a kernel panic. (bsc#1137586)

- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which
  will fragment the TCP retransmission queue. An attacker may have been able to
  further exploit the fragmented queue to cause an expensive linked-list walk
  for subsequent SACKs received for that same TCP connection.

- CVE-2019-11479: It was possible to send a crafted sequence of SACKs which
  would fragment the RACK send map. A remote attacker may have been able to further
  exploit the fragmented send map to cause an expensive linked-list walk for
  subsequent SACKs received for that same TCP connection. This would have
  resulted in excess resource consumption due to low mss values.

The following non-security bugs were fixed:

- kabi: drop LINUX_MIB_TCPWQUEUETOOBIG snmp counter (bsc#1137586).
- mm/fs: fix soft lockup in __shrink_dcache_sb (bsc#1128201).
- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).
- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).
- tcp: limit payload size of sacked skbs (bsc#1137586).
- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-18"/>
	<updated date="2019-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1128201">SUSE bug 1128201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11477">CVE-2019-11477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11478">CVE-2019-11478 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11479">CVE-2019-11479 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993326" comment="kernel-default-3.0.101-0.207.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993327" comment="kernel-default-base-3.0.101-0.207.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993329" comment="kernel-ec2-3.0.101-0.207.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993330" comment="kernel-ec2-base-3.0.101-0.207.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993332" comment="kernel-source-3.0.101-0.207.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993333" comment="kernel-syms-3.0.101-0.207.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993334" comment="kernel-trace-3.0.101-0.207.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993335" comment="kernel-trace-base-3.0.101-0.207.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993337" comment="kernel-xen-3.0.101-0.207.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993338" comment="kernel-xen-base-3.0.101-0.207.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218833" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-source (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1090078" ref_url="https://bugzilla.suse.com/1090078" source="BUGZILLA"/>
		<reference ref_id="1102340" ref_url="https://bugzilla.suse.com/1102340" source="BUGZILLA"/>
		<reference ref_id="1112824" ref_url="https://bugzilla.suse.com/1112824" source="BUGZILLA"/>
		<reference ref_id="1130209" ref_url="https://bugzilla.suse.com/1130209" source="BUGZILLA"/>
		<reference ref_id="1137586" ref_url="https://bugzilla.suse.com/1137586" source="BUGZILLA"/>
		<reference ref_id="1139751" ref_url="https://bugzilla.suse.com/1139751" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP3 Kernel for Teradata was updated to receive the following fixes:

- CVE-2018-5390: Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue()
  and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102340)

- CVE-2019-11478: The TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be
  fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use
  this to cause a denial of service (bsc#1137586, bsc#1139751)
  
- CVE-2017-5753: Systems with microprocessors utilizing speculative execution and branch prediction may allow
  unauthorized disclosure of information to an attacker with local user access via a side-channel
  analysis (bsc#1068032, bsc#1112824)
  
- Added Intel feature bits for Speculation Control (bsc#1130209)

- Added definitions for new speculation control MSRs (bsc#1130209)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-17"/>
	<updated date="2019-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090078">SUSE bug 1090078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102340">SUSE bug 1102340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112824">SUSE bug 1112824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130209">SUSE bug 1130209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139751">SUSE bug 1139751</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5390">CVE-2018-5390 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11478">CVE-2019-11478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993340" comment="kernel-default-3.0.101-0.210.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993341" comment="kernel-default-base-3.0.101-0.210.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993343" comment="kernel-ec2-3.0.101-0.210.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993344" comment="kernel-ec2-base-3.0.101-0.210.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993346" comment="kernel-source-3.0.101-0.210.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993347" comment="kernel-syms-3.0.101-0.210.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993348" comment="kernel-trace-3.0.101-0.210.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993349" comment="kernel-trace-base-3.0.101-0.210.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993351" comment="kernel-xen-3.0.101-0.210.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993352" comment="kernel-xen-base-3.0.101-0.210.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218834" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-source (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1120758" ref_url="https://bugzilla.suse.com/1120758" source="BUGZILLA"/>
		<reference ref_id="1134395" ref_url="https://bugzilla.suse.com/1134395" source="BUGZILLA"/>
		<reference ref_id="1136424" ref_url="https://bugzilla.suse.com/1136424" source="BUGZILLA"/>
		<reference ref_id="1136795" ref_url="https://bugzilla.suse.com/1136795" source="BUGZILLA"/>
		<reference ref_id="1137194" ref_url="https://bugzilla.suse.com/1137194" source="BUGZILLA"/>
		<reference ref_id="1137586" ref_url="https://bugzilla.suse.com/1137586" source="BUGZILLA"/>
		<reference ref_id="1138943" ref_url="https://bugzilla.suse.com/1138943" source="BUGZILLA"/>
		<reference ref_id="1139358" ref_url="https://bugzilla.suse.com/1139358" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20836" ref_url="https://www.suse.com/security/cve/CVE-2018-20836/" source="CVE"/>
		<reference ref_id="CVE-2019-1125" ref_url="https://www.suse.com/security/cve/CVE-2019-1125/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-12614" ref_url="https://www.suse.com/security/cve/CVE-2019-12614/" source="CVE"/>
		<reference ref_id="CVE-2019-3459" ref_url="https://www.suse.com/security/cve/CVE-2019-3459/" source="CVE"/>
		<reference ref_id="CVE-2019-3460" ref_url="https://www.suse.com/security/cve/CVE-2019-3460/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="CVE-2019-3896" ref_url="https://www.suse.com/security/cve/CVE-2019-3896/" source="CVE"/>
		<description>
This update for the SUSE Linux Enterprise Server 11 SP3 Kernel for Teradata fixes the following issues:

Security issues fixed:

- CVE-2019-11478: The TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be
  fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could
  use this to cause a denial of service (bsc#1137586)

- CVE-2019-1125: Exclude ATOMs from speculation through SWAPGS (bsc#1139358)

- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was
  found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424)

- CVE-2019-3459, CVE-2019-3460: A heap address information leak while using L2CAP_GET_CONF_OPT was discovered
  in the Linux kernel before 5.1-rc1 (bsc#1120758)

- CVE-2019-3896: A double-free can happen in idr_remove_all() in lib/idr.c in the Linux kernel 2.6 branch.
  An unprivileged local attacker can use this flaw for a privilege escalation or for a system crash and a denial
  of service (DoS) (bsc#1138943)

- CVE-2018-20836: An issue was discovered in the Linux kernel before 4.20. There is a race condition in
  smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free (bsc#1134395)

- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the
  Linux kernel through 5.1.6. There is an unchecked kstrdup of prop-&gt;name, which might allow an attacker to cause a
  denial of service (NULL pointer dereference and system crash) (bsc#1137194)

Regular bugs fixed:

- Fixed an issue where the error message 'Hyper-V eth0: unable to send receive completion pkt' was shown (bsc#1136795)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-12"/>
	<updated date="2019-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120758">SUSE bug 1120758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134395">SUSE bug 1134395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136424">SUSE bug 1136424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136795">SUSE bug 1136795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137194">SUSE bug 1137194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138943">SUSE bug 1138943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139358">SUSE bug 1139358</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20836/">CVE-2018-20836 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20836">CVE-2018-20836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1125/">CVE-2019-1125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1125">CVE-2019-1125 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11478">CVE-2019-11478 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12614/">CVE-2019-12614 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12614">CVE-2019-12614 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3459/">CVE-2019-3459 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3459">CVE-2019-3459 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3460/">CVE-2019-3460 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3460">CVE-2019-3460 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3846">CVE-2019-3846 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3896/">CVE-2019-3896 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3896">CVE-2019-3896 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993354" comment="kernel-default-3.0.101-0.213.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993355" comment="kernel-default-base-3.0.101-0.213.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993357" comment="kernel-ec2-3.0.101-0.213.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993358" comment="kernel-ec2-base-3.0.101-0.213.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993360" comment="kernel-source-3.0.101-0.213.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993361" comment="kernel-syms-3.0.101-0.213.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993362" comment="kernel-trace-3.0.101-0.213.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993363" comment="kernel-trace-base-3.0.101-0.213.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993365" comment="kernel-xen-3.0.101-0.213.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993366" comment="kernel-xen-base-3.0.101-0.213.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218835" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-source (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1104843" ref_url="https://bugzilla.suse.com/1104843" source="BUGZILLA"/>
		<reference ref_id="1134399" ref_url="https://bugzilla.suse.com/1134399" source="BUGZILLA"/>
		<reference ref_id="1136424" ref_url="https://bugzilla.suse.com/1136424" source="BUGZILLA"/>
		<reference ref_id="1142023" ref_url="https://bugzilla.suse.com/1142023" source="BUGZILLA"/>
		<reference ref_id="1143179" ref_url="https://bugzilla.suse.com/1143179" source="BUGZILLA"/>
		<reference ref_id="1143189" ref_url="https://bugzilla.suse.com/1143189" source="BUGZILLA"/>
		<reference ref_id="1143191" ref_url="https://bugzilla.suse.com/1143191" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9289" ref_url="https://www.suse.com/security/cve/CVE-2015-9289/" source="CVE"/>
		<reference ref_id="CVE-2019-11810" ref_url="https://www.suse.com/security/cve/CVE-2019-11810/" source="CVE"/>
		<reference ref_id="CVE-2019-13631" ref_url="https://www.suse.com/security/cve/CVE-2019-13631/" source="CVE"/>
		<reference ref_id="CVE-2019-14283" ref_url="https://www.suse.com/security/cve/CVE-2019-14283/" source="CVE"/>
		<reference ref_id="CVE-2019-14284" ref_url="https://www.suse.com/security/cve/CVE-2019-14284/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP3 Kernel for Teradata was updated to receive the following fixes:

The following security issues have been fixed:

- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was
  found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424)

- CVE-2015-9289: In the Linux kernel before 4.1.4, a buffer overflow occurs when checking userspace params
  in drivers/media/dvb-frontends/cx24116.c. The maximum size for a DiSEqC command is 6, according to the
  userspace API. However, the code allows larger values such as 23 (bsc#1143179)

- CVE-2019-14283: In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate
  the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered
  by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device
  by default (bsc#1143191)

- CVE-2019-14284: In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by
  setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should
  set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy
  format operation should be called. It can be triggered by an unprivileged local user even when a floppy
  disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189)

- CVE-2019-11810: An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can
  occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in
  drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free
  (bsc#1134399)

- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through
  5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation
  of debugging messages (bsc#1142023)

The following bugs have been fixed:

- Fixes an issue in add_disk flow (bsc#1104843)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-22"/>
	<updated date="2019-08-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104843">SUSE bug 1104843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134399">SUSE bug 1134399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136424">SUSE bug 1136424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142023">SUSE bug 1142023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143179">SUSE bug 1143179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143189">SUSE bug 1143189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143191">SUSE bug 1143191</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-9289/">CVE-2015-9289 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9289">CVE-2015-9289 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11810/">CVE-2019-11810 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11810">CVE-2019-11810 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13631/">CVE-2019-13631 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13631">CVE-2019-13631 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14283/">CVE-2019-14283 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14283">CVE-2019-14283 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14284/">CVE-2019-14284 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14284">CVE-2019-14284 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3846">CVE-2019-3846 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993368" comment="kernel-default-3.0.101-0.216.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993369" comment="kernel-default-base-3.0.101-0.216.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993371" comment="kernel-ec2-3.0.101-0.216.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993372" comment="kernel-ec2-base-3.0.101-0.216.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993374" comment="kernel-source-3.0.101-0.216.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993375" comment="kernel-syms-3.0.101-0.216.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993376" comment="kernel-trace-3.0.101-0.216.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993377" comment="kernel-trace-base-3.0.101-0.216.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993379" comment="kernel-xen-3.0.101-0.216.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993380" comment="kernel-xen-base-3.0.101-0.216.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218836" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-source (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1137586" ref_url="https://bugzilla.suse.com/1137586" source="BUGZILLA"/>
		<reference ref_id="1139751" ref_url="https://bugzilla.suse.com/1139751" source="BUGZILLA"/>
		<reference ref_id="1145477" ref_url="https://bugzilla.suse.com/1145477" source="BUGZILLA"/>
		<reference ref_id="1145922" ref_url="https://bugzilla.suse.com/1145922" source="BUGZILLA"/>
		<reference ref_id="1146163" ref_url="https://bugzilla.suse.com/1146163" source="BUGZILLA"/>
		<reference ref_id="1146285" ref_url="https://bugzilla.suse.com/1146285" source="BUGZILLA"/>
		<reference ref_id="1146361" ref_url="https://bugzilla.suse.com/1146361" source="BUGZILLA"/>
		<reference ref_id="1146391" ref_url="https://bugzilla.suse.com/1146391" source="BUGZILLA"/>
		<reference ref_id="1146524" ref_url="https://bugzilla.suse.com/1146524" source="BUGZILLA"/>
		<reference ref_id="1146547" ref_url="https://bugzilla.suse.com/1146547" source="BUGZILLA"/>
		<reference ref_id="1146678" ref_url="https://bugzilla.suse.com/1146678" source="BUGZILLA"/>
		<reference ref_id="1149376" ref_url="https://bugzilla.suse.com/1149376" source="BUGZILLA"/>
		<reference ref_id="1149522" ref_url="https://bugzilla.suse.com/1149522" source="BUGZILLA"/>
		<reference ref_id="1150025" ref_url="https://bugzilla.suse.com/1150025" source="BUGZILLA"/>
		<reference ref_id="1150112" ref_url="https://bugzilla.suse.com/1150112" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18509" ref_url="https://www.suse.com/security/cve/CVE-2017-18509/" source="CVE"/>
		<reference ref_id="CVE-2017-18551" ref_url="https://www.suse.com/security/cve/CVE-2017-18551/" source="CVE"/>
		<reference ref_id="CVE-2018-20976" ref_url="https://www.suse.com/security/cve/CVE-2018-20976/" source="CVE"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="CVE-2019-15118" ref_url="https://www.suse.com/security/cve/CVE-2019-15118/" source="CVE"/>
		<reference ref_id="CVE-2019-15212" ref_url="https://www.suse.com/security/cve/CVE-2019-15212/" source="CVE"/>
		<reference ref_id="CVE-2019-15216" ref_url="https://www.suse.com/security/cve/CVE-2019-15216/" source="CVE"/>
		<reference ref_id="CVE-2019-15217" ref_url="https://www.suse.com/security/cve/CVE-2019-15217/" source="CVE"/>
		<reference ref_id="CVE-2019-15219" ref_url="https://www.suse.com/security/cve/CVE-2019-15219/" source="CVE"/>
		<reference ref_id="CVE-2019-15292" ref_url="https://www.suse.com/security/cve/CVE-2019-15292/" source="CVE"/>
		<reference ref_id="CVE-2019-15902" ref_url="https://www.suse.com/security/cve/CVE-2019-15902/" source="CVE"/>
		<reference ref_id="CVE-2019-15927" ref_url="https://www.suse.com/security/cve/CVE-2019-15927/" source="CVE"/>
		<reference ref_id="CVE-2019-9456" ref_url="https://www.suse.com/security/cve/CVE-2019-9456/" source="CVE"/>
		<description>
This update for the SUSE Linux Enterprise 11 SP3 Kernel for Teradata fixes the following issues:

Security issues:

- CVE-2019-14835: A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's
  vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration.
  A privileged guest user able to pass descriptors with invalid length to the host when migration is underway,
  could use this flaw to increase their privileges on the host (bsc#1150112)

- CVE-2019-15216: An issue was discovered in the Linux kernel before 5.0.14. There is a NULL pointer dereference
  caused by a malicious USB device in the drivers/usb/misc/yurex.c driver (bsc#1146361)

- CVE-2019-9456: In the Android kernel in Pixel C USB monitor driver there is a possible OOB write due to a
  missing bounds check. This could lead to local escalation of privilege with System execution privileges needed.
  User interaction is not needed for exploitation (bsc#1150025)

- CVE-2019-15927: An issue was discovered in the Linux kernel before 4.20.2. An out-of-bounds access exists in
  the function build_audio_procunit in the file sound/usb/mixer.c (bsc#1149522)

- CVE-2019-15902: A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190,
  4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of
  the upstream 'x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()' commit reintroduced the Spectre
  vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking
  specific commits, and because two (correctly ordered) code lines were swapped (bsc#1149376)

- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer
  overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use
  this to cause a denial of service (bsc#1137586, bsc#1139751)

- CVE-2019-15219: An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference
  caused by a malicious USB device in the drivers/usb/misc/sisusbvga/sisusb.c driver (bsc#1146524)

- CVE-2017-18509: An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a
  specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop
  general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can
  be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after
  namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of
  the ip6_mroute_* functions (bsc#1145477)

- CVE-2019-15212: An issue was discovered in the Linux kernel before 5.1.8. There is a double-free caused by a
  malicious USB device in the drivers/usb/misc/rio500.c driver (bsc#1146391)

- CVE-2019-15292: An issue was discovered in the Linux kernel before 5.0.9. There is a use-after-free in
  atalk_proc_exit, related to net/appletalk/atalk_proc.c, net/appletalk/ddp.c, and net/appletalk/sysctl_net_atalk.c
  (bsc#1146678)

- CVE-2019-15217: An issue was discovered in the Linux kernel before 5.2.3. There is a NULL pointer dereference
  caused by a malicious USB device in the drivers/media/usb/zr364xx/zr364xx.c driver (bsc#1146547)

- CVE-2018-20976: An issue was discovered in fs/xfs/xfs_super.c in the Linux kernel before 4.18. A use after
  free exists, related to xfs_fs_fill_super failure (bsc#1146285)

- CVE-2017-18551: An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel before 4.14.15.
  There is an out of bounds write in the function i2c_smbus_xfer_emulated (bsc#1146163)

- CVE-2019-15118: check_input_term in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles recursion,
  leading to kernel stack exhaustion (bsc#1145922)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-23"/>
	<updated date="2019-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139751">SUSE bug 1139751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145477">SUSE bug 1145477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145922">SUSE bug 1145922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146163">SUSE bug 1146163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146285">SUSE bug 1146285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146361">SUSE bug 1146361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146391">SUSE bug 1146391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146524">SUSE bug 1146524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146547">SUSE bug 1146547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146678">SUSE bug 1146678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149376">SUSE bug 1149376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149522">SUSE bug 1149522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150025">SUSE bug 1150025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150112">SUSE bug 1150112</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18509/">CVE-2017-18509 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18509">CVE-2017-18509 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-18551/">CVE-2017-18551 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18551">CVE-2017-18551 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20976/">CVE-2018-20976 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20976">CVE-2018-20976 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11477">CVE-2019-11477 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15118/">CVE-2019-15118 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15118">CVE-2019-15118 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15212/">CVE-2019-15212 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15212">CVE-2019-15212 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15216/">CVE-2019-15216 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15216">CVE-2019-15216 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15217/">CVE-2019-15217 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15217">CVE-2019-15217 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15219/">CVE-2019-15219 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15219">CVE-2019-15219 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15292/">CVE-2019-15292 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15292">CVE-2019-15292 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15902/">CVE-2019-15902 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15902">CVE-2019-15902 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15927/">CVE-2019-15927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15927">CVE-2019-15927 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9456/">CVE-2019-9456 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9456">CVE-2019-9456 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993382" comment="kernel-default-3.0.101-0.219.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993383" comment="kernel-default-base-3.0.101-0.219.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993385" comment="kernel-ec2-3.0.101-0.219.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993386" comment="kernel-ec2-base-3.0.101-0.219.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993388" comment="kernel-source-3.0.101-0.219.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993389" comment="kernel-syms-3.0.101-0.219.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993390" comment="kernel-trace-3.0.101-0.219.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993391" comment="kernel-trace-base-3.0.101-0.219.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993393" comment="kernel-xen-3.0.101-0.219.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993394" comment="kernel-xen-base-3.0.101-0.219.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218837" version="1" class="patch">
	<metadata>
		<title>Security update for the SUSE Linux Enterprise 11 SP3 Kernel for Teradata (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1117665" ref_url="https://bugzilla.suse.com/1117665" source="BUGZILLA"/>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1146540" ref_url="https://bugzilla.suse.com/1146540" source="BUGZILLA"/>
		<reference ref_id="1147122" ref_url="https://bugzilla.suse.com/1147122" source="BUGZILLA"/>
		<reference ref_id="1148938" ref_url="https://bugzilla.suse.com/1148938" source="BUGZILLA"/>
		<reference ref_id="1150452" ref_url="https://bugzilla.suse.com/1150452" source="BUGZILLA"/>
		<reference ref_id="1150457" ref_url="https://bugzilla.suse.com/1150457" source="BUGZILLA"/>
		<reference ref_id="1150465" ref_url="https://bugzilla.suse.com/1150465" source="BUGZILLA"/>
		<reference ref_id="1151347" ref_url="https://bugzilla.suse.com/1151347" source="BUGZILLA"/>
		<reference ref_id="1152779" ref_url="https://bugzilla.suse.com/1152779" source="BUGZILLA"/>
		<reference ref_id="1152782" ref_url="https://bugzilla.suse.com/1152782" source="BUGZILLA"/>
		<reference ref_id="1152786" ref_url="https://bugzilla.suse.com/1152786" source="BUGZILLA"/>
		<reference ref_id="1152789" ref_url="https://bugzilla.suse.com/1152789" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1155671" ref_url="https://bugzilla.suse.com/1155671" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-14821" ref_url="https://www.suse.com/security/cve/CVE-2019-14821/" source="CVE"/>
		<reference ref_id="CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291/" source="CVE"/>
		<reference ref_id="CVE-2019-15505" ref_url="https://www.suse.com/security/cve/CVE-2019-15505/" source="CVE"/>
		<reference ref_id="CVE-2019-15807" ref_url="https://www.suse.com/security/cve/CVE-2019-15807/" source="CVE"/>
		<reference ref_id="CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232/" source="CVE"/>
		<reference ref_id="CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233/" source="CVE"/>
		<reference ref_id="CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234/" source="CVE"/>
		<reference ref_id="CVE-2019-16413" ref_url="https://www.suse.com/security/cve/CVE-2019-16413/" source="CVE"/>
		<reference ref_id="CVE-2019-17052" ref_url="https://www.suse.com/security/cve/CVE-2019-17052/" source="CVE"/>
		<reference ref_id="CVE-2019-17053" ref_url="https://www.suse.com/security/cve/CVE-2019-17053/" source="CVE"/>
		<reference ref_id="CVE-2019-17054" ref_url="https://www.suse.com/security/cve/CVE-2019-17054/" source="CVE"/>
		<reference ref_id="CVE-2019-17055" ref_url="https://www.suse.com/security/cve/CVE-2019-17055/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<description>
This is an update for the SUSE Linux Enterprise 11 SP3 Kernel for Teradata:

The following security issues have been fixed:

- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race condition in the
  Instruction Fetch Unit of the Intel CPU to cause a Machine Exception during Page Size Change,
  causing the CPU core to be non-functional. (bsc#1117665)

- CVE-2019-10220: Added sanity checks on the pathnames passed to the user space. (bsc#1144903)

- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with Transactional Memory
  support could be used to facilitate sidechannel information leaks out of microarchitectural
  buffers, similar to the previously described 'Microarchitectural Data Sampling' attack

  The Linux kernel was supplemented with the option to disable TSX operation altogether (requiring
  CPU Microcode updates on older systems) and better flushing of microarchitectural buffers (VERW).

  The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251
  (bsc#1139073)

- CVE-2019-14821: An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3,
  in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on
  an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring-&gt;first' and 'ring-&gt;last'
  value could be supplied by a host user-space process. An unprivileged host user or process with access
  to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or
  potentially escalating privileges on the system. (bcs#1151350)

- CVE-2019-15291: An issue was discovered in the Linux kernel through 5.2.9. There is a NULL pointer dereference
  caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c
  driver. (bsc#1146540)

- CVE-2019-15505: drivers/media/usb/dvb-usb/technisat-usb2.c in the Linux kernel through 5.2.9 has an
  out-of-bounds read via crafted USB device traffic (which may be remote via usbip or usbredir). (bsc#1147122)

- CVE-2019-15807: In the Linux kernel before 5.1.13, there is a memory leak in drivers/scsi/libsas/sas_expander.c
  when SAS expander discovery fails. This will cause a BUG and denial of service. (bsc#1148938)

- CVE-2019-16232: drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the
  alloc_workqueue return value, leading to a NULL pointer dereference. (bsc#1150465)

- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue
  return value, leading to a NULL pointer dereference. (bsc#1150457)

- CVE-2019-16234: drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the
  alloc_workqueue return value, leading to a NULL pointer dereference. (bsc#1150452)

- CVE-2019-16413: An issue was discovered in the Linux kernel before 5.0.4. The 9p filesystem did not protect
  i_size_write() properly, which causes an i_size_read() infinite loop and denial of service on SMP systems.
  (bsc#1151347)

- CVE-2019-17052: ax25_create in net/ax25/af_ax25.c in the AF_AX25 network module in the Linux kernel through
  5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka
  CID-0614e2b73768. (bsc#1152779)

- CVE-2019-17053: ieee802154_create in net/ieee802154/socket.c in the AF_IEEE802154 network module in the Linux
  kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket,
  aka CID-e69dbd4619e7. (bsc#1152789)

- CVE-2019-17054: atalk_create in net/appletalk/ddp.c in the AF_APPLETALK network module in the Linux kernel through
  5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka
  CID-6cc03e8aa36c. (bsc#1152786)

- CVE-2019-17055: base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel
  through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka
  CID-b91ee4aa2a21. (bsc#1152782)

- CVE-2019-17133: In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not
  reject a long SSID IE, leading to a Buffer Overflow. (bsc#1153158)
  CVE-2019-17133).

- IB/core: Add mitigation for Spectre V1 (bsc#1155671)
- array_index_nospec: Sanitize speculative array (bsc#1155671)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-12"/>
	<updated date="2019-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1117665">SUSE bug 1117665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146540">SUSE bug 1146540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147122">SUSE bug 1147122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148938">SUSE bug 1148938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150452">SUSE bug 1150452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150457">SUSE bug 1150457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150465">SUSE bug 1150465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151347">SUSE bug 1151347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152779">SUSE bug 1152779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152782">SUSE bug 1152782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152786">SUSE bug 1152786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152789">SUSE bug 1152789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155671">SUSE bug 1155671</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12207">CVE-2018-12207 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-14821/">CVE-2019-14821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14821">CVE-2019-14821 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15291">CVE-2019-15291 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15505/">CVE-2019-15505 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15505">CVE-2019-15505 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15807/">CVE-2019-15807 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15807">CVE-2019-15807 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16232">CVE-2019-16232 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16233">CVE-2019-16233 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16234">CVE-2019-16234 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16413/">CVE-2019-16413 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-16413">CVE-2019-16413 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17052/">CVE-2019-17052 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17052">CVE-2019-17052 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17053/">CVE-2019-17053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-17053">CVE-2019-17053 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-17054/">CVE-2019-17054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-17054">CVE-2019-17054 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17055/">CVE-2019-17055 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17055">CVE-2019-17055 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993396" comment="kernel-default-3.0.101-0.222.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993397" comment="kernel-default-base-3.0.101-0.222.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993399" comment="kernel-ec2-3.0.101-0.222.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993400" comment="kernel-ec2-base-3.0.101-0.222.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993402" comment="kernel-source-3.0.101-0.222.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993403" comment="kernel-syms-3.0.101-0.222.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993404" comment="kernel-trace-3.0.101-0.222.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993405" comment="kernel-trace-base-3.0.101-0.222.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993407" comment="kernel-xen-3.0.101-0.222.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993408" comment="kernel-xen-base-3.0.101-0.222.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218838" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-source (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1117665" ref_url="https://bugzilla.suse.com/1117665" source="BUGZILLA"/>
		<reference ref_id="1136922" ref_url="https://bugzilla.suse.com/1136922" source="BUGZILLA"/>
		<reference ref_id="1146544" ref_url="https://bugzilla.suse.com/1146544" source="BUGZILLA"/>
		<reference ref_id="1149448" ref_url="https://bugzilla.suse.com/1149448" source="BUGZILLA"/>
		<reference ref_id="1154990" ref_url="https://bugzilla.suse.com/1154990" source="BUGZILLA"/>
		<reference ref_id="1157070" ref_url="https://bugzilla.suse.com/1157070" source="BUGZILLA"/>
		<reference ref_id="1157143" ref_url="https://bugzilla.suse.com/1157143" source="BUGZILLA"/>
		<reference ref_id="1157155" ref_url="https://bugzilla.suse.com/1157155" source="BUGZILLA"/>
		<reference ref_id="1157157" ref_url="https://bugzilla.suse.com/1157157" source="BUGZILLA"/>
		<reference ref_id="1157303" ref_url="https://bugzilla.suse.com/1157303" source="BUGZILLA"/>
		<reference ref_id="1157485" ref_url="https://bugzilla.suse.com/1157485" source="BUGZILLA"/>
		<reference ref_id="1157678" ref_url="https://bugzilla.suse.com/1157678" source="BUGZILLA"/>
		<reference ref_id="1158410" ref_url="https://bugzilla.suse.com/1158410" source="BUGZILLA"/>
		<reference ref_id="1158413" ref_url="https://bugzilla.suse.com/1158413" source="BUGZILLA"/>
		<reference ref_id="1158445" ref_url="https://bugzilla.suse.com/1158445" source="BUGZILLA"/>
		<reference ref_id="1158823" ref_url="https://bugzilla.suse.com/1158823" source="BUGZILLA"/>
		<reference ref_id="1158824" ref_url="https://bugzilla.suse.com/1158824" source="BUGZILLA"/>
		<reference ref_id="1158900" ref_url="https://bugzilla.suse.com/1158900" source="BUGZILLA"/>
		<reference ref_id="1158904" ref_url="https://bugzilla.suse.com/1158904" source="BUGZILLA"/>
		<reference ref_id="1159467" ref_url="https://bugzilla.suse.com/1159467" source="BUGZILLA"/>
		<reference ref_id="1159841" ref_url="https://bugzilla.suse.com/1159841" source="BUGZILLA"/>
		<reference ref_id="1159908" ref_url="https://bugzilla.suse.com/1159908" source="BUGZILLA"/>
		<reference ref_id="1159911" ref_url="https://bugzilla.suse.com/1159911" source="BUGZILLA"/>
		<reference ref_id="1160774" ref_url="https://bugzilla.suse.com/1160774" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2019-12456" ref_url="https://www.suse.com/security/cve/CVE-2019-12456/" source="CVE"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="CVE-2019-15213" ref_url="https://www.suse.com/security/cve/CVE-2019-15213/" source="CVE"/>
		<reference ref_id="CVE-2019-15916" ref_url="https://www.suse.com/security/cve/CVE-2019-15916/" source="CVE"/>
		<reference ref_id="CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660/" source="CVE"/>
		<reference ref_id="CVE-2019-19066" ref_url="https://www.suse.com/security/cve/CVE-2019-19066/" source="CVE"/>
		<reference ref_id="CVE-2019-19073" ref_url="https://www.suse.com/security/cve/CVE-2019-19073/" source="CVE"/>
		<reference ref_id="CVE-2019-19074" ref_url="https://www.suse.com/security/cve/CVE-2019-19074/" source="CVE"/>
		<reference ref_id="CVE-2019-19227" ref_url="https://www.suse.com/security/cve/CVE-2019-19227/" source="CVE"/>
		<reference ref_id="CVE-2019-19523" ref_url="https://www.suse.com/security/cve/CVE-2019-19523/" source="CVE"/>
		<reference ref_id="CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524/" source="CVE"/>
		<reference ref_id="CVE-2019-19527" ref_url="https://www.suse.com/security/cve/CVE-2019-19527/" source="CVE"/>
		<reference ref_id="CVE-2019-19530" ref_url="https://www.suse.com/security/cve/CVE-2019-19530/" source="CVE"/>
		<reference ref_id="CVE-2019-19531" ref_url="https://www.suse.com/security/cve/CVE-2019-19531/" source="CVE"/>
		<reference ref_id="CVE-2019-19532" ref_url="https://www.suse.com/security/cve/CVE-2019-19532/" source="CVE"/>
		<reference ref_id="CVE-2019-19537" ref_url="https://www.suse.com/security/cve/CVE-2019-19537/" source="CVE"/>
		<reference ref_id="CVE-2019-19965" ref_url="https://www.suse.com/security/cve/CVE-2019-19965/" source="CVE"/>
		<reference ref_id="CVE-2019-19966" ref_url="https://www.suse.com/security/cve/CVE-2019-19966/" source="CVE"/>
		<reference ref_id="CVE-2019-20096" ref_url="https://www.suse.com/security/cve/CVE-2019-20096/" source="CVE"/>
		<description>
This is an update for the SUSE Linux Enterprise 11 SP3 Kernel for Teradata:

* Fixed security issues:

  - CVE-2019-19965: In the Linux kernel up to and including 5.4.6, there is a NULL pointer dereference in
    drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related
    to a PHY down race condition, aka CID-f70267f379b5 (bsc#1159911)

  - CVE-2019-19066: A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the
    Linux kernel up to and including 5.3.11 allows malicious users to cause a denial of service (memory
    consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd (bsc#1157303)

  - CVE-2019-14896, CVE-2019-14897: It exists that a heap-based buffer overflow existed in the Marvell WiFi-Ex Driver for the
    Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash)
    or possibly execute arbitrary code (bsc#1157157, bsc#1157155)
  
  - CVE-2019-20096: In the Linux kernel prior to 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c,
    which may cause denial of service, aka CID-1d3ff0950e2b (bsc#1159908)

  - CVE-2019-19966: In the Linux kernel prior to 5.1.6, there is a use-after-free in cpia2_exit() in
    drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655 (bsc#1159841)
  
  - CVE-2019-19532: In the Linux kernel prior to 5.3.9, there are multiple out-of-bounds write bugs that can be caused by
    a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95 (bsc#1158824)

  - CVE-2019-19523: In the Linux kernel prior to 5.3.7, there is a use-after-free bug that can be caused by a malicious
    USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79 (bsc#1158823)

  - CVE-2019-19537: In the Linux kernel prior to 5.2.10, there is a race condition bug that can be caused by a malicious
    USB device in the USB character device driver layer, aka CID-303911cfc5b9 (bsc#1158904)

  - CVE-2019-19523: In the Linux kernel prior to 5.3.7, there is a use-after-free bug that can be caused by a malicious
    USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79 (bsc#1158823)

  - CVE-2019-19527: In the Linux kernel prior to 5.2.10, there is a use-after-free bug that can be caused by a malicious
    USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e (bsc#1158900)

  - CVE-2019-19530: In the Linux kernel prior to 5.2.10, there is a use-after-free bug that can be caused by a malicious
    USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef (bsc#1158410)

  - CVE-2019-19524: In the Linux kernel prior to 5.3.12, there is a use-after-free bug that can be caused by a malicious
    USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9 (bsc#1158413)

  - CVE-2019-15213: An issue exists in the Linux kernel prior to 5.2.3. There is a use-after-free caused by a malicious
    USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver (bsc#1146544)

  - CVE-2019-19531: In the Linux kernel prior to 5.2.9, there is a use-after-free bug that can be caused by a malicious
    USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca (bsc#1158445)

  - CVE-2019-19227: In the AppleTalk subsystem in the Linux kernel prior to 5.1, there is a potential NULL pointer
    dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c
    and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122 (bsc#1157678)

  - CVE-2019-12456: An issue exists in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the
    Linux kernel up to and including 5.1.5. It allows local users to cause a denial of service or possibly have unspecified
    other impact by changing the value of ioc_number between two kernel reads of that value, aka a 'double fetch' vulnerability (bsc#1136922)

  - CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux
    kernel up to and including 5.3.11 allows malicious users to cause a denial of service (memory consumption), aka
    CID-728c1e2a05e4 (bsc#1157143)

  - CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel up to and including 5.3.11
    allow malicious users to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures.
    This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service()
    function, aka CID-853acf7caf10 (bsc#1157070)

  - CVE-2019-15916: An issue exists in the Linux kernel prior to 5.0.1. There is a memory leak in register_queue_kobjects()
    in net/core/net-sysfs.c, which will cause denial of service (bsc#1149448)

* Regular bug fixes:

  - sd: always retry READ CAPACITY for ALUA state transition (bsc#1160774)
  - Disabled asynchronous probing for individual devices (bsc#1154990)		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1117665">SUSE bug 1117665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136922">SUSE bug 1136922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146544">SUSE bug 1146544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149448">SUSE bug 1149448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154990">SUSE bug 1154990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157070">SUSE bug 1157070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157143">SUSE bug 1157143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157155">SUSE bug 1157155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157157">SUSE bug 1157157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157303">SUSE bug 1157303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157485">SUSE bug 1157485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157678">SUSE bug 1157678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158410">SUSE bug 1158410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158413">SUSE bug 1158413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158445">SUSE bug 1158445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158823">SUSE bug 1158823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158824">SUSE bug 1158824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158900">SUSE bug 1158900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158904">SUSE bug 1158904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159467">SUSE bug 1159467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159841">SUSE bug 1159841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159908">SUSE bug 1159908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159911">SUSE bug 1159911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160774">SUSE bug 1160774</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12207">CVE-2018-12207 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12456/">CVE-2019-12456 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12456">CVE-2019-12456 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14896">CVE-2019-14896 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14897">CVE-2019-14897 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15213/">CVE-2019-15213 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15213">CVE-2019-15213 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15916/">CVE-2019-15916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15916">CVE-2019-15916 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18660">CVE-2019-18660 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19066/">CVE-2019-19066 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19066">CVE-2019-19066 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19073/">CVE-2019-19073 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19073">CVE-2019-19073 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19074/">CVE-2019-19074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19074">CVE-2019-19074 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19227/">CVE-2019-19227 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19227">CVE-2019-19227 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19523/">CVE-2019-19523 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19523">CVE-2019-19523 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19524">CVE-2019-19524 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19527/">CVE-2019-19527 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19527">CVE-2019-19527 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19530/">CVE-2019-19530 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19530">CVE-2019-19530 at NVD</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19531/">CVE-2019-19531 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19531">CVE-2019-19531 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19532/">CVE-2019-19532 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19532">CVE-2019-19532 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19537/">CVE-2019-19537 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19537">CVE-2019-19537 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19965/">CVE-2019-19965 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19965">CVE-2019-19965 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19966/">CVE-2019-19966 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19966">CVE-2019-19966 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20096/">CVE-2019-20096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20096">CVE-2019-20096 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993410" comment="kernel-default-3.0.101-0.230.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993411" comment="kernel-default-base-3.0.101-0.230.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993413" comment="kernel-ec2-3.0.101-0.230.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993414" comment="kernel-ec2-base-3.0.101-0.230.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993416" comment="kernel-source-3.0.101-0.230.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993417" comment="kernel-syms-3.0.101-0.230.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993418" comment="kernel-trace-3.0.101-0.230.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993419" comment="kernel-trace-base-3.0.101-0.230.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993421" comment="kernel-xen-3.0.101-0.230.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993422" comment="kernel-xen-base-3.0.101-0.230.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218839" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1145340" ref_url="https://bugzilla.suse.com/1145340" source="BUGZILLA"/>
		<reference ref_id="1157804" ref_url="https://bugzilla.suse.com/1157804" source="BUGZILLA"/>
		<reference ref_id="1159285" ref_url="https://bugzilla.suse.com/1159285" source="BUGZILLA"/>
		<reference ref_id="1162928" ref_url="https://bugzilla.suse.com/1162928" source="BUGZILLA"/>
		<reference ref_id="1162929" ref_url="https://bugzilla.suse.com/1162929" source="BUGZILLA"/>
		<reference ref_id="1162931" ref_url="https://bugzilla.suse.com/1162931" source="BUGZILLA"/>
		<reference ref_id="1164078" ref_url="https://bugzilla.suse.com/1164078" source="BUGZILLA"/>
		<reference ref_id="1165111" ref_url="https://bugzilla.suse.com/1165111" source="BUGZILLA"/>
		<reference ref_id="1167629" ref_url="https://bugzilla.suse.com/1167629" source="BUGZILLA"/>
		<reference ref_id="1168075" ref_url="https://bugzilla.suse.com/1168075" source="BUGZILLA"/>
		<reference ref_id="1168649" ref_url="https://bugzilla.suse.com/1168649" source="BUGZILLA"/>
		<reference ref_id="1168829" ref_url="https://bugzilla.suse.com/1168829" source="BUGZILLA"/>
		<reference ref_id="1168854" ref_url="https://bugzilla.suse.com/1168854" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18675" ref_url="https://www.suse.com/security/cve/CVE-2019-18675/" source="CVE"/>
		<reference ref_id="CVE-2019-19768" ref_url="https://www.suse.com/security/cve/CVE-2019-19768/" source="CVE"/>
		<reference ref_id="CVE-2020-10942" ref_url="https://www.suse.com/security/cve/CVE-2020-10942/" source="CVE"/>
		<reference ref_id="CVE-2020-11608" ref_url="https://www.suse.com/security/cve/CVE-2020-11608/" source="CVE"/>
		<reference ref_id="CVE-2020-8647" ref_url="https://www.suse.com/security/cve/CVE-2020-8647/" source="CVE"/>
		<reference ref_id="CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648/" source="CVE"/>
		<reference ref_id="CVE-2020-8649" ref_url="https://www.suse.com/security/cve/CVE-2020-8649/" source="CVE"/>
		<reference ref_id="CVE-2020-9383" ref_url="https://www.suse.com/security/cve/CVE-2020-9383/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-10942: In get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls (bsc#1167629).
- CVE-2020-8647: There was a use-after-free vulnerability in the vc_do_resize function in drivers/tty/vt/vt.c (bsc#1162929).
- CVE-2020-8649: There was a use-after-free vulnerability in the vgacon_invert_region function in drivers/video/console/vgacon.c (bsc#1162931).
- CVE-2020-9383: An issue was discovered set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it (bsc#1165111).
- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bsc#1159285).
- CVE-2020-11608: Fixed a NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints (bsc#1168829).
- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bsc#1162928).
- CVE-2019-18675: Fixed an Integer Overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allowed local users to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation (bsc#1157804).


The following non-security bugs were fixed:

- Input: add safety guards to input_set_keycode() (bsc#1168075).
- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).
- blktrace: fix dereference after null check (bsc#1159285).
- blktrace: fix trace mutex deadlock (bsc#1159285).
- ext3: Initialize i_datasync_tid for new inodes (bsc#1145340).
- media: ov519: add missing endpoint sanity checks (bsc#1168829).
- media: stv06xx: add missing descriptor sanity checks (bsc#1168854).
- rpm/kernel-binary.spec.in: Replace Novell with SUSE
- x86: fix speculation bug reporting (bnc#1012382).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-29"/>
	<updated date="2020-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145340">SUSE bug 1145340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157804">SUSE bug 1157804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159285">SUSE bug 1159285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162928">SUSE bug 1162928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162929">SUSE bug 1162929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162931">SUSE bug 1162931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164078">SUSE bug 1164078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165111">SUSE bug 1165111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167629">SUSE bug 1167629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168075">SUSE bug 1168075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168649">SUSE bug 1168649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168829">SUSE bug 1168829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168854">SUSE bug 1168854</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18675/">CVE-2019-18675 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18675">CVE-2019-18675 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19768/">CVE-2019-19768 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19768">CVE-2019-19768 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10942/">CVE-2020-10942 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10942">CVE-2020-10942 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11608/">CVE-2020-11608 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11608">CVE-2020-11608 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8647/">CVE-2020-8647 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8647">CVE-2020-8647 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8648">CVE-2020-8648 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8649/">CVE-2020-8649 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8649">CVE-2020-8649 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9383/">CVE-2020-9383 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9383">CVE-2020-9383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993424" comment="kernel-default-3.0.101-0.235.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993425" comment="kernel-default-base-3.0.101-0.235.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993427" comment="kernel-ec2-3.0.101-0.235.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993428" comment="kernel-ec2-base-3.0.101-0.235.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993430" comment="kernel-source-3.0.101-0.235.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993431" comment="kernel-syms-3.0.101-0.235.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993432" comment="kernel-trace-3.0.101-0.235.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993433" comment="kernel-trace-base-3.0.101-0.235.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993435" comment="kernel-xen-3.0.101-0.235.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993436" comment="kernel-xen-base-3.0.101-0.235.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218840" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1154824" ref_url="https://bugzilla.suse.com/1154824" source="BUGZILLA"/>
		<reference ref_id="1164871" ref_url="https://bugzilla.suse.com/1164871" source="BUGZILLA"/>
		<reference ref_id="1170056" ref_url="https://bugzilla.suse.com/1170056" source="BUGZILLA"/>
		<reference ref_id="1171195" ref_url="https://bugzilla.suse.com/1171195" source="BUGZILLA"/>
		<reference ref_id="1171202" ref_url="https://bugzilla.suse.com/1171202" source="BUGZILLA"/>
		<reference ref_id="1171218" ref_url="https://bugzilla.suse.com/1171218" source="BUGZILLA"/>
		<reference ref_id="1171219" ref_url="https://bugzilla.suse.com/1171219" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-10690" ref_url="https://www.suse.com/security/cve/CVE-2020-10690/" source="CVE"/>
		<reference ref_id="CVE-2020-12652" ref_url="https://www.suse.com/security/cve/CVE-2020-12652/" source="CVE"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="CVE-2020-12656" ref_url="https://www.suse.com/security/cve/CVE-2020-12656/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
  This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).

The following non-security bugs were fixed:

- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-09"/>
	<updated date="2020-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164871">SUSE bug 1164871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170056">SUSE bug 1170056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171195">SUSE bug 1171195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171202">SUSE bug 1171202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171218">SUSE bug 1171218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171219">SUSE bug 1171219</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10690/">CVE-2020-10690 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10690">CVE-2020-10690 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12652/">CVE-2020-12652 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12652">CVE-2020-12652 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12653">CVE-2020-12653 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12654">CVE-2020-12654 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12656/">CVE-2020-12656 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12656">CVE-2020-12656 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993438" comment="kernel-default-3.0.101-0.238.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993439" comment="kernel-default-base-3.0.101-0.238.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993441" comment="kernel-ec2-3.0.101-0.238.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993442" comment="kernel-ec2-base-3.0.101-0.238.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993444" comment="kernel-source-3.0.101-0.238.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993445" comment="kernel-syms-3.0.101-0.238.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993446" comment="kernel-trace-3.0.101-0.238.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993447" comment="kernel-trace-base-3.0.101-0.238.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993449" comment="kernel-xen-3.0.101-0.238.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993450" comment="kernel-xen-base-3.0.101-0.238.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218841" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1070943" ref_url="https://bugzilla.suse.com/1070943" source="BUGZILLA"/>
		<reference ref_id="1120326" ref_url="https://bugzilla.suse.com/1120326" source="BUGZILLA"/>
		<reference ref_id="1121872" ref_url="https://bugzilla.suse.com/1121872" source="BUGZILLA"/>
		<reference ref_id="1152107" ref_url="https://bugzilla.suse.com/1152107" source="BUGZILLA"/>
		<reference ref_id="1159912" ref_url="https://bugzilla.suse.com/1159912" source="BUGZILLA"/>
		<reference ref_id="1162002" ref_url="https://bugzilla.suse.com/1162002" source="BUGZILLA"/>
		<reference ref_id="1165985" ref_url="https://bugzilla.suse.com/1165985" source="BUGZILLA"/>
		<reference ref_id="1168952" ref_url="https://bugzilla.suse.com/1168952" source="BUGZILLA"/>
		<reference ref_id="1171220" ref_url="https://bugzilla.suse.com/1171220" source="BUGZILLA"/>
		<reference ref_id="1172775" ref_url="https://bugzilla.suse.com/1172775" source="BUGZILLA"/>
		<reference ref_id="1172999" ref_url="https://bugzilla.suse.com/1172999" source="BUGZILLA"/>
		<reference ref_id="1173265" ref_url="https://bugzilla.suse.com/1173265" source="BUGZILLA"/>
		<reference ref_id="1174205" ref_url="https://bugzilla.suse.com/1174205" source="BUGZILLA"/>
		<reference ref_id="1174462" ref_url="https://bugzilla.suse.com/1174462" source="BUGZILLA"/>
		<reference ref_id="1174993" ref_url="https://bugzilla.suse.com/1174993" source="BUGZILLA"/>
		<reference ref_id="1176011" ref_url="https://bugzilla.suse.com/1176011" source="BUGZILLA"/>
		<reference ref_id="1176235" ref_url="https://bugzilla.suse.com/1176235" source="BUGZILLA"/>
		<reference ref_id="1176278" ref_url="https://bugzilla.suse.com/1176278" source="BUGZILLA"/>
		<reference ref_id="1176423" ref_url="https://bugzilla.suse.com/1176423" source="BUGZILLA"/>
		<reference ref_id="1176482" ref_url="https://bugzilla.suse.com/1176482" source="BUGZILLA"/>
		<reference ref_id="1176485" ref_url="https://bugzilla.suse.com/1176485" source="BUGZILLA"/>
		<reference ref_id="1176722" ref_url="https://bugzilla.suse.com/1176722" source="BUGZILLA"/>
		<reference ref_id="1177206" ref_url="https://bugzilla.suse.com/1177206" source="BUGZILLA"/>
		<reference ref_id="1177766" ref_url="https://bugzilla.suse.com/1177766" source="BUGZILLA"/>
		<reference ref_id="1178123" ref_url="https://bugzilla.suse.com/1178123" source="BUGZILLA"/>
		<reference ref_id="1178182" ref_url="https://bugzilla.suse.com/1178182" source="BUGZILLA"/>
		<reference ref_id="1178589" ref_url="https://bugzilla.suse.com/1178589" source="BUGZILLA"/>
		<reference ref_id="1178590" ref_url="https://bugzilla.suse.com/1178590" source="BUGZILLA"/>
		<reference ref_id="1178886" ref_url="https://bugzilla.suse.com/1178886" source="BUGZILLA"/>
		<reference ref_id="1179107" ref_url="https://bugzilla.suse.com/1179107" source="BUGZILLA"/>
		<reference ref_id="1179140" ref_url="https://bugzilla.suse.com/1179140" source="BUGZILLA"/>
		<reference ref_id="1179141" ref_url="https://bugzilla.suse.com/1179141" source="BUGZILLA"/>
		<reference ref_id="1179419" ref_url="https://bugzilla.suse.com/1179419" source="BUGZILLA"/>
		<reference ref_id="1179601" ref_url="https://bugzilla.suse.com/1179601" source="BUGZILLA"/>
		<reference ref_id="1179745" ref_url="https://bugzilla.suse.com/1179745" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133/" source="CVE"/>
		<reference ref_id="CVE-2020-0305" ref_url="https://www.suse.com/security/cve/CVE-2020-0305/" source="CVE"/>
		<reference ref_id="CVE-2020-0404" ref_url="https://www.suse.com/security/cve/CVE-2020-0404/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732/" source="CVE"/>
		<reference ref_id="CVE-2020-10769" ref_url="https://www.suse.com/security/cve/CVE-2020-10769/" source="CVE"/>
		<reference ref_id="CVE-2020-10773" ref_url="https://www.suse.com/security/cve/CVE-2020-10773/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-13974" ref_url="https://www.suse.com/security/cve/CVE-2020-13974/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-14353" ref_url="https://www.suse.com/security/cve/CVE-2020-14353/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14390" ref_url="https://www.suse.com/security/cve/CVE-2020-14390/" source="CVE"/>
		<reference ref_id="CVE-2020-14416" ref_url="https://www.suse.com/security/cve/CVE-2020-14416/" source="CVE"/>
		<reference ref_id="CVE-2020-15436" ref_url="https://www.suse.com/security/cve/CVE-2020-15436/" source="CVE"/>
		<reference ref_id="CVE-2020-15437" ref_url="https://www.suse.com/security/cve/CVE-2020-15437/" source="CVE"/>
		<reference ref_id="CVE-2020-25284" ref_url="https://www.suse.com/security/cve/CVE-2020-25284/" source="CVE"/>
		<reference ref_id="CVE-2020-25285" ref_url="https://www.suse.com/security/cve/CVE-2020-25285/" source="CVE"/>
		<reference ref_id="CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643/" source="CVE"/>
		<reference ref_id="CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656/" source="CVE"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25669" ref_url="https://www.suse.com/security/cve/CVE-2020-25669/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28915" ref_url="https://www.suse.com/security/cve/CVE-2020-28915/" source="CVE"/>
		<reference ref_id="CVE-2020-28974" ref_url="https://www.suse.com/security/cve/CVE-2020-28974/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-16746: Fixed an improper check of the length of variable elements in a beacon head, leading to a buffer overflow (bsc#1152107).
- CVE-2019-5108: Fixed a denial-of-service vulnerability caused by triggering AP to send IAPP location updates for stations before the required authentication process has completed (bnc#1159912).
- CVE-2019-6133: Fixed an issue where the 'start time' protection mechanism could have been bypassed and therefore authorization decisions are improperly cached (bsc#1128172).
- CVE-2020-0305: Fixed a race condition which could have led to local escalation of privilege (bsc#1174462).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-10732: Fixed an improper implementation of userspace core dumps which could have led to crash a trivial program and exfiltrate private kernel data (bsc#1171220).
- CVE-2020-10769: Fixed a buffer over-read in the IPsec Cryptographic algorithm's module, authenc. This flaw allowed a local attacker with user privileges to cause a denial of service (bsc#1173265).
- CVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bsc#1172999).
- CVE-2020-11668: Fixed an issue where a malicious USB device pretending to be Xirlink camera could corrupt random kernel memory (bsc#1168952).
- CVE-2020-13974: Fixed an integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bsc#1172775).
- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).
- CVE-2020-14353: Fixed an issue where keys - for keyctl prevent creating a different user's keyrings (bsc#1174993).
- CVE-2020-14381: Fixed requeue paths such that filp was valid when dropping the references (bsc#1176011).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bsc#1176235).
- CVE-2020-14416: Fixed a race condition in tty-&gt;disc_data handling in the slip and slcan line discipline which could have led to a use-after-free (bsc#1162002).
- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service(bsc#1179140). 
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).
- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bsc#1176485).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bsc#1177766).
- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-27777: Restrict RTAS requests from userspace  (bsc#1179107)
- CVE-2020-27786: Fixed a use after free in kernel midi subsystem snd_rawmidi_kernel_read1() (bsc#1179601).
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon (bsc#1178589).
- CVE-2020-29660, CVE-2020-29661: Fixed a race condition and an improper session locking process in tty pgrp and session handling (bsc#1179745).

The following non-security bugs were fixed:

- CIFS: fix uninitialized memory access (bsc#1120326).
- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).
- net/x25: fix a race in x25_bind() (bsc#1178590).
- net/x25: prevent a couple of overflows (bsc#1178590).
- tty: fix memleak in alloc_pid (bsc#1179745).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-17"/>
	<updated date="2020-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1070943">SUSE bug 1070943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120326">SUSE bug 1120326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121872">SUSE bug 1121872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152107">SUSE bug 1152107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159912">SUSE bug 1159912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162002">SUSE bug 1162002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165985">SUSE bug 1165985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168952">SUSE bug 1168952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171220">SUSE bug 1171220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172775">SUSE bug 1172775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172999">SUSE bug 1172999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173265">SUSE bug 1173265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174205">SUSE bug 1174205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174462">SUSE bug 1174462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174993">SUSE bug 1174993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176011">SUSE bug 1176011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176235">SUSE bug 1176235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176278">SUSE bug 1176278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176423">SUSE bug 1176423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176482">SUSE bug 1176482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176485">SUSE bug 1176485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176722">SUSE bug 1176722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177206">SUSE bug 1177206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177766">SUSE bug 1177766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178123">SUSE bug 1178123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178182">SUSE bug 1178182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178589">SUSE bug 1178589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178590">SUSE bug 1178590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178886">SUSE bug 1178886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179140">SUSE bug 1179140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179141">SUSE bug 1179141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179601">SUSE bug 1179601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16746">CVE-2019-16746 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5108">CVE-2019-5108 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6133">CVE-2019-6133 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0305/">CVE-2020-0305 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0305">CVE-2020-0305 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0404/">CVE-2020-0404 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0404">CVE-2020-0404 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0431">CVE-2020-0431 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10732">CVE-2020-10732 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10769/">CVE-2020-10769 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10769">CVE-2020-10769 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10773/">CVE-2020-10773 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10773">CVE-2020-10773 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13974/">CVE-2020-13974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13974">CVE-2020-13974 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14331">CVE-2020-14331 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14353/">CVE-2020-14353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-14353">CVE-2020-14353 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14381">CVE-2020-14381 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14390/">CVE-2020-14390 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14390">CVE-2020-14390 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14416/">CVE-2020-14416 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14416">CVE-2020-14416 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15436/">CVE-2020-15436 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15436">CVE-2020-15436 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15437/">CVE-2020-15437 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15437">CVE-2020-15437 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25284/">CVE-2020-25284 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25284">CVE-2020-25284 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25285/">CVE-2020-25285 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25285">CVE-2020-25285 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25643">CVE-2020-25643 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25656">CVE-2020-25656 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25668">CVE-2020-25668 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25669/">CVE-2020-25669 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25669">CVE-2020-25669 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27777">CVE-2020-27777 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27786">CVE-2020-27786 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28915/">CVE-2020-28915 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28915">CVE-2020-28915 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28974/">CVE-2020-28974 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28974">CVE-2020-28974 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993452" comment="kernel-default-3.0.101-0.241.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993453" comment="kernel-default-base-3.0.101-0.241.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993455" comment="kernel-ec2-3.0.101-0.241.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993456" comment="kernel-ec2-base-3.0.101-0.241.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993458" comment="kernel-source-3.0.101-0.241.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993459" comment="kernel-syms-3.0.101-0.241.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993460" comment="kernel-trace-3.0.101-0.241.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993461" comment="kernel-trace-base-3.0.101-0.241.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993463" comment="kernel-xen-3.0.101-0.241.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993464" comment="kernel-xen-base-3.0.101-0.241.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218842" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176395" ref_url="https://bugzilla.suse.com/1176395" source="BUGZILLA"/>
		<reference ref_id="1180029" ref_url="https://bugzilla.suse.com/1180029" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180052" ref_url="https://bugzilla.suse.com/1180052" source="BUGZILLA"/>
		<reference ref_id="1180086" ref_url="https://bugzilla.suse.com/1180086" source="BUGZILLA"/>
		<reference ref_id="1181349" ref_url="https://bugzilla.suse.com/1181349" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211/" source="CVE"/>
		<reference ref_id="CVE-2020-27068" ref_url="https://www.suse.com/security/cve/CVE-2020-27068/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).

The following non-security bugs were fixed:

- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176395">SUSE bug 1176395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180029">SUSE bug 1180029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180052">SUSE bug 1180052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180086">SUSE bug 1180086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181349">SUSE bug 1181349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0465">CVE-2020-0465 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25211">CVE-2020-25211 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27068/">CVE-2020-27068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27068">CVE-2020-27068 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3347">CVE-2021-3347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993466" comment="kernel-default-3.0.101-0.244.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993467" comment="kernel-default-base-3.0.101-0.244.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993469" comment="kernel-ec2-3.0.101-0.244.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993470" comment="kernel-ec2-base-3.0.101-0.244.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993472" comment="kernel-source-3.0.101-0.244.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993473" comment="kernel-syms-3.0.101-0.244.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993474" comment="kernel-trace-3.0.101-0.244.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993475" comment="kernel-trace-base-3.0.101-0.244.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993477" comment="kernel-xen-3.0.101-0.244.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993478" comment="kernel-xen-base-3.0.101-0.244.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218843" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-source (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179745" ref_url="https://bugzilla.suse.com/1179745" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-4788" ref_url="https://www.suse.com/security/cve/CVE-2020-4788/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP3 Kernel has been updated to receive the following fixes:

- CVE-2020-29660: A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through
  5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID,
  aka CID-c8bcd9c5be24.tty_lock: undo the old tty_lock use on the ctty (bsc#1179745)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-4788/">CVE-2020-4788 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4788">CVE-2020-4788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993480" comment="kernel-default-3.0.101-0.247.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993481" comment="kernel-default-base-3.0.101-0.247.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993483" comment="kernel-ec2-3.0.101-0.247.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993484" comment="kernel-ec2-base-3.0.101-0.247.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993486" comment="kernel-source-3.0.101-0.247.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993487" comment="kernel-syms-3.0.101-0.247.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993488" comment="kernel-trace-3.0.101-0.247.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993489" comment="kernel-trace-base-3.0.101-0.247.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993491" comment="kernel-xen-3.0.101-0.247.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993492" comment="kernel-xen-base-3.0.101-0.247.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218844" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182715" ref_url="https://bugzilla.suse.com/1182715" source="BUGZILLA"/>
		<reference ref_id="1182716" ref_url="https://bugzilla.suse.com/1182716" source="BUGZILLA"/>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183089" ref_url="https://bugzilla.suse.com/1183089" source="BUGZILLA"/>
		<reference ref_id="1183400" ref_url="https://bugzilla.suse.com/1183400" source="BUGZILLA"/>
		<reference ref_id="1183696" ref_url="https://bugzilla.suse.com/1183696" source="BUGZILLA"/>
		<reference ref_id="1184120" ref_url="https://bugzilla.suse.com/1184120" source="BUGZILLA"/>
		<reference ref_id="1184194" ref_url="https://bugzilla.suse.com/1184194" source="BUGZILLA"/>
		<reference ref_id="1184198" ref_url="https://bugzilla.suse.com/1184198" source="BUGZILLA"/>
		<reference ref_id="1184208" ref_url="https://bugzilla.suse.com/1184208" source="BUGZILLA"/>
		<reference ref_id="1184211" ref_url="https://bugzilla.suse.com/1184211" source="BUGZILLA"/>
		<reference ref_id="1184391" ref_url="https://bugzilla.suse.com/1184391" source="BUGZILLA"/>
		<reference ref_id="1184393" ref_url="https://bugzilla.suse.com/1184393" source="BUGZILLA"/>
		<reference ref_id="1184611" ref_url="https://bugzilla.suse.com/1184611" source="BUGZILLA"/>
		<reference ref_id="1184673" ref_url="https://bugzilla.suse.com/1184673" source="BUGZILLA"/>
		<reference ref_id="1185859" ref_url="https://bugzilla.suse.com/1185859" source="BUGZILLA"/>
		<reference ref_id="1185861" ref_url="https://bugzilla.suse.com/1185861" source="BUGZILLA"/>
		<reference ref_id="1185862" ref_url="https://bugzilla.suse.com/1185862" source="BUGZILLA"/>
		<reference ref_id="1186062" ref_url="https://bugzilla.suse.com/1186062" source="BUGZILLA"/>
		<reference ref_id="1186109" ref_url="https://bugzilla.suse.com/1186109" source="BUGZILLA"/>
		<reference ref_id="1187038" ref_url="https://bugzilla.suse.com/1187038" source="BUGZILLA"/>
		<reference ref_id="1187050" ref_url="https://bugzilla.suse.com/1187050" source="BUGZILLA"/>
		<reference ref_id="1187215" ref_url="https://bugzilla.suse.com/1187215" source="BUGZILLA"/>
		<reference ref_id="1187452" ref_url="https://bugzilla.suse.com/1187452" source="BUGZILLA"/>
		<reference ref_id="1187595" ref_url="https://bugzilla.suse.com/1187595" source="BUGZILLA"/>
		<reference ref_id="1188172" ref_url="https://bugzilla.suse.com/1188172" source="BUGZILLA"/>
		<reference ref_id="1188563" ref_url="https://bugzilla.suse.com/1188563" source="BUGZILLA"/>
		<reference ref_id="1188601" ref_url="https://bugzilla.suse.com/1188601" source="BUGZILLA"/>
		<reference ref_id="1189057" ref_url="https://bugzilla.suse.com/1189057" source="BUGZILLA"/>
		<reference ref_id="1189262" ref_url="https://bugzilla.suse.com/1189262" source="BUGZILLA"/>
		<reference ref_id="1189399" ref_url="https://bugzilla.suse.com/1189399" source="BUGZILLA"/>
		<reference ref_id="1190117" ref_url="https://bugzilla.suse.com/1190117" source="BUGZILLA"/>
		<reference ref_id="1190351" ref_url="https://bugzilla.suse.com/1190351" source="BUGZILLA"/>
		<reference ref_id="1191315" ref_url="https://bugzilla.suse.com/1191315" source="BUGZILLA"/>
		<reference ref_id="1191884" ref_url="https://bugzilla.suse.com/1191884" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="905100" ref_url="https://bugzilla.suse.com/905100" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-7841" ref_url="https://www.suse.com/security/cve/CVE-2014-7841/" source="CVE"/>
		<reference ref_id="CVE-2020-24586" ref_url="https://www.suse.com/security/cve/CVE-2020-24586/" source="CVE"/>
		<reference ref_id="CVE-2020-24587" ref_url="https://www.suse.com/security/cve/CVE-2020-24587/" source="CVE"/>
		<reference ref_id="CVE-2020-24588" ref_url="https://www.suse.com/security/cve/CVE-2020-24588/" source="CVE"/>
		<reference ref_id="CVE-2020-26139" ref_url="https://www.suse.com/security/cve/CVE-2020-26139/" source="CVE"/>
		<reference ref_id="CVE-2020-35519" ref_url="https://www.suse.com/security/cve/CVE-2020-35519/" source="CVE"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2020-36386" ref_url="https://www.suse.com/security/cve/CVE-2020-36386/" source="CVE"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-20261" ref_url="https://www.suse.com/security/cve/CVE-2021-20261/" source="CVE"/>
		<reference ref_id="CVE-2021-20265" ref_url="https://www.suse.com/security/cve/CVE-2021-20265/" source="CVE"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="CVE-2021-28950" ref_url="https://www.suse.com/security/cve/CVE-2021-28950/" source="CVE"/>
		<reference ref_id="CVE-2021-28972" ref_url="https://www.suse.com/security/cve/CVE-2021-28972/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="CVE-2021-29650" ref_url="https://www.suse.com/security/cve/CVE-2021-29650/" source="CVE"/>
		<reference ref_id="CVE-2021-30002" ref_url="https://www.suse.com/security/cve/CVE-2021-30002/" source="CVE"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33033" ref_url="https://www.suse.com/security/cve/CVE-2021-33033/" source="CVE"/>
		<reference ref_id="CVE-2021-34693" ref_url="https://www.suse.com/security/cve/CVE-2021-34693/" source="CVE"/>
		<reference ref_id="CVE-2021-3483" ref_url="https://www.suse.com/security/cve/CVE-2021-3483/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3655" ref_url="https://www.suse.com/security/cve/CVE-2021-3655/" source="CVE"/>
		<reference ref_id="CVE-2021-3679" ref_url="https://www.suse.com/security/cve/CVE-2021-3679/" source="CVE"/>
		<reference ref_id="CVE-2021-37159" ref_url="https://www.suse.com/security/cve/CVE-2021-37159/" source="CVE"/>
		<reference ref_id="CVE-2021-3772" ref_url="https://www.suse.com/security/cve/CVE-2021-3772/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<reference ref_id="CVE-2021-42008" ref_url="https://www.suse.com/security/cve/CVE-2021-42008/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2021-43389" ref_url="https://www.suse.com/security/cve/CVE-2021-43389/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2014-7841: Fixed denial of service via a malformed SCTP INIT chunk when ASCONF is used (bnc#905100).
- CVE-2020-24586: Fixed arbitrary network packet injection via fragmented frames encrypted using WEP, CCMP, or GCMP (bnc#1185859).
- CVE-2020-24587: Fixed data leak when fragments of a frame are not encrypted with the same key and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859, bnc#1185862).
- CVE-2020-24588: Fixed arbitrary network packet injection via specially crafted non-SSP A-MSDU frames (bnc#1185861).
- CVE-2020-26139: Fixed denial of service in protected Wi-Fi newtwors via EAPOL frames forwarding (bnc#1186062).
- CVE-2020-35519: Fixed out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c (bnc#1183696).
- CVE-2020-36322: Fixed system crash in the FUSE filesystem implementation (bnc#1184211).
- CVE-2020-36385: Fixed user-after-free issue in drivers/infiniband/core/ucma.c (bnc#1187050).
- CVE-2020-36386: Fixed slab out-of-bounds read in hci_extended_inquiry_result_evt funcion in net/bluetooth/hci_event.c (bnc#1187038).
- CVE-2021-0512: Fixed local privilege escalation via a buffer overflow in __hidinput_change_resolution_multipliers of hid-input.c (bnc#1187595).
- CVE-2021-20261: Fixed race condition in the floppy disk drive controller driver software (bnc#1183400).
- CVE-2021-20265: Fixed denial of service by unprivileged local users via the the unix_stream_recvmsg function in the Linux kernel when a signal was pending (bnc#1183089).
- CVE-2021-27363: Fixed kernel pointer leak in iSCSI subsystem (bnc#1182716).
- CVE-2021-27364: Fixed iscsi_if_recv_msg() allows non-root users to connect and send commands (bnc#1182717).
- CVE-2021-27365: Fixed missing length checks in iSCSI data structures (bnc#1182715).
- CVE-2021-28950: Fixed stall on CPU in fs/fuse/fuse_i.h (bnc#1184194).
- CVE-2021-28972: Fixed buffer overflow in In drivers/pci/hotplug/rpadlpar_sysfs.c (bnc#1184198).
- CVE-2021-29154: Fixed arbitrary code execution within the kernel context due to BPF JIT compilers incorrect computation of branch displacements (bnc#1184391).
- CVE-2021-29650: Fixed denial of service in the netfilter subsystem upon the assignment of a new table value (bnc#1184208).
- CVE-2021-30002: Fixed memory leak for large arguments in video_usercopy in drivers/media/v4l2-core/v4l2-ioctl.c (bnc#1184120).
- CVE-2021-32399: Fixed race condition in net/bluetooth/hci_request.c (bnc#1184611).
- CVE-2021-33033: Fixed a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled (bsc#1186109).
- CVE-2021-34693: Fixed leak of sensitive information from kernel stack memory via partially uninitialized data structures in net/can/bcm.c (bnc#1187452).
- CVE-2021-3483: Fixed user-after-free in the Nosy driver in the Linux kernel (bnc#1184393).
- CVE-2021-3609: Fixed local privilege escalation via a race condition in net/can/bcm.c (bsc#1187215).
- CVE-2021-3640: Fixed Use-After-Free vulnerability in function sco_sock_sendmsg() (bsc#1188172).
- CVE-2021-3653: Fixed flaw in KVM's AMD code for supporting SVM nested virtualization that could lead to system crash, data leak or guest-to-host escape (bnc#1189399).
- CVE-2021-3655: Fixed a missing size validations on inbound SCTP packets, which may have allowed the kernel to read uninitialized memory (bsc#1188563).
- CVE-2021-3679: Fixed denial of service flaw in the Linux kernel tracing module functionality (bnc#1189057).
- CVE-2021-37159: Fixed use-after-free and a double free inside hso_free_net_device in drivers/net/usb/hso.c when unregister_netdev is called without checking for the NETREG_REGISTERED state (bnc#1188601).
- CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).
- CVE-2021-38160: Fixed data corruption or loss that could be triggered by untrusted device in drivers/char/virtio_console.c (bsc#1190117).
- CVE-2021-38198: Fixed shadow page memory access permission in arch/x86/kvm/mmu/paging_tmpl.h that could lead to a missing guest protection page fault (bnc#1189262).
- CVE-2021-42008: Fixed a slab out-of-bounds write in the decode_data function in drivers/net/hamradio/6pack.c. Input from a process that had the CAP_NET_ADMIN capability could have lead to root access (bsc#1191315).
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
- CVE-2021-43389: Fixed array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).

The following non-security bugs were fixed:

- sched: Fix possible divide by zero in avg_atom() calculation (bsc#1191884).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-22"/>
	<updated date="2021-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182715">SUSE bug 1182715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182716">SUSE bug 1182716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183089">SUSE bug 1183089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183400">SUSE bug 1183400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183696">SUSE bug 1183696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184120">SUSE bug 1184120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184194">SUSE bug 1184194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184198">SUSE bug 1184198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184208">SUSE bug 1184208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184211">SUSE bug 1184211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184391">SUSE bug 1184391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184393">SUSE bug 1184393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184673">SUSE bug 1184673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185859">SUSE bug 1185859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185861">SUSE bug 1185861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185862">SUSE bug 1185862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186062">SUSE bug 1186062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186109">SUSE bug 1186109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187038">SUSE bug 1187038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187050">SUSE bug 1187050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187215">SUSE bug 1187215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187452">SUSE bug 1187452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187595">SUSE bug 1187595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188172">SUSE bug 1188172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188563">SUSE bug 1188563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188601">SUSE bug 1188601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189057">SUSE bug 1189057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189262">SUSE bug 1189262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189399">SUSE bug 1189399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190117">SUSE bug 1190117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190351">SUSE bug 1190351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191315">SUSE bug 1191315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191884">SUSE bug 1191884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905100">SUSE bug 905100</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7841/">CVE-2014-7841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7841">CVE-2014-7841 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24586/">CVE-2020-24586 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24586">CVE-2020-24586 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24587/">CVE-2020-24587 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24587">CVE-2020-24587 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24588/">CVE-2020-24588 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24588">CVE-2020-24588 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26139/">CVE-2020-26139 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26139">CVE-2020-26139 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35519/">CVE-2020-35519 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35519">CVE-2020-35519 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36322">CVE-2020-36322 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36385">CVE-2020-36385 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36386/">CVE-2020-36386 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36386">CVE-2020-36386 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0512">CVE-2021-0512 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20261/">CVE-2021-20261 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20261">CVE-2021-20261 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20265/">CVE-2021-20265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20265">CVE-2021-20265 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28950/">CVE-2021-28950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28950">CVE-2021-28950 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28972/">CVE-2021-28972 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28972">CVE-2021-28972 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29650/">CVE-2021-29650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29650">CVE-2021-29650 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30002/">CVE-2021-30002 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30002">CVE-2021-30002 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32399">CVE-2021-32399 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33033/">CVE-2021-33033 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33033">CVE-2021-33033 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34693/">CVE-2021-34693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34693">CVE-2021-34693 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3483/">CVE-2021-3483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3483">CVE-2021-3483 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3609">CVE-2021-3609 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3640">CVE-2021-3640 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3655/">CVE-2021-3655 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3655">CVE-2021-3655 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3679/">CVE-2021-3679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3679">CVE-2021-3679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37159/">CVE-2021-37159 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37159">CVE-2021-37159 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3772/">CVE-2021-3772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3772">CVE-2021-3772 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38160">CVE-2021-38160 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38198">CVE-2021-38198 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42008/">CVE-2021-42008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42008">CVE-2021-42008 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42739">CVE-2021-42739 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43389/">CVE-2021-43389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43389">CVE-2021-43389 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993494" comment="iscsitarget-1.4.20-0.40.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993495" comment="iscsitarget-kmp-default-1.4.20_3.0.101_0.250.TDC-0.40.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993496" comment="iscsitarget-kmp-trace-1.4.20_3.0.101_0.250.TDC-0.40.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993497" comment="iscsitarget-kmp-xen-1.4.20_3.0.101_0.250.TDC-0.40.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993498" comment="kernel-default-3.0.101-0.250.TDC.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993499" comment="kernel-default-base-3.0.101-0.250.TDC.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993501" comment="kernel-ec2-3.0.101-0.250.TDC.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993502" comment="kernel-ec2-base-3.0.101-0.250.TDC.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993504" comment="kernel-source-3.0.101-0.250.TDC.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993505" comment="kernel-syms-3.0.101-0.250.TDC.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993506" comment="kernel-trace-3.0.101-0.250.TDC.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993507" comment="kernel-trace-base-3.0.101-0.250.TDC.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993509" comment="kernel-xen-3.0.101-0.250.TDC.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993510" comment="kernel-xen-base-3.0.101-0.250.TDC.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218845" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179599" ref_url="https://bugzilla.suse.com/1179599" source="BUGZILLA"/>
		<reference ref_id="1193157" ref_url="https://bugzilla.suse.com/1193157" source="BUGZILLA"/>
		<reference ref_id="1194272" ref_url="https://bugzilla.suse.com/1194272" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0136" ref_url="https://www.suse.com/security/cve/CVE-2019-0136/" source="CVE"/>
		<reference ref_id="CVE-2020-27820" ref_url="https://www.suse.com/security/cve/CVE-2020-27820/" source="CVE"/>
		<reference ref_id="CVE-2021-4155" ref_url="https://www.suse.com/security/cve/CVE-2021-4155/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP3 kernel was updated.

The following security bugs were fixed:

- CVE-2021-4155: Fixed a data leak flaw that allows a local attacker to leak data on the XFS filesystem. (bsc#1194272)
- CVE-2020-27820: Fixed a vulnerability where a use-after-frees in nouveau's postclose() handler could happen if removing device. (bsc#1179599)
- CVE-2019-0136: Fixed an insufficient access control which allow an unauthenticated user to execute a denial of service. (bsc#1193157)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-11"/>
	<updated date="2022-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179599">SUSE bug 1179599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193157">SUSE bug 1193157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194272">SUSE bug 1194272</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0136/">CVE-2019-0136 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0136">CVE-2019-0136 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-27820/">CVE-2020-27820 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27820">CVE-2020-27820 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4155/">CVE-2021-4155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4155">CVE-2021-4155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993512" comment="kernel-default-3.0.101-0.253.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993513" comment="kernel-default-base-3.0.101-0.253.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993515" comment="kernel-ec2-3.0.101-0.253.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993516" comment="kernel-ec2-base-3.0.101-0.253.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993518" comment="kernel-source-3.0.101-0.253.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993519" comment="kernel-syms-3.0.101-0.253.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993520" comment="kernel-trace-3.0.101-0.253.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993521" comment="kernel-trace-base-3.0.101-0.253.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993523" comment="kernel-xen-3.0.101-0.253.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993524" comment="kernel-xen-base-3.0.101-0.253.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218846" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1166098" ref_url="https://bugzilla.suse.com/1166098" source="BUGZILLA"/>
		<reference ref_id="1171420" ref_url="https://bugzilla.suse.com/1171420" source="BUGZILLA"/>
		<reference ref_id="1190025" ref_url="https://bugzilla.suse.com/1190025" source="BUGZILLA"/>
		<reference ref_id="1191580" ref_url="https://bugzilla.suse.com/1191580" source="BUGZILLA"/>
		<reference ref_id="1193669" ref_url="https://bugzilla.suse.com/1193669" source="BUGZILLA"/>
		<reference ref_id="1193867" ref_url="https://bugzilla.suse.com/1193867" source="BUGZILLA"/>
		<reference ref_id="1195543" ref_url="https://bugzilla.suse.com/1195543" source="BUGZILLA"/>
		<reference ref_id="1196079" ref_url="https://bugzilla.suse.com/1196079" source="BUGZILLA"/>
		<reference ref_id="1197331" ref_url="https://bugzilla.suse.com/1197331" source="BUGZILLA"/>
		<reference ref_id="1197343" ref_url="https://bugzilla.suse.com/1197343" source="BUGZILLA"/>
		<reference ref_id="1197366" ref_url="https://bugzilla.suse.com/1197366" source="BUGZILLA"/>
		<reference ref_id="1198516" ref_url="https://bugzilla.suse.com/1198516" source="BUGZILLA"/>
		<reference ref_id="1199063" ref_url="https://bugzilla.suse.com/1199063" source="BUGZILLA"/>
		<reference ref_id="1199426" ref_url="https://bugzilla.suse.com/1199426" source="BUGZILLA"/>
		<reference ref_id="1199859" ref_url="https://bugzilla.suse.com/1199859" source="BUGZILLA"/>
		<reference ref_id="919357" ref_url="https://bugzilla.suse.com/919357" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12770" ref_url="https://www.suse.com/security/cve/CVE-2020-12770/" source="CVE"/>
		<reference ref_id="CVE-2021-3753" ref_url="https://www.suse.com/security/cve/CVE-2021-3753/" source="CVE"/>
		<reference ref_id="CVE-2021-45095" ref_url="https://www.suse.com/security/cve/CVE-2021-45095/" source="CVE"/>
		<reference ref_id="CVE-2021-45868" ref_url="https://www.suse.com/security/cve/CVE-2021-45868/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="CVE-2022-0617" ref_url="https://www.suse.com/security/cve/CVE-2022-0617/" source="CVE"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-1353" ref_url="https://www.suse.com/security/cve/CVE-2022-1353/" source="CVE"/>
		<reference ref_id="CVE-2022-1652" ref_url="https://www.suse.com/security/cve/CVE-2022-1652/" source="CVE"/>
		<reference ref_id="CVE-2022-21499" ref_url="https://www.suse.com/security/cve/CVE-2022-21499/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP3 TD kernel to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-21499: Lock down kgdb to prohibit secure-boot bypass (bsc#1199426).
- CVE-2022-1652: Fixed a statically allocated error counter inside the floppy kernel module (bsc#1199063).
- CVE-2022-1353: Fixed access controll to kernel memory in the pfkey_register function in net/key/af_key.c (bnc#1198516).
- CVE-2022-1011: Fixed a use-after-free flaw inside the FUSE filesystem in the way a user triggers write(). This flaw allowed a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation (bnc#1197343).
- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file (bnc#1197366).
- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock (bsc#1197331).
- CVE-2022-0001: Fixed non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors to disable information disclosure via local access (bnc#1191580).
- CVE-2022-0002: Fixed non-transparent sharing of branch predictor within a context in some Intel(R) Processors to disable information disclosure via local access (bnc#1191580).
- CVE-2020-12770: Fixed an issue in sg_write that lacked an sg_remove_request call in a certain failure cases (bnc#1171420).
- CVE-2022-0617: Fixed a null pointer dereference in the UDF file system functionality (bnc#1196079).
- CVE-2022-0492: Fixed a flaw in the cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function (bnc#1195543).
- CVE-2021-45095: Fixed a refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).
- CVE-2021-3753: Fixed a race problem in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c (bnc#1190025).

The following non-security bugs were fixed:

- kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
- netlink: Trim skb to alloc size to avoid MSG_TRUNC (bsc#1166098).
- highmem: fixed buffer corruption in include/linux/highmem.h:203 (bsc#1199859).
- direct-io: don't read inode-&gt;i_blkbits multiple times (bnc#919357).
- fs/buffer.c: make block-size be per-page and protected by the page lock (bnc#919357).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-13"/>
	<updated date="2022-06-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1166098">SUSE bug 1166098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171420">SUSE bug 1171420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190025">SUSE bug 1190025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191580">SUSE bug 1191580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193669">SUSE bug 1193669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193867">SUSE bug 1193867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195543">SUSE bug 1195543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196079">SUSE bug 1196079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197331">SUSE bug 1197331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197343">SUSE bug 1197343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197366">SUSE bug 1197366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198516">SUSE bug 1198516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199063">SUSE bug 1199063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199426">SUSE bug 1199426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199859">SUSE bug 1199859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919357">SUSE bug 919357</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12770/">CVE-2020-12770 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12770">CVE-2020-12770 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3753/">CVE-2021-3753 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3753">CVE-2021-3753 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45095/">CVE-2021-45095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45095">CVE-2021-45095 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45868/">CVE-2021-45868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45868">CVE-2021-45868 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0001">CVE-2022-0001 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0002">CVE-2022-0002 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0492">CVE-2022-0492 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0617/">CVE-2022-0617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0617">CVE-2022-0617 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011">CVE-2022-1011 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1048">CVE-2022-1048 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1353/">CVE-2022-1353 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1353">CVE-2022-1353 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1652/">CVE-2022-1652 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1652">CVE-2022-1652 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21499/">CVE-2022-21499 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21499">CVE-2022-21499 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993526" comment="kernel-default-3.0.101-0.258.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993527" comment="kernel-default-base-3.0.101-0.258.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993529" comment="kernel-ec2-3.0.101-0.258.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993530" comment="kernel-ec2-base-3.0.101-0.258.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993532" comment="kernel-source-3.0.101-0.258.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993533" comment="kernel-syms-3.0.101-0.258.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993534" comment="kernel-trace-3.0.101-0.258.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993535" comment="kernel-trace-base-3.0.101-0.258.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993537" comment="kernel-xen-3.0.101-0.258.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993538" comment="kernel-xen-base-3.0.101-0.258.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218847" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1055710" ref_url="https://bugzilla.suse.com/1055710" source="BUGZILLA"/>
		<reference ref_id="1084513" ref_url="https://bugzilla.suse.com/1084513" source="BUGZILLA"/>
		<reference ref_id="1109746" ref_url="https://bugzilla.suse.com/1109746" source="BUGZILLA"/>
		<reference ref_id="1133374" ref_url="https://bugzilla.suse.com/1133374" source="BUGZILLA"/>
		<reference ref_id="1173514" ref_url="https://bugzilla.suse.com/1173514" source="BUGZILLA"/>
		<reference ref_id="1177882" ref_url="https://bugzilla.suse.com/1177882" source="BUGZILLA"/>
		<reference ref_id="1179508" ref_url="https://bugzilla.suse.com/1179508" source="BUGZILLA"/>
		<reference ref_id="1191961" ref_url="https://bugzilla.suse.com/1191961" source="BUGZILLA"/>
		<reference ref_id="1196901" ref_url="https://bugzilla.suse.com/1196901" source="BUGZILLA"/>
		<reference ref_id="1196973" ref_url="https://bugzilla.suse.com/1196973" source="BUGZILLA"/>
		<reference ref_id="1197391" ref_url="https://bugzilla.suse.com/1197391" source="BUGZILLA"/>
		<reference ref_id="1198829" ref_url="https://bugzilla.suse.com/1198829" source="BUGZILLA"/>
		<reference ref_id="1199487" ref_url="https://bugzilla.suse.com/1199487" source="BUGZILLA"/>
		<reference ref_id="1199657" ref_url="https://bugzilla.suse.com/1199657" source="BUGZILLA"/>
		<reference ref_id="1200384" ref_url="https://bugzilla.suse.com/1200384" source="BUGZILLA"/>
		<reference ref_id="1200598" ref_url="https://bugzilla.suse.com/1200598" source="BUGZILLA"/>
		<reference ref_id="1200619" ref_url="https://bugzilla.suse.com/1200619" source="BUGZILLA"/>
		<reference ref_id="1200910" ref_url="https://bugzilla.suse.com/1200910" source="BUGZILLA"/>
		<reference ref_id="1201050" ref_url="https://bugzilla.suse.com/1201050" source="BUGZILLA"/>
		<reference ref_id="1201251" ref_url="https://bugzilla.suse.com/1201251" source="BUGZILLA"/>
		<reference ref_id="1201429" ref_url="https://bugzilla.suse.com/1201429" source="BUGZILLA"/>
		<reference ref_id="1201469" ref_url="https://bugzilla.suse.com/1201469" source="BUGZILLA"/>
		<reference ref_id="1201635" ref_url="https://bugzilla.suse.com/1201635" source="BUGZILLA"/>
		<reference ref_id="1201636" ref_url="https://bugzilla.suse.com/1201636" source="BUGZILLA"/>
		<reference ref_id="1202346" ref_url="https://bugzilla.suse.com/1202346" source="BUGZILLA"/>
		<reference ref_id="1202347" ref_url="https://bugzilla.suse.com/1202347" source="BUGZILLA"/>
		<reference ref_id="1202897" ref_url="https://bugzilla.suse.com/1202897" source="BUGZILLA"/>
		<reference ref_id="1202898" ref_url="https://bugzilla.suse.com/1202898" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13695" ref_url="https://www.suse.com/security/cve/CVE-2017-13695/" source="CVE"/>
		<reference ref_id="CVE-2018-7755" ref_url="https://www.suse.com/security/cve/CVE-2018-7755/" source="CVE"/>
		<reference ref_id="CVE-2019-3900" ref_url="https://www.suse.com/security/cve/CVE-2019-3900/" source="CVE"/>
		<reference ref_id="CVE-2020-15393" ref_url="https://www.suse.com/security/cve/CVE-2020-15393/" source="CVE"/>
		<reference ref_id="CVE-2020-29568" ref_url="https://www.suse.com/security/cve/CVE-2020-29568/" source="CVE"/>
		<reference ref_id="CVE-2020-36557" ref_url="https://www.suse.com/security/cve/CVE-2020-36557/" source="CVE"/>
		<reference ref_id="CVE-2020-36558" ref_url="https://www.suse.com/security/cve/CVE-2020-36558/" source="CVE"/>
		<reference ref_id="CVE-2021-26341" ref_url="https://www.suse.com/security/cve/CVE-2021-26341/" source="CVE"/>
		<reference ref_id="CVE-2021-33655" ref_url="https://www.suse.com/security/cve/CVE-2021-33655/" source="CVE"/>
		<reference ref_id="CVE-2021-33656" ref_url="https://www.suse.com/security/cve/CVE-2021-33656/" source="CVE"/>
		<reference ref_id="CVE-2021-34981" ref_url="https://www.suse.com/security/cve/CVE-2021-34981/" source="CVE"/>
		<reference ref_id="CVE-2021-39713" ref_url="https://www.suse.com/security/cve/CVE-2021-39713/" source="CVE"/>
		<reference ref_id="CVE-2022-1462" ref_url="https://www.suse.com/security/cve/CVE-2022-1462/" source="CVE"/>
		<reference ref_id="CVE-2022-1679" ref_url="https://www.suse.com/security/cve/CVE-2022-1679/" source="CVE"/>
		<reference ref_id="CVE-2022-20132" ref_url="https://www.suse.com/security/cve/CVE-2022-20132/" source="CVE"/>
		<reference ref_id="CVE-2022-20166" ref_url="https://www.suse.com/security/cve/CVE-2022-20166/" source="CVE"/>
		<reference ref_id="CVE-2022-20368" ref_url="https://www.suse.com/security/cve/CVE-2022-20368/" source="CVE"/>
		<reference ref_id="CVE-2022-20369" ref_url="https://www.suse.com/security/cve/CVE-2022-20369/" source="CVE"/>
		<reference ref_id="CVE-2022-21385" ref_url="https://www.suse.com/security/cve/CVE-2022-21385/" source="CVE"/>
		<reference ref_id="CVE-2022-2318" ref_url="https://www.suse.com/security/cve/CVE-2022-2318/" source="CVE"/>
		<reference ref_id="CVE-2022-28356" ref_url="https://www.suse.com/security/cve/CVE-2022-28356/" source="CVE"/>
		<reference ref_id="CVE-2022-29900" ref_url="https://www.suse.com/security/cve/CVE-2022-29900/" source="CVE"/>
		<reference ref_id="CVE-2022-29901" ref_url="https://www.suse.com/security/cve/CVE-2022-29901/" source="CVE"/>
		<reference ref_id="CVE-2022-3028" ref_url="https://www.suse.com/security/cve/CVE-2022-3028/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP3 TERADATA kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-3028: Fixed a race condition that was found in the IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously (bnc#1202898).
- CVE-2022-29901: Fixed retpoline mitigation bypass that leaked arbitrary data on Intel microprocessor generations 6 to 8 (bnc#1201469).
- CVE-2022-29900: Fixed mis-trained branch predictions for return instructions that may have allowed arbitrary speculative code execution under certain microarchitecture-dependent conditions (bnc#1199657, bnc#1201469).
- CVE-2022-28356: Fixed a refcount leak bug that was found in net/llc/af_llc.c (bnc#1197391).
- CVE-2022-2318: Fixed use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c (bnc#1201251).
- CVE-2022-21385: Fixed a flaw in net_rds_alloc_sgs() that allowed unprivileged local users to crash the machine (bnc#1202897).
- CVE-2022-20369: Fixed possible out of bounds write due to improper input validation in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).
- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).
- CVE-2022-20166: Fixed possible out of bounds write due to a heap buffer overflow in various methods of kernel base drivers (bnc#1200598).
- CVE-2022-20132: Fixed possible out of bounds read in lg_probe and related functions of hid-lg.c (bnc#1200619).
- CVE-2022-1679: Fixed a use-after-free flaw that was found inside the Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bnc#1199487).
- CVE-2022-1462: Fixed an out-of-bounds read flaw that was found in the TeleTYpe subsystem (bnc#1198829).
- CVE-2021-39713: Fixed use Qdisc rcu API instead of relying on rtnl lock (bsc#1196973).
- CVE-2021-34981: Fixed file refcount when cmtp_attach_device fails (bsc#1191961).
- CVE-2021-33656: Fixed out of bounds write when setting font with malicous data by ioctl cmd PIO_FONT (bnc#1201636).
- CVE-2021-33655: Fixed out of bounds write when sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO (bnc#1201635).
- CVE-2021-26341: Fixed potential data leakage on some AMD CPUs may transiently execute beyond unconditional direct branches (bnc#1196901, bnc#1201050).
- CVE-2020-36558: Fixed a race condition involving VT_RESIZEX could lead to a NULL pointer dereference and general protection fault (bnc#1200910).
- CVE-2020-36557: Fixed a race condition between the VT_DISALLOCATE ioctl and closing/opening of ttys that could have led to a use-after-free (bnc#1201429).
- CVE-2020-29568: Fixed an issue that was discovered in Xen through 4.14.x when processing watch events using a single thread (bnc#1179508).
- CVE-2020-15393: Fixed a memory leak in usbtest_disconnect in drivers/usb/misc/usbtest.c (bnc#1173514).
- CVE-2019-3900: Fixed an infinite loop issue that was found in the vhost_net kernel module (bnc#1133374).
- CVE-2018-7755: Fixed an issue that was discovered in the fd_locked_ioctl function in drivers/block/floppy.c (bnc#1084513).
- CVE-2017-13695: Fixed a KASLR protection mechanism bypass inside the acpi_ns_evaluate() function in drivers/acpi/acpica/nseval.c (bnc#1055710).

The following non-security bugs were fixed:

- fs/binfmt_misc.c: do not allow offset overflow (Git-fixes bsc#1109746, bsc#1200384).
- vmxnet3: fix building without CONFIG_PCI_MSI (bsc#1177882).
- vmxnet3: fix netpoll race condition (bsc#1177882).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-20"/>
	<updated date="2022-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1055710">SUSE bug 1055710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084513">SUSE bug 1084513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109746">SUSE bug 1109746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133374">SUSE bug 1133374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173514">SUSE bug 1173514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177882">SUSE bug 1177882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179508">SUSE bug 1179508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191961">SUSE bug 1191961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196901">SUSE bug 1196901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196973">SUSE bug 1196973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197391">SUSE bug 1197391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198829">SUSE bug 1198829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199487">SUSE bug 1199487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199657">SUSE bug 1199657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200384">SUSE bug 1200384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200598">SUSE bug 1200598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200619">SUSE bug 1200619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200910">SUSE bug 1200910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201050">SUSE bug 1201050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201251">SUSE bug 1201251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201429">SUSE bug 1201429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201469">SUSE bug 1201469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201635">SUSE bug 1201635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201636">SUSE bug 1201636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202346">SUSE bug 1202346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202347">SUSE bug 1202347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202897">SUSE bug 1202897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202898">SUSE bug 1202898</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-13695/">CVE-2017-13695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13695">CVE-2017-13695 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7755/">CVE-2018-7755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7755">CVE-2018-7755 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3900/">CVE-2019-3900 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3900">CVE-2019-3900 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15393/">CVE-2020-15393 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15393">CVE-2020-15393 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29568/">CVE-2020-29568 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29568">CVE-2020-29568 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36557/">CVE-2020-36557 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36557">CVE-2020-36557 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36558/">CVE-2020-36558 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36558">CVE-2020-36558 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26341/">CVE-2021-26341 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26341">CVE-2021-26341 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33655/">CVE-2021-33655 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33655">CVE-2021-33655 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33656/">CVE-2021-33656 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33656">CVE-2021-33656 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34981/">CVE-2021-34981 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34981">CVE-2021-34981 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39713/">CVE-2021-39713 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39713">CVE-2021-39713 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1462/">CVE-2022-1462 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1462">CVE-2022-1462 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1679/">CVE-2022-1679 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1679">CVE-2022-1679 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-20132/">CVE-2022-20132 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20132">CVE-2022-20132 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-20166/">CVE-2022-20166 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20166">CVE-2022-20166 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20368/">CVE-2022-20368 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20368">CVE-2022-20368 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20369/">CVE-2022-20369 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20369">CVE-2022-20369 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21385/">CVE-2022-21385 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21385">CVE-2022-21385 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2318/">CVE-2022-2318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2318">CVE-2022-2318 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28356/">CVE-2022-28356 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28356">CVE-2022-28356 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29900/">CVE-2022-29900 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29900">CVE-2022-29900 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29901/">CVE-2022-29901 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29901">CVE-2022-29901 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3028/">CVE-2022-3028 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3028">CVE-2022-3028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993540" comment="kernel-default-3.0.101-0.261.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993541" comment="kernel-default-base-3.0.101-0.261.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993543" comment="kernel-ec2-3.0.101-0.261.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993544" comment="kernel-ec2-base-3.0.101-0.261.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993546" comment="kernel-source-3.0.101-0.261.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993547" comment="kernel-syms-3.0.101-0.261.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993548" comment="kernel-trace-3.0.101-0.261.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993549" comment="kernel-trace-base-3.0.101-0.261.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993551" comment="kernel-xen-3.0.101-0.261.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993552" comment="kernel-xen-base-3.0.101-0.261.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218848" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1131430" ref_url="https://bugzilla.suse.com/1131430" source="BUGZILLA"/>
		<reference ref_id="1177471" ref_url="https://bugzilla.suse.com/1177471" source="BUGZILLA"/>
		<reference ref_id="1177742" ref_url="https://bugzilla.suse.com/1177742" source="BUGZILLA"/>
		<reference ref_id="1199650" ref_url="https://bugzilla.suse.com/1199650" source="BUGZILLA"/>
		<reference ref_id="1200549" ref_url="https://bugzilla.suse.com/1200549" source="BUGZILLA"/>
		<reference ref_id="1200692" ref_url="https://bugzilla.suse.com/1200692" source="BUGZILLA"/>
		<reference ref_id="1201441" ref_url="https://bugzilla.suse.com/1201441" source="BUGZILLA"/>
		<reference ref_id="1201940" ref_url="https://bugzilla.suse.com/1201940" source="BUGZILLA"/>
		<reference ref_id="1201941" ref_url="https://bugzilla.suse.com/1201941" source="BUGZILLA"/>
		<reference ref_id="1201948" ref_url="https://bugzilla.suse.com/1201948" source="BUGZILLA"/>
		<reference ref_id="1202097" ref_url="https://bugzilla.suse.com/1202097" source="BUGZILLA"/>
		<reference ref_id="1202312" ref_url="https://bugzilla.suse.com/1202312" source="BUGZILLA"/>
		<reference ref_id="1202393" ref_url="https://bugzilla.suse.com/1202393" source="BUGZILLA"/>
		<reference ref_id="1202874" ref_url="https://bugzilla.suse.com/1202874" source="BUGZILLA"/>
		<reference ref_id="1202960" ref_url="https://bugzilla.suse.com/1202960" source="BUGZILLA"/>
		<reference ref_id="1203107" ref_url="https://bugzilla.suse.com/1203107" source="BUGZILLA"/>
		<reference ref_id="1203116" ref_url="https://bugzilla.suse.com/1203116" source="BUGZILLA"/>
		<reference ref_id="1203208" ref_url="https://bugzilla.suse.com/1203208" source="BUGZILLA"/>
		<reference ref_id="1203514" ref_url="https://bugzilla.suse.com/1203514" source="BUGZILLA"/>
		<reference ref_id="1203606" ref_url="https://bugzilla.suse.com/1203606" source="BUGZILLA"/>
		<reference ref_id="1203769" ref_url="https://bugzilla.suse.com/1203769" source="BUGZILLA"/>
		<reference ref_id="1203960" ref_url="https://bugzilla.suse.com/1203960" source="BUGZILLA"/>
		<reference ref_id="1203987" ref_url="https://bugzilla.suse.com/1203987" source="BUGZILLA"/>
		<reference ref_id="1204132" ref_url="https://bugzilla.suse.com/1204132" source="BUGZILLA"/>
		<reference ref_id="1204166" ref_url="https://bugzilla.suse.com/1204166" source="BUGZILLA"/>
		<reference ref_id="1204354" ref_url="https://bugzilla.suse.com/1204354" source="BUGZILLA"/>
		<reference ref_id="1204431" ref_url="https://bugzilla.suse.com/1204431" source="BUGZILLA"/>
		<reference ref_id="1204432" ref_url="https://bugzilla.suse.com/1204432" source="BUGZILLA"/>
		<reference ref_id="1204439" ref_url="https://bugzilla.suse.com/1204439" source="BUGZILLA"/>
		<reference ref_id="1204574" ref_url="https://bugzilla.suse.com/1204574" source="BUGZILLA"/>
		<reference ref_id="1204576" ref_url="https://bugzilla.suse.com/1204576" source="BUGZILLA"/>
		<reference ref_id="1204631" ref_url="https://bugzilla.suse.com/1204631" source="BUGZILLA"/>
		<reference ref_id="1204636" ref_url="https://bugzilla.suse.com/1204636" source="BUGZILLA"/>
		<reference ref_id="1204646" ref_url="https://bugzilla.suse.com/1204646" source="BUGZILLA"/>
		<reference ref_id="1204647" ref_url="https://bugzilla.suse.com/1204647" source="BUGZILLA"/>
		<reference ref_id="1204653" ref_url="https://bugzilla.suse.com/1204653" source="BUGZILLA"/>
		<reference ref_id="1204894" ref_url="https://bugzilla.suse.com/1204894" source="BUGZILLA"/>
		<reference ref_id="1204922" ref_url="https://bugzilla.suse.com/1204922" source="BUGZILLA"/>
		<reference ref_id="1205220" ref_url="https://bugzilla.suse.com/1205220" source="BUGZILLA"/>
		<reference ref_id="1205313" ref_url="https://bugzilla.suse.com/1205313" source="BUGZILLA"/>
		<reference ref_id="1205514" ref_url="https://bugzilla.suse.com/1205514" source="BUGZILLA"/>
		<reference ref_id="1205671" ref_url="https://bugzilla.suse.com/1205671" source="BUGZILLA"/>
		<reference ref_id="1205796" ref_url="https://bugzilla.suse.com/1205796" source="BUGZILLA"/>
		<reference ref_id="967914" ref_url="https://bugzilla.suse.com/967914" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3837" ref_url="https://www.suse.com/security/cve/CVE-2019-3837/" source="CVE"/>
		<reference ref_id="CVE-2020-16119" ref_url="https://www.suse.com/security/cve/CVE-2020-16119/" source="CVE"/>
		<reference ref_id="CVE-2022-21123" ref_url="https://www.suse.com/security/cve/CVE-2022-21123/" source="CVE"/>
		<reference ref_id="CVE-2022-21125" ref_url="https://www.suse.com/security/cve/CVE-2022-21125/" source="CVE"/>
		<reference ref_id="CVE-2022-21127" ref_url="https://www.suse.com/security/cve/CVE-2022-21127/" source="CVE"/>
		<reference ref_id="CVE-2022-21166" ref_url="https://www.suse.com/security/cve/CVE-2022-21166/" source="CVE"/>
		<reference ref_id="CVE-2022-21180" ref_url="https://www.suse.com/security/cve/CVE-2022-21180/" source="CVE"/>
		<reference ref_id="CVE-2022-2663" ref_url="https://www.suse.com/security/cve/CVE-2022-2663/" source="CVE"/>
		<reference ref_id="CVE-2022-3303" ref_url="https://www.suse.com/security/cve/CVE-2022-3303/" source="CVE"/>
		<reference ref_id="CVE-2022-33981" ref_url="https://www.suse.com/security/cve/CVE-2022-33981/" source="CVE"/>
		<reference ref_id="CVE-2022-3424" ref_url="https://www.suse.com/security/cve/CVE-2022-3424/" source="CVE"/>
		<reference ref_id="CVE-2022-3524" ref_url="https://www.suse.com/security/cve/CVE-2022-3524/" source="CVE"/>
		<reference ref_id="CVE-2022-3565" ref_url="https://www.suse.com/security/cve/CVE-2022-3565/" source="CVE"/>
		<reference ref_id="CVE-2022-3586" ref_url="https://www.suse.com/security/cve/CVE-2022-3586/" source="CVE"/>
		<reference ref_id="CVE-2022-3621" ref_url="https://www.suse.com/security/cve/CVE-2022-3621/" source="CVE"/>
		<reference ref_id="CVE-2022-3635" ref_url="https://www.suse.com/security/cve/CVE-2022-3635/" source="CVE"/>
		<reference ref_id="CVE-2022-3646" ref_url="https://www.suse.com/security/cve/CVE-2022-3646/" source="CVE"/>
		<reference ref_id="CVE-2022-3649" ref_url="https://www.suse.com/security/cve/CVE-2022-3649/" source="CVE"/>
		<reference ref_id="CVE-2022-36879" ref_url="https://www.suse.com/security/cve/CVE-2022-36879/" source="CVE"/>
		<reference ref_id="CVE-2022-36946" ref_url="https://www.suse.com/security/cve/CVE-2022-36946/" source="CVE"/>
		<reference ref_id="CVE-2022-3903" ref_url="https://www.suse.com/security/cve/CVE-2022-3903/" source="CVE"/>
		<reference ref_id="CVE-2022-39188" ref_url="https://www.suse.com/security/cve/CVE-2022-39188/" source="CVE"/>
		<reference ref_id="CVE-2022-40768" ref_url="https://www.suse.com/security/cve/CVE-2022-40768/" source="CVE"/>
		<reference ref_id="CVE-2022-4095" ref_url="https://www.suse.com/security/cve/CVE-2022-4095/" source="CVE"/>
		<reference ref_id="CVE-2022-41218" ref_url="https://www.suse.com/security/cve/CVE-2022-41218/" source="CVE"/>
		<reference ref_id="CVE-2022-41848" ref_url="https://www.suse.com/security/cve/CVE-2022-41848/" source="CVE"/>
		<reference ref_id="CVE-2022-41850" ref_url="https://www.suse.com/security/cve/CVE-2022-41850/" source="CVE"/>
		<reference ref_id="CVE-2022-41858" ref_url="https://www.suse.com/security/cve/CVE-2022-41858/" source="CVE"/>
		<reference ref_id="CVE-2022-43750" ref_url="https://www.suse.com/security/cve/CVE-2022-43750/" source="CVE"/>
		<reference ref_id="CVE-2022-44032" ref_url="https://www.suse.com/security/cve/CVE-2022-44032/" source="CVE"/>
		<reference ref_id="CVE-2022-44033" ref_url="https://www.suse.com/security/cve/CVE-2022-44033/" source="CVE"/>
		<reference ref_id="CVE-2022-45934" ref_url="https://www.suse.com/security/cve/CVE-2022-45934/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 11 SP3 TD kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-3635: Fixed a use-after-free in the tst_timer() of the file drivers/atm/idt77252.c (bsc#1204631).
- CVE-2022-3424: Fixed use-after-free in gru_set_context_option(), gru_fault() and gru_handle_user_call_os() that could lead to kernel panic (bsc#1204166).
- CVE-2022-41850: Fixed a race condition in roccat_report_event() in drivers/hid/hid-roccat.c (bsc#1203960).
- CVE-2022-45934: Fixed a integer wraparound via L2CAP_CONF_REQ packets in l2cap_config_req in net/bluetooth/l2cap_core.c (bsc#1205796).
- CVE-2022-41858: Fixed a denial of service in sl_tx_timeout() in drivers/net/slip (bsc#1205671).
- CVE-2022-4095: Fixed a use-after-free in rtl8712 driver (bsc#1205514).
- CVE-2022-3903: Fixed a denial of service with the Infrared Transceiver USB driver (bsc#1205220).
- CVE-2022-43750: Fixed vulnerability in usbmon that allowed a user-space client to corrupt the monitor's internal memory (bsc#1204653).
- CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer() in fs/nilfs2/segment.c (bsc#1204646).
- CVE-2022-3649: Fixed use-after-free in nilfs_new_inode() in fs/nilfs2/inode.c (bsc#1204647).
- CVE-2022-3621: Fixed null pointer dereference in nilfs_bmap_lookup_at_level() in fs/nilfs2/inode.c (bsc#1204574).
- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).
- CVE-2022-3565: Fixed use-after-free in del_timer() in drivers/isdn/mISDN/l1oip_core.c (bsc#1204431).
- CVE-2022-3524: Fixed memory leak in ipv6_renew_options() in the IPv6 handler (bsc#1204354).
- CVE-2022-40768: Fixed information leak in the scsi driver which allowed local users to obtain sensitive information from kernel memory (bsc#1203514).
- CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692).
- CVE-2022-36946: Fixed a denial of service (panic) inside nfqnl_mangle in net/netfilter/nfnetlink_queue.c (bsc#1201940).
- CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks (bsc#1199650).
- CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks (bsc#1199650).
- CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks (bsc#1199650).
- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bsc#1201948).
- CVE-2022-41848: Fixed a race condition in drivers/char/pcmcia/synclink_cs.c mgslpc_ioctl and mgslpc_detach (bsc#1203987).
- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bsc#1203769).
- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bsc#1202960).
- CVE-2022-39188: Fixed a race condition where a device driver can free a page while it still has stale TLB entries (bsc#1203107).
- CVE-2022-2663: Fixed an issue which allowed a firewall to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured (bsc#1202097).
- CVE-2022-44033: Fixes a use-after-free with PCMCIA device related to a race condition between cm4040_open() and reader_detach() (bsc#1204922).
- CVE-2022-44032: Fixed a use-after-free with PCMCIA device related to a race condition between cmm_open() and cm4000_detach() (bsc#1204894).
- CVE-2020-16119: Fixed a use-after-free vulnerability exploitable by a local attacker due to reuse of a DCCP socket (bsc#1177471).
- CVE-2019-3837: Fixed a denial-of-service in the net_dma code in tcp_recvmsg() (bsc#1131430).

The following non-security bugs were fixed:

- ipc,sem: fix use after free on IPC_RMID after a task using same semaphore set exits (bsc#967914 bsc#1201441).
- ipc/sem.c: add cond_resched in exit_sme (bsc#1201441).
- net_sched: cls_route: disallow handle of 0 (bsc#1202393).
- x86/bugs: Reenable retbleed=off While for older kernels the return thunks are statically built in and cannot be dynamically patched out, retbleed=off should still be possible to do so that the mitigation can still be disabled on Intel who do not use the return thunks but IBRS.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-23"/>
	<updated date="2022-12-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131430">SUSE bug 1131430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177471">SUSE bug 1177471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177742">SUSE bug 1177742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199650">SUSE bug 1199650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200549">SUSE bug 1200549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200692">SUSE bug 1200692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201441">SUSE bug 1201441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201940">SUSE bug 1201940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201941">SUSE bug 1201941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201948">SUSE bug 1201948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202097">SUSE bug 1202097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202312">SUSE bug 1202312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202393">SUSE bug 1202393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202874">SUSE bug 1202874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202960">SUSE bug 1202960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203107">SUSE bug 1203107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203116">SUSE bug 1203116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203208">SUSE bug 1203208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203514">SUSE bug 1203514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203606">SUSE bug 1203606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203769">SUSE bug 1203769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203960">SUSE bug 1203960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203987">SUSE bug 1203987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204132">SUSE bug 1204132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204166">SUSE bug 1204166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204354">SUSE bug 1204354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204431">SUSE bug 1204431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204432">SUSE bug 1204432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204439">SUSE bug 1204439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204574">SUSE bug 1204574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204576">SUSE bug 1204576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204631">SUSE bug 1204631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204636">SUSE bug 1204636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204646">SUSE bug 1204646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204647">SUSE bug 1204647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204653">SUSE bug 1204653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204894">SUSE bug 1204894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204922">SUSE bug 1204922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205220">SUSE bug 1205220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205313">SUSE bug 1205313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205514">SUSE bug 1205514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205671">SUSE bug 1205671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205796">SUSE bug 1205796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967914">SUSE bug 967914</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-3837/">CVE-2019-3837 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3837">CVE-2019-3837 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16119/">CVE-2020-16119 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16119">CVE-2020-16119 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21123/">CVE-2022-21123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21123">CVE-2022-21123 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21125/">CVE-2022-21125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21125">CVE-2022-21125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21127/">CVE-2022-21127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21127">CVE-2022-21127 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21166/">CVE-2022-21166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21166">CVE-2022-21166 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21180/">CVE-2022-21180 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21180">CVE-2022-21180 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2663/">CVE-2022-2663 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2663">CVE-2022-2663 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3303/">CVE-2022-3303 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3303">CVE-2022-3303 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-33981/">CVE-2022-33981 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33981">CVE-2022-33981 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3424/">CVE-2022-3424 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3424">CVE-2022-3424 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3524/">CVE-2022-3524 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3524">CVE-2022-3524 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3565/">CVE-2022-3565 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3565">CVE-2022-3565 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3586/">CVE-2022-3586 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3586">CVE-2022-3586 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3621/">CVE-2022-3621 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3621">CVE-2022-3621 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3635/">CVE-2022-3635 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3635">CVE-2022-3635 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3646/">CVE-2022-3646 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3646">CVE-2022-3646 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3649/">CVE-2022-3649 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3649">CVE-2022-3649 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36879/">CVE-2022-36879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36879">CVE-2022-36879 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36946/">CVE-2022-36946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36946">CVE-2022-36946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3903/">CVE-2022-3903 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3903">CVE-2022-3903 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-39188/">CVE-2022-39188 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39188">CVE-2022-39188 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40768/">CVE-2022-40768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40768">CVE-2022-40768 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4095/">CVE-2022-4095 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4095">CVE-2022-4095 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41218/">CVE-2022-41218 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41218">CVE-2022-41218 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41848/">CVE-2022-41848 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41848">CVE-2022-41848 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-41850/">CVE-2022-41850 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41850">CVE-2022-41850 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41858/">CVE-2022-41858 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41858">CVE-2022-41858 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43750/">CVE-2022-43750 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43750">CVE-2022-43750 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44032/">CVE-2022-44032 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44032">CVE-2022-44032 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44033/">CVE-2022-44033 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44033">CVE-2022-44033 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-45934/">CVE-2022-45934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45934">CVE-2022-45934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993554" comment="kernel-default-3.0.101-0.266.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993555" comment="kernel-default-base-3.0.101-0.266.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993557" comment="kernel-ec2-3.0.101-0.266.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993558" comment="kernel-ec2-base-3.0.101-0.266.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993560" comment="kernel-source-3.0.101-0.266.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993561" comment="kernel-syms-3.0.101-0.266.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993562" comment="kernel-trace-3.0.101-0.266.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993563" comment="kernel-trace-base-3.0.101-0.266.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993565" comment="kernel-xen-3.0.101-0.266.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993566" comment="kernel-xen-base-3.0.101-0.266.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218849" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1108488" ref_url="https://bugzilla.suse.com/1108488" source="BUGZILLA"/>
		<reference ref_id="1204405" ref_url="https://bugzilla.suse.com/1204405" source="BUGZILLA"/>
		<reference ref_id="1204414" ref_url="https://bugzilla.suse.com/1204414" source="BUGZILLA"/>
		<reference ref_id="1206677" ref_url="https://bugzilla.suse.com/1206677" source="BUGZILLA"/>
		<reference ref_id="1207036" ref_url="https://bugzilla.suse.com/1207036" source="BUGZILLA"/>
		<reference ref_id="1207051" ref_url="https://bugzilla.suse.com/1207051" source="BUGZILLA"/>
		<reference ref_id="1207125" ref_url="https://bugzilla.suse.com/1207125" source="BUGZILLA"/>
		<reference ref_id="1207795" ref_url="https://bugzilla.suse.com/1207795" source="BUGZILLA"/>
		<reference ref_id="1208837" ref_url="https://bugzilla.suse.com/1208837" source="BUGZILLA"/>
		<reference ref_id="1209008" ref_url="https://bugzilla.suse.com/1209008" source="BUGZILLA"/>
		<reference ref_id="1209291" ref_url="https://bugzilla.suse.com/1209291" source="BUGZILLA"/>
		<reference ref_id="1209532" ref_url="https://bugzilla.suse.com/1209532" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-9517" ref_url="https://www.suse.com/security/cve/CVE-2018-9517/" source="CVE"/>
		<reference ref_id="CVE-2022-3566" ref_url="https://www.suse.com/security/cve/CVE-2022-3566/" source="CVE"/>
		<reference ref_id="CVE-2022-3567" ref_url="https://www.suse.com/security/cve/CVE-2022-3567/" source="CVE"/>
		<reference ref_id="CVE-2023-0590" ref_url="https://www.suse.com/security/cve/CVE-2023-0590/" source="CVE"/>
		<reference ref_id="CVE-2023-1118" ref_url="https://www.suse.com/security/cve/CVE-2023-1118/" source="CVE"/>
		<reference ref_id="CVE-2023-1513" ref_url="https://www.suse.com/security/cve/CVE-2023-1513/" source="CVE"/>
		<reference ref_id="CVE-2023-23454" ref_url="https://www.suse.com/security/cve/CVE-2023-23454/" source="CVE"/>
		<reference ref_id="CVE-2023-23455" ref_url="https://www.suse.com/security/cve/CVE-2023-23455/" source="CVE"/>
		<reference ref_id="CVE-2023-23559" ref_url="https://www.suse.com/security/cve/CVE-2023-23559/" source="CVE"/>
		<reference ref_id="CVE-2023-28328" ref_url="https://www.suse.com/security/cve/CVE-2023-28328/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 SP3 TD kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).
- CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291).
- CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795).
- CVE-2018-9517: Fixed possible memory corruption due to a use after free in pppol2tp_connect (bsc#1108488).
- CVE-2023-1118: Fixed a use-after-free bugs caused by ene_tx_irqsim() in media/rc (bsc#1208837).
- CVE-2023-23559: Fixed integer overflow in rndis_wlan that leads to a buffer overflow (bsc#1207051).
- CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#1207036).
- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207125).
- CVE-2022-3566: Fixed race condition in the TCP Handler (bsc#1204405).
- CVE-2022-3567: Fixed a to race condition in inet6_stream_ops()/inet6_dgram_ops() (bsc#1204414).

The following non-security bugs were fixed:

- sctp: fail if no bound addresses can be used for a given scope (bsc#1206677).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-31"/>
	<updated date="2023-03-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1108488">SUSE bug 1108488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204405">SUSE bug 1204405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204414">SUSE bug 1204414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206677">SUSE bug 1206677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207036">SUSE bug 1207036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207051">SUSE bug 1207051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207125">SUSE bug 1207125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207795">SUSE bug 1207795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208837">SUSE bug 1208837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209008">SUSE bug 1209008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209291">SUSE bug 1209291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209532">SUSE bug 1209532</bugzilla>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-9517/">CVE-2018-9517 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9517">CVE-2018-9517 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3566/">CVE-2022-3566 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3566">CVE-2022-3566 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3567/">CVE-2022-3567 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3567">CVE-2022-3567 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0590/">CVE-2023-0590 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0590">CVE-2023-0590 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1118/">CVE-2023-1118 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1118">CVE-2023-1118 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1513/">CVE-2023-1513 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1513">CVE-2023-1513 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23454/">CVE-2023-23454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23454">CVE-2023-23454 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23455/">CVE-2023-23455 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23455">CVE-2023-23455 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-23559/">CVE-2023-23559 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23559">CVE-2023-23559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28328/">CVE-2023-28328 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28328">CVE-2023-28328 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993568" comment="kernel-default-3.0.101-0.269.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993569" comment="kernel-default-base-3.0.101-0.269.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993571" comment="kernel-ec2-3.0.101-0.269.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993572" comment="kernel-ec2-base-3.0.101-0.269.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993574" comment="kernel-source-3.0.101-0.269.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993575" comment="kernel-syms-3.0.101-0.269.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993576" comment="kernel-trace-3.0.101-0.269.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993577" comment="kernel-trace-base-3.0.101-0.269.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993579" comment="kernel-xen-3.0.101-0.269.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993580" comment="kernel-xen-base-3.0.101-0.269.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218850" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1010470" ref_url="https://bugzilla.suse.com/1010470" source="BUGZILLA"/>
		<reference ref_id="1039348" ref_url="https://bugzilla.suse.com/1039348" source="BUGZILLA"/>
		<reference ref_id="1052943" ref_url="https://bugzilla.suse.com/1052943" source="BUGZILLA"/>
		<reference ref_id="1062568" ref_url="https://bugzilla.suse.com/1062568" source="BUGZILLA"/>
		<reference ref_id="1062840" ref_url="https://bugzilla.suse.com/1062840" source="BUGZILLA"/>
		<reference ref_id="1063416" ref_url="https://bugzilla.suse.com/1063416" source="BUGZILLA"/>
		<reference ref_id="1067118" ref_url="https://bugzilla.suse.com/1067118" source="BUGZILLA"/>
		<reference ref_id="1072689" ref_url="https://bugzilla.suse.com/1072689" source="BUGZILLA"/>
		<reference ref_id="1072865" ref_url="https://bugzilla.suse.com/1072865" source="BUGZILLA"/>
		<reference ref_id="1078669" ref_url="https://bugzilla.suse.com/1078669" source="BUGZILLA"/>
		<reference ref_id="1078672" ref_url="https://bugzilla.suse.com/1078672" source="BUGZILLA"/>
		<reference ref_id="1078673" ref_url="https://bugzilla.suse.com/1078673" source="BUGZILLA"/>
		<reference ref_id="1078674" ref_url="https://bugzilla.suse.com/1078674" source="BUGZILLA"/>
		<reference ref_id="1080464" ref_url="https://bugzilla.suse.com/1080464" source="BUGZILLA"/>
		<reference ref_id="1080757" ref_url="https://bugzilla.suse.com/1080757" source="BUGZILLA"/>
		<reference ref_id="1082424" ref_url="https://bugzilla.suse.com/1082424" source="BUGZILLA"/>
		<reference ref_id="1083242" ref_url="https://bugzilla.suse.com/1083242" source="BUGZILLA"/>
		<reference ref_id="1083483" ref_url="https://bugzilla.suse.com/1083483" source="BUGZILLA"/>
		<reference ref_id="1083494" ref_url="https://bugzilla.suse.com/1083494" source="BUGZILLA"/>
		<reference ref_id="1084536" ref_url="https://bugzilla.suse.com/1084536" source="BUGZILLA"/>
		<reference ref_id="1085331" ref_url="https://bugzilla.suse.com/1085331" source="BUGZILLA"/>
		<reference ref_id="1086162" ref_url="https://bugzilla.suse.com/1086162" source="BUGZILLA"/>
		<reference ref_id="1087088" ref_url="https://bugzilla.suse.com/1087088" source="BUGZILLA"/>
		<reference ref_id="1087209" ref_url="https://bugzilla.suse.com/1087209" source="BUGZILLA"/>
		<reference ref_id="1087260" ref_url="https://bugzilla.suse.com/1087260" source="BUGZILLA"/>
		<reference ref_id="1087762" ref_url="https://bugzilla.suse.com/1087762" source="BUGZILLA"/>
		<reference ref_id="1088147" ref_url="https://bugzilla.suse.com/1088147" source="BUGZILLA"/>
		<reference ref_id="1088260" ref_url="https://bugzilla.suse.com/1088260" source="BUGZILLA"/>
		<reference ref_id="1089608" ref_url="https://bugzilla.suse.com/1089608" source="BUGZILLA"/>
		<reference ref_id="1089752" ref_url="https://bugzilla.suse.com/1089752" source="BUGZILLA"/>
		<reference ref_id="940776" ref_url="https://bugzilla.suse.com/940776" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5156" ref_url="https://www.suse.com/security/cve/CVE-2015-5156/" source="CVE"/>
		<reference ref_id="CVE-2016-7915" ref_url="https://www.suse.com/security/cve/CVE-2016-7915/" source="CVE"/>
		<reference ref_id="CVE-2017-0861" ref_url="https://www.suse.com/security/cve/CVE-2017-0861/" source="CVE"/>
		<reference ref_id="CVE-2017-12190" ref_url="https://www.suse.com/security/cve/CVE-2017-12190/" source="CVE"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2017-16644" ref_url="https://www.suse.com/security/cve/CVE-2017-16644/" source="CVE"/>
		<reference ref_id="CVE-2017-16911" ref_url="https://www.suse.com/security/cve/CVE-2017-16911/" source="CVE"/>
		<reference ref_id="CVE-2017-16912" ref_url="https://www.suse.com/security/cve/CVE-2017-16912/" source="CVE"/>
		<reference ref_id="CVE-2017-16913" ref_url="https://www.suse.com/security/cve/CVE-2017-16913/" source="CVE"/>
		<reference ref_id="CVE-2017-16914" ref_url="https://www.suse.com/security/cve/CVE-2017-16914/" source="CVE"/>
		<reference ref_id="CVE-2017-18203" ref_url="https://www.suse.com/security/cve/CVE-2017-18203/" source="CVE"/>
		<reference ref_id="CVE-2017-18208" ref_url="https://www.suse.com/security/cve/CVE-2017-18208/" source="CVE"/>
		<reference ref_id="CVE-2018-10087" ref_url="https://www.suse.com/security/cve/CVE-2018-10087/" source="CVE"/>
		<reference ref_id="CVE-2018-10124" ref_url="https://www.suse.com/security/cve/CVE-2018-10124/" source="CVE"/>
		<reference ref_id="CVE-2018-1087" ref_url="https://www.suse.com/security/cve/CVE-2018-1087/" source="CVE"/>
		<reference ref_id="CVE-2018-6927" ref_url="https://www.suse.com/security/cve/CVE-2018-6927/" source="CVE"/>
		<reference ref_id="CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566/" source="CVE"/>
		<reference ref_id="CVE-2018-7757" ref_url="https://www.suse.com/security/cve/CVE-2018-7757/" source="CVE"/>
		<reference ref_id="CVE-2018-8822" ref_url="https://www.suse.com/security/cve/CVE-2018-8822/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003978.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-1087: And an unprivileged KVM guest user could use this flaw to potentially escalate their privileges inside a guest. (bsc#1087088)
- CVE-2018-8897: An unprivileged system user could use incorrect set up interrupt stacks to crash the Linux kernel resulting in DoS issue. (bsc#1087088)
- CVE-2018-10124: The kill_something_info function in kernel/signal.c might allow local users to cause a denial of service via an INT_MIN argument (bnc#1089752).
- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value (bnc#1089608).
- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1084536 1087209).
- CVE-2018-7566: A Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user was fixed (bnc#1083483).
- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem allowed attackers to gain privileges via unspecified vectors (bnc#1088260).
- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).
- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver. (bnc#1072865).
- CVE-2017-18203: The dm_get_from_kobject function in drivers/md/dm.c allow local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices (bnc#1083242).
- CVE-2017-16911: The vhci_hcd driver allowed allows local attackers to disclose kernel memory addresses. Successful exploitation requires that a USB device is attached over IP (bnc#1078674).
- CVE-2017-18208: The madvise_willneed function in mm/madvise.c allowed local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping (bnc#1083494).
- CVE-2017-16644: The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c allowed local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067118).
- CVE-2018-6927: The futex_requeue function in kernel/futex.c might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value (bnc#1080757).
- CVE-2017-16914: The 'stub_send_ret_submit()' function (drivers/usb/usbip/stub_tx.c) allowed attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet (bnc#1078669).
- CVE-2016-7915: The hid_input_field function in drivers/hid/hid-core.c allowed physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech DJ receiver (bnc#1010470).
- CVE-2015-5156: The virtnet_probe function in drivers/net/virtio_net.c attempted to support a FRAGLIST feature without proper memory allocation, which allowed guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets (bnc#940776).
- CVE-2017-12190: The bio_map_user_iov and bio_unmap_user functions in block/bio.c did unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition (bnc#1062568).
- CVE-2017-16912: The 'get_pipe()' function (drivers/usb/usbip/stub_rx.c) allowed attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet (bnc#1078673).
- CVE-2017-16913: The 'stub_recv_cmd_submit()' function (drivers/usb/usbip/stub_rx.c) when handling CMD_SUBMIT packets allowed attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet (bnc#1078672).

The following non-security bugs were fixed:

- Integrate fixes resulting from bsc#1088147 More info in the respective commit messages.
- KABI: x86/kaiser: properly align trampoline stack.
- KEYS: do not let add_key() update an uninstantiated key (bnc#1063416).
- ipc/msg: introduce msgctl(MSG_STAT_ANY) (bsc#1072689).
- ipc/sem: introduce semctl(SEM_STAT_ANY) (bsc#1072689).
- ipc/shm: introduce shmctl(SHM_STAT_ANY) (bsc#1072689).
- kvm/x86: fix icebp instruction handling (bsc#1087088).
- leds: do not overflow sysfs buffer in led_trigger_show (bsc#1080464).
- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1039348).
- x86-64: Move the 'user' vsyscall segment out of the data segment (bsc#1082424).
- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).
- x86/kaiser: properly align trampoline stack (bsc#1087260).
- x86/retpoline: do not perform thunk calls in ring3 vsyscall code (bsc#1085331).
- xfs: check for buffer errors before waiting (bsc#1052943).
- xfs: fix allocbt cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).
- xfs: really fix the cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-08"/>
	<updated date="2018-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010470">SUSE bug 1010470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052943">SUSE bug 1052943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062568">SUSE bug 1062568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062840">SUSE bug 1062840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063416">SUSE bug 1063416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067118">SUSE bug 1067118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072689">SUSE bug 1072689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072865">SUSE bug 1072865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078669">SUSE bug 1078669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078672">SUSE bug 1078672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078673">SUSE bug 1078673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078674">SUSE bug 1078674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080464">SUSE bug 1080464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080757">SUSE bug 1080757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082424">SUSE bug 1082424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083242">SUSE bug 1083242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083483">SUSE bug 1083483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083494">SUSE bug 1083494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084536">SUSE bug 1084536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085331">SUSE bug 1085331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086162">SUSE bug 1086162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087209">SUSE bug 1087209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087260">SUSE bug 1087260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087762">SUSE bug 1087762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088147">SUSE bug 1088147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088260">SUSE bug 1088260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089608">SUSE bug 1089608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089752">SUSE bug 1089752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940776">SUSE bug 940776</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5156/">CVE-2015-5156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5156">CVE-2015-5156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7915/">CVE-2016-7915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7915">CVE-2016-7915 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0861/">CVE-2017-0861 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0861">CVE-2017-0861 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12190/">CVE-2017-12190 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12190">CVE-2017-12190 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13166">CVE-2017-13166 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16644/">CVE-2017-16644 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16644">CVE-2017-16644 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16911/">CVE-2017-16911 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16911">CVE-2017-16911 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16912/">CVE-2017-16912 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16912">CVE-2017-16912 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16913/">CVE-2017-16913 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16913">CVE-2017-16913 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16914/">CVE-2017-16914 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16914">CVE-2017-16914 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18203/">CVE-2017-18203 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18203">CVE-2017-18203 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18208/">CVE-2017-18208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18208">CVE-2017-18208 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10087/">CVE-2018-10087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10087">CVE-2018-10087 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10124/">CVE-2018-10124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10124">CVE-2018-10124 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1087/">CVE-2018-1087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1087">CVE-2018-1087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6927/">CVE-2018-6927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6927">CVE-2018-6927 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7566">CVE-2018-7566 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7757/">CVE-2018-7757 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7757">CVE-2018-7757 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8822/">CVE-2018-8822 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8822">CVE-2018-8822 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8897">CVE-2018-8897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578626" comment="kernel-bigsmp-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578627" comment="kernel-bigsmp-base-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578629" comment="kernel-default-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578630" comment="kernel-default-base-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578632" comment="kernel-default-man-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578633" comment="kernel-ec2-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578634" comment="kernel-ec2-base-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568385" comment="kernel-pae-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568386" comment="kernel-pae-base-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578636" comment="kernel-source-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578637" comment="kernel-syms-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578638" comment="kernel-trace-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578639" comment="kernel-trace-base-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578641" comment="kernel-xen-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578642" comment="kernel-xen-base-3.0.101-0.47.106.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218851" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1099922" ref_url="https://bugzilla.suse.com/1099922" source="BUGZILLA"/>
		<reference ref_id="1102870" ref_url="https://bugzilla.suse.com/1102870" source="BUGZILLA"/>
		<reference ref_id="1106095" ref_url="https://bugzilla.suse.com/1106095" source="BUGZILLA"/>
		<reference ref_id="1108227" ref_url="https://bugzilla.suse.com/1108227" source="BUGZILLA"/>
		<reference ref_id="1109967" ref_url="https://bugzilla.suse.com/1109967" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12896" ref_url="https://www.suse.com/security/cve/CVE-2018-12896/" source="CVE"/>
		<reference ref_id="CVE-2018-14617" ref_url="https://www.suse.com/security/cve/CVE-2018-14617/" source="CVE"/>
		<reference ref_id="CVE-2018-16276" ref_url="https://www.suse.com/security/cve/CVE-2018-16276/" source="CVE"/>
		<description>


The SUSE Linux Enterprise 11 SP3 Teradata kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-14617: There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory (bnc#1102870).
- CVE-2018-16276: An issue was discovered in yurex_read in drivers/usb/misc/yurex.c where local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges (bnc#1106095).
- CVE-2018-12896: An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically made the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922).

The following non-security bugs were fixed:

- x86/fpu: Do not do __thread_fpu_end() if use_eager_fpu() (bnc#1109967).
- x86/fpu: fix signal handling with eager FPU switching (ia32) (bsc#1108227).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-04"/>
	<updated date="2018-10-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1099922">SUSE bug 1099922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102870">SUSE bug 1102870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106095">SUSE bug 1106095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108227">SUSE bug 1108227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109967">SUSE bug 1109967</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12896/">CVE-2018-12896 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12896">CVE-2018-12896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14617/">CVE-2018-14617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14617">CVE-2018-14617 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16276/">CVE-2018-16276 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16276">CVE-2018-16276 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993582" comment="kernel-default-3.0.101-0.187.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993583" comment="kernel-default-base-3.0.101-0.187.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993585" comment="kernel-ec2-3.0.101-0.187.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993586" comment="kernel-ec2-base-3.0.101-0.187.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993588" comment="kernel-source-3.0.101-0.187.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993589" comment="kernel-syms-3.0.101-0.187.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993590" comment="kernel-trace-3.0.101-0.187.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993591" comment="kernel-trace-base-3.0.101-0.187.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993593" comment="kernel-xen-3.0.101-0.187.TDC.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993594" comment="kernel-xen-base-3.0.101-0.187.TDC.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218852" version="1" class="patch">
	<metadata>
		<title>Security update for krb5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="825985" ref_url="https://bugzilla.suse.com/825985" source="BUGZILLA"/>
		<reference ref_id="849240" ref_url="https://bugzilla.suse.com/849240" source="BUGZILLA"/>
		<reference ref_id="886016" ref_url="https://bugzilla.suse.com/886016" source="BUGZILLA"/>
		<reference ref_id="888697" ref_url="https://bugzilla.suse.com/888697" source="BUGZILLA"/>
		<reference ref_id="891082" ref_url="https://bugzilla.suse.com/891082" source="BUGZILLA"/>
		<reference ref_id="CVE-2002-2443" ref_url="https://www.suse.com/security/cve/CVE-2002-2443/" source="CVE"/>
		<reference ref_id="CVE-2013-1418" ref_url="https://www.suse.com/security/cve/CVE-2013-1418/" source="CVE"/>
		<reference ref_id="CVE-2014-4341" ref_url="https://www.suse.com/security/cve/CVE-2014-4341/" source="CVE"/>
		<reference ref_id="CVE-2014-4342" ref_url="https://www.suse.com/security/cve/CVE-2014-4342/" source="CVE"/>
		<reference ref_id="CVE-2014-4343" ref_url="https://www.suse.com/security/cve/CVE-2014-4343/" source="CVE"/>
		<reference ref_id="CVE-2014-4344" ref_url="https://www.suse.com/security/cve/CVE-2014-4344/" source="CVE"/>
		<reference ref_id="CVE-2014-4345" ref_url="https://www.suse.com/security/cve/CVE-2014-4345/" source="CVE"/>
		<description>

This MIT krb5 update fixes a buffer overrun problem in kadmind:

    * bnc#891082: buffer overrun in kadmind with LDAP back end
      (MITKRB5-SA-2014-001) (CVE-2014-4345)

MIT krb5 Security Advisory 2014-001

    * http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2014-001.txt

Security Issues:

    * CVE-2014-4345
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-12"/>
	<updated date="2014-08-12"/>
	<bugzilla href="https://bugzilla.suse.com/825985">SUSE bug 825985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849240">SUSE bug 849240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886016">SUSE bug 886016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888697">SUSE bug 888697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891082">SUSE bug 891082</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2002-2443/">CVE-2002-2443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2002-2443">CVE-2002-2443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1418/">CVE-2013-1418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1418">CVE-2013-1418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4341/">CVE-2014-4341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4341">CVE-2014-4341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4342/">CVE-2014-4342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4342">CVE-2014-4342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4343/">CVE-2014-4343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4343">CVE-2014-4343 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4344/">CVE-2014-4344 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4344">CVE-2014-4344 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4345/">CVE-2014-4345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4345">CVE-2014-4345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578644" comment="krb5-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578645" comment="krb5-32bit-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578646" comment="krb5-apps-clients-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578647" comment="krb5-apps-servers-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578648" comment="krb5-client-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572175" comment="krb5-doc-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578649" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578650" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578651" comment="krb5-server-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578652" comment="krb5-x86-1.6.3-133.49.62.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578644" comment="krb5-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578645" comment="krb5-32bit-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578646" comment="krb5-apps-clients-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578647" comment="krb5-apps-servers-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578648" comment="krb5-client-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572175" comment="krb5-doc-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578649" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578650" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578651" comment="krb5-server-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578652" comment="krb5-x86-1.6.3-133.49.62.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578644" comment="krb5-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578645" comment="krb5-32bit-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578646" comment="krb5-apps-clients-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578647" comment="krb5-apps-servers-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578648" comment="krb5-client-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572175" comment="krb5-doc-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578649" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578650" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578651" comment="krb5-server-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578652" comment="krb5-x86-1.6.3-133.49.62.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218853" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="952188" ref_url="https://bugzilla.suse.com/952188" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001667.html" source="SUSE-SU"/>
		<description>
krb5 was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-2695: Applications which call gss_inquire_context() on a partially-established SPNEGO context could have caused the GSS-API library to read from a pointer using the wrong type, generally causing a process crash (bsc#952188).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-30"/>
	<updated date="2015-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/952188">SUSE bug 952188</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2695">CVE-2015-2695 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578653" comment="krb5-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578654" comment="krb5-32bit-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578655" comment="krb5-apps-clients-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578656" comment="krb5-apps-servers-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578657" comment="krb5-client-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572184" comment="krb5-doc-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578658" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578659" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578660" comment="krb5-server-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578661" comment="krb5-x86-1.6.3-133.49.97.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578653" comment="krb5-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578654" comment="krb5-32bit-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578655" comment="krb5-apps-clients-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578656" comment="krb5-apps-servers-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578657" comment="krb5-client-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572184" comment="krb5-doc-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578658" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578659" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578660" comment="krb5-server-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578661" comment="krb5-x86-1.6.3-133.49.97.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578653" comment="krb5-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578654" comment="krb5-32bit-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578655" comment="krb5-apps-clients-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578656" comment="krb5-apps-servers-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578657" comment="krb5-client-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572184" comment="krb5-doc-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578658" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578659" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578660" comment="krb5-server-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578661" comment="krb5-x86-1.6.3-133.49.97.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218854" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="954270" ref_url="https://bugzilla.suse.com/954270" source="BUGZILLA"/>
		<reference ref_id="954470" ref_url="https://bugzilla.suse.com/954470" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001737.html" source="SUSE-SU"/>
		<description>
The krb5 package was updated to fix the following security and non security issues:

- CVE-2015-2695: Fixed missing functions that were still vulnerable (bsc#954270).
- Fixed a memory leak in the handling of error messages (bsc#954470). 
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-17"/>
	<updated date="2015-12-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954270">SUSE bug 954270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954470">SUSE bug 954470</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2695">CVE-2015-2695 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578662" comment="krb5-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578663" comment="krb5-32bit-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578664" comment="krb5-apps-clients-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578665" comment="krb5-apps-servers-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578666" comment="krb5-client-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578667" comment="krb5-server-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578668" comment="krb5-x86-1.6.3-133.49.103.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578662" comment="krb5-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578663" comment="krb5-32bit-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578664" comment="krb5-apps-clients-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578665" comment="krb5-apps-servers-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578666" comment="krb5-client-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578667" comment="krb5-server-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578668" comment="krb5-x86-1.6.3-133.49.103.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578662" comment="krb5-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578663" comment="krb5-32bit-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578664" comment="krb5-apps-clients-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578665" comment="krb5-apps-servers-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578666" comment="krb5-client-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578667" comment="krb5-server-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578668" comment="krb5-x86-1.6.3-133.49.103.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218855" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="963968" ref_url="https://bugzilla.suse.com/963968" source="BUGZILLA"/>
		<reference ref_id="963975" ref_url="https://bugzilla.suse.com/963975" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8629" ref_url="https://www.suse.com/security/cve/CVE-2015-8629/" source="CVE"/>
		<reference ref_id="CVE-2015-8631" ref_url="https://www.suse.com/security/cve/CVE-2015-8631/" source="CVE"/>
		<description>

This update for krb5 fixes the following issues:

- CVE-2015-8629: Information leak authenticated attackers with permissions to modify the database (bsc#963968)
- CVE-2015-8631: An authenticated attacker could have caused a memory leak in auditd by supplying a null principal name in request (bsc#963975)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-11"/>
	<updated date="2016-02-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/963968">SUSE bug 963968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963975">SUSE bug 963975</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8629/">CVE-2015-8629 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8629">CVE-2015-8629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8631/">CVE-2015-8631 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8631">CVE-2015-8631 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572193" comment="krb5-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567384" comment="krb5-32bit-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572194" comment="krb5-apps-clients-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572195" comment="krb5-apps-servers-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572196" comment="krb5-client-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572197" comment="krb5-server-1.6.3-133.49.106.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218856" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="971942" ref_url="https://bugzilla.suse.com/971942" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3119" ref_url="https://www.suse.com/security/cve/CVE-2016-3119/" source="CVE"/>
		<description>

This update for krb5 fixes the following security issue:

- CVE-2016-3119: An authenticated attacker with permission to modify a
  principal entry could have caused kadmind to dereference a null pointer
  by supplying an empty DB argument to the modify_principal command,
  if kadmind is configured to use the LDAP KDB module. (bsc#971942)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-18"/>
	<updated date="2016-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/971942">SUSE bug 971942</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3119/">CVE-2016-3119 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3119">CVE-2016-3119 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572198" comment="krb5-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572199" comment="krb5-32bit-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572200" comment="krb5-apps-clients-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572201" comment="krb5-apps-servers-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572202" comment="krb5-client-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572203" comment="krb5-server-1.6.3-133.49.109.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218857" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="770172" ref_url="https://bugzilla.suse.com/770172" source="BUGZILLA"/>
		<reference ref_id="816413" ref_url="https://bugzilla.suse.com/816413" source="BUGZILLA"/>
		<reference ref_id="918595" ref_url="https://bugzilla.suse.com/918595" source="BUGZILLA"/>
		<reference ref_id="952190" ref_url="https://bugzilla.suse.com/952190" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-1015" ref_url="https://www.suse.com/security/cve/CVE-2012-1015/" source="CVE"/>
		<reference ref_id="CVE-2013-1416" ref_url="https://www.suse.com/security/cve/CVE-2013-1416/" source="CVE"/>
		<reference ref_id="CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355/" source="CVE"/>
		<reference ref_id="CVE-2015-2697" ref_url="https://www.suse.com/security/cve/CVE-2015-2697/" source="CVE"/>
		<description>

This update for krb5 fixes the following issues:

- Incorrect string handling in build_principal_va can lead to DOS. (bsc#952190, CVE-2015-2697)
- Fix potential heap corruption and crash vulnerability described in MIT krb5 Security Advisory 2012-001. 
  (bsc#770172, CVE-2012-1015)
- Fix prep_reprocess_req NULL pointer deref. (bsc#816413, CVE-2013-1416)
- Fix Denial of service in krb5_read_message. (bsc#918595, CVE-2014-5355)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-12"/>
	<updated date="2017-05-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816413">SUSE bug 816413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918595">SUSE bug 918595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952190">SUSE bug 952190</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1015/">CVE-2012-1015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1015">CVE-2012-1015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1416/">CVE-2013-1416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1416">CVE-2013-1416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5355">CVE-2014-5355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2697/">CVE-2015-2697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2697">CVE-2015-2697 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572204" comment="krb5-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572205" comment="krb5-32bit-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572206" comment="krb5-apps-clients-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572207" comment="krb5-apps-servers-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572208" comment="krb5-client-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572209" comment="krb5-devel-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572210" comment="krb5-devel-32bit-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572211" comment="krb5-doc-1.8.6-133.49.121.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572212" comment="krb5-plugin-kdb-ldap-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572213" comment="krb5-plugin-preauth-pkinit-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572214" comment="krb5-server-1.8.6-133.49.121.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218858" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1025126" ref_url="https://bugzilla.suse.com/1025126" source="BUGZILLA"/>
		<reference ref_id="1049819" ref_url="https://bugzilla.suse.com/1049819" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11368" ref_url="https://www.suse.com/security/cve/CVE-2017-11368/" source="CVE"/>
		<description>
This update for krb5 fixes the following issues:

Security issues fixed:

- CVE-2017-11368: Fix an unintended assertion failure in KDC (bsc#1049819)


Also the openssl1 LDAP library build is now used for the LDAP plugin components. (bsc#1025126).

		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-07"/>
	<updated date="2017-09-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025126">SUSE bug 1025126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049819">SUSE bug 1049819</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11368/">CVE-2017-11368 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11368">CVE-2017-11368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572215" comment="krb5-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572216" comment="krb5-32bit-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572217" comment="krb5-apps-clients-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572218" comment="krb5-apps-servers-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572219" comment="krb5-client-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572220" comment="krb5-devel-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572221" comment="krb5-devel-32bit-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572222" comment="krb5-doc-1.8.6-133.49.125.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572223" comment="krb5-plugin-kdb-ldap-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572224" comment="krb5-plugin-preauth-pkinit-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572225" comment="krb5-server-1.8.6-133.49.125.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218859" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1056995" ref_url="https://bugzilla.suse.com/1056995" source="BUGZILLA"/>
		<reference ref_id="1065274" ref_url="https://bugzilla.suse.com/1065274" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11462" ref_url="https://www.suse.com/security/cve/CVE-2017-11462/" source="CVE"/>
		<reference ref_id="CVE-2017-15088" ref_url="https://www.suse.com/security/cve/CVE-2017-15088/" source="CVE"/>
		<description>
This update for krb5 fixes the following security issues:

- CVE-2017-15088: A buffer overflow in get_matching_data() was fixed that could under specific circumstances be used to execute code (bsc#1065274)
- CVE-2017-11462: Prevent automatic security context deletion to prevent double-free (bsc#1056995)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-02"/>
	<updated date="2017-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056995">SUSE bug 1056995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065274">SUSE bug 1065274</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11462/">CVE-2017-11462 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11462">CVE-2017-11462 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15088/">CVE-2017-15088 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15088">CVE-2017-15088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572226" comment="krb5-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572227" comment="krb5-32bit-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572228" comment="krb5-apps-clients-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572229" comment="krb5-apps-servers-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572230" comment="krb5-client-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572231" comment="krb5-devel-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572232" comment="krb5-devel-32bit-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572233" comment="krb5-doc-1.8.6-133.49.125.16.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572234" comment="krb5-plugin-kdb-ldap-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572235" comment="krb5-plugin-preauth-pkinit-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572236" comment="krb5-server-1.8.6-133.49.125.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218860" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1083926" ref_url="https://bugzilla.suse.com/1083926" source="BUGZILLA"/>
		<reference ref_id="1083927" ref_url="https://bugzilla.suse.com/1083927" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5729" ref_url="https://www.suse.com/security/cve/CVE-2018-5729/" source="CVE"/>
		<reference ref_id="CVE-2018-5730" ref_url="https://www.suse.com/security/cve/CVE-2018-5730/" source="CVE"/>
		<description>
This update for krb5 fixes the following issues:

Security issues fixed:

- CVE-2018-5729: Null pointer dereference in kadmind or DN container check bypass by supplying special crafted data (bsc#1083926).
- CVE-2018-5730: DN container check bypass by supplying special crafted data (bsc#1083927).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-16"/>
	<updated date="2018-04-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083926">SUSE bug 1083926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083927">SUSE bug 1083927</bugzilla>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5729/">CVE-2018-5729 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5729">CVE-2018-5729 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5730/">CVE-2018-5730 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5730">CVE-2018-5730 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572237" comment="krb5-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572238" comment="krb5-32bit-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572239" comment="krb5-apps-clients-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572240" comment="krb5-apps-servers-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572241" comment="krb5-client-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572242" comment="krb5-devel-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572243" comment="krb5-devel-32bit-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572244" comment="krb5-doc-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572245" comment="krb5-plugin-kdb-ldap-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572246" comment="krb5-plugin-preauth-pkinit-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572247" comment="krb5-server-1.8.6-133.49.125.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218861" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1205126" ref_url="https://bugzilla.suse.com/1205126" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42898" ref_url="https://www.suse.com/security/cve/CVE-2022-42898/" source="CVE"/>
		<description>
This update for krb5 fixes the following issues:

- CVE-2022-42898: Fixed integer overflow in PAC parsing (bsc#1205126).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-21"/>
	<updated date="2022-11-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205126">SUSE bug 1205126</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-42898/">CVE-2022-42898 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42898">CVE-2022-42898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993596" comment="krb5-1.8.6-133.49.125.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993597" comment="krb5-32bit-1.8.6-133.49.125.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993598" comment="krb5-apps-clients-1.8.6-133.49.125.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993599" comment="krb5-apps-servers-1.8.6-133.49.125.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993600" comment="krb5-client-1.8.6-133.49.125.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993601" comment="krb5-devel-1.8.6-133.49.125.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993602" comment="krb5-devel-32bit-1.8.6-133.49.125.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993603" comment="krb5-doc-1.8.6-133.49.125.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993604" comment="krb5-plugin-kdb-ldap-1.8.6-133.49.125.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993605" comment="krb5-plugin-preauth-pkinit-1.8.6-133.49.125.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993606" comment="krb5-server-1.8.6-133.49.125.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218862" version="1" class="patch">
	<metadata>
		<title>Security update for krb5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="890623" ref_url="https://bugzilla.suse.com/890623" source="BUGZILLA"/>
		<reference ref_id="897874" ref_url="https://bugzilla.suse.com/897874" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5351" ref_url="https://www.suse.com/security/cve/CVE-2014-5351/" source="CVE"/>
		<description>

This update for krb5 fixes the following issues:

    * When randomizing the keys for a service principal, current keys could
      be returned. (CVE-2014-5351)
    * klist -s crashes when handling multiple referral entries.
      (bnc#890623)

Security Issues:

    * CVE-2014-5351
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-02"/>
	<updated date="2014-10-02"/>
	<bugzilla href="https://bugzilla.suse.com/890623">SUSE bug 890623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897874">SUSE bug 897874</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5351/">CVE-2014-5351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5351">CVE-2014-5351 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578669" comment="krb5-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578670" comment="krb5-32bit-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578671" comment="krb5-apps-clients-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578672" comment="krb5-apps-servers-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578673" comment="krb5-client-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572252" comment="krb5-doc-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578674" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578675" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578676" comment="krb5-server-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578677" comment="krb5-x86-1.6.3-133.49.64.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578669" comment="krb5-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578670" comment="krb5-32bit-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578671" comment="krb5-apps-clients-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578672" comment="krb5-apps-servers-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578673" comment="krb5-client-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572252" comment="krb5-doc-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578674" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578675" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578676" comment="krb5-server-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578677" comment="krb5-x86-1.6.3-133.49.64.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578669" comment="krb5-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578670" comment="krb5-32bit-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578671" comment="krb5-apps-clients-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578672" comment="krb5-apps-servers-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578673" comment="krb5-client-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572252" comment="krb5-doc-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578674" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578675" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578676" comment="krb5-server-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578677" comment="krb5-x86-1.6.3-133.49.64.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218863" version="1" class="patch">
	<metadata>
		<title>Security update for krb5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="872912" ref_url="https://bugzilla.suse.com/872912" source="BUGZILLA"/>
		<reference ref_id="906557" ref_url="https://bugzilla.suse.com/906557" source="BUGZILLA"/>
		<reference ref_id="912002" ref_url="https://bugzilla.suse.com/912002" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5352" ref_url="https://www.suse.com/security/cve/CVE-2014-5352/" source="CVE"/>
		<reference ref_id="CVE-2014-9421" ref_url="https://www.suse.com/security/cve/CVE-2014-9421/" source="CVE"/>
		<reference ref_id="CVE-2014-9422" ref_url="https://www.suse.com/security/cve/CVE-2014-9422/" source="CVE"/>
		<reference ref_id="CVE-2014-9423" ref_url="https://www.suse.com/security/cve/CVE-2014-9423/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001215.html" source="SUSE-SU"/>
		<description>

krb5 has been updated to fix four security issues:

    * CVE-2014-5352: gss_process_context_token() incorrectly frees context
      (bsc#912002)
    * CVE-2014-9421: kadmind doubly frees partial deserialization results
      (bsc#912002)
    * CVE-2014-9422: kadmind incorrectly validates server principal name
      (bsc#912002)
    * CVE-2014-9423: libgssrpc server applications leak uninitialized bytes
      (bsc#912002)

Additionally, these non-security issues have been fixed:

    * Winbind process hangs indefinitely without DC. (bsc#872912)
    * Hanging winbind processes. (bsc#906557)

Security Issues:

    * CVE-2014-5352
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352&gt;
    * CVE-2014-9421
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421&gt;
    * CVE-2014-9422
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422&gt;
    * CVE-2014-9423
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-06"/>
	<updated date="2015-02-06"/>
	<bugzilla href="https://bugzilla.suse.com/872912">SUSE bug 872912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906557">SUSE bug 906557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5352/">CVE-2014-5352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5352">CVE-2014-5352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9421/">CVE-2014-9421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9421">CVE-2014-9421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9422/">CVE-2014-9422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9422">CVE-2014-9422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9423/">CVE-2014-9423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9423">CVE-2014-9423 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578678" comment="krb5-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578679" comment="krb5-32bit-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578680" comment="krb5-apps-clients-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578681" comment="krb5-apps-servers-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578682" comment="krb5-client-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572260" comment="krb5-doc-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578683" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578684" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578685" comment="krb5-server-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578686" comment="krb5-x86-1.6.3-133.49.66.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578678" comment="krb5-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578679" comment="krb5-32bit-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578680" comment="krb5-apps-clients-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578681" comment="krb5-apps-servers-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578682" comment="krb5-client-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572260" comment="krb5-doc-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578683" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578684" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578685" comment="krb5-server-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578686" comment="krb5-x86-1.6.3-133.49.66.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578678" comment="krb5-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578679" comment="krb5-32bit-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578680" comment="krb5-apps-clients-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578681" comment="krb5-apps-servers-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578682" comment="krb5-client-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572260" comment="krb5-doc-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578683" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578684" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578685" comment="krb5-server-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578686" comment="krb5-x86-1.6.3-133.49.66.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218864" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="910457" ref_url="https://bugzilla.suse.com/910457" source="BUGZILLA"/>
		<reference ref_id="910458" ref_url="https://bugzilla.suse.com/910458" source="BUGZILLA"/>
		<reference ref_id="918595" ref_url="https://bugzilla.suse.com/918595" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353/" source="CVE"/>
		<reference ref_id="CVE-2014-5354" ref_url="https://www.suse.com/security/cve/CVE-2014-5354/" source="CVE"/>
		<reference ref_id="CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001507.html" source="SUSE-SU"/>
		<description>
krb5 was updated to fix three security issues.

Remote authenticated users could cause denial of service.

These security issues were fixed:
- CVE-2014-5353: NULL pointer dereference when using a ticket policy name as password name (bsc#910457).
- CVE-2014-5354: NULL pointer dereference when using keyless entries (bsc#910458).
- CVE-2014-5355: Denial of service in krb5_read_message (bsc#918595).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-10"/>
	<updated date="2015-07-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/910457">SUSE bug 910457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910458">SUSE bug 910458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918595">SUSE bug 918595</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5353">CVE-2014-5353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5354/">CVE-2014-5354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5354">CVE-2014-5354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5355">CVE-2014-5355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578687" comment="krb5-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578688" comment="krb5-32bit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578689" comment="krb5-apps-clients-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578690" comment="krb5-apps-servers-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578691" comment="krb5-client-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572268" comment="krb5-doc-1.6.3-133.49.68.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578692" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578693" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578694" comment="krb5-server-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578695" comment="krb5-x86-1.6.3-133.49.68.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578687" comment="krb5-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578688" comment="krb5-32bit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578689" comment="krb5-apps-clients-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578690" comment="krb5-apps-servers-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578691" comment="krb5-client-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572268" comment="krb5-doc-1.6.3-133.49.68.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578692" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578693" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578694" comment="krb5-server-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578695" comment="krb5-x86-1.6.3-133.49.68.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578687" comment="krb5-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578688" comment="krb5-32bit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578689" comment="krb5-apps-clients-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578690" comment="krb5-apps-servers-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578691" comment="krb5-client-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572268" comment="krb5-doc-1.6.3-133.49.68.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578692" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578693" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578694" comment="krb5-server-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578695" comment="krb5-x86-1.6.3-133.49.68.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218865" version="1" class="patch">
	<metadata>
		<title>Security update for kvm</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="812836" ref_url="https://bugzilla.suse.com/812836" source="BUGZILLA"/>
		<reference ref_id="812983" ref_url="https://bugzilla.suse.com/812983" source="BUGZILLA"/>
		<reference ref_id="817593" ref_url="https://bugzilla.suse.com/817593" source="BUGZILLA"/>
		<reference ref_id="821819" ref_url="https://bugzilla.suse.com/821819" source="BUGZILLA"/>
		<reference ref_id="824340" ref_url="https://bugzilla.suse.com/824340" source="BUGZILLA"/>
		<reference ref_id="829800" ref_url="https://bugzilla.suse.com/829800" source="BUGZILLA"/>
		<reference ref_id="841080" ref_url="https://bugzilla.suse.com/841080" source="BUGZILLA"/>
		<reference ref_id="842006" ref_url="https://bugzilla.suse.com/842006" source="BUGZILLA"/>
		<reference ref_id="842088" ref_url="https://bugzilla.suse.com/842088" source="BUGZILLA"/>
		<reference ref_id="858858" ref_url="https://bugzilla.suse.com/858858" source="BUGZILLA"/>
		<reference ref_id="864391" ref_url="https://bugzilla.suse.com/864391" source="BUGZILLA"/>
		<reference ref_id="864649" ref_url="https://bugzilla.suse.com/864649" source="BUGZILLA"/>
		<reference ref_id="864650" ref_url="https://bugzilla.suse.com/864650" source="BUGZILLA"/>
		<reference ref_id="864653" ref_url="https://bugzilla.suse.com/864653" source="BUGZILLA"/>
		<reference ref_id="864655" ref_url="https://bugzilla.suse.com/864655" source="BUGZILLA"/>
		<reference ref_id="864665" ref_url="https://bugzilla.suse.com/864665" source="BUGZILLA"/>
		<reference ref_id="864671" ref_url="https://bugzilla.suse.com/864671" source="BUGZILLA"/>
		<reference ref_id="864673" ref_url="https://bugzilla.suse.com/864673" source="BUGZILLA"/>
		<reference ref_id="864678" ref_url="https://bugzilla.suse.com/864678" source="BUGZILLA"/>
		<reference ref_id="864682" ref_url="https://bugzilla.suse.com/864682" source="BUGZILLA"/>
		<reference ref_id="864769" ref_url="https://bugzilla.suse.com/864769" source="BUGZILLA"/>
		<reference ref_id="864796" ref_url="https://bugzilla.suse.com/864796" source="BUGZILLA"/>
		<reference ref_id="864801" ref_url="https://bugzilla.suse.com/864801" source="BUGZILLA"/>
		<reference ref_id="864802" ref_url="https://bugzilla.suse.com/864802" source="BUGZILLA"/>
		<reference ref_id="864804" ref_url="https://bugzilla.suse.com/864804" source="BUGZILLA"/>
		<reference ref_id="864805" ref_url="https://bugzilla.suse.com/864805" source="BUGZILLA"/>
		<reference ref_id="864811" ref_url="https://bugzilla.suse.com/864811" source="BUGZILLA"/>
		<reference ref_id="864812" ref_url="https://bugzilla.suse.com/864812" source="BUGZILLA"/>
		<reference ref_id="864814" ref_url="https://bugzilla.suse.com/864814" source="BUGZILLA"/>
		<reference ref_id="870439" ref_url="https://bugzilla.suse.com/870439" source="BUGZILLA"/>
		<reference ref_id="873235" ref_url="https://bugzilla.suse.com/873235" source="BUGZILLA"/>
		<reference ref_id="874749" ref_url="https://bugzilla.suse.com/874749" source="BUGZILLA"/>
		<reference ref_id="874788" ref_url="https://bugzilla.suse.com/874788" source="BUGZILLA"/>
		<reference ref_id="876842" ref_url="https://bugzilla.suse.com/876842" source="BUGZILLA"/>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="877645" ref_url="https://bugzilla.suse.com/877645" source="BUGZILLA"/>
		<reference ref_id="878541" ref_url="https://bugzilla.suse.com/878541" source="BUGZILLA"/>
		<reference ref_id="886535" ref_url="https://bugzilla.suse.com/886535" source="BUGZILLA"/>
		<reference ref_id="920571" ref_url="https://bugzilla.suse.com/920571" source="BUGZILLA"/>
		<reference ref_id="924018" ref_url="https://bugzilla.suse.com/924018" source="BUGZILLA"/>
		<reference ref_id="929339" ref_url="https://bugzilla.suse.com/929339" source="BUGZILLA"/>
		<reference ref_id="932267" ref_url="https://bugzilla.suse.com/932267" source="BUGZILLA"/>
		<reference ref_id="932770" ref_url="https://bugzilla.suse.com/932770" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2016" ref_url="https://www.suse.com/security/cve/CVE-2013-2016/" source="CVE"/>
		<reference ref_id="CVE-2013-4344" ref_url="https://www.suse.com/security/cve/CVE-2013-4344/" source="CVE"/>
		<reference ref_id="CVE-2013-4541" ref_url="https://www.suse.com/security/cve/CVE-2013-4541/" source="CVE"/>
		<reference ref_id="CVE-2014-0142" ref_url="https://www.suse.com/security/cve/CVE-2014-0142/" source="CVE"/>
		<reference ref_id="CVE-2014-0143" ref_url="https://www.suse.com/security/cve/CVE-2014-0143/" source="CVE"/>
		<reference ref_id="CVE-2014-0144" ref_url="https://www.suse.com/security/cve/CVE-2014-0144/" source="CVE"/>
		<reference ref_id="CVE-2014-0145" ref_url="https://www.suse.com/security/cve/CVE-2014-0145/" source="CVE"/>
		<reference ref_id="CVE-2014-0146" ref_url="https://www.suse.com/security/cve/CVE-2014-0146/" source="CVE"/>
		<reference ref_id="CVE-2014-0147" ref_url="https://www.suse.com/security/cve/CVE-2014-0147/" source="CVE"/>
		<reference ref_id="CVE-2014-0150" ref_url="https://www.suse.com/security/cve/CVE-2014-0150/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-0223" ref_url="https://www.suse.com/security/cve/CVE-2014-0223/" source="CVE"/>
		<reference ref_id="CVE-2014-2894" ref_url="https://www.suse.com/security/cve/CVE-2014-2894/" source="CVE"/>
		<reference ref_id="CVE-2014-3461" ref_url="https://www.suse.com/security/cve/CVE-2014-3461/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001465.html" source="SUSE-SU"/>
		<description>

kvm has been updated to fix issues in the embedded qemu:

    * 

      CVE-2014-0223: An integer overflow flaw was found in the QEMU block
      driver for QCOW version 1 disk images. A user able to alter the QEMU
      disk image files loaded by a guest could have used this flaw to
      corrupt QEMU process memory on the host, which could potentially have
      resulted in arbitrary code execution on the host with the privileges
      of the QEMU process.

    * 

      CVE-2014-3461: A user able to alter the savevm data (either on the
      disk or over the wire during migration) could have used this flaw to
      to corrupt QEMU process memory on the (destination) host, which could
      have potentially resulted in arbitrary code execution on the host
      with the privileges of the QEMU process.

    * 

      CVE-2014-0222: An integer overflow flaw was found in the QEMU block
      driver for QCOW version 1 disk images. A user able to alter the QEMU
      disk image files loaded by a guest could have used this flaw to
      corrupt QEMU process memory on the host, which could have potentially
      resulted in arbitrary code execution on the host with the privileges
      of the QEMU process.

Non-security bugs fixed:

    * Fix exceeding IRQ routes that could have caused freezes of guests.
      (bnc#876842)
    * Fix CPUID emulation bugs that may have broken Windows guests with
      newer -cpu types (bnc#886535)

Security Issues:

    * CVE-2014-0222
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222&gt;
    * CVE-2014-0223
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223&gt;
    * CVE-2014-3461
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3461&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-19"/>
	<updated date="2014-09-19"/>
	<bugzilla href="https://bugzilla.suse.com/812836">SUSE bug 812836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/812983">SUSE bug 812983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817593">SUSE bug 817593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821819">SUSE bug 821819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824340">SUSE bug 824340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829800">SUSE bug 829800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841080">SUSE bug 841080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842006">SUSE bug 842006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842088">SUSE bug 842088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858858">SUSE bug 858858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864391">SUSE bug 864391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864649">SUSE bug 864649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864650">SUSE bug 864650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864653">SUSE bug 864653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864655">SUSE bug 864655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864665">SUSE bug 864665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864671">SUSE bug 864671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864673">SUSE bug 864673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864678">SUSE bug 864678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864682">SUSE bug 864682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864769">SUSE bug 864769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864796">SUSE bug 864796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864801">SUSE bug 864801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864802">SUSE bug 864802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864804">SUSE bug 864804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864805">SUSE bug 864805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864811">SUSE bug 864811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864812">SUSE bug 864812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864814">SUSE bug 864814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870439">SUSE bug 870439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873235">SUSE bug 873235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/874749">SUSE bug 874749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/874788">SUSE bug 874788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876842">SUSE bug 876842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877645">SUSE bug 877645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878541">SUSE bug 878541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886535">SUSE bug 886535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920571">SUSE bug 920571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924018">SUSE bug 924018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929339">SUSE bug 929339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932770">SUSE bug 932770</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2016/">CVE-2013-2016 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-2016">CVE-2013-2016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4344/">CVE-2013-4344 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4344">CVE-2013-4344 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4541/">CVE-2013-4541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4541">CVE-2013-4541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0142/">CVE-2014-0142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0142">CVE-2014-0142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0143/">CVE-2014-0143 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0143">CVE-2014-0143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0144/">CVE-2014-0144 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0144">CVE-2014-0144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0145/">CVE-2014-0145 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0145">CVE-2014-0145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0146/">CVE-2014-0146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0146">CVE-2014-0146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0147/">CVE-2014-0147 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0147">CVE-2014-0147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0150/">CVE-2014-0150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0150">CVE-2014-0150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0222">CVE-2014-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0223/">CVE-2014-0223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0223">CVE-2014-0223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2894/">CVE-2014-2894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2894">CVE-2014-2894 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3461/">CVE-2014-3461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3461">CVE-2014-3461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1779">CVE-2015-1779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3209">CVE-2015-3209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3456">CVE-2015-3456 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578696" comment="kvm-1.4.2-0.17.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578696" comment="kvm-1.4.2-0.17.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578696" comment="kvm-1.4.2-0.17.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218866" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001559.html" source="SUSE-SU"/>
		<description>
kvm was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-21"/>
	<updated date="2015-08-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5154">CVE-2015-5154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578697" comment="kvm-1.4.2-0.22.34.3 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578697" comment="kvm-1.4.2-0.22.34.3 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578697" comment="kvm-1.4.2-0.22.34.3 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218867" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="947164" ref_url="https://bugzilla.suse.com/947164" source="BUGZILLA"/>
		<reference ref_id="950590" ref_url="https://bugzilla.suse.com/950590" source="BUGZILLA"/>
		<reference ref_id="953187" ref_url="https://bugzilla.suse.com/953187" source="BUGZILLA"/>
		<reference ref_id="956829" ref_url="https://bugzilla.suse.com/956829" source="BUGZILLA"/>
		<reference ref_id="957162" ref_url="https://bugzilla.suse.com/957162" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001777.html" source="SUSE-SU"/>
		<description>

This update for kvm fixes the following issues: 

Security issues fixed:
- CVE-2015-7512: The receive packet size is now checked in the emulated
  pcnet driver, eliminating buffer overflow and potential security
  issue by malicious guest systems. (bsc#957162)
- CVE-2015-8345: A infinite loop in processing command block list was fixed that could be
  exploit by malicious guest systems (bsc#956829).

Bugs fixed:
- Fix cases of wrong clock values in kvmclock timekeeping
  (bsc#947164 and bsc#953187)
- Enforce pxe rom sizes to ensure migration compatibility.
  (bsc#950590)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-05"/>
	<updated date="2016-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947164">SUSE bug 947164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950590">SUSE bug 950590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953187">SUSE bug 953187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956829">SUSE bug 956829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957162">SUSE bug 957162</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7512">CVE-2015-7512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8345">CVE-2015-8345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578698" comment="kvm-1.4.2-37.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578698" comment="kvm-1.4.2-37.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578698" comment="kvm-1.4.2-37.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218868" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="895528" ref_url="https://bugzilla.suse.com/895528" source="BUGZILLA"/>
		<reference ref_id="901508" ref_url="https://bugzilla.suse.com/901508" source="BUGZILLA"/>
		<reference ref_id="928393" ref_url="https://bugzilla.suse.com/928393" source="BUGZILLA"/>
		<reference ref_id="934069" ref_url="https://bugzilla.suse.com/934069" source="BUGZILLA"/>
		<reference ref_id="936132" ref_url="https://bugzilla.suse.com/936132" source="BUGZILLA"/>
		<reference ref_id="940929" ref_url="https://bugzilla.suse.com/940929" source="BUGZILLA"/>
		<reference ref_id="944463" ref_url="https://bugzilla.suse.com/944463" source="BUGZILLA"/>
		<reference ref_id="945404" ref_url="https://bugzilla.suse.com/945404" source="BUGZILLA"/>
		<reference ref_id="945987" ref_url="https://bugzilla.suse.com/945987" source="BUGZILLA"/>
		<reference ref_id="945989" ref_url="https://bugzilla.suse.com/945989" source="BUGZILLA"/>
		<reference ref_id="947159" ref_url="https://bugzilla.suse.com/947159" source="BUGZILLA"/>
		<reference ref_id="958491" ref_url="https://bugzilla.suse.com/958491" source="BUGZILLA"/>
		<reference ref_id="958917" ref_url="https://bugzilla.suse.com/958917" source="BUGZILLA"/>
		<reference ref_id="959005" ref_url="https://bugzilla.suse.com/959005" source="BUGZILLA"/>
		<reference ref_id="960334" ref_url="https://bugzilla.suse.com/960334" source="BUGZILLA"/>
		<reference ref_id="960725" ref_url="https://bugzilla.suse.com/960725" source="BUGZILLA"/>
		<reference ref_id="961332" ref_url="https://bugzilla.suse.com/961332" source="BUGZILLA"/>
		<reference ref_id="961333" ref_url="https://bugzilla.suse.com/961333" source="BUGZILLA"/>
		<reference ref_id="961358" ref_url="https://bugzilla.suse.com/961358" source="BUGZILLA"/>
		<reference ref_id="961556" ref_url="https://bugzilla.suse.com/961556" source="BUGZILLA"/>
		<reference ref_id="961691" ref_url="https://bugzilla.suse.com/961691" source="BUGZILLA"/>
		<reference ref_id="962320" ref_url="https://bugzilla.suse.com/962320" source="BUGZILLA"/>
		<reference ref_id="963782" ref_url="https://bugzilla.suse.com/963782" source="BUGZILLA"/>
		<reference ref_id="964413" ref_url="https://bugzilla.suse.com/964413" source="BUGZILLA"/>
		<reference ref_id="967969" ref_url="https://bugzilla.suse.com/967969" source="BUGZILLA"/>
		<reference ref_id="969350" ref_url="https://bugzilla.suse.com/969350" source="BUGZILLA"/>
		<reference ref_id="970036" ref_url="https://bugzilla.suse.com/970036" source="BUGZILLA"/>
		<reference ref_id="970037" ref_url="https://bugzilla.suse.com/970037" source="BUGZILLA"/>
		<reference ref_id="975128" ref_url="https://bugzilla.suse.com/975128" source="BUGZILLA"/>
		<reference ref_id="975136" ref_url="https://bugzilla.suse.com/975136" source="BUGZILLA"/>
		<reference ref_id="975700" ref_url="https://bugzilla.suse.com/975700" source="BUGZILLA"/>
		<reference ref_id="976109" ref_url="https://bugzilla.suse.com/976109" source="BUGZILLA"/>
		<reference ref_id="978158" ref_url="https://bugzilla.suse.com/978158" source="BUGZILLA"/>
		<reference ref_id="978160" ref_url="https://bugzilla.suse.com/978160" source="BUGZILLA"/>
		<reference ref_id="980711" ref_url="https://bugzilla.suse.com/980711" source="BUGZILLA"/>
		<reference ref_id="980723" ref_url="https://bugzilla.suse.com/980723" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3615" ref_url="https://www.suse.com/security/cve/CVE-2014-3615/" source="CVE"/>
		<reference ref_id="CVE-2014-3689" ref_url="https://www.suse.com/security/cve/CVE-2014-3689/" source="CVE"/>
		<reference ref_id="CVE-2014-9718" ref_url="https://www.suse.com/security/cve/CVE-2014-9718/" source="CVE"/>
		<reference ref_id="CVE-2015-3214" ref_url="https://www.suse.com/security/cve/CVE-2015-3214/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5279" ref_url="https://www.suse.com/security/cve/CVE-2015-5279/" source="CVE"/>
		<reference ref_id="CVE-2015-5745" ref_url="https://www.suse.com/security/cve/CVE-2015-5745/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7295" ref_url="https://www.suse.com/security/cve/CVE-2015-7295/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="CVE-2016-2857" ref_url="https://www.suse.com/security/cve/CVE-2016-2857/" source="CVE"/>
		<reference ref_id="CVE-2016-2858" ref_url="https://www.suse.com/security/cve/CVE-2016-2858/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3712" ref_url="https://www.suse.com/security/cve/CVE-2016-3712/" source="CVE"/>
		<reference ref_id="CVE-2016-4001" ref_url="https://www.suse.com/security/cve/CVE-2016-4001/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4020" ref_url="https://www.suse.com/security/cve/CVE-2016-4020/" source="CVE"/>
		<reference ref_id="CVE-2016-4037" ref_url="https://www.suse.com/security/cve/CVE-2016-4037/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<description>
kvm was updated to fix 33 security issues.

These security issues were fixed:
- CVE-2016-4439: Avoid OOB access in 53C9X emulation (bsc#980711)
- CVE-2016-4441: Avoid OOB access in 53C9X emulation (bsc#980723)
- CVE-2016-3710: Fixed VGA emulation based OOB access with potential for guest escape (bsc#978158)
- CVE-2016-3712: Fixed VGa emulation based DOS and OOB read access exploit (bsc#978160)
- CVE-2016-4037: Fixed USB ehci based DOS (bsc#976109) 
- CVE-2016-2538: Fixed potential OOB access in USB net device emulation (bsc#967969)
- CVE-2016-2841: Fixed OOB access / hang in ne2000 emulation (bsc#969350)
- CVE-2016-2858: Avoid potential DOS when using QEMU pseudo random number generator (bsc#970036)
- CVE-2016-2857: Fixed OOB access when processing IP checksums (bsc#970037)
- CVE-2016-4001: Fixed OOB access in Stellaris enet emulated nic (bsc#975128)
- CVE-2016-4002: Fixed OOB access in MIPSnet emulated controller (bsc#975136)
- CVE-2016-4020: Fixed possible host data leakage to guest from TPR access (bsc#975700)
- CVE-2015-3214: Fixed OOB read in i8254 PIC (bsc#934069)
- CVE-2014-9718: Fixed the handling of malformed or short ide PRDTs to avoid any opportunity for guest to cause DoS by abusing that interface (bsc#928393)
- CVE-2014-3689: Fixed insufficient parameter validation in rectangle functions (bsc#901508)
- CVE-2014-3615: The VGA emulator in QEMU allowed local guest users to read host memory by setting the display to a high resolution (bsc#895528).
- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).
- CVE-2015-5278: Infinite loop in ne2000_receive() function (bsc#945989).
- CVE-2015-5279: Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU allowed guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets (bsc#945987).
- CVE-2015-5745: Buffer overflow in virtio-serial (bsc#940929).
- CVE-2015-6855: hw/ide/core.c in QEMU did not properly restrict the commands accepted by an ATAPI device, which allowed guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash (bsc#945404).
- CVE-2015-7295: hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allowed remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface (bsc#947159).
- CVE-2015-7549: PCI null pointer dereferences (bsc#958917).
- CVE-2015-8504: VNC floating point exception (bsc#958491).
- CVE-2015-8558: Infinite loop in ehci_advance_state resulting in DoS (bsc#959005).
- CVE-2015-8613: Wrong sized memset in megasas command handler (bsc#961358).
- CVE-2015-8619: Potential DoS for long HMP sendkey command argument (bsc#960334).
- CVE-2015-8743: OOB memory access in ne2000 ioport r/w functions (bsc#960725).
- CVE-2016-1568: AHCI use-after-free in aio port commands (bsc#961332).
- CVE-2016-1714: Potential OOB memory access in processing firmware configuration (bsc#961691).
- CVE-2016-1922: NULL pointer dereference when processing hmp i/o command (bsc#962320).
- CVE-2016-1981: Potential DoS (infinite loop) in e1000 device emulation by malicious privileged user within guest (bsc#963782).
- CVE-2016-2198: Malicious privileged guest user were able to cause DoS by writing to read-only EHCI capabilities registers (bsc#964413).

This non-security issue was fixed:
- Fix case of IDE interface needing busy status set before flush (bsc#936132)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-28"/>
	<updated date="2016-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/895528">SUSE bug 895528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901508">SUSE bug 901508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928393">SUSE bug 928393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934069">SUSE bug 934069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936132">SUSE bug 936132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940929">SUSE bug 940929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944463">SUSE bug 944463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945404">SUSE bug 945404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945987">SUSE bug 945987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945989">SUSE bug 945989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947159">SUSE bug 947159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958491">SUSE bug 958491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958917">SUSE bug 958917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959005">SUSE bug 959005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960334">SUSE bug 960334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960725">SUSE bug 960725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961332">SUSE bug 961332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961333">SUSE bug 961333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961358">SUSE bug 961358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961556">SUSE bug 961556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961691">SUSE bug 961691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962320">SUSE bug 962320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963782">SUSE bug 963782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964413">SUSE bug 964413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967969">SUSE bug 967969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969350">SUSE bug 969350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970036">SUSE bug 970036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970037">SUSE bug 970037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975128">SUSE bug 975128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975136">SUSE bug 975136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975700">SUSE bug 975700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976109">SUSE bug 976109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978158">SUSE bug 978158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978160">SUSE bug 978160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980711">SUSE bug 980711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980723">SUSE bug 980723</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3615/">CVE-2014-3615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3615">CVE-2014-3615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3689/">CVE-2014-3689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3689">CVE-2014-3689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9718/">CVE-2014-9718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9718">CVE-2014-9718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3214/">CVE-2015-3214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3214">CVE-2015-3214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5239">CVE-2015-5239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5278">CVE-2015-5278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5279/">CVE-2015-5279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5279">CVE-2015-5279 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5745/">CVE-2015-5745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5745">CVE-2015-5745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6855">CVE-2015-6855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7295/">CVE-2015-7295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7295">CVE-2015-7295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7549">CVE-2015-7549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8504">CVE-2015-8504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8558">CVE-2015-8558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8613">CVE-2015-8613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8619">CVE-2015-8619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8743">CVE-2015-8743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1568">CVE-2016-1568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1714">CVE-2016-1714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1922">CVE-2016-1922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1981">CVE-2016-1981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2198">CVE-2016-2198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2538">CVE-2016-2538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2841">CVE-2016-2841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2857/">CVE-2016-2857 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2857">CVE-2016-2857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2858/">CVE-2016-2858 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2858">CVE-2016-2858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3710">CVE-2016-3710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3712/">CVE-2016-3712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3712">CVE-2016-3712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4001/">CVE-2016-4001 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4001">CVE-2016-4001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4002">CVE-2016-4002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4020/">CVE-2016-4020 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4020">CVE-2016-4020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4037/">CVE-2016-4037 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4037">CVE-2016-4037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4439">CVE-2016-4439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4441">CVE-2016-4441 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578699" comment="kvm-1.4.2-46.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578699" comment="kvm-1.4.2-46.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218869" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="902737" ref_url="https://bugzilla.suse.com/902737" source="BUGZILLA"/>
		<reference ref_id="944697" ref_url="https://bugzilla.suse.com/944697" source="BUGZILLA"/>
		<reference ref_id="967012" ref_url="https://bugzilla.suse.com/967012" source="BUGZILLA"/>
		<reference ref_id="967013" ref_url="https://bugzilla.suse.com/967013" source="BUGZILLA"/>
		<reference ref_id="982017" ref_url="https://bugzilla.suse.com/982017" source="BUGZILLA"/>
		<reference ref_id="982018" ref_url="https://bugzilla.suse.com/982018" source="BUGZILLA"/>
		<reference ref_id="982019" ref_url="https://bugzilla.suse.com/982019" source="BUGZILLA"/>
		<reference ref_id="982222" ref_url="https://bugzilla.suse.com/982222" source="BUGZILLA"/>
		<reference ref_id="982223" ref_url="https://bugzilla.suse.com/982223" source="BUGZILLA"/>
		<reference ref_id="982285" ref_url="https://bugzilla.suse.com/982285" source="BUGZILLA"/>
		<reference ref_id="982959" ref_url="https://bugzilla.suse.com/982959" source="BUGZILLA"/>
		<reference ref_id="983961" ref_url="https://bugzilla.suse.com/983961" source="BUGZILLA"/>
		<reference ref_id="983982" ref_url="https://bugzilla.suse.com/983982" source="BUGZILLA"/>
		<reference ref_id="991080" ref_url="https://bugzilla.suse.com/991080" source="BUGZILLA"/>
		<reference ref_id="991466" ref_url="https://bugzilla.suse.com/991466" source="BUGZILLA"/>
		<reference ref_id="996441" ref_url="https://bugzilla.suse.com/996441" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392/" source="CVE"/>
		<reference ref_id="CVE-2016-4453" ref_url="https://www.suse.com/security/cve/CVE-2016-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-4454" ref_url="https://www.suse.com/security/cve/CVE-2016-4454/" source="CVE"/>
		<reference ref_id="CVE-2016-5105" ref_url="https://www.suse.com/security/cve/CVE-2016-5105/" source="CVE"/>
		<reference ref_id="CVE-2016-5106" ref_url="https://www.suse.com/security/cve/CVE-2016-5106/" source="CVE"/>
		<reference ref_id="CVE-2016-5107" ref_url="https://www.suse.com/security/cve/CVE-2016-5107/" source="CVE"/>
		<reference ref_id="CVE-2016-5126" ref_url="https://www.suse.com/security/cve/CVE-2016-5126/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5337" ref_url="https://www.suse.com/security/cve/CVE-2016-5337/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403/" source="CVE"/>
		<reference ref_id="CVE-2016-6490" ref_url="https://www.suse.com/security/cve/CVE-2016-6490/" source="CVE"/>
		<reference ref_id="CVE-2016-7116" ref_url="https://www.suse.com/security/cve/CVE-2016-7116/" source="CVE"/>
		<description>
kvm was updated to fix 16 security issues.

These security issues were fixed:
- CVE-2015-6815: e1000 NIC emulation support was vulnerable to an infinite loop issue. A privileged user inside guest could have used this flaw to crash the Qemu instance resulting in DoS.  (bsc#944697).
- CVE-2016-2391: The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers (bsc#967013).
- CVE-2016-2392: The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU did not properly validate USB configuration descriptor objects, which allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet (bsc#967012).
- CVE-2016-4453: The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982223).
- CVE-2016-4454: The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read (bsc#982222).
- CVE-2016-5105: The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, used an uninitialized variable, which allowed local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982017).
- CVE-2016-5106: The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982018).
- CVE-2016-5107: The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors (bsc#982019).
- CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982285).
- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982959).
- CVE-2016-5337: The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983961).
- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer (bsc#983982).
- CVE-2016-5403: The virtqueue_pop function in hw/virtio/virtio.c in QEMU allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion (bsc#991080).
- CVE-2016-6490: Infinite loop in the virtio framework. A privileged user inside the guest could have used this flaw to crash the Qemu instance on the host resulting in DoS (bsc#991466).
- CVE-2016-7116: Host directory sharing via Plan 9 File System(9pfs) was vulnerable to a directory/path traversal issue. A privileged user inside guest could have used this flaw to access undue files on the host (bsc#996441).
- CVE-2014-7815: The set_pixel_format function in ui/vnc.c in QEMU allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value (bsc#902737).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-14"/>
	<updated date="2016-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/902737">SUSE bug 902737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944697">SUSE bug 944697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967012">SUSE bug 967012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967013">SUSE bug 967013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982017">SUSE bug 982017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982018">SUSE bug 982018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982019">SUSE bug 982019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982222">SUSE bug 982222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982223">SUSE bug 982223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982285">SUSE bug 982285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982959">SUSE bug 982959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983961">SUSE bug 983961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983982">SUSE bug 983982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991080">SUSE bug 991080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991466">SUSE bug 991466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996441">SUSE bug 996441</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7815">CVE-2014-7815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6815">CVE-2015-6815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2391">CVE-2016-2391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2392">CVE-2016-2392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4453/">CVE-2016-4453 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4453">CVE-2016-4453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4454/">CVE-2016-4454 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4454">CVE-2016-4454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5105/">CVE-2016-5105 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5105">CVE-2016-5105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5106/">CVE-2016-5106 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5106">CVE-2016-5106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5107/">CVE-2016-5107 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5107">CVE-2016-5107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5126/">CVE-2016-5126 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5126">CVE-2016-5126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5238">CVE-2016-5238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5337/">CVE-2016-5337 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5337">CVE-2016-5337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5338">CVE-2016-5338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5403">CVE-2016-5403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6490/">CVE-2016-6490 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6490">CVE-2016-6490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7116/">CVE-2016-7116 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7116">CVE-2016-7116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578700" comment="kvm-1.4.2-49.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218870" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1001151" ref_url="https://bugzilla.suse.com/1001151" source="BUGZILLA"/>
		<reference ref_id="1002550" ref_url="https://bugzilla.suse.com/1002550" source="BUGZILLA"/>
		<reference ref_id="1002557" ref_url="https://bugzilla.suse.com/1002557" source="BUGZILLA"/>
		<reference ref_id="1003878" ref_url="https://bugzilla.suse.com/1003878" source="BUGZILLA"/>
		<reference ref_id="1003893" ref_url="https://bugzilla.suse.com/1003893" source="BUGZILLA"/>
		<reference ref_id="1003894" ref_url="https://bugzilla.suse.com/1003894" source="BUGZILLA"/>
		<reference ref_id="1004702" ref_url="https://bugzilla.suse.com/1004702" source="BUGZILLA"/>
		<reference ref_id="1004707" ref_url="https://bugzilla.suse.com/1004707" source="BUGZILLA"/>
		<reference ref_id="1006536" ref_url="https://bugzilla.suse.com/1006536" source="BUGZILLA"/>
		<reference ref_id="1006538" ref_url="https://bugzilla.suse.com/1006538" source="BUGZILLA"/>
		<reference ref_id="1007391" ref_url="https://bugzilla.suse.com/1007391" source="BUGZILLA"/>
		<reference ref_id="1007450" ref_url="https://bugzilla.suse.com/1007450" source="BUGZILLA"/>
		<reference ref_id="1007454" ref_url="https://bugzilla.suse.com/1007454" source="BUGZILLA"/>
		<reference ref_id="1007493" ref_url="https://bugzilla.suse.com/1007493" source="BUGZILLA"/>
		<reference ref_id="1007494" ref_url="https://bugzilla.suse.com/1007494" source="BUGZILLA"/>
		<reference ref_id="1007495" ref_url="https://bugzilla.suse.com/1007495" source="BUGZILLA"/>
		<reference ref_id="998516" ref_url="https://bugzilla.suse.com/998516" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7161" ref_url="https://www.suse.com/security/cve/CVE-2016-7161/" source="CVE"/>
		<reference ref_id="CVE-2016-7170" ref_url="https://www.suse.com/security/cve/CVE-2016-7170/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-8576" ref_url="https://www.suse.com/security/cve/CVE-2016-8576/" source="CVE"/>
		<reference ref_id="CVE-2016-8577" ref_url="https://www.suse.com/security/cve/CVE-2016-8577/" source="CVE"/>
		<reference ref_id="CVE-2016-8578" ref_url="https://www.suse.com/security/cve/CVE-2016-8578/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8909" ref_url="https://www.suse.com/security/cve/CVE-2016-8909/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9101" ref_url="https://www.suse.com/security/cve/CVE-2016-9101/" source="CVE"/>
		<reference ref_id="CVE-2016-9102" ref_url="https://www.suse.com/security/cve/CVE-2016-9102/" source="CVE"/>
		<reference ref_id="CVE-2016-9103" ref_url="https://www.suse.com/security/cve/CVE-2016-9103/" source="CVE"/>
		<reference ref_id="CVE-2016-9104" ref_url="https://www.suse.com/security/cve/CVE-2016-9104/" source="CVE"/>
		<reference ref_id="CVE-2016-9105" ref_url="https://www.suse.com/security/cve/CVE-2016-9105/" source="CVE"/>
		<reference ref_id="CVE-2016-9106" ref_url="https://www.suse.com/security/cve/CVE-2016-9106/" source="CVE"/>
		<description>

This update for kvm fixes the following issues:

- Address various security/stability issues
 * Fix OOB access in xlnx.xpx-ethernetlite emulation (CVE-2016-7161 bsc#1001151)
 * Fix OOB access in VMware SVGA emulation (CVE-2016-7170 bsc#998516)
 * Fix DOS in ColdFire Fast Ethernet Controller emulation
   (CVE-2016-7908 bsc#1002550)
 * Fix DOS in USB xHCI emulation (CVE-2016-8576 bsc#1003878)
 * Fix DOS in virtio-9pfs (CVE-2016-8578 bsc#1003894)
 * Fix DOS in virtio-9pfs (CVE-2016-9105 bsc#1007494)
 * Fix DOS in virtio-9pfs (CVE-2016-8577 bsc#1003893)
 * Plug data leak in virtio-9pfs interface (CVE-2016-9103 bsc#1007454)
 * Fix DOS in virtio-9pfs interface (CVE-2016-9102 bsc#1007450)
 * Fix DOS in virtio-9pfs (CVE-2016-9106 bsc#1007495)
 * Fix DOS in 16550A UART emulation (CVE-2016-8669 bsc#1004707)
 * Fix DOS in PC-Net II emulation (CVE-2016-7909 bsc#1002557)
 * Fix DOS in PRO100 emulation (CVE-2016-9101 bsc#1007391)
 * Fix DOS in RTL8139 emulation (CVE-2016-8910 bsc#1006538)
 * Fix DOS in Intel HDA controller emulation (CVE-2016-8909 bsc#1006536)
 * Fix DOS in virtio-9pfs (CVE-2016-9104 bsc#1007493)
 * Fix DOS in JAZZ RC4030 emulation (CVE-2016-8667 bsc#1004702)
- Patch queue updated from https://gitlab.suse.de/virtualization/qemu.git SLE11-SP3
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-20"/>
	<updated date="2016-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1001151">SUSE bug 1001151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002550">SUSE bug 1002550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002557">SUSE bug 1002557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003878">SUSE bug 1003878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003893">SUSE bug 1003893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003894">SUSE bug 1003894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004702">SUSE bug 1004702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004707">SUSE bug 1004707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006536">SUSE bug 1006536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006538">SUSE bug 1006538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007391">SUSE bug 1007391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007450">SUSE bug 1007450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007454">SUSE bug 1007454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007493">SUSE bug 1007493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007494">SUSE bug 1007494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007495">SUSE bug 1007495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998516">SUSE bug 998516</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7161/">CVE-2016-7161 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7161">CVE-2016-7161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7170/">CVE-2016-7170 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7170">CVE-2016-7170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7908">CVE-2016-7908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7909">CVE-2016-7909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8576/">CVE-2016-8576 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8576">CVE-2016-8576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8577/">CVE-2016-8577 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8577">CVE-2016-8577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8578/">CVE-2016-8578 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8578">CVE-2016-8578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8667">CVE-2016-8667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8669">CVE-2016-8669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8909/">CVE-2016-8909 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8909">CVE-2016-8909 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8910">CVE-2016-8910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9101/">CVE-2016-9101 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9101">CVE-2016-9101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9102/">CVE-2016-9102 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9102">CVE-2016-9102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9103/">CVE-2016-9103 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9103">CVE-2016-9103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9104/">CVE-2016-9104 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9104">CVE-2016-9104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9105/">CVE-2016-9105 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9105">CVE-2016-9105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9106/">CVE-2016-9106 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9106">CVE-2016-9106 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578701" comment="kvm-1.4.2-52.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218871" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1013285" ref_url="https://bugzilla.suse.com/1013285" source="BUGZILLA"/>
		<reference ref_id="1014109" ref_url="https://bugzilla.suse.com/1014109" source="BUGZILLA"/>
		<reference ref_id="1014111" ref_url="https://bugzilla.suse.com/1014111" source="BUGZILLA"/>
		<reference ref_id="1014702" ref_url="https://bugzilla.suse.com/1014702" source="BUGZILLA"/>
		<reference ref_id="1015048" ref_url="https://bugzilla.suse.com/1015048" source="BUGZILLA"/>
		<reference ref_id="1016779" ref_url="https://bugzilla.suse.com/1016779" source="BUGZILLA"/>
		<reference ref_id="1020427" ref_url="https://bugzilla.suse.com/1020427" source="BUGZILLA"/>
		<reference ref_id="1021129" ref_url="https://bugzilla.suse.com/1021129" source="BUGZILLA"/>
		<reference ref_id="1021741" ref_url="https://bugzilla.suse.com/1021741" source="BUGZILLA"/>
		<reference ref_id="1023004" ref_url="https://bugzilla.suse.com/1023004" source="BUGZILLA"/>
		<reference ref_id="1023053" ref_url="https://bugzilla.suse.com/1023053" source="BUGZILLA"/>
		<reference ref_id="1023907" ref_url="https://bugzilla.suse.com/1023907" source="BUGZILLA"/>
		<reference ref_id="1024972" ref_url="https://bugzilla.suse.com/1024972" source="BUGZILLA"/>
		<reference ref_id="1025109" ref_url="https://bugzilla.suse.com/1025109" source="BUGZILLA"/>
		<reference ref_id="1028184" ref_url="https://bugzilla.suse.com/1028184" source="BUGZILLA"/>
		<reference ref_id="1028656" ref_url="https://bugzilla.suse.com/1028656" source="BUGZILLA"/>
		<reference ref_id="1030624" ref_url="https://bugzilla.suse.com/1030624" source="BUGZILLA"/>
		<reference ref_id="1031051" ref_url="https://bugzilla.suse.com/1031051" source="BUGZILLA"/>
		<reference ref_id="1034044" ref_url="https://bugzilla.suse.com/1034044" source="BUGZILLA"/>
		<reference ref_id="1034866" ref_url="https://bugzilla.suse.com/1034866" source="BUGZILLA"/>
		<reference ref_id="1034908" ref_url="https://bugzilla.suse.com/1034908" source="BUGZILLA"/>
		<reference ref_id="1035406" ref_url="https://bugzilla.suse.com/1035406" source="BUGZILLA"/>
		<reference ref_id="1035950" ref_url="https://bugzilla.suse.com/1035950" source="BUGZILLA"/>
		<reference ref_id="1037242" ref_url="https://bugzilla.suse.com/1037242" source="BUGZILLA"/>
		<reference ref_id="1038396" ref_url="https://bugzilla.suse.com/1038396" source="BUGZILLA"/>
		<reference ref_id="1039495" ref_url="https://bugzilla.suse.com/1039495" source="BUGZILLA"/>
		<reference ref_id="1042159" ref_url="https://bugzilla.suse.com/1042159" source="BUGZILLA"/>
		<reference ref_id="1042800" ref_url="https://bugzilla.suse.com/1042800" source="BUGZILLA"/>
		<reference ref_id="1042801" ref_url="https://bugzilla.suse.com/1042801" source="BUGZILLA"/>
		<reference ref_id="1043296" ref_url="https://bugzilla.suse.com/1043296" source="BUGZILLA"/>
		<reference ref_id="1045035" ref_url="https://bugzilla.suse.com/1045035" source="BUGZILLA"/>
		<reference ref_id="1046636" ref_url="https://bugzilla.suse.com/1046636" source="BUGZILLA"/>
		<reference ref_id="1047674" ref_url="https://bugzilla.suse.com/1047674" source="BUGZILLA"/>
		<reference ref_id="1048902" ref_url="https://bugzilla.suse.com/1048902" source="BUGZILLA"/>
		<reference ref_id="1049381" ref_url="https://bugzilla.suse.com/1049381" source="BUGZILLA"/>
		<reference ref_id="1049785" ref_url="https://bugzilla.suse.com/1049785" source="BUGZILLA"/>
		<reference ref_id="1056334" ref_url="https://bugzilla.suse.com/1056334" source="BUGZILLA"/>
		<reference ref_id="1057585" ref_url="https://bugzilla.suse.com/1057585" source="BUGZILLA"/>
		<reference ref_id="1062069" ref_url="https://bugzilla.suse.com/1062069" source="BUGZILLA"/>
		<reference ref_id="1063122" ref_url="https://bugzilla.suse.com/1063122" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155/" source="CVE"/>
		<reference ref_id="CVE-2016-9602" ref_url="https://www.suse.com/security/cve/CVE-2016-9602/" source="CVE"/>
		<reference ref_id="CVE-2016-9603" ref_url="https://www.suse.com/security/cve/CVE-2016-9603/" source="CVE"/>
		<reference ref_id="CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776/" source="CVE"/>
		<reference ref_id="CVE-2016-9907" ref_url="https://www.suse.com/security/cve/CVE-2016-9907/" source="CVE"/>
		<reference ref_id="CVE-2016-9911" ref_url="https://www.suse.com/security/cve/CVE-2016-9911/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-10806" ref_url="https://www.suse.com/security/cve/CVE-2017-10806/" source="CVE"/>
		<reference ref_id="CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2017-14167" ref_url="https://www.suse.com/security/cve/CVE-2017-14167/" source="CVE"/>
		<reference ref_id="CVE-2017-15038" ref_url="https://www.suse.com/security/cve/CVE-2017-15038/" source="CVE"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-5579" ref_url="https://www.suse.com/security/cve/CVE-2017-5579/" source="CVE"/>
		<reference ref_id="CVE-2017-5856" ref_url="https://www.suse.com/security/cve/CVE-2017-5856/" source="CVE"/>
		<reference ref_id="CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898/" source="CVE"/>
		<reference ref_id="CVE-2017-5973" ref_url="https://www.suse.com/security/cve/CVE-2017-5973/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-7471" ref_url="https://www.suse.com/security/cve/CVE-2017-7471/" source="CVE"/>
		<reference ref_id="CVE-2017-7493" ref_url="https://www.suse.com/security/cve/CVE-2017-7493/" source="CVE"/>
		<reference ref_id="CVE-2017-7718" ref_url="https://www.suse.com/security/cve/CVE-2017-7718/" source="CVE"/>
		<reference ref_id="CVE-2017-7980" ref_url="https://www.suse.com/security/cve/CVE-2017-7980/" source="CVE"/>
		<reference ref_id="CVE-2017-8086" ref_url="https://www.suse.com/security/cve/CVE-2017-8086/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330/" source="CVE"/>
		<reference ref_id="CVE-2017-9373" ref_url="https://www.suse.com/security/cve/CVE-2017-9373/" source="CVE"/>
		<reference ref_id="CVE-2017-9375" ref_url="https://www.suse.com/security/cve/CVE-2017-9375/" source="CVE"/>
		<reference ref_id="CVE-2017-9503" ref_url="https://www.suse.com/security/cve/CVE-2017-9503/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<description>

This update for kvm fixes several issues.

These security issues were fixed:

- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024972)
- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)
- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013285)
- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in 'ehci_init_transfer'. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014111)
- CVE-2016-9907: The USB redirector usb-guest support was vulnerable to a memory leakage flaw when destroying the USB redirector in 'usbredir_handle_destroy'.  A guest user/process could have used this issue to leak host memory, resulting in DoS for a host (bsc#1014109)
- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1014702)
- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1014702)
- CVE-2017-5898: The CCID Card device emulator support was vulnerable to an integer overflow allowing a privileged user inside the guest to crash the Qemu process resulting in DoS (bnc#1023907)
- CVE-2016-10155: The virtual hardware watchdog 'wdt_i6300esb' was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1021129)
- CVE-2017-5856: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a memory leakage issue allowing a privileged user to leak host memory resulting in DoS (bsc#1023053)
- CVE-2016-9602: The VirtFS host directory sharing via Plan 9 File System(9pfs) support was vulnerable to an improper link following issue which allowed a privileged user inside guest to access host file system beyond the shared folder and potentially escalating their privileges on a host (bsc#1020427)
- CVE-2016-9603: A privileged user within the guest VM could have caused a heap overflow in the device model process, potentially escalating their privileges to that of the device model process (bsc#1028656)
- CVE-2017-10664: qemu-nbd did not ignore SIGPIPE, which allowed remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt (bsc#1046636)
- CVE-2017-10806: Stack-based buffer overflow allowed local guest OS users to cause a denial of service (QEMU process crash) via vectors related to logging debug messages (bsc#1047674)
- CVE-2017-11334: The address_space_write_continue function allowed local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area (bsc#1048902)
- CVE-2017-11434: The dhcp_decode function in slirp/bootp.c allowed local guest OS users to cause a denial of service (out-of-bounds read) via a crafted DHCP options string (bsc#1049381)
- CVE-2017-13672: The VGA display emulator support allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update (bsc#1056334)
- CVE-2017-14167: Integer overflow in the load_multiboot function allowed local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write (bsc#1057585)
- CVE-2017-15038: Race condition in the v9fs_xattrwalk function local guest OS users to obtain sensitive information from host heap memory via vectors related to reading extended attributes (bsc#1062069)
- CVE-2017-15289: The mode4and5 write functions allowed local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation (bsc#1063122)
- CVE-2017-5579: The 16550A UART serial device emulation support was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1021741)
- CVE-2017-5973: A infinite loop while doing control transfer in xhci_kick_epctx allowed privileged user inside the guest to crash the host process resulting in DoS (bsc#1025109)
- CVE-2017-6505: The ohci_service_ed_list function allowed local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors (bsc#1028184)
- CVE-2017-7471: The VirtFS host directory sharing via Plan 9 File System(9pfs) support was vulnerable to an improper access control issue which allowed a privileged user inside guest to access host file system beyond the shared folder and potentially escalating their privileges on a host (bsc#1034866)
- CVE-2017-7493: The VirtFS, host directory sharing via Plan 9 File System(9pfs) support, was vulnerable to an improper access control issue. It could occur while accessing virtfs metadata files in mapped-file security mode. A guest user could have used this flaw to escalate their privileges inside guest (bsc#1039495)
- CVE-2017-7718: hw/display/cirrus_vga_rop.h allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions (bsc#1034908)
- CVE-2017-7980: An out-of-bounds r/w access issues in the Cirrus CLGD 54xx VGA Emulator support allowed privileged user inside guest to use this flaw to crash the Qemu process resulting in DoS or potentially execute arbitrary code on a host with privileges of Qemu process on the host (bsc#1035406)
- CVE-2017-8086: A memory leak in the v9fs_list_xattr function in hw/9pfs/9p-xattr.c allowed local guest OS privileged users to cause a denial of service (memory consumption) via vectors involving the orig_value variable (bsc#1035950)
- CVE-2017-8309: Memory leak in the audio/audio.c allowed remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture (bsc#1037242)
- CVE-2017-9330: USB OHCI Emulation in qemu allowed local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value (bsc#1042159)
- CVE-2017-9373: The IDE AHCI Emulation support was vulnerable to a host memory leakage issue, which allowed a privileged user inside guest to leak host memory resulting in DoS (bsc#1042801)
- CVE-2017-9375: The USB xHCI controller emulator support was vulnerable to an infinite recursive call loop issue, which allowed a privileged user inside guest to crash the Qemu process resulting in DoS (bsc#1042800)
- CVE-2017-9503: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a null pointer dereference issue which allowed a privileged user inside guest to crash the Qemu process on the host resulting in DoS (bsc#1043296)
* Fix privilege escalation in TCG mode (bsc#1030624)

These non-security issues were fixed:

- bsc#1045035: Fixed regression introduced by previous virtfs security fixes
- bsc#1038396: Fixed 12 tempest tests
- bsc#1034044: Prevent KVM guests stuck when waiting for sg_io() completion
- bsc#1031051: Prevent I/O errors when using pvmove with disk device=lun
- bsc#1049785: Make virsh dump output readable by crash
- bsc#1015048: Fixed virtio interface failure 
- bsc#1016779: Fixed graphical update errors introduced by previous security fix
- Fixed various inaccuracies in cirrus vga device emulation
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-24"/>
	<updated date="2017-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013285">SUSE bug 1013285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014109">SUSE bug 1014109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014111">SUSE bug 1014111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014702">SUSE bug 1014702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015048">SUSE bug 1015048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016779">SUSE bug 1016779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020427">SUSE bug 1020427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021129">SUSE bug 1021129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021741">SUSE bug 1021741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023053">SUSE bug 1023053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023907">SUSE bug 1023907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024972">SUSE bug 1024972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025109">SUSE bug 1025109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028184">SUSE bug 1028184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028656">SUSE bug 1028656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030624">SUSE bug 1030624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031051">SUSE bug 1031051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034044">SUSE bug 1034044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034866">SUSE bug 1034866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034908">SUSE bug 1034908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035406">SUSE bug 1035406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035950">SUSE bug 1035950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037242">SUSE bug 1037242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038396">SUSE bug 1038396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039495">SUSE bug 1039495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042159">SUSE bug 1042159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042800">SUSE bug 1042800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042801">SUSE bug 1042801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043296">SUSE bug 1043296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045035">SUSE bug 1045035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046636">SUSE bug 1046636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047674">SUSE bug 1047674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048902">SUSE bug 1048902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049381">SUSE bug 1049381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049785">SUSE bug 1049785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056334">SUSE bug 1056334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057585">SUSE bug 1057585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062069">SUSE bug 1062069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063122">SUSE bug 1063122</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10155">CVE-2016-10155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9602/">CVE-2016-9602 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9602">CVE-2016-9602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9603/">CVE-2016-9603 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9603">CVE-2016-9603 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9776">CVE-2016-9776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9907/">CVE-2016-9907 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9907">CVE-2016-9907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9911/">CVE-2016-9911 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9911">CVE-2016-9911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9921">CVE-2016-9921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9922">CVE-2016-9922 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10664">CVE-2017-10664 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10806/">CVE-2017-10806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10806">CVE-2017-10806 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11334">CVE-2017-11334 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11434">CVE-2017-11434 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13672">CVE-2017-13672 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14167/">CVE-2017-14167 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14167">CVE-2017-14167 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15038/">CVE-2017-15038 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15038">CVE-2017-15038 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15289">CVE-2017-15289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2615">CVE-2017-2615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2620">CVE-2017-2620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5579/">CVE-2017-5579 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5579">CVE-2017-5579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5856/">CVE-2017-5856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5856">CVE-2017-5856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5898">CVE-2017-5898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5973/">CVE-2017-5973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5973">CVE-2017-5973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6505">CVE-2017-6505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7471/">CVE-2017-7471 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7471">CVE-2017-7471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7493/">CVE-2017-7493 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7493">CVE-2017-7493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7718/">CVE-2017-7718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7718">CVE-2017-7718 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7980/">CVE-2017-7980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7980">CVE-2017-7980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8086/">CVE-2017-8086 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8086">CVE-2017-8086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8309">CVE-2017-8309 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9330">CVE-2017-9330 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9373/">CVE-2017-9373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9373">CVE-2017-9373 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9375/">CVE-2017-9375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9375">CVE-2017-9375 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9503/">CVE-2017-9503 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9503">CVE-2017-9503 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578702" comment="kvm-1.4.2-53.11.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578702" comment="kvm-1.4.2-53.11.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218872" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1026612" ref_url="https://bugzilla.suse.com/1026612" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2633" ref_url="https://www.suse.com/security/cve/CVE-2017-2633/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003575.html" source="SUSE-SU"/>
		<description>


This update for kvm fixes the following issues:

A security flaw mitigation has been applied:

- CVE-2017-5715: QEMU was updated to allow passing through new MSR and CPUID flags from 
  the host VM to the CPU, to allow enabling/disabling branch prediction features in the
  Intel CPU. (bsc#1068032)

Also a security fix has been applied:

- CVE-2017-2633: Fix various out of bounds access issues in the QEMU vnc infrastructure (bsc#1026612)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-08"/>
	<updated date="2018-01-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1026612">SUSE bug 1026612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2633/">CVE-2017-2633 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2633">CVE-2017-2633 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578703" comment="kvm-1.4.2-53.14.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578703" comment="kvm-1.4.2-53.14.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218873" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1076114" ref_url="https://bugzilla.suse.com/1076114" source="BUGZILLA"/>
		<reference ref_id="1076179" ref_url="https://bugzilla.suse.com/1076179" source="BUGZILLA"/>
		<reference ref_id="1082276" ref_url="https://bugzilla.suse.com/1082276" source="BUGZILLA"/>
		<reference ref_id="1083291" ref_url="https://bugzilla.suse.com/1083291" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18030" ref_url="https://www.suse.com/security/cve/CVE-2017-18030/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-5683" ref_url="https://www.suse.com/security/cve/CVE-2018-5683/" source="CVE"/>
		<reference ref_id="CVE-2018-7550" ref_url="https://www.suse.com/security/cve/CVE-2018-7550/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004054.html" source="SUSE-SU"/>
		<description>

  
This update for kvm fixes the following issues:

This update has the next round of Spectre v2 related patches,
which now integrates with corresponding changes in libvirt. A
January 2018 release of qemu initially addressed the Spectre v2
vulnerability for KVM guests by exposing the spec-ctrl feature
for all x86 vcpu types, which was the quick and dirty approach,
but not the proper solution. We remove that initial patch and now
rely on patches from upstream. This update defines spec_ctrl and
ibpb cpu feature flags as well as new cpu models which are clones
of existing models with either -IBRS or -IBPB added to the end of
the model name. These new vcpu models explicitly include the new
feature(s), whereas the feature flags can be added to the cpu
parameter as with other features. In short, for continued Spectre
v2 protection, ensure that either the appropriate cpu feature
flag is added to the QEMU command-line, or one of the new cpu
models is used. Although migration from older versions is
supported, the new cpu features won't be properly exposed to the
guest until it is restarted with the cpu features explicitly
added. A reboot is insufficient.

A warning patch is added which attempts to detect a migration
from a qemu version which had the quick and dirty fix (it only
detects certain cases, but hopefully is helpful.)

For additional information on Spectre v2 as it relates to QEMU,
see:
	https://www.qemu.org/2018/02/14/qemu-2-11-1-and-spectre-update/

(CVE-2017-5715 bsc#1068032)

A patch is added to continue to detect Spectre v2 mitigation
features (as shown by cpuid), and if found provide that feature
to guests, even if running on older KVM (kernel) versions which
do not yet expose that feature to QEMU. (bsc#1082276)

Additional security fixes:

- CVE-2018-5683: An out-of-bounds read in vga_draw_text routine was fixed which could lead to crashes or information leakage. (bsc#1076114)
- CVE-2018-7550: multiboot OOB access while loading kernel image was fixed that could lead to crashes (bsc#1083291)
- CVE-2017-18030: An out-of-bounds access in cirrus_invalidate_region routine could lead to crashes or information leakage (bsc#1076179)

- Eliminate bogus use of CPUID_7_0_EDX_PRED_CMD which we've
  carried since the initial Spectre v2 patch was added. EDX bit
  27 of CPUID Leaf 07H, Sub-leaf 0 provides status on STIBP, and
  not the PRED_CMD MSR. Exposing the STIBP CPUID feature bit to the
  guest is wrong in general, since the VM doesn't directly control
  the scheduling of physical hyperthreads. This is left strictly to
  the L0 hypervisor.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076114">SUSE bug 1076114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076179">SUSE bug 1076179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082276">SUSE bug 1082276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083291">SUSE bug 1083291</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18030/">CVE-2017-18030 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18030">CVE-2017-18030 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5683/">CVE-2018-5683 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5683">CVE-2018-5683 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7550/">CVE-2018-7550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7550">CVE-2018-7550 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578704" comment="kvm-1.4.2-53.17.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578704" comment="kvm-1.4.2-53.17.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218874" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004083.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following issues:

This security issue was fixed:

- CVE-2018-3639: Spectre v4 vulnerability mitigation support for KVM guests (bsc#1092885).

  Systems with microprocessors utilizing speculative execution and speculative
  execution of memory reads before the addresses of all prior memory writes are
  known may allow unauthorized disclosure of information to an attacker with
  local user access via a side-channel analysis.

  This patch permits the new x86 cpu feature flag named 'ssbd' to be
  presented to the guest, given that the host has this feature, and
  KVM exposes it to the guest as well.

  For this feature to be enabled please use the qemu commandline
  -cpu $MODEL,+spec-ctrl,+ssbd
  so the guest OS can take advantage of the feature.

  spec-ctrl and ssbd support is also required in the host.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-23"/>
	<updated date="2018-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578705" comment="kvm-1.4.2-53.20.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578705" comment="kvm-1.4.2-53.20.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218875" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="1096223" ref_url="https://bugzilla.suse.com/1096223" source="BUGZILLA"/>
		<reference ref_id="1098735" ref_url="https://bugzilla.suse.com/1098735" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004532.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following security issues:

- CVE-2018-12617: qmp_guest_file_read had an integer overflow that could have
  been exploited by sending a crafted QMP command (including guest-file-read with
  a large count value) to the agent via the listening socket causing DoS
  (bsc#1098735)
- CVE-2018-11806: Prevent heap-based buffer overflow via incoming fragmented
  datagrams (bsc#1096223)

With this release the mitigations for Spectre v4 are moved the the patches from
upstream (CVE-2018-3639, bsc#1092885).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-04"/>
	<updated date="2018-09-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096223">SUSE bug 1096223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098735">SUSE bug 1098735</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11806">CVE-2018-11806 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12617">CVE-2018-12617 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578706" comment="kvm-1.4.2-53.23.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578706" comment="kvm-1.4.2-53.23.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218876" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1106222" ref_url="https://bugzilla.suse.com/1106222" source="BUGZILLA"/>
		<reference ref_id="1110910" ref_url="https://bugzilla.suse.com/1110910" source="BUGZILLA"/>
		<reference ref_id="1111006" ref_url="https://bugzilla.suse.com/1111006" source="BUGZILLA"/>
		<reference ref_id="1111010" ref_url="https://bugzilla.suse.com/1111010" source="BUGZILLA"/>
		<reference ref_id="1111013" ref_url="https://bugzilla.suse.com/1111013" source="BUGZILLA"/>
		<reference ref_id="1112185" ref_url="https://bugzilla.suse.com/1112185" source="BUGZILLA"/>
		<reference ref_id="1114422" ref_url="https://bugzilla.suse.com/1114422" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10839" ref_url="https://www.suse.com/security/cve/CVE-2018-10839/" source="CVE"/>
		<reference ref_id="CVE-2018-15746" ref_url="https://www.suse.com/security/cve/CVE-2018-15746/" source="CVE"/>
		<reference ref_id="CVE-2018-17958" ref_url="https://www.suse.com/security/cve/CVE-2018-17958/" source="CVE"/>
		<reference ref_id="CVE-2018-17962" ref_url="https://www.suse.com/security/cve/CVE-2018-17962/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-18438" ref_url="https://www.suse.com/security/cve/CVE-2018-18438/" source="CVE"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004921.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following issues:

Security issues fixed:

- CVE-2018-10839: Fixed NE2000 NIC emulation support that is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS (bsc#1110910).
- CVE-2018-15746: Fixed qemu-seccomp.c that might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread (bsc#1106222).
- CVE-2018-17958: Fixed a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used (bsc#1111006).
- CVE-2018-17962: Fixed a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used (bsc#1111010).
- CVE-2018-17963: Fixed qemu_deliver_packet_iov in net/net.c that accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact. (bsc#1111013)
- CVE-2018-18849: Fixed an out of bounds memory access issue that was found in the LSI53C895A SCSI Host Bus Adapter emulation while writing a message in lsi_do_msgin. It could occur during migration if the 'msg_len' field has an invalid value. A user/process could use this flaw to crash the Qemu process resulting in DoS (bsc#1114422).
- CVE-2018-18438: Fixed integer overflows because IOReadHandler and its associated functions use a signed integer data type for a size value (bnc#1112185).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-05"/>
	<updated date="2018-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106222">SUSE bug 1106222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110910">SUSE bug 1110910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111006">SUSE bug 1111006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111010">SUSE bug 1111010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111013">SUSE bug 1111013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112185">SUSE bug 1112185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114422">SUSE bug 1114422</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10839/">CVE-2018-10839 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10839">CVE-2018-10839 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15746/">CVE-2018-15746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15746">CVE-2018-15746 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17958/">CVE-2018-17958 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17958">CVE-2018-17958 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17962/">CVE-2018-17962 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17962">CVE-2018-17962 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17963">CVE-2018-17963 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18438/">CVE-2018-18438 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18438">CVE-2018-18438 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18849">CVE-2018-18849 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578707" comment="kvm-1.4.2-53.26.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578707" comment="kvm-1.4.2-53.26.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218877" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1109544" ref_url="https://bugzilla.suse.com/1109544" source="BUGZILLA"/>
		<reference ref_id="1116717" ref_url="https://bugzilla.suse.com/1116717" source="BUGZILLA"/>
		<reference ref_id="1117275" ref_url="https://bugzilla.suse.com/1117275" source="BUGZILLA"/>
		<reference ref_id="1123156" ref_url="https://bugzilla.suse.com/1123156" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19364" ref_url="https://www.suse.com/security/cve/CVE-2018-19364/" source="CVE"/>
		<reference ref_id="CVE-2018-19489" ref_url="https://www.suse.com/security/cve/CVE-2018-19489/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<description>
This update for kvm fixes the following issues:

Security issues fixed:

- CVE-2019-6778: Fixed a heap buffer overflow issue in the SLiRP networking implementation (bsc#1123156).
- CVE-2018-19489: Fixed a denial of service vulnerability in virtfs (bsc#1117275).
- CVE-2018-19364: Fixed a use-after-free if the virtfs interface resulting in a denial of service (bsc#1116717).

Non-security issue fixed:

- Fixed LAPIC TSC deadline timer save/restore (bsc#1109544)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-08"/>
	<updated date="2019-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109544">SUSE bug 1109544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116717">SUSE bug 1116717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117275">SUSE bug 1117275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19364/">CVE-2018-19364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19364">CVE-2018-19364 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19489/">CVE-2018-19489 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19489">CVE-2018-19489 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6778">CVE-2019-6778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578708" comment="kvm-1.4.2-53.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218878" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1129622" ref_url="https://bugzilla.suse.com/1129622" source="BUGZILLA"/>
		<reference ref_id="1130675" ref_url="https://bugzilla.suse.com/1130675" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<description>
This update for kvm fixes the following issues:

- CVE-2019-9824: Fixed an information leak in slirp (bsc#1129622)
- CVE-2018-20815: Fix DOS possibility in device tree processing (bsc#1130675)
- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091: Added x86 cpu feature 'md-clear' (bsc#1111331)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-21"/>
	<updated date="2019-05-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129622">SUSE bug 1129622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130675">SUSE bug 1130675</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20815">CVE-2018-20815 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9824">CVE-2019-9824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578709" comment="kvm-1.4.2-53.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218879" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1135902" ref_url="https://bugzilla.suse.com/1135902" source="BUGZILLA"/>
		<reference ref_id="1140402" ref_url="https://bugzilla.suse.com/1140402" source="BUGZILLA"/>
		<reference ref_id="1143794" ref_url="https://bugzilla.suse.com/1143794" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12155" ref_url="https://www.suse.com/security/cve/CVE-2019-12155/" source="CVE"/>
		<reference ref_id="CVE-2019-13164" ref_url="https://www.suse.com/security/cve/CVE-2019-13164/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<description>
This update for kvm fixes the following issues:

Security issues fixed:

- CVE-2019-14378: Security fix for heap overflow in ip_reass on big packet input (bsc#1143794).
- CVE-2019-12155: Security fix for null pointer dereference while releasing spice resources (bsc#1135902).
- CVE-2019-13164: Security fix for qemu-bridge-helper ACL can be bypassed when names are too long (bsc#1140402).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-21"/>
	<updated date="2019-08-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135902">SUSE bug 1135902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140402">SUSE bug 1140402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143794">SUSE bug 1143794</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12155/">CVE-2019-12155 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12155">CVE-2019-12155 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13164/">CVE-2019-13164 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13164">CVE-2019-13164 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14378">CVE-2019-14378 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578710" comment="kvm-1.4.2-53.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218880" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1123156" ref_url="https://bugzilla.suse.com/1123156" source="BUGZILLA"/>
		<reference ref_id="1146873" ref_url="https://bugzilla.suse.com/1146873" source="BUGZILLA"/>
		<reference ref_id="1149811" ref_url="https://bugzilla.suse.com/1149811" source="BUGZILLA"/>
		<reference ref_id="1161066" ref_url="https://bugzilla.suse.com/1161066" source="BUGZILLA"/>
		<reference ref_id="1163018" ref_url="https://bugzilla.suse.com/1163018" source="BUGZILLA"/>
		<reference ref_id="1170940" ref_url="https://bugzilla.suse.com/1170940" source="BUGZILLA"/>
		<reference ref_id="1172383" ref_url="https://bugzilla.suse.com/1172383" source="BUGZILLA"/>
		<reference ref_id="1172384" ref_url="https://bugzilla.suse.com/1172384" source="BUGZILLA"/>
		<reference ref_id="1172385" ref_url="https://bugzilla.suse.com/1172385" source="BUGZILLA"/>
		<reference ref_id="1172478" ref_url="https://bugzilla.suse.com/1172478" source="BUGZILLA"/>
		<reference ref_id="1175441" ref_url="https://bugzilla.suse.com/1175441" source="BUGZILLA"/>
		<reference ref_id="1176673" ref_url="https://bugzilla.suse.com/1176673" source="BUGZILLA"/>
		<reference ref_id="1176682" ref_url="https://bugzilla.suse.com/1176682" source="BUGZILLA"/>
		<reference ref_id="1176684" ref_url="https://bugzilla.suse.com/1176684" source="BUGZILLA"/>
		<reference ref_id="1178934" ref_url="https://bugzilla.suse.com/1178934" source="BUGZILLA"/>
		<reference ref_id="1179467" ref_url="https://bugzilla.suse.com/1179467" source="BUGZILLA"/>
		<reference ref_id="1181108" ref_url="https://bugzilla.suse.com/1181108" source="BUGZILLA"/>
		<reference ref_id="1182137" ref_url="https://bugzilla.suse.com/1182137" source="BUGZILLA"/>
		<reference ref_id="1182425" ref_url="https://bugzilla.suse.com/1182425" source="BUGZILLA"/>
		<reference ref_id="1182577" ref_url="https://bugzilla.suse.com/1182577" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3689" ref_url="https://www.suse.com/security/cve/CVE-2014-3689/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2020-12829" ref_url="https://www.suse.com/security/cve/CVE-2020-12829/" source="CVE"/>
		<reference ref_id="CVE-2020-13361" ref_url="https://www.suse.com/security/cve/CVE-2020-13361/" source="CVE"/>
		<reference ref_id="CVE-2020-13362" ref_url="https://www.suse.com/security/cve/CVE-2020-13362/" source="CVE"/>
		<reference ref_id="CVE-2020-13765" ref_url="https://www.suse.com/security/cve/CVE-2020-13765/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<reference ref_id="CVE-2020-25084" ref_url="https://www.suse.com/security/cve/CVE-2020-25084/" source="CVE"/>
		<reference ref_id="CVE-2020-25624" ref_url="https://www.suse.com/security/cve/CVE-2020-25624/" source="CVE"/>
		<reference ref_id="CVE-2020-25625" ref_url="https://www.suse.com/security/cve/CVE-2020-25625/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29443" ref_url="https://www.suse.com/security/cve/CVE-2020-29443/" source="CVE"/>
		<reference ref_id="CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="CVE-2021-20181" ref_url="https://www.suse.com/security/cve/CVE-2021-20181/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<description>
This update for kvm fixes the following issues:

- Fix OOB read and write due to integer overflow in sm501_2d_operation() in hw/display/sm501.c (CVE-2020-12829, bsc#1172385)
- Fix OOB access possibility in MegaRAID SAS 8708EM2 emulation (CVE-2020-13362 bsc#1172383)
- Fix use-after-free in usb xhci packet handling (CVE-2020-25723, bsc#1178934)
- Fix use-after-free in usb ehci packet handling (CVE-2020-25084, bsc#1176673)
- Fix OOB access in usb hcd-ohci emulation (CVE-2020-25624, bsc#1176682)
- Fix infinite loop (DoS) in usb hcd-ohci emulation (CVE-2020-25625, bsc#1176684)
- Fix OOB access in atapi emulation (CVE-2020-29443, bsc#1181108)
- Fix DoS in e1000 emulated device (CVE-2021-20257 bsc#1182577)
- Fix OOB access in SLIRP ARP packet processing (CVE-2020-29130, bsc#1179467)
- Fix OOB access while processing USB packets (CVE-2020-14364 bsc#1175441)
- Fix potential privilege escalation in virtfs (CVE-2021-20181 bsc#1182137)
- Fix package scripts to not use hard coded paths for temporary working directories and log files (bsc#1182425)
- Fix use-after-free in slirp (CVE-2019-15890 bsc#1149811)
- Fix for similar problems as for the original fix prompting this issue (CVE-2019-6778 bsc#1123156)
- Fix potential OOB accesses in slirp (CVE-2020-8608 bsc#1163018 CVE-2020-7039 bsc#1161066)
- Fix use after free in slirp (CVE-2020-1983 bsc#1170940)
- Fix potential DOS in lsi scsi controller emulation (CVE-2019-12068 bsc#1146873)
- Fix OOB access possibility in ES1370 audio device emulation (CVE-2020-13361 bsc#1172384)
- Fix OOB access in ROM loading (CVE-2020-13765 bsc#1172478)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-23"/>
	<updated date="2021-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146873">SUSE bug 1146873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149811">SUSE bug 1149811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161066">SUSE bug 1161066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163018">SUSE bug 1163018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170940">SUSE bug 1170940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172383">SUSE bug 1172383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172384">SUSE bug 1172384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172385">SUSE bug 1172385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172478">SUSE bug 1172478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175441">SUSE bug 1175441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176673">SUSE bug 1176673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176682">SUSE bug 1176682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176684">SUSE bug 1176684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178934">SUSE bug 1178934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179467">SUSE bug 1179467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181108">SUSE bug 1181108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182137">SUSE bug 1182137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182425">SUSE bug 1182425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182577">SUSE bug 1182577</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3689/">CVE-2014-3689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3689">CVE-2014-3689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1779">CVE-2015-1779 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12068">CVE-2019-12068 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15890">CVE-2019-15890 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6778">CVE-2019-6778 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12829/">CVE-2020-12829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12829">CVE-2020-12829 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13361/">CVE-2020-13361 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13361">CVE-2020-13361 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13362/">CVE-2020-13362 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13362">CVE-2020-13362 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13765/">CVE-2020-13765 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13765">CVE-2020-13765 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1983">CVE-2020-1983 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25084/">CVE-2020-25084 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25084">CVE-2020-25084 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25624/">CVE-2020-25624 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25624">CVE-2020-25624 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25625/">CVE-2020-25625 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25625">CVE-2020-25625 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25723">CVE-2020-25723 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29130">CVE-2020-29130 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-29443/">CVE-2020-29443 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29443">CVE-2020-29443 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7039">CVE-2020-7039 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20181/">CVE-2021-20181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20181">CVE-2021-20181 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578711" comment="kvm-1.4.2-53.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218881" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1031692" ref_url="https://bugzilla.suse.com/1031692" source="BUGZILLA"/>
		<reference ref_id="1173612" ref_url="https://bugzilla.suse.com/1173612" source="BUGZILLA"/>
		<reference ref_id="1174386" ref_url="https://bugzilla.suse.com/1174386" source="BUGZILLA"/>
		<reference ref_id="1178683" ref_url="https://bugzilla.suse.com/1178683" source="BUGZILLA"/>
		<reference ref_id="1180523" ref_url="https://bugzilla.suse.com/1180523" source="BUGZILLA"/>
		<reference ref_id="1181933" ref_url="https://bugzilla.suse.com/1181933" source="BUGZILLA"/>
		<reference ref_id="1186473" ref_url="https://bugzilla.suse.com/1186473" source="BUGZILLA"/>
		<reference ref_id="1187364" ref_url="https://bugzilla.suse.com/1187364" source="BUGZILLA"/>
		<reference ref_id="1187367" ref_url="https://bugzilla.suse.com/1187367" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11947" ref_url="https://www.suse.com/security/cve/CVE-2020-11947/" source="CVE"/>
		<reference ref_id="CVE-2020-15469" ref_url="https://www.suse.com/security/cve/CVE-2020-15469/" source="CVE"/>
		<reference ref_id="CVE-2020-15863" ref_url="https://www.suse.com/security/cve/CVE-2020-15863/" source="CVE"/>
		<reference ref_id="CVE-2020-25707" ref_url="https://www.suse.com/security/cve/CVE-2020-25707/" source="CVE"/>
		<reference ref_id="CVE-2021-20221" ref_url="https://www.suse.com/security/cve/CVE-2021-20221/" source="CVE"/>
		<reference ref_id="CVE-2021-3416" ref_url="https://www.suse.com/security/cve/CVE-2021-3416/" source="CVE"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<description>
This update for kvm fixes the following issues:

- CVE-2021-3594: invalid pointer initialization may lead to information disclosure in slirp (udp) (bsc#1187367)
- CVE-2021-3592: invalid pointer initialization may lead to information disclosure (bootp). (bsc#1187364)
- CVE-2021-3416: infinite loop in loopback mode may lead to stack overflow. (bsc#1186473)
- CVE-2020-15469: MMIO ops null pointer dereference may lead to DoS. (bsc#1173612)
- CVE-2020-11947: iscsi_aio_ioctl_cb in block/iscsi.c has a heap-based buffer over-read. (bsc#1180523)
- CVE-2021-20221: out-of-bound heap buffer access via an interrupt ID field. (bsc#1181933)
- CVE-2020-25707: infinite loop in e1000e_write_packet_to_guest() in hw/net/e1000e_core.c. (bsc#1178683)
- CVE-2020-15863: stack-based overflow in xgmac_enet_send() in hw/net/xgmac.c. (bsc#1174386)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-06"/>
	<updated date="2021-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1031692">SUSE bug 1031692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173612">SUSE bug 1173612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174386">SUSE bug 1174386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178683">SUSE bug 1178683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180523">SUSE bug 1180523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181933">SUSE bug 1181933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186473">SUSE bug 1186473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187364">SUSE bug 1187364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187367">SUSE bug 1187367</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11947/">CVE-2020-11947 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11947">CVE-2020-11947 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15469/">CVE-2020-15469 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15469">CVE-2020-15469 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15863/">CVE-2020-15863 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15863">CVE-2020-15863 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25707/">CVE-2020-25707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-25707">CVE-2020-25707 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20221/">CVE-2021-20221 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20221">CVE-2021-20221 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3416/">CVE-2021-3416 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3416">CVE-2021-3416 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3592">CVE-2021-3592 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3594">CVE-2021-3594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626873" comment="kvm-1.4.2-53.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218882" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182651" ref_url="https://bugzilla.suse.com/1182651" source="BUGZILLA"/>
		<reference ref_id="1186012" ref_url="https://bugzilla.suse.com/1186012" source="BUGZILLA"/>
		<reference ref_id="1189145" ref_url="https://bugzilla.suse.com/1189145" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20255" ref_url="https://www.suse.com/security/cve/CVE-2021-20255/" source="CVE"/>
		<reference ref_id="CVE-2021-3527" ref_url="https://www.suse.com/security/cve/CVE-2021-3527/" source="CVE"/>
		<reference ref_id="CVE-2021-3682" ref_url="https://www.suse.com/security/cve/CVE-2021-3682/" source="CVE"/>
		<description>
This update for kvm fixes the following issues:

Security issues fixed:

- usbredir: free call on invalid pointer in bufp_alloc (bsc#1189145, CVE-2021-3682)
- eepro100: stack overflow via infinite recursion (bsc#1182651, CVE-2021-20255)
- usb: unbounded stack allocation in usbredir (bsc#1186012, CVE-2021-3527)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-19"/>
	<updated date="2021-08-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182651">SUSE bug 1182651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186012">SUSE bug 1186012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189145">SUSE bug 1189145</bugzilla>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20255/">CVE-2021-20255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20255">CVE-2021-20255 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3527/">CVE-2021-3527 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3527">CVE-2021-3527 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3682/">CVE-2021-3682 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3682">CVE-2021-3682 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630650" comment="kvm-1.4.2-53.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218883" version="1" class="patch">
	<metadata>
		<title>Security update for kvm and libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="843074" ref_url="https://bugzilla.suse.com/843074" source="BUGZILLA"/>
		<reference ref_id="852397" ref_url="https://bugzilla.suse.com/852397" source="BUGZILLA"/>
		<reference ref_id="878350" ref_url="https://bugzilla.suse.com/878350" source="BUGZILLA"/>
		<reference ref_id="879665" ref_url="https://bugzilla.suse.com/879665" source="BUGZILLA"/>
		<reference ref_id="897654" ref_url="https://bugzilla.suse.com/897654" source="BUGZILLA"/>
		<reference ref_id="897783" ref_url="https://bugzilla.suse.com/897783" source="BUGZILLA"/>
		<reference ref_id="899144" ref_url="https://bugzilla.suse.com/899144" source="BUGZILLA"/>
		<reference ref_id="899484" ref_url="https://bugzilla.suse.com/899484" source="BUGZILLA"/>
		<reference ref_id="900084" ref_url="https://bugzilla.suse.com/900084" source="BUGZILLA"/>
		<reference ref_id="904176" ref_url="https://bugzilla.suse.com/904176" source="BUGZILLA"/>
		<reference ref_id="905097" ref_url="https://bugzilla.suse.com/905097" source="BUGZILLA"/>
		<reference ref_id="907805" ref_url="https://bugzilla.suse.com/907805" source="BUGZILLA"/>
		<reference ref_id="908381" ref_url="https://bugzilla.suse.com/908381" source="BUGZILLA"/>
		<reference ref_id="910145" ref_url="https://bugzilla.suse.com/910145" source="BUGZILLA"/>
		<reference ref_id="911742" ref_url="https://bugzilla.suse.com/911742" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3633" ref_url="https://www.suse.com/security/cve/CVE-2014-3633/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3657" ref_url="https://www.suse.com/security/cve/CVE-2014-3657/" source="CVE"/>
		<reference ref_id="CVE-2014-7823" ref_url="https://www.suse.com/security/cve/CVE-2014-7823/" source="CVE"/>
		<reference ref_id="CVE-2014-7840" ref_url="https://www.suse.com/security/cve/CVE-2014-7840/" source="CVE"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
		<description>

This collective update for KVM and libvirt provides fixes for security and 
non-security issues.

kvm:

    * Fix NULL pointer dereference because of uninitialized UDP socket.
      (bsc#897654, CVE-2014-3640)
    * Fix performance degradation after migration. (bsc#878350)
    * Fix potential image corruption due to missing FIEMAP_FLAG_SYNC flag
      in FS_IOC_FIEMAP ioctl. (bsc#908381)
    * Add validate hex properties for qdev. (bsc#852397)
    * Add boot option to do strict boot (bsc#900084)
    * Add query-command-line-options QMP command. (bsc#899144)
    * Fix incorrect return value of migrate_cancel. (bsc#843074)
    * Fix insufficient parameter validation during ram load. (bsc#905097,
      CVE-2014-7840)
    * Fix insufficient blit region checks in qemu/cirrus. (bsc#907805,
      CVE-2014-8106)

libvirt:

    * Fix security hole with migratable flag in dumpxml. (bsc#904176,
      CVE-2014-7823)
    * Fix domain deadlock. (bsc#899484, CVE-2014-3657)
    * Use correct definition when looking up disk in qemu blkiotune.
      (bsc#897783, CVE-2014-3633)
    * Fix undefined symbol when starting virtlockd. (bsc#910145)
    * Add '-boot strict' to qemu's commandline whenever possible.
      (bsc#900084)
    * Add support for 'reboot-timeout' in qemu. (bsc#899144)
    * Increase QEMU's monitor timeout to 30sec. (bsc#911742)
    * Allow setting QEMU's migration max downtime any time. (bsc#879665)

Security Issues:

    * CVE-2014-7823
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7823&gt;
    * CVE-2014-3657
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3657&gt;
    * CVE-2014-3633
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3633&gt;
    * CVE-2014-3640
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640&gt;
    * CVE-2014-7840
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7840&gt;
    * CVE-2014-8106
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8106&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-23"/>
	<updated date="2015-01-23"/>
	<bugzilla href="https://bugzilla.suse.com/843074">SUSE bug 843074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852397">SUSE bug 852397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878350">SUSE bug 878350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879665">SUSE bug 879665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897654">SUSE bug 897654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897783">SUSE bug 897783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899144">SUSE bug 899144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899484">SUSE bug 899484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900084">SUSE bug 900084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904176">SUSE bug 904176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905097">SUSE bug 905097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907805">SUSE bug 907805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908381">SUSE bug 908381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910145">SUSE bug 910145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911742">SUSE bug 911742</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3633/">CVE-2014-3633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3633">CVE-2014-3633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3640">CVE-2014-3640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3657/">CVE-2014-3657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3657">CVE-2014-3657 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7823/">CVE-2014-7823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7823">CVE-2014-7823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7840/">CVE-2014-7840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7840">CVE-2014-7840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8106">CVE-2014-8106 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578712" comment="kvm-1.4.2-0.21.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578713" comment="libvirt-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578714" comment="libvirt-client-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578715" comment="libvirt-client-32bit-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578716" comment="libvirt-doc-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578717" comment="libvirt-lock-sanlock-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578718" comment="libvirt-python-1.0.5.9-0.19.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578712" comment="kvm-1.4.2-0.21.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578713" comment="libvirt-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578714" comment="libvirt-client-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578715" comment="libvirt-client-32bit-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578716" comment="libvirt-doc-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578717" comment="libvirt-lock-sanlock-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578718" comment="libvirt-python-1.0.5.9-0.19.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578712" comment="kvm-1.4.2-0.21.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578713" comment="libvirt-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578714" comment="libvirt-client-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578715" comment="libvirt-client-32bit-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578716" comment="libvirt-doc-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578717" comment="libvirt-lock-sanlock-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578718" comment="libvirt-python-1.0.5.9-0.19.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218884" version="1" class="patch">
	<metadata>
		<title>Security update for lcms</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="843716" ref_url="https://bugzilla.suse.com/843716" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4276" ref_url="https://www.suse.com/security/cve/CVE-2013-4276/" source="CVE"/>
		<description>

The lcms userland utilities were updated to fix stack overflows.

    * CVE-2013-4276: Multiple stack-based buffer overflows in LittleCMS
      allowed remote attackers to cause a denial of service (crash) via a
      crafted (1) ICC color profile to the icctrans utility or (2) TIFF
      image to the tiffdiff utility.

Security Issues:

    * CVE-2013-4276
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4276&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-08"/>
	<updated date="2013-10-08"/>
	<bugzilla href="https://bugzilla.suse.com/843716">SUSE bug 843716</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4276/">CVE-2013-4276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4276">CVE-2013-4276 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576413" comment="lcms-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576414" comment="liblcms1-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576415" comment="liblcms1-32bit-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576416" comment="liblcms1-x86-1.17-77.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576413" comment="lcms-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576414" comment="liblcms1-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576415" comment="liblcms1-32bit-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576416" comment="liblcms1-x86-1.17-77.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576413" comment="lcms-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576414" comment="liblcms1-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576415" comment="liblcms1-32bit-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576416" comment="liblcms1-x86-1.17-77.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218885" version="1" class="patch">
	<metadata>
		<title>Security update for less (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="921719" ref_url="https://bugzilla.suse.com/921719" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9488" ref_url="https://www.suse.com/security/cve/CVE-2014-9488/" source="CVE"/>
		<description>
This update for less fixes the following issues:

Security issue fixed:

- CVE-2014-9488: Malformed UTF-8 data could have caused an out of bounds read in 
  the UTF-8 decoding routines, causing an invalid read access (bsc#921719).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-21"/>
	<updated date="2020-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/921719">SUSE bug 921719</bugzilla>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-9488/">CVE-2014-9488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9488">CVE-2014-9488 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572276" comment="less-424b-10.24.3.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218886" version="1" class="patch">
	<metadata>
		<title>Security update for lha (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="962528" ref_url="https://bugzilla.suse.com/962528" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1925" ref_url="https://www.suse.com/security/cve/CVE-2016-1925/" source="CVE"/>
		<description>

lha was updated to fix one security issue.

This security issue was fixed:
- CVE-2016-1925: Buffer Overflow while parsing level0 and level1 headers (bsc#962528).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-28"/>
	<updated date="2016-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/962528">SUSE bug 962528</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1925/">CVE-2016-1925 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1925">CVE-2016-1925 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572277" comment="lha-1.14.0.894-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218887" version="1" class="patch">
	<metadata>
		<title>Security update for libQt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="856832" ref_url="https://bugzilla.suse.com/856832" source="BUGZILLA"/>
		<reference ref_id="859158" ref_url="https://bugzilla.suse.com/859158" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4549" ref_url="https://www.suse.com/security/cve/CVE-2013-4549/" source="CVE"/>
		<description>

The Qt library was updated to fix a XML entity expansion attack (XXE). 
(CVE-2013-4549)

Security Issue reference:

    * CVE-2013-4549
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4549&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-15"/>
	<updated date="2014-02-15"/>
	<bugzilla href="https://bugzilla.suse.com/856832">SUSE bug 856832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859158">SUSE bug 859158</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4549/">CVE-2013-4549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4549">CVE-2013-4549 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578719" comment="libQtWebKit4-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563420" comment="libQtWebKit4-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563421" comment="libQtWebKit4-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578720" comment="libqt4-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578721" comment="libqt4-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578722" comment="libqt4-qt3support-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578723" comment="libqt4-qt3support-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578724" comment="libqt4-qt3support-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578725" comment="libqt4-sql-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578726" comment="libqt4-sql-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578727" comment="libqt4-sql-mysql-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578728" comment="libqt4-sql-sqlite-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578729" comment="libqt4-sql-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578730" comment="libqt4-x11-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578731" comment="libqt4-x11-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578732" comment="libqt4-x11-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578733" comment="libqt4-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578734" comment="qt4-x11-tools-4.6.3-5.29.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578719" comment="libQtWebKit4-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563420" comment="libQtWebKit4-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563421" comment="libQtWebKit4-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578720" comment="libqt4-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578721" comment="libqt4-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578722" comment="libqt4-qt3support-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578723" comment="libqt4-qt3support-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578724" comment="libqt4-qt3support-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578725" comment="libqt4-sql-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578726" comment="libqt4-sql-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578727" comment="libqt4-sql-mysql-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578728" comment="libqt4-sql-sqlite-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578729" comment="libqt4-sql-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578730" comment="libqt4-x11-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578731" comment="libqt4-x11-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578732" comment="libqt4-x11-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578733" comment="libqt4-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578734" comment="qt4-x11-tools-4.6.3-5.29.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578719" comment="libQtWebKit4-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563420" comment="libQtWebKit4-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563421" comment="libQtWebKit4-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578720" comment="libqt4-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578721" comment="libqt4-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578722" comment="libqt4-qt3support-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578723" comment="libqt4-qt3support-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578724" comment="libqt4-qt3support-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578725" comment="libqt4-sql-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578726" comment="libqt4-sql-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578727" comment="libqt4-sql-mysql-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578728" comment="libqt4-sql-sqlite-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578729" comment="libqt4-sql-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578730" comment="libqt4-x11-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578731" comment="libqt4-x11-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578732" comment="libqt4-x11-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578733" comment="libqt4-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578734" comment="qt4-x11-tools-4.6.3-5.29.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218888" version="1" class="patch">
	<metadata>
		<title>Security update for libapr-util1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1064990" ref_url="https://bugzilla.suse.com/1064990" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12618" ref_url="https://www.suse.com/security/cve/CVE-2017-12618/" source="CVE"/>
		<description>
This update for libapr-util1 fixes the following issues:

Security issue fixed:

- CVE-2017-12618: DoS via crafted SDBM database files in apr_sdbm*() functions (bsc#1064990)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064990">SUSE bug 1064990</bugzilla>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12618/">CVE-2017-12618 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12618">CVE-2017-12618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572282" comment="libapr-util1-1.3.4-12.22.23.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578735" comment="libapr-util1-dbd-sqlite3-1.3.4-12.22.23.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218889" version="1" class="patch">
	<metadata>
		<title>Security update for libapr-util1 (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1207866" ref_url="https://bugzilla.suse.com/1207866" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25147" ref_url="https://www.suse.com/security/cve/CVE-2022-25147/" source="CVE"/>
		<description>
This update for libapr-util1 fixes the following issues:

- CVE-2022-25147: Fixed a buffer overflow possible with specially crafted input during base64 encoding (bsc#1207866)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-09"/>
	<updated date="2023-02-09"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1207866">SUSE bug 1207866</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25147/">CVE-2022-25147 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25147">CVE-2022-25147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993607" comment="libapr-util1-1.3.4-12.22.23.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993608" comment="libapr-util1-dbd-sqlite3-1.3.4-12.22.23.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218890" version="1" class="patch">
	<metadata>
		<title>Security update for libapr1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1064982" ref_url="https://bugzilla.suse.com/1064982" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12613" ref_url="https://www.suse.com/security/cve/CVE-2017-12613/" source="CVE"/>
		<description>

This update fixes the following issues:
  
- CVE-2017-12613: DoS or information disclosure in pr_exp_time*() or apr_os_exp_time*() functions (bsc#1064982).

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064982">SUSE bug 1064982</bugzilla>
	<cve impact="low" cvss3="3.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12613/">CVE-2017-12613 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12613">CVE-2017-12613 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572283" comment="libapr1-1.3.3-11.18.19.13.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218891" version="1" class="patch">
	<metadata>
		<title>Recommended update for util-linux</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="761815" ref_url="https://bugzilla.suse.com/761815" source="BUGZILLA"/>
		<reference ref_id="859062" ref_url="https://bugzilla.suse.com/859062" source="BUGZILLA"/>
		<reference ref_id="871698" ref_url="https://bugzilla.suse.com/871698" source="BUGZILLA"/>
		<reference ref_id="888678" ref_url="https://bugzilla.suse.com/888678" source="BUGZILLA"/>
		<reference ref_id="900965" ref_url="https://bugzilla.suse.com/900965" source="BUGZILLA"/>
		<reference ref_id="901549" ref_url="https://bugzilla.suse.com/901549" source="BUGZILLA"/>
		<reference ref_id="907434" ref_url="https://bugzilla.suse.com/907434" source="BUGZILLA"/>
		<reference ref_id="917164" ref_url="https://bugzilla.suse.com/917164" source="BUGZILLA"/>
		<reference ref_id="918041" ref_url="https://bugzilla.suse.com/918041" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9114" ref_url="https://www.suse.com/security/cve/CVE-2014-9114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001313.html" source="SUSE-SU"/>
		<description>

This update for util-linux provides the following fixes:

    * Make blkid(8) issue only one READ on faulty devices. (bnc#859062)
    * Added option -r to fsck(8) to dump a few resource statistics after
      each successful run. (bnc#761815)
    * Prevent excessive clock drift calculations. (bnc#871698)
    * Check /etc/adjtime drift factor. (bnc#871698)
    * Prevent hang in exact hwclock adjustment. (bnc#871698)
    * Suppress warning that's not relevant on Linux systems. (bnc#871698)

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-04"/>
	<updated date="2014-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/761815">SUSE bug 761815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859062">SUSE bug 859062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871698">SUSE bug 871698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888678">SUSE bug 888678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900965">SUSE bug 900965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901549">SUSE bug 901549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907434">SUSE bug 907434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917164">SUSE bug 917164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918041">SUSE bug 918041</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9114/">CVE-2014-9114 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9114">CVE-2014-9114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993609" comment="libblkid1-2.19.1-6.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993610" comment="libblkid1-32bit-2.19.1-6.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993611" comment="libblkid1-x86-2.19.1-6.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993612" comment="libuuid1-2.19.1-6.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993613" comment="libuuid1-32bit-2.19.1-6.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993614" comment="libuuid1-x86-2.19.1-6.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993615" comment="util-linux-2.19.1-6.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993616" comment="util-linux-lang-2.19.1-6.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993617" comment="uuid-runtime-2.19.1-6.54.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993609" comment="libblkid1-2.19.1-6.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993610" comment="libblkid1-32bit-2.19.1-6.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993611" comment="libblkid1-x86-2.19.1-6.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993612" comment="libuuid1-2.19.1-6.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993613" comment="libuuid1-32bit-2.19.1-6.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993614" comment="libuuid1-x86-2.19.1-6.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993615" comment="util-linux-2.19.1-6.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993616" comment="util-linux-lang-2.19.1-6.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993617" comment="uuid-runtime-2.19.1-6.54.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993609" comment="libblkid1-2.19.1-6.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993610" comment="libblkid1-32bit-2.19.1-6.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993611" comment="libblkid1-x86-2.19.1-6.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993612" comment="libuuid1-2.19.1-6.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993613" comment="libuuid1-32bit-2.19.1-6.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993614" comment="libuuid1-x86-2.19.1-6.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993615" comment="util-linux-2.19.1-6.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993616" comment="util-linux-lang-2.19.1-6.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993617" comment="uuid-runtime-2.19.1-6.54.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218892" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184751" ref_url="https://bugzilla.suse.com/1184751" source="BUGZILLA"/>
		<reference ref_id="1184752" ref_url="https://bugzilla.suse.com/1184752" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30498" ref_url="https://www.suse.com/security/cve/CVE-2021-30498/" source="CVE"/>
		<reference ref_id="CVE-2021-30499" ref_url="https://www.suse.com/security/cve/CVE-2021-30499/" source="CVE"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2021-30499: Fixed a memory corruption issue when exporting troff sources (bsc#1184751).
- CVE-2021-30498: Fixed a memory corruption issue when exporting TGA images (bsc#1184752).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184751">SUSE bug 1184751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184752">SUSE bug 1184752</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30498/">CVE-2021-30498 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30498">CVE-2021-30498 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30499/">CVE-2021-30499 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30499">CVE-2021-30499 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670907" comment="libcaca-0.99.beta13b-49.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218893" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1197028" ref_url="https://bugzilla.suse.com/1197028" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0856" ref_url="https://www.suse.com/security/cve/CVE-2022-0856/" source="CVE"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2022-0856: Fixed a divide by zero issue which could be exploited to cause
  an application crash (bsc#1197028).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-28"/>
	<updated date="2022-04-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1197028">SUSE bug 1197028</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0856/">CVE-2022-0856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0856">CVE-2022-0856 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681248" comment="libcaca-0.99.beta13b-49.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218894" version="1" class="patch">
	<metadata>
		<title>Security update for libcap-ng (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="876832" ref_url="https://bugzilla.suse.com/876832" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3215" ref_url="https://www.suse.com/security/cve/CVE-2014-3215/" source="CVE"/>
		<description>
libcap-ng was updated to fix one security issue.

This security issue was fixed:

- CVE-2014-3215: seunshare in policycoreutils (which uses libcap-ng) is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which made it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges (bsc#876832).
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-03"/>
	<updated date="2017-02-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/876832">SUSE bug 876832</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3215/">CVE-2014-3215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3215">CVE-2014-3215 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578736" comment="libcap-ng-utils-0.6.3-1.9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578737" comment="libcap-ng0-0.6.3-1.9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578738" comment="libcap-ng0-32bit-0.6.3-1.9.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218895" version="1" class="patch">
	<metadata>
		<title>Security update for libcares2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1007728" ref_url="https://bugzilla.suse.com/1007728" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5180" ref_url="https://www.suse.com/security/cve/CVE-2016-5180/" source="CVE"/>
		<description>

This update for libcares2 fixes the following issues:

- Add patch to fix single byte out of buffer write
  (CVE-2016-5180, bsc#1007728)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-29"/>
	<updated date="2016-12-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1007728">SUSE bug 1007728</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5180/">CVE-2016-5180 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5180">CVE-2016-5180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578739" comment="libcares2-1.7.4-7.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218896" version="1" class="patch">
	<metadata>
		<title>Security update for libcares2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188881" ref_url="https://bugzilla.suse.com/1188881" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<description>
This update for libcares2 fixes the following issues:

- CVE-2021-3672: Fixed input validation on hostnames (bsc#1188881).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-10"/>
	<updated date="2021-08-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188881">SUSE bug 1188881</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3672">CVE-2021-3672 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630424" comment="libcares2-1.7.4-7.10.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218897" version="1" class="patch">
	<metadata>
		<title>Security update for libcdio (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1082821" ref_url="https://bugzilla.suse.com/1082821" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18199" ref_url="https://www.suse.com/security/cve/CVE-2017-18199/" source="CVE"/>
		<description>
This update for libcdio and libcdio-mini fixes the following issues:

Security issue fixed: 

- CVE-2017-18199: Fixed a NULL Pointer Dereference in realloc_symlink which could allow remote attackers to cause Denial of Service (bsc#1082821).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-23"/>
	<updated date="2020-09-23"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1082821">SUSE bug 1082821</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18199/">CVE-2017-18199 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18199">CVE-2017-18199 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572288" comment="libcdio7-0.80-8.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572289" comment="libcdio7-32bit-0.80-8.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572290" comment="libcdio_cdda0-0.80-8.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572291" comment="libcdio_paranoia0-0.80-8.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218898" version="1" class="patch">
	<metadata>
		<title>Security update for libcgroup1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1030747" ref_url="https://bugzilla.suse.com/1030747" source="BUGZILLA"/>
		<reference ref_id="1100365" ref_url="https://bugzilla.suse.com/1100365" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14348" ref_url="https://www.suse.com/security/cve/CVE-2018-14348/" source="CVE"/>
		<description>
This update for libcgroup1 fixes the following issues:

Security issue fixed:

- CVE-2018-14348: Fix daemon that creates /var/log/cgred with mode 0666 (bsc#1100365).

Bug fixes:

- bsc#1030747: Unable to use freezer sub system via libcgroup API when both freezer and cpuset subsystems are used.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1030747">SUSE bug 1030747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100365">SUSE bug 1100365</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14348/">CVE-2018-14348 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14348">CVE-2018-14348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572292" comment="libcgroup1-0.37.1-5.19.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218899" version="1" class="patch">
	<metadata>
		<title>Security update for libcroco (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1034481" ref_url="https://bugzilla.suse.com/1034481" source="BUGZILLA"/>
		<reference ref_id="1034482" ref_url="https://bugzilla.suse.com/1034482" source="BUGZILLA"/>
		<reference ref_id="1043898" ref_url="https://bugzilla.suse.com/1043898" source="BUGZILLA"/>
		<reference ref_id="1043899" ref_url="https://bugzilla.suse.com/1043899" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7960" ref_url="https://www.suse.com/security/cve/CVE-2017-7960/" source="CVE"/>
		<reference ref_id="CVE-2017-7961" ref_url="https://www.suse.com/security/cve/CVE-2017-7961/" source="CVE"/>
		<reference ref_id="CVE-2017-8834" ref_url="https://www.suse.com/security/cve/CVE-2017-8834/" source="CVE"/>
		<reference ref_id="CVE-2017-8871" ref_url="https://www.suse.com/security/cve/CVE-2017-8871/" source="CVE"/>
		<description>
This update for libcroco fixes the following issues:

Security issues fixed:

- CVE-2017-7960: Fixed heap overflow (input: check end of input before reading a byte) (bsc#1034481).
- CVE-2017-7961: Fixed undefined behavior (tknzr: support only max long rgb values) (bsc#1034482).
- CVE-2017-8834: Fixed denial of service (memory allocation error) via a crafted CSS file (bsc#1043898).
- CVE-2017-8871: Fixed denial of service (infinite loop and CPU consumption) via a crafted CSS file (bsc#1043899).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-13"/>
	<updated date="2019-06-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034481">SUSE bug 1034481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034482">SUSE bug 1034482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043898">SUSE bug 1043898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043899">SUSE bug 1043899</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7960/">CVE-2017-7960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7960">CVE-2017-7960 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7961/">CVE-2017-7961 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7961">CVE-2017-7961 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8834/">CVE-2017-8834 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8834">CVE-2017-8834 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8871/">CVE-2017-8871 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8871">CVE-2017-8871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572293" comment="libcroco-0_6-3-0.6.1-122.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572294" comment="libcroco-0_6-3-32bit-0.6.1-122.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218900" version="1" class="patch">
	<metadata>
		<title>Security update for libcroco (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1171685" ref_url="https://bugzilla.suse.com/1171685" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12825" ref_url="https://www.suse.com/security/cve/CVE-2020-12825/" source="CVE"/>
		<description>
This update for libcroco fixes the following issues:

- CVE-2020-12825: Fixed recursion issue in block and any productions (bsc#1171685).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171685">SUSE bug 1171685</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12825/">CVE-2020-12825 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12825">CVE-2020-12825 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631918" comment="libcroco-0_6-3-0.6.1-122.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631919" comment="libcroco-0_6-3-32bit-0.6.1-122.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218901" version="1" class="patch">
	<metadata>
		<title>Security update for libdb-4_5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1043886" ref_url="https://bugzilla.suse.com/1043886" source="BUGZILLA"/>
		<description>
This update for libdb-4_5 fixes the following issues:

- A DB_CONFIG file in the current working directory allowed local
  users to obtain sensitive information via a symlink attack
  involving a setgid or setuid application using libdb-4_8. (bsc#1043886)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-09"/>
	<updated date="2018-02-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043886">SUSE bug 1043886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572295" comment="db-doc-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572296" comment="db-utils-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572297" comment="db-utils-doc-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572298" comment="libdb-4_5-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572299" comment="libdb-4_5-32bit-4.5.20-97.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218902" version="1" class="patch">
	<metadata>
		<title>Security update for PostgreSQL 9.1</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="864845" ref_url="https://bugzilla.suse.com/864845" source="BUGZILLA"/>
		<reference ref_id="864846" ref_url="https://bugzilla.suse.com/864846" source="BUGZILLA"/>
		<reference ref_id="864847" ref_url="https://bugzilla.suse.com/864847" source="BUGZILLA"/>
		<reference ref_id="864850" ref_url="https://bugzilla.suse.com/864850" source="BUGZILLA"/>
		<reference ref_id="864851" ref_url="https://bugzilla.suse.com/864851" source="BUGZILLA"/>
		<reference ref_id="864852" ref_url="https://bugzilla.suse.com/864852" source="BUGZILLA"/>
		<reference ref_id="864853" ref_url="https://bugzilla.suse.com/864853" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0060" ref_url="https://www.suse.com/security/cve/CVE-2014-0060/" source="CVE"/>
		<reference ref_id="CVE-2014-0061" ref_url="https://www.suse.com/security/cve/CVE-2014-0061/" source="CVE"/>
		<reference ref_id="CVE-2014-0062" ref_url="https://www.suse.com/security/cve/CVE-2014-0062/" source="CVE"/>
		<reference ref_id="CVE-2014-0063" ref_url="https://www.suse.com/security/cve/CVE-2014-0063/" source="CVE"/>
		<reference ref_id="CVE-2014-0064" ref_url="https://www.suse.com/security/cve/CVE-2014-0064/" source="CVE"/>
		<reference ref_id="CVE-2014-0065" ref_url="https://www.suse.com/security/cve/CVE-2014-0065/" source="CVE"/>
		<reference ref_id="CVE-2014-0066" ref_url="https://www.suse.com/security/cve/CVE-2014-0066/" source="CVE"/>
		<description>

The PostgreSQL database server was updated to version 9.1.12 to fix various 
security issues:

    * 

      Granting a role without ADMIN OPTION is supposed to prevent the
      grantee from adding or removing members from the granted role, but
      this restriction was easily bypassed by doing SET ROLE first. The
      security impact is mostly that a role member can revoke the access of
      others, contrary to the wishes of his grantor. Unapproved role member
      additions are a lesser concern, since an uncooperative role member
      could provide most of his rights to others anyway by creating views
      or SECURITY DEFINER functions. (CVE-2014-0060)

    * 

      The primary role of PL validator functions is to be called implicitly
      during CREATE FUNCTION, but they are also normal SQL functions that a
      user can call explicitly. Calling a validator on a function actually
      written in some other language was not checked for and could be
      exploited for privilege-escalation purposes. The fix involves adding
      a call to a privilege-checking function in each validator function.
      Non-core procedural languages will also need to make this change to
      their own validator functions, if any. (CVE-2014-0061)

    * 

      If the name lookups come to different conclusions due to concurrent
      activity, we might perform some parts of the DDL on a different table
      than other parts. At least in the case of CREATE INDEX, this can be
      used to cause the permissions checks to be performed against a
      different table than the index creation, allowing for a privilege
      escalation attack. (CVE-2014-0062)

    * 

      The MAXDATELEN constant was too small for the longest possible value
      of type interval, allowing a buffer overrun in interval_out().
      Although the datetime input functions were more careful about
      avoiding buffer overrun, the limit was short enough to cause them to
      reject some valid inputs, such as input containing a very long
      timezone name. The ecpg library contained these vulnerabilities along
      with some of its own. (CVE-2014-0063)

    * 

      Several functions, mostly type input functions, calculated an
      allocation size without checking for overflow. If overflow did occur,
      a too-small buffer would be allocated and then written past.
      (CVE-2014-0064)

    * 

      Use strlcpy() and related functions to provide a clear guarantee that
      fixed-size buffers are not overrun. Unlike the preceding items, it is
      unclear whether these cases really represent live issues, since in
      most cases there appear to be previous constraints on the size of the
      input string. Nonetheless it seems prudent to silence all Coverity
      warnings of this type. (CVE-2014-0065)

    * 

      There are relatively few scenarios in which crypt() could return
      NULL, but contrib/chkpass would crash if it did. One practical case
      in which this could be an issue is if libc is configured to refuse to
      execute unapproved hashing algorithms (e.g., 'FIPS mode').
      (CVE-2014-0066)

    * 

      Since the temporary server started by make check uses 'trust'
      authentication, another user on the same machine could connect to it
      as database superuser, and then potentially exploit the privileges of
      the operating-system user who started the tests. A future release
      will probably incorporate changes in the testing procedure to prevent
      this risk, but some public discussion is needed first. So for the
      moment, just warn people against using make check when there are
      untrusted users on the same machine. (CVE-2014-0067)

The complete list of bugs and more information can be found at: 
http://www.postgresql.org/docs/9.1/static/release-9-1-12.html
&lt;http://www.postgresql.org/docs/9.1/static/release-9-1-12.html&gt;

Security Issues references:

    * CVE-2014-0060
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060&gt;
    * CVE-2014-0061
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061&gt;
    * CVE-2014-0062
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062&gt;
    * CVE-2014-0063
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063&gt;
    * CVE-2014-0064
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064&gt;
    * CVE-2014-0065
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065&gt;
    * CVE-2014-0066
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-03"/>
	<updated date="2014-03-03"/>
	<bugzilla href="https://bugzilla.suse.com/864845">SUSE bug 864845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864846">SUSE bug 864846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864847">SUSE bug 864847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864850">SUSE bug 864850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864851">SUSE bug 864851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864852">SUSE bug 864852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864853">SUSE bug 864853</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0060/">CVE-2014-0060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0060">CVE-2014-0060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0061/">CVE-2014-0061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0061">CVE-2014-0061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0062/">CVE-2014-0062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0062">CVE-2014-0062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0063/">CVE-2014-0063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0063">CVE-2014-0063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0064/">CVE-2014-0064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0064">CVE-2014-0064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0065/">CVE-2014-0065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0065">CVE-2014-0065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0066/">CVE-2014-0066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0066">CVE-2014-0066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578740" comment="libecpg6-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578741" comment="libpq5-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578742" comment="libpq5-32bit-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578743" comment="postgresql91-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578744" comment="postgresql91-contrib-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578745" comment="postgresql91-docs-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578746" comment="postgresql91-server-9.1.12-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578740" comment="libecpg6-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578741" comment="libpq5-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578742" comment="libpq5-32bit-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578743" comment="postgresql91-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578744" comment="postgresql91-contrib-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578745" comment="postgresql91-docs-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578746" comment="postgresql91-server-9.1.12-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578740" comment="libecpg6-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578741" comment="libpq5-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578742" comment="libpq5-32bit-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578743" comment="postgresql91-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578744" comment="postgresql91-contrib-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578745" comment="postgresql91-docs-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578746" comment="postgresql91-server-9.1.12-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218903" version="1" class="patch">
	<metadata>
		<title>Security update for libesmtp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1160462" ref_url="https://bugzilla.suse.com/1160462" source="BUGZILLA"/>
		<reference ref_id="1189097" ref_url="https://bugzilla.suse.com/1189097" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19977" ref_url="https://www.suse.com/security/cve/CVE-2019-19977/" source="CVE"/>
		<description>
This update for libesmtp fixes the following issues:

- CVE-2019-19977: Fixed stack-based buffer over-read in ntlm/ntlmstruct.c (bsc#1160462).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160462">SUSE bug 1160462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189097">SUSE bug 1189097</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19977/">CVE-2019-19977 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19977">CVE-2019-19977 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629508" comment="libesmtp-1.0.4-157.18.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218904" version="1" class="patch">
	<metadata>
		<title>Security update for libevent</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="897243" ref_url="https://bugzilla.suse.com/897243" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6272" ref_url="https://www.suse.com/security/cve/CVE-2014-6272/" source="CVE"/>
		<description>

This update fixes a buffer overflow in the buffered event handling in 
libevent. (CVE-2014-6272)

Security Issues:

    * CVE-2014-6272
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6272&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-06"/>
	<updated date="2014-10-06"/>
	<bugzilla href="https://bugzilla.suse.com/897243">SUSE bug 897243</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6272/">CVE-2014-6272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6272">CVE-2014-6272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578747" comment="libevent-1_4-2-1.4.5-24.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578747" comment="libevent-1_4-2-1.4.5-24.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578747" comment="libevent-1_4-2-1.4.5-24.24.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218905" version="1" class="patch">
	<metadata>
		<title>Security update for libevent (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1022917" ref_url="https://bugzilla.suse.com/1022917" source="BUGZILLA"/>
		<reference ref_id="1022918" ref_url="https://bugzilla.suse.com/1022918" source="BUGZILLA"/>
		<reference ref_id="1022919" ref_url="https://bugzilla.suse.com/1022919" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10195" ref_url="https://www.suse.com/security/cve/CVE-2016-10195/" source="CVE"/>
		<reference ref_id="CVE-2016-10196" ref_url="https://www.suse.com/security/cve/CVE-2016-10196/" source="CVE"/>
		<reference ref_id="CVE-2016-10197" ref_url="https://www.suse.com/security/cve/CVE-2016-10197/" source="CVE"/>
		<description>
This update for libevent fixes the following issues:

- CVE-2016-10195: DNS remote stack overread vulnerability (bsc#1022917) 
- CVE-2016-10196: stack/buffer overflow in evutil_parse_sockaddr_port() (bsc#1022918) (backport for 2.0.21)
- CVE-2016-10197: out-of-bounds read in search_make_new() (bsc#1022919) 
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-29"/>
	<updated date="2018-01-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022917">SUSE bug 1022917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022918">SUSE bug 1022918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022919">SUSE bug 1022919</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10195/">CVE-2016-10195 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10195">CVE-2016-10195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10196/">CVE-2016-10196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10196">CVE-2016-10196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10197/">CVE-2016-10197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10197">CVE-2016-10197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572308" comment="libevent-1_4-2-1.4.5-24.24.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218906" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1059893" ref_url="https://bugzilla.suse.com/1059893" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544/" source="CVE"/>
		<description>
This update for libexif fixes the following security issue:

- CVE-2017-7544: Fixed out-of-bounds heap read vulnerability in
  exif_data_save_data_entry function in libexif/exif-data.c caused by improper
  length computation of the allocated data of an ExifMnote entry which can cause
  denial-of-service or possibly information disclosure (bsc#1059893)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-24"/>
	<updated date="2018-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1059893">SUSE bug 1059893</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7544">CVE-2017-7544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572312" comment="libexif-0.6.17-2.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572313" comment="libexif-32bit-0.6.17-2.14.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218907" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-27"/>
	<updated date="2020-02-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20030">CVE-2018-20030 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9278">CVE-2019-9278 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572314" comment="libexif-0.6.17-2.14.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572315" comment="libexif-32bit-0.6.17-2.14.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218908" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1171475" ref_url="https://bugzilla.suse.com/1171475" source="BUGZILLA"/>
		<reference ref_id="1172116" ref_url="https://bugzilla.suse.com/1172116" source="BUGZILLA"/>
		<reference ref_id="1172768" ref_url="https://bugzilla.suse.com/1172768" source="BUGZILLA"/>
		<reference ref_id="1172802" ref_url="https://bugzilla.suse.com/1172802" source="BUGZILLA"/>
		<reference ref_id="1178479" ref_url="https://bugzilla.suse.com/1178479" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0181" ref_url="https://www.suse.com/security/cve/CVE-2020-0181/" source="CVE"/>
		<reference ref_id="CVE-2020-0198" ref_url="https://www.suse.com/security/cve/CVE-2020-0198/" source="CVE"/>
		<reference ref_id="CVE-2020-0452" ref_url="https://www.suse.com/security/cve/CVE-2020-0452/" source="CVE"/>
		<reference ref_id="CVE-2020-12767" ref_url="https://www.suse.com/security/cve/CVE-2020-12767/" source="CVE"/>
		<reference ref_id="CVE-2020-13112" ref_url="https://www.suse.com/security/cve/CVE-2020-13112/" source="CVE"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2020-0181: Fixed an integer overflow in exif-data.c (bsc#1172802).
- CVE-2020-0198: Fixed an unsigned integer overflow (bsc#1172768).
- CVE-2020-13112: Fixed multiple buffer over-reads in EXIF MakerNote handling could lead to information disclosure and crashes (bsc#1172116).
- CVE-2020-12767: Fixed divide-by-zero error in exif_entry_get_value (bsc#1171475).
- CVE-2020-0452: Fixed a buffer overflow due to integer overflow check optimization (bsc#1178479).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-26"/>
	<updated date="2022-07-26"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1171475">SUSE bug 1171475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172116">SUSE bug 1172116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172768">SUSE bug 1172768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172802">SUSE bug 1172802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178479">SUSE bug 1178479</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0181/">CVE-2020-0181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0181">CVE-2020-0181 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0198/">CVE-2020-0198 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0198">CVE-2020-0198 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0452/">CVE-2020-0452 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0452">CVE-2020-0452 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12767/">CVE-2020-12767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12767">CVE-2020-12767 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13112/">CVE-2020-13112 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13112">CVE-2020-13112 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993618" comment="libexif-0.6.17-2.14.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993619" comment="libexif-32bit-0.6.17-2.14.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218909" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="897890" ref_url="https://bugzilla.suse.com/897890" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1568" ref_url="https://www.suse.com/security/cve/CVE-2014-1568/" source="CVE"/>
		<description>

Mozilla NSS was updated to version 3.16.5 to fix a RSA certificate forgery 
issue.

MFSA 2014-73 / CVE-2014-1568: Antoine Delignat-Lavaud, security researcher 
at Inria Paris in team Prosecco, reported an issue in Network Security 
Services (NSS) libraries affecting all versions. He discovered that NSS is 
vulnerable to a variant of a signature forgery attack previously published 
by Daniel Bleichenbacher. This is due to lenient parsing of ASN.1 values 
involved in a signature and could lead to the forging of RSA certificates.

The Advanced Threat Research team at Intel Security also independently 
discovered and reported this issue.

Security Issues:

    * CVE-2014-1568
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-26"/>
	<updated date="2014-09-26"/>
	<bugzilla href="https://bugzilla.suse.com/897890">SUSE bug 897890</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1568/">CVE-2014-1568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1568">CVE-2014-1568 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578748" comment="libfreebl3-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578749" comment="libfreebl3-32bit-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578750" comment="libfreebl3-x86-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578751" comment="libsoftokn3-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578752" comment="libsoftokn3-32bit-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578753" comment="libsoftokn3-x86-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578754" comment="mozilla-nss-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578755" comment="mozilla-nss-32bit-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578756" comment="mozilla-nss-tools-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578757" comment="mozilla-nss-x86-3.16.5-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578748" comment="libfreebl3-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578749" comment="libfreebl3-32bit-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578750" comment="libfreebl3-x86-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578751" comment="libsoftokn3-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578752" comment="libsoftokn3-32bit-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578753" comment="libsoftokn3-x86-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578754" comment="mozilla-nss-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578755" comment="mozilla-nss-32bit-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578756" comment="mozilla-nss-tools-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578757" comment="mozilla-nss-x86-3.16.5-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578748" comment="libfreebl3-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578749" comment="libfreebl3-32bit-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578750" comment="libfreebl3-x86-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578751" comment="libsoftokn3-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578752" comment="libsoftokn3-32bit-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578753" comment="libsoftokn3-x86-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578754" comment="mozilla-nss-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578755" comment="mozilla-nss-32bit-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578756" comment="mozilla-nss-tools-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578757" comment="mozilla-nss-x86-3.16.5-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218910" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="831359" ref_url="https://bugzilla.suse.com/831359" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4242" ref_url="https://www.suse.com/security/cve/CVE-2013-4242/" source="CVE"/>
		<description>

This update of libgcrypt mitigates the Yarom/Falkner flush+reload 
side-channel attack on RSA secret keys (CVE-2013-4242).

Security Issue reference:

    * CVE-2013-4242
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-13"/>
	<updated date="2013-08-13"/>
	<bugzilla href="https://bugzilla.suse.com/831359">SUSE bug 831359</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4242/">CVE-2013-4242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4242">CVE-2013-4242 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576472" comment="libgcrypt11-1.5.0-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576473" comment="libgcrypt11-32bit-1.5.0-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576474" comment="libgcrypt11-x86-1.5.0-0.15.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576472" comment="libgcrypt11-1.5.0-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576473" comment="libgcrypt11-32bit-1.5.0-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576474" comment="libgcrypt11-x86-1.5.0-0.15.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576472" comment="libgcrypt11-1.5.0-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576473" comment="libgcrypt11-32bit-1.5.0-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576474" comment="libgcrypt11-x86-1.5.0-0.15.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218911" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="920057" ref_url="https://bugzilla.suse.com/920057" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3591" ref_url="https://www.suse.com/security/cve/CVE-2014-3591/" source="CVE"/>
		<reference ref_id="CVE-2015-0837" ref_url="https://www.suse.com/security/cve/CVE-2015-0837/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001602.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

* Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
  See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.
  (bsc#920057)
* Fixed data-dependent timing variations in modular exponentiation
  [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
  are Practical]
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-17"/>
	<updated date="2015-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/920057">SUSE bug 920057</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3591/">CVE-2014-3591 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3591">CVE-2014-3591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0837/">CVE-2015-0837 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0837">CVE-2015-0837 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578758" comment="libgcrypt11-1.5.0-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578759" comment="libgcrypt11-32bit-1.5.0-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578760" comment="libgcrypt11-x86-1.5.0-0.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578758" comment="libgcrypt11-1.5.0-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578759" comment="libgcrypt11-32bit-1.5.0-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578760" comment="libgcrypt11-x86-1.5.0-0.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578758" comment="libgcrypt11-1.5.0-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578759" comment="libgcrypt11-32bit-1.5.0-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578760" comment="libgcrypt11-x86-1.5.0-0.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218912" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="994157" ref_url="https://bugzilla.suse.com/994157" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6313" ref_url="https://www.suse.com/security/cve/CVE-2016-6313/" source="CVE"/>
		<description>

This update for libgcrypt fixes the following issues:

  - RNG prediction vulnerability (bsc#994157, CVE-2016-6313)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-21"/>
	<updated date="2016-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/994157">SUSE bug 994157</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6313/">CVE-2016-6313 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6313">CVE-2016-6313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578761" comment="libgcrypt11-1.5.0-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578762" comment="libgcrypt11-32bit-1.5.0-0.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218913" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1046607" ref_url="https://bugzilla.suse.com/1046607" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7526" ref_url="https://www.suse.com/security/cve/CVE-2017-7526/" source="CVE"/>
		<description>
This update for libgcrypt fixes the following issues:

- CVE-2017-7526: Hardening a against local side-channel attack in RSA key handling has been added (bsc#1046607)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-06"/>
	<updated date="2017-07-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046607">SUSE bug 1046607</bugzilla>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7526/">CVE-2017-7526 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7526">CVE-2017-7526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578763" comment="libgcrypt11-1.5.0-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578764" comment="libgcrypt11-32bit-1.5.0-0.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218914" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1148987" ref_url="https://bugzilla.suse.com/1148987" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13627" ref_url="https://www.suse.com/security/cve/CVE-2019-13627/" source="CVE"/>
		<description>
This update for libgcrypt fixes the following issues:

Security issue fixed:

- CVE-2019-13627: Mitigated against an ECDSA timing attack. (bsc#1148987)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1148987">SUSE bug 1148987</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13627/">CVE-2019-13627 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13627">CVE-2019-13627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578765" comment="libgcrypt11-1.5.0-0.26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578766" comment="libgcrypt11-32bit-1.5.0-0.26.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218915" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1187212" ref_url="https://bugzilla.suse.com/1187212" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33560" ref_url="https://www.suse.com/security/cve/CVE-2021-33560/" source="CVE"/>
		<description>
This update for libgcrypt fixes the following issues:

- CVE-2021-33560: Fixed a side-channel against ElGamal encryption, caused by missing exponent blinding (bsc#1187212).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187212">SUSE bug 1187212</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33560/">CVE-2021-33560 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33560">CVE-2021-33560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578767" comment="libgcrypt11-1.5.0-0.26.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578768" comment="libgcrypt11-32bit-1.5.0-0.26.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218916" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="892464" ref_url="https://bugzilla.suse.com/892464" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5270" ref_url="https://www.suse.com/security/cve/CVE-2014-5270/" source="CVE"/>
		<description>

This libgcrypt update fixes the following security issue:

    * bnc#892464: Side-channel attack on Elgamal encryption subkeys.
      (CVE-2014-5270)

Security Issues:

    * CVE-2014-5270
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5270&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-20"/>
	<updated date="2014-08-20"/>
	<bugzilla href="https://bugzilla.suse.com/892464">SUSE bug 892464</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5270/">CVE-2014-5270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5270">CVE-2014-5270 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578769" comment="libgcrypt11-1.5.0-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578770" comment="libgcrypt11-32bit-1.5.0-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578771" comment="libgcrypt11-x86-1.5.0-0.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578769" comment="libgcrypt11-1.5.0-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578770" comment="libgcrypt11-32bit-1.5.0-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578771" comment="libgcrypt11-x86-1.5.0-0.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578769" comment="libgcrypt11-1.5.0-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578770" comment="libgcrypt11-32bit-1.5.0-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578771" comment="libgcrypt11-x86-1.5.0-0.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218917" version="1" class="patch">
	<metadata>
		<title>Recommended update for libical (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1015964" ref_url="https://bugzilla.suse.com/1015964" source="BUGZILLA"/>
		<reference ref_id="1044995" ref_url="https://bugzilla.suse.com/1044995" source="BUGZILLA"/>
		<reference ref_id="986631" ref_url="https://bugzilla.suse.com/986631" source="BUGZILLA"/>
		<reference ref_id="986632" ref_url="https://bugzilla.suse.com/986632" source="BUGZILLA"/>
		<reference ref_id="986639" ref_url="https://bugzilla.suse.com/986639" source="BUGZILLA"/>
		<reference ref_id="986642" ref_url="https://bugzilla.suse.com/986642" source="BUGZILLA"/>
		<reference ref_id="986658" ref_url="https://bugzilla.suse.com/986658" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5823" ref_url="https://www.suse.com/security/cve/CVE-2016-5823/" source="CVE"/>
		<reference ref_id="CVE-2016-5824" ref_url="https://www.suse.com/security/cve/CVE-2016-5824/" source="CVE"/>
		<reference ref_id="CVE-2016-5825" ref_url="https://www.suse.com/security/cve/CVE-2016-5825/" source="CVE"/>
		<reference ref_id="CVE-2016-5826" ref_url="https://www.suse.com/security/cve/CVE-2016-5826/" source="CVE"/>
		<reference ref_id="CVE-2016-5827" ref_url="https://www.suse.com/security/cve/CVE-2016-5827/" source="CVE"/>
		<reference ref_id="CVE-2016-9584" ref_url="https://www.suse.com/security/cve/CVE-2016-9584/" source="CVE"/>
		<description>
This update for libical fixes the following issues:

Security issues fixed:

- CVE-2016-5823: The icalproperty_new_clone function in libical 0.47 and 1.0 allows remote
  attackers to cause a denial of service (use-after-free) via a crafted ics file. (bnc#986632)
- CVE-2016-5824: libical 1.0 allows remote attackers to cause a denial of service (use-after-free)
  via a crafted ics file. (bsc#986639)
- CVE-2016-5825: The icalparser_parse_string function in libical 0.47 and 1.0 allows remote
  attackers to cause a denial of service (out-of-bounds heap read) via a crafted ics file.
  (bsc#986642)
- CVE-2016-5826: The parser_get_next_char function in libical 0.47 and 1.0 allows remote attackers
  to cause a denial of service (out-of-bounds heap read) by crafting a string to the
  icalparser_parse_string function. (bsc#986658)
- CVE-2016-5827: The icaltime_from_string function in libical 0.47 and 1.0 allows remote attackers
  to cause a denial of service (out-of-bounds heap read) via a crafted string to the
  icalparser_parse_string function. (bsc#986631)
- CVE-2016-9584: libical allows remote attackers to cause a denial of service (use-after-free) and
  possibly read heap memory via a crafted ics file. (bnc#1015964)

Bug fixes:

- libical crashes while parsing timezones (bsc#1044995)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-17"/>
	<updated date="2018-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015964">SUSE bug 1015964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044995">SUSE bug 1044995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986631">SUSE bug 986631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986632">SUSE bug 986632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986642">SUSE bug 986642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986658">SUSE bug 986658</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5823/">CVE-2016-5823 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5823">CVE-2016-5823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5824/">CVE-2016-5824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5824">CVE-2016-5824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5825/">CVE-2016-5825 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5825">CVE-2016-5825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5826/">CVE-2016-5826 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5826">CVE-2016-5826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5827/">CVE-2016-5827 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5827">CVE-2016-5827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9584/">CVE-2016-9584 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9584">CVE-2016-9584 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578772" comment="libical0-0.43-1.10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578773" comment="libical0-32bit-0.43-1.10.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218918" version="1" class="patch">
	<metadata>
		<title>Security update for libidn (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="923241" ref_url="https://bugzilla.suse.com/923241" source="BUGZILLA"/>
		<reference ref_id="990189" ref_url="https://bugzilla.suse.com/990189" source="BUGZILLA"/>
		<reference ref_id="990190" ref_url="https://bugzilla.suse.com/990190" source="BUGZILLA"/>
		<reference ref_id="990191" ref_url="https://bugzilla.suse.com/990191" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059/" source="CVE"/>
		<reference ref_id="CVE-2015-8948" ref_url="https://www.suse.com/security/cve/CVE-2015-8948/" source="CVE"/>
		<reference ref_id="CVE-2016-6261" ref_url="https://www.suse.com/security/cve/CVE-2016-6261/" source="CVE"/>
		<reference ref_id="CVE-2016-6262" ref_url="https://www.suse.com/security/cve/CVE-2016-6262/" source="CVE"/>
		<reference ref_id="CVE-2016-6263" ref_url="https://www.suse.com/security/cve/CVE-2016-6263/" source="CVE"/>
		<description>

This update for libidn fixes the following issues:

- CVE-2016-6262 and CVE-2015-8948: Out-of-bounds-read when reading one zero byte as input (bsc#990189)

- CVE-2016-6261: Out-of-bounds stack read in idna_to_ascii_4i (bsc#990190) 

- CVE-2016-6263: stringprep_utf8_nfkc_normalize reject invalid UTF-8 (bsc#990191)

- CVE-2015-2059: out-of-bounds read with stringprep on invalid UTF-8 (bsc#923241) 

		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-12"/>
	<updated date="2016-09-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/923241">SUSE bug 923241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990189">SUSE bug 990189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990190">SUSE bug 990190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990191">SUSE bug 990191</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2059">CVE-2015-2059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8948/">CVE-2015-8948 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8948">CVE-2015-8948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6261/">CVE-2016-6261 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6261">CVE-2016-6261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6262/">CVE-2016-6262 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6262">CVE-2016-6262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6263/">CVE-2016-6263 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6263">CVE-2016-6263 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572336" comment="libidn-1.10-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572337" comment="libidn-32bit-1.10-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218919" version="1" class="patch">
	<metadata>
		<title>Security update for libidn (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1056450" ref_url="https://bugzilla.suse.com/1056450" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14062" ref_url="https://www.suse.com/security/cve/CVE-2017-14062/" source="CVE"/>
		<description>
This update for libidn fixes one issues.

This security issue was fixed:

- CVE-2017-14062: Prevent integer overflow in the decode_digit function that
  allowed remote attackers to cause a denial of service or possibly have
  unspecified other impact (bsc#1056450).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-08"/>
	<updated date="2018-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056450">SUSE bug 1056450</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14062/">CVE-2017-14062 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14062">CVE-2017-14062 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572338" comment="libidn-1.10-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572339" comment="libidn-32bit-1.10-7.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218920" version="1" class="patch">
	<metadata>
		<title>Security update for libjasper</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="906364" ref_url="https://bugzilla.suse.com/906364" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9029" ref_url="https://www.suse.com/security/cve/CVE-2014-9029/" source="CVE"/>
		<description>

This update for libjasper fixes multiple off-by-one errors which could 
allow remote attackers to execute arbitrary code via a heap-based buffer 
overflow triggered by a crafted jp2 (JPEG 2000) file. (bsc#906364, 
CVE-2014-9029)

Security Issues:

    * CVE-2014-9029
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9029&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-04"/>
	<updated date="2014-12-04"/>
	<bugzilla href="https://bugzilla.suse.com/906364">SUSE bug 906364</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9029/">CVE-2014-9029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9029">CVE-2014-9029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578774" comment="libjasper-1.900.1-134.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578775" comment="libjasper-32bit-1.900.1-134.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578776" comment="libjasper-x86-1.900.1-134.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578774" comment="libjasper-1.900.1-134.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578775" comment="libjasper-32bit-1.900.1-134.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578776" comment="libjasper-x86-1.900.1-134.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578774" comment="libjasper-1.900.1-134.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578775" comment="libjasper-32bit-1.900.1-134.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578776" comment="libjasper-x86-1.900.1-134.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218921" version="1" class="patch">
	<metadata>
		<title>Security update for libksba
</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="907074" ref_url="https://bugzilla.suse.com/907074" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9087" ref_url="https://www.suse.com/security/cve/CVE-2014-9087/" source="CVE"/>
		<description>

This libksba update fixes the following security issue:

    * bnc#907074: buffer overflow in ksba_oid_to_str (CVE-2014-9087)

Security Issues:

    * CVE-2014-9087
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9087&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-11"/>
	<updated date="2014-12-11"/>
	<bugzilla href="https://bugzilla.suse.com/907074">SUSE bug 907074</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9087/">CVE-2014-9087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9087">CVE-2014-9087 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578777" comment="libksba-1.0.4-1.18.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578777" comment="libksba-1.0.4-1.18.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578777" comment="libksba-1.0.4-1.18.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218922" version="1" class="patch">
	<metadata>
		<title>Security update for libksba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="979261" ref_url="https://bugzilla.suse.com/979261" source="BUGZILLA"/>
		<reference ref_id="979906" ref_url="https://bugzilla.suse.com/979906" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4574" ref_url="https://www.suse.com/security/cve/CVE-2016-4574/" source="CVE"/>
		<reference ref_id="CVE-2016-4579" ref_url="https://www.suse.com/security/cve/CVE-2016-4579/" source="CVE"/>
		<description>

This update for libksba fixes the following issues:

- CVE-2016-4579: Out-of-bounds read in _ksba_ber_parse_tl()
- CVE-2016-4574: two OOB read access bugs (remote DoS) (bsc#979261)

Also adding reliability fixes from v1.3.4.

		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-07"/>
	<updated date="2016-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/979261">SUSE bug 979261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979906">SUSE bug 979906</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4574/">CVE-2016-4574 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4574">CVE-2016-4574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4579/">CVE-2016-4579 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4579">CVE-2016-4579 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572342" comment="libksba-1.0.4-1.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218923" version="1" class="patch">
	<metadata>
		<title>Security update for libksba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="926826" ref_url="https://bugzilla.suse.com/926826" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2016:0008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001774.html" source="SUSE-SU"/>
		<description>
The libksba package was updated to fix the following security issues:

- Fixed an integer overflow, an out of bounds read and a stack overflow issues (bsc#926826).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-23"/>
	<updated date="2015-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926826">SUSE bug 926826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578778" comment="libksba-1.0.4-1.20.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578778" comment="libksba-1.0.4-1.20.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578778" comment="libksba-1.0.4-1.20.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218924" version="1" class="patch">
	<metadata>
		<title>Security update for libksba (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204357" ref_url="https://bugzilla.suse.com/1204357" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3515" ref_url="https://www.suse.com/security/cve/CVE-2022-3515/" source="CVE"/>
		<description>
This update for libksba fixes the following issues:

  - CVE-2022-3515: Fixed a possible overflow in the TLV parser (bsc#1204357).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-21"/>
	<updated date="2022-10-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1204357">SUSE bug 1204357</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3515/">CVE-2022-3515 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3515">CVE-2022-3515 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993620" comment="libksba-1.0.4-1.26.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218925" version="1" class="patch">
	<metadata>
		<title>Security update for libksba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1206579" ref_url="https://bugzilla.suse.com/1206579" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-47629" ref_url="https://www.suse.com/security/cve/CVE-2022-47629/" source="CVE"/>
		<description>
This update for libksba fixes the following issues:

- CVE-2022-47629: Fixed an integer overflow vulnerability in the CRL
  signature parser (bsc#1206579).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-16"/>
	<updated date="2023-01-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1206579">SUSE bug 1206579</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-47629/">CVE-2022-47629 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47629">CVE-2022-47629 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993621" comment="libksba-1.0.4-1.26.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218926" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1056090" ref_url="https://bugzilla.suse.com/1056090" source="BUGZILLA"/>
		<reference ref_id="1056093" ref_url="https://bugzilla.suse.com/1056093" source="BUGZILLA"/>
		<reference ref_id="1056095" ref_url="https://bugzilla.suse.com/1056095" source="BUGZILLA"/>
		<reference ref_id="1056097" ref_url="https://bugzilla.suse.com/1056097" source="BUGZILLA"/>
		<reference ref_id="1056101" ref_url="https://bugzilla.suse.com/1056101" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13739" ref_url="https://www.suse.com/security/cve/CVE-2017-13739/" source="CVE"/>
		<reference ref_id="CVE-2017-13740" ref_url="https://www.suse.com/security/cve/CVE-2017-13740/" source="CVE"/>
		<reference ref_id="CVE-2017-13741" ref_url="https://www.suse.com/security/cve/CVE-2017-13741/" source="CVE"/>
		<reference ref_id="CVE-2017-13743" ref_url="https://www.suse.com/security/cve/CVE-2017-13743/" source="CVE"/>
		<description>
This update for liblouis fixes several issues.

These security issues were fixed:

- CVE-2017-13739: Prevent heap-based buffer overflow in the function resolveSubtable() that could have caused DoS or remote code execution (bsc#1056101)
- CVE-2017-13740: Prevent stack-based buffer overflow in the function parseChars() that could have caused DoS or possibly unspecified other impact (bsc#1056097)  ()
- CVE-2017-13741: Prevent use-after-free in function compileBrailleIndicator() that allowed to cause remote DoS (bsc#1056095)
- CVE_2017-13742: Prevent stack-based buffer overflow in function includeFile that allowed to cause remote DoS (bsc#1056093).
- CVE-2017-13743: Prevent buffer overflow triggered in the function _lou_showString() that allowed to cause remote DoS (bsc#1056090)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-28"/>
	<updated date="2017-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056090">SUSE bug 1056090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056093">SUSE bug 1056093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056095">SUSE bug 1056095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056097">SUSE bug 1056097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056101">SUSE bug 1056101</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13739/">CVE-2017-13739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13739">CVE-2017-13739 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13740/">CVE-2017-13740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13740">CVE-2017-13740 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13741/">CVE-2017-13741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13741">CVE-2017-13741 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13743/">CVE-2017-13743 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13743">CVE-2017-13743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572350" comment="liblouis-1.7.0-1.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572351" comment="liblouis0-1.7.0-1.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572352" comment="python-louis-1.7.0-1.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218927" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1062458" ref_url="https://bugzilla.suse.com/1062458" source="BUGZILLA"/>
		<reference ref_id="1067336" ref_url="https://bugzilla.suse.com/1067336" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8184" ref_url="https://www.suse.com/security/cve/CVE-2014-8184/" source="CVE"/>
		<reference ref_id="CVE-2017-15101" ref_url="https://www.suse.com/security/cve/CVE-2017-15101/" source="CVE"/>
		<description>
This update for liblouis fixes the following issues:

Security issues fixed:

- CVE-2017-15101: Buffer overflow in findTable (bsc#1067336).
- CVE-2014-8184: stack-based buffer overflow in findTable() (bsc#1062458).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-24"/>
	<updated date="2017-11-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062458">SUSE bug 1062458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067336">SUSE bug 1067336</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-8184/">CVE-2014-8184 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8184">CVE-2014-8184 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15101/">CVE-2017-15101 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15101">CVE-2017-15101 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572353" comment="liblouis-1.7.0-1.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572354" comment="liblouis0-1.7.0-1.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572355" comment="python-louis-1.7.0-1.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218928" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1095825" ref_url="https://bugzilla.suse.com/1095825" source="BUGZILLA"/>
		<reference ref_id="1095826" ref_url="https://bugzilla.suse.com/1095826" source="BUGZILLA"/>
		<reference ref_id="1095827" ref_url="https://bugzilla.suse.com/1095827" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11683" ref_url="https://www.suse.com/security/cve/CVE-2018-11683/" source="CVE"/>
		<reference ref_id="CVE-2018-11684" ref_url="https://www.suse.com/security/cve/CVE-2018-11684/" source="CVE"/>
		<reference ref_id="CVE-2018-11685" ref_url="https://www.suse.com/security/cve/CVE-2018-11685/" source="CVE"/>
		<description>
This update for liblouis, python-louis fixes the following issues:

Security issues fixed:

- CVE-2018-11684: Fixed stack-based buffer overflow in the function
  includeFile() in compileTranslationTable.c (bsc#1095826)
- CVE-2018-11685: Fixed a stack-based buffer overflow in the function
  compileHyphenation() in compileTranslationTable.c (bsc#1095825)
- CVE-2018-11683: Fix a stack-based buffer overflow in the function parseChars()
  in compileTranslationTable.c (bsc#1095827)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-31"/>
	<updated date="2018-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1095825">SUSE bug 1095825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095826">SUSE bug 1095826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095827">SUSE bug 1095827</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11683/">CVE-2018-11683 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11683">CVE-2018-11683 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11684/">CVE-2018-11684 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11684">CVE-2018-11684 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11685/">CVE-2018-11685 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11685">CVE-2018-11685 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572356" comment="liblouis-1.7.0-1.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572357" comment="liblouis0-1.7.0-1.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572358" comment="python-louis-1.7.0-1.3.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218929" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1109319" ref_url="https://bugzilla.suse.com/1109319" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17294" ref_url="https://www.suse.com/security/cve/CVE-2018-17294/" source="CVE"/>
		<description>
This update for liblouis and python-louis fixes the following issue:

Security issue fixed: 

- CVE-2018-17294: Fixed an out of bounds read in matchCurrentInput function
  which could allow a remote attacker to cause Denail of Service (bsc#1109319).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1109319">SUSE bug 1109319</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17294/">CVE-2018-17294 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17294">CVE-2018-17294 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572359" comment="liblouis-1.7.0-1.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572360" comment="liblouis0-1.7.0-1.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572361" comment="python-louis-1.7.0-1.3.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218930" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1097103" ref_url="https://bugzilla.suse.com/1097103" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12085" ref_url="https://www.suse.com/security/cve/CVE-2018-12085/" source="CVE"/>
		<description>
This update for liblouis fixes the following issues:

- CVE-2018-12085: Fixed an off-by-one error resulting in a buffer overrun (bsc#1097103).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-09"/>
	<updated date="2020-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1097103">SUSE bug 1097103</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12085/">CVE-2018-12085 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12085">CVE-2018-12085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572362" comment="liblouis-1.7.0-1.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572363" comment="liblouis0-1.7.0-1.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572364" comment="python-louis-1.7.0-1.3.19.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218931" version="1" class="patch">
	<metadata>
		<title>Security update for lzo</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="883947" ref_url="https://bugzilla.suse.com/883947" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607/" source="CVE"/>
		<description>

lzo was updated to fix a potential denial of service issue or possible 
remote code execution by allowing an attacker, if the LZO decompression 
algorithm is used in a threaded or kernel context, to corrupt memory 
structures that control the flow of execution in other contexts. 
(CVE-2014-4607)

Security Issue reference:

    * CVE-2014-4607
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4607&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-11"/>
	<updated date="2014-07-11"/>
	<bugzilla href="https://bugzilla.suse.com/883947">SUSE bug 883947</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4607">CVE-2014-4607 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578779" comment="liblzo2-2-2.03-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578780" comment="liblzo2-2-32bit-2.03-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578781" comment="liblzo2-2-x86-2.03-12.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578779" comment="liblzo2-2-2.03-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578780" comment="liblzo2-2-32bit-2.03-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578781" comment="liblzo2-2-x86-2.03-12.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578779" comment="liblzo2-2-2.03-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578780" comment="liblzo2-2-32bit-2.03-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578781" comment="liblzo2-2-x86-2.03-12.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218932" version="1" class="patch">
	<metadata>
		<title>Security update for libmpfr</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="911812" ref_url="https://bugzilla.suse.com/911812" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9474" ref_url="https://www.suse.com/security/cve/CVE-2014-9474/" source="CVE"/>
		<description>

This update for libmpfr fixes a buffer overflow in mpfr_strtofr. 
(CVE-2014-9474)

Security Issues:

    * CVE-2014-9474
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9474&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-23"/>
	<updated date="2015-01-23"/>
	<bugzilla href="https://bugzilla.suse.com/911812">SUSE bug 911812</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9474/">CVE-2014-9474 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9474">CVE-2014-9474 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578782" comment="libmpfr1-2.3.2-3.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578783" comment="libmpfr1-32bit-2.3.2-3.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578784" comment="libmpfr1-x86-2.3.2-3.118.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578782" comment="libmpfr1-2.3.2-3.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578783" comment="libmpfr1-32bit-2.3.2-3.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578784" comment="libmpfr1-x86-2.3.2-3.118.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578782" comment="libmpfr1-2.3.2-3.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578783" comment="libmpfr1-32bit-2.3.2-3.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578784" comment="libmpfr1-x86-2.3.2-3.118.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218933" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="912214" ref_url="https://bugzilla.suse.com/912214" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001290.html" source="SUSE-SU"/>
		<description>

This update fixes the following security issue:

    * CVE-2014-9556: An integer overflow in the function qtmd_decompress()
      could have been exploited causing a denial of service (endless loop)
      (bnc##912214)

Security Issues:

    * CVE-2014-9556
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9556&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-05"/>
	<updated date="2015-03-05"/>
	<bugzilla href="https://bugzilla.suse.com/912214">SUSE bug 912214</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9556">CVE-2014-9556 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578785" comment="libmspack0-0.0.20060920alpha-74.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578785" comment="libmspack0-0.0.20060920alpha-74.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578785" comment="libmspack0-0.0.20060920alpha-74.5.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218934" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="934524" ref_url="https://bugzilla.suse.com/934524" source="BUGZILLA"/>
		<reference ref_id="934525" ref_url="https://bugzilla.suse.com/934525" source="BUGZILLA"/>
		<reference ref_id="934526" ref_url="https://bugzilla.suse.com/934526" source="BUGZILLA"/>
		<reference ref_id="934527" ref_url="https://bugzilla.suse.com/934527" source="BUGZILLA"/>
		<reference ref_id="934528" ref_url="https://bugzilla.suse.com/934528" source="BUGZILLA"/>
		<reference ref_id="934529" ref_url="https://bugzilla.suse.com/934529" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9732" ref_url="https://www.suse.com/security/cve/CVE-2014-9732/" source="CVE"/>
		<reference ref_id="CVE-2015-4467" ref_url="https://www.suse.com/security/cve/CVE-2015-4467/" source="CVE"/>
		<reference ref_id="CVE-2015-4469" ref_url="https://www.suse.com/security/cve/CVE-2015-4469/" source="CVE"/>
		<reference ref_id="CVE-2015-4470" ref_url="https://www.suse.com/security/cve/CVE-2015-4470/" source="CVE"/>
		<reference ref_id="CVE-2015-4471" ref_url="https://www.suse.com/security/cve/CVE-2015-4471/" source="CVE"/>
		<reference ref_id="CVE-2015-4472" ref_url="https://www.suse.com/security/cve/CVE-2015-4472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001720.html" source="SUSE-SU"/>
		<description>
libmspack was updated to fix several security vulnerabilities.

- Fix null pointer dereference on a crafted CAB. (bsc#934524, CVE-2014-9732)
- Fix denial of service while processing crafted CHM file. (bsc#934525, CVE-2015-4467)
- Fix denial of service while processing crafted CHM file. (bsc#934529, CVE-2015-4472)
- Fix pointer arithmetic overflow during CHM decompression. (bsc#934526, CVE-2015-4469)
- Fix off-by-one buffer over-read in mspack/mszipd.c. (bsc#934527, CVE-2015-4470)
- Fix off-by-one buffer under-read in mspack/lzxd.c. (bsc#934528, CVE-2015-4471)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934525">SUSE bug 934525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934526">SUSE bug 934526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934527">SUSE bug 934527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934528">SUSE bug 934528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934529">SUSE bug 934529</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9732/">CVE-2014-9732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9732">CVE-2014-9732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4467/">CVE-2015-4467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4467">CVE-2015-4467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4469/">CVE-2015-4469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4469">CVE-2015-4469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4470/">CVE-2015-4470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4470">CVE-2015-4470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4471/">CVE-2015-4471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4471">CVE-2015-4471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4472/">CVE-2015-4472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4472">CVE-2015-4472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578786" comment="libmspack0-0.0.20060920alpha-74.10.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578786" comment="libmspack0-0.0.20060920alpha-74.10.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578786" comment="libmspack0-0.0.20060920alpha-74.10.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218935" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1113038" ref_url="https://bugzilla.suse.com/1113038" source="BUGZILLA"/>
		<reference ref_id="1113039" ref_url="https://bugzilla.suse.com/1113039" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18584" ref_url="https://www.suse.com/security/cve/CVE-2018-18584/" source="CVE"/>
		<reference ref_id="CVE-2018-18585" ref_url="https://www.suse.com/security/cve/CVE-2018-18585/" source="CVE"/>
		<description>
This update for libmspack fixes the following issues:

Security issues fixed:

- CVE-2018-18584: The CAB block input buffer was one byte too small for the maximal Quantum block, leading to an out-of-bounds write. (bsc#1113038)
- CVE-2018-18585: chmd_read_headers accepted a filename that has '\0' as its first or second character (such as the '/\0' name). (bsc#1113039)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1113038">SUSE bug 1113038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113039">SUSE bug 1113039</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18584/">CVE-2018-18584 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18584">CVE-2018-18584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18585/">CVE-2018-18585 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18585">CVE-2018-18585 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572370" comment="libmspack0-0.0.20060920alpha-74.11.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218936" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1141680" ref_url="https://bugzilla.suse.com/1141680" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010305" ref_url="https://www.suse.com/security/cve/CVE-2019-1010305/" source="CVE"/>
		<description>
This update for libmspack fixes the following issues:

Security issue fixed: 

- CVE-2019-1010305: Fixed a buffer overflow triggered by a crafted chm file
  which could have led to information disclosure (bsc#1141680).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-27"/>
	<updated date="2020-10-27"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1141680">SUSE bug 1141680</bugzilla>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1010305/">CVE-2019-1010305 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010305">CVE-2019-1010305 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572371" comment="libmspack0-0.0.20060920alpha-74.11.9.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218937" version="1" class="patch">
	<metadata>
		<title>Security update for MySQL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="734436" ref_url="https://bugzilla.suse.com/734436" source="BUGZILLA"/>
		<reference ref_id="768832" ref_url="https://bugzilla.suse.com/768832" source="BUGZILLA"/>
		<reference ref_id="780019" ref_url="https://bugzilla.suse.com/780019" source="BUGZILLA"/>
		<reference ref_id="789263" ref_url="https://bugzilla.suse.com/789263" source="BUGZILLA"/>
		<reference ref_id="791863" ref_url="https://bugzilla.suse.com/791863" source="BUGZILLA"/>
		<reference ref_id="792332" ref_url="https://bugzilla.suse.com/792332" source="BUGZILLA"/>
		<reference ref_id="803040" ref_url="https://bugzilla.suse.com/803040" source="BUGZILLA"/>
		<reference ref_id="830086" ref_url="https://bugzilla.suse.com/830086" source="BUGZILLA"/>
		<reference ref_id="834028" ref_url="https://bugzilla.suse.com/834028" source="BUGZILLA"/>
		<reference ref_id="834967" ref_url="https://bugzilla.suse.com/834967" source="BUGZILLA"/>
		<reference ref_id="837801" ref_url="https://bugzilla.suse.com/837801" source="BUGZILLA"/>
		<reference ref_id="857678" ref_url="https://bugzilla.suse.com/857678" source="BUGZILLA"/>
		<reference ref_id="858823" ref_url="https://bugzilla.suse.com/858823" source="BUGZILLA"/>
		<reference ref_id="861493" ref_url="https://bugzilla.suse.com/861493" source="BUGZILLA"/>
		<reference ref_id="868673" ref_url="https://bugzilla.suse.com/868673" source="BUGZILLA"/>
		<reference ref_id="873896" ref_url="https://bugzilla.suse.com/873896" source="BUGZILLA"/>
		<reference ref_id="878779" ref_url="https://bugzilla.suse.com/878779" source="BUGZILLA"/>
		<reference ref_id="887580" ref_url="https://bugzilla.suse.com/887580" source="BUGZILLA"/>
		<reference ref_id="901237" ref_url="https://bugzilla.suse.com/901237" source="BUGZILLA"/>
		<reference ref_id="914058" ref_url="https://bugzilla.suse.com/914058" source="BUGZILLA"/>
		<reference ref_id="922043" ref_url="https://bugzilla.suse.com/922043" source="BUGZILLA"/>
		<reference ref_id="927623" ref_url="https://bugzilla.suse.com/927623" source="BUGZILLA"/>
		<reference ref_id="934789" ref_url="https://bugzilla.suse.com/934789" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5615" ref_url="https://www.suse.com/security/cve/CVE-2012-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-1861" ref_url="https://www.suse.com/security/cve/CVE-2013-1861/" source="CVE"/>
		<reference ref_id="CVE-2013-3783" ref_url="https://www.suse.com/security/cve/CVE-2013-3783/" source="CVE"/>
		<reference ref_id="CVE-2013-3793" ref_url="https://www.suse.com/security/cve/CVE-2013-3793/" source="CVE"/>
		<reference ref_id="CVE-2013-3794" ref_url="https://www.suse.com/security/cve/CVE-2013-3794/" source="CVE"/>
		<reference ref_id="CVE-2013-3795" ref_url="https://www.suse.com/security/cve/CVE-2013-3795/" source="CVE"/>
		<reference ref_id="CVE-2013-3796" ref_url="https://www.suse.com/security/cve/CVE-2013-3796/" source="CVE"/>
		<reference ref_id="CVE-2013-3798" ref_url="https://www.suse.com/security/cve/CVE-2013-3798/" source="CVE"/>
		<reference ref_id="CVE-2013-3801" ref_url="https://www.suse.com/security/cve/CVE-2013-3801/" source="CVE"/>
		<reference ref_id="CVE-2013-3802" ref_url="https://www.suse.com/security/cve/CVE-2013-3802/" source="CVE"/>
		<reference ref_id="CVE-2013-3804" ref_url="https://www.suse.com/security/cve/CVE-2013-3804/" source="CVE"/>
		<reference ref_id="CVE-2013-3805" ref_url="https://www.suse.com/security/cve/CVE-2013-3805/" source="CVE"/>
		<reference ref_id="CVE-2013-3806" ref_url="https://www.suse.com/security/cve/CVE-2013-3806/" source="CVE"/>
		<reference ref_id="CVE-2013-3807" ref_url="https://www.suse.com/security/cve/CVE-2013-3807/" source="CVE"/>
		<reference ref_id="CVE-2013-3808" ref_url="https://www.suse.com/security/cve/CVE-2013-3808/" source="CVE"/>
		<reference ref_id="CVE-2013-3809" ref_url="https://www.suse.com/security/cve/CVE-2013-3809/" source="CVE"/>
		<reference ref_id="CVE-2013-3810" ref_url="https://www.suse.com/security/cve/CVE-2013-3810/" source="CVE"/>
		<reference ref_id="CVE-2013-3811" ref_url="https://www.suse.com/security/cve/CVE-2013-3811/" source="CVE"/>
		<reference ref_id="CVE-2013-3812" ref_url="https://www.suse.com/security/cve/CVE-2013-3812/" source="CVE"/>
		<reference ref_id="CVE-2013-4316" ref_url="https://www.suse.com/security/cve/CVE-2013-4316/" source="CVE"/>
		<reference ref_id="CVE-2013-5860" ref_url="https://www.suse.com/security/cve/CVE-2013-5860/" source="CVE"/>
		<reference ref_id="CVE-2013-5881" ref_url="https://www.suse.com/security/cve/CVE-2013-5881/" source="CVE"/>
		<reference ref_id="CVE-2013-5882" ref_url="https://www.suse.com/security/cve/CVE-2013-5882/" source="CVE"/>
		<reference ref_id="CVE-2013-5891" ref_url="https://www.suse.com/security/cve/CVE-2013-5891/" source="CVE"/>
		<reference ref_id="CVE-2013-5894" ref_url="https://www.suse.com/security/cve/CVE-2013-5894/" source="CVE"/>
		<reference ref_id="CVE-2013-5908" ref_url="https://www.suse.com/security/cve/CVE-2013-5908/" source="CVE"/>
		<reference ref_id="CVE-2014-0001" ref_url="https://www.suse.com/security/cve/CVE-2014-0001/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-0384" ref_url="https://www.suse.com/security/cve/CVE-2014-0384/" source="CVE"/>
		<reference ref_id="CVE-2014-0386" ref_url="https://www.suse.com/security/cve/CVE-2014-0386/" source="CVE"/>
		<reference ref_id="CVE-2014-0393" ref_url="https://www.suse.com/security/cve/CVE-2014-0393/" source="CVE"/>
		<reference ref_id="CVE-2014-0401" ref_url="https://www.suse.com/security/cve/CVE-2014-0401/" source="CVE"/>
		<reference ref_id="CVE-2014-0402" ref_url="https://www.suse.com/security/cve/CVE-2014-0402/" source="CVE"/>
		<reference ref_id="CVE-2014-0412" ref_url="https://www.suse.com/security/cve/CVE-2014-0412/" source="CVE"/>
		<reference ref_id="CVE-2014-0420" ref_url="https://www.suse.com/security/cve/CVE-2014-0420/" source="CVE"/>
		<reference ref_id="CVE-2014-0427" ref_url="https://www.suse.com/security/cve/CVE-2014-0427/" source="CVE"/>
		<reference ref_id="CVE-2014-0430" ref_url="https://www.suse.com/security/cve/CVE-2014-0430/" source="CVE"/>
		<reference ref_id="CVE-2014-0431" ref_url="https://www.suse.com/security/cve/CVE-2014-0431/" source="CVE"/>
		<reference ref_id="CVE-2014-0433" ref_url="https://www.suse.com/security/cve/CVE-2014-0433/" source="CVE"/>
		<reference ref_id="CVE-2014-0437" ref_url="https://www.suse.com/security/cve/CVE-2014-0437/" source="CVE"/>
		<reference ref_id="CVE-2014-2419" ref_url="https://www.suse.com/security/cve/CVE-2014-2419/" source="CVE"/>
		<reference ref_id="CVE-2014-2430" ref_url="https://www.suse.com/security/cve/CVE-2014-2430/" source="CVE"/>
		<reference ref_id="CVE-2014-2431" ref_url="https://www.suse.com/security/cve/CVE-2014-2431/" source="CVE"/>
		<reference ref_id="CVE-2014-2432" ref_url="https://www.suse.com/security/cve/CVE-2014-2432/" source="CVE"/>
		<reference ref_id="CVE-2014-2434" ref_url="https://www.suse.com/security/cve/CVE-2014-2434/" source="CVE"/>
		<reference ref_id="CVE-2014-2435" ref_url="https://www.suse.com/security/cve/CVE-2014-2435/" source="CVE"/>
		<reference ref_id="CVE-2014-2436" ref_url="https://www.suse.com/security/cve/CVE-2014-2436/" source="CVE"/>
		<reference ref_id="CVE-2014-2438" ref_url="https://www.suse.com/security/cve/CVE-2014-2438/" source="CVE"/>
		<reference ref_id="CVE-2014-2440" ref_url="https://www.suse.com/security/cve/CVE-2014-2440/" source="CVE"/>
		<reference ref_id="CVE-2014-2442" ref_url="https://www.suse.com/security/cve/CVE-2014-2442/" source="CVE"/>
		<reference ref_id="CVE-2014-2444" ref_url="https://www.suse.com/security/cve/CVE-2014-2444/" source="CVE"/>
		<reference ref_id="CVE-2014-2450" ref_url="https://www.suse.com/security/cve/CVE-2014-2450/" source="CVE"/>
		<reference ref_id="CVE-2014-2451" ref_url="https://www.suse.com/security/cve/CVE-2014-2451/" source="CVE"/>
		<reference ref_id="CVE-2014-2484" ref_url="https://www.suse.com/security/cve/CVE-2014-2484/" source="CVE"/>
		<reference ref_id="CVE-2014-2494" ref_url="https://www.suse.com/security/cve/CVE-2014-2494/" source="CVE"/>
		<reference ref_id="CVE-2014-3569" ref_url="https://www.suse.com/security/cve/CVE-2014-3569/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-4207" ref_url="https://www.suse.com/security/cve/CVE-2014-4207/" source="CVE"/>
		<reference ref_id="CVE-2014-4214" ref_url="https://www.suse.com/security/cve/CVE-2014-4214/" source="CVE"/>
		<reference ref_id="CVE-2014-4233" ref_url="https://www.suse.com/security/cve/CVE-2014-4233/" source="CVE"/>
		<reference ref_id="CVE-2014-4238" ref_url="https://www.suse.com/security/cve/CVE-2014-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-4240" ref_url="https://www.suse.com/security/cve/CVE-2014-4240/" source="CVE"/>
		<reference ref_id="CVE-2014-4243" ref_url="https://www.suse.com/security/cve/CVE-2014-4243/" source="CVE"/>
		<reference ref_id="CVE-2014-4258" ref_url="https://www.suse.com/security/cve/CVE-2014-4258/" source="CVE"/>
		<reference ref_id="CVE-2014-4260" ref_url="https://www.suse.com/security/cve/CVE-2014-4260/" source="CVE"/>
		<reference ref_id="CVE-2014-4274" ref_url="https://www.suse.com/security/cve/CVE-2014-4274/" source="CVE"/>
		<reference ref_id="CVE-2014-4287" ref_url="https://www.suse.com/security/cve/CVE-2014-4287/" source="CVE"/>
		<reference ref_id="CVE-2014-6463" ref_url="https://www.suse.com/security/cve/CVE-2014-6463/" source="CVE"/>
		<reference ref_id="CVE-2014-6464" ref_url="https://www.suse.com/security/cve/CVE-2014-6464/" source="CVE"/>
		<reference ref_id="CVE-2014-6469" ref_url="https://www.suse.com/security/cve/CVE-2014-6469/" source="CVE"/>
		<reference ref_id="CVE-2014-6474" ref_url="https://www.suse.com/security/cve/CVE-2014-6474/" source="CVE"/>
		<reference ref_id="CVE-2014-6478" ref_url="https://www.suse.com/security/cve/CVE-2014-6478/" source="CVE"/>
		<reference ref_id="CVE-2014-6484" ref_url="https://www.suse.com/security/cve/CVE-2014-6484/" source="CVE"/>
		<reference ref_id="CVE-2014-6489" ref_url="https://www.suse.com/security/cve/CVE-2014-6489/" source="CVE"/>
		<reference ref_id="CVE-2014-6491" ref_url="https://www.suse.com/security/cve/CVE-2014-6491/" source="CVE"/>
		<reference ref_id="CVE-2014-6494" ref_url="https://www.suse.com/security/cve/CVE-2014-6494/" source="CVE"/>
		<reference ref_id="CVE-2014-6495" ref_url="https://www.suse.com/security/cve/CVE-2014-6495/" source="CVE"/>
		<reference ref_id="CVE-2014-6496" ref_url="https://www.suse.com/security/cve/CVE-2014-6496/" source="CVE"/>
		<reference ref_id="CVE-2014-6500" ref_url="https://www.suse.com/security/cve/CVE-2014-6500/" source="CVE"/>
		<reference ref_id="CVE-2014-6505" ref_url="https://www.suse.com/security/cve/CVE-2014-6505/" source="CVE"/>
		<reference ref_id="CVE-2014-6507" ref_url="https://www.suse.com/security/cve/CVE-2014-6507/" source="CVE"/>
		<reference ref_id="CVE-2014-6520" ref_url="https://www.suse.com/security/cve/CVE-2014-6520/" source="CVE"/>
		<reference ref_id="CVE-2014-6530" ref_url="https://www.suse.com/security/cve/CVE-2014-6530/" source="CVE"/>
		<reference ref_id="CVE-2014-6551" ref_url="https://www.suse.com/security/cve/CVE-2014-6551/" source="CVE"/>
		<reference ref_id="CVE-2014-6555" ref_url="https://www.suse.com/security/cve/CVE-2014-6555/" source="CVE"/>
		<reference ref_id="CVE-2014-6559" ref_url="https://www.suse.com/security/cve/CVE-2014-6559/" source="CVE"/>
		<reference ref_id="CVE-2014-6564" ref_url="https://www.suse.com/security/cve/CVE-2014-6564/" source="CVE"/>
		<reference ref_id="CVE-2014-6568" ref_url="https://www.suse.com/security/cve/CVE-2014-6568/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206/" source="CVE"/>
		<reference ref_id="CVE-2015-0374" ref_url="https://www.suse.com/security/cve/CVE-2015-0374/" source="CVE"/>
		<reference ref_id="CVE-2015-0381" ref_url="https://www.suse.com/security/cve/CVE-2015-0381/" source="CVE"/>
		<reference ref_id="CVE-2015-0382" ref_url="https://www.suse.com/security/cve/CVE-2015-0382/" source="CVE"/>
		<reference ref_id="CVE-2015-0385" ref_url="https://www.suse.com/security/cve/CVE-2015-0385/" source="CVE"/>
		<reference ref_id="CVE-2015-0391" ref_url="https://www.suse.com/security/cve/CVE-2015-0391/" source="CVE"/>
		<reference ref_id="CVE-2015-0405" ref_url="https://www.suse.com/security/cve/CVE-2015-0405/" source="CVE"/>
		<reference ref_id="CVE-2015-0409" ref_url="https://www.suse.com/security/cve/CVE-2015-0409/" source="CVE"/>
		<reference ref_id="CVE-2015-0411" ref_url="https://www.suse.com/security/cve/CVE-2015-0411/" source="CVE"/>
		<reference ref_id="CVE-2015-0423" ref_url="https://www.suse.com/security/cve/CVE-2015-0423/" source="CVE"/>
		<reference ref_id="CVE-2015-0432" ref_url="https://www.suse.com/security/cve/CVE-2015-0432/" source="CVE"/>
		<reference ref_id="CVE-2015-0433" ref_url="https://www.suse.com/security/cve/CVE-2015-0433/" source="CVE"/>
		<reference ref_id="CVE-2015-0438" ref_url="https://www.suse.com/security/cve/CVE-2015-0438/" source="CVE"/>
		<reference ref_id="CVE-2015-0439" ref_url="https://www.suse.com/security/cve/CVE-2015-0439/" source="CVE"/>
		<reference ref_id="CVE-2015-0441" ref_url="https://www.suse.com/security/cve/CVE-2015-0441/" source="CVE"/>
		<reference ref_id="CVE-2015-0498" ref_url="https://www.suse.com/security/cve/CVE-2015-0498/" source="CVE"/>
		<reference ref_id="CVE-2015-0499" ref_url="https://www.suse.com/security/cve/CVE-2015-0499/" source="CVE"/>
		<reference ref_id="CVE-2015-0500" ref_url="https://www.suse.com/security/cve/CVE-2015-0500/" source="CVE"/>
		<reference ref_id="CVE-2015-0501" ref_url="https://www.suse.com/security/cve/CVE-2015-0501/" source="CVE"/>
		<reference ref_id="CVE-2015-0503" ref_url="https://www.suse.com/security/cve/CVE-2015-0503/" source="CVE"/>
		<reference ref_id="CVE-2015-0505" ref_url="https://www.suse.com/security/cve/CVE-2015-0505/" source="CVE"/>
		<reference ref_id="CVE-2015-0506" ref_url="https://www.suse.com/security/cve/CVE-2015-0506/" source="CVE"/>
		<reference ref_id="CVE-2015-0507" ref_url="https://www.suse.com/security/cve/CVE-2015-0507/" source="CVE"/>
		<reference ref_id="CVE-2015-0508" ref_url="https://www.suse.com/security/cve/CVE-2015-0508/" source="CVE"/>
		<reference ref_id="CVE-2015-0511" ref_url="https://www.suse.com/security/cve/CVE-2015-0511/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2566" ref_url="https://www.suse.com/security/cve/CVE-2015-2566/" source="CVE"/>
		<reference ref_id="CVE-2015-2567" ref_url="https://www.suse.com/security/cve/CVE-2015-2567/" source="CVE"/>
		<reference ref_id="CVE-2015-2568" ref_url="https://www.suse.com/security/cve/CVE-2015-2568/" source="CVE"/>
		<reference ref_id="CVE-2015-2571" ref_url="https://www.suse.com/security/cve/CVE-2015-2571/" source="CVE"/>
		<reference ref_id="CVE-2015-2573" ref_url="https://www.suse.com/security/cve/CVE-2015-2573/" source="CVE"/>
		<reference ref_id="CVE-2015-2576" ref_url="https://www.suse.com/security/cve/CVE-2015-2576/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001472.html" source="SUSE-SU"/>
		<description>

This MySQL update provides the following:

    * upgrade to version 5.5.39, [bnc#887580]
    * CVE's fixed: CVE-2014-2484, CVE-2014-4258, CVE-2014-4260,
      CVE-2014-2494, CVE-2014-4238, CVE-2014-4207, CVE-2014-4233,
      CVE-2014-4240, CVE-2014-4214, CVE-2014-4243

See also:
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
&lt;http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html&gt;

Security Issues:

    * CVE-2014-2484
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2484&gt;
    * CVE-2014-4258
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4258&gt;
    * CVE-2014-4260
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4260&gt;
    * CVE-2014-2494
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2494&gt;
    * CVE-2014-4238
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4238&gt;
    * CVE-2014-4207
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4207&gt;
    * CVE-2014-4233
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4233&gt;
    * CVE-2014-4240
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4240&gt;
    * CVE-2014-4214
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4214&gt;
    * CVE-2014-4243
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4243&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-20"/>
	<updated date="2014-08-20"/>
	<bugzilla href="https://bugzilla.suse.com/734436">SUSE bug 734436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/768832">SUSE bug 768832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780019">SUSE bug 780019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789263">SUSE bug 789263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791863">SUSE bug 791863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792332">SUSE bug 792332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803040">SUSE bug 803040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834028">SUSE bug 834028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834967">SUSE bug 834967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/837801">SUSE bug 837801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857678">SUSE bug 857678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861493">SUSE bug 861493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868673">SUSE bug 868673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878779">SUSE bug 878779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922043">SUSE bug 922043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934789">SUSE bug 934789</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5615/">CVE-2012-5615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5615">CVE-2012-5615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1861/">CVE-2013-1861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1861">CVE-2013-1861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3783/">CVE-2013-3783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3783">CVE-2013-3783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3793/">CVE-2013-3793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3793">CVE-2013-3793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3794/">CVE-2013-3794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3794">CVE-2013-3794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3795/">CVE-2013-3795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3795">CVE-2013-3795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3796/">CVE-2013-3796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3796">CVE-2013-3796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3798/">CVE-2013-3798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3798">CVE-2013-3798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3801/">CVE-2013-3801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3801">CVE-2013-3801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3802/">CVE-2013-3802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3802">CVE-2013-3802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3804/">CVE-2013-3804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3804">CVE-2013-3804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3805/">CVE-2013-3805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3805">CVE-2013-3805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3806/">CVE-2013-3806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3806">CVE-2013-3806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3807/">CVE-2013-3807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3807">CVE-2013-3807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3808/">CVE-2013-3808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3808">CVE-2013-3808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3809/">CVE-2013-3809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3809">CVE-2013-3809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3810/">CVE-2013-3810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3810">CVE-2013-3810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3811/">CVE-2013-3811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3811">CVE-2013-3811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3812/">CVE-2013-3812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3812">CVE-2013-3812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4316/">CVE-2013-4316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4316">CVE-2013-4316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5860/">CVE-2013-5860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5860">CVE-2013-5860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5881/">CVE-2013-5881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5881">CVE-2013-5881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5882/">CVE-2013-5882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5882">CVE-2013-5882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5891/">CVE-2013-5891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5891">CVE-2013-5891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5894/">CVE-2013-5894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5894">CVE-2013-5894 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5908/">CVE-2013-5908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5908">CVE-2013-5908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0001/">CVE-2014-0001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0001">CVE-2014-0001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0224">CVE-2014-0224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0384/">CVE-2014-0384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0384">CVE-2014-0384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0386/">CVE-2014-0386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0386">CVE-2014-0386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0393/">CVE-2014-0393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0393">CVE-2014-0393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0401/">CVE-2014-0401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0401">CVE-2014-0401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0402/">CVE-2014-0402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0402">CVE-2014-0402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0412/">CVE-2014-0412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0412">CVE-2014-0412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0420/">CVE-2014-0420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0420">CVE-2014-0420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0427/">CVE-2014-0427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0427">CVE-2014-0427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0430/">CVE-2014-0430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0430">CVE-2014-0430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0431/">CVE-2014-0431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0431">CVE-2014-0431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0433/">CVE-2014-0433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0433">CVE-2014-0433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0437/">CVE-2014-0437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0437">CVE-2014-0437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2419/">CVE-2014-2419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2419">CVE-2014-2419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2430/">CVE-2014-2430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2430">CVE-2014-2430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2431/">CVE-2014-2431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2431">CVE-2014-2431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2432/">CVE-2014-2432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2432">CVE-2014-2432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2434/">CVE-2014-2434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2434">CVE-2014-2434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2435/">CVE-2014-2435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2435">CVE-2014-2435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2436/">CVE-2014-2436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2436">CVE-2014-2436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2438/">CVE-2014-2438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2438">CVE-2014-2438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2440/">CVE-2014-2440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2440">CVE-2014-2440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2442/">CVE-2014-2442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2442">CVE-2014-2442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2444/">CVE-2014-2444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2444">CVE-2014-2444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2450/">CVE-2014-2450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2450">CVE-2014-2450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2451/">CVE-2014-2451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2451">CVE-2014-2451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2484/">CVE-2014-2484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2484">CVE-2014-2484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2494/">CVE-2014-2494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2494">CVE-2014-2494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3569/">CVE-2014-3569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3569">CVE-2014-3569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3570">CVE-2014-3570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3571">CVE-2014-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3572">CVE-2014-3572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4207/">CVE-2014-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4207">CVE-2014-4207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4214/">CVE-2014-4214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4214">CVE-2014-4214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4233/">CVE-2014-4233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4233">CVE-2014-4233 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4238/">CVE-2014-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4238">CVE-2014-4238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4240/">CVE-2014-4240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4240">CVE-2014-4240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4243/">CVE-2014-4243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4243">CVE-2014-4243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4258/">CVE-2014-4258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4258">CVE-2014-4258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4260/">CVE-2014-4260 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4260">CVE-2014-4260 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4274/">CVE-2014-4274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4274">CVE-2014-4274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4287/">CVE-2014-4287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4287">CVE-2014-4287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6463/">CVE-2014-6463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6463">CVE-2014-6463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6464/">CVE-2014-6464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6464">CVE-2014-6464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6469/">CVE-2014-6469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6469">CVE-2014-6469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6474/">CVE-2014-6474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6474">CVE-2014-6474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6478/">CVE-2014-6478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6478">CVE-2014-6478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6484/">CVE-2014-6484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6484">CVE-2014-6484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6489/">CVE-2014-6489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6489">CVE-2014-6489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6491/">CVE-2014-6491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6491">CVE-2014-6491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6494/">CVE-2014-6494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6494">CVE-2014-6494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6495/">CVE-2014-6495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6495">CVE-2014-6495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6496/">CVE-2014-6496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6496">CVE-2014-6496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6500/">CVE-2014-6500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6500">CVE-2014-6500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6505/">CVE-2014-6505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6505">CVE-2014-6505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6507/">CVE-2014-6507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6507">CVE-2014-6507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6520/">CVE-2014-6520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6520">CVE-2014-6520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6530/">CVE-2014-6530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6530">CVE-2014-6530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6551/">CVE-2014-6551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6551">CVE-2014-6551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6555/">CVE-2014-6555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6555">CVE-2014-6555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6559/">CVE-2014-6559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6559">CVE-2014-6559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6564/">CVE-2014-6564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6564">CVE-2014-6564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6568/">CVE-2014-6568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6568">CVE-2014-6568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8275">CVE-2014-8275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0205">CVE-2015-0205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0206">CVE-2015-0206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0374/">CVE-2015-0374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0374">CVE-2015-0374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0381/">CVE-2015-0381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0381">CVE-2015-0381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0382/">CVE-2015-0382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0382">CVE-2015-0382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0385/">CVE-2015-0385 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0385">CVE-2015-0385 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0391/">CVE-2015-0391 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0391">CVE-2015-0391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0405/">CVE-2015-0405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0405">CVE-2015-0405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0409/">CVE-2015-0409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0409">CVE-2015-0409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0411/">CVE-2015-0411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0411">CVE-2015-0411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0423/">CVE-2015-0423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0423">CVE-2015-0423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0432/">CVE-2015-0432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0432">CVE-2015-0432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0433/">CVE-2015-0433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0433">CVE-2015-0433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0438/">CVE-2015-0438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0438">CVE-2015-0438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0439/">CVE-2015-0439 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0439">CVE-2015-0439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0441/">CVE-2015-0441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0441">CVE-2015-0441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0498/">CVE-2015-0498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0498">CVE-2015-0498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0499/">CVE-2015-0499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0499">CVE-2015-0499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0500/">CVE-2015-0500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0500">CVE-2015-0500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0501/">CVE-2015-0501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0501">CVE-2015-0501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0503/">CVE-2015-0503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0503">CVE-2015-0503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0505/">CVE-2015-0505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0505">CVE-2015-0505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0506/">CVE-2015-0506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0506">CVE-2015-0506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0507/">CVE-2015-0507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0507">CVE-2015-0507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0508/">CVE-2015-0508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0508">CVE-2015-0508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0511/">CVE-2015-0511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0511">CVE-2015-0511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2305">CVE-2015-2305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2566/">CVE-2015-2566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2566">CVE-2015-2566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2567/">CVE-2015-2567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2567">CVE-2015-2567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2568/">CVE-2015-2568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2568">CVE-2015-2568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2571/">CVE-2015-2571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2571">CVE-2015-2571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2573/">CVE-2015-2573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2573">CVE-2015-2573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2576/">CVE-2015-2576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2576">CVE-2015-2576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578787" comment="libmysql55client18-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578788" comment="libmysql55client18-32bit-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578789" comment="libmysql55client18-x86-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578790" comment="libmysql55client_r18-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578791" comment="libmysqlclient15-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578792" comment="libmysqlclient15-32bit-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578793" comment="libmysqlclient15-x86-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578794" comment="libmysqlclient_r15-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578795" comment="mysql-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578796" comment="mysql-client-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578797" comment="mysql-tools-5.5.39-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578787" comment="libmysql55client18-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578788" comment="libmysql55client18-32bit-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578789" comment="libmysql55client18-x86-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578790" comment="libmysql55client_r18-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578791" comment="libmysqlclient15-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578792" comment="libmysqlclient15-32bit-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578793" comment="libmysqlclient15-x86-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578794" comment="libmysqlclient_r15-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578795" comment="mysql-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578796" comment="mysql-client-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578797" comment="mysql-tools-5.5.39-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578787" comment="libmysql55client18-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578788" comment="libmysql55client18-32bit-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578789" comment="libmysql55client18-x86-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578790" comment="libmysql55client_r18-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578791" comment="libmysqlclient15-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578792" comment="libmysqlclient15-32bit-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578793" comment="libmysqlclient15-x86-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578794" comment="libmysqlclient_r15-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578795" comment="mysql-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578796" comment="mysql-client-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578797" comment="mysql-tools-5.5.39-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218938" version="1" class="patch">
	<metadata>
		<title>Security update for libnl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1020123" ref_url="https://bugzilla.suse.com/1020123" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0386" ref_url="https://www.suse.com/security/cve/CVE-2017-0386/" source="CVE"/>
		<description>
This update for libnl fixes the following issues:

Security issue fixed:

- CVE-2017-0386: Fixed a privilege escalation vulnerability which allowed a local user to execute code within a privileged process (bsc#1020123).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-28"/>
	<updated date="2020-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1020123">SUSE bug 1020123</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0386/">CVE-2017-0386 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0386">CVE-2017-0386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572380" comment="libnl-1.1-49.22.6.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572381" comment="libnl-32bit-1.1-49.22.6.3.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218939" version="1" class="patch">
	<metadata>
		<title>Security update for OpenSSL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="859228" ref_url="https://bugzilla.suse.com/859228" source="BUGZILLA"/>
		<reference ref_id="859924" ref_url="https://bugzilla.suse.com/859924" source="BUGZILLA"/>
		<reference ref_id="860332" ref_url="https://bugzilla.suse.com/860332" source="BUGZILLA"/>
		<reference ref_id="862181" ref_url="https://bugzilla.suse.com/862181" source="BUGZILLA"/>
		<reference ref_id="869945" ref_url="https://bugzilla.suse.com/869945" source="BUGZILLA"/>
		<reference ref_id="870192" ref_url="https://bugzilla.suse.com/870192" source="BUGZILLA"/>
		<reference ref_id="879179" ref_url="https://bugzilla.suse.com/879179" source="BUGZILLA"/>
		<reference ref_id="880891" ref_url="https://bugzilla.suse.com/880891" source="BUGZILLA"/>
		<reference ref_id="890764" ref_url="https://bugzilla.suse.com/890764" source="BUGZILLA"/>
		<reference ref_id="890767" ref_url="https://bugzilla.suse.com/890767" source="BUGZILLA"/>
		<reference ref_id="890768" ref_url="https://bugzilla.suse.com/890768" source="BUGZILLA"/>
		<reference ref_id="890769" ref_url="https://bugzilla.suse.com/890769" source="BUGZILLA"/>
		<reference ref_id="890770" ref_url="https://bugzilla.suse.com/890770" source="BUGZILLA"/>
		<reference ref_id="892403" ref_url="https://bugzilla.suse.com/892403" source="BUGZILLA"/>
		<reference ref_id="901223" ref_url="https://bugzilla.suse.com/901223" source="BUGZILLA"/>
		<reference ref_id="901277" ref_url="https://bugzilla.suse.com/901277" source="BUGZILLA"/>
		<reference ref_id="912014" ref_url="https://bugzilla.suse.com/912014" source="BUGZILLA"/>
		<reference ref_id="912015" ref_url="https://bugzilla.suse.com/912015" source="BUGZILLA"/>
		<reference ref_id="912018" ref_url="https://bugzilla.suse.com/912018" source="BUGZILLA"/>
		<reference ref_id="912293" ref_url="https://bugzilla.suse.com/912293" source="BUGZILLA"/>
		<reference ref_id="912294" ref_url="https://bugzilla.suse.com/912294" source="BUGZILLA"/>
		<reference ref_id="912296" ref_url="https://bugzilla.suse.com/912296" source="BUGZILLA"/>
		<reference ref_id="915976" ref_url="https://bugzilla.suse.com/915976" source="BUGZILLA"/>
		<reference ref_id="919648" ref_url="https://bugzilla.suse.com/919648" source="BUGZILLA"/>
		<reference ref_id="920236" ref_url="https://bugzilla.suse.com/920236" source="BUGZILLA"/>
		<reference ref_id="922488" ref_url="https://bugzilla.suse.com/922488" source="BUGZILLA"/>
		<reference ref_id="922496" ref_url="https://bugzilla.suse.com/922496" source="BUGZILLA"/>
		<reference ref_id="922499" ref_url="https://bugzilla.suse.com/922499" source="BUGZILLA"/>
		<reference ref_id="922500" ref_url="https://bugzilla.suse.com/922500" source="BUGZILLA"/>
		<reference ref_id="922501" ref_url="https://bugzilla.suse.com/922501" source="BUGZILLA"/>
		<reference ref_id="929678" ref_url="https://bugzilla.suse.com/929678" source="BUGZILLA"/>
		<reference ref_id="931698" ref_url="https://bugzilla.suse.com/931698" source="BUGZILLA"/>
		<reference ref_id="933898" ref_url="https://bugzilla.suse.com/933898" source="BUGZILLA"/>
		<reference ref_id="933911" ref_url="https://bugzilla.suse.com/933911" source="BUGZILLA"/>
		<reference ref_id="934487" ref_url="https://bugzilla.suse.com/934487" source="BUGZILLA"/>
		<reference ref_id="934489" ref_url="https://bugzilla.suse.com/934489" source="BUGZILLA"/>
		<reference ref_id="934491" ref_url="https://bugzilla.suse.com/934491" source="BUGZILLA"/>
		<reference ref_id="934493" ref_url="https://bugzilla.suse.com/934493" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-5146" ref_url="https://www.suse.com/security/cve/CVE-2009-5146/" source="CVE"/>
		<reference ref_id="CVE-2014-0076" ref_url="https://www.suse.com/security/cve/CVE-2014-0076/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-3505" ref_url="https://www.suse.com/security/cve/CVE-2014-3505/" source="CVE"/>
		<reference ref_id="CVE-2014-3506" ref_url="https://www.suse.com/security/cve/CVE-2014-3506/" source="CVE"/>
		<reference ref_id="CVE-2014-3507" ref_url="https://www.suse.com/security/cve/CVE-2014-3507/" source="CVE"/>
		<reference ref_id="CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508/" source="CVE"/>
		<reference ref_id="CVE-2014-3510" ref_url="https://www.suse.com/security/cve/CVE-2014-3510/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0292" ref_url="https://www.suse.com/security/cve/CVE-2015-0292/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-3216" ref_url="https://www.suse.com/security/cve/CVE-2015-3216/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001481.html" source="SUSE-SU"/>
		<description>

This OpenSSL update fixes the following issues:

    * Session Ticket Memory Leak (CVE-2014-3567)
    * Build option no-ssl3 is incomplete (CVE-2014-3568)
    * Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE)

Security Issues:

    * CVE-2014-3567
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567&gt;
    * CVE-2014-3566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&gt;
    * CVE-2014-3568
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-25"/>
	<updated date="2014-10-25"/>
	<bugzilla href="https://bugzilla.suse.com/859228">SUSE bug 859228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859924">SUSE bug 859924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860332">SUSE bug 860332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862181">SUSE bug 862181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869945">SUSE bug 869945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870192">SUSE bug 870192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879179">SUSE bug 879179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890764">SUSE bug 890764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890767">SUSE bug 890767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890768">SUSE bug 890768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890769">SUSE bug 890769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890770">SUSE bug 890770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892403">SUSE bug 892403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901223">SUSE bug 901223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912014">SUSE bug 912014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912015">SUSE bug 912015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912018">SUSE bug 912018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912293">SUSE bug 912293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912294">SUSE bug 912294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912296">SUSE bug 912296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915976">SUSE bug 915976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920236">SUSE bug 920236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922488">SUSE bug 922488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922496">SUSE bug 922496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922499">SUSE bug 922499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922500">SUSE bug 922500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922501">SUSE bug 922501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929678">SUSE bug 929678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931698">SUSE bug 931698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933898">SUSE bug 933898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933911">SUSE bug 933911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934487">SUSE bug 934487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934489">SUSE bug 934489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934491">SUSE bug 934491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934493">SUSE bug 934493</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5146/">CVE-2009-5146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5146">CVE-2009-5146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0076/">CVE-2014-0076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0076">CVE-2014-0076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0221">CVE-2014-0221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0224">CVE-2014-0224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3470">CVE-2014-3470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3505/">CVE-2014-3505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3505">CVE-2014-3505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3506/">CVE-2014-3506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3506">CVE-2014-3506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3507/">CVE-2014-3507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3507">CVE-2014-3507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3508">CVE-2014-3508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3510/">CVE-2014-3510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3510">CVE-2014-3510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3567">CVE-2014-3567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3568">CVE-2014-3568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3570">CVE-2014-3570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3571">CVE-2014-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3572">CVE-2014-3572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8275">CVE-2014-8275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0205">CVE-2015-0205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0209">CVE-2015-0209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0286">CVE-2015-0286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0287">CVE-2015-0287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0288">CVE-2015-0288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0289">CVE-2015-0289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0292/">CVE-2015-0292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0292">CVE-2015-0292 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0293">CVE-2015-0293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1788">CVE-2015-1788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1789">CVE-2015-1789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1790">CVE-2015-1790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1791">CVE-2015-1791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1792">CVE-2015-1792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3216/">CVE-2015-3216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3216">CVE-2015-3216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578798" comment="libopenssl0_9_8-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578799" comment="libopenssl0_9_8-32bit-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578800" comment="libopenssl0_9_8-hmac-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578801" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578802" comment="libopenssl0_9_8-x86-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578803" comment="openssl-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578804" comment="openssl-doc-0.9.8j-0.66.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578798" comment="libopenssl0_9_8-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578799" comment="libopenssl0_9_8-32bit-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578800" comment="libopenssl0_9_8-hmac-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578801" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578802" comment="libopenssl0_9_8-x86-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578803" comment="openssl-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578804" comment="openssl-doc-0.9.8j-0.66.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578798" comment="libopenssl0_9_8-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578799" comment="libopenssl0_9_8-32bit-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578800" comment="libopenssl0_9_8-hmac-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578801" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578802" comment="libopenssl0_9_8-x86-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578803" comment="openssl-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578804" comment="openssl-doc-0.9.8j-0.66.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218940" version="1" class="patch">
	<metadata>
		<title>Security update for libotr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="969785" ref_url="https://bugzilla.suse.com/969785" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2851" ref_url="https://www.suse.com/security/cve/CVE-2016-2851/" source="CVE"/>
		<description>

This update for libotr fixes the following issues:

- Apply 'libotr-CVE-2016-2851.patch' to fix integer overflows that
  used to occur on 64-bit architectures when receiving 4GB messages.
  This flaw could potentially have been exploited by an attacker to
  remotely execute arbitrary code on the user's machine.
  (CVE-2016-2851, bsc#969785)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-09"/>
	<updated date="2016-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/969785">SUSE bug 969785</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2851/">CVE-2016-2851 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2851">CVE-2016-2851 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572398" comment="libotr2-3.2.0-10.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218941" version="1" class="patch">
	<metadata>
		<title>Security update for pixman</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="815064" ref_url="https://bugzilla.suse.com/815064" source="BUGZILLA"/>
		<reference ref_id="853824" ref_url="https://bugzilla.suse.com/853824" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1591" ref_url="https://www.suse.com/security/cve/CVE-2013-1591/" source="CVE"/>
		<reference ref_id="CVE-2013-6425" ref_url="https://www.suse.com/security/cve/CVE-2013-6425/" source="CVE"/>
		<description>

This update fixes the following security issue with pixman:

    * Integer underflow when handling trapezoids. (bnc#853824,
      CVE-2013-6425)

Security Issues:

    * CVE-2013-6425
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6425&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-21"/>
	<updated date="2013-12-21"/>
	<bugzilla href="https://bugzilla.suse.com/815064">SUSE bug 815064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853824">SUSE bug 853824</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1591/">CVE-2013-1591 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-1591">CVE-2013-1591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6425/">CVE-2013-6425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6425">CVE-2013-6425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578805" comment="libpixman-1-0-0.24.4-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578806" comment="libpixman-1-0-32bit-0.24.4-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578807" comment="libpixman-1-0-x86-0.24.4-0.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578805" comment="libpixman-1-0-0.24.4-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578806" comment="libpixman-1-0-32bit-0.24.4-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578807" comment="libpixman-1-0-x86-0.24.4-0.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578805" comment="libpixman-1-0-0.24.4-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578806" comment="libpixman-1-0-32bit-0.24.4-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578807" comment="libpixman-1-0-x86-0.24.4-0.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218942" version="1" class="patch">
	<metadata>
		<title>Security update for libpng</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="873123" ref_url="https://bugzilla.suse.com/873123" source="BUGZILLA"/>
		<reference ref_id="873124" ref_url="https://bugzilla.suse.com/873124" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7353" ref_url="https://www.suse.com/security/cve/CVE-2013-7353/" source="CVE"/>
		<reference ref_id="CVE-2013-7354" ref_url="https://www.suse.com/security/cve/CVE-2013-7354/" source="CVE"/>
		<description>

This libpng update fixes the following two overflow security issues.

    * bnc#873123: Fixed integer overflow that could have lead to a
      heap-based buffer overflow in png_set_sPLT() and png_set_text_2()
      (CVE-2013-7354).
    * bnc#873124: Fixed integer overflow that could have lead to a
      heap-based buffer overflow in png_set_unknown_chunks()
      (CVE-2013-7353).

Security Issue references:

    * CVE-2013-7353
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7353&gt;
    * CVE-2013-7354
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7354&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-29"/>
	<updated date="2014-04-29"/>
	<bugzilla href="https://bugzilla.suse.com/873123">SUSE bug 873123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873124">SUSE bug 873124</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7353/">CVE-2013-7353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7353">CVE-2013-7353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7354/">CVE-2013-7354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7354">CVE-2013-7354 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578808" comment="libpng12-0-1.2.31-5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578809" comment="libpng12-0-32bit-1.2.31-5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578810" comment="libpng12-0-x86-1.2.31-5.33.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578808" comment="libpng12-0-1.2.31-5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578809" comment="libpng12-0-32bit-1.2.31-5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578810" comment="libpng12-0-x86-1.2.31-5.33.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578808" comment="libpng12-0-1.2.31-5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578809" comment="libpng12-0-32bit-1.2.31-5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578810" comment="libpng12-0-x86-1.2.31-5.33.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218943" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="952051" ref_url="https://bugzilla.suse.com/952051" source="BUGZILLA"/>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001682.html" source="SUSE-SU"/>
		<description>
The libpng12-0 package was updated to fix the following security issues:

- CVE-2015-8126: Fixed a buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions (bsc#954980).
- CVE-2015-7981: Fixed an out-of-bound read (bsc#952051).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-18"/>
	<updated date="2015-11-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952051">SUSE bug 952051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7981">CVE-2015-7981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578811" comment="libpng12-0-1.2.31-5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578812" comment="libpng12-0-32bit-1.2.31-5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578813" comment="libpng12-0-x86-1.2.31-5.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578811" comment="libpng12-0-1.2.31-5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578812" comment="libpng12-0-32bit-1.2.31-5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578813" comment="libpng12-0-x86-1.2.31-5.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578811" comment="libpng12-0-1.2.31-5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578812" comment="libpng12-0-32bit-1.2.31-5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578813" comment="libpng12-0-x86-1.2.31-5.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218944" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001790.html" source="SUSE-SU"/>
		<description>
- security update:
   This update fixes the following securit issue:

   * CVE-2015-8126 Multiple buffer overflows in the png_set_PLTE and png_get_PLTE functions
     allow remote attackers to cause a denial of service (application crash) or possibly have 
     unspecified other impact [bsc#954980]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-08"/>
	<updated date="2016-01-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578814" comment="libpng12-0-1.2.31-5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578815" comment="libpng12-0-32bit-1.2.31-5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578816" comment="libpng12-0-x86-1.2.31-5.38.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578814" comment="libpng12-0-1.2.31-5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578815" comment="libpng12-0-32bit-1.2.31-5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578816" comment="libpng12-0-x86-1.2.31-5.38.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578814" comment="libpng12-0-1.2.31-5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578815" comment="libpng12-0-32bit-1.2.31-5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578816" comment="libpng12-0-x86-1.2.31-5.38.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218945" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1017646" ref_url="https://bugzilla.suse.com/1017646" source="BUGZILLA"/>
		<reference ref_id="958791" ref_url="https://bugzilla.suse.com/958791" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<description>

This update for libpng12-0 fixes the following issues:

Security issues fixed:
- CVE-2015-8540: read underflow in libpng (bsc#958791)
- CVE-2016-10087: NULL pointer dereference in png_set_text_2() (bsc#1017646)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-31"/>
	<updated date="2017-03-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017646">SUSE bug 1017646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958791">SUSE bug 958791</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8540">CVE-2015-8540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10087">CVE-2016-10087 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572414" comment="libpng12-0-1.2.31-5.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572415" comment="libpng12-0-32bit-1.2.31-5.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218946" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1141493" ref_url="https://bugzilla.suse.com/1141493" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12652" ref_url="https://www.suse.com/security/cve/CVE-2017-12652/" source="CVE"/>
		<description>
This update for libpng12-0 fixes the following issues:

Security issue fixed:

- CVE-2017-12652: Fixed an Input Validation Error related to the length of chunks (bsc#1141493).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-14"/>
	<updated date="2020-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141493">SUSE bug 1141493</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12652/">CVE-2017-12652 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12652">CVE-2017-12652 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572416" comment="libpng12-0-1.2.31-5.44.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572417" comment="libpng12-0-32bit-1.2.31-5.44.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218947" version="1" class="patch">
	<metadata>
		<title>Security update for poppler</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="845765" ref_url="https://bugzilla.suse.com/845765" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-5110" ref_url="https://www.suse.com/security/cve/CVE-2010-5110/" source="CVE"/>
		<description>

This update fixes problems in DCTStream error handling in poppler.

Security Issue reference:

    * CVE-2010-5110
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5110&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-21"/>
	<updated date="2014-05-21"/>
	<bugzilla href="https://bugzilla.suse.com/845765">SUSE bug 845765</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5110/">CVE-2010-5110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-5110">CVE-2010-5110 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578817" comment="libpoppler-glib4-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578818" comment="libpoppler-qt4-3-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578819" comment="libpoppler5-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578820" comment="poppler-tools-0.12.3-1.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578817" comment="libpoppler-glib4-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578818" comment="libpoppler-qt4-3-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578819" comment="libpoppler5-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578820" comment="poppler-tools-0.12.3-1.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578817" comment="libpoppler-glib4-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578818" comment="libpoppler-qt4-3-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578819" comment="libpoppler5-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578820" comment="poppler-tools-0.12.3-1.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218948" version="1" class="patch">
	<metadata>
		<title>Security update for pulseaudio</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="746879" ref_url="https://bugzilla.suse.com/746879" source="BUGZILLA"/>
		<reference ref_id="754615" ref_url="https://bugzilla.suse.com/754615" source="BUGZILLA"/>
		<reference ref_id="797080" ref_url="https://bugzilla.suse.com/797080" source="BUGZILLA"/>
		<reference ref_id="881524" ref_url="https://bugzilla.suse.com/881524" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3970" ref_url="https://www.suse.com/security/cve/CVE-2014-3970/" source="CVE"/>
		<description>

The following security issue is fixed in this update:

    * CVE-2014-3970: Fixed a remote denial of service attack in
      module-rtp-recv.

Security Issues:

    * CVE-2014-3970
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3970&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-29"/>
	<updated date="2014-07-29"/>
	<bugzilla href="https://bugzilla.suse.com/746879">SUSE bug 746879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754615">SUSE bug 754615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797080">SUSE bug 797080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881524">SUSE bug 881524</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3970/">CVE-2014-3970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3970">CVE-2014-3970 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578821" comment="libpulse-browse0-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578822" comment="libpulse-mainloop-glib0-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578823" comment="libpulse0-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578824" comment="libpulse0-32bit-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578825" comment="libpulse0-x86-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578826" comment="pulseaudio-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578827" comment="pulseaudio-esound-compat-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578828" comment="pulseaudio-gdm-hooks-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578829" comment="pulseaudio-lang-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578830" comment="pulseaudio-module-x11-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578831" comment="pulseaudio-module-zeroconf-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578832" comment="pulseaudio-utils-0.9.23-0.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578821" comment="libpulse-browse0-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578822" comment="libpulse-mainloop-glib0-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578823" comment="libpulse0-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578824" comment="libpulse0-32bit-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578825" comment="libpulse0-x86-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578826" comment="pulseaudio-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578827" comment="pulseaudio-esound-compat-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578828" comment="pulseaudio-gdm-hooks-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578829" comment="pulseaudio-lang-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578830" comment="pulseaudio-module-x11-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578831" comment="pulseaudio-module-zeroconf-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578832" comment="pulseaudio-utils-0.9.23-0.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578821" comment="libpulse-browse0-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578822" comment="libpulse-mainloop-glib0-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578823" comment="libpulse0-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578824" comment="libpulse0-32bit-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578825" comment="libpulse0-x86-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578826" comment="pulseaudio-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578827" comment="pulseaudio-esound-compat-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578828" comment="pulseaudio-gdm-hooks-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578829" comment="pulseaudio-lang-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578830" comment="pulseaudio-module-x11-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578831" comment="pulseaudio-module-zeroconf-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578832" comment="pulseaudio-utils-0.9.23-0.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218949" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1118595" ref_url="https://bugzilla.suse.com/1118595" source="BUGZILLA"/>
		<reference ref_id="1118596" ref_url="https://bugzilla.suse.com/1118596" source="BUGZILLA"/>
		<reference ref_id="1118599" ref_url="https://bugzilla.suse.com/1118599" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15518" ref_url="https://www.suse.com/security/cve/CVE-2018-15518/" source="CVE"/>
		<reference ref_id="CVE-2018-19869" ref_url="https://www.suse.com/security/cve/CVE-2018-19869/" source="CVE"/>
		<reference ref_id="CVE-2018-19873" ref_url="https://www.suse.com/security/cve/CVE-2018-19873/" source="CVE"/>
		<description>
This update for libqt4 fixes the following issues:

- CVE-2018-15518: Fixed a double free in QXmlStreamReader (bsc#1118595)
- CVE-2018-19873: Fixed a segmantation fault via a malformed 
  BMP file (bsc#1118596).
- CVE-2018-19869: Fixed an improper checking which might lead to
  a crach via a malformed url reference (bsc#1118599).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-07"/>
	<updated date="2020-04-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118595">SUSE bug 1118595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118596">SUSE bug 1118596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118599">SUSE bug 1118599</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15518/">CVE-2018-15518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15518">CVE-2018-15518 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19869/">CVE-2018-19869 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19869">CVE-2018-19869 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19873/">CVE-2018-19873 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19873">CVE-2018-19873 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578833" comment="libQtWebKit4-4.6.3-5.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578834" comment="libQtWebKit4-32bit-4.6.3-5.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578835" comment="libqt4-4.6.3-5.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578836" comment="libqt4-32bit-4.6.3-5.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578837" comment="libqt4-qt3support-4.6.3-5.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578838" comment="libqt4-qt3support-32bit-4.6.3-5.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578839" comment="libqt4-sql-4.6.3-5.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578840" comment="libqt4-sql-32bit-4.6.3-5.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578841" comment="libqt4-sql-mysql-4.6.3-5.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578842" comment="libqt4-sql-sqlite-4.6.3-5.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578843" comment="libqt4-x11-4.6.3-5.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578844" comment="libqt4-x11-32bit-4.6.3-5.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578845" comment="qt4-x11-tools-4.6.3-5.42.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218950" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176315" ref_url="https://bugzilla.suse.com/1176315" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17507" ref_url="https://www.suse.com/security/cve/CVE-2020-17507/" source="CVE"/>
		<description>
This update for libqt4 fixes the following issues:

- CVE-2020-17507: Fixed buffer over-read in read_xbm_body (bsc#1176315) 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-16"/>
	<updated date="2020-12-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1176315">SUSE bug 1176315</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17507/">CVE-2020-17507 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17507">CVE-2020-17507 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578846" comment="libQtWebKit4-4.6.3-5.42.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578847" comment="libQtWebKit4-32bit-4.6.3-5.42.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578848" comment="libqt4-4.6.3-5.42.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578849" comment="libqt4-32bit-4.6.3-5.42.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578850" comment="libqt4-qt3support-4.6.3-5.42.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578851" comment="libqt4-qt3support-32bit-4.6.3-5.42.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578852" comment="libqt4-sql-4.6.3-5.42.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578853" comment="libqt4-sql-32bit-4.6.3-5.42.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578854" comment="libqt4-sql-mysql-4.6.3-5.42.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578855" comment="libqt4-sql-sqlite-4.6.3-5.42.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578856" comment="libqt4-x11-4.6.3-5.42.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578857" comment="libqt4-x11-32bit-4.6.3-5.42.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578858" comment="qt4-x11-tools-4.6.3-5.42.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218951" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="865241" ref_url="https://bugzilla.suse.com/865241" source="BUGZILLA"/>
		<description>

This update of the QT4 QSSL interface makes it select a set of default 
ciphers that is recommended for current usage. This update is needed for 
Konqueror to restrict its cipher set when using https.

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-03"/>
	<updated date="2014-09-03"/>
	<bugzilla href="https://bugzilla.suse.com/865241">SUSE bug 865241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578859" comment="libQtWebKit4-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563473" comment="libQtWebKit4-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563474" comment="libQtWebKit4-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578860" comment="libqt4-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578861" comment="libqt4-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578862" comment="libqt4-qt3support-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578863" comment="libqt4-qt3support-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578864" comment="libqt4-qt3support-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578865" comment="libqt4-sql-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578866" comment="libqt4-sql-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578867" comment="libqt4-sql-mysql-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578868" comment="libqt4-sql-sqlite-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578869" comment="libqt4-sql-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578870" comment="libqt4-x11-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578871" comment="libqt4-x11-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578872" comment="libqt4-x11-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578873" comment="libqt4-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578874" comment="qt4-x11-tools-4.6.3-5.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578859" comment="libQtWebKit4-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563473" comment="libQtWebKit4-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563474" comment="libQtWebKit4-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578860" comment="libqt4-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578861" comment="libqt4-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578862" comment="libqt4-qt3support-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578863" comment="libqt4-qt3support-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578864" comment="libqt4-qt3support-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578865" comment="libqt4-sql-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578866" comment="libqt4-sql-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578867" comment="libqt4-sql-mysql-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578868" comment="libqt4-sql-sqlite-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578869" comment="libqt4-sql-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578870" comment="libqt4-x11-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578871" comment="libqt4-x11-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578872" comment="libqt4-x11-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578873" comment="libqt4-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578874" comment="qt4-x11-tools-4.6.3-5.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578859" comment="libQtWebKit4-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563473" comment="libQtWebKit4-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563474" comment="libQtWebKit4-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578860" comment="libqt4-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578861" comment="libqt4-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578862" comment="libqt4-qt3support-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578863" comment="libqt4-qt3support-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578864" comment="libqt4-qt3support-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578865" comment="libqt4-sql-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578866" comment="libqt4-sql-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578867" comment="libqt4-sql-mysql-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578868" comment="libqt4-sql-sqlite-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578869" comment="libqt4-sql-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578870" comment="libqt4-x11-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578871" comment="libqt4-x11-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578872" comment="libqt4-x11-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578873" comment="libqt4-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578874" comment="qt4-x11-tools-4.6.3-5.32.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218952" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="921999" ref_url="https://bugzilla.suse.com/921999" source="BUGZILLA"/>
		<reference ref_id="927806" ref_url="https://bugzilla.suse.com/927806" source="BUGZILLA"/>
		<reference ref_id="927807" ref_url="https://bugzilla.suse.com/927807" source="BUGZILLA"/>
		<reference ref_id="927808" ref_url="https://bugzilla.suse.com/927808" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295/" source="CVE"/>
		<reference ref_id="CVE-2015-1858" ref_url="https://www.suse.com/security/cve/CVE-2015-1858/" source="CVE"/>
		<reference ref_id="CVE-2015-1859" ref_url="https://www.suse.com/security/cve/CVE-2015-1859/" source="CVE"/>
		<reference ref_id="CVE-2015-1860" ref_url="https://www.suse.com/security/cve/CVE-2015-1860/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001416.html" source="SUSE-SU"/>
		<description>

The libqt4 library was updated to fix several security issues:

    * CVE-2015-0295: Division by zero when processing malformed BMP files.
      (bsc#921999)
    * CVE-2015-1858: Segmentation fault in BMP Qt Image Format Handling.
      (bsc#927806)
    * CVE-2015-1859: Segmentation fault in ICO Qt Image Format Handling.
      (bsc#927807)
    * CVE-2015-1860: Segmentation fault in GIF Qt Image Format Handling.
      (bsc#927808)

Security Issues:

    * CVE-2015-1858
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1858&gt;
    * CVE-2015-1859
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1859&gt;
    * CVE-2015-1860
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1860&gt;
    * CVE-2015-0295
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0295&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-12"/>
	<updated date="2015-05-12"/>
	<bugzilla href="https://bugzilla.suse.com/921999">SUSE bug 921999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927806">SUSE bug 927806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927807">SUSE bug 927807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927808">SUSE bug 927808</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0295">CVE-2015-0295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1858/">CVE-2015-1858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1858">CVE-2015-1858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1859/">CVE-2015-1859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1859">CVE-2015-1859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1860/">CVE-2015-1860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1860">CVE-2015-1860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578875" comment="libQtWebKit4-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563489" comment="libQtWebKit4-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563490" comment="libQtWebKit4-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578876" comment="libqt4-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578877" comment="libqt4-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578878" comment="libqt4-qt3support-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578879" comment="libqt4-qt3support-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578880" comment="libqt4-qt3support-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578881" comment="libqt4-sql-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578882" comment="libqt4-sql-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578883" comment="libqt4-sql-mysql-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578884" comment="libqt4-sql-sqlite-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578885" comment="libqt4-sql-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578886" comment="libqt4-x11-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578887" comment="libqt4-x11-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578888" comment="libqt4-x11-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578889" comment="libqt4-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578890" comment="qt4-x11-tools-4.6.3-5.34.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578875" comment="libQtWebKit4-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563489" comment="libQtWebKit4-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563490" comment="libQtWebKit4-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578876" comment="libqt4-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578877" comment="libqt4-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578878" comment="libqt4-qt3support-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578879" comment="libqt4-qt3support-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578880" comment="libqt4-qt3support-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578881" comment="libqt4-sql-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578882" comment="libqt4-sql-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578883" comment="libqt4-sql-mysql-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578884" comment="libqt4-sql-sqlite-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578885" comment="libqt4-sql-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578886" comment="libqt4-x11-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578887" comment="libqt4-x11-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578888" comment="libqt4-x11-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578889" comment="libqt4-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578890" comment="qt4-x11-tools-4.6.3-5.34.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578875" comment="libQtWebKit4-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563489" comment="libQtWebKit4-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563490" comment="libQtWebKit4-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578876" comment="libqt4-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578877" comment="libqt4-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578878" comment="libqt4-qt3support-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578879" comment="libqt4-qt3support-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578880" comment="libqt4-qt3support-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578881" comment="libqt4-sql-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578882" comment="libqt4-sql-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578883" comment="libqt4-sql-mysql-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578884" comment="libqt4-sql-sqlite-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578885" comment="libqt4-sql-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578886" comment="libqt4-x11-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578887" comment="libqt4-x11-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578888" comment="libqt4-x11-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578889" comment="libqt4-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578890" comment="qt4-x11-tools-4.6.3-5.34.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218953" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="840753" ref_url="https://bugzilla.suse.com/840753" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1881" ref_url="https://www.suse.com/security/cve/CVE-2013-1881/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001637.html" source="SUSE-SU"/>
		<description>
librsvg was updated to fix one security issue.

This security issue was fixed:
- CVE-2013-1881: GNOME libsvg allowed remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue (bsc#840753).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-12"/>
	<updated date="2015-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/840753">SUSE bug 840753</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1881/">CVE-2013-1881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1881">CVE-2013-1881 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578891" comment="librsvg-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578892" comment="librsvg-32bit-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578893" comment="librsvg-x86-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578894" comment="rsvg-view-2.26.0-2.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578891" comment="librsvg-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578892" comment="librsvg-32bit-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578893" comment="librsvg-x86-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578894" comment="rsvg-view-2.26.0-2.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578891" comment="librsvg-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578892" comment="librsvg-32bit-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578893" comment="librsvg-x86-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578894" comment="rsvg-view-2.26.0-2.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218954" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1083232" ref_url="https://bugzilla.suse.com/1083232" source="BUGZILLA"/>
		<reference ref_id="1094213" ref_url="https://bugzilla.suse.com/1094213" source="BUGZILLA"/>
		<reference ref_id="1162501" ref_url="https://bugzilla.suse.com/1162501" source="BUGZILLA"/>
		<reference ref_id="977985" ref_url="https://bugzilla.suse.com/977985" source="BUGZILLA"/>
		<reference ref_id="977986" ref_url="https://bugzilla.suse.com/977986" source="BUGZILLA"/>
		<reference ref_id="987877" ref_url="https://bugzilla.suse.com/987877" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7558" ref_url="https://www.suse.com/security/cve/CVE-2015-7558/" source="CVE"/>
		<reference ref_id="CVE-2016-4348" ref_url="https://www.suse.com/security/cve/CVE-2016-4348/" source="CVE"/>
		<reference ref_id="CVE-2016-6163" ref_url="https://www.suse.com/security/cve/CVE-2016-6163/" source="CVE"/>
		<reference ref_id="CVE-2018-1000041" ref_url="https://www.suse.com/security/cve/CVE-2018-1000041/" source="CVE"/>
		<reference ref_id="CVE-2019-20446" ref_url="https://www.suse.com/security/cve/CVE-2019-20446/" source="CVE"/>
		<description>

This update for librsvg fixes the following issues:

- CVE-2019-20446: Fixed an issue where a crafted SVG file with nested
  patterns can cause denial of service (bsc#1162501).
  NOTE: Librsvg now has limits on the number of loaded XML elements,
  and the number of referenced elements within an SVG document.    
- CVE-2015-7558: librsvg allowed context-dependent attackers to cause a denial of service (infinite loop, stack consumption, and application crash) via cyclic references in an SVG document (bsc#977985).
- CVE-2016-6163: svg pattern linking to non-pattern fallback leads to invalid memory access, allowing to cause DoS (bsc#987877).
- CVE-2018-1000041: Fixed leaking credentials via SVG files that reference UNC paths (bsc#1083232)
- CVE-2016-4348: Fixed a denial of service parsing SVGs with circular definitions _rsvg_css_normalize_font_size() function (bsc#977986)
- Fixed a stack exhaustion with circular references in &lt;use&gt;
  elements.
- Fixed a denial-of-service condition from exponential explosion
  of rendered elements, through nested use of SVG 'use' elements in
  malicious SVGs.

This updated also removes the the Mozilla plugin package. Firefox can render SVG on its own and
the plugin interface is obsolete.
    
This update for libcroco fixes the following issue:

- Fixed an issue where librsvg was throwing a segmentation fault (bsc#1094213).    
    
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-17"/>
	<updated date="2020-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083232">SUSE bug 1083232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094213">SUSE bug 1094213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162501">SUSE bug 1162501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977985">SUSE bug 977985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977986">SUSE bug 977986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987877">SUSE bug 987877</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7558/">CVE-2015-7558 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7558">CVE-2015-7558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4348/">CVE-2016-4348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4348">CVE-2016-4348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6163/">CVE-2016-6163 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6163">CVE-2016-6163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000041/">CVE-2018-1000041 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000041">CVE-2018-1000041 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20446/">CVE-2019-20446 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20446">CVE-2019-20446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572459" comment="libcroco-0_6-3-0.6.1-122.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572460" comment="libcroco-0_6-3-32bit-0.6.1-122.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572461" comment="librsvg-2.26.0-2.6.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572462" comment="librsvg-32bit-2.26.0-2.6.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572463" comment="rsvg-view-2.26.0-2.6.8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218955" version="1" class="patch">
	<metadata>
		<title>Security update for libsamplerate (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1033564" ref_url="https://bugzilla.suse.com/1033564" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7697" ref_url="https://www.suse.com/security/cve/CVE-2017-7697/" source="CVE"/>
		<description>

This update for libsamplerate fixes the following issues:

- CVE-2017-7697: Fixed a buffer overflow in calc_output_single.  (bsc#1033564)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-19"/>
	<updated date="2017-04-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033564">SUSE bug 1033564</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7697/">CVE-2017-7697 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7697">CVE-2017-7697 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572464" comment="libsamplerate-0.1.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572465" comment="libsamplerate-32bit-0.1.4-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218956" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="911796" ref_url="https://bugzilla.suse.com/911796" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9496" ref_url="https://www.suse.com/security/cve/CVE-2014-9496/" source="CVE"/>
		<description>

This update for libsndfile fixes two buffer read overflows in 
sd2_parse_rsrc_fork(). (CVE-2014-9496, bsc#911796)

Security Issues:

    * CVE-2014-9496
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9496&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-23"/>
	<updated date="2015-01-23"/>
	<bugzilla href="https://bugzilla.suse.com/911796">SUSE bug 911796</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9496/">CVE-2014-9496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9496">CVE-2014-9496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578895" comment="libsndfile-1.0.20-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578896" comment="libsndfile-32bit-1.0.20-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578897" comment="libsndfile-x86-1.0.20-2.6.5 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578895" comment="libsndfile-1.0.20-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578896" comment="libsndfile-32bit-1.0.20-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578897" comment="libsndfile-x86-1.0.20-2.6.5 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578895" comment="libsndfile-1.0.20-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578896" comment="libsndfile-32bit-1.0.20-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578897" comment="libsndfile-x86-1.0.20-2.6.5 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218957" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="953516" ref_url="https://bugzilla.suse.com/953516" source="BUGZILLA"/>
		<reference ref_id="953521" ref_url="https://bugzilla.suse.com/953521" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9756" ref_url="https://www.suse.com/security/cve/CVE-2014-9756/" source="CVE"/>
		<reference ref_id="CVE-2015-7805" ref_url="https://www.suse.com/security/cve/CVE-2015-7805/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001676.html" source="SUSE-SU"/>
		<description>
The libsndfile package was updated to fix the following security issue:

- CVE-2014-9756: Fixed a divide by zero problem that can lead to a Denial of Service (DoS) (bsc#953521).
- CVE-2015-7805: Fixed heap overflow issue (bsc#953516).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-12"/>
	<updated date="2015-11-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/953516">SUSE bug 953516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953521">SUSE bug 953521</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9756/">CVE-2014-9756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9756">CVE-2014-9756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7805/">CVE-2015-7805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7805">CVE-2015-7805 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578898" comment="libsndfile-1.0.20-2.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578899" comment="libsndfile-32bit-1.0.20-2.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578900" comment="libsndfile-x86-1.0.20-2.10.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578898" comment="libsndfile-1.0.20-2.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578899" comment="libsndfile-32bit-1.0.20-2.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578900" comment="libsndfile-x86-1.0.20-2.10.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578898" comment="libsndfile-1.0.20-2.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578899" comment="libsndfile-32bit-1.0.20-2.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578900" comment="libsndfile-x86-1.0.20-2.10.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218958" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1033054" ref_url="https://bugzilla.suse.com/1033054" source="BUGZILLA"/>
		<reference ref_id="1033914" ref_url="https://bugzilla.suse.com/1033914" source="BUGZILLA"/>
		<reference ref_id="1033915" ref_url="https://bugzilla.suse.com/1033915" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7585" ref_url="https://www.suse.com/security/cve/CVE-2017-7585/" source="CVE"/>
		<reference ref_id="CVE-2017-7741" ref_url="https://www.suse.com/security/cve/CVE-2017-7741/" source="CVE"/>
		<reference ref_id="CVE-2017-7742" ref_url="https://www.suse.com/security/cve/CVE-2017-7742/" source="CVE"/>
		<description>

This update for libsndfile fixes the following issues:

- CVE-2017-7585,CVE-2017-7741,CVE-2017-7742: Some stack-based buffer overflows via a specially crafted FLAC
  file were fixed (error in the 'flac_buffer_copy()' function) (bsc#1033054, bsc#1033914, bsc#1033915).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033054">SUSE bug 1033054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033914">SUSE bug 1033914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033915">SUSE bug 1033915</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7585/">CVE-2017-7585 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7585">CVE-2017-7585 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7741/">CVE-2017-7741 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7741">CVE-2017-7741 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7742/">CVE-2017-7742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7742">CVE-2017-7742 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572470" comment="libsndfile-1.0.20-2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572471" comment="libsndfile-32bit-1.0.20-2.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218959" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1033054" ref_url="https://bugzilla.suse.com/1033054" source="BUGZILLA"/>
		<reference ref_id="1033914" ref_url="https://bugzilla.suse.com/1033914" source="BUGZILLA"/>
		<reference ref_id="1033915" ref_url="https://bugzilla.suse.com/1033915" source="BUGZILLA"/>
		<reference ref_id="1036943" ref_url="https://bugzilla.suse.com/1036943" source="BUGZILLA"/>
		<reference ref_id="1036944" ref_url="https://bugzilla.suse.com/1036944" source="BUGZILLA"/>
		<reference ref_id="1036945" ref_url="https://bugzilla.suse.com/1036945" source="BUGZILLA"/>
		<reference ref_id="1036946" ref_url="https://bugzilla.suse.com/1036946" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7585" ref_url="https://www.suse.com/security/cve/CVE-2017-7585/" source="CVE"/>
		<reference ref_id="CVE-2017-7741" ref_url="https://www.suse.com/security/cve/CVE-2017-7741/" source="CVE"/>
		<reference ref_id="CVE-2017-7742" ref_url="https://www.suse.com/security/cve/CVE-2017-7742/" source="CVE"/>
		<reference ref_id="CVE-2017-8361" ref_url="https://www.suse.com/security/cve/CVE-2017-8361/" source="CVE"/>
		<reference ref_id="CVE-2017-8362" ref_url="https://www.suse.com/security/cve/CVE-2017-8362/" source="CVE"/>
		<reference ref_id="CVE-2017-8363" ref_url="https://www.suse.com/security/cve/CVE-2017-8363/" source="CVE"/>
		<reference ref_id="CVE-2017-8365" ref_url="https://www.suse.com/security/cve/CVE-2017-8365/" source="CVE"/>
		<description>

This update for libsndfile fixes the following issues:

- CVE-2017-8362: invalid memory read in flac_buffer_copy (flac.c) (bsc#1036943)
- CVE-2017-8365: global buffer overflow in i2les_array (pcm.c) (bsc#1036946)
- CVE-2017-8361: global buffer overflow in flac_buffer_copy (flac.c) (bsc#1036944)
- CVE-2017-8363: heap-based buffer overflow in flac_buffer_copy (flac.c) (bsc#1036945)
- CVE-2017-7585: stack-based buffer overflow via a specially crafted FLAC file (bsc#1033054)
   		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-10"/>
	<updated date="2017-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033054">SUSE bug 1033054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033914">SUSE bug 1033914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033915">SUSE bug 1033915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036943">SUSE bug 1036943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036944">SUSE bug 1036944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036945">SUSE bug 1036945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036946">SUSE bug 1036946</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7585/">CVE-2017-7585 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7585">CVE-2017-7585 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7741/">CVE-2017-7741 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7741">CVE-2017-7741 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7742/">CVE-2017-7742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7742">CVE-2017-7742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8361/">CVE-2017-8361 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8361">CVE-2017-8361 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8362/">CVE-2017-8362 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8362">CVE-2017-8362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8363/">CVE-2017-8363 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8363">CVE-2017-8363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8365/">CVE-2017-8365 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8365">CVE-2017-8365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572472" comment="libsndfile-1.0.20-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572473" comment="libsndfile-32bit-1.0.20-2.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218960" version="1" class="patch">
	<metadata>
		<title>Recommended update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1038856" ref_url="https://bugzilla.suse.com/1038856" source="BUGZILLA"/>
		<reference ref_id="1059911" ref_url="https://bugzilla.suse.com/1059911" source="BUGZILLA"/>
		<reference ref_id="1059912" ref_url="https://bugzilla.suse.com/1059912" source="BUGZILLA"/>
		<reference ref_id="1059913" ref_url="https://bugzilla.suse.com/1059913" source="BUGZILLA"/>
		<reference ref_id="1069874" ref_url="https://bugzilla.suse.com/1069874" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14245" ref_url="https://www.suse.com/security/cve/CVE-2017-14245/" source="CVE"/>
		<reference ref_id="CVE-2017-14246" ref_url="https://www.suse.com/security/cve/CVE-2017-14246/" source="CVE"/>
		<reference ref_id="CVE-2017-14634" ref_url="https://www.suse.com/security/cve/CVE-2017-14634/" source="CVE"/>
		<reference ref_id="CVE-2017-16942" ref_url="https://www.suse.com/security/cve/CVE-2017-16942/" source="CVE"/>
		<description>

- This update for libsndfile fixes a memory leak in an error path.(bsc#1038856)

- CVE-2017-16942: A divide-by-zero error exists in the function wav_w64_read_fmt_chunk() in wav_w64.c, which may lead to DoS when playing a crafted audio file. (bsc#1069874)
- CVE-2017-14634: In libsndfile 1.0.28, a divide-by-zero error exists in the function double64_init() in double64.c, which may lead to DoS when playing a crafted audio file. (bsc#1059911)
- CVE-2017-14245: An out of bounds read in the function d2alaw_array() in alaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of 
                  the NAN and INFINITY floating-point values. (bsc#1059912)
- CVE-2017-14246: An out of bounds read in the function d2ulaw_array() in ulaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of 
                  the NAN and INFINITY floating-point values.(bsc#1059913)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-02"/>
	<updated date="2018-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1038856">SUSE bug 1038856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059911">SUSE bug 1059911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059912">SUSE bug 1059912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059913">SUSE bug 1059913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069874">SUSE bug 1069874</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14245/">CVE-2017-14245 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14245">CVE-2017-14245 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14246/">CVE-2017-14246 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14246">CVE-2017-14246 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14634/">CVE-2017-14634 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14634">CVE-2017-14634 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16942/">CVE-2017-16942 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16942">CVE-2017-16942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572474" comment="libsndfile-1.0.20-2.19.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572475" comment="libsndfile-32bit-1.0.20-2.19.7.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218961" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1071767" ref_url="https://bugzilla.suse.com/1071767" source="BUGZILLA"/>
		<reference ref_id="1071777" ref_url="https://bugzilla.suse.com/1071777" source="BUGZILLA"/>
		<reference ref_id="1117954" ref_url="https://bugzilla.suse.com/1117954" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17456" ref_url="https://www.suse.com/security/cve/CVE-2017-17456/" source="CVE"/>
		<reference ref_id="CVE-2017-17457" ref_url="https://www.suse.com/security/cve/CVE-2017-17457/" source="CVE"/>
		<reference ref_id="CVE-2018-19758" ref_url="https://www.suse.com/security/cve/CVE-2018-19758/" source="CVE"/>
		<description>
This update for libsndfile fixes the following issues:

Security issues fixed:

- CVE-2017-17456: Prevent segmentation fault in the function d2alaw_array() that may have lead to a remote DoS (bsc#1071777).
- CVE-2017-17457: Prevent segmentation fault in the function d2ulaw_array() that may have lead to a remote DoS, a different vulnerability than CVE-2017-14246 (bsc#1071767).
- CVE-2018-19758: Fixed a heap-based buffer over-read at wav.c in wav_write_header that could have been used for a denial of service attack (bsc#1117954).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-02"/>
	<updated date="2019-04-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1071767">SUSE bug 1071767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071777">SUSE bug 1071777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117954">SUSE bug 1117954</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17456/">CVE-2017-17456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17456">CVE-2017-17456 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17457/">CVE-2017-17457 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17457">CVE-2017-17457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19758/">CVE-2018-19758 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19758">CVE-2018-19758 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572476" comment="libsndfile-1.0.20-2.19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572477" comment="libsndfile-32bit-1.0.20-2.19.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218962" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188540" ref_url="https://bugzilla.suse.com/1188540" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3246" ref_url="https://www.suse.com/security/cve/CVE-2021-3246/" source="CVE"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2021-3246: Fixed a heap buffer overflow vulnerability in msadpcm_decode_block. (bsc#1188540)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1188540">SUSE bug 1188540</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3246/">CVE-2021-3246 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3246">CVE-2021-3246 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626760" comment="libsndfile-1.0.20-2.19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626761" comment="libsndfile-32bit-1.0.20-2.19.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218963" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194006" ref_url="https://bugzilla.suse.com/1194006" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4156" ref_url="https://www.suse.com/security/cve/CVE-2021-4156/" source="CVE"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2021-4156: Fixed heap buffer overflow in flac_buffer_copy that
could potentially lead to heap exploitation (bsc#1194006).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-05"/>
	<updated date="2022-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194006">SUSE bug 1194006</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4156/">CVE-2021-4156 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4156">CVE-2021-4156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662523" comment="libsndfile-1.0.20-2.19.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662524" comment="libsndfile-32bit-1.0.20-2.19.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218964" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="822368" ref_url="https://bugzilla.suse.com/822368" source="BUGZILLA"/>
		<reference ref_id="828081" ref_url="https://bugzilla.suse.com/828081" source="BUGZILLA"/>
		<reference ref_id="833153" ref_url="https://bugzilla.suse.com/833153" source="BUGZILLA"/>
		<reference ref_id="833191" ref_url="https://bugzilla.suse.com/833191" source="BUGZILLA"/>
		<reference ref_id="865222" ref_url="https://bugzilla.suse.com/865222" source="BUGZILLA"/>
		<reference ref_id="866942" ref_url="https://bugzilla.suse.com/866942" source="BUGZILLA"/>
		<reference ref_id="867349" ref_url="https://bugzilla.suse.com/867349" source="BUGZILLA"/>
		<reference ref_id="894361" ref_url="https://bugzilla.suse.com/894361" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2284" ref_url="https://www.suse.com/security/cve/CVE-2014-2284/" source="CVE"/>
		<reference ref_id="CVE-2014-2310" ref_url="https://www.suse.com/security/cve/CVE-2014-2310/" source="CVE"/>
		<reference ref_id="CVE-2014-3565" ref_url="https://www.suse.com/security/cve/CVE-2014-3565/" source="CVE"/>
		<description>

This update for net-snmp fixes a remote denial of service problem inside 
snmptrapd when it is started with the '-OQ' option. (CVE-2014-3565, 
bnc#894361)

Additionally, a timeout issue during SNMP MIB walk on OID 1.3.6.1.2.1.4.24 
when using newer (v5.5+) versions of snmpwalk has been fixed. (bnc#865222)

Security Issues:

    * CVE-2014-3565
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3565&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-02"/>
	<updated date="2014-09-02"/>
	<bugzilla href="https://bugzilla.suse.com/822368">SUSE bug 822368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828081">SUSE bug 828081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833153">SUSE bug 833153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833191">SUSE bug 833191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865222">SUSE bug 865222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866942">SUSE bug 866942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867349">SUSE bug 867349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894361">SUSE bug 894361</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2284/">CVE-2014-2284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2284">CVE-2014-2284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2310/">CVE-2014-2310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2310">CVE-2014-2310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3565/">CVE-2014-3565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3565">CVE-2014-3565 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578901" comment="libsnmp15-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578902" comment="libsnmp15-32bit-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578903" comment="libsnmp15-x86-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578904" comment="net-snmp-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578905" comment="perl-SNMP-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578906" comment="snmp-mibs-5.4.2.1-8.12.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578901" comment="libsnmp15-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578902" comment="libsnmp15-32bit-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578903" comment="libsnmp15-x86-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578904" comment="net-snmp-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578905" comment="perl-SNMP-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578906" comment="snmp-mibs-5.4.2.1-8.12.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578901" comment="libsnmp15-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578902" comment="libsnmp15-32bit-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578903" comment="libsnmp15-x86-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578904" comment="net-snmp-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578905" comment="perl-SNMP-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578906" comment="snmp-mibs-5.4.2.1-8.12.22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218965" version="1" class="patch">
	<metadata>
		<title>Security update for libsoup (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1100097" ref_url="https://bugzilla.suse.com/1100097" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12910" ref_url="https://www.suse.com/security/cve/CVE-2018-12910/" source="CVE"/>
		<description>
This update for libsoup fixes the following issues:

Security issue fixed:

- CVE-2018-12910: Fixed a denial of service which was caused handling empty hostnames in get_cookies() (bsc#1100097).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-14"/>
	<updated date="2020-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100097">SUSE bug 1100097</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12910/">CVE-2018-12910 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12910">CVE-2018-12910 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578907" comment="libsoup-2_4-1-2.32.2-4.16.3.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578908" comment="libsoup-2_4-1-32bit-2.32.2-4.16.3.37 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218966" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="921070" ref_url="https://bugzilla.suse.com/921070" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1782" ref_url="https://www.suse.com/security/cve/CVE-2015-1782/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001334.html" source="SUSE-SU"/>
		<description>

The ssh client library libssh2_org was updated to fix a security issue:

    * CVE-2015-1782: A malicious server could send a crafted
      SSH_MSG_KEXINIT packet, that could lead to a buffer overread and to a
      crash of the application using libssh2_org.

Security Issues:

    * CVE-2015-1782
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1782&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-09"/>
	<updated date="2015-03-09"/>
	<bugzilla href="https://bugzilla.suse.com/921070">SUSE bug 921070</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1782/">CVE-2015-1782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1782">CVE-2015-1782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578909" comment="libssh2-1-1.2.9-4.2.4.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578909" comment="libssh2-1-1.2.9-4.2.4.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578909" comment="libssh2-1-1.2.9-4.2.4.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218967" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="961964" ref_url="https://bugzilla.suse.com/961964" source="BUGZILLA"/>
		<reference ref_id="967026" ref_url="https://bugzilla.suse.com/967026" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0787" ref_url="https://www.suse.com/security/cve/CVE-2016-0787/" source="CVE"/>
		<description>

This update for libssh2_org fixes the following issues: 

- Add SHA256 support for DH group exchange (fate#320343, bsc#961964)

- fix CVE-2016-0787 (bsc#967026)
  * Weakness in diffie-hellman secret key generation lead to much shorter DH groups
    then needed, which could be used to retrieve server keys.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-11"/>
	<updated date="2016-03-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/961964">SUSE bug 961964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967026">SUSE bug 967026</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0787/">CVE-2016-0787 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0787">CVE-2016-0787 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572489" comment="libssh2-1-1.2.9-4.2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218968" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1091236" ref_url="https://bugzilla.suse.com/1091236" source="BUGZILLA"/>
		<reference ref_id="1128471" ref_url="https://bugzilla.suse.com/1128471" source="BUGZILLA"/>
		<reference ref_id="1128472" ref_url="https://bugzilla.suse.com/1128472" source="BUGZILLA"/>
		<reference ref_id="1128474" ref_url="https://bugzilla.suse.com/1128474" source="BUGZILLA"/>
		<reference ref_id="1128476" ref_url="https://bugzilla.suse.com/1128476" source="BUGZILLA"/>
		<reference ref_id="1128480" ref_url="https://bugzilla.suse.com/1128480" source="BUGZILLA"/>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1128490" ref_url="https://bugzilla.suse.com/1128490" source="BUGZILLA"/>
		<reference ref_id="1128492" ref_url="https://bugzilla.suse.com/1128492" source="BUGZILLA"/>
		<reference ref_id="1128493" ref_url="https://bugzilla.suse.com/1128493" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855/" source="CVE"/>
		<reference ref_id="CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856/" source="CVE"/>
		<reference ref_id="CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857/" source="CVE"/>
		<reference ref_id="CVE-2019-3858" ref_url="https://www.suse.com/security/cve/CVE-2019-3858/" source="CVE"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="CVE-2019-3861" ref_url="https://www.suse.com/security/cve/CVE-2019-3861/" source="CVE"/>
		<reference ref_id="CVE-2019-3862" ref_url="https://www.suse.com/security/cve/CVE-2019-3862/" source="CVE"/>
		<reference ref_id="CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863/" source="CVE"/>
		<description>
This update for libssh2_org fixes the following issues:

Security issues fixed:	  

- CVE-2019-3861: Fixed Out-of-bounds reads with specially crafted SSH packets (bsc#1128490).
- CVE-2019-3862: Fixed Out-of-bounds memory comparison with specially crafted message channel request packet (bsc#1128492).
- CVE-2019-3860: Fixed Out-of-bounds reads with specially crafted SFTP packets (bsc#1128481).
- CVE-2019-3863: Fixed an Integer overflow in user authenticate keyboard interactive which could allow out-of-bounds writes 
  with specially crafted keyboard responses (bsc#1128493).
- CVE-2019-3856: Fixed a potential Integer overflow in keyboard interactive handling which could allow out-of-bounds write 
  with specially crafted payload (bsc#1128472).
- CVE-2019-3859: Fixed Out-of-bounds reads with specially crafted payloads due to unchecked use of _libssh2_packet_require 
  and _libssh2_packet_requirev (bsc#1128480).
- CVE-2019-3855: Fixed a potential Integer overflow in transport read which could allow out-of-bounds write with specially 
  crafted payload (bsc#1128471).
- CVE-2019-3858: Fixed a potential zero-byte allocation which could lead to an out-of-bounds read with a specially crafted 
  SFTP packet (bsc#1128476).
- CVE-2019-3857: Fixed a potential Integer overflow which could lead to zero-byte allocation and out-of-bounds with specially 
  crafted message channel request SSH packet (bsc#1128474).

Other issue addressed:   

- Fixed an issue where libssh2 stops parsing known_hosts (bsc#1091236).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091236">SUSE bug 1091236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128471">SUSE bug 1128471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128472">SUSE bug 1128472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128474">SUSE bug 1128474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128476">SUSE bug 1128476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128480">SUSE bug 1128480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128490">SUSE bug 1128490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128492">SUSE bug 1128492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128493">SUSE bug 1128493</bugzilla>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3855">CVE-2019-3855 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3856">CVE-2019-3856 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3857">CVE-2019-3857 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3858/">CVE-2019-3858 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3858">CVE-2019-3858 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3859">CVE-2019-3859 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3860">CVE-2019-3860 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3861/">CVE-2019-3861 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3861">CVE-2019-3861 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3862/">CVE-2019-3862 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3862">CVE-2019-3862 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3863">CVE-2019-3863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572490" comment="libssh2-1-1.2.9-4.2.12.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218969" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1130103" ref_url="https://bugzilla.suse.com/1130103" source="BUGZILLA"/>
		<reference ref_id="1133528" ref_url="https://bugzilla.suse.com/1133528" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<description>
This update for libssh2_org fixes the following issues:

- Incorrect upstream fix for CVE-2019-3859 broke public key authentication [bsc#1133528, bsc#1130103]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-27"/>
	<updated date="2019-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130103">SUSE bug 1130103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133528">SUSE bug 1133528</bugzilla>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3859">CVE-2019-3859 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572491" comment="libssh2-1-1.2.9-4.2.12.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218970" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1136570" ref_url="https://bugzilla.suse.com/1136570" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<description>
This update for libssh2_org fixes the following issues:

- Fix the previous fix for CVE-2019-3860 (bsc#1136570, bsc#1128481)
  (Out-of-bounds reads with specially crafted SFTP packets)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136570">SUSE bug 1136570</bugzilla>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3860">CVE-2019-3860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572492" comment="libssh2-1-1.2.9-4.2.12.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218971" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1154862" ref_url="https://bugzilla.suse.com/1154862" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498/" source="CVE"/>
		<description>
This update for libssh2_org fixes the following issue:

- CVE-2019-17498: Fixed an integer overflow in a bounds check that might have led to the disclosure of sensitive information or a denial of service (bsc#1154862).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154862">SUSE bug 1154862</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17498">CVE-2019-17498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572493" comment="libssh2-1-1.2.9-4.2.12.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218972" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="880735" ref_url="https://bugzilla.suse.com/880735" source="BUGZILLA"/>
		<reference ref_id="880737" ref_url="https://bugzilla.suse.com/880737" source="BUGZILLA"/>
		<reference ref_id="880738" ref_url="https://bugzilla.suse.com/880738" source="BUGZILLA"/>
		<reference ref_id="924828" ref_url="https://bugzilla.suse.com/924828" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3467" ref_url="https://www.suse.com/security/cve/CVE-2014-3467/" source="CVE"/>
		<reference ref_id="CVE-2014-3468" ref_url="https://www.suse.com/security/cve/CVE-2014-3468/" source="CVE"/>
		<reference ref_id="CVE-2014-3469" ref_url="https://www.suse.com/security/cve/CVE-2014-3469/" source="CVE"/>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001393.html" source="SUSE-SU"/>
		<description>

libtasn1 has been updated to fix three security issues:

    * asn1_get_bit_der() could have returned negative bit length
      (CVE-2014-3468)
    * Multiple boundary check issues could have allowed DoS (CVE-2014-3467)
    * Possible DoS by NULL pointer dereference in asn1_read_value_type
      (CVE-2014-3469)

Security Issues:

    * CVE-2014-3468
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468&gt;
    * CVE-2014-3467
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467&gt;
    * CVE-2014-3469
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-17"/>
	<updated date="2014-07-17"/>
	<bugzilla href="https://bugzilla.suse.com/880735">SUSE bug 880735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880737">SUSE bug 880737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880738">SUSE bug 880738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924828">SUSE bug 924828</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3467/">CVE-2014-3467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3467">CVE-2014-3467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3468/">CVE-2014-3468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3468">CVE-2014-3468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3469/">CVE-2014-3469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3469">CVE-2014-3469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2806">CVE-2015-2806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578910" comment="libtasn1-1.5-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578911" comment="libtasn1-3-1.5-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578912" comment="libtasn1-3-32bit-1.5-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578913" comment="libtasn1-3-x86-1.5-1.28.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578910" comment="libtasn1-1.5-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578911" comment="libtasn1-3-1.5-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578912" comment="libtasn1-3-32bit-1.5-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578913" comment="libtasn1-3-x86-1.5-1.28.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578910" comment="libtasn1-1.5-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578911" comment="libtasn1-3-1.5-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578912" comment="libtasn1-3-32bit-1.5-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578913" comment="libtasn1-3-x86-1.5-1.28.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218973" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1040621" ref_url="https://bugzilla.suse.com/1040621" source="BUGZILLA"/>
		<reference ref_id="1105435" ref_url="https://bugzilla.suse.com/1105435" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6891" ref_url="https://www.suse.com/security/cve/CVE-2017-6891/" source="CVE"/>
		<reference ref_id="CVE-2018-1000654" ref_url="https://www.suse.com/security/cve/CVE-2018-1000654/" source="CVE"/>
		<description>
This update for libtasn1 fixes the following issues:

Security issues fixed:

- CVE-2018-1000654: Fixed a denial of service in the asn1 parser (bsc#1105435).
- CVE-2017-6891: Fixed a stack overflow in asn1_find_node() (bsc#1040621).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-29"/>
	<updated date="2019-05-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040621">SUSE bug 1040621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105435">SUSE bug 1105435</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6891/">CVE-2017-6891 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6891">CVE-2017-6891 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000654/">CVE-2018-1000654 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000654">CVE-2018-1000654 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572496" comment="libtasn1-1.5-1.35.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572497" comment="libtasn1-3-1.5-1.35.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572498" comment="libtasn1-3-32bit-1.5-1.35.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218974" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1 (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204690" ref_url="https://bugzilla.suse.com/1204690" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46848" ref_url="https://www.suse.com/security/cve/CVE-2021-46848/" source="CVE"/>
		<description>
This update for libtasn1 fixes the following issues:

- CVE-2021-46848: Fixed off-by-one array size check that affects asn1_encode_simple_der (bsc#1204690)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-26"/>
	<updated date="2022-10-26"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1204690">SUSE bug 1204690</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46848/">CVE-2021-46848 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46848">CVE-2021-46848 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993622" comment="libtasn1-1.5-1.35.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993623" comment="libtasn1-3-1.5-1.35.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993624" comment="libtasn1-3-32bit-1.5-1.35.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218975" version="1" class="patch">
	<metadata>
		<title>Security update for libtcnative-1-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="938945" ref_url="https://bugzilla.suse.com/938945" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>

This update for libtcnative-1-0 fixes the following issues:

- CVE-2015-4000: Disable 512-bit export-grade cryptography to prevent Logjam 
  vulnerability (bsc#938945) 
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-26"/>
	<updated date="2016-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/938945">SUSE bug 938945</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572508" comment="libtcnative-1-0-1.3.3-12.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218976" version="1" class="patch">
	<metadata>
		<title>Security update for libtcnative-1-0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1078679" ref_url="https://bugzilla.suse.com/1078679" source="BUGZILLA"/>
		<reference ref_id="1103347" ref_url="https://bugzilla.suse.com/1103347" source="BUGZILLA"/>
		<reference ref_id="1103348" ref_url="https://bugzilla.suse.com/1103348" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15698" ref_url="https://www.suse.com/security/cve/CVE-2017-15698/" source="CVE"/>
		<reference ref_id="CVE-2018-8019" ref_url="https://www.suse.com/security/cve/CVE-2018-8019/" source="CVE"/>
		<reference ref_id="CVE-2018-8020" ref_url="https://www.suse.com/security/cve/CVE-2018-8020/" source="CVE"/>
		<description>
This update for libtcnative-1-0 to version 1.1.34 fixes the following issues:

- CVE-2017-15698: Fixed an improper handling of fields with more than 127 bytes 
  which could allow invalid client certificates to be accepted (bsc#1078679).
- CVE-2018-8019: When using an OCSP responder did not correctly handle invalid
  responses. This allowed for revoked client certificates to be incorrectly
  identified. It was therefore possible for users to authenticate with revoked
  certificates when using mutual TLS (bsc#1103348).
- CVE-2018-8020: Did not properly check OCSP pre-produced responses. Revoked
  client certificates may have not been properly identified, allowing for users
  to authenticate with revoked certificates to connections that require mutual
  TLS (bsc#1103347).

For a complete list of changes please see
http://tomcat.apache.org/native-1.1-doc/miscellaneous/changelog.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-09"/>
	<updated date="2019-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1078679">SUSE bug 1078679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103347">SUSE bug 1103347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103348">SUSE bug 1103348</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15698/">CVE-2017-15698 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15698">CVE-2017-15698 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8019/">CVE-2018-8019 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8019">CVE-2018-8019 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8020/">CVE-2018-8020 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8020">CVE-2018-8020 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572509" comment="libtcnative-1-0-1.3.4-12.5.5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218977" version="1" class="patch">
	<metadata>
		<title>Security update for libtiff</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="834477" ref_url="https://bugzilla.suse.com/834477" source="BUGZILLA"/>
		<reference ref_id="834779" ref_url="https://bugzilla.suse.com/834779" source="BUGZILLA"/>
		<reference ref_id="834788" ref_url="https://bugzilla.suse.com/834788" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231/" source="CVE"/>
		<reference ref_id="CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232/" source="CVE"/>
		<reference ref_id="CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243/" source="CVE"/>
		<reference ref_id="CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244/" source="CVE"/>
		<description>

This tiff update fixes several security issues.

    * bnc#834477: CVE-2013-4232 CVE-2013-4231: tiff: buffer overflows/use
      after free problem
    * bnc#834779: CVE-2013-4243: libtiff (gif2tiff): heap-based buffer
      overflow in readgifimage()
    * bnc#834788: CVE-2013-4244: libtiff (gif2tiff): OOB Write in LZW
      decompressor

Security Issue references:

    * CVE-2013-4232
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4232&gt;
    * CVE-2013-4231
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4231&gt;
    * CVE-2013-4243
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4243&gt;
    * CVE-2013-4244
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4244&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/834477">SUSE bug 834477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834779">SUSE bug 834779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834788">SUSE bug 834788</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4231">CVE-2013-4231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4232">CVE-2013-4232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4243">CVE-2013-4243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4244">CVE-2013-4244 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576506" comment="libtiff3-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576507" comment="libtiff3-32bit-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576508" comment="libtiff3-x86-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576509" comment="tiff-3.8.2-141.154.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576506" comment="libtiff3-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576507" comment="libtiff3-32bit-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576508" comment="libtiff3-x86-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576509" comment="tiff-3.8.2-141.154.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576506" comment="libtiff3-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576507" comment="libtiff3-32bit-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576508" comment="libtiff3-x86-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576509" comment="tiff-3.8.2-141.154.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218978" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc, rpcbind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1037559" ref_url="https://bugzilla.suse.com/1037559" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002932.html" source="SUSE-SU"/>
		<description>

This update for libtirpc and rpcbind fixes the following issues:

- CVE-2017-8779: A crafted UDP package could lead rpcbind to remote denial-of-service. (bsc#1037559)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-31"/>
	<updated date="2017-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037559">SUSE bug 1037559</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8779">CVE-2017-8779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578914" comment="libtirpc1-0.2.1-1.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578915" comment="rpcbind-0.1.6+git20080930-6.27.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578914" comment="libtirpc1-0.2.1-1.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578915" comment="rpcbind-0.1.6+git20080930-6.27.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218979" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="968175" ref_url="https://bugzilla.suse.com/968175" source="BUGZILLA"/>
		<description>
This update for libtirpc fixes the following issues:

- Prevent remote crash of RPC services (bsc#968175)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-30"/>
	<updated date="2018-08-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/968175">SUSE bug 968175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572516" comment="libtirpc1-0.2.1-1.13.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218980" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1106517" ref_url="https://bugzilla.suse.com/1106517" source="BUGZILLA"/>
		<reference ref_id="1106519" ref_url="https://bugzilla.suse.com/1106519" source="BUGZILLA"/>
		<reference ref_id="968175" ref_url="https://bugzilla.suse.com/968175" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14621" ref_url="https://www.suse.com/security/cve/CVE-2018-14621/" source="CVE"/>
		<reference ref_id="CVE-2018-14622" ref_url="https://www.suse.com/security/cve/CVE-2018-14622/" source="CVE"/>
		<description>
This update for libtirpc fixes the following issues:

Security issues fixed:

- CVE-2018-14621: libtirpc: Infinite loop in EMFILE case in svc_vc.c (bsc#1106519)
- CVE-2018-14622: libtirpc: Segmentation fault in makefd_xprt return value in svc_vc.c (bsc#1106517)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-15"/>
	<updated date="2018-10-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106517">SUSE bug 1106517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106519">SUSE bug 1106519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968175">SUSE bug 968175</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14621/">CVE-2018-14621 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14621">CVE-2018-14621 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14622/">CVE-2018-14622 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14622">CVE-2018-14622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572517" comment="libtirpc1-0.2.1-1.13.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218981" version="1" class="patch">
	<metadata>
		<title>Security update for libunwind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="936786" ref_url="https://bugzilla.suse.com/936786" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3239" ref_url="https://www.suse.com/security/cve/CVE-2015-3239/" source="CVE"/>
		<description>
This update for libunwind fixes the following issues:

- CVE-2015-3239: Fixed an off-by-one in dwarf_to_unw_regnum() (bsc#936786).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-22"/>
	<updated date="2020-07-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/936786">SUSE bug 936786</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-3239/">CVE-2015-3239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3239">CVE-2015-3239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572518" comment="libunwind-0.98.6-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572519" comment="libunwind-devel-0.98.6-28.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218982" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="817407" ref_url="https://bugzilla.suse.com/817407" source="BUGZILLA"/>
		<reference ref_id="819976" ref_url="https://bugzilla.suse.com/819976" source="BUGZILLA"/>
		<reference ref_id="828502" ref_url="https://bugzilla.suse.com/828502" source="BUGZILLA"/>
		<reference ref_id="828506" ref_url="https://bugzilla.suse.com/828506" source="BUGZILLA"/>
		<reference ref_id="828508" ref_url="https://bugzilla.suse.com/828508" source="BUGZILLA"/>
		<reference ref_id="829203" ref_url="https://bugzilla.suse.com/829203" source="BUGZILLA"/>
		<reference ref_id="831709" ref_url="https://bugzilla.suse.com/831709" source="BUGZILLA"/>
		<reference ref_id="836931" ref_url="https://bugzilla.suse.com/836931" source="BUGZILLA"/>
		<reference ref_id="837329" ref_url="https://bugzilla.suse.com/837329" source="BUGZILLA"/>
		<reference ref_id="837530" ref_url="https://bugzilla.suse.com/837530" source="BUGZILLA"/>
		<reference ref_id="837999" ref_url="https://bugzilla.suse.com/837999" source="BUGZILLA"/>
		<reference ref_id="838638" ref_url="https://bugzilla.suse.com/838638" source="BUGZILLA"/>
		<reference ref_id="841720" ref_url="https://bugzilla.suse.com/841720" source="BUGZILLA"/>
		<reference ref_id="842016" ref_url="https://bugzilla.suse.com/842016" source="BUGZILLA"/>
		<reference ref_id="854486" ref_url="https://bugzilla.suse.com/854486" source="BUGZILLA"/>
		<reference ref_id="857490" ref_url="https://bugzilla.suse.com/857490" source="BUGZILLA"/>
		<reference ref_id="857492" ref_url="https://bugzilla.suse.com/857492" source="BUGZILLA"/>
		<reference ref_id="858817" ref_url="https://bugzilla.suse.com/858817" source="BUGZILLA"/>
		<reference ref_id="873705" ref_url="https://bugzilla.suse.com/873705" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4296" ref_url="https://www.suse.com/security/cve/CVE-2013-4296/" source="CVE"/>
		<reference ref_id="CVE-2013-5651" ref_url="https://www.suse.com/security/cve/CVE-2013-5651/" source="CVE"/>
		<reference ref_id="CVE-2013-6436" ref_url="https://www.suse.com/security/cve/CVE-2013-6436/" source="CVE"/>
		<reference ref_id="CVE-2013-6456" ref_url="https://www.suse.com/security/cve/CVE-2013-6456/" source="CVE"/>
		<reference ref_id="CVE-2013-6458" ref_url="https://www.suse.com/security/cve/CVE-2013-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-0179" ref_url="https://www.suse.com/security/cve/CVE-2014-0179/" source="CVE"/>
		<reference ref_id="CVE-2014-1447" ref_url="https://www.suse.com/security/cve/CVE-2014-1447/" source="CVE"/>
		<description>

libvirt has been patched to fix two security issues.

Further information is available at
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0179
&lt;http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0179&gt; and
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6456
&lt;http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6456&gt;

These security issues have been fixed:

    * Unsafe parsing of XML documents allows arbitrary file read or denial
      of service (CVE-2014-0179)
    * Ability to delete or create arbitrary host devices (CVE-2013-6456)

Security Issue references:

    * CVE-2014-0179
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179&gt;
    * CVE-2013-6456
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6456&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-07"/>
	<updated date="2014-05-07"/>
	<bugzilla href="https://bugzilla.suse.com/817407">SUSE bug 817407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819976">SUSE bug 819976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828502">SUSE bug 828502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828506">SUSE bug 828506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828508">SUSE bug 828508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829203">SUSE bug 829203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831709">SUSE bug 831709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836931">SUSE bug 836931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/837329">SUSE bug 837329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/837530">SUSE bug 837530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/837999">SUSE bug 837999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/838638">SUSE bug 838638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841720">SUSE bug 841720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842016">SUSE bug 842016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854486">SUSE bug 854486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857490">SUSE bug 857490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857492">SUSE bug 857492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858817">SUSE bug 858817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873705">SUSE bug 873705</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4296/">CVE-2013-4296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4296">CVE-2013-4296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5651/">CVE-2013-5651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5651">CVE-2013-5651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6436/">CVE-2013-6436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6436">CVE-2013-6436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6456/">CVE-2013-6456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6456">CVE-2013-6456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6458/">CVE-2013-6458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6458">CVE-2013-6458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0179/">CVE-2014-0179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0179">CVE-2014-0179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1447/">CVE-2014-1447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1447">CVE-2014-1447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578916" comment="libvirt-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578917" comment="libvirt-client-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578918" comment="libvirt-client-32bit-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578919" comment="libvirt-doc-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578920" comment="libvirt-lock-sanlock-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578921" comment="libvirt-python-1.0.5.9-0.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578916" comment="libvirt-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578917" comment="libvirt-client-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578918" comment="libvirt-client-32bit-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578919" comment="libvirt-doc-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578920" comment="libvirt-lock-sanlock-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578921" comment="libvirt-python-1.0.5.9-0.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578916" comment="libvirt-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578917" comment="libvirt-client-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578918" comment="libvirt-client-32bit-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578919" comment="libvirt-doc-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578920" comment="libvirt-lock-sanlock-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578921" comment="libvirt-python-1.0.5.9-0.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218983" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1025340" ref_url="https://bugzilla.suse.com/1025340" source="BUGZILLA"/>
		<reference ref_id="1076500" ref_url="https://bugzilla.suse.com/1076500" source="BUGZILLA"/>
		<reference ref_id="1079869" ref_url="https://bugzilla.suse.com/1079869" source="BUGZILLA"/>
		<reference ref_id="1083625" ref_url="https://bugzilla.suse.com/1083625" source="BUGZILLA"/>
		<reference ref_id="1087887" ref_url="https://bugzilla.suse.com/1087887" source="BUGZILLA"/>
		<reference ref_id="1088147" ref_url="https://bugzilla.suse.com/1088147" source="BUGZILLA"/>
		<reference ref_id="936233" ref_url="https://bugzilla.suse.com/936233" source="BUGZILLA"/>
		<reference ref_id="960742" ref_url="https://bugzilla.suse.com/960742" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-1064" ref_url="https://www.suse.com/security/cve/CVE-2018-1064/" source="CVE"/>
		<reference ref_id="CVE-2018-5748" ref_url="https://www.suse.com/security/cve/CVE-2018-5748/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004052.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issues fixed:

- CVE-2017-5715: Spectre fixes for libvirt (bsc#1079869, bsc#1088147, bsc#1087887).
- CVE-2018-1064: Avoid denial of service reading from QEMU guest agent (bsc#1083625).
- CVE-2018-5748: Avoid denial of service reading from QEMU monitor (bsc#1076500).

Bug fixes:

- bsc#1025340: Use xend for nodeGetFreeMemory API.
- bsc#960742: Allow read access to script directories in libvirtd AppArmor profile.
- bsc#936233: Introduce qemuDomainDefCheckABIStability.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-15"/>
	<updated date="2018-05-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1025340">SUSE bug 1025340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076500">SUSE bug 1076500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079869">SUSE bug 1079869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083625">SUSE bug 1083625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087887">SUSE bug 1087887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088147">SUSE bug 1088147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936233">SUSE bug 936233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960742">SUSE bug 960742</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1064/">CVE-2018-1064 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1064">CVE-2018-1064 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5748/">CVE-2018-5748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5748">CVE-2018-5748 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578922" comment="libvirt-1.0.5.9-21.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578923" comment="libvirt-client-1.0.5.9-21.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578924" comment="libvirt-client-32bit-1.0.5.9-21.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578925" comment="libvirt-doc-1.0.5.9-21.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578926" comment="libvirt-lock-sanlock-1.0.5.9-21.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578927" comment="libvirt-python-1.0.5.9-21.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578922" comment="libvirt-1.0.5.9-21.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578923" comment="libvirt-client-1.0.5.9-21.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578924" comment="libvirt-client-32bit-1.0.5.9-21.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578925" comment="libvirt-doc-1.0.5.9-21.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578926" comment="libvirt-lock-sanlock-1.0.5.9-21.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578927" comment="libvirt-python-1.0.5.9-21.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218984" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004094.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2018-3639: cpu: add support for 'ssbd' and 'virt-ssbd' CPUID feature bits pass through.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-28"/>
	<updated date="2018-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578928" comment="libvirt-1.0.5.9-21.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578929" comment="libvirt-client-1.0.5.9-21.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578930" comment="libvirt-client-32bit-1.0.5.9-21.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578931" comment="libvirt-doc-1.0.5.9-21.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578932" comment="libvirt-lock-sanlock-1.0.5.9-21.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578933" comment="libvirt-python-1.0.5.9-21.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578928" comment="libvirt-1.0.5.9-21.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578929" comment="libvirt-client-1.0.5.9-21.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578930" comment="libvirt-client-32bit-1.0.5.9-21.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578931" comment="libvirt-doc-1.0.5.9-21.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578932" comment="libvirt-lock-sanlock-1.0.5.9-21.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578933" comment="libvirt-python-1.0.5.9-21.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218985" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1131595" ref_url="https://bugzilla.suse.com/1131595" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3886" ref_url="https://www.suse.com/security/cve/CVE-2019-3886/" source="CVE"/>
		<description>
This update for libvirt fixes the following issues:

Security issue fixed:

- CVE-2019-3886: Fixed a information exposure which allowed to retrieve the guest
  hostname under readonly mode (bsc#1131595).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-21"/>
	<updated date="2019-05-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1131595">SUSE bug 1131595</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3886/">CVE-2019-3886 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3886">CVE-2019-3886 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578934" comment="libvirt-1.0.5.9-21.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578935" comment="libvirt-client-1.0.5.9-21.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578936" comment="libvirt-client-32bit-1.0.5.9-21.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578937" comment="libvirt-doc-1.0.5.9-21.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578938" comment="libvirt-lock-sanlock-1.0.5.9-21.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578939" comment="libvirt-python-1.0.5.9-21.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218986" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1135273" ref_url="https://bugzilla.suse.com/1135273" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<description>
This update for libvirt fixes the following issues:

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Sampling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the libvirt adjustments, that pass through the new 'md-clear' CPU flag (bsc#1135273).

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-03"/>
	<updated date="2019-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135273">SUSE bug 1135273</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578940" comment="libvirt-1.0.5.9-21.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578941" comment="libvirt-client-1.0.5.9-21.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578942" comment="libvirt-client-32bit-1.0.5.9-21.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578943" comment="libvirt-doc-1.0.5.9-21.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578944" comment="libvirt-lock-sanlock-1.0.5.9-21.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578945" comment="libvirt-python-1.0.5.9-21.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218987" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1138301" ref_url="https://bugzilla.suse.com/1138301" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10161" ref_url="https://www.suse.com/security/cve/CVE-2019-10161/" source="CVE"/>
		<description>
This update for libvirt fixes the following issues:

Security issue fixed:

- CVE-2019-10161: Fixed virDomainSaveImageGetXMLDesc API which could accept a path
  parameter pointing anywhere on the system and potentially leading to execution
  of a malicious file with root privileges by libvirtd (bsc#1138301).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138301">SUSE bug 1138301</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10161/">CVE-2019-10161 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10161">CVE-2019-10161 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578946" comment="libvirt-1.0.5.9-21.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578947" comment="libvirt-client-1.0.5.9-21.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578948" comment="libvirt-client-32bit-1.0.5.9-21.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578949" comment="libvirt-doc-1.0.5.9-21.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578950" comment="libvirt-lock-sanlock-1.0.5.9-21.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578951" comment="libvirt-python-1.0.5.9-21.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218988" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="952889" ref_url="https://bugzilla.suse.com/952889" source="BUGZILLA"/>
		<reference ref_id="987527" ref_url="https://bugzilla.suse.com/987527" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5008" ref_url="https://www.suse.com/security/cve/CVE-2016-5008/" source="CVE"/>
		<description>
This update for libvirt fixes the following issues:

Security issue fixed:

- CVE-2016-5008: Fixed an issue where an empty VNC password would disables authentication (bsc#987527).

Non-security issue fixed:

- Fixed an issue where increasing the RAM or CPUs over a certain threshold would lead to soft lockups (bsc#952889).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-06"/>
	<updated date="2019-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952889">SUSE bug 952889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987527">SUSE bug 987527</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5008/">CVE-2016-5008 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5008">CVE-2016-5008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578952" comment="libvirt-1.0.5.9-21.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578953" comment="libvirt-client-1.0.5.9-21.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578954" comment="libvirt-client-32bit-1.0.5.9-21.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578955" comment="libvirt-doc-1.0.5.9-21.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578956" comment="libvirt-lock-sanlock-1.0.5.9-21.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578957" comment="libvirt-python-1.0.5.9-21.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218989" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1197636" ref_url="https://bugzilla.suse.com/1197636" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0897" ref_url="https://www.suse.com/security/cve/CVE-2022-0897/" source="CVE"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2022-0897: Fixed a crash in nwfilter when counting number of network filters (bsc#1197636).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-05"/>
	<updated date="2022-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1197636">SUSE bug 1197636</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0897/">CVE-2022-0897 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0897">CVE-2022-0897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681450" comment="libvirt-1.0.5.9-21.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681451" comment="libvirt-client-1.0.5.9-21.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681452" comment="libvirt-client-32bit-1.0.5.9-21.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681453" comment="libvirt-doc-1.0.5.9-21.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681454" comment="libvirt-lock-sanlock-1.0.5.9-21.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681455" comment="libvirt-python-1.0.5.9-21.26.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218990" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="897031" ref_url="https://bugzilla.suse.com/897031" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6051" ref_url="https://www.suse.com/security/cve/CVE-2014-6051/" source="CVE"/>
		<reference ref_id="CVE-2014-6052" ref_url="https://www.suse.com/security/cve/CVE-2014-6052/" source="CVE"/>
		<reference ref_id="CVE-2014-6053" ref_url="https://www.suse.com/security/cve/CVE-2014-6053/" source="CVE"/>
		<reference ref_id="CVE-2014-6054" ref_url="https://www.suse.com/security/cve/CVE-2014-6054/" source="CVE"/>
		<reference ref_id="CVE-2014-6055" ref_url="https://www.suse.com/security/cve/CVE-2014-6055/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
		<description>
The libvncserver package was updated to fix the following security issues:

- bsc#897031: fix several security issues:
  * CVE-2014-6051: Integer overflow in MallocFrameBuffer() on client side.
  * CVE-2014-6052: Lack of malloc() return value checking on client side.
  * CVE-2014-6053: Server crash on a very large ClientCutText message.
  * CVE-2014-6054: Server crash when scaling factor is set to zero.
  * CVE-2014-6055: Multiple stack overflows in File Transfer feature.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-26"/>
	<updated date="2015-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6051/">CVE-2014-6051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6051">CVE-2014-6051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6052/">CVE-2014-6052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6052">CVE-2014-6052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6053/">CVE-2014-6053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6053">CVE-2014-6053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6054/">CVE-2014-6054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6054">CVE-2014-6054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6055/">CVE-2014-6055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6055">CVE-2014-6055 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578958" comment="LibVNCServer-0.9.1-156.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578958" comment="LibVNCServer-0.9.1-156.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578958" comment="LibVNCServer-0.9.1-156.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218991" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1059809" ref_url="https://bugzilla.suse.com/1059809" source="BUGZILLA"/>
		<reference ref_id="1059811" ref_url="https://bugzilla.suse.com/1059811" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14632" ref_url="https://www.suse.com/security/cve/CVE-2017-14632/" source="CVE"/>
		<reference ref_id="CVE-2017-14633" ref_url="https://www.suse.com/security/cve/CVE-2017-14633/" source="CVE"/>
		<description>
This update for libvorbis fixes the following issues:

- CVE-2017-14633: out-of-bounds array read vulnerability exists in
  function mapping0_forward() could lead to remote denial of service (bsc#1059811)
- CVE-2017-14632: Remote Code Execution upon freeing uninitialized
  memory in function vorbis_analysis_headerout(bsc#1059809)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1059809">SUSE bug 1059809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059811">SUSE bug 1059811</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14632/">CVE-2017-14632 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14632">CVE-2017-14632 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14633/">CVE-2017-14633 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14633">CVE-2017-14633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572529" comment="libvorbis-1.2.0-79.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572530" comment="libvorbis-32bit-1.2.0-79.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572531" comment="libvorbis-doc-1.2.0-79.20.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218992" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1085687" ref_url="https://bugzilla.suse.com/1085687" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<description>
This update for libvorbis fixes the following issues:

- CVE-2018-5146: Fixed out of bounds memory write while processing Vorbis audio data (bsc#1085687).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-23"/>
	<updated date="2018-03-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085687">SUSE bug 1085687</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5146">CVE-2018-5146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572532" comment="libvorbis-1.2.0-79.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572533" comment="libvorbis-32bit-1.2.0-79.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572534" comment="libvorbis-doc-1.2.0-79.20.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218993" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1059812" ref_url="https://bugzilla.suse.com/1059812" source="BUGZILLA"/>
		<reference ref_id="1091072" ref_url="https://bugzilla.suse.com/1091072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14160" ref_url="https://www.suse.com/security/cve/CVE-2017-14160/" source="CVE"/>
		<reference ref_id="CVE-2018-10393" ref_url="https://www.suse.com/security/cve/CVE-2018-10393/" source="CVE"/>
		<description>
This update for libvorbis fixes the following issues:

Security issues fixed:

- CVE-2018-10393: Fixed stack-based buffer over-read in bark_noise_hybridm (bsc#1091072).
- CVE-2017-14160: Fixed out-of-bounds access inside bark_noise_hybridmp function (bsc#1059812).

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1059812">SUSE bug 1059812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091072">SUSE bug 1091072</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14160/">CVE-2017-14160 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14160">CVE-2017-14160 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10393/">CVE-2018-10393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10393">CVE-2018-10393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572535" comment="libvorbis-1.2.0-79.20.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572536" comment="libvorbis-32bit-1.2.0-79.20.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572537" comment="libvorbis-doc-1.2.0-79.20.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218994" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1091070" ref_url="https://bugzilla.suse.com/1091070" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10392" ref_url="https://www.suse.com/security/cve/CVE-2018-10392/" source="CVE"/>
		<description>
This update for libvorbis fixes the following issues:

The following security issue was fixed:

  - Fixed the validation of channels in mapping0_forward(), which previously
    allowed remote attackers to cause a denial of service via specially crafted
    files (CVE-2018-10392, bsc#1091070)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-06"/>
	<updated date="2018-06-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091070">SUSE bug 1091070</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10392/">CVE-2018-10392 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10392">CVE-2018-10392 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572538" comment="libvorbis-1.2.0-79.20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572539" comment="libvorbis-32bit-1.2.0-79.20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572540" comment="libvorbis-doc-1.2.0-79.20.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218995" version="1" class="patch">
	<metadata>
		<title>Security update for openwsman</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="901882" ref_url="https://bugzilla.suse.com/901882" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<description>

This update adds a configuration option to disable SSLv2 and SSLv3 in 
openwsman. This is required to mitigate CVE-2014-3566.

To use the new option, edit /etc/openwsman/openwsman.conf and add the 
following line to the [server] section:

ssl_disabled_protocols = SSLv2 SSLv3

Security Issues:

    * CVE-2014-3566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-22"/>
	<updated date="2014-10-22"/>
	<bugzilla href="https://bugzilla.suse.com/901882">SUSE bug 901882</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578959" comment="libwsman1-2.2.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578960" comment="openwsman-client-2.2.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578961" comment="openwsman-server-2.2.3-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578959" comment="libwsman1-2.2.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578960" comment="openwsman-client-2.2.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578961" comment="openwsman-server-2.2.3-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578959" comment="libwsman1-2.2.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578960" comment="openwsman-client-2.2.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578961" comment="openwsman-server-2.2.3-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218996" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="829077" ref_url="https://bugzilla.suse.com/829077" source="BUGZILLA"/>
		<reference ref_id="854869" ref_url="https://bugzilla.suse.com/854869" source="BUGZILLA"/>
		<reference ref_id="901546" ref_url="https://bugzilla.suse.com/901546" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2877" ref_url="https://www.suse.com/security/cve/CVE-2013-2877/" source="CVE"/>
		<reference ref_id="CVE-2014-3660" ref_url="https://www.suse.com/security/cve/CVE-2014-3660/" source="CVE"/>
		<description>

This update fixes a denial of service via recursive entity expansion. 
(CVE-2014-3660)

Security Issues:

    * CVE-2014-3660
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3660&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-20"/>
	<updated date="2014-10-20"/>
	<bugzilla href="https://bugzilla.suse.com/829077">SUSE bug 829077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854869">SUSE bug 854869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901546">SUSE bug 901546</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2877/">CVE-2013-2877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2877">CVE-2013-2877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3660/">CVE-2014-3660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3660">CVE-2014-3660 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578962" comment="libxml2-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578963" comment="libxml2-32bit-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578964" comment="libxml2-doc-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578965" comment="libxml2-python-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578966" comment="libxml2-x86-2.7.6-0.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578962" comment="libxml2-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578963" comment="libxml2-32bit-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578964" comment="libxml2-doc-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578965" comment="libxml2-python-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578966" comment="libxml2-x86-2.7.6-0.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578962" comment="libxml2-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578963" comment="libxml2-32bit-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578964" comment="libxml2-doc-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578965" comment="libxml2-python-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578966" comment="libxml2-x86-2.7.6-0.31.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218997" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="972335" ref_url="https://bugzilla.suse.com/972335" source="BUGZILLA"/>
		<reference ref_id="975947" ref_url="https://bugzilla.suse.com/975947" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627/" source="CVE"/>
		<description>
This update for libxml2 fixes two security issues:

- libxml2 limits the number of recursions an XML document can contain so to protect against the 'Billion Laughs' denial-of-service attack. Unfortunately, the underlying counter was not incremented properly in all necessary locations. Therefore, specially crafted XML documents could exhaust all available stack space and crash the XML parser without running into the recursion limit. This vulnerability has been fixed. (bsc#975947)

- When running in recovery mode, certain invalid XML documents would trigger an infinite recursion in libxml2 that ran until all stack space was exhausted. This vulnerability could have been used to facilitate a denial-of-sevice attack. (CVE-2016-3627, bsc#972335)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-03"/>
	<updated date="2016-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/972335">SUSE bug 972335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975947">SUSE bug 975947</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3627">CVE-2016-3627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572552" comment="libxml2-2.7.6-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572553" comment="libxml2-32bit-2.7.6-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572554" comment="libxml2-doc-2.7.6-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572555" comment="libxml2-python-2.7.6-0.40.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218998" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="963963" ref_url="https://bugzilla.suse.com/963963" source="BUGZILLA"/>
		<reference ref_id="965283" ref_url="https://bugzilla.suse.com/965283" source="BUGZILLA"/>
		<reference ref_id="978395" ref_url="https://bugzilla.suse.com/978395" source="BUGZILLA"/>
		<reference ref_id="981040" ref_url="https://bugzilla.suse.com/981040" source="BUGZILLA"/>
		<reference ref_id="981041" ref_url="https://bugzilla.suse.com/981041" source="BUGZILLA"/>
		<reference ref_id="981108" ref_url="https://bugzilla.suse.com/981108" source="BUGZILLA"/>
		<reference ref_id="981109" ref_url="https://bugzilla.suse.com/981109" source="BUGZILLA"/>
		<reference ref_id="981111" ref_url="https://bugzilla.suse.com/981111" source="BUGZILLA"/>
		<reference ref_id="981112" ref_url="https://bugzilla.suse.com/981112" source="BUGZILLA"/>
		<reference ref_id="981114" ref_url="https://bugzilla.suse.com/981114" source="BUGZILLA"/>
		<reference ref_id="981115" ref_url="https://bugzilla.suse.com/981115" source="BUGZILLA"/>
		<reference ref_id="981548" ref_url="https://bugzilla.suse.com/981548" source="BUGZILLA"/>
		<reference ref_id="981549" ref_url="https://bugzilla.suse.com/981549" source="BUGZILLA"/>
		<reference ref_id="981550" ref_url="https://bugzilla.suse.com/981550" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8806" ref_url="https://www.suse.com/security/cve/CVE-2015-8806/" source="CVE"/>
		<reference ref_id="CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762/" source="CVE"/>
		<reference ref_id="CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833/" source="CVE"/>
		<reference ref_id="CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834/" source="CVE"/>
		<reference ref_id="CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835/" source="CVE"/>
		<reference ref_id="CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837/" source="CVE"/>
		<reference ref_id="CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838/" source="CVE"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840/" source="CVE"/>
		<reference ref_id="CVE-2016-2073" ref_url="https://www.suse.com/security/cve/CVE-2016-2073/" source="CVE"/>
		<reference ref_id="CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705/" source="CVE"/>
		<reference ref_id="CVE-2016-4447" ref_url="https://www.suse.com/security/cve/CVE-2016-4447/" source="CVE"/>
		<reference ref_id="CVE-2016-4448" ref_url="https://www.suse.com/security/cve/CVE-2016-4448/" source="CVE"/>
		<reference ref_id="CVE-2016-4449" ref_url="https://www.suse.com/security/cve/CVE-2016-4449/" source="CVE"/>
		<reference ref_id="CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002123.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following security issues: 

- CVE-2016-2073, CVE-2015-8806, CVE-2016-1839: A Heap-buffer overread
  was fixed in libxml2/dict.c  [bsc#963963, bsc#965283, bsc#981114].
- CVE-2016-4483: Code was added to avoid an out of bound access when
  serializing malformed strings [bsc#978395].
- CVE-2016-1762: Fixed a heap-based buffer overread in xmlNextChar [bsc#981040].
- CVE-2016-1834: Fixed a heap-buffer-overflow in xmlStrncat [bsc#981041].
- CVE-2016-1833: Fixed a heap-based buffer overread in htmlCurrentChar [bsc#981108].
- CVE-2016-1835: Fixed a heap use-after-free in xmlSAX2AttributeNs [bsc#981109].
- CVE-2016-1837: Fixed a heap use-after-free in htmlParsePubidLiteral
  and htmlParseSystemiteral [bsc#981111].
- CVE-2016-1838: Fixed a heap-based buffer overread in
  xmlParserPrintFileContextInternal [bsc#981112].
- CVE-2016-1840: Fixed a heap-buffer-overflow in xmlFAParsePosCharGroup [bsc#981115].
- CVE-2016-4447: Fixed a heap-based buffer-underreads due to xmlParseName [bsc#981548].
- CVE-2016-4448: Fixed some format string warnings with possible format
  string vulnerability [bsc#981549],
- CVE-2016-4449: Fixed inappropriate fetch of entities content [bsc#981550].
- CVE-2016-3705: Fixed missing increment of recursion counter.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/963963">SUSE bug 963963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965283">SUSE bug 965283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978395">SUSE bug 978395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981040">SUSE bug 981040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981041">SUSE bug 981041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981108">SUSE bug 981108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981109">SUSE bug 981109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981111">SUSE bug 981111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981112">SUSE bug 981112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981114">SUSE bug 981114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981115">SUSE bug 981115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981548">SUSE bug 981548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981549">SUSE bug 981549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981550">SUSE bug 981550</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8806/">CVE-2015-8806 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8806">CVE-2015-8806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1762">CVE-2016-1762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1833">CVE-2016-1833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1834">CVE-2016-1834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1835">CVE-2016-1835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1837">CVE-2016-1837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1838">CVE-2016-1838 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1839">CVE-2016-1839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1840">CVE-2016-1840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2073/">CVE-2016-2073 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2073">CVE-2016-2073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3705">CVE-2016-3705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4447/">CVE-2016-4447 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4447">CVE-2016-4447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4448/">CVE-2016-4448 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4448">CVE-2016-4448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4449/">CVE-2016-4449 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4449">CVE-2016-4449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4483">CVE-2016-4483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576520" comment="libxml2-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576521" comment="libxml2-32bit-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576522" comment="libxml2-doc-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576523" comment="libxml2-python-2.7.6-0.44.4 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576520" comment="libxml2-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576521" comment="libxml2-32bit-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576522" comment="libxml2-doc-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576523" comment="libxml2-python-2.7.6-0.44.4 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218999" version="1" class="patch">
	<metadata>
		<title>Recommended update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="996079" ref_url="https://bugzilla.suse.com/996079" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<description>

This update for libxml2 fixes an issue when processing external entities introduced
with the fix for CVE-2014-0191.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-29"/>
	<updated date="2016-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/996079">SUSE bug 996079</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0191">CVE-2014-0191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009992234" comment="libxml2-2.7.6-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992235" comment="libxml2-32bit-2.7.6-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992236" comment="libxml2-doc-2.7.6-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009992237" comment="libxml2-python-2.7.6-0.47.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219000" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1005544" ref_url="https://bugzilla.suse.com/1005544" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658/" source="CVE"/>
		<description>

This update for libxml2 fixes the following issues:

- CVE-2016-4658: Use after free via namespace node in XPointer ranges (bsc#1005544).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-26"/>
	<updated date="2016-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005544">SUSE bug 1005544</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4658">CVE-2016-4658 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572560" comment="libxml2-2.7.6-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572561" comment="libxml2-32bit-2.7.6-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572562" comment="libxml2-doc-2.7.6-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572563" comment="libxml2-python-2.7.6-0.50.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219001" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1010675" ref_url="https://bugzilla.suse.com/1010675" source="BUGZILLA"/>
		<reference ref_id="1014873" ref_url="https://bugzilla.suse.com/1014873" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<description>

This update for libxml2 fixes the following issues:

* CVE-2016-9318: libxml2 did not offer a flag directly indicating that the current document may be read but other files may not be opened, which made it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document (bsc#1010675).
* Prevent NULL dereference in xpointer.c and xmlDumpElementContent, and infinite recursion in xmlParseConditionalSections when in recovery mode(bnc#1014873)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-16"/>
	<updated date="2017-01-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014873">SUSE bug 1014873</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9318">CVE-2016-9318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572564" comment="libxml2-2.7.6-0.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572565" comment="libxml2-32bit-2.7.6-0.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572566" comment="libxml2-doc-2.7.6-0.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572567" comment="libxml2-python-2.7.6-0.64.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219002" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1010675" ref_url="https://bugzilla.suse.com/1010675" source="BUGZILLA"/>
		<reference ref_id="1013930" ref_url="https://bugzilla.suse.com/1013930" source="BUGZILLA"/>
		<reference ref_id="1039063" ref_url="https://bugzilla.suse.com/1039063" source="BUGZILLA"/>
		<reference ref_id="1039064" ref_url="https://bugzilla.suse.com/1039064" source="BUGZILLA"/>
		<reference ref_id="1039066" ref_url="https://bugzilla.suse.com/1039066" source="BUGZILLA"/>
		<reference ref_id="1039069" ref_url="https://bugzilla.suse.com/1039069" source="BUGZILLA"/>
		<reference ref_id="1039661" ref_url="https://bugzilla.suse.com/1039661" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<reference ref_id="CVE-2017-9047" ref_url="https://www.suse.com/security/cve/CVE-2017-9047/" source="CVE"/>
		<reference ref_id="CVE-2017-9048" ref_url="https://www.suse.com/security/cve/CVE-2017-9048/" source="CVE"/>
		<reference ref_id="CVE-2017-9049" ref_url="https://www.suse.com/security/cve/CVE-2017-9049/" source="CVE"/>
		<reference ref_id="CVE-2017-9050" ref_url="https://www.suse.com/security/cve/CVE-2017-9050/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002940.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following issues:

Security issues fixed:

- CVE-2017-9050: heap-based buffer overflow (xmlDictAddString func) [bsc#1039069, bsc#1039661]
- CVE-2017-9049: heap-based buffer overflow (xmlDictComputeFastKey func) [bsc#1039066]
- CVE-2017-9048: stack overflow vulnerability (xmlSnprintfElementContent func) [bsc#1039063]
- CVE-2017-9047: stack overflow vulnerability (xmlSnprintfElementContent func) [bsc#1039064]

A clarification for the previously released update: For CVE-2016-9318 we decided
not to ship a fix since it can break existing setups. Please take appropriate
actions if you parse untrusted XML files and use the new -noxxe flag if
possible (bnc#1010675, bnc#1013930).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-13"/>
	<updated date="2017-06-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013930">SUSE bug 1013930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039063">SUSE bug 1039063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039064">SUSE bug 1039064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039066">SUSE bug 1039066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039069">SUSE bug 1039069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039661">SUSE bug 1039661</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9318">CVE-2016-9318 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9047/">CVE-2017-9047 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9047">CVE-2017-9047 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9048/">CVE-2017-9048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9048">CVE-2017-9048 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9049/">CVE-2017-9049 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9049">CVE-2017-9049 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9050/">CVE-2017-9050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9050">CVE-2017-9050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578967" comment="libxml2-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578968" comment="libxml2-32bit-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578969" comment="libxml2-doc-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578970" comment="libxml2-python-2.7.6-0.69.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578967" comment="libxml2-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578968" comment="libxml2-32bit-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578969" comment="libxml2-doc-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578970" comment="libxml2-python-2.7.6-0.69.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219003" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1024989" ref_url="https://bugzilla.suse.com/1024989" source="BUGZILLA"/>
		<reference ref_id="1044337" ref_url="https://bugzilla.suse.com/1044337" source="BUGZILLA"/>
		<reference ref_id="1044887" ref_url="https://bugzilla.suse.com/1044887" source="BUGZILLA"/>
		<reference ref_id="1044894" ref_url="https://bugzilla.suse.com/1044894" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0663" ref_url="https://www.suse.com/security/cve/CVE-2017-0663/" source="CVE"/>
		<reference ref_id="CVE-2017-5969" ref_url="https://www.suse.com/security/cve/CVE-2017-5969/" source="CVE"/>
		<reference ref_id="CVE-2017-7375" ref_url="https://www.suse.com/security/cve/CVE-2017-7375/" source="CVE"/>
		<reference ref_id="CVE-2017-7376" ref_url="https://www.suse.com/security/cve/CVE-2017-7376/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

Security issues fixed:

* CVE-2017-0663: Fixed a heap buffer overflow in xmlAddID (bsc#1044337)
* CVE-2017-5969: Fixed a NULL pointer deref in xmlDumpElementContent (bsc#1024989)
* CVE-2017-7375: Prevented an unwanted external entity reference (bsc#1044894)
* CVE-2017-7376: Increase buffer space for port in HTTP redirect support (bsc#1044887)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-07"/>
	<updated date="2017-07-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024989">SUSE bug 1024989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044337">SUSE bug 1044337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044887">SUSE bug 1044887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044894">SUSE bug 1044894</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0663/">CVE-2017-0663 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0663">CVE-2017-0663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5969/">CVE-2017-5969 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5969">CVE-2017-5969 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7375/">CVE-2017-7375 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7375">CVE-2017-7375 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7376/">CVE-2017-7376 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7376">CVE-2017-7376 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572572" comment="libxml2-2.7.6-0.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572573" comment="libxml2-32bit-2.7.6-0.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572574" comment="libxml2-doc-2.7.6-0.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572575" comment="libxml2-python-2.7.6-0.76.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219004" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1038444" ref_url="https://bugzilla.suse.com/1038444" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8872" ref_url="https://www.suse.com/security/cve/CVE-2017-8872/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2017-8872: Out-of-bounds read could lead to application crash (bsc#1038444)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-09"/>
	<updated date="2017-08-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1038444">SUSE bug 1038444</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8872/">CVE-2017-8872 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8872">CVE-2017-8872 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572576" comment="libxml2-2.7.6-0.77.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572577" comment="libxml2-32bit-2.7.6-0.77.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572578" comment="libxml2-doc-2.7.6-0.77.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572579" comment="libxml2-python-2.7.6-0.77.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219005" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1069689" ref_url="https://bugzilla.suse.com/1069689" source="BUGZILLA"/>
		<reference ref_id="1077993" ref_url="https://bugzilla.suse.com/1077993" source="BUGZILLA"/>
		<reference ref_id="1078806" ref_url="https://bugzilla.suse.com/1078806" source="BUGZILLA"/>
		<reference ref_id="1078813" ref_url="https://bugzilla.suse.com/1078813" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5131" ref_url="https://www.suse.com/security/cve/CVE-2016-5131/" source="CVE"/>
		<reference ref_id="CVE-2017-15412" ref_url="https://www.suse.com/security/cve/CVE-2017-15412/" source="CVE"/>
		<reference ref_id="CVE-2017-16932" ref_url="https://www.suse.com/security/cve/CVE-2017-16932/" source="CVE"/>
		<reference ref_id="CVE-2017-5130" ref_url="https://www.suse.com/security/cve/CVE-2017-5130/" source="CVE"/>
		<description>
This update for libxml2 fixes several issues.

Theses security issues were fixed:

- CVE-2017-16932: Fixed infinite recursion could lead to an infinite loop or
  memory exhaustion when expanding a parameter entity in a DTD (bsc#1069689).
- CVE-2017-15412: Prevent use after free when calling XPath extension functions
  that allowed remote attackers to cause DoS or potentially RCE (bsc#1077993)
- CVE-2016-5131: Use-after-free vulnerability in libxml2 allowed
  remote attackers to cause a denial of service or possibly have
  unspecified other impact via vectors related to the XPointer range-to
  function. (bsc#1078813)
- CVE-2017-5130: Fixed a potential remote buffer overflow in function
  xmlMemoryStrdup() (bsc#1078806)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-08"/>
	<updated date="2018-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1069689">SUSE bug 1069689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077993">SUSE bug 1077993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078806">SUSE bug 1078806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078813">SUSE bug 1078813</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5131/">CVE-2016-5131 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5131">CVE-2016-5131 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15412/">CVE-2017-15412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15412">CVE-2017-15412 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16932/">CVE-2017-16932 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16932">CVE-2017-16932 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5130/">CVE-2017-5130 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5130">CVE-2017-5130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572580" comment="libxml2-2.7.6-0.77.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572581" comment="libxml2-32bit-2.7.6-0.77.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572582" comment="libxml2-doc-2.7.6-0.77.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572583" comment="libxml2-python-2.7.6-0.77.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219006" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1010675" ref_url="https://bugzilla.suse.com/1010675" source="BUGZILLA"/>
		<reference ref_id="1102046" ref_url="https://bugzilla.suse.com/1102046" source="BUGZILLA"/>
		<reference ref_id="1110146" ref_url="https://bugzilla.suse.com/1110146" source="BUGZILLA"/>
		<reference ref_id="1126613" ref_url="https://bugzilla.suse.com/1126613" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<reference ref_id="CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

Security issue fixed:

- CVE-2018-14404: Prevent NULL pointer dereference in the xmlXPathCompOpEval()
  function when parsing an invalid XPath expression in the XPATH_OP_AND or
  XPATH_OP_OR case leading to a denial of service attack (bsc#1102046)

Other Issue fixed:

- Fixed a bug related to the fix for CVE-2016-9318 which allowed xsltproc to access 
  the internet even when --nonet was given and also was making docbook-xsl-stylesheets to have 
  incomplete xml catalog file (bsc#1010675, bsc#1126613 and bsc#1110146).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-21"/>
	<updated date="2019-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102046">SUSE bug 1102046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110146">SUSE bug 1110146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126613">SUSE bug 1126613</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9318">CVE-2016-9318 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14404">CVE-2018-14404 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572584" comment="libxml2-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572585" comment="libxml2-32bit-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572586" comment="libxml2-doc-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572587" comment="libxml2-python-2.7.6-0.77.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219007" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1123919" ref_url="https://bugzilla.suse.com/1123919" source="BUGZILLA"/>
		<description>

This update for libxml2 doesn't fix any additional security issues, but correct its rpm changelog to reflect
all CVEs that have been fixed over the past.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572588" comment="libxml2-2.7.6-0.77.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572589" comment="libxml2-32bit-2.7.6-0.77.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572590" comment="libxml2-doc-2.7.6-0.77.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572591" comment="libxml2-python-2.7.6-0.77.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219008" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1159928" ref_url="https://bugzilla.suse.com/1159928" source="BUGZILLA"/>
		<reference ref_id="1161517" ref_url="https://bugzilla.suse.com/1161517" source="BUGZILLA"/>
		<reference ref_id="1161521" ref_url="https://bugzilla.suse.com/1161521" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19956" ref_url="https://www.suse.com/security/cve/CVE-2019-19956/" source="CVE"/>
		<reference ref_id="CVE-2019-20388" ref_url="https://www.suse.com/security/cve/CVE-2019-20388/" source="CVE"/>
		<reference ref_id="CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2019-20388: Fixed a memory leak in xmlSchemaPreRun (bsc#1161521).
- CVE-2020-7595: Fixed an infinite loop in an EOF situation (bsc#1161517).
- CVE-2019-19956: Fixed a memory leak in xmlParseBalancedChunkMemoryRecover (bsc#1159928).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-22"/>
	<updated date="2020-07-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1159928">SUSE bug 1159928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161517">SUSE bug 1161517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161521">SUSE bug 1161521</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19956/">CVE-2019-19956 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19956">CVE-2019-19956 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20388/">CVE-2019-20388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20388">CVE-2019-20388 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7595">CVE-2020-7595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572592" comment="libxml2-2.7.6-0.77.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572593" comment="libxml2-32bit-2.7.6-0.77.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572594" comment="libxml2-doc-2.7.6-0.77.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572595" comment="libxml2-python-2.7.6-0.77.27.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219009" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176179" ref_url="https://bugzilla.suse.com/1176179" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24977" ref_url="https://www.suse.com/security/cve/CVE-2020-24977/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2020-24977: Fixed a global-buffer-overflow in xmlEncodeEntitiesInternal (bsc#1176179).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-18"/>
	<updated date="2020-09-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1176179">SUSE bug 1176179</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24977/">CVE-2020-24977 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24977">CVE-2020-24977 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572596" comment="libxml2-2.7.6-0.77.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572597" comment="libxml2-32bit-2.7.6-0.77.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572598" comment="libxml2-doc-2.7.6-0.77.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572599" comment="libxml2-python-2.7.6-0.77.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219010" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185408" ref_url="https://bugzilla.suse.com/1185408" source="BUGZILLA"/>
		<reference ref_id="1185409" ref_url="https://bugzilla.suse.com/1185409" source="BUGZILLA"/>
		<reference ref_id="1185410" ref_url="https://bugzilla.suse.com/1185410" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).
- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).
- CVE-2021-3516: Fixed a use after free in xmlEncodeEntitiesInternal() in entities.c (bsc#1185409)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-11"/>
	<updated date="2021-05-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185408">SUSE bug 1185408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185409">SUSE bug 1185409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185410">SUSE bug 1185410</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0191">CVE-2014-0191 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3516">CVE-2021-3516 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">CVE-2021-3517 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">CVE-2021-3518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572600" comment="libxml2-2.7.6-0.77.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572601" comment="libxml2-32bit-2.7.6-0.77.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572602" comment="libxml2-doc-2.7.6-0.77.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572603" comment="libxml2-python-2.7.6-0.77.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219011" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1159928" ref_url="https://bugzilla.suse.com/1159928" source="BUGZILLA"/>
		<reference ref_id="1161517" ref_url="https://bugzilla.suse.com/1161517" source="BUGZILLA"/>
		<reference ref_id="1161521" ref_url="https://bugzilla.suse.com/1161521" source="BUGZILLA"/>
		<reference ref_id="1176179" ref_url="https://bugzilla.suse.com/1176179" source="BUGZILLA"/>
		<reference ref_id="1185408" ref_url="https://bugzilla.suse.com/1185408" source="BUGZILLA"/>
		<reference ref_id="1185409" ref_url="https://bugzilla.suse.com/1185409" source="BUGZILLA"/>
		<reference ref_id="1185410" ref_url="https://bugzilla.suse.com/1185410" source="BUGZILLA"/>
		<reference ref_id="1185698" ref_url="https://bugzilla.suse.com/1185698" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2019-19956" ref_url="https://www.suse.com/security/cve/CVE-2019-19956/" source="CVE"/>
		<reference ref_id="CVE-2019-20388" ref_url="https://www.suse.com/security/cve/CVE-2019-20388/" source="CVE"/>
		<reference ref_id="CVE-2020-24977" ref_url="https://www.suse.com/security/cve/CVE-2020-24977/" source="CVE"/>
		<reference ref_id="CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595/" source="CVE"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<reference ref_id="CVE-2021-3537" ref_url="https://www.suse.com/security/cve/CVE-2021-3537/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

Security issues fixed:  

- CVE-2021-3537: NULL pointer dereference in valid.c:xmlValidBuildAContentModel (bsc#1185698)
- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).
- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).
- CVE-2021-3516: Fixed a use after free in xmlEncodeEntitiesInternal() in entities.c (bsc#1185409)
- CVE-2020-24977: Fixed a global-buffer-overflow in xmlEncodeEntitiesInternal (bsc#1176179).	  
- CVE-2019-20388: Fixed a memory leak in xmlSchemaPreRun (bsc#1161521).
- CVE-2020-7595: Fixed an infinite loop in an EOF situation (bsc#1161517).
- CVE-2019-19956: Fixed a memory leak in xmlParseBalancedChunkMemoryRecover (bsc#1159928).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159928">SUSE bug 1159928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161517">SUSE bug 1161517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161521">SUSE bug 1161521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176179">SUSE bug 1176179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185408">SUSE bug 1185408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185409">SUSE bug 1185409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185410">SUSE bug 1185410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185698">SUSE bug 1185698</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0191">CVE-2014-0191 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19956/">CVE-2019-19956 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19956">CVE-2019-19956 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20388/">CVE-2019-20388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20388">CVE-2019-20388 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24977/">CVE-2020-24977 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24977">CVE-2020-24977 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7595">CVE-2020-7595 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3516">CVE-2021-3516 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">CVE-2021-3517 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">CVE-2021-3518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3537/">CVE-2021-3537 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3537">CVE-2021-3537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572604" comment="libxml2-2.7.6-0.77.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572605" comment="libxml2-32bit-2.7.6-0.77.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572606" comment="libxml2-doc-2.7.6-0.77.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572607" comment="libxml2-python-2.7.6-0.77.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219012" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186015" ref_url="https://bugzilla.suse.com/1186015" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3541" ref_url="https://www.suse.com/security/cve/CVE-2021-3541/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2021-3541: Fixed exponential entity expansion attack that could bypass all existing protection mechanisms (bsc#1186015).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-09"/>
	<updated date="2021-06-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186015">SUSE bug 1186015</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3541/">CVE-2021-3541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3541">CVE-2021-3541 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572608" comment="libxml2-2.7.6-0.77.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572609" comment="libxml2-32bit-2.7.6-0.77.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572610" comment="libxml2-doc-2.7.6-0.77.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572611" comment="libxml2-python-2.7.6-0.77.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219013" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196490" ref_url="https://bugzilla.suse.com/1196490" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2022-23308: Fixed a use-after-free of ID and IDREF attributes (bsc#1196490).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196490">SUSE bug 1196490</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23308">CVE-2022-23308 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670908" comment="libxml2-2.7.6-0.77.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670909" comment="libxml2-32bit-2.7.6-0.77.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670910" comment="libxml2-doc-2.7.6-0.77.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670911" comment="libxml2-python-2.7.6-0.77.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219014" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199132" ref_url="https://bugzilla.suse.com/1199132" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29824" ref_url="https://www.suse.com/security/cve/CVE-2022-29824/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2022-29824: Fixed integer overflow leading to out-of-bounds write in buf.c and tree.c (bsc#1199132).
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199132">SUSE bug 1199132</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29824/">CVE-2022-29824 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29824">CVE-2022-29824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682702" comment="libxml2-2.7.6-0.77.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682703" comment="libxml2-32bit-2.7.6-0.77.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682704" comment="libxml2-doc-2.7.6-0.77.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682705" comment="libxml2-python-2.7.6-0.77.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219015" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199132" ref_url="https://bugzilla.suse.com/1199132" source="BUGZILLA"/>
		<reference ref_id="1204367" ref_url="https://bugzilla.suse.com/1204367" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29824" ref_url="https://www.suse.com/security/cve/CVE-2022-29824/" source="CVE"/>
		<reference ref_id="CVE-2022-40304" ref_url="https://www.suse.com/security/cve/CVE-2022-40304/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

  - CVE-2022-40304: Fixed dict corruption caused by entity reference cycles (bsc#1204367).
  - CVE-2022-29824: Fixed integer overflow leading to out-of-bounds write in buf.c (bsc#1199132).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-20"/>
	<updated date="2022-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199132">SUSE bug 1199132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204367">SUSE bug 1204367</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29824/">CVE-2022-29824 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29824">CVE-2022-29824 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40304/">CVE-2022-40304 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40304">CVE-2022-40304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993625" comment="libxml2-2.7.6-0.77.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993626" comment="libxml2-32bit-2.7.6-0.77.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993627" comment="libxml2-doc-2.7.6-0.77.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993628" comment="libxml2-python-2.7.6-0.77.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219016" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210411" ref_url="https://bugzilla.suse.com/1210411" source="BUGZILLA"/>
		<reference ref_id="1210412" ref_url="https://bugzilla.suse.com/1210412" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28484" ref_url="https://www.suse.com/security/cve/CVE-2023-28484/" source="CVE"/>
		<reference ref_id="CVE-2023-29469" ref_url="https://www.suse.com/security/cve/CVE-2023-29469/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2023-29469: Fixed inconsistent result when hashing empty strings (bsc#1210412).
- CVE-2023-28484: Fixed NULL pointer dereference in xmlSchemaFixupComplexType (bsc#1210411).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-27"/>
	<updated date="2023-04-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210411">SUSE bug 1210411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210412">SUSE bug 1210412</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28484/">CVE-2023-28484 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28484">CVE-2023-28484 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29469/">CVE-2023-29469 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29469">CVE-2023-29469 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993629" comment="libxml2-2.7.6-0.77.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993630" comment="libxml2-32bit-2.7.6-0.77.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993631" comment="libxml2-doc-2.7.6-0.77.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993632" comment="libxml2-python-2.7.6-0.77.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219017" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="928193" ref_url="https://bugzilla.suse.com/928193" source="BUGZILLA"/>
		<reference ref_id="951734" ref_url="https://bugzilla.suse.com/951734" source="BUGZILLA"/>
		<reference ref_id="951735" ref_url="https://bugzilla.suse.com/951735" source="BUGZILLA"/>
		<reference ref_id="956018" ref_url="https://bugzilla.suse.com/956018" source="BUGZILLA"/>
		<reference ref_id="956021" ref_url="https://bugzilla.suse.com/956021" source="BUGZILLA"/>
		<reference ref_id="956260" ref_url="https://bugzilla.suse.com/956260" source="BUGZILLA"/>
		<reference ref_id="957105" ref_url="https://bugzilla.suse.com/957105" source="BUGZILLA"/>
		<reference ref_id="957106" ref_url="https://bugzilla.suse.com/957106" source="BUGZILLA"/>
		<reference ref_id="957107" ref_url="https://bugzilla.suse.com/957107" source="BUGZILLA"/>
		<reference ref_id="957109" ref_url="https://bugzilla.suse.com/957109" source="BUGZILLA"/>
		<reference ref_id="957110" ref_url="https://bugzilla.suse.com/957110" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<description>

    This update fixes the following security issues: 

    * CVE-2015-1819 Enforce the reader to run in constant memory [bnc#928193]
    * CVE-2015-7941 Fix out of bound read with crafted xml input by stopping parsing on entities boundaries errors [bnc#951734]
    * CVE-2015-7942 Fix another variation of overflow in Conditional sections [bnc#951735]
    * CVE-2015-8241 Avoid extra processing of MarkupDecl when EOF [bnc#956018]
    * CVE-2015-8242 Buffer overead with HTML parser in push mode [bnc#956021]
    * CVE-2015-8317 Return if the encoding declaration is broken or encoding conversion failed [bnc#956260]
    * CVE-2015-5312 Fix another entity expansion issue [bnc#957105]
    * CVE-2015-7497 Avoid an heap buffer overflow in xmlDictComputeFastQKey [bnc#957106]
    * CVE-2015-7498 Processes entities after encoding conversion failures [bnc#957107]
    * CVE-2015-7499 Add xmlHaltParser() to stop the parser / Detect incoherency on GROW [bnc#957109]
    * CVE-2015-7500 Fix memory access error due to incorrect entities boundaries [bnc#957110]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-05"/>
	<updated date="2016-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/928193">SUSE bug 928193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951734">SUSE bug 951734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951735">SUSE bug 951735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956018">SUSE bug 956018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956021">SUSE bug 956021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956260">SUSE bug 956260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957105">SUSE bug 957105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957106">SUSE bug 957106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957107">SUSE bug 957107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957109">SUSE bug 957109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957110">SUSE bug 957110</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1819">CVE-2015-1819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5312">CVE-2015-5312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7497">CVE-2015-7497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7498">CVE-2015-7498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7499">CVE-2015-7499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7500">CVE-2015-7500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7941">CVE-2015-7941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7942">CVE-2015-7942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8241">CVE-2015-8241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8242">CVE-2015-8242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8317">CVE-2015-8317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578971" comment="libxml2-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578972" comment="libxml2-32bit-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578973" comment="libxml2-doc-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578974" comment="libxml2-python-2.7.6-0.34.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578975" comment="libxml2-x86-2.7.6-0.34.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578971" comment="libxml2-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578972" comment="libxml2-32bit-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578973" comment="libxml2-doc-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578974" comment="libxml2-python-2.7.6-0.34.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578975" comment="libxml2-x86-2.7.6-0.34.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578971" comment="libxml2-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578972" comment="libxml2-32bit-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578973" comment="libxml2-doc-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578974" comment="libxml2-python-2.7.6-0.34.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578975" comment="libxml2-x86-2.7.6-0.34.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219018" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="960674" ref_url="https://bugzilla.suse.com/960674" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8710" ref_url="https://www.suse.com/security/cve/CVE-2015-8710/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001817.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following security issue:

- CVE-2015-8710: Parsing short unclosed HTML comment could cause uninitialized memory access, which allowed remote attackers to read contents from previous HTTP requests depending on the application (bsc#960674)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960674">SUSE bug 960674</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8710/">CVE-2015-8710 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8710">CVE-2015-8710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578976" comment="libxml2-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578977" comment="libxml2-32bit-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578978" comment="libxml2-doc-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578979" comment="libxml2-python-2.7.6-0.37.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578980" comment="libxml2-x86-2.7.6-0.37.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578976" comment="libxml2-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578977" comment="libxml2-32bit-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578978" comment="libxml2-doc-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578979" comment="libxml2-python-2.7.6-0.37.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578980" comment="libxml2-x86-2.7.6-0.37.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578976" comment="libxml2-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578977" comment="libxml2-32bit-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578978" comment="libxml2-doc-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578979" comment="libxml2-python-2.7.6-0.37.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578980" comment="libxml2-x86-2.7.6-0.37.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219019" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="849019" ref_url="https://bugzilla.suse.com/849019" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3970" ref_url="https://www.suse.com/security/cve/CVE-2011-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-2825" ref_url="https://www.suse.com/security/cve/CVE-2012-2825/" source="CVE"/>
		<reference ref_id="CVE-2012-6139" ref_url="https://www.suse.com/security/cve/CVE-2012-6139/" source="CVE"/>
		<description>

libxslt received a security update to fix a security issue:

    * CVE-2013-4520: The XSL implementation in libxslt allowed remote
      attackers to cause a denial of service (crash) via an invalid DTD.
      (addendum due to incomplete fix for CVE-2012-2825)

Security Issue references:

    * CVE-2012-6139
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6139&gt;
    * CVE-2012-2825
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2825&gt;
    * CVE-2011-3970
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3970&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-06"/>
	<updated date="2013-11-06"/>
	<bugzilla href="https://bugzilla.suse.com/849019">SUSE bug 849019</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3970/">CVE-2011-3970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3970">CVE-2011-3970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2825/">CVE-2012-2825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2825">CVE-2012-2825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6139/">CVE-2012-6139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6139">CVE-2012-6139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576524" comment="libxslt-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576525" comment="libxslt-32bit-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576526" comment="libxslt-x86-1.1.24-19.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576524" comment="libxslt-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576525" comment="libxslt-32bit-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576526" comment="libxslt-x86-1.1.24-19.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576524" comment="libxslt-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576525" comment="libxslt-32bit-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576526" comment="libxslt-x86-1.1.24-19.23.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219020" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1005591" ref_url="https://bugzilla.suse.com/1005591" source="BUGZILLA"/>
		<reference ref_id="1035905" ref_url="https://bugzilla.suse.com/1035905" source="BUGZILLA"/>
		<reference ref_id="934119" ref_url="https://bugzilla.suse.com/934119" source="BUGZILLA"/>
		<reference ref_id="952474" ref_url="https://bugzilla.suse.com/952474" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7995" ref_url="https://www.suse.com/security/cve/CVE-2015-7995/" source="CVE"/>
		<reference ref_id="CVE-2015-9019" ref_url="https://www.suse.com/security/cve/CVE-2015-9019/" source="CVE"/>
		<reference ref_id="CVE-2016-4738" ref_url="https://www.suse.com/security/cve/CVE-2016-4738/" source="CVE"/>
		<reference ref_id="CVE-2017-5029" ref_url="https://www.suse.com/security/cve/CVE-2017-5029/" source="CVE"/>
		<description>

 This update for libxslt fixes the following issues:
 
- CVE-2017-5029: The xsltAddTextString function in transform.c lacked a check 
for integer overflow during a size calculation, which allowed a remote attacker 
to perform an out of bounds memory write via a crafted HTML page (bsc#1035905).

- CVE-2016-4738: Fix heap overread in xsltFormatNumberConversion: An empty decimal-separator 
could cause a heap overread. This can be exploited to leak a couple of bytes after 
the buffer that holds the pattern string (bsc#1005591).

- CVE-2015-9019: Properly initialize random generator (bsc#934119).

- CVE-2015-7995: Vulnerability in function xsltStylePreCompute' in preproc.c could cause a 
type confusion leading to DoS. (bsc#952474)

 		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-15"/>
	<updated date="2017-05-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005591">SUSE bug 1005591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035905">SUSE bug 1035905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934119">SUSE bug 934119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952474">SUSE bug 952474</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7995/">CVE-2015-7995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7995">CVE-2015-7995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-9019/">CVE-2015-9019 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9019">CVE-2015-9019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4738/">CVE-2016-4738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4738">CVE-2016-4738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5029/">CVE-2017-5029 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5029">CVE-2017-5029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572621" comment="libxslt-1.1.24-19.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572622" comment="libxslt-32bit-1.1.24-19.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219021" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1132160" ref_url="https://bugzilla.suse.com/1132160" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<description>
This update for libxslt fixes the following issues:

Security issue fixed:

- CVE-2019-11068: Fixed a protection mechanism bypass where callers of 
  xsltCheckRead() and xsltCheckWrite() would permit access upon receiving an
  error (bsc#1132160).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-16"/>
	<updated date="2019-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1132160">SUSE bug 1132160</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11068">CVE-2019-11068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572623" comment="libxslt-1.1.24-19.34.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572624" comment="libxslt-32bit-1.1.24-19.34.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219022" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1140095" ref_url="https://bugzilla.suse.com/1140095" source="BUGZILLA"/>
		<reference ref_id="1140101" ref_url="https://bugzilla.suse.com/1140101" source="BUGZILLA"/>
		<reference ref_id="1154609" ref_url="https://bugzilla.suse.com/1154609" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<reference ref_id="CVE-2019-13117" ref_url="https://www.suse.com/security/cve/CVE-2019-13117/" source="CVE"/>
		<reference ref_id="CVE-2019-13118" ref_url="https://www.suse.com/security/cve/CVE-2019-13118/" source="CVE"/>
		<reference ref_id="CVE-2019-18197" ref_url="https://www.suse.com/security/cve/CVE-2019-18197/" source="CVE"/>
		<description>
This update for libxslt fixes the following issues:

Security issues fixed:

- CVE-2019-13118: Fixed a read of uninitialized stack data (bsc#1140101).
- CVE-2019-13117: Fixed a uninitialized read which allowed to discern whether a byte on the stack contains certain special characters (bsc#1140095).
- CVE-2019-18197: Fixed a dangling pointer in xsltCopyText which may have led to information disclosure (bsc#1154609).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-08"/>
	<updated date="2020-09-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1140095">SUSE bug 1140095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140101">SUSE bug 1140101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154609">SUSE bug 1154609</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11068">CVE-2019-11068 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13117/">CVE-2019-13117 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13117">CVE-2019-13117 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13118/">CVE-2019-13118 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13118">CVE-2019-13118 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18197/">CVE-2019-18197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18197">CVE-2019-18197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572625" comment="libxslt-1.1.24-19.34.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572626" comment="libxslt-32bit-1.1.24-19.34.8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219023" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208574" ref_url="https://bugzilla.suse.com/1208574" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30560" ref_url="https://www.suse.com/security/cve/CVE-2021-30560/" source="CVE"/>
		<description>
This update for libxslt fixes the following issues:

- CVE-2021-30560: Fixing a use after free vulnerability in Blink XSLT (bsc#1208574).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-24"/>
	<updated date="2023-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208574">SUSE bug 1208574</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30560/">CVE-2021-30560 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30560">CVE-2021-30560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993633" comment="libxslt-1.1.24-19.34.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993634" comment="libxslt-32bit-1.1.24-19.34.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219024" version="1" class="patch">
	<metadata>
		<title>Security update for libyajl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198405" ref_url="https://bugzilla.suse.com/1198405" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24795" ref_url="https://www.suse.com/security/cve/CVE-2022-24795/" source="CVE"/>
		<description>
This update for libyajl fixes the following issues:

- CVE-2022-24795: Fixed heap-based buffer overflow when handling large inputs (bsc#1198405).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-06"/>
	<updated date="2022-09-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198405">SUSE bug 1198405</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24795/">CVE-2022-24795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24795">CVE-2022-24795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993635" comment="libyajl1-1.0.11-6.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993636" comment="libyajl1-32bit-1.0.11-6.7.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219025" version="1" class="patch">
	<metadata>
		<title>Security update for libzypp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="825490" ref_url="https://bugzilla.suse.com/825490" source="BUGZILLA"/>
		<reference ref_id="828672" ref_url="https://bugzilla.suse.com/828672" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-3704" ref_url="https://www.suse.com/security/cve/CVE-2013-3704/" source="CVE"/>
		<description>

libzypp did not handle multiple gpg pubkeys in the repomd.xml.key and 
content.key consistently and secure. Attackers could have exploited this to 
add their own keys and pretend it's from SUSE.

Security Issue reference:

    * CVE-2013-3704
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3704&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-22"/>
	<updated date="2013-08-22"/>
	<bugzilla href="https://bugzilla.suse.com/825490">SUSE bug 825490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828672">SUSE bug 828672</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3704/">CVE-2013-3704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3704">CVE-2013-3704 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591537" comment="libzypp-9.37.1-0.7.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591537" comment="libzypp-9.37.1-0.7.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591537" comment="libzypp-9.37.1-0.7.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219026" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1001419" ref_url="https://bugzilla.suse.com/1001419" source="BUGZILLA"/>
		<reference ref_id="1002165" ref_url="https://bugzilla.suse.com/1002165" source="BUGZILLA"/>
		<reference ref_id="1003077" ref_url="https://bugzilla.suse.com/1003077" source="BUGZILLA"/>
		<reference ref_id="1003253" ref_url="https://bugzilla.suse.com/1003253" source="BUGZILLA"/>
		<reference ref_id="1003925" ref_url="https://bugzilla.suse.com/1003925" source="BUGZILLA"/>
		<reference ref_id="1004517" ref_url="https://bugzilla.suse.com/1004517" source="BUGZILLA"/>
		<reference ref_id="1007944" ref_url="https://bugzilla.suse.com/1007944" source="BUGZILLA"/>
		<reference ref_id="1008374" ref_url="https://bugzilla.suse.com/1008374" source="BUGZILLA"/>
		<reference ref_id="1008645" ref_url="https://bugzilla.suse.com/1008645" source="BUGZILLA"/>
		<reference ref_id="1008831" ref_url="https://bugzilla.suse.com/1008831" source="BUGZILLA"/>
		<reference ref_id="1008833" ref_url="https://bugzilla.suse.com/1008833" source="BUGZILLA"/>
		<reference ref_id="1008850" ref_url="https://bugzilla.suse.com/1008850" source="BUGZILLA"/>
		<reference ref_id="1009875" ref_url="https://bugzilla.suse.com/1009875" source="BUGZILLA"/>
		<reference ref_id="1010150" ref_url="https://bugzilla.suse.com/1010150" source="BUGZILLA"/>
		<reference ref_id="1010467" ref_url="https://bugzilla.suse.com/1010467" source="BUGZILLA"/>
		<reference ref_id="1010501" ref_url="https://bugzilla.suse.com/1010501" source="BUGZILLA"/>
		<reference ref_id="1010507" ref_url="https://bugzilla.suse.com/1010507" source="BUGZILLA"/>
		<reference ref_id="1010711" ref_url="https://bugzilla.suse.com/1010711" source="BUGZILLA"/>
		<reference ref_id="1010713" ref_url="https://bugzilla.suse.com/1010713" source="BUGZILLA"/>
		<reference ref_id="1010716" ref_url="https://bugzilla.suse.com/1010716" source="BUGZILLA"/>
		<reference ref_id="1011685" ref_url="https://bugzilla.suse.com/1011685" source="BUGZILLA"/>
		<reference ref_id="1011820" ref_url="https://bugzilla.suse.com/1011820" source="BUGZILLA"/>
		<reference ref_id="1012183" ref_url="https://bugzilla.suse.com/1012183" source="BUGZILLA"/>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1012832" ref_url="https://bugzilla.suse.com/1012832" source="BUGZILLA"/>
		<reference ref_id="1012851" ref_url="https://bugzilla.suse.com/1012851" source="BUGZILLA"/>
		<reference ref_id="1012852" ref_url="https://bugzilla.suse.com/1012852" source="BUGZILLA"/>
		<reference ref_id="1012895" ref_url="https://bugzilla.suse.com/1012895" source="BUGZILLA"/>
		<reference ref_id="1013038" ref_url="https://bugzilla.suse.com/1013038" source="BUGZILLA"/>
		<reference ref_id="1013042" ref_url="https://bugzilla.suse.com/1013042" source="BUGZILLA"/>
		<reference ref_id="1013531" ref_url="https://bugzilla.suse.com/1013531" source="BUGZILLA"/>
		<reference ref_id="1013542" ref_url="https://bugzilla.suse.com/1013542" source="BUGZILLA"/>
		<reference ref_id="1014454" ref_url="https://bugzilla.suse.com/1014454" source="BUGZILLA"/>
		<reference ref_id="1014746" ref_url="https://bugzilla.suse.com/1014746" source="BUGZILLA"/>
		<reference ref_id="1015878" ref_url="https://bugzilla.suse.com/1015878" source="BUGZILLA"/>
		<reference ref_id="1017710" ref_url="https://bugzilla.suse.com/1017710" source="BUGZILLA"/>
		<reference ref_id="1018446" ref_url="https://bugzilla.suse.com/1018446" source="BUGZILLA"/>
		<reference ref_id="1019079" ref_url="https://bugzilla.suse.com/1019079" source="BUGZILLA"/>
		<reference ref_id="1019783" ref_url="https://bugzilla.suse.com/1019783" source="BUGZILLA"/>
		<reference ref_id="1021258" ref_url="https://bugzilla.suse.com/1021258" source="BUGZILLA"/>
		<reference ref_id="821612" ref_url="https://bugzilla.suse.com/821612" source="BUGZILLA"/>
		<reference ref_id="824171" ref_url="https://bugzilla.suse.com/824171" source="BUGZILLA"/>
		<reference ref_id="914939" ref_url="https://bugzilla.suse.com/914939" source="BUGZILLA"/>
		<reference ref_id="929141" ref_url="https://bugzilla.suse.com/929141" source="BUGZILLA"/>
		<reference ref_id="935436" ref_url="https://bugzilla.suse.com/935436" source="BUGZILLA"/>
		<reference ref_id="956514" ref_url="https://bugzilla.suse.com/956514" source="BUGZILLA"/>
		<reference ref_id="961923" ref_url="https://bugzilla.suse.com/961923" source="BUGZILLA"/>
		<reference ref_id="966826" ref_url="https://bugzilla.suse.com/966826" source="BUGZILLA"/>
		<reference ref_id="967716" ref_url="https://bugzilla.suse.com/967716" source="BUGZILLA"/>
		<reference ref_id="969340" ref_url="https://bugzilla.suse.com/969340" source="BUGZILLA"/>
		<reference ref_id="973691" ref_url="https://bugzilla.suse.com/973691" source="BUGZILLA"/>
		<reference ref_id="979595" ref_url="https://bugzilla.suse.com/979595" source="BUGZILLA"/>
		<reference ref_id="987576" ref_url="https://bugzilla.suse.com/987576" source="BUGZILLA"/>
		<reference ref_id="989152" ref_url="https://bugzilla.suse.com/989152" source="BUGZILLA"/>
		<reference ref_id="989261" ref_url="https://bugzilla.suse.com/989261" source="BUGZILLA"/>
		<reference ref_id="991665" ref_url="https://bugzilla.suse.com/991665" source="BUGZILLA"/>
		<reference ref_id="992566" ref_url="https://bugzilla.suse.com/992566" source="BUGZILLA"/>
		<reference ref_id="992569" ref_url="https://bugzilla.suse.com/992569" source="BUGZILLA"/>
		<reference ref_id="992906" ref_url="https://bugzilla.suse.com/992906" source="BUGZILLA"/>
		<reference ref_id="992991" ref_url="https://bugzilla.suse.com/992991" source="BUGZILLA"/>
		<reference ref_id="993890" ref_url="https://bugzilla.suse.com/993890" source="BUGZILLA"/>
		<reference ref_id="993891" ref_url="https://bugzilla.suse.com/993891" source="BUGZILLA"/>
		<reference ref_id="994296" ref_url="https://bugzilla.suse.com/994296" source="BUGZILLA"/>
		<reference ref_id="994618" ref_url="https://bugzilla.suse.com/994618" source="BUGZILLA"/>
		<reference ref_id="994759" ref_url="https://bugzilla.suse.com/994759" source="BUGZILLA"/>
		<reference ref_id="995968" ref_url="https://bugzilla.suse.com/995968" source="BUGZILLA"/>
		<reference ref_id="996329" ref_url="https://bugzilla.suse.com/996329" source="BUGZILLA"/>
		<reference ref_id="996541" ref_url="https://bugzilla.suse.com/996541" source="BUGZILLA"/>
		<reference ref_id="996557" ref_url="https://bugzilla.suse.com/996557" source="BUGZILLA"/>
		<reference ref_id="997059" ref_url="https://bugzilla.suse.com/997059" source="BUGZILLA"/>
		<reference ref_id="997401" ref_url="https://bugzilla.suse.com/997401" source="BUGZILLA"/>
		<reference ref_id="997708" ref_url="https://bugzilla.suse.com/997708" source="BUGZILLA"/>
		<reference ref_id="998689" ref_url="https://bugzilla.suse.com/998689" source="BUGZILLA"/>
		<reference ref_id="999932" ref_url="https://bugzilla.suse.com/999932" source="BUGZILLA"/>
		<reference ref_id="999943" ref_url="https://bugzilla.suse.com/999943" source="BUGZILLA"/>
		<reference ref_id="CVE-2004-0230" ref_url="https://www.suse.com/security/cve/CVE-2004-0230/" source="CVE"/>
		<reference ref_id="CVE-2012-6704" ref_url="https://www.suse.com/security/cve/CVE-2012-6704/" source="CVE"/>
		<reference ref_id="CVE-2015-1350" ref_url="https://www.suse.com/security/cve/CVE-2015-1350/" source="CVE"/>
		<reference ref_id="CVE-2015-8956" ref_url="https://www.suse.com/security/cve/CVE-2015-8956/" source="CVE"/>
		<reference ref_id="CVE-2015-8962" ref_url="https://www.suse.com/security/cve/CVE-2015-8962/" source="CVE"/>
		<reference ref_id="CVE-2015-8964" ref_url="https://www.suse.com/security/cve/CVE-2015-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-8970" ref_url="https://www.suse.com/security/cve/CVE-2015-8970/" source="CVE"/>
		<reference ref_id="CVE-2016-0823" ref_url="https://www.suse.com/security/cve/CVE-2016-0823/" source="CVE"/>
		<reference ref_id="CVE-2016-10088" ref_url="https://www.suse.com/security/cve/CVE-2016-10088/" source="CVE"/>
		<reference ref_id="CVE-2016-3841" ref_url="https://www.suse.com/security/cve/CVE-2016-3841/" source="CVE"/>
		<reference ref_id="CVE-2016-6828" ref_url="https://www.suse.com/security/cve/CVE-2016-6828/" source="CVE"/>
		<reference ref_id="CVE-2016-7042" ref_url="https://www.suse.com/security/cve/CVE-2016-7042/" source="CVE"/>
		<reference ref_id="CVE-2016-7097" ref_url="https://www.suse.com/security/cve/CVE-2016-7097/" source="CVE"/>
		<reference ref_id="CVE-2016-7117" ref_url="https://www.suse.com/security/cve/CVE-2016-7117/" source="CVE"/>
		<reference ref_id="CVE-2016-7425" ref_url="https://www.suse.com/security/cve/CVE-2016-7425/" source="CVE"/>
		<reference ref_id="CVE-2016-7910" ref_url="https://www.suse.com/security/cve/CVE-2016-7910/" source="CVE"/>
		<reference ref_id="CVE-2016-7911" ref_url="https://www.suse.com/security/cve/CVE-2016-7911/" source="CVE"/>
		<reference ref_id="CVE-2016-7916" ref_url="https://www.suse.com/security/cve/CVE-2016-7916/" source="CVE"/>
		<reference ref_id="CVE-2016-8399" ref_url="https://www.suse.com/security/cve/CVE-2016-8399/" source="CVE"/>
		<reference ref_id="CVE-2016-8632" ref_url="https://www.suse.com/security/cve/CVE-2016-8632/" source="CVE"/>
		<reference ref_id="CVE-2016-8633" ref_url="https://www.suse.com/security/cve/CVE-2016-8633/" source="CVE"/>
		<reference ref_id="CVE-2016-8646" ref_url="https://www.suse.com/security/cve/CVE-2016-8646/" source="CVE"/>
		<reference ref_id="CVE-2016-9555" ref_url="https://www.suse.com/security/cve/CVE-2016-9555/" source="CVE"/>
		<reference ref_id="CVE-2016-9685" ref_url="https://www.suse.com/security/cve/CVE-2016-9685/" source="CVE"/>
		<reference ref_id="CVE-2016-9756" ref_url="https://www.suse.com/security/cve/CVE-2016-9756/" source="CVE"/>
		<reference ref_id="CVE-2016-9793" ref_url="https://www.suse.com/security/cve/CVE-2016-9793/" source="CVE"/>
		<reference ref_id="CVE-2017-5551" ref_url="https://www.suse.com/security/cve/CVE-2017-5551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2015-8970: crypto/algif_skcipher.c in the Linux kernel did not verify that a setkey operation has been performed on an AF_ALG socket before an accept system call is processed, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted application that did not supply a key, related to the lrw_crypt function in crypto/lrw.c (bnc#1008374).
- CVE-2017-5551: Clear S_ISGID on tmpfs when setting posix ACLs (bsc#1021258).
- CVE-2016-7097: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).
- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2004-0230: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP (bnc#969340).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).
- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could have enabled a local malicious application to execute arbitrary code within the context of the kernel bnc#1014746).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).
- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option (bnc#1013542).
- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038).
- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).
- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations (bnc#1012832).
- CVE-2015-1350: The VFS subsystem in the Linux kernel provided an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allowed local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program (bnc#914939).
- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacked chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bnc#1011685).
- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716).
- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711).
- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).
- CVE-2016-7916: Race condition in the environ_read function in fs/proc/base.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete (bnc#1010467).
- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux kernel allowed local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data (bnc#1010150).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel in certain unusual hardware configurations allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux, when the GNU Compiler Collection (gcc) stack protector is enabled, used an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).
- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).
- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file (bnc#994759).
- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).
- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).

The following non-security bugs were fixed:

- Always include the git commit in KOTD builds. This allows us not to set it explicitly in builds submitted to the official distribution (bnc#821612, bnc#824171).
- KVM: x86: SYSENTER emulation is broken (bsc#994618).
- NFS: Do not disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261).
- NFS: Refresh open-owner id when server says SEQID is bad (bsc#989261).
- NFSv4: Ensure that we do not drop a state owner more than once (bsc#979595).
- NFSv4: add flock_owner to open context (bnc#998689).
- NFSv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).
- NFSv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).
- NFSv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).
- NFSv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595).
- SELinux: Fix possible NULL pointer dereference in selinux_inode_permission() (bsc#1012895).
- USB: fix typo in wMaxPacketSize validation (bsc#991665).
- USB: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
- Update patches.xen/xen3-auto-arch-x86.diff (bsc#929141, among others).
- __ptrace_may_access() should not deny sub-threads (bsc#1012851).
- apparmor: fix IRQ stack overflow during free_profile (bsc#1009875).
- arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- include/linux/math64.h: add div64_ul() (bsc#996329).
- kabi-fix for flock_owner addition (bsc#998689).
- kabi: get back scsi_device.current_cmnd (bsc#935436).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kexec: add a kexec_crash_loaded() function (bsc#973691).
- md linear: fix a race between linear_add() and linear_congested() (bsc#1018446).
- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).
- mpt3sas: Fix panic when aer correct error occurred (bsc#997708, bsc#999943).
- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (VM Functionality, bsc#1008645).
- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944).
- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).
- posix-timers: Remove remaining uses of tasklist_lock (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock for task clock sample (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock on timer deletion (bnc#997401).
- powerpc: Add ability to build little endian kernels (bsc#967716).
- powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716).
- powerpc: Do not build assembly files with ABIv2 (bsc#967716).
- powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716).
- powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716).
- powerpc: Fix error when cross building TAGS and cscope (bsc#967716).
- powerpc: Make the vdso32 also build big-endian (bsc#967716).
- powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716).
- powerpc: Remove buggy 9-year-old test for binutils lower than 2.12.1 (bsc#967716).
- powerpc: Require gcc 4.0 on 64-bit (bsc#967716).
- powerpc: dtc is required to build dtb files (bsc#967716).
- printk/sched: Introduce special printk_sched() for those awkward (bsc#1013042, bsc#996541, bsc#1015878).
- qlcnic: Schedule napi directly in netpoll (bsc#966826).
- reiserfs: fix race in prealloc discard (bsc#987576).
- rpm/config.sh: Set a fitting release string (bsc#997059)
- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)
- s390/dasd: fix failfast for disconnected devices (bnc#961923, LTC#135138).
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bnc#1002165).
- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).
- sched: Fix possible divide by zero in avg_atom() calculation (bsc#996329).
- scsi: lpfc: Set elsiocb contexts to NULL after freeing it (bsc#996557).
- scsi: remove current_cmnd field from struct scsi_device (bsc#935436). 
- x86/MCE/intel: Cleanup CMCI storm logic (bsc#929141).
- xfs: remove the deprecated nodelaylog option (bsc#992906).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-17"/>
	<updated date="2017-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1001419">SUSE bug 1001419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002165">SUSE bug 1002165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003077">SUSE bug 1003077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003253">SUSE bug 1003253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003925">SUSE bug 1003925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004517">SUSE bug 1004517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007944">SUSE bug 1007944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008374">SUSE bug 1008374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008645">SUSE bug 1008645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008831">SUSE bug 1008831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008833">SUSE bug 1008833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008850">SUSE bug 1008850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009875">SUSE bug 1009875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010150">SUSE bug 1010150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010467">SUSE bug 1010467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010501">SUSE bug 1010501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010507">SUSE bug 1010507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010711">SUSE bug 1010711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010713">SUSE bug 1010713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010716">SUSE bug 1010716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011685">SUSE bug 1011685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011820">SUSE bug 1011820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012183">SUSE bug 1012183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012832">SUSE bug 1012832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012851">SUSE bug 1012851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012852">SUSE bug 1012852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012895">SUSE bug 1012895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013038">SUSE bug 1013038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013042">SUSE bug 1013042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013531">SUSE bug 1013531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013542">SUSE bug 1013542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014454">SUSE bug 1014454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014746">SUSE bug 1014746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015878">SUSE bug 1015878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017710">SUSE bug 1017710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018446">SUSE bug 1018446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019079">SUSE bug 1019079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019783">SUSE bug 1019783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021258">SUSE bug 1021258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821612">SUSE bug 821612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824171">SUSE bug 824171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914939">SUSE bug 914939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929141">SUSE bug 929141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935436">SUSE bug 935436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956514">SUSE bug 956514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961923">SUSE bug 961923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966826">SUSE bug 966826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967716">SUSE bug 967716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969340">SUSE bug 969340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973691">SUSE bug 973691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979595">SUSE bug 979595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987576">SUSE bug 987576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989152">SUSE bug 989152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989261">SUSE bug 989261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991665">SUSE bug 991665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992566">SUSE bug 992566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992569">SUSE bug 992569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992906">SUSE bug 992906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993890">SUSE bug 993890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993891">SUSE bug 993891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994296">SUSE bug 994296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994618">SUSE bug 994618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994759">SUSE bug 994759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995968">SUSE bug 995968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996329">SUSE bug 996329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996541">SUSE bug 996541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996557">SUSE bug 996557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997059">SUSE bug 997059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997401">SUSE bug 997401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997708">SUSE bug 997708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998689">SUSE bug 998689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999932">SUSE bug 999932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999943">SUSE bug 999943</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2004-0230/">CVE-2004-0230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-0230">CVE-2004-0230 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6704/">CVE-2012-6704 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6704">CVE-2012-6704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-1350/">CVE-2015-1350 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1350">CVE-2015-1350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8956/">CVE-2015-8956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8956">CVE-2015-8956 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8962/">CVE-2015-8962 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8962">CVE-2015-8962 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-8964/">CVE-2015-8964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8964">CVE-2015-8964 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8970/">CVE-2015-8970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8970">CVE-2015-8970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0823/">CVE-2016-0823 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0823">CVE-2016-0823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10088/">CVE-2016-10088 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10088">CVE-2016-10088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3841/">CVE-2016-3841 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3841">CVE-2016-3841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6828/">CVE-2016-6828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6828">CVE-2016-6828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7042/">CVE-2016-7042 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7042">CVE-2016-7042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7097/">CVE-2016-7097 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7097">CVE-2016-7097 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7117/">CVE-2016-7117 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7117">CVE-2016-7117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7425/">CVE-2016-7425 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7425">CVE-2016-7425 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7910/">CVE-2016-7910 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7910">CVE-2016-7910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7911/">CVE-2016-7911 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7911">CVE-2016-7911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7916/">CVE-2016-7916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7916">CVE-2016-7916 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8399/">CVE-2016-8399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8399">CVE-2016-8399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8632/">CVE-2016-8632 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8632">CVE-2016-8632 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8633/">CVE-2016-8633 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8633">CVE-2016-8633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8646/">CVE-2016-8646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8646">CVE-2016-8646 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9555/">CVE-2016-9555 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9555">CVE-2016-9555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9685/">CVE-2016-9685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9685">CVE-2016-9685 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9756/">CVE-2016-9756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9756">CVE-2016-9756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9793/">CVE-2016-9793 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9793">CVE-2016-9793 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5551/">CVE-2017-5551 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5551">CVE-2017-5551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578981" comment="kernel-bigsmp-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578982" comment="kernel-bigsmp-base-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578984" comment="kernel-default-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578985" comment="kernel-default-base-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578987" comment="kernel-default-man-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578988" comment="kernel-ec2-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578989" comment="kernel-ec2-base-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568449" comment="kernel-pae-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568450" comment="kernel-pae-base-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578991" comment="kernel-source-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578992" comment="kernel-syms-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578993" comment="kernel-trace-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578994" comment="kernel-trace-base-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578996" comment="kernel-xen-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578997" comment="kernel-xen-base-3.0.101-0.47.96.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219027" version="1" class="patch">
	<metadata>
		<title>Security update for lldpad (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1104624" ref_url="https://bugzilla.suse.com/1104624" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10932" ref_url="https://www.suse.com/security/cve/CVE-2018-10932/" source="CVE"/>
		<description>
This update for lldpad fixes the following issues:

- CVE-2018-10932: Fixed improper sanitization of shell-escape codes (bsc#1104624).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-27"/>
	<updated date="2022-09-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104624">SUSE bug 1104624</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-10932/">CVE-2018-10932 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10932">CVE-2018-10932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993637" comment="lldpad-0.9.45-0.13.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219028" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1159646" ref_url="https://bugzilla.suse.com/1159646" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17571" ref_url="https://www.suse.com/security/cve/CVE-2019-17571/" source="CVE"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2019-17571: Fixed a remote code execution by deserialization of untrusted data in SocketServer (bsc#1159646).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159646">SUSE bug 1159646</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17571/">CVE-2019-17571 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17571">CVE-2019-17571 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568460" comment="log4j-1.2.15-26.32.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219029" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1193662" ref_url="https://bugzilla.suse.com/1193662" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2021-4104: Disable the JMSAppender class from log4j to protect against
  the log4jshell vulnerability. [bsc#1193662]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-17"/>
	<updated date="2021-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104">CVE-2021-4104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660155" comment="log4j-1.2.15-26.32.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219030" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194842" ref_url="https://bugzilla.suse.com/1194842" source="BUGZILLA"/>
		<reference ref_id="1194843" ref_url="https://bugzilla.suse.com/1194843" source="BUGZILLA"/>
		<reference ref_id="1194844" ref_url="https://bugzilla.suse.com/1194844" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23302" ref_url="https://www.suse.com/security/cve/CVE-2022-23302/" source="CVE"/>
		<reference ref_id="CVE-2022-23305" ref_url="https://www.suse.com/security/cve/CVE-2022-23305/" source="CVE"/>
		<reference ref_id="CVE-2022-23307" ref_url="https://www.suse.com/security/cve/CVE-2022-23307/" source="CVE"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2022-23307: Fixed deserialization flaw in the chainsaw component of log4j leading to malicious code execution. (bsc#1194844)
- CVE-2022-23305: Fixed SQL injection when application is configured to use JDBCAppender. (bsc#1194843)
- CVE-2022-23302: Fixed remote code execution when application is configured to use JMSSink. (bsc#1194842)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194842">SUSE bug 1194842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194843">SUSE bug 1194843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194844">SUSE bug 1194844</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23302/">CVE-2022-23302 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23302">CVE-2022-23302 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23305/">CVE-2022-23305 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23305">CVE-2022-23305 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23307/">CVE-2022-23307 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23307">CVE-2022-23307 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664707" comment="log4j-1.2.15-26.32.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219031" version="1" class="patch">
	<metadata>
		<title>Security update for log4net (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172193" ref_url="https://bugzilla.suse.com/1172193" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1285" ref_url="https://www.suse.com/security/cve/CVE-2018-1285/" source="CVE"/>
		<description>
This update for log4net fixes the following issues:

- CVE-2018-1285: Fixed XXE in applications that accept arbitrary configuration files from users (bsc#1172193).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-16"/>
	<updated date="2022-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172193">SUSE bug 1172193</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1285/">CVE-2018-1285 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1285">CVE-2018-1285 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993638" comment="log4net-1.2.10-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219032" version="1" class="patch">
	<metadata>
		<title>Security update for logrotate (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192449" ref_url="https://bugzilla.suse.com/1192449" source="BUGZILLA"/>
		<reference ref_id="1201712" ref_url="https://bugzilla.suse.com/1201712" source="BUGZILLA"/>
		<description>
This update for logrotate fixes the following issues:
  
- Improved coredump handing for SUID binaries (bsc#1192449, bsc#1201712).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-24"/>
	<updated date="2022-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192449">SUSE bug 1192449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201712">SUSE bug 1201712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993639" comment="logrotate-3.7.7-10.30.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219033" version="1" class="patch">
	<metadata>
		<title>Security update for lua (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174367" ref_url="https://bugzilla.suse.com/1174367" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15888" ref_url="https://www.suse.com/security/cve/CVE-2020-15888/" source="CVE"/>
		<description>
This update for lua fixes the following issues:

- CVE-2020-15888: Fixed mishandled interaction between stack resizes and garbage collection (bsc#1174367).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-16"/>
	<updated date="2022-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174367">SUSE bug 1174367</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15888/">CVE-2020-15888 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15888">CVE-2020-15888 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993640" comment="liblua5_1-5.1.4-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219034" version="1" class="patch">
	<metadata>
		<title>Security update for lxc</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="835585" ref_url="https://bugzilla.suse.com/835585" source="BUGZILLA"/>
		<reference ref_id="839653" ref_url="https://bugzilla.suse.com/839653" source="BUGZILLA"/>
		<reference ref_id="839663" ref_url="https://bugzilla.suse.com/839663" source="BUGZILLA"/>
		<reference ref_id="855809" ref_url="https://bugzilla.suse.com/855809" source="BUGZILLA"/>
		<reference ref_id="869663" ref_url="https://bugzilla.suse.com/869663" source="BUGZILLA"/>
		<reference ref_id="924891" ref_url="https://bugzilla.suse.com/924891" source="BUGZILLA"/>
		<reference ref_id="924892" ref_url="https://bugzilla.suse.com/924892" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6441" ref_url="https://www.suse.com/security/cve/CVE-2013-6441/" source="CVE"/>
		<reference ref_id="SUSE-RU-2015:0992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-June/003062.html" source="SUSE-SU"/>
		<description>

The container framework LXC has been updated to fix various bugs and a 
security issue:

    * CVE-2013-6441: The sshd template allowed privilege escalation on the
      host.
    * SLES container time not aligned with host time (bnc#839653)
    * SLES container boot takes ages (bnc#839663)
    * lxc mounts /dev/pts with wrong options (bnc#869663)

Security Issues:

    * CVE-2013-6441
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6441&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-01"/>
	<updated date="2014-04-01"/>
	<bugzilla href="https://bugzilla.suse.com/835585">SUSE bug 835585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839653">SUSE bug 839653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839663">SUSE bug 839663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855809">SUSE bug 855809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869663">SUSE bug 869663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924891">SUSE bug 924891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924892">SUSE bug 924892</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6441/">CVE-2013-6441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6441">CVE-2013-6441 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578999" comment="lxc-0.8.0-0.21.6 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578999" comment="lxc-0.8.0-0.21.6 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578999" comment="lxc-0.8.0-0.21.6 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219035" version="1" class="patch">
	<metadata>
		<title>Security update for lxc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="946744" ref_url="https://bugzilla.suse.com/946744" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1335" ref_url="https://www.suse.com/security/cve/CVE-2015-1335/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001647.html" source="SUSE-SU"/>
		<description>
lxc was update to fix one security issue.

The following vulnerability was fixed:

* CVE-2015-1335: A directory traversal flaw while lxc-start is initially setting up the mounts for a container (bsc#946744)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-05"/>
	<updated date="2015-10-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/946744">SUSE bug 946744</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1335/">CVE-2015-1335 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1335">CVE-2015-1335 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579000" comment="lxc-0.8.0-0.25.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579000" comment="lxc-0.8.0-0.25.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579000" comment="lxc-0.8.0-0.25.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219036" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="995352" ref_url="https://bugzilla.suse.com/995352" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6893" ref_url="https://www.suse.com/security/cve/CVE-2016-6893/" source="CVE"/>
		<description>
This update for mailman to version 2.1.15 fixes the following issues:

- CVE-2016-6893: Prevent cross-site request forgery (CSRF) vulnerability in the
  user options page that allowed remote attackers to hijack the authentication of
  arbitrary users for requests that modify an option (bsc#995352).
- Various other hardenings against CSFR attacks

For details please see https://launchpad.net/mailman/+milestone/2.1.15
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-11"/>
	<updated date="2018-06-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/995352">SUSE bug 995352</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6893/">CVE-2016-6893 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6893">CVE-2016-6893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572629" comment="mailman-2.1.15-9.6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219037" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1077358" ref_url="https://bugzilla.suse.com/1077358" source="BUGZILLA"/>
		<reference ref_id="1099510" ref_url="https://bugzilla.suse.com/1099510" source="BUGZILLA"/>
		<reference ref_id="1101288" ref_url="https://bugzilla.suse.com/1101288" source="BUGZILLA"/>
		<reference ref_id="925502" ref_url="https://bugzilla.suse.com/925502" source="BUGZILLA"/>
		<reference ref_id="995352" ref_url="https://bugzilla.suse.com/995352" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2775" ref_url="https://www.suse.com/security/cve/CVE-2015-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-6893" ref_url="https://www.suse.com/security/cve/CVE-2016-6893/" source="CVE"/>
		<reference ref_id="CVE-2018-0618" ref_url="https://www.suse.com/security/cve/CVE-2018-0618/" source="CVE"/>
		<reference ref_id="CVE-2018-13796" ref_url="https://www.suse.com/security/cve/CVE-2018-13796/" source="CVE"/>
		<reference ref_id="CVE-2018-5950" ref_url="https://www.suse.com/security/cve/CVE-2018-5950/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005015.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

- Fixed a XSS vulnerability and information leak in user options CGI, which
  could be used to execute arbitrary scripts in the user's browser via
  specially encoded URLs (bsc#1077358 CVE-2018-5950)
- Fixed a directory traversal vulnerability in MTA transports when using the
  recommended Mailman Transport for Exim (bsc#925502 CVE-2015-2775)
- Fixed a XSS vulnerability, which allowed malicious listowners to inject
  scripts into the listinfo pages (bsc#1099510 CVE-2018-0618)
- Fixed arbitrary text injection vulnerability in several mailman CGIs
  (CVE-2018-13796 bsc#1101288)
- Fixed a CSRF vulnerability on the user options page (CVE-2016-6893 bsc#995352)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-04"/>
	<updated date="2019-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077358">SUSE bug 1077358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099510">SUSE bug 1099510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101288">SUSE bug 1101288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925502">SUSE bug 925502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995352">SUSE bug 995352</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-2775/">CVE-2015-2775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2775">CVE-2015-2775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6893/">CVE-2016-6893 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6893">CVE-2016-6893 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-0618/">CVE-2018-0618 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0618">CVE-2018-0618 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13796/">CVE-2018-13796 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13796">CVE-2018-13796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5950/">CVE-2018-5950 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5950">CVE-2018-5950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579001" comment="mailman-2.1.15-9.6.6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579001" comment="mailman-2.1.15-9.6.6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219038" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1102416" ref_url="https://bugzilla.suse.com/1102416" source="BUGZILLA"/>
		<reference ref_id="997205" ref_url="https://bugzilla.suse.com/997205" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6893" ref_url="https://www.suse.com/security/cve/CVE-2016-6893/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:

Security issue fixed:

- CVE-2016-6893: Fixed a Cross-site request forgery vulnerability in the admin web interface (bsc#997205).

Following bug was fixed:

- Allow CSRF check to pass in mailman web frontend if the list
  name contains a '+' (bsc#1102416)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102416">SUSE bug 1102416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997205">SUSE bug 997205</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6893/">CVE-2016-6893 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6893">CVE-2016-6893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572631" comment="mailman-2.1.15-9.6.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219039" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1154328" ref_url="https://bugzilla.suse.com/1154328" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3693" ref_url="https://www.suse.com/security/cve/CVE-2019-3693/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:
	  
- CVE-2019-3693: Fixed a local privilege escalation from wwwrun to root (bsc#1154328).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154328">SUSE bug 1154328</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3693/">CVE-2019-3693 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3693">CVE-2019-3693 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572632" comment="mailman-2.1.15-9.6.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219040" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1167068" ref_url="https://bugzilla.suse.com/1167068" source="BUGZILLA"/>
		<reference ref_id="1170558" ref_url="https://bugzilla.suse.com/1170558" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12137" ref_url="https://www.suse.com/security/cve/CVE-2020-12137/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:

Security issue fixed:

- CVE-2020-12137: Fixed a XSS vulnerability caused by MIME type confusion (bsc#1170558).

Non-security issue fixed:

- Fixed rights and ownership on /var/lib/mailman/archives (bsc#1167068).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167068">SUSE bug 1167068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170558">SUSE bug 1170558</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12137/">CVE-2020-12137 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12137">CVE-2020-12137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572633" comment="mailman-2.1.15-9.6.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219041" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1171363" ref_url="https://bugzilla.suse.com/1171363" source="BUGZILLA"/>
		<reference ref_id="682920" ref_url="https://bugzilla.suse.com/682920" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12108" ref_url="https://www.suse.com/security/cve/CVE-2020-12108/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:

Security issue fixed:

- CVE-2020-12108: Fixed a content injection bug (bsc#1171363).

Non-security issue fixed:

- Don't default to invalid hosts for DEFAULT_EMAIL_HOST (bsc#682920).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171363">SUSE bug 1171363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682920">SUSE bug 682920</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12108/">CVE-2020-12108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12108">CVE-2020-12108 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572634" comment="mailman-2.1.15-9.6.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219042" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1173369" ref_url="https://bugzilla.suse.com/1173369" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15011" ref_url="https://www.suse.com/security/cve/CVE-2020-15011/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:

- CVE-2020-15011: Fixed a possible Arbitrary Content Injection via the private archive login page (bsc#1173369).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173369">SUSE bug 1173369</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15011/">CVE-2020-15011 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15011">CVE-2020-15011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572635" comment="mailman-2.1.15-9.6.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219043" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1191959" ref_url="https://bugzilla.suse.com/1191959" source="BUGZILLA"/>
		<reference ref_id="1192735" ref_url="https://bugzilla.suse.com/1192735" source="BUGZILLA"/>
		<reference ref_id="1192741" ref_url="https://bugzilla.suse.com/1192741" source="BUGZILLA"/>
		<reference ref_id="1193316" ref_url="https://bugzilla.suse.com/1193316" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42096" ref_url="https://www.suse.com/security/cve/CVE-2021-42096/" source="CVE"/>
		<reference ref_id="CVE-2021-43331" ref_url="https://www.suse.com/security/cve/CVE-2021-43331/" source="CVE"/>
		<reference ref_id="CVE-2021-43332" ref_url="https://www.suse.com/security/cve/CVE-2021-43332/" source="CVE"/>
		<reference ref_id="CVE-2021-44227" ref_url="https://www.suse.com/security/cve/CVE-2021-44227/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:

- CVE-2021-44227: Preventing list moderator or list member accessing the admin UI (bsc#1193316).
- CVE-2021-43332: Preventing list moderator from cracking the list admin password encrypted in a CSRF token (bsc#1192741).
- CVE-2021-43331: Fixed XSS in Cgi/options.py (bsc#1192735).
- CVE-2021-42096: Add protection against remote privilege escalation via csrf_token derived from admin password (bsc#1191959).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-02"/>
	<updated date="2022-06-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191959">SUSE bug 1191959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192735">SUSE bug 1192735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192741">SUSE bug 1192741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193316">SUSE bug 1193316</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-42096/">CVE-2021-42096 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42096">CVE-2021-42096 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43331/">CVE-2021-43331 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43331">CVE-2021-43331 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43332/">CVE-2021-43332 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43332">CVE-2021-43332 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-44227/">CVE-2021-44227 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44227">CVE-2021-44227 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993641" comment="mailman-2.1.15-9.6.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219044" version="1" class="patch">
	<metadata>
		<title>Recommended update for mailx</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="827010" ref_url="https://bugzilla.suse.com/827010" source="BUGZILLA"/>
		<reference ref_id="853246" ref_url="https://bugzilla.suse.com/853246" source="BUGZILLA"/>
		<reference ref_id="909208" ref_url="https://bugzilla.suse.com/909208" source="BUGZILLA"/>
		<reference ref_id="922543" ref_url="https://bugzilla.suse.com/922543" source="BUGZILLA"/>
		<reference ref_id="CVE-2004-2771" ref_url="https://www.suse.com/security/cve/CVE-2004-2771/" source="CVE"/>
		<reference ref_id="CVE-2014-7844" ref_url="https://www.suse.com/security/cve/CVE-2014-7844/" source="CVE"/>
		<reference ref_id="SUSE-RU-2015:0876-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-May/002978.html" source="SUSE-SU"/>
		<description>

This update for mailx enables IPv6 support and includes the following 
fixes:

    * Crop off the brackets of an ipv6 address if found. (bnc#853246)
    * Enable mailx to parse IPv6 addresses including a port ([ipv6]:port).
      (bnc#853246)
    * Do not pseudo detect Latin nor UTF-8 in binary attachments.
      (bnc#827010)

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-10"/>
	<updated date="2013-12-10"/>
	<bugzilla href="https://bugzilla.suse.com/827010">SUSE bug 827010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853246">SUSE bug 853246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909208">SUSE bug 909208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922543">SUSE bug 922543</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2004-2771/">CVE-2004-2771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-2771">CVE-2004-2771 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-7844/">CVE-2014-7844 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7844">CVE-2014-7844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993642" comment="mailx-12.5-1.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993642" comment="mailx-12.5-1.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993642" comment="mailx-12.5-1.5.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219045" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1000751" ref_url="https://bugzilla.suse.com/1000751" source="BUGZILLA"/>
		<reference ref_id="1009026" ref_url="https://bugzilla.suse.com/1009026" source="BUGZILLA"/>
		<reference ref_id="1010395" ref_url="https://bugzilla.suse.com/1010395" source="BUGZILLA"/>
		<reference ref_id="1010401" ref_url="https://bugzilla.suse.com/1010401" source="BUGZILLA"/>
		<reference ref_id="1010402" ref_url="https://bugzilla.suse.com/1010402" source="BUGZILLA"/>
		<reference ref_id="1010404" ref_url="https://bugzilla.suse.com/1010404" source="BUGZILLA"/>
		<reference ref_id="1010410" ref_url="https://bugzilla.suse.com/1010410" source="BUGZILLA"/>
		<reference ref_id="1010422" ref_url="https://bugzilla.suse.com/1010422" source="BUGZILLA"/>
		<reference ref_id="1010427" ref_url="https://bugzilla.suse.com/1010427" source="BUGZILLA"/>
		<reference ref_id="1010517" ref_url="https://bugzilla.suse.com/1010517" source="BUGZILLA"/>
		<reference ref_id="1012964" ref_url="https://bugzilla.suse.com/1012964" source="BUGZILLA"/>
		<reference ref_id="992549" ref_url="https://bugzilla.suse.com/992549" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5285" ref_url="https://www.suse.com/security/cve/CVE-2016-5285/" source="CVE"/>
		<reference ref_id="CVE-2016-5290" ref_url="https://www.suse.com/security/cve/CVE-2016-5290/" source="CVE"/>
		<reference ref_id="CVE-2016-5291" ref_url="https://www.suse.com/security/cve/CVE-2016-5291/" source="CVE"/>
		<reference ref_id="CVE-2016-5296" ref_url="https://www.suse.com/security/cve/CVE-2016-5296/" source="CVE"/>
		<reference ref_id="CVE-2016-5297" ref_url="https://www.suse.com/security/cve/CVE-2016-5297/" source="CVE"/>
		<reference ref_id="CVE-2016-9064" ref_url="https://www.suse.com/security/cve/CVE-2016-9064/" source="CVE"/>
		<reference ref_id="CVE-2016-9066" ref_url="https://www.suse.com/security/cve/CVE-2016-9066/" source="CVE"/>
		<reference ref_id="CVE-2016-9074" ref_url="https://www.suse.com/security/cve/CVE-2016-9074/" source="CVE"/>
		<reference ref_id="CVE-2016-9079" ref_url="https://www.suse.com/security/cve/CVE-2016-9079/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002464.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, mozilla-nss fixes security issues and bugs.

The following vulnerabilities were fixed in Firefox ESR 45.5.1 (bsc#1009026 bsc#1012964):

- CVE-2016-9079: Use-after-free in SVG Animation (MFSA 2016-92  bsc#1012964)
- CVE-2016-5297: Incorrect argument length checking in Javascript (bsc#1010401)
- CVE-2016-9066: Integer overflow leading to a buffer overflow in nsScriptLoadHandler (bsc#1010404)
- CVE-2016-5296: Heap-buffer-overflow WRITE in rasterize_edges_1 (bsc#1010395)
- CVE-2016-9064: Addons update must verify IDs match between current and new versions (bsc#1010402)
- CVE-2016-5290: Memory safety bugs fixed in Firefox 50 and Firefox ESR 45.5 (bsc#1010427)
- CVE-2016-5291: Same-origin policy violation using local HTML file and saved shortcut file (bsc#1010410)

The following vulnerabilities were fixed in mozilla-nss 3.21.3:

- CVE-2016-9074: Insufficient timing side-channel resistance in divSpoiler (bsc#1010422)
- CVE-2016-5285: Missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime causes server crash (bsc#1010517)
    
The following bugs were fixed:

- Firefox would fail to go into fullscreen mode with some window managers (bsc#992549)
- font warning messages would flood console, now using fontconfig configuration from
  firefox-fontconfig instead of the system one (bsc#1000751)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-10"/>
	<updated date="2016-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000751">SUSE bug 1000751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010395">SUSE bug 1010395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010401">SUSE bug 1010401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010402">SUSE bug 1010402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010404">SUSE bug 1010404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010410">SUSE bug 1010410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010422">SUSE bug 1010422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010427">SUSE bug 1010427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010517">SUSE bug 1010517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012964">SUSE bug 1012964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992549">SUSE bug 992549</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5285/">CVE-2016-5285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5285">CVE-2016-5285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5290/">CVE-2016-5290 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5290">CVE-2016-5290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5291/">CVE-2016-5291 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5291">CVE-2016-5291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5296/">CVE-2016-5296 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5296">CVE-2016-5296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5297/">CVE-2016-5297 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5297">CVE-2016-5297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9064/">CVE-2016-9064 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9064">CVE-2016-9064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9066/">CVE-2016-9066 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9066">CVE-2016-9066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9074/">CVE-2016-9074 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9074">CVE-2016-9074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9079/">CVE-2016-9079 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9079">CVE-2016-9079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579002" comment="MozillaFirefox-45.5.1esr-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579003" comment="MozillaFirefox-translations-45.5.1esr-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579004" comment="libfreebl3-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579005" comment="libfreebl3-32bit-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579006" comment="libsoftokn3-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579007" comment="libsoftokn3-32bit-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579008" comment="mozilla-nss-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579009" comment="mozilla-nss-32bit-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579010" comment="mozilla-nss-tools-3.21.3-39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579002" comment="MozillaFirefox-45.5.1esr-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579003" comment="MozillaFirefox-translations-45.5.1esr-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579004" comment="libfreebl3-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579005" comment="libfreebl3-32bit-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579006" comment="libsoftokn3-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579007" comment="libsoftokn3-32bit-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579008" comment="mozilla-nss-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579009" comment="mozilla-nss-32bit-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579010" comment="mozilla-nss-tools-3.21.3-39.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219046" version="1" class="patch">
	<metadata>
		<title>Security update for mgetty (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1108752" ref_url="https://bugzilla.suse.com/1108752" source="BUGZILLA"/>
		<reference ref_id="1108756" ref_url="https://bugzilla.suse.com/1108756" source="BUGZILLA"/>
		<reference ref_id="1108757" ref_url="https://bugzilla.suse.com/1108757" source="BUGZILLA"/>
		<reference ref_id="1108761" ref_url="https://bugzilla.suse.com/1108761" source="BUGZILLA"/>
		<reference ref_id="1108762" ref_url="https://bugzilla.suse.com/1108762" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16741" ref_url="https://www.suse.com/security/cve/CVE-2018-16741/" source="CVE"/>
		<reference ref_id="CVE-2018-16742" ref_url="https://www.suse.com/security/cve/CVE-2018-16742/" source="CVE"/>
		<reference ref_id="CVE-2018-16743" ref_url="https://www.suse.com/security/cve/CVE-2018-16743/" source="CVE"/>
		<reference ref_id="CVE-2018-16744" ref_url="https://www.suse.com/security/cve/CVE-2018-16744/" source="CVE"/>
		<reference ref_id="CVE-2018-16745" ref_url="https://www.suse.com/security/cve/CVE-2018-16745/" source="CVE"/>
		<description>
This update for mgetty fixes the following issues:

- CVE-2018-16741: The function do_activate() did not properly sanitize shell
  metacharacters to prevent command injection (bsc#1108752)
- CVE-2018-16745: The mail_to parameter was not sanitized, leading to a buffer
  overflow if long untrusted input reached it (bsc#1108756)
- CVE-2018-16744: The mail_to parameter was not sanitized, leading to command
  injection if untrusted input reached reach it (bsc#1108757)
- CVE-2018-16742: Prevent stack-based buffer overflow that could have been
  triggered via a command-line parameter (bsc#1108762)
- CVE-2018-16743: The command-line parameter username wsa passed unsanitized to
  strcpy(), which could have caused a stack-based buffer overflow (bsc#1108761)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-25"/>
	<updated date="2018-09-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1108752">SUSE bug 1108752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108756">SUSE bug 1108756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108757">SUSE bug 1108757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108761">SUSE bug 1108761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108762">SUSE bug 1108762</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16741/">CVE-2018-16741 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16741">CVE-2018-16741 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16742/">CVE-2018-16742 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16742">CVE-2018-16742 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16743/">CVE-2018-16743 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16743">CVE-2018-16743 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16744/">CVE-2018-16744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16744">CVE-2018-16744 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16745/">CVE-2018-16745 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16745">CVE-2018-16745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572643" comment="g3utils-1.1.36-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572644" comment="mgetty-1.1.36-28.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219047" version="1" class="patch">
	<metadata>
		<title>Security update for mgetty (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1142770" ref_url="https://bugzilla.suse.com/1142770" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010190" ref_url="https://www.suse.com/security/cve/CVE-2019-1010190/" source="CVE"/>
		<description>
This update for mgetty fixes the following issues:

- CVE-2019-1010190: Fixed a denial of service which could be caused by a local attacker in putwhitespan() (bsc#1142770).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-08"/>
	<updated date="2020-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1142770">SUSE bug 1142770</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010190/">CVE-2019-1010190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010190">CVE-2019-1010190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572645" comment="g3utils-1.1.36-28.6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572646" comment="mgetty-1.1.36-28.6.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219048" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1075262" ref_url="https://bugzilla.suse.com/1075262" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003587.html" source="SUSE-SU"/>
		<description>


Update to Intel microcode version 20180108 (bsc#1075262 CVE-2017-5715)

- The pre-released microcode fixing some important security issues
  is now officially published (and included in the added tarball).

Among other updates it contains:

- IVT C0          (06-3e-04:ed) 428-&gt;42a
- SKL-U/Y D0      (06-4e-03:c0) ba-&gt;c2
- BDW-U/Y E/F     (06-3d-04:c0) 25-&gt;28
- HSW-ULT Cx/Dx   (06-45-01:72) 20-&gt;21
- Crystalwell Cx  (06-46-01:32) 17-&gt;18
- BDW-H E/G       (06-47-01:22) 17-&gt;1b
- HSX-EX E0       (06-3f-04:80) 0f-&gt;10
- SKL-H/S R0      (06-5e-03:36) ba-&gt;c2
- HSW Cx/Dx       (06-3c-03:32) 22-&gt;23
- HSX C0          (06-3f-02:6f) 3a-&gt;3b
- BDX-DE V0/V1    (06-56-02:10) 0f-&gt;14
- BDX-DE V2       (06-56-03:10) 700000d-&gt;7000011
- KBL-U/Y H0      (06-8e-09:c0) 62-&gt;80
- KBL Y0 / CFL D0 (06-8e-0a:c0) 70-&gt;80
- KBL-H/S B0      (06-9e-09:2a) 5e-&gt;80
- CFL U0          (06-9e-0a:22) 70-&gt;80
- CFL B0          (06-9e-0b:02) 72-&gt;80
- SKX H0          (06-55-04:b7) 2000035-&gt;200003c
- GLK B0          (06-7a-01:01) 1e-&gt;22
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-11"/>
	<updated date="2018-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1075262">SUSE bug 1075262</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579011" comment="microcode_ctl-1.17-102.83.9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579011" comment="microcode_ctl-1.17-102.83.9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219049" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1085207" ref_url="https://bugzilla.suse.com/1085207" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003818.html" source="SUSE-SU"/>
		<description>

  
This update for ucode-intel fixes the following issues:

The Intel CPU microcode version was updated to version 20180312.

This update enables the IBPB+IBRS based mitigations of the Spectre v2 flaws (boo#1085207 CVE-2017-5715)

- New Platforms

  - BDX-DE EGW A0 6-56-5:10 e000009
  - SKX B1 6-55-3:97 1000140

- Updates

  - SNB D2 6-2a-7:12 29-&gt;2d
  - JKT C1 6-2d-6:6d 619-&gt;61c
  - JKT C2 6-2d-7:6d 710-&gt;713
  - IVB E2 6-3a-9:12 1c-&gt;1f
  - IVT C0 6-3e-4:ed 428-&gt;42c
  - IVT D1 6-3e-7:ed 70d-&gt;713
  - HSW Cx/Dx 6-3c-3:32 22-&gt;24
  - HSW-ULT Cx/Dx 6-45-1:72 20-&gt;23
  - CRW Cx 6-46-1:32 17-&gt;19
  - HSX C0 6-3f-2:6f 3a-&gt;3c
  - HSX-EX E0 6-3f-4:80 0f-&gt;11
  - BDW-U/Y E/F 6-3d-4:c0 25-&gt;2a
  - BDW-H E/G 6-47-1:22 17-&gt;1d
  - BDX-DE V0/V1 6-56-2:10 0f-&gt;15
  - BDW-DE V2 6-56-3:10 700000d-&gt;7000012
  - BDW-DE Y0 6-56-4:10 f00000a-&gt;f000011
  - SKL-U/Y D0 6-4e-3:c0 ba-&gt;c2
  - SKL R0 6-5e-3:36 ba-&gt;c2
  - KBL-U/Y H0 6-8e-9:c0 62-&gt;84
  - KBL B0 6-9e-9:2a 5e-&gt;84
  - CFL D0 6-8e-a:c0 70-&gt;84
  - CFL U0 6-9e-a:22 70-&gt;84
  - CFL B0 6-9e-b:02 72-&gt;84
  - SKX H0 6-55-4:b7 2000035-&gt;2000043

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-16"/>
	<updated date="2018-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085207">SUSE bug 1085207</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579012" comment="microcode_ctl-1.17-102.83.15.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579012" comment="microcode_ctl-1.17-102.83.15.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219050" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1095735" ref_url="https://bugzilla.suse.com/1095735" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<description>
This update for microcode_ctl fixes the following security issue:

- CVE-2017-5715: Prevent unauthorized disclosure of information to an attacker
  with local user access caused by speculative execution and indirect branch
  prediction (bsc#1095735)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-19"/>
	<updated date="2018-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1095735">SUSE bug 1095735</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579013" comment="microcode_ctl-1.17-102.83.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219051" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087083" ref_url="https://bugzilla.suse.com/1087083" source="BUGZILLA"/>
		<reference ref_id="1100147" ref_url="https://bugzilla.suse.com/1100147" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004322.html" source="SUSE-SU"/>
		<description>

  
This update for microcode_ctl fixes the following issues:

The Intel CPU Microcode bundle was updated to the 20180703 release

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a) and
helps mitigating CVE-2018-3639 (Spectre v4)  (bsc#1100147 bsc#1087082 bsc#1087083)

More details can be found on:

  https://downloadcenter.intel.com/download/27945/Linux-Processor-Microcode-Data-File

Following chipsets are fixed in this round:

Model        Stepping F-MO-S/PI      Old-&gt;New
---- updated platforms ------------------------------------
SNB-EP       C1       6-2d-6/6d 0000061c-&gt;0000061d Xeon E5
SNB-EP       C2       6-2d-7/6d 00000713-&gt;00000714 Xeon E5
IVT          C0       6-3e-4/ed 0000042c-&gt;0000042d Xeon E5 v2; Core i7-4960X/4930K/4820K
IVT          D1       6-3e-7/ed 00000713-&gt;00000714 Xeon E5 v2
HSX-E/EP/4S  C0       6-3f-2/6f 0000003c-&gt;0000003d Xeon E5 v3
HSX-EX       E0       6-3f-4/80 00000011-&gt;00000012 Xeon E7 v3
SKX-SP/D/W/X H0       6-55-4/b7 02000043-&gt;0200004d Xeon Bronze 31xx, Silver 41xx, Gold 51xx/61xx Platinum 81xx, D/W-21xx; Core i9-7xxxX
BDX-DE       A1       6-56-5/10 0e000009-&gt;0e00000a Xeon D-15x3N
BDX-ML       B/M/R0   6-4f-1/ef 0b00002c-&gt;0b00002e Xeon E5/E7 v4; Core i7-69xx/68xx
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-26"/>
	<updated date="2018-07-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100147">SUSE bug 1100147</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3640">CVE-2018-3640 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579014" comment="microcode_ctl-1.17-102.83.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579014" comment="microcode_ctl-1.17-102.83.24.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219052" version="1" class="patch">
	<metadata>
		<title>Security update to ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087083" ref_url="https://bugzilla.suse.com/1087083" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1104134" ref_url="https://bugzilla.suse.com/1104134" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004419.html" source="SUSE-SU"/>
		<description>

ucode-intel was updated to the 20180807 release.

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a), and is part of the 
mitigations for CVE-2018-3639 (Spectre v4) and CVE-2018-3646 (L1 Terminal Fault).
(bsc#1104134 bsc#1087082 bsc#1087083 bsc#1089343)

 Processor             Identifier     Version       Products

 Model        Stepping F-MO-S/PI      Old-&gt;New

 ---- new platforms ----------------------------------------
 WSM-EP/WS    U1       6-2c-2/03           0000001f Xeon E/L/X56xx, W36xx
 NHM-EX       D0       6-2e-6/04           0000000d Xeon E/L/X65xx/75xx
 BXT          C0       6-5c-2/01           00000014 Atom T5500/5700
 APL          E0       6-5c-a/03           0000000c Atom x5-E39xx
 DVN          B0       6-5f-1/01           00000024 Atom C3xxx
 ---- updated platforms ------------------------------------
 NHM-EP/WS    D0       6-1a-5/03 00000019-&gt;0000001d Xeon E/L/X/W55xx
 NHM          B1       6-1e-5/13 00000007-&gt;0000000a Core i7-8xx, i5-7xx; Xeon L3426, X24xx
 WSM          B1       6-25-2/12 0000000e-&gt;00000011 Core i7-6xx, i5-6xx/4xxM, i3-5xx/3xxM, Pentium G69xx, Celeon P45xx; Xeon L3406
 WSM          K0       6-25-5/92 00000004-&gt;00000007 Core i7-6xx, i5-6xx/5xx/4xx, i3-5xx/3xx, Pentium G69xx/P6xxx/U5xxx, Celeron P4xxx/U3xxx
 SNB          D2       6-2a-7/12 0000002d-&gt;0000002e Core Gen2; Xeon E3
 WSM-EX       A2       6-2f-2/05 00000037-&gt;0000003b Xeon E7
 IVB          E2       6-3a-9/12 0000001f-&gt;00000020 Core Gen3 Mobile
 HSW-H/S/E3   Cx/Dx    6-3c-3/32 00000024-&gt;00000025 Core Gen4 Desktop; Xeon E3 v3
 BDW-U/Y      E/F      6-3d-4/c0 0000002a-&gt;0000002b Core Gen5 Mobile
 HSW-ULT      Cx/Dx    6-45-1/72 00000023-&gt;00000024 Core Gen4 Mobile and derived Pentium/Celeron
 HSW-H        Cx       6-46-1/32 00000019-&gt;0000001a Core Extreme i7-5xxxX
 BDW-H/E3     E/G      6-47-1/22 0000001d-&gt;0000001e Core i5-5xxxR/C, i7-5xxxHQ/EQ; Xeon E3 v4
 SKL-U/Y      D0       6-4e-3/c0 000000c2-&gt;000000c6 Core Gen6 Mobile
 BDX-DE       V1       6-56-2/10 00000015-&gt;00000017 Xeon D-1520/40
 BDX-DE       V2/3     6-56-3/10 07000012-&gt;07000013 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
 BDX-DE       Y0       6-56-4/10 0f000011-&gt;0f000012 Xeon D-1557/59/67/71/77/81/87
 APL          D0       6-5c-9/03 0000002c-&gt;00000032 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
 SKL-H/S/E3   R0       6-5e-3/36 000000c2-&gt;000000c6 Core Gen6; Xeon E3 v5
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-15"/>
	<updated date="2018-08-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104134">SUSE bug 1104134</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3640">CVE-2018-3640 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3646">CVE-2018-3646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579015" comment="microcode_ctl-1.17-102.83.27.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579015" comment="microcode_ctl-1.17-102.83.27.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219053" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<description>
This update for microcode_ctl fixes the following issues:

This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the CPU Microcode adjustments for the software mitigations.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Release notes:

- Processor             Identifier     Version       Products
- Model        Stepping F-MO-S/PI      Old-&gt;New
- ---- new platforms ----------------------------------------
- CLX-SP       B1       6-55-7/bf           05000021 Xeon Scalable Gen2
- ---- updated platforms ------------------------------------
- SNB          D2/G1/Q0 6-2a-7/12 0000002e-&gt;0000002f Core Gen2
- IVB          E1/L1    6-3a-9/12 00000020-&gt;00000021 Core Gen3
- HSW          C0       6-3c-3/32 00000025-&gt;00000027 Core Gen4
- BDW-U/Y      E0/F0    6-3d-4/c0 0000002b-&gt;0000002d Core Gen5
- IVB-E/EP     C1/M1/S1 6-3e-4/ed 0000042e-&gt;0000042f Core Gen3 X Series; Xeon E5 v2
- IVB-EX       D1       6-3e-7/ed 00000714-&gt;00000715 Xeon E7 v2
- HSX-E/EP     Cx/M1    6-3f-2/6f 00000041-&gt;00000043 Core Gen4 X series; Xeon E5 v3
- HSX-EX       E0       6-3f-4/80 00000013-&gt;00000014 Xeon E7 v3
- HSW-U        C0/D0    6-45-1/72 00000024-&gt;00000025 Core Gen4
- HSW-H        C0       6-46-1/32 0000001a-&gt;0000001b Core Gen4
- BDW-H/E3     E0/G0    6-47-1/22 0000001e-&gt;00000020 Core Gen5
- SKL-U/Y      D0/K1    6-4e-3/c0 000000c6-&gt;000000cc Core Gen6      
- SKX-SP       H0/M0/U0 6-55-4/b7 0200005a-&gt;0000005e Xeon Scalable
- SKX-D        M1       6-55-4/b7 0200005a-&gt;0000005e Xeon D-21xx
- BDX-DE       V1       6-56-2/10 00000019-&gt;0000001a Xeon D-1520/40
- BDX-DE       V2/3     6-56-3/10 07000016-&gt;07000017 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
- BDX-DE       Y0       6-56-4/10 0f000014-&gt;0f000015 Xeon D-1557/59/67/71/77/81/87
- BDX-NS       A0       6-56-5/10 0e00000c-&gt;0e00000d Xeon D-1513N/23/33/43/53
- APL          D0       6-5c-9/03 00000036-&gt;00000038 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
- SKL-H/S      R0/N0    6-5e-3/36 000000c6-&gt;000000cc Core Gen6; Xeon E3 v5
- DNV          B0       6-5f-1/01 00000024-&gt;0000002e Atom Processor C Series
- GLK          B0       6-7a-1/01 0000002c-&gt;0000002e Pentium Silver N/J5xxx, Celeron N/J4xxx
- AML-Y22      H0       6-8e-9/10 0000009e-&gt;000000b4 Core Gen8 Mobile
- KBL-U/Y      H0       6-8e-9/c0 0000009a-&gt;000000b4 Core Gen7 Mobile
- CFL-U43e     D0       6-8e-a/c0 0000009e-&gt;000000b4 Core Gen8 Mobile
- WHL-U        W0       6-8e-b/d0 000000a4-&gt;000000b8 Core Gen8 Mobile
- WHL-U        V0       6-8e-d/94 000000b2-&gt;000000b8 Core Gen8 Mobile
- KBL-G/H/S/E3 B0       6-9e-9/2a 0000009a-&gt;000000b4 Core Gen7; Xeon E3 v6
- CFL-H/S/E3   U0       6-9e-a/22 000000aa-&gt;000000b4 Core Gen8 Desktop, Mobile, Xeon E
- CFL-S        B0       6-9e-b/02 000000aa-&gt;000000b4 Core Gen8
- CFL-H/S      P0       6-9e-c/22 000000a2-&gt;000000ae Core Gen9
- CFL-H        R0       6-9e-d/22 000000b0-&gt;000000b8 Core Gen9 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579016" comment="microcode_ctl-1.17-102.83.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219054" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1141977" ref_url="https://bugzilla.suse.com/1141977" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<description>
This update for microcode_ctl fixes the following issues:

This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the CPU Microcode adjustments for the software mitigations.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Release notes:

---- updated platforms ------------------------------------
SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061d-&gt;0000061f Xeon E3/E5, Core X
SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000714-&gt;00000718 Xeon E3/E5, Core X

---- new platforms ----------------------------------------
VLV          C0       6-37-8/02           00000838 Atom Z series
VLV          C0       6-37-8/0C           00000838 Celeron N2xxx, Pentium N35xx
VLV          D0       6-37-9/0F           0000090c Atom E38xx
CHV          C0       6-4c-3/01           00000368 Atom X series
CHV          D0       6-4c-4/01           00000411 Atom X series

Readded what missing in last update:
BDX-ML       B0/M0/R0 6-4f-1/ef 0b00002e-&gt;00000036 Xeon E5/E7 v4; Core i7-69xx/68xx
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141977">SUSE bug 1141977</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579017" comment="microcode_ctl-1.17-102.83.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219055" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<description>
This update for microcode_ctl fixes the following issues:

- Updated to 20191112 security release (bsc#1155988)
  - Processor             Identifier     Version       Products
  - Model        Stepping F-MO-S/PI      Old-&gt;New
  - ---- new platforms ----------------------------------------
  - CML-U62      A0       6-a6-0/80           000000c6 Core Gen10 Mobile
  - CNL-U        D0       6-66-3/80           0000002a Core Gen8 Mobile
  - SKX-SP       B1       6-55-3/97           01000150 Xeon Scalable
  - ICL U/Y      D1       6-7e-5/80           00000046 Core Gen10 Mobile
  - ---- updated platforms ------------------------------------
  - SKL U/Y      D0       6-4e-3/c0 000000cc-&gt;000000d4 Core Gen6 Mobile
  - SKL H/S/E3   R0/N0    6-5e-3/36 000000cc-&gt;000000d4 Core Gen6
  - AML-Y22      H0       6-8e-9/10 000000b4-&gt;000000c6 Core Gen8 Mobile
  - KBL-U/Y      H0       6-8e-9/c0 000000b4-&gt;000000c6 Core Gen7 Mobile
  - CFL-U43e     D0       6-8e-a/c0 000000b4-&gt;000000c6 Core Gen8 Mobile
  - WHL-U        W0       6-8e-b/d0 000000b8-&gt;000000c6 Core Gen8 Mobile
  - AML-Y        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - CML-U42      V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - WHL-U        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen8 Mobile
  - KBL-G/X      H0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7/Gen8
  - KBL-H/S/E3   B0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7; Xeon E3 v6
  - CFL-H/S/E3   U0       6-9e-a/22 000000b4-&gt;000000c6 Core Gen8 Desktop, Mobile, Xeon E
  - CFL-S        B0       6-9e-b/02 000000b4-&gt;000000c6 Core Gen8
  - CFL-H        R0       6-9e-d/22 000000b8-&gt;000000c6 Core Gen9 Mobile
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-13"/>
	<updated date="2019-11-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11139">CVE-2019-11139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579018" comment="microcode_ctl-1.17-102.83.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219056" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<description>
This update for microcode_ctl fixes the following issues:

- Updated to 20191112 official security release (bsc#1155988)
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11139">CVE-2019-11139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579019" comment="microcode_ctl-1.17-102.83.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219057" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1154824" ref_url="https://bugzilla.suse.com/1154824" source="BUGZILLA"/>
		<reference ref_id="1156353" ref_url="https://bugzilla.suse.com/1156353" source="BUGZILLA"/>
		<reference ref_id="1172466" ref_url="https://bugzilla.suse.com/1172466" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548/" source="CVE"/>
		<reference ref_id="CVE-2020-0549" ref_url="https://www.suse.com/security/cve/CVE-2020-0549/" source="CVE"/>
		<description>
This update for microcode_ctl fixes the following issues:

Updated Intel CPU Microcode to 20200602 (prerelease) (bsc#1172466)
  
This update contains security mitigations for:

- CVE-2020-0543: Fixed a side channel attack against special registers
  which could have resulted in leaking of read values to cores other
  than the one which called it.  This attack is known as Special Register
  Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-0548,CVE-2020-0549: Additional ucode updates were supplied to
  mitigate the Vector Register and L1D Eviction Sampling aka 'CacheOutAttack'
  attacks. (bsc#1156353)

Microcode Table:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  HSW          C0       6-3c-3/32 00000027-&gt;00000028 Core Gen4
  BDW-U/Y      E0/F0    6-3d-4/c0 0000002e-&gt;0000002f Core Gen5
  HSW-U        C0/D0    6-45-1/72 00000025-&gt;00000026 Core Gen4
  HSW-H        C0       6-46-1/32 0000001b-&gt;0000001c Core Gen4
  BDW-H/E3     E0/G0    6-47-1/22 00000021-&gt;00000022 Core Gen5
  SKL-U/Y      D0       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKL-U23e     K1       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKX-SP       B1       6-55-3/97 01000151-&gt;01000157 Xeon Scalable
  SKX-SP       H0/M0/U0 6-55-4/b7 02000065-&gt;02006906 Xeon Scalable
  SKX-D        M1       6-55-4/b7 02000065-&gt;02006906 Xeon D-21xx
  CLX-SP       B0       6-55-6/bf 0400002c-&gt;04002f01 Xeon Scalable Gen2
  CLX-SP       B1       6-55-7/bf 0500002c-&gt;04002f01 Xeon Scalable Gen2
  SKL-H/S      R0/N0    6-5e-3/36 000000d6-&gt;000000dc Core Gen6; Xeon E3 v5
  AML-Y22      H0       6-8e-9/10 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-U/Y      H0       6-8e-9/c0 000000ca-&gt;000000d6 Core Gen7 Mobile
  CFL-U43e     D0       6-8e-a/c0 000000ca-&gt;000000d6 Core Gen8 Mobile
  WHL-U        W0       6-8e-b/d0 000000ca-&gt;000000d6 Core Gen8 Mobile
  AML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  CML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  WHL-U        V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-G/H/S/E3 B0       6-9e-9/2a 000000ca-&gt;000000d6 Core Gen7; Xeon E3 v6
  CFL-H/S/E3   U0       6-9e-a/22 000000ca-&gt;000000d6 Core Gen8 Desktop, Mobile, Xeon E
  CFL-S        B0       6-9e-b/02 000000ca-&gt;000000d6 Core Gen8
  CFL-H/S      P0       6-9e-c/22 000000ca-&gt;000000d6 Core Gen9
  CFL-H        R0       6-9e-d/22 000000ca-&gt;000000d6 Core Gen9 Mobile

Also contains the Intel CPU Microcode update to 20200520:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061f-&gt;00000621 Xeon E3/E5, Core X
  SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000718-&gt;0000071a Xeon E3/E5, Core X
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-10"/>
	<updated date="2020-06-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156353">SUSE bug 1156353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172466">SUSE bug 1172466</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0548">CVE-2020-0548 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0549/">CVE-2020-0549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0549">CVE-2020-0549 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579020" comment="microcode_ctl-1.17-102.83.53.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219058" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<description>
This update for microcode_ctl fixes the following issue:

- Updated Intel CPU Microcode to 20201027 prerelease (bsc#1170446)

- CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX)
- CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)

  # New Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile
  # Updated Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8698">CVE-2020-8698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579021" comment="microcode_ctl-1.17-102.83.59.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219059" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173592" ref_url="https://bugzilla.suse.com/1173592" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<description>
This update for microcode_ctl fixes the following issues:

- Updated Intel CPU Microcode to 20201110 official release.
 - CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) INTEL-SA-00389 (bsc#1170446)
 - CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)
 - CVE-2020-8696: Vector Register Sampling Active INTEL-SA-00381 (bsc#1173592)

- Release notes:
  - Security updates for [INTEL-SA-00381](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html).
  - Security updates for [INTEL-SA-00389](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html).
  - Update for functional issues. Refer to [Second Generation Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor E5 v3 Product Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e5-v3-spec-update.html?wapkw=processor+spec+update+e5) for details.
  - Update for functional issues. Refer to [10th Gen Intel? Core™ Processor Families Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-families-specification-update.html) for details.
  - Update for functional issues. Refer to [8th and 9th Gen Intel? Core™ Processor Family Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/8th-gen-core-spec-update.html) for details.
  - Update for functional issues. Refer to [7th Gen and 8th Gen (U Quad-Core) Intel? Processor Families Specification Update](https://www.intel.com/content/www/us/en/processors/core/7th-gen-core-family-spec-update.html) for details.
  - Update for functional issues. Refer to [6th Gen Intel? Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/332689) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E3-1200 v6 Processor Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e3-1200v6-spec-update.html) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E-2100 and E-2200 Processor Family Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-e-2100-specification-update.html) for details.

  ### New Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | LKF            | B2/B3    | 06-8a-01/10 |          | 00000028 | Core w/Hybrid Technology
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile

  ### Updated Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173592">SUSE bug 1173592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8696">CVE-2020-8696 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8698">CVE-2020-8698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579022" comment="microcode_ctl-1.17-102.83.62.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219060" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179833" ref_url="https://bugzilla.suse.com/1179833" source="BUGZILLA"/>
		<reference ref_id="1179836" ref_url="https://bugzilla.suse.com/1179836" source="BUGZILLA"/>
		<reference ref_id="1179837" ref_url="https://bugzilla.suse.com/1179837" source="BUGZILLA"/>
		<reference ref_id="1179839" ref_url="https://bugzilla.suse.com/1179839" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24489" ref_url="https://www.suse.com/security/cve/CVE-2020-24489/" source="CVE"/>
		<reference ref_id="CVE-2020-24511" ref_url="https://www.suse.com/security/cve/CVE-2020-24511/" source="CVE"/>
		<reference ref_id="CVE-2020-24512" ref_url="https://www.suse.com/security/cve/CVE-2020-24512/" source="CVE"/>
		<reference ref_id="CVE-2020-24513" ref_url="https://www.suse.com/security/cve/CVE-2020-24513/" source="CVE"/>
		<description>
This update for microcode_ctl fixes the following issues:

Updated to Intel CPU Microcode 20210525 release:

- CVE-2020-24513: A domain bypass transient execution vulnerability was discovered on some Intel Atom processors that use a micro-architectural incident channel. (bsc#1179833)
- CVE-2020-24511: The IBRS feature to mitigate Spectre variant 2 transient execution side channel vulnerabilities may not fully prevent non-root (guest) branches from controlling the branch predictions of the root (host) (bsc#1179836)
- CVE-2020-24512: Fixed trivial data value cache-lines such as all-zero value cache-lines may lead to changes in cache-allocation or write-back behavior for such cache-lines (bsc#1179837)
- CVE-2020-24489: Fixed Intel VT-d device pass through potential local privilege escalation (bsc#1179839)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179833">SUSE bug 1179833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179836">SUSE bug 1179836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179837">SUSE bug 1179837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179839">SUSE bug 1179839</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24489/">CVE-2020-24489 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24489">CVE-2020-24489 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24511/">CVE-2020-24511 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24511">CVE-2020-24511 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24512/">CVE-2020-24512 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24512">CVE-2020-24512 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24513/">CVE-2020-24513 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24513">CVE-2020-24513 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579023" comment="microcode_ctl-1.17-102.83.71.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219061" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192615" ref_url="https://bugzilla.suse.com/1192615" source="BUGZILLA"/>
		<reference ref_id="1195779" ref_url="https://bugzilla.suse.com/1195779" source="BUGZILLA"/>
		<reference ref_id="1195780" ref_url="https://bugzilla.suse.com/1195780" source="BUGZILLA"/>
		<reference ref_id="1195781" ref_url="https://bugzilla.suse.com/1195781" source="BUGZILLA"/>
		<reference ref_id="1198717" ref_url="https://bugzilla.suse.com/1198717" source="BUGZILLA"/>
		<reference ref_id="1199423" ref_url="https://bugzilla.suse.com/1199423" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0127" ref_url="https://www.suse.com/security/cve/CVE-2021-0127/" source="CVE"/>
		<reference ref_id="CVE-2021-0145" ref_url="https://www.suse.com/security/cve/CVE-2021-0145/" source="CVE"/>
		<reference ref_id="CVE-2021-0146" ref_url="https://www.suse.com/security/cve/CVE-2021-0146/" source="CVE"/>
		<reference ref_id="CVE-2021-33120" ref_url="https://www.suse.com/security/cve/CVE-2021-33120/" source="CVE"/>
		<reference ref_id="CVE-2022-21151" ref_url="https://www.suse.com/security/cve/CVE-2022-21151/" source="CVE"/>
		<description>
This update for microcode_ctl fixes the following issues:

Updated to Intel CPU Microcode 20220510 release. (bsc#1199423)
Updated to Intel CPU Microcode 20220419 release. (bsc#1198717)
Updated to Intel CPU Microcode 20220207 release.

- CVE-2022-21151: Processor optimization removal or modification of security-critical code for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access (bsc#1199423).
- CVE-2021-0146: Fixed a potential security vulnerability in some Intel Processors may allow escalation of privilege (bsc#1192615)
- CVE-2021-0127: Intel Processor Breakpoint Control Flow (bsc#1195779)
- CVE-2021-0145: Fast store forward predictor - Cross Domain Training (bsc#1195780)
- CVE-2021-33120: Out of bounds read for some Intel Atom processors (bsc#1195781)

- Security updates for [INTEL-SA-00528](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html)
- Security updates for [INTEL-SA-00532](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192615">SUSE bug 1192615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195779">SUSE bug 1195779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195780">SUSE bug 1195780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195781">SUSE bug 1195781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198717">SUSE bug 1198717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199423">SUSE bug 1199423</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0127/">CVE-2021-0127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0127">CVE-2021-0127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0145/">CVE-2021-0145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0145">CVE-2021-0145 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0146/">CVE-2021-0146 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0146">CVE-2021-0146 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33120/">CVE-2021-33120 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33120">CVE-2021-33120 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21151/">CVE-2022-21151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21151">CVE-2022-21151 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683760" comment="microcode_ctl-1.17-102.83.75.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219062" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1205602" ref_url="https://bugzilla.suse.com/1205602" source="BUGZILLA"/>
		<reference ref_id="1208275" ref_url="https://bugzilla.suse.com/1208275" source="BUGZILLA"/>
		<reference ref_id="1208276" ref_url="https://bugzilla.suse.com/1208276" source="BUGZILLA"/>
		<reference ref_id="1208277" ref_url="https://bugzilla.suse.com/1208277" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21216" ref_url="https://www.suse.com/security/cve/CVE-2022-21216/" source="CVE"/>
		<reference ref_id="CVE-2022-33196" ref_url="https://www.suse.com/security/cve/CVE-2022-33196/" source="CVE"/>
		<reference ref_id="CVE-2022-38090" ref_url="https://www.suse.com/security/cve/CVE-2022-38090/" source="CVE"/>
		<description>
This update for microcode_ctl fixes the following issues:

Updated to Intel CPU Microcode 20230214 release.
  
Security issues fixed:

- CVE-2022-38090: Security updates for [INTEL-SA-00767](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00767.html) (bsc#1208275)
- CVE-2022-33196: Security updates for [INTEL-SA-00738](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00738.html) (bsc#1208276)
- CVE-2022-21216: Security updates for [INTEL-SA-00700](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00700.html) (bsc#1208277)

- New Platforms:
  
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | SPR-SP         | E2       | 06-8f-05/87 |          | 2b000181 | Xeon Scalable Gen4
  | SPR-SP         | E3       | 06-8f-06/87 |          | 2b000181 | Xeon Scalable Gen4
  | SPR-SP         | E4       | 06-8f-07/87 |          | 2b000181 | Xeon Scalable Gen4
  | SPR-SP         | E5       | 06-8f-08/87 |          | 2b000181 | Xeon Scalable Gen4
  | SPR-HBM        | B3       | 06-8f-08/10 |          | 2c000170 | Xeon Max
  | RPL-P 6+8      | J0       | 06-ba-02/07 |          | 0000410e | Core Gen13
  | RPL-H 6+8      | J0       | 06-ba-02/07 |          | 0000410e | Core Gen13
  | RPL-U 2+8      | Q0       | 06-ba-02/07 |          | 0000410e | Core Gen13

- Updated Platforms:
  
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | ADL            | C0       | 06-97-02/07 | 00000026 | 0000002c | Core Gen12
  | ADL            | C0       | 06-97-05/07 | 00000026 | 0000002c | Core Gen12
  | ADL            | C0       | 06-bf-02/07 | 00000026 | 0000002c | Core Gen12
  | ADL            | C0       | 06-bf-05/07 | 00000026 | 0000002c | Core Gen12
  | ADL            | L0       | 06-9a-03/80 | 00000424 | 00000429 | Core Gen12
  | ADL            | L0       | 06-9a-04/80 | 00000424 | 00000429 | Core Gen12
  | CLX-SP         | B0       | 06-55-06/bf | 04003302 | 04003303 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05003302 | 05003303 | Xeon Scalable Gen2
  | CPX-SP         | A1       | 06-55-0b/bf | 07002501 | 07002503 | Xeon Scalable Gen3
  | GLK            | B0       | 06-7a-01/01 | 0000003c | 0000003e | Pentium Silver N/J5xxx, Celeron N/J4xxx
  | GLK-R          | R0       | 06-7a-08/01 | 00000020 | 00000022 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | ICL-D          | B0       | 06-6c-01/10 | 01000201 | 01000211 | Xeon D-17xx, D-27xx
  | ICL-U/Y        | D1       | 06-7e-05/80 | 000000b6 | 000000b8 | Core Gen10 Mobile
  | ICX-SP         | D0       | 06-6a-06/87 | 0d000375 | 0d000389 | Xeon Scalable Gen3
  | JSL            | A0/A1    | 06-9c-00/01 | 24000023 | 24000024 | Pentium N6000/N6005, Celeron N4500/N4505/N5100/N5105
  | LKF            | B2/B3    | 06-8a-01/10 | 00000031 | 00000032 | Core w/Hybrid Technology
  | RKL-S          | B0       | 06-a7-01/02 | 00000056 | 00000057 | Core Gen11
  | RPL-S          | S0       | 06-b7-01/32 | 0000010e | 00000112 | Core Gen13
  | SKX-SP         | B1       | 06-55-03/97 | 0100015e | 01000161 | Xeon Scalable
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-28"/>
	<updated date="2023-02-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205602">SUSE bug 1205602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208275">SUSE bug 1208275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208276">SUSE bug 1208276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208277">SUSE bug 1208277</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-21216/">CVE-2022-21216 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21216">CVE-2022-21216 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-33196/">CVE-2022-33196 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33196">CVE-2022-33196 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-38090/">CVE-2022-38090 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38090">CVE-2022-38090 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993643" comment="microcode_ctl-1.17-102.83.78.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219063" version="1" class="patch">
	<metadata>
		<title>Security update for minicom (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1033783" ref_url="https://bugzilla.suse.com/1033783" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7467" ref_url="https://www.suse.com/security/cve/CVE-2017-7467/" source="CVE"/>
		<description>

This update for minicom fixes the following issues:

- CVE-2017-7467: Invalid cursor coordinates and scroll regions could lead to code 
  execution (bsc#1033783)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-28"/>
	<updated date="2017-04-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033783">SUSE bug 1033783</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7467/">CVE-2017-7467 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7467">CVE-2017-7467 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572653" comment="minicom-2.3-27.24.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219064" version="1" class="patch">
	<metadata>
		<title>Security update for mokutil (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198458" ref_url="https://bugzilla.suse.com/1198458" source="BUGZILLA"/>
		<description>
This update for mokutil fixes the following issues:

- Adds SBAT revocation support to mokutil. (bsc#1198458)

New options added (see manpage):

- mokutil --sbat

  List all entries in SBAT.

- mokutil --set-sbat-policy  (latest | previous | delete)
  To set the SBAT acceptance policy.

- mokutil --list-sbat-revocations

  To list the current SBAT revocations.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-03"/>
	<updated date="2022-08-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198458">SUSE bug 1198458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993644" comment="mokutil-0.1.0-0.23.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219065" version="1" class="patch">
	<metadata>
		<title>Security update for mono-core (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="739119" ref_url="https://bugzilla.suse.com/739119" source="BUGZILLA"/>
		<reference ref_id="958097" ref_url="https://bugzilla.suse.com/958097" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2012-3543" ref_url="https://www.suse.com/security/cve/CVE-2012-3543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001830.html" source="SUSE-SU"/>
		<description>

mono-core was updated to fix the following vulnerabilities:

- CVE-2009-0689: Remote attackers could cause a denial of service and possibly arbitrary code execution through the string-to-double parser implementation (bsc#958097)
- CVE-2012-3543: Remote attackers could cause a denial of service through increased CPU consumption due to lack of protection against predictable hash collisions when processing form parameters (bsc#739119)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-27"/>
	<updated date="2016-01-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/739119">SUSE bug 739119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958097">SUSE bug 958097</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0689">CVE-2009-0689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3543/">CVE-2012-3543 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-3543">CVE-2012-3543 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993645" comment="mono-core-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993646" comment="mono-data-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993647" comment="mono-data-postgresql-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993648" comment="mono-data-sqlite-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993649" comment="mono-locale-extras-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993650" comment="mono-nunit-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993651" comment="mono-web-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993652" comment="mono-winforms-2.6.7-0.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993645" comment="mono-core-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993646" comment="mono-data-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993647" comment="mono-data-postgresql-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993648" comment="mono-data-sqlite-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993649" comment="mono-locale-extras-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993650" comment="mono-nunit-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993651" comment="mono-web-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993652" comment="mono-winforms-2.6.7-0.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993645" comment="mono-core-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993646" comment="mono-data-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993647" comment="mono-data-postgresql-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993648" comment="mono-data-sqlite-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993649" comment="mono-locale-extras-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993650" comment="mono-nunit-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993651" comment="mono-web-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993652" comment="mono-winforms-2.6.7-0.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219066" version="1" class="patch">
	<metadata>
		<title>Security update for mono-core (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="739119" ref_url="https://bugzilla.suse.com/739119" source="BUGZILLA"/>
		<reference ref_id="958097" ref_url="https://bugzilla.suse.com/958097" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2012-3543" ref_url="https://www.suse.com/security/cve/CVE-2012-3543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002433.html" source="SUSE-SU"/>
		<description>

mono-core was updated to fix the following vulnerabilities:

- CVE-2009-0689: Remote attackers could cause a denial of service and possibly arbitrary
  code execution through the string-to-double parser implementation. (bsc#958097)
- CVE-2012-3543: Remote attackers could cause a denial of service through increased CPU
  consumption due to lack of protection against predictable hash collisions when processing
  form parameters. (bsc#739119)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-01"/>
	<updated date="2016-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/739119">SUSE bug 739119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958097">SUSE bug 958097</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0689">CVE-2009-0689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3543/">CVE-2012-3543 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-3543">CVE-2012-3543 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579032" comment="mono-core-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579033" comment="mono-data-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579034" comment="mono-data-postgresql-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579035" comment="mono-data-sqlite-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579036" comment="mono-locale-extras-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579037" comment="mono-nunit-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579038" comment="mono-web-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579039" comment="mono-winforms-2.6.7-0.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579032" comment="mono-core-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579033" comment="mono-data-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579034" comment="mono-data-postgresql-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579035" comment="mono-data-sqlite-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579036" comment="mono-locale-extras-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579037" comment="mono-nunit-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579038" comment="mono-web-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579039" comment="mono-winforms-2.6.7-0.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219067" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLED, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="954447" ref_url="https://bugzilla.suse.com/954447" source="BUGZILLA"/>
		<reference ref_id="963520" ref_url="https://bugzilla.suse.com/963520" source="BUGZILLA"/>
		<reference ref_id="963632" ref_url="https://bugzilla.suse.com/963632" source="BUGZILLA"/>
		<reference ref_id="963635" ref_url="https://bugzilla.suse.com/963635" source="BUGZILLA"/>
		<reference ref_id="963731" ref_url="https://bugzilla.suse.com/963731" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<reference ref_id="CVE-2016-1938" ref_url="https://www.suse.com/security/cve/CVE-2016-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001842.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nss fixes the following issues: (bsc#963520)

Mozilla Firefox was updated to 38.6.0 ESR.
Mozilla NSS was updated to 3.20.2.

The following vulnerabilities were fixed:

- CVE-2016-1930: Memory safety bugs fixed in Firefox ESR 38.6 (bsc#963632)
- CVE-2016-1935: Buffer overflow in WebGL after out of memory allocation (bsc#963635)
- CVE-2016-1938: Calculations with mp_div and mp_exptmod in Network Security Services (NSS) canproduce wrong results (bsc#963731)

The following improvements were added:

- bsc#954447: Mozilla NSS now supports a number of new DHE ciphersuites
- Tracking protection is now enabled by default
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-04"/>
	<updated date="2016-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/954447">SUSE bug 954447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963520">SUSE bug 963520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963632">SUSE bug 963632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963635">SUSE bug 963635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963731">SUSE bug 963731</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1930">CVE-2016-1930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1935">CVE-2016-1935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1938/">CVE-2016-1938 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1938">CVE-2016-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579040" comment="MozillaFirefox-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579041" comment="MozillaFirefox-branding-SLED-38-18.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579042" comment="MozillaFirefox-translations-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579043" comment="libfreebl3-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579044" comment="libfreebl3-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579045" comment="libfreebl3-x86-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579046" comment="libsoftokn3-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579047" comment="libsoftokn3-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579048" comment="libsoftokn3-x86-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579049" comment="mozilla-nss-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579050" comment="mozilla-nss-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579051" comment="mozilla-nss-tools-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579052" comment="mozilla-nss-x86-3.20.2-25.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579040" comment="MozillaFirefox-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579041" comment="MozillaFirefox-branding-SLED-38-18.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579042" comment="MozillaFirefox-translations-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579043" comment="libfreebl3-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579044" comment="libfreebl3-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579045" comment="libfreebl3-x86-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579046" comment="libsoftokn3-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579047" comment="libsoftokn3-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579048" comment="libsoftokn3-x86-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579049" comment="mozilla-nss-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579050" comment="mozilla-nss-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579051" comment="mozilla-nss-tools-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579052" comment="mozilla-nss-x86-3.20.2-25.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579040" comment="MozillaFirefox-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579041" comment="MozillaFirefox-branding-SLED-38-18.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579042" comment="MozillaFirefox-translations-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579043" comment="libfreebl3-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579044" comment="libfreebl3-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579045" comment="libfreebl3-x86-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579046" comment="libsoftokn3-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579047" comment="libsoftokn3-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579048" comment="libsoftokn3-x86-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579049" comment="mozilla-nss-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579050" comment="mozilla-nss-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579051" comment="mozilla-nss-tools-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579052" comment="mozilla-nss-x86-3.20.2-25.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219068" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2015:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001554.html" source="SUSE-SU"/>
		<description>
mozilla-nspr was update to version 4.10.8		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-14"/>
	<updated date="2015-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579053" comment="mozilla-nspr-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579054" comment="mozilla-nspr-32bit-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579055" comment="mozilla-nspr-x86-4.10.8-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579053" comment="mozilla-nspr-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579054" comment="mozilla-nspr-32bit-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579055" comment="mozilla-nspr-x86-4.10.8-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579053" comment="mozilla-nspr-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579054" comment="mozilla-nspr-32bit-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579055" comment="mozilla-nspr-x86-4.10.8-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219069" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1191546" ref_url="https://bugzilla.suse.com/1191546" source="BUGZILLA"/>
		<reference ref_id="1192079" ref_url="https://bugzilla.suse.com/1192079" source="BUGZILLA"/>
		<reference ref_id="1192080" ref_url="https://bugzilla.suse.com/1192080" source="BUGZILLA"/>
		<reference ref_id="1192086" ref_url="https://bugzilla.suse.com/1192086" source="BUGZILLA"/>
		<reference ref_id="1192087" ref_url="https://bugzilla.suse.com/1192087" source="BUGZILLA"/>
		<reference ref_id="1192228" ref_url="https://bugzilla.suse.com/1192228" source="BUGZILLA"/>
		<reference ref_id="1193170" ref_url="https://bugzilla.suse.com/1193170" source="BUGZILLA"/>
		<reference ref_id="1195040" ref_url="https://bugzilla.suse.com/1195040" source="BUGZILLA"/>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="1198486" ref_url="https://bugzilla.suse.com/1198486" source="BUGZILLA"/>
		<reference ref_id="1198980" ref_url="https://bugzilla.suse.com/1198980" source="BUGZILLA"/>
		<reference ref_id="1200027" ref_url="https://bugzilla.suse.com/1200027" source="BUGZILLA"/>
		<reference ref_id="1200325" ref_url="https://bugzilla.suse.com/1200325" source="BUGZILLA"/>
		<reference ref_id="1201298" ref_url="https://bugzilla.suse.com/1201298" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nspr was updated to version 4.34:

* add an API that returns a preferred loopback IP on hosts that have two IP stacks available.

mozilla-nss was updated:

FIPS 140-3 enablement patches were integrated from the SUSE Linux Enterprise 15 variant.

- Add on-demand integrity tests through sftk_FIPSRepeatIntegrityCheck()
  (bsc#1198980).
- Mark algorithms as approved/non-approved according to security policy
  (bsc#1191546, bsc#1201298).
- Remove hard disabling of unapproved algorithms. This requirement is now
  fulfilled by the service level indicator (bsc#1200325).

Version update to NSS 3.79:

- Use PK11_GetSlotInfo instead of raw C_GetSlotInfo calls.
- Use of uninitialized pointer in lg_init after alloc fail.
- selfserv and tstclnt should use PR_GetPrefLoopbackAddrInfo.
- Add SECMOD_LockedModuleHasRemovableSlots.
- Fix secasn1d parsing of indefinite SEQUENCE inside indefinite GROUP.
- Added RFC8422 compliant TLS &lt;= 1.2 undefined/compressed ECPointFormat extension alerts.
- TLS 1.3 Server: Send protocol_version alert on unsupported ClientHello.legacy_version.
- Correct invalid record inner and outer content type alerts.
- NSS does not properly import or export pkcs12 files with large passwords and pkcs5v2 encoding.
- improve error handling after nssCKFWInstance_CreateObjectHandle.
- Initialize pointers passed to NSS_CMSDigestContext_FinishMultiple.
- NSS 3.79 should depend on NSPR 4.34   

Version update to NSS 3.78.1
- Initialize pointers passed to NSS_CMSDigestContext_FinishMultiple

Version update to NSS 3.78:

- Added TLS 1.3 zero-length inner plaintext checks and tests, zero-length record/fragment handling tests.
- Reworked overlong record size checks and added TLS1.3 specific boundaries.
- Add ECH Grease Support to tstclnt
- Add a strict variant of moz::pkix::CheckCertHostname.
- Change SSL_REUSE_SERVER_ECDHE_KEY default to false.
- Make SEC_PKCS12EnableCipher succeed

Version update to NSS 3.77:

- resolve mpitests build failure on Windows.
- Fix link to TLS page on wireshark wiki
- Add two D-TRUST 2020 root certificates.
- Add Telia Root CA v2 root certificate.
- Remove expired explicitly distrusted certificates from certdata.txt.
- support specific RSA-PSS parameters in mozilla::pkix
- Remove obsolete stateEnd check in SEC_ASN1DecoderUpdate.
- Remove token member from NSSSlot struct.
- Provide secure variants of mpp_pprime and mpp_make_prime.
- Support UTF-8 library path in the module spec string.
- Update nssUTF8_Length to RFC 3629 and fix buffer overrun.
- Add a CI Target for gcc-11.
- Change to makefiles for gcc-4.8.
- Update googletest to 1.11.0
- Add SetTls13GreaseEchSize to experimental API.
- TLS 1.3 Illegal legacy_version handling/alerts.
- Fix calculation of ECH HRR Transcript.
- Allow ld path to be set as environment variable.
- Ensure we don't read uninitialized memory in ssl gtests.
- Fix DataBuffer Move Assignment.
- internal_error alert on Certificate Request with sha1+ecdsa in TLS 1.3
- rework signature verification in mozilla::pkix

Version update to NSS 3.76.1:

- Remove token member from NSSSlot struct.

Version update to NSS 3.76:

- Hold tokensLock through nssToken_GetSlot calls in nssTrustDomain_GetActiveSlots.
- Check return value of PK11Slot_GetNSSToken.
- Use Wycheproof JSON for RSASSA-PSS
- Add SHA256 fingerprint comments to old certdata.txt entries.
- Avoid truncating files in nss-release-helper.py.
- Throw illegal_parameter alert for illegal extensions in handshake message.

Version update to NSS 3.75:

- This patch adds gcc-9 and gcc-10 to the CI.
- Make DottedOIDToCode.py compatible with python3.
- Avoid undefined shift in SSL_CERT_IS while fuzzing.
- Remove redundant key type check.
- Update ABI expectations to match ECH changes.
- Enable CKM_CHACHA20.
- check return on NSS_NoDB_Init and NSS_Shutdown.
- real move assignment operator.
- Run ECDSA test vectors from bltest as part of the CI tests.
- Add ECDSA test vectors to the bltest command line tool.
- Allow to build using clang's integrated assembler.
- Allow to override python for the build.
- test HKDF output rather than input.
- Use ASSERT macros to end failed tests early.
- move assignment operator for DataBuffer.
- Add test cases for ECH compression and unexpected extensions in SH.
- Update tests for ECH-13.
- Tidy up error handling.
- Add tests for ECH HRR Changes.
- Server only sends GREASE HRR extension if enabled by preference.
- Update generation of the Associated Data for ECH-13.
- When ECH is accepted, reject extensions which were only advertised in the Outer Client Hello.
- Allow for compressed, non-contiguous, extensions.
- Scramble the PSK extension in CHOuter.
- Split custom extension handling for ECH.
- Add ECH-13 HRR Handling.
- Client side ECH padding.
- Stricter ClientHelloInner Decompression.
- Remove ECH_inner extension, use new enum format.
- Update the version number for ECH-13 and adjust the ECHConfig size.

Version update to NSS 3.74:

- mozilla::pkix: support SHA-2 hashes in CertIDs in OCSP responses
- Ensure clients offer consistent ciphersuites after HRR
- NSS does not properly restrict server keys based on policy
- Set nssckbi version number to 2.54
- Replace Google Trust Services LLC (GTS) R4 root certificate
- Replace Google Trust Services LLC (GTS) R3 root certificate
- Replace Google Trust Services LLC (GTS) R2 root certificate
- Replace Google Trust Services LLC (GTS) R1 root certificate
- Replace GlobalSign ECC Root CA R4
- Remove Expired Root Certificates - DST Root CA X3
- Remove Expiring Cybertrust Global Root and GlobalSign root certificates
- Add renewed Autoridad de Certificacion Firmaprofesional CIF A62634068 root certificate
- Add iTrusChina ECC root certificate
- Add iTrusChina RSA root certificate
- Add ISRG Root X2 root certificate
- Add Chunghwa Telecom's HiPKI Root CA - G1 root certificate
- Avoid a clang 13 unused variable warning in opt build
- Check for missing signedData field
- Ensure DER encoded signatures are within size limits

- enable key logging option (bsc#1195040)

Version update to NSS 3.73.1:

- Add SHA-2 support to mozilla::pkix's OSCP implementation

Version update to NSS 3.73:

- check for missing signedData field.
- Ensure DER encoded signatures are within size limits.
- NSS needs FiPS 140-3 version indicators.
- pkix_CacheCert_Lookup doesn't return cached certs
- sunset Coverity from NSS

- MFSA 2021-51 (bsc#1193170) * CVE-2021-43527 (bmo#1737470): Fixed Memory corruption via DER-encoded DSA and RSA-PSS signatures

Version update to NSS 3.72:

- Remove newline at the end of coreconf.dep
- Fix nsinstall parallel failure.
- Increase KDF cache size to mitigate perf regression in about:logins

Version update to NSS 3.71:

- Set nssckbi version number to 2.52.
- Respect server requirements of tlsfuzzer/test-tls13-signature-algorithms.py
- Import of PKCS#12 files with Camellia encryption is not supported
- Add HARICA Client ECC Root CA 2021.
- Add HARICA Client RSA Root CA 2021.
- Add HARICA TLS ECC Root CA 2021.
- Add HARICA TLS RSA Root CA 2021.
- Add TunTrust Root CA certificate to NSS.

Version update to NSS 3.70:

- Update test case to verify fix.
- Explicitly disable downgrade check in TlsConnectStreamTls13.EchOuterWith12Max
- Explicitly disable downgrade check in TlsConnectTest.DisableFalseStartOnFallback
- Avoid using a lookup table in nssb64d.
- Use HW accelerated SHA2 on AArch64 Big Endian.
- Change default value of enableHelloDowngradeCheck to true.
- Cache additional PBE entries.
- Read HPKE vectors from official JSON.

Version update to NSS 3.69.1:

- Disable DTLS 1.0 and 1.1 by default
- integrity checks in key4.db not happening on private components with AES_CBC

Version update to NSS 3.69:

- Disable DTLS 1.0 and 1.1 by default (backed out again)
- integrity checks in key4.db not happening on private components with AES_CBC (backed out again)
- SSL handling of signature algorithms ignores environmental invalid algorithms.
- sqlite 3.34 changed it's open semantics, causing nss failures.
- Gtest update changed the gtest reports, losing gtest details in all.sh reports.
- NSS incorrectly accepting 1536 bit DH primes in FIPS mode
- SQLite calls could timeout in starvation situations.
- Coverity/cpp scanner errors found in nss 3.67
- Import the NSS documentation from MDN in nss/doc.
- NSS using a tempdir to measure sql performance not active

Version update to NSS 3.68.4 (bsc#1200027)

- Initialize pointers passed to NSS_CMSDigestContext_FinishMultiple.  (bmo#1767590)
- FIPS: scan LD_LIBRARY_PATH for external libraries to be checksummed.
- Run test suite at build time, and make it pass (bsc#1198486).
- FIPS: skip algorithms that are hard disabled in FIPS mode.
- prevent expired PayPalEE cert from failing the tests.
- Enable FIPS during test certificate creation and disables the library checksum
  validation during same.
- FIPS: allow checksumming to be disabled, but only if we entered FIPS mode
  due to NSS_FIPS being set, not if it came from /proc.

- FIPS: Make the PBKDF known answer test compliant with NIST SP800-132. (bsc#1192079). 

Mozilla NSS 3.68.3 (bsc#1197903)

- This release improves the stability of NSS when used in a multi-threaded 
  environment. In particular, it fixes memory safety violations that 
  can occur when PKCS#11 tokens are removed while in use (CVE-2022-1097). 
  We presume that with enough effort these memory safety violations are exploitable.
- Remove token member from NSSSlot struct (bmo#1756271).
- Hold tokensLock through nssToken_GetSlot calls in nssTrustDomain_GetActiveSlots (bmo#1755555).
- Check return value of PK11Slot_GetNSSToken (bmo#1370866).

- Update FIPS validation string to version-release format.
- FIPS: Remove XCBC MAC from list of FIPS approved algorithms.
- Enable NSS_ENABLE_FIPS_INDICATORS and set NSS_FIPS_MODULE_ID
  for build.
- FIPS: Claim 3DES unapproved in FIPS mode (bsc#1192080).
- FIPS: allow testing of unapproved algorithms (bsc#1192228).
- This adds FIPS version indicators. (bmo#1729550, bsc#1192086).
- FIPS: Add FIPS 180-3 CSP clearing (bmo#1697303, bsc#1192087).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-22"/>
	<updated date="2022-07-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191546">SUSE bug 1191546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192079">SUSE bug 1192079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192080">SUSE bug 1192080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192086">SUSE bug 1192086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192087">SUSE bug 1192087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192228">SUSE bug 1192228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193170">SUSE bug 1193170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195040">SUSE bug 1195040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198486">SUSE bug 1198486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198980">SUSE bug 1198980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200325">SUSE bug 1200325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201298">SUSE bug 1201298</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1097">CVE-2022-1097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993653" comment="libfreebl3-3.79-47.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993654" comment="libfreebl3-32bit-3.79-47.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993655" comment="libsoftokn3-3.79-47.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993656" comment="libsoftokn3-32bit-3.79-47.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993657" comment="mozilla-nspr-4.34-33.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993658" comment="mozilla-nspr-32bit-4.34-33.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993659" comment="mozilla-nss-3.79-47.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993660" comment="mozilla-nss-32bit-3.79-47.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993661" comment="mozilla-nss-certs-3.79-47.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993662" comment="mozilla-nss-certs-32bit-3.79-47.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993663" comment="mozilla-nss-tools-3.79-47.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219070" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="959888" ref_url="https://bugzilla.suse.com/959888" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001818.html" source="SUSE-SU"/>
		<description>
This update contains mozilla-nss 3.19.2.2 and fixes the following security issue:

   - CVE-2015-7575: MD5 signatures accepted within TLS 1.2 ServerKeyExchange in server signature (bsc#959888)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959888">SUSE bug 959888</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579056" comment="libfreebl3-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579057" comment="libfreebl3-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579058" comment="libfreebl3-x86-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579059" comment="libsoftokn3-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579060" comment="libsoftokn3-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579061" comment="libsoftokn3-x86-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579062" comment="mozilla-nss-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579063" comment="mozilla-nss-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579064" comment="mozilla-nss-tools-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579065" comment="mozilla-nss-x86-3.19.2.2-22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579056" comment="libfreebl3-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579057" comment="libfreebl3-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579058" comment="libfreebl3-x86-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579059" comment="libsoftokn3-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579060" comment="libsoftokn3-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579061" comment="libsoftokn3-x86-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579062" comment="mozilla-nss-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579063" comment="mozilla-nss-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579064" comment="mozilla-nss-tools-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579065" comment="mozilla-nss-x86-3.19.2.2-22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579056" comment="libfreebl3-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579057" comment="libfreebl3-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579058" comment="libfreebl3-x86-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579059" comment="libsoftokn3-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579060" comment="libsoftokn3-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579061" comment="libsoftokn3-x86-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579062" comment="mozilla-nss-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579063" comment="mozilla-nss-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579064" comment="mozilla-nss-tools-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579065" comment="mozilla-nss-x86-3.19.2.2-22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219071" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1193170" ref_url="https://bugzilla.suse.com/1193170" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<description>
This update for mozilla-nss fixes the following issues:

Update to version 3.68.1:

- CVE-2021-43527: Fixed a Heap overflow in NSS when verifying DER-encoded DSA or RSA-PSS signatures (bsc#1193170).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193170">SUSE bug 1193170</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659172" comment="libfreebl3-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659173" comment="libfreebl3-32bit-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659174" comment="libsoftokn3-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659175" comment="libsoftokn3-32bit-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659176" comment="mozilla-nss-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659177" comment="mozilla-nss-32bit-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659178" comment="mozilla-nss-certs-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659179" comment="mozilla-nss-certs-32bit-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659180" comment="mozilla-nss-tools-3.68.1-47.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219072" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<description>
This update for mozilla-nss fixes the following issues:

Mozilla NSS 3.68.3 (bsc#1197903):
  - CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11
    tokens are removed while in use.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-05"/>
	<updated date="2022-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1097">CVE-2022-1097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678408" comment="libfreebl3-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678409" comment="libfreebl3-32bit-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678410" comment="libsoftokn3-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678411" comment="libsoftokn3-32bit-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678412" comment="mozilla-nss-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678413" comment="mozilla-nss-32bit-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678414" comment="mozilla-nss-certs-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678415" comment="mozilla-nss-certs-32bit-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678416" comment="mozilla-nss-tools-3.68.3-47.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219073" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1200027" ref_url="https://bugzilla.suse.com/1200027" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741/" source="CVE"/>
		<description>
This update for mozilla-nss fixes the following issues:

Mozilla NSS 3.68.4 (bsc#1200027)

* CVE-2022-31741: Initialize pointers passed to NSS_CMSDigestContext_FinishMultiple.  (bmo#1767590)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-06"/>
	<updated date="2022-06-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31741">CVE-2022-31741 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993664" comment="libfreebl3-3.68.4-47.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993665" comment="libfreebl3-32bit-3.68.4-47.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993666" comment="libsoftokn3-3.68.4-47.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993667" comment="libsoftokn3-32bit-3.68.4-47.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993668" comment="mozilla-nss-3.68.4-47.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993669" comment="mozilla-nss-32bit-3.68.4-47.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993670" comment="mozilla-nss-certs-3.68.4-47.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993671" comment="mozilla-nss-certs-32bit-3.68.4-47.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993672" comment="mozilla-nss-tools-3.68.4-47.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219074" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204272" ref_url="https://bugzilla.suse.com/1204272" source="BUGZILLA"/>
		<reference ref_id="1207038" ref_url="https://bugzilla.suse.com/1207038" source="BUGZILLA"/>
		<reference ref_id="1207119" ref_url="https://bugzilla.suse.com/1207119" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23491" ref_url="https://www.suse.com/security/cve/CVE-2022-23491/" source="CVE"/>
		<reference ref_id="CVE-2022-3479" ref_url="https://www.suse.com/security/cve/CVE-2022-3479/" source="CVE"/>
		<reference ref_id="CVE-2022-46871" ref_url="https://www.suse.com/security/cve/CVE-2022-46871/" source="CVE"/>
		<reference ref_id="CVE-2022-46877" ref_url="https://www.suse.com/security/cve/CVE-2022-46877/" source="CVE"/>
		<reference ref_id="CVE-2023-23598" ref_url="https://www.suse.com/security/cve/CVE-2023-23598/" source="CVE"/>
		<reference ref_id="CVE-2023-23601" ref_url="https://www.suse.com/security/cve/CVE-2023-23601/" source="CVE"/>
		<reference ref_id="CVE-2023-23602" ref_url="https://www.suse.com/security/cve/CVE-2023-23602/" source="CVE"/>
		<reference ref_id="CVE-2023-23603" ref_url="https://www.suse.com/security/cve/CVE-2023-23603/" source="CVE"/>
		<reference ref_id="CVE-2023-23605" ref_url="https://www.suse.com/security/cve/CVE-2023-23605/" source="CVE"/>
		<description>
This update for mozilla-nss fixes the following issues:

- CVE-2022-3479: Fixed a potential crash that could be triggered when
  a server requested a client authentication certificate, but the
  client had no certificates stored (bsc#1204272).
- Updated to version 3.79.3 (bsc#1207038):
  - CVE-2022-23491: Removed trust for 3 root certificates from TrustCor.

This update fixes the following MozillaFirefox issues:

- Updated to version 102.7.0 ESR (bsc#1207119):
  - CVE-2022-46871: Updated an out of date library (libusrsctp) which
    contained several vulnerabilities.
  - CVE-2023-23598: Fixed an arbitrary file read from GTK drag and
    drop on Linux.
  - CVE-2023-23601: Fixed a potential spoofing attack when dragging a
    URL from a cross-origin iframe into the same tab.
  - CVE-2023-23602: Fixed a mishandled security check, which caused
    the Content Security Policy header to be ignored for WebSockets
    in WebWorkers.
  - CVE-2022-46877: Fixed a fullscreen notification bypass which
    could be leveraged in spoofing attacks.
  - CVE-2023-23603: Fixed a Content Security Policy bypass via format
    directives.
  - CVE-2023-23605: Fixed several memory safety bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-17"/>
	<updated date="2023-01-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204272">SUSE bug 1204272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207038">SUSE bug 1207038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207119">SUSE bug 1207119</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23491/">CVE-2022-23491 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23491">CVE-2022-23491 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3479/">CVE-2022-3479 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3479">CVE-2022-3479 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46871/">CVE-2022-46871 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46871">CVE-2022-46871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46877/">CVE-2022-46877 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46877">CVE-2022-46877 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23598/">CVE-2023-23598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23598">CVE-2023-23598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23601/">CVE-2023-23601 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23601">CVE-2023-23601 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23602/">CVE-2023-23602 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23602">CVE-2023-23602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23603/">CVE-2023-23603 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23603">CVE-2023-23603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23605/">CVE-2023-23605 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23605">CVE-2023-23605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993673" comment="MozillaFirefox-102.7.0-72.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993674" comment="MozillaFirefox-translations-common-102.7.0-72.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993675" comment="MozillaFirefox-translations-other-102.7.0-72.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993676" comment="libfreebl3-3.79.3-47.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993677" comment="libfreebl3-32bit-3.79.3-47.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993678" comment="libsoftokn3-3.79.3-47.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993679" comment="libsoftokn3-32bit-3.79.3-47.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993680" comment="mozilla-nss-3.79.3-47.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993681" comment="mozilla-nss-32bit-3.79.3-47.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993682" comment="mozilla-nss-certs-3.79.3-47.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993683" comment="mozilla-nss-certs-32bit-3.79.3-47.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993684" comment="mozilla-nss-tools-3.79.3-47.45.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219075" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208138" ref_url="https://bugzilla.suse.com/1208138" source="BUGZILLA"/>
		<reference ref_id="1208144" ref_url="https://bugzilla.suse.com/1208144" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0767" ref_url="https://www.suse.com/security/cve/CVE-2023-0767/" source="CVE"/>
		<reference ref_id="CVE-2023-25728" ref_url="https://www.suse.com/security/cve/CVE-2023-25728/" source="CVE"/>
		<reference ref_id="CVE-2023-25729" ref_url="https://www.suse.com/security/cve/CVE-2023-25729/" source="CVE"/>
		<reference ref_id="CVE-2023-25730" ref_url="https://www.suse.com/security/cve/CVE-2023-25730/" source="CVE"/>
		<reference ref_id="CVE-2023-25732" ref_url="https://www.suse.com/security/cve/CVE-2023-25732/" source="CVE"/>
		<reference ref_id="CVE-2023-25734" ref_url="https://www.suse.com/security/cve/CVE-2023-25734/" source="CVE"/>
		<reference ref_id="CVE-2023-25735" ref_url="https://www.suse.com/security/cve/CVE-2023-25735/" source="CVE"/>
		<reference ref_id="CVE-2023-25737" ref_url="https://www.suse.com/security/cve/CVE-2023-25737/" source="CVE"/>
		<reference ref_id="CVE-2023-25738" ref_url="https://www.suse.com/security/cve/CVE-2023-25738/" source="CVE"/>
		<reference ref_id="CVE-2023-25739" ref_url="https://www.suse.com/security/cve/CVE-2023-25739/" source="CVE"/>
		<reference ref_id="CVE-2023-25742" ref_url="https://www.suse.com/security/cve/CVE-2023-25742/" source="CVE"/>
		<reference ref_id="CVE-2023-25743" ref_url="https://www.suse.com/security/cve/CVE-2023-25743/" source="CVE"/>
		<reference ref_id="CVE-2023-25744" ref_url="https://www.suse.com/security/cve/CVE-2023-25744/" source="CVE"/>
		<reference ref_id="CVE-2023-25746" ref_url="https://www.suse.com/security/cve/CVE-2023-25746/" source="CVE"/>
		<description>
This update for mozilla-nss fixes the following issues:

  Updated NSS to version 3.79.4 (bsc#1208138):

  - CVE-2023-0767: Fixed handling of unknown PKCS#12 safe bag types.

  Updated to version 102.8.0 ESR (bsc#1208144):

  - CVE-2023-25728: Fixed content security policy leak in violation reports using iframes.
  - CVE-2023-25730: Fixed screen hijack via browser fullscreen mode.
  - CVE-2023-25743: Fixed Fullscreen notification not being shown in Firefox Focus.
  - CVE-2023-0767: Fixed arbitrary memory write via PKCS 12 in NSS.
  - CVE-2023-25735: Fixed potential use-after-free from compartment mismatch in SpiderMonkey.
  - CVE-2023-25737: Fixed invalid downcast in SVGUtils::SetupStrokeGeometry.
  - CVE-2023-25738: Fixed printing on Windows which could potentially crash Firefox with some device drivers.
  - CVE-2023-25739: Fixed use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext.
  - CVE-2023-25729: Fixed extensions opening external schemes without user knowledge.
  - CVE-2023-25732: Fixed out of bounds memory write from EncodeInputStream.
  - CVE-2023-25734: Fixed opening local .url files that causes unexpected network loads.
  - CVE-2023-25742: Fixed tab crash by Web Crypto ImportKey.
  - CVE-2023-25744: Fixed Memory safety bugs.
  - CVE-2023-25746: Fixed Memory safety bugs.

		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-16"/>
	<updated date="2023-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208138">SUSE bug 1208138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208144">SUSE bug 1208144</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0767/">CVE-2023-0767 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0767">CVE-2023-0767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25728/">CVE-2023-25728 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25728">CVE-2023-25728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25729/">CVE-2023-25729 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25729">CVE-2023-25729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25730/">CVE-2023-25730 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25730">CVE-2023-25730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25732/">CVE-2023-25732 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25732">CVE-2023-25732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25734/">CVE-2023-25734 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25734">CVE-2023-25734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25735/">CVE-2023-25735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25735">CVE-2023-25735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25737/">CVE-2023-25737 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25737">CVE-2023-25737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25738/">CVE-2023-25738 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25738">CVE-2023-25738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25739/">CVE-2023-25739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25739">CVE-2023-25739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25742/">CVE-2023-25742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25742">CVE-2023-25742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25743/">CVE-2023-25743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25743">CVE-2023-25743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25744/">CVE-2023-25744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25744">CVE-2023-25744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25746/">CVE-2023-25746 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25746">CVE-2023-25746 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993685" comment="MozillaFirefox-102.8.0-72.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993686" comment="MozillaFirefox-translations-common-102.8.0-72.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993687" comment="MozillaFirefox-translations-other-102.8.0-72.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993688" comment="libfreebl3-3.79.4-47.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993689" comment="libfreebl3-32bit-3.79.4-47.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993690" comment="libsoftokn3-3.79.4-47.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993691" comment="libsoftokn3-32bit-3.79.4-47.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993692" comment="mozilla-nss-3.79.4-47.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993693" comment="mozilla-nss-32bit-3.79.4-47.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993694" comment="mozilla-nss-certs-3.79.4-47.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993695" comment="mozilla-nss-certs-32bit-3.79.4-47.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993696" comment="mozilla-nss-tools-3.79.4-47.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219076" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla NSS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="847708" ref_url="https://bugzilla.suse.com/847708" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<description>

Mozilla NSS has been updated to 3.15.2 (bnc#847708) bringing various 
features and bugfixes:

The main feature is TLS 1.2 support and its dependent algorithms.

    * Support for AES-GCM ciphersuites that use the SHA-256 PRF
    * MD2, MD4, and MD5 signatures are no longer accepted for OCSP or CRLs
    * Add PK11_CipherFinal macro
    * sizeof() used incorrectly
    * nssutil_ReadSecmodDB() leaks memory
    * Allow SSL_HandshakeNegotiatedExtension to be called before the
      handshake is finished.
    * Deprecate the SSL cipher policy code
    * Avoid uninitialized data read in the event of a decryption failure.
      (CVE-2013-1739)

Changes coming with version 3.15.1:

    * TLS 1.2 (RFC 5246) is supported. HMAC-SHA256 cipher suites (RFC 5246
      and RFC 5289) are supported, allowing TLS to be used without MD5 and
      SHA-1.
      Note the following limitations:
      The hash function used in the signature for TLS 1.2 client
      authentication must be the hash function of the TLS 1.2 PRF, which is
      always SHA-256 in NSS 3.15.1. AES GCM cipher suites are not yet
      supported.
          o some bugfixes and improvements

Changes with version 3.15

    * New Functionality
          o Support for OCSP Stapling (RFC 6066, Certificate Status
            Request) has been added for both client and server sockets. TLS
            client applications may enable this via a call to
            SSL_OptionSetDefault(SSL_ENABLE_OCSP_STAPLING, PR_TRUE);
          o Added function SECITEM_ReallocItemV2. It replaces function
            SECITEM_ReallocItem, which is now declared as obsolete.
          o Support for single-operation (eg: not multi-part) symmetric key
            encryption and decryption, via PK11_Encrypt and PK11_Decrypt.
          o certutil has been updated to support creating name constraints
            extensions.

Security Issue reference:

    * CVE-2013-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-30"/>
	<updated date="2013-10-30"/>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1739">CVE-2013-1739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579066" comment="libfreebl3-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579067" comment="libfreebl3-32bit-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579068" comment="libfreebl3-x86-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579069" comment="libsoftokn3-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579070" comment="libsoftokn3-32bit-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579071" comment="libsoftokn3-x86-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576547" comment="mozilla-nspr-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576548" comment="mozilla-nspr-32bit-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576549" comment="mozilla-nspr-x86-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579072" comment="mozilla-nss-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579073" comment="mozilla-nss-32bit-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579074" comment="mozilla-nss-tools-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579075" comment="mozilla-nss-x86-3.15.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579066" comment="libfreebl3-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579067" comment="libfreebl3-32bit-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579068" comment="libfreebl3-x86-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579069" comment="libsoftokn3-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579070" comment="libsoftokn3-32bit-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579071" comment="libsoftokn3-x86-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576547" comment="mozilla-nspr-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576548" comment="mozilla-nspr-32bit-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576549" comment="mozilla-nspr-x86-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579072" comment="mozilla-nss-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579073" comment="mozilla-nss-32bit-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579074" comment="mozilla-nss-tools-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579075" comment="mozilla-nss-x86-3.15.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579066" comment="libfreebl3-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579067" comment="libfreebl3-32bit-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579068" comment="libfreebl3-x86-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579069" comment="libsoftokn3-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579070" comment="libsoftokn3-32bit-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579071" comment="libsoftokn3-x86-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576547" comment="mozilla-nspr-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576548" comment="mozilla-nspr-32bit-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576549" comment="mozilla-nspr-x86-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579072" comment="mozilla-nss-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579073" comment="mozilla-nss-32bit-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579074" comment="mozilla-nss-tools-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579075" comment="mozilla-nss-x86-3.15.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219077" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1141322" ref_url="https://bugzilla.suse.com/1141322" source="BUGZILLA"/>
		<reference ref_id="1158527" ref_url="https://bugzilla.suse.com/1158527" source="BUGZILLA"/>
		<reference ref_id="1159819" ref_url="https://bugzilla.suse.com/1159819" source="BUGZILLA"/>
		<reference ref_id="1168669" ref_url="https://bugzilla.suse.com/1168669" source="BUGZILLA"/>
		<reference ref_id="1169746" ref_url="https://bugzilla.suse.com/1169746" source="BUGZILLA"/>
		<reference ref_id="1170908" ref_url="https://bugzilla.suse.com/1170908" source="BUGZILLA"/>
		<reference ref_id="1171978" ref_url="https://bugzilla.suse.com/1171978" source="BUGZILLA"/>
		<reference ref_id="1173032" ref_url="https://bugzilla.suse.com/1173032" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="CVE-2020-12399" ref_url="https://www.suse.com/security/cve/CVE-2020-12399/" source="CVE"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to version 3.53.1

- CVE-2019-11745: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate
- CVE-2020-12402: Fixed a potential side channel attack during RSA key generation (bsc#1173032).
- CVE-2020-12399: Fixed a timing attack on DSA signature generation (bsc#1171978).
- CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
- CVE-2019-11727: A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages.
- Fixed various FIPS issues in libfreebl3 which were causing segfaults in the test suite of chrony (bsc#1168669).
- Fixed an issue where Firefox tab was crashing (bsc#1170908).

Release notes: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53_release_notes

mozilla-nspr was updated to version 4.25.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141322">SUSE bug 1141322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158527">SUSE bug 1158527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168669">SUSE bug 1168669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169746">SUSE bug 1169746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170908">SUSE bug 1170908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171978">SUSE bug 1171978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173032">SUSE bug 1173032</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11727">CVE-2019-11727 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11745">CVE-2019-11745 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17006">CVE-2019-17006 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12399/">CVE-2020-12399 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12399">CVE-2020-12399 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12402">CVE-2020-12402 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572691" comment="libfreebl3-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572692" comment="libfreebl3-32bit-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572693" comment="libsoftokn3-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572694" comment="libsoftokn3-32bit-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572695" comment="mozilla-nspr-4.25-29.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572696" comment="mozilla-nspr-32bit-4.25-29.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572697" comment="mozilla-nss-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572698" comment="mozilla-nss-32bit-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572699" comment="mozilla-nss-certs-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572700" comment="mozilla-nss-certs-32bit-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572701" comment="mozilla-nss-tools-3.53.1-38.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219078" version="1" class="patch">
	<metadata>
		<title>Recommended update for mozilla-nspr, mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1029961" ref_url="https://bugzilla.suse.com/1029961" source="BUGZILLA"/>
		<reference ref_id="1174697" ref_url="https://bugzilla.suse.com/1174697" source="BUGZILLA"/>
		<reference ref_id="1176206" ref_url="https://bugzilla.suse.com/1176206" source="BUGZILLA"/>
		<reference ref_id="1176934" ref_url="https://bugzilla.suse.com/1176934" source="BUGZILLA"/>
		<reference ref_id="1179382" ref_url="https://bugzilla.suse.com/1179382" source="BUGZILLA"/>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12400" ref_url="https://www.suse.com/security/cve/CVE-2020-12400/" source="CVE"/>
		<reference ref_id="CVE-2020-12401" ref_url="https://www.suse.com/security/cve/CVE-2020-12401/" source="CVE"/>
		<reference ref_id="CVE-2020-12403" ref_url="https://www.suse.com/security/cve/CVE-2020-12403/" source="CVE"/>
		<reference ref_id="CVE-2020-25648" ref_url="https://www.suse.com/security/cve/CVE-2020-25648/" source="CVE"/>
		<reference ref_id="CVE-2020-6829" ref_url="https://www.suse.com/security/cve/CVE-2020-6829/" source="CVE"/>
		<description>
This update for mozilla-nspr fixes the following issues:

mozilla-nspr was updated to version 4.32:

* implement new socket option PR_SockOpt_DontFrag
* support larger DNS records by increasing the default buffer
  size for DNS queries 
* Lock access to PRCallOnceType members in PR_CallOnce* for
  thread safety bmo#1686138
* PR_GetSystemInfo supports a new flag PR_SI_RELEASE_BUILD to get
  information about the operating system build version.


Mozilla NSS was updated to version 3.68:

* bmo#1713562 - Fix test leak.
* bmo#1717452 - NSS 3.68 should depend on NSPR 4.32.
* bmo#1693206 - Implement PKCS8 export of ECDSA keys.
* bmo#1712883 - DTLS 1.3 draft-43.
* bmo#1655493 - Support SHA2 HW acceleration using Intel SHA Extension.
* bmo#1713562 - Validate ECH public names.
* bmo#1717610 - Add function to get seconds from epoch from pkix::Time.

update to NSS 3.67

* bmo#1683710 - Add a means to disable ALPN.
* bmo#1715720 - Fix nssckbi version number in NSS 3.67 (was supposed to be incremented in 3.66).
* bmo#1714719 - Set NSS_USE_64 on riscv64 target when using GYP/Ninja.
* bmo#1566124 - Fix counter increase in ppc-gcm-wrap.c.
* bmo#1566124 - Fix AES_GCM mode on ppc64le for messages of length more than 255-byte.

update to NSS 3.66

* bmo#1710716 - Remove Expired Sonera Class2 CA from NSS.
* bmo#1710716 - Remove Expired Root Certificates from NSS - QuoVadis Root Certification Authority.
* bmo#1708307 - Remove Trustis FPS Root CA from NSS.
* bmo#1707097 - Add Certum Trusted Root CA to NSS.
* bmo#1707097 - Add Certum EC-384 CA to NSS.
* bmo#1703942 - Add ANF Secure Server Root CA to NSS.
* bmo#1697071 - Add GLOBALTRUST 2020 root cert to NSS.
* bmo#1712184 - NSS tools manpages need to be updated to reflect that sqlite is the default database.
* bmo#1712230 - Don't build ppc-gcm.s with clang integrated assembler.
* bmo#1712211 - Strict prototype error when trying to compile nss code that includes blapi.h.
* bmo#1710773 - NSS needs FIPS 180-3 FIPS indicators.
* bmo#1709291 - Add VerifyCodeSigningCertificateChain.

update to NSS 3.65

* bmo#1709654 - Update for NetBSD configuration.
* bmo#1709750 - Disable HPKE test when fuzzing.
* bmo#1566124 - Optimize AES-GCM for ppc64le.
* bmo#1699021 - Add AES-256-GCM to HPKE.
* bmo#1698419 - ECH -10 updates.
* bmo#1692930 - Update HPKE to final version.
* bmo#1707130 - NSS should use modern algorithms in PKCS#12 files by default.
* bmo#1703936 - New coverity/cpp scanner errors.
* bmo#1697303 - NSS needs to update it's csp clearing to FIPS 180-3 standards.
* bmo#1702663 - Need to support RSA PSS with Hashing PKCS #11 Mechanisms.
* bmo#1705119 - Deadlock when using GCM and non-thread safe tokens.

update to NSS 3.64

* bmo#1705286 - Properly detect mips64.
* bmo#1687164 - Introduce NSS_DISABLE_CRYPTO_VSX and
		disable_crypto_vsx.
* bmo#1698320 - replace __builtin_cpu_supports('vsx') with
		ppc_crypto_support() for clang.
* bmo#1613235 - Add POWER ChaCha20 stream cipher vector
		acceleration.

Fixed in 3.63

* bmo#1697380 - Make a clang-format run on top of helpful contributions.
* bmo#1683520 - ECCKiila P384, change syntax of nested structs
		initialization to prevent build isses with GCC 4.8.
* bmo#1683520 - [lib/freebl/ecl] P-384: allow zero scalars in dual
		scalar multiplication.
* bmo#1683520 - ECCKiila P521, change syntax of nested structs
		initialization to prevent build isses with GCC 4.8.
* bmo#1683520 - [lib/freebl/ecl] P-521: allow zero scalars in dual
		scalar multiplication.
* bmo#1696800 - HACL* update March 2021 - c95ab70fcb2bc21025d8845281bc4bc8987ca683.
* bmo#1694214 - tstclnt can't enable middlebox compat mode.
* bmo#1694392 - NSS does not work with PKCS #11 modules not supporting
		profiles.
* bmo#1685880 - Minor fix to prevent unused variable on early return.
* bmo#1685880 - Fix for the gcc compiler version 7 to support setenv
		with nss build.
* bmo#1693217 - Increase nssckbi.h version number for March 2021 batch
		of root CA changes, CA list version 2.48.
* bmo#1692094 - Set email distrust after to 21-03-01 for Camerfirma's
		'Chambers of Commerce' and 'Global Chambersign' roots.
* bmo#1618407 - Symantec root certs - Set CKA_NSS_EMAIL_DISTRUST_AFTER.
* bmo#1693173 - Add GlobalSign R45, E45, R46, and E46 root certs to NSS.
* bmo#1683738 - Add AC RAIZ FNMT-RCM SERVIDORES SEGUROS root cert to NSS.
* bmo#1686854 - Remove GeoTrust PCA-G2 and VeriSign Universal root certs
		from NSS.
* bmo#1687822 - Turn off Websites trust bit for the “Staat der
		Nederlanden Root CA - G3” root cert in NSS.
* bmo#1692094 - Turn off Websites Trust Bit for 'Chambers of Commerce
		Root - 2008' and 'Global Chambersign Root - 2008’.
* bmo#1694291 - Tracing fixes for ECH.

update to NSS 3.62

* bmo#1688374 - Fix parallel build NSS-3.61 with make
* bmo#1682044 - pkix_Build_GatherCerts() + pkix_CacheCert_Add()
		can corrupt 'cachedCertTable'
* bmo#1690583 - Fix CH padding extension size calculation
* bmo#1690421 - Adjust 3.62 ABI report formatting for new libabigail
* bmo#1690421 - Install packaged libabigail in docker-builds image
* bmo#1689228 - Minor ECH -09 fixes for interop testing, fuzzing
* bmo#1674819 - Fixup a51fae403328, enum type may be signed
* bmo#1681585 - Add ECH support to selfserv
* bmo#1681585 - Update ECH to Draft-09
* bmo#1678398 - Add Export/Import functions for HPKE context
* bmo#1678398 - Update HPKE to draft-07

update to NSS 3.61

* bmo#1682071 - Fix issue with IKE Quick mode deriving incorrect key
		values under certain conditions.
* bmo#1684300 - Fix default PBE iteration count when NSS is compiled
		with NSS_DISABLE_DBM.
* bmo#1651411 - Improve constant-timeness in RSA operations.
* bmo#1677207 - Upgrade Google Test version to latest release.
* bmo#1654332 - Add aarch64-make target to nss-try.

Update to NSS 3.60.1:

Notable changes in NSS 3.60:
* TLS 1.3 Encrypted Client Hello (draft-ietf-tls-esni-08) support
  has been added, replacing the previous ESNI (draft-ietf-tls-esni-01)
  implementation. See bmo#1654332 for more information.
* December 2020 batch of Root CA changes, builtins library updated
  to version 2.46. See bmo#1678189, bmo#1678166, and bmo#1670769
  for more information.

Update to NSS 3.59.1:

* bmo#1679290 - Fix potential deadlock with certain third-party
		PKCS11 modules

Update to NSS 3.59:

Notable changes:

* Exported two existing functions from libnss:
  CERT_AddCertToListHeadWithData and CERT_AddCertToListTailWithData

Bugfixes

* bmo#1607449 - Lock cert-&gt;nssCertificate to prevent a potential data race
* bmo#1672823 - Add Wycheproof test cases for HMAC, HKDF, and DSA
* bmo#1663661 - Guard against NULL token in nssSlot_IsTokenPresent
* bmo#1670835 - Support enabling and disabling signatures via Crypto Policy
* bmo#1672291 - Resolve libpkix OCSP failures on SHA1 self-signed
		root certs when SHA1 signatures are disabled.
* bmo#1644209 - Fix broken SelectedCipherSuiteReplacer filter to
		solve some test intermittents
* bmo#1672703 - Tolerate the first CCS in TLS 1.3 to fix a regression in
		our CVE-2020-25648 fix that broke purple-discord
		(boo#1179382)
* bmo#1666891 - Support key wrap/unwrap with RSA-OAEP
* bmo#1667989 - Fix gyp linking on Solaris
* bmo#1668123 - Export CERT_AddCertToListHeadWithData and
		CERT_AddCertToListTailWithData from libnss
* bmo#1634584 - Set CKA_NSS_SERVER_DISTRUST_AFTER for Trustis FPS Root CA
* bmo#1663091 - Remove unnecessary assertions in the streaming
		ASN.1 decoder that affected decoding certain PKCS8
		private keys when using NSS debug builds
*  bmo#670839 - Use ARM crypto extension for AES, SHA1 and SHA2 on MacOS.

update to NSS 3.58

Bugs fixed:

* bmo#1641480 (CVE-2020-25648)
  Tighten CCS handling for middlebox compatibility mode.
* bmo#1631890 - Add support for Hybrid Public Key Encryption
  (draft-irtf-cfrg-hpke) support for TLS Encrypted Client Hello
  (draft-ietf-tls-esni).
* bmo#1657255 - Add CI tests that disable SHA1/SHA2 ARM crypto
  extensions.
* bmo#1668328 - Handle spaces in the Python path name when using
  gyp on Windows.
* bmo#1667153 - Add PK11_ImportDataKey for data object import.
* bmo#1665715 - Pass the embedded SCT list extension (if present)
  to TrustDomain::CheckRevocation instead of the notBefore value.

update to NSS 3.57

* The following CA certificates were Added:
  bmo#1663049 - CN=Trustwave Global Certification Authority
      SHA-256 Fingerprint: 97552015F5DDFC3C8788C006944555408894450084F100867086BC1A2BB58DC8
  bmo#1663049 - CN=Trustwave Global ECC P256 Certification Authority
      SHA-256 Fingerprint: 945BBC825EA554F489D1FD51A73DDF2EA624AC7019A05205225C22A78CCFA8B4
  bmo#1663049 - CN=Trustwave Global ECC P384 Certification Authority
      SHA-256 Fingerprint: 55903859C8C0C3EBB8759ECE4E2557225FF5758BBD38EBD48276601E1BD58097
* The following CA certificates were Removed:
  bmo#1651211 - CN=EE Certification Centre Root CA
      SHA-256 Fingerprint: 3E84BA4342908516E77573C0992F0979CA084E4685681FF195CCBA8A229B8A76
  bmo#1656077 - O=Government Root Certification Authority; C=TW
      SHA-256 Fingerprint: 7600295EEFE85B9E1FD624DB76062AAAAE59818A54D2774CD4C0B2C01131E1B3
* Trust settings for the following CA certificates were Modified:
  bmo#1653092 - CN=OISTE WISeKey Global Root GA CA
      Websites (server authentication) trust bit removed.
* https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.57_release_notes

update to NSS 3.56

Notable changes

* bmo#1650702 - Support SHA-1 HW acceleration on ARMv8
* bmo#1656981 - Use MPI comba and mulq optimizations on x86-64 MacOS.
* bmo#1654142 - Add CPU feature detection for Intel SHA extension.
* bmo#1648822 - Add stricter validation of DH keys in FIPS mode.
* bmo#1656986 - Properly detect arm64 during GYP build architecture
		detection.
* bmo#1652729 - Add build flag to disable RC2 and relocate to
		lib/freebl/deprecated.
* bmo#1656429 - Correct RTT estimate used in 0-RTT anti-replay.
* bmo#1588941 - Send empty certificate message when scheme selection
		fails.
* bmo#1652032 - Fix failure to build in Windows arm64 makefile
		cross-compilation.
* bmo#1625791 - Fix deadlock issue in nssSlot_IsTokenPresent.
* bmo#1653975 - Fix 3.53 regression by setting 'all' as the default
		makefile target.
* bmo#1659792 - Fix broken libpkix tests with unexpired PayPal cert.
* bmo#1659814 - Fix interop.sh failures with newer tls-interop
		commit and dependencies.
* bmo#1656519 - NSPR dependency updated to 4.28

update to NSS 3.55

Notable changes
* P384 and P521 elliptic curve implementations are replaced with
  verifiable implementations from Fiat-Crypto [0] and ECCKiila [1].
* PK11_FindCertInSlot is added. With this function, a given slot
  can be queried with a DER-Encoded certificate, providing performance
  and usability improvements over other mechanisms. (bmo#1649633)
* DTLS 1.3 implementation is updated to draft-38. (bmo#1647752)

Relevant Bugfixes

* bmo#1631583 (CVE-2020-6829, CVE-2020-12400) - Replace P384 and
  P521 with new, verifiable implementations from Fiat-Crypto and ECCKiila.
* bmo#1649487 - Move overzealous assertion in VFY_EndWithSignature.
* bmo#1631573 (CVE-2020-12401) - Remove unnecessary scalar padding.
* bmo#1636771 (CVE-2020-12403) - Explicitly disable multi-part
  ChaCha20 (which was not functioning correctly) and more strictly
  enforce tag length.
* bmo#1649648 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1649316 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1649322 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1653202 - Fix initialization bug in blapitest when compiled
  with NSS_DISABLE_DEPRECATED_SEED.
* bmo#1646594 - Fix AVX2 detection in makefile builds.
* bmo#1649633 - Add PK11_FindCertInSlot to search a given slot
  for a DER-encoded certificate.
* bmo#1651520 - Fix slotLock race in NSC_GetTokenInfo.
* bmo#1647752 - Update DTLS 1.3 implementation to draft-38.
* bmo#1649190 - Run cipher, sdr, and ocsp tests under standard test cycle in CI.
* bmo#1649226 - Add Wycheproof ECDSA tests.
* bmo#1637222 - Consistently enforce IV requirements for DES and 3DES.
* bmo#1067214 - Enforce minimum PKCS#1 v1.5 padding length in
  RSA_CheckSignRecover.
* bmo#1646324 - Advertise PKCS#1 schemes for certificates in the
  signature_algorithms extension.

update to NSS 3.54

Notable changes

* Support for TLS 1.3 external pre-shared keys (bmo#1603042).
* Use ARM Cryptography Extension for SHA256, when available
  (bmo#1528113)
* The following CA certificates were Added:
  bmo#1645186 - certSIGN Root CA G2.
  bmo#1645174 - e-Szigno Root CA 2017.
  bmo#1641716 - Microsoft ECC Root Certificate Authority 2017.
  bmo#1641716 - Microsoft RSA Root Certificate Authority 2017.
* The following CA certificates were Removed:
  bmo#1645199 - AddTrust Class 1 CA Root.
  bmo#1645199 - AddTrust External CA Root.
  bmo#1641718 - LuxTrust Global Root 2.
  bmo#1639987 - Staat der Nederlanden Root CA - G2.
  bmo#1618402 - Symantec Class 2 Public Primary Certification Authority - G4.
  bmo#1618402 - Symantec Class 1 Public Primary Certification Authority - G4.
  bmo#1618402 - VeriSign Class 3 Public Primary Certification Authority - G3.

* A number of certificates had their Email trust bit disabled.
  See bmo#1618402 for a complete list.

Bugs fixed

* bmo#1528113 - Use ARM Cryptography Extension for SHA256.
* bmo#1603042 - Add TLS 1.3 external PSK support.
* bmo#1642802 - Add uint128 support for HACL* curve25519 on Windows.
* bmo#1645186 - Add 'certSIGN Root CA G2' root certificate.
* bmo#1645174 - Add Microsec's 'e-Szigno Root CA 2017' root certificate.
* bmo#1641716 - Add Microsoft's non-EV root certificates.
* bmo1621151 - Disable email trust bit for 'O=Government
	       Root Certification Authority; C=TW' root.
* bmo#1645199 - Remove AddTrust root certificates.
* bmo#1641718 - Remove 'LuxTrust Global Root 2' root certificate.
* bmo#1639987 - Remove 'Staat der Nederlanden Root CA - G2' root
		certificate.
* bmo#1618402 - Remove Symantec root certificates and disable email trust
		bit.
* bmo#1640516 - NSS 3.54 should depend on NSPR 4.26.
* bmo#1642146 - Fix undefined reference to `PORT_ZAlloc_stub' in seed.c.
* bmo#1642153 - Fix infinite recursion building NSS.
* bmo#1642638 - Fix fuzzing assertion crash.
* bmo#1642871 - Enable SSL_SendSessionTicket after resumption.
* bmo#1643123 - Support SSL_ExportEarlyKeyingMaterial with External PSKs.
* bmo#1643557 - Fix numerous compile warnings in NSS.
* bmo#1644774 - SSL gtests to use ClearServerCache when resetting
		self-encrypt keys.
* bmo#1645479 - Don't use SECITEM_MakeItem in secutil.c.
* bmo#1646520 - Stricter enforcement of ASN.1 INTEGER encoding.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-30"/>
	<updated date="2021-09-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029961">SUSE bug 1029961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174697">SUSE bug 1174697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176206">SUSE bug 1176206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176934">SUSE bug 1176934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179382">SUSE bug 1179382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12400/">CVE-2020-12400 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12400">CVE-2020-12400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12401/">CVE-2020-12401 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12401">CVE-2020-12401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12403/">CVE-2020-12403 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12403">CVE-2020-12403 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25648/">CVE-2020-25648 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25648">CVE-2020-25648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6829/">CVE-2020-6829 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6829">CVE-2020-6829 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634789" comment="libfreebl3-3.68-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634790" comment="libfreebl3-32bit-3.68-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634791" comment="libsoftokn3-3.68-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634792" comment="libsoftokn3-32bit-3.68-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634793" comment="mozilla-nspr-4.32-33.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634794" comment="mozilla-nspr-32bit-4.32-33.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634795" comment="mozilla-nss-3.68-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634796" comment="mozilla-nss-32bit-3.68-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634797" comment="mozilla-nss-certs-3.68-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634798" comment="mozilla-nss-certs-32bit-3.68-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634799" comment="mozilla-nss-tools-3.68-47.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219079" version="1" class="patch">
	<metadata>
		<title>Security update for mutt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="868115" ref_url="https://bugzilla.suse.com/868115" source="BUGZILLA"/>
		<reference ref_id="905481" ref_url="https://bugzilla.suse.com/905481" source="BUGZILLA"/>
		<reference ref_id="907453" ref_url="https://bugzilla.suse.com/907453" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0467" ref_url="https://www.suse.com/security/cve/CVE-2014-0467/" source="CVE"/>
		<reference ref_id="CVE-2014-9116" ref_url="https://www.suse.com/security/cve/CVE-2014-9116/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001359.html" source="SUSE-SU"/>
		<description>

The mailreader mutt was updated to fix a security issue in displaying mail 
headers, where a crafted e-mail could cause a heap overflow, which in turn 
might be used by attackers to crash mutt or potentially even execute code.

Security Issues references:

    * CVE-2014-0467
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0467&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-17"/>
	<updated date="2014-03-17"/>
	<bugzilla href="https://bugzilla.suse.com/868115">SUSE bug 868115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905481">SUSE bug 905481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907453">SUSE bug 907453</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0467/">CVE-2014-0467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0467">CVE-2014-0467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9116/">CVE-2014-9116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9116">CVE-2014-9116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579076" comment="mutt-1.5.17-42.37.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579076" comment="mutt-1.5.17-42.37.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579076" comment="mutt-1.5.17-42.37.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219080" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1101567" ref_url="https://bugzilla.suse.com/1101567" source="BUGZILLA"/>
		<reference ref_id="1101570" ref_url="https://bugzilla.suse.com/1101570" source="BUGZILLA"/>
		<reference ref_id="1101571" ref_url="https://bugzilla.suse.com/1101571" source="BUGZILLA"/>
		<reference ref_id="1101573" ref_url="https://bugzilla.suse.com/1101573" source="BUGZILLA"/>
		<reference ref_id="1101576" ref_url="https://bugzilla.suse.com/1101576" source="BUGZILLA"/>
		<reference ref_id="1101577" ref_url="https://bugzilla.suse.com/1101577" source="BUGZILLA"/>
		<reference ref_id="1101578" ref_url="https://bugzilla.suse.com/1101578" source="BUGZILLA"/>
		<reference ref_id="1101581" ref_url="https://bugzilla.suse.com/1101581" source="BUGZILLA"/>
		<reference ref_id="1101582" ref_url="https://bugzilla.suse.com/1101582" source="BUGZILLA"/>
		<reference ref_id="1101588" ref_url="https://bugzilla.suse.com/1101588" source="BUGZILLA"/>
		<reference ref_id="1101589" ref_url="https://bugzilla.suse.com/1101589" source="BUGZILLA"/>
		<reference ref_id="936807" ref_url="https://bugzilla.suse.com/936807" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14349" ref_url="https://www.suse.com/security/cve/CVE-2018-14349/" source="CVE"/>
		<reference ref_id="CVE-2018-14350" ref_url="https://www.suse.com/security/cve/CVE-2018-14350/" source="CVE"/>
		<reference ref_id="CVE-2018-14352" ref_url="https://www.suse.com/security/cve/CVE-2018-14352/" source="CVE"/>
		<reference ref_id="CVE-2018-14353" ref_url="https://www.suse.com/security/cve/CVE-2018-14353/" source="CVE"/>
		<reference ref_id="CVE-2018-14354" ref_url="https://www.suse.com/security/cve/CVE-2018-14354/" source="CVE"/>
		<reference ref_id="CVE-2018-14355" ref_url="https://www.suse.com/security/cve/CVE-2018-14355/" source="CVE"/>
		<reference ref_id="CVE-2018-14356" ref_url="https://www.suse.com/security/cve/CVE-2018-14356/" source="CVE"/>
		<reference ref_id="CVE-2018-14357" ref_url="https://www.suse.com/security/cve/CVE-2018-14357/" source="CVE"/>
		<reference ref_id="CVE-2018-14358" ref_url="https://www.suse.com/security/cve/CVE-2018-14358/" source="CVE"/>
		<reference ref_id="CVE-2018-14359" ref_url="https://www.suse.com/security/cve/CVE-2018-14359/" source="CVE"/>
		<reference ref_id="CVE-2018-14362" ref_url="https://www.suse.com/security/cve/CVE-2018-14362/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004462.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

Security issues fixed:

- CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582).
- CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581).
- CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567).
- CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578).
- CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576).
- CVE-2018-14355: Fix imap/util.c that mishandles '..' directory traversal in a mailbox name (bsc#1101577).
- CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589).
- CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588).
- CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573).
- CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570).
- CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571).


Bug fixes:

- bsc#936807: On entering a 70 character subject line in mutt, a tab is added to the text after 67 characters.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101567">SUSE bug 1101567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101570">SUSE bug 1101570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101571">SUSE bug 1101571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101573">SUSE bug 1101573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101576">SUSE bug 1101576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101577">SUSE bug 1101577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101578">SUSE bug 1101578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101581">SUSE bug 1101581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101582">SUSE bug 1101582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101588">SUSE bug 1101588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101589">SUSE bug 1101589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936807">SUSE bug 936807</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14349/">CVE-2018-14349 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14349">CVE-2018-14349 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14350/">CVE-2018-14350 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14350">CVE-2018-14350 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14352/">CVE-2018-14352 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14352">CVE-2018-14352 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14353/">CVE-2018-14353 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14353">CVE-2018-14353 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14354/">CVE-2018-14354 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14354">CVE-2018-14354 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14355/">CVE-2018-14355 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14355">CVE-2018-14355 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14356/">CVE-2018-14356 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14356">CVE-2018-14356 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14357/">CVE-2018-14357 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14357">CVE-2018-14357 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14358/">CVE-2018-14358 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14358">CVE-2018-14358 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14359/">CVE-2018-14359 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14359">CVE-2018-14359 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14362/">CVE-2018-14362 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14362">CVE-2018-14362 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579077" comment="mutt-1.5.17-42.43.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579077" comment="mutt-1.5.17-42.43.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219081" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172906" ref_url="https://bugzilla.suse.com/1172906" source="BUGZILLA"/>
		<reference ref_id="1172935" ref_url="https://bugzilla.suse.com/1172935" source="BUGZILLA"/>
		<reference ref_id="1173197" ref_url="https://bugzilla.suse.com/1173197" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14093" ref_url="https://www.suse.com/security/cve/CVE-2020-14093/" source="CVE"/>
		<reference ref_id="CVE-2020-14154" ref_url="https://www.suse.com/security/cve/CVE-2020-14154/" source="CVE"/>
		<reference ref_id="CVE-2020-14954" ref_url="https://www.suse.com/security/cve/CVE-2020-14954/" source="CVE"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2020-14954: Fixed a response injection due to a STARTTLS buffering issue which was
  affecting IMAP, SMTP, and POP3 (bsc#1173197).	  
- CVE-2020-14093: Fixed a potential IMAP Man-in-the-Middle attack via a PREAUTH response (bsc#1172906, bsc#1172935).
- CVE-2020-14154: Fixed an issue where Mutt was ignoring an expired certificate and was proceeding with a connection (bsc#1172906, bsc#1172935).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-30"/>
	<updated date="2020-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172906">SUSE bug 1172906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172935">SUSE bug 1172935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173197">SUSE bug 1173197</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14093/">CVE-2020-14093 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14093">CVE-2020-14093 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14154/">CVE-2020-14154 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14154">CVE-2020-14154 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14954/">CVE-2020-14954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14954">CVE-2020-14954 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572714" comment="mutt-1.5.17-42.51.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219082" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179035" ref_url="https://bugzilla.suse.com/1179035" source="BUGZILLA"/>
		<reference ref_id="1179113" ref_url="https://bugzilla.suse.com/1179113" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28896" ref_url="https://www.suse.com/security/cve/CVE-2020-28896/" source="CVE"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2020-28896: incomplete connection termination could lead to sending credentials over unencrypted connections (bsc#1179035)
- Avoid that message with a million tiny parts can freeze MUA for several minutes (bsc#1179113)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-30"/>
	<updated date="2020-11-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179035">SUSE bug 1179035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179113">SUSE bug 1179113</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28896/">CVE-2020-28896 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28896">CVE-2020-28896 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572715" comment="mutt-1.5.17-42.56.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219083" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181221" ref_url="https://bugzilla.suse.com/1181221" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3181" ref_url="https://www.suse.com/security/cve/CVE-2021-3181/" source="CVE"/>
		<description>
This update for mutt fixes the following issue:

- CVE-2021-3181: Fixed a memory leak in recipient parsing (bsc#1181221).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-22"/>
	<updated date="2021-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181221">SUSE bug 1181221</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3181/">CVE-2021-3181 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3181">CVE-2021-3181 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572716" comment="mutt-1.5.17-42.62.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219084" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198518" ref_url="https://bugzilla.suse.com/1198518" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1328" ref_url="https://www.suse.com/security/cve/CVE-2022-1328/" source="CVE"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2022-1328: Fixed an invalid memory access when reading untrusted uuencoded
  data. This could result in including private memory in replies (bsc#1198518).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198518">SUSE bug 1198518</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1328/">CVE-2022-1328 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1328">CVE-2022-1328 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680095" comment="mutt-1.5.17-42.65.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219085" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="924663" ref_url="https://bugzilla.suse.com/924663" source="BUGZILLA"/>
		<reference ref_id="928962" ref_url="https://bugzilla.suse.com/928962" source="BUGZILLA"/>
		<reference ref_id="934401" ref_url="https://bugzilla.suse.com/934401" source="BUGZILLA"/>
		<reference ref_id="938412" ref_url="https://bugzilla.suse.com/938412" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2582" ref_url="https://www.suse.com/security/cve/CVE-2015-2582/" source="CVE"/>
		<reference ref_id="CVE-2015-2611" ref_url="https://www.suse.com/security/cve/CVE-2015-2611/" source="CVE"/>
		<reference ref_id="CVE-2015-2617" ref_url="https://www.suse.com/security/cve/CVE-2015-2617/" source="CVE"/>
		<reference ref_id="CVE-2015-2620" ref_url="https://www.suse.com/security/cve/CVE-2015-2620/" source="CVE"/>
		<reference ref_id="CVE-2015-2639" ref_url="https://www.suse.com/security/cve/CVE-2015-2639/" source="CVE"/>
		<reference ref_id="CVE-2015-2641" ref_url="https://www.suse.com/security/cve/CVE-2015-2641/" source="CVE"/>
		<reference ref_id="CVE-2015-2643" ref_url="https://www.suse.com/security/cve/CVE-2015-2643/" source="CVE"/>
		<reference ref_id="CVE-2015-2648" ref_url="https://www.suse.com/security/cve/CVE-2015-2648/" source="CVE"/>
		<reference ref_id="CVE-2015-2661" ref_url="https://www.suse.com/security/cve/CVE-2015-2661/" source="CVE"/>
		<reference ref_id="CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152/" source="CVE"/>
		<reference ref_id="CVE-2015-4737" ref_url="https://www.suse.com/security/cve/CVE-2015-4737/" source="CVE"/>
		<reference ref_id="CVE-2015-4752" ref_url="https://www.suse.com/security/cve/CVE-2015-4752/" source="CVE"/>
		<reference ref_id="CVE-2015-4756" ref_url="https://www.suse.com/security/cve/CVE-2015-4756/" source="CVE"/>
		<reference ref_id="CVE-2015-4757" ref_url="https://www.suse.com/security/cve/CVE-2015-4757/" source="CVE"/>
		<reference ref_id="CVE-2015-4761" ref_url="https://www.suse.com/security/cve/CVE-2015-4761/" source="CVE"/>
		<reference ref_id="CVE-2015-4767" ref_url="https://www.suse.com/security/cve/CVE-2015-4767/" source="CVE"/>
		<reference ref_id="CVE-2015-4769" ref_url="https://www.suse.com/security/cve/CVE-2015-4769/" source="CVE"/>
		<reference ref_id="CVE-2015-4771" ref_url="https://www.suse.com/security/cve/CVE-2015-4771/" source="CVE"/>
		<reference ref_id="CVE-2015-4772" ref_url="https://www.suse.com/security/cve/CVE-2015-4772/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<description>

MySQL was updated to version 5.5.45, fixing bugs and security issues.

A list of all changes can be found on:

- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-45.html
- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-44.html

To fix the 'BACKRONYM' security issue (CVE-2015-3152) the behaviour of 
the SSL options was changed slightly to meet expectations:
Now using '--ssl-verify-server-cert' and '--ssl[-*]' implies that the ssl
connection is required. The mysql client will now print an error
if ssl is required, but the server can not handle a ssl
connection [bnc#924663], [bnc#928962], [CVE-2015-3152]

Additional bugs fixed:
- fix rc.mysql-multi script to start instances after restart
  properly [bnc#934401].
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-22"/>
	<updated date="2015-09-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924663">SUSE bug 924663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928962">SUSE bug 928962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934401">SUSE bug 934401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2582/">CVE-2015-2582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2582">CVE-2015-2582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2611/">CVE-2015-2611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2611">CVE-2015-2611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2617/">CVE-2015-2617 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2617">CVE-2015-2617 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2620/">CVE-2015-2620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2620">CVE-2015-2620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2639/">CVE-2015-2639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2639">CVE-2015-2639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2641/">CVE-2015-2641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2641">CVE-2015-2641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2643/">CVE-2015-2643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2643">CVE-2015-2643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2648/">CVE-2015-2648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2648">CVE-2015-2648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2661/">CVE-2015-2661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2661">CVE-2015-2661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3152">CVE-2015-3152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4737/">CVE-2015-4737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4737">CVE-2015-4737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4752/">CVE-2015-4752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4752">CVE-2015-4752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4756/">CVE-2015-4756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4756">CVE-2015-4756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4757/">CVE-2015-4757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4757">CVE-2015-4757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4761/">CVE-2015-4761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4761">CVE-2015-4761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4767/">CVE-2015-4767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4767">CVE-2015-4767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4769/">CVE-2015-4769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4769">CVE-2015-4769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4771/">CVE-2015-4771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4771">CVE-2015-4771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4772/">CVE-2015-4772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4772">CVE-2015-4772 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579078" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579079" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579080" comment="libmysql55client18-x86-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579081" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579082" comment="mysql-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579083" comment="mysql-client-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579084" comment="mysql-tools-5.5.45-0.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579078" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579079" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579080" comment="libmysql55client18-x86-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579081" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579082" comment="mysql-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579083" comment="mysql-client-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579084" comment="mysql-tools-5.5.45-0.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579078" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579079" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579080" comment="libmysql55client18-x86-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579081" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579082" comment="mysql-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579083" comment="mysql-client-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579084" comment="mysql-tools-5.5.45-0.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219086" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="951391" ref_url="https://bugzilla.suse.com/951391" source="BUGZILLA"/>
		<reference ref_id="952196" ref_url="https://bugzilla.suse.com/952196" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1793" ref_url="https://www.suse.com/security/cve/CVE-2015-1793/" source="CVE"/>
		<reference ref_id="CVE-2015-4730" ref_url="https://www.suse.com/security/cve/CVE-2015-4730/" source="CVE"/>
		<reference ref_id="CVE-2015-4766" ref_url="https://www.suse.com/security/cve/CVE-2015-4766/" source="CVE"/>
		<reference ref_id="CVE-2015-4792" ref_url="https://www.suse.com/security/cve/CVE-2015-4792/" source="CVE"/>
		<reference ref_id="CVE-2015-4800" ref_url="https://www.suse.com/security/cve/CVE-2015-4800/" source="CVE"/>
		<reference ref_id="CVE-2015-4802" ref_url="https://www.suse.com/security/cve/CVE-2015-4802/" source="CVE"/>
		<reference ref_id="CVE-2015-4815" ref_url="https://www.suse.com/security/cve/CVE-2015-4815/" source="CVE"/>
		<reference ref_id="CVE-2015-4816" ref_url="https://www.suse.com/security/cve/CVE-2015-4816/" source="CVE"/>
		<reference ref_id="CVE-2015-4819" ref_url="https://www.suse.com/security/cve/CVE-2015-4819/" source="CVE"/>
		<reference ref_id="CVE-2015-4826" ref_url="https://www.suse.com/security/cve/CVE-2015-4826/" source="CVE"/>
		<reference ref_id="CVE-2015-4830" ref_url="https://www.suse.com/security/cve/CVE-2015-4830/" source="CVE"/>
		<reference ref_id="CVE-2015-4833" ref_url="https://www.suse.com/security/cve/CVE-2015-4833/" source="CVE"/>
		<reference ref_id="CVE-2015-4836" ref_url="https://www.suse.com/security/cve/CVE-2015-4836/" source="CVE"/>
		<reference ref_id="CVE-2015-4858" ref_url="https://www.suse.com/security/cve/CVE-2015-4858/" source="CVE"/>
		<reference ref_id="CVE-2015-4861" ref_url="https://www.suse.com/security/cve/CVE-2015-4861/" source="CVE"/>
		<reference ref_id="CVE-2015-4862" ref_url="https://www.suse.com/security/cve/CVE-2015-4862/" source="CVE"/>
		<reference ref_id="CVE-2015-4864" ref_url="https://www.suse.com/security/cve/CVE-2015-4864/" source="CVE"/>
		<reference ref_id="CVE-2015-4866" ref_url="https://www.suse.com/security/cve/CVE-2015-4866/" source="CVE"/>
		<reference ref_id="CVE-2015-4870" ref_url="https://www.suse.com/security/cve/CVE-2015-4870/" source="CVE"/>
		<reference ref_id="CVE-2015-4879" ref_url="https://www.suse.com/security/cve/CVE-2015-4879/" source="CVE"/>
		<reference ref_id="CVE-2015-4890" ref_url="https://www.suse.com/security/cve/CVE-2015-4890/" source="CVE"/>
		<reference ref_id="CVE-2015-4895" ref_url="https://www.suse.com/security/cve/CVE-2015-4895/" source="CVE"/>
		<reference ref_id="CVE-2015-4904" ref_url="https://www.suse.com/security/cve/CVE-2015-4904/" source="CVE"/>
		<reference ref_id="CVE-2015-4905" ref_url="https://www.suse.com/security/cve/CVE-2015-4905/" source="CVE"/>
		<reference ref_id="CVE-2015-4910" ref_url="https://www.suse.com/security/cve/CVE-2015-4910/" source="CVE"/>
		<reference ref_id="CVE-2015-4913" ref_url="https://www.suse.com/security/cve/CVE-2015-4913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<description>
The mysql package was updated to version 5.5.46 to fixs several security and non security issues.

- bnc#951391: update to version 5.5.46
  * changes:
    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-46.html
  * fixed CVEs:
    CVE-2015-1793, CVE-2015-0286, CVE-2015-0288, CVE-2015-1789,
    CVE-2015-4730, CVE-2015-4766, CVE-2015-4792, CVE-2015-4800,
    CVE-2015-4802, CVE-2015-4815, CVE-2015-4816, CVE-2015-4819,
    CVE-2015-4826, CVE-2015-4830, CVE-2015-4833, CVE-2015-4836,
    CVE-2015-4858, CVE-2015-4861, CVE-2015-4862, CVE-2015-4864,
    CVE-2015-4866, CVE-2015-4870, CVE-2015-4879, CVE-2015-4890,
    CVE-2015-4895, CVE-2015-4904, CVE-2015-4905, CVE-2015-4910,
    CVE-2015-4913
- bnc#952196: Fixed a build error for ppc*, s390* and ia64 architectures.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-18"/>
	<updated date="2015-12-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952196">SUSE bug 952196</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0286">CVE-2015-0286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0288">CVE-2015-0288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1789">CVE-2015-1789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1793/">CVE-2015-1793 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1793">CVE-2015-1793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4730/">CVE-2015-4730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4730">CVE-2015-4730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4766/">CVE-2015-4766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4766">CVE-2015-4766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4792/">CVE-2015-4792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4792">CVE-2015-4792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4800/">CVE-2015-4800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4800">CVE-2015-4800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4802/">CVE-2015-4802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4802">CVE-2015-4802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4815/">CVE-2015-4815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4815">CVE-2015-4815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4816/">CVE-2015-4816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4816">CVE-2015-4816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4819/">CVE-2015-4819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4819">CVE-2015-4819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4826/">CVE-2015-4826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4826">CVE-2015-4826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4830/">CVE-2015-4830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4830">CVE-2015-4830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4833/">CVE-2015-4833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4833">CVE-2015-4833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4836/">CVE-2015-4836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4836">CVE-2015-4836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4858/">CVE-2015-4858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4858">CVE-2015-4858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4861/">CVE-2015-4861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4861">CVE-2015-4861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4862/">CVE-2015-4862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4862">CVE-2015-4862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4864/">CVE-2015-4864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4864">CVE-2015-4864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4866/">CVE-2015-4866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4866">CVE-2015-4866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4870/">CVE-2015-4870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4870">CVE-2015-4870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4879/">CVE-2015-4879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4879">CVE-2015-4879 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4890/">CVE-2015-4890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4890">CVE-2015-4890 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4895/">CVE-2015-4895 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4895">CVE-2015-4895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4904/">CVE-2015-4904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4904">CVE-2015-4904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4905/">CVE-2015-4905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4905">CVE-2015-4905 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4910/">CVE-2015-4910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4910">CVE-2015-4910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4913/">CVE-2015-4913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4913">CVE-2015-4913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579085" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579086" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579087" comment="libmysql55client18-x86-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579088" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579089" comment="mysql-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579090" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579091" comment="mysql-tools-5.5.46-0.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579085" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579086" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579087" comment="libmysql55client18-x86-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579088" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579089" comment="mysql-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579090" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579091" comment="mysql-tools-5.5.46-0.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579085" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579086" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579087" comment="libmysql55client18-x86-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579088" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579089" comment="mysql-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579090" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579091" comment="mysql-tools-5.5.46-0.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219087" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="959724" ref_url="https://bugzilla.suse.com/959724" source="BUGZILLA"/>
		<reference ref_id="960961" ref_url="https://bugzilla.suse.com/960961" source="BUGZILLA"/>
		<reference ref_id="962779" ref_url="https://bugzilla.suse.com/962779" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7744" ref_url="https://www.suse.com/security/cve/CVE-2015-7744/" source="CVE"/>
		<reference ref_id="CVE-2016-0502" ref_url="https://www.suse.com/security/cve/CVE-2016-0502/" source="CVE"/>
		<reference ref_id="CVE-2016-0505" ref_url="https://www.suse.com/security/cve/CVE-2016-0505/" source="CVE"/>
		<reference ref_id="CVE-2016-0546" ref_url="https://www.suse.com/security/cve/CVE-2016-0546/" source="CVE"/>
		<reference ref_id="CVE-2016-0596" ref_url="https://www.suse.com/security/cve/CVE-2016-0596/" source="CVE"/>
		<reference ref_id="CVE-2016-0597" ref_url="https://www.suse.com/security/cve/CVE-2016-0597/" source="CVE"/>
		<reference ref_id="CVE-2016-0598" ref_url="https://www.suse.com/security/cve/CVE-2016-0598/" source="CVE"/>
		<reference ref_id="CVE-2016-0600" ref_url="https://www.suse.com/security/cve/CVE-2016-0600/" source="CVE"/>
		<reference ref_id="CVE-2016-0606" ref_url="https://www.suse.com/security/cve/CVE-2016-0606/" source="CVE"/>
		<reference ref_id="CVE-2016-0608" ref_url="https://www.suse.com/security/cve/CVE-2016-0608/" source="CVE"/>
		<reference ref_id="CVE-2016-0609" ref_url="https://www.suse.com/security/cve/CVE-2016-0609/" source="CVE"/>
		<reference ref_id="CVE-2016-0616" ref_url="https://www.suse.com/security/cve/CVE-2016-0616/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<description>

This update to MySQL 5.5.47 fixes the following issues (bsc#962779):

- CVE-2015-7744: Lack of verification against faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange without low memory optimizations on a server, which makes it easier for remote attackers to obtain private RSA keys by capturing TLS handshakes, aka a Lenstra attack.
- CVE-2016-0502: Unspecified vulnerability in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer. 
- CVE-2016-0505: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Options. 
- CVE-2016-0546: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client. 
- CVE-2016-0596: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and 5.6.27 and earlier allows remote authenticated users to affect availability via vectors related to DML. 
- CVE-2016-0597: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Optimizer. 
- CVE-2016-0598: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via vectors related to DML. 
- CVE-2016-0600: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to InnoDB. 
- CVE-2016-0606: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect integrity via unknown vectors related to encryption. 
- CVE-2016-0608: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via vectors related to UDF. 
- CVE-2016-0609: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to privileges. 
- CVE-2016-0616: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
- bsc#959724: Possible buffer overflow from incorrect use of strcpy() and sprintf()
    
The following bugs were fixed:
    
- bsc#960961: Incorrect use of plugin-load option in default_plugins.cnf
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959724">SUSE bug 959724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960961">SUSE bug 960961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7744/">CVE-2015-7744 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7744">CVE-2015-7744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0502/">CVE-2016-0502 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0502">CVE-2016-0502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0505/">CVE-2016-0505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0505">CVE-2016-0505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0546/">CVE-2016-0546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0546">CVE-2016-0546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0596/">CVE-2016-0596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0596">CVE-2016-0596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0597/">CVE-2016-0597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0597">CVE-2016-0597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0598/">CVE-2016-0598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0598">CVE-2016-0598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0600/">CVE-2016-0600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0600">CVE-2016-0600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0606/">CVE-2016-0606 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0606">CVE-2016-0606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0608/">CVE-2016-0608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0608">CVE-2016-0608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0609/">CVE-2016-0609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0609">CVE-2016-0609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0616/">CVE-2016-0616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0616">CVE-2016-0616 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579092" comment="libmysql55client18-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579093" comment="libmysql55client18-32bit-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579094" comment="libmysql55client18-x86-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579095" comment="libmysql55client_r18-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579096" comment="mysql-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579097" comment="mysql-client-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579098" comment="mysql-tools-5.5.47-0.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579092" comment="libmysql55client18-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579093" comment="libmysql55client18-32bit-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579094" comment="libmysql55client18-x86-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579095" comment="libmysql55client_r18-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579096" comment="mysql-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579097" comment="mysql-client-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579098" comment="mysql-tools-5.5.47-0.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579092" comment="libmysql55client18-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579093" comment="libmysql55client18-32bit-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579094" comment="libmysql55client18-x86-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579095" comment="libmysql55client_r18-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579096" comment="mysql-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579097" comment="mysql-client-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579098" comment="mysql-tools-5.5.47-0.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219088" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="963806" ref_url="https://bugzilla.suse.com/963806" source="BUGZILLA"/>
		<reference ref_id="976341" ref_url="https://bugzilla.suse.com/976341" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0640" ref_url="https://www.suse.com/security/cve/CVE-2016-0640/" source="CVE"/>
		<reference ref_id="CVE-2016-0641" ref_url="https://www.suse.com/security/cve/CVE-2016-0641/" source="CVE"/>
		<reference ref_id="CVE-2016-0642" ref_url="https://www.suse.com/security/cve/CVE-2016-0642/" source="CVE"/>
		<reference ref_id="CVE-2016-0643" ref_url="https://www.suse.com/security/cve/CVE-2016-0643/" source="CVE"/>
		<reference ref_id="CVE-2016-0644" ref_url="https://www.suse.com/security/cve/CVE-2016-0644/" source="CVE"/>
		<reference ref_id="CVE-2016-0646" ref_url="https://www.suse.com/security/cve/CVE-2016-0646/" source="CVE"/>
		<reference ref_id="CVE-2016-0647" ref_url="https://www.suse.com/security/cve/CVE-2016-0647/" source="CVE"/>
		<reference ref_id="CVE-2016-0648" ref_url="https://www.suse.com/security/cve/CVE-2016-0648/" source="CVE"/>
		<reference ref_id="CVE-2016-0649" ref_url="https://www.suse.com/security/cve/CVE-2016-0649/" source="CVE"/>
		<reference ref_id="CVE-2016-0650" ref_url="https://www.suse.com/security/cve/CVE-2016-0650/" source="CVE"/>
		<reference ref_id="CVE-2016-0651" ref_url="https://www.suse.com/security/cve/CVE-2016-0651/" source="CVE"/>
		<reference ref_id="CVE-2016-0666" ref_url="https://www.suse.com/security/cve/CVE-2016-0666/" source="CVE"/>
		<reference ref_id="CVE-2016-2047" ref_url="https://www.suse.com/security/cve/CVE-2016-2047/" source="CVE"/>
		<description>
mysql was updated to version 5.5.49 to fix 13 security issues.

These security issues were fixed:
- CVE-2016-0644: Unspecified vulnerability allowed local users to affect availability via vectors related to DDL (bsc#976341).
- CVE-2016-0646: Unspecified vulnerability allowed local users to affect availability via vectors related to DML (bsc#976341).
- CVE-2016-0647: Unspecified vulnerability allowed local users to affect availability via vectors related to FTS (bsc#976341).
- CVE-2016-0640: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to DML (bsc#976341).
- CVE-2016-0641: Unspecified vulnerability allowed local users to affect confidentiality and availability via vectors related to MyISAM (bsc#976341).
- CVE-2016-0642: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to Federated (bsc#976341).
- CVE-2016-0643: Unspecified vulnerability allowed local users to affect confidentiality via vectors related to DML (bsc#976341).
- CVE-2016-0666: Unspecified vulnerability allowed local users to affect availability via vectors related to Security: Privileges (bsc#976341).
- CVE-2016-0651: Unspecified vulnerability allowed local users to affect availability via vectors related to Optimizer (bsc#976341).
- CVE-2016-0650: Unspecified vulnerability allowed local users to affect availability via vectors related to Replication (bsc#976341).
- CVE-2016-0648: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#976341).
- CVE-2016-0649: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#976341).
- CVE-2016-2047: The ssl_verify_server_cert function in sql-common/client.c did not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allowed man-in-the-middle attackers to spoof SSL servers via a '/CN=' string in a field in a certificate, as demonstrated by '/OU=/CN=bar.com/CN=foo.com (bsc#963806).

More details are available at
- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-49.html
- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-48.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-11"/>
	<updated date="2016-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/963806">SUSE bug 963806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0640/">CVE-2016-0640 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0640">CVE-2016-0640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0641/">CVE-2016-0641 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0641">CVE-2016-0641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0642/">CVE-2016-0642 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0642">CVE-2016-0642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0643/">CVE-2016-0643 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0643">CVE-2016-0643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0644/">CVE-2016-0644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0644">CVE-2016-0644 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0646/">CVE-2016-0646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0646">CVE-2016-0646 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0647/">CVE-2016-0647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0647">CVE-2016-0647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0648/">CVE-2016-0648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0648">CVE-2016-0648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0649/">CVE-2016-0649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0649">CVE-2016-0649 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0650/">CVE-2016-0650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0650">CVE-2016-0650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0651/">CVE-2016-0651 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0651">CVE-2016-0651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0666/">CVE-2016-0666 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0666">CVE-2016-0666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2047/">CVE-2016-2047 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2047">CVE-2016-2047 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579099" comment="libmysql55client18-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579100" comment="libmysql55client18-32bit-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579101" comment="libmysql55client_r18-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579102" comment="mysql-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579103" comment="mysql-client-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579104" comment="mysql-tools-5.5.49-0.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219089" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="934789" ref_url="https://bugzilla.suse.com/934789" source="BUGZILLA"/>
		<reference ref_id="959724" ref_url="https://bugzilla.suse.com/959724" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>

This update for mysql fixes the following issues:

- bsc#959724: fix incorrect usage of sprintf/strcpy that caused possible buffer overflow issues at various places

On SUSE Linux Enterprise 11 SP4 this fix was not yet shipped:
- Increase the key length (to 2048 bits) used in vio/viosslfactories.c for creating
  Diffie-Hellman keys (Logjam Attack) [bnc#934789] [CVE-2015-4000]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934789">SUSE bug 934789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959724">SUSE bug 959724</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572717" comment="libmysqlclient15-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572718" comment="libmysqlclient15-32bit-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572719" comment="libmysqlclient_r15-5.0.96-0.8.10.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219090" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="937258" ref_url="https://bugzilla.suse.com/937258" source="BUGZILLA"/>
		<reference ref_id="967374" ref_url="https://bugzilla.suse.com/967374" source="BUGZILLA"/>
		<reference ref_id="989913" ref_url="https://bugzilla.suse.com/989913" source="BUGZILLA"/>
		<reference ref_id="989919" ref_url="https://bugzilla.suse.com/989919" source="BUGZILLA"/>
		<reference ref_id="989922" ref_url="https://bugzilla.suse.com/989922" source="BUGZILLA"/>
		<reference ref_id="989926" ref_url="https://bugzilla.suse.com/989926" source="BUGZILLA"/>
		<reference ref_id="998309" ref_url="https://bugzilla.suse.com/998309" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3477" ref_url="https://www.suse.com/security/cve/CVE-2016-3477/" source="CVE"/>
		<reference ref_id="CVE-2016-3521" ref_url="https://www.suse.com/security/cve/CVE-2016-3521/" source="CVE"/>
		<reference ref_id="CVE-2016-3615" ref_url="https://www.suse.com/security/cve/CVE-2016-3615/" source="CVE"/>
		<reference ref_id="CVE-2016-5440" ref_url="https://www.suse.com/security/cve/CVE-2016-5440/" source="CVE"/>
		<reference ref_id="CVE-2016-6662" ref_url="https://www.suse.com/security/cve/CVE-2016-6662/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002279.html" source="SUSE-SU"/>
		<description>

This mysql update to verson 5.5.52 fixes the following issues: 

Security issues fixed:
- CVE-2016-3477: Fixed unspecified vulnerability in subcomponent parser (bsc#989913).
- CVE-2016-3521: Fixed unspecified vulnerability in subcomponent types (bsc#989919).
- CVE-2016-3615: Fixed unspecified vulnerability in subcomponent dml (bsc#989922).
- CVE-2016-5440: Fixed unspecified vulnerability in subcomponent rbr (bsc#989926).
- CVE-2016-6662: A malicious user with SQL and filesystem access could create
  a my.cnf in the datadir and , under certain circumstances, execute
  arbitrary code as mysql (or even root) user. (bsc#998309)


More details can be found on:
      http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-52.html
      http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-51.html
      http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-50.html

Bugs fixed:
- bsc#967374: properly restart mysql multi instances during upgrade
- bnc#937258: multi script to restart after crash
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-20"/>
	<updated date="2016-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/937258">SUSE bug 937258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967374">SUSE bug 967374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989913">SUSE bug 989913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989919">SUSE bug 989919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989922">SUSE bug 989922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989926">SUSE bug 989926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998309">SUSE bug 998309</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3477/">CVE-2016-3477 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3477">CVE-2016-3477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3521/">CVE-2016-3521 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3521">CVE-2016-3521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3615/">CVE-2016-3615 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3615">CVE-2016-3615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5440/">CVE-2016-5440 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5440">CVE-2016-5440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6662/">CVE-2016-6662 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6662">CVE-2016-6662 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579105" comment="libmysql55client18-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579106" comment="libmysql55client18-32bit-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579107" comment="libmysql55client_r18-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579108" comment="mysql-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579109" comment="mysql-client-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579110" comment="mysql-tools-5.5.52-0.27.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579105" comment="libmysql55client18-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579106" comment="libmysql55client18-32bit-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579107" comment="libmysql55client_r18-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579108" comment="mysql-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579109" comment="mysql-client-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579110" comment="mysql-tools-5.5.52-0.27.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219091" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1005558" ref_url="https://bugzilla.suse.com/1005558" source="BUGZILLA"/>
		<reference ref_id="1005580" ref_url="https://bugzilla.suse.com/1005580" source="BUGZILLA"/>
		<reference ref_id="1005581" ref_url="https://bugzilla.suse.com/1005581" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5584" ref_url="https://www.suse.com/security/cve/CVE-2016-5584/" source="CVE"/>
		<reference ref_id="CVE-2016-6662" ref_url="https://www.suse.com/security/cve/CVE-2016-6662/" source="CVE"/>
		<reference ref_id="CVE-2016-7440" ref_url="https://www.suse.com/security/cve/CVE-2016-7440/" source="CVE"/>
		<description>

This mysql version update to 5.5.53 fixes the following issues:

- CVE-2016-6662: Unspecified vulnerability in subcomponent Logging (bsc#1005580)
- CVE-2016-7440: Unspecified vulnerability in subcomponent Encryption (bsc#1005581)
- CVE-2016-5584: Unspecified vulnerability in subcomponent Encryption (bsc#1005558)

Release Notes:
    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-53.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-12"/>
	<updated date="2016-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005558">SUSE bug 1005558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005580">SUSE bug 1005580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005581">SUSE bug 1005581</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5584/">CVE-2016-5584 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5584">CVE-2016-5584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6662/">CVE-2016-6662 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6662">CVE-2016-6662 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7440/">CVE-2016-7440 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7440">CVE-2016-7440 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579111" comment="libmysql55client18-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579112" comment="libmysql55client18-32bit-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579113" comment="libmysql55client_r18-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579114" comment="mysql-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579115" comment="mysql-client-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579116" comment="mysql-tools-5.5.53-0.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219092" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1020868" ref_url="https://bugzilla.suse.com/1020868" source="BUGZILLA"/>
		<reference ref_id="1020873" ref_url="https://bugzilla.suse.com/1020873" source="BUGZILLA"/>
		<reference ref_id="1020875" ref_url="https://bugzilla.suse.com/1020875" source="BUGZILLA"/>
		<reference ref_id="1020877" ref_url="https://bugzilla.suse.com/1020877" source="BUGZILLA"/>
		<reference ref_id="1020882" ref_url="https://bugzilla.suse.com/1020882" source="BUGZILLA"/>
		<reference ref_id="1020884" ref_url="https://bugzilla.suse.com/1020884" source="BUGZILLA"/>
		<reference ref_id="1020885" ref_url="https://bugzilla.suse.com/1020885" source="BUGZILLA"/>
		<reference ref_id="1020890" ref_url="https://bugzilla.suse.com/1020890" source="BUGZILLA"/>
		<reference ref_id="1020891" ref_url="https://bugzilla.suse.com/1020891" source="BUGZILLA"/>
		<reference ref_id="1020894" ref_url="https://bugzilla.suse.com/1020894" source="BUGZILLA"/>
		<reference ref_id="1020896" ref_url="https://bugzilla.suse.com/1020896" source="BUGZILLA"/>
		<reference ref_id="1022428" ref_url="https://bugzilla.suse.com/1022428" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3238" ref_url="https://www.suse.com/security/cve/CVE-2017-3238/" source="CVE"/>
		<reference ref_id="CVE-2017-3243" ref_url="https://www.suse.com/security/cve/CVE-2017-3243/" source="CVE"/>
		<reference ref_id="CVE-2017-3244" ref_url="https://www.suse.com/security/cve/CVE-2017-3244/" source="CVE"/>
		<reference ref_id="CVE-2017-3258" ref_url="https://www.suse.com/security/cve/CVE-2017-3258/" source="CVE"/>
		<reference ref_id="CVE-2017-3265" ref_url="https://www.suse.com/security/cve/CVE-2017-3265/" source="CVE"/>
		<reference ref_id="CVE-2017-3291" ref_url="https://www.suse.com/security/cve/CVE-2017-3291/" source="CVE"/>
		<reference ref_id="CVE-2017-3312" ref_url="https://www.suse.com/security/cve/CVE-2017-3312/" source="CVE"/>
		<reference ref_id="CVE-2017-3313" ref_url="https://www.suse.com/security/cve/CVE-2017-3313/" source="CVE"/>
		<reference ref_id="CVE-2017-3317" ref_url="https://www.suse.com/security/cve/CVE-2017-3317/" source="CVE"/>
		<reference ref_id="CVE-2017-3318" ref_url="https://www.suse.com/security/cve/CVE-2017-3318/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002627.html" source="SUSE-SU"/>
		<description>

This mysql version update to 5.5.54 fixes the following issues:

- CVE-2017-3318: Unspecified vulnerability affecting Error Handling (bsc#1020896)
- CVE-2017-3317: Unspecified vulnerability affecting Logging (bsc#1020894)
- CVE-2017-3313: Unspecified vulnerability affecting the MyISAM component (bsc#1020890)
- CVE-2017-3312: Insecure error log file handling in mysqld_safe, incomplete CVE-2016-6664 (bsc#1020873)
- CVE-2017-3291: Unrestricted mysqld_safe's ledir (bsc#1020884)
- CVE-2017-3265: Unsafe chmod/chown use in init script (bsc#1020885)
- CVE-2017-3258: Unspecified vulnerability in the DDL component (bsc#1020875)
- CVE-2017-3244: Unspecified vulnerability affecing the DML component (bsc#1020877)
- CVE-2017-3243: Unspecified vulnerability affecting the Charsets component (bsc#1020891)
- CVE-2017-3238: Unspecified vulnerability affecting the Optimizer component (bsc#1020882)
- Applications using the client library for MySQL (libmysqlclient.so) had a use-after-free issue that could cause the applications to crash (bsc#1022428)

Release Notes: 
    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-54.html
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-06"/>
	<updated date="2017-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020873">SUSE bug 1020873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020875">SUSE bug 1020875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020877">SUSE bug 1020877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020882">SUSE bug 1020882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020884">SUSE bug 1020884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020885">SUSE bug 1020885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020890">SUSE bug 1020890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020891">SUSE bug 1020891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020894">SUSE bug 1020894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020896">SUSE bug 1020896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022428">SUSE bug 1022428</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3238/">CVE-2017-3238 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3238">CVE-2017-3238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3243/">CVE-2017-3243 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3243">CVE-2017-3243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3244/">CVE-2017-3244 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3244">CVE-2017-3244 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3258/">CVE-2017-3258 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3258">CVE-2017-3258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3265/">CVE-2017-3265 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3265">CVE-2017-3265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3291/">CVE-2017-3291 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3291">CVE-2017-3291 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-3312/">CVE-2017-3312 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3312">CVE-2017-3312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3313/">CVE-2017-3313 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3313">CVE-2017-3313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3317/">CVE-2017-3317 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3317">CVE-2017-3317 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3318/">CVE-2017-3318 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3318">CVE-2017-3318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579117" comment="libmysql55client18-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579118" comment="libmysql55client18-32bit-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579119" comment="libmysql55client_r18-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579120" comment="mysql-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579121" comment="mysql-client-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579122" comment="mysql-tools-5.5.54-0.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579117" comment="libmysql55client18-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579118" comment="libmysql55client18-32bit-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579119" comment="libmysql55client_r18-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579120" comment="mysql-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579121" comment="mysql-client-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579122" comment="mysql-tools-5.5.54-0.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219093" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1020976" ref_url="https://bugzilla.suse.com/1020976" source="BUGZILLA"/>
		<reference ref_id="1022428" ref_url="https://bugzilla.suse.com/1022428" source="BUGZILLA"/>
		<reference ref_id="1029014" ref_url="https://bugzilla.suse.com/1029014" source="BUGZILLA"/>
		<reference ref_id="1029396" ref_url="https://bugzilla.suse.com/1029396" source="BUGZILLA"/>
		<reference ref_id="1034850" ref_url="https://bugzilla.suse.com/1034850" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3302" ref_url="https://www.suse.com/security/cve/CVE-2017-3302/" source="CVE"/>
		<reference ref_id="CVE-2017-3305" ref_url="https://www.suse.com/security/cve/CVE-2017-3305/" source="CVE"/>
		<reference ref_id="CVE-2017-3308" ref_url="https://www.suse.com/security/cve/CVE-2017-3308/" source="CVE"/>
		<reference ref_id="CVE-2017-3309" ref_url="https://www.suse.com/security/cve/CVE-2017-3309/" source="CVE"/>
		<reference ref_id="CVE-2017-3329" ref_url="https://www.suse.com/security/cve/CVE-2017-3329/" source="CVE"/>
		<reference ref_id="CVE-2017-3453" ref_url="https://www.suse.com/security/cve/CVE-2017-3453/" source="CVE"/>
		<reference ref_id="CVE-2017-3456" ref_url="https://www.suse.com/security/cve/CVE-2017-3456/" source="CVE"/>
		<reference ref_id="CVE-2017-3461" ref_url="https://www.suse.com/security/cve/CVE-2017-3461/" source="CVE"/>
		<reference ref_id="CVE-2017-3462" ref_url="https://www.suse.com/security/cve/CVE-2017-3462/" source="CVE"/>
		<reference ref_id="CVE-2017-3463" ref_url="https://www.suse.com/security/cve/CVE-2017-3463/" source="CVE"/>
		<reference ref_id="CVE-2017-3464" ref_url="https://www.suse.com/security/cve/CVE-2017-3464/" source="CVE"/>
		<reference ref_id="CVE-2017-3600" ref_url="https://www.suse.com/security/cve/CVE-2017-3600/" source="CVE"/>
		<description>

This update for mysql to version 5.5.55 fixes the following issues:

These security issues were fixed:

- CVE-2017-3308: Unspecified vulnerability in Server: DML (bsc#1034850)
- CVE-2017-3309: Unspecified vulnerability in Server: Optimizer (bsc#1034850)
- CVE-2017-3329: Unspecified vulnerability in Server: Thread (bsc#1034850)
- CVE-2017-3600: Unspecified vulnerability in Client: mysqldump (bsc#1034850)
- CVE-2017-3453: Unspecified vulnerability in Server: Optimizer (bsc#1034850)
- CVE-2017-3456: Unspecified vulnerability in Server: DML (bsc#1034850)
- CVE-2017-3463: Unspecified vulnerability in Server: Security (bsc#1034850)
- CVE-2017-3462: Unspecified vulnerability in Server: Security (bsc#1034850)
- CVE-2017-3461: Unspecified vulnerability in Server: Security (bsc#1034850)
- CVE-2017-3464: Unspecified vulnerability in Server: DDL (bsc#1034850)
- CVE-2017-3305: MySQL client sent authentication request unencrypted even if SSL was required (aka Ridddle) (bsc#1029396).
- CVE-2016-5483: Mysqldump failed to properly quote certain identifiers in SQL statements written to the dump output, allowing for execution of arbitrary commands (bsc#1029014)
- '--ssl-mode=REQUIRED' can be specified to require a secure connection (it fails if a secure connection cannot be obtained)

This non-security issue was fixed:

- Set the default umask to 077 in rc.mysql-multi [bsc#1020976]

For additional changes please see
http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-55.html

Note: The issue tracked in bsc#1022428 and fixed in the last update was
assigned CVE-2017-3302.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-28"/>
	<updated date="2017-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020976">SUSE bug 1020976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022428">SUSE bug 1022428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029014">SUSE bug 1029014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029396">SUSE bug 1029396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3302/">CVE-2017-3302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3302">CVE-2017-3302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3305/">CVE-2017-3305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3305">CVE-2017-3305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3308/">CVE-2017-3308 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3308">CVE-2017-3308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3309/">CVE-2017-3309 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3309">CVE-2017-3309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3329/">CVE-2017-3329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3329">CVE-2017-3329 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3453/">CVE-2017-3453 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3453">CVE-2017-3453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3456/">CVE-2017-3456 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3456">CVE-2017-3456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3461/">CVE-2017-3461 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3461">CVE-2017-3461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3462/">CVE-2017-3462 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3462">CVE-2017-3462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3463/">CVE-2017-3463 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3463">CVE-2017-3463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3464/">CVE-2017-3464 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3464">CVE-2017-3464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3600/">CVE-2017-3600 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3600">CVE-2017-3600 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579123" comment="libmysql55client18-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579124" comment="libmysql55client18-32bit-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579125" comment="libmysql55client_r18-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579126" comment="mysql-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579127" comment="mysql-client-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579128" comment="mysql-tools-5.5.55-0.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219094" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1049398" ref_url="https://bugzilla.suse.com/1049398" source="BUGZILLA"/>
		<reference ref_id="1049399" ref_url="https://bugzilla.suse.com/1049399" source="BUGZILLA"/>
		<reference ref_id="1049404" ref_url="https://bugzilla.suse.com/1049404" source="BUGZILLA"/>
		<reference ref_id="1049411" ref_url="https://bugzilla.suse.com/1049411" source="BUGZILLA"/>
		<reference ref_id="1049415" ref_url="https://bugzilla.suse.com/1049415" source="BUGZILLA"/>
		<reference ref_id="1049416" ref_url="https://bugzilla.suse.com/1049416" source="BUGZILLA"/>
		<reference ref_id="1049417" ref_url="https://bugzilla.suse.com/1049417" source="BUGZILLA"/>
		<reference ref_id="1049422" ref_url="https://bugzilla.suse.com/1049422" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3635" ref_url="https://www.suse.com/security/cve/CVE-2017-3635/" source="CVE"/>
		<reference ref_id="CVE-2017-3636" ref_url="https://www.suse.com/security/cve/CVE-2017-3636/" source="CVE"/>
		<reference ref_id="CVE-2017-3641" ref_url="https://www.suse.com/security/cve/CVE-2017-3641/" source="CVE"/>
		<reference ref_id="CVE-2017-3648" ref_url="https://www.suse.com/security/cve/CVE-2017-3648/" source="CVE"/>
		<reference ref_id="CVE-2017-3651" ref_url="https://www.suse.com/security/cve/CVE-2017-3651/" source="CVE"/>
		<reference ref_id="CVE-2017-3652" ref_url="https://www.suse.com/security/cve/CVE-2017-3652/" source="CVE"/>
		<reference ref_id="CVE-2017-3653" ref_url="https://www.suse.com/security/cve/CVE-2017-3653/" source="CVE"/>
		<description>
This update for mysql fixes the following issues:


- CVE-2017-3635: C API unspecified vulnerability (bsc#1049398) 
- CVE-2017-3636: Client programs unspecified vulnerability (bsc#1049399)
- CVE-2017-3641: DML unspecified vulnerability (bsc#1049404)
- CVE-2017-3648: Charsets unspecified vulnerability (bsc#1049411)
- CVE-2017-3651: Client mysqldump unspecified vulnerability (bsc#1049415)
- CVE-2017-3652: DDL unspecified vulnerability (bsc#1049416)
- CVE-2017-3653: DDL unspecified vulnerability (bsc#1049417)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-29"/>
	<updated date="2017-08-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049398">SUSE bug 1049398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049399">SUSE bug 1049399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049404">SUSE bug 1049404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049411">SUSE bug 1049411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049415">SUSE bug 1049415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049416">SUSE bug 1049416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049417">SUSE bug 1049417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3635/">CVE-2017-3635 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3635">CVE-2017-3635 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-3636/">CVE-2017-3636 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3636">CVE-2017-3636 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3641/">CVE-2017-3641 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3641">CVE-2017-3641 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3648/">CVE-2017-3648 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3648">CVE-2017-3648 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3651/">CVE-2017-3651 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3651">CVE-2017-3651 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3652/">CVE-2017-3652 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3652">CVE-2017-3652 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3653/">CVE-2017-3653 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3653">CVE-2017-3653 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579129" comment="libmysql55client18-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579130" comment="libmysql55client18-32bit-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579131" comment="libmysql55client_r18-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579132" comment="mysql-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579133" comment="mysql-client-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579134" comment="mysql-tools-5.5.57-0.39.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219095" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1064101" ref_url="https://bugzilla.suse.com/1064101" source="BUGZILLA"/>
		<reference ref_id="1064115" ref_url="https://bugzilla.suse.com/1064115" source="BUGZILLA"/>
		<reference ref_id="1064116" ref_url="https://bugzilla.suse.com/1064116" source="BUGZILLA"/>
		<reference ref_id="1064117" ref_url="https://bugzilla.suse.com/1064117" source="BUGZILLA"/>
		<reference ref_id="1064119" ref_url="https://bugzilla.suse.com/1064119" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10268" ref_url="https://www.suse.com/security/cve/CVE-2017-10268/" source="CVE"/>
		<reference ref_id="CVE-2017-10378" ref_url="https://www.suse.com/security/cve/CVE-2017-10378/" source="CVE"/>
		<reference ref_id="CVE-2017-10379" ref_url="https://www.suse.com/security/cve/CVE-2017-10379/" source="CVE"/>
		<reference ref_id="CVE-2017-10384" ref_url="https://www.suse.com/security/cve/CVE-2017-10384/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003393.html" source="SUSE-SU"/>
		<description>


This update for mysql to version 5.5.58 fixes the following issues:

Fixed security issues:

- CVE-2017-10268: issue inside subcomponent Server Replication [bsc#1064101] 
- CVE-2017-10378: issue inside subcomponent Server Optimizer [bsc#1064115] 
- CVE-2017-10379: issue inside subcomponent Client programs [bsc#1064116] 
- CVE-2017-10384: issue inside subcomponent Server DDL [bsc#1064117] 

For a full list of changes check:

    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-58.html

		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-10"/>
	<updated date="2017-11-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1064101">SUSE bug 1064101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064115">SUSE bug 1064115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064116">SUSE bug 1064116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064117">SUSE bug 1064117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10268/">CVE-2017-10268 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10268">CVE-2017-10268 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10378/">CVE-2017-10378 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10378">CVE-2017-10378 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10379/">CVE-2017-10379 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10379">CVE-2017-10379 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10384/">CVE-2017-10384 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10384">CVE-2017-10384 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579135" comment="libmysql55client18-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579136" comment="libmysql55client18-32bit-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579137" comment="libmysql55client_r18-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579138" comment="mysql-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579139" comment="mysql-client-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579140" comment="mysql-tools-5.5.58-0.39.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579135" comment="libmysql55client18-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579136" comment="libmysql55client18-32bit-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579137" comment="libmysql55client_r18-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579138" comment="mysql-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579139" comment="mysql-client-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579140" comment="mysql-tools-5.5.58-0.39.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219096" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1076369" ref_url="https://bugzilla.suse.com/1076369" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2562" ref_url="https://www.suse.com/security/cve/CVE-2018-2562/" source="CVE"/>
		<reference ref_id="CVE-2018-2622" ref_url="https://www.suse.com/security/cve/CVE-2018-2622/" source="CVE"/>
		<reference ref_id="CVE-2018-2640" ref_url="https://www.suse.com/security/cve/CVE-2018-2640/" source="CVE"/>
		<reference ref_id="CVE-2018-2665" ref_url="https://www.suse.com/security/cve/CVE-2018-2665/" source="CVE"/>
		<reference ref_id="CVE-2018-2668" ref_url="https://www.suse.com/security/cve/CVE-2018-2668/" source="CVE"/>
		<description>
This update for mysql to version 5.5.59 fixes several issues.

These security issues were fixed:

- CVE-2018-2622: Vulnerability in the subcomponent: Server: DDL. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server (bsc#1076369)
- CVE-2018-2562: Vulnerability in the subcomponent: Server : Partition. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server as well as unauthorized update,
  insert or delete access to some of MySQL Server accessible data (bsc#1076369)
- CVE-2018-2640: Vulnerability in the subcomponent: Server: Optimizer. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server (bsc#1076369)
- CVE-2018-2665: Vulnerability in the subcomponent: Server: Optimizer. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server.  Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server (bsc#1076369)
- CVE-2018-2668: Vulnerability in the subcomponent: Server: Optimizer. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server (bsc#1076369)

For additional changes please see http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-59.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-12"/>
	<updated date="2018-02-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-2562/">CVE-2018-2562 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2562">CVE-2018-2562 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2622/">CVE-2018-2622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2622">CVE-2018-2622 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2640/">CVE-2018-2640 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2640">CVE-2018-2640 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2665/">CVE-2018-2665 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2665">CVE-2018-2665 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2668/">CVE-2018-2668 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2668">CVE-2018-2668 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579141" comment="libmysql55client18-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579142" comment="libmysql55client18-32bit-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579143" comment="libmysql55client_r18-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579144" comment="mysql-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579145" comment="mysql-client-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579146" comment="mysql-tools-5.5.59-0.39.9.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219097" version="1" class="patch">
	<metadata>
		<title>security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1089987" ref_url="https://bugzilla.suse.com/1089987" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2755" ref_url="https://www.suse.com/security/cve/CVE-2018-2755/" source="CVE"/>
		<reference ref_id="CVE-2018-2761" ref_url="https://www.suse.com/security/cve/CVE-2018-2761/" source="CVE"/>
		<reference ref_id="CVE-2018-2771" ref_url="https://www.suse.com/security/cve/CVE-2018-2771/" source="CVE"/>
		<reference ref_id="CVE-2018-2773" ref_url="https://www.suse.com/security/cve/CVE-2018-2773/" source="CVE"/>
		<reference ref_id="CVE-2018-2781" ref_url="https://www.suse.com/security/cve/CVE-2018-2781/" source="CVE"/>
		<reference ref_id="CVE-2018-2813" ref_url="https://www.suse.com/security/cve/CVE-2018-2813/" source="CVE"/>
		<reference ref_id="CVE-2018-2817" ref_url="https://www.suse.com/security/cve/CVE-2018-2817/" source="CVE"/>
		<reference ref_id="CVE-2018-2818" ref_url="https://www.suse.com/security/cve/CVE-2018-2818/" source="CVE"/>
		<reference ref_id="CVE-2018-2819" ref_url="https://www.suse.com/security/cve/CVE-2018-2819/" source="CVE"/>
		<description>

  This update fixes the following issues:

  - Update to 5.5.60 in Oracle Apr2018 CPU (bsc#1089987).
  - CVE-2018-2761: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2755: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
  - CVE-2018-2781: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2819: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2818: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Security : Privileges). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2817: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2771: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Locking). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2813: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
  - CVE-2018-2773: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-18"/>
	<updated date="2018-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2755/">CVE-2018-2755 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2755">CVE-2018-2755 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2761/">CVE-2018-2761 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2761">CVE-2018-2761 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2771/">CVE-2018-2771 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2771">CVE-2018-2771 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2773/">CVE-2018-2773 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2773">CVE-2018-2773 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2781/">CVE-2018-2781 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2781">CVE-2018-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2813/">CVE-2018-2813 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2813">CVE-2018-2813 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2817/">CVE-2018-2817 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2817">CVE-2018-2817 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2818/">CVE-2018-2818 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2818">CVE-2018-2818 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2819/">CVE-2018-2819 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2819">CVE-2018-2819 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579147" comment="libmysql55client18-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579148" comment="libmysql55client18-32bit-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579149" comment="libmysql55client_r18-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579150" comment="mysql-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579151" comment="mysql-client-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579152" comment="mysql-tools-5.5.60-0.39.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219098" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1101676" ref_url="https://bugzilla.suse.com/1101676" source="BUGZILLA"/>
		<reference ref_id="1101677" ref_url="https://bugzilla.suse.com/1101677" source="BUGZILLA"/>
		<reference ref_id="1101678" ref_url="https://bugzilla.suse.com/1101678" source="BUGZILLA"/>
		<reference ref_id="1101679" ref_url="https://bugzilla.suse.com/1101679" source="BUGZILLA"/>
		<reference ref_id="1101680" ref_url="https://bugzilla.suse.com/1101680" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3058" ref_url="https://www.suse.com/security/cve/CVE-2018-3058/" source="CVE"/>
		<reference ref_id="CVE-2018-3063" ref_url="https://www.suse.com/security/cve/CVE-2018-3063/" source="CVE"/>
		<reference ref_id="CVE-2018-3066" ref_url="https://www.suse.com/security/cve/CVE-2018-3066/" source="CVE"/>
		<reference ref_id="CVE-2018-3070" ref_url="https://www.suse.com/security/cve/CVE-2018-3070/" source="CVE"/>
		<reference ref_id="CVE-2018-3081" ref_url="https://www.suse.com/security/cve/CVE-2018-3081/" source="CVE"/>
		<description>
This update for mysql to version 5.5.61 fixes the following issues:

The following security vulnerabilities were addressed:

- CVE-2018-3066: Fixed a difficult to exploit vulnerability that allowed high
  privileged attacker with network access via multiple protocols to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized update, insert or delete access to some of MySQL Server
  accessible data as well as unauthorized read access to a subset of MySQL
  Server accessible data. (bsc#1101678)

- CVE-2018-3070: Fixed an easily exploitable vulnerability that allowed low
  privileged attacker with network access via multiple protocols to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized ability to cause a hang or frequently repeatable crash
  (complete DOS) of MySQL Server. (bsc#1101679)

- CVE-2018-3081: Fixed a difficult to exploit vulnerability that allowed high
  privileged attacker with network access via multiple protocols to compromise
  MySQL Client. Successful attacks of this vulnerability can result in
  unauthorized ability to cause a hang or frequently repeatable crash
  (complete DOS) of MySQL Client as well as unauthorized update, insert or
  delete access to some of MySQL Client accessible data. (bsc#1101680)

- CVE-2018-3058: Fixed an easily exploitable vulnerability that allowed low
  privileged attacker with network access via multiple protocols to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized update, insert or delete access to some of MySQL Server
  accessible data. (bsc#1101676)

- CVE-2018-3063: Fixed an easily exploitable vulnerability allowed high
  privileged attacker with network access via multiple protocols to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized ability to cause a hang or frequently repeatable crash
  (complete DOS) of MySQL Server. (bsc#1101677)

 You can find more detailed information about this update in the
 [release notes](http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-61.html)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101676">SUSE bug 1101676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101677">SUSE bug 1101677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101678">SUSE bug 1101678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101679">SUSE bug 1101679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101680">SUSE bug 1101680</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3058/">CVE-2018-3058 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3058">CVE-2018-3058 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3063/">CVE-2018-3063 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3063">CVE-2018-3063 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3066/">CVE-2018-3066 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3066">CVE-2018-3066 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3070/">CVE-2018-3070 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3070">CVE-2018-3070 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3081/">CVE-2018-3081 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3081">CVE-2018-3081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579153" comment="libmysql55client18-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579154" comment="libmysql55client18-32bit-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579155" comment="libmysql55client_r18-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579156" comment="mysql-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579157" comment="mysql-client-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579158" comment="mysql-tools-5.5.61-0.39.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219099" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1013882" ref_url="https://bugzilla.suse.com/1013882" source="BUGZILLA"/>
		<reference ref_id="1112368" ref_url="https://bugzilla.suse.com/1112368" source="BUGZILLA"/>
		<reference ref_id="1112369" ref_url="https://bugzilla.suse.com/1112369" source="BUGZILLA"/>
		<reference ref_id="1112432" ref_url="https://bugzilla.suse.com/1112432" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2018-3133" ref_url="https://www.suse.com/security/cve/CVE-2018-3133/" source="CVE"/>
		<reference ref_id="CVE-2018-3174" ref_url="https://www.suse.com/security/cve/CVE-2018-3174/" source="CVE"/>
		<reference ref_id="CVE-2018-3282" ref_url="https://www.suse.com/security/cve/CVE-2018-3282/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004805.html" source="SUSE-SU"/>
		<description>

  
MySQL server was updated to version 5.5.62, fixing bugs and security issues.

Changes:

    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-62.html

Following security issues were fixed:

- CVE-2016-9843: The crc32_big function in zlib might have allowed context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation. (bsc#1013882)
  Please note that SUSE uses the system zlib, not the embedded copy.

- CVE-2018-3133: Authenticated low privilege attackers could cause denial of service attacks (hangs or crashes) against the mysql server (bsc#1112369)
- CVE-2018-3174: Authenticated high privilege attackers could cause denial of service attacks (hangs or crashes) against the mysql server (bsc#1112368)
- CVE-2018-3282: Authenticated high privilege attackers could cause denial of service attacks (hangs or crashes) against the mysql server (bsc#1112432)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-29"/>
	<updated date="2018-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112368">SUSE bug 1112368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112369">SUSE bug 1112369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112432">SUSE bug 1112432</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9843">CVE-2016-9843 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3133/">CVE-2018-3133 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3133">CVE-2018-3133 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3174/">CVE-2018-3174 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3174">CVE-2018-3174 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3282/">CVE-2018-3282 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3282">CVE-2018-3282 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579159" comment="libmysql55client18-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579160" comment="libmysql55client18-32bit-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579161" comment="libmysql55client_r18-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579162" comment="mysql-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579163" comment="mysql-client-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579164" comment="mysql-tools-5.5.62-0.39.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579159" comment="libmysql55client18-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579160" comment="libmysql55client18-32bit-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579161" comment="libmysql55client_r18-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579162" comment="mysql-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579163" comment="mysql-client-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579164" comment="mysql-tools-5.5.62-0.39.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219100" version="1" class="patch">
	<metadata>
		<title>Security update for nagios</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="856837" ref_url="https://bugzilla.suse.com/856837" source="BUGZILLA"/>
		<reference ref_id="864843" ref_url="https://bugzilla.suse.com/864843" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7108" ref_url="https://www.suse.com/security/cve/CVE-2013-7108/" source="CVE"/>
		<reference ref_id="CVE-2014-1878" ref_url="https://www.suse.com/security/cve/CVE-2014-1878/" source="CVE"/>
		<description>

The monitoring service Nagios has been updated to fix potential buffer 
overflows in its CGI scripts. (CVE-2014-1878)

Security Issue reference:

    * CVE-2014-1878
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1878&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-31"/>
	<updated date="2014-03-31"/>
	<bugzilla href="https://bugzilla.suse.com/856837">SUSE bug 856837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864843">SUSE bug 864843</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7108/">CVE-2013-7108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7108">CVE-2013-7108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1878/">CVE-2014-1878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1878">CVE-2014-1878 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579165" comment="nagios-3.0.6-1.25.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579166" comment="nagios-www-3.0.6-1.25.36.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579165" comment="nagios-3.0.6-1.25.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579166" comment="nagios-www-3.0.6-1.25.36.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579165" comment="nagios-3.0.6-1.25.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579166" comment="nagios-www-3.0.6-1.25.36.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219101" version="1" class="patch">
	<metadata>
		<title>Security update for nagios (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1011630" ref_url="https://bugzilla.suse.com/1011630" source="BUGZILLA"/>
		<reference ref_id="1018047" ref_url="https://bugzilla.suse.com/1018047" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10089" ref_url="https://www.suse.com/security/cve/CVE-2016-10089/" source="CVE"/>
		<reference ref_id="CVE-2016-8641" ref_url="https://www.suse.com/security/cve/CVE-2016-8641/" source="CVE"/>
		<description>
This update for nagios fixes the following issues:

- CVE-2016-8641 / CVE-2016-10089: fixed possible symlink attacks for files/directories created by root (bsc#1011630 / bsc#1018047)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-19"/>
	<updated date="2018-10-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011630">SUSE bug 1011630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018047">SUSE bug 1018047</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10089/">CVE-2016-10089 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10089">CVE-2016-10089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8641/">CVE-2016-8641 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8641">CVE-2016-8641 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572724" comment="nagios-3.0.6-1.25.36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572725" comment="nagios-www-3.0.6-1.25.36.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219102" version="1" class="patch">
	<metadata>
		<title>Security update for nagios (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1014637" ref_url="https://bugzilla.suse.com/1014637" source="BUGZILLA"/>
		<reference ref_id="1054163" ref_url="https://bugzilla.suse.com/1054163" source="BUGZILLA"/>
		<reference ref_id="1114767" ref_url="https://bugzilla.suse.com/1114767" source="BUGZILLA"/>
		<reference ref_id="1119832" ref_url="https://bugzilla.suse.com/1119832" source="BUGZILLA"/>
		<reference ref_id="1156309" ref_url="https://bugzilla.suse.com/1156309" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9566" ref_url="https://www.suse.com/security/cve/CVE-2016-9566/" source="CVE"/>
		<reference ref_id="CVE-2017-12847" ref_url="https://www.suse.com/security/cve/CVE-2017-12847/" source="CVE"/>
		<reference ref_id="CVE-2018-18245" ref_url="https://www.suse.com/security/cve/CVE-2018-18245/" source="CVE"/>
		<reference ref_id="CVE-2019-3698" ref_url="https://www.suse.com/security/cve/CVE-2019-3698/" source="CVE"/>
		<description>
This update for nagios fixes the following issues:

- CVE-2016-9566: Fixed a root privilege escalation (bsc#1014637).
- CVE-2019-3698: Fixed a symbolic link vulnerability inside the cronjob, that allowed local attacker to cause a denial of service or pentential privilege escalation (bsc#1156309).
- CVE-2017-12847: Fixed a privilege escalation via PID file manipulation (bsc#1054163).
- CVE-2018-18245: Fixed a XSS vulnerability inside the alert summary report (bsc#1119832).

- Prevent log rotation to be repeatedly scheduled to the same time on a DST change (bsc#1114767).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-13"/>
	<updated date="2022-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014637">SUSE bug 1014637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054163">SUSE bug 1054163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114767">SUSE bug 1114767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119832">SUSE bug 1119832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156309">SUSE bug 1156309</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9566/">CVE-2016-9566 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9566">CVE-2016-9566 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12847/">CVE-2017-12847 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12847">CVE-2017-12847 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-18245/">CVE-2018-18245 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18245">CVE-2018-18245 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3698/">CVE-2019-3698 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3698">CVE-2019-3698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993697" comment="nagios-3.0.6-1.25.36.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993698" comment="nagios-www-3.0.6-1.25.36.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219103" version="1" class="patch">
	<metadata>
		<title>Security update for nagios-nrpe, nagios-nrpe-debuginfo, nagios-nrpe-debugsource, nagios-nrpe-doc, nagios-plugins-nrpe</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="807241" ref_url="https://bugzilla.suse.com/807241" source="BUGZILLA"/>
		<reference ref_id="874743" ref_url="https://bugzilla.suse.com/874743" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1362" ref_url="https://www.suse.com/security/cve/CVE-2013-1362/" source="CVE"/>
		<reference ref_id="CVE-2014-2913" ref_url="https://www.suse.com/security/cve/CVE-2014-2913/" source="CVE"/>
		<description>

nagios-nrpe has been updated to prevent possible remote command execution 
when command arguments are enabled. This issue affects versions 2.15 and 
older.

Further information is available at
http://seclists.org/fulldisclosure/2014/Apr/240
&lt;http://seclists.org/fulldisclosure/2014/Apr/240&gt;

These security issues have been fixed:

    * Remote command execution (CVE-2014-2913)

Security Issue references:

    * CVE-2014-2913
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2913&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-06"/>
	<updated date="2014-05-06"/>
	<bugzilla href="https://bugzilla.suse.com/807241">SUSE bug 807241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/874743">SUSE bug 874743</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1362/">CVE-2013-1362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1362">CVE-2013-1362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2913/">CVE-2014-2913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2913">CVE-2014-2913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579167" comment="nagios-nrpe-2.12-24.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579168" comment="nagios-nrpe-doc-2.12-24.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579169" comment="nagios-plugins-nrpe-2.12-24.4.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579167" comment="nagios-nrpe-2.12-24.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579168" comment="nagios-nrpe-doc-2.12-24.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579169" comment="nagios-plugins-nrpe-2.12-24.4.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579167" comment="nagios-nrpe-2.12-24.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579168" comment="nagios-nrpe-doc-2.12-24.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579169" comment="nagios-plugins-nrpe-2.12-24.4.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219104" version="1" class="patch">
	<metadata>
		<title>Security update for nagios-nrpe (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="938906" ref_url="https://bugzilla.suse.com/938906" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>
This update for nagios-nrpe fixes one issue.

This security issue was fixed:

- CVE-2015-4000: Prevent Logjam. The TLS protocol 1.2 and earlier, when a
  DHE_EXPORT ciphersuite is enabled on a server but not on a client, did not
  properly convey a DHE_EXPORT choice, which allowed man-in-the-middle attackers
  to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE
  replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT
  replaced by DHE (bsc#938906).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-20"/>
	<updated date="2018-06-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/938906">SUSE bug 938906</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572726" comment="nagios-nrpe-2.12-24.4.10.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572727" comment="nagios-nrpe-doc-2.12-24.4.10.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572728" comment="nagios-plugins-nrpe-2.12-24.4.10.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219105" version="1" class="patch">
	<metadata>
		<title>Security update for nagios-plugins</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="885205" ref_url="https://bugzilla.suse.com/885205" source="BUGZILLA"/>
		<reference ref_id="885207" ref_url="https://bugzilla.suse.com/885207" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4701" ref_url="https://www.suse.com/security/cve/CVE-2014-4701/" source="CVE"/>
		<reference ref_id="CVE-2014-4702" ref_url="https://www.suse.com/security/cve/CVE-2014-4702/" source="CVE"/>
		<description>

This security update fixes the following issues:

    * Removed the requirement for root access from
      plugins-root/check_icmp.c and plugins-root/check_icmp.c. The
      necessary capabilities(7) were added to the README file.
    * Fixed array out of bounds issue in plugins-root/check_dhcp.c.

Security Issues:

    * CVE-2014-4701
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4701&gt;
    * CVE-2014-4702
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4702&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-02"/>
	<updated date="2014-10-02"/>
	<bugzilla href="https://bugzilla.suse.com/885205">SUSE bug 885205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885207">SUSE bug 885207</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4701/">CVE-2014-4701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4701">CVE-2014-4701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4702/">CVE-2014-4702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4702">CVE-2014-4702 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579170" comment="nagios-plugins-1.4.16-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579171" comment="nagios-plugins-extras-1.4.16-0.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579170" comment="nagios-plugins-1.4.16-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579171" comment="nagios-plugins-extras-1.4.16-0.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579170" comment="nagios-plugins-1.4.16-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579171" comment="nagios-plugins-extras-1.4.16-0.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219106" version="1" class="patch">
	<metadata>
		<title>Security update for nautilus (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1060031" ref_url="https://bugzilla.suse.com/1060031" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14604" ref_url="https://www.suse.com/security/cve/CVE-2017-14604/" source="CVE"/>
		<description>
This update for nautilus fixes the following security issue:

- CVE-2017-14604: Fixed a file type spoofing attack by adding a
  metadata::trusted attribute to a file once the user acknowledges the file as
  trusted, and also remove the 'trusted' content in the desktop file
  (bsc#1060031).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-14"/>
	<updated date="2018-06-14"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1060031">SUSE bug 1060031</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14604/">CVE-2017-14604 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14604">CVE-2017-14604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572729" comment="nautilus-2.28.4-1.16.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572730" comment="nautilus-32bit-2.28.4-1.16.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572731" comment="nautilus-lang-2.28.4-1.16.21.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219107" version="1" class="patch">
	<metadata>
		<title>Recommended update for ncurses (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1046853" ref_url="https://bugzilla.suse.com/1046853" source="BUGZILLA"/>
		<reference ref_id="1046858" ref_url="https://bugzilla.suse.com/1046858" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10684" ref_url="https://www.suse.com/security/cve/CVE-2017-10684/" source="CVE"/>
		<reference ref_id="CVE-2017-10685" ref_url="https://www.suse.com/security/cve/CVE-2017-10685/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:
- CVE-2017-10684: Possible RCE via stack-based buffer overflow in the fmt_entry function. (bsc#1046858)
- CVE-2017-10685: Possible RCE with format string vulnerability in the fmt_entry function. (bsc#1046853)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-06"/>
	<updated date="2017-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046853">SUSE bug 1046853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046858">SUSE bug 1046858</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10684/">CVE-2017-10684 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10684">CVE-2017-10684 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10685/">CVE-2017-10685 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10685">CVE-2017-10685 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572732" comment="libncurses5-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572733" comment="libncurses5-32bit-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572734" comment="libncurses6-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572735" comment="libncurses6-32bit-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572736" comment="ncurses-devel-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565005" comment="ncurses-devel-32bit-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572737" comment="ncurses-utils-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572738" comment="tack-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572739" comment="terminfo-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572740" comment="terminfo-base-5.6-92.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219108" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1046853" ref_url="https://bugzilla.suse.com/1046853" source="BUGZILLA"/>
		<reference ref_id="1046858" ref_url="https://bugzilla.suse.com/1046858" source="BUGZILLA"/>
		<reference ref_id="1047964" ref_url="https://bugzilla.suse.com/1047964" source="BUGZILLA"/>
		<reference ref_id="1047965" ref_url="https://bugzilla.suse.com/1047965" source="BUGZILLA"/>
		<reference ref_id="1049344" ref_url="https://bugzilla.suse.com/1049344" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10684" ref_url="https://www.suse.com/security/cve/CVE-2017-10684/" source="CVE"/>
		<reference ref_id="CVE-2017-10685" ref_url="https://www.suse.com/security/cve/CVE-2017-10685/" source="CVE"/>
		<reference ref_id="CVE-2017-11112" ref_url="https://www.suse.com/security/cve/CVE-2017-11112/" source="CVE"/>
		<reference ref_id="CVE-2017-11113" ref_url="https://www.suse.com/security/cve/CVE-2017-11113/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:
- CVE-2017-11112: Illegal address access in append_acs. (bsc#1047964)
- CVE-2017-11113: Dereferencing NULL pointer in _nc_parse_entry. (bsc#1047965)
- CVE-2017-10684, CVE-2017-10685: Add modified upstream fix from ncurses 6.0 to avoid broken
  termcap format (bsc#1046853, bsc#1046858, bsc#1049344)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-07"/>
	<updated date="2017-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046853">SUSE bug 1046853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046858">SUSE bug 1046858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047964">SUSE bug 1047964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047965">SUSE bug 1047965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049344">SUSE bug 1049344</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10684/">CVE-2017-10684 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10684">CVE-2017-10684 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10685/">CVE-2017-10685 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10685">CVE-2017-10685 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11112/">CVE-2017-11112 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11112">CVE-2017-11112 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11113/">CVE-2017-11113 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11113">CVE-2017-11113 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572741" comment="libncurses5-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572742" comment="libncurses5-32bit-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572743" comment="libncurses6-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572744" comment="libncurses6-32bit-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572745" comment="ncurses-devel-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565008" comment="ncurses-devel-32bit-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572746" comment="ncurses-utils-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572747" comment="tack-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572748" comment="terminfo-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572749" comment="terminfo-base-5.6-93.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219109" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1056127" ref_url="https://bugzilla.suse.com/1056127" source="BUGZILLA"/>
		<reference ref_id="1056128" ref_url="https://bugzilla.suse.com/1056128" source="BUGZILLA"/>
		<reference ref_id="1056129" ref_url="https://bugzilla.suse.com/1056129" source="BUGZILLA"/>
		<reference ref_id="1056131" ref_url="https://bugzilla.suse.com/1056131" source="BUGZILLA"/>
		<reference ref_id="1056132" ref_url="https://bugzilla.suse.com/1056132" source="BUGZILLA"/>
		<reference ref_id="1056136" ref_url="https://bugzilla.suse.com/1056136" source="BUGZILLA"/>
		<reference ref_id="1069530" ref_url="https://bugzilla.suse.com/1069530" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13728" ref_url="https://www.suse.com/security/cve/CVE-2017-13728/" source="CVE"/>
		<reference ref_id="CVE-2017-13729" ref_url="https://www.suse.com/security/cve/CVE-2017-13729/" source="CVE"/>
		<reference ref_id="CVE-2017-13730" ref_url="https://www.suse.com/security/cve/CVE-2017-13730/" source="CVE"/>
		<reference ref_id="CVE-2017-13731" ref_url="https://www.suse.com/security/cve/CVE-2017-13731/" source="CVE"/>
		<reference ref_id="CVE-2017-13732" ref_url="https://www.suse.com/security/cve/CVE-2017-13732/" source="CVE"/>
		<reference ref_id="CVE-2017-13733" ref_url="https://www.suse.com/security/cve/CVE-2017-13733/" source="CVE"/>
		<reference ref_id="CVE-2017-16879" ref_url="https://www.suse.com/security/cve/CVE-2017-16879/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:

- CVE-2017-13728: Fix infinite loop in the next_char function in comp_scan.c (bsc#1056136).
- CVE-2017-13729: Fix illegal address access in the _nc_save_str (bsc#1056132).
- CVE-2017-13730: Fix illegal address access in the function _nc_read_entry_source() (bsc#1056131).
- CVE-2017-13731: Fix illegal address access in the function postprocess_termcap() (bsc#1056129).
- CVE-2017-13732: Fix illegal address access in the function dump_uses() (bsc#1056128).
- CVE-2017-13733: Fix illegal address access in the fmt_entry function (bsc#1056127).
- CVE-2017-16879: Fix stack-based buffer overflow in the _nc_write_entry() function (bsc#1069530).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-01"/>
	<updated date="2017-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056127">SUSE bug 1056127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056128">SUSE bug 1056128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056129">SUSE bug 1056129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056131">SUSE bug 1056131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056132">SUSE bug 1056132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056136">SUSE bug 1056136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069530">SUSE bug 1069530</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13728/">CVE-2017-13728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13728">CVE-2017-13728 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13729/">CVE-2017-13729 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13729">CVE-2017-13729 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13730/">CVE-2017-13730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13730">CVE-2017-13730 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13731/">CVE-2017-13731 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13731">CVE-2017-13731 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13732/">CVE-2017-13732 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13732">CVE-2017-13732 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13733/">CVE-2017-13733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13733">CVE-2017-13733 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16879/">CVE-2017-16879 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16879">CVE-2017-16879 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572750" comment="libncurses5-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572751" comment="libncurses5-32bit-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572752" comment="libncurses6-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572753" comment="libncurses6-32bit-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572754" comment="ncurses-devel-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565011" comment="ncurses-devel-32bit-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572755" comment="ncurses-utils-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572756" comment="tack-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572757" comment="terminfo-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572758" comment="terminfo-base-5.6-93.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219110" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1056127" ref_url="https://bugzilla.suse.com/1056127" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13733" ref_url="https://www.suse.com/security/cve/CVE-2017-13733/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

Security issue fixed:

- CVE-2017-13733: Fix illegal address access in the fmt_entry function (bsc#1056127).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-23"/>
	<updated date="2018-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056127">SUSE bug 1056127</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13733/">CVE-2017-13733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13733">CVE-2017-13733 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572759" comment="libncurses5-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572760" comment="libncurses5-32bit-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572761" comment="libncurses6-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572762" comment="libncurses6-32bit-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572763" comment="ncurses-devel-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565014" comment="ncurses-devel-32bit-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572764" comment="ncurses-utils-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572765" comment="tack-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572766" comment="terminfo-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572767" comment="terminfo-base-5.6-93.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219111" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1056126" ref_url="https://bugzilla.suse.com/1056126" source="BUGZILLA"/>
		<reference ref_id="1056127" ref_url="https://bugzilla.suse.com/1056127" source="BUGZILLA"/>
		<reference ref_id="1056128" ref_url="https://bugzilla.suse.com/1056128" source="BUGZILLA"/>
		<reference ref_id="1056129" ref_url="https://bugzilla.suse.com/1056129" source="BUGZILLA"/>
		<reference ref_id="1056131" ref_url="https://bugzilla.suse.com/1056131" source="BUGZILLA"/>
		<reference ref_id="1056132" ref_url="https://bugzilla.suse.com/1056132" source="BUGZILLA"/>
		<reference ref_id="1056136" ref_url="https://bugzilla.suse.com/1056136" source="BUGZILLA"/>
		<reference ref_id="1131830" ref_url="https://bugzilla.suse.com/1131830" source="BUGZILLA"/>
		<reference ref_id="1154037" ref_url="https://bugzilla.suse.com/1154037" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13728" ref_url="https://www.suse.com/security/cve/CVE-2017-13728/" source="CVE"/>
		<reference ref_id="CVE-2017-13729" ref_url="https://www.suse.com/security/cve/CVE-2017-13729/" source="CVE"/>
		<reference ref_id="CVE-2017-13730" ref_url="https://www.suse.com/security/cve/CVE-2017-13730/" source="CVE"/>
		<reference ref_id="CVE-2017-13731" ref_url="https://www.suse.com/security/cve/CVE-2017-13731/" source="CVE"/>
		<reference ref_id="CVE-2017-13732" ref_url="https://www.suse.com/security/cve/CVE-2017-13732/" source="CVE"/>
		<reference ref_id="CVE-2017-13733" ref_url="https://www.suse.com/security/cve/CVE-2017-13733/" source="CVE"/>
		<reference ref_id="CVE-2017-13734" ref_url="https://www.suse.com/security/cve/CVE-2017-13734/" source="CVE"/>
		<reference ref_id="CVE-2018-10754" ref_url="https://www.suse.com/security/cve/CVE-2018-10754/" source="CVE"/>
		<reference ref_id="CVE-2019-17595" ref_url="https://www.suse.com/security/cve/CVE-2019-17595/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:

- CVE-2017-13728: Fixed an infinite loop in the next_char function (bsc#1056136).
- CVE-2017-13729: Fixed an illegal address access in the _nc_save_str (bsc#1056132).
- CVE-2017-13730: Fixed an illegal address access in the function _nc_read_entry_source (bsc#1056131).
- CVE-2017-13731: Fixed an illegal address access in the function postprocess_termcap (bsc#1056129).
- CVE-2017-13732: Fixed an illegal address access in the function dump_uses (bsc#1056128).
- CVE-2017-13733: Fixed an illegal address access in the fmt_entry function (bsc#1056127).
- CVE-2017-13734: Fixed an illegal address access in the _nc_safe_strcat (bsc#1056126).
- CVE-2018-10754: Fixed a denial of service caused by a NULL Pointer Dereference in the _nc_parse_entry() (bsc#1131830).
- CVE-2019-17595: Fixed a heap-based buffer over-read in the fmt_entry function (bsc#1154037)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056126">SUSE bug 1056126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056127">SUSE bug 1056127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056128">SUSE bug 1056128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056129">SUSE bug 1056129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056131">SUSE bug 1056131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056132">SUSE bug 1056132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056136">SUSE bug 1056136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131830">SUSE bug 1131830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154037">SUSE bug 1154037</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13728/">CVE-2017-13728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13728">CVE-2017-13728 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13729/">CVE-2017-13729 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13729">CVE-2017-13729 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13730/">CVE-2017-13730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13730">CVE-2017-13730 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13731/">CVE-2017-13731 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13731">CVE-2017-13731 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13732/">CVE-2017-13732 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13732">CVE-2017-13732 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13733/">CVE-2017-13733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13733">CVE-2017-13733 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13734/">CVE-2017-13734 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13734">CVE-2017-13734 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10754/">CVE-2018-10754 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10754">CVE-2018-10754 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17595/">CVE-2019-17595 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17595">CVE-2019-17595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572768" comment="libncurses5-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572769" comment="libncurses5-32bit-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572770" comment="libncurses6-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572771" comment="libncurses6-32bit-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572772" comment="ncurses-devel-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572773" comment="ncurses-devel-32bit-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572774" comment="ncurses-utils-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572775" comment="tack-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572776" comment="terminfo-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572777" comment="terminfo-base-5.6-93.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219112" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1115929" ref_url="https://bugzilla.suse.com/1115929" source="BUGZILLA"/>
		<reference ref_id="1121450" ref_url="https://bugzilla.suse.com/1121450" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19211" ref_url="https://www.suse.com/security/cve/CVE-2018-19211/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

Security issue fixed:

- CVE-2018-19211: Fixed NULL pointer dereference at function _nc_parse_entry in parse_entry.c (bsc#1115929).

Bug fixes:

- Modify bsc#1115929 patch to fix change in form_driver() that breaks ncurses-5.9 and the variable move_after_insert of ncurses-6.1 (bsc#1121450).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-11"/>
	<updated date="2019-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115929">SUSE bug 1115929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121450">SUSE bug 1121450</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19211/">CVE-2018-19211 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19211">CVE-2018-19211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572778" comment="libncurses5-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572779" comment="libncurses5-32bit-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572780" comment="libncurses6-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572781" comment="libncurses6-32bit-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572782" comment="ncurses-devel-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572783" comment="ncurses-devel-32bit-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572784" comment="ncurses-utils-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572785" comment="tack-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572786" comment="terminfo-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572787" comment="terminfo-base-5.6-93.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219113" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1190793" ref_url="https://bugzilla.suse.com/1190793" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39537" ref_url="https://www.suse.com/security/cve/CVE-2021-39537/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

- CVE-2021-39537: Fixed an heap-based buffer overflow in _nc_captoinfo. (bsc#1190793)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-18"/>
	<updated date="2021-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190793">SUSE bug 1190793</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39537/">CVE-2021-39537 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">CVE-2021-39537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652290" comment="libncurses5-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652291" comment="libncurses5-32bit-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652292" comment="libncurses6-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652293" comment="libncurses6-32bit-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652294" comment="ncurses-devel-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652295" comment="ncurses-devel-32bit-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652296" comment="ncurses-utils-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652297" comment="tack-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652298" comment="terminfo-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652299" comment="terminfo-base-5.6-93.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219114" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210434" ref_url="https://bugzilla.suse.com/1210434" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-29491" ref_url="https://www.suse.com/security/cve/CVE-2023-29491/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

- CVE-2023-29491: Fixed memory corruption issues when processing malformed terminfo data (bsc#1210434).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-03"/>
	<updated date="2023-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210434">SUSE bug 1210434</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-29491/">CVE-2023-29491 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29491">CVE-2023-29491 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993699" comment="libncurses5-5.6-93.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993700" comment="libncurses5-32bit-5.6-93.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993701" comment="libncurses6-5.6-93.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993702" comment="libncurses6-32bit-5.6-93.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993703" comment="ncurses-devel-5.6-93.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993704" comment="ncurses-devel-32bit-5.6-93.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993705" comment="ncurses-utils-5.6-93.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993706" comment="tack-5.6-93.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993707" comment="terminfo-5.6-93.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993708" comment="terminfo-base-5.6-93.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219115" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="853382" ref_url="https://bugzilla.suse.com/853382" source="BUGZILLA"/>
		<reference ref_id="935863" ref_url="https://bugzilla.suse.com/935863" source="BUGZILLA"/>
		<reference ref_id="940188" ref_url="https://bugzilla.suse.com/940188" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001585.html" source="SUSE-SU"/>
		<description>
net-snmp was updated to fix one security vulnerability and several bugs.

- fix a vulnerability within the snmp_pdu_parse() function of snmp_api.c. (bnc#940188, CVE-2015-5621) 
- Add build requirement 'procps' to fix a net-snmp-config error. (bsc#935863)
- add support for /dev/shm in snmp hostmib (bnc#853382, FATE#316893).
- stop snmptrapd on package removal.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-17"/>
	<updated date="2015-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/853382">SUSE bug 853382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935863">SUSE bug 935863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940188">SUSE bug 940188</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5621">CVE-2015-5621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579172" comment="libsnmp15-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579173" comment="libsnmp15-32bit-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579174" comment="libsnmp15-x86-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579175" comment="net-snmp-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579176" comment="perl-SNMP-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579177" comment="snmp-mibs-5.4.2.1-8.12.24.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579172" comment="libsnmp15-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579173" comment="libsnmp15-32bit-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579174" comment="libsnmp15-x86-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579175" comment="net-snmp-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579176" comment="perl-SNMP-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579177" comment="snmp-mibs-5.4.2.1-8.12.24.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579172" comment="libsnmp15-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579173" comment="libsnmp15-32bit-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579174" comment="libsnmp15-x86-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579175" comment="net-snmp-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579176" comment="perl-SNMP-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579177" comment="snmp-mibs-5.4.2.1-8.12.24.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219116" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174961" ref_url="https://bugzilla.suse.com/1174961" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15862" ref_url="https://www.suse.com/security/cve/CVE-2020-15862/" source="CVE"/>
		<description>
This update for net-snmp fixes the following issues:

- CVE-2020-15862: Fixed a privilege escalation issue (bsc#1174961).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-04"/>
	<updated date="2022-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174961">SUSE bug 1174961</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15862/">CVE-2020-15862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15862">CVE-2020-15862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993709" comment="libsnmp15-5.4.2.1-8.12.32.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993710" comment="libsnmp15-32bit-5.4.2.1-8.12.32.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993711" comment="libsnmp15-openssl1-5.4.2.1-8.12.32.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993712" comment="libsnmp15-openssl1-32bit-5.4.2.1-8.12.32.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993713" comment="net-snmp-5.4.2.1-8.12.32.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993714" comment="perl-SNMP-5.4.2.1-8.12.32.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993715" comment="snmp-mibs-5.4.2.1-8.12.32.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219117" version="1" class="patch">
	<metadata>
		<title>Security update for netpbm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1024287" ref_url="https://bugzilla.suse.com/1024287" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2581" ref_url="https://www.suse.com/security/cve/CVE-2017-2581/" source="CVE"/>
		<description>
This update for netpbm fixes the following security issues:

- CVE-2017-2581: An out-of-bounds write in writeRasterPbm() could lead to memory corruption and potential code execution. (bsc#1024287)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-15"/>
	<updated date="2017-06-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024287">SUSE bug 1024287</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2581/">CVE-2017-2581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2581">CVE-2017-2581 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572792" comment="libnetpbm10-10.26.44-101.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572793" comment="libnetpbm10-32bit-10.26.44-101.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572794" comment="netpbm-10.26.44-101.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219118" version="1" class="patch">
	<metadata>
		<title>Security update for netpbm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1024288" ref_url="https://bugzilla.suse.com/1024288" source="BUGZILLA"/>
		<reference ref_id="1024291" ref_url="https://bugzilla.suse.com/1024291" source="BUGZILLA"/>
		<reference ref_id="1136936" ref_url="https://bugzilla.suse.com/1136936" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2579" ref_url="https://www.suse.com/security/cve/CVE-2017-2579/" source="CVE"/>
		<reference ref_id="CVE-2017-2580" ref_url="https://www.suse.com/security/cve/CVE-2017-2580/" source="CVE"/>
		<description>
This update for netpbm fixes the following issues:

Security issues fixed:

- CVE-2017-2579: Fixed out-of-bounds read in expandCodeOntoStack() (bsc#1024288).
- CVE-2017-2580: Fixed out-of-bounds write of heap data in addPixelToRaster() function (bsc#1024291).
- created a netpbm-vulnerable subpackage and move pstopnm there, as it uses ghostscript for conversion (bsc#1136936)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024288">SUSE bug 1024288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024291">SUSE bug 1024291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136936">SUSE bug 1136936</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2579/">CVE-2017-2579 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2579">CVE-2017-2579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2580/">CVE-2017-2580 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2580">CVE-2017-2580 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572795" comment="libnetpbm10-10.26.44-101.15.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572796" comment="libnetpbm10-32bit-10.26.44-101.15.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572797" comment="netpbm-10.26.44-101.15.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219119" version="1" class="patch">
	<metadata>
		<title>Security update for nmap (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1104139" ref_url="https://bugzilla.suse.com/1104139" source="BUGZILLA"/>
		<reference ref_id="1135350" ref_url="https://bugzilla.suse.com/1135350" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15173" ref_url="https://www.suse.com/security/cve/CVE-2018-15173/" source="CVE"/>
		<description>
This update for nmap fixes the following issues:

Security issue fixed:

- CVE-2018-15173: Fixed a remote denial of service attack via a crafted TCP-based service (bsc#1104139).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-20"/>
	<updated date="2019-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104139">SUSE bug 1104139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135350">SUSE bug 1135350</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15173/">CVE-2018-15173 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15173">CVE-2018-15173 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572798" comment="nmap-4.75-1.30.5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219120" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="850148" ref_url="https://bugzilla.suse.com/850148" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1741" ref_url="https://www.suse.com/security/cve/CVE-2013-1741/" source="CVE"/>
		<reference ref_id="CVE-2013-5605" ref_url="https://www.suse.com/security/cve/CVE-2013-5605/" source="CVE"/>
		<reference ref_id="CVE-2013-5606" ref_url="https://www.suse.com/security/cve/CVE-2013-5606/" source="CVE"/>
		<reference ref_id="CVE-2013-5607" ref_url="https://www.suse.com/security/cve/CVE-2013-5607/" source="CVE"/>
		<description>

Mozilla NSPR and NSS were updated to fix various security bugs that could 
be used to crash the browser or potentially execute code.

Mozilla NSPR 4.10.2 has the following bug fixes:

    * Bug 770534: Possible pointer overflow in PL_ArenaAllocate(). Fixed by
      Pascal Cuoq and Kamil Dudka.
    * Bug 888546: ptio.c:PR_ImportUDPSocket doesn't work. Fixed by Miloslav
      Trmac.
    * Bug 915522: VS2013 support for NSPR. Fixed by Makoto Kato.
    * Bug 927687: Avoid unsigned integer wrapping in PL_ArenaAllocate.
      (CVE-2013-5607)

Mozilla NSS 3.15.3 is a patch release for NSS 3.15 and includes the 
following bug fixes:

    * Bug 925100: Ensure a size is &lt;= half of the maximum PRUint32 value.
      (CVE-2013-1741)
    * Bug 934016: Handle invalid handshake packets. (CVE-2013-5605)
    * Bug 910438: Return the correct result in CERT_VerifyCert on failure,
      if a verifyLog isn't used. (CVE-2013-5606)

Security Issue references:

    * CVE-2013-1741
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741&gt;
    * CVE-2013-5605
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605&gt;
    * CVE-2013-5606
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606&gt;
    * CVE-2013-5607
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5607&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-21"/>
	<updated date="2013-11-21"/>
	<bugzilla href="https://bugzilla.suse.com/850148">SUSE bug 850148</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1741/">CVE-2013-1741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1741">CVE-2013-1741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5605/">CVE-2013-5605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5605">CVE-2013-5605 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5606/">CVE-2013-5606 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5606">CVE-2013-5606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5607/">CVE-2013-5607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5607">CVE-2013-5607 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579178" comment="libfreebl3-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579179" comment="libfreebl3-32bit-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579180" comment="libfreebl3-x86-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579181" comment="libsoftokn3-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579182" comment="libsoftokn3-32bit-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579183" comment="libsoftokn3-x86-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576562" comment="mozilla-nspr-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576563" comment="mozilla-nspr-32bit-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576564" comment="mozilla-nspr-x86-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579184" comment="mozilla-nss-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579185" comment="mozilla-nss-32bit-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579186" comment="mozilla-nss-tools-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579187" comment="mozilla-nss-x86-3.15.3-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579178" comment="libfreebl3-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579179" comment="libfreebl3-32bit-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579180" comment="libfreebl3-x86-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579181" comment="libsoftokn3-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579182" comment="libsoftokn3-32bit-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579183" comment="libsoftokn3-x86-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576562" comment="mozilla-nspr-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576563" comment="mozilla-nspr-32bit-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576564" comment="mozilla-nspr-x86-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579184" comment="mozilla-nss-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579185" comment="mozilla-nss-32bit-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579186" comment="mozilla-nss-tools-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579187" comment="mozilla-nss-x86-3.15.3-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579178" comment="libfreebl3-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579179" comment="libfreebl3-32bit-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579180" comment="libfreebl3-x86-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579181" comment="libsoftokn3-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579182" comment="libsoftokn3-32bit-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579183" comment="libsoftokn3-x86-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576562" comment="mozilla-nspr-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576563" comment="mozilla-nspr-32bit-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576564" comment="mozilla-nspr-x86-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579184" comment="mozilla-nss-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579185" comment="mozilla-nss-32bit-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579186" comment="mozilla-nss-tools-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579187" comment="mozilla-nss-x86-3.15.3-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219121" version="1" class="patch">
	<metadata>
		<title>Recommended update for ntp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="838458" ref_url="https://bugzilla.suse.com/838458" source="BUGZILLA"/>
		<reference ref_id="857195" ref_url="https://bugzilla.suse.com/857195" source="BUGZILLA"/>
		<reference ref_id="883859" ref_url="https://bugzilla.suse.com/883859" source="BUGZILLA"/>
		<reference ref_id="887957" ref_url="https://bugzilla.suse.com/887957" source="BUGZILLA"/>
		<reference ref_id="910764" ref_url="https://bugzilla.suse.com/910764" source="BUGZILLA"/>
		<reference ref_id="911792" ref_url="https://bugzilla.suse.com/911792" source="BUGZILLA"/>
		<reference ref_id="924202" ref_url="https://bugzilla.suse.com/924202" source="BUGZILLA"/>
		<reference ref_id="928321" ref_url="https://bugzilla.suse.com/928321" source="BUGZILLA"/>
		<reference ref_id="935409" ref_url="https://bugzilla.suse.com/935409" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5211" ref_url="https://www.suse.com/security/cve/CVE-2013-5211/" source="CVE"/>
		<reference ref_id="CVE-2014-9293" ref_url="https://www.suse.com/security/cve/CVE-2014-9293/" source="CVE"/>
		<reference ref_id="CVE-2014-9294" ref_url="https://www.suse.com/security/cve/CVE-2014-9294/" source="CVE"/>
		<reference ref_id="CVE-2014-9295" ref_url="https://www.suse.com/security/cve/CVE-2014-9295/" source="CVE"/>
		<reference ref_id="CVE-2014-9297" ref_url="https://www.suse.com/security/cve/CVE-2014-9297/" source="CVE"/>
		<reference ref_id="CVE-2014-9298" ref_url="https://www.suse.com/security/cve/CVE-2014-9298/" source="CVE"/>
		<reference ref_id="CVE-2015-1799" ref_url="https://www.suse.com/security/cve/CVE-2015-1799/" source="CVE"/>
		<reference ref_id="CVE-2015-3405" ref_url="https://www.suse.com/security/cve/CVE-2015-3405/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001470.html" source="SUSE-SU"/>
		<description>

This update for ntp provides the following fixes:

    * Respect NTPD_FORCE_SYNC_ON_STARTUP also for dynamic peers.
      (bnc#887957)
    * Fix orphan mode. (bnc#883859)

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-18"/>
	<updated date="2014-11-18"/>
	<bugzilla href="https://bugzilla.suse.com/838458">SUSE bug 838458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857195">SUSE bug 857195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883859">SUSE bug 883859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887957">SUSE bug 887957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910764">SUSE bug 910764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924202">SUSE bug 924202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928321">SUSE bug 928321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935409">SUSE bug 935409</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5211/">CVE-2013-5211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5211">CVE-2013-5211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9293/">CVE-2014-9293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9293">CVE-2014-9293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9294/">CVE-2014-9294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9294">CVE-2014-9294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9295/">CVE-2014-9295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9295">CVE-2014-9295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9297/">CVE-2014-9297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9297">CVE-2014-9297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9298/">CVE-2014-9298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9298">CVE-2014-9298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1799/">CVE-2015-1799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1799">CVE-2015-1799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3405/">CVE-2015-3405 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3405">CVE-2015-3405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993716" comment="ntp-4.2.4p8-1.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993717" comment="ntp-doc-4.2.4p8-1.26.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993716" comment="ntp-4.2.4p8-1.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993717" comment="ntp-doc-4.2.4p8-1.26.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993716" comment="ntp-4.2.4p8-1.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993717" comment="ntp-doc-4.2.4p8-1.26.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219122" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="782060" ref_url="https://bugzilla.suse.com/782060" source="BUGZILLA"/>
		<reference ref_id="784760" ref_url="https://bugzilla.suse.com/784760" source="BUGZILLA"/>
		<reference ref_id="905885" ref_url="https://bugzilla.suse.com/905885" source="BUGZILLA"/>
		<reference ref_id="910063" ref_url="https://bugzilla.suse.com/910063" source="BUGZILLA"/>
		<reference ref_id="916617" ref_url="https://bugzilla.suse.com/916617" source="BUGZILLA"/>
		<reference ref_id="920183" ref_url="https://bugzilla.suse.com/920183" source="BUGZILLA"/>
		<reference ref_id="920238" ref_url="https://bugzilla.suse.com/920238" source="BUGZILLA"/>
		<reference ref_id="926510" ref_url="https://bugzilla.suse.com/926510" source="BUGZILLA"/>
		<reference ref_id="936327" ref_url="https://bugzilla.suse.com/936327" source="BUGZILLA"/>
		<reference ref_id="937837" ref_url="https://bugzilla.suse.com/937837" source="BUGZILLA"/>
		<reference ref_id="942441" ref_url="https://bugzilla.suse.com/942441" source="BUGZILLA"/>
		<reference ref_id="942587" ref_url="https://bugzilla.suse.com/942587" source="BUGZILLA"/>
		<reference ref_id="943216" ref_url="https://bugzilla.suse.com/943216" source="BUGZILLA"/>
		<reference ref_id="943218" ref_url="https://bugzilla.suse.com/943218" source="BUGZILLA"/>
		<reference ref_id="944300" ref_url="https://bugzilla.suse.com/944300" source="BUGZILLA"/>
		<reference ref_id="946386" ref_url="https://bugzilla.suse.com/946386" source="BUGZILLA"/>
		<reference ref_id="951351" ref_url="https://bugzilla.suse.com/951351" source="BUGZILLA"/>
		<reference ref_id="951559" ref_url="https://bugzilla.suse.com/951559" source="BUGZILLA"/>
		<reference ref_id="951608" ref_url="https://bugzilla.suse.com/951608" source="BUGZILLA"/>
		<reference ref_id="951629" ref_url="https://bugzilla.suse.com/951629" source="BUGZILLA"/>
		<reference ref_id="954982" ref_url="https://bugzilla.suse.com/954982" source="BUGZILLA"/>
		<reference ref_id="956773" ref_url="https://bugzilla.suse.com/956773" source="BUGZILLA"/>
		<reference ref_id="962318" ref_url="https://bugzilla.suse.com/962318" source="BUGZILLA"/>
		<reference ref_id="962784" ref_url="https://bugzilla.suse.com/962784" source="BUGZILLA"/>
		<reference ref_id="962802" ref_url="https://bugzilla.suse.com/962802" source="BUGZILLA"/>
		<reference ref_id="962960" ref_url="https://bugzilla.suse.com/962960" source="BUGZILLA"/>
		<reference ref_id="962966" ref_url="https://bugzilla.suse.com/962966" source="BUGZILLA"/>
		<reference ref_id="962970" ref_url="https://bugzilla.suse.com/962970" source="BUGZILLA"/>
		<reference ref_id="962988" ref_url="https://bugzilla.suse.com/962988" source="BUGZILLA"/>
		<reference ref_id="962994" ref_url="https://bugzilla.suse.com/962994" source="BUGZILLA"/>
		<reference ref_id="962995" ref_url="https://bugzilla.suse.com/962995" source="BUGZILLA"/>
		<reference ref_id="962997" ref_url="https://bugzilla.suse.com/962997" source="BUGZILLA"/>
		<reference ref_id="963000" ref_url="https://bugzilla.suse.com/963000" source="BUGZILLA"/>
		<reference ref_id="963002" ref_url="https://bugzilla.suse.com/963002" source="BUGZILLA"/>
		<reference ref_id="975496" ref_url="https://bugzilla.suse.com/975496" source="BUGZILLA"/>
		<reference ref_id="975981" ref_url="https://bugzilla.suse.com/975981" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5194" ref_url="https://www.suse.com/security/cve/CVE-2015-5194/" source="CVE"/>
		<reference ref_id="CVE-2015-5219" ref_url="https://www.suse.com/security/cve/CVE-2015-5219/" source="CVE"/>
		<reference ref_id="CVE-2015-5300" ref_url="https://www.suse.com/security/cve/CVE-2015-5300/" source="CVE"/>
		<reference ref_id="CVE-2015-7691" ref_url="https://www.suse.com/security/cve/CVE-2015-7691/" source="CVE"/>
		<reference ref_id="CVE-2015-7692" ref_url="https://www.suse.com/security/cve/CVE-2015-7692/" source="CVE"/>
		<reference ref_id="CVE-2015-7701" ref_url="https://www.suse.com/security/cve/CVE-2015-7701/" source="CVE"/>
		<reference ref_id="CVE-2015-7702" ref_url="https://www.suse.com/security/cve/CVE-2015-7702/" source="CVE"/>
		<reference ref_id="CVE-2015-7703" ref_url="https://www.suse.com/security/cve/CVE-2015-7703/" source="CVE"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<reference ref_id="CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705/" source="CVE"/>
		<reference ref_id="CVE-2015-7848" ref_url="https://www.suse.com/security/cve/CVE-2015-7848/" source="CVE"/>
		<reference ref_id="CVE-2015-7849" ref_url="https://www.suse.com/security/cve/CVE-2015-7849/" source="CVE"/>
		<reference ref_id="CVE-2015-7850" ref_url="https://www.suse.com/security/cve/CVE-2015-7850/" source="CVE"/>
		<reference ref_id="CVE-2015-7851" ref_url="https://www.suse.com/security/cve/CVE-2015-7851/" source="CVE"/>
		<reference ref_id="CVE-2015-7852" ref_url="https://www.suse.com/security/cve/CVE-2015-7852/" source="CVE"/>
		<reference ref_id="CVE-2015-7853" ref_url="https://www.suse.com/security/cve/CVE-2015-7853/" source="CVE"/>
		<reference ref_id="CVE-2015-7854" ref_url="https://www.suse.com/security/cve/CVE-2015-7854/" source="CVE"/>
		<reference ref_id="CVE-2015-7855" ref_url="https://www.suse.com/security/cve/CVE-2015-7855/" source="CVE"/>
		<reference ref_id="CVE-2015-7871" ref_url="https://www.suse.com/security/cve/CVE-2015-7871/" source="CVE"/>
		<reference ref_id="CVE-2015-7973" ref_url="https://www.suse.com/security/cve/CVE-2015-7973/" source="CVE"/>
		<reference ref_id="CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974/" source="CVE"/>
		<reference ref_id="CVE-2015-7975" ref_url="https://www.suse.com/security/cve/CVE-2015-7975/" source="CVE"/>
		<reference ref_id="CVE-2015-7976" ref_url="https://www.suse.com/security/cve/CVE-2015-7976/" source="CVE"/>
		<reference ref_id="CVE-2015-7977" ref_url="https://www.suse.com/security/cve/CVE-2015-7977/" source="CVE"/>
		<reference ref_id="CVE-2015-7978" ref_url="https://www.suse.com/security/cve/CVE-2015-7978/" source="CVE"/>
		<reference ref_id="CVE-2015-7979" ref_url="https://www.suse.com/security/cve/CVE-2015-7979/" source="CVE"/>
		<reference ref_id="CVE-2015-8138" ref_url="https://www.suse.com/security/cve/CVE-2015-8138/" source="CVE"/>
		<reference ref_id="CVE-2015-8139" ref_url="https://www.suse.com/security/cve/CVE-2015-8139/" source="CVE"/>
		<reference ref_id="CVE-2015-8140" ref_url="https://www.suse.com/security/cve/CVE-2015-8140/" source="CVE"/>
		<reference ref_id="CVE-2015-8158" ref_url="https://www.suse.com/security/cve/CVE-2015-8158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002064.html" source="SUSE-SU"/>
		<description>

This network time protocol server ntp was updated to 4.2.8p6 to fix the following
issues:

Also yast2-ntp-client was updated to match some sntp syntax changes. (bsc#937837)

Major functional changes:
- The 'sntp' commandline tool changed its option handling in a major way.
- 'controlkey 1' is added during update to ntp.conf to allow sntp to work.
- The local clock is being disabled during update.
- ntpd is no longer running chrooted.


Other functional changes:
- ntp-signd is installed.
- 'enable mode7' can be added to the configuration to allow ntdpc to work as compatibility mode option.
- 'kod' was removed from the default restrictions.
- SHA1 keys are used by default instead of MD5 keys.

These security issues were fixed:
- CVE-2015-5219: An endless loop due to incorrect precision to double conversion (bsc#943216).
- CVE-2015-8158: Fixed potential infinite loop in ntpq (bsc#962966).
- CVE-2015-8138: Zero Origin Timestamp Bypass (bsc#963002).
- CVE-2015-7979: Off-path Denial of Service (DoS) attack on authenticated broadcast mode (bsc#962784).
- CVE-2015-7978: Stack exhaustion in recursive traversal of restriction list (bsc#963000).
- CVE-2015-7977: reslist NULL pointer dereference (bsc#962970).
- CVE-2015-7976: ntpq saveconfig command allows dangerous characters in filenames (bsc#962802).
- CVE-2015-7975: nextvar() missing length check (bsc#962988).
- CVE-2015-7974: Skeleton Key: Missing key check allows impersonation between authenticated peers (bsc#962960).
- CVE-2015-7973: Replay attack on authenticated broadcast mode (bsc#962995).
- CVE-2015-8140: ntpq vulnerable to replay attacks (bsc#962994).
- CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin (bsc#962997).
- CVE-2015-5300: MITM attacker could have forced ntpd to make a step larger than the panic threshold (bsc#951629).
- CVE-2015-7871: NAK to the Future: Symmetric association authentication bypass via crypto-NAK (bsc#951608).
- CVE-2015-7855: decodenetnum() will ASSERT botch instead of returning FAIL on some bogus values (bsc#951608).
- CVE-2015-7854: Password Length Memory Corruption Vulnerability (bsc#951608).
- CVE-2015-7853: Invalid length data provided by a custom refclock driver could cause a buffer overflow (bsc#951608).
- CVE-2015-7852: ntpq atoascii() Memory Corruption Vulnerability (bsc#951608).
- CVE-2015-7851: saveconfig Directory Traversal Vulnerability (bsc#951608).
- CVE-2015-7850: remote config logfile-keyfile (bsc#951608).
- CVE-2015-7849: trusted key use-after-free (bsc#951608).
- CVE-2015-7848: mode 7 loop counter underrun (bsc#951608).
- CVE-2015-7701: Slow memory leak in CRYPTO_ASSOC (bsc#951608).
- CVE-2015-7703: configuration directives 'pidfile' and 'driftfile' should only be allowed locally (bsc#951608).
- CVE-2015-7704, CVE-2015-7705: Clients that receive a KoD should validate the origin timestamp field (bsc#951608).
- CVE-2015-7691, CVE-2015-7692, CVE-2015-7702: Incomplete autokey data packet length checks (bsc#951608).

These non-security issues were fixed:
- fate#320758 bsc#975981: Enable compile-time support for MS-SNTP (--enable-ntp-signd).
  This replaces the w32 patches in 4.2.4 that added the authreg
  directive.
- bsc#962318: Call /usr/sbin/sntp with full path to synchronize in start-ntpd.
  When run as cron job, /usr/sbin/ is not in the path, which caused
  the synchronization to fail.
- bsc#782060: Speedup ntpq.
- bsc#916617: Add /var/db/ntp-kod.
- bsc#956773: Add ntp-ENOBUFS.patch to limit a warning that might happen quite a lot on loaded systems.
- bsc#951559,bsc#975496: Fix the TZ offset output of sntp during DST.
- Add ntp-fork.patch and build with threads disabled to allow name resolution even when running chrooted.
- Add a controlkey line to /etc/ntp.conf if one does not already exist to allow runtime configuuration via ntpq.
- bsc#946386: Temporarily disable memlock to avoid problems due to high memory usage during name resolution.
- bsc#905885: Use SHA1 instead of MD5 for symmetric keys.
- Improve runtime configuration:
  * Read keytype from ntp.conf
  * Don't write ntp keys to syslog.
- Fix legacy action scripts to pass on command line arguments.
- bsc#944300: Remove 'kod' from the restrict line in ntp.conf.
- bsc#936327: Use ntpq instead of deprecated ntpdc in start-ntpd.
- Don't let 'keysdir' lines in ntp.conf trigger the 'keys' parser.
- Disable mode 7 (ntpdc) again, now that we don't use it anymore.
- Add 'addserver' as a new legacy action.
- bsc#910063: Fix the comment regarding addserver in ntp.conf.
- bsc#926510: Disable chroot by default.
- bsc#920238: Enable ntpdc for backwards compatibility.
- bsc#784760: Remove local clock from default configuration.
- bsc#942441/fate#319496: Require perl-Socket6.
- Improve runtime configuration:
  * Read keytype from ntp.conf
  * Don't write ntp keys to syslog.
- bsc#920183: Allow -4 and -6 address qualifiers in 'server' directives.
- Use upstream ntp-wait, because our version is incompatible with
  the new ntpq command line syntax.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-17"/>
	<updated date="2016-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/782060">SUSE bug 782060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784760">SUSE bug 784760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905885">SUSE bug 905885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910063">SUSE bug 910063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916617">SUSE bug 916617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920183">SUSE bug 920183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920238">SUSE bug 920238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926510">SUSE bug 926510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936327">SUSE bug 936327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937837">SUSE bug 937837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942441">SUSE bug 942441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942587">SUSE bug 942587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943218">SUSE bug 943218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944300">SUSE bug 944300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946386">SUSE bug 946386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951351">SUSE bug 951351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951559">SUSE bug 951559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951629">SUSE bug 951629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954982">SUSE bug 954982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956773">SUSE bug 956773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962318">SUSE bug 962318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962784">SUSE bug 962784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962802">SUSE bug 962802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962960">SUSE bug 962960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962966">SUSE bug 962966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962970">SUSE bug 962970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962988">SUSE bug 962988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962994">SUSE bug 962994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962997">SUSE bug 962997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963000">SUSE bug 963000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963002">SUSE bug 963002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975496">SUSE bug 975496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975981">SUSE bug 975981</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5194/">CVE-2015-5194 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5194">CVE-2015-5194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5219/">CVE-2015-5219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5219">CVE-2015-5219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5300/">CVE-2015-5300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5300">CVE-2015-5300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7691/">CVE-2015-7691 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7691">CVE-2015-7691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7692/">CVE-2015-7692 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7692">CVE-2015-7692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7701/">CVE-2015-7701 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7701">CVE-2015-7701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7702/">CVE-2015-7702 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7702">CVE-2015-7702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7703/">CVE-2015-7703 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7703">CVE-2015-7703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7704">CVE-2015-7704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7705">CVE-2015-7705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7848/">CVE-2015-7848 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7848">CVE-2015-7848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7849/">CVE-2015-7849 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7849">CVE-2015-7849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7850/">CVE-2015-7850 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7850">CVE-2015-7850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7851/">CVE-2015-7851 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7851">CVE-2015-7851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7852/">CVE-2015-7852 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7852">CVE-2015-7852 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7853/">CVE-2015-7853 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7853">CVE-2015-7853 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7854/">CVE-2015-7854 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7854">CVE-2015-7854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7855/">CVE-2015-7855 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7855">CVE-2015-7855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7871/">CVE-2015-7871 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7871">CVE-2015-7871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7973/">CVE-2015-7973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7973">CVE-2015-7973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7974">CVE-2015-7974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7975/">CVE-2015-7975 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7975">CVE-2015-7975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7976/">CVE-2015-7976 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7976">CVE-2015-7976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7977/">CVE-2015-7977 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7977">CVE-2015-7977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7978/">CVE-2015-7978 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7978">CVE-2015-7978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7979/">CVE-2015-7979 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7979">CVE-2015-7979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8138/">CVE-2015-8138 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8138">CVE-2015-8138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8139/">CVE-2015-8139 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8139">CVE-2015-8139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8140/">CVE-2015-8140 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8140">CVE-2015-8140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8158/">CVE-2015-8158 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8158">CVE-2015-8158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576576" comment="ntp-4.2.8p6-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576577" comment="ntp-doc-4.2.8p6-41.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576576" comment="ntp-4.2.8p6-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576577" comment="ntp-doc-4.2.8p6-41.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219123" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="957226" ref_url="https://bugzilla.suse.com/957226" source="BUGZILLA"/>
		<reference ref_id="977446" ref_url="https://bugzilla.suse.com/977446" source="BUGZILLA"/>
		<reference ref_id="977450" ref_url="https://bugzilla.suse.com/977450" source="BUGZILLA"/>
		<reference ref_id="977451" ref_url="https://bugzilla.suse.com/977451" source="BUGZILLA"/>
		<reference ref_id="977452" ref_url="https://bugzilla.suse.com/977452" source="BUGZILLA"/>
		<reference ref_id="977455" ref_url="https://bugzilla.suse.com/977455" source="BUGZILLA"/>
		<reference ref_id="977457" ref_url="https://bugzilla.suse.com/977457" source="BUGZILLA"/>
		<reference ref_id="977458" ref_url="https://bugzilla.suse.com/977458" source="BUGZILLA"/>
		<reference ref_id="977459" ref_url="https://bugzilla.suse.com/977459" source="BUGZILLA"/>
		<reference ref_id="977461" ref_url="https://bugzilla.suse.com/977461" source="BUGZILLA"/>
		<reference ref_id="977464" ref_url="https://bugzilla.suse.com/977464" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<reference ref_id="CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705/" source="CVE"/>
		<reference ref_id="CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974/" source="CVE"/>
		<reference ref_id="CVE-2016-1547" ref_url="https://www.suse.com/security/cve/CVE-2016-1547/" source="CVE"/>
		<reference ref_id="CVE-2016-1548" ref_url="https://www.suse.com/security/cve/CVE-2016-1548/" source="CVE"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2016-1550" ref_url="https://www.suse.com/security/cve/CVE-2016-1550/" source="CVE"/>
		<reference ref_id="CVE-2016-1551" ref_url="https://www.suse.com/security/cve/CVE-2016-1551/" source="CVE"/>
		<reference ref_id="CVE-2016-2516" ref_url="https://www.suse.com/security/cve/CVE-2016-2516/" source="CVE"/>
		<reference ref_id="CVE-2016-2517" ref_url="https://www.suse.com/security/cve/CVE-2016-2517/" source="CVE"/>
		<reference ref_id="CVE-2016-2518" ref_url="https://www.suse.com/security/cve/CVE-2016-2518/" source="CVE"/>
		<reference ref_id="CVE-2016-2519" ref_url="https://www.suse.com/security/cve/CVE-2016-2519/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002089.html" source="SUSE-SU"/>
		<description>

This update for ntp fixes the following issues: 

- Separate the creation of ntp.keys and key #1 in it to avoid
  problems when upgrading installations that have the file, but
  no key #1, which is needed e.g. by 'rcntp addserver'.

- Update to 4.2.8p7 (bsc#977446):
  * CVE-2016-1547, bsc#977459:
    Validate crypto-NAKs, AKA: CRYPTO-NAK DoS.
  * CVE-2016-1548, bsc#977461: Interleave-pivot
  * CVE-2016-1549, bsc#977451:
    Sybil vulnerability: ephemeral association attack.
  * CVE-2016-1550, bsc#977464: Improve NTP security against buffer
    comparison timing attacks.
  * CVE-2016-1551, bsc#977450:
    Refclock impersonation vulnerability
  * CVE-2016-2516, bsc#977452: Duplicate IPs on unconfig
    directives will cause an assertion botch in ntpd.
  * CVE-2016-2517, bsc#977455: remote configuration trustedkey/
    requestkey/controlkey values are not properly validated.
  * CVE-2016-2518, bsc#977457: Crafted addpeer with hmode &gt; 7
    causes array wraparound with MATCH_ASSOC.
  * CVE-2016-2519, bsc#977458: ctl_getitem() return value not
    always checked.
  * integrate ntp-fork.patch
  * Improve the fixes for:
    CVE-2015-7704, CVE-2015-7705, CVE-2015-7974
- Restrict the parser in the startup script to the first
  occurrance of 'keys' and 'controlkey' in ntp.conf (bsc#957226).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-01"/>
	<updated date="2016-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/957226">SUSE bug 957226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977450">SUSE bug 977450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977451">SUSE bug 977451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977452">SUSE bug 977452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977455">SUSE bug 977455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977457">SUSE bug 977457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977458">SUSE bug 977458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977459">SUSE bug 977459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977461">SUSE bug 977461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977464">SUSE bug 977464</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7704">CVE-2015-7704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7705">CVE-2015-7705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7974">CVE-2015-7974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1547/">CVE-2016-1547 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1547">CVE-2016-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1548/">CVE-2016-1548 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1548">CVE-2016-1548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1549">CVE-2016-1549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1550/">CVE-2016-1550 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1550">CVE-2016-1550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1551/">CVE-2016-1551 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1551">CVE-2016-1551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2516/">CVE-2016-2516 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2516">CVE-2016-2516 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2517/">CVE-2016-2517 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2517">CVE-2016-2517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2518/">CVE-2016-2518 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2518">CVE-2016-2518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2519/">CVE-2016-2519 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2519">CVE-2016-2519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576578" comment="ntp-4.2.8p7-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576579" comment="ntp-doc-4.2.8p7-44.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576578" comment="ntp-4.2.8p7-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576579" comment="ntp-doc-4.2.8p7-44.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219124" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="929414" ref_url="https://bugzilla.suse.com/929414" source="BUGZILLA"/>
		<reference ref_id="961491" ref_url="https://bugzilla.suse.com/961491" source="BUGZILLA"/>
		<reference ref_id="982779" ref_url="https://bugzilla.suse.com/982779" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-4008" ref_url="https://www.suse.com/security/cve/CVE-2016-4008/" source="CVE"/>
		<description>
This update for libtasn1 fixes the following issues:

- Malformed asn1 definitions could have caused a segmentation fault in the asn1 definition parser (bsc#961491)
- CVE-2015-3622: Fixed invalid read in octet string decoding (bsc#929414)
- CVE-2016-4008: Fixed infinite loop while parsing DER certificates (bsc#982779)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-16"/>
	<updated date="2016-06-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/929414">SUSE bug 929414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961491">SUSE bug 961491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982779">SUSE bug 982779</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3622">CVE-2015-3622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4008/">CVE-2016-4008 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4008">CVE-2016-4008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572824" comment="libtasn1-1.5-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572825" comment="libtasn1-3-1.5-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572826" comment="libtasn1-3-32bit-1.5-1.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219125" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="979302" ref_url="https://bugzilla.suse.com/979302" source="BUGZILLA"/>
		<reference ref_id="981422" ref_url="https://bugzilla.suse.com/981422" source="BUGZILLA"/>
		<reference ref_id="982056" ref_url="https://bugzilla.suse.com/982056" source="BUGZILLA"/>
		<reference ref_id="982064" ref_url="https://bugzilla.suse.com/982064" source="BUGZILLA"/>
		<reference ref_id="982065" ref_url="https://bugzilla.suse.com/982065" source="BUGZILLA"/>
		<reference ref_id="982066" ref_url="https://bugzilla.suse.com/982066" source="BUGZILLA"/>
		<reference ref_id="982067" ref_url="https://bugzilla.suse.com/982067" source="BUGZILLA"/>
		<reference ref_id="982068" ref_url="https://bugzilla.suse.com/982068" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4953" ref_url="https://www.suse.com/security/cve/CVE-2016-4953/" source="CVE"/>
		<reference ref_id="CVE-2016-4954" ref_url="https://www.suse.com/security/cve/CVE-2016-4954/" source="CVE"/>
		<reference ref_id="CVE-2016-4955" ref_url="https://www.suse.com/security/cve/CVE-2016-4955/" source="CVE"/>
		<reference ref_id="CVE-2016-4956" ref_url="https://www.suse.com/security/cve/CVE-2016-4956/" source="CVE"/>
		<reference ref_id="CVE-2016-4957" ref_url="https://www.suse.com/security/cve/CVE-2016-4957/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002122.html" source="SUSE-SU"/>
		<description>
ntp was updated to version 4.2.8p8 to fix five security issues.

These security issues were fixed:
- CVE-2016-4953: Bad authentication demobilizes ephemeral associations (bsc#982065).
- CVE-2016-4954: Processing spoofed server packets (bsc#982066).
- CVE-2016-4955: Autokey association reset (bsc#982067).
- CVE-2016-4956: Broadcast interleave (bsc#982068).
- CVE-2016-4957: CRYPTO_NAK crash (bsc#982064).

These non-security issues were fixed:
- Keep the parent process alive until the daemon has finished initialisation, to make sure that the PID file exists when the parent returns.
- bsc#979302: Change the process name of the forking DNS worker process to avoid the impression that ntpd is started twice.
- bsc#981422: Don't ignore SIGCHILD because it breaks wait().
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979302">SUSE bug 979302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981422">SUSE bug 981422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982056">SUSE bug 982056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982064">SUSE bug 982064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982065">SUSE bug 982065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982066">SUSE bug 982066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982067">SUSE bug 982067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982068">SUSE bug 982068</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4953/">CVE-2016-4953 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4953">CVE-2016-4953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4954/">CVE-2016-4954 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4954">CVE-2016-4954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4955/">CVE-2016-4955 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4955">CVE-2016-4955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4956/">CVE-2016-4956 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4956">CVE-2016-4956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4957/">CVE-2016-4957 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4957">CVE-2016-4957 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576580" comment="ntp-4.2.8p8-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576581" comment="ntp-doc-4.2.8p8-47.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576580" comment="ntp-4.2.8p8-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576581" comment="ntp-doc-4.2.8p8-47.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219126" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1009434" ref_url="https://bugzilla.suse.com/1009434" source="BUGZILLA"/>
		<reference ref_id="1011377" ref_url="https://bugzilla.suse.com/1011377" source="BUGZILLA"/>
		<reference ref_id="1011390" ref_url="https://bugzilla.suse.com/1011390" source="BUGZILLA"/>
		<reference ref_id="1011395" ref_url="https://bugzilla.suse.com/1011395" source="BUGZILLA"/>
		<reference ref_id="1011398" ref_url="https://bugzilla.suse.com/1011398" source="BUGZILLA"/>
		<reference ref_id="1011404" ref_url="https://bugzilla.suse.com/1011404" source="BUGZILLA"/>
		<reference ref_id="1011406" ref_url="https://bugzilla.suse.com/1011406" source="BUGZILLA"/>
		<reference ref_id="1011411" ref_url="https://bugzilla.suse.com/1011411" source="BUGZILLA"/>
		<reference ref_id="1011417" ref_url="https://bugzilla.suse.com/1011417" source="BUGZILLA"/>
		<reference ref_id="943216" ref_url="https://bugzilla.suse.com/943216" source="BUGZILLA"/>
		<reference ref_id="956365" ref_url="https://bugzilla.suse.com/956365" source="BUGZILLA"/>
		<reference ref_id="981252" ref_url="https://bugzilla.suse.com/981252" source="BUGZILLA"/>
		<reference ref_id="988028" ref_url="https://bugzilla.suse.com/988028" source="BUGZILLA"/>
		<reference ref_id="992038" ref_url="https://bugzilla.suse.com/992038" source="BUGZILLA"/>
		<reference ref_id="992606" ref_url="https://bugzilla.suse.com/992606" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5219" ref_url="https://www.suse.com/security/cve/CVE-2015-5219/" source="CVE"/>
		<reference ref_id="CVE-2015-8139" ref_url="https://www.suse.com/security/cve/CVE-2015-8139/" source="CVE"/>
		<reference ref_id="CVE-2015-8140" ref_url="https://www.suse.com/security/cve/CVE-2015-8140/" source="CVE"/>
		<reference ref_id="CVE-2016-7426" ref_url="https://www.suse.com/security/cve/CVE-2016-7426/" source="CVE"/>
		<reference ref_id="CVE-2016-7427" ref_url="https://www.suse.com/security/cve/CVE-2016-7427/" source="CVE"/>
		<reference ref_id="CVE-2016-7428" ref_url="https://www.suse.com/security/cve/CVE-2016-7428/" source="CVE"/>
		<reference ref_id="CVE-2016-7429" ref_url="https://www.suse.com/security/cve/CVE-2016-7429/" source="CVE"/>
		<reference ref_id="CVE-2016-7431" ref_url="https://www.suse.com/security/cve/CVE-2016-7431/" source="CVE"/>
		<reference ref_id="CVE-2016-7433" ref_url="https://www.suse.com/security/cve/CVE-2016-7433/" source="CVE"/>
		<reference ref_id="CVE-2016-7434" ref_url="https://www.suse.com/security/cve/CVE-2016-7434/" source="CVE"/>
		<reference ref_id="CVE-2016-9310" ref_url="https://www.suse.com/security/cve/CVE-2016-9310/" source="CVE"/>
		<reference ref_id="CVE-2016-9311" ref_url="https://www.suse.com/security/cve/CVE-2016-9311/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
		<description>

This update for ntp fixes the following issues:

ntp was updated to 4.2.8p9.

Security issues fixed:

- CVE-2016-9311, CVE-2016-9310, bsc#1011377: Mode 6
  unauthenticated trap information disclosure and DDoS vector.
- CVE-2016-7427, bsc#1011390:
  Broadcast Mode Replay Prevention DoS.
- CVE-2016-7428, bsc#1011417:
  Broadcast Mode Poll Interval Enforcement DoS.
- CVE-2016-7431, bsc#1011395:
  Regression: 010-origin: Zero Origin Timestamp Bypass.
- CVE-2016-7434, bsc#1011398:
  Null pointer dereference in _IO_str_init_static_internal().
- CVE-2016-7429, bsc#1011404: Interface selection attack.
- CVE-2016-7426, bsc#1011406:
  Client rate limiting and server responses.
- CVE-2016-7433, bsc#1011411: Reboot sync calculation problem.
- CVE-2015-8140: ntpq vulnerable to replay attacks.
- CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin.
- CVE-2015-5219: An endless loop due to incorrect precision to
  double conversion (bsc#943216).

Non-security issues fixed:

- Fix a spurious error message.
- Other bugfixes, see /usr/share/doc/packages/ntp/ChangeLog.
- Fix a regression in 'trap' (bsc#981252).
- Reduce the number of netlink groups to listen on for changes to
  the local network setup (bsc#992606).
- Fix segfault in 'sntp -a' (bsc#1009434).
- Silence an OpenSSL version warning (bsc#992038).
- Make the resolver task change user and group IDs to the same
  values as the main task. (bsc#988028)
- Simplify ntpd's search for its own executable to prevent AppArmor
  warnings (bsc#956365).

		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-23"/>
	<updated date="2017-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009434">SUSE bug 1009434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011377">SUSE bug 1011377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011390">SUSE bug 1011390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011395">SUSE bug 1011395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011398">SUSE bug 1011398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011404">SUSE bug 1011404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011406">SUSE bug 1011406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011411">SUSE bug 1011411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011417">SUSE bug 1011417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956365">SUSE bug 956365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981252">SUSE bug 981252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988028">SUSE bug 988028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992038">SUSE bug 992038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992606">SUSE bug 992606</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5219/">CVE-2015-5219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5219">CVE-2015-5219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8139/">CVE-2015-8139 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8139">CVE-2015-8139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8140/">CVE-2015-8140 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8140">CVE-2015-8140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7426/">CVE-2016-7426 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7426">CVE-2016-7426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7427/">CVE-2016-7427 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7427">CVE-2016-7427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7428/">CVE-2016-7428 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7428">CVE-2016-7428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7429/">CVE-2016-7429 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7429">CVE-2016-7429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7431/">CVE-2016-7431 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7431">CVE-2016-7431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7433/">CVE-2016-7433 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7433">CVE-2016-7433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7434/">CVE-2016-7434 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7434">CVE-2016-7434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9310/">CVE-2016-9310 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9310">CVE-2016-9310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9311/">CVE-2016-9311 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9311">CVE-2016-9311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576582" comment="ntp-4.2.8p9-48.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576583" comment="ntp-doc-4.2.8p9-48.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576582" comment="ntp-4.2.8p9-48.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576583" comment="ntp-doc-4.2.8p9-48.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219127" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1014172" ref_url="https://bugzilla.suse.com/1014172" source="BUGZILLA"/>
		<reference ref_id="1030050" ref_url="https://bugzilla.suse.com/1030050" source="BUGZILLA"/>
		<reference ref_id="1031085" ref_url="https://bugzilla.suse.com/1031085" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9042" ref_url="https://www.suse.com/security/cve/CVE-2016-9042/" source="CVE"/>
		<reference ref_id="CVE-2017-6451" ref_url="https://www.suse.com/security/cve/CVE-2017-6451/" source="CVE"/>
		<reference ref_id="CVE-2017-6458" ref_url="https://www.suse.com/security/cve/CVE-2017-6458/" source="CVE"/>
		<reference ref_id="CVE-2017-6460" ref_url="https://www.suse.com/security/cve/CVE-2017-6460/" source="CVE"/>
		<reference ref_id="CVE-2017-6462" ref_url="https://www.suse.com/security/cve/CVE-2017-6462/" source="CVE"/>
		<reference ref_id="CVE-2017-6463" ref_url="https://www.suse.com/security/cve/CVE-2017-6463/" source="CVE"/>
		<reference ref_id="CVE-2017-6464" ref_url="https://www.suse.com/security/cve/CVE-2017-6464/" source="CVE"/>
		<description>

This ntp update to version 4.2.8p10 fixes the following issues:

Security issues fixed (bsc#1030050):
- CVE-2017-6464: Denial of Service via Malformed Config
- CVE-2017-6462: Buffer Overflow in DPTS Clock
- CVE-2017-6463: Authenticated DoS via Malicious Config Option
- CVE-2017-6458: Potential Overflows in ctl_put() functions
- CVE-2017-6451: Improper use of snprintf() in mx4200_send()
- CVE-2017-6460: Buffer Overflow in ntpq when fetching reslist
- CVE-2016-9042: 0rigin (zero origin) DoS.
- ntpq_stripquotes() returns incorrect Value
- ereallocarray()/eallocarray() underused
- Copious amounts of Unused Code
- Off-by-one in Oncore GPS Receiver
- Makefile does not enforce Security Flags

Bugfixes:
- Remove spurious log messages (bsc#1014172).
- Fixing ppc and ppc64 linker issue (bsc#1031085).
- clang scan-build findings
- Support for openssl-1.1.0 without compatibility modes
- Bugfix 3072 breaks multicastclient
- forking async worker: interrupted pipe I/O
- (...) time_pps_create: Exec format error
- Incorrect Logic for Peer Event Limiting
- Change the process name of forked DNS worker
- Trap Configuration Fail
- Nothing happens if minsane &lt; maxclock &lt; minclock
- allow -4/-6 on restrict line with mask
- out-of-bound pointers in ctl_putsys and decode_bitflags
- Move ntp-kod to /var/lib/ntp, because /var/db is not a standard directory and causes problems for
  transactional updates.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-07"/>
	<updated date="2017-04-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1014172">SUSE bug 1014172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031085">SUSE bug 1031085</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9042/">CVE-2016-9042 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9042">CVE-2016-9042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6451/">CVE-2017-6451 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6451">CVE-2017-6451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6458/">CVE-2017-6458 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6458">CVE-2017-6458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6460/">CVE-2017-6460 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6460">CVE-2017-6460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6462/">CVE-2017-6462 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6462">CVE-2017-6462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6463/">CVE-2017-6463 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6463">CVE-2017-6463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6464/">CVE-2017-6464 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6464">CVE-2017-6464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572831" comment="ntp-4.2.8p10-48.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572832" comment="ntp-doc-4.2.8p10-48.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219128" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1077445" ref_url="https://bugzilla.suse.com/1077445" source="BUGZILLA"/>
		<reference ref_id="1082210" ref_url="https://bugzilla.suse.com/1082210" source="BUGZILLA"/>
		<reference ref_id="1083417" ref_url="https://bugzilla.suse.com/1083417" source="BUGZILLA"/>
		<reference ref_id="1083420" ref_url="https://bugzilla.suse.com/1083420" source="BUGZILLA"/>
		<reference ref_id="1083422" ref_url="https://bugzilla.suse.com/1083422" source="BUGZILLA"/>
		<reference ref_id="1083424" ref_url="https://bugzilla.suse.com/1083424" source="BUGZILLA"/>
		<reference ref_id="1083426" ref_url="https://bugzilla.suse.com/1083426" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<reference ref_id="CVE-2018-7182" ref_url="https://www.suse.com/security/cve/CVE-2018-7182/" source="CVE"/>
		<reference ref_id="CVE-2018-7183" ref_url="https://www.suse.com/security/cve/CVE-2018-7183/" source="CVE"/>
		<reference ref_id="CVE-2018-7184" ref_url="https://www.suse.com/security/cve/CVE-2018-7184/" source="CVE"/>
		<reference ref_id="CVE-2018-7185" ref_url="https://www.suse.com/security/cve/CVE-2018-7185/" source="CVE"/>
		<description>
This update for ntp fixes the following issues:

- Update to 4.2.8p11 (bsc#1082210):
  * CVE-2016-1549: Sybil vulnerability: ephemeral association
    attack. While fixed in ntp-4.2.8p7, there are significant
    additional protections for this issue in 4.2.8p11.
  * CVE-2018-7182: ctl_getitem(): buffer read overrun
    leads to undefined behavior and information leak. (bsc#1083426)
  * CVE-2018-7170: Multiple authenticated ephemeral
    associations. (bsc#1083424)
  * CVE-2018-7184: Interleaved symmetric mode cannot
    recover from bad state. (bsc#1083422)
  * CVE-2018-7185: Unauthenticated packet can reset
    authenticated interleaved association. (bsc#1083420)
  * CVE-2018-7183: ntpq:decodearr() can write beyond its
    buffer limit.(bsc#1083417)
- Don't use libevent's cached time stamps in sntp.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-16"/>
	<updated date="2018-04-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077445">SUSE bug 1077445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082210">SUSE bug 1082210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083417">SUSE bug 1083417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083420">SUSE bug 1083420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083422">SUSE bug 1083422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083426">SUSE bug 1083426</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1549">CVE-2016-1549 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7170">CVE-2018-7170 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7182/">CVE-2018-7182 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7182">CVE-2018-7182 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-7183/">CVE-2018-7183 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7183">CVE-2018-7183 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7184/">CVE-2018-7184 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7184">CVE-2018-7184 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7185/">CVE-2018-7185 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7185">CVE-2018-7185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572833" comment="ntp-4.2.8p11-48.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572834" comment="ntp-doc-4.2.8p11-48.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219129" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1083424" ref_url="https://bugzilla.suse.com/1083424" source="BUGZILLA"/>
		<reference ref_id="1098531" ref_url="https://bugzilla.suse.com/1098531" source="BUGZILLA"/>
		<reference ref_id="1111853" ref_url="https://bugzilla.suse.com/1111853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12327" ref_url="https://www.suse.com/security/cve/CVE-2018-12327/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004776.html" source="SUSE-SU"/>
		<description>

NTP was updated to 4.2.8p12 (bsc#1111853):

- CVE-2018-12327: Fixed stack buffer overflow in the openhost() command-line call of NTPQ/NTPDC. (bsc#1098531)
- CVE-2018-7170: Add further tweaks to improve the fix for the ephemeral association time spoofing additional protection (bsc#1083424)

Please also see https://www.nwtime.org/network-time-foundation-publishes-ntp-4-2-8p12/ for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098531">SUSE bug 1098531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111853">SUSE bug 1111853</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12327/">CVE-2018-12327 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12327">CVE-2018-12327 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7170">CVE-2018-7170 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579188" comment="ntp-4.2.8p12-48.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579189" comment="ntp-doc-4.2.8p12-48.21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579188" comment="ntp-4.2.8p12-48.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579189" comment="ntp-doc-4.2.8p12-48.21.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219130" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1001182" ref_url="https://bugzilla.suse.com/1001182" source="BUGZILLA"/>
		<reference ref_id="1128525" ref_url="https://bugzilla.suse.com/1128525" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8936" ref_url="https://www.suse.com/security/cve/CVE-2019-8936/" source="CVE"/>
		<description>
This update for ntp fixes the following issues:
	  
Security issue fixed: 	  

- CVE-2019-8936: Fixed a null pointer exception which could allow an authenticated attcker to cause 
  segmentation fault to ntpd (bsc#1128525).

Other issues addressed:

- Make sure that SLE12 version is higher than the one in SLE11 (bsc#1001182). 
- Fixed several bugs in the BANCOMM reclock driver.
- Fixed ntp_loopfilter.c snprintf compilation warnings.
- Fixed spurious initgroups() error message.
- Fixed STA_NANO struct timex units.
- Fixed GPS week rollover in libparse.
- Fixed incorrect poll interval in packet.
- Added a missing check for ENABLE_CMAC.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1001182">SUSE bug 1001182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128525">SUSE bug 1128525</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8936/">CVE-2019-8936 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8936">CVE-2019-8936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572837" comment="ntp-4.2.8p13-48.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572838" comment="ntp-doc-4.2.8p13-48.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219131" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1169740" ref_url="https://bugzilla.suse.com/1169740" source="BUGZILLA"/>
		<reference ref_id="1171355" ref_url="https://bugzilla.suse.com/1171355" source="BUGZILLA"/>
		<reference ref_id="1172651" ref_url="https://bugzilla.suse.com/1172651" source="BUGZILLA"/>
		<reference ref_id="1173334" ref_url="https://bugzilla.suse.com/1173334" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8956" ref_url="https://www.suse.com/security/cve/CVE-2018-8956/" source="CVE"/>
		<reference ref_id="CVE-2020-11868" ref_url="https://www.suse.com/security/cve/CVE-2020-11868/" source="CVE"/>
		<reference ref_id="CVE-2020-13817" ref_url="https://www.suse.com/security/cve/CVE-2020-13817/" source="CVE"/>
		<reference ref_id="CVE-2020-15025" ref_url="https://www.suse.com/security/cve/CVE-2020-15025/" source="CVE"/>
		<description>
This update for ntp fixes the following issues:

ntp was updated to 4.2.8p15

- CVE-2020-11868: Fixed an issue which a server mode packet with spoofed source address 
  frequently send to the client ntpd could have caused denial of service (bsc#1169740).
- CVE-2018-8956: Fixed an issue which could have allowed remote attackers to prevent 
  a broadcast client from synchronizing its clock with a broadcast NTP server via spoofed 
  mode 3 and mode 5 packets (bsc#1171355).
- CVE-2020-13817: Fixed an issue which an off-path attacker with the ability to query time 
  from victim's ntpd instance could have modified the victim's clock by a limited amount (bsc#1172651).
- CVE-2020-15025: Fixed an issue which remote attacker could have caused denial of service by consuming 
  the memory when a CMAC key was used andassociated with a CMAC algorithm in the ntp.keys (bsc#1173334).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-01"/>
	<updated date="2020-07-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169740">SUSE bug 1169740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171355">SUSE bug 1171355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172651">SUSE bug 1172651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173334">SUSE bug 1173334</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8956/">CVE-2018-8956 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8956">CVE-2018-8956 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11868/">CVE-2020-11868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11868">CVE-2020-11868 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13817/">CVE-2020-13817 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13817">CVE-2020-13817 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15025/">CVE-2020-15025 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15025">CVE-2020-15025 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572839" comment="ntp-4.2.8p15-48.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572840" comment="ntp-doc-4.2.8p15-48.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219132" version="1" class="patch">
	<metadata>
		<title>Security update for open-iscsi (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1072312" ref_url="https://bugzilla.suse.com/1072312" source="BUGZILLA"/>
		<reference ref_id="1179908" ref_url="https://bugzilla.suse.com/1179908" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17840" ref_url="https://www.suse.com/security/cve/CVE-2017-17840/" source="CVE"/>
		<reference ref_id="CVE-2020-13987" ref_url="https://www.suse.com/security/cve/CVE-2020-13987/" source="CVE"/>
		<description>
This update for open-iscsi fixes the following issues:

- CVE-2020-13987: Fixed an out of bounds memory access when calculating
  the checksums for IP packets (bsc#1179908).
- CVE-2017-17840: Fixed a buffer overflow that could be triggered via a
  packets with an incorrect length field (bsc#1072312).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-11"/>
	<updated date="2022-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1072312">SUSE bug 1072312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179908">SUSE bug 1179908</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17840/">CVE-2017-17840 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17840">CVE-2017-17840 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-13987/">CVE-2020-13987 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13987">CVE-2020-13987 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993718" comment="open-iscsi-2.0.873-0.41.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219133" version="1" class="patch">
	<metadata>
		<title>Recommended update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="924496" ref_url="https://bugzilla.suse.com/924496" source="BUGZILLA"/>
		<reference ref_id="932773" ref_url="https://bugzilla.suse.com/932773" source="BUGZILLA"/>
		<reference ref_id="937766" ref_url="https://bugzilla.suse.com/937766" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001568.html" source="SUSE-SU"/>
		<description>
openldap2 was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-4000: The Logjam Attack / weakdh.org (bsc#937766).

This non-security issue was fixed:
- bsc#932773: ldapmodify failed with DOS format LDIF files containing '-' separator.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-29"/>
	<updated date="2015-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924496">SUSE bug 924496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932773">SUSE bug 932773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937766">SUSE bug 937766</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579190" comment="compat-libldap-2_3-0-2.3.37-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579191" comment="libldap-2_4-2-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579192" comment="libldap-2_4-2-32bit-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579193" comment="libldap-2_4-2-x86-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579194" comment="openldap2-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579195" comment="openldap2-back-meta-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579196" comment="openldap2-client-2.4.26-0.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579190" comment="compat-libldap-2_3-0-2.3.37-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579191" comment="libldap-2_4-2-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579192" comment="libldap-2_4-2-32bit-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579193" comment="libldap-2_4-2-x86-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579194" comment="openldap2-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579195" comment="openldap2-back-meta-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579196" comment="openldap2-client-2.4.26-0.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579190" comment="compat-libldap-2_3-0-2.3.37-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579191" comment="libldap-2_4-2-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579192" comment="libldap-2_4-2-32bit-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579193" comment="libldap-2_4-2-x86-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579194" comment="openldap2-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579195" comment="openldap2-back-meta-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579196" comment="openldap2-client-2.4.26-0.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219134" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1143194" ref_url="https://bugzilla.suse.com/1143194" source="BUGZILLA"/>
		<reference ref_id="1143273" ref_url="https://bugzilla.suse.com/1143273" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13057" ref_url="https://www.suse.com/security/cve/CVE-2019-13057/" source="CVE"/>
		<reference ref_id="CVE-2019-13565" ref_url="https://www.suse.com/security/cve/CVE-2019-13565/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2019-13565: Fixed an authentication bypass caused by incorrect authorization of another connection, granting excess connection rights (bsc#1143194).
- CVE-2019-13057: Fixed an issue with improper authorization with delegated database admin privileges (bsc#1143273).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-29"/>
	<updated date="2020-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1143194">SUSE bug 1143194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143273">SUSE bug 1143273</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13057/">CVE-2019-13057 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13057">CVE-2019-13057 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13565/">CVE-2019-13565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13565">CVE-2019-13565 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579197" comment="compat-libldap-2_3-0-2.3.37-2.74.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579198" comment="libldap-2_4-2-2.4.26-0.74.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579199" comment="libldap-2_4-2-32bit-2.4.26-0.74.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579200" comment="libldap-openssl1-2_4-2-2.4.26-0.74.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579201" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.74.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579202" comment="openldap2-2.4.26-0.74.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579203" comment="openldap2-back-meta-2.4.26-0.74.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579204" comment="openldap2-client-2.4.26-0.74.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579205" comment="openldap2-client-openssl1-2.4.26-0.74.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579206" comment="openldap2-openssl1-2.4.26-0.74.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219135" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1170771" ref_url="https://bugzilla.suse.com/1170771" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12243" ref_url="https://www.suse.com/security/cve/CVE-2020-12243/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-12243: Fixed a denial of service related to recursive filters (bsc#1170771).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170771">SUSE bug 1170771</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12243/">CVE-2020-12243 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12243">CVE-2020-12243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579207" comment="compat-libldap-2_3-0-2.3.37-2.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579208" comment="libldap-2_4-2-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579209" comment="libldap-2_4-2-32bit-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579210" comment="libldap-openssl1-2_4-2-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579211" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579212" comment="openldap2-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579213" comment="openldap2-back-meta-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579214" comment="openldap2-client-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579215" comment="openldap2-client-openssl1-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579216" comment="openldap2-openssl1-2.4.26-0.74.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219136" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172698" ref_url="https://bugzilla.suse.com/1172698" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8023" ref_url="https://www.suse.com/security/cve/CVE-2020-8023/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-8023: Fixed a potential local privilege escalation from ldap to root when OPENLDAP_CONFIG_BACKEND='ldap' was used (bsc#1172698).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172698">SUSE bug 1172698</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8023/">CVE-2020-8023 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8023">CVE-2020-8023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579217" comment="compat-libldap-2_3-0-2.3.37-2.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579218" comment="libldap-2_4-2-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579219" comment="libldap-2_4-2-32bit-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579220" comment="libldap-openssl1-2_4-2-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579221" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579222" comment="openldap2-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579223" comment="openldap2-back-meta-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579224" comment="openldap2-client-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579225" comment="openldap2-client-openssl1-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579226" comment="openldap2-openssl1-2.4.26-0.74.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219137" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178387" ref_url="https://bugzilla.suse.com/1178387" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-25692: Fixed an unauthenticated remote denial of service due to incorrect validation of modrdn equality rules (bsc#1178387).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178387">SUSE bug 1178387</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25692">CVE-2020-25692 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579227" comment="compat-libldap-2_3-0-2.3.37-2.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579228" comment="libldap-2_4-2-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579229" comment="libldap-2_4-2-32bit-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579230" comment="libldap-openssl1-2_4-2-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579231" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579232" comment="openldap2-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579233" comment="openldap2-back-meta-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579234" comment="openldap2-client-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579235" comment="openldap2-client-openssl1-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579236" comment="openldap2-openssl1-2.4.26-0.74.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219138" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178909" ref_url="https://bugzilla.suse.com/1178909" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25709" ref_url="https://www.suse.com/security/cve/CVE-2020-25709/" source="CVE"/>
		<reference ref_id="CVE-2020-25710" ref_url="https://www.suse.com/security/cve/CVE-2020-25710/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-25709: Fixed a crash caused by specially crafted network traffic (bsc#1178909).
- CVE-2020-25710: Fixed a crash caused by specially crafted network traffic (bsc#1178909).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-14"/>
	<updated date="2021-01-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178909">SUSE bug 1178909</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25709/">CVE-2020-25709 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25709">CVE-2020-25709 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25710/">CVE-2020-25710 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25710">CVE-2020-25710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579237" comment="compat-libldap-2_3-0-2.3.37-2.74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579238" comment="libldap-2_4-2-2.4.26-0.74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579239" comment="libldap-2_4-2-32bit-2.4.26-0.74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579240" comment="libldap-openssl1-2_4-2-2.4.26-0.74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579241" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579242" comment="openldap2-2.4.26-0.74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579243" comment="openldap2-back-meta-2.4.26-0.74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579244" comment="openldap2-client-2.4.26-0.74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579245" comment="openldap2-client-openssl1-2.4.26-0.74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579246" comment="openldap2-openssl1-2.4.26-0.74.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219139" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182279" ref_url="https://bugzilla.suse.com/1182279" source="BUGZILLA"/>
		<reference ref_id="1182408" ref_url="https://bugzilla.suse.com/1182408" source="BUGZILLA"/>
		<reference ref_id="1182411" ref_url="https://bugzilla.suse.com/1182411" source="BUGZILLA"/>
		<reference ref_id="1182412" ref_url="https://bugzilla.suse.com/1182412" source="BUGZILLA"/>
		<reference ref_id="1182413" ref_url="https://bugzilla.suse.com/1182413" source="BUGZILLA"/>
		<reference ref_id="1182415" ref_url="https://bugzilla.suse.com/1182415" source="BUGZILLA"/>
		<reference ref_id="1182416" ref_url="https://bugzilla.suse.com/1182416" source="BUGZILLA"/>
		<reference ref_id="1182417" ref_url="https://bugzilla.suse.com/1182417" source="BUGZILLA"/>
		<reference ref_id="1182418" ref_url="https://bugzilla.suse.com/1182418" source="BUGZILLA"/>
		<reference ref_id="1182419" ref_url="https://bugzilla.suse.com/1182419" source="BUGZILLA"/>
		<reference ref_id="1182420" ref_url="https://bugzilla.suse.com/1182420" source="BUGZILLA"/>
		<reference ref_id="1184020" ref_url="https://bugzilla.suse.com/1184020" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36221" ref_url="https://www.suse.com/security/cve/CVE-2020-36221/" source="CVE"/>
		<reference ref_id="CVE-2020-36222" ref_url="https://www.suse.com/security/cve/CVE-2020-36222/" source="CVE"/>
		<reference ref_id="CVE-2020-36223" ref_url="https://www.suse.com/security/cve/CVE-2020-36223/" source="CVE"/>
		<reference ref_id="CVE-2020-36224" ref_url="https://www.suse.com/security/cve/CVE-2020-36224/" source="CVE"/>
		<reference ref_id="CVE-2020-36225" ref_url="https://www.suse.com/security/cve/CVE-2020-36225/" source="CVE"/>
		<reference ref_id="CVE-2020-36226" ref_url="https://www.suse.com/security/cve/CVE-2020-36226/" source="CVE"/>
		<reference ref_id="CVE-2020-36227" ref_url="https://www.suse.com/security/cve/CVE-2020-36227/" source="CVE"/>
		<reference ref_id="CVE-2020-36228" ref_url="https://www.suse.com/security/cve/CVE-2020-36228/" source="CVE"/>
		<reference ref_id="CVE-2020-36229" ref_url="https://www.suse.com/security/cve/CVE-2020-36229/" source="CVE"/>
		<reference ref_id="CVE-2020-36230" ref_url="https://www.suse.com/security/cve/CVE-2020-36230/" source="CVE"/>
		<reference ref_id="CVE-2021-27212" ref_url="https://www.suse.com/security/cve/CVE-2021-27212/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- bsc#1182408 CVE-2020-36230 - an assertion failure in slapd in the
  X.509 DN parsing in decode.c ber_next_element, resulting in denial
  of service.
- bsc#1182411 CVE-2020-36229 - ldap_X509dn2bv crash in the X.509 DN
  parsing in ad_keystring, resulting in denial of service.
- bsc#1182412 CVE-2020-36228 - integer underflow leading to crash
  in the Certificate List Exact Assertion processing, resulting in
  denial of service.
- bsc#1182413 CVE-2020-36227 - infinite loop in slapd with the
  cancel_extop Cancel operation, resulting in denial of service.
- bsc#1182416 CVE-2020-36225 - double free and slapd crash in the
  saslAuthzTo processing, resulting in denial of service.
- bsc#1182417 CVE-2020-36224 - invalid pointer free and slapd crash
  in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182415 CVE-2020-36226 - memch-&gt;bv_len miscalculation and slapd
  crash in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182419 CVE-2020-36222 - assertion failure in slapd in the
  saslAuthzTo validation, resulting in denial of service.
- bsc#1182420 CVE-2020-36221 - slapd crashes in the Certificate Exact
  Assertion processing, resulting in denial of service (schema_init.c
  serialNumberAndIssuerCheck).
- bsc#1182418 CVE-2020-36223 - slapd crash in the Values Return Filter
  control handling, resulting in denial of service (double free and
  out-of-bounds read).
- bsc#1182279 CVE-2021-27212 - an assertion failure in slapd can occur
    in the issuerAndThisUpdateCheck function via a crafted packet,
    resulting in a denial of service (daemon exit) via a short timestamp.
    This is related to schema_init.c and checkTime.
- resynchronise changelogs with subpackages (bsc#1184020).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-16"/>
	<updated date="2021-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182279">SUSE bug 1182279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182408">SUSE bug 1182408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182411">SUSE bug 1182411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182412">SUSE bug 1182412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182413">SUSE bug 1182413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182415">SUSE bug 1182415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182416">SUSE bug 1182416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182417">SUSE bug 1182417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182418">SUSE bug 1182418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182419">SUSE bug 1182419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182420">SUSE bug 1182420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184020">SUSE bug 1184020</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36221/">CVE-2020-36221 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36221">CVE-2020-36221 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36222/">CVE-2020-36222 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36222">CVE-2020-36222 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36223/">CVE-2020-36223 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36223">CVE-2020-36223 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36224/">CVE-2020-36224 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36224">CVE-2020-36224 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36225/">CVE-2020-36225 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36225">CVE-2020-36225 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36226/">CVE-2020-36226 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36226">CVE-2020-36226 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36227/">CVE-2020-36227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36227">CVE-2020-36227 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36228/">CVE-2020-36228 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36228">CVE-2020-36228 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36229/">CVE-2020-36229 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36229">CVE-2020-36229 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36230/">CVE-2020-36230 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36230">CVE-2020-36230 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27212/">CVE-2021-27212 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27212">CVE-2021-27212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579247" comment="compat-libldap-2_3-0-2.3.37-2.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579248" comment="libldap-2_4-2-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579249" comment="libldap-2_4-2-32bit-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579250" comment="libldap-openssl1-2_4-2-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579251" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579252" comment="openldap2-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579253" comment="openldap2-back-meta-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579254" comment="openldap2-client-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579255" comment="openldap2-client-openssl1-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579256" comment="openldap2-openssl1-2.4.26-0.74.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219140" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199240" ref_url="https://bugzilla.suse.com/1199240" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29155" ref_url="https://www.suse.com/security/cve/CVE-2022-29155/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2022-29155: Fixed SQL injection in back-sql (bsc#1199240).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-12"/>
	<updated date="2022-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199240">SUSE bug 1199240</bugzilla>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29155/">CVE-2022-29155 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29155">CVE-2022-29155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682706" comment="compat-libldap-2_3-0-2.3.37-2.74.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682707" comment="libldap-2_4-2-2.4.26-0.74.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682708" comment="libldap-2_4-2-32bit-2.4.26-0.74.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682709" comment="libldap-openssl1-2_4-2-2.4.26-0.74.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682710" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.74.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682711" comment="openldap2-2.4.26-0.74.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682712" comment="openldap2-back-meta-2.4.26-0.74.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682713" comment="openldap2-client-2.4.26-0.74.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682714" comment="openldap2-client-openssl1-2.4.26-0.74.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682715" comment="openldap2-openssl1-2.4.26-0.74.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219141" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="846389" ref_url="https://bugzilla.suse.com/846389" source="BUGZILLA"/>
		<reference ref_id="905959" ref_url="https://bugzilla.suse.com/905959" source="BUGZILLA"/>
		<reference ref_id="916897" ref_url="https://bugzilla.suse.com/916897" source="BUGZILLA"/>
		<reference ref_id="916914" ref_url="https://bugzilla.suse.com/916914" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4449" ref_url="https://www.suse.com/security/cve/CVE-2013-4449/" source="CVE"/>
		<reference ref_id="CVE-2015-1545" ref_url="https://www.suse.com/security/cve/CVE-2015-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-1546" ref_url="https://www.suse.com/security/cve/CVE-2015-1546/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001389.html" source="SUSE-SU"/>
		<description>

openldap2 was updated to fix three security issues and one non-security 
bug.

The following vulnerabilities were fixed:

    * A remote attacker could cause a denial of service (slapd crash) by
      unbinding immediately after a search request. (bnc#846389,
      CVE-2013-4449)
    * A remote attacker could cause a denial of service through a NULL
      pointer dereference and crash via an empty attribute list in a deref
      control in a search request. (bnc#916897, CVE-2015-1545)
    * A remote attacker could cause a denial of service (crash) via a
      crafted search query with a matched values control. (bnc#916914,
      CVE-2015-1546)

The following non-security bug was fixed:

    * Prevent connection-0 (internal connection) from showing up in the
      monitor back-end. (bnc#905959)

Security Issues:

    * CVE-2015-1546
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1546&gt;
    * CVE-2015-1545
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1545&gt;
    * CVE-2013-4449
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4449&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-13"/>
	<updated date="2015-04-13"/>
	<bugzilla href="https://bugzilla.suse.com/846389">SUSE bug 846389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905959">SUSE bug 905959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916897">SUSE bug 916897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916914">SUSE bug 916914</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4449/">CVE-2013-4449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4449">CVE-2013-4449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1545/">CVE-2015-1545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1545">CVE-2015-1545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1546/">CVE-2015-1546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1546">CVE-2015-1546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579257" comment="compat-libldap-2_3-0-2.3.37-2.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579258" comment="libldap-2_4-2-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579259" comment="libldap-2_4-2-32bit-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579260" comment="libldap-2_4-2-x86-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579261" comment="openldap2-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579262" comment="openldap2-back-meta-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579263" comment="openldap2-client-2.4.26-0.30.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579257" comment="compat-libldap-2_3-0-2.3.37-2.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579258" comment="libldap-2_4-2-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579259" comment="libldap-2_4-2-32bit-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579260" comment="libldap-2_4-2-x86-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579261" comment="openldap2-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579262" comment="openldap2-back-meta-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579263" comment="openldap2-client-2.4.26-0.30.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579257" comment="compat-libldap-2_3-0-2.3.37-2.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579258" comment="libldap-2_4-2-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579259" comment="libldap-2_4-2-32bit-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579260" comment="libldap-2_4-2-x86-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579261" comment="openldap2-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579262" comment="openldap2-back-meta-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579263" comment="openldap2-client-2.4.26-0.30.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219142" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="945582" ref_url="https://bugzilla.suse.com/945582" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001793.html" source="SUSE-SU"/>
		<description>


This update fixes the following security issue:

- CVE-2015-6908. Passing a crafted packet to the function  ber_get_next(),
    an attacker may cause a remote denial of service, crashing the OpenLDAP server (bsc#945582).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-12"/>
	<updated date="2016-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/945582">SUSE bug 945582</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6908">CVE-2015-6908 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579264" comment="compat-libldap-2_3-0-2.3.37-2.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579265" comment="libldap-2_4-2-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579266" comment="libldap-2_4-2-32bit-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579267" comment="libldap-2_4-2-x86-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579268" comment="openldap2-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579269" comment="openldap2-back-meta-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579270" comment="openldap2-client-2.4.26-0.62.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579264" comment="compat-libldap-2_3-0-2.3.37-2.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579265" comment="libldap-2_4-2-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579266" comment="libldap-2_4-2-32bit-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579267" comment="libldap-2_4-2-x86-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579268" comment="openldap2-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579269" comment="openldap2-back-meta-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579270" comment="openldap2-client-2.4.26-0.62.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579264" comment="compat-libldap-2_3-0-2.3.37-2.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579265" comment="libldap-2_4-2-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579266" comment="libldap-2_4-2-32bit-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579267" comment="libldap-2_4-2-x86-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579268" comment="openldap2-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579269" comment="openldap2-back-meta-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579270" comment="openldap2-client-2.4.26-0.62.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219143" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1104812" ref_url="https://bugzilla.suse.com/1104812" source="BUGZILLA"/>
		<reference ref_id="1106998" ref_url="https://bugzilla.suse.com/1106998" source="BUGZILLA"/>
		<reference ref_id="1106999" ref_url="https://bugzilla.suse.com/1106999" source="BUGZILLA"/>
		<reference ref_id="1107033" ref_url="https://bugzilla.suse.com/1107033" source="BUGZILLA"/>
		<reference ref_id="1107037" ref_url="https://bugzilla.suse.com/1107037" source="BUGZILLA"/>
		<reference ref_id="1107038" ref_url="https://bugzilla.suse.com/1107038" source="BUGZILLA"/>
		<reference ref_id="1107039" ref_url="https://bugzilla.suse.com/1107039" source="BUGZILLA"/>
		<reference ref_id="1107107" ref_url="https://bugzilla.suse.com/1107107" source="BUGZILLA"/>
		<reference ref_id="1108318" ref_url="https://bugzilla.suse.com/1108318" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16391" ref_url="https://www.suse.com/security/cve/CVE-2018-16391/" source="CVE"/>
		<reference ref_id="CVE-2018-16392" ref_url="https://www.suse.com/security/cve/CVE-2018-16392/" source="CVE"/>
		<reference ref_id="CVE-2018-16393" ref_url="https://www.suse.com/security/cve/CVE-2018-16393/" source="CVE"/>
		<reference ref_id="CVE-2018-16418" ref_url="https://www.suse.com/security/cve/CVE-2018-16418/" source="CVE"/>
		<reference ref_id="CVE-2018-16419" ref_url="https://www.suse.com/security/cve/CVE-2018-16419/" source="CVE"/>
		<reference ref_id="CVE-2018-16422" ref_url="https://www.suse.com/security/cve/CVE-2018-16422/" source="CVE"/>
		<reference ref_id="CVE-2018-16423" ref_url="https://www.suse.com/security/cve/CVE-2018-16423/" source="CVE"/>
		<reference ref_id="CVE-2018-16427" ref_url="https://www.suse.com/security/cve/CVE-2018-16427/" source="CVE"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2018-16391: Fixed a denial of service when handling responses from a Muscle Card (bsc#1106998)
- CVE-2018-16392: Fixed a denial of service when handling responses from a TCOS Card (bsc#1106999)
- CVE-2018-16393: Fixed buffer overflows when handling responses from Gemsafe V1 Smartcards (bsc#1108318)
- CVE-2018-16418: Fixed buffer overflow when handling string concatenation in util_acl_to_str (bsc#1107039)
- CVE-2018-16419: Fixed several buffer overflows when handling responses from a Cryptoflex card (bsc#1107107)
- CVE-2018-16422: Fixed single byte buffer overflow when handling responses from an esteid Card (bsc#1107038)
- CVE-2018-16423: Fixed double free when handling responses from a smartcard (bsc#1107037)
- CVE-2018-16427: Fixed out of bounds reads when handling responses in OpenSC (bsc#1107033)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-05"/>
	<updated date="2018-11-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104812">SUSE bug 1104812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106998">SUSE bug 1106998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106999">SUSE bug 1106999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107033">SUSE bug 1107033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107037">SUSE bug 1107037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107038">SUSE bug 1107038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107039">SUSE bug 1107039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107107">SUSE bug 1107107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108318">SUSE bug 1108318</bugzilla>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16391/">CVE-2018-16391 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16391">CVE-2018-16391 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16392/">CVE-2018-16392 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16392">CVE-2018-16392 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16393/">CVE-2018-16393 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16393">CVE-2018-16393 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16418/">CVE-2018-16418 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16418">CVE-2018-16418 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16419/">CVE-2018-16419 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16419">CVE-2018-16419 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16422/">CVE-2018-16422 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16422">CVE-2018-16422 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16423/">CVE-2018-16423 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16423">CVE-2018-16423 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16427/">CVE-2018-16427 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16427">CVE-2018-16427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572909" comment="libopensc2-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572910" comment="libopensc2-32bit-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572911" comment="opensc-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572912" comment="opensc-32bit-0.11.6-5.27.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219144" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122756" ref_url="https://bugzilla.suse.com/1122756" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6502" ref_url="https://www.suse.com/security/cve/CVE-2019-6502/" source="CVE"/>
		<description>
This update for opensc fixes the following issues:

Security issue fixed:

- CVE-2019-6502: Fixed a memory leak in sc_context_create() (bsc#1122756).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-04"/>
	<updated date="2020-11-04"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1122756">SUSE bug 1122756</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6502/">CVE-2019-6502 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6502">CVE-2019-6502 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572913" comment="libopensc2-0.11.6-5.27.6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572914" comment="libopensc2-32bit-0.11.6-5.27.6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572915" comment="opensc-0.11.6-5.27.6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572916" comment="opensc-32bit-0.11.6-5.27.6.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219145" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1149746" ref_url="https://bugzilla.suse.com/1149746" source="BUGZILLA"/>
		<reference ref_id="1149747" ref_url="https://bugzilla.suse.com/1149747" source="BUGZILLA"/>
		<reference ref_id="1158256" ref_url="https://bugzilla.suse.com/1158256" source="BUGZILLA"/>
		<reference ref_id="1177378" ref_url="https://bugzilla.suse.com/1177378" source="BUGZILLA"/>
		<reference ref_id="1177380" ref_url="https://bugzilla.suse.com/1177380" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15945" ref_url="https://www.suse.com/security/cve/CVE-2019-15945/" source="CVE"/>
		<reference ref_id="CVE-2019-15946" ref_url="https://www.suse.com/security/cve/CVE-2019-15946/" source="CVE"/>
		<reference ref_id="CVE-2019-19479" ref_url="https://www.suse.com/security/cve/CVE-2019-19479/" source="CVE"/>
		<reference ref_id="CVE-2020-26571" ref_url="https://www.suse.com/security/cve/CVE-2020-26571/" source="CVE"/>
		<reference ref_id="CVE-2020-26572" ref_url="https://www.suse.com/security/cve/CVE-2020-26572/" source="CVE"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2020-26571: gemsafe GPK smart card software driver stack-based buffer overflow (bsc#1177380)
- CVE-2019-15946: out-of-bounds access of an ASN.1 Octet string in asn1_decode_entry (bsc#1149747)
- CVE-2019-15945: out-of-bounds access of an ASN.1 Bitstring in decode_bit_string (bsc#1149746)
- CVE-2019-19479: incorrect read operation during parsing of a SETCOS file attribute (bsc#1158256)
- CVE-2020-26572: Prevent out of bounds write (bsc#1177378)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-06"/>
	<updated date="2021-04-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149746">SUSE bug 1149746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149747">SUSE bug 1149747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158256">SUSE bug 1158256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177378">SUSE bug 1177378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177380">SUSE bug 1177380</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15945/">CVE-2019-15945 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15945">CVE-2019-15945 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15946/">CVE-2019-15946 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15946">CVE-2019-15946 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19479/">CVE-2019-19479 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19479">CVE-2019-19479 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26571/">CVE-2020-26571 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26571">CVE-2020-26571 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26572/">CVE-2020-26572 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26572">CVE-2020-26572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572917" comment="libopensc2-0.11.6-5.27.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572918" comment="libopensc2-32bit-0.11.6-5.27.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572919" comment="opensc-0.11.6-5.27.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572920" comment="opensc-32bit-0.11.6-5.27.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219146" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1191957" ref_url="https://bugzilla.suse.com/1191957" source="BUGZILLA"/>
		<reference ref_id="1192005" ref_url="https://bugzilla.suse.com/1192005" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42780" ref_url="https://www.suse.com/security/cve/CVE-2021-42780/" source="CVE"/>
		<reference ref_id="CVE-2021-42782" ref_url="https://www.suse.com/security/cve/CVE-2021-42782/" source="CVE"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2021-42780: Fixed use after return in insert_pin() (bsc#1192005).
- CVE-2021-42782: Stack buffer overflow issues in various places (bsc#1191957).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-29"/>
	<updated date="2021-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191957">SUSE bug 1191957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192005">SUSE bug 1192005</bugzilla>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-42780/">CVE-2021-42780 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42780">CVE-2021-42780 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42782/">CVE-2021-42782 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42782">CVE-2021-42782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653634" comment="libopensc2-0.11.6-5.27.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653635" comment="libopensc2-32bit-0.11.6-5.27.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653636" comment="opensc-0.11.6-5.27.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653637" comment="opensc-32bit-0.11.6-5.27.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219147" version="1" class="patch">
	<metadata>
		<title>Security update for OpenSLP</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="778508" ref_url="https://bugzilla.suse.com/778508" source="BUGZILLA"/>
		<reference ref_id="855385" ref_url="https://bugzilla.suse.com/855385" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4428" ref_url="https://www.suse.com/security/cve/CVE-2012-4428/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001397.html" source="SUSE-SU"/>
		<description>

This update for OpenSLP fixes a bug in SLPIntersectStringList that could 
lead to an out-of-bounds read (CVE-2012-4428). Additionally, the SLP daemon 
now always use localtime(3) when writing to log files to avoid having 
timestamps with different timezones.

Security Issues:

    * CVE-2012-4428
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4428&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-06"/>
	<updated date="2015-05-06"/>
	<bugzilla href="https://bugzilla.suse.com/778508">SUSE bug 778508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855385">SUSE bug 855385</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2012-4428/">CVE-2012-4428 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-4428">CVE-2012-4428 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579271" comment="openslp-1.2.0-172.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579272" comment="openslp-32bit-1.2.0-172.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579273" comment="openslp-server-1.2.0-172.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579274" comment="openslp-x86-1.2.0-172.24.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579271" comment="openslp-1.2.0-172.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579272" comment="openslp-32bit-1.2.0-172.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579273" comment="openslp-server-1.2.0-172.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579274" comment="openslp-x86-1.2.0-172.24.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579271" comment="openslp-1.2.0-172.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579272" comment="openslp-32bit-1.2.0-172.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579273" comment="openslp-server-1.2.0-172.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579274" comment="openslp-x86-1.2.0-172.24.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219148" version="1" class="patch">
	<metadata>
		<title>Security update for openslp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1090638" ref_url="https://bugzilla.suse.com/1090638" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004251.html" source="SUSE-SU"/>
		<description>
This update for openslp fixes the following issues:

- CVE-2017-17833: Prevent heap-related memory corruption issue which may have
  manifested itself as a denial-of-service or a remote code-execution
  vulnerability (bsc#1090638).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-09"/>
	<updated date="2018-07-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17833">CVE-2017-17833 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572921" comment="libslp1-openssl1-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572922" comment="libslp1-openssl1-32bit-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579275" comment="openslp-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579276" comment="openslp-32bit-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579277" comment="openslp-server-1.2.0-172.27.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572921" comment="libslp1-openssl1-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572922" comment="libslp1-openssl1-32bit-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579275" comment="openslp-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579276" comment="openslp-32bit-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579277" comment="openslp-server-1.2.0-172.27.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219149" version="1" class="patch">
	<metadata>
		<title>Security update for openssh</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="826427" ref_url="https://bugzilla.suse.com/826427" source="BUGZILLA"/>
		<reference ref_id="833605" ref_url="https://bugzilla.suse.com/833605" source="BUGZILLA"/>
		<reference ref_id="847710" ref_url="https://bugzilla.suse.com/847710" source="BUGZILLA"/>
		<reference ref_id="869101" ref_url="https://bugzilla.suse.com/869101" source="BUGZILLA"/>
		<reference ref_id="870532" ref_url="https://bugzilla.suse.com/870532" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2532" ref_url="https://www.suse.com/security/cve/CVE-2014-2532/" source="CVE"/>
		<description>

This update for OpenSSH fixes the following issues:

    * Exit sshd normally when port is already in use. (bnc#832628)
    * Use hardware crypto engines where available. (bnc#826427)
    * Use correct options for login when it is used. (bnc#833605)
    * Move FIPS messages to higher debug level. (bnc#862875)
    * Fix forwarding with IPv6 addresses in DISPLAY. (bnc#847710)
    * Do not link OpenSSH binaries with LDAP libraries. (bnc#826906)
    * Parse AcceptEnv properly. (bnc#869101, CVE-2014-2532)
    * Check SSHFP DNS records even for server certificates. (bnc#870532,
      CVE-2014-2653)

Security Issues references:

    * CVE-2014-2532
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2532&gt;
    * CVE-2014-2653
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2653&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-07"/>
	<updated date="2014-06-07"/>
	<bugzilla href="https://bugzilla.suse.com/826427">SUSE bug 826427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833605">SUSE bug 833605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847710">SUSE bug 847710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869101">SUSE bug 869101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870532">SUSE bug 870532</bugzilla>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-2532/">CVE-2014-2532 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-2532">CVE-2014-2532 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579278" comment="openssh-6.2p2-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579279" comment="openssh-askpass-6.2p2-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579280" comment="openssh-askpass-gnome-6.2p2-0.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579278" comment="openssh-6.2p2-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579279" comment="openssh-askpass-6.2p2-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579280" comment="openssh-askpass-gnome-6.2p2-0.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579278" comment="openssh-6.2p2-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579279" comment="openssh-askpass-6.2p2-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579280" comment="openssh-askpass-gnome-6.2p2-0.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219150" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="673532" ref_url="https://bugzilla.suse.com/673532" source="BUGZILLA"/>
		<reference ref_id="903649" ref_url="https://bugzilla.suse.com/903649" source="BUGZILLA"/>
		<reference ref_id="905118" ref_url="https://bugzilla.suse.com/905118" source="BUGZILLA"/>
		<reference ref_id="914309" ref_url="https://bugzilla.suse.com/914309" source="BUGZILLA"/>
		<reference ref_id="916549" ref_url="https://bugzilla.suse.com/916549" source="BUGZILLA"/>
		<reference ref_id="932483" ref_url="https://bugzilla.suse.com/932483" source="BUGZILLA"/>
		<reference ref_id="936695" ref_url="https://bugzilla.suse.com/936695" source="BUGZILLA"/>
		<reference ref_id="938746" ref_url="https://bugzilla.suse.com/938746" source="BUGZILLA"/>
		<reference ref_id="943006" ref_url="https://bugzilla.suse.com/943006" source="BUGZILLA"/>
		<reference ref_id="943010" ref_url="https://bugzilla.suse.com/943010" source="BUGZILLA"/>
		<reference ref_id="945493" ref_url="https://bugzilla.suse.com/945493" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-5352" ref_url="https://www.suse.com/security/cve/CVE-2015-5352/" source="CVE"/>
		<reference ref_id="CVE-2015-5600" ref_url="https://www.suse.com/security/cve/CVE-2015-5600/" source="CVE"/>
		<reference ref_id="CVE-2015-6563" ref_url="https://www.suse.com/security/cve/CVE-2015-6563/" source="CVE"/>
		<reference ref_id="CVE-2015-6564" ref_url="https://www.suse.com/security/cve/CVE-2015-6564/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001595.html" source="SUSE-SU"/>
		<description>
openssh was updated to fix several security issues and bugs.

These security issues were fixed:
* CVE-2015-5352: The x11_open_helper function in channels.c in ssh
  in OpenSSH when ForwardX11Trusted mode is not used, lacked a check of
  the refusal deadline for X connections, which made it easier for remote
  attackers to bypass intended access restrictions via a connection outside
  of the permitted time window (bsc#936695).
* CVE-2015-5600: The kbdint_next_device function in auth2-chall.c
  in sshd in OpenSSH did not properly restrict the processing of
  keyboard-interactive devices within a single connection, which made it
  easier for remote attackers to conduct brute-force attacks or cause a
  denial of service (CPU consumption) via a long and duplicative list in
  the ssh -oKbdInteractiveDevices option, as demonstrated by a modified
  client that provides a different password for each pam element on this
  list (bsc#938746).
* CVE-2015-4000: Removed and disabled weak DH groups to address LOGJAM (bsc#932483).
* Hardening patch to fix sftp RCE (bsc#903649).
* CVE-2015-6563: The monitor component in sshd in OpenSSH accepted
  extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which
  allowed local users to conduct impersonation attacks by leveraging any SSH
  login access in conjunction with control of the sshd uid to send a crafted
  MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
* CVE-2015-6564: Use-after-free vulnerability in the
  mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH might
  have allowed local users to gain privileges by leveraging control of the
  sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.

These non-security issues were fixed:
- bsc#914309: sshd inherits oom_adj -17 on SIGHUP causing DoS potential for oom_killer.
- bsc#673532: limits.conf fsize change in SLES10SP3 causing problems to WebSphere mqm user.
- bsc#916549: Fixed support for aesXXX-gcm@openssh.com.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-17"/>
	<updated date="2015-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/673532">SUSE bug 673532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903649">SUSE bug 903649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905118">SUSE bug 905118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914309">SUSE bug 914309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916549">SUSE bug 916549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936695">SUSE bug 936695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938746">SUSE bug 938746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943006">SUSE bug 943006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943010">SUSE bug 943010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945493">SUSE bug 945493</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5352/">CVE-2015-5352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5352">CVE-2015-5352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5600/">CVE-2015-5600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5600">CVE-2015-5600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6563/">CVE-2015-6563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6563">CVE-2015-6563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6564/">CVE-2015-6564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6564">CVE-2015-6564 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579281" comment="openssh-6.2p2-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579282" comment="openssh-askpass-6.2p2-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579283" comment="openssh-askpass-gnome-6.2p2-0.21.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579281" comment="openssh-6.2p2-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579282" comment="openssh-askpass-6.2p2-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579283" comment="openssh-askpass-gnome-6.2p2-0.21.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579281" comment="openssh-6.2p2-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579282" comment="openssh-askpass-6.2p2-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579283" comment="openssh-askpass-gnome-6.2p2-0.21.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219151" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="932483" ref_url="https://bugzilla.suse.com/932483" source="BUGZILLA"/>
		<reference ref_id="948902" ref_url="https://bugzilla.suse.com/948902" source="BUGZILLA"/>
		<reference ref_id="959096" ref_url="https://bugzilla.suse.com/959096" source="BUGZILLA"/>
		<reference ref_id="962313" ref_url="https://bugzilla.suse.com/962313" source="BUGZILLA"/>
		<reference ref_id="962794" ref_url="https://bugzilla.suse.com/962794" source="BUGZILLA"/>
		<reference ref_id="970632" ref_url="https://bugzilla.suse.com/970632" source="BUGZILLA"/>
		<reference ref_id="975865" ref_url="https://bugzilla.suse.com/975865" source="BUGZILLA"/>
		<reference ref_id="981654" ref_url="https://bugzilla.suse.com/981654" source="BUGZILLA"/>
		<reference ref_id="989363" ref_url="https://bugzilla.suse.com/989363" source="BUGZILLA"/>
		<reference ref_id="992533" ref_url="https://bugzilla.suse.com/992533" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8325" ref_url="https://www.suse.com/security/cve/CVE-2015-8325/" source="CVE"/>
		<reference ref_id="CVE-2016-1908" ref_url="https://www.suse.com/security/cve/CVE-2016-1908/" source="CVE"/>
		<reference ref_id="CVE-2016-3115" ref_url="https://www.suse.com/security/cve/CVE-2016-3115/" source="CVE"/>
		<reference ref_id="CVE-2016-6210" ref_url="https://www.suse.com/security/cve/CVE-2016-6210/" source="CVE"/>
		<reference ref_id="CVE-2016-6515" ref_url="https://www.suse.com/security/cve/CVE-2016-6515/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002289.html" source="SUSE-SU"/>
		<description>

This update for OpenSSH fixes the following issues:

- Prevent user enumeration through the timing of password processing.
  (bsc#989363, CVE-2016-6210)
- Allow lowering the DH groups parameter limit in server as well as when GSSAPI
  key exchange is used. (bsc#948902)
- Sanitize input for xauth(1). (bsc#970632, CVE-2016-3115)
- Prevent X11 SECURITY circumvention when forwarding X11 connections.
  (bsc#962313, CVE-2016-1908)
- Disable DH parameters under 2048 bits by default and allow lowering the limit back
  to the RFC 4419 specified minimum through an option. (bsc#932483, bsc#948902)
- Ignore PAM environment when using login. (bsc#975865, CVE-2015-8325)
- Limit the accepted password length (prevents a possible denial of service).
  (bsc#992533, CVE-2016-6515)
- Relax version requires for the openssh-askpass sub-package. (bsc#962794)
- Avoid complaining about unset DISPLAY variable. (bsc#981654)
- Initialize message id to prevent connection breakups in some cases. (bsc#959096)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-26"/>
	<updated date="2016-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948902">SUSE bug 948902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959096">SUSE bug 959096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962313">SUSE bug 962313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962794">SUSE bug 962794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970632">SUSE bug 970632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975865">SUSE bug 975865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981654">SUSE bug 981654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989363">SUSE bug 989363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992533">SUSE bug 992533</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8325/">CVE-2015-8325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8325">CVE-2015-8325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1908/">CVE-2016-1908 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1908">CVE-2016-1908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3115/">CVE-2016-3115 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3115">CVE-2016-3115 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-6210/">CVE-2016-6210 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6210">CVE-2016-6210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6515/">CVE-2016-6515 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6515">CVE-2016-6515 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579284" comment="openssh-6.2p2-0.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579285" comment="openssh-askpass-6.2p2-0.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579286" comment="openssh-askpass-gnome-6.2p2-0.33.5 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579284" comment="openssh-6.2p2-0.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579285" comment="openssh-askpass-6.2p2-0.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579286" comment="openssh-askpass-gnome-6.2p2-0.33.5 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219152" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1005480" ref_url="https://bugzilla.suse.com/1005480" source="BUGZILLA"/>
		<reference ref_id="1005893" ref_url="https://bugzilla.suse.com/1005893" source="BUGZILLA"/>
		<reference ref_id="1016366" ref_url="https://bugzilla.suse.com/1016366" source="BUGZILLA"/>
		<reference ref_id="1016369" ref_url="https://bugzilla.suse.com/1016369" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10009" ref_url="https://www.suse.com/security/cve/CVE-2016-10009/" source="CVE"/>
		<reference ref_id="CVE-2016-10011" ref_url="https://www.suse.com/security/cve/CVE-2016-10011/" source="CVE"/>
		<reference ref_id="CVE-2016-8858" ref_url="https://www.suse.com/security/cve/CVE-2016-8858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002679.html" source="SUSE-SU"/>
		<description>

This update for openssh fixes the following issues:

Security issues fixed:
- CVE-2016-8858: prevent resource depletion during key exchange (bsc#1005480)
- CVE-2016-10009: limit directories for loading PKCS11 modules to avoid privilege escalation (bsc#1016366)
- CVE-2016-10011: Prevent possible leaks of host private keys to low-privilege process handling authentication (bsc#1016369)

Non security issues fixed:
- Properly verify CIDR masks in the AllowUsers and DenyUsers configuration lists (bsc#1005893)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-06"/>
	<updated date="2017-03-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005480">SUSE bug 1005480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005893">SUSE bug 1005893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016366">SUSE bug 1016366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016369">SUSE bug 1016369</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10009/">CVE-2016-10009 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10009">CVE-2016-10009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10011/">CVE-2016-10011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10011">CVE-2016-10011 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8858/">CVE-2016-8858 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8858">CVE-2016-8858 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579287" comment="openssh-6.2p2-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579288" comment="openssh-askpass-6.2p2-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579289" comment="openssh-askpass-gnome-6.2p2-0.40.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579287" comment="openssh-6.2p2-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579288" comment="openssh-askpass-6.2p2-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579289" comment="openssh-askpass-gnome-6.2p2-0.40.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219153" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1016370" ref_url="https://bugzilla.suse.com/1016370" source="BUGZILLA"/>
		<reference ref_id="1065000" ref_url="https://bugzilla.suse.com/1065000" source="BUGZILLA"/>
		<reference ref_id="1076957" ref_url="https://bugzilla.suse.com/1076957" source="BUGZILLA"/>
		<reference ref_id="1105010" ref_url="https://bugzilla.suse.com/1105010" source="BUGZILLA"/>
		<reference ref_id="1105180" ref_url="https://bugzilla.suse.com/1105180" source="BUGZILLA"/>
		<reference ref_id="1106163" ref_url="https://bugzilla.suse.com/1106163" source="BUGZILLA"/>
		<reference ref_id="1106726" ref_url="https://bugzilla.suse.com/1106726" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10012" ref_url="https://www.suse.com/security/cve/CVE-2016-10012/" source="CVE"/>
		<reference ref_id="CVE-2016-10708" ref_url="https://www.suse.com/security/cve/CVE-2016-10708/" source="CVE"/>
		<reference ref_id="CVE-2017-15906" ref_url="https://www.suse.com/security/cve/CVE-2017-15906/" source="CVE"/>
		<reference ref_id="CVE-2018-15473" ref_url="https://www.suse.com/security/cve/CVE-2018-15473/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004804.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security issues fixed:

- CVE-2018-15919: Remotely observable behaviour in auth-gss2.c in OpenSSH could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. OpenSSH developers do not want to treat such a username enumeration (or 'oracle') as a vulnerability. (bsc#1106163)
- CVE-2017-15906: The process_open function in sftp-server.c in OpenSSH did not properly prevent write operations in readonly mode, which allowed attackers to create zero-length files. (bsc#1065000, bsc#1106726)
- CVE-2016-10708: sshd allowed remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.  (bsc#1076957)
- CVE-2018-15473: OpenSSH was prone to a user existance oracle vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. (bsc#1105010)
- CVE-2016-10012: Removed pre-auth compression support from the server to prevent possible cryptographic attacks.  (bsc#1016370)

Bugs fixed:

- Fixed failing 'AuthorizedKeysCommand' within a 'Match User' block in sshd_config (bsc#1105180)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-29"/>
	<updated date="2018-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1016370">SUSE bug 1016370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065000">SUSE bug 1065000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076957">SUSE bug 1076957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105180">SUSE bug 1105180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106163">SUSE bug 1106163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106726">SUSE bug 1106726</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10012/">CVE-2016-10012 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10012">CVE-2016-10012 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10708/">CVE-2016-10708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10708">CVE-2016-10708 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15906/">CVE-2017-15906 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15906">CVE-2017-15906 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15473/">CVE-2018-15473 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15473">CVE-2018-15473 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579290" comment="openssh-6.2p2-0.41.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579291" comment="openssh-askpass-6.2p2-0.41.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579292" comment="openssh-askpass-gnome-6.2p2-0.41.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579290" comment="openssh-6.2p2-0.41.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579291" comment="openssh-askpass-6.2p2-0.41.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579292" comment="openssh-askpass-gnome-6.2p2-0.41.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219154" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1121571" ref_url="https://bugzilla.suse.com/1121571" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20685" ref_url="https://www.suse.com/security/cve/CVE-2018-20685/" source="CVE"/>
		<description>

  
This update for openssh to version 6.6p1 fixes the following issues:

Security issues fixed:

- CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions (bsc#1121571)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-08"/>
	<updated date="2019-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20685/">CVE-2018-20685 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20685">CVE-2018-20685 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579293" comment="openssh-6.6p1-41.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579294" comment="openssh-askpass-gnome-6.6p1-41.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579295" comment="openssh-openssl1-6.6p1-41.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579296" comment="openssh-openssl1-helpers-6.6p1-41.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219155" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1090671" ref_url="https://bugzilla.suse.com/1090671" source="BUGZILLA"/>
		<reference ref_id="1115550" ref_url="https://bugzilla.suse.com/1115550" source="BUGZILLA"/>
		<reference ref_id="1119183" ref_url="https://bugzilla.suse.com/1119183" source="BUGZILLA"/>
		<reference ref_id="1121816" ref_url="https://bugzilla.suse.com/1121816" source="BUGZILLA"/>
		<reference ref_id="1121821" ref_url="https://bugzilla.suse.com/1121821" source="BUGZILLA"/>
		<reference ref_id="1131709" ref_url="https://bugzilla.suse.com/1131709" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<description>
This update for openssh fixes the following issues:

Security vulnerabilities addressed:

- CVE-2019-6109: Fixed an character encoding issue in the progress display of
  the scp client that could be used to manipulate client output, allowing
  for spoofing during file transfers (bsc#1121816).
- CVE-2019-6111: Properly validate object names received by the scp client to
  prevent arbitrary file overwrites when interacting with a malicious SSH server
  (bsc#1121821).

Other issues fixed: 

- Fixed two race conditions in sshd relating to SIGHUP (bsc#1119183).
- Returned proper reason for port forwarding failures (bsc#1090671).
- Fixed SSHD termination of multichannel sessions with non-root users (bsc#1115550).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-11"/>
	<updated date="2019-04-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1090671">SUSE bug 1090671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115550">SUSE bug 1115550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119183">SUSE bug 1119183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131709">SUSE bug 1131709</bugzilla>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6109">CVE-2019-6109 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6111">CVE-2019-6111 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579297" comment="openssh-6.6p1-41.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579298" comment="openssh-askpass-gnome-6.6p1-41.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579299" comment="openssh-openssl1-6.6p1-41.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579300" comment="openssh-openssl1-helpers-6.6p1-41.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219156" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1173513" ref_url="https://bugzilla.suse.com/1173513" source="BUGZILLA"/>
		<reference ref_id="1183076" ref_url="https://bugzilla.suse.com/1183076" source="BUGZILLA"/>
		<reference ref_id="1190975" ref_url="https://bugzilla.suse.com/1190975" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14145" ref_url="https://www.suse.com/security/cve/CVE-2020-14145/" source="CVE"/>
		<reference ref_id="CVE-2021-41617" ref_url="https://www.suse.com/security/cve/CVE-2021-41617/" source="CVE"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2020-14145: Fixed an information leak during host key exchange that could have been exploited by a man-in-the-middle attacker (bsc#1173513). 
- CVE-2021-41617: Fixed privilege escalation when AuthorizedKeysCommand/AuthorizedPrincipalsCommand are configured (bsc#1190975).

The following non-security bug was fixed:

- Fixed segmentation faults in CVE-2020-14145 patch (bsc#1183076).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-04"/>
	<updated date="2022-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173513">SUSE bug 1173513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183076">SUSE bug 1183076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190975">SUSE bug 1190975</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14145/">CVE-2020-14145 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14145">CVE-2020-14145 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41617/">CVE-2021-41617 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41617">CVE-2021-41617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993719" comment="openssh-6.6p1-41.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993720" comment="openssh-askpass-gnome-6.6p1-41.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993721" comment="openssh-openssl1-6.6p1-41.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993722" comment="openssh-openssl1-helpers-6.6p1-41.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219157" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="961642" ref_url="https://bugzilla.suse.com/961642" source="BUGZILLA"/>
		<reference ref_id="961645" ref_url="https://bugzilla.suse.com/961645" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777/" source="CVE"/>
		<reference ref_id="CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001804.html" source="SUSE-SU"/>
		<description>

This update for openssh fixes the following issues:

- CVE-2016-0777: A malicious or compromised server could cause the OpenSSH client to expose part or all of the client's private key through the roaming feature (bsc#961642)
- CVE-2016-0778: A malicious or compromised server could could trigger a buffer overflow in the OpenSSH client through the roaming feature (bsc#961645)

This update disables the undocumented feature supported by the OpenSSH client and a commercial SSH server.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-14"/>
	<updated date="2016-01-14"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/961642">SUSE bug 961642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961645">SUSE bug 961645</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0777">CVE-2016-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0778">CVE-2016-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579301" comment="openssh-6.2p2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579302" comment="openssh-askpass-6.2p2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579303" comment="openssh-askpass-gnome-6.2p2-0.24.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579301" comment="openssh-6.2p2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579302" comment="openssh-askpass-6.2p2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579303" comment="openssh-askpass-gnome-6.2p2-0.24.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579301" comment="openssh-6.2p2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579302" comment="openssh-askpass-6.2p2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579303" comment="openssh-askpass-gnome-6.2p2-0.24.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219158" version="1" class="patch">
	<metadata>
		<title>Security update for openssh-openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="729190" ref_url="https://bugzilla.suse.com/729190" source="BUGZILLA"/>
		<reference ref_id="932483" ref_url="https://bugzilla.suse.com/932483" source="BUGZILLA"/>
		<reference ref_id="948902" ref_url="https://bugzilla.suse.com/948902" source="BUGZILLA"/>
		<reference ref_id="960414" ref_url="https://bugzilla.suse.com/960414" source="BUGZILLA"/>
		<reference ref_id="961368" ref_url="https://bugzilla.suse.com/961368" source="BUGZILLA"/>
		<reference ref_id="961494" ref_url="https://bugzilla.suse.com/961494" source="BUGZILLA"/>
		<reference ref_id="962313" ref_url="https://bugzilla.suse.com/962313" source="BUGZILLA"/>
		<reference ref_id="965576" ref_url="https://bugzilla.suse.com/965576" source="BUGZILLA"/>
		<reference ref_id="970632" ref_url="https://bugzilla.suse.com/970632" source="BUGZILLA"/>
		<reference ref_id="975865" ref_url="https://bugzilla.suse.com/975865" source="BUGZILLA"/>
		<reference ref_id="981654" ref_url="https://bugzilla.suse.com/981654" source="BUGZILLA"/>
		<reference ref_id="989363" ref_url="https://bugzilla.suse.com/989363" source="BUGZILLA"/>
		<reference ref_id="992533" ref_url="https://bugzilla.suse.com/992533" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8325" ref_url="https://www.suse.com/security/cve/CVE-2015-8325/" source="CVE"/>
		<reference ref_id="CVE-2016-1908" ref_url="https://www.suse.com/security/cve/CVE-2016-1908/" source="CVE"/>
		<reference ref_id="CVE-2016-3115" ref_url="https://www.suse.com/security/cve/CVE-2016-3115/" source="CVE"/>
		<reference ref_id="CVE-2016-6210" ref_url="https://www.suse.com/security/cve/CVE-2016-6210/" source="CVE"/>
		<reference ref_id="CVE-2016-6515" ref_url="https://www.suse.com/security/cve/CVE-2016-6515/" source="CVE"/>
		<description>

This update for openssh-openssl1 fixes the following issues:

Security issues fixed:
- CVE-2016-6210: Prevent user enumeration through the timing of password
  processing (bsc#989363)
- CVE-2016-6515: limit accepted password length (prevents possible DoS)
  (bsc#992533)
- CVE-2016-3115: Sanitise input for xauth(1) (bsc#970632)
- CVE-2016-1908: prevent X11 SECURITY circumvention when forwarding X11
  connections (bsc#962313)
- CVE-2015-8325: ignore PAM environment when using login (bsc#975865)
- Disable DH parameters under 2048 bits by default and allow
  lowering the limit back to the RFC 4419 specified minimum
  through an option (bsc#932483, bsc#948902)
- Allow lowering the DH groups parameter limit in server as well
  as when GSSAPI key exchange is used (bsc#948902)

Bugs fixed:
- avoid complaining about unset DISPLAY variable (bsc#981654)
- Correctly parse GSSAPI KEX algorithms (bsc#961368)
- more verbose FIPS mode/CC related documentation in README.FIPS
  (bsc#965576, bsc#960414)
- fix PRNG re-seeding (bsc#960414, bsc#729190)
- Allow empty Match blocks (bsc#961494)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-17"/>
	<updated date="2016-10-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/729190">SUSE bug 729190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948902">SUSE bug 948902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960414">SUSE bug 960414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961368">SUSE bug 961368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961494">SUSE bug 961494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962313">SUSE bug 962313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965576">SUSE bug 965576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970632">SUSE bug 970632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975865">SUSE bug 975865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981654">SUSE bug 981654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989363">SUSE bug 989363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992533">SUSE bug 992533</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8325/">CVE-2015-8325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8325">CVE-2015-8325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1908/">CVE-2016-1908 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1908">CVE-2016-1908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3115/">CVE-2016-3115 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3115">CVE-2016-3115 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-6210/">CVE-2016-6210 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6210">CVE-2016-6210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6515/">CVE-2016-6515 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6515">CVE-2016-6515 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579304" comment="openssh-openssl1-6.6p1-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579305" comment="openssh-openssl1-helpers-6.6p1-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219159" version="1" class="patch">
	<metadata>
		<title>Security update for openssh-openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1005480" ref_url="https://bugzilla.suse.com/1005480" source="BUGZILLA"/>
		<reference ref_id="1005893" ref_url="https://bugzilla.suse.com/1005893" source="BUGZILLA"/>
		<reference ref_id="1006221" ref_url="https://bugzilla.suse.com/1006221" source="BUGZILLA"/>
		<reference ref_id="1016366" ref_url="https://bugzilla.suse.com/1016366" source="BUGZILLA"/>
		<reference ref_id="1016369" ref_url="https://bugzilla.suse.com/1016369" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10009" ref_url="https://www.suse.com/security/cve/CVE-2016-10009/" source="CVE"/>
		<reference ref_id="CVE-2016-10011" ref_url="https://www.suse.com/security/cve/CVE-2016-10011/" source="CVE"/>
		<reference ref_id="CVE-2016-8858" ref_url="https://www.suse.com/security/cve/CVE-2016-8858/" source="CVE"/>
		<description>
This update for openssh-openssl1 fixes the following issues:


- Properly verify CIDR masks in configuration (bsc#1005893)

- CVE-2016-10009: limit directories for loading PKCS11 modules (bsc#1016366)

- CVE-2016-10011: Prevent possible leaks of host private keys to low-privilege
  process handling authentication (bsc#1016369)

- CVE-2016-8858: prevent resource depletion during key exchange (bsc#1005480)

- fix suggested command for removing conflicting server keys from
  the known_hosts file (bsc#1006221)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-23"/>
	<updated date="2017-06-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005480">SUSE bug 1005480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005893">SUSE bug 1005893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006221">SUSE bug 1006221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016366">SUSE bug 1016366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016369">SUSE bug 1016369</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10009/">CVE-2016-10009 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10009">CVE-2016-10009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10011/">CVE-2016-10011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10011">CVE-2016-10011 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8858/">CVE-2016-8858 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8858">CVE-2016-8858 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579306" comment="openssh-openssl1-6.6p1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579307" comment="openssh-openssl1-helpers-6.6p1-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219160" version="1" class="patch">
	<metadata>
		<title>Security update for openssh-openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1016370" ref_url="https://bugzilla.suse.com/1016370" source="BUGZILLA"/>
		<reference ref_id="1017099" ref_url="https://bugzilla.suse.com/1017099" source="BUGZILLA"/>
		<reference ref_id="1023275" ref_url="https://bugzilla.suse.com/1023275" source="BUGZILLA"/>
		<reference ref_id="1053972" ref_url="https://bugzilla.suse.com/1053972" source="BUGZILLA"/>
		<reference ref_id="1065000" ref_url="https://bugzilla.suse.com/1065000" source="BUGZILLA"/>
		<reference ref_id="1069509" ref_url="https://bugzilla.suse.com/1069509" source="BUGZILLA"/>
		<reference ref_id="1076957" ref_url="https://bugzilla.suse.com/1076957" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-1483" ref_url="https://www.suse.com/security/cve/CVE-2008-1483/" source="CVE"/>
		<reference ref_id="CVE-2016-10012" ref_url="https://www.suse.com/security/cve/CVE-2016-10012/" source="CVE"/>
		<reference ref_id="CVE-2016-10708" ref_url="https://www.suse.com/security/cve/CVE-2016-10708/" source="CVE"/>
		<reference ref_id="CVE-2017-15906" ref_url="https://www.suse.com/security/cve/CVE-2017-15906/" source="CVE"/>
		<description>
This update for openssh-openssl1 fixes the following issues:

These security issues were fixed:

- CVE-2016-10708: Prevent NULL pointer dereference via an out-of-sequence
  NEWKEYS message allowed remote attackers to cause a denial of service
  (bsc#1076957).
- CVE-2017-15906: The process_open function did not properly prevent write
  operations in readonly mode, which allowed attackers to create zero-length
  files (bsc#1065000).
- CVE-2016-10012: The shared memory manager (associated with pre-authentication
  compression) did not ensure that a bounds check is enforced by all compilers,
  which might have allowed local users to gain privileges by leveraging access to
  a sandboxed privilege-separation process, related to the m_zback and m_zlib
  data structures (bsc#1016370).
- CVE-2008-1483: Prevent local users from hijacking forwarded X connections by
  causing ssh to set DISPLAY to :10, even when another process is listening on
  the associated port. This problem was reontroduced by another patch and was
  previously fixed by another update (bsc#1069509).

These non-security issues were fixed:

- Remove duplicate KEX method (bsc#1053972)
- New switch for printing diagnostic messages in sftp client's batch mode (bsc#1023275)
- Enable case-insensitive hostname matching (bsc#1017099)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-14"/>
	<updated date="2018-09-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1016370">SUSE bug 1016370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017099">SUSE bug 1017099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023275">SUSE bug 1023275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053972">SUSE bug 1053972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065000">SUSE bug 1065000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069509">SUSE bug 1069509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076957">SUSE bug 1076957</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2008-1483/">CVE-2008-1483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1483">CVE-2008-1483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10012/">CVE-2016-10012 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10012">CVE-2016-10012 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10708/">CVE-2016-10708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10708">CVE-2016-10708 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15906/">CVE-2017-15906 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15906">CVE-2017-15906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579308" comment="openssh-openssl1-6.6p1-19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579309" comment="openssh-openssl1-helpers-6.6p1-19.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219161" version="1" class="patch">
	<metadata>
		<title>Security update for openssh-openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1091396" ref_url="https://bugzilla.suse.com/1091396" source="BUGZILLA"/>
		<reference ref_id="1105010" ref_url="https://bugzilla.suse.com/1105010" source="BUGZILLA"/>
		<reference ref_id="1106163" ref_url="https://bugzilla.suse.com/1106163" source="BUGZILLA"/>
		<reference ref_id="964336" ref_url="https://bugzilla.suse.com/964336" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15473" ref_url="https://www.suse.com/security/cve/CVE-2018-15473/" source="CVE"/>
		<description>
This update for openssh-openssl1 fixes the following issues:

Security issues fixed:

- CVE-2018-15919: Remotely observable behaviour in auth-gss2.c in OpenSSH could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. OpenSSH developers do not want to treat such a username enumeration (or 'oracle') as a vulnerability. (bsc#1106163)
- CVE-2018-15473: OpenSSH was prone to a user existance oracle vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. (bsc#1105010)

Following non-security issues were fixed:

- Fix for sftp client because it returns wrong error code upon failure (bsc#1091396)
- Stop leaking File descriptors (bsc#964336)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-14"/>
	<updated date="2018-11-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091396">SUSE bug 1091396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106163">SUSE bug 1106163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964336">SUSE bug 964336</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15473/">CVE-2018-15473 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15473">CVE-2018-15473 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579310" comment="openssh-openssl1-6.6p1-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579311" comment="openssh-openssl1-helpers-6.6p1-19.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219162" version="1" class="patch">
	<metadata>
		<title>Recommended update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="937492" ref_url="https://bugzilla.suse.com/937492" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="SUSE-RU-2015:1469-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-September/003386.html" source="SUSE-SU"/>
		<description>

This update of openssl fixes a regression caused by the security fix for CVE-2015-0287,
after which DSA keys could occasionaly not loaded from disk. (bsc#937492)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-06"/>
	<updated date="2015-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/937492">SUSE bug 937492</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0287">CVE-2015-0287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009593843" comment="libopenssl0_9_8-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593844" comment="libopenssl0_9_8-32bit-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593845" comment="libopenssl0_9_8-hmac-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593846" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593847" comment="libopenssl0_9_8-x86-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593848" comment="openssl-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593849" comment="openssl-doc-0.9.8j-0.74.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009593843" comment="libopenssl0_9_8-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593844" comment="libopenssl0_9_8-32bit-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593845" comment="libopenssl0_9_8-hmac-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593846" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593847" comment="libopenssl0_9_8-x86-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593848" comment="openssl-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593849" comment="openssl-doc-0.9.8j-0.74.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009593843" comment="libopenssl0_9_8-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593844" comment="libopenssl0_9_8-32bit-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593845" comment="libopenssl0_9_8-hmac-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593846" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593847" comment="libopenssl0_9_8-x86-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593848" comment="openssl-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593849" comment="openssl-doc-0.9.8j-0.74.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219163" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="952099" ref_url="https://bugzilla.suse.com/952099" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001735.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues: 

- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure
  OpenSSL would leak memory. This structure is used by the PKCS#7 and CMS
  routines so any application which reads PKCS#7 or CMS data from untrusted
  sources is affected. SSL/TLS is not affected. (bsc#957812)

- Prevent segfault in s_client with invalid options (bsc#952099)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-15"/>
	<updated date="2015-12-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952099">SUSE bug 952099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3195">CVE-2015-3195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579312" comment="libopenssl0_9_8-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579313" comment="libopenssl0_9_8-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579314" comment="libopenssl0_9_8-hmac-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579315" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579316" comment="libopenssl0_9_8-x86-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579317" comment="openssl-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579318" comment="openssl-doc-0.9.8j-0.80.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579312" comment="libopenssl0_9_8-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579313" comment="libopenssl0_9_8-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579314" comment="libopenssl0_9_8-hmac-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579315" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579316" comment="libopenssl0_9_8-x86-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579317" comment="openssl-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579318" comment="openssl-doc-0.9.8j-0.80.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579312" comment="libopenssl0_9_8-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579313" comment="libopenssl0_9_8-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579314" comment="libopenssl0_9_8-hmac-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579315" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579316" comment="libopenssl0_9_8-x86-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579317" comment="openssl-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579318" comment="openssl-doc-0.9.8j-0.80.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219164" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="952871" ref_url="https://bugzilla.suse.com/952871" source="BUGZILLA"/>
		<reference ref_id="963415" ref_url="https://bugzilla.suse.com/963415" source="BUGZILLA"/>
		<reference ref_id="967787" ref_url="https://bugzilla.suse.com/967787" source="BUGZILLA"/>
		<reference ref_id="968046" ref_url="https://bugzilla.suse.com/968046" source="BUGZILLA"/>
		<reference ref_id="968047" ref_url="https://bugzilla.suse.com/968047" source="BUGZILLA"/>
		<reference ref_id="968048" ref_url="https://bugzilla.suse.com/968048" source="BUGZILLA"/>
		<reference ref_id="968051" ref_url="https://bugzilla.suse.com/968051" source="BUGZILLA"/>
		<reference ref_id="968053" ref_url="https://bugzilla.suse.com/968053" source="BUGZILLA"/>
		<reference ref_id="968374" ref_url="https://bugzilla.suse.com/968374" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0703" ref_url="https://www.suse.com/security/cve/CVE-2016-0703/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001907.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes various security issues and bugs: 

Security issues fixed:
- CVE-2016-0800 aka the 'DROWN' attack (bsc#968046):
  OpenSSL was vulnerable to a cross-protocol attack that could lead to
  decryption of TLS sessions by using a server supporting SSLv2 and
  EXPORT cipher suites as a Bleichenbacher RSA padding oracle.

  This update changes the openssl library to:

  * Disable SSLv2 protocol support by default.

    This can be overridden by setting the environment variable
    'OPENSSL_ALLOW_SSL2' or by using SSL_CTX_clear_options using the
    SSL_OP_NO_SSLv2 flag.

    Note that various services and clients had already disabled SSL
    protocol 2 by default previously.

  * Disable all weak EXPORT ciphers by default. These can be reenabled
    if required by old legacy software using the environment variable
    'OPENSSL_ALLOW_EXPORT'.

- CVE-2016-0705 (bnc#968047):
  A double free() bug in the DSA ASN1 parser code was fixed that could
  be abused to facilitate a denial-of-service attack.

- CVE-2016-0797 (bnc#968048):
  The BN_hex2bn() and BN_dec2bn() functions had a bug that could result
  in an attempt to de-reference a NULL pointer leading to crashes.
  This could have security consequences if these functions were ever
  called by user applications with large untrusted hex/decimal data. Also,
  internal usage of these functions in OpenSSL uses data from config files
  or application command line arguments. If user developed applications
  generated config file data based on untrusted data, then this could
  have had security consequences as well.

- CVE-2016-0799 (bnc#968374)
  On many 64 bit systems, the internal fmtstr() and doapr_outch()
  functions could miscalculate the length of a string and attempt to
  access out-of-bounds memory locations. These problems could have
  enabled attacks where large amounts of untrusted data is passed to
  the BIO_*printf functions. If applications use these functions in
  this way then they could have been vulnerable. OpenSSL itself uses
  these functions when printing out human-readable dumps of ASN.1
  data. Therefore applications that print this data could have been
  vulnerable if the data is from untrusted sources. OpenSSL command line
  applications could also have been vulnerable when they print out ASN.1
  data, or if untrusted data is passed as command line arguments. Libssl
  is not considered directly vulnerable.

- CVE-2015-3197 (bsc#963415):
  The SSLv2 protocol did not block disabled ciphers.

Note that the March 1st 2016 release also references following CVEs
that were fixed by us with CVE-2015-0293 in 2015:

- CVE-2016-0703 (bsc#968051): This issue only affected versions of
  OpenSSL prior to March 19th 2015 at which time the code was refactored
  to address vulnerability CVE-2015-0293. It would have made the above
  'DROWN' attack much easier.
- CVE-2016-0704 (bsc#968053): 'Bleichenbacher oracle in SSLv2'
  This issue only affected versions of OpenSSL prior to March 19th
  2015 at which time the code was refactored to address vulnerability
  CVE-2015-0293. It would have made the above 'DROWN' attack much easier.

Also fixes the following bug:
- Avoid running OPENSSL_config twice. This avoids breaking
  engine loading and also fixes a memory leak in libssl. (bsc#952871 bsc#967787)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-01"/>
	<updated date="2016-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/952871">SUSE bug 952871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963415">SUSE bug 963415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967787">SUSE bug 967787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968047">SUSE bug 968047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968048">SUSE bug 968048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968053">SUSE bug 968053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968374">SUSE bug 968374</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3197">CVE-2015-3197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0702">CVE-2016-0702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0703/">CVE-2016-0703 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0703">CVE-2016-0703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0705">CVE-2016-0705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0797">CVE-2016-0797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0799">CVE-2016-0799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0800">CVE-2016-0800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576597" comment="libopenssl0_9_8-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576598" comment="libopenssl0_9_8-32bit-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576599" comment="libopenssl0_9_8-hmac-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576600" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576601" comment="openssl-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576602" comment="openssl-doc-0.9.8j-0.89.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576597" comment="libopenssl0_9_8-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576598" comment="libopenssl0_9_8-32bit-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576599" comment="libopenssl0_9_8-hmac-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576600" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576601" comment="openssl-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576602" comment="openssl-doc-0.9.8j-0.89.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219165" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="889013" ref_url="https://bugzilla.suse.com/889013" source="BUGZILLA"/>
		<reference ref_id="968050" ref_url="https://bugzilla.suse.com/968050" source="BUGZILLA"/>
		<reference ref_id="976942" ref_url="https://bugzilla.suse.com/976942" source="BUGZILLA"/>
		<reference ref_id="976943" ref_url="https://bugzilla.suse.com/976943" source="BUGZILLA"/>
		<reference ref_id="977614" ref_url="https://bugzilla.suse.com/977614" source="BUGZILLA"/>
		<reference ref_id="977615" ref_url="https://bugzilla.suse.com/977615" source="BUGZILLA"/>
		<reference ref_id="977617" ref_url="https://bugzilla.suse.com/977617" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002056.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues: 

Security issues fixed:
- CVE-2016-2108: Memory corruption in the ASN.1 encoder (bsc#977617)
- CVE-2016-2105: EVP_EncodeUpdate overflow (bsc#977614)
- CVE-2016-2106: EVP_EncryptUpdate overflow (bsc#977615)
- CVE-2016-2109: ASN.1 BIO excessive memory allocation (bsc#976942)
- CVE-2016-0702: Side channel attack on modular exponentiation 'CacheBleed' (bsc#968050)

Bugs fixed:
- fate#320304: build 32bit devel package
- bsc#976943: Fix buffer overrun in ASN1_parse
- bsc#973223: allow weak DH groups, vulnerable to the logjam attack,
  when environment variable OPENSSL_ALLOW_LOGJAM_ATTACK is set
- bsc#889013: Rename README.SuSE to the new spelling
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-12"/>
	<updated date="2016-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/889013">SUSE bug 889013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968050">SUSE bug 968050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976943">SUSE bug 976943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977614">SUSE bug 977614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977615">SUSE bug 977615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977617">SUSE bug 977617</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0702">CVE-2016-0702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2105">CVE-2016-2105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2106">CVE-2016-2106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2108">CVE-2016-2108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2109">CVE-2016-2109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576603" comment="libopenssl-devel-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576604" comment="libopenssl0_9_8-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576605" comment="libopenssl0_9_8-32bit-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576606" comment="libopenssl0_9_8-hmac-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576607" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576608" comment="openssl-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576609" comment="openssl-doc-0.9.8j-0.97.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576603" comment="libopenssl-devel-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576604" comment="libopenssl0_9_8-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576605" comment="libopenssl0_9_8-32bit-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576606" comment="libopenssl0_9_8-hmac-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576607" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576608" comment="openssl-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576609" comment="openssl-doc-0.9.8j-0.97.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219166" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="979475" ref_url="https://bugzilla.suse.com/979475" source="BUGZILLA"/>
		<reference ref_id="982575" ref_url="https://bugzilla.suse.com/982575" source="BUGZILLA"/>
		<reference ref_id="983249" ref_url="https://bugzilla.suse.com/983249" source="BUGZILLA"/>
		<reference ref_id="993819" ref_url="https://bugzilla.suse.com/993819" source="BUGZILLA"/>
		<reference ref_id="994749" ref_url="https://bugzilla.suse.com/994749" source="BUGZILLA"/>
		<reference ref_id="994844" ref_url="https://bugzilla.suse.com/994844" source="BUGZILLA"/>
		<reference ref_id="995075" ref_url="https://bugzilla.suse.com/995075" source="BUGZILLA"/>
		<reference ref_id="995324" ref_url="https://bugzilla.suse.com/995324" source="BUGZILLA"/>
		<reference ref_id="995359" ref_url="https://bugzilla.suse.com/995359" source="BUGZILLA"/>
		<reference ref_id="995377" ref_url="https://bugzilla.suse.com/995377" source="BUGZILLA"/>
		<reference ref_id="998190" ref_url="https://bugzilla.suse.com/998190" source="BUGZILLA"/>
		<reference ref_id="999665" ref_url="https://bugzilla.suse.com/999665" source="BUGZILLA"/>
		<reference ref_id="999666" ref_url="https://bugzilla.suse.com/999666" source="BUGZILLA"/>
		<reference ref_id="999668" ref_url="https://bugzilla.suse.com/999668" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002309.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues:

OpenSSL Security Advisory [22 Sep 2016] (bsc#999665)

Severity: High
* OCSP Status Request extension unbounded memory growth (CVE-2016-6304) (bsc#999666)

Severity: Low
* Pointer arithmetic undefined behavior (CVE-2016-2177) (bsc#982575)
* Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249)
* DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
* DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
* OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
* Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359)
* Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
* OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
* Certificate message OOB reads (CVE-2016-6306) (bsc#999668)

More information can be found on: https://www.openssl.org/news/secadv/20160922.txt

Bugs fixed:
* Update expired S/MIME certs (bsc#979475)
* Fix crash in print_notice (bsc#998190)
* Resume reading from /dev/urandom when interrupted by a signal (bsc#995075)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-05"/>
	<updated date="2016-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979475">SUSE bug 979475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983249">SUSE bug 983249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993819">SUSE bug 993819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994749">SUSE bug 994749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995075">SUSE bug 995075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995324">SUSE bug 995324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995359">SUSE bug 995359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995377">SUSE bug 995377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998190">SUSE bug 998190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999666">SUSE bug 999666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999668">SUSE bug 999668</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2177">CVE-2016-2177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2178">CVE-2016-2178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2179">CVE-2016-2179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2181">CVE-2016-2181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2182">CVE-2016-2182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6302">CVE-2016-6302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6303">CVE-2016-6303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6304">CVE-2016-6304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6306">CVE-2016-6306 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576610" comment="libopenssl-devel-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576611" comment="libopenssl0_9_8-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576612" comment="libopenssl0_9_8-32bit-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576613" comment="libopenssl0_9_8-hmac-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576614" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576615" comment="openssl-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576616" comment="openssl-doc-0.9.8j-0.102.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576610" comment="libopenssl-devel-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576611" comment="libopenssl0_9_8-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576612" comment="libopenssl0_9_8-32bit-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576613" comment="libopenssl0_9_8-hmac-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576614" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576615" comment="openssl-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576616" comment="openssl-doc-0.9.8j-0.102.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219167" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1000677" ref_url="https://bugzilla.suse.com/1000677" source="BUGZILLA"/>
		<reference ref_id="1001912" ref_url="https://bugzilla.suse.com/1001912" source="BUGZILLA"/>
		<reference ref_id="1004499" ref_url="https://bugzilla.suse.com/1004499" source="BUGZILLA"/>
		<reference ref_id="1005878" ref_url="https://bugzilla.suse.com/1005878" source="BUGZILLA"/>
		<reference ref_id="1019334" ref_url="https://bugzilla.suse.com/1019334" source="BUGZILLA"/>
		<reference ref_id="1021641" ref_url="https://bugzilla.suse.com/1021641" source="BUGZILLA"/>
		<reference ref_id="984663" ref_url="https://bugzilla.suse.com/984663" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002670.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)

Security issues fixed:
- CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334)
- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)
- degrade 3DES to MEDIUM in SSL2 (bsc#1001912)
- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)

Bugs fixed:
- fix crash in openssl speed (bsc#1000677)
- don't attempt session resumption if no ticket is present and session
  ID length is zero (bsc#984663)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-01"/>
	<updated date="2017-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000677">SUSE bug 1000677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001912">SUSE bug 1001912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004499">SUSE bug 1004499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019334">SUSE bug 1019334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984663">SUSE bug 984663</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2108">CVE-2016-2108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7056">CVE-2016-7056 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8610">CVE-2016-8610 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579319" comment="libopenssl-devel-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579320" comment="libopenssl0_9_8-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579321" comment="libopenssl0_9_8-32bit-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579322" comment="libopenssl0_9_8-hmac-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579323" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579324" comment="openssl-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579325" comment="openssl-doc-0.9.8j-0.105.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579319" comment="libopenssl-devel-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579320" comment="libopenssl0_9_8-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579321" comment="libopenssl0_9_8-32bit-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579322" comment="libopenssl0_9_8-hmac-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579323" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579324" comment="openssl-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579325" comment="openssl-doc-0.9.8j-0.105.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219168" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1087102" ref_url="https://bugzilla.suse.com/1087102" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

-  CVE-2018-0739: Constructed ASN.1 types with a recursive definition could exceed
    the stack. This could result in a Denial Of Service attack. (bsc#1087102)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-18"/>
	<updated date="2018-04-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087102">SUSE bug 1087102</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0739">CVE-2018-0739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572978" comment="libopenssl0_9_8-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572979" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572980" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579326" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572981" comment="openssl-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572982" comment="openssl-doc-0.9.8j-0.106.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219169" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="1097624" ref_url="https://bugzilla.suse.com/1097624" source="BUGZILLA"/>
		<reference ref_id="1098592" ref_url="https://bugzilla.suse.com/1098592" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004375.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based
  ciphersuite a malicious server could have sent a very large prime value to the
  client. This caused the client to spend an unreasonably long period of time
  generating a key for this prime resulting in a hang until the client has
  finished. This could be exploited in a Denial Of Service attack (bsc#1097158).
- Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-06"/>
	<updated date="2018-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097624">SUSE bug 1097624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098592">SUSE bug 1098592</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0732">CVE-2018-0732 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579327" comment="libopenssl-devel-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579328" comment="libopenssl0_9_8-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579329" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579330" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579331" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579332" comment="openssl-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579333" comment="openssl-doc-0.9.8j-0.106.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579327" comment="libopenssl-devel-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579328" comment="libopenssl0_9_8-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579329" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579330" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579331" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579332" comment="openssl-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579333" comment="openssl-doc-0.9.8j-0.106.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219170" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1089039" ref_url="https://bugzilla.suse.com/1089039" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<description>
This update for openssl fixes the following security issue:

- CVE-2018-0737: The RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could have recovered the private key (bsc#1089039)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-23"/>
	<updated date="2018-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089039">SUSE bug 1089039</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0737">CVE-2018-0737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572988" comment="libopenssl0_9_8-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572989" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572990" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579334" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572991" comment="openssl-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572992" comment="openssl-doc-0.9.8j-0.106.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219171" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1104789" ref_url="https://bugzilla.suse.com/1104789" source="BUGZILLA"/>
		<reference ref_id="1110018" ref_url="https://bugzilla.suse.com/1110018" source="BUGZILLA"/>
		<reference ref_id="1113534" ref_url="https://bugzilla.suse.com/1113534" source="BUGZILLA"/>
		<reference ref_id="1113652" ref_url="https://bugzilla.suse.com/1113652" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005002.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed:

- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).
- Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-27"/>
	<updated date="2018-12-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104789">SUSE bug 1104789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110018">SUSE bug 1110018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8610">CVE-2016-8610 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0734">CVE-2018-0734 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5407">CVE-2018-5407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579335" comment="libopenssl-devel-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579336" comment="libopenssl0_9_8-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579337" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579338" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579339" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579340" comment="openssl-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579341" comment="openssl-doc-0.9.8j-0.106.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579335" comment="libopenssl-devel-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579336" comment="libopenssl0_9_8-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579337" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579338" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579339" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579340" comment="openssl-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579341" comment="openssl-doc-0.9.8j-0.106.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219172" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1127080" ref_url="https://bugzilla.suse.com/1127080" source="BUGZILLA"/>
		<reference ref_id="1131291" ref_url="https://bugzilla.suse.com/1131291" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed:

- CVE-2019-1559: Fix 0-byte record padding oracle via SSL_shutdown (bsc#1127080)
- Reject invalid EC point coordinates (bsc#1131291)
- Mitigate the 'The 9 Lives of Bleichenbacher's CAT: Cache ATtacks on TLS Implementations' attack (bsc#1117951)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-11"/>
	<updated date="2019-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131291">SUSE bug 1131291</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1559">CVE-2019-1559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572998" comment="libopenssl0_9_8-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572999" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573000" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579342" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573001" comment="openssl-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573002" comment="openssl-doc-0.9.8j-0.106.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219173" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1150003" ref_url="https://bugzilla.suse.com/1150003" source="BUGZILLA"/>
		<reference ref_id="1150250" ref_url="https://bugzilla.suse.com/1150250" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

OpenSSL Security Advisory [10 September 2019]

- CVE-2019-1547: Added EC_GROUP_set_generator side channel attack avoidance (bsc#1150003).
- CVE-2019-1563: Fixed Bleichenbacher attack against cms/pkcs7 encryption transported key (bsc#1150250).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-19"/>
	<updated date="2019-09-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1547">CVE-2019-1547 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1563">CVE-2019-1563 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573003" comment="libopenssl0_9_8-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573004" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573005" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579343" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573006" comment="openssl-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573007" comment="openssl-doc-0.9.8j-0.106.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219174" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1153785" ref_url="https://bugzilla.suse.com/1153785" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- Included the missing cms and pk7 fixes of CVE-2019-1563 (bsc#1153785).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-12"/>
	<updated date="2019-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153785">SUSE bug 1153785</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1563">CVE-2019-1563 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573008" comment="libopenssl0_9_8-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573009" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573010" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579344" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573011" comment="openssl-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573012" comment="openssl-doc-0.9.8j-0.106.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219175" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1160163" ref_url="https://bugzilla.suse.com/1160163" source="BUGZILLA"/>
		<description>
This update for openssl fixes the following issues:

- Add missing commits for fixing the security issue called 'The 9 Lives of Bleichenbacher's CAT'. (bsc#1117951)
- Fix a memory leak problem in function 'BN_copy()'. (bsc#1160163)
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-27"/>
	<updated date="2020-02-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160163">SUSE bug 1160163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573013" comment="libopenssl0_9_8-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573014" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573015" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579345" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573016" comment="openssl-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573017" comment="openssl-doc-0.9.8j-0.106.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219176" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176331" ref_url="https://bugzilla.suse.com/1176331" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1968" ref_url="https://www.suse.com/security/cve/CVE-2020-1968/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2020-1968: Introduced hardening against the Raccoon attack by always generating fresh DH keys 
  and never reuse them across multiple TLS connections (bsc#1176331).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-15"/>
	<updated date="2020-09-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176331">SUSE bug 1176331</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1968/">CVE-2020-1968 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1968">CVE-2020-1968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573018" comment="libopenssl0_9_8-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573019" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573020" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579346" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573021" comment="openssl-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573022" comment="openssl-doc-0.9.8j-0.106.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219177" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182331" ref_url="https://bugzilla.suse.com/1182331" source="BUGZILLA"/>
		<reference ref_id="1182333" ref_url="https://bugzilla.suse.com/1182333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-23840: Fixed an Integer overflow in CipherUpdate (bsc#1182333)
- CVE-2021-23841: Fixed a Null pointer dereference in X509_issuer_and_serial_hash() (bsc#1182331)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-19"/>
	<updated date="2021-03-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182331">SUSE bug 1182331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23840">CVE-2021-23840 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23841">CVE-2021-23841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573023" comment="libopenssl0_9_8-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573024" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573025" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579347" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573026" comment="openssl-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573027" comment="openssl-doc-0.9.8j-0.106.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219178" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<description>
This update for openssl fixes the following security issue:

- CVE-2021-3712: a bug in the code for printing certificate details could lead
  to a buffer overrun that a malicious actor could exploit to crash the
  application, causing a denial-of-service attack. [bsc#1189521]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631740" comment="libopenssl0_9_8-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631741" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631742" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631751" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631743" comment="openssl-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631744" comment="openssl-doc-0.9.8j-0.106.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219179" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-3712: This is an update for the incomplete fix for CVE-2021-3712. 
  Read buffer overruns processing ASN.1 strings (bsc#1189521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-18"/>
	<updated date="2021-09-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632461" comment="libopenssl0_9_8-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632462" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632463" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632466" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632464" comment="openssl-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632465" comment="openssl-doc-0.9.8j-0.106.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219180" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2022-0778: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673400" comment="libopenssl0_9_8-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673401" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673402" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673423" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673403" comment="openssl-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673404" comment="openssl-doc-0.9.8j-0.106.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219181" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199166" ref_url="https://bugzilla.suse.com/1199166" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1292" ref_url="https://www.suse.com/security/cve/CVE-2022-1292/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2022-1292: Fixed command injection in c_rehash (bsc#1199166).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-15"/>
	<updated date="2022-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199166">SUSE bug 1199166</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1292/">CVE-2022-1292 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1292">CVE-2022-1292 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993723" comment="libopenssl0_9_8-0.9.8j-0.106.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993724" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993725" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993726" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993727" comment="openssl-0.9.8j-0.106.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993728" comment="openssl-doc-0.9.8j-0.106.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219182" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1200550" ref_url="https://bugzilla.suse.com/1200550" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2068" ref_url="https://www.suse.com/security/cve/CVE-2022-2068/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2022-2068: Fixed more shell code injection issues in c_rehash. (bsc#1200550)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-24"/>
	<updated date="2022-06-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1200550">SUSE bug 1200550</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2068/">CVE-2022-2068 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2068">CVE-2022-2068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993729" comment="libopenssl0_9_8-0.9.8j-0.106.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993730" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993731" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993732" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993733" comment="openssl-0.9.8j-0.106.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993734" comment="openssl-doc-0.9.8j-0.106.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219183" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1200550" ref_url="https://bugzilla.suse.com/1200550" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2068" ref_url="https://www.suse.com/security/cve/CVE-2022-2068/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2022-2068: Fixed more shell code injection issues in c_rehash. (bsc#1200550)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-24"/>
	<updated date="2022-06-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1200550">SUSE bug 1200550</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2068/">CVE-2022-2068 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2068">CVE-2022-2068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993735" comment="libopenssl1-devel-1.0.1g-0.58.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993736" comment="libopenssl1-devel-32bit-1.0.1g-0.58.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993737" comment="libopenssl1_0_0-1.0.1g-0.58.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993738" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993739" comment="openssl1-1.0.1g-0.58.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993740" comment="openssl1-doc-1.0.1g-0.58.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219184" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1201283" ref_url="https://bugzilla.suse.com/1201283" source="BUGZILLA"/>
		<description>
This update for openssl fixes the following issues:

- Fixed regression caused by unknown option passed to 'openssl x509' from c_rehash
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-16"/>
	<updated date="2022-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201283">SUSE bug 1201283</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993741" comment="libopenssl0_9_8-0.9.8j-0.106.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993742" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993743" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993744" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993745" comment="openssl-0.9.8j-0.106.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993746" comment="openssl-doc-0.9.8j-0.106.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219185" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1207534" ref_url="https://bugzilla.suse.com/1207534" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4304" ref_url="https://www.suse.com/security/cve/CVE-2022-4304/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2022-4304: Fixed timing Oracle in RSA Decryption (bsc#1207534).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-01"/>
	<updated date="2023-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1207534">SUSE bug 1207534</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4304/">CVE-2022-4304 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4304">CVE-2022-4304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990921" comment="libopenssl0_9_8-0.9.8j-0.106.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990922" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990923" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990924" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990925" comment="openssl-0.9.8j-0.106.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990926" comment="openssl-doc-0.9.8j-0.106.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219186" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1209624" ref_url="https://bugzilla.suse.com/1209624" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0464" ref_url="https://www.suse.com/security/cve/CVE-2023-0464/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2023-0464: Fixed excessive Resource Usage Verifying X.509 Policy Constraints (bsc#1209624).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-04"/>
	<updated date="2023-04-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209624">SUSE bug 1209624</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0464/">CVE-2023-0464 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0464">CVE-2023-0464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990799" comment="libopenssl0_9_8-0.9.8j-0.106.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990800" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990801" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990802" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990803" comment="openssl-0.9.8j-0.106.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990804" comment="openssl-doc-0.9.8j-0.106.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219187" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1209878" ref_url="https://bugzilla.suse.com/1209878" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0465" ref_url="https://www.suse.com/security/cve/CVE-2023-0465/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2023-0465: Invalid certificate policies in leaf certificates were silently ignored (bsc#1209878).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-24"/>
	<updated date="2023-04-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209878">SUSE bug 1209878</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0465/">CVE-2023-0465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0465">CVE-2023-0465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990810" comment="libopenssl0_9_8-0.9.8j-0.106.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990811" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990812" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990813" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990814" comment="openssl-0.9.8j-0.106.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990815" comment="openssl-doc-0.9.8j-0.106.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219188" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-certs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="796628" ref_url="https://bugzilla.suse.com/796628" source="BUGZILLA"/>
		<reference ref_id="854367" ref_url="https://bugzilla.suse.com/854367" source="BUGZILLA"/>
		<reference ref_id="860581" ref_url="https://bugzilla.suse.com/860581" source="BUGZILLA"/>
		<reference ref_id="865080" ref_url="https://bugzilla.suse.com/865080" source="BUGZILLA"/>
		<reference ref_id="875647" ref_url="https://bugzilla.suse.com/875647" source="BUGZILLA"/>
		<reference ref_id="881241" ref_url="https://bugzilla.suse.com/881241" source="BUGZILLA"/>
		<description>

openssl-certs has been updated to include four new and remove two 
certificates:

    * new: Atos_TrustedRoot_2011:2.8.92.51.203.98.44.95.179.50.crt
    * new:
      E-Tugra_Certification_Authority:2.8.106.104.62.156.81.155.203.83.crt
    * new:
      TeliaSonera_Root_CA_v1:2.17.0.149.190.22.160.247.46.70.241.123.57.130.114.250.139.205.150.crt
    * new: T-TeleSec_GlobalRoot_Class_2:2.1.1.crt
    * removed: Firmaprofesional_Root_CA:2.1.1.crt
    * removed: TDC_OCES_Root_CA:2.4.62.72.189.196.crt

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-04"/>
	<updated date="2014-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/796628">SUSE bug 796628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854367">SUSE bug 854367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860581">SUSE bug 860581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865080">SUSE bug 865080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875647">SUSE bug 875647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881241">SUSE bug 881241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567027" comment="openssl-certs-1.97-0.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567027" comment="openssl-certs-1.97-0.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567027" comment="openssl-certs-1.97-0.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219189" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="889013" ref_url="https://bugzilla.suse.com/889013" source="BUGZILLA"/>
		<reference ref_id="971354" ref_url="https://bugzilla.suse.com/971354" source="BUGZILLA"/>
		<reference ref_id="976942" ref_url="https://bugzilla.suse.com/976942" source="BUGZILLA"/>
		<reference ref_id="976943" ref_url="https://bugzilla.suse.com/976943" source="BUGZILLA"/>
		<reference ref_id="977614" ref_url="https://bugzilla.suse.com/977614" source="BUGZILLA"/>
		<reference ref_id="977615" ref_url="https://bugzilla.suse.com/977615" source="BUGZILLA"/>
		<reference ref_id="977616" ref_url="https://bugzilla.suse.com/977616" source="BUGZILLA"/>
		<reference ref_id="977617" ref_url="https://bugzilla.suse.com/977617" source="BUGZILLA"/>
		<reference ref_id="977621" ref_url="https://bugzilla.suse.com/977621" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107/" source="CVE"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<description>

This update for openssl1 fixes the following issues:

Security issues fixed:
- CVE-2016-2108: Memory corruption in the ASN.1 encoder (bsc#977617)
- CVE-2016-2107: Padding oracle in AES-NI CBC MAC check (bsc#977616)
- CVE-2016-2105: EVP_EncodeUpdate overflow (bsc#977614)
- CVE-2016-2106: EVP_EncryptUpdate overflow (bsc#977615)
- CVE-2016-2109: ASN.1 BIO excessive memory allocation (bsc#976942)

Bugs fixed:
- bsc#971354: libopenssl1_0_0 now Recommends: openssl1 to get correct SSL Root
  Certificate hashes
- bsc#889013: Rename README.SuSE to the new spelling README.SUSE
- bsc#976943: Fixed a buffer overrun in ASN1_parse.
- bsc#977621: Preserve negotiated digests for SNI (bsc#977621)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-03"/>
	<updated date="2016-05-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/889013">SUSE bug 889013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971354">SUSE bug 971354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976943">SUSE bug 976943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977614">SUSE bug 977614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977615">SUSE bug 977615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977616">SUSE bug 977616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977617">SUSE bug 977617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977621">SUSE bug 977621</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2105">CVE-2016-2105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2106">CVE-2016-2106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2107">CVE-2016-2107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2108">CVE-2016-2108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2109">CVE-2016-2109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573028" comment="libopenssl1-devel-1.0.1g-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573029" comment="libopenssl1_0_0-1.0.1g-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573030" comment="libopenssl1_0_0-32bit-1.0.1g-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573031" comment="openssl1-1.0.1g-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573032" comment="openssl1-doc-1.0.1g-0.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219190" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="979475" ref_url="https://bugzilla.suse.com/979475" source="BUGZILLA"/>
		<reference ref_id="982575" ref_url="https://bugzilla.suse.com/982575" source="BUGZILLA"/>
		<reference ref_id="982745" ref_url="https://bugzilla.suse.com/982745" source="BUGZILLA"/>
		<reference ref_id="983249" ref_url="https://bugzilla.suse.com/983249" source="BUGZILLA"/>
		<reference ref_id="990419" ref_url="https://bugzilla.suse.com/990419" source="BUGZILLA"/>
		<reference ref_id="993819" ref_url="https://bugzilla.suse.com/993819" source="BUGZILLA"/>
		<reference ref_id="994749" ref_url="https://bugzilla.suse.com/994749" source="BUGZILLA"/>
		<reference ref_id="994844" ref_url="https://bugzilla.suse.com/994844" source="BUGZILLA"/>
		<reference ref_id="995075" ref_url="https://bugzilla.suse.com/995075" source="BUGZILLA"/>
		<reference ref_id="995324" ref_url="https://bugzilla.suse.com/995324" source="BUGZILLA"/>
		<reference ref_id="995359" ref_url="https://bugzilla.suse.com/995359" source="BUGZILLA"/>
		<reference ref_id="995377" ref_url="https://bugzilla.suse.com/995377" source="BUGZILLA"/>
		<reference ref_id="998190" ref_url="https://bugzilla.suse.com/998190" source="BUGZILLA"/>
		<reference ref_id="999665" ref_url="https://bugzilla.suse.com/999665" source="BUGZILLA"/>
		<reference ref_id="999666" ref_url="https://bugzilla.suse.com/999666" source="BUGZILLA"/>
		<reference ref_id="999668" ref_url="https://bugzilla.suse.com/999668" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2180" ref_url="https://www.suse.com/security/cve/CVE-2016-2180/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<description>

This update for openssl1 fixes the following issues:

penSSL Security Advisory [22 Sep 2016] (bsc#999665)

Severity: High
* OCSP Status Request extension unbounded memory growth (CVE-2016-6304) (bsc#999666)

Severity: Low
* Pointer arithmetic undefined behaviour (CVE-2016-2177) (bsc#982575)
* Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249)
* DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
* OOB read in TS_OBJ_print_bio() (CVE-2016-2180) (bsc#990419)
* DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
* OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
* Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359)
* Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
* OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
* Certificate message OOB reads (CVE-2016-6306) (bsc#999668)

More information can be found on: https://www.openssl.org/news/secadv/20160922.txt

Also following bugs were fixed:
* update expired S/MIME certs (bsc#979475)
* improve s390x performance (bsc#982745)
* fix crash in print_notice (bsc#998190)
* resume reading from /dev/urandom when interrupted by a signal (bsc#995075)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-06"/>
	<updated date="2016-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979475">SUSE bug 979475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982745">SUSE bug 982745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983249">SUSE bug 983249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990419">SUSE bug 990419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993819">SUSE bug 993819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994749">SUSE bug 994749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995075">SUSE bug 995075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995324">SUSE bug 995324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995359">SUSE bug 995359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995377">SUSE bug 995377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998190">SUSE bug 998190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999666">SUSE bug 999666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999668">SUSE bug 999668</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2177">CVE-2016-2177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2178">CVE-2016-2178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2179">CVE-2016-2179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2180/">CVE-2016-2180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2180">CVE-2016-2180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2181">CVE-2016-2181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2182">CVE-2016-2182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6302">CVE-2016-6302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6303">CVE-2016-6303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6304">CVE-2016-6304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6306">CVE-2016-6306 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573033" comment="libopenssl1-devel-1.0.1g-0.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573034" comment="libopenssl1_0_0-1.0.1g-0.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573035" comment="libopenssl1_0_0-32bit-1.0.1g-0.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573036" comment="openssl1-1.0.1g-0.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573037" comment="openssl1-doc-1.0.1g-0.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219191" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1000677" ref_url="https://bugzilla.suse.com/1000677" source="BUGZILLA"/>
		<reference ref_id="1001707" ref_url="https://bugzilla.suse.com/1001707" source="BUGZILLA"/>
		<reference ref_id="1001912" ref_url="https://bugzilla.suse.com/1001912" source="BUGZILLA"/>
		<reference ref_id="1004499" ref_url="https://bugzilla.suse.com/1004499" source="BUGZILLA"/>
		<reference ref_id="1005878" ref_url="https://bugzilla.suse.com/1005878" source="BUGZILLA"/>
		<reference ref_id="1019334" ref_url="https://bugzilla.suse.com/1019334" source="BUGZILLA"/>
		<reference ref_id="1021641" ref_url="https://bugzilla.suse.com/1021641" source="BUGZILLA"/>
		<reference ref_id="1022085" ref_url="https://bugzilla.suse.com/1022085" source="BUGZILLA"/>
		<reference ref_id="1022644" ref_url="https://bugzilla.suse.com/1022644" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731/" source="CVE"/>
		<description>

This update for openssl1 fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)

Security issues fixed:
- CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334)
- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)
- CVE-2017-3731: Truncated packet could crash via OOB read (bsc#1022085)
- Degrade the 3DES cipher to MEDIUM in SSLv2 (bsc#1001912)
- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)

Bugs fixed:
- fix crash in openssl speed (bsc#1000677)
- call c_rehash in %post (bsc#1001707)
- ship static libraries in the devel package (bsc#1022644)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-17"/>
	<updated date="2017-02-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000677">SUSE bug 1000677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001707">SUSE bug 1001707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001912">SUSE bug 1001912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004499">SUSE bug 1004499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019334">SUSE bug 1019334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022085">SUSE bug 1022085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022644">SUSE bug 1022644</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2108">CVE-2016-2108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7056">CVE-2016-7056 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8610">CVE-2016-8610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3731">CVE-2017-3731 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573038" comment="libopenssl1-devel-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573039" comment="libopenssl1-devel-32bit-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573040" comment="libopenssl1_0_0-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573041" comment="libopenssl1_0_0-32bit-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573042" comment="openssl1-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573043" comment="openssl1-doc-1.0.1g-0.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219192" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027908" ref_url="https://bugzilla.suse.com/1027908" source="BUGZILLA"/>
		<reference ref_id="1032261" ref_url="https://bugzilla.suse.com/1032261" source="BUGZILLA"/>
		<reference ref_id="1055825" ref_url="https://bugzilla.suse.com/1055825" source="BUGZILLA"/>
		<reference ref_id="1056058" ref_url="https://bugzilla.suse.com/1056058" source="BUGZILLA"/>
		<reference ref_id="1057660" ref_url="https://bugzilla.suse.com/1057660" source="BUGZILLA"/>
		<reference ref_id="1065363" ref_url="https://bugzilla.suse.com/1065363" source="BUGZILLA"/>
		<reference ref_id="990592" ref_url="https://bugzilla.suse.com/990592" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

Security issues fixed:

- CVE-2017-3735: Malformed X.509 IPAdressFamily could cause OOB read (bsc#1056058)
- adjust DEFAULT_SUSE to meet 1.0.2 and current state (bsc#1027908)
- out of bounds read+crash in DES_fcrypt (bsc#1065363)
- DEFAULT_SUSE cipher list is missing ECDHE-ECDSA ciphers (bsc#1055825)
- Missing important ciphers in openssl 1.0.1i-47.1 (bsc#990592)

Bug fixes:

- support alternate root ca chains (bsc#1032261)
- Require openssl1, so c_rehash1 is available during %post to hash the certificates (bsc#1057660)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-09"/>
	<updated date="2017-11-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027908">SUSE bug 1027908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032261">SUSE bug 1032261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055825">SUSE bug 1055825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056058">SUSE bug 1056058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057660">SUSE bug 1057660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065363">SUSE bug 1065363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990592">SUSE bug 990592</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3735">CVE-2017-3735 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573044" comment="libopenssl1-devel-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573045" comment="libopenssl1-devel-32bit-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573046" comment="libopenssl1_0_0-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573047" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573048" comment="openssl1-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573049" comment="openssl1-doc-1.0.1g-0.58.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219193" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1087102" ref_url="https://bugzilla.suse.com/1087102" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

-  CVE-2018-0739: Constructed ASN.1 types with a recursive definition could exceed
    the stack. This could result in a Denial Of Service attack. (bsc#1087102)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-09"/>
	<updated date="2018-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087102">SUSE bug 1087102</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0739">CVE-2018-0739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573050" comment="libopenssl1-devel-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573051" comment="libopenssl1-devel-32bit-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573052" comment="libopenssl1_0_0-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573053" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573054" comment="openssl1-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573055" comment="openssl1-doc-1.0.1g-0.58.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219194" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1089039" ref_url="https://bugzilla.suse.com/1089039" source="BUGZILLA"/>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="1097624" ref_url="https://bugzilla.suse.com/1097624" source="BUGZILLA"/>
		<reference ref_id="1098592" ref_url="https://bugzilla.suse.com/1098592" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<description>
This update for openssl1 fixes the following security issues:

- CVE-2018-0737: The RSA Key generation algorithm has been shown to be
  vulnerable to a cache timing side channel attack. An attacker with sufficient
  access to mount cache timing attacks during the RSA key generation process
  could have recovered the private key (bsc#1089039)
- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based
  ciphersuite a malicious server could have sent a very large prime value to the
  client. This caused the client to spend an unreasonably long period of time
  generating a key for this prime resulting in a hang until the client has
  finished. This could be exploited in a Denial Of Service attack (bsc#1097158)
- Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-28"/>
	<updated date="2018-08-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089039">SUSE bug 1089039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097624">SUSE bug 1097624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098592">SUSE bug 1098592</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0732">CVE-2018-0732 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0737">CVE-2018-0737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573056" comment="libopenssl1-devel-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573057" comment="libopenssl1-devel-32bit-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573058" comment="libopenssl1_0_0-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573059" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573060" comment="openssl1-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573061" comment="openssl1-doc-1.0.1g-0.58.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219195" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1104789" ref_url="https://bugzilla.suse.com/1104789" source="BUGZILLA"/>
		<reference ref_id="1110018" ref_url="https://bugzilla.suse.com/1110018" source="BUGZILLA"/>
		<reference ref_id="1113534" ref_url="https://bugzilla.suse.com/1113534" source="BUGZILLA"/>
		<reference ref_id="1113652" ref_url="https://bugzilla.suse.com/1113652" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

Security issues fixed:

- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).
- Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-03"/>
	<updated date="2018-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104789">SUSE bug 1104789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110018">SUSE bug 1110018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8610">CVE-2016-8610 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0734">CVE-2018-0734 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5407">CVE-2018-5407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573062" comment="libopenssl1-devel-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573063" comment="libopenssl1-devel-32bit-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573064" comment="libopenssl1_0_0-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573065" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573066" comment="openssl1-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573067" comment="openssl1-doc-1.0.1g-0.58.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219196" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1127080" ref_url="https://bugzilla.suse.com/1127080" source="BUGZILLA"/>
		<reference ref_id="1131291" ref_url="https://bugzilla.suse.com/1131291" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559/" source="CVE"/>
		<description>
This update for openssl1 fixes the following security issues:

- CVE-2019-1559: Fix 0-byte record padding oracle via SSL_shutdown (bsc#1127080)
- Reject invalid EC point coordinates (bsc#1131291)
- Fixed 'The 9 Lives of Bleichenbacher's CAT: Cache ATtacks on TLS Implementations' (bsc#1117951)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-18"/>
	<updated date="2019-06-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131291">SUSE bug 1131291</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1559">CVE-2019-1559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573068" comment="libopenssl1-devel-1.0.1g-0.58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573069" comment="libopenssl1-devel-32bit-1.0.1g-0.58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573070" comment="libopenssl1_0_0-1.0.1g-0.58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573071" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573072" comment="openssl1-1.0.1g-0.58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573073" comment="openssl1-doc-1.0.1g-0.58.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219197" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1150003" ref_url="https://bugzilla.suse.com/1150003" source="BUGZILLA"/>
		<reference ref_id="1150250" ref_url="https://bugzilla.suse.com/1150250" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

OpenSSL Security Advisory [10 September 2019]

* CVE-2019-1547: Added EC_GROUP_set_generator side channel attack avoidance. (bsc#1150003)
* CVE-2019-1563: Fixed Bleichenbacher attack against cms/pkcs7 encryption transported key (bsc#1150250)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1547">CVE-2019-1547 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1563">CVE-2019-1563 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573074" comment="libopenssl1-devel-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573075" comment="libopenssl1-devel-32bit-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573076" comment="libopenssl1_0_0-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573077" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573078" comment="openssl1-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573079" comment="openssl1-doc-1.0.1g-0.58.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219198" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1160163" ref_url="https://bugzilla.suse.com/1160163" source="BUGZILLA"/>
		<description>
This update for openssl1 fixes the following issues:

- Add missing commits fixing the security issue called 'The 9 Lives of Bleichenbacher's CAT'. (bsc#1117951)
- Fix a memory problem in 'BN_copy()'. (bsc#1160163)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-24"/>
	<updated date="2020-02-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160163">SUSE bug 1160163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573080" comment="libopenssl1-devel-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573081" comment="libopenssl1-devel-32bit-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573082" comment="libopenssl1_0_0-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573083" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573084" comment="openssl1-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573085" comment="openssl1-doc-1.0.1g-0.58.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219199" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176331" ref_url="https://bugzilla.suse.com/1176331" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1968" ref_url="https://www.suse.com/security/cve/CVE-2020-1968/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2020-1968: Introduced hardening against the Raccoon attack by always generating fresh DH keys 
  and never reuse them across multiple TLS connections (bsc#1176331).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176331">SUSE bug 1176331</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1968/">CVE-2020-1968 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1968">CVE-2020-1968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573086" comment="libopenssl1-devel-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573087" comment="libopenssl1-devel-32bit-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573088" comment="libopenssl1_0_0-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573089" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573090" comment="openssl1-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573091" comment="openssl1-doc-1.0.1g-0.58.27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219200" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179491" ref_url="https://bugzilla.suse.com/1179491" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2020-1971: Fixed a null pointer dereference in EDIPARTYNAME (bsc#1179491).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-09"/>
	<updated date="2020-12-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179491">SUSE bug 1179491</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1971">CVE-2020-1971 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573092" comment="libopenssl1-devel-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573093" comment="libopenssl1-devel-32bit-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573094" comment="libopenssl1_0_0-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573095" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573096" comment="openssl1-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573097" comment="openssl1-doc-1.0.1g-0.58.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219201" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182331" ref_url="https://bugzilla.suse.com/1182331" source="BUGZILLA"/>
		<reference ref_id="1182333" ref_url="https://bugzilla.suse.com/1182333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2021-23840: Fixed an Integer overflow in CipherUpdate (bsc#1182333)
- CVE-2021-23841: Fixed a Null pointer dereference in X509_issuer_and_serial_hash() (bsc#1182331)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182331">SUSE bug 1182331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23840">CVE-2021-23840 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23841">CVE-2021-23841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573098" comment="libopenssl1-devel-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573099" comment="libopenssl1-devel-32bit-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573100" comment="libopenssl1_0_0-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573101" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573102" comment="openssl1-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573103" comment="openssl1-doc-1.0.1g-0.58.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219202" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<description>
This update for openssl1 fixes the following security issue:

- CVE-2021-3712: a bug in the code for printing certificate details could
  lead to a buffer overrun that a malicious actor could exploit to crash
  the application, causing a denial-of-service attack. [bsc#1189521]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631745" comment="libopenssl1-devel-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631746" comment="libopenssl1-devel-32bit-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631747" comment="libopenssl1_0_0-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631748" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631749" comment="openssl1-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631750" comment="openssl1-doc-1.0.1g-0.58.36.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219203" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2021-3712: This is an update for the incomplete fix for CVE-2021-3712.                                                                                                                   
  Read buffer overruns processing ASN.1 strings (bsc#1189521).                                                                                                                                 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-18"/>
	<updated date="2021-09-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632543" comment="libopenssl1-devel-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632544" comment="libopenssl1-devel-32bit-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632545" comment="libopenssl1_0_0-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632546" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632547" comment="openssl1-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632548" comment="openssl1-doc-1.0.1g-0.58.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219204" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2022-0778: Fixed an infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673405" comment="libopenssl1-devel-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673406" comment="libopenssl1-devel-32bit-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673407" comment="libopenssl1_0_0-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673408" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673409" comment="openssl1-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673410" comment="openssl1-doc-1.0.1g-0.58.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219205" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199166" ref_url="https://bugzilla.suse.com/1199166" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1292" ref_url="https://www.suse.com/security/cve/CVE-2022-1292/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:


* CVE-2022-1292: properly sanitise shell metacharacters in c_rehash script. (bsc#1199166)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-17"/>
	<updated date="2022-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199166">SUSE bug 1199166</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1292/">CVE-2022-1292 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1292">CVE-2022-1292 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993747" comment="libopenssl1-devel-1.0.1g-0.58.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993748" comment="libopenssl1-devel-32bit-1.0.1g-0.58.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993749" comment="libopenssl1_0_0-1.0.1g-0.58.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993750" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993751" comment="openssl1-1.0.1g-0.58.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993752" comment="openssl1-doc-1.0.1g-0.58.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219206" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1201283" ref_url="https://bugzilla.suse.com/1201283" source="BUGZILLA"/>
		<description>
This update for openssl1 fixes the following issues:

- fixed regression caused by unknown option passed to 'openssl x509' from c_rehash
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-04"/>
	<updated date="2022-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201283">SUSE bug 1201283</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993753" comment="libopenssl1-devel-1.0.1g-0.58.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993754" comment="libopenssl1-devel-32bit-1.0.1g-0.58.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993755" comment="libopenssl1_0_0-1.0.1g-0.58.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993756" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993757" comment="openssl1-1.0.1g-0.58.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993758" comment="openssl1-doc-1.0.1g-0.58.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219207" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1207533" ref_url="https://bugzilla.suse.com/1207533" source="BUGZILLA"/>
		<reference ref_id="1207534" ref_url="https://bugzilla.suse.com/1207534" source="BUGZILLA"/>
		<reference ref_id="1207536" ref_url="https://bugzilla.suse.com/1207536" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4304" ref_url="https://www.suse.com/security/cve/CVE-2022-4304/" source="CVE"/>
		<reference ref_id="CVE-2023-0215" ref_url="https://www.suse.com/security/cve/CVE-2023-0215/" source="CVE"/>
		<reference ref_id="CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2023-0286: Fixed X.400 address type confusion in X.509 GENERAL_NAME_cmp for x400Address (bsc#1207533).
- CVE-2023-0215: Fixed use-after-free following BIO_new_NDEF() (bsc#1207536).
- CVE-2022-4304: Fixed timing Oracle in RSA Decryption (bsc#1207534).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-07"/>
	<updated date="2023-02-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207533">SUSE bug 1207533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207534">SUSE bug 1207534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207536">SUSE bug 1207536</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4304/">CVE-2022-4304 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4304">CVE-2022-4304 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0215/">CVE-2023-0215 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0215">CVE-2023-0215 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990863" comment="libopenssl1-devel-1.0.1g-0.58.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993759" comment="libopenssl1-devel-32bit-1.0.1g-0.58.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990864" comment="libopenssl1_0_0-1.0.1g-0.58.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990865" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990866" comment="openssl1-1.0.1g-0.58.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990867" comment="openssl1-doc-1.0.1g-0.58.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219208" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1209624" ref_url="https://bugzilla.suse.com/1209624" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0464" ref_url="https://www.suse.com/security/cve/CVE-2023-0464/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2023-0464: Fixed excessive Resource Usage Verifying X.509 Policy Constraints (bsc#1209624).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-04"/>
	<updated date="2023-04-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209624">SUSE bug 1209624</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0464/">CVE-2023-0464 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0464">CVE-2023-0464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990794" comment="libopenssl1-devel-1.0.1g-0.58.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993760" comment="libopenssl1-devel-32bit-1.0.1g-0.58.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990795" comment="libopenssl1_0_0-1.0.1g-0.58.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990796" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990797" comment="openssl1-1.0.1g-0.58.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990798" comment="openssl1-doc-1.0.1g-0.58.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219209" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1209873" ref_url="https://bugzilla.suse.com/1209873" source="BUGZILLA"/>
		<reference ref_id="1209878" ref_url="https://bugzilla.suse.com/1209878" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0465" ref_url="https://www.suse.com/security/cve/CVE-2023-0465/" source="CVE"/>
		<reference ref_id="CVE-2023-0466" ref_url="https://www.suse.com/security/cve/CVE-2023-0466/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2023-0465: Invalid certificate policies in leaf certificates were silently ignored (bsc#1209878).
- CVE-2023-0466: Certificate policy check were not enabled (bsc#1209873).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-20"/>
	<updated date="2023-04-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209873">SUSE bug 1209873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209878">SUSE bug 1209878</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0465/">CVE-2023-0465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0465">CVE-2023-0465 at NVD</cve>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-0466/">CVE-2023-0466 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0466">CVE-2023-0466 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009990805" comment="libopenssl1-devel-1.0.1g-0.58.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993761" comment="libopenssl1-devel-32bit-1.0.1g-0.58.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990806" comment="libopenssl1_0_0-1.0.1g-0.58.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990807" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990808" comment="openssl1-1.0.1g-0.58.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009990809" comment="openssl1-doc-1.0.1g-0.58.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219210" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="843509" ref_url="https://bugzilla.suse.com/843509" source="BUGZILLA"/>
		<reference ref_id="895882" ref_url="https://bugzilla.suse.com/895882" source="BUGZILLA"/>
		<reference ref_id="907764" ref_url="https://bugzilla.suse.com/907764" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2061" ref_url="https://www.suse.com/security/cve/CVE-2013-2061/" source="CVE"/>
		<reference ref_id="CVE-2014-8104" ref_url="https://www.suse.com/security/cve/CVE-2014-8104/" source="CVE"/>
		<description>

OpenVPN used a non-constant-time memcmp in HMAC comparison in 
openvpn_decrypt that might have allowed remote attackers to gain knowledge 
of plaintext data. (CVE-2013-2061)

Security Issues:

    * CVE-2013-2061
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2061&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-01"/>
	<updated date="2013-11-01"/>
	<bugzilla href="https://bugzilla.suse.com/843509">SUSE bug 843509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895882">SUSE bug 895882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907764">SUSE bug 907764</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2061/">CVE-2013-2061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2061">CVE-2013-2061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8104/">CVE-2014-8104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8104">CVE-2014-8104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579348" comment="openvpn-2.0.9-143.40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579349" comment="openvpn-auth-pam-plugin-2.0.9-143.40.5 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579348" comment="openvpn-2.0.9-143.40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579349" comment="openvpn-auth-pam-plugin-2.0.9-143.40.5 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579348" comment="openvpn-2.0.9-143.40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579349" comment="openvpn-auth-pam-plugin-2.0.9-143.40.5 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219211" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1044947" ref_url="https://bugzilla.suse.com/1044947" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7508" ref_url="https://www.suse.com/security/cve/CVE-2017-7508/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002970.html" source="SUSE-SU"/>
		<description>
This update for openvpn fixes the following issues:

- It was possible to trigger an assertion by sending a malformed IPv6 packet.
  That issue could have been abused to remotely shutdown an openvpn server or
  client, if IPv6 and --mssfix were enabled and if the IPv6 networks used
  inside the VPN were known. [bsc#1044947, CVE-2017-7508]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-21"/>
	<updated date="2017-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1044947">SUSE bug 1044947</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7508/">CVE-2017-7508 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7508">CVE-2017-7508 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579350" comment="openvpn-2.0.9-143.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579351" comment="openvpn-auth-pam-plugin-2.0.9-143.46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579350" comment="openvpn-2.0.9-143.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579351" comment="openvpn-auth-pam-plugin-2.0.9-143.46.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219212" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1038709" ref_url="https://bugzilla.suse.com/1038709" source="BUGZILLA"/>
		<reference ref_id="1038711" ref_url="https://bugzilla.suse.com/1038711" source="BUGZILLA"/>
		<reference ref_id="1038713" ref_url="https://bugzilla.suse.com/1038713" source="BUGZILLA"/>
		<reference ref_id="1060877" ref_url="https://bugzilla.suse.com/1060877" source="BUGZILLA"/>
		<reference ref_id="995374" ref_url="https://bugzilla.suse.com/995374" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6329" ref_url="https://www.suse.com/security/cve/CVE-2016-6329/" source="CVE"/>
		<reference ref_id="CVE-2017-12166" ref_url="https://www.suse.com/security/cve/CVE-2017-12166/" source="CVE"/>
		<reference ref_id="CVE-2017-7478" ref_url="https://www.suse.com/security/cve/CVE-2017-7478/" source="CVE"/>
		<reference ref_id="CVE-2017-7479" ref_url="https://www.suse.com/security/cve/CVE-2017-7479/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003351.html" source="SUSE-SU"/>
		<description>


This update for openvpn fixes the following security issues:

- CVE-2017-12166: OpenVPN was vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution. (bsc#1060877).
- CVE-2016-6329: Now show which ciphers should no longer be used in openvpn --show-ciphers to avoid the SWEET32 attack (bsc#995374)
- CVE-2017-7478: OpenVPN was vulnerable to unauthenticated Denial of Service of server via received large control packet. (bsc#1038709)
- CVE-2017-7479: OpenVPN was vulnerable to reachable assertion when packet-ID counter rolls over resulting into Denial of Service of server by authenticated attacker. (bsc#1038711)
- Some other hardening fixes have also been applied (bsc#1038713)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-24"/>
	<updated date="2017-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038709">SUSE bug 1038709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038711">SUSE bug 1038711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038713">SUSE bug 1038713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060877">SUSE bug 1060877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995374">SUSE bug 995374</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6329/">CVE-2016-6329 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6329">CVE-2016-6329 at NVD</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12166/">CVE-2017-12166 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12166">CVE-2017-12166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7478/">CVE-2017-7478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7478">CVE-2017-7478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7479/">CVE-2017-7479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7479">CVE-2017-7479 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579352" comment="openvpn-2.0.9-143.47.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579353" comment="openvpn-auth-pam-plugin-2.0.9-143.47.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579352" comment="openvpn-2.0.9-143.47.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579353" comment="openvpn-auth-pam-plugin-2.0.9-143.47.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219213" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185279" ref_url="https://bugzilla.suse.com/1185279" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15078" ref_url="https://www.suse.com/security/cve/CVE-2020-15078/" source="CVE"/>
		<description>
This update for openvpn fixes the following issues:

- CVE-2020-15078: Fixed authentication bypass with deferred authentication (bsc#1185279).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-20"/>
	<updated date="2023-02-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185279">SUSE bug 1185279</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15078/">CVE-2020-15078 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15078">CVE-2020-15078 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993762" comment="openvpn-2.0.9-143.47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993763" comment="openvpn-auth-pam-plugin-2.0.9-143.47.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219214" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn-openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1038709" ref_url="https://bugzilla.suse.com/1038709" source="BUGZILLA"/>
		<reference ref_id="1038711" ref_url="https://bugzilla.suse.com/1038711" source="BUGZILLA"/>
		<reference ref_id="1038713" ref_url="https://bugzilla.suse.com/1038713" source="BUGZILLA"/>
		<reference ref_id="1044947" ref_url="https://bugzilla.suse.com/1044947" source="BUGZILLA"/>
		<reference ref_id="959511" ref_url="https://bugzilla.suse.com/959511" source="BUGZILLA"/>
		<reference ref_id="988522" ref_url="https://bugzilla.suse.com/988522" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7478" ref_url="https://www.suse.com/security/cve/CVE-2017-7478/" source="CVE"/>
		<reference ref_id="CVE-2017-7479" ref_url="https://www.suse.com/security/cve/CVE-2017-7479/" source="CVE"/>
		<reference ref_id="CVE-2017-7508" ref_url="https://www.suse.com/security/cve/CVE-2017-7508/" source="CVE"/>
		<reference ref_id="CVE-2017-7520" ref_url="https://www.suse.com/security/cve/CVE-2017-7520/" source="CVE"/>
		<reference ref_id="CVE-2017-7521" ref_url="https://www.suse.com/security/cve/CVE-2017-7521/" source="CVE"/>
		<description>
This update for openvpn-openssl1 fixes the following issues:

- Some parts of the certificate-parsing code did not always clear all allocated
  memory. This would have allowed clients to leak a few bytes of memory for
  each connection attempt, thereby facilitating a (quite inefficient) DoS
  attack on the server. [bsc#1044947, CVE-2017-7521]

- The ASN1 parsing code contained a bug that could have resulted in some
  buffers being free()d twice, and this issue could have potentially been
  triggered remotely by a VPN peer. [bsc#1044947, CVE-2017-7521]

- If clients used a HTTP proxy with NTLM authentication, a man-in-the-middle
  attacker between client and proxy could cause the client to crash or disclose
  at most 96 bytes of stack memory. The disclosed stack memory was likely to
  contain the proxy password. If the proxy password had not been reused, this
  was unlikely to compromise the security of the OpenVPN tunnel itself. Clients
  who did not use the --http-proxy option with ntlm2 authentication were not
  affected. [bsc#1044947, CVE-2017-7520]

- It was possible to trigger an assertion by sending a malformed IPv6 packet.
  That issue could have been abused to remotely shutdown an openvpn server or
  client, if IPv6 and --mssfix were enabled and if the IPv6 networks used
  inside the VPN were known. [bsc#1044947, CVE-2017-7508]

- The installed sample configuration file was updated to comply to FIPS
  requirements. [bsc#988522]

- Remedy large latencies on the openVPN server during authentication process.
  [bsc#959511]

- Fix potential denial-of-service attacks found during independent audits.
  [bsc#1038713, bsc#1038709, CVE-2017-7478, bsc#1038711, CVE-2017-7479]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-29"/>
	<updated date="2017-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038709">SUSE bug 1038709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038711">SUSE bug 1038711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038713">SUSE bug 1038713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044947">SUSE bug 1044947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959511">SUSE bug 959511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988522">SUSE bug 988522</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7478/">CVE-2017-7478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7478">CVE-2017-7478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7479/">CVE-2017-7479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7479">CVE-2017-7479 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7508/">CVE-2017-7508 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7508">CVE-2017-7508 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7520/">CVE-2017-7520 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7520">CVE-2017-7520 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7521/">CVE-2017-7521 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7521">CVE-2017-7521 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579354" comment="openvpn-openssl1-2.3.2-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579355" comment="openvpn-openssl1-down-root-plugin-2.3.2-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219215" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn-openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1060877" ref_url="https://bugzilla.suse.com/1060877" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12166" ref_url="https://www.suse.com/security/cve/CVE-2017-12166/" source="CVE"/>
		<description>
This update for openvpn-openssl1 fixes the following issues:

Security issue fixed:

- CVE-2017-12166: Fix remote buffer overflow (bsc#1060877).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-01"/>
	<updated date="2017-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060877">SUSE bug 1060877</bugzilla>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12166/">CVE-2017-12166 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12166">CVE-2017-12166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579356" comment="openvpn-openssl1-2.3.2-0.10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579357" comment="openvpn-openssl1-down-root-plugin-2.3.2-0.10.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219216" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn-openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="959714" ref_url="https://bugzilla.suse.com/959714" source="BUGZILLA"/>
		<description>
This update for openvpn-openssl1 fixes the following issues:

- Fixed Out of bounds read on getaddrinfo() result (bsc#959714).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-27"/>
	<updated date="2020-08-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959714">SUSE bug 959714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579358" comment="openvpn-openssl1-2.3.2-0.10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579359" comment="openvpn-openssl1-down-root-plugin-2.3.2-0.10.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219217" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn-openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1085803" ref_url="https://bugzilla.suse.com/1085803" source="BUGZILLA"/>
		<reference ref_id="1185279" ref_url="https://bugzilla.suse.com/1185279" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7544" ref_url="https://www.suse.com/security/cve/CVE-2018-7544/" source="CVE"/>
		<reference ref_id="CVE-2020-15078" ref_url="https://www.suse.com/security/cve/CVE-2020-15078/" source="CVE"/>
		<description>
This update for openvpn-openssl1 fixes the following issues:

- CVE-2020-15078: Fixed authentication bypass with deferred authentication (bsc#1185279).
- CVE-2018-7544: Fixed cross-protocol scripting issue that was discovered in the management interface (bsc#1085803).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-12"/>
	<updated date="2021-05-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085803">SUSE bug 1085803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185279">SUSE bug 1185279</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7544/">CVE-2018-7544 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7544">CVE-2018-7544 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15078/">CVE-2020-15078 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15078">CVE-2020-15078 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579360" comment="openvpn-openssl1-2.3.2-0.10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579361" comment="openvpn-openssl1-down-root-plugin-2.3.2-0.10.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219218" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn-openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1197341" ref_url="https://bugzilla.suse.com/1197341" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0547" ref_url="https://www.suse.com/security/cve/CVE-2022-0547/" source="CVE"/>
		<description>
This update for openvpn-openssl1 fixes the following issues:

- CVE-2022-0547: Fixed possible authentication bypass in external authentication plug-in (bsc#1197341).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-06"/>
	<updated date="2022-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197341">SUSE bug 1197341</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0547/">CVE-2022-0547 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0547">CVE-2022-0547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009676888" comment="openvpn-openssl1-2.3.2-0.10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676889" comment="openvpn-openssl1-down-root-plugin-2.3.2-0.10.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219219" version="1" class="patch">
	<metadata>
		<title>Security update for openwsman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122623" ref_url="https://bugzilla.suse.com/1122623" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3816" ref_url="https://www.suse.com/security/cve/CVE-2019-3816/" source="CVE"/>
		<reference ref_id="CVE-2019-3833" ref_url="https://www.suse.com/security/cve/CVE-2019-3833/" source="CVE"/>
		<description>
This update for openwsman fixes the following issues:

Security issues fixed:

- CVE-2019-3816: Fixed a vulnerability in openwsmand deamon which could lead to arbitary file disclosure (bsc#1122623).
- CVE-2019-3833: Fixed a vulnerability in process_connection() which could allow an attacker to trigger an infinite
  loop which leads to Denial of Service (bsc#1122623).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-18"/>
	<updated date="2019-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122623">SUSE bug 1122623</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3816/">CVE-2019-3816 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3816">CVE-2019-3816 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3833/">CVE-2019-3833 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3833">CVE-2019-3833 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573116" comment="libwsman1-2.2.3-0.16.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573117" comment="openwsman-client-2.2.3-0.16.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573118" comment="openwsman-server-2.2.3-0.16.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219220" version="1" class="patch">
	<metadata>
		<title>Security update for orca (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="916835" ref_url="https://bugzilla.suse.com/916835" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4245" ref_url="https://www.suse.com/security/cve/CVE-2013-4245/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001710.html" source="SUSE-SU"/>
		<description>
This orca update fixes the following security issue.

- Don't try to import modules from current working directory (bsc#916835, CVE-2013-4245).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-02"/>
	<updated date="2015-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/916835">SUSE bug 916835</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4245/">CVE-2013-4245 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4245">CVE-2013-4245 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579362" comment="orca-2.28.3-0.5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579363" comment="orca-lang-2.28.3-0.5.10 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579362" comment="orca-2.28.3-0.5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579363" comment="orca-lang-2.28.3-0.5.10 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579362" comment="orca-2.28.3-0.5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579363" comment="orca-lang-2.28.3-0.5.10 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219221" version="1" class="patch">
	<metadata>
		<title>Recommended update for p7zip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1077725" ref_url="https://bugzilla.suse.com/1077725" source="BUGZILLA"/>
		<reference ref_id="1077978" ref_url="https://bugzilla.suse.com/1077978" source="BUGZILLA"/>
		<reference ref_id="912878" ref_url="https://bugzilla.suse.com/912878" source="BUGZILLA"/>
		<reference ref_id="979823" ref_url="https://bugzilla.suse.com/979823" source="BUGZILLA"/>
		<reference ref_id="984650" ref_url="https://bugzilla.suse.com/984650" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1038" ref_url="https://www.suse.com/security/cve/CVE-2015-1038/" source="CVE"/>
		<reference ref_id="CVE-2016-1372" ref_url="https://www.suse.com/security/cve/CVE-2016-1372/" source="CVE"/>
		<reference ref_id="CVE-2016-2335" ref_url="https://www.suse.com/security/cve/CVE-2016-2335/" source="CVE"/>
		<reference ref_id="CVE-2017-17969" ref_url="https://www.suse.com/security/cve/CVE-2017-17969/" source="CVE"/>
		<description>
This update for p7zip fixes the following issue:

- Provide version 9.20.1 of 'p7zip' package. (jsc#ECO-3520)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-06"/>
	<updated date="2021-07-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077725">SUSE bug 1077725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077978">SUSE bug 1077978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912878">SUSE bug 912878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979823">SUSE bug 979823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984650">SUSE bug 984650</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1038/">CVE-2015-1038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1038">CVE-2015-1038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1372/">CVE-2016-1372 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1372">CVE-2016-1372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2335/">CVE-2016-2335 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2335">CVE-2016-2335 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17969/">CVE-2017-17969 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17969">CVE-2017-17969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624197" comment="p7zip-9.20.1-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219222" version="1" class="patch">
	<metadata>
		<title>Security update for pam</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="848417" ref_url="https://bugzilla.suse.com/848417" source="BUGZILLA"/>
		<reference ref_id="870433" ref_url="https://bugzilla.suse.com/870433" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2583" ref_url="https://www.suse.com/security/cve/CVE-2014-2583/" source="CVE"/>
		<description>

This update changes the broken default behavior of pam_pwhistory to not 
enforce checks when the root user requests password changes. In order to 
enforce pwhistory checks on the root user, the 'enforce_for_root' parameter 
needs to be set for the pam_pwhistory.so module.

This pam update fixes the following security and non-security issues:

    * bnc#870433: Fixed pam_timestamp path injection problem
      (CVE-2014-2583)
    * bnc#848417: Fixed pam_pwhistory root password enforcement when
      resetting non-root user's password

Security Issue references:

    * CVE-2014-2583
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2583&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-11"/>
	<updated date="2014-04-11"/>
	<bugzilla href="https://bugzilla.suse.com/848417">SUSE bug 848417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870433">SUSE bug 870433</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2583/">CVE-2014-2583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2583">CVE-2014-2583 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579364" comment="pam-1.1.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579365" comment="pam-32bit-1.1.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579366" comment="pam-doc-1.1.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579367" comment="pam-x86-1.1.5-0.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579364" comment="pam-1.1.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579365" comment="pam-32bit-1.1.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579366" comment="pam-doc-1.1.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579367" comment="pam-x86-1.1.5-0.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579364" comment="pam-1.1.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579365" comment="pam-32bit-1.1.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579366" comment="pam-doc-1.1.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579367" comment="pam-x86-1.1.5-0.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219223" version="1" class="patch">
	<metadata>
		<title>Security update for pam (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="854480" ref_url="https://bugzilla.suse.com/854480" source="BUGZILLA"/>
		<reference ref_id="934920" ref_url="https://bugzilla.suse.com/934920" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7041" ref_url="https://www.suse.com/security/cve/CVE-2013-7041/" source="CVE"/>
		<reference ref_id="CVE-2015-3238" ref_url="https://www.suse.com/security/cve/CVE-2015-3238/" source="CVE"/>
		<description>
This update for pam fixes the following issues:

Security issues fixed:

- CVE-2015-3238: Fixed a denial of service and information leak which could be caused by very long passwords (bsc#934920).
- CVE-2013-7041: Fixed a potential authentication bypass where password hashes weren't compared case-sensitively (bsc#854480).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-21"/>
	<updated date="2019-05-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/854480">SUSE bug 854480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934920">SUSE bug 934920</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7041/">CVE-2013-7041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7041">CVE-2013-7041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3238/">CVE-2015-3238 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3238">CVE-2015-3238 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579368" comment="pam-1.1.5-0.12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579369" comment="pam-32bit-1.1.5-0.12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579370" comment="pam-doc-1.1.5-0.12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219224" version="1" class="patch">
	<metadata>
		<title>Security update for pam-modules (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="707645" ref_url="https://bugzilla.suse.com/707645" source="BUGZILLA"/>
		<reference ref_id="839386" ref_url="https://bugzilla.suse.com/839386" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3172" ref_url="https://www.suse.com/security/cve/CVE-2011-3172/" source="CVE"/>
		<description>
This update for pam-modules fixes the following issue.

This security issue was fixed:

- CVE-2011-3172: Ensure that unix2_chkpwd calls pam_acct_mgmt to prevent usage
  of locked accounts (bsc#707645, bsc#839386).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-21"/>
	<updated date="2018-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/707645">SUSE bug 707645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839386">SUSE bug 839386</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3172/">CVE-2011-3172 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3172">CVE-2011-3172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573128" comment="pam-modules-11-1.22.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573129" comment="pam-modules-32bit-11-1.22.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219225" version="1" class="patch">
	<metadata>
		<title>Security update for pam_pkcs11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1105012" ref_url="https://bugzilla.suse.com/1105012" source="BUGZILLA"/>
		<description>
This update for pam_pkcs11 fixes the following security issues:

- It was possible to replay an authentication by using a specially prepared smartcard or token (bsc#1105012)
- Prevent buffer overflow if a user has a home directory with a length of more than 512 bytes (bsc#1105012)
- Memory not cleaned properly before free() (bsc#1105012)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1105012">SUSE bug 1105012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573130" comment="pam_pkcs11-0.6.0-141.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573131" comment="pam_pkcs11-32bit-0.6.0-141.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219226" version="1" class="patch">
	<metadata>
		<title>Security update for pam_radius (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1163933" ref_url="https://bugzilla.suse.com/1163933" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9542" ref_url="https://www.suse.com/security/cve/CVE-2015-9542/" source="CVE"/>
		<description>
This update for pam_radius fixes the following issues:

  - CVE-2015-9542: Fixed buffer overflow in password field (bsc#1163933).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-30"/>
	<updated date="2022-12-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1163933">SUSE bug 1163933</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9542/">CVE-2015-9542 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9542">CVE-2015-9542 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993764" comment="pam_radius-1.3.16-180.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993765" comment="pam_radius-32bit-1.3.16-180.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219227" version="1" class="patch">
	<metadata>
		<title>Security update for patch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1059698" ref_url="https://bugzilla.suse.com/1059698" source="BUGZILLA"/>
		<reference ref_id="1080918" ref_url="https://bugzilla.suse.com/1080918" source="BUGZILLA"/>
		<reference ref_id="1088420" ref_url="https://bugzilla.suse.com/1088420" source="BUGZILLA"/>
		<reference ref_id="662957" ref_url="https://bugzilla.suse.com/662957" source="BUGZILLA"/>
		<reference ref_id="914891" ref_url="https://bugzilla.suse.com/914891" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-4651" ref_url="https://www.suse.com/security/cve/CVE-2010-4651/" source="CVE"/>
		<reference ref_id="CVE-2014-9637" ref_url="https://www.suse.com/security/cve/CVE-2014-9637/" source="CVE"/>
		<reference ref_id="CVE-2016-10713" ref_url="https://www.suse.com/security/cve/CVE-2016-10713/" source="CVE"/>
		<reference ref_id="CVE-2018-1000156" ref_url="https://www.suse.com/security/cve/CVE-2018-1000156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003975.html" source="SUSE-SU"/>
		<description>
This update for patch fixes several issues.

These security issues were fixed:

- CVE-2018-1000156: patch: Malicious patch files cause ed to execute arbitrary commands (bsc#1088420).
- CVE-2014-9637: Prevent DoS by remote attackers (memory consumption and
  segmentation fault) via a crafted diff file (bsc#914891).
- CVE-2016-10713: Prevent out-of-bounds access within pch_write_line() that
  could have lead to DoS via a crafted input file (bsc#1080918).
- CVE-2010-4651: Fixed a directory traversal bug (bsc#662957):

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-07"/>
	<updated date="2018-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059698">SUSE bug 1059698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080918">SUSE bug 1080918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088420">SUSE bug 1088420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662957">SUSE bug 662957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914891">SUSE bug 914891</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4651/">CVE-2010-4651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4651">CVE-2010-4651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9637/">CVE-2014-9637 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9637">CVE-2014-9637 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10713/">CVE-2016-10713 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10713">CVE-2016-10713 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000156/">CVE-2018-1000156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000156">CVE-2018-1000156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579371" comment="patch-2.5.9-252.22.7.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579371" comment="patch-2.5.9-252.22.7.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219228" version="1" class="patch">
	<metadata>
		<title>Security update for perl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="838333" ref_url="https://bugzilla.suse.com/838333" source="BUGZILLA"/>
		<reference ref_id="896715" ref_url="https://bugzilla.suse.com/896715" source="BUGZILLA"/>
		<reference ref_id="900455" ref_url="https://bugzilla.suse.com/900455" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4330" ref_url="https://www.suse.com/security/cve/CVE-2014-4330/" source="CVE"/>
		<reference ref_id="SUSE-RU-2015:0562-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-March/002800.html" source="SUSE-SU"/>
		<description>

This update fixes a memory leak and an infinite recursion in Data::Dumper. 
(CVE-2014-4330)

Security Issues:

    * CVE-2014-4330
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4330&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-22"/>
	<updated date="2014-10-22"/>
	<bugzilla href="https://bugzilla.suse.com/838333">SUSE bug 838333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896715">SUSE bug 896715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900455">SUSE bug 900455</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4330/">CVE-2014-4330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4330">CVE-2014-4330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579372" comment="perl-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579373" comment="perl-32bit-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579374" comment="perl-Module-Build-0.2808.01-0.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579375" comment="perl-Test-Simple-0.72-0.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579376" comment="perl-base-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579377" comment="perl-doc-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579378" comment="perl-x86-5.10.0-64.70.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579372" comment="perl-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579373" comment="perl-32bit-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579374" comment="perl-Module-Build-0.2808.01-0.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579375" comment="perl-Test-Simple-0.72-0.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579376" comment="perl-base-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579377" comment="perl-doc-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579378" comment="perl-x86-5.10.0-64.70.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579372" comment="perl-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579373" comment="perl-32bit-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579374" comment="perl-Module-Build-0.2808.01-0.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579375" comment="perl-Test-Simple-0.72-0.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579376" comment="perl-base-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579377" comment="perl-doc-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579378" comment="perl-x86-5.10.0-64.70.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219229" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="929027" ref_url="https://bugzilla.suse.com/929027" source="BUGZILLA"/>
		<reference ref_id="967082" ref_url="https://bugzilla.suse.com/967082" source="BUGZILLA"/>
		<reference ref_id="987887" ref_url="https://bugzilla.suse.com/987887" source="BUGZILLA"/>
		<reference ref_id="988311" ref_url="https://bugzilla.suse.com/988311" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8853" ref_url="https://www.suse.com/security/cve/CVE-2015-8853/" source="CVE"/>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<reference ref_id="CVE-2016-2381" ref_url="https://www.suse.com/security/cve/CVE-2016-2381/" source="CVE"/>
		<reference ref_id="CVE-2016-6185" ref_url="https://www.suse.com/security/cve/CVE-2016-6185/" source="CVE"/>
		<description>

This update for perl fixes the following issues:

- CVE-2016-6185: xsloader looking at a '(eval)' directory [bsc#988311]
  
- CVE-2016-1238: searching current directory for optional modules [bsc#987887]

- CVE-2015-8853: regex engine hanging on bad utf8 [bnc976584]

- CVE-2016-2381: environment dup handling bug [bsc#967082]

- perl panic with utf8_mg_pos_cache_update [bsc#929027]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-06"/>
	<updated date="2016-09-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/929027">SUSE bug 929027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967082">SUSE bug 967082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987887">SUSE bug 987887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988311">SUSE bug 988311</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8853/">CVE-2015-8853 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8853">CVE-2015-8853 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1238">CVE-2016-1238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2381/">CVE-2016-2381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2381">CVE-2016-2381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6185/">CVE-2016-6185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6185">CVE-2016-6185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579379" comment="perl-5.10.0-64.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579380" comment="perl-32bit-5.10.0-64.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579381" comment="perl-Module-Build-0.2808.01-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579382" comment="perl-Test-Simple-0.72-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579383" comment="perl-base-5.10.0-64.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579384" comment="perl-doc-5.10.0-64.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219230" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1047178" ref_url="https://bugzilla.suse.com/1047178" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6512" ref_url="https://www.suse.com/security/cve/CVE-2017-6512/" source="CVE"/>
		<description>
This update for perl fixes the following issues:

Security issue fixed:
- CVE-2017-6512: Race condition in the rmtree and remove_tree functions in the
  File-Path module before 2.13 for Perl allows attackers to set the mode on
  arbitrary files via vectors involving directory-permission loosening logic.
  (bnc#1047178)

Bug fixes:
- reformat baselibs.conf as source validator workaround
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-08"/>
	<updated date="2017-11-08"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1047178">SUSE bug 1047178</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-6512/">CVE-2017-6512 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6512">CVE-2017-6512 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579385" comment="perl-5.10.0-64.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579386" comment="perl-32bit-5.10.0-64.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579387" comment="perl-Module-Build-0.2808.01-0.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579388" comment="perl-Test-Simple-0.72-0.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579389" comment="perl-base-5.10.0-64.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579390" comment="perl-doc-5.10.0-64.81.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219231" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1082216" ref_url="https://bugzilla.suse.com/1082216" source="BUGZILLA"/>
		<reference ref_id="1082233" ref_url="https://bugzilla.suse.com/1082233" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6798" ref_url="https://www.suse.com/security/cve/CVE-2018-6798/" source="CVE"/>
		<reference ref_id="CVE-2018-6913" ref_url="https://www.suse.com/security/cve/CVE-2018-6913/" source="CVE"/>
		<description>
This update for perl fixes the following issues:

Security issue fixed:

- CVE-2018-6913: Fixed space calculation issues in pp_pack.c (bsc#1082216).
- CVE-2018-6798: Fixed heap buffer overflow in regexec.c (bsc#1082233).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-18"/>
	<updated date="2018-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082216">SUSE bug 1082216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082233">SUSE bug 1082233</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6798/">CVE-2018-6798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6798">CVE-2018-6798 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6913/">CVE-2018-6913 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6913">CVE-2018-6913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579391" comment="perl-5.10.0-64.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579392" comment="perl-32bit-5.10.0-64.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579393" comment="perl-Module-Build-0.2808.01-0.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579394" comment="perl-Test-Simple-0.72-0.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579395" comment="perl-base-5.10.0-64.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579396" comment="perl-doc-5.10.0-64.81.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219232" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1096718" ref_url="https://bugzilla.suse.com/1096718" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12015" ref_url="https://www.suse.com/security/cve/CVE-2018-12015/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004286.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

- CVE-2018-12015: The Archive::Tar module allowed remote attackers to bypass a
  directory-traversal protection mechanism and overwrite arbitrary files
  (bsc#1096718).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-19"/>
	<updated date="2018-07-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1096718">SUSE bug 1096718</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12015/">CVE-2018-12015 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12015">CVE-2018-12015 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579397" comment="perl-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579398" comment="perl-32bit-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579399" comment="perl-Module-Build-0.2808.01-0.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579400" comment="perl-Test-Simple-0.72-0.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579401" comment="perl-base-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579402" comment="perl-doc-5.10.0-64.81.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579397" comment="perl-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579398" comment="perl-32bit-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579399" comment="perl-Module-Build-0.2808.01-0.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579400" comment="perl-Test-Simple-0.72-0.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579401" comment="perl-base-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579402" comment="perl-doc-5.10.0-64.81.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219233" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1102840" ref_url="https://bugzilla.suse.com/1102840" source="BUGZILLA"/>
		<reference ref_id="1114674" ref_url="https://bugzilla.suse.com/1114674" source="BUGZILLA"/>
		<reference ref_id="1160039" ref_url="https://bugzilla.suse.com/1160039" source="BUGZILLA"/>
		<reference ref_id="1171863" ref_url="https://bugzilla.suse.com/1171863" source="BUGZILLA"/>
		<reference ref_id="1171864" ref_url="https://bugzilla.suse.com/1171864" source="BUGZILLA"/>
		<reference ref_id="1171866" ref_url="https://bugzilla.suse.com/1171866" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18311" ref_url="https://www.suse.com/security/cve/CVE-2018-18311/" source="CVE"/>
		<reference ref_id="CVE-2020-10543" ref_url="https://www.suse.com/security/cve/CVE-2020-10543/" source="CVE"/>
		<reference ref_id="CVE-2020-10878" ref_url="https://www.suse.com/security/cve/CVE-2020-10878/" source="CVE"/>
		<reference ref_id="CVE-2020-12723" ref_url="https://www.suse.com/security/cve/CVE-2020-12723/" source="CVE"/>
		<description>
This update for perl fixes the following issues:

- CVE-2020-10543: Fixed a buffer overflow triggered via an
  attacker-controlled regular expression (bsc#1171863).
- CVE-2020-10878: Fixed an integer overflow that could lead to an
  attacker injecting instructions into the regular expression
  intermediate representation (bsc#1171864).
- CVE-2020-12723: Fixed an integer overflow that could lead to an
  attacker injecting instructions into the regular expression
  intermediate representation (bsc#1171866).
- CVE-2018-18311: Fixed an integer overflow that lead to a buffer
  overflow (bsc#1114674).

Non-security fixes:

- Fixed issues with timelocal calls (bsc#1102840, bsc#1160039).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-22"/>
	<updated date="2022-08-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102840">SUSE bug 1102840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114674">SUSE bug 1114674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160039">SUSE bug 1160039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171863">SUSE bug 1171863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171864">SUSE bug 1171864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171866">SUSE bug 1171866</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18311/">CVE-2018-18311 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18311">CVE-2018-18311 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10543/">CVE-2020-10543 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10543">CVE-2020-10543 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10878/">CVE-2020-10878 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10878">CVE-2020-10878 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12723/">CVE-2020-12723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12723">CVE-2020-12723 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993766" comment="perl-5.10.0-64.81.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993767" comment="perl-32bit-5.10.0-64.81.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993768" comment="perl-Module-Build-0.2808.01-0.81.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993769" comment="perl-Test-Simple-0.72-0.81.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993770" comment="perl-base-5.10.0-64.81.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993771" comment="perl-doc-5.10.0-64.81.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219234" version="1" class="patch">
	<metadata>
		<title>Security update for perl-Archive-Zip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1099497" ref_url="https://bugzilla.suse.com/1099497" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10860" ref_url="https://www.suse.com/security/cve/CVE-2018-10860/" source="CVE"/>
		<description>
This update for perl-Archive-Zip fixes the following security issue:

- CVE-2018-10860: Prevent directory traversal caused by not properly sanitizing
  paths while extracting zip files. An attacker able to provide a specially
  crafted archive for processing could have used this flaw to write or overwrite
  arbitrary files in the context of the perl interpreter (bsc#1099497).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1099497">SUSE bug 1099497</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-10860/">CVE-2018-10860 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10860">CVE-2018-10860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573154" comment="perl-Archive-Zip-1.24-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219235" version="1" class="patch">
	<metadata>
		<title>Security update for perl-Convert-ASN1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1168934" ref_url="https://bugzilla.suse.com/1168934" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7488" ref_url="https://www.suse.com/security/cve/CVE-2013-7488/" source="CVE"/>
		<description>
This update for perl-Convert-ASN1 fixes the following issue:

- CVE-2013-7488: Fixed an infinite loop via unexpected input (bsc#1168934).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-19"/>
	<updated date="2021-01-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1168934">SUSE bug 1168934</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-7488/">CVE-2013-7488 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7488">CVE-2013-7488 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573156" comment="perl-Convert-ASN1-0.22-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219236" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBD-mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1012546" ref_url="https://bugzilla.suse.com/1012546" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1251" ref_url="https://www.suse.com/security/cve/CVE-2016-1251/" source="CVE"/>
		<description>

This update for perl-DBD-mysql fixes the following issues:

- Add patch to fix CVE-2016-1251 (bsc#1012546) use-after-free for repeated
  fetchrow_arrayref calls when mysql_server_prepare=1

		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-04"/>
	<updated date="2017-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1012546">SUSE bug 1012546</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1251/">CVE-2016-1251 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1251">CVE-2016-1251 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573157" comment="perl-DBD-mysql-4.008-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219237" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBD-mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1002626" ref_url="https://bugzilla.suse.com/1002626" source="BUGZILLA"/>
		<reference ref_id="1010457" ref_url="https://bugzilla.suse.com/1010457" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1246" ref_url="https://www.suse.com/security/cve/CVE-2016-1246/" source="CVE"/>
		<reference ref_id="CVE-2016-1249" ref_url="https://www.suse.com/security/cve/CVE-2016-1249/" source="CVE"/>
		<description>

This update for perl-DBD-mysql fixes the following issues:

- CVE-2016-1246: Buffer overflow allowed context-dependent attackers to cause a denial of service (crash) via vectors related to an error message (bsc#1002626).
- CVE-2016-1249: Out-of-bounds read when using server-side prepared statement support (bsc#1010457).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-13"/>
	<updated date="2017-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002626">SUSE bug 1002626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010457">SUSE bug 1010457</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1246/">CVE-2016-1246 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1246">CVE-2016-1246 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1249/">CVE-2016-1249 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1249">CVE-2016-1249 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573158" comment="perl-DBD-mysql-4.008-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219238" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBD-mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1047059" ref_url="https://bugzilla.suse.com/1047059" source="BUGZILLA"/>
		<reference ref_id="1047095" ref_url="https://bugzilla.suse.com/1047095" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10788" ref_url="https://www.suse.com/security/cve/CVE-2017-10788/" source="CVE"/>
		<reference ref_id="CVE-2017-10789" ref_url="https://www.suse.com/security/cve/CVE-2017-10789/" source="CVE"/>
		<description>
This update for perl-DBD-mysql fixes the following issues:

- CVE-2017-10789: The DBD::mysql module when with mysql_ssl=1 setting enabled, means that SSL is optional 
(even though this setting's documentation has a \'your communication with the server will be encrypted\' statement), 
which could lead man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, 
a related issue to CVE-2015-3152. (bsc#1047059)
- CVE-2017-10788: The DBD::mysql module through 4.043 for Perl allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by triggering (1) certain error responses from a MySQL server or (2) a loss of a network connection to a MySQL server. The use-after-free defect was introduced by relying on incorrect Oracle mysql_stmt_close documentation and code examples. (bsc#1047095)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-28"/>
	<updated date="2018-05-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047059">SUSE bug 1047059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047095">SUSE bug 1047095</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10788/">CVE-2017-10788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10788">CVE-2017-10788 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10789/">CVE-2017-10789 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10789">CVE-2017-10789 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573159" comment="perl-DBD-mysql-4.008-10.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219239" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176409" ref_url="https://bugzilla.suse.com/1176409" source="BUGZILLA"/>
		<reference ref_id="1176412" ref_url="https://bugzilla.suse.com/1176412" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14392" ref_url="https://www.suse.com/security/cve/CVE-2020-14392/" source="CVE"/>
		<reference ref_id="CVE-2020-14393" ref_url="https://www.suse.com/security/cve/CVE-2020-14393/" source="CVE"/>
		<description>
This update for perl-DBI fixes the following issues:

Security issues fixed:

- CVE-2020-14392: Memory corruption in XS functions when Perl stack is reallocated (bsc#1176412).
- CVE-2020-14393: Fixed a buffer overflow on an overlong DBD class name (bsc#1176409).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176409">SUSE bug 1176409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176412">SUSE bug 1176412</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14392/">CVE-2020-14392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14392">CVE-2020-14392 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14393/">CVE-2020-14393 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14393">CVE-2020-14393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573160" comment="perl-DBI-1.607-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219240" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176493" ref_url="https://bugzilla.suse.com/1176493" source="BUGZILLA"/>
		<reference ref_id="1176496" ref_url="https://bugzilla.suse.com/1176496" source="BUGZILLA"/>
		<reference ref_id="1176764" ref_url="https://bugzilla.suse.com/1176764" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7490" ref_url="https://www.suse.com/security/cve/CVE-2013-7490/" source="CVE"/>
		<reference ref_id="CVE-2013-7491" ref_url="https://www.suse.com/security/cve/CVE-2013-7491/" source="CVE"/>
		<reference ref_id="CVE-2019-20919" ref_url="https://www.suse.com/security/cve/CVE-2019-20919/" source="CVE"/>
		<description>
This update for perl-DBI fixes the following issues:

- CVE-2019-20919: Fixed a NULL profile dereference in dbi_profile (bsc#1176764).
- CVE-2013-7490: Fixed memory corruption when using many arguments 
  to methods for CallbacksUsing (bsc#1176496).	  
- CVE-2013-7491: Fixed a stack corruption when a user-defined function required a
  non-trivial amount of memory (bsc#1176493).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176493">SUSE bug 1176493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176496">SUSE bug 1176496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176764">SUSE bug 1176764</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-7490/">CVE-2013-7490 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7490">CVE-2013-7490 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-7491/">CVE-2013-7491 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7491">CVE-2013-7491 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20919/">CVE-2019-20919 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20919">CVE-2019-20919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573161" comment="perl-DBI-1.607-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219241" version="1" class="patch">
	<metadata>
		<title>Security update for perl-PlRPC (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="858243" ref_url="https://bugzilla.suse.com/858243" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7284" ref_url="https://www.suse.com/security/cve/CVE-2013-7284/" source="CVE"/>
		<description>
This update for perl-PlRPC fixes the following issues:

- Security notice: [bsc#858243, CVE-2013-7284]
  * Document security vulnerability on Storable and reply attack
- Add perl-PlRPC-CVE-2013-7284.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-14"/>
	<updated date="2020-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/858243">SUSE bug 858243</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7284/">CVE-2013-7284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7284">CVE-2013-7284 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573162" comment="perl-PlRPC-0.2019-32.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219242" version="1" class="patch">
	<metadata>
		<title>Security update for perl-XML-LibXML (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1046848" ref_url="https://bugzilla.suse.com/1046848" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10672" ref_url="https://www.suse.com/security/cve/CVE-2017-10672/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003615.html" source="SUSE-SU"/>
		<description>
This update for perl-XML-LibXML fixes the following issues:

- CVE-2017-10672: A use-after-free allowed remote attackers to potentially
  execute arbitrary code by controlling the arguments to a replaceChild call
  (bsc#1046848)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-22"/>
	<updated date="2018-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046848">SUSE bug 1046848</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-10672/">CVE-2017-10672 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10672">CVE-2017-10672 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579403" comment="perl-XML-LibXML-1.66-3.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579403" comment="perl-XML-LibXML-1.66-3.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219243" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1150734" ref_url="https://bugzilla.suse.com/1150734" source="BUGZILLA"/>
		<reference ref_id="1157198" ref_url="https://bugzilla.suse.com/1157198" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3690" ref_url="https://www.suse.com/security/cve/CVE-2019-3690/" source="CVE"/>
		<description>
This update for permissions fixes the following issues:

- CVE-2019-3690: Fixed a privilege escalation through untrusted symlinks (bsc#1150734). 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150734">SUSE bug 1150734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157198">SUSE bug 1157198</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3690/">CVE-2019-3690 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3690">CVE-2019-3690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579404" comment="permissions-2013.1.7-0.6.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219244" version="1" class="patch">
	<metadata>
		<title>Recommended update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1160594" ref_url="https://bugzilla.suse.com/1160594" source="BUGZILLA"/>
		<reference ref_id="1160764" ref_url="https://bugzilla.suse.com/1160764" source="BUGZILLA"/>
		<reference ref_id="1163922" ref_url="https://bugzilla.suse.com/1163922" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8013" ref_url="https://www.suse.com/security/cve/CVE-2020-8013/" source="CVE"/>
		<description>
This update for permissions fixes the following issues:

Security issues fixed:

- CVE-2020-8013: Fixed a missing symlink check. Do not follow symlinks that are the final path element (bsc#1163922).
- Fixed a regression where chkstat broke when /proc was not available (bsc#1160764, bsc#1160594).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-28"/>
	<updated date="2020-02-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1160594">SUSE bug 1160594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160764">SUSE bug 1160764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163922">SUSE bug 1163922</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8013/">CVE-2020-8013 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8013">CVE-2020-8013 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594269" comment="permissions-2013.1.7-0.6.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219245" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1203018" ref_url="https://bugzilla.suse.com/1203018" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31252" ref_url="https://www.suse.com/security/cve/CVE-2022-31252/" source="CVE"/>
		<description>
This update for permissions fixes the following issues:

- CVE-2022-31252: Fixed chkstat group controlled paths (bsc#1203018).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-23"/>
	<updated date="2022-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203018">SUSE bug 1203018</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31252/">CVE-2022-31252 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31252">CVE-2022-31252 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993772" comment="permissions-2013.1.7-0.6.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219246" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="938719" ref_url="https://bugzilla.suse.com/938719" source="BUGZILLA"/>
		<reference ref_id="938721" ref_url="https://bugzilla.suse.com/938721" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5589" ref_url="https://www.suse.com/security/cve/CVE-2015-5589/" source="CVE"/>
		<reference ref_id="CVE-2015-5590" ref_url="https://www.suse.com/security/cve/CVE-2015-5590/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001558.html" source="SUSE-SU"/>
		<description>
PHP was updated to fix two security issues.

The following vulnerabilities were fixed:

* CVE-2015-5589: PHP could be crashed when processing an invalid file with the 'phar' extension with a segfault in Phar::convertToData, leading to Denial of Service (DOS) (bsc#938721)
* CVE-2015-5590: PHP could be crashed or have unspecified other impact due to a buffer overlow in phar_fix_filepath (bsc#938719)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-29"/>
	<updated date="2015-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/938719">SUSE bug 938719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938721">SUSE bug 938721</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5589/">CVE-2015-5589 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5589">CVE-2015-5589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5590/">CVE-2015-5590 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5590">CVE-2015-5590 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579405" comment="apache2-mod_php53-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579406" comment="php53-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579407" comment="php53-bcmath-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579408" comment="php53-bz2-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579409" comment="php53-calendar-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579410" comment="php53-ctype-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579411" comment="php53-curl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579412" comment="php53-dba-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579413" comment="php53-dom-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579414" comment="php53-exif-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579415" comment="php53-fastcgi-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579416" comment="php53-fileinfo-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579417" comment="php53-ftp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579418" comment="php53-gd-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579419" comment="php53-gettext-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579420" comment="php53-gmp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579421" comment="php53-iconv-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579422" comment="php53-intl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579423" comment="php53-json-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579424" comment="php53-ldap-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579425" comment="php53-mbstring-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579426" comment="php53-mcrypt-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579427" comment="php53-mysql-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579428" comment="php53-odbc-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579429" comment="php53-openssl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579430" comment="php53-pcntl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579431" comment="php53-pdo-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579432" comment="php53-pear-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579433" comment="php53-pgsql-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579434" comment="php53-pspell-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579435" comment="php53-shmop-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579436" comment="php53-snmp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579437" comment="php53-soap-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579438" comment="php53-suhosin-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579439" comment="php53-sysvmsg-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579440" comment="php53-sysvsem-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579441" comment="php53-sysvshm-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579442" comment="php53-tokenizer-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579443" comment="php53-wddx-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579444" comment="php53-xmlreader-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579445" comment="php53-xmlrpc-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579446" comment="php53-xmlwriter-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579447" comment="php53-xsl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579448" comment="php53-zip-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579449" comment="php53-zlib-5.3.17-45.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579405" comment="apache2-mod_php53-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579406" comment="php53-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579407" comment="php53-bcmath-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579408" comment="php53-bz2-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579409" comment="php53-calendar-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579410" comment="php53-ctype-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579411" comment="php53-curl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579412" comment="php53-dba-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579413" comment="php53-dom-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579414" comment="php53-exif-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579415" comment="php53-fastcgi-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579416" comment="php53-fileinfo-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579417" comment="php53-ftp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579418" comment="php53-gd-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579419" comment="php53-gettext-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579420" comment="php53-gmp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579421" comment="php53-iconv-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579422" comment="php53-intl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579423" comment="php53-json-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579424" comment="php53-ldap-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579425" comment="php53-mbstring-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579426" comment="php53-mcrypt-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579427" comment="php53-mysql-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579428" comment="php53-odbc-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579429" comment="php53-openssl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579430" comment="php53-pcntl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579431" comment="php53-pdo-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579432" comment="php53-pear-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579433" comment="php53-pgsql-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579434" comment="php53-pspell-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579435" comment="php53-shmop-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579436" comment="php53-snmp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579437" comment="php53-soap-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579438" comment="php53-suhosin-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579439" comment="php53-sysvmsg-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579440" comment="php53-sysvsem-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579441" comment="php53-sysvshm-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579442" comment="php53-tokenizer-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579443" comment="php53-wddx-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579444" comment="php53-xmlreader-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579445" comment="php53-xmlrpc-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579446" comment="php53-xmlwriter-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579447" comment="php53-xsl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579448" comment="php53-zip-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579449" comment="php53-zlib-5.3.17-45.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579405" comment="apache2-mod_php53-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579406" comment="php53-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579407" comment="php53-bcmath-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579408" comment="php53-bz2-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579409" comment="php53-calendar-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579410" comment="php53-ctype-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579411" comment="php53-curl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579412" comment="php53-dba-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579413" comment="php53-dom-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579414" comment="php53-exif-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579415" comment="php53-fastcgi-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579416" comment="php53-fileinfo-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579417" comment="php53-ftp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579418" comment="php53-gd-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579419" comment="php53-gettext-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579420" comment="php53-gmp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579421" comment="php53-iconv-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579422" comment="php53-intl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579423" comment="php53-json-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579424" comment="php53-ldap-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579425" comment="php53-mbstring-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579426" comment="php53-mcrypt-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579427" comment="php53-mysql-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579428" comment="php53-odbc-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579429" comment="php53-openssl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579430" comment="php53-pcntl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579431" comment="php53-pdo-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579432" comment="php53-pear-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579433" comment="php53-pgsql-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579434" comment="php53-pspell-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579435" comment="php53-shmop-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579436" comment="php53-snmp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579437" comment="php53-soap-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579438" comment="php53-suhosin-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579439" comment="php53-sysvmsg-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579440" comment="php53-sysvsem-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579441" comment="php53-sysvshm-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579442" comment="php53-tokenizer-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579443" comment="php53-wddx-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579444" comment="php53-xmlreader-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579445" comment="php53-xmlrpc-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579446" comment="php53-xmlwriter-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579447" comment="php53-xsl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579448" comment="php53-zip-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579449" comment="php53-zlib-5.3.17-45.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219247" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="935074" ref_url="https://bugzilla.suse.com/935074" source="BUGZILLA"/>
		<reference ref_id="942291" ref_url="https://bugzilla.suse.com/942291" source="BUGZILLA"/>
		<reference ref_id="942294" ref_url="https://bugzilla.suse.com/942294" source="BUGZILLA"/>
		<reference ref_id="942295" ref_url="https://bugzilla.suse.com/942295" source="BUGZILLA"/>
		<reference ref_id="942296" ref_url="https://bugzilla.suse.com/942296" source="BUGZILLA"/>
		<reference ref_id="945412" ref_url="https://bugzilla.suse.com/945412" source="BUGZILLA"/>
		<reference ref_id="945428" ref_url="https://bugzilla.suse.com/945428" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6831" ref_url="https://www.suse.com/security/cve/CVE-2015-6831/" source="CVE"/>
		<reference ref_id="CVE-2015-6833" ref_url="https://www.suse.com/security/cve/CVE-2015-6833/" source="CVE"/>
		<reference ref_id="CVE-2015-6836" ref_url="https://www.suse.com/security/cve/CVE-2015-6836/" source="CVE"/>
		<reference ref_id="CVE-2015-6837" ref_url="https://www.suse.com/security/cve/CVE-2015-6837/" source="CVE"/>
		<reference ref_id="CVE-2015-6838" ref_url="https://www.suse.com/security/cve/CVE-2015-6838/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001645.html" source="SUSE-SU"/>
		<description>

This update of PHP5 brings several security fixes.

Security fixes:
* CVE-2015-6831: A use after free vulnerability in unserialize() has been fixed which could be used to crash php or potentially execute code. [bnc#942291] [bnc#942294] [bnc#942295]
* CVE-2015-6836: A SOAP serialize_function_call() type confusion leading to remote code execution problem was fixed. [bnc#945428]
* CVE-2015-6837 CVE-2015-6838: Two NULL pointer dereferences in the XSLTProcessor class were fixed. [bnc#945412]

It also includes a bugfix for the odbc module:
* compare with SQL_NULL_DATA correctly [bnc#935074]
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-22"/>
	<updated date="2015-09-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/935074">SUSE bug 935074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942291">SUSE bug 942291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942294">SUSE bug 942294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942295">SUSE bug 942295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942296">SUSE bug 942296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945412">SUSE bug 945412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945428">SUSE bug 945428</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6831/">CVE-2015-6831 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6831">CVE-2015-6831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6833/">CVE-2015-6833 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6833">CVE-2015-6833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6836/">CVE-2015-6836 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6836">CVE-2015-6836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6837/">CVE-2015-6837 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6837">CVE-2015-6837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6838/">CVE-2015-6838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6838">CVE-2015-6838 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579450" comment="apache2-mod_php53-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579451" comment="php53-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579452" comment="php53-bcmath-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579453" comment="php53-bz2-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579454" comment="php53-calendar-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579455" comment="php53-ctype-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579456" comment="php53-curl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579457" comment="php53-dba-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579458" comment="php53-dom-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579459" comment="php53-exif-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579460" comment="php53-fastcgi-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579461" comment="php53-fileinfo-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579462" comment="php53-ftp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579463" comment="php53-gd-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579464" comment="php53-gettext-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579465" comment="php53-gmp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579466" comment="php53-iconv-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579467" comment="php53-intl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579468" comment="php53-json-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579469" comment="php53-ldap-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579470" comment="php53-mbstring-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579471" comment="php53-mcrypt-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579472" comment="php53-mysql-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579473" comment="php53-odbc-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579474" comment="php53-openssl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579475" comment="php53-pcntl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579476" comment="php53-pdo-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579477" comment="php53-pear-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579478" comment="php53-pgsql-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579479" comment="php53-pspell-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579480" comment="php53-shmop-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579481" comment="php53-snmp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579482" comment="php53-soap-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579483" comment="php53-suhosin-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579484" comment="php53-sysvmsg-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579485" comment="php53-sysvsem-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579486" comment="php53-sysvshm-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579487" comment="php53-tokenizer-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579488" comment="php53-wddx-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579489" comment="php53-xmlreader-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579490" comment="php53-xmlrpc-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579491" comment="php53-xmlwriter-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579492" comment="php53-xsl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579493" comment="php53-zip-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579494" comment="php53-zlib-5.3.17-48.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579450" comment="apache2-mod_php53-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579451" comment="php53-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579452" comment="php53-bcmath-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579453" comment="php53-bz2-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579454" comment="php53-calendar-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579455" comment="php53-ctype-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579456" comment="php53-curl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579457" comment="php53-dba-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579458" comment="php53-dom-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579459" comment="php53-exif-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579460" comment="php53-fastcgi-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579461" comment="php53-fileinfo-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579462" comment="php53-ftp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579463" comment="php53-gd-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579464" comment="php53-gettext-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579465" comment="php53-gmp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579466" comment="php53-iconv-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579467" comment="php53-intl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579468" comment="php53-json-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579469" comment="php53-ldap-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579470" comment="php53-mbstring-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579471" comment="php53-mcrypt-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579472" comment="php53-mysql-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579473" comment="php53-odbc-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579474" comment="php53-openssl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579475" comment="php53-pcntl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579476" comment="php53-pdo-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579477" comment="php53-pear-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579478" comment="php53-pgsql-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579479" comment="php53-pspell-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579480" comment="php53-shmop-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579481" comment="php53-snmp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579482" comment="php53-soap-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579483" comment="php53-suhosin-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579484" comment="php53-sysvmsg-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579485" comment="php53-sysvsem-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579486" comment="php53-sysvshm-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579487" comment="php53-tokenizer-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579488" comment="php53-wddx-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579489" comment="php53-xmlreader-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579490" comment="php53-xmlrpc-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579491" comment="php53-xmlwriter-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579492" comment="php53-xsl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579493" comment="php53-zip-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579494" comment="php53-zlib-5.3.17-48.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579450" comment="apache2-mod_php53-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579451" comment="php53-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579452" comment="php53-bcmath-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579453" comment="php53-bz2-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579454" comment="php53-calendar-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579455" comment="php53-ctype-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579456" comment="php53-curl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579457" comment="php53-dba-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579458" comment="php53-dom-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579459" comment="php53-exif-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579460" comment="php53-fastcgi-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579461" comment="php53-fileinfo-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579462" comment="php53-ftp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579463" comment="php53-gd-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579464" comment="php53-gettext-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579465" comment="php53-gmp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579466" comment="php53-iconv-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579467" comment="php53-intl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579468" comment="php53-json-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579469" comment="php53-ldap-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579470" comment="php53-mbstring-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579471" comment="php53-mcrypt-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579472" comment="php53-mysql-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579473" comment="php53-odbc-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579474" comment="php53-openssl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579475" comment="php53-pcntl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579476" comment="php53-pdo-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579477" comment="php53-pear-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579478" comment="php53-pgsql-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579479" comment="php53-pspell-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579480" comment="php53-shmop-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579481" comment="php53-snmp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579482" comment="php53-soap-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579483" comment="php53-suhosin-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579484" comment="php53-sysvmsg-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579485" comment="php53-sysvsem-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579486" comment="php53-sysvshm-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579487" comment="php53-tokenizer-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579488" comment="php53-wddx-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579489" comment="php53-xmlreader-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579490" comment="php53-xmlrpc-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579491" comment="php53-xmlwriter-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579492" comment="php53-xsl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579493" comment="php53-zip-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579494" comment="php53-zlib-5.3.17-48.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219248" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="949961" ref_url="https://bugzilla.suse.com/949961" source="BUGZILLA"/>
		<reference ref_id="968284" ref_url="https://bugzilla.suse.com/968284" source="BUGZILLA"/>
		<reference ref_id="969821" ref_url="https://bugzilla.suse.com/969821" source="BUGZILLA"/>
		<reference ref_id="971611" ref_url="https://bugzilla.suse.com/971611" source="BUGZILLA"/>
		<reference ref_id="971612" ref_url="https://bugzilla.suse.com/971612" source="BUGZILLA"/>
		<reference ref_id="971912" ref_url="https://bugzilla.suse.com/971912" source="BUGZILLA"/>
		<reference ref_id="973351" ref_url="https://bugzilla.suse.com/973351" source="BUGZILLA"/>
		<reference ref_id="973792" ref_url="https://bugzilla.suse.com/973792" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9767" ref_url="https://www.suse.com/security/cve/CVE-2014-9767/" source="CVE"/>
		<reference ref_id="CVE-2015-7803" ref_url="https://www.suse.com/security/cve/CVE-2015-7803/" source="CVE"/>
		<reference ref_id="CVE-2015-8835" ref_url="https://www.suse.com/security/cve/CVE-2015-8835/" source="CVE"/>
		<reference ref_id="CVE-2015-8838" ref_url="https://www.suse.com/security/cve/CVE-2015-8838/" source="CVE"/>
		<reference ref_id="CVE-2016-2554" ref_url="https://www.suse.com/security/cve/CVE-2016-2554/" source="CVE"/>
		<reference ref_id="CVE-2016-3141" ref_url="https://www.suse.com/security/cve/CVE-2016-3141/" source="CVE"/>
		<reference ref_id="CVE-2016-3142" ref_url="https://www.suse.com/security/cve/CVE-2016-3142/" source="CVE"/>
		<reference ref_id="CVE-2016-3185" ref_url="https://www.suse.com/security/cve/CVE-2016-3185/" source="CVE"/>
		<description>

This update for php53 fixes the following issues:

- CVE-2015-8838: mysqlnd was vulnerable to BACKRONYM (bnc#973792).
- CVE-2015-8835: SoapClient s_call method suffered from a type confusion issue that could have lead to crashes [bsc#973351]
- CVE-2016-2554: A NULL pointer dereference in phar_get_fp_offset could lead to crashes. [bsc#968284]
  Note: we do not ship the phar extension currently, so we are not affected.
- CVE-2015-7803: A Stack overflow vulnerability when decompressing tar phar archives could potentially lead to code execution. [bsc#949961]
  Note: we do not ship the phar extension currently, so we are not affected.
- CVE-2016-3141: A use-after-free / double-free in the WDDX
  deserialization could lead to crashes or potential code
  execution. [bsc#969821]
- CVE-2016-3142: An Out-of-bounds read in phar_parse_zipfile() could lead to crashes. [bsc#971912]
  Note: we do not ship the phar extension currently, so we are not affected.
- CVE-2014-9767: A directory traversal when extracting zip files was fixed that could lead to
  overwritten files. [bsc#971612]
- CVE-2016-3185: A type confusion vulnerability in
  make_http_soap_request() could lead to crashes or potentially code
  execution. [bsc#971611]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-25"/>
	<updated date="2016-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/949961">SUSE bug 949961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968284">SUSE bug 968284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969821">SUSE bug 969821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971611">SUSE bug 971611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971612">SUSE bug 971612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971912">SUSE bug 971912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973351">SUSE bug 973351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973792">SUSE bug 973792</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9767/">CVE-2014-9767 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9767">CVE-2014-9767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7803/">CVE-2015-7803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7803">CVE-2015-7803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8835/">CVE-2015-8835 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8835">CVE-2015-8835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8838/">CVE-2015-8838 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8838">CVE-2015-8838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2554/">CVE-2016-2554 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2554">CVE-2016-2554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3141/">CVE-2016-3141 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3141">CVE-2016-3141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3142/">CVE-2016-3142 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3142">CVE-2016-3142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3185/">CVE-2016-3185 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3185">CVE-2016-3185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579495" comment="apache2-mod_php53-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579496" comment="php53-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579497" comment="php53-bcmath-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579498" comment="php53-bz2-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579499" comment="php53-calendar-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579500" comment="php53-ctype-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579501" comment="php53-curl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579502" comment="php53-dba-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579503" comment="php53-dom-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579504" comment="php53-exif-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579505" comment="php53-fastcgi-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579506" comment="php53-fileinfo-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579507" comment="php53-ftp-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579508" comment="php53-gd-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579509" comment="php53-gettext-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579510" comment="php53-gmp-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579511" comment="php53-iconv-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579512" comment="php53-intl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579513" comment="php53-json-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579514" comment="php53-ldap-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579515" comment="php53-mbstring-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579516" comment="php53-mcrypt-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579517" comment="php53-mysql-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579518" comment="php53-odbc-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579519" comment="php53-openssl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579520" comment="php53-pcntl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579521" comment="php53-pdo-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579522" comment="php53-pear-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579523" comment="php53-pgsql-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579524" comment="php53-pspell-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579525" comment="php53-shmop-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579526" comment="php53-snmp-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579527" comment="php53-soap-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579528" comment="php53-suhosin-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579529" comment="php53-sysvmsg-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579530" comment="php53-sysvsem-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579531" comment="php53-sysvshm-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579532" comment="php53-tokenizer-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579533" comment="php53-wddx-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579534" comment="php53-xmlreader-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579535" comment="php53-xmlrpc-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579536" comment="php53-xmlwriter-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579537" comment="php53-xsl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579538" comment="php53-zip-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579539" comment="php53-zlib-5.3.17-59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219249" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="976996" ref_url="https://bugzilla.suse.com/976996" source="BUGZILLA"/>
		<reference ref_id="976997" ref_url="https://bugzilla.suse.com/976997" source="BUGZILLA"/>
		<reference ref_id="977003" ref_url="https://bugzilla.suse.com/977003" source="BUGZILLA"/>
		<reference ref_id="977005" ref_url="https://bugzilla.suse.com/977005" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8866" ref_url="https://www.suse.com/security/cve/CVE-2015-8866/" source="CVE"/>
		<reference ref_id="CVE-2015-8867" ref_url="https://www.suse.com/security/cve/CVE-2015-8867/" source="CVE"/>
		<reference ref_id="CVE-2016-4070" ref_url="https://www.suse.com/security/cve/CVE-2016-4070/" source="CVE"/>
		<reference ref_id="CVE-2016-4073" ref_url="https://www.suse.com/security/cve/CVE-2016-4073/" source="CVE"/>
		<description>
This update for php53 fixes the following security issues:

- CVE-2016-4073: A remote attacker could have caused denial of service, or possibly execute arbitrary code, due to incorrect handling of string length calculations in mb_strcut() (bsc#977003)
- CVE-2015-8867: The PHP function openssl_random_pseudo_bytes() did not return cryptographically secure random bytes (bsc#977005)
- CVE-2016-4070: The libxml_disable_entity_loader() setting was shared between threads, which could have resulted in XML external entity injection and entity expansion issues (bsc#976997)
- CVE-2015-8866: A remote attacker could have caused denial of service due to incorrect handling of large strings in php_raw_url_encode() (bsc#976996)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-17"/>
	<updated date="2016-05-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/976996">SUSE bug 976996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976997">SUSE bug 976997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977003">SUSE bug 977003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977005">SUSE bug 977005</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8866/">CVE-2015-8866 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8866">CVE-2015-8866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8867/">CVE-2015-8867 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8867">CVE-2015-8867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4070/">CVE-2016-4070 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4070">CVE-2016-4070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4073/">CVE-2016-4073 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4073">CVE-2016-4073 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579540" comment="apache2-mod_php53-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579541" comment="php53-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579542" comment="php53-bcmath-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579543" comment="php53-bz2-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579544" comment="php53-calendar-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579545" comment="php53-ctype-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579546" comment="php53-curl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579547" comment="php53-dba-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579548" comment="php53-dom-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579549" comment="php53-exif-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579550" comment="php53-fastcgi-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579551" comment="php53-fileinfo-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579552" comment="php53-ftp-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579553" comment="php53-gd-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579554" comment="php53-gettext-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579555" comment="php53-gmp-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579556" comment="php53-iconv-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579557" comment="php53-intl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579558" comment="php53-json-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579559" comment="php53-ldap-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579560" comment="php53-mbstring-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579561" comment="php53-mcrypt-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579562" comment="php53-mysql-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579563" comment="php53-odbc-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579564" comment="php53-openssl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579565" comment="php53-pcntl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579566" comment="php53-pdo-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579567" comment="php53-pear-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579568" comment="php53-pgsql-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579569" comment="php53-pspell-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579570" comment="php53-shmop-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579571" comment="php53-snmp-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579572" comment="php53-soap-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579573" comment="php53-suhosin-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579574" comment="php53-sysvmsg-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579575" comment="php53-sysvsem-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579576" comment="php53-sysvshm-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579577" comment="php53-tokenizer-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579578" comment="php53-wddx-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579579" comment="php53-xmlreader-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579580" comment="php53-xmlrpc-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579581" comment="php53-xmlwriter-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579582" comment="php53-xsl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579583" comment="php53-zip-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579584" comment="php53-zlib-5.3.17-62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219250" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="949961" ref_url="https://bugzilla.suse.com/949961" source="BUGZILLA"/>
		<reference ref_id="968284" ref_url="https://bugzilla.suse.com/968284" source="BUGZILLA"/>
		<reference ref_id="969821" ref_url="https://bugzilla.suse.com/969821" source="BUGZILLA"/>
		<reference ref_id="971611" ref_url="https://bugzilla.suse.com/971611" source="BUGZILLA"/>
		<reference ref_id="971612" ref_url="https://bugzilla.suse.com/971612" source="BUGZILLA"/>
		<reference ref_id="971912" ref_url="https://bugzilla.suse.com/971912" source="BUGZILLA"/>
		<reference ref_id="973351" ref_url="https://bugzilla.suse.com/973351" source="BUGZILLA"/>
		<reference ref_id="973792" ref_url="https://bugzilla.suse.com/973792" source="BUGZILLA"/>
		<reference ref_id="976996" ref_url="https://bugzilla.suse.com/976996" source="BUGZILLA"/>
		<reference ref_id="976997" ref_url="https://bugzilla.suse.com/976997" source="BUGZILLA"/>
		<reference ref_id="977003" ref_url="https://bugzilla.suse.com/977003" source="BUGZILLA"/>
		<reference ref_id="977005" ref_url="https://bugzilla.suse.com/977005" source="BUGZILLA"/>
		<reference ref_id="977991" ref_url="https://bugzilla.suse.com/977991" source="BUGZILLA"/>
		<reference ref_id="977994" ref_url="https://bugzilla.suse.com/977994" source="BUGZILLA"/>
		<reference ref_id="978827" ref_url="https://bugzilla.suse.com/978827" source="BUGZILLA"/>
		<reference ref_id="978828" ref_url="https://bugzilla.suse.com/978828" source="BUGZILLA"/>
		<reference ref_id="978829" ref_url="https://bugzilla.suse.com/978829" source="BUGZILLA"/>
		<reference ref_id="978830" ref_url="https://bugzilla.suse.com/978830" source="BUGZILLA"/>
		<reference ref_id="980366" ref_url="https://bugzilla.suse.com/980366" source="BUGZILLA"/>
		<reference ref_id="980373" ref_url="https://bugzilla.suse.com/980373" source="BUGZILLA"/>
		<reference ref_id="980375" ref_url="https://bugzilla.suse.com/980375" source="BUGZILLA"/>
		<reference ref_id="981050" ref_url="https://bugzilla.suse.com/981050" source="BUGZILLA"/>
		<reference ref_id="982010" ref_url="https://bugzilla.suse.com/982010" source="BUGZILLA"/>
		<reference ref_id="982011" ref_url="https://bugzilla.suse.com/982011" source="BUGZILLA"/>
		<reference ref_id="982012" ref_url="https://bugzilla.suse.com/982012" source="BUGZILLA"/>
		<reference ref_id="982013" ref_url="https://bugzilla.suse.com/982013" source="BUGZILLA"/>
		<reference ref_id="982162" ref_url="https://bugzilla.suse.com/982162" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9767" ref_url="https://www.suse.com/security/cve/CVE-2014-9767/" source="CVE"/>
		<reference ref_id="CVE-2015-4116" ref_url="https://www.suse.com/security/cve/CVE-2015-4116/" source="CVE"/>
		<reference ref_id="CVE-2015-7803" ref_url="https://www.suse.com/security/cve/CVE-2015-7803/" source="CVE"/>
		<reference ref_id="CVE-2015-8835" ref_url="https://www.suse.com/security/cve/CVE-2015-8835/" source="CVE"/>
		<reference ref_id="CVE-2015-8838" ref_url="https://www.suse.com/security/cve/CVE-2015-8838/" source="CVE"/>
		<reference ref_id="CVE-2015-8866" ref_url="https://www.suse.com/security/cve/CVE-2015-8866/" source="CVE"/>
		<reference ref_id="CVE-2015-8867" ref_url="https://www.suse.com/security/cve/CVE-2015-8867/" source="CVE"/>
		<reference ref_id="CVE-2015-8873" ref_url="https://www.suse.com/security/cve/CVE-2015-8873/" source="CVE"/>
		<reference ref_id="CVE-2015-8874" ref_url="https://www.suse.com/security/cve/CVE-2015-8874/" source="CVE"/>
		<reference ref_id="CVE-2015-8879" ref_url="https://www.suse.com/security/cve/CVE-2015-8879/" source="CVE"/>
		<reference ref_id="CVE-2016-2554" ref_url="https://www.suse.com/security/cve/CVE-2016-2554/" source="CVE"/>
		<reference ref_id="CVE-2016-3141" ref_url="https://www.suse.com/security/cve/CVE-2016-3141/" source="CVE"/>
		<reference ref_id="CVE-2016-3142" ref_url="https://www.suse.com/security/cve/CVE-2016-3142/" source="CVE"/>
		<reference ref_id="CVE-2016-3185" ref_url="https://www.suse.com/security/cve/CVE-2016-3185/" source="CVE"/>
		<reference ref_id="CVE-2016-4070" ref_url="https://www.suse.com/security/cve/CVE-2016-4070/" source="CVE"/>
		<reference ref_id="CVE-2016-4073" ref_url="https://www.suse.com/security/cve/CVE-2016-4073/" source="CVE"/>
		<reference ref_id="CVE-2016-4342" ref_url="https://www.suse.com/security/cve/CVE-2016-4342/" source="CVE"/>
		<reference ref_id="CVE-2016-4346" ref_url="https://www.suse.com/security/cve/CVE-2016-4346/" source="CVE"/>
		<reference ref_id="CVE-2016-4537" ref_url="https://www.suse.com/security/cve/CVE-2016-4537/" source="CVE"/>
		<reference ref_id="CVE-2016-4538" ref_url="https://www.suse.com/security/cve/CVE-2016-4538/" source="CVE"/>
		<reference ref_id="CVE-2016-4539" ref_url="https://www.suse.com/security/cve/CVE-2016-4539/" source="CVE"/>
		<reference ref_id="CVE-2016-4540" ref_url="https://www.suse.com/security/cve/CVE-2016-4540/" source="CVE"/>
		<reference ref_id="CVE-2016-4541" ref_url="https://www.suse.com/security/cve/CVE-2016-4541/" source="CVE"/>
		<reference ref_id="CVE-2016-4542" ref_url="https://www.suse.com/security/cve/CVE-2016-4542/" source="CVE"/>
		<reference ref_id="CVE-2016-4543" ref_url="https://www.suse.com/security/cve/CVE-2016-4543/" source="CVE"/>
		<reference ref_id="CVE-2016-4544" ref_url="https://www.suse.com/security/cve/CVE-2016-4544/" source="CVE"/>
		<reference ref_id="CVE-2016-5093" ref_url="https://www.suse.com/security/cve/CVE-2016-5093/" source="CVE"/>
		<reference ref_id="CVE-2016-5094" ref_url="https://www.suse.com/security/cve/CVE-2016-5094/" source="CVE"/>
		<reference ref_id="CVE-2016-5095" ref_url="https://www.suse.com/security/cve/CVE-2016-5095/" source="CVE"/>
		<reference ref_id="CVE-2016-5096" ref_url="https://www.suse.com/security/cve/CVE-2016-5096/" source="CVE"/>
		<reference ref_id="CVE-2016-5114" ref_url="https://www.suse.com/security/cve/CVE-2016-5114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002115.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following issues:

- CVE-2016-5093: A get_icu_value_internal out-of-bounds read could crash the php interpreter (bsc#982010)
- CVE-2016-5094,CVE-2016-5095: Don't allow creating strings with lengths outside int range, avoids overflows (bsc#982011,bsc#982012)
- CVE-2016-5096: A int/size_t confusion in fread could corrupt memory (bsc#982013)
- CVE-2016-5114: A fpm_log.c memory leak and buffer overflow could leak information out of the php process or overwrite a buffer by 1 byte (bsc#982162)
- CVE-2016-4346: A heap overflow was fixed in ext/standard/string.c (bsc#977994)
- CVE-2016-4342: A heap corruption was fixed in tar/zip/phar parser (bsc#977991)
- CVE-2016-4537, CVE-2016-4538: bcpowmod accepted negative scale causing heap buffer overflow corrupting _one_ definition (bsc#978827)
- CVE-2016-4539: Malformed input causes segmentation fault in xml_parse_into_struct() function (bsc#978828)
- CVE-2016-4540, CVE-2016-4541: Out-of-bounds memory read in zif_grapheme_stripos when given negative offset (bsc#978829)
- CVE-2016-4542, CVE-2016-4543, CVE-2016-4544: Out-of-bounds heap memory
  read in exif_read_data() caused by malformed input (bsc#978830)
- CVE-2015-4116: Use-after-free vulnerability in the spl_ptr_heap_insert
  function  (bsc#980366)
- CVE-2015-8873: Stack consumption vulnerability in Zend/zend_exceptions.c (bsc#980373)
- CVE-2015-8874: Stack consumption vulnerability in GD (bsc#980375)
- CVE-2015-8879: odbc_bindcols function in ext/odbc/php_odbc.c mishandles
  driver behavior for SQL_WVARCHAR (bsc#981050)

Also fixed previously on SUSE Linux Enterprise 11 SP4, but not yet shipped to SUSE Linux Enterprise Server 11 SP3 LTSS:
- CVE-2015-8838: mysqlnd was vulnerable to BACKRONYM (bnc#973792).
- CVE-2015-8835: SoapClient s_call method suffered from a type confusion
  issue that could have lead to crashes [bsc#973351]
- CVE-2016-2554: A NULL pointer dereference in phar_get_fp_offset could
  lead to crashes. [bsc#968284]
- CVE-2015-7803: A Stack overflow vulnerability when decompressing tar
  phar archives could potentially lead to code execution. [bsc#949961]
- CVE-2016-3141: A use-after-free / double-free in the WDDX
  deserialization could lead to crashes or potential code
  execution. [bsc#969821]
- CVE-2016-3142: An Out-of-bounds read in phar_parse_zipfile() could lead to crashes. [bsc#971912]
- CVE-2014-9767: A directory traversal when extracting zip files was
  fixed that could lead to overwritten files. [bsc#971612]
- CVE-2016-3185: A type confusion vulnerability in
  make_http_soap_request() could lead to crashes or potentially code
  execution. [bsc#971611]
- CVE-2016-4073: A remote attacker could have caused denial of service,
  or possibly execute arbitrary code, due to incorrect handling of string
  length calculations in mb_strcut() (bsc#977003)
- CVE-2015-8867: The PHP function openssl_random_pseudo_bytes() did not
  return cryptographically secure random bytes (bsc#977005)
- CVE-2016-4070: The libxml_disable_entity_loader() setting was shared
  between threads, which could have resulted in XML external entity
  injection and entity expansion issues (bsc#976997)
- CVE-2015-8866: A remote attacker could have caused denial of service
  due to incorrect handling of large strings in php_raw_url_encode()
  (bsc#976996)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-14"/>
	<updated date="2016-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/949961">SUSE bug 949961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968284">SUSE bug 968284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969821">SUSE bug 969821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971611">SUSE bug 971611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971612">SUSE bug 971612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971912">SUSE bug 971912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973351">SUSE bug 973351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973792">SUSE bug 973792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976996">SUSE bug 976996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976997">SUSE bug 976997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977003">SUSE bug 977003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977005">SUSE bug 977005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977991">SUSE bug 977991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977994">SUSE bug 977994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978827">SUSE bug 978827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978828">SUSE bug 978828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978829">SUSE bug 978829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978830">SUSE bug 978830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980373">SUSE bug 980373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980375">SUSE bug 980375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981050">SUSE bug 981050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982010">SUSE bug 982010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982011">SUSE bug 982011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982012">SUSE bug 982012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982013">SUSE bug 982013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982162">SUSE bug 982162</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9767/">CVE-2014-9767 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9767">CVE-2014-9767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4116/">CVE-2015-4116 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4116">CVE-2015-4116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7803/">CVE-2015-7803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7803">CVE-2015-7803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8835/">CVE-2015-8835 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8835">CVE-2015-8835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8838/">CVE-2015-8838 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8838">CVE-2015-8838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8866/">CVE-2015-8866 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8866">CVE-2015-8866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8867/">CVE-2015-8867 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8867">CVE-2015-8867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8873/">CVE-2015-8873 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8873">CVE-2015-8873 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8874/">CVE-2015-8874 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8874">CVE-2015-8874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8879/">CVE-2015-8879 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8879">CVE-2015-8879 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2554/">CVE-2016-2554 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2554">CVE-2016-2554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3141/">CVE-2016-3141 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3141">CVE-2016-3141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3142/">CVE-2016-3142 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3142">CVE-2016-3142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3185/">CVE-2016-3185 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3185">CVE-2016-3185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4070/">CVE-2016-4070 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4070">CVE-2016-4070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4073/">CVE-2016-4073 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4073">CVE-2016-4073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4342/">CVE-2016-4342 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4342">CVE-2016-4342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4346/">CVE-2016-4346 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4346">CVE-2016-4346 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4537/">CVE-2016-4537 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4537">CVE-2016-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4538/">CVE-2016-4538 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4538">CVE-2016-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4539/">CVE-2016-4539 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4539">CVE-2016-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4540/">CVE-2016-4540 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4540">CVE-2016-4540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4541/">CVE-2016-4541 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4541">CVE-2016-4541 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4542/">CVE-2016-4542 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4542">CVE-2016-4542 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4543/">CVE-2016-4543 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4543">CVE-2016-4543 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4544/">CVE-2016-4544 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4544">CVE-2016-4544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5093/">CVE-2016-5093 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5093">CVE-2016-5093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5094/">CVE-2016-5094 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5094">CVE-2016-5094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5095/">CVE-2016-5095 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5095">CVE-2016-5095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5096/">CVE-2016-5096 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5096">CVE-2016-5096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5114/">CVE-2016-5114 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5114">CVE-2016-5114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579585" comment="apache2-mod_php53-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579586" comment="php53-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579587" comment="php53-bcmath-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579588" comment="php53-bz2-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579589" comment="php53-calendar-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579590" comment="php53-ctype-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579591" comment="php53-curl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579592" comment="php53-dba-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579593" comment="php53-dom-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579594" comment="php53-exif-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579595" comment="php53-fastcgi-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579596" comment="php53-fileinfo-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579597" comment="php53-ftp-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579598" comment="php53-gd-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579599" comment="php53-gettext-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579600" comment="php53-gmp-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579601" comment="php53-iconv-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579602" comment="php53-intl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579603" comment="php53-json-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579604" comment="php53-ldap-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579605" comment="php53-mbstring-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579606" comment="php53-mcrypt-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579607" comment="php53-mysql-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579608" comment="php53-odbc-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579609" comment="php53-openssl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579610" comment="php53-pcntl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579611" comment="php53-pdo-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579612" comment="php53-pear-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579613" comment="php53-pgsql-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579614" comment="php53-pspell-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579615" comment="php53-shmop-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579616" comment="php53-snmp-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579617" comment="php53-soap-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579618" comment="php53-suhosin-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579619" comment="php53-sysvmsg-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579620" comment="php53-sysvsem-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579621" comment="php53-sysvshm-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579622" comment="php53-tokenizer-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579623" comment="php53-wddx-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579624" comment="php53-xmlreader-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579625" comment="php53-xmlrpc-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579626" comment="php53-xmlwriter-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579627" comment="php53-xsl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579628" comment="php53-zip-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579629" comment="php53-zlib-5.3.17-71.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579585" comment="apache2-mod_php53-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579586" comment="php53-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579587" comment="php53-bcmath-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579588" comment="php53-bz2-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579589" comment="php53-calendar-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579590" comment="php53-ctype-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579591" comment="php53-curl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579592" comment="php53-dba-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579593" comment="php53-dom-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579594" comment="php53-exif-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579595" comment="php53-fastcgi-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579596" comment="php53-fileinfo-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579597" comment="php53-ftp-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579598" comment="php53-gd-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579599" comment="php53-gettext-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579600" comment="php53-gmp-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579601" comment="php53-iconv-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579602" comment="php53-intl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579603" comment="php53-json-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579604" comment="php53-ldap-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579605" comment="php53-mbstring-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579606" comment="php53-mcrypt-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579607" comment="php53-mysql-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579608" comment="php53-odbc-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579609" comment="php53-openssl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579610" comment="php53-pcntl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579611" comment="php53-pdo-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579612" comment="php53-pear-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579613" comment="php53-pgsql-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579614" comment="php53-pspell-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579615" comment="php53-shmop-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579616" comment="php53-snmp-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579617" comment="php53-soap-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579618" comment="php53-suhosin-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579619" comment="php53-sysvmsg-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579620" comment="php53-sysvsem-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579621" comment="php53-sysvshm-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579622" comment="php53-tokenizer-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579623" comment="php53-wddx-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579624" comment="php53-xmlreader-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579625" comment="php53-xmlrpc-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579626" comment="php53-xmlwriter-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579627" comment="php53-xsl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579628" comment="php53-zip-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579629" comment="php53-zlib-5.3.17-71.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219251" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="986004" ref_url="https://bugzilla.suse.com/986004" source="BUGZILLA"/>
		<reference ref_id="986244" ref_url="https://bugzilla.suse.com/986244" source="BUGZILLA"/>
		<reference ref_id="986386" ref_url="https://bugzilla.suse.com/986386" source="BUGZILLA"/>
		<reference ref_id="986388" ref_url="https://bugzilla.suse.com/986388" source="BUGZILLA"/>
		<reference ref_id="986393" ref_url="https://bugzilla.suse.com/986393" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8935" ref_url="https://www.suse.com/security/cve/CVE-2015-8935/" source="CVE"/>
		<reference ref_id="CVE-2016-5766" ref_url="https://www.suse.com/security/cve/CVE-2016-5766/" source="CVE"/>
		<reference ref_id="CVE-2016-5767" ref_url="https://www.suse.com/security/cve/CVE-2016-5767/" source="CVE"/>
		<reference ref_id="CVE-2016-5769" ref_url="https://www.suse.com/security/cve/CVE-2016-5769/" source="CVE"/>
		<reference ref_id="CVE-2016-5772" ref_url="https://www.suse.com/security/cve/CVE-2016-5772/" source="CVE"/>
		<description>
php53 was updated to fix five security issues.

These security issues were fixed:
- CVE-2016-5769: mcrypt: Heap Overflow due to integer overflows (bsc#986388).
- CVE-2015-8935: XSS in header() with Internet Explorer (bsc#986004).
- CVE-2016-5772: Double Free Courruption in wddx_deserialize (bsc#986244).
- CVE-2016-5766: Integer Overflow in _gd2GetHeader() resulting in heap overflow (bsc#986386).
- CVE-2016-5767: Integer Overflow in gdImagePaletteToTrueColor() resulting in heap overflow (bsc#986393).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-09"/>
	<updated date="2016-08-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/986004">SUSE bug 986004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986244">SUSE bug 986244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986386">SUSE bug 986386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986388">SUSE bug 986388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986393">SUSE bug 986393</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8935/">CVE-2015-8935 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8935">CVE-2015-8935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5766/">CVE-2016-5766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5766">CVE-2016-5766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5767/">CVE-2016-5767 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5767">CVE-2016-5767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5769/">CVE-2016-5769 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5769">CVE-2016-5769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5772/">CVE-2016-5772 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5772">CVE-2016-5772 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579630" comment="apache2-mod_php53-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579631" comment="php53-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579632" comment="php53-bcmath-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579633" comment="php53-bz2-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579634" comment="php53-calendar-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579635" comment="php53-ctype-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579636" comment="php53-curl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579637" comment="php53-dba-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579638" comment="php53-dom-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579639" comment="php53-exif-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579640" comment="php53-fastcgi-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579641" comment="php53-fileinfo-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579642" comment="php53-ftp-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579643" comment="php53-gd-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579644" comment="php53-gettext-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579645" comment="php53-gmp-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579646" comment="php53-iconv-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579647" comment="php53-intl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579648" comment="php53-json-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579649" comment="php53-ldap-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579650" comment="php53-mbstring-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579651" comment="php53-mcrypt-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579652" comment="php53-mysql-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579653" comment="php53-odbc-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579654" comment="php53-openssl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579655" comment="php53-pcntl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579656" comment="php53-pdo-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579657" comment="php53-pear-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579658" comment="php53-pgsql-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579659" comment="php53-pspell-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579660" comment="php53-shmop-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579661" comment="php53-snmp-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579662" comment="php53-soap-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579663" comment="php53-suhosin-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579664" comment="php53-sysvmsg-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579665" comment="php53-sysvsem-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579666" comment="php53-sysvshm-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579667" comment="php53-tokenizer-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579668" comment="php53-wddx-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579669" comment="php53-xmlreader-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579670" comment="php53-xmlrpc-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579671" comment="php53-xmlwriter-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579672" comment="php53-xsl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579673" comment="php53-zip-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579674" comment="php53-zlib-5.3.17-74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219252" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="987530" ref_url="https://bugzilla.suse.com/987530" source="BUGZILLA"/>
		<reference ref_id="991426" ref_url="https://bugzilla.suse.com/991426" source="BUGZILLA"/>
		<reference ref_id="991427" ref_url="https://bugzilla.suse.com/991427" source="BUGZILLA"/>
		<reference ref_id="991428" ref_url="https://bugzilla.suse.com/991428" source="BUGZILLA"/>
		<reference ref_id="991429" ref_url="https://bugzilla.suse.com/991429" source="BUGZILLA"/>
		<reference ref_id="991430" ref_url="https://bugzilla.suse.com/991430" source="BUGZILLA"/>
		<reference ref_id="991433" ref_url="https://bugzilla.suse.com/991433" source="BUGZILLA"/>
		<reference ref_id="991437" ref_url="https://bugzilla.suse.com/991437" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3587" ref_url="https://www.suse.com/security/cve/CVE-2014-3587/" source="CVE"/>
		<reference ref_id="CVE-2016-5399" ref_url="https://www.suse.com/security/cve/CVE-2016-5399/" source="CVE"/>
		<reference ref_id="CVE-2016-6288" ref_url="https://www.suse.com/security/cve/CVE-2016-6288/" source="CVE"/>
		<reference ref_id="CVE-2016-6289" ref_url="https://www.suse.com/security/cve/CVE-2016-6289/" source="CVE"/>
		<reference ref_id="CVE-2016-6290" ref_url="https://www.suse.com/security/cve/CVE-2016-6290/" source="CVE"/>
		<reference ref_id="CVE-2016-6291" ref_url="https://www.suse.com/security/cve/CVE-2016-6291/" source="CVE"/>
		<reference ref_id="CVE-2016-6296" ref_url="https://www.suse.com/security/cve/CVE-2016-6296/" source="CVE"/>
		<reference ref_id="CVE-2016-6297" ref_url="https://www.suse.com/security/cve/CVE-2016-6297/" source="CVE"/>
		<description>

This update for php53 fixes the following issues:

- security update:
  * CVE-2014-3587: Integer overflow in the cdf_read_property_info affecting SLES11 SP3 [bsc#987530]
  * CVE-2016-6297: Stack-based buffer overflow vulnerability in php_stream_zip_opener [bsc#991426]
  * CVE-2016-6291: Out-of-bounds access in exif_process_IFD_in_MAKERNOTE [bsc#991427]
  * CVE-2016-6289: Integer overflow leads to buffer overflow in virtual_file_ex [bsc#991428]
  * CVE-2016-6290: Use after free in unserialize() with Unexpected Session Deserialization [bsc#991429]
  * CVE-2016-5399: Improper error handling in bzread() [bsc#991430]
  * CVE-2016-6288: Buffer over-read in php_url_parse_ex [bsc#991433]
  * CVE-2016-6296: Heap buffer overflow vulnerability in simplestring_addn in simplestring.c [bsc#991437]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-01"/>
	<updated date="2016-09-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/987530">SUSE bug 987530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991426">SUSE bug 991426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991427">SUSE bug 991427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991428">SUSE bug 991428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991429">SUSE bug 991429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991430">SUSE bug 991430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991433">SUSE bug 991433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991437">SUSE bug 991437</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3587/">CVE-2014-3587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3587">CVE-2014-3587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5399/">CVE-2016-5399 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5399">CVE-2016-5399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6288/">CVE-2016-6288 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6288">CVE-2016-6288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6289/">CVE-2016-6289 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6289">CVE-2016-6289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6290/">CVE-2016-6290 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6290">CVE-2016-6290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6291/">CVE-2016-6291 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6291">CVE-2016-6291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6296/">CVE-2016-6296 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6296">CVE-2016-6296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6297/">CVE-2016-6297 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6297">CVE-2016-6297 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579675" comment="apache2-mod_php53-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579676" comment="php53-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579677" comment="php53-bcmath-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579678" comment="php53-bz2-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579679" comment="php53-calendar-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579680" comment="php53-ctype-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579681" comment="php53-curl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579682" comment="php53-dba-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579683" comment="php53-dom-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579684" comment="php53-exif-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579685" comment="php53-fastcgi-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579686" comment="php53-fileinfo-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579687" comment="php53-ftp-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579688" comment="php53-gd-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579689" comment="php53-gettext-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579690" comment="php53-gmp-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579691" comment="php53-iconv-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579692" comment="php53-intl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579693" comment="php53-json-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579694" comment="php53-ldap-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579695" comment="php53-mbstring-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579696" comment="php53-mcrypt-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579697" comment="php53-mysql-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579698" comment="php53-odbc-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579699" comment="php53-openssl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579700" comment="php53-pcntl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579701" comment="php53-pdo-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579702" comment="php53-pear-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579703" comment="php53-pgsql-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579704" comment="php53-pspell-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579705" comment="php53-shmop-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579706" comment="php53-snmp-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579707" comment="php53-soap-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579708" comment="php53-suhosin-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579709" comment="php53-sysvmsg-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579710" comment="php53-sysvsem-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579711" comment="php53-sysvshm-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579712" comment="php53-tokenizer-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579713" comment="php53-wddx-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579714" comment="php53-xmlreader-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579715" comment="php53-xmlrpc-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579716" comment="php53-xmlwriter-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579717" comment="php53-xsl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579718" comment="php53-zip-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579719" comment="php53-zlib-5.3.17-79.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219253" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="997206" ref_url="https://bugzilla.suse.com/997206" source="BUGZILLA"/>
		<reference ref_id="997207" ref_url="https://bugzilla.suse.com/997207" source="BUGZILLA"/>
		<reference ref_id="997208" ref_url="https://bugzilla.suse.com/997208" source="BUGZILLA"/>
		<reference ref_id="997210" ref_url="https://bugzilla.suse.com/997210" source="BUGZILLA"/>
		<reference ref_id="997211" ref_url="https://bugzilla.suse.com/997211" source="BUGZILLA"/>
		<reference ref_id="997220" ref_url="https://bugzilla.suse.com/997220" source="BUGZILLA"/>
		<reference ref_id="997225" ref_url="https://bugzilla.suse.com/997225" source="BUGZILLA"/>
		<reference ref_id="997230" ref_url="https://bugzilla.suse.com/997230" source="BUGZILLA"/>
		<reference ref_id="997257" ref_url="https://bugzilla.suse.com/997257" source="BUGZILLA"/>
		<reference ref_id="999679" ref_url="https://bugzilla.suse.com/999679" source="BUGZILLA"/>
		<reference ref_id="999680" ref_url="https://bugzilla.suse.com/999680" source="BUGZILLA"/>
		<reference ref_id="999682" ref_url="https://bugzilla.suse.com/999682" source="BUGZILLA"/>
		<reference ref_id="999684" ref_url="https://bugzilla.suse.com/999684" source="BUGZILLA"/>
		<reference ref_id="999685" ref_url="https://bugzilla.suse.com/999685" source="BUGZILLA"/>
		<reference ref_id="999819" ref_url="https://bugzilla.suse.com/999819" source="BUGZILLA"/>
		<reference ref_id="999820" ref_url="https://bugzilla.suse.com/999820" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7124" ref_url="https://www.suse.com/security/cve/CVE-2016-7124/" source="CVE"/>
		<reference ref_id="CVE-2016-7125" ref_url="https://www.suse.com/security/cve/CVE-2016-7125/" source="CVE"/>
		<reference ref_id="CVE-2016-7126" ref_url="https://www.suse.com/security/cve/CVE-2016-7126/" source="CVE"/>
		<reference ref_id="CVE-2016-7127" ref_url="https://www.suse.com/security/cve/CVE-2016-7127/" source="CVE"/>
		<reference ref_id="CVE-2016-7128" ref_url="https://www.suse.com/security/cve/CVE-2016-7128/" source="CVE"/>
		<reference ref_id="CVE-2016-7129" ref_url="https://www.suse.com/security/cve/CVE-2016-7129/" source="CVE"/>
		<reference ref_id="CVE-2016-7130" ref_url="https://www.suse.com/security/cve/CVE-2016-7130/" source="CVE"/>
		<reference ref_id="CVE-2016-7131" ref_url="https://www.suse.com/security/cve/CVE-2016-7131/" source="CVE"/>
		<reference ref_id="CVE-2016-7132" ref_url="https://www.suse.com/security/cve/CVE-2016-7132/" source="CVE"/>
		<reference ref_id="CVE-2016-7411" ref_url="https://www.suse.com/security/cve/CVE-2016-7411/" source="CVE"/>
		<reference ref_id="CVE-2016-7412" ref_url="https://www.suse.com/security/cve/CVE-2016-7412/" source="CVE"/>
		<reference ref_id="CVE-2016-7413" ref_url="https://www.suse.com/security/cve/CVE-2016-7413/" source="CVE"/>
		<reference ref_id="CVE-2016-7414" ref_url="https://www.suse.com/security/cve/CVE-2016-7414/" source="CVE"/>
		<reference ref_id="CVE-2016-7416" ref_url="https://www.suse.com/security/cve/CVE-2016-7416/" source="CVE"/>
		<reference ref_id="CVE-2016-7417" ref_url="https://www.suse.com/security/cve/CVE-2016-7417/" source="CVE"/>
		<reference ref_id="CVE-2016-7418" ref_url="https://www.suse.com/security/cve/CVE-2016-7418/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002310.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following security issues:

* CVE-2016-7124: Create an Unexpected Object and Don't Invoke __wakeup() in Deserialization
* CVE-2016-7125: PHP Session Data Injection Vulnerability
* CVE-2016-7126: select_colors write out-of-bounds
* CVE-2016-7127: imagegammacorrect allowed arbitrary write access
* CVE-2016-7128: Memory Leakage In exif_process_IFD_in_TIFF
* CVE-2016-7129: wddx_deserialize allows illegal memory access
* CVE-2016-7130: wddx_deserialize null dereference
* CVE-2016-7131: wddx_deserialize null dereference with invalid xml
* CVE-2016-7132: wddx_deserialize null dereference in php_wddx_pop_element
* CVE-2016-7411: php5: Memory corruption when destructing deserialized object
* CVE-2016-7412: Heap overflow in mysqlnd when not receiving UNSIGNED_FLAG in BIT field
* CVE-2016-7413: Use after free in wddx_deserialize
* CVE-2016-7414: Out of bounds heap read when verifying signature of zip phar in phar_parse_zipfile
* CVE-2016-7416: Stack based buffer overflow in msgfmt_format_message
* CVE-2016-7417: Missing type check when unserializing SplArray
* CVE-2016-7418: Null pointer dereference in php_wddx_push_element
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-05"/>
	<updated date="2016-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/997206">SUSE bug 997206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997207">SUSE bug 997207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997208">SUSE bug 997208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997210">SUSE bug 997210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997211">SUSE bug 997211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997220">SUSE bug 997220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997225">SUSE bug 997225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997230">SUSE bug 997230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997257">SUSE bug 997257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999679">SUSE bug 999679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999680">SUSE bug 999680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999682">SUSE bug 999682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999684">SUSE bug 999684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999685">SUSE bug 999685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999819">SUSE bug 999819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999820">SUSE bug 999820</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7124/">CVE-2016-7124 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7124">CVE-2016-7124 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-7125/">CVE-2016-7125 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7125">CVE-2016-7125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7126/">CVE-2016-7126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7126">CVE-2016-7126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7127/">CVE-2016-7127 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7127">CVE-2016-7127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7128/">CVE-2016-7128 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7128">CVE-2016-7128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7129/">CVE-2016-7129 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7129">CVE-2016-7129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7130/">CVE-2016-7130 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7130">CVE-2016-7130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7131/">CVE-2016-7131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7131">CVE-2016-7131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7132/">CVE-2016-7132 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7132">CVE-2016-7132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7411/">CVE-2016-7411 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7411">CVE-2016-7411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7412/">CVE-2016-7412 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7412">CVE-2016-7412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7413/">CVE-2016-7413 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7413">CVE-2016-7413 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7414/">CVE-2016-7414 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7414">CVE-2016-7414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7416/">CVE-2016-7416 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7416">CVE-2016-7416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7417/">CVE-2016-7417 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7417">CVE-2016-7417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7418/">CVE-2016-7418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7418">CVE-2016-7418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579720" comment="apache2-mod_php53-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579721" comment="php53-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579722" comment="php53-bcmath-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579723" comment="php53-bz2-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579724" comment="php53-calendar-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579725" comment="php53-ctype-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579726" comment="php53-curl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579727" comment="php53-dba-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579728" comment="php53-dom-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579729" comment="php53-exif-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579730" comment="php53-fastcgi-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579731" comment="php53-fileinfo-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579732" comment="php53-ftp-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579733" comment="php53-gd-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579734" comment="php53-gettext-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579735" comment="php53-gmp-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579736" comment="php53-iconv-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579737" comment="php53-intl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579738" comment="php53-json-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579739" comment="php53-ldap-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579740" comment="php53-mbstring-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579741" comment="php53-mcrypt-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579742" comment="php53-mysql-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579743" comment="php53-odbc-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579744" comment="php53-openssl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579745" comment="php53-pcntl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579746" comment="php53-pdo-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579747" comment="php53-pear-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579748" comment="php53-pgsql-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579749" comment="php53-pspell-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579750" comment="php53-shmop-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579751" comment="php53-snmp-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579752" comment="php53-soap-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579753" comment="php53-suhosin-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579754" comment="php53-sysvmsg-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579755" comment="php53-sysvsem-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579756" comment="php53-sysvshm-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579757" comment="php53-tokenizer-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579758" comment="php53-wddx-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579759" comment="php53-xmlreader-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579760" comment="php53-xmlrpc-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579761" comment="php53-xmlwriter-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579762" comment="php53-xsl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579763" comment="php53-zip-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579764" comment="php53-zlib-5.3.17-84.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579720" comment="apache2-mod_php53-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579721" comment="php53-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579722" comment="php53-bcmath-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579723" comment="php53-bz2-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579724" comment="php53-calendar-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579725" comment="php53-ctype-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579726" comment="php53-curl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579727" comment="php53-dba-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579728" comment="php53-dom-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579729" comment="php53-exif-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579730" comment="php53-fastcgi-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579731" comment="php53-fileinfo-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579732" comment="php53-ftp-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579733" comment="php53-gd-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579734" comment="php53-gettext-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579735" comment="php53-gmp-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579736" comment="php53-iconv-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579737" comment="php53-intl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579738" comment="php53-json-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579739" comment="php53-ldap-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579740" comment="php53-mbstring-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579741" comment="php53-mcrypt-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579742" comment="php53-mysql-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579743" comment="php53-odbc-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579744" comment="php53-openssl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579745" comment="php53-pcntl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579746" comment="php53-pdo-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579747" comment="php53-pear-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579748" comment="php53-pgsql-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579749" comment="php53-pspell-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579750" comment="php53-shmop-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579751" comment="php53-snmp-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579752" comment="php53-soap-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579753" comment="php53-suhosin-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579754" comment="php53-sysvmsg-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579755" comment="php53-sysvsem-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579756" comment="php53-sysvshm-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579757" comment="php53-tokenizer-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579758" comment="php53-wddx-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579759" comment="php53-xmlreader-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579760" comment="php53-xmlrpc-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579761" comment="php53-xmlwriter-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579762" comment="php53-xsl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579763" comment="php53-zip-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579764" comment="php53-zlib-5.3.17-84.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219254" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1004924" ref_url="https://bugzilla.suse.com/1004924" source="BUGZILLA"/>
		<reference ref_id="1005274" ref_url="https://bugzilla.suse.com/1005274" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6911" ref_url="https://www.suse.com/security/cve/CVE-2016-6911/" source="CVE"/>
		<reference ref_id="CVE-2016-8670" ref_url="https://www.suse.com/security/cve/CVE-2016-8670/" source="CVE"/>
		<description>

This update for php53 fixes the following issues:

- CVE-2016-8670: Stack Buffer Overflow in GD dynamicGetbuf (bsc#1004924)
- CVE-2016-6911: Check for out-of-bound read in dynamicGetbuf() (bsc#1005274)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-31"/>
	<updated date="2016-10-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1004924">SUSE bug 1004924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005274">SUSE bug 1005274</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6911/">CVE-2016-6911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6911">CVE-2016-6911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8670/">CVE-2016-8670 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8670">CVE-2016-8670 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579765" comment="apache2-mod_php53-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579766" comment="php53-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579767" comment="php53-bcmath-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579768" comment="php53-bz2-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579769" comment="php53-calendar-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579770" comment="php53-ctype-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579771" comment="php53-curl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579772" comment="php53-dba-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579773" comment="php53-dom-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579774" comment="php53-exif-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579775" comment="php53-fastcgi-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579776" comment="php53-fileinfo-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579777" comment="php53-ftp-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579778" comment="php53-gd-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579779" comment="php53-gettext-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579780" comment="php53-gmp-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579781" comment="php53-iconv-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579782" comment="php53-intl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579783" comment="php53-json-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579784" comment="php53-ldap-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579785" comment="php53-mbstring-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579786" comment="php53-mcrypt-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579787" comment="php53-mysql-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579788" comment="php53-odbc-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579789" comment="php53-openssl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579790" comment="php53-pcntl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579791" comment="php53-pdo-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579792" comment="php53-pear-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579793" comment="php53-pgsql-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579794" comment="php53-pspell-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579795" comment="php53-shmop-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579796" comment="php53-snmp-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579797" comment="php53-soap-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579798" comment="php53-suhosin-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579799" comment="php53-sysvmsg-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579800" comment="php53-sysvsem-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579801" comment="php53-sysvshm-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579802" comment="php53-tokenizer-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579803" comment="php53-wddx-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579804" comment="php53-xmlreader-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579805" comment="php53-xmlrpc-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579806" comment="php53-xmlwriter-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579807" comment="php53-xsl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579808" comment="php53-zip-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579809" comment="php53-zlib-5.3.17-87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219255" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1012232" ref_url="https://bugzilla.suse.com/1012232" source="BUGZILLA"/>
		<reference ref_id="1015187" ref_url="https://bugzilla.suse.com/1015187" source="BUGZILLA"/>
		<reference ref_id="1015188" ref_url="https://bugzilla.suse.com/1015188" source="BUGZILLA"/>
		<reference ref_id="1015189" ref_url="https://bugzilla.suse.com/1015189" source="BUGZILLA"/>
		<reference ref_id="974305" ref_url="https://bugzilla.suse.com/974305" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9912" ref_url="https://www.suse.com/security/cve/CVE-2014-9912/" source="CVE"/>
		<reference ref_id="CVE-2016-9933" ref_url="https://www.suse.com/security/cve/CVE-2016-9933/" source="CVE"/>
		<reference ref_id="CVE-2016-9934" ref_url="https://www.suse.com/security/cve/CVE-2016-9934/" source="CVE"/>
		<reference ref_id="CVE-2016-9935" ref_url="https://www.suse.com/security/cve/CVE-2016-9935/" source="CVE"/>
		<description>

This update for php53 fixes the following issues:

* CVE-2014-9912: Stack-based buffer overflow in uloc_getDisplayName() [bsc#1012232]
* CVE-2016-9933: Possible stack overflow on truecolor images handling [bsc#1015187]
* CVE-2016-9934: Dereference from NULL pointer could lead to crash [bsc#1015188]
* CVE-2016-9935: Invalid read could lead to crash [bsc#1015189]
* Buffer overflow in libmagic, allowing attackers to crash the PHP interpreter [bsc#974305]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1012232">SUSE bug 1012232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015187">SUSE bug 1015187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015188">SUSE bug 1015188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015189">SUSE bug 1015189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974305">SUSE bug 974305</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9912/">CVE-2014-9912 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9912">CVE-2014-9912 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9933/">CVE-2016-9933 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9933">CVE-2016-9933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9934/">CVE-2016-9934 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9934">CVE-2016-9934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9935/">CVE-2016-9935 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9935">CVE-2016-9935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579810" comment="apache2-mod_php53-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579811" comment="php53-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579812" comment="php53-bcmath-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579813" comment="php53-bz2-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579814" comment="php53-calendar-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579815" comment="php53-ctype-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579816" comment="php53-curl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579817" comment="php53-dba-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579818" comment="php53-dom-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579819" comment="php53-exif-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579820" comment="php53-fastcgi-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579821" comment="php53-fileinfo-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579822" comment="php53-ftp-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579823" comment="php53-gd-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579824" comment="php53-gettext-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579825" comment="php53-gmp-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579826" comment="php53-iconv-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579827" comment="php53-intl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579828" comment="php53-json-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579829" comment="php53-ldap-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579830" comment="php53-mbstring-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579831" comment="php53-mcrypt-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579832" comment="php53-mysql-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579833" comment="php53-odbc-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579834" comment="php53-openssl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579835" comment="php53-pcntl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579836" comment="php53-pdo-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579837" comment="php53-pear-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579838" comment="php53-pgsql-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579839" comment="php53-pspell-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579840" comment="php53-shmop-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579841" comment="php53-snmp-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579842" comment="php53-soap-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579843" comment="php53-suhosin-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579844" comment="php53-sysvmsg-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579845" comment="php53-sysvsem-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579846" comment="php53-sysvshm-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579847" comment="php53-tokenizer-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579848" comment="php53-wddx-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579849" comment="php53-xmlreader-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579850" comment="php53-xmlrpc-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579851" comment="php53-xmlwriter-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579852" comment="php53-xsl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579853" comment="php53-zip-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579854" comment="php53-zlib-5.3.17-94.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219256" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1019550" ref_url="https://bugzilla.suse.com/1019550" source="BUGZILLA"/>
		<reference ref_id="1022219" ref_url="https://bugzilla.suse.com/1022219" source="BUGZILLA"/>
		<reference ref_id="1022255" ref_url="https://bugzilla.suse.com/1022255" source="BUGZILLA"/>
		<reference ref_id="1022257" ref_url="https://bugzilla.suse.com/1022257" source="BUGZILLA"/>
		<reference ref_id="1022260" ref_url="https://bugzilla.suse.com/1022260" source="BUGZILLA"/>
		<reference ref_id="1022263" ref_url="https://bugzilla.suse.com/1022263" source="BUGZILLA"/>
		<reference ref_id="1022264" ref_url="https://bugzilla.suse.com/1022264" source="BUGZILLA"/>
		<reference ref_id="1022265" ref_url="https://bugzilla.suse.com/1022265" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10158" ref_url="https://www.suse.com/security/cve/CVE-2016-10158/" source="CVE"/>
		<reference ref_id="CVE-2016-10159" ref_url="https://www.suse.com/security/cve/CVE-2016-10159/" source="CVE"/>
		<reference ref_id="CVE-2016-10160" ref_url="https://www.suse.com/security/cve/CVE-2016-10160/" source="CVE"/>
		<reference ref_id="CVE-2016-10161" ref_url="https://www.suse.com/security/cve/CVE-2016-10161/" source="CVE"/>
		<reference ref_id="CVE-2016-10166" ref_url="https://www.suse.com/security/cve/CVE-2016-10166/" source="CVE"/>
		<reference ref_id="CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167/" source="CVE"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-7478" ref_url="https://www.suse.com/security/cve/CVE-2016-7478/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002664.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following security issues:

- CVE-2016-7478: When unserializing untrusted input data, PHP could end up in an infinite
  loop, causing denial of service (bsc#1019550)
- CVE-2016-10158: The exif_convert_any_to_int function in ext/exif/exif.c
  in PHP allowed remote attackers to cause a denial of service (application
  crash) via crafted EXIF data that triggers an attempt to divide the
  minimum representable negative integer by -1.  (bsc#1022219)
- CVE-2016-10159: Integer overflow in the phar_parse_pharfile function
  in ext/phar/phar.c in PHP allowed remote attackers to cause a denial
  of service (memory consumption or application crash) via a truncated
  manifest entry in a PHAR archive. (bsc#1022255)
- CVE-2016-10160: Off-by-one error in the phar_parse_pharfile function
  in ext/phar/phar.c in PHP allowed remote attackers to cause a denial
  of service (memory corruption) or possibly execute arbitrary code via
  a crafted PHAR archive with an alias mismatch. (bsc#1022257)
- CVE-2016-10161: The object_common1 function in
  ext/standard/var_unserializer.c in PHP allowed remote attackers to
  cause a denial of service (buffer over-read and application crash) via
  crafted serialized data that is mishandled in a finish_nested_data call.
  (bsc#1022260)
- CVE-2016-10166: A potential unsigned underflow in gd interpolation
  functions could lead to memory corruption in the PHP gd module
  (bsc#1022263)
- CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx()
  could lead to php out of memory even on small files. (bsc#1022264)
- CVE-2016-10168: A signed integer overflow in the gd module could lead
  to memory corruption (bsc#1022265)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-27"/>
	<updated date="2017-02-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1019550">SUSE bug 1019550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022219">SUSE bug 1022219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022255">SUSE bug 1022255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022257">SUSE bug 1022257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022260">SUSE bug 1022260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022263">SUSE bug 1022263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022264">SUSE bug 1022264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022265">SUSE bug 1022265</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10158/">CVE-2016-10158 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10158">CVE-2016-10158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10159/">CVE-2016-10159 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10159">CVE-2016-10159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10160/">CVE-2016-10160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10160">CVE-2016-10160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10161/">CVE-2016-10161 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10161">CVE-2016-10161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10166/">CVE-2016-10166 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10166">CVE-2016-10166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10167">CVE-2016-10167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10168">CVE-2016-10168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7478/">CVE-2016-7478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7478">CVE-2016-7478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579855" comment="apache2-mod_php53-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579856" comment="php53-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579857" comment="php53-bcmath-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579858" comment="php53-bz2-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579859" comment="php53-calendar-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579860" comment="php53-ctype-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579861" comment="php53-curl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579862" comment="php53-dba-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579863" comment="php53-dom-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579864" comment="php53-exif-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579865" comment="php53-fastcgi-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579866" comment="php53-fileinfo-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579867" comment="php53-ftp-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579868" comment="php53-gd-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579869" comment="php53-gettext-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579870" comment="php53-gmp-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579871" comment="php53-iconv-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579872" comment="php53-intl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579873" comment="php53-json-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579874" comment="php53-ldap-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579875" comment="php53-mbstring-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579876" comment="php53-mcrypt-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579877" comment="php53-mysql-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579878" comment="php53-odbc-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579879" comment="php53-openssl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579880" comment="php53-pcntl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579881" comment="php53-pdo-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579882" comment="php53-pear-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579883" comment="php53-pgsql-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579884" comment="php53-pspell-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579885" comment="php53-shmop-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579886" comment="php53-snmp-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579887" comment="php53-soap-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579888" comment="php53-suhosin-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579889" comment="php53-sysvmsg-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579890" comment="php53-sysvsem-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579891" comment="php53-sysvshm-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579892" comment="php53-tokenizer-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579893" comment="php53-wddx-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579894" comment="php53-xmlreader-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579895" comment="php53-xmlrpc-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579896" comment="php53-xmlwriter-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579897" comment="php53-xsl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579898" comment="php53-zip-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579899" comment="php53-zlib-5.3.17-101.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579855" comment="apache2-mod_php53-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579856" comment="php53-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579857" comment="php53-bcmath-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579858" comment="php53-bz2-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579859" comment="php53-calendar-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579860" comment="php53-ctype-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579861" comment="php53-curl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579862" comment="php53-dba-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579863" comment="php53-dom-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579864" comment="php53-exif-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579865" comment="php53-fastcgi-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579866" comment="php53-fileinfo-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579867" comment="php53-ftp-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579868" comment="php53-gd-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579869" comment="php53-gettext-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579870" comment="php53-gmp-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579871" comment="php53-iconv-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579872" comment="php53-intl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579873" comment="php53-json-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579874" comment="php53-ldap-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579875" comment="php53-mbstring-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579876" comment="php53-mcrypt-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579877" comment="php53-mysql-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579878" comment="php53-odbc-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579879" comment="php53-openssl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579880" comment="php53-pcntl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579881" comment="php53-pdo-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579882" comment="php53-pear-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579883" comment="php53-pgsql-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579884" comment="php53-pspell-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579885" comment="php53-shmop-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579886" comment="php53-snmp-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579887" comment="php53-soap-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579888" comment="php53-suhosin-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579889" comment="php53-sysvmsg-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579890" comment="php53-sysvsem-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579891" comment="php53-sysvshm-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579892" comment="php53-tokenizer-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579893" comment="php53-wddx-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579894" comment="php53-xmlreader-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579895" comment="php53-xmlrpc-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579896" comment="php53-xmlwriter-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579897" comment="php53-xsl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579898" comment="php53-zip-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579899" comment="php53-zlib-5.3.17-101.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219257" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1031246" ref_url="https://bugzilla.suse.com/1031246" source="BUGZILLA"/>
		<reference ref_id="1035111" ref_url="https://bugzilla.suse.com/1035111" source="BUGZILLA"/>
		<reference ref_id="1040883" ref_url="https://bugzilla.suse.com/1040883" source="BUGZILLA"/>
		<reference ref_id="1040889" ref_url="https://bugzilla.suse.com/1040889" source="BUGZILLA"/>
		<reference ref_id="1040891" ref_url="https://bugzilla.suse.com/1040891" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6294" ref_url="https://www.suse.com/security/cve/CVE-2016-6294/" source="CVE"/>
		<reference ref_id="CVE-2017-7272" ref_url="https://www.suse.com/security/cve/CVE-2017-7272/" source="CVE"/>
		<reference ref_id="CVE-2017-9224" ref_url="https://www.suse.com/security/cve/CVE-2017-9224/" source="CVE"/>
		<reference ref_id="CVE-2017-9226" ref_url="https://www.suse.com/security/cve/CVE-2017-9226/" source="CVE"/>
		<reference ref_id="CVE-2017-9227" ref_url="https://www.suse.com/security/cve/CVE-2017-9227/" source="CVE"/>
		<description>

This update for php53 fixes the following issues:

This security issue was fixed:

- CVE-2017-7272: PHP enabled potential SSRF in applications that accept an fsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax was recognized, fsockopen used the port number that is specified in the hostname argument, instead of the port number in the second argument of the function (bsc#1031246)
- CVE-2016-6294: The locale_accept_from_http function in ext/intl/locale/locale_methods.c did not properly restrict calls to the ICU uloc_acceptLanguageFromHTTP function, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long argument (bsc#1035111).
- CVE-2017-9227: An issue was discovered in Oniguruma 6.2.0, as used in mbstring in PHP. A stack out-of-bounds read occurs in mbc_enc_len() during regular expression searching. Invalid handling of reg-&gt;dmin in forward_search_range() could result in an invalid pointer dereference, as an out-of-bounds read from a stack buffer. (bsc#1040883)
- CVE-2017-9226: An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in mbstring in PHP. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption. (bsc#1040889)
- CVE-2017-9224: An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in mbstring in PHP. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer. (bsc#1040891)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-16"/>
	<updated date="2017-06-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1031246">SUSE bug 1031246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035111">SUSE bug 1035111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040883">SUSE bug 1040883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040889">SUSE bug 1040889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040891">SUSE bug 1040891</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6294/">CVE-2016-6294 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6294">CVE-2016-6294 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7272/">CVE-2017-7272 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7272">CVE-2017-7272 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9224/">CVE-2017-9224 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9224">CVE-2017-9224 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9226/">CVE-2017-9226 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9226">CVE-2017-9226 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9227/">CVE-2017-9227 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9227">CVE-2017-9227 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579900" comment="apache2-mod_php53-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579901" comment="php53-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579902" comment="php53-bcmath-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579903" comment="php53-bz2-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579904" comment="php53-calendar-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579905" comment="php53-ctype-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579906" comment="php53-curl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579907" comment="php53-dba-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579908" comment="php53-dom-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579909" comment="php53-exif-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579910" comment="php53-fastcgi-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579911" comment="php53-fileinfo-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579912" comment="php53-ftp-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579913" comment="php53-gd-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579914" comment="php53-gettext-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579915" comment="php53-gmp-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579916" comment="php53-iconv-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579917" comment="php53-intl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579918" comment="php53-json-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579919" comment="php53-ldap-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579920" comment="php53-mbstring-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579921" comment="php53-mcrypt-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579922" comment="php53-mysql-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579923" comment="php53-odbc-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579924" comment="php53-openssl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579925" comment="php53-pcntl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579926" comment="php53-pdo-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579927" comment="php53-pear-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579928" comment="php53-pgsql-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579929" comment="php53-pspell-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579930" comment="php53-shmop-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579931" comment="php53-snmp-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579932" comment="php53-soap-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579933" comment="php53-suhosin-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579934" comment="php53-sysvmsg-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579935" comment="php53-sysvsem-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579936" comment="php53-sysvshm-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579937" comment="php53-tokenizer-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579938" comment="php53-wddx-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579939" comment="php53-xmlreader-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579940" comment="php53-xmlrpc-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579941" comment="php53-xmlwriter-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579942" comment="php53-xsl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579943" comment="php53-zip-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579944" comment="php53-zlib-5.3.17-108.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219258" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1031246" ref_url="https://bugzilla.suse.com/1031246" source="BUGZILLA"/>
		<reference ref_id="1044976" ref_url="https://bugzilla.suse.com/1044976" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7272" ref_url="https://www.suse.com/security/cve/CVE-2017-7272/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

- The fix for CVE-2017-7272 was reverted, as it caused regressions in the mysql server connect module.  [bsc#1044976]
  The security fix tried to avoid a server side request forgery, and will be submitted when a better fix becomes available.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-28"/>
	<updated date="2017-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1031246">SUSE bug 1031246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044976">SUSE bug 1044976</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7272/">CVE-2017-7272 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7272">CVE-2017-7272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579945" comment="apache2-mod_php53-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579946" comment="php53-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579947" comment="php53-bcmath-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579948" comment="php53-bz2-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579949" comment="php53-calendar-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579950" comment="php53-ctype-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579951" comment="php53-curl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579952" comment="php53-dba-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579953" comment="php53-dom-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579954" comment="php53-exif-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579955" comment="php53-fastcgi-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579956" comment="php53-fileinfo-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579957" comment="php53-ftp-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579958" comment="php53-gd-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579959" comment="php53-gettext-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579960" comment="php53-gmp-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579961" comment="php53-iconv-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579962" comment="php53-intl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579963" comment="php53-json-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579964" comment="php53-ldap-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579965" comment="php53-mbstring-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579966" comment="php53-mcrypt-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579967" comment="php53-mysql-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579968" comment="php53-odbc-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579969" comment="php53-openssl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579970" comment="php53-pcntl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579971" comment="php53-pdo-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579972" comment="php53-pear-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579973" comment="php53-pgsql-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579974" comment="php53-pspell-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579975" comment="php53-shmop-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579976" comment="php53-snmp-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579977" comment="php53-soap-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579978" comment="php53-suhosin-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579979" comment="php53-sysvmsg-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579980" comment="php53-sysvsem-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579981" comment="php53-sysvshm-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579982" comment="php53-tokenizer-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579983" comment="php53-wddx-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579984" comment="php53-xmlreader-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579985" comment="php53-xmlrpc-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579986" comment="php53-xmlwriter-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579987" comment="php53-xsl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579988" comment="php53-zip-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579989" comment="php53-zlib-5.3.17-111.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219259" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1047454" ref_url="https://bugzilla.suse.com/1047454" source="BUGZILLA"/>
		<reference ref_id="1048094" ref_url="https://bugzilla.suse.com/1048094" source="BUGZILLA"/>
		<reference ref_id="1048096" ref_url="https://bugzilla.suse.com/1048096" source="BUGZILLA"/>
		<reference ref_id="1048111" ref_url="https://bugzilla.suse.com/1048111" source="BUGZILLA"/>
		<reference ref_id="1048112" ref_url="https://bugzilla.suse.com/1048112" source="BUGZILLA"/>
		<reference ref_id="1050241" ref_url="https://bugzilla.suse.com/1050241" source="BUGZILLA"/>
		<reference ref_id="1050726" ref_url="https://bugzilla.suse.com/1050726" source="BUGZILLA"/>
		<reference ref_id="1054430" ref_url="https://bugzilla.suse.com/1054430" source="BUGZILLA"/>
		<reference ref_id="986386" ref_url="https://bugzilla.suse.com/986386" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-10397" ref_url="https://www.suse.com/security/cve/CVE-2016-10397/" source="CVE"/>
		<reference ref_id="CVE-2016-5766" ref_url="https://www.suse.com/security/cve/CVE-2016-5766/" source="CVE"/>
		<reference ref_id="CVE-2017-11144" ref_url="https://www.suse.com/security/cve/CVE-2017-11144/" source="CVE"/>
		<reference ref_id="CVE-2017-11145" ref_url="https://www.suse.com/security/cve/CVE-2017-11145/" source="CVE"/>
		<reference ref_id="CVE-2017-11146" ref_url="https://www.suse.com/security/cve/CVE-2017-11146/" source="CVE"/>
		<reference ref_id="CVE-2017-11147" ref_url="https://www.suse.com/security/cve/CVE-2017-11147/" source="CVE"/>
		<reference ref_id="CVE-2017-11628" ref_url="https://www.suse.com/security/cve/CVE-2017-11628/" source="CVE"/>
		<reference ref_id="CVE-2017-12933" ref_url="https://www.suse.com/security/cve/CVE-2017-12933/" source="CVE"/>
		<reference ref_id="CVE-2017-7890" ref_url="https://www.suse.com/security/cve/CVE-2017-7890/" source="CVE"/>
		<description>
This update for php53 fixes the several issues.

These security issues were fixed:

- CVE-2017-12933: The finish_nested_data function in ext/standard/var_unserializer.re was prone to a buffer over-read while unserializing untrusted data. Exploitation of this issue could have had an unspecified impact on the integrity of PHP (bsc#1054430).
- CVE-2017-11628: Stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could have caused a denial of service or potentially allowed executing code (bsc#1050726).
- CVE-2017-7890: The GIF decoding function gdImageCreateFromGifCtx in the GD Graphics Library did not zero colorMap arrays use. A specially crafted GIF image could use the uninitialized tables to read ~700 bytes from the top of the stack, potentially disclosing sensitive information (bsc#1050241).
- CVE-2016-5766: Integer overflow in the _gd2GetHeader in the GD Graphics Library (aka libgd) allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via crafted chunk dimensions in an image (bsc#986386).
- CVE-2017-11145: An error in the date extension's timelib_meridian parsing code could have been used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function (bsc#1048112).
- CVE-2017-11146: Lack of bounds checks in timelib_meridian parse code could have lead to information leak [bsc#1048111]
- CVE-2016-10397: Incorrect handling of various URI components in the URL parser could have been used by attackers to bypass hostname-specific URL checks (bsc#1047454).
- CVE-2017-11147: The PHAR archive handler could have been used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the phar_parse_pharfile function (bsc#1048094).
- CVE-2017-11144: The openssl extension PEM sealing code did not check the return value of the OpenSSL sealing function, which could have lead to a crash of the PHP interpreter (bsc#1048096).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-18"/>
	<updated date="2017-09-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047454">SUSE bug 1047454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048094">SUSE bug 1048094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048096">SUSE bug 1048096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048111">SUSE bug 1048111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048112">SUSE bug 1048112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050241">SUSE bug 1050241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050726">SUSE bug 1050726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054430">SUSE bug 1054430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986386">SUSE bug 986386</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10168">CVE-2016-10168 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-10397/">CVE-2016-10397 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10397">CVE-2016-10397 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5766/">CVE-2016-5766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5766">CVE-2016-5766 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11144/">CVE-2017-11144 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11144">CVE-2017-11144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11145/">CVE-2017-11145 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11145">CVE-2017-11145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11146/">CVE-2017-11146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-11146">CVE-2017-11146 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11147/">CVE-2017-11147 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11147">CVE-2017-11147 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11628/">CVE-2017-11628 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11628">CVE-2017-11628 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12933/">CVE-2017-12933 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12933">CVE-2017-12933 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7890/">CVE-2017-7890 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7890">CVE-2017-7890 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579990" comment="apache2-mod_php53-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579991" comment="php53-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579992" comment="php53-bcmath-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579993" comment="php53-bz2-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579994" comment="php53-calendar-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579995" comment="php53-ctype-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579996" comment="php53-curl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579997" comment="php53-dba-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579998" comment="php53-dom-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579999" comment="php53-exif-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580000" comment="php53-fastcgi-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580001" comment="php53-fileinfo-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580002" comment="php53-ftp-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580003" comment="php53-gd-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580004" comment="php53-gettext-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580005" comment="php53-gmp-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580006" comment="php53-iconv-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580007" comment="php53-intl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580008" comment="php53-json-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580009" comment="php53-ldap-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580010" comment="php53-mbstring-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580011" comment="php53-mcrypt-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580012" comment="php53-mysql-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580013" comment="php53-odbc-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580014" comment="php53-openssl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580015" comment="php53-pcntl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580016" comment="php53-pdo-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580017" comment="php53-pear-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580018" comment="php53-pgsql-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580019" comment="php53-pspell-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580020" comment="php53-shmop-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580021" comment="php53-snmp-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580022" comment="php53-soap-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580023" comment="php53-suhosin-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580024" comment="php53-sysvmsg-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580025" comment="php53-sysvsem-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580026" comment="php53-sysvshm-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580027" comment="php53-tokenizer-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580028" comment="php53-wddx-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580029" comment="php53-xmlreader-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580030" comment="php53-xmlrpc-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580031" comment="php53-xmlwriter-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580032" comment="php53-xsl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580033" comment="php53-zip-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580034" comment="php53-zlib-5.3.17-112.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219260" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1067441" ref_url="https://bugzilla.suse.com/1067441" source="BUGZILLA"/>
		<reference ref_id="1069606" ref_url="https://bugzilla.suse.com/1069606" source="BUGZILLA"/>
		<reference ref_id="1069631" ref_url="https://bugzilla.suse.com/1069631" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16642" ref_url="https://www.suse.com/security/cve/CVE-2017-16642/" source="CVE"/>
		<reference ref_id="CVE-2017-9228" ref_url="https://www.suse.com/security/cve/CVE-2017-9228/" source="CVE"/>
		<reference ref_id="CVE-2017-9229" ref_url="https://www.suse.com/security/cve/CVE-2017-9229/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:

- CVE-2017-16642: Fix timelib_meridian error that could be used to leak information from the interpreter (bsc#1067441).
- CVE-2017-9228: Fix heap out-of-bounds write that occurs in bitset_set_range() during regex compilation (bsc#1069606).
- CVE-2017-9229: Fix invalid pointer dereference in left_adjust_char_head() (bsc#1069631).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-02"/>
	<updated date="2018-01-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1067441">SUSE bug 1067441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069606">SUSE bug 1069606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069631">SUSE bug 1069631</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16642/">CVE-2017-16642 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16642">CVE-2017-16642 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9228/">CVE-2017-9228 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9228">CVE-2017-9228 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9229/">CVE-2017-9229 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9229">CVE-2017-9229 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580035" comment="apache2-mod_php53-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580036" comment="php53-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580037" comment="php53-bcmath-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580038" comment="php53-bz2-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580039" comment="php53-calendar-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580040" comment="php53-ctype-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580041" comment="php53-curl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580042" comment="php53-dba-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580043" comment="php53-dom-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580044" comment="php53-exif-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580045" comment="php53-fastcgi-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580046" comment="php53-fileinfo-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580047" comment="php53-ftp-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580048" comment="php53-gd-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580049" comment="php53-gettext-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580050" comment="php53-gmp-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580051" comment="php53-iconv-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580052" comment="php53-intl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580053" comment="php53-json-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580054" comment="php53-ldap-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580055" comment="php53-mbstring-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580056" comment="php53-mcrypt-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580057" comment="php53-mysql-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580058" comment="php53-odbc-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580059" comment="php53-openssl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580060" comment="php53-pcntl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580061" comment="php53-pdo-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580062" comment="php53-pear-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580063" comment="php53-pgsql-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580064" comment="php53-pspell-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580065" comment="php53-shmop-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580066" comment="php53-snmp-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580067" comment="php53-soap-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580068" comment="php53-suhosin-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580069" comment="php53-sysvmsg-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580070" comment="php53-sysvsem-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580071" comment="php53-sysvshm-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580072" comment="php53-tokenizer-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580073" comment="php53-wddx-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580074" comment="php53-xmlreader-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580075" comment="php53-xmlrpc-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580076" comment="php53-xmlwriter-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580077" comment="php53-xsl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580078" comment="php53-zip-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580079" comment="php53-zlib-5.3.17-112.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219261" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1076220" ref_url="https://bugzilla.suse.com/1076220" source="BUGZILLA"/>
		<reference ref_id="1076391" ref_url="https://bugzilla.suse.com/1076391" source="BUGZILLA"/>
		<reference ref_id="1080234" ref_url="https://bugzilla.suse.com/1080234" source="BUGZILLA"/>
		<reference ref_id="1083639" ref_url="https://bugzilla.suse.com/1083639" source="BUGZILLA"/>
		<reference ref_id="986247" ref_url="https://bugzilla.suse.com/986247" source="BUGZILLA"/>
		<reference ref_id="986391" ref_url="https://bugzilla.suse.com/986391" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10712" ref_url="https://www.suse.com/security/cve/CVE-2016-10712/" source="CVE"/>
		<reference ref_id="CVE-2016-5771" ref_url="https://www.suse.com/security/cve/CVE-2016-5771/" source="CVE"/>
		<reference ref_id="CVE-2016-5773" ref_url="https://www.suse.com/security/cve/CVE-2016-5773/" source="CVE"/>
		<reference ref_id="CVE-2018-5711" ref_url="https://www.suse.com/security/cve/CVE-2018-5711/" source="CVE"/>
		<reference ref_id="CVE-2018-5712" ref_url="https://www.suse.com/security/cve/CVE-2018-5712/" source="CVE"/>
		<reference ref_id="CVE-2018-7584" ref_url="https://www.suse.com/security/cve/CVE-2018-7584/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003837.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes several issues.

These security issues were fixed:

- CVE-2016-10712: In PHP all of the return values of stream_get_meta_data
  could be controlled if the input can be controlled (e.g., during file
  uploads).  (bsc#1080234)
- CVE-2018-5712: Prevent reflected XSS on the PHAR 404 error page via the
  URI of a request for a .phar file that allowed for information disclosure
  (bsc#1076220)
- CVE-2018-5711: Prevent integer signedness error that could have lead
  to an infinite loop via a crafted GIF file allowing for DoS (bsc#1076391)
- CVE-2016-5773: php_zip.c in the zip extension in PHP improperly
  interacted with the unserialize implementation and garbage collection,
  which allowed remote attackers to execute arbitrary code or cause a
  denial of service (use-after-free and application crash) via crafted
  serialized data containing a ZipArchive object.  (bsc#986247)
- CVE-2016-5771: spl_array.c in the SPL extension in PHP improperly
  interacted with the unserialize implementation and garbage collection,
  which allowed remote attackers to execute arbitrary code or cause a
  denial of service (use-after-free and application crash) via crafted
  serialized data.  (bsc#986391)
- CVE-2018-7584: Fixed stack-based buffer under-read while parsing an
  HTTPresponse in the php_stream_url_wrap_http_ex.  (bsc#1083639)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-26"/>
	<updated date="2018-03-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076220">SUSE bug 1076220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080234">SUSE bug 1080234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083639">SUSE bug 1083639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986247">SUSE bug 986247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986391">SUSE bug 986391</bugzilla>
	<cve impact="critical" cvss3="9.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2016-10712/">CVE-2016-10712 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10712">CVE-2016-10712 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5771/">CVE-2016-5771 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5771">CVE-2016-5771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5773/">CVE-2016-5773 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5773">CVE-2016-5773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5711/">CVE-2018-5711 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5711">CVE-2018-5711 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5712/">CVE-2018-5712 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5712">CVE-2018-5712 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7584/">CVE-2018-7584 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7584">CVE-2018-7584 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580080" comment="apache2-mod_php53-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580081" comment="php53-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580082" comment="php53-bcmath-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580083" comment="php53-bz2-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580084" comment="php53-calendar-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580085" comment="php53-ctype-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580086" comment="php53-curl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580087" comment="php53-dba-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580088" comment="php53-dom-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580089" comment="php53-exif-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580090" comment="php53-fastcgi-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580091" comment="php53-fileinfo-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580092" comment="php53-ftp-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580093" comment="php53-gd-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580094" comment="php53-gettext-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580095" comment="php53-gmp-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580096" comment="php53-iconv-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580097" comment="php53-intl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580098" comment="php53-json-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580099" comment="php53-ldap-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580100" comment="php53-mbstring-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580101" comment="php53-mcrypt-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580102" comment="php53-mysql-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580103" comment="php53-odbc-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580104" comment="php53-openssl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580105" comment="php53-pcntl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580106" comment="php53-pdo-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580107" comment="php53-pear-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580108" comment="php53-pgsql-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580109" comment="php53-pspell-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580110" comment="php53-shmop-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580111" comment="php53-snmp-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580112" comment="php53-soap-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580113" comment="php53-suhosin-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580114" comment="php53-sysvmsg-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580115" comment="php53-sysvsem-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580116" comment="php53-sysvshm-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580117" comment="php53-tokenizer-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580118" comment="php53-wddx-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580119" comment="php53-xmlreader-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580120" comment="php53-xmlrpc-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580121" comment="php53-xmlwriter-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580122" comment="php53-xsl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580123" comment="php53-zip-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580124" comment="php53-zlib-5.3.17-112.20.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580080" comment="apache2-mod_php53-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580081" comment="php53-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580082" comment="php53-bcmath-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580083" comment="php53-bz2-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580084" comment="php53-calendar-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580085" comment="php53-ctype-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580086" comment="php53-curl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580087" comment="php53-dba-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580088" comment="php53-dom-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580089" comment="php53-exif-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580090" comment="php53-fastcgi-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580091" comment="php53-fileinfo-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580092" comment="php53-ftp-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580093" comment="php53-gd-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580094" comment="php53-gettext-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580095" comment="php53-gmp-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580096" comment="php53-iconv-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580097" comment="php53-intl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580098" comment="php53-json-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580099" comment="php53-ldap-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580100" comment="php53-mbstring-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580101" comment="php53-mcrypt-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580102" comment="php53-mysql-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580103" comment="php53-odbc-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580104" comment="php53-openssl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580105" comment="php53-pcntl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580106" comment="php53-pdo-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580107" comment="php53-pear-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580108" comment="php53-pgsql-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580109" comment="php53-pspell-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580110" comment="php53-shmop-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580111" comment="php53-snmp-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580112" comment="php53-soap-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580113" comment="php53-suhosin-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580114" comment="php53-sysvmsg-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580115" comment="php53-sysvsem-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580116" comment="php53-sysvshm-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580117" comment="php53-tokenizer-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580118" comment="php53-wddx-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580119" comment="php53-xmlreader-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580120" comment="php53-xmlrpc-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580121" comment="php53-xmlwriter-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580122" comment="php53-xsl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580123" comment="php53-zip-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580124" comment="php53-zlib-5.3.17-112.20.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219262" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1091355" ref_url="https://bugzilla.suse.com/1091355" source="BUGZILLA"/>
		<reference ref_id="1091362" ref_url="https://bugzilla.suse.com/1091362" source="BUGZILLA"/>
		<reference ref_id="1091363" ref_url="https://bugzilla.suse.com/1091363" source="BUGZILLA"/>
		<reference ref_id="1091367" ref_url="https://bugzilla.suse.com/1091367" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10545" ref_url="https://www.suse.com/security/cve/CVE-2018-10545/" source="CVE"/>
		<reference ref_id="CVE-2018-10546" ref_url="https://www.suse.com/security/cve/CVE-2018-10546/" source="CVE"/>
		<reference ref_id="CVE-2018-10547" ref_url="https://www.suse.com/security/cve/CVE-2018-10547/" source="CVE"/>
		<reference ref_id="CVE-2018-10548" ref_url="https://www.suse.com/security/cve/CVE-2018-10548/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004051.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:

- CVE-2018-10545: Fix access controls in FPM child processes (bsc#1091367).
- CVE-2018-10547: Fix Reflected XSS on the PHAR 403 and 404 error pages (bsc#1091362).
- CVE-2018-10546: Fix an infinite loop exists in ext/iconv/iconv.c (bsc#1091363).
- CVE-2018-10548: Fix remote denial of service in ext/ldap/ldap.c (bsc#1091355).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-15"/>
	<updated date="2018-05-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1091355">SUSE bug 1091355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091362">SUSE bug 1091362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091363">SUSE bug 1091363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091367">SUSE bug 1091367</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10545/">CVE-2018-10545 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10545">CVE-2018-10545 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10546/">CVE-2018-10546 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10546">CVE-2018-10546 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10547/">CVE-2018-10547 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10547">CVE-2018-10547 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10548/">CVE-2018-10548 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10548">CVE-2018-10548 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580125" comment="apache2-mod_php53-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580126" comment="php53-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580127" comment="php53-bcmath-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580128" comment="php53-bz2-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580129" comment="php53-calendar-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580130" comment="php53-ctype-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580131" comment="php53-curl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580132" comment="php53-dba-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580133" comment="php53-dom-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580134" comment="php53-exif-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580135" comment="php53-fastcgi-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580136" comment="php53-fileinfo-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580137" comment="php53-ftp-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580138" comment="php53-gd-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580139" comment="php53-gettext-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580140" comment="php53-gmp-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580141" comment="php53-iconv-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580142" comment="php53-intl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580143" comment="php53-json-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580144" comment="php53-ldap-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580145" comment="php53-mbstring-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580146" comment="php53-mcrypt-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580147" comment="php53-mysql-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580148" comment="php53-odbc-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580149" comment="php53-openssl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580150" comment="php53-pcntl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580151" comment="php53-pdo-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580152" comment="php53-pear-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580153" comment="php53-pgsql-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580154" comment="php53-pspell-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580155" comment="php53-shmop-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580156" comment="php53-snmp-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580157" comment="php53-soap-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580158" comment="php53-suhosin-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580159" comment="php53-sysvmsg-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580160" comment="php53-sysvsem-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580161" comment="php53-sysvshm-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580162" comment="php53-tokenizer-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580163" comment="php53-wddx-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580164" comment="php53-xmlreader-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580165" comment="php53-xmlrpc-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580166" comment="php53-xmlwriter-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580167" comment="php53-xsl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580168" comment="php53-zip-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580169" comment="php53-zlib-5.3.17-112.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580125" comment="apache2-mod_php53-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580126" comment="php53-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580127" comment="php53-bcmath-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580128" comment="php53-bz2-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580129" comment="php53-calendar-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580130" comment="php53-ctype-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580131" comment="php53-curl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580132" comment="php53-dba-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580133" comment="php53-dom-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580134" comment="php53-exif-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580135" comment="php53-fastcgi-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580136" comment="php53-fileinfo-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580137" comment="php53-ftp-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580138" comment="php53-gd-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580139" comment="php53-gettext-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580140" comment="php53-gmp-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580141" comment="php53-iconv-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580142" comment="php53-intl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580143" comment="php53-json-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580144" comment="php53-ldap-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580145" comment="php53-mbstring-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580146" comment="php53-mcrypt-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580147" comment="php53-mysql-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580148" comment="php53-odbc-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580149" comment="php53-openssl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580150" comment="php53-pcntl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580151" comment="php53-pdo-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580152" comment="php53-pear-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580153" comment="php53-pgsql-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580154" comment="php53-pspell-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580155" comment="php53-shmop-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580156" comment="php53-snmp-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580157" comment="php53-soap-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580158" comment="php53-suhosin-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580159" comment="php53-sysvmsg-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580160" comment="php53-sysvsem-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580161" comment="php53-sysvshm-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580162" comment="php53-tokenizer-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580163" comment="php53-wddx-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580164" comment="php53-xmlreader-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580165" comment="php53-xmlrpc-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580166" comment="php53-xmlwriter-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580167" comment="php53-xsl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580168" comment="php53-zip-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580169" comment="php53-zlib-5.3.17-112.23.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219263" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1096984" ref_url="https://bugzilla.suse.com/1096984" source="BUGZILLA"/>
		<reference ref_id="1099098" ref_url="https://bugzilla.suse.com/1099098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10360" ref_url="https://www.suse.com/security/cve/CVE-2018-10360/" source="CVE"/>
		<reference ref_id="CVE-2018-12882" ref_url="https://www.suse.com/security/cve/CVE-2018-12882/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

The following security issue was fixed:

- An out-of-bounds read in the do_core_note function in readelf.c in libmagic.a
  allowed remote attackers to cause a denial of service via a crafted ELF file
  (CVE-2018-10360, bsc#1096984)
- CVE-2018-12882: exif_read_from_impl allowed attackers to trigger a
  use-after-free (in exif_read_from_file) because it closed a stream that it is
  not responsible for closing (bsc#1099098)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-23"/>
	<updated date="2018-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1096984">SUSE bug 1096984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099098">SUSE bug 1099098</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10360/">CVE-2018-10360 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10360">CVE-2018-10360 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12882/">CVE-2018-12882 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12882">CVE-2018-12882 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580170" comment="apache2-mod_php53-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580171" comment="php53-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580172" comment="php53-bcmath-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580173" comment="php53-bz2-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580174" comment="php53-calendar-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580175" comment="php53-ctype-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580176" comment="php53-curl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580177" comment="php53-dba-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580178" comment="php53-dom-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580179" comment="php53-exif-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580180" comment="php53-fastcgi-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580181" comment="php53-fileinfo-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580182" comment="php53-ftp-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580183" comment="php53-gd-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580184" comment="php53-gettext-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580185" comment="php53-gmp-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580186" comment="php53-iconv-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580187" comment="php53-intl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580188" comment="php53-json-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580189" comment="php53-ldap-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580190" comment="php53-mbstring-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580191" comment="php53-mcrypt-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580192" comment="php53-mysql-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580193" comment="php53-odbc-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580194" comment="php53-openssl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580195" comment="php53-pcntl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580196" comment="php53-pdo-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580197" comment="php53-pear-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580198" comment="php53-pgsql-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580199" comment="php53-pspell-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580200" comment="php53-shmop-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580201" comment="php53-snmp-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580202" comment="php53-soap-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580203" comment="php53-suhosin-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580204" comment="php53-sysvmsg-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580205" comment="php53-sysvsem-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580206" comment="php53-sysvshm-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580207" comment="php53-tokenizer-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580208" comment="php53-wddx-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580209" comment="php53-xmlreader-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580210" comment="php53-xmlrpc-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580211" comment="php53-xmlwriter-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580212" comment="php53-xsl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580213" comment="php53-zip-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580214" comment="php53-zlib-5.3.17-112.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219264" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1103659" ref_url="https://bugzilla.suse.com/1103659" source="BUGZILLA"/>
		<reference ref_id="1103836" ref_url="https://bugzilla.suse.com/1103836" source="BUGZILLA"/>
		<reference ref_id="1105466" ref_url="https://bugzilla.suse.com/1105466" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9118" ref_url="https://www.suse.com/security/cve/CVE-2017-9118/" source="CVE"/>
		<reference ref_id="CVE-2018-14851" ref_url="https://www.suse.com/security/cve/CVE-2018-14851/" source="CVE"/>
		<reference ref_id="CVE-2018-14883" ref_url="https://www.suse.com/security/cve/CVE-2018-14883/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

The following security issues were fixed:

- CVE-2018-14851: Fixed an out-of-bound read in exif_process_IFD_in_MAKERNOTE,
  which could be exploited by an attacker via crafted JPG files, and could
  result in an application crash. (bsc#1103659)
- CVE-2018-14883: Fixed an integer overflow leading to a heap based buffer
  over-read in exif_thumbnail_extract of exif.c. (bsc#1103836)
- CVE-2017-9118: Fixed an out of bounds access in php_pcre_replace_impl via a
  crafted preg_replace call (bsc#1105466)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-10"/>
	<updated date="2018-09-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103659">SUSE bug 1103659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103836">SUSE bug 1103836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105466">SUSE bug 1105466</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9118/">CVE-2017-9118 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9118">CVE-2017-9118 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14851/">CVE-2018-14851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14851">CVE-2018-14851 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14883/">CVE-2018-14883 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14883">CVE-2018-14883 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580215" comment="apache2-mod_php53-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580216" comment="php53-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580217" comment="php53-bcmath-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580218" comment="php53-bz2-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580219" comment="php53-calendar-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580220" comment="php53-ctype-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580221" comment="php53-curl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580222" comment="php53-dba-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580223" comment="php53-dom-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580224" comment="php53-exif-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580225" comment="php53-fastcgi-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580226" comment="php53-fileinfo-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580227" comment="php53-ftp-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580228" comment="php53-gd-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580229" comment="php53-gettext-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580230" comment="php53-gmp-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580231" comment="php53-iconv-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580232" comment="php53-intl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580233" comment="php53-json-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580234" comment="php53-ldap-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580235" comment="php53-mbstring-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580236" comment="php53-mcrypt-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580237" comment="php53-mysql-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580238" comment="php53-odbc-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580239" comment="php53-openssl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580240" comment="php53-pcntl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580241" comment="php53-pdo-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580242" comment="php53-pear-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580243" comment="php53-pgsql-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580244" comment="php53-pspell-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580245" comment="php53-shmop-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580246" comment="php53-snmp-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580247" comment="php53-soap-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580248" comment="php53-suhosin-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580249" comment="php53-sysvmsg-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580250" comment="php53-sysvsem-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580251" comment="php53-sysvshm-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580252" comment="php53-tokenizer-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580253" comment="php53-wddx-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580254" comment="php53-xmlreader-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580255" comment="php53-xmlrpc-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580256" comment="php53-xmlwriter-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580257" comment="php53-xsl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580258" comment="php53-zip-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580259" comment="php53-zlib-5.3.17-112.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219265" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1108753" ref_url="https://bugzilla.suse.com/1108753" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17082" ref_url="https://www.suse.com/security/cve/CVE-2018-17082/" source="CVE"/>
		<description>
This update for php53 fixes the following issue:

- CVE-2018-17082: The Apache2 component in PHP allowed XSS via the body of a
  'Transfer-Encoding: chunked' request, because the bucket brigade was mishandled
  in the php_handler function (bsc#1108753)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-05"/>
	<updated date="2018-10-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1108753">SUSE bug 1108753</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-17082/">CVE-2018-17082 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17082">CVE-2018-17082 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580260" comment="apache2-mod_php53-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580261" comment="php53-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580262" comment="php53-bcmath-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580263" comment="php53-bz2-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580264" comment="php53-calendar-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580265" comment="php53-ctype-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580266" comment="php53-curl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580267" comment="php53-dba-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580268" comment="php53-dom-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580269" comment="php53-exif-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580270" comment="php53-fastcgi-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580271" comment="php53-fileinfo-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580272" comment="php53-ftp-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580273" comment="php53-gd-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580274" comment="php53-gettext-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580275" comment="php53-gmp-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580276" comment="php53-iconv-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580277" comment="php53-intl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580278" comment="php53-json-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580279" comment="php53-ldap-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580280" comment="php53-mbstring-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580281" comment="php53-mcrypt-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580282" comment="php53-mysql-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580283" comment="php53-odbc-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580284" comment="php53-openssl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580285" comment="php53-pcntl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580286" comment="php53-pdo-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580287" comment="php53-pear-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580288" comment="php53-pgsql-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580289" comment="php53-pspell-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580290" comment="php53-shmop-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580291" comment="php53-snmp-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580292" comment="php53-soap-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580293" comment="php53-suhosin-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580294" comment="php53-sysvmsg-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580295" comment="php53-sysvsem-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580296" comment="php53-sysvshm-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580297" comment="php53-tokenizer-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580298" comment="php53-wddx-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580299" comment="php53-xmlreader-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580300" comment="php53-xmlrpc-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580301" comment="php53-xmlwriter-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580302" comment="php53-xsl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580303" comment="php53-zip-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580304" comment="php53-zlib-5.3.17-112.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219266" version="1" class="patch">
	<metadata>
		<title>Recommended update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1117107" ref_url="https://bugzilla.suse.com/1117107" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19518" ref_url="https://www.suse.com/security/cve/CVE-2018-19518/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

Security issue fixed:
    
- CVE-2018-19518: Fixed imap_open script injection flaw (bsc#1117107).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-05"/>
	<updated date="2018-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117107">SUSE bug 1117107</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19518/">CVE-2018-19518 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19518">CVE-2018-19518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580305" comment="apache2-mod_php53-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580306" comment="php53-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580307" comment="php53-bcmath-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580308" comment="php53-bz2-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580309" comment="php53-calendar-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580310" comment="php53-ctype-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580311" comment="php53-curl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580312" comment="php53-dba-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580313" comment="php53-dom-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580314" comment="php53-exif-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580315" comment="php53-fastcgi-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580316" comment="php53-fileinfo-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580317" comment="php53-ftp-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580318" comment="php53-gd-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580319" comment="php53-gettext-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580320" comment="php53-gmp-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580321" comment="php53-iconv-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580322" comment="php53-intl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580323" comment="php53-json-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580324" comment="php53-ldap-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580325" comment="php53-mbstring-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580326" comment="php53-mcrypt-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580327" comment="php53-mysql-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580328" comment="php53-odbc-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580329" comment="php53-openssl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580330" comment="php53-pcntl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580331" comment="php53-pdo-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580332" comment="php53-pear-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580333" comment="php53-pgsql-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580334" comment="php53-pspell-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580335" comment="php53-shmop-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580336" comment="php53-snmp-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580337" comment="php53-soap-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580338" comment="php53-suhosin-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580339" comment="php53-sysvmsg-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580340" comment="php53-sysvsem-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580341" comment="php53-sysvshm-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580342" comment="php53-tokenizer-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580343" comment="php53-wddx-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580344" comment="php53-xmlreader-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580345" comment="php53-xmlrpc-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580346" comment="php53-xmlwriter-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580347" comment="php53-xsl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580348" comment="php53-zip-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580349" comment="php53-zlib-5.3.17-112.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219267" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1123354" ref_url="https://bugzilla.suse.com/1123354" source="BUGZILLA"/>
		<reference ref_id="1123522" ref_url="https://bugzilla.suse.com/1123522" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6977" ref_url="https://www.suse.com/security/cve/CVE-2019-6977/" source="CVE"/>
		<reference ref_id="CVE-2019-6978" ref_url="https://www.suse.com/security/cve/CVE-2019-6978/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:

- CVE-2019-6977: Fixed a heap-based buffer overflow the GD Graphics Library used in the imagecolormatch function (bsc#1123354).
- CVE-2019-6978: Fixed a double free in the gdImage*Ptr() functions (bsc#1123522).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-14"/>
	<updated date="2019-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123354">SUSE bug 1123354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123522">SUSE bug 1123522</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6977/">CVE-2019-6977 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6977">CVE-2019-6977 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6978/">CVE-2019-6978 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6978">CVE-2019-6978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580350" comment="apache2-mod_php53-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580351" comment="php53-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580352" comment="php53-bcmath-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580353" comment="php53-bz2-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580354" comment="php53-calendar-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580355" comment="php53-ctype-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580356" comment="php53-curl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580357" comment="php53-dba-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580358" comment="php53-dom-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580359" comment="php53-exif-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580360" comment="php53-fastcgi-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580361" comment="php53-fileinfo-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580362" comment="php53-ftp-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580363" comment="php53-gd-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580364" comment="php53-gettext-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580365" comment="php53-gmp-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580366" comment="php53-iconv-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580367" comment="php53-intl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580368" comment="php53-json-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580369" comment="php53-ldap-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580370" comment="php53-mbstring-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580371" comment="php53-mcrypt-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580372" comment="php53-mysql-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580373" comment="php53-odbc-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580374" comment="php53-openssl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580375" comment="php53-pcntl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580376" comment="php53-pdo-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580377" comment="php53-pear-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580378" comment="php53-pgsql-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580379" comment="php53-pspell-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580380" comment="php53-shmop-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580381" comment="php53-snmp-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580382" comment="php53-soap-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580383" comment="php53-suhosin-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580384" comment="php53-sysvmsg-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580385" comment="php53-sysvsem-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580386" comment="php53-sysvshm-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580387" comment="php53-tokenizer-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580388" comment="php53-wddx-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580389" comment="php53-xmlreader-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580390" comment="php53-xmlrpc-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580391" comment="php53-xmlwriter-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580392" comment="php53-xsl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580393" comment="php53-zip-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580394" comment="php53-zlib-5.3.17-112.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219268" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1126711" ref_url="https://bugzilla.suse.com/1126711" source="BUGZILLA"/>
		<reference ref_id="1126713" ref_url="https://bugzilla.suse.com/1126713" source="BUGZILLA"/>
		<reference ref_id="1126821" ref_url="https://bugzilla.suse.com/1126821" source="BUGZILLA"/>
		<reference ref_id="1126823" ref_url="https://bugzilla.suse.com/1126823" source="BUGZILLA"/>
		<reference ref_id="1127122" ref_url="https://bugzilla.suse.com/1127122" source="BUGZILLA"/>
		<reference ref_id="1128722" ref_url="https://bugzilla.suse.com/1128722" source="BUGZILLA"/>
		<reference ref_id="1128883" ref_url="https://bugzilla.suse.com/1128883" source="BUGZILLA"/>
		<reference ref_id="1128886" ref_url="https://bugzilla.suse.com/1128886" source="BUGZILLA"/>
		<reference ref_id="1128887" ref_url="https://bugzilla.suse.com/1128887" source="BUGZILLA"/>
		<reference ref_id="1128889" ref_url="https://bugzilla.suse.com/1128889" source="BUGZILLA"/>
		<reference ref_id="1128892" ref_url="https://bugzilla.suse.com/1128892" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20783" ref_url="https://www.suse.com/security/cve/CVE-2018-20783/" source="CVE"/>
		<reference ref_id="CVE-2019-9020" ref_url="https://www.suse.com/security/cve/CVE-2019-9020/" source="CVE"/>
		<reference ref_id="CVE-2019-9021" ref_url="https://www.suse.com/security/cve/CVE-2019-9021/" source="CVE"/>
		<reference ref_id="CVE-2019-9023" ref_url="https://www.suse.com/security/cve/CVE-2019-9023/" source="CVE"/>
		<reference ref_id="CVE-2019-9024" ref_url="https://www.suse.com/security/cve/CVE-2019-9024/" source="CVE"/>
		<reference ref_id="CVE-2019-9637" ref_url="https://www.suse.com/security/cve/CVE-2019-9637/" source="CVE"/>
		<reference ref_id="CVE-2019-9638" ref_url="https://www.suse.com/security/cve/CVE-2019-9638/" source="CVE"/>
		<reference ref_id="CVE-2019-9639" ref_url="https://www.suse.com/security/cve/CVE-2019-9639/" source="CVE"/>
		<reference ref_id="CVE-2019-9640" ref_url="https://www.suse.com/security/cve/CVE-2019-9640/" source="CVE"/>
		<reference ref_id="CVE-2019-9641" ref_url="https://www.suse.com/security/cve/CVE-2019-9641/" source="CVE"/>
		<reference ref_id="CVE-2019-9675" ref_url="https://www.suse.com/security/cve/CVE-2019-9675/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed: 	  

- CVE-2019-9637: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128892).
- CVE-2019-9675: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128886).
- CVE-2019-9638: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension ((bsc#1128889).
- CVE-2019-9639: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128887).
- CVE-2019-9640: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128883).
- CVE-2019-9024: Fixed a vulnerability in xmlrpc_decode function which could allow to a hostile XMLRPC server
  to cause memory read outside the allocated areas (bsc#1126821).
- CVE-2019-9020: Fixed a heap out of bounds in xmlrpc_decode function (bsc#1126711).
- CVE-2018-20783: Fixed a buffer over-read in PHAR reading functions which could allow an attacker to read 
  allocated and unallocated memory when parsing a phar file (bsc#1127122).
- CVE-2019-9021: Fixed a heap buffer-based buffer over-read in PHAR reading functions which could allow an 
  attacker to read allocated and unallocated memory when parsing a phar file (bsc#1126713).
- CVE-2019-9023: Fixed multiple heap-based buffer over-read instances in mbstring regular expression functions (bsc#1126823).
- CVE-2019-9641: Fixed multiple invalid memory access in EXIF extension and improved insecure implementation 
  of rename function (bsc#1128722).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-05"/>
	<updated date="2019-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1126711">SUSE bug 1126711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126713">SUSE bug 1126713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126821">SUSE bug 1126821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126823">SUSE bug 1126823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127122">SUSE bug 1127122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128722">SUSE bug 1128722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128883">SUSE bug 1128883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128886">SUSE bug 1128886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128887">SUSE bug 1128887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128889">SUSE bug 1128889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128892">SUSE bug 1128892</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20783/">CVE-2018-20783 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20783">CVE-2018-20783 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9020/">CVE-2019-9020 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9020">CVE-2019-9020 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9021/">CVE-2019-9021 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9021">CVE-2019-9021 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9023/">CVE-2019-9023 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9023">CVE-2019-9023 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9024/">CVE-2019-9024 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9024">CVE-2019-9024 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9637/">CVE-2019-9637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9637">CVE-2019-9637 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9638/">CVE-2019-9638 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9638">CVE-2019-9638 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9639/">CVE-2019-9639 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9639">CVE-2019-9639 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9640/">CVE-2019-9640 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9640">CVE-2019-9640 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9641/">CVE-2019-9641 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9641">CVE-2019-9641 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9675/">CVE-2019-9675 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9675">CVE-2019-9675 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580395" comment="apache2-mod_php53-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580396" comment="php53-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580397" comment="php53-bcmath-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580398" comment="php53-bz2-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580399" comment="php53-calendar-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580400" comment="php53-ctype-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580401" comment="php53-curl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580402" comment="php53-dba-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580403" comment="php53-dom-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580404" comment="php53-exif-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580405" comment="php53-fastcgi-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580406" comment="php53-fileinfo-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580407" comment="php53-ftp-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580408" comment="php53-gd-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580409" comment="php53-gettext-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580410" comment="php53-gmp-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580411" comment="php53-iconv-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580412" comment="php53-intl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580413" comment="php53-json-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580414" comment="php53-ldap-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580415" comment="php53-mbstring-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580416" comment="php53-mcrypt-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580417" comment="php53-mysql-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580418" comment="php53-odbc-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580419" comment="php53-openssl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580420" comment="php53-pcntl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580421" comment="php53-pdo-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580422" comment="php53-pear-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580423" comment="php53-pgsql-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580424" comment="php53-pspell-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580425" comment="php53-shmop-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580426" comment="php53-snmp-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580427" comment="php53-soap-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580428" comment="php53-suhosin-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580429" comment="php53-sysvmsg-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580430" comment="php53-sysvsem-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580431" comment="php53-sysvshm-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580432" comment="php53-tokenizer-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580433" comment="php53-wddx-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580434" comment="php53-xmlreader-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580435" comment="php53-xmlrpc-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580436" comment="php53-xmlwriter-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580437" comment="php53-xsl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580438" comment="php53-zip-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580439" comment="php53-zlib-5.3.17-112.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219269" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1132837" ref_url="https://bugzilla.suse.com/1132837" source="BUGZILLA"/>
		<reference ref_id="1132838" ref_url="https://bugzilla.suse.com/1132838" source="BUGZILLA"/>
		<reference ref_id="1134322" ref_url="https://bugzilla.suse.com/1134322" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11034" ref_url="https://www.suse.com/security/cve/CVE-2019-11034/" source="CVE"/>
		<reference ref_id="CVE-2019-11035" ref_url="https://www.suse.com/security/cve/CVE-2019-11035/" source="CVE"/>
		<reference ref_id="CVE-2019-11036" ref_url="https://www.suse.com/security/cve/CVE-2019-11036/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:

- CVE-2019-11034: Fixed a heap-buffer overflow in php_ifd_get32si() (bsc#1132838).
- CVE-2019-11035: Fixed a heap-buffer overflow in exif_iif_add_value() (bsc#1132837).
- CVE-2019-11036: Fixed buffer over-read in exif_process_IFD_TAG function leading to information disclosure (bsc#1134322).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-22"/>
	<updated date="2019-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1132837">SUSE bug 1132837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132838">SUSE bug 1132838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134322">SUSE bug 1134322</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11034/">CVE-2019-11034 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11034">CVE-2019-11034 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11035/">CVE-2019-11035 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11035">CVE-2019-11035 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11036/">CVE-2019-11036 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11036">CVE-2019-11036 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580440" comment="apache2-mod_php53-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580441" comment="php53-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580442" comment="php53-bcmath-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580443" comment="php53-bz2-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580444" comment="php53-calendar-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580445" comment="php53-ctype-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580446" comment="php53-curl-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580447" comment="php53-dba-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580448" comment="php53-dom-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580449" comment="php53-exif-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580450" comment="php53-fastcgi-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580451" comment="php53-fileinfo-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580452" comment="php53-ftp-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580453" comment="php53-gd-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580454" comment="php53-gettext-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580455" comment="php53-gmp-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580456" comment="php53-iconv-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580457" comment="php53-intl-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580458" comment="php53-json-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580459" comment="php53-ldap-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580460" comment="php53-mbstring-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580461" comment="php53-mcrypt-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580462" comment="php53-mysql-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580463" comment="php53-odbc-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580464" comment="php53-openssl-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580465" comment="php53-pcntl-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580466" comment="php53-pdo-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580467" comment="php53-pear-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580468" comment="php53-pgsql-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580469" comment="php53-pspell-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580470" comment="php53-shmop-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580471" comment="php53-snmp-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580472" comment="php53-soap-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580473" comment="php53-suhosin-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580474" comment="php53-sysvmsg-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580475" comment="php53-sysvsem-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580476" comment="php53-sysvshm-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580477" comment="php53-tokenizer-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580478" comment="php53-wddx-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580479" comment="php53-xmlreader-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580480" comment="php53-xmlrpc-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580481" comment="php53-xmlwriter-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580482" comment="php53-xsl-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580483" comment="php53-zip-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580484" comment="php53-zlib-5.3.17-112.63.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219270" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1138172" ref_url="https://bugzilla.suse.com/1138172" source="BUGZILLA"/>
		<reference ref_id="1138173" ref_url="https://bugzilla.suse.com/1138173" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11039" ref_url="https://www.suse.com/security/cve/CVE-2019-11039/" source="CVE"/>
		<reference ref_id="CVE-2019-11040" ref_url="https://www.suse.com/security/cve/CVE-2019-11040/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:	  

- CVE-2019-11039: Fixed a heap-buffer-overflow on php_jpg_get16 (bsc#1138173).
- CVE-2019-11040: Fixed an out-of-bounds read due to an integer overflow in 
  iconv.c:_php_iconv_mime_decode() (bsc#1138172).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-04"/>
	<updated date="2019-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1138172">SUSE bug 1138172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138173">SUSE bug 1138173</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11039/">CVE-2019-11039 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11039">CVE-2019-11039 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11040/">CVE-2019-11040 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11040">CVE-2019-11040 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580485" comment="apache2-mod_php53-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580486" comment="php53-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580487" comment="php53-bcmath-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580488" comment="php53-bz2-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580489" comment="php53-calendar-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580490" comment="php53-ctype-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580491" comment="php53-curl-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580492" comment="php53-dba-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580493" comment="php53-dom-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580494" comment="php53-exif-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580495" comment="php53-fastcgi-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580496" comment="php53-fileinfo-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580497" comment="php53-ftp-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580498" comment="php53-gd-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580499" comment="php53-gettext-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580500" comment="php53-gmp-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580501" comment="php53-iconv-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580502" comment="php53-intl-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580503" comment="php53-json-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580504" comment="php53-ldap-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580505" comment="php53-mbstring-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580506" comment="php53-mcrypt-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580507" comment="php53-mysql-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580508" comment="php53-odbc-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580509" comment="php53-openssl-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580510" comment="php53-pcntl-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580511" comment="php53-pdo-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580512" comment="php53-pear-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580513" comment="php53-pgsql-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580514" comment="php53-pspell-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580515" comment="php53-shmop-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580516" comment="php53-snmp-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580517" comment="php53-soap-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580518" comment="php53-suhosin-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580519" comment="php53-sysvmsg-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580520" comment="php53-sysvsem-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580521" comment="php53-sysvshm-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580522" comment="php53-tokenizer-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580523" comment="php53-wddx-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580524" comment="php53-xmlreader-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580525" comment="php53-xmlrpc-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580526" comment="php53-xmlwriter-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580527" comment="php53-xsl-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580528" comment="php53-zip-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580529" comment="php53-zlib-5.3.17-112.66.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219271" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1140118" ref_url="https://bugzilla.suse.com/1140118" source="BUGZILLA"/>
		<reference ref_id="1145095" ref_url="https://bugzilla.suse.com/1145095" source="BUGZILLA"/>
		<reference ref_id="1146360" ref_url="https://bugzilla.suse.com/1146360" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11038" ref_url="https://www.suse.com/security/cve/CVE-2019-11038/" source="CVE"/>
		<reference ref_id="CVE-2019-11041" ref_url="https://www.suse.com/security/cve/CVE-2019-11041/" source="CVE"/>
		<reference ref_id="CVE-2019-11042" ref_url="https://www.suse.com/security/cve/CVE-2019-11042/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:

- CVE-2019-11038: Fixed a information disclosure in gdImageCreateFromXbm() (bsc#1140118).
- CVE-2019-11041: Fixed heap buffer over-read in exif_scan_thumbnail() (bsc#1146360). 
- CVE-2019-11042: Fixed heap buffer over-read in exif_process_user_comment() (bsc#1145095).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-03"/>
	<updated date="2019-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140118">SUSE bug 1140118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145095">SUSE bug 1145095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146360">SUSE bug 1146360</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11038/">CVE-2019-11038 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11038">CVE-2019-11038 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11041/">CVE-2019-11041 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11041">CVE-2019-11041 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11042/">CVE-2019-11042 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11042">CVE-2019-11042 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580530" comment="apache2-mod_php53-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580531" comment="php53-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580532" comment="php53-bcmath-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580533" comment="php53-bz2-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580534" comment="php53-calendar-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580535" comment="php53-ctype-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580536" comment="php53-curl-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580537" comment="php53-dba-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580538" comment="php53-dom-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580539" comment="php53-exif-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580540" comment="php53-fastcgi-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580541" comment="php53-fileinfo-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580542" comment="php53-ftp-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580543" comment="php53-gd-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580544" comment="php53-gettext-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580545" comment="php53-gmp-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580546" comment="php53-iconv-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580547" comment="php53-intl-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580548" comment="php53-json-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580549" comment="php53-ldap-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580550" comment="php53-mbstring-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580551" comment="php53-mcrypt-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580552" comment="php53-mysql-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580553" comment="php53-odbc-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580554" comment="php53-openssl-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580555" comment="php53-pcntl-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580556" comment="php53-pdo-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580557" comment="php53-pear-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580558" comment="php53-pgsql-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580559" comment="php53-pspell-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580560" comment="php53-shmop-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580561" comment="php53-snmp-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580562" comment="php53-soap-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580563" comment="php53-suhosin-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580564" comment="php53-sysvmsg-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580565" comment="php53-sysvsem-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580566" comment="php53-sysvshm-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580567" comment="php53-tokenizer-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580568" comment="php53-wddx-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580569" comment="php53-xmlreader-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580570" comment="php53-xmlrpc-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580571" comment="php53-xmlwriter-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580572" comment="php53-xsl-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580573" comment="php53-zip-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580574" comment="php53-zlib-5.3.17-112.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219272" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1154999" ref_url="https://bugzilla.suse.com/1154999" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11043" ref_url="https://www.suse.com/security/cve/CVE-2019-11043/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

Security issue fixed:

- CVE-2019-11043: Fixed possible remote code execution via env_path_info underflow in fpm_main.c (bsc#1154999).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-05"/>
	<updated date="2019-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154999">SUSE bug 1154999</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11043/">CVE-2019-11043 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11043">CVE-2019-11043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580575" comment="apache2-mod_php53-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580576" comment="php53-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580577" comment="php53-bcmath-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580578" comment="php53-bz2-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580579" comment="php53-calendar-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580580" comment="php53-ctype-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580581" comment="php53-curl-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580582" comment="php53-dba-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580583" comment="php53-dom-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580584" comment="php53-exif-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580585" comment="php53-fastcgi-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580586" comment="php53-fileinfo-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580587" comment="php53-ftp-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580588" comment="php53-gd-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580589" comment="php53-gettext-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580590" comment="php53-gmp-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580591" comment="php53-iconv-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580592" comment="php53-intl-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580593" comment="php53-json-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580594" comment="php53-ldap-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580595" comment="php53-mbstring-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580596" comment="php53-mcrypt-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580597" comment="php53-mysql-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580598" comment="php53-odbc-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580599" comment="php53-openssl-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580600" comment="php53-pcntl-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580601" comment="php53-pdo-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580602" comment="php53-pear-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580603" comment="php53-pgsql-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580604" comment="php53-pspell-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580605" comment="php53-shmop-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580606" comment="php53-snmp-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580607" comment="php53-soap-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580608" comment="php53-suhosin-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580609" comment="php53-sysvmsg-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580610" comment="php53-sysvsem-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580611" comment="php53-sysvshm-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580612" comment="php53-tokenizer-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580613" comment="php53-wddx-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580614" comment="php53-xmlreader-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580615" comment="php53-xmlrpc-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580616" comment="php53-xmlwriter-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580617" comment="php53-xsl-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580618" comment="php53-zip-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580619" comment="php53-zlib-5.3.17-112.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219273" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1159922" ref_url="https://bugzilla.suse.com/1159922" source="BUGZILLA"/>
		<reference ref_id="1159923" ref_url="https://bugzilla.suse.com/1159923" source="BUGZILLA"/>
		<reference ref_id="1159924" ref_url="https://bugzilla.suse.com/1159924" source="BUGZILLA"/>
		<reference ref_id="1159927" ref_url="https://bugzilla.suse.com/1159927" source="BUGZILLA"/>
		<reference ref_id="1161982" ref_url="https://bugzilla.suse.com/1161982" source="BUGZILLA"/>
		<reference ref_id="1162629" ref_url="https://bugzilla.suse.com/1162629" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11045" ref_url="https://www.suse.com/security/cve/CVE-2019-11045/" source="CVE"/>
		<reference ref_id="CVE-2019-11046" ref_url="https://www.suse.com/security/cve/CVE-2019-11046/" source="CVE"/>
		<reference ref_id="CVE-2019-11047" ref_url="https://www.suse.com/security/cve/CVE-2019-11047/" source="CVE"/>
		<reference ref_id="CVE-2019-11050" ref_url="https://www.suse.com/security/cve/CVE-2019-11050/" source="CVE"/>
		<reference ref_id="CVE-2019-20433" ref_url="https://www.suse.com/security/cve/CVE-2019-20433/" source="CVE"/>
		<reference ref_id="CVE-2020-7059" ref_url="https://www.suse.com/security/cve/CVE-2020-7059/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:

- CVE-2020-7059: Fixed an out-of-bounds read in php_strip_tags_ex (bsc#1162629).
- CVE-2019-11045: Fixed an issue with the PHP DirectoryIterator class that accepts filenames with embedded \0 bytes (bsc#1159923).
- CVE-2019-11046: Fixed an out-of-bounds read in bc_shift_addsub (bsc#1159924).
- CVE-2019-11047: Fixed an information disclosure in exif_read_data (bsc#1159922).
- CVE-2019-11050: Fixed a buffer over-read in the EXIF extension (bsc#1159927).
- CVE-2019-20433: Fixed a buffer over-read when processing strings ending with a single '\0' byte with ucs-2 and ucs-4 encoding (bsc#1161982).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-24"/>
	<updated date="2020-02-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1159922">SUSE bug 1159922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159923">SUSE bug 1159923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159924">SUSE bug 1159924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159927">SUSE bug 1159927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161982">SUSE bug 1161982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162629">SUSE bug 1162629</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11045/">CVE-2019-11045 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11045">CVE-2019-11045 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11046/">CVE-2019-11046 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11046">CVE-2019-11046 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11047/">CVE-2019-11047 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11047">CVE-2019-11047 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11050/">CVE-2019-11050 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11050">CVE-2019-11050 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20433/">CVE-2019-20433 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20433">CVE-2019-20433 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7059/">CVE-2020-7059 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7059">CVE-2020-7059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580620" comment="apache2-mod_php53-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580621" comment="php53-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580622" comment="php53-bcmath-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580623" comment="php53-bz2-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580624" comment="php53-calendar-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580625" comment="php53-ctype-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580626" comment="php53-curl-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580627" comment="php53-dba-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580628" comment="php53-dom-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580629" comment="php53-exif-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580630" comment="php53-fastcgi-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580631" comment="php53-fileinfo-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580632" comment="php53-ftp-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580633" comment="php53-gd-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580634" comment="php53-gettext-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580635" comment="php53-gmp-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580636" comment="php53-iconv-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580637" comment="php53-intl-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580638" comment="php53-json-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580639" comment="php53-ldap-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580640" comment="php53-mbstring-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580641" comment="php53-mcrypt-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580642" comment="php53-mysql-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580643" comment="php53-odbc-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580644" comment="php53-openssl-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580645" comment="php53-pcntl-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580646" comment="php53-pdo-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580647" comment="php53-pear-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580648" comment="php53-pgsql-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580649" comment="php53-pspell-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580650" comment="php53-shmop-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580651" comment="php53-snmp-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580652" comment="php53-soap-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580653" comment="php53-suhosin-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580654" comment="php53-sysvmsg-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580655" comment="php53-sysvsem-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580656" comment="php53-sysvshm-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580657" comment="php53-tokenizer-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580658" comment="php53-wddx-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580659" comment="php53-xmlreader-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580660" comment="php53-xmlrpc-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580661" comment="php53-xmlwriter-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580662" comment="php53-xsl-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580663" comment="php53-zip-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580664" comment="php53-zlib-5.3.17-112.79.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219274" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1165289" ref_url="https://bugzilla.suse.com/1165289" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7063" ref_url="https://www.suse.com/security/cve/CVE-2020-7063/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

- CVE-2020-7063: Fixed an issue where adding files change the permissions to default (bsc#1165289).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-11"/>
	<updated date="2020-03-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1165289">SUSE bug 1165289</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7063/">CVE-2020-7063 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7063">CVE-2020-7063 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580665" comment="apache2-mod_php53-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580666" comment="php53-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580667" comment="php53-bcmath-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580668" comment="php53-bz2-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580669" comment="php53-calendar-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580670" comment="php53-ctype-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580671" comment="php53-curl-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580672" comment="php53-dba-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580673" comment="php53-dom-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580674" comment="php53-exif-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580675" comment="php53-fastcgi-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580676" comment="php53-fileinfo-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580677" comment="php53-ftp-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580678" comment="php53-gd-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580679" comment="php53-gettext-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580680" comment="php53-gmp-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580681" comment="php53-iconv-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580682" comment="php53-intl-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580683" comment="php53-json-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580684" comment="php53-ldap-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580685" comment="php53-mbstring-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580686" comment="php53-mcrypt-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580687" comment="php53-mysql-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580688" comment="php53-odbc-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580689" comment="php53-openssl-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580690" comment="php53-pcntl-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580691" comment="php53-pdo-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580692" comment="php53-pear-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580693" comment="php53-pgsql-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580694" comment="php53-pspell-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580695" comment="php53-shmop-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580696" comment="php53-snmp-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580697" comment="php53-soap-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580698" comment="php53-suhosin-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580699" comment="php53-sysvmsg-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580700" comment="php53-sysvsem-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580701" comment="php53-sysvshm-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580702" comment="php53-tokenizer-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580703" comment="php53-wddx-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580704" comment="php53-xmlreader-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580705" comment="php53-xmlrpc-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580706" comment="php53-xmlwriter-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580707" comment="php53-xsl-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580708" comment="php53-zip-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580709" comment="php53-zlib-5.3.17-112.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219275" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1168326" ref_url="https://bugzilla.suse.com/1168326" source="BUGZILLA"/>
		<reference ref_id="1168352" ref_url="https://bugzilla.suse.com/1168352" source="BUGZILLA"/>
		<reference ref_id="1171999" ref_url="https://bugzilla.suse.com/1171999" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11048" ref_url="https://www.suse.com/security/cve/CVE-2019-11048/" source="CVE"/>
		<reference ref_id="CVE-2020-7064" ref_url="https://www.suse.com/security/cve/CVE-2020-7064/" source="CVE"/>
		<reference ref_id="CVE-2020-7066" ref_url="https://www.suse.com/security/cve/CVE-2020-7066/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

- CVE-2020-7064: Fixed a one byte read of uninitialized memory in exif_read_data() (bsc#1168326).
- CVE-2020-7066: Fixed URL truncation in get_headers() if the URL contains zero (\0) character (bsc#1168352).
- CVE-2019-11048: Improved the handling of overly long filenames or field names in HTTP file uploads (bsc#1171999).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-24"/>
	<updated date="2020-06-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1168326">SUSE bug 1168326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168352">SUSE bug 1168352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171999">SUSE bug 1171999</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11048/">CVE-2019-11048 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11048">CVE-2019-11048 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7064/">CVE-2020-7064 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7064">CVE-2020-7064 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7066/">CVE-2020-7066 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7066">CVE-2020-7066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580710" comment="apache2-mod_php53-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580711" comment="php53-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580712" comment="php53-bcmath-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580713" comment="php53-bz2-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580714" comment="php53-calendar-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580715" comment="php53-ctype-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580716" comment="php53-curl-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580717" comment="php53-dba-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580718" comment="php53-dom-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580719" comment="php53-exif-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580720" comment="php53-fastcgi-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580721" comment="php53-fileinfo-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580722" comment="php53-ftp-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580723" comment="php53-gd-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580724" comment="php53-gettext-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580725" comment="php53-gmp-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580726" comment="php53-iconv-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580727" comment="php53-intl-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580728" comment="php53-json-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580729" comment="php53-ldap-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580730" comment="php53-mbstring-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580731" comment="php53-mcrypt-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580732" comment="php53-mysql-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580733" comment="php53-odbc-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580734" comment="php53-openssl-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580735" comment="php53-pcntl-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580736" comment="php53-pdo-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580737" comment="php53-pear-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580738" comment="php53-pgsql-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580739" comment="php53-pspell-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580740" comment="php53-shmop-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580741" comment="php53-snmp-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580742" comment="php53-soap-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580743" comment="php53-suhosin-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580744" comment="php53-sysvmsg-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580745" comment="php53-sysvsem-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580746" comment="php53-sysvshm-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580747" comment="php53-tokenizer-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580748" comment="php53-wddx-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580749" comment="php53-xmlreader-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580750" comment="php53-xmlrpc-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580751" comment="php53-xmlwriter-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580752" comment="php53-xsl-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580753" comment="php53-zip-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580754" comment="php53-zlib-5.3.17-112.87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219276" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1175223" ref_url="https://bugzilla.suse.com/1175223" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7068" ref_url="https://www.suse.com/security/cve/CVE-2020-7068/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

- CVE-2020-7068: Use of freed hash key in the phar_parse_zipfile function (bsc#1175223).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175223">SUSE bug 1175223</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7068/">CVE-2020-7068 at SUSE</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7068">CVE-2020-7068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580755" comment="apache2-mod_php53-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580756" comment="php53-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580757" comment="php53-bcmath-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580758" comment="php53-bz2-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580759" comment="php53-calendar-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580760" comment="php53-ctype-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580761" comment="php53-curl-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580762" comment="php53-dba-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580763" comment="php53-dom-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580764" comment="php53-exif-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580765" comment="php53-fastcgi-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580766" comment="php53-fileinfo-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580767" comment="php53-ftp-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580768" comment="php53-gd-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580769" comment="php53-gettext-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580770" comment="php53-gmp-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580771" comment="php53-iconv-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580772" comment="php53-intl-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580773" comment="php53-json-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580774" comment="php53-ldap-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580775" comment="php53-mbstring-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580776" comment="php53-mcrypt-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580777" comment="php53-mysql-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580778" comment="php53-odbc-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580779" comment="php53-openssl-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580780" comment="php53-pcntl-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580781" comment="php53-pdo-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580782" comment="php53-pear-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580783" comment="php53-pgsql-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580784" comment="php53-pspell-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580785" comment="php53-shmop-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580786" comment="php53-snmp-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580787" comment="php53-soap-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580788" comment="php53-suhosin-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580789" comment="php53-sysvmsg-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580790" comment="php53-sysvsem-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580791" comment="php53-sysvshm-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580792" comment="php53-tokenizer-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580793" comment="php53-wddx-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580794" comment="php53-xmlreader-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580795" comment="php53-xmlrpc-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580796" comment="php53-xmlwriter-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580797" comment="php53-xsl-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580798" comment="php53-zip-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580799" comment="php53-zlib-5.3.17-112.90.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219277" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1177352" ref_url="https://bugzilla.suse.com/1177352" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7070" ref_url="https://www.suse.com/security/cve/CVE-2020-7070/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

- CVE-2020-7070: Fixed an issue where percent-encoded cookies could have been used to overwrite existing prefixed cookie names (bsc#1177352).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-14"/>
	<updated date="2020-10-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177352">SUSE bug 1177352</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-7070/">CVE-2020-7070 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7070">CVE-2020-7070 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580800" comment="apache2-mod_php53-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580801" comment="php53-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580802" comment="php53-bcmath-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580803" comment="php53-bz2-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580804" comment="php53-calendar-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580805" comment="php53-ctype-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580806" comment="php53-curl-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580807" comment="php53-dba-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580808" comment="php53-dom-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580809" comment="php53-exif-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580810" comment="php53-fastcgi-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580811" comment="php53-fileinfo-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580812" comment="php53-ftp-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580813" comment="php53-gd-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580814" comment="php53-gettext-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580815" comment="php53-gmp-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580816" comment="php53-iconv-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580817" comment="php53-intl-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580818" comment="php53-json-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580819" comment="php53-ldap-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580820" comment="php53-mbstring-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580821" comment="php53-mcrypt-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580822" comment="php53-mysql-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580823" comment="php53-odbc-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580824" comment="php53-openssl-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580825" comment="php53-pcntl-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580826" comment="php53-pdo-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580827" comment="php53-pear-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580828" comment="php53-pgsql-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580829" comment="php53-pspell-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580830" comment="php53-shmop-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580831" comment="php53-snmp-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580832" comment="php53-soap-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580833" comment="php53-suhosin-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580834" comment="php53-sysvmsg-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580835" comment="php53-sysvsem-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580836" comment="php53-sysvshm-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580837" comment="php53-tokenizer-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580838" comment="php53-wddx-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580839" comment="php53-xmlreader-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580840" comment="php53-xmlrpc-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580841" comment="php53-xmlwriter-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580842" comment="php53-xsl-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580843" comment="php53-zip-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580844" comment="php53-zlib-5.3.17-112.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219278" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180706" ref_url="https://bugzilla.suse.com/1180706" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7071" ref_url="https://www.suse.com/security/cve/CVE-2020-7071/" source="CVE"/>
		<description>
This update for php53 fixes the following issue:

- CVE-2020-7071: Fixed an insufficient filter in parse_url() that accepted URLs with invalid userinfo (bsc#1180706).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-18"/>
	<updated date="2021-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180706">SUSE bug 1180706</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-7071/">CVE-2020-7071 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7071">CVE-2020-7071 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580845" comment="apache2-mod_php53-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580846" comment="php53-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580847" comment="php53-bcmath-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580848" comment="php53-bz2-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580849" comment="php53-calendar-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580850" comment="php53-ctype-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580851" comment="php53-curl-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580852" comment="php53-dba-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580853" comment="php53-dom-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580854" comment="php53-exif-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580855" comment="php53-fastcgi-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580856" comment="php53-fileinfo-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580857" comment="php53-ftp-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580858" comment="php53-gd-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580859" comment="php53-gettext-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580860" comment="php53-gmp-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580861" comment="php53-iconv-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580862" comment="php53-intl-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580863" comment="php53-json-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580864" comment="php53-ldap-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580865" comment="php53-mbstring-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580866" comment="php53-mcrypt-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580867" comment="php53-mysql-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580868" comment="php53-odbc-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580869" comment="php53-openssl-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580870" comment="php53-pcntl-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580871" comment="php53-pdo-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580872" comment="php53-pear-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580873" comment="php53-pgsql-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580874" comment="php53-pspell-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580875" comment="php53-shmop-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580876" comment="php53-snmp-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580877" comment="php53-soap-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580878" comment="php53-suhosin-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580879" comment="php53-sysvmsg-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580880" comment="php53-sysvsem-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580881" comment="php53-sysvshm-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580882" comment="php53-tokenizer-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580883" comment="php53-wddx-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580884" comment="php53-xmlreader-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580885" comment="php53-xmlrpc-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580886" comment="php53-xmlwriter-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580887" comment="php53-xsl-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580888" comment="php53-zip-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580889" comment="php53-zlib-5.3.17-112.96.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219279" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182049" ref_url="https://bugzilla.suse.com/1182049" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21702" ref_url="https://www.suse.com/security/cve/CVE-2021-21702/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

- CVE-2021-21702 [bsc#1182049]: NULL pointer dereference in SoapClient
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182049">SUSE bug 1182049</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21702/">CVE-2021-21702 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21702">CVE-2021-21702 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580890" comment="apache2-mod_php53-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580891" comment="php53-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580892" comment="php53-bcmath-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580893" comment="php53-bz2-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580894" comment="php53-calendar-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580895" comment="php53-ctype-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580896" comment="php53-curl-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580897" comment="php53-dba-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580898" comment="php53-dom-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580899" comment="php53-exif-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580900" comment="php53-fastcgi-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580901" comment="php53-fileinfo-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580902" comment="php53-ftp-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580903" comment="php53-gd-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580904" comment="php53-gettext-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580905" comment="php53-gmp-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580906" comment="php53-iconv-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580907" comment="php53-intl-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580908" comment="php53-json-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580909" comment="php53-ldap-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580910" comment="php53-mbstring-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580911" comment="php53-mcrypt-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580912" comment="php53-mysql-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580913" comment="php53-odbc-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580914" comment="php53-openssl-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580915" comment="php53-pcntl-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580916" comment="php53-pdo-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580917" comment="php53-pear-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580918" comment="php53-pgsql-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580919" comment="php53-pspell-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580920" comment="php53-shmop-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580921" comment="php53-snmp-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580922" comment="php53-soap-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580923" comment="php53-suhosin-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580924" comment="php53-sysvmsg-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580925" comment="php53-sysvsem-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580926" comment="php53-sysvshm-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580927" comment="php53-tokenizer-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580928" comment="php53-wddx-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580929" comment="php53-xmlreader-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580930" comment="php53-xmlrpc-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580931" comment="php53-xmlwriter-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580932" comment="php53-xsl-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580933" comment="php53-zip-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580934" comment="php53-zlib-5.3.17-112.99.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219280" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188037" ref_url="https://bugzilla.suse.com/1188037" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21705" ref_url="https://www.suse.com/security/cve/CVE-2021-21705/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

- CVE-2021-21705 [bsc#1188037]: SSRF bypass in FILTER_VALIDATE_URL
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188037">SUSE bug 1188037</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21705/">CVE-2021-21705 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21705">CVE-2021-21705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627089" comment="apache2-mod_php53-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627090" comment="php53-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627091" comment="php53-bcmath-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627092" comment="php53-bz2-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627093" comment="php53-calendar-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627094" comment="php53-ctype-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627095" comment="php53-curl-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627096" comment="php53-dba-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627097" comment="php53-dom-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627098" comment="php53-exif-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627099" comment="php53-fastcgi-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627100" comment="php53-fileinfo-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627101" comment="php53-ftp-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627102" comment="php53-gd-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627103" comment="php53-gettext-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627104" comment="php53-gmp-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627105" comment="php53-iconv-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627106" comment="php53-intl-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627107" comment="php53-json-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627108" comment="php53-ldap-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627109" comment="php53-mbstring-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627110" comment="php53-mcrypt-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627111" comment="php53-mysql-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627112" comment="php53-odbc-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627113" comment="php53-openssl-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627114" comment="php53-pcntl-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627115" comment="php53-pdo-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627116" comment="php53-pear-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627117" comment="php53-pgsql-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627118" comment="php53-pspell-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627119" comment="php53-shmop-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627120" comment="php53-snmp-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627121" comment="php53-soap-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627122" comment="php53-suhosin-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627123" comment="php53-sysvmsg-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627124" comment="php53-sysvsem-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627125" comment="php53-sysvshm-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627126" comment="php53-tokenizer-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627127" comment="php53-wddx-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627128" comment="php53-xmlreader-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627129" comment="php53-xmlrpc-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627130" comment="php53-xmlwriter-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627131" comment="php53-xsl-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627132" comment="php53-zip-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627133" comment="php53-zlib-5.3.17-112.102.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219281" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189591" ref_url="https://bugzilla.suse.com/1189591" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36193" ref_url="https://www.suse.com/security/cve/CVE-2020-36193/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

- CVE-2020-36193: Fixed Archive_Tar directory traversal due to inadequate checking of symbolic links (bsc#1189591).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-03"/>
	<updated date="2021-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189591">SUSE bug 1189591</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-36193/">CVE-2020-36193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36193">CVE-2020-36193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632089" comment="apache2-mod_php53-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632090" comment="php53-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632091" comment="php53-bcmath-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632092" comment="php53-bz2-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632093" comment="php53-calendar-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632094" comment="php53-ctype-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632095" comment="php53-curl-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632096" comment="php53-dba-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632097" comment="php53-dom-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632098" comment="php53-exif-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632099" comment="php53-fastcgi-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632100" comment="php53-fileinfo-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632101" comment="php53-ftp-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632102" comment="php53-gd-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632103" comment="php53-gettext-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632104" comment="php53-gmp-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632105" comment="php53-iconv-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632106" comment="php53-intl-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632107" comment="php53-json-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632108" comment="php53-ldap-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632109" comment="php53-mbstring-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632110" comment="php53-mcrypt-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632111" comment="php53-mysql-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632112" comment="php53-odbc-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632113" comment="php53-openssl-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632114" comment="php53-pcntl-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632115" comment="php53-pdo-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632116" comment="php53-pear-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632117" comment="php53-pgsql-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632118" comment="php53-pspell-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632119" comment="php53-shmop-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632120" comment="php53-snmp-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632121" comment="php53-soap-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632122" comment="php53-suhosin-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632123" comment="php53-sysvmsg-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632124" comment="php53-sysvsem-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632125" comment="php53-sysvshm-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632126" comment="php53-tokenizer-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632127" comment="php53-wddx-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632128" comment="php53-xmlreader-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632129" comment="php53-xmlrpc-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632130" comment="php53-xmlwriter-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632131" comment="php53-xsl-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632132" comment="php53-zip-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632133" comment="php53-zlib-5.3.17-112.105.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219282" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1193041" ref_url="https://bugzilla.suse.com/1193041" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21707" ref_url="https://www.suse.com/security/cve/CVE-2021-21707/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

- CVE-2021-21707: Fixed special character breaks path in xml parsing (bsc#1193041).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-22"/>
	<updated date="2021-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1193041">SUSE bug 1193041</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21707/">CVE-2021-21707 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21707">CVE-2021-21707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658692" comment="apache2-mod_php53-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658693" comment="php53-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658694" comment="php53-bcmath-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658695" comment="php53-bz2-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658696" comment="php53-calendar-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658697" comment="php53-ctype-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658698" comment="php53-curl-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658699" comment="php53-dba-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658700" comment="php53-dom-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658701" comment="php53-exif-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658702" comment="php53-fastcgi-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658703" comment="php53-fileinfo-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658704" comment="php53-ftp-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658705" comment="php53-gd-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658706" comment="php53-gettext-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658707" comment="php53-gmp-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658708" comment="php53-iconv-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658709" comment="php53-intl-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658710" comment="php53-json-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658711" comment="php53-ldap-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658712" comment="php53-mbstring-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658713" comment="php53-mcrypt-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658714" comment="php53-mysql-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658715" comment="php53-odbc-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658716" comment="php53-openssl-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658717" comment="php53-pcntl-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658718" comment="php53-pdo-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658719" comment="php53-pear-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658720" comment="php53-pgsql-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658721" comment="php53-pspell-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658722" comment="php53-shmop-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658723" comment="php53-snmp-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658724" comment="php53-soap-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658725" comment="php53-suhosin-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658726" comment="php53-sysvmsg-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658727" comment="php53-sysvsem-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658728" comment="php53-sysvshm-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658729" comment="php53-tokenizer-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658730" comment="php53-wddx-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658731" comment="php53-xmlreader-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658732" comment="php53-xmlrpc-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658733" comment="php53-xmlwriter-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658734" comment="php53-xsl-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658735" comment="php53-zip-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658736" comment="php53-zlib-5.3.17-112.108.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219283" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1081790" ref_url="https://bugzilla.suse.com/1081790" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9253" ref_url="https://www.suse.com/security/cve/CVE-2015-9253/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

- CVE-2015-9253: Fixed endless loop when the master process restarts a child process using program execution functions (bsc#1081790).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-21"/>
	<updated date="2022-02-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081790">SUSE bug 1081790</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9253/">CVE-2015-9253 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9253">CVE-2015-9253 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668128" comment="apache2-mod_php53-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668129" comment="php53-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668130" comment="php53-bcmath-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668131" comment="php53-bz2-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668132" comment="php53-calendar-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668133" comment="php53-ctype-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668134" comment="php53-curl-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668135" comment="php53-dba-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668136" comment="php53-dom-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668137" comment="php53-exif-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668138" comment="php53-fastcgi-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668139" comment="php53-fileinfo-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668140" comment="php53-ftp-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668141" comment="php53-gd-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668142" comment="php53-gettext-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668143" comment="php53-gmp-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668144" comment="php53-iconv-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668145" comment="php53-intl-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668146" comment="php53-json-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668147" comment="php53-ldap-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668148" comment="php53-mbstring-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668149" comment="php53-mcrypt-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668150" comment="php53-mysql-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668151" comment="php53-odbc-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668152" comment="php53-openssl-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668153" comment="php53-pcntl-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668154" comment="php53-pdo-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668155" comment="php53-pear-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668156" comment="php53-pgsql-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668157" comment="php53-pspell-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668158" comment="php53-shmop-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668159" comment="php53-snmp-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668160" comment="php53-soap-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668161" comment="php53-suhosin-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668162" comment="php53-sysvmsg-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668163" comment="php53-sysvsem-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668164" comment="php53-sysvshm-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668165" comment="php53-tokenizer-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668166" comment="php53-wddx-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668167" comment="php53-xmlreader-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668168" comment="php53-xmlrpc-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668169" comment="php53-xmlwriter-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668170" comment="php53-xsl-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668171" comment="php53-zip-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668172" comment="php53-zlib-5.3.17-112.111.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219284" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1200082" ref_url="https://bugzilla.suse.com/1200082" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4072" ref_url="https://www.suse.com/security/cve/CVE-2016-4072/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

- CVE-2016-4072: Fixed invalid memory write in phar on filename containing \0 inside name (bsc#1200082).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-15"/>
	<updated date="2022-06-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1200082">SUSE bug 1200082</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-4072/">CVE-2016-4072 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4072">CVE-2016-4072 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993773" comment="apache2-mod_php53-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993774" comment="php53-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993775" comment="php53-bcmath-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993776" comment="php53-bz2-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993777" comment="php53-calendar-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993778" comment="php53-ctype-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993779" comment="php53-curl-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993780" comment="php53-dba-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993781" comment="php53-dom-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993782" comment="php53-exif-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993783" comment="php53-fastcgi-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993784" comment="php53-fileinfo-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993785" comment="php53-ftp-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993786" comment="php53-gd-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993787" comment="php53-gettext-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993788" comment="php53-gmp-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993789" comment="php53-iconv-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993790" comment="php53-intl-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993791" comment="php53-json-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993792" comment="php53-ldap-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993793" comment="php53-mbstring-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993794" comment="php53-mcrypt-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993795" comment="php53-mysql-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993796" comment="php53-odbc-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993797" comment="php53-openssl-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993798" comment="php53-pcntl-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993799" comment="php53-pdo-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993800" comment="php53-pear-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993801" comment="php53-pgsql-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993802" comment="php53-pspell-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993803" comment="php53-shmop-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993804" comment="php53-snmp-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993805" comment="php53-soap-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993806" comment="php53-suhosin-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993807" comment="php53-sysvmsg-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993808" comment="php53-sysvsem-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993809" comment="php53-sysvshm-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993810" comment="php53-tokenizer-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993811" comment="php53-wddx-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993812" comment="php53-xmlreader-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993813" comment="php53-xmlrpc-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993814" comment="php53-xmlwriter-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993815" comment="php53-xsl-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993816" comment="php53-zip-5.3.17-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993817" comment="php53-zlib-5.3.17-112.114.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219285" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1200645" ref_url="https://bugzilla.suse.com/1200645" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31625" ref_url="https://www.suse.com/security/cve/CVE-2022-31625/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

- CVE-2022-31625: Fixed uninitialized pointers free in Postgres extension. (bsc#1200645)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-24"/>
	<updated date="2022-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200645">SUSE bug 1200645</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31625/">CVE-2022-31625 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31625">CVE-2022-31625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993818" comment="apache2-mod_php53-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993819" comment="php53-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993820" comment="php53-bcmath-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993821" comment="php53-bz2-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993822" comment="php53-calendar-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993823" comment="php53-ctype-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993824" comment="php53-curl-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993825" comment="php53-dba-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993826" comment="php53-dom-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993827" comment="php53-exif-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993828" comment="php53-fastcgi-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993829" comment="php53-fileinfo-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993830" comment="php53-ftp-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993831" comment="php53-gd-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993832" comment="php53-gettext-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993833" comment="php53-gmp-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993834" comment="php53-iconv-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993835" comment="php53-intl-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993836" comment="php53-json-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993837" comment="php53-ldap-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993838" comment="php53-mbstring-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993839" comment="php53-mcrypt-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993840" comment="php53-mysql-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993841" comment="php53-odbc-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993842" comment="php53-openssl-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993843" comment="php53-pcntl-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993844" comment="php53-pdo-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993845" comment="php53-pear-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993846" comment="php53-pgsql-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993847" comment="php53-pspell-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993848" comment="php53-shmop-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993849" comment="php53-snmp-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993850" comment="php53-soap-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993851" comment="php53-suhosin-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993852" comment="php53-sysvmsg-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993853" comment="php53-sysvsem-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993854" comment="php53-sysvshm-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993855" comment="php53-tokenizer-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993856" comment="php53-wddx-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993857" comment="php53-xmlreader-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993858" comment="php53-xmlrpc-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993859" comment="php53-xmlwriter-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993860" comment="php53-xsl-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993861" comment="php53-zip-5.3.17-112.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993862" comment="php53-zlib-5.3.17-112.117.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219286" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1203867" ref_url="https://bugzilla.suse.com/1203867" source="BUGZILLA"/>
		<reference ref_id="1203870" ref_url="https://bugzilla.suse.com/1203870" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31628" ref_url="https://www.suse.com/security/cve/CVE-2022-31628/" source="CVE"/>
		<reference ref_id="CVE-2022-31629" ref_url="https://www.suse.com/security/cve/CVE-2022-31629/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

- CVE-2022-31628: Fixed an uncontrolled recursion in the phar uncompressor while decompressing 'quines' gzip files. (bsc#1203867)
- CVE-2022-31629: Fixed a bug which could lead an attacker to set an insecure cookie that will treated as secure in the victim's browser. (bsc#1203870)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-11"/>
	<updated date="2022-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203867">SUSE bug 1203867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203870">SUSE bug 1203870</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31628/">CVE-2022-31628 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31628">CVE-2022-31628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31629/">CVE-2022-31629 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31629">CVE-2022-31629 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993863" comment="apache2-mod_php53-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993864" comment="php53-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993865" comment="php53-bcmath-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993866" comment="php53-bz2-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993867" comment="php53-calendar-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993868" comment="php53-ctype-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993869" comment="php53-curl-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993870" comment="php53-dba-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993871" comment="php53-dom-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993872" comment="php53-exif-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993873" comment="php53-fastcgi-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993874" comment="php53-fileinfo-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993875" comment="php53-ftp-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993876" comment="php53-gd-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993877" comment="php53-gettext-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993878" comment="php53-gmp-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993879" comment="php53-iconv-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993880" comment="php53-intl-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993881" comment="php53-json-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993882" comment="php53-ldap-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993883" comment="php53-mbstring-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993884" comment="php53-mcrypt-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993885" comment="php53-mysql-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993886" comment="php53-odbc-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993887" comment="php53-openssl-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993888" comment="php53-pcntl-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993889" comment="php53-pdo-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993890" comment="php53-pear-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993891" comment="php53-pgsql-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993892" comment="php53-pspell-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993893" comment="php53-shmop-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993894" comment="php53-snmp-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993895" comment="php53-soap-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993896" comment="php53-suhosin-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993897" comment="php53-sysvmsg-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993898" comment="php53-sysvsem-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993899" comment="php53-sysvshm-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993900" comment="php53-tokenizer-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993901" comment="php53-wddx-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993902" comment="php53-xmlreader-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993903" comment="php53-xmlrpc-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993904" comment="php53-xmlwriter-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993905" comment="php53-xsl-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993906" comment="php53-zip-5.3.17-112.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993907" comment="php53-zlib-5.3.17-112.120.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219287" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1206958" ref_url="https://bugzilla.suse.com/1206958" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31631" ref_url="https://www.suse.com/security/cve/CVE-2022-31631/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

- CVE-2022-31631: Fixed an issue where PDO::quote would return an
  unquoted string (bsc#1206958).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-27"/>
	<updated date="2023-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206958">SUSE bug 1206958</bugzilla>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-31631/">CVE-2022-31631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-31631">CVE-2022-31631 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993908" comment="apache2-mod_php53-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993909" comment="php53-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993910" comment="php53-bcmath-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993911" comment="php53-bz2-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993912" comment="php53-calendar-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993913" comment="php53-ctype-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993914" comment="php53-curl-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993915" comment="php53-dba-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993916" comment="php53-dom-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993917" comment="php53-exif-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993918" comment="php53-fastcgi-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993919" comment="php53-fileinfo-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993920" comment="php53-ftp-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993921" comment="php53-gd-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993922" comment="php53-gettext-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993923" comment="php53-gmp-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993924" comment="php53-iconv-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993925" comment="php53-intl-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993926" comment="php53-json-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993927" comment="php53-ldap-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993928" comment="php53-mbstring-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993929" comment="php53-mcrypt-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993930" comment="php53-mysql-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993931" comment="php53-odbc-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993932" comment="php53-openssl-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993933" comment="php53-pcntl-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993934" comment="php53-pdo-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993935" comment="php53-pear-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993936" comment="php53-pgsql-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993937" comment="php53-pspell-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993938" comment="php53-shmop-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993939" comment="php53-snmp-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993940" comment="php53-soap-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993941" comment="php53-suhosin-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993942" comment="php53-sysvmsg-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993943" comment="php53-sysvsem-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993944" comment="php53-sysvshm-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993945" comment="php53-tokenizer-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993946" comment="php53-wddx-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993947" comment="php53-xmlreader-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993948" comment="php53-xmlrpc-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993949" comment="php53-xmlwriter-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993950" comment="php53-xsl-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993951" comment="php53-zip-5.3.17-112.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993952" comment="php53-zlib-5.3.17-112.123.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219288" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208366" ref_url="https://bugzilla.suse.com/1208366" source="BUGZILLA"/>
		<reference ref_id="1208367" ref_url="https://bugzilla.suse.com/1208367" source="BUGZILLA"/>
		<reference ref_id="1208388" ref_url="https://bugzilla.suse.com/1208388" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0567" ref_url="https://www.suse.com/security/cve/CVE-2023-0567/" source="CVE"/>
		<reference ref_id="CVE-2023-0568" ref_url="https://www.suse.com/security/cve/CVE-2023-0568/" source="CVE"/>
		<reference ref_id="CVE-2023-0662" ref_url="https://www.suse.com/security/cve/CVE-2023-0662/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

  - CVE-2023-0568: Fixed NULL byte off-by-one in php_check_specific_open_basedir (bnc#1208366).
  - CVE-2023-0662: Fixed DoS vulnerability when parsing multipart request body (bnc#1208367).
  - CVE-2023-0567: Fixed vulnerability where BCrypt hashes erroneously validate if the salt is cut short by `$` (bsc#1208388).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-01"/>
	<updated date="2023-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208366">SUSE bug 1208366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208367">SUSE bug 1208367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208388">SUSE bug 1208388</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0567/">CVE-2023-0567 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0567">CVE-2023-0567 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0568/">CVE-2023-0568 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0568">CVE-2023-0568 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0662/">CVE-2023-0662 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0662">CVE-2023-0662 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993953" comment="apache2-mod_php53-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993954" comment="php53-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993955" comment="php53-bcmath-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993956" comment="php53-bz2-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993957" comment="php53-calendar-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993958" comment="php53-ctype-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993959" comment="php53-curl-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993960" comment="php53-dba-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993961" comment="php53-dom-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993962" comment="php53-exif-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993963" comment="php53-fastcgi-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993964" comment="php53-fileinfo-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993965" comment="php53-ftp-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993966" comment="php53-gd-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993967" comment="php53-gettext-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993968" comment="php53-gmp-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993969" comment="php53-iconv-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993970" comment="php53-intl-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993971" comment="php53-json-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993972" comment="php53-ldap-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993973" comment="php53-mbstring-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993974" comment="php53-mcrypt-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993975" comment="php53-mysql-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993976" comment="php53-odbc-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993977" comment="php53-openssl-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993978" comment="php53-pcntl-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993979" comment="php53-pdo-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993980" comment="php53-pear-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993981" comment="php53-pgsql-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993982" comment="php53-pspell-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993983" comment="php53-shmop-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993984" comment="php53-snmp-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993985" comment="php53-soap-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993986" comment="php53-suhosin-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993987" comment="php53-sysvmsg-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993988" comment="php53-sysvsem-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993989" comment="php53-sysvshm-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993990" comment="php53-tokenizer-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993991" comment="php53-wddx-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993992" comment="php53-xmlreader-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993993" comment="php53-xmlrpc-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993994" comment="php53-xmlwriter-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993995" comment="php53-xsl-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993996" comment="php53-zip-5.3.17-112.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993997" comment="php53-zlib-5.3.17-112.126.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219289" version="1" class="patch">
	<metadata>
		<title>Security update for pixman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="968090" ref_url="https://bugzilla.suse.com/968090" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9766" ref_url="https://www.suse.com/security/cve/CVE-2014-9766/" source="CVE"/>
		<description>
This update for pixman fixes the following issues:

Security issue fixed:

- CVE-2014-9766: Fixed an integer overflow in create_bits() (bsc#968090).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-25"/>
	<updated date="2020-09-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/968090">SUSE bug 968090</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9766/">CVE-2014-9766 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9766">CVE-2014-9766 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580935" comment="libpixman-1-0-0.24.4-0.15.3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580936" comment="libpixman-1-0-32bit-0.24.4-0.15.3.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219290" version="1" class="patch">
	<metadata>
		<title>Security update for pixman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1205033" ref_url="https://bugzilla.suse.com/1205033" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-44638" ref_url="https://www.suse.com/security/cve/CVE-2022-44638/" source="CVE"/>
		<description>
This update for pixman fixes the following issues:

- CVE-2022-44638: Fixed an integer overflow in pixman_sample_floor_y leading to heap out-of-bounds write (bsc#1205033).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-21"/>
	<updated date="2022-11-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205033">SUSE bug 1205033</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-44638/">CVE-2022-44638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44638">CVE-2022-44638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009993998" comment="libpixman-1-0-0.24.4-0.15.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009993999" comment="libpixman-1-0-32bit-0.24.4-0.15.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219291" version="1" class="patch">
	<metadata>
		<title>Security update for policycoreutils (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1000998" ref_url="https://bugzilla.suse.com/1000998" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7545" ref_url="https://www.suse.com/security/cve/CVE-2016-7545/" source="CVE"/>
		<description>

This update for policycoreutils fixes the following issues:

* CVE-2016-7545: nonpriv session can escape to parent [bsc#1000998]

		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-31"/>
	<updated date="2017-01-31"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1000998">SUSE bug 1000998</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7545/">CVE-2016-7545 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7545">CVE-2016-7545 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574381" comment="policycoreutils-2.0.79-4.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219292" version="1" class="patch">
	<metadata>
		<title>Security update for policycoreutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1083624" ref_url="https://bugzilla.suse.com/1083624" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1063" ref_url="https://www.suse.com/security/cve/CVE-2018-1063/" source="CVE"/>
		<description>
This update for policycoreutils fixes the following issues:

- CVE-2018-1063: Prevent chcon from following symlinks in /tmp, /var/tmp,
  /var/run and /var/lib/debug (bsc#1083624).  
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-11"/>
	<updated date="2018-04-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083624">SUSE bug 1083624</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1063/">CVE-2018-1063 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1063">CVE-2018-1063 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574382" comment="policycoreutils-2.0.79-4.9.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219293" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="976844" ref_url="https://bugzilla.suse.com/976844" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8868" ref_url="https://www.suse.com/security/cve/CVE-2015-8868/" source="CVE"/>
		<description>

This update for poppler fixes the following issues: 

Security issues fixed:
- CVE-2015-8868: Corrupted PDF file can corrupt heap, causing DoS (bsc#976844)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-10"/>
	<updated date="2016-06-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/976844">SUSE bug 976844</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8868/">CVE-2015-8868 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8868">CVE-2015-8868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574383" comment="libpoppler-glib4-0.12.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574384" comment="libpoppler-qt4-3-0.12.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574385" comment="libpoppler5-0.12.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574386" comment="poppler-tools-0.12.3-1.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219294" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1061265" ref_url="https://bugzilla.suse.com/1061265" source="BUGZILLA"/>
		<reference ref_id="1064593" ref_url="https://bugzilla.suse.com/1064593" source="BUGZILLA"/>
		<reference ref_id="1074453" ref_url="https://bugzilla.suse.com/1074453" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000456" ref_url="https://www.suse.com/security/cve/CVE-2017-1000456/" source="CVE"/>
		<reference ref_id="CVE-2017-14977" ref_url="https://www.suse.com/security/cve/CVE-2017-14977/" source="CVE"/>
		<reference ref_id="CVE-2017-15565" ref_url="https://www.suse.com/security/cve/CVE-2017-15565/" source="CVE"/>
		<description>
This update for poppler fixes the following issues:

- CVE-2017-14977: Fixed a NULL pointer dereference vulnerability in the
  FoFiTrueType::getCFFBlock() function in FoFiTrueType.cc that occurred due to
  lack of validation of a table pointer, which allows an attacker to launch a
  denial of service attack. (bsc#1061265)
- CVE-2017-1000456: Validate boundaries in TextPool::addWord to prevent
  overflows in subsequent calculations (bsc#1074453)
- CVE-2017-15565: Prevent NULL Pointer dereference in the
  GfxImageColorMap::getGrayLine() function via a crafted PDF document
  (bsc#1064593)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-14"/>
	<updated date="2018-06-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1061265">SUSE bug 1061265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064593">SUSE bug 1064593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074453">SUSE bug 1074453</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000456/">CVE-2017-1000456 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000456">CVE-2017-1000456 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14977/">CVE-2017-14977 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14977">CVE-2017-14977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15565/">CVE-2017-15565 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15565">CVE-2017-15565 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574387" comment="libpoppler-glib4-0.12.3-1.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574388" comment="libpoppler-qt4-3-0.12.3-1.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574389" comment="libpoppler5-0.12.3-1.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574390" comment="poppler-tools-0.12.3-1.13.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219295" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1045721" ref_url="https://bugzilla.suse.com/1045721" source="BUGZILLA"/>
		<reference ref_id="1131722" ref_url="https://bugzilla.suse.com/1131722" source="BUGZILLA"/>
		<reference ref_id="1142465" ref_url="https://bugzilla.suse.com/1142465" source="BUGZILLA"/>
		<reference ref_id="1179163" ref_url="https://bugzilla.suse.com/1179163" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9776" ref_url="https://www.suse.com/security/cve/CVE-2017-9776/" source="CVE"/>
		<reference ref_id="CVE-2019-10872" ref_url="https://www.suse.com/security/cve/CVE-2019-10872/" source="CVE"/>
		<reference ref_id="CVE-2019-9959" ref_url="https://www.suse.com/security/cve/CVE-2019-9959/" source="CVE"/>
		<reference ref_id="CVE-2020-27778" ref_url="https://www.suse.com/security/cve/CVE-2020-27778/" source="CVE"/>
		<description>
This update for poppler fixes the following issues:

- CVE-2020-27778: Fixed a buffer overflow in pdftohtml (bsc#1179163).
- CVE-2019-9959: Fixed an integer overflow in pdftocairo (bsc#1142465).
- CVE-2019-10872: Fixed an invalid memory access in pdftoppm (bsc#1131722).
- CVE-2017-9776: Prevent integer overflow that lead to a heap buffer overflow
  that allowed remote attackers to cause a denial of service (application crash)
  or possibly have unspecified other impact via a crafted PDF document
  (bsc#1045721).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-17"/>
	<updated date="2022-05-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1045721">SUSE bug 1045721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131722">SUSE bug 1131722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142465">SUSE bug 1142465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179163">SUSE bug 1179163</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9776/">CVE-2017-9776 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9776">CVE-2017-9776 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10872/">CVE-2019-10872 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10872">CVE-2019-10872 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9959/">CVE-2019-9959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9959">CVE-2019-9959 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27778/">CVE-2020-27778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27778">CVE-2020-27778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681124" comment="libpoppler-glib4-0.12.3-1.13.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681125" comment="libpoppler-qt4-3-0.12.3-1.13.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681126" comment="libpoppler5-0.12.3-1.13.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681127" comment="poppler-tools-0.12.3-1.13.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219296" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1140870" ref_url="https://bugzilla.suse.com/1140870" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13282" ref_url="https://www.suse.com/security/cve/CVE-2019-13282/" source="CVE"/>
		<description>
This update for poppler fixes the following issues:

  - CVE-2019-13282: Fixed heap-based buffer over-read in SampledFunction:transform in Function.cc (bsc#1140870).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-16"/>
	<updated date="2022-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1140870">SUSE bug 1140870</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13282/">CVE-2019-13282 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13282">CVE-2019-13282 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994000" comment="libpoppler-glib4-0.12.3-1.13.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994001" comment="libpoppler-qt4-3-0.12.3-1.13.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994002" comment="libpoppler5-0.12.3-1.13.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994003" comment="poppler-tools-0.12.3-1.13.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219297" version="1" class="patch">
	<metadata>
		<title>Security update for popt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="892431" ref_url="https://bugzilla.suse.com/892431" source="BUGZILLA"/>
		<reference ref_id="906803" ref_url="https://bugzilla.suse.com/906803" source="BUGZILLA"/>
		<reference ref_id="908128" ref_url="https://bugzilla.suse.com/908128" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6435" ref_url="https://www.suse.com/security/cve/CVE-2013-6435/" source="CVE"/>
		<reference ref_id="CVE-2014-8118" ref_url="https://www.suse.com/security/cve/CVE-2014-8118/" source="CVE"/>
		<description>

This rpm update fixes the following security and non security issues.

    * bnc#908128: check for bad invalid name sizes (CVE-2014-8118)
    * bnc#906803: create files with mode 0 (CVE-2013-6435)
    * bnc#892431: honor --noglob in install mode

Security Issues:

    * CVE-2014-8118
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8118&gt;
    * CVE-2013-6435
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6435&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-15"/>
	<updated date="2014-12-15"/>
	<bugzilla href="https://bugzilla.suse.com/892431">SUSE bug 892431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906803">SUSE bug 906803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908128">SUSE bug 908128</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6435/">CVE-2013-6435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6435">CVE-2013-6435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8118/">CVE-2014-8118 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8118">CVE-2014-8118 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580937" comment="popt-1.7-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580938" comment="popt-32bit-1.7-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580939" comment="popt-x86-1.7-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580940" comment="rpm-4.4.2.3-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563770" comment="rpm-32bit-4.4.2.3-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563773" comment="rpm-x86-4.4.2.3-37.60.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580937" comment="popt-1.7-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580938" comment="popt-32bit-1.7-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580939" comment="popt-x86-1.7-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580940" comment="rpm-4.4.2.3-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563770" comment="rpm-32bit-4.4.2.3-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563773" comment="rpm-x86-4.4.2.3-37.60.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580937" comment="popt-1.7-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580938" comment="popt-32bit-1.7-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580939" comment="popt-x86-1.7-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580940" comment="rpm-4.4.2.3-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563770" comment="rpm-32bit-4.4.2.3-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563773" comment="rpm-x86-4.4.2.3-37.60.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219298" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="949669" ref_url="https://bugzilla.suse.com/949669" source="BUGZILLA"/>
		<reference ref_id="949670" ref_url="https://bugzilla.suse.com/949670" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001887.html" source="SUSE-SU"/>
		<description>

This update of postgresql94 to 9.4.5 fixes the following issues:

* CVE-2015-5289: json or jsonb input values constructed from arbitrary user input could have crashed the PostgreSQL server and caused a denial of service (bsc#949670)
* CVE-2015-5288: crypt() (pgCrypto extension) couldi potentially be exploited to read a few additional bytes of memory (bsc#949669)

Also contains all changes and bugfixes in the upstream 9.4.5 release:
  http://www.postgresql.org/docs/current/static/release-9-4-5.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5288">CVE-2015-5288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5289">CVE-2015-5289 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580941" comment="libecpg6-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580942" comment="libpq5-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580943" comment="libpq5-32bit-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580944" comment="postgresql94-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580945" comment="postgresql94-contrib-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580946" comment="postgresql94-docs-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580947" comment="postgresql94-server-9.4.5-0.8.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580941" comment="libecpg6-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580942" comment="libpq5-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580943" comment="libpq5-32bit-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580944" comment="postgresql94-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580945" comment="postgresql94-contrib-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580946" comment="postgresql94-docs-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580947" comment="postgresql94-server-9.4.5-0.8.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580941" comment="libecpg6-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580942" comment="libpq5-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580943" comment="libpq5-32bit-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580944" comment="postgresql94-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580945" comment="postgresql94-contrib-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580946" comment="postgresql94-docs-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580947" comment="postgresql94-server-9.4.5-0.8.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219299" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql-init (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1062722" ref_url="https://bugzilla.suse.com/1062722" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14798" ref_url="https://www.suse.com/security/cve/CVE-2017-14798/" source="CVE"/>
		<description>
This update for postgresql-init fixes the following issues:

- CVE-2017-14798: A race condition in the init script could be used by attackers able to access the postgresql account to escalate their privileges to root (bsc#1062722)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-27"/>
	<updated date="2017-11-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062722">SUSE bug 1062722</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14798/">CVE-2017-14798 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14798">CVE-2017-14798 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574412" comment="postgresql-init-9.4-0.5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219300" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql-jdbc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172746" ref_url="https://bugzilla.suse.com/1172746" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13692" ref_url="https://www.suse.com/security/cve/CVE-2020-13692/" source="CVE"/>
		<description>
This update for postgresql-jdbc fixes the following issues:

- CVE-2020-13692: Fixed an XML external entity injection (XXE) (bsc#1172746).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-09"/>
	<updated date="2022-09-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172746">SUSE bug 1172746</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13692/">CVE-2020-13692 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13692">CVE-2020-13692 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994004" comment="postgresql-jdbc-9.1-0.2.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219301" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql-jdbc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1202170" ref_url="https://bugzilla.suse.com/1202170" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31197" ref_url="https://www.suse.com/security/cve/CVE-2022-31197/" source="CVE"/>
		<description>
This update for postgresql-jdbc fixes the following issues:

- CVE-2022-31197: Fixed SQL injection vulnerability (bsc#1202170).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-06"/>
	<updated date="2022-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202170">SUSE bug 1202170</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-31197/">CVE-2022-31197 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31197">CVE-2022-31197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994005" comment="postgresql-jdbc-9.1-0.2.19.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219302" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1108308" ref_url="https://bugzilla.suse.com/1108308" source="BUGZILLA"/>
		<description>

This update for postgresql10 brings version 10.6 to SUSE Linux Enterprise 11.


This release marks the change of the versioning scheme for PostgreSQL
to a 'x.y' format. This means the next minor releases of PostgreSQL
will be 10.1, 10.2, ... and the next major release will be 11.

* Logical Replication

Logical replication extends the current replication features of
PostgreSQL with the ability to send modifications on a per-database
and per-table level to different PostgreSQL databases. Users can now
fine-tune the data replicated to various database clusters and will
have the ability to perform zero-downtime upgrades to future major
PostgreSQL versions.

* Declarative Table Partitioning

Table partitioning has existed for years in PostgreSQL but required a
user to maintain a nontrivial set of rules and triggers for the
partitioning to work. PostgreSQL 10 introduces a table partitioning
syntax that lets users easily create and maintain range and list
partitioned tables.

* Improved Query Parallelism

PostgreSQL 10 provides better support for parallelized queries by
allowing more parts of the query execution process to be
parallelized. Improvements include additional types of data scans that
are parallelized as well as optimizations when the data is recombined,
such as pre-sorting. These enhancements allow results to be returned
more quickly.

* Quorum Commit for Synchronous Replication

PostgreSQL 10 introduces quorum commit for synchronous replication,
which allows for flexibility in how a primary database receives
acknowledgement that changes were successfully written to remote
replicas.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-10"/>
	<updated date="2019-01-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1108308">SUSE bug 1108308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574413" comment="libecpg6-10.6-0.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574414" comment="libpq5-10.6-0.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574415" comment="libpq5-32bit-10.6-0.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574416" comment="postgresql-init-10-0.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574417" comment="postgresql10-10.6-0.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574418" comment="postgresql10-contrib-10.6-0.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574419" comment="postgresql10-docs-10.6-0.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574420" comment="postgresql10-server-10.6-0.2.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219303" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1134689" ref_url="https://bugzilla.suse.com/1134689" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10130" ref_url="https://www.suse.com/security/cve/CVE-2019-10130/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

Security issue fixed:

- CVE-2019-10130: Prevent row-level security policies from being bypassed via selectivity estimators (bsc#1134689).

Bug fixes:

- For a complete list of fixes check the release notes.
  * https://www.postgresql.org/docs/10/release-10-8.html
  * https://www.postgresql.org/docs/10/release-10-7.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-18"/>
	<updated date="2019-06-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1134689">SUSE bug 1134689</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10130/">CVE-2019-10130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10130">CVE-2019-10130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574421" comment="libecpg6-10.8-0.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574422" comment="libpq5-10.8-0.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574423" comment="libpq5-32bit-10.8-0.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574424" comment="postgresql10-10.8-0.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574425" comment="postgresql10-contrib-10.8-0.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574426" comment="postgresql10-docs-10.8-0.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574427" comment="postgresql10-server-10.8-0.2.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219304" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1138034" ref_url="https://bugzilla.suse.com/1138034" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10164" ref_url="https://www.suse.com/security/cve/CVE-2019-10164/" source="CVE"/>
		<description>
This update for postgresql10 to version 10.9 fixes the following issues:

Security issue fixed:	  

- CVE-2019-10164: Fixed buffer-overflow vulnerabilities in SCRAM verifier parsing (bsc#1138034).

More information at https://www.postgresql.org/docs/10/release-10-9.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138034">SUSE bug 1138034</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10164/">CVE-2019-10164 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10164">CVE-2019-10164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574428" comment="libecpg6-10.9-0.2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574429" comment="libpq5-10.9-0.2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574430" comment="libpq5-32bit-10.9-0.2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574431" comment="postgresql10-10.9-0.2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574432" comment="postgresql10-contrib-10.9-0.2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574433" comment="postgresql10-docs-10.9-0.2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574434" comment="postgresql10-server-10.9-0.2.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219305" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1145092" ref_url="https://bugzilla.suse.com/1145092" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

Security issue fixed:

- CVE-2019-10208: Fixed arbitrary SQL execution via suitable SECURITY DEFINER function under the identity of the function owner (bsc#1145092).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-17"/>
	<updated date="2019-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145092">SUSE bug 1145092</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-10208">CVE-2019-10208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574435" comment="libecpg6-10.10-0.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574436" comment="libpq5-10.10-0.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574437" comment="libpq5-32bit-10.10-0.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574438" comment="postgresql10-10.10-0.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574439" comment="postgresql10-contrib-10.10-0.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574440" comment="postgresql10-devel-10.10-0.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574441" comment="postgresql10-docs-10.10-0.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574442" comment="postgresql10-server-10.10-0.2.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219306" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1163985" ref_url="https://bugzilla.suse.com/1163985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

PostgreSQL was updated to version 10.12.

Security issue fixed:

- CVE-2020-1720: Fixed a missing authorization check in the ALTER ... DEPENDS ON extension (bsc#1163985).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-05"/>
	<updated date="2020-03-05"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1163985">SUSE bug 1163985</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1720">CVE-2020-1720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574443" comment="libecpg6-10.12-0.2.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574444" comment="libpq5-10.12-0.2.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574445" comment="libpq5-32bit-10.12-0.2.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574446" comment="postgresql10-10.12-0.2.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574447" comment="postgresql10-contrib-10.12-0.2.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574448" comment="postgresql10-devel-10.12-0.2.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574449" comment="postgresql10-docs-10.12-0.2.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574450" comment="postgresql10-server-10.12-0.2.18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219307" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1171924" ref_url="https://bugzilla.suse.com/1171924" source="BUGZILLA"/>
		<reference ref_id="1175193" ref_url="https://bugzilla.suse.com/1175193" source="BUGZILLA"/>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

- update to 10.14:
  * CVE-2020-14349, bsc#1175193: Set a secure search_path in
    logical replication walsenders and apply workers
  * CVE-2020-14350, bsc#1175194: Make contrib modules' installation
    scripts more secure.
  * https://www.postgresql.org/docs/10/release-10-14.html
- update to 10.13 (bsc#1171924).
  https://www.postgresql.org/about/news/2038/
  https://www.postgresql.org/docs/10/release-10-13.html
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-18"/>
	<updated date="2020-08-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171924">SUSE bug 1171924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14349">CVE-2020-14349 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14350">CVE-2020-14350 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574451" comment="libecpg6-10.14-0.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574452" comment="libpq5-10.14-0.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574453" comment="libpq5-32bit-10.14-0.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574454" comment="postgresql10-10.14-0.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574455" comment="postgresql10-contrib-10.14-0.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574456" comment="postgresql10-devel-10.14-0.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574457" comment="postgresql10-docs-10.14-0.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574458" comment="postgresql10-server-10.14-0.2.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219308" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

- Upgrade to version 10.15:
  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/10/release-10-15.html

- Upgrade to version 10.15:
  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/10/release-10-15.html
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574459" comment="libecpg6-10.15-0.2.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574460" comment="libpq5-10.15-0.2.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574461" comment="libpq5-32bit-10.15-0.2.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574462" comment="postgresql10-10.15-0.2.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574463" comment="postgresql10-contrib-10.15-0.2.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574464" comment="postgresql10-devel-10.15-0.2.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574465" comment="postgresql10-docs-10.15-0.2.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574466" comment="postgresql10-server-10.15-0.2.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219309" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185924" ref_url="https://bugzilla.suse.com/1185924" source="BUGZILLA"/>
		<reference ref_id="1185925" ref_url="https://bugzilla.suse.com/1185925" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

- Upgrade to version 10.17:
- CVE-2021-32027: Fixed integer overflows in array subscripting calculations (bsc#1185924).
- CVE-2021-32028: Fixed mishandling of junk columns in INSERT ... ON CONFLICT ... UPDATE target lists (bsc#1185925).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-27"/>
	<updated date="2021-05-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185924">SUSE bug 1185924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185925">SUSE bug 1185925</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32028">CVE-2021-32028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574467" comment="libecpg6-10.17-0.2.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574468" comment="libpq5-10.17-0.2.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574469" comment="libpq5-32bit-10.17-0.2.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574470" comment="postgresql10-10.17-0.2.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574471" comment="postgresql10-contrib-10.17-0.2.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574472" comment="postgresql10-devel-10.17-0.2.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574473" comment="postgresql10-docs-10.17-0.2.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574474" comment="postgresql10-server-10.17-0.2.30.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219310" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:
          
- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656585" comment="libecpg6-10.19-0.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656586" comment="libpq5-10.19-0.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656587" comment="libpq5-32bit-10.19-0.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656588" comment="postgresql10-10.19-0.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656589" comment="postgresql10-contrib-10.19-0.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656590" comment="postgresql10-devel-10.19-0.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656591" comment="postgresql10-docs-10.19-0.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656592" comment="postgresql10-server-10.19-0.2.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219311" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199475" ref_url="https://bugzilla.suse.com/1199475" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:
 
- CVE-2022-1552: Confine additional operations within 'security restricted operation' sandboxes (bsc#1199475).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199475">SUSE bug 1199475</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994006" comment="libecpg6-10.21-0.2.42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994007" comment="libpq5-10.21-0.2.42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994008" comment="libpq5-32bit-10.21-0.2.42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994009" comment="postgresql10-10.21-0.2.42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994010" comment="postgresql10-contrib-10.21-0.2.42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994011" comment="postgresql10-devel-10.21-0.2.42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994012" comment="postgresql10-docs-10.21-0.2.42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994013" comment="postgresql10-server-10.21-0.2.42.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219312" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1202368" ref_url="https://bugzilla.suse.com/1202368" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2625" ref_url="https://www.suse.com/security/cve/CVE-2022-2625/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

- Upgrade to 10.22:
- CVE-2022-2625: Fixed an issue where extension scripts would replace objects not belonging to that extension (bsc#1202368).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-26"/>
	<updated date="2022-08-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202368">SUSE bug 1202368</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2625/">CVE-2022-2625 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2625">CVE-2022-2625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994014" comment="libecpg6-10.22-0.2.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994015" comment="libpq5-10.22-0.2.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994016" comment="libpq5-32bit-10.22-0.2.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994017" comment="postgresql10-10.22-0.2.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994018" comment="postgresql10-contrib-10.22-0.2.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994019" comment="postgresql10-devel-10.22-0.2.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994020" comment="postgresql10-docs-10.22-0.2.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994021" comment="postgresql10-server-10.22-0.2.46.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219313" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql91</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="916953" ref_url="https://bugzilla.suse.com/916953" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8161" ref_url="https://www.suse.com/security/cve/CVE-2014-8161/" source="CVE"/>
		<reference ref_id="CVE-2015-0241" ref_url="https://www.suse.com/security/cve/CVE-2015-0241/" source="CVE"/>
		<reference ref_id="CVE-2015-0243" ref_url="https://www.suse.com/security/cve/CVE-2015-0243/" source="CVE"/>
		<reference ref_id="CVE-2015-0244" ref_url="https://www.suse.com/security/cve/CVE-2015-0244/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001321.html" source="SUSE-SU"/>
		<description>

The PostgreSQL database server was updated to 9.1.15, fixing bugs and 
security issues:

    * Fix buffer overruns in to_char() (CVE-2015-0241).
    * Fix buffer overrun in replacement *printf() functions
      (CVE-2015-0242).
    * Fix buffer overruns in contrib/pgcrypto (CVE-2015-0243).
    * Fix possible loss of frontend/backend protocol synchronization after
      an error (CVE-2015-0244).
    * Fix information leak via constraint-violation error messages
      (CVE-2014-8161).

For a comprehensive list of fixes, please refer to the following release 
notes:

    * http://www.postgresql.org/docs/9.1/static/release-9-1-15.html
      &lt;http://www.postgresql.org/docs/9.1/static/release-9-1-15.html&gt;
    * http://www.postgresql.org/docs/9.1/static/release-9-1-14.html
      &lt;http://www.postgresql.org/docs/9.1/static/release-9-1-14.html&gt;
    * http://www.postgresql.org/docs/9.1/static/release-9-1-13.html
      &lt;http://www.postgresql.org/docs/9.1/static/release-9-1-13.html&gt;

Security Issues:

    * CVE-2015-0241
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241&gt;
    * CVE-2015-0243
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243&gt;
    * CVE-2015-0244
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244&gt;
    * CVE-2014-8161
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-02"/>
	<updated date="2015-03-02"/>
	<bugzilla href="https://bugzilla.suse.com/916953">SUSE bug 916953</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8161/">CVE-2014-8161 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8161">CVE-2014-8161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0241/">CVE-2015-0241 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0241">CVE-2015-0241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0243/">CVE-2015-0243 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0243">CVE-2015-0243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0244/">CVE-2015-0244 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0244">CVE-2015-0244 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580948" comment="libecpg6-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580949" comment="libpq5-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580950" comment="libpq5-32bit-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580951" comment="postgresql91-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580952" comment="postgresql91-contrib-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580953" comment="postgresql91-docs-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580954" comment="postgresql91-server-9.1.15-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580948" comment="libecpg6-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580949" comment="libpq5-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580950" comment="libpq5-32bit-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580951" comment="postgresql91-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580952" comment="postgresql91-contrib-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580953" comment="postgresql91-docs-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580954" comment="postgresql91-server-9.1.15-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580948" comment="libecpg6-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580949" comment="libpq5-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580950" comment="libpq5-32bit-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580951" comment="postgresql91-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580952" comment="postgresql91-contrib-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580953" comment="postgresql91-docs-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580954" comment="postgresql91-server-9.1.15-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219314" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql91</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="907651" ref_url="https://bugzilla.suse.com/907651" source="BUGZILLA"/>
		<reference ref_id="931972" ref_url="https://bugzilla.suse.com/931972" source="BUGZILLA"/>
		<reference ref_id="931973" ref_url="https://bugzilla.suse.com/931973" source="BUGZILLA"/>
		<reference ref_id="931974" ref_url="https://bugzilla.suse.com/931974" source="BUGZILLA"/>
		<reference ref_id="932040" ref_url="https://bugzilla.suse.com/932040" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3165" ref_url="https://www.suse.com/security/cve/CVE-2015-3165/" source="CVE"/>
		<reference ref_id="CVE-2015-3166" ref_url="https://www.suse.com/security/cve/CVE-2015-3166/" source="CVE"/>
		<reference ref_id="CVE-2015-3167" ref_url="https://www.suse.com/security/cve/CVE-2015-3167/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001446.html" source="SUSE-SU"/>
		<description>

This update provides PostgreSQL 9.1.18, which brings fixes for security 
issues and other enhancements.

The following vulnerabilities have been fixed:

    * CVE-2015-3165: Avoid possible crash when client disconnects.
      (bsc#931972)
    * CVE-2015-3166: Consistently check for failure of the *printf().
      (bsc#931973)
    * CVE-2015-3167: In contrib/pgcrypto, uniformly report decryption
      failures. (bsc#931974)

For a comprehensive list of changes, please refer to 
http://www.postgresql.org/docs/9.1/static/release-9-1-18.html
&lt;http://www.postgresql.org/docs/9.1/static/release-9-1-18.html&gt; .

This update also includes changes in PostgreSQL's packaging to prepare for 
the migration to the new major version 9.4. (FATE#316970, bsc#907651)

Security Issues:

    * CVE-2015-3165
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3165&gt;
    * CVE-2015-3166
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3166&gt;
    * CVE-2015-3167
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3167&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-11"/>
	<updated date="2015-06-11"/>
	<bugzilla href="https://bugzilla.suse.com/907651">SUSE bug 907651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931972">SUSE bug 931972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931973">SUSE bug 931973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931974">SUSE bug 931974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932040">SUSE bug 932040</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3165/">CVE-2015-3165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3165">CVE-2015-3165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3166/">CVE-2015-3166 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3166">CVE-2015-3166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3167/">CVE-2015-3167 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3167">CVE-2015-3167 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580955" comment="postgresql91-9.1.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580956" comment="postgresql91-contrib-9.1.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580957" comment="postgresql91-docs-9.1.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580958" comment="postgresql91-server-9.1.18-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580955" comment="postgresql91-9.1.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580956" comment="postgresql91-contrib-9.1.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580957" comment="postgresql91-docs-9.1.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580958" comment="postgresql91-server-9.1.18-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580955" comment="postgresql91-9.1.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580956" comment="postgresql91-contrib-9.1.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580957" comment="postgresql91-docs-9.1.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580958" comment="postgresql91-server-9.1.18-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219315" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql91 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="949669" ref_url="https://bugzilla.suse.com/949669" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001862.html" source="SUSE-SU"/>
		<description>

This update of postgresql91 to 9.1.19 fixes the following issues:

* CVE-2015-5288: crypt() (pgCrypto extension) couldi potentially be exploited to read a few additional bytes of memory (bsc#949669)

Also contains all changes and bugfixes in the upstream 9.1.19 release:
http://www.postgresql.org/docs/9.1/static/release-9-1-19.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-09"/>
	<updated date="2016-02-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5288">CVE-2015-5288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580959" comment="postgresql91-9.1.19-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580960" comment="postgresql91-contrib-9.1.19-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580961" comment="postgresql91-docs-9.1.19-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580962" comment="postgresql91-server-9.1.19-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580959" comment="postgresql91-9.1.19-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580960" comment="postgresql91-contrib-9.1.19-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580961" comment="postgresql91-docs-9.1.19-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580962" comment="postgresql91-server-9.1.19-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580959" comment="postgresql91-9.1.19-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580960" comment="postgresql91-contrib-9.1.19-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580961" comment="postgresql91-docs-9.1.19-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580962" comment="postgresql91-server-9.1.19-0.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219316" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="949669" ref_url="https://bugzilla.suse.com/949669" source="BUGZILLA"/>
		<reference ref_id="949670" ref_url="https://bugzilla.suse.com/949670" source="BUGZILLA"/>
		<reference ref_id="966435" ref_url="https://bugzilla.suse.com/966435" source="BUGZILLA"/>
		<reference ref_id="966436" ref_url="https://bugzilla.suse.com/966436" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-0766" ref_url="https://www.suse.com/security/cve/CVE-2016-0766/" source="CVE"/>
		<reference ref_id="CVE-2016-0773" ref_url="https://www.suse.com/security/cve/CVE-2016-0773/" source="CVE"/>
		<description>

This update for postgresql94 fixes the following issues: 

- Security and bugfix release 9.4.6:
  * *** IMPORTANT ***
    Users of version 9.4 will need to reindex any jsonb_path_ops
    indexes they have created, in order to fix a persistent issue
    with missing index entries.
  * Fix infinite loops and buffer-overrun problems in regular
    expressions (CVE-2016-0773, bsc#966436).
  * Fix regular-expression compiler to handle loops of constraint
    arcs (CVE-2007-4772).
  * Prevent certain PL/Java parameters from being set by
    non-superusers (CVE-2016-0766, bsc#966435).
  * Fix many issues in pg_dump with specific object types
  * Prevent over-eager pushdown of HAVING clauses for
    GROUPING SETS
  * Fix deparsing error with ON CONFLICT ... WHERE clauses
  * Fix tableoid errors for postgres_fdw
  * Prevent floating-point exceptions in pgbench
  * Make \det search Foreign Table names consistently
  * Fix quoting of domain constraint names in pg_dump
  * Prevent putting expanded objects into Const nodes
  * Allow compile of PL/Java on Windows
  * Fix 'unresolved symbol' errors in PL/Python execution
  * Allow Python2 and Python3 to be used in the same database
  * Add support for Python 3.5 in PL/Python
  * Fix issue with subdirectory creation during initdb
  * Make pg_ctl report status correctly on Windows
  * Suppress confusing error when using pg_receivexlog with older
    servers
  * Multiple documentation corrections and additions
  * Fix erroneous hash calculations in gin_extract_jsonb_path()
- For the full release notse, see:
  http://www.postgresql.org/docs/9.4/static/release-9-4-6.html

- Security and bugfix release 9.4.5:
  * CVE-2015-5289, bsc#949670: json or jsonb input values
    constructed from arbitrary user input can crash the PostgreSQL
    server and cause a denial of service.
  * CVE-2015-5288, bsc#949669: The crypt() function included with
    the optional pgCrypto extension could be exploited to read a
    few additional bytes of memory. No working exploit for this
    issue has been developed.
- For the full release notse, see:
  http://www.postgresql.org/docs/current/static/release-9-4-5.html
- Relax dependency on libpq to major version.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-07"/>
	<updated date="2016-03-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966435">SUSE bug 966435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966436">SUSE bug 966436</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4772">CVE-2007-4772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5288">CVE-2015-5288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5289">CVE-2015-5289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0766/">CVE-2016-0766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0766">CVE-2016-0766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0773/">CVE-2016-0773 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0773">CVE-2016-0773 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574489" comment="libecpg6-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574490" comment="libpq5-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567425" comment="libpq5-32bit-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574491" comment="postgresql94-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574492" comment="postgresql94-contrib-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574493" comment="postgresql94-docs-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574494" comment="postgresql94-server-9.4.6-0.14.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219317" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="993453" ref_url="https://bugzilla.suse.com/993453" source="BUGZILLA"/>
		<reference ref_id="993454" ref_url="https://bugzilla.suse.com/993454" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5423" ref_url="https://www.suse.com/security/cve/CVE-2016-5423/" source="CVE"/>
		<reference ref_id="CVE-2016-5424" ref_url="https://www.suse.com/security/cve/CVE-2016-5424/" source="CVE"/>
		<description>
This update for postgresql94 to version 9.4.9 fixes the several issues.

These security issues were fixed:
- CVE-2016-5423: CASE/WHEN with inlining can cause untrusted pointer dereference (bsc#993454).
- CVE-2016-5424: Fix client programs' handling of special characters in database and role names (bsc#993453).

For the non-security issues please refer to 
- http://www.postgresql.org/docs/9.4/static/release-9-4-9.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-8.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-7.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-29"/>
	<updated date="2016-09-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/993453">SUSE bug 993453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993454">SUSE bug 993454</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5423/">CVE-2016-5423 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5423">CVE-2016-5423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5424/">CVE-2016-5424 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5424">CVE-2016-5424 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574495" comment="libecpg6-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574496" comment="libpq5-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574497" comment="libpq5-32bit-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574498" comment="postgresql94-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574499" comment="postgresql94-contrib-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574500" comment="postgresql94-docs-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574501" comment="postgresql94-server-9.4.9-0.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219318" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1029547" ref_url="https://bugzilla.suse.com/1029547" source="BUGZILLA"/>
		<reference ref_id="1037603" ref_url="https://bugzilla.suse.com/1037603" source="BUGZILLA"/>
		<reference ref_id="1037624" ref_url="https://bugzilla.suse.com/1037624" source="BUGZILLA"/>
		<reference ref_id="1038293" ref_url="https://bugzilla.suse.com/1038293" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7484" ref_url="https://www.suse.com/security/cve/CVE-2017-7484/" source="CVE"/>
		<reference ref_id="CVE-2017-7485" ref_url="https://www.suse.com/security/cve/CVE-2017-7485/" source="CVE"/>
		<reference ref_id="CVE-2017-7486" ref_url="https://www.suse.com/security/cve/CVE-2017-7486/" source="CVE"/>
		<description>

This update for postgresql93 fixes the following issues:

- bsc#1029547: Fix tests with timezone 2017a 
- CVE-2017-7486: Restrict visibility of
    pg_user_mappings.umoptions, to protect passwords stored as
    user mapping options. (bsc#1037624) 
- CVE-2017-7485: Recognize PGREQUIRESSL variable again. (bsc#1038293)
- CVE-2017-7484: Prevent exposure of statistical information via leaky operators. (bsc#1037603)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-05"/>
	<updated date="2017-07-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029547">SUSE bug 1029547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037603">SUSE bug 1037603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037624">SUSE bug 1037624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038293">SUSE bug 1038293</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7484/">CVE-2017-7484 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7484">CVE-2017-7484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7485/">CVE-2017-7485 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7485">CVE-2017-7485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7486/">CVE-2017-7486 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7486">CVE-2017-7486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574502" comment="libecpg6-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574503" comment="libpq5-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574504" comment="libpq5-32bit-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574505" comment="postgresql94-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574506" comment="postgresql94-contrib-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574507" comment="postgresql94-docs-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574508" comment="postgresql94-server-9.4.12-0.22.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219319" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1051684" ref_url="https://bugzilla.suse.com/1051684" source="BUGZILLA"/>
		<reference ref_id="1051685" ref_url="https://bugzilla.suse.com/1051685" source="BUGZILLA"/>
		<reference ref_id="1053259" ref_url="https://bugzilla.suse.com/1053259" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7546" ref_url="https://www.suse.com/security/cve/CVE-2017-7546/" source="CVE"/>
		<reference ref_id="CVE-2017-7547" ref_url="https://www.suse.com/security/cve/CVE-2017-7547/" source="CVE"/>
		<reference ref_id="CVE-2017-7548" ref_url="https://www.suse.com/security/cve/CVE-2017-7548/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003158.html" source="SUSE-SU"/>
		<description>
Postgresql94 was updated to 9.4.13 to fix the following issues:

* CVE-2017-7547: Further restrict visibility of pg_user_mappings.umoptions, to protect passwords stored as user mapping options. (bsc#1051685)
* CVE-2017-7546: Disallow empty passwords in all password-based authentication methods. (bsc#1051684)
* CVE-2017-7548: lo_put() function ignores ACLs. (bsc#1053259)

The changelog for this release is here:
	https://www.postgresql.org/docs/9.4/static/release-9-4-13.html

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-25"/>
	<updated date="2017-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051684">SUSE bug 1051684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051685">SUSE bug 1051685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053259">SUSE bug 1053259</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7546/">CVE-2017-7546 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7546">CVE-2017-7546 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7547/">CVE-2017-7547 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7547">CVE-2017-7547 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7548/">CVE-2017-7548 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7548">CVE-2017-7548 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580963" comment="libecpg6-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580964" comment="libpq5-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580965" comment="libpq5-32bit-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580966" comment="postgresql94-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580967" comment="postgresql94-contrib-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580968" comment="postgresql94-docs-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580969" comment="postgresql94-server-9.4.13-0.23.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580963" comment="libecpg6-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580964" comment="libpq5-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580965" comment="libpq5-32bit-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580966" comment="postgresql94-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580967" comment="postgresql94-contrib-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580968" comment="postgresql94-docs-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580969" comment="postgresql94-server-9.4.13-0.23.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219320" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1062538" ref_url="https://bugzilla.suse.com/1062538" source="BUGZILLA"/>
		<reference ref_id="1067844" ref_url="https://bugzilla.suse.com/1067844" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12172" ref_url="https://www.suse.com/security/cve/CVE-2017-12172/" source="CVE"/>
		<reference ref_id="CVE-2017-15098" ref_url="https://www.suse.com/security/cve/CVE-2017-15098/" source="CVE"/>
		<description>
This update for postgresql94 fixes the following issues:

Security issues fixed:

- CVE-2017-15098: Fix crash due to rowtype mismatch in json{b}_populate_recordset() (bsc#1067844).
- CVE-2017-12172: Start scripts permit database administrator to modify root-owned files. This issue did not affect SUSE (bsc#1062538).

Bug fixes:

- Update to version 9.4.15
  * https://www.postgresql.org/docs/9.4/static/release-9-4-15.html
  * https://www.postgresql.org/docs/9.4/static/release-9-4-14.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062538">SUSE bug 1062538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067844">SUSE bug 1067844</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12172/">CVE-2017-12172 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12172">CVE-2017-12172 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15098/">CVE-2017-15098 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15098">CVE-2017-15098 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574516" comment="libecpg6-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574517" comment="libpq5-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574518" comment="libpq5-32bit-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574519" comment="postgresql94-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574520" comment="postgresql94-contrib-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574521" comment="postgresql94-docs-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574522" comment="postgresql94-server-9.4.15-0.23.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219321" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1077983" ref_url="https://bugzilla.suse.com/1077983" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1053" ref_url="https://www.suse.com/security/cve/CVE-2018-1053/" source="CVE"/>
		<description>
This update for postgresql94 fixes the following issues:

PostgreSQL was updated to version 9.4.16, full release notes:

	https://www.postgresql.org/docs/9.4/static/release-9-4-16.html

Security issues fixed:

- CVE-2018-1053: Ensure that all temporary files made by pg_upgrade are non-world-readable. (bsc#1077983)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-21"/>
	<updated date="2018-02-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077983">SUSE bug 1077983</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1053/">CVE-2018-1053 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1053">CVE-2018-1053 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574523" comment="libecpg6-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574524" comment="libpq5-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574525" comment="libpq5-32bit-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574526" comment="postgresql94-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574527" comment="postgresql94-contrib-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574528" comment="postgresql94-docs-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574529" comment="postgresql94-server-9.4.16-0.23.13.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219322" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1081925" ref_url="https://bugzilla.suse.com/1081925" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1058" ref_url="https://www.suse.com/security/cve/CVE-2018-1058/" source="CVE"/>
		<description>
This update for postgresql94 fixes the following issues:

Security issues fixed:

- CVE-2018-1058: Fixed uncontrolled search path element in pg_dump and other client applications (bsc#1081925).


Bug fixes:

- See release notes for details:
  * https://www.postgresql.org/docs/9.4/static/release-9-4-17.html
  * https://www.postgresql.org/docs/9.4/static/release-9-4-16.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-21"/>
	<updated date="2018-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081925">SUSE bug 1081925</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1058/">CVE-2018-1058 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1058">CVE-2018-1058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574530" comment="libecpg6-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574531" comment="libpq5-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574532" comment="libpq5-32bit-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574533" comment="postgresql94-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574534" comment="postgresql94-contrib-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574535" comment="postgresql94-docs-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574536" comment="postgresql94-server-9.4.17-0.23.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219323" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1104199" ref_url="https://bugzilla.suse.com/1104199" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10915" ref_url="https://www.suse.com/security/cve/CVE-2018-10915/" source="CVE"/>
		<description>
This update for postgresql94 fixes the following issues:

postgresql was updated to 9.4.19:

  https://www.postgresql.org/docs/current/static/release-9-4-19.html
  * CVE-2018-10915, bsc#1104199: Fix failure to reset libpq's state
    fully between connection attempts.

postgresql was updated to 9.4.18:

- https://www.postgresql.org/about/news/1851/
- https://www.postgresql.org/docs/current/static/release-9-4-18.html
  A dump/restore is not required for those running 9.4.X.
  However, if the function marking mistakes mentioned in the first
  changelog entry below affect you, you will want to take steps to
  correct your database catalogs.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-22"/>
	<updated date="2018-10-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104199">SUSE bug 1104199</bugzilla>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10915/">CVE-2018-10915 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10915">CVE-2018-10915 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574537" comment="libecpg6-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574538" comment="libpq5-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574539" comment="libpq5-32bit-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574540" comment="postgresql94-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574541" comment="postgresql94-contrib-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574542" comment="postgresql94-docs-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574543" comment="postgresql94-server-9.4.19-0.23.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219324" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1145092" ref_url="https://bugzilla.suse.com/1145092" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<description>
This update for postgresql94 fixes the following issues:

Security issue fixed:

- CVE-2019-10208: Fixed arbitrary SQL execution via suitable SECURITY DEFINER function under the identity of the function owner (bsc#1145092).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145092">SUSE bug 1145092</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-10208">CVE-2019-10208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574544" comment="postgresql94-9.4.24-0.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574545" comment="postgresql94-contrib-9.4.24-0.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574546" comment="postgresql94-devel-9.4.24-0.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574547" comment="postgresql94-docs-9.4.24-0.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574548" comment="postgresql94-server-9.4.24-0.23.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219325" version="1" class="patch">
	<metadata>
		<title>Security update for powerpc-utils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="879310" ref_url="https://bugzilla.suse.com/879310" source="BUGZILLA"/>
		<reference ref_id="879839" ref_url="https://bugzilla.suse.com/879839" source="BUGZILLA"/>
		<reference ref_id="883174" ref_url="https://bugzilla.suse.com/883174" source="BUGZILLA"/>
		<reference ref_id="901216" ref_url="https://bugzilla.suse.com/901216" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4040" ref_url="https://www.suse.com/security/cve/CVE-2014-4040/" source="CVE"/>
		<reference ref_id="SUSE-RU-2015:0574-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-March/002806.html" source="SUSE-SU"/>
		<description>

The 'snap' system information collection tool of the PowerPC Utils package 
collected fstab and yaboot.conf files which might contain passwords. 
(CVE-2014-4040)

As these files are of interest, we now print a warning that the user of the 
'snap' tool should check if private passwords are in those files.

Security Issues:

    * CVE-2014-4040
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4040&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-12"/>
	<updated date="2014-09-12"/>
	<bugzilla href="https://bugzilla.suse.com/879310">SUSE bug 879310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879839">SUSE bug 879839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883174">SUSE bug 883174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901216">SUSE bug 901216</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4040/">CVE-2014-4040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4040">CVE-2014-4040 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580970" comment="powerpc-utils-1.2.16-0.13.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580970" comment="powerpc-utils-1.2.16-0.13.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219326" version="1" class="patch">
	<metadata>
		<title>Security update for ppc64-diag</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="882667" ref_url="https://bugzilla.suse.com/882667" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4038" ref_url="https://www.suse.com/security/cve/CVE-2014-4038/" source="CVE"/>
		<reference ref_id="CVE-2014-4039" ref_url="https://www.suse.com/security/cve/CVE-2014-4039/" source="CVE"/>
		<description>

ppc64-diag has been updated to prevent the usage of predictable filenames 
in /tmp in various scripts and daemons (CVE-2014-4038) Also the snapshot 
tarball was previously generated world readable, which could have leaked 
sensible information, which is only visible to root, to all users. It is 
now readable for root only (CVE-2014-4039).

Security Issues:

    * CVE-2014-4038
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4038&gt;
    * CVE-2014-4039
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4039&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-21"/>
	<updated date="2014-07-21"/>
	<bugzilla href="https://bugzilla.suse.com/882667">SUSE bug 882667</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4038/">CVE-2014-4038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4038">CVE-2014-4038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4039/">CVE-2014-4039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4039">CVE-2014-4039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580971" comment="ppc64-diag-2.6.1-0.14.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580971" comment="ppc64-diag-2.6.1-0.14.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219327" version="1" class="patch">
	<metadata>
		<title>Security update for ppp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="891489" ref_url="https://bugzilla.suse.com/891489" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3158" ref_url="https://www.suse.com/security/cve/CVE-2014-3158/" source="CVE"/>
		<description>

This ppp update fixes a potential security issue that an unprivileged 
attacker could access privileged options:

    * integer overflow in option parsing (CVE-2014-3158, bnc#891489)

Security Issues:

    * CVE-2014-3158
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3158&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-26"/>
	<updated date="2014-08-26"/>
	<bugzilla href="https://bugzilla.suse.com/891489">SUSE bug 891489</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3158/">CVE-2014-3158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3158">CVE-2014-3158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580972" comment="ppp-2.4.5.git-2.29.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580972" comment="ppp-2.4.5.git-2.29.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580972" comment="ppp-2.4.5.git-2.29.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219328" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="927841" ref_url="https://bugzilla.suse.com/927841" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3310" ref_url="https://www.suse.com/security/cve/CVE-2015-3310/" source="CVE"/>
		<description>
The ppp package was updated to fix the following security issue:

- CVE-2015-3310: Fixed a buffer overflow in radius plug-in's rc_mksid() (bsc#927841).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/927841">SUSE bug 927841</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3310/">CVE-2015-3310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3310">CVE-2015-3310 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574549" comment="ppp-2.4.5.git-2.31.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219329" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1162610" ref_url="https://bugzilla.suse.com/1162610" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8597" ref_url="https://www.suse.com/security/cve/CVE-2020-8597/" source="CVE"/>
		<description>
This update for ppp fixes the following security issue:

- CVE-2020-8597: Fixed a buffer overflow in the eap_request and eap_response functions (bsc#1162610).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-25"/>
	<updated date="2020-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162610">SUSE bug 1162610</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-8597/">CVE-2020-8597 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8597">CVE-2020-8597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574550" comment="ppp-2.4.5.git-2.32.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219330" version="1" class="patch">
	<metadata>
		<title>Security update for procmail</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="894999" ref_url="https://bugzilla.suse.com/894999" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3618" ref_url="https://www.suse.com/security/cve/CVE-2014-3618/" source="CVE"/>
		<description>

procmail was updated to fix a security issue in its formail helper.

    * When formail processed specially crafted e-mail headers a heap
      corruption could be triggered, which would lead to a crash of
      formail. (CVE-2014-3618)

Security Issues:

    * CVE-2014-3618
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3618&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-04"/>
	<updated date="2014-09-04"/>
	<bugzilla href="https://bugzilla.suse.com/894999">SUSE bug 894999</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3618/">CVE-2014-3618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3618">CVE-2014-3618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580973" comment="procmail-3.22-240.8.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580973" comment="procmail-3.22-240.8.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580973" comment="procmail-3.22-240.8.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219331" version="1" class="patch">
	<metadata>
		<title>Security update for procmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1068648" ref_url="https://bugzilla.suse.com/1068648" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16844" ref_url="https://www.suse.com/security/cve/CVE-2017-16844/" source="CVE"/>
		<description>
This update for procmail fixes the following issues:

Security issue fixed:

- CVE-2017-16844: Heap-based buffer overflow in the loadbuf function in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted e-mail message because of a hardcoded realloc size, a different vulnerability than CVE-2014-3618. (bnc#1068648)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-07"/>
	<updated date="2017-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068648">SUSE bug 1068648</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16844/">CVE-2017-16844 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16844">CVE-2017-16844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574552" comment="procmail-3.22-240.8.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219332" version="1" class="patch">
	<metadata>
		<title>Security update for procps (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1092100" ref_url="https://bugzilla.suse.com/1092100" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122/" source="CVE"/>
		<reference ref_id="CVE-2018-1123" ref_url="https://www.suse.com/security/cve/CVE-2018-1123/" source="CVE"/>
		<reference ref_id="CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124/" source="CVE"/>
		<reference ref_id="CVE-2018-1125" ref_url="https://www.suse.com/security/cve/CVE-2018-1125/" source="CVE"/>
		<reference ref_id="CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126/" source="CVE"/>
		<description>
This update for procps fixes the following security issues:

- CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top
  with HOME unset in an attacker-controlled directory, the attacker could have
  achieved privilege escalation by exploiting one of several vulnerabilities in
  the config_file() function (bsc#1092100).
- CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow.
  Inbuilt protection in ps maped a guard page at the end of the overflowed
  buffer, ensuring that the impact of this flaw is limited to a crash (temporary
  denial of service) (bsc#1092100).
- CVE-2018-1124: Prevent multiple integer overflows leading to a heap
  corruption in file2strvec function. This allowed a privilege escalation for a
  local attacker who can create entries in procfs by starting processes, which
  could result in crashes or arbitrary code execution in proc utilities run by
  other users (bsc#1092100).
- CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was
  mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).
- CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent
  truncation/integer overflow issues (bsc#1092100).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-23"/>
	<updated date="2018-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1122">CVE-2018-1122 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1123/">CVE-2018-1123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1123">CVE-2018-1123 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1124">CVE-2018-1124 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1125/">CVE-2018-1125 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1125">CVE-2018-1125 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1126">CVE-2018-1126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580974" comment="procps-3.2.7-152.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219333" version="1" class="patch">
	<metadata>
		<title>Security update for puppet</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="825878" ref_url="https://bugzilla.suse.com/825878" source="BUGZILLA"/>
		<reference ref_id="835122" ref_url="https://bugzilla.suse.com/835122" source="BUGZILLA"/>
		<reference ref_id="835848" ref_url="https://bugzilla.suse.com/835848" source="BUGZILLA"/>
		<reference ref_id="835891" ref_url="https://bugzilla.suse.com/835891" source="BUGZILLA"/>
		<reference ref_id="853982" ref_url="https://bugzilla.suse.com/853982" source="BUGZILLA"/>
		<reference ref_id="856843" ref_url="https://bugzilla.suse.com/856843" source="BUGZILLA"/>
		<reference ref_id="864082" ref_url="https://bugzilla.suse.com/864082" source="BUGZILLA"/>
		<reference ref_id="879913" ref_url="https://bugzilla.suse.com/879913" source="BUGZILLA"/>
		<reference ref_id="913078" ref_url="https://bugzilla.suse.com/913078" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-3567" ref_url="https://www.suse.com/security/cve/CVE-2013-3567/" source="CVE"/>
		<reference ref_id="CVE-2013-4761" ref_url="https://www.suse.com/security/cve/CVE-2013-4761/" source="CVE"/>
		<reference ref_id="CVE-2013-4969" ref_url="https://www.suse.com/security/cve/CVE-2013-4969/" source="CVE"/>
		<reference ref_id="CVE-2014-3248" ref_url="https://www.suse.com/security/cve/CVE-2014-3248/" source="CVE"/>
		<reference ref_id="CVE-2014-3250" ref_url="https://www.suse.com/security/cve/CVE-2014-3250/" source="CVE"/>
		<reference ref_id="SUSE-RU-2015:0696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-April/002875.html" source="SUSE-SU"/>
		<description>

Puppet was updated to fix the following security issues:

    * Unsafe use of temporary files. (CVE-2013-4969)
    * Arbitrary code execution with required social engineering.
      (CVE-2014-3248, CVE-2014-3250)

Security Issues references:

    * CVE-2014-3248
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3248&gt;
    * CVE-2013-4969
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4969&gt;
    * CVE-2014-3250
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3250&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-30"/>
	<updated date="2014-06-30"/>
	<bugzilla href="https://bugzilla.suse.com/825878">SUSE bug 825878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835122">SUSE bug 835122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835848">SUSE bug 835848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835891">SUSE bug 835891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853982">SUSE bug 853982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856843">SUSE bug 856843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864082">SUSE bug 864082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879913">SUSE bug 879913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913078">SUSE bug 913078</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3567/">CVE-2013-3567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3567">CVE-2013-3567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4761/">CVE-2013-4761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4761">CVE-2013-4761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4969/">CVE-2013-4969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4969">CVE-2013-4969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3248/">CVE-2014-3248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3248">CVE-2014-3248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3250/">CVE-2014-3250 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3250">CVE-2014-3250 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580975" comment="puppet-2.6.18-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580976" comment="puppet-server-2.6.18-0.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580975" comment="puppet-2.6.18-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580976" comment="puppet-server-2.6.18-0.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580975" comment="puppet-2.6.18-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580976" comment="puppet-server-2.6.18-0.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219334" version="1" class="patch">
	<metadata>
		<title>Security update for puppet (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1040151" ref_url="https://bugzilla.suse.com/1040151" source="BUGZILLA"/>
		<reference ref_id="1077767" ref_url="https://bugzilla.suse.com/1077767" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2295" ref_url="https://www.suse.com/security/cve/CVE-2017-2295/" source="CVE"/>
		<description>
This update for puppet fixes the following issues:

- CVE-2017-2295: Fixed a security vulnerability where an attacker could
  force YAML deserialization in an unsafe manner, which would lead to
  remote code execution.

In default, this update would break a backwards compatibility
with Puppet agents older than 3.2.2 as the SLE11 master doesn't
support other fact formats than pson in default anymore.
In order to allow users to continue using their SLE11 agents
a patch was added that enables sending PSON from agents.

For non-SUSE clients older that 3.2.2 a new puppet master boolean option
'dangerous_fact_formats' was added. When it's set to true it
enables using dangerous fact formats (e.g. YAML). When it's set
to false, only PSON fact format is accepted. (bsc#1040151),
(bsc#1077767)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-05"/>
	<updated date="2018-03-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040151">SUSE bug 1040151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077767">SUSE bug 1077767</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2295/">CVE-2017-2295 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2295">CVE-2017-2295 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574556" comment="puppet-2.7.26-0.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574557" comment="puppet-server-2.7.26-0.5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219335" version="1" class="patch">
	<metadata>
		<title>Security update for puppet (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1167645" ref_url="https://bugzilla.suse.com/1167645" source="BUGZILLA"/>
		<reference ref_id="935899" ref_url="https://bugzilla.suse.com/935899" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7942" ref_url="https://www.suse.com/security/cve/CVE-2020-7942/" source="CVE"/>
		<description>
This update for puppet fixes the following issues:

Security issue fixed:

- CVE-2020-7942: Added a warning for a vulnerable configuration option, which could allow
  for information disclosure in certain setups. Disabling it my break some setups. (bsc#1167645)

Non-security issue fixed:

- Fixed deletion of puppet master file /etc/puppet/manifests/site.pp during updates (bsc#935899).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1167645">SUSE bug 1167645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935899">SUSE bug 935899</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7942/">CVE-2020-7942 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7942">CVE-2020-7942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574558" comment="puppet-2.7.26-0.5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574559" comment="puppet-server-2.7.26-0.5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219336" version="1" class="patch">
	<metadata>
		<title>Recommended update for pure-ftpd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="828469" ref_url="https://bugzilla.suse.com/828469" source="BUGZILLA"/>
		<reference ref_id="856424" ref_url="https://bugzilla.suse.com/856424" source="BUGZILLA"/>
		<reference ref_id="899136" ref_url="https://bugzilla.suse.com/899136" source="BUGZILLA"/>
		<reference ref_id="902229" ref_url="https://bugzilla.suse.com/902229" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<description>

This update for pure-ftpd provides fixes for the following issues:

    * LIST command processed incorrectly when pathname argument contains a
      space character. (bnc#899136)
    * LIST FILENAME handled incorrectly when using ftp-tls if file name
      doesn't exist. (bnc#856424)
    * Re-enable disable_ascii option. (bnc#828469)

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-09"/>
	<updated date="2014-10-09"/>
	<bugzilla href="https://bugzilla.suse.com/828469">SUSE bug 828469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856424">SUSE bug 856424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899136">SUSE bug 899136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902229">SUSE bug 902229</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994022" comment="pure-ftpd-1.0.22-3.21.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994022" comment="pure-ftpd-1.0.22-3.21.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994022" comment="pure-ftpd-1.0.22-3.21.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219337" version="1" class="patch">
	<metadata>
		<title>Security update for pure-ftpd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1160111" ref_url="https://bugzilla.suse.com/1160111" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20176" ref_url="https://www.suse.com/security/cve/CVE-2019-20176/" source="CVE"/>
		<description>
This update for pure-ftpd fixes the following issues:

- CVE-2019-20176: Fixed a potential server crash when remotely listing
  directories (bsc#1160111).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-22"/>
	<updated date="2022-08-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160111">SUSE bug 1160111</bugzilla>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-20176/">CVE-2019-20176 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20176">CVE-2019-20176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994023" comment="pure-ftpd-1.0.43-30.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219338" version="1" class="patch">
	<metadata>
		<title>Security update for pure-ftpd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1190205" ref_url="https://bugzilla.suse.com/1190205" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-40524" ref_url="https://www.suse.com/security/cve/CVE-2021-40524/" source="CVE"/>
		<description>
This update for pure-ftpd fixes the following issues:

- CVE-2021-40524: Fixed DoS caused by an incorrect check in the max_filesize quota mechanism which allowed attackers to upload files of unbounded size (bsc#1190205).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-16"/>
	<updated date="2022-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190205">SUSE bug 1190205</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-40524/">CVE-2021-40524 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40524">CVE-2021-40524 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994024" comment="pure-ftpd-1.0.43-30.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219339" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="984751" ref_url="https://bugzilla.suse.com/984751" source="BUGZILLA"/>
		<reference ref_id="985348" ref_url="https://bugzilla.suse.com/985348" source="BUGZILLA"/>
		<reference ref_id="989523" ref_url="https://bugzilla.suse.com/989523" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<description>

This update for python fixes the following issues:

- CVE-2016-0772: smtplib vulnerability opens startTLS stripping attack (bsc#984751)
- CVE-2016-5699: incorrect validation of HTTP headers allow header injection (bsc#985348)
- CVE-2016-1000110: HTTPoxy vulnerability in urllib, fixed by disregarding HTTP_PROXY
  when REQUEST_METHOD is also set (bsc#989523)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-09"/>
	<updated date="2016-09-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/984751">SUSE bug 984751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985348">SUSE bug 985348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989523">SUSE bug 989523</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0772">CVE-2016-0772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000110">CVE-2016-1000110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5699">CVE-2016-5699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574560" comment="libpython2_6-1_0-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574561" comment="libpython2_6-1_0-32bit-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574562" comment="python-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565245" comment="python-32bit-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574563" comment="python-base-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574564" comment="python-base-32bit-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574565" comment="python-curses-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574566" comment="python-demo-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565248" comment="python-doc-2.6-8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565249" comment="python-doc-pdf-2.6-8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574567" comment="python-gdbm-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574568" comment="python-idle-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574569" comment="python-tk-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574570" comment="python-xml-2.6.9-39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219340" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1068664" ref_url="https://bugzilla.suse.com/1068664" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2017-1000158: Fixed integer overflow in thePyString_DecodeEscape function (bsc#1068664).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-22"/>
	<updated date="2018-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068664">SUSE bug 1068664</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000158">CVE-2017-1000158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574571" comment="libpython2_6-1_0-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574572" comment="libpython2_6-1_0-32bit-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574573" comment="python-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565253" comment="python-32bit-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574574" comment="python-base-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574575" comment="python-base-32bit-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574576" comment="python-curses-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574577" comment="python-demo-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565256" comment="python-doc-2.6-8.40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565257" comment="python-doc-pdf-2.6-8.40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574578" comment="python-gdbm-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574579" comment="python-idle-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574580" comment="python-tk-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574581" comment="python-xml-2.6.9-40.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219341" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1083507" ref_url="https://bugzilla.suse.com/1083507" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<description>
This update for python fixes the following issues:

The following security vulnerabilities were addressed:

- Add a check to Lib/wave.py that verifies that at least one channel is
  provided. Prior to this, attackers could cause a denial of service via a
  crafted wav format audio file. [bsc#1083507, CVE-2017-18207]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-22"/>
	<updated date="2018-06-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083507">SUSE bug 1083507</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18207">CVE-2017-18207 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574582" comment="libpython2_6-1_0-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574583" comment="libpython2_6-1_0-32bit-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574584" comment="python-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565261" comment="python-32bit-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574585" comment="python-base-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574586" comment="python-base-32bit-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574587" comment="python-curses-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574588" comment="python-demo-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565264" comment="python-doc-2.6-8.40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565265" comment="python-doc-pdf-2.6-8.40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574589" comment="python-gdbm-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574590" comment="python-idle-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574591" comment="python-tk-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574592" comment="python-xml-2.6.9-40.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219342" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1086001" ref_url="https://bugzilla.suse.com/1086001" source="BUGZILLA"/>
		<reference ref_id="1088004" ref_url="https://bugzilla.suse.com/1088004" source="BUGZILLA"/>
		<reference ref_id="1088009" ref_url="https://bugzilla.suse.com/1088009" source="BUGZILLA"/>
		<reference ref_id="985177" ref_url="https://bugzilla.suse.com/985177" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060/" source="CVE"/>
		<reference ref_id="CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004463.html" source="SUSE-SU"/>
		<description>
This update for python-base fixes the following issues:

Security issues fixed:

- CVE-2018-1061: Fixed DoS via regular expression backtracking in difflib.IS_LINE_JUNK method in difflib (bsc#1088004).
- CVE-2018-1060: Fixed DoS via regular expression catastrophic backtracking in apop() method in pop3lib (bsc#1088009).
- CVE-2016-5636: Fixed heap overflow in zipimporter module (bsc#985177)

Bug fixes:

- bsc#1086001: python tarfile uses random order.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1086001">SUSE bug 1086001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985177">SUSE bug 985177</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5636">CVE-2016-5636 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1060">CVE-2018-1060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1061">CVE-2018-1061 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580977" comment="libpython2_6-1_0-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580978" comment="libpython2_6-1_0-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580979" comment="python-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580980" comment="python-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580981" comment="python-base-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580982" comment="python-base-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580983" comment="python-curses-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580984" comment="python-demo-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565272" comment="python-doc-2.6-8.40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565273" comment="python-doc-pdf-2.6-8.40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580985" comment="python-gdbm-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580986" comment="python-idle-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580987" comment="python-tk-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580988" comment="python-xml-2.6.9-40.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580977" comment="libpython2_6-1_0-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580978" comment="libpython2_6-1_0-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580979" comment="python-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580980" comment="python-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580981" comment="python-base-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580982" comment="python-base-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580983" comment="python-curses-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580984" comment="python-demo-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565272" comment="python-doc-2.6-8.40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565273" comment="python-doc-pdf-2.6-8.40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580985" comment="python-gdbm-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580986" comment="python-idle-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580987" comment="python-tk-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580988" comment="python-xml-2.6.9-40.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219343" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<description>
This update for python fixes the following issue:

- CVE-2018-14647: Python's elementtree C accelerator failed to initialise
  Expat's hash salt during initialization. This could make it easy to conduct
  denial of service attacks against Expat by constructing an XML document that
  would cause pathological hash collisions in Expat's internal data structures,
  consuming large amounts CPU and RAM (bsc#1109847)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14647">CVE-2018-14647 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574604" comment="libpython2_6-1_0-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574605" comment="libpython2_6-1_0-32bit-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574606" comment="python-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565277" comment="python-32bit-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574607" comment="python-base-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574608" comment="python-base-32bit-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574609" comment="python-curses-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574610" comment="python-demo-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565280" comment="python-doc-2.6-8.40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565281" comment="python-doc-pdf-2.6-8.40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574611" comment="python-gdbm-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574612" comment="python-idle-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574613" comment="python-tk-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574614" comment="python-xml-2.6.9-40.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219344" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="1130847" ref_url="https://bugzilla.suse.com/1130847" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9948" ref_url="https://www.suse.com/security/cve/CVE-2019-9948/" source="CVE"/>
		<description>
This update for python fixes the following issues:

Security issues fixed:

- CVE-2019-9948: Fixed a 'file:' blacklist bypass in URIs by using the 'local-file:' scheme instead (bsc#1130847).
- CVE-2019-9636: Fixed an information disclosure because of incorrect handling of Unicode encoding during NFKC normalization (bsc#1129346).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-15"/>
	<updated date="2019-04-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130847">SUSE bug 1130847</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9636">CVE-2019-9636 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9948/">CVE-2019-9948 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9948">CVE-2019-9948 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574615" comment="libpython2_6-1_0-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574616" comment="libpython2_6-1_0-32bit-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574617" comment="python-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574618" comment="python-32bit-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574619" comment="python-base-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574620" comment="python-base-32bit-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574621" comment="python-curses-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574622" comment="python-demo-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569038" comment="python-doc-2.6-8.40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569039" comment="python-doc-pdf-2.6-8.40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574623" comment="python-gdbm-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574624" comment="python-idle-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574625" comment="python-tk-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574626" comment="python-xml-2.6.9-40.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219345" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459).
- CVE-2018-20852: Fixed an information leak where cookies could be send to the wrong server because of incorrect domain validation (bsc#1141853).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-08"/>
	<updated date="2019-08-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20852">CVE-2018-20852 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10160">CVE-2019-10160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574627" comment="libpython2_6-1_0-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574628" comment="libpython2_6-1_0-32bit-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574629" comment="python-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574630" comment="python-32bit-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574631" comment="python-base-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574632" comment="python-base-32bit-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574633" comment="python-curses-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574634" comment="python-demo-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569049" comment="python-doc-2.6-8.40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569050" comment="python-doc-pdf-2.6-8.40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574635" comment="python-gdbm-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574636" comment="python-idle-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574637" comment="python-tk-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574638" comment="python-xml-2.6.9-40.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219346" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1149955" ref_url="https://bugzilla.suse.com/1149955" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<description>
This update for python fixes the following issues:

Security issue fixed:

- CVE-2019-16056: Fixed a parser issue in the email module. (bsc#1149955)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-22"/>
	<updated date="2019-10-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16056">CVE-2019-16056 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574639" comment="libpython2_6-1_0-2.6.9-40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574640" comment="libpython2_6-1_0-32bit-2.6.9-40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574641" comment="python-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574642" comment="python-32bit-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574643" comment="python-base-2.6.9-40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574644" comment="python-base-32bit-2.6.9-40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574645" comment="python-curses-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574646" comment="python-demo-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569060" comment="python-doc-2.6-8.40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569061" comment="python-doc-pdf-2.6-8.40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574647" comment="python-gdbm-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574648" comment="python-idle-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574649" comment="python-tk-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574650" comment="python-xml-2.6.9-40.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219347" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<description>
This update for python fixes the following security issue:

- CVE-2020-8492: Fixed a regular expression in urllib that was prone to denial of service via HTTP (bsc#1162367).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-03"/>
	<updated date="2020-03-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574651" comment="libpython2_6-1_0-2.6.9-40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574652" comment="libpython2_6-1_0-32bit-2.6.9-40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574653" comment="python-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574654" comment="python-32bit-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574655" comment="python-base-2.6.9-40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574656" comment="python-base-32bit-2.6.9-40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574657" comment="python-curses-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574658" comment="python-demo-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569071" comment="python-doc-2.6-8.40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569072" comment="python-doc-pdf-2.6-8.40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574659" comment="python-gdbm-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574660" comment="python-idle-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574661" comment="python-tk-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574662" comment="python-xml-2.6.9-40.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219348" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1162825" ref_url="https://bugzilla.suse.com/1162825" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<description>
This update for python fixes the following issues:

Security issues fixed:

- CVE-2019-18348: Fixed a CRLF injection via the host part of the url passed to urlopen().
                  Now an InvalidURL exception is raised (bsc#1155094).
- CVE-2019-9674: Improved the documentation to reflect the dangers of zip-bombs (bsc#1162825).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-28"/>
	<updated date="2020-05-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">CVE-2019-18348 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">CVE-2019-9674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574663" comment="libpython2_6-1_0-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574664" comment="libpython2_6-1_0-32bit-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574665" comment="python-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574666" comment="python-32bit-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574667" comment="python-base-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574668" comment="python-base-32bit-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574669" comment="python-curses-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574670" comment="python-demo-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574671" comment="python-doc-2.6-8.40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574672" comment="python-doc-pdf-2.6-8.40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574673" comment="python-gdbm-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574674" comment="python-idle-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574675" comment="python-tk-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574676" comment="python-xml-2.6.9-40.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219349" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174091" ref_url="https://bugzilla.suse.com/1174091" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2019-20907: Avoid a possible infinite loop caused by specifically crafted tarballs (bsc#1174091).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-27"/>
	<updated date="2020-08-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574677" comment="libpython2_6-1_0-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574678" comment="libpython2_6-1_0-32bit-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574679" comment="python-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574680" comment="python-32bit-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574681" comment="python-base-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574682" comment="python-base-32bit-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574683" comment="python-curses-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574684" comment="python-demo-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574685" comment="python-doc-2.6-8.40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574686" comment="python-doc-pdf-2.6-8.40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574687" comment="python-gdbm-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574688" comment="python-idle-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574689" comment="python-tk-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574690" comment="python-xml-2.6.9-40.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219350" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1177211" ref_url="https://bugzilla.suse.com/1177211" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- bsc#1177211 (CVE-2020-26116) no longer allowing special characters in the method parameter 
  of HTTPConnection.putrequest in httplib, stopping injection of headers.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-26"/>
	<updated date="2020-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26116">CVE-2020-26116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574691" comment="libpython2_6-1_0-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574692" comment="libpython2_6-1_0-32bit-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574693" comment="python-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574694" comment="python-32bit-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574695" comment="python-base-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574696" comment="python-base-32bit-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574697" comment="python-curses-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574698" comment="python-demo-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569082" comment="python-doc-2.6-8.40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569083" comment="python-doc-pdf-2.6-8.40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574699" comment="python-gdbm-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574700" comment="python-idle-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574701" comment="python-tk-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574702" comment="python-xml-2.6.9-40.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219351" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181126" ref_url="https://bugzilla.suse.com/1181126" source="BUGZILLA"/>
		<reference ref_id="1182379" ref_url="https://bugzilla.suse.com/1182379" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2021-23336: which forbids use of semicolon as a query string separator (bpo#42967, bsc#1182379, CVE-2021-23336).
- Switch off -O0 non-optimization.
- CVE-2021-3177: fixing bsc#1181126 (CVE-2021-3177) buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181126">SUSE bug 1181126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182379">SUSE bug 1182379</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631986" comment="libpython2_6-1_0-2.6.9-40.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631987" comment="libpython2_6-1_0-32bit-2.6.9-40.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631988" comment="python-2.6.9-40.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631989" comment="python-32bit-2.6.9-40.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631990" comment="python-base-2.6.9-40.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631991" comment="python-base-32bit-2.6.9-40.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631992" comment="python-curses-2.6.9-40.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631993" comment="python-demo-2.6.9-40.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631994" comment="python-doc-2.6-8.40.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631995" comment="python-doc-pdf-2.6-8.40.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631996" comment="python-gdbm-2.6.9-40.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631997" comment="python-idle-2.6.9-40.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631998" comment="python-tk-2.6.9-40.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631999" comment="python-xml-2.6.9-40.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219352" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1130840" ref_url="https://bugzilla.suse.com/1130840" source="BUGZILLA"/>
		<reference ref_id="1189241" ref_url="https://bugzilla.suse.com/1189241" source="BUGZILLA"/>
		<reference ref_id="1189287" ref_url="https://bugzilla.suse.com/1189287" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2021-3733" ref_url="https://www.suse.com/security/cve/CVE-2021-3733/" source="CVE"/>
		<reference ref_id="CVE-2021-3737" ref_url="https://www.suse.com/security/cve/CVE-2021-3737/" source="CVE"/>
		<description>
This update for python fixes the following issues:


- CVE-2021-3737: Fixed http client infinite line reading (DoS) after a http 100. (bsc#1189241)
- CVE-2021-3733: Fixed ReDoS in urllib.request. (bsc#1189287)
- CVE-2019-9947: Fixed a CRLF injection that can occur if the attacker controls a url parameter. (bsc#1130840)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-25"/>
	<updated date="2021-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189241">SUSE bug 1189241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189287">SUSE bug 1189287</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3733/">CVE-2021-3733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3733">CVE-2021-3733 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3737/">CVE-2021-3737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3737">CVE-2021-3737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651289" comment="libpython2_6-1_0-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651290" comment="libpython2_6-1_0-32bit-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651291" comment="python-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651292" comment="python-32bit-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651293" comment="python-base-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651294" comment="python-base-32bit-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651295" comment="python-curses-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651296" comment="python-demo-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651297" comment="python-doc-2.6-8.40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651298" comment="python-doc-pdf-2.6-8.40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651299" comment="python-gdbm-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651300" comment="python-idle-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651301" comment="python-tk-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651302" comment="python-xml-2.6.9-40.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219353" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1195396" ref_url="https://bugzilla.suse.com/1195396" source="BUGZILLA"/>
		<reference ref_id="1198511" ref_url="https://bugzilla.suse.com/1198511" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-20107" ref_url="https://www.suse.com/security/cve/CVE-2015-20107/" source="CVE"/>
		<reference ref_id="CVE-2022-0391" ref_url="https://www.suse.com/security/cve/CVE-2022-0391/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2022-0391: Fixed incorrect sanitizing of URLs containing ASCII newline and tabs in urlparse (bsc#1195396).
- CVE-2015-20107: avoid command injection in the mailcap module (bsc#1198511).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-14"/>
	<updated date="2022-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195396">SUSE bug 1195396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198511">SUSE bug 1198511</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-20107/">CVE-2015-20107 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-20107">CVE-2015-20107 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-0391/">CVE-2022-0391 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0391">CVE-2022-0391 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994025" comment="libpython2_6-1_0-2.6.9-40.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994026" comment="libpython2_6-1_0-32bit-2.6.9-40.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994027" comment="python-2.6.9-40.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994028" comment="python-32bit-2.6.9-40.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994029" comment="python-base-2.6.9-40.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994030" comment="python-base-32bit-2.6.9-40.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994031" comment="python-curses-2.6.9-40.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994032" comment="python-demo-2.6.9-40.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994033" comment="python-doc-2.6-8.40.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994034" comment="python-doc-pdf-2.6-8.40.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994035" comment="python-gdbm-2.6.9-40.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994036" comment="python-idle-2.6.9-40.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994037" comment="python-tk-2.6.9-40.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994038" comment="python-xml-2.6.9-40.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219354" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1202624" ref_url="https://bugzilla.suse.com/1202624" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28861" ref_url="https://www.suse.com/security/cve/CVE-2021-28861/" source="CVE"/>
		<description>
This update for python fixes the following issues:
                                                                                                                                                                                               
- CVE-2021-28861: Fixed an open redirection vulnerability in the HTTP server when an URI path starts with // (bsc#1202624).                                                                    
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-04"/>
	<updated date="2022-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1202624">SUSE bug 1202624</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28861/">CVE-2021-28861 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28861">CVE-2021-28861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994039" comment="libpython2_6-1_0-2.6.9-40.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994040" comment="libpython2_6-1_0-32bit-2.6.9-40.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994041" comment="python-2.6.9-40.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994042" comment="python-32bit-2.6.9-40.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994043" comment="python-base-2.6.9-40.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994044" comment="python-base-32bit-2.6.9-40.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994045" comment="python-curses-2.6.9-40.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994046" comment="python-demo-2.6.9-40.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994047" comment="python-doc-2.6-8.40.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994048" comment="python-doc-pdf-2.6-8.40.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994049" comment="python-gdbm-2.6.9-40.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994050" comment="python-idle-2.6.9-40.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994051" comment="python-tk-2.6.9-40.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994052" comment="python-xml-2.6.9-40.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219355" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1205244" ref_url="https://bugzilla.suse.com/1205244" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-45061" ref_url="https://www.suse.com/security/cve/CVE-2022-45061/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2022-45061: Fixed quadratic IDNA decoding time (bsc#1205244).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-18"/>
	<updated date="2022-11-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205244">SUSE bug 1205244</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45061/">CVE-2022-45061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45061">CVE-2022-45061 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994053" comment="libpython2_6-1_0-2.6.9-40.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994054" comment="libpython2_6-1_0-32bit-2.6.9-40.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994055" comment="python-2.6.9-40.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994056" comment="python-32bit-2.6.9-40.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994057" comment="python-base-2.6.9-40.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994058" comment="python-base-32bit-2.6.9-40.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994059" comment="python-curses-2.6.9-40.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994060" comment="python-demo-2.6.9-40.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994061" comment="python-doc-2.6-8.40.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994062" comment="python-doc-pdf-2.6-8.40.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994063" comment="python-gdbm-2.6.9-40.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994064" comment="python-idle-2.6.9-40.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994065" comment="python-tk-2.6.9-40.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994066" comment="python-xml-2.6.9-40.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219356" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1206673" ref_url="https://bugzilla.suse.com/1206673" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40899" ref_url="https://www.suse.com/security/cve/CVE-2022-40899/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2022-40899: Fixed an issue that could allow attackers to cause
  an excessive CPU usage via a crafted Set-Cookie header (bsc#1206673).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-12"/>
	<updated date="2023-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1206673">SUSE bug 1206673</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40899/">CVE-2022-40899 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40899">CVE-2022-40899 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994067" comment="libpython2_6-1_0-2.6.9-40.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994068" comment="libpython2_6-1_0-32bit-2.6.9-40.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994069" comment="python-2.6.9-40.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994070" comment="python-32bit-2.6.9-40.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994071" comment="python-base-2.6.9-40.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994072" comment="python-base-32bit-2.6.9-40.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994073" comment="python-curses-2.6.9-40.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994074" comment="python-demo-2.6.9-40.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994075" comment="python-doc-2.6-8.40.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994076" comment="python-doc-pdf-2.6-8.40.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994077" comment="python-gdbm-2.6.9-40.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994078" comment="python-idle-2.6.9-40.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994079" comment="python-tk-2.6.9-40.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994080" comment="python-xml-2.6.9-40.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219357" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208471" ref_url="https://bugzilla.suse.com/1208471" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2023-24329: Fixed blocklist bypass via the urllib.parse component when supplying a URL that starts with blank characters (bsc#1208471).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-08"/>
	<updated date="2023-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208471">SUSE bug 1208471</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994081" comment="libpython2_6-1_0-2.6.9-40.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994082" comment="libpython2_6-1_0-32bit-2.6.9-40.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994083" comment="python-2.6.9-40.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994084" comment="python-32bit-2.6.9-40.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994085" comment="python-base-2.6.9-40.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994086" comment="python-base-32bit-2.6.9-40.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994087" comment="python-curses-2.6.9-40.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994088" comment="python-demo-2.6.9-40.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994089" comment="python-doc-2.6-8.40.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994090" comment="python-doc-pdf-2.6-8.40.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994091" comment="python-gdbm-2.6.9-40.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994092" comment="python-idle-2.6.9-40.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994093" comment="python-tk-2.6.9-40.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994094" comment="python-xml-2.6.9-40.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219358" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="834601" ref_url="https://bugzilla.suse.com/834601" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<description>

This python update fixes a certificate hostname issue.

    * bnc#834601: CVE-2013-4238: python: SSL module does not handle
      certificates that contain hostnames with NULL bytes

Security Issue reference:

    * CVE-2013-4238
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4238">CVE-2013-4238 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576857" comment="libpython2_6-1_0-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576858" comment="libpython2_6-1_0-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576859" comment="libpython2_6-1_0-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576860" comment="python-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576861" comment="python-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576862" comment="python-base-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576863" comment="python-base-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576864" comment="python-base-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576865" comment="python-curses-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576866" comment="python-demo-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576867" comment="python-gdbm-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576868" comment="python-idle-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576869" comment="python-tk-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576870" comment="python-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576871" comment="python-xml-2.6.8-0.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576857" comment="libpython2_6-1_0-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576858" comment="libpython2_6-1_0-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576859" comment="libpython2_6-1_0-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576860" comment="python-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576861" comment="python-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576862" comment="python-base-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576863" comment="python-base-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576864" comment="python-base-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576865" comment="python-curses-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576866" comment="python-demo-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576867" comment="python-gdbm-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576868" comment="python-idle-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576869" comment="python-tk-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576870" comment="python-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576871" comment="python-xml-2.6.8-0.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576857" comment="libpython2_6-1_0-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576858" comment="libpython2_6-1_0-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576859" comment="libpython2_6-1_0-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576860" comment="python-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576861" comment="python-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576862" comment="python-base-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576863" comment="python-base-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576864" comment="python-base-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576865" comment="python-curses-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576866" comment="python-demo-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576867" comment="python-gdbm-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576868" comment="python-idle-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576869" comment="python-tk-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576870" comment="python-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576871" comment="python-xml-2.6.8-0.23.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219359" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="898572" ref_url="https://bugzilla.suse.com/898572" source="BUGZILLA"/>
		<reference ref_id="901715" ref_url="https://bugzilla.suse.com/901715" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-7185" ref_url="https://www.suse.com/security/cve/CVE-2014-7185/" source="CVE"/>
		<description>

Python was updated to fix one security issue:

    * Potential wraparound/overflow in buffer() (CVE-2014-7185)

As an additional hardening measure SSLv2 has been disabled (bnc#901715).

Security Issues:

    * CVE-2014-7185
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7185&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-19"/>
	<updated date="2014-11-19"/>
	<bugzilla href="https://bugzilla.suse.com/898572">SUSE bug 898572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901715">SUSE bug 901715</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7185/">CVE-2014-7185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7185">CVE-2014-7185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580989" comment="libpython2_6-1_0-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580990" comment="libpython2_6-1_0-32bit-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580991" comment="libpython2_6-1_0-x86-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580992" comment="python-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580993" comment="python-32bit-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580994" comment="python-base-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580995" comment="python-base-32bit-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580996" comment="python-base-x86-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580997" comment="python-curses-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580998" comment="python-demo-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563784" comment="python-doc-2.6-8.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563785" comment="python-doc-pdf-2.6-8.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580999" comment="python-gdbm-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581000" comment="python-idle-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581001" comment="python-tk-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581002" comment="python-x86-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581003" comment="python-xml-2.6.9-0.33.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580989" comment="libpython2_6-1_0-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580990" comment="libpython2_6-1_0-32bit-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580991" comment="libpython2_6-1_0-x86-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580992" comment="python-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580993" comment="python-32bit-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580994" comment="python-base-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580995" comment="python-base-32bit-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580996" comment="python-base-x86-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580997" comment="python-curses-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580998" comment="python-demo-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563784" comment="python-doc-2.6-8.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563785" comment="python-doc-pdf-2.6-8.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580999" comment="python-gdbm-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581000" comment="python-idle-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581001" comment="python-tk-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581002" comment="python-x86-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581003" comment="python-xml-2.6.9-0.33.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580989" comment="libpython2_6-1_0-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580990" comment="libpython2_6-1_0-32bit-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580991" comment="libpython2_6-1_0-x86-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580992" comment="python-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580993" comment="python-32bit-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580994" comment="python-base-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580995" comment="python-base-32bit-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580996" comment="python-base-x86-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580997" comment="python-curses-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580998" comment="python-demo-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563784" comment="python-doc-2.6-8.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563785" comment="python-doc-pdf-2.6-8.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580999" comment="python-gdbm-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581000" comment="python-idle-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581001" comment="python-tk-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581002" comment="python-x86-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581003" comment="python-xml-2.6.9-0.33.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219360" version="1" class="patch">
	<metadata>
		<title>Security update for python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="834601" ref_url="https://bugzilla.suse.com/834601" source="BUGZILLA"/>
		<reference ref_id="847135" ref_url="https://bugzilla.suse.com/847135" source="BUGZILLA"/>
		<reference ref_id="856836" ref_url="https://bugzilla.suse.com/856836" source="BUGZILLA"/>
		<reference ref_id="859068" ref_url="https://bugzilla.suse.com/859068" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4073" ref_url="https://www.suse.com/security/cve/CVE-2013-4073/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<description>

This update for Python fixes the following security issues:

    * bnc#834601: SSL module does not handle certificates that contain
      hostnames with NULL bytes. (CVE-2013-4238)
    * bnc#856836: Various stdlib read flaws. (CVE-2013-1752)

Additionally, the following non-security issues have been fixed:

    * bnc#859068: Turn off OpenSSL's aggressive optimizations that conflict
      with Python's GC.
    * bnc#847135: Setting fips=1 at boot time causes problems with Python
      due to MD5 usage.

Security Issue references:

    * CVE-2013-4073
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4073&gt;
    * CVE-2013-4238
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-24"/>
	<updated date="2014-02-24"/>
	<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847135">SUSE bug 847135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856836">SUSE bug 856836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859068">SUSE bug 859068</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4073/">CVE-2013-4073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4073">CVE-2013-4073 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4238">CVE-2013-4238 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581004" comment="libpython2_6-1_0-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581005" comment="libpython2_6-1_0-32bit-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581006" comment="libpython2_6-1_0-x86-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581007" comment="python-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581008" comment="python-32bit-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581009" comment="python-base-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581010" comment="python-base-32bit-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581011" comment="python-base-x86-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581012" comment="python-curses-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581013" comment="python-demo-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563792" comment="python-doc-2.6-8.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563793" comment="python-doc-pdf-2.6-8.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581014" comment="python-gdbm-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581015" comment="python-idle-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581016" comment="python-tk-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581017" comment="python-x86-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581018" comment="python-xml-2.6.9-0.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581004" comment="libpython2_6-1_0-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581005" comment="libpython2_6-1_0-32bit-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581006" comment="libpython2_6-1_0-x86-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581007" comment="python-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581008" comment="python-32bit-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581009" comment="python-base-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581010" comment="python-base-32bit-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581011" comment="python-base-x86-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581012" comment="python-curses-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581013" comment="python-demo-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563792" comment="python-doc-2.6-8.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563793" comment="python-doc-pdf-2.6-8.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581014" comment="python-gdbm-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581015" comment="python-idle-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581016" comment="python-tk-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581017" comment="python-x86-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581018" comment="python-xml-2.6.9-0.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581004" comment="libpython2_6-1_0-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581005" comment="libpython2_6-1_0-32bit-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581006" comment="libpython2_6-1_0-x86-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581007" comment="python-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581008" comment="python-32bit-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581009" comment="python-base-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581010" comment="python-base-32bit-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581011" comment="python-base-x86-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581012" comment="python-curses-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581013" comment="python-demo-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563792" comment="python-doc-2.6-8.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563793" comment="python-doc-pdf-2.6-8.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581014" comment="python-gdbm-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581015" comment="python-idle-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581016" comment="python-tk-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581017" comment="python-x86-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581018" comment="python-xml-2.6.9-0.25.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219361" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="863741" ref_url="https://bugzilla.suse.com/863741" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1912" ref_url="https://www.suse.com/security/cve/CVE-2014-1912/" source="CVE"/>
		<description>

Python was updated to fix a security issue in the socket.recvfrom_into 
function, where data could be written over the end of the buffer. 
(CVE-2014-1912)

Security Issue reference:

    * CVE-2014-1912
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1912&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-01"/>
	<updated date="2014-04-01"/>
	<bugzilla href="https://bugzilla.suse.com/863741">SUSE bug 863741</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1912/">CVE-2014-1912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1912">CVE-2014-1912 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581019" comment="libpython2_6-1_0-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581020" comment="libpython2_6-1_0-32bit-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581021" comment="libpython2_6-1_0-x86-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581022" comment="python-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581023" comment="python-32bit-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581024" comment="python-base-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581025" comment="python-base-32bit-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581026" comment="python-base-x86-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581027" comment="python-curses-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581028" comment="python-demo-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563800" comment="python-doc-2.6-8.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563801" comment="python-doc-pdf-2.6-8.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581029" comment="python-gdbm-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581030" comment="python-idle-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581031" comment="python-tk-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581032" comment="python-x86-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581033" comment="python-xml-2.6.9-0.27.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581019" comment="libpython2_6-1_0-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581020" comment="libpython2_6-1_0-32bit-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581021" comment="libpython2_6-1_0-x86-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581022" comment="python-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581023" comment="python-32bit-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581024" comment="python-base-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581025" comment="python-base-32bit-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581026" comment="python-base-x86-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581027" comment="python-curses-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581028" comment="python-demo-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563800" comment="python-doc-2.6-8.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563801" comment="python-doc-pdf-2.6-8.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581029" comment="python-gdbm-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581030" comment="python-idle-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581031" comment="python-tk-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581032" comment="python-x86-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581033" comment="python-xml-2.6.9-0.27.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581019" comment="libpython2_6-1_0-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581020" comment="libpython2_6-1_0-32bit-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581021" comment="libpython2_6-1_0-x86-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581022" comment="python-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581023" comment="python-32bit-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581024" comment="python-base-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581025" comment="python-base-32bit-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581026" comment="python-base-x86-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581027" comment="python-curses-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581028" comment="python-demo-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563800" comment="python-doc-2.6-8.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563801" comment="python-doc-pdf-2.6-8.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581029" comment="python-gdbm-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581030" comment="python-idle-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581031" comment="python-tk-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581032" comment="python-x86-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581033" comment="python-xml-2.6.9-0.27.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219362" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="872848" ref_url="https://bugzilla.suse.com/872848" source="BUGZILLA"/>
		<reference ref_id="885882" ref_url="https://bugzilla.suse.com/885882" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<description>

This update for Python provides fixes for the following issues:

    * CGIHTTPServer file disclosure and directory traversal through
      URL-encoded characters. (CVE-2014-4650)
    * The 'urlparse' module has been updated to correctly parse IPv6
      addresses. (bnc#872848)
    * Correctly enable IPv6 support.

Security Issues:

    * CVE-2014-4650
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4650&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-28"/>
	<updated date="2014-07-28"/>
	<bugzilla href="https://bugzilla.suse.com/872848">SUSE bug 872848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885882">SUSE bug 885882</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4650">CVE-2014-4650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581034" comment="libpython2_6-1_0-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581035" comment="libpython2_6-1_0-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581036" comment="libpython2_6-1_0-x86-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581037" comment="python-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581038" comment="python-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581039" comment="python-base-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581040" comment="python-base-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581041" comment="python-base-x86-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581042" comment="python-curses-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581043" comment="python-demo-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563808" comment="python-doc-2.6-8.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563809" comment="python-doc-pdf-2.6-8.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581044" comment="python-gdbm-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581045" comment="python-idle-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581046" comment="python-tk-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581047" comment="python-x86-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581048" comment="python-xml-2.6.9-0.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581034" comment="libpython2_6-1_0-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581035" comment="libpython2_6-1_0-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581036" comment="libpython2_6-1_0-x86-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581037" comment="python-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581038" comment="python-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581039" comment="python-base-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581040" comment="python-base-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581041" comment="python-base-x86-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581042" comment="python-curses-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581043" comment="python-demo-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563808" comment="python-doc-2.6-8.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563809" comment="python-doc-pdf-2.6-8.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581044" comment="python-gdbm-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581045" comment="python-idle-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581046" comment="python-tk-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581047" comment="python-x86-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581048" comment="python-xml-2.6.9-0.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581034" comment="libpython2_6-1_0-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581035" comment="libpython2_6-1_0-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581036" comment="libpython2_6-1_0-x86-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581037" comment="python-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581038" comment="python-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581039" comment="python-base-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581040" comment="python-base-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581041" comment="python-base-x86-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581042" comment="python-curses-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581043" comment="python-demo-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563808" comment="python-doc-2.6-8.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563809" comment="python-doc-pdf-2.6-8.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581044" comment="python-gdbm-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581045" comment="python-idle-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581046" comment="python-tk-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581047" comment="python-x86-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581048" comment="python-xml-2.6.9-0.31.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219363" version="1" class="patch">
	<metadata>
		<title>Security update for python-Jinja2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181944" ref_url="https://bugzilla.suse.com/1181944" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28493" ref_url="https://www.suse.com/security/cve/CVE-2020-28493/" source="CVE"/>
		<description>
This update for python-Jinja2 fixes the following issues:

- CVE-2020-28493: Improve the speed of the 'urlize' filter by reducing regex
    backtracking. Email matching requires a word character at the start of the
    domain part, and only word characters in the TLD. (bsc#1181944)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-25"/>
	<updated date="2021-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181944">SUSE bug 1181944</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28493/">CVE-2020-28493 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28493">CVE-2020-28493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581049" comment="python-Jinja2-2.6-2.19.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219364" version="1" class="patch">
	<metadata>
		<title>Security update for python-PyYAML (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1099308" ref_url="https://bugzilla.suse.com/1099308" source="BUGZILLA"/>
		<reference ref_id="1174514" ref_url="https://bugzilla.suse.com/1174514" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18342" ref_url="https://www.suse.com/security/cve/CVE-2017-18342/" source="CVE"/>
		<reference ref_id="CVE-2020-14343" ref_url="https://www.suse.com/security/cve/CVE-2020-14343/" source="CVE"/>
		<description>
This update for python-PyYAML fixes the following issues:

- CVE-2020-14343: Fixed an incomplete solution for a previous code
  execution issue when the default loader was used (bsc#1174514).
- CVE-2017-18342: Made the standard loader safe by default (bsc#1099308).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-18"/>
	<updated date="2022-08-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1099308">SUSE bug 1099308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174514">SUSE bug 1174514</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18342/">CVE-2017-18342 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18342">CVE-2017-18342 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14343/">CVE-2020-14343 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14343">CVE-2020-14343 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994095" comment="python-PyYAML-3.10-0.15.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219365" version="1" class="patch">
	<metadata>
		<title>Security update for python-httplib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1171998" ref_url="https://bugzilla.suse.com/1171998" source="BUGZILLA"/>
		<reference ref_id="1182053" ref_url="https://bugzilla.suse.com/1182053" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11078" ref_url="https://www.suse.com/security/cve/CVE-2020-11078/" source="CVE"/>
		<reference ref_id="CVE-2021-21240" ref_url="https://www.suse.com/security/cve/CVE-2021-21240/" source="CVE"/>
		<description>
This update for python-httplib2 fixes the following issues:

- Update to version 0.19.0 (bsc#1182053).
- CVE-2021-21240: Fixed regular expression denial of service via malicious header (bsc#1182053).
- CVE-2020-11078: Fixed unescaped part of uri where an attacker could change request headers and body (bsc#1182053).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171998">SUSE bug 1171998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182053">SUSE bug 1182053</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11078/">CVE-2020-11078 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11078">CVE-2020-11078 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21240/">CVE-2021-21240 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21240">CVE-2021-21240 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581050" comment="python-httplib2-0.19.0-14.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219366" version="1" class="patch">
	<metadata>
		<title>Security update for python-imaging</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="863541" ref_url="https://bugzilla.suse.com/863541" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1932" ref_url="https://www.suse.com/security/cve/CVE-2014-1932/" source="CVE"/>
		<reference ref_id="CVE-2014-1933" ref_url="https://www.suse.com/security/cve/CVE-2014-1933/" source="CVE"/>
		<description>

This python-imaging update fixes the following two security issues:

    * bnc#863541: Fixed insecure temporary file creation and handling
      (CVE-2014-1932, CVE-2014-1933)

Security Issue references:

    * CVE-2014-1932
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1932&gt;
    * CVE-2014-1933
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1933&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-23"/>
	<updated date="2014-04-23"/>
	<bugzilla href="https://bugzilla.suse.com/863541">SUSE bug 863541</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1932/">CVE-2014-1932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1932">CVE-2014-1932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1933/">CVE-2014-1933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1933">CVE-2014-1933 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581051" comment="python-imaging-1.1.6-168.34.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581051" comment="python-imaging-1.1.6-168.34.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581051" comment="python-imaging-1.1.6-168.34.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219367" version="1" class="patch">
	<metadata>
		<title>Security update for python-lxml</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="657698" ref_url="https://bugzilla.suse.com/657698" source="BUGZILLA"/>
		<reference ref_id="877258" ref_url="https://bugzilla.suse.com/877258" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3146" ref_url="https://www.suse.com/security/cve/CVE-2014-3146/" source="CVE"/>
		<description>

This security update for python-lxml fixes a input sanitization flaw in 
clean_html. (CVE-2014-3146)

Security Issues:

    * CVE-2014-3146
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3146&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-01"/>
	<updated date="2014-10-01"/>
	<bugzilla href="https://bugzilla.suse.com/657698">SUSE bug 657698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877258">SUSE bug 877258</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3146/">CVE-2014-3146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3146">CVE-2014-3146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563816" comment="python-lxml-2.3.6-0.13.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563816" comment="python-lxml-2.3.6-0.13.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563816" comment="python-lxml-2.3.6-0.13.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219368" version="1" class="patch">
	<metadata>
		<title>Security update for python-lxml (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179534" ref_url="https://bugzilla.suse.com/1179534" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27783" ref_url="https://www.suse.com/security/cve/CVE-2020-27783/" source="CVE"/>
		<description>
This update for python-lxml fixes the following issues:

- CVE-2020-27783: Fixed XSS due to the use of improper parser (bsc#1179534).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-29"/>
	<updated date="2022-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179534">SUSE bug 1179534</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-27783/">CVE-2020-27783 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27783">CVE-2020-27783 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994096" comment="python-lxml-2.3.6-0.13.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219369" version="1" class="patch">
	<metadata>
		<title>Security update for python-lxml (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1118088" ref_url="https://bugzilla.suse.com/1118088" source="BUGZILLA"/>
		<reference ref_id="1184177" ref_url="https://bugzilla.suse.com/1184177" source="BUGZILLA"/>
		<reference ref_id="1193752" ref_url="https://bugzilla.suse.com/1193752" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19787" ref_url="https://www.suse.com/security/cve/CVE-2018-19787/" source="CVE"/>
		<reference ref_id="CVE-2021-28957" ref_url="https://www.suse.com/security/cve/CVE-2021-28957/" source="CVE"/>
		<reference ref_id="CVE-2021-43818" ref_url="https://www.suse.com/security/cve/CVE-2021-43818/" source="CVE"/>
		<description>
This update for python-lxml fixes the following issues:
- CVE-2021-43818: Remove SVG image data URLs since they can embed script content. (bsc#1193752)
- CVE-2018-19787: The lxml.html.clean module does not remove javascript: URLs that use escaping, allowing a remote attacker to conduct XSS attacks. (bsc#1118088)
- CVE-2021-28957: Fixed XSS due to missing input sanitization for HTML5 attributes. (bsc#1184177) 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-10"/>
	<updated date="2022-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118088">SUSE bug 1118088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184177">SUSE bug 1184177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193752">SUSE bug 1193752</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19787/">CVE-2018-19787 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19787">CVE-2018-19787 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-28957/">CVE-2021-28957 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28957">CVE-2021-28957 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-43818/">CVE-2021-43818 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43818">CVE-2021-43818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994097" comment="python-lxml-2.3.6-0.13.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219370" version="1" class="patch">
	<metadata>
		<title>Security update for python-numpy (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122208" ref_url="https://bugzilla.suse.com/1122208" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6446" ref_url="https://www.suse.com/security/cve/CVE-2019-6446/" source="CVE"/>
		<description>
This update for python-numpy fixes the following issues:
	  
Security issue fixed:

- CVE-2019-6446: Set allow_pickle to false by default to restrict loading untrusted content (bsc#1122208).
  With this update we decrease the possibility of allowing remote attackers to execute arbitrary code by
  misusing numpy.load(). A warning during runtime will show-up when the allow_pickle is not explicitly set.
  
NOTE: By applying this update the behavior of python-numpy changes, which might break your application.
In order to get the old behaviour back, you have to explicitly set `allow_pickle` to True. Be aware
that this should only be done for trusted input, as loading untrusted input might lead to arbitrary code
execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-12"/>
	<updated date="2019-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122208">SUSE bug 1122208</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6446/">CVE-2019-6446 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6446">CVE-2019-6446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574767" comment="python-numpy-1.3.0-1.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219371" version="1" class="patch">
	<metadata>
		<title>Security update for python-paramiko (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1085276" ref_url="https://bugzilla.suse.com/1085276" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7750" ref_url="https://www.suse.com/security/cve/CVE-2018-7750/" source="CVE"/>
		<description>
This update for python-paramiko fixes the following issues:

- CVE-2018-7750: transport.py in the SSH server implementation of Paramiko did
  not properly check whether authentication is completed processing other
  requests. A customized SSH client could have skipped the authentication step
  (bsc#1085276)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-17"/>
	<updated date="2018-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085276">SUSE bug 1085276</bugzilla>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7750/">CVE-2018-7750 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7750">CVE-2018-7750 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581052" comment="python-paramiko-1.13.1-0.3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219372" version="1" class="patch">
	<metadata>
		<title>Security update for python-paramiko (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1111151" ref_url="https://bugzilla.suse.com/1111151" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000805" ref_url="https://www.suse.com/security/cve/CVE-2018-1000805/" source="CVE"/>
		<description>
This update for python-paramiko fixes the following issues:

- CVE-2018-1000805: Fixed an authentication bypass in auth_handler.py (bsc#1111151).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-19"/>
	<updated date="2020-05-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1111151">SUSE bug 1111151</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000805/">CVE-2018-1000805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000805">CVE-2018-1000805 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581053" comment="python-paramiko-1.13.1-0.3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219373" version="1" class="patch">
	<metadata>
		<title>Security update for python-pip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186819" ref_url="https://bugzilla.suse.com/1186819" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3572" ref_url="https://www.suse.com/security/cve/CVE-2021-3572/" source="CVE"/>
		<description>
This update for python-pip fixes the following issues:

- CVE-2021-3572: Fixed incorrect handling of unicode separators in git references (bsc#1186819).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-03"/>
	<updated date="2022-01-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186819">SUSE bug 1186819</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3572/">CVE-2021-3572 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3572">CVE-2021-3572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659259" comment="python-pip-1.4.1-0.10.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219374" version="1" class="patch">
	<metadata>
		<title>Security update for python-pycrypto (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1017420" ref_url="https://bugzilla.suse.com/1017420" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7459" ref_url="https://www.suse.com/security/cve/CVE-2013-7459/" source="CVE"/>
		<description>
This update for python-pycrypto fixes the following issues:

- CVE-2013-7459: Fixed a potential heap buffer overflow in ALGnew (bsc#1017420).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-09"/>
	<updated date="2018-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1017420">SUSE bug 1017420</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7459/">CVE-2013-7459 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7459">CVE-2013-7459 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581054" comment="python-pycrypto-2.6-0.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219375" version="1" class="patch">
	<metadata>
		<title>Recommended update for python-pywbem</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="856108" ref_url="https://bugzilla.suse.com/856108" source="BUGZILLA"/>
		<reference ref_id="856323" ref_url="https://bugzilla.suse.com/856323" source="BUGZILLA"/>
		<reference ref_id="876783" ref_url="https://bugzilla.suse.com/876783" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6418" ref_url="https://www.suse.com/security/cve/CVE-2013-6418/" source="CVE"/>
		<description>

This update for python-pywbem fixes the following issue:

    * Do not remove 'pwd' library from the import list. (bnc#876783)

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-04"/>
	<updated date="2014-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/856108">SUSE bug 856108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856323">SUSE bug 856323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876783">SUSE bug 876783</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6418/">CVE-2013-6418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6418">CVE-2013-6418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994098" comment="python-pywbem-0.7-6.22.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994098" comment="python-pywbem-0.7-6.22.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994098" comment="python-pywbem-0.7-6.22.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219376" version="1" class="patch">
	<metadata>
		<title>Security update for python-setuptools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1206667" ref_url="https://bugzilla.suse.com/1206667" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40897" ref_url="https://www.suse.com/security/cve/CVE-2022-40897/" source="CVE"/>
		<description>
This update for python-setuptools fixes the following issues:

- CVE-2022-40897: Fixed an excessive CPU usage that could be triggered
  by fetching a malicious HTML document (bsc#1206667).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-18"/>
	<updated date="2023-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1206667">SUSE bug 1206667</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40897/">CVE-2022-40897 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40897">CVE-2022-40897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994099" comment="python-setuptools-0.6c11-11.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219377" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1068664" ref_url="https://bugzilla.suse.com/1068664" source="BUGZILLA"/>
		<reference ref_id="1079300" ref_url="https://bugzilla.suse.com/1079300" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<reference ref_id="CVE-2018-1000030" ref_url="https://www.suse.com/security/cve/CVE-2018-1000030/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

Security issues fixed:

- CVE-2017-1000158: Fixed integer overflows in PyString_DecodeEscape that could have resulted in
  heap-based buffer overflow attacks and possible arbitrary code execution (bsc#1068664).
- CVE-2018-1000030: Fixed crash inside the Python interpreter when multiple threads used the same
  I/O stream concurrently (bsc#1079300).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-07"/>
	<updated date="2018-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068664">SUSE bug 1068664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079300">SUSE bug 1079300</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000158">CVE-2017-1000158 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000030/">CVE-2018-1000030 at SUSE</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000030">CVE-2018-1000030 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574786" comment="libpython2_7-1_0-2.7.9-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574787" comment="libpython2_7-1_0-32bit-2.7.9-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574788" comment="python27-2.7.9-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574789" comment="python27-32bit-2.7.9-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574790" comment="python27-base-2.7.9-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574791" comment="python27-base-32bit-2.7.9-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574792" comment="python27-curses-2.7.9-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574793" comment="python27-demo-2.7.9-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574794" comment="python27-devel-2.7.9-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574795" comment="python27-doc-2.7.9-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574796" comment="python27-doc-pdf-2.7.9-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574797" comment="python27-gdbm-2.7.9-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574798" comment="python27-idle-2.7.9-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574799" comment="python27-tk-2.7.9-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574800" comment="python27-xml-2.7.9-6.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219378" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1083507" ref_url="https://bugzilla.suse.com/1083507" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

The following security vulnerabilities were addressed:

- Add a check to Lib/wave.py that verifies that at least one channel is
  provided. Prior to this, attackers could cause a denial of service via a
  crafted wav format audio file. [bsc#1083507, CVE-2017-18207]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-13"/>
	<updated date="2018-06-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083507">SUSE bug 1083507</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18207">CVE-2017-18207 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574801" comment="libpython2_7-1_0-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574802" comment="libpython2_7-1_0-32bit-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574803" comment="python27-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574804" comment="python27-32bit-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574805" comment="python27-base-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574806" comment="python27-base-32bit-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574807" comment="python27-curses-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574808" comment="python27-demo-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574809" comment="python27-devel-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574810" comment="python27-doc-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574811" comment="python27-doc-pdf-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574812" comment="python27-gdbm-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574813" comment="python27-idle-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574814" comment="python27-tk-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574815" comment="python27-xml-2.7.9-6.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219379" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1109663" ref_url="https://bugzilla.suse.com/1109663" source="BUGZILLA"/>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802/" source="CVE"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<description>
This update for python27 fixes the following issue:

- CVE-2018-1000802: Prevent command injection in shutil module (make_archive
  function) via passage of unfiltered user input (bsc#1109663)
- CVE-2018-14647: Python's elementtree C accelerator failed to initialise
  Expat's hash salt during initialization. This could make it easy to conduct
  denial of service attacks against Expat by constructing an XML document that
  would cause pathological hash collisions in Expat's internal data structures,
  consuming large amounts CPU and RAM (bsc#1109847).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-04"/>
	<updated date="2018-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1109663">SUSE bug 1109663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000802">CVE-2018-1000802 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14647">CVE-2018-14647 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574816" comment="libpython2_7-1_0-2.7.9-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574817" comment="libpython2_7-1_0-32bit-2.7.9-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574818" comment="python27-2.7.9-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574819" comment="python27-32bit-2.7.9-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574820" comment="python27-base-2.7.9-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574821" comment="python27-base-32bit-2.7.9-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574822" comment="python27-curses-2.7.9-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574823" comment="python27-demo-2.7.9-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574824" comment="python27-devel-2.7.9-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574825" comment="python27-doc-2.7.9-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574826" comment="python27-doc-pdf-2.7.9-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574827" comment="python27-gdbm-2.7.9-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574828" comment="python27-idle-2.7.9-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574829" comment="python27-tk-2.7.9-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574830" comment="python27-xml-2.7.9-6.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219380" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122191" ref_url="https://bugzilla.suse.com/1122191" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

Security issue fixed:

- CVE-2019-5010: Fixed a denial-of-service vulnerability in the X509 certificate parser (bsc#1122191)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-25"/>
	<updated date="2019-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5010">CVE-2019-5010 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574831" comment="libpython2_7-1_0-2.7.9-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574832" comment="libpython2_7-1_0-32bit-2.7.9-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574833" comment="python27-2.7.9-6.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574834" comment="python27-32bit-2.7.9-6.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574835" comment="python27-base-2.7.9-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574836" comment="python27-base-32bit-2.7.9-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574837" comment="python27-curses-2.7.9-6.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574838" comment="python27-demo-2.7.9-6.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574839" comment="python27-devel-2.7.9-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574840" comment="python27-doc-2.7.9-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574841" comment="python27-doc-pdf-2.7.9-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574842" comment="python27-gdbm-2.7.9-6.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574843" comment="python27-idle-2.7.9-6.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574844" comment="python27-tk-2.7.9-6.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574845" comment="python27-xml-2.7.9-6.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219381" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="1130847" ref_url="https://bugzilla.suse.com/1130847" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9948" ref_url="https://www.suse.com/security/cve/CVE-2019-9948/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:
Security issues fixed:

- CVE-2019-9948: Fixed a 'file:' blacklist bypass in URIs by using the 'local-file:' scheme instead (bsc#1130847).
- CVE-2019-9636: Fixed an information disclosure because of incorrect handling of Unicode encoding during NFKC normalization (bsc#1129346).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-15"/>
	<updated date="2019-04-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130847">SUSE bug 1130847</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9636">CVE-2019-9636 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9948/">CVE-2019-9948 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9948">CVE-2019-9948 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574846" comment="libpython2_7-1_0-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574847" comment="libpython2_7-1_0-32bit-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574848" comment="python27-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574849" comment="python27-32bit-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574850" comment="python27-base-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574851" comment="python27-base-32bit-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574852" comment="python27-curses-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574853" comment="python27-demo-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574854" comment="python27-devel-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574855" comment="python27-doc-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574856" comment="python27-doc-pdf-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574857" comment="python27-gdbm-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574858" comment="python27-idle-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574859" comment="python27-tk-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574860" comment="python27-xml-2.7.9-6.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219382" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1149955" ref_url="https://bugzilla.suse.com/1149955" source="BUGZILLA"/>
		<reference ref_id="1153238" ref_url="https://bugzilla.suse.com/1153238" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

Security issue fixed:

- CVE-2019-16056: Fixed a parser issue in the email module. (bsc#1149955)
- CVE-2019-16935: Fixed a reflected XSS in python/Lib/DocXMLRPCServer.py (bsc#1153238).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-18"/>
	<updated date="2019-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153238">SUSE bug 1153238</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16056">CVE-2019-16056 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16935">CVE-2019-16935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574861" comment="libpython2_7-1_0-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574862" comment="libpython2_7-1_0-32bit-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574863" comment="python27-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574864" comment="python27-32bit-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574865" comment="python27-base-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574866" comment="python27-base-32bit-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574867" comment="python27-curses-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574868" comment="python27-demo-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574869" comment="python27-devel-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574870" comment="python27-doc-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574871" comment="python27-doc-pdf-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574872" comment="python27-gdbm-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574873" comment="python27-idle-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574874" comment="python27-tk-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574875" comment="python27-xml-2.7.16-6.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219383" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="1162825" ref_url="https://bugzilla.suse.com/1162825" source="BUGZILLA"/>
		<reference ref_id="1165894" ref_url="https://bugzilla.suse.com/1165894" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

python27 was updated to version 2.7.17. 

- CVE-2019-18348: Fixed a CRLF injection via the host part 
  of the url passed to urlopen(). Now an InvalidURL exception 
  is raised (bsc#1155094).
- CVE-2019-9674: Improved the documentation to reflect the dangers of zip-bombs (bsc#1162825).
- CVE-2020-8492: Fixed a regular expression in urllib that was prone to denial of service via HTTP (bsc#1162367).	  
- Unified packages among openSUSE:Factory and SLE versions (bsc#1159035).
- Added idle.desktop and idle.appdata.xml to provide IDLE in menus (bsc#1153830).
- Changed name of idle27 icons to idle27.png (bsc#1165894).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-27"/>
	<updated date="2020-03-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165894">SUSE bug 1165894</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">CVE-2019-18348 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">CVE-2019-9674 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574876" comment="libpython2_7-1_0-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574877" comment="libpython2_7-1_0-32bit-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574878" comment="python-rpm-macros-20190408.32abece-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574879" comment="python27-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574880" comment="python27-32bit-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574881" comment="python27-base-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574882" comment="python27-base-32bit-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574883" comment="python27-curses-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574884" comment="python27-demo-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574885" comment="python27-devel-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574886" comment="python27-doc-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574887" comment="python27-doc-pdf-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574888" comment="python27-gdbm-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574889" comment="python27-idle-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574890" comment="python27-tk-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574891" comment="python27-xml-2.7.17-6.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219384" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174091" ref_url="https://bugzilla.suse.com/1174091" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

- CVE-2019-20907, bsc#1174091: avoiding possible infinite loop in specifically crafted tarball.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-09"/>
	<updated date="2020-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574892" comment="libpython2_7-1_0-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574893" comment="libpython2_7-1_0-32bit-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574894" comment="python27-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574895" comment="python27-32bit-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574896" comment="python27-base-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574897" comment="python27-base-32bit-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574898" comment="python27-curses-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574899" comment="python27-demo-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574900" comment="python27-devel-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574901" comment="python27-doc-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574902" comment="python27-doc-pdf-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574903" comment="python27-gdbm-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574904" comment="python27-idle-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574905" comment="python27-tk-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574906" comment="python27-xml-2.7.17-6.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219385" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

 - Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574907" comment="libpython2_7-1_0-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574908" comment="libpython2_7-1_0-32bit-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574909" comment="python27-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574910" comment="python27-32bit-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574911" comment="python27-base-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574912" comment="python27-base-32bit-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574913" comment="python27-curses-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574914" comment="python27-demo-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574915" comment="python27-devel-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574916" comment="python27-doc-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574917" comment="python27-doc-pdf-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574918" comment="python27-gdbm-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574919" comment="python27-idle-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574920" comment="python27-tk-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574921" comment="python27-xml-2.7.17-6.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219386" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="1181126" ref_url="https://bugzilla.suse.com/1181126" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

- buffer overflow in PyCArg_repr in _ctypes/callproc.c,
  which may lead to remote code execution (bsc#1181126, CVE-2021-3177).
- Provide the newest setuptools wheel (bsc#1176262,
  CVE-2019-20916) in their correct form (bsc#1180686).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-08"/>
	<updated date="2021-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181126">SUSE bug 1181126</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574922" comment="libpython2_7-1_0-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574923" comment="libpython2_7-1_0-32bit-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574924" comment="python27-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574925" comment="python27-32bit-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574926" comment="python27-base-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574927" comment="python27-base-32bit-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574928" comment="python27-curses-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574929" comment="python27-demo-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574930" comment="python27-devel-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574931" comment="python27-doc-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574932" comment="python27-doc-pdf-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574933" comment="python27-gdbm-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574934" comment="python27-idle-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574935" comment="python27-tk-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574936" comment="python27-xml-2.7.17-6.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219387" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182379" ref_url="https://bugzilla.suse.com/1182379" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

- python27 was upgraded to 2.7.18 	  
- CVE-2021-23336: Fixed a potential web cache poisoning by using a 
  semicolon in query parameters use of semicolon as a query string 
  separator (bsc#1182379).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-04"/>
	<updated date="2021-03-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182379">SUSE bug 1182379</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574937" comment="libpython2_7-1_0-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574938" comment="libpython2_7-1_0-32bit-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574939" comment="python27-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574940" comment="python27-32bit-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574941" comment="python27-base-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574942" comment="python27-base-32bit-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574943" comment="python27-curses-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574944" comment="python27-demo-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574945" comment="python27-devel-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574946" comment="python27-doc-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574947" comment="python27-doc-pdf-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574948" comment="python27-gdbm-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574949" comment="python27-idle-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574950" comment="python27-tk-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574951" comment="python27-xml-2.7.18-6.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219388" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1177211" ref_url="https://bugzilla.suse.com/1177211" source="BUGZILLA"/>
		<reference ref_id="1187668" ref_url="https://bugzilla.suse.com/1187668" source="BUGZILLA"/>
		<reference ref_id="1189241" ref_url="https://bugzilla.suse.com/1189241" source="BUGZILLA"/>
		<reference ref_id="1189287" ref_url="https://bugzilla.suse.com/1189287" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<reference ref_id="CVE-2021-3733" ref_url="https://www.suse.com/security/cve/CVE-2021-3733/" source="CVE"/>
		<reference ref_id="CVE-2021-3737" ref_url="https://www.suse.com/security/cve/CVE-2021-3737/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

- CVE-2021-3737: Fixed http client infinite line reading (DoS) after a http 100. (bsc#1189241)
- CVE-2021-3733: Fixed ReDoS in urllib.request. (bsc#1189287)
- CVE-2020-26116: Fixed a CRLF injection via HTTP request method in httplib/http.client. (bsc#1177211)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-30"/>
	<updated date="2021-09-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187668">SUSE bug 1187668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189241">SUSE bug 1189241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189287">SUSE bug 1189287</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26116">CVE-2020-26116 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3733/">CVE-2021-3733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3733">CVE-2021-3733 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3737/">CVE-2021-3737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3737">CVE-2021-3737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634733" comment="libpython2_7-1_0-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634734" comment="libpython2_7-1_0-32bit-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634735" comment="python27-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634736" comment="python27-32bit-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634737" comment="python27-base-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634738" comment="python27-base-32bit-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634739" comment="python27-curses-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634740" comment="python27-demo-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634741" comment="python27-devel-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634742" comment="python27-doc-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634743" comment="python27-doc-pdf-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634744" comment="python27-gdbm-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634745" comment="python27-idle-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634746" comment="python27-tk-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634747" comment="python27-xml-2.7.18-6.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219389" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194146" ref_url="https://bugzilla.suse.com/1194146" source="BUGZILLA"/>
		<reference ref_id="1195396" ref_url="https://bugzilla.suse.com/1195396" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4189" ref_url="https://www.suse.com/security/cve/CVE-2021-4189/" source="CVE"/>
		<reference ref_id="CVE-2022-0391" ref_url="https://www.suse.com/security/cve/CVE-2022-0391/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

- CVE-2022-0391: Fixed newline and tabs sanitation in urllib.parse (bsc#1195396).
- CVE-2021-4189: Fixed incorrect trust of PASV response (bsc#1194146).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-25"/>
	<updated date="2022-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194146">SUSE bug 1194146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195396">SUSE bug 1195396</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4189/">CVE-2021-4189 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4189">CVE-2021-4189 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-0391/">CVE-2022-0391 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0391">CVE-2022-0391 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668229" comment="libpython2_7-1_0-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668230" comment="libpython2_7-1_0-32bit-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668231" comment="python27-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668232" comment="python27-32bit-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668233" comment="python27-base-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668234" comment="python27-base-32bit-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668235" comment="python27-curses-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668236" comment="python27-demo-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668237" comment="python27-devel-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668238" comment="python27-doc-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668239" comment="python27-doc-pdf-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668240" comment="python27-gdbm-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668241" comment="python27-idle-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668242" comment="python27-tk-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668243" comment="python27-xml-2.7.18-6.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219390" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186819" ref_url="https://bugzilla.suse.com/1186819" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3572" ref_url="https://www.suse.com/security/cve/CVE-2021-3572/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

- CVE-2021-3572: Fixed an improper handling of unicode characters in pip (bsc#1186819).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186819">SUSE bug 1186819</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3572/">CVE-2021-3572 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3572">CVE-2021-3572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677044" comment="libpython2_7-1_0-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677045" comment="libpython2_7-1_0-32bit-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677046" comment="python27-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677047" comment="python27-32bit-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677048" comment="python27-base-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677049" comment="python27-base-32bit-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677050" comment="python27-curses-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677051" comment="python27-demo-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677052" comment="python27-devel-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677053" comment="python27-doc-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677054" comment="python27-doc-pdf-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677055" comment="python27-gdbm-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677056" comment="python27-idle-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677057" comment="python27-tk-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677058" comment="python27-xml-2.7.18-6.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219391" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198511" ref_url="https://bugzilla.suse.com/1198511" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-20107" ref_url="https://www.suse.com/security/cve/CVE-2015-20107/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

- CVE-2015-20107: avoid command injection in the mailcap module (bsc#1198511).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-24"/>
	<updated date="2022-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198511">SUSE bug 1198511</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-20107/">CVE-2015-20107 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-20107">CVE-2015-20107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994100" comment="libpython2_7-1_0-2.7.18-6.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994101" comment="libpython2_7-1_0-32bit-2.7.18-6.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994102" comment="python27-2.7.18-6.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994103" comment="python27-32bit-2.7.18-6.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994104" comment="python27-base-2.7.18-6.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994105" comment="python27-base-32bit-2.7.18-6.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994106" comment="python27-curses-2.7.18-6.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994107" comment="python27-demo-2.7.18-6.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994108" comment="python27-devel-2.7.18-6.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994109" comment="python27-doc-2.7.18-6.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994110" comment="python27-doc-pdf-2.7.18-6.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994111" comment="python27-gdbm-2.7.18-6.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994112" comment="python27-idle-2.7.18-6.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994113" comment="python27-tk-2.7.18-6.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994114" comment="python27-xml-2.7.18-6.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219392" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1202624" ref_url="https://bugzilla.suse.com/1202624" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28861" ref_url="https://www.suse.com/security/cve/CVE-2021-28861/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:
                                                                                                                                                                                               
- CVE-2021-28861: Fixed an open redirection vulnerability in the HTTP server when an URI path starts with // (bsc#1202624).                                                                    
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-04"/>
	<updated date="2022-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1202624">SUSE bug 1202624</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28861/">CVE-2021-28861 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28861">CVE-2021-28861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994115" comment="libpython2_7-1_0-2.7.18-6.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994116" comment="libpython2_7-1_0-32bit-2.7.18-6.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994117" comment="python27-2.7.18-6.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994118" comment="python27-32bit-2.7.18-6.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994119" comment="python27-base-2.7.18-6.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994120" comment="python27-base-32bit-2.7.18-6.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994121" comment="python27-curses-2.7.18-6.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994122" comment="python27-demo-2.7.18-6.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994123" comment="python27-devel-2.7.18-6.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994124" comment="python27-doc-2.7.18-6.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994125" comment="python27-doc-pdf-2.7.18-6.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994126" comment="python27-gdbm-2.7.18-6.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994127" comment="python27-idle-2.7.18-6.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994128" comment="python27-tk-2.7.18-6.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994129" comment="python27-xml-2.7.18-6.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219393" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1205244" ref_url="https://bugzilla.suse.com/1205244" source="BUGZILLA"/>
		<reference ref_id="1208471" ref_url="https://bugzilla.suse.com/1208471" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-45061" ref_url="https://www.suse.com/security/cve/CVE-2022-45061/" source="CVE"/>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

- CVE-2023-24329: Fixed blocklist bypass via the urllib.parse component when supplying a URL that starts with blank characters (bsc#1208471).
- CVE-2022-45061: Fixed DoS when IDNA decodes extremely long domain names (bsc#1205244).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-08"/>
	<updated date="2023-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205244">SUSE bug 1205244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208471">SUSE bug 1208471</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45061/">CVE-2022-45061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45061">CVE-2022-45061 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994130" comment="libpython2_7-1_0-2.7.18-6.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994131" comment="libpython2_7-1_0-32bit-2.7.18-6.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994132" comment="python27-2.7.18-6.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994133" comment="python27-32bit-2.7.18-6.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994134" comment="python27-base-2.7.18-6.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994135" comment="python27-base-32bit-2.7.18-6.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994136" comment="python27-curses-2.7.18-6.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994137" comment="python27-demo-2.7.18-6.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994138" comment="python27-devel-2.7.18-6.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994139" comment="python27-doc-2.7.18-6.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994140" comment="python27-doc-pdf-2.7.18-6.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994141" comment="python27-gdbm-2.7.18-6.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994142" comment="python27-idle-2.7.18-6.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994143" comment="python27-tk-2.7.18-6.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994144" comment="python27-xml-2.7.18-6.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219394" version="1" class="patch">
	<metadata>
		<title>Security update for python27-Jinja2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181944" ref_url="https://bugzilla.suse.com/1181944" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28493" ref_url="https://www.suse.com/security/cve/CVE-2020-28493/" source="CVE"/>
		<description>
This update for python27-Jinja2 fixes the following issues:

- CVE-2020-28493: Improve the speed of the 'urlize' filter by reducing regex
    backtracking. Email matching requires a word character at the start of the
    domain part, and only word characters in the TLD. (bsc#1181944)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-22"/>
	<updated date="2021-02-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181944">SUSE bug 1181944</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28493/">CVE-2020-28493 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28493">CVE-2020-28493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581055" comment="python27-Jinja2-2.7.2-2.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219395" version="1" class="patch">
	<metadata>
		<title>Security update for python27-ecdsa (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1153165" ref_url="https://bugzilla.suse.com/1153165" source="BUGZILLA"/>
		<reference ref_id="1154217" ref_url="https://bugzilla.suse.com/1154217" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14853" ref_url="https://www.suse.com/security/cve/CVE-2019-14853/" source="CVE"/>
		<reference ref_id="CVE-2019-14859" ref_url="https://www.suse.com/security/cve/CVE-2019-14859/" source="CVE"/>
		<description>
This update for python27-ecdsa to version 0.13.3 fixes the following issues:

Security issues fixed:

- CVE-2019-14853: Fixed unexpected exceptions during signature decoding (bsc#1153165).
- CVE-2019-14859: Fixed a signature malleability caused by insufficient checks of DER encoding (bsc#1154217).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-20"/>
	<updated date="2019-11-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1153165">SUSE bug 1153165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154217">SUSE bug 1154217</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14853/">CVE-2019-14853 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14853">CVE-2019-14853 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14859/">CVE-2019-14859 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14859">CVE-2019-14859 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581056" comment="python27-ecdsa-0.13.3-0.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219396" version="1" class="patch">
	<metadata>
		<title>Security update for python27-urllib3, python27-boto3, python27-botocore, python27-s3transfer  (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1074247" ref_url="https://bugzilla.suse.com/1074247" source="BUGZILLA"/>
		<reference ref_id="1129071" ref_url="https://bugzilla.suse.com/1129071" source="BUGZILLA"/>
		<reference ref_id="1132663" ref_url="https://bugzilla.suse.com/1132663" source="BUGZILLA"/>
		<reference ref_id="1132900" ref_url="https://bugzilla.suse.com/1132900" source="BUGZILLA"/>
		<reference ref_id="1149466" ref_url="https://bugzilla.suse.com/1149466" source="BUGZILLA"/>
		<reference ref_id="1150895" ref_url="https://bugzilla.suse.com/1150895" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9015" ref_url="https://www.suse.com/security/cve/CVE-2016-9015/" source="CVE"/>
		<reference ref_id="CVE-2019-11236" ref_url="https://www.suse.com/security/cve/CVE-2019-11236/" source="CVE"/>
		<reference ref_id="CVE-2019-11324" ref_url="https://www.suse.com/security/cve/CVE-2019-11324/" source="CVE"/>
		<reference ref_id="CVE-2019-9740" ref_url="https://www.suse.com/security/cve/CVE-2019-9740/" source="CVE"/>
		<description>
This update fixes the following issues:

python27-urllib3 was updated to version 1.24 (bsc#1149466).
python27-botocore was updated to version 1.12.213 (bsc#1149466).
python27-s3transfer was updated to version 0.2.1 (bsc#1149466).
python27-boto3 was updated to version 1.9.213 (bsc#1149466)

Security issues fixed in python27-urllib3:

- CVE-2019-9740: Fixed a CRLF injection (bsc#1129071).
- CVE-2019-11236: Fixed a CRLF injection (bsc#1132663).
- CVE-2019-11324: Fixed an improper validation of CA certificates (bsc#1132900).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-18"/>
	<updated date="2019-12-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074247">SUSE bug 1074247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129071">SUSE bug 1129071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132663">SUSE bug 1132663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132900">SUSE bug 1132900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149466">SUSE bug 1149466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150895">SUSE bug 1150895</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9015/">CVE-2016-9015 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9015">CVE-2016-9015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11236/">CVE-2019-11236 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11236">CVE-2019-11236 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11324/">CVE-2019-11324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11324">CVE-2019-11324 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9740/">CVE-2019-9740 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9740">CVE-2019-9740 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581057" comment="python27-boto3-1.9.213-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581058" comment="python27-botocore-1.12.213-3.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581059" comment="python27-s3transfer-0.2.1-3.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581060" comment="python27-urllib3-1.24-0.3.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219397" version="1" class="patch">
	<metadata>
		<title>Security update for python27-setuptools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1206667" ref_url="https://bugzilla.suse.com/1206667" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40897" ref_url="https://www.suse.com/security/cve/CVE-2022-40897/" source="CVE"/>
		<description>
This update for python27-setuptools fixes the following issues:

- CVE-2022-40897: Fixed a Regular Expression Denial of Service (ReDoS) in package_index.py (bsc#1206667).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-08"/>
	<updated date="2023-03-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1206667">SUSE bug 1206667</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40897/">CVE-2022-40897 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40897">CVE-2022-40897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994145" comment="python27-setuptools-18.0.1-4.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219398" version="1" class="patch">
	<metadata>
		<title>Recommended update for python 2.7 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1007084" ref_url="https://bugzilla.suse.com/1007084" source="BUGZILLA"/>
		<reference ref_id="1014478" ref_url="https://bugzilla.suse.com/1014478" source="BUGZILLA"/>
		<reference ref_id="1015776" ref_url="https://bugzilla.suse.com/1015776" source="BUGZILLA"/>
		<reference ref_id="1054106" ref_url="https://bugzilla.suse.com/1054106" source="BUGZILLA"/>
		<reference ref_id="1054413" ref_url="https://bugzilla.suse.com/1054413" source="BUGZILLA"/>
		<reference ref_id="1064755" ref_url="https://bugzilla.suse.com/1064755" source="BUGZILLA"/>
		<reference ref_id="1073879" ref_url="https://bugzilla.suse.com/1073879" source="BUGZILLA"/>
		<reference ref_id="1075263" ref_url="https://bugzilla.suse.com/1075263" source="BUGZILLA"/>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1097455" ref_url="https://bugzilla.suse.com/1097455" source="BUGZILLA"/>
		<reference ref_id="1098681" ref_url="https://bugzilla.suse.com/1098681" source="BUGZILLA"/>
		<reference ref_id="905354" ref_url="https://bugzilla.suse.com/905354" source="BUGZILLA"/>
		<reference ref_id="962170" ref_url="https://bugzilla.suse.com/962170" source="BUGZILLA"/>
		<reference ref_id="974705" ref_url="https://bugzilla.suse.com/974705" source="BUGZILLA"/>
		<reference ref_id="974993" ref_url="https://bugzilla.suse.com/974993" source="BUGZILLA"/>
		<reference ref_id="975949" ref_url="https://bugzilla.suse.com/975949" source="BUGZILLA"/>
		<reference ref_id="998103" ref_url="https://bugzilla.suse.com/998103" source="BUGZILLA"/>
		<reference ref_id="998378" ref_url="https://bugzilla.suse.com/998378" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12880" ref_url="https://www.suse.com/security/cve/CVE-2017-12880/" source="CVE"/>
		<description>

This update provides various modules for Python 2.7.

It also updates python 2.7 to the 2.7.16 release, fixing security issues and bugs.

The following packages are included in the update:

- cloud-init
- growpart
- python27-argparse
- python27-blinker
- python27-boto3
- python27-botocore
- python27-cffi
- python27-Cheetah
- python27-configobj
- python27-cryptography
- python27-dateutil
- python27-docutils
- python27-ecdsa
- python27-enum34
- python27-futures
- python27-httplib2
- python27-idna
- python27-ipaddress
- python27-Jinja2
- python27-jmespath
- python27-jsonpatch
- python27-jsonpointer
- python27-jsonschema
- python27-lockfile
- python27-MarkupSafe
- python27-oauthlib
- python27-oauth
- python27-paramiko
- python27-ply
- python27-PrettyTable
- python27-pyasn1-modules
- python27-pyasn1
- python27-pycparser
- python27-pycrypto
- python27-PyJWT
- python27-pyserial
- python27-pytest
- python27-python-daemon
- python27-PyYAML
- python27-requests
- python27-s3transfer
- python27-setuptools
- python27-simplejson
- python27-six
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-03"/>
	<updated date="2019-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007084">SUSE bug 1007084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014478">SUSE bug 1014478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015776">SUSE bug 1015776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054106">SUSE bug 1054106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054413">SUSE bug 1054413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064755">SUSE bug 1064755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073879">SUSE bug 1073879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075263">SUSE bug 1075263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097455">SUSE bug 1097455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098681">SUSE bug 1098681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905354">SUSE bug 905354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962170">SUSE bug 962170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974705">SUSE bug 974705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974993">SUSE bug 974993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975949">SUSE bug 975949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998103">SUSE bug 998103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998378">SUSE bug 998378</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12880/">CVE-2017-12880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-12880">CVE-2017-12880 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581061" comment="cloud-init-18.5-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581062" comment="cloud-init-config-suse-18.5-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581063" comment="cloud-init-doc-18.5-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581064" comment="growpart-0.30-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574952" comment="libpython2_7-1_0-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574953" comment="libpython2_7-1_0-32bit-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574954" comment="python27-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574955" comment="python27-32bit-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581065" comment="python27-Cheetah-2.4.4-0.3.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581066" comment="python27-Jinja2-2.7.2-2.3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581067" comment="python27-MarkupSafe-0.18-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581068" comment="python27-PrettyTable-0.7.2-0.3.3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581069" comment="python27-PyJWT-1.4.2-3.3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581070" comment="python27-PyYAML-3.10-0.3.3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581071" comment="python27-argparse-1.2.1-2.3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574956" comment="python27-base-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574957" comment="python27-base-32bit-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581072" comment="python27-blinker-1.4-3.3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581073" comment="python27-boto3-1.7.42-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581074" comment="python27-botocore-1.10.57-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581075" comment="python27-cffi-1.5.2-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581076" comment="python27-configobj-5.0.6-1.3.3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581077" comment="python27-cryptography-1.3.1-3.5.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574958" comment="python27-curses-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581078" comment="python27-dateutil-2.1-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574959" comment="python27-demo-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574960" comment="python27-devel-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574961" comment="python27-doc-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574962" comment="python27-doc-pdf-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581079" comment="python27-docutils-0.11-0.3.3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581080" comment="python27-ecdsa-0.10-0.3.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581081" comment="python27-enum34-1.1.3-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581082" comment="python27-futures-3.0.2-3.3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574963" comment="python27-gdbm-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581083" comment="python27-httplib2-0.9.2-3.3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574964" comment="python27-idle-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581084" comment="python27-idna-2.0-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581085" comment="python27-ipaddress-1.0.18-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581086" comment="python27-jmespath-0.9.2-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581087" comment="python27-jsonpatch-1.1-0.3.3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581088" comment="python27-jsonpointer-1.0-0.3.3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581089" comment="python27-jsonschema-2.4.0-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581090" comment="python27-lockfile-0.9.1-2.3.3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581091" comment="python27-oauth-1.0.1-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581092" comment="python27-oauthlib-0.7.2-3.3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581093" comment="python27-paramiko-1.13.1-0.3.3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581094" comment="python27-ply-3.4-3.3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581095" comment="python27-pyasn1-0.1.9-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581096" comment="python27-pyasn1-modules-0.0.5-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581097" comment="python27-pycparser-2.10-3.3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581098" comment="python27-pycrypto-2.6-0.3.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581099" comment="python27-pyserial-2.7-3.3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581100" comment="python27-pytest-2.5.1-0.3.4.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581101" comment="python27-python-daemon-1.5.5-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581102" comment="python27-requests-2.0.1-0.3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581103" comment="python27-s3transfer-0.1.13-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574965" comment="python27-setuptools-18.0.1-4.2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581104" comment="python27-simplejson-3.8.2-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581105" comment="python27-six-1.7.2-0.3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574966" comment="python27-tk-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574967" comment="python27-xml-2.7.16-6.29.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219399" version="1" class="patch">
	<metadata>
		<title>Security update for quagga</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="822572" ref_url="https://bugzilla.suse.com/822572" source="BUGZILLA"/>
		<reference ref_id="828117" ref_url="https://bugzilla.suse.com/828117" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0149" ref_url="https://www.suse.com/security/cve/CVE-2013-0149/" source="CVE"/>
		<reference ref_id="CVE-2013-2236" ref_url="https://www.suse.com/security/cve/CVE-2013-2236/" source="CVE"/>
		<description>

This update of quagga fixes two security issues:

    * CVE-2013-0149: specially-crafted OSPF packets could have caused the
      routing table to be erased (bnc#822572)
    * CVE-2013-2236: local network stack overflow (bnc#828117)

Security Issue references:

    * CVE-2013-2236
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2236&gt;
    * CVE-2013-0149
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0149&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-22"/>
	<updated date="2013-08-22"/>
	<bugzilla href="https://bugzilla.suse.com/822572">SUSE bug 822572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828117">SUSE bug 828117</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0149/">CVE-2013-0149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0149">CVE-2013-0149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2236/">CVE-2013-2236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2236">CVE-2013-2236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576872" comment="quagga-0.99.15-0.14.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576872" comment="quagga-0.99.15-0.14.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576872" comment="quagga-0.99.15-0.14.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219400" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="970952" ref_url="https://bugzilla.suse.com/970952" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2342" ref_url="https://www.suse.com/security/cve/CVE-2016-2342/" source="CVE"/>
		<description>

This update for quagga fixes the following security issue:

- CVE-2016-2342: Quagga was extended the prefixlen check to ensure it is
  within the bound of the NLRI packet data and the on-stack prefix structure
  and the maximum size for the address family (bsc#970952).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-04"/>
	<updated date="2016-04-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/970952">SUSE bug 970952</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2342/">CVE-2016-2342 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2342">CVE-2016-2342 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574969" comment="quagga-0.99.15-0.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219401" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="770619" ref_url="https://bugzilla.suse.com/770619" source="BUGZILLA"/>
		<description>
This update for quagga fixes one security issue:

- bsc#770619: Disallow unprivileged users to enter config directory /etc/quagga
  (group: quagga, mode: 750) and read configuration files installed
  there (group: quagga, mode: 640).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-05"/>
	<updated date="2016-04-05"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/770619">SUSE bug 770619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574970" comment="quagga-0.99.15-0.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219402" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="977012" ref_url="https://bugzilla.suse.com/977012" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4049" ref_url="https://www.suse.com/security/cve/CVE-2016-4049/" source="CVE"/>
		<description>

This update for quagga fixes the following issue:

Security issue fixed:
- CVE-2016-4049: Fix for a buffer overflow error in bgp_dump_routes_func. (bsc#977012)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-03"/>
	<updated date="2016-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/977012">SUSE bug 977012</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4049/">CVE-2016-4049 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4049">CVE-2016-4049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574971" comment="quagga-0.99.15-0.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219403" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1005258" ref_url="https://bugzilla.suse.com/1005258" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1245" ref_url="https://www.suse.com/security/cve/CVE-2016-1245/" source="CVE"/>
		<description>

This update for quagga fixes the following issues:

- CVE-2016-1245: Fix for a zebra stack overrun in IPv6 RA receive code (bsc#1005258).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-19"/>
	<updated date="2016-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005258">SUSE bug 1005258</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1245/">CVE-2016-1245 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1245">CVE-2016-1245 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574972" comment="quagga-0.99.15-0.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219404" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1021669" ref_url="https://bugzilla.suse.com/1021669" source="BUGZILLA"/>
		<reference ref_id="1065641" ref_url="https://bugzilla.suse.com/1065641" source="BUGZILLA"/>
		<reference ref_id="1079798" ref_url="https://bugzilla.suse.com/1079798" source="BUGZILLA"/>
		<reference ref_id="1079799" ref_url="https://bugzilla.suse.com/1079799" source="BUGZILLA"/>
		<reference ref_id="1079800" ref_url="https://bugzilla.suse.com/1079800" source="BUGZILLA"/>
		<reference ref_id="1079801" ref_url="https://bugzilla.suse.com/1079801" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16227" ref_url="https://www.suse.com/security/cve/CVE-2017-16227/" source="CVE"/>
		<reference ref_id="CVE-2017-5495" ref_url="https://www.suse.com/security/cve/CVE-2017-5495/" source="CVE"/>
		<reference ref_id="CVE-2018-5378" ref_url="https://www.suse.com/security/cve/CVE-2018-5378/" source="CVE"/>
		<reference ref_id="CVE-2018-5379" ref_url="https://www.suse.com/security/cve/CVE-2018-5379/" source="CVE"/>
		<reference ref_id="CVE-2018-5380" ref_url="https://www.suse.com/security/cve/CVE-2018-5380/" source="CVE"/>
		<reference ref_id="CVE-2018-5381" ref_url="https://www.suse.com/security/cve/CVE-2018-5381/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003735.html" source="SUSE-SU"/>
		<description>
This update for quagga fixes the following issues:

- The Quagga BGP daemon contained a bug in the AS_PATH size calculation that
  could have been exploited to facilitate a remote denial-of-service attack via
  specially crafted BGP UPDATE messages. [CVE-2017-16227, bsc#1065641]

- The Quagga BGP daemon did not check whether data sent to peers via NOTIFY had
  an invalid attribute length. It was possible to exploit this issue and cause
  the bgpd process to leak sensitive information over the network to a
  configured peer. [CVE-2018-5378, bsc#1079798]

- The Quagga BGP daemon used to double-free memory when processing certain
  forms of UPDATE messages. This issue could be exploited by sending an
  optional/transitive UPDATE attribute that all conforming eBGP speakers should
  pass along. Consequently, a single UPDATE message could have affected many
  bgpd processes across a wide area of a network. Through this vulnerability,
  attackers could potentially have taken over control of affected bgpd
  processes remotely. [CVE-2018-5379, bsc#1079799]

- It was possible to overrun internal BGP code-to-string conversion tables in
  the Quagga BGP daemon. Configured peers could have exploited this issue and
  cause bgpd to emit debug and warning messages into the logs that would
  contained arbitrary bytes. [CVE-2018-5380, bsc#1079800]

- The Quagga BGP daemon could have entered an infinite loop if sent an invalid
  OPEN message by a configured peer. If this issue was exploited, then bgpd
  would cease to respond to any other events. BGP sessions would have been
  dropped and not be reestablished. The CLI interface would have been
  unresponsive. The bgpd daemon would have stayed in this state until
  restarted. [CVE-2018-5381, bsc#1079801]

- The Quagga daemon's telnet 'vty' CLI contains an unbounded memory allocation
  bug that could be exploited for a denial-of-service attack on the daemon.
  This issue has been fixed. [CVE-2017-5495, bsc#1021669]

- The telnet 'vty' CLI of the Quagga daemon is no longer enabled by default,
  because the passwords in the default 'zebra.conf' config file are now
  disabled. The vty interface is available via 'vtysh' utility using pam
  authentication to permit management access for root without password.
  [bsc#1021669]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021669">SUSE bug 1021669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065641">SUSE bug 1065641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079798">SUSE bug 1079798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079799">SUSE bug 1079799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079800">SUSE bug 1079800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079801">SUSE bug 1079801</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16227/">CVE-2017-16227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16227">CVE-2017-16227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5495/">CVE-2017-5495 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5495">CVE-2017-5495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5378/">CVE-2018-5378 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5378">CVE-2018-5378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5379/">CVE-2018-5379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5379">CVE-2018-5379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5380/">CVE-2018-5380 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5380">CVE-2018-5380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5381/">CVE-2018-5381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5381">CVE-2018-5381 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581106" comment="quagga-0.99.15-0.30.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581106" comment="quagga-0.99.15-0.30.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219405" version="1" class="patch">
	<metadata>
		<title>Security update for raptor (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178903" ref_url="https://bugzilla.suse.com/1178903" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25713" ref_url="https://www.suse.com/security/cve/CVE-2020-25713/" source="CVE"/>
		<description>
This update for raptor fixes the following issues:

- CVE-2020-25713: Fixed an out of bounds access triggered via a
  malformed input file (bsc#1178903).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-25"/>
	<updated date="2022-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178903">SUSE bug 1178903</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25713/">CVE-2020-25713 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25713">CVE-2020-25713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994146" comment="libraptor1-1.4.18-28.23.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219406" version="1" class="patch">
	<metadata>
		<title>Security update for sendmail</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="881284" ref_url="https://bugzilla.suse.com/881284" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3956" ref_url="https://www.suse.com/security/cve/CVE-2014-3956/" source="CVE"/>
		<description>

sendmail has been updated to fix the following security issue:

    * Not properly closing file descriptors before executing programs
      (CVE-2014-3956).

Security Issues:

    * CVE-2014-3956
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3956&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-04"/>
	<updated date="2014-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/881284">SUSE bug 881284</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3956/">CVE-2014-3956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3956">CVE-2014-3956 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581107" comment="sendmail-8.14.3-50.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581107" comment="sendmail-8.14.3-50.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581107" comment="sendmail-8.14.3-50.24.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219407" version="1" class="patch">
	<metadata>
		<title>Security update for rpcbind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="940191" ref_url="https://bugzilla.suse.com/940191" source="BUGZILLA"/>
		<reference ref_id="946204" ref_url="https://bugzilla.suse.com/946204" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7236" ref_url="https://www.suse.com/security/cve/CVE-2015-7236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1706-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001623.html" source="SUSE-SU"/>
		<description>

A use-after-free security bug in rpcbind was fixed which could lead to a remote denial of service.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-18"/>
	<updated date="2015-09-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/940191">SUSE bug 940191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946204">SUSE bug 946204</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7236/">CVE-2015-7236 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7236">CVE-2015-7236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581108" comment="rpcbind-0.1.6+git20080930-6.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581108" comment="rpcbind-0.1.6+git20080930-6.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581108" comment="rpcbind-0.1.6+git20080930-6.24.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219408" version="1" class="patch">
	<metadata>
		<title>Security update for rpm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1183543" ref_url="https://bugzilla.suse.com/1183543" source="BUGZILLA"/>
		<reference ref_id="1183545" ref_url="https://bugzilla.suse.com/1183545" source="BUGZILLA"/>
		<reference ref_id="1183632" ref_url="https://bugzilla.suse.com/1183632" source="BUGZILLA"/>
		<reference ref_id="1183659" ref_url="https://bugzilla.suse.com/1183659" source="BUGZILLA"/>
		<reference ref_id="1185299" ref_url="https://bugzilla.suse.com/1185299" source="BUGZILLA"/>
		<reference ref_id="996280" ref_url="https://bugzilla.suse.com/996280" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20266" ref_url="https://www.suse.com/security/cve/CVE-2021-20266/" source="CVE"/>
		<reference ref_id="CVE-2021-20271" ref_url="https://www.suse.com/security/cve/CVE-2021-20271/" source="CVE"/>
		<reference ref_id="CVE-2021-3421" ref_url="https://www.suse.com/security/cve/CVE-2021-3421/" source="CVE"/>
		<description>
This update for rpm fixes the following issues:

- Fixed PGP parsing bugs (bsc#1185299).
- Fixed various format handling bugs (bsc#996280).
- CVE-2021-3421: Fixed vulnerability where unsigned headers could be injected into the rpm database (bsc#1183543). 
- CVE-2021-20271: Fixed vulnerability where a corrupted rpm could corrupt the rpm database (bsc#1183545).
- CVE-2021-20266: Fixed missing bounds check in hdrblobInit (bsc#1183632).

Bugfixes:
- Fixed deadlock when multiple rpm processes tried to acquire the database lock (bsc#1183659).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-28"/>
	<updated date="2022-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183543">SUSE bug 1183543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183545">SUSE bug 1183545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183632">SUSE bug 1183632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183659">SUSE bug 1183659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185299">SUSE bug 1185299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996280">SUSE bug 996280</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20266/">CVE-2021-20266 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20266">CVE-2021-20266 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20271/">CVE-2021-20271 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20271">CVE-2021-20271 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3421/">CVE-2021-3421 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3421">CVE-2021-3421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994147" comment="popt-1.7-37.64.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994148" comment="popt-32bit-1.7-37.64.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994149" comment="rpm-4.4.2.3-37.64.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994150" comment="rpm-32bit-4.4.2.3-37.64.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994151" comment="rpm-python-4.4.2.3-37.64.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219409" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="900914" ref_url="https://bugzilla.suse.com/900914" source="BUGZILLA"/>
		<reference ref_id="915410" ref_url="https://bugzilla.suse.com/915410" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8242" ref_url="https://www.suse.com/security/cve/CVE-2014-8242/" source="CVE"/>
		<reference ref_id="CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001813.html" source="SUSE-SU"/>
		<description>

This update for rsync fixes two security issues:

- CVE-2014-8242: Checksum collisions leading to a denial of service (bsc#900914)
- CVE-2014-9512: Malicious servers could send files outside of the transferred directory (bsc#915410)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-20"/>
	<updated date="2016-01-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/900914">SUSE bug 900914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915410">SUSE bug 915410</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8242/">CVE-2014-8242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8242">CVE-2014-8242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9512">CVE-2014-9512 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581109" comment="rsync-3.0.4-2.49.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581109" comment="rsync-3.0.4-2.49.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581109" comment="rsync-3.0.4-2.49.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219410" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="915410" ref_url="https://bugzilla.suse.com/915410" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512/" source="CVE"/>
		<description>
rsync was updated to fix one security issue.

- CVE-2014-9512: rsync allowed remote attackers to write to arbitrary files via a symlink attack on a file in the synchronization path (bsc#915410).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-25"/>
	<updated date="2016-07-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/915410">SUSE bug 915410</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9512">CVE-2014-9512 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581110" comment="rsync-3.0.4-2.52.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219411" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1066644" ref_url="https://bugzilla.suse.com/1066644" source="BUGZILLA"/>
		<reference ref_id="1071459" ref_url="https://bugzilla.suse.com/1071459" source="BUGZILLA"/>
		<reference ref_id="1071460" ref_url="https://bugzilla.suse.com/1071460" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16548" ref_url="https://www.suse.com/security/cve/CVE-2017-16548/" source="CVE"/>
		<reference ref_id="CVE-2017-17433" ref_url="https://www.suse.com/security/cve/CVE-2017-17433/" source="CVE"/>
		<reference ref_id="CVE-2017-17434" ref_url="https://www.suse.com/security/cve/CVE-2017-17434/" source="CVE"/>
		<description>
This update for rsync fixes the following issues:

Security issues fixed:

- CVE-2017-17434: The daemon in rsync did not check for fnamecmp filenames in
  the daemon_filter_list data structure (in the recv_files function in
  receiver.c) and also did not apply the sanitize_paths protection mechanism to
  pathnames found in 'xname follows' strings (in the read_ndx_and_attrs function
  in rsync.c), which allowed remote attackers to bypass intended access
  restrictions' (bsc#1071460).
- CVE-2017-17433: The recv_files function in receiver.c in the daemon in rsync,
  proceeded with certain file metadata updates before checking for a filename in
  the daemon_filter_list data structure, which allowed remote attackers to bypass
  intended access restrictions (bsc#1071459).
- CVE-2017-16548: The receive_xattr function in xattrs.c in rsync did not check
  for a trailing '\\0' character in an xattr name, which allowed remote attackers
  to cause a denial of service (heap-based buffer over-read and application
  crash) or possibly have unspecified other impact by sending crafted data to the
  daemon (bsc#1066644).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-17"/>
	<updated date="2018-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1066644">SUSE bug 1066644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071459">SUSE bug 1071459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071460">SUSE bug 1071460</bugzilla>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16548/">CVE-2017-16548 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16548">CVE-2017-16548 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17433/">CVE-2017-17433 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17433">CVE-2017-17433 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17434/">CVE-2017-17434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17434">CVE-2017-17434 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581111" comment="rsync-3.0.4-2.53.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219412" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1076503" ref_url="https://bugzilla.suse.com/1076503" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5764" ref_url="https://www.suse.com/security/cve/CVE-2018-5764/" source="CVE"/>
		<description>
This update for rsync fixes one issues.

This security issue was fixed:

- CVE-2018-5764: The parse_arguments function in options.c did not prevent
  multiple --protect-args uses, which allowed remote attackers to bypass an
  argument-sanitization protection mechanism (bsc#1076503)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-22"/>
	<updated date="2018-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076503">SUSE bug 1076503</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5764/">CVE-2018-5764 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5764">CVE-2018-5764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581112" comment="rsync-3.0.4-2.53.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219413" version="1" class="patch">
	<metadata>
		<title>Security update for rsyslog</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="890228" ref_url="https://bugzilla.suse.com/890228" source="BUGZILLA"/>
		<reference ref_id="897262" ref_url="https://bugzilla.suse.com/897262" source="BUGZILLA"/>
		<reference ref_id="899756" ref_url="https://bugzilla.suse.com/899756" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3634" ref_url="https://www.suse.com/security/cve/CVE-2014-3634/" source="CVE"/>
		<reference ref_id="CVE-2014-3683" ref_url="https://www.suse.com/security/cve/CVE-2014-3683/" source="CVE"/>
		<description>

rsyslog has been updated to fix a remote denial of service issue:

    * Under certain configurations, a local or remote attacker able to send
      syslog messages to the server could have crashed the log server due
      to an array overread. (CVE-2014-3634, CVE-2014-3683)

Security Issues:

    * CVE-2014-3634
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3634&gt;
    * CVE-2014-3683
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3683&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-06"/>
	<updated date="2014-10-06"/>
	<bugzilla href="https://bugzilla.suse.com/890228">SUSE bug 890228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897262">SUSE bug 897262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899756">SUSE bug 899756</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3634/">CVE-2014-3634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3634">CVE-2014-3634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3683/">CVE-2014-3683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3683">CVE-2014-3683 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581113" comment="rsyslog-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581114" comment="rsyslog-diag-tools-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581115" comment="rsyslog-doc-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581116" comment="rsyslog-module-gssapi-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581117" comment="rsyslog-module-gtls-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581118" comment="rsyslog-module-mysql-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581119" comment="rsyslog-module-pgsql-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581120" comment="rsyslog-module-relp-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581121" comment="rsyslog-module-snmp-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581122" comment="rsyslog-module-udpspoof-5.10.1-0.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581113" comment="rsyslog-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581114" comment="rsyslog-diag-tools-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581115" comment="rsyslog-doc-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581116" comment="rsyslog-module-gssapi-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581117" comment="rsyslog-module-gtls-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581118" comment="rsyslog-module-mysql-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581119" comment="rsyslog-module-pgsql-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581120" comment="rsyslog-module-relp-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581121" comment="rsyslog-module-snmp-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581122" comment="rsyslog-module-udpspoof-5.10.1-0.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581113" comment="rsyslog-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581114" comment="rsyslog-diag-tools-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581115" comment="rsyslog-doc-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581116" comment="rsyslog-module-gssapi-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581117" comment="rsyslog-module-gtls-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581118" comment="rsyslog-module-mysql-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581119" comment="rsyslog-module-pgsql-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581120" comment="rsyslog-module-relp-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581121" comment="rsyslog-module-snmp-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581122" comment="rsyslog-module-udpspoof-5.10.1-0.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219414" version="1" class="patch">
	<metadata>
		<title>Security update for rsyslog (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1153451" ref_url="https://bugzilla.suse.com/1153451" source="BUGZILLA"/>
		<reference ref_id="1153459" ref_url="https://bugzilla.suse.com/1153459" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17041" ref_url="https://www.suse.com/security/cve/CVE-2019-17041/" source="CVE"/>
		<reference ref_id="CVE-2019-17042" ref_url="https://www.suse.com/security/cve/CVE-2019-17042/" source="CVE"/>
		<description>
This update for rsyslog fixes the following issues:

- CVE-2019-17041: Fixed a heap overflow in the parser for AIX log messages (bsc#1153451).
- CVE-2019-17042: Fixed a heap overflow in the parser for Cisco log messages (bsc#1153459).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-06"/>
	<updated date="2019-11-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1153451">SUSE bug 1153451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153459">SUSE bug 1153459</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17041/">CVE-2019-17041 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17041">CVE-2019-17041 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17042/">CVE-2019-17042 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17042">CVE-2019-17042 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581123" comment="rsyslog-5.10.1-0.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581124" comment="rsyslog-diag-tools-5.10.1-0.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581125" comment="rsyslog-doc-5.10.1-0.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581126" comment="rsyslog-module-gssapi-5.10.1-0.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581127" comment="rsyslog-module-gtls-5.10.1-0.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581128" comment="rsyslog-module-mysql-5.10.1-0.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581129" comment="rsyslog-module-pgsql-5.10.1-0.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581130" comment="rsyslog-module-relp-5.10.1-0.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581131" comment="rsyslog-module-snmp-5.10.1-0.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581132" comment="rsyslog-module-udpspoof-5.10.1-0.14.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219415" version="1" class="patch">
	<metadata>
		<title>Security update for Ruby</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="808137" ref_url="https://bugzilla.suse.com/808137" source="BUGZILLA"/>
		<reference ref_id="827265" ref_url="https://bugzilla.suse.com/827265" source="BUGZILLA"/>
		<reference ref_id="851803" ref_url="https://bugzilla.suse.com/851803" source="BUGZILLA"/>
		<reference ref_id="902851" ref_url="https://bugzilla.suse.com/902851" source="BUGZILLA"/>
		<reference ref_id="905326" ref_url="https://bugzilla.suse.com/905326" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2013-1821" ref_url="https://www.suse.com/security/cve/CVE-2013-1821/" source="CVE"/>
		<reference ref_id="CVE-2013-4073" ref_url="https://www.suse.com/security/cve/CVE-2013-4073/" source="CVE"/>
		<reference ref_id="CVE-2013-4164" ref_url="https://www.suse.com/security/cve/CVE-2013-4164/" source="CVE"/>
		<reference ref_id="CVE-2014-8080" ref_url="https://www.suse.com/security/cve/CVE-2014-8080/" source="CVE"/>
		<reference ref_id="CVE-2014-8090" ref_url="https://www.suse.com/security/cve/CVE-2014-8090/" source="CVE"/>
		<description>

This Ruby update fixes the following security issue:

    * bnc#808137: Fixed entity expansion DoS vulnerability in REXML
      (CVE-2013-1821).

Security Issue reference:

    * CVE-2013-1821
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1821&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-15"/>
	<updated date="2014-04-15"/>
	<bugzilla href="https://bugzilla.suse.com/808137">SUSE bug 808137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827265">SUSE bug 827265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851803">SUSE bug 851803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902851">SUSE bug 902851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905326">SUSE bug 905326</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0689">CVE-2009-0689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1821/">CVE-2013-1821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1821">CVE-2013-1821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4073/">CVE-2013-4073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4073">CVE-2013-4073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4164/">CVE-2013-4164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4164">CVE-2013-4164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8080/">CVE-2014-8080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8080">CVE-2014-8080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8090/">CVE-2014-8090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8090">CVE-2014-8090 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581133" comment="ruby-1.8.7.p357-0.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563826" comment="ruby-doc-html-1.8.7.p357-0.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563830" comment="ruby-tk-1.8.7.p357-0.9.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581133" comment="ruby-1.8.7.p357-0.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563826" comment="ruby-doc-html-1.8.7.p357-0.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563830" comment="ruby-tk-1.8.7.p357-0.9.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581133" comment="ruby-1.8.7.p357-0.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563826" comment="ruby-doc-html-1.8.7.p357-0.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563830" comment="ruby-tk-1.8.7.p357-0.9.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219416" version="1" class="patch">
	<metadata>
		<title>Security update for ruby (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="926974" ref_url="https://bugzilla.suse.com/926974" source="BUGZILLA"/>
		<reference ref_id="959495" ref_url="https://bugzilla.suse.com/959495" source="BUGZILLA"/>
		<reference ref_id="986630" ref_url="https://bugzilla.suse.com/986630" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1855" ref_url="https://www.suse.com/security/cve/CVE-2015-1855/" source="CVE"/>
		<reference ref_id="CVE-2015-7551" ref_url="https://www.suse.com/security/cve/CVE-2015-7551/" source="CVE"/>
		<description>

This update for ruby fixes the following issues:

Secuirty issues fixed:
- CVE-2015-1855: Ruby OpenSSL Hostname Verification (bsc#926974)
- CVE-2015-7551: Unsafe tainted string usage in Fiddle and DL (bsc#959495)

Bugfixes:
- fix small mistake in the backport for (bsc#986630)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-06"/>
	<updated date="2017-04-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926974">SUSE bug 926974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959495">SUSE bug 959495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986630">SUSE bug 986630</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1855/">CVE-2015-1855 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1855">CVE-2015-1855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7551/">CVE-2015-7551 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7551">CVE-2015-7551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574982" comment="ruby-1.8.7.p357-0.9.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574983" comment="ruby-doc-html-1.8.7.p357-0.9.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574984" comment="ruby-tk-1.8.7.p357-0.9.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219417" version="1" class="patch">
	<metadata>
		<title>Security update for ruby (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1112530" ref_url="https://bugzilla.suse.com/1112530" source="BUGZILLA"/>
		<reference ref_id="1188160" ref_url="https://bugzilla.suse.com/1188160" source="BUGZILLA"/>
		<reference ref_id="1188161" ref_url="https://bugzilla.suse.com/1188161" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16395" ref_url="https://www.suse.com/security/cve/CVE-2018-16395/" source="CVE"/>
		<reference ref_id="CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810/" source="CVE"/>
		<reference ref_id="CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066/" source="CVE"/>
		<reference ref_id="CVE-2021-81810" ref_url="https://www.suse.com/security/cve/CVE-2021-81810/" source="CVE"/>
		<description>
This update for ruby fixes the following issues:

- CVE-2018-16395: Fixed an issue where two x509 certificates could be
  considered to be equal when this was not the case (bsc#1112530).
- CVE-2021-32066: Fixed an issue where the IMAP client API would not
  report a failure when StartTLS failed, leading to potential man in
  the middle attacks (bsc#1188160).
- CVE-2021-31810: Fixed an issue where the FTP client API would trust
  certain responses from a malicious server, tricking the client into
  connecting to addresses not (bsc#1188161).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-06"/>
	<updated date="2022-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1112530">SUSE bug 1112530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188160">SUSE bug 1188160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188161">SUSE bug 1188161</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16395/">CVE-2018-16395 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16395">CVE-2018-16395 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31810">CVE-2021-31810 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32066">CVE-2021-32066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-81810/">CVE-2021-81810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-81810">CVE-2021-81810 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994152" comment="ruby-1.8.7.p357-0.9.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994153" comment="ruby-doc-html-1.8.7.p357-0.9.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994154" comment="ruby-tk-1.8.7.p357-0.9.20.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219418" version="1" class="patch">
	<metadata>
		<title>Security update for rzsz (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1076576" ref_url="https://bugzilla.suse.com/1076576" source="BUGZILLA"/>
		<reference ref_id="1086416" ref_url="https://bugzilla.suse.com/1086416" source="BUGZILLA"/>
		<reference ref_id="1090051" ref_url="https://bugzilla.suse.com/1090051" source="BUGZILLA"/>
		<reference ref_id="529899" ref_url="https://bugzilla.suse.com/529899" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10195" ref_url="https://www.suse.com/security/cve/CVE-2018-10195/" source="CVE"/>
		<description>
This update for rzsz fixes the following issues:

- L3: sz of rzsz segfaults in zsdata() (bsc#1086416)
- VUL-0: CVE-2018-10195: rzsz: sz can leak data to receiving side (bsc#1090051)
- rzsz-0.12.20-976.7: illegal use of freed variable (bsc#529899)
- /usr/bin/lsb segfaults [rzsz] (bsc#1076576)


		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-24"/>
	<updated date="2018-04-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076576">SUSE bug 1076576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086416">SUSE bug 1086416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090051">SUSE bug 1090051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/529899">SUSE bug 529899</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10195/">CVE-2018-10195 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10195">CVE-2018-10195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574988" comment="rzsz-0.12.21~rc-936.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219419" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="967017" ref_url="https://bugzilla.suse.com/967017" source="BUGZILLA"/>
		<reference ref_id="968222" ref_url="https://bugzilla.suse.com/968222" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560/" source="CVE"/>
		<description>

This update for samba fixes the following issues:

Security issue fixed:
- CVE-2015-7560: Getting and setting Windows ACLs on symlinks can change permissions on link 
  target; (bso#11648); (bsc#968222).

Bug fixed:
- Fix leaking memory in libsmbclient: Add missing talloc
  stackframe; (bso#11177); (bsc#967017).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-21"/>
	<updated date="2016-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/967017">SUSE bug 967017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968222">SUSE bug 968222</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7560">CVE-2015-7560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581134" comment="ldapsmb-1.34b-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581135" comment="libldb1-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581136" comment="libsmbclient0-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567431" comment="libsmbclient0-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581137" comment="libtalloc2-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567433" comment="libtalloc2-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581138" comment="libtdb1-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567435" comment="libtdb1-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581139" comment="libtevent0-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567437" comment="libtevent0-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581140" comment="libwbclient0-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567439" comment="libwbclient0-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581141" comment="samba-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567441" comment="samba-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581142" comment="samba-client-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567443" comment="samba-client-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567444" comment="samba-doc-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581143" comment="samba-krb-printing-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581144" comment="samba-winbind-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567447" comment="samba-winbind-32bit-3.6.3-67.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219420" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="936862" ref_url="https://bugzilla.suse.com/936862" source="BUGZILLA"/>
		<reference ref_id="967017" ref_url="https://bugzilla.suse.com/967017" source="BUGZILLA"/>
		<reference ref_id="971965" ref_url="https://bugzilla.suse.com/971965" source="BUGZILLA"/>
		<reference ref_id="973031" ref_url="https://bugzilla.suse.com/973031" source="BUGZILLA"/>
		<reference ref_id="973032" ref_url="https://bugzilla.suse.com/973032" source="BUGZILLA"/>
		<reference ref_id="973033" ref_url="https://bugzilla.suse.com/973033" source="BUGZILLA"/>
		<reference ref_id="973034" ref_url="https://bugzilla.suse.com/973034" source="BUGZILLA"/>
		<reference ref_id="973036" ref_url="https://bugzilla.suse.com/973036" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5370" ref_url="https://www.suse.com/security/cve/CVE-2015-5370/" source="CVE"/>
		<reference ref_id="CVE-2016-2110" ref_url="https://www.suse.com/security/cve/CVE-2016-2110/" source="CVE"/>
		<reference ref_id="CVE-2016-2111" ref_url="https://www.suse.com/security/cve/CVE-2016-2111/" source="CVE"/>
		<reference ref_id="CVE-2016-2112" ref_url="https://www.suse.com/security/cve/CVE-2016-2112/" source="CVE"/>
		<reference ref_id="CVE-2016-2113" ref_url="https://www.suse.com/security/cve/CVE-2016-2113/" source="CVE"/>
		<reference ref_id="CVE-2016-2115" ref_url="https://www.suse.com/security/cve/CVE-2016-2115/" source="CVE"/>
		<reference ref_id="CVE-2016-2118" ref_url="https://www.suse.com/security/cve/CVE-2016-2118/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001998.html" source="SUSE-SU"/>
		<description>
samba was updated to fix seven security issues.

These security issues were fixed:
- CVE-2015-5370: DCERPC server and client were vulnerable to DOS and MITM attacks (bsc#936862).
- CVE-2016-2110: A man-in-the-middle could have downgraded NTLMSSP authentication (bsc#973031).
- CVE-2016-2111: Domain controller netlogon member computer could have been spoofed (bsc#973032).
- CVE-2016-2112: LDAP conenctions were vulnerable to downgrade and MITM attack (bsc#973033).
- CVE-2016-2113: TLS certificate validation were missing (bsc#973034).
- CVE-2016-2115: Named pipe IPC were vulnerable to MITM attacks (bsc#973036).
- CVE-2016-2118: 'Badlock' DCERPC impersonation of authenticated account were possible (bsc#971965).

These non-security issues were fixed:
- bsc#967017: Fix leaking memory in libsmbclient in cli_set_mntpoint function
- Getting and setting Windows ACLs on symlinks can change permissions on link
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-12"/>
	<updated date="2016-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/936862">SUSE bug 936862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967017">SUSE bug 967017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971965">SUSE bug 971965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973031">SUSE bug 973031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973032">SUSE bug 973032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973033">SUSE bug 973033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973034">SUSE bug 973034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973036">SUSE bug 973036</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5370/">CVE-2015-5370 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5370">CVE-2015-5370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2110/">CVE-2016-2110 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2110">CVE-2016-2110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2111/">CVE-2016-2111 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2111">CVE-2016-2111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2112/">CVE-2016-2112 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2112">CVE-2016-2112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2113/">CVE-2016-2113 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2113">CVE-2016-2113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2115/">CVE-2016-2115 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2115">CVE-2016-2115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2118/">CVE-2016-2118 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2118">CVE-2016-2118 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581145" comment="ldapsmb-1.34b-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581146" comment="libldb1-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581147" comment="libsmbclient0-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581148" comment="libsmbclient0-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581149" comment="libtalloc2-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581150" comment="libtalloc2-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581151" comment="libtdb1-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581152" comment="libtdb1-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581153" comment="libtevent0-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581154" comment="libtevent0-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581155" comment="libwbclient0-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581156" comment="libwbclient0-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581157" comment="samba-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581158" comment="samba-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581159" comment="samba-client-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581160" comment="samba-client-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581161" comment="samba-doc-3.6.3-76.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581162" comment="samba-krb-printing-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581163" comment="samba-winbind-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581164" comment="samba-winbind-32bit-3.6.3-76.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581145" comment="ldapsmb-1.34b-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581146" comment="libldb1-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581147" comment="libsmbclient0-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581148" comment="libsmbclient0-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581149" comment="libtalloc2-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581150" comment="libtalloc2-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581151" comment="libtdb1-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581152" comment="libtdb1-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581153" comment="libtevent0-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581154" comment="libtevent0-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581155" comment="libwbclient0-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581156" comment="libwbclient0-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581157" comment="samba-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581158" comment="samba-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581159" comment="samba-client-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581160" comment="samba-client-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581161" comment="samba-doc-3.6.3-76.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581162" comment="samba-krb-printing-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581163" comment="samba-winbind-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581164" comment="samba-winbind-32bit-3.6.3-76.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219421" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1003731" ref_url="https://bugzilla.suse.com/1003731" source="BUGZILLA"/>
		<reference ref_id="1009711" ref_url="https://bugzilla.suse.com/1009711" source="BUGZILLA"/>
		<reference ref_id="1014441" ref_url="https://bugzilla.suse.com/1014441" source="BUGZILLA"/>
		<reference ref_id="1014442" ref_url="https://bugzilla.suse.com/1014442" source="BUGZILLA"/>
		<reference ref_id="993692" ref_url="https://bugzilla.suse.com/993692" source="BUGZILLA"/>
		<reference ref_id="997833" ref_url="https://bugzilla.suse.com/997833" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2125" ref_url="https://www.suse.com/security/cve/CVE-2016-2125/" source="CVE"/>
		<reference ref_id="CVE-2016-2126" ref_url="https://www.suse.com/security/cve/CVE-2016-2126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002534.html" source="SUSE-SU"/>
		<description>

This update for samba provides the following fixes:

Security issues fixed:

- CVE-2016-2125: Don't send delegated credentials to all servers. (bsc#1014441)
- CVE-2016-2126: Prevent denial of service due to a client triggered crash in the winbindd
  parent process. (bsc#1014442)

Non security issues fixed:

- Allow SESSION KEY setup without signing. (bsc#1009711)
- Fix crash bug in tevent_queue_immediate_trigger(). (bsc#1003731)
- Don't fail when using default domain with user@domain.com format. (bsc#997833)
- Prevent core, make sure response-&gt;extra_data.data is always cleared out. (bsc#993692)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-29"/>
	<updated date="2016-12-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003731">SUSE bug 1003731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009711">SUSE bug 1009711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014441">SUSE bug 1014441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014442">SUSE bug 1014442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993692">SUSE bug 993692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997833">SUSE bug 997833</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2125/">CVE-2016-2125 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2125">CVE-2016-2125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2126/">CVE-2016-2126 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2126">CVE-2016-2126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581165" comment="ldapsmb-1.34b-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581166" comment="libldb1-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581167" comment="libsmbclient0-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581168" comment="libsmbclient0-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581169" comment="libtalloc2-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581170" comment="libtalloc2-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581171" comment="libtdb1-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581172" comment="libtdb1-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581173" comment="libtevent0-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581174" comment="libtevent0-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581175" comment="libwbclient0-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581176" comment="libwbclient0-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581177" comment="samba-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581178" comment="samba-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581179" comment="samba-client-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581180" comment="samba-client-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569099" comment="samba-doc-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581181" comment="samba-krb-printing-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581182" comment="samba-winbind-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581183" comment="samba-winbind-32bit-3.6.3-84.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581165" comment="ldapsmb-1.34b-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581166" comment="libldb1-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581167" comment="libsmbclient0-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581168" comment="libsmbclient0-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581169" comment="libtalloc2-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581170" comment="libtalloc2-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581171" comment="libtdb1-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581172" comment="libtdb1-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581173" comment="libtevent0-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581174" comment="libtevent0-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581175" comment="libwbclient0-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581176" comment="libwbclient0-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581177" comment="samba-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581178" comment="samba-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581179" comment="samba-client-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581180" comment="samba-client-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569099" comment="samba-doc-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581181" comment="samba-krb-printing-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581182" comment="samba-winbind-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581183" comment="samba-winbind-32bit-3.6.3-84.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219422" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027147" ref_url="https://bugzilla.suse.com/1027147" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619/" source="CVE"/>
		<description>

This update for samba fixes the following issues:

Security issue fixed:
- CVE-2017-2619: symlink race permits opening files outside share directory (bsc#1027147).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-28"/>
	<updated date="2017-03-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027147">SUSE bug 1027147</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2619">CVE-2017-2619 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581184" comment="ldapsmb-1.34b-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581185" comment="libldb1-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581186" comment="libsmbclient0-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581187" comment="libsmbclient0-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581188" comment="libtalloc2-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581189" comment="libtalloc2-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581190" comment="libtdb1-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581191" comment="libtdb1-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581192" comment="libtevent0-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581193" comment="libtevent0-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581194" comment="libwbclient0-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581195" comment="libwbclient0-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581196" comment="samba-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581197" comment="samba-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581198" comment="samba-client-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581199" comment="samba-client-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581200" comment="samba-doc-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581201" comment="samba-krb-printing-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581202" comment="samba-winbind-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581203" comment="samba-winbind-32bit-3.6.3-87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219423" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027147" ref_url="https://bugzilla.suse.com/1027147" source="BUGZILLA"/>
		<reference ref_id="1036283" ref_url="https://bugzilla.suse.com/1036283" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002850.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issues:

Security issue fixed:
- CVE-2017-2619: symlink race permits opening files outside share directory (bsc#1027147).
  For SUSE Linux Enterprise 11 SP4 this is a re-issue of the update, a regression
  in the fix has been addressed (bsc#1036283, bso#12721).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-08"/>
	<updated date="2017-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027147">SUSE bug 1027147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036283">SUSE bug 1036283</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2619">CVE-2017-2619 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581204" comment="ldapsmb-1.34b-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581205" comment="libldb1-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581206" comment="libsmbclient0-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581207" comment="libsmbclient0-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581208" comment="libtalloc2-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581209" comment="libtalloc2-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581210" comment="libtdb1-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581211" comment="libtdb1-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581212" comment="libtevent0-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581213" comment="libtevent0-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581214" comment="libwbclient0-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581215" comment="libwbclient0-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581216" comment="samba-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581217" comment="samba-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581218" comment="samba-client-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581219" comment="samba-client-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569111" comment="samba-doc-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581220" comment="samba-krb-printing-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581221" comment="samba-winbind-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581222" comment="samba-winbind-32bit-3.6.3-90.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581204" comment="ldapsmb-1.34b-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581205" comment="libldb1-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581206" comment="libsmbclient0-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581207" comment="libsmbclient0-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581208" comment="libtalloc2-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581209" comment="libtalloc2-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581210" comment="libtdb1-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581211" comment="libtdb1-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581212" comment="libtevent0-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581213" comment="libtevent0-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581214" comment="libwbclient0-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581215" comment="libwbclient0-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581216" comment="samba-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581217" comment="samba-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581218" comment="samba-client-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581219" comment="samba-client-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569111" comment="samba-doc-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581220" comment="samba-krb-printing-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581221" comment="samba-winbind-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581222" comment="samba-winbind-32bit-3.6.3-90.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219424" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1038231" ref_url="https://bugzilla.suse.com/1038231" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7494" ref_url="https://www.suse.com/security/cve/CVE-2017-7494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002915.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issue:

- An unprivileged user with access to the samba server could cause smbd to load
  a specially crafted shared library, which then had the ability to execute
  arbitrary code on the server as 'root'. [CVE-2017-7494, bso#12780, bsc#1038231]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-24"/>
	<updated date="2017-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038231">SUSE bug 1038231</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7494/">CVE-2017-7494 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7494">CVE-2017-7494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581223" comment="ldapsmb-1.34b-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581224" comment="libldb1-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581225" comment="libsmbclient0-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581226" comment="libsmbclient0-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581227" comment="libtalloc2-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581228" comment="libtalloc2-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581229" comment="libtdb1-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581230" comment="libtdb1-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581231" comment="libtevent0-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581232" comment="libtevent0-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581233" comment="libwbclient0-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581234" comment="libwbclient0-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581235" comment="samba-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581236" comment="samba-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581237" comment="samba-client-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581238" comment="samba-client-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569123" comment="samba-doc-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581239" comment="samba-krb-printing-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581240" comment="samba-winbind-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581241" comment="samba-winbind-32bit-3.6.3-93.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581223" comment="ldapsmb-1.34b-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581224" comment="libldb1-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581225" comment="libsmbclient0-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581226" comment="libsmbclient0-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581227" comment="libtalloc2-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581228" comment="libtalloc2-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581229" comment="libtdb1-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581230" comment="libtdb1-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581231" comment="libtevent0-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581232" comment="libtevent0-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581233" comment="libwbclient0-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581234" comment="libwbclient0-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581235" comment="samba-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581236" comment="samba-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581237" comment="samba-client-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581238" comment="samba-client-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569123" comment="samba-doc-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581239" comment="samba-krb-printing-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581240" comment="samba-winbind-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581241" comment="samba-winbind-32bit-3.6.3-93.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219425" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1042419" ref_url="https://bugzilla.suse.com/1042419" source="BUGZILLA"/>
		<reference ref_id="1058622" ref_url="https://bugzilla.suse.com/1058622" source="BUGZILLA"/>
		<reference ref_id="1058624" ref_url="https://bugzilla.suse.com/1058624" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12150" ref_url="https://www.suse.com/security/cve/CVE-2017-12150/" source="CVE"/>
		<reference ref_id="CVE-2017-12163" ref_url="https://www.suse.com/security/cve/CVE-2017-12163/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003292.html" source="SUSE-SU"/>
		<description>

This update for samba fixes several issues.

These security issues were fixed: 

- CVE-2017-12163: Prevent client short SMB1 write from writing server memory to
  file, leaking information from the server to the client (bsc#1058624)
- CVE-2017-12150: Always enforce smb signing when it is configured (bsc#1058622)

This non-security issue was fixed: 

- Fix error where short name length was read as 2 bytes, should be 1 (bsc#1042419).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-12"/>
	<updated date="2017-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042419">SUSE bug 1042419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058622">SUSE bug 1058622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058624">SUSE bug 1058624</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12150/">CVE-2017-12150 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12150">CVE-2017-12150 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12163/">CVE-2017-12163 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12163">CVE-2017-12163 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581242" comment="ldapsmb-1.34b-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581243" comment="libldb1-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581244" comment="libsmbclient0-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581245" comment="libsmbclient0-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581246" comment="libtalloc2-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581247" comment="libtalloc2-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581248" comment="libtdb1-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581249" comment="libtdb1-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581250" comment="libtevent0-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581251" comment="libtevent0-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581252" comment="libwbclient0-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581253" comment="libwbclient0-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581254" comment="samba-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581255" comment="samba-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581256" comment="samba-client-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581257" comment="samba-client-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569135" comment="samba-doc-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581258" comment="samba-krb-printing-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581259" comment="samba-winbind-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581260" comment="samba-winbind-32bit-3.6.3-94.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581242" comment="ldapsmb-1.34b-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581243" comment="libldb1-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581244" comment="libsmbclient0-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581245" comment="libsmbclient0-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581246" comment="libtalloc2-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581247" comment="libtalloc2-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581248" comment="libtdb1-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581249" comment="libtdb1-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581250" comment="libtevent0-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581251" comment="libtevent0-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581252" comment="libwbclient0-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581253" comment="libwbclient0-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581254" comment="samba-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581255" comment="samba-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581256" comment="samba-client-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581257" comment="samba-client-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569135" comment="samba-doc-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581258" comment="samba-krb-printing-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581259" comment="samba-winbind-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581260" comment="samba-winbind-32bit-3.6.3-94.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219426" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1016531" ref_url="https://bugzilla.suse.com/1016531" source="BUGZILLA"/>
		<reference ref_id="1063008" ref_url="https://bugzilla.suse.com/1063008" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15275" ref_url="https://www.suse.com/security/cve/CVE-2017-15275/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003570.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2017-15275: s3: smbd: Chain code can return uninitialized
  memory when talloc buffer is grown; (bsc#1063008); (bso#13077);


- s3/libads: fix seal/signed ldap connections so they are reused;
  (bsc#1016531).		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1016531">SUSE bug 1016531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063008">SUSE bug 1063008</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15275/">CVE-2017-15275 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15275">CVE-2017-15275 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581261" comment="ldapsmb-1.34b-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581262" comment="libldb1-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581263" comment="libsmbclient0-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581264" comment="libsmbclient0-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581265" comment="libtalloc2-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581266" comment="libtalloc2-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581267" comment="libtdb1-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581268" comment="libtdb1-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581269" comment="libtevent0-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581270" comment="libtevent0-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581271" comment="libwbclient0-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581272" comment="libwbclient0-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581273" comment="samba-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581274" comment="samba-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581275" comment="samba-client-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581276" comment="samba-client-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569147" comment="samba-doc-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581277" comment="samba-krb-printing-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581278" comment="samba-winbind-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581279" comment="samba-winbind-32bit-3.6.3-94.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581261" comment="ldapsmb-1.34b-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581262" comment="libldb1-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581263" comment="libsmbclient0-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581264" comment="libsmbclient0-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581265" comment="libtalloc2-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581266" comment="libtalloc2-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581267" comment="libtdb1-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581268" comment="libtdb1-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581269" comment="libtevent0-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581270" comment="libtevent0-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581271" comment="libwbclient0-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581272" comment="libwbclient0-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581273" comment="samba-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581274" comment="samba-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581275" comment="samba-client-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581276" comment="samba-client-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569147" comment="samba-doc-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581277" comment="samba-krb-printing-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581278" comment="samba-winbind-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581279" comment="samba-winbind-32bit-3.6.3-94.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219427" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1081741" ref_url="https://bugzilla.suse.com/1081741" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1050" ref_url="https://www.suse.com/security/cve/CVE-2018-1050/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- CVE-2018-1050: DOS vulnerability when SPOOLSS is run externally (bsc#1081741)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-22"/>
	<updated date="2018-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081741">SUSE bug 1081741</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1050/">CVE-2018-1050 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1050">CVE-2018-1050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581280" comment="ldapsmb-1.34b-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581281" comment="libldb1-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581282" comment="libsmbclient0-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581283" comment="libsmbclient0-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581284" comment="libtalloc2-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581285" comment="libtalloc2-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581286" comment="libtdb1-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581287" comment="libtdb1-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581288" comment="libtevent0-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581289" comment="libtevent0-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581290" comment="libwbclient0-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581291" comment="libwbclient0-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581292" comment="samba-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581293" comment="samba-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581294" comment="samba-client-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581295" comment="samba-client-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581296" comment="samba-doc-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581297" comment="samba-krb-printing-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581298" comment="samba-winbind-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581299" comment="samba-winbind-32bit-3.6.3-94.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219428" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1079449" ref_url="https://bugzilla.suse.com/1079449" source="BUGZILLA"/>
		<reference ref_id="1103411" ref_url="https://bugzilla.suse.com/1103411" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10858" ref_url="https://www.suse.com/security/cve/CVE-2018-10858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004415.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

The following security issues were fixed:

- CVE-2018-10858: Insufficient input validation on client directory listing in libsmbclient (bsc#1103411).
  
The following other bugs were fixed:

- s3:winbindd: allow a fallback to NTLMSSP for LDAP connections (bsc#1079449)		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1079449">SUSE bug 1079449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103411">SUSE bug 1103411</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10858/">CVE-2018-10858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10858">CVE-2018-10858 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581300" comment="ldapsmb-1.34b-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581301" comment="libldb1-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581302" comment="libsmbclient0-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581303" comment="libsmbclient0-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581304" comment="libtalloc2-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581305" comment="libtalloc2-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581306" comment="libtdb1-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581307" comment="libtdb1-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581308" comment="libtevent0-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581309" comment="libtevent0-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581310" comment="libwbclient0-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581311" comment="libwbclient0-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581312" comment="samba-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581313" comment="samba-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581314" comment="samba-client-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581315" comment="samba-client-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569159" comment="samba-doc-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581316" comment="samba-krb-printing-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581317" comment="samba-winbind-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581318" comment="samba-winbind-32bit-3.6.3-94.14.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581300" comment="ldapsmb-1.34b-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581301" comment="libldb1-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581302" comment="libsmbclient0-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581303" comment="libsmbclient0-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581304" comment="libtalloc2-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581305" comment="libtalloc2-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581306" comment="libtdb1-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581307" comment="libtdb1-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581308" comment="libtevent0-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581309" comment="libtevent0-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581310" comment="libwbclient0-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581311" comment="libwbclient0-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581312" comment="samba-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581313" comment="samba-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581314" comment="samba-client-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581315" comment="samba-client-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569159" comment="samba-doc-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581316" comment="samba-krb-printing-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581317" comment="samba-winbind-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581318" comment="samba-winbind-32bit-3.6.3-94.14.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219429" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1101499" ref_url="https://bugzilla.suse.com/1101499" source="BUGZILLA"/>
		<reference ref_id="1131060" ref_url="https://bugzilla.suse.com/1131060" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3880" ref_url="https://www.suse.com/security/cve/CVE-2019-3880/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

Security issue fixed:

- CVE-2019-3880: Fixed a path/symlink traversal vulnerability, which allowed an unprivileged user to save registry files outside a share (bsc#1131060).

Non-security issue fixed:

- Make init scripts create log directories before running daemons (bsc#1101499)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101499">SUSE bug 1101499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131060">SUSE bug 1131060</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3880/">CVE-2019-3880 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3880">CVE-2019-3880 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581319" comment="ldapsmb-1.34b-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581320" comment="libldb1-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581321" comment="libsmbclient0-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581322" comment="libsmbclient0-32bit-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581323" comment="libtalloc2-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581324" comment="libtalloc2-32bit-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581325" comment="libtdb1-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581326" comment="libtdb1-32bit-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581327" comment="libtevent0-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581328" comment="libtevent0-32bit-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581329" comment="libwbclient0-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581330" comment="libwbclient0-32bit-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581331" comment="samba-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581332" comment="samba-32bit-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581333" comment="samba-client-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581334" comment="samba-client-32bit-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569171" comment="samba-doc-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581335" comment="samba-krb-printing-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581336" comment="samba-winbind-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581337" comment="samba-winbind-32bit-3.6.3-94.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219430" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1144902" ref_url="https://bugzilla.suse.com/1144902" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218/" source="CVE"/>
		<description>
This update for samba fixes the following issue:

- CVE-2019-10218: Fixed a path injection caused by filenames containing path separators (bso#14071) (bsc#1144902).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-29"/>
	<updated date="2019-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10218">CVE-2019-10218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581338" comment="ldapsmb-1.34b-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581339" comment="libldb1-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581340" comment="libsmbclient0-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581341" comment="libsmbclient0-32bit-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581342" comment="libtalloc2-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581343" comment="libtalloc2-32bit-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581344" comment="libtdb1-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581345" comment="libtdb1-32bit-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581346" comment="libtevent0-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581347" comment="libtevent0-32bit-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581348" comment="libwbclient0-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581349" comment="libwbclient0-32bit-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581350" comment="samba-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581351" comment="samba-32bit-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581352" comment="samba-client-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581353" comment="samba-client-32bit-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569183" comment="samba-doc-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581354" comment="samba-krb-printing-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581355" comment="samba-winbind-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581356" comment="samba-winbind-32bit-3.6.3-94.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219431" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1173160" ref_url="https://bugzilla.suse.com/1173160" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10745" ref_url="https://www.suse.com/security/cve/CVE-2020-10745/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

-  CVE-2020-10745: Fixed an issue which parsing and packing of NBT and DNS packets 
   containing dots could potentially have consumed excessive CPU (bsc#1173160).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-23"/>
	<updated date="2020-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173160">SUSE bug 1173160</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10745/">CVE-2020-10745 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10745">CVE-2020-10745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581357" comment="ldapsmb-1.34b-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581358" comment="libldb1-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581359" comment="libsmbclient0-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581360" comment="libsmbclient0-32bit-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581361" comment="libtalloc2-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581362" comment="libtalloc2-32bit-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581363" comment="libtdb1-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581364" comment="libtdb1-32bit-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581365" comment="libtevent0-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581366" comment="libtevent0-32bit-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581367" comment="libwbclient0-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581368" comment="libwbclient0-32bit-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581369" comment="samba-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581370" comment="samba-32bit-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581371" comment="samba-client-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581372" comment="samba-client-32bit-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569195" comment="samba-doc-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581373" comment="samba-krb-printing-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581374" comment="samba-winbind-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581375" comment="samba-winbind-32bit-3.6.3-94.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219432" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1173902" ref_url="https://bugzilla.suse.com/1173902" source="BUGZILLA"/>
		<reference ref_id="1173994" ref_url="https://bugzilla.suse.com/1173994" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14318" ref_url="https://www.suse.com/security/cve/CVE-2020-14318/" source="CVE"/>
		<reference ref_id="CVE-2020-14323" ref_url="https://www.suse.com/security/cve/CVE-2020-14323/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- CVE-2020-14323: Unprivileged user can crash winbind (bsc#1173994).
- CVE-2020-14318: Missing permissions check in SMB1/2/3 ChangeNotify (bsc#1173902).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-30"/>
	<updated date="2020-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173902">SUSE bug 1173902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173994">SUSE bug 1173994</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14318/">CVE-2020-14318 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14318">CVE-2020-14318 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14323/">CVE-2020-14323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14323">CVE-2020-14323 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581376" comment="ldapsmb-1.34b-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581377" comment="libldb1-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581378" comment="libsmbclient0-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581379" comment="libsmbclient0-32bit-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581380" comment="libtalloc2-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581381" comment="libtalloc2-32bit-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581382" comment="libtdb1-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581383" comment="libtdb1-32bit-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581384" comment="libtevent0-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581385" comment="libtevent0-32bit-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581386" comment="libwbclient0-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581387" comment="libwbclient0-32bit-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581388" comment="samba-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581389" comment="samba-32bit-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581390" comment="samba-client-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581391" comment="samba-client-32bit-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569207" comment="samba-doc-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581392" comment="samba-krb-printing-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581393" comment="samba-winbind-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581394" comment="samba-winbind-32bit-3.6.3-94.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219433" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178469" ref_url="https://bugzilla.suse.com/1178469" source="BUGZILLA"/>
		<reference ref_id="1184677" ref_url="https://bugzilla.suse.com/1184677" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20254" ref_url="https://www.suse.com/security/cve/CVE-2021-20254/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-20254: Fixed a buffer overrun in sids_to_unixids() (bsc#1184677).
- Adjust smbcacls '--propagate-inheritance' feature to align with upstream (bsc#1178469).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-29"/>
	<updated date="2021-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178469">SUSE bug 1178469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184677">SUSE bug 1184677</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-20254/">CVE-2021-20254 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20254">CVE-2021-20254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581395" comment="ldapsmb-1.34b-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581396" comment="libldb1-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581397" comment="libsmbclient0-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581398" comment="libsmbclient0-32bit-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581399" comment="libtalloc2-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581400" comment="libtalloc2-32bit-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581401" comment="libtdb1-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581402" comment="libtdb1-32bit-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581403" comment="libtevent0-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581404" comment="libtevent0-32bit-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581405" comment="libwbclient0-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581406" comment="libwbclient0-32bit-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581407" comment="samba-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581408" comment="samba-32bit-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581409" comment="samba-client-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581410" comment="samba-client-32bit-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569219" comment="samba-doc-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581411" comment="samba-krb-printing-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581412" comment="samba-winbind-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581413" comment="samba-winbind-32bit-3.6.3-94.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219434" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1014440" ref_url="https://bugzilla.suse.com/1014440" source="BUGZILLA"/>
		<reference ref_id="1192284" ref_url="https://bugzilla.suse.com/1192284" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2124" ref_url="https://www.suse.com/security/cve/CVE-2016-2124/" source="CVE"/>
		<reference ref_id="CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- CVE-2016-2124: Fixed not to fallback to non spnego authentication if we require kerberos (bsc#1014440).
- CVE-2020-25717: Fixed privilege escalation inside an AD Domain where a user could become root on domain members (bsc#1192284).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-10"/>
	<updated date="2021-11-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014440">SUSE bug 1014440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192284">SUSE bug 1192284</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2124/">CVE-2016-2124 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2124">CVE-2016-2124 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25717">CVE-2020-25717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009655320" comment="ldapsmb-1.34b-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655321" comment="libldb1-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655322" comment="libsmbclient0-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655323" comment="libsmbclient0-32bit-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655324" comment="libtalloc2-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655325" comment="libtalloc2-32bit-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655326" comment="libtdb1-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655327" comment="libtdb1-32bit-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655328" comment="libtevent0-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655329" comment="libtevent0-32bit-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655330" comment="libwbclient0-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655331" comment="libwbclient0-32bit-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655332" comment="samba-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655333" comment="samba-32bit-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655334" comment="samba-client-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655335" comment="samba-client-32bit-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655336" comment="samba-doc-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655337" comment="samba-krb-printing-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655338" comment="samba-winbind-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655339" comment="samba-winbind-32bit-3.6.3-94.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219435" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192284" ref_url="https://bugzilla.suse.com/1192284" source="BUGZILLA"/>
		<reference ref_id="1201496" ref_url="https://bugzilla.suse.com/1201496" source="BUGZILLA"/>
		<reference ref_id="886193" ref_url="https://bugzilla.suse.com/886193" source="BUGZILLA"/>
		<reference ref_id="971965" ref_url="https://bugzilla.suse.com/971965" source="BUGZILLA"/>
		<reference ref_id="973032" ref_url="https://bugzilla.suse.com/973032" source="BUGZILLA"/>
		<reference ref_id="973033" ref_url="https://bugzilla.suse.com/973033" source="BUGZILLA"/>
		<reference ref_id="973036" ref_url="https://bugzilla.suse.com/973036" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32742" ref_url="https://www.suse.com/security/cve/CVE-2022-32742/" source="CVE"/>
		<description>
This update for samba fixes the following issues:
    
- CVE-2022-32742: Fixed incorrect length check in SMB1write, SMB1write_and_close, SMB1write_and_unlock (bsc#1201496).

The following non-security changes were done:
 
-  Add missing smb.conf.5 man page updates; (bso#11749);
   (bsc#973032); (bso#11644); (bsc#973033); (bso#11756);
   (bsc#973036); (bso#11804); (bsc#971965); (bso#14556);
   (bsc#1192284); (bso#9688); (bsc#886193); (bso#9688).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-12"/>
	<updated date="2022-08-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192284">SUSE bug 1192284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201496">SUSE bug 1201496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886193">SUSE bug 886193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971965">SUSE bug 971965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973032">SUSE bug 973032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973033">SUSE bug 973033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973036">SUSE bug 973036</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32742/">CVE-2022-32742 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32742">CVE-2022-32742 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994155" comment="ldapsmb-1.34b-94.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994156" comment="libldb1-3.6.3-94.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994157" comment="libsmbclient0-3.6.3-94.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994158" comment="libsmbclient0-32bit-3.6.3-94.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994159" comment="libtalloc2-3.6.3-94.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994160" comment="libtalloc2-32bit-3.6.3-94.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994161" comment="libtdb1-3.6.3-94.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994162" comment="libtdb1-32bit-3.6.3-94.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994163" comment="libtevent0-3.6.3-94.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994164" comment="libtevent0-32bit-3.6.3-94.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994165" comment="libwbclient0-3.6.3-94.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994166" comment="libwbclient0-32bit-3.6.3-94.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994167" comment="samba-3.6.3-94.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994168" comment="samba-32bit-3.6.3-94.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994169" comment="samba-client-3.6.3-94.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994170" comment="samba-client-32bit-3.6.3-94.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994171" comment="samba-doc-3.6.3-94.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994172" comment="samba-krb-printing-3.6.3-94.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994173" comment="samba-winbind-3.6.3-94.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994174" comment="samba-winbind-32bit-3.6.3-94.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219436" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1206546" ref_url="https://bugzilla.suse.com/1206546" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20251" ref_url="https://www.suse.com/security/cve/CVE-2021-20251/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

  - CVE-2021-20251: Fixed bad password count not incremented atomically (bsc#1206546).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-23"/>
	<updated date="2023-02-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206546">SUSE bug 1206546</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20251/">CVE-2021-20251 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20251">CVE-2021-20251 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994175" comment="ldapsmb-1.34b-94.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994176" comment="libldb1-3.6.3-94.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994177" comment="libsmbclient0-3.6.3-94.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994178" comment="libsmbclient0-32bit-3.6.3-94.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994179" comment="libtalloc2-3.6.3-94.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994180" comment="libtalloc2-32bit-3.6.3-94.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994181" comment="libtdb1-3.6.3-94.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994182" comment="libtdb1-32bit-3.6.3-94.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994183" comment="libtevent0-3.6.3-94.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994184" comment="libtevent0-32bit-3.6.3-94.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994185" comment="libwbclient0-3.6.3-94.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994186" comment="libwbclient0-32bit-3.6.3-94.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994187" comment="samba-3.6.3-94.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994188" comment="samba-32bit-3.6.3-94.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994189" comment="samba-client-3.6.3-94.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994190" comment="samba-client-32bit-3.6.3-94.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994191" comment="samba-doc-3.6.3-94.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994192" comment="samba-krb-printing-3.6.3-94.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994193" comment="samba-winbind-3.6.3-94.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994194" comment="samba-winbind-32bit-3.6.3-94.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219437" version="1" class="patch">
	<metadata>
		<title>Security update for Samba</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="872912" ref_url="https://bugzilla.suse.com/872912" source="BUGZILLA"/>
		<reference ref_id="898031" ref_url="https://bugzilla.suse.com/898031" source="BUGZILLA"/>
		<reference ref_id="899558" ref_url="https://bugzilla.suse.com/899558" source="BUGZILLA"/>
		<reference ref_id="913001" ref_url="https://bugzilla.suse.com/913001" source="BUGZILLA"/>
		<reference ref_id="917376" ref_url="https://bugzilla.suse.com/917376" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0240" ref_url="https://www.suse.com/security/cve/CVE-2015-0240/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001252.html" source="SUSE-SU"/>
		<description>

Samba has been updated to fix one security issue:

    * CVE-2015-0240: Don't call talloc_free on an uninitialized pointer
      (bnc#917376).

Additionally, these non-security issues have been fixed:

    * Realign the winbind request structure following require_membership_of
      field expansion (bnc#913001).
    * Reuse connections derived from DFS referrals (bso#10123,
      fate#316512).
    * Set domain/workgroup based on authentication callback value
      (bso#11059).
    * Fix spoolss error response marshalling (bso#10984).
    * Fix spoolss EnumJobs and GetJob responses (bso#10905, bnc#898031).
    * Fix handling of bad EnumJobs levels (bso#10898).
    * Fix small memory-leak in the background print process; (bnc#899558).
    * Prune idle or hung connections older than 'winbind request timeout'
      (bso#3204, bnc#872912).

Security Issues:

    * CVE-2015-0240
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-17"/>
	<updated date="2015-02-17"/>
	<bugzilla href="https://bugzilla.suse.com/872912">SUSE bug 872912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898031">SUSE bug 898031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899558">SUSE bug 899558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913001">SUSE bug 913001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917376">SUSE bug 917376</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0240/">CVE-2015-0240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0240">CVE-2015-0240 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581414" comment="ldapsmb-1.34b-12.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581415" comment="libldb1-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581416" comment="libsmbclient0-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581417" comment="libsmbclient0-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581418" comment="libsmbclient0-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581419" comment="libtalloc2-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581420" comment="libtalloc2-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581421" comment="libtalloc2-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581422" comment="libtdb1-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581423" comment="libtdb1-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581424" comment="libtdb1-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581425" comment="libtevent0-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581426" comment="libtevent0-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581427" comment="libwbclient0-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581428" comment="libwbclient0-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581429" comment="libwbclient0-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581430" comment="samba-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581431" comment="samba-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581432" comment="samba-client-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581433" comment="samba-client-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581434" comment="samba-client-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567120" comment="samba-doc-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581435" comment="samba-krb-printing-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581436" comment="samba-winbind-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581437" comment="samba-winbind-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581438" comment="samba-winbind-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581439" comment="samba-x86-3.6.3-0.56.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581414" comment="ldapsmb-1.34b-12.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581415" comment="libldb1-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581416" comment="libsmbclient0-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581417" comment="libsmbclient0-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581418" comment="libsmbclient0-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581419" comment="libtalloc2-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581420" comment="libtalloc2-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581421" comment="libtalloc2-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581422" comment="libtdb1-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581423" comment="libtdb1-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581424" comment="libtdb1-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581425" comment="libtevent0-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581426" comment="libtevent0-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581427" comment="libwbclient0-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581428" comment="libwbclient0-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581429" comment="libwbclient0-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581430" comment="samba-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581431" comment="samba-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581432" comment="samba-client-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581433" comment="samba-client-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581434" comment="samba-client-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567120" comment="samba-doc-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581435" comment="samba-krb-printing-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581436" comment="samba-winbind-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581437" comment="samba-winbind-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581438" comment="samba-winbind-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581439" comment="samba-x86-3.6.3-0.56.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581414" comment="ldapsmb-1.34b-12.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581415" comment="libldb1-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581416" comment="libsmbclient0-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581417" comment="libsmbclient0-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581418" comment="libsmbclient0-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581419" comment="libtalloc2-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581420" comment="libtalloc2-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581421" comment="libtalloc2-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581422" comment="libtdb1-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581423" comment="libtdb1-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581424" comment="libtdb1-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581425" comment="libtevent0-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581426" comment="libtevent0-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581427" comment="libwbclient0-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581428" comment="libwbclient0-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581429" comment="libwbclient0-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581430" comment="samba-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581431" comment="samba-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581432" comment="samba-client-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581433" comment="samba-client-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581434" comment="samba-client-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567120" comment="samba-doc-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581435" comment="samba-krb-printing-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581436" comment="samba-winbind-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581437" comment="samba-winbind-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581438" comment="samba-winbind-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581439" comment="samba-x86-3.6.3-0.56.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219438" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="295284" ref_url="https://bugzilla.suse.com/295284" source="BUGZILLA"/>
		<reference ref_id="912457" ref_url="https://bugzilla.suse.com/912457" source="BUGZILLA"/>
		<reference ref_id="934299" ref_url="https://bugzilla.suse.com/934299" source="BUGZILLA"/>
		<reference ref_id="936909" ref_url="https://bugzilla.suse.com/936909" source="BUGZILLA"/>
		<reference ref_id="948244" ref_url="https://bugzilla.suse.com/948244" source="BUGZILLA"/>
		<reference ref_id="949022" ref_url="https://bugzilla.suse.com/949022" source="BUGZILLA"/>
		<reference ref_id="953382" ref_url="https://bugzilla.suse.com/953382" source="BUGZILLA"/>
		<reference ref_id="958582" ref_url="https://bugzilla.suse.com/958582" source="BUGZILLA"/>
		<reference ref_id="958583" ref_url="https://bugzilla.suse.com/958583" source="BUGZILLA"/>
		<reference ref_id="958584" ref_url="https://bugzilla.suse.com/958584" source="BUGZILLA"/>
		<reference ref_id="958586" ref_url="https://bugzilla.suse.com/958586" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252/" source="CVE"/>
		<reference ref_id="CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296/" source="CVE"/>
		<reference ref_id="CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001809.html" source="SUSE-SU"/>
		<description>
This update for Samba fixes the following security issues:

- CVE-2015-5330: Remote read memory exploit in LDB (bnc#958586)
- CVE-2015-5252: Insufficient symlink verification (file access outside the share) (bnc#958582)
- CVE-2015-5296: No man in the middle protection when forcing smb encryption on the client side (bnc#958584)
- CVE-2015-5299: Currently the snapshot browsing is not secure thru windows previous version (shadow_copy2) (bnc#958583)

Non-security issues fixed:

- Prevent null pointer access in samlogon fallback when security credentials are null (bnc#949022)
- Ensure samlogon fall-back requests are rerouted after kerberos failure (bnc#953382)
- Ensure 'Your account is disabled' message is displayed when attempting to ssh into locked account (bnc#953382)
- Address unrecoverable winbind failure: 'key length too large' (bnc#934299)
- Take resource group sids into account when caching netsamlogon data (bnc#912457)
- Fix lookup of groups with 'Local Domain' scope from Active Directory (bnc#948244)
- dependency issue with samba-winbind (bnc#936909)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-19"/>
	<updated date="2016-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/295284">SUSE bug 295284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912457">SUSE bug 912457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934299">SUSE bug 934299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936909">SUSE bug 936909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948244">SUSE bug 948244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949022">SUSE bug 949022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953382">SUSE bug 953382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958582">SUSE bug 958582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958583">SUSE bug 958583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958584">SUSE bug 958584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958586">SUSE bug 958586</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5252">CVE-2015-5252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5296">CVE-2015-5296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5299">CVE-2015-5299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5330">CVE-2015-5330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581440" comment="ldapsmb-1.34b-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581441" comment="libldb1-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581442" comment="libsmbclient0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581443" comment="libsmbclient0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581444" comment="libsmbclient0-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581445" comment="libtalloc2-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581446" comment="libtalloc2-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581447" comment="libtalloc2-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581448" comment="libtdb1-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581449" comment="libtdb1-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581450" comment="libtdb1-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581451" comment="libtevent0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581452" comment="libtevent0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581453" comment="libwbclient0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581454" comment="libwbclient0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581455" comment="libwbclient0-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581456" comment="samba-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581457" comment="samba-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581458" comment="samba-client-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581459" comment="samba-client-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581460" comment="samba-client-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567140" comment="samba-doc-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581461" comment="samba-krb-printing-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581462" comment="samba-winbind-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581463" comment="samba-winbind-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581464" comment="samba-winbind-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581465" comment="samba-x86-3.6.3-64.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581440" comment="ldapsmb-1.34b-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581441" comment="libldb1-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581442" comment="libsmbclient0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581443" comment="libsmbclient0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581444" comment="libsmbclient0-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581445" comment="libtalloc2-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581446" comment="libtalloc2-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581447" comment="libtalloc2-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581448" comment="libtdb1-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581449" comment="libtdb1-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581450" comment="libtdb1-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581451" comment="libtevent0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581452" comment="libtevent0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581453" comment="libwbclient0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581454" comment="libwbclient0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581455" comment="libwbclient0-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581456" comment="samba-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581457" comment="samba-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581458" comment="samba-client-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581459" comment="samba-client-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581460" comment="samba-client-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567140" comment="samba-doc-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581461" comment="samba-krb-printing-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581462" comment="samba-winbind-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581463" comment="samba-winbind-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581464" comment="samba-winbind-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581465" comment="samba-x86-3.6.3-64.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581440" comment="ldapsmb-1.34b-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581441" comment="libldb1-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581442" comment="libsmbclient0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581443" comment="libsmbclient0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581444" comment="libsmbclient0-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581445" comment="libtalloc2-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581446" comment="libtalloc2-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581447" comment="libtalloc2-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581448" comment="libtdb1-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581449" comment="libtdb1-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581450" comment="libtdb1-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581451" comment="libtevent0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581452" comment="libtevent0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581453" comment="libwbclient0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581454" comment="libwbclient0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581455" comment="libwbclient0-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581456" comment="samba-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581457" comment="samba-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581458" comment="samba-client-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581459" comment="samba-client-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581460" comment="samba-client-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567140" comment="samba-doc-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581461" comment="samba-krb-printing-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581462" comment="samba-winbind-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581463" comment="samba-winbind-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581464" comment="samba-winbind-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581465" comment="samba-x86-3.6.3-64.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219439" version="1" class="patch">
	<metadata>
		<title>Security update for sane-backends (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027197" ref_url="https://bugzilla.suse.com/1027197" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6318" ref_url="https://www.suse.com/security/cve/CVE-2017-6318/" source="CVE"/>
		<description>

This update for sane-backends fixes the following issues:

- saned could have leaked uninitialized memory back to its requesters for some
  opcodes, allowing for information disclosure of saned memory
  (CVE-2017-6318, bsc#1027197).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027197">SUSE bug 1027197</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6318/">CVE-2017-6318 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6318">CVE-2017-6318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575176" comment="sane-backends-1.0.20-7.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219440" version="1" class="patch">
	<metadata>
		<title>Security update for sblim-sfcb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="942628" ref_url="https://bugzilla.suse.com/942628" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5185" ref_url="https://www.suse.com/security/cve/CVE-2015-5185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001722.html" source="SUSE-SU"/>
		<description>

This update of sblim-sfcb fixes a potential NULL pointer crash in lookupProviders() (CVE-2015-5185).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/942628">SUSE bug 942628</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5185/">CVE-2015-5185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5185">CVE-2015-5185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581466" comment="sblim-sfcb-1.3.11-0.25.4 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581466" comment="sblim-sfcb-1.3.11-0.25.4 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581466" comment="sblim-sfcb-1.3.11-0.25.4 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219441" version="1" class="patch">
	<metadata>
		<title>Security update for sblim-sfcb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1008130" ref_url="https://bugzilla.suse.com/1008130" source="BUGZILLA"/>
		<reference ref_id="1012814" ref_url="https://bugzilla.suse.com/1012814" source="BUGZILLA"/>
		<reference ref_id="923349" ref_url="https://bugzilla.suse.com/923349" source="BUGZILLA"/>
		<description>

This update for sblim-sfcb fixes the following issues:

Feature enhancements:
- A seperate sblim-sfcb-openssl1 package was added to the SECURITY Module.
  (fate#322032/bsc#1012814)

  This package can be installed additionaly, and the SysV Init script will
  pick the openssl1 variant on the next start, offering TLS 1.2 support
  on the WBEM SSL socket.

Bugfixes:
-  Add sslNoSSLv3 and sslNoTLSv1 configuration options (bsc#923349, bsc#1008130)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-13"/>
	<updated date="2017-04-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1008130">SUSE bug 1008130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012814">SUSE bug 1012814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923349">SUSE bug 923349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581467" comment="sblim-sfcb-1.3.11-0.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581468" comment="sblim-sfcb-openssl1-1.3.11-0.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219442" version="1" class="patch">
	<metadata>
		<title>Security update for screen (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="944458" ref_url="https://bugzilla.suse.com/944458" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6806" ref_url="https://www.suse.com/security/cve/CVE-2015-6806/" source="CVE"/>
		<description>
This update for screen fixes the following issues:

Security issue fixed:

- CVE-2015-6806: Fixed a stack overflow due to deep recursion (bsc#944458).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-16"/>
	<updated date="2019-05-16"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/944458">SUSE bug 944458</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-6806/">CVE-2015-6806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6806">CVE-2015-6806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575178" comment="screen-4.0.2-162.19.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219443" version="1" class="patch">
	<metadata>
		<title>Security update for shim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1175626" ref_url="https://bugzilla.suse.com/1175626" source="BUGZILLA"/>
		<reference ref_id="1175656" ref_url="https://bugzilla.suse.com/1175656" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<description>
This update for shim fixes the following issues:

Update to the unified shim binary from SUSE Linux Enterprise 15-SP1 (bsc#1168994)

This update addresses the 'BootHole' security issue (master CVE CVE-2020-10713), by
disallowing binaries signed by the previous SUSE UEFI signing key from booting.

This update should only be installed after updates of grub2, the Linux kernel and (if used)
Xen from or after July / August 2020 are applied.

Also fixed:

+ shim-install: install MokManager to \EFI\boot to process the pending MOK request (bsc#1175626, bsc#1175656)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-15"/>
	<updated date="2020-09-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175626">SUSE bug 1175626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175656">SUSE bug 1175656</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10713">CVE-2020-10713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581469" comment="shim-15+git47-12.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219444" version="1" class="patch">
	<metadata>
		<title>Security update for shim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<description>
This update for shim fixes the following issues:

- Update to the unified shim binary for SBAT support (bsc#1182057) 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581470" comment="shim-15.4-12.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219445" version="1" class="patch">
	<metadata>
		<title>Security update for shim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185232" ref_url="https://bugzilla.suse.com/1185232" source="BUGZILLA"/>
		<reference ref_id="1185261" ref_url="https://bugzilla.suse.com/1185261" source="BUGZILLA"/>
		<reference ref_id="1185441" ref_url="https://bugzilla.suse.com/1185441" source="BUGZILLA"/>
		<reference ref_id="1185621" ref_url="https://bugzilla.suse.com/1185621" source="BUGZILLA"/>
		<reference ref_id="1187071" ref_url="https://bugzilla.suse.com/1187071" source="BUGZILLA"/>
		<reference ref_id="1187260" ref_url="https://bugzilla.suse.com/1187260" source="BUGZILLA"/>
		<reference ref_id="1193282" ref_url="https://bugzilla.suse.com/1193282" source="BUGZILLA"/>
		<reference ref_id="1198458" ref_url="https://bugzilla.suse.com/1198458" source="BUGZILLA"/>
		<reference ref_id="1201066" ref_url="https://bugzilla.suse.com/1201066" source="BUGZILLA"/>
		<reference ref_id="1202120" ref_url="https://bugzilla.suse.com/1202120" source="BUGZILLA"/>
		<reference ref_id="1205588" ref_url="https://bugzilla.suse.com/1205588" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-28737" ref_url="https://www.suse.com/security/cve/CVE-2022-28737/" source="CVE"/>
		<description>
This update for shim fixes the following issues:

- Updated shim signature after shim 15.7 be signed back:
  signature-sles.x86_64.asc, signature-sles.aarch64.asc (bsc#1198458)

- Add POST_PROCESS_PE_FLAGS=-N to the build command in shim.spec to
  disable the NX compatibility flag when using post-process-pe because
  grub2 is not ready. (bsc#1205588)

- Enable the NX compatibility flag by default. (jsc#PED-127) 

Update to 15.7 (bsc#1198458) (jsc#PED-127):

- Make SBAT variable payload introspectable
- Reference MokListRT instead of MokList
- Add a link to the test plan in the readme.
- [V3] Enable TDX measurement to RTMR register
- Discard load-options that start with a NUL
- Fixed load_cert_file bugs
- Add -malign-double to IA32 compiler flags
- pe: Fix image section entry-point validation
- make-archive: Build reproducible tarball
- mok: remove MokListTrusted from PCR 7

Other fixes:

- Support enhance shim measurement to TD RTMR. (jsc#PED-1273) 

- shim-install: ensure grub.cfg created is not overwritten after installing grub related files
- Add logic to shim.spec to only set sbat policy when efivarfs is writeable.  (bsc#1201066)
- Add logic to shim.spec for detecting --set-sbat-policy option before using mokutil to set sbat policy. (bsc#1202120)
- Change the URL in SBAT section to mail:security@suse.de. (bsc#1193282)

Update to 15.6 (bsc#1198458):

- MokManager: removed Locate graphic output protocol fail error message
- shim: implement SBAT verification for the shim_lock protocol
- post-process-pe: Fix a missing return code check
- Update github actions matrix to be more useful
- post-process-pe: Fix format string warnings on 32-bit platforms
- Allow MokListTrusted to be enabled by default
- Re-add ARM AArch64 support
- Use ASCII as fallback if Unicode Box Drawing characters fail
- make: don't treat cert.S specially
- shim: use SHIM_DEVEL_VERBOSE when built in devel mode
- Break out of the inner sbat loop if we find the entry.
- Support loading additional certificates
- Add support for NX (W^X) mitigations.
- Fix preserve_sbat_uefi_variable() logic
- SBAT Policy latest should be a one-shot
- pe: Fix a buffer overflow when SizeOfRawData &gt; VirtualSize
- pe: Perform image verification earlier when loading grub
- Update advertised sbat generation number for shim
- Update SBAT generation requirements for 05/24/22
- Also avoid CVE-2022-28737 in verify_image() by @vathpela

Update to 15.5 (bsc#1198458):

- Broken ia32 relocs and an unimportant submodule change.
- mok: allocate MOK config table as BootServicesData
- Don't call QueryVariableInfo() on EFI 1.10 machines (bsc#1187260)
- Relax the check for import_mok_state()  (bsc#1185261)
- SBAT.md: trivial changes
- shim: another attempt to fix load options handling
- Add tests for our load options parsing.
- arm/aa64: fix the size of .rela* sections
- mok: fix potential buffer overrun in import_mok_state
- mok: relax the maximum variable size check
- Don't unhook ExitBootServices when EBS protection is disabled
- fallback: find_boot_option() needs to return the index for the boot entry in optnum
- httpboot: Ignore case when checking HTTP headers
- Fallback allocation errors
- shim: avoid BOOTx64.EFI in message on other architectures
- str: remove duplicate parameter check
- fallback: add compile option FALLBACK_NONINTERACTIVE
- Test mok mirror
- Modify sbat.md to help with readability.
- csv: detect end of csv file correctly
- Specify that the .sbat section is ASCII not UTF-8
- tests: add 'include-fixed' GCC directory to include directories
- pe: simplify generate_hash()
- Don't make shim abort when TPM log event fails (RHBZ #2002265)
- Fallback to default loader if parsed one does not exist
- fallback: Fix for BootOrder crash when index returned
- Better console checks
- docs: update SBAT UEFI variable name
- Don't parse load options if invoked from removable media path
- fallback: fix fallback not passing arguments of the first boot option
- shim: Don't stop forever at 'Secure Boot not enabled' notification
- Allocate mokvar table in runtime memory.
- Remove post-process-pe on 'make clean'
- pe: missing perror argument


- CVE-2022-28737: Fixed a buffer overflow when SizeOfRawData &gt; VirtualSize (bsc#1198458)

- Add mokutil command to post script for setting sbat policy to latest mode
  when the SbatPolicy-605dab50-e046-4300-abb6-3dd810dd8b23 is not created.
  (bsc#1198458)

- Updated vendor dbx binary and script (bsc#1198458)

  - Updated dbx-cert.tar.xz and vendor-dbx-sles.bin for adding
    SLES-UEFI-SIGN-Certificate-2021-05.crt to vendor dbx list.
  - Updated dbx-cert.tar.xz and vendor-dbx-opensuse.bin for adding
    openSUSE-UEFI-SIGN-Certificate-2021-05.crt to vendor dbx list.
  - Updated vendor-dbx.bin for adding SLES-UEFI-SIGN-Certificate-2021-05.crt
    and openSUSE-UEFI-SIGN-Certificate-2021-05.crt for testing environment.
  - Updated generate-vendor-dbx.sh script for generating a vendor-dbx.bin
    file which includes all .der for testing environment.

- avoid buffer overflow when copying data to the MOK config table (bsc#1185232)
- Disable exporting vendor-dbx to MokListXRT since writing a large RT variable could crash some machines (bsc#1185261)
- ignore the odd LoadOptions length (bsc#1185232)
- shim-install: reset def_shim_efi to 'shim.efi' if the given file doesn't exist
- relax the maximum variable size check for u-boot (bsc#1185621)
- handle ignore_db and user_insecure_mode correctly (bsc#1185441, bsc#1187071)

- Split the keys in vendor-dbx.bin to vendor-dbx-sles and
  vendor-dbx-opensuse for shim-sles and shim-opensuse to reduce
  the size of MokListXRT (bsc#1185261) 
  + Also update generate-vendor-dbx.sh in dbx-cert.tar.xz
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-13"/>
	<updated date="2023-04-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185232">SUSE bug 1185232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185261">SUSE bug 1185261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185441">SUSE bug 1185441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185621">SUSE bug 1185621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187071">SUSE bug 1187071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187260">SUSE bug 1187260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193282">SUSE bug 1193282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198458">SUSE bug 1198458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201066">SUSE bug 1201066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202120">SUSE bug 1202120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205588">SUSE bug 1205588</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28737/">CVE-2022-28737 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28737">CVE-2022-28737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994195" comment="shim-15.7-12.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219446" version="1" class="patch">
	<metadata>
		<title>Security update for shim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198458" ref_url="https://bugzilla.suse.com/1198458" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-28737" ref_url="https://www.suse.com/security/cve/CVE-2022-28737/" source="CVE"/>
		<description>
This update for shim fixes the following issues:

- This update just adds the missing CVE reference for the shim fix (bsc#1198458, CVE-2022-28737) 
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-28"/>
	<updated date="2023-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198458">SUSE bug 1198458</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28737/">CVE-2022-28737 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28737">CVE-2022-28737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994196" comment="shim-15.7-12.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219447" version="1" class="patch">
	<metadata>
		<title>Security update for shim</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="813448" ref_url="https://bugzilla.suse.com/813448" source="BUGZILLA"/>
		<reference ref_id="863205" ref_url="https://bugzilla.suse.com/863205" source="BUGZILLA"/>
		<reference ref_id="866690" ref_url="https://bugzilla.suse.com/866690" source="BUGZILLA"/>
		<reference ref_id="875385" ref_url="https://bugzilla.suse.com/875385" source="BUGZILLA"/>
		<reference ref_id="889332" ref_url="https://bugzilla.suse.com/889332" source="BUGZILLA"/>
		<reference ref_id="889765" ref_url="https://bugzilla.suse.com/889765" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3675" ref_url="https://www.suse.com/security/cve/CVE-2014-3675/" source="CVE"/>
		<reference ref_id="CVE-2014-3676" ref_url="https://www.suse.com/security/cve/CVE-2014-3676/" source="CVE"/>
		<reference ref_id="CVE-2014-3677" ref_url="https://www.suse.com/security/cve/CVE-2014-3677/" source="CVE"/>
		<description>

shim has been updated to fix three security issues:

    * OOB read access when parsing DHCPv6 packets (remote DoS)
      (CVE-2014-3675).
    * Heap overflow when parsing IPv6 addresses provided by tftp:// DHCPv6
      boot option (RCE) (CVE-2014-3676).
    * Memory corruption when processing user provided MOK lists
      (CVE-2014-3677).

Security Issues:

    * CVE-2014-3675
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3675&gt;
    * CVE-2014-3676
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3676&gt;
    * CVE-2014-3677
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3677&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-19"/>
	<updated date="2014-11-19"/>
	<bugzilla href="https://bugzilla.suse.com/813448">SUSE bug 813448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863205">SUSE bug 863205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866690">SUSE bug 866690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875385">SUSE bug 875385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889332">SUSE bug 889332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889765">SUSE bug 889765</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3675/">CVE-2014-3675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3675">CVE-2014-3675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3676/">CVE-2014-3676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3676">CVE-2014-3676 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3677/">CVE-2014-3677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3677">CVE-2014-3677 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563876" comment="gnu-efi-3.0u-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567145" comment="shim-0.7.318.81ee561d-0.9.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563876" comment="gnu-efi-3.0u-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567145" comment="shim-0.7.318.81ee561d-0.9.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563876" comment="gnu-efi-3.0u-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567145" comment="shim-0.7.318.81ee561d-0.9.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219448" version="1" class="patch">
	<metadata>
		<title>Security update for socat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="821985" ref_url="https://bugzilla.suse.com/821985" source="BUGZILLA"/>
		<reference ref_id="860991" ref_url="https://bugzilla.suse.com/860991" source="BUGZILLA"/>
		<reference ref_id="964844" ref_url="https://bugzilla.suse.com/964844" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-3571" ref_url="https://www.suse.com/security/cve/CVE-2013-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-0019" ref_url="https://www.suse.com/security/cve/CVE-2014-0019/" source="CVE"/>
		<description>

This update for socat fixes the following issues:

- CVE-2013-3571: Fix a file descriptor leak that could have been misused for a denial of service attack against socat running in server mode (bsc#821985)
- CVE-2014-0019: PROXY-CONNECT address was vulnerable to a stack buffer overflow (bsc#860991)
- Fix a stack overflow in the parser that could have been leveraged to execute arbitrary code (bsc#964844)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/821985">SUSE bug 821985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860991">SUSE bug 860991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964844">SUSE bug 964844</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3571/">CVE-2013-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3571">CVE-2013-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0019/">CVE-2014-0019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0019">CVE-2014-0019 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575180" comment="socat-1.7.0.0-1.18.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219449" version="1" class="patch">
	<metadata>
		<title>Security update for spamassassin (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1108745" ref_url="https://bugzilla.suse.com/1108745" source="BUGZILLA"/>
		<reference ref_id="1108748" ref_url="https://bugzilla.suse.com/1108748" source="BUGZILLA"/>
		<reference ref_id="1108749" ref_url="https://bugzilla.suse.com/1108749" source="BUGZILLA"/>
		<reference ref_id="1162197" ref_url="https://bugzilla.suse.com/1162197" source="BUGZILLA"/>
		<reference ref_id="1162200" ref_url="https://bugzilla.suse.com/1162200" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<reference ref_id="CVE-2017-15705" ref_url="https://www.suse.com/security/cve/CVE-2017-15705/" source="CVE"/>
		<reference ref_id="CVE-2018-11781" ref_url="https://www.suse.com/security/cve/CVE-2018-11781/" source="CVE"/>
		<reference ref_id="CVE-2020-1930" ref_url="https://www.suse.com/security/cve/CVE-2020-1930/" source="CVE"/>
		<reference ref_id="CVE-2020-1931" ref_url="https://www.suse.com/security/cve/CVE-2020-1931/" source="CVE"/>
		<description>
This update for spamassassin fixes the following issues:

- CVE-2016-1238: Fixed reliance on '.' when loading modules from current directory (bsc#1108749).
- CVE-2017-15705: Fixed denial of service vulnerability where certain unclosed tags in crafted emails allowed for scan
  timeouts (bsc#1108745).
- CVE-2018-11781: Fixed local user code injection in the meta rule syntax (bsc#1108748).
- CVE-2020-1931: Fixed vulnerability where nefarious rule configuration (.cf) files could be configured to run system
  commands with warnings (bsc#1162200).
- CVE-2020-1930: Fixed vulnerability where nefarious rule configuration (.cf) files could be configured to run system
  commands (bsc#1162197).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-02"/>
	<updated date="2022-06-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1108745">SUSE bug 1108745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108748">SUSE bug 1108748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108749">SUSE bug 1108749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162197">SUSE bug 1162197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162200">SUSE bug 1162200</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1238">CVE-2016-1238 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15705/">CVE-2017-15705 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15705">CVE-2017-15705 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11781/">CVE-2018-11781 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11781">CVE-2018-11781 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1930/">CVE-2020-1930 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1930">CVE-2020-1930 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1931/">CVE-2020-1931 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1931">CVE-2020-1931 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994197" comment="perl-spamassassin-3.3.1-10.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994198" comment="spamassassin-3.3.1-10.8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219450" version="1" class="patch">
	<metadata>
		<title>Security update for speex (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192580" ref_url="https://bugzilla.suse.com/1192580" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-23903" ref_url="https://www.suse.com/security/cve/CVE-2020-23903/" source="CVE"/>
		<description>
This update for speex fixes the following issues:

- CVE-2020-23903: Fixed zero division error in read_samples (bsc#1192580).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192580">SUSE bug 1192580</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-23903/">CVE-2020-23903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-23903">CVE-2020-23903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656593" comment="libspeex-1.1.99.91-16.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656594" comment="libspeex-32bit-1.1.99.91-16.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219451" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="987394" ref_url="https://bugzilla.suse.com/987394" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6153" ref_url="https://www.suse.com/security/cve/CVE-2016-6153/" source="CVE"/>
		<description>

This update for sqlite3 fixes the following issues: 

The following security issue was fixed:
- CVE-2016-6153: Fixed a tempdir selection vulnerability (bsc#987394)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-10"/>
	<updated date="2016-08-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/987394">SUSE bug 987394</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6153/">CVE-2016-6153 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6153">CVE-2016-6153 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581471" comment="libsqlite3-0-3.7.6.3-1.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581472" comment="libsqlite3-0-32bit-3.7.6.3-1.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581473" comment="sqlite3-3.7.6.3-1.4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219452" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1119687" ref_url="https://bugzilla.suse.com/1119687" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20346" ref_url="https://www.suse.com/security/cve/CVE-2018-20346/" source="CVE"/>
		<description>
This update for sqlite3 fixes the following issue:

Security issue fixed: 

- CVE-2018-20346: Fixed a remote code execution vulnerability in FTS3 (Magellan) (bsc#1119687).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1119687">SUSE bug 1119687</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20346/">CVE-2018-20346 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20346">CVE-2018-20346 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581474" comment="libsqlite3-0-3.7.6.3-1.4.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581475" comment="libsqlite3-0-32bit-3.7.6.3-1.4.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581476" comment="sqlite3-3.7.6.3-1.4.7.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219453" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1085790" ref_url="https://bugzilla.suse.com/1085790" source="BUGZILLA"/>
		<reference ref_id="1132045" ref_url="https://bugzilla.suse.com/1132045" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10989" ref_url="https://www.suse.com/security/cve/CVE-2017-10989/" source="CVE"/>
		<reference ref_id="CVE-2018-8740" ref_url="https://www.suse.com/security/cve/CVE-2018-8740/" source="CVE"/>
		<description>
This update for sqlite3 fixes the following issues:

Security issue fixed:

- CVE-2018-8740: Fixed a NULL pointer dereference related to corrupted databases schemas (bsc#1085790).
- CVE-2017-10989: Fixed a heap-based buffer over-read in getNodeSize() (bsc#1132045).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-07"/>
	<updated date="2019-05-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085790">SUSE bug 1085790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132045">SUSE bug 1132045</bugzilla>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10989/">CVE-2017-10989 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10989">CVE-2017-10989 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8740/">CVE-2018-8740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8740">CVE-2018-8740 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581477" comment="libsqlite3-0-3.7.6.3-1.4.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581478" comment="libsqlite3-0-32bit-3.7.6.3-1.4.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581479" comment="sqlite3-3.7.6.3-1.4.7.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219454" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1136976" ref_url="https://bugzilla.suse.com/1136976" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8457" ref_url="https://www.suse.com/security/cve/CVE-2019-8457/" source="CVE"/>
		<description>
This update for sqlite3 fixes the following issue:

Security issue fixed:	  

- CVE-2019-8457: Fixed a Heap out-of-bound read in rtreenode() when handling invalid rtree tables (bsc#1136976).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-14"/>
	<updated date="2019-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136976">SUSE bug 1136976</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8457/">CVE-2019-8457 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8457">CVE-2019-8457 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581480" comment="libsqlite3-0-3.7.6.3-1.4.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581481" comment="libsqlite3-0-32bit-3.7.6.3-1.4.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581482" comment="sqlite3-3.7.6.3-1.4.7.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219455" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1155787" ref_url="https://bugzilla.suse.com/1155787" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2518" ref_url="https://www.suse.com/security/cve/CVE-2017-2518/" source="CVE"/>
		<description>
This update for sqlite3 fixes the following issues:
	  
- CVE-2017-2518: Fixed a use-after-free vulnerability which could have 
  led to buffer overflow via a crafted SQL statement (bsc#1155787).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155787">SUSE bug 1155787</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2518/">CVE-2017-2518 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2518">CVE-2017-2518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581483" comment="libsqlite3-0-3.7.6.3-1.4.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581484" comment="libsqlite3-0-32bit-3.7.6.3-1.4.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581485" comment="sqlite3-3.7.6.3-1.4.7.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219456" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1160439" ref_url="https://bugzilla.suse.com/1160439" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20218" ref_url="https://www.suse.com/security/cve/CVE-2019-20218/" source="CVE"/>
		<description>
This update for sqlite3 fixes the following issues:

- CVE-2019-20218: Fixed a stack unwinding flaw in the selectExpander after a parsing error. (bsc#1160439)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-29"/>
	<updated date="2021-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160439">SUSE bug 1160439</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20218/">CVE-2019-20218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20218">CVE-2019-20218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626552" comment="libsqlite3-0-3.7.6.3-1.4.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626553" comment="libsqlite3-0-32bit-3.7.6.3-1.4.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626554" comment="sqlite3-3.7.6.3-1.4.7.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219457" version="1" class="patch">
	<metadata>
		<title>Security update for squid</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="677335" ref_url="https://bugzilla.suse.com/677335" source="BUGZILLA"/>
		<reference ref_id="829084" ref_url="https://bugzilla.suse.com/829084" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4115" ref_url="https://www.suse.com/security/cve/CVE-2013-4115/" source="CVE"/>
		<description>

This squid update fixes a buffer overflow issue when squid attempts to 
resolve an overly long hostname. This can be triggered with specially 
crafted http requests. (bnc#829084, CVE-2013-4115)

This update also includes a correction to the last change for logrotate. 
(bnc#677335)

Security Issue reference:

    * CVE-2013-4115
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4115&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-09"/>
	<updated date="2013-09-09"/>
	<bugzilla href="https://bugzilla.suse.com/677335">SUSE bug 677335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829084">SUSE bug 829084</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4115/">CVE-2013-4115 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4115">CVE-2013-4115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576954" comment="squid-2.7.STABLE5-2.12.16.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576954" comment="squid-2.7.STABLE5-2.12.16.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576954" comment="squid-2.7.STABLE5-2.12.16.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219458" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="895773" ref_url="https://bugzilla.suse.com/895773" source="BUGZILLA"/>
		<reference ref_id="949942" ref_url="https://bugzilla.suse.com/949942" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6270" ref_url="https://www.suse.com/security/cve/CVE-2014-6270/" source="CVE"/>
		<reference ref_id="CVE-2014-9749" ref_url="https://www.suse.com/security/cve/CVE-2014-9749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001678.html" source="SUSE-SU"/>
		<description>
squid was updated to fix two security issues.

These security issues were fixed:
- CVE-2014-6270: Fixed an off by one in snmp subsystem (bsc#895773).
- CVE-2014-9749: Fixed a nonce replay vulnerability in Digest authentication (bsc#949942).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-13"/>
	<updated date="2015-11-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/895773">SUSE bug 895773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949942">SUSE bug 949942</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6270/">CVE-2014-6270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6270">CVE-2014-6270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9749/">CVE-2014-9749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9749">CVE-2014-9749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581486" comment="squid-2.7.STABLE5-2.12.24.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581486" comment="squid-2.7.STABLE5-2.12.24.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581486" comment="squid-2.7.STABLE5-2.12.24.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219459" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="976553" ref_url="https://bugzilla.suse.com/976553" source="BUGZILLA"/>
		<reference ref_id="979010" ref_url="https://bugzilla.suse.com/979010" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4051" ref_url="https://www.suse.com/security/cve/CVE-2016-4051/" source="CVE"/>
		<reference ref_id="CVE-2016-4554" ref_url="https://www.suse.com/security/cve/CVE-2016-4554/" source="CVE"/>
		<description>

This update for squid fixes the following issues:

- CVE-2016-4051: backport fix buffer overflow in cachemgr.cgi (bsc#976553)
- CVE-2016-4554: backport fix for header smuggling issue in HTTP Request processing (bsc#979010)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-24"/>
	<updated date="2016-08-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/976553">SUSE bug 976553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979010">SUSE bug 979010</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4051/">CVE-2016-4051 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4051">CVE-2016-4051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4554/">CVE-2016-4554 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4554">CVE-2016-4554 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575189" comment="squid-2.7.STABLE5-2.12.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219460" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1140738" ref_url="https://bugzilla.suse.com/1140738" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13345" ref_url="https://www.suse.com/security/cve/CVE-2019-13345/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

Security issue fixed:

- CVE-2019-13345: Fixed a cross site scripting vulnerability via user_name or auth parameter in cachemgr.cgi (bsc#1140738).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-15"/>
	<updated date="2019-08-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1140738">SUSE bug 1140738</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13345/">CVE-2019-13345 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13345">CVE-2019-13345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575190" comment="squid-2.7.STABLE5-2.12.30.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219461" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1156329" ref_url="https://bugzilla.suse.com/1156329" source="BUGZILLA"/>
		<reference ref_id="1175664" ref_url="https://bugzilla.suse.com/1175664" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523/" source="CVE"/>
		<reference ref_id="CVE-2019-18676" ref_url="https://www.suse.com/security/cve/CVE-2019-18676/" source="CVE"/>
		<reference ref_id="CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-15810: Fixed a HTTP Request Smuggling that could have resulted in cache poisoning (bsc#1175664).
- CVE-2019-12523: Disabled urn parsing and parsing of unknown schemes (bsc#1156329).
- CVE-2019-18676: Disabled urn parsing and parsing of unknown schemes (bsc#1156329).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156329">SUSE bug 1156329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175664">SUSE bug 1175664</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12523">CVE-2019-12523 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18676/">CVE-2019-18676 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18676">CVE-2019-18676 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15810">CVE-2020-15810 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670261" comment="squid-2.7.STABLE5-2.12.30.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219462" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<description>
This update for squid fixes the following issues:

This update ships Squid 4.17. (jsc#SLE-24797, jsc#SLE-24799)
	  		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2022-10-27"/>
	<severity>Important</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994199" comment="squid-4.17-33.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219463" version="1" class="patch">
	<metadata>
		<title>Security update for squid3</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="677335" ref_url="https://bugzilla.suse.com/677335" source="BUGZILLA"/>
		<reference ref_id="867533" ref_url="https://bugzilla.suse.com/867533" source="BUGZILLA"/>
		<reference ref_id="893649" ref_url="https://bugzilla.suse.com/893649" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0128" ref_url="https://www.suse.com/security/cve/CVE-2014-0128/" source="CVE"/>
		<reference ref_id="CVE-2014-3609" ref_url="https://www.suse.com/security/cve/CVE-2014-3609/" source="CVE"/>
		<description>

Squid3 was updated to fix a denial of service in Range Header processing, 
which would have allowed proxy users to crash the squid proxy process. 
(CVE-2014-3609)

Security Issues:

    * CVE-2014-3609
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3609&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-12"/>
	<updated date="2014-09-12"/>
	<bugzilla href="https://bugzilla.suse.com/677335">SUSE bug 677335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867533">SUSE bug 867533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893649">SUSE bug 893649</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0128/">CVE-2014-0128 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0128">CVE-2014-0128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3609/">CVE-2014-3609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3609">CVE-2014-3609 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581487" comment="squid3-3.1.12-8.16.20.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581487" comment="squid3-3.1.12-8.16.20.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581487" comment="squid3-3.1.12-8.16.20.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219464" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="895773" ref_url="https://bugzilla.suse.com/895773" source="BUGZILLA"/>
		<reference ref_id="902197" ref_url="https://bugzilla.suse.com/902197" source="BUGZILLA"/>
		<reference ref_id="938715" ref_url="https://bugzilla.suse.com/938715" source="BUGZILLA"/>
		<reference ref_id="963539" ref_url="https://bugzilla.suse.com/963539" source="BUGZILLA"/>
		<reference ref_id="967011" ref_url="https://bugzilla.suse.com/967011" source="BUGZILLA"/>
		<reference ref_id="968392" ref_url="https://bugzilla.suse.com/968392" source="BUGZILLA"/>
		<reference ref_id="968393" ref_url="https://bugzilla.suse.com/968393" source="BUGZILLA"/>
		<reference ref_id="968394" ref_url="https://bugzilla.suse.com/968394" source="BUGZILLA"/>
		<reference ref_id="968395" ref_url="https://bugzilla.suse.com/968395" source="BUGZILLA"/>
		<reference ref_id="973782" ref_url="https://bugzilla.suse.com/973782" source="BUGZILLA"/>
		<reference ref_id="973783" ref_url="https://bugzilla.suse.com/973783" source="BUGZILLA"/>
		<reference ref_id="976553" ref_url="https://bugzilla.suse.com/976553" source="BUGZILLA"/>
		<reference ref_id="976556" ref_url="https://bugzilla.suse.com/976556" source="BUGZILLA"/>
		<reference ref_id="976708" ref_url="https://bugzilla.suse.com/976708" source="BUGZILLA"/>
		<reference ref_id="979008" ref_url="https://bugzilla.suse.com/979008" source="BUGZILLA"/>
		<reference ref_id="979009" ref_url="https://bugzilla.suse.com/979009" source="BUGZILLA"/>
		<reference ref_id="979010" ref_url="https://bugzilla.suse.com/979010" source="BUGZILLA"/>
		<reference ref_id="979011" ref_url="https://bugzilla.suse.com/979011" source="BUGZILLA"/>
		<reference ref_id="993299" ref_url="https://bugzilla.suse.com/993299" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3205" ref_url="https://www.suse.com/security/cve/CVE-2011-3205/" source="CVE"/>
		<reference ref_id="CVE-2011-4096" ref_url="https://www.suse.com/security/cve/CVE-2011-4096/" source="CVE"/>
		<reference ref_id="CVE-2012-5643" ref_url="https://www.suse.com/security/cve/CVE-2012-5643/" source="CVE"/>
		<reference ref_id="CVE-2013-0188" ref_url="https://www.suse.com/security/cve/CVE-2013-0188/" source="CVE"/>
		<reference ref_id="CVE-2013-4115" ref_url="https://www.suse.com/security/cve/CVE-2013-4115/" source="CVE"/>
		<reference ref_id="CVE-2014-0128" ref_url="https://www.suse.com/security/cve/CVE-2014-0128/" source="CVE"/>
		<reference ref_id="CVE-2014-6270" ref_url="https://www.suse.com/security/cve/CVE-2014-6270/" source="CVE"/>
		<reference ref_id="CVE-2014-7141" ref_url="https://www.suse.com/security/cve/CVE-2014-7141/" source="CVE"/>
		<reference ref_id="CVE-2014-7142" ref_url="https://www.suse.com/security/cve/CVE-2014-7142/" source="CVE"/>
		<reference ref_id="CVE-2015-5400" ref_url="https://www.suse.com/security/cve/CVE-2015-5400/" source="CVE"/>
		<reference ref_id="CVE-2016-2390" ref_url="https://www.suse.com/security/cve/CVE-2016-2390/" source="CVE"/>
		<reference ref_id="CVE-2016-2569" ref_url="https://www.suse.com/security/cve/CVE-2016-2569/" source="CVE"/>
		<reference ref_id="CVE-2016-2570" ref_url="https://www.suse.com/security/cve/CVE-2016-2570/" source="CVE"/>
		<reference ref_id="CVE-2016-2571" ref_url="https://www.suse.com/security/cve/CVE-2016-2571/" source="CVE"/>
		<reference ref_id="CVE-2016-2572" ref_url="https://www.suse.com/security/cve/CVE-2016-2572/" source="CVE"/>
		<reference ref_id="CVE-2016-3947" ref_url="https://www.suse.com/security/cve/CVE-2016-3947/" source="CVE"/>
		<reference ref_id="CVE-2016-3948" ref_url="https://www.suse.com/security/cve/CVE-2016-3948/" source="CVE"/>
		<reference ref_id="CVE-2016-4051" ref_url="https://www.suse.com/security/cve/CVE-2016-4051/" source="CVE"/>
		<reference ref_id="CVE-2016-4052" ref_url="https://www.suse.com/security/cve/CVE-2016-4052/" source="CVE"/>
		<reference ref_id="CVE-2016-4053" ref_url="https://www.suse.com/security/cve/CVE-2016-4053/" source="CVE"/>
		<reference ref_id="CVE-2016-4054" ref_url="https://www.suse.com/security/cve/CVE-2016-4054/" source="CVE"/>
		<reference ref_id="CVE-2016-4553" ref_url="https://www.suse.com/security/cve/CVE-2016-4553/" source="CVE"/>
		<reference ref_id="CVE-2016-4554" ref_url="https://www.suse.com/security/cve/CVE-2016-4554/" source="CVE"/>
		<reference ref_id="CVE-2016-4555" ref_url="https://www.suse.com/security/cve/CVE-2016-4555/" source="CVE"/>
		<reference ref_id="CVE-2016-4556" ref_url="https://www.suse.com/security/cve/CVE-2016-4556/" source="CVE"/>
		<description>


This update for squid3 fixes the following issues:

- Multiple issues in pinger ICMP processing.  (CVE-2014-7141, CVE-2014-7142) 

- CVE-2016-3947: Buffer overrun issue in pinger
    ICMPv6 processing. (bsc#973782)

-  CVE-2016-4554: fix header smuggling issue in HTTP Request processing (bsc#979010)

- Fix multiple Denial of Service issues in HTTP Response processing.
    (CVE-2016-2569, CVE-2016-2570, CVE-2016-2571, CVE-2016-2572,
     bsc#968392, bsc#968393, bsc#968394, bsc#968395)
- Regression caused by the DoS fixes above (bsc#993299)

- CVE-2016-3948: Fix denial of service in HTTP Response processing (bsc#973783)

- CVE-2016-4051: fixes buffer overflow in cachemgr.cgi (bsc#976553)

- CVE-2016-4052, CVE-2016-4053, CVE-2016-4054:
  * fixes multiple issues in ESI processing (bsc#976556)

- CVE-2016-4556: fixes double free vulnerability in Esi.cc (bsc#979008)

- CVE-2015-5400: Improper Protection of Alternate Path (bsc#938715)

- CVE-2014-6270: fix off-by-one in snmp subsystem (bsc#895773)

- Memory leak in squid3 when using external_acl (bsc#976708)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-16"/>
	<updated date="2016-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/895773">SUSE bug 895773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902197">SUSE bug 902197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938715">SUSE bug 938715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963539">SUSE bug 963539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967011">SUSE bug 967011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968392">SUSE bug 968392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968393">SUSE bug 968393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968394">SUSE bug 968394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968395">SUSE bug 968395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973782">SUSE bug 973782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973783">SUSE bug 973783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976553">SUSE bug 976553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976556">SUSE bug 976556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976708">SUSE bug 976708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979008">SUSE bug 979008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979009">SUSE bug 979009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979010">SUSE bug 979010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979011">SUSE bug 979011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993299">SUSE bug 993299</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3205/">CVE-2011-3205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3205">CVE-2011-3205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4096/">CVE-2011-4096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4096">CVE-2011-4096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5643/">CVE-2012-5643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5643">CVE-2012-5643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0188/">CVE-2013-0188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0188">CVE-2013-0188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4115/">CVE-2013-4115 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4115">CVE-2013-4115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0128/">CVE-2014-0128 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0128">CVE-2014-0128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6270/">CVE-2014-6270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6270">CVE-2014-6270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7141/">CVE-2014-7141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7141">CVE-2014-7141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7142/">CVE-2014-7142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7142">CVE-2014-7142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5400/">CVE-2015-5400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5400">CVE-2015-5400 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2390/">CVE-2016-2390 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2390">CVE-2016-2390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2569/">CVE-2016-2569 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2569">CVE-2016-2569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2570/">CVE-2016-2570 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2570">CVE-2016-2570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2571/">CVE-2016-2571 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2571">CVE-2016-2571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2572/">CVE-2016-2572 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2572">CVE-2016-2572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3947/">CVE-2016-3947 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3947">CVE-2016-3947 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3948/">CVE-2016-3948 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3948">CVE-2016-3948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4051/">CVE-2016-4051 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4051">CVE-2016-4051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4052/">CVE-2016-4052 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4052">CVE-2016-4052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4053/">CVE-2016-4053 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4053">CVE-2016-4053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4054/">CVE-2016-4054 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4054">CVE-2016-4054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4553/">CVE-2016-4553 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4553">CVE-2016-4553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4554/">CVE-2016-4554 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4554">CVE-2016-4554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4555/">CVE-2016-4555 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4555">CVE-2016-4555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4556/">CVE-2016-4556 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4556">CVE-2016-4556 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575192" comment="squid3-3.1.23-8.16.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219465" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1016168" ref_url="https://bugzilla.suse.com/1016168" source="BUGZILLA"/>
		<reference ref_id="949942" ref_url="https://bugzilla.suse.com/949942" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9749" ref_url="https://www.suse.com/security/cve/CVE-2014-9749/" source="CVE"/>
		<reference ref_id="CVE-2016-10002" ref_url="https://www.suse.com/security/cve/CVE-2016-10002/" source="CVE"/>
		<description>

This update for squid3 fixes the following issues:

- CVE-2016-10002: Fixed incorrect processing of responses to If-None-Modified HTTP conditional requests. This allowed responses containing private data to clients it should not have reached (bsc#1016168)
- CVE-2014-9749: Prevent nonce replay in Digest authentication, preventing the reuse of stale auth tokens (bsc#949942)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1016168">SUSE bug 1016168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949942">SUSE bug 949942</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9749/">CVE-2014-9749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9749">CVE-2014-9749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10002/">CVE-2016-10002 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10002">CVE-2016-10002 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575193" comment="squid3-3.1.23-8.16.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219466" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1077003" ref_url="https://bugzilla.suse.com/1077003" source="BUGZILLA"/>
		<reference ref_id="1077006" ref_url="https://bugzilla.suse.com/1077006" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000024" ref_url="https://www.suse.com/security/cve/CVE-2018-1000024/" source="CVE"/>
		<reference ref_id="CVE-2018-1000027" ref_url="https://www.suse.com/security/cve/CVE-2018-1000027/" source="CVE"/>
		<description>
This update for squid3 fixes the following issues:

Security issues fixed:

- CVE-2018-1000024: DoS fix caused by incorrect pointer handling when processing ESI
  responses. This affects the default custom esi_parser (bsc#1077003).
- CVE-2018-1000027: DoS fix caused by incorrect pointer handing whien processing ESI
  responses or downloading intermediate CA certificates (bsc#1077006).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-21"/>
	<updated date="2018-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077003">SUSE bug 1077003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077006">SUSE bug 1077006</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000024/">CVE-2018-1000024 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000024">CVE-2018-1000024 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000027/">CVE-2018-1000027 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000027">CVE-2018-1000027 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575194" comment="squid3-3.1.23-8.16.37.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219467" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1090089" ref_url="https://bugzilla.suse.com/1090089" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1172" ref_url="https://www.suse.com/security/cve/CVE-2018-1172/" source="CVE"/>
		<description>
This update for squid3 fixes the following issues:

- CVE-2018-1172: Fixed a DoS caused by incorrect handling of ESI responses. (bsc#1090089, SQUID-2018:3)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090089">SUSE bug 1090089</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1172/">CVE-2018-1172 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1172">CVE-2018-1172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575195" comment="squid3-3.1.23-8.16.37.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219468" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1113668" ref_url="https://bugzilla.suse.com/1113668" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19131" ref_url="https://www.suse.com/security/cve/CVE-2018-19131/" source="CVE"/>
		<description>
This update for squid3 fixes the following issues:

Security issue fixed:

- CVE-2018-19131: Fixed Cross-Site-Scripting vulnerability in the TLS error handling (bsc#1113668).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-16"/>
	<updated date="2018-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1113668">SUSE bug 1113668</bugzilla>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19131/">CVE-2018-19131 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19131">CVE-2018-19131 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575196" comment="squid3-3.1.23-8.16.37.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219469" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1140738" ref_url="https://bugzilla.suse.com/1140738" source="BUGZILLA"/>
		<reference ref_id="1141329" ref_url="https://bugzilla.suse.com/1141329" source="BUGZILLA"/>
		<reference ref_id="1141332" ref_url="https://bugzilla.suse.com/1141332" source="BUGZILLA"/>
		<reference ref_id="1156323" ref_url="https://bugzilla.suse.com/1156323" source="BUGZILLA"/>
		<reference ref_id="1156324" ref_url="https://bugzilla.suse.com/1156324" source="BUGZILLA"/>
		<reference ref_id="1156326" ref_url="https://bugzilla.suse.com/1156326" source="BUGZILLA"/>
		<reference ref_id="1156328" ref_url="https://bugzilla.suse.com/1156328" source="BUGZILLA"/>
		<reference ref_id="1156329" ref_url="https://bugzilla.suse.com/1156329" source="BUGZILLA"/>
		<reference ref_id="1162687" ref_url="https://bugzilla.suse.com/1162687" source="BUGZILLA"/>
		<reference ref_id="1162689" ref_url="https://bugzilla.suse.com/1162689" source="BUGZILLA"/>
		<reference ref_id="1162691" ref_url="https://bugzilla.suse.com/1162691" source="BUGZILLA"/>
		<reference ref_id="1167373" ref_url="https://bugzilla.suse.com/1167373" source="BUGZILLA"/>
		<reference ref_id="1169659" ref_url="https://bugzilla.suse.com/1169659" source="BUGZILLA"/>
		<reference ref_id="1170313" ref_url="https://bugzilla.suse.com/1170313" source="BUGZILLA"/>
		<reference ref_id="1170423" ref_url="https://bugzilla.suse.com/1170423" source="BUGZILLA"/>
		<reference ref_id="1173304" ref_url="https://bugzilla.suse.com/1173304" source="BUGZILLA"/>
		<reference ref_id="1173455" ref_url="https://bugzilla.suse.com/1173455" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12519" ref_url="https://www.suse.com/security/cve/CVE-2019-12519/" source="CVE"/>
		<reference ref_id="CVE-2019-12520" ref_url="https://www.suse.com/security/cve/CVE-2019-12520/" source="CVE"/>
		<reference ref_id="CVE-2019-12521" ref_url="https://www.suse.com/security/cve/CVE-2019-12521/" source="CVE"/>
		<reference ref_id="CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523/" source="CVE"/>
		<reference ref_id="CVE-2019-12524" ref_url="https://www.suse.com/security/cve/CVE-2019-12524/" source="CVE"/>
		<reference ref_id="CVE-2019-12525" ref_url="https://www.suse.com/security/cve/CVE-2019-12525/" source="CVE"/>
		<reference ref_id="CVE-2019-12526" ref_url="https://www.suse.com/security/cve/CVE-2019-12526/" source="CVE"/>
		<reference ref_id="CVE-2019-12528" ref_url="https://www.suse.com/security/cve/CVE-2019-12528/" source="CVE"/>
		<reference ref_id="CVE-2019-12529" ref_url="https://www.suse.com/security/cve/CVE-2019-12529/" source="CVE"/>
		<reference ref_id="CVE-2019-13345" ref_url="https://www.suse.com/security/cve/CVE-2019-13345/" source="CVE"/>
		<reference ref_id="CVE-2019-18676" ref_url="https://www.suse.com/security/cve/CVE-2019-18676/" source="CVE"/>
		<reference ref_id="CVE-2019-18677" ref_url="https://www.suse.com/security/cve/CVE-2019-18677/" source="CVE"/>
		<reference ref_id="CVE-2019-18678" ref_url="https://www.suse.com/security/cve/CVE-2019-18678/" source="CVE"/>
		<reference ref_id="CVE-2019-18679" ref_url="https://www.suse.com/security/cve/CVE-2019-18679/" source="CVE"/>
		<reference ref_id="CVE-2019-18860" ref_url="https://www.suse.com/security/cve/CVE-2019-18860/" source="CVE"/>
		<reference ref_id="CVE-2020-11945" ref_url="https://www.suse.com/security/cve/CVE-2020-11945/" source="CVE"/>
		<reference ref_id="CVE-2020-14059" ref_url="https://www.suse.com/security/cve/CVE-2020-14059/" source="CVE"/>
		<reference ref_id="CVE-2020-15049" ref_url="https://www.suse.com/security/cve/CVE-2020-15049/" source="CVE"/>
		<reference ref_id="CVE-2020-8449" ref_url="https://www.suse.com/security/cve/CVE-2020-8449/" source="CVE"/>
		<reference ref_id="CVE-2020-8450" ref_url="https://www.suse.com/security/cve/CVE-2020-8450/" source="CVE"/>
		<reference ref_id="CVE-2020-8517" ref_url="https://www.suse.com/security/cve/CVE-2020-8517/" source="CVE"/>
		<description>
This update for squid3 fixes the following issues:

- Fixed a Cache Poisoning and Request Smuggling
  attack (CVE-2020-15049, bsc#1173455)
- Fixed incorrect buffer handling that can
  result in cache poisoning, remote execution, and
  denial of service attacks when processing ESI responses
  (CVE-2019-12519, CVE-2019-12521, bsc#1169659)

- Fixed handling of hostname in
  cachemgr.cgi (CVE-2019-18860, bsc#1167373)
- Fixed a potential remote execution vulnerability
  when using HTTP Digest Authentication (CVE-2020-11945, bsc#1170313)
- Fixed a potential ACL bypass, cache-bypass
  and cross-site scripting attack when processing invalid HTTP
  Request messages (CVE-2019-12520, CVE-2019-12524, bsc#1170423)
- Fixed a potential denial of service when
  processing TLS certificates during HTTPS connections
  (CVE-2020-14059, bsc#1173304)

- Fixed a potential denial of service associated
  with incorrect buffer management of HTTP Basic Authentication
  credentials (bsc#1141329, CVE-2019-12529)
- Fixed an incorrect buffer management resulting
  in vulnerability to a denial of service during processing of
  HTTP Digest Authentication credentials (bsc#1141332, CVE-2019-12525)
- Fix XSS via user_name or auth parameter
  in cachemgr.cgi (bsc#1140738, CVE-2019-13345)
- Fixed a potential code execution vulnerability
  (CVE-2019-12526, bsc#1156326)
- Fixed HTTP Request Splitting in HTTP
  message processing and information disclosure in
  HTTP Digest Authentication
  (CVE-2019-18678, CVE-2019-18679, bsc#1156323, bsc#1156324)
- Fixed a security issue allowing a remote
  client ability to cause use a buffer overflow when squid is
  acting as reverse-proxy.
  (CVE-2020-8449, CVE-2020-8450, bsc#1162687)
- Fixed a security issue allowing for information
  disclosure in FTP gateway (CVE-2019-12528, bsc#1162689)
- Fixed a security issue in ext_lm_group_acl
  when processing NTLM Authentication credentials.
  (CVE-2020-8517, bsc#1162691)

- Fixed Cross-Site Request Forgery in
  HTTP Request processing (CVE-2019-18677, bsc#1156328)

- Disable urn parsing and parsing of
  unknown schemes (bsc#1156329, CVE-2019-12523, CVE-2019-18676)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-24"/>
	<updated date="2020-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140738">SUSE bug 1140738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141329">SUSE bug 1141329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141332">SUSE bug 1141332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156323">SUSE bug 1156323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156324">SUSE bug 1156324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156326">SUSE bug 1156326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156328">SUSE bug 1156328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156329">SUSE bug 1156329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162687">SUSE bug 1162687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162689">SUSE bug 1162689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162691">SUSE bug 1162691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167373">SUSE bug 1167373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169659">SUSE bug 1169659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170313">SUSE bug 1170313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170423">SUSE bug 1170423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173304">SUSE bug 1173304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173455">SUSE bug 1173455</bugzilla>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-12519/">CVE-2019-12519 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12519">CVE-2019-12519 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12520/">CVE-2019-12520 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12520">CVE-2019-12520 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12521/">CVE-2019-12521 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12521">CVE-2019-12521 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12523">CVE-2019-12523 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12524/">CVE-2019-12524 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12524">CVE-2019-12524 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12525/">CVE-2019-12525 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12525">CVE-2019-12525 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12526/">CVE-2019-12526 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12526">CVE-2019-12526 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12528/">CVE-2019-12528 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12528">CVE-2019-12528 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12529/">CVE-2019-12529 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12529">CVE-2019-12529 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13345/">CVE-2019-13345 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13345">CVE-2019-13345 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18676/">CVE-2019-18676 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18676">CVE-2019-18676 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18677/">CVE-2019-18677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18677">CVE-2019-18677 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18678/">CVE-2019-18678 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18678">CVE-2019-18678 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18679/">CVE-2019-18679 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18679">CVE-2019-18679 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18860/">CVE-2019-18860 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18860">CVE-2019-18860 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11945/">CVE-2020-11945 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11945">CVE-2020-11945 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14059/">CVE-2020-14059 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14059">CVE-2020-14059 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15049/">CVE-2020-15049 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15049">CVE-2020-15049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8449/">CVE-2020-8449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8449">CVE-2020-8449 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8450/">CVE-2020-8450 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8450">CVE-2020-8450 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8517/">CVE-2020-8517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8517">CVE-2020-8517 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575197" comment="squid3-3.1.23-8.16.37.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219470" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1175664" ref_url="https://bugzilla.suse.com/1175664" source="BUGZILLA"/>
		<reference ref_id="1175665" ref_url="https://bugzilla.suse.com/1175665" source="BUGZILLA"/>
		<reference ref_id="1175671" ref_url="https://bugzilla.suse.com/1175671" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810/" source="CVE"/>
		<reference ref_id="CVE-2020-15811" ref_url="https://www.suse.com/security/cve/CVE-2020-15811/" source="CVE"/>
		<reference ref_id="CVE-2020-24606" ref_url="https://www.suse.com/security/cve/CVE-2020-24606/" source="CVE"/>
		<description>
This update for squid3 fixes the following issues:

- CVE-2020-15811: Fixed an HTTP request splitting vulnerability (bsc#1175665).
- CVE-2020-24606: Fixed a DoS vulnerability when processing Cache Digest Responses (bsc#1175671).
- CVE-2020-15810: Fixed an HTTP request smuggling vulnerability (bsc#1175664).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-30"/>
	<updated date="2020-12-30"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1175664">SUSE bug 1175664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175665">SUSE bug 1175665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175671">SUSE bug 1175671</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15810">CVE-2020-15810 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15811/">CVE-2020-15811 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15811">CVE-2020-15811 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24606/">CVE-2020-24606 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24606">CVE-2020-24606 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575198" comment="squid3-3.1.23-8.16.37.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219471" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1183436" ref_url="https://bugzilla.suse.com/1183436" source="BUGZILLA"/>
		<reference ref_id="1185921" ref_url="https://bugzilla.suse.com/1185921" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25097" ref_url="https://www.suse.com/security/cve/CVE-2020-25097/" source="CVE"/>
		<reference ref_id="CVE-2021-28651" ref_url="https://www.suse.com/security/cve/CVE-2021-28651/" source="CVE"/>
		<description>
This update for squid3 fixes the following issues:

- CVE-2021-28651: Fixed a denial of service issue when processing URN
  resource identifiers (bsc#1185921).
- CVE-2020-25097: Fixed an HTTP request smuggling issue (bsc#1183436).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183436">SUSE bug 1183436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185921">SUSE bug 1185921</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25097/">CVE-2020-25097 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25097">CVE-2020-25097 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28651/">CVE-2021-28651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28651">CVE-2021-28651 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671855" comment="squid3-3.1.23-8.16.37.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219472" version="1" class="patch">
	<metadata>
		<title>Security update for squidGuard (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="985612" ref_url="https://bugzilla.suse.com/985612" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8936" ref_url="https://www.suse.com/security/cve/CVE-2015-8936/" source="CVE"/>
		<description>
squidGuard was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-8936: Reflected cross site scripting vulnerability because of insufficient escaping (bsc#985612).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-12"/>
	<updated date="2016-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/985612">SUSE bug 985612</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8936/">CVE-2015-8936 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8936">CVE-2015-8936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575199" comment="squidGuard-1.4-13.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575200" comment="squidGuard-doc-1.4-13.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219473" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="815236" ref_url="https://bugzilla.suse.com/815236" source="BUGZILLA"/>
		<reference ref_id="833278" ref_url="https://bugzilla.suse.com/833278" source="BUGZILLA"/>
		<reference ref_id="840826" ref_url="https://bugzilla.suse.com/840826" source="BUGZILLA"/>
		<reference ref_id="847506" ref_url="https://bugzilla.suse.com/847506" source="BUGZILLA"/>
		<reference ref_id="870572" ref_url="https://bugzilla.suse.com/870572" source="BUGZILLA"/>
		<reference ref_id="876449" ref_url="https://bugzilla.suse.com/876449" source="BUGZILLA"/>
		<reference ref_id="933591" ref_url="https://bugzilla.suse.com/933591" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2944" ref_url="https://www.suse.com/security/cve/CVE-2013-2944/" source="CVE"/>
		<reference ref_id="CVE-2013-5018" ref_url="https://www.suse.com/security/cve/CVE-2013-5018/" source="CVE"/>
		<reference ref_id="CVE-2014-2338" ref_url="https://www.suse.com/security/cve/CVE-2014-2338/" source="CVE"/>
		<reference ref_id="CVE-2014-2891" ref_url="https://www.suse.com/security/cve/CVE-2014-2891/" source="CVE"/>
		<reference ref_id="CVE-2015-4171" ref_url="https://www.suse.com/security/cve/CVE-2015-4171/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001492.html" source="SUSE-SU"/>
		<description>

This update fixes a NULL ptr dereference (DoS) via ID_DER_ASN1_DN ID 
payloads.

Security Issue reference:

    * CVE-2014-2891
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2891&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-14"/>
	<updated date="2014-05-14"/>
	<bugzilla href="https://bugzilla.suse.com/815236">SUSE bug 815236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833278">SUSE bug 833278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840826">SUSE bug 840826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847506">SUSE bug 847506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870572">SUSE bug 870572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876449">SUSE bug 876449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933591">SUSE bug 933591</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2944/">CVE-2013-2944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2944">CVE-2013-2944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5018/">CVE-2013-5018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5018">CVE-2013-5018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2338/">CVE-2014-2338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2338">CVE-2014-2338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2891/">CVE-2014-2891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2891">CVE-2014-2891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4171/">CVE-2015-4171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4171">CVE-2015-4171 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581488" comment="strongswan-4.4.0-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581489" comment="strongswan-doc-4.4.0-6.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581488" comment="strongswan-4.4.0-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581489" comment="strongswan-doc-4.4.0-6.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581488" comment="strongswan-4.4.0-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581489" comment="strongswan-doc-4.4.0-6.25.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219474" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="953817" ref_url="https://bugzilla.suse.com/953817" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8023" ref_url="https://www.suse.com/security/cve/CVE-2015-8023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001715.html" source="SUSE-SU"/>
		<description>
The strongswan package was updated to fix the following security issue:

- CVE-2015-8023: Fixed an authentication bypass vulnerability in the eap-mschapv2 plugin (bsc#953817).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-03"/>
	<updated date="2015-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/953817">SUSE bug 953817</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8023/">CVE-2015-8023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8023">CVE-2015-8023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581490" comment="strongswan-4.4.0-6.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581491" comment="strongswan-doc-4.4.0-6.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581490" comment="strongswan-4.4.0-6.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581491" comment="strongswan-doc-4.4.0-6.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581490" comment="strongswan-4.4.0-6.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581491" comment="strongswan-doc-4.4.0-6.32.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219475" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1039514" ref_url="https://bugzilla.suse.com/1039514" source="BUGZILLA"/>
		<reference ref_id="1039515" ref_url="https://bugzilla.suse.com/1039515" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9022" ref_url="https://www.suse.com/security/cve/CVE-2017-9022/" source="CVE"/>
		<reference ref_id="CVE-2017-9023" ref_url="https://www.suse.com/security/cve/CVE-2017-9023/" source="CVE"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2017-9022: Insufficient Input Validation in gmp Plugin leads to Denial of service (bsc#1039514)
- CVE-2017-9023: Incorrect x509 ASN.1 parser error handling could lead to Denial of service  (bsc#1039515)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-01"/>
	<updated date="2017-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1039514">SUSE bug 1039514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039515">SUSE bug 1039515</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9022/">CVE-2017-9022 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9022">CVE-2017-9022 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9023/">CVE-2017-9023 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9023">CVE-2017-9023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575205" comment="strongswan-4.4.0-6.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575206" comment="strongswan-doc-4.4.0-6.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219476" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1051222" ref_url="https://bugzilla.suse.com/1051222" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11185" ref_url="https://www.suse.com/security/cve/CVE-2017-11185/" source="CVE"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2017-11185: Specific RSA signatures passed to the gmp plugin for verification can
cause a null-pointer dereference and it may lead to a denial of service (bsc#1051222) 

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-29"/>
	<updated date="2017-08-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1051222">SUSE bug 1051222</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11185/">CVE-2017-11185 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11185">CVE-2017-11185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575207" comment="strongswan-4.4.0-6.36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575208" comment="strongswan-doc-4.4.0-6.36.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219477" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1094462" ref_url="https://bugzilla.suse.com/1094462" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5388" ref_url="https://www.suse.com/security/cve/CVE-2018-5388/" source="CVE"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2018-5388: Fixed a buffer underflow which may allow to a remote attacker 
  with local user credentials to resource exhaustion and denial of service while 
  reading from the socket (bsc#1094462).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-30"/>
	<updated date="2019-12-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094462">SUSE bug 1094462</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5388/">CVE-2018-5388 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5388">CVE-2018-5388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575209" comment="strongswan-4.4.0-6.36.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575210" comment="strongswan-doc-4.4.0-6.36.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219478" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1191435" ref_url="https://bugzilla.suse.com/1191435" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41991" ref_url="https://www.suse.com/security/cve/CVE-2021-41991/" source="CVE"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-19"/>
	<updated date="2021-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191435">SUSE bug 1191435</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41991/">CVE-2021-41991 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41991">CVE-2021-41991 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652840" comment="strongswan-4.4.0-6.36.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652841" comment="strongswan-doc-4.4.0-6.36.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219479" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1107874" ref_url="https://bugzilla.suse.com/1107874" source="BUGZILLA"/>
		<reference ref_id="1109845" ref_url="https://bugzilla.suse.com/1109845" source="BUGZILLA"/>
		<reference ref_id="1194471" ref_url="https://bugzilla.suse.com/1194471" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16151" ref_url="https://www.suse.com/security/cve/CVE-2018-16151/" source="CVE"/>
		<reference ref_id="CVE-2018-16152" ref_url="https://www.suse.com/security/cve/CVE-2018-16152/" source="CVE"/>
		<reference ref_id="CVE-2018-17540" ref_url="https://www.suse.com/security/cve/CVE-2018-17540/" source="CVE"/>
		<reference ref_id="CVE-2021-45079" ref_url="https://www.suse.com/security/cve/CVE-2021-45079/" source="CVE"/>
		<description>
This update for strongswan fixes the following issues:
	  
- CVE-2018-16151: Fixed flaws in gmp plugin that could lead to authorization bypass. (bsc#1107874)
- CVE-2018-16152: Fixed flaws in gmp plugin that could lead to authorization bypass. (bsc#1107874)
- CVE-2018-17540: Fixed insufficient input validation in gmp plugin. (bsc#1109845)
- CVE-2021-45079: Fixed authentication bypass in EAP authentication. (bsc#1194471)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109845">SUSE bug 1109845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194471">SUSE bug 1194471</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16151/">CVE-2018-16151 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16151">CVE-2018-16151 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16152/">CVE-2018-16152 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16152">CVE-2018-16152 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17540/">CVE-2018-17540 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17540">CVE-2018-17540 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45079/">CVE-2021-45079 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45079">CVE-2021-45079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664947" comment="strongswan-4.4.0-6.36.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664948" comment="strongswan-doc-4.4.0-6.36.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219480" version="1" class="patch">
	<metadata>
		<title>Security update for sudo</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="823292" ref_url="https://bugzilla.suse.com/823292" source="BUGZILLA"/>
		<reference ref_id="823796" ref_url="https://bugzilla.suse.com/823796" source="BUGZILLA"/>
		<reference ref_id="863025" ref_url="https://bugzilla.suse.com/863025" source="BUGZILLA"/>
		<reference ref_id="866503" ref_url="https://bugzilla.suse.com/866503" source="BUGZILLA"/>
		<reference ref_id="868444" ref_url="https://bugzilla.suse.com/868444" source="BUGZILLA"/>
		<reference ref_id="880764" ref_url="https://bugzilla.suse.com/880764" source="BUGZILLA"/>
		<reference ref_id="901145" ref_url="https://bugzilla.suse.com/901145" source="BUGZILLA"/>
		<reference ref_id="904694" ref_url="https://bugzilla.suse.com/904694" source="BUGZILLA"/>
		<reference ref_id="917806" ref_url="https://bugzilla.suse.com/917806" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0106" ref_url="https://www.suse.com/security/cve/CVE-2014-0106/" source="CVE"/>
		<reference ref_id="CVE-2014-9680" ref_url="https://www.suse.com/security/cve/CVE-2014-9680/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001420.html" source="SUSE-SU"/>
		<description>

This collective update for sudo provides fixes for the following issues:

    * Security policy bypass when env_reset is disabled. (CVE-2014-0106,
      bnc#866503)
    * Regression in the previous update that causes a segmentation fault
      when running 'sudo -s'. (bnc#868444)
    * Command 'who -m' prints no output when using log_input/log_output
      sudo options. (bnc#863025)

Security Issues references:

    * CVE-2014-0106
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0106&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-20"/>
	<updated date="2014-03-20"/>
	<bugzilla href="https://bugzilla.suse.com/823292">SUSE bug 823292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823796">SUSE bug 823796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863025">SUSE bug 863025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866503">SUSE bug 866503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868444">SUSE bug 868444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880764">SUSE bug 880764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901145">SUSE bug 901145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904694">SUSE bug 904694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917806">SUSE bug 917806</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0106/">CVE-2014-0106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0106">CVE-2014-0106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9680/">CVE-2014-9680 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9680">CVE-2014-9680 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581492" comment="sudo-1.7.6p2-0.21.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581492" comment="sudo-1.7.6p2-0.21.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581492" comment="sudo-1.7.6p2-0.21.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219481" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1007501" ref_url="https://bugzilla.suse.com/1007501" source="BUGZILLA"/>
		<reference ref_id="1007766" ref_url="https://bugzilla.suse.com/1007766" source="BUGZILLA"/>
		<reference ref_id="1008043" ref_url="https://bugzilla.suse.com/1008043" source="BUGZILLA"/>
		<reference ref_id="948973" ref_url="https://bugzilla.suse.com/948973" source="BUGZILLA"/>
		<reference ref_id="966755" ref_url="https://bugzilla.suse.com/966755" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7032" ref_url="https://www.suse.com/security/cve/CVE-2016-7032/" source="CVE"/>
		<reference ref_id="CVE-2016-7076" ref_url="https://www.suse.com/security/cve/CVE-2016-7076/" source="CVE"/>
		<description>

This update for sudo fixes the following issues:

- Fix two security vulnerabilities that allowed users to bypass
  sudo's NOEXEC functionality:
  * noexec bypass via system() and popen() [CVE-2016-7032, bsc#1007766]
  * noexec bypass via wordexp() [CVE-2016-7076, bsc#1007501]

- The SSSD plugin would occasionally crash sudo with an 'internal error'.
  This issue has been fixed. [bsc#948973]

- The SSSD plugin would occasionally apply @netgroups rules from LDAP to all
  users rather than the @netgroup. This issue is now fixed. [bsc#966755]

- When the SSSD plugin was used and a local user ran sudo, an e-mail used to be
  sent to administrator because SSSD did not support sudo rules for local
  users. This message did not signify an error, however, it was only noise.
  [bsc#1008043]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-23"/>
	<updated date="2016-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007501">SUSE bug 1007501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007766">SUSE bug 1007766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008043">SUSE bug 1008043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948973">SUSE bug 948973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966755">SUSE bug 966755</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7032/">CVE-2016-7032 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7032">CVE-2016-7032 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7076/">CVE-2016-7076 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7076">CVE-2016-7076 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581493" comment="sudo-1.7.6p2-0.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219482" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1153674" ref_url="https://bugzilla.suse.com/1153674" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287/" source="CVE"/>
		<description>
This update for sudo fixes the following issues:

- CVE-2019-14287: Fixed an issue where a user with sudo privileges that allowed them to run commands with an arbitrary uid, could run commands as root, despite being forbidden to do so in sudoers (bsc#1153674).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-18"/>
	<updated date="2019-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153674">SUSE bug 1153674</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14287">CVE-2019-14287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581494" comment="sudo-1.7.6p2-0.30.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219483" version="1" class="patch">
	<metadata>
		<title>Security update for supportutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="980670" ref_url="https://bugzilla.suse.com/980670" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1602" ref_url="https://www.suse.com/security/cve/CVE-2016-1602/" source="CVE"/>
		<description>
supportutils was updated to fix one security issue.

This security issue was fixed:
- CVE-2016-1602: Code injection and privilege escalation via unescaped filenames (bsc#980670).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-07"/>
	<updated date="2016-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/980670">SUSE bug 980670</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1602/">CVE-2016-1602 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1602">CVE-2016-1602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581495" comment="supportutils-1.20-121.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219484" version="1" class="patch">
	<metadata>
		<title>Security update for supportutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1117751" ref_url="https://bugzilla.suse.com/1117751" source="BUGZILLA"/>
		<reference ref_id="1118460" ref_url="https://bugzilla.suse.com/1118460" source="BUGZILLA"/>
		<reference ref_id="1118462" ref_url="https://bugzilla.suse.com/1118462" source="BUGZILLA"/>
		<reference ref_id="1118463" ref_url="https://bugzilla.suse.com/1118463" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19636" ref_url="https://www.suse.com/security/cve/CVE-2018-19636/" source="CVE"/>
		<reference ref_id="CVE-2018-19638" ref_url="https://www.suse.com/security/cve/CVE-2018-19638/" source="CVE"/>
		<reference ref_id="CVE-2018-19639" ref_url="https://www.suse.com/security/cve/CVE-2018-19639/" source="CVE"/>
		<reference ref_id="CVE-2018-19640" ref_url="https://www.suse.com/security/cve/CVE-2018-19640/" source="CVE"/>
		<description>
This update for supportutils fixes the following issues:

Security vulnerabilities fixed:

- CVE-2018-19636: Local root exploit via inclusion of attacker controlled shell script (bsc#1117751)
- CVE-2018-19640: Users can kill arbitrary processes (bsc#1118463)
- CVE-2018-19638: User can overwrite arbitrary log files in support tar (bsc#1118460)
- CVE-2018-19639: Code execution if run with -v (bsc#1118462)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-12"/>
	<updated date="2019-03-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117751">SUSE bug 1117751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118460">SUSE bug 1118460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118462">SUSE bug 1118462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118463">SUSE bug 1118463</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19636/">CVE-2018-19636 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19636">CVE-2018-19636 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19638/">CVE-2018-19638 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19638">CVE-2018-19638 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19639/">CVE-2018-19639 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19639">CVE-2018-19639 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19640/">CVE-2018-19640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19640">CVE-2018-19640 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569231" comment="supportutils-1.20-122.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219485" version="1" class="patch">
	<metadata>
		<title>Security update for supportutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1203818" ref_url="https://bugzilla.suse.com/1203818" source="BUGZILLA"/>
		<description>
This update for supportutils fixes the following issue:

Security issues fixed:

- Passwords correctly removed from email.txt, updates.txt and fs-iscsi.txt (bsc#1203818)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-29"/>
	<updated date="2022-11-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203818">SUSE bug 1203818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994200" comment="supportutils-1.21-122.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219486" version="1" class="patch">
	<metadata>
		<title>Recommended update for suseRegister</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="821853" ref_url="https://bugzilla.suse.com/821853" source="BUGZILLA"/>
		<reference ref_id="834801" ref_url="https://bugzilla.suse.com/834801" source="BUGZILLA"/>
		<reference ref_id="901757" ref_url="https://bugzilla.suse.com/901757" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<description>

This update for suseRegister adds a new command line parameter to 
clientSetup4SMT.sh, allowing the user to accept a CA certificate in a 
non-interactive way by providing the fingerprint. (bnc#821853)

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-20"/>
	<updated date="2013-08-20"/>
	<bugzilla href="https://bugzilla.suse.com/821853">SUSE bug 821853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834801">SUSE bug 834801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901757">SUSE bug 901757</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994201" comment="suseRegister-1.4-1.33.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994201" comment="suseRegister-1.4-1.33.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994201" comment="suseRegister-1.4-1.33.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219487" version="1" class="patch">
	<metadata>
		<title>Security update for syslog-ng (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1169385" ref_url="https://bugzilla.suse.com/1169385" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8019" ref_url="https://www.suse.com/security/cve/CVE-2020-8019/" source="CVE"/>
		<description>
This update for syslog-ng fixes the following issues:

- CVE-2020-8019: Fixed a local privilege escalation during package update (bsc#1169385).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-14"/>
	<updated date="2020-05-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169385">SUSE bug 1169385</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8019/">CVE-2020-8019 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8019">CVE-2020-8019 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575214" comment="syslog-ng-2.0.9-27.34.40.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219488" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1007188" ref_url="https://bugzilla.suse.com/1007188" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6321" ref_url="https://www.suse.com/security/cve/CVE-2016-6321/" source="CVE"/>
		<description>

This update for tar fixes the following issues:

- Fix the POINTYFEATHER vulnerability - GNU tar archiver can be tricked
  into extracting files and directories in the given destination, regardless
  of the path name(s) specified on the command line [bsc#1007188]
  [CVE-2016-6321]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-24"/>
	<updated date="2016-11-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007188">SUSE bug 1007188</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6321/">CVE-2016-6321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6321">CVE-2016-6321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575221" comment="tar-1.26-1.2.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219489" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1120610" ref_url="https://bugzilla.suse.com/1120610" source="BUGZILLA"/>
		<reference ref_id="1130496" ref_url="https://bugzilla.suse.com/1130496" source="BUGZILLA"/>
		<reference ref_id="1152736" ref_url="https://bugzilla.suse.com/1152736" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20482" ref_url="https://www.suse.com/security/cve/CVE-2018-20482/" source="CVE"/>
		<reference ref_id="CVE-2019-9923" ref_url="https://www.suse.com/security/cve/CVE-2019-9923/" source="CVE"/>
		<description>
This update for tar to version 1.27.1 fixes the following issues:

tar 1.27.1 brings following changes (jsc#ECO-339)

* Sparse files with large data
* No backticks in quoting
* --owner and --group names and numbers
* Support for POSIX ACLs, extended attributes and SELinux context.
* Passing command line arguments to external commands.
* New configure option --enable-gcc-warnings, intended for debugging.
* New warning control option --warning=[no-]record-size
* New command line option --keep-directory-symlink
* Fix unquoting of file names obtained via the -T option.
* Fix GNU long link header timestamp (backward compatibility).

Security issues fixed:

- CVE-2019-9923: Fixed a denial of service while parsing certain archives with malformed extended headers in pax_decode_header() (bsc#1130496).
- CVE-2018-20482: Fixed a denial of service when the '--sparse' option mishandles file shrinkage during read access (bsc#1120610).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-11"/>
	<updated date="2019-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120610">SUSE bug 1120610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130496">SUSE bug 1130496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152736">SUSE bug 1152736</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20482/">CVE-2018-20482 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20482">CVE-2018-20482 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9923/">CVE-2019-9923 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9923">CVE-2019-9923 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575222" comment="tar-1.27.1-14.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219490" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181131" ref_url="https://bugzilla.suse.com/1181131" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20193" ref_url="https://www.suse.com/security/cve/CVE-2021-20193/" source="CVE"/>
		<description>
This update for tar fixes the following issues:

CVE-2021-20193: Memory leak in read_header() in list.c (bsc#1181131)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-29"/>
	<updated date="2021-03-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1181131">SUSE bug 1181131</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20193/">CVE-2021-20193 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20193">CVE-2021-20193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575223" comment="tar-1.27.1-14.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219491" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1207753" ref_url="https://bugzilla.suse.com/1207753" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48303" ref_url="https://www.suse.com/security/cve/CVE-2022-48303/" source="CVE"/>
		<description>
This update for tar fixes the following issues:

- CVE-2022-48303: Fixed a one-byte out-of-bounds read that resulted in use of uninitialized memory for a conditional jump (bsc#1207753).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-10"/>
	<updated date="2023-03-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1207753">SUSE bug 1207753</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-48303/">CVE-2022-48303 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48303">CVE-2022-48303 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994202" comment="tar-1.27.1-14.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219492" version="1" class="patch">
	<metadata>
		<title>Recommended update for tboot (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1057555" ref_url="https://bugzilla.suse.com/1057555" source="BUGZILLA"/>
		<reference ref_id="889339" ref_url="https://bugzilla.suse.com/889339" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5118" ref_url="https://www.suse.com/security/cve/CVE-2014-5118/" source="CVE"/>
		<description>
This update for tboot provides the following fix:

Security issue fixed:

- CVE-2014-5118: tboot: bypass of measured boot (bsc#889339)

Bug fixes:

- Fixed failed trusted boot on some systems like Intel Xeon 'Purley 8s' processors. The
  following error message showed: 'TBOOT: wait-for-sipi loop timed-out'. Booting continued
  but 'TXT measured launch' was wrongly reported as FALSE. (bsc#1057555)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-29"/>
	<updated date="2017-11-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1057555">SUSE bug 1057555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889339">SUSE bug 889339</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5118/">CVE-2014-5118 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-5118">CVE-2014-5118 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581496" comment="tboot-20120115_1.7.0-0.5.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219493" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="905870" ref_url="https://bugzilla.suse.com/905870" source="BUGZILLA"/>
		<reference ref_id="905872" ref_url="https://bugzilla.suse.com/905872" source="BUGZILLA"/>
		<reference ref_id="912943" ref_url="https://bugzilla.suse.com/912943" source="BUGZILLA"/>
		<reference ref_id="922220" ref_url="https://bugzilla.suse.com/922220" source="BUGZILLA"/>
		<reference ref_id="922222" ref_url="https://bugzilla.suse.com/922222" source="BUGZILLA"/>
		<reference ref_id="923142" ref_url="https://bugzilla.suse.com/923142" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8767" ref_url="https://www.suse.com/security/cve/CVE-2014-8767/" source="CVE"/>
		<reference ref_id="CVE-2014-8769" ref_url="https://www.suse.com/security/cve/CVE-2014-8769/" source="CVE"/>
		<reference ref_id="CVE-2014-9140" ref_url="https://www.suse.com/security/cve/CVE-2014-9140/" source="CVE"/>
		<reference ref_id="CVE-2015-0261" ref_url="https://www.suse.com/security/cve/CVE-2015-0261/" source="CVE"/>
		<reference ref_id="CVE-2015-2154" ref_url="https://www.suse.com/security/cve/CVE-2015-2154/" source="CVE"/>
		<reference ref_id="SUSE-RU-2015:0335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-February/002661.html" source="SUSE-SU"/>
		<description>

When running tcpdump, a remote unauthenticated user could have crashed the 
application or, potentially, execute arbitrary code by injecting crafted 
packages into the network.

The following vulnerabilities in protocol printers have been fixed:

    * IPv6 mobility printer remote DoS (CVE-2015-0261, bnc#922220)
    * Ethernet printer remote DoS (CVE-2015-2154, bnc#922222)
    * PPP printer remote DoS (CVE-2014-9140, bnc#923142)

Security Issues:

    * CVE-2015-0261
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0261&gt;
    * CVE-2015-2154
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2154&gt;
    * CVE-2014-9140
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9140&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-20"/>
	<updated date="2015-03-20"/>
	<bugzilla href="https://bugzilla.suse.com/905870">SUSE bug 905870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905872">SUSE bug 905872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912943">SUSE bug 912943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922220">SUSE bug 922220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922222">SUSE bug 922222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923142">SUSE bug 923142</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8767/">CVE-2014-8767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8767">CVE-2014-8767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8769/">CVE-2014-8769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8769">CVE-2014-8769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9140/">CVE-2014-9140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9140">CVE-2014-9140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0261/">CVE-2015-0261 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0261">CVE-2015-0261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2154/">CVE-2015-2154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2154">CVE-2015-2154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581497" comment="tcpdump-3.9.8-1.27.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581497" comment="tcpdump-3.9.8-1.27.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581497" comment="tcpdump-3.9.8-1.27.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219494" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1020940" ref_url="https://bugzilla.suse.com/1020940" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7922" ref_url="https://www.suse.com/security/cve/CVE-2016-7922/" source="CVE"/>
		<reference ref_id="CVE-2016-7923" ref_url="https://www.suse.com/security/cve/CVE-2016-7923/" source="CVE"/>
		<reference ref_id="CVE-2016-7925" ref_url="https://www.suse.com/security/cve/CVE-2016-7925/" source="CVE"/>
		<reference ref_id="CVE-2016-7926" ref_url="https://www.suse.com/security/cve/CVE-2016-7926/" source="CVE"/>
		<reference ref_id="CVE-2016-7927" ref_url="https://www.suse.com/security/cve/CVE-2016-7927/" source="CVE"/>
		<reference ref_id="CVE-2016-7928" ref_url="https://www.suse.com/security/cve/CVE-2016-7928/" source="CVE"/>
		<reference ref_id="CVE-2016-7931" ref_url="https://www.suse.com/security/cve/CVE-2016-7931/" source="CVE"/>
		<reference ref_id="CVE-2016-7934" ref_url="https://www.suse.com/security/cve/CVE-2016-7934/" source="CVE"/>
		<reference ref_id="CVE-2016-7935" ref_url="https://www.suse.com/security/cve/CVE-2016-7935/" source="CVE"/>
		<reference ref_id="CVE-2016-7936" ref_url="https://www.suse.com/security/cve/CVE-2016-7936/" source="CVE"/>
		<reference ref_id="CVE-2016-7937" ref_url="https://www.suse.com/security/cve/CVE-2016-7937/" source="CVE"/>
		<reference ref_id="CVE-2016-7939" ref_url="https://www.suse.com/security/cve/CVE-2016-7939/" source="CVE"/>
		<reference ref_id="CVE-2016-7940" ref_url="https://www.suse.com/security/cve/CVE-2016-7940/" source="CVE"/>
		<reference ref_id="CVE-2016-7973" ref_url="https://www.suse.com/security/cve/CVE-2016-7973/" source="CVE"/>
		<reference ref_id="CVE-2016-7974" ref_url="https://www.suse.com/security/cve/CVE-2016-7974/" source="CVE"/>
		<reference ref_id="CVE-2016-7975" ref_url="https://www.suse.com/security/cve/CVE-2016-7975/" source="CVE"/>
		<reference ref_id="CVE-2016-7983" ref_url="https://www.suse.com/security/cve/CVE-2016-7983/" source="CVE"/>
		<reference ref_id="CVE-2016-7984" ref_url="https://www.suse.com/security/cve/CVE-2016-7984/" source="CVE"/>
		<reference ref_id="CVE-2016-7992" ref_url="https://www.suse.com/security/cve/CVE-2016-7992/" source="CVE"/>
		<reference ref_id="CVE-2016-7993" ref_url="https://www.suse.com/security/cve/CVE-2016-7993/" source="CVE"/>
		<reference ref_id="CVE-2016-8574" ref_url="https://www.suse.com/security/cve/CVE-2016-8574/" source="CVE"/>
		<reference ref_id="CVE-2017-5202" ref_url="https://www.suse.com/security/cve/CVE-2017-5202/" source="CVE"/>
		<reference ref_id="CVE-2017-5203" ref_url="https://www.suse.com/security/cve/CVE-2017-5203/" source="CVE"/>
		<reference ref_id="CVE-2017-5204" ref_url="https://www.suse.com/security/cve/CVE-2017-5204/" source="CVE"/>
		<reference ref_id="CVE-2017-5483" ref_url="https://www.suse.com/security/cve/CVE-2017-5483/" source="CVE"/>
		<reference ref_id="CVE-2017-5484" ref_url="https://www.suse.com/security/cve/CVE-2017-5484/" source="CVE"/>
		<reference ref_id="CVE-2017-5485" ref_url="https://www.suse.com/security/cve/CVE-2017-5485/" source="CVE"/>
		<reference ref_id="CVE-2017-5486" ref_url="https://www.suse.com/security/cve/CVE-2017-5486/" source="CVE"/>
		<description>

This update for tcpdump fixes the following issues:

Security issues fixed (bsc#1020940):
- CVE-2016-7922: Corrected buffer overflow in AH parser print-ah.c:ah_print().
- CVE-2016-7923: Corrected buffer overflow in ARP parser print-arp.c:arp_print().
- CVE-2016-7925: Corrected buffer overflow in compressed SLIP parser print-sl.c:sl_if_print().
- CVE-2016-7926: Corrected buffer overflow in the Ethernet parser print-ether.c:ethertype_print().
- CVE-2016-7927: Corrected buffer overflow in the IEEE 802.11 parser print-802_11.c:ieee802_11_radio_print().
- CVE-2016-7928: Corrected buffer overflow in the IPComp parser print-ipcomp.c:ipcomp_print().
- CVE-2016-7931: Corrected buffer overflow in the MPLS parser print-mpls.c:mpls_print().
- CVE-2016-7936: Corrected buffer overflow in the UDP parser print-udp.c:udp_print().
- CVE-2016-7934,CVE-2016-7935,CVE-2016-7937: Corrected segmentation faults in function udp_print(). 
- CVE-2016-7939: Corrected buffer overflows in GRE parser print-gre.c:(multiple functions).
- CVE-2016-7940: Corrected buffer overflows in STP parser print-stp.c:(multiple functions).
- CVE-2016-7973: Corrected buffer overflow in AppleTalk parser print-atalk.c.
- CVE-2016-7974: Corrected buffer overflow in IP parser print-ip.c:(multiple functions).
- CVE-2016-7975: Corrected buffer overflow in TCP parser print-tcp.c:tcp_print().
- CVE-2016-7983,CVE-2016-7984: Corrected buffer overflow in TFTP parser print-tftp.c:tftp_print().
- CVE-2016-7992: Corrected buffer overflow in Classical IP over ATM parser print-cip.c.
- CVE-2016-7993: Corrected buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, etc.).
- CVE-2016-8574: Corrected buffer overflow in FRF.15 parser print-fr.c:frf15_print().
- CVE-2017-5202: Corrected buffer overflow in ISO CLNS parser print-isoclns.c:clnp_print().
- CVE-2017-5203: Corrected buffer overflow in BOOTP parser print-bootp.c:bootp_print().
- CVE-2017-5204: Corrected buffer overflow in IPv6 parser print-ip6.c:ip6_print().
- CVE-2017-5483: Corrected buffer overflow in SNMP parser print-snmp.c:asn1_parse().
- CVE-2017-5484: Corrected buffer overflow in ATM parser print-atm.c:sig_print().
- CVE-2017-5485: Corrected buffer overflow in ISO CLNS parser addrtoname.c:lookup_nsap().
- CVE-2017-5486: Corrected buffer overflow in ISO CLNS parser print-isoclns.c:clnp_print().
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-10"/>
	<updated date="2017-03-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7922/">CVE-2016-7922 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7922">CVE-2016-7922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7923/">CVE-2016-7923 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7923">CVE-2016-7923 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7925/">CVE-2016-7925 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7925">CVE-2016-7925 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7926/">CVE-2016-7926 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7926">CVE-2016-7926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7927/">CVE-2016-7927 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7927">CVE-2016-7927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7928/">CVE-2016-7928 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7928">CVE-2016-7928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7931/">CVE-2016-7931 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7931">CVE-2016-7931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7934/">CVE-2016-7934 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7934">CVE-2016-7934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7935/">CVE-2016-7935 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7935">CVE-2016-7935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7936/">CVE-2016-7936 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7936">CVE-2016-7936 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7937/">CVE-2016-7937 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7937">CVE-2016-7937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7939/">CVE-2016-7939 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7939">CVE-2016-7939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7940/">CVE-2016-7940 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7940">CVE-2016-7940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7973/">CVE-2016-7973 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7973">CVE-2016-7973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7974/">CVE-2016-7974 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7974">CVE-2016-7974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7975/">CVE-2016-7975 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7975">CVE-2016-7975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7983/">CVE-2016-7983 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7983">CVE-2016-7983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7984/">CVE-2016-7984 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7984">CVE-2016-7984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7992/">CVE-2016-7992 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7992">CVE-2016-7992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7993/">CVE-2016-7993 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7993">CVE-2016-7993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8574/">CVE-2016-8574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8574">CVE-2016-8574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5202/">CVE-2017-5202 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5202">CVE-2017-5202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5203/">CVE-2017-5203 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5203">CVE-2017-5203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5204/">CVE-2017-5204 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5204">CVE-2017-5204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5483/">CVE-2017-5483 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5483">CVE-2017-5483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5484/">CVE-2017-5484 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5484">CVE-2017-5484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5485/">CVE-2017-5485 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5485">CVE-2017-5485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5486/">CVE-2017-5486 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5486">CVE-2017-5486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575225" comment="tcpdump-3.9.8-1.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219495" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1047873" ref_url="https://bugzilla.suse.com/1047873" source="BUGZILLA"/>
		<reference ref_id="1057247" ref_url="https://bugzilla.suse.com/1057247" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11108" ref_url="https://www.suse.com/security/cve/CVE-2017-11108/" source="CVE"/>
		<reference ref_id="CVE-2017-11541" ref_url="https://www.suse.com/security/cve/CVE-2017-11541/" source="CVE"/>
		<reference ref_id="CVE-2017-11542" ref_url="https://www.suse.com/security/cve/CVE-2017-11542/" source="CVE"/>
		<reference ref_id="CVE-2017-11543" ref_url="https://www.suse.com/security/cve/CVE-2017-11543/" source="CVE"/>
		<reference ref_id="CVE-2017-13011" ref_url="https://www.suse.com/security/cve/CVE-2017-13011/" source="CVE"/>
		<description>
This update for tcpdump fixes the following issues:

Security issues fixed:

- CVE-2017-11108: Crafted input allowed remote DoS (bsc#1047873)
- CVE-2017-11541: Prevent a heap-based buffer over-read in the lldp_print function in print-lldp.c, related to util-print.c (bsc#1057247).
- CVE-2017-11542: Prevent a heap-based buffer over-read in the pimv1_print function in print-pim.c (bsc#1057247).
- CVE-2017-11543: Prevent a buffer overflow in the sliplink_print function in print-sl.c (bsc#1057247).
- CVE-2017-13011: Several protocol parsers in tcpdump could have caused a buffer overflow in util-print.c:bittok2str_internal() (bsc#1057247).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-10"/>
	<updated date="2017-10-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047873">SUSE bug 1047873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11108/">CVE-2017-11108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11108">CVE-2017-11108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11541/">CVE-2017-11541 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11541">CVE-2017-11541 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11542/">CVE-2017-11542 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11542">CVE-2017-11542 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11543/">CVE-2017-11543 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11543">CVE-2017-11543 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13011/">CVE-2017-13011 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13011">CVE-2017-13011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575226" comment="tcpdump-3.9.8-1.30.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219496" version="1" class="patch">
	<metadata>
		<title>Recommended update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1094241" ref_url="https://bugzilla.suse.com/1094241" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7975" ref_url="https://www.suse.com/security/cve/CVE-2016-7975/" source="CVE"/>
		<description>
This update for tcpdump provides the following fix:

- The original fix for CVE-2016-7975 was using a variable before declaring it. Fix this
  by moving the declaration before any usage. (bsc#1094241, CVE-2016-7975)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-09"/>
	<updated date="2018-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094241">SUSE bug 1094241</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7975/">CVE-2016-7975 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7975">CVE-2016-7975 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594221" comment="tcpdump-3.9.8-1.30.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219497" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1057247" ref_url="https://bugzilla.suse.com/1057247" source="BUGZILLA"/>
		<reference ref_id="1153098" ref_url="https://bugzilla.suse.com/1153098" source="BUGZILLA"/>
		<reference ref_id="1153332" ref_url="https://bugzilla.suse.com/1153332" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12893" ref_url="https://www.suse.com/security/cve/CVE-2017-12893/" source="CVE"/>
		<reference ref_id="CVE-2017-12894" ref_url="https://www.suse.com/security/cve/CVE-2017-12894/" source="CVE"/>
		<reference ref_id="CVE-2017-12896" ref_url="https://www.suse.com/security/cve/CVE-2017-12896/" source="CVE"/>
		<reference ref_id="CVE-2017-12897" ref_url="https://www.suse.com/security/cve/CVE-2017-12897/" source="CVE"/>
		<reference ref_id="CVE-2017-12898" ref_url="https://www.suse.com/security/cve/CVE-2017-12898/" source="CVE"/>
		<reference ref_id="CVE-2017-12899" ref_url="https://www.suse.com/security/cve/CVE-2017-12899/" source="CVE"/>
		<reference ref_id="CVE-2017-12900" ref_url="https://www.suse.com/security/cve/CVE-2017-12900/" source="CVE"/>
		<reference ref_id="CVE-2017-12901" ref_url="https://www.suse.com/security/cve/CVE-2017-12901/" source="CVE"/>
		<reference ref_id="CVE-2017-12902" ref_url="https://www.suse.com/security/cve/CVE-2017-12902/" source="CVE"/>
		<reference ref_id="CVE-2017-12985" ref_url="https://www.suse.com/security/cve/CVE-2017-12985/" source="CVE"/>
		<reference ref_id="CVE-2017-12986" ref_url="https://www.suse.com/security/cve/CVE-2017-12986/" source="CVE"/>
		<reference ref_id="CVE-2017-12987" ref_url="https://www.suse.com/security/cve/CVE-2017-12987/" source="CVE"/>
		<reference ref_id="CVE-2017-12988" ref_url="https://www.suse.com/security/cve/CVE-2017-12988/" source="CVE"/>
		<reference ref_id="CVE-2017-12991" ref_url="https://www.suse.com/security/cve/CVE-2017-12991/" source="CVE"/>
		<reference ref_id="CVE-2017-12992" ref_url="https://www.suse.com/security/cve/CVE-2017-12992/" source="CVE"/>
		<reference ref_id="CVE-2017-12993" ref_url="https://www.suse.com/security/cve/CVE-2017-12993/" source="CVE"/>
		<reference ref_id="CVE-2017-12995" ref_url="https://www.suse.com/security/cve/CVE-2017-12995/" source="CVE"/>
		<reference ref_id="CVE-2017-12996" ref_url="https://www.suse.com/security/cve/CVE-2017-12996/" source="CVE"/>
		<reference ref_id="CVE-2017-12998" ref_url="https://www.suse.com/security/cve/CVE-2017-12998/" source="CVE"/>
		<reference ref_id="CVE-2017-12999" ref_url="https://www.suse.com/security/cve/CVE-2017-12999/" source="CVE"/>
		<reference ref_id="CVE-2017-13001" ref_url="https://www.suse.com/security/cve/CVE-2017-13001/" source="CVE"/>
		<reference ref_id="CVE-2017-13002" ref_url="https://www.suse.com/security/cve/CVE-2017-13002/" source="CVE"/>
		<reference ref_id="CVE-2017-13003" ref_url="https://www.suse.com/security/cve/CVE-2017-13003/" source="CVE"/>
		<reference ref_id="CVE-2017-13004" ref_url="https://www.suse.com/security/cve/CVE-2017-13004/" source="CVE"/>
		<reference ref_id="CVE-2017-13005" ref_url="https://www.suse.com/security/cve/CVE-2017-13005/" source="CVE"/>
		<reference ref_id="CVE-2017-13006" ref_url="https://www.suse.com/security/cve/CVE-2017-13006/" source="CVE"/>
		<reference ref_id="CVE-2017-13008" ref_url="https://www.suse.com/security/cve/CVE-2017-13008/" source="CVE"/>
		<reference ref_id="CVE-2017-13009" ref_url="https://www.suse.com/security/cve/CVE-2017-13009/" source="CVE"/>
		<reference ref_id="CVE-2017-13010" ref_url="https://www.suse.com/security/cve/CVE-2017-13010/" source="CVE"/>
		<reference ref_id="CVE-2017-13012" ref_url="https://www.suse.com/security/cve/CVE-2017-13012/" source="CVE"/>
		<reference ref_id="CVE-2017-13013" ref_url="https://www.suse.com/security/cve/CVE-2017-13013/" source="CVE"/>
		<reference ref_id="CVE-2017-13014" ref_url="https://www.suse.com/security/cve/CVE-2017-13014/" source="CVE"/>
		<reference ref_id="CVE-2017-13016" ref_url="https://www.suse.com/security/cve/CVE-2017-13016/" source="CVE"/>
		<reference ref_id="CVE-2017-13017" ref_url="https://www.suse.com/security/cve/CVE-2017-13017/" source="CVE"/>
		<reference ref_id="CVE-2017-13018" ref_url="https://www.suse.com/security/cve/CVE-2017-13018/" source="CVE"/>
		<reference ref_id="CVE-2017-13019" ref_url="https://www.suse.com/security/cve/CVE-2017-13019/" source="CVE"/>
		<reference ref_id="CVE-2017-13021" ref_url="https://www.suse.com/security/cve/CVE-2017-13021/" source="CVE"/>
		<reference ref_id="CVE-2017-13022" ref_url="https://www.suse.com/security/cve/CVE-2017-13022/" source="CVE"/>
		<reference ref_id="CVE-2017-13023" ref_url="https://www.suse.com/security/cve/CVE-2017-13023/" source="CVE"/>
		<reference ref_id="CVE-2017-13024" ref_url="https://www.suse.com/security/cve/CVE-2017-13024/" source="CVE"/>
		<reference ref_id="CVE-2017-13025" ref_url="https://www.suse.com/security/cve/CVE-2017-13025/" source="CVE"/>
		<reference ref_id="CVE-2017-13027" ref_url="https://www.suse.com/security/cve/CVE-2017-13027/" source="CVE"/>
		<reference ref_id="CVE-2017-13028" ref_url="https://www.suse.com/security/cve/CVE-2017-13028/" source="CVE"/>
		<reference ref_id="CVE-2017-13029" ref_url="https://www.suse.com/security/cve/CVE-2017-13029/" source="CVE"/>
		<reference ref_id="CVE-2017-13030" ref_url="https://www.suse.com/security/cve/CVE-2017-13030/" source="CVE"/>
		<reference ref_id="CVE-2017-13031" ref_url="https://www.suse.com/security/cve/CVE-2017-13031/" source="CVE"/>
		<reference ref_id="CVE-2017-13032" ref_url="https://www.suse.com/security/cve/CVE-2017-13032/" source="CVE"/>
		<reference ref_id="CVE-2017-13034" ref_url="https://www.suse.com/security/cve/CVE-2017-13034/" source="CVE"/>
		<reference ref_id="CVE-2017-13035" ref_url="https://www.suse.com/security/cve/CVE-2017-13035/" source="CVE"/>
		<reference ref_id="CVE-2017-13036" ref_url="https://www.suse.com/security/cve/CVE-2017-13036/" source="CVE"/>
		<reference ref_id="CVE-2017-13037" ref_url="https://www.suse.com/security/cve/CVE-2017-13037/" source="CVE"/>
		<reference ref_id="CVE-2017-13038" ref_url="https://www.suse.com/security/cve/CVE-2017-13038/" source="CVE"/>
		<reference ref_id="CVE-2017-13041" ref_url="https://www.suse.com/security/cve/CVE-2017-13041/" source="CVE"/>
		<reference ref_id="CVE-2017-13047" ref_url="https://www.suse.com/security/cve/CVE-2017-13047/" source="CVE"/>
		<reference ref_id="CVE-2017-13048" ref_url="https://www.suse.com/security/cve/CVE-2017-13048/" source="CVE"/>
		<reference ref_id="CVE-2017-13049" ref_url="https://www.suse.com/security/cve/CVE-2017-13049/" source="CVE"/>
		<reference ref_id="CVE-2017-13051" ref_url="https://www.suse.com/security/cve/CVE-2017-13051/" source="CVE"/>
		<reference ref_id="CVE-2017-13053" ref_url="https://www.suse.com/security/cve/CVE-2017-13053/" source="CVE"/>
		<reference ref_id="CVE-2017-13055" ref_url="https://www.suse.com/security/cve/CVE-2017-13055/" source="CVE"/>
		<reference ref_id="CVE-2017-13687" ref_url="https://www.suse.com/security/cve/CVE-2017-13687/" source="CVE"/>
		<reference ref_id="CVE-2017-13688" ref_url="https://www.suse.com/security/cve/CVE-2017-13688/" source="CVE"/>
		<reference ref_id="CVE-2017-13689" ref_url="https://www.suse.com/security/cve/CVE-2017-13689/" source="CVE"/>
		<reference ref_id="CVE-2017-13725" ref_url="https://www.suse.com/security/cve/CVE-2017-13725/" source="CVE"/>
		<reference ref_id="CVE-2018-10103" ref_url="https://www.suse.com/security/cve/CVE-2018-10103/" source="CVE"/>
		<reference ref_id="CVE-2018-10105" ref_url="https://www.suse.com/security/cve/CVE-2018-10105/" source="CVE"/>
		<reference ref_id="CVE-2018-14461" ref_url="https://www.suse.com/security/cve/CVE-2018-14461/" source="CVE"/>
		<reference ref_id="CVE-2018-14462" ref_url="https://www.suse.com/security/cve/CVE-2018-14462/" source="CVE"/>
		<reference ref_id="CVE-2018-14463" ref_url="https://www.suse.com/security/cve/CVE-2018-14463/" source="CVE"/>
		<reference ref_id="CVE-2018-14464" ref_url="https://www.suse.com/security/cve/CVE-2018-14464/" source="CVE"/>
		<reference ref_id="CVE-2018-14465" ref_url="https://www.suse.com/security/cve/CVE-2018-14465/" source="CVE"/>
		<reference ref_id="CVE-2018-14466" ref_url="https://www.suse.com/security/cve/CVE-2018-14466/" source="CVE"/>
		<reference ref_id="CVE-2018-14467" ref_url="https://www.suse.com/security/cve/CVE-2018-14467/" source="CVE"/>
		<reference ref_id="CVE-2018-14468" ref_url="https://www.suse.com/security/cve/CVE-2018-14468/" source="CVE"/>
		<reference ref_id="CVE-2018-14469" ref_url="https://www.suse.com/security/cve/CVE-2018-14469/" source="CVE"/>
		<reference ref_id="CVE-2018-14881" ref_url="https://www.suse.com/security/cve/CVE-2018-14881/" source="CVE"/>
		<reference ref_id="CVE-2018-14882" ref_url="https://www.suse.com/security/cve/CVE-2018-14882/" source="CVE"/>
		<reference ref_id="CVE-2018-16229" ref_url="https://www.suse.com/security/cve/CVE-2018-16229/" source="CVE"/>
		<reference ref_id="CVE-2018-16230" ref_url="https://www.suse.com/security/cve/CVE-2018-16230/" source="CVE"/>
		<reference ref_id="CVE-2018-16300" ref_url="https://www.suse.com/security/cve/CVE-2018-16300/" source="CVE"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="CVE-2018-16451" ref_url="https://www.suse.com/security/cve/CVE-2018-16451/" source="CVE"/>
		<reference ref_id="CVE-2018-16452" ref_url="https://www.suse.com/security/cve/CVE-2018-16452/" source="CVE"/>
		<reference ref_id="CVE-2019-15166" ref_url="https://www.suse.com/security/cve/CVE-2019-15166/" source="CVE"/>
		<description>
This update for tcpdump fixes the following issues:

Security issues fixed:

- CVE-2017-12995: Fixed an infinite loop in the DNS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12893: Fixed a buffer over-read in the SMB/CIFS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12894: Fixed a buffer over-read in several protocol parsers that allowed remote DoS (bsc#1057247).
- CVE-2017-12896: Fixed a buffer over-read in the ISAKMP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12897: Fixed a buffer over-read in the ISO CLNS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12898: Fixed a buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12899: Fixed a buffer over-read in the DECnet parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12900: Fixed a buffer over-read in the in several protocol parsers that allowed remote DoS (bsc#1057247).
- CVE-2017-12901: Fixed a buffer over-read in the EIGRP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12902: Fixed a buffer over-read in the Zephyr parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12985: Fixed a buffer over-read in the IPv6 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12986: Fixed a buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12987: Fixed a buffer over-read in the 802.11 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12988: Fixed a buffer over-read in the telnet parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12991: Fixed a buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12992: Fixed a buffer over-read in the RIPng parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12993: Fixed a buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12996: Fixed a buffer over-read in the PIMv2 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12998: Fixed a buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12999: Fixed a buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13001: Fixed a buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13002: Fixed a buffer over-read in the AODV parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13003: Fixed a buffer over-read in the LMP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13004: Fixed a buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13005: Fixed a buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13006: Fixed a buffer over-read in the L2TP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13008: Fixed a buffer over-read in the IEEE 802.11 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13009: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13010: Fixed a buffer over-read in the BEEP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13012: Fixed a buffer over-read in the ICMP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13013: Fixed a buffer over-read in the ARP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13014: Fixed a buffer over-read in the White Board protocol parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13016: Fixed a buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13017: Fixed a buffer over-read in the DHCPv6 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13018: Fixed a buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13019: Fixed a buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13021: Fixed a buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13022: Fixed a buffer over-read in the IP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13023: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13024: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13025: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13027: Fixed a buffer over-read in the LLDP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13028: Fixed a buffer over-read in the BOOTP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13029: Fixed a buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13030: Fixed a buffer over-read in the PIM parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13031: Fixed a buffer over-read in the IPv6 fragmentation header parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13032: Fixed a buffer over-read in the RADIUS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13034: Fixed a buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13035: Fixed a buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13036: Fixed a buffer over-read in the OSPFv3 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13037: Fixed a buffer over-read in the IP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13038: Fixed a buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13041: Fixed a buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13047: Fixed a buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13048: Fixed a buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13049: Fixed a buffer over-read in the Rx protocol parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13051: Fixed a buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13053: Fixed a buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13055: Fixed a buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13687: Fixed a buffer over-read in the Cisco HDLC parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13688: Fixed a buffer over-read in the OLSR parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13689: Fixed a buffer over-read in the IKEv1 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13725: Fixed a buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247).
- CVE-2018-10103: Fixed a mishandling of the printing of SMB data (bsc#1153098).
- CVE-2018-10105: Fixed a mishandling of the printing of SMB data (bsc#1153098).
- CVE-2018-14461: Fixed a buffer over-read in print-ldp.c:ldp_tlv_print (bsc#1153098).
- CVE-2018-14462: Fixed a buffer over-read in print-icmp.c:icmp_print (bsc#1153098).
- CVE-2018-14463: Fixed a buffer over-read in print-vrrp.c:vrrp_print (bsc#1153098).
- CVE-2018-14464: Fixed a buffer over-read in print-lmp.c:lmp_print_data_link_subobjs (bsc#1153098).
- CVE-2018-14465: Fixed a buffer over-read in print-rsvp.c:rsvp_obj_print (bsc#1153098).
- CVE-2018-14466: Fixed a buffer over-read in print-rx.c:rx_cache_find (bsc#1153098).
- CVE-2018-14467: Fixed a buffer over-read in print-bgp.c:bgp_capabilities_print (bsc#1153098).
- CVE-2018-14468: Fixed a buffer over-read in print-fr.c:mfr_print (bsc#1153098).
- CVE-2018-14469: Fixed a buffer over-read in print-isakmp.c:ikev1_n_print (bsc#1153098).
- CVE-2018-14881: Fixed a buffer over-read in the BGP parser (bsc#1153098).
- CVE-2018-14882: Fixed a buffer over-read in the ICMPv6 parser (bsc#1153098).
- CVE-2018-16229: Fixed a buffer over-read in the DCCP parser (bsc#1153098).
- CVE-2018-16230: Fixed a buffer over-read in the BGP parser in print-bgp.c:bgp_attr_print (bsc#1153098).
- CVE-2018-16300: Fixed an unlimited recursion in the BGP parser that allowed denial-of-service by stack consumption (bsc#1153098).
- CVE-2018-16301: Fixed a buffer overflow (bsc#1153332 bsc#1153098).
- CVE-2018-16451: Fixed several buffer over-reads in print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN (bsc#1153098).
- CVE-2018-16452: Fixed a stack exhaustion in smbutil.c:smb_fdata (bsc#1153098).
- CVE-2019-15166: Fixed a bounds check in lmp_print_data_link_subobjs (bsc#1153098).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153332">SUSE bug 1153332</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12893/">CVE-2017-12893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12893">CVE-2017-12893 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12894/">CVE-2017-12894 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12894">CVE-2017-12894 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12896/">CVE-2017-12896 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12896">CVE-2017-12896 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12897/">CVE-2017-12897 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12897">CVE-2017-12897 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12898/">CVE-2017-12898 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12898">CVE-2017-12898 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12899/">CVE-2017-12899 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12899">CVE-2017-12899 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12900/">CVE-2017-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12900">CVE-2017-12900 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12901/">CVE-2017-12901 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12901">CVE-2017-12901 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12902/">CVE-2017-12902 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12902">CVE-2017-12902 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12985/">CVE-2017-12985 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12985">CVE-2017-12985 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12986/">CVE-2017-12986 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12986">CVE-2017-12986 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12987/">CVE-2017-12987 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12987">CVE-2017-12987 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12988/">CVE-2017-12988 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12988">CVE-2017-12988 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12991/">CVE-2017-12991 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12991">CVE-2017-12991 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12992/">CVE-2017-12992 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12992">CVE-2017-12992 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12993/">CVE-2017-12993 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12993">CVE-2017-12993 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12995/">CVE-2017-12995 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12995">CVE-2017-12995 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12996/">CVE-2017-12996 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12996">CVE-2017-12996 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12998/">CVE-2017-12998 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12998">CVE-2017-12998 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12999/">CVE-2017-12999 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12999">CVE-2017-12999 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13001/">CVE-2017-13001 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13001">CVE-2017-13001 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13002/">CVE-2017-13002 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13002">CVE-2017-13002 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13003/">CVE-2017-13003 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13003">CVE-2017-13003 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13004/">CVE-2017-13004 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13004">CVE-2017-13004 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13005/">CVE-2017-13005 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13005">CVE-2017-13005 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13006/">CVE-2017-13006 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13006">CVE-2017-13006 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13008/">CVE-2017-13008 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13008">CVE-2017-13008 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13009/">CVE-2017-13009 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13009">CVE-2017-13009 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13010/">CVE-2017-13010 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13010">CVE-2017-13010 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13012/">CVE-2017-13012 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13012">CVE-2017-13012 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13013/">CVE-2017-13013 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13013">CVE-2017-13013 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13014/">CVE-2017-13014 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13014">CVE-2017-13014 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13016/">CVE-2017-13016 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13016">CVE-2017-13016 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13017/">CVE-2017-13017 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13017">CVE-2017-13017 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13018/">CVE-2017-13018 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13018">CVE-2017-13018 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13019/">CVE-2017-13019 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13019">CVE-2017-13019 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13021/">CVE-2017-13021 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13021">CVE-2017-13021 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13022/">CVE-2017-13022 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13022">CVE-2017-13022 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13023/">CVE-2017-13023 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13023">CVE-2017-13023 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13024/">CVE-2017-13024 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13024">CVE-2017-13024 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13025/">CVE-2017-13025 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13025">CVE-2017-13025 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13027/">CVE-2017-13027 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13027">CVE-2017-13027 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13028/">CVE-2017-13028 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13028">CVE-2017-13028 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13029/">CVE-2017-13029 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13029">CVE-2017-13029 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13030/">CVE-2017-13030 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13030">CVE-2017-13030 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13031/">CVE-2017-13031 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13031">CVE-2017-13031 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13032/">CVE-2017-13032 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13032">CVE-2017-13032 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13034/">CVE-2017-13034 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13034">CVE-2017-13034 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13035/">CVE-2017-13035 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13035">CVE-2017-13035 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13036/">CVE-2017-13036 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13036">CVE-2017-13036 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13037/">CVE-2017-13037 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13037">CVE-2017-13037 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13038/">CVE-2017-13038 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13038">CVE-2017-13038 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13041/">CVE-2017-13041 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13041">CVE-2017-13041 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13047/">CVE-2017-13047 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13047">CVE-2017-13047 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13048/">CVE-2017-13048 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13048">CVE-2017-13048 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13049/">CVE-2017-13049 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13049">CVE-2017-13049 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13051/">CVE-2017-13051 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13051">CVE-2017-13051 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13053/">CVE-2017-13053 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13053">CVE-2017-13053 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13055/">CVE-2017-13055 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13055">CVE-2017-13055 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13687/">CVE-2017-13687 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13687">CVE-2017-13687 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13688/">CVE-2017-13688 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13688">CVE-2017-13688 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13689/">CVE-2017-13689 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13689">CVE-2017-13689 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13725/">CVE-2017-13725 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13725">CVE-2017-13725 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10103/">CVE-2018-10103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10103">CVE-2018-10103 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10105/">CVE-2018-10105 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10105">CVE-2018-10105 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14461/">CVE-2018-14461 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14461">CVE-2018-14461 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14462/">CVE-2018-14462 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14462">CVE-2018-14462 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14463/">CVE-2018-14463 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14463">CVE-2018-14463 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14464/">CVE-2018-14464 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14464">CVE-2018-14464 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14465/">CVE-2018-14465 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14465">CVE-2018-14465 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14466/">CVE-2018-14466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14466">CVE-2018-14466 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14467/">CVE-2018-14467 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14467">CVE-2018-14467 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14468/">CVE-2018-14468 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14468">CVE-2018-14468 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14469/">CVE-2018-14469 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14469">CVE-2018-14469 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14881/">CVE-2018-14881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14881">CVE-2018-14881 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14882/">CVE-2018-14882 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14882">CVE-2018-14882 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16229/">CVE-2018-16229 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16229">CVE-2018-16229 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16230/">CVE-2018-16230 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16230">CVE-2018-16230 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16300/">CVE-2018-16300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16300">CVE-2018-16300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16301">CVE-2018-16301 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16451/">CVE-2018-16451 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16451">CVE-2018-16451 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16452/">CVE-2018-16452 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16452">CVE-2018-16452 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15166/">CVE-2019-15166 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15166">CVE-2019-15166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575227" comment="tcpdump-3.9.8-1.30.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219498" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178466" ref_url="https://bugzilla.suse.com/1178466" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8037" ref_url="https://www.suse.com/security/cve/CVE-2020-8037/" source="CVE"/>
		<description>
This update for tcpdump fixes the following issues:

- CVE-2020-8037: Fixed an issue where PPP decapsulator did not allocate the right buffer size (bsc#1178466).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-17"/>
	<updated date="2020-11-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178466">SUSE bug 1178466</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8037/">CVE-2020-8037 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8037">CVE-2020-8037 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575228" comment="tcpdump-3.9.8-1.30.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219499" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1195825" ref_url="https://bugzilla.suse.com/1195825" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<description>
This update for tcpdump fixes the following issues:

- CVE-2018-16301: Fixed segfault when handling large files (bsc#1195825).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195825">SUSE bug 1195825</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16301">CVE-2018-16301 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668244" comment="tcpdump-3.9.8-1.30.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219500" version="1" class="patch">
	<metadata>
		<title>Security update for telnet (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1203759" ref_url="https://bugzilla.suse.com/1203759" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-39028" ref_url="https://www.suse.com/security/cve/CVE-2022-39028/" source="CVE"/>
		<description>
This update for telnet fixes the following issues:

  - CVE-2022-39028: Fixed NULL pointer dereference in telnetd (bsc#1203759).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-26"/>
	<updated date="2022-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203759">SUSE bug 1203759</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39028/">CVE-2022-39028 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39028">CVE-2022-39028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994203" comment="telnet-1.2-134.24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994204" comment="telnet-server-1.2-134.24.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219501" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="914890" ref_url="https://bugzilla.suse.com/914890" source="BUGZILLA"/>
		<reference ref_id="916927" ref_url="https://bugzilla.suse.com/916927" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127/" source="CVE"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129/" source="CVE"/>
		<reference ref_id="CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130/" source="CVE"/>
		<reference ref_id="CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001546.html" source="SUSE-SU"/>
		<description>
tiff was updated to fix six security issues found by fuzzing initiatives.

These security issues were fixed:
- CVE-2014-8127: Out-of-bounds write (bnc#914890).
- CVE-2014-8128: Out-of-bounds write (bnc#914890).
- CVE-2014-8129: Out-of-bounds write (bnc#914890).
- CVE-2014-8130: Out-of-bounds write (bnc#914890).
- CVE-2014-9655: Access of uninitialized memory (bnc#916927).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-12"/>
	<updated date="2015-08-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916927">SUSE bug 916927</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8127">CVE-2014-8127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8128">CVE-2014-8128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8129">CVE-2014-8129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8130">CVE-2014-8130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9655">CVE-2014-9655 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581498" comment="libtiff3-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581499" comment="libtiff3-32bit-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581500" comment="libtiff3-x86-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581501" comment="tiff-3.8.2-141.160.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581498" comment="libtiff3-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581499" comment="libtiff3-32bit-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581500" comment="libtiff3-x86-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581501" comment="tiff-3.8.2-141.160.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581498" comment="libtiff3-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581499" comment="libtiff3-32bit-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581500" comment="libtiff3-x86-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581501" comment="tiff-3.8.2-141.160.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219502" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="960341" ref_url="https://bugzilla.suse.com/960341" source="BUGZILLA"/>
		<reference ref_id="964225" ref_url="https://bugzilla.suse.com/964225" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2015-8781" ref_url="https://www.suse.com/security/cve/CVE-2015-8781/" source="CVE"/>
		<reference ref_id="CVE-2015-8782" ref_url="https://www.suse.com/security/cve/CVE-2015-8782/" source="CVE"/>
		<reference ref_id="CVE-2015-8783" ref_url="https://www.suse.com/security/cve/CVE-2015-8783/" source="CVE"/>
		<description>

This update for tiff fixes the following issues:

- CVE-2015-8781, CVE-2015-8782, CVE-2015-8783: Out-of-bounds writes for invalid images (bsc#964225)
- CVE-2015-7554: Out-of-bounds Write in the thumbnail and tiffcmp tools (bsc#960341)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964225">SUSE bug 964225</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7554">CVE-2015-7554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8781/">CVE-2015-8781 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8781">CVE-2015-8781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8782/">CVE-2015-8782 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8782">CVE-2015-8782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8783/">CVE-2015-8783 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8783">CVE-2015-8783 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575233" comment="libtiff3-3.8.2-141.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567450" comment="libtiff3-32bit-3.8.2-141.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575234" comment="tiff-3.8.2-141.163.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219503" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="973340" ref_url="https://bugzilla.suse.com/973340" source="BUGZILLA"/>
		<reference ref_id="974449" ref_url="https://bugzilla.suse.com/974449" source="BUGZILLA"/>
		<reference ref_id="974614" ref_url="https://bugzilla.suse.com/974614" source="BUGZILLA"/>
		<reference ref_id="974618" ref_url="https://bugzilla.suse.com/974618" source="BUGZILLA"/>
		<reference ref_id="975069" ref_url="https://bugzilla.suse.com/975069" source="BUGZILLA"/>
		<reference ref_id="984808" ref_url="https://bugzilla.suse.com/984808" source="BUGZILLA"/>
		<reference ref_id="984831" ref_url="https://bugzilla.suse.com/984831" source="BUGZILLA"/>
		<reference ref_id="984837" ref_url="https://bugzilla.suse.com/984837" source="BUGZILLA"/>
		<reference ref_id="984842" ref_url="https://bugzilla.suse.com/984842" source="BUGZILLA"/>
		<reference ref_id="987351" ref_url="https://bugzilla.suse.com/987351" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3186" ref_url="https://www.suse.com/security/cve/CVE-2016-3186/" source="CVE"/>
		<reference ref_id="CVE-2016-3622" ref_url="https://www.suse.com/security/cve/CVE-2016-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-3623" ref_url="https://www.suse.com/security/cve/CVE-2016-3623/" source="CVE"/>
		<reference ref_id="CVE-2016-3945" ref_url="https://www.suse.com/security/cve/CVE-2016-3945/" source="CVE"/>
		<reference ref_id="CVE-2016-3990" ref_url="https://www.suse.com/security/cve/CVE-2016-3990/" source="CVE"/>
		<reference ref_id="CVE-2016-5314" ref_url="https://www.suse.com/security/cve/CVE-2016-5314/" source="CVE"/>
		<reference ref_id="CVE-2016-5316" ref_url="https://www.suse.com/security/cve/CVE-2016-5316/" source="CVE"/>
		<reference ref_id="CVE-2016-5317" ref_url="https://www.suse.com/security/cve/CVE-2016-5317/" source="CVE"/>
		<reference ref_id="CVE-2016-5320" ref_url="https://www.suse.com/security/cve/CVE-2016-5320/" source="CVE"/>
		<reference ref_id="CVE-2016-5875" ref_url="https://www.suse.com/security/cve/CVE-2016-5875/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2016-3622: Specially crafted TIFF images could trigger a crash in tiff2rgba (bsc#974449)
- Various out-of-bound write vulnerabilities with unspecified impact (MSVR 35093, MSVR 35094, MSVR 35095, MSVR 35096, MSVR 35097, MSVR 35098)
- CVE-2016-5314: Specially crafted TIFF images could trigger a crash that could result in DoS (bsc#984831)
- CVE-2016-5316: Specially crafted TIFF images could trigger a crash in the rgb2ycbcr tool, leading to Doa (bsc#984837)
- CVE-2016-5317: Specially crafted TIFF images could trigger a crash through an out of bound write (bsc#984842)
- CVE-2016-5320: Specially crafted TIFF images could trigger a crash or potentially allow remote code execution when using the rgb2ycbcr command (bsc#984808)
- CVE-2016-5875: Specially crafted TIFF images could trigger could allow arbitrary code execution (bsc#987351)
- CVE-2016-3623: Specially crafted TIFF images could trigger a crash in rgb2ycbcr (bsc#974618)
- CVE-2016-3945: Specially crafted TIFF images could trigger a crash or allow for arbitrary command execution via tiff2rgba (bsc#974614)
- CVE-2016-3990: Specially crafted TIFF images could trigger a crash or allow for arbitrary command execution (bsc#975069)
- CVE-2016-3186: Specially crafted TIFF imaged could trigger a crash in the gif2tiff command via a buffer overflow (bsc#973340)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-13"/>
	<updated date="2016-10-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/973340">SUSE bug 973340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974449">SUSE bug 974449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974614">SUSE bug 974614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974618">SUSE bug 974618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975069">SUSE bug 975069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984808">SUSE bug 984808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984831">SUSE bug 984831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984837">SUSE bug 984837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984842">SUSE bug 984842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987351">SUSE bug 987351</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3186/">CVE-2016-3186 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3186">CVE-2016-3186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3622/">CVE-2016-3622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3622">CVE-2016-3622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3623/">CVE-2016-3623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3623">CVE-2016-3623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3945/">CVE-2016-3945 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3945">CVE-2016-3945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3990/">CVE-2016-3990 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3990">CVE-2016-3990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5314/">CVE-2016-5314 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5314">CVE-2016-5314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5316/">CVE-2016-5316 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5316">CVE-2016-5316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5317/">CVE-2016-5317 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5317">CVE-2016-5317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5320/">CVE-2016-5320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-5320">CVE-2016-5320 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5875/">CVE-2016-5875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-5875">CVE-2016-5875 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575235" comment="libtiff3-3.8.2-141.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575236" comment="libtiff3-32bit-3.8.2-141.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575237" comment="tiff-3.8.2-141.168.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219504" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1007280" ref_url="https://bugzilla.suse.com/1007280" source="BUGZILLA"/>
		<reference ref_id="1011107" ref_url="https://bugzilla.suse.com/1011107" source="BUGZILLA"/>
		<reference ref_id="1011845" ref_url="https://bugzilla.suse.com/1011845" source="BUGZILLA"/>
		<reference ref_id="1017688" ref_url="https://bugzilla.suse.com/1017688" source="BUGZILLA"/>
		<reference ref_id="1017690" ref_url="https://bugzilla.suse.com/1017690" source="BUGZILLA"/>
		<reference ref_id="1017691" ref_url="https://bugzilla.suse.com/1017691" source="BUGZILLA"/>
		<reference ref_id="1017692" ref_url="https://bugzilla.suse.com/1017692" source="BUGZILLA"/>
		<reference ref_id="1031255" ref_url="https://bugzilla.suse.com/1031255" source="BUGZILLA"/>
		<reference ref_id="1046077" ref_url="https://bugzilla.suse.com/1046077" source="BUGZILLA"/>
		<reference ref_id="1048937" ref_url="https://bugzilla.suse.com/1048937" source="BUGZILLA"/>
		<reference ref_id="1074318" ref_url="https://bugzilla.suse.com/1074318" source="BUGZILLA"/>
		<reference ref_id="960341" ref_url="https://bugzilla.suse.com/960341" source="BUGZILLA"/>
		<reference ref_id="983436" ref_url="https://bugzilla.suse.com/983436" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2016-10095" ref_url="https://www.suse.com/security/cve/CVE-2016-10095/" source="CVE"/>
		<reference ref_id="CVE-2016-10268" ref_url="https://www.suse.com/security/cve/CVE-2016-10268/" source="CVE"/>
		<reference ref_id="CVE-2016-3945" ref_url="https://www.suse.com/security/cve/CVE-2016-3945/" source="CVE"/>
		<reference ref_id="CVE-2016-5318" ref_url="https://www.suse.com/security/cve/CVE-2016-5318/" source="CVE"/>
		<reference ref_id="CVE-2016-5652" ref_url="https://www.suse.com/security/cve/CVE-2016-5652/" source="CVE"/>
		<reference ref_id="CVE-2016-9453" ref_url="https://www.suse.com/security/cve/CVE-2016-9453/" source="CVE"/>
		<reference ref_id="CVE-2016-9536" ref_url="https://www.suse.com/security/cve/CVE-2016-9536/" source="CVE"/>
		<reference ref_id="CVE-2017-11335" ref_url="https://www.suse.com/security/cve/CVE-2017-11335/" source="CVE"/>
		<reference ref_id="CVE-2017-17973" ref_url="https://www.suse.com/security/cve/CVE-2017-17973/" source="CVE"/>
		<reference ref_id="CVE-2017-9935" ref_url="https://www.suse.com/security/cve/CVE-2017-9935/" source="CVE"/>
		<description>

  
This update for tiff fixes the following issues:

- CVE-2016-9453: The t2p_readwrite_pdf_image_tile function allowed remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a JPEG file with a TIFFTAG_JPEGTABLES of length one (bsc#1011107).
- CVE-2016-5652: An exploitable heap-based buffer overflow existed in the handling of TIFF images in the TIFF2PDF tool. A crafted TIFF document can lead to a heap-based buffer overflow resulting in remote code execution. Vulnerability can be triggered via a saved TIFF file delivered by other means (bsc#1007280).
- CVE-2017-11335: There is a heap based buffer overflow in tools/tiff2pdf.c via a PlanarConfig=Contig image, which caused a more than one hundred bytes out-of-bounds write (related to the ZIPDecode function in tif_zip.c). A crafted input may lead to a remote denial of service attack or an arbitrary code execution attack (bsc#1048937).
- CVE-2016-9536: tools/tiff2pdf.c had an out-of-bounds write vulnerabilities in heap allocated buffers in t2p_process_jpeg_strip(). Reported as MSVR 35098, aka 't2p_process_jpeg_strip heap-buffer-overflow.'  (bsc#1011845)
- CVE-2017-9935: In LibTIFF, there was a heap-based buffer overflow in the t2p_write_pdf function in tools/tiff2pdf.c. This heap overflow could lead to different damages. For example, a crafted TIFF document can lead to an out-of-bounds read in TIFFCleanup, an invalid free in TIFFClose or t2p_free, memory corruption in t2p_readwrite_pdf_image, or a double free in t2p_free. Given these possibilities, it probably could cause arbitrary code execution (bsc#1046077).
- CVE-2017-17973: There is a heap-based use-after-free in the t2p_writeproc function in tiff2pdf.c. (bsc#1074318)
- CVE-2015-7554: The _TIFFVGetField function in tif_dir.c allowed attackers to cause a denial of service (invalid memory write and crash) or possibly have unspecified other impact via crafted field data in an extension tag in a TIFF image (bsc#960341).
- CVE-2016-5318: Stack-based buffer overflow in the _TIFFVGetField function allowed remote attackers to crash the application via a crafted tiff (bsc#983436).
- CVE-2016-10095: Stack-based buffer overflow in the _TIFFVGetField function in tif_dir.c allowed remote attackers to cause a denial of service (crash) via a crafted TIFF file (bsc#1017690,).
- CVE-2016-10268: tools/tiffcp.c allowed remote attackers to cause a denial of service (integer underflow and heap-based buffer under-read) or possibly have unspecified other impact via a crafted TIFF image, related to 'READ of size 78490' and libtiff/tif_unix.c:115:23 (bsc#1031255)
- An overlapping of memcpy parameters was fixed which could lead to content corruption (bsc#1017691).
- Fixed an invalid memory read which could lead to a crash (bsc#1017692).
- Fixed a NULL pointer dereference in TIFFReadRawData (tiffinfo.c) that could crash the decoder (bsc#1017688).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-09"/>
	<updated date="2018-05-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007280">SUSE bug 1007280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011107">SUSE bug 1011107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011845">SUSE bug 1011845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017688">SUSE bug 1017688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017691">SUSE bug 1017691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017692">SUSE bug 1017692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031255">SUSE bug 1031255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046077">SUSE bug 1046077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048937">SUSE bug 1048937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074318">SUSE bug 1074318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983436">SUSE bug 983436</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7554">CVE-2015-7554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10095/">CVE-2016-10095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10095">CVE-2016-10095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10268/">CVE-2016-10268 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10268">CVE-2016-10268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3945/">CVE-2016-3945 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3945">CVE-2016-3945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5318/">CVE-2016-5318 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5318">CVE-2016-5318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5652/">CVE-2016-5652 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5652">CVE-2016-5652 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9453/">CVE-2016-9453 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9453">CVE-2016-9453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9536/">CVE-2016-9536 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9536">CVE-2016-9536 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11335/">CVE-2017-11335 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11335">CVE-2017-11335 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17973/">CVE-2017-17973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17973">CVE-2017-17973 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9935/">CVE-2017-9935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9935">CVE-2017-9935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575238" comment="libtiff3-3.8.2-141.169.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575239" comment="libtiff3-32bit-3.8.2-141.169.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575240" comment="tiff-3.8.2-141.169.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219505" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1017694" ref_url="https://bugzilla.suse.com/1017694" source="BUGZILLA"/>
		<reference ref_id="1031250" ref_url="https://bugzilla.suse.com/1031250" source="BUGZILLA"/>
		<reference ref_id="1031254" ref_url="https://bugzilla.suse.com/1031254" source="BUGZILLA"/>
		<reference ref_id="1033109" ref_url="https://bugzilla.suse.com/1033109" source="BUGZILLA"/>
		<reference ref_id="1033111" ref_url="https://bugzilla.suse.com/1033111" source="BUGZILLA"/>
		<reference ref_id="1033112" ref_url="https://bugzilla.suse.com/1033112" source="BUGZILLA"/>
		<reference ref_id="1033113" ref_url="https://bugzilla.suse.com/1033113" source="BUGZILLA"/>
		<reference ref_id="1033120" ref_url="https://bugzilla.suse.com/1033120" source="BUGZILLA"/>
		<reference ref_id="1033126" ref_url="https://bugzilla.suse.com/1033126" source="BUGZILLA"/>
		<reference ref_id="1033127" ref_url="https://bugzilla.suse.com/1033127" source="BUGZILLA"/>
		<reference ref_id="1033129" ref_url="https://bugzilla.suse.com/1033129" source="BUGZILLA"/>
		<reference ref_id="1074317" ref_url="https://bugzilla.suse.com/1074317" source="BUGZILLA"/>
		<reference ref_id="984808" ref_url="https://bugzilla.suse.com/984808" source="BUGZILLA"/>
		<reference ref_id="984809" ref_url="https://bugzilla.suse.com/984809" source="BUGZILLA"/>
		<reference ref_id="984831" ref_url="https://bugzilla.suse.com/984831" source="BUGZILLA"/>
		<reference ref_id="987351" ref_url="https://bugzilla.suse.com/987351" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10267" ref_url="https://www.suse.com/security/cve/CVE-2016-10267/" source="CVE"/>
		<reference ref_id="CVE-2016-10269" ref_url="https://www.suse.com/security/cve/CVE-2016-10269/" source="CVE"/>
		<reference ref_id="CVE-2016-10270" ref_url="https://www.suse.com/security/cve/CVE-2016-10270/" source="CVE"/>
		<reference ref_id="CVE-2016-5314" ref_url="https://www.suse.com/security/cve/CVE-2016-5314/" source="CVE"/>
		<reference ref_id="CVE-2016-5315" ref_url="https://www.suse.com/security/cve/CVE-2016-5315/" source="CVE"/>
		<reference ref_id="CVE-2017-18013" ref_url="https://www.suse.com/security/cve/CVE-2017-18013/" source="CVE"/>
		<reference ref_id="CVE-2017-7593" ref_url="https://www.suse.com/security/cve/CVE-2017-7593/" source="CVE"/>
		<reference ref_id="CVE-2017-7595" ref_url="https://www.suse.com/security/cve/CVE-2017-7595/" source="CVE"/>
		<reference ref_id="CVE-2017-7596" ref_url="https://www.suse.com/security/cve/CVE-2017-7596/" source="CVE"/>
		<reference ref_id="CVE-2017-7597" ref_url="https://www.suse.com/security/cve/CVE-2017-7597/" source="CVE"/>
		<reference ref_id="CVE-2017-7599" ref_url="https://www.suse.com/security/cve/CVE-2017-7599/" source="CVE"/>
		<reference ref_id="CVE-2017-7600" ref_url="https://www.suse.com/security/cve/CVE-2017-7600/" source="CVE"/>
		<reference ref_id="CVE-2017-7601" ref_url="https://www.suse.com/security/cve/CVE-2017-7601/" source="CVE"/>
		<reference ref_id="CVE-2017-7602" ref_url="https://www.suse.com/security/cve/CVE-2017-7602/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

Security issues fixed:

- CVE-2016-5315: The setByteArray function in tif_dir.c allowed remote attackers to cause a denial of service (out-of-bounds read) via a crafted tiff image.  (bsc#984809)
- CVE-2016-10267: LibTIFF allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_ojpeg.c:816:8.  (bsc#1017694)
- CVE-2016-10269: LibTIFF allowed remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to 'READ of size 512' and libtiff/tif_unix.c:340:2.  (bsc#1031254)
- CVE-2016-10270: LibTIFF allowed remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to 'READ of size 8' and libtiff/tif_read.c:523:22.  (bsc#1031250)
- CVE-2017-18013: In LibTIFF, there was a Null-Pointer Dereference in the tif_print.c TIFFPrintDirectory function, as demonstrated by a tiffinfo crash.  (bsc#1074317)
- CVE-2017-7593: tif_read.c did not ensure that tif_rawdata is properly initialized, which might have allowed remote attackers to obtain sensitive information from process memory via a crafted image.  (bsc#1033129)
- CVE-2017-7595: The JPEGSetupEncode function in tiff_jpeg.c allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image.  (bsc#1033127)
- CVE-2017-7596: LibTIFF had an 'outside the range of representable values of type float' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033126)
- CVE-2017-7597: tif_dirread.c had an 'outside the range of representable values of type float' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033120)
- CVE-2017-7599: LibTIFF had an 'outside the range of representable values of type short' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033113)
- CVE-2017-7600: LibTIFF had an 'outside the range of representable values of type unsigned char' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033112)
- CVE-2017-7601: LibTIFF had a 'shift exponent too large for 64-bit type long' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033111)
- CVE-2017-7602: LibTIFF had a signed integer overflow, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033109)
- Multiple divide by zero issues
- CVE-2016-5314: Buffer overflow in the PixarLogDecode function in tif_pixarlog.c allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.  (bsc#987351 bsc#984808 bsc#984831)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-30"/>
	<updated date="2018-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017694">SUSE bug 1017694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031250">SUSE bug 1031250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031254">SUSE bug 1031254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033109">SUSE bug 1033109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033111">SUSE bug 1033111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033112">SUSE bug 1033112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033113">SUSE bug 1033113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033120">SUSE bug 1033120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033126">SUSE bug 1033126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033127">SUSE bug 1033127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033129">SUSE bug 1033129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074317">SUSE bug 1074317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984808">SUSE bug 984808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984809">SUSE bug 984809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984831">SUSE bug 984831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987351">SUSE bug 987351</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10267/">CVE-2016-10267 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10267">CVE-2016-10267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10269/">CVE-2016-10269 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10269">CVE-2016-10269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10270/">CVE-2016-10270 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10270">CVE-2016-10270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5314/">CVE-2016-5314 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5314">CVE-2016-5314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5315/">CVE-2016-5315 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5315">CVE-2016-5315 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18013/">CVE-2017-18013 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18013">CVE-2017-18013 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7593/">CVE-2017-7593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7593">CVE-2017-7593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7595/">CVE-2017-7595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7595">CVE-2017-7595 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7596/">CVE-2017-7596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7596">CVE-2017-7596 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7597/">CVE-2017-7597 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7597">CVE-2017-7597 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7599/">CVE-2017-7599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7599">CVE-2017-7599 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7600/">CVE-2017-7600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7600">CVE-2017-7600 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7601/">CVE-2017-7601 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7601">CVE-2017-7601 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7602/">CVE-2017-7602 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7602">CVE-2017-7602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575241" comment="libtiff3-3.8.2-141.169.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575242" comment="libtiff3-32bit-3.8.2-141.169.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575243" comment="tiff-3.8.2-141.169.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219506" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1007276" ref_url="https://bugzilla.suse.com/1007276" source="BUGZILLA"/>
		<reference ref_id="1011839" ref_url="https://bugzilla.suse.com/1011839" source="BUGZILLA"/>
		<reference ref_id="1011846" ref_url="https://bugzilla.suse.com/1011846" source="BUGZILLA"/>
		<reference ref_id="1017689" ref_url="https://bugzilla.suse.com/1017689" source="BUGZILLA"/>
		<reference ref_id="1017690" ref_url="https://bugzilla.suse.com/1017690" source="BUGZILLA"/>
		<reference ref_id="1019611" ref_url="https://bugzilla.suse.com/1019611" source="BUGZILLA"/>
		<reference ref_id="1031263" ref_url="https://bugzilla.suse.com/1031263" source="BUGZILLA"/>
		<reference ref_id="1082332" ref_url="https://bugzilla.suse.com/1082332" source="BUGZILLA"/>
		<reference ref_id="1082825" ref_url="https://bugzilla.suse.com/1082825" source="BUGZILLA"/>
		<reference ref_id="1086408" ref_url="https://bugzilla.suse.com/1086408" source="BUGZILLA"/>
		<reference ref_id="974621" ref_url="https://bugzilla.suse.com/974621" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2016-10095" ref_url="https://www.suse.com/security/cve/CVE-2016-10095/" source="CVE"/>
		<reference ref_id="CVE-2016-10266" ref_url="https://www.suse.com/security/cve/CVE-2016-10266/" source="CVE"/>
		<reference ref_id="CVE-2016-3632" ref_url="https://www.suse.com/security/cve/CVE-2016-3632/" source="CVE"/>
		<reference ref_id="CVE-2016-5318" ref_url="https://www.suse.com/security/cve/CVE-2016-5318/" source="CVE"/>
		<reference ref_id="CVE-2016-8331" ref_url="https://www.suse.com/security/cve/CVE-2016-8331/" source="CVE"/>
		<reference ref_id="CVE-2016-9535" ref_url="https://www.suse.com/security/cve/CVE-2016-9535/" source="CVE"/>
		<reference ref_id="CVE-2016-9540" ref_url="https://www.suse.com/security/cve/CVE-2016-9540/" source="CVE"/>
		<reference ref_id="CVE-2017-11613" ref_url="https://www.suse.com/security/cve/CVE-2017-11613/" source="CVE"/>
		<reference ref_id="CVE-2017-5225" ref_url="https://www.suse.com/security/cve/CVE-2017-5225/" source="CVE"/>
		<reference ref_id="CVE-2018-7456" ref_url="https://www.suse.com/security/cve/CVE-2018-7456/" source="CVE"/>
		<reference ref_id="CVE-2018-8905" ref_url="https://www.suse.com/security/cve/CVE-2018-8905/" source="CVE"/>
		<description>
This update for tiff fixes the following security issues:

- CVE-2017-5225: Prevent heap buffer overflow in the tools/tiffcp that could
  have caused DoS or code execution via a crafted BitsPerSample value
  (bsc#1019611)
- CVE-2018-7456: Prevent a NULL Pointer dereference in the function
  TIFFPrintDirectory when using the tiffinfo tool to print crafted TIFF
  information, a different vulnerability than CVE-2017-18013 (bsc#1082825)
- CVE-2017-11613: Prevent denial of service in the TIFFOpen function. During
  the TIFFOpen process, td_imagelength is not checked. The value of
  td_imagelength can be directly controlled by an input file. In the
  ChopUpSingleUncompressedStrip function, the _TIFFCheckMalloc function is called
  based on td_imagelength. If the value of td_imagelength is set close to the
  amount of system memory, it will hang the system or trigger the OOM killer
  (bsc#1082332)
- CVE-2016-10266: Prevent remote attackers to cause a denial of service
  (divide-by-zero error and application crash) via a crafted TIFF image, related
  to libtiff/tif_read.c:351:22 (bsc#1031263)
- CVE-2018-8905: Prevent heap-based buffer overflow in the function
  LZWDecodeCompat via a crafted TIFF file (bsc#1086408)
- CVE-2016-9540: Prevent out-of-bounds write on tiled images with odd tile
  width versus image width (bsc#1011839).
- CVE-2016-9535: tif_predict.h and tif_predict.c had assertions that could have
  lead to assertion failures in debug mode, or buffer overflows in release mode,
  when dealing with unusual tile size like YCbCr with subsampling (bsc#1011846).
- CVE-2016-9535: tif_predict.h and tif_predict.c had assertions that could have
  lead to assertion failures in debug mode, or buffer overflows in release mode,
  when dealing with unusual tile size like YCbCr with subsampling (bsc#1011846).
- Removed assert in readSeparateTilesIntoBuffer() function (bsc#1017689).
- CVE-2016-10095: Prevent stack-based buffer overflow in the _TIFFVGetField
  function that allowed remote attackers to cause a denial of service (crash) via
  a crafted TIFF file (bsc#1017690).
- CVE-2016-8331: Prevent remote code execution because of incorrect handling of
  TIFF images. A crafted TIFF document could have lead to a type confusion
  vulnerability resulting in remote code execution. This vulnerability could have
  been be triggered via a TIFF file delivered to the application using LibTIFF's
  tag extension functionality (bsc#1007276).
- CVE-2016-3632: The _TIFFVGetField function allowed remote attackers to cause
  a denial of service (out-of-bounds write) or execute arbitrary code via a
  crafted TIFF image (bsc#974621).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-28"/>
	<updated date="2018-06-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007276">SUSE bug 1007276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011839">SUSE bug 1011839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011846">SUSE bug 1011846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017689">SUSE bug 1017689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019611">SUSE bug 1019611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031263">SUSE bug 1031263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082332">SUSE bug 1082332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082825">SUSE bug 1082825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086408">SUSE bug 1086408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974621">SUSE bug 974621</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8128">CVE-2014-8128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7554">CVE-2015-7554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10095/">CVE-2016-10095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10095">CVE-2016-10095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10266/">CVE-2016-10266 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10266">CVE-2016-10266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3632/">CVE-2016-3632 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3632">CVE-2016-3632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5318/">CVE-2016-5318 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5318">CVE-2016-5318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8331/">CVE-2016-8331 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8331">CVE-2016-8331 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9535/">CVE-2016-9535 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9535">CVE-2016-9535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9540/">CVE-2016-9540 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9540">CVE-2016-9540 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11613/">CVE-2017-11613 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11613">CVE-2017-11613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5225/">CVE-2017-5225 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5225">CVE-2017-5225 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7456/">CVE-2018-7456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7456">CVE-2018-7456 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-8905/">CVE-2018-8905 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8905">CVE-2018-8905 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575244" comment="libtiff3-3.8.2-141.169.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575245" comment="libtiff3-32bit-3.8.2-141.169.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575246" comment="tiff-3.8.2-141.169.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219507" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1074186" ref_url="https://bugzilla.suse.com/1074186" source="BUGZILLA"/>
		<reference ref_id="1092480" ref_url="https://bugzilla.suse.com/1092480" source="BUGZILLA"/>
		<reference ref_id="960589" ref_url="https://bugzilla.suse.com/960589" source="BUGZILLA"/>
		<reference ref_id="983440" ref_url="https://bugzilla.suse.com/983440" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8668" ref_url="https://www.suse.com/security/cve/CVE-2015-8668/" source="CVE"/>
		<reference ref_id="CVE-2016-5319" ref_url="https://www.suse.com/security/cve/CVE-2016-5319/" source="CVE"/>
		<reference ref_id="CVE-2017-17942" ref_url="https://www.suse.com/security/cve/CVE-2017-17942/" source="CVE"/>
		<reference ref_id="CVE-2018-10779" ref_url="https://www.suse.com/security/cve/CVE-2018-10779/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

The following security vulnerabilities were addressed:

- CVE-2015-8668: Fixed a heap-based buffer overflow in the PackBitsPreEncode
  function in tif_packbits.c in bmp2tiff, which allowed remote attackers to
  execute arbitrary code or cause a denial of service via a large width field
  in a specially crafted BMP image. (bsc#960589)
- CVE-2018-10779: Fixed a heap-based buffer over-read in TIFFWriteScanline() in
  tif_write.c (bsc#1092480)
- CVE-2017-17942: Fixed a heap-based buffer overflow in the function
  PackBitsEncode in tif_packbits.c. (bsc#1074186)
- CVE-2016-5319: Fixed a beap-based buffer overflow in bmp2tiff (bsc#983440)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-10"/>
	<updated date="2018-09-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074186">SUSE bug 1074186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092480">SUSE bug 1092480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960589">SUSE bug 960589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983440">SUSE bug 983440</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8668/">CVE-2015-8668 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8668">CVE-2015-8668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5319/">CVE-2016-5319 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5319">CVE-2016-5319 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17942/">CVE-2017-17942 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17942">CVE-2017-17942 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10779/">CVE-2018-10779 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10779">CVE-2018-10779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575247" comment="libtiff3-3.8.2-141.169.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575248" comment="libtiff3-32bit-3.8.2-141.169.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575249" comment="tiff-3.8.2-141.169.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219508" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1106853" ref_url="https://bugzilla.suse.com/1106853" source="BUGZILLA"/>
		<reference ref_id="1108627" ref_url="https://bugzilla.suse.com/1108627" source="BUGZILLA"/>
		<reference ref_id="1108637" ref_url="https://bugzilla.suse.com/1108637" source="BUGZILLA"/>
		<reference ref_id="1110358" ref_url="https://bugzilla.suse.com/1110358" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11613" ref_url="https://www.suse.com/security/cve/CVE-2017-11613/" source="CVE"/>
		<reference ref_id="CVE-2017-9935" ref_url="https://www.suse.com/security/cve/CVE-2017-9935/" source="CVE"/>
		<reference ref_id="CVE-2018-16335" ref_url="https://www.suse.com/security/cve/CVE-2018-16335/" source="CVE"/>
		<reference ref_id="CVE-2018-17100" ref_url="https://www.suse.com/security/cve/CVE-2018-17100/" source="CVE"/>
		<reference ref_id="CVE-2018-17101" ref_url="https://www.suse.com/security/cve/CVE-2018-17101/" source="CVE"/>
		<reference ref_id="CVE-2018-17795" ref_url="https://www.suse.com/security/cve/CVE-2018-17795/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2018-17100: There is a int32 overflow in multiply_ms in tools/ppm2tiff.c, which can cause a denial of service (crash) or possibly have unspecified other impact via a crafted image file. (bsc#1108637)
- CVE-2018-17101: There are two out-of-bounds writes in cpTags in tools/tiff2bw.c and tools/pal2rgb.c, which can cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image file. (bsc#1108627)
- CVE-2018-17795: The function t2p_write_pdf in tiff2pdf.c allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, a similar issue to CVE-2017-9935. (bsc#1110358)
- CVE-2018-16335: newoffsets handling in ChopUpSingleUncompressedStrip in tif_dirread.c allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf. This is a different vulnerability than CVE-2018-15209. (bsc#1106853)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-24"/>
	<updated date="2018-10-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106853">SUSE bug 1106853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108627">SUSE bug 1108627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108637">SUSE bug 1108637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110358">SUSE bug 1110358</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11613/">CVE-2017-11613 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11613">CVE-2017-11613 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9935/">CVE-2017-9935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9935">CVE-2017-9935 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16335/">CVE-2018-16335 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16335">CVE-2018-16335 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17100/">CVE-2018-17100 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17100">CVE-2018-17100 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-17101/">CVE-2018-17101 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17101">CVE-2018-17101 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17795/">CVE-2018-17795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17795">CVE-2018-17795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575250" comment="libtiff3-3.8.2-141.169.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575251" comment="libtiff3-32bit-3.8.2-141.169.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575252" comment="tiff-3.8.2-141.169.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219509" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1010163" ref_url="https://bugzilla.suse.com/1010163" source="BUGZILLA"/>
		<reference ref_id="1014461" ref_url="https://bugzilla.suse.com/1014461" source="BUGZILLA"/>
		<reference ref_id="1040080" ref_url="https://bugzilla.suse.com/1040080" source="BUGZILLA"/>
		<reference ref_id="1040322" ref_url="https://bugzilla.suse.com/1040322" source="BUGZILLA"/>
		<reference ref_id="1074186" ref_url="https://bugzilla.suse.com/1074186" source="BUGZILLA"/>
		<reference ref_id="1099257" ref_url="https://bugzilla.suse.com/1099257" source="BUGZILLA"/>
		<reference ref_id="1113672" ref_url="https://bugzilla.suse.com/1113672" source="BUGZILLA"/>
		<reference ref_id="974446" ref_url="https://bugzilla.suse.com/974446" source="BUGZILLA"/>
		<reference ref_id="974447" ref_url="https://bugzilla.suse.com/974447" source="BUGZILLA"/>
		<reference ref_id="974448" ref_url="https://bugzilla.suse.com/974448" source="BUGZILLA"/>
		<reference ref_id="983440" ref_url="https://bugzilla.suse.com/983440" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8870" ref_url="https://www.suse.com/security/cve/CVE-2015-8870/" source="CVE"/>
		<reference ref_id="CVE-2016-3619" ref_url="https://www.suse.com/security/cve/CVE-2016-3619/" source="CVE"/>
		<reference ref_id="CVE-2016-3620" ref_url="https://www.suse.com/security/cve/CVE-2016-3620/" source="CVE"/>
		<reference ref_id="CVE-2016-3621" ref_url="https://www.suse.com/security/cve/CVE-2016-3621/" source="CVE"/>
		<reference ref_id="CVE-2016-5319" ref_url="https://www.suse.com/security/cve/CVE-2016-5319/" source="CVE"/>
		<reference ref_id="CVE-2016-9273" ref_url="https://www.suse.com/security/cve/CVE-2016-9273/" source="CVE"/>
		<reference ref_id="CVE-2017-17942" ref_url="https://www.suse.com/security/cve/CVE-2017-17942/" source="CVE"/>
		<reference ref_id="CVE-2017-9117" ref_url="https://www.suse.com/security/cve/CVE-2017-9117/" source="CVE"/>
		<reference ref_id="CVE-2017-9147" ref_url="https://www.suse.com/security/cve/CVE-2017-9147/" source="CVE"/>
		<reference ref_id="CVE-2018-12900" ref_url="https://www.suse.com/security/cve/CVE-2018-12900/" source="CVE"/>
		<reference ref_id="CVE-2018-18661" ref_url="https://www.suse.com/security/cve/CVE-2018-18661/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

Security issues fixed:

- CVE-2018-18661: Fixed NULL pointer dereference in the function LZWDecode in the file tif_lzw.c (bsc#1113672).
- CVE-2018-12900: Fixed heap-based buffer overflow in the cpSeparateBufToContigBuf (bsc#1099257).
- CVE-2017-9147: Fixed invalid read in the _TIFFVGetField function in tif_dir.c, that allowed remote attackers to cause a DoS via acrafted TIFF file (bsc#1040322). 
- CVE-2017-9117: Fixed BMP images processing that was verified without biWidth and biHeight values (bsc#1040080).
- CVE-2017-17942: Fixed issue in the function PackBitsEncode that could have led to a heap overflow and caused a DoS (bsc#1074186).
- CVE-2016-9273: Fixed heap-based buffer overflow issue (bsc#1010163).
- CVE-2016-5319: Fixed heap-based buffer overflow in PackBitsEncode (bsc#983440).
- CVE-2016-3621: Fixed out-of-bounds read in the bmp2tiff tool (lzw packing) (bsc#974448).
- CVE-2016-3620: Fixed out-of-bounds read in the bmp2tiff tool (zip packing) (bsc#974447)
- CVE-2016-3619: Fixed out-of-bounds read in the bmp2tiff tool (none packing) (bsc#974446)
- CVE-2015-8870: Fixed integer overflow in tools/bmp2tiff.c that allowed remote attackers to causea DOS (bsc#1014461).

Non-security issues fixed:

- asan_build: build ASAN included
- debug_build: build more suitable for debugging
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-23"/>
	<updated date="2018-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010163">SUSE bug 1010163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014461">SUSE bug 1014461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040080">SUSE bug 1040080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040322">SUSE bug 1040322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074186">SUSE bug 1074186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099257">SUSE bug 1099257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113672">SUSE bug 1113672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974446">SUSE bug 974446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974447">SUSE bug 974447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974448">SUSE bug 974448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983440">SUSE bug 983440</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8870/">CVE-2015-8870 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8870">CVE-2015-8870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3619/">CVE-2016-3619 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3619">CVE-2016-3619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3620/">CVE-2016-3620 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3620">CVE-2016-3620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3621/">CVE-2016-3621 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3621">CVE-2016-3621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5319/">CVE-2016-5319 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5319">CVE-2016-5319 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9273/">CVE-2016-9273 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9273">CVE-2016-9273 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17942/">CVE-2017-17942 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17942">CVE-2017-17942 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9117/">CVE-2017-9117 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9117">CVE-2017-9117 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9147/">CVE-2017-9147 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9147">CVE-2017-9147 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12900/">CVE-2018-12900 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12900">CVE-2018-12900 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18661/">CVE-2018-18661 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18661">CVE-2018-18661 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575253" comment="libtiff3-3.8.2-141.169.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575254" comment="libtiff3-32bit-3.8.2-141.169.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575255" comment="tiff-3.8.2-141.169.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219510" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1017693" ref_url="https://bugzilla.suse.com/1017693" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10092" ref_url="https://www.suse.com/security/cve/CVE-2016-10092/" source="CVE"/>
		<reference ref_id="CVE-2016-10093" ref_url="https://www.suse.com/security/cve/CVE-2016-10093/" source="CVE"/>
		<reference ref_id="CVE-2016-10094" ref_url="https://www.suse.com/security/cve/CVE-2016-10094/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:                                             
                                                                                     
Security issues fixed:                                                                         
                                                                                                                               
- CVE-2016-10094: Fixed heap-based buffer overflow in the _tiffWriteProc function (bsc#1017693).                   
- CVE-2016-10093: Fixed heap-based buffer overflow in the _TIFFmemcpy function (bsc#1017693).      
- CVE-2016-10092: Fixed heap-based buffer overflow in the TIFFReverseBits function (bsc#1017693).          
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017693">SUSE bug 1017693</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10092/">CVE-2016-10092 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10092">CVE-2016-10092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10093/">CVE-2016-10093 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10093">CVE-2016-10093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10094/">CVE-2016-10094 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10094">CVE-2016-10094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575256" comment="libtiff3-3.8.2-141.169.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575257" comment="libtiff3-32bit-3.8.2-141.169.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575258" comment="tiff-3.8.2-141.169.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219511" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1121626" ref_url="https://bugzilla.suse.com/1121626" source="BUGZILLA"/>
		<reference ref_id="983268" ref_url="https://bugzilla.suse.com/983268" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5102" ref_url="https://www.suse.com/security/cve/CVE-2016-5102/" source="CVE"/>
		<reference ref_id="CVE-2019-6128" ref_url="https://www.suse.com/security/cve/CVE-2019-6128/" source="CVE"/>
		<description>
This update for tiff fixes the following issue:

Security vulnerabilities fixed:

- CVE-2016-5102: Fixed a buffer overflow in readgifimage() (bsc#983268)
- CVE-2019-6128: Fixed a memory leak in the TIFFFdOpen function in tif_unix.c (bsc#1121626)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1121626">SUSE bug 1121626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983268">SUSE bug 983268</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5102/">CVE-2016-5102 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5102">CVE-2016-5102 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6128/">CVE-2019-6128 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6128">CVE-2019-6128 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575259" comment="libtiff3-3.8.2-141.169.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575260" comment="libtiff3-32bit-3.8.2-141.169.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575261" comment="tiff-3.8.2-141.169.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219512" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1156749" ref_url="https://bugzilla.suse.com/1156749" source="BUGZILLA"/>
		<reference ref_id="1156754" ref_url="https://bugzilla.suse.com/1156754" source="BUGZILLA"/>
		<reference ref_id="1182808" ref_url="https://bugzilla.suse.com/1182808" source="BUGZILLA"/>
		<reference ref_id="1182809" ref_url="https://bugzilla.suse.com/1182809" source="BUGZILLA"/>
		<reference ref_id="1182811" ref_url="https://bugzilla.suse.com/1182811" source="BUGZILLA"/>
		<reference ref_id="1182812" ref_url="https://bugzilla.suse.com/1182812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8665" ref_url="https://www.suse.com/security/cve/CVE-2015-8665/" source="CVE"/>
		<reference ref_id="CVE-2015-8683" ref_url="https://www.suse.com/security/cve/CVE-2015-8683/" source="CVE"/>
		<reference ref_id="CVE-2020-35521" ref_url="https://www.suse.com/security/cve/CVE-2020-35521/" source="CVE"/>
		<reference ref_id="CVE-2020-35522" ref_url="https://www.suse.com/security/cve/CVE-2020-35522/" source="CVE"/>
		<reference ref_id="CVE-2020-35523" ref_url="https://www.suse.com/security/cve/CVE-2020-35523/" source="CVE"/>
		<reference ref_id="CVE-2020-35524" ref_url="https://www.suse.com/security/cve/CVE-2020-35524/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2015-8683: Fixed out-of-bounds when reading CIE Lab image format files (bsc#1156754).
- CVE-2015-8665: Fixed out-of-bounds read in tif_getimage.c (bsc#1156749).
- CVE-2020-35521: Fixed memory allocation failure in tif_read.c (bsc#1182808).
- CVE-2020-35522: Fixed memory allocation failure in tif_pixarlog.c (bsc#1182809).
- CVE-2020-35523: Fixed integer overflow in tif_getimage.c (bsc#1182811).
- CVE-2020-35524: Fixed heap-based buffer overflow in TIFF2PDF tool (bsc#1182812).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156749">SUSE bug 1156749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156754">SUSE bug 1156754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182808">SUSE bug 1182808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182809">SUSE bug 1182809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182811">SUSE bug 1182811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182812">SUSE bug 1182812</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8665/">CVE-2015-8665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8665">CVE-2015-8665 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8683/">CVE-2015-8683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8683">CVE-2015-8683 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35521/">CVE-2020-35521 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35521">CVE-2020-35521 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35522/">CVE-2020-35522 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35522">CVE-2020-35522 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35523/">CVE-2020-35523 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35523">CVE-2020-35523 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35524/">CVE-2020-35524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35524">CVE-2020-35524 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666461" comment="libtiff3-3.8.2-141.169.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666462" comment="libtiff3-32bit-3.8.2-141.169.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666463" comment="tiff-3.8.2-141.169.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219513" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1154365" ref_url="https://bugzilla.suse.com/1154365" source="BUGZILLA"/>
		<reference ref_id="1197073" ref_url="https://bugzilla.suse.com/1197073" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17546" ref_url="https://www.suse.com/security/cve/CVE-2019-17546/" source="CVE"/>
		<reference ref_id="CVE-2022-0924" ref_url="https://www.suse.com/security/cve/CVE-2022-0924/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2022-0924: Fixed out-of-bounds read error in tiffcp that could have led to a denial-of-service via a crafted tiff file (bsc#1197073).
- CVE-2019-17546: Fixed integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image (bsc#1154365).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154365">SUSE bug 1154365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197073">SUSE bug 1197073</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17546/">CVE-2019-17546 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17546">CVE-2019-17546 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0924/">CVE-2022-0924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0924">CVE-2022-0924 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009683272" comment="libtiff3-3.8.2-141.169.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683273" comment="libtiff3-32bit-3.8.2-141.169.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683274" comment="tiff-3.8.2-141.169.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219514" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1153866" ref_url="https://bugzilla.suse.com/1153866" source="BUGZILLA"/>
		<reference ref_id="1202026" ref_url="https://bugzilla.suse.com/1202026" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17546" ref_url="https://www.suse.com/security/cve/CVE-2019-17546/" source="CVE"/>
		<reference ref_id="CVE-2022-34526" ref_url="https://www.suse.com/security/cve/CVE-2022-34526/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2022-34526: Fixed a stack overflow (bsc#1202026).
- CVE-2019-17546: Use shipped tiffconf.h instead of unshipped tif_config.h (bsc#1153866)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-05"/>
	<updated date="2022-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153866">SUSE bug 1153866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202026">SUSE bug 1202026</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17546/">CVE-2019-17546 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17546">CVE-2019-17546 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34526/">CVE-2022-34526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34526">CVE-2022-34526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994205" comment="libtiff3-3.8.2-141.169.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994206" comment="libtiff3-32bit-3.8.2-141.169.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994207" comment="tiff-3.8.2-141.169.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219515" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1205392" ref_url="https://bugzilla.suse.com/1205392" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3970" ref_url="https://www.suse.com/security/cve/CVE-2022-3970/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2022-3970: Fixed unsigned integer overflow in TIFFReadRGBATileExt() (bsc#1205392).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-15"/>
	<updated date="2023-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205392">SUSE bug 1205392</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3970/">CVE-2022-3970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3970">CVE-2022-3970 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994208" comment="libtiff3-3.8.2-141.169.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994209" comment="libtiff3-32bit-3.8.2-141.169.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994210" comment="tiff-3.8.2-141.169.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219516" version="1" class="patch">
	<metadata>
		<title>Security update for tightvnc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1155442" ref_url="https://bugzilla.suse.com/1155442" source="BUGZILLA"/>
		<reference ref_id="1155452" ref_url="https://bugzilla.suse.com/1155452" source="BUGZILLA"/>
		<reference ref_id="1155472" ref_url="https://bugzilla.suse.com/1155472" source="BUGZILLA"/>
		<reference ref_id="1155476" ref_url="https://bugzilla.suse.com/1155476" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15678" ref_url="https://www.suse.com/security/cve/CVE-2019-15678/" source="CVE"/>
		<reference ref_id="CVE-2019-15679" ref_url="https://www.suse.com/security/cve/CVE-2019-15679/" source="CVE"/>
		<reference ref_id="CVE-2019-15680" ref_url="https://www.suse.com/security/cve/CVE-2019-15680/" source="CVE"/>
		<reference ref_id="CVE-2019-8287" ref_url="https://www.suse.com/security/cve/CVE-2019-8287/" source="CVE"/>
		<description>
This update for tightvnc fixes the following issues:

- CVE-2019-15679: Fixed a heap buffer overflow in InitialiseRFBConnection 
  which might lead to code execution (bsc#1155476). 
- CVE-2019-8287: Fixed a global buffer overflow in HandleCoRREBBPmay which 
  might lead to code execution (bsc#1155472).
- CVE-2019-15680: Fixed a null pointer dereference in HandleZlibBPP which 
  could have led to denial of service (bsc#1155452).
- CVE-2019-15678: Fixed a heap buffer overflow in rfbServerCutText handler 
  (bsc#1155442).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-29"/>
	<updated date="2019-11-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155442">SUSE bug 1155442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155452">SUSE bug 1155452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155472">SUSE bug 1155472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155476">SUSE bug 1155476</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15678/">CVE-2019-15678 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15678">CVE-2019-15678 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15679/">CVE-2019-15679 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15679">CVE-2019-15679 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15680/">CVE-2019-15680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15680">CVE-2019-15680 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8287/">CVE-2019-8287 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8287">CVE-2019-8287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575262" comment="tightvnc-1.3.9-81.15.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219517" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="988489" ref_url="https://bugzilla.suse.com/988489" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5388" ref_url="https://www.suse.com/security/cve/CVE-2016-5388/" source="CVE"/>
		<description>

This update for tomcat6 fixes the following issue:

- CVE-2016-5388 Setting HTTP_PROXY environment variable via Proxy header (bsc#988489)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-02"/>
	<updated date="2016-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5388/">CVE-2016-5388 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5388">CVE-2016-5388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575263" comment="tomcat6-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575264" comment="tomcat6-admin-webapps-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575265" comment="tomcat6-docs-webapp-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575266" comment="tomcat6-javadoc-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575267" comment="tomcat6-jsp-2_1-api-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575268" comment="tomcat6-lib-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575269" comment="tomcat6-servlet-2_5-api-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575270" comment="tomcat6-webapps-6.0.45-0.53.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219518" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="768772" ref_url="https://bugzilla.suse.com/768772" source="BUGZILLA"/>
		<reference ref_id="804992" ref_url="https://bugzilla.suse.com/804992" source="BUGZILLA"/>
		<reference ref_id="818948" ref_url="https://bugzilla.suse.com/818948" source="BUGZILLA"/>
		<reference ref_id="822177" ref_url="https://bugzilla.suse.com/822177" source="BUGZILLA"/>
		<reference ref_id="831119" ref_url="https://bugzilla.suse.com/831119" source="BUGZILLA"/>
		<reference ref_id="906152" ref_url="https://bugzilla.suse.com/906152" source="BUGZILLA"/>
		<reference ref_id="917127" ref_url="https://bugzilla.suse.com/917127" source="BUGZILLA"/>
		<reference ref_id="918195" ref_url="https://bugzilla.suse.com/918195" source="BUGZILLA"/>
		<reference ref_id="926762" ref_url="https://bugzilla.suse.com/926762" source="BUGZILLA"/>
		<reference ref_id="931442" ref_url="https://bugzilla.suse.com/931442" source="BUGZILLA"/>
		<reference ref_id="932698" ref_url="https://bugzilla.suse.com/932698" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0022" ref_url="https://www.suse.com/security/cve/CVE-2012-0022/" source="CVE"/>
		<reference ref_id="CVE-2012-3544" ref_url="https://www.suse.com/security/cve/CVE-2012-3544/" source="CVE"/>
		<reference ref_id="CVE-2013-1976" ref_url="https://www.suse.com/security/cve/CVE-2013-1976/" source="CVE"/>
		<reference ref_id="CVE-2014-0227" ref_url="https://www.suse.com/security/cve/CVE-2014-0227/" source="CVE"/>
		<reference ref_id="CVE-2014-0230" ref_url="https://www.suse.com/security/cve/CVE-2014-0230/" source="CVE"/>
		<reference ref_id="CVE-2014-7810" ref_url="https://www.suse.com/security/cve/CVE-2014-7810/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001523.html" source="SUSE-SU"/>
		<description>

This update of tomcat6 fixes:

    * apache-tomcat-CVE-2012-3544.patch (bnc#831119)
    * use chown --no-dereference to prevent symlink attacks on log
      (bnc#822177#c7/prevents CVE-2013-1976)
    * Fix tomcat init scripts generating malformed classpath (
      http://youtrack.jetbrains.com/issue/JT-18545
      &lt;http://youtrack.jetbrains.com/issue/JT-18545&gt; ) bnc#804992 (patch
      from m407)
    * fix a typo in initscript (bnc#768772 )
    * copy all shell scripts (bnc#818948)

Security Issue references:

    * CVE-2012-3544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3544&gt;
    * CVE-2013-1976
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1976&gt;
    * CVE-2012-0022
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0022&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-02"/>
	<updated date="2013-08-02"/>
	<bugzilla href="https://bugzilla.suse.com/768772">SUSE bug 768772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804992">SUSE bug 804992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818948">SUSE bug 818948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822177">SUSE bug 822177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831119">SUSE bug 831119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906152">SUSE bug 906152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917127">SUSE bug 917127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918195">SUSE bug 918195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926762">SUSE bug 926762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931442">SUSE bug 931442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932698">SUSE bug 932698</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0022/">CVE-2012-0022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0022">CVE-2012-0022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3544/">CVE-2012-3544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3544">CVE-2012-3544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1976/">CVE-2013-1976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1976">CVE-2013-1976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0227/">CVE-2014-0227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0227">CVE-2014-0227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0230/">CVE-2014-0230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0230">CVE-2014-0230 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7810/">CVE-2014-7810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7810">CVE-2014-7810 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576962" comment="tomcat6-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576963" comment="tomcat6-admin-webapps-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576964" comment="tomcat6-docs-webapp-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576965" comment="tomcat6-javadoc-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576966" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576967" comment="tomcat6-lib-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576968" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576969" comment="tomcat6-webapps-6.0.18-20.35.42.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576962" comment="tomcat6-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576963" comment="tomcat6-admin-webapps-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576964" comment="tomcat6-docs-webapp-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576965" comment="tomcat6-javadoc-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576966" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576967" comment="tomcat6-lib-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576968" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576969" comment="tomcat6-webapps-6.0.18-20.35.42.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576962" comment="tomcat6-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576963" comment="tomcat6-admin-webapps-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576964" comment="tomcat6-docs-webapp-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576965" comment="tomcat6-javadoc-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576966" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576967" comment="tomcat6-lib-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576968" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576969" comment="tomcat6-webapps-6.0.18-20.35.42.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219519" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="934219" ref_url="https://bugzilla.suse.com/934219" source="BUGZILLA"/>
		<reference ref_id="967815" ref_url="https://bugzilla.suse.com/967815" source="BUGZILLA"/>
		<reference ref_id="967964" ref_url="https://bugzilla.suse.com/967964" source="BUGZILLA"/>
		<reference ref_id="967965" ref_url="https://bugzilla.suse.com/967965" source="BUGZILLA"/>
		<reference ref_id="967967" ref_url="https://bugzilla.suse.com/967967" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5174" ref_url="https://www.suse.com/security/cve/CVE-2015-5174/" source="CVE"/>
		<reference ref_id="CVE-2015-5345" ref_url="https://www.suse.com/security/cve/CVE-2015-5345/" source="CVE"/>
		<reference ref_id="CVE-2016-0706" ref_url="https://www.suse.com/security/cve/CVE-2016-0706/" source="CVE"/>
		<reference ref_id="CVE-2016-0714" ref_url="https://www.suse.com/security/cve/CVE-2016-0714/" source="CVE"/>
		<description>

This update for tomcat6 fixes the following issues:

The version was updated from 6.0.41 to 6.0.45.

Security issues fixed:

* CVE-2015-5174: Directory traversal vulnerability in RequestUtil.java
  in Apache Tomcat allowed remote authenticated users to bypass intended
  SecurityManager restrictions and list a parent directory via a /.. (slash
  dot dot) in a pathname used by a web application in a getResource,
  getResourceAsStream, or getResourcePaths call, as demonstrated by the
  $CATALINA_BASE/webapps directory.  (bsc#967967)
* CVE-2015-5345: The Mapper component in Apache Tomcat processes redirects
  before considering security constraints and Filters, which allowed remote
  attackers to determine the existence of a directory via a URL that lacks
  a trailing / (slash) character. (bsc#967965)
* CVE-2016-0706: Apache Tomcat did not place
  org.apache.catalina.manager.StatusManagerServlet on the
  org/apache/catalina/core/RestrictedServlets.properties list, which
  allowed remote authenticated users to bypass intended SecurityManager
  restrictions and read arbitrary HTTP requests, and consequently discover
  session ID values, via a crafted web application.  (bsc#967815)
* CVE-2016-0714: The session-persistence implementation in Apache Tomcat
  mishandled session attributes, which allowed remote authenticated users
  to bypass intended SecurityManager restrictions and execute arbitrary
  code in a privileged context via a web application that places a crafted
  object in a session. (bsc#967964)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-21"/>
	<updated date="2016-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/934219">SUSE bug 934219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967815">SUSE bug 967815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967964">SUSE bug 967964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967965">SUSE bug 967965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967967">SUSE bug 967967</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5174/">CVE-2015-5174 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5174">CVE-2015-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5345/">CVE-2015-5345 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5345">CVE-2015-5345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0706/">CVE-2016-0706 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0706">CVE-2016-0706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0714/">CVE-2016-0714 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0714">CVE-2016-0714 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575279" comment="tomcat6-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575280" comment="tomcat6-admin-webapps-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575281" comment="tomcat6-docs-webapp-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575282" comment="tomcat6-javadoc-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575283" comment="tomcat6-jsp-2_1-api-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575284" comment="tomcat6-lib-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575285" comment="tomcat6-servlet-2_5-api-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575286" comment="tomcat6-webapps-6.0.45-0.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219520" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1007853" ref_url="https://bugzilla.suse.com/1007853" source="BUGZILLA"/>
		<reference ref_id="1007854" ref_url="https://bugzilla.suse.com/1007854" source="BUGZILLA"/>
		<reference ref_id="1007855" ref_url="https://bugzilla.suse.com/1007855" source="BUGZILLA"/>
		<reference ref_id="1007857" ref_url="https://bugzilla.suse.com/1007857" source="BUGZILLA"/>
		<reference ref_id="1007858" ref_url="https://bugzilla.suse.com/1007858" source="BUGZILLA"/>
		<reference ref_id="1011805" ref_url="https://bugzilla.suse.com/1011805" source="BUGZILLA"/>
		<reference ref_id="1011812" ref_url="https://bugzilla.suse.com/1011812" source="BUGZILLA"/>
		<reference ref_id="1015119" ref_url="https://bugzilla.suse.com/1015119" source="BUGZILLA"/>
		<reference ref_id="1033448" ref_url="https://bugzilla.suse.com/1033448" source="BUGZILLA"/>
		<reference ref_id="1036642" ref_url="https://bugzilla.suse.com/1036642" source="BUGZILLA"/>
		<reference ref_id="988489" ref_url="https://bugzilla.suse.com/988489" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0762" ref_url="https://www.suse.com/security/cve/CVE-2016-0762/" source="CVE"/>
		<reference ref_id="CVE-2016-5018" ref_url="https://www.suse.com/security/cve/CVE-2016-5018/" source="CVE"/>
		<reference ref_id="CVE-2016-5388" ref_url="https://www.suse.com/security/cve/CVE-2016-5388/" source="CVE"/>
		<reference ref_id="CVE-2016-6794" ref_url="https://www.suse.com/security/cve/CVE-2016-6794/" source="CVE"/>
		<reference ref_id="CVE-2016-6796" ref_url="https://www.suse.com/security/cve/CVE-2016-6796/" source="CVE"/>
		<reference ref_id="CVE-2016-6797" ref_url="https://www.suse.com/security/cve/CVE-2016-6797/" source="CVE"/>
		<reference ref_id="CVE-2016-6816" ref_url="https://www.suse.com/security/cve/CVE-2016-6816/" source="CVE"/>
		<reference ref_id="CVE-2016-8735" ref_url="https://www.suse.com/security/cve/CVE-2016-8735/" source="CVE"/>
		<reference ref_id="CVE-2016-8745" ref_url="https://www.suse.com/security/cve/CVE-2016-8745/" source="CVE"/>
		<reference ref_id="CVE-2017-5647" ref_url="https://www.suse.com/security/cve/CVE-2017-5647/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002968.html" source="SUSE-SU"/>
		<description>
This update for tomcat6 fixes the following issues:

Tomcat was updated to version 6.0.53:

The full changelog is:
  http://tomcat.apache.org/tomcat-6.0-doc/changelog.html

Security issues fixed:

- CVE-2017-5647: A bug in the handling of pipelined requests could lead to information disclosure (bsc#1036642)
- CVE-2016-8745: Regression in the error handling methods could lead to information disclosure (bsc#1015119) 
- CVE-2016-8735: Remote code execution vulnerability in JmxRemoteLifecycleListener (bsc#1011805)
- CVE-2016-6816: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests (bsc#1011812)
- CVE-2016-6797: Unrestricted Access to Global Resources (bsc#1007853)
- CVE-2016-6796: Manager Bypass (bsc#1007858)
- CVE-2016-6794: System Property Disclosure (bsc#1007857)
- CVE-2016-5018: Security Manager Bypass (bsc#1007855)
- CVE-2016-0762: Realm Timing Attack (bsc#1007854)
- CVE-2016-5388: an arbitrary HTTP_PROXY environment variable might allow remote attackers to redirect  outbound HTTP traffic (bsc#988489)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-21"/>
	<updated date="2017-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1007853">SUSE bug 1007853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007854">SUSE bug 1007854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007855">SUSE bug 1007855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007857">SUSE bug 1007857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007858">SUSE bug 1007858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011805">SUSE bug 1011805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011812">SUSE bug 1011812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015119">SUSE bug 1015119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033448">SUSE bug 1033448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036642">SUSE bug 1036642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0762/">CVE-2016-0762 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0762">CVE-2016-0762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5018/">CVE-2016-5018 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5018">CVE-2016-5018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5388/">CVE-2016-5388 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5388">CVE-2016-5388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6794/">CVE-2016-6794 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6794">CVE-2016-6794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6796/">CVE-2016-6796 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6796">CVE-2016-6796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6797/">CVE-2016-6797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6797">CVE-2016-6797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6816/">CVE-2016-6816 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6816">CVE-2016-6816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8735/">CVE-2016-8735 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8735">CVE-2016-8735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8745/">CVE-2016-8745 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8745">CVE-2016-8745 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5647/">CVE-2017-5647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5647">CVE-2017-5647 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569238" comment="tomcat6-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569239" comment="tomcat6-admin-webapps-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569240" comment="tomcat6-docs-webapp-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569241" comment="tomcat6-javadoc-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569242" comment="tomcat6-jsp-2_1-api-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569243" comment="tomcat6-lib-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569244" comment="tomcat6-servlet-2_5-api-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569245" comment="tomcat6-webapps-6.0.53-0.56.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569238" comment="tomcat6-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569239" comment="tomcat6-admin-webapps-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569240" comment="tomcat6-docs-webapp-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569241" comment="tomcat6-javadoc-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569242" comment="tomcat6-jsp-2_1-api-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569243" comment="tomcat6-lib-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569244" comment="tomcat6-servlet-2_5-api-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569245" comment="tomcat6-webapps-6.0.53-0.56.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219521" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1042910" ref_url="https://bugzilla.suse.com/1042910" source="BUGZILLA"/>
		<reference ref_id="1082480" ref_url="https://bugzilla.suse.com/1082480" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5664" ref_url="https://www.suse.com/security/cve/CVE-2017-5664/" source="CVE"/>
		<reference ref_id="CVE-2018-1304" ref_url="https://www.suse.com/security/cve/CVE-2018-1304/" source="CVE"/>
		<description>
This update for tomcat6 fixes the following security issues:

- : The error page mechanism of the Java Servlet Specification
  requires that, when an error occurs and an error page is configured for the
  error that occurred, the original request and response are forwarded to the
  error page. This means that the request is presented to the error page with the
  original HTTP method. If the error page is a static file, expected behaviour is
  to serve content of the file as if processing a GET request, regardless of the
  actual HTTP method. The Default Servlet in Tomcat did not do this. Depending on
  the original request this could lead to unexpected and undesirable results for
  static error pages including, if the DefaultServlet is configured to permit
  writes, the replacement or removal of the custom error page (bsc#1042910).
- : The URL pattern of '' was not correctly handled when used as
  part of a security constraint definition. This caused the constraint to be
  ignored. It was possible for unauthorised users to gain access to web
  application resources that should have been protected. Only security
  constraints with a URL pattern of the empty string were affected (bsc#1082480).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-29"/>
	<updated date="2018-06-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042910">SUSE bug 1042910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082480">SUSE bug 1082480</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5664/">CVE-2017-5664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5664">CVE-2017-5664 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1304/">CVE-2018-1304 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1304">CVE-2018-1304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575287" comment="tomcat6-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575288" comment="tomcat6-admin-webapps-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575289" comment="tomcat6-docs-webapp-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575290" comment="tomcat6-javadoc-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575291" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575292" comment="tomcat6-lib-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575293" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575294" comment="tomcat6-webapps-6.0.53-0.57.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219522" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1110850" ref_url="https://bugzilla.suse.com/1110850" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11784" ref_url="https://www.suse.com/security/cve/CVE-2018-11784/" source="CVE"/>
		<description>
This update for tomcat6 fixes the following issue:

Security issue fixed:

- CVE-2018-11784: Fixed problem with specially crafted URLs that could be used to cause a redirect to any URI of an attackers choise (bsc#1110850).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-28"/>
	<updated date="2018-11-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1110850">SUSE bug 1110850</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-11784/">CVE-2018-11784 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11784">CVE-2018-11784 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575295" comment="tomcat6-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575296" comment="tomcat6-admin-webapps-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575297" comment="tomcat6-docs-webapp-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575298" comment="tomcat6-javadoc-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575299" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575300" comment="tomcat6-lib-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575301" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575302" comment="tomcat6-webapps-6.0.53-0.57.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219523" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1164692" ref_url="https://bugzilla.suse.com/1164692" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<description>
This update for tomcat6 fixes the following issues:

- CVE-2020-1938: Fixed a file contents disclosure vulnerability (bsc#1164692).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-27"/>
	<updated date="2020-03-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1164692">SUSE bug 1164692</bugzilla>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1938">CVE-2020-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569246" comment="tomcat6-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569247" comment="tomcat6-admin-webapps-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569248" comment="tomcat6-docs-webapp-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569249" comment="tomcat6-javadoc-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569250" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569251" comment="tomcat6-lib-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569252" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569253" comment="tomcat6-webapps-6.0.53-0.57.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219524" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1136085" ref_url="https://bugzilla.suse.com/1136085" source="BUGZILLA"/>
		<reference ref_id="1159723" ref_url="https://bugzilla.suse.com/1159723" source="BUGZILLA"/>
		<reference ref_id="1171928" ref_url="https://bugzilla.suse.com/1171928" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0221" ref_url="https://www.suse.com/security/cve/CVE-2019-0221/" source="CVE"/>
		<reference ref_id="CVE-2019-12418" ref_url="https://www.suse.com/security/cve/CVE-2019-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-9484" ref_url="https://www.suse.com/security/cve/CVE-2020-9484/" source="CVE"/>
		<description>
This update for tomcat6 fixes the following issues:

CVE-2020-9484 (bsc#1171928)
Apache Tomcat Remote Code Execution via session persistence

If an attacker was able to control the contents and name of a file on a
server configured to use the PersistenceManager, then the attacker could
have triggered a remote code execution via deserialization of the file under
their control.

CVE-2019-12418 (bsc#1159723)
Local privilege escalation by manipulating the RMI registry and performing a man-in-the-middle attack

When Tomcat is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files was able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface.
The attacker could then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.

CVE-2019-0221 (bsc#1136085)
The SSI printenv command echoed user provided data without escaping, which
made it vulnerable to XSS.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-22"/>
	<updated date="2020-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136085">SUSE bug 1136085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159723">SUSE bug 1159723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171928">SUSE bug 1171928</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0221/">CVE-2019-0221 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0221">CVE-2019-0221 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12418/">CVE-2019-12418 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12418">CVE-2019-12418 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9484/">CVE-2020-9484 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9484">CVE-2020-9484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569254" comment="tomcat6-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569255" comment="tomcat6-admin-webapps-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569256" comment="tomcat6-docs-webapp-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569257" comment="tomcat6-javadoc-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569258" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569259" comment="tomcat6-lib-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569260" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569261" comment="tomcat6-webapps-6.0.53-0.57.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219525" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1059554" ref_url="https://bugzilla.suse.com/1059554" source="BUGZILLA"/>
		<reference ref_id="1180947" ref_url="https://bugzilla.suse.com/1180947" source="BUGZILLA"/>
		<reference ref_id="1182909" ref_url="https://bugzilla.suse.com/1182909" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12617" ref_url="https://www.suse.com/security/cve/CVE-2017-12617/" source="CVE"/>
		<reference ref_id="CVE-2021-24122" ref_url="https://www.suse.com/security/cve/CVE-2021-24122/" source="CVE"/>
		<reference ref_id="CVE-2021-25329" ref_url="https://www.suse.com/security/cve/CVE-2021-25329/" source="CVE"/>
		<description>
This update for tomcat6 fixes the following issues:

- CVE-2021-25329: Fixed completely CVE-2020-9484 (bsc#1182909).
- CVE-2021-24122: Fixed an information disclosure (bsc#1180947).
- CVE-2017-12617: Fixed a file inclusion vulnerability through a crafted request (bsc#1059554).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-21"/>
	<updated date="2021-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059554">SUSE bug 1059554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180947">SUSE bug 1180947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182909">SUSE bug 1182909</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12617/">CVE-2017-12617 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12617">CVE-2017-12617 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-24122/">CVE-2021-24122 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24122">CVE-2021-24122 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25329/">CVE-2021-25329 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25329">CVE-2021-25329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569262" comment="tomcat6-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569263" comment="tomcat6-admin-webapps-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569264" comment="tomcat6-docs-webapp-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569265" comment="tomcat6-javadoc-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569266" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569267" comment="tomcat6-lib-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569268" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569269" comment="tomcat6-webapps-6.0.53-0.57.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219526" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204918" ref_url="https://bugzilla.suse.com/1204918" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42252" ref_url="https://www.suse.com/security/cve/CVE-2022-42252/" source="CVE"/>
		<description>
This update for tomcat6 fixes the following issues:

- CVE-2022-42252: Fixed a request smuggling (bsc#1204918).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-25"/>
	<updated date="2022-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204918">SUSE bug 1204918</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42252/">CVE-2022-42252 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42252">CVE-2022-42252 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994211" comment="tomcat6-6.0.53-0.57.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994212" comment="tomcat6-admin-webapps-6.0.53-0.57.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994213" comment="tomcat6-docs-webapp-6.0.53-0.57.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994214" comment="tomcat6-javadoc-6.0.53-0.57.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994215" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994216" comment="tomcat6-lib-6.0.53-0.57.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994217" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994218" comment="tomcat6-webapps-6.0.53-0.57.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219527" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="844689" ref_url="https://bugzilla.suse.com/844689" source="BUGZILLA"/>
		<reference ref_id="865746" ref_url="https://bugzilla.suse.com/865746" source="BUGZILLA"/>
		<reference ref_id="880346" ref_url="https://bugzilla.suse.com/880346" source="BUGZILLA"/>
		<reference ref_id="880347" ref_url="https://bugzilla.suse.com/880347" source="BUGZILLA"/>
		<reference ref_id="880348" ref_url="https://bugzilla.suse.com/880348" source="BUGZILLA"/>
		<reference ref_id="881700" ref_url="https://bugzilla.suse.com/881700" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3544" ref_url="https://www.suse.com/security/cve/CVE-2012-3544/" source="CVE"/>
		<reference ref_id="CVE-2013-4322" ref_url="https://www.suse.com/security/cve/CVE-2013-4322/" source="CVE"/>
		<reference ref_id="CVE-2014-0096" ref_url="https://www.suse.com/security/cve/CVE-2014-0096/" source="CVE"/>
		<reference ref_id="CVE-2014-0099" ref_url="https://www.suse.com/security/cve/CVE-2014-0099/" source="CVE"/>
		<reference ref_id="CVE-2014-0119" ref_url="https://www.suse.com/security/cve/CVE-2014-0119/" source="CVE"/>
		<description>

Tomcat has been updated to version 6.0.41, which brings security and bug 
fixes.

The following security fixes have been fixed:

    * CVE-2014-0096: A XXE vulnerability via user supplied XSLTs.
    * CVE-2014-0099: Request smuggling via malicious content length header.
    * CVE-2014-0119: A XML parser hijack by malicious web application.

Bugs fixed:

    * Socket bind fails on tomcat startup when using apr (IPV6)
      (bnc#881700)
    * classpath for org/apache/juli/logging/LogFactory (bnc#844689)

Security Issues:

    * CVE-2013-4322
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4322&gt;
    * CVE-2012-3544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3544&gt;
    * CVE-2014-0099
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0099&gt;
    * CVE-2014-0096
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0096&gt;
    * CVE-2014-0119
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0119&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-06"/>
	<updated date="2014-07-06"/>
	<bugzilla href="https://bugzilla.suse.com/844689">SUSE bug 844689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865746">SUSE bug 865746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880346">SUSE bug 880346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880347">SUSE bug 880347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880348">SUSE bug 880348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881700">SUSE bug 881700</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3544/">CVE-2012-3544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3544">CVE-2012-3544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4322/">CVE-2013-4322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4322">CVE-2013-4322 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0096/">CVE-2014-0096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0096">CVE-2014-0096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0099/">CVE-2014-0099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0099">CVE-2014-0099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0119/">CVE-2014-0119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0119">CVE-2014-0119 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581502" comment="libtcnative-1-0-1.3.3-12.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572500" comment="tomcat6-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572501" comment="tomcat6-admin-webapps-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572502" comment="tomcat6-docs-webapp-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572503" comment="tomcat6-javadoc-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572504" comment="tomcat6-jsp-2_1-api-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572505" comment="tomcat6-lib-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572506" comment="tomcat6-servlet-2_5-api-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572507" comment="tomcat6-webapps-6.0.41-0.43.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581502" comment="libtcnative-1-0-1.3.3-12.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572500" comment="tomcat6-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572501" comment="tomcat6-admin-webapps-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572502" comment="tomcat6-docs-webapp-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572503" comment="tomcat6-javadoc-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572504" comment="tomcat6-jsp-2_1-api-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572505" comment="tomcat6-lib-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572506" comment="tomcat6-servlet-2_5-api-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572507" comment="tomcat6-webapps-6.0.41-0.43.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581502" comment="libtcnative-1-0-1.3.3-12.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572500" comment="tomcat6-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572501" comment="tomcat6-admin-webapps-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572502" comment="tomcat6-docs-webapp-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572503" comment="tomcat6-javadoc-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572504" comment="tomcat6-jsp-2_1-api-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572505" comment="tomcat6-lib-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572506" comment="tomcat6-servlet-2_5-api-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572507" comment="tomcat6-webapps-6.0.41-0.43.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219528" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1069257" ref_url="https://bugzilla.suse.com/1069257" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16899" ref_url="https://www.suse.com/security/cve/CVE-2017-16899/" source="CVE"/>
		<description>
This update for transfig fixes the following issues:

Security issue fixed:

- CVE-2017-16899: Fix array index error in the fig2dev program (bsc#1069257).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1069257">SUSE bug 1069257</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16899/">CVE-2017-16899 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16899">CVE-2017-16899 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575303" comment="transfig-3.2.5-160.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219529" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1106531" ref_url="https://bugzilla.suse.com/1106531" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16140" ref_url="https://www.suse.com/security/cve/CVE-2018-16140/" source="CVE"/>
		<description>
This update for transfig fixes the following issues:

Security issue fixed:

- CVE-2018-16140: Fixed a buffer underwrite vulnerability in get_line() in
  read.c, which allowed an attacker to write prior to the beginning of the
  buffer via specially crafted .fig file (bsc#1106531)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1106531">SUSE bug 1106531</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16140/">CVE-2018-16140 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16140">CVE-2018-16140 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575304" comment="transfig-3.2.5-160.6.20 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219530" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1136882" ref_url="https://bugzilla.suse.com/1136882" source="BUGZILLA"/>
		<reference ref_id="1143650" ref_url="https://bugzilla.suse.com/1143650" source="BUGZILLA"/>
		<reference ref_id="1159130" ref_url="https://bugzilla.suse.com/1159130" source="BUGZILLA"/>
		<reference ref_id="1159293" ref_url="https://bugzilla.suse.com/1159293" source="BUGZILLA"/>
		<reference ref_id="1161698" ref_url="https://bugzilla.suse.com/1161698" source="BUGZILLA"/>
		<reference ref_id="1186329" ref_url="https://bugzilla.suse.com/1186329" source="BUGZILLA"/>
		<reference ref_id="1189325" ref_url="https://bugzilla.suse.com/1189325" source="BUGZILLA"/>
		<reference ref_id="1189343" ref_url="https://bugzilla.suse.com/1189343" source="BUGZILLA"/>
		<reference ref_id="1189345" ref_url="https://bugzilla.suse.com/1189345" source="BUGZILLA"/>
		<reference ref_id="1189346" ref_url="https://bugzilla.suse.com/1189346" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14275" ref_url="https://www.suse.com/security/cve/CVE-2019-14275/" source="CVE"/>
		<reference ref_id="CVE-2019-19555" ref_url="https://www.suse.com/security/cve/CVE-2019-19555/" source="CVE"/>
		<reference ref_id="CVE-2019-19746" ref_url="https://www.suse.com/security/cve/CVE-2019-19746/" source="CVE"/>
		<reference ref_id="CVE-2019-19797" ref_url="https://www.suse.com/security/cve/CVE-2019-19797/" source="CVE"/>
		<reference ref_id="CVE-2020-21680" ref_url="https://www.suse.com/security/cve/CVE-2020-21680/" source="CVE"/>
		<reference ref_id="CVE-2020-21681" ref_url="https://www.suse.com/security/cve/CVE-2020-21681/" source="CVE"/>
		<reference ref_id="CVE-2020-21682" ref_url="https://www.suse.com/security/cve/CVE-2020-21682/" source="CVE"/>
		<reference ref_id="CVE-2020-21683" ref_url="https://www.suse.com/security/cve/CVE-2020-21683/" source="CVE"/>
		<reference ref_id="CVE-2021-3561" ref_url="https://www.suse.com/security/cve/CVE-2021-3561/" source="CVE"/>
		<description>
This update for transfig fixes the following issues:

- CVE-2021-3561: Fixed global buffer overflow in fig2dev/read.c in function read_colordef() (bsc#1186329).
- CVE-2019-19797: Fixed out-of-bounds write in read_colordef in read.c (bsc#1159293).
- CVE-2019-19746: Fixed segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type (bsc#1159130).
- CVE-2019-19555: Fixed stack-based buffer overflow because of an incorrect sscanf (bsc#1161698).
- CVE-2019-14275: Fixed stack-based buffer overflow in the calc_arrow function in bound.c (bsc#1143650).
- CVE-2020-21680: Fixed a stack-based buffer overflow in the put_arrow() component in genpict2e.c (bsc#1189343).
- CVE-2020-21681: Fixed a global buffer overflow in the set_color component in genge.c (bsc#1189345).
- CVE-2020-21682: Fixed a global buffer overflow in the set_fill component in genge.c (bsc#1189346).
- CVE-2020-21683: Fixed a global buffer overflow in the shade_or_tint_name_after_declare_color in genpstricks.c (bsc#1189325).

- Do hardening via compile and linker flags 
- Fixed last added upstream commit (boo#1136882)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136882">SUSE bug 1136882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143650">SUSE bug 1143650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159130">SUSE bug 1159130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159293">SUSE bug 1159293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161698">SUSE bug 1161698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186329">SUSE bug 1186329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189325">SUSE bug 1189325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189343">SUSE bug 1189343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189345">SUSE bug 1189345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189346">SUSE bug 1189346</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14275/">CVE-2019-14275 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14275">CVE-2019-14275 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19555/">CVE-2019-19555 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19555">CVE-2019-19555 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19746/">CVE-2019-19746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19746">CVE-2019-19746 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19797/">CVE-2019-19797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19797">CVE-2019-19797 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21680/">CVE-2020-21680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21680">CVE-2020-21680 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21681/">CVE-2020-21681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21681">CVE-2020-21681 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21682/">CVE-2020-21682 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21682">CVE-2020-21682 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21683/">CVE-2020-21683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21683">CVE-2020-21683 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3561/">CVE-2021-3561 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3561">CVE-2021-3561 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651176" comment="transfig-3.2.8a-1.160.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219531" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1190607" ref_url="https://bugzilla.suse.com/1190607" source="BUGZILLA"/>
		<reference ref_id="1190611" ref_url="https://bugzilla.suse.com/1190611" source="BUGZILLA"/>
		<reference ref_id="1190612" ref_url="https://bugzilla.suse.com/1190612" source="BUGZILLA"/>
		<reference ref_id="1190615" ref_url="https://bugzilla.suse.com/1190615" source="BUGZILLA"/>
		<reference ref_id="1190616" ref_url="https://bugzilla.suse.com/1190616" source="BUGZILLA"/>
		<reference ref_id="1190617" ref_url="https://bugzilla.suse.com/1190617" source="BUGZILLA"/>
		<reference ref_id="1190618" ref_url="https://bugzilla.suse.com/1190618" source="BUGZILLA"/>
		<reference ref_id="1192019" ref_url="https://bugzilla.suse.com/1192019" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-21529" ref_url="https://www.suse.com/security/cve/CVE-2020-21529/" source="CVE"/>
		<reference ref_id="CVE-2020-21530" ref_url="https://www.suse.com/security/cve/CVE-2020-21530/" source="CVE"/>
		<reference ref_id="CVE-2020-21531" ref_url="https://www.suse.com/security/cve/CVE-2020-21531/" source="CVE"/>
		<reference ref_id="CVE-2020-21532" ref_url="https://www.suse.com/security/cve/CVE-2020-21532/" source="CVE"/>
		<reference ref_id="CVE-2020-21533" ref_url="https://www.suse.com/security/cve/CVE-2020-21533/" source="CVE"/>
		<reference ref_id="CVE-2020-21534" ref_url="https://www.suse.com/security/cve/CVE-2020-21534/" source="CVE"/>
		<reference ref_id="CVE-2020-21535" ref_url="https://www.suse.com/security/cve/CVE-2020-21535/" source="CVE"/>
		<reference ref_id="CVE-2021-32280" ref_url="https://www.suse.com/security/cve/CVE-2021-32280/" source="CVE"/>
		<description>
This update for transfig fixes the following issues:

Update to fig2dev version 3.2.8 Patchlevel 8b (Aug 2021)

- bsc#1190618, CVE-2020-21529: stack buffer overflow in the bezier_spline function in genepic.c.
- bsc#1190615, CVE-2020-21530: segmentation fault in the read_objects function in read.c.
- bsc#1190617, CVE-2020-21531: global buffer overflow in the conv_pattern_index function in gencgm.c.
- bsc#1190616, CVE-2020-21532: global buffer overflow in the setfigfont function in genepic.c.
- bsc#1190612, CVE-2020-21533: stack buffer overflow in the read_textobject function in read.c.
- bsc#1190611, CVE-2020-21534: global buffer overflow in the get_line function in read.c.
- bsc#1190607, CVE-2020-21535: segmentation fault in the gencgm_start function in gencgm.c.
- bsc#1192019, CVE-2021-32280: NULL pointer dereference in compute_closed_spline() in trans_spline.c
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-02"/>
	<updated date="2021-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190607">SUSE bug 1190607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190611">SUSE bug 1190611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190612">SUSE bug 1190612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190615">SUSE bug 1190615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190616">SUSE bug 1190616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190617">SUSE bug 1190617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190618">SUSE bug 1190618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192019">SUSE bug 1192019</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21529/">CVE-2020-21529 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21529">CVE-2020-21529 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21530/">CVE-2020-21530 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21530">CVE-2020-21530 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21531/">CVE-2020-21531 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21531">CVE-2020-21531 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21532/">CVE-2020-21532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21532">CVE-2020-21532 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21533/">CVE-2020-21533 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21533">CVE-2020-21533 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21534/">CVE-2020-21534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21534">CVE-2020-21534 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21535/">CVE-2020-21535 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21535">CVE-2020-21535 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32280/">CVE-2021-32280 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32280">CVE-2021-32280 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653706" comment="transfig-3.2.8b-160.16.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219532" version="1" class="patch">
	<metadata>
		<title>Security update for trousers (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1164472" ref_url="https://bugzilla.suse.com/1164472" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24330" ref_url="https://www.suse.com/security/cve/CVE-2020-24330/" source="CVE"/>
		<description>
This update for trousers fixes the following issues:

- CVE-2020-24330: Fixed a potential tss user to root privilege
  escalation issue (bsc#1164472).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-12"/>
	<updated date="2022-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1164472">SUSE bug 1164472</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24330/">CVE-2020-24330 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24330">CVE-2020-24330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994219" comment="libtspi1-0.3.10-0.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994220" comment="libtspi1-32bit-0.3.10-0.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994221" comment="trousers-0.3.10-0.11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219533" version="1" class="patch">
	<metadata>
		<title>Security update for unrar (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1045315" ref_url="https://bugzilla.suse.com/1045315" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003000.html" source="SUSE-SU"/>
		<description>
This update for unrar fixes the following issues:

- CVE-2012-6706: decoding malicious RAR files could have lead to memory corruption or code execution. (bsc#1045315).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-03"/>
	<updated date="2017-07-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045315">SUSE bug 1045315</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6706">CVE-2012-6706 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581503" comment="unrar-3.80.2-4.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581503" comment="unrar-3.80.2-4.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219534" version="1" class="patch">
	<metadata>
		<title>Security update for unrar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1046882" ref_url="https://bugzilla.suse.com/1046882" source="BUGZILLA"/>
		<reference ref_id="1054038" ref_url="https://bugzilla.suse.com/1054038" source="BUGZILLA"/>
		<reference ref_id="513804" ref_url="https://bugzilla.suse.com/513804" source="BUGZILLA"/>
		<reference ref_id="693890" ref_url="https://bugzilla.suse.com/693890" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="CVE-2017-12938" ref_url="https://www.suse.com/security/cve/CVE-2017-12938/" source="CVE"/>
		<reference ref_id="CVE-2017-12940" ref_url="https://www.suse.com/security/cve/CVE-2017-12940/" source="CVE"/>
		<reference ref_id="CVE-2017-12941" ref_url="https://www.suse.com/security/cve/CVE-2017-12941/" source="CVE"/>
		<reference ref_id="CVE-2017-12942" ref_url="https://www.suse.com/security/cve/CVE-2017-12942/" source="CVE"/>
		<description>
This update for unrar to version 5.6.1 fixes several issues.

These security issues were fixed:

- CVE-2017-12938: Prevent remote attackers to bypass a directory-traversal
  protection mechanism via vectors involving a symlink to the . directory, a
  symlink to the .. directory, and a regular file (bsc#1054038).
- CVE-2017-12940: Prevent out-of-bounds read in the EncodeFileName::Decode call
  within the Archive::ReadHeader15 function (bsc#1054038).
- CVE-2017-12941: Prevent an out-of-bounds read in the Unpack::Unpack20
  function (bsc#1054038).
- CVE-2017-12942: Prevent a buffer overflow in the Unpack::LongLZ function
  (bsc#1054038).

These non-security issues were fixed:

- Added extraction support for .LZ archives created by Lzip compressor
- Enable unpacking of files in ZIP archives compressed with XZ algorithm and
  encrypted with AES
- Added support for PAX extended headers inside of TAR archive
- If RAR recovery volumes (.rev files) are present in the same folder as usual
  RAR volumes, archive test command verifies .rev contents after completing
  testing .rar files
- By default unrar skips symbolic links with absolute paths in link target when
  extracting unless -ola command line switch is specified
- Added support for AES-NI CPU instructions 
- Support for a new RAR 5.0 archiving format
- Wildcard exclusion mask for folders
- Added libunrar* and libunrar*-devel subpackages (bsc#513804)
- Prevent conditional jumps depending on uninitialised values (bsc#1046882)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046882">SUSE bug 1046882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054038">SUSE bug 1054038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/513804">SUSE bug 513804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693890">SUSE bug 693890</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6706">CVE-2012-6706 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12938/">CVE-2017-12938 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12938">CVE-2017-12938 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12940/">CVE-2017-12940 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12940">CVE-2017-12940 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12941/">CVE-2017-12941 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12941">CVE-2017-12941 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12942/">CVE-2017-12942 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12942">CVE-2017-12942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575306" comment="unrar-5.6.1-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219535" version="1" class="patch">
	<metadata>
		<title>Security update for unrar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199349" ref_url="https://bugzilla.suse.com/1199349" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-30333" ref_url="https://www.suse.com/security/cve/CVE-2022-30333/" source="CVE"/>
		<description>
This update for unrar fixes the following issues:

- CVE-2022-30333: Fixed directory traversal issue that allowed writing to non-designated paths (bsc#1199349).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-19"/>
	<updated date="2022-05-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1199349">SUSE bug 1199349</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-30333/">CVE-2022-30333 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30333">CVE-2022-30333 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683761" comment="unrar-5.6.1-5.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219536" version="1" class="patch">
	<metadata>
		<title>Security update for unzip</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="909214" ref_url="https://bugzilla.suse.com/909214" source="BUGZILLA"/>
		<reference ref_id="914442" ref_url="https://bugzilla.suse.com/914442" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8139" ref_url="https://www.suse.com/security/cve/CVE-2014-8139/" source="CVE"/>
		<reference ref_id="CVE-2014-8140" ref_url="https://www.suse.com/security/cve/CVE-2014-8140/" source="CVE"/>
		<reference ref_id="CVE-2014-8141" ref_url="https://www.suse.com/security/cve/CVE-2014-8141/" source="CVE"/>
		<reference ref_id="CVE-2014-9636" ref_url="https://www.suse.com/security/cve/CVE-2014-9636/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001255.html" source="SUSE-SU"/>
		<description>

This update fixes the following security issues:

    * CVE-2014-8139: input sanitization errors (bnc#909214)
    * CVE-2014-9636: out-of-bounds read/write in test_compr_eb()
      (bnc#914442)

Security Issues:

    * CVE-2014-9636
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9636&gt;
    * CVE-2014-8139
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8139&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-20"/>
	<updated date="2015-02-20"/>
	<bugzilla href="https://bugzilla.suse.com/909214">SUSE bug 909214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914442">SUSE bug 914442</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8139/">CVE-2014-8139 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8139">CVE-2014-8139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8140/">CVE-2014-8140 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8140">CVE-2014-8140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8141/">CVE-2014-8141 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8141">CVE-2014-8141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9636/">CVE-2014-9636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9636">CVE-2014-9636 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581504" comment="unzip-6.00-11.13.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581504" comment="unzip-6.00-11.13.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581504" comment="unzip-6.00-11.13.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219537" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1013992" ref_url="https://bugzilla.suse.com/1013992" source="BUGZILLA"/>
		<reference ref_id="1013993" ref_url="https://bugzilla.suse.com/1013993" source="BUGZILLA"/>
		<reference ref_id="950110" ref_url="https://bugzilla.suse.com/950110" source="BUGZILLA"/>
		<reference ref_id="950111" ref_url="https://bugzilla.suse.com/950111" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9913" ref_url="https://www.suse.com/security/cve/CVE-2014-9913/" source="CVE"/>
		<reference ref_id="CVE-2015-7696" ref_url="https://www.suse.com/security/cve/CVE-2015-7696/" source="CVE"/>
		<reference ref_id="CVE-2015-7697" ref_url="https://www.suse.com/security/cve/CVE-2015-7697/" source="CVE"/>
		<reference ref_id="CVE-2016-9844" ref_url="https://www.suse.com/security/cve/CVE-2016-9844/" source="CVE"/>
		<description>
This update for unzip fixes the following issues:

- CVE-2014-9913: Specially crafted zip files could trigger invalid memory writes possibly resulting in DoS or corruption (bsc#1013993)
- CVE-2015-7696: Specially crafted zip files with password protection could trigger a crash and lead to denial of service (bsc#950110)
- CVE-2015-7697: Specially crafted zip files could trigger an endless loop and lead to denial of service (bsc#950111)
- CVE-2016-9844: Specially crafted zip files could trigger invalid memory writes possibly resulting in DoS or corruption (bsc#1013992)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-06"/>
	<updated date="2017-03-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013992">SUSE bug 1013992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013993">SUSE bug 1013993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950110">SUSE bug 950110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950111">SUSE bug 950111</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9913/">CVE-2014-9913 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9913">CVE-2014-9913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7696/">CVE-2015-7696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7696">CVE-2015-7696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7697/">CVE-2015-7697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7697">CVE-2015-7697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9844/">CVE-2016-9844 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9844">CVE-2016-9844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581505" comment="unzip-6.00-11.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219538" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1080074" ref_url="https://bugzilla.suse.com/1080074" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000035" ref_url="https://www.suse.com/security/cve/CVE-2018-1000035/" source="CVE"/>
		<description>
This update for unzip fixes the following issues:

- CVE-2018-1000035: Fixed a heap-based buffer overflow in password protected ZIP archives (bsc#1080074)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1080074">SUSE bug 1080074</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000035/">CVE-2018-1000035 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000035">CVE-2018-1000035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581506" comment="unzip-6.00-11.18.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219539" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1110194" ref_url="https://bugzilla.suse.com/1110194" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18384" ref_url="https://www.suse.com/security/cve/CVE-2018-18384/" source="CVE"/>
		<description>
This update for unzip fixes the following issues:

- CVE-2018-18384: Fixed a buffer overflow when listing archives (bsc#1110194)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-21"/>
	<updated date="2019-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1110194">SUSE bug 1110194</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18384/">CVE-2018-18384 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18384">CVE-2018-18384 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581507" comment="unzip-6.00-11.18.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219540" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196175" ref_url="https://bugzilla.suse.com/1196175" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4217" ref_url="https://www.suse.com/security/cve/CVE-2021-4217/" source="CVE"/>
		<description>
This update for unzip fixes the following issues:

- CVE-2021-4217: Fixed null pointer dereference in Unicode strings code (bsc#1196175).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196175">SUSE bug 1196175</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4217/">CVE-2021-4217 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4217">CVE-2021-4217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670262" comment="unzip-6.00-11.18.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219541" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196177" ref_url="https://bugzilla.suse.com/1196177" source="BUGZILLA"/>
		<reference ref_id="1196180" ref_url="https://bugzilla.suse.com/1196180" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0529" ref_url="https://www.suse.com/security/cve/CVE-2022-0529/" source="CVE"/>
		<reference ref_id="CVE-2022-0530" ref_url="https://www.suse.com/security/cve/CVE-2022-0530/" source="CVE"/>
		<description>
This update for unzip fixes the following issues:

  - CVE-2022-0530: Fixed SIGSEGV during the conversion of an utf-8 string to a local string (bsc#1196177).
  - CVE-2022-0529: Fixed Heap out-of-bound writes and reads during conversion of wide string to local string (bsc#1196180).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-27"/>
	<updated date="2022-09-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196177">SUSE bug 1196177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196180">SUSE bug 1196180</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0529/">CVE-2022-0529 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0529">CVE-2022-0529 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0530/">CVE-2022-0530 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0530">CVE-2022-0530 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994222" comment="unzip-6.00-11.18.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219542" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1040414" ref_url="https://bugzilla.suse.com/1040414" source="BUGZILLA"/>
		<reference ref_id="903440" ref_url="https://bugzilla.suse.com/903440" source="BUGZILLA"/>
		<reference ref_id="903738" ref_url="https://bugzilla.suse.com/903738" source="BUGZILLA"/>
		<reference ref_id="923777" ref_url="https://bugzilla.suse.com/923777" source="BUGZILLA"/>
		<reference ref_id="923904" ref_url="https://bugzilla.suse.com/923904" source="BUGZILLA"/>
		<reference ref_id="924994" ref_url="https://bugzilla.suse.com/924994" source="BUGZILLA"/>
		<reference ref_id="925705" ref_url="https://bugzilla.suse.com/925705" source="BUGZILLA"/>
		<reference ref_id="930236" ref_url="https://bugzilla.suse.com/930236" source="BUGZILLA"/>
		<reference ref_id="931607" ref_url="https://bugzilla.suse.com/931607" source="BUGZILLA"/>
		<reference ref_id="949754" ref_url="https://bugzilla.suse.com/949754" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5218" ref_url="https://www.suse.com/security/cve/CVE-2015-5218/" source="CVE"/>
		<description>
This update for util-linux fixes the following issues:

- CVE-2015-5218: Prevent colcrt buffer overflow. (bsc#949754)

These non-security issues were fixed:

- Mount crashes when trying to mount `shmfs` while `SELinux` is active. (bsc#1040414)
- Fix `lsblk -f` on `CCISS` and other devices with nodes in `/dev` subdirectory. (bsc#924994)
- Fix `script(1)` hang caused by mis-interpreted EOF on big-endian platforms. (bsc#930236)
- Do not segfault when TERM is not defined or wrong. (bsc#903440)
- Update and fix mount XFS documentation. (bsc#925705)
- Fix recognition of `/dev/dm-N` partitions names. (bsc#931607)
- Follow SUSE Linux Enterprise 11 device mapper partition names configuration. (bsc#931607)
- Fix recognition of device mapper partitions. (bsc#923904)
- Fix `fsck -C {fd}` parsing. (bsc#923777, bsc#903738)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-14"/>
	<updated date="2021-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040414">SUSE bug 1040414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903440">SUSE bug 903440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903738">SUSE bug 903738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923777">SUSE bug 923777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923904">SUSE bug 923904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924994">SUSE bug 924994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925705">SUSE bug 925705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930236">SUSE bug 930236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931607">SUSE bug 931607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949754">SUSE bug 949754</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5218/">CVE-2015-5218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5218">CVE-2015-5218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581508" comment="libblkid1-2.19.1-6.62.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581509" comment="libblkid1-32bit-2.19.1-6.62.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581510" comment="libuuid1-2.19.1-6.62.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581511" comment="libuuid1-32bit-2.19.1-6.62.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581512" comment="util-linux-2.19.1-6.62.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581513" comment="util-linux-lang-2.19.1-6.62.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581514" comment="uuid-runtime-2.19.1-6.62.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219543" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1010685" ref_url="https://bugzilla.suse.com/1010685" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1248" ref_url="https://www.suse.com/security/cve/CVE-2016-1248/" source="CVE"/>
		<description>

This update for vim fixes the following security issues:

- Fixed CVE-2016-1248, an arbitrary command execution vulnerability
  (bsc#1010685)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-29"/>
	<updated date="2016-11-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010685">SUSE bug 1010685</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1248/">CVE-2016-1248 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1248">CVE-2016-1248 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581515" comment="gvim-7.2-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581516" comment="vim-7.2-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581517" comment="vim-base-7.2-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581518" comment="vim-data-7.2-8.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219544" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1024724" ref_url="https://bugzilla.suse.com/1024724" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5953" ref_url="https://www.suse.com/security/cve/CVE-2017-5953/" source="CVE"/>
		<description>

This update for vim fixes the following issues:

- CVE-2017-5953: Fixed a possible overflow with corrupted spell file (bsc#1024724)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-04"/>
	<updated date="2017-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024724">SUSE bug 1024724</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5953/">CVE-2017-5953 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5953">CVE-2017-5953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581519" comment="gvim-7.2-8.20.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581520" comment="vim-7.2-8.20.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581521" comment="vim-base-7.2-8.20.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581522" comment="vim-data-7.2-8.20.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219545" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1137443" ref_url="https://bugzilla.suse.com/1137443" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12735" ref_url="https://www.suse.com/security/cve/CVE-2019-12735/" source="CVE"/>
		<description>
This update for vim fixes the following issues:
	  
Security issue fixed: 

- CVE-2019-12735: Fixed a potential arbitrary code execution vulnerability in getchar.c (bsc#1137443).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-11"/>
	<updated date="2019-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137443">SUSE bug 1137443</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12735/">CVE-2019-12735 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12735">CVE-2019-12735 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581523" comment="gvim-7.2-8.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581524" comment="vim-7.2-8.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581525" comment="vim-base-7.2-8.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581526" comment="vim-data-7.2-8.21.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219546" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172225" ref_url="https://bugzilla.suse.com/1172225" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20807" ref_url="https://www.suse.com/security/cve/CVE-2019-20807/" source="CVE"/>
		<description>
This update for vim fixes the following issues:

- CVE-2019-20807: Fixed an issue where escaping from the restrictive mode of vim
  was possible using interfaces (bsc#1172225). 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172225">SUSE bug 1172225</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-20807/">CVE-2019-20807 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20807">CVE-2019-20807 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581527" comment="gvim-7.2-8.21.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581528" comment="vim-7.2-8.21.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581529" comment="vim-base-7.2-8.21.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581530" comment="vim-data-7.2-8.21.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219547" version="1" class="patch">
	<metadata>
		<title>Security update for vino</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="843174" ref_url="https://bugzilla.suse.com/843174" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5745" ref_url="https://www.suse.com/security/cve/CVE-2013-5745/" source="CVE"/>
		<description>

vino has been updated to fix a remote denial of service problem where 
remote attackers could have caused a infinite loop in vino (CPU 
consumption). (CVE-2013-5745)

Security Issue reference:

    * CVE-2013-5745
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5745&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-17"/>
	<updated date="2013-10-17"/>
	<bugzilla href="https://bugzilla.suse.com/843174">SUSE bug 843174</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5745/">CVE-2013-5745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5745">CVE-2013-5745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576970" comment="vino-2.28.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576971" comment="vino-lang-2.28.1-2.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576970" comment="vino-2.28.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576971" comment="vino-lang-2.28.1-2.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576970" comment="vino-2.28.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576971" comment="vino-lang-2.28.1-2.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219548" version="1" class="patch">
	<metadata>
		<title>Security update for vino (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1155419" ref_url="https://bugzilla.suse.com/1155419" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681/" source="CVE"/>
		<description>
This update for vino fixes the following issues:
	  
- CVE-2019-15681: Fixed a memory leak which could have allowed to a 
  remote attacker to read stack memory (bsc#1155419).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-23"/>
	<updated date="2020-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155419">SUSE bug 1155419</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15681">CVE-2019-15681 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575338" comment="vino-2.28.1-2.5.3.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575339" comment="vino-lang-2.28.1-2.5.3.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219549" version="1" class="patch">
	<metadata>
		<title>Recommended update for vsftpd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="900326" ref_url="https://bugzilla.suse.com/900326" source="BUGZILLA"/>
		<reference ref_id="915522" ref_url="https://bugzilla.suse.com/915522" source="BUGZILLA"/>
		<reference ref_id="922538" ref_url="https://bugzilla.suse.com/922538" source="BUGZILLA"/>
		<reference ref_id="925963" ref_url="https://bugzilla.suse.com/925963" source="BUGZILLA"/>
		<reference ref_id="927612" ref_url="https://bugzilla.suse.com/927612" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1419" ref_url="https://www.suse.com/security/cve/CVE-2015-1419/" source="CVE"/>
		<reference ref_id="SUSE-RU-2015:0952-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-May/003028.html" source="SUSE-SU"/>
		<description>

This update fixes regressions with using wildcards that had been introduced 
by the previous update (bnc#922538, bnc#927612). Additionally, stat(2) 
could be sometimes called on the wrong path, resulting incorrectly in 
ENOENT (bnc#925963).

		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-20"/>
	<updated date="2015-04-20"/>
	<bugzilla href="https://bugzilla.suse.com/900326">SUSE bug 900326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915522">SUSE bug 915522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922538">SUSE bug 922538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925963">SUSE bug 925963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927612">SUSE bug 927612</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1419/">CVE-2015-1419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1419">CVE-2015-1419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994223" comment="vsftpd-2.0.7-4.35.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994223" comment="vsftpd-2.0.7-4.35.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994223" comment="vsftpd-2.0.7-4.35.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219550" version="1" class="patch">
	<metadata>
		<title>Security update for w3m (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1011269" ref_url="https://bugzilla.suse.com/1011269" source="BUGZILLA"/>
		<reference ref_id="1011270" ref_url="https://bugzilla.suse.com/1011270" source="BUGZILLA"/>
		<reference ref_id="1011271" ref_url="https://bugzilla.suse.com/1011271" source="BUGZILLA"/>
		<reference ref_id="1011272" ref_url="https://bugzilla.suse.com/1011272" source="BUGZILLA"/>
		<reference ref_id="1011283" ref_url="https://bugzilla.suse.com/1011283" source="BUGZILLA"/>
		<reference ref_id="1011284" ref_url="https://bugzilla.suse.com/1011284" source="BUGZILLA"/>
		<reference ref_id="1011285" ref_url="https://bugzilla.suse.com/1011285" source="BUGZILLA"/>
		<reference ref_id="1011286" ref_url="https://bugzilla.suse.com/1011286" source="BUGZILLA"/>
		<reference ref_id="1011287" ref_url="https://bugzilla.suse.com/1011287" source="BUGZILLA"/>
		<reference ref_id="1011288" ref_url="https://bugzilla.suse.com/1011288" source="BUGZILLA"/>
		<reference ref_id="1011289" ref_url="https://bugzilla.suse.com/1011289" source="BUGZILLA"/>
		<reference ref_id="1011290" ref_url="https://bugzilla.suse.com/1011290" source="BUGZILLA"/>
		<reference ref_id="1011291" ref_url="https://bugzilla.suse.com/1011291" source="BUGZILLA"/>
		<reference ref_id="1011292" ref_url="https://bugzilla.suse.com/1011292" source="BUGZILLA"/>
		<reference ref_id="1011293" ref_url="https://bugzilla.suse.com/1011293" source="BUGZILLA"/>
		<reference ref_id="1012020" ref_url="https://bugzilla.suse.com/1012020" source="BUGZILLA"/>
		<reference ref_id="1012021" ref_url="https://bugzilla.suse.com/1012021" source="BUGZILLA"/>
		<reference ref_id="1012022" ref_url="https://bugzilla.suse.com/1012022" source="BUGZILLA"/>
		<reference ref_id="1012023" ref_url="https://bugzilla.suse.com/1012023" source="BUGZILLA"/>
		<reference ref_id="1012024" ref_url="https://bugzilla.suse.com/1012024" source="BUGZILLA"/>
		<reference ref_id="1012025" ref_url="https://bugzilla.suse.com/1012025" source="BUGZILLA"/>
		<reference ref_id="1012026" ref_url="https://bugzilla.suse.com/1012026" source="BUGZILLA"/>
		<reference ref_id="1012027" ref_url="https://bugzilla.suse.com/1012027" source="BUGZILLA"/>
		<reference ref_id="1012028" ref_url="https://bugzilla.suse.com/1012028" source="BUGZILLA"/>
		<reference ref_id="1012029" ref_url="https://bugzilla.suse.com/1012029" source="BUGZILLA"/>
		<reference ref_id="1012030" ref_url="https://bugzilla.suse.com/1012030" source="BUGZILLA"/>
		<reference ref_id="1012031" ref_url="https://bugzilla.suse.com/1012031" source="BUGZILLA"/>
		<reference ref_id="1012032" ref_url="https://bugzilla.suse.com/1012032" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2074" ref_url="https://www.suse.com/security/cve/CVE-2010-2074/" source="CVE"/>
		<reference ref_id="CVE-2016-9422" ref_url="https://www.suse.com/security/cve/CVE-2016-9422/" source="CVE"/>
		<reference ref_id="CVE-2016-9423" ref_url="https://www.suse.com/security/cve/CVE-2016-9423/" source="CVE"/>
		<reference ref_id="CVE-2016-9424" ref_url="https://www.suse.com/security/cve/CVE-2016-9424/" source="CVE"/>
		<reference ref_id="CVE-2016-9425" ref_url="https://www.suse.com/security/cve/CVE-2016-9425/" source="CVE"/>
		<reference ref_id="CVE-2016-9434" ref_url="https://www.suse.com/security/cve/CVE-2016-9434/" source="CVE"/>
		<reference ref_id="CVE-2016-9435" ref_url="https://www.suse.com/security/cve/CVE-2016-9435/" source="CVE"/>
		<reference ref_id="CVE-2016-9436" ref_url="https://www.suse.com/security/cve/CVE-2016-9436/" source="CVE"/>
		<reference ref_id="CVE-2016-9437" ref_url="https://www.suse.com/security/cve/CVE-2016-9437/" source="CVE"/>
		<reference ref_id="CVE-2016-9438" ref_url="https://www.suse.com/security/cve/CVE-2016-9438/" source="CVE"/>
		<reference ref_id="CVE-2016-9439" ref_url="https://www.suse.com/security/cve/CVE-2016-9439/" source="CVE"/>
		<reference ref_id="CVE-2016-9440" ref_url="https://www.suse.com/security/cve/CVE-2016-9440/" source="CVE"/>
		<reference ref_id="CVE-2016-9441" ref_url="https://www.suse.com/security/cve/CVE-2016-9441/" source="CVE"/>
		<reference ref_id="CVE-2016-9442" ref_url="https://www.suse.com/security/cve/CVE-2016-9442/" source="CVE"/>
		<reference ref_id="CVE-2016-9443" ref_url="https://www.suse.com/security/cve/CVE-2016-9443/" source="CVE"/>
		<reference ref_id="CVE-2016-9621" ref_url="https://www.suse.com/security/cve/CVE-2016-9621/" source="CVE"/>
		<reference ref_id="CVE-2016-9622" ref_url="https://www.suse.com/security/cve/CVE-2016-9622/" source="CVE"/>
		<reference ref_id="CVE-2016-9623" ref_url="https://www.suse.com/security/cve/CVE-2016-9623/" source="CVE"/>
		<reference ref_id="CVE-2016-9624" ref_url="https://www.suse.com/security/cve/CVE-2016-9624/" source="CVE"/>
		<reference ref_id="CVE-2016-9625" ref_url="https://www.suse.com/security/cve/CVE-2016-9625/" source="CVE"/>
		<reference ref_id="CVE-2016-9626" ref_url="https://www.suse.com/security/cve/CVE-2016-9626/" source="CVE"/>
		<reference ref_id="CVE-2016-9627" ref_url="https://www.suse.com/security/cve/CVE-2016-9627/" source="CVE"/>
		<reference ref_id="CVE-2016-9628" ref_url="https://www.suse.com/security/cve/CVE-2016-9628/" source="CVE"/>
		<reference ref_id="CVE-2016-9629" ref_url="https://www.suse.com/security/cve/CVE-2016-9629/" source="CVE"/>
		<reference ref_id="CVE-2016-9630" ref_url="https://www.suse.com/security/cve/CVE-2016-9630/" source="CVE"/>
		<reference ref_id="CVE-2016-9631" ref_url="https://www.suse.com/security/cve/CVE-2016-9631/" source="CVE"/>
		<reference ref_id="CVE-2016-9632" ref_url="https://www.suse.com/security/cve/CVE-2016-9632/" source="CVE"/>
		<reference ref_id="CVE-2016-9633" ref_url="https://www.suse.com/security/cve/CVE-2016-9633/" source="CVE"/>
		<description>

This update for w3m fixes the following issues:

- update to debian git version (bsc#1011293)
  addressed security issues:
         CVE-2016-9621: w3m: global-buffer-overflow write (bsc#1012020)
         CVE-2016-9622: w3m: null deref (bsc#1012021)
         CVE-2016-9623: w3m: null deref (bsc#1012022)
         CVE-2016-9624: w3m: near-null deref (bsc#1012023)
         CVE-2016-9625: w3m: stack overflow (bsc#1012024)
         CVE-2016-9626: w3m: stack overflow (bsc#1012025)
         CVE-2016-9627: w3m: heap overflow read + deref (bsc#1012026)
         CVE-2016-9628: w3m: null deref (bsc#1012027)
         CVE-2016-9629: w3m: null deref (bsc#1012028)
         CVE-2016-9630: w3m: global-buffer-overflow read (bsc#1012029)
         CVE-2016-9631: w3m: null deref (bsc#1012030)
         CVE-2016-9632: w3m: global-buffer-overflow read (bsc#1012031)
         CVE-2016-9633: w3m: OOM (bsc#1012032)
         CVE-2016-9434: w3m: null deref (bsc#1011283)
         CVE-2016-9435: w3m: use uninit value (bsc#1011284)
         CVE-2016-9436: w3m: use uninit value (bsc#1011285)
         CVE-2016-9437: w3m: write to rodata (bsc#1011286)
         CVE-2016-9438: w3m: null deref (bsc#1011287)
         CVE-2016-9439: w3m: stack overflow (bsc#1011288)
         CVE-2016-9440: w3m: near-null deref (bsc#1011289)
         CVE-2016-9441: w3m: near-null deref (bsc#1011290)
         CVE-2016-9442: w3m: potential heap buffer corruption (bsc#1011291)
         CVE-2016-9443: w3m: null deref (bsc#1011292)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-07"/>
	<updated date="2016-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011269">SUSE bug 1011269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011270">SUSE bug 1011270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011271">SUSE bug 1011271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011272">SUSE bug 1011272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011283">SUSE bug 1011283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011284">SUSE bug 1011284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011285">SUSE bug 1011285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011286">SUSE bug 1011286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011287">SUSE bug 1011287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011288">SUSE bug 1011288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011289">SUSE bug 1011289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011290">SUSE bug 1011290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011291">SUSE bug 1011291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011292">SUSE bug 1011292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012020">SUSE bug 1012020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012021">SUSE bug 1012021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012022">SUSE bug 1012022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012023">SUSE bug 1012023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012024">SUSE bug 1012024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012025">SUSE bug 1012025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012026">SUSE bug 1012026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012027">SUSE bug 1012027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012028">SUSE bug 1012028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012029">SUSE bug 1012029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012030">SUSE bug 1012030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012031">SUSE bug 1012031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012032">SUSE bug 1012032</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2074/">CVE-2010-2074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2074">CVE-2010-2074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9422/">CVE-2016-9422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9422">CVE-2016-9422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9423/">CVE-2016-9423 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9423">CVE-2016-9423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9424/">CVE-2016-9424 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9424">CVE-2016-9424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9425/">CVE-2016-9425 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9425">CVE-2016-9425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9434/">CVE-2016-9434 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9434">CVE-2016-9434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9435/">CVE-2016-9435 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9435">CVE-2016-9435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9436/">CVE-2016-9436 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9436">CVE-2016-9436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9437/">CVE-2016-9437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9437">CVE-2016-9437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9438/">CVE-2016-9438 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9438">CVE-2016-9438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9439/">CVE-2016-9439 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9439">CVE-2016-9439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9440/">CVE-2016-9440 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9440">CVE-2016-9440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9441/">CVE-2016-9441 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9441">CVE-2016-9441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9442/">CVE-2016-9442 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9442">CVE-2016-9442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9443/">CVE-2016-9443 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9443">CVE-2016-9443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9621/">CVE-2016-9621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-9621">CVE-2016-9621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9622/">CVE-2016-9622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9622">CVE-2016-9622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9623/">CVE-2016-9623 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9623">CVE-2016-9623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9624/">CVE-2016-9624 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9624">CVE-2016-9624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9625/">CVE-2016-9625 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9625">CVE-2016-9625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9626/">CVE-2016-9626 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9626">CVE-2016-9626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9627/">CVE-2016-9627 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9627">CVE-2016-9627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9628/">CVE-2016-9628 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9628">CVE-2016-9628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9629/">CVE-2016-9629 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9629">CVE-2016-9629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9630/">CVE-2016-9630 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9630">CVE-2016-9630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9631/">CVE-2016-9631 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9631">CVE-2016-9631 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9632/">CVE-2016-9632 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9632">CVE-2016-9632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9633/">CVE-2016-9633 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9633">CVE-2016-9633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575344" comment="w3m-0.5.3.git20161120-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219551" version="1" class="patch">
	<metadata>
		<title>Security update for w3m (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1077559" ref_url="https://bugzilla.suse.com/1077559" source="BUGZILLA"/>
		<reference ref_id="1077568" ref_url="https://bugzilla.suse.com/1077568" source="BUGZILLA"/>
		<reference ref_id="1077572" ref_url="https://bugzilla.suse.com/1077572" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6196" ref_url="https://www.suse.com/security/cve/CVE-2018-6196/" source="CVE"/>
		<reference ref_id="CVE-2018-6197" ref_url="https://www.suse.com/security/cve/CVE-2018-6197/" source="CVE"/>
		<reference ref_id="CVE-2018-6198" ref_url="https://www.suse.com/security/cve/CVE-2018-6198/" source="CVE"/>
		<description>
This update for w3m fixes several issues.

These security issues were fixed:

- CVE-2018-6196: Prevent infinite recursion in HTMLlineproc0 caused by the feed_table_block_tag function which did not prevent a negative indent value (bsc#1077559)
- CVE-2018-6197: Prevent NULL pointer dereference in formUpdateBuffer (bsc#1077568)
- CVE-2018-6198: w3m did not properly handle temporary files when the ~/.w3m directory is unwritable, which allowed a local attacker to craft a symlink attack to overwrite arbitrary files (bsc#1077572)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-03"/>
	<updated date="2020-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077559">SUSE bug 1077559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077568">SUSE bug 1077568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077572">SUSE bug 1077572</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6196/">CVE-2018-6196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6196">CVE-2018-6196 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6197/">CVE-2018-6197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6197">CVE-2018-6197 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6198/">CVE-2018-6198 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6198">CVE-2018-6198 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575345" comment="w3m-0.5.3.git20161120-5.3.37 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219552" version="1" class="patch">
	<metadata>
		<title>Security update for w3m (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1202684" ref_url="https://bugzilla.suse.com/1202684" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-38223" ref_url="https://www.suse.com/security/cve/CVE-2022-38223/" source="CVE"/>
		<description>
This update for w3m fixes the following issues:

- CVE-2022-38223: Fixed a memory safety issue when dumping crafted
  input to standard out (bsc#1202684).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-11"/>
	<updated date="2023-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1202684">SUSE bug 1202684</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38223/">CVE-2022-38223 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38223">CVE-2022-38223 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994224" comment="w3m-0.5.3.git20161120-5.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219553" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1021483" ref_url="https://bugzilla.suse.com/1021483" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10169" ref_url="https://www.suse.com/security/cve/CVE-2016-10169/" source="CVE"/>
		<reference ref_id="CVE-2016-10170" ref_url="https://www.suse.com/security/cve/CVE-2016-10170/" source="CVE"/>
		<reference ref_id="CVE-2016-10171" ref_url="https://www.suse.com/security/cve/CVE-2016-10171/" source="CVE"/>
		<reference ref_id="CVE-2016-10172" ref_url="https://www.suse.com/security/cve/CVE-2016-10172/" source="CVE"/>
		<description>
This update for wavpack fixes the following issues:

- CVE-2016-10169 CVE-2016-10170 CVE-2016-10171 CVE-2016-10172: Make sure upper and lower boundaries make sense, to avoid out of bounds memory reads that could lead to crashes or disclosing memory. (bsc#1021483)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-05"/>
	<updated date="2018-03-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1021483">SUSE bug 1021483</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10169/">CVE-2016-10169 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10169">CVE-2016-10169 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10170/">CVE-2016-10170 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10170">CVE-2016-10170 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10171/">CVE-2016-10171 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10171">CVE-2016-10171 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10172/">CVE-2016-10172 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10172">CVE-2016-10172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575346" comment="libwavpack1-4.50.1-1.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219554" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1120930" ref_url="https://bugzilla.suse.com/1120930" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19840" ref_url="https://www.suse.com/security/cve/CVE-2018-19840/" source="CVE"/>
		<description>
This update for wavpack fixes the following issues:

Security issues fixed:

- CVE-2018-19840: Fixed a denial-of-service in the WavpackPackInit function from pack_utils.c (bsc#1120930)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120930">SUSE bug 1120930</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19840/">CVE-2018-19840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19840">CVE-2018-19840 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575347" comment="libwavpack1-4.50.1-1.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219555" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180414" ref_url="https://bugzilla.suse.com/1180414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35738" ref_url="https://www.suse.com/security/cve/CVE-2020-35738/" source="CVE"/>
		<description>
This update for wavpack fixes the following issues:

- CVE-2020-35738: Fixed an out-of-bounds write in WavpackPackSamples (bsc#1180414). 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-19"/>
	<updated date="2021-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180414">SUSE bug 1180414</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35738/">CVE-2020-35738 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35738">CVE-2020-35738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575348" comment="libwavpack1-4.50.1-1.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219556" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1201716" ref_url="https://bugzilla.suse.com/1201716" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2476" ref_url="https://www.suse.com/security/cve/CVE-2022-2476/" source="CVE"/>
		<description>
This update for wavpack fixes the following issues:

- CVE-2022-2476: Fixed a null pointer dereference in wvunpack (bsc#1201716).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-08"/>
	<updated date="2022-09-08"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1201716">SUSE bug 1201716</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2476/">CVE-2022-2476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2476">CVE-2022-2476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994225" comment="libwavpack1-4.50.1-1.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219557" version="1" class="patch">
	<metadata>
		<title>Security update for wget</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="870983" ref_url="https://bugzilla.suse.com/870983" source="BUGZILLA"/>
		<reference ref_id="885069" ref_url="https://bugzilla.suse.com/885069" source="BUGZILLA"/>
		<reference ref_id="901276" ref_url="https://bugzilla.suse.com/901276" source="BUGZILLA"/>
		<reference ref_id="902709" ref_url="https://bugzilla.suse.com/902709" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4877" ref_url="https://www.suse.com/security/cve/CVE-2014-4877/" source="CVE"/>
		<description>

wget has been updated to fix one security issue and two non-security 
issues.

This security issue has been fixed:

    * FTP symlink arbitrary filesystem access (CVE-2014-4877).

These non-security issues have been fixed:

    * Fix displaying of download time (bnc#901276).
    * Fix 0 size FTP downloads after failure (bnc#885069).

Security Issues:

    * CVE-2014-4877
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-05"/>
	<updated date="2014-11-05"/>
	<bugzilla href="https://bugzilla.suse.com/870983">SUSE bug 870983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885069">SUSE bug 885069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901276">SUSE bug 901276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902709">SUSE bug 902709</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4877/">CVE-2014-4877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4877">CVE-2014-4877 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581531" comment="wget-1.11.4-1.19.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581531" comment="wget-1.11.4-1.19.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581531" comment="wget-1.11.4-1.19.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219558" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="958342" ref_url="https://bugzilla.suse.com/958342" source="BUGZILLA"/>
		<reference ref_id="984060" ref_url="https://bugzilla.suse.com/984060" source="BUGZILLA"/>
		<reference ref_id="995964" ref_url="https://bugzilla.suse.com/995964" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4971" ref_url="https://www.suse.com/security/cve/CVE-2016-4971/" source="CVE"/>
		<reference ref_id="CVE-2016-7098" ref_url="https://www.suse.com/security/cve/CVE-2016-7098/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002286.html" source="SUSE-SU"/>
		<description>

This update for wget fixes the following issues:

- CVE-2016-4971: A HTTP to FTP redirection file name confusion vulnerability was fixed.
  (bsc#984060).

- CVE-2016-7098: A potential race condition was fixed by creating files with .tmp ext
  and making them accessible to the current user only. (bsc#995964)

Bug fixed:
- Wget failed with basicauth: Failed writing HTTP request: Bad file descriptor
  (bsc#958342)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-23"/>
	<updated date="2016-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958342">SUSE bug 958342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984060">SUSE bug 984060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995964">SUSE bug 995964</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4971/">CVE-2016-4971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4971">CVE-2016-4971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7098/">CVE-2016-7098 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7098">CVE-2016-7098 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581532" comment="wget-1.11.4-1.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575351" comment="wget-openssl1-1.11.4-1.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581532" comment="wget-1.11.4-1.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575351" comment="wget-openssl1-1.11.4-1.32.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219559" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1028301" ref_url="https://bugzilla.suse.com/1028301" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6508" ref_url="https://www.suse.com/security/cve/CVE-2017-6508/" source="CVE"/>
		<description>

This update for wget fixes the following issues:

Security issue fixed:
- CVE-2017-6508: (url_parse): Reject control characters in host part of URL (bsc#1028301).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-22"/>
	<updated date="2017-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1028301">SUSE bug 1028301</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6508/">CVE-2017-6508 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6508">CVE-2017-6508 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575352" comment="wget-1.11.4-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575353" comment="wget-openssl1-1.11.4-1.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219560" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1092061" ref_url="https://bugzilla.suse.com/1092061" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0494" ref_url="https://www.suse.com/security/cve/CVE-2018-0494/" source="CVE"/>
		<description>
This update for wget fixes the following issues:

- CVE-2018-0494: Fixed Cookie injection vulnerability by checking for
  and joining continuation lines. (bsc#1092061)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092061">SUSE bug 1092061</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0494/">CVE-2018-0494 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0494">CVE-2018-0494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575354" comment="wget-1.11.4-1.41.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575355" comment="wget-openssl1-1.11.4-1.41.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219561" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="813217" ref_url="https://bugzilla.suse.com/813217" source="BUGZILLA"/>
		<reference ref_id="816517" ref_url="https://bugzilla.suse.com/816517" source="BUGZILLA"/>
		<reference ref_id="816887" ref_url="https://bugzilla.suse.com/816887" source="BUGZILLA"/>
		<reference ref_id="820973" ref_url="https://bugzilla.suse.com/820973" source="BUGZILLA"/>
		<reference ref_id="824900" ref_url="https://bugzilla.suse.com/824900" source="BUGZILLA"/>
		<reference ref_id="831718" ref_url="https://bugzilla.suse.com/831718" source="BUGZILLA"/>
		<reference ref_id="839607" ref_url="https://bugzilla.suse.com/839607" source="BUGZILLA"/>
		<reference ref_id="848738" ref_url="https://bugzilla.suse.com/848738" source="BUGZILLA"/>
		<reference ref_id="855980" ref_url="https://bugzilla.suse.com/855980" source="BUGZILLA"/>
		<reference ref_id="856495" ref_url="https://bugzilla.suse.com/856495" source="BUGZILLA"/>
		<reference ref_id="856496" ref_url="https://bugzilla.suse.com/856496" source="BUGZILLA"/>
		<reference ref_id="856498" ref_url="https://bugzilla.suse.com/856498" source="BUGZILLA"/>
		<reference ref_id="867485" ref_url="https://bugzilla.suse.com/867485" source="BUGZILLA"/>
		<reference ref_id="889854" ref_url="https://bugzilla.suse.com/889854" source="BUGZILLA"/>
		<reference ref_id="889899" ref_url="https://bugzilla.suse.com/889899" source="BUGZILLA"/>
		<reference ref_id="889900" ref_url="https://bugzilla.suse.com/889900" source="BUGZILLA"/>
		<reference ref_id="889901" ref_url="https://bugzilla.suse.com/889901" source="BUGZILLA"/>
		<reference ref_id="889906" ref_url="https://bugzilla.suse.com/889906" source="BUGZILLA"/>
		<reference ref_id="897055" ref_url="https://bugzilla.suse.com/897055" source="BUGZILLA"/>
		<reference ref_id="899303" ref_url="https://bugzilla.suse.com/899303" source="BUGZILLA"/>
		<reference ref_id="905245" ref_url="https://bugzilla.suse.com/905245" source="BUGZILLA"/>
		<reference ref_id="905246" ref_url="https://bugzilla.suse.com/905246" source="BUGZILLA"/>
		<reference ref_id="905247" ref_url="https://bugzilla.suse.com/905247" source="BUGZILLA"/>
		<reference ref_id="905248" ref_url="https://bugzilla.suse.com/905248" source="BUGZILLA"/>
		<reference ref_id="912365" ref_url="https://bugzilla.suse.com/912365" source="BUGZILLA"/>
		<reference ref_id="912368" ref_url="https://bugzilla.suse.com/912368" source="BUGZILLA"/>
		<reference ref_id="912369" ref_url="https://bugzilla.suse.com/912369" source="BUGZILLA"/>
		<reference ref_id="912370" ref_url="https://bugzilla.suse.com/912370" source="BUGZILLA"/>
		<reference ref_id="912372" ref_url="https://bugzilla.suse.com/912372" source="BUGZILLA"/>
		<reference ref_id="920696" ref_url="https://bugzilla.suse.com/920696" source="BUGZILLA"/>
		<reference ref_id="920697" ref_url="https://bugzilla.suse.com/920697" source="BUGZILLA"/>
		<reference ref_id="920699" ref_url="https://bugzilla.suse.com/920699" source="BUGZILLA"/>
		<reference ref_id="930691" ref_url="https://bugzilla.suse.com/930691" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2486" ref_url="https://www.suse.com/security/cve/CVE-2013-2486/" source="CVE"/>
		<reference ref_id="CVE-2013-2487" ref_url="https://www.suse.com/security/cve/CVE-2013-2487/" source="CVE"/>
		<reference ref_id="CVE-2013-3555" ref_url="https://www.suse.com/security/cve/CVE-2013-3555/" source="CVE"/>
		<reference ref_id="CVE-2013-3556" ref_url="https://www.suse.com/security/cve/CVE-2013-3556/" source="CVE"/>
		<reference ref_id="CVE-2013-3557" ref_url="https://www.suse.com/security/cve/CVE-2013-3557/" source="CVE"/>
		<reference ref_id="CVE-2013-3558" ref_url="https://www.suse.com/security/cve/CVE-2013-3558/" source="CVE"/>
		<reference ref_id="CVE-2013-3559" ref_url="https://www.suse.com/security/cve/CVE-2013-3559/" source="CVE"/>
		<reference ref_id="CVE-2013-3560" ref_url="https://www.suse.com/security/cve/CVE-2013-3560/" source="CVE"/>
		<reference ref_id="CVE-2013-3561" ref_url="https://www.suse.com/security/cve/CVE-2013-3561/" source="CVE"/>
		<reference ref_id="CVE-2013-3562" ref_url="https://www.suse.com/security/cve/CVE-2013-3562/" source="CVE"/>
		<reference ref_id="CVE-2013-4074" ref_url="https://www.suse.com/security/cve/CVE-2013-4074/" source="CVE"/>
		<reference ref_id="CVE-2013-4075" ref_url="https://www.suse.com/security/cve/CVE-2013-4075/" source="CVE"/>
		<reference ref_id="CVE-2013-4076" ref_url="https://www.suse.com/security/cve/CVE-2013-4076/" source="CVE"/>
		<reference ref_id="CVE-2013-4077" ref_url="https://www.suse.com/security/cve/CVE-2013-4077/" source="CVE"/>
		<reference ref_id="CVE-2013-4078" ref_url="https://www.suse.com/security/cve/CVE-2013-4078/" source="CVE"/>
		<reference ref_id="CVE-2013-4079" ref_url="https://www.suse.com/security/cve/CVE-2013-4079/" source="CVE"/>
		<reference ref_id="CVE-2013-4080" ref_url="https://www.suse.com/security/cve/CVE-2013-4080/" source="CVE"/>
		<reference ref_id="CVE-2013-4081" ref_url="https://www.suse.com/security/cve/CVE-2013-4081/" source="CVE"/>
		<reference ref_id="CVE-2013-4082" ref_url="https://www.suse.com/security/cve/CVE-2013-4082/" source="CVE"/>
		<reference ref_id="CVE-2013-4083" ref_url="https://www.suse.com/security/cve/CVE-2013-4083/" source="CVE"/>
		<reference ref_id="CVE-2013-4929" ref_url="https://www.suse.com/security/cve/CVE-2013-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-4930" ref_url="https://www.suse.com/security/cve/CVE-2013-4930/" source="CVE"/>
		<reference ref_id="CVE-2013-4931" ref_url="https://www.suse.com/security/cve/CVE-2013-4931/" source="CVE"/>
		<reference ref_id="CVE-2013-4932" ref_url="https://www.suse.com/security/cve/CVE-2013-4932/" source="CVE"/>
		<reference ref_id="CVE-2013-4933" ref_url="https://www.suse.com/security/cve/CVE-2013-4933/" source="CVE"/>
		<reference ref_id="CVE-2013-4934" ref_url="https://www.suse.com/security/cve/CVE-2013-4934/" source="CVE"/>
		<reference ref_id="CVE-2013-4935" ref_url="https://www.suse.com/security/cve/CVE-2013-4935/" source="CVE"/>
		<reference ref_id="CVE-2013-6336" ref_url="https://www.suse.com/security/cve/CVE-2013-6336/" source="CVE"/>
		<reference ref_id="CVE-2013-6337" ref_url="https://www.suse.com/security/cve/CVE-2013-6337/" source="CVE"/>
		<reference ref_id="CVE-2013-6338" ref_url="https://www.suse.com/security/cve/CVE-2013-6338/" source="CVE"/>
		<reference ref_id="CVE-2013-6339" ref_url="https://www.suse.com/security/cve/CVE-2013-6339/" source="CVE"/>
		<reference ref_id="CVE-2013-6340" ref_url="https://www.suse.com/security/cve/CVE-2013-6340/" source="CVE"/>
		<reference ref_id="CVE-2013-7112" ref_url="https://www.suse.com/security/cve/CVE-2013-7112/" source="CVE"/>
		<reference ref_id="CVE-2013-7113" ref_url="https://www.suse.com/security/cve/CVE-2013-7113/" source="CVE"/>
		<reference ref_id="CVE-2013-7114" ref_url="https://www.suse.com/security/cve/CVE-2013-7114/" source="CVE"/>
		<reference ref_id="CVE-2014-2281" ref_url="https://www.suse.com/security/cve/CVE-2014-2281/" source="CVE"/>
		<reference ref_id="CVE-2014-2282" ref_url="https://www.suse.com/security/cve/CVE-2014-2282/" source="CVE"/>
		<reference ref_id="CVE-2014-2283" ref_url="https://www.suse.com/security/cve/CVE-2014-2283/" source="CVE"/>
		<reference ref_id="CVE-2014-2299" ref_url="https://www.suse.com/security/cve/CVE-2014-2299/" source="CVE"/>
		<reference ref_id="CVE-2014-6421" ref_url="https://www.suse.com/security/cve/CVE-2014-6421/" source="CVE"/>
		<reference ref_id="CVE-2014-6422" ref_url="https://www.suse.com/security/cve/CVE-2014-6422/" source="CVE"/>
		<reference ref_id="CVE-2014-6423" ref_url="https://www.suse.com/security/cve/CVE-2014-6423/" source="CVE"/>
		<reference ref_id="CVE-2014-6424" ref_url="https://www.suse.com/security/cve/CVE-2014-6424/" source="CVE"/>
		<reference ref_id="CVE-2014-6427" ref_url="https://www.suse.com/security/cve/CVE-2014-6427/" source="CVE"/>
		<reference ref_id="CVE-2014-6428" ref_url="https://www.suse.com/security/cve/CVE-2014-6428/" source="CVE"/>
		<reference ref_id="CVE-2014-6429" ref_url="https://www.suse.com/security/cve/CVE-2014-6429/" source="CVE"/>
		<reference ref_id="CVE-2014-6430" ref_url="https://www.suse.com/security/cve/CVE-2014-6430/" source="CVE"/>
		<reference ref_id="CVE-2014-6431" ref_url="https://www.suse.com/security/cve/CVE-2014-6431/" source="CVE"/>
		<reference ref_id="CVE-2014-6432" ref_url="https://www.suse.com/security/cve/CVE-2014-6432/" source="CVE"/>
		<reference ref_id="CVE-2014-8710" ref_url="https://www.suse.com/security/cve/CVE-2014-8710/" source="CVE"/>
		<reference ref_id="CVE-2014-8711" ref_url="https://www.suse.com/security/cve/CVE-2014-8711/" source="CVE"/>
		<reference ref_id="CVE-2014-8712" ref_url="https://www.suse.com/security/cve/CVE-2014-8712/" source="CVE"/>
		<reference ref_id="CVE-2014-8713" ref_url="https://www.suse.com/security/cve/CVE-2014-8713/" source="CVE"/>
		<reference ref_id="CVE-2014-8714" ref_url="https://www.suse.com/security/cve/CVE-2014-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-0559" ref_url="https://www.suse.com/security/cve/CVE-2015-0559/" source="CVE"/>
		<reference ref_id="CVE-2015-0560" ref_url="https://www.suse.com/security/cve/CVE-2015-0560/" source="CVE"/>
		<reference ref_id="CVE-2015-0561" ref_url="https://www.suse.com/security/cve/CVE-2015-0561/" source="CVE"/>
		<reference ref_id="CVE-2015-0562" ref_url="https://www.suse.com/security/cve/CVE-2015-0562/" source="CVE"/>
		<reference ref_id="CVE-2015-0563" ref_url="https://www.suse.com/security/cve/CVE-2015-0563/" source="CVE"/>
		<reference ref_id="CVE-2015-0564" ref_url="https://www.suse.com/security/cve/CVE-2015-0564/" source="CVE"/>
		<reference ref_id="CVE-2015-2188" ref_url="https://www.suse.com/security/cve/CVE-2015-2188/" source="CVE"/>
		<reference ref_id="CVE-2015-2189" ref_url="https://www.suse.com/security/cve/CVE-2015-2189/" source="CVE"/>
		<reference ref_id="CVE-2015-2191" ref_url="https://www.suse.com/security/cve/CVE-2015-2191/" source="CVE"/>
		<reference ref_id="CVE-2015-3811" ref_url="https://www.suse.com/security/cve/CVE-2015-3811/" source="CVE"/>
		<reference ref_id="CVE-2015-3812" ref_url="https://www.suse.com/security/cve/CVE-2015-3812/" source="CVE"/>
		<reference ref_id="CVE-2015-3814" ref_url="https://www.suse.com/security/cve/CVE-2015-3814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001448.html" source="SUSE-SU"/>
		<description>

wireshark has been updated to version 1.10.11 to fix five security issues.

These security issues have been fixed:

    * SigComp UDVM buffer overflow (CVE-2014-8710).
    * AMQP dissector crash (CVE-2014-8711).
    * NCP dissector crashes (CVE-2014-8712, CVE-2014-8713).
    * TN5250 infinite loops (CVE-2014-8714).

This non-security issue has been fixed:

    * enable zlib (bnc#899303).

Further bug fixes and updated protocol support as listed in:

https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html
&lt;https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html&gt;

Security Issues:

    * CVE-2014-8711
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711&gt;
    * CVE-2014-8710
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710&gt;
    * CVE-2014-8714
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714&gt;
    * CVE-2014-8712
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712&gt;
    * CVE-2014-8713
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-14"/>
	<updated date="2014-11-14"/>
	<bugzilla href="https://bugzilla.suse.com/813217">SUSE bug 813217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816517">SUSE bug 816517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816887">SUSE bug 816887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824900">SUSE bug 824900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839607">SUSE bug 839607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848738">SUSE bug 848738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855980">SUSE bug 855980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856495">SUSE bug 856495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856496">SUSE bug 856496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856498">SUSE bug 856498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867485">SUSE bug 867485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889854">SUSE bug 889854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889899">SUSE bug 889899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889900">SUSE bug 889900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889901">SUSE bug 889901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889906">SUSE bug 889906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899303">SUSE bug 899303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905245">SUSE bug 905245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905246">SUSE bug 905246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905247">SUSE bug 905247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905248">SUSE bug 905248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912365">SUSE bug 912365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912368">SUSE bug 912368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912369">SUSE bug 912369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912370">SUSE bug 912370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912372">SUSE bug 912372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920696">SUSE bug 920696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920697">SUSE bug 920697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920699">SUSE bug 920699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930691">SUSE bug 930691</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2486/">CVE-2013-2486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2486">CVE-2013-2486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2487/">CVE-2013-2487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2487">CVE-2013-2487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3555/">CVE-2013-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3555">CVE-2013-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3556/">CVE-2013-3556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3556">CVE-2013-3556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3557/">CVE-2013-3557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3557">CVE-2013-3557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3558/">CVE-2013-3558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3558">CVE-2013-3558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3559/">CVE-2013-3559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3559">CVE-2013-3559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3560/">CVE-2013-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3560">CVE-2013-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3561/">CVE-2013-3561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3561">CVE-2013-3561 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3562/">CVE-2013-3562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3562">CVE-2013-3562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4074/">CVE-2013-4074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4074">CVE-2013-4074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4075/">CVE-2013-4075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4075">CVE-2013-4075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4076/">CVE-2013-4076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4076">CVE-2013-4076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4077/">CVE-2013-4077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4077">CVE-2013-4077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4078/">CVE-2013-4078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4078">CVE-2013-4078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4079/">CVE-2013-4079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4079">CVE-2013-4079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4080/">CVE-2013-4080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4080">CVE-2013-4080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4081/">CVE-2013-4081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4081">CVE-2013-4081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4082/">CVE-2013-4082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4082">CVE-2013-4082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4083/">CVE-2013-4083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4083">CVE-2013-4083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4929/">CVE-2013-4929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4929">CVE-2013-4929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4930/">CVE-2013-4930 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4930">CVE-2013-4930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4931/">CVE-2013-4931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4931">CVE-2013-4931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4932/">CVE-2013-4932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4932">CVE-2013-4932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4933/">CVE-2013-4933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4933">CVE-2013-4933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4934/">CVE-2013-4934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4934">CVE-2013-4934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4935/">CVE-2013-4935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4935">CVE-2013-4935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6336/">CVE-2013-6336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6336">CVE-2013-6336 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6337/">CVE-2013-6337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6337">CVE-2013-6337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6338/">CVE-2013-6338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6338">CVE-2013-6338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6339/">CVE-2013-6339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6339">CVE-2013-6339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6340/">CVE-2013-6340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6340">CVE-2013-6340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7112/">CVE-2013-7112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7112">CVE-2013-7112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7113/">CVE-2013-7113 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7113">CVE-2013-7113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7114/">CVE-2013-7114 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7114">CVE-2013-7114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2281/">CVE-2014-2281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2281">CVE-2014-2281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2282/">CVE-2014-2282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2282">CVE-2014-2282 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2283/">CVE-2014-2283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2283">CVE-2014-2283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2299/">CVE-2014-2299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2299">CVE-2014-2299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6421/">CVE-2014-6421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6421">CVE-2014-6421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6422/">CVE-2014-6422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6422">CVE-2014-6422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6423/">CVE-2014-6423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6423">CVE-2014-6423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6424/">CVE-2014-6424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6424">CVE-2014-6424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6427/">CVE-2014-6427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6427">CVE-2014-6427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6428/">CVE-2014-6428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6428">CVE-2014-6428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6429/">CVE-2014-6429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6429">CVE-2014-6429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6430/">CVE-2014-6430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6430">CVE-2014-6430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6431/">CVE-2014-6431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6431">CVE-2014-6431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6432/">CVE-2014-6432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6432">CVE-2014-6432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8710/">CVE-2014-8710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8710">CVE-2014-8710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8711/">CVE-2014-8711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8711">CVE-2014-8711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8712/">CVE-2014-8712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8712">CVE-2014-8712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8713/">CVE-2014-8713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8713">CVE-2014-8713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8714/">CVE-2014-8714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8714">CVE-2014-8714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0559/">CVE-2015-0559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0559">CVE-2015-0559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0560/">CVE-2015-0560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0560">CVE-2015-0560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0561/">CVE-2015-0561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0561">CVE-2015-0561 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0562/">CVE-2015-0562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0562">CVE-2015-0562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0563/">CVE-2015-0563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0563">CVE-2015-0563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0564/">CVE-2015-0564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0564">CVE-2015-0564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2188/">CVE-2015-2188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2188">CVE-2015-2188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2189/">CVE-2015-2189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2189">CVE-2015-2189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2191/">CVE-2015-2191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2191">CVE-2015-2191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3811/">CVE-2015-3811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3811">CVE-2015-3811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3812/">CVE-2015-3812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3812">CVE-2015-3812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3814/">CVE-2015-3814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3814">CVE-2015-3814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581533" comment="wireshark-1.10.11-0.2.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581533" comment="wireshark-1.10.11-0.2.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581533" comment="wireshark-1.10.11-0.2.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219562" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="935158" ref_url="https://bugzilla.suse.com/935158" source="BUGZILLA"/>
		<reference ref_id="941500" ref_url="https://bugzilla.suse.com/941500" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813/" source="CVE"/>
		<reference ref_id="CVE-2015-4652" ref_url="https://www.suse.com/security/cve/CVE-2015-4652/" source="CVE"/>
		<reference ref_id="CVE-2015-6241" ref_url="https://www.suse.com/security/cve/CVE-2015-6241/" source="CVE"/>
		<reference ref_id="CVE-2015-6242" ref_url="https://www.suse.com/security/cve/CVE-2015-6242/" source="CVE"/>
		<reference ref_id="CVE-2015-6243" ref_url="https://www.suse.com/security/cve/CVE-2015-6243/" source="CVE"/>
		<reference ref_id="CVE-2015-6244" ref_url="https://www.suse.com/security/cve/CVE-2015-6244/" source="CVE"/>
		<reference ref_id="CVE-2015-6245" ref_url="https://www.suse.com/security/cve/CVE-2015-6245/" source="CVE"/>
		<reference ref_id="CVE-2015-6246" ref_url="https://www.suse.com/security/cve/CVE-2015-6246/" source="CVE"/>
		<reference ref_id="CVE-2015-6247" ref_url="https://www.suse.com/security/cve/CVE-2015-6247/" source="CVE"/>
		<reference ref_id="CVE-2015-6248" ref_url="https://www.suse.com/security/cve/CVE-2015-6248/" source="CVE"/>
		<reference ref_id="CVE-2015-6249" ref_url="https://www.suse.com/security/cve/CVE-2015-6249/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<description>

Wireshark has been updated to 1.12.7. (FATE#319388)

The following vulnerabilities have been fixed:
* Wireshark could crash when adding an item to the protocol tree. wnpa-sec-2015-21 CVE-2015-6241
* Wireshark could attempt to free invalid memory. wnpa-sec-2015-22 CVE-2015-6242
* Wireshark could crash when searching for a protocol dissector. wnpa-sec-2015-23 CVE-2015-6243
* The ZigBee dissector could crash. wnpa-sec-2015-24 CVE-2015-6244
* The GSM RLC/MAC dissector could go into an infinite loop. wnpa-sec-2015-25 CVE-2015-6245
* The WaveAgent dissector could crash. wnpa-sec-2015-26 CVE-2015-6246
* The OpenFlow dissector could go into an infinite loop. wnpa-sec-2015-27 CVE-2015-6247
* Wireshark could crash due to invalid ptvcursor length checking. wnpa-sec-2015-28 CVE-2015-6248
* The WCCP dissector could crash. wnpa-sec-2015-29 CVE-2015-6249
* Further bug fixes and updated protocol support as listed in:
    https://www.wireshark.org/docs/relnotes/wireshark-1.12.7.html 

Also a fix from 1.12.6 in GSM DTAP was backported. (bnc#935158 CVE-2015-4652)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-16"/>
	<updated date="2015-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935158">SUSE bug 935158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3813">CVE-2015-3813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4652/">CVE-2015-4652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4652">CVE-2015-4652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6241/">CVE-2015-6241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6241">CVE-2015-6241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6242/">CVE-2015-6242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6242">CVE-2015-6242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6243/">CVE-2015-6243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6243">CVE-2015-6243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6244/">CVE-2015-6244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6244">CVE-2015-6244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6245/">CVE-2015-6245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6245">CVE-2015-6245 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6246/">CVE-2015-6246 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6246">CVE-2015-6246 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6247/">CVE-2015-6247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6247">CVE-2015-6247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6248/">CVE-2015-6248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6248">CVE-2015-6248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6249/">CVE-2015-6249 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6249">CVE-2015-6249 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581534" comment="wireshark-1.12.7-0.5.3 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581534" comment="wireshark-1.12.7-0.5.3 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581534" comment="wireshark-1.12.7-0.5.3 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219563" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="950437" ref_url="https://bugzilla.suse.com/950437" source="BUGZILLA"/>
		<reference ref_id="960382" ref_url="https://bugzilla.suse.com/960382" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7830" ref_url="https://www.suse.com/security/cve/CVE-2015-7830/" source="CVE"/>
		<reference ref_id="CVE-2015-8711" ref_url="https://www.suse.com/security/cve/CVE-2015-8711/" source="CVE"/>
		<reference ref_id="CVE-2015-8712" ref_url="https://www.suse.com/security/cve/CVE-2015-8712/" source="CVE"/>
		<reference ref_id="CVE-2015-8713" ref_url="https://www.suse.com/security/cve/CVE-2015-8713/" source="CVE"/>
		<reference ref_id="CVE-2015-8714" ref_url="https://www.suse.com/security/cve/CVE-2015-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-8715" ref_url="https://www.suse.com/security/cve/CVE-2015-8715/" source="CVE"/>
		<reference ref_id="CVE-2015-8716" ref_url="https://www.suse.com/security/cve/CVE-2015-8716/" source="CVE"/>
		<reference ref_id="CVE-2015-8717" ref_url="https://www.suse.com/security/cve/CVE-2015-8717/" source="CVE"/>
		<reference ref_id="CVE-2015-8718" ref_url="https://www.suse.com/security/cve/CVE-2015-8718/" source="CVE"/>
		<reference ref_id="CVE-2015-8719" ref_url="https://www.suse.com/security/cve/CVE-2015-8719/" source="CVE"/>
		<reference ref_id="CVE-2015-8720" ref_url="https://www.suse.com/security/cve/CVE-2015-8720/" source="CVE"/>
		<reference ref_id="CVE-2015-8721" ref_url="https://www.suse.com/security/cve/CVE-2015-8721/" source="CVE"/>
		<reference ref_id="CVE-2015-8722" ref_url="https://www.suse.com/security/cve/CVE-2015-8722/" source="CVE"/>
		<reference ref_id="CVE-2015-8723" ref_url="https://www.suse.com/security/cve/CVE-2015-8723/" source="CVE"/>
		<reference ref_id="CVE-2015-8724" ref_url="https://www.suse.com/security/cve/CVE-2015-8724/" source="CVE"/>
		<reference ref_id="CVE-2015-8725" ref_url="https://www.suse.com/security/cve/CVE-2015-8725/" source="CVE"/>
		<reference ref_id="CVE-2015-8726" ref_url="https://www.suse.com/security/cve/CVE-2015-8726/" source="CVE"/>
		<reference ref_id="CVE-2015-8727" ref_url="https://www.suse.com/security/cve/CVE-2015-8727/" source="CVE"/>
		<reference ref_id="CVE-2015-8728" ref_url="https://www.suse.com/security/cve/CVE-2015-8728/" source="CVE"/>
		<reference ref_id="CVE-2015-8729" ref_url="https://www.suse.com/security/cve/CVE-2015-8729/" source="CVE"/>
		<reference ref_id="CVE-2015-8730" ref_url="https://www.suse.com/security/cve/CVE-2015-8730/" source="CVE"/>
		<reference ref_id="CVE-2015-8731" ref_url="https://www.suse.com/security/cve/CVE-2015-8731/" source="CVE"/>
		<reference ref_id="CVE-2015-8732" ref_url="https://www.suse.com/security/cve/CVE-2015-8732/" source="CVE"/>
		<reference ref_id="CVE-2015-8733" ref_url="https://www.suse.com/security/cve/CVE-2015-8733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<description>

This update contains Wireshark 1.12.9 and fixes the following issues:

* CVE-2015-7830: pcapng file parser could crash while copying an interface filter (bsc#950437)
* CVE-2015-8711: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate conversation data, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
* CVE-2015-8712: The dissect_hsdsch_channel_info function in epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not validate the number of PDUs, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8713: epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not properly reserve memory for channel ID mappings, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.
* CVE-2015-8714: The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8715: epan/dissectors/packet-alljoyn.c in the AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does not check for empty arguments, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
* CVE-2015-8716: The init_t38_info_conv function in epan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x before 1.12.9 does not ensure that a conversation exists, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8717: The dissect_sdp function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.12.x before 1.12.9 does not prevent use of a negative media count, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8718: Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the 'Match MSG/RES packets for async NLM' option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8719: The dissect_dns_answer function in epan/dissectors/packet-dns.c in the DNS dissector in Wireshark 1.12.x before 1.12.9 mishandles the EDNS0 Client Subnet option, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8720: The dissect_ber_GeneralizedTime function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8721: Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression.
* CVE-2015-8722: epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the frame pointer, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
* CVE-2015-8723: The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted
* CVE-2015-8724: The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not verify the WPA broadcast key length, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8725: The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
* CVE-2015-8726: wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
* CVE-2015-8727: The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not properly maintain request-key data, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.
* CVE-2015-8728: The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function, which allows remote attackers to cause a denial of service (buffer overflow and application crash) via a crafted packet.
* CVE-2015-8729: The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
* CVE-2015-8730: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet.
* CVE-2015-8731: The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8732: The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8733: The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-13"/>
	<updated date="2016-01-13"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/950437">SUSE bug 950437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7830/">CVE-2015-7830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7830">CVE-2015-7830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8711/">CVE-2015-8711 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8711">CVE-2015-8711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8712/">CVE-2015-8712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8712">CVE-2015-8712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8713/">CVE-2015-8713 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8713">CVE-2015-8713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8714/">CVE-2015-8714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8714">CVE-2015-8714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8715/">CVE-2015-8715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8715">CVE-2015-8715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8716/">CVE-2015-8716 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8716">CVE-2015-8716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8717/">CVE-2015-8717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8717">CVE-2015-8717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8718/">CVE-2015-8718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8718">CVE-2015-8718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8719/">CVE-2015-8719 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8719">CVE-2015-8719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8720/">CVE-2015-8720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8720">CVE-2015-8720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8721/">CVE-2015-8721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8721">CVE-2015-8721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8722/">CVE-2015-8722 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8722">CVE-2015-8722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8723/">CVE-2015-8723 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8723">CVE-2015-8723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8724/">CVE-2015-8724 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8724">CVE-2015-8724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8725/">CVE-2015-8725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8725">CVE-2015-8725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8726/">CVE-2015-8726 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8726">CVE-2015-8726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8727/">CVE-2015-8727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8727">CVE-2015-8727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8728/">CVE-2015-8728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8728">CVE-2015-8728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8729/">CVE-2015-8729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8729">CVE-2015-8729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8730/">CVE-2015-8730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8730">CVE-2015-8730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8731/">CVE-2015-8731 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8731">CVE-2015-8731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8732/">CVE-2015-8732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8732">CVE-2015-8732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8733/">CVE-2015-8733 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8733">CVE-2015-8733 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581535" comment="wireshark-1.12.9-0.12.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581535" comment="wireshark-1.12.9-0.12.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581535" comment="wireshark-1.12.9-0.12.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219564" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="968565" ref_url="https://bugzilla.suse.com/968565" source="BUGZILLA"/>
		<reference ref_id="976944" ref_url="https://bugzilla.suse.com/976944" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2523" ref_url="https://www.suse.com/security/cve/CVE-2016-2523/" source="CVE"/>
		<reference ref_id="CVE-2016-2530" ref_url="https://www.suse.com/security/cve/CVE-2016-2530/" source="CVE"/>
		<reference ref_id="CVE-2016-2531" ref_url="https://www.suse.com/security/cve/CVE-2016-2531/" source="CVE"/>
		<reference ref_id="CVE-2016-2532" ref_url="https://www.suse.com/security/cve/CVE-2016-2532/" source="CVE"/>
		<description>
This update to Wireshark 1 12.11 fixes a number issues in protocol dissectors that could have allowed a remote attacker to crash Wireshark or cause excessive CPU usage through specially crafted packages inserted into the network or a capture file.

- The PKTC dissector could crash (wnpa-sec-2016-22)
- The PKTC dissector could crash (wnpa-sec-2016-23)
- The IAX2 dissector could go into an infinite loop (wnpa-sec-2016-24)
- Wireshark and TShark could exhaust the stack (wnpa-sec-2016-25) 
- The GSM CBCH dissector could crash (wnpa-sec-2016-26)
- The NCP dissector could crash (wnpa-sec-2016-28)
- CVE-2016-2523: DNP dissector infinite loop (wnpa-sec-2016-03)
- CVE-2016-2530: RSL dissector crash (wnpa-sec-2016-10)
- CVE-2016-2531: RSL dissector crash (wnpa-sec-2016-10)
- CVE-2016-2532: LLRP dissector crash (wnpa-sec-2016-11)
- GSM A-bis OML dissector crash (wnpa-sec-2016-14)
- ASN.1 BER dissector crash (wnpa-sec-2016-15)
- ASN.1 BER dissector crash (wnpa-sec-2016-18) 

Also containsfurther bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-1.12.11.html 
https://www.wireshark.org/docs/relnotes/wireshark-1.12.10.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-18"/>
	<updated date="2016-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/968565">SUSE bug 968565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976944">SUSE bug 976944</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2523/">CVE-2016-2523 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2523">CVE-2016-2523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2530/">CVE-2016-2530 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2530">CVE-2016-2530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2531/">CVE-2016-2531 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2531">CVE-2016-2531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2532/">CVE-2016-2532 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2532">CVE-2016-2532 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575359" comment="wireshark-1.12.11-0.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219565" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="983671" ref_url="https://bugzilla.suse.com/983671" source="BUGZILLA"/>
		<reference ref_id="991012" ref_url="https://bugzilla.suse.com/991012" source="BUGZILLA"/>
		<reference ref_id="991013" ref_url="https://bugzilla.suse.com/991013" source="BUGZILLA"/>
		<reference ref_id="991015" ref_url="https://bugzilla.suse.com/991015" source="BUGZILLA"/>
		<reference ref_id="991016" ref_url="https://bugzilla.suse.com/991016" source="BUGZILLA"/>
		<reference ref_id="991017" ref_url="https://bugzilla.suse.com/991017" source="BUGZILLA"/>
		<reference ref_id="991018" ref_url="https://bugzilla.suse.com/991018" source="BUGZILLA"/>
		<reference ref_id="991019" ref_url="https://bugzilla.suse.com/991019" source="BUGZILLA"/>
		<reference ref_id="991020" ref_url="https://bugzilla.suse.com/991020" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5350" ref_url="https://www.suse.com/security/cve/CVE-2016-5350/" source="CVE"/>
		<reference ref_id="CVE-2016-5351" ref_url="https://www.suse.com/security/cve/CVE-2016-5351/" source="CVE"/>
		<reference ref_id="CVE-2016-5352" ref_url="https://www.suse.com/security/cve/CVE-2016-5352/" source="CVE"/>
		<reference ref_id="CVE-2016-5353" ref_url="https://www.suse.com/security/cve/CVE-2016-5353/" source="CVE"/>
		<reference ref_id="CVE-2016-5354" ref_url="https://www.suse.com/security/cve/CVE-2016-5354/" source="CVE"/>
		<reference ref_id="CVE-2016-5355" ref_url="https://www.suse.com/security/cve/CVE-2016-5355/" source="CVE"/>
		<reference ref_id="CVE-2016-5356" ref_url="https://www.suse.com/security/cve/CVE-2016-5356/" source="CVE"/>
		<reference ref_id="CVE-2016-5357" ref_url="https://www.suse.com/security/cve/CVE-2016-5357/" source="CVE"/>
		<reference ref_id="CVE-2016-5358" ref_url="https://www.suse.com/security/cve/CVE-2016-5358/" source="CVE"/>
		<reference ref_id="CVE-2016-5359" ref_url="https://www.suse.com/security/cve/CVE-2016-5359/" source="CVE"/>
		<reference ref_id="CVE-2016-6504" ref_url="https://www.suse.com/security/cve/CVE-2016-6504/" source="CVE"/>
		<reference ref_id="CVE-2016-6505" ref_url="https://www.suse.com/security/cve/CVE-2016-6505/" source="CVE"/>
		<reference ref_id="CVE-2016-6506" ref_url="https://www.suse.com/security/cve/CVE-2016-6506/" source="CVE"/>
		<reference ref_id="CVE-2016-6507" ref_url="https://www.suse.com/security/cve/CVE-2016-6507/" source="CVE"/>
		<reference ref_id="CVE-2016-6508" ref_url="https://www.suse.com/security/cve/CVE-2016-6508/" source="CVE"/>
		<reference ref_id="CVE-2016-6509" ref_url="https://www.suse.com/security/cve/CVE-2016-6509/" source="CVE"/>
		<reference ref_id="CVE-2016-6510" ref_url="https://www.suse.com/security/cve/CVE-2016-6510/" source="CVE"/>
		<reference ref_id="CVE-2016-6511" ref_url="https://www.suse.com/security/cve/CVE-2016-6511/" source="CVE"/>
		<description>

This update to wireshark 1.12.13 fixes the following issues:

 - CVE-2016-6504: wireshark: NDS dissector crash (bsc#991012)
 - CVE-2016-6505: wireshark: PacketBB dissector could divide by zero (bsc#991013)
 - CVE-2016-6506: wireshark: WSP infinite loop (bsc#991015)
 - CVE-2016-6507: wireshark: MMSE infinite loop (bsc#991016)
 - CVE-2016-6508: wireshark: RLC long loop (bsc#991017)
 - CVE-2016-6509: wireshark: LDSS dissector crash (bsc#991018)
 - CVE-2016-6510: wireshark: RLC dissector crash (bsc#991019)
 - CVE-2016-6511: wireshark: OpenFlow long loop (bnc991020)
 - CVE-2016-5350: SPOOLS infinite loop (bsc#983671)
 - CVE-2016-5351: IEEE 802.11 dissector crash (bsc#983671)
 - CVE-2016-5352: IEEE 802.11 dissector crash, different from wpna-sec-2016-30 (bsc#983671)
 - CVE-2016-5353: UMTS FP crash (bsc#983671)
 - CVE-2016-5354: USB dissector crash (bsc#983671)
 - CVE-2016-5355: Toshiba file parser crash (bsc#983671)
 - CVE-2016-5356: CoSine file parser crash (bsc#983671)
 - CVE-2016-5357: NetScreen file parser crash (bsc#983671)
 - CVE-2016-5358: Ethernet dissector crash (bsc#983671)
 - CVE-2016-5359: WBXML infinite loop (bsc#983671)

For more details please see:
  https://www.wireshark.org/docs/relnotes/wireshark-1.12.12.html
  https://www.wireshark.org/docs/relnotes/wireshark-1.12.13.html

		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-02"/>
	<updated date="2016-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991012">SUSE bug 991012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991013">SUSE bug 991013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991015">SUSE bug 991015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991016">SUSE bug 991016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991017">SUSE bug 991017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991018">SUSE bug 991018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991019">SUSE bug 991019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991020">SUSE bug 991020</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5350/">CVE-2016-5350 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5350">CVE-2016-5350 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5351/">CVE-2016-5351 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5351">CVE-2016-5351 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5352/">CVE-2016-5352 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5352">CVE-2016-5352 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5353/">CVE-2016-5353 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5353">CVE-2016-5353 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5354/">CVE-2016-5354 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5354">CVE-2016-5354 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5355/">CVE-2016-5355 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5355">CVE-2016-5355 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5356/">CVE-2016-5356 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5356">CVE-2016-5356 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5357/">CVE-2016-5357 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5357">CVE-2016-5357 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5358/">CVE-2016-5358 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5358">CVE-2016-5358 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5359/">CVE-2016-5359 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5359">CVE-2016-5359 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6504/">CVE-2016-6504 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6504">CVE-2016-6504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6505/">CVE-2016-6505 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6505">CVE-2016-6505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6506/">CVE-2016-6506 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6506">CVE-2016-6506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6507/">CVE-2016-6507 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6507">CVE-2016-6507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6508/">CVE-2016-6508 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6508">CVE-2016-6508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6509/">CVE-2016-6509 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6509">CVE-2016-6509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6510/">CVE-2016-6510 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6510">CVE-2016-6510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6511/">CVE-2016-6511 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6511">CVE-2016-6511 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575360" comment="wireshark-1.12.13-0.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219566" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1002981" ref_url="https://bugzilla.suse.com/1002981" source="BUGZILLA"/>
		<reference ref_id="1010735" ref_url="https://bugzilla.suse.com/1010735" source="BUGZILLA"/>
		<reference ref_id="1010740" ref_url="https://bugzilla.suse.com/1010740" source="BUGZILLA"/>
		<reference ref_id="1010752" ref_url="https://bugzilla.suse.com/1010752" source="BUGZILLA"/>
		<reference ref_id="1010754" ref_url="https://bugzilla.suse.com/1010754" source="BUGZILLA"/>
		<reference ref_id="1010911" ref_url="https://bugzilla.suse.com/1010911" source="BUGZILLA"/>
		<reference ref_id="1021739" ref_url="https://bugzilla.suse.com/1021739" source="BUGZILLA"/>
		<reference ref_id="1025913" ref_url="https://bugzilla.suse.com/1025913" source="BUGZILLA"/>
		<reference ref_id="1027998" ref_url="https://bugzilla.suse.com/1027998" source="BUGZILLA"/>
		<reference ref_id="1033936" ref_url="https://bugzilla.suse.com/1033936" source="BUGZILLA"/>
		<reference ref_id="1033937" ref_url="https://bugzilla.suse.com/1033937" source="BUGZILLA"/>
		<reference ref_id="1033938" ref_url="https://bugzilla.suse.com/1033938" source="BUGZILLA"/>
		<reference ref_id="1033939" ref_url="https://bugzilla.suse.com/1033939" source="BUGZILLA"/>
		<reference ref_id="1033940" ref_url="https://bugzilla.suse.com/1033940" source="BUGZILLA"/>
		<reference ref_id="1033941" ref_url="https://bugzilla.suse.com/1033941" source="BUGZILLA"/>
		<reference ref_id="1033942" ref_url="https://bugzilla.suse.com/1033942" source="BUGZILLA"/>
		<reference ref_id="1033943" ref_url="https://bugzilla.suse.com/1033943" source="BUGZILLA"/>
		<reference ref_id="1033944" ref_url="https://bugzilla.suse.com/1033944" source="BUGZILLA"/>
		<reference ref_id="1033945" ref_url="https://bugzilla.suse.com/1033945" source="BUGZILLA"/>
		<reference ref_id="998761" ref_url="https://bugzilla.suse.com/998761" source="BUGZILLA"/>
		<reference ref_id="998762" ref_url="https://bugzilla.suse.com/998762" source="BUGZILLA"/>
		<reference ref_id="998763" ref_url="https://bugzilla.suse.com/998763" source="BUGZILLA"/>
		<reference ref_id="998800" ref_url="https://bugzilla.suse.com/998800" source="BUGZILLA"/>
		<reference ref_id="998963" ref_url="https://bugzilla.suse.com/998963" source="BUGZILLA"/>
		<reference ref_id="998964" ref_url="https://bugzilla.suse.com/998964" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7175" ref_url="https://www.suse.com/security/cve/CVE-2016-7175/" source="CVE"/>
		<reference ref_id="CVE-2016-7176" ref_url="https://www.suse.com/security/cve/CVE-2016-7176/" source="CVE"/>
		<reference ref_id="CVE-2016-7177" ref_url="https://www.suse.com/security/cve/CVE-2016-7177/" source="CVE"/>
		<reference ref_id="CVE-2016-7178" ref_url="https://www.suse.com/security/cve/CVE-2016-7178/" source="CVE"/>
		<reference ref_id="CVE-2016-7179" ref_url="https://www.suse.com/security/cve/CVE-2016-7179/" source="CVE"/>
		<reference ref_id="CVE-2016-7180" ref_url="https://www.suse.com/security/cve/CVE-2016-7180/" source="CVE"/>
		<reference ref_id="CVE-2016-9373" ref_url="https://www.suse.com/security/cve/CVE-2016-9373/" source="CVE"/>
		<reference ref_id="CVE-2016-9374" ref_url="https://www.suse.com/security/cve/CVE-2016-9374/" source="CVE"/>
		<reference ref_id="CVE-2016-9375" ref_url="https://www.suse.com/security/cve/CVE-2016-9375/" source="CVE"/>
		<reference ref_id="CVE-2016-9376" ref_url="https://www.suse.com/security/cve/CVE-2016-9376/" source="CVE"/>
		<reference ref_id="CVE-2017-5596" ref_url="https://www.suse.com/security/cve/CVE-2017-5596/" source="CVE"/>
		<reference ref_id="CVE-2017-5597" ref_url="https://www.suse.com/security/cve/CVE-2017-5597/" source="CVE"/>
		<reference ref_id="CVE-2017-6014" ref_url="https://www.suse.com/security/cve/CVE-2017-6014/" source="CVE"/>
		<reference ref_id="CVE-2017-7700" ref_url="https://www.suse.com/security/cve/CVE-2017-7700/" source="CVE"/>
		<reference ref_id="CVE-2017-7701" ref_url="https://www.suse.com/security/cve/CVE-2017-7701/" source="CVE"/>
		<reference ref_id="CVE-2017-7702" ref_url="https://www.suse.com/security/cve/CVE-2017-7702/" source="CVE"/>
		<reference ref_id="CVE-2017-7703" ref_url="https://www.suse.com/security/cve/CVE-2017-7703/" source="CVE"/>
		<reference ref_id="CVE-2017-7704" ref_url="https://www.suse.com/security/cve/CVE-2017-7704/" source="CVE"/>
		<reference ref_id="CVE-2017-7705" ref_url="https://www.suse.com/security/cve/CVE-2017-7705/" source="CVE"/>
		<reference ref_id="CVE-2017-7745" ref_url="https://www.suse.com/security/cve/CVE-2017-7745/" source="CVE"/>
		<reference ref_id="CVE-2017-7746" ref_url="https://www.suse.com/security/cve/CVE-2017-7746/" source="CVE"/>
		<reference ref_id="CVE-2017-7747" ref_url="https://www.suse.com/security/cve/CVE-2017-7747/" source="CVE"/>
		<reference ref_id="CVE-2017-7748" ref_url="https://www.suse.com/security/cve/CVE-2017-7748/" source="CVE"/>
		<description>

Wireshark was updated to version 2.0.12, which brings several new features, enhancements
and bug fixes.

These security issues were fixed:

- CVE-2017-7700: In Wireshark the NetScaler file parser could go into an infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by ensuring a nonzero record size (bsc#1033936).
- CVE-2017-7701: In Wireshark the BGP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-bgp.c by using a different integer data type (bsc#1033937).
- CVE-2017-7702: In Wireshark the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding length validation (bsc#1033938).
- CVE-2017-7703: In Wireshark the IMAP dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-imap.c by calculating a line's end correctly (bsc#1033939).
- CVE-2017-7704: In Wireshark the DOF dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dof.c by using a different integer data type and adjusting a return value (bsc#1033940).
- CVE-2017-7705: In Wireshark the RPC over RDMA dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-rpcrdma.c by correctly checking for going beyond the maximum offset (bsc#1033941).
- CVE-2017-7745: In Wireshark the SIGCOMP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-sigcomp.c by correcting a memory-size check (bsc#1033942).
- CVE-2017-7746: In Wireshark the SLSK dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-slsk.c by adding checks for the remaining length (bsc#1033943).
- CVE-2017-7747: In Wireshark the PacketBB dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-packetbb.c by restricting additions to the protocol tree (bsc#1033944).
- CVE-2017-7748: In Wireshark the WSP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wsp.c by adding a length check (bsc#1033945).
- CVE-2016-7179: Stack-based buffer overflow in epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#998963).
- CVE-2016-9376: In Wireshark the OpenFlow dissector could crash with memory exhaustion, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-openflow_v5.c by ensuring that certain length values were sufficiently large (bsc#1010735).
- CVE-2016-9375: In Wireshark the DTN dissector could go into an infinite loop, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dtn.c by checking whether SDNV evaluation was successful (bsc#1010740).
- CVE-2016-9374: In Wireshark the AllJoyn dissector could crash with a buffer over-read, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-alljoyn.c by ensuring that a length variable properly tracked the state of a signature variable (bsc#1010752).
- CVE-2016-9373: In Wireshark the DCERPC dissector could crash with a use-after-free, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dcerpc-nt.c and epan/dissectors/packet-dcerpc-spoolss.c by using the wmem file scope for private strings (bsc#1010754).
- CVE-2016-7175: epan/dissectors/packet-qnet6.c in the QNX6 QNET dissector in Wireshark mishandled MAC address data, which allowed remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet (bsc#998761).
- CVE-2016-7176: epan/dissectors/packet-h225.c in the H.225 dissector in Wireshark called snprintf with one of its input buffers as the output buffer, which allowed remote attackers to cause a denial of service (copy overlap and application crash) via a crafted packet (bsc#998762).
- CVE-2016-7177: epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark did not restrict the number of channels, which allowed remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet (bsc#998763).
- CVE-2016-7180: epan/dissectors/packet-ipmi-trace.c in the IPMI trace dissector in Wireshark did not properly consider whether a string is constant, which allowed remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet (bsc#998800).
- CVE-2016-7178: epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark did not ensure that memory is allocated for certain data structures, which allowed remote attackers to cause a denial of service (invalid write access and application crash) via a crafted packet (bsc#998964).
- CVE-2017-6014: In Wireshark a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory (bsc#1025913).
- CVE-2017-5596: In Wireshark the ASTERIX dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-asterix.c by changing a data type to avoid an integer overflow (bsc#1021739).
- CVE-2017-5597: In Wireshark the DHCPv6 dissector could go into a large loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dhcpv6.c by changing a data type to avoid an integer overflow (bsc#1021739).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-04"/>
	<updated date="2017-05-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002981">SUSE bug 1002981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010735">SUSE bug 1010735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010740">SUSE bug 1010740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010752">SUSE bug 1010752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010754">SUSE bug 1010754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010911">SUSE bug 1010911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021739">SUSE bug 1021739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025913">SUSE bug 1025913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027998">SUSE bug 1027998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033936">SUSE bug 1033936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033937">SUSE bug 1033937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033938">SUSE bug 1033938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033939">SUSE bug 1033939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033940">SUSE bug 1033940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033941">SUSE bug 1033941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033942">SUSE bug 1033942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033943">SUSE bug 1033943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033944">SUSE bug 1033944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033945">SUSE bug 1033945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998761">SUSE bug 998761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998762">SUSE bug 998762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998763">SUSE bug 998763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998800">SUSE bug 998800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998963">SUSE bug 998963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998964">SUSE bug 998964</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7175/">CVE-2016-7175 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7175">CVE-2016-7175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7176/">CVE-2016-7176 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7176">CVE-2016-7176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7177/">CVE-2016-7177 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7177">CVE-2016-7177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7178/">CVE-2016-7178 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7178">CVE-2016-7178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7179/">CVE-2016-7179 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7179">CVE-2016-7179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7180/">CVE-2016-7180 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7180">CVE-2016-7180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9373/">CVE-2016-9373 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9373">CVE-2016-9373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9374/">CVE-2016-9374 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9374">CVE-2016-9374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9375/">CVE-2016-9375 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9375">CVE-2016-9375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9376/">CVE-2016-9376 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9376">CVE-2016-9376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5596/">CVE-2017-5596 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5596">CVE-2017-5596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5597/">CVE-2017-5597 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5597">CVE-2017-5597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6014/">CVE-2017-6014 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6014">CVE-2017-6014 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7700/">CVE-2017-7700 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7700">CVE-2017-7700 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7701/">CVE-2017-7701 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7701">CVE-2017-7701 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7702/">CVE-2017-7702 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7702">CVE-2017-7702 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7703/">CVE-2017-7703 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7703">CVE-2017-7703 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7704/">CVE-2017-7704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7704">CVE-2017-7704 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7705/">CVE-2017-7705 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7705">CVE-2017-7705 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7745/">CVE-2017-7745 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7745">CVE-2017-7745 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7746/">CVE-2017-7746 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7746">CVE-2017-7746 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7747/">CVE-2017-7747 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7747">CVE-2017-7747 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7748/">CVE-2017-7748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7748">CVE-2017-7748 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575362" comment="wireshark-2.0.12-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575363" comment="wireshark-gtk-2.0.12-36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219567" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1042298" ref_url="https://bugzilla.suse.com/1042298" source="BUGZILLA"/>
		<reference ref_id="1042299" ref_url="https://bugzilla.suse.com/1042299" source="BUGZILLA"/>
		<reference ref_id="1042300" ref_url="https://bugzilla.suse.com/1042300" source="BUGZILLA"/>
		<reference ref_id="1042301" ref_url="https://bugzilla.suse.com/1042301" source="BUGZILLA"/>
		<reference ref_id="1042302" ref_url="https://bugzilla.suse.com/1042302" source="BUGZILLA"/>
		<reference ref_id="1042303" ref_url="https://bugzilla.suse.com/1042303" source="BUGZILLA"/>
		<reference ref_id="1042304" ref_url="https://bugzilla.suse.com/1042304" source="BUGZILLA"/>
		<reference ref_id="1042305" ref_url="https://bugzilla.suse.com/1042305" source="BUGZILLA"/>
		<reference ref_id="1042306" ref_url="https://bugzilla.suse.com/1042306" source="BUGZILLA"/>
		<reference ref_id="1042307" ref_url="https://bugzilla.suse.com/1042307" source="BUGZILLA"/>
		<reference ref_id="1042308" ref_url="https://bugzilla.suse.com/1042308" source="BUGZILLA"/>
		<reference ref_id="1042309" ref_url="https://bugzilla.suse.com/1042309" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9343" ref_url="https://www.suse.com/security/cve/CVE-2017-9343/" source="CVE"/>
		<reference ref_id="CVE-2017-9344" ref_url="https://www.suse.com/security/cve/CVE-2017-9344/" source="CVE"/>
		<reference ref_id="CVE-2017-9345" ref_url="https://www.suse.com/security/cve/CVE-2017-9345/" source="CVE"/>
		<reference ref_id="CVE-2017-9346" ref_url="https://www.suse.com/security/cve/CVE-2017-9346/" source="CVE"/>
		<reference ref_id="CVE-2017-9347" ref_url="https://www.suse.com/security/cve/CVE-2017-9347/" source="CVE"/>
		<reference ref_id="CVE-2017-9348" ref_url="https://www.suse.com/security/cve/CVE-2017-9348/" source="CVE"/>
		<reference ref_id="CVE-2017-9349" ref_url="https://www.suse.com/security/cve/CVE-2017-9349/" source="CVE"/>
		<reference ref_id="CVE-2017-9350" ref_url="https://www.suse.com/security/cve/CVE-2017-9350/" source="CVE"/>
		<reference ref_id="CVE-2017-9351" ref_url="https://www.suse.com/security/cve/CVE-2017-9351/" source="CVE"/>
		<reference ref_id="CVE-2017-9352" ref_url="https://www.suse.com/security/cve/CVE-2017-9352/" source="CVE"/>
		<reference ref_id="CVE-2017-9353" ref_url="https://www.suse.com/security/cve/CVE-2017-9353/" source="CVE"/>
		<reference ref_id="CVE-2017-9354" ref_url="https://www.suse.com/security/cve/CVE-2017-9354/" source="CVE"/>
		<description>
The network analysis tool wireshark was updated to version 2.0.13 to fix the following issues:

* CVE-2017-9352: Bazaar dissector infinite loop (wnpa-sec-2017-22) (bsc#1042304)
* CVE-2017-9348: DOF dissector read overflow (wnpa-sec-2017-23) (bsc#1042303)
* CVE-2017-9351: DHCP dissector read overflow (wnpa-sec-2017-24) (bsc#1042302)
* CVE-2017-9346: SoulSeek dissector infinite loop (wnpa-sec-2017-25) (bsc#1042301)
* CVE-2017-9345: DNS dissector infinite loop (wnpa-sec-2017-26) (bsc#1042300)
* CVE-2017-9349: DICOM dissector infinite loop (wnpa-sec-2017-27) (bsc#1042305)
* CVE-2017-9350: openSAFETY dissector memory exh.. (wnpa-sec-2017-28) (bsc#1042299)
* CVE-2017-9344: BT L2CAP dissector divide by zero (wnpa-sec-2017-29) (bsc#1042298)
* CVE-2017-9343: MSNIP dissector crash (wnpa-sec-2017-30) (bsc#1042309)
* CVE-2017-9347: ROS dissector crash (wnpa-sec-2017-31) (bsc#1042308)
* CVE-2017-9354: RGMP dissector crash (wnpa-sec-2017-32) (bsc#1042307)
* CVE-2017-9353: wireshark: IPv6 dissector crash (wnpa-sec-2017-33) (bsc#1042306)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-23"/>
	<updated date="2017-06-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042298">SUSE bug 1042298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042299">SUSE bug 1042299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042300">SUSE bug 1042300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042301">SUSE bug 1042301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042302">SUSE bug 1042302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042303">SUSE bug 1042303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042304">SUSE bug 1042304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042305">SUSE bug 1042305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042306">SUSE bug 1042306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042307">SUSE bug 1042307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042308">SUSE bug 1042308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042309">SUSE bug 1042309</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9343/">CVE-2017-9343 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9343">CVE-2017-9343 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9344/">CVE-2017-9344 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9344">CVE-2017-9344 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9345/">CVE-2017-9345 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9345">CVE-2017-9345 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9346/">CVE-2017-9346 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9346">CVE-2017-9346 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9347/">CVE-2017-9347 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9347">CVE-2017-9347 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9348/">CVE-2017-9348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9348">CVE-2017-9348 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9349/">CVE-2017-9349 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9349">CVE-2017-9349 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9350/">CVE-2017-9350 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9350">CVE-2017-9350 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9351/">CVE-2017-9351 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9351">CVE-2017-9351 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9352/">CVE-2017-9352 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9352">CVE-2017-9352 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9353/">CVE-2017-9353 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9353">CVE-2017-9353 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9354/">CVE-2017-9354 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9354">CVE-2017-9354 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575364" comment="wireshark-2.0.13-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575365" comment="wireshark-gtk-2.0.13-39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219568" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1049255" ref_url="https://bugzilla.suse.com/1049255" source="BUGZILLA"/>
		<reference ref_id="1049621" ref_url="https://bugzilla.suse.com/1049621" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11406" ref_url="https://www.suse.com/security/cve/CVE-2017-11406/" source="CVE"/>
		<reference ref_id="CVE-2017-11407" ref_url="https://www.suse.com/security/cve/CVE-2017-11407/" source="CVE"/>
		<reference ref_id="CVE-2017-11408" ref_url="https://www.suse.com/security/cve/CVE-2017-11408/" source="CVE"/>
		<reference ref_id="CVE-2017-11410" ref_url="https://www.suse.com/security/cve/CVE-2017-11410/" source="CVE"/>
		<reference ref_id="CVE-2017-11411" ref_url="https://www.suse.com/security/cve/CVE-2017-11411/" source="CVE"/>
		<description>
This wireshark update to version 2.2.8 fixes the following issues:

Security issues fixed:
- CVE-2017-11411: The openSAFETY dissectorcould crash or exhaust system memory because of missing
  length validation. (bsc#1049621)
- CVE-2017-11410: The WBXML dissector could go into an infinite loop. (bsc#1049255)
- CVE-2017-11408: The AMQP dissector could crash. (bsc#1049255)
- CVE-2017-11407: The MQ dissector could crash. (bsc#1049255)
- CVE-2017-11406: The DOCSIS dissector could go into an infinite loop. (bsc#1049255)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-03"/>
	<updated date="2017-08-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049621">SUSE bug 1049621</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11406/">CVE-2017-11406 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11406">CVE-2017-11406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11407/">CVE-2017-11407 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11407">CVE-2017-11407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11408/">CVE-2017-11408 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11408">CVE-2017-11408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11410/">CVE-2017-11410 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11410">CVE-2017-11410 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11411/">CVE-2017-11411 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11411">CVE-2017-11411 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575366" comment="wireshark-2.0.14-40.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575367" comment="wireshark-gtk-2.0.14-40.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219569" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1044417" ref_url="https://bugzilla.suse.com/1044417" source="BUGZILLA"/>
		<reference ref_id="1045341" ref_url="https://bugzilla.suse.com/1045341" source="BUGZILLA"/>
		<reference ref_id="1056248" ref_url="https://bugzilla.suse.com/1056248" source="BUGZILLA"/>
		<reference ref_id="1056249" ref_url="https://bugzilla.suse.com/1056249" source="BUGZILLA"/>
		<reference ref_id="1056251" ref_url="https://bugzilla.suse.com/1056251" source="BUGZILLA"/>
		<reference ref_id="1062645" ref_url="https://bugzilla.suse.com/1062645" source="BUGZILLA"/>
		<reference ref_id="1070727" ref_url="https://bugzilla.suse.com/1070727" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13765" ref_url="https://www.suse.com/security/cve/CVE-2017-13765/" source="CVE"/>
		<reference ref_id="CVE-2017-13766" ref_url="https://www.suse.com/security/cve/CVE-2017-13766/" source="CVE"/>
		<reference ref_id="CVE-2017-13767" ref_url="https://www.suse.com/security/cve/CVE-2017-13767/" source="CVE"/>
		<reference ref_id="CVE-2017-15191" ref_url="https://www.suse.com/security/cve/CVE-2017-15191/" source="CVE"/>
		<reference ref_id="CVE-2017-15192" ref_url="https://www.suse.com/security/cve/CVE-2017-15192/" source="CVE"/>
		<reference ref_id="CVE-2017-15193" ref_url="https://www.suse.com/security/cve/CVE-2017-15193/" source="CVE"/>
		<reference ref_id="CVE-2017-17083" ref_url="https://www.suse.com/security/cve/CVE-2017-17083/" source="CVE"/>
		<reference ref_id="CVE-2017-17084" ref_url="https://www.suse.com/security/cve/CVE-2017-17084/" source="CVE"/>
		<reference ref_id="CVE-2017-17085" ref_url="https://www.suse.com/security/cve/CVE-2017-17085/" source="CVE"/>
		<reference ref_id="CVE-2017-9617" ref_url="https://www.suse.com/security/cve/CVE-2017-9617/" source="CVE"/>
		<reference ref_id="CVE-2017-9766" ref_url="https://www.suse.com/security/cve/CVE-2017-9766/" source="CVE"/>
		<description>

  
This update for wireshark to version 2.2.11 fixes several issues.

These security issues were fixed:

- CVE-2017-13767: The MSDP dissector could have gone into an infinite loop.
  This was addressed by adding length validation (bsc#1056248)
- CVE-2017-13766: The Profinet I/O dissector could have crash with an
  out-of-bounds write. This was addressed by adding string validation
  (bsc#1056249)
- CVE-2017-13765: The IrCOMM dissector had a buffer over-read and application
  crash. This was addressed by adding length validation (bsc#1056251)
- CVE-2017-9766: PROFINET IO data with a high recursion depth allowed remote
  attackers to cause a denial of service (stack exhaustion) in the
  dissect_IODWriteReq function (bsc#1045341)
- CVE-2017-9617: Deeply nested DAAP data may have cause stack exhaustion
  (uncontrolled recursion) in the dissect_daap_one_tag function in the DAAP
  dissector (bsc#1044417)
- CVE-2017-15192: The BT ATT dissector could crash. This was addressed
  in epan/dissectors/packet-btatt.c by considering a case where not all
  of the BTATT packets have the same encapsulation level. (bsc#1062645)
- CVE-2017-15193: The MBIM dissector could crash or exhaust system
  memory. This was addressed in epan/dissectors/packet-mbim.c by changing
  the memory-allocation approach. (bsc#1062645)
- CVE-2017-15191: The DMP dissector could crash. This was addressed in
  epan/dissectors/packet-dmp.c by validating a string length. (bsc#1062645)
- CVE-2017-17083: NetBIOS dissector could crash. This was addressed in
  epan/dissectors/packet-netbios.c by ensuring that write operations are
  bounded by the beginning of a buffer. (bsc#1070727)
- CVE-2017-17084: IWARP_MPA dissector could crash. This was addressed
  in epan/dissectors/packet-iwarp-mpa.c by validating a ULPDU
  length. (bsc#1070727)
- CVE-2017-17085: the CIP Safety dissector could crash. This was
  addressed in epan/dissectors/packet-cipsafety.c by validating the packet
  length. (bsc#1070727)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-09"/>
	<updated date="2018-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1044417">SUSE bug 1044417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045341">SUSE bug 1045341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056248">SUSE bug 1056248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056249">SUSE bug 1056249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056251">SUSE bug 1056251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062645">SUSE bug 1062645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070727">SUSE bug 1070727</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-13765/">CVE-2017-13765 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13765">CVE-2017-13765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-13766/">CVE-2017-13766 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13766">CVE-2017-13766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-13767/">CVE-2017-13767 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13767">CVE-2017-13767 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15191/">CVE-2017-15191 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15191">CVE-2017-15191 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15192/">CVE-2017-15192 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15192">CVE-2017-15192 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15193/">CVE-2017-15193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15193">CVE-2017-15193 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17083/">CVE-2017-17083 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17083">CVE-2017-17083 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17084/">CVE-2017-17084 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17084">CVE-2017-17084 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17085/">CVE-2017-17085 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17085">CVE-2017-17085 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9617/">CVE-2017-9617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9617">CVE-2017-9617 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9766/">CVE-2017-9766 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9766">CVE-2017-9766 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575369" comment="libsmi-0.4.5-2.7.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575370" comment="libwireshark8-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575371" comment="libwiretap6-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575372" comment="libwscodecs1-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575373" comment="libwsutil7-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575374" comment="portaudio-19-234.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575375" comment="wireshark-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575376" comment="wireshark-gtk-2.2.11-40.14.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219570" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1074171" ref_url="https://bugzilla.suse.com/1074171" source="BUGZILLA"/>
		<reference ref_id="1075737" ref_url="https://bugzilla.suse.com/1075737" source="BUGZILLA"/>
		<reference ref_id="1075738" ref_url="https://bugzilla.suse.com/1075738" source="BUGZILLA"/>
		<reference ref_id="1075739" ref_url="https://bugzilla.suse.com/1075739" source="BUGZILLA"/>
		<reference ref_id="1075748" ref_url="https://bugzilla.suse.com/1075748" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17935" ref_url="https://www.suse.com/security/cve/CVE-2017-17935/" source="CVE"/>
		<reference ref_id="CVE-2018-5334" ref_url="https://www.suse.com/security/cve/CVE-2018-5334/" source="CVE"/>
		<reference ref_id="CVE-2018-5335" ref_url="https://www.suse.com/security/cve/CVE-2018-5335/" source="CVE"/>
		<reference ref_id="CVE-2018-5336" ref_url="https://www.suse.com/security/cve/CVE-2018-5336/" source="CVE"/>
		<description>
This update for wireshark to version 2.2.12 fixes the following issues:

- CVE-2018-5334: IxVeriWave file could crash (bsc#1075737)
- CVE-2018-5335: WCP dissector could crash (bsc#1075738)
- CVE-2018-5336: Multiple dissector crashes (bsc#1075739)
- CVE-2017-17935: Incorrect handling of '\n' in file_read_line function could
  have lead to denial of service (bsc#1074171)

This release no longer enables the Linux kernel BPF JIT compiler via the
net.core.bpf_jit_enable sysctl, as this would make systems more vulnerable
to Spectre variant 1 CVE-2017-5753 - (bsc#1075748)

Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-2.2.12.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-23"/>
	<updated date="2018-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074171">SUSE bug 1074171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075737">SUSE bug 1075737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075738">SUSE bug 1075738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075739">SUSE bug 1075739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075748">SUSE bug 1075748</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17935/">CVE-2017-17935 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17935">CVE-2017-17935 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5334/">CVE-2018-5334 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5334">CVE-2018-5334 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5335/">CVE-2018-5335 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5335">CVE-2018-5335 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5336/">CVE-2018-5336 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5336">CVE-2018-5336 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575377" comment="libwireshark8-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575378" comment="libwiretap6-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575379" comment="libwscodecs1-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575380" comment="libwsutil7-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575381" comment="wireshark-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575382" comment="wireshark-gtk-2.2.12-40.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219571" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1077080" ref_url="https://bugzilla.suse.com/1077080" source="BUGZILLA"/>
		<reference ref_id="1082692" ref_url="https://bugzilla.suse.com/1082692" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17997" ref_url="https://www.suse.com/security/cve/CVE-2017-17997/" source="CVE"/>
		<reference ref_id="CVE-2018-7320" ref_url="https://www.suse.com/security/cve/CVE-2018-7320/" source="CVE"/>
		<reference ref_id="CVE-2018-7321" ref_url="https://www.suse.com/security/cve/CVE-2018-7321/" source="CVE"/>
		<reference ref_id="CVE-2018-7322" ref_url="https://www.suse.com/security/cve/CVE-2018-7322/" source="CVE"/>
		<reference ref_id="CVE-2018-7323" ref_url="https://www.suse.com/security/cve/CVE-2018-7323/" source="CVE"/>
		<reference ref_id="CVE-2018-7324" ref_url="https://www.suse.com/security/cve/CVE-2018-7324/" source="CVE"/>
		<reference ref_id="CVE-2018-7325" ref_url="https://www.suse.com/security/cve/CVE-2018-7325/" source="CVE"/>
		<reference ref_id="CVE-2018-7326" ref_url="https://www.suse.com/security/cve/CVE-2018-7326/" source="CVE"/>
		<reference ref_id="CVE-2018-7327" ref_url="https://www.suse.com/security/cve/CVE-2018-7327/" source="CVE"/>
		<reference ref_id="CVE-2018-7328" ref_url="https://www.suse.com/security/cve/CVE-2018-7328/" source="CVE"/>
		<reference ref_id="CVE-2018-7329" ref_url="https://www.suse.com/security/cve/CVE-2018-7329/" source="CVE"/>
		<reference ref_id="CVE-2018-7330" ref_url="https://www.suse.com/security/cve/CVE-2018-7330/" source="CVE"/>
		<reference ref_id="CVE-2018-7331" ref_url="https://www.suse.com/security/cve/CVE-2018-7331/" source="CVE"/>
		<reference ref_id="CVE-2018-7332" ref_url="https://www.suse.com/security/cve/CVE-2018-7332/" source="CVE"/>
		<reference ref_id="CVE-2018-7333" ref_url="https://www.suse.com/security/cve/CVE-2018-7333/" source="CVE"/>
		<reference ref_id="CVE-2018-7334" ref_url="https://www.suse.com/security/cve/CVE-2018-7334/" source="CVE"/>
		<reference ref_id="CVE-2018-7335" ref_url="https://www.suse.com/security/cve/CVE-2018-7335/" source="CVE"/>
		<reference ref_id="CVE-2018-7336" ref_url="https://www.suse.com/security/cve/CVE-2018-7336/" source="CVE"/>
		<reference ref_id="CVE-2018-7337" ref_url="https://www.suse.com/security/cve/CVE-2018-7337/" source="CVE"/>
		<reference ref_id="CVE-2018-7417" ref_url="https://www.suse.com/security/cve/CVE-2018-7417/" source="CVE"/>
		<reference ref_id="CVE-2018-7418" ref_url="https://www.suse.com/security/cve/CVE-2018-7418/" source="CVE"/>
		<reference ref_id="CVE-2018-7419" ref_url="https://www.suse.com/security/cve/CVE-2018-7419/" source="CVE"/>
		<reference ref_id="CVE-2018-7420" ref_url="https://www.suse.com/security/cve/CVE-2018-7420/" source="CVE"/>
		<reference ref_id="CVE-2018-7421" ref_url="https://www.suse.com/security/cve/CVE-2018-7421/" source="CVE"/>
		<description>
This update for wireshark fixes the following issues:

Security issue fixed (bsc#1082692):

- CVE-2018-7335: The IEEE 802.11 dissector could crash (wnpa-sec-2018-05)
- CVE-2018-7321: thrift long dissector loop (dissect_thrift_map)
- CVE-2018-7322: DICOM: inifinite loop (dissect_dcm_tag) 
- CVE-2018-7323: WCCP: very long loop (dissect_wccp2_alternate_mask_value_set_element) 
- CVE-2018-7324: SCCP: infinite loop (dissect_sccp_optional_parameters) 
- CVE-2018-7325: RPKI-Router Protocol: infinite loop (dissect_rpkirtr_pdu) 
- CVE-2018-7326: LLTD: infinite loop (dissect_lltd_tlv) 
- CVE-2018-7327: openflow_v6: infinite loop (dissect_openflow_bundle_control_v6) 
- CVE-2018-7328: USB-DARWIN: long loop (dissect_darwin_usb_iso_transfer) 
- CVE-2018-7329: S7COMM: infinite loop (s7comm_decode_ud_cpu_alarm_main) 
- CVE-2018-7330: thread_meshcop: infinite loop (get_chancount) 
- CVE-2018-7331: GTP: infinite loop (dissect_gprscdr_GGSNPDPRecord, dissect_ber_set) 
- CVE-2018-7332: RELOAD: infinite loop (dissect_statans) 
- CVE-2018-7333: RPCoRDMA: infinite loop in get_write_list_chunk_count
- CVE-2018-7421: Multiple dissectors could go into large infinite loops (wnpa-sec-2018-06)
- CVE-2018-7334: The UMTS MAC dissector could crash (wnpa-sec-2018-07)
- CVE-2018-7337: The DOCSIS dissector could crash (wnpa-sec-2018-08)
- CVE-2018-7336: The FCP dissector could crash (wnpa-sec-2018-09)
- CVE-2018-7320: The SIGCOMP dissector could crash (wnpa-sec-2018-10)
- CVE-2018-7420: The pcapng file parser could crash (wnpa-sec-2018-11)
- CVE-2018-7417: The IPMI dissector could crash (wnpa-sec-2018-12)
- CVE-2018-7418: The SIGCOMP dissector could crash (wnpa-sec-2018-13)
- CVE-2018-7419: The NBAP disssector could crash (wnpa-sec-2018-14)
- CVE-2017-17997: Misuse of NULL pointer in MRDISC dissector (bsc#1077080).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077080">SUSE bug 1077080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17997/">CVE-2017-17997 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17997">CVE-2017-17997 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7320/">CVE-2018-7320 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7320">CVE-2018-7320 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7321/">CVE-2018-7321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7321">CVE-2018-7321 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7322/">CVE-2018-7322 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7322">CVE-2018-7322 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7323/">CVE-2018-7323 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7323">CVE-2018-7323 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7324/">CVE-2018-7324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7324">CVE-2018-7324 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7325/">CVE-2018-7325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7325">CVE-2018-7325 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7326/">CVE-2018-7326 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7326">CVE-2018-7326 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7327/">CVE-2018-7327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7327">CVE-2018-7327 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7328/">CVE-2018-7328 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7328">CVE-2018-7328 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7329/">CVE-2018-7329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7329">CVE-2018-7329 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7330/">CVE-2018-7330 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7330">CVE-2018-7330 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7331/">CVE-2018-7331 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7331">CVE-2018-7331 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7332/">CVE-2018-7332 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7332">CVE-2018-7332 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7333/">CVE-2018-7333 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7333">CVE-2018-7333 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7334/">CVE-2018-7334 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7334">CVE-2018-7334 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7335/">CVE-2018-7335 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7335">CVE-2018-7335 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7336/">CVE-2018-7336 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7336">CVE-2018-7336 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7337/">CVE-2018-7337 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7337">CVE-2018-7337 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7417/">CVE-2018-7417 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7417">CVE-2018-7417 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7418/">CVE-2018-7418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7418">CVE-2018-7418 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7419/">CVE-2018-7419 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7419">CVE-2018-7419 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7420/">CVE-2018-7420 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7420">CVE-2018-7420 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7421/">CVE-2018-7421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7421">CVE-2018-7421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575383" comment="libwireshark8-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575384" comment="libwiretap6-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575385" comment="libwscodecs1-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575386" comment="libwsutil7-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575387" comment="wireshark-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575388" comment="wireshark-gtk-2.2.13-40.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219572" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1088200" ref_url="https://bugzilla.suse.com/1088200" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-9256" ref_url="https://www.suse.com/security/cve/CVE-2018-9256/" source="CVE"/>
		<reference ref_id="CVE-2018-9259" ref_url="https://www.suse.com/security/cve/CVE-2018-9259/" source="CVE"/>
		<reference ref_id="CVE-2018-9260" ref_url="https://www.suse.com/security/cve/CVE-2018-9260/" source="CVE"/>
		<reference ref_id="CVE-2018-9261" ref_url="https://www.suse.com/security/cve/CVE-2018-9261/" source="CVE"/>
		<reference ref_id="CVE-2018-9262" ref_url="https://www.suse.com/security/cve/CVE-2018-9262/" source="CVE"/>
		<reference ref_id="CVE-2018-9263" ref_url="https://www.suse.com/security/cve/CVE-2018-9263/" source="CVE"/>
		<reference ref_id="CVE-2018-9264" ref_url="https://www.suse.com/security/cve/CVE-2018-9264/" source="CVE"/>
		<reference ref_id="CVE-2018-9265" ref_url="https://www.suse.com/security/cve/CVE-2018-9265/" source="CVE"/>
		<reference ref_id="CVE-2018-9266" ref_url="https://www.suse.com/security/cve/CVE-2018-9266/" source="CVE"/>
		<reference ref_id="CVE-2018-9267" ref_url="https://www.suse.com/security/cve/CVE-2018-9267/" source="CVE"/>
		<reference ref_id="CVE-2018-9268" ref_url="https://www.suse.com/security/cve/CVE-2018-9268/" source="CVE"/>
		<reference ref_id="CVE-2018-9269" ref_url="https://www.suse.com/security/cve/CVE-2018-9269/" source="CVE"/>
		<reference ref_id="CVE-2018-9270" ref_url="https://www.suse.com/security/cve/CVE-2018-9270/" source="CVE"/>
		<reference ref_id="CVE-2018-9271" ref_url="https://www.suse.com/security/cve/CVE-2018-9271/" source="CVE"/>
		<reference ref_id="CVE-2018-9272" ref_url="https://www.suse.com/security/cve/CVE-2018-9272/" source="CVE"/>
		<reference ref_id="CVE-2018-9273" ref_url="https://www.suse.com/security/cve/CVE-2018-9273/" source="CVE"/>
		<reference ref_id="CVE-2018-9274" ref_url="https://www.suse.com/security/cve/CVE-2018-9274/" source="CVE"/>
		<description>
This update for wireshark fixes the following issues:

- Update to wireshark 2.2.14, fix such issues:
  * bsc#1088200 VUL-0: wireshark: multiple vulnerabilities
    fixed in 2.2.14, 2.4.6
  * CVE-2018-9256: LWAPP dissector crash
  * CVE-2018-9260: IEEE 802.15.4 dissector crash
  * CVE-2018-9261: NBAP dissector crash
  * CVE-2018-9262: VLAN dissector crash
  * CVE-2018-9263: Kerberos dissector crash
  * CVE-2018-9264: ADB dissector crash
  * CVE-2018-9265: tn3270 dissector has a memory leak
  * CVE-2018-9266: ISUP dissector memory leak
  * CVE-2018-9267: LAPD dissector memory leak
  * CVE-2018-9268: SMB2 dissector memory leak
  * CVE-2018-9269: GIOP dissector memory leak
  * CVE-2018-9270: OIDS dissector memory leak
  * CVE-2018-9271: multipart dissector memory leak
  * CVE-2018-9272: h223 dissector memory leak
  * CVE-2018-9273: pcp dissector memory leak
  * CVE-2018-9274: failure message memory leak
  * CVE-2018-9259: MP4 dissector crash
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-19"/>
	<updated date="2018-04-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9256/">CVE-2018-9256 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9256">CVE-2018-9256 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9259/">CVE-2018-9259 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9259">CVE-2018-9259 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9260/">CVE-2018-9260 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9260">CVE-2018-9260 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9261/">CVE-2018-9261 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9261">CVE-2018-9261 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9262/">CVE-2018-9262 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9262">CVE-2018-9262 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9263/">CVE-2018-9263 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9263">CVE-2018-9263 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9264/">CVE-2018-9264 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9264">CVE-2018-9264 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9265/">CVE-2018-9265 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9265">CVE-2018-9265 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9266/">CVE-2018-9266 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9266">CVE-2018-9266 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9267/">CVE-2018-9267 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9267">CVE-2018-9267 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9268/">CVE-2018-9268 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9268">CVE-2018-9268 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9269/">CVE-2018-9269 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9269">CVE-2018-9269 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9270/">CVE-2018-9270 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9270">CVE-2018-9270 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9271/">CVE-2018-9271 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9271">CVE-2018-9271 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9272/">CVE-2018-9272 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9272">CVE-2018-9272 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9273/">CVE-2018-9273 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9273">CVE-2018-9273 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9274/">CVE-2018-9274 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9274">CVE-2018-9274 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575389" comment="libwireshark8-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575390" comment="libwiretap6-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575391" comment="libwscodecs1-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575392" comment="libwsutil7-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575393" comment="wireshark-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575394" comment="wireshark-gtk-2.2.14-40.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219573" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1094301" ref_url="https://bugzilla.suse.com/1094301" source="BUGZILLA"/>
		<reference ref_id="1101776" ref_url="https://bugzilla.suse.com/1101776" source="BUGZILLA"/>
		<reference ref_id="1101777" ref_url="https://bugzilla.suse.com/1101777" source="BUGZILLA"/>
		<reference ref_id="1101786" ref_url="https://bugzilla.suse.com/1101786" source="BUGZILLA"/>
		<reference ref_id="1101788" ref_url="https://bugzilla.suse.com/1101788" source="BUGZILLA"/>
		<reference ref_id="1101791" ref_url="https://bugzilla.suse.com/1101791" source="BUGZILLA"/>
		<reference ref_id="1101794" ref_url="https://bugzilla.suse.com/1101794" source="BUGZILLA"/>
		<reference ref_id="1101800" ref_url="https://bugzilla.suse.com/1101800" source="BUGZILLA"/>
		<reference ref_id="1101802" ref_url="https://bugzilla.suse.com/1101802" source="BUGZILLA"/>
		<reference ref_id="1101804" ref_url="https://bugzilla.suse.com/1101804" source="BUGZILLA"/>
		<reference ref_id="1101810" ref_url="https://bugzilla.suse.com/1101810" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11354" ref_url="https://www.suse.com/security/cve/CVE-2018-11354/" source="CVE"/>
		<reference ref_id="CVE-2018-11355" ref_url="https://www.suse.com/security/cve/CVE-2018-11355/" source="CVE"/>
		<reference ref_id="CVE-2018-11356" ref_url="https://www.suse.com/security/cve/CVE-2018-11356/" source="CVE"/>
		<reference ref_id="CVE-2018-11357" ref_url="https://www.suse.com/security/cve/CVE-2018-11357/" source="CVE"/>
		<reference ref_id="CVE-2018-11358" ref_url="https://www.suse.com/security/cve/CVE-2018-11358/" source="CVE"/>
		<reference ref_id="CVE-2018-11359" ref_url="https://www.suse.com/security/cve/CVE-2018-11359/" source="CVE"/>
		<reference ref_id="CVE-2018-11360" ref_url="https://www.suse.com/security/cve/CVE-2018-11360/" source="CVE"/>
		<reference ref_id="CVE-2018-11361" ref_url="https://www.suse.com/security/cve/CVE-2018-11361/" source="CVE"/>
		<reference ref_id="CVE-2018-11362" ref_url="https://www.suse.com/security/cve/CVE-2018-11362/" source="CVE"/>
		<reference ref_id="CVE-2018-14339" ref_url="https://www.suse.com/security/cve/CVE-2018-14339/" source="CVE"/>
		<reference ref_id="CVE-2018-14340" ref_url="https://www.suse.com/security/cve/CVE-2018-14340/" source="CVE"/>
		<reference ref_id="CVE-2018-14341" ref_url="https://www.suse.com/security/cve/CVE-2018-14341/" source="CVE"/>
		<reference ref_id="CVE-2018-14342" ref_url="https://www.suse.com/security/cve/CVE-2018-14342/" source="CVE"/>
		<reference ref_id="CVE-2018-14343" ref_url="https://www.suse.com/security/cve/CVE-2018-14343/" source="CVE"/>
		<reference ref_id="CVE-2018-14344" ref_url="https://www.suse.com/security/cve/CVE-2018-14344/" source="CVE"/>
		<reference ref_id="CVE-2018-14367" ref_url="https://www.suse.com/security/cve/CVE-2018-14367/" source="CVE"/>
		<reference ref_id="CVE-2018-14368" ref_url="https://www.suse.com/security/cve/CVE-2018-14368/" source="CVE"/>
		<reference ref_id="CVE-2018-14369" ref_url="https://www.suse.com/security/cve/CVE-2018-14369/" source="CVE"/>
		<reference ref_id="CVE-2018-14370" ref_url="https://www.suse.com/security/cve/CVE-2018-14370/" source="CVE"/>
		<description>
This update for wireshark fixes the following issues:

Security issues fixed:

- bsc#1094301: Wireshark security update to 2.6.1, 2.4.7, 2.2.15
- CVE-2018-14339: MMSE dissector infinite loop (wnpa-sec-2018-38, bsc#1101810)
- CVE-2018-14341: DICOM dissector crash (wnpa-sec-2018-39, bsc#1101776)
- CVE-2018-14343: ASN.1 BER dissector crash (wnpa-sec-2018-37, bsc#1101786)
- CVE-2018-14344: ISMP dissector crash (wnpa-sec-2018-35, bsc#1101788)
- CVE-2018-14340: Multiple dissectors could crash (wnpa-sec-2018-36, bsc#1101804)
- CVE-2018-14342: BGP dissector large loop (wnpa-sec-2018-34, bsc#1101777)
- CVE-2018-14370: IEEE 802.11 dissector crash (wnpa-sec-2018-43, bsc#1101802)
- CVE-2018-14369: HTTP2 dissector crash (wnpa-sec-2018-41, bsc#1101800)
- CVE-2018-14367: CoAP dissector crash (wnpa-sec-2018-42, bsc#1101791)
- CVE-2018-14368: Bazaar dissector infinite loop (wnpa-sec-2018-40, bsc#1101794)
- CVE-2018-11355: Fix RTCP dissector crash (bsc#1094301).
- CVE-2018-11362: Fix LDSS dissector crash (bsc#1094301).
- CVE-2018-11361: Fix IEEE 802.11 dissector crash (bsc#1094301).
- CVE-2018-11360: Fix GSM A DTAP dissector crash (bsc#1094301).
- CVE-2018-11358: Fix Q.931 dissector crash (bsc#1094301).
- CVE-2018-11359: Fix multiple dissectors crashs (bsc#1094301).
- CVE-2018-11356: Fix DNS dissector crash (bsc#1094301).
- CVE-2018-11357: Fix multiple dissectors that could consume excessive memory (bsc#1094301).
- CVE-2018-11354: Fix IEEE 1905.1a dissector crash (bsc#1094301).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101776">SUSE bug 1101776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101777">SUSE bug 1101777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101786">SUSE bug 1101786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101788">SUSE bug 1101788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101791">SUSE bug 1101791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101794">SUSE bug 1101794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101800">SUSE bug 1101800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101802">SUSE bug 1101802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101804">SUSE bug 1101804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101810">SUSE bug 1101810</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11354/">CVE-2018-11354 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11354">CVE-2018-11354 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11355/">CVE-2018-11355 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11355">CVE-2018-11355 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11356/">CVE-2018-11356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11356">CVE-2018-11356 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11357/">CVE-2018-11357 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11357">CVE-2018-11357 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11358/">CVE-2018-11358 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11358">CVE-2018-11358 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11359/">CVE-2018-11359 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11359">CVE-2018-11359 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11360/">CVE-2018-11360 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11360">CVE-2018-11360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11361/">CVE-2018-11361 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11361">CVE-2018-11361 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11362/">CVE-2018-11362 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11362">CVE-2018-11362 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14339/">CVE-2018-14339 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14339">CVE-2018-14339 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14340/">CVE-2018-14340 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14340">CVE-2018-14340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14341/">CVE-2018-14341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14341">CVE-2018-14341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14342/">CVE-2018-14342 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14342">CVE-2018-14342 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14343/">CVE-2018-14343 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14343">CVE-2018-14343 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14344/">CVE-2018-14344 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14344">CVE-2018-14344 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14367/">CVE-2018-14367 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14367">CVE-2018-14367 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14368/">CVE-2018-14368 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14368">CVE-2018-14368 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14369/">CVE-2018-14369 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14369">CVE-2018-14369 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14370/">CVE-2018-14370 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14370">CVE-2018-14370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575395" comment="libwireshark8-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575396" comment="libwiretap6-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575397" comment="libwscodecs1-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575398" comment="libwsutil7-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575399" comment="wireshark-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575400" comment="wireshark-gtk-2.2.16-40.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219574" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1106514" ref_url="https://bugzilla.suse.com/1106514" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16056" ref_url="https://www.suse.com/security/cve/CVE-2018-16056/" source="CVE"/>
		<reference ref_id="CVE-2018-16057" ref_url="https://www.suse.com/security/cve/CVE-2018-16057/" source="CVE"/>
		<reference ref_id="CVE-2018-16058" ref_url="https://www.suse.com/security/cve/CVE-2018-16058/" source="CVE"/>
		<description>
This update for wireshark fixes the following issues:

Update wireshark to version 2.2.17 (bsc#1106514):

Security issues fixed:

- CVE-2018-16058: Bluetooth AVDTP dissector crash (wnpa-sec-2018-44)
- CVE-2018-16056: Bluetooth Attribute Protocol dissector crash (wnpa-sec-2018-45)
- CVE-2018-16057: Radiotap dissector crash (wnpa-sec-2018-46)

Further bug fixes and updated protocol support as listed in:
  https://www.wireshark.org/docs/relnotes/wireshark-2.2.17.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-26"/>
	<updated date="2018-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106514">SUSE bug 1106514</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16056/">CVE-2018-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16056">CVE-2018-16056 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16057/">CVE-2018-16057 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16057">CVE-2018-16057 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16058/">CVE-2018-16058 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16058">CVE-2018-16058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575401" comment="libwireshark8-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575402" comment="libwiretap6-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575403" comment="libwscodecs1-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575404" comment="libwsutil7-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575405" comment="wireshark-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575406" comment="wireshark-gtk-2.2.17-40.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219575" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="868937" ref_url="https://bugzilla.suse.com/868937" source="BUGZILLA"/>
		<reference ref_id="900611" ref_url="https://bugzilla.suse.com/900611" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3686" ref_url="https://www.suse.com/security/cve/CVE-2014-3686/" source="CVE"/>
		<description>

This update fixes a remote code execution vulnerability in wpa_supplicant's 
wpa_cli and hostapd_cli tools. CVE-2014-3686 has been assigned to this 
issue.

Additionally, password based authentication with PKCS#5v2 has been enabled.

Security Issues:

    * CVE-2014-3686
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3686&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-15"/>
	<updated date="2014-10-15"/>
	<bugzilla href="https://bugzilla.suse.com/868937">SUSE bug 868937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900611">SUSE bug 900611</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3686/">CVE-2014-3686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3686">CVE-2014-3686 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581536" comment="wpa_supplicant-0.7.1-6.15.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581536" comment="wpa_supplicant-0.7.1-6.15.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581536" comment="wpa_supplicant-0.7.1-6.15.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219576" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="930077" ref_url="https://bugzilla.suse.com/930077" source="BUGZILLA"/>
		<reference ref_id="930078" ref_url="https://bugzilla.suse.com/930078" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4141" ref_url="https://www.suse.com/security/cve/CVE-2015-4141/" source="CVE"/>
		<reference ref_id="CVE-2015-4142" ref_url="https://www.suse.com/security/cve/CVE-2015-4142/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001725.html" source="SUSE-SU"/>
		<description>
wpa_supplicant was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-4142: Integer underflow in the WMM Action frame parser in hostapd and wpa_supplicant, when used for AP mode MLME/SME functionality, allowed remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read (bsc#930078).
- CVE-2015-4141: The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), allowed remote attackers to cause a denial of service (crash) via a negative chunk length, which triggered an out-of-bounds read or heap-based buffer overflow (bsc#930077).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/930077">SUSE bug 930077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930078">SUSE bug 930078</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4141/">CVE-2015-4141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4141">CVE-2015-4141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4142/">CVE-2015-4142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4142">CVE-2015-4142 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581537" comment="wpa_supplicant-0.7.1-6.17.4 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581537" comment="wpa_supplicant-0.7.1-6.17.4 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581537" comment="wpa_supplicant-0.7.1-6.17.4 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219577" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1056061" ref_url="https://bugzilla.suse.com/1056061" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078/" source="CVE"/>
		<reference ref_id="CVE-2017-13079" ref_url="https://www.suse.com/security/cve/CVE-2017-13079/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="CVE-2017-13087" ref_url="https://www.suse.com/security/cve/CVE-2017-13087/" source="CVE"/>
		<reference ref_id="CVE-2017-13088" ref_url="https://www.suse.com/security/cve/CVE-2017-13088/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003304.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- Several vulnerabilities in standard conforming implementations of the WPA2
  protocol have been discovered and published under the code name KRACK. This
  update remedies those issues in a backwards compatible manner, i.e. the
  updated wpa_supplicant can interface properly with both vulnerable and
  patched implementations of WPA2, but an attacker won't be able to exploit the
  KRACK weaknesses in those connections anymore even if the other party is
  still vulnerable. [bsc#1056061, CVE-2017-13078, CVE-2017-13079,
  CVE-2017-13080, CVE-2017-13081, CVE-2017-13087, CVE-2017-13088]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-17"/>
	<updated date="2017-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13078">CVE-2017-13078 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13079/">CVE-2017-13079 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13079">CVE-2017-13079 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13081">CVE-2017-13081 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13087/">CVE-2017-13087 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13087">CVE-2017-13087 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13088/">CVE-2017-13088 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13088">CVE-2017-13088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581538" comment="wpa_supplicant-0.7.1-6.18.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581538" comment="wpa_supplicant-0.7.1-6.18.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219578" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="915323" ref_url="https://bugzilla.suse.com/915323" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0210" ref_url="https://www.suse.com/security/cve/CVE-2015-0210/" source="CVE"/>
		<description>
This update for wpa_supplicant fixes the following issues:

Security issue fixed:

- CVE-2015-0210: Fix broken certificate subject check (bsc#915323.)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-12"/>
	<updated date="2018-06-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0210/">CVE-2015-0210 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0210">CVE-2015-0210 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581539" comment="wpa_supplicant-0.7.1-6.18.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219579" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1150934" ref_url="https://bugzilla.suse.com/1150934" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16275" ref_url="https://www.suse.com/security/cve/CVE-2019-16275/" source="CVE"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2019-16275: AP mode PMF disconnection protection bypass (bsc#1150934)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-22"/>
	<updated date="2021-02-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150934">SUSE bug 1150934</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16275/">CVE-2019-16275 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16275">CVE-2019-16275 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581540" comment="wpa_supplicant-0.7.1-6.18.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219580" version="1" class="patch">
	<metadata>
		<title>Security update for xalan-j2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="870082" ref_url="https://bugzilla.suse.com/870082" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0107" ref_url="https://www.suse.com/security/cve/CVE-2014-0107/" source="CVE"/>
		<description>

xalan-j2 has been updated to ensure that secure processing can't be 
circumvented (CVE-2014-0107).

Security Issues:

    * CVE-2014-0107
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0107&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-23"/>
	<updated date="2014-06-23"/>
	<bugzilla href="https://bugzilla.suse.com/870082">SUSE bug 870082</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0107/">CVE-2014-0107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0107">CVE-2014-0107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567162" comment="xalan-j2-2.7.0-217.26.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567162" comment="xalan-j2-2.7.0-217.26.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567162" comment="xalan-j2-2.7.0-217.26.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219581" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="910441" ref_url="https://bugzilla.suse.com/910441" source="BUGZILLA"/>
		<reference ref_id="927967" ref_url="https://bugzilla.suse.com/927967" source="BUGZILLA"/>
		<reference ref_id="929339" ref_url="https://bugzilla.suse.com/929339" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001400.html" source="SUSE-SU"/>
		<description>

Xen was updated to fix two security issues and a bug:

    * CVE-2015-3456: A buffer overflow in the floppy drive emulation, which
      could be used to carry out denial of service attacks or potential
      code execution against the host. This vulnerability is also known as
      VENOM.
    * CVE-2015-3340: Xen did not initialize certain fields, which allowed
      certain remote service domains to obtain sensitive information from
      memory via a (1) XEN_DOMCTL_gettscinfo or (2)
      XEN_SYSCTL_getdomaininfolist request.
    * An exception in setCPUAffinity when restoring guests. (bsc#910441)

Security Issues:

    * CVE-2015-3456
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456&gt;
    * CVE-2015-3340
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-13"/>
	<updated date="2015-05-13"/>
	<bugzilla href="https://bugzilla.suse.com/910441">SUSE bug 910441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927967">SUSE bug 927967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929339">SUSE bug 929339</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3456">CVE-2015-3456 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567163" comment="xen-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567164" comment="xen-doc-html-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567165" comment="xen-doc-pdf-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567166" comment="xen-kmp-default-4.2.5_06_3.0.101_0.47.52-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567167" comment="xen-kmp-pae-4.2.5_06_3.0.101_0.47.52-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567168" comment="xen-libs-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567169" comment="xen-libs-32bit-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567170" comment="xen-tools-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567171" comment="xen-tools-domU-4.2.5_06-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567163" comment="xen-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567164" comment="xen-doc-html-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567165" comment="xen-doc-pdf-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567166" comment="xen-kmp-default-4.2.5_06_3.0.101_0.47.52-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567167" comment="xen-kmp-pae-4.2.5_06_3.0.101_0.47.52-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567168" comment="xen-libs-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567169" comment="xen-libs-32bit-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567170" comment="xen-tools-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567171" comment="xen-tools-domU-4.2.5_06-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567163" comment="xen-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567164" comment="xen-doc-html-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567165" comment="xen-doc-pdf-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567166" comment="xen-kmp-default-4.2.5_06_3.0.101_0.47.52-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567167" comment="xen-kmp-pae-4.2.5_06_3.0.101_0.47.52-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567168" comment="xen-libs-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567169" comment="xen-libs-32bit-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567170" comment="xen-tools-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567171" comment="xen-tools-domU-4.2.5_06-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219582" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="866902" ref_url="https://bugzilla.suse.com/866902" source="BUGZILLA"/>
		<reference ref_id="882089" ref_url="https://bugzilla.suse.com/882089" source="BUGZILLA"/>
		<reference ref_id="896023" ref_url="https://bugzilla.suse.com/896023" source="BUGZILLA"/>
		<reference ref_id="901317" ref_url="https://bugzilla.suse.com/901317" source="BUGZILLA"/>
		<reference ref_id="903850" ref_url="https://bugzilla.suse.com/903850" source="BUGZILLA"/>
		<reference ref_id="903967" ref_url="https://bugzilla.suse.com/903967" source="BUGZILLA"/>
		<reference ref_id="903970" ref_url="https://bugzilla.suse.com/903970" source="BUGZILLA"/>
		<reference ref_id="905465" ref_url="https://bugzilla.suse.com/905465" source="BUGZILLA"/>
		<reference ref_id="905467" ref_url="https://bugzilla.suse.com/905467" source="BUGZILLA"/>
		<reference ref_id="906439" ref_url="https://bugzilla.suse.com/906439" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8594" ref_url="https://www.suse.com/security/cve/CVE-2014-8594/" source="CVE"/>
		<reference ref_id="CVE-2014-8595" ref_url="https://www.suse.com/security/cve/CVE-2014-8595/" source="CVE"/>
		<reference ref_id="CVE-2014-8866" ref_url="https://www.suse.com/security/cve/CVE-2014-8866/" source="CVE"/>
		<reference ref_id="CVE-2014-8867" ref_url="https://www.suse.com/security/cve/CVE-2014-8867/" source="CVE"/>
		<reference ref_id="CVE-2014-9030" ref_url="https://www.suse.com/security/cve/CVE-2014-9030/" source="CVE"/>
		<description>

Xen has been updated to version 4.2.5 with additional patches to fix six 
security issues:

    * Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling
      (CVE-2014-9030).
    * Insufficient bounding of 'REP MOVS' to MMIO emulated inside the
      hypervisor (CVE-2014-8867).
    * Excessive checking in compatibility mode hypercall argument
      translation (CVE-2014-8866).
    * Guest user mode triggerable VM exits not handled by hypervisor
      (bnc#903850).
    * Missing privilege level checks in x86 emulation of far branches
      (CVE-2014-8595).
    * Insufficient restrictions on certain MMU update hypercalls
      (CVE-2014-8594).

These non-security issues have been fixed:

    * Xen save/restore of HVM guests cuts off disk and networking
      (bnc#866902).
    * Windows 2012 R2 fails to boot up with greater than 60 vcpus
      (bnc#882089).
    * Increase limit domUloader to 32MB (bnc#901317).
    * Adjust xentop column layout (bnc#896023).

Security Issues:

    * CVE-2014-9030
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9030&gt;
    * CVE-2014-8867
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8867&gt;
    * CVE-2014-8866
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8866&gt;
    * CVE-2014-8595
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8595&gt;
    * CVE-2014-8594
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8594&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-27"/>
	<updated date="2014-11-27"/>
	<bugzilla href="https://bugzilla.suse.com/866902">SUSE bug 866902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882089">SUSE bug 882089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896023">SUSE bug 896023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901317">SUSE bug 901317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903850">SUSE bug 903850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905465">SUSE bug 905465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905467">SUSE bug 905467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906439">SUSE bug 906439</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8594/">CVE-2014-8594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8594">CVE-2014-8594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8595/">CVE-2014-8595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8595">CVE-2014-8595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8866/">CVE-2014-8866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8866">CVE-2014-8866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8867/">CVE-2014-8867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8867">CVE-2014-8867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9030/">CVE-2014-9030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9030">CVE-2014-9030 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567172" comment="xen-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567173" comment="xen-doc-html-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567174" comment="xen-doc-pdf-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567175" comment="xen-kmp-default-4.2.5_02_3.0.101_0.40-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567176" comment="xen-libs-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567177" comment="xen-libs-32bit-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567178" comment="xen-tools-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567179" comment="xen-tools-domU-4.2.5_02-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567172" comment="xen-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567173" comment="xen-doc-html-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567174" comment="xen-doc-pdf-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567175" comment="xen-kmp-default-4.2.5_02_3.0.101_0.40-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567176" comment="xen-libs-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567177" comment="xen-libs-32bit-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567178" comment="xen-tools-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567179" comment="xen-tools-domU-4.2.5_02-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567172" comment="xen-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567173" comment="xen-doc-html-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567174" comment="xen-doc-pdf-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567175" comment="xen-kmp-default-4.2.5_02_3.0.101_0.40-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567176" comment="xen-libs-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567177" comment="xen-libs-32bit-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567178" comment="xen-tools-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567179" comment="xen-tools-domU-4.2.5_02-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219583" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="922709" ref_url="https://bugzilla.suse.com/922709" source="BUGZILLA"/>
		<reference ref_id="932996" ref_url="https://bugzilla.suse.com/932996" source="BUGZILLA"/>
		<reference ref_id="935634" ref_url="https://bugzilla.suse.com/935634" source="BUGZILLA"/>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="939709" ref_url="https://bugzilla.suse.com/939709" source="BUGZILLA"/>
		<reference ref_id="939712" ref_url="https://bugzilla.suse.com/939712" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2751" ref_url="https://www.suse.com/security/cve/CVE-2015-2751/" source="CVE"/>
		<reference ref_id="CVE-2015-3259" ref_url="https://www.suse.com/security/cve/CVE-2015-3259/" source="CVE"/>
		<reference ref_id="CVE-2015-4164" ref_url="https://www.suse.com/security/cve/CVE-2015-4164/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5165" ref_url="https://www.suse.com/security/cve/CVE-2015-5165/" source="CVE"/>
		<reference ref_id="CVE-2015-5166" ref_url="https://www.suse.com/security/cve/CVE-2015-5166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001564.html" source="SUSE-SU"/>
		<description>

xen was updated to fix the following security issues:

* CVE-2015-5165: QEMU leak of uninitialized heap memory in rtl8139 device model (bsc#939712, XSA-140)
* CVE-2015-5166: Use after free in QEMU/Xen block unplug protocol (bsc#939709, XSA-139)
* CVE-2015-2751: Certain domctl operations could have be used to lock up the host (bsc#922709, XSA-127)
* CVE-2015-3259: xl command line config handling stack overflow (bsc#935634, XSA-137)
* CVE-2015-4164: DoS through iret hypercall handler (bsc#932996, XSA-136)
* CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-11"/>
	<updated date="2015-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/922709">SUSE bug 922709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932996">SUSE bug 932996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935634">SUSE bug 935634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939709">SUSE bug 939709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939712">SUSE bug 939712</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2751/">CVE-2015-2751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2751">CVE-2015-2751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3259/">CVE-2015-3259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3259">CVE-2015-3259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4164/">CVE-2015-4164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4164">CVE-2015-4164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5154">CVE-2015-5154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-5165/">CVE-2015-5165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5165">CVE-2015-5165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5166/">CVE-2015-5166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5166">CVE-2015-5166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567180" comment="xen-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567181" comment="xen-doc-html-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567182" comment="xen-doc-pdf-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567183" comment="xen-kmp-default-4.2.5_12_3.0.101_0.47.55-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567184" comment="xen-kmp-pae-4.2.5_12_3.0.101_0.47.55-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567185" comment="xen-libs-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567186" comment="xen-libs-32bit-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567187" comment="xen-tools-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567188" comment="xen-tools-domU-4.2.5_12-15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567180" comment="xen-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567181" comment="xen-doc-html-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567182" comment="xen-doc-pdf-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567183" comment="xen-kmp-default-4.2.5_12_3.0.101_0.47.55-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567184" comment="xen-kmp-pae-4.2.5_12_3.0.101_0.47.55-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567185" comment="xen-libs-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567186" comment="xen-libs-32bit-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567187" comment="xen-tools-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567188" comment="xen-tools-domU-4.2.5_12-15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567180" comment="xen-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567181" comment="xen-doc-html-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567182" comment="xen-doc-pdf-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567183" comment="xen-kmp-default-4.2.5_12_3.0.101_0.47.55-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567184" comment="xen-kmp-pae-4.2.5_12_3.0.101_0.47.55-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567185" comment="xen-libs-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567186" comment="xen-libs-32bit-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567187" comment="xen-tools-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567188" comment="xen-tools-domU-4.2.5_12-15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219584" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="907514" ref_url="https://bugzilla.suse.com/907514" source="BUGZILLA"/>
		<reference ref_id="910258" ref_url="https://bugzilla.suse.com/910258" source="BUGZILLA"/>
		<reference ref_id="918984" ref_url="https://bugzilla.suse.com/918984" source="BUGZILLA"/>
		<reference ref_id="923967" ref_url="https://bugzilla.suse.com/923967" source="BUGZILLA"/>
		<reference ref_id="932267" ref_url="https://bugzilla.suse.com/932267" source="BUGZILLA"/>
		<reference ref_id="941074" ref_url="https://bugzilla.suse.com/941074" source="BUGZILLA"/>
		<reference ref_id="944463" ref_url="https://bugzilla.suse.com/944463" source="BUGZILLA"/>
		<reference ref_id="944697" ref_url="https://bugzilla.suse.com/944697" source="BUGZILLA"/>
		<reference ref_id="947165" ref_url="https://bugzilla.suse.com/947165" source="BUGZILLA"/>
		<reference ref_id="950367" ref_url="https://bugzilla.suse.com/950367" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001654.html" source="SUSE-SU"/>
		<description>
xen was updated to fix nine security issues.

These security issues were fixed:
- CVE-2015-4037: The slirp_smb function in net/slirp.c created temporary files with predictable names, which allowed local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program (bsc#932267).
- CVE-2014-0222: Integer overflow in the qcow_open function allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests (bsc#950367).
- CVE-2015-7311: libxl in Xen did not properly handle the readonly flag on disks when using the qemu-xen device model, which allowed local guest users to write to a read-only disk image (bsc#947165).
- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).
- CVE-2015-6815: With e1000 NIC emulation support it was possible to enter an infinite loop (bsc#944697).
- CVE-2015-7969: Leak of main per-domain vcpu pointer array leading to denial of service (bsc#950703).
- CVE-2015-7969: Leak of per-domain profiling- related vcpu pointer array leading to denial of service (bsc#950705).
- CVE-2015-7971: Some pmu and profiling hypercalls log without rate limiting (bsc#950706).

These non-security issues were fixed:
- bsc#907514: Bus fatal error: SLES 12 sudden reboot has been observed
- bsc#910258: SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC
- bsc#918984: Bus fatal error: SLES11-SP4 sudden reboot has been observed
- bsc#923967: Partner-L3: Bus fatal error: SLES11-SP3 sudden reboot has been observed
- bsc#941074: Device 51728 could not be connected. Hotplug scripts not working
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-29"/>
	<updated date="2015-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907514">SUSE bug 907514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910258">SUSE bug 910258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918984">SUSE bug 918984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923967">SUSE bug 923967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941074">SUSE bug 941074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944463">SUSE bug 944463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944697">SUSE bug 944697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947165">SUSE bug 947165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0222">CVE-2014-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4037">CVE-2015-4037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5239">CVE-2015-5239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6815">CVE-2015-6815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7311">CVE-2015-7311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7835">CVE-2015-7835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7969">CVE-2015-7969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7971">CVE-2015-7971 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567189" comment="xen-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567190" comment="xen-doc-html-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567191" comment="xen-doc-pdf-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567192" comment="xen-kmp-default-4.2.5_14_3.0.101_0.47.67-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567193" comment="xen-kmp-pae-4.2.5_14_3.0.101_0.47.67-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567194" comment="xen-libs-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567195" comment="xen-libs-32bit-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567196" comment="xen-tools-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567197" comment="xen-tools-domU-4.2.5_14-18.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567189" comment="xen-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567190" comment="xen-doc-html-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567191" comment="xen-doc-pdf-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567192" comment="xen-kmp-default-4.2.5_14_3.0.101_0.47.67-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567193" comment="xen-kmp-pae-4.2.5_14_3.0.101_0.47.67-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567194" comment="xen-libs-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567195" comment="xen-libs-32bit-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567196" comment="xen-tools-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567197" comment="xen-tools-domU-4.2.5_14-18.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567189" comment="xen-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567190" comment="xen-doc-html-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567191" comment="xen-doc-pdf-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567192" comment="xen-kmp-default-4.2.5_14_3.0.101_0.47.67-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567193" comment="xen-kmp-pae-4.2.5_14_3.0.101_0.47.67-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567194" comment="xen-libs-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567195" comment="xen-libs-32bit-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567196" comment="xen-tools-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567197" comment="xen-tools-domU-4.2.5_14-18.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219585" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="864391" ref_url="https://bugzilla.suse.com/864391" source="BUGZILLA"/>
		<reference ref_id="864655" ref_url="https://bugzilla.suse.com/864655" source="BUGZILLA"/>
		<reference ref_id="864673" ref_url="https://bugzilla.suse.com/864673" source="BUGZILLA"/>
		<reference ref_id="864678" ref_url="https://bugzilla.suse.com/864678" source="BUGZILLA"/>
		<reference ref_id="864682" ref_url="https://bugzilla.suse.com/864682" source="BUGZILLA"/>
		<reference ref_id="864769" ref_url="https://bugzilla.suse.com/864769" source="BUGZILLA"/>
		<reference ref_id="864805" ref_url="https://bugzilla.suse.com/864805" source="BUGZILLA"/>
		<reference ref_id="864811" ref_url="https://bugzilla.suse.com/864811" source="BUGZILLA"/>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="897654" ref_url="https://bugzilla.suse.com/897654" source="BUGZILLA"/>
		<reference ref_id="901508" ref_url="https://bugzilla.suse.com/901508" source="BUGZILLA"/>
		<reference ref_id="902737" ref_url="https://bugzilla.suse.com/902737" source="BUGZILLA"/>
		<reference ref_id="928393" ref_url="https://bugzilla.suse.com/928393" source="BUGZILLA"/>
		<reference ref_id="945404" ref_url="https://bugzilla.suse.com/945404" source="BUGZILLA"/>
		<reference ref_id="945989" ref_url="https://bugzilla.suse.com/945989" source="BUGZILLA"/>
		<reference ref_id="954872" ref_url="https://bugzilla.suse.com/954872" source="BUGZILLA"/>
		<reference ref_id="956829" ref_url="https://bugzilla.suse.com/956829" source="BUGZILLA"/>
		<reference ref_id="957162" ref_url="https://bugzilla.suse.com/957162" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="958007" ref_url="https://bugzilla.suse.com/958007" source="BUGZILLA"/>
		<reference ref_id="958009" ref_url="https://bugzilla.suse.com/958009" source="BUGZILLA"/>
		<reference ref_id="958491" ref_url="https://bugzilla.suse.com/958491" source="BUGZILLA"/>
		<reference ref_id="958523" ref_url="https://bugzilla.suse.com/958523" source="BUGZILLA"/>
		<reference ref_id="959005" ref_url="https://bugzilla.suse.com/959005" source="BUGZILLA"/>
		<reference ref_id="959695" ref_url="https://bugzilla.suse.com/959695" source="BUGZILLA"/>
		<reference ref_id="959928" ref_url="https://bugzilla.suse.com/959928" source="BUGZILLA"/>
		<reference ref_id="960707" ref_url="https://bugzilla.suse.com/960707" source="BUGZILLA"/>
		<reference ref_id="960725" ref_url="https://bugzilla.suse.com/960725" source="BUGZILLA"/>
		<reference ref_id="960861" ref_url="https://bugzilla.suse.com/960861" source="BUGZILLA"/>
		<reference ref_id="960862" ref_url="https://bugzilla.suse.com/960862" source="BUGZILLA"/>
		<reference ref_id="961332" ref_url="https://bugzilla.suse.com/961332" source="BUGZILLA"/>
		<reference ref_id="961691" ref_url="https://bugzilla.suse.com/961691" source="BUGZILLA"/>
		<reference ref_id="963782" ref_url="https://bugzilla.suse.com/963782" source="BUGZILLA"/>
		<reference ref_id="965315" ref_url="https://bugzilla.suse.com/965315" source="BUGZILLA"/>
		<reference ref_id="965317" ref_url="https://bugzilla.suse.com/965317" source="BUGZILLA"/>
		<reference ref_id="967012" ref_url="https://bugzilla.suse.com/967012" source="BUGZILLA"/>
		<reference ref_id="967013" ref_url="https://bugzilla.suse.com/967013" source="BUGZILLA"/>
		<reference ref_id="967630" ref_url="https://bugzilla.suse.com/967630" source="BUGZILLA"/>
		<reference ref_id="967969" ref_url="https://bugzilla.suse.com/967969" source="BUGZILLA"/>
		<reference ref_id="969350" ref_url="https://bugzilla.suse.com/969350" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4527" ref_url="https://www.suse.com/security/cve/CVE-2013-4527/" source="CVE"/>
		<reference ref_id="CVE-2013-4529" ref_url="https://www.suse.com/security/cve/CVE-2013-4529/" source="CVE"/>
		<reference ref_id="CVE-2013-4530" ref_url="https://www.suse.com/security/cve/CVE-2013-4530/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3689" ref_url="https://www.suse.com/security/cve/CVE-2014-3689/" source="CVE"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2014-9718" ref_url="https://www.suse.com/security/cve/CVE-2014-9718/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554/" source="CVE"/>
		<reference ref_id="CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1570" ref_url="https://www.suse.com/security/cve/CVE-2016-1570/" source="CVE"/>
		<reference ref_id="CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270/" source="CVE"/>
		<reference ref_id="CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392/" source="CVE"/>
		<reference ref_id="CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<description>
xen was updated to fix 36 security issues.

These security issues were fixed:
- CVE-2013-4527: Buffer overflow in hw/timer/hpet.c might have allowed remote attackers to execute arbitrary code via vectors related to the number of timers (bnc#864673).
- CVE-2013-4529: Buffer overflow in hw/pci/pcie_aer.c allowed remote attackers to cause a denial of service and possibly execute arbitrary code via a large log_num value in a savevm image (bnc#864678).
- CVE-2013-4530: Buffer overflow in hw/ssi/pl022.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via crafted tx_fifo_head and rx_fifo_head values in a savevm image (bnc#864682).
- CVE-2013-4533: Buffer overflow in the pxa2xx_ssp_load function in hw/arm/pxa2xx.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted s-&gt;rx_level value in a savevm image (bsc#864655).
- CVE-2013-4534: Buffer overflow in hw/intc/openpic.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via vectors related to IRQDest elements (bsc#864811).
- CVE-2013-4537: The ssi_sd_transfer function in hw/sd/ssi-sd.c allowed remote attackers to execute arbitrary code via a crafted arglen value in a savevm image (bsc#864391).
- CVE-2013-4538: Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c allowed remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image (bsc#864769).
- CVE-2013-4539: Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c might have allowed remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image (bsc#864805).
- CVE-2014-0222: Integer overflow in the qcow_open function in block/qcow.c allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2014-3640: The sosendto function in slirp/udp.c allowed local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket (bsc#897654).
- CVE-2014-3689: The vmware-vga driver (hw/display/vmware_vga.c) allowed local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling (bsc#901508).
- CVE-2014-7815: The set_pixel_format function in ui/vnc.c allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value (bsc#902737).
- CVE-2014-9718: The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality had multiple interpretations of a function's return value, which allowed guest OS users to cause a host OS denial of service (memory consumption or infinite loop, and system crash) via a PRDT with zero complete sectors, related to the bmdma_prepare_buf and ahci_dma_prepare_buf functions (bsc#928393).
- CVE-2015-5278: Infinite loop in ne2000_receive() function (bsc#945989).
- CVE-2015-6855: hw/ide/core.c did not properly restrict the commands accepted by an ATAPI device, which allowed guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash (bsc#945404).
- CVE-2015-7512: Buffer overflow in the pcnet_receive function in hw/net/pcnet.c, when a guest NIC has a larger MTU, allowed remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet (bsc#957162).
- CVE-2015-8345: eepro100: infinite loop in processing command block list (bsc#956829).
- CVE-2015-8504: VNC: floating point exception (bsc#958491).
- CVE-2015-8550: Paravirtualized drivers were incautious about shared memory contents (XSA-155) (bsc#957988).
- CVE-2015-8554: qemu-dm buffer overrun in MSI-X handling (XSA-164) (bsc#958007).
- CVE-2015-8555: Information leak in legacy x86 FPU/XMM initialization (XSA-165) (bsc#958009).
- CVE-2015-8558: Infinite loop in ehci_advance_state resulted in DoS (bsc#959005).
- CVE-2015-8743: ne2000: OOB memory access in ioport r/w functions (bsc#960725).
- CVE-2015-8745: Reading IMR registers lead to a crash via assert(2) call (bsc#960707).
- CVE-2016-1568: AHCI use-after-free vulnerability in aio port commands (bsc#961332).
- CVE-2016-1570: The PV superpage functionality in arch/x86/mm.c allowed local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2) MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3) unknown vectors related to page table updates (bsc#960861).
- CVE-2016-1571: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) (bsc#960862).
- CVE-2016-1714: nvram: OOB r/w access in processing firmware configurations (bsc#961691).
- CVE-2016-1981: e1000 infinite loop in start_xmit and e1000_receive_iov routines (bsc#963782).
- CVE-2016-2270: Xen allowed local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings (bsc#965315).
- CVE-2016-2271: VMX when using an Intel or Cyrix CPU, allowed local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP (bsc#965317).
- CVE-2016-2391: usb: multiple eof_timers in ohci module lead to NULL pointer dereference (bsc#967013).
- CVE-2016-2392: NULL pointer dereference in remote NDIS control message handling (bsc#967012).
- CVE-2016-2538: Integer overflow in remote NDIS control message handling (bsc#967969).
- CVE-2016-2841: ne2000: Infinite loop in ne2000_receive (bsc#969350).
- XSA-166: ioreq handling possibly susceptible to multiple read issue (bsc#958523).

These non-security issues were fixed:
- bsc#954872: script block-dmmd not working as expected 
- bsc#959695: Missing docs for xen
- bsc#967630: Discrepancy in reported memory size with correction XSA-153 for xend
- bsc#959928: When DomU is in state running xm domstate returned nothing
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-06"/>
	<updated date="2016-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/864391">SUSE bug 864391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864655">SUSE bug 864655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864673">SUSE bug 864673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864678">SUSE bug 864678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864682">SUSE bug 864682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864769">SUSE bug 864769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864805">SUSE bug 864805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864811">SUSE bug 864811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897654">SUSE bug 897654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901508">SUSE bug 901508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902737">SUSE bug 902737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928393">SUSE bug 928393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945404">SUSE bug 945404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945989">SUSE bug 945989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954872">SUSE bug 954872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956829">SUSE bug 956829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957162">SUSE bug 957162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958007">SUSE bug 958007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958009">SUSE bug 958009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958491">SUSE bug 958491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958523">SUSE bug 958523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959005">SUSE bug 959005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959695">SUSE bug 959695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959928">SUSE bug 959928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960707">SUSE bug 960707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960725">SUSE bug 960725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960861">SUSE bug 960861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960862">SUSE bug 960862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961332">SUSE bug 961332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961691">SUSE bug 961691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963782">SUSE bug 963782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965315">SUSE bug 965315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965317">SUSE bug 965317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967012">SUSE bug 967012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967013">SUSE bug 967013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967630">SUSE bug 967630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967969">SUSE bug 967969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969350">SUSE bug 969350</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4527/">CVE-2013-4527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4527">CVE-2013-4527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4529/">CVE-2013-4529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4529">CVE-2013-4529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4530/">CVE-2013-4530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4530">CVE-2013-4530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4533">CVE-2013-4533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4534">CVE-2013-4534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4537">CVE-2013-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4538">CVE-2013-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4539">CVE-2013-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0222">CVE-2014-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3640">CVE-2014-3640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3689/">CVE-2014-3689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3689">CVE-2014-3689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7815">CVE-2014-7815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9718/">CVE-2014-9718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9718">CVE-2014-9718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5278">CVE-2015-5278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6855">CVE-2015-6855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7512">CVE-2015-7512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8345">CVE-2015-8345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8504">CVE-2015-8504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8550">CVE-2015-8550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8554">CVE-2015-8554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8555">CVE-2015-8555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8558">CVE-2015-8558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8743">CVE-2015-8743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8745">CVE-2015-8745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1568">CVE-2016-1568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1570/">CVE-2016-1570 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1570">CVE-2016-1570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1571">CVE-2016-1571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1714">CVE-2016-1714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1981">CVE-2016-1981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2270">CVE-2016-2270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2271">CVE-2016-2271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2391">CVE-2016-2391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2392">CVE-2016-2392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2538">CVE-2016-2538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2841">CVE-2016-2841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581541" comment="xen-4.2.5_20-24.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581542" comment="xen-doc-html-4.2.5_20-24.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581543" comment="xen-doc-pdf-4.2.5_20-24.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581544" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581545" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581546" comment="xen-libs-4.2.5_20-24.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581547" comment="xen-libs-32bit-4.2.5_20-24.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581548" comment="xen-tools-4.2.5_20-24.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581549" comment="xen-tools-domU-4.2.5_20-24.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219586" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="954872" ref_url="https://bugzilla.suse.com/954872" source="BUGZILLA"/>
		<reference ref_id="961600" ref_url="https://bugzilla.suse.com/961600" source="BUGZILLA"/>
		<reference ref_id="963161" ref_url="https://bugzilla.suse.com/963161" source="BUGZILLA"/>
		<reference ref_id="973188" ref_url="https://bugzilla.suse.com/973188" source="BUGZILLA"/>
		<reference ref_id="973631" ref_url="https://bugzilla.suse.com/973631" source="BUGZILLA"/>
		<reference ref_id="974038" ref_url="https://bugzilla.suse.com/974038" source="BUGZILLA"/>
		<reference ref_id="975130" ref_url="https://bugzilla.suse.com/975130" source="BUGZILLA"/>
		<reference ref_id="975138" ref_url="https://bugzilla.suse.com/975138" source="BUGZILLA"/>
		<reference ref_id="976470" ref_url="https://bugzilla.suse.com/976470" source="BUGZILLA"/>
		<reference ref_id="978164" ref_url="https://bugzilla.suse.com/978164" source="BUGZILLA"/>
		<reference ref_id="978295" ref_url="https://bugzilla.suse.com/978295" source="BUGZILLA"/>
		<reference ref_id="978413" ref_url="https://bugzilla.suse.com/978413" source="BUGZILLA"/>
		<reference ref_id="980716" ref_url="https://bugzilla.suse.com/980716" source="BUGZILLA"/>
		<reference ref_id="980724" ref_url="https://bugzilla.suse.com/980724" source="BUGZILLA"/>
		<reference ref_id="981264" ref_url="https://bugzilla.suse.com/981264" source="BUGZILLA"/>
		<reference ref_id="982224" ref_url="https://bugzilla.suse.com/982224" source="BUGZILLA"/>
		<reference ref_id="982225" ref_url="https://bugzilla.suse.com/982225" source="BUGZILLA"/>
		<reference ref_id="982960" ref_url="https://bugzilla.suse.com/982960" source="BUGZILLA"/>
		<reference ref_id="983984" ref_url="https://bugzilla.suse.com/983984" source="BUGZILLA"/>
		<reference ref_id="985503" ref_url="https://bugzilla.suse.com/985503" source="BUGZILLA"/>
		<reference ref_id="988675" ref_url="https://bugzilla.suse.com/988675" source="BUGZILLA"/>
		<reference ref_id="990843" ref_url="https://bugzilla.suse.com/990843" source="BUGZILLA"/>
		<reference ref_id="990923" ref_url="https://bugzilla.suse.com/990923" source="BUGZILLA"/>
		<reference ref_id="995785" ref_url="https://bugzilla.suse.com/995785" source="BUGZILLA"/>
		<reference ref_id="995792" ref_url="https://bugzilla.suse.com/995792" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3615" ref_url="https://www.suse.com/security/cve/CVE-2014-3615/" source="CVE"/>
		<reference ref_id="CVE-2014-3672" ref_url="https://www.suse.com/security/cve/CVE-2014-3672/" source="CVE"/>
		<reference ref_id="CVE-2016-3158" ref_url="https://www.suse.com/security/cve/CVE-2016-3158/" source="CVE"/>
		<reference ref_id="CVE-2016-3159" ref_url="https://www.suse.com/security/cve/CVE-2016-3159/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3712" ref_url="https://www.suse.com/security/cve/CVE-2016-3712/" source="CVE"/>
		<reference ref_id="CVE-2016-3960" ref_url="https://www.suse.com/security/cve/CVE-2016-3960/" source="CVE"/>
		<reference ref_id="CVE-2016-4001" ref_url="https://www.suse.com/security/cve/CVE-2016-4001/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-4453" ref_url="https://www.suse.com/security/cve/CVE-2016-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-4454" ref_url="https://www.suse.com/security/cve/CVE-2016-4454/" source="CVE"/>
		<reference ref_id="CVE-2016-4480" ref_url="https://www.suse.com/security/cve/CVE-2016-4480/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403/" source="CVE"/>
		<reference ref_id="CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-7092" ref_url="https://www.suse.com/security/cve/CVE-2016-7092/" source="CVE"/>
		<reference ref_id="CVE-2016-7094" ref_url="https://www.suse.com/security/cve/CVE-2016-7094/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002394.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:
- CVE-2016-7094: Buffer overflow in Xen allowed local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update (bsc#995792)
- CVE-2016-7092: The get_page_from_l3e function in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables (bsc#995785)
- CVE-2016-5403: Unbounded memory allocation allowed a guest administrator to cause a denial of service of the host (bsc#990923)
- CVE-2016-6351: The esp_do_dma function in hw/scsi/esp.c, when built with ESP/NCR53C9x controller emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the host via vectors involving DMA read into ESP command buffer (bsc#990843)
- CVE-2016-6258: The PV pagetable code in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries (bsc#988675)
- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the host via vectors related to the information transfer buffer (bsc#983984)
- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c might have allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982960)
- CVE-2016-4453: The vmsvga_fifo_run function allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982225)
- CVE-2016-4454: The vmsvga_fifo_read_raw function allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggered an out-of-bounds read (bsc#982224)
- CVE-2014-3672: The qemu implementation in libvirt Xen allowed local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr (bsc#981264)
- CVE-2016-4441: The get_cmd function in the 53C9X Fast SCSI Controller (FSC) support did not properly check DMA length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command (bsc#980724)
- CVE-2016-4439: The esp_reg_write function in the 53C9X Fast SCSI Controller (FSC) support did not properly check command buffer length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the host via unspecified vectors (bsc#980716)
- CVE-2016-3710: The VGA module improperly performed bounds checking on banked access to video memory, which allowed local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the 'Dark Portal' issue (bsc#978164)
- CVE-2016-4480: The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen did not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might have allowed local guest OS users to gain privileges via a crafted mapping of memory (bsc#978295)
- CVE-2016-3960: Integer overflow in the x86 shadow pagetable code allowed local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping (bsc#974038)
- CVE-2016-3158: The xrstor function did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188)
- CVE-2016-4001: Buffer overflow in the stellaris_enet_receive function, when the Stellaris ethernet controller is configured to accept large packets, allowed remote attackers to cause a denial of service (QEMU crash) via a large packet (bsc#975130)
- CVE-2016-4002: Buffer overflow in the mipsnet_receive function, when the guest NIC is configured to accept large packets, allowed remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes (bsc#975138)

These non-security issues were fixed:
- bsc#985503: vif-route broken 
- bsc#978413: PV guest upgrade from sles11sp4 to sles12sp2 alpha3 failed on sles11sp4 xen host.
- bsc#954872: Script block-dmmd not working as expected - libxl: error: libxl_dm.c (another modification) 
- bsc#961600: Poor performance when Xen HVM domU configured with max memory &gt; current memory
- bsc#963161: Windows VM getting stuck during load while a VF is assigned to it after upgrading to latest maintenance updates
- bsc#976470: Xend fails to start 
- bsc#973631: AWS EC2 kdump issue
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-04"/>
	<updated date="2016-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/954872">SUSE bug 954872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961600">SUSE bug 961600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963161">SUSE bug 963161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973188">SUSE bug 973188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973631">SUSE bug 973631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974038">SUSE bug 974038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975130">SUSE bug 975130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975138">SUSE bug 975138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976470">SUSE bug 976470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978164">SUSE bug 978164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978295">SUSE bug 978295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978413">SUSE bug 978413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980716">SUSE bug 980716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980724">SUSE bug 980724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981264">SUSE bug 981264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982224">SUSE bug 982224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982225">SUSE bug 982225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982960">SUSE bug 982960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983984">SUSE bug 983984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985503">SUSE bug 985503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988675">SUSE bug 988675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990843">SUSE bug 990843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990923">SUSE bug 990923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995785">SUSE bug 995785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995792">SUSE bug 995792</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3615/">CVE-2014-3615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3615">CVE-2014-3615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3672/">CVE-2014-3672 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3672">CVE-2014-3672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3158/">CVE-2016-3158 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3158">CVE-2016-3158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3159/">CVE-2016-3159 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3159">CVE-2016-3159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3710">CVE-2016-3710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3712/">CVE-2016-3712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3712">CVE-2016-3712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3960/">CVE-2016-3960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3960">CVE-2016-3960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4001/">CVE-2016-4001 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4001">CVE-2016-4001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4002">CVE-2016-4002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4439">CVE-2016-4439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4441">CVE-2016-4441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4453/">CVE-2016-4453 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4453">CVE-2016-4453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4454/">CVE-2016-4454 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4454">CVE-2016-4454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4480/">CVE-2016-4480 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4480">CVE-2016-4480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5238">CVE-2016-5238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5338">CVE-2016-5338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5403">CVE-2016-5403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6258">CVE-2016-6258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6351">CVE-2016-6351 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7092/">CVE-2016-7092 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7092">CVE-2016-7092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7094/">CVE-2016-7094 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7094">CVE-2016-7094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581550" comment="xen-4.2.5_21-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581551" comment="xen-doc-html-4.2.5_21-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581552" comment="xen-doc-pdf-4.2.5_21-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581553" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569288" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581554" comment="xen-libs-4.2.5_21-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581555" comment="xen-libs-32bit-4.2.5_21-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581556" comment="xen-tools-4.2.5_21-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581557" comment="xen-tools-domU-4.2.5_21-27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219587" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1000106" ref_url="https://bugzilla.suse.com/1000106" source="BUGZILLA"/>
		<reference ref_id="1000893" ref_url="https://bugzilla.suse.com/1000893" source="BUGZILLA"/>
		<reference ref_id="1003030" ref_url="https://bugzilla.suse.com/1003030" source="BUGZILLA"/>
		<reference ref_id="1003032" ref_url="https://bugzilla.suse.com/1003032" source="BUGZILLA"/>
		<reference ref_id="1005004" ref_url="https://bugzilla.suse.com/1005004" source="BUGZILLA"/>
		<reference ref_id="1005005" ref_url="https://bugzilla.suse.com/1005005" source="BUGZILLA"/>
		<reference ref_id="1007157" ref_url="https://bugzilla.suse.com/1007157" source="BUGZILLA"/>
		<reference ref_id="1007160" ref_url="https://bugzilla.suse.com/1007160" source="BUGZILLA"/>
		<reference ref_id="1009100" ref_url="https://bugzilla.suse.com/1009100" source="BUGZILLA"/>
		<reference ref_id="1009103" ref_url="https://bugzilla.suse.com/1009103" source="BUGZILLA"/>
		<reference ref_id="1009107" ref_url="https://bugzilla.suse.com/1009107" source="BUGZILLA"/>
		<reference ref_id="1009109" ref_url="https://bugzilla.suse.com/1009109" source="BUGZILLA"/>
		<reference ref_id="1009111" ref_url="https://bugzilla.suse.com/1009111" source="BUGZILLA"/>
		<reference ref_id="1011652" ref_url="https://bugzilla.suse.com/1011652" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7777" ref_url="https://www.suse.com/security/cve/CVE-2016-7777/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8909" ref_url="https://www.suse.com/security/cve/CVE-2016-8909/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9379" ref_url="https://www.suse.com/security/cve/CVE-2016-9379/" source="CVE"/>
		<reference ref_id="CVE-2016-9380" ref_url="https://www.suse.com/security/cve/CVE-2016-9380/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9382" ref_url="https://www.suse.com/security/cve/CVE-2016-9382/" source="CVE"/>
		<reference ref_id="CVE-2016-9383" ref_url="https://www.suse.com/security/cve/CVE-2016-9383/" source="CVE"/>
		<reference ref_id="CVE-2016-9386" ref_url="https://www.suse.com/security/cve/CVE-2016-9386/" source="CVE"/>
		<reference ref_id="CVE-2016-9637" ref_url="https://www.suse.com/security/cve/CVE-2016-9637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002528.html" source="SUSE-SU"/>
		<description>

This update for xen fixes several issues.

These security issues were fixed:

- CVE-2016-9637: ioport array overflow allowing a malicious guest administrator can escalate their privilege to that of the host (bsc#1011652)
- CVE-2016-9386: x86 null segments were not always treated as unusable allowing an unprivileged guest user program to elevate its privilege to that of the guest operating system. Exploit of this vulnerability is easy on Intel and more complicated on AMD (bsc#1009100)
- CVE-2016-9382: x86 task switch to VM86 mode was mis-handled, allowing a unprivileged guest process to escalate its privilege to that of the guest operating system on AMD hardware. On Intel hardware a malicious unprivileged guest process can crash the guest (bsc#1009103)
- CVE-2016-9383: The x86 64-bit bit test instruction emulation was broken, allowing a guest to modify arbitrary memory leading to arbitray code execution (bsc#1009107)
- CVE-2016-9381: Improper processing of shared rings allowing guest administrators take over the qemu process, elevating their privilege to that of the qemu process (bsc#1009109)
- CVE-2016-9380: Delimiter injection vulnerabilities in pygrub allowed guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111)
- CVE-2016-9379: Delimiter injection vulnerabilities in pygrub allowed guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111)
- CVE-2016-7777: Xen did not properly honor CR0.TS and CR0.EM, which allowed local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it (bsc#1000106)
- CVE-2016-8910: The rtl8139_cplus_transmit function in hw/net/rtl8139.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count (bsc#1007157)
- CVE-2016-8909: The intel_hda_xfer function in hw/audio/intel-hda.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position (bsc#1007160)
- CVE-2016-8667: The rc4030_write function in hw/dma/rc4030.c in allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value (bsc#1005004)
- CVE-2016-8669: The serial_update_parameters function in hw/char/serial.c allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base (bsc#1005005)
- CVE-2016-7908: The mcf_fec_do_tx function in hw/net/mcf_fec.c did not properly limit the buffer descriptor count when transmitting packets, which allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags (bsc#1003030)
- CVE-2016-7909: The pcnet_rdra_addr function in hw/net/pcnet.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0 (bsc#1003032)

This non-security issue was fixed:

- bsc#1000893: virsh setmem didn't allow to set current guest memory to max limit
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-27"/>
	<updated date="2016-12-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000106">SUSE bug 1000106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000893">SUSE bug 1000893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003030">SUSE bug 1003030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003032">SUSE bug 1003032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005004">SUSE bug 1005004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005005">SUSE bug 1005005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007157">SUSE bug 1007157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007160">SUSE bug 1007160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009100">SUSE bug 1009100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009103">SUSE bug 1009103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009107">SUSE bug 1009107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009109">SUSE bug 1009109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009111">SUSE bug 1009111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011652">SUSE bug 1011652</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7777/">CVE-2016-7777 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7777">CVE-2016-7777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7908">CVE-2016-7908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7909">CVE-2016-7909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8667">CVE-2016-8667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8669">CVE-2016-8669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8909/">CVE-2016-8909 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8909">CVE-2016-8909 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8910">CVE-2016-8910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9379/">CVE-2016-9379 at SUSE</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9379">CVE-2016-9379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9380/">CVE-2016-9380 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9380">CVE-2016-9380 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9381">CVE-2016-9381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9382/">CVE-2016-9382 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9382">CVE-2016-9382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9383/">CVE-2016-9383 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9383">CVE-2016-9383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9386/">CVE-2016-9386 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9386">CVE-2016-9386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9637/">CVE-2016-9637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9637">CVE-2016-9637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581558" comment="xen-4.2.5_21-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581559" comment="xen-doc-html-4.2.5_21-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581560" comment="xen-doc-pdf-4.2.5_21-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581561" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569292" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.90-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581562" comment="xen-libs-4.2.5_21-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581563" comment="xen-libs-32bit-4.2.5_21-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581564" comment="xen-tools-4.2.5_21-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581565" comment="xen-tools-domU-4.2.5_21-30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219588" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1000106" ref_url="https://bugzilla.suse.com/1000106" source="BUGZILLA"/>
		<reference ref_id="1000893" ref_url="https://bugzilla.suse.com/1000893" source="BUGZILLA"/>
		<reference ref_id="1003030" ref_url="https://bugzilla.suse.com/1003030" source="BUGZILLA"/>
		<reference ref_id="1003032" ref_url="https://bugzilla.suse.com/1003032" source="BUGZILLA"/>
		<reference ref_id="1005004" ref_url="https://bugzilla.suse.com/1005004" source="BUGZILLA"/>
		<reference ref_id="1005005" ref_url="https://bugzilla.suse.com/1005005" source="BUGZILLA"/>
		<reference ref_id="1007157" ref_url="https://bugzilla.suse.com/1007157" source="BUGZILLA"/>
		<reference ref_id="1007160" ref_url="https://bugzilla.suse.com/1007160" source="BUGZILLA"/>
		<reference ref_id="1009100" ref_url="https://bugzilla.suse.com/1009100" source="BUGZILLA"/>
		<reference ref_id="1009103" ref_url="https://bugzilla.suse.com/1009103" source="BUGZILLA"/>
		<reference ref_id="1009107" ref_url="https://bugzilla.suse.com/1009107" source="BUGZILLA"/>
		<reference ref_id="1009109" ref_url="https://bugzilla.suse.com/1009109" source="BUGZILLA"/>
		<reference ref_id="1009111" ref_url="https://bugzilla.suse.com/1009111" source="BUGZILLA"/>
		<reference ref_id="1011652" ref_url="https://bugzilla.suse.com/1011652" source="BUGZILLA"/>
		<reference ref_id="1012651" ref_url="https://bugzilla.suse.com/1012651" source="BUGZILLA"/>
		<reference ref_id="1014298" ref_url="https://bugzilla.suse.com/1014298" source="BUGZILLA"/>
		<reference ref_id="1016340" ref_url="https://bugzilla.suse.com/1016340" source="BUGZILLA"/>
		<reference ref_id="895528" ref_url="https://bugzilla.suse.com/895528" source="BUGZILLA"/>
		<reference ref_id="954872" ref_url="https://bugzilla.suse.com/954872" source="BUGZILLA"/>
		<reference ref_id="956832" ref_url="https://bugzilla.suse.com/956832" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="958007" ref_url="https://bugzilla.suse.com/958007" source="BUGZILLA"/>
		<reference ref_id="958009" ref_url="https://bugzilla.suse.com/958009" source="BUGZILLA"/>
		<reference ref_id="958493" ref_url="https://bugzilla.suse.com/958493" source="BUGZILLA"/>
		<reference ref_id="958523" ref_url="https://bugzilla.suse.com/958523" source="BUGZILLA"/>
		<reference ref_id="959006" ref_url="https://bugzilla.suse.com/959006" source="BUGZILLA"/>
		<reference ref_id="959695" ref_url="https://bugzilla.suse.com/959695" source="BUGZILLA"/>
		<reference ref_id="959928" ref_url="https://bugzilla.suse.com/959928" source="BUGZILLA"/>
		<reference ref_id="960726" ref_url="https://bugzilla.suse.com/960726" source="BUGZILLA"/>
		<reference ref_id="960861" ref_url="https://bugzilla.suse.com/960861" source="BUGZILLA"/>
		<reference ref_id="960862" ref_url="https://bugzilla.suse.com/960862" source="BUGZILLA"/>
		<reference ref_id="961332" ref_url="https://bugzilla.suse.com/961332" source="BUGZILLA"/>
		<reference ref_id="961600" ref_url="https://bugzilla.suse.com/961600" source="BUGZILLA"/>
		<reference ref_id="961692" ref_url="https://bugzilla.suse.com/961692" source="BUGZILLA"/>
		<reference ref_id="962335" ref_url="https://bugzilla.suse.com/962335" source="BUGZILLA"/>
		<reference ref_id="962360" ref_url="https://bugzilla.suse.com/962360" source="BUGZILLA"/>
		<reference ref_id="962611" ref_url="https://bugzilla.suse.com/962611" source="BUGZILLA"/>
		<reference ref_id="962627" ref_url="https://bugzilla.suse.com/962627" source="BUGZILLA"/>
		<reference ref_id="962642" ref_url="https://bugzilla.suse.com/962642" source="BUGZILLA"/>
		<reference ref_id="962758" ref_url="https://bugzilla.suse.com/962758" source="BUGZILLA"/>
		<reference ref_id="963161" ref_url="https://bugzilla.suse.com/963161" source="BUGZILLA"/>
		<reference ref_id="963783" ref_url="https://bugzilla.suse.com/963783" source="BUGZILLA"/>
		<reference ref_id="964431" ref_url="https://bugzilla.suse.com/964431" source="BUGZILLA"/>
		<reference ref_id="964452" ref_url="https://bugzilla.suse.com/964452" source="BUGZILLA"/>
		<reference ref_id="964644" ref_url="https://bugzilla.suse.com/964644" source="BUGZILLA"/>
		<reference ref_id="964746" ref_url="https://bugzilla.suse.com/964746" source="BUGZILLA"/>
		<reference ref_id="964925" ref_url="https://bugzilla.suse.com/964925" source="BUGZILLA"/>
		<reference ref_id="964929" ref_url="https://bugzilla.suse.com/964929" source="BUGZILLA"/>
		<reference ref_id="964947" ref_url="https://bugzilla.suse.com/964947" source="BUGZILLA"/>
		<reference ref_id="964950" ref_url="https://bugzilla.suse.com/964950" source="BUGZILLA"/>
		<reference ref_id="965112" ref_url="https://bugzilla.suse.com/965112" source="BUGZILLA"/>
		<reference ref_id="965156" ref_url="https://bugzilla.suse.com/965156" source="BUGZILLA"/>
		<reference ref_id="965315" ref_url="https://bugzilla.suse.com/965315" source="BUGZILLA"/>
		<reference ref_id="965317" ref_url="https://bugzilla.suse.com/965317" source="BUGZILLA"/>
		<reference ref_id="967090" ref_url="https://bugzilla.suse.com/967090" source="BUGZILLA"/>
		<reference ref_id="967101" ref_url="https://bugzilla.suse.com/967101" source="BUGZILLA"/>
		<reference ref_id="967630" ref_url="https://bugzilla.suse.com/967630" source="BUGZILLA"/>
		<reference ref_id="968004" ref_url="https://bugzilla.suse.com/968004" source="BUGZILLA"/>
		<reference ref_id="969351" ref_url="https://bugzilla.suse.com/969351" source="BUGZILLA"/>
		<reference ref_id="973188" ref_url="https://bugzilla.suse.com/973188" source="BUGZILLA"/>
		<reference ref_id="973631" ref_url="https://bugzilla.suse.com/973631" source="BUGZILLA"/>
		<reference ref_id="974038" ref_url="https://bugzilla.suse.com/974038" source="BUGZILLA"/>
		<reference ref_id="975130" ref_url="https://bugzilla.suse.com/975130" source="BUGZILLA"/>
		<reference ref_id="975138" ref_url="https://bugzilla.suse.com/975138" source="BUGZILLA"/>
		<reference ref_id="976470" ref_url="https://bugzilla.suse.com/976470" source="BUGZILLA"/>
		<reference ref_id="978160" ref_url="https://bugzilla.suse.com/978160" source="BUGZILLA"/>
		<reference ref_id="978164" ref_url="https://bugzilla.suse.com/978164" source="BUGZILLA"/>
		<reference ref_id="978295" ref_url="https://bugzilla.suse.com/978295" source="BUGZILLA"/>
		<reference ref_id="978413" ref_url="https://bugzilla.suse.com/978413" source="BUGZILLA"/>
		<reference ref_id="980716" ref_url="https://bugzilla.suse.com/980716" source="BUGZILLA"/>
		<reference ref_id="980724" ref_url="https://bugzilla.suse.com/980724" source="BUGZILLA"/>
		<reference ref_id="981264" ref_url="https://bugzilla.suse.com/981264" source="BUGZILLA"/>
		<reference ref_id="982224" ref_url="https://bugzilla.suse.com/982224" source="BUGZILLA"/>
		<reference ref_id="982225" ref_url="https://bugzilla.suse.com/982225" source="BUGZILLA"/>
		<reference ref_id="982960" ref_url="https://bugzilla.suse.com/982960" source="BUGZILLA"/>
		<reference ref_id="983984" ref_url="https://bugzilla.suse.com/983984" source="BUGZILLA"/>
		<reference ref_id="985503" ref_url="https://bugzilla.suse.com/985503" source="BUGZILLA"/>
		<reference ref_id="988675" ref_url="https://bugzilla.suse.com/988675" source="BUGZILLA"/>
		<reference ref_id="990843" ref_url="https://bugzilla.suse.com/990843" source="BUGZILLA"/>
		<reference ref_id="990923" ref_url="https://bugzilla.suse.com/990923" source="BUGZILLA"/>
		<reference ref_id="995785" ref_url="https://bugzilla.suse.com/995785" source="BUGZILLA"/>
		<reference ref_id="995792" ref_url="https://bugzilla.suse.com/995792" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4527" ref_url="https://www.suse.com/security/cve/CVE-2013-4527/" source="CVE"/>
		<reference ref_id="CVE-2013-4529" ref_url="https://www.suse.com/security/cve/CVE-2013-4529/" source="CVE"/>
		<reference ref_id="CVE-2013-4530" ref_url="https://www.suse.com/security/cve/CVE-2013-4530/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-3615" ref_url="https://www.suse.com/security/cve/CVE-2014-3615/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3672" ref_url="https://www.suse.com/security/cve/CVE-2014-3672/" source="CVE"/>
		<reference ref_id="CVE-2014-3689" ref_url="https://www.suse.com/security/cve/CVE-2014-3689/" source="CVE"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2014-9718" ref_url="https://www.suse.com/security/cve/CVE-2014-9718/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554/" source="CVE"/>
		<reference ref_id="CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2016-10013" ref_url="https://www.suse.com/security/cve/CVE-2016-10013/" source="CVE"/>
		<reference ref_id="CVE-2016-10024" ref_url="https://www.suse.com/security/cve/CVE-2016-10024/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1570" ref_url="https://www.suse.com/security/cve/CVE-2016-1570/" source="CVE"/>
		<reference ref_id="CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270/" source="CVE"/>
		<reference ref_id="CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392/" source="CVE"/>
		<reference ref_id="CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="CVE-2016-3158" ref_url="https://www.suse.com/security/cve/CVE-2016-3158/" source="CVE"/>
		<reference ref_id="CVE-2016-3159" ref_url="https://www.suse.com/security/cve/CVE-2016-3159/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3712" ref_url="https://www.suse.com/security/cve/CVE-2016-3712/" source="CVE"/>
		<reference ref_id="CVE-2016-3960" ref_url="https://www.suse.com/security/cve/CVE-2016-3960/" source="CVE"/>
		<reference ref_id="CVE-2016-4001" ref_url="https://www.suse.com/security/cve/CVE-2016-4001/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-4453" ref_url="https://www.suse.com/security/cve/CVE-2016-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-4454" ref_url="https://www.suse.com/security/cve/CVE-2016-4454/" source="CVE"/>
		<reference ref_id="CVE-2016-4480" ref_url="https://www.suse.com/security/cve/CVE-2016-4480/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403/" source="CVE"/>
		<reference ref_id="CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-7092" ref_url="https://www.suse.com/security/cve/CVE-2016-7092/" source="CVE"/>
		<reference ref_id="CVE-2016-7094" ref_url="https://www.suse.com/security/cve/CVE-2016-7094/" source="CVE"/>
		<reference ref_id="CVE-2016-7777" ref_url="https://www.suse.com/security/cve/CVE-2016-7777/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8909" ref_url="https://www.suse.com/security/cve/CVE-2016-8909/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9379" ref_url="https://www.suse.com/security/cve/CVE-2016-9379/" source="CVE"/>
		<reference ref_id="CVE-2016-9380" ref_url="https://www.suse.com/security/cve/CVE-2016-9380/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9382" ref_url="https://www.suse.com/security/cve/CVE-2016-9382/" source="CVE"/>
		<reference ref_id="CVE-2016-9383" ref_url="https://www.suse.com/security/cve/CVE-2016-9383/" source="CVE"/>
		<reference ref_id="CVE-2016-9386" ref_url="https://www.suse.com/security/cve/CVE-2016-9386/" source="CVE"/>
		<reference ref_id="CVE-2016-9637" ref_url="https://www.suse.com/security/cve/CVE-2016-9637/" source="CVE"/>
		<reference ref_id="CVE-2016-9932" ref_url="https://www.suse.com/security/cve/CVE-2016-9932/" source="CVE"/>
		<description>

This update for xen fixes several issues.

These security issues were fixed:

- CVE-2014-3615: The VGA emulator in QEMU allowed local guest users to read host memory by setting the display to a high resolution (bsc#895528).
- CVE-2016-3712: Integer overflow in the VGA module allowed local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode (bsc#978160).
- CVE-2016-7777: Xen did not properly honor CR0.TS and CR0.EM, which allowed local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it (bsc#1000106)
- CVE-2016-7908: The mcf_fec_do_tx function in hw/net/mcf_fec.c did not properly limit the buffer descriptor count when transmitting packets, which allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags (bsc#1003030)
- CVE-2016-7909: The pcnet_rdra_addr function in hw/net/pcnet.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0 (bsc#1003032)
- CVE-2016-8667: The rc4030_write function in hw/dma/rc4030.c in allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value (bsc#1005004)
- CVE-2016-8669: The serial_update_parameters function in hw/char/serial.c allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base (bsc#1005005)
- CVE-2016-8909: The intel_hda_xfer function in hw/audio/intel-hda.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position (bsc#1007160)
- CVE-2016-8910: The rtl8139_cplus_transmit function in hw/net/rtl8139.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count (bsc#1007157)
- CVE-2016-9379: Delimiter injection vulnerabilities in pygrub allowed guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111)
- CVE-2016-9380: Delimiter injection vulnerabilities in pygrub allowed guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111)
- CVE-2016-9381: Improper processing of shared rings allowing guest administrators take over the qemu process, elevating their privilege to that of the qemu process (bsc#1009109)
- CVE-2016-9382: x86 task switch to VM86 mode was mis-handled, allowing a unprivileged guest process to escalate its privilege to that of the guest operating system on AMD hardware. On Intel hardware a malicious unprivileged guest process can crash the guest (bsc#1009103)
- CVE-2016-9383: The x86 64-bit bit test instruction emulation was broken, allowing a guest to modify arbitrary memory leading to arbitray code execution (bsc#1009107)
- CVE-2016-9386: x86 null segments were not always treated as unusable allowing an unprivileged guest user program to elevate its privilege to that of the guest operating system. Exploit of this vulnerability is easy on Intel and more complicated on AMD (bsc#1009100)
- CVE-2016-9637: ioport array overflow allowing a malicious guest administrator can escalate their privilege to that of the host (bsc#1011652)

- CVE-2016-4480: The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen did not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might have allowed local guest OS users to gain privileges via a crafted mapping of memory (bsc#978295)
- CVE-2016-6258: The PV pagetable code in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries (bsc#988675)
- CVE-2016-7094: Buffer overflow in Xen allowed local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update (bsc#995792)
- CVE-2016-7092: The get_page_from_l3e function in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables (bsc#995785)
- CVE-2016-5403: The virtqueue_pop function in hw/virtio/virtio.c in QEMU allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion (boo#990923)
- CVE-2016-6351: The esp_do_dma function in hw/scsi/esp.c, when built with ESP/NCR53C9x controller emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the host via vectors involving DMA read into ESP command buffer (bsc#990843)
- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer (bsc#983984)
- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982960)
- CVE-2016-4453: The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982225)
- CVE-2016-4454: The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read (bsc#982224)
- CVE-2014-3672: The qemu implementation in libvirt Xen allowed local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr (bsc#981264)
- CVE-2016-4441: The get_cmd function in the 53C9X Fast SCSI Controller (FSC) support did not properly check DMA length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command (bsc#980724)
- CVE-2016-4439: The esp_reg_write function in the 53C9X Fast SCSI Controller (FSC) support did not properly check command buffer length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the host via unspecified vectors (bsc#980716)
- CVE-2016-3710: The VGA module improperly performed bounds checking on banked access to video memory, which allowed local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the 'Dark Portal' issue (bsc#978164)
- CVE-2016-3960: Integer overflow in the x86 shadow pagetable code allowed local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping (bsc#974038)
- CVE-2016-3159: The fpu_fxrstor function in arch/x86/i387.c did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188)
- CVE-2016-3158: The xrstor function did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188)
- CVE-2016-4001: Buffer overflow in the stellaris_enet_receive function, when the Stellaris ethernet controller is configured to accept large packets, allowed remote attackers to cause a denial of service (QEMU crash) via a large packet (bsc#975130)
- CVE-2016-4002: Buffer overflow in the mipsnet_receive function, when the guest NIC is configured to accept large packets, allowed remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes (bsc#975138)
- CVE-2016-2841: The ne2000_receive function in the NE2000 NIC emulation support (hw/net/ne2000.c) allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via crafted values for the PSTART and PSTOP registers, involving ring buffer control (bsc#969351)
- CVE-2016-2538: Multiple integer overflows in the USB Net device emulator (hw/usb/dev-network.c) allowed local guest OS administrators to cause a denial of service (QEMU process crash) or obtain sensitive host memory information via a remote NDIS control message packet that is mishandled in the (1) rndis_query_response, (2) rndis_set_response, or (3) usb_net_handle_dataout function (bsc#968004).
- CVE-2016-2391: The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers (bsc#967101)
- CVE-2016-2392: The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU did not properly validate USB configuration descriptor objects, which allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet (bsc#967090)
- CVE-2016-2270: Xen allowed local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings (bsc#965315)
- CVE-2016-2271: VMX in Xen, when using an Intel or Cyrix CPU, allowed local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP (bsc#965317)
- CVE-2015-6855: hw/ide/core.c did not properly restrict the commands accepted by an ATAPI device, which allowed guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash (bsc#965156).
- CVE-2014-3640: The sosendto function in slirp/udp.c allowed local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket (bsc#965112)
- CVE-2013-4529: Buffer overflow in hw/pci/pcie_aer.c allowed remote attackers to cause a denial of service and possibly execute arbitrary code via a large log_num value in a savevm image (bsc#964929).
- CVE-2015-5278: Infinite loop in ne2000_receive() function allowed a privileged user inside the guest to crash the Qemu instance resulting in DoS (bsc#964947)
- CVE-2013-4530: Buffer overflow in hw/ssi/pl022.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via crafted tx_fifo_head and rx_fifo_head values in a savevm image (bsc#964950).
- CVE-2015-8345: The i8255x (PRO100) emulation support was vulnerable to an infinite loop issue that allowed a privileged (CAP_SYS_RAWIO) user inside guest to crash the Qemu instance resulting in DoS (bsc#956832)
- CVE-2013-4533: Buffer overflow in the pxa2xx_ssp_load function in hw/arm/pxa2xx.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted s-&gt;rx_level value in a savevm image (bsc#964644)
- CVE-2013-4527: Buffer overflow in hw/timer/hpet.c might have allowed remote attackers to execute arbitrary code via vectors related to the number of timers (bsc#964746).
- CVE-2014-0222: Integer overflow in the qcow_open function in block/qcow.c allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#964925)
- CVE-2014-9718: The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality had multiple interpretations of a function's return value, which allowed guest OS users to cause a host OS denial of service (memory consumption or infinite loop, and system crash) via a PRDT with zero complete sectors, related to the bmdma_prepare_buf and ahci_dma_prepare_buf functions (bsc#964431).
- CVE-2013-4534: Buffer overflow in hw/intc/openpic.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via vectors related to IRQDest elements (bsc#964452)
- CVE-2016-1981: A:infinite loop in start_xmit and e1000_receive_iov routines allowed a privileged user inside the guest to crash the Qemu instance resulting in DoS (bsc#963783)
- CVE-2013-4539: Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c might have allowed remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image (bsc#962758)
- CVE-2013-4537: The ssi_sd_transfer function in hw/sd/ssi-sd.c allowed remote attackers to execute arbitrary code via a crafted arglen value in a savevm image (bsc#962642)
- CVE-2014-7815: The set_pixel_format function in ui/vnc.c allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value (bsc#962627)
- CVE-2014-3689: The vmware-vga driver (hw/display/vmware_vga.c) allowed local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling (bsc#962611)
- CVE-2013-4538: Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c allowed remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image (bsc#962335)
- CVE-2015-7512: Buffer overflow in the pcnet_receive function in hw/net/pcnet.c, when a guest NIC has a larger MTU, allowed remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet (bsc#962360)
- CVE-2016-1714: The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c when built with the Firmware Configuration device emulation support, allowed guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration (bsc#961692)
- CVE-2016-1568: Use-after-free vulnerability in hw/ide/ahci.c, when built with IDE AHCI Emulation support, allowed guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via an invalid AHCI Native Command Queuing (NCQ) AIO command (bsc#961332).
- CVE-2016-1571: The paging_invlpg function in include/asm-x86/paging.h in Xen when using shadow mode paging or nested virtualization is enabled, allowed local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction, which triggers a hypervisor bug check (bsc#960862)
- CVE-2016-1570: The PV superpage functionality in arch/x86/mm.c allowed local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2) MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3) unknown vectors related to page table updates (bsc#960861).
- CVE-2015-8743: A OOB memory access in ioport r/w functions allowed a privileged (CAP_SYS_RAWIO) user/process to use this flaw to leak or corrupt Qemu memory bytes (bsc#960726)
- CVE-2015-8550: Xen, when used on a system providing PV backends, allowed local guest OS administrators to cause a denial of service (host OS crash) or gain privileges by writing to memory shared between the frontend and backend, aka a double fetch vulnerability (bsc#957988)
- CVE-2015-8558: The ehci_process_itd function in hw/usb/hcd-ehci.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular isochronous transfer descriptor (iTD) list (bsc#959006).
- CVE-2015-8504: The VNC display driver support was vulnerable to an arithmetic exception flaw that allowed a privileged remote client to crash the guest resulting in DoS (bsc#958493)
- CVE-2015-8554: Buffer overflow in hw/pt-msi.c in Xen, when using the qemu-xen-traditional (aka qemu-dm) device model, allowed local x86 HVM guest administrators to gain privileges by leveraging a system with access to a passed-through MSI-X capable physical PCI device and MSI-X table entries, related to a 'write path.' (bsc#958007)
- CVE-2015-8555: Xen did not initialize x86 FPU stack and XMM registers when XSAVE/XRSTOR are not used to manage guest extended register state, which allowed local guest domains to obtain sensitive information from other domains via unspecified vectors (bsc#958009)
- CVE-2016-9932: CMPXCHG8B emulation failed to ignore operand size override which could have lead to information disclosure.
- CVE-2016-10013: A Mishandling of SYSCALL singlestep during emulation which could have lead to privilege escalation.
- bsc#958523: ioreq handling possibly susceptible to multiple read issue leading to DoS or worse, depending on the configuration
- CVE-2016-10024: bsc#1014298: PV guests may have been able to mask interrupts causing a Denial of Service.

These non-security issues were fixed:

- bsc#1000893: virsh setmem didn't allow to set current guest memory to max limit
- bsc#954872: script block-dmmd not working as expected 
- bsc#959928: xm domstate - when DomU is in state running xm domstate returned nothing
- bsc#959695: Added missing docs for xen
- bsc#967630: Fixed discrepancy in reported memory size with correction XSA-153 for xend
- bsc#963161: Windows VM was getting stuck during load while a VF was assigned to it 
- bsc#976470: Xend failed to start 
- bsc#961600: Fixed poor performance when Xen HVM domU configured with max memory greater than current memory
- bsc#978413: PV guest upgrade from SLES11SP4 to SLES12SP2 alpha3 failed on SLES11SP4 xen host.
- bsc#985503: vif-route broken

		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-09"/>
	<updated date="2017-01-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000106">SUSE bug 1000106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000893">SUSE bug 1000893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003030">SUSE bug 1003030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003032">SUSE bug 1003032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005004">SUSE bug 1005004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005005">SUSE bug 1005005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007157">SUSE bug 1007157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007160">SUSE bug 1007160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009100">SUSE bug 1009100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009103">SUSE bug 1009103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009107">SUSE bug 1009107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009109">SUSE bug 1009109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009111">SUSE bug 1009111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011652">SUSE bug 1011652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012651">SUSE bug 1012651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014298">SUSE bug 1014298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016340">SUSE bug 1016340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895528">SUSE bug 895528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954872">SUSE bug 954872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956832">SUSE bug 956832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958007">SUSE bug 958007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958009">SUSE bug 958009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958493">SUSE bug 958493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958523">SUSE bug 958523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959006">SUSE bug 959006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959695">SUSE bug 959695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959928">SUSE bug 959928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960726">SUSE bug 960726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960861">SUSE bug 960861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960862">SUSE bug 960862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961332">SUSE bug 961332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961600">SUSE bug 961600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961692">SUSE bug 961692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962335">SUSE bug 962335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962360">SUSE bug 962360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962611">SUSE bug 962611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962627">SUSE bug 962627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962642">SUSE bug 962642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962758">SUSE bug 962758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963161">SUSE bug 963161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963783">SUSE bug 963783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964431">SUSE bug 964431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964452">SUSE bug 964452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964644">SUSE bug 964644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964746">SUSE bug 964746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964925">SUSE bug 964925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964929">SUSE bug 964929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964947">SUSE bug 964947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964950">SUSE bug 964950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965112">SUSE bug 965112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965156">SUSE bug 965156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965315">SUSE bug 965315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965317">SUSE bug 965317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967090">SUSE bug 967090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967101">SUSE bug 967101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967630">SUSE bug 967630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968004">SUSE bug 968004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969351">SUSE bug 969351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973188">SUSE bug 973188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973631">SUSE bug 973631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974038">SUSE bug 974038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975130">SUSE bug 975130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975138">SUSE bug 975138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976470">SUSE bug 976470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978160">SUSE bug 978160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978164">SUSE bug 978164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978295">SUSE bug 978295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978413">SUSE bug 978413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980716">SUSE bug 980716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980724">SUSE bug 980724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981264">SUSE bug 981264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982224">SUSE bug 982224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982225">SUSE bug 982225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982960">SUSE bug 982960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983984">SUSE bug 983984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985503">SUSE bug 985503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988675">SUSE bug 988675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990843">SUSE bug 990843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990923">SUSE bug 990923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995785">SUSE bug 995785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995792">SUSE bug 995792</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4527/">CVE-2013-4527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4527">CVE-2013-4527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4529/">CVE-2013-4529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4529">CVE-2013-4529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4530/">CVE-2013-4530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4530">CVE-2013-4530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4533">CVE-2013-4533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4534">CVE-2013-4534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4537">CVE-2013-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4538">CVE-2013-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4539">CVE-2013-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0222">CVE-2014-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3615/">CVE-2014-3615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3615">CVE-2014-3615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3640">CVE-2014-3640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3672/">CVE-2014-3672 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3672">CVE-2014-3672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3689/">CVE-2014-3689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3689">CVE-2014-3689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7815">CVE-2014-7815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9718/">CVE-2014-9718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9718">CVE-2014-9718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5278">CVE-2015-5278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6855">CVE-2015-6855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7512">CVE-2015-7512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8345">CVE-2015-8345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8504">CVE-2015-8504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8550">CVE-2015-8550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8554">CVE-2015-8554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8555">CVE-2015-8555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8558">CVE-2015-8558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8743">CVE-2015-8743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10013/">CVE-2016-10013 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10013">CVE-2016-10013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10024/">CVE-2016-10024 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10024">CVE-2016-10024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1568">CVE-2016-1568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1570/">CVE-2016-1570 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1570">CVE-2016-1570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1571">CVE-2016-1571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1714">CVE-2016-1714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1981">CVE-2016-1981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2270">CVE-2016-2270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2271">CVE-2016-2271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2391">CVE-2016-2391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2392">CVE-2016-2392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2538">CVE-2016-2538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2841">CVE-2016-2841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3158/">CVE-2016-3158 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3158">CVE-2016-3158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3159/">CVE-2016-3159 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3159">CVE-2016-3159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3710">CVE-2016-3710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3712/">CVE-2016-3712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3712">CVE-2016-3712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3960/">CVE-2016-3960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3960">CVE-2016-3960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4001/">CVE-2016-4001 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4001">CVE-2016-4001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4002">CVE-2016-4002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4439">CVE-2016-4439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4441">CVE-2016-4441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4453/">CVE-2016-4453 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4453">CVE-2016-4453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4454/">CVE-2016-4454 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4454">CVE-2016-4454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4480/">CVE-2016-4480 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4480">CVE-2016-4480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5238">CVE-2016-5238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5338">CVE-2016-5338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5403">CVE-2016-5403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6258">CVE-2016-6258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6351">CVE-2016-6351 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7092/">CVE-2016-7092 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7092">CVE-2016-7092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7094/">CVE-2016-7094 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7094">CVE-2016-7094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7777/">CVE-2016-7777 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7777">CVE-2016-7777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7908">CVE-2016-7908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7909">CVE-2016-7909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8667">CVE-2016-8667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8669">CVE-2016-8669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8909/">CVE-2016-8909 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8909">CVE-2016-8909 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8910">CVE-2016-8910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9379/">CVE-2016-9379 at SUSE</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9379">CVE-2016-9379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9380/">CVE-2016-9380 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9380">CVE-2016-9380 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9381">CVE-2016-9381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9382/">CVE-2016-9382 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9382">CVE-2016-9382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9383/">CVE-2016-9383 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9383">CVE-2016-9383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9386/">CVE-2016-9386 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9386">CVE-2016-9386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9637/">CVE-2016-9637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9637">CVE-2016-9637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9932/">CVE-2016-9932 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9932">CVE-2016-9932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581566" comment="xen-4.2.5_21-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581567" comment="xen-doc-html-4.2.5_21-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581568" comment="xen-doc-pdf-4.2.5_21-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581569" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581570" comment="xen-libs-4.2.5_21-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581571" comment="xen-tools-4.2.5_21-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581572" comment="xen-tools-domU-4.2.5_21-31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219589" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1002496" ref_url="https://bugzilla.suse.com/1002496" source="BUGZILLA"/>
		<reference ref_id="1012651" ref_url="https://bugzilla.suse.com/1012651" source="BUGZILLA"/>
		<reference ref_id="1013657" ref_url="https://bugzilla.suse.com/1013657" source="BUGZILLA"/>
		<reference ref_id="1013668" ref_url="https://bugzilla.suse.com/1013668" source="BUGZILLA"/>
		<reference ref_id="1014298" ref_url="https://bugzilla.suse.com/1014298" source="BUGZILLA"/>
		<reference ref_id="1014507" ref_url="https://bugzilla.suse.com/1014507" source="BUGZILLA"/>
		<reference ref_id="1015169" ref_url="https://bugzilla.suse.com/1015169" source="BUGZILLA"/>
		<reference ref_id="1016340" ref_url="https://bugzilla.suse.com/1016340" source="BUGZILLA"/>
		<reference ref_id="1022871" ref_url="https://bugzilla.suse.com/1022871" source="BUGZILLA"/>
		<reference ref_id="1023004" ref_url="https://bugzilla.suse.com/1023004" source="BUGZILLA"/>
		<reference ref_id="1024183" ref_url="https://bugzilla.suse.com/1024183" source="BUGZILLA"/>
		<reference ref_id="1024834" ref_url="https://bugzilla.suse.com/1024834" source="BUGZILLA"/>
		<reference ref_id="907805" ref_url="https://bugzilla.suse.com/907805" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="CVE-2016-10013" ref_url="https://www.suse.com/security/cve/CVE-2016-10013/" source="CVE"/>
		<reference ref_id="CVE-2016-10024" ref_url="https://www.suse.com/security/cve/CVE-2016-10024/" source="CVE"/>
		<reference ref_id="CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155/" source="CVE"/>
		<reference ref_id="CVE-2016-9101" ref_url="https://www.suse.com/security/cve/CVE-2016-9101/" source="CVE"/>
		<reference ref_id="CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776/" source="CVE"/>
		<reference ref_id="CVE-2016-9911" ref_url="https://www.suse.com/security/cve/CVE-2016-9911/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2016-9932" ref_url="https://www.suse.com/security/cve/CVE-2016-9932/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002705.html" source="SUSE-SU"/>
		<description>

This update for xen fixes several issues.

These security issues were fixed:

- CVE-2016-10155: The virtual hardware watchdog 'wdt_i6300esb' was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1024183)
- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024834)
- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)
- CVE-2014-8106: A heap-based buffer overflow in the Cirrus VGA emulator allowed local guest users to execute arbitrary code via vectors related to blit regions (bsc#907805)
- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in 'ehci_init_transfer'. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014507)
- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)
- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)
- CVE-2016-10013: Xen allowed local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation (bsc#1016340).
- CVE-2016-9932: CMPXCHG8B emulation on x86 systems allowed local HVM guest OS users to obtain sensitive information from host stack memory via a 'supposedly-ignored' operand size prefix (bsc#1012651).
- CVE-2016-9101: A memory leak in hw/net/eepro100.c allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device (bsc#1013668)
- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013657)
- A malicious guest could have, by frequently rebooting over extended periods of time, run the host system out of memory, resulting in a Denial of Service (DoS) (bsc#1022871)
- CVE-2016-10024: Xen allowed local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations (bsc#1014298)

This non-security issue was fixed:

- bsc#1002496: Added support for reloading clvm in block-dmmd block-dmmd
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1002496">SUSE bug 1002496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012651">SUSE bug 1012651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013657">SUSE bug 1013657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013668">SUSE bug 1013668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014298">SUSE bug 1014298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014507">SUSE bug 1014507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015169">SUSE bug 1015169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016340">SUSE bug 1016340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022871">SUSE bug 1022871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024183">SUSE bug 1024183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024834">SUSE bug 1024834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907805">SUSE bug 907805</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8106">CVE-2014-8106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10013/">CVE-2016-10013 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10013">CVE-2016-10013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10024/">CVE-2016-10024 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10024">CVE-2016-10024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10155">CVE-2016-10155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9101/">CVE-2016-9101 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9101">CVE-2016-9101 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9776">CVE-2016-9776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9911/">CVE-2016-9911 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9911">CVE-2016-9911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9921">CVE-2016-9921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9922">CVE-2016-9922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9932/">CVE-2016-9932 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9932">CVE-2016-9932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2615">CVE-2017-2615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2620">CVE-2017-2620 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581573" comment="xen-4.2.5_21-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581574" comment="xen-doc-html-4.2.5_21-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581575" comment="xen-doc-pdf-4.2.5_21-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581576" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569296" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581577" comment="xen-libs-4.2.5_21-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581578" comment="xen-libs-32bit-4.2.5_21-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581579" comment="xen-tools-4.2.5_21-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581580" comment="xen-tools-domU-4.2.5_21-35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219590" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1002496" ref_url="https://bugzilla.suse.com/1002496" source="BUGZILLA"/>
		<reference ref_id="1013657" ref_url="https://bugzilla.suse.com/1013657" source="BUGZILLA"/>
		<reference ref_id="1013668" ref_url="https://bugzilla.suse.com/1013668" source="BUGZILLA"/>
		<reference ref_id="1014507" ref_url="https://bugzilla.suse.com/1014507" source="BUGZILLA"/>
		<reference ref_id="1015169" ref_url="https://bugzilla.suse.com/1015169" source="BUGZILLA"/>
		<reference ref_id="1022871" ref_url="https://bugzilla.suse.com/1022871" source="BUGZILLA"/>
		<reference ref_id="1023004" ref_url="https://bugzilla.suse.com/1023004" source="BUGZILLA"/>
		<reference ref_id="1024183" ref_url="https://bugzilla.suse.com/1024183" source="BUGZILLA"/>
		<reference ref_id="1024834" ref_url="https://bugzilla.suse.com/1024834" source="BUGZILLA"/>
		<reference ref_id="907805" ref_url="https://bugzilla.suse.com/907805" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155/" source="CVE"/>
		<reference ref_id="CVE-2016-9101" ref_url="https://www.suse.com/security/cve/CVE-2016-9101/" source="CVE"/>
		<reference ref_id="CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776/" source="CVE"/>
		<reference ref_id="CVE-2016-9911" ref_url="https://www.suse.com/security/cve/CVE-2016-9911/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<description>

This update for xen fixes several issues.

These security issues were fixed:

- CVE-2016-10155: The virtual hardware watchdog 'wdt_i6300esb' was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1024183)
- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024834)
- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)
- CVE-2014-8106: A heap-based buffer overflow in the Cirrus VGA emulator allowed local guest users to execute arbitrary code via vectors related to blit regions (bsc#907805)
- A malicious guest could have, by frequently rebooting over extended periods of time, run the host system out of memory, resulting in a Denial of Service (DoS) (bsc#1022871)
- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in 'ehci_init_transfer'. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014507)
- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)
- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)
- CVE-2016-9101: A memory leak in hw/net/eepro100.c allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device (bsc#1013668)
- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013657)

This non-security issue was fixed:

- bsc#1002496: Added support for reloading clvm in block-dmmd block-dmmd
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-31"/>
	<updated date="2017-03-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1002496">SUSE bug 1002496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013657">SUSE bug 1013657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013668">SUSE bug 1013668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014507">SUSE bug 1014507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015169">SUSE bug 1015169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022871">SUSE bug 1022871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024183">SUSE bug 1024183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024834">SUSE bug 1024834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907805">SUSE bug 907805</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8106">CVE-2014-8106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10155">CVE-2016-10155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9101/">CVE-2016-9101 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9101">CVE-2016-9101 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9776">CVE-2016-9776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9911/">CVE-2016-9911 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9911">CVE-2016-9911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9921">CVE-2016-9921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9922">CVE-2016-9922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2615">CVE-2017-2615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2620">CVE-2017-2620 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581581" comment="xen-4.2.5_21-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581582" comment="xen-doc-html-4.2.5_21-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581583" comment="xen-doc-pdf-4.2.5_21-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581584" comment="xen-kmp-default-4.2.5_21_3.0.101_0.116.TDC-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581585" comment="xen-libs-4.2.5_21-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581586" comment="xen-tools-4.2.5_21-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581587" comment="xen-tools-domU-4.2.5_21-37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219591" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1027570" ref_url="https://bugzilla.suse.com/1027570" source="BUGZILLA"/>
		<reference ref_id="1028235" ref_url="https://bugzilla.suse.com/1028235" source="BUGZILLA"/>
		<reference ref_id="1030442" ref_url="https://bugzilla.suse.com/1030442" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6414" ref_url="https://www.suse.com/security/cve/CVE-2017-6414/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-7228" ref_url="https://www.suse.com/security/cve/CVE-2017-7228/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002814.html" source="SUSE-SU"/>
		<description>

This update for xen fixes the following security issues:

- CVE-2017-7228: Broken check in memory_exchange() permited PV guest breakout (bsc#1030442).
- CVE-2017-6414: Memory leak in the vcard_apdu_new function in card_7816.c in libcacard allowed local guest OS users to cause a denial of service (host memory consumption) via vectors related to allocating a new APDU object (bsc#1027570).
- CVE-2017-6505: The ohci_service_ed_list function in hw/usb/hcd-ohci.c allowed local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors (bsc#1028235).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-19"/>
	<updated date="2017-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027570">SUSE bug 1027570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028235">SUSE bug 1028235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030442">SUSE bug 1030442</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6414/">CVE-2017-6414 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6414">CVE-2017-6414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6505">CVE-2017-6505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7228/">CVE-2017-7228 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7228">CVE-2017-7228 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581588" comment="xen-4.2.5_21-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581589" comment="xen-doc-html-4.2.5_21-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581590" comment="xen-doc-pdf-4.2.5_21-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581591" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.99-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569300" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.99-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581592" comment="xen-libs-4.2.5_21-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581593" comment="xen-libs-32bit-4.2.5_21-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581594" comment="xen-tools-4.2.5_21-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581595" comment="xen-tools-domU-4.2.5_21-38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219592" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027570" ref_url="https://bugzilla.suse.com/1027570" source="BUGZILLA"/>
		<reference ref_id="1028235" ref_url="https://bugzilla.suse.com/1028235" source="BUGZILLA"/>
		<reference ref_id="1030442" ref_url="https://bugzilla.suse.com/1030442" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6414" ref_url="https://www.suse.com/security/cve/CVE-2017-6414/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-7228" ref_url="https://www.suse.com/security/cve/CVE-2017-7228/" source="CVE"/>
		<description>

This update for xen fixes the following security issues:

- CVE-2017-7228: Broken check in memory_exchange() permited PV guest breakout (bsc#1030442).
- CVE-2017-6414: Memory leak in the vcard_apdu_new function in card_7816.c in libcacard allowed local guest OS users to cause a denial of service (host memory consumption) via vectors related to allocating a new APDU object (bsc#1027570).
- CVE-2017-6505: The ohci_service_ed_list function in hw/usb/hcd-ohci.c allowed local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors (bsc#1028235).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-28"/>
	<updated date="2017-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027570">SUSE bug 1027570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028235">SUSE bug 1028235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030442">SUSE bug 1030442</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6414/">CVE-2017-6414 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6414">CVE-2017-6414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6505">CVE-2017-6505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7228/">CVE-2017-7228 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7228">CVE-2017-7228 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581596" comment="xen-4.2.5_21-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581597" comment="xen-doc-html-4.2.5_21-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581598" comment="xen-doc-pdf-4.2.5_21-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581599" comment="xen-kmp-default-4.2.5_21_3.0.101_0.119.TDC-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581600" comment="xen-libs-4.2.5_21-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581601" comment="xen-tools-4.2.5_21-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581602" comment="xen-tools-domU-4.2.5_21-40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219593" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1028655" ref_url="https://bugzilla.suse.com/1028655" source="BUGZILLA"/>
		<reference ref_id="1033948" ref_url="https://bugzilla.suse.com/1033948" source="BUGZILLA"/>
		<reference ref_id="1034843" ref_url="https://bugzilla.suse.com/1034843" source="BUGZILLA"/>
		<reference ref_id="1034844" ref_url="https://bugzilla.suse.com/1034844" source="BUGZILLA"/>
		<reference ref_id="1034845" ref_url="https://bugzilla.suse.com/1034845" source="BUGZILLA"/>
		<reference ref_id="1034994" ref_url="https://bugzilla.suse.com/1034994" source="BUGZILLA"/>
		<reference ref_id="1035483" ref_url="https://bugzilla.suse.com/1035483" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9603" ref_url="https://www.suse.com/security/cve/CVE-2016-9603/" source="CVE"/>
		<reference ref_id="CVE-2017-7718" ref_url="https://www.suse.com/security/cve/CVE-2017-7718/" source="CVE"/>
		<reference ref_id="CVE-2017-7980" ref_url="https://www.suse.com/security/cve/CVE-2017-7980/" source="CVE"/>
		<reference ref_id="CVE-2017-7995" ref_url="https://www.suse.com/security/cve/CVE-2017-7995/" source="CVE"/>
		<description>

This update for xen fixes the following security issues:

- CVE-2017-7980: An out-of-bounds r/w access issues in the Cirrus CLGD 54xx VGA Emulator support allowed privileged user inside guest to use this flaw to crash the Qemu process resulting in DoS or potentially execute arbitrary code on a host with privileges of Qemu process on the host (bsc#1035483).
- A malicious 64-bit PV guest may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks by placing a IRET hypercall in the middle of a multicall batch (XSA-213, bsc#1034843)
- A malicious pair of guests may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks because of a missing check when transfering pages via GNTTABOP_transfer (XSA-214, bsc#1034844).
- Incorrect checks when handling exceptions allowed a malicious or buggy 64-bit PV guest to modify part of a physical memory page not belonging to it, potentially allowing for all of privilege escalation, host or other guest crashes, and information leaks (XSA-215, bsc#1034845)
- CVE-2017-7718: hw/display/cirrus_vga_rop.h allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions (bsc#1034994).
- CVE-2017-7995: Incorrect address range validation potentially allowing PV guests to access MMIO memory with read side effects (bsc#1033948).
- CVE-2016-9603: A privileged user within the guest VM could have caused a heap overflow in the device model process, potentially escalating their privileges to that of the device model process (bsc#1028655)
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-02"/>
	<updated date="2017-05-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1028655">SUSE bug 1028655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033948">SUSE bug 1033948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034843">SUSE bug 1034843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034844">SUSE bug 1034844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034845">SUSE bug 1034845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034994">SUSE bug 1034994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035483">SUSE bug 1035483</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9603/">CVE-2016-9603 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9603">CVE-2016-9603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7718/">CVE-2017-7718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7718">CVE-2017-7718 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7980/">CVE-2017-7980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7980">CVE-2017-7980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7995/">CVE-2017-7995 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7995">CVE-2017-7995 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581603" comment="xen-4.2.5_21-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581604" comment="xen-doc-html-4.2.5_21-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581605" comment="xen-doc-pdf-4.2.5_21-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581606" comment="xen-kmp-default-4.2.5_21_3.0.101_0.119.TDC-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581607" comment="xen-libs-4.2.5_21-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581608" comment="xen-tools-4.2.5_21-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581609" comment="xen-tools-domU-4.2.5_21-43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219594" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1028655" ref_url="https://bugzilla.suse.com/1028655" source="BUGZILLA"/>
		<reference ref_id="1033948" ref_url="https://bugzilla.suse.com/1033948" source="BUGZILLA"/>
		<reference ref_id="1034843" ref_url="https://bugzilla.suse.com/1034843" source="BUGZILLA"/>
		<reference ref_id="1034844" ref_url="https://bugzilla.suse.com/1034844" source="BUGZILLA"/>
		<reference ref_id="1034845" ref_url="https://bugzilla.suse.com/1034845" source="BUGZILLA"/>
		<reference ref_id="1034994" ref_url="https://bugzilla.suse.com/1034994" source="BUGZILLA"/>
		<reference ref_id="1035483" ref_url="https://bugzilla.suse.com/1035483" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9603" ref_url="https://www.suse.com/security/cve/CVE-2016-9603/" source="CVE"/>
		<reference ref_id="CVE-2017-7718" ref_url="https://www.suse.com/security/cve/CVE-2017-7718/" source="CVE"/>
		<reference ref_id="CVE-2017-7980" ref_url="https://www.suse.com/security/cve/CVE-2017-7980/" source="CVE"/>
		<reference ref_id="CVE-2017-7995" ref_url="https://www.suse.com/security/cve/CVE-2017-7995/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002837.html" source="SUSE-SU"/>
		<description>

This update for xen fixes several security issues:

- A malicious 64-bit PV guest may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks by placing a IRET hypercall in the middle of a multicall batch (XSA-213, bsc#1034843)
- A malicious pair of guests may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks because of a missing check when transfering pages via GNTTABOP_transfer (XSA-214, bsc#1034844).
- CVE-2017-7718: hw/display/cirrus_vga_rop.h allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions (bsc#1034994).
- CVE-2016-9603: A privileged user within the guest VM could have caused a heap overflow in the device model process, potentially escalating their privileges to that of the device model process (bsc#1028655)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-02"/>
	<updated date="2017-05-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1028655">SUSE bug 1028655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033948">SUSE bug 1033948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034843">SUSE bug 1034843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034844">SUSE bug 1034844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034845">SUSE bug 1034845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034994">SUSE bug 1034994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035483">SUSE bug 1035483</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9603/">CVE-2016-9603 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9603">CVE-2016-9603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7718/">CVE-2017-7718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7718">CVE-2017-7718 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7980/">CVE-2017-7980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7980">CVE-2017-7980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7995/">CVE-2017-7995 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7995">CVE-2017-7995 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581610" comment="xen-4.2.5_21-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581611" comment="xen-doc-html-4.2.5_21-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581612" comment="xen-doc-pdf-4.2.5_21-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581613" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.99-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569304" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.99-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581614" comment="xen-libs-4.2.5_21-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581615" comment="xen-libs-32bit-4.2.5_21-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581616" comment="xen-tools-4.2.5_21-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581617" comment="xen-tools-domU-4.2.5_21-41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219595" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1034845" ref_url="https://bugzilla.suse.com/1034845" source="BUGZILLA"/>
		<reference ref_id="1037243" ref_url="https://bugzilla.suse.com/1037243" source="BUGZILLA"/>
		<reference ref_id="1042160" ref_url="https://bugzilla.suse.com/1042160" source="BUGZILLA"/>
		<reference ref_id="1042863" ref_url="https://bugzilla.suse.com/1042863" source="BUGZILLA"/>
		<reference ref_id="1042882" ref_url="https://bugzilla.suse.com/1042882" source="BUGZILLA"/>
		<reference ref_id="1042893" ref_url="https://bugzilla.suse.com/1042893" source="BUGZILLA"/>
		<reference ref_id="1042915" ref_url="https://bugzilla.suse.com/1042915" source="BUGZILLA"/>
		<reference ref_id="1042931" ref_url="https://bugzilla.suse.com/1042931" source="BUGZILLA"/>
		<reference ref_id="1042938" ref_url="https://bugzilla.suse.com/1042938" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-8905" ref_url="https://www.suse.com/security/cve/CVE-2017-8905/" source="CVE"/>
		<reference ref_id="CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002992.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following security issues:

- blkif responses leaked backend stack data, which allowed unprivileged guest to obtain sensitive information from the host or other guests (XSA-216, bsc#1042863)
- Page transfer might have allowed PV guest to elevate privilege (XSA-217, bsc#1042882)
- Races in the grant table unmap code allowed for informations leaks and potentially privilege escalation (XSA-218, bsc#1042893)
- Insufficient reference counts during shadow emulation allowed a malicious pair of guest to elevate their privileges to the privileges that XEN runs under (XSA-219, bsc#1042915)
- Stale P2M mappings due to insufficient error checking allowed malicious guest to leak information or elevate privileges (XSA-222, bsc#1042931)
- Grant table operations mishandled reference counts allowing malicious guests to escape (XSA-224, bsc#1042938)
- CVE-2017-9330: USB OHCI Emulation in qemu allowed local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value (bsc#1042160)
- CVE-2017-8309: Memory leak in the audio/audio.c allowed remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture (bsc#1037243)
- CVE-2017-8905: Xen a failsafe callback, which might have allowed PV guest OS users to execute arbitrary code on the host OS (XSA-215, bsc#1034845).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-29"/>
	<updated date="2017-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1034845">SUSE bug 1034845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037243">SUSE bug 1037243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042160">SUSE bug 1042160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042863">SUSE bug 1042863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042882">SUSE bug 1042882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042893">SUSE bug 1042893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042915">SUSE bug 1042915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042931">SUSE bug 1042931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042938">SUSE bug 1042938</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8309">CVE-2017-8309 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8905/">CVE-2017-8905 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8905">CVE-2017-8905 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9330">CVE-2017-9330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581618" comment="xen-4.2.5_21-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581619" comment="xen-doc-html-4.2.5_21-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581620" comment="xen-doc-pdf-4.2.5_21-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581621" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.102-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569308" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.102-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581622" comment="xen-libs-4.2.5_21-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581623" comment="xen-libs-32bit-4.2.5_21-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581624" comment="xen-tools-4.2.5_21-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581625" comment="xen-tools-domU-4.2.5_21-44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219596" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1037243" ref_url="https://bugzilla.suse.com/1037243" source="BUGZILLA"/>
		<reference ref_id="1042160" ref_url="https://bugzilla.suse.com/1042160" source="BUGZILLA"/>
		<reference ref_id="1042863" ref_url="https://bugzilla.suse.com/1042863" source="BUGZILLA"/>
		<reference ref_id="1042882" ref_url="https://bugzilla.suse.com/1042882" source="BUGZILLA"/>
		<reference ref_id="1042893" ref_url="https://bugzilla.suse.com/1042893" source="BUGZILLA"/>
		<reference ref_id="1042915" ref_url="https://bugzilla.suse.com/1042915" source="BUGZILLA"/>
		<reference ref_id="1042931" ref_url="https://bugzilla.suse.com/1042931" source="BUGZILLA"/>
		<reference ref_id="1042938" ref_url="https://bugzilla.suse.com/1042938" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330/" source="CVE"/>
		<description>
This update for xen fixes the following security issues:

- blkif responses leaked backend stack data, which allowed unprivileged guest to obtain sensitive information from the host or other guests (XSA-216, bsc#1042863)
- Page transfer might have allowed PV guest to elevate privilege (XSA-217, bsc#1042882)
- Races in the grant table unmap code allowed for informations leaks and potentially privilege escalation (XSA-218, bsc#1042893)
- Insufficient reference counts during shadow emulation allowed a malicious pair of guest to elevate their privileges to the privileges that XEN runs under (XSA-219, bsc#1042915)
- Stale P2M mappings due to insufficient error checking allowed malicious guest to leak information or elevate privileges (XSA-222, bsc#1042931)
- Grant table operations mishandled reference counts allowing malicious guests to escape (XSA-224, bsc#1042938)
- CVE-2017-9330: USB OHCI Emulation in qemu allowed local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value (bsc#1042160)
- CVE-2017-8309: Memory leak in the audio/audio.c allowed remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture (bsc#1037243)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-05"/>
	<updated date="2017-07-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037243">SUSE bug 1037243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042160">SUSE bug 1042160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042863">SUSE bug 1042863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042882">SUSE bug 1042882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042893">SUSE bug 1042893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042915">SUSE bug 1042915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042931">SUSE bug 1042931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042938">SUSE bug 1042938</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8309">CVE-2017-8309 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9330">CVE-2017-9330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581626" comment="xen-4.2.5_21-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581627" comment="xen-doc-html-4.2.5_21-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581628" comment="xen-doc-pdf-4.2.5_21-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581629" comment="xen-kmp-default-4.2.5_21_3.0.101_0.122.TDC-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581630" comment="xen-libs-4.2.5_21-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581631" comment="xen-tools-4.2.5_21-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581632" comment="xen-tools-domU-4.2.5_21-46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219597" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1034845" ref_url="https://bugzilla.suse.com/1034845" source="BUGZILLA"/>
		<reference ref_id="1046637" ref_url="https://bugzilla.suse.com/1046637" source="BUGZILLA"/>
		<reference ref_id="1048920" ref_url="https://bugzilla.suse.com/1048920" source="BUGZILLA"/>
		<reference ref_id="1049578" ref_url="https://bugzilla.suse.com/1049578" source="BUGZILLA"/>
		<reference ref_id="1051787" ref_url="https://bugzilla.suse.com/1051787" source="BUGZILLA"/>
		<reference ref_id="1051788" ref_url="https://bugzilla.suse.com/1051788" source="BUGZILLA"/>
		<reference ref_id="1052686" ref_url="https://bugzilla.suse.com/1052686" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-12135" ref_url="https://www.suse.com/security/cve/CVE-2017-12135/" source="CVE"/>
		<reference ref_id="CVE-2017-12137" ref_url="https://www.suse.com/security/cve/CVE-2017-12137/" source="CVE"/>
		<reference ref_id="CVE-2017-12855" ref_url="https://www.suse.com/security/cve/CVE-2017-12855/" source="CVE"/>
		<reference ref_id="CVE-2017-8905" ref_url="https://www.suse.com/security/cve/CVE-2017-8905/" source="CVE"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-12135: Unbounded recursion in grant table code allowed a malicious
  guest to crash the host or potentially escalate privileges/leak information
  (XSA-226, bsc#1051787).
- CVE-2017-12137: Incorrectly-aligned updates to pagetables allowed for
  privilege escalation (XSA-227, bsc#1051788).
- CVE-2017-11334: The address_space_write_continue function in exec.c allowed
  local guest OS privileged users to cause a denial of service (out-of-bounds
  access and guest instance crash) by leveraging use of qemu_map_ram_ptr to
  access guest ram block area (bsc#1048920).
- CVE-2017-11434: The dhcp_decode function in slirp/bootp.c allowed local guest
  OS users to cause a denial of service (out-of-bounds read) via a crafted DHCP
  options string (bsc#1049578).
- CVE-2017-10664: qemu-nbd did not ignore SIGPIPE, which allowed remote
  attackers to cause a denial of service (daemon crash) by disconnecting during
  a server-to-client reply attempt (bsc#1046637).
- CVE-2017-8905: Fixed a memory corruption via a failsafe callback, which might
  have allowed PV guest OS users to execute arbitrary code on the host OS
  (XSA-215, bsc#1034845).
- CVE-2017-12855: Premature clearing of GTF_writing / GTF_reading lead to
  potentially leaking sensitive information (XSA-230, bsc#1052686).
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-29"/>
	<updated date="2017-08-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1034845">SUSE bug 1034845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046637">SUSE bug 1046637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048920">SUSE bug 1048920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049578">SUSE bug 1049578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051787">SUSE bug 1051787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051788">SUSE bug 1051788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052686">SUSE bug 1052686</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10664">CVE-2017-10664 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11334">CVE-2017-11334 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11434">CVE-2017-11434 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12135/">CVE-2017-12135 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12135">CVE-2017-12135 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12137/">CVE-2017-12137 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12137">CVE-2017-12137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12855/">CVE-2017-12855 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12855">CVE-2017-12855 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8905/">CVE-2017-8905 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8905">CVE-2017-8905 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581633" comment="xen-4.2.5_21-47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581634" comment="xen-doc-html-4.2.5_21-47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581635" comment="xen-doc-pdf-4.2.5_21-47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581636" comment="xen-kmp-default-4.2.5_21_3.0.101_0.125.TDC-47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581637" comment="xen-libs-4.2.5_21-47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581638" comment="xen-tools-4.2.5_21-47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581639" comment="xen-tools-domU-4.2.5_21-47.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219598" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1046637" ref_url="https://bugzilla.suse.com/1046637" source="BUGZILLA"/>
		<reference ref_id="1048920" ref_url="https://bugzilla.suse.com/1048920" source="BUGZILLA"/>
		<reference ref_id="1049578" ref_url="https://bugzilla.suse.com/1049578" source="BUGZILLA"/>
		<reference ref_id="1051787" ref_url="https://bugzilla.suse.com/1051787" source="BUGZILLA"/>
		<reference ref_id="1051788" ref_url="https://bugzilla.suse.com/1051788" source="BUGZILLA"/>
		<reference ref_id="1052686" ref_url="https://bugzilla.suse.com/1052686" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-12135" ref_url="https://www.suse.com/security/cve/CVE-2017-12135/" source="CVE"/>
		<reference ref_id="CVE-2017-12137" ref_url="https://www.suse.com/security/cve/CVE-2017-12137/" source="CVE"/>
		<reference ref_id="CVE-2017-12855" ref_url="https://www.suse.com/security/cve/CVE-2017-12855/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003181.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2017-12855: Premature clearing of GTF_writing / GTF_reading lead to
  potentially leaking sensitive information (XSA-230, bsc#1052686).
- CVE-2017-12135: Unbounded recursion in grant table code allowed a malicious
  guest to crash the host or potentially escalate privileges/leak information
  (XSA-226, bsc#1051787).
- CVE-2017-12137: Incorrectly-aligned updates to pagetables allowed for
  privilege escalation (XSA-227, bsc#1051788).
- CVE-2017-11334: The address_space_write_continue function in exec.c allowed
  local guest OS privileged users to cause a denial of service (out-of-bounds
  access and guest instance crash) by leveraging use of qemu_map_ram_ptr to
  access guest ram block area (bsc#1048920).
- CVE-2017-11434: The dhcp_decode function in slirp/bootp.c allowed local guest
  OS users to cause a denial of service (out-of-bounds read) via a crafted DHCP
  options string (bsc#1049578).
- CVE-2017-10664: qemu-nbd did not ignore SIGPIPE, which allowed remote
  attackers to cause a denial of service (daemon crash) by disconnecting during
  a server-to-client reply attempt (bsc#1046637).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-04"/>
	<updated date="2017-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046637">SUSE bug 1046637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048920">SUSE bug 1048920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049578">SUSE bug 1049578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051787">SUSE bug 1051787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051788">SUSE bug 1051788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052686">SUSE bug 1052686</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10664">CVE-2017-10664 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11334">CVE-2017-11334 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11434">CVE-2017-11434 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12135/">CVE-2017-12135 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12135">CVE-2017-12135 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12137/">CVE-2017-12137 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12137">CVE-2017-12137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12855/">CVE-2017-12855 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12855">CVE-2017-12855 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581640" comment="xen-4.2.5_21-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581641" comment="xen-doc-html-4.2.5_21-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581642" comment="xen-doc-pdf-4.2.5_21-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581643" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.105-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569312" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.105-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581644" comment="xen-libs-4.2.5_21-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581645" comment="xen-libs-32bit-4.2.5_21-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581646" comment="xen-tools-4.2.5_21-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581647" comment="xen-tools-domU-4.2.5_21-45.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219599" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1056278" ref_url="https://bugzilla.suse.com/1056278" source="BUGZILLA"/>
		<reference ref_id="1056281" ref_url="https://bugzilla.suse.com/1056281" source="BUGZILLA"/>
		<reference ref_id="1056282" ref_url="https://bugzilla.suse.com/1056282" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14316" ref_url="https://www.suse.com/security/cve/CVE-2017-14316/" source="CVE"/>
		<reference ref_id="CVE-2017-14317" ref_url="https://www.suse.com/security/cve/CVE-2017-14317/" source="CVE"/>
		<reference ref_id="CVE-2017-14319" ref_url="https://www.suse.com/security/cve/CVE-2017-14319/" source="CVE"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-14316: Missing bound check in function `alloc_heap_pages` for an
  internal array allowed attackers using crafted hypercalls to execute
  arbitrary code within Xen (XSA-231, bsc#1056278)
- CVE-2017-14317: A race in cxenstored may have cause a double-free allowind for
  DoS of the xenstored daemon (XSA-233, bsc#1056281).
- CVE-2017-14319: An error while handling grant mappings allowed malicious or
  buggy x86 PV guest to escalate its privileges or crash the hypervisor (XSA-234,
  bsc#1056282).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-12"/>
	<updated date="2017-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056278">SUSE bug 1056278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056281">SUSE bug 1056281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056282">SUSE bug 1056282</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14316/">CVE-2017-14316 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14316">CVE-2017-14316 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14317/">CVE-2017-14317 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14317">CVE-2017-14317 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14319/">CVE-2017-14319 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14319">CVE-2017-14319 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581648" comment="xen-4.2.5_21-47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581649" comment="xen-doc-html-4.2.5_21-47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581650" comment="xen-doc-pdf-4.2.5_21-47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581651" comment="xen-kmp-default-4.2.5_21_3.0.101_0.126.5.TDC-47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581652" comment="xen-libs-4.2.5_21-47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581653" comment="xen-tools-4.2.5_21-47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581654" comment="xen-tools-domU-4.2.5_21-47.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219600" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1056278" ref_url="https://bugzilla.suse.com/1056278" source="BUGZILLA"/>
		<reference ref_id="1056281" ref_url="https://bugzilla.suse.com/1056281" source="BUGZILLA"/>
		<reference ref_id="1056282" ref_url="https://bugzilla.suse.com/1056282" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14316" ref_url="https://www.suse.com/security/cve/CVE-2017-14316/" source="CVE"/>
		<reference ref_id="CVE-2017-14317" ref_url="https://www.suse.com/security/cve/CVE-2017-14317/" source="CVE"/>
		<reference ref_id="CVE-2017-14319" ref_url="https://www.suse.com/security/cve/CVE-2017-14319/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003266.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-14316: Missing bound check in function `alloc_heap_pages` for an
  internal array allowed attackers using crafted hypercalls to execute
  arbitrary code within Xen (XSA-231, bsc#1056278)
- CVE-2017-14317: A race in cxenstored may have cause a double-free allowind for
  DoS of the xenstored daemon (XSA-233, bsc#1056281).
- CVE-2017-14319: An error while handling grant mappings allowed malicious or
  buggy x86 PV guest to escalate its privileges or crash the hypervisor (XSA-234,
  bsc#1056282).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-18"/>
	<updated date="2017-09-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056278">SUSE bug 1056278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056281">SUSE bug 1056281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056282">SUSE bug 1056282</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14316/">CVE-2017-14316 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14316">CVE-2017-14316 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14317/">CVE-2017-14317 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14317">CVE-2017-14317 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14319/">CVE-2017-14319 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14319">CVE-2017-14319 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581655" comment="xen-4.2.5_21-45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581656" comment="xen-doc-html-4.2.5_21-45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581657" comment="xen-doc-pdf-4.2.5_21-45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581658" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.105-45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569316" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.105-45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581659" comment="xen-libs-4.2.5_21-45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581660" comment="xen-libs-32bit-4.2.5_21-45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581661" comment="xen-tools-4.2.5_21-45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581662" comment="xen-tools-domU-4.2.5_21-45.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219601" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1059777" ref_url="https://bugzilla.suse.com/1059777" source="BUGZILLA"/>
		<reference ref_id="1061076" ref_url="https://bugzilla.suse.com/1061076" source="BUGZILLA"/>
		<reference ref_id="1061080" ref_url="https://bugzilla.suse.com/1061080" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1061082" ref_url="https://bugzilla.suse.com/1061082" source="BUGZILLA"/>
		<reference ref_id="1061084" ref_url="https://bugzilla.suse.com/1061084" source="BUGZILLA"/>
		<reference ref_id="1061086" ref_url="https://bugzilla.suse.com/1061086" source="BUGZILLA"/>
		<reference ref_id="1061087" ref_url="https://bugzilla.suse.com/1061087" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15588" ref_url="https://www.suse.com/security/cve/CVE-2017-15588/" source="CVE"/>
		<reference ref_id="CVE-2017-15589" ref_url="https://www.suse.com/security/cve/CVE-2017-15589/" source="CVE"/>
		<reference ref_id="CVE-2017-15590" ref_url="https://www.suse.com/security/cve/CVE-2017-15590/" source="CVE"/>
		<reference ref_id="CVE-2017-15592" ref_url="https://www.suse.com/security/cve/CVE-2017-15592/" source="CVE"/>
		<reference ref_id="CVE-2017-15593" ref_url="https://www.suse.com/security/cve/CVE-2017-15593/" source="CVE"/>
		<reference ref_id="CVE-2017-15594" ref_url="https://www.suse.com/security/cve/CVE-2017-15594/" source="CVE"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003346.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues:

These security issues were fixed:

- CVE-2017-5526: The ES1370 audio device emulation support was vulnerable to a
  memory leakage issue allowing a privileged user inside the guest to cause a DoS
  and/or potentially crash the Qemu process on the host (bsc#1059777)
- CVE-2017-15593: Missing cleanup in the page type system allowed a malicious or
  buggy PV guest to cause DoS (XSA-242 bsc#1061084)
- CVE-2017-15592: A problem in the shadow pagetable code allowed a malicious or
  buggy HVM guest to cause DoS or cause hypervisor memory corruption potentially
  allowing the guest to escalate its privilege (XSA-243 bsc#1061086)
- CVE-2017-15594: Problematic handling of the selector fields in the Interrupt
  Descriptor Table (IDT) allowed a malicious or buggy x86 PV guest to escalate
  its privileges or cause DoS (XSA-244 bsc#1061087)
- CVE-2017-15589: Intercepted I/O write operations with less than a full machine
  word's worth of data were not properly handled, which allowed a malicious
  unprivileged x86 HVM guest to obtain sensitive information from the host or
  other guests (XSA-239 bsc#1061080)
- CVE-2017-15595: In certain configurations of linear page tables a stack overflow
  might have occured that allowed a malicious or buggy PV guest to cause DoS and
  potentially privilege escalation and information leaks (XSA-240 bsc#1061081)
- CVE-2017-15588: Under certain conditions x86 PV guests could have caused the
  hypervisor to miss a necessary TLB flush for a page. This allowed a malicious
  x86 PV guest to access all of system memory, allowing for privilege escalation,
  DoS, and information leaks (XSA-241 bsc#1061082)
- CVE-2017-15590: Multiple issues existed with the setup of PCI MSI interrupts
  that allowed a malicious or buggy guest to cause DoS and potentially privilege
  escalation and information leaks (XSA-237 bsc#1061076)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-20"/>
	<updated date="2017-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059777">SUSE bug 1059777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061076">SUSE bug 1061076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061080">SUSE bug 1061080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061082">SUSE bug 1061082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061084">SUSE bug 1061084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061086">SUSE bug 1061086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061087">SUSE bug 1061087</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15588/">CVE-2017-15588 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15588">CVE-2017-15588 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15589/">CVE-2017-15589 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15589">CVE-2017-15589 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15590/">CVE-2017-15590 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15590">CVE-2017-15590 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15592/">CVE-2017-15592 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15592">CVE-2017-15592 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15593/">CVE-2017-15593 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15593">CVE-2017-15593 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15594/">CVE-2017-15594 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15594">CVE-2017-15594 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15595">CVE-2017-15595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5526">CVE-2017-5526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581663" comment="xen-4.2.5_21-45.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581664" comment="xen-doc-html-4.2.5_21-45.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581665" comment="xen-doc-pdf-4.2.5_21-45.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581666" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.5-45.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569320" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.5-45.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581667" comment="xen-libs-4.2.5_21-45.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581668" comment="xen-libs-32bit-4.2.5_21-45.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581669" comment="xen-tools-4.2.5_21-45.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581670" comment="xen-tools-domU-4.2.5_21-45.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219602" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1059777" ref_url="https://bugzilla.suse.com/1059777" source="BUGZILLA"/>
		<reference ref_id="1061076" ref_url="https://bugzilla.suse.com/1061076" source="BUGZILLA"/>
		<reference ref_id="1061080" ref_url="https://bugzilla.suse.com/1061080" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1061082" ref_url="https://bugzilla.suse.com/1061082" source="BUGZILLA"/>
		<reference ref_id="1061084" ref_url="https://bugzilla.suse.com/1061084" source="BUGZILLA"/>
		<reference ref_id="1061086" ref_url="https://bugzilla.suse.com/1061086" source="BUGZILLA"/>
		<reference ref_id="1061087" ref_url="https://bugzilla.suse.com/1061087" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15588" ref_url="https://www.suse.com/security/cve/CVE-2017-15588/" source="CVE"/>
		<reference ref_id="CVE-2017-15589" ref_url="https://www.suse.com/security/cve/CVE-2017-15589/" source="CVE"/>
		<reference ref_id="CVE-2017-15590" ref_url="https://www.suse.com/security/cve/CVE-2017-15590/" source="CVE"/>
		<reference ref_id="CVE-2017-15592" ref_url="https://www.suse.com/security/cve/CVE-2017-15592/" source="CVE"/>
		<reference ref_id="CVE-2017-15593" ref_url="https://www.suse.com/security/cve/CVE-2017-15593/" source="CVE"/>
		<reference ref_id="CVE-2017-15594" ref_url="https://www.suse.com/security/cve/CVE-2017-15594/" source="CVE"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526/" source="CVE"/>
		<description>
This update for xen fixes several issues:

These security issues were fixed:

- CVE-2017-5526: The ES1370 audio device emulation support was vulnerable to a
  memory leakage issue allowing a privileged user inside the guest to cause a DoS
  and/or potentially crash the Qemu process on the host (bsc#1059777)
- CVE-2017-15593: Missing cleanup in the page type system allowed a malicious or
  buggy PV guest to cause DoS (XSA-242 bsc#1061084)
- CVE-2017-15592: A problem in the shadow pagetable code allowed a malicious or
  buggy HVM guest to cause DoS or cause hypervisor memory corruption potentially
  allowing the guest to escalate its privilege (XSA-243 bsc#1061086)
- CVE-2017-15594: Problematic handling of the selector fields in the Interrupt
  Descriptor Table (IDT) allowed a malicious or buggy x86 PV guest to escalate
  its privileges or cause DoS (XSA-244 bsc#1061087)
- CVE-2017-15589: Intercepted I/O write operations with less than a full machine
  word's worth of data were not properly handled, which allowed a malicious
  unprivileged x86 HVM guest to obtain sensitive information from the host or
  other guests (XSA-239 bsc#1061080)
- CVE-2017-15595: In certain configurations of linear page tables a stack overflow
  might have occured that allowed a malicious or buggy PV guest to cause DoS and
  potentially privilege escalation and information leaks (XSA-240 bsc#1061081)
- CVE-2017-15588: Under certain conditions x86 PV guests could have caused the
  hypervisor to miss a necessary TLB flush for a page. This allowed a malicious
  x86 PV guest to access all of system memory, allowing for privilege escalation,
  DoS, and information leaks (XSA-241 bsc#1061082)
- CVE-2017-15590: Multiple issues existed with the setup of PCI MSI interrupts
  that allowed a malicious or buggy guest to cause DoS and potentially privilege
  escalation and information leaks (XSA-237 bsc#1061076)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-06"/>
	<updated date="2017-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059777">SUSE bug 1059777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061076">SUSE bug 1061076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061080">SUSE bug 1061080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061082">SUSE bug 1061082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061084">SUSE bug 1061084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061086">SUSE bug 1061086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061087">SUSE bug 1061087</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15588/">CVE-2017-15588 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15588">CVE-2017-15588 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15589/">CVE-2017-15589 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15589">CVE-2017-15589 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15590/">CVE-2017-15590 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15590">CVE-2017-15590 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15592/">CVE-2017-15592 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15592">CVE-2017-15592 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15593/">CVE-2017-15593 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15593">CVE-2017-15593 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15594/">CVE-2017-15594 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15594">CVE-2017-15594 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15595">CVE-2017-15595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5526">CVE-2017-5526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581671" comment="xen-4.2.5_21-47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581672" comment="xen-doc-html-4.2.5_21-47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581673" comment="xen-doc-pdf-4.2.5_21-47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581674" comment="xen-kmp-default-4.2.5_21_3.0.101_0.132.TDC-47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581675" comment="xen-libs-4.2.5_21-47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581676" comment="xen-tools-4.2.5_21-47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581677" comment="xen-tools-domU-4.2.5_21-47.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219603" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1061075" ref_url="https://bugzilla.suse.com/1061075" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1061086" ref_url="https://bugzilla.suse.com/1061086" source="BUGZILLA"/>
		<reference ref_id="1063123" ref_url="https://bugzilla.suse.com/1063123" source="BUGZILLA"/>
		<reference ref_id="1068187" ref_url="https://bugzilla.suse.com/1068187" source="BUGZILLA"/>
		<reference ref_id="1068191" ref_url="https://bugzilla.suse.com/1068191" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-15592" ref_url="https://www.suse.com/security/cve/CVE-2017-15592/" source="CVE"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-15597" ref_url="https://www.suse.com/security/cve/CVE-2017-15597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003470.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- bsc#1068187: Failure to recognize errors in the Populate on Demand (PoD) code
  allowed for DoS (XSA-246)
- bsc#1068191: Missing p2m error checking in PoD code allowed unprivileged guests
  to retain a writable mapping of freed memory leading to information leaks,
  privilege escalation or DoS (XSA-247).
- CVE-2017-15289: The mode4and5 write functions allowed local OS guest privileged
  users to cause a denial of service (out-of-bounds write access and Qemu process
  crash) via vectors related to dst calculation (bsc#1063123)
- CVE-2017-15597: A grant copy operation being done on a grant of a dying domain
  allowed a malicious guest administrator to corrupt hypervisor memory, allowing
  for DoS or potentially privilege escalation and information leaks (bsc#1061075).
- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS (unbounded
  recursion, stack consumption, and hypervisor crash) or possibly gain privileges
  via crafted page-table stacking (bsc#1061081).
- CVE-2017-15592: x86 HVM guest OS users were able to cause a DoS (hypervisor
  crash) or possibly gain privileges because self-linear shadow mappings were
  mishandled for translated guests (bsc#1061086).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-05"/>
	<updated date="2017-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1061075">SUSE bug 1061075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061086">SUSE bug 1061086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063123">SUSE bug 1063123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068187">SUSE bug 1068187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068191">SUSE bug 1068191</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15289">CVE-2017-15289 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15592/">CVE-2017-15592 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15592">CVE-2017-15592 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15595">CVE-2017-15595 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15597/">CVE-2017-15597 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15597">CVE-2017-15597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581678" comment="xen-4.2.5_21-45.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581679" comment="xen-doc-html-4.2.5_21-45.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581680" comment="xen-doc-pdf-4.2.5_21-45.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581681" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.8-45.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569324" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.8-45.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581682" comment="xen-libs-4.2.5_21-45.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581683" comment="xen-libs-32bit-4.2.5_21-45.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581684" comment="xen-tools-4.2.5_21-45.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581685" comment="xen-tools-domU-4.2.5_21-45.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219604" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1061075" ref_url="https://bugzilla.suse.com/1061075" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1061086" ref_url="https://bugzilla.suse.com/1061086" source="BUGZILLA"/>
		<reference ref_id="1063123" ref_url="https://bugzilla.suse.com/1063123" source="BUGZILLA"/>
		<reference ref_id="1068187" ref_url="https://bugzilla.suse.com/1068187" source="BUGZILLA"/>
		<reference ref_id="1068191" ref_url="https://bugzilla.suse.com/1068191" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-15592" ref_url="https://www.suse.com/security/cve/CVE-2017-15592/" source="CVE"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-15597" ref_url="https://www.suse.com/security/cve/CVE-2017-15597/" source="CVE"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- bsc#1068187: Failure to recognize errors in the Populate on Demand (PoD) code
  allowed for DoS (XSA-246)
- bsc#1068191: Missing p2m error checking in PoD code allowed unprivileged guests
  to retain a writable mapping of freed memory leading to information leaks,
  privilege escalation or DoS (XSA-247).
- CVE-2017-15289: The mode4and5 write functions allowed local OS guest privileged
  users to cause a denial of service (out-of-bounds write access and Qemu process
  crash) via vectors related to dst calculation (bsc#1063123)
- CVE-2017-15597: A grant copy operation being done on a grant of a dying domain
  allowed a malicious guest administrator to corrupt hypervisor memory, allowing
  for DoS or potentially privilege escalation and information leaks (bsc#1061075).
- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS (unbounded
  recursion, stack consumption, and hypervisor crash) or possibly gain privileges
  via crafted page-table stacking (bsc#1061081).
- CVE-2017-15592: x86 HVM guest OS users were able to cause a DoS (hypervisor
  crash) or possibly gain privileges because self-linear shadow mappings were
  mishandled for translated guests (bsc#1061086).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-07"/>
	<updated date="2017-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1061075">SUSE bug 1061075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061086">SUSE bug 1061086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063123">SUSE bug 1063123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068187">SUSE bug 1068187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068191">SUSE bug 1068191</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15289">CVE-2017-15289 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15592/">CVE-2017-15592 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15592">CVE-2017-15592 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15595">CVE-2017-15595 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15597/">CVE-2017-15597 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15597">CVE-2017-15597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581686" comment="xen-4.2.5_21-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581687" comment="xen-doc-html-4.2.5_21-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581688" comment="xen-doc-pdf-4.2.5_21-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581689" comment="xen-kmp-default-4.2.5_21_3.0.101_0.139.TDC-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581690" comment="xen-libs-4.2.5_21-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581691" comment="xen-tools-4.2.5_21-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581692" comment="xen-tools-domU-4.2.5_21-47.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219605" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1024307" ref_url="https://bugzilla.suse.com/1024307" source="BUGZILLA"/>
		<reference ref_id="1030144" ref_url="https://bugzilla.suse.com/1030144" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1070158" ref_url="https://bugzilla.suse.com/1070158" source="BUGZILLA"/>
		<reference ref_id="1070159" ref_url="https://bugzilla.suse.com/1070159" source="BUGZILLA"/>
		<reference ref_id="1070160" ref_url="https://bugzilla.suse.com/1070160" source="BUGZILLA"/>
		<reference ref_id="1070163" ref_url="https://bugzilla.suse.com/1070163" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1076116" ref_url="https://bugzilla.suse.com/1076116" source="BUGZILLA"/>
		<reference ref_id="1076180" ref_url="https://bugzilla.suse.com/1076180" source="BUGZILLA"/>
		<reference ref_id="1080635" ref_url="https://bugzilla.suse.com/1080635" source="BUGZILLA"/>
		<reference ref_id="1080662" ref_url="https://bugzilla.suse.com/1080662" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-17563" ref_url="https://www.suse.com/security/cve/CVE-2017-17563/" source="CVE"/>
		<reference ref_id="CVE-2017-17564" ref_url="https://www.suse.com/security/cve/CVE-2017-17564/" source="CVE"/>
		<reference ref_id="CVE-2017-17565" ref_url="https://www.suse.com/security/cve/CVE-2017-17565/" source="CVE"/>
		<reference ref_id="CVE-2017-17566" ref_url="https://www.suse.com/security/cve/CVE-2017-17566/" source="CVE"/>
		<reference ref_id="CVE-2017-18030" ref_url="https://www.suse.com/security/cve/CVE-2017-18030/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898/" source="CVE"/>
		<reference ref_id="CVE-2018-5683" ref_url="https://www.suse.com/security/cve/CVE-2018-5683/" source="CVE"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-5753, CVE-2017-5715, CVE-2017-5754: Prevent information leaks via
  side effects of speculative execution, aka 'Spectre' and 'Meltdown' attacks
  (bsc#1074562, bsc#1068032)
- CVE-2018-5683: The vga_draw_text function allowed local OS guest privileged
  users to cause a denial of service (out-of-bounds read and QEMU process crash)
  by leveraging improper memory address validation (bsc#1076116).
- CVE-2017-18030: The cirrus_invalidate_region function allowed local OS guest
  privileged users to cause a denial of service (out-of-bounds array access and
  QEMU process crash) via vectors related to negative pitch (bsc#1076180).
- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS (unbounded
  recursion, stack consumption, and hypervisor crash) or possibly gain privileges
  via crafted page-table stacking (bsc#1061081)
- CVE-2017-17566: Prevent PV guest OS users to cause a denial of service (host
  OS crash) or gain host OS privileges in shadow mode by mapping a certain
  auxiliary page (bsc#1070158).
- CVE-2017-17563: Prevent guest OS users to cause a denial of service (host OS
  crash) or gain host OS privileges by leveraging an incorrect mask for
  reference-count overflow checking in shadow mode (bsc#1070159).
- CVE-2017-17564: Prevent guest OS users to cause a denial of service (host OS
  crash) or gain host OS privileges by leveraging incorrect error handling for
  reference counting in shadow mode (bsc#1070160).
- CVE-2017-17565: Prevent PV guest OS users to cause a denial of service (host
  OS crash) if shadow mode and log-dirty mode are in place, because of an
  incorrect assertion related to M2P (bsc#1070163).
- Added missing intermediate preemption checks for guest requesting removal of
  memory. This allowed malicious guest administrator to cause denial of service
  due to the high cost of this operation (bsc#1080635).
- Because of XEN not returning the proper error messages when transitioning
  grant tables from v2 to v1 a malicious guest was able to cause DoS or
  potentially allowed for privilege escalation as well as information leaks
  (bsc#1080662).
- CVE-2017-5898: The CCID Card device emulator support was vulnerable to an
  integer overflow flaw allowing a privileged user to crash the Qemu process on
  the host resulting in DoS (bsc#1024307)
- Unprivileged domains could have issued well-timed writes to xenstore which
  conflict with transactions to stall progress of the control domain or driver
  domain, possibly leading to DoS (bsc#1030144, XSA-206).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-14"/>
	<updated date="2018-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1024307">SUSE bug 1024307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030144">SUSE bug 1030144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070158">SUSE bug 1070158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070159">SUSE bug 1070159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070160">SUSE bug 1070160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070163">SUSE bug 1070163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076116">SUSE bug 1076116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076180">SUSE bug 1076180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080635">SUSE bug 1080635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080662">SUSE bug 1080662</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15595">CVE-2017-15595 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17563/">CVE-2017-17563 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17563">CVE-2017-17563 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17564/">CVE-2017-17564 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17564">CVE-2017-17564 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17565/">CVE-2017-17565 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17565">CVE-2017-17565 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17566/">CVE-2017-17566 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17566">CVE-2017-17566 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18030/">CVE-2017-18030 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18030">CVE-2017-18030 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5754">CVE-2017-5754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5898">CVE-2017-5898 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5683/">CVE-2018-5683 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5683">CVE-2018-5683 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581693" comment="xen-4.2.5_21-47.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581694" comment="xen-doc-html-4.2.5_21-47.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581695" comment="xen-doc-pdf-4.2.5_21-47.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581696" comment="xen-kmp-default-4.2.5_21_3.0.101_0.150.TDC-47.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581697" comment="xen-libs-4.2.5_21-47.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581698" comment="xen-tools-4.2.5_21-47.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581699" comment="xen-tools-domU-4.2.5_21-47.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219606" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1024307" ref_url="https://bugzilla.suse.com/1024307" source="BUGZILLA"/>
		<reference ref_id="1030144" ref_url="https://bugzilla.suse.com/1030144" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1070158" ref_url="https://bugzilla.suse.com/1070158" source="BUGZILLA"/>
		<reference ref_id="1070159" ref_url="https://bugzilla.suse.com/1070159" source="BUGZILLA"/>
		<reference ref_id="1070160" ref_url="https://bugzilla.suse.com/1070160" source="BUGZILLA"/>
		<reference ref_id="1070163" ref_url="https://bugzilla.suse.com/1070163" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1076116" ref_url="https://bugzilla.suse.com/1076116" source="BUGZILLA"/>
		<reference ref_id="1076180" ref_url="https://bugzilla.suse.com/1076180" source="BUGZILLA"/>
		<reference ref_id="1080635" ref_url="https://bugzilla.suse.com/1080635" source="BUGZILLA"/>
		<reference ref_id="1080662" ref_url="https://bugzilla.suse.com/1080662" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334/" source="CVE"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-17563" ref_url="https://www.suse.com/security/cve/CVE-2017-17563/" source="CVE"/>
		<reference ref_id="CVE-2017-17564" ref_url="https://www.suse.com/security/cve/CVE-2017-17564/" source="CVE"/>
		<reference ref_id="CVE-2017-17565" ref_url="https://www.suse.com/security/cve/CVE-2017-17565/" source="CVE"/>
		<reference ref_id="CVE-2017-17566" ref_url="https://www.suse.com/security/cve/CVE-2017-17566/" source="CVE"/>
		<reference ref_id="CVE-2017-18030" ref_url="https://www.suse.com/security/cve/CVE-2017-18030/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898/" source="CVE"/>
		<reference ref_id="CVE-2018-5683" ref_url="https://www.suse.com/security/cve/CVE-2018-5683/" source="CVE"/>
		<reference ref_id="CVE-2018-7540" ref_url="https://www.suse.com/security/cve/CVE-2018-7540/" source="CVE"/>
		<reference ref_id="CVE-2018-7541" ref_url="https://www.suse.com/security/cve/CVE-2018-7541/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003814.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-5753, CVE-2017-5715, CVE-2017-5754: Prevent information leaks via
  side effects of speculative execution, aka 'Spectre' and 'Meltdown' attacks
  (bsc#1074562, bsc#1068032)
- CVE-2018-5683: The vga_draw_text function allowed local OS guest privileged
  users to cause a denial of service (out-of-bounds read and QEMU process crash)
  by leveraging improper memory address validation (bsc#1076116).
- CVE-2017-18030: The cirrus_invalidate_region function allowed local OS guest
  privileged users to cause a denial of service (out-of-bounds array access and
  QEMU process crash) via vectors related to negative pitch (bsc#1076180).
- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS (unbounded
  recursion, stack consumption, and hypervisor crash) or possibly gain privileges
  via crafted page-table stacking (bsc#1061081)
- CVE-2017-17566: Prevent PV guest OS users to cause a denial of service (host
  OS crash) or gain host OS privileges in shadow mode by mapping a certain
  auxiliary page (bsc#1070158).
- CVE-2017-17563: Prevent guest OS users to cause a denial of service (host OS
  crash) or gain host OS privileges by leveraging an incorrect mask for
  reference-count overflow checking in shadow mode (bsc#1070159).
- CVE-2017-17564: Prevent guest OS users to cause a denial of service (host OS
  crash) or gain host OS privileges by leveraging incorrect error handling for
  reference counting in shadow mode (bsc#1070160).
- CVE-2017-17565: Prevent PV guest OS users to cause a denial of service (host
  OS crash) if shadow mode and log-dirty mode are in place, because of an
  incorrect assertion related to M2P (bsc#1070163).
- Added missing intermediate preemption checks for guest requesting removal of
  memory. This allowed malicious guest administrator to cause denial of service
  due to the high cost of this operation (bsc#1080635).
- Because of XEN not returning the proper error messages when transitioning
  grant tables from v2 to v1 a malicious guest was able to cause DoS or
  potentially allowed for privilege escalation as well as information leaks
  (bsc#1080662).
- CVE-2017-5898: The CCID Card device emulator support was vulnerable to an
  integer overflow flaw allowing a privileged user to crash the Qemu process on
  the host resulting in DoS (bsc#1024307)
- Unprivileged domains could have issued well-timed writes to xenstore which
  conflict with transactions to stall progress of the control domain or driver
  domain, possibly leading to DoS (bsc#1030144, XSA-206).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-14"/>
	<updated date="2018-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1024307">SUSE bug 1024307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030144">SUSE bug 1030144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070158">SUSE bug 1070158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070159">SUSE bug 1070159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070160">SUSE bug 1070160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070163">SUSE bug 1070163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076116">SUSE bug 1076116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076180">SUSE bug 1076180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080635">SUSE bug 1080635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080662">SUSE bug 1080662</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11334">CVE-2017-11334 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15595">CVE-2017-15595 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17563/">CVE-2017-17563 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17563">CVE-2017-17563 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17564/">CVE-2017-17564 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17564">CVE-2017-17564 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17565/">CVE-2017-17565 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17565">CVE-2017-17565 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17566/">CVE-2017-17566 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17566">CVE-2017-17566 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18030/">CVE-2017-18030 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18030">CVE-2017-18030 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5754">CVE-2017-5754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5898">CVE-2017-5898 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5683/">CVE-2018-5683 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5683">CVE-2018-5683 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7540/">CVE-2018-7540 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7540">CVE-2018-7540 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7541/">CVE-2018-7541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7541">CVE-2018-7541 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581700" comment="xen-4.2.5_21-45.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581701" comment="xen-doc-html-4.2.5_21-45.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581702" comment="xen-doc-pdf-4.2.5_21-45.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581703" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569328" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581704" comment="xen-libs-4.2.5_21-45.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581705" comment="xen-libs-32bit-4.2.5_21-45.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581706" comment="xen-tools-4.2.5_21-45.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581707" comment="xen-tools-domU-4.2.5_21-45.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219607" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1083292" ref_url="https://bugzilla.suse.com/1083292" source="BUGZILLA"/>
		<reference ref_id="1089152" ref_url="https://bugzilla.suse.com/1089152" source="BUGZILLA"/>
		<reference ref_id="1089635" ref_url="https://bugzilla.suse.com/1089635" source="BUGZILLA"/>
		<reference ref_id="1090820" ref_url="https://bugzilla.suse.com/1090820" source="BUGZILLA"/>
		<reference ref_id="1090822" ref_url="https://bugzilla.suse.com/1090822" source="BUGZILLA"/>
		<reference ref_id="1090823" ref_url="https://bugzilla.suse.com/1090823" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10471" ref_url="https://www.suse.com/security/cve/CVE-2018-10471/" source="CVE"/>
		<reference ref_id="CVE-2018-10472" ref_url="https://www.suse.com/security/cve/CVE-2018-10472/" source="CVE"/>
		<reference ref_id="CVE-2018-7550" ref_url="https://www.suse.com/security/cve/CVE-2018-7550/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003994.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2018-8897: Prevent mishandling of debug exceptions on x86 (XSA-260, bsc#1090820)
- Handle HPET timers in IO-APIC mode correctly to prevent malicious or buggy
  HVM guests from causing a hypervisor crash or potentially privilege
  escalation/information leaks (XSA-261, bsc#1090822)
- Prevent unbounded loop, induced by qemu allowing an attacker to permanently
  keep a physical CPU core busy (XSA-262, bsc#1090823)
- CVE-2018-10472: x86 HVM guest OS users (in certain configurations) were able
  to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction
  with specifying the target file as the backing file of a snapshot
  (bsc#1089152).
- CVE-2018-10471: x86 PV guest OS users were able to cause a denial of service
  (out-of-bounds zero write and hypervisor crash) via unexpected INT 80
  processing, because of an incorrect fix for CVE-2017-5754 (bsc#1089635).
- CVE-2018-7550: The load_multiboot function allowed local guest OS users to
  execute arbitrary code on the host via a mh_load_end_addr value greater than
  mh_bss_end_addr, which triggers an out-of-bounds read or write memory access
  (bsc#1083292).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-10"/>
	<updated date="2018-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1083292">SUSE bug 1083292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089152">SUSE bug 1089152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089635">SUSE bug 1089635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090820">SUSE bug 1090820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090822">SUSE bug 1090822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090823">SUSE bug 1090823</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10471/">CVE-2018-10471 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10471">CVE-2018-10471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10472/">CVE-2018-10472 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10472">CVE-2018-10472 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7550/">CVE-2018-7550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7550">CVE-2018-7550 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8897">CVE-2018-8897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581708" comment="xen-4.2.5_21-45.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581709" comment="xen-doc-html-4.2.5_21-45.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581710" comment="xen-doc-pdf-4.2.5_21-45.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581711" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569332" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581712" comment="xen-libs-4.2.5_21-45.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581713" comment="xen-libs-32bit-4.2.5_21-45.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581714" comment="xen-tools-4.2.5_21-45.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581715" comment="xen-tools-domU-4.2.5_21-45.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219608" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1083292" ref_url="https://bugzilla.suse.com/1083292" source="BUGZILLA"/>
		<reference ref_id="1089152" ref_url="https://bugzilla.suse.com/1089152" source="BUGZILLA"/>
		<reference ref_id="1089635" ref_url="https://bugzilla.suse.com/1089635" source="BUGZILLA"/>
		<reference ref_id="1090820" ref_url="https://bugzilla.suse.com/1090820" source="BUGZILLA"/>
		<reference ref_id="1090822" ref_url="https://bugzilla.suse.com/1090822" source="BUGZILLA"/>
		<reference ref_id="1090823" ref_url="https://bugzilla.suse.com/1090823" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10471" ref_url="https://www.suse.com/security/cve/CVE-2018-10471/" source="CVE"/>
		<reference ref_id="CVE-2018-10472" ref_url="https://www.suse.com/security/cve/CVE-2018-10472/" source="CVE"/>
		<reference ref_id="CVE-2018-7550" ref_url="https://www.suse.com/security/cve/CVE-2018-7550/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2018-8897: Prevent mishandling of debug exceptions on x86 (XSA-260, bsc#1090820)
- Handle HPET timers in IO-APIC mode correctly to prevent malicious or buggy
  HVM guests from causing a hypervisor crash or potentially privilege
  escalation/information leaks (XSA-261, bsc#1090822)
- Prevent unbounded loop, induced by qemu allowing an attacker to permanently
  keep a physical CPU core busy (XSA-262, bsc#1090823)
- CVE-2018-10472: x86 HVM guest OS users (in certain configurations) were able
  to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction
  with specifying the target file as the backing file of a snapshot
  (bsc#1089152).
- CVE-2018-10471: x86 PV guest OS users were able to cause a denial of service
  (out-of-bounds zero write and hypervisor crash) via unexpected INT 80
  processing, because of an incorrect fix for CVE-2017-5754 (bsc#1089635).
- CVE-2018-7550: The load_multiboot function allowed local guest OS users to
  execute arbitrary code on the host via a mh_load_end_addr value greater than
  mh_bss_end_addr, which triggers an out-of-bounds read or write memory access
  (bsc#1083292).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-11"/>
	<updated date="2018-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1083292">SUSE bug 1083292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089152">SUSE bug 1089152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089635">SUSE bug 1089635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090820">SUSE bug 1090820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090822">SUSE bug 1090822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090823">SUSE bug 1090823</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10471/">CVE-2018-10471 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10471">CVE-2018-10471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10472/">CVE-2018-10472 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10472">CVE-2018-10472 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7550/">CVE-2018-7550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7550">CVE-2018-7550 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8897">CVE-2018-8897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581716" comment="xen-4.2.5_21-47.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581717" comment="xen-doc-html-4.2.5_21-47.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581718" comment="xen-doc-pdf-4.2.5_21-47.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581719" comment="xen-kmp-default-4.2.5_21_3.0.101_0.156.TDC-47.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581720" comment="xen-libs-4.2.5_21-47.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581721" comment="xen-tools-4.2.5_21-47.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581722" comment="xen-tools-domU-4.2.5_21-47.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219609" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1079730" ref_url="https://bugzilla.suse.com/1079730" source="BUGZILLA"/>
		<reference ref_id="1090822" ref_url="https://bugzilla.suse.com/1090822" source="BUGZILLA"/>
		<reference ref_id="1090823" ref_url="https://bugzilla.suse.com/1090823" source="BUGZILLA"/>
		<reference ref_id="1091107" ref_url="https://bugzilla.suse.com/1091107" source="BUGZILLA"/>
		<reference ref_id="1092631" ref_url="https://bugzilla.suse.com/1092631" source="BUGZILLA"/>
		<reference ref_id="1095242" ref_url="https://bugzilla.suse.com/1095242" source="BUGZILLA"/>
		<reference ref_id="1096224" ref_url="https://bugzilla.suse.com/1096224" source="BUGZILLA"/>
		<reference ref_id="1097206" ref_url="https://bugzilla.suse.com/1097206" source="BUGZILLA"/>
		<reference ref_id="1097521" ref_url="https://bugzilla.suse.com/1097521" source="BUGZILLA"/>
		<reference ref_id="1097522" ref_url="https://bugzilla.suse.com/1097522" source="BUGZILLA"/>
		<reference ref_id="1098744" ref_url="https://bugzilla.suse.com/1098744" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-10981" ref_url="https://www.suse.com/security/cve/CVE-2018-10981/" source="CVE"/>
		<reference ref_id="CVE-2018-10982" ref_url="https://www.suse.com/security/cve/CVE-2018-10982/" source="CVE"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617/" source="CVE"/>
		<reference ref_id="CVE-2018-12891" ref_url="https://www.suse.com/security/cve/CVE-2018-12891/" source="CVE"/>
		<reference ref_id="CVE-2018-12893" ref_url="https://www.suse.com/security/cve/CVE-2018-12893/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<description>

This update for xen fixes the following issues:

These security issue were fixed:

- CVE-2018-3646: Systems with microprocessors utilizing speculative execution
  and address translations may have allowed unauthorized disclosure of
  information residing in the L1 data cache to an attacker with local user access
  with guest OS privilege via a terminal page fault and a side-channel analysis
  (bsc#1091107, bsc#1027519).
- CVE-2018-12617: An integer overflow that could cause a segmentation
  fault in qmp_guest_file_read() with g_malloc() in qemu-guest-agent was
  fixed (bsc#1098744)
- CVE-2018-3665: System software utilizing Lazy FP state restore technique
  on systems using Intel Core-based microprocessors may potentially allow
  a local process to infer data from another process through a speculative
  execution side channel. (bsc#1095242)
- CVE-2018-3639: Systems with microprocessors utilizing speculative
  execution and speculative execution of memory reads before the addresses
  of all prior memory writes are known may allow unauthorized disclosure
  of information to an attacker with local user access via a side-channel
  analysis, aka Speculative Store Bypass (SSB), Variant 4. (bsc#1092631)
- CVE-2017-5715: Systems with microprocessors utilizing speculative
  execution and indirect branch prediction may allow unauthorized disclosure
  of information to an attacker with local user access via a side-channel
  analysis. (bsc#1074562)
- CVE-2017-5753: Systems with microprocessors utilizing speculative
  execution and branch prediction may allow unauthorized disclosure of
  information to an attacker with local user access via a side-channel
  analysis. (bsc#1074562)
- CVE-2017-5754: Systems with microprocessors utilizing speculative
  execution and indirect branch prediction may allow unauthorized disclosure
  of information to an attacker with local user access via a side-channel
  analysis of the data cache. (bsc#1074562)
- CVE-2018-12891: Certain PV MMU operations may take a long time to
  process. For that reason Xen explicitly checks for the need to preempt
  the current vCPU at certain points. A few rarely taken code paths did
  bypass such checks. By suitably enforcing the conditions through its own
  page table contents, a malicious guest may cause such bypasses to be used
  for an unbounded number of iterations. A malicious or buggy PV guest may
  cause a Denial of Service (DoS) affecting the entire host. Specifically,
  it may prevent use of a physical CPU for an indeterminate period of
  time. (bsc#1097521)
- CVE-2018-12893:  One of the fixes in XSA-260 added some safety checks
  to help prevent Xen livelocking with debug exceptions. Unfortunately,
  due to an oversight, at least one of these safety checks can be
  triggered by a guest. A malicious PV guest can crash Xen, leading to
  a Denial of Service. Only x86 PV guests can exploit the vulnerability. x86
  HVM and PVH guests cannot exploit the vulnerability. An attacker
  needs to be able to control hardware debugging facilities to exploit
  the vulnerability, but such permissions are typically available to
  unprivileged users. (bsc#1097522)
- CVE-2018-11806: m_cat in slirp/mbuf.c in Qemu has a heap-based buffer
  overflow via incoming fragmented datagrams. (bsc#1096224)
- CVE-2018-10982: An issue was discovered in Xen allowed x86 HVM guest
  OS users to cause a denial of service (unexpectedly high interrupt
  number, array overrun, and hypervisor crash) or possibly gain hypervisor
  privileges by setting up an HPET timer to deliver interrupts in IO-APIC
  mode, aka vHPET interrupt injection. (bsc#1090822)
- CVE-2018-10981: An issue was discovered in Xen that allowed x86 HVM
  guest OS users to cause a denial of service (host OS infinite loop) in
  situations where a QEMU device model attempts to make invalid transitions
  between states of a request. (bsc#1090823)

Following bugs were fixed:

- After updating to kernel 3.0.101-0.47.106.32-xen system crashes in check_bugs() (bsc#1097206)
- bsc#1079730 - in xen-kmp, unplug emulated devices after migration
  This is required since xen-4.10 and/or qemu-2.10 because the state
  of unplug is not propagated from one dom0 to another. Without
  this unplug qemu's block-backend will be unable to open qcow2
  disks on the receiving dom0
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-24"/>
	<updated date="2018-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079730">SUSE bug 1079730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090822">SUSE bug 1090822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090823">SUSE bug 1090823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092631">SUSE bug 1092631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095242">SUSE bug 1095242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096224">SUSE bug 1096224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097206">SUSE bug 1097206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097521">SUSE bug 1097521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097522">SUSE bug 1097522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098744">SUSE bug 1098744</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5754">CVE-2017-5754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10981/">CVE-2018-10981 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10981">CVE-2018-10981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10982/">CVE-2018-10982 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10982">CVE-2018-10982 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11806">CVE-2018-11806 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12617">CVE-2018-12617 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12891/">CVE-2018-12891 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12891">CVE-2018-12891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12893/">CVE-2018-12893 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12893">CVE-2018-12893 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3646">CVE-2018-3646 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3665">CVE-2018-3665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581723" comment="xen-4.2.5_21-47.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581724" comment="xen-doc-html-4.2.5_21-47.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581725" comment="xen-doc-pdf-4.2.5_21-47.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581726" comment="xen-kmp-default-4.2.5_21_3.0.101_0.181.TDC-47.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581727" comment="xen-libs-4.2.5_21-47.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581728" comment="xen-tools-4.2.5_21-47.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581729" comment="xen-tools-domU-4.2.5_21-47.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219610" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1079730" ref_url="https://bugzilla.suse.com/1079730" source="BUGZILLA"/>
		<reference ref_id="1090822" ref_url="https://bugzilla.suse.com/1090822" source="BUGZILLA"/>
		<reference ref_id="1090823" ref_url="https://bugzilla.suse.com/1090823" source="BUGZILLA"/>
		<reference ref_id="1091107" ref_url="https://bugzilla.suse.com/1091107" source="BUGZILLA"/>
		<reference ref_id="1092631" ref_url="https://bugzilla.suse.com/1092631" source="BUGZILLA"/>
		<reference ref_id="1095242" ref_url="https://bugzilla.suse.com/1095242" source="BUGZILLA"/>
		<reference ref_id="1096224" ref_url="https://bugzilla.suse.com/1096224" source="BUGZILLA"/>
		<reference ref_id="1097206" ref_url="https://bugzilla.suse.com/1097206" source="BUGZILLA"/>
		<reference ref_id="1097521" ref_url="https://bugzilla.suse.com/1097521" source="BUGZILLA"/>
		<reference ref_id="1097522" ref_url="https://bugzilla.suse.com/1097522" source="BUGZILLA"/>
		<reference ref_id="1098744" ref_url="https://bugzilla.suse.com/1098744" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-10981" ref_url="https://www.suse.com/security/cve/CVE-2018-10981/" source="CVE"/>
		<reference ref_id="CVE-2018-10982" ref_url="https://www.suse.com/security/cve/CVE-2018-10982/" source="CVE"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617/" source="CVE"/>
		<reference ref_id="CVE-2018-12891" ref_url="https://www.suse.com/security/cve/CVE-2018-12891/" source="CVE"/>
		<reference ref_id="CVE-2018-12893" ref_url="https://www.suse.com/security/cve/CVE-2018-12893/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<description>

This update for xen fixes the following issues:

These security issue were fixed:

- CVE-2018-3646: Systems with microprocessors utilizing speculative execution
  and address translations may have allowed unauthorized disclosure of
  information residing in the L1 data cache to an attacker with local user access
  with guest OS privilege via a terminal page fault and a side-channel analysis
  (bsc#1091107, bsc#1027519).
- CVE-2018-12617: An integer overflow that could cause a segmentation
  fault in qmp_guest_file_read() with g_malloc() in qemu-guest-agent was
  fixed (bsc#1098744)
- CVE-2018-3665: System software utilizing Lazy FP state restore technique
  on systems using Intel Core-based microprocessors may potentially allow
  a local process to infer data from another process through a speculative
  execution side channel. (bsc#1095242)
- CVE-2018-3639: Systems with microprocessors utilizing speculative
  execution and speculative execution of memory reads before the addresses
  of all prior memory writes are known may allow unauthorized disclosure
  of information to an attacker with local user access via a side-channel
  analysis, aka Speculative Store Bypass (SSB), Variant 4. (bsc#1092631)
- CVE-2017-5715: Systems with microprocessors utilizing speculative
  execution and indirect branch prediction may allow unauthorized disclosure
  of information to an attacker with local user access via a side-channel
  analysis. (bsc#1074562)
- CVE-2017-5753: Systems with microprocessors utilizing speculative
  execution and branch prediction may allow unauthorized disclosure of
  information to an attacker with local user access via a side-channel
  analysis. (bsc#1074562)
- CVE-2017-5754: Systems with microprocessors utilizing speculative
  execution and indirect branch prediction may allow unauthorized disclosure
  of information to an attacker with local user access via a side-channel
  analysis of the data cache. (bsc#1074562)
- CVE-2018-12891: Certain PV MMU operations may take a long time to
  process. For that reason Xen explicitly checks for the need to preempt
  the current vCPU at certain points. A few rarely taken code paths did
  bypass such checks. By suitably enforcing the conditions through its own
  page table contents, a malicious guest may cause such bypasses to be used
  for an unbounded number of iterations. A malicious or buggy PV guest may
  cause a Denial of Service (DoS) affecting the entire host. Specifically,
  it may prevent use of a physical CPU for an indeterminate period of
  time. (bsc#1097521)
- CVE-2018-12893:  One of the fixes in XSA-260 added some safety checks
  to help prevent Xen livelocking with debug exceptions. Unfortunately,
  due to an oversight, at least one of these safety checks can be
  triggered by a guest. A malicious PV guest can crash Xen, leading to
  a Denial of Service. Only x86 PV guests can exploit the vulnerability. x86
  HVM and PVH guests cannot exploit the vulnerability. An attacker
  needs to be able to control hardware debugging facilities to exploit
  the vulnerability, but such permissions are typically available to
  unprivileged users. (bsc#1097522)
- CVE-2018-11806: m_cat in slirp/mbuf.c in Qemu has a heap-based buffer
  overflow via incoming fragmented datagrams. (bsc#1096224)
- CVE-2018-10982: An issue was discovered in Xen allowed x86 HVM guest
  OS users to cause a denial of service (unexpectedly high interrupt
  number, array overrun, and hypervisor crash) or possibly gain hypervisor
  privileges by setting up an HPET timer to deliver interrupts in IO-APIC
  mode, aka vHPET interrupt injection. (bsc#1090822)
- CVE-2018-10981: An issue was discovered in Xen that allowed x86 HVM guest OS users to cause a denial of service (host OS infinite loop) in situations where a QEMU device model attempts to make invalid transitions between states of a request. (bsc#1090823)

Following bugs were fixed:

- After updating to kernel 3.0.101-0.47.106.32-xen system crashes in check_bugs() (bsc#1097206)
- bsc#1079730 - in xen-kmp, unplug emulated devices after migration
  This is required since xen-4.10 and/or qemu-2.10 because the state
  of unplug is not propagated from one dom0 to another. Without
  this unplug qemu's block-backend will be unable to open qcow2
  disks on the receiving dom0
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-27"/>
	<updated date="2018-08-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079730">SUSE bug 1079730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090822">SUSE bug 1090822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090823">SUSE bug 1090823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092631">SUSE bug 1092631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095242">SUSE bug 1095242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096224">SUSE bug 1096224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097206">SUSE bug 1097206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097521">SUSE bug 1097521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097522">SUSE bug 1097522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098744">SUSE bug 1098744</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5754">CVE-2017-5754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10981/">CVE-2018-10981 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10981">CVE-2018-10981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10982/">CVE-2018-10982 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10982">CVE-2018-10982 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11806">CVE-2018-11806 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12617">CVE-2018-12617 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12891/">CVE-2018-12891 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12891">CVE-2018-12891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12893/">CVE-2018-12893 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12893">CVE-2018-12893 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3646">CVE-2018-3646 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3665">CVE-2018-3665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581730" comment="xen-4.2.5_21-45.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581731" comment="xen-doc-html-4.2.5_21-45.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581732" comment="xen-doc-pdf-4.2.5_21-45.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581733" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569336" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581734" comment="xen-libs-4.2.5_21-45.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581735" comment="xen-libs-32bit-4.2.5_21-45.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581736" comment="xen-tools-4.2.5_21-45.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581737" comment="xen-tools-domU-4.2.5_21-45.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219611" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1110924" ref_url="https://bugzilla.suse.com/1110924" source="BUGZILLA"/>
		<reference ref_id="1111007" ref_url="https://bugzilla.suse.com/1111007" source="BUGZILLA"/>
		<reference ref_id="1111011" ref_url="https://bugzilla.suse.com/1111011" source="BUGZILLA"/>
		<reference ref_id="1111014" ref_url="https://bugzilla.suse.com/1111014" source="BUGZILLA"/>
		<reference ref_id="1112188" ref_url="https://bugzilla.suse.com/1112188" source="BUGZILLA"/>
		<reference ref_id="1114423" ref_url="https://bugzilla.suse.com/1114423" source="BUGZILLA"/>
		<reference ref_id="1114988" ref_url="https://bugzilla.suse.com/1114988" source="BUGZILLA"/>
		<reference ref_id="1115040" ref_url="https://bugzilla.suse.com/1115040" source="BUGZILLA"/>
		<reference ref_id="1115045" ref_url="https://bugzilla.suse.com/1115045" source="BUGZILLA"/>
		<reference ref_id="1115047" ref_url="https://bugzilla.suse.com/1115047" source="BUGZILLA"/>
		<reference ref_id="1117756" ref_url="https://bugzilla.suse.com/1117756" source="BUGZILLA"/>
		<reference ref_id="1123157" ref_url="https://bugzilla.suse.com/1123157" source="BUGZILLA"/>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1129623" ref_url="https://bugzilla.suse.com/1129623" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10839" ref_url="https://www.suse.com/security/cve/CVE-2018-10839/" source="CVE"/>
		<reference ref_id="CVE-2018-17958" ref_url="https://www.suse.com/security/cve/CVE-2018-17958/" source="CVE"/>
		<reference ref_id="CVE-2018-17962" ref_url="https://www.suse.com/security/cve/CVE-2018-17962/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-18438" ref_url="https://www.suse.com/security/cve/CVE-2018-18438/" source="CVE"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="CVE-2018-19665" ref_url="https://www.suse.com/security/cve/CVE-2018-19665/" source="CVE"/>
		<reference ref_id="CVE-2018-19961" ref_url="https://www.suse.com/security/cve/CVE-2018-19961/" source="CVE"/>
		<reference ref_id="CVE-2018-19962" ref_url="https://www.suse.com/security/cve/CVE-2018-19962/" source="CVE"/>
		<reference ref_id="CVE-2018-19965" ref_url="https://www.suse.com/security/cve/CVE-2018-19965/" source="CVE"/>
		<reference ref_id="CVE-2018-19966" ref_url="https://www.suse.com/security/cve/CVE-2018-19966/" source="CVE"/>
		<reference ref_id="CVE-2018-19967" ref_url="https://www.suse.com/security/cve/CVE-2018-19967/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed: 	  

- CVE-2018-19965: Fixed an issue related to the INVPCID instruction in case
  non-canonical addresses are accessed, which may allow a guest to cause Xen to
  crash, resulting in a Denial of Service (DoS) affecting the entire host.
  (XSA-279) (bsc#1115045)
- CVE-2018-18849: Fixed an out of bounds memory access issue was found in the 
  LSI53C895A SCSI Host Bus Adapter emulation while writing a message in lsi_do_msgin (bsc#1114423).
- CVE-2018-19665: Fixed an integer overflow resulting in memory corruption in
  various Bluetooth functions, allowing this to crash qemu process resulting in
  Denial of Service (DoS). (bsc#1117756).
- CVE-2018-18438: Fixed an integer overflow in ccid_card_vscard_read function which could allow memory corruption (bsc#1112188).
- CVE-2018-17962: Fixed an integer overflow leading to a buffer overflow in the
  pcnet component (bsc#1111011).
- CVE-2018-19961, CVE-2018-19962: Fixed an issue related to insufficient TLB
  flushing with AMD IOMMUs, which potentially allowed a guest to escalate its
  privileges, may cause a Denial of Service (DoS) affecting the entire host, or
  may be able to access data it is not supposed to access. (XSA-275)
  (bsc#1115040).
- CVE-2018-17963: Fixed an integer overflow in relation to large packet sizes,
  leading to a denial of service (DoS) (bsc#1111014).
- Fixed an issue which could allow a malicious or buggy x86 PV guest kernels can mount a Denial of Service
  attack affecting the whole system (bsc#1126196).
- CVE-2018-17958: Fixed an integer overflow  which could lead to buffer overflow (bsc#1111007).
- CVE-2018-10839: Fixed an integer overflow leading to a buffer overflow in
  the ne2000 component (bsc#1110924).
- CVE-2019-6778: Fixed a heap buffer overflow in tcp_emu() found in slirp (bsc#1123157).
- CVE-2018-19966: Fixed issue introduced by XSA-240 that could have caused conflicts with shadow paging (XSA-280)(bsc#1115047).
- CVE-2018-19967: Fixed HLE constructs that allowed guests to lock up the host,
  resulting in a Denial of Service (DoS). (XSA-282) (bsc#1114988).
- Fixed multiple access violations introduced by XENMEM_exchange hypercall which could allow
  a single PV guest to leak arbitrary amounts of memory, leading to a denial of service (bsc#1126192).
- Fixed an issue which could allow malicious or buggy guests with passed through PCI devices to  be able to 
  escalate their privileges, crash the host, or access data belonging to other guests. Additionally memory 
  leaks were also possible (bsc#1126140).
- Fixed a race condition issue which could allow malicious PV guests to escalate their privilege to that 
  of the hypervisor (bsc#1126141).
- CVE-2019-9824: Fixed an information leak in SLiRP networking implementation which could allow a user/process 
  to read uninitialised stack memory contents (bsc#1129623).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-02"/>
	<updated date="2019-04-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1110924">SUSE bug 1110924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111007">SUSE bug 1111007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111011">SUSE bug 1111011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111014">SUSE bug 1111014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112188">SUSE bug 1112188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114423">SUSE bug 1114423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114988">SUSE bug 1114988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115040">SUSE bug 1115040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115045">SUSE bug 1115045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115047">SUSE bug 1115047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117756">SUSE bug 1117756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123157">SUSE bug 1123157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129623">SUSE bug 1129623</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10839/">CVE-2018-10839 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10839">CVE-2018-10839 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17958/">CVE-2018-17958 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17958">CVE-2018-17958 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17962/">CVE-2018-17962 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17962">CVE-2018-17962 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17963">CVE-2018-17963 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18438/">CVE-2018-18438 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18438">CVE-2018-18438 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18849">CVE-2018-18849 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19665/">CVE-2018-19665 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19665">CVE-2018-19665 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19961/">CVE-2018-19961 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19961">CVE-2018-19961 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19962/">CVE-2018-19962 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19962">CVE-2018-19962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19965/">CVE-2018-19965 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19965">CVE-2018-19965 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19966/">CVE-2018-19966 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19966">CVE-2018-19966 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19967/">CVE-2018-19967 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19967">CVE-2018-19967 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6778">CVE-2019-6778 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9824">CVE-2019-9824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581738" comment="xen-4.2.5_21-47.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581739" comment="xen-doc-html-4.2.5_21-47.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581740" comment="xen-doc-pdf-4.2.5_21-47.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581741" comment="xen-kmp-default-4.2.5_21_3.0.101_0.190.TDC-47.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581742" comment="xen-libs-4.2.5_21-47.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581743" comment="xen-tools-4.2.5_21-47.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581744" comment="xen-tools-domU-4.2.5_21-47.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219612" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1047675" ref_url="https://bugzilla.suse.com/1047675" source="BUGZILLA"/>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1130680" ref_url="https://bugzilla.suse.com/1130680" source="BUGZILLA"/>
		<reference ref_id="1135905" ref_url="https://bugzilla.suse.com/1135905" source="BUGZILLA"/>
		<reference ref_id="1143797" ref_url="https://bugzilla.suse.com/1143797" source="BUGZILLA"/>
		<reference ref_id="1145652" ref_url="https://bugzilla.suse.com/1145652" source="BUGZILLA"/>
		<reference ref_id="1146874" ref_url="https://bugzilla.suse.com/1146874" source="BUGZILLA"/>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10806" ref_url="https://www.suse.com/security/cve/CVE-2017-10806/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2019-12067" ref_url="https://www.suse.com/security/cve/CVE-2019-12067/" source="CVE"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-12155" ref_url="https://www.suse.com/security/cve/CVE-2019-12155/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-17340" ref_url="https://www.suse.com/security/cve/CVE-2019-17340/" source="CVE"/>
		<reference ref_id="CVE-2019-17341" ref_url="https://www.suse.com/security/cve/CVE-2019-17341/" source="CVE"/>
		<reference ref_id="CVE-2019-17342" ref_url="https://www.suse.com/security/cve/CVE-2019-17342/" source="CVE"/>
		<reference ref_id="CVE-2019-17343" ref_url="https://www.suse.com/security/cve/CVE-2019-17343/" source="CVE"/>
		<reference ref_id="CVE-2019-17344" ref_url="https://www.suse.com/security/cve/CVE-2019-17344/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2019-15890: Fixed a use-after-free in SLiRP networking implementation of QEMU emulator
  which could have led to Denial of Service (bsc#1149813).
- CVE-2019-12068: Fixed an issue in lsi which could lead to an infinite loop and denial of 
  service (bsc#1146874).
- CVE-2019-14378: Fixed a heap buffer overflow in SLiRp networking implementation of QEMU 
  emulator which could have led to execution of  arbitrary code with privileges of the 
  QEMU process (bsc#1143797).
- CVE-2019-12067: Fixed a null pointer dereference which could have led to denial of service (bsc#1145652).
- CVE-2019-12155: Fixed a null pointer dereference in QXL VGA card emulator of QEMU which
  could have led to denial of service (bsc#1135905).
- CVE-2018-20815: Fixed a heap buffer overflow while loading device tree blob (bsc#1130680).
- CVE-2017-10806: Fixed a stack buffer overflow in debug logging (bsc#1047675).
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-18"/>
	<updated date="2019-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1047675">SUSE bug 1047675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130680">SUSE bug 1130680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135905">SUSE bug 1135905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143797">SUSE bug 1143797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145652">SUSE bug 1145652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146874">SUSE bug 1146874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10806/">CVE-2017-10806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10806">CVE-2017-10806 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20815">CVE-2018-20815 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12067/">CVE-2019-12067 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12067">CVE-2019-12067 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12068">CVE-2019-12068 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12155/">CVE-2019-12155 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12155">CVE-2019-12155 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14378">CVE-2019-14378 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15890">CVE-2019-15890 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17340/">CVE-2019-17340 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17340">CVE-2019-17340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17341/">CVE-2019-17341 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17341">CVE-2019-17341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17342/">CVE-2019-17342 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17342">CVE-2019-17342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17343/">CVE-2019-17343 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17343">CVE-2019-17343 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17344/">CVE-2019-17344 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17344">CVE-2019-17344 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581745" comment="xen-4.2.5_21-47.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581746" comment="xen-doc-html-4.2.5_21-47.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581747" comment="xen-doc-pdf-4.2.5_21-47.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581748" comment="xen-kmp-default-4.2.5_21_3.0.101_0.219.TDC-47.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581749" comment="xen-libs-4.2.5_21-47.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581750" comment="xen-tools-4.2.5_21-47.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581751" comment="xen-tools-domU-4.2.5_21-47.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219613" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1154456" ref_url="https://bugzilla.suse.com/1154456" source="BUGZILLA"/>
		<reference ref_id="1154458" ref_url="https://bugzilla.suse.com/1154458" source="BUGZILLA"/>
		<reference ref_id="1161181" ref_url="https://bugzilla.suse.com/1161181" source="BUGZILLA"/>
		<reference ref_id="1163019" ref_url="https://bugzilla.suse.com/1163019" source="BUGZILLA"/>
		<reference ref_id="1168140" ref_url="https://bugzilla.suse.com/1168140" source="BUGZILLA"/>
		<reference ref_id="1169392" ref_url="https://bugzilla.suse.com/1169392" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18421" ref_url="https://www.suse.com/security/cve/CVE-2019-18421/" source="CVE"/>
		<reference ref_id="CVE-2019-18425" ref_url="https://www.suse.com/security/cve/CVE-2019-18425/" source="CVE"/>
		<reference ref_id="CVE-2020-11740" ref_url="https://www.suse.com/security/cve/CVE-2020-11740/" source="CVE"/>
		<reference ref_id="CVE-2020-11741" ref_url="https://www.suse.com/security/cve/CVE-2020-11741/" source="CVE"/>
		<reference ref_id="CVE-2020-11742" ref_url="https://www.suse.com/security/cve/CVE-2020-11742/" source="CVE"/>
		<reference ref_id="CVE-2020-7211" ref_url="https://www.suse.com/security/cve/CVE-2020-7211/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- bsc#1174543 - secure boot related fixes
- bsc#1163019 - CVE-2020-8608: potential OOB access due to unsafe snprintf() usages
- bsc#1169392 - CVE-2020-11742: Bad continuation handling in GNTTABOP_copy
- bsc#1168140 - CVE-2020-11740, CVE-2020-11741: multiple xenoprof issues
- bsc#1161181 - CVE-2020-7211: potential directory traversal using relative paths via tftp server on Windows host
- bsc#1154456 - CVE-2019-18425: missing descriptor table limit checking in x86 PV emulation
- bsc#1154458 - CVE-2019-18421: Issues with restartable PV type change operations
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-11"/>
	<updated date="2020-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154456">SUSE bug 1154456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154458">SUSE bug 1154458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161181">SUSE bug 1161181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168140">SUSE bug 1168140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169392">SUSE bug 1169392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18421/">CVE-2019-18421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18421">CVE-2019-18421 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18425/">CVE-2019-18425 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18425">CVE-2019-18425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11740/">CVE-2020-11740 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11740">CVE-2020-11740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11741/">CVE-2020-11741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11741">CVE-2020-11741 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11742/">CVE-2020-11742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11742">CVE-2020-11742 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-7211/">CVE-2020-7211 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7211">CVE-2020-7211 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581752" comment="xen-4.2.5_22-47.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581753" comment="xen-doc-html-4.2.5_22-47.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581754" comment="xen-doc-pdf-4.2.5_22-47.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581755" comment="xen-kmp-default-4.2.5_22_3.0.101_0.238.TDC-47.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581756" comment="xen-libs-4.2.5_22-47.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581757" comment="xen-tools-4.2.5_22-47.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581758" comment="xen-tools-domU-4.2.5_22-47.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219614" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1154458" ref_url="https://bugzilla.suse.com/1154458" source="BUGZILLA"/>
		<reference ref_id="1154461" ref_url="https://bugzilla.suse.com/1154461" source="BUGZILLA"/>
		<reference ref_id="1155945" ref_url="https://bugzilla.suse.com/1155945" source="BUGZILLA"/>
		<reference ref_id="1157888" ref_url="https://bugzilla.suse.com/1157888" source="BUGZILLA"/>
		<reference ref_id="1158004" ref_url="https://bugzilla.suse.com/1158004" source="BUGZILLA"/>
		<reference ref_id="1158005" ref_url="https://bugzilla.suse.com/1158005" source="BUGZILLA"/>
		<reference ref_id="1158006" ref_url="https://bugzilla.suse.com/1158006" source="BUGZILLA"/>
		<reference ref_id="1158007" ref_url="https://bugzilla.suse.com/1158007" source="BUGZILLA"/>
		<reference ref_id="1168140" ref_url="https://bugzilla.suse.com/1168140" source="BUGZILLA"/>
		<reference ref_id="1172205" ref_url="https://bugzilla.suse.com/1172205" source="BUGZILLA"/>
		<reference ref_id="1173378" ref_url="https://bugzilla.suse.com/1173378" source="BUGZILLA"/>
		<reference ref_id="1173380" ref_url="https://bugzilla.suse.com/1173380" source="BUGZILLA"/>
		<reference ref_id="1175534" ref_url="https://bugzilla.suse.com/1175534" source="BUGZILLA"/>
		<reference ref_id="1176343" ref_url="https://bugzilla.suse.com/1176343" source="BUGZILLA"/>
		<reference ref_id="1176344" ref_url="https://bugzilla.suse.com/1176344" source="BUGZILLA"/>
		<reference ref_id="1176345" ref_url="https://bugzilla.suse.com/1176345" source="BUGZILLA"/>
		<reference ref_id="1177409" ref_url="https://bugzilla.suse.com/1177409" source="BUGZILLA"/>
		<reference ref_id="1177412" ref_url="https://bugzilla.suse.com/1177412" source="BUGZILLA"/>
		<reference ref_id="1177413" ref_url="https://bugzilla.suse.com/1177413" source="BUGZILLA"/>
		<reference ref_id="1177414" ref_url="https://bugzilla.suse.com/1177414" source="BUGZILLA"/>
		<reference ref_id="1178591" ref_url="https://bugzilla.suse.com/1178591" source="BUGZILLA"/>
		<reference ref_id="1178935" ref_url="https://bugzilla.suse.com/1178935" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-18424" ref_url="https://www.suse.com/security/cve/CVE-2019-18424/" source="CVE"/>
		<reference ref_id="CVE-2019-19577" ref_url="https://www.suse.com/security/cve/CVE-2019-19577/" source="CVE"/>
		<reference ref_id="CVE-2019-19578" ref_url="https://www.suse.com/security/cve/CVE-2019-19578/" source="CVE"/>
		<reference ref_id="CVE-2019-19579" ref_url="https://www.suse.com/security/cve/CVE-2019-19579/" source="CVE"/>
		<reference ref_id="CVE-2019-19580" ref_url="https://www.suse.com/security/cve/CVE-2019-19580/" source="CVE"/>
		<reference ref_id="CVE-2019-19583" ref_url="https://www.suse.com/security/cve/CVE-2019-19583/" source="CVE"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-11740" ref_url="https://www.suse.com/security/cve/CVE-2020-11740/" source="CVE"/>
		<reference ref_id="CVE-2020-11741" ref_url="https://www.suse.com/security/cve/CVE-2020-11741/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-15565" ref_url="https://www.suse.com/security/cve/CVE-2020-15565/" source="CVE"/>
		<reference ref_id="CVE-2020-15567" ref_url="https://www.suse.com/security/cve/CVE-2020-15567/" source="CVE"/>
		<reference ref_id="CVE-2020-25595" ref_url="https://www.suse.com/security/cve/CVE-2020-25595/" source="CVE"/>
		<reference ref_id="CVE-2020-25596" ref_url="https://www.suse.com/security/cve/CVE-2020-25596/" source="CVE"/>
		<reference ref_id="CVE-2020-25604" ref_url="https://www.suse.com/security/cve/CVE-2020-25604/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-27670" ref_url="https://www.suse.com/security/cve/CVE-2020-27670/" source="CVE"/>
		<reference ref_id="CVE-2020-27671" ref_url="https://www.suse.com/security/cve/CVE-2020-27671/" source="CVE"/>
		<reference ref_id="CVE-2020-27672" ref_url="https://www.suse.com/security/cve/CVE-2020-27672/" source="CVE"/>
		<reference ref_id="CVE-2020-27674" ref_url="https://www.suse.com/security/cve/CVE-2020-27674/" source="CVE"/>
		<reference ref_id="CVE-2020-28368" ref_url="https://www.suse.com/security/cve/CVE-2020-28368/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- bsc#1178935 - CVE-2020-25723: xen: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c
- bsc#1177409 - CVE-2020-27674: xen: x86 PV guest INVLPG-like flushes may leave stale TLB entries (XSA-286)
- bsc#1111331 -  CPU issues Q2 2019 aka 'Group 4' CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
- bsc#1154461 - CVE-2019-18424: passed through PCI devices may corrupt host memory after deassignment
- bsc#1155945 - CVE-2018-12207: Machine Check Error Avoidance on Page Size Change (aka IFU issue)
- bsc#1157888 - CVE-2019-19579: Device quarantine for alternate pci assignment methods
- bsc#1158004 - CVE-2019-19583: VMX: VMentry failure with debug exceptions and blocked states
- bsc#1158005 - CVE-2019-19578: Linear pagetable use / entry miscounts
- bsc#1158006 - CVE-2019-19580: Further issues with restartable PV type change operations
- bsc#1158007 - CVE-2019-19577: dynamic height for the IOMMU pagetables 
- bsc#1172205 - CVE-2020-0543: Special Register Buffer Data Sampling (SRBDS) aka 'CrossTalk' (XSA-320)
- bsc#1173378 - CVE-2020-15565: insufficient cache write- back under VT-d
- bsc#1173380 - CVE-2020-15567: non-atomic modification of live EPT PTE
- bsc#1176343 - CVE-2020-25604: race when migrating timers between x86 HVM vCPU-s (XSA-336)
- bsc#1176344 - CVE-2020-25595: PCI passthrough code reading back hardware registers (XSA-337)
- bsc#1176345 - CVE-2020-25596: x86 pv guest kernel DoS via SYSENTER (XSA-339)
- bsc#1177412 - CVE-2020-27672: Race condition in Xen mapping code (XSA-345)
- bsc#1177413 - CVE-2020-27671: undue deferral of IOMMU TLB flushes (XSA-346)
- bsc#1177414 - CVE-2020-27670: unsafe AMD IOMMU page table updates (XSA-347)
- bsc#1178591 - CVE-2020-28368: Intel RAPL sidechannel
- bsc#1175534 - CVE-2020-14364: usb: out-of-bounds r/w access issue while processing usb packets
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-09"/>
	<updated date="2020-12-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154458">SUSE bug 1154458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154461">SUSE bug 1154461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155945">SUSE bug 1155945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157888">SUSE bug 1157888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158004">SUSE bug 1158004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158005">SUSE bug 1158005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158006">SUSE bug 1158006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158007">SUSE bug 1158007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168140">SUSE bug 1168140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172205">SUSE bug 1172205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173378">SUSE bug 1173378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173380">SUSE bug 1173380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176343">SUSE bug 1176343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176344">SUSE bug 1176344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176345">SUSE bug 1176345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177409">SUSE bug 1177409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177412">SUSE bug 1177412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177413">SUSE bug 1177413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177414">SUSE bug 1177414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178935">SUSE bug 1178935</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12207">CVE-2018-12207 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18424/">CVE-2019-18424 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18424">CVE-2019-18424 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19577/">CVE-2019-19577 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19577">CVE-2019-19577 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19578/">CVE-2019-19578 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19578">CVE-2019-19578 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19579/">CVE-2019-19579 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19579">CVE-2019-19579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19580/">CVE-2019-19580 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19580">CVE-2019-19580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19583/">CVE-2019-19583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19583">CVE-2019-19583 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11740/">CVE-2020-11740 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11740">CVE-2020-11740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11741/">CVE-2020-11741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11741">CVE-2020-11741 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15565/">CVE-2020-15565 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15565">CVE-2020-15565 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15567/">CVE-2020-15567 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15567">CVE-2020-15567 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25595/">CVE-2020-25595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25595">CVE-2020-25595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25596/">CVE-2020-25596 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25596">CVE-2020-25596 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25604/">CVE-2020-25604 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25604">CVE-2020-25604 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25723">CVE-2020-25723 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27670/">CVE-2020-27670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27670">CVE-2020-27670 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27671/">CVE-2020-27671 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27671">CVE-2020-27671 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27672/">CVE-2020-27672 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27672">CVE-2020-27672 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27674/">CVE-2020-27674 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27674">CVE-2020-27674 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28368/">CVE-2020-28368 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28368">CVE-2020-28368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581759" comment="xen-4.2.5_24-47.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581760" comment="xen-doc-html-4.2.5_24-47.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581761" comment="xen-doc-pdf-4.2.5_24-47.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581762" comment="xen-kmp-default-4.2.5_24_3.0.101_0.238.TDC-47.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581763" comment="xen-libs-4.2.5_24-47.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581764" comment="xen-tools-4.2.5_24-47.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581765" comment="xen-tools-domU-4.2.5_24-47.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219615" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1022555" ref_url="https://bugzilla.suse.com/1022555" source="BUGZILLA"/>
		<reference ref_id="1029827" ref_url="https://bugzilla.suse.com/1029827" source="BUGZILLA"/>
		<reference ref_id="1091107" ref_url="https://bugzilla.suse.com/1091107" source="BUGZILLA"/>
		<reference ref_id="1179477" ref_url="https://bugzilla.suse.com/1179477" source="BUGZILLA"/>
		<reference ref_id="1179496" ref_url="https://bugzilla.suse.com/1179496" source="BUGZILLA"/>
		<reference ref_id="1179498" ref_url="https://bugzilla.suse.com/1179498" source="BUGZILLA"/>
		<reference ref_id="1179501" ref_url="https://bugzilla.suse.com/1179501" source="BUGZILLA"/>
		<reference ref_id="1179502" ref_url="https://bugzilla.suse.com/1179502" source="BUGZILLA"/>
		<reference ref_id="1179506" ref_url="https://bugzilla.suse.com/1179506" source="BUGZILLA"/>
		<reference ref_id="1179514" ref_url="https://bugzilla.suse.com/1179514" source="BUGZILLA"/>
		<reference ref_id="1179516" ref_url="https://bugzilla.suse.com/1179516" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29480" ref_url="https://www.suse.com/security/cve/CVE-2020-29480/" source="CVE"/>
		<reference ref_id="CVE-2020-29481" ref_url="https://www.suse.com/security/cve/CVE-2020-29481/" source="CVE"/>
		<reference ref_id="CVE-2020-29483" ref_url="https://www.suse.com/security/cve/CVE-2020-29483/" source="CVE"/>
		<reference ref_id="CVE-2020-29484" ref_url="https://www.suse.com/security/cve/CVE-2020-29484/" source="CVE"/>
		<reference ref_id="CVE-2020-29566" ref_url="https://www.suse.com/security/cve/CVE-2020-29566/" source="CVE"/>
		<reference ref_id="CVE-2020-29570" ref_url="https://www.suse.com/security/cve/CVE-2020-29570/" source="CVE"/>
		<reference ref_id="CVE-2020-29571" ref_url="https://www.suse.com/security/cve/CVE-2020-29571/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed:

- CVE-2020-29480: Fixed an issue which could have allowed leak of non-sensitive data to administrator guests (bsc#1179496 XSA-115).
- CVE-2020-29481: Fixed an issue which could have allowd to new domains to inherit existing node permissions (bsc#1179498 XSA-322).
- CVE-2020-29484: Fixed an issue where guests could crash xenstored via watchs (bsc#1179501 XSA-324).
- CVE-2020-29483: Fixed an issue where guests could disturb domain cleanup (bsc#1179502 XSA-325).
- CVE-2020-29566: Fixed an undue recursion in x86 HVM context switch code (bsc#1179506 XSA-348).
- CVE-2020-29570: Fixed an issue where FIFO event channels control block related ordering (bsc#1179514 XSA-358).
- CVE-2020-29571: Fixed an issue where FIFO event channels control structure ordering (bsc#1179516 XSA-359).
- CVE-2020-29130: Fixed an out-of-bounds access while processing ARP packets (bsc#1179477).

Non-security issues fixed:

- bsc#1022555 - L3: Timeout in 'execution of /etc/xen/scripts/block add'
- bsc#1029827 - Forward port xenstored
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1022555">SUSE bug 1022555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029827">SUSE bug 1029827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179496">SUSE bug 1179496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179498">SUSE bug 1179498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179501">SUSE bug 1179501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179502">SUSE bug 1179502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179506">SUSE bug 1179506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179514">SUSE bug 1179514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179516">SUSE bug 1179516</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29130">CVE-2020-29130 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29480/">CVE-2020-29480 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29480">CVE-2020-29480 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29481/">CVE-2020-29481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29481">CVE-2020-29481 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29483/">CVE-2020-29483 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29483">CVE-2020-29483 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29484/">CVE-2020-29484 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29484">CVE-2020-29484 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29566/">CVE-2020-29566 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29566">CVE-2020-29566 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29570/">CVE-2020-29570 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29570">CVE-2020-29570 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29571/">CVE-2020-29571 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29571">CVE-2020-29571 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581766" comment="xen-4.2.5_26-47.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581767" comment="xen-doc-html-4.2.5_26-47.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581768" comment="xen-doc-pdf-4.2.5_26-47.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581769" comment="xen-kmp-default-4.2.5_26_3.0.101_0.241.TDC-47.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581770" comment="xen-libs-4.2.5_26-47.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581771" comment="xen-tools-4.2.5_26-47.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581772" comment="xen-tools-domU-4.2.5_26-47.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219616" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182155" ref_url="https://bugzilla.suse.com/1182155" source="BUGZILLA"/>
		<reference ref_id="1182654" ref_url="https://bugzilla.suse.com/1182654" source="BUGZILLA"/>
		<reference ref_id="1182846" ref_url="https://bugzilla.suse.com/1182846" source="BUGZILLA"/>
		<reference ref_id="1182975" ref_url="https://bugzilla.suse.com/1182975" source="BUGZILLA"/>
		<reference ref_id="1186429" ref_url="https://bugzilla.suse.com/1186429" source="BUGZILLA"/>
		<reference ref_id="1186433" ref_url="https://bugzilla.suse.com/1186433" source="BUGZILLA"/>
		<reference ref_id="1187369" ref_url="https://bugzilla.suse.com/1187369" source="BUGZILLA"/>
		<reference ref_id="1187376" ref_url="https://bugzilla.suse.com/1187376" source="BUGZILLA"/>
		<reference ref_id="1187378" ref_url="https://bugzilla.suse.com/1187378" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0089" ref_url="https://www.suse.com/security/cve/CVE-2021-0089/" source="CVE"/>
		<reference ref_id="CVE-2021-20255" ref_url="https://www.suse.com/security/cve/CVE-2021-20255/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-28692" ref_url="https://www.suse.com/security/cve/CVE-2021-28692/" source="CVE"/>
		<reference ref_id="CVE-2021-3419" ref_url="https://www.suse.com/security/cve/CVE-2021-3419/" source="CVE"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="CVE-2021-3595" ref_url="https://www.suse.com/security/cve/CVE-2021-3595/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-0089: Fixed speculative code store bypass (XSA-375) (bsc#1186433).
- CVE-2021-3594: Fixed an invalid pointer initialization may lead to information disclosure (udp) (bsc#1187378).
- CVE-2021-28692: Fixed an inappropriate x86 IOMMU timeout detection / handling (XSA-373) (bsc#1186429).
- CVE-2021-3419: Fixed a stack overflow induced by infinite recursion issue in rtl8139 (bsc#1182975).
- CVE-2021-3592: Fixed an invalid pointer initialization may lead to information disclosure in slirp (bootp) (bsc#1187369).
- CVE-2021-3595: Fixed invalid pointer initialization may lead to information disclosure in slirp (tftp) (bsc#1187376).
- CVE-2021-20257: Fixed an infinite loop issue in the e1000 NIC emulator (bsc#1182846).
- CVE-2021-20255: Fixed stack overflow via infinite recursion in eepro100 (bsc#1182654).

Bugfixes:

- bsc#1182155 - L3: xenstored crashing with segfault after applying
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182155">SUSE bug 1182155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182654">SUSE bug 1182654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182846">SUSE bug 1182846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182975">SUSE bug 1182975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186429">SUSE bug 1186429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186433">SUSE bug 1186433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187369">SUSE bug 1187369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187376">SUSE bug 1187376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187378">SUSE bug 1187378</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0089/">CVE-2021-0089 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0089">CVE-2021-0089 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20255/">CVE-2021-20255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20255">CVE-2021-20255 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-28692/">CVE-2021-28692 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28692">CVE-2021-28692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3419/">CVE-2021-3419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3419">CVE-2021-3419 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3592">CVE-2021-3592 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3594">CVE-2021-3594 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3595/">CVE-2021-3595 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3595">CVE-2021-3595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994226" comment="xen-4.2.5_28-47.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994227" comment="xen-doc-html-4.2.5_28-47.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994228" comment="xen-doc-pdf-4.2.5_28-47.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994229" comment="xen-kmp-default-4.2.5_28_3.0.101_0.253.TDC-47.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994230" comment="xen-libs-4.2.5_28-47.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994231" comment="xen-tools-4.2.5_28-47.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994232" comment="xen-tools-domU-4.2.5_28-47.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219617" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178963" ref_url="https://bugzilla.suse.com/1178963" source="BUGZILLA"/>
		<reference ref_id="1189373" ref_url="https://bugzilla.suse.com/1189373" source="BUGZILLA"/>
		<reference ref_id="1189376" ref_url="https://bugzilla.suse.com/1189376" source="BUGZILLA"/>
		<reference ref_id="1189378" ref_url="https://bugzilla.suse.com/1189378" source="BUGZILLA"/>
		<reference ref_id="1189632" ref_url="https://bugzilla.suse.com/1189632" source="BUGZILLA"/>
		<reference ref_id="1192554" ref_url="https://bugzilla.suse.com/1192554" source="BUGZILLA"/>
		<reference ref_id="1192559" ref_url="https://bugzilla.suse.com/1192559" source="BUGZILLA"/>
		<reference ref_id="1194581" ref_url="https://bugzilla.suse.com/1194581" source="BUGZILLA"/>
		<reference ref_id="1197423" ref_url="https://bugzilla.suse.com/1197423" source="BUGZILLA"/>
		<reference ref_id="1199965" ref_url="https://bugzilla.suse.com/1199965" source="BUGZILLA"/>
		<reference ref_id="1199966" ref_url="https://bugzilla.suse.com/1199966" source="BUGZILLA"/>
		<reference ref_id="1200549" ref_url="https://bugzilla.suse.com/1200549" source="BUGZILLA"/>
		<reference ref_id="1201394" ref_url="https://bugzilla.suse.com/1201394" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29040" ref_url="https://www.suse.com/security/cve/CVE-2020-29040/" source="CVE"/>
		<reference ref_id="CVE-2021-28694" ref_url="https://www.suse.com/security/cve/CVE-2021-28694/" source="CVE"/>
		<reference ref_id="CVE-2021-28695" ref_url="https://www.suse.com/security/cve/CVE-2021-28695/" source="CVE"/>
		<reference ref_id="CVE-2021-28696" ref_url="https://www.suse.com/security/cve/CVE-2021-28696/" source="CVE"/>
		<reference ref_id="CVE-2021-28697" ref_url="https://www.suse.com/security/cve/CVE-2021-28697/" source="CVE"/>
		<reference ref_id="CVE-2021-28698" ref_url="https://www.suse.com/security/cve/CVE-2021-28698/" source="CVE"/>
		<reference ref_id="CVE-2021-28701" ref_url="https://www.suse.com/security/cve/CVE-2021-28701/" source="CVE"/>
		<reference ref_id="CVE-2021-28705" ref_url="https://www.suse.com/security/cve/CVE-2021-28705/" source="CVE"/>
		<reference ref_id="CVE-2021-28706" ref_url="https://www.suse.com/security/cve/CVE-2021-28706/" source="CVE"/>
		<reference ref_id="CVE-2021-28709" ref_url="https://www.suse.com/security/cve/CVE-2021-28709/" source="CVE"/>
		<reference ref_id="CVE-2022-21123" ref_url="https://www.suse.com/security/cve/CVE-2022-21123/" source="CVE"/>
		<reference ref_id="CVE-2022-21125" ref_url="https://www.suse.com/security/cve/CVE-2022-21125/" source="CVE"/>
		<reference ref_id="CVE-2022-21166" ref_url="https://www.suse.com/security/cve/CVE-2022-21166/" source="CVE"/>
		<reference ref_id="CVE-2022-23034" ref_url="https://www.suse.com/security/cve/CVE-2022-23034/" source="CVE"/>
		<reference ref_id="CVE-2022-26356" ref_url="https://www.suse.com/security/cve/CVE-2022-26356/" source="CVE"/>
		<reference ref_id="CVE-2022-26362" ref_url="https://www.suse.com/security/cve/CVE-2022-26362/" source="CVE"/>
		<reference ref_id="CVE-2022-26363" ref_url="https://www.suse.com/security/cve/CVE-2022-26363/" source="CVE"/>
		<reference ref_id="CVE-2022-26364" ref_url="https://www.suse.com/security/cve/CVE-2022-26364/" source="CVE"/>
		<reference ref_id="CVE-2022-33745" ref_url="https://www.suse.com/security/cve/CVE-2022-33745/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-28697: Fixed a race condition that could cause grant table
  v2 status pages to remain accessible after deallocation. Only x86
  HVM and PVH guests permitted to use grant table v2 interfaces can
  leverage this vulnerability (XSA-379, bsc#1189376).
- CVE-2021-28698: Fixed grant mapping tracking logic to avoid long
  running loops that could lead to denial of service (XSA-380, bsc#1189378).
- CVE-2021-28701: Fixed a race condition that could cause grant table
  v2 status pages to remain accessible after deallocation. Only x86
  HVM and PVH guests permitted to use grant table v2 interfaces can
  leverage this vulnerability (XSA-384, bsc#1189632).
- CVE-2021-28706: Fixed an integer overflow that could cause certain
  guests to exceed their designated memory limit. Only hosts with more
  than 16 TiB of memory are affected (XSA-385, bsc#1192554).
- CVE-2021-28694,CVE-2021-28695,CVE-2021-28696: Fixed several issues
  with direct mapping via ACPI tables. Only x86 systems with IOMMUs
  and firmware specifying memory regions to be identity mapped are
  affected (XSA-378, bsc#1189373).
- CVE-2021-28705,CVE-2021-28709: Fixed an incorrect handling of
  partially successful states in P2M hypercalls. Only x86 HVM and PVH
  guests started in populate-on-demand mode were able to leverage the
  vulnerability (XSA-389, bsc#1192559).
- CVE-2022-23034: Fixed a reference count underflow in grant mappings
  that would lead to denial of service. Only x86 PV guests could
  leverage the vulnerability (XSA-394, bsc#1194581).
- CVE-2022-26356: Fixed a race condition in log dirty tracking which
  could lead to denial of service via memory leakage (XSA-397, bsc#1197423).
- CVE-2022-26362: Fixed a type reference acquisition race condition
  which could lead to x86 PV guest administrators taking over the whole
  system (XSA-401, bsc#1199965).
- CVE-2022-26363,CVE-2022-26364: Fixed a logic flaw that could allow
  x86 PV guest administrators to take over the whole system due to
  CPU-induced cache non-coherency (XSA-402, bsc#1199966).
- CVE-2022-21123,CVE-2022-21125,CVE-2022-21166: Fixed an MMIO stale
  data issue that could cause an attacker to leak sensitive information
  from the hypervisor or other guests. This issue affects only Intel
  based x86 processors (XSA-404, bsc#1200549).
- CVE-2022-33745: Fixed a logic flaw introduced in the fix for XSA-401
  which would omit necessary TLB flushes, leading to memory exhaustion.
  Only x86 PV guests running in shadow mode can trigger this vulnerability
  (XSA-408, bsc#1201394).
- CVE-2020-29040: Fixed a memory corruption issue introduced in the
  fix for XSA-346, which could lead to denial of service. Only x86 HVM
  and PVH guests can leverage the vulnerability.(XSA-355, bsc#1178963).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-30"/>
	<updated date="2022-08-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178963">SUSE bug 1178963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189373">SUSE bug 1189373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189376">SUSE bug 1189376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189378">SUSE bug 1189378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189632">SUSE bug 1189632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192554">SUSE bug 1192554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192559">SUSE bug 1192559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194581">SUSE bug 1194581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197423">SUSE bug 1197423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199965">SUSE bug 1199965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199966">SUSE bug 1199966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200549">SUSE bug 1200549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201394">SUSE bug 1201394</bugzilla>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-29040/">CVE-2020-29040 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29040">CVE-2020-29040 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28694/">CVE-2021-28694 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28694">CVE-2021-28694 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28695/">CVE-2021-28695 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28695">CVE-2021-28695 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28696/">CVE-2021-28696 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28696">CVE-2021-28696 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28697/">CVE-2021-28697 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28697">CVE-2021-28697 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28698/">CVE-2021-28698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28698">CVE-2021-28698 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28701/">CVE-2021-28701 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28701">CVE-2021-28701 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28705/">CVE-2021-28705 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28705">CVE-2021-28705 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28706/">CVE-2021-28706 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28706">CVE-2021-28706 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28709/">CVE-2021-28709 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28709">CVE-2021-28709 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21123/">CVE-2022-21123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21123">CVE-2022-21123 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21125/">CVE-2022-21125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21125">CVE-2022-21125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21166/">CVE-2022-21166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21166">CVE-2022-21166 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23034/">CVE-2022-23034 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23034">CVE-2022-23034 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26356/">CVE-2022-26356 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26356">CVE-2022-26356 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26362/">CVE-2022-26362 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26362">CVE-2022-26362 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26363/">CVE-2022-26363 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26363">CVE-2022-26363 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26364/">CVE-2022-26364 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26364">CVE-2022-26364 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-33745/">CVE-2022-33745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33745">CVE-2022-33745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994233" comment="xen-4.2.5_30-47.52.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994234" comment="xen-doc-html-4.2.5_30-47.52.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994235" comment="xen-doc-pdf-4.2.5_30-47.52.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994236" comment="xen-kmp-default-4.2.5_30_3.0.101_0.258.TDC-47.52.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994237" comment="xen-libs-4.2.5_30-47.52.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994238" comment="xen-tools-4.2.5_30-47.52.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994239" comment="xen-tools-domU-4.2.5_30-47.52.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219618" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185104" ref_url="https://bugzilla.suse.com/1185104" source="BUGZILLA"/>
		<reference ref_id="1199657" ref_url="https://bugzilla.suse.com/1199657" source="BUGZILLA"/>
		<reference ref_id="1201456" ref_url="https://bugzilla.suse.com/1201456" source="BUGZILLA"/>
		<reference ref_id="1201457" ref_url="https://bugzilla.suse.com/1201457" source="BUGZILLA"/>
		<reference ref_id="1201469" ref_url="https://bugzilla.suse.com/1201469" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28689" ref_url="https://www.suse.com/security/cve/CVE-2021-28689/" source="CVE"/>
		<reference ref_id="CVE-2022-23816" ref_url="https://www.suse.com/security/cve/CVE-2022-23816/" source="CVE"/>
		<reference ref_id="CVE-2022-23825" ref_url="https://www.suse.com/security/cve/CVE-2022-23825/" source="CVE"/>
		<reference ref_id="CVE-2022-29900" ref_url="https://www.suse.com/security/cve/CVE-2022-29900/" source="CVE"/>
		<description>
This update for xen fixes the following issues:
  
- Fixed retbleed arbitrary speculative code execution with return instructions (XSA-407) (bsc#1201469):
  - CVE-2022-23816 (bnc#1201456)
  - CVE-2022-23825 (bnc#1201457)
  - CVE-2022-29900 (bnc#1199657)

- CVE-2021-28689: Fixed Speculative vulnerabilities with bare (non-shim) 32-bit PV guests (XSA-370) (bsc#1185104).

Bugfixes:
- Optimized existing fix for XSA-325 (bsc#1179502).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-21"/>
	<updated date="2022-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185104">SUSE bug 1185104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199657">SUSE bug 1199657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201456">SUSE bug 1201456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201457">SUSE bug 1201457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201469">SUSE bug 1201469</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28689/">CVE-2021-28689 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28689">CVE-2021-28689 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23816/">CVE-2022-23816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-23816">CVE-2022-23816 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23825/">CVE-2022-23825 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23825">CVE-2022-23825 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29900/">CVE-2022-29900 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29900">CVE-2022-29900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994240" comment="xen-4.2.5_32-47.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994241" comment="xen-doc-html-4.2.5_32-47.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994242" comment="xen-doc-pdf-4.2.5_32-47.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994243" comment="xen-kmp-default-4.2.5_32_3.0.101_0.258.TDC-47.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994244" comment="xen-libs-4.2.5_32-47.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994245" comment="xen-tools-4.2.5_32-47.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994246" comment="xen-tools-domU-4.2.5_32-47.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219619" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1203806" ref_url="https://bugzilla.suse.com/1203806" source="BUGZILLA"/>
		<reference ref_id="1203807" ref_url="https://bugzilla.suse.com/1203807" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-33746" ref_url="https://www.suse.com/security/cve/CVE-2022-33746/" source="CVE"/>
		<reference ref_id="CVE-2022-33748" ref_url="https://www.suse.com/security/cve/CVE-2022-33748/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

  - CVE-2022-33746: Fixed Denial of Service due to locking issues in the P2M pool (bsc#1203806).
  - CVE-2022-33748: Fixed Denial of Service due to lock order inversion in transitive grant copy handling (bsc#1203807).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-26"/>
	<updated date="2022-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203806">SUSE bug 1203806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203807">SUSE bug 1203807</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-33746/">CVE-2022-33746 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33746">CVE-2022-33746 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-33748/">CVE-2022-33748 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33748">CVE-2022-33748 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994247" comment="xen-4.2.5_34-47.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994248" comment="xen-doc-html-4.2.5_34-47.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994249" comment="xen-doc-pdf-4.2.5_34-47.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994250" comment="xen-kmp-default-4.2.5_34_3.0.101_0.261.TDC-47.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994251" comment="xen-libs-4.2.5_34-47.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994252" comment="xen-tools-4.2.5_34-47.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994253" comment="xen-tools-domU-4.2.5_34-47.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219620" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204482" ref_url="https://bugzilla.suse.com/1204482" source="BUGZILLA"/>
		<reference ref_id="1204485" ref_url="https://bugzilla.suse.com/1204485" source="BUGZILLA"/>
		<reference ref_id="1204487" ref_url="https://bugzilla.suse.com/1204487" source="BUGZILLA"/>
		<reference ref_id="1204489" ref_url="https://bugzilla.suse.com/1204489" source="BUGZILLA"/>
		<reference ref_id="1204490" ref_url="https://bugzilla.suse.com/1204490" source="BUGZILLA"/>
		<reference ref_id="1204494" ref_url="https://bugzilla.suse.com/1204494" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42309" ref_url="https://www.suse.com/security/cve/CVE-2022-42309/" source="CVE"/>
		<reference ref_id="CVE-2022-42310" ref_url="https://www.suse.com/security/cve/CVE-2022-42310/" source="CVE"/>
		<reference ref_id="CVE-2022-42311" ref_url="https://www.suse.com/security/cve/CVE-2022-42311/" source="CVE"/>
		<reference ref_id="CVE-2022-42312" ref_url="https://www.suse.com/security/cve/CVE-2022-42312/" source="CVE"/>
		<reference ref_id="CVE-2022-42313" ref_url="https://www.suse.com/security/cve/CVE-2022-42313/" source="CVE"/>
		<reference ref_id="CVE-2022-42314" ref_url="https://www.suse.com/security/cve/CVE-2022-42314/" source="CVE"/>
		<reference ref_id="CVE-2022-42315" ref_url="https://www.suse.com/security/cve/CVE-2022-42315/" source="CVE"/>
		<reference ref_id="CVE-2022-42316" ref_url="https://www.suse.com/security/cve/CVE-2022-42316/" source="CVE"/>
		<reference ref_id="CVE-2022-42317" ref_url="https://www.suse.com/security/cve/CVE-2022-42317/" source="CVE"/>
		<reference ref_id="CVE-2022-42318" ref_url="https://www.suse.com/security/cve/CVE-2022-42318/" source="CVE"/>
		<reference ref_id="CVE-2022-42320" ref_url="https://www.suse.com/security/cve/CVE-2022-42320/" source="CVE"/>
		<reference ref_id="CVE-2022-42321" ref_url="https://www.suse.com/security/cve/CVE-2022-42321/" source="CVE"/>
		<reference ref_id="CVE-2022-42322" ref_url="https://www.suse.com/security/cve/CVE-2022-42322/" source="CVE"/>
		<reference ref_id="CVE-2022-42323" ref_url="https://www.suse.com/security/cve/CVE-2022-42323/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-42311, CVE-2022-42312, CVE-2022-42313, CVE-2022-42314, CVE-2022-42315, CVE-2022-42316, CVE-2022-42317, CVE-2022-42318: xen: Xenstore: Guests can let xenstored run out of memory (bsc#1204482)
- CVE-2022-42309: xen: Xenstore: Guests can crash xenstored (bsc#1204485)
- CVE-2022-42310: xen: Xenstore: Guests can create orphaned Xenstore nodes (bsc#1204487)
- CVE-2022-42320: xen: Xenstore: Guests can get access to Xenstore nodes of deleted domains (bsc#1204489)
- CVE-2022-42321: xen: Xenstore: Guests can crash xenstored via exhausting the stack (bsc#1204490)
- CVE-2022-42322,CVE-2022-42323: xen: Xenstore: cooperating guests can create arbitrary numbers of nodes (bsc#1204494)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-17"/>
	<updated date="2022-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204482">SUSE bug 1204482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204485">SUSE bug 1204485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204487">SUSE bug 1204487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204489">SUSE bug 1204489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204490">SUSE bug 1204490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204494">SUSE bug 1204494</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42309/">CVE-2022-42309 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42309">CVE-2022-42309 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42310/">CVE-2022-42310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42310">CVE-2022-42310 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42311/">CVE-2022-42311 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42311">CVE-2022-42311 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42312/">CVE-2022-42312 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42312">CVE-2022-42312 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42313/">CVE-2022-42313 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42313">CVE-2022-42313 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42314/">CVE-2022-42314 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42314">CVE-2022-42314 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42315/">CVE-2022-42315 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42315">CVE-2022-42315 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42316/">CVE-2022-42316 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42316">CVE-2022-42316 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42317/">CVE-2022-42317 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42317">CVE-2022-42317 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42318/">CVE-2022-42318 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42318">CVE-2022-42318 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42320/">CVE-2022-42320 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42320">CVE-2022-42320 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42321/">CVE-2022-42321 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42321">CVE-2022-42321 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42322/">CVE-2022-42322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42322">CVE-2022-42322 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42323/">CVE-2022-42323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42323">CVE-2022-42323 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994254" comment="xen-4.2.5_36-47.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994255" comment="xen-doc-html-4.2.5_36-47.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994256" comment="xen-doc-pdf-4.2.5_36-47.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994257" comment="xen-kmp-default-4.2.5_36_3.0.101_0.261.TDC-47.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994258" comment="xen-libs-4.2.5_36-47.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994259" comment="xen-tools-4.2.5_36-47.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994260" comment="xen-tools-domU-4.2.5_36-47.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219621" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1205209" ref_url="https://bugzilla.suse.com/1205209" source="BUGZILLA"/>
		<reference ref_id="1209017" ref_url="https://bugzilla.suse.com/1209017" source="BUGZILLA"/>
		<reference ref_id="1209188" ref_url="https://bugzilla.suse.com/1209188" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23824" ref_url="https://www.suse.com/security/cve/CVE-2022-23824/" source="CVE"/>
		<reference ref_id="CVE-2022-42332" ref_url="https://www.suse.com/security/cve/CVE-2022-42332/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-42332: Fixed use-after-free in x86 shadow plus log-dirty mode (bsc#1209017).
- CVE-2022-23824: Fixed multiple speculative security issues (bsc#1205209).

The following non-security bug was fixed:

- Upstream bug fixes (bsc#1027519).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-21"/>
	<updated date="2023-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205209">SUSE bug 1205209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209017">SUSE bug 1209017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209188">SUSE bug 1209188</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23824/">CVE-2022-23824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23824">CVE-2022-23824 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42332/">CVE-2022-42332 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42332">CVE-2022-42332 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994261" comment="xen-4.2.5_38-47.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994262" comment="xen-doc-html-4.2.5_38-47.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994263" comment="xen-doc-pdf-4.2.5_38-47.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994264" comment="xen-kmp-default-4.2.5_38_3.0.101_0.266.TDC-47.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994265" comment="xen-libs-4.2.5_38-47.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994266" comment="xen-tools-4.2.5_38-47.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994267" comment="xen-tools-domU-4.2.5_38-47.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219622" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="801663" ref_url="https://bugzilla.suse.com/801663" source="BUGZILLA"/>
		<reference ref_id="808085" ref_url="https://bugzilla.suse.com/808085" source="BUGZILLA"/>
		<reference ref_id="808269" ref_url="https://bugzilla.suse.com/808269" source="BUGZILLA"/>
		<reference ref_id="817210" ref_url="https://bugzilla.suse.com/817210" source="BUGZILLA"/>
		<reference ref_id="820917" ref_url="https://bugzilla.suse.com/820917" source="BUGZILLA"/>
		<reference ref_id="820919" ref_url="https://bugzilla.suse.com/820919" source="BUGZILLA"/>
		<reference ref_id="820920" ref_url="https://bugzilla.suse.com/820920" source="BUGZILLA"/>
		<reference ref_id="823011" ref_url="https://bugzilla.suse.com/823011" source="BUGZILLA"/>
		<reference ref_id="823608" ref_url="https://bugzilla.suse.com/823608" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2194" ref_url="https://www.suse.com/security/cve/CVE-2013-2194/" source="CVE"/>
		<reference ref_id="CVE-2013-2195" ref_url="https://www.suse.com/security/cve/CVE-2013-2195/" source="CVE"/>
		<reference ref_id="CVE-2013-2196" ref_url="https://www.suse.com/security/cve/CVE-2013-2196/" source="CVE"/>
		<description>

The Xen hypervisor and toolset has been updated to 4.2.2_06 to fix various 
bugs and security issues:

The following security issues have been addressed:

    * CVE-2013-2194: Various integer overflows in the ELF loader were
      fixed. (XSA-55)
    * CVE-2013-2195: Various pointer dereferences issues in the ELF loader
      were fixed. (XSA-55)
    * CVE-2013-2196: Various other problems in the ELF loader were fixed.
      (XSA-55)
    * CVE-2013-2078: A Hypervisor crash due to missing exception recovery
      on XSETBV was fixed. (XSA-54)
    * CVE-2013-2077: A Hypervisor crash due to missing exception recovery
      on XRSTOR was fixed. (XSA-53)
    * CVE-2013-2211: libxl allowed guest write access to sensitive console
      related xenstore keys. (XSA-57)
    * CVE-2013-2076: An information leak on XSAVE/XRSTOR capable AMD CPUs
      (XSA-52) was fixed, where parts of this state could leak to other
      VMs.

Also the following bugs have been fixed:

    * performance issues in mirror lvm (bnc#801663)
    * aacraid driver panics mapping INT A when booting kernel-xen
      (bnc#808085)
    * Fully Virtualized Windows VM install failed on Ivy Bridge platforms
      with Xen kernel (bnc#808269)
    * Did not boot with i915 graphics controller with VT-d enabled
      (bnc#817210)

Security Issue references:

    * CVE-2013-2194
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194&gt;
    * CVE-2013-2195
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195&gt;
    * CVE-2013-2196
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-07-15"/>
	<updated date="2013-07-15"/>
	<bugzilla href="https://bugzilla.suse.com/801663">SUSE bug 801663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808085">SUSE bug 808085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808269">SUSE bug 808269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817210">SUSE bug 817210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820917">SUSE bug 820917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820919">SUSE bug 820919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820920">SUSE bug 820920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823011">SUSE bug 823011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823608">SUSE bug 823608</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2194/">CVE-2013-2194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2194">CVE-2013-2194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2195/">CVE-2013-2195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2195">CVE-2013-2195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2196/">CVE-2013-2196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2196">CVE-2013-2196 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567198" comment="xen-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567199" comment="xen-doc-html-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567200" comment="xen-doc-pdf-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567201" comment="xen-kmp-default-4.2.2_06_3.0.82_0.7-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567202" comment="xen-kmp-pae-4.2.2_06_3.0.82_0.7-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567203" comment="xen-libs-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567204" comment="xen-libs-32bit-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567205" comment="xen-tools-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567206" comment="xen-tools-domU-4.2.2_06-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567198" comment="xen-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567199" comment="xen-doc-html-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567200" comment="xen-doc-pdf-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567201" comment="xen-kmp-default-4.2.2_06_3.0.82_0.7-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567202" comment="xen-kmp-pae-4.2.2_06_3.0.82_0.7-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567203" comment="xen-libs-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567204" comment="xen-libs-32bit-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567205" comment="xen-tools-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567206" comment="xen-tools-domU-4.2.2_06-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567198" comment="xen-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567199" comment="xen-doc-html-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567200" comment="xen-doc-pdf-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567201" comment="xen-kmp-default-4.2.2_06_3.0.82_0.7-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567202" comment="xen-kmp-pae-4.2.2_06_3.0.82_0.7-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567203" comment="xen-libs-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567204" comment="xen-libs-32bit-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567205" comment="xen-tools-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567206" comment="xen-tools-domU-4.2.2_06-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219623" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="817799" ref_url="https://bugzilla.suse.com/817799" source="BUGZILLA"/>
		<reference ref_id="824676" ref_url="https://bugzilla.suse.com/824676" source="BUGZILLA"/>
		<reference ref_id="826882" ref_url="https://bugzilla.suse.com/826882" source="BUGZILLA"/>
		<reference ref_id="828623" ref_url="https://bugzilla.suse.com/828623" source="BUGZILLA"/>
		<reference ref_id="833251" ref_url="https://bugzilla.suse.com/833251" source="BUGZILLA"/>
		<reference ref_id="833483" ref_url="https://bugzilla.suse.com/833483" source="BUGZILLA"/>
		<reference ref_id="833796" ref_url="https://bugzilla.suse.com/833796" source="BUGZILLA"/>
		<reference ref_id="834751" ref_url="https://bugzilla.suse.com/834751" source="BUGZILLA"/>
		<reference ref_id="835896" ref_url="https://bugzilla.suse.com/835896" source="BUGZILLA"/>
		<reference ref_id="836239" ref_url="https://bugzilla.suse.com/836239" source="BUGZILLA"/>
		<reference ref_id="839596" ref_url="https://bugzilla.suse.com/839596" source="BUGZILLA"/>
		<reference ref_id="839600" ref_url="https://bugzilla.suse.com/839600" source="BUGZILLA"/>
		<reference ref_id="840196" ref_url="https://bugzilla.suse.com/840196" source="BUGZILLA"/>
		<reference ref_id="840592" ref_url="https://bugzilla.suse.com/840592" source="BUGZILLA"/>
		<reference ref_id="841766" ref_url="https://bugzilla.suse.com/841766" source="BUGZILLA"/>
		<reference ref_id="842511" ref_url="https://bugzilla.suse.com/842511" source="BUGZILLA"/>
		<reference ref_id="842512" ref_url="https://bugzilla.suse.com/842512" source="BUGZILLA"/>
		<reference ref_id="842513" ref_url="https://bugzilla.suse.com/842513" source="BUGZILLA"/>
		<reference ref_id="842514" ref_url="https://bugzilla.suse.com/842514" source="BUGZILLA"/>
		<reference ref_id="842515" ref_url="https://bugzilla.suse.com/842515" source="BUGZILLA"/>
		<reference ref_id="845520" ref_url="https://bugzilla.suse.com/845520" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1432" ref_url="https://www.suse.com/security/cve/CVE-2013-1432/" source="CVE"/>
		<reference ref_id="CVE-2013-1442" ref_url="https://www.suse.com/security/cve/CVE-2013-1442/" source="CVE"/>
		<reference ref_id="CVE-2013-1918" ref_url="https://www.suse.com/security/cve/CVE-2013-1918/" source="CVE"/>
		<reference ref_id="CVE-2013-4355" ref_url="https://www.suse.com/security/cve/CVE-2013-4355/" source="CVE"/>
		<reference ref_id="CVE-2013-4361" ref_url="https://www.suse.com/security/cve/CVE-2013-4361/" source="CVE"/>
		<reference ref_id="CVE-2013-4368" ref_url="https://www.suse.com/security/cve/CVE-2013-4368/" source="CVE"/>
		<reference ref_id="CVE-2013-4369" ref_url="https://www.suse.com/security/cve/CVE-2013-4369/" source="CVE"/>
		<reference ref_id="CVE-2013-4370" ref_url="https://www.suse.com/security/cve/CVE-2013-4370/" source="CVE"/>
		<reference ref_id="CVE-2013-4371" ref_url="https://www.suse.com/security/cve/CVE-2013-4371/" source="CVE"/>
		<reference ref_id="CVE-2013-4375" ref_url="https://www.suse.com/security/cve/CVE-2013-4375/" source="CVE"/>
		<reference ref_id="CVE-2013-4416" ref_url="https://www.suse.com/security/cve/CVE-2013-4416/" source="CVE"/>
		<description>

XEN has been updated to version 4.2.3 c/s 26170, fixing various bugs and 
security issues.

    * CVE-2013-4416: XSA-72: Fixed ocaml xenstored that mishandled
      oversized message replies
    * CVE-2013-4355: XSA-63: Fixed information leaks through I/O
      instruction emulation
    * CVE-2013-4361: XSA-66: Fixed information leak through fbld
      instruction emulation
    * CVE-2013-4368: XSA-67: Fixed information leak through outs
      instruction emulation
    * CVE-2013-4369: XSA-68: Fixed possible null dereference when parsing
      vif ratelimiting info
    * CVE-2013-4370: XSA-69: Fixed misplaced free in ocaml
      xc_vcpu_getaffinity stub
    * CVE-2013-4371: XSA-70: Fixed use-after-free in libxl_list_cpupool
      under memory pressure
    * CVE-2013-4375: XSA-71: xen: qemu disk backend (qdisk) resource leak
    * CVE-2013-1442: XSA-62: Fixed information leak on AVX and/or LWP
      capable CPUs
    * CVE-2013-1432: XSA-58: Page reference counting error due to
      XSA-45/CVE-2013-1918 fixes.

Various bugs have also been fixed:

    * Boot failure with xen kernel in UEFI mode with error 'No memory for
      trampoline' (bnc#833483)
    * Improvements to block-dmmd script (bnc#828623)
    * MTU size on Dom0 gets reset when booting DomU with e1000 device
      (bnc#840196)
    * In HP's UEFI x86_64 platform and with xen environment, in booting
      stage, xen hypervisor will panic. (bnc#833251)
    * Xen: migration broken from xsave-capable to xsave-incapable host
      (bnc#833796)
    * In xen, 'shutdown -y 0 -h' cannot power off system (bnc#834751)
    * In HP's UEFI x86_64 platform with xen environment, xen hypervisor
      will panic on multiple blades nPar. (bnc#839600)
    * vcpus not started after upgrading Dom0 from SLES 11 SP2 to SP3
      (bnc#835896)
    * SLES 11 SP3 Xen security patch does not automatically update UEFI
      boot binary (bnc#836239)
    * Failed to setup devices for vm instance when start multiple vms
      simultaneously (bnc#824676)
    * SLES 9 SP4 guest fails to start after upgrading to SLES 11 SP3
      (bnc#817799)
    * Various upstream fixes have been included.

Security Issues:

    * CVE-2013-1432
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432&gt;
    * CVE-2013-1442
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442&gt;
    * CVE-2013-1918
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1918&gt;
    * CVE-2013-4355
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355&gt;
    * CVE-2013-4361
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361&gt;
    * CVE-2013-4368
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368&gt;
    * CVE-2013-4369
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4369&gt;
    * CVE-2013-4370
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4370&gt;
    * CVE-2013-4371
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4371&gt;
    * CVE-2013-4375
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4375&gt;
    * CVE-2013-4416
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4416&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-29"/>
	<updated date="2013-10-29"/>
	<bugzilla href="https://bugzilla.suse.com/817799">SUSE bug 817799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824676">SUSE bug 824676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826882">SUSE bug 826882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828623">SUSE bug 828623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833251">SUSE bug 833251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833483">SUSE bug 833483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833796">SUSE bug 833796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834751">SUSE bug 834751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835896">SUSE bug 835896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836239">SUSE bug 836239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839596">SUSE bug 839596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839600">SUSE bug 839600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840196">SUSE bug 840196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841766">SUSE bug 841766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842511">SUSE bug 842511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842512">SUSE bug 842512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842513">SUSE bug 842513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842514">SUSE bug 842514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842515">SUSE bug 842515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845520">SUSE bug 845520</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1432/">CVE-2013-1432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1432">CVE-2013-1432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1442/">CVE-2013-1442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1442">CVE-2013-1442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1918/">CVE-2013-1918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1918">CVE-2013-1918 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4355/">CVE-2013-4355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4355">CVE-2013-4355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4361/">CVE-2013-4361 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4361">CVE-2013-4361 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4368/">CVE-2013-4368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4368">CVE-2013-4368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4369/">CVE-2013-4369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4369">CVE-2013-4369 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4370/">CVE-2013-4370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4370">CVE-2013-4370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4371/">CVE-2013-4371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4371">CVE-2013-4371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4375/">CVE-2013-4375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4375">CVE-2013-4375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4416/">CVE-2013-4416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4416">CVE-2013-4416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567207" comment="xen-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567208" comment="xen-doc-html-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567209" comment="xen-doc-pdf-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567210" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567211" comment="xen-kmp-pae-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567212" comment="xen-libs-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567213" comment="xen-libs-32bit-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567214" comment="xen-tools-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567215" comment="xen-tools-domU-4.2.3_02-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567207" comment="xen-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567208" comment="xen-doc-html-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567209" comment="xen-doc-pdf-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567210" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567211" comment="xen-kmp-pae-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567212" comment="xen-libs-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567213" comment="xen-libs-32bit-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567214" comment="xen-tools-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567215" comment="xen-tools-domU-4.2.3_02-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567207" comment="xen-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567208" comment="xen-doc-html-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567209" comment="xen-doc-pdf-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567210" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567211" comment="xen-kmp-pae-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567212" comment="xen-libs-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567213" comment="xen-libs-32bit-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567214" comment="xen-tools-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567215" comment="xen-tools-domU-4.2.3_02-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219624" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="833483" ref_url="https://bugzilla.suse.com/833483" source="BUGZILLA"/>
		<reference ref_id="840997" ref_url="https://bugzilla.suse.com/840997" source="BUGZILLA"/>
		<reference ref_id="842417" ref_url="https://bugzilla.suse.com/842417" source="BUGZILLA"/>
		<reference ref_id="846849" ref_url="https://bugzilla.suse.com/846849" source="BUGZILLA"/>
		<reference ref_id="848014" ref_url="https://bugzilla.suse.com/848014" source="BUGZILLA"/>
		<reference ref_id="848657" ref_url="https://bugzilla.suse.com/848657" source="BUGZILLA"/>
		<reference ref_id="849665" ref_url="https://bugzilla.suse.com/849665" source="BUGZILLA"/>
		<reference ref_id="849667" ref_url="https://bugzilla.suse.com/849667" source="BUGZILLA"/>
		<reference ref_id="849668" ref_url="https://bugzilla.suse.com/849668" source="BUGZILLA"/>
		<reference ref_id="851386" ref_url="https://bugzilla.suse.com/851386" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1922" ref_url="https://www.suse.com/security/cve/CVE-2013-1922/" source="CVE"/>
		<reference ref_id="CVE-2013-2007" ref_url="https://www.suse.com/security/cve/CVE-2013-2007/" source="CVE"/>
		<reference ref_id="CVE-2013-4375" ref_url="https://www.suse.com/security/cve/CVE-2013-4375/" source="CVE"/>
		<reference ref_id="CVE-2013-4416" ref_url="https://www.suse.com/security/cve/CVE-2013-4416/" source="CVE"/>
		<reference ref_id="CVE-2013-4494" ref_url="https://www.suse.com/security/cve/CVE-2013-4494/" source="CVE"/>
		<reference ref_id="CVE-2013-4551" ref_url="https://www.suse.com/security/cve/CVE-2013-4551/" source="CVE"/>
		<reference ref_id="CVE-2013-4553" ref_url="https://www.suse.com/security/cve/CVE-2013-4553/" source="CVE"/>
		<reference ref_id="CVE-2013-4554" ref_url="https://www.suse.com/security/cve/CVE-2013-4554/" source="CVE"/>
		<description>

The Xen hypervisor and tool-suite have been updated to fix security issues 
and bugs:

    * CVE-2013-4494: XSA-73: A lock order reversal between page allocation
      and grant table locks could lead to host crashes or even host code
      execution.
    * CVE-2013-4553: XSA-74: A lock order reversal between page_alloc_lock
      and mm_rwlock could lead to deadlocks.
    * CVE-2013-4554: XSA-76: Hypercalls exposed to privilege rings 1 and 2
      of HVM guests which might lead to Hypervisor escalation under
      specific circumstances.
    * CVE-2013-6375: XSA-78: Insufficient TLB flushing in VT-d (iommu) code
      could lead to access of memory that was revoked.
    * CVE-2013-4551: XSA-75: A host crash due to guest VMX instruction
      execution was fixed.

Non-security bugs have also been fixed:

    * bnc#840997: It is possible to start a VM twice on the same node.
    * bnc#842417: In HP's UEFI x86_64 platform and SLES 11-SP3, dom0 will
      could lock-up on multiple blades nPar.
    * bnc#848014: Xen Hypervisor panics on 8-blades nPar with 46-bit memory
      addressing.
    * bnc#846849: Soft lock-up with PCI pass-through and many VCPUs.
    * bnc#833483: Boot Failure with Xen kernel in UEFI mode with error 'No
      memory for trampoline'.
    * Increase the maximum supported CPUs in the Hypervisor to 512.

Security Issues:

    * CVE-2013-1922
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1922&gt;
    * CVE-2013-2007
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2007&gt;
    * CVE-2013-4375
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4375&gt;
    * CVE-2013-4416
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4416&gt;
    * CVE-2013-4494
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494&gt;
    * CVE-2013-4551
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4551&gt;
    * CVE-2013-4553
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553&gt;
    * CVE-2013-4554
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4554&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-27"/>
	<updated date="2013-11-27"/>
	<bugzilla href="https://bugzilla.suse.com/833483">SUSE bug 833483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840997">SUSE bug 840997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842417">SUSE bug 842417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846849">SUSE bug 846849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848014">SUSE bug 848014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848657">SUSE bug 848657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849665">SUSE bug 849665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849667">SUSE bug 849667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849668">SUSE bug 849668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851386">SUSE bug 851386</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1922/">CVE-2013-1922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1922">CVE-2013-1922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2007/">CVE-2013-2007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2007">CVE-2013-2007 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4375/">CVE-2013-4375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4375">CVE-2013-4375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4416/">CVE-2013-4416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4416">CVE-2013-4416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4494/">CVE-2013-4494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4494">CVE-2013-4494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4551/">CVE-2013-4551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4551">CVE-2013-4551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4553/">CVE-2013-4553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4553">CVE-2013-4553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4554/">CVE-2013-4554 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4554">CVE-2013-4554 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567216" comment="xen-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567217" comment="xen-doc-html-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567218" comment="xen-doc-pdf-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567219" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567220" comment="xen-kmp-pae-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567221" comment="xen-libs-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567222" comment="xen-libs-32bit-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567223" comment="xen-tools-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567224" comment="xen-tools-domU-4.2.3_08-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567216" comment="xen-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567217" comment="xen-doc-html-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567218" comment="xen-doc-pdf-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567219" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567220" comment="xen-kmp-pae-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567221" comment="xen-libs-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567222" comment="xen-libs-32bit-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567223" comment="xen-tools-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567224" comment="xen-tools-domU-4.2.3_08-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567216" comment="xen-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567217" comment="xen-doc-html-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567218" comment="xen-doc-pdf-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567219" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567220" comment="xen-kmp-pae-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567221" comment="xen-libs-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567222" comment="xen-libs-32bit-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567223" comment="xen-tools-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567224" comment="xen-tools-domU-4.2.3_08-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219625" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="831120" ref_url="https://bugzilla.suse.com/831120" source="BUGZILLA"/>
		<reference ref_id="833251" ref_url="https://bugzilla.suse.com/833251" source="BUGZILLA"/>
		<reference ref_id="848014" ref_url="https://bugzilla.suse.com/848014" source="BUGZILLA"/>
		<reference ref_id="853048" ref_url="https://bugzilla.suse.com/853048" source="BUGZILLA"/>
		<reference ref_id="853049" ref_url="https://bugzilla.suse.com/853049" source="BUGZILLA"/>
		<reference ref_id="858311" ref_url="https://bugzilla.suse.com/858311" source="BUGZILLA"/>
		<reference ref_id="860092" ref_url="https://bugzilla.suse.com/860092" source="BUGZILLA"/>
		<reference ref_id="860163" ref_url="https://bugzilla.suse.com/860163" source="BUGZILLA"/>
		<reference ref_id="860165" ref_url="https://bugzilla.suse.com/860165" source="BUGZILLA"/>
		<reference ref_id="860300" ref_url="https://bugzilla.suse.com/860300" source="BUGZILLA"/>
		<reference ref_id="860302" ref_url="https://bugzilla.suse.com/860302" source="BUGZILLA"/>
		<reference ref_id="861256" ref_url="https://bugzilla.suse.com/861256" source="BUGZILLA"/>
		<reference ref_id="863297" ref_url="https://bugzilla.suse.com/863297" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2212" ref_url="https://www.suse.com/security/cve/CVE-2013-2212/" source="CVE"/>
		<reference ref_id="CVE-2013-6400" ref_url="https://www.suse.com/security/cve/CVE-2013-6400/" source="CVE"/>
		<reference ref_id="CVE-2013-6885" ref_url="https://www.suse.com/security/cve/CVE-2013-6885/" source="CVE"/>
		<reference ref_id="CVE-2014-1642" ref_url="https://www.suse.com/security/cve/CVE-2014-1642/" source="CVE"/>
		<reference ref_id="CVE-2014-1666" ref_url="https://www.suse.com/security/cve/CVE-2014-1666/" source="CVE"/>
		<reference ref_id="CVE-2014-1891" ref_url="https://www.suse.com/security/cve/CVE-2014-1891/" source="CVE"/>
		<reference ref_id="CVE-2014-1892" ref_url="https://www.suse.com/security/cve/CVE-2014-1892/" source="CVE"/>
		<reference ref_id="CVE-2014-1893" ref_url="https://www.suse.com/security/cve/CVE-2014-1893/" source="CVE"/>
		<reference ref_id="CVE-2014-1894" ref_url="https://www.suse.com/security/cve/CVE-2014-1894/" source="CVE"/>
		<reference ref_id="CVE-2014-1895" ref_url="https://www.suse.com/security/cve/CVE-2014-1895/" source="CVE"/>
		<reference ref_id="CVE-2014-1896" ref_url="https://www.suse.com/security/cve/CVE-2014-1896/" source="CVE"/>
		<reference ref_id="CVE-2014-1950" ref_url="https://www.suse.com/security/cve/CVE-2014-1950/" source="CVE"/>
		<description>

The SUSE Linux Enterprise Server 11 Service Pack 3 Xen hypervisor and 
toolset has been updated to 4.2.4 to fix various bugs and security issues:

The following security issues have been addressed:

    * 

      XSA-60: CVE-2013-2212: The vmx_set_uc_mode function in Xen 3.3
      through 4.3, when disabling chaches, allows local HVM guests with
      access to memory mapped I/O regions to cause a denial of service (CPU
      consumption and possibly hypervisor or guest kernel panic) via a
      crafted GFN range. (bnc#831120)

    * 

      XSA-80: CVE-2013-6400: Xen 4.2.x and 4.3.x, when using Intel VT-d and
      a PCI device has been assigned, does not clear the flag that
      suppresses IOMMU TLB flushes when unspecified errors occur, which
      causes the TLB entries to not be flushed and allows local guest
      administrators to cause a denial of service (host crash) or gain
      privileges via unspecified vectors. (bnc#853048)

    * 

      XSA-82: CVE-2013-6885: The microcode on AMD 16h 00h through 0Fh
      processors does not properly handle the interaction between locked
      instructions and write-combined memory types, which allows local
      users to cause a denial of service (system hang) via a crafted
      application, aka the errata 793 issue. (bnc#853049)

    * 

      XSA-83: CVE-2014-1642: The IRQ setup in Xen 4.2.x and 4.3.x, when
      using device passthrough and configured to support a large number of
      CPUs, frees certain memory that may still be intended for use, which
      allows local guest administrators to cause a denial of service
      (memory corruption and hypervisor crash) and possibly execute
      arbitrary code via vectors related to an out-of-memory error that
      triggers a (1) use-after-free or (2) double free. (bnc#860092)

    * 

      XSA-84: CVE-2014-1891: The FLASK_{GET,SET}BOOL, FLASK_USER and
      FLASK_CONTEXT_TO_SID suboperations of the flask hypercall are
      vulnerable to an integer overflow on the input size. The hypercalls
      attempt to allocate a buffer which is 1 larger than this size and is
      therefore vulnerable to integer overflow and an attempt to allocate
      then access a zero byte buffer. (bnc#860163)

    * 

      XSA-84: CVE-2014-1892 CVE-2014-1893: Xen 3.3 through 4.1, while not
      affected by the above overflow, have a different overflow issue on
      FLASK_{GET,SET}BOOL and expose unreasonably large memory allocation
      to aribitrary guests. (bnc#860163)

    * 

      XSA-84: CVE-2014-1894: Xen 3.2 (and presumably earlier) exhibit both
      problems with the overflow issue being present for more than just the
      suboperations listed above. (bnc#860163)

    * 

      XSA-85: CVE-2014-1895: The FLASK_AVC_CACHESTAT hypercall, which
      provides access to per-cpu statistics on the Flask security policy,
      incorrectly validates the CPU for which statistics are being
      requested. (bnc#860165)

    * 

      XSA-86: CVE-2014-1896: libvchan (a library for inter-domain
      communication) does not correctly handle unusual or malicious
      contents in the xenstore ring. A malicious guest can exploit this to
      cause a libvchan-using facility to read or write past the end of the
      ring. (bnc#860300)

    * 

      XSA-87: CVE-2014-1666: The do_physdev_op function in Xen 4.1.5,
      4.1.6.1, 4.2.2 through 4.2.3, and 4.3.x does not properly restrict
      access to the (1) PHYSDEVOP_prepare_msix and (2)
      PHYSDEVOP_release_msix operations, which allows local PV guests to
      cause a denial of service (host or guest malfunction) or possibly
      gain privileges via unspecified vectors. (bnc#860302)

    * 

      XSA-88: CVE-2014-1950: Use-after-free vulnerability in the
      xc_cpupool_getinfo function in Xen 4.1.x through 4.3.x, when using a
      multithreaded toolstack, does not properly handle a failure by the
      xc_cpumap_alloc function, which allows local users with access to
      management functions to cause a denial of service (heap corruption)
      and possibly gain privileges via unspecified vectors. (bnc#861256)

Also the following non-security bugs have been fixed:

    * Fixed boot problems with Xen kernel. '(XEN) setup 0000:00:18.0 for d0
      failed (-19)' (bnc#858311)
    * Fixed Xen hypervisor panic on 8-blades nPar with 46-bit memory
      addressing. (bnc#848014)
    * Fixed Xen hypervisor panic in HP's UEFI x86_64 platform and with xen
      environment, in booting stage. (bnc#833251)
    * xend/pvscsi: recognize also SCSI CDROM devices (bnc#863297)
    * pygrub: Support (/dev/xvda) style disk specifications

Security Issue references:

    * CVE-2013-2212
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2212&gt;
    * CVE-2013-6400
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6400&gt;
    * CVE-2013-6885
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6885&gt;
    * CVE-2014-1642
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1642&gt;
    * CVE-2014-1666
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1666&gt;
    * CVE-2014-1891
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1891&gt;
    * CVE-2014-1892
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1892&gt;
    * CVE-2014-1893
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1893&gt;
    * CVE-2014-1894
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1894&gt;
    * CVE-2014-1895
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1895&gt;
    * CVE-2014-1896
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1896&gt;
    * CVE-2014-1950
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-27"/>
	<updated date="2014-02-27"/>
	<bugzilla href="https://bugzilla.suse.com/831120">SUSE bug 831120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833251">SUSE bug 833251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848014">SUSE bug 848014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853048">SUSE bug 853048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853049">SUSE bug 853049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858311">SUSE bug 858311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860092">SUSE bug 860092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860163">SUSE bug 860163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860165">SUSE bug 860165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860300">SUSE bug 860300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860302">SUSE bug 860302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861256">SUSE bug 861256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863297">SUSE bug 863297</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2212/">CVE-2013-2212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2212">CVE-2013-2212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6400/">CVE-2013-6400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6400">CVE-2013-6400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6885/">CVE-2013-6885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6885">CVE-2013-6885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1642/">CVE-2014-1642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1642">CVE-2014-1642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1666/">CVE-2014-1666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1666">CVE-2014-1666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1891/">CVE-2014-1891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1891">CVE-2014-1891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1892/">CVE-2014-1892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1892">CVE-2014-1892 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1893/">CVE-2014-1893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1893">CVE-2014-1893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1894/">CVE-2014-1894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1894">CVE-2014-1894 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1895/">CVE-2014-1895 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1895">CVE-2014-1895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1896/">CVE-2014-1896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1896">CVE-2014-1896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1950/">CVE-2014-1950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1950">CVE-2014-1950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567225" comment="xen-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567226" comment="xen-doc-html-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567227" comment="xen-doc-pdf-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567228" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567229" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567230" comment="xen-libs-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567231" comment="xen-libs-32bit-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567232" comment="xen-tools-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567233" comment="xen-tools-domU-4.2.4_02-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567225" comment="xen-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567226" comment="xen-doc-html-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567227" comment="xen-doc-pdf-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567228" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567229" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567230" comment="xen-libs-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567231" comment="xen-libs-32bit-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567232" comment="xen-tools-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567233" comment="xen-tools-domU-4.2.4_02-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567225" comment="xen-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567226" comment="xen-doc-html-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567227" comment="xen-doc-pdf-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567228" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567229" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567230" comment="xen-libs-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567231" comment="xen-libs-32bit-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567232" comment="xen-tools-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567233" comment="xen-tools-domU-4.2.4_02-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219626" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="798770" ref_url="https://bugzilla.suse.com/798770" source="BUGZILLA"/>
		<reference ref_id="833483" ref_url="https://bugzilla.suse.com/833483" source="BUGZILLA"/>
		<reference ref_id="842006" ref_url="https://bugzilla.suse.com/842006" source="BUGZILLA"/>
		<reference ref_id="858178" ref_url="https://bugzilla.suse.com/858178" source="BUGZILLA"/>
		<reference ref_id="862608" ref_url="https://bugzilla.suse.com/862608" source="BUGZILLA"/>
		<reference ref_id="864801" ref_url="https://bugzilla.suse.com/864801" source="BUGZILLA"/>
		<reference ref_id="865682" ref_url="https://bugzilla.suse.com/865682" source="BUGZILLA"/>
		<reference ref_id="867910" ref_url="https://bugzilla.suse.com/867910" source="BUGZILLA"/>
		<reference ref_id="878841" ref_url="https://bugzilla.suse.com/878841" source="BUGZILLA"/>
		<reference ref_id="880751" ref_url="https://bugzilla.suse.com/880751" source="BUGZILLA"/>
		<reference ref_id="881900" ref_url="https://bugzilla.suse.com/881900" source="BUGZILLA"/>
		<reference ref_id="882092" ref_url="https://bugzilla.suse.com/882092" source="BUGZILLA"/>
		<reference ref_id="891539" ref_url="https://bugzilla.suse.com/891539" source="BUGZILLA"/>
		<reference ref_id="895798" ref_url="https://bugzilla.suse.com/895798" source="BUGZILLA"/>
		<reference ref_id="895799" ref_url="https://bugzilla.suse.com/895799" source="BUGZILLA"/>
		<reference ref_id="895802" ref_url="https://bugzilla.suse.com/895802" source="BUGZILLA"/>
		<reference ref_id="897657" ref_url="https://bugzilla.suse.com/897657" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4344" ref_url="https://www.suse.com/security/cve/CVE-2013-4344/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2014-2599" ref_url="https://www.suse.com/security/cve/CVE-2014-2599/" source="CVE"/>
		<reference ref_id="CVE-2014-3967" ref_url="https://www.suse.com/security/cve/CVE-2014-3967/" source="CVE"/>
		<reference ref_id="CVE-2014-3968" ref_url="https://www.suse.com/security/cve/CVE-2014-3968/" source="CVE"/>
		<reference ref_id="CVE-2014-4021" ref_url="https://www.suse.com/security/cve/CVE-2014-4021/" source="CVE"/>
		<reference ref_id="CVE-2014-7154" ref_url="https://www.suse.com/security/cve/CVE-2014-7154/" source="CVE"/>
		<reference ref_id="CVE-2014-7155" ref_url="https://www.suse.com/security/cve/CVE-2014-7155/" source="CVE"/>
		<reference ref_id="CVE-2014-7156" ref_url="https://www.suse.com/security/cve/CVE-2014-7156/" source="CVE"/>
		<reference ref_id="CVE-2014-7188" ref_url="https://www.suse.com/security/cve/CVE-2014-7188/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 Service Pack 3 Xen package was updated to fix 
various bugs and security issues.

The following security issues have been fixed:

    * XSA-108: CVE-2014-7188: Improper MSR range used for x2APIC emulation
      (bnc#897657)
    * XSA-106: CVE-2014-7156: Missing privilege level checks in x86
      emulation of software interrupts (bnc#895802)
    * XSA-105: CVE-2014-7155: Missing privilege level checks in x86 HLT,
      LGDT, LIDT, and LMSW emulation (bnc#895799)
    * XSA-104: CVE-2014-7154: Race condition in HVMOP_track_dirty_vram
      (bnc#895798)
    * XSA-100: CVE-2014-4021: Hypervisor heap contents leaked to guests
      (bnc#880751)
    * XSA-96: CVE-2014-3967, CVE-2014-3968: Vulnerabilities in HVM MSI
      injection (bnc#878841)
    * XSA-89: CVE-2014-2599: HVMOP_set_mem_access is not preemptible
      (bnc#867910)
    * XSA-65: CVE-2013-4344: qemu SCSI REPORT LUNS buffer overflow
      (bnc#842006)
    * CVE-2013-4540: qemu: zaurus: buffer overrun on invalid state load
      (bnc#864801)

The following non-security issues have been fixed:

    * xend: Fix netif convertToDeviceNumber for running domains
      (bnc#891539)
    * Installing SLES12 as a VM on SLES11 SP3 fails because of btrfs in the
      VM (bnc#882092)
    * XEN kernel panic do_device_not_available() (bnc#881900)
    * Boot Failure with xen kernel in UEFI mode with error 'No memory for
      trampoline' (bnc#833483)
    * SLES 11 SP3 vm-install should get RHEL 7 support when released
      (bnc#862608)
    * SLES 11 SP3 XEN kiso version cause softlockup on 8 blades npar(480
      cpu) (bnc#858178)
    * Local attach support for PHY backends using scripts
      local_attach_support_for_phy.patch (bnc#865682)
    * Improve multipath support for npiv devices block-npiv (bnc#798770)

Security Issues:

    * CVE-2013-4344
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4344&gt;
    * CVE-2013-4540
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4540&gt;
    * CVE-2014-2599
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599&gt;
    * CVE-2014-3967
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3967&gt;
    * CVE-2014-3968
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3968&gt;
    * CVE-2014-4021
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021&gt;
    * CVE-2014-7154
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7154&gt;
    * CVE-2014-7155
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7155&gt;
    * CVE-2014-7156
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7156&gt;
    * CVE-2014-7188
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7188&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-02"/>
	<updated date="2014-10-02"/>
	<bugzilla href="https://bugzilla.suse.com/798770">SUSE bug 798770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833483">SUSE bug 833483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842006">SUSE bug 842006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858178">SUSE bug 858178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862608">SUSE bug 862608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864801">SUSE bug 864801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865682">SUSE bug 865682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867910">SUSE bug 867910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878841">SUSE bug 878841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881900">SUSE bug 881900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882092">SUSE bug 882092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891539">SUSE bug 891539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895798">SUSE bug 895798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895799">SUSE bug 895799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895802">SUSE bug 895802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897657">SUSE bug 897657</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4344/">CVE-2013-4344 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4344">CVE-2013-4344 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4540">CVE-2013-4540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2599/">CVE-2014-2599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2599">CVE-2014-2599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3967/">CVE-2014-3967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3967">CVE-2014-3967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3968/">CVE-2014-3968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3968">CVE-2014-3968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4021/">CVE-2014-4021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4021">CVE-2014-4021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7154/">CVE-2014-7154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7154">CVE-2014-7154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7155/">CVE-2014-7155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7155">CVE-2014-7155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7156/">CVE-2014-7156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7156">CVE-2014-7156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7188/">CVE-2014-7188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7188">CVE-2014-7188 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567234" comment="xen-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567235" comment="xen-doc-html-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567236" comment="xen-doc-pdf-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567237" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567238" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567239" comment="xen-libs-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567240" comment="xen-libs-32bit-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567241" comment="xen-tools-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567242" comment="xen-tools-domU-4.2.4_04-0.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567234" comment="xen-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567235" comment="xen-doc-html-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567236" comment="xen-doc-pdf-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567237" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567238" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567239" comment="xen-libs-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567240" comment="xen-libs-32bit-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567241" comment="xen-tools-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567242" comment="xen-tools-domU-4.2.4_04-0.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567234" comment="xen-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567235" comment="xen-doc-html-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567236" comment="xen-doc-pdf-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567237" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567238" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567239" comment="xen-libs-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567240" comment="xen-libs-32bit-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567241" comment="xen-tools-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567242" comment="xen-tools-domU-4.2.4_04-0.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219627" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="918995" ref_url="https://bugzilla.suse.com/918995" source="BUGZILLA"/>
		<reference ref_id="918998" ref_url="https://bugzilla.suse.com/918998" source="BUGZILLA"/>
		<reference ref_id="919341" ref_url="https://bugzilla.suse.com/919341" source="BUGZILLA"/>
		<reference ref_id="919464" ref_url="https://bugzilla.suse.com/919464" source="BUGZILLA"/>
		<reference ref_id="922705" ref_url="https://bugzilla.suse.com/922705" source="BUGZILLA"/>
		<reference ref_id="922706" ref_url="https://bugzilla.suse.com/922706" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2044" ref_url="https://www.suse.com/security/cve/CVE-2015-2044/" source="CVE"/>
		<reference ref_id="CVE-2015-2045" ref_url="https://www.suse.com/security/cve/CVE-2015-2045/" source="CVE"/>
		<reference ref_id="CVE-2015-2151" ref_url="https://www.suse.com/security/cve/CVE-2015-2151/" source="CVE"/>
		<reference ref_id="CVE-2015-2756" ref_url="https://www.suse.com/security/cve/CVE-2015-2756/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001357.html" source="SUSE-SU"/>
		<description>

The Virtualization service XEN was updated to fix various bugs and security 
issues.

The following security issues have been fixed:

    * 

      CVE-2015-2756: XSA-126: Unmediated PCI command register access in
      qemu could have lead to denial of service attacks against the host,
      if PCI cards are passed through to guests.

    * 

      XSA-125: Long latency MMIO mapping operations were not preemptible.

    * 

      CVE-2015-2151: XSA-123: Instructions with register operands ignored
      eventual segment overrides encoded for them. Due to an insufficiently
      conditional assignment such a bogus segment override could have,
      however, corrupted a pointer used subsequently to store the result of
      the instruction.

    * 

      CVE-2015-2045: XSA-122: The code handling certain sub-operations of
      the HYPERVISOR_xen_version hypercall failed to fully initialize all
      fields of structures subsequently copied back to guest memory. Due to
      this hypervisor stack contents were copied into the destination of
      the operation, thus becoming visible to the guest.

    * 

      CVE-2015-2044: XSA-121: Emulation routines in the hypervisor dealing
      with certain system devices checked whether the access size by the
      guest is a supported one. When the access size is unsupported these
      routines failed to set the data to be returned to the guest for read
      accesses, so that hypervisor stack contents were copied into the
      destination of the operation, thus becoming visible to the guest.

Also fixed:

    * Fully virtualized guest install from network source failed with
      'cannot find guest domain' in XEN. (bsc#919341)

Security Issues:

    * CVE-2015-2044
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2044&gt;
    * CVE-2015-2045
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2045&gt;
    * CVE-2015-2151
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2151&gt;
    * CVE-2015-2756
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-30"/>
	<updated date="2015-03-30"/>
	<bugzilla href="https://bugzilla.suse.com/918995">SUSE bug 918995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919341">SUSE bug 919341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919464">SUSE bug 919464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922705">SUSE bug 922705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922706">SUSE bug 922706</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2044/">CVE-2015-2044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2044">CVE-2015-2044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2045/">CVE-2015-2045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2045">CVE-2015-2045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2151/">CVE-2015-2151 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2151">CVE-2015-2151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2756/">CVE-2015-2756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2756">CVE-2015-2756 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567243" comment="xen-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567244" comment="xen-doc-html-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567245" comment="xen-doc-pdf-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567246" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567247" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.52-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567248" comment="xen-libs-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567249" comment="xen-libs-32bit-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567250" comment="xen-tools-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567251" comment="xen-tools-domU-4.2.5_04-0.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567243" comment="xen-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567244" comment="xen-doc-html-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567245" comment="xen-doc-pdf-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567246" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567247" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.52-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567248" comment="xen-libs-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567249" comment="xen-libs-32bit-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567250" comment="xen-tools-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567251" comment="xen-tools-domU-4.2.5_04-0.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567243" comment="xen-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567244" comment="xen-doc-html-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567245" comment="xen-doc-pdf-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567246" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567247" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.52-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567248" comment="xen-libs-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567249" comment="xen-libs-32bit-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567250" comment="xen-tools-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567251" comment="xen-tools-domU-4.2.5_04-0.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219628" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="931625" ref_url="https://bugzilla.suse.com/931625" source="BUGZILLA"/>
		<reference ref_id="931626" ref_url="https://bugzilla.suse.com/931626" source="BUGZILLA"/>
		<reference ref_id="931627" ref_url="https://bugzilla.suse.com/931627" source="BUGZILLA"/>
		<reference ref_id="931628" ref_url="https://bugzilla.suse.com/931628" source="BUGZILLA"/>
		<reference ref_id="932770" ref_url="https://bugzilla.suse.com/932770" source="BUGZILLA"/>
		<reference ref_id="932790" ref_url="https://bugzilla.suse.com/932790" source="BUGZILLA"/>
		<reference ref_id="932996" ref_url="https://bugzilla.suse.com/932996" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-4103" ref_url="https://www.suse.com/security/cve/CVE-2015-4103/" source="CVE"/>
		<reference ref_id="CVE-2015-4104" ref_url="https://www.suse.com/security/cve/CVE-2015-4104/" source="CVE"/>
		<reference ref_id="CVE-2015-4105" ref_url="https://www.suse.com/security/cve/CVE-2015-4105/" source="CVE"/>
		<reference ref_id="CVE-2015-4106" ref_url="https://www.suse.com/security/cve/CVE-2015-4106/" source="CVE"/>
		<reference ref_id="CVE-2015-4163" ref_url="https://www.suse.com/security/cve/CVE-2015-4163/" source="CVE"/>
		<reference ref_id="CVE-2015-4164" ref_url="https://www.suse.com/security/cve/CVE-2015-4164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001435.html" source="SUSE-SU"/>
		<description>

Xen was updated to fix seven security vulnerabilities:

    * CVE-2015-4103: Potential unintended writes to host MSI message data
      field via qemu. (XSA-128, bnc#931625)
    * CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests.
      (XSA-129, bnc#931626)
    * CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error
      messages. (XSA-130, bnc#931627)
    * CVE-2015-4106: Unmediated PCI register access in qemu. (XSA-131,
      bnc#931628)
    * CVE-2015-4163: GNTTABOP_swap_grant_ref operation misbehavior.
      (XSA-134, bnc#932790)
    * CVE-2015-3209: Heap overflow in qemu pcnet controller allowing guest
      to host escape. (XSA-135, bnc#932770)
    * CVE-2015-4164: DoS through iret hypercall handler. (XSA-136,
      bnc#932996)

Security Issues:

    * CVE-2015-4103
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103&gt;
    * CVE-2015-4104
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104&gt;
    * CVE-2015-4105
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105&gt;
    * CVE-2015-4106
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106&gt;
    * CVE-2015-4163
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163&gt;
    * CVE-2015-4164
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164&gt;
    * CVE-2015-3209
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-05"/>
	<updated date="2015-06-05"/>
	<bugzilla href="https://bugzilla.suse.com/931625">SUSE bug 931625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931626">SUSE bug 931626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931627">SUSE bug 931627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931628">SUSE bug 931628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932770">SUSE bug 932770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932790">SUSE bug 932790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932996">SUSE bug 932996</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3209">CVE-2015-3209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4103/">CVE-2015-4103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4103">CVE-2015-4103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4104/">CVE-2015-4104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4104">CVE-2015-4104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4105/">CVE-2015-4105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4105">CVE-2015-4105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4106/">CVE-2015-4106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4106">CVE-2015-4106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4163/">CVE-2015-4163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4163">CVE-2015-4163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4164/">CVE-2015-4164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4164">CVE-2015-4164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567252" comment="xen-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567253" comment="xen-doc-html-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567254" comment="xen-doc-pdf-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567255" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567256" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567257" comment="xen-libs-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567258" comment="xen-libs-32bit-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567259" comment="xen-tools-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567260" comment="xen-tools-domU-4.2.5_08-0.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567252" comment="xen-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567253" comment="xen-doc-html-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567254" comment="xen-doc-pdf-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567255" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567256" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567257" comment="xen-libs-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567258" comment="xen-libs-32bit-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567259" comment="xen-tools-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567260" comment="xen-tools-domU-4.2.5_08-0.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567252" comment="xen-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567253" comment="xen-doc-html-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567254" comment="xen-doc-pdf-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567255" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567256" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567257" comment="xen-libs-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567258" comment="xen-libs-32bit-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567259" comment="xen-tools-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567260" comment="xen-tools-domU-4.2.5_08-0.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219629" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="947165" ref_url="https://bugzilla.suse.com/947165" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950704" ref_url="https://bugzilla.suse.com/950704" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="951845" ref_url="https://bugzilla.suse.com/951845" source="BUGZILLA"/>
		<reference ref_id="954018" ref_url="https://bugzilla.suse.com/954018" source="BUGZILLA"/>
		<reference ref_id="954405" ref_url="https://bugzilla.suse.com/954405" source="BUGZILLA"/>
		<reference ref_id="956408" ref_url="https://bugzilla.suse.com/956408" source="BUGZILLA"/>
		<reference ref_id="956409" ref_url="https://bugzilla.suse.com/956409" source="BUGZILLA"/>
		<reference ref_id="956411" ref_url="https://bugzilla.suse.com/956411" source="BUGZILLA"/>
		<reference ref_id="956592" ref_url="https://bugzilla.suse.com/956592" source="BUGZILLA"/>
		<reference ref_id="956832" ref_url="https://bugzilla.suse.com/956832" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340/" source="CVE"/>
		<reference ref_id="CVE-2015-8341" ref_url="https://www.suse.com/security/cve/CVE-2015-8341/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<description>


This update fixes the following security issues:
      
- bsc#956832 -  CVE-2015-8345: xen: qemu: net: eepro100:
  infinite loop in processing command block list

- bsc#956592 -  xen: virtual PMU is unsupported (XSA-163)

- bsc#956408 -  CVE-2015-8339, CVE-2015-8340: xen:
  XENMEM_exchange error handling issues (XSA-159)

- bsc#956409 -  CVE-2015-8341: xen: libxl leak of pv kernel
  and initrd on error (XSA-160)

- bsc#956411 -  CVE-2015-7504: xen: heap buffer overflow
  vulnerability in pcnet emulator (XSA-162)

- bsc#947165 -  CVE-2015-7311: xen: libxl fails to honour
  readonly flag on disks with qemu-xen (xsa-142)

- bsc#954405 -  CVE-2015-8104: Xen: guest to host DoS by
  triggering an infinite loop in microcode via #DB exception
- bsc#954018 -  CVE-2015-5307: xen: x86: CPU lockup during
  fault delivery (XSA-156)

- bsc#950704 -  CVE-2015-7970: xen: x86: Long latency
  populate-on-demand operation is not preemptible (XSA-150)

- bsc#951845 -  CVE-2015-7972: xen: x86: populate-on-demand
  balloon size inaccuracy can crash guests (XSA-153)

- bsc#950703 -  CVE-2015-7969: xen: leak of main per-domain
  vcpu pointer array (DoS) (XSA-149)
- bsc#950705 -  CVE-2015-7969: xen: x86: leak of per-domain
  profiling-related vcpu pointer array (DoS) (XSA-151)
- bsc#950706 -  CVE-2015-7971: xen: x86: some pmu and
  profiling hypercalls log without rate limiting (XSA-152)		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-19"/>
	<updated date="2015-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/947165">SUSE bug 947165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950704">SUSE bug 950704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951845">SUSE bug 951845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954018">SUSE bug 954018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956409">SUSE bug 956409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956411">SUSE bug 956411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956592">SUSE bug 956592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956832">SUSE bug 956832</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5307">CVE-2015-5307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7311">CVE-2015-7311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7504">CVE-2015-7504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7969">CVE-2015-7969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7970">CVE-2015-7970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7971">CVE-2015-7971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7972">CVE-2015-7972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8104">CVE-2015-8104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8339">CVE-2015-8339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8340">CVE-2015-8340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8341/">CVE-2015-8341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8341">CVE-2015-8341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8345">CVE-2015-8345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567261" comment="xen-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567262" comment="xen-doc-html-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567263" comment="xen-doc-pdf-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567264" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567265" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567266" comment="xen-libs-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567267" comment="xen-libs-32bit-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567268" comment="xen-tools-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567269" comment="xen-tools-domU-4.2.5_18-21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567261" comment="xen-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567262" comment="xen-doc-html-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567263" comment="xen-doc-pdf-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567264" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567265" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567266" comment="xen-libs-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567267" comment="xen-libs-32bit-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567268" comment="xen-tools-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567269" comment="xen-tools-domU-4.2.5_18-21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567261" comment="xen-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567262" comment="xen-doc-html-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567263" comment="xen-doc-pdf-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567264" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567265" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567266" comment="xen-libs-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567267" comment="xen-libs-32bit-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567268" comment="xen-tools-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567269" comment="xen-tools-domU-4.2.5_18-21.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219630" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1047536" ref_url="https://bugzilla.suse.com/1047536" source="BUGZILLA"/>
		<reference ref_id="814241" ref_url="https://bugzilla.suse.com/814241" source="BUGZILLA"/>
		<reference ref_id="879138" ref_url="https://bugzilla.suse.com/879138" source="BUGZILLA"/>
		<description>
xerces-j2 was updated to fix several issues.

This security issue was fixed:

- bsc#814241: Prevent possible DoS through very long attribute names

This non-security issue was fixed:

- Prevent StackOverflowError when applying a pattern restriction on long strings
  while trying to validate an XML file against a schema (bsc#1047536, bsc#879138)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-17"/>
	<updated date="2017-10-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047536">SUSE bug 1047536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814241">SUSE bug 814241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879138">SUSE bug 879138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575659" comment="xerces-j2-2.8.1-238.29.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565556" comment="xerces-j2-xml-apis-2.8.1-238.29.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565557" comment="xerces-j2-xml-resolver-2.8.1-238.29.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219631" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1195108" ref_url="https://bugzilla.suse.com/1195108" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437/" source="CVE"/>
		<description>
This update for xerces-j2 fixes the following issues:

- CVE-2022-23437: Fixed infinite loop within Apache XercesJ xml parser (bsc#1195108).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195108">SUSE bug 1195108</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23437">CVE-2022-23437 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667942" comment="xerces-j2-2.8.1-238.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667943" comment="xerces-j2-xml-apis-2.8.1-238.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667944" comment="xerces-j2-xml-resolver-2.8.1-238.29.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219632" version="1" class="patch">
	<metadata>
		<title>Security update for xfsprogs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="911866" ref_url="https://bugzilla.suse.com/911866" source="BUGZILLA"/>
		<reference ref_id="939367" ref_url="https://bugzilla.suse.com/939367" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2150" ref_url="https://www.suse.com/security/cve/CVE-2012-2150/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001764.html" source="SUSE-SU"/>
		<description>
xfsprogs was updated to fix one security vulnerability and several bugs.

- Handle unwanted data disclosure in xfs_metadump (bsc#939367, CVE-2012-2150)
- Fix segfault during xfs_repair run (bsc#911866)
- Fix definition of leaf attribute block to avoid gcc optimization xfsprogs-fix-leaf-block-definition
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-28"/>
	<updated date="2015-12-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/911866">SUSE bug 911866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939367">SUSE bug 939367</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2150/">CVE-2012-2150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2150">CVE-2012-2150 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581773" comment="xfsprogs-3.1.8-0.7.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581773" comment="xfsprogs-3.1.8-0.7.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581773" comment="xfsprogs-3.1.8-0.7.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219633" version="1" class="patch">
	<metadata>
		<title>Security update for xinetd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="762294" ref_url="https://bugzilla.suse.com/762294" source="BUGZILLA"/>
		<reference ref_id="844230" ref_url="https://bugzilla.suse.com/844230" source="BUGZILLA"/>
		<reference ref_id="855685" ref_url="https://bugzilla.suse.com/855685" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0862" ref_url="https://www.suse.com/security/cve/CVE-2012-0862/" source="CVE"/>
		<reference ref_id="CVE-2013-4342" ref_url="https://www.suse.com/security/cve/CVE-2013-4342/" source="CVE"/>
		<description>

The multiplexing system xinetd was updated to fix security issues and a 
bug.

Security issues fixed:

    * CVE-2013-4342: xinetd ignores user and group directives for tcpmux
      services.
    * CVE-2012-0862: xinetd enables all services when tcp multiplexing is
      used.

Bug fixed:

    * Services started by xinetd were limited to 1024 open file
      descriptors. (bnc#855685)

Security Issues references:

    * CVE-2012-0862
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0862&gt;
    * CVE-2013-4342
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4342&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-13"/>
	<updated date="2014-03-13"/>
	<bugzilla href="https://bugzilla.suse.com/762294">SUSE bug 762294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844230">SUSE bug 844230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855685">SUSE bug 855685</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0862/">CVE-2012-0862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0862">CVE-2012-0862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4342/">CVE-2013-4342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4342">CVE-2013-4342 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581774" comment="xinetd-2.3.14-130.133.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581774" comment="xinetd-2.3.14-130.133.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581774" comment="xinetd-2.3.14-130.133.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219634" version="1" class="patch">
	<metadata>
		<title>Recommended update for xorg-x11-server</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="816813" ref_url="https://bugzilla.suse.com/816813" source="BUGZILLA"/>
		<reference ref_id="843652" ref_url="https://bugzilla.suse.com/843652" source="BUGZILLA"/>
		<reference ref_id="853846" ref_url="https://bugzilla.suse.com/853846" source="BUGZILLA"/>
		<reference ref_id="864911" ref_url="https://bugzilla.suse.com/864911" source="BUGZILLA"/>
		<reference ref_id="874903" ref_url="https://bugzilla.suse.com/874903" source="BUGZILLA"/>
		<reference ref_id="878433" ref_url="https://bugzilla.suse.com/878433" source="BUGZILLA"/>
		<reference ref_id="878446" ref_url="https://bugzilla.suse.com/878446" source="BUGZILLA"/>
		<reference ref_id="879019" ref_url="https://bugzilla.suse.com/879019" source="BUGZILLA"/>
		<reference ref_id="880745" ref_url="https://bugzilla.suse.com/880745" source="BUGZILLA"/>
		<reference ref_id="880835" ref_url="https://bugzilla.suse.com/880835" source="BUGZILLA"/>
		<reference ref_id="883051" ref_url="https://bugzilla.suse.com/883051" source="BUGZILLA"/>
		<reference ref_id="883516" ref_url="https://bugzilla.suse.com/883516" source="BUGZILLA"/>
		<reference ref_id="883598" ref_url="https://bugzilla.suse.com/883598" source="BUGZILLA"/>
		<reference ref_id="886213" ref_url="https://bugzilla.suse.com/886213" source="BUGZILLA"/>
		<reference ref_id="907268" ref_url="https://bugzilla.suse.com/907268" source="BUGZILLA"/>
		<reference ref_id="907633" ref_url="https://bugzilla.suse.com/907633" source="BUGZILLA"/>
		<reference ref_id="915810" ref_url="https://bugzilla.suse.com/915810" source="BUGZILLA"/>
		<reference ref_id="928520" ref_url="https://bugzilla.suse.com/928520" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4396" ref_url="https://www.suse.com/security/cve/CVE-2013-4396/" source="CVE"/>
		<reference ref_id="CVE-2013-6424" ref_url="https://www.suse.com/security/cve/CVE-2013-6424/" source="CVE"/>
		<reference ref_id="CVE-2014-8091" ref_url="https://www.suse.com/security/cve/CVE-2014-8091/" source="CVE"/>
		<reference ref_id="CVE-2014-8092" ref_url="https://www.suse.com/security/cve/CVE-2014-8092/" source="CVE"/>
		<reference ref_id="CVE-2014-8093" ref_url="https://www.suse.com/security/cve/CVE-2014-8093/" source="CVE"/>
		<reference ref_id="CVE-2014-8094" ref_url="https://www.suse.com/security/cve/CVE-2014-8094/" source="CVE"/>
		<reference ref_id="CVE-2014-8095" ref_url="https://www.suse.com/security/cve/CVE-2014-8095/" source="CVE"/>
		<reference ref_id="CVE-2014-8096" ref_url="https://www.suse.com/security/cve/CVE-2014-8096/" source="CVE"/>
		<reference ref_id="CVE-2014-8097" ref_url="https://www.suse.com/security/cve/CVE-2014-8097/" source="CVE"/>
		<reference ref_id="CVE-2014-8098" ref_url="https://www.suse.com/security/cve/CVE-2014-8098/" source="CVE"/>
		<reference ref_id="CVE-2014-8099" ref_url="https://www.suse.com/security/cve/CVE-2014-8099/" source="CVE"/>
		<reference ref_id="CVE-2014-8100" ref_url="https://www.suse.com/security/cve/CVE-2014-8100/" source="CVE"/>
		<reference ref_id="CVE-2014-8101" ref_url="https://www.suse.com/security/cve/CVE-2014-8101/" source="CVE"/>
		<reference ref_id="CVE-2014-8102" ref_url="https://www.suse.com/security/cve/CVE-2014-8102/" source="CVE"/>
		<reference ref_id="CVE-2015-0255" ref_url="https://www.suse.com/security/cve/CVE-2015-0255/" source="CVE"/>
		<reference ref_id="CVE-2015-3418" ref_url="https://www.suse.com/security/cve/CVE-2015-3418/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001430.html" source="SUSE-SU"/>
		<description>

This collective update for xorg-x11-server provides the following fixes:

    * Fix a segmentation fault that can occur when X11 packets are
      forwarded between a client and a server with different endianess.
      (bnc#874903)
    * Free software cursor backing pixmap when transition between screens.
      This fixes a crash in multi screen support when an assert gets hit.
      (bnc#880835)
    * Ignore numlock in Xvnc. Following keys from VNC client will be
      already modulated by numlock on client side. (bnc#878446)
    * Fix crash when Xinerama gets disabled after RanR12 is initialized.
      (bnc#878433)
    * Prevent crash at the end of 2nd server generation when number of
      privates differ between 1st and 2nd. (bnc#883598)
    * Move Xinerama disable when only one screen is present to main loop.
      (bnc#883598)
    * Improve Xinerama command line option handling. (bnc#883598)
    * Work around a possible crash when object belongs to a client that no
      longer exists. (bnc#883516)
    * Try to make keyboard bell ring on all devices attached to master
      keyboard. (bnc#879019)
    * Implement DeleteInputDeviceRequest in Xvnc to avoid server crash when
      the Xserver restarts after a server reset. (bnc#880745).

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-27"/>
	<updated date="2014-06-27"/>
	<bugzilla href="https://bugzilla.suse.com/816813">SUSE bug 816813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843652">SUSE bug 843652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853846">SUSE bug 853846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864911">SUSE bug 864911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/874903">SUSE bug 874903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878433">SUSE bug 878433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878446">SUSE bug 878446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879019">SUSE bug 879019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880745">SUSE bug 880745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880835">SUSE bug 880835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883051">SUSE bug 883051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883516">SUSE bug 883516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883598">SUSE bug 883598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886213">SUSE bug 886213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907633">SUSE bug 907633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915810">SUSE bug 915810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928520">SUSE bug 928520</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4396/">CVE-2013-4396 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4396">CVE-2013-4396 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6424/">CVE-2013-6424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6424">CVE-2013-6424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8091/">CVE-2014-8091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8091">CVE-2014-8091 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2014-8092/">CVE-2014-8092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8092">CVE-2014-8092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8093/">CVE-2014-8093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8093">CVE-2014-8093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8094/">CVE-2014-8094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8094">CVE-2014-8094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8095/">CVE-2014-8095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8095">CVE-2014-8095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8096/">CVE-2014-8096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8096">CVE-2014-8096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8097/">CVE-2014-8097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8097">CVE-2014-8097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8098/">CVE-2014-8098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8098">CVE-2014-8098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8099/">CVE-2014-8099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8099">CVE-2014-8099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8100/">CVE-2014-8100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8100">CVE-2014-8100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8101/">CVE-2014-8101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8101">CVE-2014-8101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8102/">CVE-2014-8102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8102">CVE-2014-8102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0255/">CVE-2015-0255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0255">CVE-2015-0255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3418/">CVE-2015-3418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3418">CVE-2015-3418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994268" comment="xorg-x11-Xvnc-7.4-27.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994269" comment="xorg-x11-server-7.4-27.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994270" comment="xorg-x11-server-extra-7.4-27.97.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994268" comment="xorg-x11-Xvnc-7.4-27.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994269" comment="xorg-x11-server-7.4-27.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994270" comment="xorg-x11-server-extra-7.4-27.97.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994268" comment="xorg-x11-Xvnc-7.4-27.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994269" comment="xorg-x11-server-7.4-27.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994270" comment="xorg-x11-server-extra-7.4-27.97.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219635" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821663" ref_url="https://bugzilla.suse.com/821663" source="BUGZILLA"/>
		<reference ref_id="854915" ref_url="https://bugzilla.suse.com/854915" source="BUGZILLA"/>
		<reference ref_id="857544" ref_url="https://bugzilla.suse.com/857544" source="BUGZILLA"/>
		<reference ref_id="921978" ref_url="https://bugzilla.suse.com/921978" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1984" ref_url="https://www.suse.com/security/cve/CVE-2013-1984/" source="CVE"/>
		<reference ref_id="CVE-2013-1985" ref_url="https://www.suse.com/security/cve/CVE-2013-1985/" source="CVE"/>
		<reference ref_id="CVE-2013-1986" ref_url="https://www.suse.com/security/cve/CVE-2013-1986/" source="CVE"/>
		<reference ref_id="CVE-2013-1988" ref_url="https://www.suse.com/security/cve/CVE-2013-1988/" source="CVE"/>
		<reference ref_id="CVE-2013-1990" ref_url="https://www.suse.com/security/cve/CVE-2013-1990/" source="CVE"/>
		<reference ref_id="CVE-2013-1991" ref_url="https://www.suse.com/security/cve/CVE-2013-1991/" source="CVE"/>
		<reference ref_id="CVE-2013-1992" ref_url="https://www.suse.com/security/cve/CVE-2013-1992/" source="CVE"/>
		<reference ref_id="CVE-2013-1995" ref_url="https://www.suse.com/security/cve/CVE-2013-1995/" source="CVE"/>
		<reference ref_id="CVE-2013-1996" ref_url="https://www.suse.com/security/cve/CVE-2013-1996/" source="CVE"/>
		<reference ref_id="CVE-2013-1998" ref_url="https://www.suse.com/security/cve/CVE-2013-1998/" source="CVE"/>
		<reference ref_id="CVE-2013-1999" ref_url="https://www.suse.com/security/cve/CVE-2013-1999/" source="CVE"/>
		<reference ref_id="CVE-2013-2000" ref_url="https://www.suse.com/security/cve/CVE-2013-2000/" source="CVE"/>
		<reference ref_id="CVE-2013-2001" ref_url="https://www.suse.com/security/cve/CVE-2013-2001/" source="CVE"/>
		<reference ref_id="CVE-2013-2003" ref_url="https://www.suse.com/security/cve/CVE-2013-2003/" source="CVE"/>
		<reference ref_id="CVE-2013-2063" ref_url="https://www.suse.com/security/cve/CVE-2013-2063/" source="CVE"/>
		<reference ref_id="CVE-2013-6462" ref_url="https://www.suse.com/security/cve/CVE-2013-6462/" source="CVE"/>
		<reference ref_id="CVE-2014-0209" ref_url="https://www.suse.com/security/cve/CVE-2014-0209/" source="CVE"/>
		<reference ref_id="CVE-2014-0210" ref_url="https://www.suse.com/security/cve/CVE-2014-0210/" source="CVE"/>
		<reference ref_id="CVE-2014-0211" ref_url="https://www.suse.com/security/cve/CVE-2014-0211/" source="CVE"/>
		<reference ref_id="CVE-2015-1802" ref_url="https://www.suse.com/security/cve/CVE-2015-1802/" source="CVE"/>
		<reference ref_id="CVE-2015-1803" ref_url="https://www.suse.com/security/cve/CVE-2015-1803/" source="CVE"/>
		<reference ref_id="CVE-2015-1804" ref_url="https://www.suse.com/security/cve/CVE-2015-1804/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001332.html" source="SUSE-SU"/>
		<description>

xorg-x11-libs was patched to fix the following security issues:

    * Integer overflow of allocations in font metadata file parsing.
      (CVE-2014-0209)
    * libxfont not validating length fields when parsing xfs protocol
      replies. (CVE-2014-0210)
    * Integer overflows causing miscalculating memory needs for xfs
      replies. (CVE-2014-0211)

Further information is available at 
http://lists.x.org/archives/xorg-announce/2014-May/002431.html
&lt;http://lists.x.org/archives/xorg-announce/2014-May/002431.html&gt; .

Security Issues references:

    * CVE-2014-0209
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209&gt;
    * CVE-2014-0210
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210&gt;
    * CVE-2014-0211
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-15"/>
	<updated date="2014-05-15"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854915">SUSE bug 854915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857544">SUSE bug 857544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921978">SUSE bug 921978</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1984/">CVE-2013-1984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1984">CVE-2013-1984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1985/">CVE-2013-1985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1985">CVE-2013-1985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1986/">CVE-2013-1986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1986">CVE-2013-1986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1988/">CVE-2013-1988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1988">CVE-2013-1988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1990/">CVE-2013-1990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1990">CVE-2013-1990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1991/">CVE-2013-1991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1991">CVE-2013-1991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1992/">CVE-2013-1992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1992">CVE-2013-1992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1995/">CVE-2013-1995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1995">CVE-2013-1995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1996/">CVE-2013-1996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1996">CVE-2013-1996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1998/">CVE-2013-1998 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1998">CVE-2013-1998 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1999/">CVE-2013-1999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1999">CVE-2013-1999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2000/">CVE-2013-2000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2000">CVE-2013-2000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2001/">CVE-2013-2001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2001">CVE-2013-2001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2003/">CVE-2013-2003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2003">CVE-2013-2003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2063/">CVE-2013-2063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2063">CVE-2013-2063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6462/">CVE-2013-6462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6462">CVE-2013-6462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0209/">CVE-2014-0209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0209">CVE-2014-0209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0210/">CVE-2014-0210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0210">CVE-2014-0210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0211/">CVE-2014-0211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0211">CVE-2014-0211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1802/">CVE-2015-1802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1802">CVE-2015-1802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1803/">CVE-2015-1803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1803">CVE-2015-1803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1804/">CVE-2015-1804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1804">CVE-2015-1804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581775" comment="xorg-x11-libs-7.4-8.26.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581776" comment="xorg-x11-libs-32bit-7.4-8.26.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581777" comment="xorg-x11-libs-x86-7.4-8.26.42.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581775" comment="xorg-x11-libs-7.4-8.26.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581776" comment="xorg-x11-libs-32bit-7.4-8.26.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581777" comment="xorg-x11-libs-x86-7.4-8.26.42.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581775" comment="xorg-x11-libs-7.4-8.26.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581776" comment="xorg-x11-libs-32bit-7.4-8.26.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581777" comment="xorg-x11-libs-x86-7.4-8.26.42.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219636" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libICE (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1025068" ref_url="https://bugzilla.suse.com/1025068" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2626" ref_url="https://www.suse.com/security/cve/CVE-2017-2626/" source="CVE"/>
		<description>
This update for xorg-x11-libICE fixes the following issues:

- CVE-2017-2626: Creation of the ICE auth session cookies used insufficient randomness, making these cookies
  predictable. A more random generation method has been implemented. (boo#1025068)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-12"/>
	<updated date="2017-07-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025068">SUSE bug 1025068</bugzilla>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-2626/">CVE-2017-2626 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2626">CVE-2017-2626 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575662" comment="xorg-x11-libICE-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575663" comment="xorg-x11-libICE-32bit-7.4-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219637" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821664" ref_url="https://bugzilla.suse.com/821664" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1981" ref_url="https://www.suse.com/security/cve/CVE-2013-1981/" source="CVE"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<reference ref_id="CVE-2013-2004" ref_url="https://www.suse.com/security/cve/CVE-2013-2004/" source="CVE"/>
		<description>

This update of xorg-x11-libX11 fixes several security issues.

Bug 815451/821664

CVE-2013-1981 CVE-2013-1997 CVE-2013-2004

Security Issues:

    * CVE-2013-1981
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981&gt;
    * CVE-2013-1997
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997&gt;
    * CVE-2013-2004
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821664">SUSE bug 821664</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1981/">CVE-2013-1981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1981">CVE-2013-1981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1997">CVE-2013-1997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2004/">CVE-2013-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2004">CVE-2013-2004 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577080" comment="xorg-x11-libX11-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577081" comment="xorg-x11-libX11-32bit-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577082" comment="xorg-x11-libX11-x86-7.4-5.11.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577080" comment="xorg-x11-libX11-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577081" comment="xorg-x11-libX11-32bit-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577082" comment="xorg-x11-libX11-x86-7.4-5.11.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577080" comment="xorg-x11-libX11-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577081" comment="xorg-x11-libX11-32bit-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577082" comment="xorg-x11-libX11-x86-7.4-5.11.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219638" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="927220" ref_url="https://bugzilla.suse.com/927220" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7439" ref_url="https://www.suse.com/security/cve/CVE-2013-7439/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001521.html" source="SUSE-SU"/>
		<description>
xorg-x11-libX11 was updated to fix one security issue.

This security issue was fixed:
- CVE-2013-7439: Multiple off-by-one errors in the (1) MakeBigReq and (2) SetReqLen macros in include/X11/Xlibint.h in X11R6.x and libX11 before 1.6.0 allowed remote attackers to have unspecified impact via a crafted request, which triggered a buffer overflow (bsc#927220).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-17"/>
	<updated date="2015-07-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/927220">SUSE bug 927220</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7439/">CVE-2013-7439 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7439">CVE-2013-7439 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581778" comment="xorg-x11-libX11-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581779" comment="xorg-x11-libX11-32bit-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581780" comment="xorg-x11-libX11-x86-7.4-5.11.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581778" comment="xorg-x11-libX11-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581779" comment="xorg-x11-libX11-32bit-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581780" comment="xorg-x11-libX11-x86-7.4-5.11.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581778" comment="xorg-x11-libX11-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581779" comment="xorg-x11-libX11-32bit-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581780" comment="xorg-x11-libX11-x86-7.4-5.11.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219639" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1002991" ref_url="https://bugzilla.suse.com/1002991" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7942" ref_url="https://www.suse.com/security/cve/CVE-2016-7942/" source="CVE"/>
		<description>

This update for xorg-x11-libX11 fixes the following issues:

  - plug a memory leak (bsc#1002991, CVE-2016-7942)
  - insufficient validation of data from the X server can cause
    out of boundary memory read (XGetImage()) or write (XListFonts())
    (bsc#1002991, CVE-2016-7942)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-08"/>
	<updated date="2016-12-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002991">SUSE bug 1002991</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7942/">CVE-2016-7942 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7942">CVE-2016-7942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575666" comment="xorg-x11-libX11-7.4-5.11.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575667" comment="xorg-x11-libX11-32bit-7.4-5.11.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219640" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1019642" ref_url="https://bugzilla.suse.com/1019642" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<description>

This update for xorg-x11-libX11 fixes the following issues:

- a regression introduced by the security fix for CVE-2013-1997
  (bnc#824294). Keyboard mappings for special characters on Non-English
  keyboards might have been broken. (bnc#1019642)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-09"/>
	<updated date="2017-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1019642">SUSE bug 1019642</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1997">CVE-2013-1997 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575668" comment="xorg-x11-libX11-7.4-5.11.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575669" comment="xorg-x11-libX11-32bit-7.4-5.11.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219641" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1102062" ref_url="https://bugzilla.suse.com/1102062" source="BUGZILLA"/>
		<reference ref_id="1102068" ref_url="https://bugzilla.suse.com/1102068" source="BUGZILLA"/>
		<reference ref_id="1102073" ref_url="https://bugzilla.suse.com/1102073" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14598" ref_url="https://www.suse.com/security/cve/CVE-2018-14598/" source="CVE"/>
		<reference ref_id="CVE-2018-14599" ref_url="https://www.suse.com/security/cve/CVE-2018-14599/" source="CVE"/>
		<reference ref_id="CVE-2018-14600" ref_url="https://www.suse.com/security/cve/CVE-2018-14600/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004622.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- CVE-2018-14599: The function XListExtensions was vulnerable to an off-by-one
  error caused by malicious server responses, leading to DoS or possibly
  unspecified other impact (bsc#1102062)
- CVE-2018-14600: The function XListExtensions interpreted a variable as signed
  instead of unsigned, resulting in an out-of-bounds write (of up to 128 bytes),
  leading to DoS or remote code execution (bsc#1102068)
- CVE-2018-14598: A malicious server could have sent a reply in which the first
  string overflows, causing a variable to be set to NULL that will be freed later
  on, leading to DoS (segmentation fault) (bsc#1102073)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-28"/>
	<updated date="2018-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1102062">SUSE bug 1102062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102068">SUSE bug 1102068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102073">SUSE bug 1102073</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14598/">CVE-2018-14598 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14598">CVE-2018-14598 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14599/">CVE-2018-14599 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14599">CVE-2018-14599 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14600/">CVE-2018-14600 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14600">CVE-2018-14600 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581781" comment="xorg-x11-libX11-7.4-5.11.72.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581782" comment="xorg-x11-libX11-32bit-7.4-5.11.72.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581781" comment="xorg-x11-libX11-7.4-5.11.72.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581782" comment="xorg-x11-libX11-32bit-7.4-5.11.72.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219642" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-05"/>
	<updated date="2020-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14344">CVE-2020-14344 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575672" comment="xorg-x11-libX11-7.4-5.11.72.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575673" comment="xorg-x11-libX11-32bit-7.4-5.11.72.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219643" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-11"/>
	<updated date="2020-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14344">CVE-2020-14344 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575674" comment="xorg-x11-libX11-7.4-5.11.72.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575675" comment="xorg-x11-libX11-32bit-7.4-5.11.72.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219644" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1175239" ref_url="https://bugzilla.suse.com/1175239" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14363" ref_url="https://www.suse.com/security/cve/CVE-2020-14363/" source="CVE"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- CVE-2020-14363: Fix an integer overflow in init_om() (bsc#1175239).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-15"/>
	<updated date="2020-09-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175239">SUSE bug 1175239</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14363/">CVE-2020-14363 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14363">CVE-2020-14363 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575676" comment="xorg-x11-libX11-7.4-5.11.72.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575677" comment="xorg-x11-libX11-32bit-7.4-5.11.72.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219645" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182506" ref_url="https://bugzilla.suse.com/1182506" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535/" source="CVE"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- CVE-2021-31535: Fixed missing request length checks in libX11 (bsc#1182506).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-26"/>
	<updated date="2021-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182506">SUSE bug 1182506</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31535">CVE-2021-31535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575678" comment="xorg-x11-libX11-7.4-5.11.72.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575679" comment="xorg-x11-libX11-32bit-7.4-5.11.72.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219646" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186643" ref_url="https://bugzilla.suse.com/1186643" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535/" source="CVE"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- Regression in the fix for CVE-2021-31535, causing segfaults for xforms applications like fdesign (bsc#1186643).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-15"/>
	<updated date="2021-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186643">SUSE bug 1186643</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31535">CVE-2021-31535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575680" comment="xorg-x11-libX11-7.4-5.11.72.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575681" comment="xorg-x11-libX11-32bit-7.4-5.11.72.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219647" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204422" ref_url="https://bugzilla.suse.com/1204422" source="BUGZILLA"/>
		<reference ref_id="1204425" ref_url="https://bugzilla.suse.com/1204425" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3554" ref_url="https://www.suse.com/security/cve/CVE-2022-3554/" source="CVE"/>
		<reference ref_id="CVE-2022-3555" ref_url="https://www.suse.com/security/cve/CVE-2022-3555/" source="CVE"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

  - CVE-2022-3554: Fixed memory leak in XRegisterIMInstantiateCallback() (bsc#1204422).
  - CVE-2022-3555: Fixed memory leak in _XFreeX11XCBStructure() (bsc#1204425).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-15"/>
	<updated date="2022-11-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1204422">SUSE bug 1204422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204425">SUSE bug 1204425</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3554/">CVE-2022-3554 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3554">CVE-2022-3554 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3555/">CVE-2022-3555 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3555">CVE-2022-3555 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994271" comment="xorg-x11-libX11-7.4-5.11.72.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994272" comment="xorg-x11-libX11-32bit-7.4-5.11.72.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219648" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204425" ref_url="https://bugzilla.suse.com/1204425" source="BUGZILLA"/>
		<reference ref_id="1208881" ref_url="https://bugzilla.suse.com/1208881" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3555" ref_url="https://www.suse.com/security/cve/CVE-2022-3555/" source="CVE"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- Fixes regression introduced with security update for CVE-2022-3555 (bsc#1204425, bsc#1208881)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-08"/>
	<updated date="2023-03-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1204425">SUSE bug 1204425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208881">SUSE bug 1208881</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3555/">CVE-2022-3555 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3555">CVE-2022-3555 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994273" comment="xorg-x11-libX11-7.4-5.11.72.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994274" comment="xorg-x11-libX11-32bit-7.4-5.11.72.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219649" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXdmcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1025046" ref_url="https://bugzilla.suse.com/1025046" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2625" ref_url="https://www.suse.com/security/cve/CVE-2017-2625/" source="CVE"/>
		<description>
This update for xorg-x11-libXdmcp fixes the following issues:

- CVE-2017-2625: The generation of session key in XDM using libXdmcp might have used weak entropy, making
  the session keys predictable (bsc#1025046)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-14"/>
	<updated date="2017-07-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025046">SUSE bug 1025046</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2625/">CVE-2017-2625 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2625">CVE-2017-2625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575682" comment="xorg-x11-libXdmcp-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565566" comment="xorg-x11-libXdmcp-32bit-7.4-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219650" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXext</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821665" ref_url="https://bugzilla.suse.com/821665" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982/" source="CVE"/>
		<description>

This update of xorg-x11-libXext fixes several integer overflow issues.

Bug 815451/821665 CVE-2013-1982

Security Issues:

    * CVE-2013-1982
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821665">SUSE bug 821665</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1982">CVE-2013-1982 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581783" comment="xorg-x11-libXext-7.4-1.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581784" comment="xorg-x11-libXext-32bit-7.4-1.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581785" comment="xorg-x11-libXext-x86-7.4-1.18.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581783" comment="xorg-x11-libXext-7.4-1.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581784" comment="xorg-x11-libXext-32bit-7.4-1.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581785" comment="xorg-x11-libXext-x86-7.4-1.18.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581783" comment="xorg-x11-libXext-7.4-1.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581784" comment="xorg-x11-libXext-32bit-7.4-1.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581785" comment="xorg-x11-libXext-x86-7.4-1.18.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219651" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXfixes</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821667" ref_url="https://bugzilla.suse.com/821667" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983/" source="CVE"/>
		<description>

This update of xorg-x11-libXfixes fixed a integer overflow issue.

Bug 815451/821667 CVE-2013-1983

Security Issues:

    * CVE-2013-1983
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821667">SUSE bug 821667</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1983">CVE-2013-1983 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581786" comment="xorg-x11-libXfixes-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581787" comment="xorg-x11-libXfixes-32bit-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581788" comment="xorg-x11-libXfixes-x86-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581786" comment="xorg-x11-libXfixes-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581787" comment="xorg-x11-libXfixes-32bit-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581788" comment="xorg-x11-libXfixes-x86-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581786" comment="xorg-x11-libXfixes-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581787" comment="xorg-x11-libXfixes-32bit-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581788" comment="xorg-x11-libXfixes-x86-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219652" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXfixes (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1002995" ref_url="https://bugzilla.suse.com/1002995" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7944" ref_url="https://www.suse.com/security/cve/CVE-2016-7944/" source="CVE"/>
		<description>

This update for xorg-x11-libXfixes fixes the following issues:

  - insufficient validation of data from the X server can cause an
    integer overflow on 32 bit architectures (bsc#1002995, CVE-2016-7944)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-16"/>
	<updated date="2016-12-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002995">SUSE bug 1002995</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7944/">CVE-2016-7944 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7944">CVE-2016-7944 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575687" comment="xorg-x11-libXfixes-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575688" comment="xorg-x11-libXfixes-32bit-7.4-1.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219653" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821668" ref_url="https://bugzilla.suse.com/821668" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2062" ref_url="https://www.suse.com/security/cve/CVE-2013-2062/" source="CVE"/>
		<description>

This update of xorg-x11-libXp fixes several integer overflow issues.

Bug 815451/821668 CVE-2013-2062

Security Issues:

    * CVE-2013-2062
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821668">SUSE bug 821668</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2062/">CVE-2013-2062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2062">CVE-2013-2062 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577089" comment="xorg-x11-libXp-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577090" comment="xorg-x11-libXp-32bit-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577091" comment="xorg-x11-libXp-x86-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577089" comment="xorg-x11-libXp-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577090" comment="xorg-x11-libXp-32bit-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577091" comment="xorg-x11-libXp-x86-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577089" comment="xorg-x11-libXp-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577090" comment="xorg-x11-libXp-32bit-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577091" comment="xorg-x11-libXp-x86-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219654" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXpm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1021315" ref_url="https://bugzilla.suse.com/1021315" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10164" ref_url="https://www.suse.com/security/cve/CVE-2016-10164/" source="CVE"/>
		<description>

This update for xorg-x11-libXpm fixes the following security issue:

- A heap overflow in XPM handling could be used by attackers supplying
  XPM files to  crash or potentially execute code. (bsc#1021315)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1021315">SUSE bug 1021315</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10164/">CVE-2016-10164 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10164">CVE-2016-10164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575691" comment="xorg-x11-libXpm-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575692" comment="xorg-x11-libXpm-32bit-7.4-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219655" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXpm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1207029" ref_url="https://bugzilla.suse.com/1207029" source="BUGZILLA"/>
		<reference ref_id="1207030" ref_url="https://bugzilla.suse.com/1207030" source="BUGZILLA"/>
		<reference ref_id="1207031" ref_url="https://bugzilla.suse.com/1207031" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-44617" ref_url="https://www.suse.com/security/cve/CVE-2022-44617/" source="CVE"/>
		<reference ref_id="CVE-2022-46285" ref_url="https://www.suse.com/security/cve/CVE-2022-46285/" source="CVE"/>
		<reference ref_id="CVE-2022-4883" ref_url="https://www.suse.com/security/cve/CVE-2022-4883/" source="CVE"/>
		<description>
This update for xorg-x11-libXpm fixes the following issues:

- CVE-2022-46285: Fixed an infinite loop that could be triggered
  when reading a XPM image with a C-style comment that is never
  closed (bsc#1207029).
- CVE-2022-44617: Fixed an excessive resource consumption that could
  be triggered when reading small crafted XPM image (bsc#1207030).
- CVE-2022-4883: Fixed an issue that made decompression commands
  susceptible to PATH environment variable manipulation attacks
  (bsc#1207031).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-18"/>
	<updated date="2023-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207029">SUSE bug 1207029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207030">SUSE bug 1207030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207031">SUSE bug 1207031</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44617/">CVE-2022-44617 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44617">CVE-2022-44617 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-46285/">CVE-2022-46285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46285">CVE-2022-46285 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4883/">CVE-2022-4883 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4883">CVE-2022-4883 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994275" comment="xorg-x11-libXpm-7.4-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994276" comment="xorg-x11-libXpm-32bit-7.4-4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219656" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXrender</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821669" ref_url="https://bugzilla.suse.com/821669" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987/" source="CVE"/>
		<description>

This update of xorg-x11-libXrender fixes several integer overflow issues.

Bug 815451/821669 CVE-2013-1987

Security Issues:

    * CVE-2013-1987
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821669">SUSE bug 821669</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1987">CVE-2013-1987 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581789" comment="xorg-x11-libXrender-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581790" comment="xorg-x11-libXrender-32bit-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581791" comment="xorg-x11-libXrender-x86-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581789" comment="xorg-x11-libXrender-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581790" comment="xorg-x11-libXrender-32bit-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581791" comment="xorg-x11-libXrender-x86-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581789" comment="xorg-x11-libXrender-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581790" comment="xorg-x11-libXrender-32bit-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581791" comment="xorg-x11-libXrender-x86-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219657" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXrender (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1003002" ref_url="https://bugzilla.suse.com/1003002" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7949" ref_url="https://www.suse.com/security/cve/CVE-2016-7949/" source="CVE"/>
		<reference ref_id="CVE-2016-7950" ref_url="https://www.suse.com/security/cve/CVE-2016-7950/" source="CVE"/>
		<description>

This update for xorg-x11-libXrender fixes the following issues:

  - insufficient validation of data from the X server can cause out
    of boundary memory writes (bsc#1003002, CVE-2016-7949, CVE-2016-7950)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-13"/>
	<updated date="2016-12-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003002">SUSE bug 1003002</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7949/">CVE-2016-7949 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7949">CVE-2016-7949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7950/">CVE-2016-7950 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7950">CVE-2016-7950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575695" comment="xorg-x11-libXrender-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575696" comment="xorg-x11-libXrender-32bit-7.4-1.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219658" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821670" ref_url="https://bugzilla.suse.com/821670" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002/" source="CVE"/>
		<reference ref_id="CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005/" source="CVE"/>
		<description>

This update of xorg-x11-libXt fixes several integer and buffer overflow 
issues.

Bug 815451/821670 CVE-2013-2002/CVE-2013-2005

Security Issues:

    * CVE-2013-2002
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002&gt;
    * CVE-2013-2005
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821670">SUSE bug 821670</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2002">CVE-2013-2002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2005">CVE-2013-2005 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581792" comment="xorg-x11-libXt-7.4-1.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581793" comment="xorg-x11-libXt-32bit-7.4-1.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581794" comment="xorg-x11-libXt-x86-7.4-1.19.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581792" comment="xorg-x11-libXt-7.4-1.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581793" comment="xorg-x11-libXt-32bit-7.4-1.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581794" comment="xorg-x11-libXt-x86-7.4-1.19.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581792" comment="xorg-x11-libXt-7.4-1.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581793" comment="xorg-x11-libXt-32bit-7.4-1.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581794" comment="xorg-x11-libXt-x86-7.4-1.19.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219659" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXv</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821671" ref_url="https://bugzilla.suse.com/821671" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989/" source="CVE"/>
		<reference ref_id="CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066/" source="CVE"/>
		<description>

This update of xorg-x11-libXv fixes several integer and buffer overflow 
issues.

Bug 815451/821671 CVE-2013-1989/CVE-2013-2066

Security Issues:

    * CVE-2013-1989
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989&gt;
    * CVE-2013-2066
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821671">SUSE bug 821671</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1989">CVE-2013-1989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2066">CVE-2013-2066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581795" comment="xorg-x11-libXv-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581796" comment="xorg-x11-libXv-32bit-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581797" comment="xorg-x11-libXv-x86-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581795" comment="xorg-x11-libXv-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581796" comment="xorg-x11-libXv-32bit-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581797" comment="xorg-x11-libXv-x86-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581795" comment="xorg-x11-libXv-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581796" comment="xorg-x11-libXv-32bit-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581797" comment="xorg-x11-libXv-x86-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219660" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXv (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1003017" ref_url="https://bugzilla.suse.com/1003017" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5407" ref_url="https://www.suse.com/security/cve/CVE-2016-5407/" source="CVE"/>
		<description>

This update for xorg-x11-libXv fixes the following issues:

  - insufficient validation of data from the X server can cause
    memory corruption (bsc#1003017, CVE-2016-5407)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-13"/>
	<updated date="2016-12-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003017">SUSE bug 1003017</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5407/">CVE-2016-5407 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5407">CVE-2016-5407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575701" comment="xorg-x11-libXv-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575702" comment="xorg-x11-libXv-32bit-7.4-1.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219661" version="1" class="patch">
	<metadata>
		<title>Recommended update for xorg-x11-libs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="958383" ref_url="https://bugzilla.suse.com/958383" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1804" ref_url="https://www.suse.com/security/cve/CVE-2015-1804/" source="CVE"/>
		<reference ref_id="SUSE-RU-2015:2393-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-December/003924.html" source="SUSE-SU"/>
		<description>

This update for xorg-x11-libs fixes the following issues: 

- The original fix for CVE-2015-1804 prevented DWIDTH to be negative. However, the
  spec states that 'DWIDTH [...] is a vector indicating the position of the next
  glyph's origin relative to the origin of this glyph'. Consequently, negative 
  DWIDTH values should be allowed. (bsc#958383)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-29"/>
	<updated date="2015-12-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958383">SUSE bug 958383</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1804/">CVE-2015-1804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1804">CVE-2015-1804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009593935" comment="xorg-x11-libs-7.4-8.26.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593936" comment="xorg-x11-libs-32bit-7.4-8.26.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593937" comment="xorg-x11-libs-x86-7.4-8.26.46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009593935" comment="xorg-x11-libs-7.4-8.26.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593936" comment="xorg-x11-libs-32bit-7.4-8.26.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593937" comment="xorg-x11-libs-x86-7.4-8.26.46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009593935" comment="xorg-x11-libs-7.4-8.26.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593936" comment="xorg-x11-libs-32bit-7.4-8.26.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593937" comment="xorg-x11-libs-x86-7.4-8.26.46.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219662" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1002998" ref_url="https://bugzilla.suse.com/1002998" source="BUGZILLA"/>
		<reference ref_id="1003000" ref_url="https://bugzilla.suse.com/1003000" source="BUGZILLA"/>
		<reference ref_id="1003012" ref_url="https://bugzilla.suse.com/1003012" source="BUGZILLA"/>
		<reference ref_id="1003023" ref_url="https://bugzilla.suse.com/1003023" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7945" ref_url="https://www.suse.com/security/cve/CVE-2016-7945/" source="CVE"/>
		<reference ref_id="CVE-2016-7946" ref_url="https://www.suse.com/security/cve/CVE-2016-7946/" source="CVE"/>
		<reference ref_id="CVE-2016-7947" ref_url="https://www.suse.com/security/cve/CVE-2016-7947/" source="CVE"/>
		<reference ref_id="CVE-2016-7948" ref_url="https://www.suse.com/security/cve/CVE-2016-7948/" source="CVE"/>
		<reference ref_id="CVE-2016-7951" ref_url="https://www.suse.com/security/cve/CVE-2016-7951/" source="CVE"/>
		<reference ref_id="CVE-2016-7952" ref_url="https://www.suse.com/security/cve/CVE-2016-7952/" source="CVE"/>
		<reference ref_id="CVE-2016-7953" ref_url="https://www.suse.com/security/cve/CVE-2016-7953/" source="CVE"/>
		<description>

This update for xorg-x11-libs fixes the following issues:

  - insufficient validation of data from the X server can cause a
    one byte buffer read underrun (bsc#1003023, CVE-2016-7953)
  - insufficient validation of data from the X server can cause out
    of boundary memory access or endless loops (Denial of Service)
    (bsc#1003012, CVE-2016-7951, CVE-2016-7952)
  - insufficient validation of data from the X server can cause out
    of boundary memory writes (bsc#1003000, CVE-2016-7947, CVE-2016-7948)
  - insufficient validation of data from the X server can cause out
    of boundary memory access or endless loops (Denial of Service).
    (bsc#1002998, CVE-2016-7945, CVE-2016-7946)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-16"/>
	<updated date="2016-12-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002998">SUSE bug 1002998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003000">SUSE bug 1003000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003012">SUSE bug 1003012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003023">SUSE bug 1003023</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7945/">CVE-2016-7945 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7945">CVE-2016-7945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7946/">CVE-2016-7946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7946">CVE-2016-7946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7947/">CVE-2016-7947 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7947">CVE-2016-7947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7948/">CVE-2016-7948 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7948">CVE-2016-7948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7951/">CVE-2016-7951 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7951">CVE-2016-7951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7952/">CVE-2016-7952 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7952">CVE-2016-7952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7953/">CVE-2016-7953 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7953">CVE-2016-7953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575703" comment="xorg-x11-libs-7.4-8.26.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575704" comment="xorg-x11-libs-32bit-7.4-8.26.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219663" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1049692" ref_url="https://bugzilla.suse.com/1049692" source="BUGZILLA"/>
		<reference ref_id="1050459" ref_url="https://bugzilla.suse.com/1050459" source="BUGZILLA"/>
		<reference ref_id="1054285" ref_url="https://bugzilla.suse.com/1054285" source="BUGZILLA"/>
		<reference ref_id="1065386" ref_url="https://bugzilla.suse.com/1065386" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13720" ref_url="https://www.suse.com/security/cve/CVE-2017-13720/" source="CVE"/>
		<reference ref_id="CVE-2017-13722" ref_url="https://www.suse.com/security/cve/CVE-2017-13722/" source="CVE"/>
		<reference ref_id="CVE-2017-16612" ref_url="https://www.suse.com/security/cve/CVE-2017-16612/" source="CVE"/>
		<description>
This update for xorg-x11-libs fixes several issues.

These security issues were fixed:

- CVE-2017-16612: Heap overflows due to an integer overflow while parsing images and a signedness issue while parsing comments (bsc#1065386).
- CVE-2017-13720: Improper check for end of string in PatterMatch caused invalid reads (bsc#1054285)
- CVE-2017-13722: Malformed PCF file could have caused DoS or leak information (bsc#1049692)
- Prevent the X server from accessing arbitrary files as root. It is not possible to leak information, but special files can be touched allowing for causing side effects (bsc#1050459)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049692">SUSE bug 1049692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050459">SUSE bug 1050459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054285">SUSE bug 1054285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065386">SUSE bug 1065386</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-13720/">CVE-2017-13720 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13720">CVE-2017-13720 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13722/">CVE-2017-13722 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13722">CVE-2017-13722 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16612/">CVE-2017-16612 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16612">CVE-2017-16612 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575705" comment="xorg-x11-libs-7.4-8.26.50.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575706" comment="xorg-x11-libs-32bit-7.4-8.26.50.5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219664" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1103511" ref_url="https://bugzilla.suse.com/1103511" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9262" ref_url="https://www.suse.com/security/cve/CVE-2015-9262/" source="CVE"/>
		<description>
This update for xorg-x11-libs fixes the following security issue:

- CVE-2015-9262: _XcursorThemeInherits allowed remote attackers to cause denial
  of service or potentially code execution via a one-byte heap overflow
  (bsc#1103511)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-21"/>
	<updated date="2018-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103511">SUSE bug 1103511</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-9262/">CVE-2015-9262 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9262">CVE-2015-9262 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575707" comment="xorg-x11-libs-7.4-8.26.50.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575708" comment="xorg-x11-libs-32bit-7.4-8.26.50.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219665" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1019649" ref_url="https://bugzilla.suse.com/1019649" source="BUGZILLA"/>
		<reference ref_id="1025029" ref_url="https://bugzilla.suse.com/1025029" source="BUGZILLA"/>
		<reference ref_id="1025035" ref_url="https://bugzilla.suse.com/1025035" source="BUGZILLA"/>
		<reference ref_id="1025084" ref_url="https://bugzilla.suse.com/1025084" source="BUGZILLA"/>
		<reference ref_id="981044" ref_url="https://bugzilla.suse.com/981044" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2624" ref_url="https://www.suse.com/security/cve/CVE-2017-2624/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

Security issues:

- CVE-2017-2624: Prevent timing attack against MIT cookie. (bsc#1025029, CVE-2017-2624)

Non security issues:

- Use arc4random to generate cookies. (bsc#1025084)
- XDrawArc performance improvement (bsc#1019649)
- Fix byte swapping for gradeint stops (bsc#981044).
- Remove unused function with use-after-free issue. (bsc#1025035)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-30"/>
	<updated date="2017-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1019649">SUSE bug 1019649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025029">SUSE bug 1025029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025035">SUSE bug 1025035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025084">SUSE bug 1025084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981044">SUSE bug 981044</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-2624/">CVE-2017-2624 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2624">CVE-2017-2624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581798" comment="xorg-x11-Xvnc-7.4-27.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581799" comment="xorg-x11-server-7.4-27.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581800" comment="xorg-x11-server-extra-7.4-27.118.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219666" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1035283" ref_url="https://bugzilla.suse.com/1035283" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10971" ref_url="https://www.suse.com/security/cve/CVE-2017-10971/" source="CVE"/>
		<reference ref_id="CVE-2017-10972" ref_url="https://www.suse.com/security/cve/CVE-2017-10972/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003027.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2017-10971: Fix endianess handling of GenericEvent to prevent a stack overflow by clients. (bnc#1035283)
- Make sure the type of all events to be sent by ProcXSendExtensionEvent are in the
  allowed range.
- CVE-2017-10972: Initialize the xEvent eventT with zeros to avoid information leakage.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-12"/>
	<updated date="2017-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1035283">SUSE bug 1035283</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10971/">CVE-2017-10971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10971">CVE-2017-10971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10972/">CVE-2017-10972 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10972">CVE-2017-10972 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581801" comment="xorg-x11-Xvnc-7.4-27.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581802" comment="xorg-x11-server-7.4-27.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581803" comment="xorg-x11-server-extra-7.4-27.121.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581801" comment="xorg-x11-Xvnc-7.4-27.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581802" comment="xorg-x11-server-7.4-27.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581803" comment="xorg-x11-server-extra-7.4-27.121.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219667" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1025084" ref_url="https://bugzilla.suse.com/1025084" source="BUGZILLA"/>
		<reference ref_id="1051150" ref_url="https://bugzilla.suse.com/1051150" source="BUGZILLA"/>
		<reference ref_id="1063034" ref_url="https://bugzilla.suse.com/1063034" source="BUGZILLA"/>
		<reference ref_id="1063035" ref_url="https://bugzilla.suse.com/1063035" source="BUGZILLA"/>
		<reference ref_id="1063037" ref_url="https://bugzilla.suse.com/1063037" source="BUGZILLA"/>
		<reference ref_id="1063038" ref_url="https://bugzilla.suse.com/1063038" source="BUGZILLA"/>
		<reference ref_id="1063039" ref_url="https://bugzilla.suse.com/1063039" source="BUGZILLA"/>
		<reference ref_id="1063040" ref_url="https://bugzilla.suse.com/1063040" source="BUGZILLA"/>
		<reference ref_id="1063041" ref_url="https://bugzilla.suse.com/1063041" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12176" ref_url="https://www.suse.com/security/cve/CVE-2017-12176/" source="CVE"/>
		<reference ref_id="CVE-2017-12177" ref_url="https://www.suse.com/security/cve/CVE-2017-12177/" source="CVE"/>
		<reference ref_id="CVE-2017-12178" ref_url="https://www.suse.com/security/cve/CVE-2017-12178/" source="CVE"/>
		<reference ref_id="CVE-2017-12179" ref_url="https://www.suse.com/security/cve/CVE-2017-12179/" source="CVE"/>
		<reference ref_id="CVE-2017-12180" ref_url="https://www.suse.com/security/cve/CVE-2017-12180/" source="CVE"/>
		<reference ref_id="CVE-2017-12181" ref_url="https://www.suse.com/security/cve/CVE-2017-12181/" source="CVE"/>
		<reference ref_id="CVE-2017-12182" ref_url="https://www.suse.com/security/cve/CVE-2017-12182/" source="CVE"/>
		<reference ref_id="CVE-2017-12183" ref_url="https://www.suse.com/security/cve/CVE-2017-12183/" source="CVE"/>
		<reference ref_id="CVE-2017-12184" ref_url="https://www.suse.com/security/cve/CVE-2017-12184/" source="CVE"/>
		<reference ref_id="CVE-2017-12185" ref_url="https://www.suse.com/security/cve/CVE-2017-12185/" source="CVE"/>
		<reference ref_id="CVE-2017-12186" ref_url="https://www.suse.com/security/cve/CVE-2017-12186/" source="CVE"/>
		<reference ref_id="CVE-2017-12187" ref_url="https://www.suse.com/security/cve/CVE-2017-12187/" source="CVE"/>
		<reference ref_id="CVE-2017-13723" ref_url="https://www.suse.com/security/cve/CVE-2017-13723/" source="CVE"/>
		<description>
This update for xorg-x11-server provides several fixes.

These security issues were fixed:

- CVE-2017-13723: Prevent local DoS via unusual characters in XkbAtomText and
  XkbStringText (bsc#1051150).
- Improve the entropy when generating random data used in X.org server authorization
  cookies generation by using getentropy() and getrandom() when available (bsc#1025084)
- CVE-2017-12184,CVE-2017-12185,CVE-2017-12186,CVE-2017-12187: Fixed
  unvalidated lengths in multiple extensions (bsc#1063034)
- CVE-2017-12183: Fixed some unvalidated lengths in the XFIXES
  extension. (bsc#1063035)
- CVE-2017-12180,CVE-2017-12181,CVE-2017-12182: Fixed various unvalidated
  lengths in the XFree86-VidMode/XFree86-DGA/XFree86-DRI extensions
  (bsc#1063037)
- CVE-2017-12179: Fixed an integer overflow and unvalidated length in
  (S)ProcXIBarrierReleasePointer in Xi (bsc#1063038)
- CVE-2017-12178: Fixed a wrong extra length check in
  ProcXIChangeHierarchy in Xi (bsc#1063039)
- CVE-2017-12177: Fixed an unvalidated variable-length request in
  ProcDbeGetVisualInfo (bsc#1063040)
- CVE-2017-12176: Fixed an unvalidated extra length in
  ProcEstablishConnection (bsc#1063041)


		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-16"/>
	<updated date="2017-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025084">SUSE bug 1025084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051150">SUSE bug 1051150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063034">SUSE bug 1063034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063035">SUSE bug 1063035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063037">SUSE bug 1063037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063038">SUSE bug 1063038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063039">SUSE bug 1063039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063040">SUSE bug 1063040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063041">SUSE bug 1063041</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12176/">CVE-2017-12176 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12176">CVE-2017-12176 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12177/">CVE-2017-12177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12177">CVE-2017-12177 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12178/">CVE-2017-12178 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12178">CVE-2017-12178 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12179/">CVE-2017-12179 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12179">CVE-2017-12179 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12180/">CVE-2017-12180 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12180">CVE-2017-12180 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12181/">CVE-2017-12181 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12181">CVE-2017-12181 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12182/">CVE-2017-12182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12182">CVE-2017-12182 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12183/">CVE-2017-12183 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12183">CVE-2017-12183 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12184/">CVE-2017-12184 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12184">CVE-2017-12184 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12185/">CVE-2017-12185 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12185">CVE-2017-12185 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12186/">CVE-2017-12186 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12186">CVE-2017-12186 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12187/">CVE-2017-12187 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12187">CVE-2017-12187 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13723/">CVE-2017-13723 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13723">CVE-2017-13723 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581804" comment="xorg-x11-Xvnc-7.4-27.122.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581805" comment="xorg-x11-server-7.4-27.122.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581806" comment="xorg-x11-server-extra-7.4-27.122.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219668" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1078383" ref_url="https://bugzilla.suse.com/1078383" source="BUGZILLA"/>
		<reference ref_id="1111697" ref_url="https://bugzilla.suse.com/1111697" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14665" ref_url="https://www.suse.com/security/cve/CVE-2018-14665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004793.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server provides the following fix:

Security issue fixed:

- CVE-2018-14665: Local attackers could overwrite system files in any directory using the -logfile option and gain privileges (bsc#1111697)

Non security issues fixed:

- Do not write past the allocated buffer. (bsc#1078383)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1078383">SUSE bug 1078383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111697">SUSE bug 1111697</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14665/">CVE-2018-14665 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14665">CVE-2018-14665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581807" comment="xorg-x11-Xvnc-7.4-27.122.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581808" comment="xorg-x11-server-7.4-27.122.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581809" comment="xorg-x11-server-extra-7.4-27.122.21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581807" comment="xorg-x11-Xvnc-7.4-27.122.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581808" comment="xorg-x11-server-7.4-27.122.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581809" comment="xorg-x11-server-extra-7.4-27.122.21.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219669" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174633" ref_url="https://bugzilla.suse.com/1174633" source="BUGZILLA"/>
		<reference ref_id="1174635" ref_url="https://bugzilla.suse.com/1174635" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14345" ref_url="https://www.suse.com/security/cve/CVE-2020-14345/" source="CVE"/>
		<reference ref_id="CVE-2020-14347" ref_url="https://www.suse.com/security/cve/CVE-2020-14347/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14347: Leak of uninitialized heap memory from the X server to clients on pixmap allocation (bsc#1174633, ZDI-CAN-11426).
- CVE-2020-14345: XKB out-of-bounds access privilege escalation vulnerability (bsc#1174635, ZDI-CAN-11428).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174633">SUSE bug 1174633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14345/">CVE-2020-14345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14345">CVE-2020-14345 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14347/">CVE-2020-14347 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14347">CVE-2020-14347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581810" comment="xorg-x11-Xvnc-7.4-27.122.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581811" comment="xorg-x11-server-7.4-27.122.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581812" comment="xorg-x11-server-extra-7.4-27.122.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219670" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174910" ref_url="https://bugzilla.suse.com/1174910" source="BUGZILLA"/>
		<reference ref_id="1174913" ref_url="https://bugzilla.suse.com/1174913" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14361" ref_url="https://www.suse.com/security/cve/CVE-2020-14361/" source="CVE"/>
		<reference ref_id="CVE-2020-14362" ref_url="https://www.suse.com/security/cve/CVE-2020-14362/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14361: Fix XkbSelectEvents() integer underflow (bsc#1174910 ZDI-CAN-11573).
- CVE-2020-14362: Fix XRecordRegisterClients() Integer underflow (bsc#1174913 ZDI-CAN-11574).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-01"/>
	<updated date="2020-09-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14361/">CVE-2020-14361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14361">CVE-2020-14361 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14362/">CVE-2020-14362 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14362">CVE-2020-14362 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581813" comment="xorg-x11-Xvnc-7.4-27.122.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581814" comment="xorg-x11-server-7.4-27.122.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581815" comment="xorg-x11-server-extra-7.4-27.122.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219671" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174908" ref_url="https://bugzilla.suse.com/1174908" source="BUGZILLA"/>
		<reference ref_id="1177596" ref_url="https://bugzilla.suse.com/1177596" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14360" ref_url="https://www.suse.com/security/cve/CVE-2020-14360/" source="CVE"/>
		<reference ref_id="CVE-2020-25712" ref_url="https://www.suse.com/security/cve/CVE-2020-25712/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-25712: Fixed a heap-based buffer overflow which could have led to privilege escalation (bsc#1177596).
- CVE-2020-14360: Fixed an out of bounds memory accesses on too short request which could lead to denial of service (bsc#1174908).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-01"/>
	<updated date="2020-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14360/">CVE-2020-14360 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14360">CVE-2020-14360 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25712/">CVE-2020-25712 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25712">CVE-2020-25712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581816" comment="xorg-x11-Xvnc-7.4-27.122.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581817" comment="xorg-x11-server-7.4-27.122.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581818" comment="xorg-x11-server-extra-7.4-27.122.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219672" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180128" ref_url="https://bugzilla.suse.com/1180128" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3472" ref_url="https://www.suse.com/security/cve/CVE-2021-3472/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-3472: XChangeFeedbackControl Integer Underflow Privilege Escalation (bsc#1180128)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-13"/>
	<updated date="2021-04-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180128">SUSE bug 1180128</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3472/">CVE-2021-3472 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3472">CVE-2021-3472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581819" comment="xorg-x11-Xvnc-7.4-27.122.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581820" comment="xorg-x11-server-7.4-27.122.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581821" comment="xorg-x11-server-extra-7.4-27.122.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219673" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1193030" ref_url="https://bugzilla.suse.com/1193030" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4008" ref_url="https://www.suse.com/security/cve/CVE-2021-4008/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-4008: Fixed Privilege Escalation Vulnerability via Out-Of-Bounds Access in SProcRenderCompositeGlyphs (bsc#1193030).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193030">SUSE bug 1193030</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4008/">CVE-2021-4008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4008">CVE-2021-4008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659912" comment="xorg-x11-Xvnc-7.4-27.122.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659913" comment="xorg-x11-server-7.4-27.122.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659914" comment="xorg-x11-server-extra-7.4-27.122.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219674" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1190489" ref_url="https://bugzilla.suse.com/1190489" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-4011: The handlers for the RecordCreateContext and RecordRegisterClients
  requests of the Record extension do not properly validate the request
  length leading to out of bounds memory write. (bsc#1190489)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-20"/>
	<updated date="2021-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190489">SUSE bug 1190489</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4011">CVE-2021-4011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660947" comment="xorg-x11-Xvnc-7.4-27.122.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660948" comment="xorg-x11-server-7.4-27.122.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660949" comment="xorg-x11-server-extra-7.4-27.122.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219675" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194179" ref_url="https://bugzilla.suse.com/1194179" source="BUGZILLA"/>
		<reference ref_id="1194181" ref_url="https://bugzilla.suse.com/1194181" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2319" ref_url="https://www.suse.com/security/cve/CVE-2022-2319/" source="CVE"/>
		<reference ref_id="CVE-2022-2320" ref_url="https://www.suse.com/security/cve/CVE-2022-2320/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2022-2319: Fixed out-of-bounds access in _CheckSetSections() (ZDI-CAN-16062) (bsc#1194179).
- CVE-2022-2320: Fixed out-of-bounds access in CheckSetDeviceIndicators() (ZDI-CAN-16070) (bsc#1194181).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-12"/>
	<updated date="2022-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194179">SUSE bug 1194179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194181">SUSE bug 1194181</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2319/">CVE-2022-2319 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2319">CVE-2022-2319 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2320/">CVE-2022-2320 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2320">CVE-2022-2320 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994277" comment="xorg-x11-Xvnc-7.4-27.122.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994278" comment="xorg-x11-server-7.4-27.122.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994279" comment="xorg-x11-server-extra-7.4-27.122.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219676" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204412" ref_url="https://bugzilla.suse.com/1204412" source="BUGZILLA"/>
		<reference ref_id="1204416" ref_url="https://bugzilla.suse.com/1204416" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3550" ref_url="https://www.suse.com/security/cve/CVE-2022-3550/" source="CVE"/>
		<reference ref_id="CVE-2022-3551" ref_url="https://www.suse.com/security/cve/CVE-2022-3551/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

  - CVE-2022-3550: Fixed out of bounds read/write in _GetCountedString() (bsc#1204412).
  - CVE-2022-3551: Fixed various leaks of the return value of GetComponentSpec() (bsc#1204416).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-01"/>
	<updated date="2022-11-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204412">SUSE bug 1204412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204416">SUSE bug 1204416</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3550/">CVE-2022-3550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3550">CVE-2022-3550 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3551/">CVE-2022-3551 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3551">CVE-2022-3551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994280" comment="xorg-x11-Xvnc-7.4-27.122.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994281" comment="xorg-x11-server-7.4-27.122.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994282" comment="xorg-x11-server-extra-7.4-27.122.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219677" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1205874" ref_url="https://bugzilla.suse.com/1205874" source="BUGZILLA"/>
		<reference ref_id="1205876" ref_url="https://bugzilla.suse.com/1205876" source="BUGZILLA"/>
		<reference ref_id="1205878" ref_url="https://bugzilla.suse.com/1205878" source="BUGZILLA"/>
		<reference ref_id="1205879" ref_url="https://bugzilla.suse.com/1205879" source="BUGZILLA"/>
		<reference ref_id="1206017" ref_url="https://bugzilla.suse.com/1206017" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4283" ref_url="https://www.suse.com/security/cve/CVE-2022-4283/" source="CVE"/>
		<reference ref_id="CVE-2022-46340" ref_url="https://www.suse.com/security/cve/CVE-2022-46340/" source="CVE"/>
		<reference ref_id="CVE-2022-46342" ref_url="https://www.suse.com/security/cve/CVE-2022-46342/" source="CVE"/>
		<reference ref_id="CVE-2022-46343" ref_url="https://www.suse.com/security/cve/CVE-2022-46343/" source="CVE"/>
		<reference ref_id="CVE-2022-46344" ref_url="https://www.suse.com/security/cve/CVE-2022-46344/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2022-46340: Server XTestSwapFakeInput stack overflow (bsc#1205874)
- CVE-2022-46342: Server XvdiSelectVideoNotify use-after-free (bsc#1205879)
- CVE-2022-46343: Server ScreenSaverSetAttributes use-after-free (bsc#1205878)
- CVE-2022-46344: Server XIChangeProperty out-of-bounds access (bsc#1205876)
- CVE-2022-4283: Reset the radio_groups pointer to NULL after freeing it (bsc#1206017)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-14"/>
	<updated date="2022-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205874">SUSE bug 1205874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205876">SUSE bug 1205876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205878">SUSE bug 1205878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205879">SUSE bug 1205879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206017">SUSE bug 1206017</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4283/">CVE-2022-4283 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4283">CVE-2022-4283 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46340/">CVE-2022-46340 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46340">CVE-2022-46340 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-46342/">CVE-2022-46342 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46342">CVE-2022-46342 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-46343/">CVE-2022-46343 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46343">CVE-2022-46343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-46344/">CVE-2022-46344 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46344">CVE-2022-46344 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994283" comment="xorg-x11-Xvnc-7.4-27.122.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994284" comment="xorg-x11-server-7.4-27.122.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994285" comment="xorg-x11-server-extra-7.4-27.122.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219678" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1207783" ref_url="https://bugzilla.suse.com/1207783" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0494" ref_url="https://www.suse.com/security/cve/CVE-2023-0494/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2023-0494: Fixed a use-after-free in DeepCopyPointerClasses (bsc#1207783).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-07"/>
	<updated date="2023-02-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207783">SUSE bug 1207783</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0494/">CVE-2023-0494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0494">CVE-2023-0494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994286" comment="xorg-x11-Xvnc-7.4-27.122.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994287" comment="xorg-x11-server-7.4-27.122.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994288" comment="xorg-x11-server-extra-7.4-27.122.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219679" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1205874" ref_url="https://bugzilla.suse.com/1205874" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-46340" ref_url="https://www.suse.com/security/cve/CVE-2022-46340/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- Fixed a regression introduced with security update for CVE-2022-46340 (bsc#1205874).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-08"/>
	<updated date="2023-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205874">SUSE bug 1205874</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46340/">CVE-2022-46340 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46340">CVE-2022-46340 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994289" comment="xorg-x11-Xvnc-7.4-27.122.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994290" comment="xorg-x11-server-7.4-27.122.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994291" comment="xorg-x11-server-extra-7.4-27.122.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219680" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1209543" ref_url="https://bugzilla.suse.com/1209543" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1393" ref_url="https://www.suse.com/security/cve/CVE-2023-1393/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2023-1393: Fixed use-after-free overlay window (ZDI-CAN-19866) (bsc#1209543).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-29"/>
	<updated date="2023-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1209543">SUSE bug 1209543</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1393/">CVE-2023-1393 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1393">CVE-2023-1393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994292" comment="xorg-x11-Xvnc-7.4-27.122.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994293" comment="xorg-x11-server-7.4-27.122.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994294" comment="xorg-x11-server-extra-7.4-27.122.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219681" version="1" class="patch">
	<metadata>
		<title>Security update for xrdp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1029912" ref_url="https://bugzilla.suse.com/1029912" source="BUGZILLA"/>
		<reference ref_id="921420" ref_url="https://bugzilla.suse.com/921420" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6967" ref_url="https://www.suse.com/security/cve/CVE-2017-6967/" source="CVE"/>
		<description>
This update for xrdp fixes the following issues:

- CVE-2017-6967: Fixed incorrect location of pam function call auth_start_session (bsc#1029912).

Bugfixes:
- Fixed xrdp not reusing existing connections (bsc#921420).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-20"/>
	<updated date="2022-09-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029912">SUSE bug 1029912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921420">SUSE bug 921420</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6967/">CVE-2017-6967 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6967">CVE-2017-6967 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994295" comment="xrdp-0.4.1-28.26.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219682" version="1" class="patch">
	<metadata>
		<title>Security update for xrdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1015567" ref_url="https://bugzilla.suse.com/1015567" source="BUGZILLA"/>
		<reference ref_id="1173580" ref_url="https://bugzilla.suse.com/1173580" source="BUGZILLA"/>
		<reference ref_id="921420" ref_url="https://bugzilla.suse.com/921420" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1430" ref_url="https://www.suse.com/security/cve/CVE-2013-1430/" source="CVE"/>
		<reference ref_id="CVE-2020-4044" ref_url="https://www.suse.com/security/cve/CVE-2020-4044/" source="CVE"/>
		<description>
This update for xrdp fixes the following issues:

  - CVE-2013-1430: Fixed xrdp creating cleartext session password of user (bsc#1015567).
  - CVE-2020-4044: Fixed vulnerability where xrdp-sesman can be crashed remotely over port 3350 (bsc#1173580).

  Bugfixes:

  - Fixed xrdp not reusing sessions (bsc#921420).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-13"/>
	<updated date="2022-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1015567">SUSE bug 1015567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173580">SUSE bug 1173580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921420">SUSE bug 921420</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2013-1430/">CVE-2013-1430 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-1430">CVE-2013-1430 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-4044/">CVE-2020-4044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4044">CVE-2020-4044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994296" comment="xrdp-0.4.1-28.26.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219683" version="1" class="patch">
	<metadata>
		<title>Security update for xscreensaver (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="952062" ref_url="https://bugzilla.suse.com/952062" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8025" ref_url="https://www.suse.com/security/cve/CVE-2015-8025/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001686.html" source="SUSE-SU"/>
		<description>
The xscreensaver package was updated to fix the following security and non security issues:

- CVE-2015-8025: Fixed a crash when hot-swapping monitors while locked (bsc#952062).
- Added xscreensaver-in_signal_handler_p.patch needed for fix of signal handling.
- Refresh xscreensaver-stars.patch.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-20"/>
	<updated date="2015-11-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952062">SUSE bug 952062</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8025/">CVE-2015-8025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8025">CVE-2015-8025 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581822" comment="xscreensaver-5.07-6.36.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581822" comment="xscreensaver-5.07-6.36.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581822" comment="xscreensaver-5.07-6.36.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219684" version="1" class="patch">
	<metadata>
		<title>Security update for xscreensaver (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186918" ref_url="https://bugzilla.suse.com/1186918" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34557" ref_url="https://www.suse.com/security/cve/CVE-2021-34557/" source="CVE"/>
		<description>
This update for xscreensaver fixes the following issues:

- CVE-2021-34557: Fixed potential crash and unlock while disconnecting video output with more than 10 monitors (bsc#1186918)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-03"/>
	<updated date="2022-08-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186918">SUSE bug 1186918</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34557/">CVE-2021-34557 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34557">CVE-2021-34557 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994297" comment="xscreensaver-5.07-6.37.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219685" version="1" class="patch">
	<metadata>
		<title>Security update for xterm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182091" ref_url="https://bugzilla.suse.com/1182091" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27135" ref_url="https://www.suse.com/security/cve/CVE-2021-27135/" source="CVE"/>
		<description>
This update for xterm fixes the following issues:

- CVE-2021-27135: Fixed buffer-overflow when clicking on selected utf8 text. (bsc#1182091)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-14"/>
	<updated date="2021-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182091">SUSE bug 1182091</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27135/">CVE-2021-27135 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27135">CVE-2021-27135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575745" comment="xterm-238-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219686" version="1" class="patch">
	<metadata>
		<title>Security update for xterm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1205305" ref_url="https://bugzilla.suse.com/1205305" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-45063" ref_url="https://www.suse.com/security/cve/CVE-2022-45063/" source="CVE"/>
		<description>
This update for xterm fixes the following issues:

  - CVE-2022-45063: Fixed command injection in ESC 50 fontoperation by disabling the change font functionality (bsc#1205305).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-23"/>
	<updated date="2023-02-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205305">SUSE bug 1205305</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45063/">CVE-2022-45063 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45063">CVE-2022-45063 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994298" comment="xterm-238-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219687" version="1" class="patch">
	<metadata>
		<title>Security update for xz (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<description>
This update for xz fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679343" comment="liblzma5-5.0.3-0.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679344" comment="liblzma5-32bit-5.0.3-0.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679345" comment="xz-5.0.3-0.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679346" comment="xz-lang-5.0.3-0.12.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219688" version="1" class="patch">
	<metadata>
		<title>Security update for yast2-storage (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="888838" ref_url="https://bugzilla.suse.com/888838" source="BUGZILLA"/>
		<reference ref_id="898525" ref_url="https://bugzilla.suse.com/898525" source="BUGZILLA"/>
		<reference ref_id="986971" ref_url="https://bugzilla.suse.com/986971" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5746" ref_url="https://www.suse.com/security/cve/CVE-2016-5746/" source="CVE"/>
		<description>


This update for yast2-storage to version 2.17.147.1 fixes the following issues:

- Use stdin, not tmp files for passwords (bsc#986971, CVE-2016-5746)
- fixed setting disk label on multipath devices (bsc#898525)
- fixed used-by information for multipath with LVM (bsc#888838)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-14"/>
	<updated date="2016-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/888838">SUSE bug 888838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898525">SUSE bug 898525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986971">SUSE bug 986971</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5746/">CVE-2016-5746 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5746">CVE-2016-5746 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581823" comment="yast2-storage-2.17.147.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581824" comment="yast2-storage-lib-2.17.147.1-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219689" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1003577" ref_url="https://bugzilla.suse.com/1003577" source="BUGZILLA"/>
		<reference ref_id="1003579" ref_url="https://bugzilla.suse.com/1003579" source="BUGZILLA"/>
		<reference ref_id="1003580" ref_url="https://bugzilla.suse.com/1003580" source="BUGZILLA"/>
		<reference ref_id="1013882" ref_url="https://bugzilla.suse.com/1013882" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<description>

This update for zlib fixes the following issues:

  * Incompatible declarations for external linkage function deflate (bnc#1003577)
  * CVE-2016-9842: Undefined Left Shift of Negative Number (bnc#1003580) 
  * CVE-2016-9840 CVE-2016-9841: Out-of-bounds pointer arithmetic in inftrees.c (bnc#1003579)
  * CVE-2016-9843: Big-endian out-of-bounds pointer
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-21"/>
	<updated date="2016-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003577">SUSE bug 1003577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003579">SUSE bug 1003579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003580">SUSE bug 1003580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9840">CVE-2016-9840 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9841">CVE-2016-9841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9842">CVE-2016-9842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9843">CVE-2016-9843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581825" comment="zlib-1.2.7-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581826" comment="zlib-32bit-1.2.7-0.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219690" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1197459" ref_url="https://bugzilla.suse.com/1197459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<description>
This update for zlib fixes the following issues:

- CVE-2018-25032: Fixed memory corruption on deflate (bsc#1197459).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-01"/>
	<updated date="2022-04-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197459">SUSE bug 1197459</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677179" comment="zlib-1.2.7-0.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677180" comment="zlib-32bit-1.2.7-0.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677951" comment="zlib-devel-1.2.7-0.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677952" comment="zlib-devel-32bit-1.2.7-0.17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219691" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1202175" ref_url="https://bugzilla.suse.com/1202175" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-37434" ref_url="https://www.suse.com/security/cve/CVE-2022-37434/" source="CVE"/>
		<description>
This update for zlib fixes the following issues:

- CVE-2022-37434: Fixed heap-based buffer over-read or buffer overflow via large gzip header extra field (bsc#1202175).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-24"/>
	<updated date="2022-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202175">SUSE bug 1202175</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37434/">CVE-2022-37434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37434">CVE-2022-37434 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009994299" comment="zlib-1.2.7-0.17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994300" comment="zlib-32bit-1.2.7-0.17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994301" comment="zlib-devel-1.2.7-0.17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009994302" comment="zlib-devel-32bit-1.2.7-0.17.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219692" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1089030" ref_url="https://bugzilla.suse.com/1089030" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1100" ref_url="https://www.suse.com/security/cve/CVE-2018-1100/" source="CVE"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2018-1100: Fixed a buffer overflow in
  utils.c:checkmailpath() that could lead to local arbitrary code
  execution ( bsc#1089030)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-20"/>
	<updated date="2018-04-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089030">SUSE bug 1089030</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1100/">CVE-2018-1100 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1100">CVE-2018-1100 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575752" comment="zsh-4.3.6-67.9.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219693" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1082885" ref_url="https://bugzilla.suse.com/1082885" source="BUGZILLA"/>
		<reference ref_id="1082975" ref_url="https://bugzilla.suse.com/1082975" source="BUGZILLA"/>
		<reference ref_id="1082977" ref_url="https://bugzilla.suse.com/1082977" source="BUGZILLA"/>
		<reference ref_id="1082991" ref_url="https://bugzilla.suse.com/1082991" source="BUGZILLA"/>
		<reference ref_id="1082998" ref_url="https://bugzilla.suse.com/1082998" source="BUGZILLA"/>
		<reference ref_id="1083002" ref_url="https://bugzilla.suse.com/1083002" source="BUGZILLA"/>
		<reference ref_id="1083250" ref_url="https://bugzilla.suse.com/1083250" source="BUGZILLA"/>
		<reference ref_id="1084656" ref_url="https://bugzilla.suse.com/1084656" source="BUGZILLA"/>
		<reference ref_id="1087026" ref_url="https://bugzilla.suse.com/1087026" source="BUGZILLA"/>
		<reference ref_id="1107294" ref_url="https://bugzilla.suse.com/1107294" source="BUGZILLA"/>
		<reference ref_id="1107296" ref_url="https://bugzilla.suse.com/1107296" source="BUGZILLA"/>
		<reference ref_id="1163882" ref_url="https://bugzilla.suse.com/1163882" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-10070" ref_url="https://www.suse.com/security/cve/CVE-2014-10070/" source="CVE"/>
		<reference ref_id="CVE-2014-10071" ref_url="https://www.suse.com/security/cve/CVE-2014-10071/" source="CVE"/>
		<reference ref_id="CVE-2014-10072" ref_url="https://www.suse.com/security/cve/CVE-2014-10072/" source="CVE"/>
		<reference ref_id="CVE-2016-10714" ref_url="https://www.suse.com/security/cve/CVE-2016-10714/" source="CVE"/>
		<reference ref_id="CVE-2017-18205" ref_url="https://www.suse.com/security/cve/CVE-2017-18205/" source="CVE"/>
		<reference ref_id="CVE-2017-18206" ref_url="https://www.suse.com/security/cve/CVE-2017-18206/" source="CVE"/>
		<reference ref_id="CVE-2018-0502" ref_url="https://www.suse.com/security/cve/CVE-2018-0502/" source="CVE"/>
		<reference ref_id="CVE-2018-1071" ref_url="https://www.suse.com/security/cve/CVE-2018-1071/" source="CVE"/>
		<reference ref_id="CVE-2018-1083" ref_url="https://www.suse.com/security/cve/CVE-2018-1083/" source="CVE"/>
		<reference ref_id="CVE-2018-13259" ref_url="https://www.suse.com/security/cve/CVE-2018-13259/" source="CVE"/>
		<reference ref_id="CVE-2018-7549" ref_url="https://www.suse.com/security/cve/CVE-2018-7549/" source="CVE"/>
		<reference ref_id="CVE-2019-20044" ref_url="https://www.suse.com/security/cve/CVE-2019-20044/" source="CVE"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2019-20044: Fixed an insecure dropping of privileges when unsetting
  the PRIVILEGED option (bsc#1163882).
- CVE-2018-13259: Fixed an unexpected truncation of long shebang lines (bsc#1107294).
- CVE-2018-7549: Fixed a crash when an empty hash table (bsc#1082991).
- CVE-2018-1083: Fixed a stack-based buffer overflow when using tab completion
  on directories with long names (bsc#1087026).
- CVE-2018-1071: Fixed a stack-based buffer overflow when executing certain
  commands (bsc#1084656).
- CVE-2018-0502: Fixed a mishandling of shebang lines (bsc#1107296).
- CVE-2017-18206: Fixed a buffer overflow related to symlink processing (bsc#1083002).
- CVE-2017-18205: Fixed an application crash when using cd with no
  arguments (bsc#1082998).
- CVE-2016-10714: Fixed a potential application crash when handling maximum
  length paths (bsc#1083250).
- CVE-2014-10072: Fixed a buffer overflow when scanning very long directory
  paths for symbolic links (bsc#1082975).
- CVE-2014-10071: Fixed a buffer overflow when redirecting output to a long
  file descriptor (bsc#1082977).
- CVE-2014-10070: Fixed a privilege escalation vulnerability via environment
  variables (bsc#1082885).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082885">SUSE bug 1082885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082975">SUSE bug 1082975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082977">SUSE bug 1082977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082991">SUSE bug 1082991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082998">SUSE bug 1082998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083002">SUSE bug 1083002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083250">SUSE bug 1083250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084656">SUSE bug 1084656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087026">SUSE bug 1087026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107294">SUSE bug 1107294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107296">SUSE bug 1107296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163882">SUSE bug 1163882</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-10070/">CVE-2014-10070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-10070">CVE-2014-10070 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-10071/">CVE-2014-10071 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-10071">CVE-2014-10071 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-10072/">CVE-2014-10072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-10072">CVE-2014-10072 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10714/">CVE-2016-10714 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10714">CVE-2016-10714 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18205/">CVE-2017-18205 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18205">CVE-2017-18205 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18206/">CVE-2017-18206 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18206">CVE-2017-18206 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-0502/">CVE-2018-0502 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0502">CVE-2018-0502 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1071/">CVE-2018-1071 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1071">CVE-2018-1071 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1083/">CVE-2018-1083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1083">CVE-2018-1083 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13259/">CVE-2018-13259 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13259">CVE-2018-13259 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7549/">CVE-2018-7549 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7549">CVE-2018-7549 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20044/">CVE-2019-20044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20044">CVE-2019-20044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671293" comment="zsh-4.3.6-67.9.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219694" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="978061" ref_url="https://bugzilla.suse.com/978061" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="CVE-2016-3715" ref_url="https://www.suse.com/security/cve/CVE-2016-3715/" source="CVE"/>
		<reference ref_id="CVE-2016-3716" ref_url="https://www.suse.com/security/cve/CVE-2016-3716/" source="CVE"/>
		<reference ref_id="CVE-2016-3717" ref_url="https://www.suse.com/security/cve/CVE-2016-3717/" source="CVE"/>
		<reference ref_id="CVE-2016-3718" ref_url="https://www.suse.com/security/cve/CVE-2016-3718/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002051.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

Security issues fixed:
- Several coders were vulnerable to remote code execution attacks,
  these coders have now been disabled. They can be re-enabled by
  exporting the following environment variable
  MAGICK_CODER_MODULE_PATH=/usr/lib64/ImageMagick-6.4.3/modules-Q16/coders/vulnerable/
  (bsc#978061)
- CVE-2016-3714: Insufficient shell characters filtering leads to
  (potentially remote) code execution
- CVE-2016-3715: Possible file deletion by using ImageMagick's
  'ephemeral' pseudo protocol which deletes files after reading.
- CVE-2016-3716: Possible file moving by using ImageMagick's 'msl'
  pseudo protocol with any extension in any folder.
- CVE-2016-3717: Possible local file read by using ImageMagick's 
  'label' pseudo protocol to get content of the files from the server.
- CVE-2016-3718: Possible Server Side Request Forgery (SSRF) to make
  HTTP GET or FTP request.

Bugs fixed:
- Use external svg loader (rsvg)		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-11"/>
	<updated date="2016-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3714">CVE-2016-3714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3715/">CVE-2016-3715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3715">CVE-2016-3715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3716/">CVE-2016-3716 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3716">CVE-2016-3716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3717/">CVE-2016-3717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3717">CVE-2016-3717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3718/">CVE-2016-3718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3718">CVE-2016-3718 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581827" comment="libMagickCore1-6.4.3.6-7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581828" comment="libMagickCore1-32bit-6.4.3.6-7.34.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581827" comment="libMagickCore1-6.4.3.6-7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581828" comment="libMagickCore1-32bit-6.4.3.6-7.34.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219695" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="978061" ref_url="https://bugzilla.suse.com/978061" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002060.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- bsc#978061: A vulnerability in ImageMagick's 'https' module allowed users to
execute arbitrary shell commands on the host performing the image conversion.
The issue had the potential for remote command injection. This update mitigates
the vulnerability by disabling all access to the 'https' module in the
'delegates.xml' config file. (CVE-2016-3714)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-13"/>
	<updated date="2016-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3714">CVE-2016-3714 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581829" comment="libMagickCore1-6.4.3.6-7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581830" comment="libMagickCore1-32bit-6.4.3.6-7.37.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581829" comment="libMagickCore1-6.4.3.6-7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581830" comment="libMagickCore1-32bit-6.4.3.6-7.37.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219696" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="982178" ref_url="https://bugzilla.suse.com/982178" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5118" ref_url="https://www.suse.com/security/cve/CVE-2016-5118/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002124.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues: 

- CVE-2016-5118: popen() shell vulnerability via filenames (bsc#982178)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/982178">SUSE bug 982178</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5118/">CVE-2016-5118 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5118">CVE-2016-5118 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581831" comment="libMagickCore1-6.4.3.6-7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581832" comment="libMagickCore1-32bit-6.4.3.6-7.40.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581831" comment="libMagickCore1-6.4.3.6-7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581832" comment="libMagickCore1-32bit-6.4.3.6-7.40.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219697" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="983234" ref_url="https://bugzilla.suse.com/983234" source="BUGZILLA"/>
		<reference ref_id="983253" ref_url="https://bugzilla.suse.com/983253" source="BUGZILLA"/>
		<reference ref_id="983259" ref_url="https://bugzilla.suse.com/983259" source="BUGZILLA"/>
		<reference ref_id="983292" ref_url="https://bugzilla.suse.com/983292" source="BUGZILLA"/>
		<reference ref_id="983305" ref_url="https://bugzilla.suse.com/983305" source="BUGZILLA"/>
		<reference ref_id="983308" ref_url="https://bugzilla.suse.com/983308" source="BUGZILLA"/>
		<reference ref_id="983521" ref_url="https://bugzilla.suse.com/983521" source="BUGZILLA"/>
		<reference ref_id="983523" ref_url="https://bugzilla.suse.com/983523" source="BUGZILLA"/>
		<reference ref_id="983533" ref_url="https://bugzilla.suse.com/983533" source="BUGZILLA"/>
		<reference ref_id="983739" ref_url="https://bugzilla.suse.com/983739" source="BUGZILLA"/>
		<reference ref_id="983746" ref_url="https://bugzilla.suse.com/983746" source="BUGZILLA"/>
		<reference ref_id="983752" ref_url="https://bugzilla.suse.com/983752" source="BUGZILLA"/>
		<reference ref_id="983774" ref_url="https://bugzilla.suse.com/983774" source="BUGZILLA"/>
		<reference ref_id="983794" ref_url="https://bugzilla.suse.com/983794" source="BUGZILLA"/>
		<reference ref_id="983796" ref_url="https://bugzilla.suse.com/983796" source="BUGZILLA"/>
		<reference ref_id="983799" ref_url="https://bugzilla.suse.com/983799" source="BUGZILLA"/>
		<reference ref_id="983803" ref_url="https://bugzilla.suse.com/983803" source="BUGZILLA"/>
		<reference ref_id="984018" ref_url="https://bugzilla.suse.com/984018" source="BUGZILLA"/>
		<reference ref_id="984023" ref_url="https://bugzilla.suse.com/984023" source="BUGZILLA"/>
		<reference ref_id="984028" ref_url="https://bugzilla.suse.com/984028" source="BUGZILLA"/>
		<reference ref_id="984032" ref_url="https://bugzilla.suse.com/984032" source="BUGZILLA"/>
		<reference ref_id="984035" ref_url="https://bugzilla.suse.com/984035" source="BUGZILLA"/>
		<reference ref_id="984135" ref_url="https://bugzilla.suse.com/984135" source="BUGZILLA"/>
		<reference ref_id="984137" ref_url="https://bugzilla.suse.com/984137" source="BUGZILLA"/>
		<reference ref_id="984142" ref_url="https://bugzilla.suse.com/984142" source="BUGZILLA"/>
		<reference ref_id="984144" ref_url="https://bugzilla.suse.com/984144" source="BUGZILLA"/>
		<reference ref_id="984145" ref_url="https://bugzilla.suse.com/984145" source="BUGZILLA"/>
		<reference ref_id="984150" ref_url="https://bugzilla.suse.com/984150" source="BUGZILLA"/>
		<reference ref_id="984160" ref_url="https://bugzilla.suse.com/984160" source="BUGZILLA"/>
		<reference ref_id="984166" ref_url="https://bugzilla.suse.com/984166" source="BUGZILLA"/>
		<reference ref_id="984181" ref_url="https://bugzilla.suse.com/984181" source="BUGZILLA"/>
		<reference ref_id="984184" ref_url="https://bugzilla.suse.com/984184" source="BUGZILLA"/>
		<reference ref_id="984185" ref_url="https://bugzilla.suse.com/984185" source="BUGZILLA"/>
		<reference ref_id="984186" ref_url="https://bugzilla.suse.com/984186" source="BUGZILLA"/>
		<reference ref_id="984187" ref_url="https://bugzilla.suse.com/984187" source="BUGZILLA"/>
		<reference ref_id="984193" ref_url="https://bugzilla.suse.com/984193" source="BUGZILLA"/>
		<reference ref_id="984370" ref_url="https://bugzilla.suse.com/984370" source="BUGZILLA"/>
		<reference ref_id="984372" ref_url="https://bugzilla.suse.com/984372" source="BUGZILLA"/>
		<reference ref_id="984373" ref_url="https://bugzilla.suse.com/984373" source="BUGZILLA"/>
		<reference ref_id="984374" ref_url="https://bugzilla.suse.com/984374" source="BUGZILLA"/>
		<reference ref_id="984375" ref_url="https://bugzilla.suse.com/984375" source="BUGZILLA"/>
		<reference ref_id="984379" ref_url="https://bugzilla.suse.com/984379" source="BUGZILLA"/>
		<reference ref_id="984394" ref_url="https://bugzilla.suse.com/984394" source="BUGZILLA"/>
		<reference ref_id="984398" ref_url="https://bugzilla.suse.com/984398" source="BUGZILLA"/>
		<reference ref_id="984400" ref_url="https://bugzilla.suse.com/984400" source="BUGZILLA"/>
		<reference ref_id="984401" ref_url="https://bugzilla.suse.com/984401" source="BUGZILLA"/>
		<reference ref_id="984408" ref_url="https://bugzilla.suse.com/984408" source="BUGZILLA"/>
		<reference ref_id="984409" ref_url="https://bugzilla.suse.com/984409" source="BUGZILLA"/>
		<reference ref_id="984433" ref_url="https://bugzilla.suse.com/984433" source="BUGZILLA"/>
		<reference ref_id="984436" ref_url="https://bugzilla.suse.com/984436" source="BUGZILLA"/>
		<reference ref_id="985442" ref_url="https://bugzilla.suse.com/985442" source="BUGZILLA"/>
		<reference ref_id="985448" ref_url="https://bugzilla.suse.com/985448" source="BUGZILLA"/>
		<reference ref_id="985451" ref_url="https://bugzilla.suse.com/985451" source="BUGZILLA"/>
		<reference ref_id="985456" ref_url="https://bugzilla.suse.com/985456" source="BUGZILLA"/>
		<reference ref_id="985460" ref_url="https://bugzilla.suse.com/985460" source="BUGZILLA"/>
		<reference ref_id="986608" ref_url="https://bugzilla.suse.com/986608" source="BUGZILLA"/>
		<reference ref_id="986609" ref_url="https://bugzilla.suse.com/986609" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9805" ref_url="https://www.suse.com/security/cve/CVE-2014-9805/" source="CVE"/>
		<reference ref_id="CVE-2014-9806" ref_url="https://www.suse.com/security/cve/CVE-2014-9806/" source="CVE"/>
		<reference ref_id="CVE-2014-9807" ref_url="https://www.suse.com/security/cve/CVE-2014-9807/" source="CVE"/>
		<reference ref_id="CVE-2014-9808" ref_url="https://www.suse.com/security/cve/CVE-2014-9808/" source="CVE"/>
		<reference ref_id="CVE-2014-9809" ref_url="https://www.suse.com/security/cve/CVE-2014-9809/" source="CVE"/>
		<reference ref_id="CVE-2014-9810" ref_url="https://www.suse.com/security/cve/CVE-2014-9810/" source="CVE"/>
		<reference ref_id="CVE-2014-9811" ref_url="https://www.suse.com/security/cve/CVE-2014-9811/" source="CVE"/>
		<reference ref_id="CVE-2014-9812" ref_url="https://www.suse.com/security/cve/CVE-2014-9812/" source="CVE"/>
		<reference ref_id="CVE-2014-9813" ref_url="https://www.suse.com/security/cve/CVE-2014-9813/" source="CVE"/>
		<reference ref_id="CVE-2014-9814" ref_url="https://www.suse.com/security/cve/CVE-2014-9814/" source="CVE"/>
		<reference ref_id="CVE-2014-9815" ref_url="https://www.suse.com/security/cve/CVE-2014-9815/" source="CVE"/>
		<reference ref_id="CVE-2014-9816" ref_url="https://www.suse.com/security/cve/CVE-2014-9816/" source="CVE"/>
		<reference ref_id="CVE-2014-9817" ref_url="https://www.suse.com/security/cve/CVE-2014-9817/" source="CVE"/>
		<reference ref_id="CVE-2014-9818" ref_url="https://www.suse.com/security/cve/CVE-2014-9818/" source="CVE"/>
		<reference ref_id="CVE-2014-9819" ref_url="https://www.suse.com/security/cve/CVE-2014-9819/" source="CVE"/>
		<reference ref_id="CVE-2014-9820" ref_url="https://www.suse.com/security/cve/CVE-2014-9820/" source="CVE"/>
		<reference ref_id="CVE-2014-9822" ref_url="https://www.suse.com/security/cve/CVE-2014-9822/" source="CVE"/>
		<reference ref_id="CVE-2014-9823" ref_url="https://www.suse.com/security/cve/CVE-2014-9823/" source="CVE"/>
		<reference ref_id="CVE-2014-9824" ref_url="https://www.suse.com/security/cve/CVE-2014-9824/" source="CVE"/>
		<reference ref_id="CVE-2014-9826" ref_url="https://www.suse.com/security/cve/CVE-2014-9826/" source="CVE"/>
		<reference ref_id="CVE-2014-9828" ref_url="https://www.suse.com/security/cve/CVE-2014-9828/" source="CVE"/>
		<reference ref_id="CVE-2014-9829" ref_url="https://www.suse.com/security/cve/CVE-2014-9829/" source="CVE"/>
		<reference ref_id="CVE-2014-9830" ref_url="https://www.suse.com/security/cve/CVE-2014-9830/" source="CVE"/>
		<reference ref_id="CVE-2014-9831" ref_url="https://www.suse.com/security/cve/CVE-2014-9831/" source="CVE"/>
		<reference ref_id="CVE-2014-9834" ref_url="https://www.suse.com/security/cve/CVE-2014-9834/" source="CVE"/>
		<reference ref_id="CVE-2014-9835" ref_url="https://www.suse.com/security/cve/CVE-2014-9835/" source="CVE"/>
		<reference ref_id="CVE-2014-9836" ref_url="https://www.suse.com/security/cve/CVE-2014-9836/" source="CVE"/>
		<reference ref_id="CVE-2014-9837" ref_url="https://www.suse.com/security/cve/CVE-2014-9837/" source="CVE"/>
		<reference ref_id="CVE-2014-9838" ref_url="https://www.suse.com/security/cve/CVE-2014-9838/" source="CVE"/>
		<reference ref_id="CVE-2014-9839" ref_url="https://www.suse.com/security/cve/CVE-2014-9839/" source="CVE"/>
		<reference ref_id="CVE-2014-9840" ref_url="https://www.suse.com/security/cve/CVE-2014-9840/" source="CVE"/>
		<reference ref_id="CVE-2014-9842" ref_url="https://www.suse.com/security/cve/CVE-2014-9842/" source="CVE"/>
		<reference ref_id="CVE-2014-9844" ref_url="https://www.suse.com/security/cve/CVE-2014-9844/" source="CVE"/>
		<reference ref_id="CVE-2014-9845" ref_url="https://www.suse.com/security/cve/CVE-2014-9845/" source="CVE"/>
		<reference ref_id="CVE-2014-9846" ref_url="https://www.suse.com/security/cve/CVE-2014-9846/" source="CVE"/>
		<reference ref_id="CVE-2014-9847" ref_url="https://www.suse.com/security/cve/CVE-2014-9847/" source="CVE"/>
		<reference ref_id="CVE-2014-9849" ref_url="https://www.suse.com/security/cve/CVE-2014-9849/" source="CVE"/>
		<reference ref_id="CVE-2014-9851" ref_url="https://www.suse.com/security/cve/CVE-2014-9851/" source="CVE"/>
		<reference ref_id="CVE-2014-9853" ref_url="https://www.suse.com/security/cve/CVE-2014-9853/" source="CVE"/>
		<reference ref_id="CVE-2014-9854" ref_url="https://www.suse.com/security/cve/CVE-2014-9854/" source="CVE"/>
		<reference ref_id="CVE-2015-8894" ref_url="https://www.suse.com/security/cve/CVE-2015-8894/" source="CVE"/>
		<reference ref_id="CVE-2015-8896" ref_url="https://www.suse.com/security/cve/CVE-2015-8896/" source="CVE"/>
		<reference ref_id="CVE-2015-8897" ref_url="https://www.suse.com/security/cve/CVE-2015-8897/" source="CVE"/>
		<reference ref_id="CVE-2015-8898" ref_url="https://www.suse.com/security/cve/CVE-2015-8898/" source="CVE"/>
		<reference ref_id="CVE-2015-8901" ref_url="https://www.suse.com/security/cve/CVE-2015-8901/" source="CVE"/>
		<reference ref_id="CVE-2015-8902" ref_url="https://www.suse.com/security/cve/CVE-2015-8902/" source="CVE"/>
		<reference ref_id="CVE-2015-8903" ref_url="https://www.suse.com/security/cve/CVE-2015-8903/" source="CVE"/>
		<reference ref_id="CVE-2016-4562" ref_url="https://www.suse.com/security/cve/CVE-2016-4562/" source="CVE"/>
		<reference ref_id="CVE-2016-4563" ref_url="https://www.suse.com/security/cve/CVE-2016-4563/" source="CVE"/>
		<reference ref_id="CVE-2016-4564" ref_url="https://www.suse.com/security/cve/CVE-2016-4564/" source="CVE"/>
		<reference ref_id="CVE-2016-5687" ref_url="https://www.suse.com/security/cve/CVE-2016-5687/" source="CVE"/>
		<reference ref_id="CVE-2016-5688" ref_url="https://www.suse.com/security/cve/CVE-2016-5688/" source="CVE"/>
		<reference ref_id="CVE-2016-5689" ref_url="https://www.suse.com/security/cve/CVE-2016-5689/" source="CVE"/>
		<reference ref_id="CVE-2016-5690" ref_url="https://www.suse.com/security/cve/CVE-2016-5690/" source="CVE"/>
		<reference ref_id="CVE-2016-5691" ref_url="https://www.suse.com/security/cve/CVE-2016-5691/" source="CVE"/>
		<reference ref_id="CVE-2016-5841" ref_url="https://www.suse.com/security/cve/CVE-2016-5841/" source="CVE"/>
		<reference ref_id="CVE-2016-5842" ref_url="https://www.suse.com/security/cve/CVE-2016-5842/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002151.html" source="SUSE-SU"/>
		<description>
ImageMagick was updated to fix 55 security issues.

These security issues were fixed:
- CVE-2014-9810: SEGV in dpx file handler (bsc#983803).
- CVE-2014-9811: Crash in xwd file handler (bsc#984032).
- CVE-2014-9812: NULL pointer dereference in ps file handling (bsc#984137).
- CVE-2014-9813: Crash on corrupted viff file (bsc#984035).
- CVE-2014-9814: NULL pointer dereference in wpg file handling (bsc#984193).
- CVE-2014-9815: Crash on corrupted wpg file (bsc#984372).
- CVE-2014-9816: Out of bound access in viff image (bsc#984398).
- CVE-2014-9817: Heap buffer overflow in pdb file handling (bsc#984400).
- CVE-2014-9818: Out of bound access on malformed sun file (bsc#984181).
- CVE-2014-9819: Heap overflow in palm files (bsc#984142).
- CVE-2014-9830: Handling of corrupted sun file (bsc#984135).
- CVE-2014-9831: Handling of corrupted wpg file (bsc#984375).
- CVE-2014-9836: Crash in xpm file handling (bsc#984023).
- CVE-2014-9851: Crash when parsing resource block (bsc#984160).
- CVE-2016-5689: NULL ptr dereference in dcm coder (bsc#985460).
- CVE-2014-9853: Memory leak in rle file handling (bsc#984408).
- CVE-2015-8902: PDB file DoS (CPU consumption) (bsc#983253).
- CVE-2015-8903: Denial of service (cpu) in vicar (bsc#983259).
- CVE-2015-8901: MIFF file DoS (endless loop) (bsc#983234).
- CVE-2014-9834: Heap overflow in pict file (bsc#984436).
- CVE-2014-9806: Prevent file descriptr leak due to corrupted file (bsc#983774).
- CVE-2014-9838: Out of memory crash in magick/cache.c (bsc#984370).
- CVE-2014-9854: Filling memory during identification of TIFF image (bsc#984184).
- CVE-2015-8898: Prevent null pointer access in magick/constitute.c (bsc#983746).
- CVE-2015-8894: Double free in coders/tga.c:221 (bsc#983523).
- CVE-2015-8896: Double free / integer truncation issue in coders/pict.c:2000 (bsc#983533).
- CVE-2015-8897: Out of bounds error in SpliceImage (bsc#983739).
- CVE-2016-5690: Bad foor loop in DCM coder (bsc#985451).
- CVE-2016-5691: Checks for pixel.red/green/blue in dcm coder (bsc#985456).
- CVE-2014-9805: SEGV due to a corrupted pnm file. (bsc#983752).
- CVE-2014-9808: SEGV due to corrupted dpc images. (bsc#983796).
- CVE-2014-9820: heap overflow in xpm files (bsc#984150).
- CVE-2014-9823: heap overflow in palm file (bsc#984401).
- CVE-2014-9822: heap overflow in quantum file (bsc#984187).
- CVE-2014-9839: Theoretical out of bound access in magick/colormap-private.h (bsc#984379).
- CVE-2014-9824: Heap overflow in psd file (bsc#984185).
- CVE-2014-9809: Fix a SEGV due to corrupted xwd images. (bsc#983799).
- CVE-2014-9826: Incorrect error handling in sun files (bsc#984186).
- CVE-2014-9842: Memory leak in psd handling (bsc#984374).
- CVE-2016-5687: Out of bounds read in DDS coder (bsc#985448).
- CVE-2014-9840: Out of bound access in palm file (bsc#984433).
- CVE-2014-9847: Incorrect handling of 'previous' image in the JNG decoder (bsc#984144).
- CVE-2014-9846: Added checks to prevent overflow in rle file. (bsc#983521).
- CVE-2014-9845: Crash due to corrupted dib file (bsc#984394).
- CVE-2014-9844: Out of bound issue in rle file (bsc#984373).
- CVE-2014-9849: Crash in png coder (bsc#984018).
- CVE-2016-5688: Various invalid memory reads in ImageMagick WPG (bsc#985442).
- CVE-2014-9807: Fix a double free in pdb coder. (bsc#983794).
- CVE-2014-9829: Out of bound access in sun file (bsc#984409).
- CVE-2016-4564: The DrawImage function in MagickCore/draw.c in ImageMagick made an incorrect function call in attempting to locate the next token, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983308).
- CVE-2016-4563: The TraceStrokePolygon function in MagickCore/draw.c in ImageMagick mishandled the relationship between the BezierQuantum value and certain strokes data, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983305).
- CVE-2016-4562: The DrawDashPolygon function in MagickCore/draw.c in ImageMagick mishandled calculations of certain vertices integer data, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983292).
- CVE-2014-9837: Additional PNM sanity checks (bsc#984166).
- CVE-2014-9835: Heap overflow in wpf file (bsc#984145).
- CVE-2014-9828: Corrupted (too many colors) psd file (bsc#984028).
- CVE-2016-5841: Integer overflow could have read to RCE (bnc#986609).
- CVE-2016-5842: Out-of-bounds read in MagickCore/property.c:1396 could have lead to memory leak (bnc#986608).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-11"/>
	<updated date="2016-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/983234">SUSE bug 983234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983253">SUSE bug 983253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983259">SUSE bug 983259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983292">SUSE bug 983292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983305">SUSE bug 983305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983308">SUSE bug 983308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983521">SUSE bug 983521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983523">SUSE bug 983523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983533">SUSE bug 983533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983739">SUSE bug 983739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983746">SUSE bug 983746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983752">SUSE bug 983752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983774">SUSE bug 983774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983794">SUSE bug 983794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983796">SUSE bug 983796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983799">SUSE bug 983799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983803">SUSE bug 983803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984018">SUSE bug 984018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984023">SUSE bug 984023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984028">SUSE bug 984028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984032">SUSE bug 984032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984035">SUSE bug 984035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984135">SUSE bug 984135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984137">SUSE bug 984137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984142">SUSE bug 984142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984144">SUSE bug 984144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984145">SUSE bug 984145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984150">SUSE bug 984150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984160">SUSE bug 984160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984166">SUSE bug 984166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984181">SUSE bug 984181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984184">SUSE bug 984184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984185">SUSE bug 984185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984186">SUSE bug 984186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984187">SUSE bug 984187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984193">SUSE bug 984193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984370">SUSE bug 984370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984372">SUSE bug 984372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984373">SUSE bug 984373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984374">SUSE bug 984374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984375">SUSE bug 984375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984379">SUSE bug 984379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984394">SUSE bug 984394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984398">SUSE bug 984398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984400">SUSE bug 984400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984401">SUSE bug 984401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984408">SUSE bug 984408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984409">SUSE bug 984409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984433">SUSE bug 984433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984436">SUSE bug 984436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985442">SUSE bug 985442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985448">SUSE bug 985448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985451">SUSE bug 985451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985456">SUSE bug 985456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985460">SUSE bug 985460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986608">SUSE bug 986608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986609">SUSE bug 986609</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9805/">CVE-2014-9805 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9805">CVE-2014-9805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9806/">CVE-2014-9806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9806">CVE-2014-9806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9807/">CVE-2014-9807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9807">CVE-2014-9807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9808/">CVE-2014-9808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9808">CVE-2014-9808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9809/">CVE-2014-9809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9809">CVE-2014-9809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9810/">CVE-2014-9810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9810">CVE-2014-9810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9811/">CVE-2014-9811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9811">CVE-2014-9811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9812/">CVE-2014-9812 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9812">CVE-2014-9812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9813/">CVE-2014-9813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9813">CVE-2014-9813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9814/">CVE-2014-9814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9814">CVE-2014-9814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9815/">CVE-2014-9815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9815">CVE-2014-9815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9816/">CVE-2014-9816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9816">CVE-2014-9816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9817/">CVE-2014-9817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9817">CVE-2014-9817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9818/">CVE-2014-9818 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9818">CVE-2014-9818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9819/">CVE-2014-9819 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9819">CVE-2014-9819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9820/">CVE-2014-9820 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9820">CVE-2014-9820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9822/">CVE-2014-9822 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9822">CVE-2014-9822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9823/">CVE-2014-9823 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9823">CVE-2014-9823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9824/">CVE-2014-9824 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9824">CVE-2014-9824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9826/">CVE-2014-9826 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9826">CVE-2014-9826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9828/">CVE-2014-9828 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9828">CVE-2014-9828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9829/">CVE-2014-9829 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9829">CVE-2014-9829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9830/">CVE-2014-9830 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9830">CVE-2014-9830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9831/">CVE-2014-9831 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9831">CVE-2014-9831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9834/">CVE-2014-9834 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9834">CVE-2014-9834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9835/">CVE-2014-9835 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9835">CVE-2014-9835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9836/">CVE-2014-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9836">CVE-2014-9836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9837/">CVE-2014-9837 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9837">CVE-2014-9837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9838/">CVE-2014-9838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9838">CVE-2014-9838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9839/">CVE-2014-9839 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9839">CVE-2014-9839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9840/">CVE-2014-9840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9840">CVE-2014-9840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9842/">CVE-2014-9842 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9842">CVE-2014-9842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9844/">CVE-2014-9844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9844">CVE-2014-9844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9845/">CVE-2014-9845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9845">CVE-2014-9845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9846/">CVE-2014-9846 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9846">CVE-2014-9846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9847/">CVE-2014-9847 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9847">CVE-2014-9847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9849/">CVE-2014-9849 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9849">CVE-2014-9849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9851/">CVE-2014-9851 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9851">CVE-2014-9851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9853/">CVE-2014-9853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9853">CVE-2014-9853 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9854/">CVE-2014-9854 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9854">CVE-2014-9854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8894/">CVE-2015-8894 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8894">CVE-2015-8894 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8896/">CVE-2015-8896 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8896">CVE-2015-8896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8897/">CVE-2015-8897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8897">CVE-2015-8897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8898/">CVE-2015-8898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8898">CVE-2015-8898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8901/">CVE-2015-8901 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8901">CVE-2015-8901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8902/">CVE-2015-8902 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8902">CVE-2015-8902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8903/">CVE-2015-8903 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8903">CVE-2015-8903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4562/">CVE-2016-4562 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4562">CVE-2016-4562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4563/">CVE-2016-4563 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4563">CVE-2016-4563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4564/">CVE-2016-4564 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4564">CVE-2016-4564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5687/">CVE-2016-5687 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5687">CVE-2016-5687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5688/">CVE-2016-5688 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5688">CVE-2016-5688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5689/">CVE-2016-5689 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5689">CVE-2016-5689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5690/">CVE-2016-5690 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5690">CVE-2016-5690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5691/">CVE-2016-5691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5691">CVE-2016-5691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5841/">CVE-2016-5841 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5841">CVE-2016-5841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5842/">CVE-2016-5842 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5842">CVE-2016-5842 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581833" comment="libMagickCore1-6.4.3.6-7.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581834" comment="libMagickCore1-32bit-6.4.3.6-7.45.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581833" comment="libMagickCore1-6.4.3.6-7.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581834" comment="libMagickCore1-32bit-6.4.3.6-7.45.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219698" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="991445" ref_url="https://bugzilla.suse.com/991445" source="BUGZILLA"/>
		<reference ref_id="991872" ref_url="https://bugzilla.suse.com/991872" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6491" ref_url="https://www.suse.com/security/cve/CVE-2016-6491/" source="CVE"/>
		<reference ref_id="CVE-2016-6520" ref_url="https://www.suse.com/security/cve/CVE-2016-6520/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002208.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

- security update:
  * CVE-2016-6520: buffer overflow [bsc#991872]
  * CVE-2016-6491: Out-of-bounds read in CopyMagickMemory [bsc#991445]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-15"/>
	<updated date="2016-08-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/991445">SUSE bug 991445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991872">SUSE bug 991872</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6491/">CVE-2016-6491 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6491">CVE-2016-6491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6520/">CVE-2016-6520 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6520">CVE-2016-6520 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581835" comment="libMagickCore1-6.4.3.6-7.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581836" comment="libMagickCore1-32bit-6.4.3.6-7.48.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581835" comment="libMagickCore1-6.4.3.6-7.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581836" comment="libMagickCore1-32bit-6.4.3.6-7.48.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219699" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1000399" ref_url="https://bugzilla.suse.com/1000399" source="BUGZILLA"/>
		<reference ref_id="1000434" ref_url="https://bugzilla.suse.com/1000434" source="BUGZILLA"/>
		<reference ref_id="1000436" ref_url="https://bugzilla.suse.com/1000436" source="BUGZILLA"/>
		<reference ref_id="1000688" ref_url="https://bugzilla.suse.com/1000688" source="BUGZILLA"/>
		<reference ref_id="1000689" ref_url="https://bugzilla.suse.com/1000689" source="BUGZILLA"/>
		<reference ref_id="1000690" ref_url="https://bugzilla.suse.com/1000690" source="BUGZILLA"/>
		<reference ref_id="1000691" ref_url="https://bugzilla.suse.com/1000691" source="BUGZILLA"/>
		<reference ref_id="1000692" ref_url="https://bugzilla.suse.com/1000692" source="BUGZILLA"/>
		<reference ref_id="1000693" ref_url="https://bugzilla.suse.com/1000693" source="BUGZILLA"/>
		<reference ref_id="1000694" ref_url="https://bugzilla.suse.com/1000694" source="BUGZILLA"/>
		<reference ref_id="1000695" ref_url="https://bugzilla.suse.com/1000695" source="BUGZILLA"/>
		<reference ref_id="1000698" ref_url="https://bugzilla.suse.com/1000698" source="BUGZILLA"/>
		<reference ref_id="1000699" ref_url="https://bugzilla.suse.com/1000699" source="BUGZILLA"/>
		<reference ref_id="1000700" ref_url="https://bugzilla.suse.com/1000700" source="BUGZILLA"/>
		<reference ref_id="1000701" ref_url="https://bugzilla.suse.com/1000701" source="BUGZILLA"/>
		<reference ref_id="1000703" ref_url="https://bugzilla.suse.com/1000703" source="BUGZILLA"/>
		<reference ref_id="1000704" ref_url="https://bugzilla.suse.com/1000704" source="BUGZILLA"/>
		<reference ref_id="1000707" ref_url="https://bugzilla.suse.com/1000707" source="BUGZILLA"/>
		<reference ref_id="1000709" ref_url="https://bugzilla.suse.com/1000709" source="BUGZILLA"/>
		<reference ref_id="1000711" ref_url="https://bugzilla.suse.com/1000711" source="BUGZILLA"/>
		<reference ref_id="1000713" ref_url="https://bugzilla.suse.com/1000713" source="BUGZILLA"/>
		<reference ref_id="1000714" ref_url="https://bugzilla.suse.com/1000714" source="BUGZILLA"/>
		<reference ref_id="1001066" ref_url="https://bugzilla.suse.com/1001066" source="BUGZILLA"/>
		<reference ref_id="1001221" ref_url="https://bugzilla.suse.com/1001221" source="BUGZILLA"/>
		<reference ref_id="1002209" ref_url="https://bugzilla.suse.com/1002209" source="BUGZILLA"/>
		<reference ref_id="1002421" ref_url="https://bugzilla.suse.com/1002421" source="BUGZILLA"/>
		<reference ref_id="1002422" ref_url="https://bugzilla.suse.com/1002422" source="BUGZILLA"/>
		<reference ref_id="1003629" ref_url="https://bugzilla.suse.com/1003629" source="BUGZILLA"/>
		<reference ref_id="1005123" ref_url="https://bugzilla.suse.com/1005123" source="BUGZILLA"/>
		<reference ref_id="1005125" ref_url="https://bugzilla.suse.com/1005125" source="BUGZILLA"/>
		<reference ref_id="1005127" ref_url="https://bugzilla.suse.com/1005127" source="BUGZILLA"/>
		<reference ref_id="1007245" ref_url="https://bugzilla.suse.com/1007245" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9907" ref_url="https://www.suse.com/security/cve/CVE-2014-9907/" source="CVE"/>
		<reference ref_id="CVE-2015-8957" ref_url="https://www.suse.com/security/cve/CVE-2015-8957/" source="CVE"/>
		<reference ref_id="CVE-2015-8958" ref_url="https://www.suse.com/security/cve/CVE-2015-8958/" source="CVE"/>
		<reference ref_id="CVE-2015-8959" ref_url="https://www.suse.com/security/cve/CVE-2015-8959/" source="CVE"/>
		<reference ref_id="CVE-2016-5687" ref_url="https://www.suse.com/security/cve/CVE-2016-5687/" source="CVE"/>
		<reference ref_id="CVE-2016-6823" ref_url="https://www.suse.com/security/cve/CVE-2016-6823/" source="CVE"/>
		<reference ref_id="CVE-2016-7101" ref_url="https://www.suse.com/security/cve/CVE-2016-7101/" source="CVE"/>
		<reference ref_id="CVE-2016-7514" ref_url="https://www.suse.com/security/cve/CVE-2016-7514/" source="CVE"/>
		<reference ref_id="CVE-2016-7515" ref_url="https://www.suse.com/security/cve/CVE-2016-7515/" source="CVE"/>
		<reference ref_id="CVE-2016-7516" ref_url="https://www.suse.com/security/cve/CVE-2016-7516/" source="CVE"/>
		<reference ref_id="CVE-2016-7517" ref_url="https://www.suse.com/security/cve/CVE-2016-7517/" source="CVE"/>
		<reference ref_id="CVE-2016-7518" ref_url="https://www.suse.com/security/cve/CVE-2016-7518/" source="CVE"/>
		<reference ref_id="CVE-2016-7519" ref_url="https://www.suse.com/security/cve/CVE-2016-7519/" source="CVE"/>
		<reference ref_id="CVE-2016-7522" ref_url="https://www.suse.com/security/cve/CVE-2016-7522/" source="CVE"/>
		<reference ref_id="CVE-2016-7523" ref_url="https://www.suse.com/security/cve/CVE-2016-7523/" source="CVE"/>
		<reference ref_id="CVE-2016-7524" ref_url="https://www.suse.com/security/cve/CVE-2016-7524/" source="CVE"/>
		<reference ref_id="CVE-2016-7525" ref_url="https://www.suse.com/security/cve/CVE-2016-7525/" source="CVE"/>
		<reference ref_id="CVE-2016-7526" ref_url="https://www.suse.com/security/cve/CVE-2016-7526/" source="CVE"/>
		<reference ref_id="CVE-2016-7527" ref_url="https://www.suse.com/security/cve/CVE-2016-7527/" source="CVE"/>
		<reference ref_id="CVE-2016-7528" ref_url="https://www.suse.com/security/cve/CVE-2016-7528/" source="CVE"/>
		<reference ref_id="CVE-2016-7529" ref_url="https://www.suse.com/security/cve/CVE-2016-7529/" source="CVE"/>
		<reference ref_id="CVE-2016-7530" ref_url="https://www.suse.com/security/cve/CVE-2016-7530/" source="CVE"/>
		<reference ref_id="CVE-2016-7531" ref_url="https://www.suse.com/security/cve/CVE-2016-7531/" source="CVE"/>
		<reference ref_id="CVE-2016-7533" ref_url="https://www.suse.com/security/cve/CVE-2016-7533/" source="CVE"/>
		<reference ref_id="CVE-2016-7535" ref_url="https://www.suse.com/security/cve/CVE-2016-7535/" source="CVE"/>
		<reference ref_id="CVE-2016-7537" ref_url="https://www.suse.com/security/cve/CVE-2016-7537/" source="CVE"/>
		<reference ref_id="CVE-2016-7799" ref_url="https://www.suse.com/security/cve/CVE-2016-7799/" source="CVE"/>
		<reference ref_id="CVE-2016-7800" ref_url="https://www.suse.com/security/cve/CVE-2016-7800/" source="CVE"/>
		<reference ref_id="CVE-2016-7996" ref_url="https://www.suse.com/security/cve/CVE-2016-7996/" source="CVE"/>
		<reference ref_id="CVE-2016-7997" ref_url="https://www.suse.com/security/cve/CVE-2016-7997/" source="CVE"/>
		<reference ref_id="CVE-2016-8682" ref_url="https://www.suse.com/security/cve/CVE-2016-8682/" source="CVE"/>
		<reference ref_id="CVE-2016-8683" ref_url="https://www.suse.com/security/cve/CVE-2016-8683/" source="CVE"/>
		<reference ref_id="CVE-2016-8684" ref_url="https://www.suse.com/security/cve/CVE-2016-8684/" source="CVE"/>
		<reference ref_id="CVE-2016-8862" ref_url="https://www.suse.com/security/cve/CVE-2016-8862/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002434.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

These vulnerabilities could be triggered by processing specially crafted image files,
which could lead to a process crash or resource consumtion, or potentially have
unspecified futher impact.

- CVE-2016-8862: Memory allocation failure in AcquireMagickMemory (bsc#1007245)
- CVE-2014-9907: DOS due to corrupted DDS files (bsc#1000714)
- CVE-2015-8959: DOS due to corrupted DDS files (bsc#1000713)
- CVE-2016-7537: Out of bound access for corrupted pdb file (bsc#1000711)
- CVE-2016-6823: BMP Coder Out-Of-Bounds Write Vulnerability (bsc#1001066)
- CVE-2016-7514: Out-of-bounds read in coders/psd.c (bsc#1000688)
- CVE-2016-7515: Rle file handling for corrupted file (bsc#1000689)
- CVE-2016-7529: out of bound in quantum handling (bsc#1000399)
- CVE-2016-7101: SGI Coder Out-Of-Bounds Read Vulnerability (bsc#1001221)
- CVE-2016-7527:  out of bound access in wpg file coder: (bsc#1000436)
- CVE-2016-7996, CVE-2016-7997: WPG Reader Issues (bsc#1003629)
- CVE-2016-7528: out of bound access in xcf file coder (bsc#1000434)
- CVE-2016-8683: Check that filesize is reasonable compared to the header value (bsc#1005127)
- CVE-2016-8682: Stack-buffer read overflow while reading SCT header (bsc#1005125)
- CVE-2016-8684: Mismatch between real filesize and header values (bsc#1005123)
- Buffer overflows in SIXEL, PDB, MAP, and TIFF coders (bsc#1002209)
- CVE-2016-7525: Heap buffer overflow in psd file coder (bsc#1000701)
- CVE-2016-7524: AddressSanitizer:heap-buffer-overflow READ of size 1 in meta.c:465 (bsc#1000700)
- CVE-2016-7530: Out of bound in quantum handling (bsc#1000703)
- CVE-2016-7531: Pbd file out of bound access (bsc#1000704)
- CVE-2016-7533: Wpg file out of bound for corrupted file (bsc#1000707)
- CVE-2016-7535: Out of bound access for corrupted psd file (bsc#1000709)
- CVE-2016-7522: Out of bound access for malformed psd file (bsc#1000698)
- CVE-2016-7517: out-of-bounds read in coders/pict.c (bsc#1000693)
- CVE-2016-7516: Out of bounds problem in rle, pict, viff and sun files (bsc#1000692)
- CVE-2015-8958: Potential DOS in sun file handling due to malformed files (bsc#1000691)
- CVE-2015-8957: Buffer overflow in sun file handling (bsc#1000690)
- CVE-2016-7519: out-of-bounds read in coders/rle.c (bsc#1000695)
- CVE-2016-7518: out-of-bounds read in coders/sun.c (bsc#1000694)
- CVE-2016-7800: 8BIM/8BIMW unsigned underflow leads to heap overflow (bsc#1002422)
- CVE-2016-7523: AddressSanitizer:heap-buffer-overflow READ of size 1 meta.c:496 (bsc#1000699)
- CVE-2016-7799: mogrify global buffer overflow (bsc#1002421)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-01"/>
	<updated date="2016-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000399">SUSE bug 1000399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000434">SUSE bug 1000434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000436">SUSE bug 1000436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000688">SUSE bug 1000688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000689">SUSE bug 1000689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000690">SUSE bug 1000690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000691">SUSE bug 1000691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000692">SUSE bug 1000692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000693">SUSE bug 1000693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000694">SUSE bug 1000694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000695">SUSE bug 1000695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000698">SUSE bug 1000698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000699">SUSE bug 1000699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000700">SUSE bug 1000700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000701">SUSE bug 1000701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000703">SUSE bug 1000703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000704">SUSE bug 1000704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000707">SUSE bug 1000707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000709">SUSE bug 1000709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000711">SUSE bug 1000711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000713">SUSE bug 1000713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000714">SUSE bug 1000714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001066">SUSE bug 1001066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001221">SUSE bug 1001221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002209">SUSE bug 1002209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002421">SUSE bug 1002421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002422">SUSE bug 1002422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003629">SUSE bug 1003629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005123">SUSE bug 1005123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005125">SUSE bug 1005125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005127">SUSE bug 1005127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007245">SUSE bug 1007245</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9907/">CVE-2014-9907 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9907">CVE-2014-9907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8957/">CVE-2015-8957 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8957">CVE-2015-8957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8958/">CVE-2015-8958 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8958">CVE-2015-8958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8959/">CVE-2015-8959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8959">CVE-2015-8959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5687/">CVE-2016-5687 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5687">CVE-2016-5687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6823/">CVE-2016-6823 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6823">CVE-2016-6823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7101/">CVE-2016-7101 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7101">CVE-2016-7101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7514/">CVE-2016-7514 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7514">CVE-2016-7514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7515/">CVE-2016-7515 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7515">CVE-2016-7515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7516/">CVE-2016-7516 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7516">CVE-2016-7516 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7517/">CVE-2016-7517 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7517">CVE-2016-7517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7518/">CVE-2016-7518 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7518">CVE-2016-7518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7519/">CVE-2016-7519 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7519">CVE-2016-7519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7522/">CVE-2016-7522 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7522">CVE-2016-7522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7523/">CVE-2016-7523 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7523">CVE-2016-7523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7524/">CVE-2016-7524 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7524">CVE-2016-7524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7525/">CVE-2016-7525 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7525">CVE-2016-7525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7526/">CVE-2016-7526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7526">CVE-2016-7526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7527/">CVE-2016-7527 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7527">CVE-2016-7527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7528/">CVE-2016-7528 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7528">CVE-2016-7528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7529/">CVE-2016-7529 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7529">CVE-2016-7529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7530/">CVE-2016-7530 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7530">CVE-2016-7530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7531/">CVE-2016-7531 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7531">CVE-2016-7531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7533/">CVE-2016-7533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7533">CVE-2016-7533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7535/">CVE-2016-7535 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7535">CVE-2016-7535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7537/">CVE-2016-7537 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7537">CVE-2016-7537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7799/">CVE-2016-7799 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7799">CVE-2016-7799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7800/">CVE-2016-7800 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7800">CVE-2016-7800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7996/">CVE-2016-7996 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7996">CVE-2016-7996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7997/">CVE-2016-7997 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7997">CVE-2016-7997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8682/">CVE-2016-8682 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8682">CVE-2016-8682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8683/">CVE-2016-8683 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8683">CVE-2016-8683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8684/">CVE-2016-8684 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8684">CVE-2016-8684 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8862/">CVE-2016-8862 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8862">CVE-2016-8862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581837" comment="libMagickCore1-6.4.3.6-7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581838" comment="libMagickCore1-32bit-6.4.3.6-7.54.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581837" comment="libMagickCore1-6.4.3.6-7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581838" comment="libMagickCore1-32bit-6.4.3.6-7.54.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219700" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1009318" ref_url="https://bugzilla.suse.com/1009318" source="BUGZILLA"/>
		<reference ref_id="1011130" ref_url="https://bugzilla.suse.com/1011130" source="BUGZILLA"/>
		<reference ref_id="1011136" ref_url="https://bugzilla.suse.com/1011136" source="BUGZILLA"/>
		<reference ref_id="1013376" ref_url="https://bugzilla.suse.com/1013376" source="BUGZILLA"/>
		<reference ref_id="1014159" ref_url="https://bugzilla.suse.com/1014159" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7530" ref_url="https://www.suse.com/security/cve/CVE-2016-7530/" source="CVE"/>
		<reference ref_id="CVE-2016-8707" ref_url="https://www.suse.com/security/cve/CVE-2016-8707/" source="CVE"/>
		<reference ref_id="CVE-2016-8866" ref_url="https://www.suse.com/security/cve/CVE-2016-8866/" source="CVE"/>
		<reference ref_id="CVE-2016-9556" ref_url="https://www.suse.com/security/cve/CVE-2016-9556/" source="CVE"/>
		<reference ref_id="CVE-2016-9559" ref_url="https://www.suse.com/security/cve/CVE-2016-9559/" source="CVE"/>
		<reference ref_id="CVE-2016-9773" ref_url="https://www.suse.com/security/cve/CVE-2016-9773/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002520.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

* CVE-2016-9556: Possible Heap-overflow found by fuzzing [bsc#1011130]
* CVE-2016-9559: Possible Null pointer access found by fuzzing [bsc#1011136]
* CVE-2016-8707: Possible code execution in the tiff deflate convert code [bsc#1014159]
* CVE-2016-9773: Possible Heap overflow in IsPixelGray [bsc#1013376]
* CVE-2016-8866: Possible memory allocation failure in AcquireMagickMemory [bsc#1009318]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-23"/>
	<updated date="2016-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009318">SUSE bug 1009318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011130">SUSE bug 1011130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011136">SUSE bug 1011136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013376">SUSE bug 1013376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014159">SUSE bug 1014159</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7530/">CVE-2016-7530 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7530">CVE-2016-7530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8707/">CVE-2016-8707 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8707">CVE-2016-8707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8866/">CVE-2016-8866 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8866">CVE-2016-8866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9556/">CVE-2016-9556 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9556">CVE-2016-9556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9559/">CVE-2016-9559 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9559">CVE-2016-9559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9773/">CVE-2016-9773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9773">CVE-2016-9773 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581839" comment="libMagickCore1-6.4.3.6-7.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581840" comment="libMagickCore1-32bit-6.4.3.6-7.60.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581839" comment="libMagickCore1-6.4.3.6-7.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581840" comment="libMagickCore1-32bit-6.4.3.6-7.60.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219701" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1017308" ref_url="https://bugzilla.suse.com/1017308" source="BUGZILLA"/>
		<reference ref_id="1017310" ref_url="https://bugzilla.suse.com/1017310" source="BUGZILLA"/>
		<reference ref_id="1017311" ref_url="https://bugzilla.suse.com/1017311" source="BUGZILLA"/>
		<reference ref_id="1017312" ref_url="https://bugzilla.suse.com/1017312" source="BUGZILLA"/>
		<reference ref_id="1017313" ref_url="https://bugzilla.suse.com/1017313" source="BUGZILLA"/>
		<reference ref_id="1017314" ref_url="https://bugzilla.suse.com/1017314" source="BUGZILLA"/>
		<reference ref_id="1017318" ref_url="https://bugzilla.suse.com/1017318" source="BUGZILLA"/>
		<reference ref_id="1017319" ref_url="https://bugzilla.suse.com/1017319" source="BUGZILLA"/>
		<reference ref_id="1017320" ref_url="https://bugzilla.suse.com/1017320" source="BUGZILLA"/>
		<reference ref_id="1017321" ref_url="https://bugzilla.suse.com/1017321" source="BUGZILLA"/>
		<reference ref_id="1017322" ref_url="https://bugzilla.suse.com/1017322" source="BUGZILLA"/>
		<reference ref_id="1017324" ref_url="https://bugzilla.suse.com/1017324" source="BUGZILLA"/>
		<reference ref_id="1017326" ref_url="https://bugzilla.suse.com/1017326" source="BUGZILLA"/>
		<reference ref_id="1017421" ref_url="https://bugzilla.suse.com/1017421" source="BUGZILLA"/>
		<reference ref_id="1020433" ref_url="https://bugzilla.suse.com/1020433" source="BUGZILLA"/>
		<reference ref_id="1020435" ref_url="https://bugzilla.suse.com/1020435" source="BUGZILLA"/>
		<reference ref_id="1020436" ref_url="https://bugzilla.suse.com/1020436" source="BUGZILLA"/>
		<reference ref_id="1020439" ref_url="https://bugzilla.suse.com/1020439" source="BUGZILLA"/>
		<reference ref_id="1020441" ref_url="https://bugzilla.suse.com/1020441" source="BUGZILLA"/>
		<reference ref_id="1020443" ref_url="https://bugzilla.suse.com/1020443" source="BUGZILLA"/>
		<reference ref_id="1020448" ref_url="https://bugzilla.suse.com/1020448" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10046" ref_url="https://www.suse.com/security/cve/CVE-2016-10046/" source="CVE"/>
		<reference ref_id="CVE-2016-10048" ref_url="https://www.suse.com/security/cve/CVE-2016-10048/" source="CVE"/>
		<reference ref_id="CVE-2016-10049" ref_url="https://www.suse.com/security/cve/CVE-2016-10049/" source="CVE"/>
		<reference ref_id="CVE-2016-10050" ref_url="https://www.suse.com/security/cve/CVE-2016-10050/" source="CVE"/>
		<reference ref_id="CVE-2016-10051" ref_url="https://www.suse.com/security/cve/CVE-2016-10051/" source="CVE"/>
		<reference ref_id="CVE-2016-10052" ref_url="https://www.suse.com/security/cve/CVE-2016-10052/" source="CVE"/>
		<reference ref_id="CVE-2016-10059" ref_url="https://www.suse.com/security/cve/CVE-2016-10059/" source="CVE"/>
		<reference ref_id="CVE-2016-10060" ref_url="https://www.suse.com/security/cve/CVE-2016-10060/" source="CVE"/>
		<reference ref_id="CVE-2016-10063" ref_url="https://www.suse.com/security/cve/CVE-2016-10063/" source="CVE"/>
		<reference ref_id="CVE-2016-10064" ref_url="https://www.suse.com/security/cve/CVE-2016-10064/" source="CVE"/>
		<reference ref_id="CVE-2016-10065" ref_url="https://www.suse.com/security/cve/CVE-2016-10065/" source="CVE"/>
		<reference ref_id="CVE-2016-10068" ref_url="https://www.suse.com/security/cve/CVE-2016-10068/" source="CVE"/>
		<reference ref_id="CVE-2016-10070" ref_url="https://www.suse.com/security/cve/CVE-2016-10070/" source="CVE"/>
		<reference ref_id="CVE-2016-10071" ref_url="https://www.suse.com/security/cve/CVE-2016-10071/" source="CVE"/>
		<reference ref_id="CVE-2016-10144" ref_url="https://www.suse.com/security/cve/CVE-2016-10144/" source="CVE"/>
		<reference ref_id="CVE-2016-10145" ref_url="https://www.suse.com/security/cve/CVE-2016-10145/" source="CVE"/>
		<reference ref_id="CVE-2016-10146" ref_url="https://www.suse.com/security/cve/CVE-2016-10146/" source="CVE"/>
		<reference ref_id="CVE-2017-5506" ref_url="https://www.suse.com/security/cve/CVE-2017-5506/" source="CVE"/>
		<reference ref_id="CVE-2017-5507" ref_url="https://www.suse.com/security/cve/CVE-2017-5507/" source="CVE"/>
		<reference ref_id="CVE-2017-5508" ref_url="https://www.suse.com/security/cve/CVE-2017-5508/" source="CVE"/>
		<reference ref_id="CVE-2017-5511" ref_url="https://www.suse.com/security/cve/CVE-2017-5511/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

- CVE-2016-10046: Prevent buffer overflow in draw.c caused by an incorrect length calculation (bsc#1017308)
- CVE-2016-10048: Arbitrary module could have been load because relative path were not escaped (bsc#1017310)
- CVE-2016-10049: Corrupt RLE files could have overflowed a buffer due to a incorrect length calculation (bsc#1017311)
- CVE-2016-10050: Corrupt RLE files could have overflowed a heap buffer due to a missing offset check (bsc#1017312)
- CVE-2016-10051: Fixed use after free when reading PWP files (bsc#1017313)
- CVE-2016-10052: Added bound check to exif parsing of JPEG files (bsc#1017314).
- CVE-2016-10059: Unchecked calculation when reading TIFF files could have lead to a buffer overflow (bsc#1017318)
- CVE-2016-10060: Improved error handling when writing files to not mask errors (bsc#1017319).
- CVE-2016-10063: Check validity of extend during TIFF file reading (bsc#1017320).
- CVE-2016-10064: Improved checks for buffer overflow when reading TIFF files (bsc#1017321)
- CVE-2016-10065: Unchecked calculations when reading VIFF files could have lead to out of bound reads (bsc#1017322)
- CVE-2016-10068: Prevent NULL pointer access when using the MSL interpreter (bsc#1017324)
- CVE-2016-10070: Prevent allocating the wrong amount of memory when reading mat files (bsc#1017326)
- CVE-2016-10071: Prevent allocating the wrong amount of memory when reading mat files (bsc#1017326).
- CVE-2016-10144: Added a check after allocating memory when parsing IPL files (bsc#1020433).
- CVE-2016-10145: Fixed of-by-one in string copy operation when parsing WPG files (bsc#1020435).
- CVE-2016-10146: Captions and labels were handled incorrectly, causing a memory leak that could have lead to DoS (bsc#1020443)
- CVE-2017-5506: Missing offset check leading to a double-free (bsc#1020436).
- CVE-2017-5507: Fixed a memory leak when reading MPC files allowing for DoS (bsc#1020439).
- CVE-2017-5508: Increase the amount of memory allocated for TIFF pixels to prevent a heap buffer-overflow (bsc#1020441).
- CVE-2017-5511: A missing cast when reading PSD files could have caused memory corruption by a heap overflow (bsc#1020448)

This update removes the fix for CVE-2016-9773. ImageMagick-6 was not affected by CVE-2016-9773 and it caused a regression (at least in GraphicsMagick) (bsc#1017421).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-01"/>
	<updated date="2017-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017308">SUSE bug 1017308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017310">SUSE bug 1017310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017311">SUSE bug 1017311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017312">SUSE bug 1017312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017313">SUSE bug 1017313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017314">SUSE bug 1017314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017318">SUSE bug 1017318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017319">SUSE bug 1017319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017320">SUSE bug 1017320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017321">SUSE bug 1017321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017322">SUSE bug 1017322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017324">SUSE bug 1017324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017326">SUSE bug 1017326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017421">SUSE bug 1017421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020433">SUSE bug 1020433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020435">SUSE bug 1020435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020436">SUSE bug 1020436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020439">SUSE bug 1020439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020441">SUSE bug 1020441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020443">SUSE bug 1020443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020448">SUSE bug 1020448</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10046/">CVE-2016-10046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10046">CVE-2016-10046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10048/">CVE-2016-10048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10048">CVE-2016-10048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10049/">CVE-2016-10049 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10049">CVE-2016-10049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10050/">CVE-2016-10050 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10050">CVE-2016-10050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10051/">CVE-2016-10051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10051">CVE-2016-10051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10052/">CVE-2016-10052 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10052">CVE-2016-10052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10059/">CVE-2016-10059 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10059">CVE-2016-10059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10060/">CVE-2016-10060 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10060">CVE-2016-10060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10063/">CVE-2016-10063 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10063">CVE-2016-10063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10064/">CVE-2016-10064 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10064">CVE-2016-10064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10065/">CVE-2016-10065 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10065">CVE-2016-10065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10068/">CVE-2016-10068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10068">CVE-2016-10068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10070/">CVE-2016-10070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10070">CVE-2016-10070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10071/">CVE-2016-10071 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10071">CVE-2016-10071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10144/">CVE-2016-10144 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10144">CVE-2016-10144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10145/">CVE-2016-10145 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10145">CVE-2016-10145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10146/">CVE-2016-10146 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10146">CVE-2016-10146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5506/">CVE-2017-5506 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5506">CVE-2017-5506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5507/">CVE-2017-5507 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5507">CVE-2017-5507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5508/">CVE-2017-5508 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5508">CVE-2017-5508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5511/">CVE-2017-5511 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5511">CVE-2017-5511 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581841" comment="libMagickCore1-6.4.3.6-7.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581842" comment="libMagickCore1-32bit-6.4.3.6-7.65.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581841" comment="libMagickCore1-6.4.3.6-7.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581842" comment="libMagickCore1-32bit-6.4.3.6-7.65.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219702" version="1" class="patch">
	<metadata>
		<title>Recommended update for ImageMagick (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027480" ref_url="https://bugzilla.suse.com/1027480" source="BUGZILLA"/>
		<reference ref_id="1028079" ref_url="https://bugzilla.suse.com/1028079" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7518" ref_url="https://www.suse.com/security/cve/CVE-2016-7518/" source="CVE"/>
		<reference ref_id="SUSE-RU-2017:0843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2017-March/006155.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick provides the following fixes:

- Fix segmentation fault when wrong parameter supplied to conjure command (bsc#1027480).
- Improve CVE-2016-7518 patch to fix sun coder (bsc#1028079 comment 5).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-29"/>
	<updated date="2017-03-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1027480">SUSE bug 1027480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028079">SUSE bug 1028079</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7518/">CVE-2016-7518 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7518">CVE-2016-7518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594212" comment="libMagickCore1-6.4.3.6-7.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594213" comment="libMagickCore1-32bit-6.4.3.6-7.70.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594212" comment="libMagickCore1-6.4.3.6-7.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594213" comment="libMagickCore1-32bit-6.4.3.6-7.70.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219703" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1033091" ref_url="https://bugzilla.suse.com/1033091" source="BUGZILLA"/>
		<reference ref_id="1034870" ref_url="https://bugzilla.suse.com/1034870" source="BUGZILLA"/>
		<reference ref_id="1034872" ref_url="https://bugzilla.suse.com/1034872" source="BUGZILLA"/>
		<reference ref_id="1034876" ref_url="https://bugzilla.suse.com/1034876" source="BUGZILLA"/>
		<reference ref_id="1036976" ref_url="https://bugzilla.suse.com/1036976" source="BUGZILLA"/>
		<reference ref_id="1036978" ref_url="https://bugzilla.suse.com/1036978" source="BUGZILLA"/>
		<reference ref_id="1036980" ref_url="https://bugzilla.suse.com/1036980" source="BUGZILLA"/>
		<reference ref_id="1036981" ref_url="https://bugzilla.suse.com/1036981" source="BUGZILLA"/>
		<reference ref_id="1036983" ref_url="https://bugzilla.suse.com/1036983" source="BUGZILLA"/>
		<reference ref_id="1036984" ref_url="https://bugzilla.suse.com/1036984" source="BUGZILLA"/>
		<reference ref_id="1036985" ref_url="https://bugzilla.suse.com/1036985" source="BUGZILLA"/>
		<reference ref_id="1036986" ref_url="https://bugzilla.suse.com/1036986" source="BUGZILLA"/>
		<reference ref_id="1036987" ref_url="https://bugzilla.suse.com/1036987" source="BUGZILLA"/>
		<reference ref_id="1036988" ref_url="https://bugzilla.suse.com/1036988" source="BUGZILLA"/>
		<reference ref_id="1036989" ref_url="https://bugzilla.suse.com/1036989" source="BUGZILLA"/>
		<reference ref_id="1036990" ref_url="https://bugzilla.suse.com/1036990" source="BUGZILLA"/>
		<reference ref_id="1037527" ref_url="https://bugzilla.suse.com/1037527" source="BUGZILLA"/>
		<reference ref_id="1038000" ref_url="https://bugzilla.suse.com/1038000" source="BUGZILLA"/>
		<reference ref_id="1040025" ref_url="https://bugzilla.suse.com/1040025" source="BUGZILLA"/>
		<reference ref_id="1040303" ref_url="https://bugzilla.suse.com/1040303" source="BUGZILLA"/>
		<reference ref_id="1040304" ref_url="https://bugzilla.suse.com/1040304" source="BUGZILLA"/>
		<reference ref_id="1040306" ref_url="https://bugzilla.suse.com/1040306" source="BUGZILLA"/>
		<reference ref_id="1040332" ref_url="https://bugzilla.suse.com/1040332" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9846" ref_url="https://www.suse.com/security/cve/CVE-2014-9846/" source="CVE"/>
		<reference ref_id="CVE-2016-10050" ref_url="https://www.suse.com/security/cve/CVE-2016-10050/" source="CVE"/>
		<reference ref_id="CVE-2017-7606" ref_url="https://www.suse.com/security/cve/CVE-2017-7606/" source="CVE"/>
		<reference ref_id="CVE-2017-7941" ref_url="https://www.suse.com/security/cve/CVE-2017-7941/" source="CVE"/>
		<reference ref_id="CVE-2017-7942" ref_url="https://www.suse.com/security/cve/CVE-2017-7942/" source="CVE"/>
		<reference ref_id="CVE-2017-7943" ref_url="https://www.suse.com/security/cve/CVE-2017-7943/" source="CVE"/>
		<reference ref_id="CVE-2017-8344" ref_url="https://www.suse.com/security/cve/CVE-2017-8344/" source="CVE"/>
		<reference ref_id="CVE-2017-8345" ref_url="https://www.suse.com/security/cve/CVE-2017-8345/" source="CVE"/>
		<reference ref_id="CVE-2017-8346" ref_url="https://www.suse.com/security/cve/CVE-2017-8346/" source="CVE"/>
		<reference ref_id="CVE-2017-8348" ref_url="https://www.suse.com/security/cve/CVE-2017-8348/" source="CVE"/>
		<reference ref_id="CVE-2017-8349" ref_url="https://www.suse.com/security/cve/CVE-2017-8349/" source="CVE"/>
		<reference ref_id="CVE-2017-8350" ref_url="https://www.suse.com/security/cve/CVE-2017-8350/" source="CVE"/>
		<reference ref_id="CVE-2017-8351" ref_url="https://www.suse.com/security/cve/CVE-2017-8351/" source="CVE"/>
		<reference ref_id="CVE-2017-8352" ref_url="https://www.suse.com/security/cve/CVE-2017-8352/" source="CVE"/>
		<reference ref_id="CVE-2017-8353" ref_url="https://www.suse.com/security/cve/CVE-2017-8353/" source="CVE"/>
		<reference ref_id="CVE-2017-8354" ref_url="https://www.suse.com/security/cve/CVE-2017-8354/" source="CVE"/>
		<reference ref_id="CVE-2017-8355" ref_url="https://www.suse.com/security/cve/CVE-2017-8355/" source="CVE"/>
		<reference ref_id="CVE-2017-8357" ref_url="https://www.suse.com/security/cve/CVE-2017-8357/" source="CVE"/>
		<reference ref_id="CVE-2017-8765" ref_url="https://www.suse.com/security/cve/CVE-2017-8765/" source="CVE"/>
		<reference ref_id="CVE-2017-8830" ref_url="https://www.suse.com/security/cve/CVE-2017-8830/" source="CVE"/>
		<reference ref_id="CVE-2017-9098" ref_url="https://www.suse.com/security/cve/CVE-2017-9098/" source="CVE"/>
		<reference ref_id="CVE-2017-9141" ref_url="https://www.suse.com/security/cve/CVE-2017-9141/" source="CVE"/>
		<reference ref_id="CVE-2017-9142" ref_url="https://www.suse.com/security/cve/CVE-2017-9142/" source="CVE"/>
		<reference ref_id="CVE-2017-9143" ref_url="https://www.suse.com/security/cve/CVE-2017-9143/" source="CVE"/>
		<reference ref_id="CVE-2017-9144" ref_url="https://www.suse.com/security/cve/CVE-2017-9144/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

This security issue was fixed:

- CVE-2017-7941: The ReadSGIImage function in sgi.c allowed remote attackers to consume an
  amount of available memory via a crafted file (bsc#1034876).
- CVE-2017-8351: ImageMagick, GraphicsMagick: denial of service (memory leak) via a crafted
  file (ReadPCDImage func in pcd.c) (bsc#1036986).
- CVE-2017-8352: denial of service (memory leak) via a crafted file (ReadXWDImage func in
  xwd.c) (bsc#1036987)
- CVE-2017-8349: denial of service (memory leak) via a crafted file (ReadSFWImage func in
  sfw.c) (bsc#1036984)
- CVE-2017-8350: denial of service (memory leak) via a crafted file (ReadJNGImage function in
  png.c) (bsc#1036985)
- CVE-2017-8345: denial of service (memory leak) via a crafted file (ReadMNGImage func in
  png.c) (bsc#1036980)
- CVE-2017-8346: denial of service (memory leak) via a crafted file (ReadDCMImage func in
  dcm.c) (bsc#1036981)
- CVE-2017-8353: denial of service (memory leak) via a crafted file (ReadPICTImage func in
  pict.c) (bsc#1036988)
- CVE-2017-8830: denial of service (memory leak) via a crafted file (ReadBMPImage func in
  bmp.c:1379) (bsc#1038000)
- CVE-2017-7606: denial of service (application crash) or possibly have unspecified other
  impact via a crafted image (bsc#1033091)
- CVE-2017-8765: memory leak vulnerability via a crafted ICON file (ReadICONImage in
  coders\icon.c) (bsc#1037527)
- CVE-2017-8355: denial of service (memory leak) via a crafted file (ReadMTVImage func in
  mtv.c) (bsc#1036990)
- CVE-2017-8344: denial of service (memory leak) via a crafted file (ReadPCXImage func in
  pcx.c) (bsc#1036978)
- CVE-2017-9098: uninitialized memory usage in the  ReadRLEImage RLE decoder 
  function coders/rle.c (bsc#1040025)
- CVE-2017-9141: Missing checks in the ReadDDSImage function in
  coders/dds.c could lead to a denial of service (assertion) (bsc#1040303)
- CVE-2017-9142: Missing checks in theReadOneJNGImage function in
  coders/png.c could lead to denial of service (assertion) (bsc#1040304)
- CVE-2017-9143: A possible denial of service attack via crafted .art
  file in ReadARTImage function in coders/art.c (bsc#1040306)
- CVE-2017-9144: A crafted RLE image can trigger a crash in coders/rle.c
  could lead to a denial of service (crash) (bsc#1040332)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-19"/>
	<updated date="2017-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033091">SUSE bug 1033091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034870">SUSE bug 1034870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034872">SUSE bug 1034872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034876">SUSE bug 1034876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036976">SUSE bug 1036976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036978">SUSE bug 1036978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036980">SUSE bug 1036980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036981">SUSE bug 1036981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036983">SUSE bug 1036983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036984">SUSE bug 1036984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036985">SUSE bug 1036985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036986">SUSE bug 1036986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036987">SUSE bug 1036987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036988">SUSE bug 1036988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036989">SUSE bug 1036989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036990">SUSE bug 1036990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037527">SUSE bug 1037527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038000">SUSE bug 1038000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040025">SUSE bug 1040025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040303">SUSE bug 1040303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040304">SUSE bug 1040304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040306">SUSE bug 1040306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040332">SUSE bug 1040332</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9846/">CVE-2014-9846 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9846">CVE-2014-9846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10050/">CVE-2016-10050 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10050">CVE-2016-10050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7606/">CVE-2017-7606 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7606">CVE-2017-7606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7941/">CVE-2017-7941 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7941">CVE-2017-7941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7942/">CVE-2017-7942 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7942">CVE-2017-7942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7943/">CVE-2017-7943 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7943">CVE-2017-7943 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8344/">CVE-2017-8344 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8344">CVE-2017-8344 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8345/">CVE-2017-8345 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8345">CVE-2017-8345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8346/">CVE-2017-8346 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8346">CVE-2017-8346 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8348/">CVE-2017-8348 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8348">CVE-2017-8348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8349/">CVE-2017-8349 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8349">CVE-2017-8349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8350/">CVE-2017-8350 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8350">CVE-2017-8350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8351/">CVE-2017-8351 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8351">CVE-2017-8351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8352/">CVE-2017-8352 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8352">CVE-2017-8352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8353/">CVE-2017-8353 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8353">CVE-2017-8353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8354/">CVE-2017-8354 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8354">CVE-2017-8354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8355/">CVE-2017-8355 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8355">CVE-2017-8355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8357/">CVE-2017-8357 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8357">CVE-2017-8357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8765/">CVE-2017-8765 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8765">CVE-2017-8765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8830/">CVE-2017-8830 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8830">CVE-2017-8830 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9098/">CVE-2017-9098 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9098">CVE-2017-9098 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9141/">CVE-2017-9141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9141">CVE-2017-9141 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9142/">CVE-2017-9142 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9142">CVE-2017-9142 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9143/">CVE-2017-9143 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9143">CVE-2017-9143 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9144/">CVE-2017-9144 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9144">CVE-2017-9144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581843" comment="libMagickCore1-6.4.3.6-7.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581844" comment="libMagickCore1-32bit-6.4.3.6-7.77.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581843" comment="libMagickCore1-6.4.3.6-7.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581844" comment="libMagickCore1-32bit-6.4.3.6-7.77.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219704" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1042826" ref_url="https://bugzilla.suse.com/1042826" source="BUGZILLA"/>
		<reference ref_id="1043289" ref_url="https://bugzilla.suse.com/1043289" source="BUGZILLA"/>
		<reference ref_id="1049072" ref_url="https://bugzilla.suse.com/1049072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11403" ref_url="https://www.suse.com/security/cve/CVE-2017-11403/" source="CVE"/>
		<reference ref_id="CVE-2017-9439" ref_url="https://www.suse.com/security/cve/CVE-2017-9439/" source="CVE"/>
		<reference ref_id="CVE-2017-9501" ref_url="https://www.suse.com/security/cve/CVE-2017-9501/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003140.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:
- CVE-2017-9439: A memory leak was found in the function ReadPDBImage incoders/pdb.c (bsc#1042826)
- CVE-2017-9501: An assertion failure could cause a denial of service via a crafted file (bsc#1043289)
- CVE-2017-11403: ReadMNGImage function in coders/png.c has an out-of-order CloseBlob call, resulting
  in a use-after-free via acrafted file (bsc#1049072)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-16"/>
	<updated date="2017-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1042826">SUSE bug 1042826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043289">SUSE bug 1043289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049072">SUSE bug 1049072</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11403/">CVE-2017-11403 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11403">CVE-2017-11403 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9439/">CVE-2017-9439 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9439">CVE-2017-9439 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9501/">CVE-2017-9501 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9501">CVE-2017-9501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581845" comment="libMagickCore1-6.4.3.6-7.78.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581846" comment="libMagickCore1-32bit-6.4.3.6-7.78.5.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581845" comment="libMagickCore1-6.4.3.6-7.78.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581846" comment="libMagickCore1-32bit-6.4.3.6-7.78.5.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219705" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1050135" ref_url="https://bugzilla.suse.com/1050135" source="BUGZILLA"/>
		<reference ref_id="1055219" ref_url="https://bugzilla.suse.com/1055219" source="BUGZILLA"/>
		<reference ref_id="1055430" ref_url="https://bugzilla.suse.com/1055430" source="BUGZILLA"/>
		<reference ref_id="1061873" ref_url="https://bugzilla.suse.com/1061873" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11534" ref_url="https://www.suse.com/security/cve/CVE-2017-11534/" source="CVE"/>
		<reference ref_id="CVE-2017-13133" ref_url="https://www.suse.com/security/cve/CVE-2017-13133/" source="CVE"/>
		<reference ref_id="CVE-2017-13139" ref_url="https://www.suse.com/security/cve/CVE-2017-13139/" source="CVE"/>
		<reference ref_id="CVE-2017-15033" ref_url="https://www.suse.com/security/cve/CVE-2017-15033/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003460.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2017-11534: Processing a crafted file in convert could have lead to a
  Memory Leak in the lite_font_map() function in coders/wmf.c (bsc#1050135).
- CVE-2017-13133: The load_level function in coders/xcf.c lacked offset
  validation, which allowed attackers to cause a denial of service (load_tile
  memory exhaustion) via a crafted file (bsc#1055219).
- CVE-2017-13139: The ReadOneMNGImage function in coders/png.c had an
  out-of-bounds read with the MNG CLIP chunk (bsc#1055430).
- CVE-2017-15033: Fixed a memory leak in ReadYUVImage in coders/yuv.c
  (bsc#1061873).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-30"/>
	<updated date="2017-11-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050135">SUSE bug 1050135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055219">SUSE bug 1055219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055430">SUSE bug 1055430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061873">SUSE bug 1061873</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11534/">CVE-2017-11534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11534">CVE-2017-11534 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13133/">CVE-2017-13133 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13133">CVE-2017-13133 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13139/">CVE-2017-13139 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13139">CVE-2017-13139 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15033/">CVE-2017-15033 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15033">CVE-2017-15033 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581847" comment="libMagickCore1-6.4.3.6-7.78.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581848" comment="libMagickCore1-32bit-6.4.3.6-7.78.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581847" comment="libMagickCore1-6.4.3.6-7.78.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581848" comment="libMagickCore1-32bit-6.4.3.6-7.78.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219706" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1048457" ref_url="https://bugzilla.suse.com/1048457" source="BUGZILLA"/>
		<reference ref_id="1049796" ref_url="https://bugzilla.suse.com/1049796" source="BUGZILLA"/>
		<reference ref_id="1050116" ref_url="https://bugzilla.suse.com/1050116" source="BUGZILLA"/>
		<reference ref_id="1050139" ref_url="https://bugzilla.suse.com/1050139" source="BUGZILLA"/>
		<reference ref_id="1050632" ref_url="https://bugzilla.suse.com/1050632" source="BUGZILLA"/>
		<reference ref_id="1051441" ref_url="https://bugzilla.suse.com/1051441" source="BUGZILLA"/>
		<reference ref_id="1051847" ref_url="https://bugzilla.suse.com/1051847" source="BUGZILLA"/>
		<reference ref_id="1052450" ref_url="https://bugzilla.suse.com/1052450" source="BUGZILLA"/>
		<reference ref_id="1052553" ref_url="https://bugzilla.suse.com/1052553" source="BUGZILLA"/>
		<reference ref_id="1052689" ref_url="https://bugzilla.suse.com/1052689" source="BUGZILLA"/>
		<reference ref_id="1052758" ref_url="https://bugzilla.suse.com/1052758" source="BUGZILLA"/>
		<reference ref_id="1052764" ref_url="https://bugzilla.suse.com/1052764" source="BUGZILLA"/>
		<reference ref_id="1054757" ref_url="https://bugzilla.suse.com/1054757" source="BUGZILLA"/>
		<reference ref_id="1055214" ref_url="https://bugzilla.suse.com/1055214" source="BUGZILLA"/>
		<reference ref_id="1056432" ref_url="https://bugzilla.suse.com/1056432" source="BUGZILLA"/>
		<reference ref_id="1057719" ref_url="https://bugzilla.suse.com/1057719" source="BUGZILLA"/>
		<reference ref_id="1057729" ref_url="https://bugzilla.suse.com/1057729" source="BUGZILLA"/>
		<reference ref_id="1057730" ref_url="https://bugzilla.suse.com/1057730" source="BUGZILLA"/>
		<reference ref_id="1058485" ref_url="https://bugzilla.suse.com/1058485" source="BUGZILLA"/>
		<reference ref_id="1058637" ref_url="https://bugzilla.suse.com/1058637" source="BUGZILLA"/>
		<reference ref_id="1059666" ref_url="https://bugzilla.suse.com/1059666" source="BUGZILLA"/>
		<reference ref_id="1059778" ref_url="https://bugzilla.suse.com/1059778" source="BUGZILLA"/>
		<reference ref_id="1060577" ref_url="https://bugzilla.suse.com/1060577" source="BUGZILLA"/>
		<reference ref_id="1066003" ref_url="https://bugzilla.suse.com/1066003" source="BUGZILLA"/>
		<reference ref_id="1067181" ref_url="https://bugzilla.suse.com/1067181" source="BUGZILLA"/>
		<reference ref_id="1067184" ref_url="https://bugzilla.suse.com/1067184" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11188" ref_url="https://www.suse.com/security/cve/CVE-2017-11188/" source="CVE"/>
		<reference ref_id="CVE-2017-11478" ref_url="https://www.suse.com/security/cve/CVE-2017-11478/" source="CVE"/>
		<reference ref_id="CVE-2017-11527" ref_url="https://www.suse.com/security/cve/CVE-2017-11527/" source="CVE"/>
		<reference ref_id="CVE-2017-11535" ref_url="https://www.suse.com/security/cve/CVE-2017-11535/" source="CVE"/>
		<reference ref_id="CVE-2017-11640" ref_url="https://www.suse.com/security/cve/CVE-2017-11640/" source="CVE"/>
		<reference ref_id="CVE-2017-11752" ref_url="https://www.suse.com/security/cve/CVE-2017-11752/" source="CVE"/>
		<reference ref_id="CVE-2017-12140" ref_url="https://www.suse.com/security/cve/CVE-2017-12140/" source="CVE"/>
		<reference ref_id="CVE-2017-12435" ref_url="https://www.suse.com/security/cve/CVE-2017-12435/" source="CVE"/>
		<reference ref_id="CVE-2017-12587" ref_url="https://www.suse.com/security/cve/CVE-2017-12587/" source="CVE"/>
		<reference ref_id="CVE-2017-12644" ref_url="https://www.suse.com/security/cve/CVE-2017-12644/" source="CVE"/>
		<reference ref_id="CVE-2017-12662" ref_url="https://www.suse.com/security/cve/CVE-2017-12662/" source="CVE"/>
		<reference ref_id="CVE-2017-12669" ref_url="https://www.suse.com/security/cve/CVE-2017-12669/" source="CVE"/>
		<reference ref_id="CVE-2017-12983" ref_url="https://www.suse.com/security/cve/CVE-2017-12983/" source="CVE"/>
		<reference ref_id="CVE-2017-13134" ref_url="https://www.suse.com/security/cve/CVE-2017-13134/" source="CVE"/>
		<reference ref_id="CVE-2017-13769" ref_url="https://www.suse.com/security/cve/CVE-2017-13769/" source="CVE"/>
		<reference ref_id="CVE-2017-14172" ref_url="https://www.suse.com/security/cve/CVE-2017-14172/" source="CVE"/>
		<reference ref_id="CVE-2017-14173" ref_url="https://www.suse.com/security/cve/CVE-2017-14173/" source="CVE"/>
		<reference ref_id="CVE-2017-14175" ref_url="https://www.suse.com/security/cve/CVE-2017-14175/" source="CVE"/>
		<reference ref_id="CVE-2017-14341" ref_url="https://www.suse.com/security/cve/CVE-2017-14341/" source="CVE"/>
		<reference ref_id="CVE-2017-14342" ref_url="https://www.suse.com/security/cve/CVE-2017-14342/" source="CVE"/>
		<reference ref_id="CVE-2017-14531" ref_url="https://www.suse.com/security/cve/CVE-2017-14531/" source="CVE"/>
		<reference ref_id="CVE-2017-14607" ref_url="https://www.suse.com/security/cve/CVE-2017-14607/" source="CVE"/>
		<reference ref_id="CVE-2017-14733" ref_url="https://www.suse.com/security/cve/CVE-2017-14733/" source="CVE"/>
		<reference ref_id="CVE-2017-15930" ref_url="https://www.suse.com/security/cve/CVE-2017-15930/" source="CVE"/>
		<reference ref_id="CVE-2017-16545" ref_url="https://www.suse.com/security/cve/CVE-2017-16545/" source="CVE"/>
		<reference ref_id="CVE-2017-16546" ref_url="https://www.suse.com/security/cve/CVE-2017-16546/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003541.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

  * CVE-2017-14607: out of bounds read flaw related to ReadTIFFImagehas  
    could possibly disclose potentially sensitive memory [bsc#1059778]
  
  * CVE-2017-11640: NULL pointer deref in WritePTIFImage() in coders/tiff.c [bsc#1050632]
  
  * CVE-2017-14342: a memory exhaustion vulnerability in ReadWPGImage 
    in coders/wpg.c could lead to denial of service [bsc#1058485]

  * CVE-2017-14341: Infinite loop in the ReadWPGImage function [bsc#1058637]

  * CVE-2017-16546: problem in the function ReadWPGImage in coders/wpg.c 
    could lead to denial of service [bsc#1067181]

  * CVE-2017-16545: The ReadWPGImage function in coders/wpg.c in  
    validation problems could lead to denial of service [bsc#1067184]

  * CVE-2017-14175: Lack of End of File check could lead to denial of service [bsc#1057719]

  * CVE-2017-13769: denial of service issue in function WriteTHUMBNAILImage in coders/thumbnail.c [bsc#1056432]

  * CVE-2017-13134: a heap-based buffer over-read was found in thefunction SFWScan 
    in coders/sfw.c, which allows attackers to cause adenial of service via a crafted file. [bsc#1055214]

  * CVE-2017-11478: ReadOneDJVUImage in coders/djvu.c in ImageMagick allows remote attackers to cause a DoS [bsc#1049796]

  * CVE-2017-15930: Null Pointer dereference  while transfering JPEG scanlines could lead to denial of service [bsc#1066003]

  * CVE-2017-12983: Heap-based buffer overflow in the ReadSFWImage function in coders/sfw.c 
    allows remote attackers to cause a denial of service [bsc#1054757]

  * CVE-2017-14531: memory exhaustion issue in ReadSUNImage incoders/sun.c. [bsc#1059666]

  * CVE-2017-12435: Memory exhaustion in ReadSUNImage in coders/sun.c, 
    which allows attackers to cause denial of service [bsc#1052553]

  * CVE-2017-12587: User controlable large loop in the ReadPWPImage in coders\pwp.c could lead to denial of service [bsc#1052450]

  * CVE-2017-14173: unction ReadTXTImage is vulnerable to a integer overflow that could lead to denial of service [bsc#1057729]
  
  * CVE-2017-11188: ImageMagick: The ReadDPXImage function in codersdpx.c in ImageMagick 7.0.6-0 has a largeloop vulnerability that can cause CPU exhaustion via a crafted DPX file, relatedto lack of an EOF check. [bnc#1048457]

  * CVE-2017-11527: ImageMagick: ReadDPXImage in coders/dpx.c allows remote attackers to cause DoS [bnc#1050116] 

  * CVE-2017-11535: GraphicsMagick, ImageMagick: Heap-based buffer over-read in WritePSImage() in coders/ps.c [bnc#1050139]

  * CVE-2017-11752: ImageMagick: ReadMAGICKImage in coders/magick.c allows to cause DoS  [bnc#1051441] 

  * CVE-2017-12140: ImageMagick: ReadDCMImage in codersdcm.c has a ninteger signedness error leading to excessive memory consumption [bnc#1051847] 

  * CVE-2017-12669: ImageMagick: Memory leak in WriteCALSImage in coders/cals.c [bnc#1052689]

  * CVE-2017-12662: GraphicsMagick, ImageMagick: Memory leak in WritePDFImage in coders/pdf.c [bnc#1052758]

  * CVE-2017-12644: ImageMagick: Memory leak in ReadDCMImage in codersdcm.c [bnc#1052764]

  * CVE-2017-14172: ImageMagick: Lack of end of file check in ReadPSImage() could lead to a denial of service [bnc#1057730]

  * CVE-2017-14733: GraphicsMagick: Heap overflow on ReadRLEImage in coders/rle.c could lead to denial of service [bnc#1060577]
  
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-20"/>
	<updated date="2017-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1048457">SUSE bug 1048457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049796">SUSE bug 1049796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050116">SUSE bug 1050116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050139">SUSE bug 1050139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050632">SUSE bug 1050632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051441">SUSE bug 1051441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051847">SUSE bug 1051847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052450">SUSE bug 1052450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052553">SUSE bug 1052553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052689">SUSE bug 1052689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052758">SUSE bug 1052758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052764">SUSE bug 1052764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054757">SUSE bug 1054757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055214">SUSE bug 1055214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056432">SUSE bug 1056432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057719">SUSE bug 1057719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057729">SUSE bug 1057729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057730">SUSE bug 1057730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058485">SUSE bug 1058485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058637">SUSE bug 1058637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059666">SUSE bug 1059666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059778">SUSE bug 1059778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060577">SUSE bug 1060577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066003">SUSE bug 1066003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067181">SUSE bug 1067181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067184">SUSE bug 1067184</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11188/">CVE-2017-11188 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11188">CVE-2017-11188 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11478/">CVE-2017-11478 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11478">CVE-2017-11478 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11527/">CVE-2017-11527 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11527">CVE-2017-11527 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11535/">CVE-2017-11535 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11535">CVE-2017-11535 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11640/">CVE-2017-11640 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11640">CVE-2017-11640 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11752/">CVE-2017-11752 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11752">CVE-2017-11752 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12140/">CVE-2017-12140 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12140">CVE-2017-12140 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12435/">CVE-2017-12435 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12435">CVE-2017-12435 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12587/">CVE-2017-12587 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12587">CVE-2017-12587 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12644/">CVE-2017-12644 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12644">CVE-2017-12644 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12662/">CVE-2017-12662 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12662">CVE-2017-12662 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12669/">CVE-2017-12669 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12669">CVE-2017-12669 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12983/">CVE-2017-12983 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12983">CVE-2017-12983 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13134/">CVE-2017-13134 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13134">CVE-2017-13134 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13769/">CVE-2017-13769 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13769">CVE-2017-13769 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14172/">CVE-2017-14172 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14172">CVE-2017-14172 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14173/">CVE-2017-14173 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14173">CVE-2017-14173 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14175/">CVE-2017-14175 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14175">CVE-2017-14175 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14341/">CVE-2017-14341 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14341">CVE-2017-14341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14342/">CVE-2017-14342 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14342">CVE-2017-14342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14531/">CVE-2017-14531 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14531">CVE-2017-14531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14607/">CVE-2017-14607 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14607">CVE-2017-14607 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14733/">CVE-2017-14733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14733">CVE-2017-14733 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15930/">CVE-2017-15930 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15930">CVE-2017-15930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16545/">CVE-2017-16545 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16545">CVE-2017-16545 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16546/">CVE-2017-16546 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16546">CVE-2017-16546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581849" comment="libMagickCore1-6.4.3.6-7.78.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581850" comment="libMagickCore1-32bit-6.4.3.6-7.78.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581849" comment="libMagickCore1-6.4.3.6-7.78.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581850" comment="libMagickCore1-32bit-6.4.3.6-7.78.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219707" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1052460" ref_url="https://bugzilla.suse.com/1052460" source="BUGZILLA"/>
		<reference ref_id="1055053" ref_url="https://bugzilla.suse.com/1055053" source="BUGZILLA"/>
		<reference ref_id="1055063" ref_url="https://bugzilla.suse.com/1055063" source="BUGZILLA"/>
		<reference ref_id="1056550" ref_url="https://bugzilla.suse.com/1056550" source="BUGZILLA"/>
		<reference ref_id="1057723" ref_url="https://bugzilla.suse.com/1057723" source="BUGZILLA"/>
		<reference ref_id="1058422" ref_url="https://bugzilla.suse.com/1058422" source="BUGZILLA"/>
		<reference ref_id="1063049" ref_url="https://bugzilla.suse.com/1063049" source="BUGZILLA"/>
		<reference ref_id="1063050" ref_url="https://bugzilla.suse.com/1063050" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12563" ref_url="https://www.suse.com/security/cve/CVE-2017-12563/" source="CVE"/>
		<reference ref_id="CVE-2017-12691" ref_url="https://www.suse.com/security/cve/CVE-2017-12691/" source="CVE"/>
		<reference ref_id="CVE-2017-13061" ref_url="https://www.suse.com/security/cve/CVE-2017-13061/" source="CVE"/>
		<reference ref_id="CVE-2017-13062" ref_url="https://www.suse.com/security/cve/CVE-2017-13062/" source="CVE"/>
		<reference ref_id="CVE-2017-14042" ref_url="https://www.suse.com/security/cve/CVE-2017-14042/" source="CVE"/>
		<reference ref_id="CVE-2017-14174" ref_url="https://www.suse.com/security/cve/CVE-2017-14174/" source="CVE"/>
		<reference ref_id="CVE-2017-14343" ref_url="https://www.suse.com/security/cve/CVE-2017-14343/" source="CVE"/>
		<reference ref_id="CVE-2017-15277" ref_url="https://www.suse.com/security/cve/CVE-2017-15277/" source="CVE"/>
		<reference ref_id="CVE-2017-15281" ref_url="https://www.suse.com/security/cve/CVE-2017-15281/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003578.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.
  
These security issues were fixed:

- CVE-2017-14343: Fixed a memory leak vulnerability in ReadXCFImage in
  coders/xcf.c via a crafted xcf image file (bsc#1058422).
- CVE-2017-12691: The ReadOneLayer function in coders/xcf.c allowed remote
  attackers to cause a denial of service (memory consumption) via a crafted file
  (bsc#1058422).
- CVE-2017-14042: Prevent memory allocation failure in the ReadPNMImage
  function in coders/pnm.c. The vulnerability caused a big memory allocation,
  which may have lead to remote denial of service in the MagickRealloc function
  in magick/memory.c (bsc#1056550).
- CVE-2017-15281: ReadPSDImage in coders/psd.c allowed remote attackers to
  cause a denial of service (application crash) or possibly have unspecified
  other impact via a crafted file (bsc#1063049).
- CVE-2017-13061: A length-validation vulnerability in the function
  ReadPSDLayersInternal in coders/psd.c allowed attackers to cause a denial of
  service (ReadPSDImage memory exhaustion) via a crafted file (bsc#1055063).
- CVE-2017-12563: A memory exhaustion vulnerability in the function
  ReadPSDImage in coders/psd.c allowed attackers to cause a denial of service
  (bsc#1052460).
- CVE-2017-14174: coders/psd.c allowed for DoS in ReadPSDLayersInternal() due
  to lack of an EOF (End of File) check might have caused huge CPU consumption.
  When a crafted PSD file, which claims a large 'length' field in the header but
  did not contain sufficient backing data, is provided, the loop over 'length'
  would consume huge CPU resources, since there is no EOF check inside the loop
  (bsc#1057723).
- CVE-2017-13062: A memory leak vulnerability in the function formatIPTC in
  coders/meta.c allowed attackers to cause a denial of service (WriteMETAImage
  memory consumption) via a crafted file (bsc#1055053).
- CVE-2017-15277: ReadGIFImage in coders/gif.c left the palette uninitialized
  when processing a GIF file that has neither a global nor local palette. If this
  functionality was used as a library loaded into a process that operates on
  interesting data, this data sometimes could have been leaked via the
  uninitialized palette (bsc#1063050).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-09"/>
	<updated date="2018-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1052460">SUSE bug 1052460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055053">SUSE bug 1055053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055063">SUSE bug 1055063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056550">SUSE bug 1056550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057723">SUSE bug 1057723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058422">SUSE bug 1058422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063049">SUSE bug 1063049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063050">SUSE bug 1063050</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12563/">CVE-2017-12563 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12563">CVE-2017-12563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12691/">CVE-2017-12691 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12691">CVE-2017-12691 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13061/">CVE-2017-13061 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13061">CVE-2017-13061 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13062/">CVE-2017-13062 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13062">CVE-2017-13062 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14042/">CVE-2017-14042 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14042">CVE-2017-14042 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14174/">CVE-2017-14174 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14174">CVE-2017-14174 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14343/">CVE-2017-14343 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14343">CVE-2017-14343 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15277/">CVE-2017-15277 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15277">CVE-2017-15277 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15281/">CVE-2017-15281 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15281">CVE-2017-15281 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581851" comment="libMagickCore1-6.4.3.6-7.78.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581852" comment="libMagickCore1-32bit-6.4.3.6-7.78.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581851" comment="libMagickCore1-6.4.3.6-7.78.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581852" comment="libMagickCore1-32bit-6.4.3.6-7.78.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219708" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1042948" ref_url="https://bugzilla.suse.com/1042948" source="BUGZILLA"/>
		<reference ref_id="1047044" ref_url="https://bugzilla.suse.com/1047044" source="BUGZILLA"/>
		<reference ref_id="1047898" ref_url="https://bugzilla.suse.com/1047898" source="BUGZILLA"/>
		<reference ref_id="1049373" ref_url="https://bugzilla.suse.com/1049373" source="BUGZILLA"/>
		<reference ref_id="1050120" ref_url="https://bugzilla.suse.com/1050120" source="BUGZILLA"/>
		<reference ref_id="1050606" ref_url="https://bugzilla.suse.com/1050606" source="BUGZILLA"/>
		<reference ref_id="1051412" ref_url="https://bugzilla.suse.com/1051412" source="BUGZILLA"/>
		<reference ref_id="1051446" ref_url="https://bugzilla.suse.com/1051446" source="BUGZILLA"/>
		<reference ref_id="1052252" ref_url="https://bugzilla.suse.com/1052252" source="BUGZILLA"/>
		<reference ref_id="1052468" ref_url="https://bugzilla.suse.com/1052468" source="BUGZILLA"/>
		<reference ref_id="1052550" ref_url="https://bugzilla.suse.com/1052550" source="BUGZILLA"/>
		<reference ref_id="1052710" ref_url="https://bugzilla.suse.com/1052710" source="BUGZILLA"/>
		<reference ref_id="1052720" ref_url="https://bugzilla.suse.com/1052720" source="BUGZILLA"/>
		<reference ref_id="1052731" ref_url="https://bugzilla.suse.com/1052731" source="BUGZILLA"/>
		<reference ref_id="1052732" ref_url="https://bugzilla.suse.com/1052732" source="BUGZILLA"/>
		<reference ref_id="1052771" ref_url="https://bugzilla.suse.com/1052771" source="BUGZILLA"/>
		<reference ref_id="1055065" ref_url="https://bugzilla.suse.com/1055065" source="BUGZILLA"/>
		<reference ref_id="1055323" ref_url="https://bugzilla.suse.com/1055323" source="BUGZILLA"/>
		<reference ref_id="1055434" ref_url="https://bugzilla.suse.com/1055434" source="BUGZILLA"/>
		<reference ref_id="1055855" ref_url="https://bugzilla.suse.com/1055855" source="BUGZILLA"/>
		<reference ref_id="1058082" ref_url="https://bugzilla.suse.com/1058082" source="BUGZILLA"/>
		<reference ref_id="1058640" ref_url="https://bugzilla.suse.com/1058640" source="BUGZILLA"/>
		<reference ref_id="1059751" ref_url="https://bugzilla.suse.com/1059751" source="BUGZILLA"/>
		<reference ref_id="1072902" ref_url="https://bugzilla.suse.com/1072902" source="BUGZILLA"/>
		<reference ref_id="1074122" ref_url="https://bugzilla.suse.com/1074122" source="BUGZILLA"/>
		<reference ref_id="1074123" ref_url="https://bugzilla.suse.com/1074123" source="BUGZILLA"/>
		<reference ref_id="1074425" ref_url="https://bugzilla.suse.com/1074425" source="BUGZILLA"/>
		<reference ref_id="1074610" ref_url="https://bugzilla.suse.com/1074610" source="BUGZILLA"/>
		<reference ref_id="1074969" ref_url="https://bugzilla.suse.com/1074969" source="BUGZILLA"/>
		<reference ref_id="1074973" ref_url="https://bugzilla.suse.com/1074973" source="BUGZILLA"/>
		<reference ref_id="1074975" ref_url="https://bugzilla.suse.com/1074975" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000445" ref_url="https://www.suse.com/security/cve/CVE-2017-1000445/" source="CVE"/>
		<reference ref_id="CVE-2017-1000476" ref_url="https://www.suse.com/security/cve/CVE-2017-1000476/" source="CVE"/>
		<reference ref_id="CVE-2017-10800" ref_url="https://www.suse.com/security/cve/CVE-2017-10800/" source="CVE"/>
		<reference ref_id="CVE-2017-11141" ref_url="https://www.suse.com/security/cve/CVE-2017-11141/" source="CVE"/>
		<reference ref_id="CVE-2017-11449" ref_url="https://www.suse.com/security/cve/CVE-2017-11449/" source="CVE"/>
		<reference ref_id="CVE-2017-11529" ref_url="https://www.suse.com/security/cve/CVE-2017-11529/" source="CVE"/>
		<reference ref_id="CVE-2017-11644" ref_url="https://www.suse.com/security/cve/CVE-2017-11644/" source="CVE"/>
		<reference ref_id="CVE-2017-11724" ref_url="https://www.suse.com/security/cve/CVE-2017-11724/" source="CVE"/>
		<reference ref_id="CVE-2017-11751" ref_url="https://www.suse.com/security/cve/CVE-2017-11751/" source="CVE"/>
		<reference ref_id="CVE-2017-12430" ref_url="https://www.suse.com/security/cve/CVE-2017-12430/" source="CVE"/>
		<reference ref_id="CVE-2017-12434" ref_url="https://www.suse.com/security/cve/CVE-2017-12434/" source="CVE"/>
		<reference ref_id="CVE-2017-12564" ref_url="https://www.suse.com/security/cve/CVE-2017-12564/" source="CVE"/>
		<reference ref_id="CVE-2017-12642" ref_url="https://www.suse.com/security/cve/CVE-2017-12642/" source="CVE"/>
		<reference ref_id="CVE-2017-12667" ref_url="https://www.suse.com/security/cve/CVE-2017-12667/" source="CVE"/>
		<reference ref_id="CVE-2017-12670" ref_url="https://www.suse.com/security/cve/CVE-2017-12670/" source="CVE"/>
		<reference ref_id="CVE-2017-12672" ref_url="https://www.suse.com/security/cve/CVE-2017-12672/" source="CVE"/>
		<reference ref_id="CVE-2017-12675" ref_url="https://www.suse.com/security/cve/CVE-2017-12675/" source="CVE"/>
		<reference ref_id="CVE-2017-13060" ref_url="https://www.suse.com/security/cve/CVE-2017-13060/" source="CVE"/>
		<reference ref_id="CVE-2017-13146" ref_url="https://www.suse.com/security/cve/CVE-2017-13146/" source="CVE"/>
		<reference ref_id="CVE-2017-13648" ref_url="https://www.suse.com/security/cve/CVE-2017-13648/" source="CVE"/>
		<reference ref_id="CVE-2017-13658" ref_url="https://www.suse.com/security/cve/CVE-2017-13658/" source="CVE"/>
		<reference ref_id="CVE-2017-14249" ref_url="https://www.suse.com/security/cve/CVE-2017-14249/" source="CVE"/>
		<reference ref_id="CVE-2017-14326" ref_url="https://www.suse.com/security/cve/CVE-2017-14326/" source="CVE"/>
		<reference ref_id="CVE-2017-14533" ref_url="https://www.suse.com/security/cve/CVE-2017-14533/" source="CVE"/>
		<reference ref_id="CVE-2017-17680" ref_url="https://www.suse.com/security/cve/CVE-2017-17680/" source="CVE"/>
		<reference ref_id="CVE-2017-17881" ref_url="https://www.suse.com/security/cve/CVE-2017-17881/" source="CVE"/>
		<reference ref_id="CVE-2017-17882" ref_url="https://www.suse.com/security/cve/CVE-2017-17882/" source="CVE"/>
		<reference ref_id="CVE-2017-18022" ref_url="https://www.suse.com/security/cve/CVE-2017-18022/" source="CVE"/>
		<reference ref_id="CVE-2017-9409" ref_url="https://www.suse.com/security/cve/CVE-2017-9409/" source="CVE"/>
		<reference ref_id="CVE-2018-5246" ref_url="https://www.suse.com/security/cve/CVE-2018-5246/" source="CVE"/>
		<reference ref_id="CVE-2018-5247" ref_url="https://www.suse.com/security/cve/CVE-2018-5247/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2017-12672: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service (bsc#1052720).
- CVE-2017-13060: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service via a crafted file (bsc#1055065).
- CVE-2017-11724: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c involving the quantum_info and clone_info data
  structures (bsc#1051446).
- CVE-2017-12670: Added validation in coders/mat.c to prevent an assertion
  failure in the function DestroyImage in MagickCore/image.c, which allowed
  attackers to cause a denial of service (bsc#1052731).
- CVE-2017-12667: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1052732).
- CVE-2017-13146: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1055323).
- CVE-2017-10800: Processing MATLAB images in coders/mat.c could have lead to a
  denial of service (OOM) in ReadMATImage() if the size specified for a MAT
  Object was larger than the actual amount of data (bsc#1047044)
- CVE-2017-13648: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1055434).
- CVE-2017-11141: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders\mat.c that could have caused memory exhaustion via a
  crafted MAT file, related to incorrect ordering of a SetImageExtent call
  (bsc#1047898).
- CVE-2017-11529: The ReadMATImage function in coders/mat.c allowed remote
  attackers to cause a denial of service (memory leak) via a crafted file
  (bsc#1050120).
- CVE-2017-12564: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service (bsc#1052468).
- CVE-2017-12434: Added a missing NULL check in the function ReadMATImage in
  coders/mat.c, which allowed attackers to cause a denial of service (assertion
  failure) in DestroyImageInfo in image.c (bsc#1052550).
- CVE-2017-12675: Added a missing check for multidimensional data coders/mat.c,
  that could have lead to a memory leak in the function ReadImage in
  MagickCore/constitute.c, which allowed attackers to cause a denial of service
  (bsc#1052710).
- CVE-2017-14326: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service via a crafted file (bsc#1058640).
- CVE-2017-11644: Processesing a crafted file in convert could have lead to a
  memory leak in the ReadMATImage() function in coders/mat.c (bsc#1050606).
- CVE-2017-13658: Added a missing NULL check in the ReadMATImage function in
  coders/mat.c, which could have lead to a denial of service (assertion failure
  and application exit) in the DestroyImageInfo function in MagickCore/image.c
  (bsc#1055855).
- CVE-2017-14533: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1059751).
- CVE-2017-17881: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service via a crafted MAT image file (bsc#1074123).
- CVE-2017-1000476: Prevent CPU exhaustion in the function ReadDDSInfo in
  coders/dds.c, which allowed attackers to cause a denial of service
  (bsc#1074610).
- CVE-2017-9409: Fixed a memory leak vulnerability in the function ReadMPCImage
  in mpc.c, which allowed attackers to cause a denial of service via a crafted
  file (bsc#1042948).
- CVE-2017-11449: coders/mpc did not enable seekable streams and thus could not
  validate blob sizes, which allowed remote attackers to cause a denial of service
  (application crash) or possibly have unspecified other impact via an image
  received from stdin (bsc#1049373)
- CVE-2017-12430: A memory exhaustion in the function ReadMPCImage in
  coders/mpc.c allowed attackers to cause DoS (bsc#1052252)
- CVE-2017-12642: Prevent a memory leak vulnerability in ReadMPCImage in
  coders\mpc.c via crafted file allowing for DoS (bsc#1052771)
- CVE-2017-14249: A mishandled EOF check in ReadMPCImage in coders/mpc.c that
  lead to a division by zero in GetPixelCacheTileSize in MagickCore/cache.c
  allowed remote attackers to cause a denial of service via a crafted file
  (bsc#1058082)
- CVE-2017-1000445: Added a NUL pointer check in the MagickCore component that
  might have lead to denial of service  (bsc#1074425).
- CVE-2017-11751: Fixed a memory leak vulnerability in the function
  WritePICONImage in coders/xpm.c that allowed remote attackers to cause a denial
  of service via a crafted file (bsc#1051412).
- CVE-2017-17680: Fixed a memory leak vulnerability in the function
  ReadXPMImage in coders/xpm.c, which allowed attackers to cause a denial of
  service via a crafted xpm image file (bsc#1072902).
- CVE-2017-17882: Fixed a memory leak vulnerability in the function
  ReadXPMImage in coders/xpm.c, which allowed attackers to cause a denial of
  service via a crafted XPM image file (bsc#1074122).
- CVE-2018-5246: Fixed memory leak vulnerability in ReadPATTERNImage in
  coders/pattern.c (bsc#1074973).
- CVE-2017-18022: Fixed memory leak vulnerability in MontageImageCommand in
  MagickWand/montage.c (bsc#1074975)
- CVE-2018-5247: Fixed memory leak vulnerability in ReadRLAImage in
  coders/rla.c (bsc#1074969)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-18"/>
	<updated date="2018-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042948">SUSE bug 1042948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047044">SUSE bug 1047044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047898">SUSE bug 1047898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049373">SUSE bug 1049373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050120">SUSE bug 1050120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050606">SUSE bug 1050606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051412">SUSE bug 1051412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051446">SUSE bug 1051446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052252">SUSE bug 1052252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052468">SUSE bug 1052468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052550">SUSE bug 1052550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052710">SUSE bug 1052710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052720">SUSE bug 1052720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052731">SUSE bug 1052731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052732">SUSE bug 1052732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052771">SUSE bug 1052771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055065">SUSE bug 1055065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055323">SUSE bug 1055323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055434">SUSE bug 1055434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055855">SUSE bug 1055855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058082">SUSE bug 1058082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058640">SUSE bug 1058640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059751">SUSE bug 1059751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072902">SUSE bug 1072902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074122">SUSE bug 1074122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074123">SUSE bug 1074123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074425">SUSE bug 1074425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074610">SUSE bug 1074610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074969">SUSE bug 1074969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074973">SUSE bug 1074973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074975">SUSE bug 1074975</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000445/">CVE-2017-1000445 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000445">CVE-2017-1000445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000476/">CVE-2017-1000476 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000476">CVE-2017-1000476 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10800/">CVE-2017-10800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10800">CVE-2017-10800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11141/">CVE-2017-11141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11141">CVE-2017-11141 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11449/">CVE-2017-11449 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11449">CVE-2017-11449 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11529/">CVE-2017-11529 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11529">CVE-2017-11529 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11644/">CVE-2017-11644 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11644">CVE-2017-11644 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11724/">CVE-2017-11724 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11724">CVE-2017-11724 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11751/">CVE-2017-11751 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11751">CVE-2017-11751 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12430/">CVE-2017-12430 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12430">CVE-2017-12430 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12434/">CVE-2017-12434 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12434">CVE-2017-12434 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12564/">CVE-2017-12564 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12564">CVE-2017-12564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12642/">CVE-2017-12642 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12642">CVE-2017-12642 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12667/">CVE-2017-12667 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12667">CVE-2017-12667 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12670/">CVE-2017-12670 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12670">CVE-2017-12670 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12672/">CVE-2017-12672 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12672">CVE-2017-12672 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12675/">CVE-2017-12675 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12675">CVE-2017-12675 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13060/">CVE-2017-13060 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13060">CVE-2017-13060 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13146/">CVE-2017-13146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13146">CVE-2017-13146 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13648/">CVE-2017-13648 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13648">CVE-2017-13648 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13658/">CVE-2017-13658 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13658">CVE-2017-13658 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14249/">CVE-2017-14249 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14249">CVE-2017-14249 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14326/">CVE-2017-14326 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14326">CVE-2017-14326 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14533/">CVE-2017-14533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14533">CVE-2017-14533 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17680/">CVE-2017-17680 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17680">CVE-2017-17680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17881/">CVE-2017-17881 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17881">CVE-2017-17881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17882/">CVE-2017-17882 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17882">CVE-2017-17882 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18022/">CVE-2017-18022 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18022">CVE-2017-18022 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9409/">CVE-2017-9409 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9409">CVE-2017-9409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5246/">CVE-2018-5246 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5246">CVE-2018-5246 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5247/">CVE-2018-5247 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5247">CVE-2018-5247 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581853" comment="libMagickCore1-6.4.3.6-7.78.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581854" comment="libMagickCore1-32bit-6.4.3.6-7.78.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581853" comment="libMagickCore1-6.4.3.6-7.78.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581854" comment="libMagickCore1-32bit-6.4.3.6-7.78.22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219709" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1043353" ref_url="https://bugzilla.suse.com/1043353" source="BUGZILLA"/>
		<reference ref_id="1043354" ref_url="https://bugzilla.suse.com/1043354" source="BUGZILLA"/>
		<reference ref_id="1047908" ref_url="https://bugzilla.suse.com/1047908" source="BUGZILLA"/>
		<reference ref_id="1050037" ref_url="https://bugzilla.suse.com/1050037" source="BUGZILLA"/>
		<reference ref_id="1050072" ref_url="https://bugzilla.suse.com/1050072" source="BUGZILLA"/>
		<reference ref_id="1050098" ref_url="https://bugzilla.suse.com/1050098" source="BUGZILLA"/>
		<reference ref_id="1050100" ref_url="https://bugzilla.suse.com/1050100" source="BUGZILLA"/>
		<reference ref_id="1050635" ref_url="https://bugzilla.suse.com/1050635" source="BUGZILLA"/>
		<reference ref_id="1051442" ref_url="https://bugzilla.suse.com/1051442" source="BUGZILLA"/>
		<reference ref_id="1052470" ref_url="https://bugzilla.suse.com/1052470" source="BUGZILLA"/>
		<reference ref_id="1052708" ref_url="https://bugzilla.suse.com/1052708" source="BUGZILLA"/>
		<reference ref_id="1052717" ref_url="https://bugzilla.suse.com/1052717" source="BUGZILLA"/>
		<reference ref_id="1052721" ref_url="https://bugzilla.suse.com/1052721" source="BUGZILLA"/>
		<reference ref_id="1052768" ref_url="https://bugzilla.suse.com/1052768" source="BUGZILLA"/>
		<reference ref_id="1052777" ref_url="https://bugzilla.suse.com/1052777" source="BUGZILLA"/>
		<reference ref_id="1052781" ref_url="https://bugzilla.suse.com/1052781" source="BUGZILLA"/>
		<reference ref_id="1054600" ref_url="https://bugzilla.suse.com/1054600" source="BUGZILLA"/>
		<reference ref_id="1055374" ref_url="https://bugzilla.suse.com/1055374" source="BUGZILLA"/>
		<reference ref_id="1055455" ref_url="https://bugzilla.suse.com/1055455" source="BUGZILLA"/>
		<reference ref_id="1055456" ref_url="https://bugzilla.suse.com/1055456" source="BUGZILLA"/>
		<reference ref_id="1057000" ref_url="https://bugzilla.suse.com/1057000" source="BUGZILLA"/>
		<reference ref_id="1060162" ref_url="https://bugzilla.suse.com/1060162" source="BUGZILLA"/>
		<reference ref_id="1062752" ref_url="https://bugzilla.suse.com/1062752" source="BUGZILLA"/>
		<reference ref_id="1072362" ref_url="https://bugzilla.suse.com/1072362" source="BUGZILLA"/>
		<reference ref_id="1074120" ref_url="https://bugzilla.suse.com/1074120" source="BUGZILLA"/>
		<reference ref_id="1074125" ref_url="https://bugzilla.suse.com/1074125" source="BUGZILLA"/>
		<reference ref_id="1074185" ref_url="https://bugzilla.suse.com/1074185" source="BUGZILLA"/>
		<reference ref_id="1074309" ref_url="https://bugzilla.suse.com/1074309" source="BUGZILLA"/>
		<reference ref_id="1075939" ref_url="https://bugzilla.suse.com/1075939" source="BUGZILLA"/>
		<reference ref_id="1076021" ref_url="https://bugzilla.suse.com/1076021" source="BUGZILLA"/>
		<reference ref_id="1076051" ref_url="https://bugzilla.suse.com/1076051" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10995" ref_url="https://www.suse.com/security/cve/CVE-2017-10995/" source="CVE"/>
		<reference ref_id="CVE-2017-11505" ref_url="https://www.suse.com/security/cve/CVE-2017-11505/" source="CVE"/>
		<reference ref_id="CVE-2017-11525" ref_url="https://www.suse.com/security/cve/CVE-2017-11525/" source="CVE"/>
		<reference ref_id="CVE-2017-11526" ref_url="https://www.suse.com/security/cve/CVE-2017-11526/" source="CVE"/>
		<reference ref_id="CVE-2017-11539" ref_url="https://www.suse.com/security/cve/CVE-2017-11539/" source="CVE"/>
		<reference ref_id="CVE-2017-11639" ref_url="https://www.suse.com/security/cve/CVE-2017-11639/" source="CVE"/>
		<reference ref_id="CVE-2017-11750" ref_url="https://www.suse.com/security/cve/CVE-2017-11750/" source="CVE"/>
		<reference ref_id="CVE-2017-12565" ref_url="https://www.suse.com/security/cve/CVE-2017-12565/" source="CVE"/>
		<reference ref_id="CVE-2017-12640" ref_url="https://www.suse.com/security/cve/CVE-2017-12640/" source="CVE"/>
		<reference ref_id="CVE-2017-12641" ref_url="https://www.suse.com/security/cve/CVE-2017-12641/" source="CVE"/>
		<reference ref_id="CVE-2017-12643" ref_url="https://www.suse.com/security/cve/CVE-2017-12643/" source="CVE"/>
		<reference ref_id="CVE-2017-12671" ref_url="https://www.suse.com/security/cve/CVE-2017-12671/" source="CVE"/>
		<reference ref_id="CVE-2017-12673" ref_url="https://www.suse.com/security/cve/CVE-2017-12673/" source="CVE"/>
		<reference ref_id="CVE-2017-12676" ref_url="https://www.suse.com/security/cve/CVE-2017-12676/" source="CVE"/>
		<reference ref_id="CVE-2017-12935" ref_url="https://www.suse.com/security/cve/CVE-2017-12935/" source="CVE"/>
		<reference ref_id="CVE-2017-13141" ref_url="https://www.suse.com/security/cve/CVE-2017-13141/" source="CVE"/>
		<reference ref_id="CVE-2017-13142" ref_url="https://www.suse.com/security/cve/CVE-2017-13142/" source="CVE"/>
		<reference ref_id="CVE-2017-13147" ref_url="https://www.suse.com/security/cve/CVE-2017-13147/" source="CVE"/>
		<reference ref_id="CVE-2017-14103" ref_url="https://www.suse.com/security/cve/CVE-2017-14103/" source="CVE"/>
		<reference ref_id="CVE-2017-14649" ref_url="https://www.suse.com/security/cve/CVE-2017-14649/" source="CVE"/>
		<reference ref_id="CVE-2017-15218" ref_url="https://www.suse.com/security/cve/CVE-2017-15218/" source="CVE"/>
		<reference ref_id="CVE-2017-17504" ref_url="https://www.suse.com/security/cve/CVE-2017-17504/" source="CVE"/>
		<reference ref_id="CVE-2017-17879" ref_url="https://www.suse.com/security/cve/CVE-2017-17879/" source="CVE"/>
		<reference ref_id="CVE-2017-17884" ref_url="https://www.suse.com/security/cve/CVE-2017-17884/" source="CVE"/>
		<reference ref_id="CVE-2017-17914" ref_url="https://www.suse.com/security/cve/CVE-2017-17914/" source="CVE"/>
		<reference ref_id="CVE-2017-18027" ref_url="https://www.suse.com/security/cve/CVE-2017-18027/" source="CVE"/>
		<reference ref_id="CVE-2017-18029" ref_url="https://www.suse.com/security/cve/CVE-2017-18029/" source="CVE"/>
		<reference ref_id="CVE-2017-9261" ref_url="https://www.suse.com/security/cve/CVE-2017-9261/" source="CVE"/>
		<reference ref_id="CVE-2017-9262" ref_url="https://www.suse.com/security/cve/CVE-2017-9262/" source="CVE"/>
		<reference ref_id="CVE-2018-5685" ref_url="https://www.suse.com/security/cve/CVE-2018-5685/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2018-5685: Prevent infinite loop and application hang in the ReadBMPImage
  function. Remote attackers could leverage this vulnerability to cause a denial
  of service via an image file with a crafted bit-field mask value (bsc#1075939)
- CVE-2017-11639: Prevent heap-based buffer over-read in the WriteCIPImage()
  function, related to the GetPixelLuma function in MagickCore/pixel-accessor.h
  (bsc#1050635).
- CVE-2017-11525: Prevent memory consumption in the ReadCINImage function that
  allowed remote attackers to cause a denial of service (bsc#1050098).
- CVE-2017-9262: The ReadJNGImage function in coders/png.c allowed attackers to
  cause a denial of service (memory leak) via a crafted file (bsc#1043353)
- CVE-2017-9261: The ReadMNGImage function in coders/png.c allowed
  attackers to cause a denial of service (memory leak) via a crafted file (bsc#1043354)
- CVE-2017-10995: The mng_get_long function in coders/png.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) via a crafted MNG image (bsc#1047908)
- CVE-2017-11539: Prevent memory leak in the ReadOnePNGImage() function in
  coders/png.c (bsc#1050037)
- CVE-2017-11505: The ReadOneJNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (large loop and CPU consumption) via
  a crafted file (bsc#1050072)
- CVE-2017-11526: The ReadOneMNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (large loop and CPU consumption) via a
  crafted file (bsc#1050100)
- CVE-2017-11750: The ReadOneJNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (NULL pointer dereference) via a crafted
  file (bsc#1051442)
- CVE-2017-12565: Prevent memory leak in the function ReadOneJNGImage in
  coders/png.c, which allowed attackers to cause a denial of service (bsc#1052470)
- CVE-2017-12676: Prevent memory leak in the function ReadOneJNGImage in
  coders/png.c, which allowed attackers to cause a denial of service (bsc#1052708)
- CVE-2017-12673: Prevent memory leak in the function ReadOneMNGImage in
  coders/png.c, which allowed attackers to cause a denial of service (bsc#1052717)
- CVE-2017-12671: Added NULL assignment in coders/png.c to prevent an invalid
  free in the function RelinquishMagickMemory in MagickCore/memory.c, which
  allowed attackers to cause a denial of service (bsc#1052721)
- CVE-2017-12643: Prevent a memory exhaustion vulnerability in ReadOneJNGImage
  in coders\png.c (bsc#1052768)
- CVE-2017-12641: Prevent a memory leak vulnerability in ReadOneJNGImage in
  coders\png.c (bsc#1052777)
- CVE-2017-12640: Prevent an out-of-bounds read vulnerability in
  ReadOneMNGImage in coders/png.c (bsc#1052781)
- CVE-2017-12935: The ReadMNGImage function in coders/png.c mishandled large
  MNG images, leading to an invalid memory read in the SetImageColorCallBack
  function in magick/image.c (bsc#1054600)
- CVE-2017-13147: Prevent allocation failure in the function ReadMNGImage in
  coders/png.c when a small MNG file has a MEND chunk with a large length value
  (bsc#1055374)
- CVE-2017-13142: Added additional checks for short files to prevent a crafted
  PNG file from triggering a crash (bsc#1055455)
- CVE-2017-13141: Prevent memory leak in ReadOnePNGImage in coders/png.c
  (bsc#1055456)
- CVE-2017-14103: The ReadJNGImage and ReadOneJNGImage functions in
  coders/png.c did not properly manage image pointers after certain error
  conditions, which allowed remote attackers to conduct use-after-free attacks
  via a crafted file, related to a ReadMNGImage out-of-order CloseBlob call
  (bsc#1057000)
- CVE-2017-14649: ReadOneJNGImage in coders/png.c did not properly validate JNG
  data, leading to a denial of service (assertion failure in
  magick/pixel_cache.c, and application crash) (bsc#1060162)
- CVE-2017-15218: Prevent memory leak in ReadOneJNGImage in coders/png.c
  (bsc#1062752)
- CVE-2017-17504: Prevent heap-based buffer over-read via a crafted file in
  Magick_png_read_raw_profile, related to ReadOneMNGImage (bsc#1072362)
- CVE-2017-17879: Prevent heap-based buffer over-read in ReadOneMNGImage in
  coders/png.c, related to length calculation and caused by an off-by-one error
  (bsc#1074125)
- CVE-2017-17914: Prevent crafted files to cause a large loop in
  ReadOneMNGImage (bsc#1074185)
- CVE-2017-17884: Prevent memory leak in the function WriteOnePNGImage in
  coders/png.c, which allowed attackers to cause a denial of service via a
  crafted PNG image file (bsc#1074120)
- Prevent memory leak in svg.c, which allowed attackers to cause a denial of
  service via a crafted SVG image file (bsc#1074120)
- Prevent small memory leak when processing PWP image files (bsc#1074309)
- CVE-2017-18029: Prevent memory leak in the function ReadMATImage which allowed
  remote attackers to cause a denial of service via a crafted file (bsc#1076021)
- CVE-2017-18027: Prevent memory leak vulnerability in the function
  ReadMATImage which allowed remote attackers to cause a denial of service via a
  crafted file (bsc#1076051)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-02"/>
	<updated date="2018-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043353">SUSE bug 1043353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043354">SUSE bug 1043354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047908">SUSE bug 1047908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050037">SUSE bug 1050037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050072">SUSE bug 1050072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050098">SUSE bug 1050098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050100">SUSE bug 1050100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050635">SUSE bug 1050635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051442">SUSE bug 1051442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052470">SUSE bug 1052470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052708">SUSE bug 1052708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052717">SUSE bug 1052717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052721">SUSE bug 1052721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052768">SUSE bug 1052768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052777">SUSE bug 1052777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052781">SUSE bug 1052781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055374">SUSE bug 1055374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055455">SUSE bug 1055455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055456">SUSE bug 1055456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057000">SUSE bug 1057000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060162">SUSE bug 1060162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062752">SUSE bug 1062752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072362">SUSE bug 1072362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074120">SUSE bug 1074120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074125">SUSE bug 1074125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074185">SUSE bug 1074185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074309">SUSE bug 1074309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075939">SUSE bug 1075939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076021">SUSE bug 1076021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076051">SUSE bug 1076051</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10995/">CVE-2017-10995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10995">CVE-2017-10995 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11505/">CVE-2017-11505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11505">CVE-2017-11505 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11525/">CVE-2017-11525 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11525">CVE-2017-11525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11526/">CVE-2017-11526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11526">CVE-2017-11526 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11539/">CVE-2017-11539 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11539">CVE-2017-11539 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11639/">CVE-2017-11639 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11639">CVE-2017-11639 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11750/">CVE-2017-11750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11750">CVE-2017-11750 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12565/">CVE-2017-12565 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12565">CVE-2017-12565 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12640/">CVE-2017-12640 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12640">CVE-2017-12640 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12641/">CVE-2017-12641 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12641">CVE-2017-12641 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12643/">CVE-2017-12643 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12643">CVE-2017-12643 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12671/">CVE-2017-12671 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12671">CVE-2017-12671 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12673/">CVE-2017-12673 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12673">CVE-2017-12673 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12676/">CVE-2017-12676 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12676">CVE-2017-12676 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12935/">CVE-2017-12935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12935">CVE-2017-12935 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13141/">CVE-2017-13141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13141">CVE-2017-13141 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13142/">CVE-2017-13142 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13142">CVE-2017-13142 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13147/">CVE-2017-13147 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13147">CVE-2017-13147 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14103/">CVE-2017-14103 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14103">CVE-2017-14103 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14649/">CVE-2017-14649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14649">CVE-2017-14649 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15218/">CVE-2017-15218 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15218">CVE-2017-15218 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17504/">CVE-2017-17504 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17504">CVE-2017-17504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17879/">CVE-2017-17879 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17879">CVE-2017-17879 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17884/">CVE-2017-17884 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17884">CVE-2017-17884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17914/">CVE-2017-17914 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17914">CVE-2017-17914 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18027/">CVE-2017-18027 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18027">CVE-2017-18027 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18029/">CVE-2017-18029 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18029">CVE-2017-18029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9261/">CVE-2017-9261 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9261">CVE-2017-9261 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9262/">CVE-2017-9262 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9262">CVE-2017-9262 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5685/">CVE-2018-5685 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5685">CVE-2018-5685 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581855" comment="libMagickCore1-6.4.3.6-7.78.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581856" comment="libMagickCore1-32bit-6.4.3.6-7.78.29.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581855" comment="libMagickCore1-6.4.3.6-7.78.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581856" comment="libMagickCore1-32bit-6.4.3.6-7.78.29.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219710" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1042824" ref_url="https://bugzilla.suse.com/1042824" source="BUGZILLA"/>
		<reference ref_id="1048110" ref_url="https://bugzilla.suse.com/1048110" source="BUGZILLA"/>
		<reference ref_id="1049374" ref_url="https://bugzilla.suse.com/1049374" source="BUGZILLA"/>
		<reference ref_id="1049375" ref_url="https://bugzilla.suse.com/1049375" source="BUGZILLA"/>
		<reference ref_id="1050048" ref_url="https://bugzilla.suse.com/1050048" source="BUGZILLA"/>
		<reference ref_id="1050617" ref_url="https://bugzilla.suse.com/1050617" source="BUGZILLA"/>
		<reference ref_id="1050669" ref_url="https://bugzilla.suse.com/1050669" source="BUGZILLA"/>
		<reference ref_id="1052207" ref_url="https://bugzilla.suse.com/1052207" source="BUGZILLA"/>
		<reference ref_id="1052248" ref_url="https://bugzilla.suse.com/1052248" source="BUGZILLA"/>
		<reference ref_id="1052251" ref_url="https://bugzilla.suse.com/1052251" source="BUGZILLA"/>
		<reference ref_id="1052254" ref_url="https://bugzilla.suse.com/1052254" source="BUGZILLA"/>
		<reference ref_id="1052472" ref_url="https://bugzilla.suse.com/1052472" source="BUGZILLA"/>
		<reference ref_id="1052688" ref_url="https://bugzilla.suse.com/1052688" source="BUGZILLA"/>
		<reference ref_id="1052711" ref_url="https://bugzilla.suse.com/1052711" source="BUGZILLA"/>
		<reference ref_id="1052747" ref_url="https://bugzilla.suse.com/1052747" source="BUGZILLA"/>
		<reference ref_id="1052750" ref_url="https://bugzilla.suse.com/1052750" source="BUGZILLA"/>
		<reference ref_id="1052761" ref_url="https://bugzilla.suse.com/1052761" source="BUGZILLA"/>
		<reference ref_id="1055069" ref_url="https://bugzilla.suse.com/1055069" source="BUGZILLA"/>
		<reference ref_id="1055229" ref_url="https://bugzilla.suse.com/1055229" source="BUGZILLA"/>
		<reference ref_id="1058009" ref_url="https://bugzilla.suse.com/1058009" source="BUGZILLA"/>
		<reference ref_id="1074119" ref_url="https://bugzilla.suse.com/1074119" source="BUGZILLA"/>
		<reference ref_id="1076182" ref_url="https://bugzilla.suse.com/1076182" source="BUGZILLA"/>
		<reference ref_id="1078433" ref_url="https://bugzilla.suse.com/1078433" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11166" ref_url="https://www.suse.com/security/cve/CVE-2017-11166/" source="CVE"/>
		<reference ref_id="CVE-2017-11448" ref_url="https://www.suse.com/security/cve/CVE-2017-11448/" source="CVE"/>
		<reference ref_id="CVE-2017-11450" ref_url="https://www.suse.com/security/cve/CVE-2017-11450/" source="CVE"/>
		<reference ref_id="CVE-2017-11537" ref_url="https://www.suse.com/security/cve/CVE-2017-11537/" source="CVE"/>
		<reference ref_id="CVE-2017-11637" ref_url="https://www.suse.com/security/cve/CVE-2017-11637/" source="CVE"/>
		<reference ref_id="CVE-2017-11638" ref_url="https://www.suse.com/security/cve/CVE-2017-11638/" source="CVE"/>
		<reference ref_id="CVE-2017-11642" ref_url="https://www.suse.com/security/cve/CVE-2017-11642/" source="CVE"/>
		<reference ref_id="CVE-2017-12418" ref_url="https://www.suse.com/security/cve/CVE-2017-12418/" source="CVE"/>
		<reference ref_id="CVE-2017-12427" ref_url="https://www.suse.com/security/cve/CVE-2017-12427/" source="CVE"/>
		<reference ref_id="CVE-2017-12429" ref_url="https://www.suse.com/security/cve/CVE-2017-12429/" source="CVE"/>
		<reference ref_id="CVE-2017-12432" ref_url="https://www.suse.com/security/cve/CVE-2017-12432/" source="CVE"/>
		<reference ref_id="CVE-2017-12566" ref_url="https://www.suse.com/security/cve/CVE-2017-12566/" source="CVE"/>
		<reference ref_id="CVE-2017-12654" ref_url="https://www.suse.com/security/cve/CVE-2017-12654/" source="CVE"/>
		<reference ref_id="CVE-2017-12664" ref_url="https://www.suse.com/security/cve/CVE-2017-12664/" source="CVE"/>
		<reference ref_id="CVE-2017-12665" ref_url="https://www.suse.com/security/cve/CVE-2017-12665/" source="CVE"/>
		<reference ref_id="CVE-2017-12668" ref_url="https://www.suse.com/security/cve/CVE-2017-12668/" source="CVE"/>
		<reference ref_id="CVE-2017-12674" ref_url="https://www.suse.com/security/cve/CVE-2017-12674/" source="CVE"/>
		<reference ref_id="CVE-2017-13058" ref_url="https://www.suse.com/security/cve/CVE-2017-13058/" source="CVE"/>
		<reference ref_id="CVE-2017-13131" ref_url="https://www.suse.com/security/cve/CVE-2017-13131/" source="CVE"/>
		<reference ref_id="CVE-2017-14224" ref_url="https://www.suse.com/security/cve/CVE-2017-14224/" source="CVE"/>
		<reference ref_id="CVE-2017-17885" ref_url="https://www.suse.com/security/cve/CVE-2017-17885/" source="CVE"/>
		<reference ref_id="CVE-2017-18028" ref_url="https://www.suse.com/security/cve/CVE-2017-18028/" source="CVE"/>
		<reference ref_id="CVE-2017-9407" ref_url="https://www.suse.com/security/cve/CVE-2017-9407/" source="CVE"/>
		<reference ref_id="CVE-2018-6405" ref_url="https://www.suse.com/security/cve/CVE-2018-6405/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2017-9407: In ImageMagick, the ReadPALMImage function in palm.c allowed attackers to cause a denial of service (memory leak) via a crafted file.  (bsc#1042824)
- CVE-2017-11448: The ReadJPEGImage function in coders/jpeg.c in ImageMagick allowed remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file.  (bsc#1049375)
- CVE-2017-11450: A remote denial of service in coders/jpeg.c was fixed (bsc#1049374)
- CVE-2017-11537: When ImageMagick processed a crafted file in convert, it can lead to a Floating Point Exception (FPE) in the WritePALMImage() function in coders/palm.c, related to an incorrect bits-per-pixel calculation.  (bsc#1050048)
- CVE-2017-12418: ImageMagick had memory leaks in the parse8BIMW and format8BIM functions in coders/meta.c, related to the WriteImage function in MagickCore/constitute.c.  (bsc#1052207)
- CVE-2017-12432: In ImageMagick, a memory exhaustion vulnerability was found in the function ReadPCXImage in coders/pcx.c, which allowed attackers to cause a denial of service.  (bsc#1052254)
- CVE-2017-12654: The ReadPICTImage function in coders/pict.c in ImageMagick allowed attackers to cause a denial of service (memory leak) via a crafted file.  (bsc#1052761)
- CVE-2017-12664: ImageMagick had a memory leak vulnerability in WritePALMImage in coders/palm.c.  (bsc#1052750)
- CVE-2017-12665: ImageMagick had a memory leak vulnerability in WritePICTImage in coders/pict.c.  (bsc#1052747)
- CVE-2017-12668: ImageMagick had a memory leak vulnerability in WritePCXImage in coders/pcx.c. (bsc#1052688)
- CVE-2017-13058: In ImageMagick, a memory leak vulnerability was found in the function WritePCXImage in coders/pcx.c, which allowed attackers to cause a denial of service via a crafted file.  (bsc#1055069)
- CVE-2017-14224: A heap-based buffer overflow in WritePCXImage in coders/pcx.c  could lead to  denial of service or code execution. (bsc#1058009)
- CVE-2017-17885: In ImageMagick, a memory leak vulnerability was found in the function ReadPICTImage in coders/pict.c, which allowed attackers to cause a denial of service via a crafted PICT image file. (bsc#1074119)
- CVE-2017-18028: A memory exhaustion in the function ReadTIFFImage in coders/tiff.c was fixed. (bsc#1076182)
- CVE-2018-6405: In the ReadDCMImage function in coders/dcm.c in ImageMagick, each redmap, greenmap, and bluemap variable can be overwritten by a new pointer. The previous pointer is lost, which leads to a memory leak. This allowed remote attackers to cause a denial of service. (bsc#1078433)
- CVE-2017-12427: ProcessMSLScript coders/msl.c allowed remote attackers to cause a DoS (bsc#1052248)
- CVE-2017-12566: A memory leak in ReadMVGImage in coders/mvg.c, could have allowed attackers to cause DoS (bsc#1052472)
- CVE-2017-11638, CVE-2017-11642: A NULL pointer dereference in theWriteMAPImage() in coders/map.c was fixed which could lead to a crash (bsc#1050617)
- CVE-2017-13131: A memory leak vulnerability was found in thefunction ReadMIFFImage in coders/miff.c, which allowed attackers tocause a denial of service (memory consumption in NewL (bsc#1055229)
- CVE-2017-11166: In ReadXWDImage in coders\xwd.c a memoryleak could have caused memory exhaustion via a crafted length (bsc#1048110)
- CVE-2017-12674: A CPU exhaustion in ReadPDBImage in coders/pdb.c was fixed, which allowed attackers to cause DoS (bsc#1052711)
- CVE-2017-12429: A memory exhaustion flaw in ReadMIFFImage in coders/miff.c was fixed, which allowed attackers to cause DoS (bsc#1052251)
- CVE-2017-11637: A NULL pointer dereference in WritePCLImage() in coders/pcl.c was fixed which could lead to a crash (bsc#1050669)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-20"/>
	<updated date="2018-02-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042824">SUSE bug 1042824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048110">SUSE bug 1048110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049374">SUSE bug 1049374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049375">SUSE bug 1049375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050048">SUSE bug 1050048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050617">SUSE bug 1050617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050669">SUSE bug 1050669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052207">SUSE bug 1052207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052248">SUSE bug 1052248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052251">SUSE bug 1052251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052254">SUSE bug 1052254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052472">SUSE bug 1052472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052688">SUSE bug 1052688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052711">SUSE bug 1052711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052747">SUSE bug 1052747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052750">SUSE bug 1052750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052761">SUSE bug 1052761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055069">SUSE bug 1055069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055229">SUSE bug 1055229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058009">SUSE bug 1058009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074119">SUSE bug 1074119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076182">SUSE bug 1076182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078433">SUSE bug 1078433</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11166/">CVE-2017-11166 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11166">CVE-2017-11166 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-11448/">CVE-2017-11448 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11448">CVE-2017-11448 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11450/">CVE-2017-11450 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11450">CVE-2017-11450 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11537/">CVE-2017-11537 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11537">CVE-2017-11537 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11637/">CVE-2017-11637 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11637">CVE-2017-11637 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11638/">CVE-2017-11638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11638">CVE-2017-11638 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11642/">CVE-2017-11642 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11642">CVE-2017-11642 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12418/">CVE-2017-12418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12418">CVE-2017-12418 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12427/">CVE-2017-12427 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12427">CVE-2017-12427 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12429/">CVE-2017-12429 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12429">CVE-2017-12429 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12432/">CVE-2017-12432 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12432">CVE-2017-12432 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12566/">CVE-2017-12566 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12566">CVE-2017-12566 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12654/">CVE-2017-12654 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12654">CVE-2017-12654 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12664/">CVE-2017-12664 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12664">CVE-2017-12664 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12665/">CVE-2017-12665 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12665">CVE-2017-12665 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12668/">CVE-2017-12668 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12668">CVE-2017-12668 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12674/">CVE-2017-12674 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12674">CVE-2017-12674 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13058/">CVE-2017-13058 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13058">CVE-2017-13058 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13131/">CVE-2017-13131 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13131">CVE-2017-13131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14224/">CVE-2017-14224 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14224">CVE-2017-14224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17885/">CVE-2017-17885 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17885">CVE-2017-17885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-18028/">CVE-2017-18028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18028">CVE-2017-18028 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9407/">CVE-2017-9407 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9407">CVE-2017-9407 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6405/">CVE-2018-6405 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6405">CVE-2018-6405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581857" comment="libMagickCore1-6.4.3.6-7.78.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581858" comment="libMagickCore1-32bit-6.4.3.6-7.78.34.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581857" comment="libMagickCore1-6.4.3.6-7.78.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581858" comment="libMagickCore1-32bit-6.4.3.6-7.78.34.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219711" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1042911" ref_url="https://bugzilla.suse.com/1042911" source="BUGZILLA"/>
		<reference ref_id="1050119" ref_url="https://bugzilla.suse.com/1050119" source="BUGZILLA"/>
		<reference ref_id="1050122" ref_url="https://bugzilla.suse.com/1050122" source="BUGZILLA"/>
		<reference ref_id="1050132" ref_url="https://bugzilla.suse.com/1050132" source="BUGZILLA"/>
		<reference ref_id="1052754" ref_url="https://bugzilla.suse.com/1052754" source="BUGZILLA"/>
		<reference ref_id="1072898" ref_url="https://bugzilla.suse.com/1072898" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11528" ref_url="https://www.suse.com/security/cve/CVE-2017-11528/" source="CVE"/>
		<reference ref_id="CVE-2017-11530" ref_url="https://www.suse.com/security/cve/CVE-2017-11530/" source="CVE"/>
		<reference ref_id="CVE-2017-11533" ref_url="https://www.suse.com/security/cve/CVE-2017-11533/" source="CVE"/>
		<reference ref_id="CVE-2017-12663" ref_url="https://www.suse.com/security/cve/CVE-2017-12663/" source="CVE"/>
		<reference ref_id="CVE-2017-17682" ref_url="https://www.suse.com/security/cve/CVE-2017-17682/" source="CVE"/>
		<reference ref_id="CVE-2017-9405" ref_url="https://www.suse.com/security/cve/CVE-2017-9405/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0770-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180770-1.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2017-9405: A memory leak in the ReadICONImage function was fixed that could lead to DoS via memory exhaustion (bsc#1042911)
- CVE-2017-11528: ReadDIBImage in coders/dib.c allows remote attackers to cause DoS via memory exhaustion (bsc#1050119)
- CVE-2017-11530: ReadEPTImage in coders/ept.c allows remote attackers to cause DoS via memory exhaustion (bsc#1050122)
- CVE-2017-11533: A information leak by 1 byte due to heap-based buffer over-read in the WriteUILImage() in coders/uil.c was fixed (bsc#1050132)
- CVE-2017-12663: A memory leak in WriteMAPImage in coders/map.c was fixed that could lead to a DoS via memory exhaustion (bsc#1052754)
- CVE-2017-17682: A large loop vulnerability was fixed in ExtractPostscript in coders/wpg.c, which allowed attackers to cause a denial of service (CPU exhaustion) (bsc#1072898)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-22"/>
	<updated date="2018-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042911">SUSE bug 1042911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050119">SUSE bug 1050119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050122">SUSE bug 1050122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050132">SUSE bug 1050132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052754">SUSE bug 1052754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072898">SUSE bug 1072898</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11528/">CVE-2017-11528 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11528">CVE-2017-11528 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11530/">CVE-2017-11530 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11530">CVE-2017-11530 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11533/">CVE-2017-11533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11533">CVE-2017-11533 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12663/">CVE-2017-12663 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12663">CVE-2017-12663 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17682/">CVE-2017-17682 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17682">CVE-2017-17682 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9405/">CVE-2017-9405 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9405">CVE-2017-9405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581859" comment="libMagickCore1-6.4.3.6-7.78.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581860" comment="libMagickCore1-32bit-6.4.3.6-7.78.37.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581859" comment="libMagickCore1-6.4.3.6-7.78.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581860" comment="libMagickCore1-32bit-6.4.3.6-7.78.37.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219712" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1043290" ref_url="https://bugzilla.suse.com/1043290" source="BUGZILLA"/>
		<reference ref_id="1050087" ref_url="https://bugzilla.suse.com/1050087" source="BUGZILLA"/>
		<reference ref_id="1056434" ref_url="https://bugzilla.suse.com/1056434" source="BUGZILLA"/>
		<reference ref_id="1058630" ref_url="https://bugzilla.suse.com/1058630" source="BUGZILLA"/>
		<reference ref_id="1059735" ref_url="https://bugzilla.suse.com/1059735" source="BUGZILLA"/>
		<reference ref_id="1066168" ref_url="https://bugzilla.suse.com/1066168" source="BUGZILLA"/>
		<reference ref_id="1066170" ref_url="https://bugzilla.suse.com/1066170" source="BUGZILLA"/>
		<reference ref_id="1082283" ref_url="https://bugzilla.suse.com/1082283" source="BUGZILLA"/>
		<reference ref_id="1082291" ref_url="https://bugzilla.suse.com/1082291" source="BUGZILLA"/>
		<reference ref_id="1082348" ref_url="https://bugzilla.suse.com/1082348" source="BUGZILLA"/>
		<reference ref_id="1082362" ref_url="https://bugzilla.suse.com/1082362" source="BUGZILLA"/>
		<reference ref_id="1082792" ref_url="https://bugzilla.suse.com/1082792" source="BUGZILLA"/>
		<reference ref_id="1084060" ref_url="https://bugzilla.suse.com/1084060" source="BUGZILLA"/>
		<reference ref_id="1086011" ref_url="https://bugzilla.suse.com/1086011" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11524" ref_url="https://www.suse.com/security/cve/CVE-2017-11524/" source="CVE"/>
		<reference ref_id="CVE-2017-12691" ref_url="https://www.suse.com/security/cve/CVE-2017-12691/" source="CVE"/>
		<reference ref_id="CVE-2017-12692" ref_url="https://www.suse.com/security/cve/CVE-2017-12692/" source="CVE"/>
		<reference ref_id="CVE-2017-12693" ref_url="https://www.suse.com/security/cve/CVE-2017-12693/" source="CVE"/>
		<reference ref_id="CVE-2017-13768" ref_url="https://www.suse.com/security/cve/CVE-2017-13768/" source="CVE"/>
		<reference ref_id="CVE-2017-14314" ref_url="https://www.suse.com/security/cve/CVE-2017-14314/" source="CVE"/>
		<reference ref_id="CVE-2017-14343" ref_url="https://www.suse.com/security/cve/CVE-2017-14343/" source="CVE"/>
		<reference ref_id="CVE-2017-14505" ref_url="https://www.suse.com/security/cve/CVE-2017-14505/" source="CVE"/>
		<reference ref_id="CVE-2017-15016" ref_url="https://www.suse.com/security/cve/CVE-2017-15016/" source="CVE"/>
		<reference ref_id="CVE-2017-15017" ref_url="https://www.suse.com/security/cve/CVE-2017-15017/" source="CVE"/>
		<reference ref_id="CVE-2017-16352" ref_url="https://www.suse.com/security/cve/CVE-2017-16352/" source="CVE"/>
		<reference ref_id="CVE-2017-16353" ref_url="https://www.suse.com/security/cve/CVE-2017-16353/" source="CVE"/>
		<reference ref_id="CVE-2017-18219" ref_url="https://www.suse.com/security/cve/CVE-2017-18219/" source="CVE"/>
		<reference ref_id="CVE-2017-9500" ref_url="https://www.suse.com/security/cve/CVE-2017-9500/" source="CVE"/>
		<reference ref_id="CVE-2018-7443" ref_url="https://www.suse.com/security/cve/CVE-2018-7443/" source="CVE"/>
		<reference ref_id="CVE-2018-8804" ref_url="https://www.suse.com/security/cve/CVE-2018-8804/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2018-8804: The WriteEPTImage function allowed remote attackers to cause a
  denial of service (double free and application crash) or possibly have
  unspecified other impact via a crafted file (bsc#1086011)
- CVE-2017-11524: The WriteBlob function allowed remote attackers to cause a
  denial of service (assertion failure and application exit) via a crafted file
  (bsc#1050087)
- CVE-2017-18219: Prevent allocation failure in the function ReadOnePNGImage,
  which allowed attackers to cause a denial of service via a crafted file that
  triggers an attempt at a large png_pixels array allocation (bsc#1084060).
- CVE-2017-9500: Prevent assertion failure in the function
  ResetImageProfileIterator, which allowed attackers to cause a denial of service
  via a crafted file (bsc#1043290)
- CVE-2017-16353: Prevent memory information disclosure in the DescribeImage
  function caused by a heap-based buffer over-read. The portion of the code
  containing the vulnerability is responsible for printing the IPTC Profile
  information contained in the image. This vulnerability can be triggered with a
  specially crafted MIFF file. There is an out-of-bounds buffer dereference
  because certain increments were never checked (bsc#1066170)
- CVE-2017-16352: Prevent a heap-based buffer overflow in the 'Display visual
  image directory' feature of the DescribeImage() function. One possible way to
  trigger the vulnerability is to run the identify command on a specially crafted
  MIFF format file with the verbose flag (bsc#1066168)
- CVE-2017-14314: Prevent off-by-one error in the DrawImage function that
  allowed remote attackers to cause a denial of service (DrawDashPolygon
  heap-based buffer over-read and application crash) via a crafted file
  (bsc#1058630)
- CVE-2017-13768: Prevent NULL pointer dereference in the IdentifyImage
  function that allowed an attacker to perform denial of service by sending a
  crafted image file (bsc#1056434)
- CVE-2017-14505: Fixed handling of NULL arrays, which allowed attackers to
  perform Denial of Service (NULL pointer dereference and application crash in
  AcquireQuantumMemory within MagickCore/memory.c) by providing a crafted Image
  File as input (bsc#1059735)
- CVE-2018-7443: The ReadTIFFImage function did not properly validate the
  amount of image data in a file, which allowed remote attackers to cause a
  denial of service (memory allocation failure in the AcquireMagickMemory
  function in MagickCore/memory.c) (bsc#1082792)
- CVE-2017-15016: Prevent NULL pointer dereference vulnerability in
  ReadEnhMetaFile allowing for denial of service (bsc#1082291)
- CVE-2017-15017: Prevent NULL pointer dereference vulnerability in
  ReadOneMNGImage allowing for denial of service (bsc#1082283)
- CVE-2017-12692: The ReadVIFFImage function allowed remote attackers to cause
  a denial of service (memory consumption) via a crafted VIFF file (bsc#1082362)
- CVE-2017-12693: The ReadBMPImage function allowed remote attackers to cause a
  denial of service (memory consumption) via a crafted BMP file (bsc#1082348)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-05"/>
	<updated date="2018-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043290">SUSE bug 1043290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050087">SUSE bug 1050087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056434">SUSE bug 1056434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058630">SUSE bug 1058630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059735">SUSE bug 1059735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066168">SUSE bug 1066168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066170">SUSE bug 1066170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082283">SUSE bug 1082283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082291">SUSE bug 1082291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082348">SUSE bug 1082348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082362">SUSE bug 1082362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082792">SUSE bug 1082792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084060">SUSE bug 1084060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086011">SUSE bug 1086011</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11524/">CVE-2017-11524 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11524">CVE-2017-11524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12691/">CVE-2017-12691 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12691">CVE-2017-12691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12692/">CVE-2017-12692 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12692">CVE-2017-12692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12693/">CVE-2017-12693 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12693">CVE-2017-12693 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13768/">CVE-2017-13768 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13768">CVE-2017-13768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14314/">CVE-2017-14314 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14314">CVE-2017-14314 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14343/">CVE-2017-14343 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14343">CVE-2017-14343 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14505/">CVE-2017-14505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14505">CVE-2017-14505 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15016/">CVE-2017-15016 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15016">CVE-2017-15016 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15017/">CVE-2017-15017 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15017">CVE-2017-15017 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-16352/">CVE-2017-16352 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16352">CVE-2017-16352 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16353/">CVE-2017-16353 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16353">CVE-2017-16353 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18219/">CVE-2017-18219 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18219">CVE-2017-18219 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9500/">CVE-2017-9500 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9500">CVE-2017-9500 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7443/">CVE-2018-7443 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7443">CVE-2018-7443 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8804/">CVE-2018-8804 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8804">CVE-2018-8804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581861" comment="libMagickCore1-6.4.3.6-78.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581862" comment="libMagickCore1-32bit-6.4.3.6-78.40.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581861" comment="libMagickCore1-6.4.3.6-78.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581862" comment="libMagickCore1-32bit-6.4.3.6-78.40.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219713" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1047356" ref_url="https://bugzilla.suse.com/1047356" source="BUGZILLA"/>
		<reference ref_id="1086773" ref_url="https://bugzilla.suse.com/1086773" source="BUGZILLA"/>
		<reference ref_id="1086782" ref_url="https://bugzilla.suse.com/1086782" source="BUGZILLA"/>
		<reference ref_id="1087027" ref_url="https://bugzilla.suse.com/1087027" source="BUGZILLA"/>
		<reference ref_id="1087033" ref_url="https://bugzilla.suse.com/1087033" source="BUGZILLA"/>
		<reference ref_id="1087037" ref_url="https://bugzilla.suse.com/1087037" source="BUGZILLA"/>
		<reference ref_id="1089781" ref_url="https://bugzilla.suse.com/1089781" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000476" ref_url="https://www.suse.com/security/cve/CVE-2017-1000476/" source="CVE"/>
		<reference ref_id="CVE-2017-10928" ref_url="https://www.suse.com/security/cve/CVE-2017-10928/" source="CVE"/>
		<reference ref_id="CVE-2017-18251" ref_url="https://www.suse.com/security/cve/CVE-2017-18251/" source="CVE"/>
		<reference ref_id="CVE-2017-18252" ref_url="https://www.suse.com/security/cve/CVE-2017-18252/" source="CVE"/>
		<reference ref_id="CVE-2017-18254" ref_url="https://www.suse.com/security/cve/CVE-2017-18254/" source="CVE"/>
		<reference ref_id="CVE-2018-10177" ref_url="https://www.suse.com/security/cve/CVE-2018-10177/" source="CVE"/>
		<reference ref_id="CVE-2018-8960" ref_url="https://www.suse.com/security/cve/CVE-2018-8960/" source="CVE"/>
		<reference ref_id="CVE-2018-9018" ref_url="https://www.suse.com/security/cve/CVE-2018-9018/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003971.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:


- security update (png.c)
  * CVE-2018-9018: divide-by-zero in the ReadMNGImage function of coders/png.c. 
    Attackers could leverage this vulnerability to cause a crash and denial of service 
    via a crafted mng file. [bsc#1086773]
  * CVE-2018-10177: there is an infinite loop in the ReadOneMNGImagefunction of the coders/png.c file. Remote attackers could leverage thisvulnerability to cause a denial of service (bsc#1089781)

- security update (wand)
  * CVE-2017-18252: The MogrifyImageList function in MagickWand/mogrify.c could allow 
    attackers to cause a denial of service via a crafted file. [bsc#1087033]

- security update (gif.c)
  * CVE-2017-18254: A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, 
    which could lead to  denial of service via a crafted file. [bsc#1087027]

- security update (core)
  * CVE-2017-10928: a heap-based buffer over-read in the GetNextToken function in token.c 
    could allow attackers to obtain sensitive information from process memory or possibly have 
    unspecified other impact via a crafted SVG document that is mishandled in the 
    GetUserSpaceCoordinateValue function in coders/svg.c. [bsc#1047356]

- security update (pcd.c)
  * CVE-2017-18251: A memory leak vulnerability was found in the function ReadPCDImage in coders/pcd.c, 
    which could lead to a denial of service via a crafted file. [bsc#1087037]

- security update (gif.c)
  * CVE-2017-18254: A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, which could lead to denial of service via a crafted file. [bsc#1087027]

- security update (tiff.c)
  * CVE-2018-8960: The ReadTIFFImage function in coders/tiff.c in ImageMagick memory allocation issue could lead to denial of service (bsc#1086782)



		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-02"/>
	<updated date="2018-05-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047356">SUSE bug 1047356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086773">SUSE bug 1086773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086782">SUSE bug 1086782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087027">SUSE bug 1087027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087033">SUSE bug 1087033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087037">SUSE bug 1087037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089781">SUSE bug 1089781</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000476/">CVE-2017-1000476 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000476">CVE-2017-1000476 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10928/">CVE-2017-10928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10928">CVE-2017-10928 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18251/">CVE-2017-18251 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18251">CVE-2017-18251 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18252/">CVE-2017-18252 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18252">CVE-2017-18252 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18254/">CVE-2017-18254 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18254">CVE-2017-18254 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10177/">CVE-2018-10177 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10177">CVE-2018-10177 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8960/">CVE-2018-8960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8960">CVE-2018-8960 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9018/">CVE-2018-9018 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9018">CVE-2018-9018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581863" comment="libMagickCore1-6.4.3.6-78.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581864" comment="libMagickCore1-32bit-6.4.3.6-78.45.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581863" comment="libMagickCore1-6.4.3.6-78.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581864" comment="libMagickCore1-32bit-6.4.3.6-78.45.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219714" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1056277" ref_url="https://bugzilla.suse.com/1056277" source="BUGZILLA"/>
		<reference ref_id="1094204" ref_url="https://bugzilla.suse.com/1094204" source="BUGZILLA"/>
		<reference ref_id="1094237" ref_url="https://bugzilla.suse.com/1094237" source="BUGZILLA"/>
		<reference ref_id="1095812" ref_url="https://bugzilla.suse.com/1095812" source="BUGZILLA"/>
		<reference ref_id="1098545" ref_url="https://bugzilla.suse.com/1098545" source="BUGZILLA"/>
		<reference ref_id="1098546" ref_url="https://bugzilla.suse.com/1098546" source="BUGZILLA"/>
		<reference ref_id="1102003" ref_url="https://bugzilla.suse.com/1102003" source="BUGZILLA"/>
		<reference ref_id="1102004" ref_url="https://bugzilla.suse.com/1102004" source="BUGZILLA"/>
		<reference ref_id="1102005" ref_url="https://bugzilla.suse.com/1102005" source="BUGZILLA"/>
		<reference ref_id="1102007" ref_url="https://bugzilla.suse.com/1102007" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13758" ref_url="https://www.suse.com/security/cve/CVE-2017-13758/" source="CVE"/>
		<reference ref_id="CVE-2017-18271" ref_url="https://www.suse.com/security/cve/CVE-2017-18271/" source="CVE"/>
		<reference ref_id="CVE-2018-10805" ref_url="https://www.suse.com/security/cve/CVE-2018-10805/" source="CVE"/>
		<reference ref_id="CVE-2018-11251" ref_url="https://www.suse.com/security/cve/CVE-2018-11251/" source="CVE"/>
		<reference ref_id="CVE-2018-12599" ref_url="https://www.suse.com/security/cve/CVE-2018-12599/" source="CVE"/>
		<reference ref_id="CVE-2018-12600" ref_url="https://www.suse.com/security/cve/CVE-2018-12600/" source="CVE"/>
		<reference ref_id="CVE-2018-14434" ref_url="https://www.suse.com/security/cve/CVE-2018-14434/" source="CVE"/>
		<reference ref_id="CVE-2018-14435" ref_url="https://www.suse.com/security/cve/CVE-2018-14435/" source="CVE"/>
		<reference ref_id="CVE-2018-14436" ref_url="https://www.suse.com/security/cve/CVE-2018-14436/" source="CVE"/>
		<reference ref_id="CVE-2018-14437" ref_url="https://www.suse.com/security/cve/CVE-2018-14437/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004481.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2018-11251: Heap-based buffer over-read in ReadSUNImage in coders/sun.c,
  which allows attackers to cause denial of service (bsc#1094237)
- CVE-2017-18271: Infinite loop in the function ReadMIFFImage in coders/miff.c,
  which allows attackers to cause a denial of service (bsc#1094204)
- CVE-2017-13758: Heap-based buffer overflow in the TracePoint() in
  MagickCore/draw.c, which allows attackers to cause a denial of
  service(bsc#1056277)
- CVE-2018-10805: Fixed several memory leaks in rgb.c, cmyk.c, gray.c, and
  ycbcr.c (bsc#1095812)
- CVE-2018-12600: The ReadDIBImage and WriteDIBImage functions allowed
  attackers to cause an out of bounds write via a crafted file (bsc#1098545)
- CVE-2018-12599: The ReadBMPImage and WriteBMPImage fucntions allowed
  attackers to cause an out of bounds write via a crafted file (bsc#1098546)
- CVE-2018-14434: Fixed a memory leak for a colormap in WriteMPCImage in coders/mpc.c (bsc#1102003)
- CVE-2018-14435: Fixed a memory leak in DecodeImage in coders/pcd.c (bsc#1102007) 
- CVE-2018-14436: Fixed a memory leak in ReadMIFFImage in coders/miff.c (bsc#1102005)
- CVE-2018-14437: Fixed a memory leak in parse8BIM in coders/meta.c (bsc#1102004)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-21"/>
	<updated date="2018-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056277">SUSE bug 1056277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094204">SUSE bug 1094204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094237">SUSE bug 1094237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095812">SUSE bug 1095812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098545">SUSE bug 1098545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098546">SUSE bug 1098546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102003">SUSE bug 1102003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102004">SUSE bug 1102004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102005">SUSE bug 1102005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102007">SUSE bug 1102007</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13758/">CVE-2017-13758 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13758">CVE-2017-13758 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18271/">CVE-2017-18271 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18271">CVE-2017-18271 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10805/">CVE-2018-10805 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10805">CVE-2018-10805 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11251/">CVE-2018-11251 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11251">CVE-2018-11251 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12599/">CVE-2018-12599 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12599">CVE-2018-12599 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12600/">CVE-2018-12600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12600">CVE-2018-12600 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14434/">CVE-2018-14434 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14434">CVE-2018-14434 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14435/">CVE-2018-14435 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14435">CVE-2018-14435 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14436/">CVE-2018-14436 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14436">CVE-2018-14436 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14437/">CVE-2018-14437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14437">CVE-2018-14437 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581865" comment="libMagickCore1-6.4.3.6-78.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581866" comment="libMagickCore1-32bit-6.4.3.6-78.56.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581865" comment="libMagickCore1-6.4.3.6-78.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581866" comment="libMagickCore1-32bit-6.4.3.6-78.56.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219715" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1105592" ref_url="https://bugzilla.suse.com/1105592" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:2553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004508.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issue fixed:

- Hide PS, XPS and PDF coders into */vulnerable (bsc#1105592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-29"/>
	<updated date="2018-08-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581867" comment="libMagickCore1-6.4.3.6-78.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581868" comment="libMagickCore1-32bit-6.4.3.6-78.59.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581867" comment="libMagickCore1-6.4.3.6-78.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581868" comment="libMagickCore1-32bit-6.4.3.6-78.59.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219716" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1074170" ref_url="https://bugzilla.suse.com/1074170" source="BUGZILLA"/>
		<reference ref_id="1106855" ref_url="https://bugzilla.suse.com/1106855" source="BUGZILLA"/>
		<reference ref_id="1106989" ref_url="https://bugzilla.suse.com/1106989" source="BUGZILLA"/>
		<reference ref_id="1107604" ref_url="https://bugzilla.suse.com/1107604" source="BUGZILLA"/>
		<reference ref_id="1107609" ref_url="https://bugzilla.suse.com/1107609" source="BUGZILLA"/>
		<reference ref_id="1107612" ref_url="https://bugzilla.suse.com/1107612" source="BUGZILLA"/>
		<reference ref_id="1107616" ref_url="https://bugzilla.suse.com/1107616" source="BUGZILLA"/>
		<reference ref_id="1108282" ref_url="https://bugzilla.suse.com/1108282" source="BUGZILLA"/>
		<reference ref_id="1108283" ref_url="https://bugzilla.suse.com/1108283" source="BUGZILLA"/>
		<reference ref_id="1110746" ref_url="https://bugzilla.suse.com/1110746" source="BUGZILLA"/>
		<reference ref_id="1110747" ref_url="https://bugzilla.suse.com/1110747" source="BUGZILLA"/>
		<reference ref_id="1111069" ref_url="https://bugzilla.suse.com/1111069" source="BUGZILLA"/>
		<reference ref_id="1111072" ref_url="https://bugzilla.suse.com/1111072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17934" ref_url="https://www.suse.com/security/cve/CVE-2017-17934/" source="CVE"/>
		<reference ref_id="CVE-2018-16323" ref_url="https://www.suse.com/security/cve/CVE-2018-16323/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-16642" ref_url="https://www.suse.com/security/cve/CVE-2018-16642/" source="CVE"/>
		<reference ref_id="CVE-2018-16643" ref_url="https://www.suse.com/security/cve/CVE-2018-16643/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="CVE-2018-16645" ref_url="https://www.suse.com/security/cve/CVE-2018-16645/" source="CVE"/>
		<reference ref_id="CVE-2018-16749" ref_url="https://www.suse.com/security/cve/CVE-2018-16749/" source="CVE"/>
		<reference ref_id="CVE-2018-16750" ref_url="https://www.suse.com/security/cve/CVE-2018-16750/" source="CVE"/>
		<reference ref_id="CVE-2018-17965" ref_url="https://www.suse.com/security/cve/CVE-2018-17965/" source="CVE"/>
		<reference ref_id="CVE-2018-17966" ref_url="https://www.suse.com/security/cve/CVE-2018-17966/" source="CVE"/>
		<reference ref_id="CVE-2018-18016" ref_url="https://www.suse.com/security/cve/CVE-2018-18016/" source="CVE"/>
		<reference ref_id="CVE-2018-18024" ref_url="https://www.suse.com/security/cve/CVE-2018-18024/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004773.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following security issue:

- CVE-2017-17934: Prevent memory leaks, related to MSLPopImage and
  ProcessMSLScript, and associated with mishandling of MSLPushImage calls
  (bsc#1074170).
- CVE-2018-16750: Prevent memory leak in the formatIPTCfromBuffer function
  (bsc#1108283)
- CVE-2018-16749: Added missing NULL check in ReadOneJNGImage that allowed an
  attacker to cause a denial of service (WriteBlob assertion failure and
  application exit) via a crafted file (bsc#1108282)
- CVE-2018-16413: Prevent heap-based buffer over-read in the PushShortPixel
  function leading to DoS (bsc#1106989).
- CVE-2018-16323: ReadXBMImage left data uninitialized when processing an XBM
  file that has a negative pixel value. If the affected code was used as a
  library loaded into a process that includes sensitive information, that
  information sometimes can be leaked via the image data (bsc#1106855)
- CVE-2018-16642: The function InsertRow allowed remote attackers to cause a
  denial of service via a crafted image file due to an out-of-bounds write
  (bsc#1107616)
- CVE-2018-16643: The functions ReadDCMImage, ReadPWPImage, ReadCALSImage, and
  ReadPICTImage did check the return value of the fputc function, which allowed
  remote attackers to cause a denial of service via a crafted image file
  (bsc#1107612)
- CVE-2018-16644: Added missing check for length in the functions ReadDCMImage
  and ReadPICTImage, which allowed remote attackers to cause a denial of service
  via a crafted image (bsc#1107609)
- CVE-2018-16645: Prevent excessive memory allocation issue in the functions
  ReadBMPImage and ReadDIBImage, which allowed remote attackers to cause a denial
  of service via a crafted image file (bsc#1107604)
- CVE-2018-18024: Fixed an infinite loop in the ReadBMPImage function of
  the coders/bmp.c file. Remote attackers could leverage this vulnerability
  to cause a denial of service via a crafted bmp file (bsc#1111069)
- CVE-2018-18016: Fixed a memory leak in WritePCXImage (bsc#1111072)
- CVE-2018-17965: Fixed a memory leak in WriteSGIImage (bsc#1110747)
- CVE-2018-17966: Fixed a memory leak in WritePDBImage (bsc#1110746)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074170">SUSE bug 1074170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106855">SUSE bug 1106855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107604">SUSE bug 1107604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107612">SUSE bug 1107612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107616">SUSE bug 1107616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108282">SUSE bug 1108282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108283">SUSE bug 1108283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110746">SUSE bug 1110746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110747">SUSE bug 1110747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111069">SUSE bug 1111069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111072">SUSE bug 1111072</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17934/">CVE-2017-17934 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17934">CVE-2017-17934 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16323/">CVE-2018-16323 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16323">CVE-2018-16323 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16413">CVE-2018-16413 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16642/">CVE-2018-16642 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16642">CVE-2018-16642 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16643/">CVE-2018-16643 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16643">CVE-2018-16643 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16644">CVE-2018-16644 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16645/">CVE-2018-16645 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16645">CVE-2018-16645 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16749/">CVE-2018-16749 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16749">CVE-2018-16749 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16750/">CVE-2018-16750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16750">CVE-2018-16750 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17965/">CVE-2018-17965 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17965">CVE-2018-17965 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17966/">CVE-2018-17966 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17966">CVE-2018-17966 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18016/">CVE-2018-18016 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18016">CVE-2018-18016 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18024/">CVE-2018-18024 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18024">CVE-2018-18024 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581869" comment="libMagickCore1-6.4.3.6-78.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581870" comment="libMagickCore1-32bit-6.4.3.6-78.74.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581869" comment="libMagickCore1-6.4.3.6-78.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581870" comment="libMagickCore1-32bit-6.4.3.6-78.74.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219717" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1050129" ref_url="https://bugzilla.suse.com/1050129" source="BUGZILLA"/>
		<reference ref_id="1050635" ref_url="https://bugzilla.suse.com/1050635" source="BUGZILLA"/>
		<reference ref_id="1107609" ref_url="https://bugzilla.suse.com/1107609" source="BUGZILLA"/>
		<reference ref_id="1112399" ref_url="https://bugzilla.suse.com/1112399" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11532" ref_url="https://www.suse.com/security/cve/CVE-2017-11532/" source="CVE"/>
		<reference ref_id="CVE-2017-11639" ref_url="https://www.suse.com/security/cve/CVE-2017-11639/" source="CVE"/>
		<reference ref_id="CVE-2017-14997" ref_url="https://www.suse.com/security/cve/CVE-2017-14997/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004863.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:


- CVE-2017-14997: ImageMagick allowed remote attackers to cause a denial of service (excessive memory allocation) because of an integer underflow in ReadPICTImage in coders/pict.c.  (bsc#1112399)
- CVE-2018-16644: A regression in the security fix for the pict coder was fixed (bsc#1107609)
- CVE-2017-11532: When ImageMagick processed a crafted file in convert, it could lead to a Memory Leak in the WriteMPCImage() function in coders/mpc.c. (bsc#1050129)
- CVE-2017-11639: A regression in the security fix in the cip coder was fixed (bsc#1050635)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-19"/>
	<updated date="2018-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050129">SUSE bug 1050129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050635">SUSE bug 1050635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112399">SUSE bug 1112399</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11532/">CVE-2017-11532 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11532">CVE-2017-11532 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11639/">CVE-2017-11639 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11639">CVE-2017-11639 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14997/">CVE-2017-14997 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14997">CVE-2017-14997 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16644">CVE-2018-16644 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581871" comment="libMagickCore1-6.4.3.6-78.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581872" comment="libMagickCore1-32bit-6.4.3.6-78.79.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581871" comment="libMagickCore1-6.4.3.6-78.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581872" comment="libMagickCore1-32bit-6.4.3.6-78.79.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219718" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1106989" ref_url="https://bugzilla.suse.com/1106989" source="BUGZILLA"/>
		<reference ref_id="1106996" ref_url="https://bugzilla.suse.com/1106996" source="BUGZILLA"/>
		<reference ref_id="1113064" ref_url="https://bugzilla.suse.com/1113064" source="BUGZILLA"/>
		<reference ref_id="1120381" ref_url="https://bugzilla.suse.com/1120381" source="BUGZILLA"/>
		<reference ref_id="1124365" ref_url="https://bugzilla.suse.com/1124365" source="BUGZILLA"/>
		<reference ref_id="1124366" ref_url="https://bugzilla.suse.com/1124366" source="BUGZILLA"/>
		<reference ref_id="1128649" ref_url="https://bugzilla.suse.com/1128649" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16412" ref_url="https://www.suse.com/security/cve/CVE-2018-16412/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-18544" ref_url="https://www.suse.com/security/cve/CVE-2018-18544/" source="CVE"/>
		<reference ref_id="CVE-2018-20467" ref_url="https://www.suse.com/security/cve/CVE-2018-20467/" source="CVE"/>
		<reference ref_id="CVE-2019-7175" ref_url="https://www.suse.com/security/cve/CVE-2019-7175/" source="CVE"/>
		<reference ref_id="CVE-2019-7397" ref_url="https://www.suse.com/security/cve/CVE-2019-7397/" source="CVE"/>
		<reference ref_id="CVE-2019-7398" ref_url="https://www.suse.com/security/cve/CVE-2019-7398/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005256.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-7175: Fixed multiple memory leaks in DecodeImage function (bsc#1128649).
- CVE-2018-18544: Fixed memory leak in the function WriteMSLImage (bsc#1113064).
- CVE-2018-20467: Fixed infinite loop in coders/bmp.c (bsc#1120381).
- CVE-2019-7397: Fixed a memory leak in the function WritePDFImage (bsc#1124366).
- CVE-2018-16413: Prevent heap-based buffer over-read in the PushShortPixel
  function leading to DoS (bsc#1106989).
- CVE-2018-16412: Prevent heap-based buffer over-read in the ParseImageResourceBlocks
  function leading to DOS (bsc#1106996).
- CVE-2019-7398: Fixed a memory leak in the function WriteDIBImage (bsc#1124365).


		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106996">SUSE bug 1106996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113064">SUSE bug 1113064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120381">SUSE bug 1120381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124365">SUSE bug 1124365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124366">SUSE bug 1124366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128649">SUSE bug 1128649</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16412/">CVE-2018-16412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16412">CVE-2018-16412 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16413">CVE-2018-16413 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18544/">CVE-2018-18544 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18544">CVE-2018-18544 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20467/">CVE-2018-20467 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20467">CVE-2018-20467 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7175/">CVE-2019-7175 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7175">CVE-2019-7175 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7397/">CVE-2019-7397 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7397">CVE-2019-7397 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7398/">CVE-2019-7398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7398">CVE-2019-7398 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581873" comment="libMagickCore1-6.4.3.6-78.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581874" comment="libMagickCore1-32bit-6.4.3.6-78.92.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581873" comment="libMagickCore1-6.4.3.6-78.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581874" comment="libMagickCore1-32bit-6.4.3.6-78.92.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219719" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1179103" ref_url="https://bugzilla.suse.com/1179103" source="BUGZILLA"/>
		<reference ref_id="1179202" ref_url="https://bugzilla.suse.com/1179202" source="BUGZILLA"/>
		<reference ref_id="1179212" ref_url="https://bugzilla.suse.com/1179212" source="BUGZILLA"/>
		<reference ref_id="1179269" ref_url="https://bugzilla.suse.com/1179269" source="BUGZILLA"/>
		<reference ref_id="1179281" ref_url="https://bugzilla.suse.com/1179281" source="BUGZILLA"/>
		<reference ref_id="1179311" ref_url="https://bugzilla.suse.com/1179311" source="BUGZILLA"/>
		<reference ref_id="1179312" ref_url="https://bugzilla.suse.com/1179312" source="BUGZILLA"/>
		<reference ref_id="1179313" ref_url="https://bugzilla.suse.com/1179313" source="BUGZILLA"/>
		<reference ref_id="1179315" ref_url="https://bugzilla.suse.com/1179315" source="BUGZILLA"/>
		<reference ref_id="1179321" ref_url="https://bugzilla.suse.com/1179321" source="BUGZILLA"/>
		<reference ref_id="1179322" ref_url="https://bugzilla.suse.com/1179322" source="BUGZILLA"/>
		<reference ref_id="1179327" ref_url="https://bugzilla.suse.com/1179327" source="BUGZILLA"/>
		<reference ref_id="1179336" ref_url="https://bugzilla.suse.com/1179336" source="BUGZILLA"/>
		<reference ref_id="1179338" ref_url="https://bugzilla.suse.com/1179338" source="BUGZILLA"/>
		<reference ref_id="1179339" ref_url="https://bugzilla.suse.com/1179339" source="BUGZILLA"/>
		<reference ref_id="1179345" ref_url="https://bugzilla.suse.com/1179345" source="BUGZILLA"/>
		<reference ref_id="1179346" ref_url="https://bugzilla.suse.com/1179346" source="BUGZILLA"/>
		<reference ref_id="1179347" ref_url="https://bugzilla.suse.com/1179347" source="BUGZILLA"/>
		<reference ref_id="1179397" ref_url="https://bugzilla.suse.com/1179397" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-19667" ref_url="https://www.suse.com/security/cve/CVE-2020-19667/" source="CVE"/>
		<reference ref_id="CVE-2020-25664" ref_url="https://www.suse.com/security/cve/CVE-2020-25664/" source="CVE"/>
		<reference ref_id="CVE-2020-25666" ref_url="https://www.suse.com/security/cve/CVE-2020-25666/" source="CVE"/>
		<reference ref_id="CVE-2020-27751" ref_url="https://www.suse.com/security/cve/CVE-2020-27751/" source="CVE"/>
		<reference ref_id="CVE-2020-27752" ref_url="https://www.suse.com/security/cve/CVE-2020-27752/" source="CVE"/>
		<reference ref_id="CVE-2020-27753" ref_url="https://www.suse.com/security/cve/CVE-2020-27753/" source="CVE"/>
		<reference ref_id="CVE-2020-27754" ref_url="https://www.suse.com/security/cve/CVE-2020-27754/" source="CVE"/>
		<reference ref_id="CVE-2020-27755" ref_url="https://www.suse.com/security/cve/CVE-2020-27755/" source="CVE"/>
		<reference ref_id="CVE-2020-27759" ref_url="https://www.suse.com/security/cve/CVE-2020-27759/" source="CVE"/>
		<reference ref_id="CVE-2020-27760" ref_url="https://www.suse.com/security/cve/CVE-2020-27760/" source="CVE"/>
		<reference ref_id="CVE-2020-27761" ref_url="https://www.suse.com/security/cve/CVE-2020-27761/" source="CVE"/>
		<reference ref_id="CVE-2020-27763" ref_url="https://www.suse.com/security/cve/CVE-2020-27763/" source="CVE"/>
		<reference ref_id="CVE-2020-27765" ref_url="https://www.suse.com/security/cve/CVE-2020-27765/" source="CVE"/>
		<reference ref_id="CVE-2020-27767" ref_url="https://www.suse.com/security/cve/CVE-2020-27767/" source="CVE"/>
		<reference ref_id="CVE-2020-27768" ref_url="https://www.suse.com/security/cve/CVE-2020-27768/" source="CVE"/>
		<reference ref_id="CVE-2020-27769" ref_url="https://www.suse.com/security/cve/CVE-2020-27769/" source="CVE"/>
		<reference ref_id="CVE-2020-27771" ref_url="https://www.suse.com/security/cve/CVE-2020-27771/" source="CVE"/>
		<reference ref_id="CVE-2020-27772" ref_url="https://www.suse.com/security/cve/CVE-2020-27772/" source="CVE"/>
		<reference ref_id="CVE-2020-27775" ref_url="https://www.suse.com/security/cve/CVE-2020-27775/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:
	  
- CVE-2020-19667: Fixed a stack buffer overflow in XPM coder could result in a crash (bsc#1179103).
- CVE-2020-25664: Fixed a heap-based buffer overflow in PopShortPixel (bsc#1179202).
- CVE-2020-25666: Fixed an outside the range of representable values of type 'int' and signed integer overflow (bsc#1179212).
- CVE-2020-27751: Fixed an integer overflow in MagickCore/quantum-export.c (bsc#1179269).
- CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h (bsc#1179346).
- CVE-2020-27753: Fixed memory leaks in AcquireMagickMemory function (bsc#1179397).
- CVE-2020-27754: Fixed an outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c (bsc#1179336).
- CVE-2020-27755: Fixed memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c (bsc#1179345).
- CVE-2020-27757: Fixed an outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h (bsc#1179268).
- CVE-2020-27759: Fixed an outside the range of representable values of type 'int' at MagickCore/quantize.c (bsc#1179313).
- CVE-2020-27760: Fixed a division by zero at MagickCore/enhance.c (bsc#1179281).
- CVE-2020-27761: Fixed an outside the range of representable values of type 'unsigned long' at coders/palm.c (bsc#1179315).
- CVE-2020-27763: Fixed a division by zero at MagickCore/resize.c (bsc#1179312).
- CVE-2020-27765: Fixed a division by zero at MagickCore/segment.c (bsc#1179311).
- CVE-2020-27767: Fixed an outside the range of representable values of type 'float' at MagickCore/quantum.h (bsc#1179322).
- CVE-2020-27768: Fixed an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h (bsc#1179339).
- CVE-2020-27769: Fixed an outside the range of representable values of type 'float' at MagickCore/quantize.c (bsc#1179321).
- CVE-2020-27771: Fixed an outside the range of representable values of type 'unsigned char' at coders/pdf.c (bsc#1179327).
- CVE-2020-27772: Fixed an outside the range of representable values of type 'unsigned int' at coders/bmp.c (bsc#1179347).
- CVE-2020-27775: Fixed an outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h (bsc#1179338).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-15"/>
	<updated date="2021-01-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179103">SUSE bug 1179103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179202">SUSE bug 1179202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179212">SUSE bug 1179212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179269">SUSE bug 1179269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179281">SUSE bug 1179281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179311">SUSE bug 1179311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179312">SUSE bug 1179312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179313">SUSE bug 1179313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179315">SUSE bug 1179315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179321">SUSE bug 1179321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179322">SUSE bug 1179322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179327">SUSE bug 1179327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179336">SUSE bug 1179336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179338">SUSE bug 1179338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179339">SUSE bug 1179339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179345">SUSE bug 1179345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179346">SUSE bug 1179346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179347">SUSE bug 1179347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179397">SUSE bug 1179397</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-19667/">CVE-2020-19667 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19667">CVE-2020-19667 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-25664/">CVE-2020-25664 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25664">CVE-2020-25664 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25666/">CVE-2020-25666 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25666">CVE-2020-25666 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27751/">CVE-2020-27751 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27751">CVE-2020-27751 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27752/">CVE-2020-27752 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27752">CVE-2020-27752 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27753/">CVE-2020-27753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27753">CVE-2020-27753 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27754/">CVE-2020-27754 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27754">CVE-2020-27754 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27755/">CVE-2020-27755 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27755">CVE-2020-27755 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27759/">CVE-2020-27759 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27759">CVE-2020-27759 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27760/">CVE-2020-27760 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27760">CVE-2020-27760 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27761/">CVE-2020-27761 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27761">CVE-2020-27761 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27763/">CVE-2020-27763 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27763">CVE-2020-27763 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27765/">CVE-2020-27765 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27765">CVE-2020-27765 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27767/">CVE-2020-27767 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27767">CVE-2020-27767 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27768/">CVE-2020-27768 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27768">CVE-2020-27768 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27769/">CVE-2020-27769 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27769">CVE-2020-27769 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27771/">CVE-2020-27771 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27771">CVE-2020-27771 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27772/">CVE-2020-27772 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27772">CVE-2020-27772 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27775/">CVE-2020-27775 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27775">CVE-2020-27775 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581875" comment="libMagickCore1-6.4.3.6-78.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581876" comment="libMagickCore1-32bit-6.4.3.6-78.135.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219720" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1017711" ref_url="https://bugzilla.suse.com/1017711" source="BUGZILLA"/>
		<reference ref_id="1017712" ref_url="https://bugzilla.suse.com/1017712" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9941" ref_url="https://www.suse.com/security/cve/CVE-2016-9941/" source="CVE"/>
		<reference ref_id="CVE-2016-9942" ref_url="https://www.suse.com/security/cve/CVE-2016-9942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002550.html" source="SUSE-SU"/>
		<description>

LibVNCServer was updated to fix two security issues.

These security issues were fixed:

- CVE-2016-9941: Heap-based buffer overflow in rfbproto.c allowed remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message containing a subrectangle outside of the client drawing area (bsc#1017711)
- CVE-2016-9942: Heap-based buffer overflow in ultra.c allowed remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message with the Ultra type tile, such that the LZO payload decompressed length exceeds what is specified by the tile dimensions (bsc#1017712)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1017711">SUSE bug 1017711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017712">SUSE bug 1017712</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9941/">CVE-2016-9941 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9941">CVE-2016-9941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9942/">CVE-2016-9942 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9942">CVE-2016-9942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581877" comment="LibVNCServer-0.9.1-159.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581877" comment="LibVNCServer-0.9.1-159.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219721" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1081493" ref_url="https://bugzilla.suse.com/1081493" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7225" ref_url="https://www.suse.com/security/cve/CVE-2018-7225/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003871.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2018-7225: Missing input sanitization inside rfbserver.c rfbProcessClientNormalMessage() (bsc#1081493).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-05"/>
	<updated date="2018-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081493">SUSE bug 1081493</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7225/">CVE-2018-7225 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7225">CVE-2018-7225 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581878" comment="LibVNCServer-0.9.1-160.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581878" comment="LibVNCServer-0.9.1-160.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219722" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1120114" ref_url="https://bugzilla.suse.com/1120114" source="BUGZILLA"/>
		<reference ref_id="1120115" ref_url="https://bugzilla.suse.com/1120115" source="BUGZILLA"/>
		<reference ref_id="1120116" ref_url="https://bugzilla.suse.com/1120116" source="BUGZILLA"/>
		<reference ref_id="1120117" ref_url="https://bugzilla.suse.com/1120117" source="BUGZILLA"/>
		<reference ref_id="1120118" ref_url="https://bugzilla.suse.com/1120118" source="BUGZILLA"/>
		<reference ref_id="1120120" ref_url="https://bugzilla.suse.com/1120120" source="BUGZILLA"/>
		<reference ref_id="1120121" ref_url="https://bugzilla.suse.com/1120121" source="BUGZILLA"/>
		<reference ref_id="1120122" ref_url="https://bugzilla.suse.com/1120122" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15126" ref_url="https://www.suse.com/security/cve/CVE-2018-15126/" source="CVE"/>
		<reference ref_id="CVE-2018-15127" ref_url="https://www.suse.com/security/cve/CVE-2018-15127/" source="CVE"/>
		<reference ref_id="CVE-2018-20019" ref_url="https://www.suse.com/security/cve/CVE-2018-20019/" source="CVE"/>
		<reference ref_id="CVE-2018-20020" ref_url="https://www.suse.com/security/cve/CVE-2018-20020/" source="CVE"/>
		<reference ref_id="CVE-2018-20021" ref_url="https://www.suse.com/security/cve/CVE-2018-20021/" source="CVE"/>
		<reference ref_id="CVE-2018-20022" ref_url="https://www.suse.com/security/cve/CVE-2018-20022/" source="CVE"/>
		<reference ref_id="CVE-2018-20024" ref_url="https://www.suse.com/security/cve/CVE-2018-20024/" source="CVE"/>
		<reference ref_id="CVE-2018-6307" ref_url="https://www.suse.com/security/cve/CVE-2018-6307/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005030.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

Security issues fixed:

- CVE-2018-15126: Fixed use-after-free in file transfer extension (bsc#1120114)
- CVE-2018-6307: Fixed use-after-free in file transfer extension server code (bsc#1120115)
- CVE-2018-20020: Fixed heap out-of-bound write inside structure in VNC client code (bsc#1120116)
- CVE-2018-15127: Fixed heap out-of-bounds write in rfbserver.c (bsc#1120117)
- CVE-2018-20019: Fixed multiple heap out-of-bound writes in VNC client code (bsc#1120118)
- CVE-2018-20022: Fixed information disclosure through improper initialization in VNC client code (bsc#1120120)
- CVE-2018-20024: Fixed NULL pointer dereference in VNC client code (bsc#1120121)
- CVE-2018-20021: Fixed infinite loop in VNC client code (bsc#1120122)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-11"/>
	<updated date="2019-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120114">SUSE bug 1120114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120115">SUSE bug 1120115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120116">SUSE bug 1120116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120117">SUSE bug 1120117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120118">SUSE bug 1120118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120120">SUSE bug 1120120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120121">SUSE bug 1120121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120122">SUSE bug 1120122</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15126/">CVE-2018-15126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15126">CVE-2018-15126 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15127/">CVE-2018-15127 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15127">CVE-2018-15127 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20019/">CVE-2018-20019 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20019">CVE-2018-20019 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20020/">CVE-2018-20020 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20020">CVE-2018-20020 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20021/">CVE-2018-20021 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20021">CVE-2018-20021 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20022/">CVE-2018-20022 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20022">CVE-2018-20022 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20024/">CVE-2018-20024 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20024">CVE-2018-20024 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6307/">CVE-2018-6307 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6307">CVE-2018-6307 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581879" comment="LibVNCServer-0.9.1-160.6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581879" comment="LibVNCServer-0.9.1-160.6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219723" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1123823" ref_url="https://bugzilla.suse.com/1123823" source="BUGZILLA"/>
		<reference ref_id="1123828" ref_url="https://bugzilla.suse.com/1123828" source="BUGZILLA"/>
		<reference ref_id="1123832" ref_url="https://bugzilla.suse.com/1123832" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20748" ref_url="https://www.suse.com/security/cve/CVE-2018-20748/" source="CVE"/>
		<reference ref_id="CVE-2018-20749" ref_url="https://www.suse.com/security/cve/CVE-2018-20749/" source="CVE"/>
		<reference ref_id="CVE-2018-20750" ref_url="https://www.suse.com/security/cve/CVE-2018-20750/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005107.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

Security issues fixed:

- CVE-2018-20749: Fixed a heap out of bounds write vulnerability in rfbserver.c (bsc#1123828)
- CVE-2018-20750: Fixed a heap out of bounds write vulnerability in rfbserver.c (bsc#1123832)
- CVE-2018-20748: Fixed multiple heap out-of-bound writes in VNC client code (bsc#1123823)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-12"/>
	<updated date="2019-02-12"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1123823">SUSE bug 1123823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123828">SUSE bug 1123828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123832">SUSE bug 1123832</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20748/">CVE-2018-20748 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20748">CVE-2018-20748 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20749/">CVE-2018-20749 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20749">CVE-2018-20749 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20750/">CVE-2018-20750 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20750">CVE-2018-20750 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581880" comment="LibVNCServer-0.9.1-160.9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581880" comment="LibVNCServer-0.9.1-160.9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219724" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1155419" ref_url="https://bugzilla.suse.com/1155419" source="BUGZILLA"/>
		<reference ref_id="1160471" ref_url="https://bugzilla.suse.com/1160471" source="BUGZILLA"/>
		<reference ref_id="1170441" ref_url="https://bugzilla.suse.com/1170441" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681/" source="CVE"/>
		<reference ref_id="CVE-2019-15690" ref_url="https://www.suse.com/security/cve/CVE-2019-15690/" source="CVE"/>
		<reference ref_id="CVE-2019-20788" ref_url="https://www.suse.com/security/cve/CVE-2019-20788/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006774.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2019-15690: Fixed a heap buffer overflow (bsc#1160471).
- CVE-2019-15681: Fixed a memory leak which could have allowed to a remote attacker to read stack memory (bsc#1155419).
- CVE-2019-20788: Fixed a integer overflow and heap-based buffer overflow via a large height or width value (bsc#1170441).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-04"/>
	<updated date="2020-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155419">SUSE bug 1155419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160471">SUSE bug 1160471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170441">SUSE bug 1170441</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15681">CVE-2019-15681 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15690/">CVE-2019-15690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15690">CVE-2019-15690 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20788/">CVE-2019-20788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20788">CVE-2019-20788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581881" comment="LibVNCServer-0.9.1-160.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219725" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1173691" ref_url="https://bugzilla.suse.com/1173691" source="BUGZILLA"/>
		<reference ref_id="1173694" ref_url="https://bugzilla.suse.com/1173694" source="BUGZILLA"/>
		<reference ref_id="1173700" ref_url="https://bugzilla.suse.com/1173700" source="BUGZILLA"/>
		<reference ref_id="1173701" ref_url="https://bugzilla.suse.com/1173701" source="BUGZILLA"/>
		<reference ref_id="1173743" ref_url="https://bugzilla.suse.com/1173743" source="BUGZILLA"/>
		<reference ref_id="1173880" ref_url="https://bugzilla.suse.com/1173880" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14397" ref_url="https://www.suse.com/security/cve/CVE-2020-14397/" source="CVE"/>
		<reference ref_id="CVE-2020-14398" ref_url="https://www.suse.com/security/cve/CVE-2020-14398/" source="CVE"/>
		<reference ref_id="CVE-2020-14399" ref_url="https://www.suse.com/security/cve/CVE-2020-14399/" source="CVE"/>
		<reference ref_id="CVE-2020-14400" ref_url="https://www.suse.com/security/cve/CVE-2020-14400/" source="CVE"/>
		<reference ref_id="CVE-2020-14401" ref_url="https://www.suse.com/security/cve/CVE-2020-14401/" source="CVE"/>
		<reference ref_id="CVE-2020-14402" ref_url="https://www.suse.com/security/cve/CVE-2020-14402/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007150.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- security update
- added patches
  fix CVE-2020-14398 [bsc#1173880], improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c
  + LibVNCServer-CVE-2020-14398.patch
  fix CVE-2020-14397 [bsc#1173700], NULL pointer dereference in libvncserver/rfbregion.c
  + LibVNCServer-CVE-2020-14397.patch
  fix CVE-2020-14399 [bsc#1173743], Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c.
  + LibVNCServer-CVE-2020-14399.patch
  fix CVE-2020-14400 [bsc#1173691], Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c.
  + LibVNCServer-CVE-2020-14400.patch
  fix CVE-2020-14401 [bsc#1173694], potential integer overflows in libvncserver/scale.c
  + LibVNCServer-CVE-2020-14401.patch
  fix CVE-2020-14402 [bsc#1173701], out-of-bounds access via encodings.
  + LibVNCServer-CVE-2020-14402,14403,14404.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-17"/>
	<updated date="2020-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173691">SUSE bug 1173691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173694">SUSE bug 1173694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173700">SUSE bug 1173700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173701">SUSE bug 1173701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173743">SUSE bug 1173743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173880">SUSE bug 1173880</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14397/">CVE-2020-14397 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14397">CVE-2020-14397 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14398/">CVE-2020-14398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14398">CVE-2020-14398 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14399/">CVE-2020-14399 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14399">CVE-2020-14399 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14400/">CVE-2020-14400 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14400">CVE-2020-14400 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14401/">CVE-2020-14401 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14401">CVE-2020-14401 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14402/">CVE-2020-14402 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14402">CVE-2020-14402 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581882" comment="LibVNCServer-0.9.1-160.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219726" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1178682" ref_url="https://bugzilla.suse.com/1178682" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25708" ref_url="https://www.suse.com/security/cve/CVE-2020-25708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007873.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2020-25708 [bsc#1178682], libvncserver/rfbserver.c has a divide by zero which could result in DoS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-26"/>
	<updated date="2020-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178682">SUSE bug 1178682</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-25708/">CVE-2020-25708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25708">CVE-2020-25708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581883" comment="LibVNCServer-0.9.1-160.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219727" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="940918" ref_url="https://bugzilla.suse.com/940918" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001539.html" source="SUSE-SU"/>
		<description>

This security update (bsc#940918) fixes the following issues:
  * MFSA 2015-78 (CVE-2015-4495, bmo#1178058): Same origin violation
  * Remove PlayPreview registration from PDF Viewer (bmo#1179262)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-12"/>
	<updated date="2015-08-12"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/940918">SUSE bug 940918</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4495">CVE-2015-4495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577129" comment="MozillaFirefox-31.8.0esr-0.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577130" comment="MozillaFirefox-translations-31.8.0esr-0.13.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577129" comment="MozillaFirefox-31.8.0esr-0.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577130" comment="MozillaFirefox-translations-31.8.0esr-0.13.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219728" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="959277" ref_url="https://bugzilla.suse.com/959277" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7202" ref_url="https://www.suse.com/security/cve/CVE-2015-7202/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001748.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to version 38.5.0 esr to fix the following issues: 

Following security issues were fixed:
* MFSA 2015-134/CVE-2015-7201/CVE-2015-7202
  Miscellaneous memory safety hazards (rv:43.0 / rv:38.5)
* MFSA 2015-138/CVE-2015-7210
  Use-after-free in WebRTC when datachannel is used after being
  destroyed
* MFSA 2015-139/CVE-2015-7212
  Integer overflow allocating extremely large textures
* MFSA 2015-145/CVE-2015-7205
  Underflow through code inspection
* MFSA 2015-146/CVE-2015-7213
  Integer overflow in MP4 playback in 64-bit versions
* MFSA 2015-147/CVE-2015-7222
  Integer underflow and buffer overflow processing MP4 metadata
  in libstagefright
* MFSA 2015-149/CVE-2015-7214
  Cross-site reading attack through data and view-source URIs
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-21"/>
	<updated date="2015-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7201">CVE-2015-7201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7202/">CVE-2015-7202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7202">CVE-2015-7202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7205">CVE-2015-7205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7210">CVE-2015-7210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7212">CVE-2015-7212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7213">CVE-2015-7213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7214">CVE-2015-7214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7222">CVE-2015-7222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577131" comment="MozillaFirefox-38.5.0esr-28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577132" comment="MozillaFirefox-translations-38.5.0esr-28.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577131" comment="MozillaFirefox-38.5.0esr-28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577132" comment="MozillaFirefox-translations-38.5.0esr-28.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219729" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="967087" ref_url="https://bugzilla.suse.com/967087" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001893.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox fixes the following issues: 

- update to Firefox 38.6.1 ESR (bsc#967087)
  * MFSA 2016-14/CVE-2016-1523
    (bmo#1246093)
    Vulnerabilities in Graphite 2
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-24"/>
	<updated date="2016-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/967087">SUSE bug 967087</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1523">CVE-2016-1523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581884" comment="MozillaFirefox-38.6.1esr-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581885" comment="MozillaFirefox-translations-38.6.1esr-34.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581884" comment="MozillaFirefox-38.6.1esr-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581885" comment="MozillaFirefox-translations-38.6.1esr-34.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219730" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="977333" ref_url="https://bugzilla.suse.com/977333" source="BUGZILLA"/>
		<reference ref_id="977374" ref_url="https://bugzilla.suse.com/977374" source="BUGZILLA"/>
		<reference ref_id="977376" ref_url="https://bugzilla.suse.com/977376" source="BUGZILLA"/>
		<reference ref_id="977381" ref_url="https://bugzilla.suse.com/977381" source="BUGZILLA"/>
		<reference ref_id="977386" ref_url="https://bugzilla.suse.com/977386" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2805" ref_url="https://www.suse.com/security/cve/CVE-2016-2805/" source="CVE"/>
		<reference ref_id="CVE-2016-2807" ref_url="https://www.suse.com/security/cve/CVE-2016-2807/" source="CVE"/>
		<reference ref_id="CVE-2016-2808" ref_url="https://www.suse.com/security/cve/CVE-2016-2808/" source="CVE"/>
		<reference ref_id="CVE-2016-2814" ref_url="https://www.suse.com/security/cve/CVE-2016-2814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002077.html" source="SUSE-SU"/>
		<description>
This update to MozillaFirefox 38.8.0 ESR fixes the following security issues (bsc#977333):

- CVE-2016-2805: Miscellaneous memory safety hazards - MFSA 2016-39 (bsc#977374)
- CVE-2016-2807: Miscellaneous memory safety hazards - MFSA 2016-39 (bsc#977376)
- CVE-2016-2808: Write to invalid HashMap entry through JavaScript.watch() - MFSA 2016-47 (bsc#977386)
- CVE-2016-2814: Buffer overflow in libstagefright with CENC offsets - MFSA 2016-44 (bsc#977381)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-20"/>
	<updated date="2016-05-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977374">SUSE bug 977374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977376">SUSE bug 977376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977381">SUSE bug 977381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977386">SUSE bug 977386</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2805/">CVE-2016-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2805">CVE-2016-2805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2807/">CVE-2016-2807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2807">CVE-2016-2807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2808/">CVE-2016-2808 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2808">CVE-2016-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2814/">CVE-2016-2814 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2814">CVE-2016-2814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581886" comment="MozillaFirefox-38.8.0esr-40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581887" comment="MozillaFirefox-translations-38.8.0esr-40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581888" comment="libfreebl3-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581889" comment="libfreebl3-32bit-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581890" comment="libfreebl3-x86-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581891" comment="libsoftokn3-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581892" comment="libsoftokn3-32bit-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581893" comment="libsoftokn3-x86-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581894" comment="mozilla-nspr-4.12-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581895" comment="mozilla-nspr-32bit-4.12-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581896" comment="mozilla-nspr-x86-4.12-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581897" comment="mozilla-nss-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581898" comment="mozilla-nss-32bit-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581899" comment="mozilla-nss-tools-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581900" comment="mozilla-nss-x86-3.20.2-30.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581886" comment="MozillaFirefox-38.8.0esr-40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581887" comment="MozillaFirefox-translations-38.8.0esr-40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581888" comment="libfreebl3-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581889" comment="libfreebl3-32bit-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581890" comment="libfreebl3-x86-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581891" comment="libsoftokn3-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581892" comment="libsoftokn3-32bit-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581893" comment="libsoftokn3-x86-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581894" comment="mozilla-nspr-4.12-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581895" comment="mozilla-nspr-32bit-4.12-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581896" comment="mozilla-nspr-x86-4.12-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581897" comment="mozilla-nss-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581898" comment="mozilla-nss-32bit-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581899" comment="mozilla-nss-tools-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581900" comment="mozilla-nss-x86-3.20.2-30.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219731" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLE and mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="983549" ref_url="https://bugzilla.suse.com/983549" source="BUGZILLA"/>
		<reference ref_id="983638" ref_url="https://bugzilla.suse.com/983638" source="BUGZILLA"/>
		<reference ref_id="983639" ref_url="https://bugzilla.suse.com/983639" source="BUGZILLA"/>
		<reference ref_id="983643" ref_url="https://bugzilla.suse.com/983643" source="BUGZILLA"/>
		<reference ref_id="983646" ref_url="https://bugzilla.suse.com/983646" source="BUGZILLA"/>
		<reference ref_id="983651" ref_url="https://bugzilla.suse.com/983651" source="BUGZILLA"/>
		<reference ref_id="983652" ref_url="https://bugzilla.suse.com/983652" source="BUGZILLA"/>
		<reference ref_id="983653" ref_url="https://bugzilla.suse.com/983653" source="BUGZILLA"/>
		<reference ref_id="983655" ref_url="https://bugzilla.suse.com/983655" source="BUGZILLA"/>
		<reference ref_id="984006" ref_url="https://bugzilla.suse.com/984006" source="BUGZILLA"/>
		<reference ref_id="985659" ref_url="https://bugzilla.suse.com/985659" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2815" ref_url="https://www.suse.com/security/cve/CVE-2016-2815/" source="CVE"/>
		<reference ref_id="CVE-2016-2818" ref_url="https://www.suse.com/security/cve/CVE-2016-2818/" source="CVE"/>
		<reference ref_id="CVE-2016-2819" ref_url="https://www.suse.com/security/cve/CVE-2016-2819/" source="CVE"/>
		<reference ref_id="CVE-2016-2821" ref_url="https://www.suse.com/security/cve/CVE-2016-2821/" source="CVE"/>
		<reference ref_id="CVE-2016-2822" ref_url="https://www.suse.com/security/cve/CVE-2016-2822/" source="CVE"/>
		<reference ref_id="CVE-2016-2824" ref_url="https://www.suse.com/security/cve/CVE-2016-2824/" source="CVE"/>
		<reference ref_id="CVE-2016-2828" ref_url="https://www.suse.com/security/cve/CVE-2016-2828/" source="CVE"/>
		<reference ref_id="CVE-2016-2831" ref_url="https://www.suse.com/security/cve/CVE-2016-2831/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002156.html" source="SUSE-SU"/>
		<description>
MozillaFirefox, MozillaFirefox-branding-SLE and  mozilla-nss were updated to fix nine security issues.

MozillaFirefox was updated to version 45.2.0 ESR. mozilla-nss was updated to version 3.21.1.

These security issues were fixed:
- CVE-2016-2834: Memory safety bugs in NSS (MFSA 2016-61) (bsc#983639).
- CVE-2016-2824: Out-of-bounds write with WebGL shader (MFSA 2016-53) (bsc#983651).
- CVE-2016-2822: Addressbar spoofing though the SELECT element (MFSA 2016-52) (bsc#983652).
- CVE-2016-2821: Use-after-free deleting tables from a contenteditable document (MFSA 2016-51) (bsc#983653).
- CVE-2016-2819: Buffer overflow parsing HTML5 fragments (MFSA 2016-50) (bsc#983655).
- CVE-2016-2828: Use-after-free when textures are used in WebGL operations after recycle pool destruction (MFSA 2016-56) (bsc#983646).
- CVE-2016-2831: Entering fullscreen and persistent pointerlock without user permission (MFSA 2016-58) (bsc#983643).
- CVE-2016-2815, CVE-2016-2818: Miscellaneous memory safety hazards (MFSA 2016-49) (bsc#983638)

These non-security issues were fixed:
- Fix crashes on aarch64
  * Determine page size at runtime (bsc#984006)
  * Allow aarch64 to work in safe mode (bsc#985659)
- Fix crashes on mainframes

All extensions must now be signed by addons.mozilla.org. Please read README.SUSE for more details.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-14"/>
	<updated date="2016-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983638">SUSE bug 983638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983639">SUSE bug 983639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983643">SUSE bug 983643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983646">SUSE bug 983646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983651">SUSE bug 983651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983652">SUSE bug 983652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983653">SUSE bug 983653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983655">SUSE bug 983655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984006">SUSE bug 984006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985659">SUSE bug 985659</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2815/">CVE-2016-2815 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2815">CVE-2016-2815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2818/">CVE-2016-2818 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2818">CVE-2016-2818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2819/">CVE-2016-2819 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2819">CVE-2016-2819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2821/">CVE-2016-2821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2821">CVE-2016-2821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2822/">CVE-2016-2822 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2822">CVE-2016-2822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2824/">CVE-2016-2824 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2824">CVE-2016-2824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2828/">CVE-2016-2828 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2828">CVE-2016-2828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2831/">CVE-2016-2831 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2831">CVE-2016-2831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2834">CVE-2016-2834 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581901" comment="MozillaFirefox-45.2.0esr-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581902" comment="MozillaFirefox-branding-SLED-45.0-23.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581903" comment="MozillaFirefox-translations-45.2.0esr-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581904" comment="firefox-fontconfig-2.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581905" comment="libfreebl3-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581906" comment="libfreebl3-32bit-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581907" comment="libfreebl3-x86-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581908" comment="libsoftokn3-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581909" comment="libsoftokn3-32bit-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581910" comment="libsoftokn3-x86-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581911" comment="mozilla-nspr-4.12-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581912" comment="mozilla-nspr-32bit-4.12-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581913" comment="mozilla-nspr-x86-4.12-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581914" comment="mozilla-nss-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581915" comment="mozilla-nss-32bit-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581916" comment="mozilla-nss-tools-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581917" comment="mozilla-nss-x86-3.21.1-35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581901" comment="MozillaFirefox-45.2.0esr-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581902" comment="MozillaFirefox-branding-SLED-45.0-23.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581903" comment="MozillaFirefox-translations-45.2.0esr-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581904" comment="firefox-fontconfig-2.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581905" comment="libfreebl3-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581906" comment="libfreebl3-32bit-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581907" comment="libfreebl3-x86-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581908" comment="libsoftokn3-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581909" comment="libsoftokn3-32bit-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581910" comment="libsoftokn3-x86-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581911" comment="mozilla-nspr-4.12-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581912" comment="mozilla-nspr-32bit-4.12-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581913" comment="mozilla-nspr-x86-4.12-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581914" comment="mozilla-nss-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581915" comment="mozilla-nss-32bit-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581916" comment="mozilla-nss-tools-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581917" comment="mozilla-nss-x86-3.21.1-35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219732" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="989196" ref_url="https://bugzilla.suse.com/989196" source="BUGZILLA"/>
		<reference ref_id="990628" ref_url="https://bugzilla.suse.com/990628" source="BUGZILLA"/>
		<reference ref_id="990856" ref_url="https://bugzilla.suse.com/990856" source="BUGZILLA"/>
		<reference ref_id="991809" ref_url="https://bugzilla.suse.com/991809" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-2835" ref_url="https://www.suse.com/security/cve/CVE-2016-2835/" source="CVE"/>
		<reference ref_id="CVE-2016-2836" ref_url="https://www.suse.com/security/cve/CVE-2016-2836/" source="CVE"/>
		<reference ref_id="CVE-2016-2837" ref_url="https://www.suse.com/security/cve/CVE-2016-2837/" source="CVE"/>
		<reference ref_id="CVE-2016-2838" ref_url="https://www.suse.com/security/cve/CVE-2016-2838/" source="CVE"/>
		<reference ref_id="CVE-2016-2839" ref_url="https://www.suse.com/security/cve/CVE-2016-2839/" source="CVE"/>
		<reference ref_id="CVE-2016-5252" ref_url="https://www.suse.com/security/cve/CVE-2016-5252/" source="CVE"/>
		<reference ref_id="CVE-2016-5254" ref_url="https://www.suse.com/security/cve/CVE-2016-5254/" source="CVE"/>
		<reference ref_id="CVE-2016-5258" ref_url="https://www.suse.com/security/cve/CVE-2016-5258/" source="CVE"/>
		<reference ref_id="CVE-2016-5259" ref_url="https://www.suse.com/security/cve/CVE-2016-5259/" source="CVE"/>
		<reference ref_id="CVE-2016-5262" ref_url="https://www.suse.com/security/cve/CVE-2016-5262/" source="CVE"/>
		<reference ref_id="CVE-2016-5263" ref_url="https://www.suse.com/security/cve/CVE-2016-5263/" source="CVE"/>
		<reference ref_id="CVE-2016-5264" ref_url="https://www.suse.com/security/cve/CVE-2016-5264/" source="CVE"/>
		<reference ref_id="CVE-2016-5265" ref_url="https://www.suse.com/security/cve/CVE-2016-5265/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002245.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to 45.3.0 ESR to fix the following issues
(bsc#991809):

* MFSA 2016-62/CVE-2016-2835/CVE-2016-2836
  Miscellaneous memory safety hazards (rv:48.0 / rv:45.3)
* MFSA 2016-63/CVE-2016-2830
  Favicon network connection can persist when page is closed
* MFSA 2016-64/CVE-2016-2838
  Buffer overflow rendering SVG with bidirectional content
* MFSA 2016-65/CVE-2016-2839
  Cairo rendering crash due to memory allocation issue with
  FFmpeg 0.10
* MFSA 2016-67/CVE-2016-5252
  Stack underflow during 2D graphics rendering
* MFSA 2016-70/CVE-2016-5254
  Use-after-free when using alt key and toplevel menus
* MFSA 2016-72/CVE-2016-5258
  Use-after-free in DTLS during WebRTC session shutdown
* MFSA 2016-73/CVE-2016-5259
  Use-after-free in service workers with nested sync events
* MFSA 2016-76/CVE-2016-5262
  Scripts on marquee tag can execute in sandboxed iframes
* MFSA 2016-77/CVE-2016-2837
  Buffer overflow in ClearKey Content Decryption Module (CDM)
  during video playback
* MFSA 2016-78/CVE-2016-5263
  Type confusion in display transformation
* MFSA 2016-79/CVE-2016-5264
  Use-after-free when applying SVG effects
* MFSA 2016-80/CVE-2016-5265
  Same-origin policy violation using local HTML file and saved
  shortcut file
* CVE-2016-6354: Fix for possible buffer overrun (bsc#990856)

Also a temporary workaround was added:
- Temporarily bind Firefox to the first CPU as a hotfix
  for an apparent race condition (bsc#989196, bsc#990628)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-30"/>
	<updated date="2016-08-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/989196">SUSE bug 989196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990628">SUSE bug 990628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990856">SUSE bug 990856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2830">CVE-2016-2830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2835/">CVE-2016-2835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2835">CVE-2016-2835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2836/">CVE-2016-2836 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2836">CVE-2016-2836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2837/">CVE-2016-2837 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2837">CVE-2016-2837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2838/">CVE-2016-2838 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2838">CVE-2016-2838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2839/">CVE-2016-2839 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2839">CVE-2016-2839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5252/">CVE-2016-5252 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5252">CVE-2016-5252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5254/">CVE-2016-5254 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5254">CVE-2016-5254 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5258/">CVE-2016-5258 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5258">CVE-2016-5258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5259/">CVE-2016-5259 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5259">CVE-2016-5259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5262/">CVE-2016-5262 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5262">CVE-2016-5262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5263/">CVE-2016-5263 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5263">CVE-2016-5263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5264/">CVE-2016-5264 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5264">CVE-2016-5264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5265/">CVE-2016-5265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5265">CVE-2016-5265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6354">CVE-2016-6354 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581918" comment="MozillaFirefox-45.3.0esr-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581919" comment="MozillaFirefox-translations-45.3.0esr-50.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581918" comment="MozillaFirefox-45.3.0esr-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581919" comment="MozillaFirefox-translations-45.3.0esr-50.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219733" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="999701" ref_url="https://bugzilla.suse.com/999701" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5250" ref_url="https://www.suse.com/security/cve/CVE-2016-5250/" source="CVE"/>
		<reference ref_id="CVE-2016-5257" ref_url="https://www.suse.com/security/cve/CVE-2016-5257/" source="CVE"/>
		<reference ref_id="CVE-2016-5261" ref_url="https://www.suse.com/security/cve/CVE-2016-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-5270" ref_url="https://www.suse.com/security/cve/CVE-2016-5270/" source="CVE"/>
		<reference ref_id="CVE-2016-5272" ref_url="https://www.suse.com/security/cve/CVE-2016-5272/" source="CVE"/>
		<reference ref_id="CVE-2016-5274" ref_url="https://www.suse.com/security/cve/CVE-2016-5274/" source="CVE"/>
		<reference ref_id="CVE-2016-5276" ref_url="https://www.suse.com/security/cve/CVE-2016-5276/" source="CVE"/>
		<reference ref_id="CVE-2016-5277" ref_url="https://www.suse.com/security/cve/CVE-2016-5277/" source="CVE"/>
		<reference ref_id="CVE-2016-5278" ref_url="https://www.suse.com/security/cve/CVE-2016-5278/" source="CVE"/>
		<reference ref_id="CVE-2016-5280" ref_url="https://www.suse.com/security/cve/CVE-2016-5280/" source="CVE"/>
		<reference ref_id="CVE-2016-5281" ref_url="https://www.suse.com/security/cve/CVE-2016-5281/" source="CVE"/>
		<reference ref_id="CVE-2016-5284" ref_url="https://www.suse.com/security/cve/CVE-2016-5284/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002330.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to 45.4.0 ESR to fix the following issues (bsc#999701):

The following security issue were fixed:
* MFSA 2016-86/CVE-2016-5270: Heap-buffer-overflow in nsCaseTransformTextRunFactory::TransformString
* MFSA 2016-86/CVE-2016-5272: Bad cast in nsImageGeometryMixin
* MFSA 2016-86/CVE-2016-5276: Heap-use-after-free in mozilla::a11y::DocAccessible::ProcessInvalidationList
* MFSA 2016-86/CVE-2016-5274: use-after-free in nsFrameManager::CaptureFrameState
* MFSA 2016-86/CVE-2016-5277: Heap-use-after-free in nsRefreshDriver::Tick
* MFSA 2016-86/CVE-2016-5278: Heap-buffer-overflow in nsBMPEncoder::AddImageFrame
* MFSA 2016-86/CVE-2016-5280: Use-after-free in mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap
* MFSA 2016-86/CVE-2016-5281: use-after-free in DOMSVGLength
* MFSA 2016-86/CVE-2016-5284: Add-on update site certificate pin expiration
* MFSA 2016-86/CVE-2016-5250: Resource Timing API is storing resources sent by the previous page
* MFSA 2016-86/CVE-2016-5261: Integer overflow and memory corruption in WebSocketChannel
* MFSA 2016-86/CVE-2016-5257: Various memory safety bugs fixed in Firefox 49 and Firefox ESR 45.4
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-12"/>
	<updated date="2016-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5250/">CVE-2016-5250 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5250">CVE-2016-5250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5257/">CVE-2016-5257 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5257">CVE-2016-5257 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5261/">CVE-2016-5261 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5261">CVE-2016-5261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5270/">CVE-2016-5270 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5270">CVE-2016-5270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5272/">CVE-2016-5272 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5272">CVE-2016-5272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5274/">CVE-2016-5274 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5274">CVE-2016-5274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5276/">CVE-2016-5276 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5276">CVE-2016-5276 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5277/">CVE-2016-5277 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5277">CVE-2016-5277 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5278/">CVE-2016-5278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5278">CVE-2016-5278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5280/">CVE-2016-5280 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5280">CVE-2016-5280 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5281/">CVE-2016-5281 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5281">CVE-2016-5281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5284/">CVE-2016-5284 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5284">CVE-2016-5284 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581920" comment="MozillaFirefox-45.4.0esr-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581921" comment="MozillaFirefox-translations-45.4.0esr-53.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581920" comment="MozillaFirefox-45.4.0esr-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581921" comment="MozillaFirefox-translations-45.4.0esr-53.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219734" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1000751" ref_url="https://bugzilla.suse.com/1000751" source="BUGZILLA"/>
		<reference ref_id="1015422" ref_url="https://bugzilla.suse.com/1015422" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9893" ref_url="https://www.suse.com/security/cve/CVE-2016-9893/" source="CVE"/>
		<reference ref_id="CVE-2016-9895" ref_url="https://www.suse.com/security/cve/CVE-2016-9895/" source="CVE"/>
		<reference ref_id="CVE-2016-9897" ref_url="https://www.suse.com/security/cve/CVE-2016-9897/" source="CVE"/>
		<reference ref_id="CVE-2016-9898" ref_url="https://www.suse.com/security/cve/CVE-2016-9898/" source="CVE"/>
		<reference ref_id="CVE-2016-9899" ref_url="https://www.suse.com/security/cve/CVE-2016-9899/" source="CVE"/>
		<reference ref_id="CVE-2016-9900" ref_url="https://www.suse.com/security/cve/CVE-2016-9900/" source="CVE"/>
		<reference ref_id="CVE-2016-9901" ref_url="https://www.suse.com/security/cve/CVE-2016-9901/" source="CVE"/>
		<reference ref_id="CVE-2016-9902" ref_url="https://www.suse.com/security/cve/CVE-2016-9902/" source="CVE"/>
		<reference ref_id="CVE-2016-9904" ref_url="https://www.suse.com/security/cve/CVE-2016-9904/" source="CVE"/>
		<reference ref_id="CVE-2016-9905" ref_url="https://www.suse.com/security/cve/CVE-2016-9905/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002507.html" source="SUSE-SU"/>
		<description>

MozillaFirefox 45 ESR was updated to 45.6 to fix the following issues:

* MFSA 2016-95/CVE-2016-9897: Memory corruption in libGLES
* MFSA 2016-95/CVE-2016-9901: Data from Pocket server improperly sanitized before execution
* MFSA 2016-95/CVE-2016-9898: Use-after-free in Editor while manipulating DOM subtrees
* MFSA 2016-95/CVE-2016-9899: Use-after-free while manipulating DOM events and audio elements
* MFSA 2016-95/CVE-2016-9904: Cross-origin information leak in shared atoms
* MFSA 2016-95/CVE-2016-9905: Crash in EnumerateSubDocuments
* MFSA 2016-95/CVE-2016-9895: CSP bypass using marquee tag
* MFSA 2016-95/CVE-2016-9900: Restricted external resources can be loaded by SVG images through data URLs
* MFSA 2016-95/CVE-2016-9893: Memory safety bugs fixed in Firefox 50.1 and Firefox ESR 45.6
* MFSA 2016-95/CVE-2016-9902: Pocket extension does not validate the origin of events

Please see https://www.mozilla.org/en-US/security/advisories/mfsa2016-95/
for more information.

Also the following bug was fixed:
- Fix fontconfig issue (bsc#1000751) on 32bit systems as well.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-21"/>
	<updated date="2016-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000751">SUSE bug 1000751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9893/">CVE-2016-9893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9893">CVE-2016-9893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9895/">CVE-2016-9895 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9895">CVE-2016-9895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9897/">CVE-2016-9897 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9897">CVE-2016-9897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9898/">CVE-2016-9898 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9898">CVE-2016-9898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9899/">CVE-2016-9899 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9899">CVE-2016-9899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9900/">CVE-2016-9900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9900">CVE-2016-9900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9901/">CVE-2016-9901 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9901">CVE-2016-9901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9902/">CVE-2016-9902 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9902">CVE-2016-9902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9904/">CVE-2016-9904 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9904">CVE-2016-9904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9905/">CVE-2016-9905 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9905">CVE-2016-9905 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581922" comment="MozillaFirefox-45.6.0esr-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581923" comment="MozillaFirefox-translations-45.6.0esr-62.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581922" comment="MozillaFirefox-45.6.0esr-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581923" comment="MozillaFirefox-translations-45.6.0esr-62.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219735" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1021814" ref_url="https://bugzilla.suse.com/1021814" source="BUGZILLA"/>
		<reference ref_id="1021817" ref_url="https://bugzilla.suse.com/1021817" source="BUGZILLA"/>
		<reference ref_id="1021818" ref_url="https://bugzilla.suse.com/1021818" source="BUGZILLA"/>
		<reference ref_id="1021819" ref_url="https://bugzilla.suse.com/1021819" source="BUGZILLA"/>
		<reference ref_id="1021820" ref_url="https://bugzilla.suse.com/1021820" source="BUGZILLA"/>
		<reference ref_id="1021821" ref_url="https://bugzilla.suse.com/1021821" source="BUGZILLA"/>
		<reference ref_id="1021822" ref_url="https://bugzilla.suse.com/1021822" source="BUGZILLA"/>
		<reference ref_id="1021823" ref_url="https://bugzilla.suse.com/1021823" source="BUGZILLA"/>
		<reference ref_id="1021824" ref_url="https://bugzilla.suse.com/1021824" source="BUGZILLA"/>
		<reference ref_id="1021991" ref_url="https://bugzilla.suse.com/1021991" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5373" ref_url="https://www.suse.com/security/cve/CVE-2017-5373/" source="CVE"/>
		<reference ref_id="CVE-2017-5375" ref_url="https://www.suse.com/security/cve/CVE-2017-5375/" source="CVE"/>
		<reference ref_id="CVE-2017-5376" ref_url="https://www.suse.com/security/cve/CVE-2017-5376/" source="CVE"/>
		<reference ref_id="CVE-2017-5378" ref_url="https://www.suse.com/security/cve/CVE-2017-5378/" source="CVE"/>
		<reference ref_id="CVE-2017-5380" ref_url="https://www.suse.com/security/cve/CVE-2017-5380/" source="CVE"/>
		<reference ref_id="CVE-2017-5383" ref_url="https://www.suse.com/security/cve/CVE-2017-5383/" source="CVE"/>
		<reference ref_id="CVE-2017-5386" ref_url="https://www.suse.com/security/cve/CVE-2017-5386/" source="CVE"/>
		<reference ref_id="CVE-2017-5390" ref_url="https://www.suse.com/security/cve/CVE-2017-5390/" source="CVE"/>
		<reference ref_id="CVE-2017-5396" ref_url="https://www.suse.com/security/cve/CVE-2017-5396/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002632.html" source="SUSE-SU"/>
		<description>

MozillaFirefox 45 ESR was updated to 45.7 to fix the following issues (bsc#1021991):

* MFSA 2017-02/CVE-2017-5378: Pointer and frame data leakage of Javascript objects (bsc#1021818)
* MFSA 2017-02/CVE-2017-5396: Use-after-free with Media Decoder (bsc#1021821)
* MFSA 2017-02/CVE-2017-5386: WebExtensions can use data: protocol to affect other extensions (bsc#1021823)
* MFSA 2017-02/CVE-2017-5380: Potential use-after-free during DOM manipulations (bsc#1021819)
* MFSA 2017-02/CVE-2017-5390: Insecure communication methods in Developer Tools JSON viewer (bsc#1021820)
* MFSA 2017-02/CVE-2017-5373: Memory safety bugs fixed in Firefox 51 and Firefox ESR 45.7 (bsc#1021824)
* MFSA 2017-02/CVE-2017-5375: Excessive JIT code allocation allows bypass of ASLR and DEP (bsc#1021814)
* MFSA 2017-02/CVE-2017-5376: Use-after-free in XSL (bsc#1021817)
* MFSA 2017-02/CVE-2017-5383: Location bar spoofing with unicode characters (bsc#1021822)

Please see https://www.mozilla.org/en-US/security/advisories/mfsa2017-02/
for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-08"/>
	<updated date="2017-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021814">SUSE bug 1021814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021817">SUSE bug 1021817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021818">SUSE bug 1021818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021819">SUSE bug 1021819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021820">SUSE bug 1021820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021821">SUSE bug 1021821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021822">SUSE bug 1021822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021823">SUSE bug 1021823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021824">SUSE bug 1021824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5373/">CVE-2017-5373 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5373">CVE-2017-5373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5375/">CVE-2017-5375 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5375">CVE-2017-5375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5376/">CVE-2017-5376 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5376">CVE-2017-5376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5378/">CVE-2017-5378 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5378">CVE-2017-5378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5380/">CVE-2017-5380 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5380">CVE-2017-5380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5383/">CVE-2017-5383 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5383">CVE-2017-5383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5386/">CVE-2017-5386 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5386">CVE-2017-5386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5390/">CVE-2017-5390 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5390">CVE-2017-5390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5396/">CVE-2017-5396 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5396">CVE-2017-5396 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581924" comment="MozillaFirefox-45.7.0esr-65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581925" comment="MozillaFirefox-translations-45.7.0esr-65.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581924" comment="MozillaFirefox-45.7.0esr-65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581925" comment="MozillaFirefox-translations-45.7.0esr-65.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219736" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027527" ref_url="https://bugzilla.suse.com/1027527" source="BUGZILLA"/>
		<reference ref_id="1028391" ref_url="https://bugzilla.suse.com/1028391" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5398" ref_url="https://www.suse.com/security/cve/CVE-2017-5398/" source="CVE"/>
		<reference ref_id="CVE-2017-5400" ref_url="https://www.suse.com/security/cve/CVE-2017-5400/" source="CVE"/>
		<reference ref_id="CVE-2017-5401" ref_url="https://www.suse.com/security/cve/CVE-2017-5401/" source="CVE"/>
		<reference ref_id="CVE-2017-5402" ref_url="https://www.suse.com/security/cve/CVE-2017-5402/" source="CVE"/>
		<reference ref_id="CVE-2017-5404" ref_url="https://www.suse.com/security/cve/CVE-2017-5404/" source="CVE"/>
		<reference ref_id="CVE-2017-5405" ref_url="https://www.suse.com/security/cve/CVE-2017-5405/" source="CVE"/>
		<reference ref_id="CVE-2017-5407" ref_url="https://www.suse.com/security/cve/CVE-2017-5407/" source="CVE"/>
		<reference ref_id="CVE-2017-5408" ref_url="https://www.suse.com/security/cve/CVE-2017-5408/" source="CVE"/>
		<reference ref_id="CVE-2017-5409" ref_url="https://www.suse.com/security/cve/CVE-2017-5409/" source="CVE"/>
		<reference ref_id="CVE-2017-5410" ref_url="https://www.suse.com/security/cve/CVE-2017-5410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002712.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox to ESR 45.8 fixes the following issues:

Security issues fixed (bsc#1028391):
- CVE-2017-5402: Use-after-free working with events in FontFace objects
- CVE-2017-5410: Memory corruption during JavaScript garbage collection incremental sweeping
- CVE-2017-5400: asm.js JIT-spray bypass of ASLR and DEP
- CVE-2017-5401: Memory Corruption when handling ErrorResult
- CVE-2017-5407: Pixel and history stealing via floating-point timing side channel with SVG filters
- CVE-2017-5404: Use-after-free working with ranges in selections
- CVE-2017-5405: FTP response codes can cause use of uninitialized values for ports
- CVE-2017-5408: Cross-origin reading of video captions in violation of CORS
- CVE-2017-5409: File deletion via callback parameter in Mozilla Windows Updater and Maintenance Service
- CVE-2017-5398: Memory safety bugs fixed in Firefox 52 and Firefox ESR 45.8

Bugfixes:
- fix crashes on Itanium (bsc#1027527)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027527">SUSE bug 1027527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5398/">CVE-2017-5398 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5398">CVE-2017-5398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5400/">CVE-2017-5400 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5400">CVE-2017-5400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5401/">CVE-2017-5401 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5401">CVE-2017-5401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5402/">CVE-2017-5402 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5402">CVE-2017-5402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5404/">CVE-2017-5404 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5404">CVE-2017-5404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5405/">CVE-2017-5405 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5405">CVE-2017-5405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5407/">CVE-2017-5407 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5407">CVE-2017-5407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5408/">CVE-2017-5408 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5408">CVE-2017-5408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5409/">CVE-2017-5409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5409">CVE-2017-5409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5410/">CVE-2017-5410 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5410">CVE-2017-5410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581926" comment="MozillaFirefox-45.8.0esr-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581927" comment="MozillaFirefox-translations-45.8.0esr-68.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581926" comment="MozillaFirefox-45.8.0esr-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581927" comment="MozillaFirefox-translations-45.8.0esr-68.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219737" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss, mozilla-nspr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1015499" ref_url="https://bugzilla.suse.com/1015499" source="BUGZILLA"/>
		<reference ref_id="1015547" ref_url="https://bugzilla.suse.com/1015547" source="BUGZILLA"/>
		<reference ref_id="1021636" ref_url="https://bugzilla.suse.com/1021636" source="BUGZILLA"/>
		<reference ref_id="1030071" ref_url="https://bugzilla.suse.com/1030071" source="BUGZILLA"/>
		<reference ref_id="1035082" ref_url="https://bugzilla.suse.com/1035082" source="BUGZILLA"/>
		<reference ref_id="983639" ref_url="https://bugzilla.suse.com/983639" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="CVE-2016-8635" ref_url="https://www.suse.com/security/cve/CVE-2016-8635/" source="CVE"/>
		<reference ref_id="CVE-2016-9574" ref_url="https://www.suse.com/security/cve/CVE-2016-9574/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5437" ref_url="https://www.suse.com/security/cve/CVE-2017-5437/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to the Firefox ESR release 45.9.

Mozilla NSS was updated to support TLS 1.3 (close to release draft) and various new 
ciphers, PRFs, Diffie Hellman key agreement and support for more hashes.

Security issues fixed in Firefox (bsc#1035082)

- MFSA 2017-11/CVE-2017-5469: Potential Buffer overflow in flex-generated code
- MFSA 2017-11/CVE-2017-5429: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and Firefox ESR 52.1
- MFSA 2017-11/CVE-2017-5439: Use-after-free in nsTArray Length() during XSLT processing
- MFSA 2017-11/CVE-2017-5438: Use-after-free in nsAutoPtr during XSLT processing
- MFSA 2017-11/CVE-2017-5437: Vulnerabilities in Libevent library
- MFSA 2017-11/CVE-2017-5436: Out-of-bounds write with malicious font in Graphite 2
- MFSA 2017-11/CVE-2017-5435: Use-after-free during transaction processing in the editor
- MFSA 2017-11/CVE-2017-5434: Use-after-free during focus handling
- MFSA 2017-11/CVE-2017-5433: Use-after-free in SMIL animation functions
- MFSA 2017-11/CVE-2017-5432: Use-after-free in text input selection
- MFSA 2017-11/CVE-2017-5464: Memory corruption with accessibility and DOM manipulation
- MFSA 2017-11/CVE-2017-5465: Out-of-bounds read in ConvolvePixel
- MFSA 2017-11/CVE-2017-5460: Use-after-free in frame selection
- MFSA 2017-11/CVE-2017-5448: Out-of-bounds write in ClearKeyDecryptor
- MFSA 2017-11/CVE-2017-5446: Out-of-bounds read when HTTP/2 DATA frames are sent with incorrect data
- MFSA 2017-11/CVE-2017-5447: Out-of-bounds read during glyph processing
- MFSA 2017-11/CVE-2017-5444: Buffer overflow while parsing application/http-index-format content
- MFSA 2017-11/CVE-2017-5445: Uninitialized values used while parsing application/http-index-format content
- MFSA 2017-11/CVE-2017-5442: Use-after-free during style changes
- MFSA 2017-11/CVE-2017-5443: Out-of-bounds write during BinHex decoding
- MFSA 2017-11/CVE-2017-5440: Use-after-free in txExecutionState destructor during XSLT processing
- MFSA 2017-11/CVE-2017-5441: Use-after-free with selection during scroll events
- MFSA 2017-11/CVE-2017-5459: Buffer overflow in WebGL

Mozilla NSS was updated to 3.29.5, bringing new features and fixing bugs:

- Update to NSS 3.29.5:
  * MFSA 2017-11/CVE-2017-5461: Rare crashes in the base 64 decoder and encoder were fixed.
  * MFSA 2017-11/CVE-2017-5462: A carry over bug in the RNG was fixed.
  * CVE-2016-9574: Remote DoS during session handshake when using SessionTicket extention and ECDHE-ECDSA (bsc#1015499).
  * requires NSPR &gt;= 4.13.1

- Update to NSS 3.29.3

  * enables TLS 1.3 by default

- Fixed a bug in hash computation (and build with
  GCC 7 which complains about shifts of boolean values).
  (bsc#1030071, bmo#1348767)

- Update to NSS 3.28.3

  This is a patch release to fix binary compatibility issues.

- Update to NSS 3.28.1

  This is a patch release to update the list of root CA certificates.

  * The following CA certificates were Removed

    CN = Buypass Class 2 CA 1
    CN = Root CA Generalitat Valenciana
    OU = RSA Security 2048 V3

  * The following CA certificates were Added

    OU = AC RAIZ FNMT-RCM
    CN = Amazon Root CA 1
    CN = Amazon Root CA 2
    CN = Amazon Root CA 3
    CN = Amazon Root CA 4
    CN = LuxTrust Global Root 2
    CN = Symantec Class 1 Public Primary Certification Authority - G4
    CN = Symantec Class 1 Public Primary Certification Authority - G6
    CN = Symantec Class 2 Public Primary Certification Authority - G4
    CN = Symantec Class 2 Public Primary Certification Authority - G6

  * The version number of the updated root CA list has been set to 2.11

- Update to NSS 3.28

  New functionality:

  * NSS includes support for TLS 1.3 draft -18. This includes a number
    of improvements to TLS 1.3:

    - The signed certificate timestamp, used in certificate
      transparency, is supported in TLS 1.3.
    - Key exporters for TLS 1.3 are supported. This includes the early
      key exporter, which can be used if 0-RTT is enabled. Note that
      there is a difference between TLS 1.3 and key exporters in older
      versions of TLS. TLS 1.3 does not distinguish between an empty
      context and no context.
    - The TLS 1.3 (draft) protocol can be enabled, by defining
      NSS_ENABLE_TLS_1_3=1 when building NSS.
    - NSS includes support for the X25519 key exchange algorithm,
      which is supported and enabled by default in all versions of TLS.

  Notable Changes:

  * NSS can no longer be compiled with support for additional elliptic curves.
    This was previously possible by replacing certain NSS source files.
  * NSS will now detect the presence of tokens that support additional
    elliptic curves and enable those curves for use in TLS.
    Note that this detection has a one-off performance cost, which can be
    avoided by using the SSL_NamedGroupConfig function to limit supported
    groups to those that NSS provides.
  * PKCS#11 bypass for TLS is no longer supported and has been removed.
  * Support for 'export' grade SSL/TLS cipher suites has been removed.
  * NSS now uses the signature schemes definition in TLS 1.3.
    This also affects TLS 1.2. NSS will now only generate signatures with the
    combinations of hash and signature scheme that are defined in TLS 1.3,
    even when negotiating TLS 1.2.

    - This means that SHA-256 will only be used with P-256 ECDSA certificates,
      SHA-384 with P-384 certificates, and SHA-512 with P-521 certificates.
      SHA-1 is permitted (in TLS 1.2 only) with any certificate for backward
      compatibility reasons.
    - NSS will now no longer assume that default signature schemes are
      supported by a peer if there was no commonly supported signature scheme.

  * NSS will now check if RSA-PSS signing is supported by the token that holds
    the private key prior to using it for TLS.
  * The certificate validation code contains checks to no longer trust
    certificates that are issued by old WoSign and StartCom CAs after
    October 21, 2016. This is equivalent to the behavior that Mozilla will
    release with Firefox 51.

- Update to NSS 3.27.2
  * Fixed SSL_SetTrustAnchors leaks (bmo#1318561)

  - raised the minimum softokn/freebl version to 3.28 as reported in (boo#1021636)

- Update to NSS 3.26.2

  New Functionality:

  * the selfserv test utility has been enhanced to support ALPN
    (HTTP/1.1) and 0-RTT
  * added support for the System-wide crypto policy available on
    Fedora Linux see http://fedoraproject.org/wiki/Changes/CryptoPolicy
  * introduced build flag NSS_DISABLE_LIBPKIX that allows compilation
    of NSS without the libpkix library

  Notable Changes:

  * The following CA certificate was Added
    CN = ISRG Root X1
  * NPN is disabled and ALPN is enabled by default
  * the NSS test suite now completes with the experimental TLS 1.3
    code enabled
  * several test improvements and additions, including a NIST known answer test

  Changes in 3.26.2
  * MD5 signature algorithms sent by the server in CertificateRequest
    messages are now properly ignored. Previously, with rare server
    configurations, an MD5 signature algorithm might have been selected
    for client authentication and caused the client to abort the
    connection soon after.

- Update to NSS 3.25

  New functionality:

  * Implemented DHE key agreement for TLS 1.3
  * Added support for ChaCha with TLS 1.3
  * Added support for TLS 1.2 ciphersuites that use SHA384 as the PRF
  * In previous versions, when using client authentication with TLS 1.2,
    NSS only supported certificate_verify messages that used the same
    signature hash algorithm as used by the PRF. This limitation has
    been removed.

  Notable changes:

  * An SSL socket can no longer be configured to allow both TLS 1.3 and SSLv3
  * Regression fix: NSS no longer reports a failure if an application
    attempts to disable the SSLv2 protocol.
  * The list of trusted CA certificates has been updated to version 2.8
  * The following CA certificate was Removed
    Sonera Class1 CA
  * The following CA certificates were Added
    Hellenic Academic and Research Institutions RootCA 2015
    Hellenic Academic and Research Institutions ECC RootCA 2015
    Certplus Root CA G1
    Certplus Root CA G2
    OpenTrust Root CA G1
    OpenTrust Root CA G2
    OpenTrust Root CA G3

- Update to NSS 3.24

  New functionality:

  * NSS softoken has been updated with the latest National Institute
    of Standards and Technology (NIST) guidance (as of 2015):
    - Software integrity checks and POST functions are executed on
      shared library load. These checks have been disabled by default,
      as they can cause a performance regression. To enable these
      checks, you must define symbol NSS_FORCE_FIPS when building NSS.
    - Counter mode and Galois/Counter Mode (GCM) have checks to
      prevent counter overflow.
    - Additional CSPs are zeroed in the code.
    - NSS softoken uses new guidance for how many Rabin-Miller tests
      are needed to verify a prime based on prime size.
  * NSS softoken has also been updated to allow NSS to run in FIPS
    Level 1 (no password). This mode is triggered by setting the
    database password to the empty string. In FIPS mode, you may move
    from Level 1 to Level 2 (by setting an appropriate password),
    but not the reverse.
  * A SSL_ConfigServerCert function has been added for configuring
    SSL/TLS server sockets with a certificate and private key. Use
    this new function in place of SSL_ConfigSecureServer,
    SSL_ConfigSecureServerWithCertChain, SSL_SetStapledOCSPResponses,
    and SSL_SetSignedCertTimestamps. SSL_ConfigServerCert automatically
    determines the certificate type from the certificate and private key.
    The caller is no longer required to use SSLKEAType explicitly to
    select a 'slot' into which the certificate is configured (which
    incorrectly identifies a key agreement type rather than a certificate).
    Separate functions for configuring Online Certificate Status Protocol
    (OCSP) responses or Signed Certificate Timestamps are not needed,
    since these can be added to the optional SSLExtraServerCertData struct
    provided to SSL_ConfigServerCert.  Also, partial support for RSA
    Probabilistic Signature Scheme (RSA-PSS) certificates has been added.
    Although these certificates can be configured, they will not be
    used by NSS in this version.
  * Deprecate the member attribute authAlgorithm of type SSLCipherSuiteInfo.
    Instead, applications should use the newly added attribute authType.
  * Add a shared library (libfreeblpriv3) on Linux platforms that
    define FREEBL_LOWHASH.
  * Remove most code related to SSL v2, including the ability to actively
    send a SSLv2-compatible client hello. However, the server-side
    implementation of the SSL/TLS protocol still supports processing
    of received v2-compatible client hello messages.
  * Disable (by default) NSS support in optimized builds for logging SSL/TLS
    key material to a logfile if the SSLKEYLOGFILE environment variable
    is set. To enable the functionality in optimized builds, you must define
    the symbol NSS_ALLOW_SSLKEYLOGFILE when building NSS.
  * Update NSS to protect it against the Cachebleed attack.
  * Disable support for DTLS compression.
  * Improve support for TLS 1.3. This includes support for DTLS 1.3.
    Note that TLS 1.3 support is experimental and not suitable for
    production use.

- Update to NSS 3.23

  New functionality:

  * ChaCha20/Poly1305 cipher and TLS cipher suites now supported
  * Experimental-only support TLS 1.3 1-RTT mode (draft-11).
    This code is not ready for production use.

  Notable changes:

  * The list of TLS extensions sent in the TLS handshake has been
    reordered to increase compatibility of the Extended Master Secret
    with with servers
  * The build time environment variable NSS_ENABLE_ZLIB has been
    renamed to NSS_SSL_ENABLE_ZLIB
  * The build time environment variable NSS_DISABLE_CHACHAPOLY was
    added, which can be used to prevent compilation of the
    ChaCha20/Poly1305 code.
  * The following CA certificates were Removed

    - Staat der Nederlanden Root CA
    - NetLock Minositett Kozjegyzoi (Class QA) Tanusitvanykiado
    - NetLock Kozjegyzoi (Class A) Tanusitvanykiado
    - NetLock Uzleti (Class B) Tanusitvanykiado
    - NetLock Expressz (Class C) Tanusitvanykiado
    - VeriSign Class 1 Public PCA - G2
    - VeriSign Class 3 Public PCA
    - VeriSign Class 3 Public PCA - G2
    - CA Disig

  * The following CA certificates were Added

    + SZAFIR ROOT CA2
    + Certum Trusted Network CA 2

  * The following CA certificate had the Email trust bit turned on

    + Actalis Authentication Root CA

  Security fixes:
  * CVE-2016-2834: Memory safety bugs (boo#983639)
    MFSA-2016-61 bmo#1206283 bmo#1221620 bmo#1241034 bmo#1241037

- Update to NSS 3.22.3
  * Increase compatibility of TLS extended master secret,
    don't send an empty TLS extension last in the handshake
    (bmo#1243641)
  * Fixed a heap-based buffer overflow related to the parsing of
    certain ASN.1 structures. An attacker could create a specially-crafted
    certificate which, when parsed by NSS, would cause a crash or
    execution of arbitrary code with the permissions of the user.
    (CVE-2016-1950, bmo#1245528)

- Update to NSS 3.22.2

  New functionality:

  * RSA-PSS signatures are now supported (bmo#1215295)
  * Pseudorandom functions based on hashes other than SHA-1 are now supported
  * Enforce an External Policy on NSS from a config file (bmo#1009429)

- CVE-2016-8635: Fix for DH small subgroup confinement attack (bsc#1015547)

Mozilla NSPR was updated to version 4.13.1:

  The previously released version 4.13 had changed pipes to be
  nonblocking by default, and as a consequence, PollEvent was
  changed to not block on clear.
  The NSPR development team received reports that these changes
  caused regressions in some applications that use NSPR, and it
  has been decided to revert the changes made in NSPR 4.13.
  NSPR 4.13.1 restores the traditional behavior of pipes and
  PollEvent.

Mozilla NSPR update to version 4.13 had these changes:

- PL_strcmp (and others) were fixed to return consistent results
    when one of the arguments is NULL.
- PollEvent was fixed to not block on clear.
- Pipes are always nonblocking.
- PR_GetNameForIdentity: added thread safety lock and bound checks.
- Removed the PLArena freelist.
- Avoid some integer overflows.
- fixed several comments.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-04"/>
	<updated date="2017-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1015499">SUSE bug 1015499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015547">SUSE bug 1015547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021636">SUSE bug 1021636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030071">SUSE bug 1030071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983639">SUSE bug 983639</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1950">CVE-2016-1950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2834">CVE-2016-2834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8635/">CVE-2016-8635 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8635">CVE-2016-8635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9574/">CVE-2016-9574 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9574">CVE-2016-9574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5429">CVE-2017-5429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5432">CVE-2017-5432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5433">CVE-2017-5433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5434">CVE-2017-5434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5435">CVE-2017-5435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5436">CVE-2017-5436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5437/">CVE-2017-5437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5437">CVE-2017-5437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5438">CVE-2017-5438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5439">CVE-2017-5439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5440">CVE-2017-5440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5441">CVE-2017-5441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5442">CVE-2017-5442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5443">CVE-2017-5443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5444">CVE-2017-5444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5445">CVE-2017-5445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5446">CVE-2017-5446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5447">CVE-2017-5447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5448">CVE-2017-5448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5459">CVE-2017-5459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5460">CVE-2017-5460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5461">CVE-2017-5461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5462">CVE-2017-5462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5464">CVE-2017-5464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5465">CVE-2017-5465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5469">CVE-2017-5469 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581928" comment="MozillaFirefox-45.9.0esr-71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581929" comment="MozillaFirefox-translations-45.9.0esr-71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581930" comment="libfreebl3-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581931" comment="libfreebl3-32bit-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581932" comment="libfreebl3-x86-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581933" comment="libsoftokn3-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581934" comment="libsoftokn3-32bit-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581935" comment="libsoftokn3-x86-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581936" comment="mozilla-nspr-4.13.1-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581937" comment="mozilla-nspr-32bit-4.13.1-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581938" comment="mozilla-nspr-x86-4.13.1-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581939" comment="mozilla-nss-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581940" comment="mozilla-nss-32bit-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581941" comment="mozilla-nss-tools-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581942" comment="mozilla-nss-x86-3.29.5-46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581928" comment="MozillaFirefox-45.9.0esr-71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581929" comment="MozillaFirefox-translations-45.9.0esr-71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581930" comment="libfreebl3-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581931" comment="libfreebl3-32bit-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581932" comment="libfreebl3-x86-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581933" comment="libsoftokn3-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581934" comment="libsoftokn3-32bit-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581935" comment="libsoftokn3-x86-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581936" comment="mozilla-nspr-4.13.1-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581937" comment="mozilla-nspr-32bit-4.13.1-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581938" comment="mozilla-nspr-x86-4.13.1-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581939" comment="mozilla-nss-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581940" comment="mozilla-nss-32bit-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581941" comment="mozilla-nss-tools-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581942" comment="mozilla-nss-x86-3.29.5-46.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219738" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLED, firefox-gcc5, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1025108" ref_url="https://bugzilla.suse.com/1025108" source="BUGZILLA"/>
		<reference ref_id="1031485" ref_url="https://bugzilla.suse.com/1031485" source="BUGZILLA"/>
		<reference ref_id="1035082" ref_url="https://bugzilla.suse.com/1035082" source="BUGZILLA"/>
		<reference ref_id="1043960" ref_url="https://bugzilla.suse.com/1043960" source="BUGZILLA"/>
		<reference ref_id="930392" ref_url="https://bugzilla.suse.com/930392" source="BUGZILLA"/>
		<reference ref_id="930496" ref_url="https://bugzilla.suse.com/930496" source="BUGZILLA"/>
		<reference ref_id="935510" ref_url="https://bugzilla.suse.com/935510" source="BUGZILLA"/>
		<reference ref_id="939460" ref_url="https://bugzilla.suse.com/939460" source="BUGZILLA"/>
		<reference ref_id="945842" ref_url="https://bugzilla.suse.com/945842" source="BUGZILLA"/>
		<reference ref_id="953831" ref_url="https://bugzilla.suse.com/953831" source="BUGZILLA"/>
		<reference ref_id="954002" ref_url="https://bugzilla.suse.com/954002" source="BUGZILLA"/>
		<reference ref_id="955382" ref_url="https://bugzilla.suse.com/955382" source="BUGZILLA"/>
		<reference ref_id="962765" ref_url="https://bugzilla.suse.com/962765" source="BUGZILLA"/>
		<reference ref_id="964468" ref_url="https://bugzilla.suse.com/964468" source="BUGZILLA"/>
		<reference ref_id="966220" ref_url="https://bugzilla.suse.com/966220" source="BUGZILLA"/>
		<reference ref_id="968771" ref_url="https://bugzilla.suse.com/968771" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<reference ref_id="CVE-2016-10196" ref_url="https://www.suse.com/security/cve/CVE-2016-10196/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5430" ref_url="https://www.suse.com/security/cve/CVE-2017-5430/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448/" source="CVE"/>
		<reference ref_id="CVE-2017-5449" ref_url="https://www.suse.com/security/cve/CVE-2017-5449/" source="CVE"/>
		<reference ref_id="CVE-2017-5451" ref_url="https://www.suse.com/security/cve/CVE-2017-5451/" source="CVE"/>
		<reference ref_id="CVE-2017-5454" ref_url="https://www.suse.com/security/cve/CVE-2017-5454/" source="CVE"/>
		<reference ref_id="CVE-2017-5455" ref_url="https://www.suse.com/security/cve/CVE-2017-5455/" source="CVE"/>
		<reference ref_id="CVE-2017-5456" ref_url="https://www.suse.com/security/cve/CVE-2017-5456/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5466" ref_url="https://www.suse.com/security/cve/CVE-2017-5466/" source="CVE"/>
		<reference ref_id="CVE-2017-5467" ref_url="https://www.suse.com/security/cve/CVE-2017-5467/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<reference ref_id="CVE-2017-5470" ref_url="https://www.suse.com/security/cve/CVE-2017-5470/" source="CVE"/>
		<reference ref_id="CVE-2017-5472" ref_url="https://www.suse.com/security/cve/CVE-2017-5472/" source="CVE"/>
		<reference ref_id="CVE-2017-7749" ref_url="https://www.suse.com/security/cve/CVE-2017-7749/" source="CVE"/>
		<reference ref_id="CVE-2017-7750" ref_url="https://www.suse.com/security/cve/CVE-2017-7750/" source="CVE"/>
		<reference ref_id="CVE-2017-7751" ref_url="https://www.suse.com/security/cve/CVE-2017-7751/" source="CVE"/>
		<reference ref_id="CVE-2017-7752" ref_url="https://www.suse.com/security/cve/CVE-2017-7752/" source="CVE"/>
		<reference ref_id="CVE-2017-7754" ref_url="https://www.suse.com/security/cve/CVE-2017-7754/" source="CVE"/>
		<reference ref_id="CVE-2017-7755" ref_url="https://www.suse.com/security/cve/CVE-2017-7755/" source="CVE"/>
		<reference ref_id="CVE-2017-7756" ref_url="https://www.suse.com/security/cve/CVE-2017-7756/" source="CVE"/>
		<reference ref_id="CVE-2017-7757" ref_url="https://www.suse.com/security/cve/CVE-2017-7757/" source="CVE"/>
		<reference ref_id="CVE-2017-7758" ref_url="https://www.suse.com/security/cve/CVE-2017-7758/" source="CVE"/>
		<reference ref_id="CVE-2017-7761" ref_url="https://www.suse.com/security/cve/CVE-2017-7761/" source="CVE"/>
		<reference ref_id="CVE-2017-7763" ref_url="https://www.suse.com/security/cve/CVE-2017-7763/" source="CVE"/>
		<reference ref_id="CVE-2017-7764" ref_url="https://www.suse.com/security/cve/CVE-2017-7764/" source="CVE"/>
		<reference ref_id="CVE-2017-7765" ref_url="https://www.suse.com/security/cve/CVE-2017-7765/" source="CVE"/>
		<reference ref_id="CVE-2017-7768" ref_url="https://www.suse.com/security/cve/CVE-2017-7768/" source="CVE"/>
		<reference ref_id="CVE-2017-7778" ref_url="https://www.suse.com/security/cve/CVE-2017-7778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox and mozilla-nss fixes the following issues:

Security issues fixed:
- Fixes in Firefox ESR 52.2 (bsc#1043960,MFSA 2017-16)
  - CVE-2017-7758: Out-of-bounds read in Opus encoder
  - CVE-2017-7749: Use-after-free during docshell reloading
  - CVE-2017-7751: Use-after-free with content viewer listeners
  - CVE-2017-5472: Use-after-free using destroyed node when regenerating trees
  - CVE-2017-5470: Memory safety bugs fixed in Firefox 54 and Firefox ESR 52.2
  - CVE-2017-7752: Use-after-free with IME input
  - CVE-2017-7750: Use-after-free with track elements
  - CVE-2017-7768: 32 byte arbitrary file read through Mozilla Maintenance Service
  - CVE-2017-7778: Vulnerabilities in the Graphite 2 library
  - CVE-2017-7754: Out-of-bounds read in WebGL with ImageInfo object
  - CVE-2017-7755: Privilege escalation through Firefox Installer with same directory DLL files
  - CVE-2017-7756: Use-after-free and use-after-scope logging XHR header errors
  - CVE-2017-7757: Use-after-free in IndexedDB
  - CVE-2017-7761: File deletion and privilege escalation through Mozilla Maintenance Service helper.exe application
  - CVE-2017-7763: Mac fonts render some unicode characters as spaces
  - CVE-2017-7765: Mark of the Web bypass when saving executable files
  - CVE-2017-7764: Domain spoofing with combination of Canadian Syllabics and other unicode blocks

- update to Firefox ESR 52.1 (bsc#1035082,MFSA 2017-12)
  - CVE-2016-10196: Vulnerabilities in Libevent library
  - CVE-2017-5443: Out-of-bounds write during BinHex decoding
  - CVE-2017-5429: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and Firefox ESR 52.1
  - CVE-2017-5464: Memory corruption with accessibility and DOM manipulation
  - CVE-2017-5465: Out-of-bounds read in ConvolvePixel
  - CVE-2017-5466: Origin confusion when reloading isolated data:text/html URL
  - CVE-2017-5467: Memory corruption when drawing Skia content
  - CVE-2017-5460: Use-after-free in frame selection
  - CVE-2017-5461: Out-of-bounds write in Base64 encoding in NSS
  - CVE-2017-5448: Out-of-bounds write in ClearKeyDecryptor
  - CVE-2017-5449: Crash during bidirectional unicode manipulation with animation
  - CVE-2017-5446: Out-of-bounds read when HTTP/2 DATA frames are sent with incorrect data
  - CVE-2017-5447: Out-of-bounds read during glyph processing
  - CVE-2017-5444: Buffer overflow while parsing application/http-index-format content
  - CVE-2017-5445: Uninitialized values used while parsing application/http- index-format content
  - CVE-2017-5442: Use-after-free during style changes
  - CVE-2017-5469: Potential Buffer overflow in flex-generated code
  - CVE-2017-5440: Use-after-free in txExecutionState destructor during XSLT processing
  - CVE-2017-5441: Use-after-free with selection during scroll events
  - CVE-2017-5439: Use-after-free in nsTArray Length() during XSLT processing
  - CVE-2017-5438: Use-after-free in nsAutoPtr during XSLT processing
  - CVE-2017-5436: Out-of-bounds write with malicious font in Graphite 2
  - CVE-2017-5435: Use-after-free during transaction processing in the editor
  - CVE-2017-5434: Use-after-free during focus handling
  - CVE-2017-5433: Use-after-free in SMIL animation functions
  - CVE-2017-5432: Use-after-free in text input selection
  - CVE-2017-5430: Memory safety bugs fixed in Firefox 53 and Firefox ESR 52.1
  - CVE-2017-5459: Buffer overflow in WebGL
  - CVE-2017-5462: DRBG flaw in NSS
  - CVE-2017-5455: Sandbox escape through internal feed reader APIs
  - CVE-2017-5454: Sandbox escape allowing file system read access through file picker
  - CVE-2017-5456: Sandbox escape allowing local file system access
  - CVE-2017-5451: Addressbar spoofing with onblur event

- General
  - CVE-2015-5276: Fix for C++11 std::random_device short reads (bsc#945842)

Bugfixes:
- workaround for Firefox hangs (bsc#1031485, bsc#1025108)
- Update to gcc-5-branch head.
  * Includes fixes for (bsc#966220), (bsc#962765), (bsc#964468), (bsc#939460),
    (bsc#930496), (bsc#930392) and (bsc#955382).
- Add fix to revert accidential libffi ABI breakage on AARCH64. (bsc#968771)
- Build s390[x] with --with-tune=z9-109 --with-arch=z900 on SLE11 again. (bsc#954002)
- Fix libffi include install.  (bsc#935510)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-22"/>
	<updated date="2017-08-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1025108">SUSE bug 1025108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031485">SUSE bug 1031485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930392">SUSE bug 930392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930496">SUSE bug 930496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935510">SUSE bug 935510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939460">SUSE bug 939460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945842">SUSE bug 945842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953831">SUSE bug 953831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954002">SUSE bug 954002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955382">SUSE bug 955382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962765">SUSE bug 962765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964468">SUSE bug 964468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966220">SUSE bug 966220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968771">SUSE bug 968771</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5276">CVE-2015-5276 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10196/">CVE-2016-10196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10196">CVE-2016-10196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5429">CVE-2017-5429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5430/">CVE-2017-5430 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5430">CVE-2017-5430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5432">CVE-2017-5432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5433">CVE-2017-5433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5434">CVE-2017-5434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5435">CVE-2017-5435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5436">CVE-2017-5436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5438">CVE-2017-5438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5439">CVE-2017-5439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5440">CVE-2017-5440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5441">CVE-2017-5441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5442">CVE-2017-5442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5443">CVE-2017-5443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5444">CVE-2017-5444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5445">CVE-2017-5445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5446">CVE-2017-5446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5447">CVE-2017-5447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5448">CVE-2017-5448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5449/">CVE-2017-5449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5449">CVE-2017-5449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5451/">CVE-2017-5451 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5451">CVE-2017-5451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5454/">CVE-2017-5454 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5454">CVE-2017-5454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5455/">CVE-2017-5455 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5455">CVE-2017-5455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5456/">CVE-2017-5456 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5456">CVE-2017-5456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5459">CVE-2017-5459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5460">CVE-2017-5460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5461">CVE-2017-5461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5462">CVE-2017-5462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5464">CVE-2017-5464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5465">CVE-2017-5465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5466/">CVE-2017-5466 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5466">CVE-2017-5466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5467/">CVE-2017-5467 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5467">CVE-2017-5467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5469">CVE-2017-5469 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5470/">CVE-2017-5470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5470">CVE-2017-5470 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5472/">CVE-2017-5472 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5472">CVE-2017-5472 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7749/">CVE-2017-7749 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7749">CVE-2017-7749 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7750/">CVE-2017-7750 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7750">CVE-2017-7750 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7751/">CVE-2017-7751 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7751">CVE-2017-7751 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7752/">CVE-2017-7752 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7752">CVE-2017-7752 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7754/">CVE-2017-7754 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7754">CVE-2017-7754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7755/">CVE-2017-7755 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7755">CVE-2017-7755 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7756/">CVE-2017-7756 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7756">CVE-2017-7756 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7757/">CVE-2017-7757 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7757">CVE-2017-7757 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7758/">CVE-2017-7758 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7758">CVE-2017-7758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7761/">CVE-2017-7761 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7761">CVE-2017-7761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7763/">CVE-2017-7763 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7763">CVE-2017-7763 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7764/">CVE-2017-7764 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7764">CVE-2017-7764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7765/">CVE-2017-7765 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7765">CVE-2017-7765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7768/">CVE-2017-7768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7768">CVE-2017-7768 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7778/">CVE-2017-7778 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7778">CVE-2017-7778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581943" comment="MozillaFirefox-52.2.0esr-72.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581944" comment="MozillaFirefox-branding-SLED-52-24.3.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581945" comment="MozillaFirefox-translations-52.2.0esr-72.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581946" comment="firefox-libffi4-5.3.1+r233831-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581947" comment="firefox-libstdc++6-5.3.1+r233831-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581948" comment="libfreebl3-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581949" comment="libfreebl3-32bit-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581950" comment="libfreebl3-x86-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581951" comment="libsoftokn3-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581952" comment="libsoftokn3-32bit-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581953" comment="libsoftokn3-x86-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581954" comment="mozilla-nss-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581955" comment="mozilla-nss-32bit-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581956" comment="mozilla-nss-tools-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581957" comment="mozilla-nss-x86-3.29.5-47.3.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581943" comment="MozillaFirefox-52.2.0esr-72.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581944" comment="MozillaFirefox-branding-SLED-52-24.3.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581945" comment="MozillaFirefox-translations-52.2.0esr-72.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581946" comment="firefox-libffi4-5.3.1+r233831-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581947" comment="firefox-libstdc++6-5.3.1+r233831-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581948" comment="libfreebl3-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581949" comment="libfreebl3-32bit-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581950" comment="libfreebl3-x86-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581951" comment="libsoftokn3-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581952" comment="libsoftokn3-32bit-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581953" comment="libsoftokn3-x86-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581954" comment="mozilla-nss-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581955" comment="mozilla-nss-32bit-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581956" comment="mozilla-nss-tools-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581957" comment="mozilla-nss-x86-3.29.5-47.3.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219739" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1031485" ref_url="https://bugzilla.suse.com/1031485" source="BUGZILLA"/>
		<reference ref_id="1052829" ref_url="https://bugzilla.suse.com/1052829" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7753" ref_url="https://www.suse.com/security/cve/CVE-2017-7753/" source="CVE"/>
		<reference ref_id="CVE-2017-7779" ref_url="https://www.suse.com/security/cve/CVE-2017-7779/" source="CVE"/>
		<reference ref_id="CVE-2017-7782" ref_url="https://www.suse.com/security/cve/CVE-2017-7782/" source="CVE"/>
		<reference ref_id="CVE-2017-7784" ref_url="https://www.suse.com/security/cve/CVE-2017-7784/" source="CVE"/>
		<reference ref_id="CVE-2017-7785" ref_url="https://www.suse.com/security/cve/CVE-2017-7785/" source="CVE"/>
		<reference ref_id="CVE-2017-7786" ref_url="https://www.suse.com/security/cve/CVE-2017-7786/" source="CVE"/>
		<reference ref_id="CVE-2017-7787" ref_url="https://www.suse.com/security/cve/CVE-2017-7787/" source="CVE"/>
		<reference ref_id="CVE-2017-7791" ref_url="https://www.suse.com/security/cve/CVE-2017-7791/" source="CVE"/>
		<reference ref_id="CVE-2017-7792" ref_url="https://www.suse.com/security/cve/CVE-2017-7792/" source="CVE"/>
		<reference ref_id="CVE-2017-7798" ref_url="https://www.suse.com/security/cve/CVE-2017-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-7800" ref_url="https://www.suse.com/security/cve/CVE-2017-7800/" source="CVE"/>
		<reference ref_id="CVE-2017-7801" ref_url="https://www.suse.com/security/cve/CVE-2017-7801/" source="CVE"/>
		<reference ref_id="CVE-2017-7802" ref_url="https://www.suse.com/security/cve/CVE-2017-7802/" source="CVE"/>
		<reference ref_id="CVE-2017-7803" ref_url="https://www.suse.com/security/cve/CVE-2017-7803/" source="CVE"/>
		<reference ref_id="CVE-2017-7804" ref_url="https://www.suse.com/security/cve/CVE-2017-7804/" source="CVE"/>
		<reference ref_id="CVE-2017-7807" ref_url="https://www.suse.com/security/cve/CVE-2017-7807/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003171.html" source="SUSE-SU"/>
		<description>


Mozilla Firefox was updated to the ESR 52.3 release (bsc#1052829)

Following security issues were fixed:

* MFSA 2017-19/CVE-2017-7807: Domain hijacking through AppCache fallback
* MFSA 2017-19/CVE-2017-7791: Spoofing following page navigation with data: protocol and modal alerts
* MFSA 2017-19/CVE-2017-7792: Buffer overflow viewing certificates with an extremely long OID
* MFSA 2017-19/CVE-2017-7782: WindowsDllDetourPatcher allocates memory without DEP protections
* MFSA 2017-19/CVE-2017-7787: Same-origin policy bypass with iframes through page reloads
* MFSA 2017-19/CVE-2017-7786: Buffer overflow while painting non-displayable SVG
* MFSA 2017-19/CVE-2017-7785: Buffer overflow manipulating ARIA attributes in DOM
* MFSA 2017-19/CVE-2017-7784: Use-after-free with image observers
* MFSA 2017-19/CVE-2017-7753: Out-of-bounds read with cached style data and pseudo-elements
* MFSA 2017-19/CVE-2017-7798: XUL injection in the style editor in devtools
* MFSA 2017-19/CVE-2017-7804: Memory protection bypass through WindowsDllDetourPatcher
* MFSA 2017-19/CVE-2017-7779: Memory safety bugs fixed in Firefox 55 and Firefox ESR 52.3
* MFSA 2017-19/CVE-2017-7800: Use-after-free in WebSockets during disconnection
* MFSA 2017-19/CVE-2017-7801: Use-after-free with marquee during window resizing
* MFSA 2017-19/CVE-2017-7802: Use-after-free resizing image elements
* MFSA 2017-19/CVE-2017-7803: CSP containing 'sandbox' improperly applied

This update also fixes:

-  fixed firefox hangs after a while in FUTEX_WAIT_PRIVATE if
   cgroups enabled and running on cpu &gt;=1 (bsc#1031485)
-  The Itanium ia64 build was fixed.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-30"/>
	<updated date="2017-08-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1031485">SUSE bug 1031485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7753/">CVE-2017-7753 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7753">CVE-2017-7753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7779/">CVE-2017-7779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7779">CVE-2017-7779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7782/">CVE-2017-7782 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7782">CVE-2017-7782 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7784/">CVE-2017-7784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7784">CVE-2017-7784 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7785/">CVE-2017-7785 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7785">CVE-2017-7785 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7786/">CVE-2017-7786 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7786">CVE-2017-7786 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7787/">CVE-2017-7787 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7787">CVE-2017-7787 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7791/">CVE-2017-7791 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7791">CVE-2017-7791 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7792/">CVE-2017-7792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7792">CVE-2017-7792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7798/">CVE-2017-7798 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7798">CVE-2017-7798 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7800/">CVE-2017-7800 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7800">CVE-2017-7800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7801/">CVE-2017-7801 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7801">CVE-2017-7801 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7802/">CVE-2017-7802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7802">CVE-2017-7802 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7803/">CVE-2017-7803 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7803">CVE-2017-7803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7804/">CVE-2017-7804 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7804">CVE-2017-7804 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7807/">CVE-2017-7807 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7807">CVE-2017-7807 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581958" comment="MozillaFirefox-52.3.0esr-72.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581959" comment="MozillaFirefox-branding-SLED-52-24.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581960" comment="MozillaFirefox-translations-52.3.0esr-72.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581958" comment="MozillaFirefox-52.3.0esr-72.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581959" comment="MozillaFirefox-branding-SLED-52-24.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581960" comment="MozillaFirefox-translations-52.3.0esr-72.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219740" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1068101" ref_url="https://bugzilla.suse.com/1068101" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7826" ref_url="https://www.suse.com/security/cve/CVE-2017-7826/" source="CVE"/>
		<reference ref_id="CVE-2017-7828" ref_url="https://www.suse.com/security/cve/CVE-2017-7828/" source="CVE"/>
		<reference ref_id="CVE-2017-7830" ref_url="https://www.suse.com/security/cve/CVE-2017-7830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003479.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox ESR 52.5 fixes the following issues:

Security issues fixed:
- CVE-2017-7826: Memory safety bugs fixed (bsc#1068101).
- CVE-2017-7828: Use-after-free of PressShell while restyling layout (bsc#1068101).
- CVE-2017-7830: Cross-origin URL information leak through Resource Timing API (bsc#1068101).

Mozilla Foundation Security Advisory (MFSA 2017-25):
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-25/
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-07"/>
	<updated date="2017-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068101">SUSE bug 1068101</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7826/">CVE-2017-7826 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7826">CVE-2017-7826 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7828/">CVE-2017-7828 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7828">CVE-2017-7828 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7830/">CVE-2017-7830 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7830">CVE-2017-7830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581961" comment="MozillaFirefox-52.5.0esr-72.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581962" comment="MozillaFirefox-translations-52.5.0esr-72.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581961" comment="MozillaFirefox-52.5.0esr-72.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581962" comment="MozillaFirefox-translations-52.5.0esr-72.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219741" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1077291" ref_url="https://bugzilla.suse.com/1077291" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5089" ref_url="https://www.suse.com/security/cve/CVE-2018-5089/" source="CVE"/>
		<reference ref_id="CVE-2018-5091" ref_url="https://www.suse.com/security/cve/CVE-2018-5091/" source="CVE"/>
		<reference ref_id="CVE-2018-5095" ref_url="https://www.suse.com/security/cve/CVE-2018-5095/" source="CVE"/>
		<reference ref_id="CVE-2018-5096" ref_url="https://www.suse.com/security/cve/CVE-2018-5096/" source="CVE"/>
		<reference ref_id="CVE-2018-5097" ref_url="https://www.suse.com/security/cve/CVE-2018-5097/" source="CVE"/>
		<reference ref_id="CVE-2018-5098" ref_url="https://www.suse.com/security/cve/CVE-2018-5098/" source="CVE"/>
		<reference ref_id="CVE-2018-5099" ref_url="https://www.suse.com/security/cve/CVE-2018-5099/" source="CVE"/>
		<reference ref_id="CVE-2018-5102" ref_url="https://www.suse.com/security/cve/CVE-2018-5102/" source="CVE"/>
		<reference ref_id="CVE-2018-5103" ref_url="https://www.suse.com/security/cve/CVE-2018-5103/" source="CVE"/>
		<reference ref_id="CVE-2018-5104" ref_url="https://www.suse.com/security/cve/CVE-2018-5104/" source="CVE"/>
		<reference ref_id="CVE-2018-5117" ref_url="https://www.suse.com/security/cve/CVE-2018-5117/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003706.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version ESR 52.6 fixes several issues.

These security issues were fixed:

- CVE-2018-5091: Use-after-free with DTMF timers (bsc#1077291).
- CVE-2018-5095: Integer overflow in Skia library during edge builder allocation (bsc#1077291).
- CVE-2018-5096: Use-after-free while editing form elements (bsc#1077291).
- CVE-2018-5097: Use-after-free when source document is manipulated during XSLT (bsc#1077291).
- CVE-2018-5098: Use-after-free while manipulating form input elements (bsc#1077291).
- CVE-2018-5099: Use-after-free with widget listener (bsc#1077291).
- CVE-2018-5102: Use-after-free in HTML media elements (bsc#1077291).
- CVE-2018-5103: Use-after-free during mouse event handling (bsc#1077291).
- CVE-2018-5104: Use-after-free during font face manipulation (bsc#1077291).
- CVE-2018-5117: URL spoofing with right-to-left text aligned left-to-right (bsc#1077291).
- CVE-2018-5089: Various memory safety bugs (bsc#1077291).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-05"/>
	<updated date="2018-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5089/">CVE-2018-5089 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5089">CVE-2018-5089 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5091/">CVE-2018-5091 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5091">CVE-2018-5091 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5095/">CVE-2018-5095 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5095">CVE-2018-5095 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5096/">CVE-2018-5096 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5096">CVE-2018-5096 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5097/">CVE-2018-5097 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5097">CVE-2018-5097 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5098/">CVE-2018-5098 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5098">CVE-2018-5098 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5099/">CVE-2018-5099 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5099">CVE-2018-5099 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5102/">CVE-2018-5102 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5102">CVE-2018-5102 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5103/">CVE-2018-5103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5103">CVE-2018-5103 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5104/">CVE-2018-5104 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5104">CVE-2018-5104 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5117/">CVE-2018-5117 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5117">CVE-2018-5117 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581963" comment="MozillaFirefox-52.6.0esr-72.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581964" comment="MozillaFirefox-translations-52.6.0esr-72.20.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581963" comment="MozillaFirefox-52.6.0esr-72.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581964" comment="MozillaFirefox-translations-52.6.0esr-72.20.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219742" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1085130" ref_url="https://bugzilla.suse.com/1085130" source="BUGZILLA"/>
		<reference ref_id="1085671" ref_url="https://bugzilla.suse.com/1085671" source="BUGZILLA"/>
		<reference ref_id="1087059" ref_url="https://bugzilla.suse.com/1087059" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5125" ref_url="https://www.suse.com/security/cve/CVE-2018-5125/" source="CVE"/>
		<reference ref_id="CVE-2018-5127" ref_url="https://www.suse.com/security/cve/CVE-2018-5127/" source="CVE"/>
		<reference ref_id="CVE-2018-5129" ref_url="https://www.suse.com/security/cve/CVE-2018-5129/" source="CVE"/>
		<reference ref_id="CVE-2018-5130" ref_url="https://www.suse.com/security/cve/CVE-2018-5130/" source="CVE"/>
		<reference ref_id="CVE-2018-5131" ref_url="https://www.suse.com/security/cve/CVE-2018-5131/" source="CVE"/>
		<reference ref_id="CVE-2018-5144" ref_url="https://www.suse.com/security/cve/CVE-2018-5144/" source="CVE"/>
		<reference ref_id="CVE-2018-5145" ref_url="https://www.suse.com/security/cve/CVE-2018-5145/" source="CVE"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<reference ref_id="CVE-2018-5147" ref_url="https://www.suse.com/security/cve/CVE-2018-5147/" source="CVE"/>
		<reference ref_id="CVE-2018-5148" ref_url="https://www.suse.com/security/cve/CVE-2018-5148/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed in Firefox ESR 52.7.3 (bsc#1085130):

- CVE-2018-5125: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7
- CVE-2018-5127: Buffer overflow manipulating SVG animatedPathSegList
- CVE-2018-5129: Out-of-bounds write with malformed IPC messages
- CVE-2018-5130: Mismatched RTP payload type can trigger memory corruption
- CVE-2018-5131: Fetch API improperly returns cached copies of no-store/no-cache resources
- CVE-2018-5144: Integer overflow during Unicode conversion
- CVE-2018-5145: Memory safety bugs fixed in Firefox ESR 52.7
- CVE-2018-5146: Out of bounds memory write in libvorbis (bsc#1085671)
- CVE-2018-5147: Out of bounds memory write in libtremor (bsc#1085671)
- CVE-2018-5148: Use-after-free in compositor (MFSA 2018-10) (bsc#1087059)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-10"/>
	<updated date="2018-04-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085671">SUSE bug 1085671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087059">SUSE bug 1087059</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5125/">CVE-2018-5125 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5125">CVE-2018-5125 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5127/">CVE-2018-5127 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5127">CVE-2018-5127 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5129/">CVE-2018-5129 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5129">CVE-2018-5129 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5130/">CVE-2018-5130 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5130">CVE-2018-5130 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5131/">CVE-2018-5131 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5131">CVE-2018-5131 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5144/">CVE-2018-5144 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5144">CVE-2018-5144 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5145/">CVE-2018-5145 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5145">CVE-2018-5145 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5146">CVE-2018-5146 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5147/">CVE-2018-5147 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5147">CVE-2018-5147 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5148/">CVE-2018-5148 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5148">CVE-2018-5148 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581965" comment="MozillaFirefox-52.7.3esr-72.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581966" comment="MozillaFirefox-translations-52.7.3esr-72.27.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581965" comment="MozillaFirefox-52.7.3esr-72.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581966" comment="MozillaFirefox-translations-52.7.3esr-72.27.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219743" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1092548" ref_url="https://bugzilla.suse.com/1092548" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox to ESR 52.8 release fixes the following issues:

Update to Firefox ESR 52.8 (bsc#1092548)

Security issues fixed:

- MFSA 2018-12/CVE-2018-5159: Integer overflow and out-of-bounds write in Skia
- MFSA 2018-12/CVE-2018-5158: Malicious PDF can inject JavaScript into PDF Viewer
- MFSA 2018-12/CVE-2018-5168: Lightweight themes can be installed without user interaction
- MFSA 2018-12/CVE-2018-5150: Memory safety bugs fixed in Firefox 60 and Firefox ESR 52.8
- MFSA 2018-12/CVE-2018-5155: Use-after-free with SVG animations and text paths
- MFSA 2018-12/CVE-2018-5183: Backport critical security fixes in Skia
- MFSA 2018-12/CVE-2018-5157: Same-origin bypass of PDF Viewer to view protected PDF files
- MFSA 2018-12/CVE-2018-5154: Use-after-free with SVG animations and clip paths
- MFSA 2018-12/CVE-2018-5178: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5150">CVE-2018-5150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5154">CVE-2018-5154 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5155">CVE-2018-5155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5157">CVE-2018-5157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5158">CVE-2018-5158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5159">CVE-2018-5159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5168">CVE-2018-5168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5174">CVE-2018-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5178">CVE-2018-5178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5183">CVE-2018-5183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581967" comment="MozillaFirefox-52.8.0esr-72.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581968" comment="MozillaFirefox-translations-52.8.0esr-72.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581967" comment="MozillaFirefox-52.8.0esr-72.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581968" comment="MozillaFirefox-translations-52.8.0esr-72.32.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219744" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1096449" ref_url="https://bugzilla.suse.com/1096449" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6126" ref_url="https://www.suse.com/security/cve/CVE-2018-6126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004220.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following security issue:

- CVE-2018-6126: Prevent heap buffer overflow in rasterizing paths in SVG with Skia (bsc#1096449).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-27"/>
	<updated date="2018-06-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096449">SUSE bug 1096449</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6126/">CVE-2018-6126 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6126">CVE-2018-6126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581969" comment="MozillaFirefox-52.8.1esr-72.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581970" comment="MozillaFirefox-translations-52.8.1esr-72.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581969" comment="MozillaFirefox-52.8.1esr-72.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581970" comment="MozillaFirefox-translations-52.8.1esr-72.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219745" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1098998" ref_url="https://bugzilla.suse.com/1098998" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359/" source="CVE"/>
		<reference ref_id="CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360/" source="CVE"/>
		<reference ref_id="CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362/" source="CVE"/>
		<reference ref_id="CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363/" source="CVE"/>
		<reference ref_id="CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364/" source="CVE"/>
		<reference ref_id="CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365/" source="CVE"/>
		<reference ref_id="CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366/" source="CVE"/>
		<reference ref_id="CVE-2018-12368" ref_url="https://www.suse.com/security/cve/CVE-2018-12368/" source="CVE"/>
		<reference ref_id="CVE-2018-5156" ref_url="https://www.suse.com/security/cve/CVE-2018-5156/" source="CVE"/>
		<reference ref_id="CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version ESR 52.9 fixes the following issues:

- CVE-2018-5188: Various memory safety bugs (bsc#1098998)
- CVE-2018-12368: No warning when opening executable SettingContent-ms files
- CVE-2018-12366: Invalid data handling during QCMS transformations
- CVE-2018-12365: Compromised IPC child process can list local filenames
- CVE-2018-12364: CSRF attacks through 307 redirects and NPAPI plugins
- CVE-2018-12363: Use-after-free when appending DOM nodes
- CVE-2018-12362: Integer overflow in SSSE3 scaler
- CVE-2018-12360: Use-after-free when using focus()
- CVE-2018-5156: Media recorder segmentation fault when track type is changed during capture
- CVE-2018-12359: Buffer overflow using computed size of canvas element
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12359">CVE-2018-12359 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12360">CVE-2018-12360 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12362">CVE-2018-12362 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12363">CVE-2018-12363 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12364">CVE-2018-12364 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12365">CVE-2018-12365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12366">CVE-2018-12366 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12368/">CVE-2018-12368 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12368">CVE-2018-12368 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5156/">CVE-2018-5156 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5156">CVE-2018-5156 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5188">CVE-2018-5188 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581971" comment="MozillaFirefox-52.9.0esr-72.38.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581972" comment="MozillaFirefox-translations-52.9.0esr-72.38.6 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581971" comment="MozillaFirefox-52.9.0esr-72.38.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581972" comment="MozillaFirefox-translations-52.9.0esr-72.38.6 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219746" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1137792" ref_url="https://bugzilla.suse.com/1137792" source="BUGZILLA"/>
		<reference ref_id="1138614" ref_url="https://bugzilla.suse.com/1138614" source="BUGZILLA"/>
		<reference ref_id="1138872" ref_url="https://bugzilla.suse.com/1138872" source="BUGZILLA"/>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11707" ref_url="https://www.suse.com/security/cve/CVE-2019-11707/" source="CVE"/>
		<reference ref_id="CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708/" source="CVE"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version ESR 60.8 fixes the following issues:

Security issues fixed:

- CVE-2019-9811: Sandbox escape via installation of malicious language pack (bsc#1140868).
- CVE-2019-11711: Script injection within domain through inner window reuse (bsc#1140868).
- CVE-2019-11712: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects (bsc#1140868).
- CVE-2019-11713: Use-after-free with HTTP/2 cached stream (bsc#1140868).
- CVE-2019-11729: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (bsc#1140868).
- CVE-2019-11715: HTML parsing error can contribute to content XSS (bsc#1140868).
- CVE-2019-11717: Caret character improperly escaped in origins (bsc#1140868).
- CVE-2019-11719: Out-of-bounds read when importing curve25519 private key (bsc#1140868).
- CVE-2019-11730: Same-origin policy treats all files in a directory as having the same-origin (bsc#1140868).
- CVE-2019-11709: Multiple Memory safety bugs fixed (bsc#1140868).
- CVE-2019-11708: Fix sandbox escape using Prompt:Open (bsc#1138872).
- CVE-2019-11707: Fixed a type confusion vulnerability in Arrary.pop (bsc#1138614)    

Non-security issues fixed:

- Fix broken language plugins (bsc#1137792)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-17"/>
	<updated date="2019-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137792">SUSE bug 1137792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138614">SUSE bug 1138614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138872">SUSE bug 1138872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11707/">CVE-2019-11707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11707">CVE-2019-11707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11708">CVE-2019-11708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11709">CVE-2019-11709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11711">CVE-2019-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11712">CVE-2019-11712 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11713">CVE-2019-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11715">CVE-2019-11715 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11717">CVE-2019-11717 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11719">CVE-2019-11719 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11729">CVE-2019-11729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11730">CVE-2019-11730 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9811">CVE-2019-9811 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570564" comment="MozillaFirefox-60.8.0esr-78.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570565" comment="MozillaFirefox-translations-common-60.8.0esr-78.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570566" comment="MozillaFirefox-translations-other-60.8.0esr-78.43.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219747" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1158328" ref_url="https://bugzilla.suse.com/1158328" source="BUGZILLA"/>
		<reference ref_id="1158527" ref_url="https://bugzilla.suse.com/1158527" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-13722" ref_url="https://www.suse.com/security/cve/CVE-2019-13722/" source="CVE"/>
		<reference ref_id="CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005/" source="CVE"/>
		<reference ref_id="CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008/" source="CVE"/>
		<reference ref_id="CVE-2019-17009" ref_url="https://www.suse.com/security/cve/CVE-2019-17009/" source="CVE"/>
		<reference ref_id="CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010/" source="CVE"/>
		<reference ref_id="CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011/" source="CVE"/>
		<reference ref_id="CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, mozilla-nspr, mozilla-nss fixes the following issues:

Update Firefox Extended Support Release to 68.3.0 ESR (MFSA 2019-37 / bsc#1158328)

Security issues fixed:

- CVE-2019-17008: Use-after-free in worker destruction (bmo#1546331).
- CVE-2019-13722: Stack corruption due to incorrect number of arguments in WebRTC code (bmo#1580156).
- CVE-2019-11745: Out of bounds write in NSS when encrypting with a block cipher (bmo#1586176).
- CVE-2019-17009: Updater temporary files accessible to unprivileged processes (bmo#1510494).
- CVE-2019-17010: Use-after-free when performing device orientation checks (bmo#1581084).
- CVE-2019-17005: Buffer overflow in plain text serializer (bmo#1584170).
- CVE-2019-17011: Use-after-free when retrieving a document in antitracking (bmo#1591334).
- CVE-2019-17012: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3 (bmo#1449736, bmo#1533957, bmo#1560667, bmo#1567209, bmo#1580288, bmo#1585760, bmo#1592502).

Update mozilla-nss to version 3.47.1 (bsc#1158527):

Security issues fixed:

- CVE-2019-11745: EncryptUpdate should use maxout, not block size.

Bug fixes:

- Fix a crash that could be caused by client certificates during startup (bmo#1590495, bsc#1158527)
- Fix compile-time warnings from uninitialized variables in a perl script (bmo#1589810)
- Support AES HW acceleration on ARMv8 (bmo#1152625)
- Allow per-socket run-time ordering of the cipher suites presented in ClientHello (bmo#1267894)
- Add CMAC to FreeBL and PKCS #11 libraries (bmo#1570501)
- Remove arbitrary HKDF output limit by allocating space as needed (bmo#1577953)

Update mozilla-nspr to version 4.23:

Bug fixes:

- fixed a build failure that was introduced in 4.22
- correctness fix for Win64 socket polling
- whitespace in C files was cleaned up and no longer uses tab characters for indenting
- added support for the ARC architecture
- removed support for the following platforms: OSF1/Tru64, DGUX, IRIX, Symbian, BeOS
- correctness and build fixes
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-20"/>
	<updated date="2019-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158527">SUSE bug 1158527</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11745">CVE-2019-11745 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13722/">CVE-2019-13722 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13722">CVE-2019-13722 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17005">CVE-2019-17005 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17008">CVE-2019-17008 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17009/">CVE-2019-17009 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17009">CVE-2019-17009 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17010">CVE-2019-17010 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17011">CVE-2019-17011 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17012">CVE-2019-17012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570567" comment="MozillaFirefox-68.3.0-78.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570568" comment="MozillaFirefox-translations-common-68.3.0-78.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570569" comment="MozillaFirefox-translations-other-68.3.0-78.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570570" comment="libfreebl3-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570571" comment="libfreebl3-32bit-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570572" comment="libsoftokn3-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570573" comment="libsoftokn3-32bit-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570574" comment="mozilla-nspr-4.23-29.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570575" comment="mozilla-nspr-32bit-4.23-29.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581973" comment="mozilla-nspr-devel-4.23-29.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570576" comment="mozilla-nss-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570577" comment="mozilla-nss-32bit-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570578" comment="mozilla-nss-certs-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570579" comment="mozilla-nss-certs-32bit-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581974" comment="mozilla-nss-devel-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570580" comment="mozilla-nss-tools-3.47.1-38.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219748" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1160305" ref_url="https://bugzilla.suse.com/1160305" source="BUGZILLA"/>
		<reference ref_id="1160498" ref_url="https://bugzilla.suse.com/1160498" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17015" ref_url="https://www.suse.com/security/cve/CVE-2019-17015/" source="CVE"/>
		<reference ref_id="CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016/" source="CVE"/>
		<reference ref_id="CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017/" source="CVE"/>
		<reference ref_id="CVE-2019-17021" ref_url="https://www.suse.com/security/cve/CVE-2019-17021/" source="CVE"/>
		<reference ref_id="CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022/" source="CVE"/>
		<reference ref_id="CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024/" source="CVE"/>
		<reference ref_id="CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006327.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-03 (bsc#1160498)
  * CVE-2019-17026 (bmo#1607443)
    IonMonkey type confusion with StoreElementHole and
    FallibleStoreElement 

- Firefox Extended Support Release 68.4.0 ESR
  * Fixed: Various security fixes
  MFSA 2020-02 (bsc#1160305)
  * CVE-2019-17015 (bmo#1599005)
    Memory corruption in parent process during new content
    process initialization on Windows
  * CVE-2019-17016 (bmo#1599181)
    Bypass of @namespace CSS sanitization during pasting
  * CVE-2019-17017 (bmo#1603055)
    Type Confusion in XPCVariant.cpp
  * CVE-2019-17021 (bmo#1599008)
    Heap address disclosure in parent process during content
    process initialization on Windows
  * CVE-2019-17022 (bmo#1602843)
    CSS sanitization does not escape HTML tags
  * CVE-2019-17024 (bmo#1507180, bmo#1595470, bmo#1598605,
    bmo#1601826)
    Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-10"/>
	<updated date="2020-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160498">SUSE bug 1160498</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17015/">CVE-2019-17015 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17015">CVE-2019-17015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17016">CVE-2019-17016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17017">CVE-2019-17017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17021/">CVE-2019-17021 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17021">CVE-2019-17021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17022">CVE-2019-17022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17024">CVE-2019-17024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17026">CVE-2019-17026 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570581" comment="MozillaFirefox-68.4.1-78.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570582" comment="MozillaFirefox-translations-common-68.4.1-78.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570583" comment="MozillaFirefox-translations-other-68.4.1-78.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219749" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1161799" ref_url="https://bugzilla.suse.com/1161799" source="BUGZILLA"/>
		<reference ref_id="1163368" ref_url="https://bugzilla.suse.com/1163368" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6796" ref_url="https://www.suse.com/security/cve/CVE-2020-6796/" source="CVE"/>
		<reference ref_id="CVE-2020-6797" ref_url="https://www.suse.com/security/cve/CVE-2020-6797/" source="CVE"/>
		<reference ref_id="CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798/" source="CVE"/>
		<reference ref_id="CVE-2020-6799" ref_url="https://www.suse.com/security/cve/CVE-2020-6799/" source="CVE"/>
		<reference ref_id="CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006514.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox was updated to version 68.5.0 ESR (bsc#1163368).


Security issues fixed:

- CVE-2020-6796: Fixed a missing bounds check on shared memory in the parent process (bsc#1163368).
- CVE-2020-6798: Fixed a JavaScript code injection issue caused by the incorrect parsing of template tags (bsc#1163368).
- CVE-2020-6799: Fixed a local arbitrary code execution issue when handling PDF links from other applications (bsc#1163368).
- CVE-2020-6800: Fixed several memory safety bugs (bsc#1163368).


Non-security issues fixed:

- Fixed various issues opening files with spaces in their path (bmo#1601905, bmo#1602726).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-24"/>
	<updated date="2020-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1161799">SUSE bug 1161799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6796/">CVE-2020-6796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6796">CVE-2020-6796 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6797/">CVE-2020-6797 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6797">CVE-2020-6797 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6798">CVE-2020-6798 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6799/">CVE-2020-6799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6799">CVE-2020-6799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6800">CVE-2020-6800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570584" comment="MozillaFirefox-68.5.0-78.61.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570585" comment="MozillaFirefox-translations-common-68.5.0-78.61.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570586" comment="MozillaFirefox-translations-other-68.5.0-78.61.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219750" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1132665" ref_url="https://bugzilla.suse.com/1132665" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805/" source="CVE"/>
		<reference ref_id="CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806/" source="CVE"/>
		<reference ref_id="CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807/" source="CVE"/>
		<reference ref_id="CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811/" source="CVE"/>
		<reference ref_id="CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812/" source="CVE"/>
		<reference ref_id="CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006599.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

MozillaFirefox was updated to 68.6.0 ESR (MFSA 2020-09 bsc#1132665)

- CVE-2020-6805: Fixed a use-after-free when removing data about origins
- CVE-2020-6806: Fixed improper protections against state confusion
- CVE-2020-6807: Fixed a use-after-free in cubeb during stream destruction
- CVE-2020-6811: Fixed an issue where copy as cURL' feature did not fully
  escape website-controlled data potentially leading to command injection
- CVE-2019-20503: Fixed out of bounds reads in sctp_load_addresses_from_init
- CVE-2020-6812: Fixed an issue where the names of AirPods with personally
  identifiable information were exposed to websites with camera or microphone
  permission
- CVE-2020-6814: Fixed multiple memory safety bugs
- Fixed an issue with minimizing a window (bsc#1132665).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-12"/>
	<updated date="2020-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132665">SUSE bug 1132665</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20503">CVE-2019-20503 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6805">CVE-2020-6805 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6806">CVE-2020-6806 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6807">CVE-2020-6807 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6811">CVE-2020-6811 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6812">CVE-2020-6812 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6814">CVE-2020-6814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570587" comment="MozillaFirefox-68.6.0-78.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570588" comment="MozillaFirefox-translations-common-68.6.0-78.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570589" comment="MozillaFirefox-translations-other-68.6.0-78.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219751" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1168630" ref_url="https://bugzilla.suse.com/1168630" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819/" source="CVE"/>
		<reference ref_id="CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006684.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.6.1 ESR
  MFSA 2020-11 (bsc#1168630)
  * CVE-2020-6819 (bmo#1620818)
    Use-after-free while running the nsDocShell destructor
  * CVE-2020-6820 (bmo#1626728)
    Use-after-free when handling a ReadableStream
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-07"/>
	<updated date="2020-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6819">CVE-2020-6819 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6820">CVE-2020-6820 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570590" comment="MozillaFirefox-68.6.1-78.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570591" comment="MozillaFirefox-translations-common-68.6.1-78.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570592" comment="MozillaFirefox-translations-other-68.6.1-78.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219752" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1168874" ref_url="https://bugzilla.suse.com/1168874" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821/" source="CVE"/>
		<reference ref_id="CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822/" source="CVE"/>
		<reference ref_id="CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825/" source="CVE"/>
		<reference ref_id="CVE-2020-6827" ref_url="https://www.suse.com/security/cve/CVE-2020-6827/" source="CVE"/>
		<reference ref_id="CVE-2020-6828" ref_url="https://www.suse.com/security/cve/CVE-2020-6828/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006697.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version 68.7.0 ESR fixes the following issues:

- CVE-2020-6821: Uninitialized memory could be read when using the WebGL copyTexSubImage method (bsc#1168874).
- CVE-2020-6822: Fixed out of bounds write in GMPDecodeData when processing large images (bsc#1168874).
- CVE-2020-6825: Fixed Memory safety bugs (bsc#1168874).
- CVE-2020-6827: Custom Tabs could have the URI spoofed (bsc#1168874).
- CVE-2020-6828: Preference overwrite via crafted Intent (bsc#1168874).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-09"/>
	<updated date="2020-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6821">CVE-2020-6821 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6822">CVE-2020-6822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6825">CVE-2020-6825 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6827/">CVE-2020-6827 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6827">CVE-2020-6827 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6828/">CVE-2020-6828 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6828">CVE-2020-6828 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570593" comment="MozillaFirefox-68.7.0-78.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570594" comment="MozillaFirefox-translations-common-68.7.0-78.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570595" comment="MozillaFirefox-translations-other-68.7.0-78.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219753" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1162828" ref_url="https://bugzilla.suse.com/1162828" source="BUGZILLA"/>
		<reference ref_id="1171186" ref_url="https://bugzilla.suse.com/1171186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-12388" ref_url="https://www.suse.com/security/cve/CVE-2020-12388/" source="CVE"/>
		<reference ref_id="CVE-2020-12389" ref_url="https://www.suse.com/security/cve/CVE-2020-12389/" source="CVE"/>
		<reference ref_id="CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392/" source="CVE"/>
		<reference ref_id="CVE-2020-12393" ref_url="https://www.suse.com/security/cve/CVE-2020-12393/" source="CVE"/>
		<reference ref_id="CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006809.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:


- Firefox Extended Support Release 68.8.0 ESR
  MFSA 2020-17 (bsc#1171186)
  * CVE-2020-12387 (bmo#1545345)
    Use-after-free during worker shutdown
  * CVE-2020-12388 (bmo#1618911)
    Sandbox escape with improperly guarded Access Tokens
  * CVE-2020-12389 (bmo#1554110)
    Sandbox escape with improperly separated process types
  * CVE-2020-6831 (bmo#1632241)
    Buffer overflow in SCTP chunk input validation
  * CVE-2020-12392 (bmo#1614468)
    Arbitrary local file access with 'Copy as cURL'
  * CVE-2020-12393 (bmo#1615471)
    Devtools' 'Copy as cURL' feature did not fully escape
    website-controlled data, potentially leading to command
    injection
  * CVE-2020-12395 (bmo#1595886, bmo#1611482, bmo#1614704,
    bmo#1624098, bmo#1625749, bmo#1626382, bmo#1628076,
    bmo#1631508)
    Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8

- Since firefox-gcc8 now has disabled autoreqprov for firefox-libstdc++6
  and firefox-libgcc_s1, those packages don't provide some capabilities,
  we have to disable AutoReqProv in MozillaFirefox too so they're not added as
  automatic requirements. (bsc#1162828)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-08"/>
	<updated date="2020-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162828">SUSE bug 1162828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12387">CVE-2020-12387 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12388/">CVE-2020-12388 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12388">CVE-2020-12388 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12389/">CVE-2020-12389 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12389">CVE-2020-12389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12392">CVE-2020-12392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12393/">CVE-2020-12393 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12393">CVE-2020-12393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12395">CVE-2020-12395 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6831">CVE-2020-6831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570596" comment="MozillaFirefox-68.8.0-78.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570597" comment="MozillaFirefox-translations-common-68.8.0-78.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570598" comment="MozillaFirefox-translations-other-68.8.0-78.73.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219754" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1172402" ref_url="https://bugzilla.suse.com/1172402" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405/" source="CVE"/>
		<reference ref_id="CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406/" source="CVE"/>
		<reference ref_id="CVE-2020-12410" ref_url="https://www.suse.com/security/cve/CVE-2020-12410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006897.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- MozillaFirefox was updated to version 68.9.0 Extended Support Release (bsc#1172402).

- CVE-2020-12405: Fixed a use-after-free in SharedWorkerService. 
- CVE-2020-12406: Fixed a JavaScript Type confusion with NativeTypes.
- CVE-2020-12410: Fixed multiple memory safety bugs.	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12405">CVE-2020-12405 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12406">CVE-2020-12406 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12410/">CVE-2020-12410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12410">CVE-2020-12410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570599" comment="MozillaFirefox-68.9.0-78.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570600" comment="MozillaFirefox-translations-common-68.9.0-78.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570601" comment="MozillaFirefox-translations-other-68.9.0-78.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219755" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1166238" ref_url="https://bugzilla.suse.com/1166238" source="BUGZILLA"/>
		<reference ref_id="1167231" ref_url="https://bugzilla.suse.com/1167231" source="BUGZILLA"/>
		<reference ref_id="1173576" ref_url="https://bugzilla.suse.com/1173576" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="CVE-2020-12415" ref_url="https://www.suse.com/security/cve/CVE-2020-12415/" source="CVE"/>
		<reference ref_id="CVE-2020-12416" ref_url="https://www.suse.com/security/cve/CVE-2020-12416/" source="CVE"/>
		<reference ref_id="CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417/" source="CVE"/>
		<reference ref_id="CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419/" source="CVE"/>
		<reference ref_id="CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421/" source="CVE"/>
		<reference ref_id="CVE-2020-12422" ref_url="https://www.suse.com/security/cve/CVE-2020-12422/" source="CVE"/>
		<reference ref_id="CVE-2020-12423" ref_url="https://www.suse.com/security/cve/CVE-2020-12423/" source="CVE"/>
		<reference ref_id="CVE-2020-12424" ref_url="https://www.suse.com/security/cve/CVE-2020-12424/" source="CVE"/>
		<reference ref_id="CVE-2020-12425" ref_url="https://www.suse.com/security/cve/CVE-2020-12425/" source="CVE"/>
		<reference ref_id="CVE-2020-12426" ref_url="https://www.suse.com/security/cve/CVE-2020-12426/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version 78.0.1 ESR fixes the following issues:

Security issues fixed:

- CVE-2020-12415: AppCache manifest poisoning due to url encoded character processing (bsc#1173576).
- CVE-2020-12416: Use-after-free in WebRTC VideoBroadcaster (bsc#1173576).
- CVE-2020-12417: Memory corruption due to missing sign-extension for ValueTags on ARM64 (bsc#1173576).
- CVE-2020-12418: Information disclosure due to manipulated URL object (bsc#1173576).
- CVE-2020-12419: Use-after-free in nsGlobalWindowInner (bsc#1173576).
- CVE-2020-12420: Use-After-Free when trying to connect to a STUN server (bsc#1173576).
- CVE-2020-12402: RSA Key Generation vulnerable to side-channel attack (bsc#1173576).
- CVE-2020-12421: Add-On updates did not respect the same certificate trust rules as software updates (bsc#1173576).
- CVE-2020-12422: Integer overflow in nsJPEGEncoder::emptyOutputBuffer (bsc#1173576).
- CVE-2020-12423: DLL Hijacking due to searching %PATH% for a library (bsc#1173576).
- CVE-2020-12424: WebRTC permission prompt could have been bypassed by a compromised content process (bsc#1173576).
- CVE-2020-12425: Out of bound read in Date.parse() (bsc#1173576).
- CVE-2020-12426: Memory safety bugs fixed in Firefox 78 (bsc#1173576).
- FIPS: MozillaFirefox: allow /proc/sys/crypto/fips_enabled (bsc#1167231).

Non-security issues fixed:

- Fixed interaction with freetype6 (bsc#1173613).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-08"/>
	<updated date="2020-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167231">SUSE bug 1167231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12402">CVE-2020-12402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12415/">CVE-2020-12415 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12415">CVE-2020-12415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12416/">CVE-2020-12416 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12416">CVE-2020-12416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12417">CVE-2020-12417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12418">CVE-2020-12418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12419">CVE-2020-12419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12420">CVE-2020-12420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12421">CVE-2020-12421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12422/">CVE-2020-12422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12422">CVE-2020-12422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12423/">CVE-2020-12423 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12423">CVE-2020-12423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12424/">CVE-2020-12424 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12424">CVE-2020-12424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12425/">CVE-2020-12425 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12425">CVE-2020-12425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12426/">CVE-2020-12426 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12426">CVE-2020-12426 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570602" comment="MozillaFirefox-78.0.1-78.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570603" comment="MozillaFirefox-branding-SLED-78-21.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570604" comment="MozillaFirefox-translations-common-78.0.1-78.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570605" comment="MozillaFirefox-translations-other-78.0.1-78.80.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219756" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1173948" ref_url="https://bugzilla.suse.com/1173948" source="BUGZILLA"/>
		<reference ref_id="1173991" ref_url="https://bugzilla.suse.com/1173991" source="BUGZILLA"/>
		<reference ref_id="1174538" ref_url="https://bugzilla.suse.com/1174538" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652/" source="CVE"/>
		<reference ref_id="CVE-2020-15653" ref_url="https://www.suse.com/security/cve/CVE-2020-15653/" source="CVE"/>
		<reference ref_id="CVE-2020-15654" ref_url="https://www.suse.com/security/cve/CVE-2020-15654/" source="CVE"/>
		<reference ref_id="CVE-2020-15655" ref_url="https://www.suse.com/security/cve/CVE-2020-15655/" source="CVE"/>
		<reference ref_id="CVE-2020-15656" ref_url="https://www.suse.com/security/cve/CVE-2020-15656/" source="CVE"/>
		<reference ref_id="CVE-2020-15657" ref_url="https://www.suse.com/security/cve/CVE-2020-15657/" source="CVE"/>
		<reference ref_id="CVE-2020-15658" ref_url="https://www.suse.com/security/cve/CVE-2020-15658/" source="CVE"/>
		<reference ref_id="CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Fix broken translation-loading (boo#1173991) 
  * allow addon sideloading
  * mark signatures for langpacks non-mandatory
  * do not autodisable user profile scopes
- Google API key is not usable for geolocation service any more

- Mozilla Firefox 78.1 ESR
  * Fixed: Various stability, functionality, and security fixe
    (MFSA 2020-32) (bsc#1174538).
  * CVE-2020-15652 (bmo#1634872)
    Potential leak of redirect targets when loading scripts in a
    worker
  * CVE-2020-6514 (bmo#1642792)
    WebRTC data channel leaks internal address to peer
  * CVE-2020-15655 (bmo#1645204)
    Extension APIs could be used to bypass Same-Origin Policy
  * CVE-2020-15653 (bmo#1521542)
    Bypassing iframe sandbox when allowing popups
  * CVE-2020-6463 (bmo#1635293)
    Use-after-free in ANGLE gl::Texture::onUnbindAsSamplerTexture
  * CVE-2020-15656 (bmo#1647293)
    Type confusion for special arguments in IonMonkey
  * CVE-2020-15658 (bmo#1637745)
    Overriding file type when saving to disk
  * CVE-2020-15657 (bmo#1644954)
    DLL hijacking due to incorrect loading path
  * CVE-2020-15654 (bmo#1648333)
    Custom cursor can overlay user interface
  * CVE-2020-15659 (bmo#1550133, bmo#1633880, bmo#1643613,
    bmo#1644839, bmo#1645835, bmo#1646006, bmo#1646787,
    bmo#1649347, bmo#1650811, bmo#1651678)
    Memory safety bugs fixed in Firefox 79 and Firefox ESR 78.1

- Add sle11-icu-generation-python3.patch to fix icu-generation
  on big endian platforms 

- Mozilla Firefox 78.0.2 ESR
  * MFSA 2020-28 (bsc#1173948)
  * MFSA-2020-0003 (bmo#1644076)
    X-Frame-Options bypass using object or embed tags
  * Fixed: Fixed an accessibility regression in reader mode
    (bmo#1650922)
  * Fixed: Made the address bar more resilient to data corruption
    in the user profile (bmo#1649981)
  * Fixed: Fixed a regression opening certain external
    applications (bmo#1650162)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-18"/>
	<updated date="2020-08-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173948">SUSE bug 1173948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173991">SUSE bug 1173991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15652">CVE-2020-15652 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15653/">CVE-2020-15653 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15653">CVE-2020-15653 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15654/">CVE-2020-15654 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15654">CVE-2020-15654 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15655/">CVE-2020-15655 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15655">CVE-2020-15655 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15656/">CVE-2020-15656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15656">CVE-2020-15656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15657/">CVE-2020-15657 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15657">CVE-2020-15657 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15658/">CVE-2020-15658 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15658">CVE-2020-15658 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15659">CVE-2020-15659 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6463">CVE-2020-6463 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6514">CVE-2020-6514 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570606" comment="MozillaFirefox-78.1.0-78.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570607" comment="MozillaFirefox-translations-common-78.1.0-78.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570608" comment="MozillaFirefox-translations-other-78.1.0-78.87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219757" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1174284" ref_url="https://bugzilla.suse.com/1174284" source="BUGZILLA"/>
		<reference ref_id="1175686" ref_url="https://bugzilla.suse.com/1175686" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15663" ref_url="https://www.suse.com/security/cve/CVE-2020-15663/" source="CVE"/>
		<reference ref_id="CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664/" source="CVE"/>
		<reference ref_id="CVE-2020-15670" ref_url="https://www.suse.com/security/cve/CVE-2020-15670/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007425.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.2.0 ESR
  * Fixed: Various stability, functionality, and security fixes
- Mozilla Firefox ESR 78.2
  MFSA 2020-38 (bsc#1175686)
  * CVE-2020-15663 (bmo#1643199)
    Downgrade attack on the Mozilla Maintenance Service could
    have resulted in escalation of privilege
  * CVE-2020-15664 (bmo#1658214)
    Attacker-induced prompt for extension installation
  * CVE-2020-15670 (bmo#1651001, bmo#1651449, bmo#1653626,
    bmo#1656957)
    Memory safety bugs fixed in Firefox 80 and Firefox ESR 78.2

- Fixed Firefox tab crash in FIPS mode (bsc#1174284).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-14"/>
	<updated date="2020-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174284">SUSE bug 1174284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15663/">CVE-2020-15663 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15663">CVE-2020-15663 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15664">CVE-2020-15664 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15670/">CVE-2020-15670 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15670">CVE-2020-15670 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570609" comment="MozillaFirefox-78.2.0-78.90.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570610" comment="MozillaFirefox-translations-common-78.2.0-78.90.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570611" comment="MozillaFirefox-translations-other-78.2.0-78.90.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219758" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1167976" ref_url="https://bugzilla.suse.com/1167976" source="BUGZILLA"/>
		<reference ref_id="1173986" ref_url="https://bugzilla.suse.com/1173986" source="BUGZILLA"/>
		<reference ref_id="1175046" ref_url="https://bugzilla.suse.com/1175046" source="BUGZILLA"/>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673/" source="CVE"/>
		<reference ref_id="CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676/" source="CVE"/>
		<reference ref_id="CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677/" source="CVE"/>
		<reference ref_id="CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007494.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.3.0 ESR (bsc#1176756, MFSA 2020-43)
   - CVE-2020-15677: Download origin spoofing via redirect
   - CVE-2020-15676: Fixed an XSS when pasting attacker-controlled data into a
     contenteditable element 
   - CVE-2020-15678: When recursing through layers while scrolling, an iterator
     may have become invalid, resulting in a potential use-after-free scenario
   - CVE-2020-15673: Fixed memory safety bugs 
- Attempt to fix langpack-parallelization by introducing separate
  obj-dirs for each lang (bsc#1173986, bsc#1167976)
- Fixed problems with compiler builtins on SLE-11 (bsc#1175046)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-28"/>
	<updated date="2020-09-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167976">SUSE bug 1167976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173986">SUSE bug 1173986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175046">SUSE bug 1175046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15673">CVE-2020-15673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15676">CVE-2020-15676 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15677">CVE-2020-15677 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15678">CVE-2020-15678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570612" comment="MozillaFirefox-78.3.0-78.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570613" comment="MozillaFirefox-translations-common-78.3.0-78.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570614" comment="MozillaFirefox-translations-other-78.3.0-78.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219759" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1177872" ref_url="https://bugzilla.suse.com/1177872" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007622.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.0 ESR
  * Fixed: Various stability, functionality, and security fixes MFSA 2020-46 (bsc#1177872)
  * CVE-2020-15969 Use-after-free in usersctp
  * CVE-2020-15683 Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4
  * Fixed: Fixed legacy preferences not being properly applied when set via GPO
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-26"/>
	<updated date="2020-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15683">CVE-2020-15683 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15969">CVE-2020-15969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570615" comment="MozillaFirefox-78.4.0-78.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570616" comment="MozillaFirefox-translations-common-78.4.0-78.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570617" comment="MozillaFirefox-translations-other-78.4.0-78.99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219760" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1178588" ref_url="https://bugzilla.suse.com/1178588" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007762.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-49 (bsc#1178588)
  * CVE-2020-26950 (bmo#1675905)
    Write side effects in MCallGetProperty opcode not accounted
    for
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178588">SUSE bug 1178588</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26950">CVE-2020-26950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570618" comment="MozillaFirefox-78.4.1-78.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570619" comment="MozillaFirefox-translations-common-78.4.1-78.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570620" comment="MozillaFirefox-translations-other-78.4.1-78.102.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219761" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1178824" ref_url="https://bugzilla.suse.com/1178824" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951/" source="CVE"/>
		<reference ref_id="CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953/" source="CVE"/>
		<reference ref_id="CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956/" source="CVE"/>
		<reference ref_id="CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958/" source="CVE"/>
		<reference ref_id="CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959/" source="CVE"/>
		<reference ref_id="CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960/" source="CVE"/>
		<reference ref_id="CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961/" source="CVE"/>
		<reference ref_id="CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965/" source="CVE"/>
		<reference ref_id="CVE-2020-26966" ref_url="https://www.suse.com/security/cve/CVE-2020-26966/" source="CVE"/>
		<reference ref_id="CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.5.0 ESR (bsc#1178824)
  * CVE-2020-26951: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code
  * CVE-2020-16012: Variable time processing of cross-origin images during drawImage calls
  * CVE-2020-26953: Fullscreen could be enabled without displaying the security UI
  * CVE-2020-26956: XSS through paste (manual and clipboard API)
  * CVE-2020-26958: Requests intercepted through ServiceWorkers lacked MIME type restrictions
  * CVE-2020-26959: Use-after-free in WebRequestService
  * CVE-2020-26960: Potential use-after-free in uses of nsTArray
  * CVE-2020-15999: Heap buffer overflow in freetype
  * CVE-2020-26961: DoH did not filter IPv4 mapped IP Addresses
  * CVE-2020-26965: Software keyboards may have remembered typed passwords
  * CVE-2020-26966: Single-word search queries were also broadcast to local network
  * CVE-2020-26968: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-20"/>
	<updated date="2020-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16012">CVE-2020-16012 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26951">CVE-2020-26951 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26953">CVE-2020-26953 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26956">CVE-2020-26956 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26958">CVE-2020-26958 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26959">CVE-2020-26959 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26960">CVE-2020-26960 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26961">CVE-2020-26961 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26965">CVE-2020-26965 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26966/">CVE-2020-26966 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26966">CVE-2020-26966 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26968">CVE-2020-26968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570621" comment="MozillaFirefox-78.5.0-78.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570622" comment="MozillaFirefox-translations-common-78.5.0-78.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570623" comment="MozillaFirefox-translations-other-78.5.0-78.105.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219762" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1180039" ref_url="https://bugzilla.suse.com/1180039" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971/" source="CVE"/>
		<reference ref_id="CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973/" source="CVE"/>
		<reference ref_id="CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974/" source="CVE"/>
		<reference ref_id="CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978/" source="CVE"/>
		<reference ref_id="CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111/" source="CVE"/>
		<reference ref_id="CVE-2020-35112" ref_url="https://www.suse.com/security/cve/CVE-2020-35112/" source="CVE"/>
		<reference ref_id="CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2020-55 (bsc#1180039)
  * CVE-2020-16042 (bmo#1679003)
    Operations on a BigInt could have caused uninitialized memory
    to be exposed
  * CVE-2020-26971 (bmo#1663466)
    Heap buffer overflow in WebGL
  * CVE-2020-26973 (bmo#1680084)
    CSS Sanitizer performed incorrect sanitization
  * CVE-2020-26974 (bmo#1681022)
    Incorrect cast of StyleGenericFlexBasis resulted in a heap
    use-after-free
  * CVE-2020-26978 (bmo#1677047)
    Internal network hosts could have been probed by a malicious
    webpage
  * CVE-2020-35111 (bmo#1657916)
    The proxy.onRequest API did not catch view-source URLs
  * CVE-2020-35112 (bmo#1661365)
    Opening an extension-less download may have inadvertently
    launched an executable instead
  * CVE-2020-35113 (bmo#1664831, bmo#1673589)
    Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-21"/>
	<updated date="2020-12-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16042">CVE-2020-16042 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26971">CVE-2020-26971 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26973">CVE-2020-26973 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26974">CVE-2020-26974 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26978">CVE-2020-26978 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35111">CVE-2020-35111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35112/">CVE-2020-35112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35112">CVE-2020-35112 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35113">CVE-2020-35113 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570624" comment="MozillaFirefox-78.6.0-78.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570625" comment="MozillaFirefox-translations-common-78.6.0-78.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570626" comment="MozillaFirefox-translations-other-78.6.0-78.108.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219763" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1180623" ref_url="https://bugzilla.suse.com/1180623" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008172.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.1 ESR
  * Fixed: Critical security issue MFSA 2021-01 (bsc#1180623)
  * CVE-2020-16044
    Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-12"/>
	<updated date="2021-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180623">SUSE bug 1180623</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16044">CVE-2020-16044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570627" comment="MozillaFirefox-78.6.1-78.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570628" comment="MozillaFirefox-translations-common-78.6.1-78.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570629" comment="MozillaFirefox-translations-other-78.6.1-78.111.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219764" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1181414" ref_url="https://bugzilla.suse.com/1181414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976/" source="CVE"/>
		<reference ref_id="CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953/" source="CVE"/>
		<reference ref_id="CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954/" source="CVE"/>
		<reference ref_id="CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960/" source="CVE"/>
		<reference ref_id="CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008256.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.7.0 ESR  (MFSA 2021-04, bsc#1181414)
  * CVE-2021-23953: Fixed a Cross-origin information leakage via redirected PDF requests
  * CVE-2021-23954: Fixed a type confusion when using logical assignment operators in JavaScript switch statements
  * CVE-2020-26976: Fixed an issue where HTTPS pages could have been intercepted by a registered service worker when they should not have been
  * CVE-2021-23960: Fixed a use-after-poison for incorrectly redeclared JavaScript variables during GC
  * CVE-2021-23964: Fixed Memory safety bugs 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-29"/>
	<updated date="2021-01-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26976">CVE-2020-26976 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23953">CVE-2021-23953 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23954">CVE-2021-23954 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23960">CVE-2021-23960 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23964">CVE-2021-23964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570630" comment="MozillaFirefox-78.7.0-78.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570631" comment="MozillaFirefox-translations-common-78.7.0-78.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570632" comment="MozillaFirefox-translations-other-78.7.0-78.114.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219765" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1182357" ref_url="https://bugzilla.suse.com/1182357" source="BUGZILLA"/>
		<reference ref_id="1182614" ref_url="https://bugzilla.suse.com/1182614" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968/" source="CVE"/>
		<reference ref_id="CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969/" source="CVE"/>
		<reference ref_id="CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973/" source="CVE"/>
		<reference ref_id="CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008409.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.8.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2021-08 (bsc#1182614)
  * CVE-2021-23969: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23968: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23973: MediaError message property could have leaked information about cross-origin resources
  * CVE-2021-23978: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182357">SUSE bug 1182357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23968">CVE-2021-23968 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23969">CVE-2021-23969 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23973">CVE-2021-23973 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23978">CVE-2021-23978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570636" comment="MozillaFirefox-78.8.0-78.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570637" comment="MozillaFirefox-translations-common-78.8.0-78.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570638" comment="MozillaFirefox-translations-other-78.8.0-78.120.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219766" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1183942" ref_url="https://bugzilla.suse.com/1183942" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981/" source="CVE"/>
		<reference ref_id="CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982/" source="CVE"/>
		<reference ref_id="CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984/" source="CVE"/>
		<reference ref_id="CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008575.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.9.0 ESR  (MFSA 2021-11, bsc#1183942)
  * CVE-2021-23981: Texture upload into an unbound backing buffer resulted in an out-of-bound read
  * CVE-2021-23982: Internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23984: Malicious extensions could have spoofed popup information
  * CVE-2021-23987: Memory safety bugs
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-01"/>
	<updated date="2021-04-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23981">CVE-2021-23981 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23982">CVE-2021-23982 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23984">CVE-2021-23984 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23987">CVE-2021-23987 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570639" comment="MozillaFirefox-78.9.0-78.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570640" comment="MozillaFirefox-translations-common-78.9.0-78.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570641" comment="MozillaFirefox-translations-other-78.9.0-78.123.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219767" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1184960" ref_url="https://bugzilla.suse.com/1184960" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23961" ref_url="https://www.suse.com/security/cve/CVE-2021-23961/" source="CVE"/>
		<reference ref_id="CVE-2021-23994" ref_url="https://www.suse.com/security/cve/CVE-2021-23994/" source="CVE"/>
		<reference ref_id="CVE-2021-23995" ref_url="https://www.suse.com/security/cve/CVE-2021-23995/" source="CVE"/>
		<reference ref_id="CVE-2021-23998" ref_url="https://www.suse.com/security/cve/CVE-2021-23998/" source="CVE"/>
		<reference ref_id="CVE-2021-23999" ref_url="https://www.suse.com/security/cve/CVE-2021-23999/" source="CVE"/>
		<reference ref_id="CVE-2021-24002" ref_url="https://www.suse.com/security/cve/CVE-2021-24002/" source="CVE"/>
		<reference ref_id="CVE-2021-29945" ref_url="https://www.suse.com/security/cve/CVE-2021-29945/" source="CVE"/>
		<reference ref_id="CVE-2021-29946" ref_url="https://www.suse.com/security/cve/CVE-2021-29946/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008691.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.10.0 ESR (bsc#1184960)
  * CVE-2021-23994: Out of bound write due to lazy initialization
  * CVE-2021-23995: Use-after-free in Responsive Design Mode
  * CVE-2021-23998: Secure Lock icon could have been spoofed
  * CVE-2021-23961: More internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23999: Blob URLs may have been granted additional privileges
  * CVE-2021-24002: Arbitrary FTP command execution on FTP servers using an encoded URL
  * CVE-2021-29945: Incorrect size computation in WebAssembly JIT could lead to null-reads
  * CVE-2021-29946: Port blocking could be bypassed
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23961/">CVE-2021-23961 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23961">CVE-2021-23961 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23994/">CVE-2021-23994 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23994">CVE-2021-23994 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23995/">CVE-2021-23995 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23995">CVE-2021-23995 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23998/">CVE-2021-23998 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23998">CVE-2021-23998 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23999/">CVE-2021-23999 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23999">CVE-2021-23999 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-24002/">CVE-2021-24002 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24002">CVE-2021-24002 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29945/">CVE-2021-29945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29945">CVE-2021-29945 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29946/">CVE-2021-29946 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29946">CVE-2021-29946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570642" comment="MozillaFirefox-78.10.0-78.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570643" comment="MozillaFirefox-translations-common-78.10.0-78.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570644" comment="MozillaFirefox-translations-other-78.10.0-78.126.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219768" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1185633" ref_url="https://bugzilla.suse.com/1185633" source="BUGZILLA"/>
		<reference ref_id="1186696" ref_url="https://bugzilla.suse.com/1186696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29951" ref_url="https://www.suse.com/security/cve/CVE-2021-29951/" source="CVE"/>
		<reference ref_id="CVE-2021-29964" ref_url="https://www.suse.com/security/cve/CVE-2021-29964/" source="CVE"/>
		<reference ref_id="CVE-2021-29967" ref_url="https://www.suse.com/security/cve/CVE-2021-29967/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008952.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.11.0 ESR (bsc#1186696)

  * CVE-2021-29964: Out of bounds-read when parsing a `WM_COPYDATA` message
  * CVE-2021-29967: Memory safety bugs fixed in Firefox
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185633">SUSE bug 1185633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186696">SUSE bug 1186696</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29951/">CVE-2021-29951 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29951">CVE-2021-29951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29964/">CVE-2021-29964 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29964">CVE-2021-29964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29967/">CVE-2021-29967 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29967">CVE-2021-29967 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570645" comment="MozillaFirefox-78.11.0-78.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570646" comment="MozillaFirefox-translations-common-78.11.0-78.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570647" comment="MozillaFirefox-translations-other-78.11.0-78.131.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219769" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1188275" ref_url="https://bugzilla.suse.com/1188275" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29970" ref_url="https://www.suse.com/security/cve/CVE-2021-29970/" source="CVE"/>
		<reference ref_id="CVE-2021-29976" ref_url="https://www.suse.com/security/cve/CVE-2021-29976/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009151.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.12.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-29 (bsc#1188275)

* CVE-2021-29970: Use-after-free in accessibility features of a document
* CVE-2021-30547: Out of bounds write in ANGLE
* CVE-2021-29976: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-16"/>
	<updated date="2021-07-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188275">SUSE bug 1188275</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29970/">CVE-2021-29970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29970">CVE-2021-29970 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29976/">CVE-2021-29976 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29976">CVE-2021-29976 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30547">CVE-2021-30547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625243" comment="MozillaFirefox-78.12.0-78.134.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625244" comment="MozillaFirefox-translations-common-78.12.0-78.134.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625245" comment="MozillaFirefox-translations-other-78.12.0-78.134.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219770" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009289.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.13.0 ESR (MFSA 2021-34, bsc#1188891):

- CVE-2021-29986: Race condition when resolving DNS names could have led to memory corruption
- CVE-2021-29988: Memory corruption as a result of incorrect style treatment
- CVE-2021-29984: Incorrect instruction reordering during JIT optimization
- CVE-2021-29980: Uninitialized memory in a canvas object could have led to memory corruption
- CVE-2021-29985: Use-after-free media channels
- CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-12"/>
	<updated date="2021-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630646" comment="MozillaFirefox-78.13.0-78.137.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630647" comment="MozillaFirefox-translations-common-78.13.0-78.137.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630648" comment="MozillaFirefox-translations-other-78.13.0-78.137.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219771" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1190274" ref_url="https://bugzilla.suse.com/1190274" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

This update contains the Firefox Extended Support Release 91.1.0 ESR.

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274):

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Firefox 91.0.1esr ESR

* Fixed: Fixed an issue causing buttons on the tab bar to be
  resized when loading certain websites (bug 1704404)
* Fixed: Fixed an issue which caused tabs from private windows
  to be visible in non-private windows when viewing switch-to-
  tab results in the address bar panel (bug 1720369)
* Fixed: Various stability fixes
* Fixed: Security fix MFSA 2021-37 (bsc#1189547)
* CVE-2021-29991 (bmo#1724896)
  Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

* New: Some of the highlights of the new Extended Support Release are:

  - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
  - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
  - On Windows, updates can now be applied in the background
    while Firefox is not running.
  - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
  - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
  - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
  - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
  - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
  - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
  - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
  - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
  - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
  - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
  - We’ve improved functionality and design for a number of
    Firefox search features:
    * Selecting a search engine at the bottom of the search
      panel now enters search mode for that engine, allowing you to
      see suggestions (if available) for your search terms. The old
      behavior (immediately performing a search) is available with
      a shift-click.
    * When Firefox autocompletes the URL of one of your search
      engines, you can now search with that engine directly in the
      address bar by selecting the shortcut in the address bar
      results.
    * We’ve added buttons at the bottom of the search panel to
      allow you to search your bookmarks, open tabs, and history.
  - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
  - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
  - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
* Changed: Firefox no longer supports Adobe Flash. There is no
  setting available to re-enable Flash support.
* Enterprise: Various bug fixes and new policies have been
  implemented in the latest version of Firefox. See more
  details in the Firefox for Enterprise 91 Release Notes.

  MFSA 2021-33 (bsc#1188891):

* CVE-2021-29986: Race condition when resolving DNS names could have led to
  memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting
  assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to
  memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted
  permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and
  type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-01"/>
	<updated date="2021-10-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190274">SUSE bug 1190274</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29981">CVE-2021-29981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29982">CVE-2021-29982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29983">CVE-2021-29983 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29987">CVE-2021-29987 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29990">CVE-2021-29990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29991">CVE-2021-29991 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38492">CVE-2021-38492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38495">CVE-2021-38495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634730" comment="MozillaFirefox-78.14.0-78.140.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634731" comment="MozillaFirefox-translations-common-78.14.0-78.140.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634732" comment="MozillaFirefox-translations-other-78.14.0-78.140.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219772" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1193321" ref_url="https://bugzilla.suse.com/1193321" source="BUGZILLA"/>
		<reference ref_id="1193485" ref_url="https://bugzilla.suse.com/1193485" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43536" ref_url="https://www.suse.com/security/cve/CVE-2021-43536/" source="CVE"/>
		<reference ref_id="CVE-2021-43537" ref_url="https://www.suse.com/security/cve/CVE-2021-43537/" source="CVE"/>
		<reference ref_id="CVE-2021-43538" ref_url="https://www.suse.com/security/cve/CVE-2021-43538/" source="CVE"/>
		<reference ref_id="CVE-2021-43539" ref_url="https://www.suse.com/security/cve/CVE-2021-43539/" source="CVE"/>
		<reference ref_id="CVE-2021-43541" ref_url="https://www.suse.com/security/cve/CVE-2021-43541/" source="CVE"/>
		<reference ref_id="CVE-2021-43542" ref_url="https://www.suse.com/security/cve/CVE-2021-43542/" source="CVE"/>
		<reference ref_id="CVE-2021-43543" ref_url="https://www.suse.com/security/cve/CVE-2021-43543/" source="CVE"/>
		<reference ref_id="CVE-2021-43545" ref_url="https://www.suse.com/security/cve/CVE-2021-43545/" source="CVE"/>
		<reference ref_id="CVE-2021-43546" ref_url="https://www.suse.com/security/cve/CVE-2021-43546/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009881.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Extended Support Release 91.4.0 (bsc#1193485):

- CVE-2021-43536: URL leakage when navigating while executing asynchronous function
- CVE-2021-43537: Heap buffer overflow when using structured clone
- CVE-2021-43538: Missing fullscreen and pointer lock notification when requesting both
- CVE-2021-43539: GC rooting failure when calling wasm instance methods
- CVE-2021-43541: External protocol handler parameters were unescaped
- CVE-2021-43542: XMLHttpRequest error codes could have leaked the existence of an external protocol handler
- CVE-2021-43543: Bypass of CSP sandbox directive when embedding
- CVE-2021-43545: Denial of Service when using the Location API in a loop
- CVE-2021-43546: Cursor spoofing could overlay user interface when native cursor is zoomed
- Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4
- Removed x-scheme-handler/ftp from MozillaFirefox.desktop (bsc#1193321)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-10"/>
	<updated date="2021-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193321">SUSE bug 1193321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43536/">CVE-2021-43536 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43536">CVE-2021-43536 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43537/">CVE-2021-43537 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43537">CVE-2021-43537 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43538/">CVE-2021-43538 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43538">CVE-2021-43538 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43539/">CVE-2021-43539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43539">CVE-2021-43539 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43541/">CVE-2021-43541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43541">CVE-2021-43541 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43542/">CVE-2021-43542 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43542">CVE-2021-43542 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43543/">CVE-2021-43543 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43543">CVE-2021-43543 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43545/">CVE-2021-43545 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43545">CVE-2021-43545 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43546/">CVE-2021-43546 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43546">CVE-2021-43546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659367" comment="MozillaFirefox-91.4.0-78.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659368" comment="MozillaFirefox-translations-common-91.4.0-78.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659369" comment="MozillaFirefox-translations-other-91.4.0-78.154.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219773" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1194547" ref_url="https://bugzilla.suse.com/1194547" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140/" source="CVE"/>
		<reference ref_id="CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737/" source="CVE"/>
		<reference ref_id="CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738/" source="CVE"/>
		<reference ref_id="CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739/" source="CVE"/>
		<reference ref_id="CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740/" source="CVE"/>
		<reference ref_id="CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741/" source="CVE"/>
		<reference ref_id="CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742/" source="CVE"/>
		<reference ref_id="CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743/" source="CVE"/>
		<reference ref_id="CVE-2022-22744" ref_url="https://www.suse.com/security/cve/CVE-2022-22744/" source="CVE"/>
		<reference ref_id="CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745/" source="CVE"/>
		<reference ref_id="CVE-2022-22746" ref_url="https://www.suse.com/security/cve/CVE-2022-22746/" source="CVE"/>
		<reference ref_id="CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747/" source="CVE"/>
		<reference ref_id="CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748/" source="CVE"/>
		<reference ref_id="CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010062.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- CVE-2021-4140: Fixed iframe sandbox bypass with XSLT (bsc#1194547).
- CVE-2022-22737: Fixed race condition when playing audio files (bsc#1194547).
- CVE-2022-22738: Fixed heap-buffer-overflow in blendGaussianBlur (bsc#1194547).
- CVE-2022-22739: Fixed missing throttling on external protocol launch dialog (bsc#1194547).
- CVE-2022-22740: Fixed use-after-free of ChannelEventQueue::mOwner (bsc#1194547).
- CVE-2022-22741: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22742: Fixed out-of-bounds memory access when inserting text in edit mode (bsc#1194547).
- CVE-2022-22743: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22744: Fixed possible command injection via the 'Copy as curl' feature in DevTools (bsc#1194547).
- CVE-2022-22745: Fixed leaking cross-origin URLs through securitypolicyviolation event (bsc#1194547).
- CVE-2022-22746: Fixed calling into reportValidity could have lead to fullscreen window spoof (bsc#1194547).
- CVE-2022-22747: Fixed crash when handling empty pkcs7 sequence(bsc#1194547).
- CVE-2022-22748: Fixed spoofed origin on external protocol launch dialog (bsc#1194547).
- CVE-2022-22751: Fixed memory safety bugs (bsc#1194547).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4140">CVE-2021-4140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22737">CVE-2022-22737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22738">CVE-2022-22738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22739">CVE-2022-22739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22740">CVE-2022-22740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22741">CVE-2022-22741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22742">CVE-2022-22742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22743">CVE-2022-22743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22744/">CVE-2022-22744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22744">CVE-2022-22744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22745">CVE-2022-22745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22746/">CVE-2022-22746 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22746">CVE-2022-22746 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22747">CVE-2022-22747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22748">CVE-2022-22748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22751">CVE-2022-22751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663814" comment="MozillaFirefox-91.5.0-78.159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663815" comment="MozillaFirefox-translations-common-91.5.0-78.159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663816" comment="MozillaFirefox-translations-other-91.5.0-78.159.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219774" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1195230" ref_url="https://bugzilla.suse.com/1195230" source="BUGZILLA"/>
		<reference ref_id="1195682" ref_url="https://bugzilla.suse.com/1195682" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22753" ref_url="https://www.suse.com/security/cve/CVE-2022-22753/" source="CVE"/>
		<reference ref_id="CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754/" source="CVE"/>
		<reference ref_id="CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756/" source="CVE"/>
		<reference ref_id="CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759/" source="CVE"/>
		<reference ref_id="CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760/" source="CVE"/>
		<reference ref_id="CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761/" source="CVE"/>
		<reference ref_id="CVE-2022-22763" ref_url="https://www.suse.com/security/cve/CVE-2022-22763/" source="CVE"/>
		<reference ref_id="CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010301.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.0 ESR / MFSA 2022-05 (bsc#1195682)

- CVE-2022-22753: Privilege Escalation to SYSTEM on Windows via Maintenance Service
- CVE-2022-22754: Extensions could have bypassed permission confirmation during update
- CVE-2022-22756: Drag and dropping an image could have resulted in the dropped object being an executable
- CVE-2022-22759: Sandboxed iframes could have executed script if the parent appended elements
- CVE-2022-22760: Cross-Origin responses could be distinguished between script and non-script content-types
- CVE-2022-22761: frame-ancestors Content Security Policy directive was not enforced for framed extension pages
- CVE-2022-22763: Script Execution during invalid object state
- CVE-2022-22764: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6


Firefox Extended Support Release 91.5.1 ESR (bsc#1195230)

- Fixed an issue that allowed unexpected data to be submitted in some of our search telemetry
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-24"/>
	<updated date="2022-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195230">SUSE bug 1195230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22753/">CVE-2022-22753 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22753">CVE-2022-22753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22754">CVE-2022-22754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22756">CVE-2022-22756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22759">CVE-2022-22759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22760">CVE-2022-22760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22761">CVE-2022-22761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22763/">CVE-2022-22763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22763">CVE-2022-22763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22764">CVE-2022-22764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668898" comment="MozillaFirefox-91.6.0-78.162.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668899" comment="MozillaFirefox-translations-common-91.6.0-78.162.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668900" comment="MozillaFirefox-translations-other-91.6.0-78.162.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219775" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1196809" ref_url="https://bugzilla.suse.com/1196809" source="BUGZILLA"/>
		<reference ref_id="1196900" ref_url="https://bugzilla.suse.com/1196900" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381/" source="CVE"/>
		<reference ref_id="CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383/" source="CVE"/>
		<reference ref_id="CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384/" source="CVE"/>
		<reference ref_id="CVE-2022-26386" ref_url="https://www.suse.com/security/cve/CVE-2022-26386/" source="CVE"/>
		<reference ref_id="CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387/" source="CVE"/>
		<reference ref_id="CVE-2022-26485" ref_url="https://www.suse.com/security/cve/CVE-2022-26485/" source="CVE"/>
		<reference ref_id="CVE-2022-26486" ref_url="https://www.suse.com/security/cve/CVE-2022-26486/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010417.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.7.0 ESR (bsc#1196900):

- CVE-2022-26383: Browser window spoof using fullscreen mode
- CVE-2022-26384: iframe allow-scripts sandbox bypass
- CVE-2022-26387: Time-of-check time-of-use bug when verifying add-on signatures
- CVE-2022-26381: Use-after-free in text reflows
- CVE-2022-26386: Temporary files downloaded to /tmp and accessible by other local users

Firefox Extended Support Release 91.6.1 ESR (bsc#1196809):

- CVE-2022-26485: Use-after-free in XSLT parameter processing
- CVE-2022-26486: Use-after-free in WebGPU IPC Framework
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-11"/>
	<updated date="2022-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196809">SUSE bug 1196809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26381">CVE-2022-26381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26383">CVE-2022-26383 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26384">CVE-2022-26384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26386/">CVE-2022-26386 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26386">CVE-2022-26386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26387">CVE-2022-26387 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26485/">CVE-2022-26485 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26485">CVE-2022-26485 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26486/">CVE-2022-26486 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26486">CVE-2022-26486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672457" comment="MozillaFirefox-91.7.0-78.167.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672458" comment="MozillaFirefox-translations-common-91.7.0-78.167.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672459" comment="MozillaFirefox-translations-other-91.7.0-78.167.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219776" version="1" class="patch">
	<metadata>
		<title>Recommended update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="CVE-2022-1196" ref_url="https://www.suse.com/security/cve/CVE-2022-1196/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2022-28281" ref_url="https://www.suse.com/security/cve/CVE-2022-28281/" source="CVE"/>
		<reference ref_id="CVE-2022-28282" ref_url="https://www.suse.com/security/cve/CVE-2022-28282/" source="CVE"/>
		<reference ref_id="CVE-2022-28285" ref_url="https://www.suse.com/security/cve/CVE-2022-28285/" source="CVE"/>
		<reference ref_id="CVE-2022-28286" ref_url="https://www.suse.com/security/cve/CVE-2022-28286/" source="CVE"/>
		<reference ref_id="CVE-2022-28289" ref_url="https://www.suse.com/security/cve/CVE-2022-28289/" source="CVE"/>
		<reference ref_id="SUSE-RU-2022:14935-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022462.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.8.0 ESR (bsc#1197903):

MFSA 2022-14 (bsc#1197903)

* CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11 tokens are removed while in use
* CVE-2022-28281: Fixed an out of bounds write due to unexpected WebAuthN Extensions
* CVE-2022-1196: Fixed a use-after-free after VR Process destruction
* CVE-2022-28282: Fixed a use-after-free in DocumentL10n::TranslateDocument
* CVE-2022-28285: Fixed incorrect AliasSet used in JIT Codegen
* CVE-2022-28286: Fixed that iframe contents could be rendered outside the border
* CVE-2022-24713: Fixed a denial of service via complex regular expressions
* CVE-2022-28289: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-05"/>
	<updated date="2022-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1097">CVE-2022-1097 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1196/">CVE-2022-1196 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1196">CVE-2022-1196 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28281/">CVE-2022-28281 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28281">CVE-2022-28281 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28282/">CVE-2022-28282 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28282">CVE-2022-28282 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28285/">CVE-2022-28285 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28285">CVE-2022-28285 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28286/">CVE-2022-28286 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28286">CVE-2022-28286 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28289/">CVE-2022-28289 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28289">CVE-2022-28289 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678509" comment="MozillaFirefox-91.8.0-78.170.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678510" comment="MozillaFirefox-translations-common-91.8.0-78.170.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678511" comment="MozillaFirefox-translations-other-91.8.0-78.170.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219777" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="908275" ref_url="https://bugzilla.suse.com/908275" source="BUGZILLA"/>
		<reference ref_id="935033" ref_url="https://bugzilla.suse.com/935033" source="BUGZILLA"/>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001503.html" source="SUSE-SU"/>
		<description>
MozillaFirefox, mozilla-nspr and mozilla-nss were updated to fix 17 security issues.

For more details please check the changelogs.

These security issues were fixed:
- CVE-2015-2724/CVE-2015-2725/CVE-2015-2726: Miscellaneous memory safety hazards (bsc#935979).
- CVE-2015-2728: Type confusion in Indexed Database Manager (bsc#935979).
- CVE-2015-2730: ECDSA signature validation fails to handle some signatures correctly (bsc#935979).
- CVE-2015-2722/CVE-2015-2733: Use-after-free in workers while using XMLHttpRequest (bsc#935979).
- CVE-2015-2734/CVE-2015-2735/CVE-2015-2736/CVE-2015-2737/CVE-2015-2738/CVE-2015-2739/CVE-2015-2740: Vulnerabilities found through code inspection (bsc#935979).
- CVE-2015-2743: Privilege escalation in PDF.js (bsc#935979).
- CVE-2015-4000: NSS accepts export-length DHE keys with regular DHE cipher suites (bsc#935033).
- CVE-2015-2721: NSS incorrectly permits skipping of ServerKeyExchange (bsc#935979).

This non-security issue was fixed:
- bsc#908275: Firefox did not print in landscape orientation.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-15"/>
	<updated date="2015-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/908275">SUSE bug 908275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935033">SUSE bug 935033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2721">CVE-2015-2721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2722">CVE-2015-2722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2724">CVE-2015-2724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2725">CVE-2015-2725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2726">CVE-2015-2726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2728">CVE-2015-2728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2730">CVE-2015-2730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2733">CVE-2015-2733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2734">CVE-2015-2734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2735">CVE-2015-2735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2736">CVE-2015-2736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2737">CVE-2015-2737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2738">CVE-2015-2738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2739">CVE-2015-2739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2740">CVE-2015-2740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2743">CVE-2015-2743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577225" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577226" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577227" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577228" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577229" comment="libfreebl3-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577230" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577231" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577232" comment="libsoftokn3-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577233" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577234" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577235" comment="mozilla-nspr-x86-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577236" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577237" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577238" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577239" comment="mozilla-nss-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577225" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577226" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577227" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577228" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577229" comment="libfreebl3-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577230" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577231" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577232" comment="libsoftokn3-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577233" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577234" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577235" comment="mozilla-nspr-x86-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577236" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577237" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577238" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577239" comment="mozilla-nss-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219778" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="969894" ref_url="https://bugzilla.suse.com/969894" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952/" source="CVE"/>
		<reference ref_id="CVE-2016-1953" ref_url="https://www.suse.com/security/cve/CVE-2016-1953/" source="CVE"/>
		<reference ref_id="CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954/" source="CVE"/>
		<reference ref_id="CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957/" source="CVE"/>
		<reference ref_id="CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958/" source="CVE"/>
		<reference ref_id="CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960/" source="CVE"/>
		<reference ref_id="CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961/" source="CVE"/>
		<reference ref_id="CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962/" source="CVE"/>
		<reference ref_id="CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964/" source="CVE"/>
		<reference ref_id="CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965/" source="CVE"/>
		<reference ref_id="CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966/" source="CVE"/>
		<reference ref_id="CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974/" source="CVE"/>
		<reference ref_id="CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977/" source="CVE"/>
		<reference ref_id="CVE-2016-1978" ref_url="https://www.suse.com/security/cve/CVE-2016-1978/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790/" source="CVE"/>
		<reference ref_id="CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791/" source="CVE"/>
		<reference ref_id="CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792/" source="CVE"/>
		<reference ref_id="CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793/" source="CVE"/>
		<reference ref_id="CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794/" source="CVE"/>
		<reference ref_id="CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795/" source="CVE"/>
		<reference ref_id="CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796/" source="CVE"/>
		<reference ref_id="CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797/" source="CVE"/>
		<reference ref_id="CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798/" source="CVE"/>
		<reference ref_id="CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799/" source="CVE"/>
		<reference ref_id="CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800/" source="CVE"/>
		<reference ref_id="CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801/" source="CVE"/>
		<reference ref_id="CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox, mozilla-nspr, mozilla-nss fixes the following issues:

Mozilla Firefox was updated to 38.7.0 ESR (bsc#969894)
* MFSA 2016-16/CVE-2016-1952/CVE-2016-1953
  Miscellaneous memory safety hazards (rv:45.0 / rv:38.7)
* MFSA 2016-17/CVE-2016-1954
  Local file overwriting and potential privilege escalation
  through CSP reports
* MFSA 2016-20/CVE-2016-1957
  A memory leak in libstagefright when deleting an array during
  MP4 processing was fixed.
* MFSA 2016-21/CVE-2016-1958
  The displayed page address can be overridden
* MFSA 2016-23/CVE-2016-1960
  A use-after-free in HTML5 string parser was fixed.
* MFSA 2016-24/CVE-2016-1961
  A use-after-free in SetBody was fixed.
* MFSA 2016-25/CVE-2016-1962
  A use-after-free when using multiple WebRTC data channels was fixed.
* MFSA 2016-27/CVE-2016-1964
  A use-after-free during XML transformations was fixed.
* MFSA 2016-28/CVE-2016-1965
  Addressbar spoofing though history navigation and Location
  protocol property was fixed.
* MFSA 2016-31/CVE-2016-1966
  Memory corruption with malicious NPAPI plugin was fixed.
* MFSA 2016-34/CVE-2016-1974
  A out-of-bounds read in the HTML parser following a failed
  allocation was fixed.
* MFSA 2016-35/CVE-2016-1950
  A buffer overflow during ASN.1 decoding in NSS was fixed.
* MFSA 2016-37/CVE-2016-1977/CVE-2016-2790/CVE-2016-2791/
  CVE-2016-2792/CVE-2016-2793/CVE-2016-2794/CVE-2016-2795/
  CVE-2016-2796/CVE-2016-2797/CVE-2016-2798/CVE-2016-2799/
  CVE-2016-2800/CVE-2016-2801/CVE-2016-2802
  Various font vulnerabilities were fixed in the embedded Graphite 2 library

Mozilla NSS was updated to fix:
* MFSA 2016-15/CVE-2016-1978
  Use-after-free in NSS during SSL connections in low memory
* MFSA 2016-35/CVE-2016-1950
  Buffer overflow during ASN.1 decoding in NSS
* MFSA 2016-36/CVE-2016-1979
  Use-after-free during processing of DER encoded keys in NSS

Mozilla NSPR was updated to version 4.12 (bsc#969894)
* added a PR_GetEnvSecure function, which attempts to detect if
  the program is being executed with elevated privileges, and
  returns NULL if detected. It is recommended to use this function
  in general purpose library code.
* fixed a memory allocation bug related to the PR_*printf functions
* exported API PR_DuplicateEnvironment, which had already been
  added in NSPR 4.10.9
* added support for FreeBSD aarch64
* several minor correctness and compatibility fixes
* Enable atomic instructions on mips (bmo#1129878)
* Fix mips assertion failure when creating thread with custom
  stack size (bmo#1129968)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-15"/>
	<updated date="2016-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1950">CVE-2016-1950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1952">CVE-2016-1952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1953/">CVE-2016-1953 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1953">CVE-2016-1953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1954">CVE-2016-1954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1957">CVE-2016-1957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1958">CVE-2016-1958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1960">CVE-2016-1960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1961">CVE-2016-1961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1962">CVE-2016-1962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1964">CVE-2016-1964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1965">CVE-2016-1965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1966">CVE-2016-1966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1974">CVE-2016-1974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1977">CVE-2016-1977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1978/">CVE-2016-1978 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1978">CVE-2016-1978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1979">CVE-2016-1979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2790">CVE-2016-2790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2791">CVE-2016-2791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2792">CVE-2016-2792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2793">CVE-2016-2793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2794">CVE-2016-2794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2795">CVE-2016-2795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2796">CVE-2016-2796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2797">CVE-2016-2797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2798">CVE-2016-2798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2799">CVE-2016-2799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2800">CVE-2016-2800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2801">CVE-2016-2801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2802">CVE-2016-2802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581975" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581976" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581977" comment="libfreebl3-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581978" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581979" comment="libfreebl3-x86-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581980" comment="libsoftokn3-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581981" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581982" comment="libsoftokn3-x86-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581983" comment="mozilla-nspr-4.12-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581984" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581985" comment="mozilla-nspr-x86-4.12-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581986" comment="mozilla-nss-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581987" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581988" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581989" comment="mozilla-nss-x86-3.20.2-28.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581975" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581976" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581977" comment="libfreebl3-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581978" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581979" comment="libfreebl3-x86-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581980" comment="libsoftokn3-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581981" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581982" comment="libsoftokn3-x86-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581983" comment="mozilla-nspr-4.12-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581984" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581985" comment="mozilla-nspr-x86-4.12-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581986" comment="mozilla-nss-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581987" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581988" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581989" comment="mozilla-nss-x86-3.20.2-28.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219779" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, rust-cbindgen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1190274" ref_url="https://bugzilla.suse.com/1190274" source="BUGZILLA"/>
		<reference ref_id="1190710" ref_url="https://bugzilla.suse.com/1190710" source="BUGZILLA"/>
		<reference ref_id="1191332" ref_url="https://bugzilla.suse.com/1191332" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-32810" ref_url="https://www.suse.com/security/cve/CVE-2021-32810/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<reference ref_id="CVE-2021-38496" ref_url="https://www.suse.com/security/cve/CVE-2021-38496/" source="CVE"/>
		<reference ref_id="CVE-2021-38497" ref_url="https://www.suse.com/security/cve/CVE-2021-38497/" source="CVE"/>
		<reference ref_id="CVE-2021-38498" ref_url="https://www.suse.com/security/cve/CVE-2021-38498/" source="CVE"/>
		<reference ref_id="CVE-2021-38500" ref_url="https://www.suse.com/security/cve/CVE-2021-38500/" source="CVE"/>
		<reference ref_id="CVE-2021-38501" ref_url="https://www.suse.com/security/cve/CVE-2021-38501/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, rust-cbindgen fixes the following issues:

MozillaFirefox was updated to Extended Support Release 91.2.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-45 (bsc#1191332)

  * CVE-2021-38496: Use-after-free in MessageTask
  * CVE-2021-38497: Validation message could have been overlaid on another origin
  * CVE-2021-38498: Use-after-free of nsLanguageAtomService object
  * CVE-2021-32810: Data race in crossbeam-deque
  * CVE-2021-38500: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2
  * CVE-2021-38501: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2

- Fixed crash in FIPS mode (bsc#1190710)

Firefox Extended Support Release 91.1.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274)

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Firefox 91.0.1esr ESR

  * Fixed: Fixed an issue causing buttons on the tab bar to be
    resized when loading certain websites (bug 1704404)
    (bmo#1704404)
  * Fixed: Fixed an issue which caused tabs from private windows
    to be visible in non-private windows when viewing switch-to-
    tab results in the address bar panel (bug 1720369)
    (bmo#1720369)
  * Fixed: Various stability fixes
  * Fixed: Security fix
  MFSA 2021-37 (bsc#1189547)
  * CVE-2021-29991 (bmo#1724896)
    Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

  * New: Some of the highlights of the new Extended Support
    Release are:
    - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
    - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
    - On Windows, updates can now be applied in the background
    while Firefox is not running.
    - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
    - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
    - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
    - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
    - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
    - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
    - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
    - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
    - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
    - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
    - We’ve improved functionality and design for a number of
    Firefox search features:
      * Selecting a search engine at the bottom of the search
    panel now enters search mode for that engine, allowing you to
    see suggestions (if available) for your search terms. The old
    behavior (immediately performing a search) is available with
    a shift-click.
      * When Firefox autocompletes the URL of one of your search
    engines, you can now search with that engine directly in the
    address bar by selecting the shortcut in the address bar
    results.
      * We’ve added buttons at the bottom of the search panel to
    allow you to search your bookmarks, open tabs, and history.
    - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
    - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
    - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
  * Changed: Firefox no longer supports Adobe Flash. There is no
    setting available to re-enable Flash support.
  * Enterprise: Various bug fixes and new policies have been
    implemented in the latest version of Firefox. See more
    details in the Firefox for Enterprise 91 Release Notes.

MFSA 2021-33 (bsc#1188891)

* CVE-2021-29986: Race condition when resolving DNS names could have led to memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91

rust-cbindgen was updated to 0.19.0.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-18"/>
	<updated date="2021-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190274">SUSE bug 1190274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190710">SUSE bug 1190710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29981">CVE-2021-29981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29982">CVE-2021-29982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29983">CVE-2021-29983 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29987">CVE-2021-29987 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29990">CVE-2021-29990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29991">CVE-2021-29991 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32810/">CVE-2021-32810 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32810">CVE-2021-32810 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38492">CVE-2021-38492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38495">CVE-2021-38495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38496/">CVE-2021-38496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38496">CVE-2021-38496 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38497/">CVE-2021-38497 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38497">CVE-2021-38497 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38498/">CVE-2021-38498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38498">CVE-2021-38498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38500/">CVE-2021-38500 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38500">CVE-2021-38500 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38501/">CVE-2021-38501 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38501">CVE-2021-38501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652557" comment="MozillaFirefox-91.2.0-78.143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652558" comment="MozillaFirefox-branding-SLED-91-21.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652559" comment="MozillaFirefox-translations-common-91.2.0-78.143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652560" comment="MozillaFirefox-translations-other-91.2.0-78.143.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219780" version="1" class="patch">
	<metadata>
		<title>Recommended update for NetworkManager-kde4 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="663413" ref_url="https://bugzilla.suse.com/663413" source="BUGZILLA"/>
		<reference ref_id="726349" ref_url="https://bugzilla.suse.com/726349" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2016:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002088.html" source="SUSE-SU"/>
		<description>
This NetworkManager-kde4 update fixes the following security and non security issues: 

- Fixed a long standing security issue. This makes knetworkmanager probe the RADIUS server for a CA certificate subject and hash if no CA certificate is specified. knetworkmanager then stores this data and send it to NetworkManager for it to do a network validation in the absence of a real certificate (bsc#726349)

- Disabled the loading by default of the NetworkManager plasma applet since it doesn't work.
- Fixed a crash due to the use of an uninitialized variable in the plasma applet in case someone runs it manually (bsc#663413)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-01"/>
	<updated date="2016-06-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/663413">SUSE bug 663413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/726349">SUSE bug 726349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581990" comment="NetworkManager-kde4-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581991" comment="NetworkManager-kde4-lang-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581992" comment="NetworkManager-kde4-libs-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581993" comment="NetworkManager-openvpn-kde4-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581994" comment="NetworkManager-pptp-kde4-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581995" comment="plasmoid-networkmanagement-0.9.svn1043876-1.3.15 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581990" comment="NetworkManager-kde4-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581991" comment="NetworkManager-kde4-lang-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581992" comment="NetworkManager-kde4-libs-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581993" comment="NetworkManager-openvpn-kde4-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581994" comment="NetworkManager-pptp-kde4-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581995" comment="plasmoid-networkmanagement-0.9.svn1043876-1.3.15 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219781" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1040107" ref_url="https://bugzilla.suse.com/1040107" source="BUGZILLA"/>
		<reference ref_id="1040114" ref_url="https://bugzilla.suse.com/1040114" source="BUGZILLA"/>
		<reference ref_id="1052522" ref_url="https://bugzilla.suse.com/1052522" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12596" ref_url="https://www.suse.com/security/cve/CVE-2017-12596/" source="CVE"/>
		<reference ref_id="CVE-2017-9110" ref_url="https://www.suse.com/security/cve/CVE-2017-9110/" source="CVE"/>
		<reference ref_id="CVE-2017-9114" ref_url="https://www.suse.com/security/cve/CVE-2017-9114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003774.html" source="SUSE-SU"/>
		<description>
This update for OpenEXR fixes the following issues:

* CVE-2017-9110: In OpenEXR, an invalid read of size 2 in the hufDecode function in ImfHuf.cpp could cause the application to crash. (bsc#1040107)
* CVE-2017-9114: In OpenEXR, an invalid read of size 1 in the refill function in ImfFastHuf.cpp could cause the application to crash.  (bsc#1040114)
* CVE-2017-12596: In OpenEXR, a crafted image causes a heap-based buffer over-read in the hufDecode function in IlmImf/ImfHuf.cpp during exrmaketiled execution; it could have resulted in denial of service or possibly unspecified other impact.  (bsc#1052522)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-02"/>
	<updated date="2018-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040107">SUSE bug 1040107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040114">SUSE bug 1040114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052522">SUSE bug 1052522</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12596/">CVE-2017-12596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12596">CVE-2017-12596 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9110/">CVE-2017-9110 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9110">CVE-2017-9110 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9114/">CVE-2017-9114 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9114">CVE-2017-9114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581996" comment="OpenEXR-1.6.1-83.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581997" comment="OpenEXR-32bit-1.6.1-83.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581998" comment="OpenEXR-x86-1.6.1-83.17.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581996" comment="OpenEXR-1.6.1-83.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581997" comment="OpenEXR-32bit-1.6.1-83.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581998" comment="OpenEXR-x86-1.6.1-83.17.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219782" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1184354" ref_url="https://bugzilla.suse.com/1184354" source="BUGZILLA"/>
		<reference ref_id="1187395" ref_url="https://bugzilla.suse.com/1187395" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3479" ref_url="https://www.suse.com/security/cve/CVE-2021-3479/" source="CVE"/>
		<reference ref_id="CVE-2021-3605" ref_url="https://www.suse.com/security/cve/CVE-2021-3605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009069.html" source="SUSE-SU"/>
		<description>
This update for OpenEXR fixes the following issues:

- Fixed CVE-2021-3479 [bsc#1184354]: Out-of-memory caused by allocation of a very large buffer
- Fixed CVE-2021-3605 [bsc#1187395]: Heap buffer overflow in the rleUncompress function
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-22"/>
	<updated date="2021-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184354">SUSE bug 1184354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187395">SUSE bug 1187395</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3479/">CVE-2021-3479 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3479">CVE-2021-3479 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3605/">CVE-2021-3605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3605">CVE-2021-3605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581999" comment="OpenEXR-1.6.1-83.17.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582000" comment="OpenEXR-32bit-1.6.1-83.17.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219783" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1188457" ref_url="https://bugzilla.suse.com/1188457" source="BUGZILLA"/>
		<reference ref_id="1188458" ref_url="https://bugzilla.suse.com/1188458" source="BUGZILLA"/>
		<reference ref_id="1188460" ref_url="https://bugzilla.suse.com/1188460" source="BUGZILLA"/>
		<reference ref_id="1188461" ref_url="https://bugzilla.suse.com/1188461" source="BUGZILLA"/>
		<reference ref_id="1192556" ref_url="https://bugzilla.suse.com/1192556" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20298" ref_url="https://www.suse.com/security/cve/CVE-2021-20298/" source="CVE"/>
		<reference ref_id="CVE-2021-20300" ref_url="https://www.suse.com/security/cve/CVE-2021-20300/" source="CVE"/>
		<reference ref_id="CVE-2021-20303" ref_url="https://www.suse.com/security/cve/CVE-2021-20303/" source="CVE"/>
		<reference ref_id="CVE-2021-20304" ref_url="https://www.suse.com/security/cve/CVE-2021-20304/" source="CVE"/>
		<reference ref_id="CVE-2021-3941" ref_url="https://www.suse.com/security/cve/CVE-2021-3941/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009786.html" source="SUSE-SU"/>
		<description>
This update for OpenEXR fixes the following issues:

- CVE-2021-20298: Fixed out-of-memory in B44Compressor (bsc#1188460).
- CVE-2021-20300: Fixed integer-overflow in Imf_2_5:hufUncompress (bsc#1188458).
- CVE-2021-20303: Fixed heap-buffer-overflow in Imf_2_5::copyIntoFrameBuffe (bsc#1188457).
- CVE-2021-20304: Fixed undefined-shift in Imf_2_5:hufDecode (bsc#1188461).
- CVE-2021-3941: Fixed divide-by-zero in Imf_3_1:RGBtoXYZ (bsc#1192556).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188457">SUSE bug 1188457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188458">SUSE bug 1188458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188460">SUSE bug 1188460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188461">SUSE bug 1188461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192556">SUSE bug 1192556</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20298/">CVE-2021-20298 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20298">CVE-2021-20298 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20300/">CVE-2021-20300 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20300">CVE-2021-20300 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-20303/">CVE-2021-20303 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20303">CVE-2021-20303 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20304/">CVE-2021-20304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20304">CVE-2021-20304 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3941/">CVE-2021-3941 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3941">CVE-2021-3941 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657137" comment="OpenEXR-1.6.1-83.17.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657138" comment="OpenEXR-32bit-1.6.1-83.17.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219784" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1124799" ref_url="https://bugzilla.suse.com/1124799" source="BUGZILLA"/>
		<reference ref_id="1124800" ref_url="https://bugzilla.suse.com/1124800" source="BUGZILLA"/>
		<reference ref_id="1124802" ref_url="https://bugzilla.suse.com/1124802" source="BUGZILLA"/>
		<reference ref_id="1124803" ref_url="https://bugzilla.suse.com/1124803" source="BUGZILLA"/>
		<reference ref_id="1124805" ref_url="https://bugzilla.suse.com/1124805" source="BUGZILLA"/>
		<reference ref_id="1124806" ref_url="https://bugzilla.suse.com/1124806" source="BUGZILLA"/>
		<reference ref_id="1124824" ref_url="https://bugzilla.suse.com/1124824" source="BUGZILLA"/>
		<reference ref_id="1124825" ref_url="https://bugzilla.suse.com/1124825" source="BUGZILLA"/>
		<reference ref_id="1124826" ref_url="https://bugzilla.suse.com/1124826" source="BUGZILLA"/>
		<reference ref_id="1124827" ref_url="https://bugzilla.suse.com/1124827" source="BUGZILLA"/>
		<reference ref_id="1125099" ref_url="https://bugzilla.suse.com/1125099" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-7572" ref_url="https://www.suse.com/security/cve/CVE-2019-7572/" source="CVE"/>
		<reference ref_id="CVE-2019-7573" ref_url="https://www.suse.com/security/cve/CVE-2019-7573/" source="CVE"/>
		<reference ref_id="CVE-2019-7574" ref_url="https://www.suse.com/security/cve/CVE-2019-7574/" source="CVE"/>
		<reference ref_id="CVE-2019-7575" ref_url="https://www.suse.com/security/cve/CVE-2019-7575/" source="CVE"/>
		<reference ref_id="CVE-2019-7576" ref_url="https://www.suse.com/security/cve/CVE-2019-7576/" source="CVE"/>
		<reference ref_id="CVE-2019-7577" ref_url="https://www.suse.com/security/cve/CVE-2019-7577/" source="CVE"/>
		<reference ref_id="CVE-2019-7578" ref_url="https://www.suse.com/security/cve/CVE-2019-7578/" source="CVE"/>
		<reference ref_id="CVE-2019-7635" ref_url="https://www.suse.com/security/cve/CVE-2019-7635/" source="CVE"/>
		<reference ref_id="CVE-2019-7636" ref_url="https://www.suse.com/security/cve/CVE-2019-7636/" source="CVE"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2019-7638" ref_url="https://www.suse.com/security/cve/CVE-2019-7638/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005272.html" source="SUSE-SU"/>
		<description>
This update for SDL fixes the following issues:

Security issues fixed:	  

- CVE-2019-7572: Fixed a buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c.(bsc#1124806).
- CVE-2019-7578: Fixed a heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c (bsc#1125099).
- CVE-2019-7576: Fixed heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (bsc#1124799).
- CVE-2019-7573: Fixed a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (bsc#1124805).
- CVE-2019-7635: Fixed a heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c. (bsc#1124827).
- CVE-2019-7636: Fixed a heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c (bsc#1124826).
- CVE-2019-7638: Fixed a heap-based buffer over-read in Map1toN in video/SDL_pixels.c (bsc#1124824).
- CVE-2019-7574: Fixed a heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c (bsc#1124803).
- CVE-2019-7575: Fixed a heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c (bsc#1124802).
- CVE-2019-7637: Fixed a heap-based buffer overflow in SDL_FillRect function in SDL_surface.c (bsc#1124825).	  
- CVE-2019-7577: Fixed a buffer over read in SDL_LoadWAV_RW in audio/SDL_wave.c (bsc#1124800).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124799">SUSE bug 1124799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124800">SUSE bug 1124800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124802">SUSE bug 1124802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124803">SUSE bug 1124803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124805">SUSE bug 1124805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124806">SUSE bug 1124806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124824">SUSE bug 1124824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124825">SUSE bug 1124825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124826">SUSE bug 1124826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124827">SUSE bug 1124827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125099">SUSE bug 1125099</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7572/">CVE-2019-7572 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7572">CVE-2019-7572 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7573/">CVE-2019-7573 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7573">CVE-2019-7573 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7574/">CVE-2019-7574 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7574">CVE-2019-7574 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7575/">CVE-2019-7575 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7575">CVE-2019-7575 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7576/">CVE-2019-7576 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7576">CVE-2019-7576 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7577/">CVE-2019-7577 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7577">CVE-2019-7577 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7578/">CVE-2019-7578 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7578">CVE-2019-7578 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7635/">CVE-2019-7635 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7635">CVE-2019-7635 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7636/">CVE-2019-7636 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7636">CVE-2019-7636 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7637">CVE-2019-7637 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7638/">CVE-2019-7638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7638">CVE-2019-7638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582001" comment="SDL-1.2.13-106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582002" comment="SDL-32bit-1.2.13-106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582003" comment="SDL-x86-1.2.13-106.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582001" comment="SDL-1.2.13-106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582002" comment="SDL-32bit-1.2.13-106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582003" comment="SDL-x86-1.2.13-106.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219785" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1124825" ref_url="https://bugzilla.suse.com/1124825" source="BUGZILLA"/>
		<reference ref_id="1181201" ref_url="https://bugzilla.suse.com/1181201" source="BUGZILLA"/>
		<reference ref_id="1181202" ref_url="https://bugzilla.suse.com/1181202" source="BUGZILLA"/>
		<reference ref_id="1198001" ref_url="https://bugzilla.suse.com/1198001" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010802.html" source="SUSE-SU"/>
		<description>
This update for SDL fixes the following issues:

- CVE-2020-14410: Fixed a heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c (bsc#1181201).
- CVE-2019-7637: Fixed a heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c (bsc#1124825).
- CVE-2021-33657: Fix a buffer overflow when parsing a crafted BMP image (bsc#1198001).
- CVE-2020-14409: Fixed an integer overflow (and resultant SDL_memcpy heap corruption) in SDL_BlitCopy in video/SDL_blit_copy.c (bsc#1181202).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124825">SUSE bug 1124825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181201">SUSE bug 1181201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181202">SUSE bug 1181202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198001">SUSE bug 1198001</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7637">CVE-2019-7637 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14409">CVE-2020-14409 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14410">CVE-2020-14410 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33657">CVE-2021-33657 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679745" comment="SDL-1.2.13-106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679746" comment="SDL-32bit-1.2.13-106.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219786" version="1" class="patch">
	<metadata>
		<title>Security update for SuSEfirewall2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1064127" ref_url="https://bugzilla.suse.com/1064127" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15638" ref_url="https://www.suse.com/security/cve/CVE-2017-15638/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003370.html" source="SUSE-SU"/>
		<description>
This update for SuSEfirewall2 fixes the following issues:

- CVE-2017-15638: Fixed a security issue with too open implicit portmapper rules
  (bsc#1064127): A source net restriction for _rpc_ services
  was not taken into account for the implicitly added rules for port 111,
  making the portmap service accessible to everyone in the affected zone.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-02"/>
	<updated date="2017-11-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064127">SUSE bug 1064127</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15638/">CVE-2017-15638 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15638">CVE-2017-15638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570690" comment="SuSEfirewall2-3.6_SVNr208-2.18.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570690" comment="SuSEfirewall2-3.6_SVNr208-2.18.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219787" version="1" class="patch">
	<metadata>
		<title>security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="939709" ref_url="https://bugzilla.suse.com/939709" source="BUGZILLA"/>
		<reference ref_id="939712" ref_url="https://bugzilla.suse.com/939712" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5165" ref_url="https://www.suse.com/security/cve/CVE-2015-5165/" source="CVE"/>
		<reference ref_id="CVE-2015-5166" ref_url="https://www.suse.com/security/cve/CVE-2015-5166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001542.html" source="SUSE-SU"/>
		<description>


This security update of Xen fixes the following issues:

* bsc#939712 (XSA-140): QEMU leak of uninitialized heap
  memory in rtl8139 device model (CVE-2015-5165)
* bsc#939709 (XSA-139):  Use after free in QEMU/Xen
  block unplug protocol (CVE-2015-5166)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-11"/>
	<updated date="2015-08-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/939709">SUSE bug 939709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939712">SUSE bug 939712</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-5165/">CVE-2015-5165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5165">CVE-2015-5165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5166/">CVE-2015-5166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5166">CVE-2015-5166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567300" comment="xen-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567301" comment="xen-doc-html-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567302" comment="xen-kmp-default-4.4.2_12_3.0.101_63-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567303" comment="xen-kmp-pae-4.4.2_12_3.0.101_63-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567304" comment="xen-libs-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567305" comment="xen-libs-32bit-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567306" comment="xen-tools-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567307" comment="xen-tools-domU-4.4.2_12-23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567300" comment="xen-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567301" comment="xen-doc-html-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567302" comment="xen-kmp-default-4.4.2_12_3.0.101_63-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567303" comment="xen-kmp-pae-4.4.2_12_3.0.101_63-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567304" comment="xen-libs-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567305" comment="xen-libs-32bit-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567306" comment="xen-tools-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567307" comment="xen-tools-domU-4.4.2_12-23.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219788" version="1" class="patch">
	<metadata>
		<title>Security update for adns (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1172265" ref_url="https://bugzilla.suse.com/1172265" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9103" ref_url="https://www.suse.com/security/cve/CVE-2017-9103/" source="CVE"/>
		<reference ref_id="CVE-2017-9104" ref_url="https://www.suse.com/security/cve/CVE-2017-9104/" source="CVE"/>
		<reference ref_id="CVE-2017-9105" ref_url="https://www.suse.com/security/cve/CVE-2017-9105/" source="CVE"/>
		<reference ref_id="CVE-2017-9106" ref_url="https://www.suse.com/security/cve/CVE-2017-9106/" source="CVE"/>
		<reference ref_id="CVE-2017-9107" ref_url="https://www.suse.com/security/cve/CVE-2017-9107/" source="CVE"/>
		<reference ref_id="CVE-2017-9108" ref_url="https://www.suse.com/security/cve/CVE-2017-9108/" source="CVE"/>
		<reference ref_id="CVE-2017-9109" ref_url="https://www.suse.com/security/cve/CVE-2017-9109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006979.html" source="SUSE-SU"/>
		<description>
This update for adns fixes the following issues:

- CVE-2017-9103,CVE-2017-9104,CVE-2017-9105,CVE-2017-9109: Fixed an issue in local recursive resolver
  which could have led to remote code execution (bsc#1172265).
- CVE-2017-9106: Fixed an issue with upstream DNS data sources which could have led to denial of 
  service (bsc#1172265).
- CVE-2017-9107: Fixed an issue when quering domain names which could have led to denial of service (bsc#1172265).
- CVE-2017-9108: Fixed an issue which could have led to denial of service (bsc#1172265).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-18"/>
	<updated date="2020-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9103/">CVE-2017-9103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9103">CVE-2017-9103 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9104/">CVE-2017-9104 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9104">CVE-2017-9104 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9105/">CVE-2017-9105 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9105">CVE-2017-9105 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9106/">CVE-2017-9106 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9106">CVE-2017-9106 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9107/">CVE-2017-9107 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9107">CVE-2017-9107 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9108/">CVE-2017-9108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9108">CVE-2017-9108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9109/">CVE-2017-9109 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9109">CVE-2017-9109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582004" comment="libadns1-1.4-75.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219789" version="1" class="patch">
	<metadata>
		<title>Security update for aide (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1194735" ref_url="https://bugzilla.suse.com/1194735" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45417" ref_url="https://www.suse.com/security/cve/CVE-2021-45417/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010061.html" source="SUSE-SU"/>
		<description>
This update for aide fixes the following issues:

- CVE-2021-45417: Fix a bufferoverflow in base64 functions (bsc#1194735)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194735">SUSE bug 1194735</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45417/">CVE-2021-45417 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45417">CVE-2021-45417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664251" comment="aide-0.13.1-40.16.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219790" version="1" class="patch">
	<metadata>
		<title>Security update for amanda (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1112916" ref_url="https://bugzilla.suse.com/1112916" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10729" ref_url="https://www.suse.com/security/cve/CVE-2016-10729/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004963.html" source="SUSE-SU"/>
		<description>
This update for amanda fixes the following issues:

Security issue fixed:

- CVE-2016-10729: Fixed a local privilege escalation from amanda to root via unsafe tar command options (bsc#1112916).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1112916">SUSE bug 1112916</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10729/">CVE-2016-10729 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10729">CVE-2016-10729 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582005" comment="amanda-2.5.2.1-188.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582005" comment="amanda-2.5.2.1-188.5.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219791" version="1" class="patch">
	<metadata>
		<title>Security update for ant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1100053" ref_url="https://bugzilla.suse.com/1100053" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10886" ref_url="https://www.suse.com/security/cve/CVE-2018-10886/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004578.html" source="SUSE-SU"/>
		<description>
This update for ant fixes the following issues:

Security issue fixed:

- CVE-2018-10886: Fixed a path traversal vulnerability in malformed zip file
  paths, which allowed arbitrary file writes and could potentially lead to
  code execution (bsc#1100053)

Other changes made:

- Removed support for javadoc
- Default value for stripAbsolutePathSpec changed to 'true'
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-21"/>
	<updated date="2018-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100053">SUSE bug 1100053</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10886/">CVE-2018-10886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-10886">CVE-2018-10886 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564215" comment="ant-1.7.1-20.11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564232" comment="ant-trax-1.7.1-16.11.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564215" comment="ant-1.7.1-20.11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564232" comment="ant-trax-1.7.1-16.11.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219792" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="444878" ref_url="https://bugzilla.suse.com/444878" source="BUGZILLA"/>
		<reference ref_id="931002" ref_url="https://bugzilla.suse.com/931002" source="BUGZILLA"/>
		<reference ref_id="938728" ref_url="https://bugzilla.suse.com/938728" source="BUGZILLA"/>
		<reference ref_id="941676" ref_url="https://bugzilla.suse.com/941676" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3183" ref_url="https://www.suse.com/security/cve/CVE-2015-3183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1885-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001662.html" source="SUSE-SU"/>
		<description>
Apache was updated to fix one security vulnerability and two bugs.

Following security issue was fixed.
- Fix the chunked transfer coding implementation in the Apache (bsc#938728, CVE-2015-3183)

Bugs fixed:
- add SSLSessionTickets directive (bsc#941676)
- hardcode modules %files (bsc#444878)
- only enable the port 443 for TCP protocol, not UDP. (bsc#931002)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-01"/>
	<updated date="2015-10-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/444878">SUSE bug 444878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931002">SUSE bug 931002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938728">SUSE bug 938728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941676">SUSE bug 941676</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3183/">CVE-2015-3183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3183">CVE-2015-3183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577267" comment="apache2-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577268" comment="apache2-doc-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577269" comment="apache2-example-pages-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577270" comment="apache2-prefork-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577271" comment="apache2-utils-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577272" comment="apache2-worker-2.2.12-59.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577267" comment="apache2-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577268" comment="apache2-doc-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577269" comment="apache2-example-pages-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577270" comment="apache2-prefork-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577271" comment="apache2-utils-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577272" comment="apache2-worker-2.2.12-59.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219793" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="988488" ref_url="https://bugzilla.suse.com/988488" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5387" ref_url="https://www.suse.com/security/cve/CVE-2016-5387/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002158.html" source="SUSE-SU"/>
		<description>

This update for apache2 fixes the following issues:

* It used to be possible to set an arbitrary $HTTP_PROXY environment variable
  for request handlers -- like CGI scripts -- by including a specially crafted
  HTTP header in the request (CVE-2016-5387). As a result, these server
  components would potentially direct all their outgoing HTTP traffic through a
  malicious proxy server. This patch fixes the issue: the updated Apache server
  ignores such HTTP headers and never sets $HTTP_PROXY for sub-processes
  (unless a value has been explicitly configured by the administrator in the
  configuration file). (bsc#988488)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-18"/>
	<updated date="2016-07-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/988488">SUSE bug 988488</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5387/">CVE-2016-5387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5387">CVE-2016-5387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582006" comment="apache2-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582007" comment="apache2-doc-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582008" comment="apache2-example-pages-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582009" comment="apache2-prefork-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582010" comment="apache2-utils-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582011" comment="apache2-worker-2.2.12-64.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582006" comment="apache2-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582007" comment="apache2-doc-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582008" comment="apache2-example-pages-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582009" comment="apache2-prefork-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582010" comment="apache2-utils-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582011" comment="apache2-worker-2.2.12-64.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219794" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1016714" ref_url="https://bugzilla.suse.com/1016714" source="BUGZILLA"/>
		<reference ref_id="1016715" ref_url="https://bugzilla.suse.com/1016715" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2161" ref_url="https://www.suse.com/security/cve/CVE-2016-2161/" source="CVE"/>
		<reference ref_id="CVE-2016-8743" ref_url="https://www.suse.com/security/cve/CVE-2016-8743/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002710.html" source="SUSE-SU"/>
		<description>

This update for apache2 fixes the following issues:

Security issues fixed:
- CVE-2016-2161: Malicious input to mod_auth_digest could have caused the server to crash,
  resulting in DoS (bsc#1016714).
- CVE-2016-8743: Added new directive 'HttpProtocolOptions Strict' to avoid proxy chain
  misinterpretation (bsc#1016715).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1016714">SUSE bug 1016714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016715">SUSE bug 1016715</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2161/">CVE-2016-2161 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2161">CVE-2016-2161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8743/">CVE-2016-8743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8743">CVE-2016-8743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582012" comment="apache2-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582013" comment="apache2-doc-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582014" comment="apache2-example-pages-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582015" comment="apache2-prefork-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582016" comment="apache2-utils-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582017" comment="apache2-worker-2.2.12-69.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582012" comment="apache2-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582013" comment="apache2-doc-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582014" comment="apache2-example-pages-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582015" comment="apache2-prefork-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582016" comment="apache2-utils-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582017" comment="apache2-worker-2.2.12-69.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219795" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1041830" ref_url="https://bugzilla.suse.com/1041830" source="BUGZILLA"/>
		<reference ref_id="1048576" ref_url="https://bugzilla.suse.com/1048576" source="BUGZILLA"/>
		<reference ref_id="951692" ref_url="https://bugzilla.suse.com/951692" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9788" ref_url="https://www.suse.com/security/cve/CVE-2017-9788/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003074.html" source="SUSE-SU"/>
		<description>
This update provides apache2 2.2.34, which brings many fixes and enhancements:

Security issues fixed:

- CVE-2017-9788: Uninitialized memory reflection in mod_auth_digest. (bsc#1048576)

Bug fixes:

- Remove /usr/bin/http2 link only during package uninstall, not upgrade. (bsc#1041830)
- Don't put the backend in error state (by default) when 500/503 error code is overridden. (bsc#951692)
- Allow single-char field names inadvertently disallowed in 2.2.32.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-28"/>
	<updated date="2017-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1041830">SUSE bug 1041830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048576">SUSE bug 1048576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951692">SUSE bug 951692</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9788/">CVE-2017-9788 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9788">CVE-2017-9788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582018" comment="apache2-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582019" comment="apache2-doc-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582020" comment="apache2-example-pages-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582021" comment="apache2-prefork-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582022" comment="apache2-utils-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582023" comment="apache2-worker-2.2.34-70.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582018" comment="apache2-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582019" comment="apache2-doc-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582020" comment="apache2-example-pages-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582021" comment="apache2-prefork-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582022" comment="apache2-utils-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582023" comment="apache2-worker-2.2.34-70.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219796" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1045060" ref_url="https://bugzilla.suse.com/1045060" source="BUGZILLA"/>
		<reference ref_id="1045061" ref_url="https://bugzilla.suse.com/1045061" source="BUGZILLA"/>
		<reference ref_id="1045062" ref_url="https://bugzilla.suse.com/1045062" source="BUGZILLA"/>
		<reference ref_id="1045065" ref_url="https://bugzilla.suse.com/1045065" source="BUGZILLA"/>
		<reference ref_id="1052830" ref_url="https://bugzilla.suse.com/1052830" source="BUGZILLA"/>
		<reference ref_id="1058058" ref_url="https://bugzilla.suse.com/1058058" source="BUGZILLA"/>
		<reference ref_id="1064561" ref_url="https://bugzilla.suse.com/1064561" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2699" ref_url="https://www.suse.com/security/cve/CVE-2009-2699/" source="CVE"/>
		<reference ref_id="CVE-2010-0425" ref_url="https://www.suse.com/security/cve/CVE-2010-0425/" source="CVE"/>
		<reference ref_id="CVE-2012-0021" ref_url="https://www.suse.com/security/cve/CVE-2012-0021/" source="CVE"/>
		<reference ref_id="CVE-2014-0118" ref_url="https://www.suse.com/security/cve/CVE-2014-0118/" source="CVE"/>
		<reference ref_id="CVE-2017-3167" ref_url="https://www.suse.com/security/cve/CVE-2017-3167/" source="CVE"/>
		<reference ref_id="CVE-2017-3169" ref_url="https://www.suse.com/security/cve/CVE-2017-3169/" source="CVE"/>
		<reference ref_id="CVE-2017-7668" ref_url="https://www.suse.com/security/cve/CVE-2017-7668/" source="CVE"/>
		<reference ref_id="CVE-2017-7679" ref_url="https://www.suse.com/security/cve/CVE-2017-7679/" source="CVE"/>
		<reference ref_id="CVE-2017-9798" ref_url="https://www.suse.com/security/cve/CVE-2017-9798/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003365.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- Allow disabling SNI on proxy connections using 'SetEnv proxy-disable-sni 1' in the configuration files. (bsc#1052830)
- Allow ECDH again in mod_ssl, it had been incorrectly disabled with the 2.2.34 update. (bsc#1064561)

Following security issue has been fixed:

- CVE-2017-9798: A use-after-free in the OPTIONS command could be used by attackers to disclose memory of the apache server process, when htaccess uses incorrect Limit statement. (bsc#1058058)

Additionally, references to the following security issues, fixed by the previous version-update of apache2
to Apache HTTPD 2.2.34 have been added:

- CVE-2017-7668: The HTTP strict parsing introduced a bug in token list parsing, which allowed ap_find_token() to
  search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may
  have be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value. (bsc#1045061)
- CVE-2017-3169: mod_ssl may have de-referenced a NULL pointer when third-party modules call 
  ap_hook_process_connection() during an HTTP request to an HTTPS port allowing for DoS. (bsc#1045062)
- CVE-2017-3167: Use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may have
  lead to authentication requirements being bypassed. (bsc#1045065)
- CVE-2017-7679: mod_mime could have read one byte past the end of a buffer when sending a malicious Content-Type
  response header. (bsc#1045060)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-30"/>
	<updated date="2017-10-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1045060">SUSE bug 1045060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045061">SUSE bug 1045061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045062">SUSE bug 1045062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045065">SUSE bug 1045065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052830">SUSE bug 1052830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058058">SUSE bug 1058058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064561">SUSE bug 1064561</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2699/">CVE-2009-2699 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-2699">CVE-2009-2699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0425/">CVE-2010-0425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0425">CVE-2010-0425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0021/">CVE-2012-0021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0021">CVE-2012-0021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0118/">CVE-2014-0118 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0118">CVE-2014-0118 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3167/">CVE-2017-3167 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3167">CVE-2017-3167 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3169/">CVE-2017-3169 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3169">CVE-2017-3169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7668/">CVE-2017-7668 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7668">CVE-2017-7668 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7679/">CVE-2017-7679 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7679">CVE-2017-7679 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9798/">CVE-2017-9798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9798">CVE-2017-9798 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582024" comment="apache2-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582025" comment="apache2-doc-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582026" comment="apache2-example-pages-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582027" comment="apache2-prefork-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582028" comment="apache2-utils-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582029" comment="apache2-worker-2.2.34-70.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582024" comment="apache2-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582025" comment="apache2-doc-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582026" comment="apache2-example-pages-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582027" comment="apache2-prefork-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582028" comment="apache2-utils-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582029" comment="apache2-worker-2.2.34-70.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219797" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1086775" ref_url="https://bugzilla.suse.com/1086775" source="BUGZILLA"/>
		<reference ref_id="1086776" ref_url="https://bugzilla.suse.com/1086776" source="BUGZILLA"/>
		<reference ref_id="1086817" ref_url="https://bugzilla.suse.com/1086817" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15710" ref_url="https://www.suse.com/security/cve/CVE-2017-15710/" source="CVE"/>
		<reference ref_id="CVE-2018-1301" ref_url="https://www.suse.com/security/cve/CVE-2018-1301/" source="CVE"/>
		<reference ref_id="CVE-2018-1312" ref_url="https://www.suse.com/security/cve/CVE-2018-1312/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003962.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- security update:
  * CVE-2018-1301: Specially crafted requests, in debug mode, could lead to denial of service. [bsc#1086817]
  * CVE-2017-15710: failure in the language fallback handling could lead to denial of service.  [bsc#1086776]
  * CVE-2018-1312: Seed wrongly generated could lead to replay attack in cluster environments. [bsc#1086775]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-25"/>
	<updated date="2018-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086775">SUSE bug 1086775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086776">SUSE bug 1086776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086817">SUSE bug 1086817</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15710/">CVE-2017-15710 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15710">CVE-2017-15710 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1301/">CVE-2018-1301 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1301">CVE-2018-1301 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1312/">CVE-2018-1312 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1312">CVE-2018-1312 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582030" comment="apache2-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582031" comment="apache2-doc-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582032" comment="apache2-example-pages-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582033" comment="apache2-prefork-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582034" comment="apache2-utils-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582035" comment="apache2-worker-2.2.34-70.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582030" comment="apache2-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582031" comment="apache2-doc-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582032" comment="apache2-example-pages-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582033" comment="apache2-prefork-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582034" comment="apache2-utils-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582035" comment="apache2-worker-2.2.34-70.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219798" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1131239" ref_url="https://bugzilla.suse.com/1131239" source="BUGZILLA"/>
		<reference ref_id="1131241" ref_url="https://bugzilla.suse.com/1131241" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0217" ref_url="https://www.suse.com/security/cve/CVE-2019-0217/" source="CVE"/>
		<reference ref_id="CVE-2019-0220" ref_url="https://www.suse.com/security/cve/CVE-2019-0220/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

* CVE-2019-0220: The Apache HTTP server did not use a consistent strategy for
  URL normalization throughout all of its components. In particular,
  consecutive slashes were not always collapsed. Attackers could potentially
  abuse these inconsistencies to by-pass access control mechanisms and thus
  gain unauthorized access to protected parts of the service. [bsc#1131241]

* CVE-2019-0217: A race condition in Apache's 'mod_auth_digest' when running in
  a threaded server could have allowed users with valid credentials to
  authenticate using another username, bypassing configured access control
  restrictions. [bsc#1131239]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-04"/>
	<updated date="2019-04-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131239">SUSE bug 1131239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131241">SUSE bug 1131241</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-0217/">CVE-2019-0217 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0217">CVE-2019-0217 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-0220/">CVE-2019-0220 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0220">CVE-2019-0220 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582036" comment="apache2-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582037" comment="apache2-doc-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582038" comment="apache2-example-pages-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582039" comment="apache2-prefork-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582040" comment="apache2-utils-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582041" comment="apache2-worker-2.2.34-70.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582036" comment="apache2-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582037" comment="apache2-doc-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582038" comment="apache2-example-pages-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582039" comment="apache2-prefork-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582040" comment="apache2-utils-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582041" comment="apache2-worker-2.2.34-70.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582036" comment="apache2-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582037" comment="apache2-doc-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582038" comment="apache2-example-pages-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582039" comment="apache2-prefork-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582040" comment="apache2-utils-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582041" comment="apache2-worker-2.2.34-70.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219799" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1168404" ref_url="https://bugzilla.suse.com/1168404" source="BUGZILLA"/>
		<reference ref_id="1169066" ref_url="https://bugzilla.suse.com/1169066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1934" ref_url="https://www.suse.com/security/cve/CVE-2020-1934/" source="CVE"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006719.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2020-1934: mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server (bsc#1168404).
- CVE-2020-1938: mod_proxy_ajp: Add 'secret' parameter to proxy workers to implement legacy AJP13 authentication (bsc#1169066).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-21"/>
	<updated date="2020-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168404">SUSE bug 1168404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169066">SUSE bug 1169066</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1934/">CVE-2020-1934 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1934">CVE-2020-1934 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1938">CVE-2020-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582042" comment="apache2-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582043" comment="apache2-doc-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582044" comment="apache2-example-pages-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582045" comment="apache2-prefork-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582046" comment="apache2-utils-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582047" comment="apache2-worker-2.2.34-70.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219800" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1186922" ref_url="https://bugzilla.suse.com/1186922" source="BUGZILLA"/>
		<reference ref_id="1187174" ref_url="https://bugzilla.suse.com/1187174" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35452" ref_url="https://www.suse.com/security/cve/CVE-2020-35452/" source="CVE"/>
		<reference ref_id="CVE-2021-30641" ref_url="https://www.suse.com/security/cve/CVE-2021-30641/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009024.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- fixed CVE-2021-30641 [bsc#1187174]: MergeSlashes regression
- fixed CVE-2020-35452 [bsc#1186922]: Single zero byte stack overflow in mod_auth_digest
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186922">SUSE bug 1186922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187174">SUSE bug 1187174</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35452/">CVE-2020-35452 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35452">CVE-2020-35452 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30641/">CVE-2021-30641 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30641">CVE-2021-30641 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582048" comment="apache2-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582049" comment="apache2-doc-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582050" comment="apache2-example-pages-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582051" comment="apache2-prefork-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582052" comment="apache2-utils-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582053" comment="apache2-worker-2.2.34-70.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219801" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1190666" ref_url="https://bugzilla.suse.com/1190666" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39275" ref_url="https://www.suse.com/security/cve/CVE-2021-39275/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009511.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2021-39275: Fixed an out-of-bounds write in ap_escape_quotes() via malicious input. (bsc#1190666)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-27"/>
	<updated date="2021-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190666">SUSE bug 1190666</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39275/">CVE-2021-39275 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39275">CVE-2021-39275 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633957" comment="apache2-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633958" comment="apache2-doc-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633959" comment="apache2-example-pages-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633960" comment="apache2-prefork-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633961" comment="apache2-utils-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633962" comment="apache2-worker-2.2.34-70.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219802" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1197095" ref_url="https://bugzilla.suse.com/1197095" source="BUGZILLA"/>
		<reference ref_id="1197096" ref_url="https://bugzilla.suse.com/1197096" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22720" ref_url="https://www.suse.com/security/cve/CVE-2022-22720/" source="CVE"/>
		<reference ref_id="CVE-2022-22721" ref_url="https://www.suse.com/security/cve/CVE-2022-22721/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010491.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-22720: HTTP request smuggling due to incorrect error handling (bsc#1197095).
- CVE-2022-22721: possible buffer overflow with very large or unlimited LimitXMLRequestBody (bsc#1197096).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197095">SUSE bug 1197095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197096">SUSE bug 1197096</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22720/">CVE-2022-22720 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22720">CVE-2022-22720 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22721/">CVE-2022-22721 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22721">CVE-2022-22721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673638" comment="apache2-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673639" comment="apache2-doc-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673640" comment="apache2-example-pages-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673641" comment="apache2-prefork-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673642" comment="apache2-utils-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673643" comment="apache2-worker-2.2.34-70.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219803" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_jk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1114612" ref_url="https://bugzilla.suse.com/1114612" source="BUGZILLA"/>
		<reference ref_id="927845" ref_url="https://bugzilla.suse.com/927845" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8111" ref_url="https://www.suse.com/security/cve/CVE-2014-8111/" source="CVE"/>
		<reference ref_id="CVE-2018-11759" ref_url="https://www.suse.com/security/cve/CVE-2018-11759/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3970-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183970-1.html" source="SUSE-SU"/>
		<description>

This update for apache2-mod_jk fixes the following issues:

Security issues fixed:

- CVE-2018-11759: Fixed connector path traversal due to mishandled HTTP requests in httpd (bsc#1114612).
- CVE-2014-8111: Apache Tomcat Connectors (mod_jk) ignored JkUnmount rules for subtrees of previous JkMount rules, which allowed remote attackers to access otherwise restricted artifacts via unspecified vectors (bsc#927845).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-03"/>
	<updated date="2018-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1114612">SUSE bug 1114612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927845">SUSE bug 927845</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8111/">CVE-2014-8111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8111">CVE-2014-8111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11759/">CVE-2018-11759 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11759">CVE-2018-11759 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582054" comment="apache2-mod_jk-1.2.40-0.2.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582054" comment="apache2-mod_jk-1.2.40-0.2.5.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219804" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="975394" ref_url="https://bugzilla.suse.com/975394" source="BUGZILLA"/>
		<reference ref_id="979688" ref_url="https://bugzilla.suse.com/979688" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4566" ref_url="https://www.suse.com/security/cve/CVE-2013-4566/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002277.html" source="SUSE-SU"/>
		<description>

This update provides apache2-mod_nss 1.0.14, which brings several fixes and
enhancements:

- SHA256 cipher names change spelling from *_sha256 to *_sha_256.
- Drop mod_nss_migrate.pl and use upstream migrate script instead.
- Check for Apache user owner/group read permissions of NSS database at startup.
- Update default ciphers to something more modern and secure.
- Check for host and netstat commands in gencert before trying to use them.
- Don't ignore NSSProtocol when NSSFIPS is enabled.
- Use proper shell syntax to avoid creating /0 in gencert.
- Add server support for DHE ciphers.
- Extract SAN from server/client certificates into env.
- Fix memory leaks and other coding issues caught by clang analyzer.
- Add support for Server Name Indication (SNI)
- Add support for SNI for reverse proxy connections.
- Add RenegBufferSize? option.
- Add support for TLS Session Tickets (RFC 5077).
- Implement a slew more OpenSSL cipher macros.
- Fix a number of illegal memory accesses and memory leaks.
- Support for SHA384 ciphers if they are available in the version of NSS mod_nss is built against.
- Add the SECURE_RENEG environment variable.
- Add some hints when NSS database cannot be initialized.
- Code cleanup including trailing whitespace and compiler warnings.
- Modernize autotools configuration slightly, add config.h.
- Add small test suite for SNI.
- Add compatibility for mod_ssl-style cipher definitions.
- Add Camelia ciphers.
- Remove Fortezza ciphers.
- Add TLSv1.2-specific ciphers.
- Initialize cipher list when re-negotiating handshake.
- Completely remove support for SSLv2.
- Add support for sqlite NSS databases.
- Compare subject CN and VS hostname during server start up.
- Add support for enabling TLS v1.2.
- Don't enable SSL 3 by default. (CVE-2014-3566)
- Improve protocol testing.
- Add nss_pcache man page.
- Fix argument handling in nss_pcache.
- Support httpd 2.4+.
- Allow users to configure a helper to ask for certificate passphrases via
  NSSPassPhraseDialog. (bsc#975394)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-16"/>
	<updated date="2016-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/975394">SUSE bug 975394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979688">SUSE bug 979688</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4566/">CVE-2013-4566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4566">CVE-2013-4566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582055" comment="apache2-mod_nss-1.0.14-0.4.25.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582055" comment="apache2-mod_nss-1.0.14-0.4.25.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219805" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1156944" ref_url="https://bugzilla.suse.com/1156944" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2767" ref_url="https://www.suse.com/security/cve/CVE-2011-2767/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14266-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-202014266-1.html" source="SUSE-SU"/>
		<description>
This update for apache2-mod_perl fixes the following issues:

- CVE-2011-2767: Fixed a vulnerability which could have allowed 
  perl code execution in the context of user account (bsc#1156944).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1156944">SUSE bug 1156944</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2011-2767/">CVE-2011-2767 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2767">CVE-2011-2767 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582056" comment="apache2-mod_perl-2.0.4-40.63.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219806" version="1" class="patch">
	<metadata>
		<title>Security update for apport (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="947731" ref_url="https://bugzilla.suse.com/947731" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1338" ref_url="https://www.suse.com/security/cve/CVE-2015-1338/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003060.html" source="SUSE-SU"/>
		<description>
This update for apport fixes the following issues:

Security issue fixed:
- CVE-2015-1338: Insecurely created crash dumps could lead to a DoS or privilege escalation through
  malicious symlinks. (bsc#947731)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-24"/>
	<updated date="2017-07-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/947731">SUSE bug 947731</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1338/">CVE-2015-1338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1338">CVE-2015-1338 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582057" comment="apport-0.114-12.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582058" comment="apport-crashdb-sle-0.114-0.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582059" comment="apport-gtk-0.114-12.8.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582057" comment="apport-0.114-12.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582058" comment="apport-crashdb-sle-0.114-0.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582059" comment="apport-gtk-0.114-12.8.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219807" version="1" class="patch">
	<metadata>
		<title>Security update for arpwatch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1186240" ref_url="https://bugzilla.suse.com/1186240" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25321" ref_url="https://www.suse.com/security/cve/CVE-2021-25321/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009093.html" source="SUSE-SU"/>
		<description>
This update for arpwatch fixes the following issues:

- CVE-2021-25321: Fixed local privilege escalation from runtime user to root (bsc#1186240).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186240">SUSE bug 1186240</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25321/">CVE-2021-25321 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25321">CVE-2021-25321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616452" comment="arpwatch-2.1a15-131.23.2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219808" version="1" class="patch">
	<metadata>
		<title>Security update for aspell (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1188576" ref_url="https://bugzilla.suse.com/1188576" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25051" ref_url="https://www.suse.com/security/cve/CVE-2019-25051/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009287.html" source="SUSE-SU"/>
		<description>
This update for aspell fixes the following issues:

- CVE-2019-25051: Fixed heap-buffer-overflow in acommon:ObjStack:dup_top (bsc#1188576).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-12"/>
	<updated date="2021-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188576">SUSE bug 1188576</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25051/">CVE-2019-25051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25051">CVE-2019-25051 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627837" comment="aspell-0.60.6-26.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627838" comment="aspell-32bit-0.60.6-26.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627839" comment="aspell-ispell-0.60.6-26.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219809" version="1" class="patch">
	<metadata>
		<title>Security update for atftp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1133114" ref_url="https://bugzilla.suse.com/1133114" source="BUGZILLA"/>
		<reference ref_id="1133145" ref_url="https://bugzilla.suse.com/1133145" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11365" ref_url="https://www.suse.com/security/cve/CVE-2019-11365/" source="CVE"/>
		<reference ref_id="CVE-2019-11366" ref_url="https://www.suse.com/security/cve/CVE-2019-11366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005410.html" source="SUSE-SU"/>
		<description>
This update for atftp fixes the following issues:

Security issues fixed:

- CVE-2019-11366: Fixed a denial of service caused by a NULL pointer dereference because thread_list_mutex was not locked (bsc#1133145).
- CVE-2019-11365: Fixed a buffer overflow which could lead to remote code execution caused by an insecure use of strncpy() (bsc#1133114).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-29"/>
	<updated date="2019-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133114">SUSE bug 1133114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133145">SUSE bug 1133145</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11365/">CVE-2019-11365 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11365">CVE-2019-11365 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11366/">CVE-2019-11366 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11366">CVE-2019-11366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582060" comment="atftp-0.7.0-135.23.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219810" version="1" class="patch">
	<metadata>
		<title>Security update for audiofile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1026978" ref_url="https://bugzilla.suse.com/1026978" source="BUGZILLA"/>
		<reference ref_id="1026979" ref_url="https://bugzilla.suse.com/1026979" source="BUGZILLA"/>
		<reference ref_id="1026980" ref_url="https://bugzilla.suse.com/1026980" source="BUGZILLA"/>
		<reference ref_id="1026981" ref_url="https://bugzilla.suse.com/1026981" source="BUGZILLA"/>
		<reference ref_id="1026982" ref_url="https://bugzilla.suse.com/1026982" source="BUGZILLA"/>
		<reference ref_id="1026983" ref_url="https://bugzilla.suse.com/1026983" source="BUGZILLA"/>
		<reference ref_id="1026984" ref_url="https://bugzilla.suse.com/1026984" source="BUGZILLA"/>
		<reference ref_id="1026985" ref_url="https://bugzilla.suse.com/1026985" source="BUGZILLA"/>
		<reference ref_id="1026986" ref_url="https://bugzilla.suse.com/1026986" source="BUGZILLA"/>
		<reference ref_id="1026987" ref_url="https://bugzilla.suse.com/1026987" source="BUGZILLA"/>
		<reference ref_id="1026988" ref_url="https://bugzilla.suse.com/1026988" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6827" ref_url="https://www.suse.com/security/cve/CVE-2017-6827/" source="CVE"/>
		<reference ref_id="CVE-2017-6828" ref_url="https://www.suse.com/security/cve/CVE-2017-6828/" source="CVE"/>
		<reference ref_id="CVE-2017-6829" ref_url="https://www.suse.com/security/cve/CVE-2017-6829/" source="CVE"/>
		<reference ref_id="CVE-2017-6830" ref_url="https://www.suse.com/security/cve/CVE-2017-6830/" source="CVE"/>
		<reference ref_id="CVE-2017-6831" ref_url="https://www.suse.com/security/cve/CVE-2017-6831/" source="CVE"/>
		<reference ref_id="CVE-2017-6832" ref_url="https://www.suse.com/security/cve/CVE-2017-6832/" source="CVE"/>
		<reference ref_id="CVE-2017-6833" ref_url="https://www.suse.com/security/cve/CVE-2017-6833/" source="CVE"/>
		<reference ref_id="CVE-2017-6834" ref_url="https://www.suse.com/security/cve/CVE-2017-6834/" source="CVE"/>
		<reference ref_id="CVE-2017-6835" ref_url="https://www.suse.com/security/cve/CVE-2017-6835/" source="CVE"/>
		<reference ref_id="CVE-2017-6836" ref_url="https://www.suse.com/security/cve/CVE-2017-6836/" source="CVE"/>
		<reference ref_id="CVE-2017-6837" ref_url="https://www.suse.com/security/cve/CVE-2017-6837/" source="CVE"/>
		<reference ref_id="CVE-2017-6838" ref_url="https://www.suse.com/security/cve/CVE-2017-6838/" source="CVE"/>
		<reference ref_id="CVE-2017-6839" ref_url="https://www.suse.com/security/cve/CVE-2017-6839/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002846.html" source="SUSE-SU"/>
		<description>

This update for audiofile fixes the following issues:

Security issues fixed:
- CVE-2017-6827: heap-based buffer overflow in MSADPCM::initializeCoefficients (MSADPCM.cpp) (bsc#1026979)
- CVE-2017-6828: heap-based buffer overflow in readValue (FileHandle.cpp) (bsc#1026980)
- CVE-2017-6829: global buffer overflow in decodeSample (IMA.cpp) (bsc#1026981)
- CVE-2017-6830: heap-based buffer overflow in alaw2linear_buf (G711.cpp) (bsc#1026982)
- CVE-2017-6831: heap-based buffer overflow in IMA::decodeBlockWAVE (IMA.cpp) (bsc#1026983)
- CVE-2017-6832: heap-based buffer overflow in MSADPCM::decodeBlock (MSADPCM.cpp) (bsc#1026984)
- CVE-2017-6833: divide-by-zero in BlockCodec::runPull (BlockCodec.cpp) (bsc#1026985)
- CVE-2017-6834: heap-based buffer overflow in ulaw2linear_buf (G711.cpp) (bsc#1026986)
- CVE-2017-6835: divide-by-zero in BlockCodec::reset1 (BlockCodec.cpp) (bsc#1026988)
- CVE-2017-6836: heap-based buffer overflow in Expand3To4Module::run (SimpleModule.h) (bsc#1026987)
- CVE-2017-6837, CVE-2017-6838, CVE-2017-6839: multiple ubsan crashes (bsc#1026978)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-05"/>
	<updated date="2017-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1026978">SUSE bug 1026978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026979">SUSE bug 1026979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026980">SUSE bug 1026980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026981">SUSE bug 1026981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026982">SUSE bug 1026982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026983">SUSE bug 1026983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026984">SUSE bug 1026984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026985">SUSE bug 1026985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026986">SUSE bug 1026986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026987">SUSE bug 1026987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026988">SUSE bug 1026988</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6827/">CVE-2017-6827 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6827">CVE-2017-6827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6828/">CVE-2017-6828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6828">CVE-2017-6828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6829/">CVE-2017-6829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6829">CVE-2017-6829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6830/">CVE-2017-6830 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6830">CVE-2017-6830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6831/">CVE-2017-6831 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6831">CVE-2017-6831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6832/">CVE-2017-6832 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6832">CVE-2017-6832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6833/">CVE-2017-6833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6833">CVE-2017-6833 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6834/">CVE-2017-6834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6834">CVE-2017-6834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6835/">CVE-2017-6835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6835">CVE-2017-6835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6836/">CVE-2017-6836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6836">CVE-2017-6836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6837/">CVE-2017-6837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6837">CVE-2017-6837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6838/">CVE-2017-6838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6838">CVE-2017-6838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6839/">CVE-2017-6839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6839">CVE-2017-6839 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582061" comment="audiofile-0.2.6-142.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582062" comment="audiofile-32bit-0.2.6-142.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582063" comment="audiofile-x86-0.2.6-142.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582061" comment="audiofile-0.2.6-142.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582062" comment="audiofile-32bit-0.2.6-142.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582063" comment="audiofile-x86-0.2.6-142.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219811" version="1" class="patch">
	<metadata>
		<title>Security update for augeas (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="925225" ref_url="https://bugzilla.suse.com/925225" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001642.html" source="SUSE-SU"/>
		<description>

This update fixes an untrusted argument escaping problem (CVE-2014-8119):

* new API - aug_escape_name() - which can be used to escape
  untrusted inputs before using them as part of path expressions
* aug_match() is changed to return properly escaped output
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-09"/>
	<updated date="2015-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/925225">SUSE bug 925225</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8119">CVE-2014-8119 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577330" comment="augeas-0.9.0-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577331" comment="augeas-lenses-0.9.0-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577332" comment="libaugeas0-0.9.0-3.17.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577330" comment="augeas-0.9.0-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577331" comment="augeas-lenses-0.9.0-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577332" comment="libaugeas0-0.9.0-3.17.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219812" version="1" class="patch">
	<metadata>
		<title>Security update for augeas (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1054171" ref_url="https://bugzilla.suse.com/1054171" source="BUGZILLA"/>
		<reference ref_id="925225" ref_url="https://bugzilla.suse.com/925225" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<reference ref_id="CVE-2017-7555" ref_url="https://www.suse.com/security/cve/CVE-2017-7555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003801.html" source="SUSE-SU"/>
		<description>
This update for augeas fixes the following issues:

Security issues fixed:

- CVE-2017-7555: Fix a memory corruption bug could have lead to arbitrary code execution
  by passing crafted strings that would be mis-handled by parse_name() (bsc#1054171).
- CVE-2014-8119: Fix improper handling of escaped strings leading to memory corruption (bsc#925225).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-09"/>
	<updated date="2018-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1054171">SUSE bug 1054171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925225">SUSE bug 925225</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8119">CVE-2014-8119 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7555/">CVE-2017-7555 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7555">CVE-2017-7555 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582064" comment="augeas-0.9.0-3.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582065" comment="augeas-lenses-0.9.0-3.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582066" comment="libaugeas0-0.9.0-3.21.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582064" comment="augeas-0.9.0-3.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582065" comment="augeas-lenses-0.9.0-3.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582066" comment="libaugeas0-0.9.0-3.21.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219813" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1120281" ref_url="https://bugzilla.suse.com/1120281" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000845" ref_url="https://www.suse.com/security/cve/CVE-2018-1000845/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005098.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

Security issue fixed:

- CVE-2018-1000845: Fixed DNS amplification and reflection to spoofed addresses (DOS) (bsc#1120281)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-08"/>
	<updated date="2019-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120281">SUSE bug 1120281</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000845/">CVE-2018-1000845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000845">CVE-2018-1000845 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582067" comment="avahi-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582068" comment="avahi-lang-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582069" comment="avahi-utils-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582070" comment="libavahi-client3-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582071" comment="libavahi-client3-32bit-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582072" comment="libavahi-client3-x86-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582073" comment="libavahi-common3-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582074" comment="libavahi-common3-32bit-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582075" comment="libavahi-common3-x86-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582076" comment="libavahi-core5-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582077" comment="libavahi-glib1-0.6.23-35.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582078" comment="libavahi-glib1-32bit-0.6.23-35.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582079" comment="libavahi-glib1-x86-0.6.23-35.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582080" comment="libdns_sd-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582081" comment="libdns_sd-32bit-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582082" comment="libdns_sd-x86-0.6.23-35.6.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582067" comment="avahi-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582068" comment="avahi-lang-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582069" comment="avahi-utils-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582070" comment="libavahi-client3-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582071" comment="libavahi-client3-32bit-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582072" comment="libavahi-client3-x86-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582073" comment="libavahi-common3-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582074" comment="libavahi-common3-32bit-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582075" comment="libavahi-common3-x86-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582076" comment="libavahi-core5-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582077" comment="libavahi-glib1-0.6.23-35.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582078" comment="libavahi-glib1-32bit-0.6.23-35.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582079" comment="libavahi-glib1-x86-0.6.23-35.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582080" comment="libdns_sd-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582081" comment="libdns_sd-32bit-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582082" comment="libdns_sd-x86-0.6.23-35.6.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219814" version="1" class="patch">
	<metadata>
		<title>Security update for axis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1103658" ref_url="https://bugzilla.suse.com/1103658" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8032" ref_url="https://www.suse.com/security/cve/CVE-2018-8032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004667.html" source="SUSE-SU"/>
		<description>
This update for axis fixes the following security issue:

- CVE-2018-8032: Prevent cross-site scripting (XSS) attack in the default
  servlet/services (bsc#1103658).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-12"/>
	<updated date="2018-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103658">SUSE bug 1103658</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8032/">CVE-2018-8032 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8032">CVE-2018-8032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577384" comment="axis-1.4-236.236.44.9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577384" comment="axis-1.4-236.236.44.9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219815" version="1" class="patch">
	<metadata>
		<title>Security update for bash (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1000396" ref_url="https://bugzilla.suse.com/1000396" source="BUGZILLA"/>
		<reference ref_id="1001299" ref_url="https://bugzilla.suse.com/1001299" source="BUGZILLA"/>
		<reference ref_id="959755" ref_url="https://bugzilla.suse.com/959755" source="BUGZILLA"/>
		<reference ref_id="971410" ref_url="https://bugzilla.suse.com/971410" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0634" ref_url="https://www.suse.com/security/cve/CVE-2016-0634/" source="CVE"/>
		<reference ref_id="CVE-2016-7543" ref_url="https://www.suse.com/security/cve/CVE-2016-7543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002602.html" source="SUSE-SU"/>
		<description>
This update for bash fixes the following issues:

- CVE-2016-7543: Local attackers could have executed arbitrary commands via specially
  crafted SHELLOPTS+PS4 variables. (bsc#1001299)
- CVE-2016-0634: Malicious hostnames could have allowed arbitrary command execution when
  $HOSTNAME was expanded in the prompt. (bsc#1000396)

The following bugs were fixed:

- bsc#971410: Scripts could terminate unexpectedly due to mishandled recursive traps.
- bsc#959755: Clarify that the files /etc/profile as well as /etc/bash.bashrc may source
  other files as well even if the bash does not.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-27"/>
	<updated date="2017-01-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000396">SUSE bug 1000396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001299">SUSE bug 1001299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959755">SUSE bug 959755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971410">SUSE bug 971410</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0634/">CVE-2016-0634 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0634">CVE-2016-0634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7543/">CVE-2016-7543 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7543">CVE-2016-7543 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582083" comment="bash-3.2-147.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582084" comment="bash-doc-3.2-147.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582085" comment="bash-x86-3.2-147.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582086" comment="libreadline5-5.2-147.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582087" comment="libreadline5-32bit-5.2-147.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582088" comment="libreadline5-x86-5.2-147.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582089" comment="readline-doc-5.2-147.29.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582083" comment="bash-3.2-147.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582084" comment="bash-doc-3.2-147.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582085" comment="bash-x86-3.2-147.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582086" comment="libreadline5-5.2-147.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582087" comment="libreadline5-32bit-5.2-147.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582088" comment="libreadline5-x86-5.2-147.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582089" comment="readline-doc-5.2-147.29.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219816" version="1" class="patch">
	<metadata>
		<title>Security update for bash (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1010845" ref_url="https://bugzilla.suse.com/1010845" source="BUGZILLA"/>
		<reference ref_id="1031729" ref_url="https://bugzilla.suse.com/1031729" source="BUGZILLA"/>
		<reference ref_id="976776" ref_url="https://bugzilla.suse.com/976776" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9401" ref_url="https://www.suse.com/security/cve/CVE-2016-9401/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002896.html" source="SUSE-SU"/>
		<description>

This update for bash fixed several issues

This security issue was fixed:

- CVE-2016-9401: popd in bash might allowed local users to bypass the restricted shell and cause a use-after-free via a crafted address (bsc#1010845).

This non-security issue was fixed:

- Fix when HISTSIZE=0 and chattr +a .bash_history (bsc#1031729)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-18"/>
	<updated date="2017-05-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1010845">SUSE bug 1010845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031729">SUSE bug 1031729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976776">SUSE bug 976776</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9401/">CVE-2016-9401 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9401">CVE-2016-9401 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582090" comment="bash-3.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582091" comment="bash-doc-3.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582092" comment="bash-x86-3.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582093" comment="libreadline5-5.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582094" comment="libreadline5-32bit-5.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582095" comment="libreadline5-x86-5.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582096" comment="readline-doc-5.2-147.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582090" comment="bash-3.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582091" comment="bash-doc-3.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582092" comment="bash-x86-3.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582093" comment="libreadline5-5.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582094" comment="libreadline5-32bit-5.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582095" comment="libreadline5-x86-5.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582096" comment="readline-doc-5.2-147.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219817" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="939567" ref_url="https://bugzilla.suse.com/939567" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001512.html" source="SUSE-SU"/>
		<description>
bind was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-5477: Remote DoS via TKEY queries (bsc#939567)

Exposure to this issue can not be prevented by either ACLs or configuration options limiting or denying service because the exploitable code occurs early in the packet handling.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-28"/>
	<updated date="2015-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/939567">SUSE bug 939567</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5477">CVE-2015-5477 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577403" comment="bind-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577404" comment="bind-chrootenv-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577405" comment="bind-doc-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577406" comment="bind-libs-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577407" comment="bind-libs-32bit-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577408" comment="bind-libs-x86-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577409" comment="bind-utils-9.9.6P1-0.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577403" comment="bind-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577404" comment="bind-chrootenv-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577405" comment="bind-doc-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577406" comment="bind-libs-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577407" comment="bind-libs-32bit-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577408" comment="bind-libs-x86-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577409" comment="bind-utils-9.9.6P1-0.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219818" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="944066" ref_url="https://bugzilla.suse.com/944066" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001566.html" source="SUSE-SU"/>
		<description>

The nameserver bind was updated to fix a remote denial of service (crash) attack against 
bind nameservers doing validation on DNSSEC signed records. (CVE-2015-5722, bsc#944066).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-02"/>
	<updated date="2015-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/944066">SUSE bug 944066</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5722">CVE-2015-5722 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577410" comment="bind-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577411" comment="bind-chrootenv-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577412" comment="bind-doc-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577413" comment="bind-libs-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577414" comment="bind-libs-32bit-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577415" comment="bind-libs-x86-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577416" comment="bind-utils-9.9.6P1-0.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577410" comment="bind-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577411" comment="bind-chrootenv-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577412" comment="bind-doc-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577413" comment="bind-libs-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577414" comment="bind-libs-32bit-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577415" comment="bind-libs-x86-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577416" comment="bind-utils-9.9.6P1-0.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219819" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="923281" ref_url="https://bugzilla.suse.com/923281" source="BUGZILLA"/>
		<reference ref_id="958861" ref_url="https://bugzilla.suse.com/958861" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001756.html" source="SUSE-SU"/>
		<description>

 
This update fixes the following security issue:
- CVE-2015-8000: Fix remote denial of service by misparsing incoming responses (bsc#958861).

It also fixes a bug:
- Fix a regression in caching entries with a TTL of 0 (bsc#923281).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-22"/>
	<updated date="2015-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/923281">SUSE bug 923281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958861">SUSE bug 958861</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8000">CVE-2015-8000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577417" comment="bind-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577418" comment="bind-chrootenv-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577419" comment="bind-doc-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577420" comment="bind-libs-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577421" comment="bind-libs-32bit-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577422" comment="bind-libs-x86-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577423" comment="bind-utils-9.9.6P1-0.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577417" comment="bind-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577418" comment="bind-chrootenv-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577419" comment="bind-doc-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577420" comment="bind-libs-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577421" comment="bind-libs-32bit-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577422" comment="bind-libs-x86-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577423" comment="bind-utils-9.9.6P1-0.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219820" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="962189" ref_url="https://bugzilla.suse.com/962189" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001820.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- CVE-2015-8704: Specific APL data allowed remote attacker to trigger a crash in certain configurations (bsc#962189)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-22"/>
	<updated date="2016-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/962189">SUSE bug 962189</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8704">CVE-2015-8704 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577424" comment="bind-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577425" comment="bind-chrootenv-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577426" comment="bind-doc-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577427" comment="bind-libs-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577428" comment="bind-libs-32bit-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577429" comment="bind-libs-x86-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577430" comment="bind-utils-9.9.6P1-0.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577424" comment="bind-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577425" comment="bind-chrootenv-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577426" comment="bind-doc-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577427" comment="bind-libs-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577428" comment="bind-libs-32bit-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577429" comment="bind-libs-x86-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577430" comment="bind-utils-9.9.6P1-0.22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219821" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="970072" ref_url="https://bugzilla.suse.com/970072" source="BUGZILLA"/>
		<reference ref_id="970073" ref_url="https://bugzilla.suse.com/970073" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1285" ref_url="https://www.suse.com/security/cve/CVE-2016-1285/" source="CVE"/>
		<reference ref_id="CVE-2016-1286" ref_url="https://www.suse.com/security/cve/CVE-2016-1286/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001958.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

Fix two assertion failures that can lead to a remote denial of service attack:
* CVE-2016-1285: An error when parsing signature records for DNAME can lead to named exiting due to an assertion failure. (bsc#970072)
* CVE-2016-1286: An error when parsing signature records for DNAME records having specific properties can lead to named exiting due to an assertion failure in resolver.c or db.c. (bsc#970073)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-18"/>
	<updated date="2016-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/970072">SUSE bug 970072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970073">SUSE bug 970073</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1285/">CVE-2016-1285 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1285">CVE-2016-1285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1286/">CVE-2016-1286 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1286">CVE-2016-1286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582097" comment="bind-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582098" comment="bind-chrootenv-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582099" comment="bind-doc-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582100" comment="bind-libs-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582101" comment="bind-libs-32bit-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582102" comment="bind-libs-x86-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582103" comment="bind-utils-9.9.6P1-0.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582097" comment="bind-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582098" comment="bind-chrootenv-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582099" comment="bind-doc-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582100" comment="bind-libs-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582101" comment="bind-libs-32bit-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582102" comment="bind-libs-x86-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582103" comment="bind-utils-9.9.6P1-0.25.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219822" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1000362" ref_url="https://bugzilla.suse.com/1000362" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2776" ref_url="https://www.suse.com/security/cve/CVE-2016-2776/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002297.html" source="SUSE-SU"/>
		<description>

The nameserver bind was updated to fix a remote denial of service
vulnerability, where a crafted packet could cause the nameserver to abort. (CVE-2016-2776, bsc#1000362)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-27"/>
	<updated date="2016-09-27"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1000362">SUSE bug 1000362</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2776/">CVE-2016-2776 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2776">CVE-2016-2776 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582104" comment="bind-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582105" comment="bind-chrootenv-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582106" comment="bind-doc-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582107" comment="bind-libs-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582108" comment="bind-libs-32bit-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582109" comment="bind-libs-x86-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582110" comment="bind-utils-9.9.6P1-0.30.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582104" comment="bind-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582105" comment="bind-chrootenv-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582106" comment="bind-doc-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582107" comment="bind-libs-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582108" comment="bind-libs-32bit-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582109" comment="bind-libs-x86-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582110" comment="bind-utils-9.9.6P1-0.30.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219823" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1007829" ref_url="https://bugzilla.suse.com/1007829" source="BUGZILLA"/>
		<reference ref_id="965748" ref_url="https://bugzilla.suse.com/965748" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8864" ref_url="https://www.suse.com/security/cve/CVE-2016-8864/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002389.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- A defect in BIND's handling of responses containing a DNAME answer had
the potential to trigger assertion errors in the server remotely,
thereby facilitating a denial-of-service attack. (CVE-2016-8864, bsc#1007829).

- Fix BIND to return a valid hostname in response to ldapdump queries.
(bsc#965748)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-02"/>
	<updated date="2016-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1007829">SUSE bug 1007829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965748">SUSE bug 965748</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8864/">CVE-2016-8864 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8864">CVE-2016-8864 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582111" comment="bind-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582112" comment="bind-chrootenv-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582113" comment="bind-doc-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582114" comment="bind-libs-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582115" comment="bind-libs-32bit-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582116" comment="bind-libs-x86-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582117" comment="bind-utils-9.9.6P1-0.33.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582111" comment="bind-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582112" comment="bind-chrootenv-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582113" comment="bind-doc-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582114" comment="bind-libs-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582115" comment="bind-libs-32bit-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582116" comment="bind-libs-x86-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582117" comment="bind-utils-9.9.6P1-0.33.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219824" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1018699" ref_url="https://bugzilla.suse.com/1018699" source="BUGZILLA"/>
		<reference ref_id="1018700" ref_url="https://bugzilla.suse.com/1018700" source="BUGZILLA"/>
		<reference ref_id="1018701" ref_url="https://bugzilla.suse.com/1018701" source="BUGZILLA"/>
		<reference ref_id="1018702" ref_url="https://bugzilla.suse.com/1018702" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9131" ref_url="https://www.suse.com/security/cve/CVE-2016-9131/" source="CVE"/>
		<reference ref_id="CVE-2016-9147" ref_url="https://www.suse.com/security/cve/CVE-2016-9147/" source="CVE"/>
		<reference ref_id="CVE-2016-9444" ref_url="https://www.suse.com/security/cve/CVE-2016-9444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002555.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- Fix a potential assertion failure that could have been triggered by a
  malformed response to an ANY query, thereby facilitating a denial-of-service
  attack. [CVE-2016-9131, bsc#1018700, bsc#1018699]

- Fix a potential assertion failure that could have been triggered by
  responding to a query with inconsistent DNSSEC information, thereby
  facilitating a denial-of-service attack. [CVE-2016-9147, bsc#1018701,
  bsc#1018699]

- Fix potential assertion failure that could have been triggered by DNS
  responses that contain unusually-formed DS resource records, facilitating a
  denial-of-service attack. [CVE-2016-9444, bsc#1018702, bsc#1018699]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1018699">SUSE bug 1018699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9131/">CVE-2016-9131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9131">CVE-2016-9131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9147/">CVE-2016-9147 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9147">CVE-2016-9147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9444/">CVE-2016-9444 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9444">CVE-2016-9444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582118" comment="bind-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582119" comment="bind-chrootenv-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582120" comment="bind-doc-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582121" comment="bind-libs-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582122" comment="bind-libs-32bit-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582123" comment="bind-libs-x86-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582124" comment="bind-utils-9.9.6P1-0.36.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582118" comment="bind-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582119" comment="bind-chrootenv-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582120" comment="bind-doc-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582121" comment="bind-libs-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582122" comment="bind-libs-32bit-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582123" comment="bind-libs-x86-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582124" comment="bind-utils-9.9.6P1-0.36.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219825" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1024130" ref_url="https://bugzilla.suse.com/1024130" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3135" ref_url="https://www.suse.com/security/cve/CVE-2017-3135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002673.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- Fixed a possible denial of service vulnerability (affected only
  configurations using both DNS64 and RPZ, CVE-2017-3135, bsc#1024130)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-02"/>
	<updated date="2017-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3135/">CVE-2017-3135 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3135">CVE-2017-3135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582125" comment="bind-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582126" comment="bind-chrootenv-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582127" comment="bind-doc-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582128" comment="bind-libs-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582129" comment="bind-libs-32bit-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582130" comment="bind-libs-x86-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582131" comment="bind-utils-9.9.6P1-0.39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582125" comment="bind-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582126" comment="bind-chrootenv-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582127" comment="bind-doc-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582128" comment="bind-libs-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582129" comment="bind-libs-32bit-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582130" comment="bind-libs-x86-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582131" comment="bind-utils-9.9.6P1-0.39.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219826" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1033466" ref_url="https://bugzilla.suse.com/1033466" source="BUGZILLA"/>
		<reference ref_id="1033467" ref_url="https://bugzilla.suse.com/1033467" source="BUGZILLA"/>
		<reference ref_id="1033468" ref_url="https://bugzilla.suse.com/1033468" source="BUGZILLA"/>
		<reference ref_id="987866" ref_url="https://bugzilla.suse.com/987866" source="BUGZILLA"/>
		<reference ref_id="989528" ref_url="https://bugzilla.suse.com/989528" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2775" ref_url="https://www.suse.com/security/cve/CVE-2016-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-6170" ref_url="https://www.suse.com/security/cve/CVE-2016-6170/" source="CVE"/>
		<reference ref_id="CVE-2017-3136" ref_url="https://www.suse.com/security/cve/CVE-2017-3136/" source="CVE"/>
		<reference ref_id="CVE-2017-3137" ref_url="https://www.suse.com/security/cve/CVE-2017-3137/" source="CVE"/>
		<reference ref_id="CVE-2017-3138" ref_url="https://www.suse.com/security/cve/CVE-2017-3138/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002797.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following security issues:

CVE-2017-3137 (bsc#1033467):
Mistaken assumptions about the ordering of records in the answer
section of a response containing CNAME or DNAME resource records
could have been exploited to cause a denial of service of a bind
server performing recursion.

CVE-2017-3136 (bsc#1033466):
An attacker could have constructed a query that would cause a denial
of service of servers configured to use DNS64.

CVE-2017-3138 (bsc#1033468):
An attacker with access to the BIND control channel could have caused
the server to stop by triggering an assertion failure.

CVE-2016-6170 (bsc#987866):
Primary DNS servers could have caused a denial of service of secondary DNS servers via a large AXFR response.
IXFR servers could have caused a denial of service of IXFR clients via a large IXFR response.
Remote authenticated users could have caused a denial of service of primary DNS servers via a large UPDATE message.

CVE-2016-2775 (bsc#989528):
When lwresd or the named lwres option were enabled, bind allowed remote attackers to cause a denial of service
(daemon crash) via a long request that uses the lightweight resolver protocol.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-13"/>
	<updated date="2017-04-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033467">SUSE bug 1033467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033468">SUSE bug 1033468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987866">SUSE bug 987866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989528">SUSE bug 989528</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2775/">CVE-2016-2775 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2775">CVE-2016-2775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6170/">CVE-2016-6170 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6170">CVE-2016-6170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3136/">CVE-2017-3136 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3136">CVE-2017-3136 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3137/">CVE-2017-3137 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3137">CVE-2017-3137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3138/">CVE-2017-3138 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3138">CVE-2017-3138 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582132" comment="bind-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582133" comment="bind-chrootenv-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582134" comment="bind-doc-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582135" comment="bind-libs-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582136" comment="bind-libs-32bit-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582137" comment="bind-libs-x86-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582138" comment="bind-utils-9.9.6P1-0.44.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582132" comment="bind-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582133" comment="bind-chrootenv-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582134" comment="bind-doc-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582135" comment="bind-libs-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582136" comment="bind-libs-32bit-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582137" comment="bind-libs-x86-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582138" comment="bind-utils-9.9.6P1-0.44.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219827" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1034162" ref_url="https://bugzilla.suse.com/1034162" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3137" ref_url="https://www.suse.com/security/cve/CVE-2017-3137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002803.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- A regression in the fix for CVE-2017-3137 caused an assert in name.c (bsc#1034162)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1034162">SUSE bug 1034162</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3137/">CVE-2017-3137 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3137">CVE-2017-3137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582139" comment="bind-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582140" comment="bind-chrootenv-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582141" comment="bind-doc-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582142" comment="bind-libs-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582143" comment="bind-libs-32bit-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582144" comment="bind-libs-x86-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582145" comment="bind-utils-9.9.6P1-0.47.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582139" comment="bind-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582140" comment="bind-chrootenv-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582141" comment="bind-doc-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582142" comment="bind-libs-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582143" comment="bind-libs-32bit-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582144" comment="bind-libs-x86-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582145" comment="bind-utils-9.9.6P1-0.47.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219828" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1046554" ref_url="https://bugzilla.suse.com/1046554" source="BUGZILLA"/>
		<reference ref_id="1046555" ref_url="https://bugzilla.suse.com/1046555" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3142" ref_url="https://www.suse.com/security/cve/CVE-2017-3142/" source="CVE"/>
		<reference ref_id="CVE-2017-3143" ref_url="https://www.suse.com/security/cve/CVE-2017-3143/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002998.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- An attacker with the ability to send and receive messages to an authoritative
  DNS server was able to circumvent TSIG authentication of AXFR requests. A
  server that relied solely on TSIG keys for protection could be manipulated
  into (1) providing an AXFR of a zone to an unauthorized recipient and (2)
  accepting bogus Notify packets. [bsc#1046554, CVE-2017-3142]

- An attacker who with the ability to send and receive messages to an
  authoritative DNS server and who had knowledge of a valid TSIG key name for
  the zone and service being targeted was able to manipulate BIND into
  accepting an unauthorized dynamic update. [bsc#1046555, CVE-2017-3143]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-29"/>
	<updated date="2017-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046554">SUSE bug 1046554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046555">SUSE bug 1046555</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3142/">CVE-2017-3142 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3142">CVE-2017-3142 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3143/">CVE-2017-3143 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3143">CVE-2017-3143 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582146" comment="bind-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582147" comment="bind-chrootenv-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582148" comment="bind-doc-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582149" comment="bind-libs-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582150" comment="bind-libs-32bit-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582151" comment="bind-libs-x86-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582152" comment="bind-utils-9.9.6P1-0.50.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582146" comment="bind-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582147" comment="bind-chrootenv-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582148" comment="bind-doc-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582149" comment="bind-libs-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582150" comment="bind-libs-32bit-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582151" comment="bind-libs-x86-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582152" comment="bind-utils-9.9.6P1-0.50.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219829" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1040039" ref_url="https://bugzilla.suse.com/1040039" source="BUGZILLA"/>
		<reference ref_id="1047184" ref_url="https://bugzilla.suse.com/1047184" source="BUGZILLA"/>
		<reference ref_id="1076118" ref_url="https://bugzilla.suse.com/1076118" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3145" ref_url="https://www.suse.com/security/cve/CVE-2017-3145/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003707.html" source="SUSE-SU"/>
		<description>
This update for bind fixes several issues.

This security issue was fixed:

- CVE-2017-3145: Improper sequencing during cleanup could have lead to a
  use-after-free error that triggered an assertion failure and crash in named
  (bsc#1076118).

These non-security issues were fixed:

- Updated named.root file (bsc#1040039)
- Update bind.keys for DNSSEC root KSK rollover (bsc#1047184)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-05"/>
	<updated date="2018-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040039">SUSE bug 1040039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047184">SUSE bug 1047184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076118">SUSE bug 1076118</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3145/">CVE-2017-3145 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3145">CVE-2017-3145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582153" comment="bind-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582154" comment="bind-chrootenv-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582155" comment="bind-doc-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582156" comment="bind-libs-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582157" comment="bind-libs-32bit-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582158" comment="bind-utils-9.9.6P1-0.51.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582153" comment="bind-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582154" comment="bind-chrootenv-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582155" comment="bind-doc-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582156" comment="bind-libs-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582157" comment="bind-libs-32bit-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582158" comment="bind-utils-9.9.6P1-0.51.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219830" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1104129" ref_url="https://bugzilla.suse.com/1104129" source="BUGZILLA"/>
		<reference ref_id="1126068" ref_url="https://bugzilla.suse.com/1126068" source="BUGZILLA"/>
		<reference ref_id="1126069" ref_url="https://bugzilla.suse.com/1126069" source="BUGZILLA"/>
		<reference ref_id="1133185" ref_url="https://bugzilla.suse.com/1133185" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5740" ref_url="https://www.suse.com/security/cve/CVE-2018-5740/" source="CVE"/>
		<reference ref_id="CVE-2018-5743" ref_url="https://www.suse.com/security/cve/CVE-2018-5743/" source="CVE"/>
		<reference ref_id="CVE-2018-5745" ref_url="https://www.suse.com/security/cve/CVE-2018-5745/" source="CVE"/>
		<reference ref_id="CVE-2019-6465" ref_url="https://www.suse.com/security/cve/CVE-2019-6465/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005537.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

Security issues fixed:

- CVE-2018-5740: Fixed a denial of service vulnerability in the 'deny-answer-aliases' feature (bsc#1104129).
- CVE-2018-5743: Limiting simultaneous TCP clients is ineffective. (bsc#1133185)
- CVE-2018-5745: An assertion failure can occur if a trust anchor rolls over to an unsupported key algorithm when using managed-keys. (bsc#1126068)
- CVE-2019-6465: Fixed an issue where controls for zone transfers may not be properly applied to Dynamically Loadable Zones (bsc#1126069).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-06"/>
	<updated date="2019-06-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104129">SUSE bug 1104129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126068">SUSE bug 1126068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126069">SUSE bug 1126069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133185">SUSE bug 1133185</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5740/">CVE-2018-5740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5740">CVE-2018-5740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5743/">CVE-2018-5743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5743">CVE-2018-5743 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5745/">CVE-2018-5745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-5745">CVE-2018-5745 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6465/">CVE-2019-6465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6465">CVE-2019-6465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582159" comment="bind-9.9.6P1-0.51.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582160" comment="bind-chrootenv-9.9.6P1-0.51.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582161" comment="bind-doc-9.9.6P1-0.51.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582162" comment="bind-libs-9.9.6P1-0.51.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582163" comment="bind-libs-32bit-9.9.6P1-0.51.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582164" comment="bind-utils-9.9.6P1-0.51.15.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219831" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1033843" ref_url="https://bugzilla.suse.com/1033843" source="BUGZILLA"/>
		<reference ref_id="1092283" ref_url="https://bugzilla.suse.com/1092283" source="BUGZILLA"/>
		<reference ref_id="1109160" ref_url="https://bugzilla.suse.com/1109160" source="BUGZILLA"/>
		<reference ref_id="1171740" ref_url="https://bugzilla.suse.com/1171740" source="BUGZILLA"/>
		<reference ref_id="1172220" ref_url="https://bugzilla.suse.com/1172220" source="BUGZILLA"/>
		<reference ref_id="1172680" ref_url="https://bugzilla.suse.com/1172680" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5741" ref_url="https://www.suse.com/security/cve/CVE-2018-5741/" source="CVE"/>
		<reference ref_id="CVE-2020-8616" ref_url="https://www.suse.com/security/cve/CVE-2020-8616/" source="CVE"/>
		<reference ref_id="CVE-2020-8617" ref_url="https://www.suse.com/security/cve/CVE-2020-8617/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006991.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8616: Fixed the insufficient limit on the number of fetches performed when processing referrals (bsc#1171740).
- CVE-2020-8617: Fixed a logic error in code which checks TSIG validity (bsc#1171740).
- CVE-2018-5741: Fixed the documentation (bsc#1109160).
- Removed rndc.key generation from bind.spec file (bsc#1092283, bsc#1033843)
  bind should create the key on first boot or if it went missing.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1033843">SUSE bug 1033843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092283">SUSE bug 1092283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172220">SUSE bug 1172220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172680">SUSE bug 1172680</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5741/">CVE-2018-5741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5741">CVE-2018-5741 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8616/">CVE-2020-8616 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8616">CVE-2020-8616 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8617/">CVE-2020-8617 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8617">CVE-2020-8617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582165" comment="bind-9.9.6P1-0.51.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582166" comment="bind-chrootenv-9.9.6P1-0.51.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582167" comment="bind-doc-9.9.6P1-0.51.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582168" comment="bind-libs-9.9.6P1-0.51.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582169" comment="bind-libs-32bit-9.9.6P1-0.51.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582170" comment="bind-utils-9.9.6P1-0.51.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219832" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1182246" ref_url="https://bugzilla.suse.com/1182246" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8625" ref_url="https://www.suse.com/security/cve/CVE-2020-8625/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008341.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8625: A vulnerability in BIND's GSSAPI security policy
  negotiation can be targeted by a buffer overflow attack [bsc#1182246, CVE-2020-8625]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182246">SUSE bug 1182246</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8625/">CVE-2020-8625 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8625">CVE-2020-8625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582171" comment="bind-9.9.6P1-0.51.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582172" comment="bind-chrootenv-9.9.6P1-0.51.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582173" comment="bind-doc-9.9.6P1-0.51.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582174" comment="bind-libs-9.9.6P1-0.51.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582175" comment="bind-libs-32bit-9.9.6P1-0.51.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582176" comment="bind-utils-9.9.6P1-0.51.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219833" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1185345" ref_url="https://bugzilla.suse.com/1185345" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25214" ref_url="https://www.suse.com/security/cve/CVE-2021-25214/" source="CVE"/>
		<reference ref_id="CVE-2021-25215" ref_url="https://www.suse.com/security/cve/CVE-2021-25215/" source="CVE"/>
		<reference ref_id="CVE-2021-25216" ref_url="https://www.suse.com/security/cve/CVE-2021-25216/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008726.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25214: Fixed a broken inbound incremental zone update (IXFR) which could have caused named to terminate unexpectedly (bsc#1185345).
- CVE-2021-25215: Fixed an assertion check which could have failed while answering queries for DNAME records that required the DNAME to be processed to resolve itself (bsc#1185345).
- CVE-2021-25216: Fixed an issue where policy negotiation can be targeted by a buffer overflow attack (bsc#1185345).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185345">SUSE bug 1185345</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25214/">CVE-2021-25214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25214">CVE-2021-25214 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25215/">CVE-2021-25215 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25215">CVE-2021-25215 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25216/">CVE-2021-25216 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25216">CVE-2021-25216 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582177" comment="bind-9.9.6P1-0.51.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582178" comment="bind-chrootenv-9.9.6P1-0.51.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582179" comment="bind-doc-9.9.6P1-0.51.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582180" comment="bind-libs-9.9.6P1-0.51.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582181" comment="bind-libs-32bit-9.9.6P1-0.51.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582182" comment="bind-utils-9.9.6P1-0.51.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219834" version="1" class="patch">
	<metadata>
		<title>Security update for bsdtar (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="920870" ref_url="https://bugzilla.suse.com/920870" source="BUGZILLA"/>
		<reference ref_id="984990" ref_url="https://bugzilla.suse.com/984990" source="BUGZILLA"/>
		<reference ref_id="985609" ref_url="https://bugzilla.suse.com/985609" source="BUGZILLA"/>
		<reference ref_id="985669" ref_url="https://bugzilla.suse.com/985669" source="BUGZILLA"/>
		<reference ref_id="985675" ref_url="https://bugzilla.suse.com/985675" source="BUGZILLA"/>
		<reference ref_id="985682" ref_url="https://bugzilla.suse.com/985682" source="BUGZILLA"/>
		<reference ref_id="985698" ref_url="https://bugzilla.suse.com/985698" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2304" ref_url="https://www.suse.com/security/cve/CVE-2015-2304/" source="CVE"/>
		<reference ref_id="CVE-2015-8918" ref_url="https://www.suse.com/security/cve/CVE-2015-8918/" source="CVE"/>
		<reference ref_id="CVE-2015-8920" ref_url="https://www.suse.com/security/cve/CVE-2015-8920/" source="CVE"/>
		<reference ref_id="CVE-2015-8921" ref_url="https://www.suse.com/security/cve/CVE-2015-8921/" source="CVE"/>
		<reference ref_id="CVE-2015-8924" ref_url="https://www.suse.com/security/cve/CVE-2015-8924/" source="CVE"/>
		<reference ref_id="CVE-2015-8929" ref_url="https://www.suse.com/security/cve/CVE-2015-8929/" source="CVE"/>
		<reference ref_id="CVE-2016-4809" ref_url="https://www.suse.com/security/cve/CVE-2016-4809/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002172.html" source="SUSE-SU"/>
		<description>
bsdtar was updated to fix seven security issues.

These security issues were fixed:
- CVE-2015-8929: Memory leak in tar parser (bsc#985669).
- CVE-2016-4809: Memory allocate error with symbolic links in cpio archives (bsc#984990).
- CVE-2015-8920: Stack out of bounds read in ar parser (bsc#985675).
- CVE-2015-8921: Global out of bounds read in mtree parser (bsc#985682).
- CVE-2015-8924: Heap buffer read overflow in tar (bsc#985609).
- CVE-2015-8918: Overlapping memcpy in CAB parser (bsc#985698).
- CVE-2015-2304: Reject absolute paths in input mode of bsdcpio exactly when '..' is rejected (bsc#920870).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-02"/>
	<updated date="2016-08-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/920870">SUSE bug 920870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984990">SUSE bug 984990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985609">SUSE bug 985609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985669">SUSE bug 985669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985675">SUSE bug 985675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985682">SUSE bug 985682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985698">SUSE bug 985698</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2304/">CVE-2015-2304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2304">CVE-2015-2304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8918/">CVE-2015-8918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8918">CVE-2015-8918 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8920/">CVE-2015-8920 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8920">CVE-2015-8920 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8921/">CVE-2015-8921 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8921">CVE-2015-8921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8924/">CVE-2015-8924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8924">CVE-2015-8924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8929/">CVE-2015-8929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8929">CVE-2015-8929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4809/">CVE-2016-4809 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4809">CVE-2016-4809 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582183" comment="libarchive2-2.5.5-9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582183" comment="libarchive2-2.5.5-9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219835" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="985657" ref_url="https://bugzilla.suse.com/985657" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3189" ref_url="https://www.suse.com/security/cve/CVE-2016-3189/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005710.html" source="SUSE-SU"/>
		<description>
This update for bzip2 fixes the following issues:

Security issue fixed:

- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1139083).
- CVE-2016-3189: Fixed a use-after-free in bzip2recover (bsc#985657).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-15"/>
	<updated date="2019-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985657">SUSE bug 985657</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3189/">CVE-2016-3189 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3189">CVE-2016-3189 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582184" comment="bzip2-1.0.5-34.256.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582185" comment="bzip2-doc-1.0.5-34.256.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582186" comment="libbz2-1-1.0.5-34.256.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582187" comment="libbz2-1-32bit-1.0.5-34.256.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219836" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005781.html" source="SUSE-SU"/>
		<description>
This update for bzip2 fixes the following issues:

- Fixed a regression with the fix for CVE-2019-12900, which caused incompatibilities
  with files that used many selectors (bsc#1139083).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-06"/>
	<updated date="2019-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582188" comment="bzip2-1.0.5-34.256.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582189" comment="bzip2-doc-1.0.5-34.256.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582190" comment="libbz2-1-1.0.5-34.256.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582191" comment="libbz2-1-32bit-1.0.5-34.256.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219837" version="1" class="patch">
	<metadata>
		<title>Security update for cairo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1007255" ref_url="https://bugzilla.suse.com/1007255" source="BUGZILLA"/>
		<reference ref_id="1036789" ref_url="https://bugzilla.suse.com/1036789" source="BUGZILLA"/>
		<reference ref_id="1049092" ref_url="https://bugzilla.suse.com/1049092" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9082" ref_url="https://www.suse.com/security/cve/CVE-2016-9082/" source="CVE"/>
		<reference ref_id="CVE-2017-7475" ref_url="https://www.suse.com/security/cve/CVE-2017-7475/" source="CVE"/>
		<reference ref_id="CVE-2017-9814" ref_url="https://www.suse.com/security/cve/CVE-2017-9814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004095.html" source="SUSE-SU"/>
		<description>
This update for cairo fixes the following issues:

- CVE-2016-9082: Fixed a segfault when using &gt;4GB images since int values were used
  for pointer operations (bsc#1007255).
- CVE-2017-9814: Replace malloc with _cairo_malloc and check cmap size before
  allocating to prevent DoS (bsc#1049092).
- CVE-2017-7475: Fix a segfault in get_bitmap_surface due to malformed font (bsc#1036789).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-28"/>
	<updated date="2018-05-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007255">SUSE bug 1007255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036789">SUSE bug 1036789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049092">SUSE bug 1049092</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9082/">CVE-2016-9082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9082">CVE-2016-9082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7475/">CVE-2017-7475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7475">CVE-2017-7475 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9814/">CVE-2017-9814 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9814">CVE-2017-9814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582192" comment="cairo-1.8.8-2.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582193" comment="cairo-32bit-1.8.8-2.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582194" comment="cairo-doc-1.8.8-2.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582195" comment="cairo-x86-1.8.8-2.3.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582192" comment="cairo-1.8.8-2.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582193" comment="cairo-32bit-1.8.8-2.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582194" comment="cairo-doc-1.8.8-2.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582195" comment="cairo-x86-1.8.8-2.3.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219838" version="1" class="patch">
	<metadata>
		<title>Security update for cifs-utils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1197216" ref_url="https://bugzilla.suse.com/1197216" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27239" ref_url="https://www.suse.com/security/cve/CVE-2022-27239/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010847.html" source="SUSE-SU"/>
		<description>
This update for cifs-utils fixes the following issues:

- CVE-2022-27239: Fixed a buffer overflow in the command line ip option (bsc#1197216).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197216">SUSE bug 1197216</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27239/">CVE-2022-27239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27239">CVE-2022-27239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681250" comment="cifs-utils-5.1-0.16.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219839" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1045490" ref_url="https://bugzilla.suse.com/1045490" source="BUGZILLA"/>
		<reference ref_id="815106" ref_url="https://bugzilla.suse.com/815106" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003001.html" source="SUSE-SU"/>
		<description>

This update for clamav fixes the following issues:

Security issue fixed:

- CVE-2012-6706: Fixed an arbitrary memory write in VMSF_DELTA filter in libclamunrar (bsc#1045490)

Non security issue fixed:

- Fix permissions of /var/spool/amavis. (bsc#815106)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-03"/>
	<updated date="2017-07-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045490">SUSE bug 1045490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815106">SUSE bug 815106</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6706">CVE-2012-6706 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582196" comment="clamav-0.99.2-0.19.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582196" comment="clamav-0.99.2-0.19.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219840" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1049423" ref_url="https://bugzilla.suse.com/1049423" source="BUGZILLA"/>
		<reference ref_id="1052448" ref_url="https://bugzilla.suse.com/1052448" source="BUGZILLA"/>
		<reference ref_id="1052449" ref_url="https://bugzilla.suse.com/1052449" source="BUGZILLA"/>
		<reference ref_id="1052466" ref_url="https://bugzilla.suse.com/1052466" source="BUGZILLA"/>
		<reference ref_id="1077732" ref_url="https://bugzilla.suse.com/1077732" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-12374" ref_url="https://www.suse.com/security/cve/CVE-2017-12374/" source="CVE"/>
		<reference ref_id="CVE-2017-12375" ref_url="https://www.suse.com/security/cve/CVE-2017-12375/" source="CVE"/>
		<reference ref_id="CVE-2017-12376" ref_url="https://www.suse.com/security/cve/CVE-2017-12376/" source="CVE"/>
		<reference ref_id="CVE-2017-12377" ref_url="https://www.suse.com/security/cve/CVE-2017-12377/" source="CVE"/>
		<reference ref_id="CVE-2017-12378" ref_url="https://www.suse.com/security/cve/CVE-2017-12378/" source="CVE"/>
		<reference ref_id="CVE-2017-12379" ref_url="https://www.suse.com/security/cve/CVE-2017-12379/" source="CVE"/>
		<reference ref_id="CVE-2017-12380" ref_url="https://www.suse.com/security/cve/CVE-2017-12380/" source="CVE"/>
		<reference ref_id="CVE-2017-6418" ref_url="https://www.suse.com/security/cve/CVE-2017-6418/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2017-6420" ref_url="https://www.suse.com/security/cve/CVE-2017-6420/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003654.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- Update to security release 0.99.3 (bsc#1077732)
  * CVE-2017-12376 (ClamAV Buffer Overflow in handle_pdfname Vulnerability)
  * CVE-2017-12377 (ClamAV Mew Packet Heap Overflow Vulnerability)
  * CVE-2017-12379 (ClamAV Buffer Overflow in messageAddArgument Vulnerability)
    - these vulnerabilities could have allowed an unauthenticated,
      remote attacker to cause a denial of service (DoS) condition
      or potentially execute arbitrary code on an affected device.
  * CVE-2017-12374 (ClamAV use-after-free Vulnerabilities)
  * CVE-2017-12375 (ClamAV Buffer Overflow Vulnerability)
  * CVE-2017-12378 (ClamAV Buffer Over Read Vulnerability)
  * CVE-2017-12380 (ClamAV Null Dereference Vulnerability)
    - these vulnerabilities could have allowed an unauthenticated,
      remote attacker to cause a denial of service (DoS) condition on an affected device.
  * CVE-2017-6420 (bsc#1052448)
    - this vulnerability could have allowed remote attackers to cause a denial of service
      (use-after-free) via a crafted PE file with WWPack compression.
  * CVE-2017-6419 (bsc#1052449)
    - ClamAV could have allowed remote attackers to cause a denial of service
      (heap-based buffer overflow and application crash) or possibly
      have unspecified other impact via a crafted CHM file.
  * CVE-2017-11423 (bsc#1049423)
    - ClamAV could have allowed remote attackers to cause a denial of service
      (stack-based buffer over-read and application crash) via a crafted CAB file.
  * CVE-2017-6418 (bsc#1052466)
    - ClamAV could have allowed remote attackers to cause a denial
      of service (out-of-bounds read) via a crafted e-mail message.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-27"/>
	<updated date="2018-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1049423">SUSE bug 1049423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052448">SUSE bug 1052448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052449">SUSE bug 1052449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052466">SUSE bug 1052466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11423">CVE-2017-11423 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12374/">CVE-2017-12374 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12374">CVE-2017-12374 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12375/">CVE-2017-12375 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12375">CVE-2017-12375 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12376/">CVE-2017-12376 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12376">CVE-2017-12376 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12377/">CVE-2017-12377 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12377">CVE-2017-12377 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12378/">CVE-2017-12378 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12378">CVE-2017-12378 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12379/">CVE-2017-12379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12379">CVE-2017-12379 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12380/">CVE-2017-12380 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12380">CVE-2017-12380 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6418/">CVE-2017-6418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6418">CVE-2017-6418 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6419">CVE-2017-6419 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6420/">CVE-2017-6420 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6420">CVE-2017-6420 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582197" comment="clamav-0.99.3-0.20.3.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582197" comment="clamav-0.99.3-0.20.3.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219841" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1045315" ref_url="https://bugzilla.suse.com/1045315" source="BUGZILLA"/>
		<reference ref_id="1049423" ref_url="https://bugzilla.suse.com/1049423" source="BUGZILLA"/>
		<reference ref_id="1052449" ref_url="https://bugzilla.suse.com/1052449" source="BUGZILLA"/>
		<reference ref_id="1082858" ref_url="https://bugzilla.suse.com/1082858" source="BUGZILLA"/>
		<reference ref_id="1083915" ref_url="https://bugzilla.suse.com/1083915" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2018-0202" ref_url="https://www.suse.com/security/cve/CVE-2018-0202/" source="CVE"/>
		<reference ref_id="CVE-2018-1000085" ref_url="https://www.suse.com/security/cve/CVE-2018-1000085/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003864.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

Security issues fixed:

- CVE-2012-6706: VMSF_DELTA filter inside the unrar implementation allows an arbitrary memory write (bsc#1045315).
- CVE-2017-6419: A heap-based buffer overflow that can lead to a denial of service in libmspack via a crafted CHM file (bsc#1052449).
- CVE-2017-11423: A stack-based buffer over-read that can lead to a denial of service in mspack via a crafted CAB file (bsc#1049423).
- CVE-2018-1000085: An out-of-bounds heap read vulnerability was found in XAR parser that can lead to a denial of service (bsc#1082858).
- CVE-2018-0202: Fixed two vulnerabilities in the PDF parsing code (bsc#1083915).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045315">SUSE bug 1045315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049423">SUSE bug 1049423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052449">SUSE bug 1052449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082858">SUSE bug 1082858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083915">SUSE bug 1083915</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6706">CVE-2012-6706 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11423">CVE-2017-11423 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6419">CVE-2017-6419 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0202/">CVE-2018-0202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0202">CVE-2018-0202 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000085/">CVE-2018-1000085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000085">CVE-2018-1000085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582198" comment="clamav-0.99.4-0.20.7.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582198" comment="clamav-0.99.4-0.20.7.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219842" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1101410" ref_url="https://bugzilla.suse.com/1101410" source="BUGZILLA"/>
		<reference ref_id="1101412" ref_url="https://bugzilla.suse.com/1101412" source="BUGZILLA"/>
		<reference ref_id="1101654" ref_url="https://bugzilla.suse.com/1101654" source="BUGZILLA"/>
		<reference ref_id="1103040" ref_url="https://bugzilla.suse.com/1103040" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0360" ref_url="https://www.suse.com/security/cve/CVE-2018-0360/" source="CVE"/>
		<reference ref_id="CVE-2018-0361" ref_url="https://www.suse.com/security/cve/CVE-2018-0361/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004380.html" source="SUSE-SU"/>
		<description>
This update for clamav to version 0.100.1 fixes the following issues:

The following security vulnerabilities were addressed:

- CVE-2018-0360: HWP integer overflow, infinite loop vulnerability
  (bsc#1101410)
- CVE-2018-0361: PDF object length check, unreasonably long time to parse
  relatively small file (bsc#1101412)
- Buffer over-read in unRAR code due to missing max value checks in table
  initialization
- Libmspack heap buffer over-read in CHM parser (bsc#1103040)
- PDF parser bugs

The following other changes were made:

- Disable YARA support for licensing reasons (bsc#1101654).
- Add HTTPS support for clamsubmit
- Fix for DNS resolution for users on IPv4-only machines where IPv6 is not
  available or is link-local only
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-07"/>
	<updated date="2018-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101410">SUSE bug 1101410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101412">SUSE bug 1101412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101654">SUSE bug 1101654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0360/">CVE-2018-0360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0360">CVE-2018-0360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0361/">CVE-2018-0361 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0361">CVE-2018-0361 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582199" comment="clamav-0.100.1-0.20.15.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582199" comment="clamav-0.100.1-0.20.15.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219843" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1103040" ref_url="https://bugzilla.suse.com/1103040" source="BUGZILLA"/>
		<reference ref_id="1104457" ref_url="https://bugzilla.suse.com/1104457" source="BUGZILLA"/>
		<reference ref_id="1110723" ref_url="https://bugzilla.suse.com/1110723" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14680" ref_url="https://www.suse.com/security/cve/CVE-2018-14680/" source="CVE"/>
		<reference ref_id="CVE-2018-14681" ref_url="https://www.suse.com/security/cve/CVE-2018-14681/" source="CVE"/>
		<reference ref_id="CVE-2018-14682" ref_url="https://www.suse.com/security/cve/CVE-2018-14682/" source="CVE"/>
		<reference ref_id="CVE-2018-15378" ref_url="https://www.suse.com/security/cve/CVE-2018-15378/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004791.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

Clamav was updated to version 0.100.2:

- CVE-2018-15378: Vulnerability in ClamAV's MEW
  unpacking feature that could allow an unauthenticated, remote
  attacker to cause a denial of service (DoS) condition on an
  affected device. (bsc#1110723)
- CVE-2018-14680, CVE-2018-14681, CVE-2018-14682:
  more fixes for embedded libmspack. (bsc#1103040)

* Make freshclam more robust against lagging signature mirrors.
* On-Access 'Extra Scanning', an opt-in minor feature of
  OnAccess scanning on Linux systems, has been disabled due to a
  known issue with resource cleanup OnAccessExtraScanning will
  be re-enabled in a future release when the issue is
  resolved. In the mean-time, users who enabled the feature in
  clamd.conf will see a warning informing them that the feature
  is not active. For details, see:
  https://bugzilla.clamav.net/show_bug.cgi?id=12048

- Restore exit code compatibility of freshclam with versions before
  0.100.0 when the virus database is already up to date
  (bsc#1104457).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104457">SUSE bug 1104457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110723">SUSE bug 1110723</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14680/">CVE-2018-14680 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14680">CVE-2018-14680 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14681/">CVE-2018-14681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14681">CVE-2018-14681 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14682/">CVE-2018-14682 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14682">CVE-2018-14682 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15378/">CVE-2018-15378 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15378">CVE-2018-15378 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582200" comment="clamav-0.100.2-0.20.18.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582200" comment="clamav-0.100.2-0.20.18.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219844" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1130721" ref_url="https://bugzilla.suse.com/1130721" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1787" ref_url="https://www.suse.com/security/cve/CVE-2019-1787/" source="CVE"/>
		<reference ref_id="CVE-2019-1788" ref_url="https://www.suse.com/security/cve/CVE-2019-1788/" source="CVE"/>
		<reference ref_id="CVE-2019-1789" ref_url="https://www.suse.com/security/cve/CVE-2019-1789/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005315.html" source="SUSE-SU"/>
		<description>
This update for clamav to version 0.100.3 fixes the following issues:

Security issues fixed (bsc#1130721): 	  

- CVE-2019-1787: Fixed an out-of-bounds heap read condition which may occur
  when scanning PDF documents.   
- CVE-2019-1789: Fixed an out-of-bounds heap read condition which may occur
  when scanning PE files (i.e. Windows EXE and DLL files).
- CVE-2019-1788: Fixed an out-of-bounds heap write condition which may occur
  when scanning OLE2 files such as Microsoft Office 97-2003 documents. 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-09"/>
	<updated date="2019-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1787/">CVE-2019-1787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1787">CVE-2019-1787 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-1788/">CVE-2019-1788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1788">CVE-2019-1788 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1789/">CVE-2019-1789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1789">CVE-2019-1789 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582201" comment="clamav-0.100.3-0.20.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219845" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1144504" ref_url="https://bugzilla.suse.com/1144504" source="BUGZILLA"/>
		<reference ref_id="1149458" ref_url="https://bugzilla.suse.com/1149458" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12625" ref_url="https://www.suse.com/security/cve/CVE-2019-12625/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006181.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

Security issues fixed:

- CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and heuristics for zips with overlapping files (bsc#1144504).
- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1149458).

Non-security issue fixed:

- Added the --max-scantime clamscan option and MaxScanTime clamd configuration option.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12625/">CVE-2019-12625 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12625">CVE-2019-12625 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582202" comment="clamav-0.100.3-0.20.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219846" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1157763" ref_url="https://bugzilla.suse.com/1157763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006209.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2019-15961: Fixed a denial of service which might occur when 
  scanning a specially crafted email file as (bsc#1157763).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15961">CVE-2019-15961 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582203" comment="clamav-0.100.3-0.20.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219847" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1118459" ref_url="https://bugzilla.suse.com/1118459" source="BUGZILLA"/>
		<reference ref_id="1171981" ref_url="https://bugzilla.suse.com/1171981" source="BUGZILLA"/>
		<reference ref_id="1174250" ref_url="https://bugzilla.suse.com/1174250" source="BUGZILLA"/>
		<reference ref_id="1174255" ref_url="https://bugzilla.suse.com/1174255" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3123" ref_url="https://www.suse.com/security/cve/CVE-2020-3123/" source="CVE"/>
		<reference ref_id="CVE-2020-3327" ref_url="https://www.suse.com/security/cve/CVE-2020-3327/" source="CVE"/>
		<reference ref_id="CVE-2020-3341" ref_url="https://www.suse.com/security/cve/CVE-2020-3341/" source="CVE"/>
		<reference ref_id="CVE-2020-3350" ref_url="https://www.suse.com/security/cve/CVE-2020-3350/" source="CVE"/>
		<reference ref_id="CVE-2020-3481" ref_url="https://www.suse.com/security/cve/CVE-2020-3481/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008156.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- Update to 0.103.0 to implement jsc#ECO-3010 and bsc#1118459
- This update incorporates incompatible changes that were introduced
  in version 0.101.0.
- Accumulated security fixes:
  * CVE-2020-3350: Fix a vulnerability wherein a malicious user could
    replace a scan target's directory with a symlink to another path
    to trick clamscan, clamdscan, or clamonacc into removing or moving
    a different file (eg. a critical system file). The issue would
    affect users that use the --move or --remove options for clamscan,
    clamdscan, and clamonacc. (bsc#1174255)
  * CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing
    module in ClamAV 0.102.3 that could cause a Denial-of-Service
    (DoS) condition. Improper bounds checking results in an
    out-of-bounds read which could cause a crash. The previous fix for
    this CVE in 0.102.3 was incomplete. This fix correctly resolves
    the issue.
  * CVE-2020-3481: Fix a vulnerability in the EGG archive module in
    ClamAV 0.102.0 - 0.102.3 could cause a Denial-of-Service (DoS)
    condition. Improper error handling may result in a crash due to a
    NULL pointer dereference. This vulnerability is mitigated for
    those using the official ClamAV signature databases because the
    file type signatures in daily.cvd will not enable the EGG archive
    parser in versions affected by the vulnerability. (bsc#1174250)
  * CVE-2020-3341: Fix a vulnerability in the PDF parsing module in
    ClamAV 0.101 - 0.102.2 that could cause a Denial-of-Service (DoS)
    condition. Improper size checking of a buffer used to initialize AES
    decryption routines results in an out-of-bounds read which may cause
    a crash. (bsc#1171981)
  * CVE-2020-3123: A denial-of-service (DoS) condition may occur when
    using the optional credit card data-loss-prevention (DLP) feature.
    Improper bounds checking of an unsigned variable resulted in an
    out-of-bounds read, which causes a crash.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118459">SUSE bug 1118459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171981">SUSE bug 1171981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174250">SUSE bug 1174250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174255">SUSE bug 1174255</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3123/">CVE-2020-3123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3123">CVE-2020-3123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3327/">CVE-2020-3327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3327">CVE-2020-3327 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3341/">CVE-2020-3341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3341">CVE-2020-3341 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3350/">CVE-2020-3350 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3350">CVE-2020-3350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3481/">CVE-2020-3481 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3481">CVE-2020-3481 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582204" comment="clamav-0.103.0-0.20.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219848" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1181256" ref_url="https://bugzilla.suse.com/1181256" source="BUGZILLA"/>
		<reference ref_id="1184532" ref_url="https://bugzilla.suse.com/1184532" source="BUGZILLA"/>
		<reference ref_id="1184533" ref_url="https://bugzilla.suse.com/1184533" source="BUGZILLA"/>
		<reference ref_id="1184534" ref_url="https://bugzilla.suse.com/1184534" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-1252" ref_url="https://www.suse.com/security/cve/CVE-2021-1252/" source="CVE"/>
		<reference ref_id="CVE-2021-1404" ref_url="https://www.suse.com/security/cve/CVE-2021-1404/" source="CVE"/>
		<reference ref_id="CVE-2021-1405" ref_url="https://www.suse.com/security/cve/CVE-2021-1405/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008635.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2021-1252: Fix for Excel XLM parser infinite loop. (bsc#1184532)
- CVE-2021-1404: Fix for PDF parser buffer over-read; possible crash. (bsc#1184533)
- CVE-2021-1405: Fix for mail parser NULL-dereference crash. (bsc#1184534)
- Fix errors when scanning files &gt; 4G (bsc#1181256)
- Update clamav.keyring
- Update to 0.103.2
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-14"/>
	<updated date="2021-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181256">SUSE bug 1181256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184532">SUSE bug 1184532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184533">SUSE bug 1184533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184534">SUSE bug 1184534</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1252/">CVE-2021-1252 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1252">CVE-2021-1252 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1404/">CVE-2021-1404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1404">CVE-2021-1404 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1405/">CVE-2021-1405 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1405">CVE-2021-1405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582205" comment="clamav-0.103.2-0.20.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219849" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1103032" ref_url="https://bugzilla.suse.com/1103032" source="BUGZILLA"/>
		<reference ref_id="1187509" ref_url="https://bugzilla.suse.com/1187509" source="BUGZILLA"/>
		<reference ref_id="1188284" ref_url="https://bugzilla.suse.com/1188284" source="BUGZILLA"/>
		<reference ref_id="1192346" ref_url="https://bugzilla.suse.com/1192346" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009806.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2018-14679: Fixed off-by-one issue in embedded libmspack that could lead to denial of service (bsc#1103032). 
  
- Update to 0.103.4 (bsc#1192346).
- Add documentation about max file size purpose and side effect in the 'clamscan' and 'clamdscan' manpages (bsc#1187509).
- Update to 0.103.3 (bsc#1188284).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187509">SUSE bug 1187509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188284">SUSE bug 1188284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192346">SUSE bug 1192346</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14679">CVE-2018-14679 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657139" comment="clamav-0.103.4-0.20.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219850" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1194731" ref_url="https://bugzilla.suse.com/1194731" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20698" ref_url="https://www.suse.com/security/cve/CVE-2022-20698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010086.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2022-20698: Fixed invalid pointer read allowing denial of service crash. (bsc#1194731)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194731">SUSE bug 1194731</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20698/">CVE-2022-20698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20698">CVE-2022-20698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664015" comment="clamav-0.103.5-0.20.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219851" version="1" class="patch">
	<metadata>
		<title>Recommended udpate for SUSE Manager Client Tools (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="970550" ref_url="https://bugzilla.suse.com/970550" source="BUGZILLA"/>
		<reference ref_id="970989" ref_url="https://bugzilla.suse.com/970989" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2016:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002075.html" source="SUSE-SU"/>
		<description>

This update for SUSE Manager Client Tools provides the following fixes and enhancements:

rhnlib:

- Use TLSv1_METHOD in SSL Context (bsc#970989)

suseRegisterInfo:

- Fix file permissions (bsc#970550)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-19"/>
	<updated date="2016-05-19"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/970550">SUSE bug 970550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970989">SUSE bug 970989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582206" comment="rhnlib-2.5.69.8-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582207" comment="suseRegisterInfo-2.1.12-14.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582206" comment="rhnlib-2.5.69.8-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582207" comment="suseRegisterInfo-2.1.12-14.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219852" version="1" class="patch">
	<metadata>
		<title>Security update for coreutils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1023041" ref_url="https://bugzilla.suse.com/1023041" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2616" ref_url="https://www.suse.com/security/cve/CVE-2017-2616/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003867.html" source="SUSE-SU"/>
		<description>
This update for coreutils fixes one issue.

This security issue was fixed:

- CVE-2017-2616: In su with PAM support it was possible for local users to send
  SIGKILL to selected other processes with root privileges (bsc#1023041)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1023041">SUSE bug 1023041</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2616/">CVE-2017-2616 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2616">CVE-2017-2616 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582208" comment="coreutils-8.12-6.25.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582209" comment="coreutils-lang-8.12-6.25.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582210" comment="coreutils-x86-8.12-6.25.33.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582208" comment="coreutils-8.12-6.25.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582209" comment="coreutils-lang-8.12-6.25.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582210" comment="coreutils-x86-8.12-6.25.33.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219853" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1189206" ref_url="https://bugzilla.suse.com/1189206" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009282.html" source="SUSE-SU"/>
		<description>
This update for cpio fixes the following issues:

  It was possible to trigger Remote code execution due to a integer overflow (CVE-2021-38185, bsc#1189206)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-12"/>
	<updated date="2021-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189206">SUSE bug 1189206</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630758" comment="cpio-2.9-75.81.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630759" comment="cpio-lang-2.9-75.81.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219854" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1189465" ref_url="https://bugzilla.suse.com/1189465" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009331.html" source="SUSE-SU"/>
		<description>
This update for cpio fixes the following issues:

- A patch previously applied to remedy CVE-2021-38185 introduced a regression
  that had the potential to cause a segmentation fault in cpio. [bsc#1189465]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-23"/>
	<updated date="2021-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189465">SUSE bug 1189465</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631550" comment="cpio-2.9-75.81.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631551" comment="cpio-lang-2.9-75.81.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219855" version="1" class="patch">
	<metadata>
		<title>Security update for cracklib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="928923" ref_url="https://bugzilla.suse.com/928923" source="BUGZILLA"/>
		<reference ref_id="992966" ref_url="https://bugzilla.suse.com/992966" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6318" ref_url="https://www.suse.com/security/cve/CVE-2016-6318/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002248.html" source="SUSE-SU"/>
		<description>

This update for cracklib fixes a security issue and a bug:

Security issue fixed:
- Add patch to fix a stack buffer overflow in GECOS parser (bsc#992966 CVE-2016-6318)

The following non security issue was fixed:
- Call textdomain in cracklib-check main function so that program
  output is translated accordingly. (bsc#928923)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-02"/>
	<updated date="2016-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/928923">SUSE bug 928923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992966">SUSE bug 992966</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6318/">CVE-2016-6318 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6318">CVE-2016-6318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582211" comment="cracklib-2.8.12-56.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582212" comment="cracklib-32bit-2.8.12-56.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582213" comment="cracklib-x86-2.8.12-56.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582211" comment="cracklib-2.8.12-56.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582212" comment="cracklib-32bit-2.8.12-56.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582213" comment="cracklib-x86-2.8.12-56.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219856" version="1" class="patch">
	<metadata>
		<title>Security update for crash (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1032471" ref_url="https://bugzilla.suse.com/1032471" source="BUGZILLA"/>
		<reference ref_id="1075785" ref_url="https://bugzilla.suse.com/1075785" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:4182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004977.html" source="SUSE-SU"/>
		<description>
This update for crash provides the following fix:

- Update crash to support -bigmem kernel dumps for PPC64, including the ones that have
  extended process virtual address space support to 128TB (bsc#1075785, bsc#1032471).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-19"/>
	<updated date="2018-12-19"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1032471">SUSE bug 1032471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075785">SUSE bug 1075785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582214" comment="crash-7.0.9-30.3.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582215" comment="crash-eppic-7.0.9-30.3.28 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582214" comment="crash-7.0.9-30.3.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582215" comment="crash-eppic-7.0.9-30.3.28 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219857" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1096405" ref_url="https://bugzilla.suse.com/1096405" source="BUGZILLA"/>
		<reference ref_id="1096406" ref_url="https://bugzilla.suse.com/1096406" source="BUGZILLA"/>
		<reference ref_id="1096407" ref_url="https://bugzilla.suse.com/1096407" source="BUGZILLA"/>
		<reference ref_id="1096408" ref_url="https://bugzilla.suse.com/1096408" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-4180" ref_url="https://www.suse.com/security/cve/CVE-2018-4180/" source="CVE"/>
		<reference ref_id="CVE-2018-4181" ref_url="https://www.suse.com/security/cve/CVE-2018-4181/" source="CVE"/>
		<reference ref_id="CVE-2018-4182" ref_url="https://www.suse.com/security/cve/CVE-2018-4182/" source="CVE"/>
		<reference ref_id="CVE-2018-4183" ref_url="https://www.suse.com/security/cve/CVE-2018-4183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004381.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

Security issues fixed:

- CVE-2018-4180: Fix local privilege escalation to root in dnssd backend (bsc#1096405).
- CVE-2018-4181: Limited local file reads as root via cupsd.conf include directive (bsc#1096406).
- CVE-2018-4182: Fix cups-exec sandbox bypass due to insecure error handling (bsc#1096407).
- CVE-2018-4183: Fix cups-exec sandbox bypass due to profile misconfiguration (bsc#1096408).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-07"/>
	<updated date="2018-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1096405">SUSE bug 1096405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096406">SUSE bug 1096406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096407">SUSE bug 1096407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096408">SUSE bug 1096408</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4180/">CVE-2018-4180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4180">CVE-2018-4180 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4181/">CVE-2018-4181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4181">CVE-2018-4181 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4182/">CVE-2018-4182 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4182">CVE-2018-4182 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4183/">CVE-2018-4183 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4183">CVE-2018-4183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582216" comment="cups-1.3.9-8.46.56.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582217" comment="cups-client-1.3.9-8.46.56.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582218" comment="cups-libs-1.3.9-8.46.56.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582219" comment="cups-libs-32bit-1.3.9-8.46.56.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582220" comment="cups-libs-x86-1.3.9-8.46.56.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582216" comment="cups-1.3.9-8.46.56.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582217" comment="cups-client-1.3.9-8.46.56.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582218" comment="cups-libs-1.3.9-8.46.56.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582219" comment="cups-libs-32bit-1.3.9-8.46.56.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582220" comment="cups-libs-x86-1.3.9-8.46.56.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219858" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1146358" ref_url="https://bugzilla.suse.com/1146358" source="BUGZILLA"/>
		<reference ref_id="1146359" ref_url="https://bugzilla.suse.com/1146359" source="BUGZILLA"/>
		<reference ref_id="959478" ref_url="https://bugzilla.suse.com/959478" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8675" ref_url="https://www.suse.com/security/cve/CVE-2019-8675/" source="CVE"/>
		<reference ref_id="CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006175.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2019-8675: Fixed a stack buffer overflow in libcups's asn1_get_type function(bsc#1146358). 
- CVE-2019-8696: Fixed a stack buffer overflow in libcups's asn1_get_packed function (bsc#1146359).	  
- Fixed a double free which was triggered by Java application (bsc#959478).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146358">SUSE bug 1146358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146359">SUSE bug 1146359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959478">SUSE bug 959478</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8675/">CVE-2019-8675 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8675">CVE-2019-8675 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8696">CVE-2019-8696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582221" comment="cups-1.3.9-8.46.56.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582222" comment="cups-client-1.3.9-8.46.56.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582223" comment="cups-libs-1.3.9-8.46.56.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582224" comment="cups-libs-32bit-1.3.9-8.46.56.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219859" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1168422" ref_url="https://bugzilla.suse.com/1168422" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3898" ref_url="https://www.suse.com/security/cve/CVE-2020-3898/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006729.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2020-3898: Fixed heap buffer overflow in libcups ppdFindOption() function (bsc#1168422).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-23"/>
	<updated date="2020-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168422">SUSE bug 1168422</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3898/">CVE-2020-3898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3898">CVE-2020-3898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582225" comment="cups-1.3.9-8.46.56.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582226" comment="cups-client-1.3.9-8.46.56.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582227" comment="cups-libs-1.3.9-8.46.56.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582228" comment="cups-libs-32bit-1.3.9-8.46.56.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219860" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1184161" ref_url="https://bugzilla.suse.com/1184161" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25317" ref_url="https://www.suse.com/security/cve/CVE-2021-25317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008714.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2021-25317: ownership of /var/log/cups could allow privilege escalation from lp user to root via symlink attacks (bsc#1184161)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184161">SUSE bug 1184161</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-25317/">CVE-2021-25317 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25317">CVE-2021-25317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582229" comment="cups-1.3.9-8.46.56.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582230" comment="cups-client-1.3.9-8.46.56.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582231" comment="cups-libs-1.3.9-8.46.56.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582232" comment="cups-libs-32bit-1.3.9-8.46.56.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219861" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="926511" ref_url="https://bugzilla.suse.com/926511" source="BUGZILLA"/>
		<reference ref_id="962983" ref_url="https://bugzilla.suse.com/962983" source="BUGZILLA"/>
		<reference ref_id="962996" ref_url="https://bugzilla.suse.com/962996" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001852.html" source="SUSE-SU"/>
		<description>

This update for curl fixes the following issues:

- CVE-2016-0755: libcurl would reuse NTLM-authenticated proxy connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer (bsc#962983)

The following non-security bugs were fixed:

- bsc#926511: Check for errors on the control connection during FTP transfers

The following tracked bugs only affect the test suite:

- bsc#962996: Expired cookie in test 46 caused test failures
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926511">SUSE bug 926511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962983">SUSE bug 962983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962996">SUSE bug 962996</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0755">CVE-2016-0755 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577528" comment="curl-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577529" comment="libcurl4-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577530" comment="libcurl4-32bit-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577531" comment="libcurl4-x86-7.19.7-1.46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577528" comment="curl-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577529" comment="libcurl4-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577530" comment="libcurl4-32bit-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577531" comment="libcurl4-x86-7.19.7-1.46.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219862" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="991389" ref_url="https://bugzilla.suse.com/991389" source="BUGZILLA"/>
		<reference ref_id="991390" ref_url="https://bugzilla.suse.com/991390" source="BUGZILLA"/>
		<reference ref_id="997420" ref_url="https://bugzilla.suse.com/997420" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5419" ref_url="https://www.suse.com/security/cve/CVE-2016-5419/" source="CVE"/>
		<reference ref_id="CVE-2016-5420" ref_url="https://www.suse.com/security/cve/CVE-2016-5420/" source="CVE"/>
		<reference ref_id="CVE-2016-7141" ref_url="https://www.suse.com/security/cve/CVE-2016-7141/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002306.html" source="SUSE-SU"/>
		<description>

This update for curl fixes the following issues:

- CVE-2016-5419: TLS session resumption client cert bypass (bsc#991389)
- CVE-2016-5420: Re-using connections with wrong client cert (bsc#991390)
- CVE-2016-7141: Fixed incorrect reuse of client certificates (bsc#997420).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-04"/>
	<updated date="2016-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/991389">SUSE bug 991389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991390">SUSE bug 991390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997420">SUSE bug 997420</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5419/">CVE-2016-5419 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5419">CVE-2016-5419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5420/">CVE-2016-5420 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5420">CVE-2016-5420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7141/">CVE-2016-7141 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7141">CVE-2016-7141 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582233" comment="curl-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582234" comment="libcurl4-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582235" comment="libcurl4-32bit-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582236" comment="libcurl4-x86-7.19.7-1.61.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582233" comment="curl-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582234" comment="libcurl4-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582235" comment="libcurl4-32bit-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582236" comment="libcurl4-x86-7.19.7-1.61.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219863" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1005633" ref_url="https://bugzilla.suse.com/1005633" source="BUGZILLA"/>
		<reference ref_id="1005634" ref_url="https://bugzilla.suse.com/1005634" source="BUGZILLA"/>
		<reference ref_id="1005635" ref_url="https://bugzilla.suse.com/1005635" source="BUGZILLA"/>
		<reference ref_id="1005637" ref_url="https://bugzilla.suse.com/1005637" source="BUGZILLA"/>
		<reference ref_id="1005638" ref_url="https://bugzilla.suse.com/1005638" source="BUGZILLA"/>
		<reference ref_id="1005642" ref_url="https://bugzilla.suse.com/1005642" source="BUGZILLA"/>
		<reference ref_id="1005645" ref_url="https://bugzilla.suse.com/1005645" source="BUGZILLA"/>
		<reference ref_id="1005646" ref_url="https://bugzilla.suse.com/1005646" source="BUGZILLA"/>
		<reference ref_id="998760" ref_url="https://bugzilla.suse.com/998760" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7167" ref_url="https://www.suse.com/security/cve/CVE-2016-7167/" source="CVE"/>
		<reference ref_id="CVE-2016-8615" ref_url="https://www.suse.com/security/cve/CVE-2016-8615/" source="CVE"/>
		<reference ref_id="CVE-2016-8616" ref_url="https://www.suse.com/security/cve/CVE-2016-8616/" source="CVE"/>
		<reference ref_id="CVE-2016-8617" ref_url="https://www.suse.com/security/cve/CVE-2016-8617/" source="CVE"/>
		<reference ref_id="CVE-2016-8618" ref_url="https://www.suse.com/security/cve/CVE-2016-8618/" source="CVE"/>
		<reference ref_id="CVE-2016-8619" ref_url="https://www.suse.com/security/cve/CVE-2016-8619/" source="CVE"/>
		<reference ref_id="CVE-2016-8620" ref_url="https://www.suse.com/security/cve/CVE-2016-8620/" source="CVE"/>
		<reference ref_id="CVE-2016-8621" ref_url="https://www.suse.com/security/cve/CVE-2016-8621/" source="CVE"/>
		<reference ref_id="CVE-2016-8622" ref_url="https://www.suse.com/security/cve/CVE-2016-8622/" source="CVE"/>
		<reference ref_id="CVE-2016-8623" ref_url="https://www.suse.com/security/cve/CVE-2016-8623/" source="CVE"/>
		<reference ref_id="CVE-2016-8624" ref_url="https://www.suse.com/security/cve/CVE-2016-8624/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002391.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following security issues:

- CVE-2016-8624: invalid URL parsing with '#' (bsc#1005646)
- CVE-2016-8623: Use-after-free via shared cookies (bsc#1005645)
- CVE-2016-8621: curl_getdate read out of bounds (bsc#1005642)
- CVE-2016-8619: double-free in krb5 code (bsc#1005638)
- CVE-2016-8618: double-free in curl_maprintf (bsc#1005637)
- CVE-2016-8617: OOB write via unchecked multiplication (bsc#1005635)
- CVE-2016-8616: case insensitive password comparison (bsc#1005634)
- CVE-2016-8615: cookie injection for other servers (bsc#1005633)
- CVE-2016-7167: escape and unescape integer overflows (bsc#998760)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-03"/>
	<updated date="2016-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005633">SUSE bug 1005633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005634">SUSE bug 1005634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005635">SUSE bug 1005635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005637">SUSE bug 1005637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005638">SUSE bug 1005638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005642">SUSE bug 1005642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005645">SUSE bug 1005645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005646">SUSE bug 1005646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998760">SUSE bug 998760</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7167/">CVE-2016-7167 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7167">CVE-2016-7167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8615/">CVE-2016-8615 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8615">CVE-2016-8615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8616/">CVE-2016-8616 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8616">CVE-2016-8616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8617/">CVE-2016-8617 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8617">CVE-2016-8617 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-8618/">CVE-2016-8618 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8618">CVE-2016-8618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8619/">CVE-2016-8619 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8619">CVE-2016-8619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8620/">CVE-2016-8620 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8620">CVE-2016-8620 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-8621/">CVE-2016-8621 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8621">CVE-2016-8621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8622/">CVE-2016-8622 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8622">CVE-2016-8622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8623/">CVE-2016-8623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8623">CVE-2016-8623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8624/">CVE-2016-8624 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8624">CVE-2016-8624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582237" comment="curl-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582238" comment="libcurl4-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582239" comment="libcurl4-32bit-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582240" comment="libcurl4-x86-7.19.7-1.64.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582237" comment="curl-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582238" comment="libcurl4-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582239" comment="libcurl4-32bit-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582240" comment="libcurl4-x86-7.19.7-1.64.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219864" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1015332" ref_url="https://bugzilla.suse.com/1015332" source="BUGZILLA"/>
		<reference ref_id="1032309" ref_url="https://bugzilla.suse.com/1032309" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586/" source="CVE"/>
		<reference ref_id="CVE-2017-7407" ref_url="https://www.suse.com/security/cve/CVE-2017-7407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002809.html" source="SUSE-SU"/>
		<description>

This update for curl fixes the following issues:

These security issues were fixed:

- CVE-2016-9586: libcurl printf floating point buffer overflow (bsc#1015332)
- CVE-2017-7407: The ourWriteOut function in tool_writeout.c in curl might have allowed physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which lead to a heap-based buffer over-read (bsc#1032309).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015332">SUSE bug 1015332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032309">SUSE bug 1032309</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9586">CVE-2016-9586 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7407/">CVE-2017-7407 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7407">CVE-2017-7407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582241" comment="curl-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582242" comment="libcurl4-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582243" comment="libcurl4-32bit-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582244" comment="libcurl4-x86-7.19.7-1.69.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582241" comment="curl-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582242" comment="libcurl4-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582243" comment="libcurl4-32bit-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582244" comment="libcurl4-x86-7.19.7-1.69.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219865" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1015332" ref_url="https://bugzilla.suse.com/1015332" source="BUGZILLA"/>
		<reference ref_id="1032309" ref_url="https://bugzilla.suse.com/1032309" source="BUGZILLA"/>
		<reference ref_id="1051644" ref_url="https://bugzilla.suse.com/1051644" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586/" source="CVE"/>
		<reference ref_id="CVE-2017-1000100" ref_url="https://www.suse.com/security/cve/CVE-2017-1000100/" source="CVE"/>
		<reference ref_id="CVE-2017-7407" ref_url="https://www.suse.com/security/cve/CVE-2017-7407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003173.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2017-1000100: TFP sends more than buffer size and it could lead to a denial of service (bsc#1051644)

- CVE-2017-7407: ourWriteOut function problem could lead to a heap buffer over-read (bsc#1032309)

- CVE-2016-9586: libcurl printf issue could lead to buffer overflow (bsc#1015332)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-31"/>
	<updated date="2017-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015332">SUSE bug 1015332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032309">SUSE bug 1032309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051644">SUSE bug 1051644</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9586">CVE-2016-9586 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000100/">CVE-2017-1000100 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000100">CVE-2017-1000100 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7407/">CVE-2017-7407 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7407">CVE-2017-7407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582245" comment="curl-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582246" comment="libcurl4-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582247" comment="libcurl4-32bit-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582248" comment="libcurl4-x86-7.19.7-1.70.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582245" comment="curl-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582246" comment="libcurl4-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582247" comment="libcurl4-32bit-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582248" comment="libcurl4-x86-7.19.7-1.70.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219866" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1061876" ref_url="https://bugzilla.suse.com/1061876" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000254" ref_url="https://www.suse.com/security/cve/CVE-2017-1000254/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003464.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following security issues:

- CVE-2017-1000254: FTP PWD response parser out of bounds read (bsc#1061876)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-01"/>
	<updated date="2017-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1061876">SUSE bug 1061876</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000254/">CVE-2017-1000254 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000254">CVE-2017-1000254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582249" comment="curl-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582250" comment="libcurl4-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582251" comment="libcurl4-32bit-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582252" comment="libcurl4-x86-7.19.7-1.70.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582249" comment="curl-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582250" comment="libcurl4-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582251" comment="libcurl4-32bit-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582252" comment="libcurl4-x86-7.19.7-1.70.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219867" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027712" ref_url="https://bugzilla.suse.com/1027712" source="BUGZILLA"/>
		<reference ref_id="1077001" ref_url="https://bugzilla.suse.com/1077001" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7141" ref_url="https://www.suse.com/security/cve/CVE-2016-7141/" source="CVE"/>
		<reference ref_id="CVE-2018-1000007" ref_url="https://www.suse.com/security/cve/CVE-2018-1000007/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003634.html" source="SUSE-SU"/>
		<description>
This update for curl several issues.

This security issue was fixed:

- CVE-2018-1000007: Prevent leaking authentication data to third parties when following redirects (bsc#1077001)

This non-security issue was fixed:

- Set DEFAULT_SUSE as the default cipher list (bsc#1027712]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027712">SUSE bug 1027712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077001">SUSE bug 1077001</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7141/">CVE-2016-7141 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7141">CVE-2016-7141 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000007/">CVE-2018-1000007 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000007">CVE-2018-1000007 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582253" comment="curl-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582254" comment="libcurl4-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582255" comment="libcurl4-32bit-7.19.7-1.70.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582253" comment="curl-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582254" comment="libcurl4-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582255" comment="libcurl4-32bit-7.19.7-1.70.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219868" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1081056" ref_url="https://bugzilla.suse.com/1081056" source="BUGZILLA"/>
		<reference ref_id="1083463" ref_url="https://bugzilla.suse.com/1083463" source="BUGZILLA"/>
		<reference ref_id="1084137" ref_url="https://bugzilla.suse.com/1084137" source="BUGZILLA"/>
		<reference ref_id="1084521" ref_url="https://bugzilla.suse.com/1084521" source="BUGZILLA"/>
		<reference ref_id="1084524" ref_url="https://bugzilla.suse.com/1084524" source="BUGZILLA"/>
		<reference ref_id="1084532" ref_url="https://bugzilla.suse.com/1084532" source="BUGZILLA"/>
		<reference ref_id="1085124" ref_url="https://bugzilla.suse.com/1085124" source="BUGZILLA"/>
		<reference ref_id="1086825" ref_url="https://bugzilla.suse.com/1086825" source="BUGZILLA"/>
		<reference ref_id="1087922" ref_url="https://bugzilla.suse.com/1087922" source="BUGZILLA"/>
		<reference ref_id="1090194" ref_url="https://bugzilla.suse.com/1090194" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000120" ref_url="https://www.suse.com/security/cve/CVE-2018-1000120/" source="CVE"/>
		<reference ref_id="CVE-2018-1000121" ref_url="https://www.suse.com/security/cve/CVE-2018-1000121/" source="CVE"/>
		<reference ref_id="CVE-2018-1000122" ref_url="https://www.suse.com/security/cve/CVE-2018-1000122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004059.html" source="SUSE-SU"/>
		<description>


This update for curl fixes the following issues:

curl was updated to version 7.37.0 (fate#325339 bsc#1084137)

This update syncs the curl version to the one in SUSE Linux Enterprise 12
and is full binary compatible to the previous version.

This update is done to allow other third party software like 'R' to 
be able to be used on the SUSE Linux Enterprise 11 codebase.

Following security issues were fixed:

- CVE-2018-1000120: A buffer overflow exists in the FTP URL handling that allowed an attacker to cause a denial of service or possible code execution (bsc#1084521).
- CVE-2018-1000121: A NULL pointer dereference exists in the LDAP code that allowed an attacker to cause a denial of service (bsc#1084524).
- CVE-2018-1000122: A buffer over-read exists in the RTSP+RTP handling code that allowed an attacker to cause a denial of service or information leakage (bsc#1084532).

The package also requires a libopenssl that implements the DEFAULT_SUSE cipher list
(bsc#1081056, bsc#1083463,bsc#1086825)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081056">SUSE bug 1081056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083463">SUSE bug 1083463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084137">SUSE bug 1084137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084521">SUSE bug 1084521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084524">SUSE bug 1084524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084532">SUSE bug 1084532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085124">SUSE bug 1085124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086825">SUSE bug 1086825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087922">SUSE bug 1087922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090194">SUSE bug 1090194</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000120/">CVE-2018-1000120 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000120">CVE-2018-1000120 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000121/">CVE-2018-1000121 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000121">CVE-2018-1000121 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000122/">CVE-2018-1000122 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000122">CVE-2018-1000122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582256" comment="curl-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582257" comment="libcurl4-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582258" comment="libcurl4-32bit-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582259" comment="libcurl4-x86-7.37.0-70.27.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582256" comment="curl-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582257" comment="libcurl4-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582258" comment="libcurl4-32bit-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582259" comment="libcurl4-x86-7.37.0-70.27.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219869" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1092098" ref_url="https://bugzilla.suse.com/1092098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000301" ref_url="https://www.suse.com/security/cve/CVE-2018-1000301/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004103.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-1000301: Fixed a buffer over-read caused by bad RTSP headers (bsc#1092098)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-30"/>
	<updated date="2018-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092098">SUSE bug 1092098</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000301/">CVE-2018-1000301 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000301">CVE-2018-1000301 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582260" comment="curl-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582261" comment="libcurl4-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582262" comment="libcurl4-32bit-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582263" comment="libcurl4-x86-7.37.0-70.30.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582260" comment="curl-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582261" comment="libcurl4-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582262" comment="libcurl4-32bit-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582263" comment="libcurl4-x86-7.37.0-70.30.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219870" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1106019" ref_url="https://bugzilla.suse.com/1106019" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14618" ref_url="https://www.suse.com/security/cve/CVE-2018-14618/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004563.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-14618: Prevent integer overflow in the NTLM authentication code
  (bsc#1106019).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-14"/>
	<updated date="2018-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106019">SUSE bug 1106019</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14618/">CVE-2018-14618 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14618">CVE-2018-14618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582264" comment="curl-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582265" comment="libcurl4-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582266" comment="libcurl4-32bit-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582267" comment="libcurl4-x86-7.37.0-70.33.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582264" comment="curl-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582265" comment="libcurl4-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582266" comment="libcurl4-32bit-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582267" comment="libcurl4-x86-7.37.0-70.33.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219871" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1112758" ref_url="https://bugzilla.suse.com/1112758" source="BUGZILLA"/>
		<reference ref_id="1113660" ref_url="https://bugzilla.suse.com/1113660" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16840" ref_url="https://www.suse.com/security/cve/CVE-2018-16840/" source="CVE"/>
		<reference ref_id="CVE-2018-16842" ref_url="https://www.suse.com/security/cve/CVE-2018-16842/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004839.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-16840: A use-after-free in SASL handle close was fixed (bsc#1112758)
- CVE-2018-16842: A Out-of-bounds Read in tool_msgs.c was fixed which could lead to crashes (bsc#1113660)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-08"/>
	<updated date="2018-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113660">SUSE bug 1113660</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16840/">CVE-2018-16840 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16840">CVE-2018-16840 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16842/">CVE-2018-16842 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16842">CVE-2018-16842 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582268" comment="curl-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582269" comment="libcurl4-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582270" comment="libcurl4-32bit-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582271" comment="libcurl4-x86-7.37.0-70.38.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582268" comment="curl-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582269" comment="libcurl4-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582270" comment="libcurl4-32bit-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582271" comment="libcurl4-x86-7.37.0-70.38.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219872" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1135170" ref_url="https://bugzilla.suse.com/1135170" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5436" ref_url="https://www.suse.com/security/cve/CVE-2019-5436/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005491.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5436: Fixed a heap buffer overflow exists in tftp_receive_packet that receives data from a TFTP server (bsc#1135170).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-24"/>
	<updated date="2019-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135170">SUSE bug 1135170</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5436/">CVE-2019-5436 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5436">CVE-2019-5436 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582272" comment="curl-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582273" comment="libcurl4-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582274" comment="libcurl4-32bit-7.37.0-70.41.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219873" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1149496" ref_url="https://bugzilla.suse.com/1149496" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005920.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5482: Fixed a TFTP small blocksize heap buffer overflow (bsc#1149496).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5482">CVE-2019-5482 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582275" comment="curl-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582276" comment="libcurl4-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582277" comment="libcurl4-32bit-7.37.0-70.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219874" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1173027" ref_url="https://bugzilla.suse.com/1173027" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007019.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2020-8177: Fixed an issue where curl could have been tricked by a malicious 
  server to overwrite a local file when using the -J option (bsc#1173027). 	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-24"/>
	<updated date="2020-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173027">SUSE bug 1173027</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8177">CVE-2020-8177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582278" comment="curl-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582279" comment="libcurl4-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582280" comment="libcurl4-32bit-7.37.0-70.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219875" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1186114" ref_url="https://bugzilla.suse.com/1186114" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22898" ref_url="https://www.suse.com/security/cve/CVE-2021-22898/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009106.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22898: Fixed curl TELNET stack contents disclosure (bsc#1186114).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-30"/>
	<updated date="2021-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186114">SUSE bug 1186114</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22898/">CVE-2021-22898 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22898">CVE-2021-22898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582281" comment="curl-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582282" comment="libcurl4-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582283" comment="libcurl4-32bit-7.37.0-70.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219876" version="1" class="patch">
	<metadata>
		<title>Security update for cvs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1053364" ref_url="https://bugzilla.suse.com/1053364" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12836" ref_url="https://www.suse.com/security/cve/CVE-2017-12836/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003198.html" source="SUSE-SU"/>
		<description>
This update for cvs fixes the following issues:

  - CVE-2017-12836: A leading dash in the argument of the '-d' option could lead to argument injection (bsc#1053364)

  		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-12"/>
	<updated date="2017-09-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1053364">SUSE bug 1053364</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12836/">CVE-2017-12836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12836">CVE-2017-12836 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582284" comment="cvs-1.12.12-144.23.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582285" comment="cvs-doc-1.12.12-144.23.5.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582284" comment="cvs-1.12.12-144.23.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582285" comment="cvs-doc-1.12.12-144.23.5.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219877" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-imapd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="860611" ref_url="https://bugzilla.suse.com/860611" source="BUGZILLA"/>
		<reference ref_id="901748" ref_url="https://bugzilla.suse.com/901748" source="BUGZILLA"/>
		<reference ref_id="954200" ref_url="https://bugzilla.suse.com/954200" source="BUGZILLA"/>
		<reference ref_id="954201" ref_url="https://bugzilla.suse.com/954201" source="BUGZILLA"/>
		<reference ref_id="981670" ref_url="https://bugzilla.suse.com/981670" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2015-8076" ref_url="https://www.suse.com/security/cve/CVE-2015-8076/" source="CVE"/>
		<reference ref_id="CVE-2015-8077" ref_url="https://www.suse.com/security/cve/CVE-2015-8077/" source="CVE"/>
		<reference ref_id="CVE-2015-8078" ref_url="https://www.suse.com/security/cve/CVE-2015-8078/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002087.html" source="SUSE-SU"/>
		<description>

This update for cyrus-imapd fixes the following issues:

- Previous versions of cyrus-imapd would not allow its users to disable old SSL
  variants that are vulnerable to attacks like BEAST and POODLE. This patch
  adds the configuration option 'tls_versions' to remedy that issue. Note that
  users who upgrade an existing installation will *not* have their imapd.conf
  file overwritten, i.e. their IMAP server will continue to support SSLv2 and
  SSLv3 like before. To disable support for those protocols, edit imapd.conf
  manually to include 'tls_versions: tls1_0 tls1_1 tls1_2'. New installations,
  however, will have an imapd.conf file that contains these settings already,
  i.e. newly installed IMAP servers do *not* support unsafe versions of SSL
  unless that support is explicitly enabled by the user. (bsc#901748)

- An integer overflow vulnerability in cyrus-imapd's urlfetch range checking
  code was fixed. (CVE-2015-8076, CVE-2015-8077, CVE-2015-8078, bsc#981670,
  bsc#954200, bsc#954201)

- Support for Elliptic Curve Diffie–Hellman (ECDH) has been added to
  cyrus-imapd. (bsc#860611)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-01"/>
	<updated date="2016-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/860611">SUSE bug 860611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901748">SUSE bug 901748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954200">SUSE bug 954200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954201">SUSE bug 954201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981670">SUSE bug 981670</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8076/">CVE-2015-8076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8076">CVE-2015-8076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8077/">CVE-2015-8077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8077">CVE-2015-8077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8078/">CVE-2015-8078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8078">CVE-2015-8078 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582286" comment="cyrus-imapd-2.3.11-60.65.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582287" comment="perl-Cyrus-IMAP-2.3.11-60.65.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582288" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.67.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582286" comment="cyrus-imapd-2.3.11-60.65.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582287" comment="perl-Cyrus-IMAP-2.3.11-60.65.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582288" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.67.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219878" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1159635" ref_url="https://bugzilla.suse.com/1159635" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19906" ref_url="https://www.suse.com/security/cve/CVE-2019-19906/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008085.html" source="SUSE-SU"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2019-19906: Fixed an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet (bsc#1159635).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-17"/>
	<updated date="2020-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159635">SUSE bug 1159635</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19906/">CVE-2019-19906 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19906">CVE-2019-19906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582289" comment="cyrus-sasl-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582290" comment="cyrus-sasl-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582291" comment="cyrus-sasl-crammd5-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582292" comment="cyrus-sasl-crammd5-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582293" comment="cyrus-sasl-digestmd5-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582294" comment="cyrus-sasl-digestmd5-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582295" comment="cyrus-sasl-gssapi-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582296" comment="cyrus-sasl-gssapi-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582297" comment="cyrus-sasl-otp-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582298" comment="cyrus-sasl-otp-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582299" comment="cyrus-sasl-plain-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582300" comment="cyrus-sasl-plain-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582301" comment="cyrus-sasl-saslauthd-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582302" comment="cyrus-sasl-sqlauxprop-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582303" comment="cyrus-sasl-sqlauxprop-32bit-2.1.22-182.26.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219879" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1196036" ref_url="https://bugzilla.suse.com/1196036" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010287.html" source="SUSE-SU"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2022-24407: Fixed SQL injection in sql_auxprop_store in plugins/sql.c (bsc#1196036).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-23"/>
	<updated date="2022-02-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196036">SUSE bug 1196036</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24407">CVE-2022-24407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669501" comment="cyrus-sasl-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669502" comment="cyrus-sasl-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669503" comment="cyrus-sasl-crammd5-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669504" comment="cyrus-sasl-crammd5-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669505" comment="cyrus-sasl-digestmd5-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669506" comment="cyrus-sasl-digestmd5-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669507" comment="cyrus-sasl-gssapi-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669508" comment="cyrus-sasl-gssapi-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669509" comment="cyrus-sasl-otp-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669510" comment="cyrus-sasl-otp-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669511" comment="cyrus-sasl-plain-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669512" comment="cyrus-sasl-plain-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669513" comment="cyrus-sasl-saslauthd-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669514" comment="cyrus-sasl-sqlauxprop-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669515" comment="cyrus-sasl-sqlauxprop-32bit-2.1.22-182.26.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219880" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1137832" ref_url="https://bugzilla.suse.com/1137832" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005645.html" source="SUSE-SU"/>
		<description>
This update for dbus-1 fixes the following issues:

Security issue fixed: 	  

- CVE-2019-12749: Fixed an implementation flaw in DBUS_COOKIE_SHA1 which
  could have allowed local attackers to bypass authentication (bsc#1137832).

		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-02"/>
	<updated date="2019-07-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137832">SUSE bug 1137832</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12749">CVE-2019-12749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582304" comment="dbus-1-1.2.10-3.34.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582305" comment="dbus-1-32bit-1.2.10-3.34.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582306" comment="dbus-1-x11-1.2.10-3.34.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219881" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="880984" ref_url="https://bugzilla.suse.com/880984" source="BUGZILLA"/>
		<reference ref_id="919959" ref_url="https://bugzilla.suse.com/919959" source="BUGZILLA"/>
		<reference ref_id="926159" ref_url="https://bugzilla.suse.com/926159" source="BUGZILLA"/>
		<reference ref_id="928390" ref_url="https://bugzilla.suse.com/928390" source="BUGZILLA"/>
		<reference ref_id="936923" ref_url="https://bugzilla.suse.com/936923" source="BUGZILLA"/>
		<reference ref_id="947780" ref_url="https://bugzilla.suse.com/947780" source="BUGZILLA"/>
		<reference ref_id="961305" ref_url="https://bugzilla.suse.com/961305" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8605" ref_url="https://www.suse.com/security/cve/CVE-2015-8605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001886.html" source="SUSE-SU"/>
		<description>

This update for dhcp fixes the following issues:

- CVE-2015-8605: A remote attacker could have used badly formed packets with an invalid IPv4 UDP length field to cause a DHCP server, client, or relay program to terminate abnormally (bsc#961305)

The following bugs were fixed:

- bsc#936923: Improper lease duration checking
- bsc#880984: Integer overflows in the date and time handling code
- bsc#947780: DHCP server could abort with 'Unable to set up timer: out of range' on very long or infinite timer intervals / lease lifetimes 
- bsc#926159: DHCP preferrend and valid lifetime would be logged incorrectly
- bsc#928390: dhclient dit not expose next-server DHCPv4 option to script
- bsc#926159: DHCP preferrend and valid lifetime would be logged incorrectly
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/880984">SUSE bug 880984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919959">SUSE bug 919959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926159">SUSE bug 926159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928390">SUSE bug 928390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936923">SUSE bug 936923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947780">SUSE bug 947780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961305">SUSE bug 961305</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8605/">CVE-2015-8605 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8605">CVE-2015-8605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577570" comment="dhcp-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577571" comment="dhcp-client-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577572" comment="dhcp-relay-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577573" comment="dhcp-server-4.2.4.P2-0.24.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577570" comment="dhcp-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577571" comment="dhcp-client-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577572" comment="dhcp-relay-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577573" comment="dhcp-server-4.2.4.P2-0.24.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219882" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="969820" ref_url="https://bugzilla.suse.com/969820" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2774" ref_url="https://www.suse.com/security/cve/CVE-2016-2774/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002204.html" source="SUSE-SU"/>
		<description>

This update for dhcp fixes the following issues:

- CVE-2016-2774: Fixed a denial of service attack against the DHCP server over the OMAPI TCP socket, which could be used
  by network adjacent attackers to make the DHCP server non-functional (bsc#969820).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-10"/>
	<updated date="2016-08-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/969820">SUSE bug 969820</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2774/">CVE-2016-2774 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2774">CVE-2016-2774 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582307" comment="dhcp-4.2.4.P2-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582308" comment="dhcp-client-4.2.4.P2-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582309" comment="dhcp-relay-4.2.4.P2-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582310" comment="dhcp-server-4.2.4.P2-0.27.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582307" comment="dhcp-4.2.4.P2-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582308" comment="dhcp-client-4.2.4.P2-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582309" comment="dhcp-relay-4.2.4.P2-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582310" comment="dhcp-server-4.2.4.P2-0.27.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219883" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1023415" ref_url="https://bugzilla.suse.com/1023415" source="BUGZILLA"/>
		<reference ref_id="1076119" ref_url="https://bugzilla.suse.com/1076119" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3144" ref_url="https://www.suse.com/security/cve/CVE-2017-3144/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003731.html" source="SUSE-SU"/>
		<description>
This update for dhcp fixes several issues.
 
This security issue was fixed:

- CVE-2017-3144: OMAPI code didn't free socket descriptors when empty message
  is received allowing DoS (bsc#1076119)

This non-security issue was fixed:

- Enhance dhclient-script to handle static route updates. (bsc#1023415)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-14"/>
	<updated date="2018-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023415">SUSE bug 1023415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076119">SUSE bug 1076119</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3144/">CVE-2017-3144 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3144">CVE-2017-3144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582311" comment="dhcp-4.2.4.P2-0.28.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582312" comment="dhcp-client-4.2.4.P2-0.28.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582313" comment="dhcp-relay-4.2.4.P2-0.28.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582314" comment="dhcp-server-4.2.4.P2-0.28.5.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582311" comment="dhcp-4.2.4.P2-0.28.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582312" comment="dhcp-client-4.2.4.P2-0.28.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582313" comment="dhcp-relay-4.2.4.P2-0.28.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582314" comment="dhcp-server-4.2.4.P2-0.28.5.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219884" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1083302" ref_url="https://bugzilla.suse.com/1083302" source="BUGZILLA"/>
		<reference ref_id="1083303" ref_url="https://bugzilla.suse.com/1083303" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5732" ref_url="https://www.suse.com/security/cve/CVE-2018-5732/" source="CVE"/>
		<reference ref_id="CVE-2018-5733" ref_url="https://www.suse.com/security/cve/CVE-2018-5733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003841.html" source="SUSE-SU"/>
		<description>
This update for dhcp fixes the following issues:

Security issues fixed:

- CVE-2018-5733: reference count overflow in dhcpd (bsc#1083303).
- CVE-2018-5732: buffer overflow in dhclient (bsc#1083302).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-26"/>
	<updated date="2018-03-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083302">SUSE bug 1083302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083303">SUSE bug 1083303</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5732/">CVE-2018-5732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5732">CVE-2018-5732 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5733/">CVE-2018-5733 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5733">CVE-2018-5733 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582315" comment="dhcp-4.2.4.P2-0.28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582316" comment="dhcp-client-4.2.4.P2-0.28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582317" comment="dhcp-relay-4.2.4.P2-0.28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582318" comment="dhcp-server-4.2.4.P2-0.28.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582315" comment="dhcp-4.2.4.P2-0.28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582316" comment="dhcp-client-4.2.4.P2-0.28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582317" comment="dhcp-relay-4.2.4.P2-0.28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582318" comment="dhcp-server-4.2.4.P2-0.28.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219885" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1186382" ref_url="https://bugzilla.suse.com/1186382" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25217" ref_url="https://www.suse.com/security/cve/CVE-2021-25217/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008905.html" source="SUSE-SU"/>
		<description>
This update for dhcp fixes the following issues:

- CVE-2021-25217: A buffer overrun in lease file parsing code can be used to exploit a common vulnerability shared by dhcpd and dhclient (bsc#1186382)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-01"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186382">SUSE bug 1186382</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25217/">CVE-2021-25217 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25217">CVE-2021-25217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582319" comment="dhcp-4.2.4.P2-0.28.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582320" comment="dhcp-client-4.2.4.P2-0.28.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582321" comment="dhcp-relay-4.2.4.P2-0.28.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582322" comment="dhcp-server-4.2.4.P2-0.28.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219886" version="1" class="patch">
	<metadata>
		<title>Security update for dhcpcd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="955762" ref_url="https://bugzilla.suse.com/955762" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6698" ref_url="https://www.suse.com/security/cve/CVE-2012-6698/" source="CVE"/>
		<reference ref_id="CVE-2012-6699" ref_url="https://www.suse.com/security/cve/CVE-2012-6699/" source="CVE"/>
		<reference ref_id="CVE-2012-6700" ref_url="https://www.suse.com/security/cve/CVE-2012-6700/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001711.html" source="SUSE-SU"/>
		<description>
dhcpcd was updated to fix three security issues.

These security issues were fixed:
- CVE-2012-6698: A potential out of bounds write was fixed, which could lead to memory corruption, triggerable by network local attackers.
- CVE-2012-6699: A loop error was fixed that could lead out of bound reads, triggerable by network local attackers.
- CVE-2012-6700: An incorrect free could lead to crashes, triggerable by network local attackers.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/955762">SUSE bug 955762</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6698/">CVE-2012-6698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6698">CVE-2012-6698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6699/">CVE-2012-6699 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6699">CVE-2012-6699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6700/">CVE-2012-6700 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6700">CVE-2012-6700 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577590" comment="dhcpcd-3.2.3-45.5.3 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577590" comment="dhcpcd-3.2.3-45.5.3 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219887" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1185900" ref_url="https://bugzilla.suse.com/1185900" source="BUGZILLA"/>
		<reference ref_id="1185904" ref_url="https://bugzilla.suse.com/1185904" source="BUGZILLA"/>
		<reference ref_id="1185905" ref_url="https://bugzilla.suse.com/1185905" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32491" ref_url="https://www.suse.com/security/cve/CVE-2021-32491/" source="CVE"/>
		<reference ref_id="CVE-2021-32492" ref_url="https://www.suse.com/security/cve/CVE-2021-32492/" source="CVE"/>
		<reference ref_id="CVE-2021-32493" ref_url="https://www.suse.com/security/cve/CVE-2021-32493/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008785.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

Security issues fixed:

- CVE-2021-32491 [bsc#1185900]: Integer overflow in function render() in tools/ddjvu via crafted djvu file
- CVE-2021-32492 [bsc#1185904]: Out of bounds read in function DJVU:DataPool:has_data() via crafted djvu file
- CVE-2021-32493 [bsc#1185905]: Heap buffer overflow in function DJVU:GBitmap:decode() via crafted djvu file
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185900">SUSE bug 1185900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185904">SUSE bug 1185904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185905">SUSE bug 1185905</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32491/">CVE-2021-32491 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32491">CVE-2021-32491 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32492/">CVE-2021-32492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32492">CVE-2021-32492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32493/">CVE-2021-32493 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32493">CVE-2021-32493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582323" comment="libdjvulibre21-3.5.21-3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219888" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1186253" ref_url="https://bugzilla.suse.com/1186253" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3500" ref_url="https://www.suse.com/security/cve/CVE-2021-3500/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008890.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3500: Stack overflow in function DJVU:DjVuDocument:get_djvu_file() via crafted djvu file (bsc#1186253)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-31"/>
	<updated date="2021-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186253">SUSE bug 1186253</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3500/">CVE-2021-3500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3500">CVE-2021-3500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582324" comment="libdjvulibre21-3.5.21-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219889" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1187869" ref_url="https://bugzilla.suse.com/1187869" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3630" ref_url="https://www.suse.com/security/cve/CVE-2021-3630/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009112.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3630: out-of-bounds write in DJVU:DjVuTXT:decode() in DjVuText.cpp (bsc#1187869)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-02"/>
	<updated date="2021-07-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187869">SUSE bug 1187869</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3630/">CVE-2021-3630 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3630">CVE-2021-3630 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624089" comment="libdjvulibre21-3.5.21-3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219890" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1187869" ref_url="https://bugzilla.suse.com/1187869" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3630" ref_url="https://www.suse.com/security/cve/CVE-2021-3630/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009248.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

- Extend CVE-2021-3630 fix (bsc#1187869).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-04"/>
	<updated date="2021-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187869">SUSE bug 1187869</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3630/">CVE-2021-3630 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3630">CVE-2021-3630 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627840" comment="libdjvulibre21-3.5.21-3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219891" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="983273" ref_url="https://bugzilla.suse.com/983273" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8899" ref_url="https://www.suse.com/security/cve/CVE-2015-8899/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002500.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2015-8899: Denial of service between local and remote dns entries (bsc#983273)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-20"/>
	<updated date="2016-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/983273">SUSE bug 983273</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8899/">CVE-2015-8899 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8899">CVE-2015-8899 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582325" comment="dnsmasq-2.71-0.16.3 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582325" comment="dnsmasq-2.71-0.16.3 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219892" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1060354" ref_url="https://bugzilla.suse.com/1060354" source="BUGZILLA"/>
		<reference ref_id="1060355" ref_url="https://bugzilla.suse.com/1060355" source="BUGZILLA"/>
		<reference ref_id="1060360" ref_url="https://bugzilla.suse.com/1060360" source="BUGZILLA"/>
		<reference ref_id="1060361" ref_url="https://bugzilla.suse.com/1060361" source="BUGZILLA"/>
		<reference ref_id="1060362" ref_url="https://bugzilla.suse.com/1060362" source="BUGZILLA"/>
		<reference ref_id="1060364" ref_url="https://bugzilla.suse.com/1060364" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3294" ref_url="https://www.suse.com/security/cve/CVE-2015-3294/" source="CVE"/>
		<reference ref_id="CVE-2015-8899" ref_url="https://www.suse.com/security/cve/CVE-2015-8899/" source="CVE"/>
		<reference ref_id="CVE-2017-14491" ref_url="https://www.suse.com/security/cve/CVE-2017-14491/" source="CVE"/>
		<reference ref_id="CVE-2017-14492" ref_url="https://www.suse.com/security/cve/CVE-2017-14492/" source="CVE"/>
		<reference ref_id="CVE-2017-14493" ref_url="https://www.suse.com/security/cve/CVE-2017-14493/" source="CVE"/>
		<reference ref_id="CVE-2017-14494" ref_url="https://www.suse.com/security/cve/CVE-2017-14494/" source="CVE"/>
		<reference ref_id="CVE-2017-14495" ref_url="https://www.suse.com/security/cve/CVE-2017-14495/" source="CVE"/>
		<reference ref_id="CVE-2017-14496" ref_url="https://www.suse.com/security/cve/CVE-2017-14496/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003271.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following security issues:

- CVE-2017-14491: 2 byte heap based overflow. [bsc#1060354]
- CVE-2017-14492: heap based overflow. [bsc#1060355]
- CVE-2017-14493: stack based overflow. [bsc#1060360]
- CVE-2017-14494: DHCP - info leak. [bsc#1060361]
- CVE-2017-14495: DNS - OOM DoS. [bsc#1060362]
- CVE-2017-14496: DNS - DoS Integer underflow. [bsc#1060364]

This update brings a (small) potential incompatibility in the handling of
'basename' in --pxe-service. Please read the CHANGELOG and the documentation if
you are using this option.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-02"/>
	<updated date="2017-10-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060354">SUSE bug 1060354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060355">SUSE bug 1060355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3294/">CVE-2015-3294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3294">CVE-2015-3294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8899/">CVE-2015-8899 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8899">CVE-2015-8899 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14491/">CVE-2017-14491 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14491">CVE-2017-14491 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14492/">CVE-2017-14492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14492">CVE-2017-14492 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14493/">CVE-2017-14493 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14493">CVE-2017-14493 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14494/">CVE-2017-14494 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14494">CVE-2017-14494 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14495/">CVE-2017-14495 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14495">CVE-2017-14495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14496/">CVE-2017-14496 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14496">CVE-2017-14496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582326" comment="dnsmasq-2.78-0.17.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582326" comment="dnsmasq-2.78-0.17.5.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219893" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1076958" ref_url="https://bugzilla.suse.com/1076958" source="BUGZILLA"/>
		<reference ref_id="1138743" ref_url="https://bugzilla.suse.com/1138743" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15107" ref_url="https://www.suse.com/security/cve/CVE-2017-15107/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005998.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

Security issue fixed:

- CVE-2017-15107: Fixed a vulnerability in DNSSEC implementation. Processing of
  wildcard synthesized NSEC records may result improper validation for non-existance. (bsc#1076958)

Non-security issue fixed:

- Removed cache size limit. (bsc#1138743)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076958">SUSE bug 1076958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138743">SUSE bug 1138743</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15107/">CVE-2017-15107 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15107">CVE-2017-15107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582327" comment="dnsmasq-2.78-0.17.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219894" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1154849" ref_url="https://bugzilla.suse.com/1154849" source="BUGZILLA"/>
		<reference ref_id="1176076" ref_url="https://bugzilla.suse.com/1176076" source="BUGZILLA"/>
		<reference ref_id="1177077" ref_url="https://bugzilla.suse.com/1177077" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14834" ref_url="https://www.suse.com/security/cve/CVE-2019-14834/" source="CVE"/>
		<reference ref_id="CVE-2020-25681" ref_url="https://www.suse.com/security/cve/CVE-2020-25681/" source="CVE"/>
		<reference ref_id="CVE-2020-25682" ref_url="https://www.suse.com/security/cve/CVE-2020-25682/" source="CVE"/>
		<reference ref_id="CVE-2020-25683" ref_url="https://www.suse.com/security/cve/CVE-2020-25683/" source="CVE"/>
		<reference ref_id="CVE-2020-25684" ref_url="https://www.suse.com/security/cve/CVE-2020-25684/" source="CVE"/>
		<reference ref_id="CVE-2020-25685" ref_url="https://www.suse.com/security/cve/CVE-2020-25685/" source="CVE"/>
		<reference ref_id="CVE-2020-25686" ref_url="https://www.suse.com/security/cve/CVE-2020-25686/" source="CVE"/>
		<reference ref_id="CVE-2020-25687" ref_url="https://www.suse.com/security/cve/CVE-2020-25687/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2019-14834: Fixed a memory leak which could have allowed to remote attackers 
  to cause denial of service via DHCP response creation (bsc#1154849)
- bsc#1177077: Fixed DNSpooq vulnerabilities
- CVE-2020-25684, CVE-2020-25685, CVE-2020-25686:
  Fixed multiple Cache poisoning attacks.
- CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687:
  Fixed multiple potential Heap-based overflows when DNSSEC is
  enabled.
- Retry query to other servers on receipt of SERVFAIL rcode
  (bsc#1176076)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-19"/>
	<updated date="2021-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154849">SUSE bug 1154849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176076">SUSE bug 1176076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14834/">CVE-2019-14834 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14834">CVE-2019-14834 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25681/">CVE-2020-25681 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25681">CVE-2020-25681 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25682/">CVE-2020-25682 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25682">CVE-2020-25682 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25683/">CVE-2020-25683 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25683">CVE-2020-25683 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25684/">CVE-2020-25684 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25684">CVE-2020-25684 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25685/">CVE-2020-25685 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25685">CVE-2020-25685 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25686/">CVE-2020-25686 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25686">CVE-2020-25686 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25687/">CVE-2020-25687 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25687">CVE-2020-25687 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582328" comment="dnsmasq-2.78-0.17.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219895" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1183709" ref_url="https://bugzilla.suse.com/1183709" source="BUGZILLA"/>
		<reference ref_id="1197872" ref_url="https://bugzilla.suse.com/1197872" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3448" ref_url="https://www.suse.com/security/cve/CVE-2021-3448/" source="CVE"/>
		<reference ref_id="CVE-2022-0934" ref_url="https://www.suse.com/security/cve/CVE-2022-0934/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010787.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2021-3448: Fixed a potential DNS cache poisoning issue due to a constant
  outgoing port being used when for certain use cases of the --server option
  (bsc#1183709).
- CVE-2022-0934: Fixed an invalid memory access that could lead to remote denial
  of service via crafted packet (bsc#1197872).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183709">SUSE bug 1183709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197872">SUSE bug 1197872</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3448/">CVE-2021-3448 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3448">CVE-2021-3448 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0934/">CVE-2022-0934 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0934">CVE-2022-0934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679570" comment="dnsmasq-2.78-0.17.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219896" version="1" class="patch">
	<metadata>
		<title>Security update for dosfstools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="980364" ref_url="https://bugzilla.suse.com/980364" source="BUGZILLA"/>
		<reference ref_id="980377" ref_url="https://bugzilla.suse.com/980377" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8872" ref_url="https://www.suse.com/security/cve/CVE-2015-8872/" source="CVE"/>
		<reference ref_id="CVE-2016-4804" ref_url="https://www.suse.com/security/cve/CVE-2016-4804/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002225.html" source="SUSE-SU"/>
		<description>
dosfstools was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-8872: The set_fat function in fat.c in dosfstools might have allowed attackers to corrupt a FAT12 filesystem or cause a denial of service (invalid memory read and crash) by writing an odd number of clusters to the third to last entry on a FAT12 filesystem, which triggers an 'off-by-two error (bsc#980364).
- CVE-2016-4804: The read_boot function in boot.c in dosfstools allowed attackers to cause a denial of service (crash) via a crafted filesystem, which triggers a heap-based buffer overflow in the (1) read_fat function or an out-of-bounds heap read in (2) get_fat function (bsc#980377).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-24"/>
	<updated date="2016-08-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/980364">SUSE bug 980364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980377">SUSE bug 980377</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8872/">CVE-2015-8872 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8872">CVE-2015-8872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4804/">CVE-2016-4804 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4804">CVE-2016-4804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582329" comment="dosfstools-3.0.26-3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582329" comment="dosfstools-3.0.26-3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219897" version="1" class="patch">
	<metadata>
		<title>Security update for ecryptfs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="920160" ref_url="https://bugzilla.suse.com/920160" source="BUGZILLA"/>
		<reference ref_id="962052" ref_url="https://bugzilla.suse.com/962052" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9687" ref_url="https://www.suse.com/security/cve/CVE-2014-9687/" source="CVE"/>
		<reference ref_id="CVE-2016-1572" ref_url="https://www.suse.com/security/cve/CVE-2016-1572/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001837.html" source="SUSE-SU"/>
		<description>

This update for ecryptfs-utils fixes the following issues:

- CVE-2016-1572: A local user could have escalated privileges by mounting over special filesystems (bsc#962052)
- CVE-2014-9687: A default salt value reduced complexity of offline precomputation attacks (bsc#920160)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-30"/>
	<updated date="2016-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/920160">SUSE bug 920160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962052">SUSE bug 962052</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9687/">CVE-2014-9687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9687">CVE-2014-9687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1572/">CVE-2016-1572 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1572">CVE-2016-1572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577613" comment="ecryptfs-utils-61-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577614" comment="ecryptfs-utils-32bit-61-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577615" comment="ecryptfs-utils-x86-61-1.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577613" comment="ecryptfs-utils-61-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577614" comment="ecryptfs-utils-32bit-61-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577615" comment="ecryptfs-utils-x86-61-1.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219898" version="1" class="patch">
	<metadata>
		<title>Security update for ed (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1019807" ref_url="https://bugzilla.suse.com/1019807" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5357" ref_url="https://www.suse.com/security/cve/CVE-2017-5357/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005279.html" source="SUSE-SU"/>
		<description>

This update for ed fixes the following security issues:

- CVE-2017-5357: An invalid free in the regular expression handling
  of the 'ed' command processing could allow local users to crash ed. (bsc#1019807)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1019807">SUSE bug 1019807</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5357/">CVE-2017-5357 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5357">CVE-2017-5357 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582330" comment="ed-0.2-1001.30.3.4 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582330" comment="ed-0.2-1001.30.3.4 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219899" version="1" class="patch">
	<metadata>
		<title>Security update for emacs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1058425" ref_url="https://bugzilla.suse.com/1058425" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14482" ref_url="https://www.suse.com/security/cve/CVE-2017-14482/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003251.html" source="SUSE-SU"/>
		<description>
This update for emacs fixes one issues.

This security issue was fixed:

- CVE-2017-14482: Remote code execution via mails with 'Content-Type: text/enriched' (bsc#1058425)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-20"/>
	<updated date="2017-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1058425">SUSE bug 1058425</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14482/">CVE-2017-14482 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14482">CVE-2017-14482 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582331" comment="emacs-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582332" comment="emacs-el-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582333" comment="emacs-info-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582334" comment="emacs-nox-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582335" comment="emacs-x11-22.3-42.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582331" comment="emacs-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582332" comment="emacs-el-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582333" comment="emacs-info-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582334" comment="emacs-nox-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582335" comment="emacs-x11-22.3-42.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219900" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1070046" ref_url="https://bugzilla.suse.com/1070046" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000159" ref_url="https://www.suse.com/security/cve/CVE-2017-1000159/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003796.html" source="SUSE-SU"/>
		<description>
This update for evince provides the following fix:

- CVE-2017-1000159: Prevent command line injections via filenames when printing to a file. (bsc#1070046)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-08"/>
	<updated date="2018-03-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1070046">SUSE bug 1070046</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000159/">CVE-2017-1000159 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000159">CVE-2017-1000159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582336" comment="evince-2.28.2-0.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582337" comment="evince-doc-2.28.2-0.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582338" comment="evince-lang-2.28.2-0.7.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582336" comment="evince-2.28.2-0.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582337" comment="evince-doc-2.28.2-0.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582338" comment="evince-lang-2.28.2-0.7.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219901" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1133037" ref_url="https://bugzilla.suse.com/1133037" source="BUGZILLA"/>
		<reference ref_id="1141619" ref_url="https://bugzilla.suse.com/1141619" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010006" ref_url="https://www.suse.com/security/cve/CVE-2019-1010006/" source="CVE"/>
		<reference ref_id="CVE-2019-11459" ref_url="https://www.suse.com/security/cve/CVE-2019-11459/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005796.html" source="SUSE-SU"/>
		<description>
This update for evince fixes the following issues:

Security issues fixed: 	  

- CVE-2019-11459: Fixed an improper error handling in which could have led to use of uninitialized use of memory (bsc#1133037).	  
- CVE-2019-1010006: Fixed a buffer overflow in backend/tiff/tiff-document.c (bsc#1141619).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-07"/>
	<updated date="2019-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133037">SUSE bug 1133037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141619">SUSE bug 1141619</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010006/">CVE-2019-1010006 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010006">CVE-2019-1010006 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11459/">CVE-2019-11459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11459">CVE-2019-11459 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582339" comment="evince-2.28.2-0.7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582340" comment="evince-doc-2.28.2-0.7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582341" comment="evince-lang-2.28.2-0.7.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219902" version="1" class="patch">
	<metadata>
		<title>Security update for exempi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1085295" ref_url="https://bugzilla.suse.com/1085295" source="BUGZILLA"/>
		<reference ref_id="1085585" ref_url="https://bugzilla.suse.com/1085585" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18234" ref_url="https://www.suse.com/security/cve/CVE-2017-18234/" source="CVE"/>
		<reference ref_id="CVE-2018-7730" ref_url="https://www.suse.com/security/cve/CVE-2018-7730/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004313.html" source="SUSE-SU"/>
		<description>
This update for exempi fixes the following issues:

Security issue fixed:

- CVE-2018-7730: Fix heap-based buffer overflow in XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp (bsc#1085295).
- CVE-2017-18234: Fix use-after-free issue that allows remote attackers to cause a denial of service via a .pdf file (bsc#1085585).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-26"/>
	<updated date="2018-07-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085295">SUSE bug 1085295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18234/">CVE-2017-18234 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18234">CVE-2017-18234 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7730/">CVE-2018-7730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7730">CVE-2018-7730 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582342" comment="libexempi3-2.0.2-4.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582342" comment="libexempi3-2.0.2-4.5.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219903" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="979441" ref_url="https://bugzilla.suse.com/979441" source="BUGZILLA"/>
		<reference ref_id="980391" ref_url="https://bugzilla.suse.com/980391" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1283" ref_url="https://www.suse.com/security/cve/CVE-2015-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002101.html" source="SUSE-SU"/>
		<description>

This update for expat fixes the following issues: 

Security issue fixed:
- CVE-2016-0718: Fix Expat XML parser that mishandles certain kinds of malformed input documents. (bsc#979441)
- CVE-2015-1283: Fix multiple integer overflows. (bnc#980391)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-07"/>
	<updated date="2016-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979441">SUSE bug 979441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980391">SUSE bug 980391</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1283/">CVE-2015-1283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1283">CVE-2015-1283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0718">CVE-2016-0718 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582343" comment="expat-2.0.1-88.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582344" comment="libexpat1-2.0.1-88.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582345" comment="libexpat1-32bit-2.0.1-88.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582346" comment="libexpat1-x86-2.0.1-88.38.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582343" comment="expat-2.0.1-88.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582344" comment="libexpat1-2.0.1-88.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582345" comment="libexpat1-32bit-2.0.1-88.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582346" comment="libexpat1-x86-2.0.1-88.38.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219904" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1022037" ref_url="https://bugzilla.suse.com/1022037" source="BUGZILLA"/>
		<reference ref_id="983215" ref_url="https://bugzilla.suse.com/983215" source="BUGZILLA"/>
		<reference ref_id="983216" ref_url="https://bugzilla.suse.com/983216" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6702" ref_url="https://www.suse.com/security/cve/CVE-2012-6702/" source="CVE"/>
		<reference ref_id="CVE-2016-5300" ref_url="https://www.suse.com/security/cve/CVE-2016-5300/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002630.html" source="SUSE-SU"/>
		<description>

This update for expat fixes the following security issues:

- CVE-2012-6702: Expat, when used in a parser that has not
  called XML_SetHashSalt or passed it a seed of 0, made it easier for
  context-dependent attackers to defeat cryptographic protection mechanisms
  via vectors involving use of the srand function.  (bsc#983215)
- CVE-2016-5300: The XML parser in Expat did not use sufficient entropy
  for hash initialization, which allowed context-dependent attackers to
  cause a denial of service (CPU consumption) via crafted identifiers in
  an XML document. NOTE: this vulnerability exists because of an incomplete
  fix for CVE-2012-0876.  (bsc#983216)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-07"/>
	<updated date="2017-02-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022037">SUSE bug 1022037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983215">SUSE bug 983215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983216">SUSE bug 983216</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6702/">CVE-2012-6702 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6702">CVE-2012-6702 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5300/">CVE-2016-5300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5300">CVE-2016-5300 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582347" comment="expat-2.0.1-88.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582348" comment="libexpat1-2.0.1-88.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582349" comment="libexpat1-32bit-2.0.1-88.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582350" comment="libexpat1-x86-2.0.1-88.41.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582347" comment="expat-2.0.1-88.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582348" comment="libexpat1-2.0.1-88.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582349" comment="libexpat1-32bit-2.0.1-88.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582350" comment="libexpat1-x86-2.0.1-88.41.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219905" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1047236" ref_url="https://bugzilla.suse.com/1047236" source="BUGZILLA"/>
		<reference ref_id="1047240" ref_url="https://bugzilla.suse.com/1047240" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003189.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2016-9063: Possible integer overflow to fix inside XML_Parse leading to unexpected behaviour (bsc#1047240)
- CVE-2017-9233: External Entity Vulnerability could lead to denial of service (bsc#1047236)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-06"/>
	<updated date="2017-09-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047236">SUSE bug 1047236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047240">SUSE bug 1047240</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9063">CVE-2016-9063 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9233">CVE-2017-9233 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582351" comment="expat-2.0.1-88.42.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582352" comment="libexpat1-2.0.1-88.42.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582353" comment="libexpat1-32bit-2.0.1-88.42.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582354" comment="libexpat1-x86-2.0.1-88.42.3.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582351" comment="expat-2.0.1-88.42.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582352" comment="libexpat1-2.0.1-88.42.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582353" comment="libexpat1-32bit-2.0.1-88.42.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582354" comment="libexpat1-x86-2.0.1-88.42.3.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219906" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1194251" ref_url="https://bugzilla.suse.com/1194251" source="BUGZILLA"/>
		<reference ref_id="1194362" ref_url="https://bugzilla.suse.com/1194362" source="BUGZILLA"/>
		<reference ref_id="1194474" ref_url="https://bugzilla.suse.com/1194474" source="BUGZILLA"/>
		<reference ref_id="1194476" ref_url="https://bugzilla.suse.com/1194476" source="BUGZILLA"/>
		<reference ref_id="1194477" ref_url="https://bugzilla.suse.com/1194477" source="BUGZILLA"/>
		<reference ref_id="1194478" ref_url="https://bugzilla.suse.com/1194478" source="BUGZILLA"/>
		<reference ref_id="1194479" ref_url="https://bugzilla.suse.com/1194479" source="BUGZILLA"/>
		<reference ref_id="1194480" ref_url="https://bugzilla.suse.com/1194480" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45960" ref_url="https://www.suse.com/security/cve/CVE-2021-45960/" source="CVE"/>
		<reference ref_id="CVE-2021-46143" ref_url="https://www.suse.com/security/cve/CVE-2021-46143/" source="CVE"/>
		<reference ref_id="CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822/" source="CVE"/>
		<reference ref_id="CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823/" source="CVE"/>
		<reference ref_id="CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824/" source="CVE"/>
		<reference ref_id="CVE-2022-22825" ref_url="https://www.suse.com/security/cve/CVE-2022-22825/" source="CVE"/>
		<reference ref_id="CVE-2022-22826" ref_url="https://www.suse.com/security/cve/CVE-2022-22826/" source="CVE"/>
		<reference ref_id="CVE-2022-22827" ref_url="https://www.suse.com/security/cve/CVE-2022-22827/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010066.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2021-45960: Fixed left shift in the storeAtts function in xmlparse.c that can lead to realloc misbehavior (bsc#1194251).
- CVE-2021-46143: Fixed integer overflow in m_groupSize in doProlog (bsc#1194362).
- CVE-2022-22822: Fixed integer overflow in addBinding in xmlparse.c (bsc#1194474).
- CVE-2022-22823: Fixed integer overflow in build_model in xmlparse.c (bsc#1194476).
- CVE-2022-22824: Fixed integer overflow in defineAttribute in xmlparse.c (bsc#1194477).
- CVE-2022-22825: Fixed integer overflow in lookup in xmlparse.c (bsc#1194478).
- CVE-2022-22826: Fixed integer overflow in nextScaffoldPart in xmlparse.c (bsc#1194479).
- CVE-2022-22827: Fixed integer overflow in storeAtts in xmlparse.c (bsc#1194480).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194251">SUSE bug 1194251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194362">SUSE bug 1194362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194474">SUSE bug 1194474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194476">SUSE bug 1194476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194477">SUSE bug 1194477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194478">SUSE bug 1194478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194479">SUSE bug 1194479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194480">SUSE bug 1194480</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45960/">CVE-2021-45960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45960">CVE-2021-45960 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46143/">CVE-2021-46143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46143">CVE-2021-46143 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22822">CVE-2022-22822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22823">CVE-2022-22823 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22824">CVE-2022-22824 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22825/">CVE-2022-22825 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22825">CVE-2022-22825 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22826/">CVE-2022-22826 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22826">CVE-2022-22826 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22827/">CVE-2022-22827 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22827">CVE-2022-22827 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664123" comment="expat-2.0.1-88.42.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664124" comment="libexpat1-2.0.1-88.42.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664125" comment="libexpat1-32bit-2.0.1-88.42.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219907" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1195054" ref_url="https://bugzilla.suse.com/1195054" source="BUGZILLA"/>
		<reference ref_id="1195217" ref_url="https://bugzilla.suse.com/1195217" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852/" source="CVE"/>
		<reference ref_id="CVE-2022-23990" ref_url="https://www.suse.com/security/cve/CVE-2022-23990/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010199.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-23852: Fixed signed integer overflow in XML_GetBuffer (bsc#1195054).
- CVE-2022-23990: Fixed integer overflow in the doProlog function (bsc#1195217).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-09"/>
	<updated date="2022-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195054">SUSE bug 1195054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195217">SUSE bug 1195217</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23852">CVE-2022-23852 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23990/">CVE-2022-23990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23990">CVE-2022-23990 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666464" comment="expat-2.0.1-88.42.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666465" comment="libexpat1-2.0.1-88.42.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666466" comment="libexpat1-32bit-2.0.1-88.42.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219908" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196026" ref_url="https://bugzilla.suse.com/1196026" source="BUGZILLA"/>
		<reference ref_id="1196168" ref_url="https://bugzilla.suse.com/1196168" source="BUGZILLA"/>
		<reference ref_id="1196169" ref_url="https://bugzilla.suse.com/1196169" source="BUGZILLA"/>
		<reference ref_id="1196171" ref_url="https://bugzilla.suse.com/1196171" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313/" source="CVE"/>
		<reference ref_id="CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010361.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-25236: Fixed possible namespace-separator characters insertion into namespace URIs (bsc#1196025).
- CVE-2022-25235: Fixed UTF-8 character validation in a certain context (bsc#1196026).
- CVE-2022-25313: Fixed stack exhaustion in build_model() via uncontrolled recursion (bsc#1196168).
- CVE-2022-25314: Fixed integer overflow in copyString (bsc#1196169).
- CVE-2022-25315: Fixed integer overflow in storeRawNames (bsc#1196171).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196026">SUSE bug 1196026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196168">SUSE bug 1196168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196169">SUSE bug 1196169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196171">SUSE bug 1196171</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">CVE-2022-25235 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25313">CVE-2022-25313 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25314">CVE-2022-25314 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25315">CVE-2022-25315 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669850" comment="expat-2.0.1-88.42.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669851" comment="libexpat1-2.0.1-88.42.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669852" comment="libexpat1-32bit-2.0.1-88.42.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219909" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196784" ref_url="https://bugzilla.suse.com/1196784" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010614.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- Fixed a regression caused by the patch for CVE-2022-25236 (bsc#1196784).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-31"/>
	<updated date="2022-03-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196784">SUSE bug 1196784</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671294" comment="expat-2.0.1-88.42.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671295" comment="libexpat1-2.0.1-88.42.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671296" comment="libexpat1-32bit-2.0.1-88.42.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219910" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="775988" ref_url="https://bugzilla.suse.com/775988" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3482" ref_url="https://www.suse.com/security/cve/CVE-2012-3482/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001966.html" source="SUSE-SU"/>
		<description>

This update for fetchmail fixes the following issues:

- CVE-2012-3482: A denial of service vulnerability in the base64 decoder during processing server NTLM protocol exchange was fixed (bsc#775988).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-24"/>
	<updated date="2016-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/775988">SUSE bug 775988</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3482/">CVE-2012-3482 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3482">CVE-2012-3482 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582355" comment="fetchmail-6.3.8.90-13.20.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582356" comment="fetchmailconf-6.3.8.90-13.20.21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582355" comment="fetchmail-6.3.8.90-13.20.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582356" comment="fetchmailconf-6.3.8.90-13.20.21.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219911" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="947003" ref_url="https://bugzilla.suse.com/947003" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<description>

Mozilla Firefox was updated to version 38.3.0 ESR (bsc#947003),
fixing bugs and security issues.

* MFSA 2015-96/CVE-2015-4500/CVE-2015-4501
  Miscellaneous memory safety hazards (rv:41.0 / rv:38.3)
* MFSA 2015-101/CVE-2015-4506
  Buffer overflow in libvpx while parsing vp9 format video
* MFSA 2015-105/CVE-2015-4511
  Buffer overflow while decoding WebM video
* MFSA 2015-106/CVE-2015-4509
  Use-after-free while manipulating HTML media content
* MFSA 2015-110/CVE-2015-4519
  Dragging and dropping images exposes final URL after
  redirects
* MFSA 2015-111/CVE-2015-4520
  Errors in the handling of CORS preflight request headers
* MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522
  CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177
  CVE-2015-7180
  Vulnerabilities found through code inspection

More details can be found on
        https://www.mozilla.org/en-US/security/advisories/

The Mozilla NSPR library was updated to version 4.10.9, fixing various bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-23"/>
	<updated date="2015-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4500">CVE-2015-4500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4501">CVE-2015-4501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4506">CVE-2015-4506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4509">CVE-2015-4509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4511">CVE-2015-4511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4517">CVE-2015-4517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4519">CVE-2015-4519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4520">CVE-2015-4520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4521">CVE-2015-4521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4522">CVE-2015-4522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7174">CVE-2015-7174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7175">CVE-2015-7175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7176">CVE-2015-7176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7177">CVE-2015-7177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7180">CVE-2015-7180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577726" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577727" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577728" comment="mozilla-nspr-x86-4.10.9-11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577726" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577727" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577728" comment="mozilla-nspr-x86-4.10.9-11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219912" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="947003" ref_url="https://bugzilla.suse.com/947003" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001618.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to version 38.3.0 ESR (bsc#947003),
fixing bugs and security issues.

* MFSA 2015-96/CVE-2015-4500/CVE-2015-4501
  Miscellaneous memory safety hazards (rv:41.0 / rv:38.3)
* MFSA 2015-101/CVE-2015-4506
  Buffer overflow in libvpx while parsing vp9 format video
* MFSA 2015-105/CVE-2015-4511
  Buffer overflow while decoding WebM video
* MFSA 2015-106/CVE-2015-4509
  Use-after-free while manipulating HTML media content
* MFSA 2015-110/CVE-2015-4519
  Dragging and dropping images exposes final URL after
  redirects
* MFSA 2015-111/CVE-2015-4520
  Errors in the handling of CORS preflight request headers
* MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522
  CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177
  CVE-2015-7180
  Vulnerabilities found through code inspection

More details can be found on
        https://www.mozilla.org/en-US/security/advisories/
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-05"/>
	<updated date="2015-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4500">CVE-2015-4500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4501">CVE-2015-4501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4506">CVE-2015-4506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4509">CVE-2015-4509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4511">CVE-2015-4511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4517">CVE-2015-4517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4519">CVE-2015-4519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4520">CVE-2015-4520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4521">CVE-2015-4521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4522">CVE-2015-4522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7174">CVE-2015-7174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7175">CVE-2015-7175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7176">CVE-2015-7176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7177">CVE-2015-7177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7180">CVE-2015-7180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577729" comment="MozillaFirefox-38.3.0esr-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577730" comment="MozillaFirefox-translations-38.3.0esr-22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577729" comment="MozillaFirefox-38.3.0esr-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577730" comment="MozillaFirefox-translations-38.3.0esr-22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219913" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="908275" ref_url="https://bugzilla.suse.com/908275" source="BUGZILLA"/>
		<reference ref_id="952810" ref_url="https://bugzilla.suse.com/952810" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001677.html" source="SUSE-SU"/>
		<description>

This Mozilla Firefox, NSS and NSPR update fixes the following security
and non security issues.

- mozilla-nspr was updated to version 4.10.10 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7183
    (bmo#1205157)
    NSPR memory corruption issues

- mozilla-nss was updated to 3.19.2.1 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182
    (bmo#1192028, bmo#1202868)
    NSS and NSPR memory corruption issues

- MozillaFirefox was updated to 38.4.0 ESR (bsc#952810)
  * MFSA 2015-116/CVE-2015-4513
    (bmo#1107011, bmo#1191942, bmo#1193038, bmo#1204580,
     bmo#1204669, bmo#1204700, bmo#1205707, bmo#1206564,
     bmo#1208665, bmo#1209471, bmo#1213979)
    Miscellaneous memory safety hazards (rv:42.0 / rv:38.4)
  * MFSA 2015-122/CVE-2015-7188
    (bmo#1199430)
    Trailing whitespace in IP address hostnames can bypass
    same-origin policy
  * MFSA 2015-123/CVE-2015-7189
    (bmo#1205900)
    Buffer overflow during image interactions in canvas
  * MFSA 2015-127/CVE-2015-7193
    (bmo#1210302)
    CORS preflight is bypassed when non-standard Content-Type
    headers are received
  * MFSA 2015-128/CVE-2015-7194
    (bmo#1211262)
    Memory corruption in libjar through zip files
  * MFSA 2015-130/CVE-2015-7196
    (bmo#1140616)
    JavaScript garbage collection crash with Java applet
  * MFSA 2015-131/CVE-2015-7198/CVE-2015-7199/CVE-2015-7200
    (bmo#1204061, bmo#1188010, bmo#1204155)
    Vulnerabilities found through code inspection
  * MFSA 2015-132/CVE-2015-7197
    (bmo#1204269)
    Mixed content WebSocket policy bypass through workers
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182/CVE-2015-7183
    (bmo#1202868, bmo#1192028, bmo#1205157)
    NSS and NSPR memory corruption issues
- fix printing on landscape media (bsc#908275)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-12"/>
	<updated date="2015-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/908275">SUSE bug 908275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4513">CVE-2015-4513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7181">CVE-2015-7181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7182">CVE-2015-7182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7183">CVE-2015-7183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7188">CVE-2015-7188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7189">CVE-2015-7189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7193">CVE-2015-7193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7194">CVE-2015-7194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7196">CVE-2015-7196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7197">CVE-2015-7197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7198">CVE-2015-7198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7199">CVE-2015-7199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7200">CVE-2015-7200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577731" comment="MozillaFirefox-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577732" comment="MozillaFirefox-branding-SLED-38-15.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577734" comment="MozillaFirefox-translations-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577735" comment="libfreebl3-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577736" comment="libfreebl3-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577737" comment="libfreebl3-x86-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577738" comment="libsoftokn3-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577739" comment="libsoftokn3-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577740" comment="libsoftokn3-x86-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577741" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577742" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577743" comment="mozilla-nspr-x86-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577744" comment="mozilla-nss-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577745" comment="mozilla-nss-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577746" comment="mozilla-nss-tools-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577747" comment="mozilla-nss-x86-3.19.2.1-19.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577731" comment="MozillaFirefox-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577732" comment="MozillaFirefox-branding-SLED-38-15.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577734" comment="MozillaFirefox-translations-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577735" comment="libfreebl3-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577736" comment="libfreebl3-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577737" comment="libfreebl3-x86-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577738" comment="libsoftokn3-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577739" comment="libsoftokn3-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577740" comment="libsoftokn3-x86-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577741" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577742" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577743" comment="mozilla-nspr-x86-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577744" comment="mozilla-nss-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577745" comment="mozilla-nss-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577746" comment="mozilla-nss-tools-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577747" comment="mozilla-nss-x86-3.19.2.1-19.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219914" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1060445" ref_url="https://bugzilla.suse.com/1060445" source="BUGZILLA"/>
		<reference ref_id="1061005" ref_url="https://bugzilla.suse.com/1061005" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7793" ref_url="https://www.suse.com/security/cve/CVE-2017-7793/" source="CVE"/>
		<reference ref_id="CVE-2017-7805" ref_url="https://www.suse.com/security/cve/CVE-2017-7805/" source="CVE"/>
		<reference ref_id="CVE-2017-7810" ref_url="https://www.suse.com/security/cve/CVE-2017-7810/" source="CVE"/>
		<reference ref_id="CVE-2017-7814" ref_url="https://www.suse.com/security/cve/CVE-2017-7814/" source="CVE"/>
		<reference ref_id="CVE-2017-7818" ref_url="https://www.suse.com/security/cve/CVE-2017-7818/" source="CVE"/>
		<reference ref_id="CVE-2017-7819" ref_url="https://www.suse.com/security/cve/CVE-2017-7819/" source="CVE"/>
		<reference ref_id="CVE-2017-7823" ref_url="https://www.suse.com/security/cve/CVE-2017-7823/" source="CVE"/>
		<reference ref_id="CVE-2017-7824" ref_url="https://www.suse.com/security/cve/CVE-2017-7824/" source="CVE"/>
		<reference ref_id="CVE-2017-7825" ref_url="https://www.suse.com/security/cve/CVE-2017-7825/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003396.html" source="SUSE-SU"/>
		<description>


This update for MozillaFirefox and mozilla-nss fixes the following issues:

Mozilla Firefox was updated to ESR 52.4 (bsc#1060445)

* MFSA 2017-22/CVE-2017-7825: OS X fonts render some Tibetan and Arabic unicode characters as spaces
* MFSA 2017-22/CVE-2017-7805: Use-after-free in TLS 1.2 generating handshake hashes
* MFSA 2017-22/CVE-2017-7819: Use-after-free while resizing images in design mode
* MFSA 2017-22/CVE-2017-7818: Use-after-free during ARIA array manipulation
* MFSA 2017-22/CVE-2017-7793: Use-after-free with Fetch API
* MFSA 2017-22/CVE-2017-7824: Buffer overflow when drawing and validating elements with ANGLE
* MFSA 2017-22/CVE-2017-7810: Memory safety bugs fixed in Firefox 56 and Firefox ESR 52.4
* MFSA 2017-22/CVE-2017-7823: CSP sandbox directive did not create a unique origin
* MFSA 2017-22/CVE-2017-7814: Blob and data URLs bypass phishing and malware protection warnings

Mozilla Network Security Services (Mozilla NSS) received a security fix:

* MFSA 2017-22/CVE-2017-7805: Use-after-free in TLS 1.2 generating handshake hashes (bsc#1061005, bsc#1060445)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-27"/>
	<updated date="2017-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061005">SUSE bug 1061005</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7793/">CVE-2017-7793 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7793">CVE-2017-7793 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7805/">CVE-2017-7805 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7805">CVE-2017-7805 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7810/">CVE-2017-7810 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7810">CVE-2017-7810 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7814/">CVE-2017-7814 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7814">CVE-2017-7814 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7818/">CVE-2017-7818 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7818">CVE-2017-7818 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7819/">CVE-2017-7819 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7819">CVE-2017-7819 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7823/">CVE-2017-7823 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7823">CVE-2017-7823 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7824/">CVE-2017-7824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7824">CVE-2017-7824 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7825/">CVE-2017-7825 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7825">CVE-2017-7825 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582357" comment="MozillaFirefox-52.4.0esr-72.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582358" comment="MozillaFirefox-translations-52.4.0esr-72.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582359" comment="libfreebl3-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582360" comment="libfreebl3-32bit-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582361" comment="libfreebl3-x86-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582362" comment="libsoftokn3-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582363" comment="libsoftokn3-32bit-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582364" comment="libsoftokn3-x86-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582365" comment="mozilla-nss-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582366" comment="mozilla-nss-32bit-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582367" comment="mozilla-nss-tools-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582368" comment="mozilla-nss-x86-3.29.5-47.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582357" comment="MozillaFirefox-52.4.0esr-72.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582358" comment="MozillaFirefox-translations-52.4.0esr-72.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582359" comment="libfreebl3-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582360" comment="libfreebl3-32bit-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582361" comment="libfreebl3-x86-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582362" comment="libsoftokn3-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582363" comment="libsoftokn3-32bit-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582364" comment="libsoftokn3-x86-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582365" comment="mozilla-nss-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582366" comment="mozilla-nss-32bit-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582367" comment="mozilla-nss-tools-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582368" comment="mozilla-nss-x86-3.29.5-47.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219915" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, firefox-glib2, firefox-gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1145550" ref_url="https://bugzilla.suse.com/1145550" source="BUGZILLA"/>
		<reference ref_id="1149294" ref_url="https://bugzilla.suse.com/1149294" source="BUGZILLA"/>
		<reference ref_id="1149295" ref_url="https://bugzilla.suse.com/1149295" source="BUGZILLA"/>
		<reference ref_id="1149296" ref_url="https://bugzilla.suse.com/1149296" source="BUGZILLA"/>
		<reference ref_id="1149297" ref_url="https://bugzilla.suse.com/1149297" source="BUGZILLA"/>
		<reference ref_id="1149298" ref_url="https://bugzilla.suse.com/1149298" source="BUGZILLA"/>
		<reference ref_id="1149299" ref_url="https://bugzilla.suse.com/1149299" source="BUGZILLA"/>
		<reference ref_id="1149303" ref_url="https://bugzilla.suse.com/1149303" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, firefox-glib2, firefox-gtk3 fixes the following issues:

Mozilla Firefox was updated to the 60.9.0esr release:

Security Advisory MFSA 2019-27:

* Use-after-free while manipulating video
  CVE-2019-11746 (bmo#1564449, bsc#1149297)
* XSS by breaking out of title and textarea elements using innerHTML
  CVE-2019-11744 (bmo#1562033, bsc#1149297)
* Same-origin policy violation with SVG filters and canvas to steal
  cross-origin images
  CVE-2019-11742 (bmo#1559715, bsc#1149303)
* Privilege escalation with Mozilla Maintenance Service in custom
  Firefox installation location
  CVE-2019-11753 (bmo#1574980, bsc#1149295)
* Use-after-free while extracting a key value in IndexedDB
  CVE-2019-11752 (bmo#1501152, bsc#1149296)
* Sandbox escape through Firefox Sync
  CVE-2019-9812 (bmo#1538008, bmo#1538015, bsc#1149294)
* Cross-origin access to unload event attributes
  CVE-2019-11743 (bmo#1560495, bsc#1149298)
  Navigation-Timing Level 2 specification
* Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, and Firefox ESR 60.9
  CVE-2019-11740 (bmo#1563133, bmo#1573160, bsc#1149299)

- Rebuild glib2 schemas on SLE-11 (bsc#1145550)

Changes in firefox-glib2:

- Fix the rpm macros %glib2_gsettings_schema_* which were replaced with
  %nil in Factory because they're no longer needed, but we still need
  them in SLE11 (bsc#1145550)

Changes in firefox-gtk3:

- Rebuild so %glib2_gsettings_schema_post gets called with fixed 
  rpm macros %glib2_gsettings_schema_* in firefox-glib2 package
  which were replaced with %nil in Factory because they're no 
  longer needed, but we still need them in SLE11 (bsc#1145550)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145550">SUSE bug 1145550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149294">SUSE bug 1149294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149295">SUSE bug 1149295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149296">SUSE bug 1149296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149297">SUSE bug 1149297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149298">SUSE bug 1149298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149299">SUSE bug 1149299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149303">SUSE bug 1149303</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11753">CVE-2019-11753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9812">CVE-2019-9812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571463" comment="MozillaFirefox-60.9.0esr-78.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571464" comment="MozillaFirefox-translations-common-60.9.0esr-78.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571465" comment="MozillaFirefox-translations-other-60.9.0esr-78.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582369" comment="firefox-gio-branding-upstream-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582370" comment="firefox-glib2-lang-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582371" comment="firefox-glib2-tools-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582372" comment="firefox-gtk3-branding-upstream-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582373" comment="firefox-gtk3-data-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582374" comment="firefox-gtk3-immodule-amharic-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582375" comment="firefox-gtk3-immodule-inuktitut-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582376" comment="firefox-gtk3-immodule-multipress-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582377" comment="firefox-gtk3-immodule-thai-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582378" comment="firefox-gtk3-immodule-vietnamese-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582379" comment="firefox-gtk3-immodule-xim-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582380" comment="firefox-gtk3-immodules-tigrigna-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582381" comment="firefox-gtk3-lang-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582382" comment="firefox-gtk3-tools-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582383" comment="firefox-libgtk-3-0-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582384" comment="libfirefox-gio-2_0-0-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582385" comment="libfirefox-glib-2_0-0-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582386" comment="libfirefox-gmodule-2_0-0-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582387" comment="libfirefox-gobject-2_0-0-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582388" comment="libfirefox-gthread-2_0-0-2.54.3-2.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219916" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1000036" ref_url="https://bugzilla.suse.com/1000036" source="BUGZILLA"/>
		<reference ref_id="1001652" ref_url="https://bugzilla.suse.com/1001652" source="BUGZILLA"/>
		<reference ref_id="1025108" ref_url="https://bugzilla.suse.com/1025108" source="BUGZILLA"/>
		<reference ref_id="1029377" ref_url="https://bugzilla.suse.com/1029377" source="BUGZILLA"/>
		<reference ref_id="1029902" ref_url="https://bugzilla.suse.com/1029902" source="BUGZILLA"/>
		<reference ref_id="1040164" ref_url="https://bugzilla.suse.com/1040164" source="BUGZILLA"/>
		<reference ref_id="104105" ref_url="https://bugzilla.suse.com/104105" source="BUGZILLA"/>
		<reference ref_id="1042670" ref_url="https://bugzilla.suse.com/1042670" source="BUGZILLA"/>
		<reference ref_id="1043008" ref_url="https://bugzilla.suse.com/1043008" source="BUGZILLA"/>
		<reference ref_id="1044946" ref_url="https://bugzilla.suse.com/1044946" source="BUGZILLA"/>
		<reference ref_id="1047925" ref_url="https://bugzilla.suse.com/1047925" source="BUGZILLA"/>
		<reference ref_id="1047936" ref_url="https://bugzilla.suse.com/1047936" source="BUGZILLA"/>
		<reference ref_id="1048299" ref_url="https://bugzilla.suse.com/1048299" source="BUGZILLA"/>
		<reference ref_id="1049186" ref_url="https://bugzilla.suse.com/1049186" source="BUGZILLA"/>
		<reference ref_id="1050653" ref_url="https://bugzilla.suse.com/1050653" source="BUGZILLA"/>
		<reference ref_id="1056058" ref_url="https://bugzilla.suse.com/1056058" source="BUGZILLA"/>
		<reference ref_id="1058013" ref_url="https://bugzilla.suse.com/1058013" source="BUGZILLA"/>
		<reference ref_id="1066242" ref_url="https://bugzilla.suse.com/1066242" source="BUGZILLA"/>
		<reference ref_id="1066953" ref_url="https://bugzilla.suse.com/1066953" source="BUGZILLA"/>
		<reference ref_id="1070738" ref_url="https://bugzilla.suse.com/1070738" source="BUGZILLA"/>
		<reference ref_id="1070853" ref_url="https://bugzilla.suse.com/1070853" source="BUGZILLA"/>
		<reference ref_id="1072320" ref_url="https://bugzilla.suse.com/1072320" source="BUGZILLA"/>
		<reference ref_id="1072322" ref_url="https://bugzilla.suse.com/1072322" source="BUGZILLA"/>
		<reference ref_id="1073796" ref_url="https://bugzilla.suse.com/1073796" source="BUGZILLA"/>
		<reference ref_id="1073798" ref_url="https://bugzilla.suse.com/1073798" source="BUGZILLA"/>
		<reference ref_id="1073799" ref_url="https://bugzilla.suse.com/1073799" source="BUGZILLA"/>
		<reference ref_id="1073803" ref_url="https://bugzilla.suse.com/1073803" source="BUGZILLA"/>
		<reference ref_id="1073808" ref_url="https://bugzilla.suse.com/1073808" source="BUGZILLA"/>
		<reference ref_id="1073818" ref_url="https://bugzilla.suse.com/1073818" source="BUGZILLA"/>
		<reference ref_id="1073823" ref_url="https://bugzilla.suse.com/1073823" source="BUGZILLA"/>
		<reference ref_id="1073829" ref_url="https://bugzilla.suse.com/1073829" source="BUGZILLA"/>
		<reference ref_id="1073830" ref_url="https://bugzilla.suse.com/1073830" source="BUGZILLA"/>
		<reference ref_id="1073832" ref_url="https://bugzilla.suse.com/1073832" source="BUGZILLA"/>
		<reference ref_id="1073846" ref_url="https://bugzilla.suse.com/1073846" source="BUGZILLA"/>
		<reference ref_id="1074235" ref_url="https://bugzilla.suse.com/1074235" source="BUGZILLA"/>
		<reference ref_id="1077230" ref_url="https://bugzilla.suse.com/1077230" source="BUGZILLA"/>
		<reference ref_id="1079761" ref_url="https://bugzilla.suse.com/1079761" source="BUGZILLA"/>
		<reference ref_id="1081750" ref_url="https://bugzilla.suse.com/1081750" source="BUGZILLA"/>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1087453" ref_url="https://bugzilla.suse.com/1087453" source="BUGZILLA"/>
		<reference ref_id="1087459" ref_url="https://bugzilla.suse.com/1087459" source="BUGZILLA"/>
		<reference ref_id="1087463" ref_url="https://bugzilla.suse.com/1087463" source="BUGZILLA"/>
		<reference ref_id="1088573" ref_url="https://bugzilla.suse.com/1088573" source="BUGZILLA"/>
		<reference ref_id="1091764" ref_url="https://bugzilla.suse.com/1091764" source="BUGZILLA"/>
		<reference ref_id="1094814" ref_url="https://bugzilla.suse.com/1094814" source="BUGZILLA"/>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="1097375" ref_url="https://bugzilla.suse.com/1097375" source="BUGZILLA"/>
		<reference ref_id="1097401" ref_url="https://bugzilla.suse.com/1097401" source="BUGZILLA"/>
		<reference ref_id="1097404" ref_url="https://bugzilla.suse.com/1097404" source="BUGZILLA"/>
		<reference ref_id="1097748" ref_url="https://bugzilla.suse.com/1097748" source="BUGZILLA"/>
		<reference ref_id="1104841" ref_url="https://bugzilla.suse.com/1104841" source="BUGZILLA"/>
		<reference ref_id="1105019" ref_url="https://bugzilla.suse.com/1105019" source="BUGZILLA"/>
		<reference ref_id="1107030" ref_url="https://bugzilla.suse.com/1107030" source="BUGZILLA"/>
		<reference ref_id="1109465" ref_url="https://bugzilla.suse.com/1109465" source="BUGZILLA"/>
		<reference ref_id="1117473" ref_url="https://bugzilla.suse.com/1117473" source="BUGZILLA"/>
		<reference ref_id="1117626" ref_url="https://bugzilla.suse.com/1117626" source="BUGZILLA"/>
		<reference ref_id="1117627" ref_url="https://bugzilla.suse.com/1117627" source="BUGZILLA"/>
		<reference ref_id="1117629" ref_url="https://bugzilla.suse.com/1117629" source="BUGZILLA"/>
		<reference ref_id="1117630" ref_url="https://bugzilla.suse.com/1117630" source="BUGZILLA"/>
		<reference ref_id="1120644" ref_url="https://bugzilla.suse.com/1120644" source="BUGZILLA"/>
		<reference ref_id="1122191" ref_url="https://bugzilla.suse.com/1122191" source="BUGZILLA"/>
		<reference ref_id="1123482" ref_url="https://bugzilla.suse.com/1123482" source="BUGZILLA"/>
		<reference ref_id="1124525" ref_url="https://bugzilla.suse.com/1124525" source="BUGZILLA"/>
		<reference ref_id="1127532" ref_url="https://bugzilla.suse.com/1127532" source="BUGZILLA"/>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="1130694" ref_url="https://bugzilla.suse.com/1130694" source="BUGZILLA"/>
		<reference ref_id="1130840" ref_url="https://bugzilla.suse.com/1130840" source="BUGZILLA"/>
		<reference ref_id="1133452" ref_url="https://bugzilla.suse.com/1133452" source="BUGZILLA"/>
		<reference ref_id="1133810" ref_url="https://bugzilla.suse.com/1133810" source="BUGZILLA"/>
		<reference ref_id="1134209" ref_url="https://bugzilla.suse.com/1134209" source="BUGZILLA"/>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="1140290" ref_url="https://bugzilla.suse.com/1140290" source="BUGZILLA"/>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="1144919" ref_url="https://bugzilla.suse.com/1144919" source="BUGZILLA"/>
		<reference ref_id="1145665" ref_url="https://bugzilla.suse.com/1145665" source="BUGZILLA"/>
		<reference ref_id="1146090" ref_url="https://bugzilla.suse.com/1146090" source="BUGZILLA"/>
		<reference ref_id="1146091" ref_url="https://bugzilla.suse.com/1146091" source="BUGZILLA"/>
		<reference ref_id="1146093" ref_url="https://bugzilla.suse.com/1146093" source="BUGZILLA"/>
		<reference ref_id="1146094" ref_url="https://bugzilla.suse.com/1146094" source="BUGZILLA"/>
		<reference ref_id="1146095" ref_url="https://bugzilla.suse.com/1146095" source="BUGZILLA"/>
		<reference ref_id="1146097" ref_url="https://bugzilla.suse.com/1146097" source="BUGZILLA"/>
		<reference ref_id="1146099" ref_url="https://bugzilla.suse.com/1146099" source="BUGZILLA"/>
		<reference ref_id="1146100" ref_url="https://bugzilla.suse.com/1146100" source="BUGZILLA"/>
		<reference ref_id="1149323" ref_url="https://bugzilla.suse.com/1149323" source="BUGZILLA"/>
		<reference ref_id="1153423" ref_url="https://bugzilla.suse.com/1153423" source="BUGZILLA"/>
		<reference ref_id="1154738" ref_url="https://bugzilla.suse.com/1154738" source="BUGZILLA"/>
		<reference ref_id="1447070" ref_url="https://bugzilla.suse.com/1447070" source="BUGZILLA"/>
		<reference ref_id="1447409" ref_url="https://bugzilla.suse.com/1447409" source="BUGZILLA"/>
		<reference ref_id="744625" ref_url="https://bugzilla.suse.com/744625" source="BUGZILLA"/>
		<reference ref_id="744629" ref_url="https://bugzilla.suse.com/744629" source="BUGZILLA"/>
		<reference ref_id="845955" ref_url="https://bugzilla.suse.com/845955" source="BUGZILLA"/>
		<reference ref_id="865853" ref_url="https://bugzilla.suse.com/865853" source="BUGZILLA"/>
		<reference ref_id="905528" ref_url="https://bugzilla.suse.com/905528" source="BUGZILLA"/>
		<reference ref_id="917607" ref_url="https://bugzilla.suse.com/917607" source="BUGZILLA"/>
		<reference ref_id="935856" ref_url="https://bugzilla.suse.com/935856" source="BUGZILLA"/>
		<reference ref_id="937414" ref_url="https://bugzilla.suse.com/937414" source="BUGZILLA"/>
		<reference ref_id="947747" ref_url="https://bugzilla.suse.com/947747" source="BUGZILLA"/>
		<reference ref_id="948045" ref_url="https://bugzilla.suse.com/948045" source="BUGZILLA"/>
		<reference ref_id="948602" ref_url="https://bugzilla.suse.com/948602" source="BUGZILLA"/>
		<reference ref_id="955142" ref_url="https://bugzilla.suse.com/955142" source="BUGZILLA"/>
		<reference ref_id="957814" ref_url="https://bugzilla.suse.com/957814" source="BUGZILLA"/>
		<reference ref_id="957815" ref_url="https://bugzilla.suse.com/957815" source="BUGZILLA"/>
		<reference ref_id="961254" ref_url="https://bugzilla.suse.com/961254" source="BUGZILLA"/>
		<reference ref_id="962297" ref_url="https://bugzilla.suse.com/962297" source="BUGZILLA"/>
		<reference ref_id="966076" ref_url="https://bugzilla.suse.com/966076" source="BUGZILLA"/>
		<reference ref_id="966077" ref_url="https://bugzilla.suse.com/966077" source="BUGZILLA"/>
		<reference ref_id="985201" ref_url="https://bugzilla.suse.com/985201" source="BUGZILLA"/>
		<reference ref_id="986541" ref_url="https://bugzilla.suse.com/986541" source="BUGZILLA"/>
		<reference ref_id="991344" ref_url="https://bugzilla.suse.com/991344" source="BUGZILLA"/>
		<reference ref_id="998743" ref_url="https://bugzilla.suse.com/998743" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2882" ref_url="https://www.suse.com/security/cve/CVE-2013-2882/" source="CVE"/>
		<reference ref_id="CVE-2013-6639" ref_url="https://www.suse.com/security/cve/CVE-2013-6639/" source="CVE"/>
		<reference ref_id="CVE-2013-6640" ref_url="https://www.suse.com/security/cve/CVE-2013-6640/" source="CVE"/>
		<reference ref_id="CVE-2013-6668" ref_url="https://www.suse.com/security/cve/CVE-2013-6668/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2015-3193" ref_url="https://www.suse.com/security/cve/CVE-2015-3193/" source="CVE"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-5380" ref_url="https://www.suse.com/security/cve/CVE-2015-5380/" source="CVE"/>
		<reference ref_id="CVE-2015-7384" ref_url="https://www.suse.com/security/cve/CVE-2015-7384/" source="CVE"/>
		<reference ref_id="CVE-2016-2086" ref_url="https://www.suse.com/security/cve/CVE-2016-2086/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-2216" ref_url="https://www.suse.com/security/cve/CVE-2016-2216/" source="CVE"/>
		<reference ref_id="CVE-2016-5172" ref_url="https://www.suse.com/security/cve/CVE-2016-5172/" source="CVE"/>
		<reference ref_id="CVE-2016-5325" ref_url="https://www.suse.com/security/cve/CVE-2016-5325/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="CVE-2016-7052" ref_url="https://www.suse.com/security/cve/CVE-2016-7052/" source="CVE"/>
		<reference ref_id="CVE-2016-7099" ref_url="https://www.suse.com/security/cve/CVE-2016-7099/" source="CVE"/>
		<reference ref_id="CVE-2017-1000381" ref_url="https://www.suse.com/security/cve/CVE-2017-1000381/" source="CVE"/>
		<reference ref_id="CVE-2017-10686" ref_url="https://www.suse.com/security/cve/CVE-2017-10686/" source="CVE"/>
		<reference ref_id="CVE-2017-11111" ref_url="https://www.suse.com/security/cve/CVE-2017-11111/" source="CVE"/>
		<reference ref_id="CVE-2017-11499" ref_url="https://www.suse.com/security/cve/CVE-2017-11499/" source="CVE"/>
		<reference ref_id="CVE-2017-14228" ref_url="https://www.suse.com/security/cve/CVE-2017-14228/" source="CVE"/>
		<reference ref_id="CVE-2017-14849" ref_url="https://www.suse.com/security/cve/CVE-2017-14849/" source="CVE"/>
		<reference ref_id="CVE-2017-14919" ref_url="https://www.suse.com/security/cve/CVE-2017-14919/" source="CVE"/>
		<reference ref_id="CVE-2017-15896" ref_url="https://www.suse.com/security/cve/CVE-2017-15896/" source="CVE"/>
		<reference ref_id="CVE-2017-15897" ref_url="https://www.suse.com/security/cve/CVE-2017-15897/" source="CVE"/>
		<reference ref_id="CVE-2017-17810" ref_url="https://www.suse.com/security/cve/CVE-2017-17810/" source="CVE"/>
		<reference ref_id="CVE-2017-17811" ref_url="https://www.suse.com/security/cve/CVE-2017-17811/" source="CVE"/>
		<reference ref_id="CVE-2017-17812" ref_url="https://www.suse.com/security/cve/CVE-2017-17812/" source="CVE"/>
		<reference ref_id="CVE-2017-17813" ref_url="https://www.suse.com/security/cve/CVE-2017-17813/" source="CVE"/>
		<reference ref_id="CVE-2017-17814" ref_url="https://www.suse.com/security/cve/CVE-2017-17814/" source="CVE"/>
		<reference ref_id="CVE-2017-17815" ref_url="https://www.suse.com/security/cve/CVE-2017-17815/" source="CVE"/>
		<reference ref_id="CVE-2017-17816" ref_url="https://www.suse.com/security/cve/CVE-2017-17816/" source="CVE"/>
		<reference ref_id="CVE-2017-17817" ref_url="https://www.suse.com/security/cve/CVE-2017-17817/" source="CVE"/>
		<reference ref_id="CVE-2017-17818" ref_url="https://www.suse.com/security/cve/CVE-2017-17818/" source="CVE"/>
		<reference ref_id="CVE-2017-17819" ref_url="https://www.suse.com/security/cve/CVE-2017-17819/" source="CVE"/>
		<reference ref_id="CVE-2017-17820" ref_url="https://www.suse.com/security/cve/CVE-2017-17820/" source="CVE"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<reference ref_id="CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735/" source="CVE"/>
		<reference ref_id="CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736/" source="CVE"/>
		<reference ref_id="CVE-2017-3738" ref_url="https://www.suse.com/security/cve/CVE-2017-3738/" source="CVE"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-1000168" ref_url="https://www.suse.com/security/cve/CVE-2018-1000168/" source="CVE"/>
		<reference ref_id="CVE-2018-12115" ref_url="https://www.suse.com/security/cve/CVE-2018-12115/" source="CVE"/>
		<reference ref_id="CVE-2018-12116" ref_url="https://www.suse.com/security/cve/CVE-2018-12116/" source="CVE"/>
		<reference ref_id="CVE-2018-12121" ref_url="https://www.suse.com/security/cve/CVE-2018-12121/" source="CVE"/>
		<reference ref_id="CVE-2018-12122" ref_url="https://www.suse.com/security/cve/CVE-2018-12122/" source="CVE"/>
		<reference ref_id="CVE-2018-12123" ref_url="https://www.suse.com/security/cve/CVE-2018-12123/" source="CVE"/>
		<reference ref_id="CVE-2018-20406" ref_url="https://www.suse.com/security/cve/CVE-2018-20406/" source="CVE"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2018-7158" ref_url="https://www.suse.com/security/cve/CVE-2018-7158/" source="CVE"/>
		<reference ref_id="CVE-2018-7159" ref_url="https://www.suse.com/security/cve/CVE-2018-7159/" source="CVE"/>
		<reference ref_id="CVE-2018-7160" ref_url="https://www.suse.com/security/cve/CVE-2018-7160/" source="CVE"/>
		<reference ref_id="CVE-2018-7161" ref_url="https://www.suse.com/security/cve/CVE-2018-7161/" source="CVE"/>
		<reference ref_id="CVE-2018-7167" ref_url="https://www.suse.com/security/cve/CVE-2018-7167/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11710" ref_url="https://www.suse.com/security/cve/CVE-2019-11710/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11714" ref_url="https://www.suse.com/security/cve/CVE-2019-11714/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11716" ref_url="https://www.suse.com/security/cve/CVE-2019-11716/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11718" ref_url="https://www.suse.com/security/cve/CVE-2019-11718/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11720" ref_url="https://www.suse.com/security/cve/CVE-2019-11720/" source="CVE"/>
		<reference ref_id="CVE-2019-11721" ref_url="https://www.suse.com/security/cve/CVE-2019-11721/" source="CVE"/>
		<reference ref_id="CVE-2019-11723" ref_url="https://www.suse.com/security/cve/CVE-2019-11723/" source="CVE"/>
		<reference ref_id="CVE-2019-11724" ref_url="https://www.suse.com/security/cve/CVE-2019-11724/" source="CVE"/>
		<reference ref_id="CVE-2019-11725" ref_url="https://www.suse.com/security/cve/CVE-2019-11725/" source="CVE"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11728" ref_url="https://www.suse.com/security/cve/CVE-2019-11728/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-11733" ref_url="https://www.suse.com/security/cve/CVE-2019-11733/" source="CVE"/>
		<reference ref_id="CVE-2019-11735" ref_url="https://www.suse.com/security/cve/CVE-2019-11735/" source="CVE"/>
		<reference ref_id="CVE-2019-11736" ref_url="https://www.suse.com/security/cve/CVE-2019-11736/" source="CVE"/>
		<reference ref_id="CVE-2019-11738" ref_url="https://www.suse.com/security/cve/CVE-2019-11738/" source="CVE"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11747" ref_url="https://www.suse.com/security/cve/CVE-2019-11747/" source="CVE"/>
		<reference ref_id="CVE-2019-11748" ref_url="https://www.suse.com/security/cve/CVE-2019-11748/" source="CVE"/>
		<reference ref_id="CVE-2019-11749" ref_url="https://www.suse.com/security/cve/CVE-2019-11749/" source="CVE"/>
		<reference ref_id="CVE-2019-11750" ref_url="https://www.suse.com/security/cve/CVE-2019-11750/" source="CVE"/>
		<reference ref_id="CVE-2019-11751" ref_url="https://www.suse.com/security/cve/CVE-2019-11751/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757/" source="CVE"/>
		<reference ref_id="CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758/" source="CVE"/>
		<reference ref_id="CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759/" source="CVE"/>
		<reference ref_id="CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760/" source="CVE"/>
		<reference ref_id="CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761/" source="CVE"/>
		<reference ref_id="CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762/" source="CVE"/>
		<reference ref_id="CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763/" source="CVE"/>
		<reference ref_id="CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764/" source="CVE"/>
		<reference ref_id="CVE-2019-13173" ref_url="https://www.suse.com/security/cve/CVE-2019-13173/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="CVE-2019-5737" ref_url="https://www.suse.com/security/cve/CVE-2019-5737/" source="CVE"/>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2019-9512" ref_url="https://www.suse.com/security/cve/CVE-2019-9512/" source="CVE"/>
		<reference ref_id="CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513/" source="CVE"/>
		<reference ref_id="CVE-2019-9514" ref_url="https://www.suse.com/security/cve/CVE-2019-9514/" source="CVE"/>
		<reference ref_id="CVE-2019-9515" ref_url="https://www.suse.com/security/cve/CVE-2019-9515/" source="CVE"/>
		<reference ref_id="CVE-2019-9516" ref_url="https://www.suse.com/security/cve/CVE-2019-9516/" source="CVE"/>
		<reference ref_id="CVE-2019-9517" ref_url="https://www.suse.com/security/cve/CVE-2019-9517/" source="CVE"/>
		<reference ref_id="CVE-2019-9518" ref_url="https://www.suse.com/security/cve/CVE-2019-9518/" source="CVE"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<description>

This update contains the Mozilla Firefox ESR 68.2 release.

Mozilla Firefox was updated to ESR 68.2 release:

* Enterprise: New administrative policies were added. More
  information and templates are available at the Policy
  Templates page.

* Various security fixes:
  MFSA 2019-33 (bsc#1154738)
  * CVE-2019-15903: Heap overflow in expat library in XML_GetCurrentLineNumber
  * CVE-2019-11757: Use-after-free when creating index updates in IndexedDB
  * CVE-2019-11758: Potentially exploitable crash due to 360 Total Security
  * CVE-2019-11759: Stack buffer overflow in HKDF output
  * CVE-2019-11760: Stack buffer overflow in WebRTC networking
  * CVE-2019-11761: Unintended access to a privileged JSONView object
  * CVE-2019-11762: document.domain-based origin isolation has same-origin- property violation
  * CVE-2019-11763: Incorrect HTML parsing results in XSS bypass technique
  * CVE-2019-11764: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2

Other Issues resolved:

* [bsc#1104841] Newer versions of firefox have a dependency on
                GLIBCXX_3.4.20
* [bsc#1074235] MozillaFirefox: background tab crash reports sent
                inadvertently without user opt-in
* [bsc#1043008] Firefox hangs randomly when browsing and
                scrolling
* [bsc#1025108] Firefox stops loading page until mouse is moved
* [bsc#905528]  Firefox malfunctions due to broken omni.ja
                archives

		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-17"/>
	<updated date="2020-01-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000036">SUSE bug 1000036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001652">SUSE bug 1001652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025108">SUSE bug 1025108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029377">SUSE bug 1029377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029902">SUSE bug 1029902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040164">SUSE bug 1040164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/104105">SUSE bug 104105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042670">SUSE bug 1042670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043008">SUSE bug 1043008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044946">SUSE bug 1044946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047925">SUSE bug 1047925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047936">SUSE bug 1047936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048299">SUSE bug 1048299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049186">SUSE bug 1049186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050653">SUSE bug 1050653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056058">SUSE bug 1056058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058013">SUSE bug 1058013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066242">SUSE bug 1066242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066953">SUSE bug 1066953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070738">SUSE bug 1070738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070853">SUSE bug 1070853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072320">SUSE bug 1072320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072322">SUSE bug 1072322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073796">SUSE bug 1073796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073798">SUSE bug 1073798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073799">SUSE bug 1073799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073803">SUSE bug 1073803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073808">SUSE bug 1073808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073818">SUSE bug 1073818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073823">SUSE bug 1073823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073829">SUSE bug 1073829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073830">SUSE bug 1073830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073832">SUSE bug 1073832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073846">SUSE bug 1073846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074235">SUSE bug 1074235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077230">SUSE bug 1077230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079761">SUSE bug 1079761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081750">SUSE bug 1081750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087453">SUSE bug 1087453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087459">SUSE bug 1087459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087463">SUSE bug 1087463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088573">SUSE bug 1088573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091764">SUSE bug 1091764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094814">SUSE bug 1094814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097375">SUSE bug 1097375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097401">SUSE bug 1097401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097404">SUSE bug 1097404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097748">SUSE bug 1097748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104841">SUSE bug 1104841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105019">SUSE bug 1105019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107030">SUSE bug 1107030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109465">SUSE bug 1109465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117473">SUSE bug 1117473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117626">SUSE bug 1117626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117627">SUSE bug 1117627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117629">SUSE bug 1117629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117630">SUSE bug 1117630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120644">SUSE bug 1120644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123482">SUSE bug 1123482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124525">SUSE bug 1124525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127532">SUSE bug 1127532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130694">SUSE bug 1130694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133452">SUSE bug 1133452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133810">SUSE bug 1133810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134209">SUSE bug 1134209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140290">SUSE bug 1140290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144919">SUSE bug 1144919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145665">SUSE bug 1145665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146090">SUSE bug 1146090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146091">SUSE bug 1146091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146093">SUSE bug 1146093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146094">SUSE bug 1146094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146095">SUSE bug 1146095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146097">SUSE bug 1146097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146099">SUSE bug 1146099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146100">SUSE bug 1146100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153423">SUSE bug 1153423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1447070">SUSE bug 1447070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1447409">SUSE bug 1447409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744625">SUSE bug 744625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744629">SUSE bug 744629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845955">SUSE bug 845955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865853">SUSE bug 865853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905528">SUSE bug 905528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917607">SUSE bug 917607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935856">SUSE bug 935856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937414">SUSE bug 937414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947747">SUSE bug 947747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948045">SUSE bug 948045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948602">SUSE bug 948602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955142">SUSE bug 955142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957814">SUSE bug 957814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957815">SUSE bug 957815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961254">SUSE bug 961254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962297">SUSE bug 962297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966076">SUSE bug 966076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966077">SUSE bug 966077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985201">SUSE bug 985201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986541">SUSE bug 986541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991344">SUSE bug 991344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998743">SUSE bug 998743</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2882/">CVE-2013-2882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2882">CVE-2013-2882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6639/">CVE-2013-6639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6639">CVE-2013-6639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6640/">CVE-2013-6640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6640">CVE-2013-6640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6668/">CVE-2013-6668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6668">CVE-2013-6668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0224">CVE-2014-0224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3193/">CVE-2015-3193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3193">CVE-2015-3193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3194">CVE-2015-3194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5380/">CVE-2015-5380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5380">CVE-2015-5380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7384/">CVE-2015-7384 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7384">CVE-2015-7384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2086/">CVE-2016-2086 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2086">CVE-2016-2086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2178">CVE-2016-2178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2216/">CVE-2016-2216 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2216">CVE-2016-2216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5172/">CVE-2016-5172 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5172">CVE-2016-5172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5325/">CVE-2016-5325 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5325">CVE-2016-5325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6304">CVE-2016-6304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6306">CVE-2016-6306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7052/">CVE-2016-7052 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7052">CVE-2016-7052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7099/">CVE-2016-7099 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7099">CVE-2016-7099 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000381/">CVE-2017-1000381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000381">CVE-2017-1000381 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10686/">CVE-2017-10686 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10686">CVE-2017-10686 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11111/">CVE-2017-11111 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11111">CVE-2017-11111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11499/">CVE-2017-11499 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11499">CVE-2017-11499 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14228/">CVE-2017-14228 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14228">CVE-2017-14228 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14849/">CVE-2017-14849 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14849">CVE-2017-14849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14919/">CVE-2017-14919 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14919">CVE-2017-14919 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15896/">CVE-2017-15896 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15896">CVE-2017-15896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15897/">CVE-2017-15897 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15897">CVE-2017-15897 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17810/">CVE-2017-17810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17810">CVE-2017-17810 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17811/">CVE-2017-17811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17811">CVE-2017-17811 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17812/">CVE-2017-17812 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17812">CVE-2017-17812 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17813/">CVE-2017-17813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17813">CVE-2017-17813 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17814/">CVE-2017-17814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17814">CVE-2017-17814 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17815/">CVE-2017-17815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17815">CVE-2017-17815 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17816/">CVE-2017-17816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17816">CVE-2017-17816 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17817/">CVE-2017-17817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17817">CVE-2017-17817 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17818/">CVE-2017-17818 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17818">CVE-2017-17818 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17819/">CVE-2017-17819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17819">CVE-2017-17819 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17820/">CVE-2017-17820 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17820">CVE-2017-17820 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18207">CVE-2017-18207 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3735">CVE-2017-3735 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3736">CVE-2017-3736 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3738/">CVE-2017-3738 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3738">CVE-2017-3738 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0732">CVE-2018-0732 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000168/">CVE-2018-1000168 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000168">CVE-2018-1000168 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12115/">CVE-2018-12115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12115">CVE-2018-12115 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12116/">CVE-2018-12116 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12116">CVE-2018-12116 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12121/">CVE-2018-12121 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12121">CVE-2018-12121 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12122/">CVE-2018-12122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12122">CVE-2018-12122 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12123/">CVE-2018-12123 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12123">CVE-2018-12123 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20406/">CVE-2018-20406 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20406">CVE-2018-20406 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20852">CVE-2018-20852 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7158/">CVE-2018-7158 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7158">CVE-2018-7158 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7159/">CVE-2018-7159 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7159">CVE-2018-7159 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7160/">CVE-2018-7160 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7160">CVE-2018-7160 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7161/">CVE-2018-7161 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7161">CVE-2018-7161 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7167/">CVE-2018-7167 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7167">CVE-2018-7167 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10160">CVE-2019-10160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11709">CVE-2019-11709 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11710/">CVE-2019-11710 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11710">CVE-2019-11710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11711">CVE-2019-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11712">CVE-2019-11712 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11713">CVE-2019-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11714/">CVE-2019-11714 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11714">CVE-2019-11714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11715">CVE-2019-11715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11716/">CVE-2019-11716 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11716">CVE-2019-11716 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11717">CVE-2019-11717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11718/">CVE-2019-11718 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11718">CVE-2019-11718 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11719">CVE-2019-11719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11720/">CVE-2019-11720 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11720">CVE-2019-11720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11721/">CVE-2019-11721 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11721">CVE-2019-11721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11723/">CVE-2019-11723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11723">CVE-2019-11723 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11724/">CVE-2019-11724 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11724">CVE-2019-11724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11725/">CVE-2019-11725 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11725">CVE-2019-11725 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11727">CVE-2019-11727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11728/">CVE-2019-11728 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11728">CVE-2019-11728 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11729">CVE-2019-11729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11730">CVE-2019-11730 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11733/">CVE-2019-11733 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11733">CVE-2019-11733 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11735/">CVE-2019-11735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11735">CVE-2019-11735 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11736/">CVE-2019-11736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11736">CVE-2019-11736 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11738/">CVE-2019-11738 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11738">CVE-2019-11738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11747/">CVE-2019-11747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11747">CVE-2019-11747 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11748/">CVE-2019-11748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11748">CVE-2019-11748 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11749/">CVE-2019-11749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11749">CVE-2019-11749 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11750/">CVE-2019-11750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11750">CVE-2019-11750 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11751/">CVE-2019-11751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11751">CVE-2019-11751 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11753">CVE-2019-11753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11757">CVE-2019-11757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11758">CVE-2019-11758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11759">CVE-2019-11759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11760">CVE-2019-11760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11761">CVE-2019-11761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11762">CVE-2019-11762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11763">CVE-2019-11763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11764">CVE-2019-11764 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13173/">CVE-2019-13173 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13173">CVE-2019-13173 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5010">CVE-2019-5010 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5737/">CVE-2019-5737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5737">CVE-2019-5737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9511">CVE-2019-9511 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9512/">CVE-2019-9512 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9512">CVE-2019-9512 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9513">CVE-2019-9513 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9514/">CVE-2019-9514 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9514">CVE-2019-9514 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9515/">CVE-2019-9515 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9515">CVE-2019-9515 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9516/">CVE-2019-9516 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9516">CVE-2019-9516 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9517/">CVE-2019-9517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9517">CVE-2019-9517 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9518/">CVE-2019-9518 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9518">CVE-2019-9518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9636">CVE-2019-9636 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9811">CVE-2019-9811 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9812">CVE-2019-9812 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571486" comment="MozillaFirefox-68.2.0-78.51.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571487" comment="MozillaFirefox-branding-SLED-68-21.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571488" comment="MozillaFirefox-translations-common-68.2.0-78.51.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571489" comment="MozillaFirefox-translations-other-68.2.0-78.51.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571490" comment="firefox-atk-lang-2.26.1-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571491" comment="firefox-gdk-pixbuf-lang-2.36.11-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571492" comment="firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571493" comment="firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571494" comment="firefox-gio-branding-upstream-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571495" comment="firefox-glib2-lang-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571496" comment="firefox-glib2-tools-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571497" comment="firefox-gtk3-branding-upstream-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571498" comment="firefox-gtk3-data-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571499" comment="firefox-gtk3-immodule-amharic-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571500" comment="firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571501" comment="firefox-gtk3-immodule-multipress-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571502" comment="firefox-gtk3-immodule-thai-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571503" comment="firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571504" comment="firefox-gtk3-immodule-xim-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571505" comment="firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571506" comment="firefox-gtk3-lang-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571507" comment="firefox-gtk3-tools-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571508" comment="firefox-libatk-1_0-0-2.26.1-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571509" comment="firefox-libcairo-gobject2-1.15.10-2.13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571510" comment="firefox-libcairo2-1.15.10-2.13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571511" comment="firefox-libffi4-5.3.1+r233831-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571512" comment="firefox-libffi7-3.2.1.git259-2.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571513" comment="firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571514" comment="firefox-libgtk-3-0-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571515" comment="firefox-libharfbuzz0-1.7.5-2.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571516" comment="firefox-libpango-1_0-0-1.40.14-2.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571517" comment="libfirefox-gio-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571518" comment="libfirefox-glib-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571519" comment="libfirefox-gmodule-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571520" comment="libfirefox-gobject-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571521" comment="libfirefox-gthread-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571522" comment="libfreebl3-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571523" comment="libfreebl3-32bit-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571524" comment="libsoftokn3-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571525" comment="libsoftokn3-32bit-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571526" comment="mozilla-nspr-4.21-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571527" comment="mozilla-nspr-32bit-4.21-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582389" comment="mozilla-nspr-devel-4.21-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571528" comment="mozilla-nss-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571529" comment="mozilla-nss-32bit-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571530" comment="mozilla-nss-certs-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571531" comment="mozilla-nss-certs-32bit-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582390" comment="mozilla-nss-devel-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571532" comment="mozilla-nss-tools-3.45-38.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219917" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss, mozilla-nspr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1137338" ref_url="https://bugzilla.suse.com/1137338" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2019:14114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005661.html" source="SUSE-SU"/>
		<description>

This update contains Mozilla Firefox 60.7ESR.

It brings lots of security fixes and other improvements.

It also includes new additional helper libraries to allow Firefox to run on SUSE Linux Enterprise 11.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1137338">SUSE bug 1137338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571533" comment="MozillaFirefox-60.7.0esr-78.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571534" comment="MozillaFirefox-branding-SLED-60-21.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571535" comment="MozillaFirefox-translations-common-60.7.0esr-78.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571536" comment="MozillaFirefox-translations-other-60.7.0esr-78.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582391" comment="firefox-at-spi2-core-2.10.2-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582392" comment="firefox-at-spi2-core-lang-2.10.2-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582393" comment="firefox-atk-lang-2.26.1-2.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582394" comment="firefox-dbus-1-glib-0.76-34.2.4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582395" comment="firefox-gdk-pixbuf-lang-2.36.11-2.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582396" comment="firefox-gdk-pixbuf-query-loaders-2.36.11-2.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582397" comment="firefox-gdk-pixbuf-thumbnailer-2.36.11-2.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582398" comment="firefox-gio-branding-upstream-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582399" comment="firefox-glib2-lang-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582400" comment="firefox-glib2-tools-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582401" comment="firefox-gtk3-branding-upstream-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582402" comment="firefox-gtk3-data-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582403" comment="firefox-gtk3-immodule-amharic-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582404" comment="firefox-gtk3-immodule-inuktitut-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582405" comment="firefox-gtk3-immodule-multipress-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582406" comment="firefox-gtk3-immodule-thai-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582407" comment="firefox-gtk3-immodule-vietnamese-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582408" comment="firefox-gtk3-immodule-xim-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582409" comment="firefox-gtk3-immodules-tigrigna-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582410" comment="firefox-gtk3-lang-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582411" comment="firefox-gtk3-tools-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582412" comment="firefox-libatk-1_0-0-2.26.1-2.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582413" comment="firefox-libatk-bridge-2_0-0-2.10.2-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582414" comment="firefox-libatspi0-2.10.2-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582415" comment="firefox-libcairo-gobject2-1.15.10-2.8.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582416" comment="firefox-libcairo2-1.15.10-2.8.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582417" comment="firefox-libfreetype6-2.9-2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582418" comment="firefox-libgcc_s1-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582419" comment="firefox-libgdk_pixbuf-2_0-0-2.36.11-2.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582420" comment="firefox-libgtk-3-0-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582421" comment="firefox-libharfbuzz0-1.7.5-2.4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582422" comment="firefox-libpango-1_0-0-1.40.14-2.4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582423" comment="firefox-libpixman-1-0-0.34.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582424" comment="firefox-libstdc++6-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582425" comment="libfirefox-gio-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582426" comment="libfirefox-glib-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582427" comment="libfirefox-gmodule-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582428" comment="libfirefox-gobject-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582429" comment="libfirefox-gthread-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582430" comment="libfreebl3-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582431" comment="libfreebl3-32bit-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582432" comment="libsoftokn3-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582433" comment="libsoftokn3-32bit-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582434" comment="mozilla-nspr-4.20-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582435" comment="mozilla-nspr-32bit-4.20-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582436" comment="mozilla-nspr-devel-4.20-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582437" comment="mozilla-nss-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582438" comment="mozilla-nss-32bit-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582439" comment="mozilla-nss-certs-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582440" comment="mozilla-nss-certs-32bit-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582441" comment="mozilla-nss-devel-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582442" comment="mozilla-nss-tools-3.41.1-38.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219918" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="940806" ref_url="https://bugzilla.suse.com/940806" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4474" ref_url="https://www.suse.com/security/cve/CVE-2015-4474/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001588.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox is being updated to the current Firefox 38ESR branch (specifically the 38.2.0ESR release).

Security issues fixed:
- MFSA 2015-78 / CVE-2015-4495: Same origin violation and local file stealing via PDF reader
- MFSA 2015-79 / CVE-2015-4473/CVE-2015-4474: Miscellaneous memory safety hazards (rv:40.0 / rv:38.2)
- MFSA 2015-80 / CVE-2015-4475: Out-of-bounds read with malformed MP3 file
- MFSA 2015-82 / CVE-2015-4478: Redefinition of non-configurable JavaScript object properties
- MFSA 2015-83 / CVE-2015-4479: Overflow issues in libstagefright
- MFSA 2015-87 / CVE-2015-4484: Crash when using shared memory in JavaScript
- MFSA 2015-88 / CVE-2015-4491: Heap overflow in gdk-pixbuf when scaling bitmap images
- MFSA 2015-89 / CVE-2015-4485/CVE-2015-4486: Buffer overflows on Libvpx when decoding WebM video
- MFSA 2015-90 / CVE-2015-4487/CVE-2015-4488/CVE-2015-4489: Vulnerabilities found through code inspection
- MFSA 2015-92 / CVE-2015-4492: Use-after-free in XMLHttpRequest with shared workers

This update also contains a lot of feature improvements and bug fixes from 31ESR to 38ESR.

Also the Mozilla NSS library switched its CKBI API from 1.98 to 2.4, which is what Firefox 38ESR uses.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-10"/>
	<updated date="2015-09-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4473">CVE-2015-4473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4474/">CVE-2015-4474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4474">CVE-2015-4474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4475">CVE-2015-4475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4478">CVE-2015-4478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4479">CVE-2015-4479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4484">CVE-2015-4484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4485">CVE-2015-4485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4486">CVE-2015-4486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4487">CVE-2015-4487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4488">CVE-2015-4488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4489">CVE-2015-4489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4491">CVE-2015-4491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4492">CVE-2015-4492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4495">CVE-2015-4495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577787" comment="MozillaFirefox-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577788" comment="MozillaFirefox-branding-SLED-31.0-0.12.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577790" comment="MozillaFirefox-translations-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577791" comment="libfreebl3-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577792" comment="libfreebl3-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577793" comment="libfreebl3-x86-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577794" comment="libsoftokn3-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577795" comment="libsoftokn3-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577796" comment="libsoftokn3-x86-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577797" comment="mozilla-nss-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577798" comment="mozilla-nss-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577799" comment="mozilla-nss-tools-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577800" comment="mozilla-nss-x86-3.19.2.0-0.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577787" comment="MozillaFirefox-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577788" comment="MozillaFirefox-branding-SLED-31.0-0.12.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577790" comment="MozillaFirefox-translations-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577791" comment="libfreebl3-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577792" comment="libfreebl3-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577793" comment="libfreebl3-x86-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577794" comment="libsoftokn3-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577795" comment="libsoftokn3-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577796" comment="libsoftokn3-x86-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577797" comment="mozilla-nss-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577798" comment="mozilla-nss-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577799" comment="mozilla-nss-tools-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577800" comment="mozilla-nss-x86-3.19.2.0-0.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219919" version="1" class="patch">
	<metadata>
		<title>Security update for fontconfig (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="992534" ref_url="https://bugzilla.suse.com/992534" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5384" ref_url="https://www.suse.com/security/cve/CVE-2016-5384/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002238.html" source="SUSE-SU"/>
		<description>

This update for fontconfig fixes the following issues:

- security update:
  * CVE-2016-5384: Possible double free due to insufficiently validated cache files [bsc#992534]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-30"/>
	<updated date="2016-08-30"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/992534">SUSE bug 992534</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5384/">CVE-2016-5384 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5384">CVE-2016-5384 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582443" comment="fontconfig-2.6.0-10.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582444" comment="fontconfig-32bit-2.6.0-10.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582445" comment="fontconfig-x86-2.6.0-10.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582443" comment="fontconfig-2.6.0-10.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582444" comment="fontconfig-32bit-2.6.0-10.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582445" comment="fontconfig-x86-2.6.0-10.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219920" version="1" class="patch">
	<metadata>
		<title>Security update for foomatic-filters (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="957531" ref_url="https://bugzilla.suse.com/957531" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8327" ref_url="https://www.suse.com/security/cve/CVE-2015-8327/" source="CVE"/>
		<reference ref_id="CVE-2015-8560" ref_url="https://www.suse.com/security/cve/CVE-2015-8560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001799.html" source="SUSE-SU"/>
		<description>

This update fixes the following security issues:

CVE-2015-8327: adds backtick and semicolon to the list of illegal shell escape characters (bsc#957531).
CVE-2015-8560: fixed code execution via improper escaping of ;  (bsc#957531).   
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-13"/>
	<updated date="2016-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/957531">SUSE bug 957531</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8327/">CVE-2015-8327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8327">CVE-2015-8327 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8560/">CVE-2015-8560 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8560">CVE-2015-8560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577807" comment="foomatic-filters-3.0.2-269.39.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577807" comment="foomatic-filters-3.0.2-269.39.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219921" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1041445" ref_url="https://bugzilla.suse.com/1041445" source="BUGZILLA"/>
		<reference ref_id="912873" ref_url="https://bugzilla.suse.com/912873" source="BUGZILLA"/>
		<reference ref_id="935573" ref_url="https://bugzilla.suse.com/935573" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4680" ref_url="https://www.suse.com/security/cve/CVE-2015-4680/" source="CVE"/>
		<reference ref_id="CVE-2017-9148" ref_url="https://www.suse.com/security/cve/CVE-2017-9148/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003008.html" source="SUSE-SU"/>
		<description>
This update for freeradius-server fixes the following issues:

- CVE-2017-9148: Disable OpenSSL's internal session cache to mitigate
  authentication bypass. (bnc#1041445)
- CVE-2015-4680: Add a configuration option to allow checking of all
  intermediate certificates for revocations. (bnc#935573)

The following non security issue was fixed:

- Cannot create table radpostauth because of deprecated TIMESTAMP(14) syntax. (bsc#912873)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-04"/>
	<updated date="2017-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1041445">SUSE bug 1041445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912873">SUSE bug 912873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935573">SUSE bug 935573</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4680/">CVE-2015-4680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4680">CVE-2015-4680 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-9148/">CVE-2017-9148 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9148">CVE-2017-9148 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582446" comment="freeradius-server-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582447" comment="freeradius-server-dialupadmin-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582448" comment="freeradius-server-doc-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582449" comment="freeradius-server-libs-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582450" comment="freeradius-server-utils-2.1.1-7.24.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582446" comment="freeradius-server-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582447" comment="freeradius-server-dialupadmin-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582448" comment="freeradius-server-doc-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582449" comment="freeradius-server-libs-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582450" comment="freeradius-server-utils-2.1.1-7.24.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219922" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1049086" ref_url="https://bugzilla.suse.com/1049086" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10978" ref_url="https://www.suse.com/security/cve/CVE-2017-10978/" source="CVE"/>
		<reference ref_id="CVE-2017-10979" ref_url="https://www.suse.com/security/cve/CVE-2017-10979/" source="CVE"/>
		<reference ref_id="CVE-2017-10981" ref_url="https://www.suse.com/security/cve/CVE-2017-10981/" source="CVE"/>
		<reference ref_id="CVE-2017-10982" ref_url="https://www.suse.com/security/cve/CVE-2017-10982/" source="CVE"/>
		<reference ref_id="CVE-2017-10983" ref_url="https://www.suse.com/security/cve/CVE-2017-10983/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003154.html" source="SUSE-SU"/>
		<description>
This update for freeradius-server fixes the following issues:

Security issues fixed:
- CVE-2017-10981: DHCP - Fix memory leak in fr_dhcp_decode(). (bnc#1049086)
- CVE-2017-10982: Fix buffer over-read in fr_dhcp_decode_options(). (bsc#1049086)
- CVE-2017-10983: Fix read overflow when decoding option 63. (bnc#1049086)
- CVE-2017-10978: Fix read / write overflow in make_secret(). (bnc#1049086)
- CVE-2017-10979: Fix write overflow in rad_coalesce(). (bsc#1049086)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-23"/>
	<updated date="2017-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049086">SUSE bug 1049086</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10978/">CVE-2017-10978 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10978">CVE-2017-10978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10979/">CVE-2017-10979 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10979">CVE-2017-10979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10981/">CVE-2017-10981 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10981">CVE-2017-10981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10982/">CVE-2017-10982 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10982">CVE-2017-10982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10983/">CVE-2017-10983 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10983">CVE-2017-10983 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582451" comment="freeradius-server-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582452" comment="freeradius-server-dialupadmin-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582453" comment="freeradius-server-doc-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582454" comment="freeradius-server-libs-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582455" comment="freeradius-server-utils-2.1.1-7.25.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582451" comment="freeradius-server-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582452" comment="freeradius-server-dialupadmin-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582453" comment="freeradius-server-doc-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582454" comment="freeradius-server-libs-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582455" comment="freeradius-server-utils-2.1.1-7.25.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219923" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="945849" ref_url="https://bugzilla.suse.com/945849" source="BUGZILLA"/>
		<reference ref_id="947966" ref_url="https://bugzilla.suse.com/947966" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9745" ref_url="https://www.suse.com/security/cve/CVE-2014-9745/" source="CVE"/>
		<reference ref_id="CVE-2014-9747" ref_url="https://www.suse.com/security/cve/CVE-2014-9747/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002028.html" source="SUSE-SU"/>
		<description>

This update of the freetype2 library fixes two security issues:

- An infinite loop in parse_encoding in t1load.c (CVE-2014-9745, bsc#945849)
- Use of uninitialized memory in ps_parser_load_field, t42_parse_font_matrix and t1_parse_font_matrix (CVE-2014-9747, bsc#947966)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-25"/>
	<updated date="2016-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/945849">SUSE bug 945849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947966">SUSE bug 947966</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9745/">CVE-2014-9745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9745">CVE-2014-9745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9747/">CVE-2014-9747 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9747">CVE-2014-9747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582456" comment="freetype2-2.3.7-25.41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582457" comment="freetype2-32bit-2.3.7-25.41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582458" comment="freetype2-x86-2.3.7-25.41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582459" comment="ft2demos-2.3.7-25.41.4 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582456" comment="freetype2-2.3.7-25.41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582457" comment="freetype2-32bit-2.3.7-25.41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582458" comment="freetype2-x86-2.3.7-25.41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582459" comment="ft2demos-2.3.7-25.41.4 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219924" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1028103" ref_url="https://bugzilla.suse.com/1028103" source="BUGZILLA"/>
		<reference ref_id="1035807" ref_url="https://bugzilla.suse.com/1035807" source="BUGZILLA"/>
		<reference ref_id="1036457" ref_url="https://bugzilla.suse.com/1036457" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10244" ref_url="https://www.suse.com/security/cve/CVE-2016-10244/" source="CVE"/>
		<reference ref_id="CVE-2017-8105" ref_url="https://www.suse.com/security/cve/CVE-2017-8105/" source="CVE"/>
		<reference ref_id="CVE-2017-8287" ref_url="https://www.suse.com/security/cve/CVE-2017-8287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003736.html" source="SUSE-SU"/>
		<description>

This update for freetype2 fixes the following issues:

Security issue fixed:
- CVE-2016-10244: The parse_charstrings function in type1/t1load.c did not
  ensure that a font contains a glyph name, which allowed remote attackers
  to cause a denial of service (heap-based buffer over-read) or possibly
  have unspecified other impact via a crafted file (bsc#1028103).

- CVE-2017-8105: Fixed an out-of-bounds write caused by a heap-based
  buffer overflow related to the t1_decoder_parse_charstrings function in
  psaux/t1decode.ca (bsc#1035807)
- CVE-2017-8287: an out-of-bounds write caused by a heap-based buffer
  overflow related to the t1_builder_close_contour function in psaux/psobjs.c
  (bsc#1036457)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1028103">SUSE bug 1028103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035807">SUSE bug 1035807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036457">SUSE bug 1036457</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10244/">CVE-2016-10244 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10244">CVE-2016-10244 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8105/">CVE-2017-8105 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8105">CVE-2017-8105 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8287/">CVE-2017-8287 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8287">CVE-2017-8287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582460" comment="freetype2-2.3.7-25.45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582461" comment="freetype2-32bit-2.3.7-25.45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582462" comment="freetype2-x86-2.3.7-25.45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582463" comment="ft2demos-2.3.7-25.45.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582460" comment="freetype2-2.3.7-25.45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582461" comment="freetype2-32bit-2.3.7-25.45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582462" comment="freetype2-x86-2.3.7-25.45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582463" comment="ft2demos-2.3.7-25.45.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219925" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1034191" ref_url="https://bugzilla.suse.com/1034191" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10328" ref_url="https://www.suse.com/security/cve/CVE-2016-10328/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003851.html" source="SUSE-SU"/>
		<description>
This update for freetype2 fixes the following issues:

Security issue fixed:

- CVE-2016-10328: Fixed heap-based buffer overflow in cff_parser_run function in cff/cffparse.c (bsc#1034191).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-29"/>
	<updated date="2018-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034191">SUSE bug 1034191</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10328/">CVE-2016-10328 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10328">CVE-2016-10328 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582464" comment="freetype2-2.3.7-25.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582465" comment="freetype2-32bit-2.3.7-25.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582466" comment="freetype2-x86-2.3.7-25.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582467" comment="ft2demos-2.3.7-25.45.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582464" comment="freetype2-2.3.7-25.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582465" comment="freetype2-32bit-2.3.7-25.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582466" comment="freetype2-x86-2.3.7-25.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582467" comment="ft2demos-2.3.7-25.45.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219926" version="1" class="patch">
	<metadata>
		<title>Security update for fuse (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1101797" ref_url="https://bugzilla.suse.com/1101797" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10906" ref_url="https://www.suse.com/security/cve/CVE-2018-10906/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005097.html" source="SUSE-SU"/>
		<description>
This update for fuse fixes the following issues:

Security issue fixed:

- CVE-2018-10906: Fix a bypass of the user_allow_other restriction (bsc#1101797)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-08"/>
	<updated date="2019-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101797">SUSE bug 1101797</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10906/">CVE-2018-10906 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10906">CVE-2018-10906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582468" comment="fuse-2.8.7-0.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582469" comment="libfuse2-2.8.7-0.11.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582468" comment="fuse-2.8.7-0.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582469" comment="libfuse2-2.8.7-0.11.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219927" version="1" class="patch">
	<metadata>
		<title>Security update for gcc43 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1039513" ref_url="https://bugzilla.suse.com/1039513" source="BUGZILLA"/>
		<reference ref_id="1044016" ref_url="https://bugzilla.suse.com/1044016" source="BUGZILLA"/>
		<reference ref_id="1045091" ref_url="https://bugzilla.suse.com/1045091" source="BUGZILLA"/>
		<reference ref_id="1059075" ref_url="https://bugzilla.suse.com/1059075" source="BUGZILLA"/>
		<reference ref_id="1074621" ref_url="https://bugzilla.suse.com/1074621" source="BUGZILLA"/>
		<reference ref_id="938159" ref_url="https://bugzilla.suse.com/938159" source="BUGZILLA"/>
		<reference ref_id="977654" ref_url="https://bugzilla.suse.com/977654" source="BUGZILLA"/>
		<reference ref_id="999596" ref_url="https://bugzilla.suse.com/999596" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000376" ref_url="https://www.suse.com/security/cve/CVE-2017-1000376/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0300-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007862.html" source="SUSE-SU"/>
		<description>

  
This update for gcc43 fixes the following issues:

Security issue fixed:

- CVE-2017-1000376: Don't request excutable stack from libffi.  [bnc#1045091]

New features:

- Add support for retpolines to mitigate the Spectre Variant 2 attack. [bnc#1074621]
- Add support for zero-sized VLAs and allocas with -fstack-clash-protection.  [bnc#1059075]
- Add support for -fstack-clash-protection to mitigate the Stack Clash attack.  [bnc#1039513]

Non security bugs fixed:

- Fixed build of 32bit libgcov.a with LFS support.  [bsc#1044016]
- Fixed issue with libstdc++ functional when an exception is thrown during construction.  [bsc#999596]
- Fixed issue with using gcov and #pragma pack.  [bsc#977654]
- Fixed ICE compiling AFS modules for the s390x kernel.  [bsc#938159]
- Backport large file support from GCC 4.6.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1039513">SUSE bug 1039513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044016">SUSE bug 1044016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045091">SUSE bug 1045091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059075">SUSE bug 1059075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074621">SUSE bug 1074621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938159">SUSE bug 938159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977654">SUSE bug 977654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999596">SUSE bug 999596</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000376/">CVE-2017-1000376 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000376">CVE-2017-1000376 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564367" comment="cpp43-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582470" comment="gcc43-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582471" comment="gcc43-32bit-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582472" comment="gcc43-c++-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582473" comment="gcc43-info-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582474" comment="gcc43-locale-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582475" comment="libstdc++43-devel-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582476" comment="libstdc++43-devel-32bit-4.3.4_20091019-37.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564367" comment="cpp43-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582470" comment="gcc43-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582471" comment="gcc43-32bit-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582472" comment="gcc43-c++-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582473" comment="gcc43-info-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582474" comment="gcc43-locale-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582475" comment="libstdc++43-devel-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582476" comment="libstdc++43-devel-32bit-4.3.4_20091019-37.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219928" version="1" class="patch">
	<metadata>
		<title>Security update for gcc43 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1086069" ref_url="https://bugzilla.suse.com/1086069" source="BUGZILLA"/>
		<reference ref_id="1092807" ref_url="https://bugzilla.suse.com/1092807" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004112.html" source="SUSE-SU"/>
		<description>
This update for gcc43 fixes the following issues:

This update adds support for 'expolines' on s390x, allowing fixing CVE-2017-5715 in a more lightweight fashion. (bsc#1086069)

The option flags are the same as for the x86 retpolines.

A compiler crash when building userland packages with x86 retpolines was fixed. (bsc#1092807)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-05"/>
	<updated date="2018-06-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086069">SUSE bug 1086069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092807">SUSE bug 1092807</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564377" comment="cpp43-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582477" comment="gcc43-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582478" comment="gcc43-32bit-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582479" comment="gcc43-c++-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582480" comment="gcc43-info-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582481" comment="gcc43-locale-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582482" comment="libstdc++43-devel-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582483" comment="libstdc++43-devel-32bit-4.3.4_20091019-37.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564377" comment="cpp43-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582477" comment="gcc43-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582478" comment="gcc43-32bit-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582479" comment="gcc43-c++-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582480" comment="gcc43-info-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582481" comment="gcc43-locale-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582482" comment="libstdc++43-devel-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582483" comment="libstdc++43-devel-32bit-4.3.4_20091019-37.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219929" version="1" class="patch">
	<metadata>
		<title>Security update for gcc5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="939460" ref_url="https://bugzilla.suse.com/939460" source="BUGZILLA"/>
		<reference ref_id="945842" ref_url="https://bugzilla.suse.com/945842" source="BUGZILLA"/>
		<reference ref_id="953831" ref_url="https://bugzilla.suse.com/953831" source="BUGZILLA"/>
		<reference ref_id="955382" ref_url="https://bugzilla.suse.com/955382" source="BUGZILLA"/>
		<reference ref_id="962765" ref_url="https://bugzilla.suse.com/962765" source="BUGZILLA"/>
		<reference ref_id="964468" ref_url="https://bugzilla.suse.com/964468" source="BUGZILLA"/>
		<reference ref_id="966220" ref_url="https://bugzilla.suse.com/966220" source="BUGZILLA"/>
		<reference ref_id="968771" ref_url="https://bugzilla.suse.com/968771" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001973.html" source="SUSE-SU"/>
		<description>

The GNU Compiler Collection was updated to version 5.3.1, which brings several fixes
and enhancements.

The following security issue has been fixed:

- Fix C++11 std::random_device short read issue that could lead to predictable
  randomness. (CVE-2015-5276, bsc#945842)

The following non-security issues have been fixed:

- Enable frame pointer for TARGET_64BIT_MS_ABI when stack is misaligned. Fixes internal
  compiler error when building Wine. (bsc#966220)
- Fix a PowerPC specific issue in gcc-go that broke compilation of newer versions of
  Docker. (bsc#964468)
- Fix HTM built-ins on PowerPC. (bsc#955382)
- Fix libgo certificate lookup. (bsc#953831)
- Suppress deprecated-declarations warnings for inline definitions of deprecated virtual
  methods. (bsc#939460)
- Revert accidental libffi ABI breakage on aarch64. (bsc#968771)
- On x86_64, set default 32bit code generation to -march=x86-64 rather than -march=i586.
- Add experimental File System TS library.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-30"/>
	<updated date="2016-03-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/939460">SUSE bug 939460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945842">SUSE bug 945842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953831">SUSE bug 953831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955382">SUSE bug 955382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962765">SUSE bug 962765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964468">SUSE bug 964468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966220">SUSE bug 966220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968771">SUSE bug 968771</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5276">CVE-2015-5276 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582484" comment="libatomic1-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582485" comment="libatomic1-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582486" comment="libffi4-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582487" comment="libffi4-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582488" comment="libgcc_s1-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582489" comment="libgcc_s1-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582490" comment="libgfortran3-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582491" comment="libgfortran3-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582492" comment="libgomp1-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582493" comment="libgomp1-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582494" comment="libquadmath0-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567327" comment="libquadmath0-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582495" comment="libstdc++6-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582496" comment="libstdc++6-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582497" comment="libstdc++6-locale-5.3.1+r233831-10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582484" comment="libatomic1-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582485" comment="libatomic1-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582486" comment="libffi4-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582487" comment="libffi4-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582488" comment="libgcc_s1-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582489" comment="libgcc_s1-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582490" comment="libgfortran3-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582491" comment="libgfortran3-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582492" comment="libgomp1-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582493" comment="libgomp1-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582494" comment="libquadmath0-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567327" comment="libquadmath0-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582495" comment="libstdc++6-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582496" comment="libstdc++6-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582497" comment="libstdc++6-locale-5.3.1+r233831-10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219930" version="1" class="patch">
	<metadata>
		<title>Optional update for gcc5, binutils and gdb (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="776968" ref_url="https://bugzilla.suse.com/776968" source="BUGZILLA"/>
		<reference ref_id="877566" ref_url="https://bugzilla.suse.com/877566" source="BUGZILLA"/>
		<reference ref_id="891040" ref_url="https://bugzilla.suse.com/891040" source="BUGZILLA"/>
		<reference ref_id="896586" ref_url="https://bugzilla.suse.com/896586" source="BUGZILLA"/>
		<reference ref_id="936050" ref_url="https://bugzilla.suse.com/936050" source="BUGZILLA"/>
		<reference ref_id="943792" ref_url="https://bugzilla.suse.com/943792" source="BUGZILLA"/>
		<reference ref_id="945634" ref_url="https://bugzilla.suse.com/945634" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3509" ref_url="https://www.suse.com/security/cve/CVE-2012-3509/" source="CVE"/>
		<reference ref_id="SUSE-OU-2015:1803-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-October/003638.html" source="SUSE-SU"/>
		<description>

The core toolchain components were updated to newer version to bring
various features, improved performance and usability, and also bugfixes.

This GNU Compiler Collection feature update is provided for the
Intel/AMD x86_64, IBM zSeries and IBM PowerPC 64bit architectures.

The GNU Compiler Collection 5.2 is provided new with this update.

Changes to previously released GCC 4.8 series are documented on:
	https://gcc.gnu.org/gcc-4.9/changes.html
and
	https://gcc.gnu.org/gcc-5/changes.html

Major features:
* AddressSanitzer, UndefinedBehaviour and PointerBoundsChecker checking
  frameworks were added.
* Lots of Register Allocation, Link Time, Interprocedural and Feedback Directed
  optimization improvements were done.
* Architecture support for IBM zSeries z13.
* The new libstdc++ CXX11 ABI is available, (The old ABI is still used by default.)

The binutils suite was updated to version 2.25.0, bringing new platform
support, features and and bugfixes, including:

* IBM zSeries z13 hardware support (fate#318036, bnc#936050).
* various IBM Power8 improvements (fate#318238, bnc#926412).
* AVX512 support on the Intel EM64T platform (fate#318520).
* CVE-2012-3509: Fixed a integer overflow in libiberty.

The GNU Debugger gdb was updated to version 7.9.1, bringing new platform
support, features and bugfixes. The gdb update also includes IBM zSeries z13
support.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-01"/>
	<updated date="2015-10-01"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/776968">SUSE bug 776968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877566">SUSE bug 877566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891040">SUSE bug 891040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896586">SUSE bug 896586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936050">SUSE bug 936050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943792">SUSE bug 943792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945634">SUSE bug 945634</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3509/">CVE-2012-3509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3509">CVE-2012-3509 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009589938" comment="binutils-2.25.0-5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589939" comment="gdb-7.9.1-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589940" comment="gdb-x86-7.9.1-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589941" comment="libatomic1-5.2.1+r226025-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589942" comment="libatomic1-32bit-5.2.1+r226025-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589943" comment="libffi4-5.2.1+r226025-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589944" comment="libffi4-32bit-5.2.1+r226025-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589945" comment="libgcc_s1-5.2.1+r226025-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589946" comment="libgcc_s1-32bit-5.2.1+r226025-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589947" comment="libgfortran3-5.2.1+r226025-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589948" comment="libgfortran3-32bit-5.2.1+r226025-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589949" comment="libgomp1-5.2.1+r226025-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589950" comment="libgomp1-32bit-5.2.1+r226025-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589951" comment="libquadmath0-5.2.1+r226025-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589934" comment="libquadmath0-32bit-5.2.1+r226025-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589952" comment="libstdc++6-5.2.1+r226025-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589953" comment="libstdc++6-32bit-5.2.1+r226025-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589954" comment="libstdc++6-locale-5.2.1+r226025-2.4 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009589938" comment="binutils-2.25.0-5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589939" comment="gdb-7.9.1-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589940" comment="gdb-x86-7.9.1-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589941" comment="libatomic1-5.2.1+r226025-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589942" comment="libatomic1-32bit-5.2.1+r226025-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589943" comment="libffi4-5.2.1+r226025-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589944" comment="libffi4-32bit-5.2.1+r226025-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589945" comment="libgcc_s1-5.2.1+r226025-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589946" comment="libgcc_s1-32bit-5.2.1+r226025-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589947" comment="libgfortran3-5.2.1+r226025-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589948" comment="libgfortran3-32bit-5.2.1+r226025-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589949" comment="libgomp1-5.2.1+r226025-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589950" comment="libgomp1-32bit-5.2.1+r226025-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589951" comment="libquadmath0-5.2.1+r226025-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589934" comment="libquadmath0-32bit-5.2.1+r226025-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589952" comment="libstdc++6-5.2.1+r226025-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589953" comment="libstdc++6-32bit-5.2.1+r226025-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009589954" comment="libstdc++6-locale-5.2.1+r226025-2.4 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219931" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="988032" ref_url="https://bugzilla.suse.com/988032" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6161" ref_url="https://www.suse.com/security/cve/CVE-2016-6161/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002270.html" source="SUSE-SU"/>
		<description>

This update for gd fixes the following issues:

- security update:
  * CVE-2016-6161: global out of bounds read when encoding gif from malformed input withgd2togif [bsc#988032]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-14"/>
	<updated date="2016-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/988032">SUSE bug 988032</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6161/">CVE-2016-6161 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6161">CVE-2016-6161 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582498" comment="gd-2.0.36.RC1-52.22.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582498" comment="gd-2.0.36.RC1-52.22.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219932" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1004924" ref_url="https://bugzilla.suse.com/1004924" source="BUGZILLA"/>
		<reference ref_id="1005274" ref_url="https://bugzilla.suse.com/1005274" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6911" ref_url="https://www.suse.com/security/cve/CVE-2016-6911/" source="CVE"/>
		<reference ref_id="CVE-2016-8670" ref_url="https://www.suse.com/security/cve/CVE-2016-8670/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002375.html" source="SUSE-SU"/>
		<description>

This update for gd fixes the following issues:

- CVE-2016-8670: Stack Buffer Overflow in GD dynamicGetbuf (bsc#1004924)
- CVE-2016-6911: Check for out-of-bound read in dynamicGetbuf() (bsc#1005274)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-28"/>
	<updated date="2016-10-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1004924">SUSE bug 1004924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005274">SUSE bug 1005274</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6911/">CVE-2016-6911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6911">CVE-2016-6911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8670/">CVE-2016-8670 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8670">CVE-2016-8670 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582499" comment="gd-2.0.36.RC1-52.25.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582499" comment="gd-2.0.36.RC1-52.25.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219933" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1015187" ref_url="https://bugzilla.suse.com/1015187" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9933" ref_url="https://www.suse.com/security/cve/CVE-2016-9933/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002518.html" source="SUSE-SU"/>
		<description>

This update for gd fixes the following issues:

  * CVE-2016-9933 possible stackoverflow on malicious truecolor images [bsc#1015187]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-22"/>
	<updated date="2016-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015187">SUSE bug 1015187</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9933/">CVE-2016-9933 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9933">CVE-2016-9933 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582500" comment="gd-2.0.36.RC1-52.29.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582500" comment="gd-2.0.36.RC1-52.29.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219934" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1022264" ref_url="https://bugzilla.suse.com/1022264" source="BUGZILLA"/>
		<reference ref_id="1022265" ref_url="https://bugzilla.suse.com/1022265" source="BUGZILLA"/>
		<reference ref_id="1022283" ref_url="https://bugzilla.suse.com/1022283" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167/" source="CVE"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-9317" ref_url="https://www.suse.com/security/cve/CVE-2016-9317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002640.html" source="SUSE-SU"/>
		<description>

This update for gd fixes the following security issues:

- CVE-2016-9317: The gdImageCreate function in the GD Graphics Library
  (aka libgd) allowed remote attackers to cause a denial of service
  (system hang) via an oversized image.  (bsc#1022283)
- CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx()
  could lead to libgd running out of memory even on small files. (bsc#1022264)
- CVE-2016-10168: A signed integer overflow in the GD Graphics Library (aka libgd) could lead
  to memory corruption (bsc#1022265)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-14"/>
	<updated date="2017-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022264">SUSE bug 1022264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022265">SUSE bug 1022265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022283">SUSE bug 1022283</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10167">CVE-2016-10167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10168">CVE-2016-10168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9317/">CVE-2016-9317 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9317">CVE-2016-9317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582501" comment="gd-2.0.36.RC1-52.32.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582501" comment="gd-2.0.36.RC1-52.32.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219935" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1025223" ref_url="https://bugzilla.suse.com/1025223" source="BUGZILLA"/>
		<reference ref_id="1076391" ref_url="https://bugzilla.suse.com/1076391" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5711" ref_url="https://www.suse.com/security/cve/CVE-2018-5711/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003638.html" source="SUSE-SU"/>
		<description>
This update for gd fixes several issues.

This security issue was fixed:

- CVE-2018-5711: Prevent integer signedness error that could have lead to an
  infinite loop via a crafted GIF file allowing for DoS (bsc#1076391)

This non-security issue was fixed:

- Fixed gd2togif error message (bsc#1025223)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025223">SUSE bug 1025223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5711/">CVE-2018-5711 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5711">CVE-2018-5711 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582502" comment="gd-2.0.36.RC1-52.33.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582502" comment="gd-2.0.36.RC1-52.33.5.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219936" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1004237" ref_url="https://bugzilla.suse.com/1004237" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8602" ref_url="https://www.suse.com/security/cve/CVE-2016-8602/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002392.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2016-8602: Insufficient parameter check in .sethalftone5 (bsc#1004237)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-04"/>
	<updated date="2016-11-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1004237">SUSE bug 1004237</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8602/">CVE-2016-8602 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8602">CVE-2016-8602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582503" comment="ghostscript-fonts-other-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582504" comment="ghostscript-fonts-rus-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582505" comment="ghostscript-fonts-std-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582506" comment="ghostscript-library-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582507" comment="ghostscript-omni-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582508" comment="ghostscript-x11-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582509" comment="libgimpprint-4.2.7-32.41.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582503" comment="ghostscript-fonts-other-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582504" comment="ghostscript-fonts-rus-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582505" comment="ghostscript-fonts-std-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582506" comment="ghostscript-library-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582507" comment="ghostscript-omni-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582508" comment="ghostscript-x11-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582509" comment="libgimpprint-4.2.7-32.41.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219937" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1001951" ref_url="https://bugzilla.suse.com/1001951" source="BUGZILLA"/>
		<reference ref_id="939342" ref_url="https://bugzilla.suse.com/939342" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5653" ref_url="https://www.suse.com/security/cve/CVE-2013-5653/" source="CVE"/>
		<reference ref_id="CVE-2015-3228" ref_url="https://www.suse.com/security/cve/CVE-2015-3228/" source="CVE"/>
		<reference ref_id="CVE-2016-7977" ref_url="https://www.suse.com/security/cve/CVE-2016-7977/" source="CVE"/>
		<reference ref_id="CVE-2016-7979" ref_url="https://www.suse.com/security/cve/CVE-2016-7979/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002322.html" source="SUSE-SU"/>
		<description>

This update for ghostscript-library fixes the following issues:

- Multiple security vulnerabilities have been discovered where ghostscript's
  '-dsafer' flag did not provide sufficient protection against unintended
  access to the file system. Thus, a machine that would process a specially
  crafted Postscript file would potentially leak sensitive information to an
  attacker. (CVE-2013-5653, CVE-2016-7977, bsc#1001951)

- Insufficient validation of the type of input in .initialize_dsc_parser used
  to allow remote code execution. (CVE-2016-7979, bsc#1001951)

- An integer overflow in the gs_heap_alloc_bytes function used to allow remote
  attackers to cause a denial of service (crash) via specially  crafted
  Postscript files. (CVE-2015-3228, boo#939342)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-11"/>
	<updated date="2016-10-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1001951">SUSE bug 1001951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939342">SUSE bug 939342</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5653/">CVE-2013-5653 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5653">CVE-2013-5653 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3228/">CVE-2015-3228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3228">CVE-2015-3228 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7977/">CVE-2016-7977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7977">CVE-2016-7977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7979/">CVE-2016-7979 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7979">CVE-2016-7979 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582510" comment="ghostscript-fonts-other-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582511" comment="ghostscript-fonts-rus-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582512" comment="ghostscript-fonts-std-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582513" comment="ghostscript-library-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582514" comment="ghostscript-omni-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582515" comment="ghostscript-x11-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582516" comment="libgimpprint-4.2.7-32.38.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582510" comment="ghostscript-fonts-other-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582511" comment="ghostscript-fonts-rus-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582512" comment="ghostscript-fonts-std-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582513" comment="ghostscript-library-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582514" comment="ghostscript-omni-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582515" comment="ghostscript-x11-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582516" comment="libgimpprint-4.2.7-32.38.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219938" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1036453" ref_url="https://bugzilla.suse.com/1036453" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002842.html" source="SUSE-SU"/>
		<description>

This update for ghostscript fixes the following security vulnerability:

CVE-2017-8291: A remote command execution and a -dSAFER bypass via a crafted .eps document were
exploited in the wild. (bsc#1036453)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-03"/>
	<updated date="2017-05-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8291">CVE-2017-8291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582517" comment="ghostscript-fonts-other-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582518" comment="ghostscript-fonts-rus-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582519" comment="ghostscript-fonts-std-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582520" comment="ghostscript-library-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582521" comment="ghostscript-omni-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582522" comment="ghostscript-x11-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582523" comment="libgimpprint-4.2.7-32.44.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582517" comment="ghostscript-fonts-other-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582518" comment="ghostscript-fonts-rus-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582519" comment="ghostscript-fonts-std-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582520" comment="ghostscript-library-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582521" comment="ghostscript-omni-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582522" comment="ghostscript-x11-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582523" comment="libgimpprint-4.2.7-32.44.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219939" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1036453" ref_url="https://bugzilla.suse.com/1036453" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002892.html" source="SUSE-SU"/>
		<description>

This update for ghostscript fixes the following security vulnerability:

CVE-2017-8291: A remote command execution and a -dSAFER bypass via a crafted .eps document were
exploited in the wild. (bsc#1036453)

This update is a reissue including the SUSE Linux Enterprise 11 SP3 product.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-17"/>
	<updated date="2017-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8291">CVE-2017-8291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582524" comment="ghostscript-fonts-other-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582525" comment="ghostscript-fonts-rus-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582526" comment="ghostscript-fonts-std-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582527" comment="ghostscript-library-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582528" comment="ghostscript-omni-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582529" comment="ghostscript-x11-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582530" comment="libgimpprint-4.2.7-32.46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582524" comment="ghostscript-fonts-other-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582525" comment="ghostscript-fonts-rus-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582526" comment="ghostscript-fonts-std-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582527" comment="ghostscript-library-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582528" comment="ghostscript-omni-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582529" comment="ghostscript-x11-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582530" comment="libgimpprint-4.2.7-32.46.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219940" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1018128" ref_url="https://bugzilla.suse.com/1018128" source="BUGZILLA"/>
		<reference ref_id="1030263" ref_url="https://bugzilla.suse.com/1030263" source="BUGZILLA"/>
		<reference ref_id="1032138" ref_url="https://bugzilla.suse.com/1032138" source="BUGZILLA"/>
		<reference ref_id="1032230" ref_url="https://bugzilla.suse.com/1032230" source="BUGZILLA"/>
		<reference ref_id="1040643" ref_url="https://bugzilla.suse.com/1040643" source="BUGZILLA"/>
		<reference ref_id="1050879" ref_url="https://bugzilla.suse.com/1050879" source="BUGZILLA"/>
		<reference ref_id="1050887" ref_url="https://bugzilla.suse.com/1050887" source="BUGZILLA"/>
		<reference ref_id="1050888" ref_url="https://bugzilla.suse.com/1050888" source="BUGZILLA"/>
		<reference ref_id="1050889" ref_url="https://bugzilla.suse.com/1050889" source="BUGZILLA"/>
		<reference ref_id="1050891" ref_url="https://bugzilla.suse.com/1050891" source="BUGZILLA"/>
		<reference ref_id="1051184" ref_url="https://bugzilla.suse.com/1051184" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10219" ref_url="https://www.suse.com/security/cve/CVE-2016-10219/" source="CVE"/>
		<reference ref_id="CVE-2016-9601" ref_url="https://www.suse.com/security/cve/CVE-2016-9601/" source="CVE"/>
		<reference ref_id="CVE-2017-11714" ref_url="https://www.suse.com/security/cve/CVE-2017-11714/" source="CVE"/>
		<reference ref_id="CVE-2017-7207" ref_url="https://www.suse.com/security/cve/CVE-2017-7207/" source="CVE"/>
		<reference ref_id="CVE-2017-9216" ref_url="https://www.suse.com/security/cve/CVE-2017-9216/" source="CVE"/>
		<reference ref_id="CVE-2017-9612" ref_url="https://www.suse.com/security/cve/CVE-2017-9612/" source="CVE"/>
		<reference ref_id="CVE-2017-9726" ref_url="https://www.suse.com/security/cve/CVE-2017-9726/" source="CVE"/>
		<reference ref_id="CVE-2017-9727" ref_url="https://www.suse.com/security/cve/CVE-2017-9727/" source="CVE"/>
		<reference ref_id="CVE-2017-9739" ref_url="https://www.suse.com/security/cve/CVE-2017-9739/" source="CVE"/>
		<reference ref_id="CVE-2017-9835" ref_url="https://www.suse.com/security/cve/CVE-2017-9835/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003973.html" source="SUSE-SU"/>
		<description>
This update for ghostscript-library fixes several issues.
 
These security issues were fixed:

- CVE-2017-7207: The mem_get_bits_rectangle function allowed remote attackers
  to cause a denial of service (NULL pointer dereference) via a crafted
  PostScript document (bsc#1030263).
- CVE-2016-9601: Prevent heap-buffer overflow by checking for an integer
  overflow in jbig2_image_new function (bsc#1018128).
- CVE-2017-9612: The Ins_IP function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (use-after-free and application crash)
  or possibly have unspecified other impact via a crafted document (bsc#1050891)
- CVE-2017-9726: The Ins_MDRP function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050889)
- CVE-2017-9727: The gx_ttfReader__Read function in base/gxttfb.c allowed
  remote attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050888)
- CVE-2017-9739: The Ins_JMPR function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050887)
- CVE-2017-11714: psi/ztoken.c mishandled references to the scanner state
  structure, which allowed remote attackers to cause a denial of service
  (application crash) or possibly have unspecified other impact via a crafted
  PostScript document, related to an out-of-bounds read in the
  igc_reloc_struct_ptr function in psi/igc.c (bsc#1051184)
- CVE-2017-9835: The gs_alloc_ref_array function allowed remote attackers to
  cause a denial of service (heap-based buffer overflow and application crash) or
  possibly have unspecified other impact via a crafted PostScript document
  (bsc#1050879)
- CVE-2016-10219: The intersect function in base/gxfill.c allowed remote
  attackers to cause a denial of service (divide-by-zero error and application
  crash) via a crafted file (bsc#1032138)
- CVE-2017-9216: Prevent NULL pointer dereference in the jbig2_huffman_get
  function in jbig2_huffman.c which allowed for DoS (bsc#1040643)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-03"/>
	<updated date="2018-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1018128">SUSE bug 1018128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030263">SUSE bug 1030263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032138">SUSE bug 1032138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032230">SUSE bug 1032230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040643">SUSE bug 1040643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050879">SUSE bug 1050879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050887">SUSE bug 1050887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050888">SUSE bug 1050888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050889">SUSE bug 1050889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050891">SUSE bug 1050891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051184">SUSE bug 1051184</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10219/">CVE-2016-10219 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10219">CVE-2016-10219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9601/">CVE-2016-9601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9601">CVE-2016-9601 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11714/">CVE-2017-11714 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11714">CVE-2017-11714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7207/">CVE-2017-7207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7207">CVE-2017-7207 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9216/">CVE-2017-9216 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9216">CVE-2017-9216 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9612/">CVE-2017-9612 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9612">CVE-2017-9612 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9726/">CVE-2017-9726 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9726">CVE-2017-9726 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9727/">CVE-2017-9727 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9727">CVE-2017-9727 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9739/">CVE-2017-9739 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9739">CVE-2017-9739 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9835/">CVE-2017-9835 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9835">CVE-2017-9835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582531" comment="ghostscript-fonts-other-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582532" comment="ghostscript-fonts-rus-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582533" comment="ghostscript-fonts-std-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582534" comment="ghostscript-library-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582535" comment="ghostscript-omni-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582536" comment="ghostscript-x11-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582537" comment="libgimpprint-4.2.7-32.47.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582531" comment="ghostscript-fonts-other-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582532" comment="ghostscript-fonts-rus-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582533" comment="ghostscript-fonts-std-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582534" comment="ghostscript-library-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582535" comment="ghostscript-omni-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582536" comment="ghostscript-x11-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582537" comment="libgimpprint-4.2.7-32.47.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219941" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1090099" ref_url="https://bugzilla.suse.com/1090099" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9601" ref_url="https://www.suse.com/security/cve/CVE-2016-9601/" source="CVE"/>
		<reference ref_id="CVE-2018-10194" ref_url="https://www.suse.com/security/cve/CVE-2018-10194/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004073.html" source="SUSE-SU"/>
		<description>
This update for ghostscript-library fixes the following issues:

- CVE-2018-10194: Fixed a stack-based buffer overflow in gdevpdts.c (bsc#1090099)
- Fixed a crash in the fix for CVE-2016-9601.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1090099">SUSE bug 1090099</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9601/">CVE-2016-9601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9601">CVE-2016-9601 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10194/">CVE-2018-10194 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10194">CVE-2018-10194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582538" comment="ghostscript-fonts-other-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582539" comment="ghostscript-fonts-rus-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582540" comment="ghostscript-fonts-std-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582541" comment="ghostscript-library-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582542" comment="ghostscript-omni-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582543" comment="ghostscript-x11-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582544" comment="libgimpprint-4.2.7-32.47.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582538" comment="ghostscript-fonts-other-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582539" comment="ghostscript-fonts-rus-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582540" comment="ghostscript-fonts-std-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582541" comment="ghostscript-library-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582542" comment="ghostscript-omni-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582543" comment="ghostscript-x11-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582544" comment="libgimpprint-4.2.7-32.47.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219942" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1050893" ref_url="https://bugzilla.suse.com/1050893" source="BUGZILLA"/>
		<reference ref_id="1106173" ref_url="https://bugzilla.suse.com/1106173" source="BUGZILLA"/>
		<reference ref_id="1107410" ref_url="https://bugzilla.suse.com/1107410" source="BUGZILLA"/>
		<reference ref_id="1107412" ref_url="https://bugzilla.suse.com/1107412" source="BUGZILLA"/>
		<reference ref_id="1107413" ref_url="https://bugzilla.suse.com/1107413" source="BUGZILLA"/>
		<reference ref_id="1107420" ref_url="https://bugzilla.suse.com/1107420" source="BUGZILLA"/>
		<reference ref_id="1107421" ref_url="https://bugzilla.suse.com/1107421" source="BUGZILLA"/>
		<reference ref_id="1107426" ref_url="https://bugzilla.suse.com/1107426" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9611" ref_url="https://www.suse.com/security/cve/CVE-2017-9611/" source="CVE"/>
		<reference ref_id="CVE-2018-15910" ref_url="https://www.suse.com/security/cve/CVE-2018-15910/" source="CVE"/>
		<reference ref_id="CVE-2018-16509" ref_url="https://www.suse.com/security/cve/CVE-2018-16509/" source="CVE"/>
		<reference ref_id="CVE-2018-16511" ref_url="https://www.suse.com/security/cve/CVE-2018-16511/" source="CVE"/>
		<reference ref_id="CVE-2018-16513" ref_url="https://www.suse.com/security/cve/CVE-2018-16513/" source="CVE"/>
		<reference ref_id="CVE-2018-16540" ref_url="https://www.suse.com/security/cve/CVE-2018-16540/" source="CVE"/>
		<reference ref_id="CVE-2018-16541" ref_url="https://www.suse.com/security/cve/CVE-2018-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-16542" ref_url="https://www.suse.com/security/cve/CVE-2018-16542/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004767.html" source="SUSE-SU"/>
		<description>
This update for ghostscript-library fixes the following issues:

- CVE-2018-16511: A type confusion in 'ztype' could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact. (bsc#1107426)
- CVE-2018-16540: Attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact. (bsc#1107420)
- CVE-2018-16541: Attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. (bsc#1107421)
- CVE-2018-16542: Attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter. (bsc#1107413)
- CVE-2018-16509: Incorrect 'restoration of privilege' checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the 'pipe' instruction. (bsc#1107410
- CVE-2018-16513: Attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. (bsc#1107412)
- CVE-2018-15910: Attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code. (bsc#1106173)
- CVE-2017-9611: The Ins_MIRP function allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. (bsc#1050893)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1050893">SUSE bug 1050893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106173">SUSE bug 1106173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107410">SUSE bug 1107410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107412">SUSE bug 1107412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107413">SUSE bug 1107413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107420">SUSE bug 1107420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107421">SUSE bug 1107421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107426">SUSE bug 1107426</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9611/">CVE-2017-9611 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9611">CVE-2017-9611 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15910/">CVE-2018-15910 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15910">CVE-2018-15910 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16509/">CVE-2018-16509 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16509">CVE-2018-16509 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16511/">CVE-2018-16511 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16511">CVE-2018-16511 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16513/">CVE-2018-16513 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16513">CVE-2018-16513 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16540/">CVE-2018-16540 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16540">CVE-2018-16540 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16541/">CVE-2018-16541 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16541">CVE-2018-16541 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16542/">CVE-2018-16542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16542">CVE-2018-16542 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582545" comment="ghostscript-fonts-other-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582546" comment="ghostscript-fonts-rus-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582547" comment="ghostscript-fonts-std-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582548" comment="ghostscript-library-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582549" comment="ghostscript-omni-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582550" comment="ghostscript-x11-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582551" comment="libgimpprint-4.2.7-32.47.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582545" comment="ghostscript-fonts-other-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582546" comment="ghostscript-fonts-rus-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582547" comment="ghostscript-fonts-std-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582548" comment="ghostscript-library-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582549" comment="ghostscript-omni-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582550" comment="ghostscript-x11-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582551" comment="libgimpprint-4.2.7-32.47.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219943" version="1" class="patch">
	<metadata>
		<title>Recommended update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1129186" ref_url="https://bugzilla.suse.com/1129186" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3838" ref_url="https://www.suse.com/security/cve/CVE-2019-3838/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005853.html" source="SUSE-SU"/>
		<description>
This update for ghostscript-library fixes the following issues:

Security issue fixed:

- CVE-2019-3838: Fixed various bugs which allows to reenable and misuse system Postscript operators to read files from within Postscript files and send them with the help of e.g. the %pipe% to the attacker (bsc#1129186).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-28"/>
	<updated date="2019-08-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129186">SUSE bug 1129186</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3838/">CVE-2019-3838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3838">CVE-2019-3838 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582552" comment="ghostscript-fonts-other-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582553" comment="ghostscript-fonts-rus-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582554" comment="ghostscript-fonts-std-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582555" comment="ghostscript-library-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582556" comment="ghostscript-omni-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582557" comment="ghostscript-x11-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582558" comment="libgimpprint-4.2.7-47.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219944" version="1" class="patch">
	<metadata>
		<title>Security update for giflib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="960319" ref_url="https://bugzilla.suse.com/960319" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7555" ref_url="https://www.suse.com/security/cve/CVE-2015-7555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001819.html" source="SUSE-SU"/>
		<description>

This update for giflib fixes the following issues:

- CVE-2015-7555: Heap overflow in giffix (bsc#960319)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960319">SUSE bug 960319</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7555/">CVE-2015-7555 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7555">CVE-2015-7555 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577858" comment="giflib-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577859" comment="giflib-32bit-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577860" comment="giflib-progs-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577861" comment="giflib-x86-4.1.6-13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577858" comment="giflib-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577859" comment="giflib-32bit-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577860" comment="giflib-progs-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577861" comment="giflib-x86-4.1.6-13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219945" version="1" class="patch">
	<metadata>
		<title>Security update for giflib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="974847" ref_url="https://bugzilla.suse.com/974847" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3977" ref_url="https://www.suse.com/security/cve/CVE-2016-3977/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002024.html" source="SUSE-SU"/>
		<description>
giflib was updated to fix one security issue.

This security issue was fixed:
- CVE-2016-3977: Heap buffer overflow in gif2rgb (bsc#974847).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-25"/>
	<updated date="2016-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/974847">SUSE bug 974847</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3977/">CVE-2016-3977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3977">CVE-2016-3977 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582559" comment="giflib-4.1.6-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582560" comment="giflib-32bit-4.1.6-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582561" comment="giflib-progs-4.1.6-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582562" comment="giflib-x86-4.1.6-21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582559" comment="giflib-4.1.6-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582560" comment="giflib-32bit-4.1.6-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582561" comment="giflib-progs-4.1.6-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582562" comment="giflib-x86-4.1.6-21.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219946" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1107116" ref_url="https://bugzilla.suse.com/1107116" source="BUGZILLA"/>
		<reference ref_id="1111499" ref_url="https://bugzilla.suse.com/1111499" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16429" ref_url="https://www.suse.com/security/cve/CVE-2018-16429/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3966-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183966-1.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

Security issues fixed:

- CVE-2018-16429: Fixed out-of-bounds read vulnerability ing_markup_parse_context_parse() (bsc#1107116).
- Fixing potentially exploitable bugs in UTF-8 validation in Variant and DBUS message parsing (bsc#1111499).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-03"/>
	<updated date="2018-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1107116">SUSE bug 1107116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111499">SUSE bug 1111499</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16429/">CVE-2018-16429 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16429">CVE-2018-16429 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582563" comment="glib2-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582564" comment="glib2-doc-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582565" comment="glib2-lang-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582566" comment="libgio-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582567" comment="libgio-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582568" comment="libgio-2_0-0-x86-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582569" comment="libglib-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582570" comment="libglib-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582571" comment="libglib-2_0-0-x86-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582572" comment="libgmodule-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582573" comment="libgmodule-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582574" comment="libgmodule-2_0-0-x86-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582575" comment="libgobject-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582576" comment="libgobject-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582577" comment="libgobject-2_0-0-x86-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582578" comment="libgthread-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582579" comment="libgthread-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582580" comment="libgthread-2_0-0-x86-2.22.5-0.8.36.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582563" comment="glib2-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582564" comment="glib2-doc-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582565" comment="glib2-lang-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582566" comment="libgio-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582567" comment="libgio-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582568" comment="libgio-2_0-0-x86-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582569" comment="libglib-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582570" comment="libglib-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582571" comment="libglib-2_0-0-x86-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582572" comment="libgmodule-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582573" comment="libgmodule-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582574" comment="libgmodule-2_0-0-x86-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582575" comment="libgobject-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582576" comment="libgobject-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582577" comment="libgobject-2_0-0-x86-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582578" comment="libgthread-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582579" comment="libgthread-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582580" comment="libgthread-2_0-0-x86-2.22.5-0.8.36.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219947" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1137001" ref_url="https://bugzilla.suse.com/1137001" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12450" ref_url="https://www.suse.com/security/cve/CVE-2019-12450/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005625.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

Security issue fixed: 	  

- CVE-2019-12450: Fixed an improper file permission when copy operation
  takes place (bsc#1137001).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-24"/>
	<updated date="2019-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137001">SUSE bug 1137001</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12450/">CVE-2019-12450 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12450">CVE-2019-12450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582581" comment="glib2-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582582" comment="glib2-doc-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582583" comment="glib2-lang-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582584" comment="libgio-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582585" comment="libgio-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582586" comment="libglib-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582587" comment="libglib-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582588" comment="libgmodule-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582589" comment="libgmodule-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582590" comment="libgobject-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582591" comment="libgobject-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582592" comment="libgthread-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582593" comment="libgthread-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219948" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="830257" ref_url="https://bugzilla.suse.com/830257" source="BUGZILLA"/>
		<reference ref_id="851280" ref_url="https://bugzilla.suse.com/851280" source="BUGZILLA"/>
		<reference ref_id="918187" ref_url="https://bugzilla.suse.com/918187" source="BUGZILLA"/>
		<reference ref_id="920338" ref_url="https://bugzilla.suse.com/920338" source="BUGZILLA"/>
		<reference ref_id="927080" ref_url="https://bugzilla.suse.com/927080" source="BUGZILLA"/>
		<reference ref_id="928723" ref_url="https://bugzilla.suse.com/928723" source="BUGZILLA"/>
		<reference ref_id="932059" ref_url="https://bugzilla.suse.com/932059" source="BUGZILLA"/>
		<reference ref_id="933770" ref_url="https://bugzilla.suse.com/933770" source="BUGZILLA"/>
		<reference ref_id="933903" ref_url="https://bugzilla.suse.com/933903" source="BUGZILLA"/>
		<reference ref_id="935286" ref_url="https://bugzilla.suse.com/935286" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001548.html" source="SUSE-SU"/>
		<description>
This update for glibc provides fixes for security and non-security issues.

These security issues have been fixed:

- CVE-2015-1781: Buffer length after padding in resolv/nss_dns/dns-host.c. (bsc#927080)
- CVE-2013-2207: pt_chown did not properly check permissions for tty files, which allowed
  local users to change the permission on the files and obtain access to arbitrary
  pseudo-terminals by leveraging a FUSE file system. (bsc#830257)
- CVE-2014-8121: DB_LOOKUP in the Name Service Switch (NSS) did not properly check if a
  file is open, which allowed remote attackers to cause a denial of service (infinite loop)
  by performing a look-up while the database is iterated over the database, which triggers
  the file pointer to be reset. (bsc#918187)
- Fix read past end of pattern in fnmatch. (bsc#920338)

These non-security issues have been fixed:

- Fix locking in _IO_flush_all_lockp() to prevent deadlocks in applications. (bsc#851280)
- Record TTL also for DNS PTR queries. (bsc#928723)
- Fix invalid free in ld.so. (bsc#932059)
- Make PowerPC64 default to non-executable stack. (bsc#933770)
- Fix floating point exceptions in some circumstances with exp() and friends. (bsc#933903)
- Fix bad TEXTREL in glibc.i686. (bsc#935286)
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-31"/>
	<updated date="2015-07-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/830257">SUSE bug 830257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851280">SUSE bug 851280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918187">SUSE bug 918187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920338">SUSE bug 920338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927080">SUSE bug 927080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928723">SUSE bug 928723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932059">SUSE bug 932059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933770">SUSE bug 933770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933903">SUSE bug 933903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935286">SUSE bug 935286</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2207">CVE-2013-2207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8121">CVE-2014-8121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1781">CVE-2015-1781 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577877" comment="glibc-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577878" comment="glibc-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577879" comment="glibc-devel-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577880" comment="glibc-devel-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577881" comment="glibc-html-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577882" comment="glibc-i18ndata-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577883" comment="glibc-info-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577884" comment="glibc-locale-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577885" comment="glibc-locale-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577886" comment="glibc-locale-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577887" comment="glibc-profile-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577888" comment="glibc-profile-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577889" comment="glibc-profile-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577890" comment="glibc-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577891" comment="nscd-2.11.3-17.87.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577877" comment="glibc-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577878" comment="glibc-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577879" comment="glibc-devel-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577880" comment="glibc-devel-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577881" comment="glibc-html-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577882" comment="glibc-i18ndata-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577883" comment="glibc-info-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577884" comment="glibc-locale-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577885" comment="glibc-locale-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577886" comment="glibc-locale-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577887" comment="glibc-profile-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577888" comment="glibc-profile-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577889" comment="glibc-profile-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577890" comment="glibc-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577891" comment="nscd-2.11.3-17.87.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219949" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="930721" ref_url="https://bugzilla.suse.com/930721" source="BUGZILLA"/>
		<reference ref_id="942317" ref_url="https://bugzilla.suse.com/942317" source="BUGZILLA"/>
		<reference ref_id="950944" ref_url="https://bugzilla.suse.com/950944" source="BUGZILLA"/>
		<reference ref_id="956988" ref_url="https://bugzilla.suse.com/956988" source="BUGZILLA"/>
		<reference ref_id="961721" ref_url="https://bugzilla.suse.com/961721" source="BUGZILLA"/>
		<reference ref_id="962736" ref_url="https://bugzilla.suse.com/962736" source="BUGZILLA"/>
		<reference ref_id="962737" ref_url="https://bugzilla.suse.com/962737" source="BUGZILLA"/>
		<reference ref_id="962738" ref_url="https://bugzilla.suse.com/962738" source="BUGZILLA"/>
		<reference ref_id="962739" ref_url="https://bugzilla.suse.com/962739" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001884.html" source="SUSE-SU"/>
		<description>

This update for glibc fixes the following issues:

- CVE-2015-7547: A stack-based buffer overflow in getaddrinfo allowed remote attackers to cause a crash or execute arbitrary code via crafted and timed DNS responses (bsc#961721)
- CVE-2015-8777: Insufficient checking of LD_POINTER_GUARD environment variable allowed local attackers to bypass the pointer guarding protection of the dynamic loader on set-user-ID and set-group-ID programs (bsc#950944)
- CVE-2015-8776: Out-of-range time values passed to the strftime function may cause it to crash, leading to a denial of service, or potentially disclosure information (bsc#962736)
- CVE-2015-8778: Integer overflow in hcreate and hcreate_r could have caused an out-of-bound memory access. leading to application crashes or, potentially, arbitrary code execution (bsc#962737)
- CVE-2014-9761: A stack overflow (unbounded alloca) could have caused applications which process long strings with the nan function to crash or, potentially, execute arbitrary code. (bsc#962738)
- CVE-2015-8779: A stack overflow (unbounded alloca) in the catopen function could have caused applications which pass long strings to the catopen function to crash or, potentially execute arbitrary code. (bsc#962739)

The following non-security bugs were fixed:

- bsc#930721: Accept leading and trailing spaces in getdate input string
- bsc#942317: Recognize power8 platform 
- bsc#950944: Always enable pointer guard
- bsc#956988: Fix deadlock in __dl_iterate_phdr
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/930721">SUSE bug 930721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942317">SUSE bug 942317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950944">SUSE bug 950944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956988">SUSE bug 956988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961721">SUSE bug 961721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962736">SUSE bug 962736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962737">SUSE bug 962737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962738">SUSE bug 962738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962739">SUSE bug 962739</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9761">CVE-2014-9761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7547">CVE-2015-7547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8776">CVE-2015-8776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8777">CVE-2015-8777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8778">CVE-2015-8778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8779">CVE-2015-8779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577892" comment="glibc-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577893" comment="glibc-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577894" comment="glibc-devel-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577895" comment="glibc-devel-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577896" comment="glibc-html-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577897" comment="glibc-i18ndata-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577898" comment="glibc-info-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577899" comment="glibc-locale-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577900" comment="glibc-locale-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577901" comment="glibc-locale-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577902" comment="glibc-profile-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577903" comment="glibc-profile-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577904" comment="glibc-profile-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577905" comment="glibc-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577906" comment="nscd-2.11.3-17.95.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577892" comment="glibc-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577893" comment="glibc-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577894" comment="glibc-devel-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577895" comment="glibc-devel-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577896" comment="glibc-html-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577897" comment="glibc-i18ndata-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577898" comment="glibc-info-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577899" comment="glibc-locale-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577900" comment="glibc-locale-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577901" comment="glibc-locale-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577902" comment="glibc-profile-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577903" comment="glibc-profile-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577904" comment="glibc-profile-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577905" comment="glibc-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577906" comment="nscd-2.11.3-17.95.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219950" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="931399" ref_url="https://bugzilla.suse.com/931399" source="BUGZILLA"/>
		<reference ref_id="965699" ref_url="https://bugzilla.suse.com/965699" source="BUGZILLA"/>
		<reference ref_id="969727" ref_url="https://bugzilla.suse.com/969727" source="BUGZILLA"/>
		<reference ref_id="973010" ref_url="https://bugzilla.suse.com/973010" source="BUGZILLA"/>
		<reference ref_id="973164" ref_url="https://bugzilla.suse.com/973164" source="BUGZILLA"/>
		<reference ref_id="973179" ref_url="https://bugzilla.suse.com/973179" source="BUGZILLA"/>
		<reference ref_id="980483" ref_url="https://bugzilla.suse.com/980483" source="BUGZILLA"/>
		<reference ref_id="980854" ref_url="https://bugzilla.suse.com/980854" source="BUGZILLA"/>
		<reference ref_id="986302" ref_url="https://bugzilla.suse.com/986302" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1234" ref_url="https://www.suse.com/security/cve/CVE-2016-1234/" source="CVE"/>
		<reference ref_id="CVE-2016-3075" ref_url="https://www.suse.com/security/cve/CVE-2016-3075/" source="CVE"/>
		<reference ref_id="CVE-2016-3706" ref_url="https://www.suse.com/security/cve/CVE-2016-3706/" source="CVE"/>
		<reference ref_id="CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002230.html" source="SUSE-SU"/>
		<description>

This update for glibc fixes the following issues:

- Drop old fix that could break services that start before IPv6 is up. (bsc#931399)
- Do not copy d_name field of struct dirent. (CVE-2016-1234, bsc#969727)
- Fix memory leak in _nss_dns_gethostbyname4_r. (bsc#973010)
- Relocate DSOs in dependency order, fixing a potential crash during symbol
  relocation phase. (bsc#986302)
- Fix nscd assertion failure in gc. (bsc#965699)
- Fix stack overflow in _nss_dns_getnetbyname_r. (CVE-2016-3075, bsc#973164)
- Fix getaddrinfo stack overflow in hostent conversion. (CVE-2016-3706, bsc#980483)
- Do not use alloca in clntudp_call. (CVE-2016-4429, bsc#980854)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-25"/>
	<updated date="2016-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/931399">SUSE bug 931399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965699">SUSE bug 965699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969727">SUSE bug 969727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973010">SUSE bug 973010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973164">SUSE bug 973164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973179">SUSE bug 973179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980483">SUSE bug 980483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980854">SUSE bug 980854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986302">SUSE bug 986302</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1234/">CVE-2016-1234 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1234">CVE-2016-1234 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3075/">CVE-2016-3075 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3075">CVE-2016-3075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3706/">CVE-2016-3706 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3706">CVE-2016-3706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4429">CVE-2016-4429 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582594" comment="glibc-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582595" comment="glibc-32bit-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582596" comment="glibc-devel-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582597" comment="glibc-devel-32bit-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582598" comment="glibc-html-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582599" comment="glibc-i18ndata-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582600" comment="glibc-info-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582601" comment="glibc-locale-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582602" comment="glibc-locale-32bit-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582603" comment="glibc-locale-x86-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582604" comment="glibc-profile-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582605" comment="glibc-profile-32bit-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582606" comment="glibc-profile-x86-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582607" comment="glibc-x86-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582608" comment="nscd-2.11.3-17.102.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582594" comment="glibc-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582595" comment="glibc-32bit-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582596" comment="glibc-devel-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582597" comment="glibc-devel-32bit-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582598" comment="glibc-html-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582599" comment="glibc-i18ndata-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582600" comment="glibc-info-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582601" comment="glibc-locale-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582602" comment="glibc-locale-32bit-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582603" comment="glibc-locale-x86-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582604" comment="glibc-profile-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582605" comment="glibc-profile-32bit-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582606" comment="glibc-profile-x86-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582607" comment="glibc-x86-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582608" comment="nscd-2.11.3-17.102.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219951" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1039357" ref_url="https://bugzilla.suse.com/1039357" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000366" ref_url="https://www.suse.com/security/cve/CVE-2017-1000366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002963.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2017-1000366: Fix a potential privilege escalation vulnerability that
  allowed unprivileged system users to manipulate the stack of setuid binaries
  to gain special privileges. [bsc#1039357]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-19"/>
	<updated date="2017-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1039357">SUSE bug 1039357</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000366/">CVE-2017-1000366 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000366">CVE-2017-1000366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582609" comment="glibc-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582610" comment="glibc-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582611" comment="glibc-devel-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582612" comment="glibc-devel-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582613" comment="glibc-html-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582614" comment="glibc-i18ndata-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582615" comment="glibc-info-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582616" comment="glibc-locale-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582617" comment="glibc-locale-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582618" comment="glibc-locale-x86-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582619" comment="glibc-profile-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582620" comment="glibc-profile-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582621" comment="glibc-profile-x86-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582622" comment="glibc-x86-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582623" comment="nscd-2.11.3-17.109.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582609" comment="glibc-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582610" comment="glibc-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582611" comment="glibc-devel-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582612" comment="glibc-devel-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582613" comment="glibc-html-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582614" comment="glibc-i18ndata-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582615" comment="glibc-info-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582616" comment="glibc-locale-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582617" comment="glibc-locale-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582618" comment="glibc-locale-x86-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582619" comment="glibc-profile-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582620" comment="glibc-profile-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582621" comment="glibc-profile-x86-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582622" comment="glibc-x86-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582623" comment="nscd-2.11.3-17.109.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219952" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1074293" ref_url="https://bugzilla.suse.com/1074293" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003593.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- A privilege escalation bug in the realpath() function has been fixed.
  [CVE-2018-1000001, bsc#1074293]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1074293">SUSE bug 1074293</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000001">CVE-2018-1000001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582624" comment="glibc-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582625" comment="glibc-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582626" comment="glibc-devel-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582627" comment="glibc-devel-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582628" comment="glibc-html-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582629" comment="glibc-i18ndata-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582630" comment="glibc-info-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582631" comment="glibc-locale-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582632" comment="glibc-locale-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582633" comment="glibc-locale-x86-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582634" comment="glibc-profile-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582635" comment="glibc-profile-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582636" comment="glibc-profile-x86-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582637" comment="glibc-x86-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582638" comment="nscd-2.11.3-17.110.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582624" comment="glibc-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582625" comment="glibc-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582626" comment="glibc-devel-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582627" comment="glibc-devel-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582628" comment="glibc-html-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582629" comment="glibc-i18ndata-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582630" comment="glibc-info-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582631" comment="glibc-locale-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582632" comment="glibc-locale-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582633" comment="glibc-locale-x86-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582634" comment="glibc-profile-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582635" comment="glibc-profile-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582636" comment="glibc-profile-x86-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582637" comment="glibc-x86-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582638" comment="nscd-2.11.3-17.110.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219953" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1037930" ref_url="https://bugzilla.suse.com/1037930" source="BUGZILLA"/>
		<reference ref_id="1051791" ref_url="https://bugzilla.suse.com/1051791" source="BUGZILLA"/>
		<reference ref_id="1074293" ref_url="https://bugzilla.suse.com/1074293" source="BUGZILLA"/>
		<reference ref_id="1079036" ref_url="https://bugzilla.suse.com/1079036" source="BUGZILLA"/>
		<reference ref_id="978209" ref_url="https://bugzilla.suse.com/978209" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12132" ref_url="https://www.suse.com/security/cve/CVE-2017-12132/" source="CVE"/>
		<reference ref_id="CVE-2017-8804" ref_url="https://www.suse.com/security/cve/CVE-2017-8804/" source="CVE"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="CVE-2018-6485" ref_url="https://www.suse.com/security/cve/CVE-2018-6485/" source="CVE"/>
		<reference ref_id="CVE-2018-6551" ref_url="https://www.suse.com/security/cve/CVE-2018-6551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003758.html" source="SUSE-SU"/>
		<description>

  
This update for glibc fixes the following issues:

Security issues:

- CVE-2017-8804: Fix memory leak after deserialization failure in xdr_bytes, xdr_string (bsc#1037930)
- CVE-2017-12132: Reduce EDNS payload size to 1200 bytes (bsc#1051791)
- CVE-2018-6485,CVE-2018-6551: Fix integer overflows in internal memalign and malloc functions (bsc#1079036)
- CVE-2018-1000001: Avoid underflow of malloced area in realpath (bsc#1074293)

Also a non security issue was fixed:

- Do not fail if one of the two responses to AF_UNSPEC fails (bsc#978209)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-28"/>
	<updated date="2018-02-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037930">SUSE bug 1037930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051791">SUSE bug 1051791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074293">SUSE bug 1074293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079036">SUSE bug 1079036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978209">SUSE bug 978209</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12132/">CVE-2017-12132 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12132">CVE-2017-12132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8804/">CVE-2017-8804 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8804">CVE-2017-8804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000001">CVE-2018-1000001 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6485/">CVE-2018-6485 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6485">CVE-2018-6485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6551/">CVE-2018-6551 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6551">CVE-2018-6551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582639" comment="glibc-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582640" comment="glibc-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582641" comment="glibc-devel-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582642" comment="glibc-devel-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582643" comment="glibc-html-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582644" comment="glibc-i18ndata-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582645" comment="glibc-info-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582646" comment="glibc-locale-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582647" comment="glibc-locale-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582648" comment="glibc-locale-x86-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582649" comment="glibc-profile-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582650" comment="glibc-profile-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582651" comment="glibc-profile-x86-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582652" comment="glibc-x86-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582653" comment="nscd-2.11.3-17.110.6.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582639" comment="glibc-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582640" comment="glibc-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582641" comment="glibc-devel-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582642" comment="glibc-devel-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582643" comment="glibc-html-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582644" comment="glibc-i18ndata-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582645" comment="glibc-info-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582646" comment="glibc-locale-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582647" comment="glibc-locale-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582648" comment="glibc-locale-x86-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582649" comment="glibc-profile-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582650" comment="glibc-profile-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582651" comment="glibc-profile-x86-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582652" comment="glibc-x86-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582653" comment="nscd-2.11.3-17.110.6.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219954" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1076871" ref_url="https://bugzilla.suse.com/1076871" source="BUGZILLA"/>
		<reference ref_id="1081556" ref_url="https://bugzilla.suse.com/1081556" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12133" ref_url="https://www.suse.com/security/cve/CVE-2017-12133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003870.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2017-12133: Avoid use-after-free read access in clntudp_call (bsc#1081556)

Non security issue fixed:

- Fix incorrect getaddrinfo assertion trigger (bsc#1076871)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-05"/>
	<updated date="2018-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076871">SUSE bug 1076871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081556">SUSE bug 1081556</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12133/">CVE-2017-12133 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12133">CVE-2017-12133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582654" comment="glibc-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582655" comment="glibc-32bit-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582656" comment="glibc-devel-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582657" comment="glibc-devel-32bit-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582658" comment="glibc-html-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582659" comment="glibc-i18ndata-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582660" comment="glibc-info-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582661" comment="glibc-locale-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582662" comment="glibc-locale-32bit-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582663" comment="glibc-locale-x86-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582664" comment="glibc-profile-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582665" comment="glibc-profile-32bit-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582666" comment="glibc-profile-x86-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582667" comment="glibc-x86-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582668" comment="nscd-2.11.3-17.110.9.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582654" comment="glibc-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582655" comment="glibc-32bit-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582656" comment="glibc-devel-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582657" comment="glibc-devel-32bit-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582658" comment="glibc-html-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582659" comment="glibc-i18ndata-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582660" comment="glibc-info-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582661" comment="glibc-locale-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582662" comment="glibc-locale-32bit-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582663" comment="glibc-locale-x86-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582664" comment="glibc-profile-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582665" comment="glibc-profile-32bit-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582666" comment="glibc-profile-x86-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582667" comment="glibc-x86-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582668" comment="nscd-2.11.3-17.110.9.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219955" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1077763" ref_url="https://bugzilla.suse.com/1077763" source="BUGZILLA"/>
		<reference ref_id="1079625" ref_url="https://bugzilla.suse.com/1079625" source="BUGZILLA"/>
		<reference ref_id="1086690" ref_url="https://bugzilla.suse.com/1086690" source="BUGZILLA"/>
		<reference ref_id="1094161" ref_url="https://bugzilla.suse.com/1094161" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11236" ref_url="https://www.suse.com/security/cve/CVE-2018-11236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004403.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issue fixed:

- CVE-2018-11236: Fix 32bit arch integer overflow in stdlib/canonicalize.c when processing very long pathname arguments (bsc#1094161).

Bug fixes:

- bsc#1086690: Fix crash in resolver on memory allocation failure.
- bsc#1077763: Fix allocation in in6ailist_add.
- bsc#1079625: Fix allocation in nss_compat for large number of memberships to a group.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-10"/>
	<updated date="2018-08-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077763">SUSE bug 1077763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079625">SUSE bug 1079625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086690">SUSE bug 1086690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094161">SUSE bug 1094161</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11236/">CVE-2018-11236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11236">CVE-2018-11236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582669" comment="glibc-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582670" comment="glibc-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582671" comment="glibc-devel-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582672" comment="glibc-devel-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582673" comment="glibc-html-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582674" comment="glibc-i18ndata-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582675" comment="glibc-info-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582676" comment="glibc-locale-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582677" comment="glibc-locale-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582678" comment="glibc-locale-x86-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582679" comment="glibc-profile-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582680" comment="glibc-profile-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582681" comment="glibc-profile-x86-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582682" comment="glibc-x86-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582683" comment="nscd-2.11.3-17.110.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582669" comment="glibc-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582670" comment="glibc-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582671" comment="glibc-devel-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582672" comment="glibc-devel-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582673" comment="glibc-html-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582674" comment="glibc-i18ndata-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582675" comment="glibc-info-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582676" comment="glibc-locale-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582677" comment="glibc-locale-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582678" comment="glibc-locale-x86-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582679" comment="glibc-profile-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582680" comment="glibc-profile-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582681" comment="glibc-profile-x86-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582682" comment="glibc-x86-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582683" comment="nscd-2.11.3-17.110.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219956" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1058774" ref_url="https://bugzilla.suse.com/1058774" source="BUGZILLA"/>
		<reference ref_id="1064580" ref_url="https://bugzilla.suse.com/1064580" source="BUGZILLA"/>
		<reference ref_id="1064583" ref_url="https://bugzilla.suse.com/1064583" source="BUGZILLA"/>
		<reference ref_id="941234" ref_url="https://bugzilla.suse.com/941234" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5180" ref_url="https://www.suse.com/security/cve/CVE-2015-5180/" source="CVE"/>
		<reference ref_id="CVE-2017-15670" ref_url="https://www.suse.com/security/cve/CVE-2017-15670/" source="CVE"/>
		<reference ref_id="CVE-2017-15804" ref_url="https://www.suse.com/security/cve/CVE-2017-15804/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004606.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following security issues:

- CVE-2017-15670: Prevent off-by-one error that lead to a heap-based buffer
  overflow in the glob function, related to the processing of home directories
  using the ~ operator followed by a long string (bsc#1064583)
- CVE-2017-15804: The glob function contained a buffer overflow during
  unescaping of user names with the ~ operator (bsc#1064580)
- CVE-2015-5180: res_query in libresolv allowed remote attackers to cause a
  denial of service (NULL pointer dereference and process crash) (bsc#941234).

This non-security issue was fixed:

- Fix inaccuracies in casin, cacos, casinh, cacosh (bsc#1058774)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-26"/>
	<updated date="2018-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1058774">SUSE bug 1058774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064580">SUSE bug 1064580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064583">SUSE bug 1064583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941234">SUSE bug 941234</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5180/">CVE-2015-5180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5180">CVE-2015-5180 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15670/">CVE-2017-15670 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15670">CVE-2017-15670 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15804/">CVE-2017-15804 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15804">CVE-2017-15804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582684" comment="glibc-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582685" comment="glibc-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582686" comment="glibc-devel-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582687" comment="glibc-devel-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582688" comment="glibc-html-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582689" comment="glibc-i18ndata-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582690" comment="glibc-info-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582691" comment="glibc-locale-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582692" comment="glibc-locale-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582693" comment="glibc-locale-x86-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582694" comment="glibc-profile-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582695" comment="glibc-profile-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582696" comment="glibc-profile-x86-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582697" comment="glibc-x86-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582698" comment="nscd-2.11.3-17.110.19.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582684" comment="glibc-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582685" comment="glibc-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582686" comment="glibc-devel-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582687" comment="glibc-devel-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582688" comment="glibc-html-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582689" comment="glibc-i18ndata-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582690" comment="glibc-info-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582691" comment="glibc-locale-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582692" comment="glibc-locale-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582693" comment="glibc-locale-x86-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582694" comment="glibc-profile-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582695" comment="glibc-profile-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582696" comment="glibc-profile-x86-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582697" comment="glibc-x86-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582698" comment="nscd-2.11.3-17.110.19.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219957" version="1" class="patch">
	<metadata>
		<title>Recommended update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1064569" ref_url="https://bugzilla.suse.com/1064569" source="BUGZILLA"/>
		<reference ref_id="1110170" ref_url="https://bugzilla.suse.com/1110170" source="BUGZILLA"/>
		<reference ref_id="1110174" ref_url="https://bugzilla.suse.com/1110174" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15671" ref_url="https://www.suse.com/security/cve/CVE-2017-15671/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004949.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issue fixed:

- CVE-2017-15671: Fixed memory leak in glob with GLOB_TILDE (bsc#1064569, BZ #22325).

Non-security issue fixed:

- Avoid access beyond memory bounds in pthread_attr_getaffinity_np (bsc#1110170, BZ #15618).
- Remove improper assert in dlclose (bsc#1110174, BZ #11941).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064569">SUSE bug 1064569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110170">SUSE bug 1110170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110174">SUSE bug 1110174</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15671/">CVE-2017-15671 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15671">CVE-2017-15671 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582699" comment="glibc-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582700" comment="glibc-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582701" comment="glibc-devel-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582702" comment="glibc-devel-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582703" comment="glibc-html-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582704" comment="glibc-i18ndata-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582705" comment="glibc-info-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582706" comment="glibc-locale-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582707" comment="glibc-locale-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582708" comment="glibc-locale-x86-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582709" comment="glibc-profile-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582710" comment="glibc-profile-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582711" comment="glibc-profile-x86-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582712" comment="glibc-x86-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582713" comment="nscd-2.11.3-17.110.24.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582699" comment="glibc-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582700" comment="glibc-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582701" comment="glibc-devel-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582702" comment="glibc-devel-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582703" comment="glibc-html-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582704" comment="glibc-i18ndata-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582705" comment="glibc-info-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582706" comment="glibc-locale-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582707" comment="glibc-locale-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582708" comment="glibc-locale-x86-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582709" comment="glibc-profile-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582710" comment="glibc-profile-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582711" comment="glibc-profile-x86-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582712" comment="glibc-x86-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582713" comment="nscd-2.11.3-17.110.24.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219958" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1127308" ref_url="https://bugzilla.suse.com/1127308" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9169" ref_url="https://www.suse.com/security/cve/CVE-2019-9169/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005564.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issue fixed:

- CVE-2019-9169: Fixed heap-based buffer over-read via an attempted case-insensitive regular-expression match (bsc#1127308).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-20"/>
	<updated date="2019-08-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1127308">SUSE bug 1127308</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9169/">CVE-2019-9169 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9169">CVE-2019-9169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582714" comment="glibc-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582715" comment="glibc-32bit-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582716" comment="glibc-devel-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582717" comment="glibc-devel-32bit-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582718" comment="glibc-html-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582719" comment="glibc-i18ndata-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582720" comment="glibc-info-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582721" comment="glibc-locale-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582722" comment="glibc-locale-32bit-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582723" comment="glibc-profile-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582724" comment="glibc-profile-32bit-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582725" comment="nscd-2.11.3-17.110.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219959" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1186489" ref_url="https://bugzilla.suse.com/1186489" source="BUGZILLA"/>
		<reference ref_id="1187911" ref_url="https://bugzilla.suse.com/1187911" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33574" ref_url="https://www.suse.com/security/cve/CVE-2021-33574/" source="CVE"/>
		<reference ref_id="CVE-2021-35942" ref_url="https://www.suse.com/security/cve/CVE-2021-35942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009532.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2021-33574: Use __pthread_attr_copy in mq_notify (bsc#1186489)
- CVE-2021-35942: wordexp: handle overflow in positional parameter number (bsc#1187911)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-04"/>
	<updated date="2021-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186489">SUSE bug 1186489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187911">SUSE bug 1187911</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33574/">CVE-2021-33574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">CVE-2021-33574 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35942/">CVE-2021-35942 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">CVE-2021-35942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634760" comment="glibc-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634761" comment="glibc-32bit-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634762" comment="glibc-devel-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634763" comment="glibc-devel-32bit-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634764" comment="glibc-html-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634765" comment="glibc-i18ndata-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634766" comment="glibc-info-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634767" comment="glibc-locale-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634768" comment="glibc-locale-32bit-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634769" comment="glibc-profile-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634770" comment="glibc-profile-32bit-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634771" comment="nscd-2.11.3-17.110.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219960" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1193615" ref_url="https://bugzilla.suse.com/1193615" source="BUGZILLA"/>
		<reference ref_id="1193616" ref_url="https://bugzilla.suse.com/1193616" source="BUGZILLA"/>
		<reference ref_id="1194640" ref_url="https://bugzilla.suse.com/1194640" source="BUGZILLA"/>
		<reference ref_id="1194768" ref_url="https://bugzilla.suse.com/1194768" source="BUGZILLA"/>
		<reference ref_id="1194770" ref_url="https://bugzilla.suse.com/1194770" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8982" ref_url="https://www.suse.com/security/cve/CVE-2015-8982/" source="CVE"/>
		<reference ref_id="CVE-2015-8983" ref_url="https://www.suse.com/security/cve/CVE-2015-8983/" source="CVE"/>
		<reference ref_id="CVE-2021-3999" ref_url="https://www.suse.com/security/cve/CVE-2021-3999/" source="CVE"/>
		<reference ref_id="CVE-2022-23218" ref_url="https://www.suse.com/security/cve/CVE-2022-23218/" source="CVE"/>
		<reference ref_id="CVE-2022-23219" ref_url="https://www.suse.com/security/cve/CVE-2022-23219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010489.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2022-23219: Fixed buffer overflow in sunrpc clnt_create for 'unix' (bsc#1194768, BZ #22542)
- CVE-2022-23218: Fixed buffer overflow in sunrpc svcunix_create (bsc#1194770, BZ #28768)
- CVE-2021-3999: Fixed in getcwd to set errno to ERANGE for size == 1 (bsc#1194640, BZ #28769)
- CVE-2015-8983: Fixed _IO_wstr_overflow integer overflow (bsc#1193615, BZ #17269)
- CVE-2015-8982: Fixed memory handling in strxfrm_l (bsc#1193616, BZ #16009)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193615">SUSE bug 1193615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193616">SUSE bug 1193616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194640">SUSE bug 1194640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194768">SUSE bug 1194768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194770">SUSE bug 1194770</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8982/">CVE-2015-8982 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8982">CVE-2015-8982 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2015-8983/">CVE-2015-8983 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8983">CVE-2015-8983 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3999/">CVE-2021-3999 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3999">CVE-2021-3999 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23218/">CVE-2022-23218 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">CVE-2022-23218 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23219/">CVE-2022-23219 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">CVE-2022-23219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673424" comment="glibc-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673425" comment="glibc-32bit-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673426" comment="glibc-devel-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673427" comment="glibc-devel-32bit-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673428" comment="glibc-html-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673429" comment="glibc-i18ndata-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673430" comment="glibc-info-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673431" comment="glibc-locale-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673432" comment="glibc-locale-32bit-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673433" comment="glibc-profile-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673434" comment="glibc-profile-32bit-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673435" comment="nscd-2.11.3-17.110.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219961" version="1" class="patch">
	<metadata>
		<title>Security update for gnome-session (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1048274" ref_url="https://bugzilla.suse.com/1048274" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11171" ref_url="https://www.suse.com/security/cve/CVE-2017-11171/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003137.html" source="SUSE-SU"/>
		<description>


This update for gnome-session fixes the following issues:

- CVE-2017-11171: Fix a denial of service condition. an unauthenticated local user
  can create ICE connections, causing a file descriptor leak in
  gnome-session (bsc#1048274).

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-16"/>
	<updated date="2017-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1048274">SUSE bug 1048274</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11171/">CVE-2017-11171 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11171">CVE-2017-11171 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582726" comment="gnome-session-2.28.0-3.11.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582727" comment="gnome-session-lang-2.28.0-3.11.12.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582726" comment="gnome-session-2.28.0-3.11.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582727" comment="gnome-session-lang-2.28.0-3.11.12.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219962" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="925499" ref_url="https://bugzilla.suse.com/925499" source="BUGZILLA"/>
		<reference ref_id="932026" ref_url="https://bugzilla.suse.com/932026" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001587.html" source="SUSE-SU"/>
		<description>


This security update of gnutls fixes the following issues:

- use minimal padding for CBC, the default random length padding
  causes problems with some servers (bsc#925499)
  * added gnutls-use_minimal_cbc_padding.patch
- use the default DH minimum for gnutls-cli instead of hardcoding 512
  * CVE-2015-4000 (Logjam) (bsc#932026)
  * added gnutls-CVE-2015-4000-logjam-use_the_default_DH_min_for_cli.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-14"/>
	<updated date="2015-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/925499">SUSE bug 925499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932026">SUSE bug 932026</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578031" comment="gnutls-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563359" comment="libgnutls-extra26-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578032" comment="libgnutls26-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578033" comment="libgnutls26-32bit-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578034" comment="libgnutls26-x86-2.4.1-24.39.57.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578031" comment="gnutls-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563359" comment="libgnutls-extra26-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578032" comment="libgnutls26-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578033" comment="libgnutls26-32bit-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578034" comment="libgnutls26-x86-2.4.1-24.39.57.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219963" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="924828" ref_url="https://bugzilla.suse.com/924828" source="BUGZILLA"/>
		<reference ref_id="947271" ref_url="https://bugzilla.suse.com/947271" source="BUGZILLA"/>
		<reference ref_id="957568" ref_url="https://bugzilla.suse.com/957568" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<reference ref_id="CVE-2015-8313" ref_url="https://www.suse.com/security/cve/CVE-2015-8313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001791.html" source="SUSE-SU"/>
		<description>

This update for gnutls fixes the following security issues:

- CVE-2015-8313: First byte of the padding in CBC mode is not checked (bsc#957568)
- CVE-2015-2806: Two-byte stack overflow in asn1_der_decoding (bsc#924828)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-11"/>
	<updated date="2016-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924828">SUSE bug 924828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947271">SUSE bug 947271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957568">SUSE bug 957568</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2806">CVE-2015-2806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8313/">CVE-2015-8313 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8313">CVE-2015-8313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578035" comment="gnutls-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563362" comment="libgnutls-extra26-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578036" comment="libgnutls26-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578037" comment="libgnutls26-32bit-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578038" comment="libgnutls26-x86-2.4.1-24.39.60.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578035" comment="gnutls-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563362" comment="libgnutls-extra26-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578036" comment="libgnutls26-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578037" comment="libgnutls26-32bit-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578038" comment="libgnutls26-x86-2.4.1-24.39.60.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219964" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1005879" ref_url="https://bugzilla.suse.com/1005879" source="BUGZILLA"/>
		<reference ref_id="1018832" ref_url="https://bugzilla.suse.com/1018832" source="BUGZILLA"/>
		<reference ref_id="961491" ref_url="https://bugzilla.suse.com/961491" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2017-5335" ref_url="https://www.suse.com/security/cve/CVE-2017-5335/" source="CVE"/>
		<reference ref_id="CVE-2017-5336" ref_url="https://www.suse.com/security/cve/CVE-2017-5336/" source="CVE"/>
		<reference ref_id="CVE-2017-5337" ref_url="https://www.suse.com/security/cve/CVE-2017-5337/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002604.html" source="SUSE-SU"/>
		<description>

This update for gnutls fixes the following issues:

- Malformed asn1 definitions could cause a segmentation fault in the asn1 definition parser (bsc#961491).
- CVE-2016-8610: Remote denial of service in SSL alert handling (bsc#1005879).
- CVE-2017-5335: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).
- CVE-2017-5336: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).
- CVE-2017-5337: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-27"/>
	<updated date="2017-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005879">SUSE bug 1005879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018832">SUSE bug 1018832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961491">SUSE bug 961491</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8610">CVE-2016-8610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5335/">CVE-2017-5335 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5335">CVE-2017-5335 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5336/">CVE-2017-5336 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5336">CVE-2017-5336 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5337/">CVE-2017-5337 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5337">CVE-2017-5337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582728" comment="gnutls-2.4.1-24.39.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564541" comment="libgnutls-extra26-2.4.1-24.39.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582729" comment="libgnutls26-2.4.1-24.39.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582730" comment="libgnutls26-32bit-2.4.1-24.39.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582731" comment="libgnutls26-x86-2.4.1-24.39.67.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582728" comment="gnutls-2.4.1-24.39.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564541" comment="libgnutls-extra26-2.4.1-24.39.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582729" comment="libgnutls26-2.4.1-24.39.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582730" comment="libgnutls26-32bit-2.4.1-24.39.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582731" comment="libgnutls26-x86-2.4.1-24.39.67.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219965" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1034173" ref_url="https://bugzilla.suse.com/1034173" source="BUGZILLA"/>
		<reference ref_id="1038337" ref_url="https://bugzilla.suse.com/1038337" source="BUGZILLA"/>
		<reference ref_id="1040621" ref_url="https://bugzilla.suse.com/1040621" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6891" ref_url="https://www.suse.com/security/cve/CVE-2017-6891/" source="CVE"/>
		<reference ref_id="CVE-2017-7869" ref_url="https://www.suse.com/security/cve/CVE-2017-7869/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003036.html" source="SUSE-SU"/>
		<description>
This update for gnutls fixes the following issues:

- GNUTLS-SA-2017-3 / CVE-2017-7869: An out-of-bounds write in OpenPGP certificate decoding was fixed (bsc#1034173)
- CVE-2017-6891: A potential stack buffer overflow in the bundled libtasn1 was fixed (bsc#1040621)
- An address read of 4 bytes past the end of buffer in OpenPGP certificate parsing was fixed (bsc#1038337)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-15"/>
	<updated date="2017-07-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034173">SUSE bug 1034173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038337">SUSE bug 1038337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040621">SUSE bug 1040621</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6891/">CVE-2017-6891 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6891">CVE-2017-6891 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7869/">CVE-2017-7869 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7869">CVE-2017-7869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582732" comment="gnutls-2.4.1-24.39.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564544" comment="libgnutls-extra26-2.4.1-24.39.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582733" comment="libgnutls26-2.4.1-24.39.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582734" comment="libgnutls26-32bit-2.4.1-24.39.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582735" comment="libgnutls26-x86-2.4.1-24.39.70.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582732" comment="gnutls-2.4.1-24.39.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564544" comment="libgnutls-extra26-2.4.1-24.39.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582733" comment="libgnutls26-2.4.1-24.39.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582734" comment="libgnutls26-32bit-2.4.1-24.39.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582735" comment="libgnutls26-x86-2.4.1-24.39.70.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219966" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="918089" ref_url="https://bugzilla.suse.com/918089" source="BUGZILLA"/>
		<reference ref_id="918090" ref_url="https://bugzilla.suse.com/918090" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1606" ref_url="https://www.suse.com/security/cve/CVE-2015-1606/" source="CVE"/>
		<reference ref_id="CVE-2015-1607" ref_url="https://www.suse.com/security/cve/CVE-2015-1607/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001708.html" source="SUSE-SU"/>
		<description>

This update for gpg2 fixes the following issues: 

- Fix cve-2015-1606 (bsc#918089)
  * Invalid memory read using a garbled keyring
  * 0001-Gpg-prevent-an-invalid-memory-read-using-a-garbled-k.patch
- Fix cve-2015-1607 (bsc#918090)
  * Memcpy with overlapping ranges
  * 0001-Use-inline-functions-to-convert-buffer-data-to-scala.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-02"/>
	<updated date="2015-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/918089">SUSE bug 918089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918090">SUSE bug 918090</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1606/">CVE-2015-1606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1606">CVE-2015-1606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1607/">CVE-2015-1607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1607">CVE-2015-1607 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578044" comment="gpg2-2.0.9-25.33.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578045" comment="gpg2-lang-2.0.9-25.33.41.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578044" comment="gpg2-2.0.9-25.33.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578045" comment="gpg2-lang-2.0.9-25.33.41.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219967" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1096745" ref_url="https://bugzilla.suse.com/1096745" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12020" ref_url="https://www.suse.com/security/cve/CVE-2018-12020/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004193.html" source="SUSE-SU"/>
		<description>
This update for gpg2 fixes the following issues:

- CVE-2018-12020: GnuPG mishandled the original filename during decryption and
  verification actions, which allowed remote attackers to spoof the output that
  GnuPG sends on file descriptor 2 to other programs that use the '--status-fd 2'
  option (bsc#1096745)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-15"/>
	<updated date="2018-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096745">SUSE bug 1096745</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12020/">CVE-2018-12020 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12020">CVE-2018-12020 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582736" comment="gpg2-2.0.9-25.33.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582737" comment="gpg2-lang-2.0.9-25.33.42.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582736" comment="gpg2-2.0.9-25.33.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582737" comment="gpg2-lang-2.0.9-25.33.42.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219968" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="884828" ref_url="https://bugzilla.suse.com/884828" source="BUGZILLA"/>
		<reference ref_id="884830" ref_url="https://bugzilla.suse.com/884830" source="BUGZILLA"/>
		<reference ref_id="946148" ref_url="https://bugzilla.suse.com/946148" source="BUGZILLA"/>
		<reference ref_id="952539" ref_url="https://bugzilla.suse.com/952539" source="BUGZILLA"/>
		<reference ref_id="954592" ref_url="https://bugzilla.suse.com/954592" source="BUGZILLA"/>
		<reference ref_id="956631" ref_url="https://bugzilla.suse.com/956631" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8370" ref_url="https://www.suse.com/security/cve/CVE-2015-8370/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001766.html" source="SUSE-SU"/>
		<description>
This update for grub2 provides the following fixes:

A security issues with a bufferoverflow when reading username and password was fixed (bsc#956631, CVE-2015-8370)

Also following bugs were fixed:
- Fix buffer overflows when reading username and password. (bsc#956631, CVE-2015-8370)
- Expand list of grub.cfg search path in PV Xen guests for systems installed
  on btrfs snapshots. (bsc#946148, bsc#952539)
- Add grub.xen config searching path on boot partition. (bsc#884828)
- Add linux16 and initrd16 to grub.xen. (bsc#884830)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-29"/>
	<updated date="2015-12-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/884828">SUSE bug 884828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884830">SUSE bug 884830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946148">SUSE bug 946148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952539">SUSE bug 952539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954592">SUSE bug 954592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956631">SUSE bug 956631</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8370/">CVE-2015-8370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8370">CVE-2015-8370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567331" comment="grub2-x86_64-efi-2.00-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567332" comment="grub2-x86_64-xen-2.00-0.54.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567331" comment="grub2-x86_64-efi-2.00-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567332" comment="grub2-x86_64-xen-2.00-0.54.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219969" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1045063" ref_url="https://bugzilla.suse.com/1045063" source="BUGZILLA"/>
		<reference ref_id="1124662" ref_url="https://bugzilla.suse.com/1124662" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9763" ref_url="https://www.suse.com/security/cve/CVE-2017-9763/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005250.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

Security issue fixed:

- CVE-2017-9763: Fixed a memory leak in grub_ext2_read_block (bsc#1045063)

Other issues addressed: 

- Added support for  tftp block counter roll-over and backported support for efinetSNP open (bsc#1124662).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1045063">SUSE bug 1045063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124662">SUSE bug 1124662</bugzilla>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9763/">CVE-2017-9763 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9763">CVE-2017-9763 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582738" comment="grub2-x86_64-efi-2.00-0.66.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582739" comment="grub2-x86_64-xen-2.00-0.66.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582738" comment="grub2-x86_64-efi-2.00-0.66.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582739" comment="grub2-x86_64-xen-2.00-0.66.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219970" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1084632" ref_url="https://bugzilla.suse.com/1084632" source="BUGZILLA"/>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1173812" ref_url="https://bugzilla.suse.com/1173812" source="BUGZILLA"/>
		<reference ref_id="1174463" ref_url="https://bugzilla.suse.com/1174463" source="BUGZILLA"/>
		<reference ref_id="1174570" ref_url="https://bugzilla.suse.com/1174570" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="CVE-2020-14308" ref_url="https://www.suse.com/security/cve/CVE-2020-14308/" source="CVE"/>
		<reference ref_id="CVE-2020-14309" ref_url="https://www.suse.com/security/cve/CVE-2020-14309/" source="CVE"/>
		<reference ref_id="CVE-2020-14310" ref_url="https://www.suse.com/security/cve/CVE-2020-14310/" source="CVE"/>
		<reference ref_id="CVE-2020-14311" ref_url="https://www.suse.com/security/cve/CVE-2020-14311/" source="CVE"/>
		<reference ref_id="CVE-2020-15706" ref_url="https://www.suse.com/security/cve/CVE-2020-15706/" source="CVE"/>
		<reference ref_id="CVE-2020-15707" ref_url="https://www.suse.com/security/cve/CVE-2020-15707/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

- Fix for CVE-2020-10713 (bsc#1168994)
- Fix for CVE-2020-14308 CVE-2020-14309, CVE-2020-14310, CVE-2020-14311
  (bsc#1173812)
- Fix for CVE-2020-15706 (bsc#1174463)
- Fix for CVE-2020-15707 (bsc#1174570)

- Fix packed-not-aligned error on GCC 8 (bsc#1084632)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1084632">SUSE bug 1084632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174463">SUSE bug 1174463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174570">SUSE bug 1174570</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10713">CVE-2020-10713 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14308/">CVE-2020-14308 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14308">CVE-2020-14308 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14309/">CVE-2020-14309 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14309">CVE-2020-14309 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14310/">CVE-2020-14310 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14310">CVE-2020-14310 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14311/">CVE-2020-14311 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14311">CVE-2020-14311 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15706/">CVE-2020-15706 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15706">CVE-2020-15706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15707/">CVE-2020-15707 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15707">CVE-2020-15707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582740" comment="grub2-x86_64-efi-2.00-0.66.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582741" comment="grub2-x86_64-xen-2.00-0.66.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219971" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1174421" ref_url="https://bugzilla.suse.com/1174421" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15705" ref_url="https://www.suse.com/security/cve/CVE-2020-15705/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007297.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

- CVE-2020-15705: Fail kernel validation without shim protocol (bsc#1174421).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174421">SUSE bug 1174421</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15705/">CVE-2020-15705 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15705">CVE-2020-15705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582742" comment="grub2-x86_64-efi-2.00-0.66.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582743" comment="grub2-x86_64-xen-2.00-0.66.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219972" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1175970" ref_url="https://bugzilla.suse.com/1175970" source="BUGZILLA"/>
		<reference ref_id="1176711" ref_url="https://bugzilla.suse.com/1176711" source="BUGZILLA"/>
		<reference ref_id="1177883" ref_url="https://bugzilla.suse.com/1177883" source="BUGZILLA"/>
		<reference ref_id="1179264" ref_url="https://bugzilla.suse.com/1179264" source="BUGZILLA"/>
		<reference ref_id="1179265" ref_url="https://bugzilla.suse.com/1179265" source="BUGZILLA"/>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<reference ref_id="1182262" ref_url="https://bugzilla.suse.com/1182262" source="BUGZILLA"/>
		<reference ref_id="1182263" ref_url="https://bugzilla.suse.com/1182263" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9763" ref_url="https://www.suse.com/security/cve/CVE-2017-9763/" source="CVE"/>
		<reference ref_id="CVE-2020-14372" ref_url="https://www.suse.com/security/cve/CVE-2020-14372/" source="CVE"/>
		<reference ref_id="CVE-2020-25632" ref_url="https://www.suse.com/security/cve/CVE-2020-25632/" source="CVE"/>
		<reference ref_id="CVE-2020-25647" ref_url="https://www.suse.com/security/cve/CVE-2020-25647/" source="CVE"/>
		<reference ref_id="CVE-2020-27749" ref_url="https://www.suse.com/security/cve/CVE-2020-27749/" source="CVE"/>
		<reference ref_id="CVE-2020-27779" ref_url="https://www.suse.com/security/cve/CVE-2020-27779/" source="CVE"/>
		<reference ref_id="CVE-2021-20225" ref_url="https://www.suse.com/security/cve/CVE-2021-20225/" source="CVE"/>
		<reference ref_id="CVE-2021-20233" ref_url="https://www.suse.com/security/cve/CVE-2021-20233/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018162.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

grub2 now implements the new 'SBAT' method for SHIM based secure boot revocation. (bsc#1182057)

grub2 was updated to the 2.02 version (same as SUSE Linux Enterprise 12 SP3).

Following security issues are fixed that can violate secure boot constraints:

- CVE-2020-25632: Fixed a use-after-free in rmmod command (bsc#1176711)
- CVE-2020-25647: Fixed an out-of-bound write in grub_usb_device_initialize() (bsc#1177883)
- CVE-2020-27749: Fixed a stack buffer overflow in grub_parser_split_cmdline (bsc#1179264)
- CVE-2020-27779, CVE-2020-14372: Disallow cutmem and acpi commands in secure boot mode (bsc#1179265 bsc#1175970)
- CVE-2021-20225: Fixed a heap out-of-bounds write in short form option parser (bsc#1182262)
- CVE-2021-20233: Fixed a heap out-of-bound write due to mis-calculation of space required for quoting (bsc#1182263)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175970">SUSE bug 1175970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176711">SUSE bug 1176711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177883">SUSE bug 1177883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179264">SUSE bug 1179264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179265">SUSE bug 1179265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182262">SUSE bug 1182262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182263">SUSE bug 1182263</bugzilla>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9763/">CVE-2017-9763 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9763">CVE-2017-9763 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14372/">CVE-2020-14372 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14372">CVE-2020-14372 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25632/">CVE-2020-25632 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25632">CVE-2020-25632 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25647/">CVE-2020-25647 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25647">CVE-2020-25647 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27749/">CVE-2020-27749 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27749">CVE-2020-27749 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27779/">CVE-2020-27779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27779">CVE-2020-27779 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20225/">CVE-2021-20225 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20225">CVE-2021-20225 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20233/">CVE-2021-20233 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20233">CVE-2021-20233 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582744" comment="grub2-x86_64-efi-2.02-0.66.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582745" comment="grub2-x86_64-xen-2.02-0.66.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219973" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1013669" ref_url="https://bugzilla.suse.com/1013669" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9811" ref_url="https://www.suse.com/security/cve/CVE-2016-9811/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002598.html" source="SUSE-SU"/>
		<description>

This update for gstreamer-0_10-plugins-base fixes the following issue:

- CVE-2016-9811: Out of bounds memory read in windows_icon_typefind (bsc#1013669).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-25"/>
	<updated date="2017-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013669">SUSE bug 1013669</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9811/">CVE-2016-9811 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9811">CVE-2016-9811 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582746" comment="gstreamer-0_10-plugins-base-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582747" comment="gstreamer-0_10-plugins-base-32bit-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582748" comment="gstreamer-0_10-plugins-base-doc-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582749" comment="gstreamer-0_10-plugins-base-lang-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582750" comment="gstreamer-0_10-plugins-base-x86-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582751" comment="libgstapp-0_10-0-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582752" comment="libgstapp-0_10-0-32bit-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582753" comment="libgstapp-0_10-0-x86-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582754" comment="libgstinterfaces-0_10-0-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582755" comment="libgstinterfaces-0_10-0-32bit-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582756" comment="libgstinterfaces-0_10-0-x86-0.10.35-5.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582746" comment="gstreamer-0_10-plugins-base-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582747" comment="gstreamer-0_10-plugins-base-32bit-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582748" comment="gstreamer-0_10-plugins-base-doc-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582749" comment="gstreamer-0_10-plugins-base-lang-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582750" comment="gstreamer-0_10-plugins-base-x86-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582751" comment="libgstapp-0_10-0-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582752" comment="libgstapp-0_10-0-32bit-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582753" comment="libgstapp-0_10-0-x86-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582754" comment="libgstinterfaces-0_10-0-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582755" comment="libgstinterfaces-0_10-0-32bit-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582756" comment="libgstinterfaces-0_10-0-x86-0.10.35-5.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219974" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1024076" ref_url="https://bugzilla.suse.com/1024076" source="BUGZILLA"/>
		<reference ref_id="1024079" ref_url="https://bugzilla.suse.com/1024079" source="BUGZILLA"/>
		<reference ref_id="1133375" ref_url="https://bugzilla.suse.com/1133375" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5837" ref_url="https://www.suse.com/security/cve/CVE-2017-5837/" source="CVE"/>
		<reference ref_id="CVE-2017-5844" ref_url="https://www.suse.com/security/cve/CVE-2017-5844/" source="CVE"/>
		<reference ref_id="CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005542.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-0_10-plugins-base fixes the following issues:

Security issues fixed:

- CVE-2017-5837: Fixed a floating point exception in gst_riff_create_audio_caps (bsc#1024076).
- CVE-2017-5844: Fixed a floating point exception in gst_riff_create_audio_caps (bsc#1024079).
- CVE-2019-9928: Fixed a heap-based overflow in the rtsp connection parser (bsc#1133375).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-11"/>
	<updated date="2019-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1024076">SUSE bug 1024076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024079">SUSE bug 1024079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133375">SUSE bug 1133375</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5837/">CVE-2017-5837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5837">CVE-2017-5837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5844/">CVE-2017-5844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5844">CVE-2017-5844 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9928">CVE-2019-9928 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582757" comment="gstreamer-0_10-plugins-base-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582758" comment="gstreamer-0_10-plugins-base-32bit-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582759" comment="gstreamer-0_10-plugins-base-doc-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582760" comment="gstreamer-0_10-plugins-base-lang-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582761" comment="libgstapp-0_10-0-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582762" comment="libgstapp-0_10-0-32bit-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582763" comment="libgstinterfaces-0_10-0-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582764" comment="libgstinterfaces-0_10-0-32bit-0.10.35-5.18.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219975" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-good (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1012102" ref_url="https://bugzilla.suse.com/1012102" source="BUGZILLA"/>
		<reference ref_id="1012103" ref_url="https://bugzilla.suse.com/1012103" source="BUGZILLA"/>
		<reference ref_id="1012104" ref_url="https://bugzilla.suse.com/1012104" source="BUGZILLA"/>
		<reference ref_id="1013653" ref_url="https://bugzilla.suse.com/1013653" source="BUGZILLA"/>
		<reference ref_id="1013655" ref_url="https://bugzilla.suse.com/1013655" source="BUGZILLA"/>
		<reference ref_id="1013663" ref_url="https://bugzilla.suse.com/1013663" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9634" ref_url="https://www.suse.com/security/cve/CVE-2016-9634/" source="CVE"/>
		<reference ref_id="CVE-2016-9635" ref_url="https://www.suse.com/security/cve/CVE-2016-9635/" source="CVE"/>
		<reference ref_id="CVE-2016-9636" ref_url="https://www.suse.com/security/cve/CVE-2016-9636/" source="CVE"/>
		<reference ref_id="CVE-2016-9807" ref_url="https://www.suse.com/security/cve/CVE-2016-9807/" source="CVE"/>
		<reference ref_id="CVE-2016-9808" ref_url="https://www.suse.com/security/cve/CVE-2016-9808/" source="CVE"/>
		<reference ref_id="CVE-2016-9810" ref_url="https://www.suse.com/security/cve/CVE-2016-9810/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002570.html" source="SUSE-SU"/>
		<description>

gstreamer-0_10-plugins-good was updated to fix six security issues.

These security issues were fixed:

- CVE-2016-9634: Invalid FLIC files could have caused and an out-of-bounds write (bsc#1012102)
- CVE-2016-9635: Invalid FLIC files could have caused and an out-of-bounds write (bsc#1012103)
- CVE-2016-9636: Prevent maliciously crafted flic files from causing invalid memory writes (bsc#1012104).
- CVE-2016-9807: Prevent the reading of invalid memory in flx_decode_chunks, leading to DoS (bsc#1013655)
- CVE-2016-9808: Prevent maliciously crafted flic files from causing invalid memory accesses (bsc#1013653)
- CVE-2016-9810: Invalid files can be used to extraneous unreferences, leading to invalid memory access and DoS (bsc#1013663)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-20"/>
	<updated date="2017-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012102">SUSE bug 1012102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012103">SUSE bug 1012103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012104">SUSE bug 1012104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013653">SUSE bug 1013653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013655">SUSE bug 1013655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013663">SUSE bug 1013663</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9634/">CVE-2016-9634 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9634">CVE-2016-9634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9635/">CVE-2016-9635 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9635">CVE-2016-9635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9636/">CVE-2016-9636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9636">CVE-2016-9636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9807/">CVE-2016-9807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9807">CVE-2016-9807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9808/">CVE-2016-9808 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9808">CVE-2016-9808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9810/">CVE-2016-9810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9810">CVE-2016-9810 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582765" comment="gstreamer-0_10-plugins-good-0.10.30-5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582766" comment="gstreamer-0_10-plugins-good-doc-0.10.30-5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582767" comment="gstreamer-0_10-plugins-good-lang-0.10.30-5.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582765" comment="gstreamer-0_10-plugins-good-0.10.30-5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582766" comment="gstreamer-0_10-plugins-good-doc-0.10.30-5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582767" comment="gstreamer-0_10-plugins-good-lang-0.10.30-5.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219976" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="922741" ref_url="https://bugzilla.suse.com/922741" source="BUGZILLA"/>
		<reference ref_id="942801" ref_url="https://bugzilla.suse.com/942801" source="BUGZILLA"/>
		<reference ref_id="948791" ref_url="https://bugzilla.suse.com/948791" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-7674" ref_url="https://www.suse.com/security/cve/CVE-2015-7674/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001638.html" source="SUSE-SU"/>
		<description>
gtk2 was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-4491: Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, allowed remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that were mishandled during scaling (bsc#942801).
- CVE-2015-7674: Fix overflow when scaling GIF files (bsc#948791).

This non-security issue was fixed:
- Add the script which generates gdk-pixbuf64.loaders to the spec file (bsc#922741).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-07"/>
	<updated date="2015-10-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/922741">SUSE bug 922741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942801">SUSE bug 942801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948791">SUSE bug 948791</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4491">CVE-2015-4491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7674/">CVE-2015-7674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7674">CVE-2015-7674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578075" comment="gtk2-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578076" comment="gtk2-32bit-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578077" comment="gtk2-doc-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578078" comment="gtk2-lang-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578079" comment="gtk2-x86-2.18.9-0.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578075" comment="gtk2-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578076" comment="gtk2-32bit-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578077" comment="gtk2-doc-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578078" comment="gtk2-lang-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578079" comment="gtk2-x86-2.18.9-0.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219977" version="1" class="patch">
	<metadata>
		<title>Security update for gdk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="958963" ref_url="https://bugzilla.suse.com/958963" source="BUGZILLA"/>
		<reference ref_id="960155" ref_url="https://bugzilla.suse.com/960155" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7552" ref_url="https://www.suse.com/security/cve/CVE-2015-7552/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001835.html" source="SUSE-SU"/>
		<description>
This update for gdk2 fixes the following security issues:

- CVE-2015-7552: various overflows, including heap overflow in flipping bmp files (bsc#958963)

The following non-security issues were fixed:

- bsc#960155: fix a possible divide by zero		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-29"/>
	<updated date="2016-01-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958963">SUSE bug 958963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960155">SUSE bug 960155</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7552/">CVE-2015-7552 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7552">CVE-2015-7552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578080" comment="gtk2-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578081" comment="gtk2-32bit-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578082" comment="gtk2-doc-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578083" comment="gtk2-lang-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578084" comment="gtk2-x86-2.18.9-0.39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578080" comment="gtk2-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578081" comment="gtk2-32bit-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578082" comment="gtk2-doc-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578083" comment="gtk2-lang-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578084" comment="gtk2-x86-2.18.9-0.39.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219978" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="966682" ref_url="https://bugzilla.suse.com/966682" source="BUGZILLA"/>
		<reference ref_id="988745" ref_url="https://bugzilla.suse.com/988745" source="BUGZILLA"/>
		<reference ref_id="991450" ref_url="https://bugzilla.suse.com/991450" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447/" source="CVE"/>
		<reference ref_id="CVE-2016-6352" ref_url="https://www.suse.com/security/cve/CVE-2016-6352/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002333.html" source="SUSE-SU"/>
		<description>

This update for gtk2 fixes the following security issues:

- CVE-2016-6352: Some crashes were fixed, including a out of bounds
  write in the OneLine32() function that could be used by attackers to
  crash GTK/GDK programs.
- CVE-2013-7447: Avoid overflow when allocating a cairo pixbuf (bsc#966682).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-13"/>
	<updated date="2016-10-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/966682">SUSE bug 966682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988745">SUSE bug 988745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991450">SUSE bug 991450</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7447">CVE-2013-7447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6352/">CVE-2016-6352 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6352">CVE-2016-6352 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582768" comment="gtk2-2.18.9-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582769" comment="gtk2-32bit-2.18.9-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582770" comment="gtk2-doc-2.18.9-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582771" comment="gtk2-lang-2.18.9-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582772" comment="gtk2-x86-2.18.9-0.44.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582768" comment="gtk2-2.18.9-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582769" comment="gtk2-32bit-2.18.9-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582770" comment="gtk2-doc-2.18.9-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582771" comment="gtk2-lang-2.18.9-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582772" comment="gtk2-x86-2.18.9-0.44.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219979" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1053417" ref_url="https://bugzilla.suse.com/1053417" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003740.html" source="SUSE-SU"/>
		<description>
This update for gtk2 fixes the following issues:

This security issue was fixed:

- Add checks for multiplications at several locations to avoid mishandling
  memory. This allowed attackers to cause DoS or potentially RCE (bsc#1053417).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1053417">SUSE bug 1053417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582773" comment="gtk2-2.18.9-0.45.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582774" comment="gtk2-32bit-2.18.9-0.45.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582775" comment="gtk2-doc-2.18.9-0.45.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582776" comment="gtk2-lang-2.18.9-0.45.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582777" comment="gtk2-x86-2.18.9-0.45.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582773" comment="gtk2-2.18.9-0.45.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582774" comment="gtk2-32bit-2.18.9-0.45.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582775" comment="gtk2-doc-2.18.9-0.45.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582776" comment="gtk2-lang-2.18.9-0.45.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582777" comment="gtk2-x86-2.18.9-0.45.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219980" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027024" ref_url="https://bugzilla.suse.com/1027024" source="BUGZILLA"/>
		<reference ref_id="1027025" ref_url="https://bugzilla.suse.com/1027025" source="BUGZILLA"/>
		<reference ref_id="1027026" ref_url="https://bugzilla.suse.com/1027026" source="BUGZILLA"/>
		<reference ref_id="1039465" ref_url="https://bugzilla.suse.com/1039465" source="BUGZILLA"/>
		<reference ref_id="1048289" ref_url="https://bugzilla.suse.com/1048289" source="BUGZILLA"/>
		<reference ref_id="1048544" ref_url="https://bugzilla.suse.com/1048544" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2862" ref_url="https://www.suse.com/security/cve/CVE-2017-2862/" source="CVE"/>
		<reference ref_id="CVE-2017-2870" ref_url="https://www.suse.com/security/cve/CVE-2017-2870/" source="CVE"/>
		<reference ref_id="CVE-2017-6312" ref_url="https://www.suse.com/security/cve/CVE-2017-6312/" source="CVE"/>
		<reference ref_id="CVE-2017-6313" ref_url="https://www.suse.com/security/cve/CVE-2017-6313/" source="CVE"/>
		<reference ref_id="CVE-2017-6314" ref_url="https://www.suse.com/security/cve/CVE-2017-6314/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004484.html" source="SUSE-SU"/>
		<description>
This update for gtk2 provides the following fixes:

These security issues were fixed:

- CVE-2017-6312: Prevent integer overflow that allowed context-dependent
  attackers to cause a denial of service (segmentation fault and application
  crash) via a crafted image entry offset in an ICO file (bsc#1027026).
- CVE-2017-6314: The make_available_at_least function allowed context-dependent
  attackers to cause a denial of service (infinite loop) via a large TIFF file
  (bsc#1027025).
- CVE-2017-6313: Prevent integer underflow in the load_resources function that
  allowed context-dependent attackers to cause a denial of service (out-of-bounds
  read and program crash) via a crafted image entry size in an ICO file
  (bsc#1027024).
- CVE-2017-2862: Prevent heap overflow in the
  gdk_pixbuf__jpeg_image_load_increment function. A specially crafted jpeg file
  could have caused a heap overflow resulting in remote code execution
  (bsc#1048289)
- CVE-2017-2870: Prevent integer overflow in the tiff_image_parse
  functionality. A specially crafted tiff file could have caused a heap-overflow
  resulting in remote code execution (bsc#1048544).

This non-security issue was fixed:

- Prevent an infinite loop when a window is destroyed while traversed (bsc#1039465).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-21"/>
	<updated date="2018-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027024">SUSE bug 1027024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027025">SUSE bug 1027025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027026">SUSE bug 1027026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039465">SUSE bug 1039465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048289">SUSE bug 1048289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048544">SUSE bug 1048544</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2862/">CVE-2017-2862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2862">CVE-2017-2862 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-2870/">CVE-2017-2870 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2870">CVE-2017-2870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6312/">CVE-2017-6312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6312">CVE-2017-6312 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6313/">CVE-2017-6313 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6313">CVE-2017-6313 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6314/">CVE-2017-6314 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6314">CVE-2017-6314 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582778" comment="gtk2-2.18.9-0.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582779" comment="gtk2-32bit-2.18.9-0.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582780" comment="gtk2-doc-2.18.9-0.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582781" comment="gtk2-lang-2.18.9-0.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582782" comment="gtk2-x86-2.18.9-0.45.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582778" comment="gtk2-2.18.9-0.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582779" comment="gtk2-32bit-2.18.9-0.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582780" comment="gtk2-doc-2.18.9-0.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582781" comment="gtk2-lang-2.18.9-0.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582782" comment="gtk2-x86-2.18.9-0.45.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219981" version="1" class="patch">
	<metadata>
		<title>Security update for guile (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1004221" ref_url="https://bugzilla.suse.com/1004221" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8605" ref_url="https://www.suse.com/security/cve/CVE-2016-8605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002622.html" source="SUSE-SU"/>
		<description>

This update for guile fixes the following issues:

- CVE-2016-8605: Fixed thread-unsafe umask modification (bsc#1004221).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-06"/>
	<updated date="2017-02-06"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1004221">SUSE bug 1004221</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8605/">CVE-2016-8605 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8605">CVE-2016-8605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582783" comment="guile-1.8.5-24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582783" comment="guile-1.8.5-24.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219982" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="917129" ref_url="https://bugzilla.suse.com/917129" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9654" ref_url="https://www.suse.com/security/cve/CVE-2014-9654/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001640.html" source="SUSE-SU"/>
		<description>
icu was updated to fix one security issue.

This security issue was fixed:
- CVE-2014-9654: Insufficient size limit checks in regular expression compiler (bsc#917129).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-15"/>
	<updated date="2015-10-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/917129">SUSE bug 917129</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9654/">CVE-2014-9654 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9654">CVE-2014-9654 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582784" comment="libicu-4.0-7.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582785" comment="libicu-32bit-4.0-7.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582786" comment="libicu-doc-4.0-7.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582787" comment="libicu-x86-4.0-7.30.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582784" comment="libicu-4.0-7.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582785" comment="libicu-32bit-4.0-7.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582786" comment="libicu-doc-4.0-7.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582787" comment="libicu-x86-4.0-7.30.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219983" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="952260" ref_url="https://bugzilla.suse.com/952260" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9654" ref_url="https://www.suse.com/security/cve/CVE-2014-9654/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002018.html" source="SUSE-SU"/>
		<description>

This update for icu fixes the following issue:

The previous patch for CVE-2014-9654 was incorrect and lead
to non-working regular expressions. This update fixes this 
problem (bsc#952260)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-18"/>
	<updated date="2016-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952260">SUSE bug 952260</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9654/">CVE-2014-9654 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9654">CVE-2014-9654 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582788" comment="libicu-4.0-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582789" comment="libicu-32bit-4.0-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582790" comment="libicu-doc-4.0-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582791" comment="libicu-x86-4.0-38.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582788" comment="libicu-4.0-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582789" comment="libicu-32bit-4.0-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582790" comment="libicu-doc-4.0-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582791" comment="libicu-x86-4.0-38.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219984" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1012224" ref_url="https://bugzilla.suse.com/1012224" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9911" ref_url="https://www.suse.com/security/cve/CVE-2014-9911/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002590.html" source="SUSE-SU"/>
		<description>

This update for icu fixes the following security issues:

- Passing a locale string longer than 255 characters to uloc_getDisplayName()
  could have caused a buffer overflow resulting in denial of service or
  possible code execution (bsc#1012224, CVE-2014-9911).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-23"/>
	<updated date="2017-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1012224">SUSE bug 1012224</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9911/">CVE-2014-9911 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9911">CVE-2014-9911 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582792" comment="libicu-4.0-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582793" comment="libicu-32bit-4.0-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582794" comment="libicu-doc-4.0-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582795" comment="libicu-x86-4.0-43.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582792" comment="libicu-4.0-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582793" comment="libicu-32bit-4.0-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582794" comment="libicu-doc-4.0-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582795" comment="libicu-x86-4.0-43.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219985" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1023033" ref_url="https://bugzilla.suse.com/1023033" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9911" ref_url="https://www.suse.com/security/cve/CVE-2014-9911/" source="CVE"/>
		<description>

This update for icu fixes the following issues:

- CVE-2014-9911: The fix was updated to not crash (NULL ptr deref) when resPath is NULL (bsc#1023033). 
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023033">SUSE bug 1023033</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9911/">CVE-2014-9911 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9911">CVE-2014-9911 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582796" comment="libicu-4.0-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582797" comment="libicu-32bit-4.0-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582798" comment="libicu-doc-4.0-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582799" comment="libicu-x86-4.0-46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582796" comment="libicu-4.0-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582797" comment="libicu-32bit-4.0-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582798" comment="libicu-doc-4.0-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582799" comment="libicu-x86-4.0-46.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219986" version="1" class="patch">
	<metadata>
		<title>Recommended update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1037416" ref_url="https://bugzilla.suse.com/1037416" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9911" ref_url="https://www.suse.com/security/cve/CVE-2014-9911/" source="CVE"/>
		<reference ref_id="SUSE-RU-2018:0028-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007695.html" source="SUSE-SU"/>
		<description>

This update for icu fixes the following issue:

- Fix international date/time format output (a regression caused by the fix for CVE-2014-9911) (bsc#1037416).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-05"/>
	<updated date="2018-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1037416">SUSE bug 1037416</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9911/">CVE-2014-9911 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9911">CVE-2014-9911 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009593717" comment="libicu-4.0-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593718" comment="libicu-32bit-4.0-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593719" comment="libicu-doc-4.0-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593720" comment="libicu-x86-4.0-47.3.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009593717" comment="libicu-4.0-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593718" comment="libicu-32bit-4.0-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593719" comment="libicu-doc-4.0-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593720" comment="libicu-x86-4.0-47.3.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219987" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1034674" ref_url="https://bugzilla.suse.com/1034674" source="BUGZILLA"/>
		<reference ref_id="1034678" ref_url="https://bugzilla.suse.com/1034678" source="BUGZILLA"/>
		<reference ref_id="1067203" ref_url="https://bugzilla.suse.com/1067203" source="BUGZILLA"/>
		<reference ref_id="1072193" ref_url="https://bugzilla.suse.com/1072193" source="BUGZILLA"/>
		<reference ref_id="1077999" ref_url="https://bugzilla.suse.com/1077999" source="BUGZILLA"/>
		<reference ref_id="990636" ref_url="https://bugzilla.suse.com/990636" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6293" ref_url="https://www.suse.com/security/cve/CVE-2016-6293/" source="CVE"/>
		<reference ref_id="CVE-2017-14952" ref_url="https://www.suse.com/security/cve/CVE-2017-14952/" source="CVE"/>
		<reference ref_id="CVE-2017-15422" ref_url="https://www.suse.com/security/cve/CVE-2017-15422/" source="CVE"/>
		<reference ref_id="CVE-2017-17484" ref_url="https://www.suse.com/security/cve/CVE-2017-17484/" source="CVE"/>
		<reference ref_id="CVE-2017-7867" ref_url="https://www.suse.com/security/cve/CVE-2017-7867/" source="CVE"/>
		<reference ref_id="CVE-2017-7868" ref_url="https://www.suse.com/security/cve/CVE-2017-7868/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004167.html" source="SUSE-SU"/>
		<description>
This update for icu fixes the following issues:

- CVE-2016-6293: The uloc_acceptLanguageFromHTTP function in common/uloc.cpp did not ensure that there is a '\0' character at the end of a certain temporary array, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long httpAcceptLanguage argument. (bsc#990636)
- CVE-2017-7868: ICU had an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_moveIndex32* function. (bsc#1034674)
- CVE-2017-7867: ICU had an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_setNativeIndex* function. (bsc#1034678)
- CVE-2017-14952: Double free in i18n/zonemeta.cpp allowed remote attackers to execute arbitrary code via a crafted string, aka a 'redundant UVector entry clean up function call' issue. (bsc#1067203)
- CVE-2017-17484:The ucnv_UTF8FromUTF8 function in ucnv_u8.cpp mishandled ucnv_convertEx calls for UTF-8 to UTF-8 conversion, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted string, as demonstrated by ZNC. (bsc#1072193)
- CVE-2017-15422: An integer overflow in persian calendar calculation was fixed, which could show wrong years. (bsc#1077999)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-08"/>
	<updated date="2018-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1034674">SUSE bug 1034674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034678">SUSE bug 1034678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067203">SUSE bug 1067203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072193">SUSE bug 1072193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077999">SUSE bug 1077999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990636">SUSE bug 990636</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6293/">CVE-2016-6293 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6293">CVE-2016-6293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14952/">CVE-2017-14952 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14952">CVE-2017-14952 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15422/">CVE-2017-15422 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15422">CVE-2017-15422 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17484/">CVE-2017-17484 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17484">CVE-2017-17484 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7867/">CVE-2017-7867 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7867">CVE-2017-7867 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7868/">CVE-2017-7868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7868">CVE-2017-7868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582800" comment="libicu-4.0-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582801" comment="libicu-32bit-4.0-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582802" comment="libicu-doc-4.0-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582803" comment="libicu-x86-4.0-47.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582800" comment="libicu-4.0-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582801" comment="libicu-32bit-4.0-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582802" comment="libicu-doc-4.0-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582803" comment="libicu-x86-4.0-47.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219988" version="1" class="patch">
	<metadata>
		<title>Security update for inn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1182321" ref_url="https://bugzilla.suse.com/1182321" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31998" ref_url="https://www.suse.com/security/cve/CVE-2021-31998/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009022.html" source="SUSE-SU"/>
		<description>
This update for inn fixes the following issues:

- CVE-2021-31998: Fixed locale privialge escalation during the update of inn (bsc#1182321).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182321">SUSE bug 1182321</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31998/">CVE-2021-31998 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31998">CVE-2021-31998 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582804" comment="inn-2.4.2-170.21.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219989" version="1" class="patch">
	<metadata>
		<title>Security update for intel-SINIT (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1069754" ref_url="https://bugzilla.suse.com/1069754" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-5174" ref_url="https://www.suse.com/security/cve/CVE-2011-5174/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003490.html" source="SUSE-SU"/>
		<description>
This update for intel-SINIT fixes the following issues:

Security issue fixed:

- CVE-2011-5174: Fixed security issue in old SINIT files which allowed local users to bypass the TXT protection mechanism (bsc#1069754). 
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-13"/>
	<updated date="2017-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1069754">SUSE bug 1069754</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2011-5174/">CVE-2011-5174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-5174">CVE-2011-5174 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578107" comment="intel-SINIT-1-0.81.3.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578107" comment="intel-SINIT-1-0.81.3.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219990" version="1" class="patch">
	<metadata>
		<title>Security update for ipmitool (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1038508" ref_url="https://bugzilla.suse.com/1038508" source="BUGZILLA"/>
		<reference ref_id="1163026" ref_url="https://bugzilla.suse.com/1163026" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-5208" ref_url="https://www.suse.com/security/cve/CVE-2020-5208/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006600.html" source="SUSE-SU"/>
		<description>
This update for ipmitool fixes the following issues:

- CVE-2020-5208: Fixed several buffer overflows (bsc#1163026).
- Added a missing patch for DDR4 support (bsc#1038508).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-12"/>
	<updated date="2020-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038508">SUSE bug 1038508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163026">SUSE bug 1163026</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5208/">CVE-2020-5208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5208">CVE-2020-5208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582805" comment="ipmitool-1.8.15-0.30.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219991" version="1" class="patch">
	<metadata>
		<title>Security update for ipsec-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="931989" ref_url="https://bugzilla.suse.com/931989" source="BUGZILLA"/>
		<reference ref_id="939810" ref_url="https://bugzilla.suse.com/939810" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4047" ref_url="https://www.suse.com/security/cve/CVE-2015-4047/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001531.html" source="SUSE-SU"/>
		<description>
ipsec-tools was updated to fix one security issue and a bug.

This security issue was fixed:

- CVE-2015-4047: racoon/gssapi.c in ipsec-tools allowed remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a series of crafted UDP requests (bsc#931989).

Due to a packaging error, the racoonf.conf config file was symlinked to /usr/share/doc/packages/ipsec-tools/examples/racoon/samples/racoon.conf
on some processor platforms, edits might have happened only in this example file.

Before upgrading, please check if /etc/racoon/racoon.conf is a symlink to this example file and backup the content. (bsc#939810)
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-06"/>
	<updated date="2015-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/931989">SUSE bug 931989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939810">SUSE bug 939810</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4047/">CVE-2015-4047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4047">CVE-2015-4047 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578108" comment="ipsec-tools-0.7.3-1.13.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578108" comment="ipsec-tools-0.7.3-1.13.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219992" version="1" class="patch">
	<metadata>
		<title>Security update for ipsec-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1047443" ref_url="https://bugzilla.suse.com/1047443" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10396" ref_url="https://www.suse.com/security/cve/CVE-2016-10396/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003723.html" source="SUSE-SU"/>
		<description>
This update for ipsec-tools fixes one issue.

This security issue was fixed:

- CVE-2016-10396: The racoon daemon contained a remotely exploitable
  computational-complexity attack when parsing and storing ISAKMP fragments that
  allowed a remote attacker to exhaust computational resources on the remote
  endpoint by repeatedly sending ISAKMP fragment packets in a particular order
  (bsc#1047443).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-12"/>
	<updated date="2018-02-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047443">SUSE bug 1047443</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10396/">CVE-2016-10396 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10396">CVE-2016-10396 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582806" comment="ipsec-tools-0.7.3-1.38.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582806" comment="ipsec-tools-0.7.3-1.38.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219993" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-commons-collections (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="954102" ref_url="https://bugzilla.suse.com/954102" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2016:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001828.html" source="SUSE-SU"/>
		<description>

This update to jakarta-commons-collections 3.2.2 fixes the following security issues:

* bsc#954102 code-execution by unserialization
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-25"/>
	<updated date="2016-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954102">SUSE bug 954102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571995" comment="jakarta-commons-collections-3.2.2-88.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571996" comment="jakarta-commons-collections-javadoc-3.2.2-88.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571997" comment="jakarta-commons-collections-tomcat5-3.2.2-88.36.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571995" comment="jakarta-commons-collections-3.2.2-88.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571996" comment="jakarta-commons-collections-javadoc-3.2.2-88.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571997" comment="jakarta-commons-collections-tomcat5-3.2.2-88.36.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219994" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-commons-fileupload (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1128829" ref_url="https://bugzilla.suse.com/1128829" source="BUGZILLA"/>
		<reference ref_id="1128963" ref_url="https://bugzilla.suse.com/1128963" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1000031" ref_url="https://www.suse.com/security/cve/CVE-2016-1000031/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14044-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914044-1.html" source="SUSE-SU"/>
		<description>
This update for jakarta-commons-fileupload fixes the following issue:

Security issue fixed:

- CVE-2016-1000031: Fixed remote execution (bsc#1128963, bsc#1128829).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1128829">SUSE bug 1128829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128963">SUSE bug 1128963</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1000031/">CVE-2016-1000031 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000031">CVE-2016-1000031 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567995" comment="jakarta-commons-fileupload-1.1.1-1.37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567996" comment="jakarta-commons-fileupload-javadoc-1.1.1-1.37.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219995" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-taglibs-standard (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="920813" ref_url="https://bugzilla.suse.com/920813" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0254" ref_url="https://www.suse.com/security/cve/CVE-2015-0254/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002984.html" source="SUSE-SU"/>
		<description>
This update for jakarta-taglibs-standard fixes the following issues:

- CVE-2015-0254: Apache Standard Taglibs allowed remote attackers to execute arbitrary code or conduct external XML entity (XXE) attacks via a crafted XSLT extension in a (1) x:parse or (2) x:transform JSTL XML tag. (bsc#920813)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-26"/>
	<updated date="2017-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/920813">SUSE bug 920813</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0254/">CVE-2015-0254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0254">CVE-2015-0254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572001" comment="jakarta-taglibs-standard-1.1.1-234.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572002" comment="jakarta-taglibs-standard-javadoc-1.1.1-234.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572001" comment="jakarta-taglibs-standard-1.1.1-234.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572002" comment="jakarta-taglibs-standard-javadoc-1.1.1-234.31.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219996" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1005084" ref_url="https://bugzilla.suse.com/1005084" source="BUGZILLA"/>
		<reference ref_id="1005090" ref_url="https://bugzilla.suse.com/1005090" source="BUGZILLA"/>
		<reference ref_id="1005242" ref_url="https://bugzilla.suse.com/1005242" source="BUGZILLA"/>
		<reference ref_id="1006591" ref_url="https://bugzilla.suse.com/1006591" source="BUGZILLA"/>
		<reference ref_id="1006593" ref_url="https://bugzilla.suse.com/1006593" source="BUGZILLA"/>
		<reference ref_id="1006597" ref_url="https://bugzilla.suse.com/1006597" source="BUGZILLA"/>
		<reference ref_id="1006598" ref_url="https://bugzilla.suse.com/1006598" source="BUGZILLA"/>
		<reference ref_id="1006599" ref_url="https://bugzilla.suse.com/1006599" source="BUGZILLA"/>
		<reference ref_id="1006836" ref_url="https://bugzilla.suse.com/1006836" source="BUGZILLA"/>
		<reference ref_id="1006839" ref_url="https://bugzilla.suse.com/1006839" source="BUGZILLA"/>
		<reference ref_id="1007009" ref_url="https://bugzilla.suse.com/1007009" source="BUGZILLA"/>
		<reference ref_id="392410" ref_url="https://bugzilla.suse.com/392410" source="BUGZILLA"/>
		<reference ref_id="941919" ref_url="https://bugzilla.suse.com/941919" source="BUGZILLA"/>
		<reference ref_id="942553" ref_url="https://bugzilla.suse.com/942553" source="BUGZILLA"/>
		<reference ref_id="961886" ref_url="https://bugzilla.suse.com/961886" source="BUGZILLA"/>
		<reference ref_id="963983" ref_url="https://bugzilla.suse.com/963983" source="BUGZILLA"/>
		<reference ref_id="968373" ref_url="https://bugzilla.suse.com/968373" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-3522" ref_url="https://www.suse.com/security/cve/CVE-2008-3522/" source="CVE"/>
		<reference ref_id="CVE-2015-5203" ref_url="https://www.suse.com/security/cve/CVE-2015-5203/" source="CVE"/>
		<reference ref_id="CVE-2015-5221" ref_url="https://www.suse.com/security/cve/CVE-2015-5221/" source="CVE"/>
		<reference ref_id="CVE-2016-1577" ref_url="https://www.suse.com/security/cve/CVE-2016-1577/" source="CVE"/>
		<reference ref_id="CVE-2016-1867" ref_url="https://www.suse.com/security/cve/CVE-2016-1867/" source="CVE"/>
		<reference ref_id="CVE-2016-2089" ref_url="https://www.suse.com/security/cve/CVE-2016-2089/" source="CVE"/>
		<reference ref_id="CVE-2016-2116" ref_url="https://www.suse.com/security/cve/CVE-2016-2116/" source="CVE"/>
		<reference ref_id="CVE-2016-8690" ref_url="https://www.suse.com/security/cve/CVE-2016-8690/" source="CVE"/>
		<reference ref_id="CVE-2016-8691" ref_url="https://www.suse.com/security/cve/CVE-2016-8691/" source="CVE"/>
		<reference ref_id="CVE-2016-8692" ref_url="https://www.suse.com/security/cve/CVE-2016-8692/" source="CVE"/>
		<reference ref_id="CVE-2016-8693" ref_url="https://www.suse.com/security/cve/CVE-2016-8693/" source="CVE"/>
		<reference ref_id="CVE-2016-8880" ref_url="https://www.suse.com/security/cve/CVE-2016-8880/" source="CVE"/>
		<reference ref_id="CVE-2016-8881" ref_url="https://www.suse.com/security/cve/CVE-2016-8881/" source="CVE"/>
		<reference ref_id="CVE-2016-8882" ref_url="https://www.suse.com/security/cve/CVE-2016-8882/" source="CVE"/>
		<reference ref_id="CVE-2016-8883" ref_url="https://www.suse.com/security/cve/CVE-2016-8883/" source="CVE"/>
		<reference ref_id="CVE-2016-8884" ref_url="https://www.suse.com/security/cve/CVE-2016-8884/" source="CVE"/>
		<reference ref_id="CVE-2016-8885" ref_url="https://www.suse.com/security/cve/CVE-2016-8885/" source="CVE"/>
		<reference ref_id="CVE-2016-8886" ref_url="https://www.suse.com/security/cve/CVE-2016-8886/" source="CVE"/>
		<reference ref_id="CVE-2016-8887" ref_url="https://www.suse.com/security/cve/CVE-2016-8887/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<description>

This update for jasper fixes the following issues:

Security fixes:
- CVE-2016-8887: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c) (bsc#1006836)
- CVE-2016-8886: memory allocation failure in jas_malloc (jas_malloc.c) (bsc#1006599)
- CVE-2016-8884,CVE-2016-8885: two null pointer dereferences in bmp_getdata (incomplete fix for CVE-2016-8690) (bsc#1007009)
- CVE-2016-8883: assert in jpc_dec_tiledecode() (bsc#1006598)
- CVE-2016-8882: segfault / null pointer access in jpc_pi_destroy (bsc#1006597)
- CVE-2016-8881: Heap overflow in jpc_getuint16() (bsc#1006593)
- CVE-2016-8880: Heap overflow in jpc_dec_cp_setfromcox() (bsc#1006591)
- CVE-2016-8693: Double free vulnerability in mem_close (bsc#1005242)
- CVE-2016-8691, CVE-2016-8692: Divide by zero in jpc_dec_process_siz (bsc#1005090)
- CVE-2016-8690: Null pointer dereference in bmp_getdata triggered by crafted BMP image (bsc#1005084)
- CVE-2016-2089: invalid read in the JasPer's jas_matrix_clip() function (bsc#963983)
- CVE-2016-1867: Out-of-bounds Read in the JasPer's jpc_pi_nextcprl() function (bsc#961886)
- CVE-2016-1577, CVE-2016-2116: double free vulnerability in the jas_iccattrval_destroy function (bsc#968373)
- CVE-2015-5221: Use-after-free (and double-free) in Jasper JPEG-200 (bsc#942553)
- CVE-2015-5203: Double free corruption in JasPer JPEG-2000 implementation (bsc#941919)
- CVE-2008-3522: multiple integer overflows (bsc#392410)
- bsc#1006839: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c) (incomplete fix for CVE-2016-8887)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-10"/>
	<updated date="2016-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005084">SUSE bug 1005084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005090">SUSE bug 1005090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005242">SUSE bug 1005242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006591">SUSE bug 1006591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006593">SUSE bug 1006593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006597">SUSE bug 1006597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006598">SUSE bug 1006598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006599">SUSE bug 1006599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006836">SUSE bug 1006836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006839">SUSE bug 1006839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007009">SUSE bug 1007009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/392410">SUSE bug 392410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941919">SUSE bug 941919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942553">SUSE bug 942553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961886">SUSE bug 961886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963983">SUSE bug 963983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968373">SUSE bug 968373</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3522/">CVE-2008-3522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3522">CVE-2008-3522 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5203/">CVE-2015-5203 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5203">CVE-2015-5203 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5221/">CVE-2015-5221 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5221">CVE-2015-5221 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1577/">CVE-2016-1577 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1577">CVE-2016-1577 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1867/">CVE-2016-1867 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1867">CVE-2016-1867 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2089/">CVE-2016-2089 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2089">CVE-2016-2089 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-2116/">CVE-2016-2116 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2116">CVE-2016-2116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8690/">CVE-2016-8690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8690">CVE-2016-8690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8691/">CVE-2016-8691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8691">CVE-2016-8691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8692/">CVE-2016-8692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8692">CVE-2016-8692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8693/">CVE-2016-8693 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8693">CVE-2016-8693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8880/">CVE-2016-8880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-8880">CVE-2016-8880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8881/">CVE-2016-8881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-8881">CVE-2016-8881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8882/">CVE-2016-8882 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8882">CVE-2016-8882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8883/">CVE-2016-8883 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8883">CVE-2016-8883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8884/">CVE-2016-8884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8884">CVE-2016-8884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8885/">CVE-2016-8885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8885">CVE-2016-8885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8886/">CVE-2016-8886 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8886">CVE-2016-8886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8887/">CVE-2016-8887 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8887">CVE-2016-8887 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582807" comment="libjasper-1.900.14-134.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582808" comment="libjasper-32bit-1.900.14-134.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582809" comment="libjasper-x86-1.900.14-134.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582807" comment="libjasper-1.900.14-134.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582808" comment="libjasper-32bit-1.900.14-134.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582809" comment="libjasper-x86-1.900.14-134.25.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219997" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1010977" ref_url="https://bugzilla.suse.com/1010977" source="BUGZILLA"/>
		<reference ref_id="1010979" ref_url="https://bugzilla.suse.com/1010979" source="BUGZILLA"/>
		<reference ref_id="1011830" ref_url="https://bugzilla.suse.com/1011830" source="BUGZILLA"/>
		<reference ref_id="1012530" ref_url="https://bugzilla.suse.com/1012530" source="BUGZILLA"/>
		<reference ref_id="1015400" ref_url="https://bugzilla.suse.com/1015400" source="BUGZILLA"/>
		<reference ref_id="1015993" ref_url="https://bugzilla.suse.com/1015993" source="BUGZILLA"/>
		<reference ref_id="1018088" ref_url="https://bugzilla.suse.com/1018088" source="BUGZILLA"/>
		<reference ref_id="1020353" ref_url="https://bugzilla.suse.com/1020353" source="BUGZILLA"/>
		<reference ref_id="1021868" ref_url="https://bugzilla.suse.com/1021868" source="BUGZILLA"/>
		<reference ref_id="1029497" ref_url="https://bugzilla.suse.com/1029497" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10251" ref_url="https://www.suse.com/security/cve/CVE-2016-10251/" source="CVE"/>
		<reference ref_id="CVE-2016-8654" ref_url="https://www.suse.com/security/cve/CVE-2016-8654/" source="CVE"/>
		<reference ref_id="CVE-2016-9395" ref_url="https://www.suse.com/security/cve/CVE-2016-9395/" source="CVE"/>
		<reference ref_id="CVE-2016-9398" ref_url="https://www.suse.com/security/cve/CVE-2016-9398/" source="CVE"/>
		<reference ref_id="CVE-2016-9560" ref_url="https://www.suse.com/security/cve/CVE-2016-9560/" source="CVE"/>
		<reference ref_id="CVE-2016-9583" ref_url="https://www.suse.com/security/cve/CVE-2016-9583/" source="CVE"/>
		<reference ref_id="CVE-2016-9591" ref_url="https://www.suse.com/security/cve/CVE-2016-9591/" source="CVE"/>
		<reference ref_id="CVE-2016-9600" ref_url="https://www.suse.com/security/cve/CVE-2016-9600/" source="CVE"/>
		<reference ref_id="CVE-2017-5498" ref_url="https://www.suse.com/security/cve/CVE-2017-5498/" source="CVE"/>
		<reference ref_id="CVE-2017-6850" ref_url="https://www.suse.com/security/cve/CVE-2017-6850/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002785.html" source="SUSE-SU"/>
		<description>

This update for jasper fixes the following issues:

Security issues fixed:
- CVE-2016-8654: Heap-based buffer overflow in QMFB code in JPC codec (bsc#1012530)
- CVE-2016-9395: Missing sanity checks on the data in a SIZ marker segment (bsc#1010977).
- CVE-2016-9398: jpc_math.c:94: int jpc_floorlog2(int): Assertion 'x &gt; 0' failed. (bsc#1010979)
- CVE-2016-9560: stack-based buffer overflow in jpc_tsfb_getbands2 (jpc_tsfb.c) (bsc#1011830)
- CVE-2016-9583: Out of bounds heap read in jpc_pi_nextpcrl() (bsc#1015400)
- CVE-2016-9591: Use-after-free on heap in jas_matrix_destroy (bsc#1015993)
- CVE-2016-9600: Null Pointer Dereference due to missing check for UNKNOWN color space in JP2 encoder (bsc#1018088)
- CVE-2016-10251: Use of uninitialized value in jpc_pi_nextcprl (jpc_t2cod.c) (bsc#1029497)
- CVE-2017-5498: left-shift undefined behaviour (bsc#1020353)
- CVE-2017-6850: NULL pointer dereference in jp2_cdef_destroy (jp2_cod.c) (bsc#1021868)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-05"/>
	<updated date="2017-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010977">SUSE bug 1010977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010979">SUSE bug 1010979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011830">SUSE bug 1011830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012530">SUSE bug 1012530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015400">SUSE bug 1015400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015993">SUSE bug 1015993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018088">SUSE bug 1018088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020353">SUSE bug 1020353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021868">SUSE bug 1021868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029497">SUSE bug 1029497</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10251/">CVE-2016-10251 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10251">CVE-2016-10251 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8654/">CVE-2016-8654 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8654">CVE-2016-8654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9395/">CVE-2016-9395 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9395">CVE-2016-9395 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9398/">CVE-2016-9398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9398">CVE-2016-9398 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9560/">CVE-2016-9560 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9560">CVE-2016-9560 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9583/">CVE-2016-9583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9583">CVE-2016-9583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9591/">CVE-2016-9591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9591">CVE-2016-9591 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9600/">CVE-2016-9600 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9600">CVE-2016-9600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5498/">CVE-2017-5498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5498">CVE-2017-5498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6850/">CVE-2017-6850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6850">CVE-2017-6850 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582810" comment="libjasper-1.900.14-134.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582811" comment="libjasper-32bit-1.900.14-134.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582812" comment="libjasper-x86-1.900.14-134.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582810" comment="libjasper-1.900.14-134.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582811" comment="libjasper-32bit-1.900.14-134.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582812" comment="libjasper-x86-1.900.14-134.32.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219998" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1009994" ref_url="https://bugzilla.suse.com/1009994" source="BUGZILLA"/>
		<reference ref_id="1010756" ref_url="https://bugzilla.suse.com/1010756" source="BUGZILLA"/>
		<reference ref_id="1010757" ref_url="https://bugzilla.suse.com/1010757" source="BUGZILLA"/>
		<reference ref_id="1010766" ref_url="https://bugzilla.suse.com/1010766" source="BUGZILLA"/>
		<reference ref_id="1010774" ref_url="https://bugzilla.suse.com/1010774" source="BUGZILLA"/>
		<reference ref_id="1010782" ref_url="https://bugzilla.suse.com/1010782" source="BUGZILLA"/>
		<reference ref_id="1010968" ref_url="https://bugzilla.suse.com/1010968" source="BUGZILLA"/>
		<reference ref_id="1010975" ref_url="https://bugzilla.suse.com/1010975" source="BUGZILLA"/>
		<reference ref_id="1047958" ref_url="https://bugzilla.suse.com/1047958" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9262" ref_url="https://www.suse.com/security/cve/CVE-2016-9262/" source="CVE"/>
		<reference ref_id="CVE-2016-9388" ref_url="https://www.suse.com/security/cve/CVE-2016-9388/" source="CVE"/>
		<reference ref_id="CVE-2016-9389" ref_url="https://www.suse.com/security/cve/CVE-2016-9389/" source="CVE"/>
		<reference ref_id="CVE-2016-9390" ref_url="https://www.suse.com/security/cve/CVE-2016-9390/" source="CVE"/>
		<reference ref_id="CVE-2016-9391" ref_url="https://www.suse.com/security/cve/CVE-2016-9391/" source="CVE"/>
		<reference ref_id="CVE-2016-9392" ref_url="https://www.suse.com/security/cve/CVE-2016-9392/" source="CVE"/>
		<reference ref_id="CVE-2016-9393" ref_url="https://www.suse.com/security/cve/CVE-2016-9393/" source="CVE"/>
		<reference ref_id="CVE-2016-9394" ref_url="https://www.suse.com/security/cve/CVE-2016-9394/" source="CVE"/>
		<reference ref_id="CVE-2017-1000050" ref_url="https://www.suse.com/security/cve/CVE-2017-1000050/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

Security issues fixed:
- CVE-2016-9262: Multiple integer overflows in the jas_realloc function in base/jas_malloc.c and
  mem_resize function in base/jas_stream.c allow remote attackers to cause a denial of service via
  a crafted image, which triggers use after free vulnerabilities. (bsc#1009994)
- CVE-2016-9388: The ras_getcmap function in ras_dec.c allows remote attackers to cause a denial
  of service (assertion failure) via a crafted image file. (bsc#1010975)
- CVE-2016-9389: The jpc_irct and jpc_iict functions in jpc_mct.c allow remote attackers to cause a
  denial of service (assertion failure). (bsc#1010968)
- CVE-2016-9390: The jas_seq2d_create function in jas_seq.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted image file. (bsc#1010774)
- CVE-2016-9391: The jpc_bitstream_getbits function in jpc_bs.c allows remote attackers to cause a
  denial of service (assertion failure) via a very large integer. (bsc#1010782)
- CVE-2017-1000050: The jp2_encode function in jp2_enc.c allows remote attackers to cause a denial
  of service. (bsc#1047958)

CVEs already fixed with previous update:
- CVE-2016-9392: The calcstepsizes function in jpc_dec.c allows remote attackers to cause a denial
  of service (assertion failure) via a crafted file. (bsc#1010757)
- CVE-2016-9393: The jpc_pi_nextrpcl function in jpc_t2cod.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted file. (bsc#1010766)
- CVE-2016-9394: The jas_seq2d_create function in jas_seq.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted file. (bsc#1010756)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-19"/>
	<updated date="2017-07-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009994">SUSE bug 1009994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010756">SUSE bug 1010756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010757">SUSE bug 1010757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010766">SUSE bug 1010766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010774">SUSE bug 1010774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010782">SUSE bug 1010782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010968">SUSE bug 1010968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010975">SUSE bug 1010975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047958">SUSE bug 1047958</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9262/">CVE-2016-9262 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9262">CVE-2016-9262 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9388/">CVE-2016-9388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9388">CVE-2016-9388 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9389/">CVE-2016-9389 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9389">CVE-2016-9389 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9390/">CVE-2016-9390 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9390">CVE-2016-9390 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9391/">CVE-2016-9391 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9391">CVE-2016-9391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9392/">CVE-2016-9392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9392">CVE-2016-9392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9393/">CVE-2016-9393 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9393">CVE-2016-9393 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9394/">CVE-2016-9394 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9394">CVE-2016-9394 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000050/">CVE-2017-1000050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000050">CVE-2017-1000050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582813" comment="libjasper-1.900.14-134.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582814" comment="libjasper-32bit-1.900.14-134.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582815" comment="libjasper-x86-1.900.14-134.33.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582813" comment="libjasper-1.900.14-134.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582814" comment="libjasper-32bit-1.900.14-134.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582815" comment="libjasper-x86-1.900.14-134.33.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219999" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1179748" ref_url="https://bugzilla.suse.com/1179748" source="BUGZILLA"/>
		<reference ref_id="1181483" ref_url="https://bugzilla.suse.com/1181483" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27828" ref_url="https://www.suse.com/security/cve/CVE-2020-27828/" source="CVE"/>
		<reference ref_id="CVE-2021-3272" ref_url="https://www.suse.com/security/cve/CVE-2021-3272/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008332.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

- bsc#1179748 CVE-2020-27828: Fix heap overflow by checking maxrlvls
- bsc#1181483 CVE-2021-3272: Fix buffer over-read in jp2_decode
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179748">SUSE bug 1179748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181483">SUSE bug 1181483</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27828/">CVE-2020-27828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27828">CVE-2020-27828 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3272/">CVE-2021-3272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3272">CVE-2021-3272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582816" comment="libjasper-1.900.14-134.33.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582817" comment="libjasper-32bit-1.900.14-134.33.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220000" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="935540" ref_url="https://bugzilla.suse.com/935540" source="BUGZILLA"/>
		<reference ref_id="938895" ref_url="https://bugzilla.suse.com/938895" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1931" ref_url="https://www.suse.com/security/cve/CVE-2015-1931/" source="CVE"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2619" ref_url="https://www.suse.com/security/cve/CVE-2015-2619/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4729" ref_url="https://www.suse.com/security/cve/CVE-2015-4729/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001519.html" source="SUSE-SU"/>
		<description>
IBM Java was updated to 7.1-3.10 to fix several security issues.

The following vulnerabilities were fixed:
  
* CVE-2015-1931: IBM Java Security Components store plain text data in memory dumps, which could allow a local attacker to obtain information to aid in further attacks against the system.
* CVE-2015-2590: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2601: Easily exploitable vulnerability in the JCE component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2613: Easily exploitable vulnerability in the JCE component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data.  
* CVE-2015-2619: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2621: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2625: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2632: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2637: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2638: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2664: Difficult to exploit vulnerability in the Deployment component requiring logon to Operating System. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2808: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java accessible data.
* CVE-2015-4000: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java Embedded accessible data.
* CVE-2015-4729: Very difficult to exploit vulnerability in the Deployment component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java SE accessible data as well as read access to a subset of Java SE accessible data.
* CVE-2015-4731: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4732: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.  
* CVE-2015-4733: Easily exploitable vulnerability in the RMI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4748: Very difficult to exploit vulnerability in the Security component allowed successful unauthenticated network attacks via OCSP. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4749: Difficult to exploit vulnerability in the JNDI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized ability to cause a partial denial of service (partial DOS).
* CVE-2015-4760: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-28"/>
	<updated date="2015-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/935540">SUSE bug 935540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1931/">CVE-2015-1931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1931">CVE-2015-1931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2590">CVE-2015-2590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2601">CVE-2015-2601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2613">CVE-2015-2613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2619/">CVE-2015-2619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2619">CVE-2015-2619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2621">CVE-2015-2621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2625">CVE-2015-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2632">CVE-2015-2632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2637">CVE-2015-2637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2638">CVE-2015-2638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2664">CVE-2015-2664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2808">CVE-2015-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4729/">CVE-2015-4729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4729">CVE-2015-4729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4731">CVE-2015-4731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4732">CVE-2015-4732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4733">CVE-2015-4733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4748">CVE-2015-4748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4749">CVE-2015-4749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4760">CVE-2015-4760 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582818" comment="java-1_7_1-ibm-1.7.1_sr3.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582819" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582820" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582821" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.10-3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582818" comment="java-1_7_1-ibm-1.7.1_sr3.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582819" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582820" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582821" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.10-3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220001" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="941939" ref_url="https://bugzilla.suse.com/941939" source="BUGZILLA"/>
		<reference ref_id="955131" ref_url="https://bugzilla.suse.com/955131" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0458" ref_url="https://www.suse.com/security/cve/CVE-2015-0458/" source="CVE"/>
		<reference ref_id="CVE-2015-0459" ref_url="https://www.suse.com/security/cve/CVE-2015-0459/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-0491" ref_url="https://www.suse.com/security/cve/CVE-2015-0491/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-5006" ref_url="https://www.suse.com/security/cve/CVE-2015-5006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001712.html" source="SUSE-SU"/>
		<description>
The java-1_7_1-ibm package was updated to version 7.1-3.20 to fix several security and non security issues:

- bnc#955131: Version update to 7.1-3.20:
  CVE-2015-4734 CVE-2015-4803 CVE-2015-4805 CVE-2015-4806 CVE-2015-4810
  CVE-2015-4835 CVE-2015-4840 CVE-2015-4842 CVE-2015-4843 CVE-2015-4844
  CVE-2015-4860 CVE-2015-4871 CVE-2015-4872 CVE-2015-4882 CVE-2015-4883
  CVE-2015-4893 CVE-2015-4902 CVE-2015-4903 CVE-2015-4911 CVE-2015-5006
- Add backcompat symlinks for sdkdir
- bnc#941939: Fix to provide %{name} instead of %{sdklnk} only in _jvmprivdir
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-03"/>
	<updated date="2015-12-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/941939">SUSE bug 941939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0458/">CVE-2015-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0458">CVE-2015-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0459/">CVE-2015-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0459">CVE-2015-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0469">CVE-2015-0469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0477">CVE-2015-0477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0478">CVE-2015-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0480">CVE-2015-0480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0488">CVE-2015-0488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0491/">CVE-2015-0491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0491">CVE-2015-0491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4734">CVE-2015-4734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4803">CVE-2015-4803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4805">CVE-2015-4805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4806">CVE-2015-4806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4810">CVE-2015-4810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4835">CVE-2015-4835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4840">CVE-2015-4840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4842">CVE-2015-4842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4843">CVE-2015-4843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4844">CVE-2015-4844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4860">CVE-2015-4860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4871">CVE-2015-4871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4872">CVE-2015-4872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4882">CVE-2015-4882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4883">CVE-2015-4883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4893">CVE-2015-4893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4902">CVE-2015-4902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4903">CVE-2015-4903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4911">CVE-2015-4911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5006/">CVE-2015-5006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5006">CVE-2015-5006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582822" comment="java-1_7_1-ibm-1.7.1_sr3.20-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582823" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.20-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582824" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.20-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582825" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.20-6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582822" comment="java-1_7_1-ibm-1.7.1_sr3.20-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582823" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.20-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582824" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.20-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582825" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.20-6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220002" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="960402" ref_url="https://bugzilla.suse.com/960402" source="BUGZILLA"/>
		<reference ref_id="963937" ref_url="https://bugzilla.suse.com/963937" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5041" ref_url="https://www.suse.com/security/cve/CVE-2015-5041/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001866.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_1-ibm fixes the following issues by updating to 7.1-3.30 (bsc#963937):

- CVE-2015-5041: Could could have invoked non-public interface methods under certain circumstances
- CVE-2015-7575: The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials
- CVE-2015-7981: libpng could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read in the png_convert_to_rfc1123 function. An attacker could exploit this vulnerability to obtain sensitive information
- CVE-2015-8126: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8472: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8540: libpng is vulnerable to a buffer overflow, caused by a read underflow in png_check_keyword in pngwutil.c. By sending an overly long argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
- CVE-2016-0402: An unspecified vulnerability related to the Networking component has no confidentiality impact, partial integrity impact, and no availability impact
- CVE-2016-0448: An unspecified vulnerability related to the JMX component could allow a remote attacker to obtain sensitive information
- CVE-2016-0466: An unspecified vulnerability related to the JAXP component could allow a remote attacker to cause a denial of service
- CVE-2016-0483: An unspecified vulnerability related to the AWT component has complete confidentiality impact, complete integrity impact, and complete availability impact
- CVE-2016-0494: An unspecified vulnerability related to the 2D component has complete confidentiality impact, complete integrity impact, and complete availability impact

The following bugs were fixed:

- bsc#960402: resolve package conflicts in devel package
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-10"/>
	<updated date="2016-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5041/">CVE-2015-5041 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5041">CVE-2015-5041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7981">CVE-2015-7981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8472">CVE-2015-8472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8540">CVE-2015-8540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0402">CVE-2016-0402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0448">CVE-2016-0448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0466">CVE-2016-0466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0483">CVE-2016-0483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0494">CVE-2016-0494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582826" comment="java-1_7_1-ibm-1.7.1_sr3.30-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582827" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.30-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582828" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.30-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582829" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.30-9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582826" comment="java-1_7_1-ibm-1.7.1_sr3.30-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582827" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.30-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582828" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.30-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582829" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.30-9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220003" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="977646" ref_url="https://bugzilla.suse.com/977646" source="BUGZILLA"/>
		<reference ref_id="977648" ref_url="https://bugzilla.suse.com/977648" source="BUGZILLA"/>
		<reference ref_id="977650" ref_url="https://bugzilla.suse.com/977650" source="BUGZILLA"/>
		<reference ref_id="979252" ref_url="https://bugzilla.suse.com/979252" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0264" ref_url="https://www.suse.com/security/cve/CVE-2016-0264/" source="CVE"/>
		<reference ref_id="CVE-2016-0363" ref_url="https://www.suse.com/security/cve/CVE-2016-0363/" source="CVE"/>
		<reference ref_id="CVE-2016-0376" ref_url="https://www.suse.com/security/cve/CVE-2016-0376/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-3422" ref_url="https://www.suse.com/security/cve/CVE-2016-3422/" source="CVE"/>
		<reference ref_id="CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3443" ref_url="https://www.suse.com/security/cve/CVE-2016-3443/" source="CVE"/>
		<reference ref_id="CVE-2016-3449" ref_url="https://www.suse.com/security/cve/CVE-2016-3449/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002059.html" source="SUSE-SU"/>
		<description>

This IBM Java 1.7.1 SR3 FP40 relese fixes the following issues: 

Security issues fixed:
- CVE-2016-0264: buffer overflow vulnerability in the IBM JVM (bsc#977648)
- CVE-2016-0363: insecure use of invoke method in CORBA component, incorrect CVE-2013-3009 fix (bsc#977650)
- CVE-2016-0376: insecure deserialization in CORBA, incorrect CVE-2013-5456 fix (bsc#977646)
- The following CVEs got also fixed during this update. (bsc#979252)
  CVE-2016-3443, CVE-2016-0687, CVE-2016-0686, CVE-2016-3427, CVE-2016-3449, CVE-2016-3422, CVE-2016-3426
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-13"/>
	<updated date="2016-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/977646">SUSE bug 977646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977648">SUSE bug 977648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977650">SUSE bug 977650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0264/">CVE-2016-0264 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0264">CVE-2016-0264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0363/">CVE-2016-0363 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0363">CVE-2016-0363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0376/">CVE-2016-0376 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0376">CVE-2016-0376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0686">CVE-2016-0686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0687">CVE-2016-0687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3422/">CVE-2016-3422 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3422">CVE-2016-3422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3426">CVE-2016-3426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3427">CVE-2016-3427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3443/">CVE-2016-3443 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3443">CVE-2016-3443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3449/">CVE-2016-3449 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3449">CVE-2016-3449 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582830" comment="java-1_7_1-ibm-1.7.1_sr3.40-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582831" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.40-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582832" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.40-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582833" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.40-13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582830" comment="java-1_7_1-ibm-1.7.1_sr3.40-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582831" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.40-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582832" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.40-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582833" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.40-13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220004" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1009280" ref_url="https://bugzilla.suse.com/1009280" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002446.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_1-ibm fixes the following issues:

- Version update to 7.1-3.60 (bsc#1009280) fixing the following CVE's:
  CVE-2016-5568, CVE-2016-5556, CVE-2016-5573, CVE-2016-5597, CVE-2016-5554,
  CVE-2016-5542
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-07"/>
	<updated date="2016-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5542">CVE-2016-5542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5554">CVE-2016-5554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5556">CVE-2016-5556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5568">CVE-2016-5568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5573">CVE-2016-5573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5597">CVE-2016-5597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582834" comment="java-1_7_1-ibm-1.7.1_sr3.60-19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582835" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.60-19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582836" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.60-19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582837" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.60-19.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582834" comment="java-1_7_1-ibm-1.7.1_sr3.60-19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582835" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.60-19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582836" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.60-19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582837" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.60-19.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220005" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027038" ref_url="https://bugzilla.suse.com/1027038" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002706.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_1-ibm fixes the following issues:

Security issue fixed:
- CVE-2016-2183: The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and
  other protocols and products, have a birthday bound of approximately four billion blocks, which
  makes it easier for remote attackers to obtain cleartext data via a birthday attack against a
  long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode,
  aka a 'Sweet32' attack. (bsc#1027038)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027038">SUSE bug 1027038</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582838" comment="java-1_7_1-ibm-1.7.1_sr4.1-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582839" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.1-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582840" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.1-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582841" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.1-22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582838" comment="java-1_7_1-ibm-1.7.1_sr4.1-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582839" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.1-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582840" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.1-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582841" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.1-22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220006" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1038505" ref_url="https://bugzilla.suse.com/1038505" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-1289" ref_url="https://www.suse.com/security/cve/CVE-2017-1289/" source="CVE"/>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3511" ref_url="https://www.suse.com/security/cve/CVE-2017-3511/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002913.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_1-ibm fixes the following issues:

Version update to 7.1-4.5 bsc#1038505

  - CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in inftrees.c
  - CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in inffast.c
  - CVE-2016-9842: zlib: Undefined left shift of negative number
  - CVE-2016-9843: zlib: Big-endian out-of-bounds pointer
  - CVE-2017-1289: IBM JDK: XML External Entity Injection (XXE) error when processing XML data
  - CVE-2017-3509: OpenJDK: improper re-use of NTLM authenticated connections 
  - CVE-2017-3511: OpenJDK: untrusted extension directories search path in Launcher 
  - CVE-2017-3539: OpenJDK: MD5 allowed for jar verification 
  - CVE-2017-3533: OpenJDK: newline injection in the FTP client
  - CVE-2017-3544: OpenJDK: newline injection in the SMTP client


		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-23"/>
	<updated date="2017-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9840">CVE-2016-9840 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9841">CVE-2016-9841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9842">CVE-2016-9842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9843">CVE-2016-9843 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1289/">CVE-2017-1289 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1289">CVE-2017-1289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3509">CVE-2017-3509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3511/">CVE-2017-3511 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3511">CVE-2017-3511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3533">CVE-2017-3533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3539">CVE-2017-3539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3544">CVE-2017-3544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582842" comment="java-1_7_1-ibm-1.7.1_sr4.5-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582843" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.5-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582844" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.5-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582845" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.5-25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582842" comment="java-1_7_1-ibm-1.7.1_sr4.5-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582843" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.5-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582844" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.5-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582845" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.5-25.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220007" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1053431" ref_url="https://bugzilla.suse.com/1053431" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10053" ref_url="https://www.suse.com/security/cve/CVE-2017-10053/" source="CVE"/>
		<reference ref_id="CVE-2017-10067" ref_url="https://www.suse.com/security/cve/CVE-2017-10067/" source="CVE"/>
		<reference ref_id="CVE-2017-10074" ref_url="https://www.suse.com/security/cve/CVE-2017-10074/" source="CVE"/>
		<reference ref_id="CVE-2017-10081" ref_url="https://www.suse.com/security/cve/CVE-2017-10081/" source="CVE"/>
		<reference ref_id="CVE-2017-10087" ref_url="https://www.suse.com/security/cve/CVE-2017-10087/" source="CVE"/>
		<reference ref_id="CVE-2017-10089" ref_url="https://www.suse.com/security/cve/CVE-2017-10089/" source="CVE"/>
		<reference ref_id="CVE-2017-10090" ref_url="https://www.suse.com/security/cve/CVE-2017-10090/" source="CVE"/>
		<reference ref_id="CVE-2017-10096" ref_url="https://www.suse.com/security/cve/CVE-2017-10096/" source="CVE"/>
		<reference ref_id="CVE-2017-10101" ref_url="https://www.suse.com/security/cve/CVE-2017-10101/" source="CVE"/>
		<reference ref_id="CVE-2017-10102" ref_url="https://www.suse.com/security/cve/CVE-2017-10102/" source="CVE"/>
		<reference ref_id="CVE-2017-10105" ref_url="https://www.suse.com/security/cve/CVE-2017-10105/" source="CVE"/>
		<reference ref_id="CVE-2017-10107" ref_url="https://www.suse.com/security/cve/CVE-2017-10107/" source="CVE"/>
		<reference ref_id="CVE-2017-10108" ref_url="https://www.suse.com/security/cve/CVE-2017-10108/" source="CVE"/>
		<reference ref_id="CVE-2017-10109" ref_url="https://www.suse.com/security/cve/CVE-2017-10109/" source="CVE"/>
		<reference ref_id="CVE-2017-10110" ref_url="https://www.suse.com/security/cve/CVE-2017-10110/" source="CVE"/>
		<reference ref_id="CVE-2017-10111" ref_url="https://www.suse.com/security/cve/CVE-2017-10111/" source="CVE"/>
		<reference ref_id="CVE-2017-10115" ref_url="https://www.suse.com/security/cve/CVE-2017-10115/" source="CVE"/>
		<reference ref_id="CVE-2017-10116" ref_url="https://www.suse.com/security/cve/CVE-2017-10116/" source="CVE"/>
		<reference ref_id="CVE-2017-10125" ref_url="https://www.suse.com/security/cve/CVE-2017-10125/" source="CVE"/>
		<reference ref_id="CVE-2017-10243" ref_url="https://www.suse.com/security/cve/CVE-2017-10243/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003164.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Version update to 7.1-4.10 [bsc#1053431]
  * CVE-2017-10111 CVE-2017-10110 CVE-2017-10107 CVE-2017-10101
    CVE-2017-10096 CVE-2017-10090 CVE-2017-10089 CVE-2017-10087
    CVE-2017-10102 CVE-2017-10116 CVE-2017-10074 CVE-2017-10115
    CVE-2017-10067 CVE-2017-10125 CVE-2017-10243 CVE-2017-10109
    CVE-2017-10108 CVE-2017-10053 CVE-2017-10105 CVE-2017-10081: Multiple unspecified vulnerabilities 
in multiple Java components could lead to code execution or sandbox escape
 
 More information can be found here: https://developer.ibm.com/javasdk/support/security-vulnerabilities/#Oracle_July_18_2017_CPU
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-29"/>
	<updated date="2017-08-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1053431">SUSE bug 1053431</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10053/">CVE-2017-10053 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10053">CVE-2017-10053 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10067/">CVE-2017-10067 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10067">CVE-2017-10067 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10074/">CVE-2017-10074 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10074">CVE-2017-10074 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10081/">CVE-2017-10081 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10081">CVE-2017-10081 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10087/">CVE-2017-10087 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10087">CVE-2017-10087 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10089/">CVE-2017-10089 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10089">CVE-2017-10089 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10090/">CVE-2017-10090 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10090">CVE-2017-10090 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10096/">CVE-2017-10096 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10096">CVE-2017-10096 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10101/">CVE-2017-10101 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10101">CVE-2017-10101 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10102/">CVE-2017-10102 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10102">CVE-2017-10102 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10105/">CVE-2017-10105 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10105">CVE-2017-10105 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10107/">CVE-2017-10107 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10107">CVE-2017-10107 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10108/">CVE-2017-10108 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10108">CVE-2017-10108 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10109/">CVE-2017-10109 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10109">CVE-2017-10109 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10110/">CVE-2017-10110 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10110">CVE-2017-10110 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10111/">CVE-2017-10111 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10111">CVE-2017-10111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10115/">CVE-2017-10115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10115">CVE-2017-10115 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10116/">CVE-2017-10116 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10116">CVE-2017-10116 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10125/">CVE-2017-10125 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10125">CVE-2017-10125 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10243/">CVE-2017-10243 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10243">CVE-2017-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582846" comment="java-1_7_1-ibm-1.7.1_sr4.10-26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582847" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.10-26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582848" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.10-26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582849" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.10-26.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582846" comment="java-1_7_1-ibm-1.7.1_sr4.10-26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582847" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.10-26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582848" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.10-26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582849" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.10-26.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220008" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1070162" ref_url="https://bugzilla.suse.com/1070162" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10165" ref_url="https://www.suse.com/security/cve/CVE-2016-10165/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10293" ref_url="https://www.suse.com/security/cve/CVE-2017-10293/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003555.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

* CVE-2017-10349: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10348: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10388: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2016-9841:  'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10293: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10345: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10350: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10356: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10357: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10347: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10355: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10285: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10281: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10295: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10346: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2016-10165: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-27"/>
	<updated date="2017-12-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10165/">CVE-2016-10165 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10165">CVE-2016-10165 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9841">CVE-2016-9841 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10281">CVE-2017-10281 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10285">CVE-2017-10285 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10293/">CVE-2017-10293 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10293">CVE-2017-10293 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10295">CVE-2017-10295 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10345">CVE-2017-10345 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10346">CVE-2017-10346 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10347">CVE-2017-10347 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10348">CVE-2017-10348 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10349">CVE-2017-10349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10350">CVE-2017-10350 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10355">CVE-2017-10355 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10356">CVE-2017-10356 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10357">CVE-2017-10357 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10388">CVE-2017-10388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582850" comment="java-1_7_1-ibm-1.7.1_sr4.15-26.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582851" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.15-26.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582852" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.15-26.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582853" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.15-26.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582850" comment="java-1_7_1-ibm-1.7.1_sr4.15-26.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582851" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.15-26.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582852" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.15-26.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582853" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.15-26.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220009" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1057460" ref_url="https://bugzilla.suse.com/1057460" source="BUGZILLA"/>
		<reference ref_id="1076390" ref_url="https://bugzilla.suse.com/1076390" source="BUGZILLA"/>
		<reference ref_id="1082810" ref_url="https://bugzilla.suse.com/1082810" source="BUGZILLA"/>
		<reference ref_id="929900" ref_url="https://bugzilla.suse.com/929900" source="BUGZILLA"/>
		<reference ref_id="966304" ref_url="https://bugzilla.suse.com/966304" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579/" source="CVE"/>
		<reference ref_id="CVE-2018-2582" ref_url="https://www.suse.com/security/cve/CVE-2018-2582/" source="CVE"/>
		<reference ref_id="CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588/" source="CVE"/>
		<reference ref_id="CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599/" source="CVE"/>
		<reference ref_id="CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602/" source="CVE"/>
		<reference ref_id="CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603/" source="CVE"/>
		<reference ref_id="CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618/" source="CVE"/>
		<reference ref_id="CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633/" source="CVE"/>
		<reference ref_id="CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634/" source="CVE"/>
		<reference ref_id="CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637/" source="CVE"/>
		<reference ref_id="CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641/" source="CVE"/>
		<reference ref_id="CVE-2018-2657" ref_url="https://www.suse.com/security/cve/CVE-2018-2657/" source="CVE"/>
		<reference ref_id="CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663/" source="CVE"/>
		<reference ref_id="CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677/" source="CVE"/>
		<reference ref_id="CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003790.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm provides the following fix:

The version was updated to 7.1.4.20 [bsc#1082810]

* Security fixes:

  - CVE-2018-2633 CVE-2018-2637 CVE-2018-2634 CVE-2018-2582
    CVE-2018-2641 CVE-2018-2618 CVE-2018-2657 CVE-2018-2603
    CVE-2018-2599 CVE-2018-2602 CVE-2018-2678 CVE-2018-2677
    CVE-2018-2663 CVE-2018-2588 CVE-2018-2579

* Defect fixes:

  - IJ04281 Class Libraries: Startup time increase after applying
             apar IV96905
  - IJ03822 Class Libraries: Update timezone information to tzdata2017c
  - IJ03605 Java Virtual Machine: Legacy security for com.ibm.jvm.dump,
           trace, log was not enabled by default
  - IJ03607 JIT Compiler: Result String contains a redundant dot when
            converted from BigDecimal with 0 on all platforms
  - IX90185 ORB: Upgrade ibmcfw.jar to version O1800.01
  - IJ04282 Security: Change in location and default of jurisdiction
            policy files
  - IJ03853 Security: IBMCAC provider does not support SHA224
  - IJ02679 Security: IBMPKCS11Impl – Bad sessions are being allocated
            internally
  - IJ02706 Security: IBMPKCS11Impl – Bad sessions are being allocated
            internally
  - IJ03552 Security: IBMPKCS11Impl - Config file problem with the slot
            specification attribute
  - IJ01901 Security: IBMPKCS11Impl – SecureRandom.setSeed() exception
  - IJ03801 Security: Issue with same DN certs, iKeyman GUI error with
            stash, JKS Chain issue and JVM argument parse issue with iKeyman
  - IJ03256 Security: javax.security.auth.Subject.toString() throws NPE
  - IJ02284 JIT Compiler: Division by zero in JIT compiler
  - Make it possible to run Java jnlp files from Firefox. (bsc#1057460)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-07"/>
	<updated date="2018-03-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1057460">SUSE bug 1057460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076390">SUSE bug 1076390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929900">SUSE bug 929900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966304">SUSE bug 966304</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2579">CVE-2018-2579 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2582/">CVE-2018-2582 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2582">CVE-2018-2582 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2588">CVE-2018-2588 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2599">CVE-2018-2599 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2602">CVE-2018-2602 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2603">CVE-2018-2603 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2618">CVE-2018-2618 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2633">CVE-2018-2633 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2634">CVE-2018-2634 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2637">CVE-2018-2637 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2641">CVE-2018-2641 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2657/">CVE-2018-2657 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2657">CVE-2018-2657 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2663">CVE-2018-2663 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2677">CVE-2018-2677 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2678">CVE-2018-2678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582854" comment="java-1_7_1-ibm-1.7.1_sr4.20-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582855" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.20-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582856" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.20-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582857" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.20-26.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582854" comment="java-1_7_1-ibm-1.7.1_sr4.20-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582855" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.20-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582856" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.20-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582857" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.20-26.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220010" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1085449" ref_url="https://bugzilla.suse.com/1085449" source="BUGZILLA"/>
		<reference ref_id="1093311" ref_url="https://bugzilla.suse.com/1093311" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1417" ref_url="https://www.suse.com/security/cve/CVE-2018-1417/" source="CVE"/>
		<reference ref_id="CVE-2018-2783" ref_url="https://www.suse.com/security/cve/CVE-2018-2783/" source="CVE"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<description>


IBM Java was updated to 7.1.4.25 [bsc#1093311, bsc#1085449]

Security fixes:

-   CVE-2018-2814 CVE-2018-2794 CVE-2018-2783 CVE-2018-2799
    CVE-2018-2798 CVE-2018-2797 CVE-2018-2796 CVE-2018-2795
    CVE-2018-2800 CVE-2018-2790 CVE-2018-1417
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-28"/>
	<updated date="2018-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085449">SUSE bug 1085449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1417/">CVE-2018-1417 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1417">CVE-2018-1417 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2783/">CVE-2018-2783 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2783">CVE-2018-2783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2790">CVE-2018-2790 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2794">CVE-2018-2794 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2795">CVE-2018-2795 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2796">CVE-2018-2796 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2797">CVE-2018-2797 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2798">CVE-2018-2798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2799">CVE-2018-2799 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2800">CVE-2018-2800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2814">CVE-2018-2814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582858" comment="java-1_7_1-ibm-1.7.1_sr4.25-26.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582859" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-26.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582860" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-26.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582861" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-26.26.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582858" comment="java-1_7_1-ibm-1.7.1_sr4.25-26.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582859" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-26.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582860" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-26.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582861" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-26.26.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220011" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1104668" ref_url="https://bugzilla.suse.com/1104668" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12539" ref_url="https://www.suse.com/security/cve/CVE-2018-12539/" source="CVE"/>
		<reference ref_id="CVE-2018-1517" ref_url="https://www.suse.com/security/cve/CVE-2018-1517/" source="CVE"/>
		<reference ref_id="CVE-2018-1656" ref_url="https://www.suse.com/security/cve/CVE-2018-1656/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2583-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004524.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm to version 7.1.4.30 fixes the following issues:

Security issues fixed:

- CVE-2018-1517: Fixed a flaw in the java.math component in IBM SDK, which may
  allow an attacker to inflict a denial-of-service attack with specially
  crafted String data.
- CVE-2018-1656: Protect against path traversal attacks when extracting
  compressed dump files.
- CVE-2018-2940: Fixed an easily exploitable vulnerability in the libraries
  subcomponent, which allowed unauthenticated attackers with network access
  via multiple protocols to compromise the Java SE, leading to
  unauthorized read access.
- CVE-2018-2952: Fixed an easily exploitable vulnerability in the concurrency
  subcomponent, which allowed unauthenticated attackers with network access
  via multiple protocols to compromise the Java SE, leading to denial of
  service.
- CVE-2018-2973: Fixed a difficult to exploit vulnerability in the JSSE
  subcomponent, which allowed unauthenticated attackers with network access
  via SSL/TLS to compromise the Java SE, leading to unauthorized creation,
  deletion or modification access to critical data.
- CVE-2018-12539: Fixed a vulnerability in which users other than the process
  owner may be able to use Java Attach API to connect to the IBM JVM on the
  same machine and use Attach API operations, including the ability to execute
  untrusted arbitrary code.

Other changes made:

- Various JIT/JVM crash fixes
- Version update to 7.1.4.30 (bsc#1104668)

You can find detailed information about this update [here](https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_August_2018).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-31"/>
	<updated date="2018-08-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104668">SUSE bug 1104668</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12539/">CVE-2018-12539 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12539">CVE-2018-12539 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1517/">CVE-2018-1517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1517">CVE-2018-1517 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1656/">CVE-2018-1656 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1656">CVE-2018-1656 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2940">CVE-2018-2940 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2952">CVE-2018-2952 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2973">CVE-2018-2973 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582862" comment="java-1_7_1-ibm-1.7.1_sr4.30-26.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582863" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.30-26.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582864" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.30-26.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582865" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.30-26.29.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582862" comment="java-1_7_1-ibm-1.7.1_sr4.30-26.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582863" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.30-26.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582864" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.30-26.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582865" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.30-26.29.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220012" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1116574" ref_url="https://bugzilla.suse.com/1116574" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004894.html" source="SUSE-SU"/>
		<description>

java-1_7_1-ibm was updated to Java 7.1 Service Refresh 4 Fix Pack 35 (bsc#1116574):

* Consumability

  - IJ10515 AIX JAVA 7.1.3.10 GENERAL PROTECTION FAULT WHEN ATTEMPTING TO USE HEALTH CENTER API

* Class Libraries

  - IJ10934 CVE-2018-13785
  - IJ10935 CVE-2018-3136
  - IJ10895 CVE-2018-3139
  - IJ10932 CVE-2018-3149
  - IJ10894 CVE-2018-3180
  - IJ10933 CVE-2018-3214
  - IJ09315 FLOATING POINT EXCEPTION FROM JAVA.TEXT.DECIMALFORMAT. FORMAT
  - IJ09088 INTRODUCING A NEW PROPERTY FOR TURKEY TIMEZONE FOR PRODUCTS NOT IDENTIFYING TRT
  - IJ08569 JAVA.IO.IOEXCEPTION OCCURS WHEN A FILECHANNEL IS BIGGER THAN 2GB ON AIX PLATFORM
  - IJ10800 REMOVE EXPIRING ROOT CERTIFICATES IN IBM JDK’S CACERTS.

* Java Virtual Machine

  - IJ10931 CVE-2018-3169
  - IV91132 SOME CORE PATTERN SPECIFIERS ARE NOT HANDLED BY THE JVM ON LINUX

* JIT Compiler

  - IJ08205 CRASH WHILE COMPILING
  - IJ07886 INCORRECT CALUCATIONS WHEN USING NUMBERFORMAT.FORMAT() AND BIGDECIMAL.{FLOAT/DOUBLE }VALUE()

* ORB

  - IX90187 CLIENTREQUESTIMPL.REINVO KE FAILS WITH JAVA.LANG.INDEXOUTOFBOUN DSEXCEPTION

* Security

  - IJ10492 'EC KEYSIZE &lt; 384' IS NOT HONORED USING THE 'JDK.TLS.DISABLEDALGORIT HMS' SECURITY PROPERTY
  - IJ10491 AES/GCM CIPHER – AAD NOT RESET TO UN-INIT STATE AFTER DOFINAL( ) AND INIT( )
  - IJ08442 HTTP PUBLIC KEY PINNING FINGERPRINT,PROBLEM WITH CONVERTING TO JKS KEYSTORE
  - IJ09107 IBMPKCS11IMPL CRYPTO PROVIDER – INTERMITTENT ERROR WITH SECP521R1 SIGNATURE ON Z/OS
  - IJ10136 IBMPKCS11IMPL – INTERMITTENT ERROR WITH SECP521R1 SIG ON Z/OS AND Z/LINUX
  - IJ08530 IBMPKCS11IMPL PROVIDER USES THE WRONG RSA CIPHER MECHANISM FOR THE RSA/ECB/PKCS1PADDING CIPHER
  - IJ08723 JAAS THROWS A ‘ARRAY INDEX OUT OF RANGE’ EXCEPTION
  - IJ08704 THE SECURITY PROPERTY ‘JDK.CERTPATH.DISABLEDAL GORITHMS’ IS MISTAKENLY BEING USED TO FILTER JAR SIGNING ALGORITHMS

* z/OS Extentions

  - PH01244 OUTPUT BUFFER TOO SHORT FOR GCM MODE ENCRYPTION USING IBMJCEHYBRID
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-27"/>
	<updated date="2018-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13785">CVE-2018-13785 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3136">CVE-2018-3136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3139">CVE-2018-3139 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3149">CVE-2018-3149 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3169">CVE-2018-3169 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3180">CVE-2018-3180 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3214">CVE-2018-3214 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582866" comment="java-1_7_1-ibm-1.7.1_sr4.35-26.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582867" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-26.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582868" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-26.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582869" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-26.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582866" comment="java-1_7_1-ibm-1.7.1_sr4.35-26.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582867" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-26.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582868" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-26.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582869" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-26.32.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220013" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005193.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm to version 7.1.4.40 fixes the following issues:

Security issues fixed: 

- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).

More information: https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_February_2019
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-14"/>
	<updated date="2019-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11212">CVE-2018-11212 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2422">CVE-2019-2422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582870" comment="java-1_7_1-ibm-1.7.1_sr4.40-26.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582871" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582872" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582873" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582870" comment="java-1_7_1-ibm-1.7.1_sr4.40-26.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582871" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582872" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582873" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220014" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1132734" ref_url="https://bugzilla.suse.com/1132734" source="BUGZILLA"/>
		<reference ref_id="1134718" ref_url="https://bugzilla.suse.com/1134718" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10245" ref_url="https://www.suse.com/security/cve/CVE-2019-10245/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2697" ref_url="https://www.suse.com/security/cve/CVE-2019-2697/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005484.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update to Java 7.1 Service Refresh 4 Fix Pack 45.
                                                                                     
Security issues fixed:                                                                   
                                                                        
- CVE-2019-10245: Fixed Java bytecode verifier issue causing crashes (bsc#1134718).                                              
- CVE-2019-2698: Fixed out of bounds access flaw in the 2D component (bsc#1132729).                                                                   
- CVE-2019-2697: Fixed flaw inside the 2D component (bsc#1132734).                                                                   
- CVE-2019-2602: Fixed flaw inside BigDecimal implementation (Component: Libraries) (bsc#1132728).                                                                                                                 
- CVE-2019-2684: Fixed flaw was found in the RMI registry implementation (bsc#1132732).                                                                                                                            
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132734">SUSE bug 1132734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10245/">CVE-2019-10245 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10245">CVE-2019-10245 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2602">CVE-2019-2602 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2684">CVE-2019-2684 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2697/">CVE-2019-2697 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2697">CVE-2019-2697 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2698">CVE-2019-2698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582874" comment="java-1_7_1-ibm-1.7.1_sr4.45-26.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582875" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.45-26.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582876" comment="java-1_7_1-ibm-devel-1.7.1_sr4.45-26.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582877" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.45-26.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582878" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.45-26.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220015" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="1147021" ref_url="https://bugzilla.suse.com/1147021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11771" ref_url="https://www.suse.com/security/cve/CVE-2019-11771/" source="CVE"/>
		<reference ref_id="CVE-2019-11775" ref_url="https://www.suse.com/security/cve/CVE-2019-11775/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-4473" ref_url="https://www.suse.com/security/cve/CVE-2019-4473/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005877.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update to Java 7.1 Service Refresh 4 Fix Pack 50.

Security issues fixed:

- CVE-2019-11771: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11775: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-4473: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-7317: Fixed issue inside Component AWT (libpng)(bsc#1141780).
- CVE-2019-2769: Fixed issue inside Component Utilities (bsc#1141783).
- CVE-2019-2762: Fixed issue inside Component Utilities (bsc#1141782).
- CVE-2019-2816: Fixed issue inside Component Networking (bsc#1141785).
- CVE-2019-2766: Fixed issue inside Component Networking (bsc#1141789).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-04"/>
	<updated date="2019-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11771/">CVE-2019-11771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11771">CVE-2019-11771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11775/">CVE-2019-11775 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11775">CVE-2019-11775 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2766">CVE-2019-2766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-4473/">CVE-2019-4473 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-4473">CVE-2019-4473 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582879" comment="java-1_7_1-ibm-1.7.1_sr4.50-26.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582880" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-26.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582881" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-26.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582882" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-26.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582883" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-26.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220016" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="1158442" ref_url="https://bugzilla.suse.com/1158442" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to 7.1 Service Refresh 4 Fix Pack 55 [bsc#1158442, bsc#1154212]
  * Security fixes:
    CVE-2019-2933 CVE-2019-2945 CVE-2019-2962 CVE-2019-2964
    CVE-2019-2978 CVE-2019-2983 CVE-2019-2989 CVE-2019-2992
    CVE-2019-2999 CVE-2019-2973 CVE-2019-2981
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-08"/>
	<updated date="2020-01-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2933">CVE-2019-2933 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582884" comment="java-1_7_1-ibm-1.7.1_sr4.55-26.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582885" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-26.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582886" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-26.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582887" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-26.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582888" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-26.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220017" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1162972" ref_url="https://bugzilla.suse.com/1162972" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006509.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Java was updated to 7.1 Service Refresh 4 Fix Pack 60 [bsc#1162972, bsc#1160968].

Security issues fixed:

- CVE-2020-2583: Fixed a serialization vulnerability in BeanContextSupport (bsc#1162972).
- CVE-2020-2593: Fixed an incorrect check in isBuiltinStreamHandler, causing URL normalization issues (bsc#1162972).
- CVE-2020-2604: Fixed a serialization issue in jdk.serialFilter (bsc#1162972).
- CVE-2020-2659: Fixed the incomplete enforcement of the maxDatagramSockets limit in DatagramChannelImpl (bsc#1162972).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-21"/>
	<updated date="2020-02-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582889" comment="java-1_7_1-ibm-1.7.1_sr4.60-26.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582890" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.60-26.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582891" comment="java-1_7_1-ibm-devel-1.7.1_sr4.60-26.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582892" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.60-26.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582893" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.60-26.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220018" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="1172277" ref_url="https://bugzilla.suse.com/1172277" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006965.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

java-1_7_1-ibm was updated to Java 7.1 Service Refresh 4 Fix Pack 65 (bsc#1172277 and bsc#1169511)

- CVE-2020-2654: Fixed an issue which could have resulted in unauthorized ability to cause a partial denial of service    
- CVE-2020-2756: Improved mapping of serial ENUMs 
- CVE-2020-2757: Less Blocking Array Queues 
- CVE-2020-2781: Improved TLS session handling 
- CVE-2020-2800: Improved Headings for HTTP Servers 
- CVE-2020-2803: Enhanced buffering of byte buffers 
- CVE-2020-2805: Enhanced typing of methods 
- CVE-2020-2830: Improved Scanner conversions 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-17"/>
	<updated date="2020-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582894" comment="java-1_7_1-ibm-1.7.1_sr4.65-26.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582895" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-26.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582896" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-26.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582897" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-26.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582898" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-26.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220019" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1175259" ref_url="https://bugzilla.suse.com/1175259" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17639" ref_url="https://www.suse.com/security/cve/CVE-2019-17639/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007342.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 70 [bsc#1175259, bsc#1174157]
  CVE-2020-14577 CVE-2020-14578 CVE-2020-14579 CVE-2020-14621
  CVE-2020-14593 CVE-2020-14583 CVE-2019-17639
  * Class Libraries:
    - UPDATE TIMEZONE INFORMATION TO TZDATA2020A
  * Security:
    - CERTIFICATEEXCEPTION OCCURS WHEN FILE.ENCODING PROPERTY SET TO
      NON DEFAULT VALUE
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17639/">CVE-2019-17639 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17639">CVE-2019-17639 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582899" comment="java-1_7_1-ibm-1.7.1_sr4.70-26.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582900" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-26.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582901" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-26.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582902" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-26.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582903" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-26.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220020" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="1180063" ref_url="https://bugzilla.suse.com/1180063" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 75 [bsc#1180063, bsc#1177943]
  CVE-2020-14792 CVE-2020-14797 CVE-2020-14782 CVE-2020-14781
  CVE-2020-14779 CVE-2020-14798 CVE-2020-14796 CVE-2020-14803
  * Class Libraries:
    - Z/OS specific C function send_file is changing the file pointer position
  * Security:
    - Add the new oracle signer certificate
    - Certificate parsing error
    - JVM memory growth can be caused by the IBMPKCS11IMPL crypto provider
    - Remove check for websphere signed jars
    - sessionid.hashcode generates too many collisions
    - The Java 8 IBM certpath provider does not honor the user
      specified system property for CLR connect timeout
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-22"/>
	<updated date="2020-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14782">CVE-2020-14782 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582904" comment="java-1_7_1-ibm-1.7.1_sr4.75-26.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582905" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582906" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582907" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582908" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220021" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="1182186" ref_url="https://bugzilla.suse.com/1182186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-27221" ref_url="https://www.suse.com/security/cve/CVE-2020-27221/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008347.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 80
  [bsc#1182186, bsc#1181239, CVE-2020-27221, CVE-2020-14803]
  * CVE-2020-27221: Potential for a stack-based buffer overflow
    when the virtual machine or JNI natives are converting from
    UTF-8 characters to platform encoding.
  * CVE-2020-14803: Unauthenticated attacker with network access
    via multiple protocols allows to compromise Java SE.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-19"/>
	<updated date="2021-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27221/">CVE-2020-27221 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27221">CVE-2020-27221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582909" comment="java-1_7_1-ibm-1.7.1_sr4.80-26.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582910" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.80-26.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582911" comment="java-1_7_1-ibm-devel-1.7.1_sr4.80-26.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582912" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.80-26.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582913" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.80-26.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220022" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1188568" ref_url="https://bugzilla.suse.com/1188568" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="1192052" ref_url="https://bugzilla.suse.com/1192052" source="BUGZILLA"/>
		<reference ref_id="1194198" ref_url="https://bugzilla.suse.com/1194198" source="BUGZILLA"/>
		<reference ref_id="1194232" ref_url="https://bugzilla.suse.com/1194232" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2432" ref_url="https://www.suse.com/security/cve/CVE-2021-2432/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-41035" ref_url="https://www.suse.com/security/cve/CVE-2021-41035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 5 Fix Pack 0
- CVE-2021-41035: before version 0.29.0, the openj9 JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods. (bsc#1194198, bsc#1192052)
- CVE-2021-35586: Excessive memory allocation in BMPImageReader. (bsc#1191914)
- CVE-2021-35564: Certificates with end dates too far in the future can corrupt keystore. (bsc#1191913)
- CVE-2021-35559: Excessive memory allocation in RTFReader. (bsc#1191911)
- CVE-2021-35556: Excessive memory allocation in RTFParser. (bsc#1191910)
- CVE-2021-35565: Loop in HttpsServer triggered during TLS session close. (bsc#1191909) 
- CVE-2021-35588: Incomplete validation of inner class references in ClassFileParser. (bsc#1191905)
- CVE-2021-2341: Fixed a flaw inside the FtpClient. (bsc#1188564)
- CVE-2021-2369: JAR file handling problem containing multiple MANIFEST.MF files. (bsc#1188565)
- CVE-2021-2432: Fixed a vulnerability in the omponent JNDI. (bsc#1188568)
- CVE-2021-2163: Incomplete enforcement of JAR signing disabled algorithms. (bsc#1185055)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188568">SUSE bug 1188568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192052">SUSE bug 1192052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194198">SUSE bug 1194198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194232">SUSE bug 1194232</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-2432/">CVE-2021-2432 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2432">CVE-2021-2432 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41035/">CVE-2021-41035 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41035">CVE-2021-41035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662529" comment="java-1_7_1-ibm-1.7.1_sr5.0-26.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662530" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.0-26.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662531" comment="java-1_7_1-ibm-devel-1.7.1_sr5.0-26.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662532" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.0-26.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662533" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.0-26.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220023" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1194925" ref_url="https://bugzilla.suse.com/1194925" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194927" ref_url="https://bugzilla.suse.com/1194927" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194930" ref_url="https://bugzilla.suse.com/1194930" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1196500" ref_url="https://bugzilla.suse.com/1196500" source="BUGZILLA"/>
		<reference ref_id="1197126" ref_url="https://bugzilla.suse.com/1197126" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21271" ref_url="https://www.suse.com/security/cve/CVE-2022-21271/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update Java 7.1 to Service Refresh 7 Fix Pack 5 (bsc#1197126).

Including fixes for the following vulnerabilities: 

  CVE-2022-21366, CVE-2022-21365, CVE-2022-21360, CVE-2022-21349,
  CVE-2022-21341, CVE-2022-21340, CVE-2022-21305, CVE-2022-21277,
  CVE-2022-21299, CVE-2022-21296, CVE-2022-21282, CVE-2022-21294,
  CVE-2022-21293, CVE-2022-21291, CVE-2022-21283, CVE-2022-21248,
  CVE-2022-21271.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-23"/>
	<updated date="2022-03-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194925">SUSE bug 1194925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194927">SUSE bug 1194927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194930">SUSE bug 1194930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196500">SUSE bug 1196500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21271/">CVE-2022-21271 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21271">CVE-2022-21271 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21277">CVE-2022-21277 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21291">CVE-2022-21291 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21349">CVE-2022-21349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21366">CVE-2022-21366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009674107" comment="java-1_7_1-ibm-1.7.1_sr5.5-26.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674108" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.5-26.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674109" comment="java-1_7_1-ibm-devel-1.7.1_sr5.5-26.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674110" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.5-26.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674111" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.5-26.71.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220024" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="992537" ref_url="https://bugzilla.suse.com/992537" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="CVE-2016-3511" ref_url="https://www.suse.com/security/cve/CVE-2016-3511/" source="CVE"/>
		<reference ref_id="CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002261.html" source="SUSE-SU"/>
		<description>

IBM Java 7.1 was updated to version 7.1-3.50 to fix the following security issues:

CVE-2016-3485 CVE-2016-3511 CVE-2016-3598

Please see https://www.ibm.com/developerworks/java/jdk/alerts/ for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-07"/>
	<updated date="2016-09-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/992537">SUSE bug 992537</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485 at SUSE</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3485">CVE-2016-3485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3511/">CVE-2016-3511 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3511">CVE-2016-3511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3598">CVE-2016-3598 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582914" comment="java-1_7_1-ibm-1.7.1_sr3.50-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582915" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582916" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582917" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582914" comment="java-1_7_1-ibm-1.7.1_sr3.50-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582915" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582916" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582917" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220025" version="1" class="patch">
	<metadata>
		<title>Security update for jpeg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1062937" ref_url="https://bugzilla.suse.com/1062937" source="BUGZILLA"/>
		<reference ref_id="1096209" ref_url="https://bugzilla.suse.com/1096209" source="BUGZILLA"/>
		<reference ref_id="1098155" ref_url="https://bugzilla.suse.com/1098155" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15232" ref_url="https://www.suse.com/security/cve/CVE-2017-15232/" source="CVE"/>
		<reference ref_id="CVE-2018-1152" ref_url="https://www.suse.com/security/cve/CVE-2018-1152/" source="CVE"/>
		<reference ref_id="CVE-2018-11813" ref_url="https://www.suse.com/security/cve/CVE-2018-11813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004223.html" source="SUSE-SU"/>
		<description>
This update for jpeg fixes the following issues:

* CVE-2017-15232: NULL pointer dereferences in jdpostct.c and jquant1.c could
  lead to denial of service (crash) when processing images [bsc#1062937]
* CVE-2018-11813: Fixed the end-of-file mishandling in read_pixel in rdtarga.c,
  which allowed remote attackers to cause a denial-of-service via crafted JPG
  files due to a large loop [bsc#1096209]
* CVE-2018-1152: Fixed a denial of service in start_input_bmp() rdbmp.c caused
  by a divide by zero when processing a crafted BMP image [bsc#1098155]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-27"/>
	<updated date="2018-06-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062937">SUSE bug 1062937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096209">SUSE bug 1096209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098155">SUSE bug 1098155</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15232/">CVE-2017-15232 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15232">CVE-2017-15232 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1152/">CVE-2018-1152 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1152">CVE-2018-1152 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11813/">CVE-2018-11813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11813">CVE-2018-11813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582918" comment="jpeg-6b-879.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582919" comment="libjpeg-6.2.0-879.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582920" comment="libjpeg-32bit-6.2.0-879.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582921" comment="libjpeg-x86-6.2.0-879.12.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582918" comment="jpeg-6b-879.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582919" comment="libjpeg-6.2.0-879.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582920" comment="libjpeg-32bit-6.2.0-879.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582921" comment="libjpeg-x86-6.2.0-879.12.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220026" version="1" class="patch">
	<metadata>
		<title>Security update for kdebase4-workspace (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="904625" ref_url="https://bugzilla.suse.com/904625" source="BUGZILLA"/>
		<reference ref_id="929718" ref_url="https://bugzilla.suse.com/929718" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8651" ref_url="https://www.suse.com/security/cve/CVE-2014-8651/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001839.html" source="SUSE-SU"/>
		<description>

This update for kdebase4-workspace fixes the following issues:

- CVE-2014-8651: Privilege escalation via KDE Clock KCM helper when non-default polkit settings are used (bsc#904625)

The following non-security bugs were fixed:

- bsc#929718: Make kdm recognize an IPv6 localhost address as localhost

		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-01"/>
	<updated date="2016-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/904625">SUSE bug 904625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929718">SUSE bug 929718</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8651/">CVE-2014-8651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8651">CVE-2014-8651 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578238" comment="kde4-kgreeter-plugins-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566699" comment="kdebase4-wallpapers-4.3.5-0.11.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578239" comment="kdebase4-workspace-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578240" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578241" comment="kdm-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578242" comment="kwin-4.3.5-0.12.20.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578238" comment="kde4-kgreeter-plugins-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566699" comment="kdebase4-wallpapers-4.3.5-0.11.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578239" comment="kdebase4-workspace-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578240" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578241" comment="kdm-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578242" comment="kwin-4.3.5-0.12.20.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220027" version="1" class="patch">
	<metadata>
		<title>Security update for kdelibs3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="958347" ref_url="https://bugzilla.suse.com/958347" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7543" ref_url="https://www.suse.com/security/cve/CVE-2015-7543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004799.html" source="SUSE-SU"/>
		<description>
This update for kdelibs3 fixes the following issues:

- CVE-2015-7543: Insecure creation of temporary directories allowed local users
  to hijack the IPC by pre-creating the temporary directory (bsc#958347).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-26"/>
	<updated date="2018-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958347">SUSE bug 958347</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7543/">CVE-2015-7543 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7543">CVE-2015-7543 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582922" comment="kdelibs3-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582923" comment="kdelibs3-32bit-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582924" comment="kdelibs3-default-style-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582925" comment="kdelibs3-default-style-32bit-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582926" comment="kdelibs3-default-style-x86-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582927" comment="kdelibs3-x86-3.5.10-23.30.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582922" comment="kdelibs3-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582923" comment="kdelibs3-32bit-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582924" comment="kdelibs3-default-style-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582925" comment="kdelibs3-default-style-32bit-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582926" comment="kdelibs3-default-style-x86-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582927" comment="kdelibs3-x86-3.5.10-23.30.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220028" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="909589" ref_url="https://bugzilla.suse.com/909589" source="BUGZILLA"/>
		<reference ref_id="954847" ref_url="https://bugzilla.suse.com/954847" source="BUGZILLA"/>
		<reference ref_id="971030" ref_url="https://bugzilla.suse.com/971030" source="BUGZILLA"/>
		<reference ref_id="974620" ref_url="https://bugzilla.suse.com/974620" source="BUGZILLA"/>
		<reference ref_id="979915" ref_url="https://bugzilla.suse.com/979915" source="BUGZILLA"/>
		<reference ref_id="982544" ref_url="https://bugzilla.suse.com/982544" source="BUGZILLA"/>
		<reference ref_id="983721" ref_url="https://bugzilla.suse.com/983721" source="BUGZILLA"/>
		<reference ref_id="984755" ref_url="https://bugzilla.suse.com/984755" source="BUGZILLA"/>
		<reference ref_id="986362" ref_url="https://bugzilla.suse.com/986362" source="BUGZILLA"/>
		<reference ref_id="986572" ref_url="https://bugzilla.suse.com/986572" source="BUGZILLA"/>
		<reference ref_id="988498" ref_url="https://bugzilla.suse.com/988498" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4470" ref_url="https://www.suse.com/security/cve/CVE-2016-4470/" source="CVE"/>
		<reference ref_id="CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997/" source="CVE"/>
		<reference ref_id="CVE-2016-5829" ref_url="https://www.suse.com/security/cve/CVE-2016-5829/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002201.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).

The following non-security bugs were fixed:
- RDMA/cxgb4: Configure 0B MRs to match HW implementation (bsc#909589).
- RDMA/cxgb4: Do not hang threads forever waiting on WR replies (bsc#909589).
- RDMA/cxgb4: Fix locking issue in process_mpa_request (bsc#909589).
- RDMA/cxgb4: Handle NET_XMIT return codes (bsc#909589).
- RDMA/cxgb4: Increase epd buff size for debug interface (bsc#909589).
- RDMA/cxgb4: Limit MRs to less than 8GB for T4/T5 devices (bsc#909589).
- RDMA/cxgb4: Serialize CQ event upcalls with CQ destruction (bsc#909589).
- RDMA/cxgb4: Wake up waiters after flushing the qp (bsc#909589).
- bridge: superfluous skb-&gt;nfct check in br_nf_dev_queue_xmit (bsc#982544).
- iucv: call skb_linearize() when needed (bnc#979915, LTC#141240).
- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).
- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).
- mm: Fix DIF failures on ext3 filesystems (bsc#971030).
- net/qlge: Avoids recursive EEH error (bsc#954847).
- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).
- netfilter: bridge: do not leak skb in error paths (bsc#982544).
- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).
- qeth: delete napi struct when removing a qeth device (bnc#979915, LTC#143590).
- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979915, LTC#141456).
- s390/pci: fix use after free in dma_init (bnc#979915, LTC#141626).
- s390: fix test_fp_ctl inline assembly contraints (bnc#979915, LTC#143138).
- sched/cputime: Fix clock_nanosleep()/clock_gettime() inconsistency (bnc#988498).
- sched/cputime: Fix cpu_timer_sample_group() double accounting (bnc#988498).
- sched: Provide update_curr callbacks for stop/idle scheduling classes (bnc#988498).
- x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-09"/>
	<updated date="2016-08-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/909589">SUSE bug 909589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954847">SUSE bug 954847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971030">SUSE bug 971030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974620">SUSE bug 974620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979915">SUSE bug 979915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982544">SUSE bug 982544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983721">SUSE bug 983721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984755">SUSE bug 984755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986572">SUSE bug 986572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988498">SUSE bug 988498</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4470/">CVE-2016-4470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4470">CVE-2016-4470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4997">CVE-2016-4997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5829/">CVE-2016-5829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5829">CVE-2016-5829 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582928" comment="kernel-default-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582929" comment="kernel-default-base-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582931" comment="kernel-default-man-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582932" comment="kernel-ec2-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582933" comment="kernel-ec2-base-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582935" comment="kernel-pae-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582936" comment="kernel-pae-base-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582938" comment="kernel-ppc64-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582939" comment="kernel-ppc64-base-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582941" comment="kernel-source-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582942" comment="kernel-syms-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582943" comment="kernel-trace-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582944" comment="kernel-trace-base-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582946" comment="kernel-xen-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582947" comment="kernel-xen-base-3.0.101-80.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582928" comment="kernel-default-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582929" comment="kernel-default-base-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582931" comment="kernel-default-man-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582932" comment="kernel-ec2-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582933" comment="kernel-ec2-base-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582935" comment="kernel-pae-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582936" comment="kernel-pae-base-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582938" comment="kernel-ppc64-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582939" comment="kernel-ppc64-base-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582941" comment="kernel-source-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582942" comment="kernel-syms-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582943" comment="kernel-trace-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582944" comment="kernel-trace-base-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582946" comment="kernel-xen-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582947" comment="kernel-xen-base-3.0.101-80.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220029" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1000189" ref_url="https://bugzilla.suse.com/1000189" source="BUGZILLA"/>
		<reference ref_id="1001419" ref_url="https://bugzilla.suse.com/1001419" source="BUGZILLA"/>
		<reference ref_id="1002165" ref_url="https://bugzilla.suse.com/1002165" source="BUGZILLA"/>
		<reference ref_id="1003077" ref_url="https://bugzilla.suse.com/1003077" source="BUGZILLA"/>
		<reference ref_id="1003344" ref_url="https://bugzilla.suse.com/1003344" source="BUGZILLA"/>
		<reference ref_id="1003568" ref_url="https://bugzilla.suse.com/1003568" source="BUGZILLA"/>
		<reference ref_id="1003677" ref_url="https://bugzilla.suse.com/1003677" source="BUGZILLA"/>
		<reference ref_id="1003866" ref_url="https://bugzilla.suse.com/1003866" source="BUGZILLA"/>
		<reference ref_id="1003925" ref_url="https://bugzilla.suse.com/1003925" source="BUGZILLA"/>
		<reference ref_id="1004517" ref_url="https://bugzilla.suse.com/1004517" source="BUGZILLA"/>
		<reference ref_id="1004520" ref_url="https://bugzilla.suse.com/1004520" source="BUGZILLA"/>
		<reference ref_id="1005857" ref_url="https://bugzilla.suse.com/1005857" source="BUGZILLA"/>
		<reference ref_id="1005896" ref_url="https://bugzilla.suse.com/1005896" source="BUGZILLA"/>
		<reference ref_id="1005903" ref_url="https://bugzilla.suse.com/1005903" source="BUGZILLA"/>
		<reference ref_id="1006917" ref_url="https://bugzilla.suse.com/1006917" source="BUGZILLA"/>
		<reference ref_id="1006919" ref_url="https://bugzilla.suse.com/1006919" source="BUGZILLA"/>
		<reference ref_id="1007944" ref_url="https://bugzilla.suse.com/1007944" source="BUGZILLA"/>
		<reference ref_id="763198" ref_url="https://bugzilla.suse.com/763198" source="BUGZILLA"/>
		<reference ref_id="771065" ref_url="https://bugzilla.suse.com/771065" source="BUGZILLA"/>
		<reference ref_id="799133" ref_url="https://bugzilla.suse.com/799133" source="BUGZILLA"/>
		<reference ref_id="803320" ref_url="https://bugzilla.suse.com/803320" source="BUGZILLA"/>
		<reference ref_id="839104" ref_url="https://bugzilla.suse.com/839104" source="BUGZILLA"/>
		<reference ref_id="843236" ref_url="https://bugzilla.suse.com/843236" source="BUGZILLA"/>
		<reference ref_id="860441" ref_url="https://bugzilla.suse.com/860441" source="BUGZILLA"/>
		<reference ref_id="863873" ref_url="https://bugzilla.suse.com/863873" source="BUGZILLA"/>
		<reference ref_id="865783" ref_url="https://bugzilla.suse.com/865783" source="BUGZILLA"/>
		<reference ref_id="871728" ref_url="https://bugzilla.suse.com/871728" source="BUGZILLA"/>
		<reference ref_id="907611" ref_url="https://bugzilla.suse.com/907611" source="BUGZILLA"/>
		<reference ref_id="908458" ref_url="https://bugzilla.suse.com/908458" source="BUGZILLA"/>
		<reference ref_id="908684" ref_url="https://bugzilla.suse.com/908684" source="BUGZILLA"/>
		<reference ref_id="909077" ref_url="https://bugzilla.suse.com/909077" source="BUGZILLA"/>
		<reference ref_id="909350" ref_url="https://bugzilla.suse.com/909350" source="BUGZILLA"/>
		<reference ref_id="909484" ref_url="https://bugzilla.suse.com/909484" source="BUGZILLA"/>
		<reference ref_id="909618" ref_url="https://bugzilla.suse.com/909618" source="BUGZILLA"/>
		<reference ref_id="909994" ref_url="https://bugzilla.suse.com/909994" source="BUGZILLA"/>
		<reference ref_id="911687" ref_url="https://bugzilla.suse.com/911687" source="BUGZILLA"/>
		<reference ref_id="915183" ref_url="https://bugzilla.suse.com/915183" source="BUGZILLA"/>
		<reference ref_id="920016" ref_url="https://bugzilla.suse.com/920016" source="BUGZILLA"/>
		<reference ref_id="922634" ref_url="https://bugzilla.suse.com/922634" source="BUGZILLA"/>
		<reference ref_id="922947" ref_url="https://bugzilla.suse.com/922947" source="BUGZILLA"/>
		<reference ref_id="928138" ref_url="https://bugzilla.suse.com/928138" source="BUGZILLA"/>
		<reference ref_id="929141" ref_url="https://bugzilla.suse.com/929141" source="BUGZILLA"/>
		<reference ref_id="934760" ref_url="https://bugzilla.suse.com/934760" source="BUGZILLA"/>
		<reference ref_id="951392" ref_url="https://bugzilla.suse.com/951392" source="BUGZILLA"/>
		<reference ref_id="956514" ref_url="https://bugzilla.suse.com/956514" source="BUGZILLA"/>
		<reference ref_id="960689" ref_url="https://bugzilla.suse.com/960689" source="BUGZILLA"/>
		<reference ref_id="963655" ref_url="https://bugzilla.suse.com/963655" source="BUGZILLA"/>
		<reference ref_id="967716" ref_url="https://bugzilla.suse.com/967716" source="BUGZILLA"/>
		<reference ref_id="968010" ref_url="https://bugzilla.suse.com/968010" source="BUGZILLA"/>
		<reference ref_id="968014" ref_url="https://bugzilla.suse.com/968014" source="BUGZILLA"/>
		<reference ref_id="971975" ref_url="https://bugzilla.suse.com/971975" source="BUGZILLA"/>
		<reference ref_id="971989" ref_url="https://bugzilla.suse.com/971989" source="BUGZILLA"/>
		<reference ref_id="973203" ref_url="https://bugzilla.suse.com/973203" source="BUGZILLA"/>
		<reference ref_id="974620" ref_url="https://bugzilla.suse.com/974620" source="BUGZILLA"/>
		<reference ref_id="976867" ref_url="https://bugzilla.suse.com/976867" source="BUGZILLA"/>
		<reference ref_id="977687" ref_url="https://bugzilla.suse.com/977687" source="BUGZILLA"/>
		<reference ref_id="979514" ref_url="https://bugzilla.suse.com/979514" source="BUGZILLA"/>
		<reference ref_id="979595" ref_url="https://bugzilla.suse.com/979595" source="BUGZILLA"/>
		<reference ref_id="979681" ref_url="https://bugzilla.suse.com/979681" source="BUGZILLA"/>
		<reference ref_id="980371" ref_url="https://bugzilla.suse.com/980371" source="BUGZILLA"/>
		<reference ref_id="982218" ref_url="https://bugzilla.suse.com/982218" source="BUGZILLA"/>
		<reference ref_id="982783" ref_url="https://bugzilla.suse.com/982783" source="BUGZILLA"/>
		<reference ref_id="983535" ref_url="https://bugzilla.suse.com/983535" source="BUGZILLA"/>
		<reference ref_id="983619" ref_url="https://bugzilla.suse.com/983619" source="BUGZILLA"/>
		<reference ref_id="984102" ref_url="https://bugzilla.suse.com/984102" source="BUGZILLA"/>
		<reference ref_id="984194" ref_url="https://bugzilla.suse.com/984194" source="BUGZILLA"/>
		<reference ref_id="984992" ref_url="https://bugzilla.suse.com/984992" source="BUGZILLA"/>
		<reference ref_id="985206" ref_url="https://bugzilla.suse.com/985206" source="BUGZILLA"/>
		<reference ref_id="986337" ref_url="https://bugzilla.suse.com/986337" source="BUGZILLA"/>
		<reference ref_id="986362" ref_url="https://bugzilla.suse.com/986362" source="BUGZILLA"/>
		<reference ref_id="986365" ref_url="https://bugzilla.suse.com/986365" source="BUGZILLA"/>
		<reference ref_id="986445" ref_url="https://bugzilla.suse.com/986445" source="BUGZILLA"/>
		<reference ref_id="987565" ref_url="https://bugzilla.suse.com/987565" source="BUGZILLA"/>
		<reference ref_id="988440" ref_url="https://bugzilla.suse.com/988440" source="BUGZILLA"/>
		<reference ref_id="989152" ref_url="https://bugzilla.suse.com/989152" source="BUGZILLA"/>
		<reference ref_id="989261" ref_url="https://bugzilla.suse.com/989261" source="BUGZILLA"/>
		<reference ref_id="989764" ref_url="https://bugzilla.suse.com/989764" source="BUGZILLA"/>
		<reference ref_id="989779" ref_url="https://bugzilla.suse.com/989779" source="BUGZILLA"/>
		<reference ref_id="991608" ref_url="https://bugzilla.suse.com/991608" source="BUGZILLA"/>
		<reference ref_id="991665" ref_url="https://bugzilla.suse.com/991665" source="BUGZILLA"/>
		<reference ref_id="991923" ref_url="https://bugzilla.suse.com/991923" source="BUGZILLA"/>
		<reference ref_id="992566" ref_url="https://bugzilla.suse.com/992566" source="BUGZILLA"/>
		<reference ref_id="993127" ref_url="https://bugzilla.suse.com/993127" source="BUGZILLA"/>
		<reference ref_id="993890" ref_url="https://bugzilla.suse.com/993890" source="BUGZILLA"/>
		<reference ref_id="993891" ref_url="https://bugzilla.suse.com/993891" source="BUGZILLA"/>
		<reference ref_id="994296" ref_url="https://bugzilla.suse.com/994296" source="BUGZILLA"/>
		<reference ref_id="994436" ref_url="https://bugzilla.suse.com/994436" source="BUGZILLA"/>
		<reference ref_id="994618" ref_url="https://bugzilla.suse.com/994618" source="BUGZILLA"/>
		<reference ref_id="994759" ref_url="https://bugzilla.suse.com/994759" source="BUGZILLA"/>
		<reference ref_id="994926" ref_url="https://bugzilla.suse.com/994926" source="BUGZILLA"/>
		<reference ref_id="995968" ref_url="https://bugzilla.suse.com/995968" source="BUGZILLA"/>
		<reference ref_id="996329" ref_url="https://bugzilla.suse.com/996329" source="BUGZILLA"/>
		<reference ref_id="996664" ref_url="https://bugzilla.suse.com/996664" source="BUGZILLA"/>
		<reference ref_id="997708" ref_url="https://bugzilla.suse.com/997708" source="BUGZILLA"/>
		<reference ref_id="998399" ref_url="https://bugzilla.suse.com/998399" source="BUGZILLA"/>
		<reference ref_id="998689" ref_url="https://bugzilla.suse.com/998689" source="BUGZILLA"/>
		<reference ref_id="999584" ref_url="https://bugzilla.suse.com/999584" source="BUGZILLA"/>
		<reference ref_id="999600" ref_url="https://bugzilla.suse.com/999600" source="BUGZILLA"/>
		<reference ref_id="999907" ref_url="https://bugzilla.suse.com/999907" source="BUGZILLA"/>
		<reference ref_id="999932" ref_url="https://bugzilla.suse.com/999932" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4312" ref_url="https://www.suse.com/security/cve/CVE-2013-4312/" source="CVE"/>
		<reference ref_id="CVE-2015-7513" ref_url="https://www.suse.com/security/cve/CVE-2015-7513/" source="CVE"/>
		<reference ref_id="CVE-2015-8956" ref_url="https://www.suse.com/security/cve/CVE-2015-8956/" source="CVE"/>
		<reference ref_id="CVE-2016-0823" ref_url="https://www.suse.com/security/cve/CVE-2016-0823/" source="CVE"/>
		<reference ref_id="CVE-2016-3841" ref_url="https://www.suse.com/security/cve/CVE-2016-3841/" source="CVE"/>
		<reference ref_id="CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997/" source="CVE"/>
		<reference ref_id="CVE-2016-5696" ref_url="https://www.suse.com/security/cve/CVE-2016-5696/" source="CVE"/>
		<reference ref_id="CVE-2016-6480" ref_url="https://www.suse.com/security/cve/CVE-2016-6480/" source="CVE"/>
		<reference ref_id="CVE-2016-6828" ref_url="https://www.suse.com/security/cve/CVE-2016-6828/" source="CVE"/>
		<reference ref_id="CVE-2016-7042" ref_url="https://www.suse.com/security/cve/CVE-2016-7042/" source="CVE"/>
		<reference ref_id="CVE-2016-7097" ref_url="https://www.suse.com/security/cve/CVE-2016-7097/" source="CVE"/>
		<reference ref_id="CVE-2016-7117" ref_url="https://www.suse.com/security/cve/CVE-2016-7117/" source="CVE"/>
		<reference ref_id="CVE-2016-7425" ref_url="https://www.suse.com/security/cve/CVE-2016-7425/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002439.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

For the PowerPC64 a new 'bigmem' flavor has been added to support big Power machines. (FATE#319026)

The following security bugs were fixed:

- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).
- CVE-2016-7097: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).
- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).
- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721 (bnc#994759).
- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).
- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).
- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for remote attackers to hijack TCP sessions via a blind in-window attack (bnc#989152).
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bnc#991608).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986365).
- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).
- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104 bsc#922947 bsc#968014).

The following non-security bugs were fixed:

- ahci: Order SATA device IDs for codename Lewisburg (fate#319286).
- ahci: Remove obsolete Intel Lewisburg SATA RAID device IDs (fate#319286).
- alsa: hda - Add Intel Lewisburg device IDs Audio (fate#319286).
- arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716).
- avoid dentry crash triggered by NFS (bsc#984194).
- bigmem: Add switch to configure bigmem patches (bsc#928138,fate#319026).
- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).
- blktap2: eliminate race from deferred work queue handling (bsc#911687).
- bnx2x: fix lockdep splat (bsc#908684 FATE#317539).
- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).
- bonding: fix bond_arp_rcv setting and arp validate desync state (bsc#977687).
- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction (bsc#983619).
- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- config.conf: add bigmem flavour on ppc64
- cpumask, nodemask: implement cpumask/nodemask_pr_args() (bnc1003866).
- cxgb4: Set VPD size so we can read both VPD structures (bsc#976867).
- dm space map metadata: fix sm_bootstrap_get_nr_blocks() (FATE#313903).
- dm thin: fix race condition when destroying thin pool workqueue (FATE#313903).
- drivers: hv: vmbus: avoid scheduling in interrupt context in vmbus_initiate_unload() (bnc#986337).
- drivers: hv: vmbus: avoid wait_for_completion() on crash (bnc#986337).
- drivers: hv: vmbus: do not loose HVMSG_TIMER_EXPIRED messages (bnc#986337).
- drivers: hv: vmbus: do not send CHANNELMSG_UNLOAD on pre-Win2012R2 hosts (bnc#986337).
- drivers: hv: vmbus: handle various crash scenarios (bnc#986337).
- drivers: hv: vmbus: remove code duplication in message handling (bnc#986337).
- drivers: hv: vss: run only on supported host versions (bnc#986337).
- fs/cifs: cifs_get_root shouldn't use path with tree name (bsc#963655, bsc#979681).
- fs/cifs: Compare prepaths when comparing superblocks (bsc#799133).
- fs/cifs: Fix memory leaks in cifs_do_mount() (bsc#799133).
- fs/cifs: Fix regression which breaks DFS mounting (bsc#799133).
- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- fs/cifs: make share unaccessible at root level mountable (bsc#799133).
- fs/cifs: Move check for prefix path to within cifs_get_root() (bsc#799133).
- fs/select: add vmalloc fallback for select(2) (bsc#1000189).
- hv: do not lose pending heartbeat vmbus packets (bnc#1006919).
- i2c: i801: add Intel Lewisburg device IDs (fate#319286).
- i40e: fix an uninitialized variable bug (bsc#909484 FATE#317397).
- include/linux/mmdebug.h: should include linux/bug.h (bnc#971975 VM performance -- git fixes).
- increase CONFIG_NR_IRQS 512 -&gt; 2048 reportedly irq error with multiple nvme and tg3 in the same machine is resolved by increasing CONFIG_NR_IRQS (bsc#998399)
- introduce SIZE_MAX (bsc#1000189).
- ipv6: replacing a rt6_info needs to purge possible propagated rt6_infos too (bsc#865783).
- kabi: Import kabi files from 3.0.101-80
- kabi-fix for flock_owner addition (bsc#998689).
- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kvm: x86: only channel 0 of the i8254 is linked to the HPET (bsc#960689).
- kvm: x86: SYSENTER emulation is broken (bsc#994618).
- libata: support the ata host which implements a queue depth less than 32 (bsc#871728)
- libfc: sanity check cpu number extracted from xid (bsc#988440).
- lib/vsprintf: implement bitmap printing through '%*pb[l]' (bnc#1003866).
- lpfc: call lpfc_sli_validate_fcp_iocb() with the hbalock held (bsc#951392).
- bigmem: make bigmem patches configurable (bsc#928138,fate#319026).
- md: check command validity early in md_ioctl() (bsc#1004520).
- md: Drop sending a change uevent when stopping (bsc#1003568).
- md: fix problem when adding device to read-only array with bitmap (bnc#771065).
- md: lockless I/O submission for RAID1 (bsc#982783).
- md/raid10: always set reshape_safe when initializing reshape_position (fate#311379).
- md/raid10: Fix memory leak when raid10 reshape completes (fate#311379).
- mm: fix sleeping function warning from __put_anon_vma (bnc#1005857).
- mm/memory.c: actually remap enough memory (bnc#1005903).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- mm, vmscan: Do not wait for page writeback for GFP_NOFS allocations (bnc#763198).
- Move patches that create ppc64-bigmem to the powerpc section. Add comments that outline the procedure and warn the unsuspecting.
- move the call of __d_drop(anon) into __d_materialise_unique(dentry, anon) (bsc#984194).
- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).
- mshyperv: fix recognition of Hyper-V guest crash MSR's (bnc#986337).
- net: add pfmemalloc check in sk_add_backlog() (bnc#920016).
- netback: fix flipping mode (bsc#996664).
- netfilter: ipv4: defrag: set local_df flag on defragmented skb (bsc#907611).
- netvsc: fix incorrect receive checksum offloading (bnc#1006917).
- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944).
- nfs: Do not disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261).
- nfs: Do not drop directory dentry which is in use (bsc#993127).
- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).
- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).
- nfs: Fix a regression in the read() syscall (bsc#999584).
- nfs: Fix races in nfs_revalidate_mapping (bsc#999584).
- nfs: fix the handling of NFS_INO_INVALID_DATA flag in nfs_revalidate_mapping (bsc#999584).
- nfs: Fix writeback performance issue on cache invalidation (bsc#999584).
- nfs: Refresh open-owner id when server says SEQID is bad (bsc#989261).
- nfsv4.1: Fix an NFSv4.1 state renewal regression (bnc#863873).
- nfsv4: add flock_owner to open context (bnc#998689).
- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).
- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).
- nfsv4: do not check MAY_WRITE access bit in OPEN (bsc#985206).
- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).
- nfsv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595).
- nfsv4: Fix range checking in __nfs4_get_acl_uncached and __nfs4_proc_set_acl (bsc#982218).
- oom: print nodemask in the oom report (bnc#1003866).
- pci: Add pci_set_vpd_size() to set VPD size (bsc#976867).
- pciback: fix conf_space read/write overlap check.
- pciback: return proper values during BAR sizing.
- pci_ids: Add PCI device ID functions 3 and 4 for newer F15h models (fate#321400).
- pm / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441).
- powerpc/64: Fix incorrect return value from __copy_tofrom_user (bsc#1005896).
- powerpc: Add ability to build little endian kernels (bsc#967716).
- powerpc: add kernel parameter iommu_alloc_quiet (bsc#994926).
- powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716).
- powerpc: blacklist fixes for unsupported subarchitectures ppc32 only: 6e0fdf9af216 powerpc: fix typo 'CONFIG_PMAC' obscure hardware: f7e9e3583625 powerpc: Fix missing L2 cache size in /sys/devices/system/cpu
- powerpc: Build fix for powerpc KVM (bsc#928138,fate#319026).
- powerpc: Do not build assembly files with ABIv2 (bsc#967716).
- powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716).
- powerpc: dtc is required to build dtb files (bsc#967716).
- powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716).
- powerpc: Fix error when cross building TAGS &amp; cscope (bsc#967716).
- powerpc: Make the vdso32 also build big-endian (bsc#967716).
- powerpc: Make VSID_BITS* dependency explicit (bsc#928138,fate#319026).
- powerpc/mm: Add 64TB support (bsc#928138,fate#319026).
- powerpc/mm: Change the swap encoding in pte (bsc#973203).
- powerpc/mm: Convert virtual address to vpn (bsc#928138,fate#319026).
- powerpc/mm: Fix hash computation function (bsc#928138,fate#319026).
- powerpc/mm: Increase the slice range to 64TB (bsc#928138,fate#319026).
- powerpc/mm: Make KERN_VIRT_SIZE not dependend on PGTABLE_RANGE (bsc#928138,fate#319026).
- powerpc/mm: Make some of the PGTABLE_RANGE dependency explicit (bsc#928138,fate#319026).
- powerpc/mm: Replace open coded CONTEXT_BITS value (bsc#928138,fate#319026).
- powerpc/mm: Simplify hpte_decode (bsc#928138,fate#319026).
- powerpc/mm: Update VSID allocation documentation (bsc#928138,fate#319026).
- powerpc/mm: Use 32bit array for slb cache (bsc#928138,fate#319026).
- powerpc/mm: Use hpt_va to compute virtual address (bsc#928138,fate#319026).
- powerpc/mm: Use the required number of VSID bits in slbmte (bsc#928138,fate#319026).
- powerpc: Move kdump default base address to half RMO size on 64bit (bsc#1003344).
- powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716).
- powerpc: Remove buggy 9-year-old test for binutils &lt; 2.12.1 (bsc#967716).
- powerpc: Rename USER_ESID_BITS* to ESID_BITS* (bsc#928138,fate#319026).
- powerpc: Require gcc 4.0 on 64-bit (bsc#967716).
- powerpc: Update kernel VSID range (bsc#928138,fate#319026).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- qlcnic: fix a timeout loop (bsc#909350 FATE#317546)
- random32: add prandom_u32_max (bsc#989152).
- remove problematic preprocessor constructs (bsc#928138,fate#319026).
- REVERT fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- rpm/constraints.in: Bump x86 disk space requirement to 20GB Clamav tends to run out of space nowadays.
- rpm/package-descriptions: add -bigmem description
- s390/cio: fix accidental interrupt enabling during resume (bnc#1003677, LTC#147606).
- s390/dasd: fix hanging device after clear subchannel (bnc#994436, LTC#144640).
- s390/time: LPAR offset handling (bnc#1003677, LTC#146920).
- s390/time: move PTFF definitions (bnc#1003677, LTC#146920).
- sata: Adding Intel Lewisburg device IDs for SATA (fate#319286).
- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bnc#1002165).
- sched: Fix possible divide by zero in avg_atom() calculation (bsc#996329).
- scripts/bigmem-generate-ifdef-guard: auto-regen patches.suse/ppc64-bigmem-introduce-CONFIG_BIGMEM
- scripts/bigmem-generate-ifdef-guard: Include this script to regenerate patches.suse/ppc64-bigmem-introduce-CONFIG_BIGMEM
- scripts/bigmem-generate-ifdef-guard: make executable
- scsi_dh_rdac: retry inquiry for UNIT ATTENTION (bsc#934760).
- scsi: do not print 'reservation conflict' for TEST UNIT READY (bsc#984102).
- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).
- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)
- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).
- scsi_scan: Send TEST UNIT READY to LUN0 before LUN scanning (bnc#843236,bsc#989779).
- scsi: zfcp: spin_lock_irqsave() is not nestable (bsc#1003677,LTC#147374).
- Set CONFIG_DEBUG_INFO=y and CONFIG_DEBUG_INFO_REDUCED=n on all platforms The specfile adjusts the config if necessary, but a new version of run_oldconfig.sh requires the settings to be present in the repository.
- sfc: on MC reset, clear PIO buffer linkage in TXQs (bsc#909618 FATE#317521).
- sort hyperv patches properly in series.conf
- sunrpc/cache: drop reference when sunrpc_cache_pipe_upcall() detects a race (bnc#803320).
- tg3: Avoid NULL pointer dereference in tg3_io_error_detected() (bsc#908458 FATE#317507).
- tmpfs: change final i_blocks BUG to WARNING (bsc#991923).
- tty: Signal SIGHUP before hanging up ldisc (bnc#989764).
- Update patches.xen/xen3-auto-arch-x86.diff (bsc#929141, a.o.).
- usb: fix typo in wMaxPacketSize validation (bsc#991665).
- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).
- usb: hub: Fix unbalanced reference count/memory leak/deadlocks (bsc#968010).
- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
- vlan: do not deliver frames for unknown vlans to protocols (bsc#979514).
- vlan: mask vlan prio bits (bsc#979514).
- vmxnet3: Wake queue from reset work (bsc#999907).
- x86, amd_nb: Clarify F15h, model 30h GART and L3 support (fate#321400).
- x86/asm/traps: Disable tracing and kprobes in fixup_bad_iret and sync_regs (bsc#909077).
- x86/cpu/amd: Set X86_FEATURE_EXTD_APICID for future processors (fate#321400).
- x86/gart: Check for GART support before accessing GART registers (fate#321400).
- x86/MCE/intel: Cleanup CMCI storm logic (bsc#929141).
- xenbus: inspect the correct type in xenbus_dev_request_and_reply().
- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
- xfs: Avoid grabbing ilock when file size is not changed (bsc#983535).
- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).
- zfcp: close window with unblocked rport during rport gone (bnc#1003677, LTC#144310).
- zfcp: fix D_ID field with actual value on tracing SAN responses (bnc#1003677, LTC#144312).
- zfcp: fix ELS/GS request&amp;response length for hardware data router (bnc#1003677, LTC#144308).
- zfcp: fix payload trace length for SAN request&amp;response (bnc#1003677, LTC#144312).
- zfcp: restore: Dont use 0 to indicate invalid LUN in rec trace (bnc#1003677, LTC#144312).
- zfcp: restore tracing of handle for port and LUN with HBA records (bnc#1003677, LTC#144312).
- zfcp: retain trace level for SCSI and HBA FSF response records (bnc#1003677, LTC#144312).
- zfcp: trace full payload of all SAN records (req,resp,iels) (bnc#1003677, LTC#144312).
- zfcp: trace on request for open and close of WKA port (bnc#1003677, LTC#144312).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-02"/>
	<updated date="2016-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000189">SUSE bug 1000189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001419">SUSE bug 1001419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002165">SUSE bug 1002165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003077">SUSE bug 1003077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003344">SUSE bug 1003344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003568">SUSE bug 1003568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003677">SUSE bug 1003677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003866">SUSE bug 1003866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003925">SUSE bug 1003925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004517">SUSE bug 1004517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004520">SUSE bug 1004520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005857">SUSE bug 1005857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005896">SUSE bug 1005896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005903">SUSE bug 1005903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006917">SUSE bug 1006917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006919">SUSE bug 1006919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007944">SUSE bug 1007944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763198">SUSE bug 763198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/771065">SUSE bug 771065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799133">SUSE bug 799133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803320">SUSE bug 803320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839104">SUSE bug 839104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843236">SUSE bug 843236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860441">SUSE bug 860441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863873">SUSE bug 863873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865783">SUSE bug 865783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871728">SUSE bug 871728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907611">SUSE bug 907611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908458">SUSE bug 908458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908684">SUSE bug 908684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909077">SUSE bug 909077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909350">SUSE bug 909350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909484">SUSE bug 909484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909618">SUSE bug 909618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909994">SUSE bug 909994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911687">SUSE bug 911687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915183">SUSE bug 915183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920016">SUSE bug 920016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922634">SUSE bug 922634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922947">SUSE bug 922947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928138">SUSE bug 928138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929141">SUSE bug 929141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934760">SUSE bug 934760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951392">SUSE bug 951392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956514">SUSE bug 956514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960689">SUSE bug 960689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963655">SUSE bug 963655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967716">SUSE bug 967716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968010">SUSE bug 968010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968014">SUSE bug 968014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971975">SUSE bug 971975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971989">SUSE bug 971989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973203">SUSE bug 973203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974620">SUSE bug 974620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976867">SUSE bug 976867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977687">SUSE bug 977687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979514">SUSE bug 979514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979595">SUSE bug 979595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979681">SUSE bug 979681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980371">SUSE bug 980371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982218">SUSE bug 982218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982783">SUSE bug 982783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983535">SUSE bug 983535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983619">SUSE bug 983619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984102">SUSE bug 984102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984194">SUSE bug 984194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984992">SUSE bug 984992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985206">SUSE bug 985206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986337">SUSE bug 986337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986365">SUSE bug 986365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986445">SUSE bug 986445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987565">SUSE bug 987565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988440">SUSE bug 988440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989152">SUSE bug 989152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989261">SUSE bug 989261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989764">SUSE bug 989764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989779">SUSE bug 989779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991608">SUSE bug 991608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991665">SUSE bug 991665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991923">SUSE bug 991923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992566">SUSE bug 992566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993127">SUSE bug 993127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993890">SUSE bug 993890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993891">SUSE bug 993891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994296">SUSE bug 994296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994436">SUSE bug 994436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994618">SUSE bug 994618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994759">SUSE bug 994759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994926">SUSE bug 994926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995968">SUSE bug 995968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996329">SUSE bug 996329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996664">SUSE bug 996664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997708">SUSE bug 997708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998399">SUSE bug 998399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998689">SUSE bug 998689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999584">SUSE bug 999584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999600">SUSE bug 999600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999907">SUSE bug 999907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999932">SUSE bug 999932</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4312/">CVE-2013-4312 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4312">CVE-2013-4312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7513/">CVE-2015-7513 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7513">CVE-2015-7513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8956/">CVE-2015-8956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8956">CVE-2015-8956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0823/">CVE-2016-0823 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0823">CVE-2016-0823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3841/">CVE-2016-3841 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3841">CVE-2016-3841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4997">CVE-2016-4997 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5696/">CVE-2016-5696 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5696">CVE-2016-5696 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6480/">CVE-2016-6480 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6480">CVE-2016-6480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6828/">CVE-2016-6828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6828">CVE-2016-6828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7042/">CVE-2016-7042 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7042">CVE-2016-7042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7097/">CVE-2016-7097 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7097">CVE-2016-7097 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7117/">CVE-2016-7117 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7117">CVE-2016-7117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7425/">CVE-2016-7425 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7425">CVE-2016-7425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582949" comment="kernel-bigmem-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582950" comment="kernel-bigmem-base-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582952" comment="kernel-default-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582953" comment="kernel-default-base-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582955" comment="kernel-default-man-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582956" comment="kernel-ec2-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582957" comment="kernel-ec2-base-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582959" comment="kernel-pae-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582960" comment="kernel-pae-base-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582962" comment="kernel-ppc64-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582963" comment="kernel-ppc64-base-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582965" comment="kernel-source-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582966" comment="kernel-syms-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582967" comment="kernel-trace-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582968" comment="kernel-trace-base-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582970" comment="kernel-xen-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582971" comment="kernel-xen-base-3.0.101-88.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582949" comment="kernel-bigmem-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582950" comment="kernel-bigmem-base-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582952" comment="kernel-default-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582953" comment="kernel-default-base-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582955" comment="kernel-default-man-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582956" comment="kernel-ec2-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582957" comment="kernel-ec2-base-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582959" comment="kernel-pae-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582960" comment="kernel-pae-base-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582962" comment="kernel-ppc64-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582963" comment="kernel-ppc64-base-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582965" comment="kernel-source-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582966" comment="kernel-syms-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582967" comment="kernel-trace-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582968" comment="kernel-trace-base-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582970" comment="kernel-xen-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582971" comment="kernel-xen-base-3.0.101-88.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220030" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1003813" ref_url="https://bugzilla.suse.com/1003813" source="BUGZILLA"/>
		<reference ref_id="1005877" ref_url="https://bugzilla.suse.com/1005877" source="BUGZILLA"/>
		<reference ref_id="1007615" ref_url="https://bugzilla.suse.com/1007615" source="BUGZILLA"/>
		<reference ref_id="1008557" ref_url="https://bugzilla.suse.com/1008557" source="BUGZILLA"/>
		<reference ref_id="1008645" ref_url="https://bugzilla.suse.com/1008645" source="BUGZILLA"/>
		<reference ref_id="1008831" ref_url="https://bugzilla.suse.com/1008831" source="BUGZILLA"/>
		<reference ref_id="1008833" ref_url="https://bugzilla.suse.com/1008833" source="BUGZILLA"/>
		<reference ref_id="1008893" ref_url="https://bugzilla.suse.com/1008893" source="BUGZILLA"/>
		<reference ref_id="1009875" ref_url="https://bugzilla.suse.com/1009875" source="BUGZILLA"/>
		<reference ref_id="1010150" ref_url="https://bugzilla.suse.com/1010150" source="BUGZILLA"/>
		<reference ref_id="1010175" ref_url="https://bugzilla.suse.com/1010175" source="BUGZILLA"/>
		<reference ref_id="1010201" ref_url="https://bugzilla.suse.com/1010201" source="BUGZILLA"/>
		<reference ref_id="1010467" ref_url="https://bugzilla.suse.com/1010467" source="BUGZILLA"/>
		<reference ref_id="1010501" ref_url="https://bugzilla.suse.com/1010501" source="BUGZILLA"/>
		<reference ref_id="1010507" ref_url="https://bugzilla.suse.com/1010507" source="BUGZILLA"/>
		<reference ref_id="1010711" ref_url="https://bugzilla.suse.com/1010711" source="BUGZILLA"/>
		<reference ref_id="1010713" ref_url="https://bugzilla.suse.com/1010713" source="BUGZILLA"/>
		<reference ref_id="1010716" ref_url="https://bugzilla.suse.com/1010716" source="BUGZILLA"/>
		<reference ref_id="1011685" ref_url="https://bugzilla.suse.com/1011685" source="BUGZILLA"/>
		<reference ref_id="1011820" ref_url="https://bugzilla.suse.com/1011820" source="BUGZILLA"/>
		<reference ref_id="1012183" ref_url="https://bugzilla.suse.com/1012183" source="BUGZILLA"/>
		<reference ref_id="1012411" ref_url="https://bugzilla.suse.com/1012411" source="BUGZILLA"/>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1012832" ref_url="https://bugzilla.suse.com/1012832" source="BUGZILLA"/>
		<reference ref_id="1012851" ref_url="https://bugzilla.suse.com/1012851" source="BUGZILLA"/>
		<reference ref_id="1012852" ref_url="https://bugzilla.suse.com/1012852" source="BUGZILLA"/>
		<reference ref_id="1012917" ref_url="https://bugzilla.suse.com/1012917" source="BUGZILLA"/>
		<reference ref_id="1013018" ref_url="https://bugzilla.suse.com/1013018" source="BUGZILLA"/>
		<reference ref_id="1013038" ref_url="https://bugzilla.suse.com/1013038" source="BUGZILLA"/>
		<reference ref_id="1013042" ref_url="https://bugzilla.suse.com/1013042" source="BUGZILLA"/>
		<reference ref_id="1013070" ref_url="https://bugzilla.suse.com/1013070" source="BUGZILLA"/>
		<reference ref_id="1013531" ref_url="https://bugzilla.suse.com/1013531" source="BUGZILLA"/>
		<reference ref_id="1013542" ref_url="https://bugzilla.suse.com/1013542" source="BUGZILLA"/>
		<reference ref_id="1014410" ref_url="https://bugzilla.suse.com/1014410" source="BUGZILLA"/>
		<reference ref_id="1014454" ref_url="https://bugzilla.suse.com/1014454" source="BUGZILLA"/>
		<reference ref_id="1014746" ref_url="https://bugzilla.suse.com/1014746" source="BUGZILLA"/>
		<reference ref_id="1015561" ref_url="https://bugzilla.suse.com/1015561" source="BUGZILLA"/>
		<reference ref_id="1015752" ref_url="https://bugzilla.suse.com/1015752" source="BUGZILLA"/>
		<reference ref_id="1015760" ref_url="https://bugzilla.suse.com/1015760" source="BUGZILLA"/>
		<reference ref_id="1015796" ref_url="https://bugzilla.suse.com/1015796" source="BUGZILLA"/>
		<reference ref_id="1015803" ref_url="https://bugzilla.suse.com/1015803" source="BUGZILLA"/>
		<reference ref_id="1015817" ref_url="https://bugzilla.suse.com/1015817" source="BUGZILLA"/>
		<reference ref_id="1015828" ref_url="https://bugzilla.suse.com/1015828" source="BUGZILLA"/>
		<reference ref_id="1015844" ref_url="https://bugzilla.suse.com/1015844" source="BUGZILLA"/>
		<reference ref_id="1015848" ref_url="https://bugzilla.suse.com/1015848" source="BUGZILLA"/>
		<reference ref_id="1015878" ref_url="https://bugzilla.suse.com/1015878" source="BUGZILLA"/>
		<reference ref_id="1015932" ref_url="https://bugzilla.suse.com/1015932" source="BUGZILLA"/>
		<reference ref_id="1016320" ref_url="https://bugzilla.suse.com/1016320" source="BUGZILLA"/>
		<reference ref_id="1016505" ref_url="https://bugzilla.suse.com/1016505" source="BUGZILLA"/>
		<reference ref_id="1016520" ref_url="https://bugzilla.suse.com/1016520" source="BUGZILLA"/>
		<reference ref_id="1016668" ref_url="https://bugzilla.suse.com/1016668" source="BUGZILLA"/>
		<reference ref_id="1016688" ref_url="https://bugzilla.suse.com/1016688" source="BUGZILLA"/>
		<reference ref_id="1016824" ref_url="https://bugzilla.suse.com/1016824" source="BUGZILLA"/>
		<reference ref_id="1016831" ref_url="https://bugzilla.suse.com/1016831" source="BUGZILLA"/>
		<reference ref_id="1017686" ref_url="https://bugzilla.suse.com/1017686" source="BUGZILLA"/>
		<reference ref_id="1017710" ref_url="https://bugzilla.suse.com/1017710" source="BUGZILLA"/>
		<reference ref_id="1019079" ref_url="https://bugzilla.suse.com/1019079" source="BUGZILLA"/>
		<reference ref_id="1019148" ref_url="https://bugzilla.suse.com/1019148" source="BUGZILLA"/>
		<reference ref_id="1019165" ref_url="https://bugzilla.suse.com/1019165" source="BUGZILLA"/>
		<reference ref_id="1019348" ref_url="https://bugzilla.suse.com/1019348" source="BUGZILLA"/>
		<reference ref_id="1019783" ref_url="https://bugzilla.suse.com/1019783" source="BUGZILLA"/>
		<reference ref_id="1020214" ref_url="https://bugzilla.suse.com/1020214" source="BUGZILLA"/>
		<reference ref_id="1021258" ref_url="https://bugzilla.suse.com/1021258" source="BUGZILLA"/>
		<reference ref_id="748806" ref_url="https://bugzilla.suse.com/748806" source="BUGZILLA"/>
		<reference ref_id="786036" ref_url="https://bugzilla.suse.com/786036" source="BUGZILLA"/>
		<reference ref_id="790588" ref_url="https://bugzilla.suse.com/790588" source="BUGZILLA"/>
		<reference ref_id="795297" ref_url="https://bugzilla.suse.com/795297" source="BUGZILLA"/>
		<reference ref_id="800999" ref_url="https://bugzilla.suse.com/800999" source="BUGZILLA"/>
		<reference ref_id="821612" ref_url="https://bugzilla.suse.com/821612" source="BUGZILLA"/>
		<reference ref_id="824171" ref_url="https://bugzilla.suse.com/824171" source="BUGZILLA"/>
		<reference ref_id="851603" ref_url="https://bugzilla.suse.com/851603" source="BUGZILLA"/>
		<reference ref_id="853052" ref_url="https://bugzilla.suse.com/853052" source="BUGZILLA"/>
		<reference ref_id="871728" ref_url="https://bugzilla.suse.com/871728" source="BUGZILLA"/>
		<reference ref_id="901809" ref_url="https://bugzilla.suse.com/901809" source="BUGZILLA"/>
		<reference ref_id="909350" ref_url="https://bugzilla.suse.com/909350" source="BUGZILLA"/>
		<reference ref_id="909491" ref_url="https://bugzilla.suse.com/909491" source="BUGZILLA"/>
		<reference ref_id="913387" ref_url="https://bugzilla.suse.com/913387" source="BUGZILLA"/>
		<reference ref_id="914939" ref_url="https://bugzilla.suse.com/914939" source="BUGZILLA"/>
		<reference ref_id="919382" ref_url="https://bugzilla.suse.com/919382" source="BUGZILLA"/>
		<reference ref_id="924708" ref_url="https://bugzilla.suse.com/924708" source="BUGZILLA"/>
		<reference ref_id="925065" ref_url="https://bugzilla.suse.com/925065" source="BUGZILLA"/>
		<reference ref_id="953233" ref_url="https://bugzilla.suse.com/953233" source="BUGZILLA"/>
		<reference ref_id="961589" ref_url="https://bugzilla.suse.com/961589" source="BUGZILLA"/>
		<reference ref_id="962846" ref_url="https://bugzilla.suse.com/962846" source="BUGZILLA"/>
		<reference ref_id="969340" ref_url="https://bugzilla.suse.com/969340" source="BUGZILLA"/>
		<reference ref_id="973691" ref_url="https://bugzilla.suse.com/973691" source="BUGZILLA"/>
		<reference ref_id="987333" ref_url="https://bugzilla.suse.com/987333" source="BUGZILLA"/>
		<reference ref_id="987576" ref_url="https://bugzilla.suse.com/987576" source="BUGZILLA"/>
		<reference ref_id="989152" ref_url="https://bugzilla.suse.com/989152" source="BUGZILLA"/>
		<reference ref_id="989680" ref_url="https://bugzilla.suse.com/989680" source="BUGZILLA"/>
		<reference ref_id="989896" ref_url="https://bugzilla.suse.com/989896" source="BUGZILLA"/>
		<reference ref_id="990245" ref_url="https://bugzilla.suse.com/990245" source="BUGZILLA"/>
		<reference ref_id="992991" ref_url="https://bugzilla.suse.com/992991" source="BUGZILLA"/>
		<reference ref_id="993739" ref_url="https://bugzilla.suse.com/993739" source="BUGZILLA"/>
		<reference ref_id="993832" ref_url="https://bugzilla.suse.com/993832" source="BUGZILLA"/>
		<reference ref_id="996541" ref_url="https://bugzilla.suse.com/996541" source="BUGZILLA"/>
		<reference ref_id="996557" ref_url="https://bugzilla.suse.com/996557" source="BUGZILLA"/>
		<reference ref_id="997401" ref_url="https://bugzilla.suse.com/997401" source="BUGZILLA"/>
		<reference ref_id="999101" ref_url="https://bugzilla.suse.com/999101" source="BUGZILLA"/>
		<reference ref_id="CVE-2004-0230" ref_url="https://www.suse.com/security/cve/CVE-2004-0230/" source="CVE"/>
		<reference ref_id="CVE-2012-6704" ref_url="https://www.suse.com/security/cve/CVE-2012-6704/" source="CVE"/>
		<reference ref_id="CVE-2013-6368" ref_url="https://www.suse.com/security/cve/CVE-2013-6368/" source="CVE"/>
		<reference ref_id="CVE-2015-1350" ref_url="https://www.suse.com/security/cve/CVE-2015-1350/" source="CVE"/>
		<reference ref_id="CVE-2015-8962" ref_url="https://www.suse.com/security/cve/CVE-2015-8962/" source="CVE"/>
		<reference ref_id="CVE-2015-8964" ref_url="https://www.suse.com/security/cve/CVE-2015-8964/" source="CVE"/>
		<reference ref_id="CVE-2016-10088" ref_url="https://www.suse.com/security/cve/CVE-2016-10088/" source="CVE"/>
		<reference ref_id="CVE-2016-5696" ref_url="https://www.suse.com/security/cve/CVE-2016-5696/" source="CVE"/>
		<reference ref_id="CVE-2016-7910" ref_url="https://www.suse.com/security/cve/CVE-2016-7910/" source="CVE"/>
		<reference ref_id="CVE-2016-7911" ref_url="https://www.suse.com/security/cve/CVE-2016-7911/" source="CVE"/>
		<reference ref_id="CVE-2016-7916" ref_url="https://www.suse.com/security/cve/CVE-2016-7916/" source="CVE"/>
		<reference ref_id="CVE-2016-8399" ref_url="https://www.suse.com/security/cve/CVE-2016-8399/" source="CVE"/>
		<reference ref_id="CVE-2016-8632" ref_url="https://www.suse.com/security/cve/CVE-2016-8632/" source="CVE"/>
		<reference ref_id="CVE-2016-8633" ref_url="https://www.suse.com/security/cve/CVE-2016-8633/" source="CVE"/>
		<reference ref_id="CVE-2016-8646" ref_url="https://www.suse.com/security/cve/CVE-2016-8646/" source="CVE"/>
		<reference ref_id="CVE-2016-9555" ref_url="https://www.suse.com/security/cve/CVE-2016-9555/" source="CVE"/>
		<reference ref_id="CVE-2016-9685" ref_url="https://www.suse.com/security/cve/CVE-2016-9685/" source="CVE"/>
		<reference ref_id="CVE-2016-9756" ref_url="https://www.suse.com/security/cve/CVE-2016-9756/" source="CVE"/>
		<reference ref_id="CVE-2016-9793" ref_url="https://www.suse.com/security/cve/CVE-2016-9793/" source="CVE"/>
		<reference ref_id="CVE-2017-5551" ref_url="https://www.suse.com/security/cve/CVE-2017-5551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002637.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to 3.0.101-94 to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2017-5551: tmpfs: clear S_ISGID when setting posix ACLs (bsc#1021258).
- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations
  where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations
  or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device
  NOTE: this vulnerability existed because of an incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2016-5696: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers
  and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST
  packet, especially in protocols that use long-lived connections, such as BGP (bnc#989152).
- CVE-2015-1350: The VFS subsystem in the Linux kernel 3.x provided an incomplete set of requirements for setattr
  operations that underspecified removing extended privilege attributes, which allowed local users to cause a denial
  of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove
  a capability from the ping or Wireshark dumpcap program (bnc#914939).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship
  between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or
  cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability
  (bnc#1008831).
- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could enable a local
  malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate
  because it first requires compromising a privileged process and current compiler optimizations restrict access to the
  vulnerable code. (bnc#1014746).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of
  sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash)
  or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system
  call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).
- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of
  sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash)
  or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system
  call with the (1) SO_SNDBUF or (2) SO_RCVBUF option (bnc#1013542).
- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain
  error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted
  application (bnc#1013038).
- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel allowed local users
  to cause a denial of service (memory consumption) via crafted XFS filesystem operations (bnc#1012832).
- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel
  allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching
  a device during an SG_IO ioctl call (bnc#1010501).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacked chunk-length checking
  for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or
  possibly have unspecified other impact via crafted SCTP data (bnc#1011685).
- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel
  allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the
  corresponding start operation had failed (bnc#1010716).
- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local
  users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call
  (bnc#1010711).
- CVE-2013-6368: The KVM subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of
  service (system crash) via a VAPIC synchronization operation involving a page-end address (bnc#853052).
- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users
  to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).
- CVE-2016-7916: Race condition in the environ_read function in fs/proc/base.c in the Linux kernel allowed local users
  to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time
  interval in which environment-variable copying is incomplete (bnc#1010467).
- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux kernel allowed local users to cause a
  denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero
  bytes of data (bnc#1010150).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel, in certain unusual hardware configurations, allowed remote
  attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).

The following non-security bugs were fixed:

- 8250_pci: Fix potential use-after-free in error path (bsc#1013070).
- KABI fix (bsc#1014410).
- apparmor: fix IRQ stack overflow during free_profile (bsc#1009875).
- be2net: Do not leak iomapped memory on removal (bug#925065).
- block_dev: do not test bdev-&gt;bd_contains when it is not stable (bsc#1008557).
- bna: Add synchronization for tx ring (bsc#993739).
- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).
- crypto: add ghash-generic in the supported.conf(bsc#1016824)
- crypto: aesni - Add support for 192 &amp; 256 bit keys to AESNI RFC4106 (bsc#913387).
- dm: do not call dm_sync_table() when creating new devices (bnc#901809).
- drm/mgag200: Added support for the new deviceID for G200eW3 (bnc#1019348)
- ext3: Avoid premature failure of ext3_has_free_blocks() (bsc#1016668).
- ext4: do not leave i_crtime.tv_sec uninitialized (bsc#1013018).
- ext4: fix reference counting bug on block allocation error (bsc#1013018).
- futex: Acknowledge a new waiter in counter before plist (bsc#851603).
- futex: Drop refcount if requeue_pi() acquired the rtmutex (bsc#851603).
- hpilo: Add support for iLO5 (bsc#999101).
- ibmveth: calculate gso_segs for large packets (bsc#1019165).
- ibmveth: set correct gso_size and gso_type (bsc#1019165).
- igb: Enable SR-IOV configuration via PCI sysfs interface (bsc#909491 FATE#317388).
- igb: Fix NULL assignment to incorrect variable in igb_reset_q_vector (bsc#795297 FATE#313656).
- igb: Fix oops caused by missing queue pairing (bsc#909491 FATE#317388).
- igb: Fix oops on changing number of rings (bsc#909491 FATE#317388).
- igb: Remove unnecessary flag setting in igb_set_flag_queue_pairs() (bsc#909491 FATE#317388).
- igb: Unpair the queues when changing the number of queues (bsc#909491 FATE#317388).
- kexec: add a kexec_crash_loaded() function (bsc#973691).
- kvm: APIC: avoid instruction emulation for EOI writes (bsc#989680).
- kvm: Distangle eventfd code from irqchip (bsc#989680).
- kvm: Iterate over only vcpus that are preempted (bsc#989680).
- kvm: Record the preemption status of vcpus using preempt notifiers (bsc#989680).
- kvm: VMX: Pass vcpu to __vmx_complete_interrupts (bsc#989680).
- kvm: fold kvm_pit_timer into kvm_kpit_state (bsc#989680).
- kvm: make processes waiting on vcpu mutex killable (bsc#989680).
- kvm: nVMX: Add preemption timer support (bsc#989680).
- kvm: remove a wrong hack of delivery PIT intr to vcpu0 (bsc#989680).
- kvm: use symbolic constant for nr interrupts (bsc#989680).
- kvm: x86: Remove support for reporting coalesced APIC IRQs (bsc#989680).
- kvm: x86: Run PIT work in own kthread (bsc#989680).
- kvm: x86: limit difference between kvmclock updates (bsc#989680).
- libata: introduce ata_host-&gt;n_tags to avoid oops on SAS controllers (bsc#871728).
- libata: remove n_tags to avoid kABI breakage (bsc#871728).
- libfc: Do not take rdata-&gt;rp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).
- libfc: Fixup disc_mutex handling (bsc#962846).
- libfc: Issue PRLI after a PRLO has been received (bsc#962846).
- libfc: Revisit kref handling (bnc#990245).
- libfc: Update rport reference counting (bsc#953233).
- libfc: do not send ABTS when resetting exchanges (bsc#962846).
- libfc: fixup locking of ptp_setup() (bsc#962846).
- libfc: reset exchange manager during LOGO handling (bsc#962846).
- libfc: send LOGO for PLOGI failure (bsc#962846).
- locking/mutex: Explicitly mark task as running after wakeup (bsc#1012411).
- memstick: mspro_block: add missing curly braces (bsc#1016688).
- mlx4: Fix error flow when sending mads under SRIOV (bsc#786036 FATE#314304).
- mlx4: Fix incorrect MC join state bit-masking on SR-IOV (bsc#786036 FATE#314304).
- mlx4: Fix memory leak if QP creation failed (bsc#786036 FATE#314304).
- mlx4: Fix potential deadlock when sending mad to wire (bsc#786036 FATE#314304).
- mlx4: Forbid using sysfs to change RoCE pkeys (bsc#786036 FATE#314304).
- mlx4: Use correct subnet-prefix in QP1 mads under SR-IOV (bsc#786036 FATE#314304).
- mlx4: add missing braces in verify_qp_parameters (bsc#786036 FATE#314304).
- mm/memory_hotplug.c: check for missing sections in test_pages_in_a_zone() (bnc#961589).
- mm: fix crashes from mbind() merging vmas (bnc#1005877).
- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).
- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (bsc#1008645).
- net/mlx4: Copy/set only sizeof struct mlx4_eqe bytes (bsc#786036 FATE#314304).
- net/mlx4_core: Allow resetting VF admin mac to zero (bsc#919382 FATE#317529).
- net/mlx4_core: Avoid returning success in case of an error flow (bsc#786036 FATE#314304).
- net/mlx4_core: Do not BUG_ON during reset when PCI is offline (bsc#924708).
- net/mlx4_core: Do not access comm channel if it has not yet been initialized (bsc#924708).
- net/mlx4_core: Fix error message deprecation for ConnectX-2 cards (bsc#919382 FATE#317529).
- net/mlx4_core: Fix the resource-type enum in res tracker to conform to FW spec (bsc#786036 FATE#314304).
- net/mlx4_core: Implement pci_resume callback (bsc#924708).
- net/mlx4_core: Update the HCA core clock frequency after INIT_PORT (bug#919382 FATE#317529).
- net/mlx4_en: Choose time-stamping shift value according to HW frequency (bsc#919382 FATE#317529).
- net/mlx4_en: Fix HW timestamp init issue upon system startup (bsc#919382 FATE#317529).
- net/mlx4_en: Fix potential deadlock in port statistics flow (bsc#786036 FATE#314304).
- net/mlx4_en: Move filters cleanup to a proper location (bsc#786036 FATE#314304).
- net/mlx4_en: Remove dependency between timestamping capability and service_task (bsc#919382 FATE#317529).
- net/mlx4_en: fix spurious timestamping callbacks (bsc#919382 FATE#317529).
- netfront: do not truncate grant references.
- nfsv4: Cap the transport reconnection timer at 1/2 lease period (bsc#1014410).
- nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).
- nfsv4: Handle timeouts correctly when probing for lease validity (bsc#1014410).
- nvme: Automatic namespace rescan (bsc#1017686).
- nvme: Metadata format support (bsc#1017686).
- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).
- posix-timers: Remove remaining uses of tasklist_lock (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock for task clock sample (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock on timer deletion (bnc#997401).
- powerpc/MSI: Fix race condition in tearing down MSI interrupts (bsc#1010201).
- powerpc/mm/hash64: Fix subpage protection with 4K HPTE config (bsc#1010201).
- powerpc/numa: Fix multiple bugs in memory_hotplug_max() (bsc#1010201).
- powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec (bsc#1003813).
- powerpc: fix typo 'CONFIG_PPC_CPU' (bsc#1010201).
- powerpc: scan_features() updates incorrect bits for REAL_LE (bsc#1010201).
- printk/sched: Introduce special printk_sched() for those awkward (bsc#996541).
- ptrace: __ptrace_may_access() should not deny sub-threads (bsc#1012851).
- qlcnic: fix a loop exit condition better (bsc#909350 FATE#317546).
- qlcnic: use the correct ring in qlcnic_83xx_process_rcv_ring_diag() (bnc#800999 FATE#313899).
- reiserfs: fix race in prealloc discard (bsc#987576).
- rpm/constraints.in: Bump ppc64 disk requirements to fix OBS builds again
- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- rt2x00: fix rfkill regression on rt2500pci (bnc#748806).
- s390/zcrypt: kernel: Fix invalid domain response handling (bsc#1016320).
- scsi: Fix erratic device offline during EH (bsc#993832).
- scsi: lpfc: Set elsiocb contexts to NULL after freeing it (bsc#996557).
- scsi: lpfc: avoid double free of resource identifiers (bsc#989896).
- scsi_error: count medium access timeout only once per EH run (bsc#993832).
- scsi_error: fixup crash in scsi_eh_reset (bsc#993832)
- serial: 8250_pci: Detach low-level driver during PCI error recovery (bsc#1013070).
- sunrpc: Enforce an upper limit on the number of cached credentials (bsc#1012917).
- sunrpc: Fix reconnection timeouts (bsc#1014410).
- sunrpc: Fix two issues with drop_caches and the sunrpc auth cache (bsc#1012917).
- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout (bsc#1014410).
- tcp: fix inet6_csk_route_req() for link-local addresses (bsc#1010175).
- tcp: pass fl6 to inet6_csk_route_req() (bsc#1010175).
- tcp: plug dst leak in tcp_v6_conn_request() (bsc#1010175).
- tcp: use inet6_csk_route_req() in tcp_v6_send_synack() (bsc#1010175).
- tg3: Fix temperature reporting (bnc#790588 FATE#313912).
- usb: console: fix potential use after free (bsc#1015817).
- usb: console: fix uninitialised ldisc semaphore (bsc#1015817).
- usb: cp210x: Corrected USB request type definitions (bsc#1015932).
- usb: cp210x: relocate private data from USB interface to port (bsc#1015932).
- usb: cp210x: work around cp2108 GET_LINE_CTL bug (bsc#1015932).
- usb: ftdi_sio: fix null deref at port probe (bsc#1015796).
- usb: ipaq.c: fix a timeout loop (bsc#1015848).
- usb: opticon: fix non-atomic allocation in write path (bsc#1015803).
- usb: option: fix runtime PM handling (bsc#1015752).
- usb: serial: cp210x: add 16-bit register access functions (bsc#1015932).
- usb: serial: cp210x: add 8-bit and 32-bit register access functions (bsc#1015932).
- usb: serial: cp210x: add new access functions for large registers (bsc#1015932).
- usb: serial: cp210x: fix hardware flow-control disable (bsc#1015932).
- usb: serial: fix potential use-after-free after failed probe (bsc#1015828).
- usb: serial: io_edgeport: fix memory leaks in attach error path (bsc#1016505).
- usb: serial: io_edgeport: fix memory leaks in probe error path (bsc#1016505).
- usb: serial: keyspan: fix use-after-free in probe error path (bsc#1016520).
- usb: sierra: fix AA deadlock in open error path (bsc#1015561).
- usb: sierra: fix remote wakeup (bsc#1015561).
- usb: sierra: fix urb and memory leak in resume error path (bsc#1015561).
- usb: sierra: fix urb and memory leak on disconnect (bsc#1015561).
- usb: sierra: fix use after free at suspend/resume (bsc#1015561).
- usb: usb_wwan: fix potential blocked I/O after resume (bsc#1015760).
- usb: usb_wwan: fix race between write and resume (bsc#1015760).
- usb: usb_wwan: fix urb leak at shutdown (bsc#1015760).
- usb: usb_wwan: fix urb leak in write error path (bsc#1015760).
- usb: usb_wwan: fix write and suspend race (bsc#1015760).
- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).
- usblp: do not set TASK_INTERRUPTIBLE before lock (bsc#1015844).
- xenbus: do not invoke is_ready() for most device states (bsc#987333).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-09"/>
	<updated date="2017-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1003813">SUSE bug 1003813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005877">SUSE bug 1005877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007615">SUSE bug 1007615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008557">SUSE bug 1008557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008645">SUSE bug 1008645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008831">SUSE bug 1008831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008833">SUSE bug 1008833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008893">SUSE bug 1008893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009875">SUSE bug 1009875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010150">SUSE bug 1010150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010175">SUSE bug 1010175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010201">SUSE bug 1010201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010467">SUSE bug 1010467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010501">SUSE bug 1010501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010507">SUSE bug 1010507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010711">SUSE bug 1010711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010713">SUSE bug 1010713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010716">SUSE bug 1010716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011685">SUSE bug 1011685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011820">SUSE bug 1011820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012183">SUSE bug 1012183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012411">SUSE bug 1012411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012832">SUSE bug 1012832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012851">SUSE bug 1012851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012852">SUSE bug 1012852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012917">SUSE bug 1012917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013018">SUSE bug 1013018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013038">SUSE bug 1013038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013042">SUSE bug 1013042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013070">SUSE bug 1013070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013531">SUSE bug 1013531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013542">SUSE bug 1013542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014410">SUSE bug 1014410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014454">SUSE bug 1014454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014746">SUSE bug 1014746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015561">SUSE bug 1015561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015752">SUSE bug 1015752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015760">SUSE bug 1015760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015796">SUSE bug 1015796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015803">SUSE bug 1015803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015817">SUSE bug 1015817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015828">SUSE bug 1015828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015844">SUSE bug 1015844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015848">SUSE bug 1015848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015878">SUSE bug 1015878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015932">SUSE bug 1015932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016320">SUSE bug 1016320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016505">SUSE bug 1016505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016520">SUSE bug 1016520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016668">SUSE bug 1016668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016688">SUSE bug 1016688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016824">SUSE bug 1016824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016831">SUSE bug 1016831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017686">SUSE bug 1017686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017710">SUSE bug 1017710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019079">SUSE bug 1019079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019148">SUSE bug 1019148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019165">SUSE bug 1019165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019348">SUSE bug 1019348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019783">SUSE bug 1019783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020214">SUSE bug 1020214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021258">SUSE bug 1021258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748806">SUSE bug 748806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786036">SUSE bug 786036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/790588">SUSE bug 790588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795297">SUSE bug 795297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800999">SUSE bug 800999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821612">SUSE bug 821612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824171">SUSE bug 824171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851603">SUSE bug 851603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853052">SUSE bug 853052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871728">SUSE bug 871728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901809">SUSE bug 901809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909350">SUSE bug 909350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909491">SUSE bug 909491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913387">SUSE bug 913387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914939">SUSE bug 914939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919382">SUSE bug 919382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924708">SUSE bug 924708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925065">SUSE bug 925065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953233">SUSE bug 953233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961589">SUSE bug 961589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962846">SUSE bug 962846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969340">SUSE bug 969340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973691">SUSE bug 973691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987333">SUSE bug 987333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987576">SUSE bug 987576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989152">SUSE bug 989152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989680">SUSE bug 989680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989896">SUSE bug 989896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990245">SUSE bug 990245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993739">SUSE bug 993739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993832">SUSE bug 993832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996541">SUSE bug 996541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996557">SUSE bug 996557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997401">SUSE bug 997401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999101">SUSE bug 999101</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2004-0230/">CVE-2004-0230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-0230">CVE-2004-0230 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6704/">CVE-2012-6704 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6704">CVE-2012-6704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6368/">CVE-2013-6368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6368">CVE-2013-6368 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-1350/">CVE-2015-1350 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1350">CVE-2015-1350 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8962/">CVE-2015-8962 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8962">CVE-2015-8962 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-8964/">CVE-2015-8964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8964">CVE-2015-8964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10088/">CVE-2016-10088 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10088">CVE-2016-10088 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5696/">CVE-2016-5696 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5696">CVE-2016-5696 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7910/">CVE-2016-7910 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7910">CVE-2016-7910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7911/">CVE-2016-7911 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7911">CVE-2016-7911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7916/">CVE-2016-7916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7916">CVE-2016-7916 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8399/">CVE-2016-8399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8399">CVE-2016-8399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8632/">CVE-2016-8632 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8632">CVE-2016-8632 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8633/">CVE-2016-8633 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8633">CVE-2016-8633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8646/">CVE-2016-8646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8646">CVE-2016-8646 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9555/">CVE-2016-9555 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9555">CVE-2016-9555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9685/">CVE-2016-9685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9685">CVE-2016-9685 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9756/">CVE-2016-9756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9756">CVE-2016-9756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9793/">CVE-2016-9793 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9793">CVE-2016-9793 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5551/">CVE-2017-5551 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5551">CVE-2017-5551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582973" comment="kernel-bigmem-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582974" comment="kernel-bigmem-base-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582976" comment="kernel-default-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582977" comment="kernel-default-base-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582979" comment="kernel-default-man-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582980" comment="kernel-ec2-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582981" comment="kernel-ec2-base-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582983" comment="kernel-pae-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582984" comment="kernel-pae-base-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582986" comment="kernel-ppc64-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582987" comment="kernel-ppc64-base-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582989" comment="kernel-source-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582990" comment="kernel-syms-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582991" comment="kernel-trace-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582992" comment="kernel-trace-base-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582994" comment="kernel-xen-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582995" comment="kernel-xen-base-3.0.101-94.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582973" comment="kernel-bigmem-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582974" comment="kernel-bigmem-base-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582976" comment="kernel-default-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582977" comment="kernel-default-base-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582979" comment="kernel-default-man-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582980" comment="kernel-ec2-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582981" comment="kernel-ec2-base-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582983" comment="kernel-pae-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582984" comment="kernel-pae-base-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582986" comment="kernel-ppc64-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582987" comment="kernel-ppc64-base-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582989" comment="kernel-source-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582990" comment="kernel-syms-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582991" comment="kernel-trace-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582992" comment="kernel-trace-base-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582994" comment="kernel-xen-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582995" comment="kernel-xen-base-3.0.101-94.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220031" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027565" ref_url="https://bugzilla.suse.com/1027565" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2636" ref_url="https://www.suse.com/security/cve/CVE-2017-2636/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002779.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to fix the following security bug:

CVE-2017-2636: A race condition in the n_hdlc tty Linux kernel driver (drivers/tty/n_hdlc.c)
could have been exploited to gain a local privilege escalation (bnc#1027565)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-03"/>
	<updated date="2017-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027565">SUSE bug 1027565</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2636/">CVE-2017-2636 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2636">CVE-2017-2636 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582997" comment="kernel-bigmem-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582998" comment="kernel-bigmem-base-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583000" comment="kernel-default-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583001" comment="kernel-default-base-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583003" comment="kernel-default-man-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583004" comment="kernel-ec2-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583005" comment="kernel-ec2-base-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583007" comment="kernel-pae-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583008" comment="kernel-pae-base-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583010" comment="kernel-ppc64-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583011" comment="kernel-ppc64-base-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583013" comment="kernel-source-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583014" comment="kernel-syms-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583015" comment="kernel-trace-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583016" comment="kernel-trace-base-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583018" comment="kernel-xen-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583019" comment="kernel-xen-base-3.0.101-97.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582997" comment="kernel-bigmem-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582998" comment="kernel-bigmem-base-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583000" comment="kernel-default-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583001" comment="kernel-default-base-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583003" comment="kernel-default-man-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583004" comment="kernel-ec2-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583005" comment="kernel-ec2-base-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583007" comment="kernel-pae-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583008" comment="kernel-pae-base-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583010" comment="kernel-ppc64-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583011" comment="kernel-ppc64-base-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583013" comment="kernel-source-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583014" comment="kernel-syms-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583015" comment="kernel-trace-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583016" comment="kernel-trace-base-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583018" comment="kernel-xen-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583019" comment="kernel-xen-base-3.0.101-97.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220032" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1018074" ref_url="https://bugzilla.suse.com/1018074" source="BUGZILLA"/>
		<reference ref_id="1035920" ref_url="https://bugzilla.suse.com/1035920" source="BUGZILLA"/>
		<reference ref_id="1039348" ref_url="https://bugzilla.suse.com/1039348" source="BUGZILLA"/>
		<reference ref_id="1042921" ref_url="https://bugzilla.suse.com/1042921" source="BUGZILLA"/>
		<reference ref_id="1043234" ref_url="https://bugzilla.suse.com/1043234" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000364" ref_url="https://www.suse.com/security/cve/CVE-2017-1000364/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002967.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2017-1000364: The default stack guard page was too small and could be
  'jumped over' by userland programs using more than one page of stack in
  functions and so lead to memory corruption. This update extends the stack
  guard page to 1 MB (for 4k pages) and 16 MB (for 64k pages) to reduce this
  attack vector. This is not a kernel bugfix, but a hardening measure against
  this kind of userland attack.(bsc#1039348)

The following non-security bugs were fixed:

- fnic now returns 'DID_IMM_RETRY' if rport is not ready (bsc#1035920).
- fnic is now using rport-&gt;dd_data to check if rport is online instead of rport_lookup (bsc#1035920).
- The rport check location in fnic_queuecommand_lck was corrected (bsc#1035920).
- xfs: remove patches that caused regression (bsc#1043234).
- mm: enlarge stack guard gap (bnc#1039348, CVE-2017-1000364, bnc#1042921).
- PCI: Allow access to VPD attributes with size 0 (bsc#1018074).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-20"/>
	<updated date="2017-06-20"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1018074">SUSE bug 1018074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035920">SUSE bug 1035920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042921">SUSE bug 1042921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043234">SUSE bug 1043234</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000364/">CVE-2017-1000364 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000364">CVE-2017-1000364 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583021" comment="kernel-bigmem-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583022" comment="kernel-bigmem-base-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583024" comment="kernel-default-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583025" comment="kernel-default-base-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583027" comment="kernel-default-man-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583028" comment="kernel-ec2-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583029" comment="kernel-ec2-base-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583031" comment="kernel-pae-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583032" comment="kernel-pae-base-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583034" comment="kernel-ppc64-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583035" comment="kernel-ppc64-base-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583037" comment="kernel-source-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583038" comment="kernel-syms-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583039" comment="kernel-trace-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583040" comment="kernel-trace-base-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583042" comment="kernel-xen-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583043" comment="kernel-xen-base-3.0.101-104.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583021" comment="kernel-bigmem-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583022" comment="kernel-bigmem-base-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583024" comment="kernel-default-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583025" comment="kernel-default-base-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583027" comment="kernel-default-man-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583028" comment="kernel-ec2-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583029" comment="kernel-ec2-base-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583031" comment="kernel-pae-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583032" comment="kernel-pae-base-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583034" comment="kernel-ppc64-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583035" comment="kernel-ppc64-base-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583037" comment="kernel-source-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583038" comment="kernel-syms-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583039" comment="kernel-trace-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583040" comment="kernel-trace-base-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583042" comment="kernel-xen-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583043" comment="kernel-xen-base-3.0.101-104.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220033" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1000365" ref_url="https://bugzilla.suse.com/1000365" source="BUGZILLA"/>
		<reference ref_id="1000380" ref_url="https://bugzilla.suse.com/1000380" source="BUGZILLA"/>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1013018" ref_url="https://bugzilla.suse.com/1013018" source="BUGZILLA"/>
		<reference ref_id="1015452" ref_url="https://bugzilla.suse.com/1015452" source="BUGZILLA"/>
		<reference ref_id="1023051" ref_url="https://bugzilla.suse.com/1023051" source="BUGZILLA"/>
		<reference ref_id="1029140" ref_url="https://bugzilla.suse.com/1029140" source="BUGZILLA"/>
		<reference ref_id="1029850" ref_url="https://bugzilla.suse.com/1029850" source="BUGZILLA"/>
		<reference ref_id="1030552" ref_url="https://bugzilla.suse.com/1030552" source="BUGZILLA"/>
		<reference ref_id="1030593" ref_url="https://bugzilla.suse.com/1030593" source="BUGZILLA"/>
		<reference ref_id="1030814" ref_url="https://bugzilla.suse.com/1030814" source="BUGZILLA"/>
		<reference ref_id="1032340" ref_url="https://bugzilla.suse.com/1032340" source="BUGZILLA"/>
		<reference ref_id="1032471" ref_url="https://bugzilla.suse.com/1032471" source="BUGZILLA"/>
		<reference ref_id="1034026" ref_url="https://bugzilla.suse.com/1034026" source="BUGZILLA"/>
		<reference ref_id="1034670" ref_url="https://bugzilla.suse.com/1034670" source="BUGZILLA"/>
		<reference ref_id="1035576" ref_url="https://bugzilla.suse.com/1035576" source="BUGZILLA"/>
		<reference ref_id="1035721" ref_url="https://bugzilla.suse.com/1035721" source="BUGZILLA"/>
		<reference ref_id="1035777" ref_url="https://bugzilla.suse.com/1035777" source="BUGZILLA"/>
		<reference ref_id="1035920" ref_url="https://bugzilla.suse.com/1035920" source="BUGZILLA"/>
		<reference ref_id="1036056" ref_url="https://bugzilla.suse.com/1036056" source="BUGZILLA"/>
		<reference ref_id="1036288" ref_url="https://bugzilla.suse.com/1036288" source="BUGZILLA"/>
		<reference ref_id="1036629" ref_url="https://bugzilla.suse.com/1036629" source="BUGZILLA"/>
		<reference ref_id="1037191" ref_url="https://bugzilla.suse.com/1037191" source="BUGZILLA"/>
		<reference ref_id="1037193" ref_url="https://bugzilla.suse.com/1037193" source="BUGZILLA"/>
		<reference ref_id="1037227" ref_url="https://bugzilla.suse.com/1037227" source="BUGZILLA"/>
		<reference ref_id="1037232" ref_url="https://bugzilla.suse.com/1037232" source="BUGZILLA"/>
		<reference ref_id="1037233" ref_url="https://bugzilla.suse.com/1037233" source="BUGZILLA"/>
		<reference ref_id="1037356" ref_url="https://bugzilla.suse.com/1037356" source="BUGZILLA"/>
		<reference ref_id="1037358" ref_url="https://bugzilla.suse.com/1037358" source="BUGZILLA"/>
		<reference ref_id="1037359" ref_url="https://bugzilla.suse.com/1037359" source="BUGZILLA"/>
		<reference ref_id="1037441" ref_url="https://bugzilla.suse.com/1037441" source="BUGZILLA"/>
		<reference ref_id="1038544" ref_url="https://bugzilla.suse.com/1038544" source="BUGZILLA"/>
		<reference ref_id="1038879" ref_url="https://bugzilla.suse.com/1038879" source="BUGZILLA"/>
		<reference ref_id="1038981" ref_url="https://bugzilla.suse.com/1038981" source="BUGZILLA"/>
		<reference ref_id="1038982" ref_url="https://bugzilla.suse.com/1038982" source="BUGZILLA"/>
		<reference ref_id="1039258" ref_url="https://bugzilla.suse.com/1039258" source="BUGZILLA"/>
		<reference ref_id="1039354" ref_url="https://bugzilla.suse.com/1039354" source="BUGZILLA"/>
		<reference ref_id="1039456" ref_url="https://bugzilla.suse.com/1039456" source="BUGZILLA"/>
		<reference ref_id="1039594" ref_url="https://bugzilla.suse.com/1039594" source="BUGZILLA"/>
		<reference ref_id="1039882" ref_url="https://bugzilla.suse.com/1039882" source="BUGZILLA"/>
		<reference ref_id="1039883" ref_url="https://bugzilla.suse.com/1039883" source="BUGZILLA"/>
		<reference ref_id="1039885" ref_url="https://bugzilla.suse.com/1039885" source="BUGZILLA"/>
		<reference ref_id="1040069" ref_url="https://bugzilla.suse.com/1040069" source="BUGZILLA"/>
		<reference ref_id="1040351" ref_url="https://bugzilla.suse.com/1040351" source="BUGZILLA"/>
		<reference ref_id="1041160" ref_url="https://bugzilla.suse.com/1041160" source="BUGZILLA"/>
		<reference ref_id="1041431" ref_url="https://bugzilla.suse.com/1041431" source="BUGZILLA"/>
		<reference ref_id="1041762" ref_url="https://bugzilla.suse.com/1041762" source="BUGZILLA"/>
		<reference ref_id="1041975" ref_url="https://bugzilla.suse.com/1041975" source="BUGZILLA"/>
		<reference ref_id="1042045" ref_url="https://bugzilla.suse.com/1042045" source="BUGZILLA"/>
		<reference ref_id="1042615" ref_url="https://bugzilla.suse.com/1042615" source="BUGZILLA"/>
		<reference ref_id="1042633" ref_url="https://bugzilla.suse.com/1042633" source="BUGZILLA"/>
		<reference ref_id="1042687" ref_url="https://bugzilla.suse.com/1042687" source="BUGZILLA"/>
		<reference ref_id="1042832" ref_url="https://bugzilla.suse.com/1042832" source="BUGZILLA"/>
		<reference ref_id="1042863" ref_url="https://bugzilla.suse.com/1042863" source="BUGZILLA"/>
		<reference ref_id="1043014" ref_url="https://bugzilla.suse.com/1043014" source="BUGZILLA"/>
		<reference ref_id="1043234" ref_url="https://bugzilla.suse.com/1043234" source="BUGZILLA"/>
		<reference ref_id="1043935" ref_url="https://bugzilla.suse.com/1043935" source="BUGZILLA"/>
		<reference ref_id="1044015" ref_url="https://bugzilla.suse.com/1044015" source="BUGZILLA"/>
		<reference ref_id="1044125" ref_url="https://bugzilla.suse.com/1044125" source="BUGZILLA"/>
		<reference ref_id="1044216" ref_url="https://bugzilla.suse.com/1044216" source="BUGZILLA"/>
		<reference ref_id="1044230" ref_url="https://bugzilla.suse.com/1044230" source="BUGZILLA"/>
		<reference ref_id="1044854" ref_url="https://bugzilla.suse.com/1044854" source="BUGZILLA"/>
		<reference ref_id="1044882" ref_url="https://bugzilla.suse.com/1044882" source="BUGZILLA"/>
		<reference ref_id="1044913" ref_url="https://bugzilla.suse.com/1044913" source="BUGZILLA"/>
		<reference ref_id="1045154" ref_url="https://bugzilla.suse.com/1045154" source="BUGZILLA"/>
		<reference ref_id="1045356" ref_url="https://bugzilla.suse.com/1045356" source="BUGZILLA"/>
		<reference ref_id="1045416" ref_url="https://bugzilla.suse.com/1045416" source="BUGZILLA"/>
		<reference ref_id="1045479" ref_url="https://bugzilla.suse.com/1045479" source="BUGZILLA"/>
		<reference ref_id="1045487" ref_url="https://bugzilla.suse.com/1045487" source="BUGZILLA"/>
		<reference ref_id="1045525" ref_url="https://bugzilla.suse.com/1045525" source="BUGZILLA"/>
		<reference ref_id="1045538" ref_url="https://bugzilla.suse.com/1045538" source="BUGZILLA"/>
		<reference ref_id="1045547" ref_url="https://bugzilla.suse.com/1045547" source="BUGZILLA"/>
		<reference ref_id="1045615" ref_url="https://bugzilla.suse.com/1045615" source="BUGZILLA"/>
		<reference ref_id="1046107" ref_url="https://bugzilla.suse.com/1046107" source="BUGZILLA"/>
		<reference ref_id="1046192" ref_url="https://bugzilla.suse.com/1046192" source="BUGZILLA"/>
		<reference ref_id="1046715" ref_url="https://bugzilla.suse.com/1046715" source="BUGZILLA"/>
		<reference ref_id="1047027" ref_url="https://bugzilla.suse.com/1047027" source="BUGZILLA"/>
		<reference ref_id="1047053" ref_url="https://bugzilla.suse.com/1047053" source="BUGZILLA"/>
		<reference ref_id="1047343" ref_url="https://bugzilla.suse.com/1047343" source="BUGZILLA"/>
		<reference ref_id="1047354" ref_url="https://bugzilla.suse.com/1047354" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1047523" ref_url="https://bugzilla.suse.com/1047523" source="BUGZILLA"/>
		<reference ref_id="1047653" ref_url="https://bugzilla.suse.com/1047653" source="BUGZILLA"/>
		<reference ref_id="1048185" ref_url="https://bugzilla.suse.com/1048185" source="BUGZILLA"/>
		<reference ref_id="1048221" ref_url="https://bugzilla.suse.com/1048221" source="BUGZILLA"/>
		<reference ref_id="1048232" ref_url="https://bugzilla.suse.com/1048232" source="BUGZILLA"/>
		<reference ref_id="1048275" ref_url="https://bugzilla.suse.com/1048275" source="BUGZILLA"/>
		<reference ref_id="1049128" ref_url="https://bugzilla.suse.com/1049128" source="BUGZILLA"/>
		<reference ref_id="1049483" ref_url="https://bugzilla.suse.com/1049483" source="BUGZILLA"/>
		<reference ref_id="1049603" ref_url="https://bugzilla.suse.com/1049603" source="BUGZILLA"/>
		<reference ref_id="1049688" ref_url="https://bugzilla.suse.com/1049688" source="BUGZILLA"/>
		<reference ref_id="1049882" ref_url="https://bugzilla.suse.com/1049882" source="BUGZILLA"/>
		<reference ref_id="1050154" ref_url="https://bugzilla.suse.com/1050154" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1051478" ref_url="https://bugzilla.suse.com/1051478" source="BUGZILLA"/>
		<reference ref_id="1051515" ref_url="https://bugzilla.suse.com/1051515" source="BUGZILLA"/>
		<reference ref_id="1051770" ref_url="https://bugzilla.suse.com/1051770" source="BUGZILLA"/>
		<reference ref_id="1055680" ref_url="https://bugzilla.suse.com/1055680" source="BUGZILLA"/>
		<reference ref_id="784815" ref_url="https://bugzilla.suse.com/784815" source="BUGZILLA"/>
		<reference ref_id="792863" ref_url="https://bugzilla.suse.com/792863" source="BUGZILLA"/>
		<reference ref_id="799133" ref_url="https://bugzilla.suse.com/799133" source="BUGZILLA"/>
		<reference ref_id="909618" ref_url="https://bugzilla.suse.com/909618" source="BUGZILLA"/>
		<reference ref_id="919382" ref_url="https://bugzilla.suse.com/919382" source="BUGZILLA"/>
		<reference ref_id="928138" ref_url="https://bugzilla.suse.com/928138" source="BUGZILLA"/>
		<reference ref_id="938352" ref_url="https://bugzilla.suse.com/938352" source="BUGZILLA"/>
		<reference ref_id="943786" ref_url="https://bugzilla.suse.com/943786" source="BUGZILLA"/>
		<reference ref_id="948562" ref_url="https://bugzilla.suse.com/948562" source="BUGZILLA"/>
		<reference ref_id="962257" ref_url="https://bugzilla.suse.com/962257" source="BUGZILLA"/>
		<reference ref_id="971975" ref_url="https://bugzilla.suse.com/971975" source="BUGZILLA"/>
		<reference ref_id="972891" ref_url="https://bugzilla.suse.com/972891" source="BUGZILLA"/>
		<reference ref_id="986924" ref_url="https://bugzilla.suse.com/986924" source="BUGZILLA"/>
		<reference ref_id="990682" ref_url="https://bugzilla.suse.com/990682" source="BUGZILLA"/>
		<reference ref_id="995542" ref_url="https://bugzilla.suse.com/995542" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9922" ref_url="https://www.suse.com/security/cve/CVE-2014-9922/" source="CVE"/>
		<reference ref_id="CVE-2016-10277" ref_url="https://www.suse.com/security/cve/CVE-2016-10277/" source="CVE"/>
		<reference ref_id="CVE-2017-1000363" ref_url="https://www.suse.com/security/cve/CVE-2017-1000363/" source="CVE"/>
		<reference ref_id="CVE-2017-1000365" ref_url="https://www.suse.com/security/cve/CVE-2017-1000365/" source="CVE"/>
		<reference ref_id="CVE-2017-1000380" ref_url="https://www.suse.com/security/cve/CVE-2017-1000380/" source="CVE"/>
		<reference ref_id="CVE-2017-11176" ref_url="https://www.suse.com/security/cve/CVE-2017-11176/" source="CVE"/>
		<reference ref_id="CVE-2017-11473" ref_url="https://www.suse.com/security/cve/CVE-2017-11473/" source="CVE"/>
		<reference ref_id="CVE-2017-2647" ref_url="https://www.suse.com/security/cve/CVE-2017-2647/" source="CVE"/>
		<reference ref_id="CVE-2017-6951" ref_url="https://www.suse.com/security/cve/CVE-2017-6951/" source="CVE"/>
		<reference ref_id="CVE-2017-7482" ref_url="https://www.suse.com/security/cve/CVE-2017-7482/" source="CVE"/>
		<reference ref_id="CVE-2017-7487" ref_url="https://www.suse.com/security/cve/CVE-2017-7487/" source="CVE"/>
		<reference ref_id="CVE-2017-7533" ref_url="https://www.suse.com/security/cve/CVE-2017-7533/" source="CVE"/>
		<reference ref_id="CVE-2017-7542" ref_url="https://www.suse.com/security/cve/CVE-2017-7542/" source="CVE"/>
		<reference ref_id="CVE-2017-8890" ref_url="https://www.suse.com/security/cve/CVE-2017-8890/" source="CVE"/>
		<reference ref_id="CVE-2017-8924" ref_url="https://www.suse.com/security/cve/CVE-2017-8924/" source="CVE"/>
		<reference ref_id="CVE-2017-8925" ref_url="https://www.suse.com/security/cve/CVE-2017-8925/" source="CVE"/>
		<reference ref_id="CVE-2017-9074" ref_url="https://www.suse.com/security/cve/CVE-2017-9074/" source="CVE"/>
		<reference ref_id="CVE-2017-9075" ref_url="https://www.suse.com/security/cve/CVE-2017-9075/" source="CVE"/>
		<reference ref_id="CVE-2017-9076" ref_url="https://www.suse.com/security/cve/CVE-2017-9076/" source="CVE"/>
		<reference ref_id="CVE-2017-9077" ref_url="https://www.suse.com/security/cve/CVE-2017-9077/" source="CVE"/>
		<reference ref_id="CVE-2017-9242" ref_url="https://www.suse.com/security/cve/CVE-2017-9242/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003193.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-7482: Several missing length checks ticket decode allowing for information leak or potentially code execution (bsc#1046107).
- CVE-2016-10277: Potential privilege escalation due to a missing bounds check in the lp driver. A kernel command-line adversary can overflow the parport_nr array to execute code (bsc#1039456).
- CVE-2017-7542: The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel allowed local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket (bsc#1049882).
- CVE-2017-7533: Bug in inotify code allowing privilege escalation (bsc#1049483).
- CVE-2017-11176: The mq_notify function in the Linux kernel did not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allowed attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact (bsc#1048275).
- CVE-2017-11473: Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel allowed local users to gain privileges via a crafted ACPI table (bnc#1049603).
- CVE-2017-1000365: The Linux Kernel imposed a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but did not take the argument and environment pointers into account, which allowed attackers to bypass this limitation. (bnc#1039354)
- CVE-2014-9922: The eCryptfs subsystem in the Linux kernel allowed local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c (bnc#1032340)
- CVE-2017-8924: The edge_bulk_in_callback function in drivers/usb/serial/io_ti.c in the Linux kernel allowed local users to obtain sensitive information (in the dmesg ringbuffer and syslog) from uninitialized kernel memory by using a crafted USB device (posing as an io_ti USB serial device) to trigger an integer underflow (bnc#1038982).
- CVE-2017-8925: The omninet_open function in drivers/usb/serial/omninet.c in the Linux kernel allowed local users to cause a denial of service (tty exhaustion) by leveraging reference count mishandling (bnc#1038981).
- CVE-2017-1000380: sound/core/timer.c was vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents could have bene disclosed when a read and an ioctl happen at the same time (bnc#1044125)
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c was too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bnc#1041431)
- CVE-2017-1000363: A buffer overflow in kernel commandline handling of the 'lp' parameter could be used by local console attackers to bypass certain secure boot settings. (bnc#1039456)
- CVE-2017-9076: The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039885)
- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1040069)
- CVE-2017-9075: The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039883)
- CVE-2017-9074: The IPv6 fragmentation implementation in the Linux kernel did not consider that the nexthdr field may be associated with an invalid option, which allowed local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls (bnc#1039882)
- CVE-2017-7487: The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel mishandled reference counts, which allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface (bnc#1038879)
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bnc#1038544)
- CVE-2017-2647: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c (bnc#1030593)
- CVE-2017-6951: The keyring_search_aux function in security/keys/keyring.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the 'dead' type (bnc#1029850)

The following non-security bugs were fixed:

- 8250: use callbacks to access UART_DLL/UART_DLM.
- ALSA: ctxfi: Fallback DMA mask to 32bit (bsc#1045538).
- ALSA: hda - Fix regression of HD-audio controller fallback modes (bsc#1045538).
- ALSA: hda - using uninitialized data (bsc#1045538).
- ALSA: hda/realtek - Correction of fixup codes for PB V7900 laptop (bsc#1045538).
- ALSA: hda/realtek - Fix COEF widget NID for ALC260 replacer fixup (bsc#1045538).
- ALSA: off by one bug in snd_riptide_joystick_probe() (bsc#1045538).
- ALSA: seq: Fix snd_seq_call_port_info_ioctl in compat mode (bsc#1045538).
- Add CVE tag to references
- CIFS: backport prepath matching fix (bsc#799133).
- Drop CONFIG_PPC_CELL from bigmem (bsc#1049128).
- EDAC, amd64_edac: Shift wrapping issue in f1x_get_norm_dct_addr().
- Fix scripts/bigmem-generate-ifdef-guard to work on all branches
- Fix soft lockup in svc_rdma_send (bsc#1044854).
- IB/mlx4: Demote mcg message from warning to debug (bsc#919382).
- IB/mlx4: Fix ib device initialization error flow (bsc#919382).
- IB/mlx4: Fix port query for 56Gb Ethernet links (bsc#919382).
- IB/mlx4: Handle well-known-gid in mad_demux processing (bsc#919382).
- IB/mlx4: Reduce SRIOV multicast cleanup warning message to debug level (bsc#919382).
- IB/mlx4: Set traffic class in AH (bsc#919382).
- Implement an ioctl to support the USMTMC-USB488 READ_STATUS_BYTE operation (bsc#1036288).
- Input: cm109 - validate number of endpoints before using them (bsc#1037193).
- Input: hanwang - validate number of endpoints before using them (bsc#1037232).
- Input: yealink - validate number of endpoints before using them (bsc#1037227).
- KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings (bnc#1035576).
- NFS: Avoid getting confused by confused server (bsc#1045416).
- NFS: Fix another OPEN_DOWNGRADE bug (git-next).
- NFS: Fix size of NFSACL SETACL operations (git-fixes).
- NFS: Make nfs_readdir revalidate less often (bsc#1048232).
- NFS: tidy up nfs_show_mountd_netid (git-fixes).
- NFSD: Do not use state id of 0 - it is reserved (bsc#1049688 bsc#1051770).
- NFSv4: Do not call put_rpccred() under the rcu_read_lock() (git-fixes).
- NFSv4: Fix another bug in the close/open_downgrade code (git-fixes).
- NFSv4: Fix problems with close in the presence of a delegation (git-fixes).
- NFSv4: Fix the underestimation of delegation XDR space reservation (git-fixes).
- NFSv4: fix getacl head length estimation (git-fixes).
- PCI: Fix devfn for VPD access through function 0 (bnc#943786 git-fixes).
- Remove superfluous make flags (bsc#1012422)
- Return short read or 0 at end of a raw device, not EIO (bsc#1039594).
- Revert 'math64: New div64_u64_rem helper' (bnc#938352).
- SUNRPC: Fix a memory leak in the backchannel code (git-fixes).
- Staging: vt6655-6: potential NULL dereference in hostap_disable_hostapd() (bsc#1045479).
- USB: class: usbtmc.c: Cleaning up uninitialized variables (bsc#1036288).
- USB: class: usbtmc: do not print error when allocating urb fails (bsc#1036288).
- USB: class: usbtmc: do not print on ENOMEM (bsc#1036288).
- USB: iowarrior: fix NULL-deref in write (bsc#1037359).
- USB: iowarrior: fix info ioctl on big-endian hosts (bsc#1037441).
- USB: r8a66597-hcd: select a different endpoint on timeout (bsc#1047053).
- USB: serial: ark3116: fix register-accessor error handling (git-fixes).
- USB: serial: ch341: fix open error handling (bsc#1037441).
- USB: serial: cp210x: fix tiocmget error handling (bsc#1037441).
- USB: serial: ftdi_sio: fix line-status over-reporting (bsc#1037441).
- USB: serial: io_edgeport: fix epic-descriptor handling (bsc#1037441).
- USB: serial: io_ti: fix information leak in completion handler (git-fixes).
- USB: serial: mos7840: fix another NULL-deref at open (bsc#1034026).
- USB: serial: oti6858: fix NULL-deref at open (bsc#1037441).
- USB: serial: sierra: fix bogus alternate-setting assumption (bsc#1037441).
- USB: serial: spcp8x5: fix NULL-deref at open (bsc#1037441).
- USB: usbip: fix nonconforming hub descriptor (bsc#1047487).
- USB: usbtmc: Add flag rigol_quirk to usbtmc_device_data (bsc#1036288).
- USB: usbtmc: Change magic number to constant (bsc#1036288).
- USB: usbtmc: Set rigol_quirk if device is listed (bsc#1036288).
- USB: usbtmc: TMC request code segregated from usbtmc_read (bsc#1036288).
- USB: usbtmc: add device quirk for Rigol DS6104 (bsc#1036288).
- USB: usbtmc: add missing endpoint sanity check (bsc#1036288).
- USB: usbtmc: fix DMA on stack (bsc#1036288).
- USB: usbtmc: fix big-endian probe of Rigol devices (bsc#1036288).
- USB: usbtmc: fix probe error path (bsc#1036288).
- USB: usbtmc: usbtmc_read sends multiple TMC header based on rigol_quirk (bsc#1036288).
- USB: wusbcore: fix NULL-deref at probe (bsc#1045487).
- Update patches.fixes/nfs-svc-rdma.fix (bsc#1044854).
- Use make --output-sync feature when available (bsc#1012422).
- Xen/PCI-MSI: fix sysfs teardown in DomU (bsc#986924).
- __bitmap_parselist: fix bug in empty string handling (bnc#1042633).
- acpi: Disable APEI error injection if securelevel is set (bsc#972891, bsc#1023051).
- af_key: Add lock to key dump (bsc#1047653).
- af_key: Fix slab-out-of-bounds in pfkey_compile_policy (bsc#1047354).
- ath9k: fix buffer overrun for ar9287 (bsc#1045538).
- blacklist b50a6c584bb4 powerpc/perf: Clear MMCR2 when enabling PMU (bsc#1035721). 
- blacklist.conf: Add a few inapplicable items (bsc#1045538).
- blacklist.conf: Blacklist 847fa1a6d3d0 ('ftrace/x86_32: Set ftrace_stub to weak to prevent gcc from using short jumps to it') The released kernels are not build with a gas new enough to optimize the jmps so that this patch would be required. (bsc#1051478)
- blkback/blktap: do not leak stack data via response ring (bsc#1042863 XSA-216).
- block: do not allow updates through sysfs until registration completes (bsc#1047027).
- block: fix ext_dev_lock lockdep report (bsc#1050154).
- btrfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- cifs: Timeout on SMBNegotiate request (bsc#1044913).
- cifs: do not compare uniqueids in cifs_prime_dcache unless server inode numbers are in use (bsc#1041975). backporting upstream commit 2f2591a34db6c9361faa316c91a6e320cb4e6aee
- cifs: small underflow in cnvrtDosUnixTm() (bsc#1043935).
- cputime: Avoid multiplication overflow on utime scaling (bnc#938352).
- crypto: nx - off by one bug in nx_of_update_msc() (bnc#792863).
- decompress_bunzip2: off by one in get_next_block() (git-fixes).
- dentry name snapshots (bsc#1049483).
- devres: fix a for loop bounds check (git-fixes).
- dm: fix ioctl retry termination with signal (bsc#1050154).
- drm/mgag200: Add support for G200eH3 (bnc#1044216)
- drm/mgag200: Fix to always set HiPri for G200e4 (bsc#1015452, bsc#995542).
- ext2: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ext3: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ext4: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ext4: fix fdatasync(2) after extent manipulation operations (bsc#1013018).
- ext4: keep existing extra fields when inode expands (bsc#1013018).
- fbdev/efifb: Fix 16 color palette entry calculation (bsc#1041762).
- firmware: fix directory creation rule matching with make 3.80 (bsc#1012422).
- firmware: fix directory creation rule matching with make 3.82 (bsc#1012422).
- fixed invalid assignment of 64bit mask to host dma_boundary for scatter gather segment boundary limit (bsc#1042045).
- fnic: Return 'DID_IMM_RETRY' if rport is not ready (bsc#1035920).
- fnic: Using rport-&gt;dd_data to check rport online instead of rport_lookup (bsc#1035920).
- fs/block_dev: always invalidate cleancache in invalidate_bdev() (git-fixes).
- fs/xattr.c: zero out memory copied to userspace in getxattr (bsc#1013018).
- fs: fix data invalidation in the cleancache during direct IO (git-fixes).
- fuse: add missing FR_FORCE (bsc#1013018).
- genirq: Prevent proc race against freeing of irq descriptors (bnc#1044230).
- hrtimer: Allow concurrent hrtimer_start() for self restarting timers (bnc#1013018).
- initial cr0 bits (bnc#1036056, LTC#153612).
- ipmr, ip6mr: fix scheduling while atomic and a deadlock with ipmr_get_route (git-fixes).
- irq: Fix race condition (bsc#1042615).
- isdn/gigaset: fix NULL-deref at probe (bsc#1037356).
- isofs: Do not return EACCES for unknown filesystems (bsc#1013018).
- jsm: add support for additional Neo cards (bsc#1045615).
- kernel-binary.spec: Propagate MAKE_ARGS to %build (bsc#1012422)
- libata: fix sff host state machine locking while polling (bsc#1045525).
- libceph: NULL deref on crush_decode() error path (bsc#1044015).
- libceph: potential NULL dereference in ceph_msg_data_create() (bsc#1051515).
- libfc: fixup locking in fc_disc_stop() (bsc#1029140).
- libfc: move 'pending' and 'requested' setting (bsc#1029140).
- libfc: only restart discovery after timeout if not already running (bsc#1029140).
- locking/rtmutex: Prevent dequeue vs. unlock race (bnc#1013018).
- math64: New div64_u64_rem helper (bnc#938352).
- md/raid0: apply base queue limits *before* disk_stack_limits (git-fixes).
- md/raid1: extend spinlock to protect raid1_end_read_request against inconsistencies (git-fixes).
- md/raid1: fix test for 'was read error from last working device' (git-fixes).
- md/raid5: Fix CPU hotplug callback registration (git-fixes).
- md/raid5: do not record new size if resize_stripes fails (git-fixes).
- md: ensure md devices are freed before module is unloaded (git-fixes).
- md: fix a null dereference (bsc#1040351).
- md: flush -&gt;event_work before stopping array (git-fixes).
- md: make sure GET_ARRAY_INFO ioctl reports correct 'clean' status (git-fixes).
- md: use separate bio_pool for metadata writes (bsc#1040351).
- megaraid_sas: add missing curly braces in ioctl handler (bsc#1050154).
- mlx4: reduce OOM risk on arches with large pages (bsc#919382).
- mm/huge_memory: replace VM_NO_THP VM_BUG_ON with actual VMA check (VM Functionality, bsc#1042832).
- mm/memory-failure.c: use compound_head() flags for huge pages (bnc#971975 VM -- git fixes).
- mm: hugetlb: call huge_pte_alloc() only if ptep is null (VM Functionality, bsc#1042832).
- mmc: core: add missing pm event in mmc_pm_notify to fix hib restore (bsc#1045547).
- mmc: ushc: fix NULL-deref at probe (bsc#1037191).
- module: fix memory leak on early load_module() failures (bsc#1043014).
- mwifiex: printk() overflow with 32-byte SSIDs (bsc#1048185).
- net/mlx4: Fix the check in attaching steering rules (bsc#919382).
- net/mlx4: Fix uninitialized fields in rule when adding promiscuous mode to device managed flow steering (bsc#919382).
- net/mlx4_core: Eliminate warning messages for SRQ_LIMIT under SRIOV (bsc#919382).
- net/mlx4_core: Enhance the MAD_IFC wrapper to convert VF port to physical (bsc#919382).
- net/mlx4_core: Fix VF overwrite of module param which disables DMFS on new probed PFs (bsc#919382).
- net/mlx4_core: Fix when to save some qp context flags for dynamic VST to VGT transitions (bsc#919382).
- net/mlx4_core: Get num_tc using netdev_get_num_tc (bsc#919382).
- net/mlx4_core: Prevent VF from changing port configuration (bsc#919382).
- net/mlx4_core: Use cq quota in SRIOV when creating completion EQs (bsc#919382).
- net/mlx4_core: Use-after-free causes a resource leak in flow-steering detach (bsc#919382).
- net/mlx4_en: Avoid adding steering rules with invalid ring (bsc#919382).
- net/mlx4_en: Change the error print to debug print (bsc#919382).
- net/mlx4_en: Fix type mismatch for 32-bit systems (bsc#919382).
- net/mlx4_en: Resolve dividing by zero in 32-bit system (bsc#919382).
- net/mlx4_en: Wake TX queues only when there's enough room (bsc#1039258).
- net/mlx4_en: fix overflow in mlx4_en_init_timestamp() (bsc#919382).
- net: avoid reference counter overflows on fib_rules in multicast forwarding (git-fixes).
- net: ip6mr: fix static mfc/dev leaks on table destruction (git-fixes).
- net: ipmr: fix static mfc/dev leaks on table destruction (git-fixes).
- net: wimax/i2400m: fix NULL-deref at probe (bsc#1037358).
- netxen_nic: set rcode to the return status from the call to netxen_issue_cmd (bnc#784815).
- nfs: fix nfs_size_to_loff_t (git-fixes).
- nfsd4: minor NFSv2/v3 write decoding cleanup (bsc#1034670).
- nfsd: check for oversized NFSv2/v3 arguments (bsc#1034670).
- nfsd: stricter decoding of write-like NFSv2/v3 ops (bsc#1034670).
- ocfs2: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ocfs2: NFS hangs in __ocfs2_cluster_lock due to race with ocfs2_unblock_lock (bsc#962257).
- perf/core: Correct event creation with PERF_FORMAT_GROUP (bnc#1013018).
- perf/core: Fix event inheritance on fork() (bnc#1013018).
- powerpc/ibmebus: Fix device reference leaks in sysfs interface (bsc#1035777 [2017-04-24] Pending Base Kernel Fixes).
- powerpc/ibmebus: Fix further device reference leaks (bsc#1035777 [2017-04-24] Pending Base Kernel Fixes).
- powerpc/mm/hash: Check for non-kernel address in get_kernel_vsid() (bsc#1032471).
- powerpc/mm/hash: Convert mask to unsigned long (bsc#1032471).
- powerpc/mm/hash: Increase VA range to 128TB (bsc#1032471).
- powerpc/mm/hash: Properly mask the ESID bits when building proto VSID (bsc#1032471).
- powerpc/mm/hash: Support 68 bit VA (bsc#1032471).
- powerpc/mm/hash: Use context ids 1-4 for the kernel (bsc#1032471).
- powerpc/mm/slice: Convert slice_mask high slice to a bitmap (bsc#1032471).
- powerpc/mm/slice: Fix off-by-1 error when computing slice mask (bsc#1032471).
- powerpc/mm/slice: Move slice_mask struct definition to slice.c (bsc#1032471).
- powerpc/mm/slice: Update slice mask printing to use bitmap printing (bsc#1032471).
- powerpc/mm/slice: Update the function prototype (bsc#1032471).
- powerpc/mm: Do not alias user region to other regions below PAGE_OFFSET (bsc#928138).
- powerpc/mm: Remove checks that TASK_SIZE_USER64 is too small (bsc#1032471).
- powerpc/mm: use macro PGTABLE_EADDR_SIZE instead of digital (bsc#1032471).
- powerpc/pci/rpadlpar: Fix device reference leaks (bsc#1035777 [2017-04-24] Pending Base Kernel Fixes).
- powerpc/pseries: Release DRC when configure_connector fails (bsc#1035777, Pending Base Kernel Fixes).
- powerpc: Drop support for pre-POWER4 cpus (bsc#1032471).
- powerpc: Remove STAB code (bsc#1032471).
- random32: fix off-by-one in seeding requirement (git-fixes).
- reiserfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- reiserfs: do not preallocate blocks for extended attributes (bsc#990682).
- rfkill: fix rfkill_fop_read wait_event usage (bsc#1046192).
- s390/qdio: clear DSCI prior to scanning multiple input queues (bnc#1046715, LTC#156234).
- s390/qeth: no ETH header for outbound AF_IUCV (bnc#1046715, LTC#156276).
- s390/qeth: size calculation outbound buffers (bnc#1046715, LTC#156276).
- sched/core: Remove false-positive warning from wake_up_process() (bnc#1044882).
- sched/cputime: Do not scale when utime == 0 (bnc#938352).
- sched/debug: Print the scheduler topology group mask (bnc#1013018).
- sched/fair, cpumask: Export for_each_cpu_wrap() (bnc#1013018).
- sched/fair: Fix min_vruntime tracking (bnc#1013018).
- sched/rt: Fix PI handling vs. sched_setscheduler() (bnc#1013018). Prep for b60205c7c558 sched/fair: Fix min_vruntime tracking
- sched/topology: Fix building of overlapping sched-groups (bnc#1013018).
- sched/topology: Fix overlapping sched_group_capacity (bnc#1013018).
- sched/topology: Fix overlapping sched_group_mask (bnc#1013018).
- sched/topology: Move comment about asymmetric node setups (bnc#1013018).
- sched/topology: Optimize build_group_mask() (bnc#1013018).
- sched/topology: Refactor function build_overlap_sched_groups() (bnc#1013018).
- sched/topology: Remove FORCE_SD_OVERLAP (bnc#1013018).
- sched/topology: Simplify build_overlap_sched_groups() (bnc#1013018).
- sched/topology: Verify the first group matches the child domain (bnc#1013018).
- sched: Always initialize cpu-power (bnc#1013018).
- sched: Avoid cputime scaling overflow (bnc#938352).
- sched: Avoid prev-&gt;stime underflow (bnc#938352).
- sched: Do not account bogus utime (bnc#938352).
- sched: Fix SD_OVERLAP (bnc#1013018).
- sched: Fix domain iteration (bnc#1013018).
- sched: Lower chances of cputime scaling overflow (bnc#938352).
- sched: Move nr_cpus_allowed out of 'struct sched_rt_entity' (bnc#1013018). Prep for b60205c7c558 sched/fair: Fix min_vruntime tracking
- sched: Rename a misleading variable in build_overlap_sched_groups() (bnc#1013018).
- sched: Use swap() macro in scale_stime() (bnc#938352).
- scsi: bnx2i: missing error code in bnx2i_ep_connect() (bsc#1048221).
- scsi: fix race between simultaneous decrements of -&gt;host_failed (bsc#1050154).
- scsi: fnic: Correcting rport check location in fnic_queuecommand_lck (bsc#1035920).
- scsi: mvsas: fix command_active typo (bsc#1050154).
- scsi: qla2xxx: Fix scsi scan hang triggered if adapter fails during init (bsc#1050154).
- sfc: do not device_attach if a reset is pending (bsc#909618).
- smsc75xx: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
- splice: Stub splice_write_to_file (bsc#1043234).
- svcrdma: Fix send_reply() scatter/gather set-up (git-fixes).
- target/iscsi: Fix double free in lio_target_tiqn_addtpg() (bsc#1050154).
- tracing/kprobes: Enforce kprobes teardown after testing (bnc#1013018).
- tracing: Fix syscall_*regfunc() vs copy_process() race (bnc#1042687).
- udf: Fix deadlock between writeback and udf_setsize() (bsc#1013018).
- udf: Fix races with i_size changes during readpage (bsc#1013018).
- usbtmc: remove redundant braces (bsc#1036288).
- usbtmc: remove trailing spaces (bsc#1036288).
- usbvision: fix NULL-deref at probe (bsc#1050431).
- uwb: hwa-rc: fix NULL-deref at probe (bsc#1037233).
- uwb: i1480-dfu: fix NULL-deref at probe (bsc#1036629).
- vb2: Fix an off by one error in 'vb2_plane_vaddr' (bsc#1050431).
- vmxnet3: avoid calling pskb_may_pull with interrupts disabled (bsc#1045356).
- vmxnet3: fix checks for dma mapping errors (bsc#1045356).
- vmxnet3: fix lock imbalance in vmxnet3_tq_xmit() (bsc#1045356).
- x86, mm, paravirt: Fix vmalloc_fault oops during lazy MMU updates (bsc#948562).
- x86/pci-calgary: Fix iommu_free() comparison of unsigned expression greater than 0 (bsc#1051478).
- xen: avoid deadlock in xenbus (bnc#1047523).
- xfrm: NULL dereference on allocation failure (bsc#1047343).
- xfrm: Oops on error in pfkey_msg2xfrm_state() (bsc#1047653).
- xfrm: dst_entries_init() per-net dst_ops (bsc#1030814).
- xfs: Synchronize xfs_buf disposal routines (bsc#1041160).
- xfs: use -&gt;b_state to fix buffer I/O accounting release race (bsc#1041160).
- xprtrdma: Free the pd if ib_query_qp() fails (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-08"/>
	<updated date="2017-09-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000365">SUSE bug 1000365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000380">SUSE bug 1000380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013018">SUSE bug 1013018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015452">SUSE bug 1015452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023051">SUSE bug 1023051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029140">SUSE bug 1029140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029850">SUSE bug 1029850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030552">SUSE bug 1030552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030593">SUSE bug 1030593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030814">SUSE bug 1030814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032340">SUSE bug 1032340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032471">SUSE bug 1032471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034026">SUSE bug 1034026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034670">SUSE bug 1034670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035576">SUSE bug 1035576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035721">SUSE bug 1035721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035777">SUSE bug 1035777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035920">SUSE bug 1035920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036056">SUSE bug 1036056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036288">SUSE bug 1036288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036629">SUSE bug 1036629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037191">SUSE bug 1037191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037193">SUSE bug 1037193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037227">SUSE bug 1037227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037232">SUSE bug 1037232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037233">SUSE bug 1037233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037356">SUSE bug 1037356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037358">SUSE bug 1037358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037359">SUSE bug 1037359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037441">SUSE bug 1037441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038879">SUSE bug 1038879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038981">SUSE bug 1038981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038982">SUSE bug 1038982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039258">SUSE bug 1039258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039354">SUSE bug 1039354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039456">SUSE bug 1039456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039594">SUSE bug 1039594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039882">SUSE bug 1039882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039883">SUSE bug 1039883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039885">SUSE bug 1039885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040069">SUSE bug 1040069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040351">SUSE bug 1040351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041160">SUSE bug 1041160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041431">SUSE bug 1041431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041762">SUSE bug 1041762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041975">SUSE bug 1041975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042045">SUSE bug 1042045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042615">SUSE bug 1042615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042633">SUSE bug 1042633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042687">SUSE bug 1042687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042832">SUSE bug 1042832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042863">SUSE bug 1042863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043014">SUSE bug 1043014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043234">SUSE bug 1043234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043935">SUSE bug 1043935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044015">SUSE bug 1044015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044125">SUSE bug 1044125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044216">SUSE bug 1044216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044230">SUSE bug 1044230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044854">SUSE bug 1044854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044882">SUSE bug 1044882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044913">SUSE bug 1044913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045154">SUSE bug 1045154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045356">SUSE bug 1045356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045416">SUSE bug 1045416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045479">SUSE bug 1045479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045487">SUSE bug 1045487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045525">SUSE bug 1045525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045538">SUSE bug 1045538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045547">SUSE bug 1045547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045615">SUSE bug 1045615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046107">SUSE bug 1046107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046192">SUSE bug 1046192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046715">SUSE bug 1046715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047027">SUSE bug 1047027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047053">SUSE bug 1047053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047343">SUSE bug 1047343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047354">SUSE bug 1047354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047523">SUSE bug 1047523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047653">SUSE bug 1047653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048185">SUSE bug 1048185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048221">SUSE bug 1048221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048232">SUSE bug 1048232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048275">SUSE bug 1048275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049128">SUSE bug 1049128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049483">SUSE bug 1049483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049603">SUSE bug 1049603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049688">SUSE bug 1049688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049882">SUSE bug 1049882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050154">SUSE bug 1050154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051478">SUSE bug 1051478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051515">SUSE bug 1051515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051770">SUSE bug 1051770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055680">SUSE bug 1055680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784815">SUSE bug 784815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792863">SUSE bug 792863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799133">SUSE bug 799133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909618">SUSE bug 909618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919382">SUSE bug 919382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928138">SUSE bug 928138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938352">SUSE bug 938352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943786">SUSE bug 943786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948562">SUSE bug 948562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962257">SUSE bug 962257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971975">SUSE bug 971975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972891">SUSE bug 972891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986924">SUSE bug 986924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990682">SUSE bug 990682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995542">SUSE bug 995542</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9922/">CVE-2014-9922 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9922">CVE-2014-9922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10277/">CVE-2016-10277 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10277">CVE-2016-10277 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000363/">CVE-2017-1000363 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000363">CVE-2017-1000363 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000365/">CVE-2017-1000365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000365">CVE-2017-1000365 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000380/">CVE-2017-1000380 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000380">CVE-2017-1000380 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11176/">CVE-2017-11176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11176">CVE-2017-11176 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11473/">CVE-2017-11473 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11473">CVE-2017-11473 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2647/">CVE-2017-2647 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2647">CVE-2017-2647 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6951/">CVE-2017-6951 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6951">CVE-2017-6951 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7482/">CVE-2017-7482 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7482">CVE-2017-7482 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7487/">CVE-2017-7487 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7487">CVE-2017-7487 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7533/">CVE-2017-7533 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7533">CVE-2017-7533 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7542/">CVE-2017-7542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7542">CVE-2017-7542 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8890/">CVE-2017-8890 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8890">CVE-2017-8890 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-8924/">CVE-2017-8924 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8924">CVE-2017-8924 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8925/">CVE-2017-8925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8925">CVE-2017-8925 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9074/">CVE-2017-9074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9074">CVE-2017-9074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9075/">CVE-2017-9075 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9075">CVE-2017-9075 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9076/">CVE-2017-9076 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9076">CVE-2017-9076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9077/">CVE-2017-9077 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9077">CVE-2017-9077 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9242/">CVE-2017-9242 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9242">CVE-2017-9242 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583045" comment="kernel-bigmem-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583046" comment="kernel-bigmem-base-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583048" comment="kernel-default-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583049" comment="kernel-default-base-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583051" comment="kernel-default-man-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583052" comment="kernel-ec2-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583053" comment="kernel-ec2-base-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583055" comment="kernel-pae-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583056" comment="kernel-pae-base-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583058" comment="kernel-ppc64-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583059" comment="kernel-ppc64-base-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583061" comment="kernel-source-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583062" comment="kernel-syms-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583063" comment="kernel-trace-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583064" comment="kernel-trace-base-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583066" comment="kernel-xen-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583067" comment="kernel-xen-base-3.0.101-108.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583045" comment="kernel-bigmem-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583046" comment="kernel-bigmem-base-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583048" comment="kernel-default-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583049" comment="kernel-default-base-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583051" comment="kernel-default-man-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583052" comment="kernel-ec2-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583053" comment="kernel-ec2-base-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583055" comment="kernel-pae-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583056" comment="kernel-pae-base-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583058" comment="kernel-ppc64-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583059" comment="kernel-ppc64-base-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583061" comment="kernel-source-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583062" comment="kernel-syms-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583063" comment="kernel-trace-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583064" comment="kernel-trace-base-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583066" comment="kernel-xen-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583067" comment="kernel-xen-base-3.0.101-108.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220034" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1059525" ref_url="https://bugzilla.suse.com/1059525" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000253" ref_url="https://www.suse.com/security/cve/CVE-2017-1000253/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003296.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to fix the following issues:

- Stack corruption could have lead to local privilege escalation
  (bsc#1059525, CVE-2017-1000253).
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-13"/>
	<updated date="2017-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059525">SUSE bug 1059525</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000253/">CVE-2017-1000253 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000253">CVE-2017-1000253 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583069" comment="kernel-bigmem-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583070" comment="kernel-bigmem-base-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583072" comment="kernel-default-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583073" comment="kernel-default-base-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583075" comment="kernel-default-man-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583076" comment="kernel-ec2-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583077" comment="kernel-ec2-base-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583079" comment="kernel-pae-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583080" comment="kernel-pae-base-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583082" comment="kernel-ppc64-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583083" comment="kernel-ppc64-base-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583085" comment="kernel-source-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583086" comment="kernel-syms-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583087" comment="kernel-trace-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583088" comment="kernel-trace-base-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583090" comment="kernel-xen-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583091" comment="kernel-xen-base-3.0.101-108.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583069" comment="kernel-bigmem-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583070" comment="kernel-bigmem-base-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583072" comment="kernel-default-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583073" comment="kernel-default-base-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583075" comment="kernel-default-man-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583076" comment="kernel-ec2-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583077" comment="kernel-ec2-base-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583079" comment="kernel-pae-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583080" comment="kernel-pae-base-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583082" comment="kernel-ppc64-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583083" comment="kernel-ppc64-base-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583085" comment="kernel-source-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583086" comment="kernel-syms-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583087" comment="kernel-trace-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583088" comment="kernel-trace-base-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583090" comment="kernel-xen-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583091" comment="kernel-xen-base-3.0.101-108.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220035" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1037441" ref_url="https://bugzilla.suse.com/1037441" source="BUGZILLA"/>
		<reference ref_id="1045538" ref_url="https://bugzilla.suse.com/1045538" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1048185" ref_url="https://bugzilla.suse.com/1048185" source="BUGZILLA"/>
		<reference ref_id="1050381" ref_url="https://bugzilla.suse.com/1050381" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1057199" ref_url="https://bugzilla.suse.com/1057199" source="BUGZILLA"/>
		<reference ref_id="1060245" ref_url="https://bugzilla.suse.com/1060245" source="BUGZILLA"/>
		<reference ref_id="1064861" ref_url="https://bugzilla.suse.com/1064861" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1080157" ref_url="https://bugzilla.suse.com/1080157" source="BUGZILLA"/>
		<reference ref_id="1087081" ref_url="https://bugzilla.suse.com/1087081" source="BUGZILLA"/>
		<reference ref_id="1092772" ref_url="https://bugzilla.suse.com/1092772" source="BUGZILLA"/>
		<reference ref_id="1092903" ref_url="https://bugzilla.suse.com/1092903" source="BUGZILLA"/>
		<reference ref_id="1093666" ref_url="https://bugzilla.suse.com/1093666" source="BUGZILLA"/>
		<reference ref_id="1096547" ref_url="https://bugzilla.suse.com/1096547" source="BUGZILLA"/>
		<reference ref_id="1097562" ref_url="https://bugzilla.suse.com/1097562" source="BUGZILLA"/>
		<reference ref_id="1098822" ref_url="https://bugzilla.suse.com/1098822" source="BUGZILLA"/>
		<reference ref_id="1099922" ref_url="https://bugzilla.suse.com/1099922" source="BUGZILLA"/>
		<reference ref_id="1100132" ref_url="https://bugzilla.suse.com/1100132" source="BUGZILLA"/>
		<reference ref_id="1100705" ref_url="https://bugzilla.suse.com/1100705" source="BUGZILLA"/>
		<reference ref_id="1102517" ref_url="https://bugzilla.suse.com/1102517" source="BUGZILLA"/>
		<reference ref_id="1102870" ref_url="https://bugzilla.suse.com/1102870" source="BUGZILLA"/>
		<reference ref_id="1103119" ref_url="https://bugzilla.suse.com/1103119" source="BUGZILLA"/>
		<reference ref_id="1103884" ref_url="https://bugzilla.suse.com/1103884" source="BUGZILLA"/>
		<reference ref_id="1103909" ref_url="https://bugzilla.suse.com/1103909" source="BUGZILLA"/>
		<reference ref_id="1104481" ref_url="https://bugzilla.suse.com/1104481" source="BUGZILLA"/>
		<reference ref_id="1104684" ref_url="https://bugzilla.suse.com/1104684" source="BUGZILLA"/>
		<reference ref_id="1104818" ref_url="https://bugzilla.suse.com/1104818" source="BUGZILLA"/>
		<reference ref_id="1104901" ref_url="https://bugzilla.suse.com/1104901" source="BUGZILLA"/>
		<reference ref_id="1105100" ref_url="https://bugzilla.suse.com/1105100" source="BUGZILLA"/>
		<reference ref_id="1105322" ref_url="https://bugzilla.suse.com/1105322" source="BUGZILLA"/>
		<reference ref_id="1105348" ref_url="https://bugzilla.suse.com/1105348" source="BUGZILLA"/>
		<reference ref_id="1105536" ref_url="https://bugzilla.suse.com/1105536" source="BUGZILLA"/>
		<reference ref_id="1105723" ref_url="https://bugzilla.suse.com/1105723" source="BUGZILLA"/>
		<reference ref_id="1106095" ref_url="https://bugzilla.suse.com/1106095" source="BUGZILLA"/>
		<reference ref_id="1106105" ref_url="https://bugzilla.suse.com/1106105" source="BUGZILLA"/>
		<reference ref_id="1106199" ref_url="https://bugzilla.suse.com/1106199" source="BUGZILLA"/>
		<reference ref_id="1106202" ref_url="https://bugzilla.suse.com/1106202" source="BUGZILLA"/>
		<reference ref_id="1106206" ref_url="https://bugzilla.suse.com/1106206" source="BUGZILLA"/>
		<reference ref_id="1106209" ref_url="https://bugzilla.suse.com/1106209" source="BUGZILLA"/>
		<reference ref_id="1106212" ref_url="https://bugzilla.suse.com/1106212" source="BUGZILLA"/>
		<reference ref_id="1106369" ref_url="https://bugzilla.suse.com/1106369" source="BUGZILLA"/>
		<reference ref_id="1106509" ref_url="https://bugzilla.suse.com/1106509" source="BUGZILLA"/>
		<reference ref_id="1106511" ref_url="https://bugzilla.suse.com/1106511" source="BUGZILLA"/>
		<reference ref_id="1106609" ref_url="https://bugzilla.suse.com/1106609" source="BUGZILLA"/>
		<reference ref_id="1106886" ref_url="https://bugzilla.suse.com/1106886" source="BUGZILLA"/>
		<reference ref_id="1106930" ref_url="https://bugzilla.suse.com/1106930" source="BUGZILLA"/>
		<reference ref_id="1106995" ref_url="https://bugzilla.suse.com/1106995" source="BUGZILLA"/>
		<reference ref_id="1107001" ref_url="https://bugzilla.suse.com/1107001" source="BUGZILLA"/>
		<reference ref_id="1107064" ref_url="https://bugzilla.suse.com/1107064" source="BUGZILLA"/>
		<reference ref_id="1107071" ref_url="https://bugzilla.suse.com/1107071" source="BUGZILLA"/>
		<reference ref_id="1107650" ref_url="https://bugzilla.suse.com/1107650" source="BUGZILLA"/>
		<reference ref_id="1107689" ref_url="https://bugzilla.suse.com/1107689" source="BUGZILLA"/>
		<reference ref_id="1107735" ref_url="https://bugzilla.suse.com/1107735" source="BUGZILLA"/>
		<reference ref_id="1107949" ref_url="https://bugzilla.suse.com/1107949" source="BUGZILLA"/>
		<reference ref_id="1108096" ref_url="https://bugzilla.suse.com/1108096" source="BUGZILLA"/>
		<reference ref_id="1108170" ref_url="https://bugzilla.suse.com/1108170" source="BUGZILLA"/>
		<reference ref_id="1108823" ref_url="https://bugzilla.suse.com/1108823" source="BUGZILLA"/>
		<reference ref_id="1108912" ref_url="https://bugzilla.suse.com/1108912" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-10940" ref_url="https://www.suse.com/security/cve/CVE-2018-10940/" source="CVE"/>
		<reference ref_id="CVE-2018-12896" ref_url="https://www.suse.com/security/cve/CVE-2018-12896/" source="CVE"/>
		<reference ref_id="CVE-2018-14617" ref_url="https://www.suse.com/security/cve/CVE-2018-14617/" source="CVE"/>
		<reference ref_id="CVE-2018-14634" ref_url="https://www.suse.com/security/cve/CVE-2018-14634/" source="CVE"/>
		<reference ref_id="CVE-2018-14734" ref_url="https://www.suse.com/security/cve/CVE-2018-14734/" source="CVE"/>
		<reference ref_id="CVE-2018-15572" ref_url="https://www.suse.com/security/cve/CVE-2018-15572/" source="CVE"/>
		<reference ref_id="CVE-2018-15594" ref_url="https://www.suse.com/security/cve/CVE-2018-15594/" source="CVE"/>
		<reference ref_id="CVE-2018-16276" ref_url="https://www.suse.com/security/cve/CVE-2018-16276/" source="CVE"/>
		<reference ref_id="CVE-2018-16658" ref_url="https://www.suse.com/security/cve/CVE-2018-16658/" source="CVE"/>
		<reference ref_id="CVE-2018-6554" ref_url="https://www.suse.com/security/cve/CVE-2018-6554/" source="CVE"/>
		<reference ref_id="CVE-2018-6555" ref_url="https://www.suse.com/security/cve/CVE-2018-6555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-14617: Prevent NULL pointer dereference and panic in
  hfsplus_lookup() when opening a file (that is purportedly a hard link) in an
  hfs+ filesystem that has malformed catalog data, and is mounted read-only
  without a metadata directory (bsc#1102870).
- CVE-2018-16276: Incorrect bounds checking in the yurex USB driver in
  yurex_read allowed local attackers to use user access read/writes to crash the
  kernel or potentially escalate privileges (bsc#1106095).
- CVE-2018-15594: Ensure correct handling of indirect calls, to prevent
  attackers for conducting Spectre-v2 attacks against paravirtual guests
  (bsc#1105348).
- CVE-2018-14634: Prevent integer overflow in create_elf_tables that allowed a
  local attacker to exploit this vulnerability via a SUID-root binary and obtain
  full root privileges (bsc#1108912)
- CVE-2018-12896: Prevent integer overflow in the POSIX timer code that was
  caused by the way the overrun accounting works. Depending on interval and
  expiry time values, the overrun can be larger than INT_MAX, but the accounting
  is int based. This basically made the accounting values, which are visible to
  user space via timer_getoverrun(2) and siginfo::si_overrun, random. This
  allowed a local user to cause a denial of service (signed integer overflow) via
  crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922)
- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local
  attackers to use a incorrect bounds check in the CDROM driver
  CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)
- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that
  could have been used by local attackers to read kernel memory (bnc#1107689)
- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a
  denial of service (ias_object use-after-free and system crash) or possibly have
  unspecified other impact via an AF_IRDA socket (bnc#1106511)
- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed
  local users to cause a denial of service (memory consumption) by repeatedly
  binding an AF_IRDA socket (bnc#1106509)
- CVE-2018-15572: The spectre_v2_select_mitigation function did not always fill
  RSB upon a context switch, which made it easier for attackers to conduct
  userspace-userspace spectreRSB attacks (bnc#1102517)
- CVE-2018-10902: Protect against concurrent access to prevent double realloc
  (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A
  malicious local attacker could have used this for privilege escalation
  (bnc#1105322)
- CVE-2018-14734: ucma_leave_multicast accessed a certain data structure after
  a cleanup step in ucma_process_join, which allowed attackers to cause a denial
  of service (use-after-free) (bsc#1103119)

The following non-security bugs were fixed:

- ACPI: APEI / ERST: Fix missing error handling in erst_reader() (bsc#1045538).
- ALSA: fm801: propagate TUNER_ONLY bit when autodetected (bsc#1045538).
- ALSA: pcm: Fix snd_pcm_hw_params struct copy in compat mode (bsc#1045538).
- ALSA: pcm: Use dma_bytes as size parameter in dma_mmap_coherent() (bsc#1045538).
- ALSA: pcm: fix fifo_size frame calculation (bsc#1045538).
- ALSA: snd-aoa: add of_node_put() in error path (bsc#1045538).
- ALSA: usb-audio: Add sanity checks in v2 clock parsers (bsc#1045538).
- ALSA: usb-audio: Add sanity checks to FE parser (bsc#1045538).
- ALSA: usb-audio: Fix UAC2 get_ctl request with a RANGE attribute (bsc#1045538).
- ALSA: usb-audio: Fix bogus error return in snd_usb_create_stream() (bsc#1045538).
- ALSA: usb-audio: Fix parameter block size for UAC2 control requests (bsc#1045538).
- ALSA: usb-audio: Fix parsing descriptor of UAC2 processing unit (bsc#1045538).
- ALSA: usb-audio: Fix potential out-of-bound access at parsing SU (bsc#1045538).
- ALSA: usb-audio: Set correct type for some UAC2 mixer controls (bsc#1045538).
- ASoC: blackfin: Fix missing break (bsc#1045538).
- Enforce module signatures if the kernel is locked down (bsc#1093666).
- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).
- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).
- PCI: Fix TI816X class code quirk (bsc#1050431).
- Refresh patches.xen/xen3-x86-l1tf-04-protect-PROT_NONE-ptes.patch (bsc#1105100).
- TPM: Zero buffer whole after copying to userspace (bsc#1050381).
- USB: add USB_DEVICE_INTERFACE_CLASS macro (bsc#1047487).
- USB: hub: fix non-SS hub-descriptor handling (bsc#1047487).
- USB: serial: ftdi_sio: fix latency-timer error handling (bsc#1037441).
- USB: serial: io_edgeport: fix possible sleep-in-atomic (bsc#1037441).
- USB: serial: io_ti: fix NULL-deref in interrupt callback (bsc#1106609).
- USB: serial: sierra: fix potential deadlock at close (bsc#1100132).
- USB: visor: Match I330 phone more precisely (bsc#1047487).
- applicom: dereferencing NULL on error path (git-fixes).
- ath5k: Change led pin configuration for compaq c700 laptop (bsc#1048185).
- base: make module_create_drivers_dir race-free (git-fixes).
- block: fix an error code in add_partition() (bsc#1106209).
- btrfs: scrub: Do not use inode page cache in scrub_handle_errored_block() (bsc#1108096).
- btrfs: scrub: Do not use inode pages for device replace (bsc#1107949).
- dasd: Add IFCC notice message (bnc#1104481, LTC#170484).
- drm/i915: Remove bogus __init annotation from DMI callbacks (bsc#1106886).
- drm/i915: fix use-after-free in page_flip_completed() (bsc#1103909).
- drm/nouveau/gem: off by one bugs in nouveau_gem_pushbuf_reloc_apply() (bsc#1106886).
- drm/vmwgfx: Handle vmalloc() failure in vmw_local_fifo_reserve() (bsc#1106886).
- drm: crtc: integer overflow in drm_property_create_blob() (bsc#1106886).
- drm: re-enable error handling (bsc#1103884)
- fbdev: omapfb: off by one in omapfb_register_client() (bsc#1106886).
- iommu/amd: Finish TLB flush in amd_iommu_unmap() (bsc#1106105).
- iommu/amd: Fix the left value check of cmd buffer (bsc#1106105).
- iommu/amd: Free domain id when free a domain of struct dma_ops_domain (bsc#1106105).
- iommu/amd: Update Alias-DTE in update_device_table() (bsc#1106105).
- iommu/vt-d: Do not over-free page table directories (bsc#1106105).
- iommu/vt-d: Ratelimit each dmar fault printing (bsc#1106105).
- ipv6: Regenerate host route according to node pointer upon loopback up (bsc#1100705).
- ipv6: correctly add local routes when lo goes up (bsc#1100705).
- ipv6: introduce ip6_rt_put() (bsc#1100705).
- ipv6: reallocate addrconf router for ipv6 address when lo device up (bsc#1100705).
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- kthread, tracing: Do not expose half-written comm when creating kthreads (Git-fixes).
- mm/hugetlb: add migration/hwpoisoned entry check in hugetlb_change_protection (bnc#1107071).
- mm/mempolicy.c: avoid use uninitialized preferred_node (bnc#1107064).
- modsign: log module name in the event of an error (bsc#1093666).
- modsign: print module name along with error message (bsc#1093666).
- module: make it clear when we're handling the module copy in info-&gt;hdr (bsc#1093666).
- module: setup load info before module_sig_check() (bsc#1093666).
- nbd: ratelimit error msgs after socket close (bsc#1106206).
- ncpfs: return proper error from NCP_IOC_SETROOT ioctl (bsc#1106199).
- nvme: add device id's with intel stripe quirk (bsc#1097562).
- perf/core: Fix group scheduling with mixed hw and sw events (Git-fixes).
- perf/x86/intel: Add cpu_(prepare|starting|dying) for core_pmu (bsc#1104901).
- powerpc/64s: Default l1d_size to 64K in RFI fallback flush (bsc#1068032, git-fixes).
- powerpc/fadump: Do not use hugepages when fadump is active (bsc#1092772, bsc#1107650).
- powerpc/fadump: exclude memory holes while reserving memory in second kernel (bsc#1092772, bsc#1107650).
- powerpc/fadump: re-register firmware-assisted dump if already registered (bsc#1108170, bsc#1108823).
- powerpc/lib: Fix off-by-one in alternate feature patching (bsc#1064861).
- powerpc/lib: Fix the feature fixup tests to actually work (bsc#1064861).
- powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (bsc#1068032, bsc#1080157, git-fixes).
- powerpc: Avoid code patching freed init sections (bnc#1107735).
- powerpc: make feature-fixup tests fortify-safe (bsc#1064861).
- ptrace: fix PTRACE_LISTEN race corrupting task-&gt;state (bnc#1107001).
- qlge: Fix netdev features configuration (bsc#1098822).
- resource: fix integer overflow at reallocation (bsc#1045538).
- rpm/kernel-docs.spec.in: Expand kernel tree directly from sources (bsc#1057199)
- s390/ftrace: use expoline for indirect branches (bnc#1106930, LTC#171029).
- s390/kernel: use expoline for indirect branches (bnc#1106930, LTC#171029).
- s390/qeth: do not clobber buffer on async TX completion (bnc#1060245, LTC#170349).
- s390: Correct register corruption in critical section cleanup (bnc#1106930, LTC#171029).
- s390: add assembler macros for CPU alternatives (bnc#1106930, LTC#171029).
- s390: detect etoken facility (bnc#1106930, LTC#171029).
- s390: move expoline assembler macros to a header (bnc#1106930, LTC#171029).
- s390: move spectre sysfs attribute code (bnc#1106930, LTC#171029).
- s390: remove indirect branch from do_softirq_own_stack (bnc#1106930, LTC#171029).
- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1100132).
- sys: do not hold uts_sem while accessing userspace memory (bnc#1106995).
- tpm: fix race condition in tpm_common_write() (bsc#1050381).
- tracing/blktrace: Fix to allow setting same value (bsc#1106212).
- tty: vt, fix bogus division in csi_J (git-fixes).
- tty: vt, return error when con_startup fails (git-fixes).
- uml: fix hostfs mknod() (bsc#1106202).
- usb: audio-v2: Correct the comment for struct uac_clock_selector_descriptor (bsc#1045538).
- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).
- x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).
- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).
- x86/init: fix build with CONFIG_SWAP=n (bsc#1105723).
- x86/mm: Prevent kernel Oops in PTDUMP code with HIGHPTE=y (bsc#1106105).
- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bnc#1105536).
- x86/vdso: Fix vDSO build if a retpoline is emitted (git-fixes).
- xen x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- xen x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- xen, x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).
- xen: x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-26"/>
	<updated date="2018-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037441">SUSE bug 1037441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045538">SUSE bug 1045538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048185">SUSE bug 1048185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050381">SUSE bug 1050381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057199">SUSE bug 1057199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060245">SUSE bug 1060245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064861">SUSE bug 1064861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080157">SUSE bug 1080157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092772">SUSE bug 1092772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092903">SUSE bug 1092903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093666">SUSE bug 1093666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096547">SUSE bug 1096547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097562">SUSE bug 1097562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098822">SUSE bug 1098822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099922">SUSE bug 1099922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100132">SUSE bug 1100132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100705">SUSE bug 1100705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102517">SUSE bug 1102517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102870">SUSE bug 1102870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103119">SUSE bug 1103119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103884">SUSE bug 1103884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103909">SUSE bug 1103909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104481">SUSE bug 1104481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104684">SUSE bug 1104684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104818">SUSE bug 1104818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104901">SUSE bug 1104901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105100">SUSE bug 1105100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105322">SUSE bug 1105322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105348">SUSE bug 1105348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105536">SUSE bug 1105536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105723">SUSE bug 1105723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106095">SUSE bug 1106095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106105">SUSE bug 1106105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106199">SUSE bug 1106199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106202">SUSE bug 1106202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106206">SUSE bug 1106206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106209">SUSE bug 1106209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106212">SUSE bug 1106212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106369">SUSE bug 1106369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106509">SUSE bug 1106509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106511">SUSE bug 1106511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106609">SUSE bug 1106609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106886">SUSE bug 1106886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106930">SUSE bug 1106930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106995">SUSE bug 1106995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107001">SUSE bug 1107001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107064">SUSE bug 1107064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107071">SUSE bug 1107071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107650">SUSE bug 1107650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107689">SUSE bug 1107689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107735">SUSE bug 1107735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107949">SUSE bug 1107949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108096">SUSE bug 1108096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108170">SUSE bug 1108170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108823">SUSE bug 1108823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108912">SUSE bug 1108912</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10902">CVE-2018-10902 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10940/">CVE-2018-10940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10940">CVE-2018-10940 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12896/">CVE-2018-12896 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12896">CVE-2018-12896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14617/">CVE-2018-14617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14617">CVE-2018-14617 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14634/">CVE-2018-14634 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14634">CVE-2018-14634 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14734/">CVE-2018-14734 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14734">CVE-2018-14734 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15572/">CVE-2018-15572 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15572">CVE-2018-15572 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15594/">CVE-2018-15594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15594">CVE-2018-15594 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16276/">CVE-2018-16276 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16276">CVE-2018-16276 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16658/">CVE-2018-16658 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16658">CVE-2018-16658 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6554/">CVE-2018-6554 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6554">CVE-2018-6554 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6555/">CVE-2018-6555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6555">CVE-2018-6555 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583093" comment="kernel-bigmem-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583094" comment="kernel-bigmem-base-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583096" comment="kernel-default-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583097" comment="kernel-default-base-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583099" comment="kernel-default-man-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583100" comment="kernel-ec2-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583101" comment="kernel-ec2-base-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583103" comment="kernel-pae-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583104" comment="kernel-pae-base-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583106" comment="kernel-ppc64-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583107" comment="kernel-ppc64-base-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583109" comment="kernel-source-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583110" comment="kernel-syms-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583111" comment="kernel-trace-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583112" comment="kernel-trace-base-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583114" comment="kernel-xen-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583115" comment="kernel-xen-base-3.0.101-108.71.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583093" comment="kernel-bigmem-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583094" comment="kernel-bigmem-base-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583096" comment="kernel-default-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583097" comment="kernel-default-base-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583099" comment="kernel-default-man-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583100" comment="kernel-ec2-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583101" comment="kernel-ec2-base-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583103" comment="kernel-pae-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583104" comment="kernel-pae-base-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583106" comment="kernel-ppc64-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583107" comment="kernel-ppc64-base-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583109" comment="kernel-source-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583110" comment="kernel-syms-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583111" comment="kernel-trace-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583112" comment="kernel-trace-base-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583114" comment="kernel-xen-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583115" comment="kernel-xen-base-3.0.101-108.71.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220036" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1183089" ref_url="https://bugzilla.suse.com/1183089" source="BUGZILLA"/>
		<reference ref_id="1184673" ref_url="https://bugzilla.suse.com/1184673" source="BUGZILLA"/>
		<reference ref_id="1186109" ref_url="https://bugzilla.suse.com/1186109" source="BUGZILLA"/>
		<reference ref_id="1187050" ref_url="https://bugzilla.suse.com/1187050" source="BUGZILLA"/>
		<reference ref_id="1187215" ref_url="https://bugzilla.suse.com/1187215" source="BUGZILLA"/>
		<reference ref_id="1188172" ref_url="https://bugzilla.suse.com/1188172" source="BUGZILLA"/>
		<reference ref_id="1188563" ref_url="https://bugzilla.suse.com/1188563" source="BUGZILLA"/>
		<reference ref_id="1188601" ref_url="https://bugzilla.suse.com/1188601" source="BUGZILLA"/>
		<reference ref_id="1188876" ref_url="https://bugzilla.suse.com/1188876" source="BUGZILLA"/>
		<reference ref_id="1189057" ref_url="https://bugzilla.suse.com/1189057" source="BUGZILLA"/>
		<reference ref_id="1189262" ref_url="https://bugzilla.suse.com/1189262" source="BUGZILLA"/>
		<reference ref_id="1189399" ref_url="https://bugzilla.suse.com/1189399" source="BUGZILLA"/>
		<reference ref_id="1190117" ref_url="https://bugzilla.suse.com/1190117" source="BUGZILLA"/>
		<reference ref_id="1190351" ref_url="https://bugzilla.suse.com/1190351" source="BUGZILLA"/>
		<reference ref_id="1191315" ref_url="https://bugzilla.suse.com/1191315" source="BUGZILLA"/>
		<reference ref_id="1191660" ref_url="https://bugzilla.suse.com/1191660" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1192036" ref_url="https://bugzilla.suse.com/1192036" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="904899" ref_url="https://bugzilla.suse.com/904899" source="BUGZILLA"/>
		<reference ref_id="905100" ref_url="https://bugzilla.suse.com/905100" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-7841" ref_url="https://www.suse.com/security/cve/CVE-2014-7841/" source="CVE"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-20265" ref_url="https://www.suse.com/security/cve/CVE-2021-20265/" source="CVE"/>
		<reference ref_id="CVE-2021-33033" ref_url="https://www.suse.com/security/cve/CVE-2021-33033/" source="CVE"/>
		<reference ref_id="CVE-2021-3542" ref_url="https://www.suse.com/security/cve/CVE-2021-3542/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3655" ref_url="https://www.suse.com/security/cve/CVE-2021-3655/" source="CVE"/>
		<reference ref_id="CVE-2021-3679" ref_url="https://www.suse.com/security/cve/CVE-2021-3679/" source="CVE"/>
		<reference ref_id="CVE-2021-37159" ref_url="https://www.suse.com/security/cve/CVE-2021-37159/" source="CVE"/>
		<reference ref_id="CVE-2021-3772" ref_url="https://www.suse.com/security/cve/CVE-2021-3772/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<reference ref_id="CVE-2021-42008" ref_url="https://www.suse.com/security/cve/CVE-2021-42008/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2021-43389" ref_url="https://www.suse.com/security/cve/CVE-2021-43389/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).
- CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).
- CVE-2021-3655: Missing size validations on inbound SCTP packets may have allowed the kernel to read uninitialized memory (bnc#1188563 bnc#1192267).
- CVE-2014-7841: The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation, when ASCONF is used, allowed remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk (bnc#904899 bnc#905100).
- CVE-2021-20265: A flaw was found in the way memory resources were freed in the unix_stream_recvmsg function when a signal was pending. This flaw allowed an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability (bnc#1183089).
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bnc#1184673 bnc#1192036).
- CVE-2021-33033: The Linux kernel has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value (bnc#1186109 bnc#1188876).
- CVE-2021-43389: There was an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).
- CVE-2021-42008: The decode_data function in drivers/net/hamradio/6pack.c had a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access (bnc#1191315).
- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)
- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).
- CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h incorrectly computed the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262).
- CVE-2021-3653: A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the 'int_ctl' field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. (bnc#1189399).
- CVE-2021-3679: A lack of CPU resource in the Linux kernel tracing module functionality was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).
- CVE-2021-3609: A potential local privilege escalation in the CAN BCM networking protocol was fixed (bsc#1187215).
- CVE-2020-36385: drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c (bnc#1187050).

The following non-security bugs were fixed:

- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).
- sctp: fully initialize v4 addr in some functions (bsc#1188563).
- sctp: simplify addr copy (bsc#1188563).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183089">SUSE bug 1183089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184673">SUSE bug 1184673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186109">SUSE bug 1186109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187050">SUSE bug 1187050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187215">SUSE bug 1187215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188172">SUSE bug 1188172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188563">SUSE bug 1188563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188601">SUSE bug 1188601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188876">SUSE bug 1188876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189057">SUSE bug 1189057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189262">SUSE bug 1189262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189399">SUSE bug 1189399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190117">SUSE bug 1190117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190351">SUSE bug 1190351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191315">SUSE bug 1191315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191660">SUSE bug 1191660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192036">SUSE bug 1192036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904899">SUSE bug 904899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905100">SUSE bug 905100</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7841/">CVE-2014-7841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7841">CVE-2014-7841 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36385">CVE-2020-36385 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20265/">CVE-2021-20265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20265">CVE-2021-20265 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33033/">CVE-2021-33033 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33033">CVE-2021-33033 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3542/">CVE-2021-3542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3542">CVE-2021-3542 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3609">CVE-2021-3609 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3640">CVE-2021-3640 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3655/">CVE-2021-3655 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3655">CVE-2021-3655 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3679/">CVE-2021-3679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3679">CVE-2021-3679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37159/">CVE-2021-37159 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37159">CVE-2021-37159 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3772/">CVE-2021-3772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3772">CVE-2021-3772 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38160">CVE-2021-38160 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38198">CVE-2021-38198 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42008/">CVE-2021-42008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42008">CVE-2021-42008 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42739">CVE-2021-42739 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43389/">CVE-2021-43389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43389">CVE-2021-43389 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657593" comment="kernel-bigmem-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657594" comment="kernel-bigmem-base-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657596" comment="kernel-default-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657597" comment="kernel-default-base-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657599" comment="kernel-default-man-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657600" comment="kernel-ec2-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657601" comment="kernel-ec2-base-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657603" comment="kernel-pae-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657604" comment="kernel-pae-base-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657606" comment="kernel-ppc64-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657607" comment="kernel-ppc64-base-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657609" comment="kernel-source-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657610" comment="kernel-syms-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657611" comment="kernel-trace-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657612" comment="kernel-trace-base-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657614" comment="kernel-xen-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657615" comment="kernel-xen-base-3.0.101-108.132.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220037" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1171420" ref_url="https://bugzilla.suse.com/1171420" source="BUGZILLA"/>
		<reference ref_id="1179599" ref_url="https://bugzilla.suse.com/1179599" source="BUGZILLA"/>
		<reference ref_id="1190025" ref_url="https://bugzilla.suse.com/1190025" source="BUGZILLA"/>
		<reference ref_id="1191580" ref_url="https://bugzilla.suse.com/1191580" source="BUGZILLA"/>
		<reference ref_id="1193157" ref_url="https://bugzilla.suse.com/1193157" source="BUGZILLA"/>
		<reference ref_id="1193669" ref_url="https://bugzilla.suse.com/1193669" source="BUGZILLA"/>
		<reference ref_id="1193867" ref_url="https://bugzilla.suse.com/1193867" source="BUGZILLA"/>
		<reference ref_id="1194272" ref_url="https://bugzilla.suse.com/1194272" source="BUGZILLA"/>
		<reference ref_id="1195109" ref_url="https://bugzilla.suse.com/1195109" source="BUGZILLA"/>
		<reference ref_id="1195543" ref_url="https://bugzilla.suse.com/1195543" source="BUGZILLA"/>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1196079" ref_url="https://bugzilla.suse.com/1196079" source="BUGZILLA"/>
		<reference ref_id="1196612" ref_url="https://bugzilla.suse.com/1196612" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0136" ref_url="https://www.suse.com/security/cve/CVE-2019-0136/" source="CVE"/>
		<reference ref_id="CVE-2020-12770" ref_url="https://www.suse.com/security/cve/CVE-2020-12770/" source="CVE"/>
		<reference ref_id="CVE-2020-27820" ref_url="https://www.suse.com/security/cve/CVE-2020-27820/" source="CVE"/>
		<reference ref_id="CVE-2021-3753" ref_url="https://www.suse.com/security/cve/CVE-2021-3753/" source="CVE"/>
		<reference ref_id="CVE-2021-4155" ref_url="https://www.suse.com/security/cve/CVE-2021-4155/" source="CVE"/>
		<reference ref_id="CVE-2021-45095" ref_url="https://www.suse.com/security/cve/CVE-2021-45095/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="CVE-2022-0617" ref_url="https://www.suse.com/security/cve/CVE-2022-0617/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010396.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.


Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.

The following security bugs were fixed:

- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2020-12770: Fixed sg_remove_request call in a certain failure cases (bsc#1171420).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bsc#1193867).
- CVE-2021-4155: Fixed a data leak flaw that allows a local attacker to leak data on the XFS filesystem (bsc#1194272).
- CVE-2020-27820: Fixed a vulnerability where a use-after-frees in nouveau's postclose() handler could happen if removing device (bsc#1179599).
- CVE-2019-0136: Fixed an insufficient access control which allow an unauthenticated user to execute a denial of service (bsc#1193157).
- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).

The following non-security bugs were fixed:

- kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
- md: check the return of mddev_find() (bsc#1195109).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-08"/>
	<updated date="2022-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171420">SUSE bug 1171420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179599">SUSE bug 1179599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190025">SUSE bug 1190025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191580">SUSE bug 1191580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193157">SUSE bug 1193157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193669">SUSE bug 1193669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193867">SUSE bug 1193867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194272">SUSE bug 1194272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195109">SUSE bug 1195109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195543">SUSE bug 1195543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196079">SUSE bug 1196079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196612">SUSE bug 1196612</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0136/">CVE-2019-0136 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0136">CVE-2019-0136 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12770/">CVE-2020-12770 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12770">CVE-2020-12770 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-27820/">CVE-2020-27820 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27820">CVE-2020-27820 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3753/">CVE-2021-3753 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3753">CVE-2021-3753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4155/">CVE-2021-4155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4155">CVE-2021-4155 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45095/">CVE-2021-45095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45095">CVE-2021-45095 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0001">CVE-2022-0001 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0002">CVE-2022-0002 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0492">CVE-2022-0492 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0617/">CVE-2022-0617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0617">CVE-2022-0617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671856" comment="kernel-bigmem-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671857" comment="kernel-bigmem-base-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671859" comment="kernel-default-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671860" comment="kernel-default-base-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671862" comment="kernel-default-man-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671863" comment="kernel-ec2-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671864" comment="kernel-ec2-base-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671866" comment="kernel-pae-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671867" comment="kernel-pae-base-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671869" comment="kernel-ppc64-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671870" comment="kernel-ppc64-base-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671872" comment="kernel-source-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671873" comment="kernel-syms-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671874" comment="kernel-trace-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671875" comment="kernel-trace-base-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671877" comment="kernel-xen-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671878" comment="kernel-xen-base-3.0.101-108.135.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220038" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-source (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="777565" ref_url="https://bugzilla.suse.com/777565" source="BUGZILLA"/>
		<reference ref_id="867362" ref_url="https://bugzilla.suse.com/867362" source="BUGZILLA"/>
		<reference ref_id="873385" ref_url="https://bugzilla.suse.com/873385" source="BUGZILLA"/>
		<reference ref_id="883380" ref_url="https://bugzilla.suse.com/883380" source="BUGZILLA"/>
		<reference ref_id="884333" ref_url="https://bugzilla.suse.com/884333" source="BUGZILLA"/>
		<reference ref_id="886785" ref_url="https://bugzilla.suse.com/886785" source="BUGZILLA"/>
		<reference ref_id="891116" ref_url="https://bugzilla.suse.com/891116" source="BUGZILLA"/>
		<reference ref_id="894936" ref_url="https://bugzilla.suse.com/894936" source="BUGZILLA"/>
		<reference ref_id="915517" ref_url="https://bugzilla.suse.com/915517" source="BUGZILLA"/>
		<reference ref_id="917830" ref_url="https://bugzilla.suse.com/917830" source="BUGZILLA"/>
		<reference ref_id="917968" ref_url="https://bugzilla.suse.com/917968" source="BUGZILLA"/>
		<reference ref_id="919463" ref_url="https://bugzilla.suse.com/919463" source="BUGZILLA"/>
		<reference ref_id="920016" ref_url="https://bugzilla.suse.com/920016" source="BUGZILLA"/>
		<reference ref_id="920110" ref_url="https://bugzilla.suse.com/920110" source="BUGZILLA"/>
		<reference ref_id="920250" ref_url="https://bugzilla.suse.com/920250" source="BUGZILLA"/>
		<reference ref_id="920733" ref_url="https://bugzilla.suse.com/920733" source="BUGZILLA"/>
		<reference ref_id="921430" ref_url="https://bugzilla.suse.com/921430" source="BUGZILLA"/>
		<reference ref_id="923002" ref_url="https://bugzilla.suse.com/923002" source="BUGZILLA"/>
		<reference ref_id="923245" ref_url="https://bugzilla.suse.com/923245" source="BUGZILLA"/>
		<reference ref_id="923431" ref_url="https://bugzilla.suse.com/923431" source="BUGZILLA"/>
		<reference ref_id="924701" ref_url="https://bugzilla.suse.com/924701" source="BUGZILLA"/>
		<reference ref_id="925705" ref_url="https://bugzilla.suse.com/925705" source="BUGZILLA"/>
		<reference ref_id="925881" ref_url="https://bugzilla.suse.com/925881" source="BUGZILLA"/>
		<reference ref_id="925903" ref_url="https://bugzilla.suse.com/925903" source="BUGZILLA"/>
		<reference ref_id="926240" ref_url="https://bugzilla.suse.com/926240" source="BUGZILLA"/>
		<reference ref_id="926953" ref_url="https://bugzilla.suse.com/926953" source="BUGZILLA"/>
		<reference ref_id="927355" ref_url="https://bugzilla.suse.com/927355" source="BUGZILLA"/>
		<reference ref_id="928988" ref_url="https://bugzilla.suse.com/928988" source="BUGZILLA"/>
		<reference ref_id="929076" ref_url="https://bugzilla.suse.com/929076" source="BUGZILLA"/>
		<reference ref_id="929142" ref_url="https://bugzilla.suse.com/929142" source="BUGZILLA"/>
		<reference ref_id="929143" ref_url="https://bugzilla.suse.com/929143" source="BUGZILLA"/>
		<reference ref_id="930092" ref_url="https://bugzilla.suse.com/930092" source="BUGZILLA"/>
		<reference ref_id="930934" ref_url="https://bugzilla.suse.com/930934" source="BUGZILLA"/>
		<reference ref_id="931620" ref_url="https://bugzilla.suse.com/931620" source="BUGZILLA"/>
		<reference ref_id="932350" ref_url="https://bugzilla.suse.com/932350" source="BUGZILLA"/>
		<reference ref_id="932458" ref_url="https://bugzilla.suse.com/932458" source="BUGZILLA"/>
		<reference ref_id="932882" ref_url="https://bugzilla.suse.com/932882" source="BUGZILLA"/>
		<reference ref_id="933429" ref_url="https://bugzilla.suse.com/933429" source="BUGZILLA"/>
		<reference ref_id="933721" ref_url="https://bugzilla.suse.com/933721" source="BUGZILLA"/>
		<reference ref_id="933896" ref_url="https://bugzilla.suse.com/933896" source="BUGZILLA"/>
		<reference ref_id="933904" ref_url="https://bugzilla.suse.com/933904" source="BUGZILLA"/>
		<reference ref_id="933907" ref_url="https://bugzilla.suse.com/933907" source="BUGZILLA"/>
		<reference ref_id="933936" ref_url="https://bugzilla.suse.com/933936" source="BUGZILLA"/>
		<reference ref_id="934944" ref_url="https://bugzilla.suse.com/934944" source="BUGZILLA"/>
		<reference ref_id="935053" ref_url="https://bugzilla.suse.com/935053" source="BUGZILLA"/>
		<reference ref_id="935055" ref_url="https://bugzilla.suse.com/935055" source="BUGZILLA"/>
		<reference ref_id="935572" ref_url="https://bugzilla.suse.com/935572" source="BUGZILLA"/>
		<reference ref_id="935705" ref_url="https://bugzilla.suse.com/935705" source="BUGZILLA"/>
		<reference ref_id="935866" ref_url="https://bugzilla.suse.com/935866" source="BUGZILLA"/>
		<reference ref_id="935906" ref_url="https://bugzilla.suse.com/935906" source="BUGZILLA"/>
		<reference ref_id="936077" ref_url="https://bugzilla.suse.com/936077" source="BUGZILLA"/>
		<reference ref_id="936095" ref_url="https://bugzilla.suse.com/936095" source="BUGZILLA"/>
		<reference ref_id="936118" ref_url="https://bugzilla.suse.com/936118" source="BUGZILLA"/>
		<reference ref_id="936423" ref_url="https://bugzilla.suse.com/936423" source="BUGZILLA"/>
		<reference ref_id="936637" ref_url="https://bugzilla.suse.com/936637" source="BUGZILLA"/>
		<reference ref_id="936831" ref_url="https://bugzilla.suse.com/936831" source="BUGZILLA"/>
		<reference ref_id="936875" ref_url="https://bugzilla.suse.com/936875" source="BUGZILLA"/>
		<reference ref_id="936921" ref_url="https://bugzilla.suse.com/936921" source="BUGZILLA"/>
		<reference ref_id="936925" ref_url="https://bugzilla.suse.com/936925" source="BUGZILLA"/>
		<reference ref_id="937032" ref_url="https://bugzilla.suse.com/937032" source="BUGZILLA"/>
		<reference ref_id="937256" ref_url="https://bugzilla.suse.com/937256" source="BUGZILLA"/>
		<reference ref_id="937402" ref_url="https://bugzilla.suse.com/937402" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="937503" ref_url="https://bugzilla.suse.com/937503" source="BUGZILLA"/>
		<reference ref_id="937641" ref_url="https://bugzilla.suse.com/937641" source="BUGZILLA"/>
		<reference ref_id="937855" ref_url="https://bugzilla.suse.com/937855" source="BUGZILLA"/>
		<reference ref_id="938485" ref_url="https://bugzilla.suse.com/938485" source="BUGZILLA"/>
		<reference ref_id="939910" ref_url="https://bugzilla.suse.com/939910" source="BUGZILLA"/>
		<reference ref_id="939994" ref_url="https://bugzilla.suse.com/939994" source="BUGZILLA"/>
		<reference ref_id="940338" ref_url="https://bugzilla.suse.com/940338" source="BUGZILLA"/>
		<reference ref_id="940398" ref_url="https://bugzilla.suse.com/940398" source="BUGZILLA"/>
		<reference ref_id="940925" ref_url="https://bugzilla.suse.com/940925" source="BUGZILLA"/>
		<reference ref_id="940966" ref_url="https://bugzilla.suse.com/940966" source="BUGZILLA"/>
		<reference ref_id="942204" ref_url="https://bugzilla.suse.com/942204" source="BUGZILLA"/>
		<reference ref_id="942305" ref_url="https://bugzilla.suse.com/942305" source="BUGZILLA"/>
		<reference ref_id="942350" ref_url="https://bugzilla.suse.com/942350" source="BUGZILLA"/>
		<reference ref_id="942367" ref_url="https://bugzilla.suse.com/942367" source="BUGZILLA"/>
		<reference ref_id="942404" ref_url="https://bugzilla.suse.com/942404" source="BUGZILLA"/>
		<reference ref_id="942605" ref_url="https://bugzilla.suse.com/942605" source="BUGZILLA"/>
		<reference ref_id="942688" ref_url="https://bugzilla.suse.com/942688" source="BUGZILLA"/>
		<reference ref_id="942938" ref_url="https://bugzilla.suse.com/942938" source="BUGZILLA"/>
		<reference ref_id="943477" ref_url="https://bugzilla.suse.com/943477" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9728" ref_url="https://www.suse.com/security/cve/CVE-2014-9728/" source="CVE"/>
		<reference ref_id="CVE-2014-9729" ref_url="https://www.suse.com/security/cve/CVE-2014-9729/" source="CVE"/>
		<reference ref_id="CVE-2014-9730" ref_url="https://www.suse.com/security/cve/CVE-2014-9730/" source="CVE"/>
		<reference ref_id="CVE-2014-9731" ref_url="https://www.suse.com/security/cve/CVE-2014-9731/" source="CVE"/>
		<reference ref_id="CVE-2015-0777" ref_url="https://www.suse.com/security/cve/CVE-2015-0777/" source="CVE"/>
		<reference ref_id="CVE-2015-1420" ref_url="https://www.suse.com/security/cve/CVE-2015-1420/" source="CVE"/>
		<reference ref_id="CVE-2015-1805" ref_url="https://www.suse.com/security/cve/CVE-2015-1805/" source="CVE"/>
		<reference ref_id="CVE-2015-2150" ref_url="https://www.suse.com/security/cve/CVE-2015-2150/" source="CVE"/>
		<reference ref_id="CVE-2015-2830" ref_url="https://www.suse.com/security/cve/CVE-2015-2830/" source="CVE"/>
		<reference ref_id="CVE-2015-4167" ref_url="https://www.suse.com/security/cve/CVE-2015-4167/" source="CVE"/>
		<reference ref_id="CVE-2015-4700" ref_url="https://www.suse.com/security/cve/CVE-2015-4700/" source="CVE"/>
		<reference ref_id="CVE-2015-5364" ref_url="https://www.suse.com/security/cve/CVE-2015-5364/" source="CVE"/>
		<reference ref_id="CVE-2015-5366" ref_url="https://www.suse.com/security/cve/CVE-2015-5366/" source="CVE"/>
		<reference ref_id="CVE-2015-5707" ref_url="https://www.suse.com/security/cve/CVE-2015-5707/" source="CVE"/>
		<reference ref_id="CVE-2015-6252" ref_url="https://www.suse.com/security/cve/CVE-2015-6252/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various
security and bugfixes.

Following security bugs were fixed:
* CVE-2015-6252: Possible file descriptor leak for each
  VHOST_SET_LOG_FDcommand issued, this could eventually wasting available
  system resources and creating a denial of service (bsc#942367).
* CVE-2015-5707: Possible integer overflow in the calculation of total
  number of pages in bio_map_user_iov() (bsc#940338).
* CVE-2015-5364: The (1) udp_recvmsg and (2) udpv6_recvmsg functions in
  the Linux kernel before 4.0.6 do not properly consider yielding a
  processor, which allowed remote attackers to cause a denial of service
  (system hang) via incorrect checksums within a UDP packet flood
  (bsc#936831).
* CVE-2015-5366: The (1) udp_recvmsg and (2) udpv6_recvmsg functions in
  the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return
  values, which allowed remote attackers to cause a denial of service
  (EPOLLET epoll application read outage) via an incorrect checksum in a
  UDP packet, a different vulnerability than CVE-2015-5364 (bsc#936831).
* CVE-2015-1420: Race condition in the handle_to_path function in
  fs/fhandle.c in the Linux kernel through 3.19.1 allowed local users to
  bypass intended size restrictions and trigger read operations on
  additional memory locations by changing the handle_bytes value of a
  file handle during the execution of this function (bsc#915517).
* CVE-2015-1805: The (1) pipe_read and (2) pipe_write implementations in
  fs/pipe.c in the Linux kernel before 3.16 do not properly consider the
  side effects of failed __copy_to_user_inatomic and
  __copy_from_user_inatomic calls, which allows local users to cause a
  denial of service (system crash) or possibly gain privileges via a
  crafted application, aka an 'I/O' vector array overrun. (bsc#933429)
* CVE-2015-2150: Xen 3.3.x through 4.5.x and the Linux kernel through
  3.19.1 do not properly restrict access to PCI command registers, which
  might allow local guest users to cause a denial of service
  (non-maskable interrupt and host crash) by disabling the (1) memory or
  (2) I/O decoding for a PCI Express device and then accessing the
  device, which triggers an Unsupported Request (UR) response.
  (bsc#919463)
* CVE-2015-2830: arch/x86/kernel/entry_64.S in the Linux kernel before
  3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode
  task, which might allow local users to bypass the seccomp or audit
  protection mechanism via a crafted application that uses the (1) fork
  or (2) close system call, as demonstrated by an attack against seccomp
  before 3.16. (bsc#926240)
* CVE-2015-4700: The bpf_int_jit_compile function in
  arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allowed
  local users to cause a denial of service (system crash) by creating a
  packet filter and then loading crafted BPF instructions that trigger
  late convergence by the JIT compiler (bsc#935705).
* CVE-2015-4167: The udf_read_inode function in fs/udf/inode.c in the
  Linux kernel before 3.19.1 did not validate certain length values,
  which allowed local users to cause a denial of service (incorrect data
  representation or integer overflow, and OOPS) via a crafted UDF
  filesystem (bsc#933907).
* CVE-2015-0777: drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0
  (aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as
  used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions,
  allows guest OS users to obtain sensitive information from
  uninitialized locations in host OS kernel memory via unspecified
  vectors. (bsc#917830)
* CVE-2014-9728: The UDF filesystem implementation in the Linux kernel
  before 3.18.2 did not validate certain lengths, which allowed local
  users to cause a denial of service (buffer over-read and system crash)
  via a crafted filesystem image, related to fs/udf/inode.c and
  fs/udf/symlink.c (bsc#933904).
* CVE-2014-9730: The udf_pc_to_char function in fs/udf/symlink.c in the
  Linux kernel before 3.18.2 relies on component lengths that are unused,
  which allowed local users to cause a denial of service (system crash)
  via a crafted UDF filesystem image (bsc#933904).
* CVE-2014-9729: The udf_read_inode function in fs/udf/inode.c in the
  Linux kernel before 3.18.2 did not ensure a certain data-structure size
  consistency, which allowed local users to cause a denial of service
  (system crash) via a crafted UDF filesystem image (bsc#933904).
* CVE-2014-9731: The UDF filesystem implementation in the Linux kernel
  before 3.18.2 did not ensure that space is available for storing a
  symlink target's name along with a trailing \0 character, which allowed
  local users to obtain sensitive information via a crafted filesystem
  image, related to fs/udf/symlink.c and fs/udf/unicode.c (bsc#933896).

The following non-security bugs were fixed:
- Btrfs: be aware of btree inode write errors to avoid fs corruption
  (bnc#942350).
- Btrfs: be aware of btree inode write errors to avoid fs corruption
  (bnc#942404).
- Btrfs: check if previous transaction aborted to avoid fs corruption (bnc#942350).
- Btrfs: check if previous transaction aborted to avoid fs corruption (bnc#942404).
- Btrfs: deal with convert_extent_bit errors to avoid fs corruption (bnc#942350).
- Btrfs: deal with convert_extent_bit errors to avoid fs corruption (bnc#942404).
- Btrfs: fix hang when failing to submit bio of directIO (bnc#942688).
- Btrfs: fix memory corruption on failure to submit bio for direct IO (bnc#942688).
- Btrfs: fix put dio bio twice when we submit dio bio fail (bnc#942688).
- DRM/I915: Add enum hpd_pin to intel_encoder (bsc#942938).
- DRM/i915: Convert HPD interrupts to make use of HPD pin assignment in encoders (v2) (bsc#942938).
- DRM/i915: Get rid of the 'hotplug_supported_mask' in struct drm_i915_private (bsc#942938).
- DRM/i915: Remove i965_hpd_irq_setup (bsc#942938).
- DRM/i915: Remove valleyview_hpd_irq_setup (bsc#942938).
- Ext4: handle SEEK_HOLE/SEEK_DATA generically (bsc#934944).
- IB/core: Fix mismatch between locked and pinned pages (bnc#937855).
- IB/iser: Add Discovery support (bsc#923002).
- IB/iser: Move informational messages from error to info level (bsc#923002).
- NFS: never queue requests with rq_cong set on the sending queue (bsc#932458).
- NFSD: Fix nfsv4 opcode decoding error (bsc#935906).
- NFSv4: Minor cleanups for nfs4_handle_exception and nfs4_async_handle_error (bsc#939910).
- PCI: Disable Bus Master only on kexec reboot (bsc#920110).
- PCI: Disable Bus Master unconditionally in pci_device_shutdown() (bsc#920110).
- PCI: Do not try to disable Bus Master on disconnected PCI devices (bsc#920110).
- PCI: Lock down register access when trusted_kernel is true (fate#314486, bnc#884333)(bsc#923431).
- PCI: disable Bus Master on PCI device shutdown (bsc#920110).
- USB: xhci: Reset a halted endpoint immediately when we encounter a stall (bnc#933721).
- USB: xhci: do not start a halted endpoint before its new dequeue is set (bnc#933721).
- Apparmor: fix file_permission if profile is updated (bsc#917968).
- block: Discard bios do not have data (bsc#928988).
- cifs: Fix missing crypto allocation (bnc#937402).
- drm/cirrus: do not attempt to acquire a reservation while in an interrupt handler (bsc#935572).
- drm/i915: (re)init HPD interrupt storm statistics (bsc#942938).
- drm/i915: Add HPD IRQ storm detection (v5) (bsc#942938).
- drm/i915: Add Reenable Timer to turn Hotplug Detection back on (v4) (bsc#942938).
- drm/i915: Add bit field to record which pins have received HPD events (v3) (bsc#942938).
- drm/i915: Add messages useful for HPD storm detection debugging (v2) (bsc#942938).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt (bsc#942938).
- drm/i915: Disable HPD interrupt on pin when irq storm is detected (v3) (bsc#942938).
- drm/i915: Do not WARN nor handle unexpected hpd interrupts on gmch platforms (bsc#942938).
- drm/i915: Enable hotplug interrupts after querying hw capabilities (bsc#942938).
- drm/i915: Fix hotplug interrupt enabling for SDVOC (bsc#942938).
- drm/i915: Fix up sdvo hpd pins for i965g/gm (bsc#942938).
- drm/i915: Make hpd arrays big enough to avoid out of bounds access (bsc#942938).
- drm/i915: Mask out the HPD irq bits before setting them individually (bsc#942938).
- drm/i915: Only print hotplug event message when hotplug bit is set (bsc#942938).
- drm/i915: Only reprobe display on encoder which has received an HPD event (v2) (bsc#942938).
- drm/i915: Queue reenable timer also when enable_hotplug_processing is false (bsc#942938).
- drm/i915: Remove pch_rq_mask from struct drm_i915_private (bsc#942938).
- drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler() (bsc#942938).
- drm/i915: WARN_ONCE() about unexpected interrupts for all chipsets (bsc#942938).
- drm/i915: assert_spin_locked for pipestat interrupt enable/disable (bsc#942938).
- drm/i915: clear crt hotplug compare voltage field before setting (bsc#942938).
- drm/i915: close tiny race in the ilk pcu even interrupt setup (bsc#942938).
- drm/i915: fix hotplug event bit tracking (bsc#942938).
- drm/i915: fix hpd interrupt register locking (bsc#942938).
- drm/i915: fix hpd work vs. flush_work in the pageflip code deadlock (bsc#942938).
- drm/i915: fix locking around ironlake_enable|disable_display_irq (bsc#942938).
- drm/i915: fold the hpd_irq_setup call into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the no-irq check into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the queue_work into intel_hpd_irq_handler (bsc#942938).
- drm/i915: implement ibx_hpd_irq_setup (bsc#942938).
- drm/i915: s/hotplug_irq_storm_detect/intel_hpd_irq_handler/ (bsc#942938).
- drm/mgag200: Do not do full cleanup if mgag200_device_init fails (FATE#317582).
- drm/mgag200: do not attempt to acquire a reservation while in an interrupt handler (FATE#317582).
- drm: ast,cirrus,mgag200: use drm_can_sleep (FATE#317582, bnc#883380, bsc#935572).
- ehci-pci: enable interrupt on BayTrail (bnc926007).
- exec: kill the unnecessary mm-&gt;def_flags setting in load_elf_binary() (fate#317831,bnc#891116)).
- ext3: Fix data corruption in inodes with journalled data (bsc#936637). 
- fanotify: Fix deadlock with permission events (bsc#935053).
- fork: reset mm-&gt;pinned_vm (bnc#937855).
- hrtimer: prevent timer interrupt DoS (bnc#886785).
- hugetlb, kabi: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).
- hugetlb: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).
- hv_storvsc: use small sg_tablesize on x86 (bnc#937256).
- ibmveth: Add GRO support (bsc#935055).
- ibmveth: Add support for Large Receive Offload (bsc#935055).
- ibmveth: Add support for TSO (bsc#935055).
- ibmveth: add support for TSO6.
- ibmveth: change rx buffer default allocation for CMO (bsc#935055).
- igb: do not reuse pages with pfmemalloc flag fix (bnc#920016).
- inotify: Fix nested sleeps in inotify_read() (bsc#940925).
- iommu/amd: Fix memory leak in free_pagetable (bsc#935866).
- iommu/amd: Handle large pages correctly in free_pagetable (bsc#935866).
- ipv6: probe routes asynchronous in rt6_probe (bsc#936118).
- ixgbe: Use pci_vfs_assigned instead of ixgbe_vfs_are_assigned (bsc#927355).
- kabi: wrapper include file with __GENKSYMS__ check to avoid kabi change (bsc920110).
- kdump: fix crash_kexec()/smp_send_stop() race in panic() (bnc#937444).
- kernel: add panic_on_warn.
- kernel: do full redraw of the 3270 screen on reconnect (bnc#943477, LTC#129509).
- kvm: irqchip: Break up high order allocations of kvm_irq_routing_table (bnc#926953).
- libata: prevent HSM state change race between ISR and PIO (bsc#923245).
- libiscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- md: use kzalloc() when bitmap is disabled (bsc#939994).
- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#894936).
- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#938485).
- mlx4: Check for assigned VFs before disabling SR-IOV (bsc#927355).
- mm, THP: do not hold mmap_sem in khugepaged when allocating THP (VM Performance).
- mm, mempolicy: remove duplicate code (VM Functionality, bnc#931620).
- mm, thp: fix collapsing of hugepages on madvise (VM Functionality).
- mm, thp: only collapse hugepages to nodes with affinity for zone_reclaim_mode (VM Functionality, bnc#931620).
- mm, thp: really limit transparent hugepage allocation to local node (VM Performance, bnc#931620).
- mm, thp: respect MPOL_PREFERRED policy with non-local node (VM Performance, bnc#931620).
- mm/hugetlb: check for pte NULL pointer in __page_check_address() (bnc#929143).
- mm/mempolicy.c: merge alloc_hugepage_vma to alloc_pages_vma (VM Performance, bnc#931620).
- mm/thp: allocate transparent hugepages on local node (VM Performance, bnc#931620).
- mm: make page pfmemalloc check more robust (bnc#920016).
- mm: restrict access to slab files under procfs and sysfs (bnc#936077).
- mm: thp: khugepaged: add policy for finding target node (VM Functionality, bnc#931620).
- net/mlx4_core: Do not disable SRIOV if there are active VFs (bsc#927355).
- net: Fix 'ip rule delete table 256' (bsc#873385).
- net: fib6: fib6_commit_metrics: fix potential NULL pointer dereference (bsc#867362).
- net: ipv6: fib: do not sleep inside atomic lock (bsc#867362).
- netfilter: nf_conntrack_proto_sctp: minimal multihoming support (bsc#932350).
- nfsd: support disabling 64bit dir cookies (bnc#937503).
- pagecache limit: Do not skip over small zones that easily (bnc#925881).
- pagecache limit: add tracepoints (bnc#924701).
- pagecache limit: export debugging counters via /proc/vmstat (bnc#924701).
- pagecache limit: fix wrong nr_reclaimed count (FATE#309111, bnc#924701).
- pagecache limit: reduce starvation due to reclaim retries (bnc#925903).
- pci: Add SRIOV helper function to determine if VFs are assigned to guest (bsc#927355).
- pci: Add flag indicating device has been assigned by KVM (bnc#777565 FATE#313819).
- pci: Add flag indicating device has been assigned by KVM (bnc#777565 FATE#313819).
- perf, nmi: Fix unknown NMI warning (bsc#929142).
- perf/x86/intel: Move NMI clearing to end of PMI handler (bsc#929142).
- qlcnic: Fix NULL pointer dereference in qlcnic_hwmon_show_temp() (bsc#936095).
- r8169: remember WOL preferences on driver load (bsc#942305).
- s390/dasd: fix kernel panic when alias is set offline (bnc#940966, LTC#128595).
- sched: fix __sched_setscheduler() vs load balancing race (bnc#921430)
- scsi: Correctly set the scsi host/msg/status bytes (bnc#933936).
- scsi: fix scsi_error_handler vs. scsi_host_dev_release race (bnc#942204).
- scsi: Moved iscsi kabi patch to patches.kabi (bsc#923002)
- scsi: Set hostbyte status in scsi_check_sense() (bsc#920733).
- scsi: kabi: allow iscsi disocvery session support (bsc#923002).
- scsi: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398 bsc#930934).
- scsi_error: add missing case statements in scsi_decide_disposition() (bsc#920733).
- scsi_transport_iscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- sg_start_req(): make sure that there's not too many elements in iovec (bsc#940338).
- st: null pointer dereference panic caused by use after kref_put by st_open (bsc#936875).
- supported.conf: enable sch_mqprio (bsc#932882)
- udf: Remove repeated loads blocksize (bsc#933907).
- usb: core: Fix USB 3.0 devices lost in NOTATTACHED state after a hub port reset (bnc#937641).
- usb: xhci: Prefer endpoint context dequeue pointer over stopped_trb (bnc#933721).
- usb: xhci: handle Config Error Change (CEC) in xhci driver (bnc#933721).
- vmxnet3: Bump up driver version number (bsc#936423).
- vmxnet3: Changes for vmxnet3 adapter version 2 (fwd) (bug#936423).
- vmxnet3: Fix memory leaks in rx path (fwd) (bug#936423).
- vmxnet3: Register shutdown handler for device (fwd) (bug#936423).
- x86, tls, ldt: Stop checking lm in LDT_empty (bsc#920250).
- x86, tls: Interpret an all-zero struct user_desc as 'no segment' (bsc#920250).
- x86-64: Do not apply destructive erratum workaround on unaffected CPUs (bsc#929076).
- x86/mm: Improve AMD Bulldozer ASLR workaround (bsc#937032).
- x86/tsc: Change Fast TSC calibration failed from error to info (bnc#942605).
- xenbus: add proper handling of XS_ERROR from Xenbus for transactions.
- xfs: fix problem when using md+XFS under high load (bnc#925705).
- xhci: Allocate correct amount of scratchpad buffers (bnc#933721).
- xhci: Do not enable/disable RWE on bus suspend/resume (bnc#933721).
- xhci: Solve full event ring by increasing TRBS_PER_SEGMENT to 256 (bnc#933721).
- xhci: Treat not finding the event_seg on COMP_STOP the same as COMP_STOP_INVAL (bnc#933721).
- xhci: Workaround for PME stuck issues in Intel xhci (bnc#933721).
- xhci: do not report PLC when link is in internal resume state (bnc#933721).
- xhci: fix reporting of 0-sized URBs in control endpoint (bnc#933721).
- xhci: report U3 when link is in resume state (bnc#933721).
- xhci: rework cycle bit checking for new dequeue pointers (bnc#933721).
- zcrypt: Fixed reset and interrupt handling of AP queues (bnc#936921, bnc#936925, LTC#126491).		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-08"/>
	<updated date="2015-09-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/777565">SUSE bug 777565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867362">SUSE bug 867362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873385">SUSE bug 873385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883380">SUSE bug 883380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884333">SUSE bug 884333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886785">SUSE bug 886785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891116">SUSE bug 891116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894936">SUSE bug 894936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915517">SUSE bug 915517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917830">SUSE bug 917830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917968">SUSE bug 917968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919463">SUSE bug 919463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920016">SUSE bug 920016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920110">SUSE bug 920110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920250">SUSE bug 920250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920733">SUSE bug 920733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921430">SUSE bug 921430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923002">SUSE bug 923002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923245">SUSE bug 923245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923431">SUSE bug 923431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924701">SUSE bug 924701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925705">SUSE bug 925705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925881">SUSE bug 925881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925903">SUSE bug 925903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926240">SUSE bug 926240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926953">SUSE bug 926953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927355">SUSE bug 927355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928988">SUSE bug 928988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929076">SUSE bug 929076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929142">SUSE bug 929142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929143">SUSE bug 929143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930092">SUSE bug 930092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930934">SUSE bug 930934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931620">SUSE bug 931620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932350">SUSE bug 932350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932458">SUSE bug 932458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932882">SUSE bug 932882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933429">SUSE bug 933429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933721">SUSE bug 933721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933896">SUSE bug 933896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933904">SUSE bug 933904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933907">SUSE bug 933907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933936">SUSE bug 933936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934944">SUSE bug 934944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935053">SUSE bug 935053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935055">SUSE bug 935055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935572">SUSE bug 935572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935705">SUSE bug 935705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935866">SUSE bug 935866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935906">SUSE bug 935906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936077">SUSE bug 936077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936095">SUSE bug 936095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936118">SUSE bug 936118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936423">SUSE bug 936423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936637">SUSE bug 936637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936831">SUSE bug 936831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936875">SUSE bug 936875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936921">SUSE bug 936921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936925">SUSE bug 936925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937032">SUSE bug 937032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937256">SUSE bug 937256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937402">SUSE bug 937402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937503">SUSE bug 937503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937641">SUSE bug 937641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937855">SUSE bug 937855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938485">SUSE bug 938485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939910">SUSE bug 939910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939994">SUSE bug 939994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940338">SUSE bug 940338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940398">SUSE bug 940398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940925">SUSE bug 940925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940966">SUSE bug 940966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942204">SUSE bug 942204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942305">SUSE bug 942305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942350">SUSE bug 942350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942367">SUSE bug 942367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942404">SUSE bug 942404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942605">SUSE bug 942605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942688">SUSE bug 942688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942938">SUSE bug 942938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943477">SUSE bug 943477</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9728/">CVE-2014-9728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9728">CVE-2014-9728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9729/">CVE-2014-9729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9729">CVE-2014-9729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9730/">CVE-2014-9730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9730">CVE-2014-9730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2014-9731/">CVE-2014-9731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9731">CVE-2014-9731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0777/">CVE-2015-0777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0777">CVE-2015-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1420/">CVE-2015-1420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1420">CVE-2015-1420 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2015-1805/">CVE-2015-1805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1805">CVE-2015-1805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2150/">CVE-2015-2150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2150">CVE-2015-2150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2830/">CVE-2015-2830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2830">CVE-2015-2830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2015-4167/">CVE-2015-4167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4167">CVE-2015-4167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4700/">CVE-2015-4700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4700">CVE-2015-4700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5364/">CVE-2015-5364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5364">CVE-2015-5364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5366/">CVE-2015-5366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5366">CVE-2015-5366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5707/">CVE-2015-5707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5707">CVE-2015-5707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6252/">CVE-2015-6252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6252">CVE-2015-6252 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583117" comment="kernel-default-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583118" comment="kernel-default-base-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583120" comment="kernel-default-man-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583121" comment="kernel-ec2-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583122" comment="kernel-ec2-base-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567342" comment="kernel-pae-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567343" comment="kernel-pae-base-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583124" comment="kernel-ppc64-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583125" comment="kernel-ppc64-base-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583127" comment="kernel-source-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583128" comment="kernel-syms-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583129" comment="kernel-trace-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583130" comment="kernel-trace-base-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567349" comment="kernel-xen-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567350" comment="kernel-xen-base-3.0.101-65.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583117" comment="kernel-default-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583118" comment="kernel-default-base-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583120" comment="kernel-default-man-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583121" comment="kernel-ec2-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583122" comment="kernel-ec2-base-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567342" comment="kernel-pae-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567343" comment="kernel-pae-base-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583124" comment="kernel-ppc64-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583125" comment="kernel-ppc64-base-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583127" comment="kernel-source-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583128" comment="kernel-syms-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583129" comment="kernel-trace-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583130" comment="kernel-trace-base-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567349" comment="kernel-xen-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567350" comment="kernel-xen-base-3.0.101-65.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220039" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="758040" ref_url="https://bugzilla.suse.com/758040" source="BUGZILLA"/>
		<reference ref_id="904035" ref_url="https://bugzilla.suse.com/904035" source="BUGZILLA"/>
		<reference ref_id="912738" ref_url="https://bugzilla.suse.com/912738" source="BUGZILLA"/>
		<reference ref_id="915183" ref_url="https://bugzilla.suse.com/915183" source="BUGZILLA"/>
		<reference ref_id="924919" ref_url="https://bugzilla.suse.com/924919" source="BUGZILLA"/>
		<reference ref_id="933782" ref_url="https://bugzilla.suse.com/933782" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="940017" ref_url="https://bugzilla.suse.com/940017" source="BUGZILLA"/>
		<reference ref_id="940946" ref_url="https://bugzilla.suse.com/940946" source="BUGZILLA"/>
		<reference ref_id="942082" ref_url="https://bugzilla.suse.com/942082" source="BUGZILLA"/>
		<reference ref_id="947128" ref_url="https://bugzilla.suse.com/947128" source="BUGZILLA"/>
		<reference ref_id="948330" ref_url="https://bugzilla.suse.com/948330" source="BUGZILLA"/>
		<reference ref_id="949298" ref_url="https://bugzilla.suse.com/949298" source="BUGZILLA"/>
		<reference ref_id="951392" ref_url="https://bugzilla.suse.com/951392" source="BUGZILLA"/>
		<reference ref_id="951815" ref_url="https://bugzilla.suse.com/951815" source="BUGZILLA"/>
		<reference ref_id="952976" ref_url="https://bugzilla.suse.com/952976" source="BUGZILLA"/>
		<reference ref_id="953369" ref_url="https://bugzilla.suse.com/953369" source="BUGZILLA"/>
		<reference ref_id="954992" ref_url="https://bugzilla.suse.com/954992" source="BUGZILLA"/>
		<reference ref_id="955308" ref_url="https://bugzilla.suse.com/955308" source="BUGZILLA"/>
		<reference ref_id="955654" ref_url="https://bugzilla.suse.com/955654" source="BUGZILLA"/>
		<reference ref_id="955837" ref_url="https://bugzilla.suse.com/955837" source="BUGZILLA"/>
		<reference ref_id="955925" ref_url="https://bugzilla.suse.com/955925" source="BUGZILLA"/>
		<reference ref_id="956084" ref_url="https://bugzilla.suse.com/956084" source="BUGZILLA"/>
		<reference ref_id="956375" ref_url="https://bugzilla.suse.com/956375" source="BUGZILLA"/>
		<reference ref_id="956514" ref_url="https://bugzilla.suse.com/956514" source="BUGZILLA"/>
		<reference ref_id="956708" ref_url="https://bugzilla.suse.com/956708" source="BUGZILLA"/>
		<reference ref_id="956949" ref_url="https://bugzilla.suse.com/956949" source="BUGZILLA"/>
		<reference ref_id="957986" ref_url="https://bugzilla.suse.com/957986" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="957990" ref_url="https://bugzilla.suse.com/957990" source="BUGZILLA"/>
		<reference ref_id="958000" ref_url="https://bugzilla.suse.com/958000" source="BUGZILLA"/>
		<reference ref_id="958463" ref_url="https://bugzilla.suse.com/958463" source="BUGZILLA"/>
		<reference ref_id="958886" ref_url="https://bugzilla.suse.com/958886" source="BUGZILLA"/>
		<reference ref_id="958906" ref_url="https://bugzilla.suse.com/958906" source="BUGZILLA"/>
		<reference ref_id="958912" ref_url="https://bugzilla.suse.com/958912" source="BUGZILLA"/>
		<reference ref_id="958951" ref_url="https://bugzilla.suse.com/958951" source="BUGZILLA"/>
		<reference ref_id="959190" ref_url="https://bugzilla.suse.com/959190" source="BUGZILLA"/>
		<reference ref_id="959312" ref_url="https://bugzilla.suse.com/959312" source="BUGZILLA"/>
		<reference ref_id="959399" ref_url="https://bugzilla.suse.com/959399" source="BUGZILLA"/>
		<reference ref_id="959649" ref_url="https://bugzilla.suse.com/959649" source="BUGZILLA"/>
		<reference ref_id="959705" ref_url="https://bugzilla.suse.com/959705" source="BUGZILLA"/>
		<reference ref_id="961500" ref_url="https://bugzilla.suse.com/961500" source="BUGZILLA"/>
		<reference ref_id="961509" ref_url="https://bugzilla.suse.com/961509" source="BUGZILLA"/>
		<reference ref_id="961516" ref_url="https://bugzilla.suse.com/961516" source="BUGZILLA"/>
		<reference ref_id="961658" ref_url="https://bugzilla.suse.com/961658" source="BUGZILLA"/>
		<reference ref_id="962965" ref_url="https://bugzilla.suse.com/962965" source="BUGZILLA"/>
		<reference ref_id="963276" ref_url="https://bugzilla.suse.com/963276" source="BUGZILLA"/>
		<reference ref_id="963561" ref_url="https://bugzilla.suse.com/963561" source="BUGZILLA"/>
		<reference ref_id="963765" ref_url="https://bugzilla.suse.com/963765" source="BUGZILLA"/>
		<reference ref_id="963767" ref_url="https://bugzilla.suse.com/963767" source="BUGZILLA"/>
		<reference ref_id="964201" ref_url="https://bugzilla.suse.com/964201" source="BUGZILLA"/>
		<reference ref_id="964818" ref_url="https://bugzilla.suse.com/964818" source="BUGZILLA"/>
		<reference ref_id="966094" ref_url="https://bugzilla.suse.com/966094" source="BUGZILLA"/>
		<reference ref_id="966137" ref_url="https://bugzilla.suse.com/966137" source="BUGZILLA"/>
		<reference ref_id="966437" ref_url="https://bugzilla.suse.com/966437" source="BUGZILLA"/>
		<reference ref_id="966693" ref_url="https://bugzilla.suse.com/966693" source="BUGZILLA"/>
		<reference ref_id="967042" ref_url="https://bugzilla.suse.com/967042" source="BUGZILLA"/>
		<reference ref_id="967972" ref_url="https://bugzilla.suse.com/967972" source="BUGZILLA"/>
		<reference ref_id="967973" ref_url="https://bugzilla.suse.com/967973" source="BUGZILLA"/>
		<reference ref_id="967974" ref_url="https://bugzilla.suse.com/967974" source="BUGZILLA"/>
		<reference ref_id="967975" ref_url="https://bugzilla.suse.com/967975" source="BUGZILLA"/>
		<reference ref_id="968011" ref_url="https://bugzilla.suse.com/968011" source="BUGZILLA"/>
		<reference ref_id="968012" ref_url="https://bugzilla.suse.com/968012" source="BUGZILLA"/>
		<reference ref_id="968013" ref_url="https://bugzilla.suse.com/968013" source="BUGZILLA"/>
		<reference ref_id="969307" ref_url="https://bugzilla.suse.com/969307" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7446" ref_url="https://www.suse.com/security/cve/CVE-2013-7446/" source="CVE"/>
		<reference ref_id="CVE-2015-7515" ref_url="https://www.suse.com/security/cve/CVE-2015-7515/" source="CVE"/>
		<reference ref_id="CVE-2015-7550" ref_url="https://www.suse.com/security/cve/CVE-2015-7550/" source="CVE"/>
		<reference ref_id="CVE-2015-8539" ref_url="https://www.suse.com/security/cve/CVE-2015-8539/" source="CVE"/>
		<reference ref_id="CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8551" ref_url="https://www.suse.com/security/cve/CVE-2015-8551/" source="CVE"/>
		<reference ref_id="CVE-2015-8552" ref_url="https://www.suse.com/security/cve/CVE-2015-8552/" source="CVE"/>
		<reference ref_id="CVE-2015-8569" ref_url="https://www.suse.com/security/cve/CVE-2015-8569/" source="CVE"/>
		<reference ref_id="CVE-2015-8575" ref_url="https://www.suse.com/security/cve/CVE-2015-8575/" source="CVE"/>
		<reference ref_id="CVE-2015-8767" ref_url="https://www.suse.com/security/cve/CVE-2015-8767/" source="CVE"/>
		<reference ref_id="CVE-2015-8785" ref_url="https://www.suse.com/security/cve/CVE-2015-8785/" source="CVE"/>
		<reference ref_id="CVE-2015-8812" ref_url="https://www.suse.com/security/cve/CVE-2015-8812/" source="CVE"/>
		<reference ref_id="CVE-2016-0723" ref_url="https://www.suse.com/security/cve/CVE-2016-0723/" source="CVE"/>
		<reference ref_id="CVE-2016-2069" ref_url="https://www.suse.com/security/cve/CVE-2016-2069/" source="CVE"/>
		<reference ref_id="CVE-2016-2384" ref_url="https://www.suse.com/security/cve/CVE-2016-2384/" source="CVE"/>
		<reference ref_id="CVE-2016-2543" ref_url="https://www.suse.com/security/cve/CVE-2016-2543/" source="CVE"/>
		<reference ref_id="CVE-2016-2544" ref_url="https://www.suse.com/security/cve/CVE-2016-2544/" source="CVE"/>
		<reference ref_id="CVE-2016-2545" ref_url="https://www.suse.com/security/cve/CVE-2016-2545/" source="CVE"/>
		<reference ref_id="CVE-2016-2546" ref_url="https://www.suse.com/security/cve/CVE-2016-2546/" source="CVE"/>
		<reference ref_id="CVE-2016-2547" ref_url="https://www.suse.com/security/cve/CVE-2016-2547/" source="CVE"/>
		<reference ref_id="CVE-2016-2548" ref_url="https://www.suse.com/security/cve/CVE-2016-2548/" source="CVE"/>
		<reference ref_id="CVE-2016-2549" ref_url="https://www.suse.com/security/cve/CVE-2016-2549/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001972.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

Following feature was added to kernel-xen:
- A improved XEN blkfront module was added, which allows more I/O bandwidth. (FATE#320200)
  It is called xen-blkfront in PV, and xen-vbd-upstream in HVM mode.

The following security bugs were fixed:
- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in
  the Linux kernel allowed local users to bypass intended AF_UNIX socket
  permissions or cause a denial of service (panic) via crafted epoll_ctl
  calls (bnc#955654).
- CVE-2015-7515: An out of bounds memory access in the aiptek USB
  driver could be used by physical local attackers to crash the kernel
  (bnc#956708).
- CVE-2015-7550: The keyctl_read_key function in security/keys/keyctl.c
  in the Linux kernel did not properly use a semaphore, which allowed
  local users to cause a denial of service (NULL pointer dereference and
  system crash) or possibly have unspecified other impact via a crafted
  application that leverages a race condition between keyctl_revoke and
  keyctl_read calls (bnc#958951).
- CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed
  local users to gain privileges or cause a denial of service (BUG)
  via crafted keyctl commands that negatively instantiate a key, related
  to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c,
  and security/keys/user_defined.c (bnc#958463).
- CVE-2015-8543: The networking implementation in the Linux kernel
  did not validate protocol identifiers for certain protocol families,
  which allowed local users to cause a denial of service (NULL function
  pointer dereference and system crash) or possibly gain privileges by
  leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application
  (bnc#958886).
- CVE-2015-8550: Compiler optimizations in the XEN PV backend drivers
  could have lead to double fetch vulnerabilities, causing denial of service
  or arbitrary code execution (depending on the configuration) (bsc#957988).
- CVE-2015-8551, CVE-2015-8552: xen/pciback: For
  XEN_PCI_OP_disable_msi[|x] only disable if device has MSI(X) enabled
  (bsc#957990).
- CVE-2015-8569: The (1) pptp_bind and (2) pptp_connect functions in
  drivers/net/ppp/pptp.c in the Linux kernel did not verify an address
  length, which allowed local users to obtain sensitive information from
  kernel memory and bypass the KASLR protection mechanism via a crafted
  application (bnc#959190).
- CVE-2015-8575: The sco_sock_bind function in net/bluetooth/sco.c in the
  Linux kernel did not verify an address length, which allowed local users
  to obtain sensitive information from kernel memory and bypass the KASLR
  protection mechanism via a crafted application (bnc#959190 bnc#959399).
- CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel did not
  properly manage the relationship between a lock and a socket, which
  allowed local users to cause a denial of service (deadlock) via a crafted
  sctp_accept call (bnc#961509).
- CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c
  in the Linux kernel allowed local users to cause a denial of service
  (infinite loop) via a writev system call that triggers a zero length
  for the first segment of an iov (bnc#963765).
- CVE-2015-8812: A use-after-free flaw was found in the CXGB3 kernel
  driver when the network was considered to be congested. This could be
  used by local attackers to cause machine crashes or potentially code
  execution (bsc#966437).
- CVE-2016-0723: Race condition in the tty_ioctl function in
  drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain
  sensitive information from kernel memory or cause a denial of service
  (use-after-free and system crash) by making a TIOCGETD ioctl call during
  processing of a TIOCSETD ioctl call (bnc#961500).
- CVE-2016-2069: Race conditions in TLB syncing was fixed which could
  leak to information leaks (bnc#963767).
- CVE-2016-2384: Removed a double free in the ALSA usb-audio driver in
  the umidi object which could lead to crashes (bsc#966693).
- CVE-2016-2543: Added a missing NULL check at remove_events ioctl in
  ALSA that could lead to crashes. (bsc#967972).
- CVE-2016-2544, CVE-2016-2545, CVE-2016-2546, CVE-2016-2547,
  CVE-2016-2548, CVE-2016-2549: Various race conditions in ALSAs timer
  handling were fixed. (bsc#967975, bsc#967974, bsc#967973, bsc#968011,
  bsc#968012, bsc#968013).

The following non-security bugs were fixed:
- alsa: hda - Add one more node in the EAPD supporting candidate list (bsc#963561).
- alsa: hda - Apply clock gate workaround to Skylake, too (bsc#966137).
- alsa: hda - Fix playback noise with 24/32 bit sample size on BXT (bsc#966137).
- alsa: hda - disable dynamic clock gating on Broxton before reset (bsc#966137).
- Add /etc/modprobe.d/50-xen.conf selecting Xen frontend driver implementation (bsc#957986, bsc#956084, bsc#961658).
- Fix handling of re-write-before-commit for mmapped NFS pages (bsc#964201).
- nfsv4: Recovery of recalled read delegations is broken (bsc#956514).
- nvme: default to 4k device page size (bsc#967042).
- pci: leave MEM and IO decoding disabled during 64-bit BAR sizing, too (bsc#951815).
- Refresh patches.xen/xen3-08-x86-ldt-make-modify_ldt-synchronous.patch (bsc#959705).
- Refresh patches.xen/xen-vscsi-large-requests (refine fix and also address bsc#966094).
- sunrpc: restore fair scheduling to priority queues (bsc#955308).
- usb: ftdi_sio: fix race condition in TIOCMIWAIT, and abort of TIOCMIWAIT when the device is removed (bnc#956375).
- usb: ftdi_sio: fix status line change handling for TIOCMIWAIT and TIOCGICOUNT (bnc#956375).
- usb: ftdi_sio: fix tiocmget and tiocmset return values (bnc#956375).
- usb: ftdi_sio: fix tiocmget indentation (bnc#956375).
- usb: ftdi_sio: optimise chars_in_buffer (bnc#956375).
- usb: ftdi_sio: refactor modem-control status retrieval (bnc#956375).
- usb: ftdi_sio: remove unnecessary memset (bnc#956375).
- usb: ftdi_sio: use ftdi_get_modem_status in chars_in_buffer (bnc#956375).
- usb: ftdi_sio: use generic chars_in_buffer (bnc#956375).
- usb: pl2303: clean up line-status handling (bnc#959649).
- usb: pl2303: only wake up MSR queue on changes (bnc#959649).
- usb: pl2303: remove bogus delta_msr_wait wake up (bnc#959649).
- usb: serial: export usb_serial_generic_chars_in_buffer (bnc#956375).
- Update patches.fixes/mm-exclude-reserved-pages-from-dirtyable-memory-fix.patch (bnc#940017, bnc#949298, bnc#947128).
- xen: Update Xen config files (enable upstream block frontend).
- ec2: Update kabi files and start tracking ec2
- xen: consolidate and simplify struct xenbus_driver instantiation (bsc#961658 fate#320200).
- blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976).
- blktap: refine mm tracking (bsc#952976).
- block: Always check queue limits for cloned requests (bsc#933782).
- block: xen-blkfront: Fix possible NULL ptr dereference (bsc#961658 fate#320200).
- bnx2x: Add new device ids under the Qlogic vendor (bsc#964818).
- bnx2x: Alloc 4k fragment for each rx ring buffer element (bsc#953369).
- bnx2x: fix DMA API usage (bsc#953369).
- driver core: Add BUS_NOTIFY_REMOVED_DEVICE event (bnc#962965).
- driver: xen-blkfront: move talk_to_blkback to a more suitable place (bsc#961658 fate#320200).
- drivers: xen-blkfront: only talk_to_blkback() when in XenbusStateInitialising (bsc#961658 fate#320200).
- drm/i915: Change semantics of hw_contexts_disabled (bsc#963276).
- drm/i915: Evict CS TLBs between batches (bsc#758040).
- drm/i915: Fix SRC_COPY width on 830/845g (bsc#758040).
- e1000e: Do not read ICR in Other interrupt (bsc#924919).
- e1000e: Do not write lsc to ics in msi-x mode (bsc#924919).
- e1000e: Fix msi-x interrupt automask (bsc#924919).
- e1000e: Remove unreachable code (bsc#924919).
- ext3: NULL dereference in ext3_evict_inode() (bsc#942082).
- ext3: fix data=journal fast mount/umount hang (bsc#942082).
- firmware: Create directories for external firmware (bsc#959312).
- firmware: Simplify directory creation (bsc#959312).
- ftdi_sio: private backport of TIOCMIWAIT (bnc#956375).
- iommu/vt-d: Do not change dma domain on dma-mask change (bsc#955925).
- jbd: Fix unreclaimed pages after truncate in data=journal mode (bsc#961516).
- kabi/severities: Add exception for bnx2x_schedule_sp_rtnl() There is no external, 3rd party modules use the symbol and the bnx2x_schedule_sp_rtnl symbol is only used in the bnx2x driver. (bsc#953369)
- kbuild: create directory for dir/file.o (bsc#959312).
- llist/xen-blkfront: implement safe version of llist_for_each_entry (bsc#961658 fate#320200).
- lpfc: Fix null ndlp dereference in target_reset_handler (bsc#951392).
- mm-memcg-print-statistics-from-live-counters-fix (bnc#969307).
- nvme: Clear BIO_SEG_VALID flag in nvme_bio_split() (bsc#954992).
- pci: Update VPD size with correct length (bsc#958906).
- pl2303: fix TIOCMIWAIT (bnc#959649).
- pl2303: introduce private disconnect method (bnc#959649).
- qeth: initialize net_device with carrier off (bnc#958000, LTC#136514).
- s390/cio: collect format 1 channel-path description data (bnc#958000, LTC#136434).
- s390/cio: ensure consistent measurement state (bnc#958000, LTC#136434).
- s390/cio: fix measurement characteristics memleak (bnc#958000, LTC#136434).
- s390/cio: update measurement characteristics (bnc#958000, LTC#136434).
- s390/dasd: fix failfast for disconnected devices (bnc#958000, LTC#135138).
- s390/sclp: Determine HSA size dynamically for zfcpdump (bnc#958000, LTC#136143).
- s390/sclp: Move declarations for sclp_sdias into separate header file (bnc#958000, LTC#136143).
- scsi_dh_rdac: always retry MODE SELECT on command lock violation (bsc#956949).
- supported.conf: Add xen-blkfront.
- tg3: 5715 does not link up when autoneg off (bsc#904035).
- usb: serial: ftdi_sio: Add missing chars_in_buffer function (bnc#956375).
- vmxnet3: fix building without CONFIG_PCI_MSI (bsc#958912).
- vmxnet3: fix netpoll race condition (bsc#958912).
- xen, blkfront: factor out flush-related checks from do_blkif_request() (bsc#961658 fate#320200).
- xen-blkfront: Handle discard requests (bsc#961658 fate#320200).
- xen-blkfront: If no barrier or flush is supported, use invalid operation (bsc#961658 fate#320200).
- xen-blkfront: Introduce a 'max' module parameter to alter the amount of indirect segments (bsc#961658 fate#320200).
- xen-blkfront: Silence pfn maybe-uninitialized warning (bsc#961658 fate#320200).
- xen-blkfront: allow building in our Xen environment (bsc#961658 fate#320200).
- xen-blkfront: check for null drvdata in blkback_changed (XenbusStateClosing) (bsc#961658 fate#320200).
- xen-blkfront: do not add indirect pages to list when !feature_persistent (bsc#961658 fate#320200).
- xen-blkfront: drop the use of llist_for_each_entry_safe (bsc#961658 fate#320200).
- xen-blkfront: fix a deadlock while handling discard response (bsc#961658 fate#320200).
- xen-blkfront: fix accounting of reqs when migrating (bsc#961658 fate#320200).
- xen-blkfront: free allocated page (bsc#961658 fate#320200).
- xen-blkfront: handle backend CLOSED without CLOSING (bsc#961658 fate#320200).
- xen-blkfront: handle bvecs with partial data (bsc#961658 fate#320200).
- xen-blkfront: improve aproximation of required grants per request (bsc#961658 fate#320200).
- xen-blkfront: make blkif_io_lock spinlock per-device (bsc#961658 fate#320200).
- xen-blkfront: plug device number leak in xlblk_init() error path (bsc#961658 fate#320200).
- xen-blkfront: pre-allocate pages for requests (bsc#961658 fate#320200).
- xen-blkfront: remove frame list from blk_shadow (bsc#961658 fate#320200).
- xen-blkfront: remove type check from blkfront_setup_discard (bsc#961658 fate#320200).
- xen-blkfront: restore the non-persistent data path (bsc#961658 fate#320200).
- xen-blkfront: revoke foreign access for grants not mapped by the backend (bsc#961658 fate#320200).
- xen-blkfront: set blk_queue_max_hw_sectors correctly (bsc#961658 fate#320200).
- xen-blkfront: switch from llist to list (bsc#961658 fate#320200).
- xen-blkfront: use a different scatterlist for each request (bsc#961658 fate#320200).
- xen-block: implement indirect descriptors (bsc#961658 fate#320200).
- xen/blk[front|back]: Enhance discard support with secure erasing support (bsc#961658 fate#320200).
- xen/blk[front|back]: Squash blkif_request_rw and blkif_request_discard together (bsc#961658 fate#320200).
- xen/blkback: Persistent grant maps for xen blk drivers (bsc#961658 fate#320200).
- xen/blkback: persistent-grants fixes (bsc#961658 fate#320200).
- xen/blkfront: Fix crash if backend does not follow the right states (bsc#961658 fate#320200).
- xen/blkfront: do not put bdev right after getting it (bsc#961658 fate#320200).
- xen/blkfront: improve protection against issuing unsupported REQ_FUA (bsc#961658 fate#320200).
- xen/blkfront: remove redundant flush_op (bsc#961658 fate#320200).
- xen/panic/x86: Allow cpus to save registers even if they (bnc#940946).
- xen/panic/x86: Fix re-entrance problem due to panic on (bnc#937444).
- xen/pvhvm: If xen_platform_pci=0 is set do not blow up (v4) (bsc#961658 fate#320200).
- xen/x86/mm: Add barriers and document switch_mm()-vs-flush synchronization (bnc#963767).
- xen: x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- xen: x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).
- xfs: Skip dirty pages in -&gt;releasepage (bnc#912738, bnc#915183).
- zfcp: fix fc_host port_type with NPIV (bnc#958000, LTC#132479).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-30"/>
	<updated date="2016-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/758040">SUSE bug 758040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904035">SUSE bug 904035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912738">SUSE bug 912738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915183">SUSE bug 915183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924919">SUSE bug 924919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933782">SUSE bug 933782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940017">SUSE bug 940017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940946">SUSE bug 940946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942082">SUSE bug 942082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947128">SUSE bug 947128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948330">SUSE bug 948330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949298">SUSE bug 949298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951392">SUSE bug 951392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951815">SUSE bug 951815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952976">SUSE bug 952976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953369">SUSE bug 953369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954992">SUSE bug 954992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955308">SUSE bug 955308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955654">SUSE bug 955654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955837">SUSE bug 955837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955925">SUSE bug 955925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956084">SUSE bug 956084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956375">SUSE bug 956375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956514">SUSE bug 956514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956708">SUSE bug 956708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956949">SUSE bug 956949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957986">SUSE bug 957986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957990">SUSE bug 957990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958000">SUSE bug 958000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958463">SUSE bug 958463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958886">SUSE bug 958886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958906">SUSE bug 958906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958912">SUSE bug 958912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958951">SUSE bug 958951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959190">SUSE bug 959190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959312">SUSE bug 959312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959399">SUSE bug 959399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959649">SUSE bug 959649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959705">SUSE bug 959705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961500">SUSE bug 961500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961509">SUSE bug 961509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961516">SUSE bug 961516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961658">SUSE bug 961658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962965">SUSE bug 962965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963276">SUSE bug 963276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963561">SUSE bug 963561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963765">SUSE bug 963765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963767">SUSE bug 963767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964201">SUSE bug 964201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964818">SUSE bug 964818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966094">SUSE bug 966094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966137">SUSE bug 966137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966437">SUSE bug 966437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966693">SUSE bug 966693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967042">SUSE bug 967042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967972">SUSE bug 967972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967973">SUSE bug 967973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967974">SUSE bug 967974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967975">SUSE bug 967975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968011">SUSE bug 968011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968012">SUSE bug 968012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968013">SUSE bug 968013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969307">SUSE bug 969307</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7446/">CVE-2013-7446 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7446">CVE-2013-7446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7515/">CVE-2015-7515 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7515">CVE-2015-7515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7550/">CVE-2015-7550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7550">CVE-2015-7550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8539/">CVE-2015-8539 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8539">CVE-2015-8539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8543">CVE-2015-8543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8550">CVE-2015-8550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8551/">CVE-2015-8551 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8551">CVE-2015-8551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8552/">CVE-2015-8552 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8552">CVE-2015-8552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8569/">CVE-2015-8569 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8569">CVE-2015-8569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8575/">CVE-2015-8575 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8575">CVE-2015-8575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8767/">CVE-2015-8767 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8767">CVE-2015-8767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8785/">CVE-2015-8785 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8785">CVE-2015-8785 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8812/">CVE-2015-8812 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8812">CVE-2015-8812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0723/">CVE-2016-0723 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0723">CVE-2016-0723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2069/">CVE-2016-2069 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2069">CVE-2016-2069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2384/">CVE-2016-2384 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2384">CVE-2016-2384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2543/">CVE-2016-2543 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2543">CVE-2016-2543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2544/">CVE-2016-2544 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2544">CVE-2016-2544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2545/">CVE-2016-2545 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2545">CVE-2016-2545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2546/">CVE-2016-2546 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2546">CVE-2016-2546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2547/">CVE-2016-2547 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2547">CVE-2016-2547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2548/">CVE-2016-2548 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2548">CVE-2016-2548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2549/">CVE-2016-2549 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2549">CVE-2016-2549 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583132" comment="kernel-default-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583133" comment="kernel-default-base-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583135" comment="kernel-default-man-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583136" comment="kernel-ec2-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583137" comment="kernel-ec2-base-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567357" comment="kernel-pae-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567358" comment="kernel-pae-base-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583139" comment="kernel-ppc64-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583140" comment="kernel-ppc64-base-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583142" comment="kernel-source-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583143" comment="kernel-syms-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583144" comment="kernel-trace-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583145" comment="kernel-trace-base-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567364" comment="kernel-xen-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567365" comment="kernel-xen-base-3.0.101-71.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583132" comment="kernel-default-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583133" comment="kernel-default-base-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583135" comment="kernel-default-man-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583136" comment="kernel-ec2-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583137" comment="kernel-ec2-base-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567357" comment="kernel-pae-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567358" comment="kernel-pae-base-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583139" comment="kernel-ppc64-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583140" comment="kernel-ppc64-base-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583142" comment="kernel-source-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583143" comment="kernel-syms-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583144" comment="kernel-trace-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583145" comment="kernel-trace-base-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567364" comment="kernel-xen-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567365" comment="kernel-xen-base-3.0.101-71.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220040" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1012917" ref_url="https://bugzilla.suse.com/1012917" source="BUGZILLA"/>
		<reference ref_id="1013018" ref_url="https://bugzilla.suse.com/1013018" source="BUGZILLA"/>
		<reference ref_id="1022967" ref_url="https://bugzilla.suse.com/1022967" source="BUGZILLA"/>
		<reference ref_id="1024450" ref_url="https://bugzilla.suse.com/1024450" source="BUGZILLA"/>
		<reference ref_id="1031358" ref_url="https://bugzilla.suse.com/1031358" source="BUGZILLA"/>
		<reference ref_id="1036286" ref_url="https://bugzilla.suse.com/1036286" source="BUGZILLA"/>
		<reference ref_id="1036629" ref_url="https://bugzilla.suse.com/1036629" source="BUGZILLA"/>
		<reference ref_id="1037441" ref_url="https://bugzilla.suse.com/1037441" source="BUGZILLA"/>
		<reference ref_id="1037667" ref_url="https://bugzilla.suse.com/1037667" source="BUGZILLA"/>
		<reference ref_id="1037669" ref_url="https://bugzilla.suse.com/1037669" source="BUGZILLA"/>
		<reference ref_id="1037994" ref_url="https://bugzilla.suse.com/1037994" source="BUGZILLA"/>
		<reference ref_id="1039803" ref_url="https://bugzilla.suse.com/1039803" source="BUGZILLA"/>
		<reference ref_id="1040609" ref_url="https://bugzilla.suse.com/1040609" source="BUGZILLA"/>
		<reference ref_id="1042863" ref_url="https://bugzilla.suse.com/1042863" source="BUGZILLA"/>
		<reference ref_id="1045154" ref_url="https://bugzilla.suse.com/1045154" source="BUGZILLA"/>
		<reference ref_id="1045205" ref_url="https://bugzilla.suse.com/1045205" source="BUGZILLA"/>
		<reference ref_id="1045327" ref_url="https://bugzilla.suse.com/1045327" source="BUGZILLA"/>
		<reference ref_id="1045538" ref_url="https://bugzilla.suse.com/1045538" source="BUGZILLA"/>
		<reference ref_id="1047523" ref_url="https://bugzilla.suse.com/1047523" source="BUGZILLA"/>
		<reference ref_id="1050381" ref_url="https://bugzilla.suse.com/1050381" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1051133" ref_url="https://bugzilla.suse.com/1051133" source="BUGZILLA"/>
		<reference ref_id="1051932" ref_url="https://bugzilla.suse.com/1051932" source="BUGZILLA"/>
		<reference ref_id="1052311" ref_url="https://bugzilla.suse.com/1052311" source="BUGZILLA"/>
		<reference ref_id="1052365" ref_url="https://bugzilla.suse.com/1052365" source="BUGZILLA"/>
		<reference ref_id="1052370" ref_url="https://bugzilla.suse.com/1052370" source="BUGZILLA"/>
		<reference ref_id="1052593" ref_url="https://bugzilla.suse.com/1052593" source="BUGZILLA"/>
		<reference ref_id="1053148" ref_url="https://bugzilla.suse.com/1053148" source="BUGZILLA"/>
		<reference ref_id="1053152" ref_url="https://bugzilla.suse.com/1053152" source="BUGZILLA"/>
		<reference ref_id="1053317" ref_url="https://bugzilla.suse.com/1053317" source="BUGZILLA"/>
		<reference ref_id="1053802" ref_url="https://bugzilla.suse.com/1053802" source="BUGZILLA"/>
		<reference ref_id="1053933" ref_url="https://bugzilla.suse.com/1053933" source="BUGZILLA"/>
		<reference ref_id="1054070" ref_url="https://bugzilla.suse.com/1054070" source="BUGZILLA"/>
		<reference ref_id="1054076" ref_url="https://bugzilla.suse.com/1054076" source="BUGZILLA"/>
		<reference ref_id="1054093" ref_url="https://bugzilla.suse.com/1054093" source="BUGZILLA"/>
		<reference ref_id="1054247" ref_url="https://bugzilla.suse.com/1054247" source="BUGZILLA"/>
		<reference ref_id="1054305" ref_url="https://bugzilla.suse.com/1054305" source="BUGZILLA"/>
		<reference ref_id="1054706" ref_url="https://bugzilla.suse.com/1054706" source="BUGZILLA"/>
		<reference ref_id="1056230" ref_url="https://bugzilla.suse.com/1056230" source="BUGZILLA"/>
		<reference ref_id="1056504" ref_url="https://bugzilla.suse.com/1056504" source="BUGZILLA"/>
		<reference ref_id="1056588" ref_url="https://bugzilla.suse.com/1056588" source="BUGZILLA"/>
		<reference ref_id="1057179" ref_url="https://bugzilla.suse.com/1057179" source="BUGZILLA"/>
		<reference ref_id="1057796" ref_url="https://bugzilla.suse.com/1057796" source="BUGZILLA"/>
		<reference ref_id="1058524" ref_url="https://bugzilla.suse.com/1058524" source="BUGZILLA"/>
		<reference ref_id="1059051" ref_url="https://bugzilla.suse.com/1059051" source="BUGZILLA"/>
		<reference ref_id="1060245" ref_url="https://bugzilla.suse.com/1060245" source="BUGZILLA"/>
		<reference ref_id="1060665" ref_url="https://bugzilla.suse.com/1060665" source="BUGZILLA"/>
		<reference ref_id="1061017" ref_url="https://bugzilla.suse.com/1061017" source="BUGZILLA"/>
		<reference ref_id="1061180" ref_url="https://bugzilla.suse.com/1061180" source="BUGZILLA"/>
		<reference ref_id="1062520" ref_url="https://bugzilla.suse.com/1062520" source="BUGZILLA"/>
		<reference ref_id="1062842" ref_url="https://bugzilla.suse.com/1062842" source="BUGZILLA"/>
		<reference ref_id="1063301" ref_url="https://bugzilla.suse.com/1063301" source="BUGZILLA"/>
		<reference ref_id="1063544" ref_url="https://bugzilla.suse.com/1063544" source="BUGZILLA"/>
		<reference ref_id="1063667" ref_url="https://bugzilla.suse.com/1063667" source="BUGZILLA"/>
		<reference ref_id="1064803" ref_url="https://bugzilla.suse.com/1064803" source="BUGZILLA"/>
		<reference ref_id="1064861" ref_url="https://bugzilla.suse.com/1064861" source="BUGZILLA"/>
		<reference ref_id="1065180" ref_url="https://bugzilla.suse.com/1065180" source="BUGZILLA"/>
		<reference ref_id="1066471" ref_url="https://bugzilla.suse.com/1066471" source="BUGZILLA"/>
		<reference ref_id="1066472" ref_url="https://bugzilla.suse.com/1066472" source="BUGZILLA"/>
		<reference ref_id="1066573" ref_url="https://bugzilla.suse.com/1066573" source="BUGZILLA"/>
		<reference ref_id="1066606" ref_url="https://bugzilla.suse.com/1066606" source="BUGZILLA"/>
		<reference ref_id="1066618" ref_url="https://bugzilla.suse.com/1066618" source="BUGZILLA"/>
		<reference ref_id="1066625" ref_url="https://bugzilla.suse.com/1066625" source="BUGZILLA"/>
		<reference ref_id="1066650" ref_url="https://bugzilla.suse.com/1066650" source="BUGZILLA"/>
		<reference ref_id="1066671" ref_url="https://bugzilla.suse.com/1066671" source="BUGZILLA"/>
		<reference ref_id="1066700" ref_url="https://bugzilla.suse.com/1066700" source="BUGZILLA"/>
		<reference ref_id="1066705" ref_url="https://bugzilla.suse.com/1066705" source="BUGZILLA"/>
		<reference ref_id="1067085" ref_url="https://bugzilla.suse.com/1067085" source="BUGZILLA"/>
		<reference ref_id="1067816" ref_url="https://bugzilla.suse.com/1067816" source="BUGZILLA"/>
		<reference ref_id="1067888" ref_url="https://bugzilla.suse.com/1067888" source="BUGZILLA"/>
		<reference ref_id="909484" ref_url="https://bugzilla.suse.com/909484" source="BUGZILLA"/>
		<reference ref_id="984530" ref_url="https://bugzilla.suse.com/984530" source="BUGZILLA"/>
		<reference ref_id="996376" ref_url="https://bugzilla.suse.com/996376" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000112" ref_url="https://www.suse.com/security/cve/CVE-2017-1000112/" source="CVE"/>
		<reference ref_id="CVE-2017-10661" ref_url="https://www.suse.com/security/cve/CVE-2017-10661/" source="CVE"/>
		<reference ref_id="CVE-2017-12762" ref_url="https://www.suse.com/security/cve/CVE-2017-12762/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051/" source="CVE"/>
		<reference ref_id="CVE-2017-14140" ref_url="https://www.suse.com/security/cve/CVE-2017-14140/" source="CVE"/>
		<reference ref_id="CVE-2017-14340" ref_url="https://www.suse.com/security/cve/CVE-2017-14340/" source="CVE"/>
		<reference ref_id="CVE-2017-14489" ref_url="https://www.suse.com/security/cve/CVE-2017-14489/" source="CVE"/>
		<reference ref_id="CVE-2017-15102" ref_url="https://www.suse.com/security/cve/CVE-2017-15102/" source="CVE"/>
		<reference ref_id="CVE-2017-15265" ref_url="https://www.suse.com/security/cve/CVE-2017-15265/" source="CVE"/>
		<reference ref_id="CVE-2017-15274" ref_url="https://www.suse.com/security/cve/CVE-2017-15274/" source="CVE"/>
		<reference ref_id="CVE-2017-16525" ref_url="https://www.suse.com/security/cve/CVE-2017-16525/" source="CVE"/>
		<reference ref_id="CVE-2017-16527" ref_url="https://www.suse.com/security/cve/CVE-2017-16527/" source="CVE"/>
		<reference ref_id="CVE-2017-16529" ref_url="https://www.suse.com/security/cve/CVE-2017-16529/" source="CVE"/>
		<reference ref_id="CVE-2017-16531" ref_url="https://www.suse.com/security/cve/CVE-2017-16531/" source="CVE"/>
		<reference ref_id="CVE-2017-16535" ref_url="https://www.suse.com/security/cve/CVE-2017-16535/" source="CVE"/>
		<reference ref_id="CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536/" source="CVE"/>
		<reference ref_id="CVE-2017-16537" ref_url="https://www.suse.com/security/cve/CVE-2017-16537/" source="CVE"/>
		<reference ref_id="CVE-2017-16649" ref_url="https://www.suse.com/security/cve/CVE-2017-16649/" source="CVE"/>
		<reference ref_id="CVE-2017-8831" ref_url="https://www.suse.com/security/cve/CVE-2017-8831/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003488.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-16649: The usbnet_generic_cdc_bind function in drivers/net/usb/cdc_ether.c in the Linux kernel allowed local users to cause a denial of service (divide-by-zero error and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067085).
- CVE-2017-16535: The usb_get_bos_descriptor function in drivers/usb/core/config.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066700).
- CVE-2017-15102: The tower_probe function in drivers/usb/misc/legousbtower.c in the Linux kernel allowed local users (who are physically proximate for inserting a crafted USB device) to gain privileges by leveraging a write-what-where condition that occurs after a race condition and a NULL pointer dereference (bnc#1066705).
- CVE-2017-16531: drivers/usb/core/config.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device, related to the USB_DT_INTERFACE_ASSOCIATION descriptor (bnc#1066671).
- CVE-2017-16529: The snd_usb_create_streams function in sound/usb/card.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066650).
- CVE-2017-16525: The usb_serial_console_disconnect function in drivers/usb/serial/console.c in the Linux kernel allowed local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device, related to disconnection and failed setup (bnc#1066618).
- CVE-2017-16537: The imon_probe function in drivers/media/rc/imon.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066573).
- CVE-2017-16536: The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066606).
- CVE-2017-16527: sound/usb/mixer.c in the Linux kernel allowed local users to cause a denial of service (snd_usb_mixer_interrupt use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066625).
- CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients (bnc#1063667).
- CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not consider the case of a NULL payload in conjunction with a nonzero length value, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted add_key or keyctl system call, a different vulnerability than CVE-2017-12192 (bnc#1045327).
- CVE-2017-15265: Race condition in the ALSA subsystem in the Linux kernel allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c (bnc#1062520).
- CVE-2017-14489: The iscsi_if_rx function in drivers/scsi/scsi_transport_iscsi.c in the Linux kernel allowed local users to cause a denial of service (panic) by leveraging incorrect length validation (bnc#1059051).
- CVE-2017-14340: The XFS_IS_REALTIME_INODE macro in fs/xfs/xfs_linux.h in the Linux kernel did not verify that a filesystem has a realtime device, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via vectors related to setting an RHINHERIT flag on a directory (bnc#1058524).
- CVE-2017-14140: The move_pages system call in mm/migrate.c in the Linux kernel doesn't check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR (bnc#1057179).
- CVE-2017-14051: An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash) by leveraging root access (bnc#1056588).
- CVE-2017-10661: Race condition in fs/timerfd.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel queueing (bnc#1053152).
- CVE-2017-12762: In /drivers/isdn/i4l/isdn_net.c: A user-controlled buffer is copied into a local buffer of constant size using strcpy without a length check which can cause a buffer overflow. (bnc#1053148).
- CVE-2017-8831: The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a 'double fetch' vulnerability (bnc#1037994).
- CVE-2017-1000112: An exploitable memory corruption due to UFO to non-UFO path switch was fixed. (bnc#1052311 bnc#1052365).

The following non-security bugs were fixed:

- alsa: core: Fix unexpected error at replacing user TLV (bsc#1045538).
- alsa: hda - fix Lewisburg audio issue (fate#319286).
- alsa: hda/ca0132 - Fix memory leak at error path (bsc#1045538).
- alsa: timer: Add missing mutex lock for compat ioctls (bsc#1045538).
- audit: Fix use after free in audit_remove_watch_rule() (bsc#1045205).
- hid: usbhid: Add HID_QUIRK_NOGET for Aten CS-1758 KVM switch (bnc#1022967).
- kvm: SVM: Add a missing 'break' statement (bsc#1061017).
- kvm: async_pf: Fix #DF due to inject 'Page not Present' and 'Page Ready' exceptions simultaneously (bsc#1061017).
- nfs: Cache aggressively when file is open for writing (bsc#1053933).
- nfs: Do drop directory dentry when error clearly requires it (bsc#1051932).
- nfs: Do not flush caches for a getattr that races with writeback (bsc#1053933). # Conflicts: #	series.conf
- nfs: Optimize fallocate by refreshing mapping when needed (bsc#1053933).
- nfs: Remove asserts from the NFS XDR code (bsc#1063544).
- nfs: invalidate file size when taking a lock (bsc#1053933).
- pci: fix hotplug related issues (bnc#1054247, LTC#157731).
- Update config files. (bsc#1057796) The CONFIG_MODULE_SIG_UEFI should be enabled on x86_64/xen architecture because xen can work with shim on x86_64. Enabling the following kernel config to load certificate from db/mok: +CONFIG_MODULE_SIG_BLACKLIST=y +CONFIG_MODULE_SIG_UEFI=y
- af_key: do not use GFP_KERNEL in atomic contexts (bsc#1054093).
- autofs: do not fail mount for transient error (bsc#1065180).
- xen: avoid deadlock in xenbus (bnc#1047523).
- blacklist.conf: Add PCI ASPM fix to blacklist (bsc#1045538)
- blkback/blktap: do not leak stack data via response ring (bsc#1042863 XSA-216).
- bnx2x: prevent crash when accessing PTP with interface down (bsc#1060665).
- cx231xx-audio: fix NULL-deref at probe (bsc#1050431).
- cx82310_eth: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
- dm bufio: fix integer overflow when limiting maximum cache size (git-fixes).
- drm/mgag200: Fixes for G200eH3. (bnc#1062842)
- fnic: Use the local variable instead of I/O flag to acquire io_req_lock in fnic_queuecommand() to avoid deadloack (bsc#1067816).
- fuse: do not use iocb after it may have been freed (bsc#1054706).
- fuse: fix fuse_write_end() if zero bytes were copied (bsc#1054706).
- fuse: fsync() did not return IO errors (bsc#1054076).
- fuse: fuse_flush must check mapping-&gt;flags for errors (bsc#1054706).
- getcwd: Close race with d_move called by lustre (bsc#1052593).
- gspca: konica: add missing endpoint sanity check (bsc#1050431).
- i40e: Initialize 64-bit statistics TX ring seqcount (bsc#909484).
- kabi fix for new hash_cred function (bsc#1012917).
- kabi/severities: Ignore zpci symbol changes (bsc#1054247)
- lib/mpi: mpi_read_raw_data(): fix nbits calculation (fate#314508).
- lpfc: check for valid scsi cmnd in lpfc_scsi_cmd_iocb_cmpl() (bsc#1051133).
- mac80211: do not compare TKIP TX MIC key in reinstall prevention (bsc#1066472).
- md/bitmap: disable bitmap_resize for file-backed bitmaps (bsc#1061180).
- media: platform: davinci: return -EINVAL for VPFE_CMD_S_CCDC_RAW_PARAMS ioctl (bsc#1050431).
- net: Fix RCU splat in af_key (bsc#1054093).
- netback: coalesce (guest) RX SKBs as needed (bsc#1056504).
- nfs: Fix ugly referral attributes (git-fixes).
- nfs: improve shinking of access cache (bsc#1012917).
- powerpc/fadump: add reschedule point while releasing memory (bsc#1040609 bsc#1024450).
- powerpc/fadump: avoid duplicates in crash memory ranges (bsc#1037669 bsc#1037667).
- powerpc/fadump: provide a helpful error message (bsc#1037669 bsc#1037667).
- powerpc/mm: Fix check of multiple 16G pages from device tree (bsc#1064861, git-fixes).
- powerpc/prom: Increase minimum RMA size to 512MB (bsc#984530, bsc#1052370).
- powerpc/pseries/vio: Dispose of virq mapping on vdevice unregister (bsc#1067888, git-fixes f2ab6219969f).
- powerpc/slb: Force a full SLB flush when we insert for a bad EA (bsc#1054070).
- powerpc/xics: Harden xics hypervisor backend (bnc#1056230).
- powerpc: Correct instruction code for xxlor instruction (bsc#1064861, git-fixes).
- powerpc: Fix emulation of mfocrf in emulate_step() (bsc#1064861, git-fixes).
- powerpc: Fix the corrupt r3 error during MCE handling (bnc#1056230).
- powerpc: Make sure IPI handlers see data written by IPI senders (bnc#1056230).
- reiserfs: fix race in readdir (bsc#1039803).
- s390/cpcmd,vmcp: avoid GFP_DMA allocations (bnc#1060245, LTC#159112).
- s390/pci: do not cleanup in arch_setup_msi_irqs (bnc#1054247, LTC#157731).
- s390/pci: fix handling of PEC 306 (bnc#1054247, LTC#157731).
- s390/pci: improve error handling during fmb (de)registration (bnc#1054247, LTC#157731).
- s390/pci: improve error handling during interrupt deregistration (bnc#1054247, LTC#157731).
- s390/pci: improve pci hotplug (bnc#1054247, LTC#157731).
- s390/pci: improve unreg_ioat error handling (bnc#1054247, LTC#157731).
- s390/pci: introduce clp_get_state (bnc#1054247, LTC#157731).
- s390/pci: provide more debug information (bnc#1054247, LTC#157731).
- s390/qdio: avoid reschedule of outbound tasklet once killed (bnc#1063301, LTC#159885).
- s390/topology: alternative topology for topology-less machines (bnc#1060245, LTC#159177).
- s390/topology: enable / disable topology dynamically (bnc#1060245, LTC#159177).
- scsi: avoid system stall due to host_busy race (bsc#1031358).
- scsi: close race when updating blocked counters (bsc#1031358).
- scsi: qla2xxx: Get mutex lock before checking optrom_state (bsc#1053317).
- scsi: reset wait for IO completion (bsc#996376).
- scsi: zfcp: fix capping of unsuccessful GPN_FT SAN response trace records (bnc#1060245, LTC#158494).
- scsi: zfcp: fix missing trace records for early returns in TMF eh handlers (bnc#1060245, LTC#158494).
- scsi: zfcp: fix passing fsf_req to SCSI trace on TMF to correlate with HBA (bnc#1060245, LTC#158494).
- scsi: zfcp: fix payload with full FCP_RSP IU in SCSI trace records (bnc#1060245, LTC#158494).
- scsi: zfcp: fix queuecommand for scsi_eh commands when DIX enabled (bnc#1060245, LTC#158493).
- scsi: zfcp: trace HBA FSF response by default on dismiss or timedout late response (bnc#1060245, LTC#158494).
- ser_gigaset: return -ENOMEM on error instead of success (bsc#1037441).
- sunrpc: add RPCSEC_GSS hash_cred() function (bsc#1012917).
- sunrpc: add auth_unix hash_cred() function (bsc#1012917).
- sunrpc: add generic_auth hash_cred() function (bsc#1012917).
- sunrpc: add hash_cred() function to rpc_authops struct (bsc#1012917).
- sunrpc: replace generic auth_cred hash with auth-specific function (bsc#1012917).
- sunrpc: use supplimental groups in auth hash (bsc#1012917).
- supported.conf: clear mistaken external support flag for cifs.ko (bsc#1053802).
- tpm: fix a kernel memory leak in tpm-sysfs.c (bsc#1050381).
- usb-serial: check for NULL private data in pl2303_suse_disconnect (bsc#1064803).
- uwb: fix device quirk on big-endian hosts (bsc#1036629).
- virtio_scsi: do not call virtqueue_add_sgs(... GFP_NOIO) holding spinlock (bsc#1036286).
- x86/microcode/intel: Disable late loading on model 79 (bsc#1054305).
- xfs: fix inobt inode allocation search optimization (bsc#1013018).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-11"/>
	<updated date="2017-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012917">SUSE bug 1012917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013018">SUSE bug 1013018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022967">SUSE bug 1022967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024450">SUSE bug 1024450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031358">SUSE bug 1031358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036286">SUSE bug 1036286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036629">SUSE bug 1036629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037441">SUSE bug 1037441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037667">SUSE bug 1037667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037669">SUSE bug 1037669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037994">SUSE bug 1037994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039803">SUSE bug 1039803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040609">SUSE bug 1040609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042863">SUSE bug 1042863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045154">SUSE bug 1045154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045205">SUSE bug 1045205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045327">SUSE bug 1045327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045538">SUSE bug 1045538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047523">SUSE bug 1047523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050381">SUSE bug 1050381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051133">SUSE bug 1051133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051932">SUSE bug 1051932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052311">SUSE bug 1052311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052365">SUSE bug 1052365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052370">SUSE bug 1052370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052593">SUSE bug 1052593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053148">SUSE bug 1053148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053152">SUSE bug 1053152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053317">SUSE bug 1053317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053802">SUSE bug 1053802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053933">SUSE bug 1053933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054070">SUSE bug 1054070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054076">SUSE bug 1054076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054093">SUSE bug 1054093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054247">SUSE bug 1054247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054305">SUSE bug 1054305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054706">SUSE bug 1054706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056230">SUSE bug 1056230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056504">SUSE bug 1056504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056588">SUSE bug 1056588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057179">SUSE bug 1057179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057796">SUSE bug 1057796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058524">SUSE bug 1058524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059051">SUSE bug 1059051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060245">SUSE bug 1060245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060665">SUSE bug 1060665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061017">SUSE bug 1061017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061180">SUSE bug 1061180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062520">SUSE bug 1062520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062842">SUSE bug 1062842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063301">SUSE bug 1063301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063544">SUSE bug 1063544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064803">SUSE bug 1064803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064861">SUSE bug 1064861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065180">SUSE bug 1065180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066471">SUSE bug 1066471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066472">SUSE bug 1066472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066573">SUSE bug 1066573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066606">SUSE bug 1066606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066618">SUSE bug 1066618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066625">SUSE bug 1066625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066650">SUSE bug 1066650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066671">SUSE bug 1066671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066700">SUSE bug 1066700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066705">SUSE bug 1066705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067085">SUSE bug 1067085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067816">SUSE bug 1067816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067888">SUSE bug 1067888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909484">SUSE bug 909484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984530">SUSE bug 984530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996376">SUSE bug 996376</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000112/">CVE-2017-1000112 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000112">CVE-2017-1000112 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10661/">CVE-2017-10661 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10661">CVE-2017-10661 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12762/">CVE-2017-12762 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12762">CVE-2017-12762 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14051">CVE-2017-14051 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14140/">CVE-2017-14140 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14140">CVE-2017-14140 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14340/">CVE-2017-14340 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14340">CVE-2017-14340 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14489/">CVE-2017-14489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14489">CVE-2017-14489 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15102/">CVE-2017-15102 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15102">CVE-2017-15102 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15265/">CVE-2017-15265 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15265">CVE-2017-15265 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15274/">CVE-2017-15274 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15274">CVE-2017-15274 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16525/">CVE-2017-16525 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16525">CVE-2017-16525 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16527/">CVE-2017-16527 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16527">CVE-2017-16527 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16529/">CVE-2017-16529 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16529">CVE-2017-16529 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16531/">CVE-2017-16531 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16531">CVE-2017-16531 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16535/">CVE-2017-16535 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16535">CVE-2017-16535 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16536">CVE-2017-16536 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16537/">CVE-2017-16537 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16537">CVE-2017-16537 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16649/">CVE-2017-16649 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16649">CVE-2017-16649 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8831/">CVE-2017-8831 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8831">CVE-2017-8831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583147" comment="kernel-bigmem-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583148" comment="kernel-bigmem-base-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583150" comment="kernel-default-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583151" comment="kernel-default-base-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583153" comment="kernel-default-man-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583154" comment="kernel-ec2-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583155" comment="kernel-ec2-base-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583157" comment="kernel-pae-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583158" comment="kernel-pae-base-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583160" comment="kernel-ppc64-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583161" comment="kernel-ppc64-base-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583163" comment="kernel-source-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583164" comment="kernel-syms-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583165" comment="kernel-trace-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583166" comment="kernel-trace-base-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583168" comment="kernel-xen-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583169" comment="kernel-xen-base-3.0.101-108.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583147" comment="kernel-bigmem-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583148" comment="kernel-bigmem-base-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583150" comment="kernel-default-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583151" comment="kernel-default-base-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583153" comment="kernel-default-man-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583154" comment="kernel-ec2-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583155" comment="kernel-ec2-base-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583157" comment="kernel-pae-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583158" comment="kernel-pae-base-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583160" comment="kernel-ppc64-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583161" comment="kernel-ppc64-base-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583163" comment="kernel-source-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583164" comment="kernel-syms-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583165" comment="kernel-trace-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583166" comment="kernel-trace-base-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583168" comment="kernel-xen-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583169" comment="kernel-xen-base-3.0.101-108.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220041" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1013018" ref_url="https://bugzilla.suse.com/1013018" source="BUGZILLA"/>
		<reference ref_id="1024612" ref_url="https://bugzilla.suse.com/1024612" source="BUGZILLA"/>
		<reference ref_id="1034862" ref_url="https://bugzilla.suse.com/1034862" source="BUGZILLA"/>
		<reference ref_id="1045479" ref_url="https://bugzilla.suse.com/1045479" source="BUGZILLA"/>
		<reference ref_id="1045538" ref_url="https://bugzilla.suse.com/1045538" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1048185" ref_url="https://bugzilla.suse.com/1048185" source="BUGZILLA"/>
		<reference ref_id="1050231" ref_url="https://bugzilla.suse.com/1050231" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1056982" ref_url="https://bugzilla.suse.com/1056982" source="BUGZILLA"/>
		<reference ref_id="1063043" ref_url="https://bugzilla.suse.com/1063043" source="BUGZILLA"/>
		<reference ref_id="1065180" ref_url="https://bugzilla.suse.com/1065180" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1066569" ref_url="https://bugzilla.suse.com/1066569" source="BUGZILLA"/>
		<reference ref_id="1066693" ref_url="https://bugzilla.suse.com/1066693" source="BUGZILLA"/>
		<reference ref_id="1066973" ref_url="https://bugzilla.suse.com/1066973" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068671" ref_url="https://bugzilla.suse.com/1068671" source="BUGZILLA"/>
		<reference ref_id="1068984" ref_url="https://bugzilla.suse.com/1068984" source="BUGZILLA"/>
		<reference ref_id="1069702" ref_url="https://bugzilla.suse.com/1069702" source="BUGZILLA"/>
		<reference ref_id="1070771" ref_url="https://bugzilla.suse.com/1070771" source="BUGZILLA"/>
		<reference ref_id="1070964" ref_url="https://bugzilla.suse.com/1070964" source="BUGZILLA"/>
		<reference ref_id="1071074" ref_url="https://bugzilla.suse.com/1071074" source="BUGZILLA"/>
		<reference ref_id="1071470" ref_url="https://bugzilla.suse.com/1071470" source="BUGZILLA"/>
		<reference ref_id="1071695" ref_url="https://bugzilla.suse.com/1071695" source="BUGZILLA"/>
		<reference ref_id="1072457" ref_url="https://bugzilla.suse.com/1072457" source="BUGZILLA"/>
		<reference ref_id="1072561" ref_url="https://bugzilla.suse.com/1072561" source="BUGZILLA"/>
		<reference ref_id="1072876" ref_url="https://bugzilla.suse.com/1072876" source="BUGZILLA"/>
		<reference ref_id="1073792" ref_url="https://bugzilla.suse.com/1073792" source="BUGZILLA"/>
		<reference ref_id="1073874" ref_url="https://bugzilla.suse.com/1073874" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11600" ref_url="https://www.suse.com/security/cve/CVE-2017-11600/" source="CVE"/>
		<reference ref_id="CVE-2017-13167" ref_url="https://www.suse.com/security/cve/CVE-2017-13167/" source="CVE"/>
		<reference ref_id="CVE-2017-14106" ref_url="https://www.suse.com/security/cve/CVE-2017-14106/" source="CVE"/>
		<reference ref_id="CVE-2017-15115" ref_url="https://www.suse.com/security/cve/CVE-2017-15115/" source="CVE"/>
		<reference ref_id="CVE-2017-15868" ref_url="https://www.suse.com/security/cve/CVE-2017-15868/" source="CVE"/>
		<reference ref_id="CVE-2017-16534" ref_url="https://www.suse.com/security/cve/CVE-2017-16534/" source="CVE"/>
		<reference ref_id="CVE-2017-16538" ref_url="https://www.suse.com/security/cve/CVE-2017-16538/" source="CVE"/>
		<reference ref_id="CVE-2017-16939" ref_url="https://www.suse.com/security/cve/CVE-2017-16939/" source="CVE"/>
		<reference ref_id="CVE-2017-17450" ref_url="https://www.suse.com/security/cve/CVE-2017-17450/" source="CVE"/>
		<reference ref_id="CVE-2017-17558" ref_url="https://www.suse.com/security/cve/CVE-2017-17558/" source="CVE"/>
		<reference ref_id="CVE-2017-17805" ref_url="https://www.suse.com/security/cve/CVE-2017-17805/" source="CVE"/>
		<reference ref_id="CVE-2017-17806" ref_url="https://www.suse.com/security/cve/CVE-2017-17806/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2017-7472" ref_url="https://www.suse.com/security/cve/CVE-2017-7472/" source="CVE"/>
		<reference ref_id="CVE-2017-8824" ref_url="https://www.suse.com/security/cve/CVE-2017-8824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003565.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

This update adds mitigations for various side channel attacks against
modern CPUs that could disclose content of otherwise unreadable memory
(bnc#1068032).

- CVE-2017-5753: Local attackers on systems with modern CPUs featuring
  deep instruction pipelining could use attacker controllable speculative
  execution over code patterns in the Linux Kernel to leak content from
  otherwise not readable memory in the same address space, allowing
  retrieval of passwords, cryptographic keys and other secrets.

  This problem is mitigated by adding speculative fencing on affected
  code paths throughout the Linux kernel.

  This issue is addressed for the x86_64, the IBM Power and IBM zSeries
  architecture.

- CVE-2017-5715: Local attackers on systems with modern CPUs featuring
  branch prediction could use mispredicted branches to speculatively execute
  code patterns that in turn could be made to leak other non-readable
  content in the same address space, an attack similar to CVE-2017-5753.

  This problem is mitigated by disabling predictive branches, depending
  on CPU architecture either by firmware updates and/or fixes in the
  user-kernel privilege boundaries.

  This is done with help of Linux Kernel fixes on the Intel/AMD x86_64 and
  IBM zSeries architectures. On x86_64, this requires also updates of the
  CPU microcode packages, delivered in seperate updates.

  For IBM Power and zSeries the required firmware updates are supplied
  over regular channels by IBM.

  As this feature can have a performance impact, it can be disabled using
  the 'nospec' kernel commandline option.

- CVE-2017-5754: Local attackers on systems with modern CPUs featuring
  deep instruction pipelining could use code patterns in userspace to
  speculative executive code that would read otherwise read protected
  memory, an attack similar to CVE-2017-5753.

  This problem is mitigated by unmapping the Linux Kernel from the user
  address space during user code execution, following a approach called
  'KAISER'. The terms used here are 'KAISER' / 'Kernel Address Isolation'
  and 'PTI' / 'Page Table Isolation'.

  This update does this on the Intel x86_64 and IBM Power
  architecture. Updates are also necessary for the ARM architecture,
  but will be delivered in the next round of updates.

  This feature can be enabled / disabled by the 'pti=[on|off|auto]' or
  'nopti' commandline options.


The following security bugs were fixed:

- CVE-2017-17806: The HMAC implementation (crypto/hmac.c) in the Linux kernel did not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization (bnc#1073874).
- CVE-2017-17805: The Salsa20 encryption algorithm in the Linux kernel did not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable (bnc#1073792).
- CVE-2017-15868: The bnep_add_connection function in net/bluetooth/bnep/core.c in the Linux kernel did not ensure that an l2cap socket is available, which allowed local users to gain privileges via a crafted application (bnc#1071470).
- CVE-2017-13167: An elevation of privilege vulnerability in the kernel sound timer. (bnc#1072876).
- CVE-2017-16538: drivers/media/usb/dvb-usb-v2/lmedm04.c in the Linux kernel allowed local users to cause a denial of service (general protection fault and system crash) or possibly have unspecified other impact via a crafted USB device, related to a missing warm-start check and incorrect attach timing (dm04_lme2510_frontend_attach versus dm04_lme2510_tuner) (bnc#1066569).
- CVE-2017-17558: The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel did not consider the maximum number of configurations and interfaces before attempting to release resources, which allowed local users to cause a denial of service (out-of-bounds write access) or possibly have unspecified other impact via a crafted USB device (bnc#1072561).
- CVE-2017-17450: net/netfilter/xt_osf.c in the Linux kernel did not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allowed local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces (bnc#1071695).
- CVE-2017-8824: The dccp_disconnect function in net/dccp/proto.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state (bnc#1070771).
- CVE-2017-16939: The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages (bnc#1069702).
- CVE-2017-15115: The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel did not check whether the intended netns is used in a peel-off action, which allowed local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls (bnc#1068671).
- CVE-2017-14106: The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel allowed local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path (bnc#1056982).
- CVE-2017-11600: net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bnc#1050231).
- CVE-2017-7472: The KEYS subsystem in the Linux kernel allowed local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls (bnc#1034862).
- CVE-2017-16534: The cdc_parse_cdc_header function in drivers/usb/core/message.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066693).

The following non-security bugs were fixed:

- adm80211: return an error if adm8211_alloc_rings() fails (bsc#1048185).
- autofs: fix careless error in recent commit (bsc#1065180).
- bpf: prevent speculative execution in eBPF interpreter (bnc#1068032).
- carl9170: prevent speculative execution (bnc#1068032).
- ecryptfs: fix dereference of NULL user_key_payload (bsc#1013018).
- eCryptfs: use after free in ecryptfs_release_messaging() (bsc#1013018).
- fs/9p: Compare qid.path in v9fs_test_inode (bsc#1013018).
- fs: prevent speculative execution (bnc#1068032).
- isa: Prevent NULL dereference in isa_bus driver callbacks (bsc#1045538).
- kabi: silence spurious kabi error in net/sctp/socket.c (bsc#1068671).
- kaiser: add 'nokaiser' boot option, using ALTERNATIVE.
- kaiser: fix ldt freeing.
- kaiser: Kernel Address Isolation.
- kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush.
- kaiser: work around kABI.
- kvm: SVM: Do not intercept new speculative control MSRs (bsc#1068032).
- kvm: x86: Add speculative control CPUID support for guests (bsc#1068032).
- locking/barriers: introduce new memory barrier gmb() (bnc#1068032).
- media: cx231xx-cards: fix NULL-deref at probe (bsc#1050431).
- mm/madvise.c: fix madvise() infinite loop under special circumstances (bnc#1070964).
- mm/mmu_context, sched/core: Fix mmu_context.h assumption.
- p54: prevent speculative execution (bnc#1068032).
- powerpc/barrier: add gmb.
- powerpc: Secure memory rfi flush (bsc#1068032).
- ptrace: Add a new thread access check (bsc#1068032).
- qeth: check not more than 16 SBALEs on the completion queue (bnc#1072457, LTC#148203).
- s390: add ppa to system call and program check path (bsc#1068032).
- s390/disassembler: correct disassembly lines alignment (bnc#1066973, LTC#161577).
- s390/disassembler: increase show_code buffer size (bnc#1066973, LTC#161577).
- s390: fix transactional execution control register handling (bnc#1072457, LTC#162116).
- s390: introduce CPU alternatives.
- s390: introduce CPU alternatives (bsc#1068032).
- s390/spinlock: add gmb memory barrier.
- s390/spinlock: add gmb memory barrier (bsc#1068032).
- s390/spinlock: add ppa to system call path.
- sched/core: Add switch_mm_irqs_off() and use it in the scheduler.
- sched/core: Idle_task_exit() shouldn't use switch_mm_irqs_off().
- scsi_scan: Exit loop if TUR to LUN0 fails with 0x05/0x25 (bsc#1063043). This is specific to FUJITSU ETERNUS_DX* targets. They can return 'Illegal Request - Logical unit not supported' and processing should leave the timeout loop in this case.
- scsi: zfcp: fix erp_action use-before-initialize in REC action trace (bnc#1066973, LTC#160081).
- temporary fix (bsc#1068032).
- udf: prevent speculative execution (bnc#1068032).
- usb: host: fix incorrect updating of offset (bsc#1047487).
- usb: uas: fix bug in handling of alternate settings (bsc#1071074).
- uvcvideo: prevent speculative execution (bnc#1068032).
- video: udlfb: Fix read EDID timeout (bsc#1045538).
- watchdog: hpwdt: add support for iLO5 (bsc#1024612).
- watchdog/hpwdt: Check source of NMI (bsc#1024612).
- x86-64: Give vvars their own page.
- x86-64: Map the HPET NX.
- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).
- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).
- x86/alternatives: Add instruction padding.
- x86/alternatives: Cleanup DPRINTK macro.
- x86/alternatives: Make JMPs more robust.
- x86/alternatives: Use optimized NOPs for padding.
- x86/boot: Add early cmdline parsing for options with arguments.
- x86, boot: Carve out early cmdline parsing function.
- x86/CPU/AMD: Add speculative control support for AMD (bsc#1068032).
- x86/CPU/AMD: Make the LFENCE instruction serialized (bsc#1068032).
- x86/CPU/AMD: Remove now unused definition of MFENCE_RDTSC feature (bsc#1068032).
- x86/CPU: Check speculation control CPUID bit (bsc#1068032).
- x86/cpu: Fix bootup crashes by sanitizing the argument of the 'clearcpuid=' command-line option (bsc#1065600).
- x86/enter: Add macros to set/clear IBRS and set IBPB (bsc#1068032).
- x86/entry: Add a function to overwrite the RSB (bsc#1068032).
- x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (bsc#1068032).
- x86/entry: Use IBRS on entry to kernel space (bsc#1068032).
- x86/feature: Enable the x86 feature to control Speculation (bsc#1068032).
- x86/idle: Disable IBRS when offlining a CPU and re-enable on wakeup (bsc#1068032).
- x86/idle: Toggle IBRS when going idle (bsc#1068032).
- x86/kaiser: Check boottime cmdline params.
- x86/kaiser: disable vmstat accounting.
- x86/kaiser: Move feature detection up (bsc#1068032).
- x86/kaiser: propagate info to /proc/cpuinfo.
- x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling.
- x86/kvm: Add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm (bsc#1068032).
- x86/kvm: Flush IBP when switching VMs (bsc#1068032).
- x86/kvm: Pad RSB on VM transition (bsc#1068032).
- x86/kvm: Toggle IBRS on VM entry and exit (bsc#1068032).
- x86: Make alternative instruction pointers relative.
- x86/microcode/AMD: Add support for fam17h microcode loading (bsc#1068032).
- x86/mm/64: Fix reboot interaction with CR4.PCIDE.
- x86/mm: Add a 'noinvpcid' boot option to turn off INVPCID.
- x86/mm: Add INVPCID helpers.
- x86/mm: Add the 'nopcid' boot option to turn off PCID.
- x86/mm: Build arch/x86/mm/tlb.c even on !SMP.
- x86/mm: Disable PCID on 32-bit kernels.
- x86/mm: Enable CR4.PCIDE on supported systems.
- x86/mm: fix bad backport to disable PCID on Xen.
- x86/mm: Fix INVPCID asm constraint.
- x86/mm: If INVPCID is available, use it to flush global mappings.
- x86/mm/kaiser: re-enable vsyscalls.
- x86/mm: Only set IBPB when the new thread cannot ptrace current thread (bsc#1068032).
- x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code.
- x86/mm, sched/core: Turn off IRQs in switch_mm().
- x86/mm, sched/core: Uninline switch_mm().
- x86/mm: Set IBPB upon context switch (bsc#1068032).
- x86/MSR: Move native_*msr(.. u64) to msr.h (bsc#1068032).
- x86/spec: Add IBRS control functions (bsc#1068032).
- x86/spec: Add 'nospec' chicken bit (bsc#1068032).
- x86/spec: Check CPUID direclty post microcode reload to support IBPB feature (bsc#1068032).
- x86/spec_ctrl: Add an Indirect Branch Predictor barrier (bsc#1068032).
- x86/spec_ctrl: Check whether IBPB is enabled before using it (bsc#1068032).
- x86/spec_ctrl: Check whether IBRS is enabled before using it (bsc#1068032).
- x86/svm: Add code to clear registers on VM exit (bsc#1068032).
- x86/svm: Clobber the RSB on VM exit (bsc#1068032).
- x86/svm: Set IBPB when running a different VCPU (bsc#1068032).
- x86/svm: Set IBRS value on VM entry and exit (bsc#1068032).
- xen/kaiser: add 'nokaiser' boot option, using ALTERNATIVE.
- xen/KAISER: Kernel Address Isolation.
- xen/kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush.
- xen/kaiser: work around kABI.
- xen/x86-64: Give vvars their own page.
- xen/x86-64: Map the HPET NX.
- xen/x86/alternatives: Add instruction padding.
- xen/x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling.
- xen/x86/mm: Enable CR4.PCIDE on supported systems.
- xen/x86/mm/kaiser: re-enable vsyscalls.
- xen/x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code.
- xen: x86/mm, sched/core: Turn off IRQs in switch_mm().
- xen: x86/mm, sched/core: Uninline switch_mm().
- zd1211rw: fix NULL-deref at probe (bsc#1045479).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013018">SUSE bug 1013018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024612">SUSE bug 1024612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034862">SUSE bug 1034862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045479">SUSE bug 1045479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045538">SUSE bug 1045538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048185">SUSE bug 1048185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050231">SUSE bug 1050231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056982">SUSE bug 1056982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063043">SUSE bug 1063043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065180">SUSE bug 1065180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066569">SUSE bug 1066569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066693">SUSE bug 1066693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066973">SUSE bug 1066973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068671">SUSE bug 1068671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068984">SUSE bug 1068984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069702">SUSE bug 1069702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070771">SUSE bug 1070771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070964">SUSE bug 1070964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071074">SUSE bug 1071074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071470">SUSE bug 1071470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071695">SUSE bug 1071695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072457">SUSE bug 1072457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072561">SUSE bug 1072561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072876">SUSE bug 1072876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073792">SUSE bug 1073792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073874">SUSE bug 1073874</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11600/">CVE-2017-11600 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11600">CVE-2017-11600 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13167/">CVE-2017-13167 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13167">CVE-2017-13167 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14106/">CVE-2017-14106 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14106">CVE-2017-14106 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15115/">CVE-2017-15115 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15115">CVE-2017-15115 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15868/">CVE-2017-15868 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15868">CVE-2017-15868 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16534/">CVE-2017-16534 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16534">CVE-2017-16534 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16538/">CVE-2017-16538 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16538">CVE-2017-16538 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16939/">CVE-2017-16939 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16939">CVE-2017-16939 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17450/">CVE-2017-17450 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17450">CVE-2017-17450 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17558/">CVE-2017-17558 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17558">CVE-2017-17558 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17805/">CVE-2017-17805 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17805">CVE-2017-17805 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17806/">CVE-2017-17806 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17806">CVE-2017-17806 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5754">CVE-2017-5754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7472/">CVE-2017-7472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7472">CVE-2017-7472 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8824/">CVE-2017-8824 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8824">CVE-2017-8824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583171" comment="kernel-bigmem-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583172" comment="kernel-bigmem-base-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583174" comment="kernel-default-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583175" comment="kernel-default-base-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583177" comment="kernel-default-man-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583178" comment="kernel-ec2-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583179" comment="kernel-ec2-base-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583181" comment="kernel-pae-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583182" comment="kernel-pae-base-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583184" comment="kernel-ppc64-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583185" comment="kernel-ppc64-base-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583187" comment="kernel-source-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583188" comment="kernel-syms-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583189" comment="kernel-trace-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583190" comment="kernel-trace-base-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583192" comment="kernel-xen-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583193" comment="kernel-xen-base-3.0.101-108.21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583171" comment="kernel-bigmem-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583172" comment="kernel-bigmem-base-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583174" comment="kernel-default-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583175" comment="kernel-default-base-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583177" comment="kernel-default-man-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583178" comment="kernel-ec2-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583179" comment="kernel-ec2-base-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583181" comment="kernel-pae-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583182" comment="kernel-pae-base-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583184" comment="kernel-ppc64-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583185" comment="kernel-ppc64-base-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583187" comment="kernel-source-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583188" comment="kernel-syms-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583189" comment="kernel-trace-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583190" comment="kernel-trace-base-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583192" comment="kernel-xen-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583193" comment="kernel-xen-base-3.0.101-108.21.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220042" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VVUXCLQ7WIXJFNYSB6YFSFQV3AE3BKOZ/#VVUXCLQ7WIXJFNYSB6YFSFQV3AE3BKOZ" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

This update is only provided as a fix update for IBM Z platform.

- CVE-2017-5753 / 'Spectre Attack': IBM Z fixes were included but not enabled in the previous update. This update enables those fixes.
- CVE-2017-5715 / 'Spectre Attack': IBM Z fixes were already included in the previous update. A bugfix for the patches has been applied on top.
- CVE-2017-5754: The IBM Z architecture is not affected by the 'Meltdown' attack.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-18"/>
	<updated date="2018-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583195" comment="kernel-default-3.0.101-108.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583196" comment="kernel-default-base-3.0.101-108.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583198" comment="kernel-default-man-3.0.101-108.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583199" comment="kernel-source-3.0.101-108.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583200" comment="kernel-syms-3.0.101-108.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583201" comment="kernel-trace-3.0.101-108.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583202" comment="kernel-trace-base-3.0.101-108.24.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583195" comment="kernel-default-3.0.101-108.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583196" comment="kernel-default-base-3.0.101-108.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583198" comment="kernel-default-man-3.0.101-108.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583199" comment="kernel-source-3.0.101-108.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583200" comment="kernel-syms-3.0.101-108.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583201" comment="kernel-trace-3.0.101-108.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583202" comment="kernel-trace-base-3.0.101-108.24.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220043" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1045538" ref_url="https://bugzilla.suse.com/1045538" source="BUGZILLA"/>
		<reference ref_id="1048585" ref_url="https://bugzilla.suse.com/1048585" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1054305" ref_url="https://bugzilla.suse.com/1054305" source="BUGZILLA"/>
		<reference ref_id="1059174" ref_url="https://bugzilla.suse.com/1059174" source="BUGZILLA"/>
		<reference ref_id="1060279" ref_url="https://bugzilla.suse.com/1060279" source="BUGZILLA"/>
		<reference ref_id="1060682" ref_url="https://bugzilla.suse.com/1060682" source="BUGZILLA"/>
		<reference ref_id="1063544" ref_url="https://bugzilla.suse.com/1063544" source="BUGZILLA"/>
		<reference ref_id="1064861" ref_url="https://bugzilla.suse.com/1064861" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068984" ref_url="https://bugzilla.suse.com/1068984" source="BUGZILLA"/>
		<reference ref_id="1069508" ref_url="https://bugzilla.suse.com/1069508" source="BUGZILLA"/>
		<reference ref_id="1070623" ref_url="https://bugzilla.suse.com/1070623" source="BUGZILLA"/>
		<reference ref_id="1070781" ref_url="https://bugzilla.suse.com/1070781" source="BUGZILLA"/>
		<reference ref_id="1073311" ref_url="https://bugzilla.suse.com/1073311" source="BUGZILLA"/>
		<reference ref_id="1074488" ref_url="https://bugzilla.suse.com/1074488" source="BUGZILLA"/>
		<reference ref_id="1074621" ref_url="https://bugzilla.suse.com/1074621" source="BUGZILLA"/>
		<reference ref_id="1074880" ref_url="https://bugzilla.suse.com/1074880" source="BUGZILLA"/>
		<reference ref_id="1075088" ref_url="https://bugzilla.suse.com/1075088" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075410" ref_url="https://bugzilla.suse.com/1075410" source="BUGZILLA"/>
		<reference ref_id="1075617" ref_url="https://bugzilla.suse.com/1075617" source="BUGZILLA"/>
		<reference ref_id="1075621" ref_url="https://bugzilla.suse.com/1075621" source="BUGZILLA"/>
		<reference ref_id="1075908" ref_url="https://bugzilla.suse.com/1075908" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1076017" ref_url="https://bugzilla.suse.com/1076017" source="BUGZILLA"/>
		<reference ref_id="1076154" ref_url="https://bugzilla.suse.com/1076154" source="BUGZILLA"/>
		<reference ref_id="1076278" ref_url="https://bugzilla.suse.com/1076278" source="BUGZILLA"/>
		<reference ref_id="1076437" ref_url="https://bugzilla.suse.com/1076437" source="BUGZILLA"/>
		<reference ref_id="1076849" ref_url="https://bugzilla.suse.com/1076849" source="BUGZILLA"/>
		<reference ref_id="1077191" ref_url="https://bugzilla.suse.com/1077191" source="BUGZILLA"/>
		<reference ref_id="1077355" ref_url="https://bugzilla.suse.com/1077355" source="BUGZILLA"/>
		<reference ref_id="1077406" ref_url="https://bugzilla.suse.com/1077406" source="BUGZILLA"/>
		<reference ref_id="1077487" ref_url="https://bugzilla.suse.com/1077487" source="BUGZILLA"/>
		<reference ref_id="1077560" ref_url="https://bugzilla.suse.com/1077560" source="BUGZILLA"/>
		<reference ref_id="1077922" ref_url="https://bugzilla.suse.com/1077922" source="BUGZILLA"/>
		<reference ref_id="1078875" ref_url="https://bugzilla.suse.com/1078875" source="BUGZILLA"/>
		<reference ref_id="1079917" ref_url="https://bugzilla.suse.com/1079917" source="BUGZILLA"/>
		<reference ref_id="1080133" ref_url="https://bugzilla.suse.com/1080133" source="BUGZILLA"/>
		<reference ref_id="1080359" ref_url="https://bugzilla.suse.com/1080359" source="BUGZILLA"/>
		<reference ref_id="1080363" ref_url="https://bugzilla.suse.com/1080363" source="BUGZILLA"/>
		<reference ref_id="1080372" ref_url="https://bugzilla.suse.com/1080372" source="BUGZILLA"/>
		<reference ref_id="1080579" ref_url="https://bugzilla.suse.com/1080579" source="BUGZILLA"/>
		<reference ref_id="1080685" ref_url="https://bugzilla.suse.com/1080685" source="BUGZILLA"/>
		<reference ref_id="1080774" ref_url="https://bugzilla.suse.com/1080774" source="BUGZILLA"/>
		<reference ref_id="1081500" ref_url="https://bugzilla.suse.com/1081500" source="BUGZILLA"/>
		<reference ref_id="936530" ref_url="https://bugzilla.suse.com/936530" source="BUGZILLA"/>
		<reference ref_id="962257" ref_url="https://bugzilla.suse.com/962257" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1142857" ref_url="https://www.suse.com/security/cve/CVE-2015-1142857/" source="CVE"/>
		<reference ref_id="CVE-2017-13215" ref_url="https://www.suse.com/security/cve/CVE-2017-13215/" source="CVE"/>
		<reference ref_id="CVE-2017-17741" ref_url="https://www.suse.com/security/cve/CVE-2017-17741/" source="CVE"/>
		<reference ref_id="CVE-2017-18017" ref_url="https://www.suse.com/security/cve/CVE-2017-18017/" source="CVE"/>
		<reference ref_id="CVE-2017-18079" ref_url="https://www.suse.com/security/cve/CVE-2017-18079/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-5332" ref_url="https://www.suse.com/security/cve/CVE-2018-5332/" source="CVE"/>
		<reference ref_id="CVE-2018-5333" ref_url="https://www.suse.com/security/cve/CVE-2018-5333/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003756.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-5715: Systems with microprocessors utilizing speculative
  execution and indirect branch prediction may allow unauthorized disclosure
  of information to an attacker with local user access via a side-channel
  analysis (bnc#1068032).

  The previous fix using CPU Microcode has been complemented by building
  the Linux Kernel with return trampolines aka 'retpolines'.

- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function
  did not validate a value that is used during DMA page allocation, leading
  to a heap-based out-of-bounds write (related to the rds_rdma_extra_size
  function in net/rds/rdma.c) (bnc#1075621).
- CVE-2018-5333: In the Linux kernel the rds_cmsg_atomic function in
  net/rds/rdma.c mishandled cases where page pinning fails or an invalid
  address is supplied, leading to an rds_atomic_free_op NULL pointer
  dereference (bnc#1075617).
- CVE-2017-18017: The tcpmss_mangle_packet function in
  net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers
  to cause a denial of service (use-after-free and memory corruption)
  or possibly have unspecified other impact by leveraging the presence of
  xt_TCPMSS in an iptables action (bnc#1074488).
- CVE-2017-18079: drivers/input/serio/i8042.c in the Linux kernel allowed
  attackers to cause a denial of service (NULL pointer dereference and
  system crash) or possibly have unspecified other impact because the
  port-&gt;exists value can change after it is validated (bnc#1077922).
- CVE-2015-1142857: On multiple SR-IOV cars it is possible for VF's
  assigned to guests to send ethernet flow control pause frames via the
  PF. (bnc#1077355).
- CVE-2017-17741: The KVM implementation in the Linux kernel allowed
  attackers to obtain potentially sensitive information from kernel
  memory, aka a write_mmio stack-based out-of-bounds read, related to
  arch/x86/kvm/x86.c and include/trace/events/kvm.h (bnc#1073311).
- CVE-2017-13215: A elevation of privilege vulnerability in the Upstream
  kernel skcipher. (bnc#1075908).
- CVE-2018-1000004: In the Linux kernel a race condition vulnerability
  existed in the sound system, this can lead to a deadlock and denial of
  service condition (bnc#1076017).

The following non-security bugs were fixed:

- alsa: aloop: Fix inconsistent format due to incomplete rule (bsc#1045538).
- alsa: aloop: Fix racy hw constraints adjustment (bsc#1045538).
- alsa: aloop: Release cable upon open error path (bsc#1045538).
- alsa: pcm: Abort properly at pending signal in OSS read/write loops (bsc#1045538).
- alsa: pcm: Add missing error checks in OSS emulation plugin builder (bsc#1045538).
- alsa: pcm: Allow aborting mutex lock at OSS read/write loops (bsc#1045538).
- alsa: pcm: Remove incorrect snd_BUG_ON() usages (bsc#1045538).
- alsa: pcm: Remove yet superfluous WARN_ON() (bsc#1045538).
- btrfs: cleanup unnecessary assignment when cleaning up all the residual transaction (FATE#325056).
- btrfs: copy fsid to super_block s_uuid (bsc#1080774).
- btrfs: do not wait for all the writers circularly during the transaction commit (FATE#325056).
- btrfs: do not WARN() in btrfs_transaction_abort() for IO errors (bsc#1080363).
- btrfs: fix two use-after-free bugs with transaction cleanup (FATE#325056).
- btrfs: make the state of the transaction more readable (FATE#325056).
- btrfs: qgroup: exit the rescan worker during umount (bsc#1080685).
- btrfs: qgroup: Fix dead judgement on qgroup_rescan_leaf() return value (bsc#1080685).
- btrfs: reset intwrite on transaction abort (FATE#325056).
- btrfs: set qgroup_ulist to be null after calling ulist_free() (bsc#1080359).
- btrfs: stop waiting on current trans if we aborted (FATE#325056).
- cdc-acm: apply quirk for card reader (bsc#1060279).
- cdrom: factor out common open_for_* code (bsc#1048585).
- cdrom: wait for tray to close (bsc#1048585).
- delay: add poll_event_interruptible (bsc#1048585).
- dm flakey: add corrupt_bio_byte feature (bsc#1080372).
- dm flakey: add drop_writes (bsc#1080372).
- dm flakey: error READ bios during the down_interval (bsc#1080372).
- dm flakey: fix crash on read when corrupt_bio_byte not set (bsc#1080372).
- dm flakey: fix reads to be issued if drop_writes configured (bsc#1080372).
- dm flakey: introduce 'error_writes' feature (bsc#1080372).
- dm flakey: support feature args (bsc#1080372).
- dm flakey: use dm_target_offset and support discards (bsc#1080372).
- ext2: free memory allocated and forget buffer head when io error happens (bnc#1069508).
- ext2: use unlikely to improve the efficiency of the kernel (bnc#1069508).
- ext3: add necessary check in case IO error happens (bnc#1069508).
- ext3: use unlikely to improve the efficiency of the kernel (bnc#1069508).
- fork: clear thread stack upon allocation (bsc#1077560).
- kaiser: Add proper NX handling for !NX-capable systems also to kaiser_add_user_map(). (bsc#1076278).
- kaiser: do not clobber ZF by calling ENABLE_IBRS after test and before jz
- kaiser: fix ia32 compat sysexit (bsc#1080579) sysexit_from_sys_call cannot make assumption of accessible stack after CR3 switch, and therefore should use the SWITCH_USER_CR3_NO_STACK method to flip the pagetable hierarchy.
- kaiser: Fix trampoline stack loading issue on XEN PV
- kaiser: handle non-accessible stack in sysretl_from_sys_call properly (bsc#bsc#1080579)
- kaiser: make sure not to touch stack after CR3 switch in compat syscall return
- kaiser: really do switch away from trampoline stack to kernel stack in ia32_syscall entry (bsc#1080579)
- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621 bsc#1068032).
- keys: trusted: fix writing past end of buffer in trusted_read() (bsc#1074880).
- media: omap_vout: Fix a possible null pointer dereference in omap_vout_open() (bsc#1050431).
- mISDN: fix a loop count (bsc#1077191).
- nfsd: do not share group_info among threads (bsc@1070623).
- ocfs2: avoid blocking in ocfs2_mark_lockres_freeing() in downconvert thread (bsc#1076437).
- ocfs2: do not set OCFS2_LOCK_UPCONVERT_FINISHING if nonblocking lock can not be granted at once (bsc#1076437).
- ocfs2: NFS hangs in __ocfs2_cluster_lock due to race with ocfs2_unblock_lock (bsc#962257).
- powerpc/64: Add macros for annotating the destination of rfid/hrfid (bsc#1068032, bsc#1075088).
- powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).
- powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).
- powerpc/64s: Add EX_SIZE definition for paca exception save areas (bsc#1068032, bsc#1075088).
- powerpc/64s: Add support for RFI flush of L1-D cache  (bsc#1068032, bsc#1075088).
- powerpc/64s: Allow control of RFI flush via debugfs (bsc#1068032,  bsc#1075088).
- powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).
- powerpc/64s: Simple RFI macro conversions (bsc#1068032, bsc#1075088).
- powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti (bsc#1068032, bsc#1075088).
- powerpc/64s: Wire up cpu_show_meltdown() (bsc#1068032).
- powerpc/asm: Allow including ppc_asm.h in asm files (bsc#1068032, bsc#1075088).
- powerpc: Fix register clobbering when accumulating stolen time (bsc#1059174).
- powerpc: Fix up the kdump base cap to 128M (bsc#1079917, bsc#1077487).
- powerpc: Mark CONFIG_PPC_DEBUG_RFI as BROKEN (bsc#1075088).
- powerpc/perf: Dereference BHRB entries safely (bsc#1064861, FATE#317619, git-fixes).
- powerpc/perf: Fix book3s kernel to userspace backtraces (bsc#1080133).
- powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags &amp; wrapper (bsc#1068032, bsc#1075088).
- powerpc/pseries: include linux/types.h in asm/hvcall.h (bsc#1068032, bsc#1075088).
- powerpc/pseries: Introduce H_GET_CPU_CHARACTERISTICS (bsc#1068032, bsc#1075088).
- powerpc/pseries: Kill all prefetch streams on context switch (bsc#1068032, bsc#1075088).
- powerpc/pseries: Query hypervisor for RFI flush settings (bsc#1068032,  bsc#1075088).
- powerpc/pseries: rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075088).
- powerpc/pseries/rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1075088).
- powerpc/pseries/rfi-flush: Drop PVR-based selection (bsc#1075088).
- powerpc/rfi-flush: Add DEBUG_RFI config option (bsc#1068032,  bsc#1075088).
- powerpc/rfi-flush: Factor out init_fallback_flush() (bsc#1075088).
- powerpc/rfi-flush: Make setup_rfi_flush() not __init (bsc#1075088).
- powerpc/rfi-flush: Move RFI flush fields out of the paca  (unbreak kABI) (bsc#1068032, bsc#1075088).
- powerpc/rfi-flush: Move the logic to avoid a redo into the  sysfs code (bsc#1068032, bsc#1075088).
- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1075088).
- powerpc/vdso64: Use double word compare on pointers (bsc#1070781).
- rfi-flush: Make DEBUG_RFI a CONFIG option (bsc#1068032, bsc#1075088).
- rfi-flush: Move rfi_flush_fallback_area to end of paca (bsc#1075088).
- rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1075088).
- rfi-flush: Switch to new linear fallback flush (bsc#1068032,bsc#1075088).
- s390: add ppa to the idle loop (bnc#1077406, LTC#163910).
- s390/cpuinfo: show facilities as reported by stfle (bnc#1076849, LTC#163741).
- scsi: libiscsi: fix shifting of DID_REQUEUE host byte (bsc#1078875).
- scsi: sr: wait for the medium to become ready (bsc#1048585).
- scsi: virtio_scsi: let host do exception handling (bsc#936530,bsc#1060682).
- storvsc: do not assume SG list is continuous when doing bounce buffers (bsc#1075410).
- sysfs/cpu: Add vulnerability folder (bnc#1012382).
- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).
- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).
- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).
- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).
- x86, asm: Extend definitions of _ASM_* with a raw format (bsc#1068032 CVE-2017-5754).
- x86/boot: Fix early command-line parsing when matching at end (bsc#1068032).
- x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).
- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).
- x86/CPU: Sync CPU feature flags late (bsc#1075994 bsc#1075091).
- x86/kaiser: Populate shadow PGD with NX bit only if supported by platform (bsc#1076154 bsc#1076278).
- x86/kaiser: use trampoline stack for kernel entry.
- x86/microcode/intel: Extend BDW late-loading further with LLC size check (bsc#1054305).
- x86/microcode/intel: Extend BDW late-loading with a revision check (bsc#1054305).
- x86/microcode: Rescan feature flags upon late loading (bsc#1075994 bsc#1075091).
- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).
- x86/spec_ctrl: handle late setting of X86_FEATURE_SPEC_CTRL properly (bsc#1075994 bsc#1075091).
- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).
- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).
- x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL (bsc#1068032 CVE-2017-5715).
- mm: pin address_space before dereferencing it while isolating an LRU page (bnc#1081500).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-27"/>
	<updated date="2018-02-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045538">SUSE bug 1045538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048585">SUSE bug 1048585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054305">SUSE bug 1054305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059174">SUSE bug 1059174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060279">SUSE bug 1060279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060682">SUSE bug 1060682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063544">SUSE bug 1063544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064861">SUSE bug 1064861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068984">SUSE bug 1068984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069508">SUSE bug 1069508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070623">SUSE bug 1070623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070781">SUSE bug 1070781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073311">SUSE bug 1073311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074488">SUSE bug 1074488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074621">SUSE bug 1074621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074880">SUSE bug 1074880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075088">SUSE bug 1075088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075410">SUSE bug 1075410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075617">SUSE bug 1075617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075621">SUSE bug 1075621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075908">SUSE bug 1075908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076154">SUSE bug 1076154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076278">SUSE bug 1076278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076437">SUSE bug 1076437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076849">SUSE bug 1076849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077191">SUSE bug 1077191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077355">SUSE bug 1077355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077406">SUSE bug 1077406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077487">SUSE bug 1077487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077560">SUSE bug 1077560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077922">SUSE bug 1077922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078875">SUSE bug 1078875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079917">SUSE bug 1079917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080133">SUSE bug 1080133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080359">SUSE bug 1080359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080363">SUSE bug 1080363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080372">SUSE bug 1080372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080579">SUSE bug 1080579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080685">SUSE bug 1080685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080774">SUSE bug 1080774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081500">SUSE bug 1081500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936530">SUSE bug 936530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962257">SUSE bug 962257</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-1142857/">CVE-2015-1142857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1142857">CVE-2015-1142857 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13215/">CVE-2017-13215 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13215">CVE-2017-13215 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17741/">CVE-2017-17741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17741">CVE-2017-17741 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18017/">CVE-2017-18017 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18017">CVE-2017-18017 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18079/">CVE-2017-18079 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18079">CVE-2017-18079 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000004">CVE-2018-1000004 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5332/">CVE-2018-5332 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5332">CVE-2018-5332 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5333/">CVE-2018-5333 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5333">CVE-2018-5333 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583204" comment="kernel-bigmem-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583205" comment="kernel-bigmem-base-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583207" comment="kernel-default-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583208" comment="kernel-default-base-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583210" comment="kernel-default-man-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583211" comment="kernel-ec2-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583212" comment="kernel-ec2-base-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583214" comment="kernel-pae-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583215" comment="kernel-pae-base-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583217" comment="kernel-ppc64-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583218" comment="kernel-ppc64-base-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583220" comment="kernel-source-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583221" comment="kernel-syms-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583222" comment="kernel-trace-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583223" comment="kernel-trace-base-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583225" comment="kernel-xen-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583226" comment="kernel-xen-base-3.0.101-108.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583204" comment="kernel-bigmem-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583205" comment="kernel-bigmem-base-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583207" comment="kernel-default-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583208" comment="kernel-default-base-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583210" comment="kernel-default-man-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583211" comment="kernel-ec2-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583212" comment="kernel-ec2-base-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583214" comment="kernel-pae-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583215" comment="kernel-pae-base-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583217" comment="kernel-ppc64-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583218" comment="kernel-ppc64-base-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583220" comment="kernel-source-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583221" comment="kernel-syms-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583222" comment="kernel-trace-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583223" comment="kernel-trace-base-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583225" comment="kernel-xen-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583226" comment="kernel-xen-base-3.0.101-108.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220044" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1046610" ref_url="https://bugzilla.suse.com/1046610" source="BUGZILLA"/>
		<reference ref_id="1052943" ref_url="https://bugzilla.suse.com/1052943" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1075087" ref_url="https://bugzilla.suse.com/1075087" source="BUGZILLA"/>
		<reference ref_id="1075088" ref_url="https://bugzilla.suse.com/1075088" source="BUGZILLA"/>
		<reference ref_id="1080157" ref_url="https://bugzilla.suse.com/1080157" source="BUGZILLA"/>
		<reference ref_id="1084760" ref_url="https://bugzilla.suse.com/1084760" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087092" ref_url="https://bugzilla.suse.com/1087092" source="BUGZILLA"/>
		<reference ref_id="1089895" ref_url="https://bugzilla.suse.com/1089895" source="BUGZILLA"/>
		<reference ref_id="1090630" ref_url="https://bugzilla.suse.com/1090630" source="BUGZILLA"/>
		<reference ref_id="1090888" ref_url="https://bugzilla.suse.com/1090888" source="BUGZILLA"/>
		<reference ref_id="1091041" ref_url="https://bugzilla.suse.com/1091041" source="BUGZILLA"/>
		<reference ref_id="1091671" ref_url="https://bugzilla.suse.com/1091671" source="BUGZILLA"/>
		<reference ref_id="1091755" ref_url="https://bugzilla.suse.com/1091755" source="BUGZILLA"/>
		<reference ref_id="1091815" ref_url="https://bugzilla.suse.com/1091815" source="BUGZILLA"/>
		<reference ref_id="1092372" ref_url="https://bugzilla.suse.com/1092372" source="BUGZILLA"/>
		<reference ref_id="1092497" ref_url="https://bugzilla.suse.com/1092497" source="BUGZILLA"/>
		<reference ref_id="1094019" ref_url="https://bugzilla.suse.com/1094019" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="CVE-2018-10675" ref_url="https://www.suse.com/security/cve/CVE-2018-10675/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004072.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-3639: Information leaks using 'Memory Disambiguation' feature
  in modern CPUs were mitigated, aka 'Spectre Variant 4' (bnc#1087082).

  A new boot commandline option was introduced,
  'spec_store_bypass_disable', which can have following values:

  - auto: Kernel detects whether your CPU model contains an implementation
    of Speculative Store Bypass and picks the most appropriate mitigation.
  - on: disable Speculative Store Bypass
  - off: enable Speculative Store Bypass
  - prctl: Control Speculative Store Bypass per thread via
    prctl. Speculative Store Bypass is enabled for a process by default. The
    state of the control is inherited on fork.
  - seccomp: Same as 'prctl' above, but all seccomp threads will disable
    SSB unless they explicitly opt out.

  The default is 'seccomp', meaning programs need explicit opt-in into the mitigation.

  Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing:

  - 'Vulnerable'
  - 'Mitigation: Speculative Store Bypass disabled'
  - 'Mitigation: Speculative Store Bypass disabled via prctl'
  - 'Mitigation: Speculative Store Bypass disabled via prctl and seccomp'

- CVE-2018-1000199: An address corruption flaw was discovered while
  modifying a h/w breakpoint via 'modify_user_hw_breakpoint' routine, an
  unprivileged user/process could use this flaw to crash the system kernel
  resulting in DoS OR to potentially escalate privileges on a the system. (bsc#1089895)
- CVE-2018-10675: The do_get_mempolicy function in mm/mempolicy.c allowed
  local users to cause a denial of service (use-after-free) or possibly
  have unspecified other impact via crafted system calls (bnc#1091755).
- CVE-2017-5715: The retpoline mitigation for Spectre v2 has been enabled also for 32bit x86.
- CVE-2017-5753: Spectre v1 mitigations have been improved by the versions
  merged from the upstream kernel.

The following non-security bugs were fixed:

- Avoid quadratic search when freeing delegations (bsc#1084760).
- cifs: fix crash due to race in hmac(md5) handling (bsc#1091671).
- hid: roccat: prevent an out of bounds read in kovaplus_profile_activated() (bsc#1087092).
- mmc: jz4740: Fix race condition in IRQ mask update (bsc#1090888).
- powerpc/64: Disable gmb() on powerpc
- powerpc/64s: Add barrier_nospec (bsc#1068032, bsc#1080157).
- powerpc/64s: Add support for ori barrier_nospec patching (bsc#1068032, bsc#1080157).
- powerpc/64s: Enable barrier_nospec based on firmware settings (bsc#1068032, bsc#1080157).
- powerpc/64s: Enhance the information in cpu_show_meltdown() (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/64s: Enhance the information in cpu_show_spectre_v1() (bsc#1068032).
- powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Improve RFI L1-D cache flush fallback (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/64s: Move cpu_show_meltdown() (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/64s: Patch barrier_nospec in modules (bsc#1068032, bsc#1080157).
- powerpc/64s: Wire up cpu_show_spectre_v1() (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/64s: Wire up cpu_show_spectre_v2() (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/64: Use barrier_nospec in syscall entry (bsc#1068032, bsc#1080157).
- powerpc: Add security feature flags for Spectre/Meltdown (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc: Move default security feature flags (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc: Move local setup.h declarations to arch includes (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/pseries: Fix clearing of security feature flags (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/pseries: Restore default security feature flags on setup (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/pseries: Set or clear security feature flags (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/rfi-flush: Always enable fallback flush on pseries (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/rfi-flush: Differentiate enabled and patched flush types (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc: Use barrier_nospec in copy_from_user() (bsc#1068032, bsc#1080157).
- series.conf: fix the header It was corrupted back in 2015.
- tracing: Create seq_buf layer in trace_seq (bsc#1091815).
- Update config files. Enable retpolines for i386 build.
- usb: Accept bulk endpoints with 1024-byte maxpacket (bsc#1090888).
- usb: hub: fix SS hub-descriptor handling (bsc#1092372).
- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1092497).
- x86/kaiser: export symbol kaiser_set_shadow_pgd() (bsc#1090630)
- x86/xen: disable IBRS around CPU stopper function invocation
- xen-netfront: fix req_prod check to avoid RX hang when index wraps (bsc#1046610).
- xfs: fix buffer use after free on IO error (bsc#1052943).
- xfs: prevent recursion in xfs_buf_iorequest (bsc#1052943).

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046610">SUSE bug 1046610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052943">SUSE bug 1052943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075087">SUSE bug 1075087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075088">SUSE bug 1075088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080157">SUSE bug 1080157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084760">SUSE bug 1084760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087092">SUSE bug 1087092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089895">SUSE bug 1089895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090630">SUSE bug 1090630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090888">SUSE bug 1090888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091041">SUSE bug 1091041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091671">SUSE bug 1091671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091755">SUSE bug 1091755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092372">SUSE bug 1092372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092497">SUSE bug 1092497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094019">SUSE bug 1094019</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000199">CVE-2018-1000199 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10675/">CVE-2018-10675 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10675">CVE-2018-10675 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583228" comment="kernel-bigmem-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583229" comment="kernel-bigmem-base-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583231" comment="kernel-default-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583232" comment="kernel-default-base-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583234" comment="kernel-default-man-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583235" comment="kernel-ec2-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583236" comment="kernel-ec2-base-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583238" comment="kernel-pae-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583239" comment="kernel-pae-base-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583241" comment="kernel-ppc64-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583242" comment="kernel-ppc64-base-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583244" comment="kernel-source-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583245" comment="kernel-syms-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583246" comment="kernel-trace-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583247" comment="kernel-trace-base-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583249" comment="kernel-xen-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583250" comment="kernel-xen-base-3.0.101-108.48.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583228" comment="kernel-bigmem-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583229" comment="kernel-bigmem-base-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583231" comment="kernel-default-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583232" comment="kernel-default-base-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583234" comment="kernel-default-man-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583235" comment="kernel-ec2-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583236" comment="kernel-ec2-base-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583238" comment="kernel-pae-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583239" comment="kernel-pae-base-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583241" comment="kernel-ppc64-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583242" comment="kernel-ppc64-base-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583244" comment="kernel-source-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583245" comment="kernel-syms-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583246" comment="kernel-trace-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583247" comment="kernel-trace-base-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583249" comment="kernel-xen-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583250" comment="kernel-xen-base-3.0.101-108.48.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220045" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1013018" ref_url="https://bugzilla.suse.com/1013018" source="BUGZILLA"/>
		<reference ref_id="1070404" ref_url="https://bugzilla.suse.com/1070404" source="BUGZILLA"/>
		<reference ref_id="1072689" ref_url="https://bugzilla.suse.com/1072689" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1088343" ref_url="https://bugzilla.suse.com/1088343" source="BUGZILLA"/>
		<reference ref_id="1089386" ref_url="https://bugzilla.suse.com/1089386" source="BUGZILLA"/>
		<reference ref_id="1090607" ref_url="https://bugzilla.suse.com/1090607" source="BUGZILLA"/>
		<reference ref_id="1091659" ref_url="https://bugzilla.suse.com/1091659" source="BUGZILLA"/>
		<reference ref_id="1092497" ref_url="https://bugzilla.suse.com/1092497" source="BUGZILLA"/>
		<reference ref_id="1093600" ref_url="https://bugzilla.suse.com/1093600" source="BUGZILLA"/>
		<reference ref_id="1093710" ref_url="https://bugzilla.suse.com/1093710" source="BUGZILLA"/>
		<reference ref_id="919382" ref_url="https://bugzilla.suse.com/919382" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:1482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004105.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

This update main focus is a regression fix in SystemV IPC handling. (bsc#1093600)

The following non-security bugs were fixed:

- Drop cBPF SSBD as classic BPF does not really have a proper concept of pointers, and without eBPF maps the out-of-bounds access in speculative execution branch can't be mounted. Moreoever, seccomp BPF uses only such a subset of BPF that can only do absolute indexing, and therefore seccomp data buffer boundarier can't be crossed. Information condensed from Alexei and Kees.
- ibrs used instead of retpoline on Haswell processor with spectre_v2=retpoline (bsc#1092497)
- ib/mlx4: Convert slave port before building address-handle (bug#919382 FATE#317529).
- KABI protect struct _lowcore (bsc#1089386).
- Update config files, add Spectre mitigation for s390x (bnc#1089386, LTC#166572).
- Update s390 config files (bsc#1089386).
- fanotify: fix logic of events on child (bsc#1013018).
- ipc/msg: Fix faulty parsing of msgctl args (bsc#1093600,bsc#1072689).
- ocfs2/dlm: Fix up kABI in dlm_ctxt (bsc#1070404).
- ocfs2/dlm: wait for dlm recovery done when migrating all lock resources (bsc#1013018).
- powerpc, KVM: Split HVMODE_206 cpu feature bit into separate HV and architecture bits (bsc#1087082).
- powerpc: Fix /proc/cpuinfo revision for POWER9 DD2 (FATE#325713, bsc#1093710).
- s390/cio: update chpid descriptor after resource accessibility event (bnc#1091659, LTC#167429).
- s390/dasd: fix IO error for newly defined devices (bnc#1091659, LTC#167398).
- s390/qdio: fix access to uninitialized qdio_q fields (bnc#1091659, LTC#168037).
- s390/qeth: on channel error, reject further cmd requests (bnc#1088343, LTC#165985).
- s390: add automatic detection of the spectre defense (bnc#1089386, LTC#166572).
- s390: add optimized array_index_mask_nospec (bnc#1089386, LTC#166572).
- s390: add sysfs attributes for spectre (bnc#1089386, LTC#166572).
- s390: correct module section names for expoline code revert (bsc#1089386).
- s390: correct nospec auto detection init order (bnc#1089386, LTC#166572).
- s390: do not bypass BPENTER for interrupt system calls (bnc#1089386, LTC#166572).
- s390: fix retpoline build on 31bit (bsc#1089386).
- s390: improve cpu alternative handling for gmb and nobp (bnc#1089386, LTC#166572).
- s390: introduce execute-trampolines for branches (bnc#1089386, LTC#166572).
- s390: move nobp parameter functions to nospec-branch.c (bnc#1089386, LTC#166572).
- s390: report spectre mitigation via syslog (bnc#1089386, LTC#166572).
- s390: run user space and KVM guests with modified branch prediction (bnc#1089386, LTC#166572).
- s390: scrub registers on kernel entry and KVM exit (bnc#1089386, LTC#166572).
- x86, mce: Fix mce_start_timer semantics (bsc#1090607).
- x86/kaiser: symbol kaiser_set_shadow_pgd() exported with non GPL
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-31"/>
	<updated date="2018-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013018">SUSE bug 1013018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070404">SUSE bug 1070404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072689">SUSE bug 1072689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088343">SUSE bug 1088343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089386">SUSE bug 1089386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090607">SUSE bug 1090607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091659">SUSE bug 1091659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092497">SUSE bug 1092497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093600">SUSE bug 1093600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093710">SUSE bug 1093710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919382">SUSE bug 919382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583252" comment="kernel-bigmem-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583253" comment="kernel-bigmem-base-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583255" comment="kernel-default-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583256" comment="kernel-default-base-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583258" comment="kernel-default-man-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583259" comment="kernel-ec2-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583260" comment="kernel-ec2-base-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583262" comment="kernel-pae-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583263" comment="kernel-pae-base-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583265" comment="kernel-ppc64-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583266" comment="kernel-ppc64-base-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583268" comment="kernel-source-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583269" comment="kernel-syms-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583270" comment="kernel-trace-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583271" comment="kernel-trace-base-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583273" comment="kernel-xen-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583274" comment="kernel-xen-base-3.0.101-108.52.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583252" comment="kernel-bigmem-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583253" comment="kernel-bigmem-base-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583255" comment="kernel-default-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583256" comment="kernel-default-base-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583258" comment="kernel-default-man-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583259" comment="kernel-ec2-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583260" comment="kernel-ec2-base-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583262" comment="kernel-pae-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583263" comment="kernel-pae-base-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583265" comment="kernel-ppc64-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583266" comment="kernel-ppc64-base-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583268" comment="kernel-source-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583269" comment="kernel-syms-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583270" comment="kernel-trace-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583271" comment="kernel-trace-base-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583273" comment="kernel-xen-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583274" comment="kernel-xen-base-3.0.101-108.52.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220046" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1082962" ref_url="https://bugzilla.suse.com/1082962" source="BUGZILLA"/>
		<reference ref_id="1083900" ref_url="https://bugzilla.suse.com/1083900" source="BUGZILLA"/>
		<reference ref_id="1085107" ref_url="https://bugzilla.suse.com/1085107" source="BUGZILLA"/>
		<reference ref_id="1087081" ref_url="https://bugzilla.suse.com/1087081" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1092904" ref_url="https://bugzilla.suse.com/1092904" source="BUGZILLA"/>
		<reference ref_id="1094353" ref_url="https://bugzilla.suse.com/1094353" source="BUGZILLA"/>
		<reference ref_id="1096480" ref_url="https://bugzilla.suse.com/1096480" source="BUGZILLA"/>
		<reference ref_id="1096728" ref_url="https://bugzilla.suse.com/1096728" source="BUGZILLA"/>
		<reference ref_id="1097234" ref_url="https://bugzilla.suse.com/1097234" source="BUGZILLA"/>
		<reference ref_id="1098016" ref_url="https://bugzilla.suse.com/1098016" source="BUGZILLA"/>
		<reference ref_id="1099924" ref_url="https://bugzilla.suse.com/1099924" source="BUGZILLA"/>
		<reference ref_id="1099942" ref_url="https://bugzilla.suse.com/1099942" source="BUGZILLA"/>
		<reference ref_id="1100418" ref_url="https://bugzilla.suse.com/1100418" source="BUGZILLA"/>
		<reference ref_id="1104475" ref_url="https://bugzilla.suse.com/1104475" source="BUGZILLA"/>
		<reference ref_id="1104684" ref_url="https://bugzilla.suse.com/1104684" source="BUGZILLA"/>
		<reference ref_id="909361" ref_url="https://bugzilla.suse.com/909361" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8405" ref_url="https://www.suse.com/security/cve/CVE-2016-8405/" source="CVE"/>
		<reference ref_id="CVE-2017-13305" ref_url="https://www.suse.com/security/cve/CVE-2017-13305/" source="CVE"/>
		<reference ref_id="CVE-2018-1000204" ref_url="https://www.suse.com/security/cve/CVE-2018-1000204/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-1130" ref_url="https://www.suse.com/security/cve/CVE-2018-1130/" source="CVE"/>
		<reference ref_id="CVE-2018-12233" ref_url="https://www.suse.com/security/cve/CVE-2018-12233/" source="CVE"/>
		<reference ref_id="CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053/" source="CVE"/>
		<reference ref_id="CVE-2018-13406" ref_url="https://www.suse.com/security/cve/CVE-2018-13406/" source="CVE"/>
		<reference ref_id="CVE-2018-3620" ref_url="https://www.suse.com/security/cve/CVE-2018-3620/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-5803" ref_url="https://www.suse.com/security/cve/CVE-2018-5803/" source="CVE"/>
		<reference ref_id="CVE-2018-5814" ref_url="https://www.suse.com/security/cve/CVE-2018-5814/" source="CVE"/>
		<reference ref_id="CVE-2018-7492" ref_url="https://www.suse.com/security/cve/CVE-2018-7492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
- CVE-2018-1000204: A malformed SG_IO ioctl issued for a SCSI device could lead to a local kernel information leak manifesting in up to approximately 1000 memory pages copied to the userspace. The problem has limited scope as non-privileged users usually have no permissions to access SCSI device files. (bnc#1096728).
- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).
- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 bnc#1100418).
- CVE-2016-8405: An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. (bnc#1099942).
- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations could be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).
- CVE-2018-12233: In the ea_get function in fs/jfs/xattr.c a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. (bnc#1097234).
- CVE-2017-13305: A information disclosure vulnerability in the Upstream kernel encrypted-keys. (bnc#1094353).
- CVE-2018-1130: A null pointer dereference in dccp_write_xmit() function in net/dccp/output.c allowed a local user to cause a denial of service by a number of certain crafted system calls (bnc#1092904).
- CVE-2018-1068: A flaw was found in the implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bnc#1085107).
- CVE-2018-5803: An error in the '_sctp_make_chunk()' function (net/sctp/sm_make_chunk.c) when handling SCTP packets length could be exploited to cause a kernel crash (bnc#1083900).
- CVE-2018-7492: A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function allowed local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST (bnc#1082962).

The following non-security bugs were fixed:

- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- disable-prot_none_mitigation.patch: disable prot_none native mitigation (bnc#1104684)
- fix pgd underflow (bnc#1104475) custom walk_page_range rework was incorrect and could underflow pgd if the given range was below a first vma.
- slab: introduce kmalloc_array() (bsc#909361).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/cpu/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- xen/x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- xen/x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- xen/x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/mm: Simplify p[g4um]d_page() macros (bnc#1087081, bnc#1104684).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-15"/>
	<updated date="2018-08-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082962">SUSE bug 1082962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083900">SUSE bug 1083900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085107">SUSE bug 1085107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092904">SUSE bug 1092904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094353">SUSE bug 1094353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096480">SUSE bug 1096480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096728">SUSE bug 1096728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097234">SUSE bug 1097234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098016">SUSE bug 1098016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099924">SUSE bug 1099924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099942">SUSE bug 1099942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100418">SUSE bug 1100418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104475">SUSE bug 1104475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104684">SUSE bug 1104684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909361">SUSE bug 909361</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8405/">CVE-2016-8405 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8405">CVE-2016-8405 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-13305/">CVE-2017-13305 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13305">CVE-2017-13305 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000204/">CVE-2018-1000204 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000204">CVE-2018-1000204 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1068">CVE-2018-1068 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1130/">CVE-2018-1130 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1130">CVE-2018-1130 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12233/">CVE-2018-12233 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12233">CVE-2018-12233 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13053">CVE-2018-13053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13406/">CVE-2018-13406 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13406">CVE-2018-13406 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3620/">CVE-2018-3620 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3620">CVE-2018-3620 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3646">CVE-2018-3646 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5803/">CVE-2018-5803 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5803">CVE-2018-5803 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5814/">CVE-2018-5814 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5814">CVE-2018-5814 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7492/">CVE-2018-7492 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7492">CVE-2018-7492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583276" comment="kernel-bigmem-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583277" comment="kernel-bigmem-base-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583279" comment="kernel-default-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583280" comment="kernel-default-base-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583282" comment="kernel-default-man-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583283" comment="kernel-ec2-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583284" comment="kernel-ec2-base-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583286" comment="kernel-pae-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583287" comment="kernel-pae-base-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583289" comment="kernel-ppc64-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583290" comment="kernel-ppc64-base-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583292" comment="kernel-source-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583293" comment="kernel-syms-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583294" comment="kernel-trace-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583295" comment="kernel-trace-base-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583297" comment="kernel-xen-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583298" comment="kernel-xen-base-3.0.101-108.68.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583276" comment="kernel-bigmem-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583277" comment="kernel-bigmem-base-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583279" comment="kernel-default-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583280" comment="kernel-default-base-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583282" comment="kernel-default-man-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583283" comment="kernel-ec2-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583284" comment="kernel-ec2-base-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583286" comment="kernel-pae-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583287" comment="kernel-pae-base-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583289" comment="kernel-ppc64-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583290" comment="kernel-ppc64-base-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583292" comment="kernel-source-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583293" comment="kernel-syms-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583294" comment="kernel-trace-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583295" comment="kernel-trace-base-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583297" comment="kernel-xen-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583298" comment="kernel-xen-base-3.0.101-108.68.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220047" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1108399" ref_url="https://bugzilla.suse.com/1108399" source="BUGZILLA"/>
		<reference ref_id="1109967" ref_url="https://bugzilla.suse.com/1109967" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004663.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-17182: An issue was discovered in the Linux kernel The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bnc#1108399).

The following non-security bugs were fixed:

- x86/fpu: Do not do __thread_fpu_end() if use_eager_fpu() (bnc#1109967).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-11"/>
	<updated date="2018-10-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1108399">SUSE bug 1108399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109967">SUSE bug 1109967</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17182">CVE-2018-17182 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583300" comment="kernel-bigmem-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583301" comment="kernel-bigmem-base-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583303" comment="kernel-default-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583304" comment="kernel-default-base-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583306" comment="kernel-default-man-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583307" comment="kernel-ec2-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583308" comment="kernel-ec2-base-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583310" comment="kernel-pae-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583311" comment="kernel-pae-base-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583313" comment="kernel-ppc64-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583314" comment="kernel-ppc64-base-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583316" comment="kernel-source-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583317" comment="kernel-syms-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583318" comment="kernel-trace-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583319" comment="kernel-trace-base-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583321" comment="kernel-xen-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583322" comment="kernel-xen-base-3.0.101-108.77.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583300" comment="kernel-bigmem-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583301" comment="kernel-bigmem-base-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583303" comment="kernel-default-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583304" comment="kernel-default-base-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583306" comment="kernel-default-man-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583307" comment="kernel-ec2-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583308" comment="kernel-ec2-base-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583310" comment="kernel-pae-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583311" comment="kernel-pae-base-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583313" comment="kernel-ppc64-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583314" comment="kernel-ppc64-base-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583316" comment="kernel-source-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583317" comment="kernel-syms-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583318" comment="kernel-trace-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583319" comment="kernel-trace-base-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583321" comment="kernel-xen-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583322" comment="kernel-xen-base-3.0.101-108.77.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220048" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1031572" ref_url="https://bugzilla.suse.com/1031572" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1086695" ref_url="https://bugzilla.suse.com/1086695" source="BUGZILLA"/>
		<reference ref_id="1087081" ref_url="https://bugzilla.suse.com/1087081" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1098658" ref_url="https://bugzilla.suse.com/1098658" source="BUGZILLA"/>
		<reference ref_id="1104098" ref_url="https://bugzilla.suse.com/1104098" source="BUGZILLA"/>
		<reference ref_id="1104367" ref_url="https://bugzilla.suse.com/1104367" source="BUGZILLA"/>
		<reference ref_id="1104684" ref_url="https://bugzilla.suse.com/1104684" source="BUGZILLA"/>
		<reference ref_id="1104818" ref_url="https://bugzilla.suse.com/1104818" source="BUGZILLA"/>
		<reference ref_id="1105536" ref_url="https://bugzilla.suse.com/1105536" source="BUGZILLA"/>
		<reference ref_id="1106105" ref_url="https://bugzilla.suse.com/1106105" source="BUGZILLA"/>
		<reference ref_id="1106886" ref_url="https://bugzilla.suse.com/1106886" source="BUGZILLA"/>
		<reference ref_id="1107371" ref_url="https://bugzilla.suse.com/1107371" source="BUGZILLA"/>
		<reference ref_id="1109330" ref_url="https://bugzilla.suse.com/1109330" source="BUGZILLA"/>
		<reference ref_id="1109806" ref_url="https://bugzilla.suse.com/1109806" source="BUGZILLA"/>
		<reference ref_id="1110006" ref_url="https://bugzilla.suse.com/1110006" source="BUGZILLA"/>
		<reference ref_id="1112963" ref_url="https://bugzilla.suse.com/1112963" source="BUGZILLA"/>
		<reference ref_id="1113667" ref_url="https://bugzilla.suse.com/1113667" source="BUGZILLA"/>
		<reference ref_id="1114440" ref_url="https://bugzilla.suse.com/1114440" source="BUGZILLA"/>
		<reference ref_id="1114672" ref_url="https://bugzilla.suse.com/1114672" source="BUGZILLA"/>
		<reference ref_id="1114920" ref_url="https://bugzilla.suse.com/1114920" source="BUGZILLA"/>
		<reference ref_id="1115007" ref_url="https://bugzilla.suse.com/1115007" source="BUGZILLA"/>
		<reference ref_id="1115038" ref_url="https://bugzilla.suse.com/1115038" source="BUGZILLA"/>
		<reference ref_id="1115827" ref_url="https://bugzilla.suse.com/1115827" source="BUGZILLA"/>
		<reference ref_id="1115828" ref_url="https://bugzilla.suse.com/1115828" source="BUGZILLA"/>
		<reference ref_id="1115829" ref_url="https://bugzilla.suse.com/1115829" source="BUGZILLA"/>
		<reference ref_id="1115830" ref_url="https://bugzilla.suse.com/1115830" source="BUGZILLA"/>
		<reference ref_id="1115831" ref_url="https://bugzilla.suse.com/1115831" source="BUGZILLA"/>
		<reference ref_id="1115832" ref_url="https://bugzilla.suse.com/1115832" source="BUGZILLA"/>
		<reference ref_id="1115833" ref_url="https://bugzilla.suse.com/1115833" source="BUGZILLA"/>
		<reference ref_id="1115834" ref_url="https://bugzilla.suse.com/1115834" source="BUGZILLA"/>
		<reference ref_id="1115835" ref_url="https://bugzilla.suse.com/1115835" source="BUGZILLA"/>
		<reference ref_id="1115836" ref_url="https://bugzilla.suse.com/1115836" source="BUGZILLA"/>
		<reference ref_id="1115837" ref_url="https://bugzilla.suse.com/1115837" source="BUGZILLA"/>
		<reference ref_id="1115838" ref_url="https://bugzilla.suse.com/1115838" source="BUGZILLA"/>
		<reference ref_id="1115839" ref_url="https://bugzilla.suse.com/1115839" source="BUGZILLA"/>
		<reference ref_id="1115840" ref_url="https://bugzilla.suse.com/1115840" source="BUGZILLA"/>
		<reference ref_id="1115841" ref_url="https://bugzilla.suse.com/1115841" source="BUGZILLA"/>
		<reference ref_id="1115842" ref_url="https://bugzilla.suse.com/1115842" source="BUGZILLA"/>
		<reference ref_id="1115843" ref_url="https://bugzilla.suse.com/1115843" source="BUGZILLA"/>
		<reference ref_id="1115844" ref_url="https://bugzilla.suse.com/1115844" source="BUGZILLA"/>
		<reference ref_id="1116841" ref_url="https://bugzilla.suse.com/1116841" source="BUGZILLA"/>
		<reference ref_id="1117796" ref_url="https://bugzilla.suse.com/1117796" source="BUGZILLA"/>
		<reference ref_id="1117802" ref_url="https://bugzilla.suse.com/1117802" source="BUGZILLA"/>
		<reference ref_id="1117805" ref_url="https://bugzilla.suse.com/1117805" source="BUGZILLA"/>
		<reference ref_id="1117806" ref_url="https://bugzilla.suse.com/1117806" source="BUGZILLA"/>
		<reference ref_id="1117943" ref_url="https://bugzilla.suse.com/1117943" source="BUGZILLA"/>
		<reference ref_id="1118152" ref_url="https://bugzilla.suse.com/1118152" source="BUGZILLA"/>
		<reference ref_id="1118319" ref_url="https://bugzilla.suse.com/1118319" source="BUGZILLA"/>
		<reference ref_id="1118760" ref_url="https://bugzilla.suse.com/1118760" source="BUGZILLA"/>
		<reference ref_id="1119255" ref_url="https://bugzilla.suse.com/1119255" source="BUGZILLA"/>
		<reference ref_id="1119714" ref_url="https://bugzilla.suse.com/1119714" source="BUGZILLA"/>
		<reference ref_id="1120056" ref_url="https://bugzilla.suse.com/1120056" source="BUGZILLA"/>
		<reference ref_id="1120077" ref_url="https://bugzilla.suse.com/1120077" source="BUGZILLA"/>
		<reference ref_id="1120086" ref_url="https://bugzilla.suse.com/1120086" source="BUGZILLA"/>
		<reference ref_id="1120093" ref_url="https://bugzilla.suse.com/1120093" source="BUGZILLA"/>
		<reference ref_id="1120094" ref_url="https://bugzilla.suse.com/1120094" source="BUGZILLA"/>
		<reference ref_id="1120105" ref_url="https://bugzilla.suse.com/1120105" source="BUGZILLA"/>
		<reference ref_id="1120107" ref_url="https://bugzilla.suse.com/1120107" source="BUGZILLA"/>
		<reference ref_id="1120109" ref_url="https://bugzilla.suse.com/1120109" source="BUGZILLA"/>
		<reference ref_id="1120217" ref_url="https://bugzilla.suse.com/1120217" source="BUGZILLA"/>
		<reference ref_id="1120223" ref_url="https://bugzilla.suse.com/1120223" source="BUGZILLA"/>
		<reference ref_id="1120226" ref_url="https://bugzilla.suse.com/1120226" source="BUGZILLA"/>
		<reference ref_id="1120336" ref_url="https://bugzilla.suse.com/1120336" source="BUGZILLA"/>
		<reference ref_id="1120347" ref_url="https://bugzilla.suse.com/1120347" source="BUGZILLA"/>
		<reference ref_id="1120743" ref_url="https://bugzilla.suse.com/1120743" source="BUGZILLA"/>
		<reference ref_id="1120950" ref_url="https://bugzilla.suse.com/1120950" source="BUGZILLA"/>
		<reference ref_id="1121872" ref_url="https://bugzilla.suse.com/1121872" source="BUGZILLA"/>
		<reference ref_id="1121997" ref_url="https://bugzilla.suse.com/1121997" source="BUGZILLA"/>
		<reference ref_id="1122874" ref_url="https://bugzilla.suse.com/1122874" source="BUGZILLA"/>
		<reference ref_id="1123505" ref_url="https://bugzilla.suse.com/1123505" source="BUGZILLA"/>
		<reference ref_id="1123702" ref_url="https://bugzilla.suse.com/1123702" source="BUGZILLA"/>
		<reference ref_id="1123706" ref_url="https://bugzilla.suse.com/1123706" source="BUGZILLA"/>
		<reference ref_id="1124010" ref_url="https://bugzilla.suse.com/1124010" source="BUGZILLA"/>
		<reference ref_id="1124735" ref_url="https://bugzilla.suse.com/1124735" source="BUGZILLA"/>
		<reference ref_id="1125931" ref_url="https://bugzilla.suse.com/1125931" source="BUGZILLA"/>
		<reference ref_id="931850" ref_url="https://bugzilla.suse.com/931850" source="BUGZILLA"/>
		<reference ref_id="969471" ref_url="https://bugzilla.suse.com/969471" source="BUGZILLA"/>
		<reference ref_id="969473" ref_url="https://bugzilla.suse.com/969473" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10741" ref_url="https://www.suse.com/security/cve/CVE-2016-10741/" source="CVE"/>
		<reference ref_id="CVE-2017-18360" ref_url="https://www.suse.com/security/cve/CVE-2017-18360/" source="CVE"/>
		<reference ref_id="CVE-2018-19407" ref_url="https://www.suse.com/security/cve/CVE-2018-19407/" source="CVE"/>
		<reference ref_id="CVE-2018-19824" ref_url="https://www.suse.com/security/cve/CVE-2018-19824/" source="CVE"/>
		<reference ref_id="CVE-2018-19985" ref_url="https://www.suse.com/security/cve/CVE-2018-19985/" source="CVE"/>
		<reference ref_id="CVE-2018-20169" ref_url="https://www.suse.com/security/cve/CVE-2018-20169/" source="CVE"/>
		<reference ref_id="CVE-2018-9568" ref_url="https://www.suse.com/security/cve/CVE-2018-9568/" source="CVE"/>
		<reference ref_id="CVE-2019-7222" ref_url="https://www.suse.com/security/cve/CVE-2019-7222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005194.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2016-10741: fs/xfs/xfs_aops.c allowed local users to cause a denial of service (system crash) because there is a race condition between direct and memory-mapped I/O (associated with a hole) that is handled with BUG_ON instead of an I/O failure (bnc#1114920 bnc#1124010).
- CVE-2017-18360: In change_port_settings in drivers/usb/serial/io_ti.c local users could cause a denial of service by division-by-zero in the serial device layer by trying to set very high baud rates (bnc#1123706).
- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bnc#1118319).
- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized (bnc#1116841).
- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).
- CVE-2018-19985: The function hso_probe read if_num from the USB device (as an u8) and used it without a length check to index an array, resulting in an OOB memory read in hso_probe or hso_get_config_data that could be used by local attackers (bnc#1120743).
- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).
- CVE-2019-7222: A information leak in exception handling in KVM could be used to expose host memory to guests. (bnc#1124735).

The following non-security bugs were fixed:

- aacraid: Fix memory leak in aac_fib_map_free (bsc#1115827).
- arcmsr: upper 32 of dma address lost (bsc#1115828).
- block/swim3: Fix -EBUSY error when re-opening device after unmount (bsc#1121997).
- block/swim: Fix array bounds check (Git-fix).
- btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).
- btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).
- cpusets, isolcpus: exclude isolcpus from load balancing in cpusets (bsc#1119255).
- dasd: fix deadlock in dasd_times_out (bnc#1117943, LTC#174111).
- drivers: hv: vmbus: check the creation_status in vmbus_establish_gpadl() (bsc#1104098).
- drm/ast: Remove existing framebuffers before loading driver (boo#1112963)
- drm/fb-helper: Ignore the value of fb_var_screeninfo.pixclock (bsc#1106886)
- ext4: add missing brelse() update_backups()'s error path (bsc#1117796).
- ext4: avoid buffer leak in ext4_orphan_add() after prior errors (bsc#1117802).
- ext4: avoid possible double brelse() in add_new_gdb() on error path (bsc#1118760).
- ext4: fix buffer leak in ext4_xattr_move_to_block() on error path (bsc#1117806).
- ext4: release bs.bh before re-using in ext4_xattr_block_find() (bsc#1117805).
- fbdev: fbcon: Fix unregister crash when more than one framebuffer (bsc#1106886)
- fbdev: fbmem: behave better with small rotated displays and many CPUs (bsc#1106886)
- Fix kabi break cased by NFS: Cache state owners after files are closed (bsc#1031572).
- fork: record start_time late (bsc#1121872).
- fscache: Fix dead object requeue (bsc#1107371).
- fscache: Fix race in fscache_op_complete() due to split atomic_sub &amp; read (git-fixes).
- fs-cache: Move fscache_report_unexpected_submission() to make it more available (bsc#1107371).
- fs-cache: When submitting an op, cancel it if the target object is dying (bsc#1107371).
- fuse: Add missed unlock_page() to fuse_readpages_fill() (git-fixes).
- fuse: fix blocked_waitq wakeup (git-fixes).
- fuse: fix leaked notify reply (git-fixes).
- fuse: Fix oops at process_init_reply() (git-fixes).
- fuse: fix possibly missed wake-up after abort (git-fixes).
- fuse: umount should wait for all requests (git-fixes).
- igb: do not unmap NULL hw_addr (bsc#969471 bsc#969473 ) (bsc#1123702).
- igb: re-assign hw address pointer on reset after PCI error (bnc#1012382) (bsc#1123702).
- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).
- kvm: x86: Fix the duplicated failure path handling in vmx_init (bsc#1104367).
- lib: add 'on'/'off' support to strtobool (bsc#1125931).
- megaraid_sas: Fix probing cards without io port (bsc#1115829).
- net/af_iucv: drop inbound packets with invalid flags (bnc#1114440, LTC#172679).
- net/af_iucv: fix skb handling on HiperTransport xmit error (bnc#1114440, LTC#172679).
- nfs: Cache state owners after files are closed (bsc#1031572).
- nfs: Do not drop CB requests with invalid principals (git-fixes).
- nfsv4.1: Fix a kfree() of uninitialised pointers in decode_cb_sequence_args (git-fixes).
- nfsv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).
- nfsv4: Keep dropped state owners on the LRU list for a while (bsc#1031572).
- nlm: Ensure callback code also checks that the files match (git-fixes).
- ocfs2: fix three small problems in the patch (bsc#1086695)
- omap2fb: Fix stack memory disclosure (bsc#1106886)
- pci/ASPM: Fix link_state teardown on device removal (bsc#1109806).
- powerpc/fadump: handle crash memory ranges array index overflow (git-fixes).
- powerpc/fadump: Return error when fadump registration fails (git-fixes).
- powerpc/fadump: Unregister fadump on kexec down path (git-fixes).
- powerpc/traps: restore recoverability of machine_check interrupts (bsc#1094244).
- Revert 'NFS: Make close(2) asynchronous when closing NFS O_DIRECT files' (git-fixes).
- ring-buffer: Always reset iterator to reader page (bsc#1120107).
- ring-buffer: Fix first commit on sub-buffer having non-zero delta (bsc#1120077).
- ring-buffer: Fix infinite spin in reading buffer (bsc#1120107).
- ring-buffer: Have ring_buffer_iter_empty() return true when empty (bsc#1120107).
- ring-buffer: Mask out the info bits when returning buffer page length (bsc#1120094).
- ring-buffer: Up rb_iter_peek() loop count to 3 (bsc#1120105).
- rpm/modprobe-xen.conf: Add --ignore-install.
- s390: always save and restore all registers on context switch (git-fixes).
- s390/dasd: fix using offset into zero size array error (git-fixes).
- s390/decompressor: fix initrd corruption caused by bss clear (git-fixes).
- s390/qdio: do not release memory in qdio_setup_irq() (git-fixes).
- s390/qdio: reset old sbal_state flags (bnc#1114440, LTC#171525).
- s390: qeth_core_mpc: Use ARRAY_SIZE instead of reimplementing its function (bnc#1114440, LTC#172682).
- s390/qeth: fix length check in SNMP processing (bnc#1117943, LTC#173657).
- s390: qeth: Fix potential array overrun in cmd/rc lookup (bnc#1114440, LTC#172682).
- s390/qeth: invoke softirqs after napi_schedule() (git-fixes).
- s390/qeth: remove outdated portname debug msg (bnc#1117943, LTC#172960).
- s390/qeth: sanitize strings in debug messages (bnc#1117943, LTC#172960).
- sched, isolcpu: make cpu_isolated_map visible outside scheduler (bsc#1119255).
- scsi: aacraid: Fix typo in blink status (bsc#1115830).
- scsi: aacraid: Reorder Adapter status check (bsc#1115830).
- scsi: aic94xx: fix an error code in aic94xx_init() (bsc#1115831).
- scsi: bfa: integer overflow in debugfs (bsc#1115832).
- scsi: esp_scsi: Track residual for PIO transfers (bsc#1115833).
- scsi: fas216: fix sense buffer initialization (bsc#1115834).
- scsi: libfc: Revert ' libfc: use offload EM instance again instead jumping to next EM' (bsc#1115835).
- scsi: libsas: fix ata xfer length (bsc#1115836).
- scsi: libsas: fix error when getting phy events (bsc#1115837).
- scsi: lpfc: Do not return internal MBXERR_ERROR code from probe function (bsc#1115838).
- scsi: megaraid_sas: Fix data integrity failure for JBOD (passthrough) devices (bsc#1115839).
- scsi: megaraid_sas: fix macro MEGASAS_IS_LOGICAL to avoid regression (bsc#1115839).
- scsi: qla2xxx: Fix ISP recovery on unload (bsc#1115840).
- scsi: qla2xxx: shutdown chip if reset fail (bsc#1115841).
- scsi: qlogicpti: Fix an error handling path in 'qpti_sbus_probe()' (bsc#1115842).
- scsi: scsi_dh_emc: return success in clariion_std_inquiry() (bsc#1115843).
- scsi: zfcp: add handling for FCP_RESID_OVER to the fcp ingress path (git-fixes).
- scsi: zfcp: fix posting too many status read buffers leading to adapter shutdown (bsc#1123505, LTC#174581).
- sg: fix dxferp in from_to case (bsc#1115844).
- sunrpc: Fix a potential race in xprt_connect() (git-fixes).
- svc: Avoid garbage replies when pc_func() returns rpc_drop_reply (git-fixes).
- svcrpc: do not leak contexts on PROC_DESTROY (git-fixes).
- tracepoints: Do not trace when cpu is offline (bsc#1120109).
- tracing: Add #undef to fix compile error (bsc#1120226).
- tracing: Allow events to have NULL strings (bsc#1120056).
- tracing: Do not add event files for modules that fail tracepoints (bsc#1120086).
- tracing: Fix check for cpu online when event is disabled (bsc#1120109).
- tracing: Fix regex_match_front() to not over compare the test string (bsc#1120223).
- tracing/kprobes: Allow to create probe with a module name starting with a digit (bsc#1120336).
- tracing: Move mutex to protect against resetting of seq data (bsc#1120217).
- tracing: probeevent: Fix to support minus offset from symbol (bsc#1120347).
- usb: keyspan: fix overrun-error reporting (bsc#1114672).
- usb: keyspan: fix tty line-status reporting (bsc#1114672).
- usb: option: fix Cinterion AHxx enumeration (bsc#1114672).
- usb: serial: ark3116: fix open error handling (bsc#1114672).
- usb: serial: ch341: fix control-message error handling (bsc#1114672).
- usb: serial: ch341: fix initial modem-control state (bsc#1114672).
- usb: serial: ch341: fix modem-status handling (bsc#1114672).
- usb: serial: ch341: fix open and resume after B0 (bsc#1114672).
- usb: serial: ch341: fix resume after reset (bsc#1114672).
- usb: serial: ch341: fix type promotion bug in ch341_control_in() (bsc#1114672).
- usb: serial: cyberjack: fix NULL-deref at open (bsc#1114672).
- usb: serial: fix tty-device error handling at probe (bsc#1114672).
- usb: serial: ftdi_sio: fix modem-status error handling (bsc#1114672).
- usb: serial: io_ti: fix another NULL-deref at open (bsc#1114672).
- usb: serial: io_ti: fix NULL-deref at open (bsc#1114672).
- usb: serial: keyspan_pda: verify endpoints at probe (bsc#1114672).
- usb: serial: kl5kusb105: abort on open exception path (bsc#1114672).
- usb: serial: kl5kusb105: fix open error path (bsc#1114672).
- usb: serial: kobil_sct: fix NULL-deref in write (bsc#1114672).
- usb: serial: mct_u232: fix modem-status error handling (bsc#1114672).
- usb: serial: omninet: fix NULL-derefs at open and disconnect.
- usb: serial: pl2303: fix NULL-deref at open (bsc#1114672).
- usb: serial: ti_usb_3410_5052: fix NULL-deref at open (bsc#1114672).
- vmcore: Remove 'weak' from function declarations (git-fixes).
- x86, kvm: Remove incorrect redundant assembly constraint (bnc#931850).
- x86/mm: Simplify p[g4um]xen: d_page() macros (bnc#1087081, bnc#1104684).
- xen: kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- xen: x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).
- xen/x86/mm: Prevent kernel Oops in PTDUMP code with HIGHPTE=y (bsc#1106105).
- xen/x86/mm: Set IBPB upon context switch (bsc#1068032).
- xen/x86/process: Re-export start_thread() (bsc#1110006).
- xen/x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- xen/x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).
- xen/x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- xen/x86/traps: add missing kernel CR3 switch in bad_iret path (bsc#1098658).
- xfrm: use complete IPv6 addresses for hash (bsc#1109330).
- xfs: do not BUG() on mixed direct and mapped I/O (bsc#1114920).
- xfs: fix the logspace waiting algorithm (bsc#1122874).
- xfs: stop searching for free slots in an inode chunk when there are none (bsc#1115007).
- xfs: validate sb_logsunit is a multiple of the fs blocksize (bsc#1115038).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-15"/>
	<updated date="2019-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031572">SUSE bug 1031572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086695">SUSE bug 1086695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098658">SUSE bug 1098658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104098">SUSE bug 1104098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104367">SUSE bug 1104367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104684">SUSE bug 1104684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104818">SUSE bug 1104818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105536">SUSE bug 1105536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106105">SUSE bug 1106105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106886">SUSE bug 1106886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107371">SUSE bug 1107371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109330">SUSE bug 1109330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109806">SUSE bug 1109806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110006">SUSE bug 1110006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112963">SUSE bug 1112963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113667">SUSE bug 1113667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114440">SUSE bug 1114440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114672">SUSE bug 1114672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114920">SUSE bug 1114920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115007">SUSE bug 1115007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115038">SUSE bug 1115038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115827">SUSE bug 1115827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115828">SUSE bug 1115828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115829">SUSE bug 1115829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115830">SUSE bug 1115830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115831">SUSE bug 1115831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115832">SUSE bug 1115832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115833">SUSE bug 1115833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115834">SUSE bug 1115834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115835">SUSE bug 1115835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115836">SUSE bug 1115836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115837">SUSE bug 1115837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115838">SUSE bug 1115838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115839">SUSE bug 1115839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115840">SUSE bug 1115840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115841">SUSE bug 1115841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115842">SUSE bug 1115842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115843">SUSE bug 1115843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115844">SUSE bug 1115844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116841">SUSE bug 1116841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117796">SUSE bug 1117796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117802">SUSE bug 1117802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117805">SUSE bug 1117805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117806">SUSE bug 1117806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117943">SUSE bug 1117943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118152">SUSE bug 1118152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118319">SUSE bug 1118319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118760">SUSE bug 1118760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119255">SUSE bug 1119255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119714">SUSE bug 1119714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120056">SUSE bug 1120056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120077">SUSE bug 1120077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120086">SUSE bug 1120086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120093">SUSE bug 1120093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120094">SUSE bug 1120094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120105">SUSE bug 1120105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120107">SUSE bug 1120107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120109">SUSE bug 1120109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120217">SUSE bug 1120217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120223">SUSE bug 1120223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120226">SUSE bug 1120226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120336">SUSE bug 1120336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120347">SUSE bug 1120347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120743">SUSE bug 1120743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120950">SUSE bug 1120950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121872">SUSE bug 1121872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121997">SUSE bug 1121997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122874">SUSE bug 1122874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123505">SUSE bug 1123505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123702">SUSE bug 1123702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123706">SUSE bug 1123706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124010">SUSE bug 1124010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124735">SUSE bug 1124735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125931">SUSE bug 1125931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931850">SUSE bug 931850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969471">SUSE bug 969471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969473">SUSE bug 969473</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2016-10741/">CVE-2016-10741 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10741">CVE-2016-10741 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18360/">CVE-2017-18360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18360">CVE-2017-18360 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19407/">CVE-2018-19407 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19407">CVE-2018-19407 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19824/">CVE-2018-19824 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19824">CVE-2018-19824 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19985/">CVE-2018-19985 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19985">CVE-2018-19985 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20169/">CVE-2018-20169 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20169">CVE-2018-20169 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9568/">CVE-2018-9568 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9568">CVE-2018-9568 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7222/">CVE-2019-7222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7222">CVE-2019-7222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583324" comment="kernel-bigmem-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583325" comment="kernel-bigmem-base-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583327" comment="kernel-default-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583328" comment="kernel-default-base-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583330" comment="kernel-default-man-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583331" comment="kernel-ec2-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583332" comment="kernel-ec2-base-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583334" comment="kernel-pae-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583335" comment="kernel-pae-base-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583337" comment="kernel-ppc64-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583338" comment="kernel-ppc64-base-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583340" comment="kernel-source-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583341" comment="kernel-syms-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583342" comment="kernel-trace-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583343" comment="kernel-trace-base-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583345" comment="kernel-xen-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583346" comment="kernel-xen-base-3.0.101-108.87.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583324" comment="kernel-bigmem-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583325" comment="kernel-bigmem-base-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583327" comment="kernel-default-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583328" comment="kernel-default-base-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583330" comment="kernel-default-man-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583331" comment="kernel-ec2-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583332" comment="kernel-ec2-base-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583334" comment="kernel-pae-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583335" comment="kernel-pae-base-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583337" comment="kernel-ppc64-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583338" comment="kernel-ppc64-base-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583340" comment="kernel-source-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583341" comment="kernel-syms-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583342" comment="kernel-trace-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583343" comment="kernel-trace-base-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583345" comment="kernel-xen-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583346" comment="kernel-xen-base-3.0.101-108.87.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220049" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1082943" ref_url="https://bugzilla.suse.com/1082943" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1103186" ref_url="https://bugzilla.suse.com/1103186" source="BUGZILLA"/>
		<reference ref_id="1106886" ref_url="https://bugzilla.suse.com/1106886" source="BUGZILLA"/>
		<reference ref_id="1110436" ref_url="https://bugzilla.suse.com/1110436" source="BUGZILLA"/>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1112178" ref_url="https://bugzilla.suse.com/1112178" source="BUGZILLA"/>
		<reference ref_id="1117515" ref_url="https://bugzilla.suse.com/1117515" source="BUGZILLA"/>
		<reference ref_id="1119019" ref_url="https://bugzilla.suse.com/1119019" source="BUGZILLA"/>
		<reference ref_id="1127082" ref_url="https://bugzilla.suse.com/1127082" source="BUGZILLA"/>
		<reference ref_id="1127376" ref_url="https://bugzilla.suse.com/1127376" source="BUGZILLA"/>
		<reference ref_id="1127445" ref_url="https://bugzilla.suse.com/1127445" source="BUGZILLA"/>
		<reference ref_id="1127534" ref_url="https://bugzilla.suse.com/1127534" source="BUGZILLA"/>
		<reference ref_id="1127738" ref_url="https://bugzilla.suse.com/1127738" source="BUGZILLA"/>
		<reference ref_id="1128166" ref_url="https://bugzilla.suse.com/1128166" source="BUGZILLA"/>
		<reference ref_id="1128383" ref_url="https://bugzilla.suse.com/1128383" source="BUGZILLA"/>
		<reference ref_id="1129248" ref_url="https://bugzilla.suse.com/1129248" source="BUGZILLA"/>
		<reference ref_id="1129437" ref_url="https://bugzilla.suse.com/1129437" source="BUGZILLA"/>
		<reference ref_id="1129439" ref_url="https://bugzilla.suse.com/1129439" source="BUGZILLA"/>
		<reference ref_id="1129770" ref_url="https://bugzilla.suse.com/1129770" source="BUGZILLA"/>
		<reference ref_id="1130353" ref_url="https://bugzilla.suse.com/1130353" source="BUGZILLA"/>
		<reference ref_id="1130384" ref_url="https://bugzilla.suse.com/1130384" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1131587" ref_url="https://bugzilla.suse.com/1131587" source="BUGZILLA"/>
		<reference ref_id="1132589" ref_url="https://bugzilla.suse.com/1132589" source="BUGZILLA"/>
		<reference ref_id="773383" ref_url="https://bugzilla.suse.com/773383" source="BUGZILLA"/>
		<reference ref_id="774523" ref_url="https://bugzilla.suse.com/774523" source="BUGZILLA"/>
		<reference ref_id="797175" ref_url="https://bugzilla.suse.com/797175" source="BUGZILLA"/>
		<reference ref_id="800280" ref_url="https://bugzilla.suse.com/800280" source="BUGZILLA"/>
		<reference ref_id="801178" ref_url="https://bugzilla.suse.com/801178" source="BUGZILLA"/>
		<reference ref_id="816708" ref_url="https://bugzilla.suse.com/816708" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3412" ref_url="https://www.suse.com/security/cve/CVE-2012-3412/" source="CVE"/>
		<reference ref_id="CVE-2012-3430" ref_url="https://www.suse.com/security/cve/CVE-2012-3430/" source="CVE"/>
		<reference ref_id="CVE-2013-0160" ref_url="https://www.suse.com/security/cve/CVE-2013-0160/" source="CVE"/>
		<reference ref_id="CVE-2013-0216" ref_url="https://www.suse.com/security/cve/CVE-2013-0216/" source="CVE"/>
		<reference ref_id="CVE-2013-0231" ref_url="https://www.suse.com/security/cve/CVE-2013-0231/" source="CVE"/>
		<reference ref_id="CVE-2013-1979" ref_url="https://www.suse.com/security/cve/CVE-2013-1979/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

This kernel update contains software mitigations for these issues, which also utilize CPU microcode updates shipped in parallel.

For more information on this set of information leaks, check out https://www.suse.com/support/kb/doc/?id=7023736

The following security bugs were fixed:

- CVE-2019-9213: The expand_downwards function in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).
- CVE-2013-0216: The Xen netback functionality allowed guest OS users to cause a denial of service (loop) by triggering ring pointer corruption (bnc#800280).
- CVE-2013-0231: The pciback_enable_msi function in the PCI backend driver (drivers/xen/pciback/conf_space_capability_msi.c) in Xen allowed guest OS users with PCI device access to cause a denial of service via a large number of kernel log messages. (bnc#801178).
- CVE-2012-3430: The rds_recvmsg function in net/rds/recv.c did not initialize a certain structure member, which allowed local users to obtain potentially sensitive information from kernel stack memory via a recvfrom or recvmsg system call on an RDS socket (bnc#773383).
- CVE-2012-3412: The sfc (aka Solarflare Solarstorm) driver allowed remote attackers to cause a denial of service (DMA descriptor consumption and network-controller outage) via crafted TCP packets that trigger a small MSS value (bnc#774523).
- CVE-2013-0160: The kernel allowed local users to obtain sensitive information about keystroke timing by using the inotify API on the /dev/ptmx device (bnc#797175).
- CVE-2013-1979: The scm_set_cred function in include/net/scm.h uses incorrect uid and gid values during credentials passing, which allowed local users to gain privileges via a crafted application (bnc#816708).

The following non-security bugs were fixed:

- Add opcodes from net: filter: BPF 'JIT' compiler for PPC64 (bsc#1131107).
- EHCI: improved logic for isochronous scheduling (bsc#1117515).
- KVM: x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bsc#1129439).
- USB: Add new USB LPM helpers (bsc#1129770).
- USB: Consolidate LPM checks to avoid enabling LPM twice (bsc#1129770).
- USB: EHCI: add new root-hub state: STOPPING (bsc#1117515).
- USB: EHCI: add pointer to end of async-unlink list (bsc#1117515).
- USB: EHCI: add symbolic constants for QHs (bsc#1117515).
- USB: EHCI: always scan each interrupt QH (bsc#1117515).
- USB: EHCI: do not lose events during a scan (bsc#1117515).
- USB: EHCI: do not refcount QHs (bsc#1117515).
- USB: EHCI: do not refcount iso_stream structures (bsc#1117515).
- USB: EHCI: fix initialization bug in iso_stream_schedule() (bsc#1117515).
- USB: EHCI: fix up locking (bsc#1117515).
- USB: EHCI: initialize data before resetting hardware (bsc#1117515).
- USB: EHCI: introduce high-res timer (bsc#1117515).
- USB: EHCI: remove PS3 status polling (bsc#1117515).
- USB: EHCI: remove unneeded suspend/resume code (bsc#1117515).
- USB: EHCI: rename 'reclaim' (bsc#1117515).
- USB: EHCI: resolve some unlikely races (bsc#1117515).
- USB: EHCI: return void instead of 0 (bsc#1117515).
- USB: EHCI: simplify isochronous scanning (bsc#1117515).
- USB: EHCI: unlink multiple async QHs together (bsc#1117515).
- USB: EHCI: use hrtimer for (s)iTD deallocation (bsc#1117515).
- USB: EHCI: use hrtimer for async schedule (bsc#1117515).
- USB: EHCI: use hrtimer for controller death (bsc#1117515).
- USB: EHCI: use hrtimer for interrupt QH unlink (bsc#1117515).
- USB: EHCI: use hrtimer for the I/O watchdog (bsc#1117515).
- USB: EHCI: use hrtimer for the IAA watchdog (bsc#1117515).
- USB: EHCI: use hrtimer for the periodic schedule (bsc#1117515).
- USB: EHCI: use hrtimer for unlinking empty async QHs (bsc#1117515).
- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).
- cpu/speculation: Add 'mitigations=' cmdline option (bsc#1112178).
- drm: Fix error handling in drm_legacy_addctx (bsc#1106886)
- ext3: Set bitmap tails when growing filesystem (bsc#1128383).
- fbdev: chipsfb: remove set but not used variable 'size' (bsc#1106886)
- iommu/vt-d: Check capability before disabling protected memory (bsc#1130353).
- iommu/vt-d: Check identity map for hot-added devices (bsc#1129248).
- kernel/watchdog.c: control hard lockup detection default (bsc#1110436).
- kvm: ensure hard lockup detection is disabled by default (bsc#1110436).
- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129437).
- kvm: x86: Add AMD's EX_CFG to the list of ignored MSRs (bsc#1127082).
- mm, oom: fix use-after-free in oom_kill_process (git fixes (mm/mmap)).
- mpt2sas: Fix IO error occurs on pulling out a drive from RAID1 volume created on two SATA drive (bsc#1130384).
- nfsd: fix memory corruption caused by readdir (bsc#1127445).
- powerpc/64: Call setup_barrier_nospec() from setup_arch() (bsc#1131107).
- powerpc/64: Disable the speculation barrier from the command line (bsc#1131107).
- powerpc/64: Make stf barrier PPC_BOOK3S_64 specific (bsc#1131107).
- powerpc/64s: Add new security feature flags for count cache flush (bsc#1131107).
- powerpc/64s: Add support for software count cache flush (bsc#1131107).
- powerpc/asm: Add a patch_site macro &amp; helpers for patching instructions (bsc#1131107).
- powerpc/fsl: Fix spectre_v2 mitigations reporting (bsc#1131107).
- powerpc/pseries/mce: Fix misleading print for TLB mutlihit (bsc#1094244, git-fixes).
- powerpc/pseries: Query hypervisor for count cache flush settings (bsc#1131107).
- powerpc/security: Fix spectre_v2 reporting (bsc#1131107).
- powerpc/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- powerpc/vdso32: fix CLOCK_MONOTONIC on PPC64 (bsc#1131587).
- powerpc/vdso64: Fix CLOCK_MONOTONIC inconsistencies across Y2038 (bsc#1131587).
- s390/dasd: fix panic for failed online processing (bsc#1132589).
- s390/qeth: cancel close_dev work before removing a card (LTC#175048, bsc#1127376).
- s390/qeth: fix use-after-free in error path (LTC#175048, bsc#1127376, bsc#1127534).
- s390/qeth: handle failure on workqueue creation (LTC#175048, bsc#1127376).
- s390/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- sched/core: Optimize SCHED_SMT (bsc#1111331).
- sched/smt: Expose sched_smt_present static key (bsc#1111331).
- sched/smt: Make sched_smt_present track topology (bsc#1111331).
- sched/smt: Update sched_smt_present at runtime (bsc#1111331).
- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- scsi: qla2xxx: do not disable a not previously enabled PCI device (bsc#1127738).
- x86/cpu: Sanitize FAM6_ATOM naming (bsc#1111331).
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active (bsc#1111331).
- x86/speculation/mds: Add 'mitigations=' support for MDS (bsc#1111331).
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bsc#1111331).
- x86/speculation/mds: Add SMT warning message (bsc#1111331).
- x86/speculation/mds: Add basic bug infrastructure for MDS (bsc#1111331).
- x86/speculation/mds: Add mds=full,nosmt cmdline option (bsc#1111331).
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bsc#1111331).
- x86/speculation/mds: Add mitigation control for MDS (bsc#1111331).
- x86/speculation/mds: Add mitigation mode VMWERV (bsc#1111331).
- x86/speculation/mds: Add sysfs reporting for MDS (bsc#1111331).
- x86/speculation/mds: Clear CPU buffers on exit to user (bsc#1111331).
- x86/speculation/mds: Conditionally clear CPU buffers on idle entry (bsc#1111331).
- x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off (bsc#1111331).
- x86/speculation: Consolidate CPU whitelists (bsc#1111331).
- x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation (bsc#1111331).
- x86/speculation: Move arch_smt_update() call to after mitigation decisions (bsc#1111331).
- x86/speculation: Rework SMT state change (bsc#1111331).
- x86/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-16"/>
	<updated date="2019-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082943">SUSE bug 1082943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106886">SUSE bug 1106886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110436">SUSE bug 1110436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112178">SUSE bug 1112178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117515">SUSE bug 1117515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119019">SUSE bug 1119019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127082">SUSE bug 1127082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127376">SUSE bug 1127376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127445">SUSE bug 1127445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127534">SUSE bug 1127534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127738">SUSE bug 1127738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128166">SUSE bug 1128166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128383">SUSE bug 1128383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129248">SUSE bug 1129248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129437">SUSE bug 1129437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129439">SUSE bug 1129439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129770">SUSE bug 1129770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130353">SUSE bug 1130353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130384">SUSE bug 1130384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131587">SUSE bug 1131587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132589">SUSE bug 1132589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773383">SUSE bug 773383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774523">SUSE bug 774523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797175">SUSE bug 797175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800280">SUSE bug 800280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801178">SUSE bug 801178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816708">SUSE bug 816708</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3412/">CVE-2012-3412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3412">CVE-2012-3412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3430/">CVE-2012-3430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3430">CVE-2012-3430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0160/">CVE-2013-0160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0160">CVE-2013-0160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0216/">CVE-2013-0216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0216">CVE-2013-0216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0231/">CVE-2013-0231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0231">CVE-2013-0231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1979/">CVE-2013-1979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1979">CVE-2013-1979 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9213">CVE-2019-9213 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583348" comment="kernel-bigmem-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583349" comment="kernel-bigmem-base-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583351" comment="kernel-default-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583352" comment="kernel-default-base-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583354" comment="kernel-default-man-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583355" comment="kernel-ec2-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583356" comment="kernel-ec2-base-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583358" comment="kernel-pae-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583359" comment="kernel-pae-base-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583361" comment="kernel-ppc64-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583362" comment="kernel-ppc64-base-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583364" comment="kernel-source-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583365" comment="kernel-syms-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583366" comment="kernel-trace-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583367" comment="kernel-trace-base-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583369" comment="kernel-xen-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583370" comment="kernel-xen-base-3.0.101-108.90.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220050" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1077355" ref_url="https://bugzilla.suse.com/1077355" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1142857" ref_url="https://www.suse.com/security/cve/CVE-2015-1142857/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003809.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

- CVE-2015-1142857: Add 7.13.1.0 bnx2x firmware files for ethernet flow control vulnerability in SRIOV devices (bsc#1077355)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-14"/>
	<updated date="2018-03-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077355">SUSE bug 1077355</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-1142857/">CVE-2015-1142857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1142857">CVE-2015-1142857 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583372" comment="kernel-firmware-20110923-0.59.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583372" comment="kernel-firmware-20110923-0.59.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220051" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="814440" ref_url="https://bugzilla.suse.com/814440" source="BUGZILLA"/>
		<reference ref_id="879378" ref_url="https://bugzilla.suse.com/879378" source="BUGZILLA"/>
		<reference ref_id="879381" ref_url="https://bugzilla.suse.com/879381" source="BUGZILLA"/>
		<reference ref_id="900610" ref_url="https://bugzilla.suse.com/900610" source="BUGZILLA"/>
		<reference ref_id="904348" ref_url="https://bugzilla.suse.com/904348" source="BUGZILLA"/>
		<reference ref_id="904965" ref_url="https://bugzilla.suse.com/904965" source="BUGZILLA"/>
		<reference ref_id="921081" ref_url="https://bugzilla.suse.com/921081" source="BUGZILLA"/>
		<reference ref_id="926774" ref_url="https://bugzilla.suse.com/926774" source="BUGZILLA"/>
		<reference ref_id="930145" ref_url="https://bugzilla.suse.com/930145" source="BUGZILLA"/>
		<reference ref_id="930770" ref_url="https://bugzilla.suse.com/930770" source="BUGZILLA"/>
		<reference ref_id="930788" ref_url="https://bugzilla.suse.com/930788" source="BUGZILLA"/>
		<reference ref_id="930835" ref_url="https://bugzilla.suse.com/930835" source="BUGZILLA"/>
		<reference ref_id="932805" ref_url="https://bugzilla.suse.com/932805" source="BUGZILLA"/>
		<reference ref_id="935123" ref_url="https://bugzilla.suse.com/935123" source="BUGZILLA"/>
		<reference ref_id="935757" ref_url="https://bugzilla.suse.com/935757" source="BUGZILLA"/>
		<reference ref_id="937256" ref_url="https://bugzilla.suse.com/937256" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="938706" ref_url="https://bugzilla.suse.com/938706" source="BUGZILLA"/>
		<reference ref_id="939826" ref_url="https://bugzilla.suse.com/939826" source="BUGZILLA"/>
		<reference ref_id="939926" ref_url="https://bugzilla.suse.com/939926" source="BUGZILLA"/>
		<reference ref_id="939955" ref_url="https://bugzilla.suse.com/939955" source="BUGZILLA"/>
		<reference ref_id="940017" ref_url="https://bugzilla.suse.com/940017" source="BUGZILLA"/>
		<reference ref_id="940913" ref_url="https://bugzilla.suse.com/940913" source="BUGZILLA"/>
		<reference ref_id="940946" ref_url="https://bugzilla.suse.com/940946" source="BUGZILLA"/>
		<reference ref_id="941202" ref_url="https://bugzilla.suse.com/941202" source="BUGZILLA"/>
		<reference ref_id="942938" ref_url="https://bugzilla.suse.com/942938" source="BUGZILLA"/>
		<reference ref_id="943786" ref_url="https://bugzilla.suse.com/943786" source="BUGZILLA"/>
		<reference ref_id="944296" ref_url="https://bugzilla.suse.com/944296" source="BUGZILLA"/>
		<reference ref_id="944677" ref_url="https://bugzilla.suse.com/944677" source="BUGZILLA"/>
		<reference ref_id="944831" ref_url="https://bugzilla.suse.com/944831" source="BUGZILLA"/>
		<reference ref_id="944837" ref_url="https://bugzilla.suse.com/944837" source="BUGZILLA"/>
		<reference ref_id="944989" ref_url="https://bugzilla.suse.com/944989" source="BUGZILLA"/>
		<reference ref_id="944993" ref_url="https://bugzilla.suse.com/944993" source="BUGZILLA"/>
		<reference ref_id="945691" ref_url="https://bugzilla.suse.com/945691" source="BUGZILLA"/>
		<reference ref_id="945825" ref_url="https://bugzilla.suse.com/945825" source="BUGZILLA"/>
		<reference ref_id="945827" ref_url="https://bugzilla.suse.com/945827" source="BUGZILLA"/>
		<reference ref_id="946078" ref_url="https://bugzilla.suse.com/946078" source="BUGZILLA"/>
		<reference ref_id="946214" ref_url="https://bugzilla.suse.com/946214" source="BUGZILLA"/>
		<reference ref_id="946309" ref_url="https://bugzilla.suse.com/946309" source="BUGZILLA"/>
		<reference ref_id="947957" ref_url="https://bugzilla.suse.com/947957" source="BUGZILLA"/>
		<reference ref_id="948330" ref_url="https://bugzilla.suse.com/948330" source="BUGZILLA"/>
		<reference ref_id="948347" ref_url="https://bugzilla.suse.com/948347" source="BUGZILLA"/>
		<reference ref_id="948521" ref_url="https://bugzilla.suse.com/948521" source="BUGZILLA"/>
		<reference ref_id="949100" ref_url="https://bugzilla.suse.com/949100" source="BUGZILLA"/>
		<reference ref_id="949298" ref_url="https://bugzilla.suse.com/949298" source="BUGZILLA"/>
		<reference ref_id="949502" ref_url="https://bugzilla.suse.com/949502" source="BUGZILLA"/>
		<reference ref_id="949706" ref_url="https://bugzilla.suse.com/949706" source="BUGZILLA"/>
		<reference ref_id="949744" ref_url="https://bugzilla.suse.com/949744" source="BUGZILLA"/>
		<reference ref_id="949936" ref_url="https://bugzilla.suse.com/949936" source="BUGZILLA"/>
		<reference ref_id="949981" ref_url="https://bugzilla.suse.com/949981" source="BUGZILLA"/>
		<reference ref_id="950298" ref_url="https://bugzilla.suse.com/950298" source="BUGZILLA"/>
		<reference ref_id="950750" ref_url="https://bugzilla.suse.com/950750" source="BUGZILLA"/>
		<reference ref_id="950998" ref_url="https://bugzilla.suse.com/950998" source="BUGZILLA"/>
		<reference ref_id="951440" ref_url="https://bugzilla.suse.com/951440" source="BUGZILLA"/>
		<reference ref_id="952084" ref_url="https://bugzilla.suse.com/952084" source="BUGZILLA"/>
		<reference ref_id="952384" ref_url="https://bugzilla.suse.com/952384" source="BUGZILLA"/>
		<reference ref_id="952579" ref_url="https://bugzilla.suse.com/952579" source="BUGZILLA"/>
		<reference ref_id="952976" ref_url="https://bugzilla.suse.com/952976" source="BUGZILLA"/>
		<reference ref_id="953527" ref_url="https://bugzilla.suse.com/953527" source="BUGZILLA"/>
		<reference ref_id="953799" ref_url="https://bugzilla.suse.com/953799" source="BUGZILLA"/>
		<reference ref_id="953980" ref_url="https://bugzilla.suse.com/953980" source="BUGZILLA"/>
		<reference ref_id="954404" ref_url="https://bugzilla.suse.com/954404" source="BUGZILLA"/>
		<reference ref_id="954628" ref_url="https://bugzilla.suse.com/954628" source="BUGZILLA"/>
		<reference ref_id="954950" ref_url="https://bugzilla.suse.com/954950" source="BUGZILLA"/>
		<reference ref_id="954984" ref_url="https://bugzilla.suse.com/954984" source="BUGZILLA"/>
		<reference ref_id="955673" ref_url="https://bugzilla.suse.com/955673" source="BUGZILLA"/>
		<reference ref_id="956709" ref_url="https://bugzilla.suse.com/956709" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0272" ref_url="https://www.suse.com/security/cve/CVE-2015-0272/" source="CVE"/>
		<reference ref_id="CVE-2015-5157" ref_url="https://www.suse.com/security/cve/CVE-2015-5157/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6937" ref_url="https://www.suse.com/security/cve/CVE-2015-6937/" source="CVE"/>
		<reference ref_id="CVE-2015-7509" ref_url="https://www.suse.com/security/cve/CVE-2015-7509/" source="CVE"/>
		<reference ref_id="CVE-2015-7799" ref_url="https://www.suse.com/security/cve/CVE-2015-7799/" source="CVE"/>
		<reference ref_id="CVE-2015-7872" ref_url="https://www.suse.com/security/cve/CVE-2015-7872/" source="CVE"/>
		<reference ref_id="CVE-2015-7990" ref_url="https://www.suse.com/security/cve/CVE-2015-7990/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8215" ref_url="https://www.suse.com/security/cve/CVE-2015-8215/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001755.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

Following security bugs were fixed:
- CVE-2015-7509: Mounting ext4 filesystems in no-journal mode could hav lead to a system crash (bsc#956709).
- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel did not ensure that certain slot numbers are valid, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call (bnc#949936).
- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).
- CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c (bnc#953527).
- CVE-2015-7990: RDS: There was no verification that an underlying transport exists when creating a connection, causing usage of a NULL pointer (bsc#952384).
- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on the x86_64 platform mishandled IRET faults in processing NMIs that occurred during userspace execution, which might have allowed local users to gain privileges by triggering an NMI (bnc#938706).
- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel allowed local users to cause a denial of service (OOPS) via crafted keyctl commands (bnc#951440).
- CVE-2015-0272: Missing checks allowed remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215 (bnc#944296).
- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bnc#945825).

The following non-security bugs were fixed:
- ALSA: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).
- Driver: Vmxnet3: Fix ethtool -S to return correct rx queue stats (bsc#950750).
- Drivers: hv: do not do hypercalls when hypercall_page is NULL.
- Drivers: hv: kvp: move poll_channel() to hyperv_vmbus.h.
- Drivers: hv: util: move kvp/vss function declarations to hyperv_vmbus.h.
- Drivers: hv: vmbus: Get rid of some unused definitions.
- Drivers: hv: vmbus: Implement the protocol for tearing down vmbus state.
- Drivers: hv: vmbus: add special crash handler (bnc#930770).
- Drivers: hv: vmbus: add special kexec handler.
- Drivers: hv: vmbus: kill tasklets on module unload.
- Drivers: hv: vmbus: prefer '^A' notification chain to 'panic'.
- Drivers: hv: vmbus: remove hv_synic_free_cpu() call from hv_synic_cleanup().
- Drivers: hv: vmbus: unregister panic notifier on module unload.
- IB/srp: Avoid skipping srp_reset_host() after a transport error (bsc#904965).
- IB/srp: Fix a sporadic crash triggered by cable pulling (bsc#904965).
- KEYS: Fix race between key destruction and finding a keyring by name (bsc#951440).
- Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).
- NFSv4: Fix two infinite loops in the mount code (bsc#954628).
- PCI: Add VPD function 0 quirk for Intel Ethernet devices (bnc#943786).
- PCI: Add dev_flags bit to access VPD through function 0 (bnc#943786).
- PCI: Clear NumVFs when disabling SR-IOV in sriov_init() (bnc#952084).
- PCI: Refresh First VF Offset and VF Stride when updating NumVFs (bnc#952084).
- PCI: Update NumVFs register when disabling SR-IOV (bnc#952084).
- PCI: delay configuration of SRIOV capability (bnc#952084).
- PCI: set pci sriov page size before reading SRIOV BAR (bnc#952084).
- SCSI: hosts: update to use ida_simple for host_no (bsc#939926)
- SUNRPC refactor rpcauth_checkverf error returns (bsc#955673).
- af_iucv: avoid path quiesce of severed path in shutdown() (bnc#946214).
- ahci: Add Device ID for Intel Sunrise Point PCH (bsc#953799).
- blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976).
- blktap: refine mm tracking (bsc#952976).
- cachefiles: Avoid deadlocks with fs freezing (bsc#935123).
- dm sysfs: introduce ability to add writable attributes (bsc#904348).
- dm-snap: avoid deadock on s-&gt;lock when a read is split (bsc#939826).
- dm: do not start current request if it would've merged with the previous (bsc#904348).
- dm: impose configurable deadline for dm_request_fn's merge heuristic (bsc#904348).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt, v2 (bsc#942938).
- drm/i915: Fix DDC probe for passive adapters (bsc#900610, fdo#85924).
- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).
- fix lpfc_send_rscn_event allocation size claims bnc#935757
- fs: Avoid deadlocks of fsync_bdev() and fs freezing (bsc#935123).
- fs: Fix deadlocks between sync and fs freezing (bsc#935123).
- hugetlb: simplify migrate_huge_page() (bnc#947957).
- hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage (bnc#947957,).
- ipr: Fix incorrect trace indexing (bsc#940913).
- ipr: Fix invalid array indexing for HRRQ (bsc#940913).
- ipv6: fix tunnel error handling (bsc#952579).
- ipvs: Fix reuse connection if real server is dead (bnc#945827).
- ipvs: drop first packet to dead server (bsc#946078).
- kernel: correct uc_sigmask of the compat signal frame (bnc#946214).
- kernel: fix incorrect use of DIAG44 in continue_trylock_relax() (bnc#946214).
- kexec: Fix race between panic() and crash_kexec() called directly (bnc#937444).
- ktime: add ktime_after and ktime_before helpe (bsc#904348).
- lib/string.c: introduce memchr_inv() (bnc#930788).
- lpfc: Fix cq_id masking problem (bsc#944677).
- macvlan: Support bonding events bsc#948521
- memory-failure: do code refactor of soft_offline_page() (bnc#947957).
- memory-failure: fix an error of mce_bad_pages statistics (bnc#947957).
- memory-failure: use num_poisoned_pages instead of mce_bad_pages (bnc#947957).
- memory-hotplug: update mce_bad_pages when removing the memory (bnc#947957).
- mm/memory-failure.c: fix wrong num_poisoned_pages in handling memory error on thp (bnc#947957).
- mm/memory-failure.c: recheck PageHuge() after hugetlb page migrate successfully (bnc#947957).
- mm/migrate.c: pair unlock_page() and lock_page() when migrating huge pages (bnc#947957).
- mm: exclude reserved pages from dirtyable memory 32b fix (bnc#940017, bnc#949298).
- mm: fix GFP_THISNODE callers and clarify (bsc#954950).
- mm: remove GFP_THISNODE (bsc#954950).
- mm: sl[au]b: add knowledge of PFMEMALLOC reserve pages (Swap over NFS).
- net/core: Add VF link state control policy (bsc#950298).
- netfilter: xt_recent: fix namespace destroy path (bsc#879378).
- panic/x86: Allow cpus to save registers even if they (bnc#940946).
- panic/x86: Fix re-entrance problem due to panic on (bnc#937444).
- pktgen: clean up ktime_t helpers (bsc#904348).
- qla2xxx: Do not reset adapter if SRB handle is in range (bsc#944993).
- qla2xxx: Remove decrement of sp reference count in abort handler (bsc#944993).
- qla2xxx: Remove unavailable firmware files (bsc#921081).
- qla2xxx: do not clear slot in outstanding cmd array (bsc#944993).
- qlge: Fix qlge_update_hw_vlan_features to handle if interface is down (bsc#930835).
- quota: Fix deadlock with suspend and quotas (bsc#935123).
- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).
- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).
- rtnetlink: Fix VF IFLA policy (bsc#950298).
- rtnetlink: fix VF info size (bsc#950298).
- s390/dasd: fix disconnected device with valid path mask (bnc#946214).
- s390/dasd: fix invalid PAV assignment after suspend/resume (bnc#946214).
- s390/dasd: fix list_del corruption after lcu changes (bnc#954984).
- s390/pci: handle events for unused functions (bnc#946214).
- s390/pci: improve handling of hotplug event 0x301 (bnc#946214).
- s390/pci: improve state check when processing hotplug events (bnc#946214).
- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100).
- sg: fix read() error reporting (bsc#926774).
- usb: xhci: apply XHCI_AVOID_BEI quirk to all Intel xHCI controllers (bnc#944989).
- usbback: correct copy length for partial transfers (bsc#941202).
- usbvision fix overflow of interfaces array (bnc#950998).
- veth: extend device features (bsc#879381).
- vfs: Provide function to get superblock and wait for it to thaw (bsc#935123).
- vmxnet3: adjust ring sizes when interface is down (bsc#950750).
- vmxnet3: fix ethtool ring buffer size setting (bsc#950750).
- writeback: Skip writeback for frozen filesystem (bsc#935123).
- x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (bnc#937256).
- x86/evtchn: make use of PHYSDEVOP_map_pirq.
- x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).
- xen: x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (bnc#937256).
- xfs: Fix lost direct IO write in the last block (bsc#949744).
- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).
- xfs: add EOFBLOCKS inode tagging/untagging (bnc#930788).
- xfs: add XFS_IOC_FREE_EOFBLOCKS ioctl (bnc#930788).
- xfs: add background scanning to clear eofblocks inodes (bnc#930788).
- xfs: add inode id filtering to eofblocks scan (bnc#930788).
- xfs: add minimum file size filtering to eofblocks scan (bnc#930788).
- xfs: create function to scan and clear EOFBLOCKS inodes (bnc#930788).
- xfs: create helper to check whether to free eofblocks on inode (bnc#930788).
- xfs: introduce a common helper xfs_icluster_size_fsb (bsc#932805).
- xfs: make xfs_free_eofblocks() non-static, return EAGAIN on trylock failure (bnc#930788).
- xfs: support a tag-based inode_ag_iterator (bnc#930788).
- xfs: support multiple inode id filtering in eofblocks scan (bnc#930788).
- xfs: use xfs_icluster_size_fsb in xfs_bulkstat (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ialloc_inode_init (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ifree_cluster (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_imap (bsc#932805).
- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#949981).
- xhci: Calculate old endpoints correctly on device reset (bnc#944831).
- xhci: For streams the css flag most be read from the stream-ctx on ep stop (bnc#945691).
- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bnc#949502).
- xhci: fix isoc endpoint dequeue from advancing too far on transaction error (bnc#944837).
- xhci: silence TD warning (bnc#939955).
- xhci: use uninterruptible sleep for waiting for internal operations (bnc#939955).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-22"/>
	<updated date="2015-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/814440">SUSE bug 814440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879378">SUSE bug 879378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879381">SUSE bug 879381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900610">SUSE bug 900610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904348">SUSE bug 904348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904965">SUSE bug 904965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921081">SUSE bug 921081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926774">SUSE bug 926774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930145">SUSE bug 930145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930770">SUSE bug 930770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930788">SUSE bug 930788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930835">SUSE bug 930835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932805">SUSE bug 932805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935123">SUSE bug 935123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935757">SUSE bug 935757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937256">SUSE bug 937256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938706">SUSE bug 938706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939826">SUSE bug 939826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939926">SUSE bug 939926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939955">SUSE bug 939955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940017">SUSE bug 940017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940913">SUSE bug 940913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940946">SUSE bug 940946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941202">SUSE bug 941202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942938">SUSE bug 942938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943786">SUSE bug 943786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944296">SUSE bug 944296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944677">SUSE bug 944677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944831">SUSE bug 944831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944837">SUSE bug 944837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944989">SUSE bug 944989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944993">SUSE bug 944993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945691">SUSE bug 945691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945825">SUSE bug 945825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945827">SUSE bug 945827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946078">SUSE bug 946078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946214">SUSE bug 946214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946309">SUSE bug 946309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947957">SUSE bug 947957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948330">SUSE bug 948330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948347">SUSE bug 948347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948521">SUSE bug 948521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949100">SUSE bug 949100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949298">SUSE bug 949298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949502">SUSE bug 949502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949706">SUSE bug 949706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949744">SUSE bug 949744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949936">SUSE bug 949936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949981">SUSE bug 949981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950298">SUSE bug 950298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950750">SUSE bug 950750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950998">SUSE bug 950998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951440">SUSE bug 951440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952084">SUSE bug 952084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952384">SUSE bug 952384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952579">SUSE bug 952579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952976">SUSE bug 952976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953799">SUSE bug 953799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953980">SUSE bug 953980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954628">SUSE bug 954628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954950">SUSE bug 954950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954984">SUSE bug 954984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955673">SUSE bug 955673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956709">SUSE bug 956709</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0272/">CVE-2015-0272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0272">CVE-2015-0272 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5157/">CVE-2015-5157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5157">CVE-2015-5157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5307">CVE-2015-5307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6937/">CVE-2015-6937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6937">CVE-2015-6937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7509/">CVE-2015-7509 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7509">CVE-2015-7509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7799/">CVE-2015-7799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7799">CVE-2015-7799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7872/">CVE-2015-7872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7872">CVE-2015-7872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7990/">CVE-2015-7990 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7990">CVE-2015-7990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8104">CVE-2015-8104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8215/">CVE-2015-8215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8215">CVE-2015-8215 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583373" comment="kernel-default-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583374" comment="kernel-default-base-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583376" comment="kernel-default-man-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583377" comment="kernel-ec2-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583378" comment="kernel-ec2-base-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567372" comment="kernel-pae-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567373" comment="kernel-pae-base-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583380" comment="kernel-ppc64-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583381" comment="kernel-ppc64-base-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583383" comment="kernel-source-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583384" comment="kernel-syms-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583385" comment="kernel-trace-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583386" comment="kernel-trace-base-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567379" comment="kernel-xen-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567380" comment="kernel-xen-base-3.0.101-68.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583373" comment="kernel-default-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583374" comment="kernel-default-base-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583376" comment="kernel-default-man-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583377" comment="kernel-ec2-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583378" comment="kernel-ec2-base-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567372" comment="kernel-pae-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567373" comment="kernel-pae-base-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583380" comment="kernel-ppc64-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583381" comment="kernel-ppc64-base-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583383" comment="kernel-source-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583384" comment="kernel-syms-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583385" comment="kernel-trace-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583386" comment="kernel-trace-base-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567379" comment="kernel-xen-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567380" comment="kernel-xen-base-3.0.101-68.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220052" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="676471" ref_url="https://bugzilla.suse.com/676471" source="BUGZILLA"/>
		<reference ref_id="866130" ref_url="https://bugzilla.suse.com/866130" source="BUGZILLA"/>
		<reference ref_id="898592" ref_url="https://bugzilla.suse.com/898592" source="BUGZILLA"/>
		<reference ref_id="936530" ref_url="https://bugzilla.suse.com/936530" source="BUGZILLA"/>
		<reference ref_id="940413" ref_url="https://bugzilla.suse.com/940413" source="BUGZILLA"/>
		<reference ref_id="944309" ref_url="https://bugzilla.suse.com/944309" source="BUGZILLA"/>
		<reference ref_id="946122" ref_url="https://bugzilla.suse.com/946122" source="BUGZILLA"/>
		<reference ref_id="949752" ref_url="https://bugzilla.suse.com/949752" source="BUGZILLA"/>
		<reference ref_id="953369" ref_url="https://bugzilla.suse.com/953369" source="BUGZILLA"/>
		<reference ref_id="956491" ref_url="https://bugzilla.suse.com/956491" source="BUGZILLA"/>
		<reference ref_id="956852" ref_url="https://bugzilla.suse.com/956852" source="BUGZILLA"/>
		<reference ref_id="957986" ref_url="https://bugzilla.suse.com/957986" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="957990" ref_url="https://bugzilla.suse.com/957990" source="BUGZILLA"/>
		<reference ref_id="959381" ref_url="https://bugzilla.suse.com/959381" source="BUGZILLA"/>
		<reference ref_id="960458" ref_url="https://bugzilla.suse.com/960458" source="BUGZILLA"/>
		<reference ref_id="960857" ref_url="https://bugzilla.suse.com/960857" source="BUGZILLA"/>
		<reference ref_id="961512" ref_url="https://bugzilla.suse.com/961512" source="BUGZILLA"/>
		<reference ref_id="961518" ref_url="https://bugzilla.suse.com/961518" source="BUGZILLA"/>
		<reference ref_id="963762" ref_url="https://bugzilla.suse.com/963762" source="BUGZILLA"/>
		<reference ref_id="963998" ref_url="https://bugzilla.suse.com/963998" source="BUGZILLA"/>
		<reference ref_id="965319" ref_url="https://bugzilla.suse.com/965319" source="BUGZILLA"/>
		<reference ref_id="965860" ref_url="https://bugzilla.suse.com/965860" source="BUGZILLA"/>
		<reference ref_id="965923" ref_url="https://bugzilla.suse.com/965923" source="BUGZILLA"/>
		<reference ref_id="966245" ref_url="https://bugzilla.suse.com/966245" source="BUGZILLA"/>
		<reference ref_id="967863" ref_url="https://bugzilla.suse.com/967863" source="BUGZILLA"/>
		<reference ref_id="967914" ref_url="https://bugzilla.suse.com/967914" source="BUGZILLA"/>
		<reference ref_id="968010" ref_url="https://bugzilla.suse.com/968010" source="BUGZILLA"/>
		<reference ref_id="968018" ref_url="https://bugzilla.suse.com/968018" source="BUGZILLA"/>
		<reference ref_id="968141" ref_url="https://bugzilla.suse.com/968141" source="BUGZILLA"/>
		<reference ref_id="968500" ref_url="https://bugzilla.suse.com/968500" source="BUGZILLA"/>
		<reference ref_id="968566" ref_url="https://bugzilla.suse.com/968566" source="BUGZILLA"/>
		<reference ref_id="968670" ref_url="https://bugzilla.suse.com/968670" source="BUGZILLA"/>
		<reference ref_id="968687" ref_url="https://bugzilla.suse.com/968687" source="BUGZILLA"/>
		<reference ref_id="969149" ref_url="https://bugzilla.suse.com/969149" source="BUGZILLA"/>
		<reference ref_id="969391" ref_url="https://bugzilla.suse.com/969391" source="BUGZILLA"/>
		<reference ref_id="969571" ref_url="https://bugzilla.suse.com/969571" source="BUGZILLA"/>
		<reference ref_id="970114" ref_url="https://bugzilla.suse.com/970114" source="BUGZILLA"/>
		<reference ref_id="970504" ref_url="https://bugzilla.suse.com/970504" source="BUGZILLA"/>
		<reference ref_id="970892" ref_url="https://bugzilla.suse.com/970892" source="BUGZILLA"/>
		<reference ref_id="970909" ref_url="https://bugzilla.suse.com/970909" source="BUGZILLA"/>
		<reference ref_id="970911" ref_url="https://bugzilla.suse.com/970911" source="BUGZILLA"/>
		<reference ref_id="970948" ref_url="https://bugzilla.suse.com/970948" source="BUGZILLA"/>
		<reference ref_id="970956" ref_url="https://bugzilla.suse.com/970956" source="BUGZILLA"/>
		<reference ref_id="970958" ref_url="https://bugzilla.suse.com/970958" source="BUGZILLA"/>
		<reference ref_id="970970" ref_url="https://bugzilla.suse.com/970970" source="BUGZILLA"/>
		<reference ref_id="971124" ref_url="https://bugzilla.suse.com/971124" source="BUGZILLA"/>
		<reference ref_id="971125" ref_url="https://bugzilla.suse.com/971125" source="BUGZILLA"/>
		<reference ref_id="971126" ref_url="https://bugzilla.suse.com/971126" source="BUGZILLA"/>
		<reference ref_id="971360" ref_url="https://bugzilla.suse.com/971360" source="BUGZILLA"/>
		<reference ref_id="971433" ref_url="https://bugzilla.suse.com/971433" source="BUGZILLA"/>
		<reference ref_id="971446" ref_url="https://bugzilla.suse.com/971446" source="BUGZILLA"/>
		<reference ref_id="971729" ref_url="https://bugzilla.suse.com/971729" source="BUGZILLA"/>
		<reference ref_id="971944" ref_url="https://bugzilla.suse.com/971944" source="BUGZILLA"/>
		<reference ref_id="971947" ref_url="https://bugzilla.suse.com/971947" source="BUGZILLA"/>
		<reference ref_id="971989" ref_url="https://bugzilla.suse.com/971989" source="BUGZILLA"/>
		<reference ref_id="972363" ref_url="https://bugzilla.suse.com/972363" source="BUGZILLA"/>
		<reference ref_id="973237" ref_url="https://bugzilla.suse.com/973237" source="BUGZILLA"/>
		<reference ref_id="973378" ref_url="https://bugzilla.suse.com/973378" source="BUGZILLA"/>
		<reference ref_id="973556" ref_url="https://bugzilla.suse.com/973556" source="BUGZILLA"/>
		<reference ref_id="973570" ref_url="https://bugzilla.suse.com/973570" source="BUGZILLA"/>
		<reference ref_id="974646" ref_url="https://bugzilla.suse.com/974646" source="BUGZILLA"/>
		<reference ref_id="974787" ref_url="https://bugzilla.suse.com/974787" source="BUGZILLA"/>
		<reference ref_id="975358" ref_url="https://bugzilla.suse.com/975358" source="BUGZILLA"/>
		<reference ref_id="975772" ref_url="https://bugzilla.suse.com/975772" source="BUGZILLA"/>
		<reference ref_id="975945" ref_url="https://bugzilla.suse.com/975945" source="BUGZILLA"/>
		<reference ref_id="976739" ref_url="https://bugzilla.suse.com/976739" source="BUGZILLA"/>
		<reference ref_id="976868" ref_url="https://bugzilla.suse.com/976868" source="BUGZILLA"/>
		<reference ref_id="978401" ref_url="https://bugzilla.suse.com/978401" source="BUGZILLA"/>
		<reference ref_id="978821" ref_url="https://bugzilla.suse.com/978821" source="BUGZILLA"/>
		<reference ref_id="978822" ref_url="https://bugzilla.suse.com/978822" source="BUGZILLA"/>
		<reference ref_id="979213" ref_url="https://bugzilla.suse.com/979213" source="BUGZILLA"/>
		<reference ref_id="979274" ref_url="https://bugzilla.suse.com/979274" source="BUGZILLA"/>
		<reference ref_id="979347" ref_url="https://bugzilla.suse.com/979347" source="BUGZILLA"/>
		<reference ref_id="979419" ref_url="https://bugzilla.suse.com/979419" source="BUGZILLA"/>
		<reference ref_id="979548" ref_url="https://bugzilla.suse.com/979548" source="BUGZILLA"/>
		<reference ref_id="979595" ref_url="https://bugzilla.suse.com/979595" source="BUGZILLA"/>
		<reference ref_id="979867" ref_url="https://bugzilla.suse.com/979867" source="BUGZILLA"/>
		<reference ref_id="979879" ref_url="https://bugzilla.suse.com/979879" source="BUGZILLA"/>
		<reference ref_id="980371" ref_url="https://bugzilla.suse.com/980371" source="BUGZILLA"/>
		<reference ref_id="980725" ref_url="https://bugzilla.suse.com/980725" source="BUGZILLA"/>
		<reference ref_id="980788" ref_url="https://bugzilla.suse.com/980788" source="BUGZILLA"/>
		<reference ref_id="980931" ref_url="https://bugzilla.suse.com/980931" source="BUGZILLA"/>
		<reference ref_id="981231" ref_url="https://bugzilla.suse.com/981231" source="BUGZILLA"/>
		<reference ref_id="981267" ref_url="https://bugzilla.suse.com/981267" source="BUGZILLA"/>
		<reference ref_id="982532" ref_url="https://bugzilla.suse.com/982532" source="BUGZILLA"/>
		<reference ref_id="982691" ref_url="https://bugzilla.suse.com/982691" source="BUGZILLA"/>
		<reference ref_id="983143" ref_url="https://bugzilla.suse.com/983143" source="BUGZILLA"/>
		<reference ref_id="983213" ref_url="https://bugzilla.suse.com/983213" source="BUGZILLA"/>
		<reference ref_id="984107" ref_url="https://bugzilla.suse.com/984107" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7566" ref_url="https://www.suse.com/security/cve/CVE-2015-7566/" source="CVE"/>
		<reference ref_id="CVE-2015-8816" ref_url="https://www.suse.com/security/cve/CVE-2015-8816/" source="CVE"/>
		<reference ref_id="CVE-2016-0758" ref_url="https://www.suse.com/security/cve/CVE-2016-0758/" source="CVE"/>
		<reference ref_id="CVE-2016-1583" ref_url="https://www.suse.com/security/cve/CVE-2016-1583/" source="CVE"/>
		<reference ref_id="CVE-2016-2053" ref_url="https://www.suse.com/security/cve/CVE-2016-2053/" source="CVE"/>
		<reference ref_id="CVE-2016-2143" ref_url="https://www.suse.com/security/cve/CVE-2016-2143/" source="CVE"/>
		<reference ref_id="CVE-2016-2184" ref_url="https://www.suse.com/security/cve/CVE-2016-2184/" source="CVE"/>
		<reference ref_id="CVE-2016-2185" ref_url="https://www.suse.com/security/cve/CVE-2016-2185/" source="CVE"/>
		<reference ref_id="CVE-2016-2186" ref_url="https://www.suse.com/security/cve/CVE-2016-2186/" source="CVE"/>
		<reference ref_id="CVE-2016-2187" ref_url="https://www.suse.com/security/cve/CVE-2016-2187/" source="CVE"/>
		<reference ref_id="CVE-2016-2188" ref_url="https://www.suse.com/security/cve/CVE-2016-2188/" source="CVE"/>
		<reference ref_id="CVE-2016-2782" ref_url="https://www.suse.com/security/cve/CVE-2016-2782/" source="CVE"/>
		<reference ref_id="CVE-2016-2847" ref_url="https://www.suse.com/security/cve/CVE-2016-2847/" source="CVE"/>
		<reference ref_id="CVE-2016-3134" ref_url="https://www.suse.com/security/cve/CVE-2016-3134/" source="CVE"/>
		<reference ref_id="CVE-2016-3137" ref_url="https://www.suse.com/security/cve/CVE-2016-3137/" source="CVE"/>
		<reference ref_id="CVE-2016-3138" ref_url="https://www.suse.com/security/cve/CVE-2016-3138/" source="CVE"/>
		<reference ref_id="CVE-2016-3139" ref_url="https://www.suse.com/security/cve/CVE-2016-3139/" source="CVE"/>
		<reference ref_id="CVE-2016-3140" ref_url="https://www.suse.com/security/cve/CVE-2016-3140/" source="CVE"/>
		<reference ref_id="CVE-2016-3156" ref_url="https://www.suse.com/security/cve/CVE-2016-3156/" source="CVE"/>
		<reference ref_id="CVE-2016-4482" ref_url="https://www.suse.com/security/cve/CVE-2016-4482/" source="CVE"/>
		<reference ref_id="CVE-2016-4485" ref_url="https://www.suse.com/security/cve/CVE-2016-4485/" source="CVE"/>
		<reference ref_id="CVE-2016-4486" ref_url="https://www.suse.com/security/cve/CVE-2016-4486/" source="CVE"/>
		<reference ref_id="CVE-2016-4565" ref_url="https://www.suse.com/security/cve/CVE-2016-4565/" source="CVE"/>
		<reference ref_id="CVE-2016-4569" ref_url="https://www.suse.com/security/cve/CVE-2016-4569/" source="CVE"/>
		<reference ref_id="CVE-2016-4578" ref_url="https://www.suse.com/security/cve/CVE-2016-4578/" source="CVE"/>
		<reference ref_id="CVE-2016-4580" ref_url="https://www.suse.com/security/cve/CVE-2016-4580/" source="CVE"/>
		<reference ref_id="CVE-2016-4805" ref_url="https://www.suse.com/security/cve/CVE-2016-4805/" source="CVE"/>
		<reference ref_id="CVE-2016-4913" ref_url="https://www.suse.com/security/cve/CVE-2016-4913/" source="CVE"/>
		<reference ref_id="CVE-2016-5244" ref_url="https://www.suse.com/security/cve/CVE-2016-5244/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002135.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

Notable changes in this kernel:
- It is now possible to mount a NFS export on the exporting host directly.

The following security bugs were fixed:
- CVE-2016-5244: A kernel information leak in rds_inc_info_copy was fixed that could leak kernel stack memory to userspace (bsc#983213).
- CVE-2016-1583: Prevent the usage of mmap when the lower file system does not allow it. This could have lead to local privilege escalation when ecryptfs-utils was installed and /sbin/mount.ecryptfs_private was setuid (bsc#983143).
- CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandles NM (aka alternate name) entries containing \0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).
- CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).
- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).
- CVE-2016-0758: Tags with indefinite length could have corrupted pointers in asn1_find_indefinite_length (bsc#979867).
- CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).
- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).
- CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).
- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).
- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).
- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).
- CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948).
- CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956).
- CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911).
- CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970).
- CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892).
- CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958).
- CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124).
- CVE-2016-3156: The IPv4 implementation in the Linux kernel mishandles destruction of device objects, which allowed guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses (bnc#971360).
- CVE-2016-2184: The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971125).
- CVE-2016-3139: The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970909).
- CVE-2016-2143: The fork implementation in the Linux kernel on s390 platforms mishandles the case of four page-table levels, which allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h (bnc#970504).
- CVE-2016-2782: The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint (bnc#968670).
- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bnc#968010).
- CVE-2015-7566: The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacked a bulk-out endpoint (bnc#961512).

The following non-security bugs were fixed:
- acpi / PCI: Account for ARI in _PRT lookups (bsc#968566).
- af_unix: Guard against other == sk in unix_dgram_sendmsg (bsc#973570).
- alsa: hrtimer: Handle start/stop more properly (bsc#973378).
- alsa: oxygen: add Xonar DGX support (bsc#982691).
- alsa: pcm: Fix potential deadlock in OSS emulation (bsc#968018).
- alsa: rawmidi: Fix race at copying and updating the position (bsc#968018).
- alsa: rawmidi: Make snd_rawmidi_transmit() race-free (bsc#968018).
- alsa: seq: Fix double port list deletion (bsc#968018).
- alsa: seq: Fix incorrect sanity check at snd_seq_oss_synth_cleanup() (bsc#968018).
- alsa: seq: Fix leak of pool buffer at concurrent writes (bsc#968018).
- alsa: seq: Fix lockdep warnings due to double mutex locks (bsc#968018).
- alsa: seq: Fix race at closing in virmidi driver (bsc#968018).
- alsa: seq: Fix yet another races among ALSA timer accesses (bsc#968018).
- alsa: timer: Call notifier in the same spinlock (bsc#973378).
- alsa: timer: Code cleanup (bsc#968018).
- alsa: timer: Fix leftover link at closing (bsc#968018).
- alsa: timer: Fix link corruption due to double start or stop (bsc#968018).
- alsa: timer: Fix race between stop and interrupt (bsc#968018).
- alsa: timer: Fix wrong instance passed to slave callbacks (bsc#968018).
- alsa: timer: Protect the whole snd_timer_close() with open race (bsc#973378).
- alsa: timer: Sync timer deletion at closing the system timer (bsc#973378).
- alsa: timer: Use mod_timer() for rearming the system timer (bsc#973378).
- cgroups: do not attach task to subsystem if migration failed (bnc#979274).
- cgroups: more safe tasklist locking in cgroup_attach_proc (bnc#979274).
- cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646).
- dasd: fix hanging system after LCU changes (bnc#968500, LTC#136671).
- dcache: use IS_ROOT to decide where dentry is hashed (bsc#949752).
- Delete patches.drivers/nvme-0165-Split-header-file-into-user-visible-and-kernel-.patch. SLE11-SP4 does not have uapi headers so move everything back to the original header (bnc#981231)
- Driver: Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739).
- enic: set netdev-&gt;vlan_features (bsc#966245).
- fcoe: fix reset of fip selection time (bsc#974787).
- Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)
- fs, seqfile: always allow oom killer (bnc#968687).
- fs/seq_file: fallback to vmalloc allocation (bnc#968687).
- fs, seq_file: fallback to vmalloc instead of oom kill processes (bnc#968687).
- hid-elo: kill not flush the work (bnc#982532).
- hpsa: fix issues with multilun devices (bsc#959381).
- hv: Assign correct -&gt;can_queue value in hv_storvsc (bnc#969391)
- ibmvscsi: Remove unsupported host config MAD (bsc#973556).
- Import kabi files from kernel 3.0.101-71
- iommu/vt-d: Improve fault handler error messages (bsc#975772).
- iommu/vt-d: Ratelimit fault handler (bsc#975772).
- ipc,sem: fix use after free on IPC_RMID after a task using same semaphore set exits (bsc#967914).
- ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360).
- ipv4: fix ineffective source address selection (bsc#980788).
- ipv6: make fib6 serial number per namespace (bsc#965319).
- ipv6: mld: fix add_grhead skb_over_panic for devs with large MTUs (bsc#956852).
- ipv6: per netns fib6 walkers (bsc#965319).
- ipv6: per netns FIB garbage collection (bsc#965319).
- ipv6: replace global gc_args with local variable (bsc#965319).
- ipvs: count pre-established TCP states as active (bsc#970114).
- isofs: Revert 'get_rock_ridge_filename(): handle malformed NM entries' This reverts commit cb6ce3ec7a964e56da9ba9cd3c9f0e708b5c3b2c. It should have never landed in the tree (we already have the patch via c63531c60ff that came through CVE branch), but I messed up the merge.
- kabi, fs/seq_file: fallback to vmalloc allocation (bnc#968687).
- kabi: protect struct netns_ipv6 after FIB6 GC series (bsc#965319).
- KVM: x86: fix maintenance of guest/host xcr0 state (bsc#961518).
- llist: Add llist_next().
- make vfree() safe to call from interrupt contexts .
- memcg: do not hang on OOM when killed by userspace OOM access to memory reserves (bnc#969571).
- mld, igmp: Fix reserved tailroom calculation (bsc#956852).
- mm/hugetlb.c: correct missing private flag clearing (VM Functionality, bnc#971446).
- mm/hugetlb: fix backport of upstream commit 07443a85ad (VM Functionality, bnc#971446).
- MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#956491).
- mm/vmscan.c: avoid throttling reclaim for loop-back nfsd threads (bsc#956491).
- net/core: dev_mc_sync_multiple calls wrong helper (bsc#971433).
- net/core: __hw_addr_create_ex does not initialize sync_cnt (bsc#971433).
- net/core: __hw_addr_sync_one / _multiple broken (bsc#971433).
- net/core: __hw_addr_unsync_one 'from' address not marked synced (bsc#971433).
- NFS4: treat lock owners as opaque values (bnc#968141).
- NFS: avoid deadlocks with loop-back mounted NFS filesystems (bsc#956491).
- NFS: avoid waiting at all in nfs_release_page when congested (bsc#956491).
- NFSd4: return nfserr_symlink on v4 OPEN of non-regular file (bsc#973237).
- NFSd: do not fail unchecked creates of non-special files (bsc#973237).
- NFS: Do not attempt to decode missing directory entries (bsc#980931).
- nfs: fix memory corruption rooted in get_ih_name pointer math (bsc#984107).
- NFS: reduce access cache shrinker locking (bnc#866130).
- NFS: use smaller allocations for 'struct idmap' (bsc#965923).
- NFSv4: Ensure that we do not drop a state owner more than once (bsc#979595).
- nfsv4: OPEN must handle the NFS4ERR_IO return code correctly (bsc#979595).
- nvme: fix max_segments integer truncation (bsc#676471).
- NVMe: Unify controller probe and resume (bsc#979347).
- ocfs2: do not set fs read-only if rec[0] is empty while committing truncate (bnc#971947).
- ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (bnc#971947).
- ocfs2: extend transaction for ocfs2_remove_rightmost_path() and ocfs2_update_edge_lengths() before to avoid inconsistency between inode and et (bnc#971947).
- pciback: check PF instead of VF for PCI_COMMAND_MEMORY (bsc#957990).
- pciback: Save the number of MSI-X entries to be copied later (bsc#957988).
- PCI: Move pci_ari_enabled() to global header (bsc#968566).
- RDMA/ucma: Fix AB-BA deadlock (bsc#963998).
- Restore kabi after lock-owner change (bnc#968141).
- rpm/modprobe-xen.conf: Revert comment change to allow parallel install (bsc#957986). This reverts commit 855c7ce885fd412ce2a25ccc12a46e565c83f235.
- s390/dasd: prevent incorrect length error under z/VM after PAV changes (bnc#968500, LTC#136670).
- s390/pageattr: Do a single TLB flush for change_page_attr (bsc#940413).
- s390/pci: add extra padding to function measurement block (bnc#968500, LTC#139445).
- s390/pci_dma: fix DMA table corruption with &gt; 4 TB main memory (bnc#968500, LTC#139401).
- s390/pci_dma: handle dma table failures (bnc#968500, LTC#139442).
- s390/pci_dma: improve debugging of errors during dma map (bnc#968500, LTC#139442).
- s390/pci_dma: unify label of invalid translation table entries (bnc#968500, LTC#139442).
- s390/pci: enforce fmb page boundary rule (bnc#968500, LTC#139445).
- s390/pci: extract software counters from fmb (bnc#968500, LTC#139445).
- s390/pci: remove pdev pointer from arch data (bnc#968500, LTC#139444).
- s390/spinlock: avoid yield to non existent cpu (bnc#968500, LTC#141106).
- scsi_dh_alua: Do not block request queue if workqueue is active (bsc#960458).
- SCSI: Increase REPORT_LUNS timeout (bsc#971989).
- SCSI mpt2sas: Rearrange the the code so that the completion queues are initialized prior to sending the request to controller firmware (bsc#967863).
- skb: Add inline helper for getting the skb end offset from head (bsc#956852).
- tcp: avoid order-1 allocations on wifi and tx path (bsc#956852).
- tcp: fix skb_availroom() (bsc#956852).
- Tidy series.conf, p5 Only one last patch which can be moved easily. There are some more x86-related things left at the end but moving them won't be that trivial.
- Update patches.drivers/nvme-0265-fix-max_segments-integer-truncation.patch (bsc#979419). Fix reference.
- Update patches.fixes/bnx2x-Alloc-4k-fragment-for-each-rx-ring-buffer-elem.patch (bsc#953369 bsc#975358).
- Update PCI VPD size patch to upstream: - PCI: Determine actual VPD size on first access (bsc#971729). - PCI: Update VPD definitions (bsc#971729).
- USB: usbip: fix potential out-of-bounds write (bnc#975945).
- veth: do not modify ip_summed (bsc#969149).
- vgaarb: Add more context to error messages (bsc#976868).
- virtio_scsi: Implement eh_timed_out callback (bsc#936530).
- vmxnet3: set carrier state properly on probe (bsc#972363).
- vmxnet3: set netdev parant device before calling netdev_info (bsc#972363).
- x86, kvm: fix kvm's usage of kernel_fpu_begin/end() (bsc#961518).
- x86, kvm: use kernel_fpu_begin/end() in kvm_load/put_guest_fpu() (bsc#961518).
- xfrm: do not segment UFO packets (bsc#946122).
- xfs: fix sgid inheritance for subdirectories inheriting default acls [V3] (bsc#965860).
- xhci: Workaround to get Intel xHCI reset working more reliably (bnc#898592).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-24"/>
	<updated date="2016-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/676471">SUSE bug 676471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866130">SUSE bug 866130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898592">SUSE bug 898592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936530">SUSE bug 936530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940413">SUSE bug 940413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944309">SUSE bug 944309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946122">SUSE bug 946122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949752">SUSE bug 949752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953369">SUSE bug 953369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956491">SUSE bug 956491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956852">SUSE bug 956852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957986">SUSE bug 957986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957990">SUSE bug 957990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959381">SUSE bug 959381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960458">SUSE bug 960458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960857">SUSE bug 960857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961512">SUSE bug 961512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961518">SUSE bug 961518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963762">SUSE bug 963762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963998">SUSE bug 963998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965319">SUSE bug 965319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965860">SUSE bug 965860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965923">SUSE bug 965923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966245">SUSE bug 966245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967863">SUSE bug 967863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967914">SUSE bug 967914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968010">SUSE bug 968010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968018">SUSE bug 968018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968141">SUSE bug 968141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968500">SUSE bug 968500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968566">SUSE bug 968566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968670">SUSE bug 968670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968687">SUSE bug 968687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969149">SUSE bug 969149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969391">SUSE bug 969391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969571">SUSE bug 969571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970114">SUSE bug 970114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970504">SUSE bug 970504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970892">SUSE bug 970892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970909">SUSE bug 970909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970911">SUSE bug 970911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970948">SUSE bug 970948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970956">SUSE bug 970956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970958">SUSE bug 970958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970970">SUSE bug 970970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971124">SUSE bug 971124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971125">SUSE bug 971125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971126">SUSE bug 971126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971360">SUSE bug 971360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971433">SUSE bug 971433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971446">SUSE bug 971446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971729">SUSE bug 971729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971944">SUSE bug 971944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971947">SUSE bug 971947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971989">SUSE bug 971989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972363">SUSE bug 972363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973237">SUSE bug 973237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973378">SUSE bug 973378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973556">SUSE bug 973556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973570">SUSE bug 973570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974646">SUSE bug 974646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974787">SUSE bug 974787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975358">SUSE bug 975358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975772">SUSE bug 975772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975945">SUSE bug 975945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976739">SUSE bug 976739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976868">SUSE bug 976868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978401">SUSE bug 978401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978821">SUSE bug 978821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978822">SUSE bug 978822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979213">SUSE bug 979213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979274">SUSE bug 979274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979347">SUSE bug 979347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979419">SUSE bug 979419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979548">SUSE bug 979548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979595">SUSE bug 979595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979867">SUSE bug 979867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979879">SUSE bug 979879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980371">SUSE bug 980371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980725">SUSE bug 980725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980788">SUSE bug 980788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980931">SUSE bug 980931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981231">SUSE bug 981231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981267">SUSE bug 981267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982532">SUSE bug 982532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982691">SUSE bug 982691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983143">SUSE bug 983143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983213">SUSE bug 983213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984107">SUSE bug 984107</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7566/">CVE-2015-7566 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7566">CVE-2015-7566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8816/">CVE-2015-8816 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8816">CVE-2015-8816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0758/">CVE-2016-0758 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0758">CVE-2016-0758 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1583/">CVE-2016-1583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1583">CVE-2016-1583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2053/">CVE-2016-2053 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2053">CVE-2016-2053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2143/">CVE-2016-2143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2143">CVE-2016-2143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2184/">CVE-2016-2184 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2184">CVE-2016-2184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2185/">CVE-2016-2185 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2185">CVE-2016-2185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2186/">CVE-2016-2186 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2186">CVE-2016-2186 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2187/">CVE-2016-2187 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2187">CVE-2016-2187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2188/">CVE-2016-2188 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2188">CVE-2016-2188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2782/">CVE-2016-2782 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2782">CVE-2016-2782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2847/">CVE-2016-2847 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2847">CVE-2016-2847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3134/">CVE-2016-3134 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3134">CVE-2016-3134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3137/">CVE-2016-3137 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3137">CVE-2016-3137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3138/">CVE-2016-3138 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3138">CVE-2016-3138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3139/">CVE-2016-3139 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3139">CVE-2016-3139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3140/">CVE-2016-3140 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3140">CVE-2016-3140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3156/">CVE-2016-3156 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3156">CVE-2016-3156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4482/">CVE-2016-4482 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4482">CVE-2016-4482 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4485/">CVE-2016-4485 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4485">CVE-2016-4485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4486/">CVE-2016-4486 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4486">CVE-2016-4486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4565/">CVE-2016-4565 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4565">CVE-2016-4565 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4569/">CVE-2016-4569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4569">CVE-2016-4569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4578/">CVE-2016-4578 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4578">CVE-2016-4578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4580/">CVE-2016-4580 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4580">CVE-2016-4580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4805/">CVE-2016-4805 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4805">CVE-2016-4805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4913/">CVE-2016-4913 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4913">CVE-2016-4913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5244/">CVE-2016-5244 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5244">CVE-2016-5244 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583388" comment="kernel-default-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583389" comment="kernel-default-base-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583391" comment="kernel-default-man-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583392" comment="kernel-ec2-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583393" comment="kernel-ec2-base-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583395" comment="kernel-pae-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583396" comment="kernel-pae-base-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583398" comment="kernel-ppc64-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583399" comment="kernel-ppc64-base-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583401" comment="kernel-source-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583402" comment="kernel-syms-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583403" comment="kernel-trace-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583404" comment="kernel-trace-base-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583406" comment="kernel-xen-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583407" comment="kernel-xen-base-3.0.101-77.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583388" comment="kernel-default-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583389" comment="kernel-default-base-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583391" comment="kernel-default-man-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583392" comment="kernel-ec2-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583393" comment="kernel-ec2-base-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583395" comment="kernel-pae-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583396" comment="kernel-pae-base-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583398" comment="kernel-ppc64-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583399" comment="kernel-ppc64-base-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583401" comment="kernel-source-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583402" comment="kernel-syms-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583403" comment="kernel-trace-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583404" comment="kernel-trace-base-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583406" comment="kernel-xen-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583407" comment="kernel-xen-base-3.0.101-77.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220053" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1004418" ref_url="https://bugzilla.suse.com/1004418" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5195" ref_url="https://www.suse.com/security/cve/CVE-2016-5195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002343.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to fix one security issue.

This security bug was fixed:

- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-21"/>
	<updated date="2016-10-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1004418">SUSE bug 1004418</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5195/">CVE-2016-5195 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5195">CVE-2016-5195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583409" comment="kernel-default-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583410" comment="kernel-default-base-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583412" comment="kernel-default-man-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583413" comment="kernel-ec2-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583414" comment="kernel-ec2-base-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583416" comment="kernel-pae-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583417" comment="kernel-pae-base-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583419" comment="kernel-ppc64-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583420" comment="kernel-ppc64-base-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583422" comment="kernel-source-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583423" comment="kernel-syms-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583424" comment="kernel-trace-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583425" comment="kernel-trace-base-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583427" comment="kernel-xen-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583428" comment="kernel-xen-base-3.0.101-84.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583409" comment="kernel-default-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583410" comment="kernel-default-base-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583412" comment="kernel-default-man-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583413" comment="kernel-ec2-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583414" comment="kernel-ec2-base-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583416" comment="kernel-pae-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583417" comment="kernel-pae-base-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583419" comment="kernel-ppc64-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583420" comment="kernel-ppc64-base-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583422" comment="kernel-source-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583423" comment="kernel-syms-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583424" comment="kernel-trace-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583425" comment="kernel-trace-base-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583427" comment="kernel-xen-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583428" comment="kernel-xen-base-3.0.101-84.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220054" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-source (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1045340" ref_url="https://bugzilla.suse.com/1045340" source="BUGZILLA"/>
		<reference ref_id="1045406" ref_url="https://bugzilla.suse.com/1045406" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000364" ref_url="https://www.suse.com/security/cve/CVE-2017-1000364/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002982.html" source="SUSE-SU"/>
		<description>
This Linux kernel update for SUSE Linux Enterprise 11 SP4 fixes the following issues:

- A previous security update to address CVE-2017-1000364 caused unintended
  side-effects in several other tools, most notably Java. These issues have
  been remedied. [bsc#1045340, bsc#1045406]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-26"/>
	<updated date="2017-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045340">SUSE bug 1045340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045406">SUSE bug 1045406</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000364/">CVE-2017-1000364 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000364">CVE-2017-1000364 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583430" comment="kernel-bigmem-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583431" comment="kernel-bigmem-base-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583433" comment="kernel-default-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583434" comment="kernel-default-base-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583436" comment="kernel-default-man-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583437" comment="kernel-ec2-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583438" comment="kernel-ec2-base-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583440" comment="kernel-pae-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583441" comment="kernel-pae-base-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583443" comment="kernel-ppc64-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583444" comment="kernel-ppc64-base-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583446" comment="kernel-source-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583447" comment="kernel-syms-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583448" comment="kernel-trace-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583449" comment="kernel-trace-base-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583451" comment="kernel-xen-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583452" comment="kernel-xen-base-3.0.101-107.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583430" comment="kernel-bigmem-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583431" comment="kernel-bigmem-base-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583433" comment="kernel-default-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583434" comment="kernel-default-base-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583436" comment="kernel-default-man-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583437" comment="kernel-ec2-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583438" comment="kernel-ec2-base-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583440" comment="kernel-pae-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583441" comment="kernel-pae-base-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583443" comment="kernel-ppc64-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583444" comment="kernel-ppc64-base-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583446" comment="kernel-source-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583447" comment="kernel-syms-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583448" comment="kernel-trace-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583449" comment="kernel-trace-base-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583451" comment="kernel-xen-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583452" comment="kernel-xen-base-3.0.101-107.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220055" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1057389" ref_url="https://bugzilla.suse.com/1057389" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003256.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive the following security fixes:

- CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel was
  vulnerable to a stack overflow while processing L2CAP configuration
  responses, resulting in a potential remote code execution vulnerability.
  [bnc#1057389]
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-21"/>
	<updated date="2017-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1057389">SUSE bug 1057389</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000251">CVE-2017-1000251 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583454" comment="kernel-bigmem-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583455" comment="kernel-bigmem-base-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583457" comment="kernel-default-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583458" comment="kernel-default-base-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583460" comment="kernel-default-man-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583461" comment="kernel-ec2-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583462" comment="kernel-ec2-base-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583464" comment="kernel-pae-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583465" comment="kernel-pae-base-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583467" comment="kernel-ppc64-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583468" comment="kernel-ppc64-base-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583470" comment="kernel-source-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583471" comment="kernel-syms-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583472" comment="kernel-trace-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583473" comment="kernel-trace-base-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583475" comment="kernel-xen-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583476" comment="kernel-xen-base-3.0.101-108.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583454" comment="kernel-bigmem-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583455" comment="kernel-bigmem-base-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583457" comment="kernel-default-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583458" comment="kernel-default-base-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583460" comment="kernel-default-man-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583461" comment="kernel-ec2-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583462" comment="kernel-ec2-base-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583464" comment="kernel-pae-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583465" comment="kernel-pae-base-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583467" comment="kernel-ppc64-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583468" comment="kernel-ppc64-base-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583470" comment="kernel-source-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583471" comment="kernel-syms-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583472" comment="kernel-trace-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583473" comment="kernel-trace-base-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583475" comment="kernel-xen-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583476" comment="kernel-xen-base-3.0.101-108.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220056" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1046610" ref_url="https://bugzilla.suse.com/1046610" source="BUGZILLA"/>
		<reference ref_id="1052351" ref_url="https://bugzilla.suse.com/1052351" source="BUGZILLA"/>
		<reference ref_id="1068054" ref_url="https://bugzilla.suse.com/1068054" source="BUGZILLA"/>
		<reference ref_id="1079152" ref_url="https://bugzilla.suse.com/1079152" source="BUGZILLA"/>
		<reference ref_id="1080837" ref_url="https://bugzilla.suse.com/1080837" source="BUGZILLA"/>
		<reference ref_id="1083347" ref_url="https://bugzilla.suse.com/1083347" source="BUGZILLA"/>
		<reference ref_id="1087086" ref_url="https://bugzilla.suse.com/1087086" source="BUGZILLA"/>
		<reference ref_id="1087088" ref_url="https://bugzilla.suse.com/1087088" source="BUGZILLA"/>
		<reference ref_id="1088997" ref_url="https://bugzilla.suse.com/1088997" source="BUGZILLA"/>
		<reference ref_id="1088998" ref_url="https://bugzilla.suse.com/1088998" source="BUGZILLA"/>
		<reference ref_id="1088999" ref_url="https://bugzilla.suse.com/1088999" source="BUGZILLA"/>
		<reference ref_id="1089000" ref_url="https://bugzilla.suse.com/1089000" source="BUGZILLA"/>
		<reference ref_id="1089001" ref_url="https://bugzilla.suse.com/1089001" source="BUGZILLA"/>
		<reference ref_id="1089002" ref_url="https://bugzilla.suse.com/1089002" source="BUGZILLA"/>
		<reference ref_id="1089003" ref_url="https://bugzilla.suse.com/1089003" source="BUGZILLA"/>
		<reference ref_id="1089004" ref_url="https://bugzilla.suse.com/1089004" source="BUGZILLA"/>
		<reference ref_id="1089005" ref_url="https://bugzilla.suse.com/1089005" source="BUGZILLA"/>
		<reference ref_id="1089006" ref_url="https://bugzilla.suse.com/1089006" source="BUGZILLA"/>
		<reference ref_id="1089007" ref_url="https://bugzilla.suse.com/1089007" source="BUGZILLA"/>
		<reference ref_id="1089008" ref_url="https://bugzilla.suse.com/1089008" source="BUGZILLA"/>
		<reference ref_id="1089010" ref_url="https://bugzilla.suse.com/1089010" source="BUGZILLA"/>
		<reference ref_id="1089011" ref_url="https://bugzilla.suse.com/1089011" source="BUGZILLA"/>
		<reference ref_id="1089012" ref_url="https://bugzilla.suse.com/1089012" source="BUGZILLA"/>
		<reference ref_id="1089013" ref_url="https://bugzilla.suse.com/1089013" source="BUGZILLA"/>
		<reference ref_id="1089016" ref_url="https://bugzilla.suse.com/1089016" source="BUGZILLA"/>
		<reference ref_id="1089192" ref_url="https://bugzilla.suse.com/1089192" source="BUGZILLA"/>
		<reference ref_id="1089199" ref_url="https://bugzilla.suse.com/1089199" source="BUGZILLA"/>
		<reference ref_id="1089200" ref_url="https://bugzilla.suse.com/1089200" source="BUGZILLA"/>
		<reference ref_id="1089201" ref_url="https://bugzilla.suse.com/1089201" source="BUGZILLA"/>
		<reference ref_id="1089202" ref_url="https://bugzilla.suse.com/1089202" source="BUGZILLA"/>
		<reference ref_id="1089203" ref_url="https://bugzilla.suse.com/1089203" source="BUGZILLA"/>
		<reference ref_id="1089204" ref_url="https://bugzilla.suse.com/1089204" source="BUGZILLA"/>
		<reference ref_id="1089205" ref_url="https://bugzilla.suse.com/1089205" source="BUGZILLA"/>
		<reference ref_id="1089206" ref_url="https://bugzilla.suse.com/1089206" source="BUGZILLA"/>
		<reference ref_id="1089207" ref_url="https://bugzilla.suse.com/1089207" source="BUGZILLA"/>
		<reference ref_id="1089208" ref_url="https://bugzilla.suse.com/1089208" source="BUGZILLA"/>
		<reference ref_id="1089209" ref_url="https://bugzilla.suse.com/1089209" source="BUGZILLA"/>
		<reference ref_id="1089210" ref_url="https://bugzilla.suse.com/1089210" source="BUGZILLA"/>
		<reference ref_id="1089211" ref_url="https://bugzilla.suse.com/1089211" source="BUGZILLA"/>
		<reference ref_id="1089212" ref_url="https://bugzilla.suse.com/1089212" source="BUGZILLA"/>
		<reference ref_id="1089213" ref_url="https://bugzilla.suse.com/1089213" source="BUGZILLA"/>
		<reference ref_id="1089214" ref_url="https://bugzilla.suse.com/1089214" source="BUGZILLA"/>
		<reference ref_id="1089215" ref_url="https://bugzilla.suse.com/1089215" source="BUGZILLA"/>
		<reference ref_id="1089216" ref_url="https://bugzilla.suse.com/1089216" source="BUGZILLA"/>
		<reference ref_id="1089217" ref_url="https://bugzilla.suse.com/1089217" source="BUGZILLA"/>
		<reference ref_id="1089218" ref_url="https://bugzilla.suse.com/1089218" source="BUGZILLA"/>
		<reference ref_id="1089219" ref_url="https://bugzilla.suse.com/1089219" source="BUGZILLA"/>
		<reference ref_id="1089220" ref_url="https://bugzilla.suse.com/1089220" source="BUGZILLA"/>
		<reference ref_id="1089221" ref_url="https://bugzilla.suse.com/1089221" source="BUGZILLA"/>
		<reference ref_id="1089222" ref_url="https://bugzilla.suse.com/1089222" source="BUGZILLA"/>
		<reference ref_id="1089223" ref_url="https://bugzilla.suse.com/1089223" source="BUGZILLA"/>
		<reference ref_id="1089224" ref_url="https://bugzilla.suse.com/1089224" source="BUGZILLA"/>
		<reference ref_id="1089225" ref_url="https://bugzilla.suse.com/1089225" source="BUGZILLA"/>
		<reference ref_id="1089226" ref_url="https://bugzilla.suse.com/1089226" source="BUGZILLA"/>
		<reference ref_id="1089227" ref_url="https://bugzilla.suse.com/1089227" source="BUGZILLA"/>
		<reference ref_id="1089228" ref_url="https://bugzilla.suse.com/1089228" source="BUGZILLA"/>
		<reference ref_id="1089229" ref_url="https://bugzilla.suse.com/1089229" source="BUGZILLA"/>
		<reference ref_id="1089230" ref_url="https://bugzilla.suse.com/1089230" source="BUGZILLA"/>
		<reference ref_id="1089231" ref_url="https://bugzilla.suse.com/1089231" source="BUGZILLA"/>
		<reference ref_id="1089232" ref_url="https://bugzilla.suse.com/1089232" source="BUGZILLA"/>
		<reference ref_id="1089233" ref_url="https://bugzilla.suse.com/1089233" source="BUGZILLA"/>
		<reference ref_id="1089234" ref_url="https://bugzilla.suse.com/1089234" source="BUGZILLA"/>
		<reference ref_id="1089235" ref_url="https://bugzilla.suse.com/1089235" source="BUGZILLA"/>
		<reference ref_id="1089236" ref_url="https://bugzilla.suse.com/1089236" source="BUGZILLA"/>
		<reference ref_id="1089237" ref_url="https://bugzilla.suse.com/1089237" source="BUGZILLA"/>
		<reference ref_id="1089238" ref_url="https://bugzilla.suse.com/1089238" source="BUGZILLA"/>
		<reference ref_id="1089239" ref_url="https://bugzilla.suse.com/1089239" source="BUGZILLA"/>
		<reference ref_id="1089240" ref_url="https://bugzilla.suse.com/1089240" source="BUGZILLA"/>
		<reference ref_id="1089241" ref_url="https://bugzilla.suse.com/1089241" source="BUGZILLA"/>
		<reference ref_id="1093194" ref_url="https://bugzilla.suse.com/1093194" source="BUGZILLA"/>
		<reference ref_id="1093195" ref_url="https://bugzilla.suse.com/1093195" source="BUGZILLA"/>
		<reference ref_id="1093196" ref_url="https://bugzilla.suse.com/1093196" source="BUGZILLA"/>
		<reference ref_id="1093197" ref_url="https://bugzilla.suse.com/1093197" source="BUGZILLA"/>
		<reference ref_id="1093198" ref_url="https://bugzilla.suse.com/1093198" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1094421" ref_url="https://bugzilla.suse.com/1094421" source="BUGZILLA"/>
		<reference ref_id="1094422" ref_url="https://bugzilla.suse.com/1094422" source="BUGZILLA"/>
		<reference ref_id="1094423" ref_url="https://bugzilla.suse.com/1094423" source="BUGZILLA"/>
		<reference ref_id="1094424" ref_url="https://bugzilla.suse.com/1094424" source="BUGZILLA"/>
		<reference ref_id="1094425" ref_url="https://bugzilla.suse.com/1094425" source="BUGZILLA"/>
		<reference ref_id="1094436" ref_url="https://bugzilla.suse.com/1094436" source="BUGZILLA"/>
		<reference ref_id="1094437" ref_url="https://bugzilla.suse.com/1094437" source="BUGZILLA"/>
		<reference ref_id="1095241" ref_url="https://bugzilla.suse.com/1095241" source="BUGZILLA"/>
		<reference ref_id="1096140" ref_url="https://bugzilla.suse.com/1096140" source="BUGZILLA"/>
		<reference ref_id="1096242" ref_url="https://bugzilla.suse.com/1096242" source="BUGZILLA"/>
		<reference ref_id="1096281" ref_url="https://bugzilla.suse.com/1096281" source="BUGZILLA"/>
		<reference ref_id="1096746" ref_url="https://bugzilla.suse.com/1096746" source="BUGZILLA"/>
		<reference ref_id="1097443" ref_url="https://bugzilla.suse.com/1097443" source="BUGZILLA"/>
		<reference ref_id="1097445" ref_url="https://bugzilla.suse.com/1097445" source="BUGZILLA"/>
		<reference ref_id="1097948" ref_url="https://bugzilla.suse.com/1097948" source="BUGZILLA"/>
		<reference ref_id="973378" ref_url="https://bugzilla.suse.com/973378" source="BUGZILLA"/>
		<reference ref_id="989401" ref_url="https://bugzilla.suse.com/989401" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004221.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

This new feature was added:

- Btrfs: Remove empty block groups in the background

The following security bugs were fixed:

- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX
  registers) between processes. These registers might contain encryption keys
  when doing SSE accelerated AES enc/decryption (bsc#1087086)

The following non-security bugs were fixed:

- ALSA: timer: Fix pause event notification (bsc#973378).
- Btrfs: Avoid trucating page or punching hole in a already existed hole (bsc#1088998).
- Btrfs: Avoid truncate tailing page if fallocate range does not exceed inode size (bsc#1094424).
- Btrfs: Fix lost-data-profile caused by auto removing bg.
- Btrfs: Fix misuse of chunk mutex
- Btrfs: Fix out-of-space bug (bsc#1089231).
- Btrfs: Set relative data on clear btrfs_block_group_cache-&gt;pinned.
- Btrfs: Use ref_cnt for set_block_group_ro() (bsc#1089239).
- Btrfs: add alloc_fs_devices and switch to it (bsc#1089205).
- Btrfs: add btrfs_alloc_device and switch to it (bsc#1089204).
- Btrfs: add missing discards when unpinning extents with -o discard.
- Btrfs: add missing inode update when punching hole (bsc#1089006).
- Btrfs: add support for asserts (bsc#1089207).
- Btrfs: avoid syncing log in the fast fsync path when not necessary (bsc#1089010).
- Btrfs: btrfs_issue_discard ensure offset/length are aligned to sector boundaries.
- Btrfs: check pending chunks when shrinking fs to avoid corruption (bsc#1089235).
- Btrfs: cleanup backref search commit root flag stuff (bsc#1089200).
- Btrfs: delete chunk allocation attemp when setting block group ro.
- Btrfs: do not leak transaction in btrfs_sync_file() (bsc#1089210).
- Btrfs: do not mix the ordered extents of all files together during logging the inodes (bsc#1089214).
- Btrfs: do not remove extents and xattrs when logging new names (bsc#1089005).
- Btrfs: eliminate races in worker stopping code (bsc#1089211).
- Btrfs: ensure deletion from pinned_chunks list is protected.
- Btrfs: explictly delete unused block groups in close_ctree and ro-remount.
- Btrfs: fix -ENOSPC on block group removal.
- Btrfs: fix -ENOSPC when finishing block group creation.
- Btrfs: fix BUG_ON in btrfs_orphan_add() when delete unused block group.
- Btrfs: fix NULL pointer crash when running balance and scrub concurrently (bsc#1089220).
- Btrfs: fix chunk allocation regression leading to transaction abort (bsc#1089236).
- Btrfs: fix crash caused by block group removal.
- Btrfs: fix data loss in the fast fsync path (bsc#1089007).
- Btrfs: fix deadlock caused by fsync when logging directory entries (bsc#1093194).
- Btrfs: fix directory inconsistency after fsync log replay (bsc#1089001).
- Btrfs: fix directory recovery from fsync log (bsc#1088999).
- Btrfs: fix empty symlink after creating symlink and fsync parent dir (bsc#1093195).
- Btrfs: fix file loss on log replay after renaming a file and fsync (bsc#1093196).
- Btrfs: fix file/data loss caused by fsync after rename and new inode (bsc#1089241).
- Btrfs: fix find_free_dev_extent() malfunction in case device tree has hole (bsc#1089232).
- Btrfs: fix fitrim discarding device area reserved for boot loader's use.
- Btrfs: fix freeing used extent after removing empty block group.
- Btrfs: fix freeing used extents after removing empty block group.
- Btrfs: fix fs mapping extent map leak (bsc#1089229).
- Btrfs: fix fsync data loss after a ranged fsync (bsc#1089221).
- Btrfs: fix fsync data loss after adding hard link to inode (bsc#1089004).
- Btrfs: fix fsync data loss after append write (bsc#1089238).
- Btrfs: fix fsync log replay for inodes with a mix of regular refs and extrefs (bsc#1089003).
- Btrfs: fix fsync race leading to invalid data after log replay (bsc#1089000).
- Btrfs: fix fsync when extend references are added to an inode (bsc#1089002).
- Btrfs: fix fsync xattr loss in the fast fsync path (bsc#1094423).
- Btrfs: fix invalid extent maps due to hole punching (bsc#1094425).
- Btrfs: fix kernel oops while reading compressed data (bsc#1089192).
- Btrfs: fix log replay failure after linking special file and fsync (bsc#1089016).
- Btrfs: fix memory leak after block remove + trimming.
- Btrfs: fix metadata inconsistencies after directory fsync (bsc#1093197).
- Btrfs: fix race between balance and unused block group deletion (bsc#1089237).
- Btrfs: fix race between fs trimming and block group remove/allocation.
- Btrfs: fix race between scrub and block group deletion.
- Btrfs: fix race between transaction commit and empty block group removal.
- Btrfs: fix race conditions in BTRFS_IOC_FS_INFO ioctl (bsc#1089206).
- Btrfs: fix racy system chunk allocation when setting block group ro (bsc#1089233).
- Btrfs: fix regression in raid level conversion (bsc#1089234).
- Btrfs: fix skipped error handle when log sync failed (bsc#1089217).
- Btrfs: fix stale dir entries after removing a link and fsync (bsc#1089011).
- Btrfs: fix the number of transaction units needed to remove a block group.
- Btrfs: fix the skipped transaction commit during the file sync (bsc#1089216).
- Btrfs: fix unprotected alloc list insertion during the finishing procedure of replace (bsc#1089215).
- Btrfs: fix unprotected assignment of the target device (bsc#1089222).
- Btrfs: fix unprotected deletion from pending_chunks list.
- Btrfs: fix unprotected device list access when getting the fs information (bsc#1089228).
- Btrfs: fix unprotected device's variants on 32bits machine (bsc#1089227).
- Btrfs: fix unprotected device-&gt;bytes_used update (bsc#1089225).
- Btrfs: fix unreplayable log after snapshot delete + parent dir fsync (bsc#1089240).
- Btrfs: fix up read_tree_block to return proper error (bsc#1080837).
- Btrfs: fix wrong device bytes_used in the super block (bsc#1089224).
- Btrfs: fix wrong disk size when writing super blocks (bsc#1089223).
- Btrfs: fix xattr loss after power failure (bsc#1094436).
- Btrfs: handle non-fatal errors in btrfs_qgroup_inherit() (bsc#1089013).
- Btrfs: initialize the seq counter in struct btrfs_device (bsc#1094437).
- Btrfs: iterate over unused chunk space in FITRIM.
- Btrfs: make btrfs_issue_discard return bytes discarded.
- Btrfs: make btrfs_search_forward return with nodes unlocked (bsc#1094422).
- Btrfs: make sure to copy everything if we rename (bsc#1088997).
- Btrfs: make the chunk allocator completely tree lockless (bsc#1089202).
- Btrfs: move btrfs_truncate_page to btrfs_cont_expand instead of btrfs_truncate (bsc#1089201).
- Btrfs: nuke write_super from comments (bsc#1089199).
- Btrfs: only drop modified extents if we logged the whole inode (bsc#1089213).
- Btrfs: only update disk_i_size as we remove extents (bsc#1089209).
- Btrfs: qgroup: return EINVAL if level of parent is not higher than child's (bsc#1089012).
- Btrfs: remove deleted xattrs on fsync log replay (bsc#1089008).
- Btrfs: remove empty block groups automatically.
- Btrfs: remove non-sense btrfs_error_discard_extent() function (bsc#1089230).
- Btrfs: remove parameter blocksize from read_tree_block (bsc#1080837).
- Btrfs: remove transaction from send (bsc#1089218).
- Btrfs: remove unnecessary locking of cleaner_mutex to avoid deadlock.
- Btrfs: remove unused max_key arg from btrfs_search_forward (bsc#1094421).
- Btrfs: return an error from btrfs_wait_ordered_range (bsc#1089212).
- Btrfs: set inode's logged_trans/last_log_commit after ranged fsync (bsc#1093198).
- Btrfs: skip superblocks during discard.
- Btrfs: stop refusing the relocation of chunk 0 (bsc#1089208).
- Btrfs: update free_chunk_space during allocting a new chunk (bsc#1089226).
- Btrfs: use global reserve when deleting unused block group after ENOSPC.
- Btrfs: use nodesize everywhere, kill leafsize (bsc#1080837).
- Btrfs: wait ordered range before doing direct io (bsc#1089203).
- KVM: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).
- Xen counterparts of eager FPU implementation.
- balloon: do not BUG() when balloon is empty (bsc#1083347).
- fs: btrfs: volumes.c: Fix for possible null pointer dereference (bsc#1089219).
- kernel: Fix memory leak on EP11 target list processing (bnc#1096746).
- kvm/powerpc: Add new ioctl to retreive server MMU infos (bsc#1094244).
- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152, VM Functionality).
- module: Fix locking in symbol_put_addr() (bsc#1097445).
- netfront: make req_prod check properly deal with index wraps (bsc#1046610).
- powerpc/64s: Fix compiler store ordering to SLB shadow area (bsc#1094244).
- powerpc/mm/hash: Add missing isync prior to kernel stack SLB switch (bsc#1094244).
- powerpc/pseries: Define MCE error event section (bsc#1094244).
- powerpc/pseries: Display machine check error details (bsc#1094244).
- powerpc/pseries: Dump and flush SLB contents on SLB MCE errors (bsc#1094244).
- powerpc/pseries: convert rtas_log_buf to linear allocation (bsc#1094244).
- qla2xxx: Mask off Scope bits in retry delay (bsc#1068054).
- s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero (bnc#1096746).
- s390/dasd: fix failing path verification (bnc#1096746).
- trace: module: Maintain a valid user count (bsc#1097443).
- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096140).
- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).
- x86: Fix /proc/mtrr with base/size more than 44bits (bsc#1052351).
- xen/x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).
- xfs: avoid xfs_buf hang in lookup node directory corruption (bsc#989401).
- xfs: only update the last_sync_lsn when a transaction completes (bsc#989401).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-27"/>
	<updated date="2018-06-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046610">SUSE bug 1046610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052351">SUSE bug 1052351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068054">SUSE bug 1068054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079152">SUSE bug 1079152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080837">SUSE bug 1080837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083347">SUSE bug 1083347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087086">SUSE bug 1087086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088997">SUSE bug 1088997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088998">SUSE bug 1088998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088999">SUSE bug 1088999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089000">SUSE bug 1089000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089001">SUSE bug 1089001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089002">SUSE bug 1089002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089003">SUSE bug 1089003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089004">SUSE bug 1089004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089005">SUSE bug 1089005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089006">SUSE bug 1089006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089007">SUSE bug 1089007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089008">SUSE bug 1089008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089010">SUSE bug 1089010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089011">SUSE bug 1089011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089012">SUSE bug 1089012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089013">SUSE bug 1089013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089016">SUSE bug 1089016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089192">SUSE bug 1089192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089199">SUSE bug 1089199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089200">SUSE bug 1089200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089201">SUSE bug 1089201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089202">SUSE bug 1089202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089203">SUSE bug 1089203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089204">SUSE bug 1089204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089205">SUSE bug 1089205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089206">SUSE bug 1089206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089207">SUSE bug 1089207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089208">SUSE bug 1089208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089209">SUSE bug 1089209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089210">SUSE bug 1089210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089211">SUSE bug 1089211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089212">SUSE bug 1089212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089213">SUSE bug 1089213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089214">SUSE bug 1089214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089215">SUSE bug 1089215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089216">SUSE bug 1089216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089217">SUSE bug 1089217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089218">SUSE bug 1089218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089219">SUSE bug 1089219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089220">SUSE bug 1089220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089221">SUSE bug 1089221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089222">SUSE bug 1089222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089223">SUSE bug 1089223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089224">SUSE bug 1089224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089225">SUSE bug 1089225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089226">SUSE bug 1089226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089227">SUSE bug 1089227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089228">SUSE bug 1089228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089229">SUSE bug 1089229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089230">SUSE bug 1089230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089231">SUSE bug 1089231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089232">SUSE bug 1089232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089233">SUSE bug 1089233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089234">SUSE bug 1089234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089235">SUSE bug 1089235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089236">SUSE bug 1089236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089237">SUSE bug 1089237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089238">SUSE bug 1089238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089239">SUSE bug 1089239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089240">SUSE bug 1089240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089241">SUSE bug 1089241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093194">SUSE bug 1093194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093195">SUSE bug 1093195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093196">SUSE bug 1093196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093197">SUSE bug 1093197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093198">SUSE bug 1093198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094421">SUSE bug 1094421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094422">SUSE bug 1094422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094423">SUSE bug 1094423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094424">SUSE bug 1094424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094425">SUSE bug 1094425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094436">SUSE bug 1094436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094437">SUSE bug 1094437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095241">SUSE bug 1095241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096140">SUSE bug 1096140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096242">SUSE bug 1096242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096281">SUSE bug 1096281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096746">SUSE bug 1096746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097443">SUSE bug 1097443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097445">SUSE bug 1097445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097948">SUSE bug 1097948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973378">SUSE bug 973378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989401">SUSE bug 989401</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3665">CVE-2018-3665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583478" comment="kernel-bigmem-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583479" comment="kernel-bigmem-base-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583481" comment="kernel-default-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583482" comment="kernel-default-base-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583484" comment="kernel-default-man-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583485" comment="kernel-ec2-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583486" comment="kernel-ec2-base-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583488" comment="kernel-pae-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583489" comment="kernel-pae-base-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583491" comment="kernel-ppc64-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583492" comment="kernel-ppc64-base-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583494" comment="kernel-source-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583495" comment="kernel-syms-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583496" comment="kernel-trace-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583497" comment="kernel-trace-base-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583499" comment="kernel-xen-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583500" comment="kernel-xen-base-3.0.101-108.57.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583478" comment="kernel-bigmem-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583479" comment="kernel-bigmem-base-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583481" comment="kernel-default-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583482" comment="kernel-default-base-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583484" comment="kernel-default-man-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583485" comment="kernel-ec2-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583486" comment="kernel-ec2-base-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583488" comment="kernel-pae-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583489" comment="kernel-pae-base-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583491" comment="kernel-ppc64-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583492" comment="kernel-ppc64-base-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583494" comment="kernel-source-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583495" comment="kernel-syms-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583496" comment="kernel-trace-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583497" comment="kernel-trace-base-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583499" comment="kernel-xen-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583500" comment="kernel-xen-base-3.0.101-108.57.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220057" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1045538" ref_url="https://bugzilla.suse.com/1045538" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1087086" ref_url="https://bugzilla.suse.com/1087086" source="BUGZILLA"/>
		<reference ref_id="1090078" ref_url="https://bugzilla.suse.com/1090078" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1094876" ref_url="https://bugzilla.suse.com/1094876" source="BUGZILLA"/>
		<reference ref_id="1098408" ref_url="https://bugzilla.suse.com/1098408" source="BUGZILLA"/>
		<reference ref_id="1099177" ref_url="https://bugzilla.suse.com/1099177" source="BUGZILLA"/>
		<reference ref_id="1099598" ref_url="https://bugzilla.suse.com/1099598" source="BUGZILLA"/>
		<reference ref_id="1099709" ref_url="https://bugzilla.suse.com/1099709" source="BUGZILLA"/>
		<reference ref_id="1099966" ref_url="https://bugzilla.suse.com/1099966" source="BUGZILLA"/>
		<reference ref_id="1100089" ref_url="https://bugzilla.suse.com/1100089" source="BUGZILLA"/>
		<reference ref_id="1100091" ref_url="https://bugzilla.suse.com/1100091" source="BUGZILLA"/>
		<reference ref_id="1101296" ref_url="https://bugzilla.suse.com/1101296" source="BUGZILLA"/>
		<reference ref_id="780242" ref_url="https://bugzilla.suse.com/780242" source="BUGZILLA"/>
		<reference ref_id="784815" ref_url="https://bugzilla.suse.com/784815" source="BUGZILLA"/>
		<reference ref_id="786036" ref_url="https://bugzilla.suse.com/786036" source="BUGZILLA"/>
		<reference ref_id="790588" ref_url="https://bugzilla.suse.com/790588" source="BUGZILLA"/>
		<reference ref_id="795301" ref_url="https://bugzilla.suse.com/795301" source="BUGZILLA"/>
		<reference ref_id="902351" ref_url="https://bugzilla.suse.com/902351" source="BUGZILLA"/>
		<reference ref_id="909495" ref_url="https://bugzilla.suse.com/909495" source="BUGZILLA"/>
		<reference ref_id="923242" ref_url="https://bugzilla.suse.com/923242" source="BUGZILLA"/>
		<reference ref_id="925105" ref_url="https://bugzilla.suse.com/925105" source="BUGZILLA"/>
		<reference ref_id="936423" ref_url="https://bugzilla.suse.com/936423" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3688" ref_url="https://www.suse.com/security/cve/CVE-2014-3688/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004309.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2014-3688: The SCTP implementation allowed remote attackers to cause a
  denial of service (memory consumption) by triggering a large number of chunks
  in an association's output queue (bsc#902351).

The following non-security bugs were fixed:

- ALSA: hda/ca0132: fix build failure when a local macro is defined (bsc#1045538).
- ALSA: seq: Do not allow resizing pool in use (bsc#1045538).
- Delete patches.fixes/0001-ipc-shm-Fix-shmat-mmap-nil-page-protection.patch (bsc# 1090078)
- IB/mlx4: fix sprintf format warning (bnc#786036).
- RDMA/mlx4: Discard unknown SQP work requests (bnc#786036).
- USB: uss720: fix NULL-deref at probe (bnc#1047487).
- bna: integer overflow bug in debugfs (bnc#780242).
- e1000e: Ignore TSYNCRXCTL when getting I219 clock attributes (bug#923242).
- e1000e: Undo e1000e_pm_freeze if __e1000_shutdown fails (bug#909495).
- fix a leak in /proc/schedstats (bsc#1094876).
- ixgbe: Initialize 64-bit stats seqcounts (bnc#795301).
- mm: fix the NULL mapping case in __isolate_lru_page() (git-fixes).
- module/retpoline: Warn about missing retpoline in module (bnc#1099177).
- net/mlx4_core: Fix error handling in mlx4_init_port_info (bnc#786036).
- net/mlx4_en: Change default QoS settings (bnc#786036 ).
- net/mlx4_en: Use __force to fix a sparse warning in TX datapath (bug#925105).
- netxen: fix incorrect loop counter decrement (bnc#784815).
- powerpc: Machine check interrupt is a non-maskable interrupt (bsc#1094244).
- s390/qdio: do not merge ERROR output buffers (bnc#1099709).
- s390/qeth: do not dump control cmd twice (bnc#1099709).
- s390/qeth: fix SETIP command handling (bnc#1099709).
- s390/qeth: free netdevice when removing a card (bnc#1099709).
- s390/qeth: lock read device while queueing next buffer (bnc#1099709).
- s390/qeth: when thread completes, wake up all waiters (bnc#1099709).
- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).
- scsi: sg: mitigate read/write abuse (bsc#1101296).
- tg3: do not clear stats while tg3_close (bnc#790588).
- video/stifb: Return -ENOMEM after a failed kzalloc() in stifb_init_fb() (bnc#1099966).
- vmxnet3: use correct flag to indicate LRO feature (bsc#936423).
- x86-32/kaiser: Add CPL check for CR3 switch before iret (bsc#1098408).
- x86-non-upstream-eager-fpu 32bit fix (bnc#1087086, bnc#1100091, bnc#1099598).
- x86/cpu/bugs: Make retpoline module warning conditional (bnc#1099177).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-26"/>
	<updated date="2018-07-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045538">SUSE bug 1045538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087086">SUSE bug 1087086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090078">SUSE bug 1090078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094876">SUSE bug 1094876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098408">SUSE bug 1098408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099177">SUSE bug 1099177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099598">SUSE bug 1099598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099709">SUSE bug 1099709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099966">SUSE bug 1099966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100089">SUSE bug 1100089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100091">SUSE bug 1100091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101296">SUSE bug 1101296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780242">SUSE bug 780242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784815">SUSE bug 784815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786036">SUSE bug 786036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/790588">SUSE bug 790588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795301">SUSE bug 795301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902351">SUSE bug 902351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909495">SUSE bug 909495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923242">SUSE bug 923242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925105">SUSE bug 925105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936423">SUSE bug 936423</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3688/">CVE-2014-3688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3688">CVE-2014-3688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583502" comment="kernel-bigmem-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583503" comment="kernel-bigmem-base-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583505" comment="kernel-default-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583506" comment="kernel-default-base-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583508" comment="kernel-default-man-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583509" comment="kernel-ec2-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583510" comment="kernel-ec2-base-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583512" comment="kernel-pae-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583513" comment="kernel-pae-base-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583515" comment="kernel-ppc64-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583516" comment="kernel-ppc64-base-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583518" comment="kernel-source-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583519" comment="kernel-syms-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583520" comment="kernel-trace-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583521" comment="kernel-trace-base-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583523" comment="kernel-xen-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583524" comment="kernel-xen-base-3.0.101-108.60.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583502" comment="kernel-bigmem-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583503" comment="kernel-bigmem-base-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583505" comment="kernel-default-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583506" comment="kernel-default-base-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583508" comment="kernel-default-man-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583509" comment="kernel-ec2-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583510" comment="kernel-ec2-base-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583512" comment="kernel-pae-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583513" comment="kernel-pae-base-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583515" comment="kernel-ppc64-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583516" comment="kernel-ppc64-base-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583518" comment="kernel-source-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583519" comment="kernel-syms-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583520" comment="kernel-trace-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583521" comment="kernel-trace-base-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583523" comment="kernel-xen-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583524" comment="kernel-xen-base-3.0.101-108.60.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220058" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1031240" ref_url="https://bugzilla.suse.com/1031240" source="BUGZILLA"/>
		<reference ref_id="1047027" ref_url="https://bugzilla.suse.com/1047027" source="BUGZILLA"/>
		<reference ref_id="1049128" ref_url="https://bugzilla.suse.com/1049128" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1064861" ref_url="https://bugzilla.suse.com/1064861" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1066674" ref_url="https://bugzilla.suse.com/1066674" source="BUGZILLA"/>
		<reference ref_id="1071021" ref_url="https://bugzilla.suse.com/1071021" source="BUGZILLA"/>
		<reference ref_id="1081680" ref_url="https://bugzilla.suse.com/1081680" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1094825" ref_url="https://bugzilla.suse.com/1094825" source="BUGZILLA"/>
		<reference ref_id="1103145" ref_url="https://bugzilla.suse.com/1103145" source="BUGZILLA"/>
		<reference ref_id="1105799" ref_url="https://bugzilla.suse.com/1105799" source="BUGZILLA"/>
		<reference ref_id="1106139" ref_url="https://bugzilla.suse.com/1106139" source="BUGZILLA"/>
		<reference ref_id="1106240" ref_url="https://bugzilla.suse.com/1106240" source="BUGZILLA"/>
		<reference ref_id="1107371" ref_url="https://bugzilla.suse.com/1107371" source="BUGZILLA"/>
		<reference ref_id="1107829" ref_url="https://bugzilla.suse.com/1107829" source="BUGZILLA"/>
		<reference ref_id="1107849" ref_url="https://bugzilla.suse.com/1107849" source="BUGZILLA"/>
		<reference ref_id="1108314" ref_url="https://bugzilla.suse.com/1108314" source="BUGZILLA"/>
		<reference ref_id="1108498" ref_url="https://bugzilla.suse.com/1108498" source="BUGZILLA"/>
		<reference ref_id="1109806" ref_url="https://bugzilla.suse.com/1109806" source="BUGZILLA"/>
		<reference ref_id="1109818" ref_url="https://bugzilla.suse.com/1109818" source="BUGZILLA"/>
		<reference ref_id="1110006" ref_url="https://bugzilla.suse.com/1110006" source="BUGZILLA"/>
		<reference ref_id="1110247" ref_url="https://bugzilla.suse.com/1110247" source="BUGZILLA"/>
		<reference ref_id="1113337" ref_url="https://bugzilla.suse.com/1113337" source="BUGZILLA"/>
		<reference ref_id="1113751" ref_url="https://bugzilla.suse.com/1113751" source="BUGZILLA"/>
		<reference ref_id="1113769" ref_url="https://bugzilla.suse.com/1113769" source="BUGZILLA"/>
		<reference ref_id="1114460" ref_url="https://bugzilla.suse.com/1114460" source="BUGZILLA"/>
		<reference ref_id="923775" ref_url="https://bugzilla.suse.com/923775" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000407" ref_url="https://www.suse.com/security/cve/CVE-2017-1000407/" source="CVE"/>
		<reference ref_id="CVE-2017-16533" ref_url="https://www.suse.com/security/cve/CVE-2017-16533/" source="CVE"/>
		<reference ref_id="CVE-2017-7273" ref_url="https://www.suse.com/security/cve/CVE-2017-7273/" source="CVE"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-18281" ref_url="https://www.suse.com/security/cve/CVE-2018-18281/" source="CVE"/>
		<reference ref_id="CVE-2018-18386" ref_url="https://www.suse.com/security/cve/CVE-2018-18386/" source="CVE"/>
		<reference ref_id="CVE-2018-18710" ref_url="https://www.suse.com/security/cve/CVE-2018-18710/" source="CVE"/>
		<reference ref_id="CVE-2018-9516" ref_url="https://www.suse.com/security/cve/CVE-2018-9516/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004845.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to 3.0.101-108.81 to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2018-18281: An issue was discovered in the Linux kernel, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused (bnc#1113769).
- CVE-2018-18710: An issue was discovered in the Linux kernel, an information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-18386: drivers/tty/n_tty.c in the Linux kernel allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
- CVE-2017-7273: The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 4.x allowed physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report (bnc#1031240).
- CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).
- CVE-2017-1000407: An denial of service issue was discovered in the Linux kernel, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic (bnc#1071021).
- CVE-2018-9516: An issue was discovered in the Linux kernel, the copy_to_user() inside the HID code does not correctly check the length before executing (bsc#1108498).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely (bnc#1107829).

The following non-security bugs were fixed:

- Btrfs: fix deadlock when finalizing block group creation (bsc#1107849).
- Btrfs: fix quick exhaustion of the system array in the superblock (bsc#1107849).
- FS-Cache: Synchronise object death state change vs operation submission (bsc#1107371).
- KABI: move the new handler to end of machdep_calls and hide it from genksyms (bsc#1094244).
- KVM: Disable irq while unregistering user notifier (bsc#1106240).
- KVM: SVM: obey guest PAT (bsc#1106240).
- KVM: VMX: remove I/O port 0x80 bypass on Intel hosts (bsc#1106240).
- KVM: emulate: fix CMPXCHG8B on 32-bit hosts (bsc#1106240).
- KVM: x86: emulator: Return to user-mode on L1 CPL=0 emulation failure (bsc#1106240).
- KVM: x86: fix use of uninitialized memory as segment descriptor in emulator (bsc#1106240).
- KVM: x86: zero base3 of unusable segments (bsc#1106240).
- NFS - do not hang if xdr decoded username is bad (bsc#1105799).
- NFSv4.1 - Do not leak IO size from one mount to another (bsc#1103145).
- PCI/AER: Report non-fatal errors only to the affected endpoint (bsc#1109806).
- PCI: Supply CPU physical address (not bus address) to iomem_is_exclusive() (bsc#1109806).
- PCI: shpchp: Check bridge's secondary (not primary) bus speed (bsc#1109806).
- PCI: shpchp: Fix AMD POGO identification (bsc#1109806).
- add kernel parameter to disable failfast on block devices  (bsc#1081680).
- block: add flag QUEUE_FLAG_REGISTERED (bsc#1047027).
- block: allow gendisk's request_queue registration to be deferred (bsc#1047027).
- crypto: ghash-clmulni-intel - use C implementation for setkey() (bsc#1110006).
- dm: fix incomplete request_queue initialization (bsc#1047027).
- dm: only initialize the request_queue once (bsc#1047027).
- firmware/ihex2fw.c: restore missing default in switch statement (bsc#1114460).
- kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE (git-fixes).
- locks: fix unlock when fcntl_setlk races with a close (git-fixes).
- media: Fix invalid free in the fix for mceusb (bsc#1050431).
- media: cx25821: prevent out-of-bounds read on array card (bsc#1050431).
- media: ite-cir: initialize use_demodulator before using it (bsc#1050431).
- media: mceusb: fix NULL-deref at probe (bsc#1050431).
- media: mceusb: fix memory leaks in error path.
- percpu: make pcpu_alloc_chunk() use pcpu_mem_free() instead of kfree() (git fixes).
- powerpc, KVM: Rework KVM checks in first-level interrupt handlers (bsc#1094244).
- powerpc/64: Do load of PACAKBASE in LOAD_HANDLER (bsc#1094244).
- powerpc/64: Fix smp_wmb barrier definition use use lwsync consistently (bsc#1064861).
- powerpc/64: Initialise thread_info for emergency stacks (bsc#1094244).
- powerpc/64s: Exception macro for stack frame and initial register save (bsc#1094244).
- powerpc/64s: move machine check SLB flushing to mm/slb.c (bsc#1094244).
- powerpc/asm: Mark cr0 as clobbered in mftb() (bsc#1049128).
- powerpc/book3s: Introduce a early machine check hook in cpu_spec (bsc#1094244).
- powerpc/book3s: Introduce exclusive emergency stack for machine check exception (bsc#1094244).
- powerpc/book3s: Split the common exception prolog logic into two section (bsc#1094244).
- powerpc/book3s: handle machine check in Linux host (bsc#1094244).
- powerpc/mce: Fix SLB rebolting during MCE recovery path (bsc#1094244).
- powerpc/pseries: Avoid using the size greater than (bsc#1094244).
- powerpc/pseries: Defer the logging of rtas error to irq work queue (bsc#1094244).
- powerpc/pseries: Dump the SLB contents on SLB MCE errors (bsc#1094244).
- powerpc/pseries: Flush SLB contents on SLB MCE errors (bsc#1094244).
- powerpc: Add a symbol for hypervisor trampolines (bsc#1094244).
- powerpc: Fix smp_mb__before_spinlock() (bsc#1110247).
- powerpc: Make load_hander handle upto 64k offset (bsc#1094244).
- powerpc: Rework runlatch code (bsc#1094244).
- powerpc: Save CFAR before branching in interrupt entry paths (bsc#1094244).
- powerpc: cputable: KABI - hide new cpu_spec member from genksyms (bsc#1094244).
- powerpc: move MCE handler out-of-line and consolidate with machine_check_fwnmi (bsc#1094244).
- powerpc: move stab code into #ifndef CONFIG_POWER4_ONLY (bsc#1094244).
- powerpc: replace open-coded EXCEPTION_PROLOG_1 with the macro in slb miss handlers (bsc#1094244).
- reiserfs: add check to detect corrupted directory entry (bsc#1109818).
- reiserfs: do not panic on bad directory entries (bsc#1109818).
- retpoline: Introduce start/end markers of indirect thunk (bsc#1113337).
- s390/facilites: use stfle_fac_list array size for MAX_FACILITY_BIT (bnc#1108314, LTC#171326).
- s390/sclp: Change SCLP console default buffer-full behavior (bnc#1108314, LTC#171049).
- scsi: libfc: Do not drop down to FLOGI for fc_rport_login() (bsc#1106139).
- scsi: libfc: Do not login if the port is already started (bsc#1106139).
- scsi: libfc: do not advance state machine for incoming FLOGI (bsc#1106139).
- scsi: storvsc: fix memory leak on ring buffer busy (bnc#923775).
- signals: avoid unnecessary taking of sighand-&gt;siglock (bsc#1110247).
- x86/kexec: Avoid double free_page() upon do_kexec_load() failure (bsc#1110006).
- x86/mm/32: Set the '__vmalloc_start_set' flag in initmem_init() (bsc#1110006).
- x86/paravirt: Fix some warning messages (bnc#1065600).
- x86/percpu: Fix this_cpu_read() (bsc#1110006).
- x86/process: Re-export start_thread() (bsc#1110006).
- x86/vdso: Fix asm constraints on vDSO syscall fallbacks (bsc#1110006).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-13"/>
	<updated date="2018-11-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1031240">SUSE bug 1031240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047027">SUSE bug 1047027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049128">SUSE bug 1049128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064861">SUSE bug 1064861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066674">SUSE bug 1066674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071021">SUSE bug 1071021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081680">SUSE bug 1081680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094825">SUSE bug 1094825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103145">SUSE bug 1103145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105799">SUSE bug 1105799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106139">SUSE bug 1106139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106240">SUSE bug 1106240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107371">SUSE bug 1107371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107829">SUSE bug 1107829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107849">SUSE bug 1107849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108314">SUSE bug 1108314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108498">SUSE bug 1108498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109806">SUSE bug 1109806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109818">SUSE bug 1109818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110006">SUSE bug 1110006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110247">SUSE bug 1110247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113337">SUSE bug 1113337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113751">SUSE bug 1113751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113769">SUSE bug 1113769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114460">SUSE bug 1114460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923775">SUSE bug 923775</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000407/">CVE-2017-1000407 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000407">CVE-2017-1000407 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16533/">CVE-2017-16533 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16533">CVE-2017-16533 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7273/">CVE-2017-7273 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7273">CVE-2017-7273 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14633">CVE-2018-14633 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18281/">CVE-2018-18281 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18281">CVE-2018-18281 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18386/">CVE-2018-18386 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18386">CVE-2018-18386 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18710/">CVE-2018-18710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18710">CVE-2018-18710 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9516/">CVE-2018-9516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9516">CVE-2018-9516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583526" comment="kernel-bigmem-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583527" comment="kernel-bigmem-base-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583529" comment="kernel-default-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583530" comment="kernel-default-base-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583532" comment="kernel-default-man-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583533" comment="kernel-ec2-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583534" comment="kernel-ec2-base-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583536" comment="kernel-pae-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583537" comment="kernel-pae-base-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583539" comment="kernel-ppc64-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583540" comment="kernel-ppc64-base-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583542" comment="kernel-source-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583543" comment="kernel-syms-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583544" comment="kernel-trace-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583545" comment="kernel-trace-base-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583547" comment="kernel-xen-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583548" comment="kernel-xen-base-3.0.101-108.81.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583526" comment="kernel-bigmem-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583527" comment="kernel-bigmem-base-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583529" comment="kernel-default-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583530" comment="kernel-default-base-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583532" comment="kernel-default-man-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583533" comment="kernel-ec2-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583534" comment="kernel-ec2-base-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583536" comment="kernel-pae-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583537" comment="kernel-pae-base-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583539" comment="kernel-ppc64-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583540" comment="kernel-ppc64-base-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583542" comment="kernel-source-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583543" comment="kernel-syms-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583544" comment="kernel-trace-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583545" comment="kernel-trace-base-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583547" comment="kernel-xen-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583548" comment="kernel-xen-base-3.0.101-108.81.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220059" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1110785" ref_url="https://bugzilla.suse.com/1110785" source="BUGZILLA"/>
		<reference ref_id="1113769" ref_url="https://bugzilla.suse.com/1113769" source="BUGZILLA"/>
		<reference ref_id="1119314" ref_url="https://bugzilla.suse.com/1119314" source="BUGZILLA"/>
		<reference ref_id="1120326" ref_url="https://bugzilla.suse.com/1120326" source="BUGZILLA"/>
		<reference ref_id="1120843" ref_url="https://bugzilla.suse.com/1120843" source="BUGZILLA"/>
		<reference ref_id="1120885" ref_url="https://bugzilla.suse.com/1120885" source="BUGZILLA"/>
		<reference ref_id="1131295" ref_url="https://bugzilla.suse.com/1131295" source="BUGZILLA"/>
		<reference ref_id="1131543" ref_url="https://bugzilla.suse.com/1131543" source="BUGZILLA"/>
		<reference ref_id="1132374" ref_url="https://bugzilla.suse.com/1132374" source="BUGZILLA"/>
		<reference ref_id="1132472" ref_url="https://bugzilla.suse.com/1132472" source="BUGZILLA"/>
		<reference ref_id="1132580" ref_url="https://bugzilla.suse.com/1132580" source="BUGZILLA"/>
		<reference ref_id="1133188" ref_url="https://bugzilla.suse.com/1133188" source="BUGZILLA"/>
		<reference ref_id="1134102" ref_url="https://bugzilla.suse.com/1134102" source="BUGZILLA"/>
		<reference ref_id="1134729" ref_url="https://bugzilla.suse.com/1134729" source="BUGZILLA"/>
		<reference ref_id="1134848" ref_url="https://bugzilla.suse.com/1134848" source="BUGZILLA"/>
		<reference ref_id="1137586" ref_url="https://bugzilla.suse.com/1137586" source="BUGZILLA"/>
		<reference ref_id="923908" ref_url="https://bugzilla.suse.com/923908" source="BUGZILLA"/>
		<reference ref_id="939260" ref_url="https://bugzilla.suse.com/939260" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9710" ref_url="https://www.suse.com/security/cve/CVE-2014-9710/" source="CVE"/>
		<reference ref_id="CVE-2018-17972" ref_url="https://www.suse.com/security/cve/CVE-2018-17972/" source="CVE"/>
		<reference ref_id="CVE-2019-11190" ref_url="https://www.suse.com/security/cve/CVE-2019-11190/" source="CVE"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479/" source="CVE"/>
		<reference ref_id="CVE-2019-11486" ref_url="https://www.suse.com/security/cve/CVE-2019-11486/" source="CVE"/>
		<reference ref_id="CVE-2019-11884" ref_url="https://www.suse.com/security/cve/CVE-2019-11884/" source="CVE"/>
		<reference ref_id="CVE-2019-5489" ref_url="https://www.suse.com/security/cve/CVE-2019-5489/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel version 3.0.101 was updated to receive
various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-11477: A sequence of SACKs may have been crafted such that one can
  trigger an integer overflow, leading to a kernel panic. (bsc#1137586)

- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which
  will fragment the TCP retransmission queue. An attacker may have been able to
  further exploit the fragmented queue to cause an expensive linked-list walk
  for subsequent SACKs received for that same TCP connection.

- CVE-2019-11479: It was possible to send a crafted sequence of SACKs which
  will fragment the RACK send map. A remote attacker may be able to further
  exploit the fragmented send map to cause an expensive linked-list walk for
  subsequent SACKs received for that same TCP connection. This would have
  resulted in excess resource consumption due to low mss values.

- CVE-2014-9710: The Btrfs implementation in the Linux kernel did not ensure
  that the visible xattr state is consistent with a requested replacement,
  which allowed local users to bypass intended ACL settings and gain privileges
  via standard filesystem operations (1) during an xattr-replacement time
  window, related to a race condition, or (2) after an xattr-replacement
  attempt that fails because the data did not fit (bnc#923908).

- CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux
  kernel allowed local attackers to observe page cache access patterns of other
  processes on the same system, potentially allowing sniffing of secret
  information. (Fixing this affects the output of the fincore program.) Limited
  remote exploitation may be possible, as demonstrated by latency differences
  in accessing public files from an Apache HTTP Server (bnc#1120843).

- CVE-2019-11190: The Linux kernel allowed local users to bypass ASLR on setuid
  programs (such as /bin/su) because install_exec_creds() is called too late in
  load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check
  has a race condition when reading /proc/pid/stat (bnc#1131543).

- CVE-2018-17972: An issue was discovered in the proc_pid_stack function in
  fs/proc/base.c in the Linux kernel It did not ensure that only root may
  inspect the kernel stack of an arbitrary task, allowing a local attacker to
  exploit racy stack unwinding and leak kernel task stack contents
  (bnc#1110785).

- CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c
  in the Linux kernel allowed a local user to obtain potentially sensitive
  information from kernel stack memory via a HIDPCONNADD command, because a
  name field may not end with a '\0' character (bnc#1134848).

- CVE-2019-11486: The Siemens R3964 line discipline driver in
  drivers/tty/n_r3964.c in the Linux kernel had multiple race conditions
  (bnc#1133188).

The following non-security bugs were fixed:

- cifs: fix uninitialized memory access (bsc#1120326).
- kabi: drop LINUX_MIB_TCPWQUEUETOOBIG snmp counter (bsc#1137586).
- kernel: Add CEX7 toleration support (bsc#1131295).
- net: ipsec: fix a kernel oops caused by reentrant workqueue (bsc#1119314).
- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).
- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).
- tcp: limit payload size of sacked skbs (bsc#1137586).
- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).
- x86/MCE: Handle 'nosmt' offlining properly (bsc#1134729).
- xfs: do not cache inodes read through bulkstat (bsc#1134102).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-18"/>
	<updated date="2019-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1110785">SUSE bug 1110785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113769">SUSE bug 1113769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119314">SUSE bug 1119314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120326">SUSE bug 1120326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120843">SUSE bug 1120843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120885">SUSE bug 1120885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131295">SUSE bug 1131295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131543">SUSE bug 1131543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132374">SUSE bug 1132374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132472">SUSE bug 1132472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132580">SUSE bug 1132580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133188">SUSE bug 1133188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134102">SUSE bug 1134102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134729">SUSE bug 1134729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134848">SUSE bug 1134848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923908">SUSE bug 923908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939260">SUSE bug 939260</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9710/">CVE-2014-9710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9710">CVE-2014-9710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17972/">CVE-2018-17972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17972">CVE-2018-17972 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11190/">CVE-2019-11190 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11190">CVE-2019-11190 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11477">CVE-2019-11477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11478">CVE-2019-11478 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11479">CVE-2019-11479 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11486/">CVE-2019-11486 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11486">CVE-2019-11486 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11884/">CVE-2019-11884 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11884">CVE-2019-11884 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5489/">CVE-2019-5489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5489">CVE-2019-5489 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583550" comment="kernel-bigmem-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583551" comment="kernel-bigmem-base-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583553" comment="kernel-default-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583554" comment="kernel-default-base-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583556" comment="kernel-default-man-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583557" comment="kernel-ec2-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583558" comment="kernel-ec2-base-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583560" comment="kernel-pae-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583561" comment="kernel-pae-base-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583563" comment="kernel-ppc64-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583564" comment="kernel-ppc64-base-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583566" comment="kernel-source-3.0.101-108.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583567" comment="kernel-syms-3.0.101-108.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583568" comment="kernel-trace-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583569" comment="kernel-trace-base-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583571" comment="kernel-xen-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583572" comment="kernel-xen-base-3.0.101-108.95.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220060" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1063416" ref_url="https://bugzilla.suse.com/1063416" source="BUGZILLA"/>
		<reference ref_id="1090078" ref_url="https://bugzilla.suse.com/1090078" source="BUGZILLA"/>
		<reference ref_id="1102340" ref_url="https://bugzilla.suse.com/1102340" source="BUGZILLA"/>
		<reference ref_id="1120758" ref_url="https://bugzilla.suse.com/1120758" source="BUGZILLA"/>
		<reference ref_id="1134395" ref_url="https://bugzilla.suse.com/1134395" source="BUGZILLA"/>
		<reference ref_id="1134835" ref_url="https://bugzilla.suse.com/1134835" source="BUGZILLA"/>
		<reference ref_id="1135650" ref_url="https://bugzilla.suse.com/1135650" source="BUGZILLA"/>
		<reference ref_id="1136424" ref_url="https://bugzilla.suse.com/1136424" source="BUGZILLA"/>
		<reference ref_id="1137194" ref_url="https://bugzilla.suse.com/1137194" source="BUGZILLA"/>
		<reference ref_id="1138943" ref_url="https://bugzilla.suse.com/1138943" source="BUGZILLA"/>
		<reference ref_id="1139751" ref_url="https://bugzilla.suse.com/1139751" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20836" ref_url="https://www.suse.com/security/cve/CVE-2018-20836/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<reference ref_id="CVE-2019-12614" ref_url="https://www.suse.com/security/cve/CVE-2019-12614/" source="CVE"/>
		<reference ref_id="CVE-2019-3459" ref_url="https://www.suse.com/security/cve/CVE-2019-3459/" source="CVE"/>
		<reference ref_id="CVE-2019-3460" ref_url="https://www.suse.com/security/cve/CVE-2019-3460/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="CVE-2019-3896" ref_url="https://www.suse.com/security/cve/CVE-2019-3896/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005734.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-3459: A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel(bnc#1120758).
- CVE-2019-3460: A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before (bnc#1120758).
- CVE-2019-3896: A double-free could happen in idr_remove_all() in lib/idr.c in the Linux kernel. An unprivileged local attacker could use this flaw for a privilege escalation or for a system crash and a denial of service (DoS) (bnc#1138943).
- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which could lead to a denial of service (bnc#1102340).
- CVE-2018-20836: An issue was discovered in the Linux kernel There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free (bnc#1134395).
- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel There was an unchecked kstrdup of prop-name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1137194).
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bnc#1136424 1136446).

The following non-security bugs were fixed:

- KEYS: do not let add_key() update an uninstantiated key (bnc#1063416).
- fnic: Fix to cleanup aborted IO to avoid device being offlined by mid-layer (bsc#1134835).
- signal: give SEND_SIG_FORCED more power to beat SIGNAL_UNKILLABLE (bsc#1135650).
- signal: oom_kill_task: use SEND_SIG_FORCED instead of force_sig() (bsc#1135650).
- tcp: a regression in the previous fix for the TCP SACK issue was fixed (bnc#1139751)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-18"/>
	<updated date="2019-07-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1063416">SUSE bug 1063416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090078">SUSE bug 1090078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102340">SUSE bug 1102340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120758">SUSE bug 1120758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134395">SUSE bug 1134395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134835">SUSE bug 1134835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135650">SUSE bug 1135650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136424">SUSE bug 1136424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137194">SUSE bug 1137194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138943">SUSE bug 1138943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139751">SUSE bug 1139751</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20836/">CVE-2018-20836 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20836">CVE-2018-20836 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5390">CVE-2018-5390 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12614/">CVE-2019-12614 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12614">CVE-2019-12614 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3459/">CVE-2019-3459 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3459">CVE-2019-3459 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3460/">CVE-2019-3460 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3460">CVE-2019-3460 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3846">CVE-2019-3846 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3896/">CVE-2019-3896 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3896">CVE-2019-3896 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583574" comment="kernel-bigmem-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583575" comment="kernel-bigmem-base-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583577" comment="kernel-default-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583578" comment="kernel-default-base-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583580" comment="kernel-default-man-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583581" comment="kernel-ec2-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583582" comment="kernel-ec2-base-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583584" comment="kernel-pae-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583585" comment="kernel-pae-base-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583587" comment="kernel-ppc64-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583588" comment="kernel-ppc64-base-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583590" comment="kernel-source-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583591" comment="kernel-syms-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583592" comment="kernel-trace-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583593" comment="kernel-trace-base-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583595" comment="kernel-xen-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583596" comment="kernel-xen-base-3.0.101-108.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220061" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1134390" ref_url="https://bugzilla.suse.com/1134390" source="BUGZILLA"/>
		<reference ref_id="1134399" ref_url="https://bugzilla.suse.com/1134399" source="BUGZILLA"/>
		<reference ref_id="1138744" ref_url="https://bugzilla.suse.com/1138744" source="BUGZILLA"/>
		<reference ref_id="1139358" ref_url="https://bugzilla.suse.com/1139358" source="BUGZILLA"/>
		<reference ref_id="1140945" ref_url="https://bugzilla.suse.com/1140945" source="BUGZILLA"/>
		<reference ref_id="1140965" ref_url="https://bugzilla.suse.com/1140965" source="BUGZILLA"/>
		<reference ref_id="1141401" ref_url="https://bugzilla.suse.com/1141401" source="BUGZILLA"/>
		<reference ref_id="1141402" ref_url="https://bugzilla.suse.com/1141402" source="BUGZILLA"/>
		<reference ref_id="1141452" ref_url="https://bugzilla.suse.com/1141452" source="BUGZILLA"/>
		<reference ref_id="1141453" ref_url="https://bugzilla.suse.com/1141453" source="BUGZILLA"/>
		<reference ref_id="1141454" ref_url="https://bugzilla.suse.com/1141454" source="BUGZILLA"/>
		<reference ref_id="1142023" ref_url="https://bugzilla.suse.com/1142023" source="BUGZILLA"/>
		<reference ref_id="1143045" ref_url="https://bugzilla.suse.com/1143045" source="BUGZILLA"/>
		<reference ref_id="1143179" ref_url="https://bugzilla.suse.com/1143179" source="BUGZILLA"/>
		<reference ref_id="1143189" ref_url="https://bugzilla.suse.com/1143189" source="BUGZILLA"/>
		<reference ref_id="1143191" ref_url="https://bugzilla.suse.com/1143191" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9289" ref_url="https://www.suse.com/security/cve/CVE-2015-9289/" source="CVE"/>
		<reference ref_id="CVE-2018-20855" ref_url="https://www.suse.com/security/cve/CVE-2018-20855/" source="CVE"/>
		<reference ref_id="CVE-2019-1125" ref_url="https://www.suse.com/security/cve/CVE-2019-1125/" source="CVE"/>
		<reference ref_id="CVE-2019-11810" ref_url="https://www.suse.com/security/cve/CVE-2019-11810/" source="CVE"/>
		<reference ref_id="CVE-2019-13631" ref_url="https://www.suse.com/security/cve/CVE-2019-13631/" source="CVE"/>
		<reference ref_id="CVE-2019-14283" ref_url="https://www.suse.com/security/cve/CVE-2019-14283/" source="CVE"/>
		<reference ref_id="CVE-2019-14284" ref_url="https://www.suse.com/security/cve/CVE-2019-14284/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005859.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189).
- CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191).
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023).
- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399).
- CVE-2019-1125: Enable Spectre v1 swapgs mitigations (bsc#1139358).
- CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045).
- CVE-2015-9289: A buffer overflow occurs when checking userspace params in drivers/media/dvb-frontends/cx24116.c. The maximum size for a DiSEqC command is 6, according to the userspace API. However, the code allowed larger values such as 23 (bsc#1143179).

The following non-security bugs were fixed:

- fix detection of race between fcntl-setlk and close (bsc#1140965).
- ocfs2: add first lock wait time in locking_state (bsc#1134390).
- ocfs2: add last unlock times in locking_state (bsc#1134390).
- ocfs2: add locking filter debugfs file (bsc#1134390).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945,bsc#1141401,bsc#1141402,bsc#1141452,bsc#1141453,bsc#1141454).
- xen-netfront: use napi_complete() correctly to prevent Rx stalling (bsc#1138744).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-29"/>
	<updated date="2019-08-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1134390">SUSE bug 1134390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134399">SUSE bug 1134399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138744">SUSE bug 1138744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139358">SUSE bug 1139358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140945">SUSE bug 1140945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140965">SUSE bug 1140965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141401">SUSE bug 1141401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141402">SUSE bug 1141402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141452">SUSE bug 1141452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141453">SUSE bug 1141453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141454">SUSE bug 1141454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142023">SUSE bug 1142023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143045">SUSE bug 1143045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143179">SUSE bug 1143179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143189">SUSE bug 1143189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143191">SUSE bug 1143191</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-9289/">CVE-2015-9289 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9289">CVE-2015-9289 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20855/">CVE-2018-20855 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20855">CVE-2018-20855 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1125/">CVE-2019-1125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1125">CVE-2019-1125 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11810/">CVE-2019-11810 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11810">CVE-2019-11810 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13631/">CVE-2019-13631 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13631">CVE-2019-13631 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14283/">CVE-2019-14283 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14283">CVE-2019-14283 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14284/">CVE-2019-14284 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14284">CVE-2019-14284 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583598" comment="kernel-bigmem-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583599" comment="kernel-bigmem-base-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583601" comment="kernel-default-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583602" comment="kernel-default-base-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583604" comment="kernel-default-man-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583605" comment="kernel-ec2-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583606" comment="kernel-ec2-base-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583608" comment="kernel-pae-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583609" comment="kernel-pae-base-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583611" comment="kernel-ppc64-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583612" comment="kernel-ppc64-base-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583614" comment="kernel-source-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583615" comment="kernel-syms-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583616" comment="kernel-trace-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583617" comment="kernel-trace-base-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583619" comment="kernel-xen-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583620" comment="kernel-xen-base-3.0.101-108.101.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220062" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1101061" ref_url="https://bugzilla.suse.com/1101061" source="BUGZILLA"/>
		<reference ref_id="1113201" ref_url="https://bugzilla.suse.com/1113201" source="BUGZILLA"/>
		<reference ref_id="1117665" ref_url="https://bugzilla.suse.com/1117665" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1143327" ref_url="https://bugzilla.suse.com/1143327" source="BUGZILLA"/>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1145477" ref_url="https://bugzilla.suse.com/1145477" source="BUGZILLA"/>
		<reference ref_id="1145922" ref_url="https://bugzilla.suse.com/1145922" source="BUGZILLA"/>
		<reference ref_id="1146163" ref_url="https://bugzilla.suse.com/1146163" source="BUGZILLA"/>
		<reference ref_id="1146285" ref_url="https://bugzilla.suse.com/1146285" source="BUGZILLA"/>
		<reference ref_id="1146361" ref_url="https://bugzilla.suse.com/1146361" source="BUGZILLA"/>
		<reference ref_id="1146391" ref_url="https://bugzilla.suse.com/1146391" source="BUGZILLA"/>
		<reference ref_id="1146524" ref_url="https://bugzilla.suse.com/1146524" source="BUGZILLA"/>
		<reference ref_id="1146540" ref_url="https://bugzilla.suse.com/1146540" source="BUGZILLA"/>
		<reference ref_id="1146547" ref_url="https://bugzilla.suse.com/1146547" source="BUGZILLA"/>
		<reference ref_id="1146678" ref_url="https://bugzilla.suse.com/1146678" source="BUGZILLA"/>
		<reference ref_id="1147122" ref_url="https://bugzilla.suse.com/1147122" source="BUGZILLA"/>
		<reference ref_id="1148938" ref_url="https://bugzilla.suse.com/1148938" source="BUGZILLA"/>
		<reference ref_id="1149376" ref_url="https://bugzilla.suse.com/1149376" source="BUGZILLA"/>
		<reference ref_id="1149522" ref_url="https://bugzilla.suse.com/1149522" source="BUGZILLA"/>
		<reference ref_id="1150025" ref_url="https://bugzilla.suse.com/1150025" source="BUGZILLA"/>
		<reference ref_id="1150112" ref_url="https://bugzilla.suse.com/1150112" source="BUGZILLA"/>
		<reference ref_id="1150452" ref_url="https://bugzilla.suse.com/1150452" source="BUGZILLA"/>
		<reference ref_id="1150457" ref_url="https://bugzilla.suse.com/1150457" source="BUGZILLA"/>
		<reference ref_id="1150465" ref_url="https://bugzilla.suse.com/1150465" source="BUGZILLA"/>
		<reference ref_id="1150599" ref_url="https://bugzilla.suse.com/1150599" source="BUGZILLA"/>
		<reference ref_id="1151347" ref_url="https://bugzilla.suse.com/1151347" source="BUGZILLA"/>
		<reference ref_id="1151350" ref_url="https://bugzilla.suse.com/1151350" source="BUGZILLA"/>
		<reference ref_id="1152779" ref_url="https://bugzilla.suse.com/1152779" source="BUGZILLA"/>
		<reference ref_id="1152782" ref_url="https://bugzilla.suse.com/1152782" source="BUGZILLA"/>
		<reference ref_id="1152786" ref_url="https://bugzilla.suse.com/1152786" source="BUGZILLA"/>
		<reference ref_id="1152789" ref_url="https://bugzilla.suse.com/1152789" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1155671" ref_url="https://bugzilla.suse.com/1155671" source="BUGZILLA"/>
		<reference ref_id="802154" ref_url="https://bugzilla.suse.com/802154" source="BUGZILLA"/>
		<reference ref_id="936875" ref_url="https://bugzilla.suse.com/936875" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18509" ref_url="https://www.suse.com/security/cve/CVE-2017-18509/" source="CVE"/>
		<reference ref_id="CVE-2017-18551" ref_url="https://www.suse.com/security/cve/CVE-2017-18551/" source="CVE"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2018-20976" ref_url="https://www.suse.com/security/cve/CVE-2018-20976/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-14821" ref_url="https://www.suse.com/security/cve/CVE-2019-14821/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="CVE-2019-15118" ref_url="https://www.suse.com/security/cve/CVE-2019-15118/" source="CVE"/>
		<reference ref_id="CVE-2019-15212" ref_url="https://www.suse.com/security/cve/CVE-2019-15212/" source="CVE"/>
		<reference ref_id="CVE-2019-15216" ref_url="https://www.suse.com/security/cve/CVE-2019-15216/" source="CVE"/>
		<reference ref_id="CVE-2019-15217" ref_url="https://www.suse.com/security/cve/CVE-2019-15217/" source="CVE"/>
		<reference ref_id="CVE-2019-15219" ref_url="https://www.suse.com/security/cve/CVE-2019-15219/" source="CVE"/>
		<reference ref_id="CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291/" source="CVE"/>
		<reference ref_id="CVE-2019-15292" ref_url="https://www.suse.com/security/cve/CVE-2019-15292/" source="CVE"/>
		<reference ref_id="CVE-2019-15505" ref_url="https://www.suse.com/security/cve/CVE-2019-15505/" source="CVE"/>
		<reference ref_id="CVE-2019-15807" ref_url="https://www.suse.com/security/cve/CVE-2019-15807/" source="CVE"/>
		<reference ref_id="CVE-2019-15902" ref_url="https://www.suse.com/security/cve/CVE-2019-15902/" source="CVE"/>
		<reference ref_id="CVE-2019-15927" ref_url="https://www.suse.com/security/cve/CVE-2019-15927/" source="CVE"/>
		<reference ref_id="CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232/" source="CVE"/>
		<reference ref_id="CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233/" source="CVE"/>
		<reference ref_id="CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234/" source="CVE"/>
		<reference ref_id="CVE-2019-16413" ref_url="https://www.suse.com/security/cve/CVE-2019-16413/" source="CVE"/>
		<reference ref_id="CVE-2019-17052" ref_url="https://www.suse.com/security/cve/CVE-2019-17052/" source="CVE"/>
		<reference ref_id="CVE-2019-17053" ref_url="https://www.suse.com/security/cve/CVE-2019-17053/" source="CVE"/>
		<reference ref_id="CVE-2019-17054" ref_url="https://www.suse.com/security/cve/CVE-2019-17054/" source="CVE"/>
		<reference ref_id="CVE-2019-17055" ref_url="https://www.suse.com/security/cve/CVE-2019-17055/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="CVE-2019-9456" ref_url="https://www.suse.com/security/cve/CVE-2019-9456/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11-SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with
  Transactional Memory support could be used to facilitate sidechannel
  information leaks out of microarchitectural buffers, similar to the
  previously described 'Microarchitectural Data Sampling' attack.

  The Linux kernel was supplemented with the option to disable TSX operation
  altogether (requiring CPU Microcode updates on older systems) and better
  flushing of microarchitectural buffers (VERW).

  The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7023735

- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race
  condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine
  Exception during Page Size Change, causing the CPU core to be non-functional.

  The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in
  executable pages by splitting / merging huge pages into small pages as
  needed. More information can be found on https://www.suse.com/support/kb/doc/?id=7024251

- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the
  alloc_workqueue return value, leading to a NULL pointer dereference.
  (bsc#1150457).
- CVE-2019-10220: Added sanity checks on the pathnames passed to the user
  space. (bsc#1144903).
- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return
  value, leading to a NULL pointer dereference. (bsc#1150452).
- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell
  libertas driver (bsc#1150465).
- CVE-2019-17052: ax25_create in the AF_AX25 network module in the Linux kernel
  did not enforce CAP_NET_RAW, which meant that unprivileged users could create
  a raw socket, aka CID-0614e2b73768. (bnc#1152779)
- CVE-2019-17055: base_sock_create in the AF_ISDN network module in the Linux kernel
  did not enforce CAP_NET_RAW, which means that unprivileged users can create
  a raw socket,  aka CID-b91ee4aa2a21. (bnc#1152782)
- CVE-2019-17054: atalk_create in the AF_APPLETALK network module in the Linux kernel
  did not enforce CAP_NET_RAW, which means that unprivileged users can create
  a raw socket, aka CID-6cc03e8aa36c. (bnc#1152786)
- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,
  leading to a Buffer Overflow (bsc#1153158).
- CVE-2019-17053: ieee802154_create in the AF_IEEE802154 network module in the Linux kernel
  did not enforce CAP_NET_RAW, which means that unprivileged users could create
  a raw socket, aka CID-e69dbd4619e7. (bnc#1152789)
- CVE-2019-16413: The 9p filesystem did not protect i_size_write() properly, which caused an
  i_size_read() infinite loop and denial of service on SMP systems. (bnc#1151347)
- CVE-2019-15291: There was a NULL pointer dereference caused by a malicious USB device in the
  flexcop_usb_probe function. (bnc#1146540)
- CVE-2019-15807: There was a memory leak in the SAS expander driver when SAS expander discovery
  fails. This could cause a denial of service. (bnc#1148938)
- CVE-2019-14821: An out-of-bounds access issue was found in the way Linux the kernel's KVM hypervisor
  implemented the Coalesced MMIO write operation. It operated on an MMIO ring buffer
  'struct kvm_coalesced_mmio' object, wherein write indices value could be supplied by a
   host user-space process. An unprivileged host user or process with access to '/dev/kvm'
  device could use this flaw to crash the host kernel, resulting in a denial of service
  or potentially escalating privileges on the system. (bnc#1151350)
- CVE-2019-15505: The Linux kernel had an out-of-bounds read via crafted USB device traffic
  (which may have been remote via usbip or usbredir). (bnc#1147122)
- CVE-2019-14835: A buffer overflow flaw was found in the way Linux kernel's vhost functionality
  that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A
  privileged guest user able to pass descriptors with invalid length to the host when migration
  is underway, could have used this flaw to increase their privileges on the host. (bnc#1150112)
- CVE-2019-15216: There was a NULL pointer dereference caused by a malicious USB device in the
  drivers/usb/misc/yurex.c driver. (bnc#1146361)
- CVE-2019-9456: In the Android kernel in Pixel C USB monitor driver there was a possible
  OOB write due to a missing bounds check. This could lead to local escalation of privilege
  with System execution privileges needed. User interaction was not needed for exploitation. (bnc#1150025)
- CVE-2019-15927: An out-of-bounds access existed in the function build_audio_procunit in the
  file sound/usb/mixer.c. (bnc#1149522)
- CVE-2019-15902:  Misuse of the upstream 'x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()'
  commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the
  backport process depends on cherry picking specific commits, and because two (correctly ordered)\
  code lines were swapped. (bnc#1149376)
- CVE-2019-15219: There was a NULL pointer dereference caused by a malicious USB device in the
  drivers/usb/misc/sisusbvga/sisusb.c driver. (bnc#1146524)
- CVE-2017-18509: An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel By setting a specific
  socket option, an attacker could control a pointer in kernel land and cause an inet_csk_listen_stop
  general protection fault, or potentially execute arbitrary code under certain circumstances. The issue
  could be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability)
  or after namespace unsharing. This occurred because sk_type and protocol were not checked in the
  appropriate part of the ip6_mroute_* functions. (bnc#1145477)
- CVE-2019-15212: There was a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver. (bnc#1146391)
- CVE-2019-15292: There was a use-after-free in atalk_proc_exit. (bnc#1146678)
- CVE-2019-15217: There was a NULL pointer dereference caused by a malicious USB device in the
  drivers/media/usb/zr364xx/zr364xx.c driver. (bnc#1146547)
- CVE-2018-20976: A use after free was discovered in fs/xfs/xfs_super.c, related to xfs_fs_fill_super
  failure. (bnc#1146285)
- CVE-2017-18551: There was an out of bounds write in the function i2c_smbus_xfer_emulated. (bnc#1146163)
- CVE-2019-15118: check_input_term in sound/usb/mixer.c mishandled recursion, leading to kernel stack
  exhaustion. (bnc#1145922)

The following non-security bugs were fixed:

- add a missing lfence in kernel error entry and remove a superfluous lfence in userspace interrupt exit paths
- Documentation: Add ITLB_MULTIHIT documentation (bnc#1117665).
- array_index_nospec: Sanitize speculative array (bsc#1155671)
- cpu/speculation: Uninline and export CPU mitigations helpers (bnc#1117665).
- IB/core: Add mitigation for Spectre V1 (bsc#1155671)
- inet_diag: fix oops for IPv4 AF_INET6 TCP SYN-RECV state (bsc#1101061).
- kABI Fix for IFU Patches (bsc#1117665).
- kthread: Implement park/unpark facility (bsc#1117665).
- kvm: Convert kvm_lock to a mutex (bsc#1117665).
- kvm: MMU: drop read-only large sptes when creating lower level sptes (bsc#1117665).
- kvm: MMU: fast invalidate all pages (bsc1117665).
- kvm: VMX: export PFEC.P bit on ept (bsc#1117665).
- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).
- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).
- kvm: x86: mmu: Apply global mitigations knob to ITLB_MULTIHIT (bnc#1117665).
- mm/readahead.c: fix readahead failure for memoryless NUMA nodes and limit readahead pages (bsc#1143327).
- mm: use only per-device readahead limit (bsc#1143327).
- powerpc/64s: support nospectre_v2 cmdline option (bsc#1131107).
- powerpc/fsl: Add nospectre_v2 command line argument (bsc#1131107).
- powerpc/fsl: Update Spectre v2 reporting (bsc#1131107).
- powerpc/security: Show powerpc_security_features in debugfs (bsc#1131107).
- xfs: xfs_remove deadlocks due to inverted AGF vs AGI lock ordering (bsc#1150599).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-13"/>
	<updated date="2019-11-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101061">SUSE bug 1101061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113201">SUSE bug 1113201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117665">SUSE bug 1117665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143327">SUSE bug 1143327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145477">SUSE bug 1145477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145922">SUSE bug 1145922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146163">SUSE bug 1146163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146285">SUSE bug 1146285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146361">SUSE bug 1146361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146391">SUSE bug 1146391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146524">SUSE bug 1146524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146540">SUSE bug 1146540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146547">SUSE bug 1146547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146678">SUSE bug 1146678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147122">SUSE bug 1147122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148938">SUSE bug 1148938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149376">SUSE bug 1149376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149522">SUSE bug 1149522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150025">SUSE bug 1150025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150112">SUSE bug 1150112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150452">SUSE bug 1150452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150457">SUSE bug 1150457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150465">SUSE bug 1150465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150599">SUSE bug 1150599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151347">SUSE bug 1151347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151350">SUSE bug 1151350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152779">SUSE bug 1152779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152782">SUSE bug 1152782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152786">SUSE bug 1152786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152789">SUSE bug 1152789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155671">SUSE bug 1155671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802154">SUSE bug 802154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936875">SUSE bug 936875</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18509/">CVE-2017-18509 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18509">CVE-2017-18509 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-18551/">CVE-2017-18551 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18551">CVE-2017-18551 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12207">CVE-2018-12207 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20976/">CVE-2018-20976 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20976">CVE-2018-20976 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-14821/">CVE-2019-14821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14821">CVE-2019-14821 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15118/">CVE-2019-15118 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15118">CVE-2019-15118 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15212/">CVE-2019-15212 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15212">CVE-2019-15212 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15216/">CVE-2019-15216 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15216">CVE-2019-15216 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15217/">CVE-2019-15217 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15217">CVE-2019-15217 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15219/">CVE-2019-15219 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15219">CVE-2019-15219 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15291">CVE-2019-15291 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15292/">CVE-2019-15292 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15292">CVE-2019-15292 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15505/">CVE-2019-15505 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15505">CVE-2019-15505 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15807/">CVE-2019-15807 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15807">CVE-2019-15807 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15902/">CVE-2019-15902 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15902">CVE-2019-15902 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15927/">CVE-2019-15927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15927">CVE-2019-15927 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16232">CVE-2019-16232 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16233">CVE-2019-16233 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16234">CVE-2019-16234 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16413/">CVE-2019-16413 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-16413">CVE-2019-16413 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17052/">CVE-2019-17052 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17052">CVE-2019-17052 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17053/">CVE-2019-17053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-17053">CVE-2019-17053 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-17054/">CVE-2019-17054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-17054">CVE-2019-17054 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17055/">CVE-2019-17055 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17055">CVE-2019-17055 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9456/">CVE-2019-9456 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9456">CVE-2019-9456 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583622" comment="kernel-bigmem-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583623" comment="kernel-bigmem-base-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583625" comment="kernel-default-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583626" comment="kernel-default-base-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583628" comment="kernel-default-man-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583629" comment="kernel-ec2-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583630" comment="kernel-ec2-base-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583632" comment="kernel-pae-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583633" comment="kernel-pae-base-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583635" comment="kernel-ppc64-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583636" comment="kernel-ppc64-base-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583638" comment="kernel-source-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583639" comment="kernel-syms-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583640" comment="kernel-trace-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583641" comment="kernel-trace-base-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583643" comment="kernel-xen-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583644" comment="kernel-xen-base-3.0.101-108.108.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220063" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1091041" ref_url="https://bugzilla.suse.com/1091041" source="BUGZILLA"/>
		<reference ref_id="1105327" ref_url="https://bugzilla.suse.com/1105327" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1136471" ref_url="https://bugzilla.suse.com/1136471" source="BUGZILLA"/>
		<reference ref_id="1136922" ref_url="https://bugzilla.suse.com/1136922" source="BUGZILLA"/>
		<reference ref_id="1146519" ref_url="https://bugzilla.suse.com/1146519" source="BUGZILLA"/>
		<reference ref_id="1146544" ref_url="https://bugzilla.suse.com/1146544" source="BUGZILLA"/>
		<reference ref_id="1146612" ref_url="https://bugzilla.suse.com/1146612" source="BUGZILLA"/>
		<reference ref_id="1148871" ref_url="https://bugzilla.suse.com/1148871" source="BUGZILLA"/>
		<reference ref_id="1149448" ref_url="https://bugzilla.suse.com/1149448" source="BUGZILLA"/>
		<reference ref_id="1152631" ref_url="https://bugzilla.suse.com/1152631" source="BUGZILLA"/>
		<reference ref_id="1156652" ref_url="https://bugzilla.suse.com/1156652" source="BUGZILLA"/>
		<reference ref_id="1157038" ref_url="https://bugzilla.suse.com/1157038" source="BUGZILLA"/>
		<reference ref_id="1157070" ref_url="https://bugzilla.suse.com/1157070" source="BUGZILLA"/>
		<reference ref_id="1157143" ref_url="https://bugzilla.suse.com/1157143" source="BUGZILLA"/>
		<reference ref_id="1157155" ref_url="https://bugzilla.suse.com/1157155" source="BUGZILLA"/>
		<reference ref_id="1157157" ref_url="https://bugzilla.suse.com/1157157" source="BUGZILLA"/>
		<reference ref_id="1157303" ref_url="https://bugzilla.suse.com/1157303" source="BUGZILLA"/>
		<reference ref_id="1157344" ref_url="https://bugzilla.suse.com/1157344" source="BUGZILLA"/>
		<reference ref_id="1157678" ref_url="https://bugzilla.suse.com/1157678" source="BUGZILLA"/>
		<reference ref_id="1157804" ref_url="https://bugzilla.suse.com/1157804" source="BUGZILLA"/>
		<reference ref_id="1157923" ref_url="https://bugzilla.suse.com/1157923" source="BUGZILLA"/>
		<reference ref_id="1158381" ref_url="https://bugzilla.suse.com/1158381" source="BUGZILLA"/>
		<reference ref_id="1158410" ref_url="https://bugzilla.suse.com/1158410" source="BUGZILLA"/>
		<reference ref_id="1158413" ref_url="https://bugzilla.suse.com/1158413" source="BUGZILLA"/>
		<reference ref_id="1158427" ref_url="https://bugzilla.suse.com/1158427" source="BUGZILLA"/>
		<reference ref_id="1158445" ref_url="https://bugzilla.suse.com/1158445" source="BUGZILLA"/>
		<reference ref_id="1158823" ref_url="https://bugzilla.suse.com/1158823" source="BUGZILLA"/>
		<reference ref_id="1158824" ref_url="https://bugzilla.suse.com/1158824" source="BUGZILLA"/>
		<reference ref_id="1158834" ref_url="https://bugzilla.suse.com/1158834" source="BUGZILLA"/>
		<reference ref_id="1158900" ref_url="https://bugzilla.suse.com/1158900" source="BUGZILLA"/>
		<reference ref_id="1158904" ref_url="https://bugzilla.suse.com/1158904" source="BUGZILLA"/>
		<reference ref_id="1159285" ref_url="https://bugzilla.suse.com/1159285" source="BUGZILLA"/>
		<reference ref_id="1159841" ref_url="https://bugzilla.suse.com/1159841" source="BUGZILLA"/>
		<reference ref_id="1159908" ref_url="https://bugzilla.suse.com/1159908" source="BUGZILLA"/>
		<reference ref_id="1159911" ref_url="https://bugzilla.suse.com/1159911" source="BUGZILLA"/>
		<reference ref_id="1161358" ref_url="https://bugzilla.suse.com/1161358" source="BUGZILLA"/>
		<reference ref_id="1162928" ref_url="https://bugzilla.suse.com/1162928" source="BUGZILLA"/>
		<reference ref_id="1162929" ref_url="https://bugzilla.suse.com/1162929" source="BUGZILLA"/>
		<reference ref_id="1162931" ref_url="https://bugzilla.suse.com/1162931" source="BUGZILLA"/>
		<reference ref_id="1164078" ref_url="https://bugzilla.suse.com/1164078" source="BUGZILLA"/>
		<reference ref_id="1165111" ref_url="https://bugzilla.suse.com/1165111" source="BUGZILLA"/>
		<reference ref_id="1165985" ref_url="https://bugzilla.suse.com/1165985" source="BUGZILLA"/>
		<reference ref_id="1167629" ref_url="https://bugzilla.suse.com/1167629" source="BUGZILLA"/>
		<reference ref_id="1168075" ref_url="https://bugzilla.suse.com/1168075" source="BUGZILLA"/>
		<reference ref_id="1168829" ref_url="https://bugzilla.suse.com/1168829" source="BUGZILLA"/>
		<reference ref_id="1168854" ref_url="https://bugzilla.suse.com/1168854" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12456" ref_url="https://www.suse.com/security/cve/CVE-2019-12456/" source="CVE"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="CVE-2019-15213" ref_url="https://www.suse.com/security/cve/CVE-2019-15213/" source="CVE"/>
		<reference ref_id="CVE-2019-15916" ref_url="https://www.suse.com/security/cve/CVE-2019-15916/" source="CVE"/>
		<reference ref_id="CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660/" source="CVE"/>
		<reference ref_id="CVE-2019-18675" ref_url="https://www.suse.com/security/cve/CVE-2019-18675/" source="CVE"/>
		<reference ref_id="CVE-2019-19066" ref_url="https://www.suse.com/security/cve/CVE-2019-19066/" source="CVE"/>
		<reference ref_id="CVE-2019-19073" ref_url="https://www.suse.com/security/cve/CVE-2019-19073/" source="CVE"/>
		<reference ref_id="CVE-2019-19074" ref_url="https://www.suse.com/security/cve/CVE-2019-19074/" source="CVE"/>
		<reference ref_id="CVE-2019-19227" ref_url="https://www.suse.com/security/cve/CVE-2019-19227/" source="CVE"/>
		<reference ref_id="CVE-2019-19523" ref_url="https://www.suse.com/security/cve/CVE-2019-19523/" source="CVE"/>
		<reference ref_id="CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524/" source="CVE"/>
		<reference ref_id="CVE-2019-19527" ref_url="https://www.suse.com/security/cve/CVE-2019-19527/" source="CVE"/>
		<reference ref_id="CVE-2019-19530" ref_url="https://www.suse.com/security/cve/CVE-2019-19530/" source="CVE"/>
		<reference ref_id="CVE-2019-19531" ref_url="https://www.suse.com/security/cve/CVE-2019-19531/" source="CVE"/>
		<reference ref_id="CVE-2019-19532" ref_url="https://www.suse.com/security/cve/CVE-2019-19532/" source="CVE"/>
		<reference ref_id="CVE-2019-19537" ref_url="https://www.suse.com/security/cve/CVE-2019-19537/" source="CVE"/>
		<reference ref_id="CVE-2019-19768" ref_url="https://www.suse.com/security/cve/CVE-2019-19768/" source="CVE"/>
		<reference ref_id="CVE-2019-19965" ref_url="https://www.suse.com/security/cve/CVE-2019-19965/" source="CVE"/>
		<reference ref_id="CVE-2019-19966" ref_url="https://www.suse.com/security/cve/CVE-2019-19966/" source="CVE"/>
		<reference ref_id="CVE-2019-20096" ref_url="https://www.suse.com/security/cve/CVE-2019-20096/" source="CVE"/>
		<reference ref_id="CVE-2020-10942" ref_url="https://www.suse.com/security/cve/CVE-2020-10942/" source="CVE"/>
		<reference ref_id="CVE-2020-11608" ref_url="https://www.suse.com/security/cve/CVE-2020-11608/" source="CVE"/>
		<reference ref_id="CVE-2020-8647" ref_url="https://www.suse.com/security/cve/CVE-2020-8647/" source="CVE"/>
		<reference ref_id="CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648/" source="CVE"/>
		<reference ref_id="CVE-2020-8649" ref_url="https://www.suse.com/security/cve/CVE-2020-8649/" source="CVE"/>
		<reference ref_id="CVE-2020-9383" ref_url="https://www.suse.com/security/cve/CVE-2020-9383/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-10942: In get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls (bsc#1167629).
- CVE-2020-8647: There was a use-after-free vulnerability in the vc_do_resize function in drivers/tty/vt/vt.c (bsc#1162929).
- CVE-2020-8649: There was a use-after-free vulnerability in the vgacon_invert_region function in drivers/video/console/vgacon.c (bsc#1162931).
- CVE-2020-9383: An issue was discovered set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it (bsc#1165111).
- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bsc#1159285).
- CVE-2020-11608: Fixed a NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints (bsc#1168829).
- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bsc#1162928).
- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in Marvell WiFi chip driver. A remote attacker could cause a denial of service or possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the Marvell WiFi chip driver. An attacker is able to cause a denial of service or possibly execute arbitrary code, when a STA works in IBSS mode and connects to another STA (bsc#1157155).
- CVE-2019-18675: Fixed an Integer Overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allowed local users to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation (bsc#1157804).
- CVE-2019-19965: Fixed a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition (bsc#1159911).
- CVE-2019-19066: A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c allowed attackers to cause a denial of service by triggering bfa_port_get_stats() failures (bsc#1157303).
- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service (bsc#1159908).
- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service (bsc#1159841).
- CVE-2019-19532: Fixed multiple out-of-bounds write bugs that can be caused by a malicious USB device (bsc#1158824).
- CVE-2019-19523: Fixed a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (bsc#115882).
- CVE-2019-19537: Fixed a race condition that can be caused by a malicious USB device in the USB character device driver layer (bsc#1158904).
- CVE-2019-19527, CVE-2019-19530, CVE-2019-19524: Fixed multiple use-after-free bug that could be caused by a malicious USB device (bsc#1158381, bsc#1158834, bsc#1158900).
- CVE-2019-15213: Fixed a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver (bsc#1146544).
- CVE-2019-19531: Fixed a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver (bsc#1158445).
- CVE-2019-18660: The Linux kernel on powerpc allowed Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs (bsc#1157038).
- CVE-2019-19227: Fixed a potential NULL pointer dereference in the AppleTalk subsystem (bsc#1157678).
- CVE-2019-19074: Fixed a memory leak in the ath9k_wmi_cmd(), which allowed attackers to cause a denial of service (bsc#1157143).
- CVE-2019-19073: Fixed multiple memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c, which allowed attackers to cause a denial of service (bsc#1157070).
- CVE-2019-15916: Fixed a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which could cause denial of service (bsc#1149448).
- CVE-2019-12456: Fixed a denial of service in _ctl_ioctl_main, which could be triggered by a local user (bsc#1136922).

The following non-security bugs were fixed:

- Input: add safety guards to input_set_keycode() (bsc#1168075).
- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).
- blktrace: fix dereference after null check (bsc#1159285).
- blktrace: fix trace mutex deadlock (bsc#1159285).
- block: Fix oops scsi_disk_get() (bsc#1105327).
- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).
- kaiser: Fix for 32bit KAISER implementations (bsc#1157344).
- klist: fix starting point removed bug in klist iterators (bsc#1156652).
- kobject: Export kobject_get_unless_zero() (bsc#1105327).
- kobject: fix kset_find_obj() race with concurrent last kobject_put() (bsc#1105327).
- kref: minor cleanup (bsc#1105327).
- media: ov519: add missing endpoint sanity checks (bsc#1168829).
- media: stv06xx: add missing descriptor sanity checks (bsc#1168854).
- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).
- powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).
- powerpc/pseries/mobility: notify network peers after migration (bsc#1152631 ltc#181798).
- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).
- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).
- rpm/kernel-binary.spec.in: Replace Novell with SUSE
- sched: Fix race between task_group and sched_task_group (bsc#1136471).
- sched: Remove lockdep check in sched_move_task() (bsc#1136471).
- scsi: lpfc: Fix driver crash in target reset handler (bsc#1148871).
- writeback: fix race that cause writeback hung (bsc#1161358).
- x86: fix speculation bug reporting (bsc#1012382).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-30"/>
	<updated date="2020-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091041">SUSE bug 1091041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105327">SUSE bug 1105327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136471">SUSE bug 1136471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136922">SUSE bug 1136922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146544">SUSE bug 1146544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146612">SUSE bug 1146612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148871">SUSE bug 1148871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149448">SUSE bug 1149448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152631">SUSE bug 1152631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156652">SUSE bug 1156652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157038">SUSE bug 1157038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157070">SUSE bug 1157070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157143">SUSE bug 1157143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157155">SUSE bug 1157155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157157">SUSE bug 1157157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157303">SUSE bug 1157303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157344">SUSE bug 1157344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157678">SUSE bug 1157678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157804">SUSE bug 1157804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157923">SUSE bug 1157923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158410">SUSE bug 1158410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158413">SUSE bug 1158413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158427">SUSE bug 1158427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158445">SUSE bug 1158445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158823">SUSE bug 1158823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158824">SUSE bug 1158824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158900">SUSE bug 1158900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158904">SUSE bug 1158904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159285">SUSE bug 1159285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159841">SUSE bug 1159841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159908">SUSE bug 1159908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159911">SUSE bug 1159911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161358">SUSE bug 1161358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162928">SUSE bug 1162928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162929">SUSE bug 1162929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162931">SUSE bug 1162931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164078">SUSE bug 1164078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165111">SUSE bug 1165111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165985">SUSE bug 1165985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167629">SUSE bug 1167629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168075">SUSE bug 1168075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168829">SUSE bug 1168829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168854">SUSE bug 1168854</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12456/">CVE-2019-12456 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12456">CVE-2019-12456 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14896">CVE-2019-14896 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14897">CVE-2019-14897 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15213/">CVE-2019-15213 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15213">CVE-2019-15213 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15916/">CVE-2019-15916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15916">CVE-2019-15916 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18660">CVE-2019-18660 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18675/">CVE-2019-18675 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18675">CVE-2019-18675 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19066/">CVE-2019-19066 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19066">CVE-2019-19066 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19073/">CVE-2019-19073 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19073">CVE-2019-19073 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19074/">CVE-2019-19074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19074">CVE-2019-19074 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19227/">CVE-2019-19227 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19227">CVE-2019-19227 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19523/">CVE-2019-19523 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19523">CVE-2019-19523 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19524">CVE-2019-19524 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19527/">CVE-2019-19527 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19527">CVE-2019-19527 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19530/">CVE-2019-19530 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19530">CVE-2019-19530 at NVD</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19531/">CVE-2019-19531 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19531">CVE-2019-19531 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19532/">CVE-2019-19532 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19532">CVE-2019-19532 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19537/">CVE-2019-19537 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19537">CVE-2019-19537 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19768/">CVE-2019-19768 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19768">CVE-2019-19768 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19965/">CVE-2019-19965 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19965">CVE-2019-19965 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19966/">CVE-2019-19966 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19966">CVE-2019-19966 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20096/">CVE-2019-20096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20096">CVE-2019-20096 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10942/">CVE-2020-10942 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10942">CVE-2020-10942 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11608/">CVE-2020-11608 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11608">CVE-2020-11608 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8647/">CVE-2020-8647 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8647">CVE-2020-8647 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8648">CVE-2020-8648 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8649/">CVE-2020-8649 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8649">CVE-2020-8649 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9383/">CVE-2020-9383 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9383">CVE-2020-9383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583646" comment="kernel-bigmem-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583647" comment="kernel-bigmem-base-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583649" comment="kernel-default-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583650" comment="kernel-default-base-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583652" comment="kernel-default-man-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583653" comment="kernel-ec2-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583654" comment="kernel-ec2-base-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583656" comment="kernel-pae-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583657" comment="kernel-pae-base-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583659" comment="kernel-ppc64-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583660" comment="kernel-ppc64-base-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583662" comment="kernel-source-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583663" comment="kernel-syms-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583664" comment="kernel-trace-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583665" comment="kernel-trace-base-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583667" comment="kernel-xen-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583668" comment="kernel-xen-base-3.0.101-108.111.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220064" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1154290" ref_url="https://bugzilla.suse.com/1154290" source="BUGZILLA"/>
		<reference ref_id="1154824" ref_url="https://bugzilla.suse.com/1154824" source="BUGZILLA"/>
		<reference ref_id="1164871" ref_url="https://bugzilla.suse.com/1164871" source="BUGZILLA"/>
		<reference ref_id="1170056" ref_url="https://bugzilla.suse.com/1170056" source="BUGZILLA"/>
		<reference ref_id="1171195" ref_url="https://bugzilla.suse.com/1171195" source="BUGZILLA"/>
		<reference ref_id="1171202" ref_url="https://bugzilla.suse.com/1171202" source="BUGZILLA"/>
		<reference ref_id="1171218" ref_url="https://bugzilla.suse.com/1171218" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-10690" ref_url="https://www.suse.com/security/cve/CVE-2020-10690/" source="CVE"/>
		<reference ref_id="CVE-2020-12652" ref_url="https://www.suse.com/security/cve/CVE-2020-12652/" source="CVE"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006913.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it. 
  This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).

The following non-security bugs were fixed:

- nfsd4: clean up open owners on OPEN failure (bsc#1154290).
- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-09"/>
	<updated date="2020-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154290">SUSE bug 1154290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164871">SUSE bug 1164871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170056">SUSE bug 1170056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171195">SUSE bug 1171195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171202">SUSE bug 1171202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171218">SUSE bug 1171218</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10690/">CVE-2020-10690 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10690">CVE-2020-10690 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12652/">CVE-2020-12652 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12652">CVE-2020-12652 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12653">CVE-2020-12653 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12654">CVE-2020-12654 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583670" comment="kernel-bigmem-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583671" comment="kernel-bigmem-base-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583673" comment="kernel-default-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583674" comment="kernel-default-base-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583676" comment="kernel-default-man-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583677" comment="kernel-ec2-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583678" comment="kernel-ec2-base-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583680" comment="kernel-pae-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583681" comment="kernel-pae-base-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583683" comment="kernel-ppc64-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583684" comment="kernel-ppc64-base-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583686" comment="kernel-source-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583687" comment="kernel-syms-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583688" comment="kernel-trace-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583689" comment="kernel-trace-base-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583691" comment="kernel-xen-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583692" comment="kernel-xen-base-3.0.101-108.114.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220065" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1159912" ref_url="https://bugzilla.suse.com/1159912" source="BUGZILLA"/>
		<reference ref_id="1159913" ref_url="https://bugzilla.suse.com/1159913" source="BUGZILLA"/>
		<reference ref_id="1162002" ref_url="https://bugzilla.suse.com/1162002" source="BUGZILLA"/>
		<reference ref_id="1171218" ref_url="https://bugzilla.suse.com/1171218" source="BUGZILLA"/>
		<reference ref_id="1171219" ref_url="https://bugzilla.suse.com/1171219" source="BUGZILLA"/>
		<reference ref_id="1171220" ref_url="https://bugzilla.suse.com/1171220" source="BUGZILLA"/>
		<reference ref_id="1172775" ref_url="https://bugzilla.suse.com/1172775" source="BUGZILLA"/>
		<reference ref_id="1172999" ref_url="https://bugzilla.suse.com/1172999" source="BUGZILLA"/>
		<reference ref_id="1173265" ref_url="https://bugzilla.suse.com/1173265" source="BUGZILLA"/>
		<reference ref_id="1174462" ref_url="https://bugzilla.suse.com/1174462" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2020-0305" ref_url="https://www.suse.com/security/cve/CVE-2020-0305/" source="CVE"/>
		<reference ref_id="CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732/" source="CVE"/>
		<reference ref_id="CVE-2020-10769" ref_url="https://www.suse.com/security/cve/CVE-2020-10769/" source="CVE"/>
		<reference ref_id="CVE-2020-10773" ref_url="https://www.suse.com/security/cve/CVE-2020-10773/" source="CVE"/>
		<reference ref_id="CVE-2020-12652" ref_url="https://www.suse.com/security/cve/CVE-2020-12652/" source="CVE"/>
		<reference ref_id="CVE-2020-12656" ref_url="https://www.suse.com/security/cve/CVE-2020-12656/" source="CVE"/>
		<reference ref_id="CVE-2020-13974" ref_url="https://www.suse.com/security/cve/CVE-2020-13974/" source="CVE"/>
		<reference ref_id="CVE-2020-14416" ref_url="https://www.suse.com/security/cve/CVE-2020-14416/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).
- CVE-2020-14416: Fixed a race condition in tty-&gt;disc_data handling in the slip and slcan line discipline could lead to a use-after-free. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).
- CVE-2020-10732: A flaw was found in the implementation of Userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).
- CVE-2020-12656: Fixed a memory leak in gss_mech_free in the rpcsec_gss_krb5 implementation, caused by a lack of certain domain_release calls (bnc#1171219).
- CVE-2020-0305: Fixed a possible use-after-free due to a race condition incdev_get of char_dev.c. This could lead to local escalation of privilege. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).
- CVE-2020-12652: The __mptctl_ioctl function in drivers/message/fusion/mptctl.c allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a 'double fetch' vulnerability (bnc#1171218).
- CVE-2019-5108: Fixed a denial-of-service vulnerability in the wifi stack. An attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations before the required authentication process has completed (bnc#1159912).

The following non-security bugs were fixed:

- Fix gcc-discovered error in zeroing a struct (bnc#680814)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-03"/>
	<updated date="2020-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159912">SUSE bug 1159912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159913">SUSE bug 1159913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162002">SUSE bug 1162002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171218">SUSE bug 1171218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171219">SUSE bug 1171219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171220">SUSE bug 1171220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172775">SUSE bug 1172775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172999">SUSE bug 1172999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173265">SUSE bug 1173265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174462">SUSE bug 1174462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5108">CVE-2019-5108 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0305/">CVE-2020-0305 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0305">CVE-2020-0305 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10732">CVE-2020-10732 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10769/">CVE-2020-10769 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10769">CVE-2020-10769 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10773/">CVE-2020-10773 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10773">CVE-2020-10773 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12652/">CVE-2020-12652 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12652">CVE-2020-12652 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12656/">CVE-2020-12656 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12656">CVE-2020-12656 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13974/">CVE-2020-13974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13974">CVE-2020-13974 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14416/">CVE-2020-14416 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14416">CVE-2020-14416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583694" comment="kernel-bigmem-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583695" comment="kernel-bigmem-base-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583697" comment="kernel-default-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583698" comment="kernel-default-base-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583700" comment="kernel-default-man-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583701" comment="kernel-ec2-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583702" comment="kernel-ec2-base-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583704" comment="kernel-pae-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583705" comment="kernel-pae-base-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583707" comment="kernel-ppc64-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583708" comment="kernel-ppc64-base-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583710" comment="kernel-source-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583711" comment="kernel-syms-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583712" comment="kernel-trace-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583713" comment="kernel-trace-base-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583715" comment="kernel-xen-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583716" comment="kernel-xen-base-3.0.101-108.117.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220066" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1152107" ref_url="https://bugzilla.suse.com/1152107" source="BUGZILLA"/>
		<reference ref_id="1168952" ref_url="https://bugzilla.suse.com/1168952" source="BUGZILLA"/>
		<reference ref_id="1173659" ref_url="https://bugzilla.suse.com/1173659" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1174205" ref_url="https://bugzilla.suse.com/1174205" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="1174993" ref_url="https://bugzilla.suse.com/1174993" source="BUGZILLA"/>
		<reference ref_id="1175691" ref_url="https://bugzilla.suse.com/1175691" source="BUGZILLA"/>
		<reference ref_id="1176011" ref_url="https://bugzilla.suse.com/1176011" source="BUGZILLA"/>
		<reference ref_id="1176012" ref_url="https://bugzilla.suse.com/1176012" source="BUGZILLA"/>
		<reference ref_id="1176235" ref_url="https://bugzilla.suse.com/1176235" source="BUGZILLA"/>
		<reference ref_id="1176253" ref_url="https://bugzilla.suse.com/1176253" source="BUGZILLA"/>
		<reference ref_id="1176278" ref_url="https://bugzilla.suse.com/1176278" source="BUGZILLA"/>
		<reference ref_id="1176395" ref_url="https://bugzilla.suse.com/1176395" source="BUGZILLA"/>
		<reference ref_id="1176423" ref_url="https://bugzilla.suse.com/1176423" source="BUGZILLA"/>
		<reference ref_id="1176482" ref_url="https://bugzilla.suse.com/1176482" source="BUGZILLA"/>
		<reference ref_id="1176485" ref_url="https://bugzilla.suse.com/1176485" source="BUGZILLA"/>
		<reference ref_id="1176722" ref_url="https://bugzilla.suse.com/1176722" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1177206" ref_url="https://bugzilla.suse.com/1177206" source="BUGZILLA"/>
		<reference ref_id="1177226" ref_url="https://bugzilla.suse.com/1177226" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1177766" ref_url="https://bugzilla.suse.com/1177766" source="BUGZILLA"/>
		<reference ref_id="1177906" ref_url="https://bugzilla.suse.com/1177906" source="BUGZILLA"/>
		<reference ref_id="1178123" ref_url="https://bugzilla.suse.com/1178123" source="BUGZILLA"/>
		<reference ref_id="1178182" ref_url="https://bugzilla.suse.com/1178182" source="BUGZILLA"/>
		<reference ref_id="1178589" ref_url="https://bugzilla.suse.com/1178589" source="BUGZILLA"/>
		<reference ref_id="1178590" ref_url="https://bugzilla.suse.com/1178590" source="BUGZILLA"/>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178886" ref_url="https://bugzilla.suse.com/1178886" source="BUGZILLA"/>
		<reference ref_id="1179107" ref_url="https://bugzilla.suse.com/1179107" source="BUGZILLA"/>
		<reference ref_id="1179140" ref_url="https://bugzilla.suse.com/1179140" source="BUGZILLA"/>
		<reference ref_id="1179141" ref_url="https://bugzilla.suse.com/1179141" source="BUGZILLA"/>
		<reference ref_id="1179419" ref_url="https://bugzilla.suse.com/1179419" source="BUGZILLA"/>
		<reference ref_id="1179601" ref_url="https://bugzilla.suse.com/1179601" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1179745" ref_url="https://bugzilla.suse.com/1179745" source="BUGZILLA"/>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180029" ref_url="https://bugzilla.suse.com/1180029" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180052" ref_url="https://bugzilla.suse.com/1180052" source="BUGZILLA"/>
		<reference ref_id="1180086" ref_url="https://bugzilla.suse.com/1180086" source="BUGZILLA"/>
		<reference ref_id="1180559" ref_url="https://bugzilla.suse.com/1180559" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="1181158" ref_url="https://bugzilla.suse.com/1181158" source="BUGZILLA"/>
		<reference ref_id="1181166" ref_url="https://bugzilla.suse.com/1181166" source="BUGZILLA"/>
		<reference ref_id="1181349" ref_url="https://bugzilla.suse.com/1181349" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2020-0404" ref_url="https://www.suse.com/security/cve/CVE-2020-0404/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-14353" ref_url="https://www.suse.com/security/cve/CVE-2020-14353/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14390" ref_url="https://www.suse.com/security/cve/CVE-2020-14390/" source="CVE"/>
		<reference ref_id="CVE-2020-15436" ref_url="https://www.suse.com/security/cve/CVE-2020-15436/" source="CVE"/>
		<reference ref_id="CVE-2020-15437" ref_url="https://www.suse.com/security/cve/CVE-2020-15437/" source="CVE"/>
		<reference ref_id="CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211/" source="CVE"/>
		<reference ref_id="CVE-2020-25284" ref_url="https://www.suse.com/security/cve/CVE-2020-25284/" source="CVE"/>
		<reference ref_id="CVE-2020-25285" ref_url="https://www.suse.com/security/cve/CVE-2020-25285/" source="CVE"/>
		<reference ref_id="CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643/" source="CVE"/>
		<reference ref_id="CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656/" source="CVE"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25669" ref_url="https://www.suse.com/security/cve/CVE-2020-25669/" source="CVE"/>
		<reference ref_id="CVE-2020-27068" ref_url="https://www.suse.com/security/cve/CVE-2020-27068/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28915" ref_url="https://www.suse.com/security/cve/CVE-2020-28915/" source="CVE"/>
		<reference ref_id="CVE-2020-28974" ref_url="https://www.suse.com/security/cve/CVE-2020-28974/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="CVE-2020-4788" ref_url="https://www.suse.com/security/cve/CVE-2020-4788/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:


- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).
- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).
- CVE-2020-14353: Fixed an issue where keys - for keyctl prevent creating a different user's keyrings (bsc#1174993).
- CVE-2020-14381: Fixed requeue paths such that filp was valid when dropping the references (bsc#1176011).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-25285: A race condition between hugetlb sysctl handlers in mm/hugetlb.c could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact (bnc#1176485 ).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service (bsc#1179140).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).
- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).
- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed (bsc#1179663).
- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).

The following non-security bugs were fixed:

- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
- cifs: bugfix for unreclaimed writeback pages in cifs_writev_requeue() (bsc#1177906).
- mm, vmstat: reduce zone-&gt;lock holding time by /proc/pagetypeinfo (bsc#1175691).
- net/x25: fix a race in x25_bind() (bsc#1178590).
- net/x25: prevent a couple of overflows (bsc#1178590).
- tty: fix memleak in alloc_pid (bsc#1179745).
- xfs: mark all internal workqueues as freezable (bsc#1181166).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152107">SUSE bug 1152107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168952">SUSE bug 1168952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173659">SUSE bug 1173659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174205">SUSE bug 1174205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174993">SUSE bug 1174993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175691">SUSE bug 1175691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176011">SUSE bug 1176011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176012">SUSE bug 1176012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176235">SUSE bug 1176235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176253">SUSE bug 1176253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176278">SUSE bug 1176278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176395">SUSE bug 1176395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176423">SUSE bug 1176423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176482">SUSE bug 1176482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176485">SUSE bug 1176485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176722">SUSE bug 1176722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177206">SUSE bug 1177206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177226">SUSE bug 1177226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177766">SUSE bug 1177766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177906">SUSE bug 1177906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178123">SUSE bug 1178123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178182">SUSE bug 1178182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178589">SUSE bug 1178589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178590">SUSE bug 1178590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178886">SUSE bug 1178886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179140">SUSE bug 1179140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179141">SUSE bug 1179141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179601">SUSE bug 1179601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180029">SUSE bug 1180029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180052">SUSE bug 1180052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180086">SUSE bug 1180086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180559">SUSE bug 1180559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181158">SUSE bug 1181158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181166">SUSE bug 1181166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181349">SUSE bug 1181349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16746">CVE-2019-16746 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0404/">CVE-2020-0404 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0404">CVE-2020-0404 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0431">CVE-2020-0431 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0465">CVE-2020-0465 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14331">CVE-2020-14331 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14353/">CVE-2020-14353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-14353">CVE-2020-14353 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14381">CVE-2020-14381 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14390/">CVE-2020-14390 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14390">CVE-2020-14390 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15436/">CVE-2020-15436 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15436">CVE-2020-15436 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15437/">CVE-2020-15437 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15437">CVE-2020-15437 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25211">CVE-2020-25211 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25284/">CVE-2020-25284 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25284">CVE-2020-25284 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25285/">CVE-2020-25285 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25285">CVE-2020-25285 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25643">CVE-2020-25643 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25656">CVE-2020-25656 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25668">CVE-2020-25668 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25669/">CVE-2020-25669 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25669">CVE-2020-25669 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27068/">CVE-2020-27068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27068">CVE-2020-27068 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27777">CVE-2020-27777 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27786">CVE-2020-27786 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28915/">CVE-2020-28915 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28915">CVE-2020-28915 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28974/">CVE-2020-28974 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28974">CVE-2020-28974 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36158">CVE-2020-36158 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-4788/">CVE-2020-4788 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4788">CVE-2020-4788 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3347">CVE-2021-3347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583718" comment="kernel-bigmem-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583719" comment="kernel-bigmem-base-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583721" comment="kernel-default-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583722" comment="kernel-default-base-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583724" comment="kernel-default-man-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583725" comment="kernel-ec2-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583726" comment="kernel-ec2-base-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583728" comment="kernel-pae-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583729" comment="kernel-pae-base-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583731" comment="kernel-ppc64-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583732" comment="kernel-ppc64-base-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583734" comment="kernel-source-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583735" comment="kernel-syms-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583736" comment="kernel-trace-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583737" comment="kernel-trace-base-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583739" comment="kernel-xen-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583740" comment="kernel-xen-base-3.0.101-108.120.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220067" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1179745" ref_url="https://bugzilla.suse.com/1179745" source="BUGZILLA"/>
		<reference ref_id="1182505" ref_url="https://bugzilla.suse.com/1182505" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="SUSE-RU-2021:14663-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018202.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following non-security bug was fixed:

- Fixed a regression where KVM VM hangs caused by the fix CVE-2020-29660 and CVE-2020-29661 (bsc#1182505).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182505">SUSE bug 1182505</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594244" comment="kernel-bigmem-3.0.101-108.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594245" comment="kernel-bigmem-base-3.0.101-108.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594247" comment="kernel-default-3.0.101-108.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594248" comment="kernel-default-base-3.0.101-108.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594250" comment="kernel-default-man-3.0.101-108.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594251" comment="kernel-ec2-3.0.101-108.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594252" comment="kernel-ec2-base-3.0.101-108.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594254" comment="kernel-pae-3.0.101-108.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594255" comment="kernel-pae-base-3.0.101-108.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594257" comment="kernel-ppc64-3.0.101-108.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594258" comment="kernel-ppc64-base-3.0.101-108.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594260" comment="kernel-source-3.0.101-108.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594261" comment="kernel-syms-3.0.101-108.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594262" comment="kernel-trace-3.0.101-108.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594263" comment="kernel-trace-base-3.0.101-108.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594265" comment="kernel-xen-3.0.101-108.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594266" comment="kernel-xen-base-3.0.101-108.123.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220068" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1056134" ref_url="https://bugzilla.suse.com/1056134" source="BUGZILLA"/>
		<reference ref_id="1180963" ref_url="https://bugzilla.suse.com/1180963" source="BUGZILLA"/>
		<reference ref_id="1182715" ref_url="https://bugzilla.suse.com/1182715" source="BUGZILLA"/>
		<reference ref_id="1182716" ref_url="https://bugzilla.suse.com/1182716" source="BUGZILLA"/>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183400" ref_url="https://bugzilla.suse.com/1183400" source="BUGZILLA"/>
		<reference ref_id="1183696" ref_url="https://bugzilla.suse.com/1183696" source="BUGZILLA"/>
		<reference ref_id="1184120" ref_url="https://bugzilla.suse.com/1184120" source="BUGZILLA"/>
		<reference ref_id="1184194" ref_url="https://bugzilla.suse.com/1184194" source="BUGZILLA"/>
		<reference ref_id="1184198" ref_url="https://bugzilla.suse.com/1184198" source="BUGZILLA"/>
		<reference ref_id="1184208" ref_url="https://bugzilla.suse.com/1184208" source="BUGZILLA"/>
		<reference ref_id="1184211" ref_url="https://bugzilla.suse.com/1184211" source="BUGZILLA"/>
		<reference ref_id="1184393" ref_url="https://bugzilla.suse.com/1184393" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35519" ref_url="https://www.suse.com/security/cve/CVE-2020-35519/" source="CVE"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-20261" ref_url="https://www.suse.com/security/cve/CVE-2021-20261/" source="CVE"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="CVE-2021-28950" ref_url="https://www.suse.com/security/cve/CVE-2021-28950/" source="CVE"/>
		<reference ref_id="CVE-2021-28972" ref_url="https://www.suse.com/security/cve/CVE-2021-28972/" source="CVE"/>
		<reference ref_id="CVE-2021-29650" ref_url="https://www.suse.com/security/cve/CVE-2021-29650/" source="CVE"/>
		<reference ref_id="CVE-2021-30002" ref_url="https://www.suse.com/security/cve/CVE-2021-30002/" source="CVE"/>
		<reference ref_id="CVE-2021-3483" ref_url="https://www.suse.com/security/cve/CVE-2021-3483/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).
- CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy (bsc#1184120).
- CVE-2021-29650: Fixed an issue where the netfilter subsystem allowed attackers to cause a denial of service (bsc#1184208).
- CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198).
- CVE-2021-28950: Fixed an infinite loop because a retry loop continually finds the same bad inode (bsc#1184194).
- CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715).
- CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716).
- CVE-2021-20261: Fixed a race condition in the implementation of the floppy disk drive controller driver software (bsc#1183400).
- CVE-2020-36322: Fixed an issue in the FUSE filesystem implementation which could have caused a system crash (bsc#1184211).
- CVE-2020-35519: Fixed an out-of-bounds memory access  was found in x25_bind (bsc#1183696).

The following non-security bugs were fixed:

- md: md.c: Return -ENODEV when mddev is NULL in rdev_attr_show (bsc#1056134, bsc#1180963).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-12"/>
	<updated date="2021-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056134">SUSE bug 1056134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180963">SUSE bug 1180963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182715">SUSE bug 1182715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182716">SUSE bug 1182716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183400">SUSE bug 1183400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183696">SUSE bug 1183696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184120">SUSE bug 1184120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184194">SUSE bug 1184194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184198">SUSE bug 1184198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184208">SUSE bug 1184208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184211">SUSE bug 1184211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184393">SUSE bug 1184393</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35519/">CVE-2020-35519 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35519">CVE-2020-35519 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36322">CVE-2020-36322 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20261/">CVE-2021-20261 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20261">CVE-2021-20261 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28950/">CVE-2021-28950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28950">CVE-2021-28950 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28972/">CVE-2021-28972 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28972">CVE-2021-28972 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29650/">CVE-2021-29650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29650">CVE-2021-29650 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30002/">CVE-2021-30002 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30002">CVE-2021-30002 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3483/">CVE-2021-3483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3483">CVE-2021-3483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583742" comment="kernel-bigmem-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583743" comment="kernel-bigmem-base-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583745" comment="kernel-default-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583746" comment="kernel-default-base-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583748" comment="kernel-default-man-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583749" comment="kernel-ec2-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583750" comment="kernel-ec2-base-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583752" comment="kernel-pae-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583753" comment="kernel-pae-base-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583755" comment="kernel-ppc64-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583756" comment="kernel-ppc64-base-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583758" comment="kernel-source-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583759" comment="kernel-syms-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583760" comment="kernel-trace-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583761" comment="kernel-trace-base-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583763" comment="kernel-xen-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583764" comment="kernel-xen-base-3.0.101-108.126.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220069" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1184081" ref_url="https://bugzilla.suse.com/1184081" source="BUGZILLA"/>
		<reference ref_id="1184391" ref_url="https://bugzilla.suse.com/1184391" source="BUGZILLA"/>
		<reference ref_id="1184611" ref_url="https://bugzilla.suse.com/1184611" source="BUGZILLA"/>
		<reference ref_id="1185859" ref_url="https://bugzilla.suse.com/1185859" source="BUGZILLA"/>
		<reference ref_id="1185861" ref_url="https://bugzilla.suse.com/1185861" source="BUGZILLA"/>
		<reference ref_id="1185862" ref_url="https://bugzilla.suse.com/1185862" source="BUGZILLA"/>
		<reference ref_id="1185863" ref_url="https://bugzilla.suse.com/1185863" source="BUGZILLA"/>
		<reference ref_id="1186062" ref_url="https://bugzilla.suse.com/1186062" source="BUGZILLA"/>
		<reference ref_id="1187038" ref_url="https://bugzilla.suse.com/1187038" source="BUGZILLA"/>
		<reference ref_id="1187452" ref_url="https://bugzilla.suse.com/1187452" source="BUGZILLA"/>
		<reference ref_id="1187595" ref_url="https://bugzilla.suse.com/1187595" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24586" ref_url="https://www.suse.com/security/cve/CVE-2020-24586/" source="CVE"/>
		<reference ref_id="CVE-2020-24587" ref_url="https://www.suse.com/security/cve/CVE-2020-24587/" source="CVE"/>
		<reference ref_id="CVE-2020-24588" ref_url="https://www.suse.com/security/cve/CVE-2020-24588/" source="CVE"/>
		<reference ref_id="CVE-2020-26139" ref_url="https://www.suse.com/security/cve/CVE-2020-26139/" source="CVE"/>
		<reference ref_id="CVE-2020-36386" ref_url="https://www.suse.com/security/cve/CVE-2020-36386/" source="CVE"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-34693" ref_url="https://www.suse.com/security/cve/CVE-2021-34693/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-0512: Fixed a possible out of bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1187595)
- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)
- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)
- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861 bsc#1185863)
- CVE-2021-29154: Fixed an incorrect computation of branch displacements in the BPF JIT compilers, which could allow to execute arbitrary code within the kernel context. (bsc#1184391)
- CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c for removal of the HCI controller. (bsc#1184611)
- CVE-2020-24586: Fixed a bug that, under the right circumstances, allows to inject arbitrary network packets and/or exfiltrate user data when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP. (bsc#1185859 bsc#1185863)
- CVE-2020-26139: Fixed a bug that allows an Access Point (AP) to forward EAPOL frames to other clients even though the sender has not yet successfully authenticated. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients. (bsc#1185863 bsc#1186062)
- CVE-2020-24587: Fixed a bug that allows an adversary to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed. (bsc#1185862 bsc#1185863)

The following non-security bugs were fixed:

- md: do not flush workqueue unconditionally in md_open (bsc#1184081).
- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).
- md: md_open returns -EBUSY when entering racing area (bsc#1184081).
- md: split mddev_find (bsc#1184081).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-13"/>
	<updated date="2021-07-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184081">SUSE bug 1184081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184391">SUSE bug 1184391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185859">SUSE bug 1185859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185861">SUSE bug 1185861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185862">SUSE bug 1185862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185863">SUSE bug 1185863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186062">SUSE bug 1186062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187038">SUSE bug 1187038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187452">SUSE bug 1187452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187595">SUSE bug 1187595</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24586/">CVE-2020-24586 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24586">CVE-2020-24586 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24587/">CVE-2020-24587 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24587">CVE-2020-24587 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24588/">CVE-2020-24588 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24588">CVE-2020-24588 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26139/">CVE-2020-26139 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26139">CVE-2020-26139 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36386/">CVE-2020-36386 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36386">CVE-2020-36386 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0512">CVE-2021-0512 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32399">CVE-2021-32399 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34693/">CVE-2021-34693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34693">CVE-2021-34693 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624243" comment="kernel-bigmem-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624244" comment="kernel-bigmem-base-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624246" comment="kernel-default-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624247" comment="kernel-default-base-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624249" comment="kernel-default-man-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624250" comment="kernel-ec2-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624251" comment="kernel-ec2-base-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624253" comment="kernel-pae-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624254" comment="kernel-pae-base-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624256" comment="kernel-ppc64-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624257" comment="kernel-ppc64-base-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624259" comment="kernel-source-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624260" comment="kernel-syms-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624261" comment="kernel-trace-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624262" comment="kernel-trace-base-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624264" comment="kernel-xen-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624265" comment="kernel-xen-base-3.0.101-108.129.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220070" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1010470" ref_url="https://bugzilla.suse.com/1010470" source="BUGZILLA"/>
		<reference ref_id="1013018" ref_url="https://bugzilla.suse.com/1013018" source="BUGZILLA"/>
		<reference ref_id="1039348" ref_url="https://bugzilla.suse.com/1039348" source="BUGZILLA"/>
		<reference ref_id="1052943" ref_url="https://bugzilla.suse.com/1052943" source="BUGZILLA"/>
		<reference ref_id="1062568" ref_url="https://bugzilla.suse.com/1062568" source="BUGZILLA"/>
		<reference ref_id="1062840" ref_url="https://bugzilla.suse.com/1062840" source="BUGZILLA"/>
		<reference ref_id="1063416" ref_url="https://bugzilla.suse.com/1063416" source="BUGZILLA"/>
		<reference ref_id="1063516" ref_url="https://bugzilla.suse.com/1063516" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065999" ref_url="https://bugzilla.suse.com/1065999" source="BUGZILLA"/>
		<reference ref_id="1067118" ref_url="https://bugzilla.suse.com/1067118" source="BUGZILLA"/>
		<reference ref_id="1067912" ref_url="https://bugzilla.suse.com/1067912" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1072689" ref_url="https://bugzilla.suse.com/1072689" source="BUGZILLA"/>
		<reference ref_id="1072865" ref_url="https://bugzilla.suse.com/1072865" source="BUGZILLA"/>
		<reference ref_id="1075088" ref_url="https://bugzilla.suse.com/1075088" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1078669" ref_url="https://bugzilla.suse.com/1078669" source="BUGZILLA"/>
		<reference ref_id="1078672" ref_url="https://bugzilla.suse.com/1078672" source="BUGZILLA"/>
		<reference ref_id="1078673" ref_url="https://bugzilla.suse.com/1078673" source="BUGZILLA"/>
		<reference ref_id="1078674" ref_url="https://bugzilla.suse.com/1078674" source="BUGZILLA"/>
		<reference ref_id="1080464" ref_url="https://bugzilla.suse.com/1080464" source="BUGZILLA"/>
		<reference ref_id="1080757" ref_url="https://bugzilla.suse.com/1080757" source="BUGZILLA"/>
		<reference ref_id="1080813" ref_url="https://bugzilla.suse.com/1080813" source="BUGZILLA"/>
		<reference ref_id="1081358" ref_url="https://bugzilla.suse.com/1081358" source="BUGZILLA"/>
		<reference ref_id="1082091" ref_url="https://bugzilla.suse.com/1082091" source="BUGZILLA"/>
		<reference ref_id="1082424" ref_url="https://bugzilla.suse.com/1082424" source="BUGZILLA"/>
		<reference ref_id="1083242" ref_url="https://bugzilla.suse.com/1083242" source="BUGZILLA"/>
		<reference ref_id="1083275" ref_url="https://bugzilla.suse.com/1083275" source="BUGZILLA"/>
		<reference ref_id="1083483" ref_url="https://bugzilla.suse.com/1083483" source="BUGZILLA"/>
		<reference ref_id="1083494" ref_url="https://bugzilla.suse.com/1083494" source="BUGZILLA"/>
		<reference ref_id="1084536" ref_url="https://bugzilla.suse.com/1084536" source="BUGZILLA"/>
		<reference ref_id="1085113" ref_url="https://bugzilla.suse.com/1085113" source="BUGZILLA"/>
		<reference ref_id="1085279" ref_url="https://bugzilla.suse.com/1085279" source="BUGZILLA"/>
		<reference ref_id="1085331" ref_url="https://bugzilla.suse.com/1085331" source="BUGZILLA"/>
		<reference ref_id="1085513" ref_url="https://bugzilla.suse.com/1085513" source="BUGZILLA"/>
		<reference ref_id="1086162" ref_url="https://bugzilla.suse.com/1086162" source="BUGZILLA"/>
		<reference ref_id="1087092" ref_url="https://bugzilla.suse.com/1087092" source="BUGZILLA"/>
		<reference ref_id="1087260" ref_url="https://bugzilla.suse.com/1087260" source="BUGZILLA"/>
		<reference ref_id="1087762" ref_url="https://bugzilla.suse.com/1087762" source="BUGZILLA"/>
		<reference ref_id="1088147" ref_url="https://bugzilla.suse.com/1088147" source="BUGZILLA"/>
		<reference ref_id="1088260" ref_url="https://bugzilla.suse.com/1088260" source="BUGZILLA"/>
		<reference ref_id="1089608" ref_url="https://bugzilla.suse.com/1089608" source="BUGZILLA"/>
		<reference ref_id="909077" ref_url="https://bugzilla.suse.com/909077" source="BUGZILLA"/>
		<reference ref_id="940776" ref_url="https://bugzilla.suse.com/940776" source="BUGZILLA"/>
		<reference ref_id="943786" ref_url="https://bugzilla.suse.com/943786" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5156" ref_url="https://www.suse.com/security/cve/CVE-2015-5156/" source="CVE"/>
		<reference ref_id="CVE-2016-7915" ref_url="https://www.suse.com/security/cve/CVE-2016-7915/" source="CVE"/>
		<reference ref_id="CVE-2017-0861" ref_url="https://www.suse.com/security/cve/CVE-2017-0861/" source="CVE"/>
		<reference ref_id="CVE-2017-12190" ref_url="https://www.suse.com/security/cve/CVE-2017-12190/" source="CVE"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2017-16644" ref_url="https://www.suse.com/security/cve/CVE-2017-16644/" source="CVE"/>
		<reference ref_id="CVE-2017-16911" ref_url="https://www.suse.com/security/cve/CVE-2017-16911/" source="CVE"/>
		<reference ref_id="CVE-2017-16912" ref_url="https://www.suse.com/security/cve/CVE-2017-16912/" source="CVE"/>
		<reference ref_id="CVE-2017-16913" ref_url="https://www.suse.com/security/cve/CVE-2017-16913/" source="CVE"/>
		<reference ref_id="CVE-2017-16914" ref_url="https://www.suse.com/security/cve/CVE-2017-16914/" source="CVE"/>
		<reference ref_id="CVE-2017-18203" ref_url="https://www.suse.com/security/cve/CVE-2017-18203/" source="CVE"/>
		<reference ref_id="CVE-2017-18208" ref_url="https://www.suse.com/security/cve/CVE-2017-18208/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-10087" ref_url="https://www.suse.com/security/cve/CVE-2018-10087/" source="CVE"/>
		<reference ref_id="CVE-2018-6927" ref_url="https://www.suse.com/security/cve/CVE-2018-6927/" source="CVE"/>
		<reference ref_id="CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566/" source="CVE"/>
		<reference ref_id="CVE-2018-7757" ref_url="https://www.suse.com/security/cve/CVE-2018-7757/" source="CVE"/>
		<reference ref_id="CVE-2018-8822" ref_url="https://www.suse.com/security/cve/CVE-2018-8822/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003963.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032).

  Enhancements and bugfixes over the previous fixes have been added to this kernel.

- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might have allowed local users to cause a denial of service by triggering an attempted use of the -INT_MIN value (bnc#1089608).
- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1084536).
- CVE-2018-7566: There was a buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bnc#1083483).
- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem allowed attackers to gain privileges via unspecified vectors (bnc#1088260).
- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).
- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver. (bnc#1072865).
- CVE-2017-18203: The dm_get_from_kobject function in drivers/md/dm.c allowed local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices (bnc#1083242).
- CVE-2017-16911: The vhci_hcd driver allowed allows local attackers to disclose kernel memory addresses. Successful exploitation requires that a USB device is attached over IP (bnc#1078674).
- CVE-2017-18208: The madvise_willneed function in mm/madvise.c local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping (bnc#1083494).
- CVE-2017-16644: The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c allowed local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067118).
- CVE-2018-6927: The futex_requeue function in kernel/futex.c in the Linux kernel might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value (bnc#1080757).
- CVE-2017-16914: The 'stub_send_ret_submit()' function (drivers/usb/usbip/stub_tx.c) allowed attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet (bnc#1078669).
- CVE-2016-7915: The hid_input_field function in drivers/hid/hid-core.c allowed physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech DJ receiver (bnc#1010470).
- CVE-2015-5156: The virtnet_probe function in drivers/net/virtio_net.c attempted to support a FRAGLIST feature without proper memory allocation, which allowed guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets (bnc#940776).
- CVE-2017-12190: The bio_map_user_iov and bio_unmap_user functions in block/bio.c did unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition (bnc#1062568).
- CVE-2017-16912: The 'get_pipe()' function (drivers/usb/usbip/stub_rx.c) allowed attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet (bnc#1078673).
- CVE-2017-16913: The 'stub_recv_cmd_submit()' function (drivers/usb/usbip/stub_rx.c) when handling CMD_SUBMIT packets allowed attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet (bnc#1078672).

The following non-security bugs were fixed:

- af_iucv: enable control sends in case of SEND_SHUTDOWN (bnc#1085513, LTC#165135).
- cifs: fix buffer overflow in cifs_build_path_to_root() (bsc#1085113).
- drm/mgag200: fix a test in mga_vga_mode_valid() (bsc#1087092).
- hrtimer: Ensure POSIX compliance (relative CLOCK_REALTIME hrtimers) (bnc#1013018).
- hrtimer: Reset hrtimer cpu base proper on CPU hotplug (bnc#1013018).
- ide-cd: workaround VMware ESXi cdrom emulation bug (bsc#1080813).
- ipc/msg: introduce msgctl(MSG_STAT_ANY) (bsc#1072689).
- ipc/sem: introduce semctl(SEM_STAT_ANY) (bsc#1072689).
- ipc/shm: introduce shmctl(SHM_STAT_ANY) (bsc#1072689).
- jffs2: Fix use-after-free bug in jffs2_iget()'s error handling path (git-fixes).
- kabi: x86/kaiser: properly align trampoline stack.
- keys: do not let add_key() update an uninstantiated key (bnc#1063416).
- keys: prevent creating a different user's keyrings (bnc#1065999).
- leds: do not overflow sysfs buffer in led_trigger_show (bsc#1080464).
- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1039348).
- nfsv4: fix getacl head length estimation (git-fixes).
- pci: Use function 0 VPD for identical functions, regular VPD for others (bnc#943786 git-fixes).
- pipe: actually allow root to exceed the pipe buffer limits (git-fixes).
- posix-timers: Protect posix clock array access against speculation (bnc#1081358).
- powerpc/pseries: Support firmware disable of RFI flush (bsc#1068032, bsc#1075088).
- qeth: repair SBAL elements calculation (bnc#1085513, LTC#165484).
- Revert 'USB: cdc-acm: fix broken runtime suspend' (bsc#1067912)
- s390/qeth: fix underestimated count of buffer elements (bnc#1082091, LTC#164529).
- scsi: sr: workaround VMware ESXi cdrom emulation bug (bsc#1080813).
- usbnet: Fix a race between usbnet_stop() and the BH (bsc#1083275).
- x86-64: Move the 'user' vsyscall segment out of the data segment (bsc#1082424).
- x86/espfix: Fix return stack in do_double_fault() (bsc#1085279).
- x86/kaiser: properly align trampoline stack (bsc#1087260).
- x86/retpoline: do not perform thunk calls in ring3 vsyscall code (bsc#1085331).
- xen/x86/asm/traps: Disable tracing and kprobes in fixup_bad_iret and sync_regs (bsc#909077).
- xen/x86/cpu: Check speculation control CPUID bit (bsc#1068032).
- xen/x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).
- xen/x86/cpu: Fix bootup crashes by sanitizing the argument of the 'clearcpuid=' command-line option (bsc#1065600).
- xen/x86/cpu: Sync CPU feature flags late (bsc#1075994 bsc#1075091).
- xen/x86/entry: Use IBRS on entry to kernel space (bsc#1068032).
- xen/x86/idle: Toggle IBRS when going idle (bsc#1068032).
- xen/x86/kaiser: Move feature detection up (bsc#1068032).
- xfs: check for buffer errors before waiting (bsc#1052943).
- xfs: fix allocbt cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).
- xfs: really fix the cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-25"/>
	<updated date="2018-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010470">SUSE bug 1010470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013018">SUSE bug 1013018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052943">SUSE bug 1052943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062568">SUSE bug 1062568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062840">SUSE bug 1062840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063416">SUSE bug 1063416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063516">SUSE bug 1063516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065999">SUSE bug 1065999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067118">SUSE bug 1067118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067912">SUSE bug 1067912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072689">SUSE bug 1072689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072865">SUSE bug 1072865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075088">SUSE bug 1075088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078669">SUSE bug 1078669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078672">SUSE bug 1078672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078673">SUSE bug 1078673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078674">SUSE bug 1078674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080464">SUSE bug 1080464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080757">SUSE bug 1080757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080813">SUSE bug 1080813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081358">SUSE bug 1081358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082091">SUSE bug 1082091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082424">SUSE bug 1082424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083242">SUSE bug 1083242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083275">SUSE bug 1083275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083483">SUSE bug 1083483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083494">SUSE bug 1083494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084536">SUSE bug 1084536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085113">SUSE bug 1085113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085279">SUSE bug 1085279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085331">SUSE bug 1085331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085513">SUSE bug 1085513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086162">SUSE bug 1086162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087092">SUSE bug 1087092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087260">SUSE bug 1087260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087762">SUSE bug 1087762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088147">SUSE bug 1088147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088260">SUSE bug 1088260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089608">SUSE bug 1089608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909077">SUSE bug 909077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940776">SUSE bug 940776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943786">SUSE bug 943786</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5156/">CVE-2015-5156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5156">CVE-2015-5156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7915/">CVE-2016-7915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7915">CVE-2016-7915 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0861/">CVE-2017-0861 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0861">CVE-2017-0861 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12190/">CVE-2017-12190 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12190">CVE-2017-12190 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13166">CVE-2017-13166 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16644/">CVE-2017-16644 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16644">CVE-2017-16644 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16911/">CVE-2017-16911 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16911">CVE-2017-16911 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16912/">CVE-2017-16912 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16912">CVE-2017-16912 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16913/">CVE-2017-16913 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16913">CVE-2017-16913 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16914/">CVE-2017-16914 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16914">CVE-2017-16914 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18203/">CVE-2017-18203 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18203">CVE-2017-18203 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18208/">CVE-2017-18208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18208">CVE-2017-18208 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10087/">CVE-2018-10087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10087">CVE-2018-10087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6927/">CVE-2018-6927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6927">CVE-2018-6927 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7566">CVE-2018-7566 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7757/">CVE-2018-7757 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7757">CVE-2018-7757 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8822/">CVE-2018-8822 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8822">CVE-2018-8822 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583766" comment="kernel-bigmem-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583767" comment="kernel-bigmem-base-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583769" comment="kernel-default-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583770" comment="kernel-default-base-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583772" comment="kernel-default-man-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583773" comment="kernel-ec2-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583774" comment="kernel-ec2-base-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583776" comment="kernel-pae-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583777" comment="kernel-pae-base-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583779" comment="kernel-ppc64-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583780" comment="kernel-ppc64-base-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583782" comment="kernel-source-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583783" comment="kernel-syms-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583784" comment="kernel-trace-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583785" comment="kernel-trace-base-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583787" comment="kernel-xen-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583788" comment="kernel-xen-base-3.0.101-108.38.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583766" comment="kernel-bigmem-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583767" comment="kernel-bigmem-base-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583769" comment="kernel-default-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583770" comment="kernel-default-base-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583772" comment="kernel-default-man-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583773" comment="kernel-ec2-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583774" comment="kernel-ec2-base-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583776" comment="kernel-pae-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583777" comment="kernel-pae-base-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583779" comment="kernel-ppc64-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583780" comment="kernel-ppc64-base-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583782" comment="kernel-source-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583783" comment="kernel-syms-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583784" comment="kernel-trace-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583785" comment="kernel-trace-base-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583787" comment="kernel-xen-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583788" comment="kernel-xen-base-3.0.101-108.38.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220071" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1032084" ref_url="https://bugzilla.suse.com/1032084" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1065726" ref_url="https://bugzilla.suse.com/1065726" source="BUGZILLA"/>
		<reference ref_id="1087088" ref_url="https://bugzilla.suse.com/1087088" source="BUGZILLA"/>
		<reference ref_id="1089665" ref_url="https://bugzilla.suse.com/1089665" source="BUGZILLA"/>
		<reference ref_id="1089668" ref_url="https://bugzilla.suse.com/1089668" source="BUGZILLA"/>
		<reference ref_id="1089752" ref_url="https://bugzilla.suse.com/1089752" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10124" ref_url="https://www.suse.com/security/cve/CVE-2018-10124/" source="CVE"/>
		<reference ref_id="CVE-2018-1087" ref_url="https://www.suse.com/security/cve/CVE-2018-1087/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003977.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-1087: And an unprivileged KVM guest user could use this flaw to potentially escalate their privileges inside a guest. (bsc#1087088)
- CVE-2018-8897: An unprivileged system user could use incorrect set up interrupt stacks to crash the Linux kernel resulting in DoS issue. (bsc#1087088)
- CVE-2018-10124: The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument (bnc#1089752).

The following non-security bugs were fixed:

- kvm/x86: fix icebp instruction handling (bsc#1087088).
- media: cpia2: Fix a couple off by one bugs (bsc#1050431).
- nfs: add nostatflush mount option (bsc#1065726).
- nfs: allow flush-on-stat to be disabled (bsc#1065726).
- powerpc/fadump: Add a warning when 'fadump_reserve_mem=' is used (bnc#1032084, FATE#323225).
- powerpc/fadump: reuse crashkernel parameter for fadump memory reservation (bnc#1032084, FATE#323225).
- powerpc/fadump: update documentation about crashkernel parameter reuse (bnc#1032084, FATE#323225).
- powerpc/fadump: use 'fadump_reserve_mem=' when specified (bnc#1032084, FATE#323225).
- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-08"/>
	<updated date="2018-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1032084">SUSE bug 1032084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065726">SUSE bug 1065726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089665">SUSE bug 1089665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089668">SUSE bug 1089668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089752">SUSE bug 1089752</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10124/">CVE-2018-10124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10124">CVE-2018-10124 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1087/">CVE-2018-1087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1087">CVE-2018-1087 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8897">CVE-2018-8897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583790" comment="kernel-bigmem-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583791" comment="kernel-bigmem-base-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583793" comment="kernel-default-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583794" comment="kernel-default-base-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583796" comment="kernel-default-man-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583797" comment="kernel-ec2-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583798" comment="kernel-ec2-base-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583800" comment="kernel-pae-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583801" comment="kernel-pae-base-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583803" comment="kernel-ppc64-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583804" comment="kernel-ppc64-base-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583806" comment="kernel-source-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583807" comment="kernel-syms-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583808" comment="kernel-trace-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583809" comment="kernel-trace-base-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583811" comment="kernel-xen-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583812" comment="kernel-xen-base-3.0.101-108.41.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583790" comment="kernel-bigmem-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583791" comment="kernel-bigmem-base-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583793" comment="kernel-default-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583794" comment="kernel-default-base-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583796" comment="kernel-default-man-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583797" comment="kernel-ec2-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583798" comment="kernel-ec2-base-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583800" comment="kernel-pae-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583801" comment="kernel-pae-base-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583803" comment="kernel-ppc64-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583804" comment="kernel-ppc64-base-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583806" comment="kernel-source-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583807" comment="kernel-syms-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583808" comment="kernel-trace-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583809" comment="kernel-trace-base-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583811" comment="kernel-xen-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583812" comment="kernel-xen-base-3.0.101-108.41.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220072" version="1" class="patch">
	<metadata>
		<title>Security update for kernel modules packages (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="926856" ref_url="https://bugzilla.suse.com/926856" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004215.html" source="SUSE-SU"/>
		<description>


The following kernel modules were rebuild with 'retpoline' enablement
to allow full mitigation of the Spectre Variant 2 (CVE-2017-5715, bsc#1068032)

OFED was adjusted to add an entry to control the loading/unloading of cxgb4 to
/etc/sysconf/infiniband (bsc#926856).

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-22"/>
	<updated date="2018-06-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926856">SUSE bug 926856</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583814" comment="iscsitarget-1.4.20-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583815" comment="iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.52-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583816" comment="iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583817" comment="iscsitarget-kmp-pae-1.4.20_3.0.101_108.52-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583818" comment="iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.52-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583819" comment="iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583820" comment="iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583821" comment="ofed-1.5.4.1-22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583822" comment="ofed-doc-1.5.4.1-22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583823" comment="ofed-kmp-bigmem-1.5.4.1_3.0.101_108.52-22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583824" comment="ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583825" comment="ofed-kmp-pae-1.5.4.1_3.0.101_108.52-22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583826" comment="ofed-kmp-ppc64-1.5.4.1_3.0.101_108.52-22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583827" comment="ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583814" comment="iscsitarget-1.4.20-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583815" comment="iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.52-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583816" comment="iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583817" comment="iscsitarget-kmp-pae-1.4.20_3.0.101_108.52-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583818" comment="iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.52-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583819" comment="iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583820" comment="iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583821" comment="ofed-1.5.4.1-22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583822" comment="ofed-doc-1.5.4.1-22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583823" comment="ofed-kmp-bigmem-1.5.4.1_3.0.101_108.52-22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583824" comment="ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583825" comment="ofed-kmp-pae-1.5.4.1_3.0.101_108.52-22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583826" comment="ofed-kmp-ppc64-1.5.4.1_3.0.101_108.52-22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583827" comment="ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220073" version="1" class="patch">
	<metadata>
		<title>Security update for various KMPs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1095824" ref_url="https://bugzilla.suse.com/1095824" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005270.html" source="SUSE-SU"/>
		<description>

This update rebuilds missing kernel modules (KMP) to use 'retpolines'
mitigations for Spectre Variant 2 (CVE-2017-5715).

Rebuilt KMP packages:

- cluster-network
- drbd
- gfs2
- iscsitarget
- ocfs2
- ofed
- oracleasm

  		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1095824">SUSE bug 1095824</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583828" comment="iscsitarget-1.4.20-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583829" comment="iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.87-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583830" comment="iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583831" comment="iscsitarget-kmp-pae-1.4.20_3.0.101_108.87-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583832" comment="iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.87-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583833" comment="iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583834" comment="iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583835" comment="ofed-1.5.4.1-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583836" comment="ofed-doc-1.5.4.1-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583837" comment="ofed-kmp-bigmem-1.5.4.1_3.0.101_108.87-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583838" comment="ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583839" comment="ofed-kmp-pae-1.5.4.1_3.0.101_108.87-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583840" comment="ofed-kmp-ppc64-1.5.4.1_3.0.101_108.87-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583841" comment="ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583842" comment="oracleasm-2.0.5-7.44.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583843" comment="oracleasm-kmp-bigmem-2.0.5_3.0.101_108.87-7.44.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583844" comment="oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583845" comment="oracleasm-kmp-pae-2.0.5_3.0.101_108.87-7.44.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583846" comment="oracleasm-kmp-ppc64-2.0.5_3.0.101_108.87-7.44.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583847" comment="oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583848" comment="oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583828" comment="iscsitarget-1.4.20-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583829" comment="iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.87-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583830" comment="iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583831" comment="iscsitarget-kmp-pae-1.4.20_3.0.101_108.87-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583832" comment="iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.87-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583833" comment="iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583834" comment="iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583835" comment="ofed-1.5.4.1-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583836" comment="ofed-doc-1.5.4.1-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583837" comment="ofed-kmp-bigmem-1.5.4.1_3.0.101_108.87-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583838" comment="ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583839" comment="ofed-kmp-pae-1.5.4.1_3.0.101_108.87-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583840" comment="ofed-kmp-ppc64-1.5.4.1_3.0.101_108.87-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583841" comment="ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583842" comment="oracleasm-2.0.5-7.44.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583843" comment="oracleasm-kmp-bigmem-2.0.5_3.0.101_108.87-7.44.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583844" comment="oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583845" comment="oracleasm-kmp-pae-2.0.5_3.0.101_108.87-7.44.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583846" comment="oracleasm-kmp-ppc64-2.0.5_3.0.101_108.87-7.44.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583847" comment="oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583848" comment="oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220074" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="952188" ref_url="https://bugzilla.suse.com/952188" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001667.html" source="SUSE-SU"/>
		<description>
krb5 was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-2695: Applications which call gss_inquire_context() on a partially-established SPNEGO context could have caused the GSS-API library to read from a pointer using the wrong type, generally causing a process crash (bsc#952188).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-30"/>
	<updated date="2015-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/952188">SUSE bug 952188</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2695">CVE-2015-2695 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578653" comment="krb5-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578654" comment="krb5-32bit-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578655" comment="krb5-apps-clients-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578656" comment="krb5-apps-servers-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578657" comment="krb5-client-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572184" comment="krb5-doc-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578658" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578659" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578660" comment="krb5-server-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578661" comment="krb5-x86-1.6.3-133.49.97.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578653" comment="krb5-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578654" comment="krb5-32bit-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578655" comment="krb5-apps-clients-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578656" comment="krb5-apps-servers-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578657" comment="krb5-client-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572184" comment="krb5-doc-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578658" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578659" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578660" comment="krb5-server-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578661" comment="krb5-x86-1.6.3-133.49.97.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220075" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="954270" ref_url="https://bugzilla.suse.com/954270" source="BUGZILLA"/>
		<reference ref_id="954470" ref_url="https://bugzilla.suse.com/954470" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001737.html" source="SUSE-SU"/>
		<description>
The krb5 package was updated to fix the following security and non security issues:

- CVE-2015-2695: Fixed missing functions that were still vulnerable (bsc#954270).
- Fixed a memory leak in the handling of error messages (bsc#954470). 
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-17"/>
	<updated date="2015-12-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954270">SUSE bug 954270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954470">SUSE bug 954470</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2695">CVE-2015-2695 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578662" comment="krb5-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578663" comment="krb5-32bit-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578664" comment="krb5-apps-clients-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578665" comment="krb5-apps-servers-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578666" comment="krb5-client-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578667" comment="krb5-server-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578668" comment="krb5-x86-1.6.3-133.49.103.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578662" comment="krb5-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578663" comment="krb5-32bit-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578664" comment="krb5-apps-clients-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578665" comment="krb5-apps-servers-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578666" comment="krb5-client-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578667" comment="krb5-server-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578668" comment="krb5-x86-1.6.3-133.49.103.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220076" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="963968" ref_url="https://bugzilla.suse.com/963968" source="BUGZILLA"/>
		<reference ref_id="963975" ref_url="https://bugzilla.suse.com/963975" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8629" ref_url="https://www.suse.com/security/cve/CVE-2015-8629/" source="CVE"/>
		<reference ref_id="CVE-2015-8631" ref_url="https://www.suse.com/security/cve/CVE-2015-8631/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001871.html" source="SUSE-SU"/>
		<description>

This update for krb5 fixes the following issues:

- CVE-2015-8629: Information leak authenticated attackers with permissions to modify the database (bsc#963968)
- CVE-2015-8631: An authenticated attacker could have caused a memory leak in auditd by supplying a null principal name in request (bsc#963975)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-11"/>
	<updated date="2016-02-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/963968">SUSE bug 963968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963975">SUSE bug 963975</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8629/">CVE-2015-8629 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8629">CVE-2015-8629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8631/">CVE-2015-8631 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8631">CVE-2015-8631 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583849" comment="krb5-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583850" comment="krb5-32bit-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583851" comment="krb5-apps-clients-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583852" comment="krb5-apps-servers-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583853" comment="krb5-client-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583854" comment="krb5-server-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583855" comment="krb5-x86-1.6.3-133.49.106.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583849" comment="krb5-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583850" comment="krb5-32bit-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583851" comment="krb5-apps-clients-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583852" comment="krb5-apps-servers-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583853" comment="krb5-client-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583854" comment="krb5-server-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583855" comment="krb5-x86-1.6.3-133.49.106.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220077" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="971942" ref_url="https://bugzilla.suse.com/971942" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3119" ref_url="https://www.suse.com/security/cve/CVE-2016-3119/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002016.html" source="SUSE-SU"/>
		<description>

This update for krb5 fixes the following security issue:

- CVE-2016-3119: An authenticated attacker with permission to modify a
  principal entry could have caused kadmind to dereference a null pointer
  by supplying an empty DB argument to the modify_principal command,
  if kadmind is configured to use the LDAP KDB module. (bsc#971942)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-18"/>
	<updated date="2016-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/971942">SUSE bug 971942</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3119/">CVE-2016-3119 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3119">CVE-2016-3119 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583856" comment="krb5-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583857" comment="krb5-32bit-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583858" comment="krb5-apps-clients-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583859" comment="krb5-apps-servers-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583860" comment="krb5-client-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583861" comment="krb5-server-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583862" comment="krb5-x86-1.6.3-133.49.109.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583856" comment="krb5-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583857" comment="krb5-32bit-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583858" comment="krb5-apps-clients-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583859" comment="krb5-apps-servers-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583860" comment="krb5-client-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583861" comment="krb5-server-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583862" comment="krb5-x86-1.6.3-133.49.109.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220078" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1056995" ref_url="https://bugzilla.suse.com/1056995" source="BUGZILLA"/>
		<reference ref_id="1083926" ref_url="https://bugzilla.suse.com/1083926" source="BUGZILLA"/>
		<reference ref_id="1083927" ref_url="https://bugzilla.suse.com/1083927" source="BUGZILLA"/>
		<reference ref_id="970696" ref_url="https://bugzilla.suse.com/970696" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11462" ref_url="https://www.suse.com/security/cve/CVE-2017-11462/" source="CVE"/>
		<reference ref_id="CVE-2018-5729" ref_url="https://www.suse.com/security/cve/CVE-2018-5729/" source="CVE"/>
		<reference ref_id="CVE-2018-5730" ref_url="https://www.suse.com/security/cve/CVE-2018-5730/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003861.html" source="SUSE-SU"/>
		<description>

This update for krb5 fixes several issues.

This security issue was fixed:

- CVE-2017-11462: Prevent automatic security context deletion to prevent double-free (bsc#1056995).
- CVE-2018-5729: Null pointer dereference in kadmind or DN container check bypass by supplying special crafted data (bsc#1083926).
- CVE-2018-5730: DN container check bypass by supplying special crafted data (bsc#1083927).


This non-security issue was fixed:

- Avoid indefinite polling in KDC communication. (bsc#970696)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056995">SUSE bug 1056995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083926">SUSE bug 1083926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083927">SUSE bug 1083927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970696">SUSE bug 970696</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11462/">CVE-2017-11462 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11462">CVE-2017-11462 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5729/">CVE-2018-5729 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5729">CVE-2018-5729 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5730/">CVE-2018-5730 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5730">CVE-2018-5730 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583863" comment="krb5-1.6.3-133.49.113.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583864" comment="krb5-32bit-1.6.3-133.49.113.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583865" comment="krb5-apps-clients-1.6.3-133.49.113.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583866" comment="krb5-apps-servers-1.6.3-133.49.113.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583867" comment="krb5-client-1.6.3-133.49.113.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583868" comment="krb5-server-1.6.3-133.49.113.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583869" comment="krb5-x86-1.6.3-133.49.113.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583863" comment="krb5-1.6.3-133.49.113.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583864" comment="krb5-32bit-1.6.3-133.49.113.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583865" comment="krb5-apps-clients-1.6.3-133.49.113.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583866" comment="krb5-apps-servers-1.6.3-133.49.113.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583867" comment="krb5-client-1.6.3-133.49.113.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583868" comment="krb5-server-1.6.3-133.49.113.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583869" comment="krb5-x86-1.6.3-133.49.113.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220079" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="910457" ref_url="https://bugzilla.suse.com/910457" source="BUGZILLA"/>
		<reference ref_id="910458" ref_url="https://bugzilla.suse.com/910458" source="BUGZILLA"/>
		<reference ref_id="918595" ref_url="https://bugzilla.suse.com/918595" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353/" source="CVE"/>
		<reference ref_id="CVE-2014-5354" ref_url="https://www.suse.com/security/cve/CVE-2014-5354/" source="CVE"/>
		<reference ref_id="CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001507.html" source="SUSE-SU"/>
		<description>
krb5 was updated to fix three security issues.

Remote authenticated users could cause denial of service.

These security issues were fixed:
- CVE-2014-5353: NULL pointer dereference when using a ticket policy name as password name (bsc#910457).
- CVE-2014-5354: NULL pointer dereference when using keyless entries (bsc#910458).
- CVE-2014-5355: Denial of service in krb5_read_message (bsc#918595).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-10"/>
	<updated date="2015-07-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/910457">SUSE bug 910457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910458">SUSE bug 910458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918595">SUSE bug 918595</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5353">CVE-2014-5353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5354/">CVE-2014-5354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5354">CVE-2014-5354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5355">CVE-2014-5355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578687" comment="krb5-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578688" comment="krb5-32bit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578689" comment="krb5-apps-clients-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578690" comment="krb5-apps-servers-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578691" comment="krb5-client-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572268" comment="krb5-doc-1.6.3-133.49.68.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578692" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578693" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578694" comment="krb5-server-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578695" comment="krb5-x86-1.6.3-133.49.68.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578687" comment="krb5-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578688" comment="krb5-32bit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578689" comment="krb5-apps-clients-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578690" comment="krb5-apps-servers-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578691" comment="krb5-client-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572268" comment="krb5-doc-1.6.3-133.49.68.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578692" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578693" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578694" comment="krb5-server-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578695" comment="krb5-x86-1.6.3-133.49.68.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220080" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001557.html" source="SUSE-SU"/>
		<description>

kvm was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-17"/>
	<updated date="2015-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5154">CVE-2015-5154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583870" comment="kvm-1.4.2-32.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583870" comment="kvm-1.4.2-32.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220081" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="947164" ref_url="https://bugzilla.suse.com/947164" source="BUGZILLA"/>
		<reference ref_id="950590" ref_url="https://bugzilla.suse.com/950590" source="BUGZILLA"/>
		<reference ref_id="953187" ref_url="https://bugzilla.suse.com/953187" source="BUGZILLA"/>
		<reference ref_id="956829" ref_url="https://bugzilla.suse.com/956829" source="BUGZILLA"/>
		<reference ref_id="957162" ref_url="https://bugzilla.suse.com/957162" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001775.html" source="SUSE-SU"/>
		<description>

This update for kvm fixes the following issues: 

Security issues fixed:
- CVE-2015-7512: The receive packet size is now checked in the emulated
  pcnet driver, eliminating buffer overflow and potential security
  issue by malicious guest systems. (bsc#957162)
- CVE-2015-8345: A infinite loop in processing command block list was fixed that could be
  exploit by malicious guest systems (bsc#956829).

Other bugs fixed:
- To assist users past the migration incompatibility discussed in
  bsc#950590 (restore migration compatibility with SLE11 SP3 and
  SLE12, at the unfortunate expense to prior SLE11 SP4 kvm release
  compatability when a virtio-net device is used), print a message
  which references the support document TID 7017048.
  See https://www.suse.com/support/kb/doc.php?id=7017048
- Fix cases of wrong clock values in kvmclock timekeeping
  (bsc#947164 and bsc#953187)
- Enforce pxe rom sizes to ensure migration compatibility.
  (bsc#950590)
- Fix kvm live migration fails between sles11 sp3 and sp4 (bsc#950590)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-04"/>
	<updated date="2016-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947164">SUSE bug 947164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950590">SUSE bug 950590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953187">SUSE bug 953187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956829">SUSE bug 956829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957162">SUSE bug 957162</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7512">CVE-2015-7512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8345">CVE-2015-8345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583871" comment="kvm-1.4.2-35.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583871" comment="kvm-1.4.2-35.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220082" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="895528" ref_url="https://bugzilla.suse.com/895528" source="BUGZILLA"/>
		<reference ref_id="901508" ref_url="https://bugzilla.suse.com/901508" source="BUGZILLA"/>
		<reference ref_id="928393" ref_url="https://bugzilla.suse.com/928393" source="BUGZILLA"/>
		<reference ref_id="934069" ref_url="https://bugzilla.suse.com/934069" source="BUGZILLA"/>
		<reference ref_id="936132" ref_url="https://bugzilla.suse.com/936132" source="BUGZILLA"/>
		<reference ref_id="940929" ref_url="https://bugzilla.suse.com/940929" source="BUGZILLA"/>
		<reference ref_id="944463" ref_url="https://bugzilla.suse.com/944463" source="BUGZILLA"/>
		<reference ref_id="945404" ref_url="https://bugzilla.suse.com/945404" source="BUGZILLA"/>
		<reference ref_id="945987" ref_url="https://bugzilla.suse.com/945987" source="BUGZILLA"/>
		<reference ref_id="945989" ref_url="https://bugzilla.suse.com/945989" source="BUGZILLA"/>
		<reference ref_id="947159" ref_url="https://bugzilla.suse.com/947159" source="BUGZILLA"/>
		<reference ref_id="958491" ref_url="https://bugzilla.suse.com/958491" source="BUGZILLA"/>
		<reference ref_id="958917" ref_url="https://bugzilla.suse.com/958917" source="BUGZILLA"/>
		<reference ref_id="959005" ref_url="https://bugzilla.suse.com/959005" source="BUGZILLA"/>
		<reference ref_id="960334" ref_url="https://bugzilla.suse.com/960334" source="BUGZILLA"/>
		<reference ref_id="960725" ref_url="https://bugzilla.suse.com/960725" source="BUGZILLA"/>
		<reference ref_id="961332" ref_url="https://bugzilla.suse.com/961332" source="BUGZILLA"/>
		<reference ref_id="961333" ref_url="https://bugzilla.suse.com/961333" source="BUGZILLA"/>
		<reference ref_id="961358" ref_url="https://bugzilla.suse.com/961358" source="BUGZILLA"/>
		<reference ref_id="961556" ref_url="https://bugzilla.suse.com/961556" source="BUGZILLA"/>
		<reference ref_id="961691" ref_url="https://bugzilla.suse.com/961691" source="BUGZILLA"/>
		<reference ref_id="962320" ref_url="https://bugzilla.suse.com/962320" source="BUGZILLA"/>
		<reference ref_id="963782" ref_url="https://bugzilla.suse.com/963782" source="BUGZILLA"/>
		<reference ref_id="964413" ref_url="https://bugzilla.suse.com/964413" source="BUGZILLA"/>
		<reference ref_id="967969" ref_url="https://bugzilla.suse.com/967969" source="BUGZILLA"/>
		<reference ref_id="969350" ref_url="https://bugzilla.suse.com/969350" source="BUGZILLA"/>
		<reference ref_id="970036" ref_url="https://bugzilla.suse.com/970036" source="BUGZILLA"/>
		<reference ref_id="970037" ref_url="https://bugzilla.suse.com/970037" source="BUGZILLA"/>
		<reference ref_id="975128" ref_url="https://bugzilla.suse.com/975128" source="BUGZILLA"/>
		<reference ref_id="975136" ref_url="https://bugzilla.suse.com/975136" source="BUGZILLA"/>
		<reference ref_id="975700" ref_url="https://bugzilla.suse.com/975700" source="BUGZILLA"/>
		<reference ref_id="976109" ref_url="https://bugzilla.suse.com/976109" source="BUGZILLA"/>
		<reference ref_id="978158" ref_url="https://bugzilla.suse.com/978158" source="BUGZILLA"/>
		<reference ref_id="978160" ref_url="https://bugzilla.suse.com/978160" source="BUGZILLA"/>
		<reference ref_id="980711" ref_url="https://bugzilla.suse.com/980711" source="BUGZILLA"/>
		<reference ref_id="980723" ref_url="https://bugzilla.suse.com/980723" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3615" ref_url="https://www.suse.com/security/cve/CVE-2014-3615/" source="CVE"/>
		<reference ref_id="CVE-2014-3689" ref_url="https://www.suse.com/security/cve/CVE-2014-3689/" source="CVE"/>
		<reference ref_id="CVE-2014-9718" ref_url="https://www.suse.com/security/cve/CVE-2014-9718/" source="CVE"/>
		<reference ref_id="CVE-2015-3214" ref_url="https://www.suse.com/security/cve/CVE-2015-3214/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5279" ref_url="https://www.suse.com/security/cve/CVE-2015-5279/" source="CVE"/>
		<reference ref_id="CVE-2015-5745" ref_url="https://www.suse.com/security/cve/CVE-2015-5745/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7295" ref_url="https://www.suse.com/security/cve/CVE-2015-7295/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="CVE-2016-2857" ref_url="https://www.suse.com/security/cve/CVE-2016-2857/" source="CVE"/>
		<reference ref_id="CVE-2016-2858" ref_url="https://www.suse.com/security/cve/CVE-2016-2858/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3712" ref_url="https://www.suse.com/security/cve/CVE-2016-3712/" source="CVE"/>
		<reference ref_id="CVE-2016-4001" ref_url="https://www.suse.com/security/cve/CVE-2016-4001/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4020" ref_url="https://www.suse.com/security/cve/CVE-2016-4020/" source="CVE"/>
		<reference ref_id="CVE-2016-4037" ref_url="https://www.suse.com/security/cve/CVE-2016-4037/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<description>
kvm was updated to fix 33 security issues.

These security issues were fixed:
- CVE-2016-4439: Avoid OOB access in 53C9X emulation (bsc#980711)
- CVE-2016-4441: Avoid OOB access in 53C9X emulation (bsc#980723)
- CVE-2016-3710: Fixed VGA emulation based OOB access with potential for guest escape (bsc#978158)
- CVE-2016-3712: Fixed VGa emulation based DOS and OOB read access exploit (bsc#978160)
- CVE-2016-4037: Fixed USB ehci based DOS (bsc#976109)
- CVE-2016-2538: Fixed potential OOB access in USB net device emulation (bsc#967969)
- CVE-2016-2841: Fixed OOB access / hang in ne2000 emulation (bsc#969350)
- CVE-2016-2858: Avoid potential DOS when using QEMU pseudo random number generator (bsc#970036)
- CVE-2016-2857: Fixed OOB access when processing IP checksums (bsc#970037)
- CVE-2016-4001: Fixed OOB access in Stellaris enet emulated nic (bsc#975128)
- CVE-2016-4002: Fixed OOB access in MIPSnet emulated controller (bsc#975136)
- CVE-2016-4020: Fixed possible host data leakage to guest from TPR access (bsc#975700)
- CVE-2015-3214: Fixed OOB read in i8254 PIC (bsc#934069)
- CVE-2014-9718: Fixed the handling of malformed or short ide PRDTs to avoid any opportunity for guest to cause DoS by abusing that interface (bsc#928393)
- CVE-2014-3689: Fixed insufficient parameter validation in rectangle functions (bsc#901508)
- CVE-2014-3615: The VGA emulator in QEMU allowed local guest users to read host memory by setting the display to a high resolution (bsc#895528).
- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).
- CVE-2015-5278: Infinite loop in ne2000_receive() function (bsc#945989).
- CVE-2015-5279: Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU allowed guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets (bsc#945987).
- CVE-2015-5745: Buffer overflow in virtio-serial (bsc#940929).
- CVE-2015-6855: hw/ide/core.c in QEMU did not properly restrict the commands accepted by an ATAPI device, which allowed guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash (bsc#945404).
- CVE-2015-7295: hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allowed remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface (bsc#947159).
- CVE-2015-7549: PCI null pointer dereferences (bsc#958917).
- CVE-2015-8504: VNC floating point exception (bsc#958491).
- CVE-2015-8558: Infinite loop in ehci_advance_state resulting in DoS (bsc#959005).
- CVE-2015-8613: Wrong sized memset in megasas command handler (bsc#961358).
- CVE-2015-8619: Potential DoS for long HMP sendkey command argument (bsc#960334).
- CVE-2015-8743: OOB memory access in ne2000 ioport r/w functions (bsc#960725).
- CVE-2016-1568: AHCI use-after-free in aio port commands (bsc#961332).
- CVE-2016-1714: Potential OOB memory access in processing firmware configuration (bsc#961691).
- CVE-2016-1922: NULL pointer dereference when processing hmp i/o command (bsc#962320).
- CVE-2016-1981: Potential DoS (infinite loop) in e1000 device emulation by malicious privileged user within guest (bsc#963782).
- CVE-2016-2198: Malicious privileged guest user were able to cause DoS by writing to read-only EHCI capabilities registers (bsc#964413).

This non-security issue was fixed:
- Fix case of IDE interface needing busy status set before flush (bsc#936132)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-11"/>
	<updated date="2016-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/895528">SUSE bug 895528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901508">SUSE bug 901508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928393">SUSE bug 928393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934069">SUSE bug 934069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936132">SUSE bug 936132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940929">SUSE bug 940929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944463">SUSE bug 944463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945404">SUSE bug 945404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945987">SUSE bug 945987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945989">SUSE bug 945989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947159">SUSE bug 947159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958491">SUSE bug 958491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958917">SUSE bug 958917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959005">SUSE bug 959005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960334">SUSE bug 960334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960725">SUSE bug 960725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961332">SUSE bug 961332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961333">SUSE bug 961333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961358">SUSE bug 961358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961556">SUSE bug 961556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961691">SUSE bug 961691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962320">SUSE bug 962320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963782">SUSE bug 963782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964413">SUSE bug 964413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967969">SUSE bug 967969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969350">SUSE bug 969350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970036">SUSE bug 970036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970037">SUSE bug 970037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975128">SUSE bug 975128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975136">SUSE bug 975136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975700">SUSE bug 975700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976109">SUSE bug 976109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978158">SUSE bug 978158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978160">SUSE bug 978160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980711">SUSE bug 980711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980723">SUSE bug 980723</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3615/">CVE-2014-3615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3615">CVE-2014-3615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3689/">CVE-2014-3689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3689">CVE-2014-3689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9718/">CVE-2014-9718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9718">CVE-2014-9718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3214/">CVE-2015-3214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3214">CVE-2015-3214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5239">CVE-2015-5239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5278">CVE-2015-5278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5279/">CVE-2015-5279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5279">CVE-2015-5279 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5745/">CVE-2015-5745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5745">CVE-2015-5745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6855">CVE-2015-6855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7295/">CVE-2015-7295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7295">CVE-2015-7295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7549">CVE-2015-7549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8504">CVE-2015-8504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8558">CVE-2015-8558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8613">CVE-2015-8613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8619">CVE-2015-8619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8743">CVE-2015-8743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1568">CVE-2016-1568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1714">CVE-2016-1714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1922">CVE-2016-1922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1981">CVE-2016-1981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2198">CVE-2016-2198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2538">CVE-2016-2538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2841">CVE-2016-2841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2857/">CVE-2016-2857 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2857">CVE-2016-2857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2858/">CVE-2016-2858 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2858">CVE-2016-2858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3710">CVE-2016-3710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3712/">CVE-2016-3712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3712">CVE-2016-3712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4001/">CVE-2016-4001 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4001">CVE-2016-4001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4002">CVE-2016-4002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4020/">CVE-2016-4020 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4020">CVE-2016-4020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4037/">CVE-2016-4037 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4037">CVE-2016-4037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4439">CVE-2016-4439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4441">CVE-2016-4441 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583872" comment="kvm-1.4.2-44.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583872" comment="kvm-1.4.2-44.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220083" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="902737" ref_url="https://bugzilla.suse.com/902737" source="BUGZILLA"/>
		<reference ref_id="944697" ref_url="https://bugzilla.suse.com/944697" source="BUGZILLA"/>
		<reference ref_id="967012" ref_url="https://bugzilla.suse.com/967012" source="BUGZILLA"/>
		<reference ref_id="967013" ref_url="https://bugzilla.suse.com/967013" source="BUGZILLA"/>
		<reference ref_id="982017" ref_url="https://bugzilla.suse.com/982017" source="BUGZILLA"/>
		<reference ref_id="982018" ref_url="https://bugzilla.suse.com/982018" source="BUGZILLA"/>
		<reference ref_id="982019" ref_url="https://bugzilla.suse.com/982019" source="BUGZILLA"/>
		<reference ref_id="982222" ref_url="https://bugzilla.suse.com/982222" source="BUGZILLA"/>
		<reference ref_id="982223" ref_url="https://bugzilla.suse.com/982223" source="BUGZILLA"/>
		<reference ref_id="982285" ref_url="https://bugzilla.suse.com/982285" source="BUGZILLA"/>
		<reference ref_id="982959" ref_url="https://bugzilla.suse.com/982959" source="BUGZILLA"/>
		<reference ref_id="983961" ref_url="https://bugzilla.suse.com/983961" source="BUGZILLA"/>
		<reference ref_id="983982" ref_url="https://bugzilla.suse.com/983982" source="BUGZILLA"/>
		<reference ref_id="991080" ref_url="https://bugzilla.suse.com/991080" source="BUGZILLA"/>
		<reference ref_id="991466" ref_url="https://bugzilla.suse.com/991466" source="BUGZILLA"/>
		<reference ref_id="996441" ref_url="https://bugzilla.suse.com/996441" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392/" source="CVE"/>
		<reference ref_id="CVE-2016-4453" ref_url="https://www.suse.com/security/cve/CVE-2016-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-4454" ref_url="https://www.suse.com/security/cve/CVE-2016-4454/" source="CVE"/>
		<reference ref_id="CVE-2016-5105" ref_url="https://www.suse.com/security/cve/CVE-2016-5105/" source="CVE"/>
		<reference ref_id="CVE-2016-5106" ref_url="https://www.suse.com/security/cve/CVE-2016-5106/" source="CVE"/>
		<reference ref_id="CVE-2016-5107" ref_url="https://www.suse.com/security/cve/CVE-2016-5107/" source="CVE"/>
		<reference ref_id="CVE-2016-5126" ref_url="https://www.suse.com/security/cve/CVE-2016-5126/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5337" ref_url="https://www.suse.com/security/cve/CVE-2016-5337/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403/" source="CVE"/>
		<reference ref_id="CVE-2016-6490" ref_url="https://www.suse.com/security/cve/CVE-2016-6490/" source="CVE"/>
		<reference ref_id="CVE-2016-7116" ref_url="https://www.suse.com/security/cve/CVE-2016-7116/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<description>
kvm was updated to fix 16 security issues.

These security issues were fixed:
- CVE-2015-6815: e1000 NIC emulation support was vulnerable to an infinite loop issue. A privileged user inside guest could have used this flaw to crash the Qemu instance resulting in DoS.  (bsc#944697).
- CVE-2016-2391: The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers (bsc#967013).
- CVE-2016-2392: The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU did not properly validate USB configuration descriptor objects, which allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet (bsc#967012).
- CVE-2016-4453: The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982223).
- CVE-2016-4454: The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read (bsc#982222).
- CVE-2016-5105: The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, used an uninitialized variable, which allowed local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982017).
- CVE-2016-5106: The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982018).
- CVE-2016-5107: The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors (bsc#982019).
- CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982285).
- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982959).
- CVE-2016-5337: The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983961).
- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer (bsc#983982).
- CVE-2016-5403: The virtqueue_pop function in hw/virtio/virtio.c in QEMU allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion (bsc#991080).
- CVE-2016-6490: Infinite loop in the virtio framework. A privileged user inside the guest could have used this flaw to crash the Qemu instance on the host resulting in DoS (bsc#991466).
- CVE-2016-7116: Host directory sharing via Plan 9 File System(9pfs) was vulnerable to a directory/path traversal issue. A privileged user inside guest could have used this flaw to access undue files on the host (bsc#996441).
- CVE-2014-7815: The set_pixel_format function in ui/vnc.c in QEMU allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value (bsc#902737).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-25"/>
	<updated date="2016-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/902737">SUSE bug 902737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944697">SUSE bug 944697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967012">SUSE bug 967012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967013">SUSE bug 967013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982017">SUSE bug 982017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982018">SUSE bug 982018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982019">SUSE bug 982019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982222">SUSE bug 982222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982223">SUSE bug 982223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982285">SUSE bug 982285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982959">SUSE bug 982959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983961">SUSE bug 983961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983982">SUSE bug 983982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991080">SUSE bug 991080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991466">SUSE bug 991466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996441">SUSE bug 996441</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7815">CVE-2014-7815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6815">CVE-2015-6815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2391">CVE-2016-2391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2392">CVE-2016-2392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4453/">CVE-2016-4453 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4453">CVE-2016-4453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4454/">CVE-2016-4454 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4454">CVE-2016-4454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5105/">CVE-2016-5105 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5105">CVE-2016-5105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5106/">CVE-2016-5106 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5106">CVE-2016-5106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5107/">CVE-2016-5107 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5107">CVE-2016-5107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5126/">CVE-2016-5126 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5126">CVE-2016-5126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5238">CVE-2016-5238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5337/">CVE-2016-5337 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5337">CVE-2016-5337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5338">CVE-2016-5338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5403">CVE-2016-5403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6490/">CVE-2016-6490 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6490">CVE-2016-6490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7116/">CVE-2016-7116 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7116">CVE-2016-7116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583873" comment="kvm-1.4.2-47.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583873" comment="kvm-1.4.2-47.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220084" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1001151" ref_url="https://bugzilla.suse.com/1001151" source="BUGZILLA"/>
		<reference ref_id="1002550" ref_url="https://bugzilla.suse.com/1002550" source="BUGZILLA"/>
		<reference ref_id="1002557" ref_url="https://bugzilla.suse.com/1002557" source="BUGZILLA"/>
		<reference ref_id="1003878" ref_url="https://bugzilla.suse.com/1003878" source="BUGZILLA"/>
		<reference ref_id="1003893" ref_url="https://bugzilla.suse.com/1003893" source="BUGZILLA"/>
		<reference ref_id="1003894" ref_url="https://bugzilla.suse.com/1003894" source="BUGZILLA"/>
		<reference ref_id="1004702" ref_url="https://bugzilla.suse.com/1004702" source="BUGZILLA"/>
		<reference ref_id="1004707" ref_url="https://bugzilla.suse.com/1004707" source="BUGZILLA"/>
		<reference ref_id="1006536" ref_url="https://bugzilla.suse.com/1006536" source="BUGZILLA"/>
		<reference ref_id="1006538" ref_url="https://bugzilla.suse.com/1006538" source="BUGZILLA"/>
		<reference ref_id="1007391" ref_url="https://bugzilla.suse.com/1007391" source="BUGZILLA"/>
		<reference ref_id="1007450" ref_url="https://bugzilla.suse.com/1007450" source="BUGZILLA"/>
		<reference ref_id="1007454" ref_url="https://bugzilla.suse.com/1007454" source="BUGZILLA"/>
		<reference ref_id="1007493" ref_url="https://bugzilla.suse.com/1007493" source="BUGZILLA"/>
		<reference ref_id="1007494" ref_url="https://bugzilla.suse.com/1007494" source="BUGZILLA"/>
		<reference ref_id="1007495" ref_url="https://bugzilla.suse.com/1007495" source="BUGZILLA"/>
		<reference ref_id="998516" ref_url="https://bugzilla.suse.com/998516" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7161" ref_url="https://www.suse.com/security/cve/CVE-2016-7161/" source="CVE"/>
		<reference ref_id="CVE-2016-7170" ref_url="https://www.suse.com/security/cve/CVE-2016-7170/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-8576" ref_url="https://www.suse.com/security/cve/CVE-2016-8576/" source="CVE"/>
		<reference ref_id="CVE-2016-8577" ref_url="https://www.suse.com/security/cve/CVE-2016-8577/" source="CVE"/>
		<reference ref_id="CVE-2016-8578" ref_url="https://www.suse.com/security/cve/CVE-2016-8578/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8909" ref_url="https://www.suse.com/security/cve/CVE-2016-8909/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9101" ref_url="https://www.suse.com/security/cve/CVE-2016-9101/" source="CVE"/>
		<reference ref_id="CVE-2016-9102" ref_url="https://www.suse.com/security/cve/CVE-2016-9102/" source="CVE"/>
		<reference ref_id="CVE-2016-9103" ref_url="https://www.suse.com/security/cve/CVE-2016-9103/" source="CVE"/>
		<reference ref_id="CVE-2016-9104" ref_url="https://www.suse.com/security/cve/CVE-2016-9104/" source="CVE"/>
		<reference ref_id="CVE-2016-9105" ref_url="https://www.suse.com/security/cve/CVE-2016-9105/" source="CVE"/>
		<reference ref_id="CVE-2016-9106" ref_url="https://www.suse.com/security/cve/CVE-2016-9106/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002419.html" source="SUSE-SU"/>
		<description>

This update for kvm fixes the following issues:

- Address various security/stability issues
 * Fix OOB access in xlnx.xpx-ethernetlite emulation (CVE-2016-7161 bsc#1001151)
 * Fix OOB access in VMware SVGA emulation (CVE-2016-7170 bsc#998516)
 * Fix DOS in ColdFire Fast Ethernet Controller emulation
   (CVE-2016-7908 bsc#1002550)
 * Fix DOS in USB xHCI emulation (CVE-2016-8576 bsc#1003878)
 * Fix DOS in virtio-9pfs (CVE-2016-8578 bsc#1003894)
 * Fix DOS in virtio-9pfs (CVE-2016-9105 bsc#1007494)
 * Fix DOS in virtio-9pfs (CVE-2016-8577 bsc#1003893)
 * Plug data leak in virtio-9pfs interface (CVE-2016-9103 bsc#1007454)
 * Fix DOS in virtio-9pfs interface (CVE-2016-9102 bsc#1007450)
 * Fix DOS in virtio-9pfs (CVE-2016-9106 bsc#1007495)
 * Fix DOS in 16550A UART emulation (CVE-2016-8669 bsc#1004707)
 * Fix DOS in PC-Net II emulation (CVE-2016-7909 bsc#1002557)
 * Fix DOS in PRO100 emulation (CVE-2016-9101 bsc#1007391)
 * Fix DOS in RTL8139 emulation (CVE-2016-8910 bsc#1006538)
 * Fix DOS in Intel HDA controller emulation (CVE-2016-8909 bsc#1006536)
 * Fix DOS in virtio-9pfs (CVE-2016-9104 bsc#1007493)
 * Fix DOS in JAZZ RC4030 emulation (CVE-2016-8667 bsc#1004702)

- Patch queue updated from https://gitlab.suse.de/virtualization/qemu.git SLE11-SP4
- Remove semi-contradictory and now determined erroneous statement
  in kvm-supported.txt regarding not running ntp in kvm guest when
  kvm-clock is used. It is now recommended to use ntp in guest in
  this case.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-24"/>
	<updated date="2016-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1001151">SUSE bug 1001151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002550">SUSE bug 1002550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002557">SUSE bug 1002557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003878">SUSE bug 1003878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003893">SUSE bug 1003893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003894">SUSE bug 1003894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004702">SUSE bug 1004702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004707">SUSE bug 1004707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006536">SUSE bug 1006536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006538">SUSE bug 1006538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007391">SUSE bug 1007391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007450">SUSE bug 1007450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007454">SUSE bug 1007454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007493">SUSE bug 1007493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007494">SUSE bug 1007494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007495">SUSE bug 1007495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998516">SUSE bug 998516</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7161/">CVE-2016-7161 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7161">CVE-2016-7161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7170/">CVE-2016-7170 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7170">CVE-2016-7170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7908">CVE-2016-7908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7909">CVE-2016-7909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8576/">CVE-2016-8576 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8576">CVE-2016-8576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8577/">CVE-2016-8577 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8577">CVE-2016-8577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8578/">CVE-2016-8578 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8578">CVE-2016-8578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8667">CVE-2016-8667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8669">CVE-2016-8669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8909/">CVE-2016-8909 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8909">CVE-2016-8909 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8910">CVE-2016-8910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9101/">CVE-2016-9101 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9101">CVE-2016-9101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9102/">CVE-2016-9102 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9102">CVE-2016-9102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9103/">CVE-2016-9103 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9103">CVE-2016-9103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9104/">CVE-2016-9104 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9104">CVE-2016-9104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9105/">CVE-2016-9105 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9105">CVE-2016-9105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9106/">CVE-2016-9106 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9106">CVE-2016-9106 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583874" comment="kvm-1.4.2-50.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583874" comment="kvm-1.4.2-50.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220085" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1013285" ref_url="https://bugzilla.suse.com/1013285" source="BUGZILLA"/>
		<reference ref_id="1014109" ref_url="https://bugzilla.suse.com/1014109" source="BUGZILLA"/>
		<reference ref_id="1014111" ref_url="https://bugzilla.suse.com/1014111" source="BUGZILLA"/>
		<reference ref_id="1014702" ref_url="https://bugzilla.suse.com/1014702" source="BUGZILLA"/>
		<reference ref_id="1015048" ref_url="https://bugzilla.suse.com/1015048" source="BUGZILLA"/>
		<reference ref_id="1015169" ref_url="https://bugzilla.suse.com/1015169" source="BUGZILLA"/>
		<reference ref_id="1016779" ref_url="https://bugzilla.suse.com/1016779" source="BUGZILLA"/>
		<reference ref_id="1021129" ref_url="https://bugzilla.suse.com/1021129" source="BUGZILLA"/>
		<reference ref_id="1023004" ref_url="https://bugzilla.suse.com/1023004" source="BUGZILLA"/>
		<reference ref_id="1023053" ref_url="https://bugzilla.suse.com/1023053" source="BUGZILLA"/>
		<reference ref_id="1023907" ref_url="https://bugzilla.suse.com/1023907" source="BUGZILLA"/>
		<reference ref_id="1024972" ref_url="https://bugzilla.suse.com/1024972" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155/" source="CVE"/>
		<reference ref_id="CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776/" source="CVE"/>
		<reference ref_id="CVE-2016-9907" ref_url="https://www.suse.com/security/cve/CVE-2016-9907/" source="CVE"/>
		<reference ref_id="CVE-2016-9911" ref_url="https://www.suse.com/security/cve/CVE-2016-9911/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-5856" ref_url="https://www.suse.com/security/cve/CVE-2017-5856/" source="CVE"/>
		<reference ref_id="CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002831.html" source="SUSE-SU"/>
		<description>

This update for kvm fixes several issues.

These security issues were fixed:

- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024972)
- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)
- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013285)
- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in 'ehci_init_transfer'. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014111)
- CVE-2016-9907: The USB redirector usb-guest support was vulnerable to a memory leakage flaw when destroying the USB redirector in 'usbredir_handle_destroy'.  A guest user/process could have used this issue to leak host memory, resulting in DoS for a host (bsc#1014109)
- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1014702)
- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1014702)
- CVE-2017-5898: The CCID Card device emulator support was vulnerable to an integer overflow allowing a privileged user inside the guest to crash the Qemu process resulting in DoS (bnc#1023907)
- CVE-2016-10155: The virtual hardware watchdog 'wdt_i6300esb' was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1021129)
- CVE-2017-5856: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a memory leakage issue allowing a privileged user to leak host memory resulting in DoS (bsc#1023053)

These non-security issues were fixed:

- Fixed various inaccuracies in cirrus vga device emulation
- Fixed virtio interface failure (bsc#1015048)
- Fixed graphical update errors introduced by previous security fix (bsc#1016779)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-28"/>
	<updated date="2017-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013285">SUSE bug 1013285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014109">SUSE bug 1014109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014111">SUSE bug 1014111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014702">SUSE bug 1014702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015048">SUSE bug 1015048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015169">SUSE bug 1015169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016779">SUSE bug 1016779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021129">SUSE bug 1021129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023053">SUSE bug 1023053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023907">SUSE bug 1023907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024972">SUSE bug 1024972</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10155">CVE-2016-10155 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9776">CVE-2016-9776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9907/">CVE-2016-9907 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9907">CVE-2016-9907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9911/">CVE-2016-9911 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9911">CVE-2016-9911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9921">CVE-2016-9921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9922">CVE-2016-9922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2615">CVE-2017-2615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2620">CVE-2017-2620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5856/">CVE-2017-5856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5856">CVE-2017-5856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5898">CVE-2017-5898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583875" comment="kvm-1.4.2-59.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583875" comment="kvm-1.4.2-59.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220086" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1020427" ref_url="https://bugzilla.suse.com/1020427" source="BUGZILLA"/>
		<reference ref_id="1021741" ref_url="https://bugzilla.suse.com/1021741" source="BUGZILLA"/>
		<reference ref_id="1025109" ref_url="https://bugzilla.suse.com/1025109" source="BUGZILLA"/>
		<reference ref_id="1028184" ref_url="https://bugzilla.suse.com/1028184" source="BUGZILLA"/>
		<reference ref_id="1028656" ref_url="https://bugzilla.suse.com/1028656" source="BUGZILLA"/>
		<reference ref_id="1030624" ref_url="https://bugzilla.suse.com/1030624" source="BUGZILLA"/>
		<reference ref_id="1031051" ref_url="https://bugzilla.suse.com/1031051" source="BUGZILLA"/>
		<reference ref_id="1034044" ref_url="https://bugzilla.suse.com/1034044" source="BUGZILLA"/>
		<reference ref_id="1034866" ref_url="https://bugzilla.suse.com/1034866" source="BUGZILLA"/>
		<reference ref_id="1034908" ref_url="https://bugzilla.suse.com/1034908" source="BUGZILLA"/>
		<reference ref_id="1035406" ref_url="https://bugzilla.suse.com/1035406" source="BUGZILLA"/>
		<reference ref_id="1035950" ref_url="https://bugzilla.suse.com/1035950" source="BUGZILLA"/>
		<reference ref_id="1037242" ref_url="https://bugzilla.suse.com/1037242" source="BUGZILLA"/>
		<reference ref_id="1038396" ref_url="https://bugzilla.suse.com/1038396" source="BUGZILLA"/>
		<reference ref_id="1039495" ref_url="https://bugzilla.suse.com/1039495" source="BUGZILLA"/>
		<reference ref_id="1042159" ref_url="https://bugzilla.suse.com/1042159" source="BUGZILLA"/>
		<reference ref_id="1042800" ref_url="https://bugzilla.suse.com/1042800" source="BUGZILLA"/>
		<reference ref_id="1042801" ref_url="https://bugzilla.suse.com/1042801" source="BUGZILLA"/>
		<reference ref_id="1043296" ref_url="https://bugzilla.suse.com/1043296" source="BUGZILLA"/>
		<reference ref_id="1045035" ref_url="https://bugzilla.suse.com/1045035" source="BUGZILLA"/>
		<reference ref_id="1046636" ref_url="https://bugzilla.suse.com/1046636" source="BUGZILLA"/>
		<reference ref_id="1047674" ref_url="https://bugzilla.suse.com/1047674" source="BUGZILLA"/>
		<reference ref_id="1048902" ref_url="https://bugzilla.suse.com/1048902" source="BUGZILLA"/>
		<reference ref_id="1049381" ref_url="https://bugzilla.suse.com/1049381" source="BUGZILLA"/>
		<reference ref_id="1049785" ref_url="https://bugzilla.suse.com/1049785" source="BUGZILLA"/>
		<reference ref_id="1056334" ref_url="https://bugzilla.suse.com/1056334" source="BUGZILLA"/>
		<reference ref_id="1057585" ref_url="https://bugzilla.suse.com/1057585" source="BUGZILLA"/>
		<reference ref_id="1062069" ref_url="https://bugzilla.suse.com/1062069" source="BUGZILLA"/>
		<reference ref_id="1063122" ref_url="https://bugzilla.suse.com/1063122" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9602" ref_url="https://www.suse.com/security/cve/CVE-2016-9602/" source="CVE"/>
		<reference ref_id="CVE-2016-9603" ref_url="https://www.suse.com/security/cve/CVE-2016-9603/" source="CVE"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-10806" ref_url="https://www.suse.com/security/cve/CVE-2017-10806/" source="CVE"/>
		<reference ref_id="CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2017-14167" ref_url="https://www.suse.com/security/cve/CVE-2017-14167/" source="CVE"/>
		<reference ref_id="CVE-2017-15038" ref_url="https://www.suse.com/security/cve/CVE-2017-15038/" source="CVE"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-5579" ref_url="https://www.suse.com/security/cve/CVE-2017-5579/" source="CVE"/>
		<reference ref_id="CVE-2017-5973" ref_url="https://www.suse.com/security/cve/CVE-2017-5973/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-7471" ref_url="https://www.suse.com/security/cve/CVE-2017-7471/" source="CVE"/>
		<reference ref_id="CVE-2017-7493" ref_url="https://www.suse.com/security/cve/CVE-2017-7493/" source="CVE"/>
		<reference ref_id="CVE-2017-7718" ref_url="https://www.suse.com/security/cve/CVE-2017-7718/" source="CVE"/>
		<reference ref_id="CVE-2017-7980" ref_url="https://www.suse.com/security/cve/CVE-2017-7980/" source="CVE"/>
		<reference ref_id="CVE-2017-8086" ref_url="https://www.suse.com/security/cve/CVE-2017-8086/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330/" source="CVE"/>
		<reference ref_id="CVE-2017-9373" ref_url="https://www.suse.com/security/cve/CVE-2017-9373/" source="CVE"/>
		<reference ref_id="CVE-2017-9375" ref_url="https://www.suse.com/security/cve/CVE-2017-9375/" source="CVE"/>
		<reference ref_id="CVE-2017-9503" ref_url="https://www.suse.com/security/cve/CVE-2017-9503/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003386.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes several issues.

These security issues were fixed:

- CVE-2016-9602: The VirtFS host directory sharing via Plan 9 File System(9pfs) support was vulnerable to an improper link following issue which allowed a privileged user inside guest to access host file system beyond the shared folder and potentially escalating their privileges on a host (bsc#1020427)
- CVE-2016-9603: A privileged user within the guest VM could have caused a heap overflow in the device model process, potentially escalating their privileges to that of the device model process (bsc#1028656)
- CVE-2017-10664: qemu-nbd did not ignore SIGPIPE, which allowed remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt (bsc#1046636)
- CVE-2017-10806: Stack-based buffer overflow allowed local guest OS users to cause a denial of service (QEMU process crash) via vectors related to logging debug messages (bsc#1047674).
- CVE-2017-11334: The address_space_write_continue function allowed local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area (bsc#1048902).
- CVE-2017-11434: The dhcp_decode function in slirp/bootp.c allowed local guest OS users to cause a denial of service (out-of-bounds read) via a crafted DHCP options string (bsc#1049381)
- CVE-2017-13672: The VGA display emulator support allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update (bsc#1056334).
- CVE-2017-14167: Integer overflow in the load_multiboot function allowed local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write (bsc#1057585).
- CVE-2017-15038: Race condition in the v9fs_xattrwalk function local guest OS users to obtain sensitive information from host heap memory via vectors related to reading extended attributes (bsc#1062069).
- CVE-2017-15289: The mode4and5 write functions allowed local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation (bsc#1063122).
- CVE-2017-5579: The 16550A UART serial device emulation support was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1021741)
- CVE-2017-5973: A infinite loop while doing control transfer in xhci_kick_epctx allowed privileged user inside the guest to crash the host process resulting in DoS (bsc#1025109)
- CVE-2017-6505: The ohci_service_ed_list function allowed local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors (bsc#1028184)
- CVE-2017-7471: The VirtFS host directory sharing via Plan 9 File System(9pfs) support was vulnerable to an improper access control issue which allowed a privileged user inside guest to access host file system beyond the shared folder and potentially escalating their privileges on a host (bsc#1034866)
- CVE-2017-7493: The VirtFS, host directory sharing via Plan 9 File System(9pfs) support, was vulnerable to an improper access control issue. It could occur while accessing virtfs metadata files in mapped-file security mode. A guest user could have used this flaw to escalate their privileges inside guest (bsc#1039495)
- CVE-2017-7718: hw/display/cirrus_vga_rop.h allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions (bsc#1034908)
- CVE-2017-7980: An out-of-bounds r/w access issues in the Cirrus CLGD 54xx VGA Emulator support allowed privileged user inside guest to use this flaw to crash the Qemu process resulting in DoS or potentially execute arbitrary code on a host with privileges of Qemu process on the host (bsc#1035406)
- CVE-2017-8086: A memory leak in the v9fs_list_xattr function in hw/9pfs/9p-xattr.c allowed local guest OS privileged users to cause a denial of service (memory consumption) via vectors involving the orig_value variable (bsc#1035950)
- CVE-2017-8309: Memory leak in the audio/audio.c allowed remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture (bsc#1037242)
- CVE-2017-9330: USB OHCI Emulation in qemu allowed local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value (bsc#1042159)
- CVE-2017-9373: The IDE AHCI Emulation support was vulnerable to a host memory leakage issue, which allowed a privileged user inside guest to leak host memory resulting in DoS (bsc#1042801)
- CVE-2017-9375: The USB xHCI controller emulator support was vulnerable to an infinite recursive call loop issue, which allowed a privileged user inside guest to crash the Qemu process resulting in DoS (bsc#1042800)
- CVE-2017-9503: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a null pointer dereference issue which allowed a privileged user inside guest to crash the Qemu process on the host resulting in DoS (bsc#1043296)
- Privilege escalation in TCG mode (bsc#1030624)

These non-security issues were fixed:

- bsc#1038396: Fixed 12 tempest tests
- bsc#1045035: Fixed regression introduced by previous virtfs security fixes
- bsc#1034044: Prevent KVM guests stuck when waiting for sg_io() completion
- bsc#1031051: Prevent I/O errors when using pvmove with disk device=lun
- bsc#1049785: Make virsh dump output readable by crash 
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-09"/>
	<updated date="2017-11-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020427">SUSE bug 1020427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021741">SUSE bug 1021741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025109">SUSE bug 1025109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028184">SUSE bug 1028184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028656">SUSE bug 1028656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030624">SUSE bug 1030624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031051">SUSE bug 1031051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034044">SUSE bug 1034044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034866">SUSE bug 1034866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034908">SUSE bug 1034908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035406">SUSE bug 1035406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035950">SUSE bug 1035950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037242">SUSE bug 1037242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038396">SUSE bug 1038396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039495">SUSE bug 1039495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042159">SUSE bug 1042159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042800">SUSE bug 1042800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042801">SUSE bug 1042801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043296">SUSE bug 1043296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045035">SUSE bug 1045035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046636">SUSE bug 1046636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047674">SUSE bug 1047674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048902">SUSE bug 1048902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049381">SUSE bug 1049381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049785">SUSE bug 1049785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056334">SUSE bug 1056334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057585">SUSE bug 1057585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062069">SUSE bug 1062069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063122">SUSE bug 1063122</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9602/">CVE-2016-9602 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9602">CVE-2016-9602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9603/">CVE-2016-9603 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9603">CVE-2016-9603 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10664">CVE-2017-10664 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10806/">CVE-2017-10806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10806">CVE-2017-10806 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11334">CVE-2017-11334 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11434">CVE-2017-11434 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13672">CVE-2017-13672 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14167/">CVE-2017-14167 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14167">CVE-2017-14167 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15038/">CVE-2017-15038 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15038">CVE-2017-15038 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15289">CVE-2017-15289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5579/">CVE-2017-5579 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5579">CVE-2017-5579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5973/">CVE-2017-5973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5973">CVE-2017-5973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6505">CVE-2017-6505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7471/">CVE-2017-7471 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7471">CVE-2017-7471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7493/">CVE-2017-7493 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7493">CVE-2017-7493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7718/">CVE-2017-7718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7718">CVE-2017-7718 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7980/">CVE-2017-7980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7980">CVE-2017-7980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8086/">CVE-2017-8086 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8086">CVE-2017-8086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8309">CVE-2017-8309 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9330">CVE-2017-9330 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9373/">CVE-2017-9373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9373">CVE-2017-9373 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9375/">CVE-2017-9375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9375">CVE-2017-9375 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9503/">CVE-2017-9503 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9503">CVE-2017-9503 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583876" comment="kvm-1.4.2-60.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583876" comment="kvm-1.4.2-60.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220087" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1026612" ref_url="https://bugzilla.suse.com/1026612" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2633" ref_url="https://www.suse.com/security/cve/CVE-2017-2633/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003571.html" source="SUSE-SU"/>
		<description>


This update for kvm fixes the following issues:

Also a mitigation for a security flaw has been applied:

- CVE-2017-5715: QEMU was updated to allow passing through new MSR and CPUID flags from 
  the host VM to the CPU, to allow enabling/disabling branch prediction features in the
  Intel CPU. (bsc#1068032)

Security fixes have been applied:

- CVE-2017-2633: Fix various out of bounds access issues in the QEMU vnc infrastructure (bsc#1026612)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1026612">SUSE bug 1026612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2633/">CVE-2017-2633 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2633">CVE-2017-2633 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583877" comment="kvm-1.4.2-60.6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583877" comment="kvm-1.4.2-60.6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220088" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1076114" ref_url="https://bugzilla.suse.com/1076114" source="BUGZILLA"/>
		<reference ref_id="1076179" ref_url="https://bugzilla.suse.com/1076179" source="BUGZILLA"/>
		<reference ref_id="1082276" ref_url="https://bugzilla.suse.com/1082276" source="BUGZILLA"/>
		<reference ref_id="1083291" ref_url="https://bugzilla.suse.com/1083291" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18030" ref_url="https://www.suse.com/security/cve/CVE-2017-18030/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-5683" ref_url="https://www.suse.com/security/cve/CVE-2018-5683/" source="CVE"/>
		<reference ref_id="CVE-2018-7550" ref_url="https://www.suse.com/security/cve/CVE-2018-7550/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003961.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following issues:

- This update has the next round of Spectre v2 related patches,
  which now integrates with corresponding changes in libvirt. A
  January 2018 release of qemu initially addressed the Spectre v2
  vulnerability for KVM guests by exposing the spec-ctrl feature
  for all x86 vcpu types, which was the quick and dirty approach,
  but not the proper solution. We remove that initial patch and now
  rely on patches from upstream. This update defines spec_ctrl and
  ibpb cpu feature flags as well as new cpu models which are clones
  of existing models with either -IBRS or -IBPB added to the end of
  the model name. These new vcpu models explicitly include the new
  feature(s), whereas the feature flags can be added to the cpu
  parameter as with other features. In short, for continued Spectre
  v2 protection, ensure that either the appropriate cpu feature
  flag is added to the QEMU command-line, or one of the new cpu
  models is used. Although migration from older versions is
  supported, the new cpu features won't be properly exposed to the
  guest until it is restarted with the cpu features explicitly
  added. A reboot is insufficient.
- A warning patch is added which attempts to detect a migration
  from a qemu version which had the quick and dirty fix (it only
  detects certain cases, but hopefully is helpful.)
  For additional information on Spectre v2 as it relates to QEMU,
  see: https://www.qemu.org/2018/02/14/qemu-2-11-1-and-spectre-update/
  (CVE-2017-5715 bsc#1068032)
- A patch is added to continue to detect Spectre v2 mitigation
  features (as shown by cpuid), and if found provide that feature
  to guests, even if running on older KVM (kernel) versions which
  do not yet expose that feature to QEMU. (bsc#1082276)
  These two patches will be removed when we can reasonably assume
  everyone is running with the appropriate updates.

- Security fixes for the following CVE issues:
  (bsc#1076114 CVE-2018-5683)
  (bsc#1083291 CVE-2018-7550)
- This patch is already included, add here for CVE track
  (bsc#1076179 CVE-2017-18030)

- Toolchain changes have cause the built size of pxe-virtio.rom to
  exceed 64K. Tweak rarely used strings in code to reduce size of
  the binary so it fits again.

- Eliminate bogus use of CPUID_7_0_EDX_PRED_CMD which we've
  carried since the initial Spectre v2 patch was added. EDX bit
  27 of CPUID Leaf 07H, Sub-leaf 0 provides status on STIBP, and
  not the PRED_CMD MSR. Exposing the STIBP CPUID feature bit to the
  guest is wrong in general, since the VM doesn't directly control
  the scheduling of physical hyperthreads. This is left strictly to
  the L0 hypervisor.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-25"/>
	<updated date="2018-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076114">SUSE bug 1076114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076179">SUSE bug 1076179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082276">SUSE bug 1082276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083291">SUSE bug 1083291</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18030/">CVE-2017-18030 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18030">CVE-2017-18030 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5683/">CVE-2018-5683 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5683">CVE-2018-5683 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7550/">CVE-2018-7550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7550">CVE-2018-7550 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583878" comment="kvm-1.4.2-60.9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583878" comment="kvm-1.4.2-60.9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220089" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004104.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes one security issues.

This security issue was fixed:

- CVE-2018-3639: Spectre v4 vulnerability mitigation support for KVM guests (bsc#1092885).
  
  Systems with microprocessors utilizing speculative execution and speculative
  execution of memory reads before the addresses of all prior memory writes are
  known may allow unauthorized disclosure of information to an attacker with
  local user access via a side-channel analysis.
  
  This patch permits the new x86 cpu feature flag named 'ssbd' to be
  presented to the guest, given that the host has this feature, and
  KVM exposes it to the guest as well.
  
  For this feature to be enabled please use the qemu commandline
  -cpu $MODEL,+spec-ctrl,+ssbd
  so the guest OS can take advantage of the feature.
  
  spec-ctrl and ssbd support is also required in the host.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-30"/>
	<updated date="2018-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583879" comment="kvm-1.4.2-60.12.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583879" comment="kvm-1.4.2-60.12.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220090" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="1096223" ref_url="https://bugzilla.suse.com/1096223" source="BUGZILLA"/>
		<reference ref_id="1098735" ref_url="https://bugzilla.suse.com/1098735" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004542.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following security issues:

- CVE-2018-12617: qmp_guest_file_read had an integer overflow that could have
  been exploited by sending a crafted QMP command (including guest-file-read with
  a large count value) to the agent via the listening socket causing DoS
  (bsc#1098735)
- CVE-2018-11806: Prevent heap-based buffer overflow via incoming fragmented
  datagrams (bsc#1096223)

With this release the mitigations for Spectre v4 are moved the the patches from
upstream (CVE-2018-3639, bsc#1092885).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-07"/>
	<updated date="2018-09-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096223">SUSE bug 1096223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098735">SUSE bug 1098735</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11806">CVE-2018-11806 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12617">CVE-2018-12617 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583880" comment="kvm-1.4.2-60.15.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583880" comment="kvm-1.4.2-60.15.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220091" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1106222" ref_url="https://bugzilla.suse.com/1106222" source="BUGZILLA"/>
		<reference ref_id="1110910" ref_url="https://bugzilla.suse.com/1110910" source="BUGZILLA"/>
		<reference ref_id="1111006" ref_url="https://bugzilla.suse.com/1111006" source="BUGZILLA"/>
		<reference ref_id="1111010" ref_url="https://bugzilla.suse.com/1111010" source="BUGZILLA"/>
		<reference ref_id="1111013" ref_url="https://bugzilla.suse.com/1111013" source="BUGZILLA"/>
		<reference ref_id="1112185" ref_url="https://bugzilla.suse.com/1112185" source="BUGZILLA"/>
		<reference ref_id="1114422" ref_url="https://bugzilla.suse.com/1114422" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10839" ref_url="https://www.suse.com/security/cve/CVE-2018-10839/" source="CVE"/>
		<reference ref_id="CVE-2018-15746" ref_url="https://www.suse.com/security/cve/CVE-2018-15746/" source="CVE"/>
		<reference ref_id="CVE-2018-17958" ref_url="https://www.suse.com/security/cve/CVE-2018-17958/" source="CVE"/>
		<reference ref_id="CVE-2018-17962" ref_url="https://www.suse.com/security/cve/CVE-2018-17962/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-18438" ref_url="https://www.suse.com/security/cve/CVE-2018-18438/" source="CVE"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3975-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183975-1.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following issues:

Security issues fixed:

- CVE-2018-10839: Fixed NE2000 NIC emulation support that is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS (bsc#1110910).
- CVE-2018-15746: Fixed qemu-seccomp.c that might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread (bsc#1106222).
- CVE-2018-17958: Fixed a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used (bsc#1111006).
- CVE-2018-17962: Fixed a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used (bsc#1111010).
- CVE-2018-17963: Fixed qemu_deliver_packet_iov in net/net.c that accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact. (bsc#1111013)
- CVE-2018-18849: Fixed an out of bounds memory access issue that was found in the LSI53C895A SCSI Host Bus Adapter emulation while writing a message in lsi_do_msgin. It could occur during migration if the 'msg_len' field has an invalid value. A user/process could use this flaw to crash the Qemu process resulting in DoS (bsc#1114422).
- CVE-2018-18438: Fixed integer overflows because IOReadHandler and its associated functions use a signed integer data type for a size value (bnc#1112185).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-04"/>
	<updated date="2018-12-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106222">SUSE bug 1106222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110910">SUSE bug 1110910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111006">SUSE bug 1111006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111010">SUSE bug 1111010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111013">SUSE bug 1111013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112185">SUSE bug 1112185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114422">SUSE bug 1114422</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10839/">CVE-2018-10839 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10839">CVE-2018-10839 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15746/">CVE-2018-15746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15746">CVE-2018-15746 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17958/">CVE-2018-17958 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17958">CVE-2018-17958 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17962/">CVE-2018-17962 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17962">CVE-2018-17962 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17963">CVE-2018-17963 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18438/">CVE-2018-18438 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18438">CVE-2018-18438 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18849">CVE-2018-18849 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583881" comment="kvm-1.4.2-60.18.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583881" comment="kvm-1.4.2-60.18.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220092" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1109544" ref_url="https://bugzilla.suse.com/1109544" source="BUGZILLA"/>
		<reference ref_id="1116717" ref_url="https://bugzilla.suse.com/1116717" source="BUGZILLA"/>
		<reference ref_id="1117275" ref_url="https://bugzilla.suse.com/1117275" source="BUGZILLA"/>
		<reference ref_id="1123156" ref_url="https://bugzilla.suse.com/1123156" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19364" ref_url="https://www.suse.com/security/cve/CVE-2018-19364/" source="CVE"/>
		<reference ref_id="CVE-2018-19489" ref_url="https://www.suse.com/security/cve/CVE-2018-19489/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005126.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following issues:

Security issues fixed:

- CVE-2019-6778: Fixed a heap buffer overflow issue in the SLiRP networking implementation (bsc#1123156).
- CVE-2018-19489: Fixed a denial of service vulnerability in virtfs (bsc#1117275).
- CVE-2018-19364: Fixed a use-after-free if the virtfs interface resulting in a denial of service (bsc#1116717).

Non-security issue fixed:

- Fixed LAPIC TSC deadline timer save/restore (bsc#1109544)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-15"/>
	<updated date="2019-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109544">SUSE bug 1109544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116717">SUSE bug 1116717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117275">SUSE bug 1117275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19364/">CVE-2018-19364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19364">CVE-2018-19364 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19489/">CVE-2018-19489 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19489">CVE-2018-19489 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6778">CVE-2019-6778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583882" comment="kvm-1.4.2-60.21.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583882" comment="kvm-1.4.2-60.21.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220093" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1129622" ref_url="https://bugzilla.suse.com/1129622" source="BUGZILLA"/>
		<reference ref_id="1130675" ref_url="https://bugzilla.suse.com/1130675" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005473.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following issues:

- CVE-2019-9824: Fixed an information leak in slirp (bsc#1129622)
- CVE-2018-20815: Fix DOS possibility in device tree processing (bsc#1130675)
- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091: Added x86 cpu feature 'md-clear' (bsc#1111331)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-17"/>
	<updated date="2019-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129622">SUSE bug 1129622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130675">SUSE bug 1130675</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20815">CVE-2018-20815 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9824">CVE-2019-9824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583883" comment="kvm-1.4.2-60.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220094" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1135902" ref_url="https://bugzilla.suse.com/1135902" source="BUGZILLA"/>
		<reference ref_id="1140402" ref_url="https://bugzilla.suse.com/1140402" source="BUGZILLA"/>
		<reference ref_id="1143794" ref_url="https://bugzilla.suse.com/1143794" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12155" ref_url="https://www.suse.com/security/cve/CVE-2019-12155/" source="CVE"/>
		<reference ref_id="CVE-2019-13164" ref_url="https://www.suse.com/security/cve/CVE-2019-13164/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005835.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following issues:

Security issues fixed:

- CVE-2019-14378: Security fix for heap overflow in ip_reass on big packet input (bsc#1143794).
- CVE-2019-12155: Security fix for null pointer dereference while releasing spice resources (bsc#1135902).
- CVE-2019-13164: Security fix for qemu-bridge-helper ACL can be bypassed when names are too long (bsc#1140402).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-21"/>
	<updated date="2019-08-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135902">SUSE bug 1135902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140402">SUSE bug 1140402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143794">SUSE bug 1143794</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12155/">CVE-2019-12155 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12155">CVE-2019-12155 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13164/">CVE-2019-13164 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13164">CVE-2019-13164 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14378">CVE-2019-14378 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583884" comment="kvm-1.4.2-60.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220095" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1123156" ref_url="https://bugzilla.suse.com/1123156" source="BUGZILLA"/>
		<reference ref_id="1146873" ref_url="https://bugzilla.suse.com/1146873" source="BUGZILLA"/>
		<reference ref_id="1149811" ref_url="https://bugzilla.suse.com/1149811" source="BUGZILLA"/>
		<reference ref_id="1161066" ref_url="https://bugzilla.suse.com/1161066" source="BUGZILLA"/>
		<reference ref_id="1163018" ref_url="https://bugzilla.suse.com/1163018" source="BUGZILLA"/>
		<reference ref_id="1170940" ref_url="https://bugzilla.suse.com/1170940" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<reference ref_id="CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006934.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following issues:

Security issues fixed:

- CVE-2019-12068: Fixed a potential DoS in the LSI SCSI controller emulation (bsc#1146873).
- CVE-2020-1983: Fixed a use-after-free in the ip_reass function of slirp (bsc#1170940).
- CVE-2020-8608: Fixed a potential OOB access in slirp (bsc#1163018).
- CVE-2020-7039: Fixed a potential OOB access in slirp (bsc#1161066).
- CVE-2019-15890: Fixed a use-after-free during packet reassembly in slirp (bsc#1149811).
- Fixed multiple potential DoS issues in SLIRP, similar to CVE-2019-6778 (bsc#1123156).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-11"/>
	<updated date="2020-06-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146873">SUSE bug 1146873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149811">SUSE bug 1149811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161066">SUSE bug 1161066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163018">SUSE bug 1163018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170940">SUSE bug 1170940</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12068">CVE-2019-12068 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15890">CVE-2019-15890 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6778">CVE-2019-6778 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1983">CVE-2020-1983 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7039">CVE-2020-7039 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583885" comment="kvm-1.4.2-60.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220096" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1172383" ref_url="https://bugzilla.suse.com/1172383" source="BUGZILLA"/>
		<reference ref_id="1172384" ref_url="https://bugzilla.suse.com/1172384" source="BUGZILLA"/>
		<reference ref_id="1172385" ref_url="https://bugzilla.suse.com/1172385" source="BUGZILLA"/>
		<reference ref_id="1172478" ref_url="https://bugzilla.suse.com/1172478" source="BUGZILLA"/>
		<reference ref_id="1175441" ref_url="https://bugzilla.suse.com/1175441" source="BUGZILLA"/>
		<reference ref_id="1176673" ref_url="https://bugzilla.suse.com/1176673" source="BUGZILLA"/>
		<reference ref_id="1176682" ref_url="https://bugzilla.suse.com/1176682" source="BUGZILLA"/>
		<reference ref_id="1176684" ref_url="https://bugzilla.suse.com/1176684" source="BUGZILLA"/>
		<reference ref_id="1178934" ref_url="https://bugzilla.suse.com/1178934" source="BUGZILLA"/>
		<reference ref_id="1179467" ref_url="https://bugzilla.suse.com/1179467" source="BUGZILLA"/>
		<reference ref_id="1181108" ref_url="https://bugzilla.suse.com/1181108" source="BUGZILLA"/>
		<reference ref_id="1182137" ref_url="https://bugzilla.suse.com/1182137" source="BUGZILLA"/>
		<reference ref_id="1182425" ref_url="https://bugzilla.suse.com/1182425" source="BUGZILLA"/>
		<reference ref_id="1182577" ref_url="https://bugzilla.suse.com/1182577" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3689" ref_url="https://www.suse.com/security/cve/CVE-2014-3689/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2020-12829" ref_url="https://www.suse.com/security/cve/CVE-2020-12829/" source="CVE"/>
		<reference ref_id="CVE-2020-13361" ref_url="https://www.suse.com/security/cve/CVE-2020-13361/" source="CVE"/>
		<reference ref_id="CVE-2020-13362" ref_url="https://www.suse.com/security/cve/CVE-2020-13362/" source="CVE"/>
		<reference ref_id="CVE-2020-13765" ref_url="https://www.suse.com/security/cve/CVE-2020-13765/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-25084" ref_url="https://www.suse.com/security/cve/CVE-2020-25084/" source="CVE"/>
		<reference ref_id="CVE-2020-25624" ref_url="https://www.suse.com/security/cve/CVE-2020-25624/" source="CVE"/>
		<reference ref_id="CVE-2020-25625" ref_url="https://www.suse.com/security/cve/CVE-2020-25625/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29443" ref_url="https://www.suse.com/security/cve/CVE-2020-29443/" source="CVE"/>
		<reference ref_id="CVE-2021-20181" ref_url="https://www.suse.com/security/cve/CVE-2021-20181/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following issues:

- Fix OOB read and write due to integer overflow in sm501_2d_operation() in hw/display/sm501.c (CVE-2020-12829, bsc#1172385)
- Fix OOB access possibility in MegaRAID SAS 8708EM2 emulation (CVE-2020-13362 bsc#1172383)
- Fix use-after-free in usb xhci packet handling (CVE-2020-25723, bsc#1178934)
- Fix use-after-free in usb ehci packet handling (CVE-2020-25084, bsc#1176673)
- Fix OOB access in usb hcd-ohci emulation (CVE-2020-25624, bsc#1176682)
- Fix infinite loop (DoS) in usb hcd-ohci emulation (CVE-2020-25625, bsc#1176684)
- Fix OOB access in atapi emulation (CVE-2020-29443, bsc#1181108)
- Fix DoS in e1000 emulated device (CVE-2021-20257 bsc#1182577)
- Fix OOB access in SLIRP ARP packet processing (CVE-2020-29130, bsc#1179467)
- Fix OOB access while processing USB packets (CVE-2020-14364 bsc#1175441)
- Fix potential privilege escalation in virtfs (CVE-2021-20181 bsc#1182137)
- Fix package scripts to not use hard coded paths for temporary working directories and log files (bsc#1182425)
- Fix OOB access possibility in ES1370 audio device emulation (CVE-2020-13361 bsc#1172384)
- Fix OOB access in ROM loading (CVE-2020-13765 bsc#1172478)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-20"/>
	<updated date="2021-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172383">SUSE bug 1172383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172384">SUSE bug 1172384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172385">SUSE bug 1172385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172478">SUSE bug 1172478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175441">SUSE bug 1175441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176673">SUSE bug 1176673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176682">SUSE bug 1176682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176684">SUSE bug 1176684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178934">SUSE bug 1178934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179467">SUSE bug 1179467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181108">SUSE bug 1181108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182137">SUSE bug 1182137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182425">SUSE bug 1182425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182577">SUSE bug 1182577</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3689/">CVE-2014-3689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3689">CVE-2014-3689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1779">CVE-2015-1779 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12829/">CVE-2020-12829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12829">CVE-2020-12829 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13361/">CVE-2020-13361 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13361">CVE-2020-13361 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13362/">CVE-2020-13362 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13362">CVE-2020-13362 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13765/">CVE-2020-13765 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13765">CVE-2020-13765 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25084/">CVE-2020-25084 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25084">CVE-2020-25084 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25624/">CVE-2020-25624 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25624">CVE-2020-25624 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25625/">CVE-2020-25625 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25625">CVE-2020-25625 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25723">CVE-2020-25723 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29130">CVE-2020-29130 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-29443/">CVE-2020-29443 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29443">CVE-2020-29443 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20181/">CVE-2021-20181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20181">CVE-2021-20181 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583886" comment="kvm-1.4.2-60.34.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220097" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1173612" ref_url="https://bugzilla.suse.com/1173612" source="BUGZILLA"/>
		<reference ref_id="1174386" ref_url="https://bugzilla.suse.com/1174386" source="BUGZILLA"/>
		<reference ref_id="1178683" ref_url="https://bugzilla.suse.com/1178683" source="BUGZILLA"/>
		<reference ref_id="1180523" ref_url="https://bugzilla.suse.com/1180523" source="BUGZILLA"/>
		<reference ref_id="1181933" ref_url="https://bugzilla.suse.com/1181933" source="BUGZILLA"/>
		<reference ref_id="1186473" ref_url="https://bugzilla.suse.com/1186473" source="BUGZILLA"/>
		<reference ref_id="1187364" ref_url="https://bugzilla.suse.com/1187364" source="BUGZILLA"/>
		<reference ref_id="1187367" ref_url="https://bugzilla.suse.com/1187367" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11947" ref_url="https://www.suse.com/security/cve/CVE-2020-11947/" source="CVE"/>
		<reference ref_id="CVE-2020-15469" ref_url="https://www.suse.com/security/cve/CVE-2020-15469/" source="CVE"/>
		<reference ref_id="CVE-2020-15863" ref_url="https://www.suse.com/security/cve/CVE-2020-15863/" source="CVE"/>
		<reference ref_id="CVE-2020-25707" ref_url="https://www.suse.com/security/cve/CVE-2020-25707/" source="CVE"/>
		<reference ref_id="CVE-2021-20221" ref_url="https://www.suse.com/security/cve/CVE-2021-20221/" source="CVE"/>
		<reference ref_id="CVE-2021-3416" ref_url="https://www.suse.com/security/cve/CVE-2021-3416/" source="CVE"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009246.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following issues:


- CVE-2021-3594: invalid pointer initialization may lead to information disclosure in slirp (udp) (bsc#1187367)
- CVE-2021-3592: invalid pointer initialization may lead to information disclosure (bootp). (bsc#1187364)
- CVE-2021-3416: infinite loop in loopback mode may lead to stack overflow. (bsc#1186473)
- CVE-2020-15469: MMIO ops null pointer dereference may lead to DoS. (bsc#1173612)
- CVE-2020-11947: iscsi_aio_ioctl_cb in block/iscsi.c has a heap-based buffer over-read. (bsc#1180523)
- CVE-2021-20221: out-of-bound heap buffer access via an interrupt ID field. (bsc#1181933)
- CVE-2020-25707: infinite loop in e1000e_write_packet_to_guest() in hw/net/e1000e_core.c. (bsc#1178683)
- CVE-2020-15863: stack-based overflow in xgmac_enet_send() in hw/net/xgmac.c. (bsc#1174386)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-03"/>
	<updated date="2021-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173612">SUSE bug 1173612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174386">SUSE bug 1174386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178683">SUSE bug 1178683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180523">SUSE bug 1180523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181933">SUSE bug 1181933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186473">SUSE bug 1186473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187364">SUSE bug 1187364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187367">SUSE bug 1187367</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11947/">CVE-2020-11947 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11947">CVE-2020-11947 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15469/">CVE-2020-15469 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15469">CVE-2020-15469 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15863/">CVE-2020-15863 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15863">CVE-2020-15863 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25707/">CVE-2020-25707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-25707">CVE-2020-25707 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20221/">CVE-2021-20221 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20221">CVE-2021-20221 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3416/">CVE-2021-3416 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3416">CVE-2021-3416 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3592">CVE-2021-3592 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3594">CVE-2021-3594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626555" comment="kvm-1.4.2-60.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220098" version="1" class="patch">
	<metadata>
		<title>Security update for lha (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="962528" ref_url="https://bugzilla.suse.com/962528" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1925" ref_url="https://www.suse.com/security/cve/CVE-2016-1925/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002168.html" source="SUSE-SU"/>
		<description>

lha was updated to fix one security issue.

This security issue was fixed:
- CVE-2016-1925: Buffer Overflow while parsing level0 and level1 headers (bsc#962528).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-28"/>
	<updated date="2016-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/962528">SUSE bug 962528</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1925/">CVE-2016-1925 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1925">CVE-2016-1925 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583887" comment="lha-1.14.0.894-3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583887" comment="lha-1.14.0.894-3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220099" version="1" class="patch">
	<metadata>
		<title>Security update for libapr-util1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1064990" ref_url="https://bugzilla.suse.com/1064990" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12618" ref_url="https://www.suse.com/security/cve/CVE-2017-12618/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003689.html" source="SUSE-SU"/>
		<description>
This update for libapr-util1 fixes the following issues:

Security issue fixed:

- CVE-2017-12618: DoS via crafted SDBM database files in apr_sdbm*() functions (bsc#1064990)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064990">SUSE bug 1064990</bugzilla>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12618/">CVE-2017-12618 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12618">CVE-2017-12618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583888" comment="libapr-util1-1.3.4-12.22.23.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583889" comment="libapr-util1-32bit-1.3.4-12.22.23.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583890" comment="libapr-util1-dbd-sqlite3-1.3.4-12.22.23.3.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583888" comment="libapr-util1-1.3.4-12.22.23.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583889" comment="libapr-util1-32bit-1.3.4-12.22.23.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583890" comment="libapr-util1-dbd-sqlite3-1.3.4-12.22.23.3.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220100" version="1" class="patch">
	<metadata>
		<title>Security update for libapr1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1064982" ref_url="https://bugzilla.suse.com/1064982" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12613" ref_url="https://www.suse.com/security/cve/CVE-2017-12613/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004058.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:
  
- CVE-2017-12613: DoS or information disclosure in pr_exp_time*() or apr_os_exp_time*() functions (bsc#1064982).

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064982">SUSE bug 1064982</bugzilla>
	<cve impact="low" cvss3="3.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12613/">CVE-2017-12613 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12613">CVE-2017-12613 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583891" comment="libapr1-1.3.3-11.18.19.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583892" comment="libapr1-32bit-1.3.3-11.18.19.13.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583891" comment="libapr1-1.3.3-11.18.19.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583892" comment="libapr1-32bit-1.3.3-11.18.19.13.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220101" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1184751" ref_url="https://bugzilla.suse.com/1184751" source="BUGZILLA"/>
		<reference ref_id="1184752" ref_url="https://bugzilla.suse.com/1184752" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30498" ref_url="https://www.suse.com/security/cve/CVE-2021-30498/" source="CVE"/>
		<reference ref_id="CVE-2021-30499" ref_url="https://www.suse.com/security/cve/CVE-2021-30499/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010438.html" source="SUSE-SU"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2021-30499: Fixed a memory corruption issue when exporting troff sources (bsc#1184751).
- CVE-2021-30498: Fixed a memory corruption issue when exporting TGA images (bsc#1184752).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184751">SUSE bug 1184751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184752">SUSE bug 1184752</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30498/">CVE-2021-30498 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30498">CVE-2021-30498 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30499/">CVE-2021-30499 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30499">CVE-2021-30499 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670912" comment="libcaca-0.99.beta13b-49.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220102" version="1" class="patch">
	<metadata>
		<title>Security update for libcap-ng (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="876832" ref_url="https://bugzilla.suse.com/876832" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3215" ref_url="https://www.suse.com/security/cve/CVE-2014-3215/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002617.html" source="SUSE-SU"/>
		<description>
libcap-ng was updated to fix one security issue.

This security issue was fixed:

- CVE-2014-3215: seunshare in policycoreutils (which uses libcap-ng) is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which made it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges (bsc#876832).
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-03"/>
	<updated date="2017-02-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/876832">SUSE bug 876832</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3215/">CVE-2014-3215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3215">CVE-2014-3215 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583893" comment="libcap-ng-utils-0.6.3-1.9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583894" comment="libcap-ng0-0.6.3-1.9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583895" comment="libcap-ng0-32bit-0.6.3-1.9.6 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583893" comment="libcap-ng-utils-0.6.3-1.9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583894" comment="libcap-ng0-0.6.3-1.9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583895" comment="libcap-ng0-32bit-0.6.3-1.9.6 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220103" version="1" class="patch">
	<metadata>
		<title>Security update for libcares2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1007728" ref_url="https://bugzilla.suse.com/1007728" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5180" ref_url="https://www.suse.com/security/cve/CVE-2016-5180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002530.html" source="SUSE-SU"/>
		<description>

This update for libcares2 fixes the following issues:

- Add patch to fix single byte out of buffer write
  (CVE-2016-5180, bsc#1007728)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-29"/>
	<updated date="2016-12-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1007728">SUSE bug 1007728</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5180/">CVE-2016-5180 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5180">CVE-2016-5180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583896" comment="libcares2-1.7.4-7.9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583896" comment="libcares2-1.7.4-7.9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220104" version="1" class="patch">
	<metadata>
		<title>Security update for libcares2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1188881" ref_url="https://bugzilla.suse.com/1188881" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009278.html" source="SUSE-SU"/>
		<description>
This update for libcares2 fixes the following issues:

- CVE-2021-3672: Fixed input validation on hostnames (bsc#1188881).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-10"/>
	<updated date="2021-08-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188881">SUSE bug 1188881</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3672">CVE-2021-3672 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630425" comment="libcares2-1.7.4-7.10.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220105" version="1" class="patch">
	<metadata>
		<title>Security update for libcgroup1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1100365" ref_url="https://bugzilla.suse.com/1100365" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14348" ref_url="https://www.suse.com/security/cve/CVE-2018-14348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004358.html" source="SUSE-SU"/>
		<description>
This update for libcgroup1 fixes the following issues:

Security issue fixed:

- CVE-2018-14348: Fix daemon that creates /var/log/cgred with mode 0666 (bsc#1100365).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-30"/>
	<updated date="2018-07-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100365">SUSE bug 1100365</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14348/">CVE-2018-14348 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14348">CVE-2018-14348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583897" comment="libcgroup1-0.41.rc1-7.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583897" comment="libcgroup1-0.41.rc1-7.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220106" version="1" class="patch">
	<metadata>
		<title>Security update for libcroco (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1171685" ref_url="https://bugzilla.suse.com/1171685" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12825" ref_url="https://www.suse.com/security/cve/CVE-2020-12825/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009454.html" source="SUSE-SU"/>
		<description>
This update for libcroco fixes the following issues:

- CVE-2020-12825: Fixed recursion issue in block and any productions (bsc#1171685).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171685">SUSE bug 1171685</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12825/">CVE-2020-12825 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12825">CVE-2020-12825 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631920" comment="libcroco-0_6-3-0.6.1-122.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631921" comment="libcroco-0_6-3-32bit-0.6.1-122.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220107" version="1" class="patch">
	<metadata>
		<title>Security update for libdb-4_5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1043886" ref_url="https://bugzilla.suse.com/1043886" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:0409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003718.html" source="SUSE-SU"/>
		<description>
This update for libdb-4_5 fixes the following issues:

- A DB_CONFIG file in the current working directory allowed local
  users to obtain sensitive information via a symlink attack
  involving a setgid or setuid application using libdb-4_8. (bsc#1043886)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-09"/>
	<updated date="2018-02-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043886">SUSE bug 1043886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583898" comment="db-doc-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583899" comment="db-utils-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583900" comment="db-utils-doc-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583901" comment="libdb-4_5-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583902" comment="libdb-4_5-32bit-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583903" comment="libdb-4_5-x86-4.5.20-97.5 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583898" comment="db-doc-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583899" comment="db-utils-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583900" comment="db-utils-doc-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583901" comment="libdb-4_5-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583902" comment="libdb-4_5-32bit-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583903" comment="libdb-4_5-x86-4.5.20-97.5 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220108" version="1" class="patch">
	<metadata>
		<title>Security update for libesmtp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1160462" ref_url="https://bugzilla.suse.com/1160462" source="BUGZILLA"/>
		<reference ref_id="1189097" ref_url="https://bugzilla.suse.com/1189097" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19977" ref_url="https://www.suse.com/security/cve/CVE-2019-19977/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009358.html" source="SUSE-SU"/>
		<description>
This update for libesmtp fixes the following issues:

- CVE-2019-19977: Fixed stack-based buffer over-read in ntlm/ntlmstruct.c (bsc#1160462).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160462">SUSE bug 1160462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189097">SUSE bug 1189097</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19977/">CVE-2019-19977 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19977">CVE-2019-19977 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629509" comment="libesmtp-1.0.4-157.18.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220109" version="1" class="patch">
	<metadata>
		<title>Security update for libevent (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1022917" ref_url="https://bugzilla.suse.com/1022917" source="BUGZILLA"/>
		<reference ref_id="1022918" ref_url="https://bugzilla.suse.com/1022918" source="BUGZILLA"/>
		<reference ref_id="1022919" ref_url="https://bugzilla.suse.com/1022919" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10195" ref_url="https://www.suse.com/security/cve/CVE-2016-10195/" source="CVE"/>
		<reference ref_id="CVE-2016-10196" ref_url="https://www.suse.com/security/cve/CVE-2016-10196/" source="CVE"/>
		<reference ref_id="CVE-2016-10197" ref_url="https://www.suse.com/security/cve/CVE-2016-10197/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003659.html" source="SUSE-SU"/>
		<description>
This update for libevent fixes the following issues:

- CVE-2016-10195: DNS remote stack overread vulnerability (bsc#1022917) 
- CVE-2016-10196: stack/buffer overflow in evutil_parse_sockaddr_port() (bsc#1022918) (backport for 2.0.21)
- CVE-2016-10197: out-of-bounds read in search_make_new() (bsc#1022919) 
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-29"/>
	<updated date="2018-01-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022917">SUSE bug 1022917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022918">SUSE bug 1022918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022919">SUSE bug 1022919</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10195/">CVE-2016-10195 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10195">CVE-2016-10195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10196/">CVE-2016-10196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10196">CVE-2016-10196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10197/">CVE-2016-10197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10197">CVE-2016-10197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583904" comment="libevent-1_4-2-1.4.5-24.24.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583904" comment="libevent-1_4-2-1.4.5-24.24.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220110" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1059893" ref_url="https://bugzilla.suse.com/1059893" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003626.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following security issue:

- CVE-2017-7544: Fixed out-of-bounds heap read vulnerability in
  exif_data_save_data_entry function in libexif/exif-data.c caused by improper
  length computation of the allocated data of an ExifMnote entry which can cause
  denial-of-service or possibly information disclosure (bsc#1059893)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-24"/>
	<updated date="2018-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1059893">SUSE bug 1059893</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7544">CVE-2017-7544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583905" comment="libexif-0.6.17-2.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583906" comment="libexif-32bit-0.6.17-2.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583907" comment="libexif-x86-0.6.17-2.14.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583905" comment="libexif-0.6.17-2.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583906" comment="libexif-32bit-0.6.17-2.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583907" comment="libexif-x86-0.6.17-2.14.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220111" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006538.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-27"/>
	<updated date="2020-02-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20030">CVE-2018-20030 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9278">CVE-2019-9278 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583908" comment="libexif-0.6.17-2.14.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583909" comment="libexif-32bit-0.6.17-2.14.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220112" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="920057" ref_url="https://bugzilla.suse.com/920057" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3591" ref_url="https://www.suse.com/security/cve/CVE-2014-3591/" source="CVE"/>
		<reference ref_id="CVE-2015-0837" ref_url="https://www.suse.com/security/cve/CVE-2015-0837/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001602.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

* Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
  See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.
  (bsc#920057)
* Fixed data-dependent timing variations in modular exponentiation
  [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
  are Practical]
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-17"/>
	<updated date="2015-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/920057">SUSE bug 920057</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3591/">CVE-2014-3591 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3591">CVE-2014-3591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0837/">CVE-2015-0837 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0837">CVE-2015-0837 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578758" comment="libgcrypt11-1.5.0-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578759" comment="libgcrypt11-32bit-1.5.0-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578760" comment="libgcrypt11-x86-1.5.0-0.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578758" comment="libgcrypt11-1.5.0-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578759" comment="libgcrypt11-32bit-1.5.0-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578760" comment="libgcrypt11-x86-1.5.0-0.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220113" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="994157" ref_url="https://bugzilla.suse.com/994157" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6313" ref_url="https://www.suse.com/security/cve/CVE-2016-6313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002281.html" source="SUSE-SU"/>
		<description>

This update for libgcrypt fixes the following issues:

  - RNG prediction vulnerability (bsc#994157, CVE-2016-6313)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-21"/>
	<updated date="2016-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/994157">SUSE bug 994157</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6313/">CVE-2016-6313 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6313">CVE-2016-6313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583910" comment="libgcrypt11-1.5.0-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583911" comment="libgcrypt11-32bit-1.5.0-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583912" comment="libgcrypt11-x86-1.5.0-0.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583910" comment="libgcrypt11-1.5.0-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583911" comment="libgcrypt11-32bit-1.5.0-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583912" comment="libgcrypt11-x86-1.5.0-0.22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220114" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1046607" ref_url="https://bugzilla.suse.com/1046607" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7526" ref_url="https://www.suse.com/security/cve/CVE-2017-7526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003013.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

- CVE-2017-7526: Hardening a against local side-channel attack in RSA key handling has been added (bsc#1046607)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-06"/>
	<updated date="2017-07-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046607">SUSE bug 1046607</bugzilla>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7526/">CVE-2017-7526 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7526">CVE-2017-7526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583913" comment="libgcrypt11-1.5.0-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583914" comment="libgcrypt11-32bit-1.5.0-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583915" comment="libgcrypt11-x86-1.5.0-0.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583913" comment="libgcrypt11-1.5.0-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583914" comment="libgcrypt11-32bit-1.5.0-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583915" comment="libgcrypt11-x86-1.5.0-0.25.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220115" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1187212" ref_url="https://bugzilla.suse.com/1187212" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33560" ref_url="https://www.suse.com/security/cve/CVE-2021-33560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009053.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

- CVE-2021-33560: Fixed a side-channel against ElGamal encryption, caused by missing exponent blinding (bsc#1187212).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187212">SUSE bug 1187212</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33560/">CVE-2021-33560 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33560">CVE-2021-33560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583916" comment="libgcrypt11-1.5.0-0.26.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583917" comment="libgcrypt11-32bit-1.5.0-0.26.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220116" version="1" class="patch">
	<metadata>
		<title>Recommended update for libical (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1015964" ref_url="https://bugzilla.suse.com/1015964" source="BUGZILLA"/>
		<reference ref_id="1044995" ref_url="https://bugzilla.suse.com/1044995" source="BUGZILLA"/>
		<reference ref_id="986631" ref_url="https://bugzilla.suse.com/986631" source="BUGZILLA"/>
		<reference ref_id="986632" ref_url="https://bugzilla.suse.com/986632" source="BUGZILLA"/>
		<reference ref_id="986639" ref_url="https://bugzilla.suse.com/986639" source="BUGZILLA"/>
		<reference ref_id="986642" ref_url="https://bugzilla.suse.com/986642" source="BUGZILLA"/>
		<reference ref_id="986658" ref_url="https://bugzilla.suse.com/986658" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5823" ref_url="https://www.suse.com/security/cve/CVE-2016-5823/" source="CVE"/>
		<reference ref_id="CVE-2016-5824" ref_url="https://www.suse.com/security/cve/CVE-2016-5824/" source="CVE"/>
		<reference ref_id="CVE-2016-5825" ref_url="https://www.suse.com/security/cve/CVE-2016-5825/" source="CVE"/>
		<reference ref_id="CVE-2016-5826" ref_url="https://www.suse.com/security/cve/CVE-2016-5826/" source="CVE"/>
		<reference ref_id="CVE-2016-5827" ref_url="https://www.suse.com/security/cve/CVE-2016-5827/" source="CVE"/>
		<reference ref_id="CVE-2016-9584" ref_url="https://www.suse.com/security/cve/CVE-2016-9584/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003605.html" source="SUSE-SU"/>
		<description>
This update for libical fixes the following issues:

Security issues fixed:

- CVE-2016-5823: The icalproperty_new_clone function in libical 0.47 and 1.0 allows remote
  attackers to cause a denial of service (use-after-free) via a crafted ics file. (bnc#986632)
- CVE-2016-5824: libical 1.0 allows remote attackers to cause a denial of service (use-after-free)
  via a crafted ics file. (bsc#986639)
- CVE-2016-5825: The icalparser_parse_string function in libical 0.47 and 1.0 allows remote
  attackers to cause a denial of service (out-of-bounds heap read) via a crafted ics file.
  (bsc#986642)
- CVE-2016-5826: The parser_get_next_char function in libical 0.47 and 1.0 allows remote attackers
  to cause a denial of service (out-of-bounds heap read) by crafting a string to the
  icalparser_parse_string function. (bsc#986658)
- CVE-2016-5827: The icaltime_from_string function in libical 0.47 and 1.0 allows remote attackers
  to cause a denial of service (out-of-bounds heap read) via a crafted string to the
  icalparser_parse_string function. (bsc#986631)
- CVE-2016-9584: libical allows remote attackers to cause a denial of service (use-after-free) and
  possibly read heap memory via a crafted ics file. (bnc#1015964)

Bug fixes:

- libical crashes while parsing timezones (bsc#1044995)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-17"/>
	<updated date="2018-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015964">SUSE bug 1015964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044995">SUSE bug 1044995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986631">SUSE bug 986631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986632">SUSE bug 986632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986642">SUSE bug 986642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986658">SUSE bug 986658</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5823/">CVE-2016-5823 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5823">CVE-2016-5823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5824/">CVE-2016-5824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5824">CVE-2016-5824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5825/">CVE-2016-5825 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5825">CVE-2016-5825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5826/">CVE-2016-5826 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5826">CVE-2016-5826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5827/">CVE-2016-5827 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5827">CVE-2016-5827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9584/">CVE-2016-9584 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9584">CVE-2016-9584 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583918" comment="libical0-0.43-1.10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564664" comment="libical0-32bit-0.43-1.10.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583918" comment="libical0-0.43-1.10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564664" comment="libical0-32bit-0.43-1.10.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220117" version="1" class="patch">
	<metadata>
		<title>Security update for libidn (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="923241" ref_url="https://bugzilla.suse.com/923241" source="BUGZILLA"/>
		<reference ref_id="990189" ref_url="https://bugzilla.suse.com/990189" source="BUGZILLA"/>
		<reference ref_id="990190" ref_url="https://bugzilla.suse.com/990190" source="BUGZILLA"/>
		<reference ref_id="990191" ref_url="https://bugzilla.suse.com/990191" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059/" source="CVE"/>
		<reference ref_id="CVE-2015-8948" ref_url="https://www.suse.com/security/cve/CVE-2015-8948/" source="CVE"/>
		<reference ref_id="CVE-2016-6261" ref_url="https://www.suse.com/security/cve/CVE-2016-6261/" source="CVE"/>
		<reference ref_id="CVE-2016-6262" ref_url="https://www.suse.com/security/cve/CVE-2016-6262/" source="CVE"/>
		<reference ref_id="CVE-2016-6263" ref_url="https://www.suse.com/security/cve/CVE-2016-6263/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002269.html" source="SUSE-SU"/>
		<description>

This update for libidn fixes the following issues:

- CVE-2016-6262 and CVE-2015-8948: Out-of-bounds-read when reading one zero byte as input (bsc#990189)

- CVE-2016-6261: Out-of-bounds stack read in idna_to_ascii_4i (bsc#990190) 

- CVE-2016-6263: stringprep_utf8_nfkc_normalize reject invalid UTF-8 (bsc#990191)

- CVE-2015-2059: out-of-bounds read with stringprep on invalid UTF-8 (bsc#923241) 

		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-12"/>
	<updated date="2016-09-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/923241">SUSE bug 923241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990189">SUSE bug 990189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990190">SUSE bug 990190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990191">SUSE bug 990191</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2059">CVE-2015-2059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8948/">CVE-2015-8948 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8948">CVE-2015-8948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6261/">CVE-2016-6261 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6261">CVE-2016-6261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6262/">CVE-2016-6262 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6262">CVE-2016-6262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6263/">CVE-2016-6263 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6263">CVE-2016-6263 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583919" comment="libidn-1.10-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583920" comment="libidn-32bit-1.10-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583921" comment="libidn-x86-1.10-6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583919" comment="libidn-1.10-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583920" comment="libidn-32bit-1.10-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583921" comment="libidn-x86-1.10-6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220118" version="1" class="patch">
	<metadata>
		<title>Security update for libidn (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1056450" ref_url="https://bugzilla.suse.com/1056450" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14062" ref_url="https://www.suse.com/security/cve/CVE-2017-14062/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003879.html" source="SUSE-SU"/>
		<description>
This update for libidn fixes one issues.

This security issue was fixed:

- CVE-2017-14062: Prevent integer overflow in the decode_digit function that
  allowed remote attackers to cause a denial of service or possibly have
  unspecified other impact (bsc#1056450).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-08"/>
	<updated date="2018-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056450">SUSE bug 1056450</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14062/">CVE-2017-14062 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14062">CVE-2017-14062 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583922" comment="libidn-1.10-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583923" comment="libidn-32bit-1.10-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583924" comment="libidn-x86-1.10-7.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583922" comment="libidn-1.10-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583923" comment="libidn-32bit-1.10-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583924" comment="libidn-x86-1.10-7.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220119" version="1" class="patch">
	<metadata>
		<title>Security update for libksba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="979261" ref_url="https://bugzilla.suse.com/979261" source="BUGZILLA"/>
		<reference ref_id="979906" ref_url="https://bugzilla.suse.com/979906" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4574" ref_url="https://www.suse.com/security/cve/CVE-2016-4574/" source="CVE"/>
		<reference ref_id="CVE-2016-4579" ref_url="https://www.suse.com/security/cve/CVE-2016-4579/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002098.html" source="SUSE-SU"/>
		<description>

This update for libksba fixes the following issues:

- CVE-2016-4579: Out-of-bounds read in _ksba_ber_parse_tl()
- CVE-2016-4574: two OOB read access bugs (remote DoS) (bsc#979261)

Also adding reliability fixes from v1.3.4.

		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-07"/>
	<updated date="2016-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/979261">SUSE bug 979261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979906">SUSE bug 979906</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4574/">CVE-2016-4574 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4574">CVE-2016-4574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4579/">CVE-2016-4579 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4579">CVE-2016-4579 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583925" comment="libksba-1.0.4-1.25.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583925" comment="libksba-1.0.4-1.25.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220120" version="1" class="patch">
	<metadata>
		<title>Security update for libksba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="926826" ref_url="https://bugzilla.suse.com/926826" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2016:0008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001774.html" source="SUSE-SU"/>
		<description>
The libksba package was updated to fix the following security issues:

- Fixed an integer overflow, an out of bounds read and a stack overflow issues (bsc#926826).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-23"/>
	<updated date="2015-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926826">SUSE bug 926826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578778" comment="libksba-1.0.4-1.20.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578778" comment="libksba-1.0.4-1.20.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220121" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1056090" ref_url="https://bugzilla.suse.com/1056090" source="BUGZILLA"/>
		<reference ref_id="1056093" ref_url="https://bugzilla.suse.com/1056093" source="BUGZILLA"/>
		<reference ref_id="1056095" ref_url="https://bugzilla.suse.com/1056095" source="BUGZILLA"/>
		<reference ref_id="1056097" ref_url="https://bugzilla.suse.com/1056097" source="BUGZILLA"/>
		<reference ref_id="1056101" ref_url="https://bugzilla.suse.com/1056101" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13739" ref_url="https://www.suse.com/security/cve/CVE-2017-13739/" source="CVE"/>
		<reference ref_id="CVE-2017-13740" ref_url="https://www.suse.com/security/cve/CVE-2017-13740/" source="CVE"/>
		<reference ref_id="CVE-2017-13741" ref_url="https://www.suse.com/security/cve/CVE-2017-13741/" source="CVE"/>
		<reference ref_id="CVE-2017-13743" ref_url="https://www.suse.com/security/cve/CVE-2017-13743/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003262.html" source="SUSE-SU"/>
		<description>
This update for liblouis fixes several issues.

These security issues were fixed:

- CVE-2017-13739: Prevent heap-based buffer overflow in the function resolveSubtable() that could have caused DoS or remote code execution (bsc#1056101)
- CVE-2017-13740: Prevent stack-based buffer overflow in the function parseChars() that could have caused DoS or possibly unspecified other impact (bsc#1056097)  ()
- CVE-2017-13741: Prevent use-after-free in function compileBrailleIndicator() that allowed to cause remote DoS (bsc#1056095)
- CVE_2017-13742: Prevent stack-based buffer overflow in function includeFile that allowed to cause remote DoS (bsc#1056093).
- CVE-2017-13743: Prevent buffer overflow triggered in the function _lou_showString() that allowed to cause remote DoS (bsc#1056090)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-28"/>
	<updated date="2017-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056090">SUSE bug 1056090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056093">SUSE bug 1056093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056095">SUSE bug 1056095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056097">SUSE bug 1056097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056101">SUSE bug 1056101</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13739/">CVE-2017-13739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13739">CVE-2017-13739 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13740/">CVE-2017-13740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13740">CVE-2017-13740 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13741/">CVE-2017-13741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13741">CVE-2017-13741 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13743/">CVE-2017-13743 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13743">CVE-2017-13743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583926" comment="liblouis-1.7.0-1.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583927" comment="liblouis0-1.7.0-1.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583928" comment="python-louis-1.7.0-1.3.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583926" comment="liblouis-1.7.0-1.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583927" comment="liblouis0-1.7.0-1.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583928" comment="python-louis-1.7.0-1.3.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220122" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1062458" ref_url="https://bugzilla.suse.com/1062458" source="BUGZILLA"/>
		<reference ref_id="1067336" ref_url="https://bugzilla.suse.com/1067336" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8184" ref_url="https://www.suse.com/security/cve/CVE-2014-8184/" source="CVE"/>
		<reference ref_id="CVE-2017-15101" ref_url="https://www.suse.com/security/cve/CVE-2017-15101/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003411.html" source="SUSE-SU"/>
		<description>
This update for liblouis fixes the following issues:

Security issues fixed:

- CVE-2017-15101: Buffer overflow in findTable (bsc#1067336).
- CVE-2014-8184: stack-based buffer overflow in findTable() (bsc#1062458).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-24"/>
	<updated date="2017-11-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062458">SUSE bug 1062458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067336">SUSE bug 1067336</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-8184/">CVE-2014-8184 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8184">CVE-2014-8184 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15101/">CVE-2017-15101 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15101">CVE-2017-15101 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583929" comment="liblouis-1.7.0-1.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583930" comment="liblouis0-1.7.0-1.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583931" comment="python-louis-1.7.0-1.3.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583929" comment="liblouis-1.7.0-1.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583930" comment="liblouis0-1.7.0-1.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583931" comment="python-louis-1.7.0-1.3.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220123" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1095825" ref_url="https://bugzilla.suse.com/1095825" source="BUGZILLA"/>
		<reference ref_id="1095826" ref_url="https://bugzilla.suse.com/1095826" source="BUGZILLA"/>
		<reference ref_id="1095827" ref_url="https://bugzilla.suse.com/1095827" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11683" ref_url="https://www.suse.com/security/cve/CVE-2018-11683/" source="CVE"/>
		<reference ref_id="CVE-2018-11684" ref_url="https://www.suse.com/security/cve/CVE-2018-11684/" source="CVE"/>
		<reference ref_id="CVE-2018-11685" ref_url="https://www.suse.com/security/cve/CVE-2018-11685/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004520.html" source="SUSE-SU"/>
		<description>
This update for liblouis, python-louis fixes the following issues:

Security issues fixed:

- CVE-2018-11684: Fixed stack-based buffer overflow in the function
  includeFile() in compileTranslationTable.c (bsc#1095826)
- CVE-2018-11685: Fixed a stack-based buffer overflow in the function
  compileHyphenation() in compileTranslationTable.c (bsc#1095825)
- CVE-2018-11683: Fix a stack-based buffer overflow in the function parseChars()
  in compileTranslationTable.c (bsc#1095827)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-31"/>
	<updated date="2018-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1095825">SUSE bug 1095825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095826">SUSE bug 1095826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095827">SUSE bug 1095827</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11683/">CVE-2018-11683 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11683">CVE-2018-11683 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11684/">CVE-2018-11684 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11684">CVE-2018-11684 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11685/">CVE-2018-11685 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11685">CVE-2018-11685 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583932" comment="liblouis-1.7.0-1.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583933" comment="liblouis0-1.7.0-1.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583934" comment="python-louis-1.7.0-1.3.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583932" comment="liblouis-1.7.0-1.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583933" comment="liblouis0-1.7.0-1.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583934" comment="python-louis-1.7.0-1.3.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220124" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1109319" ref_url="https://bugzilla.suse.com/1109319" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17294" ref_url="https://www.suse.com/security/cve/CVE-2018-17294/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005267.html" source="SUSE-SU"/>
		<description>
This update for liblouis and python-louis fixes the following issue:

Security issue fixed: 

- CVE-2018-17294: Fixed an out of bounds read in matchCurrentInput function
  which could allow a remote attacker to cause Denail of Service (bsc#1109319).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1109319">SUSE bug 1109319</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17294/">CVE-2018-17294 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17294">CVE-2018-17294 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583935" comment="liblouis-1.7.0-1.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583936" comment="liblouis0-1.7.0-1.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583937" comment="python-louis-1.7.0-1.3.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583935" comment="liblouis-1.7.0-1.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583936" comment="liblouis0-1.7.0-1.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583937" comment="python-louis-1.7.0-1.3.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220125" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="934524" ref_url="https://bugzilla.suse.com/934524" source="BUGZILLA"/>
		<reference ref_id="934525" ref_url="https://bugzilla.suse.com/934525" source="BUGZILLA"/>
		<reference ref_id="934526" ref_url="https://bugzilla.suse.com/934526" source="BUGZILLA"/>
		<reference ref_id="934527" ref_url="https://bugzilla.suse.com/934527" source="BUGZILLA"/>
		<reference ref_id="934528" ref_url="https://bugzilla.suse.com/934528" source="BUGZILLA"/>
		<reference ref_id="934529" ref_url="https://bugzilla.suse.com/934529" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9732" ref_url="https://www.suse.com/security/cve/CVE-2014-9732/" source="CVE"/>
		<reference ref_id="CVE-2015-4467" ref_url="https://www.suse.com/security/cve/CVE-2015-4467/" source="CVE"/>
		<reference ref_id="CVE-2015-4469" ref_url="https://www.suse.com/security/cve/CVE-2015-4469/" source="CVE"/>
		<reference ref_id="CVE-2015-4470" ref_url="https://www.suse.com/security/cve/CVE-2015-4470/" source="CVE"/>
		<reference ref_id="CVE-2015-4471" ref_url="https://www.suse.com/security/cve/CVE-2015-4471/" source="CVE"/>
		<reference ref_id="CVE-2015-4472" ref_url="https://www.suse.com/security/cve/CVE-2015-4472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001720.html" source="SUSE-SU"/>
		<description>
libmspack was updated to fix several security vulnerabilities.

- Fix null pointer dereference on a crafted CAB. (bsc#934524, CVE-2014-9732)
- Fix denial of service while processing crafted CHM file. (bsc#934525, CVE-2015-4467)
- Fix denial of service while processing crafted CHM file. (bsc#934529, CVE-2015-4472)
- Fix pointer arithmetic overflow during CHM decompression. (bsc#934526, CVE-2015-4469)
- Fix off-by-one buffer over-read in mspack/mszipd.c. (bsc#934527, CVE-2015-4470)
- Fix off-by-one buffer under-read in mspack/lzxd.c. (bsc#934528, CVE-2015-4471)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934525">SUSE bug 934525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934526">SUSE bug 934526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934527">SUSE bug 934527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934528">SUSE bug 934528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934529">SUSE bug 934529</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9732/">CVE-2014-9732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9732">CVE-2014-9732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4467/">CVE-2015-4467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4467">CVE-2015-4467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4469/">CVE-2015-4469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4469">CVE-2015-4469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4470/">CVE-2015-4470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4470">CVE-2015-4470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4471/">CVE-2015-4471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4471">CVE-2015-4471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4472/">CVE-2015-4472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4472">CVE-2015-4472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578786" comment="libmspack0-0.0.20060920alpha-74.10.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578786" comment="libmspack0-0.0.20060920alpha-74.10.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220126" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1113038" ref_url="https://bugzilla.suse.com/1113038" source="BUGZILLA"/>
		<reference ref_id="1113039" ref_url="https://bugzilla.suse.com/1113039" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18584" ref_url="https://www.suse.com/security/cve/CVE-2018-18584/" source="CVE"/>
		<reference ref_id="CVE-2018-18585" ref_url="https://www.suse.com/security/cve/CVE-2018-18585/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005252.html" source="SUSE-SU"/>
		<description>
This update for libmspack fixes the following issues:

Security issues fixed:

- CVE-2018-18584: The CAB block input buffer was one byte too small for the maximal Quantum block, leading to an out-of-bounds write. (bsc#1113038)
- CVE-2018-18585: chmd_read_headers accepted a filename that has '\0' as its first or second character (such as the '/\0' name). (bsc#1113039)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1113038">SUSE bug 1113038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113039">SUSE bug 1113039</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18584/">CVE-2018-18584 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18584">CVE-2018-18584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18585/">CVE-2018-18585 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18585">CVE-2018-18585 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583938" comment="libmspack0-0.0.20060920alpha-74.11.6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583938" comment="libmspack0-0.0.20060920alpha-74.11.6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220127" version="1" class="patch">
	<metadata>
		<title>Security update for libotr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="969785" ref_url="https://bugzilla.suse.com/969785" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2851" ref_url="https://www.suse.com/security/cve/CVE-2016-2851/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001918.html" source="SUSE-SU"/>
		<description>

This update for libotr fixes the following issues:

- Apply 'libotr-CVE-2016-2851.patch' to fix integer overflows that
  used to occur on 64-bit architectures when receiving 4GB messages.
  This flaw could potentially have been exploited by an attacker to
  remotely execute arbitrary code on the user's machine.
  (CVE-2016-2851, bsc#969785)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-09"/>
	<updated date="2016-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/969785">SUSE bug 969785</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2851/">CVE-2016-2851 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2851">CVE-2016-2851 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583939" comment="libotr2-3.2.0-10.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583939" comment="libotr2-3.2.0-10.5.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220128" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="952051" ref_url="https://bugzilla.suse.com/952051" source="BUGZILLA"/>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001682.html" source="SUSE-SU"/>
		<description>
The libpng12-0 package was updated to fix the following security issues:

- CVE-2015-8126: Fixed a buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions (bsc#954980).
- CVE-2015-7981: Fixed an out-of-bound read (bsc#952051).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-18"/>
	<updated date="2015-11-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952051">SUSE bug 952051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7981">CVE-2015-7981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578811" comment="libpng12-0-1.2.31-5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578812" comment="libpng12-0-32bit-1.2.31-5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578813" comment="libpng12-0-x86-1.2.31-5.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578811" comment="libpng12-0-1.2.31-5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578812" comment="libpng12-0-32bit-1.2.31-5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578813" comment="libpng12-0-x86-1.2.31-5.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220129" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001790.html" source="SUSE-SU"/>
		<description>
- security update:
   This update fixes the following securit issue:

   * CVE-2015-8126 Multiple buffer overflows in the png_set_PLTE and png_get_PLTE functions
     allow remote attackers to cause a denial of service (application crash) or possibly have 
     unspecified other impact [bsc#954980]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-08"/>
	<updated date="2016-01-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578814" comment="libpng12-0-1.2.31-5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578815" comment="libpng12-0-32bit-1.2.31-5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578816" comment="libpng12-0-x86-1.2.31-5.38.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578814" comment="libpng12-0-1.2.31-5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578815" comment="libpng12-0-32bit-1.2.31-5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578816" comment="libpng12-0-x86-1.2.31-5.38.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220130" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1017646" ref_url="https://bugzilla.suse.com/1017646" source="BUGZILLA"/>
		<reference ref_id="958791" ref_url="https://bugzilla.suse.com/958791" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002778.html" source="SUSE-SU"/>
		<description>

This update for libpng12-0 fixes the following issues:

Security issues fixed:
- CVE-2015-8540: read underflow in libpng (bsc#958791)
- CVE-2016-10087: NULL pointer dereference in png_set_text_2() (bsc#1017646)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-31"/>
	<updated date="2017-03-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017646">SUSE bug 1017646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958791">SUSE bug 958791</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8540">CVE-2015-8540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10087">CVE-2016-10087 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583940" comment="libpng12-0-1.2.31-5.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583941" comment="libpng12-0-32bit-1.2.31-5.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583942" comment="libpng12-0-x86-1.2.31-5.43.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583940" comment="libpng12-0-1.2.31-5.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583941" comment="libpng12-0-32bit-1.2.31-5.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583942" comment="libpng12-0-x86-1.2.31-5.43.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220131" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="840753" ref_url="https://bugzilla.suse.com/840753" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1881" ref_url="https://www.suse.com/security/cve/CVE-2013-1881/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001637.html" source="SUSE-SU"/>
		<description>
librsvg was updated to fix one security issue.

This security issue was fixed:
- CVE-2013-1881: GNOME libsvg allowed remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue (bsc#840753).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-12"/>
	<updated date="2015-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/840753">SUSE bug 840753</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1881/">CVE-2013-1881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1881">CVE-2013-1881 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578891" comment="librsvg-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578892" comment="librsvg-32bit-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578893" comment="librsvg-x86-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578894" comment="rsvg-view-2.26.0-2.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578891" comment="librsvg-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578892" comment="librsvg-32bit-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578893" comment="librsvg-x86-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578894" comment="rsvg-view-2.26.0-2.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220132" version="1" class="patch">
	<metadata>
		<title>Security update for libsamplerate (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1033564" ref_url="https://bugzilla.suse.com/1033564" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7697" ref_url="https://www.suse.com/security/cve/CVE-2017-7697/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002819.html" source="SUSE-SU"/>
		<description>

This update for libsamplerate fixes the following issues:

- CVE-2017-7697: Fixed a buffer overflow in calc_output_single.  (bsc#1033564)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-19"/>
	<updated date="2017-04-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033564">SUSE bug 1033564</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7697/">CVE-2017-7697 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7697">CVE-2017-7697 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583943" comment="libsamplerate-0.1.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583944" comment="libsamplerate-32bit-0.1.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583945" comment="libsamplerate-x86-0.1.4-3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583943" comment="libsamplerate-0.1.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583944" comment="libsamplerate-32bit-0.1.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583945" comment="libsamplerate-x86-0.1.4-3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220133" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="953516" ref_url="https://bugzilla.suse.com/953516" source="BUGZILLA"/>
		<reference ref_id="953521" ref_url="https://bugzilla.suse.com/953521" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9756" ref_url="https://www.suse.com/security/cve/CVE-2014-9756/" source="CVE"/>
		<reference ref_id="CVE-2015-7805" ref_url="https://www.suse.com/security/cve/CVE-2015-7805/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001676.html" source="SUSE-SU"/>
		<description>
The libsndfile package was updated to fix the following security issue:

- CVE-2014-9756: Fixed a divide by zero problem that can lead to a Denial of Service (DoS) (bsc#953521).
- CVE-2015-7805: Fixed heap overflow issue (bsc#953516).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-12"/>
	<updated date="2015-11-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/953516">SUSE bug 953516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953521">SUSE bug 953521</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9756/">CVE-2014-9756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9756">CVE-2014-9756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7805/">CVE-2015-7805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7805">CVE-2015-7805 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578898" comment="libsndfile-1.0.20-2.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578899" comment="libsndfile-32bit-1.0.20-2.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578900" comment="libsndfile-x86-1.0.20-2.10.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578898" comment="libsndfile-1.0.20-2.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578899" comment="libsndfile-32bit-1.0.20-2.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578900" comment="libsndfile-x86-1.0.20-2.10.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220134" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1033054" ref_url="https://bugzilla.suse.com/1033054" source="BUGZILLA"/>
		<reference ref_id="1033914" ref_url="https://bugzilla.suse.com/1033914" source="BUGZILLA"/>
		<reference ref_id="1033915" ref_url="https://bugzilla.suse.com/1033915" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7585" ref_url="https://www.suse.com/security/cve/CVE-2017-7585/" source="CVE"/>
		<reference ref_id="CVE-2017-7741" ref_url="https://www.suse.com/security/cve/CVE-2017-7741/" source="CVE"/>
		<reference ref_id="CVE-2017-7742" ref_url="https://www.suse.com/security/cve/CVE-2017-7742/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002804.html" source="SUSE-SU"/>
		<description>

This update for libsndfile fixes the following issues:

- CVE-2017-7585,CVE-2017-7741,CVE-2017-7742: Some stack-based buffer overflows via a specially crafted FLAC
  file were fixed (error in the 'flac_buffer_copy()' function) (bsc#1033054, bsc#1033914, bsc#1033915).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033054">SUSE bug 1033054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033914">SUSE bug 1033914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033915">SUSE bug 1033915</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7585/">CVE-2017-7585 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7585">CVE-2017-7585 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7741/">CVE-2017-7741 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7741">CVE-2017-7741 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7742/">CVE-2017-7742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7742">CVE-2017-7742 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583946" comment="libsndfile-1.0.20-2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583947" comment="libsndfile-32bit-1.0.20-2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583948" comment="libsndfile-x86-1.0.20-2.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583946" comment="libsndfile-1.0.20-2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583947" comment="libsndfile-32bit-1.0.20-2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583948" comment="libsndfile-x86-1.0.20-2.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220135" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1033054" ref_url="https://bugzilla.suse.com/1033054" source="BUGZILLA"/>
		<reference ref_id="1033914" ref_url="https://bugzilla.suse.com/1033914" source="BUGZILLA"/>
		<reference ref_id="1033915" ref_url="https://bugzilla.suse.com/1033915" source="BUGZILLA"/>
		<reference ref_id="1036943" ref_url="https://bugzilla.suse.com/1036943" source="BUGZILLA"/>
		<reference ref_id="1036944" ref_url="https://bugzilla.suse.com/1036944" source="BUGZILLA"/>
		<reference ref_id="1036945" ref_url="https://bugzilla.suse.com/1036945" source="BUGZILLA"/>
		<reference ref_id="1036946" ref_url="https://bugzilla.suse.com/1036946" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7585" ref_url="https://www.suse.com/security/cve/CVE-2017-7585/" source="CVE"/>
		<reference ref_id="CVE-2017-7741" ref_url="https://www.suse.com/security/cve/CVE-2017-7741/" source="CVE"/>
		<reference ref_id="CVE-2017-7742" ref_url="https://www.suse.com/security/cve/CVE-2017-7742/" source="CVE"/>
		<reference ref_id="CVE-2017-8361" ref_url="https://www.suse.com/security/cve/CVE-2017-8361/" source="CVE"/>
		<reference ref_id="CVE-2017-8362" ref_url="https://www.suse.com/security/cve/CVE-2017-8362/" source="CVE"/>
		<reference ref_id="CVE-2017-8363" ref_url="https://www.suse.com/security/cve/CVE-2017-8363/" source="CVE"/>
		<reference ref_id="CVE-2017-8365" ref_url="https://www.suse.com/security/cve/CVE-2017-8365/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002854.html" source="SUSE-SU"/>
		<description>

This update for libsndfile fixes the following issues:

- CVE-2017-8362: invalid memory read in flac_buffer_copy (flac.c) (bsc#1036943)
- CVE-2017-8365: global buffer overflow in i2les_array (pcm.c) (bsc#1036946)
- CVE-2017-8361: global buffer overflow in flac_buffer_copy (flac.c) (bsc#1036944)
- CVE-2017-8363: heap-based buffer overflow in flac_buffer_copy (flac.c) (bsc#1036945)
- CVE-2017-7585: stack-based buffer overflow via a specially crafted FLAC file (bsc#1033054)
   		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-10"/>
	<updated date="2017-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033054">SUSE bug 1033054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033914">SUSE bug 1033914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033915">SUSE bug 1033915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036943">SUSE bug 1036943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036944">SUSE bug 1036944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036945">SUSE bug 1036945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036946">SUSE bug 1036946</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7585/">CVE-2017-7585 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7585">CVE-2017-7585 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7741/">CVE-2017-7741 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7741">CVE-2017-7741 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7742/">CVE-2017-7742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7742">CVE-2017-7742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8361/">CVE-2017-8361 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8361">CVE-2017-8361 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8362/">CVE-2017-8362 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8362">CVE-2017-8362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8363/">CVE-2017-8363 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8363">CVE-2017-8363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8365/">CVE-2017-8365 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8365">CVE-2017-8365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583949" comment="libsndfile-1.0.20-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583950" comment="libsndfile-32bit-1.0.20-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583951" comment="libsndfile-x86-1.0.20-2.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583949" comment="libsndfile-1.0.20-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583950" comment="libsndfile-32bit-1.0.20-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583951" comment="libsndfile-x86-1.0.20-2.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220136" version="1" class="patch">
	<metadata>
		<title>Recommended update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1038856" ref_url="https://bugzilla.suse.com/1038856" source="BUGZILLA"/>
		<reference ref_id="1059911" ref_url="https://bugzilla.suse.com/1059911" source="BUGZILLA"/>
		<reference ref_id="1059912" ref_url="https://bugzilla.suse.com/1059912" source="BUGZILLA"/>
		<reference ref_id="1059913" ref_url="https://bugzilla.suse.com/1059913" source="BUGZILLA"/>
		<reference ref_id="1069874" ref_url="https://bugzilla.suse.com/1069874" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14245" ref_url="https://www.suse.com/security/cve/CVE-2017-14245/" source="CVE"/>
		<reference ref_id="CVE-2017-14246" ref_url="https://www.suse.com/security/cve/CVE-2017-14246/" source="CVE"/>
		<reference ref_id="CVE-2017-14634" ref_url="https://www.suse.com/security/cve/CVE-2017-14634/" source="CVE"/>
		<reference ref_id="CVE-2017-16942" ref_url="https://www.suse.com/security/cve/CVE-2017-16942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003704.html" source="SUSE-SU"/>
		<description>

- This update for libsndfile fixes a memory leak in an error path.(bsc#1038856)

- CVE-2017-16942: A divide-by-zero error exists in the function wav_w64_read_fmt_chunk() in wav_w64.c, which may lead to DoS when playing a crafted audio file. (bsc#1069874)
- CVE-2017-14634: In libsndfile 1.0.28, a divide-by-zero error exists in the function double64_init() in double64.c, which may lead to DoS when playing a crafted audio file. (bsc#1059911)
- CVE-2017-14245: An out of bounds read in the function d2alaw_array() in alaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of 
                  the NAN and INFINITY floating-point values. (bsc#1059912)
- CVE-2017-14246: An out of bounds read in the function d2ulaw_array() in ulaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of 
                  the NAN and INFINITY floating-point values.(bsc#1059913)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-02"/>
	<updated date="2018-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1038856">SUSE bug 1038856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059911">SUSE bug 1059911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059912">SUSE bug 1059912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059913">SUSE bug 1059913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069874">SUSE bug 1069874</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14245/">CVE-2017-14245 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14245">CVE-2017-14245 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14246/">CVE-2017-14246 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14246">CVE-2017-14246 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14634/">CVE-2017-14634 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14634">CVE-2017-14634 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16942/">CVE-2017-16942 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16942">CVE-2017-16942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583952" comment="libsndfile-1.0.20-2.19.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583953" comment="libsndfile-32bit-1.0.20-2.19.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583954" comment="libsndfile-x86-1.0.20-2.19.7.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583952" comment="libsndfile-1.0.20-2.19.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583953" comment="libsndfile-32bit-1.0.20-2.19.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583954" comment="libsndfile-x86-1.0.20-2.19.7.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220137" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1071767" ref_url="https://bugzilla.suse.com/1071767" source="BUGZILLA"/>
		<reference ref_id="1071777" ref_url="https://bugzilla.suse.com/1071777" source="BUGZILLA"/>
		<reference ref_id="1117954" ref_url="https://bugzilla.suse.com/1117954" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17456" ref_url="https://www.suse.com/security/cve/CVE-2017-17456/" source="CVE"/>
		<reference ref_id="CVE-2017-17457" ref_url="https://www.suse.com/security/cve/CVE-2017-17457/" source="CVE"/>
		<reference ref_id="CVE-2018-19758" ref_url="https://www.suse.com/security/cve/CVE-2018-19758/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005286.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

Security issues fixed:

- CVE-2017-17456: Prevent segmentation fault in the function d2alaw_array() that may have lead to a remote DoS (bsc#1071777).
- CVE-2017-17457: Prevent segmentation fault in the function d2ulaw_array() that may have lead to a remote DoS, a different vulnerability than CVE-2017-14246 (bsc#1071767).
- CVE-2018-19758: Fixed a heap-based buffer over-read at wav.c in wav_write_header that could have been used for a denial of service attack (bsc#1117954).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-02"/>
	<updated date="2019-04-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1071767">SUSE bug 1071767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071777">SUSE bug 1071777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117954">SUSE bug 1117954</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17456/">CVE-2017-17456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17456">CVE-2017-17456 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17457/">CVE-2017-17457 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17457">CVE-2017-17457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19758/">CVE-2018-19758 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19758">CVE-2018-19758 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583955" comment="libsndfile-1.0.20-2.19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583956" comment="libsndfile-32bit-1.0.20-2.19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583957" comment="libsndfile-x86-1.0.20-2.19.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583955" comment="libsndfile-1.0.20-2.19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583956" comment="libsndfile-32bit-1.0.20-2.19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583957" comment="libsndfile-x86-1.0.20-2.19.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220138" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1188540" ref_url="https://bugzilla.suse.com/1188540" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3246" ref_url="https://www.suse.com/security/cve/CVE-2021-3246/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009219.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2021-3246: Fixed a heap buffer overflow vulnerability in msadpcm_decode_block. (bsc#1188540)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1188540">SUSE bug 1188540</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3246/">CVE-2021-3246 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3246">CVE-2021-3246 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626762" comment="libsndfile-1.0.20-2.19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626763" comment="libsndfile-32bit-1.0.20-2.19.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220139" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1194006" ref_url="https://bugzilla.suse.com/1194006" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4156" ref_url="https://www.suse.com/security/cve/CVE-2021-4156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009970.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2021-4156: Fixed heap buffer overflow in flac_buffer_copy that
could potentially lead to heap exploitation (bsc#1194006).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-05"/>
	<updated date="2022-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194006">SUSE bug 1194006</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4156/">CVE-2021-4156 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4156">CVE-2021-4156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662534" comment="libsndfile-1.0.20-2.19.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662535" comment="libsndfile-32bit-1.0.20-2.19.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220140" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="961964" ref_url="https://bugzilla.suse.com/961964" source="BUGZILLA"/>
		<reference ref_id="967026" ref_url="https://bugzilla.suse.com/967026" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0787" ref_url="https://www.suse.com/security/cve/CVE-2016-0787/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001923.html" source="SUSE-SU"/>
		<description>

This update for libssh2_org fixes the following issues: 

- Add SHA256 support for DH group exchange (fate#320343, bsc#961964)

- fix CVE-2016-0787 (bsc#967026)
  * Weakness in diffie-hellman secret key generation lead to much shorter DH groups
    then needed, which could be used to retrieve server keys.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-11"/>
	<updated date="2016-03-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/961964">SUSE bug 961964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967026">SUSE bug 967026</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0787/">CVE-2016-0787 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0787">CVE-2016-0787 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583958" comment="libssh2-1-1.2.9-4.2.6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583958" comment="libssh2-1-1.2.9-4.2.6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220141" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1128471" ref_url="https://bugzilla.suse.com/1128471" source="BUGZILLA"/>
		<reference ref_id="1128472" ref_url="https://bugzilla.suse.com/1128472" source="BUGZILLA"/>
		<reference ref_id="1128474" ref_url="https://bugzilla.suse.com/1128474" source="BUGZILLA"/>
		<reference ref_id="1128476" ref_url="https://bugzilla.suse.com/1128476" source="BUGZILLA"/>
		<reference ref_id="1128480" ref_url="https://bugzilla.suse.com/1128480" source="BUGZILLA"/>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1128490" ref_url="https://bugzilla.suse.com/1128490" source="BUGZILLA"/>
		<reference ref_id="1128492" ref_url="https://bugzilla.suse.com/1128492" source="BUGZILLA"/>
		<reference ref_id="1128493" ref_url="https://bugzilla.suse.com/1128493" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855/" source="CVE"/>
		<reference ref_id="CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856/" source="CVE"/>
		<reference ref_id="CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857/" source="CVE"/>
		<reference ref_id="CVE-2019-3858" ref_url="https://www.suse.com/security/cve/CVE-2019-3858/" source="CVE"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="CVE-2019-3861" ref_url="https://www.suse.com/security/cve/CVE-2019-3861/" source="CVE"/>
		<reference ref_id="CVE-2019-3862" ref_url="https://www.suse.com/security/cve/CVE-2019-3862/" source="CVE"/>
		<reference ref_id="CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

Security issues fixed:	  

- CVE-2019-3861: Fixed Out-of-bounds reads with specially crafted SSH packets (bsc#1128490).
- CVE-2019-3862: Fixed Out-of-bounds memory comparison with specially crafted message channel request packet (bsc#1128492).
- CVE-2019-3860: Fixed Out-of-bounds reads with specially crafted SFTP packets (bsc#1128481).
- CVE-2019-3863: Fixed an Integer overflow in user authenicate keyboard interactive which could allow out-of-bounds writes 
  with specially crafted keyboard responses (bsc#1128493).
- CVE-2019-3856: Fixed a potential Integer overflow in keyboard interactive handling which could allow out-of-bounds write 
  with specially crafted payload (bsc#1128472).
- CVE-2019-3859: Fixed Out-of-bounds reads with specially crafted payloads due to unchecked use of _libssh2_packet_require 
  and _libssh2_packet_requirev (bsc#1128480).
- CVE-2019-3855: Fixed a potential Integer overflow in transport read which could allow out-of-bounds write with specially 
  crafted payload (bsc#1128471).
- CVE-2019-3858: Fixed a potential zero-byte allocation which could lead to an out-of-bounds read with a specially crafted 
  SFTP packet (bsc#1128476).
- CVE-2019-3857: Fixed a potential Integer overflow which could lead to zero-byte allocation and out-of-bounds with specially 
  crafted message channel request SSH packet (bsc#1128474).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-19"/>
	<updated date="2019-03-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1128471">SUSE bug 1128471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128472">SUSE bug 1128472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128474">SUSE bug 1128474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128476">SUSE bug 1128476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128480">SUSE bug 1128480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128490">SUSE bug 1128490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128492">SUSE bug 1128492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128493">SUSE bug 1128493</bugzilla>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3855">CVE-2019-3855 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3856">CVE-2019-3856 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3857">CVE-2019-3857 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3858/">CVE-2019-3858 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3858">CVE-2019-3858 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3859">CVE-2019-3859 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3860">CVE-2019-3860 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3861/">CVE-2019-3861 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3861">CVE-2019-3861 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3862/">CVE-2019-3862 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3862">CVE-2019-3862 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3863">CVE-2019-3863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583959" comment="libssh2-1-1.4.3-17.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583959" comment="libssh2-1-1.4.3-17.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220142" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1091236" ref_url="https://bugzilla.suse.com/1091236" source="BUGZILLA"/>
		<reference ref_id="1130103" ref_url="https://bugzilla.suse.com/1130103" source="BUGZILLA"/>
		<reference ref_id="1133528" ref_url="https://bugzilla.suse.com/1133528" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005379.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

- Incorrect upstream fix for CVE-2019-3859 broke public key authentication [bsc#1133528, bsc#1130103]

- Store but don't use keys of unsupported types in the known_hosts file [bsc#1091236]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-27"/>
	<updated date="2019-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1091236">SUSE bug 1091236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130103">SUSE bug 1130103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133528">SUSE bug 1133528</bugzilla>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3859">CVE-2019-3859 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583960" comment="libssh2-1-1.4.3-17.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220143" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1136570" ref_url="https://bugzilla.suse.com/1136570" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005594.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

- Fix the previous fix for CVE-2019-3860 (bsc#1136570, bsc#1128481)
  (Out-of-bounds reads with specially crafted SFTP packets)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136570">SUSE bug 1136570</bugzilla>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3860">CVE-2019-3860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583961" comment="libssh2-1-1.4.3-17.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220144" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1154862" ref_url="https://bugzilla.suse.com/1154862" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006093.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issue:

- CVE-2019-17498: Fixed an integer overflow in a bounds check that might have led to the disclosure of sensitive information or a denial of service (bsc#1154862).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-06"/>
	<updated date="2019-11-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154862">SUSE bug 1154862</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17498">CVE-2019-17498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583962" comment="libssh2-1-1.4.3-17.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220145" version="1" class="patch">
	<metadata>
		<title>Security update for libtcnative-1-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="938945" ref_url="https://bugzilla.suse.com/938945" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002287.html" source="SUSE-SU"/>
		<description>

This update for libtcnative-1-0 fixes the following issues:

- CVE-2015-4000: Disable 512-bit export-grade cryptography to prevent Logjam 
  vulnerability (bsc#938945) 
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-26"/>
	<updated date="2016-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/938945">SUSE bug 938945</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583963" comment="libtcnative-1-0-1.3.3-12.4.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583963" comment="libtcnative-1-0-1.3.3-12.4.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220146" version="1" class="patch">
	<metadata>
		<title>Security update for libtcnative-1-0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1078679" ref_url="https://bugzilla.suse.com/1078679" source="BUGZILLA"/>
		<reference ref_id="1103347" ref_url="https://bugzilla.suse.com/1103347" source="BUGZILLA"/>
		<reference ref_id="1103348" ref_url="https://bugzilla.suse.com/1103348" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15698" ref_url="https://www.suse.com/security/cve/CVE-2017-15698/" source="CVE"/>
		<reference ref_id="CVE-2018-8019" ref_url="https://www.suse.com/security/cve/CVE-2018-8019/" source="CVE"/>
		<reference ref_id="CVE-2018-8020" ref_url="https://www.suse.com/security/cve/CVE-2018-8020/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005314.html" source="SUSE-SU"/>
		<description>
This update for libtcnative-1-0 to version 1.1.34 fixes the following issues:

- CVE-2017-15698: Fixed an improper handling of fields with more than 127 bytes 
  which could allow invalid client certificates to be accepted (bsc#1078679).
- CVE-2018-8019: When using an OCSP responder did not correctly handle invalid
  responses. This allowed for revoked client certificates to be incorrectly
  identified. It was therefore possible for users to authenticate with revoked
  certificates when using mutual TLS (bsc#1103348).
- CVE-2018-8020: Did not properly check OCSP pre-produced responses. Revoked
  client certificates may have not been properly identified, allowing for users
  to authenticate with revoked certificates to connections that require mutual
  TLS (bsc#1103347).

For a complete list of changes please see
http://tomcat.apache.org/native-1.1-doc/miscellaneous/changelog.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-09"/>
	<updated date="2019-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1078679">SUSE bug 1078679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103347">SUSE bug 1103347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103348">SUSE bug 1103348</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15698/">CVE-2017-15698 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15698">CVE-2017-15698 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8019/">CVE-2018-8019 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8019">CVE-2018-8019 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8020/">CVE-2018-8020 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8020">CVE-2018-8020 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583964" comment="libtcnative-1-0-1.3.4-12.5.5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220147" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc, rpcbind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1037559" ref_url="https://bugzilla.suse.com/1037559" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002932.html" source="SUSE-SU"/>
		<description>

This update for libtirpc and rpcbind fixes the following issues:

- CVE-2017-8779: A crafted UDP package could lead rpcbind to remote denial-of-service. (bsc#1037559)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-31"/>
	<updated date="2017-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037559">SUSE bug 1037559</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8779">CVE-2017-8779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583965" comment="libtirpc1-0.2.1-1.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583966" comment="rpcbind-0.1.6+git20080930-6.27.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583965" comment="libtirpc1-0.2.1-1.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583966" comment="rpcbind-0.1.6+git20080930-6.27.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220148" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="968175" ref_url="https://bugzilla.suse.com/968175" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:2557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004512.html" source="SUSE-SU"/>
		<description>
This update for libtirpc fixes the following issues:

- Prevent remote crash of RPC services (bsc#968175)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-30"/>
	<updated date="2018-08-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/968175">SUSE bug 968175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583967" comment="libtirpc1-0.2.1-1.13.3.3 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583967" comment="libtirpc1-0.2.1-1.13.3.3 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220149" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1106517" ref_url="https://bugzilla.suse.com/1106517" source="BUGZILLA"/>
		<reference ref_id="1106519" ref_url="https://bugzilla.suse.com/1106519" source="BUGZILLA"/>
		<reference ref_id="968175" ref_url="https://bugzilla.suse.com/968175" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14621" ref_url="https://www.suse.com/security/cve/CVE-2018-14621/" source="CVE"/>
		<reference ref_id="CVE-2018-14622" ref_url="https://www.suse.com/security/cve/CVE-2018-14622/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004670.html" source="SUSE-SU"/>
		<description>
This update for libtirpc fixes the following issues:

Security issues fixed:

- CVE-2018-14621: libtirpc: Infinite loop in EMFILE case in svc_vc.c (bsc#1106519)
- CVE-2018-14622: libtirpc: Segmentation fault in makefd_xprt return value in svc_vc.c (bsc#1106517)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-15"/>
	<updated date="2018-10-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106517">SUSE bug 1106517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106519">SUSE bug 1106519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968175">SUSE bug 968175</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14621/">CVE-2018-14621 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14621">CVE-2018-14621 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14622/">CVE-2018-14622 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14622">CVE-2018-14622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583968" comment="libtirpc1-0.2.1-1.13.6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583968" comment="libtirpc1-0.2.1-1.13.6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220150" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="948516" ref_url="https://bugzilla.suse.com/948516" source="BUGZILLA"/>
		<reference ref_id="948686" ref_url="https://bugzilla.suse.com/948686" source="BUGZILLA"/>
		<reference ref_id="953110" ref_url="https://bugzilla.suse.com/953110" source="BUGZILLA"/>
		<reference ref_id="959094" ref_url="https://bugzilla.suse.com/959094" source="BUGZILLA"/>
		<reference ref_id="960305" ref_url="https://bugzilla.suse.com/960305" source="BUGZILLA"/>
		<reference ref_id="961173" ref_url="https://bugzilla.suse.com/961173" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5313" ref_url="https://www.suse.com/security/cve/CVE-2015-5313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001977.html" source="SUSE-SU"/>
		<description>

This update for libvirt fixes the following issues:

Security issue:
- CVE-2015-5313: directory directory traversal privilege
  escalation vulnerability. (bsc#953110)

Bugs fixed:
- bsc#960305: xenxs: support parsing and formatting vif bandwidth
- bsc#961173: xen: use correct domctl version in domaininfolist union
- bsc#959094: xen: Disable building xen-inotify subdriver. It is unmaintained
  and contains bugs that can cause client connection failures.
- bsc#948686: qemu: Use PAUSED state for domains that are starting up
- bsc#948516: Fix profile_status to distringuish between errors and unconfined
  domains.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-01"/>
	<updated date="2016-04-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/948516">SUSE bug 948516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948686">SUSE bug 948686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953110">SUSE bug 953110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959094">SUSE bug 959094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960305">SUSE bug 960305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961173">SUSE bug 961173</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5313/">CVE-2015-5313 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5313">CVE-2015-5313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583969" comment="libvirt-1.2.5-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583970" comment="libvirt-client-1.2.5-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583971" comment="libvirt-client-32bit-1.2.5-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583972" comment="libvirt-doc-1.2.5-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583973" comment="libvirt-lock-sanlock-1.2.5-12.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583969" comment="libvirt-1.2.5-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583970" comment="libvirt-client-1.2.5-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583971" comment="libvirt-client-32bit-1.2.5-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583972" comment="libvirt-doc-1.2.5-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583973" comment="libvirt-lock-sanlock-1.2.5-12.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220151" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="952889" ref_url="https://bugzilla.suse.com/952889" source="BUGZILLA"/>
		<reference ref_id="970906" ref_url="https://bugzilla.suse.com/970906" source="BUGZILLA"/>
		<reference ref_id="987527" ref_url="https://bugzilla.suse.com/987527" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5008" ref_url="https://www.suse.com/security/cve/CVE-2016-5008/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002174.html" source="SUSE-SU"/>
		<description>

This update for libvirt fixes the following issues:

Security issues fixed:
- CVE-2016-5008: empty VNC password disables authentication (bsc#987527)

Bugs fixed:
- bsc#970906: Fixed a race condition in xenstore event handling.
- bsc#952889: Change hap setting to align with Xen behavior.
- Fixed 'make check' failures.
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-03"/>
	<updated date="2016-08-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952889">SUSE bug 952889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970906">SUSE bug 970906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987527">SUSE bug 987527</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5008/">CVE-2016-5008 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5008">CVE-2016-5008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583974" comment="libvirt-1.2.5-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583975" comment="libvirt-client-1.2.5-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583976" comment="libvirt-client-32bit-1.2.5-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583977" comment="libvirt-doc-1.2.5-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583978" comment="libvirt-lock-sanlock-1.2.5-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583979" comment="perl-Sys-Virt-1.2.5-4.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583974" comment="libvirt-1.2.5-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583975" comment="libvirt-client-1.2.5-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583976" comment="libvirt-client-32bit-1.2.5-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583977" comment="libvirt-doc-1.2.5-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583978" comment="libvirt-lock-sanlock-1.2.5-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583979" comment="perl-Sys-Virt-1.2.5-4.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220152" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1025340" ref_url="https://bugzilla.suse.com/1025340" source="BUGZILLA"/>
		<reference ref_id="1026236" ref_url="https://bugzilla.suse.com/1026236" source="BUGZILLA"/>
		<reference ref_id="1053600" ref_url="https://bugzilla.suse.com/1053600" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003278.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes several issues.

This security issue was fixed:

- bsc#1053600: Escape ssh commed line to prevent interpreting malicious
  hostname as arguments, allowing for command execution

These non-security issues were fixed:

- bsc#1025340: Use xend for nodeGetFreeMemory API
- bsc#1026236: Add support for tsc timers on xen
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-09"/>
	<updated date="2017-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025340">SUSE bug 1025340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026236">SUSE bug 1026236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053600">SUSE bug 1053600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583980" comment="libvirt-1.2.5-23.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583981" comment="libvirt-client-1.2.5-23.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583982" comment="libvirt-client-32bit-1.2.5-23.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583983" comment="libvirt-doc-1.2.5-23.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583984" comment="libvirt-lock-sanlock-1.2.5-23.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583980" comment="libvirt-1.2.5-23.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583981" comment="libvirt-client-1.2.5-23.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583982" comment="libvirt-client-32bit-1.2.5-23.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583983" comment="libvirt-doc-1.2.5-23.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583984" comment="libvirt-lock-sanlock-1.2.5-23.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220153" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1055365" ref_url="https://bugzilla.suse.com/1055365" source="BUGZILLA"/>
		<reference ref_id="1076500" ref_url="https://bugzilla.suse.com/1076500" source="BUGZILLA"/>
		<reference ref_id="1079869" ref_url="https://bugzilla.suse.com/1079869" source="BUGZILLA"/>
		<reference ref_id="1083061" ref_url="https://bugzilla.suse.com/1083061" source="BUGZILLA"/>
		<reference ref_id="1083625" ref_url="https://bugzilla.suse.com/1083625" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-1064" ref_url="https://www.suse.com/security/cve/CVE-2018-1064/" source="CVE"/>
		<reference ref_id="CVE-2018-5748" ref_url="https://www.suse.com/security/cve/CVE-2018-5748/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003852.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issues fixed:

- CVE-2017-5715: Fixes for speculative side channel attacks aka 'SpectreAttack' (var2) (bsc#1079869).
- CVE-2018-1064: Fixed denial of service when reading from guest agent (bsc#1083625).
- CVE-2018-5748: Fixed possible denial of service when reading from QEMU monitor (bsc#1076500).


Non-security issues fixed:

- bsc#1083061: Fixed 'dumpxml --migratable' exports domain id in output on SLES11 SP4.
- bsc#1055365: Improve performance when listing hundreds of interfaces. 
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-29"/>
	<updated date="2018-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1055365">SUSE bug 1055365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076500">SUSE bug 1076500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079869">SUSE bug 1079869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083061">SUSE bug 1083061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083625">SUSE bug 1083625</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1064/">CVE-2018-1064 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1064">CVE-2018-1064 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5748/">CVE-2018-5748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5748">CVE-2018-5748 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583985" comment="libvirt-1.2.5-23.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583986" comment="libvirt-client-1.2.5-23.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583987" comment="libvirt-client-32bit-1.2.5-23.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583988" comment="libvirt-doc-1.2.5-23.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583989" comment="libvirt-lock-sanlock-1.2.5-23.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583985" comment="libvirt-1.2.5-23.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583986" comment="libvirt-client-1.2.5-23.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583987" comment="libvirt-client-32bit-1.2.5-23.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583988" comment="libvirt-doc-1.2.5-23.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583989" comment="libvirt-lock-sanlock-1.2.5-23.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220154" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004102.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2018-3639: cpu: Added support for 'ssbd' and 'virt-ssbd' CPUID feature bits pass through.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-30"/>
	<updated date="2018-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583990" comment="libvirt-1.2.5-23.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583991" comment="libvirt-client-1.2.5-23.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583992" comment="libvirt-client-32bit-1.2.5-23.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583993" comment="libvirt-doc-1.2.5-23.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583994" comment="libvirt-lock-sanlock-1.2.5-23.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583990" comment="libvirt-1.2.5-23.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583991" comment="libvirt-client-1.2.5-23.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583992" comment="libvirt-client-32bit-1.2.5-23.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583993" comment="libvirt-doc-1.2.5-23.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583994" comment="libvirt-lock-sanlock-1.2.5-23.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220155" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1131595" ref_url="https://bugzilla.suse.com/1131595" source="BUGZILLA"/>
		<reference ref_id="1138301" ref_url="https://bugzilla.suse.com/1138301" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10161" ref_url="https://www.suse.com/security/cve/CVE-2019-10161/" source="CVE"/>
		<reference ref_id="CVE-2019-3886" ref_url="https://www.suse.com/security/cve/CVE-2019-3886/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005597.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issues fixed:

- CVE-2019-10161: Fixed virDomainSaveImageGetXMLDesc API which could accept a path
  parameter pointing anywhere on the system and potentially leading to execution
  of a malicious file with root privileges by libvirtd (bsc#1138301).    
- CVE-2019-3886: Fixed a information exposure which allowed to retrieve the guest
  hostname under readonly mode (bsc#1131595).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131595">SUSE bug 1131595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138301">SUSE bug 1138301</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10161/">CVE-2019-10161 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10161">CVE-2019-10161 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3886/">CVE-2019-3886 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3886">CVE-2019-3886 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583995" comment="libvirt-1.2.5-23.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583996" comment="libvirt-client-1.2.5-23.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583997" comment="libvirt-client-32bit-1.2.5-23.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583998" comment="libvirt-doc-1.2.5-23.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583999" comment="libvirt-lock-sanlock-1.2.5-23.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220156" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt and libvirt-python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1133150" ref_url="https://bugzilla.suse.com/1133150" source="BUGZILLA"/>
		<reference ref_id="1134783" ref_url="https://bugzilla.suse.com/1134783" source="BUGZILLA"/>
		<reference ref_id="1140252" ref_url="https://bugzilla.suse.com/1140252" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10746" ref_url="https://www.suse.com/security/cve/CVE-2016-10746/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005815.html" source="SUSE-SU"/>
		<description>
This update for libvirt and libvirt-python fixes the following issues:

libvirt:

- CVE-2016-10746: Fixed an authentication bypass where a guest agent with a read only connection could call virDomainGetTime API calls (bsc#1133150).
- rpc: increase the size of REMOTE_MIGRATE_COOKIE_MAX (bsc#1134783).

libvirt-python:

- Fixes a memory leak in libvirt-python (bsc#1140252)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-15"/>
	<updated date="2019-08-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1133150">SUSE bug 1133150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134783">SUSE bug 1134783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140252">SUSE bug 1140252</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-10746/">CVE-2016-10746 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10746">CVE-2016-10746 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584000" comment="libvirt-1.2.5-23.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584001" comment="libvirt-client-1.2.5-23.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584002" comment="libvirt-client-32bit-1.2.5-23.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584003" comment="libvirt-doc-1.2.5-23.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584004" comment="libvirt-lock-sanlock-1.2.5-23.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584005" comment="libvirt-python-1.2.5-3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220157" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="897031" ref_url="https://bugzilla.suse.com/897031" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6051" ref_url="https://www.suse.com/security/cve/CVE-2014-6051/" source="CVE"/>
		<reference ref_id="CVE-2014-6052" ref_url="https://www.suse.com/security/cve/CVE-2014-6052/" source="CVE"/>
		<reference ref_id="CVE-2014-6053" ref_url="https://www.suse.com/security/cve/CVE-2014-6053/" source="CVE"/>
		<reference ref_id="CVE-2014-6054" ref_url="https://www.suse.com/security/cve/CVE-2014-6054/" source="CVE"/>
		<reference ref_id="CVE-2014-6055" ref_url="https://www.suse.com/security/cve/CVE-2014-6055/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
		<description>
The libvncserver package was updated to fix the following security issues:

- bsc#897031: fix several security issues:
  * CVE-2014-6051: Integer overflow in MallocFrameBuffer() on client side.
  * CVE-2014-6052: Lack of malloc() return value checking on client side.
  * CVE-2014-6053: Server crash on a very large ClientCutText message.
  * CVE-2014-6054: Server crash when scaling factor is set to zero.
  * CVE-2014-6055: Multiple stack overflows in File Transfer feature.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-26"/>
	<updated date="2015-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6051/">CVE-2014-6051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6051">CVE-2014-6051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6052/">CVE-2014-6052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6052">CVE-2014-6052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6053/">CVE-2014-6053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6053">CVE-2014-6053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6054/">CVE-2014-6054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6054">CVE-2014-6054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6055/">CVE-2014-6055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6055">CVE-2014-6055 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578958" comment="LibVNCServer-0.9.1-156.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578958" comment="LibVNCServer-0.9.1-156.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220158" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1059809" ref_url="https://bugzilla.suse.com/1059809" source="BUGZILLA"/>
		<reference ref_id="1059811" ref_url="https://bugzilla.suse.com/1059811" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14632" ref_url="https://www.suse.com/security/cve/CVE-2017-14632/" source="CVE"/>
		<reference ref_id="CVE-2017-14633" ref_url="https://www.suse.com/security/cve/CVE-2017-14633/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003568.html" source="SUSE-SU"/>
		<description>
This update for libvorbis fixes the following issues:

- CVE-2017-14633: out-of-bounds array read vulnerability exists in
  function mapping0_forward() could lead to remote denial of service (bsc#1059811)
- CVE-2017-14632: Remote Code Execution upon freeing uninitialized
  memory in function vorbis_analysis_headerout(bsc#1059809)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1059809">SUSE bug 1059809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059811">SUSE bug 1059811</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14632/">CVE-2017-14632 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14632">CVE-2017-14632 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14633/">CVE-2017-14633 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14633">CVE-2017-14633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584006" comment="libvorbis-1.2.0-79.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584007" comment="libvorbis-32bit-1.2.0-79.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584008" comment="libvorbis-doc-1.2.0-79.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584009" comment="libvorbis-x86-1.2.0-79.20.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584006" comment="libvorbis-1.2.0-79.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584007" comment="libvorbis-32bit-1.2.0-79.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584008" comment="libvorbis-doc-1.2.0-79.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584009" comment="libvorbis-x86-1.2.0-79.20.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220159" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1085687" ref_url="https://bugzilla.suse.com/1085687" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003833.html" source="SUSE-SU"/>
		<description>
This update for libvorbis fixes the following issues:

- CVE-2018-5146: Fixed out of bounds memory write while processing Vorbis audio data (bsc#1085687).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-23"/>
	<updated date="2018-03-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085687">SUSE bug 1085687</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5146">CVE-2018-5146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584010" comment="libvorbis-1.2.0-79.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584011" comment="libvorbis-32bit-1.2.0-79.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584012" comment="libvorbis-doc-1.2.0-79.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584013" comment="libvorbis-x86-1.2.0-79.20.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584010" comment="libvorbis-1.2.0-79.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584011" comment="libvorbis-32bit-1.2.0-79.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584012" comment="libvorbis-doc-1.2.0-79.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584013" comment="libvorbis-x86-1.2.0-79.20.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220160" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1059812" ref_url="https://bugzilla.suse.com/1059812" source="BUGZILLA"/>
		<reference ref_id="1091072" ref_url="https://bugzilla.suse.com/1091072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14160" ref_url="https://www.suse.com/security/cve/CVE-2017-14160/" source="CVE"/>
		<reference ref_id="CVE-2018-10393" ref_url="https://www.suse.com/security/cve/CVE-2018-10393/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004057.html" source="SUSE-SU"/>
		<description>
This update for libvorbis fixes the following issues:

Security issues fixed:

- CVE-2018-10393: Fixed stack-based buffer over-read in bark_noise_hybridm (bsc#1091072).
- CVE-2017-14160: Fixed out-of-bounds access inside bark_noise_hybridmp function (bsc#1059812).

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1059812">SUSE bug 1059812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091072">SUSE bug 1091072</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14160/">CVE-2017-14160 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14160">CVE-2017-14160 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10393/">CVE-2018-10393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10393">CVE-2018-10393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584014" comment="libvorbis-1.2.0-79.20.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584015" comment="libvorbis-32bit-1.2.0-79.20.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584016" comment="libvorbis-doc-1.2.0-79.20.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584017" comment="libvorbis-x86-1.2.0-79.20.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584014" comment="libvorbis-1.2.0-79.20.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584015" comment="libvorbis-32bit-1.2.0-79.20.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584016" comment="libvorbis-doc-1.2.0-79.20.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584017" comment="libvorbis-x86-1.2.0-79.20.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220161" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1091070" ref_url="https://bugzilla.suse.com/1091070" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10392" ref_url="https://www.suse.com/security/cve/CVE-2018-10392/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004157.html" source="SUSE-SU"/>
		<description>
This update for libvorbis fixes the following issues:

The following security issue was fixed:

  - Fixed the validation of channels in mapping0_forward(), which previously
    allowed remote attackers to cause a denial of service via specially crafted
    files (CVE-2018-10392, bsc#1091070)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-06"/>
	<updated date="2018-06-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091070">SUSE bug 1091070</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10392/">CVE-2018-10392 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10392">CVE-2018-10392 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584018" comment="libvorbis-1.2.0-79.20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584019" comment="libvorbis-32bit-1.2.0-79.20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584020" comment="libvorbis-doc-1.2.0-79.20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584021" comment="libvorbis-x86-1.2.0-79.20.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584018" comment="libvorbis-1.2.0-79.20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584019" comment="libvorbis-32bit-1.2.0-79.20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584020" comment="libvorbis-doc-1.2.0-79.20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584021" comment="libvorbis-x86-1.2.0-79.20.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220162" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="972335" ref_url="https://bugzilla.suse.com/972335" source="BUGZILLA"/>
		<reference ref_id="975947" ref_url="https://bugzilla.suse.com/975947" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002037.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes two security issues:

- libxml2 limits the number of recursions an XML document can contain so to protect against the 'Billion Laughs' denial-of-service attack. Unfortunately, the underlying counter was not incremented properly in all necessary locations. Therefore, specially crafted XML documents could exhaust all available stack space and crash the XML parser without running into the recursion limit. This vulnerability has been fixed. (bsc#975947)

- When running in recovery mode, certain invalid XML documents would trigger an infinite recursion in libxml2 that ran until all stack space was exhausted. This vulnerability could have been used to facilitate a denial-of-sevice attack. (CVE-2016-3627, bsc#972335)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-03"/>
	<updated date="2016-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/972335">SUSE bug 972335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975947">SUSE bug 975947</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3627">CVE-2016-3627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584022" comment="libxml2-2.7.6-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584023" comment="libxml2-32bit-2.7.6-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584024" comment="libxml2-doc-2.7.6-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584025" comment="libxml2-python-2.7.6-0.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584026" comment="libxml2-x86-2.7.6-0.40.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584022" comment="libxml2-2.7.6-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584023" comment="libxml2-32bit-2.7.6-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584024" comment="libxml2-doc-2.7.6-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584025" comment="libxml2-python-2.7.6-0.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584026" comment="libxml2-x86-2.7.6-0.40.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220163" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="963963" ref_url="https://bugzilla.suse.com/963963" source="BUGZILLA"/>
		<reference ref_id="965283" ref_url="https://bugzilla.suse.com/965283" source="BUGZILLA"/>
		<reference ref_id="978395" ref_url="https://bugzilla.suse.com/978395" source="BUGZILLA"/>
		<reference ref_id="981040" ref_url="https://bugzilla.suse.com/981040" source="BUGZILLA"/>
		<reference ref_id="981041" ref_url="https://bugzilla.suse.com/981041" source="BUGZILLA"/>
		<reference ref_id="981108" ref_url="https://bugzilla.suse.com/981108" source="BUGZILLA"/>
		<reference ref_id="981109" ref_url="https://bugzilla.suse.com/981109" source="BUGZILLA"/>
		<reference ref_id="981111" ref_url="https://bugzilla.suse.com/981111" source="BUGZILLA"/>
		<reference ref_id="981112" ref_url="https://bugzilla.suse.com/981112" source="BUGZILLA"/>
		<reference ref_id="981114" ref_url="https://bugzilla.suse.com/981114" source="BUGZILLA"/>
		<reference ref_id="981115" ref_url="https://bugzilla.suse.com/981115" source="BUGZILLA"/>
		<reference ref_id="981548" ref_url="https://bugzilla.suse.com/981548" source="BUGZILLA"/>
		<reference ref_id="981549" ref_url="https://bugzilla.suse.com/981549" source="BUGZILLA"/>
		<reference ref_id="981550" ref_url="https://bugzilla.suse.com/981550" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8806" ref_url="https://www.suse.com/security/cve/CVE-2015-8806/" source="CVE"/>
		<reference ref_id="CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762/" source="CVE"/>
		<reference ref_id="CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833/" source="CVE"/>
		<reference ref_id="CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834/" source="CVE"/>
		<reference ref_id="CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835/" source="CVE"/>
		<reference ref_id="CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837/" source="CVE"/>
		<reference ref_id="CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838/" source="CVE"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840/" source="CVE"/>
		<reference ref_id="CVE-2016-2073" ref_url="https://www.suse.com/security/cve/CVE-2016-2073/" source="CVE"/>
		<reference ref_id="CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705/" source="CVE"/>
		<reference ref_id="CVE-2016-4447" ref_url="https://www.suse.com/security/cve/CVE-2016-4447/" source="CVE"/>
		<reference ref_id="CVE-2016-4448" ref_url="https://www.suse.com/security/cve/CVE-2016-4448/" source="CVE"/>
		<reference ref_id="CVE-2016-4449" ref_url="https://www.suse.com/security/cve/CVE-2016-4449/" source="CVE"/>
		<reference ref_id="CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002123.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following security issues: 

- CVE-2016-2073, CVE-2015-8806, CVE-2016-1839: A Heap-buffer overread
  was fixed in libxml2/dict.c  [bsc#963963, bsc#965283, bsc#981114].
- CVE-2016-4483: Code was added to avoid an out of bound access when
  serializing malformed strings [bsc#978395].
- CVE-2016-1762: Fixed a heap-based buffer overread in xmlNextChar [bsc#981040].
- CVE-2016-1834: Fixed a heap-buffer-overflow in xmlStrncat [bsc#981041].
- CVE-2016-1833: Fixed a heap-based buffer overread in htmlCurrentChar [bsc#981108].
- CVE-2016-1835: Fixed a heap use-after-free in xmlSAX2AttributeNs [bsc#981109].
- CVE-2016-1837: Fixed a heap use-after-free in htmlParsePubidLiteral
  and htmlParseSystemiteral [bsc#981111].
- CVE-2016-1838: Fixed a heap-based buffer overread in
  xmlParserPrintFileContextInternal [bsc#981112].
- CVE-2016-1840: Fixed a heap-buffer-overflow in xmlFAParsePosCharGroup [bsc#981115].
- CVE-2016-4447: Fixed a heap-based buffer-underreads due to xmlParseName [bsc#981548].
- CVE-2016-4448: Fixed some format string warnings with possible format
  string vulnerability [bsc#981549],
- CVE-2016-4449: Fixed inappropriate fetch of entities content [bsc#981550].
- CVE-2016-3705: Fixed missing increment of recursion counter.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/963963">SUSE bug 963963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965283">SUSE bug 965283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978395">SUSE bug 978395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981040">SUSE bug 981040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981041">SUSE bug 981041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981108">SUSE bug 981108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981109">SUSE bug 981109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981111">SUSE bug 981111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981112">SUSE bug 981112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981114">SUSE bug 981114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981115">SUSE bug 981115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981548">SUSE bug 981548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981549">SUSE bug 981549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981550">SUSE bug 981550</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8806/">CVE-2015-8806 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8806">CVE-2015-8806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1762">CVE-2016-1762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1833">CVE-2016-1833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1834">CVE-2016-1834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1835">CVE-2016-1835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1837">CVE-2016-1837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1838">CVE-2016-1838 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1839">CVE-2016-1839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1840">CVE-2016-1840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2073/">CVE-2016-2073 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2073">CVE-2016-2073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3705">CVE-2016-3705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4447/">CVE-2016-4447 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4447">CVE-2016-4447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4448/">CVE-2016-4448 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4448">CVE-2016-4448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4449/">CVE-2016-4449 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4449">CVE-2016-4449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4483">CVE-2016-4483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584027" comment="libxml2-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584028" comment="libxml2-32bit-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584029" comment="libxml2-doc-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584030" comment="libxml2-python-2.7.6-0.44.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584031" comment="libxml2-x86-2.7.6-0.44.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584027" comment="libxml2-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584028" comment="libxml2-32bit-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584029" comment="libxml2-doc-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584030" comment="libxml2-python-2.7.6-0.44.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584031" comment="libxml2-x86-2.7.6-0.44.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220164" version="1" class="patch">
	<metadata>
		<title>Recommended update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="996079" ref_url="https://bugzilla.suse.com/996079" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="SUSE-RU-2016:2413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2016-September/005205.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes an issue when processing external entities introduced
with the fix for CVE-2014-0191.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-29"/>
	<updated date="2016-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/996079">SUSE bug 996079</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0191">CVE-2014-0191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009592527" comment="libxml2-2.7.6-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592528" comment="libxml2-32bit-2.7.6-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592529" comment="libxml2-doc-2.7.6-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592530" comment="libxml2-python-2.7.6-0.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592531" comment="libxml2-x86-2.7.6-0.47.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009592527" comment="libxml2-2.7.6-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592528" comment="libxml2-32bit-2.7.6-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592529" comment="libxml2-doc-2.7.6-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592530" comment="libxml2-python-2.7.6-0.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592531" comment="libxml2-x86-2.7.6-0.47.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220165" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1005544" ref_url="https://bugzilla.suse.com/1005544" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002364.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following issues:

- CVE-2016-4658: Use after free via namespace node in XPointer ranges (bsc#1005544).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-26"/>
	<updated date="2016-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005544">SUSE bug 1005544</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4658">CVE-2016-4658 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584032" comment="libxml2-2.7.6-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584033" comment="libxml2-32bit-2.7.6-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584034" comment="libxml2-doc-2.7.6-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584035" comment="libxml2-python-2.7.6-0.50.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584036" comment="libxml2-x86-2.7.6-0.50.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584032" comment="libxml2-2.7.6-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584033" comment="libxml2-32bit-2.7.6-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584034" comment="libxml2-doc-2.7.6-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584035" comment="libxml2-python-2.7.6-0.50.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584036" comment="libxml2-x86-2.7.6-0.50.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220166" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1010675" ref_url="https://bugzilla.suse.com/1010675" source="BUGZILLA"/>
		<reference ref_id="1014873" ref_url="https://bugzilla.suse.com/1014873" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002563.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following issues:

* CVE-2016-9318: libxml2 did not offer a flag directly indicating that the current document may be read but other files may not be opened, which made it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document (bsc#1010675).
* Prevent NULL dereference in xpointer.c and xmlDumpElementContent, and infinite recursion in xmlParseConditionalSections when in recovery mode(bnc#1014873)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-16"/>
	<updated date="2017-01-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014873">SUSE bug 1014873</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9318">CVE-2016-9318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584037" comment="libxml2-2.7.6-0.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584038" comment="libxml2-32bit-2.7.6-0.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584039" comment="libxml2-doc-2.7.6-0.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584040" comment="libxml2-python-2.7.6-0.64.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584041" comment="libxml2-x86-2.7.6-0.64.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584037" comment="libxml2-2.7.6-0.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584038" comment="libxml2-32bit-2.7.6-0.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584039" comment="libxml2-doc-2.7.6-0.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584040" comment="libxml2-python-2.7.6-0.64.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584041" comment="libxml2-x86-2.7.6-0.64.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220167" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1010675" ref_url="https://bugzilla.suse.com/1010675" source="BUGZILLA"/>
		<reference ref_id="1013930" ref_url="https://bugzilla.suse.com/1013930" source="BUGZILLA"/>
		<reference ref_id="1039063" ref_url="https://bugzilla.suse.com/1039063" source="BUGZILLA"/>
		<reference ref_id="1039064" ref_url="https://bugzilla.suse.com/1039064" source="BUGZILLA"/>
		<reference ref_id="1039066" ref_url="https://bugzilla.suse.com/1039066" source="BUGZILLA"/>
		<reference ref_id="1039069" ref_url="https://bugzilla.suse.com/1039069" source="BUGZILLA"/>
		<reference ref_id="1039661" ref_url="https://bugzilla.suse.com/1039661" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<reference ref_id="CVE-2017-9047" ref_url="https://www.suse.com/security/cve/CVE-2017-9047/" source="CVE"/>
		<reference ref_id="CVE-2017-9048" ref_url="https://www.suse.com/security/cve/CVE-2017-9048/" source="CVE"/>
		<reference ref_id="CVE-2017-9049" ref_url="https://www.suse.com/security/cve/CVE-2017-9049/" source="CVE"/>
		<reference ref_id="CVE-2017-9050" ref_url="https://www.suse.com/security/cve/CVE-2017-9050/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002940.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following issues:

Security issues fixed:

- CVE-2017-9050: heap-based buffer overflow (xmlDictAddString func) [bsc#1039069, bsc#1039661]
- CVE-2017-9049: heap-based buffer overflow (xmlDictComputeFastKey func) [bsc#1039066]
- CVE-2017-9048: stack overflow vulnerability (xmlSnprintfElementContent func) [bsc#1039063]
- CVE-2017-9047: stack overflow vulnerability (xmlSnprintfElementContent func) [bsc#1039064]

A clarification for the previously released update: For CVE-2016-9318 we decided
not to ship a fix since it can break existing setups. Please take appropriate
actions if you parse untrusted XML files and use the new -noxxe flag if
possible (bnc#1010675, bnc#1013930).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-13"/>
	<updated date="2017-06-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013930">SUSE bug 1013930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039063">SUSE bug 1039063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039064">SUSE bug 1039064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039066">SUSE bug 1039066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039069">SUSE bug 1039069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039661">SUSE bug 1039661</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9318">CVE-2016-9318 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9047/">CVE-2017-9047 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9047">CVE-2017-9047 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9048/">CVE-2017-9048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9048">CVE-2017-9048 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9049/">CVE-2017-9049 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9049">CVE-2017-9049 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9050/">CVE-2017-9050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9050">CVE-2017-9050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584042" comment="libxml2-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584043" comment="libxml2-32bit-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584044" comment="libxml2-doc-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584045" comment="libxml2-python-2.7.6-0.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584046" comment="libxml2-x86-2.7.6-0.69.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584042" comment="libxml2-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584043" comment="libxml2-32bit-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584044" comment="libxml2-doc-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584045" comment="libxml2-python-2.7.6-0.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584046" comment="libxml2-x86-2.7.6-0.69.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220168" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1024989" ref_url="https://bugzilla.suse.com/1024989" source="BUGZILLA"/>
		<reference ref_id="1044337" ref_url="https://bugzilla.suse.com/1044337" source="BUGZILLA"/>
		<reference ref_id="1044887" ref_url="https://bugzilla.suse.com/1044887" source="BUGZILLA"/>
		<reference ref_id="1044894" ref_url="https://bugzilla.suse.com/1044894" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0663" ref_url="https://www.suse.com/security/cve/CVE-2017-0663/" source="CVE"/>
		<reference ref_id="CVE-2017-5969" ref_url="https://www.suse.com/security/cve/CVE-2017-5969/" source="CVE"/>
		<reference ref_id="CVE-2017-7375" ref_url="https://www.suse.com/security/cve/CVE-2017-7375/" source="CVE"/>
		<reference ref_id="CVE-2017-7376" ref_url="https://www.suse.com/security/cve/CVE-2017-7376/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003017.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

Security issues fixed:

* CVE-2017-0663: Fixed a heap buffer overflow in xmlAddID (bsc#1044337)
* CVE-2017-5969: Fixed a NULL pointer deref in xmlDumpElementContent (bsc#1024989)
* CVE-2017-7375: Prevented an unwanted external entity reference (bsc#1044894)
* CVE-2017-7376: Increase buffer space for port in HTTP redirect support (bsc#1044887)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-07"/>
	<updated date="2017-07-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024989">SUSE bug 1024989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044337">SUSE bug 1044337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044887">SUSE bug 1044887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044894">SUSE bug 1044894</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0663/">CVE-2017-0663 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0663">CVE-2017-0663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5969/">CVE-2017-5969 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5969">CVE-2017-5969 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7375/">CVE-2017-7375 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7375">CVE-2017-7375 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7376/">CVE-2017-7376 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7376">CVE-2017-7376 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584047" comment="libxml2-2.7.6-0.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584048" comment="libxml2-32bit-2.7.6-0.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584049" comment="libxml2-doc-2.7.6-0.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584050" comment="libxml2-python-2.7.6-0.76.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584051" comment="libxml2-x86-2.7.6-0.76.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584047" comment="libxml2-2.7.6-0.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584048" comment="libxml2-32bit-2.7.6-0.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584049" comment="libxml2-doc-2.7.6-0.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584050" comment="libxml2-python-2.7.6-0.76.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584051" comment="libxml2-x86-2.7.6-0.76.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220169" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1038444" ref_url="https://bugzilla.suse.com/1038444" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8872" ref_url="https://www.suse.com/security/cve/CVE-2017-8872/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003125.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2017-8872: Out-of-bounds read could lead to application crash (bsc#1038444)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-09"/>
	<updated date="2017-08-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1038444">SUSE bug 1038444</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8872/">CVE-2017-8872 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8872">CVE-2017-8872 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584052" comment="libxml2-2.7.6-0.77.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584053" comment="libxml2-32bit-2.7.6-0.77.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584054" comment="libxml2-doc-2.7.6-0.77.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584055" comment="libxml2-python-2.7.6-0.77.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584056" comment="libxml2-x86-2.7.6-0.77.3.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584052" comment="libxml2-2.7.6-0.77.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584053" comment="libxml2-32bit-2.7.6-0.77.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584054" comment="libxml2-doc-2.7.6-0.77.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584055" comment="libxml2-python-2.7.6-0.77.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584056" comment="libxml2-x86-2.7.6-0.77.3.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220170" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1069689" ref_url="https://bugzilla.suse.com/1069689" source="BUGZILLA"/>
		<reference ref_id="1077993" ref_url="https://bugzilla.suse.com/1077993" source="BUGZILLA"/>
		<reference ref_id="1078806" ref_url="https://bugzilla.suse.com/1078806" source="BUGZILLA"/>
		<reference ref_id="1078813" ref_url="https://bugzilla.suse.com/1078813" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5131" ref_url="https://www.suse.com/security/cve/CVE-2016-5131/" source="CVE"/>
		<reference ref_id="CVE-2017-15412" ref_url="https://www.suse.com/security/cve/CVE-2017-15412/" source="CVE"/>
		<reference ref_id="CVE-2017-16932" ref_url="https://www.suse.com/security/cve/CVE-2017-16932/" source="CVE"/>
		<reference ref_id="CVE-2017-5130" ref_url="https://www.suse.com/security/cve/CVE-2017-5130/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003715.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes several issues.

Theses security issues were fixed:

- CVE-2017-16932: Fixed infinite recursion could lead to an infinite loop or
  memory exhaustion when expanding a parameter entity in a DTD (bsc#1069689).
- CVE-2017-15412: Prevent use after free when calling XPath extension functions
  that allowed remote attackers to cause DoS or potentially RCE (bsc#1077993)
- CVE-2016-5131: Use-after-free vulnerability in libxml2 allowed
  remote attackers to cause a denial of service or possibly have
  unspecified other impact via vectors related to the XPointer range-to
  function. (bsc#1078813)
- CVE-2017-5130: Fixed a potential remote buffer overflow in function
  xmlMemoryStrdup() (bsc#1078806)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-08"/>
	<updated date="2018-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1069689">SUSE bug 1069689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077993">SUSE bug 1077993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078806">SUSE bug 1078806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078813">SUSE bug 1078813</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5131/">CVE-2016-5131 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5131">CVE-2016-5131 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15412/">CVE-2017-15412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15412">CVE-2017-15412 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16932/">CVE-2017-16932 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16932">CVE-2017-16932 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5130/">CVE-2017-5130 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5130">CVE-2017-5130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584057" comment="libxml2-2.7.6-0.77.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584058" comment="libxml2-32bit-2.7.6-0.77.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584059" comment="libxml2-doc-2.7.6-0.77.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584060" comment="libxml2-python-2.7.6-0.77.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584061" comment="libxml2-x86-2.7.6-0.77.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584057" comment="libxml2-2.7.6-0.77.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584058" comment="libxml2-32bit-2.7.6-0.77.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584059" comment="libxml2-doc-2.7.6-0.77.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584060" comment="libxml2-python-2.7.6-0.77.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584061" comment="libxml2-x86-2.7.6-0.77.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220171" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1010675" ref_url="https://bugzilla.suse.com/1010675" source="BUGZILLA"/>
		<reference ref_id="1102046" ref_url="https://bugzilla.suse.com/1102046" source="BUGZILLA"/>
		<reference ref_id="1110146" ref_url="https://bugzilla.suse.com/1110146" source="BUGZILLA"/>
		<reference ref_id="1126613" ref_url="https://bugzilla.suse.com/1126613" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<reference ref_id="CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005217.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

Security issue fixed:

- CVE-2018-14404: Prevent NULL pointer dereference in the xmlXPathCompOpEval()
  function when parsing an invalid XPath expression in the XPATH_OP_AND or
  XPATH_OP_OR case leading to a denial of service attack (bsc#1102046)

Other Issue fixed:

- Fixed a bug related to the fix for CVE-2016-9318 which allowed xsltproc to access 
  the internet even when --nonet was given and also was making docbook-xsl-stylesheets to have 
  incomplete xml catalog file (bsc#1010675, bsc#1126613 and bsc#1110146).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-21"/>
	<updated date="2019-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102046">SUSE bug 1102046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110146">SUSE bug 1110146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126613">SUSE bug 1126613</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9318">CVE-2016-9318 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14404">CVE-2018-14404 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584062" comment="libxml2-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584063" comment="libxml2-32bit-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584064" comment="libxml2-doc-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584065" comment="libxml2-python-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584066" comment="libxml2-x86-2.7.6-0.77.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584062" comment="libxml2-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584063" comment="libxml2-32bit-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584064" comment="libxml2-doc-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584065" comment="libxml2-python-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584066" comment="libxml2-x86-2.7.6-0.77.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220172" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1123919" ref_url="https://bugzilla.suse.com/1123919" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2019:14179-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914179-1.html" source="SUSE-SU"/>
		<description>

This update for libxml2 doesn't fix any additional security issues, but correct its rpm changelog to reflect
all CVEs that have been fixed over the past.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584067" comment="libxml2-2.7.6-0.77.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584068" comment="libxml2-32bit-2.7.6-0.77.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584069" comment="libxml2-doc-2.7.6-0.77.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584070" comment="libxml2-python-2.7.6-0.77.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220173" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1159928" ref_url="https://bugzilla.suse.com/1159928" source="BUGZILLA"/>
		<reference ref_id="1161517" ref_url="https://bugzilla.suse.com/1161517" source="BUGZILLA"/>
		<reference ref_id="1161521" ref_url="https://bugzilla.suse.com/1161521" source="BUGZILLA"/>
		<reference ref_id="1176179" ref_url="https://bugzilla.suse.com/1176179" source="BUGZILLA"/>
		<reference ref_id="1185408" ref_url="https://bugzilla.suse.com/1185408" source="BUGZILLA"/>
		<reference ref_id="1185409" ref_url="https://bugzilla.suse.com/1185409" source="BUGZILLA"/>
		<reference ref_id="1185410" ref_url="https://bugzilla.suse.com/1185410" source="BUGZILLA"/>
		<reference ref_id="1185698" ref_url="https://bugzilla.suse.com/1185698" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2019-19956" ref_url="https://www.suse.com/security/cve/CVE-2019-19956/" source="CVE"/>
		<reference ref_id="CVE-2019-20388" ref_url="https://www.suse.com/security/cve/CVE-2019-20388/" source="CVE"/>
		<reference ref_id="CVE-2020-24977" ref_url="https://www.suse.com/security/cve/CVE-2020-24977/" source="CVE"/>
		<reference ref_id="CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595/" source="CVE"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<reference ref_id="CVE-2021-3537" ref_url="https://www.suse.com/security/cve/CVE-2021-3537/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

Security issues fixed:  

- CVE-2021-3537: NULL pointer dereference in valid.c:xmlValidBuildAContentModel (bsc#1185698)
- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).
- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).
- CVE-2021-3516: Fixed a use after free in xmlEncodeEntitiesInternal() in entities.c (bsc#1185409)
- CVE-2020-24977: Fixed a global-buffer-overflow in xmlEncodeEntitiesInternal (bsc#1176179).	  
- CVE-2019-20388: Fixed a memory leak in xmlSchemaPreRun (bsc#1161521).
- CVE-2020-7595: Fixed an infinite loop in an EOF situation (bsc#1161517).
- CVE-2019-19956: Fixed a memory leak in xmlParseBalancedChunkMemoryRecover (bsc#1159928).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159928">SUSE bug 1159928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161517">SUSE bug 1161517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161521">SUSE bug 1161521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176179">SUSE bug 1176179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185408">SUSE bug 1185408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185409">SUSE bug 1185409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185410">SUSE bug 1185410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185698">SUSE bug 1185698</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0191">CVE-2014-0191 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19956/">CVE-2019-19956 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19956">CVE-2019-19956 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20388/">CVE-2019-20388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20388">CVE-2019-20388 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24977/">CVE-2020-24977 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24977">CVE-2020-24977 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7595">CVE-2020-7595 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3516">CVE-2021-3516 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">CVE-2021-3517 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">CVE-2021-3518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3537/">CVE-2021-3537 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3537">CVE-2021-3537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584071" comment="libxml2-2.7.6-0.77.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584072" comment="libxml2-32bit-2.7.6-0.77.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584073" comment="libxml2-doc-2.7.6-0.77.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584074" comment="libxml2-python-2.7.6-0.77.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220174" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1196490" ref_url="https://bugzilla.suse.com/1196490" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010372.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2022-23308: Fixed a use-after-free of ID and IDREF attributes (bsc#1196490).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196490">SUSE bug 1196490</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23308">CVE-2022-23308 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670913" comment="libxml2-2.7.6-0.77.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670914" comment="libxml2-32bit-2.7.6-0.77.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670915" comment="libxml2-doc-2.7.6-0.77.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670916" comment="libxml2-python-2.7.6-0.77.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220175" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="928193" ref_url="https://bugzilla.suse.com/928193" source="BUGZILLA"/>
		<reference ref_id="951734" ref_url="https://bugzilla.suse.com/951734" source="BUGZILLA"/>
		<reference ref_id="951735" ref_url="https://bugzilla.suse.com/951735" source="BUGZILLA"/>
		<reference ref_id="956018" ref_url="https://bugzilla.suse.com/956018" source="BUGZILLA"/>
		<reference ref_id="956021" ref_url="https://bugzilla.suse.com/956021" source="BUGZILLA"/>
		<reference ref_id="956260" ref_url="https://bugzilla.suse.com/956260" source="BUGZILLA"/>
		<reference ref_id="957105" ref_url="https://bugzilla.suse.com/957105" source="BUGZILLA"/>
		<reference ref_id="957106" ref_url="https://bugzilla.suse.com/957106" source="BUGZILLA"/>
		<reference ref_id="957107" ref_url="https://bugzilla.suse.com/957107" source="BUGZILLA"/>
		<reference ref_id="957109" ref_url="https://bugzilla.suse.com/957109" source="BUGZILLA"/>
		<reference ref_id="957110" ref_url="https://bugzilla.suse.com/957110" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<description>

    This update fixes the following security issues: 

    * CVE-2015-1819 Enforce the reader to run in constant memory [bnc#928193]
    * CVE-2015-7941 Fix out of bound read with crafted xml input by stopping parsing on entities boundaries errors [bnc#951734]
    * CVE-2015-7942 Fix another variation of overflow in Conditional sections [bnc#951735]
    * CVE-2015-8241 Avoid extra processing of MarkupDecl when EOF [bnc#956018]
    * CVE-2015-8242 Buffer overead with HTML parser in push mode [bnc#956021]
    * CVE-2015-8317 Return if the encoding declaration is broken or encoding conversion failed [bnc#956260]
    * CVE-2015-5312 Fix another entity expansion issue [bnc#957105]
    * CVE-2015-7497 Avoid an heap buffer overflow in xmlDictComputeFastQKey [bnc#957106]
    * CVE-2015-7498 Processes entities after encoding conversion failures [bnc#957107]
    * CVE-2015-7499 Add xmlHaltParser() to stop the parser / Detect incoherency on GROW [bnc#957109]
    * CVE-2015-7500 Fix memory access error due to incorrect entities boundaries [bnc#957110]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-05"/>
	<updated date="2016-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/928193">SUSE bug 928193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951734">SUSE bug 951734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951735">SUSE bug 951735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956018">SUSE bug 956018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956021">SUSE bug 956021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956260">SUSE bug 956260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957105">SUSE bug 957105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957106">SUSE bug 957106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957107">SUSE bug 957107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957109">SUSE bug 957109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957110">SUSE bug 957110</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1819">CVE-2015-1819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5312">CVE-2015-5312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7497">CVE-2015-7497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7498">CVE-2015-7498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7499">CVE-2015-7499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7500">CVE-2015-7500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7941">CVE-2015-7941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7942">CVE-2015-7942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8241">CVE-2015-8241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8242">CVE-2015-8242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8317">CVE-2015-8317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578971" comment="libxml2-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578972" comment="libxml2-32bit-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578973" comment="libxml2-doc-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578974" comment="libxml2-python-2.7.6-0.34.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578975" comment="libxml2-x86-2.7.6-0.34.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578971" comment="libxml2-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578972" comment="libxml2-32bit-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578973" comment="libxml2-doc-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578974" comment="libxml2-python-2.7.6-0.34.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578975" comment="libxml2-x86-2.7.6-0.34.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220176" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="960674" ref_url="https://bugzilla.suse.com/960674" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8710" ref_url="https://www.suse.com/security/cve/CVE-2015-8710/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001817.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following security issue:

- CVE-2015-8710: Parsing short unclosed HTML comment could cause uninitialized memory access, which allowed remote attackers to read contents from previous HTTP requests depending on the application (bsc#960674)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960674">SUSE bug 960674</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8710/">CVE-2015-8710 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8710">CVE-2015-8710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578976" comment="libxml2-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578977" comment="libxml2-32bit-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578978" comment="libxml2-doc-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578979" comment="libxml2-python-2.7.6-0.37.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578980" comment="libxml2-x86-2.7.6-0.37.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578976" comment="libxml2-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578977" comment="libxml2-32bit-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578978" comment="libxml2-doc-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578979" comment="libxml2-python-2.7.6-0.37.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578980" comment="libxml2-x86-2.7.6-0.37.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220177" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1005591" ref_url="https://bugzilla.suse.com/1005591" source="BUGZILLA"/>
		<reference ref_id="1035905" ref_url="https://bugzilla.suse.com/1035905" source="BUGZILLA"/>
		<reference ref_id="934119" ref_url="https://bugzilla.suse.com/934119" source="BUGZILLA"/>
		<reference ref_id="952474" ref_url="https://bugzilla.suse.com/952474" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7995" ref_url="https://www.suse.com/security/cve/CVE-2015-7995/" source="CVE"/>
		<reference ref_id="CVE-2015-9019" ref_url="https://www.suse.com/security/cve/CVE-2015-9019/" source="CVE"/>
		<reference ref_id="CVE-2016-4738" ref_url="https://www.suse.com/security/cve/CVE-2016-4738/" source="CVE"/>
		<reference ref_id="CVE-2017-5029" ref_url="https://www.suse.com/security/cve/CVE-2017-5029/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002865.html" source="SUSE-SU"/>
		<description>

 This update for libxslt fixes the following issues:
 
- CVE-2017-5029: The xsltAddTextString function in transform.c lacked a check 
for integer overflow during a size calculation, which allowed a remote attacker 
to perform an out of bounds memory write via a crafted HTML page (bsc#1035905).

- CVE-2016-4738: Fix heap overread in xsltFormatNumberConversion: An empty decimal-separator 
could cause a heap overread. This can be exploited to leak a couple of bytes after 
the buffer that holds the pattern string (bsc#1005591).

- CVE-2015-9019: Properly initialize random generator (bsc#934119).

- CVE-2015-7995: Vulnerability in function xsltStylePreCompute' in preproc.c could cause a 
type confusion leading to DoS. (bsc#952474)

 		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-15"/>
	<updated date="2017-05-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005591">SUSE bug 1005591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035905">SUSE bug 1035905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934119">SUSE bug 934119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952474">SUSE bug 952474</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7995/">CVE-2015-7995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7995">CVE-2015-7995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-9019/">CVE-2015-9019 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9019">CVE-2015-9019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4738/">CVE-2016-4738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4738">CVE-2016-4738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5029/">CVE-2017-5029 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5029">CVE-2017-5029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584075" comment="libxslt-1.1.24-19.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584076" comment="libxslt-32bit-1.1.24-19.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584077" comment="libxslt-x86-1.1.24-19.33.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584075" comment="libxslt-1.1.24-19.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584076" comment="libxslt-32bit-1.1.24-19.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584077" comment="libxslt-x86-1.1.24-19.33.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220178" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1013533" ref_url="https://bugzilla.suse.com/1013533" source="BUGZILLA"/>
		<reference ref_id="1013604" ref_url="https://bugzilla.suse.com/1013604" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9576" ref_url="https://www.suse.com/security/cve/CVE-2016-9576/" source="CVE"/>
		<reference ref_id="CVE-2016-9794" ref_url="https://www.suse.com/security/cve/CVE-2016-9794/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002501.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to fix two security issues.

The following security bugs were fixed:

- CVE-2016-9576: A use-after-free vulnerability in the SCSI generic driver allows users with write access to /dev/sg* or /dev/bsg* to elevate their privileges (bsc#1013604).
- CVE-2016-9794: A use-after-free vulnerability in the ALSA pcm layer allowed local users to cause a denial of service, memory corruption or possibly even to elevate their privileges (bsc#1013533).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-20"/>
	<updated date="2016-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013533">SUSE bug 1013533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013604">SUSE bug 1013604</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9576/">CVE-2016-9576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9576">CVE-2016-9576 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9794/">CVE-2016-9794 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9794">CVE-2016-9794 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584078" comment="kernel-bigmem-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584079" comment="kernel-bigmem-base-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584081" comment="kernel-default-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584082" comment="kernel-default-base-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584084" comment="kernel-default-man-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584085" comment="kernel-ec2-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584086" comment="kernel-ec2-base-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584088" comment="kernel-pae-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584089" comment="kernel-pae-base-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584091" comment="kernel-ppc64-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584092" comment="kernel-ppc64-base-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584094" comment="kernel-source-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584095" comment="kernel-syms-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584096" comment="kernel-trace-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584097" comment="kernel-trace-base-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584099" comment="kernel-xen-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584100" comment="kernel-xen-base-3.0.101-91.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584078" comment="kernel-bigmem-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584079" comment="kernel-bigmem-base-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584081" comment="kernel-default-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584082" comment="kernel-default-base-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584084" comment="kernel-default-man-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584085" comment="kernel-ec2-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584086" comment="kernel-ec2-base-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584088" comment="kernel-pae-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584089" comment="kernel-pae-base-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584091" comment="kernel-ppc64-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584092" comment="kernel-ppc64-base-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584094" comment="kernel-source-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584095" comment="kernel-syms-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584096" comment="kernel-trace-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584097" comment="kernel-trace-base-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584099" comment="kernel-xen-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584100" comment="kernel-xen-base-3.0.101-91.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220179" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1005651" ref_url="https://bugzilla.suse.com/1005651" source="BUGZILLA"/>
		<reference ref_id="1008374" ref_url="https://bugzilla.suse.com/1008374" source="BUGZILLA"/>
		<reference ref_id="1008893" ref_url="https://bugzilla.suse.com/1008893" source="BUGZILLA"/>
		<reference ref_id="1013018" ref_url="https://bugzilla.suse.com/1013018" source="BUGZILLA"/>
		<reference ref_id="1013070" ref_url="https://bugzilla.suse.com/1013070" source="BUGZILLA"/>
		<reference ref_id="1013800" ref_url="https://bugzilla.suse.com/1013800" source="BUGZILLA"/>
		<reference ref_id="1013862" ref_url="https://bugzilla.suse.com/1013862" source="BUGZILLA"/>
		<reference ref_id="1016489" ref_url="https://bugzilla.suse.com/1016489" source="BUGZILLA"/>
		<reference ref_id="1017143" ref_url="https://bugzilla.suse.com/1017143" source="BUGZILLA"/>
		<reference ref_id="1018263" ref_url="https://bugzilla.suse.com/1018263" source="BUGZILLA"/>
		<reference ref_id="1018446" ref_url="https://bugzilla.suse.com/1018446" source="BUGZILLA"/>
		<reference ref_id="1019168" ref_url="https://bugzilla.suse.com/1019168" source="BUGZILLA"/>
		<reference ref_id="1020229" ref_url="https://bugzilla.suse.com/1020229" source="BUGZILLA"/>
		<reference ref_id="1021256" ref_url="https://bugzilla.suse.com/1021256" source="BUGZILLA"/>
		<reference ref_id="1021913" ref_url="https://bugzilla.suse.com/1021913" source="BUGZILLA"/>
		<reference ref_id="1022971" ref_url="https://bugzilla.suse.com/1022971" source="BUGZILLA"/>
		<reference ref_id="1023014" ref_url="https://bugzilla.suse.com/1023014" source="BUGZILLA"/>
		<reference ref_id="1023163" ref_url="https://bugzilla.suse.com/1023163" source="BUGZILLA"/>
		<reference ref_id="1023888" ref_url="https://bugzilla.suse.com/1023888" source="BUGZILLA"/>
		<reference ref_id="1024508" ref_url="https://bugzilla.suse.com/1024508" source="BUGZILLA"/>
		<reference ref_id="1024788" ref_url="https://bugzilla.suse.com/1024788" source="BUGZILLA"/>
		<reference ref_id="1024938" ref_url="https://bugzilla.suse.com/1024938" source="BUGZILLA"/>
		<reference ref_id="1025235" ref_url="https://bugzilla.suse.com/1025235" source="BUGZILLA"/>
		<reference ref_id="1025702" ref_url="https://bugzilla.suse.com/1025702" source="BUGZILLA"/>
		<reference ref_id="1026024" ref_url="https://bugzilla.suse.com/1026024" source="BUGZILLA"/>
		<reference ref_id="1026260" ref_url="https://bugzilla.suse.com/1026260" source="BUGZILLA"/>
		<reference ref_id="1026722" ref_url="https://bugzilla.suse.com/1026722" source="BUGZILLA"/>
		<reference ref_id="1026914" ref_url="https://bugzilla.suse.com/1026914" source="BUGZILLA"/>
		<reference ref_id="1027066" ref_url="https://bugzilla.suse.com/1027066" source="BUGZILLA"/>
		<reference ref_id="1027101" ref_url="https://bugzilla.suse.com/1027101" source="BUGZILLA"/>
		<reference ref_id="1027178" ref_url="https://bugzilla.suse.com/1027178" source="BUGZILLA"/>
		<reference ref_id="1028415" ref_url="https://bugzilla.suse.com/1028415" source="BUGZILLA"/>
		<reference ref_id="1028880" ref_url="https://bugzilla.suse.com/1028880" source="BUGZILLA"/>
		<reference ref_id="1029212" ref_url="https://bugzilla.suse.com/1029212" source="BUGZILLA"/>
		<reference ref_id="1029770" ref_url="https://bugzilla.suse.com/1029770" source="BUGZILLA"/>
		<reference ref_id="1030213" ref_url="https://bugzilla.suse.com/1030213" source="BUGZILLA"/>
		<reference ref_id="1030573" ref_url="https://bugzilla.suse.com/1030573" source="BUGZILLA"/>
		<reference ref_id="1031003" ref_url="https://bugzilla.suse.com/1031003" source="BUGZILLA"/>
		<reference ref_id="1031052" ref_url="https://bugzilla.suse.com/1031052" source="BUGZILLA"/>
		<reference ref_id="1031440" ref_url="https://bugzilla.suse.com/1031440" source="BUGZILLA"/>
		<reference ref_id="1031579" ref_url="https://bugzilla.suse.com/1031579" source="BUGZILLA"/>
		<reference ref_id="1032141" ref_url="https://bugzilla.suse.com/1032141" source="BUGZILLA"/>
		<reference ref_id="1033336" ref_url="https://bugzilla.suse.com/1033336" source="BUGZILLA"/>
		<reference ref_id="1033771" ref_url="https://bugzilla.suse.com/1033771" source="BUGZILLA"/>
		<reference ref_id="1033794" ref_url="https://bugzilla.suse.com/1033794" source="BUGZILLA"/>
		<reference ref_id="1033804" ref_url="https://bugzilla.suse.com/1033804" source="BUGZILLA"/>
		<reference ref_id="1033816" ref_url="https://bugzilla.suse.com/1033816" source="BUGZILLA"/>
		<reference ref_id="1034026" ref_url="https://bugzilla.suse.com/1034026" source="BUGZILLA"/>
		<reference ref_id="909486" ref_url="https://bugzilla.suse.com/909486" source="BUGZILLA"/>
		<reference ref_id="911105" ref_url="https://bugzilla.suse.com/911105" source="BUGZILLA"/>
		<reference ref_id="931620" ref_url="https://bugzilla.suse.com/931620" source="BUGZILLA"/>
		<reference ref_id="979021" ref_url="https://bugzilla.suse.com/979021" source="BUGZILLA"/>
		<reference ref_id="982783" ref_url="https://bugzilla.suse.com/982783" source="BUGZILLA"/>
		<reference ref_id="983212" ref_url="https://bugzilla.suse.com/983212" source="BUGZILLA"/>
		<reference ref_id="985561" ref_url="https://bugzilla.suse.com/985561" source="BUGZILLA"/>
		<reference ref_id="988065" ref_url="https://bugzilla.suse.com/988065" source="BUGZILLA"/>
		<reference ref_id="989056" ref_url="https://bugzilla.suse.com/989056" source="BUGZILLA"/>
		<reference ref_id="995542" ref_url="https://bugzilla.suse.com/995542" source="BUGZILLA"/>
		<reference ref_id="999245" ref_url="https://bugzilla.suse.com/999245" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3288" ref_url="https://www.suse.com/security/cve/CVE-2015-3288/" source="CVE"/>
		<reference ref_id="CVE-2015-8970" ref_url="https://www.suse.com/security/cve/CVE-2015-8970/" source="CVE"/>
		<reference ref_id="CVE-2016-10200" ref_url="https://www.suse.com/security/cve/CVE-2016-10200/" source="CVE"/>
		<reference ref_id="CVE-2016-5243" ref_url="https://www.suse.com/security/cve/CVE-2016-5243/" source="CVE"/>
		<reference ref_id="CVE-2017-2671" ref_url="https://www.suse.com/security/cve/CVE-2017-2671/" source="CVE"/>
		<reference ref_id="CVE-2017-5669" ref_url="https://www.suse.com/security/cve/CVE-2017-5669/" source="CVE"/>
		<reference ref_id="CVE-2017-5970" ref_url="https://www.suse.com/security/cve/CVE-2017-5970/" source="CVE"/>
		<reference ref_id="CVE-2017-5986" ref_url="https://www.suse.com/security/cve/CVE-2017-5986/" source="CVE"/>
		<reference ref_id="CVE-2017-6074" ref_url="https://www.suse.com/security/cve/CVE-2017-6074/" source="CVE"/>
		<reference ref_id="CVE-2017-6214" ref_url="https://www.suse.com/security/cve/CVE-2017-6214/" source="CVE"/>
		<reference ref_id="CVE-2017-6348" ref_url="https://www.suse.com/security/cve/CVE-2017-6348/" source="CVE"/>
		<reference ref_id="CVE-2017-6353" ref_url="https://www.suse.com/security/cve/CVE-2017-6353/" source="CVE"/>
		<reference ref_id="CVE-2017-7184" ref_url="https://www.suse.com/security/cve/CVE-2017-7184/" source="CVE"/>
		<reference ref_id="CVE-2017-7187" ref_url="https://www.suse.com/security/cve/CVE-2017-7187/" source="CVE"/>
		<reference ref_id="CVE-2017-7261" ref_url="https://www.suse.com/security/cve/CVE-2017-7261/" source="CVE"/>
		<reference ref_id="CVE-2017-7294" ref_url="https://www.suse.com/security/cve/CVE-2017-7294/" source="CVE"/>
		<reference ref_id="CVE-2017-7308" ref_url="https://www.suse.com/security/cve/CVE-2017-7308/" source="CVE"/>
		<reference ref_id="CVE-2017-7616" ref_url="https://www.suse.com/security/cve/CVE-2017-7616/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002880.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

Notable new features:

- Toleration of newer crypto hardware for z Systems
- USB 2.0 Link power management for Haswell-ULT

The following security bugs were fixed:

- CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bnc#1031579)
- CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux kernel was  too late in obtaining a certain lock and consequently could not ensure that disconnect function calls are safe, which allowed local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003)
- CVE-2017-7184: The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel did not validate certain size data after an XFRM_MSG_NEWAE update, which allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability (bsc#1030573).
- CVE-2017-5970: The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel allowed attackers to cause a denial of service (system crash) via (1) an application that made crafted system calls or possibly (2) IPv4 traffic with invalid IP options (bsc#1024938).
- CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel allowed local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation (bsc#1033336).
- CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440)
- CVE-2017-7261: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not check for a zero value of certain levels data, which allowed local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031052)
- CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function (bnc#1030213)
- CVE-2017-6348: The hashbin_delete function in net/irda/irqueue.c in the Linux kernel improperly managed lock dropping, which allowed local users to cause a denial of service (deadlock) via crafted operations on IrDA devices (bnc#1027178)
- CVE-2017-5669: The do_shmat function in ipc/shm.c in the Linux kernel did not restrict the address calculated by a certain rounding operation, which allowed local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context (bnc#1026914)
- CVE-2015-3288: mm/memory.c in the Linux kernel mishandled anonymous pages, which allowed local users to gain privileges or cause a denial of service (page tainting) via a crafted application that triggers writing to page zero (bsc#979021).
- CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c (bnc#1028415)
- CVE-2016-5243: The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel did not properly copy a certain string, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#983212)
- CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly restrict association peel-off operations during certain wait states, which allowed local users to cause a denial of service (invalid unlock and double free) via a multithreaded application (bnc#1027066)
- CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel allowed remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag (bnc#1026722)
- CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allowed local users to obtain root privileges or cause a denial of service (double free) via an application that made an IPV6_RECVPKTINFO setsockopt system call (bnc#1026024)
- CVE-2017-5986: Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bsc#1025235)
- CVE-2015-8970: crypto/algif_skcipher.c in the Linux kernel did not verify that a setkey operation has been performed on an AF_ALG socket an accept system call is processed, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted application that does not supply a key, related to the lrw_crypt function in crypto/lrw.c (bsc#1008374).

The following non-security bugs were fixed:

- NFSD: do not risk using duplicate owner/file/delegation ids (bsc#1029212).
- RAID1: avoid unnecessary spin locks in I/O barrier code (bsc#982783, bsc#1026260).
- SUNRPC: Clean up the slot table allocation (bsc#1013862).
- SUNRPC: Initalise the struct xprt upon allocation (bsc#1013862).
- USB: cdc-acm: fix broken runtime suspend (bsc#1033771).
- USB: cdc-acm: fix open and suspend race (bsc#1033771).
- USB: cdc-acm: fix potential urb leak and PM imbalance in write (bsc#1033771).
- USB: cdc-acm: fix runtime PM for control messages (bsc#1033771).
- USB: cdc-acm: fix runtime PM imbalance at shutdown (bsc#1033771).
- USB: cdc-acm: fix shutdown and suspend race (bsc#1033771).
- USB: cdc-acm: fix write and resume race (bsc#1033771).
- USB: cdc-acm: fix write and suspend race (bsc#1033771).
- USB: hub: Fix crash after failure to read BOS descriptor
- USB: serial: iuu_phoenix: fix NULL-deref at open (bsc#1033794).
- USB: serial: kl5kusb105: fix line-state error handling (bsc#1021256).
- USB: serial: mos7720: fix NULL-deref at open (bsc#1033816).
- USB: serial: mos7720: fix parallel probe (bsc#1033816).
- USB: serial: mos7720: fix parport use-after-free on probe errors (bsc#1033816).
- USB: serial: mos7720: fix use-after-free on probe errors (bsc#1033816).
- USB: serial: mos7840: fix NULL-deref at open (bsc#1034026).
- USB: xhci-mem: use passed in GFP flags instead of GFP_KERNEL (bsc#1023014).
- Update metadata for serial fixes (bsc#1013070)
- Use PF_LESS_THROTTLE in loop device thread (bsc#1027101).
- clocksource: Remove 'weak' from clocksource_default_clock() declaration (bnc#1013018).
- dlm: backport 'fix lvb invalidation conditions' (bsc#1005651).
- drm/mgag200: Add support for G200e rev 4 (bnc#995542, comment #81)
- enic: set skb-&gt;hash type properly (bsc#911105).
- ext4: fix mballoc breakage with 64k block size (bsc#1013018).
- ext4: fix stack memory corruption with 64k block size (bsc#1013018).
- ext4: reject inodes with negative size (bsc#1013018).
- fuse: initialize fc-&gt;release before calling it (bsc#1013018).
- i40e/i40evf: Break up xmit_descriptor_count from maybe_stop_tx (bsc#985561).
- i40e/i40evf: Fix mixed size frags and linearization (bsc#985561).
- i40e/i40evf: Limit TSO to 7 descriptors for payload instead of 8 per packet (bsc#985561).
- i40e/i40evf: Rewrite logic for 8 descriptor per packet check (bsc#985561).
- i40e: Fix TSO with more than 8 frags per segment issue (bsc#985561).
- i40e: Impose a lower limit on gso size (bsc#985561).
- i40e: Limit TX descriptor count in cases where frag size is greater than 16K (bsc#985561).
- i40e: avoid null pointer dereference (bsc#909486).
- jbd: Fix oops in journal_remove_journal_head() (bsc#1017143).
- jbd: do not wait (forever) for stale tid caused by wraparound (bsc#1020229).
- kABI: mask struct xfs_icdinode change (bsc#1024788).
- kabi: Protect xfs_mount and xfs_buftarg (bsc#1024508).
- kabi: fix (bsc#1008893).
- lockd: use init_utsname for id encoding (bsc#1033804).
- lockd: use rpc client's cl_nodename for id encoding (bsc#1033804).
- md linear: fix a race between linear_add() and linear_congested() (bsc#1018446).
- md/linear: shutup lockdep warnning (bsc#1018446).
- mm/mempolicy.c: do not put mempolicy before using its nodemask (bnc#931620).
- ocfs2: do not write error flag to user structure we cannot copy from/to (bsc#1013018).
- ocfs2: fix crash caused by stale lvb with fsdlm plugin (bsc#1013800).
- ocfs2: fix error return code in ocfs2_info_handle_freefrag() (bsc#1013018).
- ocfs2: null deref on allocation error (bsc#1013018).
- pciback: only check PF if actually dealing with a VF (bsc#999245).
- pciback: use pci_physfn() (bsc#999245).
- posix-timers: Fix stack info leak in timer_create() (bnc#1013018).
- powerpc,cpuidle: Dont toggle CPUIDLE_FLAG_IGNORE while setting smt_snooze_delay (bsc#1023163).
- powerpc/fadump: Fix the race in crash_fadump() (bsc#1022971).
- powerpc/fadump: Reserve memory at an offset closer to bottom of RAM (bsc#1032141).
- powerpc/fadump: Update fadump documentation (bsc#1032141).
- powerpc/nvram: Fix an incorrect partition merge (bsc#1016489).
- powerpc/vdso64: Use double word compare on pointers (bsc#1016489).
- rcu: Call out dangers of expedited RCU primitives (bsc#1008893).
- rcu: Direct algorithmic SRCU implementation (bsc#1008893).
- rcu: Flip -&gt;completed only once per SRCU grace period (bsc#1008893).
- rcu: Implement a variant of Peter's SRCU algorithm (bsc#1008893).
- rcu: Increment upper bit only for srcu_read_lock() (bsc#1008893).
- rcu: Remove fast check path from __synchronize_srcu() (bsc#1008893).
- s390/kmsg: add missing kmsg descriptions (bnc#1025702).
- s390/vmlogrdr: fix IUCV buffer allocation (bnc#1025702).
- s390/zcrypt: Introduce CEX6 toleration
- sched/core: Fix TASK_DEAD race in finish_task_switch() (bnc#1013018).
- sched/loadavg: Fix loadavg artifacts on fully idle and on fully loaded systems (bnc#1013018).
- scsi: zfcp: do not trace pure benign residual HBA responses at default level (bnc#1025702).
- scsi: zfcp: fix rport unblock race with LUN recovery (bnc#1025702).
- scsi: zfcp: fix use-after-'free' in FC ingress path after TMF (bnc#1025702).
- scsi: zfcp: fix use-after-free by not tracing WKA port open/close on failed send (bnc#1025702).
- sfc: reduce severity of PIO buffer alloc failures (bsc#1019168).
- tcp: abort orphan sockets stalling on zero window probes (bsc#1021913).
- vfs: split generic splice code from i_mutex locking (bsc#1024788).
- virtio_scsi: fix memory leak on full queue condition (bsc#1028880).
- vmxnet3: segCnt can be 1 for LRO packets (bsc#988065, bsc#1029770).
- xen-blkfront: correct maximum segment accounting (bsc#1018263).
- xen-blkfront: do not call talk_to_blkback when already connected to blkback.
- xen-blkfront: free resources if xlvbd_alloc_gendisk fails.
- xfs: Fix lock ordering in splice write (bsc#1024788).
- xfs: Make xfs_icdinode-&gt;di_dmstate atomic_t (bsc#1024788).
- xfs: do not assert fail on non-async buffers on ioacct decrement (bsc#1024508).
- xfs: exclude never-released buffers from buftarg I/O accounting (bsc#1024508).
- xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056).
- xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888).
- xfs: kill xfs_itruncate_start (bsc#1024788).
- xfs: remove the i_new_size field in struct xfs_inode (bsc#1024788).
- xfs: remove the i_size field in struct xfs_inode (bsc#1024788).
- xfs: remove xfs_itruncate_data (bsc#1024788).
- xfs: replace global xfslogd wq with per-mount wq (bsc#1024508).
- xfs: split xfs_itruncate_finish (bsc#1024788).
- xfs: split xfs_setattr (bsc#1024788).
- xfs: track and serialize in-flight async buffers against unmount (bsc#1024508).
- xfs_dmapi: fix the debug compilation of xfs_dmapi (bsc#989056).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-15"/>
	<updated date="2017-05-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005651">SUSE bug 1005651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008374">SUSE bug 1008374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008893">SUSE bug 1008893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013018">SUSE bug 1013018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013070">SUSE bug 1013070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013800">SUSE bug 1013800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013862">SUSE bug 1013862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016489">SUSE bug 1016489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017143">SUSE bug 1017143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018263">SUSE bug 1018263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018446">SUSE bug 1018446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019168">SUSE bug 1019168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020229">SUSE bug 1020229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021256">SUSE bug 1021256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021913">SUSE bug 1021913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022971">SUSE bug 1022971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023014">SUSE bug 1023014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023163">SUSE bug 1023163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023888">SUSE bug 1023888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024508">SUSE bug 1024508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024788">SUSE bug 1024788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024938">SUSE bug 1024938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025235">SUSE bug 1025235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025702">SUSE bug 1025702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026024">SUSE bug 1026024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026260">SUSE bug 1026260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026722">SUSE bug 1026722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026914">SUSE bug 1026914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027066">SUSE bug 1027066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027101">SUSE bug 1027101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027178">SUSE bug 1027178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028415">SUSE bug 1028415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028880">SUSE bug 1028880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029212">SUSE bug 1029212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029770">SUSE bug 1029770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030213">SUSE bug 1030213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030573">SUSE bug 1030573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031003">SUSE bug 1031003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031052">SUSE bug 1031052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031440">SUSE bug 1031440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031579">SUSE bug 1031579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032141">SUSE bug 1032141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033336">SUSE bug 1033336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033771">SUSE bug 1033771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033794">SUSE bug 1033794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033804">SUSE bug 1033804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033816">SUSE bug 1033816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034026">SUSE bug 1034026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909486">SUSE bug 909486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911105">SUSE bug 911105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931620">SUSE bug 931620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979021">SUSE bug 979021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982783">SUSE bug 982783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983212">SUSE bug 983212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985561">SUSE bug 985561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988065">SUSE bug 988065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989056">SUSE bug 989056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995542">SUSE bug 995542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999245">SUSE bug 999245</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3288/">CVE-2015-3288 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3288">CVE-2015-3288 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8970/">CVE-2015-8970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8970">CVE-2015-8970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10200/">CVE-2016-10200 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10200">CVE-2016-10200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5243/">CVE-2016-5243 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5243">CVE-2016-5243 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2671/">CVE-2017-2671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2671">CVE-2017-2671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5669/">CVE-2017-5669 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5669">CVE-2017-5669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5970/">CVE-2017-5970 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5970">CVE-2017-5970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5986/">CVE-2017-5986 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5986">CVE-2017-5986 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6074/">CVE-2017-6074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6074">CVE-2017-6074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6214/">CVE-2017-6214 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6214">CVE-2017-6214 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6348/">CVE-2017-6348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6348">CVE-2017-6348 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6353/">CVE-2017-6353 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6353">CVE-2017-6353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7184/">CVE-2017-7184 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7184">CVE-2017-7184 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7187/">CVE-2017-7187 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7187">CVE-2017-7187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7261/">CVE-2017-7261 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7261">CVE-2017-7261 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7294/">CVE-2017-7294 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7294">CVE-2017-7294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7308/">CVE-2017-7308 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7308">CVE-2017-7308 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7616/">CVE-2017-7616 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7616">CVE-2017-7616 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584102" comment="kernel-bigmem-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584103" comment="kernel-bigmem-base-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584105" comment="kernel-default-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584106" comment="kernel-default-base-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584108" comment="kernel-default-man-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584109" comment="kernel-ec2-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584110" comment="kernel-ec2-base-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584112" comment="kernel-pae-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584113" comment="kernel-pae-base-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584115" comment="kernel-ppc64-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584116" comment="kernel-ppc64-base-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584118" comment="kernel-source-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584119" comment="kernel-syms-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584120" comment="kernel-trace-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584121" comment="kernel-trace-base-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584123" comment="kernel-xen-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584124" comment="kernel-xen-base-3.0.101-100.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584102" comment="kernel-bigmem-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584103" comment="kernel-bigmem-base-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584105" comment="kernel-default-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584106" comment="kernel-default-base-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584108" comment="kernel-default-man-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584109" comment="kernel-ec2-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584110" comment="kernel-ec2-base-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584112" comment="kernel-pae-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584113" comment="kernel-pae-base-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584115" comment="kernel-ppc64-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584116" comment="kernel-ppc64-base-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584118" comment="kernel-source-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584119" comment="kernel-syms-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584120" comment="kernel-trace-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584121" comment="kernel-trace-base-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584123" comment="kernel-xen-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584124" comment="kernel-xen-base-3.0.101-100.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220180" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1159646" ref_url="https://bugzilla.suse.com/1159646" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17571" ref_url="https://www.suse.com/security/cve/CVE-2019-17571/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006321.html" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2019-17571: Fixed a remote code execution by deserialization of untrusted data in SocketServer (bsc#1159646).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159646">SUSE bug 1159646</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17571/">CVE-2019-17571 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17571">CVE-2019-17571 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568460" comment="log4j-1.2.15-26.32.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220181" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1193662" ref_url="https://bugzilla.suse.com/1193662" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009915.html" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2021-4104: Disable the JMSAppender class from log4j to protect against
  the log4jshell vulnerability. [bsc#1193662]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-17"/>
	<updated date="2021-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104">CVE-2021-4104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660155" comment="log4j-1.2.15-26.32.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220182" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1194842" ref_url="https://bugzilla.suse.com/1194842" source="BUGZILLA"/>
		<reference ref_id="1194843" ref_url="https://bugzilla.suse.com/1194843" source="BUGZILLA"/>
		<reference ref_id="1194844" ref_url="https://bugzilla.suse.com/1194844" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23302" ref_url="https://www.suse.com/security/cve/CVE-2022-23302/" source="CVE"/>
		<reference ref_id="CVE-2022-23305" ref_url="https://www.suse.com/security/cve/CVE-2022-23305/" source="CVE"/>
		<reference ref_id="CVE-2022-23307" ref_url="https://www.suse.com/security/cve/CVE-2022-23307/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010085.html" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2022-23307: Fixed deserialization flaw in the chainsaw component of log4j leading to malicious code execution. (bsc#1194844)
- CVE-2022-23305: Fixed SQL injection when application is configured to use JDBCAppender. (bsc#1194843)
- CVE-2022-23302: Fixed remote code execution when application is configured to use JMSSink. (bsc#1194842)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194842">SUSE bug 1194842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194843">SUSE bug 1194843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194844">SUSE bug 1194844</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23302/">CVE-2022-23302 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23302">CVE-2022-23302 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23305/">CVE-2022-23305 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23305">CVE-2022-23305 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23307/">CVE-2022-23307 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23307">CVE-2022-23307 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664707" comment="log4j-1.2.15-26.32.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220183" version="1" class="patch">
	<metadata>
		<title>Security update for lxc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="946744" ref_url="https://bugzilla.suse.com/946744" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1335" ref_url="https://www.suse.com/security/cve/CVE-2015-1335/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001647.html" source="SUSE-SU"/>
		<description>
lxc was update to fix one security issue.

The following vulnerability was fixed:

* CVE-2015-1335: A directory traversal flaw while lxc-start is initially setting up the mounts for a container (bsc#946744)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-05"/>
	<updated date="2015-10-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/946744">SUSE bug 946744</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1335/">CVE-2015-1335 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1335">CVE-2015-1335 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579000" comment="lxc-0.8.0-0.25.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579000" comment="lxc-0.8.0-0.25.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220184" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="995352" ref_url="https://bugzilla.suse.com/995352" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6893" ref_url="https://www.suse.com/security/cve/CVE-2016-6893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004172.html" source="SUSE-SU"/>
		<description>
This update for mailman to version 2.1.15 fixes the following issues:

- CVE-2016-6893: Prevent cross-site request forgery (CSRF) vulnerability in the
  user options page that allowed remote attackers to hijack the authentication of
  arbitrary users for requests that modify an option (bsc#995352).
- Various other hardenings against CSFR attacks

For details please see https://launchpad.net/mailman/+milestone/2.1.15
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-11"/>
	<updated date="2018-06-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/995352">SUSE bug 995352</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6893/">CVE-2016-6893 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6893">CVE-2016-6893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584126" comment="mailman-2.1.15-9.6.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584126" comment="mailman-2.1.15-9.6.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220185" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1077358" ref_url="https://bugzilla.suse.com/1077358" source="BUGZILLA"/>
		<reference ref_id="1099510" ref_url="https://bugzilla.suse.com/1099510" source="BUGZILLA"/>
		<reference ref_id="1101288" ref_url="https://bugzilla.suse.com/1101288" source="BUGZILLA"/>
		<reference ref_id="925502" ref_url="https://bugzilla.suse.com/925502" source="BUGZILLA"/>
		<reference ref_id="995352" ref_url="https://bugzilla.suse.com/995352" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2775" ref_url="https://www.suse.com/security/cve/CVE-2015-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-6893" ref_url="https://www.suse.com/security/cve/CVE-2016-6893/" source="CVE"/>
		<reference ref_id="CVE-2018-0618" ref_url="https://www.suse.com/security/cve/CVE-2018-0618/" source="CVE"/>
		<reference ref_id="CVE-2018-13796" ref_url="https://www.suse.com/security/cve/CVE-2018-13796/" source="CVE"/>
		<reference ref_id="CVE-2018-5950" ref_url="https://www.suse.com/security/cve/CVE-2018-5950/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005015.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

- Fixed a XSS vulnerability and information leak in user options CGI, which
  could be used to execute arbitrary scripts in the user's browser via
  specially encoded URLs (bsc#1077358 CVE-2018-5950)
- Fixed a directory traversal vulnerability in MTA transports when using the
  recommended Mailman Transport for Exim (bsc#925502 CVE-2015-2775)
- Fixed a XSS vulnerability, which allowed malicious listowners to inject
  scripts into the listinfo pages (bsc#1099510 CVE-2018-0618)
- Fixed arbitrary text injection vulnerability in several mailman CGIs
  (CVE-2018-13796 bsc#1101288)
- Fixed a CSRF vulnerability on the user options page (CVE-2016-6893 bsc#995352)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-04"/>
	<updated date="2019-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077358">SUSE bug 1077358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099510">SUSE bug 1099510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101288">SUSE bug 1101288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925502">SUSE bug 925502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995352">SUSE bug 995352</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-2775/">CVE-2015-2775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2775">CVE-2015-2775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6893/">CVE-2016-6893 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6893">CVE-2016-6893 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-0618/">CVE-2018-0618 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0618">CVE-2018-0618 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13796/">CVE-2018-13796 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13796">CVE-2018-13796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5950/">CVE-2018-5950 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5950">CVE-2018-5950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584127" comment="mailman-2.1.15-9.6.6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584127" comment="mailman-2.1.15-9.6.6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220186" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1102416" ref_url="https://bugzilla.suse.com/1102416" source="BUGZILLA"/>
		<reference ref_id="997205" ref_url="https://bugzilla.suse.com/997205" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6893" ref_url="https://www.suse.com/security/cve/CVE-2016-6893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005519.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

Security issue fixed:

- CVE-2016-6893: Fixed a Cross-site request forgery vulnerability in the admin web interface (bsc#997205).

Following bug was fixed:

- Allow CSRF check to pass in mailman web frontend if the list
  name contains a '+' (bsc#1102416)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102416">SUSE bug 1102416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997205">SUSE bug 997205</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6893/">CVE-2016-6893 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6893">CVE-2016-6893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584128" comment="mailman-2.1.15-9.6.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220187" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1154328" ref_url="https://bugzilla.suse.com/1154328" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3693" ref_url="https://www.suse.com/security/cve/CVE-2019-3693/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006168.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:
	  
- CVE-2019-3693: Fixed a local privilege escalation from wwwrun to root (bsc#1154328).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154328">SUSE bug 1154328</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3693/">CVE-2019-3693 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3693">CVE-2019-3693 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584129" comment="mailman-2.1.15-9.6.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220188" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1167068" ref_url="https://bugzilla.suse.com/1167068" source="BUGZILLA"/>
		<reference ref_id="1170558" ref_url="https://bugzilla.suse.com/1170558" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12137" ref_url="https://www.suse.com/security/cve/CVE-2020-12137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006780.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

Security issue fixed:

- CVE-2020-12137: Fixed a XSS vulnerability caused by MIME type confusion (bsc#1170558).

Non-security issue fixed:

- Fixed rights and ownership on /var/lib/mailman/archives (bsc#1167068).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167068">SUSE bug 1167068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170558">SUSE bug 1170558</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12137/">CVE-2020-12137 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12137">CVE-2020-12137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584130" comment="mailman-2.1.15-9.6.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220189" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1173369" ref_url="https://bugzilla.suse.com/1173369" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15011" ref_url="https://www.suse.com/security/cve/CVE-2020-15011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007138.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

- CVE-2020-15011: Fixed a possible Arbitrary Content Injection via the private archive login page (bsc#1173369).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173369">SUSE bug 1173369</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15011/">CVE-2020-15011 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15011">CVE-2020-15011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584131" comment="mailman-2.1.15-9.6.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220190" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1000751" ref_url="https://bugzilla.suse.com/1000751" source="BUGZILLA"/>
		<reference ref_id="1009026" ref_url="https://bugzilla.suse.com/1009026" source="BUGZILLA"/>
		<reference ref_id="1010395" ref_url="https://bugzilla.suse.com/1010395" source="BUGZILLA"/>
		<reference ref_id="1010401" ref_url="https://bugzilla.suse.com/1010401" source="BUGZILLA"/>
		<reference ref_id="1010402" ref_url="https://bugzilla.suse.com/1010402" source="BUGZILLA"/>
		<reference ref_id="1010404" ref_url="https://bugzilla.suse.com/1010404" source="BUGZILLA"/>
		<reference ref_id="1010410" ref_url="https://bugzilla.suse.com/1010410" source="BUGZILLA"/>
		<reference ref_id="1010422" ref_url="https://bugzilla.suse.com/1010422" source="BUGZILLA"/>
		<reference ref_id="1010427" ref_url="https://bugzilla.suse.com/1010427" source="BUGZILLA"/>
		<reference ref_id="1010517" ref_url="https://bugzilla.suse.com/1010517" source="BUGZILLA"/>
		<reference ref_id="1012964" ref_url="https://bugzilla.suse.com/1012964" source="BUGZILLA"/>
		<reference ref_id="992549" ref_url="https://bugzilla.suse.com/992549" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5285" ref_url="https://www.suse.com/security/cve/CVE-2016-5285/" source="CVE"/>
		<reference ref_id="CVE-2016-5290" ref_url="https://www.suse.com/security/cve/CVE-2016-5290/" source="CVE"/>
		<reference ref_id="CVE-2016-5291" ref_url="https://www.suse.com/security/cve/CVE-2016-5291/" source="CVE"/>
		<reference ref_id="CVE-2016-5296" ref_url="https://www.suse.com/security/cve/CVE-2016-5296/" source="CVE"/>
		<reference ref_id="CVE-2016-5297" ref_url="https://www.suse.com/security/cve/CVE-2016-5297/" source="CVE"/>
		<reference ref_id="CVE-2016-9064" ref_url="https://www.suse.com/security/cve/CVE-2016-9064/" source="CVE"/>
		<reference ref_id="CVE-2016-9066" ref_url="https://www.suse.com/security/cve/CVE-2016-9066/" source="CVE"/>
		<reference ref_id="CVE-2016-9074" ref_url="https://www.suse.com/security/cve/CVE-2016-9074/" source="CVE"/>
		<reference ref_id="CVE-2016-9079" ref_url="https://www.suse.com/security/cve/CVE-2016-9079/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002464.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, mozilla-nss fixes security issues and bugs.

The following vulnerabilities were fixed in Firefox ESR 45.5.1 (bsc#1009026 bsc#1012964):

- CVE-2016-9079: Use-after-free in SVG Animation (MFSA 2016-92  bsc#1012964)
- CVE-2016-5297: Incorrect argument length checking in Javascript (bsc#1010401)
- CVE-2016-9066: Integer overflow leading to a buffer overflow in nsScriptLoadHandler (bsc#1010404)
- CVE-2016-5296: Heap-buffer-overflow WRITE in rasterize_edges_1 (bsc#1010395)
- CVE-2016-9064: Addons update must verify IDs match between current and new versions (bsc#1010402)
- CVE-2016-5290: Memory safety bugs fixed in Firefox 50 and Firefox ESR 45.5 (bsc#1010427)
- CVE-2016-5291: Same-origin policy violation using local HTML file and saved shortcut file (bsc#1010410)

The following vulnerabilities were fixed in mozilla-nss 3.21.3:

- CVE-2016-9074: Insufficient timing side-channel resistance in divSpoiler (bsc#1010422)
- CVE-2016-5285: Missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime causes server crash (bsc#1010517)
    
The following bugs were fixed:

- Firefox would fail to go into fullscreen mode with some window managers (bsc#992549)
- font warning messages would flood console, now using fontconfig configuration from
  firefox-fontconfig instead of the system one (bsc#1000751)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-10"/>
	<updated date="2016-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000751">SUSE bug 1000751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010395">SUSE bug 1010395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010401">SUSE bug 1010401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010402">SUSE bug 1010402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010404">SUSE bug 1010404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010410">SUSE bug 1010410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010422">SUSE bug 1010422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010427">SUSE bug 1010427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010517">SUSE bug 1010517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012964">SUSE bug 1012964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992549">SUSE bug 992549</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5285/">CVE-2016-5285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5285">CVE-2016-5285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5290/">CVE-2016-5290 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5290">CVE-2016-5290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5291/">CVE-2016-5291 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5291">CVE-2016-5291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5296/">CVE-2016-5296 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5296">CVE-2016-5296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5297/">CVE-2016-5297 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5297">CVE-2016-5297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9064/">CVE-2016-9064 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9064">CVE-2016-9064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9066/">CVE-2016-9066 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9066">CVE-2016-9066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9074/">CVE-2016-9074 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9074">CVE-2016-9074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9079/">CVE-2016-9079 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9079">CVE-2016-9079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584132" comment="MozillaFirefox-45.5.1esr-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584133" comment="MozillaFirefox-translations-45.5.1esr-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584134" comment="libfreebl3-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584135" comment="libfreebl3-32bit-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584136" comment="libfreebl3-x86-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584137" comment="libsoftokn3-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584138" comment="libsoftokn3-32bit-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584139" comment="libsoftokn3-x86-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584140" comment="mozilla-nss-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584141" comment="mozilla-nss-32bit-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584142" comment="mozilla-nss-tools-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584143" comment="mozilla-nss-x86-3.21.3-39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584132" comment="MozillaFirefox-45.5.1esr-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584133" comment="MozillaFirefox-translations-45.5.1esr-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584134" comment="libfreebl3-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584135" comment="libfreebl3-32bit-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584136" comment="libfreebl3-x86-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584137" comment="libsoftokn3-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584138" comment="libsoftokn3-32bit-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584139" comment="libsoftokn3-x86-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584140" comment="mozilla-nss-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584141" comment="mozilla-nss-32bit-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584142" comment="mozilla-nss-tools-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584143" comment="mozilla-nss-x86-3.21.3-39.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220191" version="1" class="patch">
	<metadata>
		<title>Security update for mgetty (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1108752" ref_url="https://bugzilla.suse.com/1108752" source="BUGZILLA"/>
		<reference ref_id="1108756" ref_url="https://bugzilla.suse.com/1108756" source="BUGZILLA"/>
		<reference ref_id="1108757" ref_url="https://bugzilla.suse.com/1108757" source="BUGZILLA"/>
		<reference ref_id="1108761" ref_url="https://bugzilla.suse.com/1108761" source="BUGZILLA"/>
		<reference ref_id="1108762" ref_url="https://bugzilla.suse.com/1108762" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16741" ref_url="https://www.suse.com/security/cve/CVE-2018-16741/" source="CVE"/>
		<reference ref_id="CVE-2018-16742" ref_url="https://www.suse.com/security/cve/CVE-2018-16742/" source="CVE"/>
		<reference ref_id="CVE-2018-16743" ref_url="https://www.suse.com/security/cve/CVE-2018-16743/" source="CVE"/>
		<reference ref_id="CVE-2018-16744" ref_url="https://www.suse.com/security/cve/CVE-2018-16744/" source="CVE"/>
		<reference ref_id="CVE-2018-16745" ref_url="https://www.suse.com/security/cve/CVE-2018-16745/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004595.html" source="SUSE-SU"/>
		<description>
This update for mgetty fixes the following issues:

- CVE-2018-16741: The function do_activate() did not properly sanitize shell
  metacharacters to prevent command injection (bsc#1108752)
- CVE-2018-16745: The mail_to parameter was not sanitized, leading to a buffer
  overflow if long untrusted input reached it (bsc#1108756)
- CVE-2018-16744: The mail_to parameter was not sanitized, leading to command
  injection if untrusted input reached reach it (bsc#1108757)
- CVE-2018-16742: Prevent stack-based buffer overflow that could have been
  triggered via a command-line parameter (bsc#1108762)
- CVE-2018-16743: The command-line parameter username wsa passed unsanitized to
  strcpy(), which could have caused a stack-based buffer overflow (bsc#1108761)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-25"/>
	<updated date="2018-09-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1108752">SUSE bug 1108752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108756">SUSE bug 1108756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108757">SUSE bug 1108757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108761">SUSE bug 1108761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108762">SUSE bug 1108762</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16741/">CVE-2018-16741 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16741">CVE-2018-16741 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16742/">CVE-2018-16742 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16742">CVE-2018-16742 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16743/">CVE-2018-16743 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16743">CVE-2018-16743 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16744/">CVE-2018-16744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16744">CVE-2018-16744 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16745/">CVE-2018-16745 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16745">CVE-2018-16745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584144" comment="g3utils-1.1.36-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584145" comment="mgetty-1.1.36-28.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584144" comment="g3utils-1.1.36-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584145" comment="mgetty-1.1.36-28.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220192" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1075262" ref_url="https://bugzilla.suse.com/1075262" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003587.html" source="SUSE-SU"/>
		<description>


Update to Intel microcode version 20180108 (bsc#1075262 CVE-2017-5715)

- The pre-released microcode fixing some important security issues
  is now officially published (and included in the added tarball).

Among other updates it contains:

- IVT C0          (06-3e-04:ed) 428-&gt;42a
- SKL-U/Y D0      (06-4e-03:c0) ba-&gt;c2
- BDW-U/Y E/F     (06-3d-04:c0) 25-&gt;28
- HSW-ULT Cx/Dx   (06-45-01:72) 20-&gt;21
- Crystalwell Cx  (06-46-01:32) 17-&gt;18
- BDW-H E/G       (06-47-01:22) 17-&gt;1b
- HSX-EX E0       (06-3f-04:80) 0f-&gt;10
- SKL-H/S R0      (06-5e-03:36) ba-&gt;c2
- HSW Cx/Dx       (06-3c-03:32) 22-&gt;23
- HSX C0          (06-3f-02:6f) 3a-&gt;3b
- BDX-DE V0/V1    (06-56-02:10) 0f-&gt;14
- BDX-DE V2       (06-56-03:10) 700000d-&gt;7000011
- KBL-U/Y H0      (06-8e-09:c0) 62-&gt;80
- KBL Y0 / CFL D0 (06-8e-0a:c0) 70-&gt;80
- KBL-H/S B0      (06-9e-09:2a) 5e-&gt;80
- CFL U0          (06-9e-0a:22) 70-&gt;80
- CFL B0          (06-9e-0b:02) 72-&gt;80
- SKX H0          (06-55-04:b7) 2000035-&gt;200003c
- GLK B0          (06-7a-01:01) 1e-&gt;22
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-11"/>
	<updated date="2018-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1075262">SUSE bug 1075262</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579011" comment="microcode_ctl-1.17-102.83.9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579011" comment="microcode_ctl-1.17-102.83.9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220193" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1085207" ref_url="https://bugzilla.suse.com/1085207" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003818.html" source="SUSE-SU"/>
		<description>

  
This update for ucode-intel fixes the following issues:

The Intel CPU microcode version was updated to version 20180312.

This update enables the IBPB+IBRS based mitigations of the Spectre v2 flaws (boo#1085207 CVE-2017-5715)

- New Platforms

  - BDX-DE EGW A0 6-56-5:10 e000009
  - SKX B1 6-55-3:97 1000140

- Updates

  - SNB D2 6-2a-7:12 29-&gt;2d
  - JKT C1 6-2d-6:6d 619-&gt;61c
  - JKT C2 6-2d-7:6d 710-&gt;713
  - IVB E2 6-3a-9:12 1c-&gt;1f
  - IVT C0 6-3e-4:ed 428-&gt;42c
  - IVT D1 6-3e-7:ed 70d-&gt;713
  - HSW Cx/Dx 6-3c-3:32 22-&gt;24
  - HSW-ULT Cx/Dx 6-45-1:72 20-&gt;23
  - CRW Cx 6-46-1:32 17-&gt;19
  - HSX C0 6-3f-2:6f 3a-&gt;3c
  - HSX-EX E0 6-3f-4:80 0f-&gt;11
  - BDW-U/Y E/F 6-3d-4:c0 25-&gt;2a
  - BDW-H E/G 6-47-1:22 17-&gt;1d
  - BDX-DE V0/V1 6-56-2:10 0f-&gt;15
  - BDW-DE V2 6-56-3:10 700000d-&gt;7000012
  - BDW-DE Y0 6-56-4:10 f00000a-&gt;f000011
  - SKL-U/Y D0 6-4e-3:c0 ba-&gt;c2
  - SKL R0 6-5e-3:36 ba-&gt;c2
  - KBL-U/Y H0 6-8e-9:c0 62-&gt;84
  - KBL B0 6-9e-9:2a 5e-&gt;84
  - CFL D0 6-8e-a:c0 70-&gt;84
  - CFL U0 6-9e-a:22 70-&gt;84
  - CFL B0 6-9e-b:02 72-&gt;84
  - SKX H0 6-55-4:b7 2000035-&gt;2000043

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-16"/>
	<updated date="2018-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085207">SUSE bug 1085207</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579012" comment="microcode_ctl-1.17-102.83.15.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579012" comment="microcode_ctl-1.17-102.83.15.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220194" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1095735" ref_url="https://bugzilla.suse.com/1095735" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004203.html" source="SUSE-SU"/>
		<description>
This update for microcode_ctl fixes the following security issue:

- CVE-2017-5715: Prevent unauthorized disclosure of information to an attacker
  with local user access caused by speculative execution and indirect branch
  prediction (bsc#1095735)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-19"/>
	<updated date="2018-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1095735">SUSE bug 1095735</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584146" comment="microcode_ctl-1.17-102.83.21.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584146" comment="microcode_ctl-1.17-102.83.21.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220195" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087083" ref_url="https://bugzilla.suse.com/1087083" source="BUGZILLA"/>
		<reference ref_id="1100147" ref_url="https://bugzilla.suse.com/1100147" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004322.html" source="SUSE-SU"/>
		<description>

  
This update for microcode_ctl fixes the following issues:

The Intel CPU Microcode bundle was updated to the 20180703 release

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a) and
helps mitigating CVE-2018-3639 (Spectre v4)  (bsc#1100147 bsc#1087082 bsc#1087083)

More details can be found on:

  https://downloadcenter.intel.com/download/27945/Linux-Processor-Microcode-Data-File

Following chipsets are fixed in this round:

Model        Stepping F-MO-S/PI      Old-&gt;New
---- updated platforms ------------------------------------
SNB-EP       C1       6-2d-6/6d 0000061c-&gt;0000061d Xeon E5
SNB-EP       C2       6-2d-7/6d 00000713-&gt;00000714 Xeon E5
IVT          C0       6-3e-4/ed 0000042c-&gt;0000042d Xeon E5 v2; Core i7-4960X/4930K/4820K
IVT          D1       6-3e-7/ed 00000713-&gt;00000714 Xeon E5 v2
HSX-E/EP/4S  C0       6-3f-2/6f 0000003c-&gt;0000003d Xeon E5 v3
HSX-EX       E0       6-3f-4/80 00000011-&gt;00000012 Xeon E7 v3
SKX-SP/D/W/X H0       6-55-4/b7 02000043-&gt;0200004d Xeon Bronze 31xx, Silver 41xx, Gold 51xx/61xx Platinum 81xx, D/W-21xx; Core i9-7xxxX
BDX-DE       A1       6-56-5/10 0e000009-&gt;0e00000a Xeon D-15x3N
BDX-ML       B/M/R0   6-4f-1/ef 0b00002c-&gt;0b00002e Xeon E5/E7 v4; Core i7-69xx/68xx
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-26"/>
	<updated date="2018-07-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100147">SUSE bug 1100147</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3640">CVE-2018-3640 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579014" comment="microcode_ctl-1.17-102.83.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579014" comment="microcode_ctl-1.17-102.83.24.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220196" version="1" class="patch">
	<metadata>
		<title>Security update to ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087083" ref_url="https://bugzilla.suse.com/1087083" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1104134" ref_url="https://bugzilla.suse.com/1104134" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004419.html" source="SUSE-SU"/>
		<description>

ucode-intel was updated to the 20180807 release.

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a), and is part of the 
mitigations for CVE-2018-3639 (Spectre v4) and CVE-2018-3646 (L1 Terminal Fault).
(bsc#1104134 bsc#1087082 bsc#1087083 bsc#1089343)

 Processor             Identifier     Version       Products

 Model        Stepping F-MO-S/PI      Old-&gt;New

 ---- new platforms ----------------------------------------
 WSM-EP/WS    U1       6-2c-2/03           0000001f Xeon E/L/X56xx, W36xx
 NHM-EX       D0       6-2e-6/04           0000000d Xeon E/L/X65xx/75xx
 BXT          C0       6-5c-2/01           00000014 Atom T5500/5700
 APL          E0       6-5c-a/03           0000000c Atom x5-E39xx
 DVN          B0       6-5f-1/01           00000024 Atom C3xxx
 ---- updated platforms ------------------------------------
 NHM-EP/WS    D0       6-1a-5/03 00000019-&gt;0000001d Xeon E/L/X/W55xx
 NHM          B1       6-1e-5/13 00000007-&gt;0000000a Core i7-8xx, i5-7xx; Xeon L3426, X24xx
 WSM          B1       6-25-2/12 0000000e-&gt;00000011 Core i7-6xx, i5-6xx/4xxM, i3-5xx/3xxM, Pentium G69xx, Celeon P45xx; Xeon L3406
 WSM          K0       6-25-5/92 00000004-&gt;00000007 Core i7-6xx, i5-6xx/5xx/4xx, i3-5xx/3xx, Pentium G69xx/P6xxx/U5xxx, Celeron P4xxx/U3xxx
 SNB          D2       6-2a-7/12 0000002d-&gt;0000002e Core Gen2; Xeon E3
 WSM-EX       A2       6-2f-2/05 00000037-&gt;0000003b Xeon E7
 IVB          E2       6-3a-9/12 0000001f-&gt;00000020 Core Gen3 Mobile
 HSW-H/S/E3   Cx/Dx    6-3c-3/32 00000024-&gt;00000025 Core Gen4 Desktop; Xeon E3 v3
 BDW-U/Y      E/F      6-3d-4/c0 0000002a-&gt;0000002b Core Gen5 Mobile
 HSW-ULT      Cx/Dx    6-45-1/72 00000023-&gt;00000024 Core Gen4 Mobile and derived Pentium/Celeron
 HSW-H        Cx       6-46-1/32 00000019-&gt;0000001a Core Extreme i7-5xxxX
 BDW-H/E3     E/G      6-47-1/22 0000001d-&gt;0000001e Core i5-5xxxR/C, i7-5xxxHQ/EQ; Xeon E3 v4
 SKL-U/Y      D0       6-4e-3/c0 000000c2-&gt;000000c6 Core Gen6 Mobile
 BDX-DE       V1       6-56-2/10 00000015-&gt;00000017 Xeon D-1520/40
 BDX-DE       V2/3     6-56-3/10 07000012-&gt;07000013 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
 BDX-DE       Y0       6-56-4/10 0f000011-&gt;0f000012 Xeon D-1557/59/67/71/77/81/87
 APL          D0       6-5c-9/03 0000002c-&gt;00000032 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
 SKL-H/S/E3   R0       6-5e-3/36 000000c2-&gt;000000c6 Core Gen6; Xeon E3 v5
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-15"/>
	<updated date="2018-08-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104134">SUSE bug 1104134</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3640">CVE-2018-3640 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3646">CVE-2018-3646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579015" comment="microcode_ctl-1.17-102.83.27.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579015" comment="microcode_ctl-1.17-102.83.27.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220197" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005455.html" source="SUSE-SU"/>
		<description>
This update for microcode_ctl fixes the following issues:

This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the CPU Microcode adjustments for the software mitigations.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Release notes:

- Processor             Identifier     Version       Products
- Model        Stepping F-MO-S/PI      Old-&gt;New
- ---- new platforms ----------------------------------------
- CLX-SP       B1       6-55-7/bf           05000021 Xeon Scalable Gen2
- ---- updated platforms ------------------------------------
- SNB          D2/G1/Q0 6-2a-7/12 0000002e-&gt;0000002f Core Gen2
- IVB          E1/L1    6-3a-9/12 00000020-&gt;00000021 Core Gen3
- HSW          C0       6-3c-3/32 00000025-&gt;00000027 Core Gen4
- BDW-U/Y      E0/F0    6-3d-4/c0 0000002b-&gt;0000002d Core Gen5
- IVB-E/EP     C1/M1/S1 6-3e-4/ed 0000042e-&gt;0000042f Core Gen3 X Series; Xeon E5 v2
- IVB-EX       D1       6-3e-7/ed 00000714-&gt;00000715 Xeon E7 v2
- HSX-E/EP     Cx/M1    6-3f-2/6f 00000041-&gt;00000043 Core Gen4 X series; Xeon E5 v3
- HSX-EX       E0       6-3f-4/80 00000013-&gt;00000014 Xeon E7 v3
- HSW-U        C0/D0    6-45-1/72 00000024-&gt;00000025 Core Gen4
- HSW-H        C0       6-46-1/32 0000001a-&gt;0000001b Core Gen4
- BDW-H/E3     E0/G0    6-47-1/22 0000001e-&gt;00000020 Core Gen5
- SKL-U/Y      D0/K1    6-4e-3/c0 000000c6-&gt;000000cc Core Gen6      
- SKX-SP       H0/M0/U0 6-55-4/b7 0200005a-&gt;0000005e Xeon Scalable
- SKX-D        M1       6-55-4/b7 0200005a-&gt;0000005e Xeon D-21xx
- BDX-DE       V1       6-56-2/10 00000019-&gt;0000001a Xeon D-1520/40
- BDX-DE       V2/3     6-56-3/10 07000016-&gt;07000017 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
- BDX-DE       Y0       6-56-4/10 0f000014-&gt;0f000015 Xeon D-1557/59/67/71/77/81/87
- BDX-NS       A0       6-56-5/10 0e00000c-&gt;0e00000d Xeon D-1513N/23/33/43/53
- APL          D0       6-5c-9/03 00000036-&gt;00000038 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
- SKL-H/S      R0/N0    6-5e-3/36 000000c6-&gt;000000cc Core Gen6; Xeon E3 v5
- DNV          B0       6-5f-1/01 00000024-&gt;0000002e Atom Processor C Series
- GLK          B0       6-7a-1/01 0000002c-&gt;0000002e Pentium Silver N/J5xxx, Celeron N/J4xxx
- AML-Y22      H0       6-8e-9/10 0000009e-&gt;000000b4 Core Gen8 Mobile
- KBL-U/Y      H0       6-8e-9/c0 0000009a-&gt;000000b4 Core Gen7 Mobile
- CFL-U43e     D0       6-8e-a/c0 0000009e-&gt;000000b4 Core Gen8 Mobile
- WHL-U        W0       6-8e-b/d0 000000a4-&gt;000000b8 Core Gen8 Mobile
- WHL-U        V0       6-8e-d/94 000000b2-&gt;000000b8 Core Gen8 Mobile
- KBL-G/H/S/E3 B0       6-9e-9/2a 0000009a-&gt;000000b4 Core Gen7; Xeon E3 v6
- CFL-H/S/E3   U0       6-9e-a/22 000000aa-&gt;000000b4 Core Gen8 Desktop, Mobile, Xeon E
- CFL-S        B0       6-9e-b/02 000000aa-&gt;000000b4 Core Gen8
- CFL-H/S      P0       6-9e-c/22 000000a2-&gt;000000ae Core Gen9
- CFL-H        R0       6-9e-d/22 000000b0-&gt;000000b8 Core Gen9 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584147" comment="microcode_ctl-1.17-102.83.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220198" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1141977" ref_url="https://bugzilla.suse.com/1141977" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005743.html" source="SUSE-SU"/>
		<description>
This update for microcode_ctl fixes the following issues:

This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the CPU Microcode adjustments for the software mitigations.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Release notes:

---- updated platforms ------------------------------------
SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061d-&gt;0000061f Xeon E3/E5, Core X
SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000714-&gt;00000718 Xeon E3/E5, Core X

---- new platforms ----------------------------------------
VLV          C0       6-37-8/02           00000838 Atom Z series
VLV          C0       6-37-8/0C           00000838 Celeron N2xxx, Pentium N35xx
VLV          D0       6-37-9/0F           0000090c Atom E38xx
CHV          C0       6-4c-3/01           00000368 Atom X series
CHV          D0       6-4c-4/01           00000411 Atom X series

Readded what missing in last update:
BDX-ML       B0/M0/R0 6-4f-1/ef 0b00002e-&gt;00000036 Xeon E5/E7 v4; Core i7-69xx/68xx
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141977">SUSE bug 1141977</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584148" comment="microcode_ctl-1.17-102.83.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220199" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006136.html" source="SUSE-SU"/>
		<description>
This update for microcode_ctl fixes the following issues:

- Updated to 20191112 security release (bsc#1155988)
  - Processor             Identifier     Version       Products
  - Model        Stepping F-MO-S/PI      Old-&gt;New
  - ---- new platforms ----------------------------------------
  - CML-U62      A0       6-a6-0/80           000000c6 Core Gen10 Mobile
  - CNL-U        D0       6-66-3/80           0000002a Core Gen8 Mobile
  - SKX-SP       B1       6-55-3/97           01000150 Xeon Scalable
  - ICL U/Y      D1       6-7e-5/80           00000046 Core Gen10 Mobile
  - ---- updated platforms ------------------------------------
  - SKL U/Y      D0       6-4e-3/c0 000000cc-&gt;000000d4 Core Gen6 Mobile
  - SKL H/S/E3   R0/N0    6-5e-3/36 000000cc-&gt;000000d4 Core Gen6
  - AML-Y22      H0       6-8e-9/10 000000b4-&gt;000000c6 Core Gen8 Mobile
  - KBL-U/Y      H0       6-8e-9/c0 000000b4-&gt;000000c6 Core Gen7 Mobile
  - CFL-U43e     D0       6-8e-a/c0 000000b4-&gt;000000c6 Core Gen8 Mobile
  - WHL-U        W0       6-8e-b/d0 000000b8-&gt;000000c6 Core Gen8 Mobile
  - AML-Y        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - CML-U42      V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - WHL-U        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen8 Mobile
  - KBL-G/X      H0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7/Gen8
  - KBL-H/S/E3   B0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7; Xeon E3 v6
  - CFL-H/S/E3   U0       6-9e-a/22 000000b4-&gt;000000c6 Core Gen8 Desktop, Mobile, Xeon E
  - CFL-S        B0       6-9e-b/02 000000b4-&gt;000000c6 Core Gen8
  - CFL-H        R0       6-9e-d/22 000000b8-&gt;000000c6 Core Gen9 Mobile
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-13"/>
	<updated date="2019-11-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11139">CVE-2019-11139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584149" comment="microcode_ctl-1.17-102.83.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220200" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006151.html" source="SUSE-SU"/>
		<description>
This update for microcode_ctl fixes the following issues:

- Updated to 20191112 official security release (bsc#1155988)
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11139">CVE-2019-11139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584150" comment="microcode_ctl-1.17-102.83.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220201" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1154824" ref_url="https://bugzilla.suse.com/1154824" source="BUGZILLA"/>
		<reference ref_id="1156353" ref_url="https://bugzilla.suse.com/1156353" source="BUGZILLA"/>
		<reference ref_id="1172466" ref_url="https://bugzilla.suse.com/1172466" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548/" source="CVE"/>
		<reference ref_id="CVE-2020-0549" ref_url="https://www.suse.com/security/cve/CVE-2020-0549/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006920.html" source="SUSE-SU"/>
		<description>
This update for microcode_ctl fixes the following issues:

Updated Intel CPU Microcode to 20200602 (prerelease) (bsc#1172466)
  
This update contains security mitigations for:

- CVE-2020-0543: Fixed a side channel attack against special registers
  which could have resulted in leaking of read values to cores other
  than the one which called it.  This attack is known as Special Register
  Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-0548,CVE-2020-0549: Additional ucode updates were supplied to
  mitigate the Vector Register and L1D Eviction Sampling aka 'CacheOutAttack'
  attacks. (bsc#1156353)

Microcode Table:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  HSW          C0       6-3c-3/32 00000027-&gt;00000028 Core Gen4
  BDW-U/Y      E0/F0    6-3d-4/c0 0000002e-&gt;0000002f Core Gen5
  HSW-U        C0/D0    6-45-1/72 00000025-&gt;00000026 Core Gen4
  HSW-H        C0       6-46-1/32 0000001b-&gt;0000001c Core Gen4
  BDW-H/E3     E0/G0    6-47-1/22 00000021-&gt;00000022 Core Gen5
  SKL-U/Y      D0       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKL-U23e     K1       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKX-SP       B1       6-55-3/97 01000151-&gt;01000157 Xeon Scalable
  SKX-SP       H0/M0/U0 6-55-4/b7 02000065-&gt;02006906 Xeon Scalable
  SKX-D        M1       6-55-4/b7 02000065-&gt;02006906 Xeon D-21xx
  CLX-SP       B0       6-55-6/bf 0400002c-&gt;04002f01 Xeon Scalable Gen2
  CLX-SP       B1       6-55-7/bf 0500002c-&gt;04002f01 Xeon Scalable Gen2
  SKL-H/S      R0/N0    6-5e-3/36 000000d6-&gt;000000dc Core Gen6; Xeon E3 v5
  AML-Y22      H0       6-8e-9/10 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-U/Y      H0       6-8e-9/c0 000000ca-&gt;000000d6 Core Gen7 Mobile
  CFL-U43e     D0       6-8e-a/c0 000000ca-&gt;000000d6 Core Gen8 Mobile
  WHL-U        W0       6-8e-b/d0 000000ca-&gt;000000d6 Core Gen8 Mobile
  AML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  CML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  WHL-U        V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-G/H/S/E3 B0       6-9e-9/2a 000000ca-&gt;000000d6 Core Gen7; Xeon E3 v6
  CFL-H/S/E3   U0       6-9e-a/22 000000ca-&gt;000000d6 Core Gen8 Desktop, Mobile, Xeon E
  CFL-S        B0       6-9e-b/02 000000ca-&gt;000000d6 Core Gen8
  CFL-H/S      P0       6-9e-c/22 000000ca-&gt;000000d6 Core Gen9
  CFL-H        R0       6-9e-d/22 000000ca-&gt;000000d6 Core Gen9 Mobile

Also contains the Intel CPU Microcode update to 20200520:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061f-&gt;00000621 Xeon E3/E5, Core X
  SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000718-&gt;0000071a Xeon E3/E5, Core X
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-10"/>
	<updated date="2020-06-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156353">SUSE bug 1156353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172466">SUSE bug 1172466</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0548">CVE-2020-0548 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0549/">CVE-2020-0549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0549">CVE-2020-0549 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584151" comment="microcode_ctl-1.17-102.83.53.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220202" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007755.html" source="SUSE-SU"/>
		<description>
This update for microcode_ctl fixes the following issue:

- Updated Intel CPU Microcode to 20201027 prerelease (bsc#1170446)

- CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX)
- CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)

  # New Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile
  # Updated Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8698">CVE-2020-8698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584152" comment="microcode_ctl-1.17-102.83.59.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220203" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173592" ref_url="https://bugzilla.suse.com/1173592" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007804.html" source="SUSE-SU"/>
		<description>
This update for microcode_ctl fixes the following issues:

- Updated Intel CPU Microcode to 20201110 official release.
 - CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) INTEL-SA-00389 (bsc#1170446)
 - CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)
 - CVE-2020-8696: Vector Register Sampling Active INTEL-SA-00381 (bsc#1173592)

- Release notes:
  - Security updates for [INTEL-SA-00381](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html).
  - Security updates for [INTEL-SA-00389](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html).
  - Update for functional issues. Refer to [Second Generation Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor E5 v3 Product Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e5-v3-spec-update.html?wapkw=processor+spec+update+e5) for details.
  - Update for functional issues. Refer to [10th Gen Intel? Core™ Processor Families Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-families-specification-update.html) for details.
  - Update for functional issues. Refer to [8th and 9th Gen Intel? Core™ Processor Family Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/8th-gen-core-spec-update.html) for details.
  - Update for functional issues. Refer to [7th Gen and 8th Gen (U Quad-Core) Intel? Processor Families Specification Update](https://www.intel.com/content/www/us/en/processors/core/7th-gen-core-family-spec-update.html) for details.
  - Update for functional issues. Refer to [6th Gen Intel? Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/332689) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E3-1200 v6 Processor Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e3-1200v6-spec-update.html) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E-2100 and E-2200 Processor Family Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-e-2100-specification-update.html) for details.

  ### New Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | LKF            | B2/B3    | 06-8a-01/10 |          | 00000028 | Core w/Hybrid Technology
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile

  ### Updated Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173592">SUSE bug 1173592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8696">CVE-2020-8696 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8698">CVE-2020-8698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584153" comment="microcode_ctl-1.17-102.83.62.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220204" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1179833" ref_url="https://bugzilla.suse.com/1179833" source="BUGZILLA"/>
		<reference ref_id="1179836" ref_url="https://bugzilla.suse.com/1179836" source="BUGZILLA"/>
		<reference ref_id="1179837" ref_url="https://bugzilla.suse.com/1179837" source="BUGZILLA"/>
		<reference ref_id="1179839" ref_url="https://bugzilla.suse.com/1179839" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24489" ref_url="https://www.suse.com/security/cve/CVE-2020-24489/" source="CVE"/>
		<reference ref_id="CVE-2020-24511" ref_url="https://www.suse.com/security/cve/CVE-2020-24511/" source="CVE"/>
		<reference ref_id="CVE-2020-24512" ref_url="https://www.suse.com/security/cve/CVE-2020-24512/" source="CVE"/>
		<reference ref_id="CVE-2020-24513" ref_url="https://www.suse.com/security/cve/CVE-2020-24513/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009092.html" source="SUSE-SU"/>
		<description>
This update for microcode_ctl fixes the following issues:

Updated to Intel CPU Microcode 20210525 release:

- CVE-2020-24513: A domain bypass transient execution vulnerability was discovered on some Intel Atom processors that use a micro-architectural incident channel. (bsc#1179833)
- CVE-2020-24511: The IBRS feature to mitigate Spectre variant 2 transient execution side channel vulnerabilities may not fully prevent non-root (guest) branches from controlling the branch predictions of the root (host) (bsc#1179836)
- CVE-2020-24512: Fixed trivial data value cache-lines such as all-zero value cache-lines may lead to changes in cache-allocation or write-back behavior for such cache-lines (bsc#1179837)
- CVE-2020-24489: Fixed Intel VT-d device pass through potential local privilege escalation (bsc#1179839)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179833">SUSE bug 1179833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179836">SUSE bug 1179836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179837">SUSE bug 1179837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179839">SUSE bug 1179839</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24489/">CVE-2020-24489 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24489">CVE-2020-24489 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24511/">CVE-2020-24511 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24511">CVE-2020-24511 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24512/">CVE-2020-24512 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24512">CVE-2020-24512 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24513/">CVE-2020-24513 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24513">CVE-2020-24513 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584154" comment="microcode_ctl-1.17-102.83.71.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220205" version="1" class="patch">
	<metadata>
		<title>Security update for minicom (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1033783" ref_url="https://bugzilla.suse.com/1033783" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7467" ref_url="https://www.suse.com/security/cve/CVE-2017-7467/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002832.html" source="SUSE-SU"/>
		<description>

This update for minicom fixes the following issues:

- CVE-2017-7467: Invalid cursor coordinates and scroll regions could lead to code 
  execution (bsc#1033783)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-28"/>
	<updated date="2017-04-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033783">SUSE bug 1033783</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7467/">CVE-2017-7467 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7467">CVE-2017-7467 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584155" comment="minicom-2.3-27.24.6.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584155" comment="minicom-2.3-27.24.6.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220206" version="1" class="patch">
	<metadata>
		<title>Security update for mono-core (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="739119" ref_url="https://bugzilla.suse.com/739119" source="BUGZILLA"/>
		<reference ref_id="958097" ref_url="https://bugzilla.suse.com/958097" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2012-3543" ref_url="https://www.suse.com/security/cve/CVE-2012-3543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001830.html" source="SUSE-SU"/>
		<description>

mono-core was updated to fix the following vulnerabilities:

- CVE-2009-0689: Remote attackers could cause a denial of service and possibly arbitrary code execution through the string-to-double parser implementation (bsc#958097)
- CVE-2012-3543: Remote attackers could cause a denial of service through increased CPU consumption due to lack of protection against predictable hash collisions when processing form parameters (bsc#739119)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-27"/>
	<updated date="2016-01-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/739119">SUSE bug 739119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958097">SUSE bug 958097</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0689">CVE-2009-0689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3543/">CVE-2012-3543 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-3543">CVE-2012-3543 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579024" comment="mono-core-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579025" comment="mono-data-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579026" comment="mono-data-postgresql-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579027" comment="mono-data-sqlite-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579028" comment="mono-locale-extras-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579029" comment="mono-nunit-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579030" comment="mono-web-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579031" comment="mono-winforms-2.6.7-0.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579024" comment="mono-core-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579025" comment="mono-data-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579026" comment="mono-data-postgresql-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579027" comment="mono-data-sqlite-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579028" comment="mono-locale-extras-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579029" comment="mono-nunit-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579030" comment="mono-web-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579031" comment="mono-winforms-2.6.7-0.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220207" version="1" class="patch">
	<metadata>
		<title>Security update for mono-core (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="739119" ref_url="https://bugzilla.suse.com/739119" source="BUGZILLA"/>
		<reference ref_id="958097" ref_url="https://bugzilla.suse.com/958097" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2012-3543" ref_url="https://www.suse.com/security/cve/CVE-2012-3543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002433.html" source="SUSE-SU"/>
		<description>

mono-core was updated to fix the following vulnerabilities:

- CVE-2009-0689: Remote attackers could cause a denial of service and possibly arbitrary
  code execution through the string-to-double parser implementation. (bsc#958097)
- CVE-2012-3543: Remote attackers could cause a denial of service through increased CPU
  consumption due to lack of protection against predictable hash collisions when processing
  form parameters. (bsc#739119)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-01"/>
	<updated date="2016-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/739119">SUSE bug 739119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958097">SUSE bug 958097</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0689">CVE-2009-0689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3543/">CVE-2012-3543 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-3543">CVE-2012-3543 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584156" comment="mono-core-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584157" comment="mono-data-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584158" comment="mono-data-postgresql-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584159" comment="mono-data-sqlite-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584160" comment="mono-locale-extras-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584161" comment="mono-nunit-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584162" comment="mono-web-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584163" comment="mono-winforms-2.6.7-0.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584156" comment="mono-core-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584157" comment="mono-data-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584158" comment="mono-data-postgresql-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584159" comment="mono-data-sqlite-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584160" comment="mono-locale-extras-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584161" comment="mono-nunit-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584162" comment="mono-web-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584163" comment="mono-winforms-2.6.7-0.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220208" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLED, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="954447" ref_url="https://bugzilla.suse.com/954447" source="BUGZILLA"/>
		<reference ref_id="963520" ref_url="https://bugzilla.suse.com/963520" source="BUGZILLA"/>
		<reference ref_id="963632" ref_url="https://bugzilla.suse.com/963632" source="BUGZILLA"/>
		<reference ref_id="963635" ref_url="https://bugzilla.suse.com/963635" source="BUGZILLA"/>
		<reference ref_id="963731" ref_url="https://bugzilla.suse.com/963731" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<reference ref_id="CVE-2016-1938" ref_url="https://www.suse.com/security/cve/CVE-2016-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001842.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nss fixes the following issues: (bsc#963520)

Mozilla Firefox was updated to 38.6.0 ESR.
Mozilla NSS was updated to 3.20.2.

The following vulnerabilities were fixed:

- CVE-2016-1930: Memory safety bugs fixed in Firefox ESR 38.6 (bsc#963632)
- CVE-2016-1935: Buffer overflow in WebGL after out of memory allocation (bsc#963635)
- CVE-2016-1938: Calculations with mp_div and mp_exptmod in Network Security Services (NSS) canproduce wrong results (bsc#963731)

The following improvements were added:

- bsc#954447: Mozilla NSS now supports a number of new DHE ciphersuites
- Tracking protection is now enabled by default
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-04"/>
	<updated date="2016-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/954447">SUSE bug 954447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963520">SUSE bug 963520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963632">SUSE bug 963632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963635">SUSE bug 963635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963731">SUSE bug 963731</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1930">CVE-2016-1930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1935">CVE-2016-1935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1938/">CVE-2016-1938 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1938">CVE-2016-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579040" comment="MozillaFirefox-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579041" comment="MozillaFirefox-branding-SLED-38-18.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579042" comment="MozillaFirefox-translations-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579043" comment="libfreebl3-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579044" comment="libfreebl3-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579045" comment="libfreebl3-x86-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579046" comment="libsoftokn3-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579047" comment="libsoftokn3-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579048" comment="libsoftokn3-x86-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579049" comment="mozilla-nss-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579050" comment="mozilla-nss-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579051" comment="mozilla-nss-tools-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579052" comment="mozilla-nss-x86-3.20.2-25.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579040" comment="MozillaFirefox-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579041" comment="MozillaFirefox-branding-SLED-38-18.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579042" comment="MozillaFirefox-translations-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579043" comment="libfreebl3-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579044" comment="libfreebl3-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579045" comment="libfreebl3-x86-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579046" comment="libsoftokn3-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579047" comment="libsoftokn3-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579048" comment="libsoftokn3-x86-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579049" comment="mozilla-nss-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579050" comment="mozilla-nss-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579051" comment="mozilla-nss-tools-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579052" comment="mozilla-nss-x86-3.20.2-25.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220209" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2015:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001554.html" source="SUSE-SU"/>
		<description>
mozilla-nspr was update to version 4.10.8		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-14"/>
	<updated date="2015-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579053" comment="mozilla-nspr-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579054" comment="mozilla-nspr-32bit-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579055" comment="mozilla-nspr-x86-4.10.8-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579053" comment="mozilla-nspr-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579054" comment="mozilla-nspr-32bit-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579055" comment="mozilla-nspr-x86-4.10.8-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220210" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="959888" ref_url="https://bugzilla.suse.com/959888" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001818.html" source="SUSE-SU"/>
		<description>
This update contains mozilla-nss 3.19.2.2 and fixes the following security issue:

   - CVE-2015-7575: MD5 signatures accepted within TLS 1.2 ServerKeyExchange in server signature (bsc#959888)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959888">SUSE bug 959888</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579056" comment="libfreebl3-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579057" comment="libfreebl3-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579058" comment="libfreebl3-x86-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579059" comment="libsoftokn3-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579060" comment="libsoftokn3-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579061" comment="libsoftokn3-x86-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579062" comment="mozilla-nss-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579063" comment="mozilla-nss-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579064" comment="mozilla-nss-tools-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579065" comment="mozilla-nss-x86-3.19.2.2-22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579056" comment="libfreebl3-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579057" comment="libfreebl3-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579058" comment="libfreebl3-x86-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579059" comment="libsoftokn3-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579060" comment="libsoftokn3-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579061" comment="libsoftokn3-x86-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579062" comment="mozilla-nss-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579063" comment="mozilla-nss-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579064" comment="mozilla-nss-tools-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579065" comment="mozilla-nss-x86-3.19.2.2-22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220211" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1193170" ref_url="https://bugzilla.suse.com/1193170" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009861.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Update to version 3.68.1:

- CVE-2021-43527: Fixed a Heap overflow in NSS when verifying DER-encoded DSA or RSA-PSS signatures (bsc#1193170).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193170">SUSE bug 1193170</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659260" comment="libfreebl3-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659261" comment="libfreebl3-32bit-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659262" comment="libsoftokn3-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659263" comment="libsoftokn3-32bit-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659264" comment="mozilla-nss-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659265" comment="mozilla-nss-32bit-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659266" comment="mozilla-nss-certs-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659267" comment="mozilla-nss-certs-32bit-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659268" comment="mozilla-nss-devel-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659269" comment="mozilla-nss-tools-3.68.1-47.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220212" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010660.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Mozilla NSS 3.68.3 (bsc#1197903):
  - CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11
    tokens are removed while in use.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-05"/>
	<updated date="2022-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1097">CVE-2022-1097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678417" comment="libfreebl3-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678418" comment="libfreebl3-32bit-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678419" comment="libsoftokn3-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678420" comment="libsoftokn3-32bit-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678421" comment="mozilla-nss-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678422" comment="mozilla-nss-32bit-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678423" comment="mozilla-nss-certs-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678424" comment="mozilla-nss-certs-32bit-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678425" comment="mozilla-nss-devel-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678426" comment="mozilla-nss-tools-3.68.3-47.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220213" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1141322" ref_url="https://bugzilla.suse.com/1141322" source="BUGZILLA"/>
		<reference ref_id="1158527" ref_url="https://bugzilla.suse.com/1158527" source="BUGZILLA"/>
		<reference ref_id="1159819" ref_url="https://bugzilla.suse.com/1159819" source="BUGZILLA"/>
		<reference ref_id="1168669" ref_url="https://bugzilla.suse.com/1168669" source="BUGZILLA"/>
		<reference ref_id="1169746" ref_url="https://bugzilla.suse.com/1169746" source="BUGZILLA"/>
		<reference ref_id="1170908" ref_url="https://bugzilla.suse.com/1170908" source="BUGZILLA"/>
		<reference ref_id="1171978" ref_url="https://bugzilla.suse.com/1171978" source="BUGZILLA"/>
		<reference ref_id="1173032" ref_url="https://bugzilla.suse.com/1173032" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="CVE-2020-12399" ref_url="https://www.suse.com/security/cve/CVE-2020-12399/" source="CVE"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007079.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to version 3.53.1

- CVE-2019-11745: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate
- CVE-2020-12402: Fixed a potential side channel attack during RSA key generation (bsc#1173032).
- CVE-2020-12399: Fixed a timing attack on DSA signature generation (bsc#1171978).
- CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
- CVE-2019-11727: A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages.
- Fixed various FIPS issues in libfreebl3 which were causing segfaults in the test suite of chrony (bsc#1168669).
- Fixed an issue where Firefox tab was crashing (bsc#1170908).

Release notes: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53_release_notes

mozilla-nspr was updated to version 4.25.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141322">SUSE bug 1141322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158527">SUSE bug 1158527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168669">SUSE bug 1168669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169746">SUSE bug 1169746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170908">SUSE bug 1170908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171978">SUSE bug 1171978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173032">SUSE bug 1173032</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11727">CVE-2019-11727 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11745">CVE-2019-11745 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17006">CVE-2019-17006 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12399/">CVE-2020-12399 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12399">CVE-2020-12399 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12402">CVE-2020-12402 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584164" comment="libfreebl3-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572692" comment="libfreebl3-32bit-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584165" comment="libsoftokn3-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572694" comment="libsoftokn3-32bit-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584166" comment="mozilla-nspr-4.25-29.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584167" comment="mozilla-nspr-32bit-4.25-29.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584168" comment="mozilla-nspr-devel-4.25-29.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584169" comment="mozilla-nss-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572698" comment="mozilla-nss-32bit-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584170" comment="mozilla-nss-certs-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572700" comment="mozilla-nss-certs-32bit-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584171" comment="mozilla-nss-devel-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584172" comment="mozilla-nss-tools-3.53.1-38.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220214" version="1" class="patch">
	<metadata>
		<title>Recommended update for mozilla-nspr, mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1029961" ref_url="https://bugzilla.suse.com/1029961" source="BUGZILLA"/>
		<reference ref_id="1174697" ref_url="https://bugzilla.suse.com/1174697" source="BUGZILLA"/>
		<reference ref_id="1176206" ref_url="https://bugzilla.suse.com/1176206" source="BUGZILLA"/>
		<reference ref_id="1176934" ref_url="https://bugzilla.suse.com/1176934" source="BUGZILLA"/>
		<reference ref_id="1179382" ref_url="https://bugzilla.suse.com/1179382" source="BUGZILLA"/>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12400" ref_url="https://www.suse.com/security/cve/CVE-2020-12400/" source="CVE"/>
		<reference ref_id="CVE-2020-12401" ref_url="https://www.suse.com/security/cve/CVE-2020-12401/" source="CVE"/>
		<reference ref_id="CVE-2020-12403" ref_url="https://www.suse.com/security/cve/CVE-2020-12403/" source="CVE"/>
		<reference ref_id="CVE-2020-25648" ref_url="https://www.suse.com/security/cve/CVE-2020-25648/" source="CVE"/>
		<reference ref_id="CVE-2020-6829" ref_url="https://www.suse.com/security/cve/CVE-2020-6829/" source="CVE"/>
		<reference ref_id="SUSE-RU-2021:14818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020338.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nspr fixes the following issues:

mozilla-nspr was updated to version 4.32:

* implement new socket option PR_SockOpt_DontFrag
* support larger DNS records by increasing the default buffer
  size for DNS queries 
* Lock access to PRCallOnceType members in PR_CallOnce* for
  thread safety bmo#1686138
* PR_GetSystemInfo supports a new flag PR_SI_RELEASE_BUILD to get
  information about the operating system build version.


Mozilla NSS was updated to version 3.68:

* bmo#1713562 - Fix test leak.
* bmo#1717452 - NSS 3.68 should depend on NSPR 4.32.
* bmo#1693206 - Implement PKCS8 export of ECDSA keys.
* bmo#1712883 - DTLS 1.3 draft-43.
* bmo#1655493 - Support SHA2 HW acceleration using Intel SHA Extension.
* bmo#1713562 - Validate ECH public names.
* bmo#1717610 - Add function to get seconds from epoch from pkix::Time.

update to NSS 3.67

* bmo#1683710 - Add a means to disable ALPN.
* bmo#1715720 - Fix nssckbi version number in NSS 3.67 (was supposed to be incremented in 3.66).
* bmo#1714719 - Set NSS_USE_64 on riscv64 target when using GYP/Ninja.
* bmo#1566124 - Fix counter increase in ppc-gcm-wrap.c.
* bmo#1566124 - Fix AES_GCM mode on ppc64le for messages of length more than 255-byte.

update to NSS 3.66

* bmo#1710716 - Remove Expired Sonera Class2 CA from NSS.
* bmo#1710716 - Remove Expired Root Certificates from NSS - QuoVadis Root Certification Authority.
* bmo#1708307 - Remove Trustis FPS Root CA from NSS.
* bmo#1707097 - Add Certum Trusted Root CA to NSS.
* bmo#1707097 - Add Certum EC-384 CA to NSS.
* bmo#1703942 - Add ANF Secure Server Root CA to NSS.
* bmo#1697071 - Add GLOBALTRUST 2020 root cert to NSS.
* bmo#1712184 - NSS tools manpages need to be updated to reflect that sqlite is the default database.
* bmo#1712230 - Don't build ppc-gcm.s with clang integrated assembler.
* bmo#1712211 - Strict prototype error when trying to compile nss code that includes blapi.h.
* bmo#1710773 - NSS needs FIPS 180-3 FIPS indicators.
* bmo#1709291 - Add VerifyCodeSigningCertificateChain.

update to NSS 3.65

* bmo#1709654 - Update for NetBSD configuration.
* bmo#1709750 - Disable HPKE test when fuzzing.
* bmo#1566124 - Optimize AES-GCM for ppc64le.
* bmo#1699021 - Add AES-256-GCM to HPKE.
* bmo#1698419 - ECH -10 updates.
* bmo#1692930 - Update HPKE to final version.
* bmo#1707130 - NSS should use modern algorithms in PKCS#12 files by default.
* bmo#1703936 - New coverity/cpp scanner errors.
* bmo#1697303 - NSS needs to update it's csp clearing to FIPS 180-3 standards.
* bmo#1702663 - Need to support RSA PSS with Hashing PKCS #11 Mechanisms.
* bmo#1705119 - Deadlock when using GCM and non-thread safe tokens.

update to NSS 3.64

* bmo#1705286 - Properly detect mips64.
* bmo#1687164 - Introduce NSS_DISABLE_CRYPTO_VSX and
		disable_crypto_vsx.
* bmo#1698320 - replace __builtin_cpu_supports('vsx') with
		ppc_crypto_support() for clang.
* bmo#1613235 - Add POWER ChaCha20 stream cipher vector
		acceleration.

Fixed in 3.63

* bmo#1697380 - Make a clang-format run on top of helpful contributions.
* bmo#1683520 - ECCKiila P384, change syntax of nested structs
		initialization to prevent build isses with GCC 4.8.
* bmo#1683520 - [lib/freebl/ecl] P-384: allow zero scalars in dual
		scalar multiplication.
* bmo#1683520 - ECCKiila P521, change syntax of nested structs
		initialization to prevent build isses with GCC 4.8.
* bmo#1683520 - [lib/freebl/ecl] P-521: allow zero scalars in dual
		scalar multiplication.
* bmo#1696800 - HACL* update March 2021 - c95ab70fcb2bc21025d8845281bc4bc8987ca683.
* bmo#1694214 - tstclnt can't enable middlebox compat mode.
* bmo#1694392 - NSS does not work with PKCS #11 modules not supporting
		profiles.
* bmo#1685880 - Minor fix to prevent unused variable on early return.
* bmo#1685880 - Fix for the gcc compiler version 7 to support setenv
		with nss build.
* bmo#1693217 - Increase nssckbi.h version number for March 2021 batch
		of root CA changes, CA list version 2.48.
* bmo#1692094 - Set email distrust after to 21-03-01 for Camerfirma's
		'Chambers of Commerce' and 'Global Chambersign' roots.
* bmo#1618407 - Symantec root certs - Set CKA_NSS_EMAIL_DISTRUST_AFTER.
* bmo#1693173 - Add GlobalSign R45, E45, R46, and E46 root certs to NSS.
* bmo#1683738 - Add AC RAIZ FNMT-RCM SERVIDORES SEGUROS root cert to NSS.
* bmo#1686854 - Remove GeoTrust PCA-G2 and VeriSign Universal root certs
		from NSS.
* bmo#1687822 - Turn off Websites trust bit for the “Staat der
		Nederlanden Root CA - G3” root cert in NSS.
* bmo#1692094 - Turn off Websites Trust Bit for 'Chambers of Commerce
		Root - 2008' and 'Global Chambersign Root - 2008’.
* bmo#1694291 - Tracing fixes for ECH.

update to NSS 3.62

* bmo#1688374 - Fix parallel build NSS-3.61 with make
* bmo#1682044 - pkix_Build_GatherCerts() + pkix_CacheCert_Add()
		can corrupt 'cachedCertTable'
* bmo#1690583 - Fix CH padding extension size calculation
* bmo#1690421 - Adjust 3.62 ABI report formatting for new libabigail
* bmo#1690421 - Install packaged libabigail in docker-builds image
* bmo#1689228 - Minor ECH -09 fixes for interop testing, fuzzing
* bmo#1674819 - Fixup a51fae403328, enum type may be signed
* bmo#1681585 - Add ECH support to selfserv
* bmo#1681585 - Update ECH to Draft-09
* bmo#1678398 - Add Export/Import functions for HPKE context
* bmo#1678398 - Update HPKE to draft-07

update to NSS 3.61

* bmo#1682071 - Fix issue with IKE Quick mode deriving incorrect key
		values under certain conditions.
* bmo#1684300 - Fix default PBE iteration count when NSS is compiled
		with NSS_DISABLE_DBM.
* bmo#1651411 - Improve constant-timeness in RSA operations.
* bmo#1677207 - Upgrade Google Test version to latest release.
* bmo#1654332 - Add aarch64-make target to nss-try.

Update to NSS 3.60.1:

Notable changes in NSS 3.60:
* TLS 1.3 Encrypted Client Hello (draft-ietf-tls-esni-08) support
  has been added, replacing the previous ESNI (draft-ietf-tls-esni-01)
  implementation. See bmo#1654332 for more information.
* December 2020 batch of Root CA changes, builtins library updated
  to version 2.46. See bmo#1678189, bmo#1678166, and bmo#1670769
  for more information.

Update to NSS 3.59.1:

* bmo#1679290 - Fix potential deadlock with certain third-party
		PKCS11 modules

Update to NSS 3.59:

Notable changes:

* Exported two existing functions from libnss:
  CERT_AddCertToListHeadWithData and CERT_AddCertToListTailWithData

Bugfixes

* bmo#1607449 - Lock cert-&gt;nssCertificate to prevent a potential data race
* bmo#1672823 - Add Wycheproof test cases for HMAC, HKDF, and DSA
* bmo#1663661 - Guard against NULL token in nssSlot_IsTokenPresent
* bmo#1670835 - Support enabling and disabling signatures via Crypto Policy
* bmo#1672291 - Resolve libpkix OCSP failures on SHA1 self-signed
		root certs when SHA1 signatures are disabled.
* bmo#1644209 - Fix broken SelectedCipherSuiteReplacer filter to
		solve some test intermittents
* bmo#1672703 - Tolerate the first CCS in TLS 1.3 to fix a regression in
		our CVE-2020-25648 fix that broke purple-discord
		(boo#1179382)
* bmo#1666891 - Support key wrap/unwrap with RSA-OAEP
* bmo#1667989 - Fix gyp linking on Solaris
* bmo#1668123 - Export CERT_AddCertToListHeadWithData and
		CERT_AddCertToListTailWithData from libnss
* bmo#1634584 - Set CKA_NSS_SERVER_DISTRUST_AFTER for Trustis FPS Root CA
* bmo#1663091 - Remove unnecessary assertions in the streaming
		ASN.1 decoder that affected decoding certain PKCS8
		private keys when using NSS debug builds
*  bmo#670839 - Use ARM crypto extension for AES, SHA1 and SHA2 on MacOS.

update to NSS 3.58

Bugs fixed:

* bmo#1641480 (CVE-2020-25648)
  Tighten CCS handling for middlebox compatibility mode.
* bmo#1631890 - Add support for Hybrid Public Key Encryption
  (draft-irtf-cfrg-hpke) support for TLS Encrypted Client Hello
  (draft-ietf-tls-esni).
* bmo#1657255 - Add CI tests that disable SHA1/SHA2 ARM crypto
  extensions.
* bmo#1668328 - Handle spaces in the Python path name when using
  gyp on Windows.
* bmo#1667153 - Add PK11_ImportDataKey for data object import.
* bmo#1665715 - Pass the embedded SCT list extension (if present)
  to TrustDomain::CheckRevocation instead of the notBefore value.

update to NSS 3.57

* The following CA certificates were Added:
  bmo#1663049 - CN=Trustwave Global Certification Authority
      SHA-256 Fingerprint: 97552015F5DDFC3C8788C006944555408894450084F100867086BC1A2BB58DC8
  bmo#1663049 - CN=Trustwave Global ECC P256 Certification Authority
      SHA-256 Fingerprint: 945BBC825EA554F489D1FD51A73DDF2EA624AC7019A05205225C22A78CCFA8B4
  bmo#1663049 - CN=Trustwave Global ECC P384 Certification Authority
      SHA-256 Fingerprint: 55903859C8C0C3EBB8759ECE4E2557225FF5758BBD38EBD48276601E1BD58097
* The following CA certificates were Removed:
  bmo#1651211 - CN=EE Certification Centre Root CA
      SHA-256 Fingerprint: 3E84BA4342908516E77573C0992F0979CA084E4685681FF195CCBA8A229B8A76
  bmo#1656077 - O=Government Root Certification Authority; C=TW
      SHA-256 Fingerprint: 7600295EEFE85B9E1FD624DB76062AAAAE59818A54D2774CD4C0B2C01131E1B3
* Trust settings for the following CA certificates were Modified:
  bmo#1653092 - CN=OISTE WISeKey Global Root GA CA
      Websites (server authentication) trust bit removed.
* https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.57_release_notes

update to NSS 3.56

Notable changes

* bmo#1650702 - Support SHA-1 HW acceleration on ARMv8
* bmo#1656981 - Use MPI comba and mulq optimizations on x86-64 MacOS.
* bmo#1654142 - Add CPU feature detection for Intel SHA extension.
* bmo#1648822 - Add stricter validation of DH keys in FIPS mode.
* bmo#1656986 - Properly detect arm64 during GYP build architecture
		detection.
* bmo#1652729 - Add build flag to disable RC2 and relocate to
		lib/freebl/deprecated.
* bmo#1656429 - Correct RTT estimate used in 0-RTT anti-replay.
* bmo#1588941 - Send empty certificate message when scheme selection
		fails.
* bmo#1652032 - Fix failure to build in Windows arm64 makefile
		cross-compilation.
* bmo#1625791 - Fix deadlock issue in nssSlot_IsTokenPresent.
* bmo#1653975 - Fix 3.53 regression by setting 'all' as the default
		makefile target.
* bmo#1659792 - Fix broken libpkix tests with unexpired PayPal cert.
* bmo#1659814 - Fix interop.sh failures with newer tls-interop
		commit and dependencies.
* bmo#1656519 - NSPR dependency updated to 4.28

update to NSS 3.55

Notable changes
* P384 and P521 elliptic curve implementations are replaced with
  verifiable implementations from Fiat-Crypto [0] and ECCKiila [1].
* PK11_FindCertInSlot is added. With this function, a given slot
  can be queried with a DER-Encoded certificate, providing performance
  and usability improvements over other mechanisms. (bmo#1649633)
* DTLS 1.3 implementation is updated to draft-38. (bmo#1647752)

Relevant Bugfixes

* bmo#1631583 (CVE-2020-6829, CVE-2020-12400) - Replace P384 and
  P521 with new, verifiable implementations from Fiat-Crypto and ECCKiila.
* bmo#1649487 - Move overzealous assertion in VFY_EndWithSignature.
* bmo#1631573 (CVE-2020-12401) - Remove unnecessary scalar padding.
* bmo#1636771 (CVE-2020-12403) - Explicitly disable multi-part
  ChaCha20 (which was not functioning correctly) and more strictly
  enforce tag length.
* bmo#1649648 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1649316 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1649322 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1653202 - Fix initialization bug in blapitest when compiled
  with NSS_DISABLE_DEPRECATED_SEED.
* bmo#1646594 - Fix AVX2 detection in makefile builds.
* bmo#1649633 - Add PK11_FindCertInSlot to search a given slot
  for a DER-encoded certificate.
* bmo#1651520 - Fix slotLock race in NSC_GetTokenInfo.
* bmo#1647752 - Update DTLS 1.3 implementation to draft-38.
* bmo#1649190 - Run cipher, sdr, and ocsp tests under standard test cycle in CI.
* bmo#1649226 - Add Wycheproof ECDSA tests.
* bmo#1637222 - Consistently enforce IV requirements for DES and 3DES.
* bmo#1067214 - Enforce minimum PKCS#1 v1.5 padding length in
  RSA_CheckSignRecover.
* bmo#1646324 - Advertise PKCS#1 schemes for certificates in the
  signature_algorithms extension.

update to NSS 3.54

Notable changes

* Support for TLS 1.3 external pre-shared keys (bmo#1603042).
* Use ARM Cryptography Extension for SHA256, when available
  (bmo#1528113)
* The following CA certificates were Added:
  bmo#1645186 - certSIGN Root CA G2.
  bmo#1645174 - e-Szigno Root CA 2017.
  bmo#1641716 - Microsoft ECC Root Certificate Authority 2017.
  bmo#1641716 - Microsoft RSA Root Certificate Authority 2017.
* The following CA certificates were Removed:
  bmo#1645199 - AddTrust Class 1 CA Root.
  bmo#1645199 - AddTrust External CA Root.
  bmo#1641718 - LuxTrust Global Root 2.
  bmo#1639987 - Staat der Nederlanden Root CA - G2.
  bmo#1618402 - Symantec Class 2 Public Primary Certification Authority - G4.
  bmo#1618402 - Symantec Class 1 Public Primary Certification Authority - G4.
  bmo#1618402 - VeriSign Class 3 Public Primary Certification Authority - G3.

* A number of certificates had their Email trust bit disabled.
  See bmo#1618402 for a complete list.

Bugs fixed

* bmo#1528113 - Use ARM Cryptography Extension for SHA256.
* bmo#1603042 - Add TLS 1.3 external PSK support.
* bmo#1642802 - Add uint128 support for HACL* curve25519 on Windows.
* bmo#1645186 - Add 'certSIGN Root CA G2' root certificate.
* bmo#1645174 - Add Microsec's 'e-Szigno Root CA 2017' root certificate.
* bmo#1641716 - Add Microsoft's non-EV root certificates.
* bmo1621151 - Disable email trust bit for 'O=Government
	       Root Certification Authority; C=TW' root.
* bmo#1645199 - Remove AddTrust root certificates.
* bmo#1641718 - Remove 'LuxTrust Global Root 2' root certificate.
* bmo#1639987 - Remove 'Staat der Nederlanden Root CA - G2' root
		certificate.
* bmo#1618402 - Remove Symantec root certificates and disable email trust
		bit.
* bmo#1640516 - NSS 3.54 should depend on NSPR 4.26.
* bmo#1642146 - Fix undefined reference to `PORT_ZAlloc_stub' in seed.c.
* bmo#1642153 - Fix infinite recursion building NSS.
* bmo#1642638 - Fix fuzzing assertion crash.
* bmo#1642871 - Enable SSL_SendSessionTicket after resumption.
* bmo#1643123 - Support SSL_ExportEarlyKeyingMaterial with External PSKs.
* bmo#1643557 - Fix numerous compile warnings in NSS.
* bmo#1644774 - SSL gtests to use ClearServerCache when resetting
		self-encrypt keys.
* bmo#1645479 - Don't use SECITEM_MakeItem in secutil.c.
* bmo#1646520 - Stricter enforcement of ASN.1 INTEGER encoding.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-30"/>
	<updated date="2021-09-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029961">SUSE bug 1029961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174697">SUSE bug 1174697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176206">SUSE bug 1176206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176934">SUSE bug 1176934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179382">SUSE bug 1179382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12400/">CVE-2020-12400 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12400">CVE-2020-12400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12401/">CVE-2020-12401 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12401">CVE-2020-12401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12403/">CVE-2020-12403 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12403">CVE-2020-12403 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25648/">CVE-2020-25648 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25648">CVE-2020-25648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6829/">CVE-2020-6829 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6829">CVE-2020-6829 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634800" comment="libfreebl3-3.68-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634801" comment="libfreebl3-32bit-3.68-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634802" comment="libsoftokn3-3.68-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634803" comment="libsoftokn3-32bit-3.68-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634804" comment="mozilla-nspr-4.32-33.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634805" comment="mozilla-nspr-32bit-4.32-33.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634806" comment="mozilla-nspr-devel-4.32-33.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634807" comment="mozilla-nss-3.68-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634808" comment="mozilla-nss-32bit-3.68-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634809" comment="mozilla-nss-certs-3.68-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634810" comment="mozilla-nss-certs-32bit-3.68-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634811" comment="mozilla-nss-devel-3.68-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634812" comment="mozilla-nss-tools-3.68-47.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220215" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1101567" ref_url="https://bugzilla.suse.com/1101567" source="BUGZILLA"/>
		<reference ref_id="1101570" ref_url="https://bugzilla.suse.com/1101570" source="BUGZILLA"/>
		<reference ref_id="1101571" ref_url="https://bugzilla.suse.com/1101571" source="BUGZILLA"/>
		<reference ref_id="1101573" ref_url="https://bugzilla.suse.com/1101573" source="BUGZILLA"/>
		<reference ref_id="1101576" ref_url="https://bugzilla.suse.com/1101576" source="BUGZILLA"/>
		<reference ref_id="1101577" ref_url="https://bugzilla.suse.com/1101577" source="BUGZILLA"/>
		<reference ref_id="1101578" ref_url="https://bugzilla.suse.com/1101578" source="BUGZILLA"/>
		<reference ref_id="1101581" ref_url="https://bugzilla.suse.com/1101581" source="BUGZILLA"/>
		<reference ref_id="1101582" ref_url="https://bugzilla.suse.com/1101582" source="BUGZILLA"/>
		<reference ref_id="1101588" ref_url="https://bugzilla.suse.com/1101588" source="BUGZILLA"/>
		<reference ref_id="1101589" ref_url="https://bugzilla.suse.com/1101589" source="BUGZILLA"/>
		<reference ref_id="936807" ref_url="https://bugzilla.suse.com/936807" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14349" ref_url="https://www.suse.com/security/cve/CVE-2018-14349/" source="CVE"/>
		<reference ref_id="CVE-2018-14350" ref_url="https://www.suse.com/security/cve/CVE-2018-14350/" source="CVE"/>
		<reference ref_id="CVE-2018-14352" ref_url="https://www.suse.com/security/cve/CVE-2018-14352/" source="CVE"/>
		<reference ref_id="CVE-2018-14353" ref_url="https://www.suse.com/security/cve/CVE-2018-14353/" source="CVE"/>
		<reference ref_id="CVE-2018-14354" ref_url="https://www.suse.com/security/cve/CVE-2018-14354/" source="CVE"/>
		<reference ref_id="CVE-2018-14355" ref_url="https://www.suse.com/security/cve/CVE-2018-14355/" source="CVE"/>
		<reference ref_id="CVE-2018-14356" ref_url="https://www.suse.com/security/cve/CVE-2018-14356/" source="CVE"/>
		<reference ref_id="CVE-2018-14357" ref_url="https://www.suse.com/security/cve/CVE-2018-14357/" source="CVE"/>
		<reference ref_id="CVE-2018-14358" ref_url="https://www.suse.com/security/cve/CVE-2018-14358/" source="CVE"/>
		<reference ref_id="CVE-2018-14359" ref_url="https://www.suse.com/security/cve/CVE-2018-14359/" source="CVE"/>
		<reference ref_id="CVE-2018-14362" ref_url="https://www.suse.com/security/cve/CVE-2018-14362/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004462.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

Security issues fixed:

- CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582).
- CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581).
- CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567).
- CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578).
- CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576).
- CVE-2018-14355: Fix imap/util.c that mishandles '..' directory traversal in a mailbox name (bsc#1101577).
- CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589).
- CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588).
- CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573).
- CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570).
- CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571).


Bug fixes:

- bsc#936807: On entering a 70 character subject line in mutt, a tab is added to the text after 67 characters.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101567">SUSE bug 1101567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101570">SUSE bug 1101570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101571">SUSE bug 1101571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101573">SUSE bug 1101573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101576">SUSE bug 1101576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101577">SUSE bug 1101577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101578">SUSE bug 1101578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101581">SUSE bug 1101581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101582">SUSE bug 1101582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101588">SUSE bug 1101588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101589">SUSE bug 1101589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936807">SUSE bug 936807</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14349/">CVE-2018-14349 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14349">CVE-2018-14349 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14350/">CVE-2018-14350 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14350">CVE-2018-14350 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14352/">CVE-2018-14352 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14352">CVE-2018-14352 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14353/">CVE-2018-14353 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14353">CVE-2018-14353 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14354/">CVE-2018-14354 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14354">CVE-2018-14354 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14355/">CVE-2018-14355 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14355">CVE-2018-14355 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14356/">CVE-2018-14356 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14356">CVE-2018-14356 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14357/">CVE-2018-14357 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14357">CVE-2018-14357 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14358/">CVE-2018-14358 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14358">CVE-2018-14358 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14359/">CVE-2018-14359 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14359">CVE-2018-14359 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14362/">CVE-2018-14362 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14362">CVE-2018-14362 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584173" comment="mutt-1.5.17-42.43.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584173" comment="mutt-1.5.17-42.43.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220216" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1172906" ref_url="https://bugzilla.suse.com/1172906" source="BUGZILLA"/>
		<reference ref_id="1172935" ref_url="https://bugzilla.suse.com/1172935" source="BUGZILLA"/>
		<reference ref_id="1173197" ref_url="https://bugzilla.suse.com/1173197" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14093" ref_url="https://www.suse.com/security/cve/CVE-2020-14093/" source="CVE"/>
		<reference ref_id="CVE-2020-14154" ref_url="https://www.suse.com/security/cve/CVE-2020-14154/" source="CVE"/>
		<reference ref_id="CVE-2020-14954" ref_url="https://www.suse.com/security/cve/CVE-2020-14954/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007052.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2020-14954: Fixed a response injection due to a STARTTLS buffering issue which was
  affecting IMAP, SMTP, and POP3 (bsc#1173197).	  
- CVE-2020-14093: Fixed a potential IMAP Man-in-the-Middle attack via a PREAUTH response (bsc#1172906, bsc#1172935).
- CVE-2020-14154: Fixed an issue where Mutt was ignoring an expired certificate and was proceeding with a connection (bsc#1172906, bsc#1172935).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-30"/>
	<updated date="2020-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172906">SUSE bug 1172906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172935">SUSE bug 1172935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173197">SUSE bug 1173197</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14093/">CVE-2020-14093 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14093">CVE-2020-14093 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14154/">CVE-2020-14154 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14154">CVE-2020-14154 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14954/">CVE-2020-14954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14954">CVE-2020-14954 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584174" comment="mutt-1.5.17-42.51.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220217" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1179035" ref_url="https://bugzilla.suse.com/1179035" source="BUGZILLA"/>
		<reference ref_id="1179113" ref_url="https://bugzilla.suse.com/1179113" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28896" ref_url="https://www.suse.com/security/cve/CVE-2020-28896/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007894.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2020-28896: incomplete connection termination could lead to sending credentials over unencrypted connections (bsc#1179035)
- Avoid that message with a million tiny parts can freeze MUA for several minutes (bsc#1179113)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-30"/>
	<updated date="2020-11-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179035">SUSE bug 1179035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179113">SUSE bug 1179113</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28896/">CVE-2020-28896 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28896">CVE-2020-28896 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584175" comment="mutt-1.5.17-42.56.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220218" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="924663" ref_url="https://bugzilla.suse.com/924663" source="BUGZILLA"/>
		<reference ref_id="928962" ref_url="https://bugzilla.suse.com/928962" source="BUGZILLA"/>
		<reference ref_id="934401" ref_url="https://bugzilla.suse.com/934401" source="BUGZILLA"/>
		<reference ref_id="938412" ref_url="https://bugzilla.suse.com/938412" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2582" ref_url="https://www.suse.com/security/cve/CVE-2015-2582/" source="CVE"/>
		<reference ref_id="CVE-2015-2611" ref_url="https://www.suse.com/security/cve/CVE-2015-2611/" source="CVE"/>
		<reference ref_id="CVE-2015-2617" ref_url="https://www.suse.com/security/cve/CVE-2015-2617/" source="CVE"/>
		<reference ref_id="CVE-2015-2620" ref_url="https://www.suse.com/security/cve/CVE-2015-2620/" source="CVE"/>
		<reference ref_id="CVE-2015-2639" ref_url="https://www.suse.com/security/cve/CVE-2015-2639/" source="CVE"/>
		<reference ref_id="CVE-2015-2641" ref_url="https://www.suse.com/security/cve/CVE-2015-2641/" source="CVE"/>
		<reference ref_id="CVE-2015-2643" ref_url="https://www.suse.com/security/cve/CVE-2015-2643/" source="CVE"/>
		<reference ref_id="CVE-2015-2648" ref_url="https://www.suse.com/security/cve/CVE-2015-2648/" source="CVE"/>
		<reference ref_id="CVE-2015-2661" ref_url="https://www.suse.com/security/cve/CVE-2015-2661/" source="CVE"/>
		<reference ref_id="CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152/" source="CVE"/>
		<reference ref_id="CVE-2015-4737" ref_url="https://www.suse.com/security/cve/CVE-2015-4737/" source="CVE"/>
		<reference ref_id="CVE-2015-4752" ref_url="https://www.suse.com/security/cve/CVE-2015-4752/" source="CVE"/>
		<reference ref_id="CVE-2015-4756" ref_url="https://www.suse.com/security/cve/CVE-2015-4756/" source="CVE"/>
		<reference ref_id="CVE-2015-4757" ref_url="https://www.suse.com/security/cve/CVE-2015-4757/" source="CVE"/>
		<reference ref_id="CVE-2015-4761" ref_url="https://www.suse.com/security/cve/CVE-2015-4761/" source="CVE"/>
		<reference ref_id="CVE-2015-4767" ref_url="https://www.suse.com/security/cve/CVE-2015-4767/" source="CVE"/>
		<reference ref_id="CVE-2015-4769" ref_url="https://www.suse.com/security/cve/CVE-2015-4769/" source="CVE"/>
		<reference ref_id="CVE-2015-4771" ref_url="https://www.suse.com/security/cve/CVE-2015-4771/" source="CVE"/>
		<reference ref_id="CVE-2015-4772" ref_url="https://www.suse.com/security/cve/CVE-2015-4772/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<description>

MySQL was updated to version 5.5.45, fixing bugs and security issues.

A list of all changes can be found on:

- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-45.html
- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-44.html

To fix the 'BACKRONYM' security issue (CVE-2015-3152) the behaviour of 
the SSL options was changed slightly to meet expectations:
Now using '--ssl-verify-server-cert' and '--ssl[-*]' implies that the ssl
connection is required. The mysql client will now print an error
if ssl is required, but the server can not handle a ssl
connection [bnc#924663], [bnc#928962], [CVE-2015-3152]

Additional bugs fixed:
- fix rc.mysql-multi script to start instances after restart
  properly [bnc#934401].
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-22"/>
	<updated date="2015-09-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924663">SUSE bug 924663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928962">SUSE bug 928962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934401">SUSE bug 934401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2582/">CVE-2015-2582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2582">CVE-2015-2582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2611/">CVE-2015-2611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2611">CVE-2015-2611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2617/">CVE-2015-2617 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2617">CVE-2015-2617 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2620/">CVE-2015-2620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2620">CVE-2015-2620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2639/">CVE-2015-2639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2639">CVE-2015-2639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2641/">CVE-2015-2641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2641">CVE-2015-2641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2643/">CVE-2015-2643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2643">CVE-2015-2643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2648/">CVE-2015-2648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2648">CVE-2015-2648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2661/">CVE-2015-2661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2661">CVE-2015-2661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3152">CVE-2015-3152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4737/">CVE-2015-4737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4737">CVE-2015-4737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4752/">CVE-2015-4752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4752">CVE-2015-4752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4756/">CVE-2015-4756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4756">CVE-2015-4756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4757/">CVE-2015-4757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4757">CVE-2015-4757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4761/">CVE-2015-4761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4761">CVE-2015-4761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4767/">CVE-2015-4767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4767">CVE-2015-4767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4769/">CVE-2015-4769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4769">CVE-2015-4769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4771/">CVE-2015-4771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4771">CVE-2015-4771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4772/">CVE-2015-4772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4772">CVE-2015-4772 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579078" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579079" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579080" comment="libmysql55client18-x86-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579081" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563722" comment="libmysql55client_r18-32bit-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563723" comment="libmysql55client_r18-x86-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579082" comment="mysql-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579083" comment="mysql-client-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579084" comment="mysql-tools-5.5.45-0.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579078" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579079" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579080" comment="libmysql55client18-x86-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579081" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563722" comment="libmysql55client_r18-32bit-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563723" comment="libmysql55client_r18-x86-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579082" comment="mysql-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579083" comment="mysql-client-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579084" comment="mysql-tools-5.5.45-0.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220219" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="951391" ref_url="https://bugzilla.suse.com/951391" source="BUGZILLA"/>
		<reference ref_id="952196" ref_url="https://bugzilla.suse.com/952196" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1793" ref_url="https://www.suse.com/security/cve/CVE-2015-1793/" source="CVE"/>
		<reference ref_id="CVE-2015-4730" ref_url="https://www.suse.com/security/cve/CVE-2015-4730/" source="CVE"/>
		<reference ref_id="CVE-2015-4766" ref_url="https://www.suse.com/security/cve/CVE-2015-4766/" source="CVE"/>
		<reference ref_id="CVE-2015-4792" ref_url="https://www.suse.com/security/cve/CVE-2015-4792/" source="CVE"/>
		<reference ref_id="CVE-2015-4800" ref_url="https://www.suse.com/security/cve/CVE-2015-4800/" source="CVE"/>
		<reference ref_id="CVE-2015-4802" ref_url="https://www.suse.com/security/cve/CVE-2015-4802/" source="CVE"/>
		<reference ref_id="CVE-2015-4815" ref_url="https://www.suse.com/security/cve/CVE-2015-4815/" source="CVE"/>
		<reference ref_id="CVE-2015-4816" ref_url="https://www.suse.com/security/cve/CVE-2015-4816/" source="CVE"/>
		<reference ref_id="CVE-2015-4819" ref_url="https://www.suse.com/security/cve/CVE-2015-4819/" source="CVE"/>
		<reference ref_id="CVE-2015-4826" ref_url="https://www.suse.com/security/cve/CVE-2015-4826/" source="CVE"/>
		<reference ref_id="CVE-2015-4830" ref_url="https://www.suse.com/security/cve/CVE-2015-4830/" source="CVE"/>
		<reference ref_id="CVE-2015-4833" ref_url="https://www.suse.com/security/cve/CVE-2015-4833/" source="CVE"/>
		<reference ref_id="CVE-2015-4836" ref_url="https://www.suse.com/security/cve/CVE-2015-4836/" source="CVE"/>
		<reference ref_id="CVE-2015-4858" ref_url="https://www.suse.com/security/cve/CVE-2015-4858/" source="CVE"/>
		<reference ref_id="CVE-2015-4861" ref_url="https://www.suse.com/security/cve/CVE-2015-4861/" source="CVE"/>
		<reference ref_id="CVE-2015-4862" ref_url="https://www.suse.com/security/cve/CVE-2015-4862/" source="CVE"/>
		<reference ref_id="CVE-2015-4864" ref_url="https://www.suse.com/security/cve/CVE-2015-4864/" source="CVE"/>
		<reference ref_id="CVE-2015-4866" ref_url="https://www.suse.com/security/cve/CVE-2015-4866/" source="CVE"/>
		<reference ref_id="CVE-2015-4870" ref_url="https://www.suse.com/security/cve/CVE-2015-4870/" source="CVE"/>
		<reference ref_id="CVE-2015-4879" ref_url="https://www.suse.com/security/cve/CVE-2015-4879/" source="CVE"/>
		<reference ref_id="CVE-2015-4890" ref_url="https://www.suse.com/security/cve/CVE-2015-4890/" source="CVE"/>
		<reference ref_id="CVE-2015-4895" ref_url="https://www.suse.com/security/cve/CVE-2015-4895/" source="CVE"/>
		<reference ref_id="CVE-2015-4904" ref_url="https://www.suse.com/security/cve/CVE-2015-4904/" source="CVE"/>
		<reference ref_id="CVE-2015-4905" ref_url="https://www.suse.com/security/cve/CVE-2015-4905/" source="CVE"/>
		<reference ref_id="CVE-2015-4910" ref_url="https://www.suse.com/security/cve/CVE-2015-4910/" source="CVE"/>
		<reference ref_id="CVE-2015-4913" ref_url="https://www.suse.com/security/cve/CVE-2015-4913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<description>
The mysql package was updated to version 5.5.46 to fixs several security and non security issues.

- bnc#951391: update to version 5.5.46
  * changes:
    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-46.html
  * fixed CVEs:
    CVE-2015-1793, CVE-2015-0286, CVE-2015-0288, CVE-2015-1789,
    CVE-2015-4730, CVE-2015-4766, CVE-2015-4792, CVE-2015-4800,
    CVE-2015-4802, CVE-2015-4815, CVE-2015-4816, CVE-2015-4819,
    CVE-2015-4826, CVE-2015-4830, CVE-2015-4833, CVE-2015-4836,
    CVE-2015-4858, CVE-2015-4861, CVE-2015-4862, CVE-2015-4864,
    CVE-2015-4866, CVE-2015-4870, CVE-2015-4879, CVE-2015-4890,
    CVE-2015-4895, CVE-2015-4904, CVE-2015-4905, CVE-2015-4910,
    CVE-2015-4913
- bnc#952196: Fixed a build error for ppc*, s390* and ia64 architectures.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-18"/>
	<updated date="2015-12-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952196">SUSE bug 952196</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0286">CVE-2015-0286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0288">CVE-2015-0288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1789">CVE-2015-1789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1793/">CVE-2015-1793 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1793">CVE-2015-1793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4730/">CVE-2015-4730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4730">CVE-2015-4730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4766/">CVE-2015-4766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4766">CVE-2015-4766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4792/">CVE-2015-4792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4792">CVE-2015-4792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4800/">CVE-2015-4800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4800">CVE-2015-4800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4802/">CVE-2015-4802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4802">CVE-2015-4802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4815/">CVE-2015-4815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4815">CVE-2015-4815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4816/">CVE-2015-4816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4816">CVE-2015-4816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4819/">CVE-2015-4819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4819">CVE-2015-4819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4826/">CVE-2015-4826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4826">CVE-2015-4826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4830/">CVE-2015-4830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4830">CVE-2015-4830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4833/">CVE-2015-4833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4833">CVE-2015-4833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4836/">CVE-2015-4836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4836">CVE-2015-4836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4858/">CVE-2015-4858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4858">CVE-2015-4858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4861/">CVE-2015-4861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4861">CVE-2015-4861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4862/">CVE-2015-4862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4862">CVE-2015-4862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4864/">CVE-2015-4864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4864">CVE-2015-4864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4866/">CVE-2015-4866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4866">CVE-2015-4866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4870/">CVE-2015-4870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4870">CVE-2015-4870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4879/">CVE-2015-4879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4879">CVE-2015-4879 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4890/">CVE-2015-4890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4890">CVE-2015-4890 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4895/">CVE-2015-4895 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4895">CVE-2015-4895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4904/">CVE-2015-4904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4904">CVE-2015-4904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4905/">CVE-2015-4905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4905">CVE-2015-4905 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4910/">CVE-2015-4910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4910">CVE-2015-4910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4913/">CVE-2015-4913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4913">CVE-2015-4913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579085" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579086" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579087" comment="libmysql55client18-x86-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579088" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563724" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563725" comment="libmysql55client_r18-x86-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579089" comment="mysql-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579090" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579091" comment="mysql-tools-5.5.46-0.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579085" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579086" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579087" comment="libmysql55client18-x86-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579088" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563724" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563725" comment="libmysql55client_r18-x86-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579089" comment="mysql-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579090" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579091" comment="mysql-tools-5.5.46-0.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220220" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="959724" ref_url="https://bugzilla.suse.com/959724" source="BUGZILLA"/>
		<reference ref_id="960961" ref_url="https://bugzilla.suse.com/960961" source="BUGZILLA"/>
		<reference ref_id="962779" ref_url="https://bugzilla.suse.com/962779" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7744" ref_url="https://www.suse.com/security/cve/CVE-2015-7744/" source="CVE"/>
		<reference ref_id="CVE-2016-0502" ref_url="https://www.suse.com/security/cve/CVE-2016-0502/" source="CVE"/>
		<reference ref_id="CVE-2016-0505" ref_url="https://www.suse.com/security/cve/CVE-2016-0505/" source="CVE"/>
		<reference ref_id="CVE-2016-0546" ref_url="https://www.suse.com/security/cve/CVE-2016-0546/" source="CVE"/>
		<reference ref_id="CVE-2016-0596" ref_url="https://www.suse.com/security/cve/CVE-2016-0596/" source="CVE"/>
		<reference ref_id="CVE-2016-0597" ref_url="https://www.suse.com/security/cve/CVE-2016-0597/" source="CVE"/>
		<reference ref_id="CVE-2016-0598" ref_url="https://www.suse.com/security/cve/CVE-2016-0598/" source="CVE"/>
		<reference ref_id="CVE-2016-0600" ref_url="https://www.suse.com/security/cve/CVE-2016-0600/" source="CVE"/>
		<reference ref_id="CVE-2016-0606" ref_url="https://www.suse.com/security/cve/CVE-2016-0606/" source="CVE"/>
		<reference ref_id="CVE-2016-0608" ref_url="https://www.suse.com/security/cve/CVE-2016-0608/" source="CVE"/>
		<reference ref_id="CVE-2016-0609" ref_url="https://www.suse.com/security/cve/CVE-2016-0609/" source="CVE"/>
		<reference ref_id="CVE-2016-0616" ref_url="https://www.suse.com/security/cve/CVE-2016-0616/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<description>

This update to MySQL 5.5.47 fixes the following issues (bsc#962779):

- CVE-2015-7744: Lack of verification against faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange without low memory optimizations on a server, which makes it easier for remote attackers to obtain private RSA keys by capturing TLS handshakes, aka a Lenstra attack.
- CVE-2016-0502: Unspecified vulnerability in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer. 
- CVE-2016-0505: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Options. 
- CVE-2016-0546: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client. 
- CVE-2016-0596: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and 5.6.27 and earlier allows remote authenticated users to affect availability via vectors related to DML. 
- CVE-2016-0597: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Optimizer. 
- CVE-2016-0598: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via vectors related to DML. 
- CVE-2016-0600: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to InnoDB. 
- CVE-2016-0606: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect integrity via unknown vectors related to encryption. 
- CVE-2016-0608: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via vectors related to UDF. 
- CVE-2016-0609: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to privileges. 
- CVE-2016-0616: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
- bsc#959724: Possible buffer overflow from incorrect use of strcpy() and sprintf()
    
The following bugs were fixed:
    
- bsc#960961: Incorrect use of plugin-load option in default_plugins.cnf
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959724">SUSE bug 959724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960961">SUSE bug 960961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7744/">CVE-2015-7744 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7744">CVE-2015-7744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0502/">CVE-2016-0502 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0502">CVE-2016-0502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0505/">CVE-2016-0505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0505">CVE-2016-0505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0546/">CVE-2016-0546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0546">CVE-2016-0546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0596/">CVE-2016-0596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0596">CVE-2016-0596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0597/">CVE-2016-0597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0597">CVE-2016-0597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0598/">CVE-2016-0598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0598">CVE-2016-0598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0600/">CVE-2016-0600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0600">CVE-2016-0600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0606/">CVE-2016-0606 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0606">CVE-2016-0606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0608/">CVE-2016-0608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0608">CVE-2016-0608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0609/">CVE-2016-0609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0609">CVE-2016-0609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0616/">CVE-2016-0616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0616">CVE-2016-0616 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579092" comment="libmysql55client18-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579093" comment="libmysql55client18-32bit-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579094" comment="libmysql55client18-x86-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579095" comment="libmysql55client_r18-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563726" comment="libmysql55client_r18-32bit-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563727" comment="libmysql55client_r18-x86-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579096" comment="mysql-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579097" comment="mysql-client-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579098" comment="mysql-tools-5.5.47-0.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579092" comment="libmysql55client18-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579093" comment="libmysql55client18-32bit-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579094" comment="libmysql55client18-x86-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579095" comment="libmysql55client_r18-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563726" comment="libmysql55client_r18-32bit-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563727" comment="libmysql55client_r18-x86-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579096" comment="mysql-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579097" comment="mysql-client-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579098" comment="mysql-tools-5.5.47-0.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220221" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="963806" ref_url="https://bugzilla.suse.com/963806" source="BUGZILLA"/>
		<reference ref_id="976341" ref_url="https://bugzilla.suse.com/976341" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0640" ref_url="https://www.suse.com/security/cve/CVE-2016-0640/" source="CVE"/>
		<reference ref_id="CVE-2016-0641" ref_url="https://www.suse.com/security/cve/CVE-2016-0641/" source="CVE"/>
		<reference ref_id="CVE-2016-0642" ref_url="https://www.suse.com/security/cve/CVE-2016-0642/" source="CVE"/>
		<reference ref_id="CVE-2016-0643" ref_url="https://www.suse.com/security/cve/CVE-2016-0643/" source="CVE"/>
		<reference ref_id="CVE-2016-0644" ref_url="https://www.suse.com/security/cve/CVE-2016-0644/" source="CVE"/>
		<reference ref_id="CVE-2016-0646" ref_url="https://www.suse.com/security/cve/CVE-2016-0646/" source="CVE"/>
		<reference ref_id="CVE-2016-0647" ref_url="https://www.suse.com/security/cve/CVE-2016-0647/" source="CVE"/>
		<reference ref_id="CVE-2016-0648" ref_url="https://www.suse.com/security/cve/CVE-2016-0648/" source="CVE"/>
		<reference ref_id="CVE-2016-0649" ref_url="https://www.suse.com/security/cve/CVE-2016-0649/" source="CVE"/>
		<reference ref_id="CVE-2016-0650" ref_url="https://www.suse.com/security/cve/CVE-2016-0650/" source="CVE"/>
		<reference ref_id="CVE-2016-0651" ref_url="https://www.suse.com/security/cve/CVE-2016-0651/" source="CVE"/>
		<reference ref_id="CVE-2016-0666" ref_url="https://www.suse.com/security/cve/CVE-2016-0666/" source="CVE"/>
		<reference ref_id="CVE-2016-2047" ref_url="https://www.suse.com/security/cve/CVE-2016-2047/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002055.html" source="SUSE-SU"/>
		<description>
mysql was updated to version 5.5.49 to fix 13 security issues.

These security issues were fixed:
- CVE-2016-0644: Unspecified vulnerability allowed local users to affect availability via vectors related to DDL (bsc#976341).
- CVE-2016-0646: Unspecified vulnerability allowed local users to affect availability via vectors related to DML (bsc#976341).
- CVE-2016-0647: Unspecified vulnerability allowed local users to affect availability via vectors related to FTS (bsc#976341).
- CVE-2016-0640: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to DML (bsc#976341).
- CVE-2016-0641: Unspecified vulnerability allowed local users to affect confidentiality and availability via vectors related to MyISAM (bsc#976341).
- CVE-2016-0642: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to Federated (bsc#976341).
- CVE-2016-0643: Unspecified vulnerability allowed local users to affect confidentiality via vectors related to DML (bsc#976341).
- CVE-2016-0666: Unspecified vulnerability allowed local users to affect availability via vectors related to Security: Privileges (bsc#976341).
- CVE-2016-0651: Unspecified vulnerability allowed local users to affect availability via vectors related to Optimizer (bsc#976341).
- CVE-2016-0650: Unspecified vulnerability allowed local users to affect availability via vectors related to Replication (bsc#976341).
- CVE-2016-0648: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#976341).
- CVE-2016-0649: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#976341).
- CVE-2016-2047: The ssl_verify_server_cert function in sql-common/client.c did not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allowed man-in-the-middle attackers to spoof SSL servers via a '/CN=' string in a field in a certificate, as demonstrated by '/OU=/CN=bar.com/CN=foo.com (bsc#963806).

More details are available at
- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-49.html
- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-48.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-11"/>
	<updated date="2016-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/963806">SUSE bug 963806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0640/">CVE-2016-0640 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0640">CVE-2016-0640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0641/">CVE-2016-0641 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0641">CVE-2016-0641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0642/">CVE-2016-0642 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0642">CVE-2016-0642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0643/">CVE-2016-0643 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0643">CVE-2016-0643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0644/">CVE-2016-0644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0644">CVE-2016-0644 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0646/">CVE-2016-0646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0646">CVE-2016-0646 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0647/">CVE-2016-0647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0647">CVE-2016-0647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0648/">CVE-2016-0648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0648">CVE-2016-0648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0649/">CVE-2016-0649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0649">CVE-2016-0649 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0650/">CVE-2016-0650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0650">CVE-2016-0650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0651/">CVE-2016-0651 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0651">CVE-2016-0651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0666/">CVE-2016-0666 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0666">CVE-2016-0666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2047/">CVE-2016-2047 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2047">CVE-2016-2047 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584176" comment="libmysql55client18-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584177" comment="libmysql55client18-32bit-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584178" comment="libmysql55client18-x86-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584179" comment="libmysql55client_r18-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564974" comment="libmysql55client_r18-32bit-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564975" comment="libmysql55client_r18-x86-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584180" comment="mysql-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584181" comment="mysql-client-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584182" comment="mysql-tools-5.5.49-0.20.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584176" comment="libmysql55client18-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584177" comment="libmysql55client18-32bit-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584178" comment="libmysql55client18-x86-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584179" comment="libmysql55client_r18-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564974" comment="libmysql55client_r18-32bit-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564975" comment="libmysql55client_r18-x86-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584180" comment="mysql-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584181" comment="mysql-client-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584182" comment="mysql-tools-5.5.49-0.20.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220222" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="934789" ref_url="https://bugzilla.suse.com/934789" source="BUGZILLA"/>
		<reference ref_id="959724" ref_url="https://bugzilla.suse.com/959724" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002127.html" source="SUSE-SU"/>
		<description>

This update for mysql fixes the following issues:

- bsc#959724: fix incorrect usage of sprintf/strcpy that caused possible buffer overflow issues at various places

On SUSE Linux Enterprise 11 SP4 this fix was not yet shipped:
- Increase the key length (to 2048 bits) used in vio/viosslfactories.c for creating
  Diffie-Hellman keys (Logjam Attack) [bnc#934789] [CVE-2015-4000]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934789">SUSE bug 934789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959724">SUSE bug 959724</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584183" comment="libmysqlclient15-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584184" comment="libmysqlclient15-32bit-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584185" comment="libmysqlclient15-x86-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584186" comment="libmysqlclient_r15-5.0.96-0.8.10.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584183" comment="libmysqlclient15-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584184" comment="libmysqlclient15-32bit-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584185" comment="libmysqlclient15-x86-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584186" comment="libmysqlclient_r15-5.0.96-0.8.10.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220223" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="937258" ref_url="https://bugzilla.suse.com/937258" source="BUGZILLA"/>
		<reference ref_id="967374" ref_url="https://bugzilla.suse.com/967374" source="BUGZILLA"/>
		<reference ref_id="989913" ref_url="https://bugzilla.suse.com/989913" source="BUGZILLA"/>
		<reference ref_id="989919" ref_url="https://bugzilla.suse.com/989919" source="BUGZILLA"/>
		<reference ref_id="989922" ref_url="https://bugzilla.suse.com/989922" source="BUGZILLA"/>
		<reference ref_id="989926" ref_url="https://bugzilla.suse.com/989926" source="BUGZILLA"/>
		<reference ref_id="998309" ref_url="https://bugzilla.suse.com/998309" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3477" ref_url="https://www.suse.com/security/cve/CVE-2016-3477/" source="CVE"/>
		<reference ref_id="CVE-2016-3521" ref_url="https://www.suse.com/security/cve/CVE-2016-3521/" source="CVE"/>
		<reference ref_id="CVE-2016-3615" ref_url="https://www.suse.com/security/cve/CVE-2016-3615/" source="CVE"/>
		<reference ref_id="CVE-2016-5440" ref_url="https://www.suse.com/security/cve/CVE-2016-5440/" source="CVE"/>
		<reference ref_id="CVE-2016-6662" ref_url="https://www.suse.com/security/cve/CVE-2016-6662/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002279.html" source="SUSE-SU"/>
		<description>

This mysql update to verson 5.5.52 fixes the following issues: 

Security issues fixed:
- CVE-2016-3477: Fixed unspecified vulnerability in subcomponent parser (bsc#989913).
- CVE-2016-3521: Fixed unspecified vulnerability in subcomponent types (bsc#989919).
- CVE-2016-3615: Fixed unspecified vulnerability in subcomponent dml (bsc#989922).
- CVE-2016-5440: Fixed unspecified vulnerability in subcomponent rbr (bsc#989926).
- CVE-2016-6662: A malicious user with SQL and filesystem access could create
  a my.cnf in the datadir and , under certain circumstances, execute
  arbitrary code as mysql (or even root) user. (bsc#998309)


More details can be found on:
      http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-52.html
      http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-51.html
      http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-50.html

Bugs fixed:
- bsc#967374: properly restart mysql multi instances during upgrade
- bnc#937258: multi script to restart after crash
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-20"/>
	<updated date="2016-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/937258">SUSE bug 937258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967374">SUSE bug 967374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989913">SUSE bug 989913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989919">SUSE bug 989919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989922">SUSE bug 989922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989926">SUSE bug 989926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998309">SUSE bug 998309</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3477/">CVE-2016-3477 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3477">CVE-2016-3477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3521/">CVE-2016-3521 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3521">CVE-2016-3521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3615/">CVE-2016-3615 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3615">CVE-2016-3615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5440/">CVE-2016-5440 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5440">CVE-2016-5440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6662/">CVE-2016-6662 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6662">CVE-2016-6662 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584187" comment="libmysql55client18-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584188" comment="libmysql55client18-32bit-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584189" comment="libmysql55client18-x86-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584190" comment="libmysql55client_r18-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564979" comment="libmysql55client_r18-32bit-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564980" comment="libmysql55client_r18-x86-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584191" comment="mysql-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584192" comment="mysql-client-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584193" comment="mysql-tools-5.5.52-0.27.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584187" comment="libmysql55client18-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584188" comment="libmysql55client18-32bit-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584189" comment="libmysql55client18-x86-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584190" comment="libmysql55client_r18-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564979" comment="libmysql55client_r18-32bit-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564980" comment="libmysql55client_r18-x86-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584191" comment="mysql-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584192" comment="mysql-client-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584193" comment="mysql-tools-5.5.52-0.27.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220224" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1005558" ref_url="https://bugzilla.suse.com/1005558" source="BUGZILLA"/>
		<reference ref_id="1005580" ref_url="https://bugzilla.suse.com/1005580" source="BUGZILLA"/>
		<reference ref_id="1005581" ref_url="https://bugzilla.suse.com/1005581" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5584" ref_url="https://www.suse.com/security/cve/CVE-2016-5584/" source="CVE"/>
		<reference ref_id="CVE-2016-6662" ref_url="https://www.suse.com/security/cve/CVE-2016-6662/" source="CVE"/>
		<reference ref_id="CVE-2016-7440" ref_url="https://www.suse.com/security/cve/CVE-2016-7440/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002401.html" source="SUSE-SU"/>
		<description>

This mysql version update to 5.5.53 fixes the following issues:

- CVE-2016-6662: Unspecified vulnerability in subcomponent Logging (bsc#1005580)
- CVE-2016-7440: Unspecified vulnerability in subcomponent Encryption (bsc#1005581)
- CVE-2016-5584: Unspecified vulnerability in subcomponent Encryption (bsc#1005558)

Release Notes:
    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-53.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-12"/>
	<updated date="2016-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005558">SUSE bug 1005558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005580">SUSE bug 1005580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005581">SUSE bug 1005581</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5584/">CVE-2016-5584 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5584">CVE-2016-5584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6662/">CVE-2016-6662 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6662">CVE-2016-6662 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7440/">CVE-2016-7440 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7440">CVE-2016-7440 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584194" comment="libmysql55client18-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584195" comment="libmysql55client18-32bit-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584196" comment="libmysql55client18-x86-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584197" comment="libmysql55client_r18-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564981" comment="libmysql55client_r18-32bit-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564982" comment="libmysql55client_r18-x86-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584198" comment="mysql-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584199" comment="mysql-client-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584200" comment="mysql-tools-5.5.53-0.30.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584194" comment="libmysql55client18-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584195" comment="libmysql55client18-32bit-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584196" comment="libmysql55client18-x86-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584197" comment="libmysql55client_r18-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564981" comment="libmysql55client_r18-32bit-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564982" comment="libmysql55client_r18-x86-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584198" comment="mysql-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584199" comment="mysql-client-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584200" comment="mysql-tools-5.5.53-0.30.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220225" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1020868" ref_url="https://bugzilla.suse.com/1020868" source="BUGZILLA"/>
		<reference ref_id="1020873" ref_url="https://bugzilla.suse.com/1020873" source="BUGZILLA"/>
		<reference ref_id="1020875" ref_url="https://bugzilla.suse.com/1020875" source="BUGZILLA"/>
		<reference ref_id="1020877" ref_url="https://bugzilla.suse.com/1020877" source="BUGZILLA"/>
		<reference ref_id="1020882" ref_url="https://bugzilla.suse.com/1020882" source="BUGZILLA"/>
		<reference ref_id="1020884" ref_url="https://bugzilla.suse.com/1020884" source="BUGZILLA"/>
		<reference ref_id="1020885" ref_url="https://bugzilla.suse.com/1020885" source="BUGZILLA"/>
		<reference ref_id="1020890" ref_url="https://bugzilla.suse.com/1020890" source="BUGZILLA"/>
		<reference ref_id="1020891" ref_url="https://bugzilla.suse.com/1020891" source="BUGZILLA"/>
		<reference ref_id="1020894" ref_url="https://bugzilla.suse.com/1020894" source="BUGZILLA"/>
		<reference ref_id="1020896" ref_url="https://bugzilla.suse.com/1020896" source="BUGZILLA"/>
		<reference ref_id="1022428" ref_url="https://bugzilla.suse.com/1022428" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3238" ref_url="https://www.suse.com/security/cve/CVE-2017-3238/" source="CVE"/>
		<reference ref_id="CVE-2017-3243" ref_url="https://www.suse.com/security/cve/CVE-2017-3243/" source="CVE"/>
		<reference ref_id="CVE-2017-3244" ref_url="https://www.suse.com/security/cve/CVE-2017-3244/" source="CVE"/>
		<reference ref_id="CVE-2017-3258" ref_url="https://www.suse.com/security/cve/CVE-2017-3258/" source="CVE"/>
		<reference ref_id="CVE-2017-3265" ref_url="https://www.suse.com/security/cve/CVE-2017-3265/" source="CVE"/>
		<reference ref_id="CVE-2017-3291" ref_url="https://www.suse.com/security/cve/CVE-2017-3291/" source="CVE"/>
		<reference ref_id="CVE-2017-3312" ref_url="https://www.suse.com/security/cve/CVE-2017-3312/" source="CVE"/>
		<reference ref_id="CVE-2017-3313" ref_url="https://www.suse.com/security/cve/CVE-2017-3313/" source="CVE"/>
		<reference ref_id="CVE-2017-3317" ref_url="https://www.suse.com/security/cve/CVE-2017-3317/" source="CVE"/>
		<reference ref_id="CVE-2017-3318" ref_url="https://www.suse.com/security/cve/CVE-2017-3318/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002627.html" source="SUSE-SU"/>
		<description>

This mysql version update to 5.5.54 fixes the following issues:

- CVE-2017-3318: Unspecified vulnerability affecting Error Handling (bsc#1020896)
- CVE-2017-3317: Unspecified vulnerability affecting Logging (bsc#1020894)
- CVE-2017-3313: Unspecified vulnerability affecting the MyISAM component (bsc#1020890)
- CVE-2017-3312: Insecure error log file handling in mysqld_safe, incomplete CVE-2016-6664 (bsc#1020873)
- CVE-2017-3291: Unrestricted mysqld_safe's ledir (bsc#1020884)
- CVE-2017-3265: Unsafe chmod/chown use in init script (bsc#1020885)
- CVE-2017-3258: Unspecified vulnerability in the DDL component (bsc#1020875)
- CVE-2017-3244: Unspecified vulnerability affecing the DML component (bsc#1020877)
- CVE-2017-3243: Unspecified vulnerability affecting the Charsets component (bsc#1020891)
- CVE-2017-3238: Unspecified vulnerability affecting the Optimizer component (bsc#1020882)
- Applications using the client library for MySQL (libmysqlclient.so) had a use-after-free issue that could cause the applications to crash (bsc#1022428)

Release Notes: 
    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-54.html
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-06"/>
	<updated date="2017-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020873">SUSE bug 1020873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020875">SUSE bug 1020875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020877">SUSE bug 1020877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020882">SUSE bug 1020882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020884">SUSE bug 1020884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020885">SUSE bug 1020885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020890">SUSE bug 1020890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020891">SUSE bug 1020891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020894">SUSE bug 1020894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020896">SUSE bug 1020896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022428">SUSE bug 1022428</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3238/">CVE-2017-3238 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3238">CVE-2017-3238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3243/">CVE-2017-3243 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3243">CVE-2017-3243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3244/">CVE-2017-3244 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3244">CVE-2017-3244 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3258/">CVE-2017-3258 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3258">CVE-2017-3258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3265/">CVE-2017-3265 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3265">CVE-2017-3265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3291/">CVE-2017-3291 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3291">CVE-2017-3291 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-3312/">CVE-2017-3312 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3312">CVE-2017-3312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3313/">CVE-2017-3313 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3313">CVE-2017-3313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3317/">CVE-2017-3317 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3317">CVE-2017-3317 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3318/">CVE-2017-3318 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3318">CVE-2017-3318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584201" comment="libmysql55client18-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584202" comment="libmysql55client18-32bit-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584203" comment="libmysql55client18-x86-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584204" comment="libmysql55client_r18-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564983" comment="libmysql55client_r18-32bit-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564984" comment="libmysql55client_r18-x86-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584205" comment="mysql-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584206" comment="mysql-client-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584207" comment="mysql-tools-5.5.54-0.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584201" comment="libmysql55client18-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584202" comment="libmysql55client18-32bit-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584203" comment="libmysql55client18-x86-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584204" comment="libmysql55client_r18-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564983" comment="libmysql55client_r18-32bit-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564984" comment="libmysql55client_r18-x86-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584205" comment="mysql-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584206" comment="mysql-client-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584207" comment="mysql-tools-5.5.54-0.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220226" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1020976" ref_url="https://bugzilla.suse.com/1020976" source="BUGZILLA"/>
		<reference ref_id="1022428" ref_url="https://bugzilla.suse.com/1022428" source="BUGZILLA"/>
		<reference ref_id="1029014" ref_url="https://bugzilla.suse.com/1029014" source="BUGZILLA"/>
		<reference ref_id="1029396" ref_url="https://bugzilla.suse.com/1029396" source="BUGZILLA"/>
		<reference ref_id="1034850" ref_url="https://bugzilla.suse.com/1034850" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3302" ref_url="https://www.suse.com/security/cve/CVE-2017-3302/" source="CVE"/>
		<reference ref_id="CVE-2017-3305" ref_url="https://www.suse.com/security/cve/CVE-2017-3305/" source="CVE"/>
		<reference ref_id="CVE-2017-3308" ref_url="https://www.suse.com/security/cve/CVE-2017-3308/" source="CVE"/>
		<reference ref_id="CVE-2017-3309" ref_url="https://www.suse.com/security/cve/CVE-2017-3309/" source="CVE"/>
		<reference ref_id="CVE-2017-3329" ref_url="https://www.suse.com/security/cve/CVE-2017-3329/" source="CVE"/>
		<reference ref_id="CVE-2017-3453" ref_url="https://www.suse.com/security/cve/CVE-2017-3453/" source="CVE"/>
		<reference ref_id="CVE-2017-3456" ref_url="https://www.suse.com/security/cve/CVE-2017-3456/" source="CVE"/>
		<reference ref_id="CVE-2017-3461" ref_url="https://www.suse.com/security/cve/CVE-2017-3461/" source="CVE"/>
		<reference ref_id="CVE-2017-3462" ref_url="https://www.suse.com/security/cve/CVE-2017-3462/" source="CVE"/>
		<reference ref_id="CVE-2017-3463" ref_url="https://www.suse.com/security/cve/CVE-2017-3463/" source="CVE"/>
		<reference ref_id="CVE-2017-3464" ref_url="https://www.suse.com/security/cve/CVE-2017-3464/" source="CVE"/>
		<reference ref_id="CVE-2017-3600" ref_url="https://www.suse.com/security/cve/CVE-2017-3600/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002833.html" source="SUSE-SU"/>
		<description>

This update for mysql to version 5.5.55 fixes the following issues:

These security issues were fixed:

- CVE-2017-3308: Unspecified vulnerability in Server: DML (bsc#1034850)
- CVE-2017-3309: Unspecified vulnerability in Server: Optimizer (bsc#1034850)
- CVE-2017-3329: Unspecified vulnerability in Server: Thread (bsc#1034850)
- CVE-2017-3600: Unspecified vulnerability in Client: mysqldump (bsc#1034850)
- CVE-2017-3453: Unspecified vulnerability in Server: Optimizer (bsc#1034850)
- CVE-2017-3456: Unspecified vulnerability in Server: DML (bsc#1034850)
- CVE-2017-3463: Unspecified vulnerability in Server: Security (bsc#1034850)
- CVE-2017-3462: Unspecified vulnerability in Server: Security (bsc#1034850)
- CVE-2017-3461: Unspecified vulnerability in Server: Security (bsc#1034850)
- CVE-2017-3464: Unspecified vulnerability in Server: DDL (bsc#1034850)
- CVE-2017-3305: MySQL client sent authentication request unencrypted even if SSL was required (aka Ridddle) (bsc#1029396).
- CVE-2016-5483: Mysqldump failed to properly quote certain identifiers in SQL statements written to the dump output, allowing for execution of arbitrary commands (bsc#1029014)
- '--ssl-mode=REQUIRED' can be specified to require a secure connection (it fails if a secure connection cannot be obtained)

This non-security issue was fixed:

- Set the default umask to 077 in rc.mysql-multi [bsc#1020976]

For additional changes please see
http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-55.html

Note: The issue tracked in bsc#1022428 and fixed in the last update was
assigned CVE-2017-3302.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-28"/>
	<updated date="2017-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020976">SUSE bug 1020976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022428">SUSE bug 1022428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029014">SUSE bug 1029014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029396">SUSE bug 1029396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3302/">CVE-2017-3302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3302">CVE-2017-3302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3305/">CVE-2017-3305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3305">CVE-2017-3305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3308/">CVE-2017-3308 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3308">CVE-2017-3308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3309/">CVE-2017-3309 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3309">CVE-2017-3309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3329/">CVE-2017-3329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3329">CVE-2017-3329 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3453/">CVE-2017-3453 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3453">CVE-2017-3453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3456/">CVE-2017-3456 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3456">CVE-2017-3456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3461/">CVE-2017-3461 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3461">CVE-2017-3461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3462/">CVE-2017-3462 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3462">CVE-2017-3462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3463/">CVE-2017-3463 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3463">CVE-2017-3463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3464/">CVE-2017-3464 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3464">CVE-2017-3464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3600/">CVE-2017-3600 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3600">CVE-2017-3600 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584208" comment="libmysql55client18-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584209" comment="libmysql55client18-32bit-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584210" comment="libmysql55client18-x86-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584211" comment="libmysql55client_r18-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564985" comment="libmysql55client_r18-32bit-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564986" comment="libmysql55client_r18-x86-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584212" comment="mysql-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584213" comment="mysql-client-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584214" comment="mysql-tools-5.5.55-0.38.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584208" comment="libmysql55client18-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584209" comment="libmysql55client18-32bit-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584210" comment="libmysql55client18-x86-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584211" comment="libmysql55client_r18-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564985" comment="libmysql55client_r18-32bit-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564986" comment="libmysql55client_r18-x86-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584212" comment="mysql-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584213" comment="mysql-client-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584214" comment="mysql-tools-5.5.55-0.38.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220227" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1049398" ref_url="https://bugzilla.suse.com/1049398" source="BUGZILLA"/>
		<reference ref_id="1049399" ref_url="https://bugzilla.suse.com/1049399" source="BUGZILLA"/>
		<reference ref_id="1049404" ref_url="https://bugzilla.suse.com/1049404" source="BUGZILLA"/>
		<reference ref_id="1049411" ref_url="https://bugzilla.suse.com/1049411" source="BUGZILLA"/>
		<reference ref_id="1049415" ref_url="https://bugzilla.suse.com/1049415" source="BUGZILLA"/>
		<reference ref_id="1049416" ref_url="https://bugzilla.suse.com/1049416" source="BUGZILLA"/>
		<reference ref_id="1049417" ref_url="https://bugzilla.suse.com/1049417" source="BUGZILLA"/>
		<reference ref_id="1049422" ref_url="https://bugzilla.suse.com/1049422" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3635" ref_url="https://www.suse.com/security/cve/CVE-2017-3635/" source="CVE"/>
		<reference ref_id="CVE-2017-3636" ref_url="https://www.suse.com/security/cve/CVE-2017-3636/" source="CVE"/>
		<reference ref_id="CVE-2017-3641" ref_url="https://www.suse.com/security/cve/CVE-2017-3641/" source="CVE"/>
		<reference ref_id="CVE-2017-3648" ref_url="https://www.suse.com/security/cve/CVE-2017-3648/" source="CVE"/>
		<reference ref_id="CVE-2017-3651" ref_url="https://www.suse.com/security/cve/CVE-2017-3651/" source="CVE"/>
		<reference ref_id="CVE-2017-3652" ref_url="https://www.suse.com/security/cve/CVE-2017-3652/" source="CVE"/>
		<reference ref_id="CVE-2017-3653" ref_url="https://www.suse.com/security/cve/CVE-2017-3653/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003166.html" source="SUSE-SU"/>
		<description>
This update for mysql fixes the following issues:


- CVE-2017-3635: C API unspecified vulnerability (bsc#1049398) 
- CVE-2017-3636: Client programs unspecified vulnerability (bsc#1049399)
- CVE-2017-3641: DML unspecified vulnerability (bsc#1049404)
- CVE-2017-3648: Charsets unspecified vulnerability (bsc#1049411)
- CVE-2017-3651: Client mysqldump unspecified vulnerability (bsc#1049415)
- CVE-2017-3652: DDL unspecified vulnerability (bsc#1049416)
- CVE-2017-3653: DDL unspecified vulnerability (bsc#1049417)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-29"/>
	<updated date="2017-08-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049398">SUSE bug 1049398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049399">SUSE bug 1049399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049404">SUSE bug 1049404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049411">SUSE bug 1049411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049415">SUSE bug 1049415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049416">SUSE bug 1049416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049417">SUSE bug 1049417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3635/">CVE-2017-3635 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3635">CVE-2017-3635 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-3636/">CVE-2017-3636 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3636">CVE-2017-3636 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3641/">CVE-2017-3641 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3641">CVE-2017-3641 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3648/">CVE-2017-3648 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3648">CVE-2017-3648 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3651/">CVE-2017-3651 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3651">CVE-2017-3651 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3652/">CVE-2017-3652 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3652">CVE-2017-3652 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3653/">CVE-2017-3653 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3653">CVE-2017-3653 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584215" comment="libmysql55client18-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584216" comment="libmysql55client18-32bit-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584217" comment="libmysql55client18-x86-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584218" comment="libmysql55client_r18-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564987" comment="libmysql55client_r18-32bit-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564988" comment="libmysql55client_r18-x86-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584219" comment="mysql-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584220" comment="mysql-client-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584221" comment="mysql-tools-5.5.57-0.39.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584215" comment="libmysql55client18-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584216" comment="libmysql55client18-32bit-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584217" comment="libmysql55client18-x86-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584218" comment="libmysql55client_r18-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564987" comment="libmysql55client_r18-32bit-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564988" comment="libmysql55client_r18-x86-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584219" comment="mysql-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584220" comment="mysql-client-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584221" comment="mysql-tools-5.5.57-0.39.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220228" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1064101" ref_url="https://bugzilla.suse.com/1064101" source="BUGZILLA"/>
		<reference ref_id="1064115" ref_url="https://bugzilla.suse.com/1064115" source="BUGZILLA"/>
		<reference ref_id="1064116" ref_url="https://bugzilla.suse.com/1064116" source="BUGZILLA"/>
		<reference ref_id="1064117" ref_url="https://bugzilla.suse.com/1064117" source="BUGZILLA"/>
		<reference ref_id="1064119" ref_url="https://bugzilla.suse.com/1064119" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10268" ref_url="https://www.suse.com/security/cve/CVE-2017-10268/" source="CVE"/>
		<reference ref_id="CVE-2017-10378" ref_url="https://www.suse.com/security/cve/CVE-2017-10378/" source="CVE"/>
		<reference ref_id="CVE-2017-10379" ref_url="https://www.suse.com/security/cve/CVE-2017-10379/" source="CVE"/>
		<reference ref_id="CVE-2017-10384" ref_url="https://www.suse.com/security/cve/CVE-2017-10384/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003393.html" source="SUSE-SU"/>
		<description>


This update for mysql to version 5.5.58 fixes the following issues:

Fixed security issues:

- CVE-2017-10268: issue inside subcomponent Server Replication [bsc#1064101] 
- CVE-2017-10378: issue inside subcomponent Server Optimizer [bsc#1064115] 
- CVE-2017-10379: issue inside subcomponent Client programs [bsc#1064116] 
- CVE-2017-10384: issue inside subcomponent Server DDL [bsc#1064117] 

For a full list of changes check:

    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-58.html

		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-10"/>
	<updated date="2017-11-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1064101">SUSE bug 1064101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064115">SUSE bug 1064115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064116">SUSE bug 1064116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064117">SUSE bug 1064117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10268/">CVE-2017-10268 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10268">CVE-2017-10268 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10378/">CVE-2017-10378 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10378">CVE-2017-10378 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10379/">CVE-2017-10379 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10379">CVE-2017-10379 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10384/">CVE-2017-10384 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10384">CVE-2017-10384 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584222" comment="libmysql55client18-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584223" comment="libmysql55client18-32bit-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584224" comment="libmysql55client18-x86-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584225" comment="libmysql55client_r18-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564989" comment="libmysql55client_r18-32bit-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564990" comment="libmysql55client_r18-x86-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584226" comment="mysql-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584227" comment="mysql-client-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584228" comment="mysql-tools-5.5.58-0.39.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584222" comment="libmysql55client18-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584223" comment="libmysql55client18-32bit-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584224" comment="libmysql55client18-x86-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584225" comment="libmysql55client_r18-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564989" comment="libmysql55client_r18-32bit-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564990" comment="libmysql55client_r18-x86-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584226" comment="mysql-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584227" comment="mysql-client-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584228" comment="mysql-tools-5.5.58-0.39.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220229" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1076369" ref_url="https://bugzilla.suse.com/1076369" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2562" ref_url="https://www.suse.com/security/cve/CVE-2018-2562/" source="CVE"/>
		<reference ref_id="CVE-2018-2622" ref_url="https://www.suse.com/security/cve/CVE-2018-2622/" source="CVE"/>
		<reference ref_id="CVE-2018-2640" ref_url="https://www.suse.com/security/cve/CVE-2018-2640/" source="CVE"/>
		<reference ref_id="CVE-2018-2665" ref_url="https://www.suse.com/security/cve/CVE-2018-2665/" source="CVE"/>
		<reference ref_id="CVE-2018-2668" ref_url="https://www.suse.com/security/cve/CVE-2018-2668/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003722.html" source="SUSE-SU"/>
		<description>
This update for mysql to version 5.5.59 fixes several issues.

These security issues were fixed:

- CVE-2018-2622: Vulnerability in the subcomponent: Server: DDL. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server (bsc#1076369)
- CVE-2018-2562: Vulnerability in the subcomponent: Server : Partition. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server as well as unauthorized update,
  insert or delete access to some of MySQL Server accessible data (bsc#1076369)
- CVE-2018-2640: Vulnerability in the subcomponent: Server: Optimizer. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server (bsc#1076369)
- CVE-2018-2665: Vulnerability in the subcomponent: Server: Optimizer. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server.  Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server (bsc#1076369)
- CVE-2018-2668: Vulnerability in the subcomponent: Server: Optimizer. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server (bsc#1076369)

For additional changes please see http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-59.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-12"/>
	<updated date="2018-02-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-2562/">CVE-2018-2562 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2562">CVE-2018-2562 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2622/">CVE-2018-2622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2622">CVE-2018-2622 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2640/">CVE-2018-2640 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2640">CVE-2018-2640 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2665/">CVE-2018-2665 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2665">CVE-2018-2665 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2668/">CVE-2018-2668 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2668">CVE-2018-2668 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584229" comment="libmysql55client18-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584230" comment="libmysql55client18-32bit-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584231" comment="libmysql55client18-x86-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584232" comment="libmysql55client_r18-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564991" comment="libmysql55client_r18-32bit-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564992" comment="libmysql55client_r18-x86-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584233" comment="mysql-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584234" comment="mysql-client-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584235" comment="mysql-tools-5.5.59-0.39.9.8 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584229" comment="libmysql55client18-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584230" comment="libmysql55client18-32bit-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584231" comment="libmysql55client18-x86-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584232" comment="libmysql55client_r18-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564991" comment="libmysql55client_r18-32bit-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564992" comment="libmysql55client_r18-x86-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584233" comment="mysql-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584234" comment="mysql-client-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584235" comment="mysql-tools-5.5.59-0.39.9.8 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220230" version="1" class="patch">
	<metadata>
		<title>security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1089987" ref_url="https://bugzilla.suse.com/1089987" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2755" ref_url="https://www.suse.com/security/cve/CVE-2018-2755/" source="CVE"/>
		<reference ref_id="CVE-2018-2761" ref_url="https://www.suse.com/security/cve/CVE-2018-2761/" source="CVE"/>
		<reference ref_id="CVE-2018-2771" ref_url="https://www.suse.com/security/cve/CVE-2018-2771/" source="CVE"/>
		<reference ref_id="CVE-2018-2773" ref_url="https://www.suse.com/security/cve/CVE-2018-2773/" source="CVE"/>
		<reference ref_id="CVE-2018-2781" ref_url="https://www.suse.com/security/cve/CVE-2018-2781/" source="CVE"/>
		<reference ref_id="CVE-2018-2813" ref_url="https://www.suse.com/security/cve/CVE-2018-2813/" source="CVE"/>
		<reference ref_id="CVE-2018-2817" ref_url="https://www.suse.com/security/cve/CVE-2018-2817/" source="CVE"/>
		<reference ref_id="CVE-2018-2818" ref_url="https://www.suse.com/security/cve/CVE-2018-2818/" source="CVE"/>
		<reference ref_id="CVE-2018-2819" ref_url="https://www.suse.com/security/cve/CVE-2018-2819/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004064.html" source="SUSE-SU"/>
		<description>

  This update fixes the following issues:

  - Update to 5.5.60 in Oracle Apr2018 CPU (bsc#1089987).
  - CVE-2018-2761: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2755: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
  - CVE-2018-2781: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2819: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2818: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Security : Privileges). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2817: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2771: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Locking). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2813: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
  - CVE-2018-2773: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-18"/>
	<updated date="2018-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2755/">CVE-2018-2755 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2755">CVE-2018-2755 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2761/">CVE-2018-2761 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2761">CVE-2018-2761 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2771/">CVE-2018-2771 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2771">CVE-2018-2771 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2773/">CVE-2018-2773 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2773">CVE-2018-2773 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2781/">CVE-2018-2781 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2781">CVE-2018-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2813/">CVE-2018-2813 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2813">CVE-2018-2813 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2817/">CVE-2018-2817 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2817">CVE-2018-2817 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2818/">CVE-2018-2818 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2818">CVE-2018-2818 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2819/">CVE-2018-2819 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2819">CVE-2018-2819 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584236" comment="libmysql55client18-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584237" comment="libmysql55client18-32bit-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584238" comment="libmysql55client18-x86-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584239" comment="libmysql55client_r18-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564993" comment="libmysql55client_r18-32bit-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564994" comment="libmysql55client_r18-x86-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584240" comment="mysql-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584241" comment="mysql-client-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584242" comment="mysql-tools-5.5.60-0.39.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584236" comment="libmysql55client18-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584237" comment="libmysql55client18-32bit-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584238" comment="libmysql55client18-x86-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584239" comment="libmysql55client_r18-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564993" comment="libmysql55client_r18-32bit-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564994" comment="libmysql55client_r18-x86-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584240" comment="mysql-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584241" comment="mysql-client-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584242" comment="mysql-tools-5.5.60-0.39.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220231" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1101676" ref_url="https://bugzilla.suse.com/1101676" source="BUGZILLA"/>
		<reference ref_id="1101677" ref_url="https://bugzilla.suse.com/1101677" source="BUGZILLA"/>
		<reference ref_id="1101678" ref_url="https://bugzilla.suse.com/1101678" source="BUGZILLA"/>
		<reference ref_id="1101679" ref_url="https://bugzilla.suse.com/1101679" source="BUGZILLA"/>
		<reference ref_id="1101680" ref_url="https://bugzilla.suse.com/1101680" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3058" ref_url="https://www.suse.com/security/cve/CVE-2018-3058/" source="CVE"/>
		<reference ref_id="CVE-2018-3063" ref_url="https://www.suse.com/security/cve/CVE-2018-3063/" source="CVE"/>
		<reference ref_id="CVE-2018-3066" ref_url="https://www.suse.com/security/cve/CVE-2018-3066/" source="CVE"/>
		<reference ref_id="CVE-2018-3070" ref_url="https://www.suse.com/security/cve/CVE-2018-3070/" source="CVE"/>
		<reference ref_id="CVE-2018-3081" ref_url="https://www.suse.com/security/cve/CVE-2018-3081/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004466.html" source="SUSE-SU"/>
		<description>
This update for mysql to version 5.5.61 fixes the following issues:

The following security vulnerabilities were addressed:

- CVE-2018-3066: Fixed a difficult to exploit vulnerability that allowed high
  privileged attacker with network access via multiple protocols to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized update, insert or delete access to some of MySQL Server
  accessible data as well as unauthorized read access to a subset of MySQL
  Server accessible data. (bsc#1101678)

- CVE-2018-3070: Fixed an easily exploitable vulnerability that allowed low
  privileged attacker with network access via multiple protocols to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized ability to cause a hang or frequently repeatable crash
  (complete DOS) of MySQL Server. (bsc#1101679)

- CVE-2018-3081: Fixed a difficult to exploit vulnerability that allowed high
  privileged attacker with network access via multiple protocols to compromise
  MySQL Client. Successful attacks of this vulnerability can result in
  unauthorized ability to cause a hang or frequently repeatable crash
  (complete DOS) of MySQL Client as well as unauthorized update, insert or
  delete access to some of MySQL Client accessible data. (bsc#1101680)

- CVE-2018-3058: Fixed an easily exploitable vulnerability that allowed low
  privileged attacker with network access via multiple protocols to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized update, insert or delete access to some of MySQL Server
  accessible data. (bsc#1101676)

- CVE-2018-3063: Fixed an easily exploitable vulnerability allowed high
  privileged attacker with network access via multiple protocols to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized ability to cause a hang or frequently repeatable crash
  (complete DOS) of MySQL Server. (bsc#1101677)

 You can find more detailed information about this update in the
 [release notes](http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-61.html)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101676">SUSE bug 1101676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101677">SUSE bug 1101677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101678">SUSE bug 1101678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101679">SUSE bug 1101679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101680">SUSE bug 1101680</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3058/">CVE-2018-3058 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3058">CVE-2018-3058 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3063/">CVE-2018-3063 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3063">CVE-2018-3063 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3066/">CVE-2018-3066 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3066">CVE-2018-3066 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3070/">CVE-2018-3070 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3070">CVE-2018-3070 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3081/">CVE-2018-3081 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3081">CVE-2018-3081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584243" comment="libmysql55client18-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584244" comment="libmysql55client18-32bit-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584245" comment="libmysql55client18-x86-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584246" comment="libmysql55client_r18-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564995" comment="libmysql55client_r18-32bit-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564996" comment="libmysql55client_r18-x86-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584247" comment="mysql-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584248" comment="mysql-client-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584249" comment="mysql-tools-5.5.61-0.39.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584243" comment="libmysql55client18-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584244" comment="libmysql55client18-32bit-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584245" comment="libmysql55client18-x86-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584246" comment="libmysql55client_r18-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564995" comment="libmysql55client_r18-32bit-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564996" comment="libmysql55client_r18-x86-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584247" comment="mysql-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584248" comment="mysql-client-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584249" comment="mysql-tools-5.5.61-0.39.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220232" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1013882" ref_url="https://bugzilla.suse.com/1013882" source="BUGZILLA"/>
		<reference ref_id="1112368" ref_url="https://bugzilla.suse.com/1112368" source="BUGZILLA"/>
		<reference ref_id="1112369" ref_url="https://bugzilla.suse.com/1112369" source="BUGZILLA"/>
		<reference ref_id="1112432" ref_url="https://bugzilla.suse.com/1112432" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2018-3133" ref_url="https://www.suse.com/security/cve/CVE-2018-3133/" source="CVE"/>
		<reference ref_id="CVE-2018-3174" ref_url="https://www.suse.com/security/cve/CVE-2018-3174/" source="CVE"/>
		<reference ref_id="CVE-2018-3282" ref_url="https://www.suse.com/security/cve/CVE-2018-3282/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004805.html" source="SUSE-SU"/>
		<description>

  
MySQL server was updated to version 5.5.62, fixing bugs and security issues.

Changes:

    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-62.html

Following security issues were fixed:

- CVE-2016-9843: The crc32_big function in zlib might have allowed context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation. (bsc#1013882)
  Please note that SUSE uses the system zlib, not the embedded copy.

- CVE-2018-3133: Authenticated low privilege attackers could cause denial of service attacks (hangs or crashes) against the mysql server (bsc#1112369)
- CVE-2018-3174: Authenticated high privilege attackers could cause denial of service attacks (hangs or crashes) against the mysql server (bsc#1112368)
- CVE-2018-3282: Authenticated high privilege attackers could cause denial of service attacks (hangs or crashes) against the mysql server (bsc#1112432)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-29"/>
	<updated date="2018-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112368">SUSE bug 1112368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112369">SUSE bug 1112369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112432">SUSE bug 1112432</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9843">CVE-2016-9843 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3133/">CVE-2018-3133 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3133">CVE-2018-3133 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3174/">CVE-2018-3174 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3174">CVE-2018-3174 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3282/">CVE-2018-3282 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3282">CVE-2018-3282 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584250" comment="libmysql55client18-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584251" comment="libmysql55client18-32bit-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584252" comment="libmysql55client18-x86-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584253" comment="libmysql55client_r18-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564997" comment="libmysql55client_r18-32bit-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564998" comment="libmysql55client_r18-x86-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584254" comment="mysql-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584255" comment="mysql-client-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584256" comment="mysql-tools-5.5.62-0.39.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584250" comment="libmysql55client18-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584251" comment="libmysql55client18-32bit-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584252" comment="libmysql55client18-x86-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584253" comment="libmysql55client_r18-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564997" comment="libmysql55client_r18-32bit-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564998" comment="libmysql55client_r18-x86-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584254" comment="mysql-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584255" comment="mysql-client-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584256" comment="mysql-tools-5.5.62-0.39.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220233" version="1" class="patch">
	<metadata>
		<title>Security update for nagios (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1011630" ref_url="https://bugzilla.suse.com/1011630" source="BUGZILLA"/>
		<reference ref_id="1018047" ref_url="https://bugzilla.suse.com/1018047" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10089" ref_url="https://www.suse.com/security/cve/CVE-2016-10089/" source="CVE"/>
		<reference ref_id="CVE-2016-8641" ref_url="https://www.suse.com/security/cve/CVE-2016-8641/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004743.html" source="SUSE-SU"/>
		<description>
This update for nagios fixes the following issues:

- CVE-2016-8641 / CVE-2016-10089: fixed possible symlink attacks for files/directories created by root (bsc#1011630 / bsc#1018047)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-19"/>
	<updated date="2018-10-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011630">SUSE bug 1011630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018047">SUSE bug 1018047</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10089/">CVE-2016-10089 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10089">CVE-2016-10089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8641/">CVE-2016-8641 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8641">CVE-2016-8641 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584257" comment="nagios-3.0.6-1.25.36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584258" comment="nagios-www-3.0.6-1.25.36.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584257" comment="nagios-3.0.6-1.25.36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584258" comment="nagios-www-3.0.6-1.25.36.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220234" version="1" class="patch">
	<metadata>
		<title>Security update for nagios-nrpe (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="938906" ref_url="https://bugzilla.suse.com/938906" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004209.html" source="SUSE-SU"/>
		<description>
This update for nagios-nrpe fixes one issue.

This security issue was fixed:

- CVE-2015-4000: Prevent Logjam. The TLS protocol 1.2 and earlier, when a
  DHE_EXPORT ciphersuite is enabled on a server but not on a client, did not
  properly convey a DHE_EXPORT choice, which allowed man-in-the-middle attackers
  to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE
  replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT
  replaced by DHE (bsc#938906).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-20"/>
	<updated date="2018-06-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/938906">SUSE bug 938906</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584259" comment="nagios-nrpe-2.12-24.4.10.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584260" comment="nagios-nrpe-doc-2.12-24.4.10.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584261" comment="nagios-plugins-nrpe-2.12-24.4.10.3.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584259" comment="nagios-nrpe-2.12-24.4.10.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584260" comment="nagios-nrpe-doc-2.12-24.4.10.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584261" comment="nagios-plugins-nrpe-2.12-24.4.10.3.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220235" version="1" class="patch">
	<metadata>
		<title>Security update for nautilus (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1060031" ref_url="https://bugzilla.suse.com/1060031" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14604" ref_url="https://www.suse.com/security/cve/CVE-2017-14604/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004191.html" source="SUSE-SU"/>
		<description>
This update for nautilus fixes the following security issue:

- CVE-2017-14604: Fixed a file type spoofing attack by adding a
  metadata::trusted attribute to a file once the user acknowledges the file as
  trusted, and also remove the 'trusted' content in the desktop file
  (bsc#1060031).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-14"/>
	<updated date="2018-06-14"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1060031">SUSE bug 1060031</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14604/">CVE-2017-14604 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14604">CVE-2017-14604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584262" comment="nautilus-2.28.4-1.16.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584263" comment="nautilus-32bit-2.28.4-1.16.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584264" comment="nautilus-lang-2.28.4-1.16.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584265" comment="nautilus-x86-2.28.4-1.16.21.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584262" comment="nautilus-2.28.4-1.16.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584263" comment="nautilus-32bit-2.28.4-1.16.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584264" comment="nautilus-lang-2.28.4-1.16.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584265" comment="nautilus-x86-2.28.4-1.16.21.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220236" version="1" class="patch">
	<metadata>
		<title>Recommended update for ncurses (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1046853" ref_url="https://bugzilla.suse.com/1046853" source="BUGZILLA"/>
		<reference ref_id="1046858" ref_url="https://bugzilla.suse.com/1046858" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10684" ref_url="https://www.suse.com/security/cve/CVE-2017-10684/" source="CVE"/>
		<reference ref_id="CVE-2017-10685" ref_url="https://www.suse.com/security/cve/CVE-2017-10685/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003011.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:
- CVE-2017-10684: Possible RCE via stack-based buffer overflow in the fmt_entry function. (bsc#1046858)
- CVE-2017-10685: Possible RCE with format string vulnerability in the fmt_entry function. (bsc#1046853)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-06"/>
	<updated date="2017-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046853">SUSE bug 1046853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046858">SUSE bug 1046858</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10684/">CVE-2017-10684 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10684">CVE-2017-10684 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10685/">CVE-2017-10685 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10685">CVE-2017-10685 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584266" comment="libncurses5-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584267" comment="libncurses5-32bit-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584268" comment="libncurses5-x86-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584269" comment="libncurses6-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584270" comment="libncurses6-32bit-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584271" comment="libncurses6-x86-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584272" comment="ncurses-devel-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584273" comment="ncurses-devel-32bit-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584274" comment="ncurses-utils-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584275" comment="tack-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584276" comment="terminfo-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584277" comment="terminfo-base-5.6-92.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584266" comment="libncurses5-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584267" comment="libncurses5-32bit-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584268" comment="libncurses5-x86-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584269" comment="libncurses6-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584270" comment="libncurses6-32bit-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584271" comment="libncurses6-x86-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584272" comment="ncurses-devel-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584273" comment="ncurses-devel-32bit-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584274" comment="ncurses-utils-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584275" comment="tack-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584276" comment="terminfo-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584277" comment="terminfo-base-5.6-92.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220237" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1046853" ref_url="https://bugzilla.suse.com/1046853" source="BUGZILLA"/>
		<reference ref_id="1046858" ref_url="https://bugzilla.suse.com/1046858" source="BUGZILLA"/>
		<reference ref_id="1047964" ref_url="https://bugzilla.suse.com/1047964" source="BUGZILLA"/>
		<reference ref_id="1047965" ref_url="https://bugzilla.suse.com/1047965" source="BUGZILLA"/>
		<reference ref_id="1049344" ref_url="https://bugzilla.suse.com/1049344" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10684" ref_url="https://www.suse.com/security/cve/CVE-2017-10684/" source="CVE"/>
		<reference ref_id="CVE-2017-10685" ref_url="https://www.suse.com/security/cve/CVE-2017-10685/" source="CVE"/>
		<reference ref_id="CVE-2017-11112" ref_url="https://www.suse.com/security/cve/CVE-2017-11112/" source="CVE"/>
		<reference ref_id="CVE-2017-11113" ref_url="https://www.suse.com/security/cve/CVE-2017-11113/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003106.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:
- CVE-2017-11112: Illegal address access in append_acs. (bsc#1047964)
- CVE-2017-11113: Dereferencing NULL pointer in _nc_parse_entry. (bsc#1047965)
- CVE-2017-10684, CVE-2017-10685: Add modified upstream fix from ncurses 6.0 to avoid broken
  termcap format (bsc#1046853, bsc#1046858, bsc#1049344)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-07"/>
	<updated date="2017-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046853">SUSE bug 1046853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046858">SUSE bug 1046858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047964">SUSE bug 1047964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047965">SUSE bug 1047965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049344">SUSE bug 1049344</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10684/">CVE-2017-10684 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10684">CVE-2017-10684 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10685/">CVE-2017-10685 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10685">CVE-2017-10685 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11112/">CVE-2017-11112 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11112">CVE-2017-11112 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11113/">CVE-2017-11113 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11113">CVE-2017-11113 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584278" comment="libncurses5-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584279" comment="libncurses5-32bit-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584280" comment="libncurses5-x86-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584281" comment="libncurses6-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584282" comment="libncurses6-32bit-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584283" comment="libncurses6-x86-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584284" comment="ncurses-devel-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584285" comment="ncurses-devel-32bit-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584286" comment="ncurses-utils-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584287" comment="tack-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584288" comment="terminfo-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584289" comment="terminfo-base-5.6-93.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584278" comment="libncurses5-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584279" comment="libncurses5-32bit-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584280" comment="libncurses5-x86-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584281" comment="libncurses6-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584282" comment="libncurses6-32bit-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584283" comment="libncurses6-x86-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584284" comment="ncurses-devel-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584285" comment="ncurses-devel-32bit-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584286" comment="ncurses-utils-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584287" comment="tack-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584288" comment="terminfo-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584289" comment="terminfo-base-5.6-93.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220238" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1056127" ref_url="https://bugzilla.suse.com/1056127" source="BUGZILLA"/>
		<reference ref_id="1056128" ref_url="https://bugzilla.suse.com/1056128" source="BUGZILLA"/>
		<reference ref_id="1056129" ref_url="https://bugzilla.suse.com/1056129" source="BUGZILLA"/>
		<reference ref_id="1056131" ref_url="https://bugzilla.suse.com/1056131" source="BUGZILLA"/>
		<reference ref_id="1056132" ref_url="https://bugzilla.suse.com/1056132" source="BUGZILLA"/>
		<reference ref_id="1056136" ref_url="https://bugzilla.suse.com/1056136" source="BUGZILLA"/>
		<reference ref_id="1069530" ref_url="https://bugzilla.suse.com/1069530" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13728" ref_url="https://www.suse.com/security/cve/CVE-2017-13728/" source="CVE"/>
		<reference ref_id="CVE-2017-13729" ref_url="https://www.suse.com/security/cve/CVE-2017-13729/" source="CVE"/>
		<reference ref_id="CVE-2017-13730" ref_url="https://www.suse.com/security/cve/CVE-2017-13730/" source="CVE"/>
		<reference ref_id="CVE-2017-13731" ref_url="https://www.suse.com/security/cve/CVE-2017-13731/" source="CVE"/>
		<reference ref_id="CVE-2017-13732" ref_url="https://www.suse.com/security/cve/CVE-2017-13732/" source="CVE"/>
		<reference ref_id="CVE-2017-13733" ref_url="https://www.suse.com/security/cve/CVE-2017-13733/" source="CVE"/>
		<reference ref_id="CVE-2017-16879" ref_url="https://www.suse.com/security/cve/CVE-2017-16879/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003468.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:

- CVE-2017-13728: Fix infinite loop in the next_char function in comp_scan.c (bsc#1056136).
- CVE-2017-13729: Fix illegal address access in the _nc_save_str (bsc#1056132).
- CVE-2017-13730: Fix illegal address access in the function _nc_read_entry_source() (bsc#1056131).
- CVE-2017-13731: Fix illegal address access in the function postprocess_termcap() (bsc#1056129).
- CVE-2017-13732: Fix illegal address access in the function dump_uses() (bsc#1056128).
- CVE-2017-13733: Fix illegal address access in the fmt_entry function (bsc#1056127).
- CVE-2017-16879: Fix stack-based buffer overflow in the _nc_write_entry() function (bsc#1069530).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-01"/>
	<updated date="2017-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056127">SUSE bug 1056127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056128">SUSE bug 1056128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056129">SUSE bug 1056129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056131">SUSE bug 1056131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056132">SUSE bug 1056132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056136">SUSE bug 1056136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069530">SUSE bug 1069530</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13728/">CVE-2017-13728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13728">CVE-2017-13728 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13729/">CVE-2017-13729 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13729">CVE-2017-13729 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13730/">CVE-2017-13730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13730">CVE-2017-13730 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13731/">CVE-2017-13731 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13731">CVE-2017-13731 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13732/">CVE-2017-13732 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13732">CVE-2017-13732 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13733/">CVE-2017-13733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13733">CVE-2017-13733 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16879/">CVE-2017-16879 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16879">CVE-2017-16879 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584290" comment="libncurses5-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584291" comment="libncurses5-32bit-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584292" comment="libncurses5-x86-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584293" comment="libncurses6-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584294" comment="libncurses6-32bit-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584295" comment="libncurses6-x86-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584296" comment="ncurses-devel-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584297" comment="ncurses-devel-32bit-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584298" comment="ncurses-utils-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584299" comment="tack-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584300" comment="terminfo-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584301" comment="terminfo-base-5.6-93.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584290" comment="libncurses5-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584291" comment="libncurses5-32bit-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584292" comment="libncurses5-x86-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584293" comment="libncurses6-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584294" comment="libncurses6-32bit-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584295" comment="libncurses6-x86-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584296" comment="ncurses-devel-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584297" comment="ncurses-devel-32bit-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584298" comment="ncurses-utils-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584299" comment="tack-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584300" comment="terminfo-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584301" comment="terminfo-base-5.6-93.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220239" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1056127" ref_url="https://bugzilla.suse.com/1056127" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13733" ref_url="https://www.suse.com/security/cve/CVE-2017-13733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003620.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

Security issue fixed:

- CVE-2017-13733: Fix illegal address access in the fmt_entry function (bsc#1056127).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-23"/>
	<updated date="2018-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056127">SUSE bug 1056127</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13733/">CVE-2017-13733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13733">CVE-2017-13733 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584302" comment="libncurses5-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584303" comment="libncurses5-32bit-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584304" comment="libncurses5-x86-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584305" comment="libncurses6-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584306" comment="libncurses6-32bit-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584307" comment="libncurses6-x86-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584308" comment="ncurses-devel-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584309" comment="ncurses-devel-32bit-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584310" comment="ncurses-utils-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584311" comment="tack-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584312" comment="terminfo-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584313" comment="terminfo-base-5.6-93.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584302" comment="libncurses5-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584303" comment="libncurses5-32bit-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584304" comment="libncurses5-x86-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584305" comment="libncurses6-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584306" comment="libncurses6-32bit-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584307" comment="libncurses6-x86-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584308" comment="ncurses-devel-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584309" comment="ncurses-devel-32bit-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584310" comment="ncurses-utils-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584311" comment="tack-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584312" comment="terminfo-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584313" comment="terminfo-base-5.6-93.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220240" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="853382" ref_url="https://bugzilla.suse.com/853382" source="BUGZILLA"/>
		<reference ref_id="935863" ref_url="https://bugzilla.suse.com/935863" source="BUGZILLA"/>
		<reference ref_id="940188" ref_url="https://bugzilla.suse.com/940188" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001585.html" source="SUSE-SU"/>
		<description>
net-snmp was updated to fix one security vulnerability and several bugs.

- fix a vulnerability within the snmp_pdu_parse() function of snmp_api.c. (bnc#940188, CVE-2015-5621) 
- Add build requirement 'procps' to fix a net-snmp-config error. (bsc#935863)
- add support for /dev/shm in snmp hostmib (bnc#853382, FATE#316893).
- stop snmptrapd on package removal.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-17"/>
	<updated date="2015-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/853382">SUSE bug 853382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935863">SUSE bug 935863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940188">SUSE bug 940188</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5621">CVE-2015-5621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579172" comment="libsnmp15-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579173" comment="libsnmp15-32bit-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579174" comment="libsnmp15-x86-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579175" comment="net-snmp-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579176" comment="perl-SNMP-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579177" comment="snmp-mibs-5.4.2.1-8.12.24.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579172" comment="libsnmp15-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579173" comment="libsnmp15-32bit-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579174" comment="libsnmp15-x86-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579175" comment="net-snmp-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579176" comment="perl-SNMP-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579177" comment="snmp-mibs-5.4.2.1-8.12.24.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220241" version="1" class="patch">
	<metadata>
		<title>Security update for netpbm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1024287" ref_url="https://bugzilla.suse.com/1024287" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2581" ref_url="https://www.suse.com/security/cve/CVE-2017-2581/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002944.html" source="SUSE-SU"/>
		<description>
This update for netpbm fixes the following security issues:

- CVE-2017-2581: An out-of-bounds write in writeRasterPbm() could lead to memory corruption and potential code execution. (bsc#1024287)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-15"/>
	<updated date="2017-06-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024287">SUSE bug 1024287</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2581/">CVE-2017-2581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2581">CVE-2017-2581 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584314" comment="libnetpbm10-10.26.44-101.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584315" comment="libnetpbm10-32bit-10.26.44-101.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584316" comment="libnetpbm10-x86-10.26.44-101.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584317" comment="netpbm-10.26.44-101.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584314" comment="libnetpbm10-10.26.44-101.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584315" comment="libnetpbm10-32bit-10.26.44-101.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584316" comment="libnetpbm10-x86-10.26.44-101.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584317" comment="netpbm-10.26.44-101.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220242" version="1" class="patch">
	<metadata>
		<title>Security update for netpbm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1024288" ref_url="https://bugzilla.suse.com/1024288" source="BUGZILLA"/>
		<reference ref_id="1024291" ref_url="https://bugzilla.suse.com/1024291" source="BUGZILLA"/>
		<reference ref_id="1136936" ref_url="https://bugzilla.suse.com/1136936" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2579" ref_url="https://www.suse.com/security/cve/CVE-2017-2579/" source="CVE"/>
		<reference ref_id="CVE-2017-2580" ref_url="https://www.suse.com/security/cve/CVE-2017-2580/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005614.html" source="SUSE-SU"/>
		<description>
This update for netpbm fixes the following issues:

Security issues fixed:

- CVE-2017-2579: Fixed out-of-bounds read in expandCodeOntoStack() (bsc#1024288).
- CVE-2017-2580: Fixed out-of-bounds write of heap data in addPixelToRaster() function (bsc#1024291).
- created a netpbm-vulnerable subpackage and move pstopnm there, as it uses ghostscript for conversion (bsc#1136936)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024288">SUSE bug 1024288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024291">SUSE bug 1024291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136936">SUSE bug 1136936</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2579/">CVE-2017-2579 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2579">CVE-2017-2579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2580/">CVE-2017-2580 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2580">CVE-2017-2580 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584318" comment="libnetpbm10-10.26.44-101.15.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584319" comment="libnetpbm10-32bit-10.26.44-101.15.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584320" comment="netpbm-10.26.44-101.15.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220243" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="905885" ref_url="https://bugzilla.suse.com/905885" source="BUGZILLA"/>
		<reference ref_id="910063" ref_url="https://bugzilla.suse.com/910063" source="BUGZILLA"/>
		<reference ref_id="936327" ref_url="https://bugzilla.suse.com/936327" source="BUGZILLA"/>
		<reference ref_id="942441" ref_url="https://bugzilla.suse.com/942441" source="BUGZILLA"/>
		<reference ref_id="942587" ref_url="https://bugzilla.suse.com/942587" source="BUGZILLA"/>
		<reference ref_id="944300" ref_url="https://bugzilla.suse.com/944300" source="BUGZILLA"/>
		<reference ref_id="951608" ref_url="https://bugzilla.suse.com/951608" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7691" ref_url="https://www.suse.com/security/cve/CVE-2015-7691/" source="CVE"/>
		<reference ref_id="CVE-2015-7692" ref_url="https://www.suse.com/security/cve/CVE-2015-7692/" source="CVE"/>
		<reference ref_id="CVE-2015-7701" ref_url="https://www.suse.com/security/cve/CVE-2015-7701/" source="CVE"/>
		<reference ref_id="CVE-2015-7702" ref_url="https://www.suse.com/security/cve/CVE-2015-7702/" source="CVE"/>
		<reference ref_id="CVE-2015-7703" ref_url="https://www.suse.com/security/cve/CVE-2015-7703/" source="CVE"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<reference ref_id="CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705/" source="CVE"/>
		<reference ref_id="CVE-2015-7848" ref_url="https://www.suse.com/security/cve/CVE-2015-7848/" source="CVE"/>
		<reference ref_id="CVE-2015-7849" ref_url="https://www.suse.com/security/cve/CVE-2015-7849/" source="CVE"/>
		<reference ref_id="CVE-2015-7850" ref_url="https://www.suse.com/security/cve/CVE-2015-7850/" source="CVE"/>
		<reference ref_id="CVE-2015-7851" ref_url="https://www.suse.com/security/cve/CVE-2015-7851/" source="CVE"/>
		<reference ref_id="CVE-2015-7852" ref_url="https://www.suse.com/security/cve/CVE-2015-7852/" source="CVE"/>
		<reference ref_id="CVE-2015-7853" ref_url="https://www.suse.com/security/cve/CVE-2015-7853/" source="CVE"/>
		<reference ref_id="CVE-2015-7854" ref_url="https://www.suse.com/security/cve/CVE-2015-7854/" source="CVE"/>
		<reference ref_id="CVE-2015-7855" ref_url="https://www.suse.com/security/cve/CVE-2015-7855/" source="CVE"/>
		<reference ref_id="CVE-2015-7871" ref_url="https://www.suse.com/security/cve/CVE-2015-7871/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<description>
This ntp update provides the following security and non security fixes:

- Update to 4.2.8p4 to fix several security issues (bsc#951608):
  * CVE-2015-7871: NAK to the Future: Symmetric association
    authentication bypass via crypto-NAK
  * CVE-2015-7855: decodenetnum() will ASSERT botch instead of
    returning FAIL on some bogus values
  * CVE-2015-7854: Password Length Memory Corruption Vulnerability
  * CVE-2015-7853: Invalid length data provided by a custom
    refclock driver could cause a buffer overflow
  * CVE-2015-7852 ntpq atoascii() Memory Corruption Vulnerability
  * CVE-2015-7851 saveconfig Directory Traversal Vulnerability
  * CVE-2015-7850 remote config logfile-keyfile
  * CVE-2015-7849 trusted key use-after-free
  * CVE-2015-7848 mode 7 loop counter underrun
  * CVE-2015-7701 Slow memory leak in CRYPTO_ASSOC
  * CVE-2015-7703 configuration directives 'pidfile' and
    'driftfile' should only be allowed locally
  * CVE-2015-7704, CVE-2015-7705 Clients that receive a KoD should
    validate the origin timestamp field
  * CVE-2015-7691, CVE-2015-7692, CVE-2015-7702 Incomplete autokey
    data packet length checks
- Use ntpq instead of deprecated ntpdc in start-ntpd (bnc#936327).
- Add a controlkey to ntp.conf to make the above work.
- Improve runtime configuration:
  * Read keytype from ntp.conf
  * Don't write ntp keys to syslog.
- Don't let 'keysdir' lines in ntp.conf trigger the 'keys' parser.
- Fix the comment regarding addserver in ntp.conf (bnc#910063).
- Remove ntp.1.gz, it wasn't installed anymore.
- Remove ntp-4.2.7-rh-manpages.tar.gz and only keep ntptime.8.gz.
  The rest is partially irrelevant, partially redundant and
  potentially outdated (bsc#942587).
- Remove 'kod' from the restrict line in ntp.conf (bsc#944300).
- Use SHA1 instead of MD5 for symmetric keys (bsc#905885).
- Require perl-Socket6 (bsc#942441).
- Fix incomplete backporting of 'rcntp ntptimemset'.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-20"/>
	<updated date="2015-11-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/905885">SUSE bug 905885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910063">SUSE bug 910063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936327">SUSE bug 936327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942441">SUSE bug 942441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942587">SUSE bug 942587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944300">SUSE bug 944300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7691/">CVE-2015-7691 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7691">CVE-2015-7691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7692/">CVE-2015-7692 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7692">CVE-2015-7692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7701/">CVE-2015-7701 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7701">CVE-2015-7701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7702/">CVE-2015-7702 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7702">CVE-2015-7702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7703/">CVE-2015-7703 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7703">CVE-2015-7703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7704">CVE-2015-7704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7705">CVE-2015-7705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7848/">CVE-2015-7848 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7848">CVE-2015-7848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7849/">CVE-2015-7849 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7849">CVE-2015-7849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7850/">CVE-2015-7850 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7850">CVE-2015-7850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7851/">CVE-2015-7851 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7851">CVE-2015-7851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7852/">CVE-2015-7852 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7852">CVE-2015-7852 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7853/">CVE-2015-7853 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7853">CVE-2015-7853 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7854/">CVE-2015-7854 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7854">CVE-2015-7854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7855/">CVE-2015-7855 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7855">CVE-2015-7855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7871/">CVE-2015-7871 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7871">CVE-2015-7871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584321" comment="ntp-4.2.8p4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584322" comment="ntp-doc-4.2.8p4-5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584321" comment="ntp-4.2.8p4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584322" comment="ntp-doc-4.2.8p4-5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220244" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="782060" ref_url="https://bugzilla.suse.com/782060" source="BUGZILLA"/>
		<reference ref_id="784760" ref_url="https://bugzilla.suse.com/784760" source="BUGZILLA"/>
		<reference ref_id="916617" ref_url="https://bugzilla.suse.com/916617" source="BUGZILLA"/>
		<reference ref_id="951559" ref_url="https://bugzilla.suse.com/951559" source="BUGZILLA"/>
		<reference ref_id="951629" ref_url="https://bugzilla.suse.com/951629" source="BUGZILLA"/>
		<reference ref_id="956773" ref_url="https://bugzilla.suse.com/956773" source="BUGZILLA"/>
		<reference ref_id="962318" ref_url="https://bugzilla.suse.com/962318" source="BUGZILLA"/>
		<reference ref_id="962784" ref_url="https://bugzilla.suse.com/962784" source="BUGZILLA"/>
		<reference ref_id="962802" ref_url="https://bugzilla.suse.com/962802" source="BUGZILLA"/>
		<reference ref_id="962960" ref_url="https://bugzilla.suse.com/962960" source="BUGZILLA"/>
		<reference ref_id="962966" ref_url="https://bugzilla.suse.com/962966" source="BUGZILLA"/>
		<reference ref_id="962970" ref_url="https://bugzilla.suse.com/962970" source="BUGZILLA"/>
		<reference ref_id="962988" ref_url="https://bugzilla.suse.com/962988" source="BUGZILLA"/>
		<reference ref_id="962994" ref_url="https://bugzilla.suse.com/962994" source="BUGZILLA"/>
		<reference ref_id="962995" ref_url="https://bugzilla.suse.com/962995" source="BUGZILLA"/>
		<reference ref_id="962997" ref_url="https://bugzilla.suse.com/962997" source="BUGZILLA"/>
		<reference ref_id="963000" ref_url="https://bugzilla.suse.com/963000" source="BUGZILLA"/>
		<reference ref_id="963002" ref_url="https://bugzilla.suse.com/963002" source="BUGZILLA"/>
		<reference ref_id="975496" ref_url="https://bugzilla.suse.com/975496" source="BUGZILLA"/>
		<reference ref_id="975981" ref_url="https://bugzilla.suse.com/975981" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5300" ref_url="https://www.suse.com/security/cve/CVE-2015-5300/" source="CVE"/>
		<reference ref_id="CVE-2015-7973" ref_url="https://www.suse.com/security/cve/CVE-2015-7973/" source="CVE"/>
		<reference ref_id="CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974/" source="CVE"/>
		<reference ref_id="CVE-2015-7975" ref_url="https://www.suse.com/security/cve/CVE-2015-7975/" source="CVE"/>
		<reference ref_id="CVE-2015-7976" ref_url="https://www.suse.com/security/cve/CVE-2015-7976/" source="CVE"/>
		<reference ref_id="CVE-2015-7977" ref_url="https://www.suse.com/security/cve/CVE-2015-7977/" source="CVE"/>
		<reference ref_id="CVE-2015-7978" ref_url="https://www.suse.com/security/cve/CVE-2015-7978/" source="CVE"/>
		<reference ref_id="CVE-2015-7979" ref_url="https://www.suse.com/security/cve/CVE-2015-7979/" source="CVE"/>
		<reference ref_id="CVE-2015-8138" ref_url="https://www.suse.com/security/cve/CVE-2015-8138/" source="CVE"/>
		<reference ref_id="CVE-2015-8139" ref_url="https://www.suse.com/security/cve/CVE-2015-8139/" source="CVE"/>
		<reference ref_id="CVE-2015-8140" ref_url="https://www.suse.com/security/cve/CVE-2015-8140/" source="CVE"/>
		<reference ref_id="CVE-2015-8158" ref_url="https://www.suse.com/security/cve/CVE-2015-8158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002032.html" source="SUSE-SU"/>
		<description>
ntp was updated to version 4.2.8p6 to fix 12 security issues.

These security issues were fixed:
- CVE-2015-8158: Fixed potential infinite loop in ntpq (bsc#962966).
- CVE-2015-8138: Zero Origin Timestamp Bypass (bsc#963002).
- CVE-2015-7979: Off-path Denial of Service (DoS) attack on authenticated broadcast mode (bsc#962784).
- CVE-2015-7978: Stack exhaustion in recursive traversal of restriction list (bsc#963000).
- CVE-2015-7977: reslist NULL pointer dereference (bsc#962970).
- CVE-2015-7976: ntpq saveconfig command allows dangerous characters in filenames (bsc#962802).
- CVE-2015-7975: nextvar() missing length check (bsc#962988).
- CVE-2015-7974: Skeleton Key: Missing key check allows impersonation between authenticated peers (bsc#962960).
- CVE-2015-7973: Replay attack on authenticated broadcast mode (bsc#962995).
- CVE-2015-8140: ntpq vulnerable to replay attacks (bsc#962994).
- CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin (bsc#962997).
- CVE-2015-5300: MITM attacker could have forced ntpd to make a step larger than the panic threshold (bsc#951629).

These non-security issues were fixed:
- fate#320758 bsc#975981: Enable compile-time support for MS-SNTP
  (--enable-ntp-signd).  This replaces the w32 patches in 4.2.4 that added
  the authreg directive.
- bsc#962318: Call /usr/sbin/sntp with full path to synchronize in start-ntpd.
  When run as cron job, /usr/sbin/ is not in the path, which caused
  the synchronization to fail.
- bsc#782060: Speedup ntpq.
- bsc#916617: Add /var/db/ntp-kod.
- bsc#956773: Add ntp-ENOBUFS.patch to limit a warning that might happen quite a lot on loaded systems.
- bsc#951559,bsc#975496: Fix the TZ offset output of sntp during DST.
- Add ntp-fork.patch and build with threads disabled to allow name resolution even when running chrooted.
- bsc#784760: Remove local clock from default configuration
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-28"/>
	<updated date="2016-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/782060">SUSE bug 782060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784760">SUSE bug 784760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916617">SUSE bug 916617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951559">SUSE bug 951559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951629">SUSE bug 951629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956773">SUSE bug 956773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962318">SUSE bug 962318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962784">SUSE bug 962784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962802">SUSE bug 962802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962960">SUSE bug 962960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962966">SUSE bug 962966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962970">SUSE bug 962970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962988">SUSE bug 962988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962994">SUSE bug 962994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962997">SUSE bug 962997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963000">SUSE bug 963000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963002">SUSE bug 963002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975496">SUSE bug 975496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975981">SUSE bug 975981</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5300/">CVE-2015-5300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5300">CVE-2015-5300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7973/">CVE-2015-7973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7973">CVE-2015-7973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7974">CVE-2015-7974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7975/">CVE-2015-7975 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7975">CVE-2015-7975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7976/">CVE-2015-7976 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7976">CVE-2015-7976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7977/">CVE-2015-7977 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7977">CVE-2015-7977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7978/">CVE-2015-7978 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7978">CVE-2015-7978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7979/">CVE-2015-7979 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7979">CVE-2015-7979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8138/">CVE-2015-8138 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8138">CVE-2015-8138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8139/">CVE-2015-8139 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8139">CVE-2015-8139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8140/">CVE-2015-8140 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8140">CVE-2015-8140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8158/">CVE-2015-8158 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8158">CVE-2015-8158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584323" comment="ntp-4.2.8p6-8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584324" comment="ntp-doc-4.2.8p6-8.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584323" comment="ntp-4.2.8p6-8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584324" comment="ntp-doc-4.2.8p6-8.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220245" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="957226" ref_url="https://bugzilla.suse.com/957226" source="BUGZILLA"/>
		<reference ref_id="977446" ref_url="https://bugzilla.suse.com/977446" source="BUGZILLA"/>
		<reference ref_id="977450" ref_url="https://bugzilla.suse.com/977450" source="BUGZILLA"/>
		<reference ref_id="977451" ref_url="https://bugzilla.suse.com/977451" source="BUGZILLA"/>
		<reference ref_id="977452" ref_url="https://bugzilla.suse.com/977452" source="BUGZILLA"/>
		<reference ref_id="977455" ref_url="https://bugzilla.suse.com/977455" source="BUGZILLA"/>
		<reference ref_id="977457" ref_url="https://bugzilla.suse.com/977457" source="BUGZILLA"/>
		<reference ref_id="977458" ref_url="https://bugzilla.suse.com/977458" source="BUGZILLA"/>
		<reference ref_id="977459" ref_url="https://bugzilla.suse.com/977459" source="BUGZILLA"/>
		<reference ref_id="977461" ref_url="https://bugzilla.suse.com/977461" source="BUGZILLA"/>
		<reference ref_id="977464" ref_url="https://bugzilla.suse.com/977464" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<reference ref_id="CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705/" source="CVE"/>
		<reference ref_id="CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974/" source="CVE"/>
		<reference ref_id="CVE-2016-1547" ref_url="https://www.suse.com/security/cve/CVE-2016-1547/" source="CVE"/>
		<reference ref_id="CVE-2016-1548" ref_url="https://www.suse.com/security/cve/CVE-2016-1548/" source="CVE"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2016-1550" ref_url="https://www.suse.com/security/cve/CVE-2016-1550/" source="CVE"/>
		<reference ref_id="CVE-2016-1551" ref_url="https://www.suse.com/security/cve/CVE-2016-1551/" source="CVE"/>
		<reference ref_id="CVE-2016-2516" ref_url="https://www.suse.com/security/cve/CVE-2016-2516/" source="CVE"/>
		<reference ref_id="CVE-2016-2517" ref_url="https://www.suse.com/security/cve/CVE-2016-2517/" source="CVE"/>
		<reference ref_id="CVE-2016-2518" ref_url="https://www.suse.com/security/cve/CVE-2016-2518/" source="CVE"/>
		<reference ref_id="CVE-2016-2519" ref_url="https://www.suse.com/security/cve/CVE-2016-2519/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002054.html" source="SUSE-SU"/>
		<description>

This update for ntp to 4.2.8p7 fixes the following issues:

* CVE-2016-1547, bsc#977459:
  Validate crypto-NAKs, AKA: CRYPTO-NAK DoS.
* CVE-2016-1548, bsc#977461: Interleave-pivot
* CVE-2016-1549, bsc#977451:
  Sybil vulnerability: ephemeral association attack.
* CVE-2016-1550, bsc#977464: Improve NTP security against buffer
  comparison timing attacks.
* CVE-2016-1551, bsc#977450:
  Refclock impersonation vulnerability
* CVE-2016-2516, bsc#977452: Duplicate IPs on unconfig
  directives will cause an assertion botch in ntpd.
* CVE-2016-2517, bsc#977455: remote configuration trustedkey/
  requestkey/controlkey values are not properly validated.
* CVE-2016-2518, bsc#977457: Crafted addpeer with hmode &gt; 7
  causes array wraparound with MATCH_ASSOC.
* CVE-2016-2519, bsc#977458: ctl_getitem() return value not
  always checked.
* This update also improves the fixes for:
  CVE-2015-7704, CVE-2015-7705, CVE-2015-7974

Bugs fixed:
- Restrict the parser in the startup script to the first
  occurrance of 'keys' and 'controlkey' in ntp.conf (bsc#957226).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-11"/>
	<updated date="2016-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/957226">SUSE bug 957226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977450">SUSE bug 977450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977451">SUSE bug 977451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977452">SUSE bug 977452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977455">SUSE bug 977455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977457">SUSE bug 977457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977458">SUSE bug 977458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977459">SUSE bug 977459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977461">SUSE bug 977461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977464">SUSE bug 977464</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7704">CVE-2015-7704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7705">CVE-2015-7705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7974">CVE-2015-7974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1547/">CVE-2016-1547 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1547">CVE-2016-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1548/">CVE-2016-1548 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1548">CVE-2016-1548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1549">CVE-2016-1549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1550/">CVE-2016-1550 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1550">CVE-2016-1550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1551/">CVE-2016-1551 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1551">CVE-2016-1551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2516/">CVE-2016-2516 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2516">CVE-2016-2516 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2517/">CVE-2016-2517 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2517">CVE-2016-2517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2518/">CVE-2016-2518 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2518">CVE-2016-2518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2519/">CVE-2016-2519 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2519">CVE-2016-2519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584325" comment="ntp-4.2.8p7-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584326" comment="ntp-doc-4.2.8p7-11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584325" comment="ntp-4.2.8p7-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584326" comment="ntp-doc-4.2.8p7-11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220246" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="979302" ref_url="https://bugzilla.suse.com/979302" source="BUGZILLA"/>
		<reference ref_id="981422" ref_url="https://bugzilla.suse.com/981422" source="BUGZILLA"/>
		<reference ref_id="982056" ref_url="https://bugzilla.suse.com/982056" source="BUGZILLA"/>
		<reference ref_id="982064" ref_url="https://bugzilla.suse.com/982064" source="BUGZILLA"/>
		<reference ref_id="982065" ref_url="https://bugzilla.suse.com/982065" source="BUGZILLA"/>
		<reference ref_id="982066" ref_url="https://bugzilla.suse.com/982066" source="BUGZILLA"/>
		<reference ref_id="982067" ref_url="https://bugzilla.suse.com/982067" source="BUGZILLA"/>
		<reference ref_id="982068" ref_url="https://bugzilla.suse.com/982068" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4953" ref_url="https://www.suse.com/security/cve/CVE-2016-4953/" source="CVE"/>
		<reference ref_id="CVE-2016-4954" ref_url="https://www.suse.com/security/cve/CVE-2016-4954/" source="CVE"/>
		<reference ref_id="CVE-2016-4955" ref_url="https://www.suse.com/security/cve/CVE-2016-4955/" source="CVE"/>
		<reference ref_id="CVE-2016-4956" ref_url="https://www.suse.com/security/cve/CVE-2016-4956/" source="CVE"/>
		<reference ref_id="CVE-2016-4957" ref_url="https://www.suse.com/security/cve/CVE-2016-4957/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002116.html" source="SUSE-SU"/>
		<description>
ntp was updated to version 4.2.8p8 to fix five security issues.

These security issues were fixed:
- CVE-2016-4953: Bad authentication demobilizes ephemeral associations (bsc#982065).
- CVE-2016-4954: Processing spoofed server packets (bsc#982066).
- CVE-2016-4955: Autokey association reset (bsc#982067).
- CVE-2016-4956: Broadcast interleave (bsc#982068).
- CVE-2016-4957: CRYPTO_NAK crash (bsc#982064).

These non-security issues were fixed:
- Keep the parent process alive until the daemon has finished initialisation, to make sure that the PID file exists when the parent returns.
- bsc#979302: Change the process name of the forking DNS worker process to avoid the impression that ntpd is started twice.
- bsc#981422: Don't ignore SIGCHILD because it breaks wait().
- Separate the creation of ntp.keys and key #1 in it to avoid problems when upgrading installations that have the file, but no key #1, which is needed e.g. by 'rcntp addserver'.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-15"/>
	<updated date="2016-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979302">SUSE bug 979302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981422">SUSE bug 981422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982056">SUSE bug 982056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982064">SUSE bug 982064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982065">SUSE bug 982065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982066">SUSE bug 982066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982067">SUSE bug 982067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982068">SUSE bug 982068</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4953/">CVE-2016-4953 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4953">CVE-2016-4953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4954/">CVE-2016-4954 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4954">CVE-2016-4954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4955/">CVE-2016-4955 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4955">CVE-2016-4955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4956/">CVE-2016-4956 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4956">CVE-2016-4956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4957/">CVE-2016-4957 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4957">CVE-2016-4957 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584327" comment="ntp-4.2.8p8-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584328" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584327" comment="ntp-4.2.8p8-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584328" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220247" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="929414" ref_url="https://bugzilla.suse.com/929414" source="BUGZILLA"/>
		<reference ref_id="961491" ref_url="https://bugzilla.suse.com/961491" source="BUGZILLA"/>
		<reference ref_id="982779" ref_url="https://bugzilla.suse.com/982779" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-4008" ref_url="https://www.suse.com/security/cve/CVE-2016-4008/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002120.html" source="SUSE-SU"/>
		<description>
This update for libtasn1 fixes the following issues:

- Malformed asn1 definitions could have caused a segmentation fault in the asn1 definition parser (bsc#961491)
- CVE-2015-3622: Fixed invalid read in octet string decoding (bsc#929414)
- CVE-2016-4008: Fixed infinite loop while parsing DER certificates (bsc#982779)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-16"/>
	<updated date="2016-06-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/929414">SUSE bug 929414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961491">SUSE bug 961491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982779">SUSE bug 982779</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3622">CVE-2015-3622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4008/">CVE-2016-4008 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4008">CVE-2016-4008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584329" comment="libtasn1-1.5-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584330" comment="libtasn1-3-1.5-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584331" comment="libtasn1-3-32bit-1.5-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584332" comment="libtasn1-3-x86-1.5-1.34.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584329" comment="libtasn1-1.5-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584330" comment="libtasn1-3-1.5-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584331" comment="libtasn1-3-32bit-1.5-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584332" comment="libtasn1-3-x86-1.5-1.34.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220248" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1009434" ref_url="https://bugzilla.suse.com/1009434" source="BUGZILLA"/>
		<reference ref_id="1011377" ref_url="https://bugzilla.suse.com/1011377" source="BUGZILLA"/>
		<reference ref_id="1011390" ref_url="https://bugzilla.suse.com/1011390" source="BUGZILLA"/>
		<reference ref_id="1011395" ref_url="https://bugzilla.suse.com/1011395" source="BUGZILLA"/>
		<reference ref_id="1011398" ref_url="https://bugzilla.suse.com/1011398" source="BUGZILLA"/>
		<reference ref_id="1011404" ref_url="https://bugzilla.suse.com/1011404" source="BUGZILLA"/>
		<reference ref_id="1011406" ref_url="https://bugzilla.suse.com/1011406" source="BUGZILLA"/>
		<reference ref_id="1011411" ref_url="https://bugzilla.suse.com/1011411" source="BUGZILLA"/>
		<reference ref_id="1011417" ref_url="https://bugzilla.suse.com/1011417" source="BUGZILLA"/>
		<reference ref_id="943216" ref_url="https://bugzilla.suse.com/943216" source="BUGZILLA"/>
		<reference ref_id="956365" ref_url="https://bugzilla.suse.com/956365" source="BUGZILLA"/>
		<reference ref_id="981252" ref_url="https://bugzilla.suse.com/981252" source="BUGZILLA"/>
		<reference ref_id="988028" ref_url="https://bugzilla.suse.com/988028" source="BUGZILLA"/>
		<reference ref_id="992038" ref_url="https://bugzilla.suse.com/992038" source="BUGZILLA"/>
		<reference ref_id="992606" ref_url="https://bugzilla.suse.com/992606" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5219" ref_url="https://www.suse.com/security/cve/CVE-2015-5219/" source="CVE"/>
		<reference ref_id="CVE-2015-8139" ref_url="https://www.suse.com/security/cve/CVE-2015-8139/" source="CVE"/>
		<reference ref_id="CVE-2015-8140" ref_url="https://www.suse.com/security/cve/CVE-2015-8140/" source="CVE"/>
		<reference ref_id="CVE-2016-7426" ref_url="https://www.suse.com/security/cve/CVE-2016-7426/" source="CVE"/>
		<reference ref_id="CVE-2016-7427" ref_url="https://www.suse.com/security/cve/CVE-2016-7427/" source="CVE"/>
		<reference ref_id="CVE-2016-7428" ref_url="https://www.suse.com/security/cve/CVE-2016-7428/" source="CVE"/>
		<reference ref_id="CVE-2016-7429" ref_url="https://www.suse.com/security/cve/CVE-2016-7429/" source="CVE"/>
		<reference ref_id="CVE-2016-7431" ref_url="https://www.suse.com/security/cve/CVE-2016-7431/" source="CVE"/>
		<reference ref_id="CVE-2016-7433" ref_url="https://www.suse.com/security/cve/CVE-2016-7433/" source="CVE"/>
		<reference ref_id="CVE-2016-7434" ref_url="https://www.suse.com/security/cve/CVE-2016-7434/" source="CVE"/>
		<reference ref_id="CVE-2016-9310" ref_url="https://www.suse.com/security/cve/CVE-2016-9310/" source="CVE"/>
		<reference ref_id="CVE-2016-9311" ref_url="https://www.suse.com/security/cve/CVE-2016-9311/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<description>

This update for ntp fixes the following issues:

- Simplify ntpd's search for its own executable to prevent AppArmor
  warnings (bsc#956365).

Security issues fixed (update to 4.2.8p9):

- CVE-2016-9311, CVE-2016-9310, bsc#1011377: Mode 6
  unauthenticated trap information disclosure and DDoS vector.
- CVE-2016-7427, bsc#1011390:
  Broadcast Mode Replay Prevention DoS.
- CVE-2016-7428, bsc#1011417:
  Broadcast Mode Poll Interval Enforcement DoS.
- CVE-2016-7431, bsc#1011395:
  Regression: 010-origin: Zero Origin Timestamp Bypass.
- CVE-2016-7434, bsc#1011398:
  Null pointer dereference in _IO_str_init_static_internal().
- CVE-2016-7429, bsc#1011404: Interface selection attack.
- CVE-2016-7426, bsc#1011406:
  Client rate limiting and server responses.
- CVE-2016-7433, bsc#1011411: Reboot sync calculation problem.
- CVE-2015-5219: An endless loop due to incorrect precision to
  double conversion (bsc#943216).
- CVE-2015-8140: ntpq vulnerable to replay attacks.
- CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin.
- CVE-2015-5219: An endless loop due to incorrect precision to
  double conversion (bsc#943216).

Non-security issues fixed:

- Fix a spurious error message.
- Other bugfixes, see /usr/share/doc/packages/ntp/ChangeLog.
- Fix a regression in 'trap' (bsc#981252).
- Reduce the number of netlink groups to listen on for changes to
  the local network setup (bsc#992606).
- Fix segfault in 'sntp -a' (bsc#1009434).
- Silence an OpenSSL version warning (bsc#992038).
- Make the resolver task change user and group IDs to the same
  values as the main task. (bsc#988028)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-19"/>
	<updated date="2016-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009434">SUSE bug 1009434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011377">SUSE bug 1011377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011390">SUSE bug 1011390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011395">SUSE bug 1011395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011398">SUSE bug 1011398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011404">SUSE bug 1011404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011406">SUSE bug 1011406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011411">SUSE bug 1011411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011417">SUSE bug 1011417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956365">SUSE bug 956365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981252">SUSE bug 981252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988028">SUSE bug 988028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992038">SUSE bug 992038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992606">SUSE bug 992606</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5219/">CVE-2015-5219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5219">CVE-2015-5219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8139/">CVE-2015-8139 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8139">CVE-2015-8139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8140/">CVE-2015-8140 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8140">CVE-2015-8140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7426/">CVE-2016-7426 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7426">CVE-2016-7426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7427/">CVE-2016-7427 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7427">CVE-2016-7427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7428/">CVE-2016-7428 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7428">CVE-2016-7428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7429/">CVE-2016-7429 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7429">CVE-2016-7429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7431/">CVE-2016-7431 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7431">CVE-2016-7431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7433/">CVE-2016-7433 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7433">CVE-2016-7433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7434/">CVE-2016-7434 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7434">CVE-2016-7434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9310/">CVE-2016-9310 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9310">CVE-2016-9310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9311/">CVE-2016-9311 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9311">CVE-2016-9311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584333" comment="ntp-4.2.8p9-57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584334" comment="ntp-doc-4.2.8p9-57.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584333" comment="ntp-4.2.8p9-57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584334" comment="ntp-doc-4.2.8p9-57.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220249" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1014172" ref_url="https://bugzilla.suse.com/1014172" source="BUGZILLA"/>
		<reference ref_id="1030050" ref_url="https://bugzilla.suse.com/1030050" source="BUGZILLA"/>
		<reference ref_id="1031085" ref_url="https://bugzilla.suse.com/1031085" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9042" ref_url="https://www.suse.com/security/cve/CVE-2016-9042/" source="CVE"/>
		<reference ref_id="CVE-2017-6451" ref_url="https://www.suse.com/security/cve/CVE-2017-6451/" source="CVE"/>
		<reference ref_id="CVE-2017-6458" ref_url="https://www.suse.com/security/cve/CVE-2017-6458/" source="CVE"/>
		<reference ref_id="CVE-2017-6460" ref_url="https://www.suse.com/security/cve/CVE-2017-6460/" source="CVE"/>
		<reference ref_id="CVE-2017-6462" ref_url="https://www.suse.com/security/cve/CVE-2017-6462/" source="CVE"/>
		<reference ref_id="CVE-2017-6463" ref_url="https://www.suse.com/security/cve/CVE-2017-6463/" source="CVE"/>
		<reference ref_id="CVE-2017-6464" ref_url="https://www.suse.com/security/cve/CVE-2017-6464/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002813.html" source="SUSE-SU"/>
		<description>

This ntp update to version 4.2.8p10 fixes the following issues:

Security issues fixed (bsc#1030050):
- CVE-2017-6464: Denial of Service via Malformed Config
- CVE-2017-6462: Buffer Overflow in DPTS Clock
- CVE-2017-6463: Authenticated DoS via Malicious Config Option
- CVE-2017-6458: Potential Overflows in ctl_put() functions
- CVE-2017-6451: Improper use of snprintf() in mx4200_send()
- CVE-2017-6460: Buffer Overflow in ntpq when fetching reslist
- CVE-2016-9042: 0rigin (zero origin) DoS.
- ntpq_stripquotes() returns incorrect Value
- ereallocarray()/eallocarray() underused
- Copious amounts of Unused Code
- Off-by-one in Oncore GPS Receiver
- Makefile does not enforce Security Flags

Bugfixes:
- Remove spurious log messages (bsc#1014172).
- Fixing ppc and ppc64 linker issue (bsc#1031085).
- clang scan-build findings
- Support for openssl-1.1.0 without compatibility modes
- Bugfix 3072 breaks multicastclient
- forking async worker: interrupted pipe I/O
- (...) time_pps_create: Exec format error
- Incorrect Logic for Peer Event Limiting
- Change the process name of forked DNS worker
- Trap Configuration Fail
- Nothing happens if minsane &lt; maxclock &lt; minclock
- allow -4/-6 on restrict line with mask
- out-of-bound pointers in ctl_putsys and decode_bitflags
- Move ntp-kod to /var/lib/ntp, because /var/db is not a standard directory and causes problems for
  transactional updates.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1014172">SUSE bug 1014172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031085">SUSE bug 1031085</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9042/">CVE-2016-9042 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9042">CVE-2016-9042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6451/">CVE-2017-6451 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6451">CVE-2017-6451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6458/">CVE-2017-6458 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6458">CVE-2017-6458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6460/">CVE-2017-6460 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6460">CVE-2017-6460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6462/">CVE-2017-6462 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6462">CVE-2017-6462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6463/">CVE-2017-6463 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6463">CVE-2017-6463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6464/">CVE-2017-6464 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6464">CVE-2017-6464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584335" comment="ntp-4.2.8p10-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584336" comment="ntp-doc-4.2.8p10-63.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584335" comment="ntp-4.2.8p10-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584336" comment="ntp-doc-4.2.8p10-63.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220250" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1077445" ref_url="https://bugzilla.suse.com/1077445" source="BUGZILLA"/>
		<reference ref_id="1082210" ref_url="https://bugzilla.suse.com/1082210" source="BUGZILLA"/>
		<reference ref_id="1083417" ref_url="https://bugzilla.suse.com/1083417" source="BUGZILLA"/>
		<reference ref_id="1083420" ref_url="https://bugzilla.suse.com/1083420" source="BUGZILLA"/>
		<reference ref_id="1083422" ref_url="https://bugzilla.suse.com/1083422" source="BUGZILLA"/>
		<reference ref_id="1083424" ref_url="https://bugzilla.suse.com/1083424" source="BUGZILLA"/>
		<reference ref_id="1083426" ref_url="https://bugzilla.suse.com/1083426" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<reference ref_id="CVE-2018-7182" ref_url="https://www.suse.com/security/cve/CVE-2018-7182/" source="CVE"/>
		<reference ref_id="CVE-2018-7183" ref_url="https://www.suse.com/security/cve/CVE-2018-7183/" source="CVE"/>
		<reference ref_id="CVE-2018-7184" ref_url="https://www.suse.com/security/cve/CVE-2018-7184/" source="CVE"/>
		<reference ref_id="CVE-2018-7185" ref_url="https://www.suse.com/security/cve/CVE-2018-7185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003839.html" source="SUSE-SU"/>
		<description>
This update for ntp fixes the following issues:

Security issues fixed:

- CVE-2016-1549: Significant additional protections against CVE-2016-1549 that was fixed in ntp-4.2.8p7 (bsc#1082210).
- CVE-2018-7170: Ephemeral association time spoofing additional protection (bsc#1083424).
- CVE-2018-7182: Buffer read overrun leads information leak in ctl_getitem() (bsc#1083426).
- CVE-2018-7183: decodearr() can write beyond its buffer limit (bsc#1083417).
- CVE-2018-7184: Interleaved symmetric mode cannot recover from bad state (bsc#1083422).
- CVE-2018-7185: Unauthenticated packet can reset authenticated interleaved association (bsc#1083420).

Bug fixes:

- bsc#1077445: Don't use libevent's cached time stamps in sntp.
- Disable CMAC in ntp when building against a version of OpenSSL that doesn't support it.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-26"/>
	<updated date="2018-03-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077445">SUSE bug 1077445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082210">SUSE bug 1082210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083417">SUSE bug 1083417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083420">SUSE bug 1083420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083422">SUSE bug 1083422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083426">SUSE bug 1083426</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1549">CVE-2016-1549 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7170">CVE-2018-7170 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7182/">CVE-2018-7182 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7182">CVE-2018-7182 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-7183/">CVE-2018-7183 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7183">CVE-2018-7183 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7184/">CVE-2018-7184 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7184">CVE-2018-7184 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7185/">CVE-2018-7185 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7185">CVE-2018-7185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584337" comment="ntp-4.2.8p11-64.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584338" comment="ntp-doc-4.2.8p11-64.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584337" comment="ntp-4.2.8p11-64.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584338" comment="ntp-doc-4.2.8p11-64.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220251" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1083424" ref_url="https://bugzilla.suse.com/1083424" source="BUGZILLA"/>
		<reference ref_id="1098531" ref_url="https://bugzilla.suse.com/1098531" source="BUGZILLA"/>
		<reference ref_id="1111853" ref_url="https://bugzilla.suse.com/1111853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12327" ref_url="https://www.suse.com/security/cve/CVE-2018-12327/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004775.html" source="SUSE-SU"/>
		<description>

NTP was updated to 4.2.8p12 (bsc#1111853):

- CVE-2018-12327: Fixed stack buffer overflow in the openhost() command-line call of NTPQ/NTPDC. (bsc#1098531)
- CVE-2018-7170: Add further tweaks to improve the fix for the ephemeral association time spoofing additional protection (bsc#1083424)

Please also see https://www.nwtime.org/network-time-foundation-publishes-ntp-4-2-8p12/ for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098531">SUSE bug 1098531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111853">SUSE bug 1111853</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12327/">CVE-2018-12327 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12327">CVE-2018-12327 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7170">CVE-2018-7170 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584339" comment="ntp-4.2.8p12-64.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584340" comment="ntp-doc-4.2.8p12-64.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584339" comment="ntp-4.2.8p12-64.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584340" comment="ntp-doc-4.2.8p12-64.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220252" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1001182" ref_url="https://bugzilla.suse.com/1001182" source="BUGZILLA"/>
		<reference ref_id="1128525" ref_url="https://bugzilla.suse.com/1128525" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8936" ref_url="https://www.suse.com/security/cve/CVE-2019-8936/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005255.html" source="SUSE-SU"/>
		<description>
This update for ntp fixes the following issues:

Security issue fixed: 	  

- CVE-2019-8936: Fixed a null pointer exception which could allow an authenticated attcker to cause 
  segmentation fault to ntpd (bsc#1128525).

Other issues addressed:

- Make sure that SLE12 version is higher than the one in SLE11 (bsc#1001182). 
- Fixed several bugs in the BANCOMM reclock driver.
- Fixed ntp_loopfilter.c snprintf compilation warnings.
- Fixed spurious initgroups() error message.
- Fixed STA_NANO struct timex units.
- Fixed GPS week rollover in libparse.
- Fixed incorrect poll interval in packet.
- Added a missing check for ENABLE_CMAC.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1001182">SUSE bug 1001182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128525">SUSE bug 1128525</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8936/">CVE-2019-8936 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8936">CVE-2019-8936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584341" comment="ntp-4.2.8p13-64.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584342" comment="ntp-doc-4.2.8p13-64.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584341" comment="ntp-4.2.8p13-64.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584342" comment="ntp-doc-4.2.8p13-64.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220253" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1169740" ref_url="https://bugzilla.suse.com/1169740" source="BUGZILLA"/>
		<reference ref_id="1171355" ref_url="https://bugzilla.suse.com/1171355" source="BUGZILLA"/>
		<reference ref_id="1172651" ref_url="https://bugzilla.suse.com/1172651" source="BUGZILLA"/>
		<reference ref_id="1173334" ref_url="https://bugzilla.suse.com/1173334" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8956" ref_url="https://www.suse.com/security/cve/CVE-2018-8956/" source="CVE"/>
		<reference ref_id="CVE-2020-11868" ref_url="https://www.suse.com/security/cve/CVE-2020-11868/" source="CVE"/>
		<reference ref_id="CVE-2020-13817" ref_url="https://www.suse.com/security/cve/CVE-2020-13817/" source="CVE"/>
		<reference ref_id="CVE-2020-15025" ref_url="https://www.suse.com/security/cve/CVE-2020-15025/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007061.html" source="SUSE-SU"/>
		<description>
This update for ntp fixes the following issues:

ntp was updated to 4.2.8p15

- CVE-2020-11868: Fixed an issue which a server mode packet with spoofed source address 
  frequently send to the client ntpd could have caused denial of service (bsc#1169740).
- CVE-2018-8956: Fixed an issue which could have allowed remote attackers to prevent 
  a broadcast client from synchronizing its clock with a broadcast NTP server via spoofed 
  mode 3 and mode 5 packets (bsc#1171355).
- CVE-2020-13817: Fixed an issue which an off-path attacker with the ability to query time 
  from victim's ntpd instance could have modified the victim's clock by a limited amount (bsc#1172651).
- CVE-2020-15025: Fixed an issue which remote attacker could have caused denial of service by consuming 
  the memory when a CMAC key was used andassociated with a CMAC algorithm in the ntp.keys (bsc#1173334).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-01"/>
	<updated date="2020-07-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169740">SUSE bug 1169740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171355">SUSE bug 1171355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172651">SUSE bug 1172651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173334">SUSE bug 1173334</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8956/">CVE-2018-8956 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8956">CVE-2018-8956 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11868/">CVE-2020-11868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11868">CVE-2020-11868 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13817/">CVE-2020-13817 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13817">CVE-2020-13817 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15025/">CVE-2020-15025 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15025">CVE-2020-15025 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584343" comment="ntp-4.2.8p15-64.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584344" comment="ntp-doc-4.2.8p15-64.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220254" version="1" class="patch">
	<metadata>
		<title>Security update for open-vm-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1006796" ref_url="https://bugzilla.suse.com/1006796" source="BUGZILLA"/>
		<reference ref_id="1007600" ref_url="https://bugzilla.suse.com/1007600" source="BUGZILLA"/>
		<reference ref_id="1011057" ref_url="https://bugzilla.suse.com/1011057" source="BUGZILLA"/>
		<reference ref_id="1013496" ref_url="https://bugzilla.suse.com/1013496" source="BUGZILLA"/>
		<reference ref_id="1024202" ref_url="https://bugzilla.suse.com/1024202" source="BUGZILLA"/>
		<reference ref_id="913727" ref_url="https://bugzilla.suse.com/913727" source="BUGZILLA"/>
		<reference ref_id="938593" ref_url="https://bugzilla.suse.com/938593" source="BUGZILLA"/>
		<reference ref_id="941384" ref_url="https://bugzilla.suse.com/941384" source="BUGZILLA"/>
		<reference ref_id="944615" ref_url="https://bugzilla.suse.com/944615" source="BUGZILLA"/>
		<reference ref_id="952645" ref_url="https://bugzilla.suse.com/952645" source="BUGZILLA"/>
		<reference ref_id="971031" ref_url="https://bugzilla.suse.com/971031" source="BUGZILLA"/>
		<reference ref_id="978424" ref_url="https://bugzilla.suse.com/978424" source="BUGZILLA"/>
		<reference ref_id="985110" ref_url="https://bugzilla.suse.com/985110" source="BUGZILLA"/>
		<reference ref_id="994598" ref_url="https://bugzilla.suse.com/994598" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5191" ref_url="https://www.suse.com/security/cve/CVE-2015-5191/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002699.html" source="SUSE-SU"/>
		<description>

This update for open-vm-tools to 10.1.0 stable brings features, fixes bugs
and security issues:

- New vmware-namespace-cmd command line utility
- GTK3 support
- Common Agent Framework (CAF)
- Guest authentication with xmlsec1
- Sub-command to push updated network information to the host on demand
- Fix for quiesced snapshot failure leaving guest file system quiesced (bsc#1006796)
- Fix for CVE-2015-5191 (bsc#1007600)
- Report SLES for SAP 12 guest OS as SLES 12 (bsc#1013496)
- Add udev rule to increase VMware virtual disk timeout values (bsc#994598) 
- Fix vmtoolsd init script to run vmtoolsd in background (bsc#971031)
- Fix copy-n-paste and drag-n-drop regressions (bsc#978424)
- Add new vmblock-fuse.service
- Fix a suspend with systemd issue (bsc#913727)
- ESXi Serviceability
- GuestInfo Enhancements
- Compatibility with all supported versions of VMware vSphere, VMware Workstation 12.0
  and VMware Fusion 8.0.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-15"/>
	<updated date="2017-03-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1006796">SUSE bug 1006796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007600">SUSE bug 1007600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011057">SUSE bug 1011057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013496">SUSE bug 1013496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024202">SUSE bug 1024202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913727">SUSE bug 913727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938593">SUSE bug 938593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941384">SUSE bug 941384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944615">SUSE bug 944615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952645">SUSE bug 952645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971031">SUSE bug 971031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978424">SUSE bug 978424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985110">SUSE bug 985110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994598">SUSE bug 994598</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5191/">CVE-2015-5191 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5191">CVE-2015-5191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584345" comment="libvmtools0-10.1.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584346" comment="open-vm-tools-10.1.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584347" comment="open-vm-tools-desktop-10.1.0-7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584345" comment="libvmtools0-10.1.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584346" comment="open-vm-tools-10.1.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584347" comment="open-vm-tools-desktop-10.1.0-7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220255" version="1" class="patch">
	<metadata>
		<title>Recommended update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="924496" ref_url="https://bugzilla.suse.com/924496" source="BUGZILLA"/>
		<reference ref_id="932773" ref_url="https://bugzilla.suse.com/932773" source="BUGZILLA"/>
		<reference ref_id="937766" ref_url="https://bugzilla.suse.com/937766" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001568.html" source="SUSE-SU"/>
		<description>
openldap2 was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-4000: The Logjam Attack / weakdh.org (bsc#937766).

This non-security issue was fixed:
- bsc#932773: ldapmodify failed with DOS format LDIF files containing '-' separator.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-29"/>
	<updated date="2015-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924496">SUSE bug 924496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932773">SUSE bug 932773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937766">SUSE bug 937766</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579190" comment="compat-libldap-2_3-0-2.3.37-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579191" comment="libldap-2_4-2-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579192" comment="libldap-2_4-2-32bit-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579193" comment="libldap-2_4-2-x86-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579194" comment="openldap2-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579195" comment="openldap2-back-meta-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579196" comment="openldap2-client-2.4.26-0.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579190" comment="compat-libldap-2_3-0-2.3.37-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579191" comment="libldap-2_4-2-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579192" comment="libldap-2_4-2-32bit-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579193" comment="libldap-2_4-2-x86-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579194" comment="openldap2-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579195" comment="openldap2-back-meta-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579196" comment="openldap2-client-2.4.26-0.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220256" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1170771" ref_url="https://bugzilla.suse.com/1170771" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12243" ref_url="https://www.suse.com/security/cve/CVE-2020-12243/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006801.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-12243: Fixed a denial of service related to recursive filters (bsc#1170771).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170771">SUSE bug 1170771</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12243/">CVE-2020-12243 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12243">CVE-2020-12243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584348" comment="compat-libldap-2_3-0-2.3.37-2.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584349" comment="libldap-2_4-2-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584350" comment="libldap-2_4-2-32bit-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584351" comment="openldap2-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584352" comment="openldap2-back-meta-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584353" comment="openldap2-client-2.4.26-0.74.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220257" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1172698" ref_url="https://bugzilla.suse.com/1172698" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8023" ref_url="https://www.suse.com/security/cve/CVE-2020-8023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007083.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-8023: Fixed a potential local privilege escalation from ldap to root when OPENLDAP_CONFIG_BACKEND='ldap' was used (bsc#1172698).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172698">SUSE bug 1172698</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8023/">CVE-2020-8023 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8023">CVE-2020-8023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584354" comment="compat-libldap-2_3-0-2.3.37-2.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584355" comment="libldap-2_4-2-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584356" comment="libldap-2_4-2-32bit-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584357" comment="openldap2-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584358" comment="openldap2-back-meta-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584359" comment="openldap2-client-2.4.26-0.74.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220258" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1178387" ref_url="https://bugzilla.suse.com/1178387" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007759.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-25692: Fixed an unauthenticated remote denial of service due to incorrect validation of modrdn equality rules (bsc#1178387).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178387">SUSE bug 1178387</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25692">CVE-2020-25692 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584360" comment="compat-libldap-2_3-0-2.3.37-2.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584361" comment="libldap-2_4-2-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584362" comment="libldap-2_4-2-32bit-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584363" comment="openldap2-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584364" comment="openldap2-back-meta-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584365" comment="openldap2-client-2.4.26-0.74.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220259" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1182279" ref_url="https://bugzilla.suse.com/1182279" source="BUGZILLA"/>
		<reference ref_id="1182408" ref_url="https://bugzilla.suse.com/1182408" source="BUGZILLA"/>
		<reference ref_id="1182411" ref_url="https://bugzilla.suse.com/1182411" source="BUGZILLA"/>
		<reference ref_id="1182412" ref_url="https://bugzilla.suse.com/1182412" source="BUGZILLA"/>
		<reference ref_id="1182413" ref_url="https://bugzilla.suse.com/1182413" source="BUGZILLA"/>
		<reference ref_id="1182415" ref_url="https://bugzilla.suse.com/1182415" source="BUGZILLA"/>
		<reference ref_id="1182416" ref_url="https://bugzilla.suse.com/1182416" source="BUGZILLA"/>
		<reference ref_id="1182417" ref_url="https://bugzilla.suse.com/1182417" source="BUGZILLA"/>
		<reference ref_id="1182418" ref_url="https://bugzilla.suse.com/1182418" source="BUGZILLA"/>
		<reference ref_id="1182419" ref_url="https://bugzilla.suse.com/1182419" source="BUGZILLA"/>
		<reference ref_id="1182420" ref_url="https://bugzilla.suse.com/1182420" source="BUGZILLA"/>
		<reference ref_id="1184020" ref_url="https://bugzilla.suse.com/1184020" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36221" ref_url="https://www.suse.com/security/cve/CVE-2020-36221/" source="CVE"/>
		<reference ref_id="CVE-2020-36222" ref_url="https://www.suse.com/security/cve/CVE-2020-36222/" source="CVE"/>
		<reference ref_id="CVE-2020-36223" ref_url="https://www.suse.com/security/cve/CVE-2020-36223/" source="CVE"/>
		<reference ref_id="CVE-2020-36224" ref_url="https://www.suse.com/security/cve/CVE-2020-36224/" source="CVE"/>
		<reference ref_id="CVE-2020-36225" ref_url="https://www.suse.com/security/cve/CVE-2020-36225/" source="CVE"/>
		<reference ref_id="CVE-2020-36226" ref_url="https://www.suse.com/security/cve/CVE-2020-36226/" source="CVE"/>
		<reference ref_id="CVE-2020-36227" ref_url="https://www.suse.com/security/cve/CVE-2020-36227/" source="CVE"/>
		<reference ref_id="CVE-2020-36228" ref_url="https://www.suse.com/security/cve/CVE-2020-36228/" source="CVE"/>
		<reference ref_id="CVE-2020-36229" ref_url="https://www.suse.com/security/cve/CVE-2020-36229/" source="CVE"/>
		<reference ref_id="CVE-2020-36230" ref_url="https://www.suse.com/security/cve/CVE-2020-36230/" source="CVE"/>
		<reference ref_id="CVE-2021-27212" ref_url="https://www.suse.com/security/cve/CVE-2021-27212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008644.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- bsc#1182408 CVE-2020-36230 - an assertion failure in slapd in the
  X.509 DN parsing in decode.c ber_next_element, resulting in denial
  of service.
- bsc#1182411 CVE-2020-36229 - ldap_X509dn2bv crash in the X.509 DN
  parsing in ad_keystring, resulting in denial of service.
- bsc#1182412 CVE-2020-36228 - integer underflow leading to crash
  in the Certificate List Exact Assertion processing, resulting in
  denial of service.
- bsc#1182413 CVE-2020-36227 - infinite loop in slapd with the
  cancel_extop Cancel operation, resulting in denial of service.
- bsc#1182416 CVE-2020-36225 - double free and slapd crash in the
  saslAuthzTo processing, resulting in denial of service.
- bsc#1182417 CVE-2020-36224 - invalid pointer free and slapd crash
  in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182415 CVE-2020-36226 - memch-&gt;bv_len miscalculation and slapd
  crash in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182419 CVE-2020-36222 - assertion failure in slapd in the
  saslAuthzTo validation, resulting in denial of service.
- bsc#1182420 CVE-2020-36221 - slapd crashes in the Certificate Exact
  Assertion processing, resulting in denial of service (schema_init.c
  serialNumberAndIssuerCheck).
- bsc#1182418 CVE-2020-36223 - slapd crash in the Values Return Filter
  control handling, resulting in denial of service (double free and
  out-of-bounds read).
- bsc#1182279 CVE-2021-27212 - an assertion failure in slapd can occur
    in the issuerAndThisUpdateCheck function via a crafted packet,
    resulting in a denial of service (daemon exit) via a short timestamp.
    This is related to schema_init.c and checkTime.
- resynchronise changelogs with subpackages (bsc#1184020).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-16"/>
	<updated date="2021-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182279">SUSE bug 1182279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182408">SUSE bug 1182408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182411">SUSE bug 1182411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182412">SUSE bug 1182412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182413">SUSE bug 1182413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182415">SUSE bug 1182415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182416">SUSE bug 1182416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182417">SUSE bug 1182417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182418">SUSE bug 1182418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182419">SUSE bug 1182419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182420">SUSE bug 1182420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184020">SUSE bug 1184020</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36221/">CVE-2020-36221 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36221">CVE-2020-36221 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36222/">CVE-2020-36222 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36222">CVE-2020-36222 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36223/">CVE-2020-36223 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36223">CVE-2020-36223 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36224/">CVE-2020-36224 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36224">CVE-2020-36224 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36225/">CVE-2020-36225 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36225">CVE-2020-36225 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36226/">CVE-2020-36226 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36226">CVE-2020-36226 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36227/">CVE-2020-36227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36227">CVE-2020-36227 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36228/">CVE-2020-36228 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36228">CVE-2020-36228 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36229/">CVE-2020-36229 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36229">CVE-2020-36229 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36230/">CVE-2020-36230 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36230">CVE-2020-36230 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27212/">CVE-2021-27212 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27212">CVE-2021-27212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584366" comment="compat-libldap-2_3-0-2.3.37-2.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584367" comment="libldap-2_4-2-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584368" comment="libldap-2_4-2-32bit-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584369" comment="openldap2-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584370" comment="openldap2-back-meta-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584371" comment="openldap2-client-2.4.26-0.74.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220260" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="945582" ref_url="https://bugzilla.suse.com/945582" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001793.html" source="SUSE-SU"/>
		<description>


This update fixes the following security issue:

- CVE-2015-6908. Passing a crafted packet to the function  ber_get_next(),
    an attacker may cause a remote denial of service, crashing the OpenLDAP server (bsc#945582).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-12"/>
	<updated date="2016-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/945582">SUSE bug 945582</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6908">CVE-2015-6908 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579264" comment="compat-libldap-2_3-0-2.3.37-2.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579265" comment="libldap-2_4-2-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579266" comment="libldap-2_4-2-32bit-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579267" comment="libldap-2_4-2-x86-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579268" comment="openldap2-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579269" comment="openldap2-back-meta-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579270" comment="openldap2-client-2.4.26-0.62.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579264" comment="compat-libldap-2_3-0-2.3.37-2.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579265" comment="libldap-2_4-2-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579266" comment="libldap-2_4-2-32bit-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579267" comment="libldap-2_4-2-x86-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579268" comment="openldap2-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579269" comment="openldap2-back-meta-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579270" comment="openldap2-client-2.4.26-0.62.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220261" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1104812" ref_url="https://bugzilla.suse.com/1104812" source="BUGZILLA"/>
		<reference ref_id="1106998" ref_url="https://bugzilla.suse.com/1106998" source="BUGZILLA"/>
		<reference ref_id="1106999" ref_url="https://bugzilla.suse.com/1106999" source="BUGZILLA"/>
		<reference ref_id="1107033" ref_url="https://bugzilla.suse.com/1107033" source="BUGZILLA"/>
		<reference ref_id="1107037" ref_url="https://bugzilla.suse.com/1107037" source="BUGZILLA"/>
		<reference ref_id="1107038" ref_url="https://bugzilla.suse.com/1107038" source="BUGZILLA"/>
		<reference ref_id="1107039" ref_url="https://bugzilla.suse.com/1107039" source="BUGZILLA"/>
		<reference ref_id="1107107" ref_url="https://bugzilla.suse.com/1107107" source="BUGZILLA"/>
		<reference ref_id="1108318" ref_url="https://bugzilla.suse.com/1108318" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16391" ref_url="https://www.suse.com/security/cve/CVE-2018-16391/" source="CVE"/>
		<reference ref_id="CVE-2018-16392" ref_url="https://www.suse.com/security/cve/CVE-2018-16392/" source="CVE"/>
		<reference ref_id="CVE-2018-16393" ref_url="https://www.suse.com/security/cve/CVE-2018-16393/" source="CVE"/>
		<reference ref_id="CVE-2018-16418" ref_url="https://www.suse.com/security/cve/CVE-2018-16418/" source="CVE"/>
		<reference ref_id="CVE-2018-16419" ref_url="https://www.suse.com/security/cve/CVE-2018-16419/" source="CVE"/>
		<reference ref_id="CVE-2018-16422" ref_url="https://www.suse.com/security/cve/CVE-2018-16422/" source="CVE"/>
		<reference ref_id="CVE-2018-16423" ref_url="https://www.suse.com/security/cve/CVE-2018-16423/" source="CVE"/>
		<reference ref_id="CVE-2018-16427" ref_url="https://www.suse.com/security/cve/CVE-2018-16427/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004829.html" source="SUSE-SU"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2018-16391: Fixed a denial of service when handling responses from a Muscle Card (bsc#1106998)
- CVE-2018-16392: Fixed a denial of service when handling responses from a TCOS Card (bsc#1106999)
- CVE-2018-16393: Fixed buffer overflows when handling responses from Gemsafe V1 Smartcards (bsc#1108318)
- CVE-2018-16418: Fixed buffer overflow when handling string concatenation in util_acl_to_str (bsc#1107039)
- CVE-2018-16419: Fixed several buffer overflows when handling responses from a Cryptoflex card (bsc#1107107)
- CVE-2018-16422: Fixed single byte buffer overflow when handling responses from an esteid Card (bsc#1107038)
- CVE-2018-16423: Fixed double free when handling responses from a smartcard (bsc#1107037)
- CVE-2018-16427: Fixed out of bounds reads when handling responses in OpenSC (bsc#1107033)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-05"/>
	<updated date="2018-11-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104812">SUSE bug 1104812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106998">SUSE bug 1106998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106999">SUSE bug 1106999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107033">SUSE bug 1107033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107037">SUSE bug 1107037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107038">SUSE bug 1107038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107039">SUSE bug 1107039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107107">SUSE bug 1107107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108318">SUSE bug 1108318</bugzilla>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16391/">CVE-2018-16391 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16391">CVE-2018-16391 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16392/">CVE-2018-16392 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16392">CVE-2018-16392 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16393/">CVE-2018-16393 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16393">CVE-2018-16393 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16418/">CVE-2018-16418 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16418">CVE-2018-16418 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16419/">CVE-2018-16419 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16419">CVE-2018-16419 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16422/">CVE-2018-16422 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16422">CVE-2018-16422 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16423/">CVE-2018-16423 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16423">CVE-2018-16423 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16427/">CVE-2018-16427 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16427">CVE-2018-16427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584372" comment="libopensc2-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584373" comment="libopensc2-32bit-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584374" comment="libopensc2-x86-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584375" comment="opensc-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584376" comment="opensc-32bit-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584377" comment="opensc-x86-0.11.6-5.27.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584372" comment="libopensc2-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584373" comment="libopensc2-32bit-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584374" comment="libopensc2-x86-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584375" comment="opensc-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584376" comment="opensc-32bit-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584377" comment="opensc-x86-0.11.6-5.27.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220262" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1191957" ref_url="https://bugzilla.suse.com/1191957" source="BUGZILLA"/>
		<reference ref_id="1192005" ref_url="https://bugzilla.suse.com/1192005" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42780" ref_url="https://www.suse.com/security/cve/CVE-2021-42780/" source="CVE"/>
		<reference ref_id="CVE-2021-42782" ref_url="https://www.suse.com/security/cve/CVE-2021-42782/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009681.html" source="SUSE-SU"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2021-42780: Fixed use after return in insert_pin() (bsc#1192005).
- CVE-2021-42782: Stack buffer overflow issues in various places (bsc#1191957).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-29"/>
	<updated date="2021-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191957">SUSE bug 1191957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192005">SUSE bug 1192005</bugzilla>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-42780/">CVE-2021-42780 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42780">CVE-2021-42780 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42782/">CVE-2021-42782 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42782">CVE-2021-42782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653638" comment="libopensc2-0.11.6-5.27.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653639" comment="libopensc2-32bit-0.11.6-5.27.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653640" comment="opensc-0.11.6-5.27.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653641" comment="opensc-32bit-0.11.6-5.27.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220263" version="1" class="patch">
	<metadata>
		<title>Security update for openslp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1090638" ref_url="https://bugzilla.suse.com/1090638" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004251.html" source="SUSE-SU"/>
		<description>
This update for openslp fixes the following issues:

- CVE-2017-17833: Prevent heap-related memory corruption issue which may have
  manifested itself as a denial-of-service or a remote code-execution
  vulnerability (bsc#1090638).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-09"/>
	<updated date="2018-07-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17833">CVE-2017-17833 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584378" comment="openslp-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584379" comment="openslp-32bit-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584380" comment="openslp-server-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584381" comment="openslp-x86-1.2.0-172.27.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584378" comment="openslp-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584379" comment="openslp-32bit-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584380" comment="openslp-server-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584381" comment="openslp-x86-1.2.0-172.27.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220264" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="903649" ref_url="https://bugzilla.suse.com/903649" source="BUGZILLA"/>
		<reference ref_id="932483" ref_url="https://bugzilla.suse.com/932483" source="BUGZILLA"/>
		<reference ref_id="936695" ref_url="https://bugzilla.suse.com/936695" source="BUGZILLA"/>
		<reference ref_id="938746" ref_url="https://bugzilla.suse.com/938746" source="BUGZILLA"/>
		<reference ref_id="939932" ref_url="https://bugzilla.suse.com/939932" source="BUGZILLA"/>
		<reference ref_id="943006" ref_url="https://bugzilla.suse.com/943006" source="BUGZILLA"/>
		<reference ref_id="943010" ref_url="https://bugzilla.suse.com/943010" source="BUGZILLA"/>
		<reference ref_id="945484" ref_url="https://bugzilla.suse.com/945484" source="BUGZILLA"/>
		<reference ref_id="945493" ref_url="https://bugzilla.suse.com/945493" source="BUGZILLA"/>
		<reference ref_id="947458" ref_url="https://bugzilla.suse.com/947458" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-5352" ref_url="https://www.suse.com/security/cve/CVE-2015-5352/" source="CVE"/>
		<reference ref_id="CVE-2015-5600" ref_url="https://www.suse.com/security/cve/CVE-2015-5600/" source="CVE"/>
		<reference ref_id="CVE-2015-6563" ref_url="https://www.suse.com/security/cve/CVE-2015-6563/" source="CVE"/>
		<reference ref_id="CVE-2015-6564" ref_url="https://www.suse.com/security/cve/CVE-2015-6564/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001616.html" source="SUSE-SU"/>
		<description>
OpenSSH was updated to fix several security issues and bugs.

Please note that due to a bug in the previous shipped openssh version, sshd might
not correctly restart. Please verify that the ssh daemon is running after installing
this update.

These security issues were fixed:

* CVE-2015-5352: The x11_open_helper function, when ForwardX11Trusted mode
  is not used, lacked a check of the refusal deadline for X connections,
  which made it easier for remote attackers to bypass intended access
  restrictions via a connection outside of the permitted time window.
  (bsc#936695)

* CVE-2015-5600: The kbdint_next_device function in auth2-chall.c
  in sshd did not properly restrict the processing of keyboard-interactive
  devices within a single connection, which made it easier for remote
  attackers to conduct brute-force attacks or cause a denial of service
  (CPU consumption) via a long and duplicative list in the ssh
  -oKbdInteractiveDevices option, as demonstrated by a modified client
  that provides a different password for each pam element on this list.
  (bsc#938746)

* CVE-2015-4000: Removed and disabled weak DH groups to address LOGJAM.
  (bsc#932483)

* Hardening patch to fix sftp RCE. (bsc#903649)

* CVE-2015-6563: The monitor component in sshd accepted extraneous username
  data in MONITOR_REQ_PAM_INIT_CTX requests, which allowed local users to
  conduct impersonation attacks by leveraging any SSH login access in
  conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM
  request, related to monitor.c and monitor_wrap.c.

* CVE-2015-6564: Use-after-free vulnerability in the mm_answer_pam_free_ctx
  function in monitor.c in sshd might have allowed local users to gain
  privileges by leveraging control of the sshd uid to send an unexpectedly
  early MONITOR_REQ_PAM_FREE_CTX request.

Additional a bug was fixed that could lead to openssh not working in 
chroot (bsc#947458).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-05"/>
	<updated date="2015-10-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/903649">SUSE bug 903649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936695">SUSE bug 936695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938746">SUSE bug 938746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939932">SUSE bug 939932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943006">SUSE bug 943006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943010">SUSE bug 943010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945484">SUSE bug 945484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945493">SUSE bug 945493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947458">SUSE bug 947458</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5352/">CVE-2015-5352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5352">CVE-2015-5352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5600/">CVE-2015-5600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5600">CVE-2015-5600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6563/">CVE-2015-6563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6563">CVE-2015-6563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6564/">CVE-2015-6564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6564">CVE-2015-6564 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584382" comment="openssh-6.6p1-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584383" comment="openssh-askpass-gnome-6.6p1-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584384" comment="openssh-fips-6.6p1-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584385" comment="openssh-helpers-6.6p1-13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584382" comment="openssh-6.6p1-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584383" comment="openssh-askpass-gnome-6.6p1-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584384" comment="openssh-fips-6.6p1-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584385" comment="openssh-helpers-6.6p1-13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220265" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="729190" ref_url="https://bugzilla.suse.com/729190" source="BUGZILLA"/>
		<reference ref_id="932483" ref_url="https://bugzilla.suse.com/932483" source="BUGZILLA"/>
		<reference ref_id="948902" ref_url="https://bugzilla.suse.com/948902" source="BUGZILLA"/>
		<reference ref_id="960414" ref_url="https://bugzilla.suse.com/960414" source="BUGZILLA"/>
		<reference ref_id="961368" ref_url="https://bugzilla.suse.com/961368" source="BUGZILLA"/>
		<reference ref_id="961494" ref_url="https://bugzilla.suse.com/961494" source="BUGZILLA"/>
		<reference ref_id="962313" ref_url="https://bugzilla.suse.com/962313" source="BUGZILLA"/>
		<reference ref_id="965576" ref_url="https://bugzilla.suse.com/965576" source="BUGZILLA"/>
		<reference ref_id="970632" ref_url="https://bugzilla.suse.com/970632" source="BUGZILLA"/>
		<reference ref_id="975865" ref_url="https://bugzilla.suse.com/975865" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8325" ref_url="https://www.suse.com/security/cve/CVE-2015-8325/" source="CVE"/>
		<reference ref_id="CVE-2016-1908" ref_url="https://www.suse.com/security/cve/CVE-2016-1908/" source="CVE"/>
		<reference ref_id="CVE-2016-3115" ref_url="https://www.suse.com/security/cve/CVE-2016-3115/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002103.html" source="SUSE-SU"/>
		<description>
openssh was updated to fix three security issues.

These security issues were fixed:
- CVE-2016-3115: Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH allowed remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions  (bsc#970632).
- CVE-2016-1908: Possible fallback from untrusted to trusted X11 forwarding (bsc#962313).
- CVE-2015-8325: Ignore PAM environment vars when UseLogin=yes (bsc#975865).

These non-security issues were fixed:
- Correctly parse GSSAPI KEX algorithms (bsc#961368)
- More verbose FIPS mode/CC related documentation in README.FIPS (bsc#965576, bsc#960414)
- Fix PRNG re-seeding (bsc#960414, bsc#729190)
- Disable DH parameters under 2048 bits by default and allow lowering the limit back to the RFC 4419 specified minimum through an option (bsc#932483, bsc#948902)
- Allow empty Match blocks (bsc#961494) 
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-08"/>
	<updated date="2016-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/729190">SUSE bug 729190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948902">SUSE bug 948902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960414">SUSE bug 960414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961368">SUSE bug 961368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961494">SUSE bug 961494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962313">SUSE bug 962313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965576">SUSE bug 965576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970632">SUSE bug 970632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975865">SUSE bug 975865</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8325/">CVE-2015-8325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8325">CVE-2015-8325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1908/">CVE-2016-1908 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1908">CVE-2016-1908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3115/">CVE-2016-3115 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3115">CVE-2016-3115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584386" comment="openssh-6.6p1-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584387" comment="openssh-askpass-gnome-6.6p1-21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584388" comment="openssh-fips-6.6p1-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584389" comment="openssh-helpers-6.6p1-21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584386" comment="openssh-6.6p1-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584387" comment="openssh-askpass-gnome-6.6p1-21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584388" comment="openssh-fips-6.6p1-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584389" comment="openssh-helpers-6.6p1-21.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220266" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="948902" ref_url="https://bugzilla.suse.com/948902" source="BUGZILLA"/>
		<reference ref_id="981654" ref_url="https://bugzilla.suse.com/981654" source="BUGZILLA"/>
		<reference ref_id="989363" ref_url="https://bugzilla.suse.com/989363" source="BUGZILLA"/>
		<reference ref_id="992533" ref_url="https://bugzilla.suse.com/992533" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6210" ref_url="https://www.suse.com/security/cve/CVE-2016-6210/" source="CVE"/>
		<reference ref_id="CVE-2016-6515" ref_url="https://www.suse.com/security/cve/CVE-2016-6515/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002266.html" source="SUSE-SU"/>
		<description>

This update for openssh fixes the following issues:

- CVE-2016-6210: Prevent user enumeration through the timing of password
  processing (bsc#989363)
  [-prevent_timing_user_enumeration]
- Allow lowering the DH groups parameter limit in server as well
  as when GSSAPI key exchange is used (bsc#948902)
- CVE-2016-6515: Limiting the accepted password length to prevent possible DoS
  (bsc#992533)

Bug fixes:
- avoid complaining about unset DISPLAY variable (bsc#981654)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-09"/>
	<updated date="2016-09-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/948902">SUSE bug 948902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981654">SUSE bug 981654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989363">SUSE bug 989363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992533">SUSE bug 992533</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-6210/">CVE-2016-6210 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6210">CVE-2016-6210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6515/">CVE-2016-6515 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6515">CVE-2016-6515 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584390" comment="openssh-6.6p1-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584391" comment="openssh-askpass-gnome-6.6p1-28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584392" comment="openssh-fips-6.6p1-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584393" comment="openssh-helpers-6.6p1-28.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584390" comment="openssh-6.6p1-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584391" comment="openssh-askpass-gnome-6.6p1-28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584392" comment="openssh-fips-6.6p1-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584393" comment="openssh-helpers-6.6p1-28.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220267" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1005480" ref_url="https://bugzilla.suse.com/1005480" source="BUGZILLA"/>
		<reference ref_id="1005893" ref_url="https://bugzilla.suse.com/1005893" source="BUGZILLA"/>
		<reference ref_id="1006221" ref_url="https://bugzilla.suse.com/1006221" source="BUGZILLA"/>
		<reference ref_id="1016366" ref_url="https://bugzilla.suse.com/1016366" source="BUGZILLA"/>
		<reference ref_id="1016369" ref_url="https://bugzilla.suse.com/1016369" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10009" ref_url="https://www.suse.com/security/cve/CVE-2016-10009/" source="CVE"/>
		<reference ref_id="CVE-2016-10011" ref_url="https://www.suse.com/security/cve/CVE-2016-10011/" source="CVE"/>
		<reference ref_id="CVE-2016-8858" ref_url="https://www.suse.com/security/cve/CVE-2016-8858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002677.html" source="SUSE-SU"/>
		<description>

This update for openssh fixes the following issues:

Security issues fixed:
- CVE-2016-8858: prevent resource depletion during key exchange (bsc#1005480)
- CVE-2016-10009: limit directories for loading PKCS11 modules to avoid privilege escalation (bsc#1016366)
- CVE-2016-10011: Prevent possible leaks of host private keys to low-privilege process handling authentication (bsc#1016369)

Non security issues fixed:
- Properly verify CIDR masks in the AllowUsers and DenyUsers configuration lists (bsc#1005893)
- fix suggested command for removing conflicting server keys from the known_hosts file (bsc#1006221)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-03"/>
	<updated date="2017-03-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005480">SUSE bug 1005480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005893">SUSE bug 1005893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006221">SUSE bug 1006221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016366">SUSE bug 1016366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016369">SUSE bug 1016369</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10009/">CVE-2016-10009 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10009">CVE-2016-10009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10011/">CVE-2016-10011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10011">CVE-2016-10011 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8858/">CVE-2016-8858 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8858">CVE-2016-8858 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584394" comment="openssh-6.6p1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584395" comment="openssh-askpass-gnome-6.6p1-35.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584396" comment="openssh-fips-6.6p1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584397" comment="openssh-helpers-6.6p1-35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584394" comment="openssh-6.6p1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584395" comment="openssh-askpass-gnome-6.6p1-35.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584396" comment="openssh-fips-6.6p1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584397" comment="openssh-helpers-6.6p1-35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220268" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1016370" ref_url="https://bugzilla.suse.com/1016370" source="BUGZILLA"/>
		<reference ref_id="1017099" ref_url="https://bugzilla.suse.com/1017099" source="BUGZILLA"/>
		<reference ref_id="1023275" ref_url="https://bugzilla.suse.com/1023275" source="BUGZILLA"/>
		<reference ref_id="1053972" ref_url="https://bugzilla.suse.com/1053972" source="BUGZILLA"/>
		<reference ref_id="1065000" ref_url="https://bugzilla.suse.com/1065000" source="BUGZILLA"/>
		<reference ref_id="1069509" ref_url="https://bugzilla.suse.com/1069509" source="BUGZILLA"/>
		<reference ref_id="1076957" ref_url="https://bugzilla.suse.com/1076957" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-1483" ref_url="https://www.suse.com/security/cve/CVE-2008-1483/" source="CVE"/>
		<reference ref_id="CVE-2016-10012" ref_url="https://www.suse.com/security/cve/CVE-2016-10012/" source="CVE"/>
		<reference ref_id="CVE-2016-10708" ref_url="https://www.suse.com/security/cve/CVE-2016-10708/" source="CVE"/>
		<reference ref_id="CVE-2017-15906" ref_url="https://www.suse.com/security/cve/CVE-2017-15906/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004398.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security issues fixed:

- CVE-2016-10012: Fix pre-auth compression checks that could be optimized away (bsc#1016370).
- CVE-2016-10708: Fix remote denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYSmessage (bsc#1076957).
- CVE-2017-15906: Fix r/o sftp-server zero byte file creation (bsc#1065000).
- CVE-2008-1483: Fix accidental re-introduction of CVE-2008-1483 (bsc#1069509).

Bug fixes:

- bsc#1017099: Match conditions with uppercase hostnames fail (bsc#1017099)
- bsc#1053972: supportedKeyExchanges diffie-hellman-group1-sha1 is duplicated (bsc#1053972)
- bsc#1023275: Messages suppressed after upgrade from SLES 11 SP3 to SP4 (bsc#1023275)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-09"/>
	<updated date="2018-08-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1016370">SUSE bug 1016370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017099">SUSE bug 1017099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023275">SUSE bug 1023275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053972">SUSE bug 1053972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065000">SUSE bug 1065000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069509">SUSE bug 1069509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076957">SUSE bug 1076957</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2008-1483/">CVE-2008-1483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1483">CVE-2008-1483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10012/">CVE-2016-10012 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10012">CVE-2016-10012 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10708/">CVE-2016-10708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10708">CVE-2016-10708 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15906/">CVE-2017-15906 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15906">CVE-2017-15906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584398" comment="openssh-6.6p1-36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584399" comment="openssh-askpass-gnome-6.6p1-36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584400" comment="openssh-fips-6.6p1-36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584401" comment="openssh-helpers-6.6p1-36.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584398" comment="openssh-6.6p1-36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584399" comment="openssh-askpass-gnome-6.6p1-36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584400" comment="openssh-fips-6.6p1-36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584401" comment="openssh-helpers-6.6p1-36.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220269" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1091396" ref_url="https://bugzilla.suse.com/1091396" source="BUGZILLA"/>
		<reference ref_id="1105010" ref_url="https://bugzilla.suse.com/1105010" source="BUGZILLA"/>
		<reference ref_id="1106163" ref_url="https://bugzilla.suse.com/1106163" source="BUGZILLA"/>
		<reference ref_id="964336" ref_url="https://bugzilla.suse.com/964336" source="BUGZILLA"/>
		<reference ref_id="982273" ref_url="https://bugzilla.suse.com/982273" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15473" ref_url="https://www.suse.com/security/cve/CVE-2018-15473/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004857.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Following security issues have been fixed:

- CVE-2018-15919: Remotely observable behaviour in auth-gss2.c in OpenSSH could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. OpenSSH developers do not want to treat such a username enumeration (or 'oracle') as a vulnerability. (bsc#1106163)
- CVE-2018-15473: OpenSSH was prone to a user existance oracle vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. (bsc#1105010)

Also the following security related hardening change was done:

- Removed arcfour,blowfish,cast from list of default ciphers as they are long discontinued and should no longer be used. (bsc#982273)

And the following non-security issues were fixed:

- Stop leaking File descriptors (bsc#964336)
- sftp-client.c returns wrong error code upon failure (bsc#1091396)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-16"/>
	<updated date="2018-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091396">SUSE bug 1091396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106163">SUSE bug 1106163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964336">SUSE bug 964336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982273">SUSE bug 982273</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15473/">CVE-2018-15473 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15473">CVE-2018-15473 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584402" comment="openssh-6.6p1-36.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584403" comment="openssh-askpass-gnome-6.6p1-36.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584404" comment="openssh-fips-6.6p1-36.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584405" comment="openssh-helpers-6.6p1-36.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584402" comment="openssh-6.6p1-36.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584403" comment="openssh-askpass-gnome-6.6p1-36.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584404" comment="openssh-fips-6.6p1-36.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584405" comment="openssh-helpers-6.6p1-36.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220270" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1121571" ref_url="https://bugzilla.suse.com/1121571" source="BUGZILLA"/>
		<reference ref_id="1121816" ref_url="https://bugzilla.suse.com/1121816" source="BUGZILLA"/>
		<reference ref_id="1121818" ref_url="https://bugzilla.suse.com/1121818" source="BUGZILLA"/>
		<reference ref_id="1121821" ref_url="https://bugzilla.suse.com/1121821" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20685" ref_url="https://www.suse.com/security/cve/CVE-2018-20685/" source="CVE"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6110" ref_url="https://www.suse.com/security/cve/CVE-2019-6110/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005049.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security issue fixed:

- CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions (bsc#1121571)
- CVE-2019-6109: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate terminal output via the object name, e.g. by inserting ANSI escape sequences (bsc#1121816)
- CVE-2019-6110: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate stderr output, e.g. by inserting ANSI escape sequences (bsc#1121818)
- CVE-2019-6111: Fixed an issue where the scp client would allow malicious remote SSH servers to execute directory traversal attacks and overwrite files (bsc#1121821)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-18"/>
	<updated date="2019-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121818">SUSE bug 1121818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20685/">CVE-2018-20685 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20685">CVE-2018-20685 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6109">CVE-2019-6109 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6110/">CVE-2019-6110 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6110">CVE-2019-6110 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6111">CVE-2019-6111 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584406" comment="openssh-6.6p1-36.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584407" comment="openssh-askpass-gnome-6.6p1-36.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584408" comment="openssh-fips-6.6p1-36.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584409" comment="openssh-helpers-6.6p1-36.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584406" comment="openssh-6.6p1-36.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584407" comment="openssh-askpass-gnome-6.6p1-36.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584408" comment="openssh-fips-6.6p1-36.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584409" comment="openssh-helpers-6.6p1-36.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220271" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1090671" ref_url="https://bugzilla.suse.com/1090671" source="BUGZILLA"/>
		<reference ref_id="1115550" ref_url="https://bugzilla.suse.com/1115550" source="BUGZILLA"/>
		<reference ref_id="1119183" ref_url="https://bugzilla.suse.com/1119183" source="BUGZILLA"/>
		<reference ref_id="1121816" ref_url="https://bugzilla.suse.com/1121816" source="BUGZILLA"/>
		<reference ref_id="1121821" ref_url="https://bugzilla.suse.com/1121821" source="BUGZILLA"/>
		<reference ref_id="1131709" ref_url="https://bugzilla.suse.com/1131709" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005361.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security vulnerabilities addressed:

- CVE-2019-6109: Fixed an character encoding issue in the progress display of
  the scp client that could be used to manipulate client output, allowing
  for spoofing during file transfers (bsc#1121816).
- CVE-2019-6111: Properly validate object names received by the scp client to
  prevent arbitrary file overwrites when interacting with a malicious SSH server
  (bsc#1121821).

Other issues fixed: 

- Fixed two race conditions in sshd relating to SIGHUP (bsc#1119183).
- Returned proper reason for port forwarding failures (bsc#1090671).
- Fixed SSHD termination of multichannel sessions with non-root users (bsc#1115550).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-25"/>
	<updated date="2019-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1090671">SUSE bug 1090671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115550">SUSE bug 1115550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119183">SUSE bug 1119183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131709">SUSE bug 1131709</bugzilla>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6109">CVE-2019-6109 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6111">CVE-2019-6111 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584410" comment="openssh-6.6p1-36.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584411" comment="openssh-askpass-gnome-6.6p1-36.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584412" comment="openssh-fips-6.6p1-36.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584413" comment="openssh-helpers-6.6p1-36.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220272" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1190975" ref_url="https://bugzilla.suse.com/1190975" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41617" ref_url="https://www.suse.com/security/cve/CVE-2021-41617/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009807.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2021-41617: Fixed privilege escalation when AuthorizedKeysCommand/AuthorizedPrincipalsCommand are configured (bsc#1190975).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190975">SUSE bug 1190975</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41617/">CVE-2021-41617 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41617">CVE-2021-41617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658399" comment="openssh-6.6p1-36.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658400" comment="openssh-askpass-gnome-6.6p1-36.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658401" comment="openssh-fips-6.6p1-36.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658402" comment="openssh-helpers-6.6p1-36.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220273" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="961642" ref_url="https://bugzilla.suse.com/961642" source="BUGZILLA"/>
		<reference ref_id="961645" ref_url="https://bugzilla.suse.com/961645" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777/" source="CVE"/>
		<reference ref_id="CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001805.html" source="SUSE-SU"/>
		<description>

This update for openssh fixes the following issues:

- CVE-2016-0777: A malicious or compromised server could cause the OpenSSH client to expose part or all of the client's private key through the roaming feature (bsc#961642)
- CVE-2016-0778: A malicious or compromised server could could trigger a buffer overflow in the OpenSSH client through the roaming feature (bsc#961645)

This update disables the undocumented feature supported by the OpenSSH client and a commercial SSH server.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-14"/>
	<updated date="2016-01-14"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/961642">SUSE bug 961642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961645">SUSE bug 961645</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0777">CVE-2016-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0778">CVE-2016-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584414" comment="openssh-6.6p1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584415" comment="openssh-askpass-gnome-6.6p1-16.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584416" comment="openssh-fips-6.6p1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584417" comment="openssh-helpers-6.6p1-16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584414" comment="openssh-6.6p1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584415" comment="openssh-askpass-gnome-6.6p1-16.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584416" comment="openssh-fips-6.6p1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584417" comment="openssh-helpers-6.6p1-16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220274" version="1" class="patch">
	<metadata>
		<title>Recommended update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="937492" ref_url="https://bugzilla.suse.com/937492" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="SUSE-RU-2015:1469-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-September/003386.html" source="SUSE-SU"/>
		<description>

This update of openssl fixes a regression caused by the security fix for CVE-2015-0287,
after which DSA keys could occasionaly not loaded from disk. (bsc#937492)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-06"/>
	<updated date="2015-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/937492">SUSE bug 937492</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0287">CVE-2015-0287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009593843" comment="libopenssl0_9_8-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593844" comment="libopenssl0_9_8-32bit-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593845" comment="libopenssl0_9_8-hmac-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593846" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593847" comment="libopenssl0_9_8-x86-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593848" comment="openssl-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593849" comment="openssl-doc-0.9.8j-0.74.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009593843" comment="libopenssl0_9_8-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593844" comment="libopenssl0_9_8-32bit-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593845" comment="libopenssl0_9_8-hmac-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593846" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593847" comment="libopenssl0_9_8-x86-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593848" comment="openssl-0.9.8j-0.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593849" comment="openssl-doc-0.9.8j-0.74.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220275" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="952099" ref_url="https://bugzilla.suse.com/952099" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001735.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues: 

- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure
  OpenSSL would leak memory. This structure is used by the PKCS#7 and CMS
  routines so any application which reads PKCS#7 or CMS data from untrusted
  sources is affected. SSL/TLS is not affected. (bsc#957812)

- Prevent segfault in s_client with invalid options (bsc#952099)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-15"/>
	<updated date="2015-12-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952099">SUSE bug 952099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3195">CVE-2015-3195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579312" comment="libopenssl0_9_8-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579313" comment="libopenssl0_9_8-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579314" comment="libopenssl0_9_8-hmac-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579315" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579316" comment="libopenssl0_9_8-x86-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579317" comment="openssl-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579318" comment="openssl-doc-0.9.8j-0.80.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579312" comment="libopenssl0_9_8-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579313" comment="libopenssl0_9_8-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579314" comment="libopenssl0_9_8-hmac-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579315" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579316" comment="libopenssl0_9_8-x86-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579317" comment="openssl-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579318" comment="openssl-doc-0.9.8j-0.80.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220276" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="952871" ref_url="https://bugzilla.suse.com/952871" source="BUGZILLA"/>
		<reference ref_id="963415" ref_url="https://bugzilla.suse.com/963415" source="BUGZILLA"/>
		<reference ref_id="967787" ref_url="https://bugzilla.suse.com/967787" source="BUGZILLA"/>
		<reference ref_id="968046" ref_url="https://bugzilla.suse.com/968046" source="BUGZILLA"/>
		<reference ref_id="968047" ref_url="https://bugzilla.suse.com/968047" source="BUGZILLA"/>
		<reference ref_id="968048" ref_url="https://bugzilla.suse.com/968048" source="BUGZILLA"/>
		<reference ref_id="968051" ref_url="https://bugzilla.suse.com/968051" source="BUGZILLA"/>
		<reference ref_id="968053" ref_url="https://bugzilla.suse.com/968053" source="BUGZILLA"/>
		<reference ref_id="968374" ref_url="https://bugzilla.suse.com/968374" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0703" ref_url="https://www.suse.com/security/cve/CVE-2016-0703/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001907.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes various security issues and bugs: 

Security issues fixed:
- CVE-2016-0800 aka the 'DROWN' attack (bsc#968046):
  OpenSSL was vulnerable to a cross-protocol attack that could lead to
  decryption of TLS sessions by using a server supporting SSLv2 and
  EXPORT cipher suites as a Bleichenbacher RSA padding oracle.

  This update changes the openssl library to:

  * Disable SSLv2 protocol support by default.

    This can be overridden by setting the environment variable
    'OPENSSL_ALLOW_SSL2' or by using SSL_CTX_clear_options using the
    SSL_OP_NO_SSLv2 flag.

    Note that various services and clients had already disabled SSL
    protocol 2 by default previously.

  * Disable all weak EXPORT ciphers by default. These can be reenabled
    if required by old legacy software using the environment variable
    'OPENSSL_ALLOW_EXPORT'.

- CVE-2016-0705 (bnc#968047):
  A double free() bug in the DSA ASN1 parser code was fixed that could
  be abused to facilitate a denial-of-service attack.

- CVE-2016-0797 (bnc#968048):
  The BN_hex2bn() and BN_dec2bn() functions had a bug that could result
  in an attempt to de-reference a NULL pointer leading to crashes.
  This could have security consequences if these functions were ever
  called by user applications with large untrusted hex/decimal data. Also,
  internal usage of these functions in OpenSSL uses data from config files
  or application command line arguments. If user developed applications
  generated config file data based on untrusted data, then this could
  have had security consequences as well.

- CVE-2016-0799 (bnc#968374)
  On many 64 bit systems, the internal fmtstr() and doapr_outch()
  functions could miscalculate the length of a string and attempt to
  access out-of-bounds memory locations. These problems could have
  enabled attacks where large amounts of untrusted data is passed to
  the BIO_*printf functions. If applications use these functions in
  this way then they could have been vulnerable. OpenSSL itself uses
  these functions when printing out human-readable dumps of ASN.1
  data. Therefore applications that print this data could have been
  vulnerable if the data is from untrusted sources. OpenSSL command line
  applications could also have been vulnerable when they print out ASN.1
  data, or if untrusted data is passed as command line arguments. Libssl
  is not considered directly vulnerable.

- CVE-2015-3197 (bsc#963415):
  The SSLv2 protocol did not block disabled ciphers.

Note that the March 1st 2016 release also references following CVEs
that were fixed by us with CVE-2015-0293 in 2015:

- CVE-2016-0703 (bsc#968051): This issue only affected versions of
  OpenSSL prior to March 19th 2015 at which time the code was refactored
  to address vulnerability CVE-2015-0293. It would have made the above
  'DROWN' attack much easier.
- CVE-2016-0704 (bsc#968053): 'Bleichenbacher oracle in SSLv2'
  This issue only affected versions of OpenSSL prior to March 19th
  2015 at which time the code was refactored to address vulnerability
  CVE-2015-0293. It would have made the above 'DROWN' attack much easier.

Also fixes the following bug:
- Avoid running OPENSSL_config twice. This avoids breaking
  engine loading and also fixes a memory leak in libssl. (bsc#952871 bsc#967787)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-01"/>
	<updated date="2016-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/952871">SUSE bug 952871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963415">SUSE bug 963415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967787">SUSE bug 967787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968047">SUSE bug 968047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968048">SUSE bug 968048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968053">SUSE bug 968053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968374">SUSE bug 968374</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3197">CVE-2015-3197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0702">CVE-2016-0702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0703/">CVE-2016-0703 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0703">CVE-2016-0703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0705">CVE-2016-0705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0797">CVE-2016-0797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0799">CVE-2016-0799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0800">CVE-2016-0800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584418" comment="libopenssl0_9_8-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584419" comment="libopenssl0_9_8-32bit-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584420" comment="libopenssl0_9_8-hmac-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584421" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584422" comment="libopenssl0_9_8-x86-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584423" comment="openssl-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584424" comment="openssl-doc-0.9.8j-0.89.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584418" comment="libopenssl0_9_8-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584419" comment="libopenssl0_9_8-32bit-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584420" comment="libopenssl0_9_8-hmac-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584421" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584422" comment="libopenssl0_9_8-x86-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584423" comment="openssl-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584424" comment="openssl-doc-0.9.8j-0.89.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220277" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="889013" ref_url="https://bugzilla.suse.com/889013" source="BUGZILLA"/>
		<reference ref_id="968050" ref_url="https://bugzilla.suse.com/968050" source="BUGZILLA"/>
		<reference ref_id="976942" ref_url="https://bugzilla.suse.com/976942" source="BUGZILLA"/>
		<reference ref_id="976943" ref_url="https://bugzilla.suse.com/976943" source="BUGZILLA"/>
		<reference ref_id="977614" ref_url="https://bugzilla.suse.com/977614" source="BUGZILLA"/>
		<reference ref_id="977615" ref_url="https://bugzilla.suse.com/977615" source="BUGZILLA"/>
		<reference ref_id="977617" ref_url="https://bugzilla.suse.com/977617" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002056.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues: 

Security issues fixed:
- CVE-2016-2108: Memory corruption in the ASN.1 encoder (bsc#977617)
- CVE-2016-2105: EVP_EncodeUpdate overflow (bsc#977614)
- CVE-2016-2106: EVP_EncryptUpdate overflow (bsc#977615)
- CVE-2016-2109: ASN.1 BIO excessive memory allocation (bsc#976942)
- CVE-2016-0702: Side channel attack on modular exponentiation 'CacheBleed' (bsc#968050)

Bugs fixed:
- fate#320304: build 32bit devel package
- bsc#976943: Fix buffer overrun in ASN1_parse
- bsc#973223: allow weak DH groups, vulnerable to the logjam attack,
  when environment variable OPENSSL_ALLOW_LOGJAM_ATTACK is set
- bsc#889013: Rename README.SuSE to the new spelling
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-12"/>
	<updated date="2016-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/889013">SUSE bug 889013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968050">SUSE bug 968050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976943">SUSE bug 976943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977614">SUSE bug 977614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977615">SUSE bug 977615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977617">SUSE bug 977617</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0702">CVE-2016-0702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2105">CVE-2016-2105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2106">CVE-2016-2106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2108">CVE-2016-2108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2109">CVE-2016-2109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584425" comment="libopenssl0_9_8-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584426" comment="libopenssl0_9_8-32bit-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584427" comment="libopenssl0_9_8-hmac-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584428" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584429" comment="libopenssl0_9_8-x86-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584430" comment="openssl-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584431" comment="openssl-doc-0.9.8j-0.97.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584425" comment="libopenssl0_9_8-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584426" comment="libopenssl0_9_8-32bit-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584427" comment="libopenssl0_9_8-hmac-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584428" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584429" comment="libopenssl0_9_8-x86-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584430" comment="openssl-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584431" comment="openssl-doc-0.9.8j-0.97.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220278" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="979475" ref_url="https://bugzilla.suse.com/979475" source="BUGZILLA"/>
		<reference ref_id="982575" ref_url="https://bugzilla.suse.com/982575" source="BUGZILLA"/>
		<reference ref_id="983249" ref_url="https://bugzilla.suse.com/983249" source="BUGZILLA"/>
		<reference ref_id="993819" ref_url="https://bugzilla.suse.com/993819" source="BUGZILLA"/>
		<reference ref_id="994749" ref_url="https://bugzilla.suse.com/994749" source="BUGZILLA"/>
		<reference ref_id="994844" ref_url="https://bugzilla.suse.com/994844" source="BUGZILLA"/>
		<reference ref_id="995075" ref_url="https://bugzilla.suse.com/995075" source="BUGZILLA"/>
		<reference ref_id="995324" ref_url="https://bugzilla.suse.com/995324" source="BUGZILLA"/>
		<reference ref_id="995359" ref_url="https://bugzilla.suse.com/995359" source="BUGZILLA"/>
		<reference ref_id="995377" ref_url="https://bugzilla.suse.com/995377" source="BUGZILLA"/>
		<reference ref_id="998190" ref_url="https://bugzilla.suse.com/998190" source="BUGZILLA"/>
		<reference ref_id="999665" ref_url="https://bugzilla.suse.com/999665" source="BUGZILLA"/>
		<reference ref_id="999666" ref_url="https://bugzilla.suse.com/999666" source="BUGZILLA"/>
		<reference ref_id="999668" ref_url="https://bugzilla.suse.com/999668" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002309.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues:

OpenSSL Security Advisory [22 Sep 2016] (bsc#999665)

Severity: High
* OCSP Status Request extension unbounded memory growth (CVE-2016-6304) (bsc#999666)

Severity: Low
* Pointer arithmetic undefined behavior (CVE-2016-2177) (bsc#982575)
* Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249)
* DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
* DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
* OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
* Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359)
* Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
* OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
* Certificate message OOB reads (CVE-2016-6306) (bsc#999668)

More information can be found on: https://www.openssl.org/news/secadv/20160922.txt

Bugs fixed:
* Update expired S/MIME certs (bsc#979475)
* Fix crash in print_notice (bsc#998190)
* Resume reading from /dev/urandom when interrupted by a signal (bsc#995075)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-05"/>
	<updated date="2016-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979475">SUSE bug 979475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983249">SUSE bug 983249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993819">SUSE bug 993819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994749">SUSE bug 994749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995075">SUSE bug 995075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995324">SUSE bug 995324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995359">SUSE bug 995359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995377">SUSE bug 995377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998190">SUSE bug 998190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999666">SUSE bug 999666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999668">SUSE bug 999668</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2177">CVE-2016-2177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2178">CVE-2016-2178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2179">CVE-2016-2179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2181">CVE-2016-2181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2182">CVE-2016-2182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6302">CVE-2016-6302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6303">CVE-2016-6303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6304">CVE-2016-6304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6306">CVE-2016-6306 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584432" comment="libopenssl0_9_8-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584433" comment="libopenssl0_9_8-32bit-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584434" comment="libopenssl0_9_8-hmac-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584435" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584436" comment="libopenssl0_9_8-x86-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584437" comment="openssl-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584438" comment="openssl-doc-0.9.8j-0.102.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584432" comment="libopenssl0_9_8-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584433" comment="libopenssl0_9_8-32bit-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584434" comment="libopenssl0_9_8-hmac-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584435" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584436" comment="libopenssl0_9_8-x86-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584437" comment="openssl-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584438" comment="openssl-doc-0.9.8j-0.102.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220279" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1000677" ref_url="https://bugzilla.suse.com/1000677" source="BUGZILLA"/>
		<reference ref_id="1001912" ref_url="https://bugzilla.suse.com/1001912" source="BUGZILLA"/>
		<reference ref_id="1004499" ref_url="https://bugzilla.suse.com/1004499" source="BUGZILLA"/>
		<reference ref_id="1005878" ref_url="https://bugzilla.suse.com/1005878" source="BUGZILLA"/>
		<reference ref_id="1019334" ref_url="https://bugzilla.suse.com/1019334" source="BUGZILLA"/>
		<reference ref_id="1021641" ref_url="https://bugzilla.suse.com/1021641" source="BUGZILLA"/>
		<reference ref_id="984663" ref_url="https://bugzilla.suse.com/984663" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002670.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)

Security issues fixed:
- CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334)
- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)
- degrade 3DES to MEDIUM in SSL2 (bsc#1001912)
- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)

Bugs fixed:
- fix crash in openssl speed (bsc#1000677)
- don't attempt session resumption if no ticket is present and session
  ID length is zero (bsc#984663)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-01"/>
	<updated date="2017-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000677">SUSE bug 1000677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001912">SUSE bug 1001912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004499">SUSE bug 1004499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019334">SUSE bug 1019334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984663">SUSE bug 984663</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2108">CVE-2016-2108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7056">CVE-2016-7056 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8610">CVE-2016-8610 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584439" comment="libopenssl0_9_8-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584440" comment="libopenssl0_9_8-32bit-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584441" comment="libopenssl0_9_8-hmac-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584442" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584443" comment="libopenssl0_9_8-x86-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584444" comment="openssl-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584445" comment="openssl-doc-0.9.8j-0.105.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584439" comment="libopenssl0_9_8-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584440" comment="libopenssl0_9_8-32bit-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584441" comment="libopenssl0_9_8-hmac-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584442" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584443" comment="libopenssl0_9_8-x86-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584444" comment="openssl-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584445" comment="openssl-doc-0.9.8j-0.105.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220280" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1087102" ref_url="https://bugzilla.suse.com/1087102" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003897.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

-  CVE-2018-0739: Constructed ASN.1 types with a recursive definition could exceed
    the stack. This could result in a Denial Of Service attack. (bsc#1087102)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-18"/>
	<updated date="2018-04-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087102">SUSE bug 1087102</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0739">CVE-2018-0739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584446" comment="libopenssl0_9_8-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584447" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584448" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584449" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584450" comment="libopenssl0_9_8-x86-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584451" comment="openssl-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584452" comment="openssl-doc-0.9.8j-0.106.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584446" comment="libopenssl0_9_8-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584447" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584448" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584449" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584450" comment="libopenssl0_9_8-x86-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584451" comment="openssl-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584452" comment="openssl-doc-0.9.8j-0.106.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220281" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="1097624" ref_url="https://bugzilla.suse.com/1097624" source="BUGZILLA"/>
		<reference ref_id="1098592" ref_url="https://bugzilla.suse.com/1098592" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004375.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based
  ciphersuite a malicious server could have sent a very large prime value to the
  client. This caused the client to spend an unreasonably long period of time
  generating a key for this prime resulting in a hang until the client has
  finished. This could be exploited in a Denial Of Service attack (bsc#1097158).
- Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-06"/>
	<updated date="2018-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097624">SUSE bug 1097624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098592">SUSE bug 1098592</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0732">CVE-2018-0732 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584453" comment="libopenssl0_9_8-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584454" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584455" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584456" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584457" comment="libopenssl0_9_8-x86-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584458" comment="openssl-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584459" comment="openssl-doc-0.9.8j-0.106.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584453" comment="libopenssl0_9_8-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584454" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584455" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584456" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584457" comment="libopenssl0_9_8-x86-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584458" comment="openssl-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584459" comment="openssl-doc-0.9.8j-0.106.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220282" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1089039" ref_url="https://bugzilla.suse.com/1089039" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004495.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following security issue:

- CVE-2018-0737: The RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could have recovered the private key (bsc#1089039)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-23"/>
	<updated date="2018-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089039">SUSE bug 1089039</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0737">CVE-2018-0737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584460" comment="libopenssl0_9_8-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584461" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584462" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584463" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584464" comment="libopenssl0_9_8-x86-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584465" comment="openssl-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584466" comment="openssl-doc-0.9.8j-0.106.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584460" comment="libopenssl0_9_8-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584461" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584462" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584463" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584464" comment="libopenssl0_9_8-x86-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584465" comment="openssl-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584466" comment="openssl-doc-0.9.8j-0.106.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220283" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1104789" ref_url="https://bugzilla.suse.com/1104789" source="BUGZILLA"/>
		<reference ref_id="1110018" ref_url="https://bugzilla.suse.com/1110018" source="BUGZILLA"/>
		<reference ref_id="1113534" ref_url="https://bugzilla.suse.com/1113534" source="BUGZILLA"/>
		<reference ref_id="1113652" ref_url="https://bugzilla.suse.com/1113652" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005002.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed:

- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).
- Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-27"/>
	<updated date="2018-12-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104789">SUSE bug 1104789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110018">SUSE bug 1110018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8610">CVE-2016-8610 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0734">CVE-2018-0734 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5407">CVE-2018-5407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584467" comment="libopenssl0_9_8-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584468" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584469" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584470" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584471" comment="libopenssl0_9_8-x86-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584472" comment="openssl-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584473" comment="openssl-doc-0.9.8j-0.106.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584467" comment="libopenssl0_9_8-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584468" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584469" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584470" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584471" comment="libopenssl0_9_8-x86-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584472" comment="openssl-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584473" comment="openssl-doc-0.9.8j-0.106.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220284" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1127080" ref_url="https://bugzilla.suse.com/1127080" source="BUGZILLA"/>
		<reference ref_id="1131291" ref_url="https://bugzilla.suse.com/1131291" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005582.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed:

- CVE-2019-1559: Fix 0-byte record padding oracle via SSL_shutdown (bsc#1127080)
- Reject invalid EC point coordinates (bsc#1131291)
- Mitigate the 'The 9 Lives of Bleichenbacher's CAT: Cache ATtacks on TLS Implementations' attack (bsc#1117951)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-11"/>
	<updated date="2019-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131291">SUSE bug 1131291</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1559">CVE-2019-1559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584474" comment="libopenssl0_9_8-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584475" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584476" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584477" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584478" comment="openssl-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584479" comment="openssl-doc-0.9.8j-0.106.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220285" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1150003" ref_url="https://bugzilla.suse.com/1150003" source="BUGZILLA"/>
		<reference ref_id="1150250" ref_url="https://bugzilla.suse.com/1150250" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005936.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

OpenSSL Security Advisory [10 September 2019]

- CVE-2019-1547: Added EC_GROUP_set_generator side channel attack avoidance (bsc#1150003).
- CVE-2019-1563: Fixed Bleichenbacher attack against cms/pkcs7 encryption transported key (bsc#1150250).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-19"/>
	<updated date="2019-09-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1547">CVE-2019-1547 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1563">CVE-2019-1563 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584480" comment="libopenssl0_9_8-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584481" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584482" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584483" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584484" comment="openssl-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584485" comment="openssl-doc-0.9.8j-0.106.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220286" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1153785" ref_url="https://bugzilla.suse.com/1153785" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006250.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- Included the missing cms and pk7 fixes of CVE-2019-1563 (bsc#1153785).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-12"/>
	<updated date="2019-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153785">SUSE bug 1153785</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1563">CVE-2019-1563 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584486" comment="libopenssl0_9_8-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584487" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584488" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584489" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584490" comment="openssl-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584491" comment="openssl-doc-0.9.8j-0.106.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220287" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1160163" ref_url="https://bugzilla.suse.com/1160163" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2020:14295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006542.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- Add missing commits for fixing the security issue called 'The 9 Lives of Bleichenbacher's CAT'. (bsc#1117951)
- Fix a memory leak problem in function 'BN_copy()'. (bsc#1160163)
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-27"/>
	<updated date="2020-02-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160163">SUSE bug 1160163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584492" comment="libopenssl0_9_8-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584493" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584494" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584495" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584496" comment="openssl-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584497" comment="openssl-doc-0.9.8j-0.106.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220288" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1176331" ref_url="https://bugzilla.suse.com/1176331" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1968" ref_url="https://www.suse.com/security/cve/CVE-2020-1968/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007429.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2020-1968: Introduced hardening against the Raccoon attack by always generating fresh DH keys 
  and never reuse them across multiple TLS connections (bsc#1176331).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-15"/>
	<updated date="2020-09-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176331">SUSE bug 1176331</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1968/">CVE-2020-1968 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1968">CVE-2020-1968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584498" comment="libopenssl0_9_8-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584499" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584500" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584501" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584502" comment="openssl-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584503" comment="openssl-doc-0.9.8j-0.106.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220289" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1182331" ref_url="https://bugzilla.suse.com/1182331" source="BUGZILLA"/>
		<reference ref_id="1182333" ref_url="https://bugzilla.suse.com/1182333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008528.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-23840: Fixed an Integer overflow in CipherUpdate (bsc#1182333)
- CVE-2021-23841: Fixed a Null pointer dereference in X509_issuer_and_serial_hash() (bsc#1182331)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-19"/>
	<updated date="2021-03-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182331">SUSE bug 1182331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23840">CVE-2021-23840 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23841">CVE-2021-23841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584504" comment="libopenssl0_9_8-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584505" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584506" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584507" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584508" comment="openssl-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584509" comment="openssl-doc-0.9.8j-0.106.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220290" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009339.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following security issue:

- CVE-2021-3712: a bug in the code for printing certificate details could lead
  to a buffer overrun that a malicious actor could exploit to crash the
  application, causing a denial-of-service attack. [bsc#1189521]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631752" comment="libopenssl0_9_8-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631753" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631754" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631755" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631756" comment="openssl-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631757" comment="openssl-doc-0.9.8j-0.106.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220291" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009465.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-3712: This is an update for the incomplete fix for CVE-2021-3712. 
  Read buffer overruns processing ASN.1 strings (bsc#1189521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-18"/>
	<updated date="2021-09-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632467" comment="libopenssl0_9_8-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632468" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632469" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632470" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632471" comment="openssl-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632472" comment="openssl-doc-0.9.8j-0.106.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220292" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010454.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2022-0778: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673436" comment="libopenssl0_9_8-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673437" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673438" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673439" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673440" comment="openssl-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673441" comment="openssl-doc-0.9.8j-0.106.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220293" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1044947" ref_url="https://bugzilla.suse.com/1044947" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7508" ref_url="https://www.suse.com/security/cve/CVE-2017-7508/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002970.html" source="SUSE-SU"/>
		<description>
This update for openvpn fixes the following issues:

- It was possible to trigger an assertion by sending a malformed IPv6 packet.
  That issue could have been abused to remotely shutdown an openvpn server or
  client, if IPv6 and --mssfix were enabled and if the IPv6 networks used
  inside the VPN were known. [bsc#1044947, CVE-2017-7508]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-21"/>
	<updated date="2017-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1044947">SUSE bug 1044947</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7508/">CVE-2017-7508 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7508">CVE-2017-7508 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584510" comment="openvpn-2.0.9-143.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584511" comment="openvpn-auth-pam-plugin-2.0.9-143.46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584510" comment="openvpn-2.0.9-143.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584511" comment="openvpn-auth-pam-plugin-2.0.9-143.46.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220294" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1038709" ref_url="https://bugzilla.suse.com/1038709" source="BUGZILLA"/>
		<reference ref_id="1038711" ref_url="https://bugzilla.suse.com/1038711" source="BUGZILLA"/>
		<reference ref_id="1038713" ref_url="https://bugzilla.suse.com/1038713" source="BUGZILLA"/>
		<reference ref_id="1060877" ref_url="https://bugzilla.suse.com/1060877" source="BUGZILLA"/>
		<reference ref_id="995374" ref_url="https://bugzilla.suse.com/995374" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6329" ref_url="https://www.suse.com/security/cve/CVE-2016-6329/" source="CVE"/>
		<reference ref_id="CVE-2017-12166" ref_url="https://www.suse.com/security/cve/CVE-2017-12166/" source="CVE"/>
		<reference ref_id="CVE-2017-7478" ref_url="https://www.suse.com/security/cve/CVE-2017-7478/" source="CVE"/>
		<reference ref_id="CVE-2017-7479" ref_url="https://www.suse.com/security/cve/CVE-2017-7479/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003351.html" source="SUSE-SU"/>
		<description>


This update for openvpn fixes the following security issues:

- CVE-2017-12166: OpenVPN was vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution. (bsc#1060877).
- CVE-2016-6329: Now show which ciphers should no longer be used in openvpn --show-ciphers to avoid the SWEET32 attack (bsc#995374)
- CVE-2017-7478: OpenVPN was vulnerable to unauthenticated Denial of Service of server via received large control packet. (bsc#1038709)
- CVE-2017-7479: OpenVPN was vulnerable to reachable assertion when packet-ID counter rolls over resulting into Denial of Service of server by authenticated attacker. (bsc#1038711)
- Some other hardening fixes have also been applied (bsc#1038713)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-24"/>
	<updated date="2017-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038709">SUSE bug 1038709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038711">SUSE bug 1038711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038713">SUSE bug 1038713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060877">SUSE bug 1060877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995374">SUSE bug 995374</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6329/">CVE-2016-6329 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6329">CVE-2016-6329 at NVD</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12166/">CVE-2017-12166 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12166">CVE-2017-12166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7478/">CVE-2017-7478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7478">CVE-2017-7478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7479/">CVE-2017-7479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7479">CVE-2017-7479 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584512" comment="openvpn-2.0.9-143.47.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584513" comment="openvpn-auth-pam-plugin-2.0.9-143.47.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584512" comment="openvpn-2.0.9-143.47.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584513" comment="openvpn-auth-pam-plugin-2.0.9-143.47.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220295" version="1" class="patch">
	<metadata>
		<title>Security update for openwsman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1122623" ref_url="https://bugzilla.suse.com/1122623" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3816" ref_url="https://www.suse.com/security/cve/CVE-2019-3816/" source="CVE"/>
		<reference ref_id="CVE-2019-3833" ref_url="https://www.suse.com/security/cve/CVE-2019-3833/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13981-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913981-1.html" source="SUSE-SU"/>
		<description>
This update for openwsman fixes the following issues:

Security issues fixed:

- CVE-2019-3816: Fixed a vulnerability in openwsmand deamon which could lead to arbitary file disclosure (bsc#1122623).
- CVE-2019-3833: Fixed a vulnerability in process_connection() which could allow an attacker to trigger an infinite
  loop which leads to Denial of Service (bsc#1122623).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-18"/>
	<updated date="2019-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122623">SUSE bug 1122623</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3816/">CVE-2019-3816 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3816">CVE-2019-3816 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3833/">CVE-2019-3833 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3833">CVE-2019-3833 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584514" comment="libwsman1-2.2.3-0.16.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584515" comment="openwsman-client-2.2.3-0.16.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584516" comment="openwsman-server-2.2.3-0.16.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584514" comment="libwsman1-2.2.3-0.16.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584515" comment="openwsman-client-2.2.3-0.16.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584516" comment="openwsman-server-2.2.3-0.16.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220296" version="1" class="patch">
	<metadata>
		<title>Security update for orca (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="916835" ref_url="https://bugzilla.suse.com/916835" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4245" ref_url="https://www.suse.com/security/cve/CVE-2013-4245/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001710.html" source="SUSE-SU"/>
		<description>
This orca update fixes the following security issue.

- Don't try to import modules from current working directory (bsc#916835, CVE-2013-4245).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-02"/>
	<updated date="2015-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/916835">SUSE bug 916835</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4245/">CVE-2013-4245 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4245">CVE-2013-4245 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579362" comment="orca-2.28.3-0.5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579363" comment="orca-lang-2.28.3-0.5.10 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579362" comment="orca-2.28.3-0.5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579363" comment="orca-lang-2.28.3-0.5.10 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220297" version="1" class="patch">
	<metadata>
		<title>Security update for pam (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="854480" ref_url="https://bugzilla.suse.com/854480" source="BUGZILLA"/>
		<reference ref_id="934920" ref_url="https://bugzilla.suse.com/934920" source="BUGZILLA"/>
		<reference ref_id="962220" ref_url="https://bugzilla.suse.com/962220" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7041" ref_url="https://www.suse.com/security/cve/CVE-2013-7041/" source="CVE"/>
		<reference ref_id="CVE-2015-3238" ref_url="https://www.suse.com/security/cve/CVE-2015-3238/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002134.html" source="SUSE-SU"/>
		<description>
This update for pam fixes two security issues.

These security issues were fixed:
- CVE-2015-3238: pam_unix in conjunction with SELinux allowed for DoS attacks (bsc#934920).
- CVE-2013-7041: Compare password hashes case-sensitively (bsc#854480).

This non-security issue was fixed:
- bsc#962220: Don't fail when /var/log/btmp is corrupted
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-21"/>
	<updated date="2016-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/854480">SUSE bug 854480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934920">SUSE bug 934920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962220">SUSE bug 962220</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7041/">CVE-2013-7041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7041">CVE-2013-7041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3238/">CVE-2015-3238 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3238">CVE-2015-3238 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584517" comment="pam-1.1.5-0.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584518" comment="pam-32bit-1.1.5-0.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584519" comment="pam-doc-1.1.5-0.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584520" comment="pam-x86-1.1.5-0.17.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584517" comment="pam-1.1.5-0.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584518" comment="pam-32bit-1.1.5-0.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584519" comment="pam-doc-1.1.5-0.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584520" comment="pam-x86-1.1.5-0.17.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220298" version="1" class="patch">
	<metadata>
		<title>Security update for pam-modules (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="707645" ref_url="https://bugzilla.suse.com/707645" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3172" ref_url="https://www.suse.com/security/cve/CVE-2011-3172/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004204.html" source="SUSE-SU"/>
		<description>
This update for pam-modules fixes the following security issue:

- CVE-2011-3172: Ensure that unix2_chkpwd calls pam_acct_mgmt to prevent usage
  of locked accounts (bsc#707645).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-20"/>
	<updated date="2018-06-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/707645">SUSE bug 707645</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3172/">CVE-2011-3172 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3172">CVE-2011-3172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584521" comment="pam-modules-11-1.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584522" comment="pam-modules-32bit-11-1.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584523" comment="pam-modules-x86-11-1.27.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584521" comment="pam-modules-11-1.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584522" comment="pam-modules-32bit-11-1.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584523" comment="pam-modules-x86-11-1.27.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220299" version="1" class="patch">
	<metadata>
		<title>Security update for pam_pkcs11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1105012" ref_url="https://bugzilla.suse.com/1105012" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:2843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004594.html" source="SUSE-SU"/>
		<description>
This update for pam_pkcs11 fixes the following security issues:

- It was possible to replay an authentication by using a specially prepared smartcard or token (bsc#1105012)
- Prevent buffer overflow if a user has a home directory with a length of more than 512 bytes (bsc#1105012)
- Memory not cleaned properly before free() (bsc#1105012)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1105012">SUSE bug 1105012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584524" comment="pam_pkcs11-0.6.0-141.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584525" comment="pam_pkcs11-32bit-0.6.0-141.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584526" comment="pam_pkcs11-x86-0.6.0-141.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584524" comment="pam_pkcs11-0.6.0-141.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584525" comment="pam_pkcs11-32bit-0.6.0-141.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584526" comment="pam_pkcs11-x86-0.6.0-141.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220300" version="1" class="patch">
	<metadata>
		<title>Security update for patch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1059698" ref_url="https://bugzilla.suse.com/1059698" source="BUGZILLA"/>
		<reference ref_id="1080918" ref_url="https://bugzilla.suse.com/1080918" source="BUGZILLA"/>
		<reference ref_id="1088420" ref_url="https://bugzilla.suse.com/1088420" source="BUGZILLA"/>
		<reference ref_id="662957" ref_url="https://bugzilla.suse.com/662957" source="BUGZILLA"/>
		<reference ref_id="914891" ref_url="https://bugzilla.suse.com/914891" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-4651" ref_url="https://www.suse.com/security/cve/CVE-2010-4651/" source="CVE"/>
		<reference ref_id="CVE-2014-9637" ref_url="https://www.suse.com/security/cve/CVE-2014-9637/" source="CVE"/>
		<reference ref_id="CVE-2016-10713" ref_url="https://www.suse.com/security/cve/CVE-2016-10713/" source="CVE"/>
		<reference ref_id="CVE-2018-1000156" ref_url="https://www.suse.com/security/cve/CVE-2018-1000156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003975.html" source="SUSE-SU"/>
		<description>
This update for patch fixes several issues.

These security issues were fixed:

- CVE-2018-1000156: patch: Malicious patch files cause ed to execute arbitrary commands (bsc#1088420).
- CVE-2014-9637: Prevent DoS by remote attackers (memory consumption and
  segmentation fault) via a crafted diff file (bsc#914891).
- CVE-2016-10713: Prevent out-of-bounds access within pch_write_line() that
  could have lead to DoS via a crafted input file (bsc#1080918).
- CVE-2010-4651: Fixed a directory traversal bug (bsc#662957):

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-07"/>
	<updated date="2018-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059698">SUSE bug 1059698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080918">SUSE bug 1080918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088420">SUSE bug 1088420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662957">SUSE bug 662957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914891">SUSE bug 914891</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4651/">CVE-2010-4651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4651">CVE-2010-4651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9637/">CVE-2014-9637 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9637">CVE-2014-9637 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10713/">CVE-2016-10713 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10713">CVE-2016-10713 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000156/">CVE-2018-1000156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000156">CVE-2018-1000156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584527" comment="patch-2.5.9-252.22.7.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584527" comment="patch-2.5.9-252.22.7.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220301" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="929027" ref_url="https://bugzilla.suse.com/929027" source="BUGZILLA"/>
		<reference ref_id="967082" ref_url="https://bugzilla.suse.com/967082" source="BUGZILLA"/>
		<reference ref_id="987887" ref_url="https://bugzilla.suse.com/987887" source="BUGZILLA"/>
		<reference ref_id="988311" ref_url="https://bugzilla.suse.com/988311" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8853" ref_url="https://www.suse.com/security/cve/CVE-2015-8853/" source="CVE"/>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<reference ref_id="CVE-2016-2381" ref_url="https://www.suse.com/security/cve/CVE-2016-2381/" source="CVE"/>
		<reference ref_id="CVE-2016-6185" ref_url="https://www.suse.com/security/cve/CVE-2016-6185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002256.html" source="SUSE-SU"/>
		<description>

This update for perl fixes the following issues:

- CVE-2016-6185: xsloader looking at a '(eval)' directory [bsc#988311]
  
- CVE-2016-1238: searching current directory for optional modules [bsc#987887]

- CVE-2015-8853: regex engine hanging on bad utf8 [bnc976584]

- CVE-2016-2381: environment dup handling bug [bsc#967082]

- perl panic with utf8_mg_pos_cache_update [bsc#929027]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-06"/>
	<updated date="2016-09-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/929027">SUSE bug 929027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967082">SUSE bug 967082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987887">SUSE bug 987887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988311">SUSE bug 988311</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8853/">CVE-2015-8853 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8853">CVE-2015-8853 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1238">CVE-2016-1238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2381/">CVE-2016-2381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2381">CVE-2016-2381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6185/">CVE-2016-6185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6185">CVE-2016-6185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584528" comment="perl-5.10.0-64.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584529" comment="perl-32bit-5.10.0-64.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584530" comment="perl-Module-Build-0.2808.01-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584531" comment="perl-Test-Simple-0.72-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584532" comment="perl-base-5.10.0-64.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584533" comment="perl-doc-5.10.0-64.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584534" comment="perl-x86-5.10.0-64.80.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584528" comment="perl-5.10.0-64.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584529" comment="perl-32bit-5.10.0-64.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584530" comment="perl-Module-Build-0.2808.01-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584531" comment="perl-Test-Simple-0.72-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584532" comment="perl-base-5.10.0-64.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584533" comment="perl-doc-5.10.0-64.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584534" comment="perl-x86-5.10.0-64.80.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220302" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1047178" ref_url="https://bugzilla.suse.com/1047178" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6512" ref_url="https://www.suse.com/security/cve/CVE-2017-6512/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003383.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

Security issue fixed:
- CVE-2017-6512: Race condition in the rmtree and remove_tree functions in the
  File-Path module before 2.13 for Perl allows attackers to set the mode on
  arbitrary files via vectors involving directory-permission loosening logic.
  (bnc#1047178)

Bug fixes:
- reformat baselibs.conf as source validator workaround
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-08"/>
	<updated date="2017-11-08"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1047178">SUSE bug 1047178</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-6512/">CVE-2017-6512 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6512">CVE-2017-6512 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584535" comment="perl-5.10.0-64.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584536" comment="perl-32bit-5.10.0-64.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584537" comment="perl-Module-Build-0.2808.01-0.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584538" comment="perl-Test-Simple-0.72-0.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584539" comment="perl-base-5.10.0-64.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584540" comment="perl-doc-5.10.0-64.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584541" comment="perl-x86-5.10.0-64.81.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584535" comment="perl-5.10.0-64.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584536" comment="perl-32bit-5.10.0-64.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584537" comment="perl-Module-Build-0.2808.01-0.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584538" comment="perl-Test-Simple-0.72-0.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584539" comment="perl-base-5.10.0-64.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584540" comment="perl-doc-5.10.0-64.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584541" comment="perl-x86-5.10.0-64.81.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220303" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1082216" ref_url="https://bugzilla.suse.com/1082216" source="BUGZILLA"/>
		<reference ref_id="1082233" ref_url="https://bugzilla.suse.com/1082233" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6798" ref_url="https://www.suse.com/security/cve/CVE-2018-6798/" source="CVE"/>
		<reference ref_id="CVE-2018-6913" ref_url="https://www.suse.com/security/cve/CVE-2018-6913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003898.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

Security issue fixed:

- CVE-2018-6913: Fixed space calculation issues in pp_pack.c (bsc#1082216).
- CVE-2018-6798: Fixed heap buffer overflow in regexec.c (bsc#1082233).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-18"/>
	<updated date="2018-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082216">SUSE bug 1082216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082233">SUSE bug 1082233</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6798/">CVE-2018-6798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6798">CVE-2018-6798 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6913/">CVE-2018-6913 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6913">CVE-2018-6913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584542" comment="perl-5.10.0-64.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584543" comment="perl-32bit-5.10.0-64.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584544" comment="perl-Module-Build-0.2808.01-0.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584545" comment="perl-Test-Simple-0.72-0.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584546" comment="perl-base-5.10.0-64.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584547" comment="perl-doc-5.10.0-64.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584548" comment="perl-x86-5.10.0-64.81.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584542" comment="perl-5.10.0-64.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584543" comment="perl-32bit-5.10.0-64.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584544" comment="perl-Module-Build-0.2808.01-0.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584545" comment="perl-Test-Simple-0.72-0.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584546" comment="perl-base-5.10.0-64.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584547" comment="perl-doc-5.10.0-64.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584548" comment="perl-x86-5.10.0-64.81.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220304" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1096718" ref_url="https://bugzilla.suse.com/1096718" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12015" ref_url="https://www.suse.com/security/cve/CVE-2018-12015/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004286.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

- CVE-2018-12015: The Archive::Tar module allowed remote attackers to bypass a
  directory-traversal protection mechanism and overwrite arbitrary files
  (bsc#1096718).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-19"/>
	<updated date="2018-07-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1096718">SUSE bug 1096718</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12015/">CVE-2018-12015 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12015">CVE-2018-12015 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584549" comment="perl-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584550" comment="perl-32bit-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584551" comment="perl-Module-Build-0.2808.01-0.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584552" comment="perl-Test-Simple-0.72-0.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584553" comment="perl-base-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584554" comment="perl-doc-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584555" comment="perl-x86-5.10.0-64.81.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584549" comment="perl-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584550" comment="perl-32bit-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584551" comment="perl-Module-Build-0.2808.01-0.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584552" comment="perl-Test-Simple-0.72-0.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584553" comment="perl-base-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584554" comment="perl-doc-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584555" comment="perl-x86-5.10.0-64.81.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220305" version="1" class="patch">
	<metadata>
		<title>Security update for perl-Archive-Zip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1099497" ref_url="https://bugzilla.suse.com/1099497" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10860" ref_url="https://www.suse.com/security/cve/CVE-2018-10860/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004456.html" source="SUSE-SU"/>
		<description>
This update for perl-Archive-Zip fixes the following security issue:

- CVE-2018-10860: Prevent directory traversal caused by not properly sanitizing
  paths while extracting zip files. An attacker able to provide a specially
  crafted archive for processing could have used this flaw to write or overwrite
  arbitrary files in the context of the perl interpreter (bsc#1099497).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1099497">SUSE bug 1099497</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-10860/">CVE-2018-10860 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10860">CVE-2018-10860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584556" comment="perl-Archive-Zip-1.24-4.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584556" comment="perl-Archive-Zip-1.24-4.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220306" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBD-mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1012546" ref_url="https://bugzilla.suse.com/1012546" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1251" ref_url="https://www.suse.com/security/cve/CVE-2016-1251/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002543.html" source="SUSE-SU"/>
		<description>

This update for perl-DBD-mysql fixes the following issues:

- Add patch to fix CVE-2016-1251 (bsc#1012546) use-after-free for repeated
  fetchrow_arrayref calls when mysql_server_prepare=1

		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-04"/>
	<updated date="2017-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1012546">SUSE bug 1012546</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1251/">CVE-2016-1251 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1251">CVE-2016-1251 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584557" comment="perl-DBD-mysql-4.008-6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584557" comment="perl-DBD-mysql-4.008-6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220307" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBD-mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1002626" ref_url="https://bugzilla.suse.com/1002626" source="BUGZILLA"/>
		<reference ref_id="1010457" ref_url="https://bugzilla.suse.com/1010457" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1246" ref_url="https://www.suse.com/security/cve/CVE-2016-1246/" source="CVE"/>
		<reference ref_id="CVE-2016-1249" ref_url="https://www.suse.com/security/cve/CVE-2016-1249/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002559.html" source="SUSE-SU"/>
		<description>

This update for perl-DBD-mysql fixes the following issues:

- CVE-2016-1246: Buffer overflow allowed context-dependent attackers to cause a denial of service (crash) via vectors related to an error message (bsc#1002626).
- CVE-2016-1249: Out-of-bounds read when using server-side prepared statement support (bsc#1010457).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-13"/>
	<updated date="2017-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002626">SUSE bug 1002626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010457">SUSE bug 1010457</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1246/">CVE-2016-1246 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1246">CVE-2016-1246 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1249/">CVE-2016-1249 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1249">CVE-2016-1249 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584558" comment="perl-DBD-mysql-4.008-9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584558" comment="perl-DBD-mysql-4.008-9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220308" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBD-mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1047059" ref_url="https://bugzilla.suse.com/1047059" source="BUGZILLA"/>
		<reference ref_id="1047095" ref_url="https://bugzilla.suse.com/1047095" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10788" ref_url="https://www.suse.com/security/cve/CVE-2017-10788/" source="CVE"/>
		<reference ref_id="CVE-2017-10789" ref_url="https://www.suse.com/security/cve/CVE-2017-10789/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004092.html" source="SUSE-SU"/>
		<description>
This update for perl-DBD-mysql fixes the following issues:

- CVE-2017-10789: The DBD::mysql module when with mysql_ssl=1 setting enabled, means that SSL is optional 
(even though this setting's documentation has a \'your communication with the server will be encrypted\' statement), 
which could lead man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, 
a related issue to CVE-2015-3152. (bsc#1047059)
- CVE-2017-10788: The DBD::mysql module through 4.043 for Perl allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by triggering (1) certain error responses from a MySQL server or (2) a loss of a network connection to a MySQL server. The use-after-free defect was introduced by relying on incorrect Oracle mysql_stmt_close documentation and code examples. (bsc#1047095)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-28"/>
	<updated date="2018-05-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047059">SUSE bug 1047059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047095">SUSE bug 1047095</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10788/">CVE-2017-10788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10788">CVE-2017-10788 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10789/">CVE-2017-10789 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10789">CVE-2017-10789 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584559" comment="perl-DBD-mysql-4.008-10.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584559" comment="perl-DBD-mysql-4.008-10.5.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220309" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1176409" ref_url="https://bugzilla.suse.com/1176409" source="BUGZILLA"/>
		<reference ref_id="1176412" ref_url="https://bugzilla.suse.com/1176412" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14392" ref_url="https://www.suse.com/security/cve/CVE-2020-14392/" source="CVE"/>
		<reference ref_id="CVE-2020-14393" ref_url="https://www.suse.com/security/cve/CVE-2020-14393/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007430.html" source="SUSE-SU"/>
		<description>
This update for perl-DBI fixes the following issues:

Security issues fixed:

- CVE-2020-14392: Memory corruption in XS functions when Perl stack is reallocated (bsc#1176412).
- CVE-2020-14393: Fixed a buffer overflow on an overlong DBD class name (bsc#1176409).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176409">SUSE bug 1176409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176412">SUSE bug 1176412</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14392/">CVE-2020-14392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14392">CVE-2020-14392 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14393/">CVE-2020-14393 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14393">CVE-2020-14393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584560" comment="perl-DBI-1.607-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220310" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1176493" ref_url="https://bugzilla.suse.com/1176493" source="BUGZILLA"/>
		<reference ref_id="1176496" ref_url="https://bugzilla.suse.com/1176496" source="BUGZILLA"/>
		<reference ref_id="1176764" ref_url="https://bugzilla.suse.com/1176764" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7490" ref_url="https://www.suse.com/security/cve/CVE-2013-7490/" source="CVE"/>
		<reference ref_id="CVE-2013-7491" ref_url="https://www.suse.com/security/cve/CVE-2013-7491/" source="CVE"/>
		<reference ref_id="CVE-2019-20919" ref_url="https://www.suse.com/security/cve/CVE-2019-20919/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007520.html" source="SUSE-SU"/>
		<description>
This update for perl-DBI fixes the following issues:

- CVE-2019-20919: Fixed a NULL profile dereference in dbi_profile (bsc#1176764).
- CVE-2013-7490: Fixed memory corruption when using many arguments 
  to methods for CallbacksUsing (bsc#1176496).	  
- CVE-2013-7491: Fixed a stack corruption when a user-defined function required a
  non-trivial amount of memory (bsc#1176493).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176493">SUSE bug 1176493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176496">SUSE bug 1176496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176764">SUSE bug 1176764</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-7490/">CVE-2013-7490 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7490">CVE-2013-7490 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-7491/">CVE-2013-7491 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7491">CVE-2013-7491 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20919/">CVE-2019-20919 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20919">CVE-2019-20919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584561" comment="perl-DBI-1.607-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220311" version="1" class="patch">
	<metadata>
		<title>Security update for perl-XML-LibXML (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1046848" ref_url="https://bugzilla.suse.com/1046848" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10672" ref_url="https://www.suse.com/security/cve/CVE-2017-10672/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003615.html" source="SUSE-SU"/>
		<description>
This update for perl-XML-LibXML fixes the following issues:

- CVE-2017-10672: A use-after-free allowed remote attackers to potentially
  execute arbitrary code by controlling the arguments to a replaceChild call
  (bsc#1046848)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-22"/>
	<updated date="2018-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046848">SUSE bug 1046848</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-10672/">CVE-2017-10672 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10672">CVE-2017-10672 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584562" comment="perl-XML-LibXML-1.66-3.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584562" comment="perl-XML-LibXML-1.66-3.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220312" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1150734" ref_url="https://bugzilla.suse.com/1150734" source="BUGZILLA"/>
		<reference ref_id="1157198" ref_url="https://bugzilla.suse.com/1157198" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3690" ref_url="https://www.suse.com/security/cve/CVE-2019-3690/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006220.html" source="SUSE-SU"/>
		<description>
This update for permissions fixes the following issues:

- CVE-2019-3690: Fixed a privilege escalation through untrusted symlinks (bsc#1150734). 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150734">SUSE bug 1150734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157198">SUSE bug 1157198</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3690/">CVE-2019-3690 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3690">CVE-2019-3690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584563" comment="permissions-2013.1.7-0.6.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220313" version="1" class="patch">
	<metadata>
		<title>Recommended update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1160594" ref_url="https://bugzilla.suse.com/1160594" source="BUGZILLA"/>
		<reference ref_id="1160764" ref_url="https://bugzilla.suse.com/1160764" source="BUGZILLA"/>
		<reference ref_id="1163922" ref_url="https://bugzilla.suse.com/1163922" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8013" ref_url="https://www.suse.com/security/cve/CVE-2020-8013/" source="CVE"/>
		<reference ref_id="SUSE-RU-2020:14304-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-February/013970.html" source="SUSE-SU"/>
		<description>
This update for permissions fixes the following issues:

Security issues fixed:

- CVE-2020-8013: Fixed a missing symlink check. Do not follow symlinks that are the final path element (bsc#1163922).
- Fixed a regression where chkstat broke when /proc was not available (bsc#1160764, bsc#1160594).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-28"/>
	<updated date="2020-02-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1160594">SUSE bug 1160594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160764">SUSE bug 1160764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163922">SUSE bug 1163922</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8013/">CVE-2020-8013 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8013">CVE-2020-8013 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594270" comment="permissions-2013.1.7-0.6.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220314" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="938719" ref_url="https://bugzilla.suse.com/938719" source="BUGZILLA"/>
		<reference ref_id="938721" ref_url="https://bugzilla.suse.com/938721" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5589" ref_url="https://www.suse.com/security/cve/CVE-2015-5589/" source="CVE"/>
		<reference ref_id="CVE-2015-5590" ref_url="https://www.suse.com/security/cve/CVE-2015-5590/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001558.html" source="SUSE-SU"/>
		<description>
PHP was updated to fix two security issues.

The following vulnerabilities were fixed:

* CVE-2015-5589: PHP could be crashed when processing an invalid file with the 'phar' extension with a segfault in Phar::convertToData, leading to Denial of Service (DOS) (bsc#938721)
* CVE-2015-5590: PHP could be crashed or have unspecified other impact due to a buffer overlow in phar_fix_filepath (bsc#938719)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-29"/>
	<updated date="2015-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/938719">SUSE bug 938719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938721">SUSE bug 938721</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5589/">CVE-2015-5589 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5589">CVE-2015-5589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5590/">CVE-2015-5590 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5590">CVE-2015-5590 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579405" comment="apache2-mod_php53-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579406" comment="php53-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579407" comment="php53-bcmath-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579408" comment="php53-bz2-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579409" comment="php53-calendar-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579410" comment="php53-ctype-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579411" comment="php53-curl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579412" comment="php53-dba-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579413" comment="php53-dom-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579414" comment="php53-exif-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579415" comment="php53-fastcgi-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579416" comment="php53-fileinfo-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579417" comment="php53-ftp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579418" comment="php53-gd-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579419" comment="php53-gettext-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579420" comment="php53-gmp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579421" comment="php53-iconv-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579422" comment="php53-intl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579423" comment="php53-json-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579424" comment="php53-ldap-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579425" comment="php53-mbstring-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579426" comment="php53-mcrypt-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579427" comment="php53-mysql-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579428" comment="php53-odbc-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579429" comment="php53-openssl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579430" comment="php53-pcntl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579431" comment="php53-pdo-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579432" comment="php53-pear-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579433" comment="php53-pgsql-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579434" comment="php53-pspell-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579435" comment="php53-shmop-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579436" comment="php53-snmp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579437" comment="php53-soap-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579438" comment="php53-suhosin-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579439" comment="php53-sysvmsg-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579440" comment="php53-sysvsem-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579441" comment="php53-sysvshm-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579442" comment="php53-tokenizer-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579443" comment="php53-wddx-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579444" comment="php53-xmlreader-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579445" comment="php53-xmlrpc-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579446" comment="php53-xmlwriter-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579447" comment="php53-xsl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579448" comment="php53-zip-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579449" comment="php53-zlib-5.3.17-45.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579405" comment="apache2-mod_php53-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579406" comment="php53-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579407" comment="php53-bcmath-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579408" comment="php53-bz2-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579409" comment="php53-calendar-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579410" comment="php53-ctype-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579411" comment="php53-curl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579412" comment="php53-dba-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579413" comment="php53-dom-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579414" comment="php53-exif-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579415" comment="php53-fastcgi-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579416" comment="php53-fileinfo-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579417" comment="php53-ftp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579418" comment="php53-gd-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579419" comment="php53-gettext-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579420" comment="php53-gmp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579421" comment="php53-iconv-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579422" comment="php53-intl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579423" comment="php53-json-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579424" comment="php53-ldap-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579425" comment="php53-mbstring-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579426" comment="php53-mcrypt-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579427" comment="php53-mysql-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579428" comment="php53-odbc-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579429" comment="php53-openssl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579430" comment="php53-pcntl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579431" comment="php53-pdo-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579432" comment="php53-pear-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579433" comment="php53-pgsql-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579434" comment="php53-pspell-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579435" comment="php53-shmop-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579436" comment="php53-snmp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579437" comment="php53-soap-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579438" comment="php53-suhosin-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579439" comment="php53-sysvmsg-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579440" comment="php53-sysvsem-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579441" comment="php53-sysvshm-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579442" comment="php53-tokenizer-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579443" comment="php53-wddx-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579444" comment="php53-xmlreader-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579445" comment="php53-xmlrpc-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579446" comment="php53-xmlwriter-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579447" comment="php53-xsl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579448" comment="php53-zip-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579449" comment="php53-zlib-5.3.17-45.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220315" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="935074" ref_url="https://bugzilla.suse.com/935074" source="BUGZILLA"/>
		<reference ref_id="942291" ref_url="https://bugzilla.suse.com/942291" source="BUGZILLA"/>
		<reference ref_id="942294" ref_url="https://bugzilla.suse.com/942294" source="BUGZILLA"/>
		<reference ref_id="942295" ref_url="https://bugzilla.suse.com/942295" source="BUGZILLA"/>
		<reference ref_id="942296" ref_url="https://bugzilla.suse.com/942296" source="BUGZILLA"/>
		<reference ref_id="945412" ref_url="https://bugzilla.suse.com/945412" source="BUGZILLA"/>
		<reference ref_id="945428" ref_url="https://bugzilla.suse.com/945428" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6831" ref_url="https://www.suse.com/security/cve/CVE-2015-6831/" source="CVE"/>
		<reference ref_id="CVE-2015-6833" ref_url="https://www.suse.com/security/cve/CVE-2015-6833/" source="CVE"/>
		<reference ref_id="CVE-2015-6836" ref_url="https://www.suse.com/security/cve/CVE-2015-6836/" source="CVE"/>
		<reference ref_id="CVE-2015-6837" ref_url="https://www.suse.com/security/cve/CVE-2015-6837/" source="CVE"/>
		<reference ref_id="CVE-2015-6838" ref_url="https://www.suse.com/security/cve/CVE-2015-6838/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001645.html" source="SUSE-SU"/>
		<description>

This update of PHP5 brings several security fixes.

Security fixes:
* CVE-2015-6831: A use after free vulnerability in unserialize() has been fixed which could be used to crash php or potentially execute code. [bnc#942291] [bnc#942294] [bnc#942295]
* CVE-2015-6836: A SOAP serialize_function_call() type confusion leading to remote code execution problem was fixed. [bnc#945428]
* CVE-2015-6837 CVE-2015-6838: Two NULL pointer dereferences in the XSLTProcessor class were fixed. [bnc#945412]

It also includes a bugfix for the odbc module:
* compare with SQL_NULL_DATA correctly [bnc#935074]
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-22"/>
	<updated date="2015-09-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/935074">SUSE bug 935074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942291">SUSE bug 942291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942294">SUSE bug 942294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942295">SUSE bug 942295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942296">SUSE bug 942296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945412">SUSE bug 945412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945428">SUSE bug 945428</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6831/">CVE-2015-6831 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6831">CVE-2015-6831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6833/">CVE-2015-6833 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6833">CVE-2015-6833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6836/">CVE-2015-6836 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6836">CVE-2015-6836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6837/">CVE-2015-6837 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6837">CVE-2015-6837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6838/">CVE-2015-6838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6838">CVE-2015-6838 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579450" comment="apache2-mod_php53-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579451" comment="php53-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579452" comment="php53-bcmath-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579453" comment="php53-bz2-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579454" comment="php53-calendar-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579455" comment="php53-ctype-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579456" comment="php53-curl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579457" comment="php53-dba-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579458" comment="php53-dom-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579459" comment="php53-exif-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579460" comment="php53-fastcgi-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579461" comment="php53-fileinfo-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579462" comment="php53-ftp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579463" comment="php53-gd-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579464" comment="php53-gettext-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579465" comment="php53-gmp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579466" comment="php53-iconv-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579467" comment="php53-intl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579468" comment="php53-json-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579469" comment="php53-ldap-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579470" comment="php53-mbstring-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579471" comment="php53-mcrypt-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579472" comment="php53-mysql-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579473" comment="php53-odbc-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579474" comment="php53-openssl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579475" comment="php53-pcntl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579476" comment="php53-pdo-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579477" comment="php53-pear-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579478" comment="php53-pgsql-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579479" comment="php53-pspell-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579480" comment="php53-shmop-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579481" comment="php53-snmp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579482" comment="php53-soap-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579483" comment="php53-suhosin-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579484" comment="php53-sysvmsg-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579485" comment="php53-sysvsem-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579486" comment="php53-sysvshm-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579487" comment="php53-tokenizer-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579488" comment="php53-wddx-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579489" comment="php53-xmlreader-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579490" comment="php53-xmlrpc-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579491" comment="php53-xmlwriter-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579492" comment="php53-xsl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579493" comment="php53-zip-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579494" comment="php53-zlib-5.3.17-48.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579450" comment="apache2-mod_php53-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579451" comment="php53-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579452" comment="php53-bcmath-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579453" comment="php53-bz2-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579454" comment="php53-calendar-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579455" comment="php53-ctype-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579456" comment="php53-curl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579457" comment="php53-dba-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579458" comment="php53-dom-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579459" comment="php53-exif-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579460" comment="php53-fastcgi-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579461" comment="php53-fileinfo-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579462" comment="php53-ftp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579463" comment="php53-gd-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579464" comment="php53-gettext-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579465" comment="php53-gmp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579466" comment="php53-iconv-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579467" comment="php53-intl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579468" comment="php53-json-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579469" comment="php53-ldap-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579470" comment="php53-mbstring-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579471" comment="php53-mcrypt-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579472" comment="php53-mysql-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579473" comment="php53-odbc-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579474" comment="php53-openssl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579475" comment="php53-pcntl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579476" comment="php53-pdo-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579477" comment="php53-pear-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579478" comment="php53-pgsql-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579479" comment="php53-pspell-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579480" comment="php53-shmop-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579481" comment="php53-snmp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579482" comment="php53-soap-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579483" comment="php53-suhosin-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579484" comment="php53-sysvmsg-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579485" comment="php53-sysvsem-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579486" comment="php53-sysvshm-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579487" comment="php53-tokenizer-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579488" comment="php53-wddx-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579489" comment="php53-xmlreader-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579490" comment="php53-xmlrpc-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579491" comment="php53-xmlwriter-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579492" comment="php53-xsl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579493" comment="php53-zip-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579494" comment="php53-zlib-5.3.17-48.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220316" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="949961" ref_url="https://bugzilla.suse.com/949961" source="BUGZILLA"/>
		<reference ref_id="968284" ref_url="https://bugzilla.suse.com/968284" source="BUGZILLA"/>
		<reference ref_id="969821" ref_url="https://bugzilla.suse.com/969821" source="BUGZILLA"/>
		<reference ref_id="971611" ref_url="https://bugzilla.suse.com/971611" source="BUGZILLA"/>
		<reference ref_id="971612" ref_url="https://bugzilla.suse.com/971612" source="BUGZILLA"/>
		<reference ref_id="971912" ref_url="https://bugzilla.suse.com/971912" source="BUGZILLA"/>
		<reference ref_id="973351" ref_url="https://bugzilla.suse.com/973351" source="BUGZILLA"/>
		<reference ref_id="973792" ref_url="https://bugzilla.suse.com/973792" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9767" ref_url="https://www.suse.com/security/cve/CVE-2014-9767/" source="CVE"/>
		<reference ref_id="CVE-2015-7803" ref_url="https://www.suse.com/security/cve/CVE-2015-7803/" source="CVE"/>
		<reference ref_id="CVE-2015-8835" ref_url="https://www.suse.com/security/cve/CVE-2015-8835/" source="CVE"/>
		<reference ref_id="CVE-2015-8838" ref_url="https://www.suse.com/security/cve/CVE-2015-8838/" source="CVE"/>
		<reference ref_id="CVE-2016-2554" ref_url="https://www.suse.com/security/cve/CVE-2016-2554/" source="CVE"/>
		<reference ref_id="CVE-2016-3141" ref_url="https://www.suse.com/security/cve/CVE-2016-3141/" source="CVE"/>
		<reference ref_id="CVE-2016-3142" ref_url="https://www.suse.com/security/cve/CVE-2016-3142/" source="CVE"/>
		<reference ref_id="CVE-2016-3185" ref_url="https://www.suse.com/security/cve/CVE-2016-3185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002026.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following issues:

- CVE-2015-8838: mysqlnd was vulnerable to BACKRONYM (bnc#973792).
- CVE-2015-8835: SoapClient s_call method suffered from a type confusion issue that could have lead to crashes [bsc#973351]
- CVE-2016-2554: A NULL pointer dereference in phar_get_fp_offset could lead to crashes. [bsc#968284]
  Note: we do not ship the phar extension currently, so we are not affected.
- CVE-2015-7803: A Stack overflow vulnerability when decompressing tar phar archives could potentially lead to code execution. [bsc#949961]
  Note: we do not ship the phar extension currently, so we are not affected.
- CVE-2016-3141: A use-after-free / double-free in the WDDX
  deserialization could lead to crashes or potential code
  execution. [bsc#969821]
- CVE-2016-3142: An Out-of-bounds read in phar_parse_zipfile() could lead to crashes. [bsc#971912]
  Note: we do not ship the phar extension currently, so we are not affected.
- CVE-2014-9767: A directory traversal when extracting zip files was fixed that could lead to
  overwritten files. [bsc#971612]
- CVE-2016-3185: A type confusion vulnerability in
  make_http_soap_request() could lead to crashes or potentially code
  execution. [bsc#971611]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-25"/>
	<updated date="2016-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/949961">SUSE bug 949961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968284">SUSE bug 968284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969821">SUSE bug 969821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971611">SUSE bug 971611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971612">SUSE bug 971612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971912">SUSE bug 971912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973351">SUSE bug 973351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973792">SUSE bug 973792</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9767/">CVE-2014-9767 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9767">CVE-2014-9767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7803/">CVE-2015-7803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7803">CVE-2015-7803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8835/">CVE-2015-8835 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8835">CVE-2015-8835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8838/">CVE-2015-8838 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8838">CVE-2015-8838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2554/">CVE-2016-2554 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2554">CVE-2016-2554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3141/">CVE-2016-3141 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3141">CVE-2016-3141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3142/">CVE-2016-3142 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3142">CVE-2016-3142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3185/">CVE-2016-3185 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3185">CVE-2016-3185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584564" comment="apache2-mod_php53-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584565" comment="php53-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584566" comment="php53-bcmath-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584567" comment="php53-bz2-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584568" comment="php53-calendar-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584569" comment="php53-ctype-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584570" comment="php53-curl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584571" comment="php53-dba-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584572" comment="php53-dom-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584573" comment="php53-exif-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584574" comment="php53-fastcgi-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584575" comment="php53-fileinfo-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584576" comment="php53-ftp-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584577" comment="php53-gd-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584578" comment="php53-gettext-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584579" comment="php53-gmp-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584580" comment="php53-iconv-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584581" comment="php53-intl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584582" comment="php53-json-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584583" comment="php53-ldap-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584584" comment="php53-mbstring-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584585" comment="php53-mcrypt-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584586" comment="php53-mysql-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584587" comment="php53-odbc-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584588" comment="php53-openssl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584589" comment="php53-pcntl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584590" comment="php53-pdo-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584591" comment="php53-pear-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584592" comment="php53-pgsql-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584593" comment="php53-pspell-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584594" comment="php53-shmop-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584595" comment="php53-snmp-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584596" comment="php53-soap-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584597" comment="php53-suhosin-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584598" comment="php53-sysvmsg-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584599" comment="php53-sysvsem-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584600" comment="php53-sysvshm-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584601" comment="php53-tokenizer-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584602" comment="php53-wddx-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584603" comment="php53-xmlreader-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584604" comment="php53-xmlrpc-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584605" comment="php53-xmlwriter-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584606" comment="php53-xsl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584607" comment="php53-zip-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584608" comment="php53-zlib-5.3.17-59.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584564" comment="apache2-mod_php53-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584565" comment="php53-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584566" comment="php53-bcmath-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584567" comment="php53-bz2-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584568" comment="php53-calendar-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584569" comment="php53-ctype-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584570" comment="php53-curl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584571" comment="php53-dba-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584572" comment="php53-dom-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584573" comment="php53-exif-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584574" comment="php53-fastcgi-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584575" comment="php53-fileinfo-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584576" comment="php53-ftp-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584577" comment="php53-gd-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584578" comment="php53-gettext-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584579" comment="php53-gmp-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584580" comment="php53-iconv-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584581" comment="php53-intl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584582" comment="php53-json-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584583" comment="php53-ldap-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584584" comment="php53-mbstring-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584585" comment="php53-mcrypt-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584586" comment="php53-mysql-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584587" comment="php53-odbc-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584588" comment="php53-openssl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584589" comment="php53-pcntl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584590" comment="php53-pdo-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584591" comment="php53-pear-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584592" comment="php53-pgsql-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584593" comment="php53-pspell-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584594" comment="php53-shmop-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584595" comment="php53-snmp-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584596" comment="php53-soap-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584597" comment="php53-suhosin-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584598" comment="php53-sysvmsg-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584599" comment="php53-sysvsem-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584600" comment="php53-sysvshm-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584601" comment="php53-tokenizer-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584602" comment="php53-wddx-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584603" comment="php53-xmlreader-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584604" comment="php53-xmlrpc-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584605" comment="php53-xmlwriter-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584606" comment="php53-xsl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584607" comment="php53-zip-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584608" comment="php53-zlib-5.3.17-59.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220317" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="976996" ref_url="https://bugzilla.suse.com/976996" source="BUGZILLA"/>
		<reference ref_id="976997" ref_url="https://bugzilla.suse.com/976997" source="BUGZILLA"/>
		<reference ref_id="977003" ref_url="https://bugzilla.suse.com/977003" source="BUGZILLA"/>
		<reference ref_id="977005" ref_url="https://bugzilla.suse.com/977005" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8866" ref_url="https://www.suse.com/security/cve/CVE-2015-8866/" source="CVE"/>
		<reference ref_id="CVE-2015-8867" ref_url="https://www.suse.com/security/cve/CVE-2015-8867/" source="CVE"/>
		<reference ref_id="CVE-2016-4070" ref_url="https://www.suse.com/security/cve/CVE-2016-4070/" source="CVE"/>
		<reference ref_id="CVE-2016-4073" ref_url="https://www.suse.com/security/cve/CVE-2016-4073/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002063.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following security issues:

- CVE-2016-4073: A remote attacker could have caused denial of service, or possibly execute arbitrary code, due to incorrect handling of string length calculations in mb_strcut() (bsc#977003)
- CVE-2015-8867: The PHP function openssl_random_pseudo_bytes() did not return cryptographically secure random bytes (bsc#977005)
- CVE-2016-4070: The libxml_disable_entity_loader() setting was shared between threads, which could have resulted in XML external entity injection and entity expansion issues (bsc#976997)
- CVE-2015-8866: A remote attacker could have caused denial of service due to incorrect handling of large strings in php_raw_url_encode() (bsc#976996)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-17"/>
	<updated date="2016-05-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/976996">SUSE bug 976996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976997">SUSE bug 976997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977003">SUSE bug 977003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977005">SUSE bug 977005</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8866/">CVE-2015-8866 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8866">CVE-2015-8866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8867/">CVE-2015-8867 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8867">CVE-2015-8867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4070/">CVE-2016-4070 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4070">CVE-2016-4070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4073/">CVE-2016-4073 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4073">CVE-2016-4073 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584609" comment="apache2-mod_php53-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584610" comment="php53-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584611" comment="php53-bcmath-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584612" comment="php53-bz2-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584613" comment="php53-calendar-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584614" comment="php53-ctype-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584615" comment="php53-curl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584616" comment="php53-dba-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584617" comment="php53-dom-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584618" comment="php53-exif-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584619" comment="php53-fastcgi-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584620" comment="php53-fileinfo-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584621" comment="php53-ftp-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584622" comment="php53-gd-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584623" comment="php53-gettext-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584624" comment="php53-gmp-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584625" comment="php53-iconv-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584626" comment="php53-intl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584627" comment="php53-json-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584628" comment="php53-ldap-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584629" comment="php53-mbstring-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584630" comment="php53-mcrypt-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584631" comment="php53-mysql-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584632" comment="php53-odbc-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584633" comment="php53-openssl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584634" comment="php53-pcntl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584635" comment="php53-pdo-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584636" comment="php53-pear-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584637" comment="php53-pgsql-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584638" comment="php53-pspell-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584639" comment="php53-shmop-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584640" comment="php53-snmp-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584641" comment="php53-soap-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584642" comment="php53-suhosin-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584643" comment="php53-sysvmsg-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584644" comment="php53-sysvsem-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584645" comment="php53-sysvshm-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584646" comment="php53-tokenizer-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584647" comment="php53-wddx-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584648" comment="php53-xmlreader-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584649" comment="php53-xmlrpc-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584650" comment="php53-xmlwriter-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584651" comment="php53-xsl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584652" comment="php53-zip-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584653" comment="php53-zlib-5.3.17-62.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584609" comment="apache2-mod_php53-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584610" comment="php53-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584611" comment="php53-bcmath-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584612" comment="php53-bz2-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584613" comment="php53-calendar-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584614" comment="php53-ctype-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584615" comment="php53-curl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584616" comment="php53-dba-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584617" comment="php53-dom-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584618" comment="php53-exif-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584619" comment="php53-fastcgi-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584620" comment="php53-fileinfo-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584621" comment="php53-ftp-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584622" comment="php53-gd-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584623" comment="php53-gettext-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584624" comment="php53-gmp-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584625" comment="php53-iconv-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584626" comment="php53-intl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584627" comment="php53-json-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584628" comment="php53-ldap-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584629" comment="php53-mbstring-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584630" comment="php53-mcrypt-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584631" comment="php53-mysql-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584632" comment="php53-odbc-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584633" comment="php53-openssl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584634" comment="php53-pcntl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584635" comment="php53-pdo-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584636" comment="php53-pear-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584637" comment="php53-pgsql-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584638" comment="php53-pspell-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584639" comment="php53-shmop-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584640" comment="php53-snmp-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584641" comment="php53-soap-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584642" comment="php53-suhosin-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584643" comment="php53-sysvmsg-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584644" comment="php53-sysvsem-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584645" comment="php53-sysvshm-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584646" comment="php53-tokenizer-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584647" comment="php53-wddx-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584648" comment="php53-xmlreader-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584649" comment="php53-xmlrpc-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584650" comment="php53-xmlwriter-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584651" comment="php53-xsl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584652" comment="php53-zip-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584653" comment="php53-zlib-5.3.17-62.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220318" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="949961" ref_url="https://bugzilla.suse.com/949961" source="BUGZILLA"/>
		<reference ref_id="968284" ref_url="https://bugzilla.suse.com/968284" source="BUGZILLA"/>
		<reference ref_id="969821" ref_url="https://bugzilla.suse.com/969821" source="BUGZILLA"/>
		<reference ref_id="971611" ref_url="https://bugzilla.suse.com/971611" source="BUGZILLA"/>
		<reference ref_id="971612" ref_url="https://bugzilla.suse.com/971612" source="BUGZILLA"/>
		<reference ref_id="971912" ref_url="https://bugzilla.suse.com/971912" source="BUGZILLA"/>
		<reference ref_id="973351" ref_url="https://bugzilla.suse.com/973351" source="BUGZILLA"/>
		<reference ref_id="973792" ref_url="https://bugzilla.suse.com/973792" source="BUGZILLA"/>
		<reference ref_id="976996" ref_url="https://bugzilla.suse.com/976996" source="BUGZILLA"/>
		<reference ref_id="976997" ref_url="https://bugzilla.suse.com/976997" source="BUGZILLA"/>
		<reference ref_id="977003" ref_url="https://bugzilla.suse.com/977003" source="BUGZILLA"/>
		<reference ref_id="977005" ref_url="https://bugzilla.suse.com/977005" source="BUGZILLA"/>
		<reference ref_id="977991" ref_url="https://bugzilla.suse.com/977991" source="BUGZILLA"/>
		<reference ref_id="977994" ref_url="https://bugzilla.suse.com/977994" source="BUGZILLA"/>
		<reference ref_id="978827" ref_url="https://bugzilla.suse.com/978827" source="BUGZILLA"/>
		<reference ref_id="978828" ref_url="https://bugzilla.suse.com/978828" source="BUGZILLA"/>
		<reference ref_id="978829" ref_url="https://bugzilla.suse.com/978829" source="BUGZILLA"/>
		<reference ref_id="978830" ref_url="https://bugzilla.suse.com/978830" source="BUGZILLA"/>
		<reference ref_id="980366" ref_url="https://bugzilla.suse.com/980366" source="BUGZILLA"/>
		<reference ref_id="980373" ref_url="https://bugzilla.suse.com/980373" source="BUGZILLA"/>
		<reference ref_id="980375" ref_url="https://bugzilla.suse.com/980375" source="BUGZILLA"/>
		<reference ref_id="981050" ref_url="https://bugzilla.suse.com/981050" source="BUGZILLA"/>
		<reference ref_id="982010" ref_url="https://bugzilla.suse.com/982010" source="BUGZILLA"/>
		<reference ref_id="982011" ref_url="https://bugzilla.suse.com/982011" source="BUGZILLA"/>
		<reference ref_id="982012" ref_url="https://bugzilla.suse.com/982012" source="BUGZILLA"/>
		<reference ref_id="982013" ref_url="https://bugzilla.suse.com/982013" source="BUGZILLA"/>
		<reference ref_id="982162" ref_url="https://bugzilla.suse.com/982162" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9767" ref_url="https://www.suse.com/security/cve/CVE-2014-9767/" source="CVE"/>
		<reference ref_id="CVE-2015-4116" ref_url="https://www.suse.com/security/cve/CVE-2015-4116/" source="CVE"/>
		<reference ref_id="CVE-2015-7803" ref_url="https://www.suse.com/security/cve/CVE-2015-7803/" source="CVE"/>
		<reference ref_id="CVE-2015-8835" ref_url="https://www.suse.com/security/cve/CVE-2015-8835/" source="CVE"/>
		<reference ref_id="CVE-2015-8838" ref_url="https://www.suse.com/security/cve/CVE-2015-8838/" source="CVE"/>
		<reference ref_id="CVE-2015-8866" ref_url="https://www.suse.com/security/cve/CVE-2015-8866/" source="CVE"/>
		<reference ref_id="CVE-2015-8867" ref_url="https://www.suse.com/security/cve/CVE-2015-8867/" source="CVE"/>
		<reference ref_id="CVE-2015-8873" ref_url="https://www.suse.com/security/cve/CVE-2015-8873/" source="CVE"/>
		<reference ref_id="CVE-2015-8874" ref_url="https://www.suse.com/security/cve/CVE-2015-8874/" source="CVE"/>
		<reference ref_id="CVE-2015-8879" ref_url="https://www.suse.com/security/cve/CVE-2015-8879/" source="CVE"/>
		<reference ref_id="CVE-2016-2554" ref_url="https://www.suse.com/security/cve/CVE-2016-2554/" source="CVE"/>
		<reference ref_id="CVE-2016-3141" ref_url="https://www.suse.com/security/cve/CVE-2016-3141/" source="CVE"/>
		<reference ref_id="CVE-2016-3142" ref_url="https://www.suse.com/security/cve/CVE-2016-3142/" source="CVE"/>
		<reference ref_id="CVE-2016-3185" ref_url="https://www.suse.com/security/cve/CVE-2016-3185/" source="CVE"/>
		<reference ref_id="CVE-2016-4070" ref_url="https://www.suse.com/security/cve/CVE-2016-4070/" source="CVE"/>
		<reference ref_id="CVE-2016-4073" ref_url="https://www.suse.com/security/cve/CVE-2016-4073/" source="CVE"/>
		<reference ref_id="CVE-2016-4342" ref_url="https://www.suse.com/security/cve/CVE-2016-4342/" source="CVE"/>
		<reference ref_id="CVE-2016-4346" ref_url="https://www.suse.com/security/cve/CVE-2016-4346/" source="CVE"/>
		<reference ref_id="CVE-2016-4537" ref_url="https://www.suse.com/security/cve/CVE-2016-4537/" source="CVE"/>
		<reference ref_id="CVE-2016-4538" ref_url="https://www.suse.com/security/cve/CVE-2016-4538/" source="CVE"/>
		<reference ref_id="CVE-2016-4539" ref_url="https://www.suse.com/security/cve/CVE-2016-4539/" source="CVE"/>
		<reference ref_id="CVE-2016-4540" ref_url="https://www.suse.com/security/cve/CVE-2016-4540/" source="CVE"/>
		<reference ref_id="CVE-2016-4541" ref_url="https://www.suse.com/security/cve/CVE-2016-4541/" source="CVE"/>
		<reference ref_id="CVE-2016-4542" ref_url="https://www.suse.com/security/cve/CVE-2016-4542/" source="CVE"/>
		<reference ref_id="CVE-2016-4543" ref_url="https://www.suse.com/security/cve/CVE-2016-4543/" source="CVE"/>
		<reference ref_id="CVE-2016-4544" ref_url="https://www.suse.com/security/cve/CVE-2016-4544/" source="CVE"/>
		<reference ref_id="CVE-2016-5093" ref_url="https://www.suse.com/security/cve/CVE-2016-5093/" source="CVE"/>
		<reference ref_id="CVE-2016-5094" ref_url="https://www.suse.com/security/cve/CVE-2016-5094/" source="CVE"/>
		<reference ref_id="CVE-2016-5095" ref_url="https://www.suse.com/security/cve/CVE-2016-5095/" source="CVE"/>
		<reference ref_id="CVE-2016-5096" ref_url="https://www.suse.com/security/cve/CVE-2016-5096/" source="CVE"/>
		<reference ref_id="CVE-2016-5114" ref_url="https://www.suse.com/security/cve/CVE-2016-5114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002115.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following issues:

- CVE-2016-5093: A get_icu_value_internal out-of-bounds read could crash the php interpreter (bsc#982010)
- CVE-2016-5094,CVE-2016-5095: Don't allow creating strings with lengths outside int range, avoids overflows (bsc#982011,bsc#982012)
- CVE-2016-5096: A int/size_t confusion in fread could corrupt memory (bsc#982013)
- CVE-2016-5114: A fpm_log.c memory leak and buffer overflow could leak information out of the php process or overwrite a buffer by 1 byte (bsc#982162)
- CVE-2016-4346: A heap overflow was fixed in ext/standard/string.c (bsc#977994)
- CVE-2016-4342: A heap corruption was fixed in tar/zip/phar parser (bsc#977991)
- CVE-2016-4537, CVE-2016-4538: bcpowmod accepted negative scale causing heap buffer overflow corrupting _one_ definition (bsc#978827)
- CVE-2016-4539: Malformed input causes segmentation fault in xml_parse_into_struct() function (bsc#978828)
- CVE-2016-4540, CVE-2016-4541: Out-of-bounds memory read in zif_grapheme_stripos when given negative offset (bsc#978829)
- CVE-2016-4542, CVE-2016-4543, CVE-2016-4544: Out-of-bounds heap memory
  read in exif_read_data() caused by malformed input (bsc#978830)
- CVE-2015-4116: Use-after-free vulnerability in the spl_ptr_heap_insert
  function  (bsc#980366)
- CVE-2015-8873: Stack consumption vulnerability in Zend/zend_exceptions.c (bsc#980373)
- CVE-2015-8874: Stack consumption vulnerability in GD (bsc#980375)
- CVE-2015-8879: odbc_bindcols function in ext/odbc/php_odbc.c mishandles
  driver behavior for SQL_WVARCHAR (bsc#981050)

Also fixed previously on SUSE Linux Enterprise 11 SP4, but not yet shipped to SUSE Linux Enterprise Server 11 SP3 LTSS:
- CVE-2015-8838: mysqlnd was vulnerable to BACKRONYM (bnc#973792).
- CVE-2015-8835: SoapClient s_call method suffered from a type confusion
  issue that could have lead to crashes [bsc#973351]
- CVE-2016-2554: A NULL pointer dereference in phar_get_fp_offset could
  lead to crashes. [bsc#968284]
- CVE-2015-7803: A Stack overflow vulnerability when decompressing tar
  phar archives could potentially lead to code execution. [bsc#949961]
- CVE-2016-3141: A use-after-free / double-free in the WDDX
  deserialization could lead to crashes or potential code
  execution. [bsc#969821]
- CVE-2016-3142: An Out-of-bounds read in phar_parse_zipfile() could lead to crashes. [bsc#971912]
- CVE-2014-9767: A directory traversal when extracting zip files was
  fixed that could lead to overwritten files. [bsc#971612]
- CVE-2016-3185: A type confusion vulnerability in
  make_http_soap_request() could lead to crashes or potentially code
  execution. [bsc#971611]
- CVE-2016-4073: A remote attacker could have caused denial of service,
  or possibly execute arbitrary code, due to incorrect handling of string
  length calculations in mb_strcut() (bsc#977003)
- CVE-2015-8867: The PHP function openssl_random_pseudo_bytes() did not
  return cryptographically secure random bytes (bsc#977005)
- CVE-2016-4070: The libxml_disable_entity_loader() setting was shared
  between threads, which could have resulted in XML external entity
  injection and entity expansion issues (bsc#976997)
- CVE-2015-8866: A remote attacker could have caused denial of service
  due to incorrect handling of large strings in php_raw_url_encode()
  (bsc#976996)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-14"/>
	<updated date="2016-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/949961">SUSE bug 949961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968284">SUSE bug 968284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969821">SUSE bug 969821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971611">SUSE bug 971611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971612">SUSE bug 971612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971912">SUSE bug 971912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973351">SUSE bug 973351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973792">SUSE bug 973792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976996">SUSE bug 976996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976997">SUSE bug 976997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977003">SUSE bug 977003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977005">SUSE bug 977005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977991">SUSE bug 977991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977994">SUSE bug 977994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978827">SUSE bug 978827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978828">SUSE bug 978828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978829">SUSE bug 978829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978830">SUSE bug 978830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980373">SUSE bug 980373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980375">SUSE bug 980375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981050">SUSE bug 981050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982010">SUSE bug 982010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982011">SUSE bug 982011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982012">SUSE bug 982012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982013">SUSE bug 982013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982162">SUSE bug 982162</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9767/">CVE-2014-9767 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9767">CVE-2014-9767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4116/">CVE-2015-4116 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4116">CVE-2015-4116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7803/">CVE-2015-7803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7803">CVE-2015-7803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8835/">CVE-2015-8835 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8835">CVE-2015-8835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8838/">CVE-2015-8838 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8838">CVE-2015-8838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8866/">CVE-2015-8866 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8866">CVE-2015-8866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8867/">CVE-2015-8867 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8867">CVE-2015-8867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8873/">CVE-2015-8873 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8873">CVE-2015-8873 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8874/">CVE-2015-8874 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8874">CVE-2015-8874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8879/">CVE-2015-8879 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8879">CVE-2015-8879 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2554/">CVE-2016-2554 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2554">CVE-2016-2554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3141/">CVE-2016-3141 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3141">CVE-2016-3141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3142/">CVE-2016-3142 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3142">CVE-2016-3142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3185/">CVE-2016-3185 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3185">CVE-2016-3185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4070/">CVE-2016-4070 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4070">CVE-2016-4070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4073/">CVE-2016-4073 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4073">CVE-2016-4073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4342/">CVE-2016-4342 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4342">CVE-2016-4342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4346/">CVE-2016-4346 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4346">CVE-2016-4346 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4537/">CVE-2016-4537 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4537">CVE-2016-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4538/">CVE-2016-4538 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4538">CVE-2016-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4539/">CVE-2016-4539 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4539">CVE-2016-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4540/">CVE-2016-4540 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4540">CVE-2016-4540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4541/">CVE-2016-4541 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4541">CVE-2016-4541 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4542/">CVE-2016-4542 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4542">CVE-2016-4542 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4543/">CVE-2016-4543 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4543">CVE-2016-4543 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4544/">CVE-2016-4544 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4544">CVE-2016-4544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5093/">CVE-2016-5093 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5093">CVE-2016-5093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5094/">CVE-2016-5094 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5094">CVE-2016-5094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5095/">CVE-2016-5095 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5095">CVE-2016-5095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5096/">CVE-2016-5096 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5096">CVE-2016-5096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5114/">CVE-2016-5114 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5114">CVE-2016-5114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584654" comment="apache2-mod_php53-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584655" comment="php53-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584656" comment="php53-bcmath-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584657" comment="php53-bz2-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584658" comment="php53-calendar-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584659" comment="php53-ctype-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584660" comment="php53-curl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584661" comment="php53-dba-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584662" comment="php53-dom-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584663" comment="php53-exif-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584664" comment="php53-fastcgi-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584665" comment="php53-fileinfo-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584666" comment="php53-ftp-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584667" comment="php53-gd-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584668" comment="php53-gettext-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584669" comment="php53-gmp-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584670" comment="php53-iconv-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584671" comment="php53-intl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584672" comment="php53-json-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584673" comment="php53-ldap-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584674" comment="php53-mbstring-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584675" comment="php53-mcrypt-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584676" comment="php53-mysql-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584677" comment="php53-odbc-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584678" comment="php53-openssl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584679" comment="php53-pcntl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584680" comment="php53-pdo-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584681" comment="php53-pear-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584682" comment="php53-pgsql-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584683" comment="php53-pspell-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584684" comment="php53-shmop-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584685" comment="php53-snmp-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584686" comment="php53-soap-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584687" comment="php53-suhosin-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584688" comment="php53-sysvmsg-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584689" comment="php53-sysvsem-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584690" comment="php53-sysvshm-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584691" comment="php53-tokenizer-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584692" comment="php53-wddx-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584693" comment="php53-xmlreader-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584694" comment="php53-xmlrpc-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584695" comment="php53-xmlwriter-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584696" comment="php53-xsl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584697" comment="php53-zip-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584698" comment="php53-zlib-5.3.17-71.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584654" comment="apache2-mod_php53-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584655" comment="php53-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584656" comment="php53-bcmath-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584657" comment="php53-bz2-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584658" comment="php53-calendar-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584659" comment="php53-ctype-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584660" comment="php53-curl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584661" comment="php53-dba-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584662" comment="php53-dom-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584663" comment="php53-exif-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584664" comment="php53-fastcgi-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584665" comment="php53-fileinfo-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584666" comment="php53-ftp-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584667" comment="php53-gd-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584668" comment="php53-gettext-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584669" comment="php53-gmp-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584670" comment="php53-iconv-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584671" comment="php53-intl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584672" comment="php53-json-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584673" comment="php53-ldap-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584674" comment="php53-mbstring-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584675" comment="php53-mcrypt-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584676" comment="php53-mysql-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584677" comment="php53-odbc-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584678" comment="php53-openssl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584679" comment="php53-pcntl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584680" comment="php53-pdo-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584681" comment="php53-pear-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584682" comment="php53-pgsql-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584683" comment="php53-pspell-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584684" comment="php53-shmop-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584685" comment="php53-snmp-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584686" comment="php53-soap-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584687" comment="php53-suhosin-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584688" comment="php53-sysvmsg-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584689" comment="php53-sysvsem-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584690" comment="php53-sysvshm-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584691" comment="php53-tokenizer-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584692" comment="php53-wddx-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584693" comment="php53-xmlreader-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584694" comment="php53-xmlrpc-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584695" comment="php53-xmlwriter-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584696" comment="php53-xsl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584697" comment="php53-zip-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584698" comment="php53-zlib-5.3.17-71.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220319" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="986004" ref_url="https://bugzilla.suse.com/986004" source="BUGZILLA"/>
		<reference ref_id="986244" ref_url="https://bugzilla.suse.com/986244" source="BUGZILLA"/>
		<reference ref_id="986386" ref_url="https://bugzilla.suse.com/986386" source="BUGZILLA"/>
		<reference ref_id="986388" ref_url="https://bugzilla.suse.com/986388" source="BUGZILLA"/>
		<reference ref_id="986393" ref_url="https://bugzilla.suse.com/986393" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8935" ref_url="https://www.suse.com/security/cve/CVE-2015-8935/" source="CVE"/>
		<reference ref_id="CVE-2016-5766" ref_url="https://www.suse.com/security/cve/CVE-2016-5766/" source="CVE"/>
		<reference ref_id="CVE-2016-5767" ref_url="https://www.suse.com/security/cve/CVE-2016-5767/" source="CVE"/>
		<reference ref_id="CVE-2016-5769" ref_url="https://www.suse.com/security/cve/CVE-2016-5769/" source="CVE"/>
		<reference ref_id="CVE-2016-5772" ref_url="https://www.suse.com/security/cve/CVE-2016-5772/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002199.html" source="SUSE-SU"/>
		<description>
php53 was updated to fix five security issues.

These security issues were fixed:
- CVE-2016-5769: mcrypt: Heap Overflow due to integer overflows (bsc#986388).
- CVE-2015-8935: XSS in header() with Internet Explorer (bsc#986004).
- CVE-2016-5772: Double Free Courruption in wddx_deserialize (bsc#986244).
- CVE-2016-5766: Integer Overflow in _gd2GetHeader() resulting in heap overflow (bsc#986386).
- CVE-2016-5767: Integer Overflow in gdImagePaletteToTrueColor() resulting in heap overflow (bsc#986393).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-09"/>
	<updated date="2016-08-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/986004">SUSE bug 986004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986244">SUSE bug 986244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986386">SUSE bug 986386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986388">SUSE bug 986388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986393">SUSE bug 986393</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8935/">CVE-2015-8935 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8935">CVE-2015-8935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5766/">CVE-2016-5766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5766">CVE-2016-5766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5767/">CVE-2016-5767 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5767">CVE-2016-5767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5769/">CVE-2016-5769 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5769">CVE-2016-5769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5772/">CVE-2016-5772 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5772">CVE-2016-5772 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584699" comment="apache2-mod_php53-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584700" comment="php53-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584701" comment="php53-bcmath-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584702" comment="php53-bz2-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584703" comment="php53-calendar-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584704" comment="php53-ctype-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584705" comment="php53-curl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584706" comment="php53-dba-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584707" comment="php53-dom-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584708" comment="php53-exif-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584709" comment="php53-fastcgi-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584710" comment="php53-fileinfo-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584711" comment="php53-ftp-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584712" comment="php53-gd-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584713" comment="php53-gettext-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584714" comment="php53-gmp-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584715" comment="php53-iconv-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584716" comment="php53-intl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584717" comment="php53-json-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584718" comment="php53-ldap-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584719" comment="php53-mbstring-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584720" comment="php53-mcrypt-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584721" comment="php53-mysql-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584722" comment="php53-odbc-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584723" comment="php53-openssl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584724" comment="php53-pcntl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584725" comment="php53-pdo-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584726" comment="php53-pear-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584727" comment="php53-pgsql-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584728" comment="php53-pspell-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584729" comment="php53-shmop-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584730" comment="php53-snmp-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584731" comment="php53-soap-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584732" comment="php53-suhosin-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584733" comment="php53-sysvmsg-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584734" comment="php53-sysvsem-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584735" comment="php53-sysvshm-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584736" comment="php53-tokenizer-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584737" comment="php53-wddx-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584738" comment="php53-xmlreader-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584739" comment="php53-xmlrpc-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584740" comment="php53-xmlwriter-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584741" comment="php53-xsl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584742" comment="php53-zip-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584743" comment="php53-zlib-5.3.17-74.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584699" comment="apache2-mod_php53-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584700" comment="php53-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584701" comment="php53-bcmath-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584702" comment="php53-bz2-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584703" comment="php53-calendar-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584704" comment="php53-ctype-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584705" comment="php53-curl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584706" comment="php53-dba-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584707" comment="php53-dom-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584708" comment="php53-exif-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584709" comment="php53-fastcgi-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584710" comment="php53-fileinfo-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584711" comment="php53-ftp-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584712" comment="php53-gd-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584713" comment="php53-gettext-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584714" comment="php53-gmp-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584715" comment="php53-iconv-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584716" comment="php53-intl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584717" comment="php53-json-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584718" comment="php53-ldap-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584719" comment="php53-mbstring-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584720" comment="php53-mcrypt-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584721" comment="php53-mysql-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584722" comment="php53-odbc-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584723" comment="php53-openssl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584724" comment="php53-pcntl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584725" comment="php53-pdo-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584726" comment="php53-pear-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584727" comment="php53-pgsql-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584728" comment="php53-pspell-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584729" comment="php53-shmop-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584730" comment="php53-snmp-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584731" comment="php53-soap-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584732" comment="php53-suhosin-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584733" comment="php53-sysvmsg-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584734" comment="php53-sysvsem-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584735" comment="php53-sysvshm-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584736" comment="php53-tokenizer-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584737" comment="php53-wddx-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584738" comment="php53-xmlreader-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584739" comment="php53-xmlrpc-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584740" comment="php53-xmlwriter-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584741" comment="php53-xsl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584742" comment="php53-zip-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584743" comment="php53-zlib-5.3.17-74.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220320" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="987530" ref_url="https://bugzilla.suse.com/987530" source="BUGZILLA"/>
		<reference ref_id="991426" ref_url="https://bugzilla.suse.com/991426" source="BUGZILLA"/>
		<reference ref_id="991427" ref_url="https://bugzilla.suse.com/991427" source="BUGZILLA"/>
		<reference ref_id="991428" ref_url="https://bugzilla.suse.com/991428" source="BUGZILLA"/>
		<reference ref_id="991429" ref_url="https://bugzilla.suse.com/991429" source="BUGZILLA"/>
		<reference ref_id="991430" ref_url="https://bugzilla.suse.com/991430" source="BUGZILLA"/>
		<reference ref_id="991433" ref_url="https://bugzilla.suse.com/991433" source="BUGZILLA"/>
		<reference ref_id="991437" ref_url="https://bugzilla.suse.com/991437" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3587" ref_url="https://www.suse.com/security/cve/CVE-2014-3587/" source="CVE"/>
		<reference ref_id="CVE-2016-5399" ref_url="https://www.suse.com/security/cve/CVE-2016-5399/" source="CVE"/>
		<reference ref_id="CVE-2016-6288" ref_url="https://www.suse.com/security/cve/CVE-2016-6288/" source="CVE"/>
		<reference ref_id="CVE-2016-6289" ref_url="https://www.suse.com/security/cve/CVE-2016-6289/" source="CVE"/>
		<reference ref_id="CVE-2016-6290" ref_url="https://www.suse.com/security/cve/CVE-2016-6290/" source="CVE"/>
		<reference ref_id="CVE-2016-6291" ref_url="https://www.suse.com/security/cve/CVE-2016-6291/" source="CVE"/>
		<reference ref_id="CVE-2016-6296" ref_url="https://www.suse.com/security/cve/CVE-2016-6296/" source="CVE"/>
		<reference ref_id="CVE-2016-6297" ref_url="https://www.suse.com/security/cve/CVE-2016-6297/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002247.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following issues:

- security update:
  * CVE-2014-3587: Integer overflow in the cdf_read_property_info affecting SLES11 SP3 [bsc#987530]
  * CVE-2016-6297: Stack-based buffer overflow vulnerability in php_stream_zip_opener [bsc#991426]
  * CVE-2016-6291: Out-of-bounds access in exif_process_IFD_in_MAKERNOTE [bsc#991427]
  * CVE-2016-6289: Integer overflow leads to buffer overflow in virtual_file_ex [bsc#991428]
  * CVE-2016-6290: Use after free in unserialize() with Unexpected Session Deserialization [bsc#991429]
  * CVE-2016-5399: Improper error handling in bzread() [bsc#991430]
  * CVE-2016-6288: Buffer over-read in php_url_parse_ex [bsc#991433]
  * CVE-2016-6296: Heap buffer overflow vulnerability in simplestring_addn in simplestring.c [bsc#991437]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-01"/>
	<updated date="2016-09-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/987530">SUSE bug 987530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991426">SUSE bug 991426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991427">SUSE bug 991427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991428">SUSE bug 991428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991429">SUSE bug 991429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991430">SUSE bug 991430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991433">SUSE bug 991433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991437">SUSE bug 991437</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3587/">CVE-2014-3587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3587">CVE-2014-3587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5399/">CVE-2016-5399 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5399">CVE-2016-5399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6288/">CVE-2016-6288 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6288">CVE-2016-6288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6289/">CVE-2016-6289 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6289">CVE-2016-6289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6290/">CVE-2016-6290 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6290">CVE-2016-6290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6291/">CVE-2016-6291 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6291">CVE-2016-6291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6296/">CVE-2016-6296 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6296">CVE-2016-6296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6297/">CVE-2016-6297 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6297">CVE-2016-6297 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584744" comment="apache2-mod_php53-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584745" comment="php53-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584746" comment="php53-bcmath-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584747" comment="php53-bz2-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584748" comment="php53-calendar-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584749" comment="php53-ctype-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584750" comment="php53-curl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584751" comment="php53-dba-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584752" comment="php53-dom-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584753" comment="php53-exif-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584754" comment="php53-fastcgi-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584755" comment="php53-fileinfo-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584756" comment="php53-ftp-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584757" comment="php53-gd-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584758" comment="php53-gettext-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584759" comment="php53-gmp-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584760" comment="php53-iconv-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584761" comment="php53-intl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584762" comment="php53-json-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584763" comment="php53-ldap-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584764" comment="php53-mbstring-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584765" comment="php53-mcrypt-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584766" comment="php53-mysql-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584767" comment="php53-odbc-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584768" comment="php53-openssl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584769" comment="php53-pcntl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584770" comment="php53-pdo-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584771" comment="php53-pear-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584772" comment="php53-pgsql-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584773" comment="php53-pspell-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584774" comment="php53-shmop-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584775" comment="php53-snmp-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584776" comment="php53-soap-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584777" comment="php53-suhosin-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584778" comment="php53-sysvmsg-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584779" comment="php53-sysvsem-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584780" comment="php53-sysvshm-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584781" comment="php53-tokenizer-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584782" comment="php53-wddx-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584783" comment="php53-xmlreader-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584784" comment="php53-xmlrpc-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584785" comment="php53-xmlwriter-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584786" comment="php53-xsl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584787" comment="php53-zip-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584788" comment="php53-zlib-5.3.17-79.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584744" comment="apache2-mod_php53-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584745" comment="php53-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584746" comment="php53-bcmath-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584747" comment="php53-bz2-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584748" comment="php53-calendar-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584749" comment="php53-ctype-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584750" comment="php53-curl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584751" comment="php53-dba-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584752" comment="php53-dom-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584753" comment="php53-exif-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584754" comment="php53-fastcgi-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584755" comment="php53-fileinfo-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584756" comment="php53-ftp-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584757" comment="php53-gd-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584758" comment="php53-gettext-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584759" comment="php53-gmp-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584760" comment="php53-iconv-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584761" comment="php53-intl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584762" comment="php53-json-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584763" comment="php53-ldap-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584764" comment="php53-mbstring-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584765" comment="php53-mcrypt-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584766" comment="php53-mysql-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584767" comment="php53-odbc-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584768" comment="php53-openssl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584769" comment="php53-pcntl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584770" comment="php53-pdo-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584771" comment="php53-pear-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584772" comment="php53-pgsql-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584773" comment="php53-pspell-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584774" comment="php53-shmop-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584775" comment="php53-snmp-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584776" comment="php53-soap-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584777" comment="php53-suhosin-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584778" comment="php53-sysvmsg-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584779" comment="php53-sysvsem-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584780" comment="php53-sysvshm-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584781" comment="php53-tokenizer-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584782" comment="php53-wddx-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584783" comment="php53-xmlreader-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584784" comment="php53-xmlrpc-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584785" comment="php53-xmlwriter-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584786" comment="php53-xsl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584787" comment="php53-zip-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584788" comment="php53-zlib-5.3.17-79.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220321" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="997206" ref_url="https://bugzilla.suse.com/997206" source="BUGZILLA"/>
		<reference ref_id="997207" ref_url="https://bugzilla.suse.com/997207" source="BUGZILLA"/>
		<reference ref_id="997208" ref_url="https://bugzilla.suse.com/997208" source="BUGZILLA"/>
		<reference ref_id="997210" ref_url="https://bugzilla.suse.com/997210" source="BUGZILLA"/>
		<reference ref_id="997211" ref_url="https://bugzilla.suse.com/997211" source="BUGZILLA"/>
		<reference ref_id="997220" ref_url="https://bugzilla.suse.com/997220" source="BUGZILLA"/>
		<reference ref_id="997225" ref_url="https://bugzilla.suse.com/997225" source="BUGZILLA"/>
		<reference ref_id="997230" ref_url="https://bugzilla.suse.com/997230" source="BUGZILLA"/>
		<reference ref_id="997257" ref_url="https://bugzilla.suse.com/997257" source="BUGZILLA"/>
		<reference ref_id="999679" ref_url="https://bugzilla.suse.com/999679" source="BUGZILLA"/>
		<reference ref_id="999680" ref_url="https://bugzilla.suse.com/999680" source="BUGZILLA"/>
		<reference ref_id="999682" ref_url="https://bugzilla.suse.com/999682" source="BUGZILLA"/>
		<reference ref_id="999684" ref_url="https://bugzilla.suse.com/999684" source="BUGZILLA"/>
		<reference ref_id="999685" ref_url="https://bugzilla.suse.com/999685" source="BUGZILLA"/>
		<reference ref_id="999819" ref_url="https://bugzilla.suse.com/999819" source="BUGZILLA"/>
		<reference ref_id="999820" ref_url="https://bugzilla.suse.com/999820" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7124" ref_url="https://www.suse.com/security/cve/CVE-2016-7124/" source="CVE"/>
		<reference ref_id="CVE-2016-7125" ref_url="https://www.suse.com/security/cve/CVE-2016-7125/" source="CVE"/>
		<reference ref_id="CVE-2016-7126" ref_url="https://www.suse.com/security/cve/CVE-2016-7126/" source="CVE"/>
		<reference ref_id="CVE-2016-7127" ref_url="https://www.suse.com/security/cve/CVE-2016-7127/" source="CVE"/>
		<reference ref_id="CVE-2016-7128" ref_url="https://www.suse.com/security/cve/CVE-2016-7128/" source="CVE"/>
		<reference ref_id="CVE-2016-7129" ref_url="https://www.suse.com/security/cve/CVE-2016-7129/" source="CVE"/>
		<reference ref_id="CVE-2016-7130" ref_url="https://www.suse.com/security/cve/CVE-2016-7130/" source="CVE"/>
		<reference ref_id="CVE-2016-7131" ref_url="https://www.suse.com/security/cve/CVE-2016-7131/" source="CVE"/>
		<reference ref_id="CVE-2016-7132" ref_url="https://www.suse.com/security/cve/CVE-2016-7132/" source="CVE"/>
		<reference ref_id="CVE-2016-7411" ref_url="https://www.suse.com/security/cve/CVE-2016-7411/" source="CVE"/>
		<reference ref_id="CVE-2016-7412" ref_url="https://www.suse.com/security/cve/CVE-2016-7412/" source="CVE"/>
		<reference ref_id="CVE-2016-7413" ref_url="https://www.suse.com/security/cve/CVE-2016-7413/" source="CVE"/>
		<reference ref_id="CVE-2016-7414" ref_url="https://www.suse.com/security/cve/CVE-2016-7414/" source="CVE"/>
		<reference ref_id="CVE-2016-7416" ref_url="https://www.suse.com/security/cve/CVE-2016-7416/" source="CVE"/>
		<reference ref_id="CVE-2016-7417" ref_url="https://www.suse.com/security/cve/CVE-2016-7417/" source="CVE"/>
		<reference ref_id="CVE-2016-7418" ref_url="https://www.suse.com/security/cve/CVE-2016-7418/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002310.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following security issues:

* CVE-2016-7124: Create an Unexpected Object and Don't Invoke __wakeup() in Deserialization
* CVE-2016-7125: PHP Session Data Injection Vulnerability
* CVE-2016-7126: select_colors write out-of-bounds
* CVE-2016-7127: imagegammacorrect allowed arbitrary write access
* CVE-2016-7128: Memory Leakage In exif_process_IFD_in_TIFF
* CVE-2016-7129: wddx_deserialize allows illegal memory access
* CVE-2016-7130: wddx_deserialize null dereference
* CVE-2016-7131: wddx_deserialize null dereference with invalid xml
* CVE-2016-7132: wddx_deserialize null dereference in php_wddx_pop_element
* CVE-2016-7411: php5: Memory corruption when destructing deserialized object
* CVE-2016-7412: Heap overflow in mysqlnd when not receiving UNSIGNED_FLAG in BIT field
* CVE-2016-7413: Use after free in wddx_deserialize
* CVE-2016-7414: Out of bounds heap read when verifying signature of zip phar in phar_parse_zipfile
* CVE-2016-7416: Stack based buffer overflow in msgfmt_format_message
* CVE-2016-7417: Missing type check when unserializing SplArray
* CVE-2016-7418: Null pointer dereference in php_wddx_push_element
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-05"/>
	<updated date="2016-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/997206">SUSE bug 997206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997207">SUSE bug 997207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997208">SUSE bug 997208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997210">SUSE bug 997210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997211">SUSE bug 997211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997220">SUSE bug 997220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997225">SUSE bug 997225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997230">SUSE bug 997230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997257">SUSE bug 997257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999679">SUSE bug 999679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999680">SUSE bug 999680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999682">SUSE bug 999682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999684">SUSE bug 999684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999685">SUSE bug 999685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999819">SUSE bug 999819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999820">SUSE bug 999820</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7124/">CVE-2016-7124 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7124">CVE-2016-7124 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-7125/">CVE-2016-7125 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7125">CVE-2016-7125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7126/">CVE-2016-7126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7126">CVE-2016-7126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7127/">CVE-2016-7127 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7127">CVE-2016-7127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7128/">CVE-2016-7128 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7128">CVE-2016-7128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7129/">CVE-2016-7129 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7129">CVE-2016-7129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7130/">CVE-2016-7130 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7130">CVE-2016-7130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7131/">CVE-2016-7131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7131">CVE-2016-7131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7132/">CVE-2016-7132 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7132">CVE-2016-7132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7411/">CVE-2016-7411 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7411">CVE-2016-7411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7412/">CVE-2016-7412 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7412">CVE-2016-7412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7413/">CVE-2016-7413 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7413">CVE-2016-7413 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7414/">CVE-2016-7414 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7414">CVE-2016-7414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7416/">CVE-2016-7416 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7416">CVE-2016-7416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7417/">CVE-2016-7417 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7417">CVE-2016-7417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7418/">CVE-2016-7418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7418">CVE-2016-7418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584789" comment="apache2-mod_php53-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584790" comment="php53-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584791" comment="php53-bcmath-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584792" comment="php53-bz2-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584793" comment="php53-calendar-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584794" comment="php53-ctype-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584795" comment="php53-curl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584796" comment="php53-dba-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584797" comment="php53-dom-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584798" comment="php53-exif-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584799" comment="php53-fastcgi-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584800" comment="php53-fileinfo-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584801" comment="php53-ftp-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584802" comment="php53-gd-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584803" comment="php53-gettext-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584804" comment="php53-gmp-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584805" comment="php53-iconv-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584806" comment="php53-intl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584807" comment="php53-json-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584808" comment="php53-ldap-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584809" comment="php53-mbstring-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584810" comment="php53-mcrypt-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584811" comment="php53-mysql-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584812" comment="php53-odbc-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584813" comment="php53-openssl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584814" comment="php53-pcntl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584815" comment="php53-pdo-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584816" comment="php53-pear-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584817" comment="php53-pgsql-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584818" comment="php53-pspell-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584819" comment="php53-shmop-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584820" comment="php53-snmp-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584821" comment="php53-soap-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584822" comment="php53-suhosin-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584823" comment="php53-sysvmsg-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584824" comment="php53-sysvsem-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584825" comment="php53-sysvshm-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584826" comment="php53-tokenizer-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584827" comment="php53-wddx-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584828" comment="php53-xmlreader-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584829" comment="php53-xmlrpc-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584830" comment="php53-xmlwriter-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584831" comment="php53-xsl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584832" comment="php53-zip-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584833" comment="php53-zlib-5.3.17-84.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584789" comment="apache2-mod_php53-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584790" comment="php53-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584791" comment="php53-bcmath-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584792" comment="php53-bz2-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584793" comment="php53-calendar-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584794" comment="php53-ctype-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584795" comment="php53-curl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584796" comment="php53-dba-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584797" comment="php53-dom-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584798" comment="php53-exif-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584799" comment="php53-fastcgi-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584800" comment="php53-fileinfo-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584801" comment="php53-ftp-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584802" comment="php53-gd-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584803" comment="php53-gettext-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584804" comment="php53-gmp-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584805" comment="php53-iconv-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584806" comment="php53-intl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584807" comment="php53-json-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584808" comment="php53-ldap-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584809" comment="php53-mbstring-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584810" comment="php53-mcrypt-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584811" comment="php53-mysql-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584812" comment="php53-odbc-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584813" comment="php53-openssl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584814" comment="php53-pcntl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584815" comment="php53-pdo-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584816" comment="php53-pear-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584817" comment="php53-pgsql-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584818" comment="php53-pspell-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584819" comment="php53-shmop-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584820" comment="php53-snmp-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584821" comment="php53-soap-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584822" comment="php53-suhosin-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584823" comment="php53-sysvmsg-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584824" comment="php53-sysvsem-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584825" comment="php53-sysvshm-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584826" comment="php53-tokenizer-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584827" comment="php53-wddx-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584828" comment="php53-xmlreader-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584829" comment="php53-xmlrpc-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584830" comment="php53-xmlwriter-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584831" comment="php53-xsl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584832" comment="php53-zip-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584833" comment="php53-zlib-5.3.17-84.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220322" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1004924" ref_url="https://bugzilla.suse.com/1004924" source="BUGZILLA"/>
		<reference ref_id="1005274" ref_url="https://bugzilla.suse.com/1005274" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6911" ref_url="https://www.suse.com/security/cve/CVE-2016-6911/" source="CVE"/>
		<reference ref_id="CVE-2016-8670" ref_url="https://www.suse.com/security/cve/CVE-2016-8670/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002378.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following issues:

- CVE-2016-8670: Stack Buffer Overflow in GD dynamicGetbuf (bsc#1004924)
- CVE-2016-6911: Check for out-of-bound read in dynamicGetbuf() (bsc#1005274)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-31"/>
	<updated date="2016-10-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1004924">SUSE bug 1004924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005274">SUSE bug 1005274</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6911/">CVE-2016-6911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6911">CVE-2016-6911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8670/">CVE-2016-8670 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8670">CVE-2016-8670 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584834" comment="apache2-mod_php53-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584835" comment="php53-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584836" comment="php53-bcmath-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584837" comment="php53-bz2-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584838" comment="php53-calendar-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584839" comment="php53-ctype-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584840" comment="php53-curl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584841" comment="php53-dba-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584842" comment="php53-dom-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584843" comment="php53-exif-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584844" comment="php53-fastcgi-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584845" comment="php53-fileinfo-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584846" comment="php53-ftp-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584847" comment="php53-gd-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584848" comment="php53-gettext-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584849" comment="php53-gmp-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584850" comment="php53-iconv-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584851" comment="php53-intl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584852" comment="php53-json-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584853" comment="php53-ldap-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584854" comment="php53-mbstring-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584855" comment="php53-mcrypt-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584856" comment="php53-mysql-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584857" comment="php53-odbc-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584858" comment="php53-openssl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584859" comment="php53-pcntl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584860" comment="php53-pdo-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584861" comment="php53-pear-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584862" comment="php53-pgsql-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584863" comment="php53-pspell-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584864" comment="php53-shmop-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584865" comment="php53-snmp-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584866" comment="php53-soap-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584867" comment="php53-suhosin-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584868" comment="php53-sysvmsg-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584869" comment="php53-sysvsem-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584870" comment="php53-sysvshm-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584871" comment="php53-tokenizer-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584872" comment="php53-wddx-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584873" comment="php53-xmlreader-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584874" comment="php53-xmlrpc-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584875" comment="php53-xmlwriter-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584876" comment="php53-xsl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584877" comment="php53-zip-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584878" comment="php53-zlib-5.3.17-87.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584834" comment="apache2-mod_php53-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584835" comment="php53-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584836" comment="php53-bcmath-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584837" comment="php53-bz2-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584838" comment="php53-calendar-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584839" comment="php53-ctype-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584840" comment="php53-curl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584841" comment="php53-dba-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584842" comment="php53-dom-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584843" comment="php53-exif-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584844" comment="php53-fastcgi-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584845" comment="php53-fileinfo-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584846" comment="php53-ftp-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584847" comment="php53-gd-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584848" comment="php53-gettext-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584849" comment="php53-gmp-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584850" comment="php53-iconv-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584851" comment="php53-intl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584852" comment="php53-json-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584853" comment="php53-ldap-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584854" comment="php53-mbstring-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584855" comment="php53-mcrypt-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584856" comment="php53-mysql-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584857" comment="php53-odbc-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584858" comment="php53-openssl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584859" comment="php53-pcntl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584860" comment="php53-pdo-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584861" comment="php53-pear-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584862" comment="php53-pgsql-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584863" comment="php53-pspell-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584864" comment="php53-shmop-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584865" comment="php53-snmp-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584866" comment="php53-soap-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584867" comment="php53-suhosin-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584868" comment="php53-sysvmsg-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584869" comment="php53-sysvsem-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584870" comment="php53-sysvshm-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584871" comment="php53-tokenizer-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584872" comment="php53-wddx-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584873" comment="php53-xmlreader-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584874" comment="php53-xmlrpc-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584875" comment="php53-xmlwriter-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584876" comment="php53-xsl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584877" comment="php53-zip-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584878" comment="php53-zlib-5.3.17-87.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220323" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1012232" ref_url="https://bugzilla.suse.com/1012232" source="BUGZILLA"/>
		<reference ref_id="1015187" ref_url="https://bugzilla.suse.com/1015187" source="BUGZILLA"/>
		<reference ref_id="1015188" ref_url="https://bugzilla.suse.com/1015188" source="BUGZILLA"/>
		<reference ref_id="1015189" ref_url="https://bugzilla.suse.com/1015189" source="BUGZILLA"/>
		<reference ref_id="974305" ref_url="https://bugzilla.suse.com/974305" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9912" ref_url="https://www.suse.com/security/cve/CVE-2014-9912/" source="CVE"/>
		<reference ref_id="CVE-2016-9933" ref_url="https://www.suse.com/security/cve/CVE-2016-9933/" source="CVE"/>
		<reference ref_id="CVE-2016-9934" ref_url="https://www.suse.com/security/cve/CVE-2016-9934/" source="CVE"/>
		<reference ref_id="CVE-2016-9935" ref_url="https://www.suse.com/security/cve/CVE-2016-9935/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002552.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following issues:

* CVE-2014-9912: Stack-based buffer overflow in uloc_getDisplayName() [bsc#1012232]
* CVE-2016-9933: Possible stack overflow on truecolor images handling [bsc#1015187]
* CVE-2016-9934: Dereference from NULL pointer could lead to crash [bsc#1015188]
* CVE-2016-9935: Invalid read could lead to crash [bsc#1015189]
* Buffer overflow in libmagic, allowing attackers to crash the PHP interpreter [bsc#974305]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1012232">SUSE bug 1012232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015187">SUSE bug 1015187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015188">SUSE bug 1015188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015189">SUSE bug 1015189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974305">SUSE bug 974305</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9912/">CVE-2014-9912 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9912">CVE-2014-9912 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9933/">CVE-2016-9933 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9933">CVE-2016-9933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9934/">CVE-2016-9934 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9934">CVE-2016-9934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9935/">CVE-2016-9935 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9935">CVE-2016-9935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584879" comment="apache2-mod_php53-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584880" comment="php53-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584881" comment="php53-bcmath-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584882" comment="php53-bz2-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584883" comment="php53-calendar-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584884" comment="php53-ctype-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584885" comment="php53-curl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584886" comment="php53-dba-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584887" comment="php53-dom-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584888" comment="php53-exif-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584889" comment="php53-fastcgi-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584890" comment="php53-fileinfo-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584891" comment="php53-ftp-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584892" comment="php53-gd-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584893" comment="php53-gettext-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584894" comment="php53-gmp-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584895" comment="php53-iconv-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584896" comment="php53-intl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584897" comment="php53-json-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584898" comment="php53-ldap-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584899" comment="php53-mbstring-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584900" comment="php53-mcrypt-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584901" comment="php53-mysql-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584902" comment="php53-odbc-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584903" comment="php53-openssl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584904" comment="php53-pcntl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584905" comment="php53-pdo-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584906" comment="php53-pear-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584907" comment="php53-pgsql-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584908" comment="php53-pspell-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584909" comment="php53-shmop-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584910" comment="php53-snmp-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584911" comment="php53-soap-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584912" comment="php53-suhosin-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584913" comment="php53-sysvmsg-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584914" comment="php53-sysvsem-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584915" comment="php53-sysvshm-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584916" comment="php53-tokenizer-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584917" comment="php53-wddx-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584918" comment="php53-xmlreader-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584919" comment="php53-xmlrpc-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584920" comment="php53-xmlwriter-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584921" comment="php53-xsl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584922" comment="php53-zip-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584923" comment="php53-zlib-5.3.17-94.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584879" comment="apache2-mod_php53-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584880" comment="php53-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584881" comment="php53-bcmath-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584882" comment="php53-bz2-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584883" comment="php53-calendar-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584884" comment="php53-ctype-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584885" comment="php53-curl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584886" comment="php53-dba-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584887" comment="php53-dom-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584888" comment="php53-exif-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584889" comment="php53-fastcgi-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584890" comment="php53-fileinfo-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584891" comment="php53-ftp-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584892" comment="php53-gd-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584893" comment="php53-gettext-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584894" comment="php53-gmp-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584895" comment="php53-iconv-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584896" comment="php53-intl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584897" comment="php53-json-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584898" comment="php53-ldap-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584899" comment="php53-mbstring-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584900" comment="php53-mcrypt-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584901" comment="php53-mysql-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584902" comment="php53-odbc-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584903" comment="php53-openssl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584904" comment="php53-pcntl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584905" comment="php53-pdo-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584906" comment="php53-pear-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584907" comment="php53-pgsql-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584908" comment="php53-pspell-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584909" comment="php53-shmop-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584910" comment="php53-snmp-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584911" comment="php53-soap-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584912" comment="php53-suhosin-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584913" comment="php53-sysvmsg-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584914" comment="php53-sysvsem-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584915" comment="php53-sysvshm-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584916" comment="php53-tokenizer-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584917" comment="php53-wddx-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584918" comment="php53-xmlreader-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584919" comment="php53-xmlrpc-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584920" comment="php53-xmlwriter-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584921" comment="php53-xsl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584922" comment="php53-zip-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584923" comment="php53-zlib-5.3.17-94.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220324" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1019550" ref_url="https://bugzilla.suse.com/1019550" source="BUGZILLA"/>
		<reference ref_id="1022219" ref_url="https://bugzilla.suse.com/1022219" source="BUGZILLA"/>
		<reference ref_id="1022255" ref_url="https://bugzilla.suse.com/1022255" source="BUGZILLA"/>
		<reference ref_id="1022257" ref_url="https://bugzilla.suse.com/1022257" source="BUGZILLA"/>
		<reference ref_id="1022260" ref_url="https://bugzilla.suse.com/1022260" source="BUGZILLA"/>
		<reference ref_id="1022263" ref_url="https://bugzilla.suse.com/1022263" source="BUGZILLA"/>
		<reference ref_id="1022264" ref_url="https://bugzilla.suse.com/1022264" source="BUGZILLA"/>
		<reference ref_id="1022265" ref_url="https://bugzilla.suse.com/1022265" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10158" ref_url="https://www.suse.com/security/cve/CVE-2016-10158/" source="CVE"/>
		<reference ref_id="CVE-2016-10159" ref_url="https://www.suse.com/security/cve/CVE-2016-10159/" source="CVE"/>
		<reference ref_id="CVE-2016-10160" ref_url="https://www.suse.com/security/cve/CVE-2016-10160/" source="CVE"/>
		<reference ref_id="CVE-2016-10161" ref_url="https://www.suse.com/security/cve/CVE-2016-10161/" source="CVE"/>
		<reference ref_id="CVE-2016-10166" ref_url="https://www.suse.com/security/cve/CVE-2016-10166/" source="CVE"/>
		<reference ref_id="CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167/" source="CVE"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-7478" ref_url="https://www.suse.com/security/cve/CVE-2016-7478/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002664.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following security issues:

- CVE-2016-7478: When unserializing untrusted input data, PHP could end up in an infinite
  loop, causing denial of service (bsc#1019550)
- CVE-2016-10158: The exif_convert_any_to_int function in ext/exif/exif.c
  in PHP allowed remote attackers to cause a denial of service (application
  crash) via crafted EXIF data that triggers an attempt to divide the
  minimum representable negative integer by -1.  (bsc#1022219)
- CVE-2016-10159: Integer overflow in the phar_parse_pharfile function
  in ext/phar/phar.c in PHP allowed remote attackers to cause a denial
  of service (memory consumption or application crash) via a truncated
  manifest entry in a PHAR archive. (bsc#1022255)
- CVE-2016-10160: Off-by-one error in the phar_parse_pharfile function
  in ext/phar/phar.c in PHP allowed remote attackers to cause a denial
  of service (memory corruption) or possibly execute arbitrary code via
  a crafted PHAR archive with an alias mismatch. (bsc#1022257)
- CVE-2016-10161: The object_common1 function in
  ext/standard/var_unserializer.c in PHP allowed remote attackers to
  cause a denial of service (buffer over-read and application crash) via
  crafted serialized data that is mishandled in a finish_nested_data call.
  (bsc#1022260)
- CVE-2016-10166: A potential unsigned underflow in gd interpolation
  functions could lead to memory corruption in the PHP gd module
  (bsc#1022263)
- CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx()
  could lead to php out of memory even on small files. (bsc#1022264)
- CVE-2016-10168: A signed integer overflow in the gd module could lead
  to memory corruption (bsc#1022265)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-27"/>
	<updated date="2017-02-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1019550">SUSE bug 1019550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022219">SUSE bug 1022219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022255">SUSE bug 1022255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022257">SUSE bug 1022257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022260">SUSE bug 1022260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022263">SUSE bug 1022263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022264">SUSE bug 1022264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022265">SUSE bug 1022265</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10158/">CVE-2016-10158 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10158">CVE-2016-10158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10159/">CVE-2016-10159 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10159">CVE-2016-10159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10160/">CVE-2016-10160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10160">CVE-2016-10160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10161/">CVE-2016-10161 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10161">CVE-2016-10161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10166/">CVE-2016-10166 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10166">CVE-2016-10166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10167">CVE-2016-10167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10168">CVE-2016-10168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7478/">CVE-2016-7478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7478">CVE-2016-7478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584924" comment="apache2-mod_php53-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584925" comment="php53-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584926" comment="php53-bcmath-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584927" comment="php53-bz2-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584928" comment="php53-calendar-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584929" comment="php53-ctype-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584930" comment="php53-curl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584931" comment="php53-dba-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584932" comment="php53-dom-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584933" comment="php53-exif-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584934" comment="php53-fastcgi-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584935" comment="php53-fileinfo-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584936" comment="php53-ftp-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584937" comment="php53-gd-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584938" comment="php53-gettext-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584939" comment="php53-gmp-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584940" comment="php53-iconv-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584941" comment="php53-intl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584942" comment="php53-json-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584943" comment="php53-ldap-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584944" comment="php53-mbstring-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584945" comment="php53-mcrypt-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584946" comment="php53-mysql-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584947" comment="php53-odbc-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584948" comment="php53-openssl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584949" comment="php53-pcntl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584950" comment="php53-pdo-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584951" comment="php53-pear-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584952" comment="php53-pgsql-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584953" comment="php53-pspell-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584954" comment="php53-shmop-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584955" comment="php53-snmp-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584956" comment="php53-soap-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584957" comment="php53-suhosin-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584958" comment="php53-sysvmsg-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584959" comment="php53-sysvsem-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584960" comment="php53-sysvshm-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584961" comment="php53-tokenizer-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584962" comment="php53-wddx-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584963" comment="php53-xmlreader-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584964" comment="php53-xmlrpc-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584965" comment="php53-xmlwriter-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584966" comment="php53-xsl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584967" comment="php53-zip-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584968" comment="php53-zlib-5.3.17-101.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584924" comment="apache2-mod_php53-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584925" comment="php53-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584926" comment="php53-bcmath-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584927" comment="php53-bz2-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584928" comment="php53-calendar-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584929" comment="php53-ctype-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584930" comment="php53-curl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584931" comment="php53-dba-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584932" comment="php53-dom-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584933" comment="php53-exif-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584934" comment="php53-fastcgi-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584935" comment="php53-fileinfo-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584936" comment="php53-ftp-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584937" comment="php53-gd-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584938" comment="php53-gettext-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584939" comment="php53-gmp-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584940" comment="php53-iconv-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584941" comment="php53-intl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584942" comment="php53-json-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584943" comment="php53-ldap-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584944" comment="php53-mbstring-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584945" comment="php53-mcrypt-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584946" comment="php53-mysql-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584947" comment="php53-odbc-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584948" comment="php53-openssl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584949" comment="php53-pcntl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584950" comment="php53-pdo-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584951" comment="php53-pear-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584952" comment="php53-pgsql-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584953" comment="php53-pspell-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584954" comment="php53-shmop-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584955" comment="php53-snmp-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584956" comment="php53-soap-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584957" comment="php53-suhosin-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584958" comment="php53-sysvmsg-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584959" comment="php53-sysvsem-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584960" comment="php53-sysvshm-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584961" comment="php53-tokenizer-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584962" comment="php53-wddx-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584963" comment="php53-xmlreader-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584964" comment="php53-xmlrpc-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584965" comment="php53-xmlwriter-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584966" comment="php53-xsl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584967" comment="php53-zip-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584968" comment="php53-zlib-5.3.17-101.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220325" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1031246" ref_url="https://bugzilla.suse.com/1031246" source="BUGZILLA"/>
		<reference ref_id="1035111" ref_url="https://bugzilla.suse.com/1035111" source="BUGZILLA"/>
		<reference ref_id="1040883" ref_url="https://bugzilla.suse.com/1040883" source="BUGZILLA"/>
		<reference ref_id="1040889" ref_url="https://bugzilla.suse.com/1040889" source="BUGZILLA"/>
		<reference ref_id="1040891" ref_url="https://bugzilla.suse.com/1040891" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6294" ref_url="https://www.suse.com/security/cve/CVE-2016-6294/" source="CVE"/>
		<reference ref_id="CVE-2017-7272" ref_url="https://www.suse.com/security/cve/CVE-2017-7272/" source="CVE"/>
		<reference ref_id="CVE-2017-9224" ref_url="https://www.suse.com/security/cve/CVE-2017-9224/" source="CVE"/>
		<reference ref_id="CVE-2017-9226" ref_url="https://www.suse.com/security/cve/CVE-2017-9226/" source="CVE"/>
		<reference ref_id="CVE-2017-9227" ref_url="https://www.suse.com/security/cve/CVE-2017-9227/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002949.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following issues:

This security issue was fixed:

- CVE-2017-7272: PHP enabled potential SSRF in applications that accept an fsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax was recognized, fsockopen used the port number that is specified in the hostname argument, instead of the port number in the second argument of the function (bsc#1031246)
- CVE-2016-6294: The locale_accept_from_http function in ext/intl/locale/locale_methods.c did not properly restrict calls to the ICU uloc_acceptLanguageFromHTTP function, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long argument (bsc#1035111).
- CVE-2017-9227: An issue was discovered in Oniguruma 6.2.0, as used in mbstring in PHP. A stack out-of-bounds read occurs in mbc_enc_len() during regular expression searching. Invalid handling of reg-&gt;dmin in forward_search_range() could result in an invalid pointer dereference, as an out-of-bounds read from a stack buffer. (bsc#1040883)
- CVE-2017-9226: An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in mbstring in PHP. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption. (bsc#1040889)
- CVE-2017-9224: An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in mbstring in PHP. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer. (bsc#1040891)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-16"/>
	<updated date="2017-06-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1031246">SUSE bug 1031246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035111">SUSE bug 1035111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040883">SUSE bug 1040883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040889">SUSE bug 1040889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040891">SUSE bug 1040891</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6294/">CVE-2016-6294 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6294">CVE-2016-6294 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7272/">CVE-2017-7272 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7272">CVE-2017-7272 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9224/">CVE-2017-9224 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9224">CVE-2017-9224 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9226/">CVE-2017-9226 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9226">CVE-2017-9226 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9227/">CVE-2017-9227 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9227">CVE-2017-9227 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584969" comment="apache2-mod_php53-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584970" comment="php53-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584971" comment="php53-bcmath-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584972" comment="php53-bz2-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584973" comment="php53-calendar-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584974" comment="php53-ctype-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584975" comment="php53-curl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584976" comment="php53-dba-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584977" comment="php53-dom-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584978" comment="php53-exif-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584979" comment="php53-fastcgi-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584980" comment="php53-fileinfo-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584981" comment="php53-ftp-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584982" comment="php53-gd-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584983" comment="php53-gettext-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584984" comment="php53-gmp-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584985" comment="php53-iconv-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584986" comment="php53-intl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584987" comment="php53-json-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584988" comment="php53-ldap-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584989" comment="php53-mbstring-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584990" comment="php53-mcrypt-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584991" comment="php53-mysql-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584992" comment="php53-odbc-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584993" comment="php53-openssl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584994" comment="php53-pcntl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584995" comment="php53-pdo-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584996" comment="php53-pear-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584997" comment="php53-pgsql-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584998" comment="php53-pspell-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584999" comment="php53-shmop-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585000" comment="php53-snmp-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585001" comment="php53-soap-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585002" comment="php53-suhosin-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585003" comment="php53-sysvmsg-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585004" comment="php53-sysvsem-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585005" comment="php53-sysvshm-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585006" comment="php53-tokenizer-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585007" comment="php53-wddx-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585008" comment="php53-xmlreader-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585009" comment="php53-xmlrpc-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585010" comment="php53-xmlwriter-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585011" comment="php53-xsl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585012" comment="php53-zip-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585013" comment="php53-zlib-5.3.17-108.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584969" comment="apache2-mod_php53-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584970" comment="php53-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584971" comment="php53-bcmath-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584972" comment="php53-bz2-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584973" comment="php53-calendar-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584974" comment="php53-ctype-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584975" comment="php53-curl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584976" comment="php53-dba-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584977" comment="php53-dom-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584978" comment="php53-exif-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584979" comment="php53-fastcgi-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584980" comment="php53-fileinfo-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584981" comment="php53-ftp-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584982" comment="php53-gd-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584983" comment="php53-gettext-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584984" comment="php53-gmp-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584985" comment="php53-iconv-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584986" comment="php53-intl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584987" comment="php53-json-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584988" comment="php53-ldap-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584989" comment="php53-mbstring-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584990" comment="php53-mcrypt-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584991" comment="php53-mysql-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584992" comment="php53-odbc-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584993" comment="php53-openssl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584994" comment="php53-pcntl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584995" comment="php53-pdo-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584996" comment="php53-pear-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584997" comment="php53-pgsql-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584998" comment="php53-pspell-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584999" comment="php53-shmop-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585000" comment="php53-snmp-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585001" comment="php53-soap-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585002" comment="php53-suhosin-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585003" comment="php53-sysvmsg-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585004" comment="php53-sysvsem-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585005" comment="php53-sysvshm-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585006" comment="php53-tokenizer-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585007" comment="php53-wddx-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585008" comment="php53-xmlreader-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585009" comment="php53-xmlrpc-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585010" comment="php53-xmlwriter-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585011" comment="php53-xsl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585012" comment="php53-zip-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585013" comment="php53-zlib-5.3.17-108.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220326" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1031246" ref_url="https://bugzilla.suse.com/1031246" source="BUGZILLA"/>
		<reference ref_id="1044976" ref_url="https://bugzilla.suse.com/1044976" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7272" ref_url="https://www.suse.com/security/cve/CVE-2017-7272/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002989.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

- The fix for CVE-2017-7272 was reverted, as it caused regressions in the mysql server connect module.  [bsc#1044976]
  The security fix tried to avoid a server side request forgery, and will be submitted when a better fix becomes available.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-28"/>
	<updated date="2017-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1031246">SUSE bug 1031246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044976">SUSE bug 1044976</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7272/">CVE-2017-7272 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7272">CVE-2017-7272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585014" comment="apache2-mod_php53-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585015" comment="php53-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585016" comment="php53-bcmath-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585017" comment="php53-bz2-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585018" comment="php53-calendar-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585019" comment="php53-ctype-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585020" comment="php53-curl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585021" comment="php53-dba-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585022" comment="php53-dom-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585023" comment="php53-exif-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585024" comment="php53-fastcgi-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585025" comment="php53-fileinfo-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585026" comment="php53-ftp-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585027" comment="php53-gd-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585028" comment="php53-gettext-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585029" comment="php53-gmp-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585030" comment="php53-iconv-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585031" comment="php53-intl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585032" comment="php53-json-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585033" comment="php53-ldap-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585034" comment="php53-mbstring-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585035" comment="php53-mcrypt-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585036" comment="php53-mysql-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585037" comment="php53-odbc-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585038" comment="php53-openssl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585039" comment="php53-pcntl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585040" comment="php53-pdo-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585041" comment="php53-pear-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585042" comment="php53-pgsql-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585043" comment="php53-pspell-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585044" comment="php53-shmop-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585045" comment="php53-snmp-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585046" comment="php53-soap-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585047" comment="php53-suhosin-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585048" comment="php53-sysvmsg-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585049" comment="php53-sysvsem-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585050" comment="php53-sysvshm-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585051" comment="php53-tokenizer-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585052" comment="php53-wddx-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585053" comment="php53-xmlreader-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585054" comment="php53-xmlrpc-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585055" comment="php53-xmlwriter-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585056" comment="php53-xsl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585057" comment="php53-zip-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585058" comment="php53-zlib-5.3.17-111.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585014" comment="apache2-mod_php53-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585015" comment="php53-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585016" comment="php53-bcmath-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585017" comment="php53-bz2-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585018" comment="php53-calendar-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585019" comment="php53-ctype-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585020" comment="php53-curl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585021" comment="php53-dba-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585022" comment="php53-dom-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585023" comment="php53-exif-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585024" comment="php53-fastcgi-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585025" comment="php53-fileinfo-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585026" comment="php53-ftp-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585027" comment="php53-gd-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585028" comment="php53-gettext-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585029" comment="php53-gmp-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585030" comment="php53-iconv-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585031" comment="php53-intl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585032" comment="php53-json-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585033" comment="php53-ldap-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585034" comment="php53-mbstring-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585035" comment="php53-mcrypt-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585036" comment="php53-mysql-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585037" comment="php53-odbc-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585038" comment="php53-openssl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585039" comment="php53-pcntl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585040" comment="php53-pdo-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585041" comment="php53-pear-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585042" comment="php53-pgsql-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585043" comment="php53-pspell-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585044" comment="php53-shmop-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585045" comment="php53-snmp-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585046" comment="php53-soap-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585047" comment="php53-suhosin-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585048" comment="php53-sysvmsg-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585049" comment="php53-sysvsem-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585050" comment="php53-sysvshm-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585051" comment="php53-tokenizer-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585052" comment="php53-wddx-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585053" comment="php53-xmlreader-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585054" comment="php53-xmlrpc-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585055" comment="php53-xmlwriter-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585056" comment="php53-xsl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585057" comment="php53-zip-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585058" comment="php53-zlib-5.3.17-111.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220327" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1047454" ref_url="https://bugzilla.suse.com/1047454" source="BUGZILLA"/>
		<reference ref_id="1048094" ref_url="https://bugzilla.suse.com/1048094" source="BUGZILLA"/>
		<reference ref_id="1048096" ref_url="https://bugzilla.suse.com/1048096" source="BUGZILLA"/>
		<reference ref_id="1048111" ref_url="https://bugzilla.suse.com/1048111" source="BUGZILLA"/>
		<reference ref_id="1048112" ref_url="https://bugzilla.suse.com/1048112" source="BUGZILLA"/>
		<reference ref_id="1050241" ref_url="https://bugzilla.suse.com/1050241" source="BUGZILLA"/>
		<reference ref_id="1050726" ref_url="https://bugzilla.suse.com/1050726" source="BUGZILLA"/>
		<reference ref_id="1054430" ref_url="https://bugzilla.suse.com/1054430" source="BUGZILLA"/>
		<reference ref_id="986386" ref_url="https://bugzilla.suse.com/986386" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-10397" ref_url="https://www.suse.com/security/cve/CVE-2016-10397/" source="CVE"/>
		<reference ref_id="CVE-2016-5766" ref_url="https://www.suse.com/security/cve/CVE-2016-5766/" source="CVE"/>
		<reference ref_id="CVE-2017-11144" ref_url="https://www.suse.com/security/cve/CVE-2017-11144/" source="CVE"/>
		<reference ref_id="CVE-2017-11145" ref_url="https://www.suse.com/security/cve/CVE-2017-11145/" source="CVE"/>
		<reference ref_id="CVE-2017-11146" ref_url="https://www.suse.com/security/cve/CVE-2017-11146/" source="CVE"/>
		<reference ref_id="CVE-2017-11147" ref_url="https://www.suse.com/security/cve/CVE-2017-11147/" source="CVE"/>
		<reference ref_id="CVE-2017-11628" ref_url="https://www.suse.com/security/cve/CVE-2017-11628/" source="CVE"/>
		<reference ref_id="CVE-2017-12933" ref_url="https://www.suse.com/security/cve/CVE-2017-12933/" source="CVE"/>
		<reference ref_id="CVE-2017-7890" ref_url="https://www.suse.com/security/cve/CVE-2017-7890/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003246.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the several issues.

These security issues were fixed:

- CVE-2017-12933: The finish_nested_data function in ext/standard/var_unserializer.re was prone to a buffer over-read while unserializing untrusted data. Exploitation of this issue could have had an unspecified impact on the integrity of PHP (bsc#1054430).
- CVE-2017-11628: Stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could have caused a denial of service or potentially allowed executing code (bsc#1050726).
- CVE-2017-7890: The GIF decoding function gdImageCreateFromGifCtx in the GD Graphics Library did not zero colorMap arrays use. A specially crafted GIF image could use the uninitialized tables to read ~700 bytes from the top of the stack, potentially disclosing sensitive information (bsc#1050241).
- CVE-2016-5766: Integer overflow in the _gd2GetHeader in the GD Graphics Library (aka libgd) allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via crafted chunk dimensions in an image (bsc#986386).
- CVE-2017-11145: An error in the date extension's timelib_meridian parsing code could have been used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function (bsc#1048112).
- CVE-2017-11146: Lack of bounds checks in timelib_meridian parse code could have lead to information leak [bsc#1048111]
- CVE-2016-10397: Incorrect handling of various URI components in the URL parser could have been used by attackers to bypass hostname-specific URL checks (bsc#1047454).
- CVE-2017-11147: The PHAR archive handler could have been used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the phar_parse_pharfile function (bsc#1048094).
- CVE-2017-11144: The openssl extension PEM sealing code did not check the return value of the OpenSSL sealing function, which could have lead to a crash of the PHP interpreter (bsc#1048096).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-18"/>
	<updated date="2017-09-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047454">SUSE bug 1047454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048094">SUSE bug 1048094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048096">SUSE bug 1048096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048111">SUSE bug 1048111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048112">SUSE bug 1048112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050241">SUSE bug 1050241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050726">SUSE bug 1050726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054430">SUSE bug 1054430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986386">SUSE bug 986386</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10168">CVE-2016-10168 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-10397/">CVE-2016-10397 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10397">CVE-2016-10397 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5766/">CVE-2016-5766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5766">CVE-2016-5766 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11144/">CVE-2017-11144 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11144">CVE-2017-11144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11145/">CVE-2017-11145 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11145">CVE-2017-11145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11146/">CVE-2017-11146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-11146">CVE-2017-11146 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11147/">CVE-2017-11147 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11147">CVE-2017-11147 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11628/">CVE-2017-11628 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11628">CVE-2017-11628 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12933/">CVE-2017-12933 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12933">CVE-2017-12933 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7890/">CVE-2017-7890 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7890">CVE-2017-7890 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585059" comment="apache2-mod_php53-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585060" comment="php53-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585061" comment="php53-bcmath-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585062" comment="php53-bz2-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585063" comment="php53-calendar-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585064" comment="php53-ctype-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585065" comment="php53-curl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585066" comment="php53-dba-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585067" comment="php53-dom-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585068" comment="php53-exif-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585069" comment="php53-fastcgi-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585070" comment="php53-fileinfo-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585071" comment="php53-ftp-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585072" comment="php53-gd-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585073" comment="php53-gettext-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585074" comment="php53-gmp-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585075" comment="php53-iconv-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585076" comment="php53-intl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585077" comment="php53-json-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585078" comment="php53-ldap-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585079" comment="php53-mbstring-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585080" comment="php53-mcrypt-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585081" comment="php53-mysql-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585082" comment="php53-odbc-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585083" comment="php53-openssl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585084" comment="php53-pcntl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585085" comment="php53-pdo-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585086" comment="php53-pear-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585087" comment="php53-pgsql-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585088" comment="php53-pspell-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585089" comment="php53-shmop-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585090" comment="php53-snmp-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585091" comment="php53-soap-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585092" comment="php53-suhosin-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585093" comment="php53-sysvmsg-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585094" comment="php53-sysvsem-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585095" comment="php53-sysvshm-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585096" comment="php53-tokenizer-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585097" comment="php53-wddx-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585098" comment="php53-xmlreader-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585099" comment="php53-xmlrpc-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585100" comment="php53-xmlwriter-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585101" comment="php53-xsl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585102" comment="php53-zip-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585103" comment="php53-zlib-5.3.17-112.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585059" comment="apache2-mod_php53-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585060" comment="php53-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585061" comment="php53-bcmath-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585062" comment="php53-bz2-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585063" comment="php53-calendar-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585064" comment="php53-ctype-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585065" comment="php53-curl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585066" comment="php53-dba-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585067" comment="php53-dom-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585068" comment="php53-exif-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585069" comment="php53-fastcgi-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585070" comment="php53-fileinfo-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585071" comment="php53-ftp-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585072" comment="php53-gd-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585073" comment="php53-gettext-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585074" comment="php53-gmp-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585075" comment="php53-iconv-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585076" comment="php53-intl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585077" comment="php53-json-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585078" comment="php53-ldap-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585079" comment="php53-mbstring-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585080" comment="php53-mcrypt-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585081" comment="php53-mysql-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585082" comment="php53-odbc-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585083" comment="php53-openssl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585084" comment="php53-pcntl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585085" comment="php53-pdo-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585086" comment="php53-pear-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585087" comment="php53-pgsql-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585088" comment="php53-pspell-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585089" comment="php53-shmop-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585090" comment="php53-snmp-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585091" comment="php53-soap-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585092" comment="php53-suhosin-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585093" comment="php53-sysvmsg-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585094" comment="php53-sysvsem-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585095" comment="php53-sysvshm-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585096" comment="php53-tokenizer-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585097" comment="php53-wddx-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585098" comment="php53-xmlreader-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585099" comment="php53-xmlrpc-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585100" comment="php53-xmlwriter-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585101" comment="php53-xsl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585102" comment="php53-zip-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585103" comment="php53-zlib-5.3.17-112.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220328" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1067441" ref_url="https://bugzilla.suse.com/1067441" source="BUGZILLA"/>
		<reference ref_id="1069606" ref_url="https://bugzilla.suse.com/1069606" source="BUGZILLA"/>
		<reference ref_id="1069631" ref_url="https://bugzilla.suse.com/1069631" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16642" ref_url="https://www.suse.com/security/cve/CVE-2017-16642/" source="CVE"/>
		<reference ref_id="CVE-2017-9228" ref_url="https://www.suse.com/security/cve/CVE-2017-9228/" source="CVE"/>
		<reference ref_id="CVE-2017-9229" ref_url="https://www.suse.com/security/cve/CVE-2017-9229/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003559.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:

- CVE-2017-16642: Fix timelib_meridian error that could be used to leak information from the interpreter (bsc#1067441).
- CVE-2017-9228: Fix heap out-of-bounds write that occurs in bitset_set_range() during regex compilation (bsc#1069606).
- CVE-2017-9229: Fix invalid pointer dereference in left_adjust_char_head() (bsc#1069631).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-02"/>
	<updated date="2018-01-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1067441">SUSE bug 1067441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069606">SUSE bug 1069606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069631">SUSE bug 1069631</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16642/">CVE-2017-16642 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16642">CVE-2017-16642 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9228/">CVE-2017-9228 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9228">CVE-2017-9228 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9229/">CVE-2017-9229 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9229">CVE-2017-9229 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585104" comment="apache2-mod_php53-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585105" comment="php53-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585106" comment="php53-bcmath-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585107" comment="php53-bz2-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585108" comment="php53-calendar-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585109" comment="php53-ctype-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585110" comment="php53-curl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585111" comment="php53-dba-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585112" comment="php53-dom-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585113" comment="php53-exif-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585114" comment="php53-fastcgi-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585115" comment="php53-fileinfo-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585116" comment="php53-ftp-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585117" comment="php53-gd-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585118" comment="php53-gettext-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585119" comment="php53-gmp-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585120" comment="php53-iconv-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585121" comment="php53-intl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585122" comment="php53-json-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585123" comment="php53-ldap-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585124" comment="php53-mbstring-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585125" comment="php53-mcrypt-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585126" comment="php53-mysql-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585127" comment="php53-odbc-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585128" comment="php53-openssl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585129" comment="php53-pcntl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585130" comment="php53-pdo-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585131" comment="php53-pear-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585132" comment="php53-pgsql-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585133" comment="php53-pspell-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585134" comment="php53-shmop-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585135" comment="php53-snmp-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585136" comment="php53-soap-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585137" comment="php53-suhosin-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585138" comment="php53-sysvmsg-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585139" comment="php53-sysvsem-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585140" comment="php53-sysvshm-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585141" comment="php53-tokenizer-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585142" comment="php53-wddx-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585143" comment="php53-xmlreader-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585144" comment="php53-xmlrpc-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585145" comment="php53-xmlwriter-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585146" comment="php53-xsl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585147" comment="php53-zip-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585148" comment="php53-zlib-5.3.17-112.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585104" comment="apache2-mod_php53-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585105" comment="php53-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585106" comment="php53-bcmath-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585107" comment="php53-bz2-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585108" comment="php53-calendar-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585109" comment="php53-ctype-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585110" comment="php53-curl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585111" comment="php53-dba-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585112" comment="php53-dom-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585113" comment="php53-exif-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585114" comment="php53-fastcgi-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585115" comment="php53-fileinfo-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585116" comment="php53-ftp-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585117" comment="php53-gd-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585118" comment="php53-gettext-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585119" comment="php53-gmp-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585120" comment="php53-iconv-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585121" comment="php53-intl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585122" comment="php53-json-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585123" comment="php53-ldap-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585124" comment="php53-mbstring-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585125" comment="php53-mcrypt-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585126" comment="php53-mysql-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585127" comment="php53-odbc-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585128" comment="php53-openssl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585129" comment="php53-pcntl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585130" comment="php53-pdo-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585131" comment="php53-pear-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585132" comment="php53-pgsql-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585133" comment="php53-pspell-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585134" comment="php53-shmop-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585135" comment="php53-snmp-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585136" comment="php53-soap-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585137" comment="php53-suhosin-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585138" comment="php53-sysvmsg-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585139" comment="php53-sysvsem-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585140" comment="php53-sysvshm-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585141" comment="php53-tokenizer-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585142" comment="php53-wddx-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585143" comment="php53-xmlreader-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585144" comment="php53-xmlrpc-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585145" comment="php53-xmlwriter-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585146" comment="php53-xsl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585147" comment="php53-zip-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585148" comment="php53-zlib-5.3.17-112.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220329" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1076220" ref_url="https://bugzilla.suse.com/1076220" source="BUGZILLA"/>
		<reference ref_id="1076391" ref_url="https://bugzilla.suse.com/1076391" source="BUGZILLA"/>
		<reference ref_id="1080234" ref_url="https://bugzilla.suse.com/1080234" source="BUGZILLA"/>
		<reference ref_id="1083639" ref_url="https://bugzilla.suse.com/1083639" source="BUGZILLA"/>
		<reference ref_id="986247" ref_url="https://bugzilla.suse.com/986247" source="BUGZILLA"/>
		<reference ref_id="986391" ref_url="https://bugzilla.suse.com/986391" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10712" ref_url="https://www.suse.com/security/cve/CVE-2016-10712/" source="CVE"/>
		<reference ref_id="CVE-2016-5771" ref_url="https://www.suse.com/security/cve/CVE-2016-5771/" source="CVE"/>
		<reference ref_id="CVE-2016-5773" ref_url="https://www.suse.com/security/cve/CVE-2016-5773/" source="CVE"/>
		<reference ref_id="CVE-2018-5711" ref_url="https://www.suse.com/security/cve/CVE-2018-5711/" source="CVE"/>
		<reference ref_id="CVE-2018-5712" ref_url="https://www.suse.com/security/cve/CVE-2018-5712/" source="CVE"/>
		<reference ref_id="CVE-2018-7584" ref_url="https://www.suse.com/security/cve/CVE-2018-7584/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003837.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes several issues.

These security issues were fixed:

- CVE-2016-10712: In PHP all of the return values of stream_get_meta_data
  could be controlled if the input can be controlled (e.g., during file
  uploads).  (bsc#1080234)
- CVE-2018-5712: Prevent reflected XSS on the PHAR 404 error page via the
  URI of a request for a .phar file that allowed for information disclosure
  (bsc#1076220)
- CVE-2018-5711: Prevent integer signedness error that could have lead
  to an infinite loop via a crafted GIF file allowing for DoS (bsc#1076391)
- CVE-2016-5773: php_zip.c in the zip extension in PHP improperly
  interacted with the unserialize implementation and garbage collection,
  which allowed remote attackers to execute arbitrary code or cause a
  denial of service (use-after-free and application crash) via crafted
  serialized data containing a ZipArchive object.  (bsc#986247)
- CVE-2016-5771: spl_array.c in the SPL extension in PHP improperly
  interacted with the unserialize implementation and garbage collection,
  which allowed remote attackers to execute arbitrary code or cause a
  denial of service (use-after-free and application crash) via crafted
  serialized data.  (bsc#986391)
- CVE-2018-7584: Fixed stack-based buffer under-read while parsing an
  HTTPresponse in the php_stream_url_wrap_http_ex.  (bsc#1083639)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-26"/>
	<updated date="2018-03-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076220">SUSE bug 1076220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080234">SUSE bug 1080234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083639">SUSE bug 1083639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986247">SUSE bug 986247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986391">SUSE bug 986391</bugzilla>
	<cve impact="critical" cvss3="9.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2016-10712/">CVE-2016-10712 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10712">CVE-2016-10712 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5771/">CVE-2016-5771 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5771">CVE-2016-5771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5773/">CVE-2016-5773 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5773">CVE-2016-5773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5711/">CVE-2018-5711 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5711">CVE-2018-5711 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5712/">CVE-2018-5712 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5712">CVE-2018-5712 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7584/">CVE-2018-7584 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7584">CVE-2018-7584 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585149" comment="apache2-mod_php53-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585150" comment="php53-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585151" comment="php53-bcmath-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585152" comment="php53-bz2-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585153" comment="php53-calendar-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585154" comment="php53-ctype-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585155" comment="php53-curl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585156" comment="php53-dba-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585157" comment="php53-dom-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585158" comment="php53-exif-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585159" comment="php53-fastcgi-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585160" comment="php53-fileinfo-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585161" comment="php53-ftp-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585162" comment="php53-gd-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585163" comment="php53-gettext-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585164" comment="php53-gmp-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585165" comment="php53-iconv-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585166" comment="php53-intl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585167" comment="php53-json-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585168" comment="php53-ldap-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585169" comment="php53-mbstring-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585170" comment="php53-mcrypt-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585171" comment="php53-mysql-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585172" comment="php53-odbc-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585173" comment="php53-openssl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585174" comment="php53-pcntl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585175" comment="php53-pdo-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585176" comment="php53-pear-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585177" comment="php53-pgsql-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585178" comment="php53-pspell-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585179" comment="php53-shmop-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585180" comment="php53-snmp-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585181" comment="php53-soap-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585182" comment="php53-suhosin-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585183" comment="php53-sysvmsg-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585184" comment="php53-sysvsem-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585185" comment="php53-sysvshm-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585186" comment="php53-tokenizer-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585187" comment="php53-wddx-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585188" comment="php53-xmlreader-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585189" comment="php53-xmlrpc-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585190" comment="php53-xmlwriter-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585191" comment="php53-xsl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585192" comment="php53-zip-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585193" comment="php53-zlib-5.3.17-112.20.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585149" comment="apache2-mod_php53-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585150" comment="php53-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585151" comment="php53-bcmath-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585152" comment="php53-bz2-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585153" comment="php53-calendar-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585154" comment="php53-ctype-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585155" comment="php53-curl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585156" comment="php53-dba-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585157" comment="php53-dom-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585158" comment="php53-exif-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585159" comment="php53-fastcgi-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585160" comment="php53-fileinfo-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585161" comment="php53-ftp-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585162" comment="php53-gd-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585163" comment="php53-gettext-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585164" comment="php53-gmp-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585165" comment="php53-iconv-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585166" comment="php53-intl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585167" comment="php53-json-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585168" comment="php53-ldap-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585169" comment="php53-mbstring-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585170" comment="php53-mcrypt-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585171" comment="php53-mysql-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585172" comment="php53-odbc-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585173" comment="php53-openssl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585174" comment="php53-pcntl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585175" comment="php53-pdo-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585176" comment="php53-pear-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585177" comment="php53-pgsql-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585178" comment="php53-pspell-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585179" comment="php53-shmop-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585180" comment="php53-snmp-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585181" comment="php53-soap-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585182" comment="php53-suhosin-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585183" comment="php53-sysvmsg-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585184" comment="php53-sysvsem-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585185" comment="php53-sysvshm-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585186" comment="php53-tokenizer-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585187" comment="php53-wddx-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585188" comment="php53-xmlreader-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585189" comment="php53-xmlrpc-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585190" comment="php53-xmlwriter-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585191" comment="php53-xsl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585192" comment="php53-zip-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585193" comment="php53-zlib-5.3.17-112.20.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220330" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1091355" ref_url="https://bugzilla.suse.com/1091355" source="BUGZILLA"/>
		<reference ref_id="1091362" ref_url="https://bugzilla.suse.com/1091362" source="BUGZILLA"/>
		<reference ref_id="1091363" ref_url="https://bugzilla.suse.com/1091363" source="BUGZILLA"/>
		<reference ref_id="1091367" ref_url="https://bugzilla.suse.com/1091367" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10545" ref_url="https://www.suse.com/security/cve/CVE-2018-10545/" source="CVE"/>
		<reference ref_id="CVE-2018-10546" ref_url="https://www.suse.com/security/cve/CVE-2018-10546/" source="CVE"/>
		<reference ref_id="CVE-2018-10547" ref_url="https://www.suse.com/security/cve/CVE-2018-10547/" source="CVE"/>
		<reference ref_id="CVE-2018-10548" ref_url="https://www.suse.com/security/cve/CVE-2018-10548/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004051.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:

- CVE-2018-10545: Fix access controls in FPM child processes (bsc#1091367).
- CVE-2018-10547: Fix Reflected XSS on the PHAR 403 and 404 error pages (bsc#1091362).
- CVE-2018-10546: Fix an infinite loop exists in ext/iconv/iconv.c (bsc#1091363).
- CVE-2018-10548: Fix remote denial of service in ext/ldap/ldap.c (bsc#1091355).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-15"/>
	<updated date="2018-05-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1091355">SUSE bug 1091355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091362">SUSE bug 1091362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091363">SUSE bug 1091363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091367">SUSE bug 1091367</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10545/">CVE-2018-10545 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10545">CVE-2018-10545 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10546/">CVE-2018-10546 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10546">CVE-2018-10546 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10547/">CVE-2018-10547 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10547">CVE-2018-10547 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10548/">CVE-2018-10548 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10548">CVE-2018-10548 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585194" comment="apache2-mod_php53-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585195" comment="php53-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585196" comment="php53-bcmath-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585197" comment="php53-bz2-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585198" comment="php53-calendar-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585199" comment="php53-ctype-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585200" comment="php53-curl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585201" comment="php53-dba-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585202" comment="php53-dom-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585203" comment="php53-exif-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585204" comment="php53-fastcgi-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585205" comment="php53-fileinfo-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585206" comment="php53-ftp-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585207" comment="php53-gd-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585208" comment="php53-gettext-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585209" comment="php53-gmp-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585210" comment="php53-iconv-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585211" comment="php53-intl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585212" comment="php53-json-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585213" comment="php53-ldap-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585214" comment="php53-mbstring-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585215" comment="php53-mcrypt-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585216" comment="php53-mysql-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585217" comment="php53-odbc-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585218" comment="php53-openssl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585219" comment="php53-pcntl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585220" comment="php53-pdo-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585221" comment="php53-pear-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585222" comment="php53-pgsql-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585223" comment="php53-pspell-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585224" comment="php53-shmop-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585225" comment="php53-snmp-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585226" comment="php53-soap-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585227" comment="php53-suhosin-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585228" comment="php53-sysvmsg-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585229" comment="php53-sysvsem-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585230" comment="php53-sysvshm-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585231" comment="php53-tokenizer-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585232" comment="php53-wddx-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585233" comment="php53-xmlreader-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585234" comment="php53-xmlrpc-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585235" comment="php53-xmlwriter-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585236" comment="php53-xsl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585237" comment="php53-zip-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585238" comment="php53-zlib-5.3.17-112.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585194" comment="apache2-mod_php53-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585195" comment="php53-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585196" comment="php53-bcmath-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585197" comment="php53-bz2-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585198" comment="php53-calendar-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585199" comment="php53-ctype-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585200" comment="php53-curl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585201" comment="php53-dba-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585202" comment="php53-dom-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585203" comment="php53-exif-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585204" comment="php53-fastcgi-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585205" comment="php53-fileinfo-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585206" comment="php53-ftp-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585207" comment="php53-gd-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585208" comment="php53-gettext-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585209" comment="php53-gmp-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585210" comment="php53-iconv-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585211" comment="php53-intl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585212" comment="php53-json-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585213" comment="php53-ldap-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585214" comment="php53-mbstring-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585215" comment="php53-mcrypt-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585216" comment="php53-mysql-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585217" comment="php53-odbc-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585218" comment="php53-openssl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585219" comment="php53-pcntl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585220" comment="php53-pdo-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585221" comment="php53-pear-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585222" comment="php53-pgsql-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585223" comment="php53-pspell-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585224" comment="php53-shmop-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585225" comment="php53-snmp-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585226" comment="php53-soap-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585227" comment="php53-suhosin-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585228" comment="php53-sysvmsg-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585229" comment="php53-sysvsem-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585230" comment="php53-sysvshm-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585231" comment="php53-tokenizer-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585232" comment="php53-wddx-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585233" comment="php53-xmlreader-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585234" comment="php53-xmlrpc-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585235" comment="php53-xmlwriter-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585236" comment="php53-xsl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585237" comment="php53-zip-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585238" comment="php53-zlib-5.3.17-112.23.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220331" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1096984" ref_url="https://bugzilla.suse.com/1096984" source="BUGZILLA"/>
		<reference ref_id="1099098" ref_url="https://bugzilla.suse.com/1099098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10360" ref_url="https://www.suse.com/security/cve/CVE-2018-10360/" source="CVE"/>
		<reference ref_id="CVE-2018-12882" ref_url="https://www.suse.com/security/cve/CVE-2018-12882/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004301.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

The following security issue was fixed:

- An out-of-bounds read in the do_core_note function in readelf.c in libmagic.a
  allowed remote attackers to cause a denial of service via a crafted ELF file
  (CVE-2018-10360, bsc#1096984)
- CVE-2018-12882: exif_read_from_impl allowed attackers to trigger a
  use-after-free (in exif_read_from_file) because it closed a stream that it is
  not responsible for closing (bsc#1099098)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-23"/>
	<updated date="2018-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1096984">SUSE bug 1096984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099098">SUSE bug 1099098</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10360/">CVE-2018-10360 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10360">CVE-2018-10360 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12882/">CVE-2018-12882 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12882">CVE-2018-12882 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585239" comment="apache2-mod_php53-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585240" comment="php53-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585241" comment="php53-bcmath-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585242" comment="php53-bz2-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585243" comment="php53-calendar-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585244" comment="php53-ctype-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585245" comment="php53-curl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585246" comment="php53-dba-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585247" comment="php53-dom-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585248" comment="php53-exif-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585249" comment="php53-fastcgi-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585250" comment="php53-fileinfo-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585251" comment="php53-ftp-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585252" comment="php53-gd-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585253" comment="php53-gettext-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585254" comment="php53-gmp-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585255" comment="php53-iconv-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585256" comment="php53-intl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585257" comment="php53-json-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585258" comment="php53-ldap-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585259" comment="php53-mbstring-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585260" comment="php53-mcrypt-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585261" comment="php53-mysql-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585262" comment="php53-odbc-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585263" comment="php53-openssl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585264" comment="php53-pcntl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585265" comment="php53-pdo-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585266" comment="php53-pear-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585267" comment="php53-pgsql-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585268" comment="php53-pspell-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585269" comment="php53-shmop-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585270" comment="php53-snmp-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585271" comment="php53-soap-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585272" comment="php53-suhosin-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585273" comment="php53-sysvmsg-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585274" comment="php53-sysvsem-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585275" comment="php53-sysvshm-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585276" comment="php53-tokenizer-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585277" comment="php53-wddx-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585278" comment="php53-xmlreader-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585279" comment="php53-xmlrpc-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585280" comment="php53-xmlwriter-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585281" comment="php53-xsl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585282" comment="php53-zip-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585283" comment="php53-zlib-5.3.17-112.28.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585239" comment="apache2-mod_php53-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585240" comment="php53-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585241" comment="php53-bcmath-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585242" comment="php53-bz2-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585243" comment="php53-calendar-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585244" comment="php53-ctype-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585245" comment="php53-curl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585246" comment="php53-dba-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585247" comment="php53-dom-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585248" comment="php53-exif-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585249" comment="php53-fastcgi-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585250" comment="php53-fileinfo-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585251" comment="php53-ftp-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585252" comment="php53-gd-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585253" comment="php53-gettext-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585254" comment="php53-gmp-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585255" comment="php53-iconv-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585256" comment="php53-intl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585257" comment="php53-json-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585258" comment="php53-ldap-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585259" comment="php53-mbstring-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585260" comment="php53-mcrypt-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585261" comment="php53-mysql-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585262" comment="php53-odbc-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585263" comment="php53-openssl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585264" comment="php53-pcntl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585265" comment="php53-pdo-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585266" comment="php53-pear-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585267" comment="php53-pgsql-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585268" comment="php53-pspell-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585269" comment="php53-shmop-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585270" comment="php53-snmp-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585271" comment="php53-soap-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585272" comment="php53-suhosin-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585273" comment="php53-sysvmsg-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585274" comment="php53-sysvsem-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585275" comment="php53-sysvshm-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585276" comment="php53-tokenizer-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585277" comment="php53-wddx-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585278" comment="php53-xmlreader-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585279" comment="php53-xmlrpc-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585280" comment="php53-xmlwriter-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585281" comment="php53-xsl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585282" comment="php53-zip-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585283" comment="php53-zlib-5.3.17-112.28.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220332" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1103659" ref_url="https://bugzilla.suse.com/1103659" source="BUGZILLA"/>
		<reference ref_id="1103836" ref_url="https://bugzilla.suse.com/1103836" source="BUGZILLA"/>
		<reference ref_id="1105466" ref_url="https://bugzilla.suse.com/1105466" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9118" ref_url="https://www.suse.com/security/cve/CVE-2017-9118/" source="CVE"/>
		<reference ref_id="CVE-2018-14851" ref_url="https://www.suse.com/security/cve/CVE-2018-14851/" source="CVE"/>
		<reference ref_id="CVE-2018-14883" ref_url="https://www.suse.com/security/cve/CVE-2018-14883/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004547.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

The following security issues were fixed:

- CVE-2018-14851: Fixed an out-of-bound read in exif_process_IFD_in_MAKERNOTE,
  which could be exploited by an attacker via crafted JPG files, and could
  result in an application crash. (bsc#1103659)
- CVE-2018-14883: Fixed an integer overflow leading to a heap based buffer
  over-read in exif_thumbnail_extract of exif.c. (bsc#1103836)
- CVE-2017-9118: Fixed an out of bounds access in php_pcre_replace_impl via a
  crafted preg_replace call (bsc#1105466)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-10"/>
	<updated date="2018-09-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103659">SUSE bug 1103659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103836">SUSE bug 1103836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105466">SUSE bug 1105466</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9118/">CVE-2017-9118 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9118">CVE-2017-9118 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14851/">CVE-2018-14851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14851">CVE-2018-14851 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14883/">CVE-2018-14883 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14883">CVE-2018-14883 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585284" comment="apache2-mod_php53-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585285" comment="php53-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585286" comment="php53-bcmath-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585287" comment="php53-bz2-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585288" comment="php53-calendar-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585289" comment="php53-ctype-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585290" comment="php53-curl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585291" comment="php53-dba-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585292" comment="php53-dom-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585293" comment="php53-exif-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585294" comment="php53-fastcgi-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585295" comment="php53-fileinfo-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585296" comment="php53-ftp-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585297" comment="php53-gd-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585298" comment="php53-gettext-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585299" comment="php53-gmp-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585300" comment="php53-iconv-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585301" comment="php53-intl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585302" comment="php53-json-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585303" comment="php53-ldap-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585304" comment="php53-mbstring-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585305" comment="php53-mcrypt-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585306" comment="php53-mysql-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585307" comment="php53-odbc-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585308" comment="php53-openssl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585309" comment="php53-pcntl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585310" comment="php53-pdo-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585311" comment="php53-pear-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585312" comment="php53-pgsql-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585313" comment="php53-pspell-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585314" comment="php53-shmop-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585315" comment="php53-snmp-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585316" comment="php53-soap-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585317" comment="php53-suhosin-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585318" comment="php53-sysvmsg-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585319" comment="php53-sysvsem-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585320" comment="php53-sysvshm-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585321" comment="php53-tokenizer-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585322" comment="php53-wddx-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585323" comment="php53-xmlreader-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585324" comment="php53-xmlrpc-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585325" comment="php53-xmlwriter-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585326" comment="php53-xsl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585327" comment="php53-zip-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585328" comment="php53-zlib-5.3.17-112.38.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585284" comment="apache2-mod_php53-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585285" comment="php53-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585286" comment="php53-bcmath-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585287" comment="php53-bz2-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585288" comment="php53-calendar-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585289" comment="php53-ctype-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585290" comment="php53-curl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585291" comment="php53-dba-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585292" comment="php53-dom-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585293" comment="php53-exif-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585294" comment="php53-fastcgi-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585295" comment="php53-fileinfo-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585296" comment="php53-ftp-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585297" comment="php53-gd-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585298" comment="php53-gettext-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585299" comment="php53-gmp-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585300" comment="php53-iconv-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585301" comment="php53-intl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585302" comment="php53-json-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585303" comment="php53-ldap-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585304" comment="php53-mbstring-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585305" comment="php53-mcrypt-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585306" comment="php53-mysql-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585307" comment="php53-odbc-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585308" comment="php53-openssl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585309" comment="php53-pcntl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585310" comment="php53-pdo-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585311" comment="php53-pear-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585312" comment="php53-pgsql-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585313" comment="php53-pspell-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585314" comment="php53-shmop-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585315" comment="php53-snmp-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585316" comment="php53-soap-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585317" comment="php53-suhosin-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585318" comment="php53-sysvmsg-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585319" comment="php53-sysvsem-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585320" comment="php53-sysvshm-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585321" comment="php53-tokenizer-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585322" comment="php53-wddx-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585323" comment="php53-xmlreader-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585324" comment="php53-xmlrpc-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585325" comment="php53-xmlwriter-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585326" comment="php53-xsl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585327" comment="php53-zip-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585328" comment="php53-zlib-5.3.17-112.38.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220333" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1108753" ref_url="https://bugzilla.suse.com/1108753" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17082" ref_url="https://www.suse.com/security/cve/CVE-2018-17082/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004644.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issue:

- CVE-2018-17082: The Apache2 component in PHP allowed XSS via the body of a
  'Transfer-Encoding: chunked' request, because the bucket brigade was mishandled
  in the php_handler function (bsc#1108753)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-05"/>
	<updated date="2018-10-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1108753">SUSE bug 1108753</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-17082/">CVE-2018-17082 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17082">CVE-2018-17082 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585329" comment="apache2-mod_php53-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585330" comment="php53-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585331" comment="php53-bcmath-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585332" comment="php53-bz2-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585333" comment="php53-calendar-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585334" comment="php53-ctype-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585335" comment="php53-curl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585336" comment="php53-dba-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585337" comment="php53-dom-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585338" comment="php53-exif-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585339" comment="php53-fastcgi-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585340" comment="php53-fileinfo-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585341" comment="php53-ftp-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585342" comment="php53-gd-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585343" comment="php53-gettext-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585344" comment="php53-gmp-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585345" comment="php53-iconv-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585346" comment="php53-intl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585347" comment="php53-json-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585348" comment="php53-ldap-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585349" comment="php53-mbstring-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585350" comment="php53-mcrypt-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585351" comment="php53-mysql-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585352" comment="php53-odbc-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585353" comment="php53-openssl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585354" comment="php53-pcntl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585355" comment="php53-pdo-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585356" comment="php53-pear-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585357" comment="php53-pgsql-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585358" comment="php53-pspell-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585359" comment="php53-shmop-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585360" comment="php53-snmp-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585361" comment="php53-soap-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585362" comment="php53-suhosin-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585363" comment="php53-sysvmsg-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585364" comment="php53-sysvsem-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585365" comment="php53-sysvshm-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585366" comment="php53-tokenizer-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585367" comment="php53-wddx-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585368" comment="php53-xmlreader-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585369" comment="php53-xmlrpc-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585370" comment="php53-xmlwriter-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585371" comment="php53-xsl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585372" comment="php53-zip-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585373" comment="php53-zlib-5.3.17-112.41.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585329" comment="apache2-mod_php53-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585330" comment="php53-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585331" comment="php53-bcmath-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585332" comment="php53-bz2-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585333" comment="php53-calendar-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585334" comment="php53-ctype-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585335" comment="php53-curl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585336" comment="php53-dba-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585337" comment="php53-dom-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585338" comment="php53-exif-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585339" comment="php53-fastcgi-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585340" comment="php53-fileinfo-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585341" comment="php53-ftp-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585342" comment="php53-gd-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585343" comment="php53-gettext-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585344" comment="php53-gmp-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585345" comment="php53-iconv-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585346" comment="php53-intl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585347" comment="php53-json-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585348" comment="php53-ldap-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585349" comment="php53-mbstring-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585350" comment="php53-mcrypt-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585351" comment="php53-mysql-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585352" comment="php53-odbc-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585353" comment="php53-openssl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585354" comment="php53-pcntl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585355" comment="php53-pdo-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585356" comment="php53-pear-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585357" comment="php53-pgsql-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585358" comment="php53-pspell-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585359" comment="php53-shmop-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585360" comment="php53-snmp-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585361" comment="php53-soap-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585362" comment="php53-suhosin-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585363" comment="php53-sysvmsg-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585364" comment="php53-sysvsem-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585365" comment="php53-sysvshm-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585366" comment="php53-tokenizer-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585367" comment="php53-wddx-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585368" comment="php53-xmlreader-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585369" comment="php53-xmlrpc-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585370" comment="php53-xmlwriter-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585371" comment="php53-xsl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585372" comment="php53-zip-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585373" comment="php53-zlib-5.3.17-112.41.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220334" version="1" class="patch">
	<metadata>
		<title>Recommended update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1117107" ref_url="https://bugzilla.suse.com/1117107" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19518" ref_url="https://www.suse.com/security/cve/CVE-2018-19518/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004920.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

Security issue fixed:
    
- CVE-2018-19518: Fixed imap_open script injection flaw (bsc#1117107).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-05"/>
	<updated date="2018-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117107">SUSE bug 1117107</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19518/">CVE-2018-19518 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19518">CVE-2018-19518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585374" comment="apache2-mod_php53-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585375" comment="php53-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585376" comment="php53-bcmath-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585377" comment="php53-bz2-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585378" comment="php53-calendar-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585379" comment="php53-ctype-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585380" comment="php53-curl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585381" comment="php53-dba-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585382" comment="php53-dom-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585383" comment="php53-exif-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585384" comment="php53-fastcgi-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585385" comment="php53-fileinfo-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585386" comment="php53-ftp-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585387" comment="php53-gd-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585388" comment="php53-gettext-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585389" comment="php53-gmp-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585390" comment="php53-iconv-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585391" comment="php53-intl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585392" comment="php53-json-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585393" comment="php53-ldap-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585394" comment="php53-mbstring-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585395" comment="php53-mcrypt-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585396" comment="php53-mysql-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585397" comment="php53-odbc-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585398" comment="php53-openssl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585399" comment="php53-pcntl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585400" comment="php53-pdo-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585401" comment="php53-pear-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585402" comment="php53-pgsql-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585403" comment="php53-pspell-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585404" comment="php53-shmop-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585405" comment="php53-snmp-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585406" comment="php53-soap-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585407" comment="php53-suhosin-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585408" comment="php53-sysvmsg-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585409" comment="php53-sysvsem-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585410" comment="php53-sysvshm-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585411" comment="php53-tokenizer-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585412" comment="php53-wddx-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585413" comment="php53-xmlreader-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585414" comment="php53-xmlrpc-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585415" comment="php53-xmlwriter-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585416" comment="php53-xsl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585417" comment="php53-zip-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585418" comment="php53-zlib-5.3.17-112.45.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585374" comment="apache2-mod_php53-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585375" comment="php53-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585376" comment="php53-bcmath-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585377" comment="php53-bz2-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585378" comment="php53-calendar-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585379" comment="php53-ctype-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585380" comment="php53-curl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585381" comment="php53-dba-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585382" comment="php53-dom-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585383" comment="php53-exif-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585384" comment="php53-fastcgi-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585385" comment="php53-fileinfo-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585386" comment="php53-ftp-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585387" comment="php53-gd-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585388" comment="php53-gettext-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585389" comment="php53-gmp-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585390" comment="php53-iconv-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585391" comment="php53-intl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585392" comment="php53-json-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585393" comment="php53-ldap-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585394" comment="php53-mbstring-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585395" comment="php53-mcrypt-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585396" comment="php53-mysql-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585397" comment="php53-odbc-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585398" comment="php53-openssl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585399" comment="php53-pcntl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585400" comment="php53-pdo-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585401" comment="php53-pear-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585402" comment="php53-pgsql-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585403" comment="php53-pspell-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585404" comment="php53-shmop-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585405" comment="php53-snmp-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585406" comment="php53-soap-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585407" comment="php53-suhosin-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585408" comment="php53-sysvmsg-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585409" comment="php53-sysvsem-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585410" comment="php53-sysvshm-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585411" comment="php53-tokenizer-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585412" comment="php53-wddx-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585413" comment="php53-xmlreader-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585414" comment="php53-xmlrpc-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585415" comment="php53-xmlwriter-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585416" comment="php53-xsl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585417" comment="php53-zip-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585418" comment="php53-zlib-5.3.17-112.45.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220335" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1123354" ref_url="https://bugzilla.suse.com/1123354" source="BUGZILLA"/>
		<reference ref_id="1123522" ref_url="https://bugzilla.suse.com/1123522" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6977" ref_url="https://www.suse.com/security/cve/CVE-2019-6977/" source="CVE"/>
		<reference ref_id="CVE-2019-6978" ref_url="https://www.suse.com/security/cve/CVE-2019-6978/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005123.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:

- CVE-2019-6977: Fixed a heap-based buffer overflow the GD Graphics Library used in the imagecolormatch function (bsc#1123354).
- CVE-2019-6978: Fixed a double free in the gdImage*Ptr() functions (bsc#1123522).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-14"/>
	<updated date="2019-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123354">SUSE bug 1123354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123522">SUSE bug 1123522</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6977/">CVE-2019-6977 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6977">CVE-2019-6977 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6978/">CVE-2019-6978 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6978">CVE-2019-6978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585419" comment="apache2-mod_php53-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585420" comment="php53-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585421" comment="php53-bcmath-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585422" comment="php53-bz2-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585423" comment="php53-calendar-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585424" comment="php53-ctype-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585425" comment="php53-curl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585426" comment="php53-dba-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585427" comment="php53-dom-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585428" comment="php53-exif-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585429" comment="php53-fastcgi-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585430" comment="php53-fileinfo-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585431" comment="php53-ftp-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585432" comment="php53-gd-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585433" comment="php53-gettext-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585434" comment="php53-gmp-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585435" comment="php53-iconv-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585436" comment="php53-intl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585437" comment="php53-json-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585438" comment="php53-ldap-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585439" comment="php53-mbstring-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585440" comment="php53-mcrypt-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585441" comment="php53-mysql-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585442" comment="php53-odbc-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585443" comment="php53-openssl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585444" comment="php53-pcntl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585445" comment="php53-pdo-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585446" comment="php53-pear-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585447" comment="php53-pgsql-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585448" comment="php53-pspell-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585449" comment="php53-shmop-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585450" comment="php53-snmp-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585451" comment="php53-soap-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585452" comment="php53-suhosin-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585453" comment="php53-sysvmsg-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585454" comment="php53-sysvsem-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585455" comment="php53-sysvshm-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585456" comment="php53-tokenizer-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585457" comment="php53-wddx-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585458" comment="php53-xmlreader-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585459" comment="php53-xmlrpc-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585460" comment="php53-xmlwriter-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585461" comment="php53-xsl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585462" comment="php53-zip-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585463" comment="php53-zlib-5.3.17-112.53.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585419" comment="apache2-mod_php53-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585420" comment="php53-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585421" comment="php53-bcmath-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585422" comment="php53-bz2-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585423" comment="php53-calendar-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585424" comment="php53-ctype-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585425" comment="php53-curl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585426" comment="php53-dba-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585427" comment="php53-dom-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585428" comment="php53-exif-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585429" comment="php53-fastcgi-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585430" comment="php53-fileinfo-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585431" comment="php53-ftp-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585432" comment="php53-gd-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585433" comment="php53-gettext-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585434" comment="php53-gmp-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585435" comment="php53-iconv-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585436" comment="php53-intl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585437" comment="php53-json-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585438" comment="php53-ldap-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585439" comment="php53-mbstring-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585440" comment="php53-mcrypt-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585441" comment="php53-mysql-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585442" comment="php53-odbc-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585443" comment="php53-openssl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585444" comment="php53-pcntl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585445" comment="php53-pdo-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585446" comment="php53-pear-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585447" comment="php53-pgsql-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585448" comment="php53-pspell-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585449" comment="php53-shmop-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585450" comment="php53-snmp-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585451" comment="php53-soap-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585452" comment="php53-suhosin-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585453" comment="php53-sysvmsg-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585454" comment="php53-sysvsem-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585455" comment="php53-sysvshm-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585456" comment="php53-tokenizer-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585457" comment="php53-wddx-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585458" comment="php53-xmlreader-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585459" comment="php53-xmlrpc-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585460" comment="php53-xmlwriter-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585461" comment="php53-xsl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585462" comment="php53-zip-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585463" comment="php53-zlib-5.3.17-112.53.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220336" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1126711" ref_url="https://bugzilla.suse.com/1126711" source="BUGZILLA"/>
		<reference ref_id="1126713" ref_url="https://bugzilla.suse.com/1126713" source="BUGZILLA"/>
		<reference ref_id="1126821" ref_url="https://bugzilla.suse.com/1126821" source="BUGZILLA"/>
		<reference ref_id="1126823" ref_url="https://bugzilla.suse.com/1126823" source="BUGZILLA"/>
		<reference ref_id="1127122" ref_url="https://bugzilla.suse.com/1127122" source="BUGZILLA"/>
		<reference ref_id="1128722" ref_url="https://bugzilla.suse.com/1128722" source="BUGZILLA"/>
		<reference ref_id="1128883" ref_url="https://bugzilla.suse.com/1128883" source="BUGZILLA"/>
		<reference ref_id="1128886" ref_url="https://bugzilla.suse.com/1128886" source="BUGZILLA"/>
		<reference ref_id="1128887" ref_url="https://bugzilla.suse.com/1128887" source="BUGZILLA"/>
		<reference ref_id="1128889" ref_url="https://bugzilla.suse.com/1128889" source="BUGZILLA"/>
		<reference ref_id="1128892" ref_url="https://bugzilla.suse.com/1128892" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20783" ref_url="https://www.suse.com/security/cve/CVE-2018-20783/" source="CVE"/>
		<reference ref_id="CVE-2019-9020" ref_url="https://www.suse.com/security/cve/CVE-2019-9020/" source="CVE"/>
		<reference ref_id="CVE-2019-9021" ref_url="https://www.suse.com/security/cve/CVE-2019-9021/" source="CVE"/>
		<reference ref_id="CVE-2019-9023" ref_url="https://www.suse.com/security/cve/CVE-2019-9023/" source="CVE"/>
		<reference ref_id="CVE-2019-9024" ref_url="https://www.suse.com/security/cve/CVE-2019-9024/" source="CVE"/>
		<reference ref_id="CVE-2019-9637" ref_url="https://www.suse.com/security/cve/CVE-2019-9637/" source="CVE"/>
		<reference ref_id="CVE-2019-9638" ref_url="https://www.suse.com/security/cve/CVE-2019-9638/" source="CVE"/>
		<reference ref_id="CVE-2019-9639" ref_url="https://www.suse.com/security/cve/CVE-2019-9639/" source="CVE"/>
		<reference ref_id="CVE-2019-9640" ref_url="https://www.suse.com/security/cve/CVE-2019-9640/" source="CVE"/>
		<reference ref_id="CVE-2019-9641" ref_url="https://www.suse.com/security/cve/CVE-2019-9641/" source="CVE"/>
		<reference ref_id="CVE-2019-9675" ref_url="https://www.suse.com/security/cve/CVE-2019-9675/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005304.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed: 	  

- CVE-2019-9637: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128892).
- CVE-2019-9675: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128886).
- CVE-2019-9638: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension ((bsc#1128889).
- CVE-2019-9639: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128887).
- CVE-2019-9640: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128883).
- CVE-2019-9024: Fixed a vulnerability in xmlrpc_decode function which could allow to a hostile XMLRPC server
  to cause memory read outside the allocated areas (bsc#1126821).
- CVE-2019-9020: Fixed a heap out of bounds in xmlrpc_decode function (bsc#1126711).
- CVE-2018-20783: Fixed a buffer over-read in PHAR reading functions which could allow an attacker to read 
  allocated and unallocated memory when parsing a phar file (bsc#1127122).
- CVE-2019-9021: Fixed a heap buffer-based buffer over-read in PHAR reading functions which could allow an 
  attacker to read allocated and unallocated memory when parsing a phar file (bsc#1126713).
- CVE-2019-9023: Fixed multiple heap-based buffer over-read instances in mbstring regular expression functions (bsc#1126823).
- CVE-2019-9641: Fixed multiple invalid memory access in EXIF extension and improved insecure implementation 
  of rename function (bsc#1128722).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-05"/>
	<updated date="2019-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1126711">SUSE bug 1126711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126713">SUSE bug 1126713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126821">SUSE bug 1126821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126823">SUSE bug 1126823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127122">SUSE bug 1127122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128722">SUSE bug 1128722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128883">SUSE bug 1128883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128886">SUSE bug 1128886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128887">SUSE bug 1128887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128889">SUSE bug 1128889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128892">SUSE bug 1128892</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20783/">CVE-2018-20783 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20783">CVE-2018-20783 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9020/">CVE-2019-9020 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9020">CVE-2019-9020 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9021/">CVE-2019-9021 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9021">CVE-2019-9021 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9023/">CVE-2019-9023 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9023">CVE-2019-9023 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9024/">CVE-2019-9024 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9024">CVE-2019-9024 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9637/">CVE-2019-9637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9637">CVE-2019-9637 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9638/">CVE-2019-9638 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9638">CVE-2019-9638 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9639/">CVE-2019-9639 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9639">CVE-2019-9639 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9640/">CVE-2019-9640 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9640">CVE-2019-9640 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9641/">CVE-2019-9641 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9641">CVE-2019-9641 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9675/">CVE-2019-9675 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9675">CVE-2019-9675 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585464" comment="apache2-mod_php53-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585465" comment="php53-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585466" comment="php53-bcmath-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585467" comment="php53-bz2-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585468" comment="php53-calendar-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585469" comment="php53-ctype-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585470" comment="php53-curl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585471" comment="php53-dba-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585472" comment="php53-dom-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585473" comment="php53-exif-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585474" comment="php53-fastcgi-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585475" comment="php53-fileinfo-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585476" comment="php53-ftp-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585477" comment="php53-gd-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585478" comment="php53-gettext-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585479" comment="php53-gmp-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585480" comment="php53-iconv-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585481" comment="php53-intl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585482" comment="php53-json-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585483" comment="php53-ldap-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585484" comment="php53-mbstring-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585485" comment="php53-mcrypt-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585486" comment="php53-mysql-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585487" comment="php53-odbc-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585488" comment="php53-openssl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585489" comment="php53-pcntl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585490" comment="php53-pdo-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585491" comment="php53-pear-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585492" comment="php53-pgsql-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585493" comment="php53-pspell-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585494" comment="php53-shmop-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585495" comment="php53-snmp-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585496" comment="php53-soap-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585497" comment="php53-suhosin-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585498" comment="php53-sysvmsg-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585499" comment="php53-sysvsem-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585500" comment="php53-sysvshm-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585501" comment="php53-tokenizer-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585502" comment="php53-wddx-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585503" comment="php53-xmlreader-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585504" comment="php53-xmlrpc-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585505" comment="php53-xmlwriter-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585506" comment="php53-xsl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585507" comment="php53-zip-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585508" comment="php53-zlib-5.3.17-112.58.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585464" comment="apache2-mod_php53-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585465" comment="php53-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585466" comment="php53-bcmath-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585467" comment="php53-bz2-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585468" comment="php53-calendar-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585469" comment="php53-ctype-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585470" comment="php53-curl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585471" comment="php53-dba-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585472" comment="php53-dom-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585473" comment="php53-exif-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585474" comment="php53-fastcgi-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585475" comment="php53-fileinfo-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585476" comment="php53-ftp-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585477" comment="php53-gd-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585478" comment="php53-gettext-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585479" comment="php53-gmp-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585480" comment="php53-iconv-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585481" comment="php53-intl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585482" comment="php53-json-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585483" comment="php53-ldap-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585484" comment="php53-mbstring-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585485" comment="php53-mcrypt-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585486" comment="php53-mysql-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585487" comment="php53-odbc-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585488" comment="php53-openssl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585489" comment="php53-pcntl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585490" comment="php53-pdo-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585491" comment="php53-pear-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585492" comment="php53-pgsql-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585493" comment="php53-pspell-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585494" comment="php53-shmop-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585495" comment="php53-snmp-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585496" comment="php53-soap-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585497" comment="php53-suhosin-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585498" comment="php53-sysvmsg-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585499" comment="php53-sysvsem-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585500" comment="php53-sysvshm-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585501" comment="php53-tokenizer-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585502" comment="php53-wddx-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585503" comment="php53-xmlreader-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585504" comment="php53-xmlrpc-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585505" comment="php53-xmlwriter-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585506" comment="php53-xsl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585507" comment="php53-zip-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585508" comment="php53-zlib-5.3.17-112.58.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220337" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1140118" ref_url="https://bugzilla.suse.com/1140118" source="BUGZILLA"/>
		<reference ref_id="1145095" ref_url="https://bugzilla.suse.com/1145095" source="BUGZILLA"/>
		<reference ref_id="1146360" ref_url="https://bugzilla.suse.com/1146360" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11038" ref_url="https://www.suse.com/security/cve/CVE-2019-11038/" source="CVE"/>
		<reference ref_id="CVE-2019-11041" ref_url="https://www.suse.com/security/cve/CVE-2019-11041/" source="CVE"/>
		<reference ref_id="CVE-2019-11042" ref_url="https://www.suse.com/security/cve/CVE-2019-11042/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005875.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:

- CVE-2019-11038: Fixed a information disclosure in gdImageCreateFromXbm() (bsc#1140118).
- CVE-2019-11041: Fixed heap buffer over-read in exif_scan_thumbnail() (bsc#1146360). 
- CVE-2019-11042: Fixed heap buffer over-read in exif_process_user_comment() (bsc#1145095).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-03"/>
	<updated date="2019-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140118">SUSE bug 1140118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145095">SUSE bug 1145095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146360">SUSE bug 1146360</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11038/">CVE-2019-11038 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11038">CVE-2019-11038 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11041/">CVE-2019-11041 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11041">CVE-2019-11041 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11042/">CVE-2019-11042 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11042">CVE-2019-11042 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585509" comment="apache2-mod_php53-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585510" comment="php53-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585511" comment="php53-bcmath-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585512" comment="php53-bz2-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585513" comment="php53-calendar-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585514" comment="php53-ctype-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585515" comment="php53-curl-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585516" comment="php53-dba-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585517" comment="php53-dom-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585518" comment="php53-exif-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585519" comment="php53-fastcgi-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585520" comment="php53-fileinfo-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585521" comment="php53-ftp-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585522" comment="php53-gd-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585523" comment="php53-gettext-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585524" comment="php53-gmp-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585525" comment="php53-iconv-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585526" comment="php53-intl-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585527" comment="php53-json-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585528" comment="php53-ldap-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585529" comment="php53-mbstring-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585530" comment="php53-mcrypt-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585531" comment="php53-mysql-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585532" comment="php53-odbc-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585533" comment="php53-openssl-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585534" comment="php53-pcntl-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585535" comment="php53-pdo-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585536" comment="php53-pear-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585537" comment="php53-pgsql-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585538" comment="php53-pspell-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585539" comment="php53-shmop-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585540" comment="php53-snmp-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585541" comment="php53-soap-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585542" comment="php53-suhosin-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585543" comment="php53-sysvmsg-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585544" comment="php53-sysvsem-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585545" comment="php53-sysvshm-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585546" comment="php53-tokenizer-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585547" comment="php53-wddx-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585548" comment="php53-xmlreader-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585549" comment="php53-xmlrpc-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585550" comment="php53-xmlwriter-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585551" comment="php53-xsl-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585552" comment="php53-zip-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585553" comment="php53-zlib-5.3.17-112.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220338" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1159922" ref_url="https://bugzilla.suse.com/1159922" source="BUGZILLA"/>
		<reference ref_id="1159923" ref_url="https://bugzilla.suse.com/1159923" source="BUGZILLA"/>
		<reference ref_id="1159924" ref_url="https://bugzilla.suse.com/1159924" source="BUGZILLA"/>
		<reference ref_id="1159927" ref_url="https://bugzilla.suse.com/1159927" source="BUGZILLA"/>
		<reference ref_id="1161982" ref_url="https://bugzilla.suse.com/1161982" source="BUGZILLA"/>
		<reference ref_id="1162629" ref_url="https://bugzilla.suse.com/1162629" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11045" ref_url="https://www.suse.com/security/cve/CVE-2019-11045/" source="CVE"/>
		<reference ref_id="CVE-2019-11046" ref_url="https://www.suse.com/security/cve/CVE-2019-11046/" source="CVE"/>
		<reference ref_id="CVE-2019-11047" ref_url="https://www.suse.com/security/cve/CVE-2019-11047/" source="CVE"/>
		<reference ref_id="CVE-2019-11050" ref_url="https://www.suse.com/security/cve/CVE-2019-11050/" source="CVE"/>
		<reference ref_id="CVE-2019-20433" ref_url="https://www.suse.com/security/cve/CVE-2019-20433/" source="CVE"/>
		<reference ref_id="CVE-2020-7059" ref_url="https://www.suse.com/security/cve/CVE-2020-7059/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006513.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:

- CVE-2020-7059: Fixed an out-of-bounds read in php_strip_tags_ex (bsc#1162629).
- CVE-2019-11045: Fixed an issue with the PHP DirectoryIterator class that accepts filenames with embedded \0 bytes (bsc#1159923).
- CVE-2019-11046: Fixed an out-of-bounds read in bc_shift_addsub (bsc#1159924).
- CVE-2019-11047: Fixed an information disclosure in exif_read_data (bsc#1159922).
- CVE-2019-11050: Fixed a buffer over-read in the EXIF extension (bsc#1159927).
- CVE-2019-20433: Fixed a buffer over-read when processing strings ending with a single '\0' byte with ucs-2 and ucs-4 encoding (bsc#1161982).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-24"/>
	<updated date="2020-02-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1159922">SUSE bug 1159922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159923">SUSE bug 1159923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159924">SUSE bug 1159924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159927">SUSE bug 1159927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161982">SUSE bug 1161982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162629">SUSE bug 1162629</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11045/">CVE-2019-11045 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11045">CVE-2019-11045 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11046/">CVE-2019-11046 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11046">CVE-2019-11046 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11047/">CVE-2019-11047 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11047">CVE-2019-11047 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11050/">CVE-2019-11050 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11050">CVE-2019-11050 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20433/">CVE-2019-20433 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20433">CVE-2019-20433 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7059/">CVE-2020-7059 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7059">CVE-2020-7059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585554" comment="apache2-mod_php53-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585555" comment="php53-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585556" comment="php53-bcmath-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585557" comment="php53-bz2-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585558" comment="php53-calendar-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585559" comment="php53-ctype-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585560" comment="php53-curl-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585561" comment="php53-dba-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585562" comment="php53-dom-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585563" comment="php53-exif-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585564" comment="php53-fastcgi-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585565" comment="php53-fileinfo-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585566" comment="php53-ftp-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585567" comment="php53-gd-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585568" comment="php53-gettext-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585569" comment="php53-gmp-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585570" comment="php53-iconv-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585571" comment="php53-intl-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585572" comment="php53-json-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585573" comment="php53-ldap-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585574" comment="php53-mbstring-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585575" comment="php53-mcrypt-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585576" comment="php53-mysql-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585577" comment="php53-odbc-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585578" comment="php53-openssl-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585579" comment="php53-pcntl-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585580" comment="php53-pdo-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585581" comment="php53-pear-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585582" comment="php53-pgsql-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585583" comment="php53-pspell-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585584" comment="php53-shmop-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585585" comment="php53-snmp-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585586" comment="php53-soap-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585587" comment="php53-suhosin-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585588" comment="php53-sysvmsg-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585589" comment="php53-sysvsem-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585590" comment="php53-sysvshm-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585591" comment="php53-tokenizer-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585592" comment="php53-wddx-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585593" comment="php53-xmlreader-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585594" comment="php53-xmlrpc-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585595" comment="php53-xmlwriter-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585596" comment="php53-xsl-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585597" comment="php53-zip-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585598" comment="php53-zlib-5.3.17-112.79.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220339" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1177352" ref_url="https://bugzilla.suse.com/1177352" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7070" ref_url="https://www.suse.com/security/cve/CVE-2020-7070/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007557.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

- CVE-2020-7070: Fixed an issue where percent-encoded cookies could have been used to overwrite existing prefixed cookie names (bsc#1177352).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-14"/>
	<updated date="2020-10-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177352">SUSE bug 1177352</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-7070/">CVE-2020-7070 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7070">CVE-2020-7070 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585599" comment="apache2-mod_php53-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585600" comment="php53-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585601" comment="php53-bcmath-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585602" comment="php53-bz2-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585603" comment="php53-calendar-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585604" comment="php53-ctype-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585605" comment="php53-curl-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585606" comment="php53-dba-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585607" comment="php53-dom-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585608" comment="php53-exif-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585609" comment="php53-fastcgi-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585610" comment="php53-fileinfo-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585611" comment="php53-ftp-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585612" comment="php53-gd-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585613" comment="php53-gettext-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585614" comment="php53-gmp-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585615" comment="php53-iconv-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585616" comment="php53-intl-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585617" comment="php53-json-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585618" comment="php53-ldap-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585619" comment="php53-mbstring-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585620" comment="php53-mcrypt-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585621" comment="php53-mysql-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585622" comment="php53-odbc-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585623" comment="php53-openssl-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585624" comment="php53-pcntl-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585625" comment="php53-pdo-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585626" comment="php53-pear-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585627" comment="php53-pgsql-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585628" comment="php53-pspell-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585629" comment="php53-shmop-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585630" comment="php53-snmp-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585631" comment="php53-soap-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585632" comment="php53-suhosin-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585633" comment="php53-sysvmsg-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585634" comment="php53-sysvsem-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585635" comment="php53-sysvshm-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585636" comment="php53-tokenizer-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585637" comment="php53-wddx-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585638" comment="php53-xmlreader-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585639" comment="php53-xmlrpc-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585640" comment="php53-xmlwriter-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585641" comment="php53-xsl-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585642" comment="php53-zip-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585643" comment="php53-zlib-5.3.17-112.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220340" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1182049" ref_url="https://bugzilla.suse.com/1182049" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21702" ref_url="https://www.suse.com/security/cve/CVE-2021-21702/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008508.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

- CVE-2021-21702 [bsc#1182049]: NULL pointer dereference in SoapClient
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182049">SUSE bug 1182049</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21702/">CVE-2021-21702 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21702">CVE-2021-21702 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585644" comment="apache2-mod_php53-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585645" comment="php53-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585646" comment="php53-bcmath-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585647" comment="php53-bz2-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585648" comment="php53-calendar-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585649" comment="php53-ctype-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585650" comment="php53-curl-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585651" comment="php53-dba-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585652" comment="php53-dom-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585653" comment="php53-exif-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585654" comment="php53-fastcgi-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585655" comment="php53-fileinfo-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585656" comment="php53-ftp-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585657" comment="php53-gd-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585658" comment="php53-gettext-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585659" comment="php53-gmp-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585660" comment="php53-iconv-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585661" comment="php53-intl-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585662" comment="php53-json-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585663" comment="php53-ldap-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585664" comment="php53-mbstring-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585665" comment="php53-mcrypt-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585666" comment="php53-mysql-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585667" comment="php53-odbc-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585668" comment="php53-openssl-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585669" comment="php53-pcntl-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585670" comment="php53-pdo-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585671" comment="php53-pear-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585672" comment="php53-pgsql-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585673" comment="php53-pspell-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585674" comment="php53-shmop-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585675" comment="php53-snmp-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585676" comment="php53-soap-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585677" comment="php53-suhosin-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585678" comment="php53-sysvmsg-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585679" comment="php53-sysvsem-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585680" comment="php53-sysvshm-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585681" comment="php53-tokenizer-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585682" comment="php53-wddx-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585683" comment="php53-xmlreader-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585684" comment="php53-xmlrpc-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585685" comment="php53-xmlwriter-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585686" comment="php53-xsl-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585687" comment="php53-zip-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585688" comment="php53-zlib-5.3.17-112.99.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220341" version="1" class="patch">
	<metadata>
		<title>Security update for policycoreutils (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1000998" ref_url="https://bugzilla.suse.com/1000998" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7545" ref_url="https://www.suse.com/security/cve/CVE-2016-7545/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002611.html" source="SUSE-SU"/>
		<description>

This update for policycoreutils fixes the following issues:

* CVE-2016-7545: nonpriv session can escape to parent [bsc#1000998]

		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-31"/>
	<updated date="2017-01-31"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1000998">SUSE bug 1000998</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7545/">CVE-2016-7545 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7545">CVE-2016-7545 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585689" comment="policycoreutils-2.0.79-4.8.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585689" comment="policycoreutils-2.0.79-4.8.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220342" version="1" class="patch">
	<metadata>
		<title>Security update for policycoreutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1083624" ref_url="https://bugzilla.suse.com/1083624" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1063" ref_url="https://www.suse.com/security/cve/CVE-2018-1063/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003888.html" source="SUSE-SU"/>
		<description>
This update for policycoreutils fixes the following issues:

- CVE-2018-1063: Prevent chcon from following symlinks in /tmp, /var/tmp,
  /var/run and /var/lib/debug (bsc#1083624).  
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-11"/>
	<updated date="2018-04-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083624">SUSE bug 1083624</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1063/">CVE-2018-1063 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1063">CVE-2018-1063 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585690" comment="policycoreutils-2.0.79-4.9.3.3 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585690" comment="policycoreutils-2.0.79-4.9.3.3 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220343" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="976844" ref_url="https://bugzilla.suse.com/976844" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8868" ref_url="https://www.suse.com/security/cve/CVE-2015-8868/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002107.html" source="SUSE-SU"/>
		<description>

This update for poppler fixes the following issues: 

Security issues fixed:
- CVE-2015-8868: Corrupted PDF file can corrupt heap, causing DoS (bsc#976844)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-10"/>
	<updated date="2016-06-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/976844">SUSE bug 976844</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8868/">CVE-2015-8868 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8868">CVE-2015-8868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585691" comment="libpoppler-glib4-0.12.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585692" comment="libpoppler-qt4-3-0.12.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585693" comment="libpoppler5-0.12.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585694" comment="poppler-tools-0.12.3-1.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585691" comment="libpoppler-glib4-0.12.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585692" comment="libpoppler-qt4-3-0.12.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585693" comment="libpoppler5-0.12.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585694" comment="poppler-tools-0.12.3-1.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220344" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1061265" ref_url="https://bugzilla.suse.com/1061265" source="BUGZILLA"/>
		<reference ref_id="1064593" ref_url="https://bugzilla.suse.com/1064593" source="BUGZILLA"/>
		<reference ref_id="1074453" ref_url="https://bugzilla.suse.com/1074453" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000456" ref_url="https://www.suse.com/security/cve/CVE-2017-1000456/" source="CVE"/>
		<reference ref_id="CVE-2017-14977" ref_url="https://www.suse.com/security/cve/CVE-2017-14977/" source="CVE"/>
		<reference ref_id="CVE-2017-15565" ref_url="https://www.suse.com/security/cve/CVE-2017-15565/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004189.html" source="SUSE-SU"/>
		<description>
This update for poppler fixes the following issues:

- CVE-2017-14977: Fixed a NULL pointer dereference vulnerability in the
  FoFiTrueType::getCFFBlock() function in FoFiTrueType.cc that occurred due to
  lack of validation of a table pointer, which allows an attacker to launch a
  denial of service attack. (bsc#1061265)
- CVE-2017-1000456: Validate boundaries in TextPool::addWord to prevent
  overflows in subsequent calculations (bsc#1074453)
- CVE-2017-15565: Prevent NULL Pointer dereference in the
  GfxImageColorMap::getGrayLine() function via a crafted PDF document
  (bsc#1064593)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-14"/>
	<updated date="2018-06-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1061265">SUSE bug 1061265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064593">SUSE bug 1064593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074453">SUSE bug 1074453</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000456/">CVE-2017-1000456 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000456">CVE-2017-1000456 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14977/">CVE-2017-14977 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14977">CVE-2017-14977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15565/">CVE-2017-15565 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15565">CVE-2017-15565 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585695" comment="libpoppler-glib4-0.12.3-1.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585696" comment="libpoppler-qt4-3-0.12.3-1.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585697" comment="libpoppler5-0.12.3-1.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585698" comment="poppler-tools-0.12.3-1.13.3.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585695" comment="libpoppler-glib4-0.12.3-1.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585696" comment="libpoppler-qt4-3-0.12.3-1.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585697" comment="libpoppler5-0.12.3-1.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585698" comment="poppler-tools-0.12.3-1.13.3.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220345" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="949669" ref_url="https://bugzilla.suse.com/949669" source="BUGZILLA"/>
		<reference ref_id="949670" ref_url="https://bugzilla.suse.com/949670" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001887.html" source="SUSE-SU"/>
		<description>

This update of postgresql94 to 9.4.5 fixes the following issues:

* CVE-2015-5289: json or jsonb input values constructed from arbitrary user input could have crashed the PostgreSQL server and caused a denial of service (bsc#949670)
* CVE-2015-5288: crypt() (pgCrypto extension) couldi potentially be exploited to read a few additional bytes of memory (bsc#949669)

Also contains all changes and bugfixes in the upstream 9.4.5 release:
  http://www.postgresql.org/docs/current/static/release-9-4-5.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5288">CVE-2015-5288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5289">CVE-2015-5289 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580941" comment="libecpg6-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580942" comment="libpq5-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580943" comment="libpq5-32bit-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580944" comment="postgresql94-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580945" comment="postgresql94-contrib-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580946" comment="postgresql94-docs-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580947" comment="postgresql94-server-9.4.5-0.8.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580941" comment="libecpg6-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580942" comment="libpq5-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580943" comment="libpq5-32bit-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580944" comment="postgresql94-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580945" comment="postgresql94-contrib-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580946" comment="postgresql94-docs-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580947" comment="postgresql94-server-9.4.5-0.8.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220346" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql-init (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1062722" ref_url="https://bugzilla.suse.com/1062722" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14798" ref_url="https://www.suse.com/security/cve/CVE-2017-14798/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003420.html" source="SUSE-SU"/>
		<description>
This update for postgresql-init fixes the following issues:

- CVE-2017-14798: A race condition in the init script could be used by attackers able to access the postgresql account to escalate their privileges to root (bsc#1062722)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-27"/>
	<updated date="2017-11-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062722">SUSE bug 1062722</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14798/">CVE-2017-14798 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14798">CVE-2017-14798 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574412" comment="postgresql-init-9.4-0.5.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574412" comment="postgresql-init-9.4-0.5.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220347" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="949669" ref_url="https://bugzilla.suse.com/949669" source="BUGZILLA"/>
		<reference ref_id="949670" ref_url="https://bugzilla.suse.com/949670" source="BUGZILLA"/>
		<reference ref_id="966435" ref_url="https://bugzilla.suse.com/966435" source="BUGZILLA"/>
		<reference ref_id="966436" ref_url="https://bugzilla.suse.com/966436" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-0766" ref_url="https://www.suse.com/security/cve/CVE-2016-0766/" source="CVE"/>
		<reference ref_id="CVE-2016-0773" ref_url="https://www.suse.com/security/cve/CVE-2016-0773/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001914.html" source="SUSE-SU"/>
		<description>

This update for postgresql94 fixes the following issues: 

- Security and bugfix release 9.4.6:
  * *** IMPORTANT ***
    Users of version 9.4 will need to reindex any jsonb_path_ops
    indexes they have created, in order to fix a persistent issue
    with missing index entries.
  * Fix infinite loops and buffer-overrun problems in regular
    expressions (CVE-2016-0773, bsc#966436).
  * Fix regular-expression compiler to handle loops of constraint
    arcs (CVE-2007-4772).
  * Prevent certain PL/Java parameters from being set by
    non-superusers (CVE-2016-0766, bsc#966435).
  * Fix many issues in pg_dump with specific object types
  * Prevent over-eager pushdown of HAVING clauses for
    GROUPING SETS
  * Fix deparsing error with ON CONFLICT ... WHERE clauses
  * Fix tableoid errors for postgres_fdw
  * Prevent floating-point exceptions in pgbench
  * Make \det search Foreign Table names consistently
  * Fix quoting of domain constraint names in pg_dump
  * Prevent putting expanded objects into Const nodes
  * Allow compile of PL/Java on Windows
  * Fix 'unresolved symbol' errors in PL/Python execution
  * Allow Python2 and Python3 to be used in the same database
  * Add support for Python 3.5 in PL/Python
  * Fix issue with subdirectory creation during initdb
  * Make pg_ctl report status correctly on Windows
  * Suppress confusing error when using pg_receivexlog with older
    servers
  * Multiple documentation corrections and additions
  * Fix erroneous hash calculations in gin_extract_jsonb_path()
- For the full release notse, see:
  http://www.postgresql.org/docs/9.4/static/release-9-4-6.html

- Security and bugfix release 9.4.5:
  * CVE-2015-5289, bsc#949670: json or jsonb input values
    constructed from arbitrary user input can crash the PostgreSQL
    server and cause a denial of service.
  * CVE-2015-5288, bsc#949669: The crypt() function included with
    the optional pgCrypto extension could be exploited to read a
    few additional bytes of memory. No working exploit for this
    issue has been developed.
- For the full release notse, see:
  http://www.postgresql.org/docs/current/static/release-9-4-5.html
- Relax dependency on libpq to major version.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-07"/>
	<updated date="2016-03-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966435">SUSE bug 966435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966436">SUSE bug 966436</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4772">CVE-2007-4772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5288">CVE-2015-5288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5289">CVE-2015-5289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0766/">CVE-2016-0766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0766">CVE-2016-0766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0773/">CVE-2016-0773 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0773">CVE-2016-0773 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585699" comment="libecpg6-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585700" comment="libpq5-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585701" comment="libpq5-32bit-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585702" comment="postgresql94-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585703" comment="postgresql94-contrib-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585704" comment="postgresql94-docs-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585705" comment="postgresql94-server-9.4.6-0.14.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585699" comment="libecpg6-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585700" comment="libpq5-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585701" comment="libpq5-32bit-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585702" comment="postgresql94-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585703" comment="postgresql94-contrib-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585704" comment="postgresql94-docs-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585705" comment="postgresql94-server-9.4.6-0.14.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220348" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="993453" ref_url="https://bugzilla.suse.com/993453" source="BUGZILLA"/>
		<reference ref_id="993454" ref_url="https://bugzilla.suse.com/993454" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5423" ref_url="https://www.suse.com/security/cve/CVE-2016-5423/" source="CVE"/>
		<reference ref_id="CVE-2016-5424" ref_url="https://www.suse.com/security/cve/CVE-2016-5424/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002302.html" source="SUSE-SU"/>
		<description>
This update for postgresql94 to version 9.4.9 fixes the several issues.

These security issues were fixed:
- CVE-2016-5423: CASE/WHEN with inlining can cause untrusted pointer dereference (bsc#993454).
- CVE-2016-5424: Fix client programs' handling of special characters in database and role names (bsc#993453).

For the non-security issues please refer to 
- http://www.postgresql.org/docs/9.4/static/release-9-4-9.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-8.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-7.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-29"/>
	<updated date="2016-09-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/993453">SUSE bug 993453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993454">SUSE bug 993454</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5423/">CVE-2016-5423 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5423">CVE-2016-5423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5424/">CVE-2016-5424 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5424">CVE-2016-5424 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585706" comment="libecpg6-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585707" comment="libpq5-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585708" comment="libpq5-32bit-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585709" comment="postgresql94-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585710" comment="postgresql94-contrib-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585711" comment="postgresql94-docs-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585712" comment="postgresql94-server-9.4.9-0.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585706" comment="libecpg6-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585707" comment="libpq5-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585708" comment="libpq5-32bit-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585709" comment="postgresql94-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585710" comment="postgresql94-contrib-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585711" comment="postgresql94-docs-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585712" comment="postgresql94-server-9.4.9-0.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220349" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1029547" ref_url="https://bugzilla.suse.com/1029547" source="BUGZILLA"/>
		<reference ref_id="1037603" ref_url="https://bugzilla.suse.com/1037603" source="BUGZILLA"/>
		<reference ref_id="1037624" ref_url="https://bugzilla.suse.com/1037624" source="BUGZILLA"/>
		<reference ref_id="1038293" ref_url="https://bugzilla.suse.com/1038293" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7484" ref_url="https://www.suse.com/security/cve/CVE-2017-7484/" source="CVE"/>
		<reference ref_id="CVE-2017-7485" ref_url="https://www.suse.com/security/cve/CVE-2017-7485/" source="CVE"/>
		<reference ref_id="CVE-2017-7486" ref_url="https://www.suse.com/security/cve/CVE-2017-7486/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003010.html" source="SUSE-SU"/>
		<description>

This update for postgresql93 fixes the following issues:

- bsc#1029547: Fix tests with timezone 2017a 
- CVE-2017-7486: Restrict visibility of
    pg_user_mappings.umoptions, to protect passwords stored as
    user mapping options. (bsc#1037624) 
- CVE-2017-7485: Recognize PGREQUIRESSL variable again. (bsc#1038293)
- CVE-2017-7484: Prevent exposure of statistical information via leaky operators. (bsc#1037603)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-05"/>
	<updated date="2017-07-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029547">SUSE bug 1029547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037603">SUSE bug 1037603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037624">SUSE bug 1037624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038293">SUSE bug 1038293</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7484/">CVE-2017-7484 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7484">CVE-2017-7484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7485/">CVE-2017-7485 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7485">CVE-2017-7485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7486/">CVE-2017-7486 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7486">CVE-2017-7486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585713" comment="libecpg6-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585714" comment="libpq5-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585715" comment="libpq5-32bit-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585716" comment="postgresql94-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585717" comment="postgresql94-contrib-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585718" comment="postgresql94-docs-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585719" comment="postgresql94-server-9.4.12-0.22.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585713" comment="libecpg6-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585714" comment="libpq5-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585715" comment="libpq5-32bit-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585716" comment="postgresql94-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585717" comment="postgresql94-contrib-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585718" comment="postgresql94-docs-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585719" comment="postgresql94-server-9.4.12-0.22.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220350" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1051684" ref_url="https://bugzilla.suse.com/1051684" source="BUGZILLA"/>
		<reference ref_id="1051685" ref_url="https://bugzilla.suse.com/1051685" source="BUGZILLA"/>
		<reference ref_id="1053259" ref_url="https://bugzilla.suse.com/1053259" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7546" ref_url="https://www.suse.com/security/cve/CVE-2017-7546/" source="CVE"/>
		<reference ref_id="CVE-2017-7547" ref_url="https://www.suse.com/security/cve/CVE-2017-7547/" source="CVE"/>
		<reference ref_id="CVE-2017-7548" ref_url="https://www.suse.com/security/cve/CVE-2017-7548/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003158.html" source="SUSE-SU"/>
		<description>
Postgresql94 was updated to 9.4.13 to fix the following issues:

* CVE-2017-7547: Further restrict visibility of pg_user_mappings.umoptions, to protect passwords stored as user mapping options. (bsc#1051685)
* CVE-2017-7546: Disallow empty passwords in all password-based authentication methods. (bsc#1051684)
* CVE-2017-7548: lo_put() function ignores ACLs. (bsc#1053259)

The changelog for this release is here:
	https://www.postgresql.org/docs/9.4/static/release-9-4-13.html

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-25"/>
	<updated date="2017-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051684">SUSE bug 1051684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051685">SUSE bug 1051685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053259">SUSE bug 1053259</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7546/">CVE-2017-7546 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7546">CVE-2017-7546 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7547/">CVE-2017-7547 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7547">CVE-2017-7547 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7548/">CVE-2017-7548 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7548">CVE-2017-7548 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585720" comment="libecpg6-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585721" comment="libpq5-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585722" comment="libpq5-32bit-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585723" comment="postgresql94-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585724" comment="postgresql94-contrib-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585725" comment="postgresql94-docs-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585726" comment="postgresql94-server-9.4.13-0.23.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585720" comment="libecpg6-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585721" comment="libpq5-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585722" comment="libpq5-32bit-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585723" comment="postgresql94-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585724" comment="postgresql94-contrib-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585725" comment="postgresql94-docs-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585726" comment="postgresql94-server-9.4.13-0.23.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220351" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1062538" ref_url="https://bugzilla.suse.com/1062538" source="BUGZILLA"/>
		<reference ref_id="1067844" ref_url="https://bugzilla.suse.com/1067844" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12172" ref_url="https://www.suse.com/security/cve/CVE-2017-12172/" source="CVE"/>
		<reference ref_id="CVE-2017-15098" ref_url="https://www.suse.com/security/cve/CVE-2017-15098/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003595.html" source="SUSE-SU"/>
		<description>
This update for postgresql94 fixes the following issues:

Security issues fixed:

- CVE-2017-15098: Fix crash due to rowtype mismatch in json{b}_populate_recordset() (bsc#1067844).
- CVE-2017-12172: Start scripts permit database administrator to modify root-owned files. This issue did not affect SUSE (bsc#1062538).

Bug fixes:

- Update to version 9.4.15
  * https://www.postgresql.org/docs/9.4/static/release-9-4-15.html
  * https://www.postgresql.org/docs/9.4/static/release-9-4-14.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062538">SUSE bug 1062538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067844">SUSE bug 1067844</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12172/">CVE-2017-12172 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12172">CVE-2017-12172 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15098/">CVE-2017-15098 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15098">CVE-2017-15098 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585727" comment="libecpg6-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585728" comment="libpq5-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585729" comment="libpq5-32bit-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585730" comment="postgresql94-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585731" comment="postgresql94-contrib-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585732" comment="postgresql94-docs-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585733" comment="postgresql94-server-9.4.15-0.23.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585727" comment="libecpg6-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585728" comment="libpq5-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585729" comment="libpq5-32bit-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585730" comment="postgresql94-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585731" comment="postgresql94-contrib-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585732" comment="postgresql94-docs-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585733" comment="postgresql94-server-9.4.15-0.23.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220352" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1077983" ref_url="https://bugzilla.suse.com/1077983" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1053" ref_url="https://www.suse.com/security/cve/CVE-2018-1053/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003745.html" source="SUSE-SU"/>
		<description>
This update for postgresql94 fixes the following issues:

PostgreSQL was updated to version 9.4.16, full release notes:

	https://www.postgresql.org/docs/9.4/static/release-9-4-16.html

Security issues fixed:

- CVE-2018-1053: Ensure that all temporary files made by pg_upgrade are non-world-readable. (bsc#1077983)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-21"/>
	<updated date="2018-02-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077983">SUSE bug 1077983</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1053/">CVE-2018-1053 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1053">CVE-2018-1053 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585734" comment="libecpg6-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585735" comment="libpq5-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585736" comment="libpq5-32bit-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585737" comment="postgresql94-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585738" comment="postgresql94-contrib-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585739" comment="postgresql94-docs-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585740" comment="postgresql94-server-9.4.16-0.23.13.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585734" comment="libecpg6-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585735" comment="libpq5-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585736" comment="libpq5-32bit-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585737" comment="postgresql94-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585738" comment="postgresql94-contrib-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585739" comment="postgresql94-docs-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585740" comment="postgresql94-server-9.4.16-0.23.13.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220353" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1081925" ref_url="https://bugzilla.suse.com/1081925" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1058" ref_url="https://www.suse.com/security/cve/CVE-2018-1058/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003828.html" source="SUSE-SU"/>
		<description>
This update for postgresql94 fixes the following issues:

Security issues fixed:

- CVE-2018-1058: Fixed uncontrolled search path element in pg_dump and other client applications (bsc#1081925).


Bug fixes:

- See release notes for details:
  * https://www.postgresql.org/docs/9.4/static/release-9-4-17.html
  * https://www.postgresql.org/docs/9.4/static/release-9-4-16.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-21"/>
	<updated date="2018-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081925">SUSE bug 1081925</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1058/">CVE-2018-1058 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1058">CVE-2018-1058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585741" comment="libecpg6-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585742" comment="libpq5-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585743" comment="libpq5-32bit-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585744" comment="postgresql94-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585745" comment="postgresql94-contrib-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585746" comment="postgresql94-docs-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585747" comment="postgresql94-server-9.4.17-0.23.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585741" comment="libecpg6-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585742" comment="libpq5-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585743" comment="libpq5-32bit-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585744" comment="postgresql94-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585745" comment="postgresql94-contrib-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585746" comment="postgresql94-docs-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585747" comment="postgresql94-server-9.4.17-0.23.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220354" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1104199" ref_url="https://bugzilla.suse.com/1104199" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10915" ref_url="https://www.suse.com/security/cve/CVE-2018-10915/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004758.html" source="SUSE-SU"/>
		<description>
This update for postgresql94 fixes the following issues:

postgresql was updated to 9.4.19:

  https://www.postgresql.org/docs/current/static/release-9-4-19.html
  * CVE-2018-10915, bsc#1104199: Fix failure to reset libpq's state
    fully between connection attempts.

postgresql was updated to 9.4.18:

- https://www.postgresql.org/about/news/1851/
- https://www.postgresql.org/docs/current/static/release-9-4-18.html
  A dump/restore is not required for those running 9.4.X.
  However, if the function marking mistakes mentioned in the first
  changelog entry below affect you, you will want to take steps to
  correct your database catalogs.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-22"/>
	<updated date="2018-10-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104199">SUSE bug 1104199</bugzilla>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10915/">CVE-2018-10915 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10915">CVE-2018-10915 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585748" comment="libecpg6-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585749" comment="libpq5-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585750" comment="libpq5-32bit-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585751" comment="postgresql94-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585752" comment="postgresql94-contrib-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585753" comment="postgresql94-docs-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585754" comment="postgresql94-server-9.4.19-0.23.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585748" comment="libecpg6-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585749" comment="libpq5-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585750" comment="libpq5-32bit-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585751" comment="postgresql94-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585752" comment="postgresql94-contrib-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585753" comment="postgresql94-docs-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585754" comment="postgresql94-server-9.4.19-0.23.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220355" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="927841" ref_url="https://bugzilla.suse.com/927841" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3310" ref_url="https://www.suse.com/security/cve/CVE-2015-3310/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002648.html" source="SUSE-SU"/>
		<description>
The ppp package was updated to fix the following security issue:

- CVE-2015-3310: Fixed a buffer overflow in radius plug-in's rc_mksid() (bsc#927841).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/927841">SUSE bug 927841</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3310/">CVE-2015-3310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3310">CVE-2015-3310 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585755" comment="ppp-2.4.5.git-2.31.7 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585755" comment="ppp-2.4.5.git-2.31.7 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220356" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1162610" ref_url="https://bugzilla.suse.com/1162610" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8597" ref_url="https://www.suse.com/security/cve/CVE-2020-8597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006528.html" source="SUSE-SU"/>
		<description>
This update for ppp fixes the following security issue:

- CVE-2020-8597: Fixed a buffer overflow in the eap_request and eap_response functions (bsc#1162610).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-25"/>
	<updated date="2020-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162610">SUSE bug 1162610</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-8597/">CVE-2020-8597 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8597">CVE-2020-8597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585756" comment="ppp-2.4.5.git-2.32.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220357" version="1" class="patch">
	<metadata>
		<title>Security update for procmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1068648" ref_url="https://bugzilla.suse.com/1068648" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16844" ref_url="https://www.suse.com/security/cve/CVE-2017-16844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003477.html" source="SUSE-SU"/>
		<description>
This update for procmail fixes the following issues:

Security issue fixed:

- CVE-2017-16844: Heap-based buffer overflow in the loadbuf function in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted e-mail message because of a hardcoded realloc size, a different vulnerability than CVE-2014-3618. (bnc#1068648)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-07"/>
	<updated date="2017-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068648">SUSE bug 1068648</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16844/">CVE-2017-16844 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16844">CVE-2017-16844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585757" comment="procmail-3.22-240.8.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585757" comment="procmail-3.22-240.8.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220358" version="1" class="patch">
	<metadata>
		<title>Security update for procps (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1092100" ref_url="https://bugzilla.suse.com/1092100" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122/" source="CVE"/>
		<reference ref_id="CVE-2018-1123" ref_url="https://www.suse.com/security/cve/CVE-2018-1123/" source="CVE"/>
		<reference ref_id="CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124/" source="CVE"/>
		<reference ref_id="CVE-2018-1125" ref_url="https://www.suse.com/security/cve/CVE-2018-1125/" source="CVE"/>
		<reference ref_id="CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004299.html" source="SUSE-SU"/>
		<description>
This update for procps fixes the following security issues:

- CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top
  with HOME unset in an attacker-controlled directory, the attacker could have
  achieved privilege escalation by exploiting one of several vulnerabilities in
  the config_file() function (bsc#1092100).
- CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow.
  Inbuilt protection in ps maped a guard page at the end of the overflowed
  buffer, ensuring that the impact of this flaw is limited to a crash (temporary
  denial of service) (bsc#1092100).
- CVE-2018-1124: Prevent multiple integer overflows leading to a heap
  corruption in file2strvec function. This allowed a privilege escalation for a
  local attacker who can create entries in procfs by starting processes, which
  could result in crashes or arbitrary code execution in proc utilities run by
  other users (bsc#1092100).
- CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was
  mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).
- CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent
  truncation/integer overflow issues (bsc#1092100).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-23"/>
	<updated date="2018-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1122">CVE-2018-1122 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1123/">CVE-2018-1123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1123">CVE-2018-1123 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1124">CVE-2018-1124 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1125/">CVE-2018-1125 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1125">CVE-2018-1125 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1126">CVE-2018-1126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585758" comment="procps-3.2.7-152.31.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585758" comment="procps-3.2.7-152.31.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220359" version="1" class="patch">
	<metadata>
		<title>Security update for puppet (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1040151" ref_url="https://bugzilla.suse.com/1040151" source="BUGZILLA"/>
		<reference ref_id="1077767" ref_url="https://bugzilla.suse.com/1077767" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2295" ref_url="https://www.suse.com/security/cve/CVE-2017-2295/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003783.html" source="SUSE-SU"/>
		<description>
This update for puppet fixes the following issues:

- CVE-2017-2295: Fixed a security vulnerability where an attacker could
  force YAML deserialization in an unsafe manner, which would lead to
  remote code execution.

In default, this update would break a backwards compatibility
with Puppet agents older than 3.2.2 as the SLE11 master doesn't
support other fact formats than pson in default anymore.
In order to allow users to continue using their SLE11 agents
a patch was added that enables sending PSON from agents.

For non-SUSE clients older that 3.2.2 a new puppet master boolean option
'dangerous_fact_formats' was added. When it's set to true it
enables using dangerous fact formats (e.g. YAML). When it's set
to false, only PSON fact format is accepted. (bsc#1040151),
(bsc#1077767)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-05"/>
	<updated date="2018-03-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040151">SUSE bug 1040151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077767">SUSE bug 1077767</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2295/">CVE-2017-2295 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2295">CVE-2017-2295 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585759" comment="puppet-2.7.26-0.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585760" comment="puppet-server-2.7.26-0.5.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585759" comment="puppet-2.7.26-0.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585760" comment="puppet-server-2.7.26-0.5.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220360" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="984751" ref_url="https://bugzilla.suse.com/984751" source="BUGZILLA"/>
		<reference ref_id="985348" ref_url="https://bugzilla.suse.com/985348" source="BUGZILLA"/>
		<reference ref_id="989523" ref_url="https://bugzilla.suse.com/989523" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002263.html" source="SUSE-SU"/>
		<description>

This update for python fixes the following issues:

- CVE-2016-0772: smtplib vulnerability opens startTLS stripping attack (bsc#984751)
- CVE-2016-5699: incorrect validation of HTTP headers allow header injection (bsc#985348)
- CVE-2016-1000110: HTTPoxy vulnerability in urllib, fixed by disregarding HTTP_PROXY
  when REQUEST_METHOD is also set (bsc#989523)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-09"/>
	<updated date="2016-09-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/984751">SUSE bug 984751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985348">SUSE bug 985348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989523">SUSE bug 989523</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0772">CVE-2016-0772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000110">CVE-2016-1000110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5699">CVE-2016-5699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585761" comment="libpython2_6-1_0-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585762" comment="libpython2_6-1_0-32bit-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585763" comment="libpython2_6-1_0-x86-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585764" comment="python-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585765" comment="python-32bit-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585766" comment="python-base-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585767" comment="python-base-32bit-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585768" comment="python-base-x86-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585769" comment="python-curses-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585770" comment="python-demo-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565248" comment="python-doc-2.6-8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565249" comment="python-doc-pdf-2.6-8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585771" comment="python-gdbm-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585772" comment="python-idle-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585773" comment="python-tk-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585774" comment="python-x86-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585775" comment="python-xml-2.6.9-39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585761" comment="libpython2_6-1_0-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585762" comment="libpython2_6-1_0-32bit-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585763" comment="libpython2_6-1_0-x86-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585764" comment="python-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585765" comment="python-32bit-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585766" comment="python-base-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585767" comment="python-base-32bit-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585768" comment="python-base-x86-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585769" comment="python-curses-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585770" comment="python-demo-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565248" comment="python-doc-2.6-8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565249" comment="python-doc-pdf-2.6-8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585771" comment="python-gdbm-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585772" comment="python-idle-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585773" comment="python-tk-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585774" comment="python-x86-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585775" comment="python-xml-2.6.9-39.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220361" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1068664" ref_url="https://bugzilla.suse.com/1068664" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0768-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180768-1.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2017-1000158: Fixed integer overflow in thePyString_DecodeEscape function (bsc#1068664).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-22"/>
	<updated date="2018-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068664">SUSE bug 1068664</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000158">CVE-2017-1000158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585776" comment="libpython2_6-1_0-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585777" comment="libpython2_6-1_0-32bit-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585778" comment="libpython2_6-1_0-x86-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585779" comment="python-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585780" comment="python-32bit-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585781" comment="python-base-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585782" comment="python-base-32bit-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585783" comment="python-base-x86-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585784" comment="python-curses-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585785" comment="python-demo-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565256" comment="python-doc-2.6-8.40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565257" comment="python-doc-pdf-2.6-8.40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585786" comment="python-gdbm-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585787" comment="python-idle-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585788" comment="python-tk-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585789" comment="python-x86-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585790" comment="python-xml-2.6.9-40.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585776" comment="libpython2_6-1_0-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585777" comment="libpython2_6-1_0-32bit-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585778" comment="libpython2_6-1_0-x86-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585779" comment="python-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585780" comment="python-32bit-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585781" comment="python-base-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585782" comment="python-base-32bit-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585783" comment="python-base-x86-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585784" comment="python-curses-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585785" comment="python-demo-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565256" comment="python-doc-2.6-8.40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565257" comment="python-doc-pdf-2.6-8.40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585786" comment="python-gdbm-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585787" comment="python-idle-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585788" comment="python-tk-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585789" comment="python-x86-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585790" comment="python-xml-2.6.9-40.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220362" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1083507" ref_url="https://bugzilla.suse.com/1083507" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004216.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

The following security vulnerabilities were addressed:

- Add a check to Lib/wave.py that verifies that at least one channel is
  provided. Prior to this, attackers could cause a denial of service via a
  crafted wav format audio file. [bsc#1083507, CVE-2017-18207]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-22"/>
	<updated date="2018-06-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083507">SUSE bug 1083507</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18207">CVE-2017-18207 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585791" comment="libpython2_6-1_0-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585792" comment="libpython2_6-1_0-32bit-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585793" comment="libpython2_6-1_0-x86-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585794" comment="python-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585795" comment="python-32bit-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585796" comment="python-base-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585797" comment="python-base-32bit-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585798" comment="python-base-x86-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585799" comment="python-curses-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585800" comment="python-demo-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565264" comment="python-doc-2.6-8.40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565265" comment="python-doc-pdf-2.6-8.40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585801" comment="python-gdbm-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585802" comment="python-idle-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585803" comment="python-tk-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585804" comment="python-x86-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585805" comment="python-xml-2.6.9-40.6.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585791" comment="libpython2_6-1_0-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585792" comment="libpython2_6-1_0-32bit-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585793" comment="libpython2_6-1_0-x86-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585794" comment="python-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585795" comment="python-32bit-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585796" comment="python-base-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585797" comment="python-base-32bit-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585798" comment="python-base-x86-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585799" comment="python-curses-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585800" comment="python-demo-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565264" comment="python-doc-2.6-8.40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565265" comment="python-doc-pdf-2.6-8.40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585801" comment="python-gdbm-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585802" comment="python-idle-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585803" comment="python-tk-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585804" comment="python-x86-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585805" comment="python-xml-2.6.9-40.6.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220363" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1086001" ref_url="https://bugzilla.suse.com/1086001" source="BUGZILLA"/>
		<reference ref_id="1088004" ref_url="https://bugzilla.suse.com/1088004" source="BUGZILLA"/>
		<reference ref_id="1088009" ref_url="https://bugzilla.suse.com/1088009" source="BUGZILLA"/>
		<reference ref_id="985177" ref_url="https://bugzilla.suse.com/985177" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060/" source="CVE"/>
		<reference ref_id="CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004463.html" source="SUSE-SU"/>
		<description>
This update for python-base fixes the following issues:

Security issues fixed:

- CVE-2018-1061: Fixed DoS via regular expression backtracking in difflib.IS_LINE_JUNK method in difflib (bsc#1088004).
- CVE-2018-1060: Fixed DoS via regular expression catastrophic backtracking in apop() method in pop3lib (bsc#1088009).
- CVE-2016-5636: Fixed heap overflow in zipimporter module (bsc#985177)

Bug fixes:

- bsc#1086001: python tarfile uses random order.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1086001">SUSE bug 1086001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985177">SUSE bug 985177</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5636">CVE-2016-5636 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1060">CVE-2018-1060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1061">CVE-2018-1061 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585806" comment="libpython2_6-1_0-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585807" comment="libpython2_6-1_0-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585808" comment="libpython2_6-1_0-x86-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585809" comment="python-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585810" comment="python-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585811" comment="python-base-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585812" comment="python-base-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585813" comment="python-base-x86-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585814" comment="python-curses-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585815" comment="python-demo-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565272" comment="python-doc-2.6-8.40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565273" comment="python-doc-pdf-2.6-8.40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585816" comment="python-gdbm-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585817" comment="python-idle-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585818" comment="python-tk-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585819" comment="python-x86-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585820" comment="python-xml-2.6.9-40.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585806" comment="libpython2_6-1_0-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585807" comment="libpython2_6-1_0-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585808" comment="libpython2_6-1_0-x86-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585809" comment="python-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585810" comment="python-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585811" comment="python-base-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585812" comment="python-base-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585813" comment="python-base-x86-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585814" comment="python-curses-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585815" comment="python-demo-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565272" comment="python-doc-2.6-8.40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565273" comment="python-doc-pdf-2.6-8.40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585816" comment="python-gdbm-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585817" comment="python-idle-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585818" comment="python-tk-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585819" comment="python-x86-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585820" comment="python-xml-2.6.9-40.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220364" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004672.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issue:

- CVE-2018-14647: Python's elementtree C accelerator failed to initialise
  Expat's hash salt during initialization. This could make it easy to conduct
  denial of service attacks against Expat by constructing an XML document that
  would cause pathological hash collisions in Expat's internal data structures,
  consuming large amounts CPU and RAM (bsc#1109847)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14647">CVE-2018-14647 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585821" comment="libpython2_6-1_0-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585822" comment="libpython2_6-1_0-32bit-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585823" comment="libpython2_6-1_0-x86-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585824" comment="python-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585825" comment="python-32bit-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585826" comment="python-base-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585827" comment="python-base-32bit-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585828" comment="python-base-x86-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585829" comment="python-curses-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585830" comment="python-demo-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565280" comment="python-doc-2.6-8.40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565281" comment="python-doc-pdf-2.6-8.40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585831" comment="python-gdbm-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585832" comment="python-idle-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585833" comment="python-tk-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585834" comment="python-x86-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585835" comment="python-xml-2.6.9-40.21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585821" comment="libpython2_6-1_0-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585822" comment="libpython2_6-1_0-32bit-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585823" comment="libpython2_6-1_0-x86-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585824" comment="python-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585825" comment="python-32bit-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585826" comment="python-base-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585827" comment="python-base-32bit-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585828" comment="python-base-x86-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585829" comment="python-curses-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585830" comment="python-demo-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565280" comment="python-doc-2.6-8.40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565281" comment="python-doc-pdf-2.6-8.40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585831" comment="python-gdbm-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585832" comment="python-idle-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585833" comment="python-tk-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585834" comment="python-x86-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585835" comment="python-xml-2.6.9-40.21.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220365" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="1130847" ref_url="https://bugzilla.suse.com/1130847" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9948" ref_url="https://www.suse.com/security/cve/CVE-2019-9948/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005340.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

Security issues fixed:

- CVE-2019-9948: Fixed a 'file:' blacklist bypass in URIs by using the 'local-file:' scheme instead (bsc#1130847).
- CVE-2019-9636: Fixed an information disclosure because of incorrect handling of Unicode encoding during NFKC normalization (bsc#1129346).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-15"/>
	<updated date="2019-04-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130847">SUSE bug 1130847</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9636">CVE-2019-9636 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9948/">CVE-2019-9948 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9948">CVE-2019-9948 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585836" comment="libpython2_6-1_0-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585837" comment="libpython2_6-1_0-32bit-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585838" comment="python-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585839" comment="python-32bit-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585840" comment="python-base-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585841" comment="python-base-32bit-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585842" comment="python-curses-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585843" comment="python-demo-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569038" comment="python-doc-2.6-8.40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569039" comment="python-doc-pdf-2.6-8.40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585844" comment="python-gdbm-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585845" comment="python-idle-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585846" comment="python-tk-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585847" comment="python-xml-2.6.9-40.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220366" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005804.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459).
- CVE-2018-20852: Fixed an information leak where cookies could be send to the wrong server because of incorrect domain validation (bsc#1141853).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-08"/>
	<updated date="2019-08-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20852">CVE-2018-20852 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10160">CVE-2019-10160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585848" comment="libpython2_6-1_0-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585849" comment="libpython2_6-1_0-32bit-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585850" comment="python-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585851" comment="python-32bit-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585852" comment="python-base-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585853" comment="python-base-32bit-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585854" comment="python-curses-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585855" comment="python-demo-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569049" comment="python-doc-2.6-8.40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569050" comment="python-doc-pdf-2.6-8.40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585856" comment="python-gdbm-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585857" comment="python-idle-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585858" comment="python-tk-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585859" comment="python-xml-2.6.9-40.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220367" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1149955" ref_url="https://bugzilla.suse.com/1149955" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008150.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

Security issue fixed:

- CVE-2019-16056: Fixed a parser issue in the email module. (bsc#1149955)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16056">CVE-2019-16056 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585860" comment="libpython2_6-1_0-2.6.9-40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585861" comment="libpython2_6-1_0-32bit-2.6.9-40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585862" comment="python-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585863" comment="python-32bit-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585864" comment="python-base-2.6.9-40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585865" comment="python-base-32bit-2.6.9-40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585866" comment="python-curses-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585867" comment="python-demo-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569060" comment="python-doc-2.6-8.40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569061" comment="python-doc-pdf-2.6-8.40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585868" comment="python-gdbm-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585869" comment="python-idle-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585870" comment="python-tk-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585871" comment="python-xml-2.6.9-40.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220368" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006570.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following security issue:

- CVE-2020-8492: Fixed a regular expression in urllib that was prone to denial of service via HTTP (bsc#1162367).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-03"/>
	<updated date="2020-03-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585872" comment="libpython2_6-1_0-2.6.9-40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585873" comment="libpython2_6-1_0-32bit-2.6.9-40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585874" comment="python-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585875" comment="python-32bit-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585876" comment="python-base-2.6.9-40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585877" comment="python-base-32bit-2.6.9-40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585878" comment="python-curses-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585879" comment="python-demo-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569071" comment="python-doc-2.6-8.40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569072" comment="python-doc-pdf-2.6-8.40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585880" comment="python-gdbm-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585881" comment="python-idle-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585882" comment="python-tk-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585883" comment="python-xml-2.6.9-40.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220369" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1177211" ref_url="https://bugzilla.suse.com/1177211" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007872.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- bsc#1177211 (CVE-2020-26116) no longer allowing special characters in the method parameter 
  of HTTPConnection.putrequest in httplib, stopping injection of headers.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-26"/>
	<updated date="2020-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26116">CVE-2020-26116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585884" comment="libpython2_6-1_0-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585885" comment="libpython2_6-1_0-32bit-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585886" comment="python-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585887" comment="python-32bit-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585888" comment="python-base-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585889" comment="python-base-32bit-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585890" comment="python-curses-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585891" comment="python-demo-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569082" comment="python-doc-2.6-8.40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569083" comment="python-doc-pdf-2.6-8.40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585892" comment="python-gdbm-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585893" comment="python-idle-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585894" comment="python-tk-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585895" comment="python-xml-2.6.9-40.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220370" version="1" class="patch">
	<metadata>
		<title>Security update for python-numpy (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1122208" ref_url="https://bugzilla.suse.com/1122208" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6446" ref_url="https://www.suse.com/security/cve/CVE-2019-6446/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005104.html" source="SUSE-SU"/>
		<description>
This update for python-numpy fixes the following issues:

Security issue fixed:

- CVE-2019-6446: Set allow_pickle to false by default to restrict loading untrusted content (bsc#1122208).
  With this update we decrease the possibility of allowing remote attackers to execute arbitrary code by
  misusing numpy.load(). A warning during runtime will show-up when the allow_pickle is not explicitly set.
  
NOTE: By applying this update the behavior of python-numpy changes, which might break your application.
In order to get the old behaviour back, you have to explicitly set `allow_pickle` to True. Be aware
that this should only be done for trusted input, as loading untrusted input might lead to arbitrary code
execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-12"/>
	<updated date="2019-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122208">SUSE bug 1122208</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6446/">CVE-2019-6446 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6446">CVE-2019-6446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585896" comment="python-numpy-1.8.0-6.4.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585896" comment="python-numpy-1.8.0-6.4.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220371" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="970952" ref_url="https://bugzilla.suse.com/970952" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2342" ref_url="https://www.suse.com/security/cve/CVE-2016-2342/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001980.html" source="SUSE-SU"/>
		<description>

This update for quagga fixes the following security issue:

- CVE-2016-2342: Quagga was extended the prefixlen check to ensure it is
  within the bound of the NLRI packet data and the on-stack prefix structure
  and the maximum size for the address family (bsc#970952).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-04"/>
	<updated date="2016-04-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/970952">SUSE bug 970952</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2342/">CVE-2016-2342 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2342">CVE-2016-2342 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585897" comment="quagga-0.99.15-0.16.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585897" comment="quagga-0.99.15-0.16.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220372" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="770619" ref_url="https://bugzilla.suse.com/770619" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2016:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001982.html" source="SUSE-SU"/>
		<description>
This update for quagga fixes one security issue:

- bsc#770619: Disallow unprivileged users to enter config directory /etc/quagga
  (group: quagga, mode: 750) and read configuration files installed
  there (group: quagga, mode: 640).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-05"/>
	<updated date="2016-04-05"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/770619">SUSE bug 770619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585898" comment="quagga-0.99.15-0.21.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585898" comment="quagga-0.99.15-0.21.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220373" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="977012" ref_url="https://bugzilla.suse.com/977012" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4049" ref_url="https://www.suse.com/security/cve/CVE-2016-4049/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002093.html" source="SUSE-SU"/>
		<description>

This update for quagga fixes the following issue:

Security issue fixed:
- CVE-2016-4049: Fix for a buffer overflow error in bgp_dump_routes_func. (bsc#977012)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-03"/>
	<updated date="2016-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/977012">SUSE bug 977012</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4049/">CVE-2016-4049 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4049">CVE-2016-4049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585899" comment="quagga-0.99.15-0.24.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585899" comment="quagga-0.99.15-0.24.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220374" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1005258" ref_url="https://bugzilla.suse.com/1005258" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1245" ref_url="https://www.suse.com/security/cve/CVE-2016-1245/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002340.html" source="SUSE-SU"/>
		<description>

This update for quagga fixes the following issues:

- CVE-2016-1245: Fix for a zebra stack overrun in IPv6 RA receive code (bsc#1005258).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-19"/>
	<updated date="2016-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005258">SUSE bug 1005258</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1245/">CVE-2016-1245 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1245">CVE-2016-1245 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585900" comment="quagga-0.99.15-0.29.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585900" comment="quagga-0.99.15-0.29.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220375" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1021669" ref_url="https://bugzilla.suse.com/1021669" source="BUGZILLA"/>
		<reference ref_id="1065641" ref_url="https://bugzilla.suse.com/1065641" source="BUGZILLA"/>
		<reference ref_id="1079798" ref_url="https://bugzilla.suse.com/1079798" source="BUGZILLA"/>
		<reference ref_id="1079799" ref_url="https://bugzilla.suse.com/1079799" source="BUGZILLA"/>
		<reference ref_id="1079800" ref_url="https://bugzilla.suse.com/1079800" source="BUGZILLA"/>
		<reference ref_id="1079801" ref_url="https://bugzilla.suse.com/1079801" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16227" ref_url="https://www.suse.com/security/cve/CVE-2017-16227/" source="CVE"/>
		<reference ref_id="CVE-2017-5495" ref_url="https://www.suse.com/security/cve/CVE-2017-5495/" source="CVE"/>
		<reference ref_id="CVE-2018-5378" ref_url="https://www.suse.com/security/cve/CVE-2018-5378/" source="CVE"/>
		<reference ref_id="CVE-2018-5379" ref_url="https://www.suse.com/security/cve/CVE-2018-5379/" source="CVE"/>
		<reference ref_id="CVE-2018-5380" ref_url="https://www.suse.com/security/cve/CVE-2018-5380/" source="CVE"/>
		<reference ref_id="CVE-2018-5381" ref_url="https://www.suse.com/security/cve/CVE-2018-5381/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003735.html" source="SUSE-SU"/>
		<description>
This update for quagga fixes the following issues:

- The Quagga BGP daemon contained a bug in the AS_PATH size calculation that
  could have been exploited to facilitate a remote denial-of-service attack via
  specially crafted BGP UPDATE messages. [CVE-2017-16227, bsc#1065641]

- The Quagga BGP daemon did not check whether data sent to peers via NOTIFY had
  an invalid attribute length. It was possible to exploit this issue and cause
  the bgpd process to leak sensitive information over the network to a
  configured peer. [CVE-2018-5378, bsc#1079798]

- The Quagga BGP daemon used to double-free memory when processing certain
  forms of UPDATE messages. This issue could be exploited by sending an
  optional/transitive UPDATE attribute that all conforming eBGP speakers should
  pass along. Consequently, a single UPDATE message could have affected many
  bgpd processes across a wide area of a network. Through this vulnerability,
  attackers could potentially have taken over control of affected bgpd
  processes remotely. [CVE-2018-5379, bsc#1079799]

- It was possible to overrun internal BGP code-to-string conversion tables in
  the Quagga BGP daemon. Configured peers could have exploited this issue and
  cause bgpd to emit debug and warning messages into the logs that would
  contained arbitrary bytes. [CVE-2018-5380, bsc#1079800]

- The Quagga BGP daemon could have entered an infinite loop if sent an invalid
  OPEN message by a configured peer. If this issue was exploited, then bgpd
  would cease to respond to any other events. BGP sessions would have been
  dropped and not be reestablished. The CLI interface would have been
  unresponsive. The bgpd daemon would have stayed in this state until
  restarted. [CVE-2018-5381, bsc#1079801]

- The Quagga daemon's telnet 'vty' CLI contains an unbounded memory allocation
  bug that could be exploited for a denial-of-service attack on the daemon.
  This issue has been fixed. [CVE-2017-5495, bsc#1021669]

- The telnet 'vty' CLI of the Quagga daemon is no longer enabled by default,
  because the passwords in the default 'zebra.conf' config file are now
  disabled. The vty interface is available via 'vtysh' utility using pam
  authentication to permit management access for root without password.
  [bsc#1021669]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021669">SUSE bug 1021669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065641">SUSE bug 1065641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079798">SUSE bug 1079798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079799">SUSE bug 1079799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079800">SUSE bug 1079800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079801">SUSE bug 1079801</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16227/">CVE-2017-16227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16227">CVE-2017-16227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5495/">CVE-2017-5495 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5495">CVE-2017-5495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5378/">CVE-2018-5378 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5378">CVE-2018-5378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5379/">CVE-2018-5379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5379">CVE-2018-5379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5380/">CVE-2018-5380 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5380">CVE-2018-5380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5381/">CVE-2018-5381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5381">CVE-2018-5381 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585901" comment="quagga-0.99.15-0.30.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585901" comment="quagga-0.99.15-0.30.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220376" version="1" class="patch">
	<metadata>
		<title>Security update for rpcbind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="940191" ref_url="https://bugzilla.suse.com/940191" source="BUGZILLA"/>
		<reference ref_id="946204" ref_url="https://bugzilla.suse.com/946204" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7236" ref_url="https://www.suse.com/security/cve/CVE-2015-7236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1706-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001623.html" source="SUSE-SU"/>
		<description>

A use-after-free security bug in rpcbind was fixed which could lead to a remote denial of service.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-18"/>
	<updated date="2015-09-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/940191">SUSE bug 940191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946204">SUSE bug 946204</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7236/">CVE-2015-7236 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7236">CVE-2015-7236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581108" comment="rpcbind-0.1.6+git20080930-6.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581108" comment="rpcbind-0.1.6+git20080930-6.24.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220377" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="900914" ref_url="https://bugzilla.suse.com/900914" source="BUGZILLA"/>
		<reference ref_id="915410" ref_url="https://bugzilla.suse.com/915410" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8242" ref_url="https://www.suse.com/security/cve/CVE-2014-8242/" source="CVE"/>
		<reference ref_id="CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001813.html" source="SUSE-SU"/>
		<description>

This update for rsync fixes two security issues:

- CVE-2014-8242: Checksum collisions leading to a denial of service (bsc#900914)
- CVE-2014-9512: Malicious servers could send files outside of the transferred directory (bsc#915410)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-20"/>
	<updated date="2016-01-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/900914">SUSE bug 900914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915410">SUSE bug 915410</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8242/">CVE-2014-8242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8242">CVE-2014-8242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9512">CVE-2014-9512 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581109" comment="rsync-3.0.4-2.49.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581109" comment="rsync-3.0.4-2.49.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220378" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="915410" ref_url="https://bugzilla.suse.com/915410" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002164.html" source="SUSE-SU"/>
		<description>
rsync was updated to fix one security issue.

- CVE-2014-9512: rsync allowed remote attackers to write to arbitrary files via a symlink attack on a file in the synchronization path (bsc#915410).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-25"/>
	<updated date="2016-07-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/915410">SUSE bug 915410</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9512">CVE-2014-9512 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585902" comment="rsync-3.0.4-2.52.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585902" comment="rsync-3.0.4-2.52.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220379" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1066644" ref_url="https://bugzilla.suse.com/1066644" source="BUGZILLA"/>
		<reference ref_id="1071459" ref_url="https://bugzilla.suse.com/1071459" source="BUGZILLA"/>
		<reference ref_id="1071460" ref_url="https://bugzilla.suse.com/1071460" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16548" ref_url="https://www.suse.com/security/cve/CVE-2017-16548/" source="CVE"/>
		<reference ref_id="CVE-2017-17433" ref_url="https://www.suse.com/security/cve/CVE-2017-17433/" source="CVE"/>
		<reference ref_id="CVE-2017-17434" ref_url="https://www.suse.com/security/cve/CVE-2017-17434/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003603.html" source="SUSE-SU"/>
		<description>
This update for rsync fixes the following issues:

Security issues fixed:

- CVE-2017-17434: The daemon in rsync did not check for fnamecmp filenames in
  the daemon_filter_list data structure (in the recv_files function in
  receiver.c) and also did not apply the sanitize_paths protection mechanism to
  pathnames found in 'xname follows' strings (in the read_ndx_and_attrs function
  in rsync.c), which allowed remote attackers to bypass intended access
  restrictions' (bsc#1071460).
- CVE-2017-17433: The recv_files function in receiver.c in the daemon in rsync,
  proceeded with certain file metadata updates before checking for a filename in
  the daemon_filter_list data structure, which allowed remote attackers to bypass
  intended access restrictions (bsc#1071459).
- CVE-2017-16548: The receive_xattr function in xattrs.c in rsync did not check
  for a trailing '\\0' character in an xattr name, which allowed remote attackers
  to cause a denial of service (heap-based buffer over-read and application
  crash) or possibly have unspecified other impact by sending crafted data to the
  daemon (bsc#1066644).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-17"/>
	<updated date="2018-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1066644">SUSE bug 1066644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071459">SUSE bug 1071459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071460">SUSE bug 1071460</bugzilla>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16548/">CVE-2017-16548 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16548">CVE-2017-16548 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17433/">CVE-2017-17433 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17433">CVE-2017-17433 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17434/">CVE-2017-17434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17434">CVE-2017-17434 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585903" comment="rsync-3.0.4-2.53.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585903" comment="rsync-3.0.4-2.53.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220380" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1076503" ref_url="https://bugzilla.suse.com/1076503" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5764" ref_url="https://www.suse.com/security/cve/CVE-2018-5764/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003617.html" source="SUSE-SU"/>
		<description>
This update for rsync fixes one issues.

This security issue was fixed:

- CVE-2018-5764: The parse_arguments function in options.c did not prevent
  multiple --protect-args uses, which allowed remote attackers to bypass an
  argument-sanitization protection mechanism (bsc#1076503)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-22"/>
	<updated date="2018-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076503">SUSE bug 1076503</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5764/">CVE-2018-5764 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5764">CVE-2018-5764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585904" comment="rsync-3.0.4-2.53.6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585904" comment="rsync-3.0.4-2.53.6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220381" version="1" class="patch">
	<metadata>
		<title>Security update for ruby (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="926974" ref_url="https://bugzilla.suse.com/926974" source="BUGZILLA"/>
		<reference ref_id="959495" ref_url="https://bugzilla.suse.com/959495" source="BUGZILLA"/>
		<reference ref_id="986630" ref_url="https://bugzilla.suse.com/986630" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1855" ref_url="https://www.suse.com/security/cve/CVE-2015-1855/" source="CVE"/>
		<reference ref_id="CVE-2015-7551" ref_url="https://www.suse.com/security/cve/CVE-2015-7551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002786.html" source="SUSE-SU"/>
		<description>

This update for ruby fixes the following issues:

Secuirty issues fixed:
- CVE-2015-1855: Ruby OpenSSL Hostname Verification (bsc#926974)
- CVE-2015-7551: Unsafe tainted string usage in Fiddle and DL (bsc#959495)

Bugfixes:
- fix small mistake in the backport for (bsc#986630)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-06"/>
	<updated date="2017-04-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926974">SUSE bug 926974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959495">SUSE bug 959495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986630">SUSE bug 986630</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1855/">CVE-2015-1855 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1855">CVE-2015-1855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7551/">CVE-2015-7551 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7551">CVE-2015-7551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585905" comment="ruby-1.8.7.p357-0.9.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565297" comment="ruby-doc-html-1.8.7.p357-0.9.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565301" comment="ruby-tk-1.8.7.p357-0.9.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585905" comment="ruby-1.8.7.p357-0.9.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565297" comment="ruby-doc-html-1.8.7.p357-0.9.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565301" comment="ruby-tk-1.8.7.p357-0.9.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220382" version="1" class="patch">
	<metadata>
		<title>Security update for rzsz (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1076576" ref_url="https://bugzilla.suse.com/1076576" source="BUGZILLA"/>
		<reference ref_id="1086416" ref_url="https://bugzilla.suse.com/1086416" source="BUGZILLA"/>
		<reference ref_id="1090051" ref_url="https://bugzilla.suse.com/1090051" source="BUGZILLA"/>
		<reference ref_id="529899" ref_url="https://bugzilla.suse.com/529899" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10195" ref_url="https://www.suse.com/security/cve/CVE-2018-10195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003956.html" source="SUSE-SU"/>
		<description>
This update for rzsz fixes the following issues:

- L3: sz of rzsz segfaults in zsdata() (bsc#1086416)
- VUL-0: CVE-2018-10195: rzsz: sz can leak data to receiving side (bsc#1090051)
- rzsz-0.12.20-976.7: illegal use of freed variable (bsc#529899)
- /usr/bin/lsb segfaults [rzsz] (bsc#1076576)


		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-24"/>
	<updated date="2018-04-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076576">SUSE bug 1076576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086416">SUSE bug 1086416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090051">SUSE bug 1090051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/529899">SUSE bug 529899</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10195/">CVE-2018-10195 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10195">CVE-2018-10195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585906" comment="rzsz-0.12.21~rc-936.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585906" comment="rzsz-0.12.21~rc-936.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220383" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="967017" ref_url="https://bugzilla.suse.com/967017" source="BUGZILLA"/>
		<reference ref_id="968222" ref_url="https://bugzilla.suse.com/968222" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001959.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issues:

Security issue fixed:
- CVE-2015-7560: Getting and setting Windows ACLs on symlinks can change permissions on link 
  target; (bso#11648); (bsc#968222).

Bug fixed:
- Fix leaking memory in libsmbclient: Add missing talloc
  stackframe; (bso#11177); (bsc#967017).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-21"/>
	<updated date="2016-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/967017">SUSE bug 967017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968222">SUSE bug 968222</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7560">CVE-2015-7560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585907" comment="ldapsmb-1.34b-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585908" comment="libldb1-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585909" comment="libsmbclient0-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585910" comment="libsmbclient0-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585911" comment="libsmbclient0-x86-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585912" comment="libtalloc2-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585913" comment="libtalloc2-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585914" comment="libtalloc2-x86-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585915" comment="libtdb1-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585916" comment="libtdb1-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585917" comment="libtdb1-x86-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585918" comment="libtevent0-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585919" comment="libtevent0-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585920" comment="libtevent0-x86-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585921" comment="libwbclient0-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585922" comment="libwbclient0-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585923" comment="libwbclient0-x86-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585924" comment="samba-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585925" comment="samba-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585926" comment="samba-client-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585927" comment="samba-client-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585928" comment="samba-client-x86-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567444" comment="samba-doc-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585929" comment="samba-krb-printing-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585930" comment="samba-winbind-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585931" comment="samba-winbind-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585932" comment="samba-winbind-x86-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585933" comment="samba-x86-3.6.3-67.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585907" comment="ldapsmb-1.34b-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585908" comment="libldb1-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585909" comment="libsmbclient0-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585910" comment="libsmbclient0-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585911" comment="libsmbclient0-x86-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585912" comment="libtalloc2-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585913" comment="libtalloc2-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585914" comment="libtalloc2-x86-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585915" comment="libtdb1-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585916" comment="libtdb1-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585917" comment="libtdb1-x86-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585918" comment="libtevent0-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585919" comment="libtevent0-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585920" comment="libtevent0-x86-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585921" comment="libwbclient0-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585922" comment="libwbclient0-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585923" comment="libwbclient0-x86-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585924" comment="samba-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585925" comment="samba-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585926" comment="samba-client-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585927" comment="samba-client-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585928" comment="samba-client-x86-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567444" comment="samba-doc-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585929" comment="samba-krb-printing-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585930" comment="samba-winbind-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585931" comment="samba-winbind-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585932" comment="samba-winbind-x86-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585933" comment="samba-x86-3.6.3-67.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220384" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="936862" ref_url="https://bugzilla.suse.com/936862" source="BUGZILLA"/>
		<reference ref_id="967017" ref_url="https://bugzilla.suse.com/967017" source="BUGZILLA"/>
		<reference ref_id="971965" ref_url="https://bugzilla.suse.com/971965" source="BUGZILLA"/>
		<reference ref_id="973031" ref_url="https://bugzilla.suse.com/973031" source="BUGZILLA"/>
		<reference ref_id="973032" ref_url="https://bugzilla.suse.com/973032" source="BUGZILLA"/>
		<reference ref_id="973033" ref_url="https://bugzilla.suse.com/973033" source="BUGZILLA"/>
		<reference ref_id="973034" ref_url="https://bugzilla.suse.com/973034" source="BUGZILLA"/>
		<reference ref_id="973036" ref_url="https://bugzilla.suse.com/973036" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5370" ref_url="https://www.suse.com/security/cve/CVE-2015-5370/" source="CVE"/>
		<reference ref_id="CVE-2016-2110" ref_url="https://www.suse.com/security/cve/CVE-2016-2110/" source="CVE"/>
		<reference ref_id="CVE-2016-2111" ref_url="https://www.suse.com/security/cve/CVE-2016-2111/" source="CVE"/>
		<reference ref_id="CVE-2016-2112" ref_url="https://www.suse.com/security/cve/CVE-2016-2112/" source="CVE"/>
		<reference ref_id="CVE-2016-2113" ref_url="https://www.suse.com/security/cve/CVE-2016-2113/" source="CVE"/>
		<reference ref_id="CVE-2016-2115" ref_url="https://www.suse.com/security/cve/CVE-2016-2115/" source="CVE"/>
		<reference ref_id="CVE-2016-2118" ref_url="https://www.suse.com/security/cve/CVE-2016-2118/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001998.html" source="SUSE-SU"/>
		<description>
samba was updated to fix seven security issues.

These security issues were fixed:
- CVE-2015-5370: DCERPC server and client were vulnerable to DOS and MITM attacks (bsc#936862).
- CVE-2016-2110: A man-in-the-middle could have downgraded NTLMSSP authentication (bsc#973031).
- CVE-2016-2111: Domain controller netlogon member computer could have been spoofed (bsc#973032).
- CVE-2016-2112: LDAP conenctions were vulnerable to downgrade and MITM attack (bsc#973033).
- CVE-2016-2113: TLS certificate validation were missing (bsc#973034).
- CVE-2016-2115: Named pipe IPC were vulnerable to MITM attacks (bsc#973036).
- CVE-2016-2118: 'Badlock' DCERPC impersonation of authenticated account were possible (bsc#971965).

These non-security issues were fixed:
- bsc#967017: Fix leaking memory in libsmbclient in cli_set_mntpoint function
- Getting and setting Windows ACLs on symlinks can change permissions on link
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-12"/>
	<updated date="2016-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/936862">SUSE bug 936862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967017">SUSE bug 967017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971965">SUSE bug 971965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973031">SUSE bug 973031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973032">SUSE bug 973032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973033">SUSE bug 973033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973034">SUSE bug 973034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973036">SUSE bug 973036</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5370/">CVE-2015-5370 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5370">CVE-2015-5370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2110/">CVE-2016-2110 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2110">CVE-2016-2110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2111/">CVE-2016-2111 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2111">CVE-2016-2111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2112/">CVE-2016-2112 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2112">CVE-2016-2112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2113/">CVE-2016-2113 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2113">CVE-2016-2113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2115/">CVE-2016-2115 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2115">CVE-2016-2115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2118/">CVE-2016-2118 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2118">CVE-2016-2118 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585934" comment="ldapsmb-1.34b-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585935" comment="libldb1-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585936" comment="libsmbclient0-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585937" comment="libsmbclient0-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585938" comment="libsmbclient0-x86-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585939" comment="libtalloc2-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585940" comment="libtalloc2-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585941" comment="libtalloc2-x86-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585942" comment="libtdb1-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585943" comment="libtdb1-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585944" comment="libtdb1-x86-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585945" comment="libtevent0-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585946" comment="libtevent0-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585947" comment="libtevent0-x86-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585948" comment="libwbclient0-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585949" comment="libwbclient0-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585950" comment="libwbclient0-x86-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585951" comment="samba-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585952" comment="samba-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585953" comment="samba-client-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585954" comment="samba-client-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585955" comment="samba-client-x86-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581161" comment="samba-doc-3.6.3-76.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585956" comment="samba-krb-printing-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585957" comment="samba-winbind-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585958" comment="samba-winbind-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585959" comment="samba-winbind-x86-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585960" comment="samba-x86-3.6.3-76.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585934" comment="ldapsmb-1.34b-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585935" comment="libldb1-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585936" comment="libsmbclient0-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585937" comment="libsmbclient0-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585938" comment="libsmbclient0-x86-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585939" comment="libtalloc2-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585940" comment="libtalloc2-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585941" comment="libtalloc2-x86-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585942" comment="libtdb1-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585943" comment="libtdb1-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585944" comment="libtdb1-x86-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585945" comment="libtevent0-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585946" comment="libtevent0-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585947" comment="libtevent0-x86-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585948" comment="libwbclient0-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585949" comment="libwbclient0-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585950" comment="libwbclient0-x86-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585951" comment="samba-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585952" comment="samba-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585953" comment="samba-client-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585954" comment="samba-client-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585955" comment="samba-client-x86-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581161" comment="samba-doc-3.6.3-76.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585956" comment="samba-krb-printing-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585957" comment="samba-winbind-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585958" comment="samba-winbind-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585959" comment="samba-winbind-x86-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585960" comment="samba-x86-3.6.3-76.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220385" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1003731" ref_url="https://bugzilla.suse.com/1003731" source="BUGZILLA"/>
		<reference ref_id="1009711" ref_url="https://bugzilla.suse.com/1009711" source="BUGZILLA"/>
		<reference ref_id="1014441" ref_url="https://bugzilla.suse.com/1014441" source="BUGZILLA"/>
		<reference ref_id="1014442" ref_url="https://bugzilla.suse.com/1014442" source="BUGZILLA"/>
		<reference ref_id="993692" ref_url="https://bugzilla.suse.com/993692" source="BUGZILLA"/>
		<reference ref_id="997833" ref_url="https://bugzilla.suse.com/997833" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2125" ref_url="https://www.suse.com/security/cve/CVE-2016-2125/" source="CVE"/>
		<reference ref_id="CVE-2016-2126" ref_url="https://www.suse.com/security/cve/CVE-2016-2126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002534.html" source="SUSE-SU"/>
		<description>

This update for samba provides the following fixes:

Security issues fixed:

- CVE-2016-2125: Don't send delegated credentials to all servers. (bsc#1014441)
- CVE-2016-2126: Prevent denial of service due to a client triggered crash in the winbindd
  parent process. (bsc#1014442)

Non security issues fixed:

- Allow SESSION KEY setup without signing. (bsc#1009711)
- Fix crash bug in tevent_queue_immediate_trigger(). (bsc#1003731)
- Don't fail when using default domain with user@domain.com format. (bsc#997833)
- Prevent core, make sure response-&gt;extra_data.data is always cleared out. (bsc#993692)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-29"/>
	<updated date="2016-12-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003731">SUSE bug 1003731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009711">SUSE bug 1009711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014441">SUSE bug 1014441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014442">SUSE bug 1014442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993692">SUSE bug 993692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997833">SUSE bug 997833</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2125/">CVE-2016-2125 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2125">CVE-2016-2125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2126/">CVE-2016-2126 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2126">CVE-2016-2126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585961" comment="ldapsmb-1.34b-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585962" comment="libldb1-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585963" comment="libsmbclient0-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585964" comment="libsmbclient0-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585965" comment="libsmbclient0-x86-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585966" comment="libtalloc2-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585967" comment="libtalloc2-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585968" comment="libtalloc2-x86-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585969" comment="libtdb1-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585970" comment="libtdb1-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585971" comment="libtdb1-x86-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585972" comment="libtevent0-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585973" comment="libtevent0-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585974" comment="libtevent0-x86-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585975" comment="libwbclient0-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585976" comment="libwbclient0-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585977" comment="libwbclient0-x86-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585978" comment="samba-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585979" comment="samba-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585980" comment="samba-client-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585981" comment="samba-client-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585982" comment="samba-client-x86-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569099" comment="samba-doc-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585983" comment="samba-krb-printing-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585984" comment="samba-winbind-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585985" comment="samba-winbind-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585986" comment="samba-winbind-x86-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585987" comment="samba-x86-3.6.3-84.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585961" comment="ldapsmb-1.34b-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585962" comment="libldb1-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585963" comment="libsmbclient0-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585964" comment="libsmbclient0-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585965" comment="libsmbclient0-x86-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585966" comment="libtalloc2-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585967" comment="libtalloc2-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585968" comment="libtalloc2-x86-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585969" comment="libtdb1-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585970" comment="libtdb1-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585971" comment="libtdb1-x86-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585972" comment="libtevent0-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585973" comment="libtevent0-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585974" comment="libtevent0-x86-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585975" comment="libwbclient0-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585976" comment="libwbclient0-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585977" comment="libwbclient0-x86-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585978" comment="samba-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585979" comment="samba-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585980" comment="samba-client-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585981" comment="samba-client-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585982" comment="samba-client-x86-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569099" comment="samba-doc-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585983" comment="samba-krb-printing-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585984" comment="samba-winbind-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585985" comment="samba-winbind-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585986" comment="samba-winbind-x86-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585987" comment="samba-x86-3.6.3-84.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220386" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027147" ref_url="https://bugzilla.suse.com/1027147" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002743.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issues:

Security issue fixed:
- CVE-2017-2619: symlink race permits opening files outside share directory (bsc#1027147).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-28"/>
	<updated date="2017-03-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027147">SUSE bug 1027147</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2619">CVE-2017-2619 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585988" comment="ldapsmb-1.34b-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585989" comment="libldb1-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585990" comment="libsmbclient0-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585991" comment="libsmbclient0-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585992" comment="libsmbclient0-x86-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585993" comment="libtalloc2-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585994" comment="libtalloc2-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585995" comment="libtalloc2-x86-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585996" comment="libtdb1-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585997" comment="libtdb1-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585998" comment="libtdb1-x86-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585999" comment="libtevent0-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586000" comment="libtevent0-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586001" comment="libtevent0-x86-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586002" comment="libwbclient0-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586003" comment="libwbclient0-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586004" comment="libwbclient0-x86-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586005" comment="samba-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586006" comment="samba-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586007" comment="samba-client-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586008" comment="samba-client-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586009" comment="samba-client-x86-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581200" comment="samba-doc-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586010" comment="samba-krb-printing-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586011" comment="samba-winbind-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586012" comment="samba-winbind-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586013" comment="samba-winbind-x86-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586014" comment="samba-x86-3.6.3-87.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585988" comment="ldapsmb-1.34b-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585989" comment="libldb1-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585990" comment="libsmbclient0-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585991" comment="libsmbclient0-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585992" comment="libsmbclient0-x86-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585993" comment="libtalloc2-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585994" comment="libtalloc2-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585995" comment="libtalloc2-x86-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585996" comment="libtdb1-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585997" comment="libtdb1-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585998" comment="libtdb1-x86-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585999" comment="libtevent0-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586000" comment="libtevent0-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586001" comment="libtevent0-x86-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586002" comment="libwbclient0-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586003" comment="libwbclient0-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586004" comment="libwbclient0-x86-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586005" comment="samba-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586006" comment="samba-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586007" comment="samba-client-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586008" comment="samba-client-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586009" comment="samba-client-x86-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581200" comment="samba-doc-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586010" comment="samba-krb-printing-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586011" comment="samba-winbind-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586012" comment="samba-winbind-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586013" comment="samba-winbind-x86-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586014" comment="samba-x86-3.6.3-87.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220387" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027147" ref_url="https://bugzilla.suse.com/1027147" source="BUGZILLA"/>
		<reference ref_id="1036283" ref_url="https://bugzilla.suse.com/1036283" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002850.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issues:

Security issue fixed:
- CVE-2017-2619: symlink race permits opening files outside share directory (bsc#1027147).
  For SUSE Linux Enterprise 11 SP4 this is a re-issue of the update, a regression
  in the fix has been addressed (bsc#1036283, bso#12721).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-08"/>
	<updated date="2017-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027147">SUSE bug 1027147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036283">SUSE bug 1036283</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2619">CVE-2017-2619 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586015" comment="ldapsmb-1.34b-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586016" comment="libldb1-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586017" comment="libsmbclient0-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586018" comment="libsmbclient0-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586019" comment="libsmbclient0-x86-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586020" comment="libtalloc2-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586021" comment="libtalloc2-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586022" comment="libtalloc2-x86-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586023" comment="libtdb1-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586024" comment="libtdb1-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586025" comment="libtdb1-x86-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586026" comment="libtevent0-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586027" comment="libtevent0-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586028" comment="libtevent0-x86-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586029" comment="libwbclient0-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586030" comment="libwbclient0-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586031" comment="libwbclient0-x86-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586032" comment="samba-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586033" comment="samba-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586034" comment="samba-client-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586035" comment="samba-client-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586036" comment="samba-client-x86-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569111" comment="samba-doc-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586037" comment="samba-krb-printing-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586038" comment="samba-winbind-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586039" comment="samba-winbind-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586040" comment="samba-winbind-x86-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586041" comment="samba-x86-3.6.3-90.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586015" comment="ldapsmb-1.34b-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586016" comment="libldb1-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586017" comment="libsmbclient0-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586018" comment="libsmbclient0-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586019" comment="libsmbclient0-x86-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586020" comment="libtalloc2-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586021" comment="libtalloc2-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586022" comment="libtalloc2-x86-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586023" comment="libtdb1-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586024" comment="libtdb1-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586025" comment="libtdb1-x86-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586026" comment="libtevent0-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586027" comment="libtevent0-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586028" comment="libtevent0-x86-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586029" comment="libwbclient0-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586030" comment="libwbclient0-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586031" comment="libwbclient0-x86-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586032" comment="samba-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586033" comment="samba-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586034" comment="samba-client-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586035" comment="samba-client-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586036" comment="samba-client-x86-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569111" comment="samba-doc-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586037" comment="samba-krb-printing-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586038" comment="samba-winbind-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586039" comment="samba-winbind-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586040" comment="samba-winbind-x86-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586041" comment="samba-x86-3.6.3-90.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220388" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1038231" ref_url="https://bugzilla.suse.com/1038231" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7494" ref_url="https://www.suse.com/security/cve/CVE-2017-7494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002915.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issue:

- An unprivileged user with access to the samba server could cause smbd to load
  a specially crafted shared library, which then had the ability to execute
  arbitrary code on the server as 'root'. [CVE-2017-7494, bso#12780, bsc#1038231]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-24"/>
	<updated date="2017-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038231">SUSE bug 1038231</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7494/">CVE-2017-7494 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7494">CVE-2017-7494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586042" comment="ldapsmb-1.34b-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586043" comment="libldb1-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586044" comment="libsmbclient0-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586045" comment="libsmbclient0-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586046" comment="libsmbclient0-x86-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586047" comment="libtalloc2-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586048" comment="libtalloc2-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586049" comment="libtalloc2-x86-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586050" comment="libtdb1-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586051" comment="libtdb1-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586052" comment="libtdb1-x86-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586053" comment="libtevent0-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586054" comment="libtevent0-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586055" comment="libtevent0-x86-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586056" comment="libwbclient0-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586057" comment="libwbclient0-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586058" comment="libwbclient0-x86-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586059" comment="samba-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586060" comment="samba-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586061" comment="samba-client-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586062" comment="samba-client-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586063" comment="samba-client-x86-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569123" comment="samba-doc-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586064" comment="samba-krb-printing-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586065" comment="samba-winbind-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586066" comment="samba-winbind-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586067" comment="samba-winbind-x86-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586068" comment="samba-x86-3.6.3-93.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586042" comment="ldapsmb-1.34b-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586043" comment="libldb1-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586044" comment="libsmbclient0-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586045" comment="libsmbclient0-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586046" comment="libsmbclient0-x86-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586047" comment="libtalloc2-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586048" comment="libtalloc2-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586049" comment="libtalloc2-x86-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586050" comment="libtdb1-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586051" comment="libtdb1-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586052" comment="libtdb1-x86-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586053" comment="libtevent0-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586054" comment="libtevent0-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586055" comment="libtevent0-x86-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586056" comment="libwbclient0-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586057" comment="libwbclient0-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586058" comment="libwbclient0-x86-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586059" comment="samba-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586060" comment="samba-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586061" comment="samba-client-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586062" comment="samba-client-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586063" comment="samba-client-x86-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569123" comment="samba-doc-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586064" comment="samba-krb-printing-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586065" comment="samba-winbind-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586066" comment="samba-winbind-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586067" comment="samba-winbind-x86-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586068" comment="samba-x86-3.6.3-93.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220389" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1042419" ref_url="https://bugzilla.suse.com/1042419" source="BUGZILLA"/>
		<reference ref_id="1058622" ref_url="https://bugzilla.suse.com/1058622" source="BUGZILLA"/>
		<reference ref_id="1058624" ref_url="https://bugzilla.suse.com/1058624" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12150" ref_url="https://www.suse.com/security/cve/CVE-2017-12150/" source="CVE"/>
		<reference ref_id="CVE-2017-12163" ref_url="https://www.suse.com/security/cve/CVE-2017-12163/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003292.html" source="SUSE-SU"/>
		<description>

This update for samba fixes several issues.

These security issues were fixed: 

- CVE-2017-12163: Prevent client short SMB1 write from writing server memory to
  file, leaking information from the server to the client (bsc#1058624)
- CVE-2017-12150: Always enforce smb signing when it is configured (bsc#1058622)

This non-security issue was fixed: 

- Fix error where short name length was read as 2 bytes, should be 1 (bsc#1042419).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-12"/>
	<updated date="2017-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042419">SUSE bug 1042419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058622">SUSE bug 1058622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058624">SUSE bug 1058624</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12150/">CVE-2017-12150 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12150">CVE-2017-12150 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12163/">CVE-2017-12163 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12163">CVE-2017-12163 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586069" comment="ldapsmb-1.34b-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586070" comment="libldb1-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586071" comment="libsmbclient0-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586072" comment="libsmbclient0-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586073" comment="libsmbclient0-x86-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586074" comment="libtalloc2-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586075" comment="libtalloc2-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586076" comment="libtalloc2-x86-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586077" comment="libtdb1-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586078" comment="libtdb1-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586079" comment="libtdb1-x86-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586080" comment="libtevent0-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586081" comment="libtevent0-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586082" comment="libtevent0-x86-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586083" comment="libwbclient0-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586084" comment="libwbclient0-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586085" comment="libwbclient0-x86-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586086" comment="samba-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586087" comment="samba-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586088" comment="samba-client-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586089" comment="samba-client-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586090" comment="samba-client-x86-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569135" comment="samba-doc-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586091" comment="samba-krb-printing-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586092" comment="samba-winbind-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586093" comment="samba-winbind-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586094" comment="samba-winbind-x86-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586095" comment="samba-x86-3.6.3-94.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586069" comment="ldapsmb-1.34b-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586070" comment="libldb1-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586071" comment="libsmbclient0-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586072" comment="libsmbclient0-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586073" comment="libsmbclient0-x86-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586074" comment="libtalloc2-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586075" comment="libtalloc2-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586076" comment="libtalloc2-x86-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586077" comment="libtdb1-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586078" comment="libtdb1-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586079" comment="libtdb1-x86-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586080" comment="libtevent0-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586081" comment="libtevent0-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586082" comment="libtevent0-x86-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586083" comment="libwbclient0-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586084" comment="libwbclient0-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586085" comment="libwbclient0-x86-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586086" comment="samba-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586087" comment="samba-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586088" comment="samba-client-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586089" comment="samba-client-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586090" comment="samba-client-x86-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569135" comment="samba-doc-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586091" comment="samba-krb-printing-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586092" comment="samba-winbind-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586093" comment="samba-winbind-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586094" comment="samba-winbind-x86-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586095" comment="samba-x86-3.6.3-94.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220390" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1016531" ref_url="https://bugzilla.suse.com/1016531" source="BUGZILLA"/>
		<reference ref_id="1063008" ref_url="https://bugzilla.suse.com/1063008" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15275" ref_url="https://www.suse.com/security/cve/CVE-2017-15275/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003570.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2017-15275: s3: smbd: Chain code can return uninitialized
  memory when talloc buffer is grown; (bsc#1063008); (bso#13077);


- s3/libads: fix seal/signed ldap connections so they are reused;
  (bsc#1016531).		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1016531">SUSE bug 1016531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063008">SUSE bug 1063008</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15275/">CVE-2017-15275 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15275">CVE-2017-15275 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586096" comment="ldapsmb-1.34b-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586097" comment="libldb1-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586098" comment="libsmbclient0-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586099" comment="libsmbclient0-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586100" comment="libsmbclient0-x86-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586101" comment="libtalloc2-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586102" comment="libtalloc2-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586103" comment="libtalloc2-x86-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586104" comment="libtdb1-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586105" comment="libtdb1-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586106" comment="libtdb1-x86-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586107" comment="libtevent0-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586108" comment="libtevent0-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586109" comment="libtevent0-x86-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586110" comment="libwbclient0-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586111" comment="libwbclient0-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586112" comment="libwbclient0-x86-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586113" comment="samba-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586114" comment="samba-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586115" comment="samba-client-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586116" comment="samba-client-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586117" comment="samba-client-x86-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569147" comment="samba-doc-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586118" comment="samba-krb-printing-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586119" comment="samba-winbind-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586120" comment="samba-winbind-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586121" comment="samba-winbind-x86-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586122" comment="samba-x86-3.6.3-94.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586096" comment="ldapsmb-1.34b-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586097" comment="libldb1-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586098" comment="libsmbclient0-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586099" comment="libsmbclient0-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586100" comment="libsmbclient0-x86-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586101" comment="libtalloc2-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586102" comment="libtalloc2-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586103" comment="libtalloc2-x86-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586104" comment="libtdb1-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586105" comment="libtdb1-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586106" comment="libtdb1-x86-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586107" comment="libtevent0-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586108" comment="libtevent0-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586109" comment="libtevent0-x86-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586110" comment="libwbclient0-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586111" comment="libwbclient0-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586112" comment="libwbclient0-x86-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586113" comment="samba-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586114" comment="samba-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586115" comment="samba-client-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586116" comment="samba-client-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586117" comment="samba-client-x86-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569147" comment="samba-doc-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586118" comment="samba-krb-printing-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586119" comment="samba-winbind-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586120" comment="samba-winbind-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586121" comment="samba-winbind-x86-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586122" comment="samba-x86-3.6.3-94.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220391" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1081741" ref_url="https://bugzilla.suse.com/1081741" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1050" ref_url="https://www.suse.com/security/cve/CVE-2018-1050/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0774-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180774-1.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2018-1050: DOS vulnerability when SPOOLSS is run externally (bsc#1081741)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-22"/>
	<updated date="2018-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081741">SUSE bug 1081741</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1050/">CVE-2018-1050 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1050">CVE-2018-1050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586123" comment="ldapsmb-1.34b-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586124" comment="libldb1-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586125" comment="libsmbclient0-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586126" comment="libsmbclient0-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586127" comment="libsmbclient0-x86-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586128" comment="libtalloc2-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586129" comment="libtalloc2-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586130" comment="libtalloc2-x86-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586131" comment="libtdb1-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586132" comment="libtdb1-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586133" comment="libtdb1-x86-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586134" comment="libtevent0-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586135" comment="libtevent0-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586136" comment="libtevent0-x86-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586137" comment="libwbclient0-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586138" comment="libwbclient0-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586139" comment="libwbclient0-x86-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586140" comment="samba-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586141" comment="samba-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586142" comment="samba-client-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586143" comment="samba-client-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586144" comment="samba-client-x86-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581296" comment="samba-doc-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586145" comment="samba-krb-printing-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586146" comment="samba-winbind-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586147" comment="samba-winbind-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586148" comment="samba-winbind-x86-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586149" comment="samba-x86-3.6.3-94.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586123" comment="ldapsmb-1.34b-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586124" comment="libldb1-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586125" comment="libsmbclient0-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586126" comment="libsmbclient0-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586127" comment="libsmbclient0-x86-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586128" comment="libtalloc2-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586129" comment="libtalloc2-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586130" comment="libtalloc2-x86-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586131" comment="libtdb1-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586132" comment="libtdb1-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586133" comment="libtdb1-x86-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586134" comment="libtevent0-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586135" comment="libtevent0-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586136" comment="libtevent0-x86-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586137" comment="libwbclient0-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586138" comment="libwbclient0-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586139" comment="libwbclient0-x86-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586140" comment="samba-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586141" comment="samba-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586142" comment="samba-client-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586143" comment="samba-client-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586144" comment="samba-client-x86-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581296" comment="samba-doc-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586145" comment="samba-krb-printing-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586146" comment="samba-winbind-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586147" comment="samba-winbind-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586148" comment="samba-winbind-x86-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586149" comment="samba-x86-3.6.3-94.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220392" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1079449" ref_url="https://bugzilla.suse.com/1079449" source="BUGZILLA"/>
		<reference ref_id="1103411" ref_url="https://bugzilla.suse.com/1103411" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10858" ref_url="https://www.suse.com/security/cve/CVE-2018-10858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004415.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

The following security issues were fixed:

- CVE-2018-10858: Insufficient input validation on client directory listing in libsmbclient (bsc#1103411).
  
The following other bugs were fixed:

- s3:winbindd: allow a fallback to NTLMSSP for LDAP connections (bsc#1079449)		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1079449">SUSE bug 1079449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103411">SUSE bug 1103411</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10858/">CVE-2018-10858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10858">CVE-2018-10858 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586150" comment="ldapsmb-1.34b-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586151" comment="libldb1-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586152" comment="libsmbclient0-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586153" comment="libsmbclient0-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586154" comment="libsmbclient0-x86-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586155" comment="libtalloc2-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586156" comment="libtalloc2-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586157" comment="libtalloc2-x86-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586158" comment="libtdb1-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586159" comment="libtdb1-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586160" comment="libtdb1-x86-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586161" comment="libtevent0-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586162" comment="libtevent0-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586163" comment="libtevent0-x86-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586164" comment="libwbclient0-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586165" comment="libwbclient0-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586166" comment="libwbclient0-x86-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586167" comment="samba-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586168" comment="samba-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586169" comment="samba-client-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586170" comment="samba-client-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586171" comment="samba-client-x86-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569159" comment="samba-doc-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586172" comment="samba-krb-printing-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586173" comment="samba-winbind-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586174" comment="samba-winbind-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586175" comment="samba-winbind-x86-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586176" comment="samba-x86-3.6.3-94.14.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586150" comment="ldapsmb-1.34b-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586151" comment="libldb1-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586152" comment="libsmbclient0-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586153" comment="libsmbclient0-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586154" comment="libsmbclient0-x86-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586155" comment="libtalloc2-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586156" comment="libtalloc2-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586157" comment="libtalloc2-x86-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586158" comment="libtdb1-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586159" comment="libtdb1-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586160" comment="libtdb1-x86-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586161" comment="libtevent0-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586162" comment="libtevent0-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586163" comment="libtevent0-x86-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586164" comment="libwbclient0-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586165" comment="libwbclient0-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586166" comment="libwbclient0-x86-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586167" comment="samba-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586168" comment="samba-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586169" comment="samba-client-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586170" comment="samba-client-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586171" comment="samba-client-x86-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569159" comment="samba-doc-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586172" comment="samba-krb-printing-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586173" comment="samba-winbind-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586174" comment="samba-winbind-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586175" comment="samba-winbind-x86-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586176" comment="samba-x86-3.6.3-94.14.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220393" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1101499" ref_url="https://bugzilla.suse.com/1101499" source="BUGZILLA"/>
		<reference ref_id="1131060" ref_url="https://bugzilla.suse.com/1131060" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3880" ref_url="https://www.suse.com/security/cve/CVE-2019-3880/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005435.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

Security issue fixed:

- CVE-2019-3880: Fixed a path/symlink traversal vulnerability, which allowed an unprivileged user to save registry files outside a share (bsc#1131060).

Non-security issue fixed:

- Make init scripts create log directories before running daemons (bsc#1101499)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101499">SUSE bug 1101499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131060">SUSE bug 1131060</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3880/">CVE-2019-3880 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3880">CVE-2019-3880 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586177" comment="ldapsmb-1.34b-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586178" comment="libldb1-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586179" comment="libsmbclient0-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586180" comment="libsmbclient0-32bit-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586181" comment="libtalloc2-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586182" comment="libtalloc2-32bit-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586183" comment="libtdb1-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586184" comment="libtdb1-32bit-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586185" comment="libtevent0-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586186" comment="libtevent0-32bit-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586187" comment="libwbclient0-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586188" comment="libwbclient0-32bit-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586189" comment="samba-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586190" comment="samba-32bit-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586191" comment="samba-client-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586192" comment="samba-client-32bit-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569171" comment="samba-doc-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586193" comment="samba-krb-printing-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586194" comment="samba-winbind-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586195" comment="samba-winbind-32bit-3.6.3-94.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220394" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1144902" ref_url="https://bugzilla.suse.com/1144902" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006067.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issue:

- CVE-2019-10218: Fixed a path injection caused by filenames containing path separators (bso#14071) (bsc#1144902).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-29"/>
	<updated date="2019-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10218">CVE-2019-10218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586196" comment="ldapsmb-1.34b-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586197" comment="libldb1-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586198" comment="libsmbclient0-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586199" comment="libsmbclient0-32bit-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586200" comment="libtalloc2-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586201" comment="libtalloc2-32bit-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586202" comment="libtdb1-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586203" comment="libtdb1-32bit-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586204" comment="libtevent0-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586205" comment="libtevent0-32bit-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586206" comment="libwbclient0-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586207" comment="libwbclient0-32bit-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586208" comment="samba-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586209" comment="samba-32bit-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586210" comment="samba-client-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586211" comment="samba-client-32bit-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569183" comment="samba-doc-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586212" comment="samba-krb-printing-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586213" comment="samba-winbind-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586214" comment="samba-winbind-32bit-3.6.3-94.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220395" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1173160" ref_url="https://bugzilla.suse.com/1173160" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10745" ref_url="https://www.suse.com/security/cve/CVE-2020-10745/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007175.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

-  CVE-2020-10745: Fixed an issue which parsing and packing of NBT and DNS packets 
   containing dots could potentially have consumed excessive CPU (bsc#1173160).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-23"/>
	<updated date="2020-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173160">SUSE bug 1173160</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10745/">CVE-2020-10745 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10745">CVE-2020-10745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586215" comment="ldapsmb-1.34b-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586216" comment="libldb1-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586217" comment="libsmbclient0-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586218" comment="libsmbclient0-32bit-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586219" comment="libtalloc2-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586220" comment="libtalloc2-32bit-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586221" comment="libtdb1-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586222" comment="libtdb1-32bit-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586223" comment="libtevent0-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586224" comment="libtevent0-32bit-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586225" comment="libwbclient0-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586226" comment="libwbclient0-32bit-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586227" comment="samba-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586228" comment="samba-32bit-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586229" comment="samba-client-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586230" comment="samba-client-32bit-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569195" comment="samba-doc-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586231" comment="samba-krb-printing-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586232" comment="samba-winbind-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586233" comment="samba-winbind-32bit-3.6.3-94.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220396" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1173902" ref_url="https://bugzilla.suse.com/1173902" source="BUGZILLA"/>
		<reference ref_id="1173994" ref_url="https://bugzilla.suse.com/1173994" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14318" ref_url="https://www.suse.com/security/cve/CVE-2020-14318/" source="CVE"/>
		<reference ref_id="CVE-2020-14323" ref_url="https://www.suse.com/security/cve/CVE-2020-14323/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007678.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2020-14323: Unprivileged user can crash winbind (bsc#1173994).
- CVE-2020-14318: Missing permissions check in SMB1/2/3 ChangeNotify (bsc#1173902).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-30"/>
	<updated date="2020-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173902">SUSE bug 1173902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173994">SUSE bug 1173994</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14318/">CVE-2020-14318 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14318">CVE-2020-14318 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14323/">CVE-2020-14323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14323">CVE-2020-14323 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586234" comment="ldapsmb-1.34b-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586235" comment="libldb1-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586236" comment="libsmbclient0-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586237" comment="libsmbclient0-32bit-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586238" comment="libtalloc2-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586239" comment="libtalloc2-32bit-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586240" comment="libtdb1-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586241" comment="libtdb1-32bit-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586242" comment="libtevent0-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586243" comment="libtevent0-32bit-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586244" comment="libwbclient0-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586245" comment="libwbclient0-32bit-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586246" comment="samba-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586247" comment="samba-32bit-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586248" comment="samba-client-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586249" comment="samba-client-32bit-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569207" comment="samba-doc-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586250" comment="samba-krb-printing-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586251" comment="samba-winbind-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586252" comment="samba-winbind-32bit-3.6.3-94.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220397" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1178469" ref_url="https://bugzilla.suse.com/1178469" source="BUGZILLA"/>
		<reference ref_id="1184677" ref_url="https://bugzilla.suse.com/1184677" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20254" ref_url="https://www.suse.com/security/cve/CVE-2021-20254/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008704.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-20254: Fixed a buffer overrun in sids_to_unixids() (bsc#1184677).
- Adjust smbcacls '--propagate-inheritance' feature to align with upstream (bsc#1178469).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-29"/>
	<updated date="2021-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178469">SUSE bug 1178469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184677">SUSE bug 1184677</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-20254/">CVE-2021-20254 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20254">CVE-2021-20254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586253" comment="ldapsmb-1.34b-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586254" comment="libldb1-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586255" comment="libsmbclient0-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586256" comment="libsmbclient0-32bit-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586257" comment="libtalloc2-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586258" comment="libtalloc2-32bit-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586259" comment="libtdb1-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586260" comment="libtdb1-32bit-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586261" comment="libtevent0-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586262" comment="libtevent0-32bit-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586263" comment="libwbclient0-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586264" comment="libwbclient0-32bit-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586265" comment="samba-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586266" comment="samba-32bit-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586267" comment="samba-client-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586268" comment="samba-client-32bit-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569219" comment="samba-doc-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586269" comment="samba-krb-printing-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586270" comment="samba-winbind-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586271" comment="samba-winbind-32bit-3.6.3-94.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220398" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="295284" ref_url="https://bugzilla.suse.com/295284" source="BUGZILLA"/>
		<reference ref_id="912457" ref_url="https://bugzilla.suse.com/912457" source="BUGZILLA"/>
		<reference ref_id="934299" ref_url="https://bugzilla.suse.com/934299" source="BUGZILLA"/>
		<reference ref_id="936909" ref_url="https://bugzilla.suse.com/936909" source="BUGZILLA"/>
		<reference ref_id="948244" ref_url="https://bugzilla.suse.com/948244" source="BUGZILLA"/>
		<reference ref_id="949022" ref_url="https://bugzilla.suse.com/949022" source="BUGZILLA"/>
		<reference ref_id="953382" ref_url="https://bugzilla.suse.com/953382" source="BUGZILLA"/>
		<reference ref_id="958582" ref_url="https://bugzilla.suse.com/958582" source="BUGZILLA"/>
		<reference ref_id="958583" ref_url="https://bugzilla.suse.com/958583" source="BUGZILLA"/>
		<reference ref_id="958584" ref_url="https://bugzilla.suse.com/958584" source="BUGZILLA"/>
		<reference ref_id="958586" ref_url="https://bugzilla.suse.com/958586" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252/" source="CVE"/>
		<reference ref_id="CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296/" source="CVE"/>
		<reference ref_id="CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001809.html" source="SUSE-SU"/>
		<description>
This update for Samba fixes the following security issues:

- CVE-2015-5330: Remote read memory exploit in LDB (bnc#958586)
- CVE-2015-5252: Insufficient symlink verification (file access outside the share) (bnc#958582)
- CVE-2015-5296: No man in the middle protection when forcing smb encryption on the client side (bnc#958584)
- CVE-2015-5299: Currently the snapshot browsing is not secure thru windows previous version (shadow_copy2) (bnc#958583)

Non-security issues fixed:

- Prevent null pointer access in samlogon fallback when security credentials are null (bnc#949022)
- Ensure samlogon fall-back requests are rerouted after kerberos failure (bnc#953382)
- Ensure 'Your account is disabled' message is displayed when attempting to ssh into locked account (bnc#953382)
- Address unrecoverable winbind failure: 'key length too large' (bnc#934299)
- Take resource group sids into account when caching netsamlogon data (bnc#912457)
- Fix lookup of groups with 'Local Domain' scope from Active Directory (bnc#948244)
- dependency issue with samba-winbind (bnc#936909)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-19"/>
	<updated date="2016-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/295284">SUSE bug 295284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912457">SUSE bug 912457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934299">SUSE bug 934299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936909">SUSE bug 936909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948244">SUSE bug 948244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949022">SUSE bug 949022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953382">SUSE bug 953382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958582">SUSE bug 958582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958583">SUSE bug 958583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958584">SUSE bug 958584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958586">SUSE bug 958586</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5252">CVE-2015-5252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5296">CVE-2015-5296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5299">CVE-2015-5299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5330">CVE-2015-5330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581440" comment="ldapsmb-1.34b-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581441" comment="libldb1-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581442" comment="libsmbclient0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581443" comment="libsmbclient0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581444" comment="libsmbclient0-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581445" comment="libtalloc2-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581446" comment="libtalloc2-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581447" comment="libtalloc2-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581448" comment="libtdb1-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581449" comment="libtdb1-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581450" comment="libtdb1-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581451" comment="libtevent0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581452" comment="libtevent0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586272" comment="libtevent0-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581453" comment="libwbclient0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581454" comment="libwbclient0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581455" comment="libwbclient0-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581456" comment="samba-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581457" comment="samba-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581458" comment="samba-client-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581459" comment="samba-client-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581460" comment="samba-client-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567140" comment="samba-doc-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581461" comment="samba-krb-printing-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581462" comment="samba-winbind-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581463" comment="samba-winbind-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581464" comment="samba-winbind-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581465" comment="samba-x86-3.6.3-64.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581440" comment="ldapsmb-1.34b-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581441" comment="libldb1-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581442" comment="libsmbclient0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581443" comment="libsmbclient0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581444" comment="libsmbclient0-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581445" comment="libtalloc2-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581446" comment="libtalloc2-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581447" comment="libtalloc2-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581448" comment="libtdb1-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581449" comment="libtdb1-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581450" comment="libtdb1-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581451" comment="libtevent0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581452" comment="libtevent0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586272" comment="libtevent0-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581453" comment="libwbclient0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581454" comment="libwbclient0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581455" comment="libwbclient0-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581456" comment="samba-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581457" comment="samba-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581458" comment="samba-client-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581459" comment="samba-client-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581460" comment="samba-client-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567140" comment="samba-doc-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581461" comment="samba-krb-printing-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581462" comment="samba-winbind-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581463" comment="samba-winbind-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581464" comment="samba-winbind-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581465" comment="samba-x86-3.6.3-64.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220399" version="1" class="patch">
	<metadata>
		<title>Security update for sane-backends (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027197" ref_url="https://bugzilla.suse.com/1027197" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6318" ref_url="https://www.suse.com/security/cve/CVE-2017-6318/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002704.html" source="SUSE-SU"/>
		<description>

This update for sane-backends fixes the following issues:

- saned could have leaked uninitialized memory back to its requesters for some
  opcodes, allowing for information disclosure of saned memory
  (CVE-2017-6318, bsc#1027197).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027197">SUSE bug 1027197</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6318/">CVE-2017-6318 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6318">CVE-2017-6318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586273" comment="sane-backends-1.0.20-7.8.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586273" comment="sane-backends-1.0.20-7.8.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220400" version="1" class="patch">
	<metadata>
		<title>Security update for sblim-sfcb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="942628" ref_url="https://bugzilla.suse.com/942628" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5185" ref_url="https://www.suse.com/security/cve/CVE-2015-5185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001722.html" source="SUSE-SU"/>
		<description>

This update of sblim-sfcb fixes a potential NULL pointer crash in lookupProviders() (CVE-2015-5185).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/942628">SUSE bug 942628</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5185/">CVE-2015-5185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5185">CVE-2015-5185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581466" comment="sblim-sfcb-1.3.11-0.25.4 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581466" comment="sblim-sfcb-1.3.11-0.25.4 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220401" version="1" class="patch">
	<metadata>
		<title>Security update for sblim-sfcb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1008130" ref_url="https://bugzilla.suse.com/1008130" source="BUGZILLA"/>
		<reference ref_id="1012814" ref_url="https://bugzilla.suse.com/1012814" source="BUGZILLA"/>
		<reference ref_id="923349" ref_url="https://bugzilla.suse.com/923349" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002800.html" source="SUSE-SU"/>
		<description>

This update for sblim-sfcb fixes the following issues:

Feature enhancements:
- A seperate sblim-sfcb-openssl1 package was added to the SECURITY Module.
  (fate#322032/bsc#1012814)

  This package can be installed additionaly, and the SysV Init script will
  pick the openssl1 variant on the next start, offering TLS 1.2 support
  on the WBEM SSL socket.

Bugfixes:
-  Add sslNoSSLv3 and sslNoTLSv1 configuration options (bsc#923349, bsc#1008130)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-13"/>
	<updated date="2017-04-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1008130">SUSE bug 1008130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012814">SUSE bug 1012814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923349">SUSE bug 923349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586274" comment="sblim-sfcb-1.3.11-0.28.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586274" comment="sblim-sfcb-1.3.11-0.28.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220402" version="1" class="patch">
	<metadata>
		<title>Security update for shim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1175626" ref_url="https://bugzilla.suse.com/1175626" source="BUGZILLA"/>
		<reference ref_id="1175656" ref_url="https://bugzilla.suse.com/1175656" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007428.html" source="SUSE-SU"/>
		<description>
This update for shim fixes the following issues:

Update to the unified shim binary from SUSE Linux Enterprise 15-SP1 (bsc#1168994)

This update addresses the 'BootHole' security issue (master CVE CVE-2020-10713), by
disallowing binaries signed by the previous SUSE UEFI signing key from booting.

This update should only be installed after updates of grub2, the Linux kernel and (if used)
Xen from or after July / August 2020 are applied.

Also fixed:

+ shim-install: install MokManager to \EFI\boot to process the pending MOK request (bsc#1175626, bsc#1175656)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-15"/>
	<updated date="2020-09-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175626">SUSE bug 1175626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175656">SUSE bug 1175656</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10713">CVE-2020-10713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581469" comment="shim-15+git47-12.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220403" version="1" class="patch">
	<metadata>
		<title>Security update for socat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="821985" ref_url="https://bugzilla.suse.com/821985" source="BUGZILLA"/>
		<reference ref_id="860991" ref_url="https://bugzilla.suse.com/860991" source="BUGZILLA"/>
		<reference ref_id="964844" ref_url="https://bugzilla.suse.com/964844" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-3571" ref_url="https://www.suse.com/security/cve/CVE-2013-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-0019" ref_url="https://www.suse.com/security/cve/CVE-2014-0019/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001850.html" source="SUSE-SU"/>
		<description>

This update for socat fixes the following issues:

- CVE-2013-3571: Fix a file descriptor leak that could have been misused for a denial of service attack against socat running in server mode (bsc#821985)
- CVE-2014-0019: PROXY-CONNECT address was vulnerable to a stack buffer overflow (bsc#860991)
- Fix a stack overflow in the parser that could have been leveraged to execute arbitrary code (bsc#964844)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/821985">SUSE bug 821985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860991">SUSE bug 860991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964844">SUSE bug 964844</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3571/">CVE-2013-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3571">CVE-2013-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0019/">CVE-2014-0019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0019">CVE-2014-0019 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586275" comment="socat-1.7.0.0-1.18.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586275" comment="socat-1.7.0.0-1.18.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220404" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="944460" ref_url="https://bugzilla.suse.com/944460" source="BUGZILLA"/>
		<reference ref_id="944787" ref_url="https://bugzilla.suse.com/944787" source="BUGZILLA"/>
		<reference ref_id="948976" ref_url="https://bugzilla.suse.com/948976" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3247" ref_url="https://www.suse.com/security/cve/CVE-2015-3247/" source="CVE"/>
		<reference ref_id="CVE-2015-5260" ref_url="https://www.suse.com/security/cve/CVE-2015-5260/" source="CVE"/>
		<reference ref_id="CVE-2015-5261" ref_url="https://www.suse.com/security/cve/CVE-2015-5261/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002048.html" source="SUSE-SU"/>
		<description>
Spice was updated to fix three security issues.
    
The following vulnerabilities were fixed:  
  
* CVE-2015-3247: heap corruption in the spice server (bsc#944460)
* CVE-2015-5261: Guest could have accessed host memory using crafted images (bsc#948976)
* CVE-2015-5260: Insufficient validation of surface_id parameter could have caused a crash (bsc#944787)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-07"/>
	<updated date="2016-05-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/944460">SUSE bug 944460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944787">SUSE bug 944787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948976">SUSE bug 948976</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3247/">CVE-2015-3247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3247">CVE-2015-3247 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5260/">CVE-2015-5260 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5260">CVE-2015-5260 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2015-5261/">CVE-2015-5261 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5261">CVE-2015-5261 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586276" comment="libspice-server1-0.12.4-5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586276" comment="libspice-server1-0.12.4-5.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220405" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1023078" ref_url="https://bugzilla.suse.com/1023078" source="BUGZILLA"/>
		<reference ref_id="1023079" ref_url="https://bugzilla.suse.com/1023079" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9577" ref_url="https://www.suse.com/security/cve/CVE-2016-9577/" source="CVE"/>
		<reference ref_id="CVE-2016-9578" ref_url="https://www.suse.com/security/cve/CVE-2016-9578/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002623.html" source="SUSE-SU"/>
		<description>

This security update for spice fixes the following issues:

CVE-2016-9577: A buffer overflow in the spice server could have potentially been used 
by unauthenticated attackers to execute arbitrary code. (bsc#1023078)
CVE-2016-9578: Unauthenticated attackers could have caused a denial of service via a crafted message. (bsc#1023079)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-06"/>
	<updated date="2017-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1023078">SUSE bug 1023078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023079">SUSE bug 1023079</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9577/">CVE-2016-9577 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9577">CVE-2016-9577 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9578/">CVE-2016-9578 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9578">CVE-2016-9578 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586277" comment="libspice-server1-0.12.4-8.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586277" comment="libspice-server1-0.12.4-8.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220406" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1046779" ref_url="https://bugzilla.suse.com/1046779" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7506" ref_url="https://www.suse.com/security/cve/CVE-2017-7506/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003023.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

- CVE-2017-7506: A possible buffer overflow via invalid monitor configurations (bsc#1046779)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-11"/>
	<updated date="2017-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046779">SUSE bug 1046779</bugzilla>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7506/">CVE-2017-7506 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7506">CVE-2017-7506 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586278" comment="libspice-server1-0.12.4-11.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586278" comment="libspice-server1-0.12.4-11.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220407" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1101295" ref_url="https://bugzilla.suse.com/1101295" source="BUGZILLA"/>
		<reference ref_id="1104448" ref_url="https://bugzilla.suse.com/1104448" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873/" source="CVE"/>
		<reference ref_id="CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004516.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

Security issues fixed:

- CVE-2018-10873: Fix potential heap corruption when demarshalling (bsc#1104448)
- CVE-2018-10893: Avoid buffer overflow on image lz checks (bsc#1101295)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-30"/>
	<updated date="2018-08-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101295">SUSE bug 1101295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104448">SUSE bug 1104448</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10873">CVE-2018-10873 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10893">CVE-2018-10893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586279" comment="libspice-server1-0.12.4-15.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586279" comment="libspice-server1-0.12.4-15.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220408" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1122706" ref_url="https://bugzilla.suse.com/1122706" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3813" ref_url="https://www.suse.com/security/cve/CVE-2019-3813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005094.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

Security issue fixed:

- CVE-2019-3813: Fixed an out-of-bounds read in the memslot_get_virt function 
  that could lead to denial-of-service or code-execution (bsc#1122706).
 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-07"/>
	<updated date="2019-02-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122706">SUSE bug 1122706</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3813/">CVE-2019-3813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3813">CVE-2019-3813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586280" comment="libspice-server1-0.12.4-18.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586280" comment="libspice-server1-0.12.4-18.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220409" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1177158" ref_url="https://bugzilla.suse.com/1177158" source="BUGZILLA"/>
		<reference ref_id="1181686" ref_url="https://bugzilla.suse.com/1181686" source="BUGZILLA"/>
		<reference ref_id="982386" ref_url="https://bugzilla.suse.com/982386" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2150" ref_url="https://www.suse.com/security/cve/CVE-2016-2150/" source="CVE"/>
		<reference ref_id="CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355/" source="CVE"/>
		<reference ref_id="CVE-2021-20201" ref_url="https://www.suse.com/security/cve/CVE-2021-20201/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008966.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

- CVE-2021-20201: client initiated renegotiation causing denial of service (bsc#1181686)
- CVE-2020-14355: Fixed multiple buffer overflow vulnerabilities in QUIC decoding code (bsc#1177158)
- CVE-2016-2150: Fixed a guest escape using crafted primary surface parameters (bsc#982386)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177158">SUSE bug 1177158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181686">SUSE bug 1181686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982386">SUSE bug 982386</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2150/">CVE-2016-2150 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2150">CVE-2016-2150 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14355">CVE-2020-14355 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20201/">CVE-2021-20201 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20201">CVE-2021-20201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586281" comment="libspice-server1-0.12.4-21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220410" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="987394" ref_url="https://bugzilla.suse.com/987394" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6153" ref_url="https://www.suse.com/security/cve/CVE-2016-6153/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002203.html" source="SUSE-SU"/>
		<description>

This update for sqlite3 fixes the following issues: 

The following security issue was fixed:
- CVE-2016-6153: Fixed a tempdir selection vulnerability (bsc#987394)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-10"/>
	<updated date="2016-08-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/987394">SUSE bug 987394</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6153/">CVE-2016-6153 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6153">CVE-2016-6153 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586282" comment="libsqlite3-0-3.7.6.3-1.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586283" comment="libsqlite3-0-32bit-3.7.6.3-1.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586284" comment="libsqlite3-0-x86-3.7.6.3-1.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586285" comment="sqlite3-3.7.6.3-1.4.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586282" comment="libsqlite3-0-3.7.6.3-1.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586283" comment="libsqlite3-0-32bit-3.7.6.3-1.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586284" comment="libsqlite3-0-x86-3.7.6.3-1.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586285" comment="sqlite3-3.7.6.3-1.4.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220411" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1119687" ref_url="https://bugzilla.suse.com/1119687" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20346" ref_url="https://www.suse.com/security/cve/CVE-2018-20346/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005281.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issue:

Security issue fixed: 

- CVE-2018-20346: Fixed a remote code execution vulnerability in FTS3 (Magellan) (bsc#1119687).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1119687">SUSE bug 1119687</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20346/">CVE-2018-20346 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20346">CVE-2018-20346 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586286" comment="libsqlite3-0-3.7.6.3-1.4.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586287" comment="libsqlite3-0-32bit-3.7.6.3-1.4.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586288" comment="libsqlite3-0-x86-3.7.6.3-1.4.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586289" comment="sqlite3-3.7.6.3-1.4.7.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586286" comment="libsqlite3-0-3.7.6.3-1.4.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586287" comment="libsqlite3-0-32bit-3.7.6.3-1.4.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586288" comment="libsqlite3-0-x86-3.7.6.3-1.4.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586289" comment="sqlite3-3.7.6.3-1.4.7.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220412" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1136976" ref_url="https://bugzilla.suse.com/1136976" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8457" ref_url="https://www.suse.com/security/cve/CVE-2019-8457/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005562.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issue:

Security issue fixed:	  

- CVE-2019-8457: Fixed a Heap out-of-bound read in rtreenode() when handling invalid rtree tables (bsc#1136976).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-14"/>
	<updated date="2019-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136976">SUSE bug 1136976</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8457/">CVE-2019-8457 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8457">CVE-2019-8457 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586290" comment="libsqlite3-0-3.7.6.3-1.4.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586291" comment="libsqlite3-0-32bit-3.7.6.3-1.4.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586292" comment="sqlite3-3.7.6.3-1.4.7.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220413" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1155787" ref_url="https://bugzilla.suse.com/1155787" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2518" ref_url="https://www.suse.com/security/cve/CVE-2017-2518/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006166.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:
	  
- CVE-2017-2518: Fixed a use-after-free vulnerability which could have 
  led to buffer overflow via a crafted SQL statement (bsc#1155787).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155787">SUSE bug 1155787</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2518/">CVE-2017-2518 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2518">CVE-2017-2518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586293" comment="libsqlite3-0-3.7.6.3-1.4.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586294" comment="libsqlite3-0-32bit-3.7.6.3-1.4.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586295" comment="sqlite3-3.7.6.3-1.4.7.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220414" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1160439" ref_url="https://bugzilla.suse.com/1160439" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20218" ref_url="https://www.suse.com/security/cve/CVE-2019-20218/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009231.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

- CVE-2019-20218: Fixed a stack unwinding flaw in the selectExpander after a parsing error. (bsc#1160439)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-29"/>
	<updated date="2021-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160439">SUSE bug 1160439</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20218/">CVE-2019-20218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20218">CVE-2019-20218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626556" comment="libsqlite3-0-3.7.6.3-1.4.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626557" comment="libsqlite3-0-32bit-3.7.6.3-1.4.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626558" comment="sqlite3-3.7.6.3-1.4.7.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220415" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="895773" ref_url="https://bugzilla.suse.com/895773" source="BUGZILLA"/>
		<reference ref_id="949942" ref_url="https://bugzilla.suse.com/949942" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6270" ref_url="https://www.suse.com/security/cve/CVE-2014-6270/" source="CVE"/>
		<reference ref_id="CVE-2014-9749" ref_url="https://www.suse.com/security/cve/CVE-2014-9749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001678.html" source="SUSE-SU"/>
		<description>
squid was updated to fix two security issues.

These security issues were fixed:
- CVE-2014-6270: Fixed an off by one in snmp subsystem (bsc#895773).
- CVE-2014-9749: Fixed a nonce replay vulnerability in Digest authentication (bsc#949942).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-13"/>
	<updated date="2015-11-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/895773">SUSE bug 895773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949942">SUSE bug 949942</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6270/">CVE-2014-6270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6270">CVE-2014-6270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9749/">CVE-2014-9749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9749">CVE-2014-9749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581486" comment="squid-2.7.STABLE5-2.12.24.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581486" comment="squid-2.7.STABLE5-2.12.24.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220416" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="976553" ref_url="https://bugzilla.suse.com/976553" source="BUGZILLA"/>
		<reference ref_id="979010" ref_url="https://bugzilla.suse.com/979010" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4051" ref_url="https://www.suse.com/security/cve/CVE-2016-4051/" source="CVE"/>
		<reference ref_id="CVE-2016-4554" ref_url="https://www.suse.com/security/cve/CVE-2016-4554/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002226.html" source="SUSE-SU"/>
		<description>

This update for squid fixes the following issues:

- CVE-2016-4051: backport fix buffer overflow in cachemgr.cgi (bsc#976553)
- CVE-2016-4554: backport fix for header smuggling issue in HTTP Request processing (bsc#979010)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-24"/>
	<updated date="2016-08-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/976553">SUSE bug 976553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979010">SUSE bug 979010</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4051/">CVE-2016-4051 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4051">CVE-2016-4051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4554/">CVE-2016-4554 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4554">CVE-2016-4554 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586296" comment="squid-2.7.STABLE5-2.12.29.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586296" comment="squid-2.7.STABLE5-2.12.29.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220417" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1156329" ref_url="https://bugzilla.suse.com/1156329" source="BUGZILLA"/>
		<reference ref_id="1175664" ref_url="https://bugzilla.suse.com/1175664" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523/" source="CVE"/>
		<reference ref_id="CVE-2019-18676" ref_url="https://www.suse.com/security/cve/CVE-2019-18676/" source="CVE"/>
		<reference ref_id="CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010430.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-15810: Fixed a HTTP Request Smuggling that could have resulted in cache poisoning (bsc#1175664).
- CVE-2019-12523: Disabled urn parsing and parsing of unknown schemes (bsc#1156329).
- CVE-2019-18676: Disabled urn parsing and parsing of unknown schemes (bsc#1156329).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156329">SUSE bug 1156329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175664">SUSE bug 1175664</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12523">CVE-2019-12523 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18676/">CVE-2019-18676 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18676">CVE-2019-18676 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15810">CVE-2020-15810 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670263" comment="squid-2.7.STABLE5-2.12.30.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220418" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="895773" ref_url="https://bugzilla.suse.com/895773" source="BUGZILLA"/>
		<reference ref_id="902197" ref_url="https://bugzilla.suse.com/902197" source="BUGZILLA"/>
		<reference ref_id="938715" ref_url="https://bugzilla.suse.com/938715" source="BUGZILLA"/>
		<reference ref_id="963539" ref_url="https://bugzilla.suse.com/963539" source="BUGZILLA"/>
		<reference ref_id="967011" ref_url="https://bugzilla.suse.com/967011" source="BUGZILLA"/>
		<reference ref_id="968392" ref_url="https://bugzilla.suse.com/968392" source="BUGZILLA"/>
		<reference ref_id="968393" ref_url="https://bugzilla.suse.com/968393" source="BUGZILLA"/>
		<reference ref_id="968394" ref_url="https://bugzilla.suse.com/968394" source="BUGZILLA"/>
		<reference ref_id="968395" ref_url="https://bugzilla.suse.com/968395" source="BUGZILLA"/>
		<reference ref_id="973782" ref_url="https://bugzilla.suse.com/973782" source="BUGZILLA"/>
		<reference ref_id="973783" ref_url="https://bugzilla.suse.com/973783" source="BUGZILLA"/>
		<reference ref_id="976553" ref_url="https://bugzilla.suse.com/976553" source="BUGZILLA"/>
		<reference ref_id="976556" ref_url="https://bugzilla.suse.com/976556" source="BUGZILLA"/>
		<reference ref_id="976708" ref_url="https://bugzilla.suse.com/976708" source="BUGZILLA"/>
		<reference ref_id="979008" ref_url="https://bugzilla.suse.com/979008" source="BUGZILLA"/>
		<reference ref_id="979009" ref_url="https://bugzilla.suse.com/979009" source="BUGZILLA"/>
		<reference ref_id="979010" ref_url="https://bugzilla.suse.com/979010" source="BUGZILLA"/>
		<reference ref_id="979011" ref_url="https://bugzilla.suse.com/979011" source="BUGZILLA"/>
		<reference ref_id="993299" ref_url="https://bugzilla.suse.com/993299" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3205" ref_url="https://www.suse.com/security/cve/CVE-2011-3205/" source="CVE"/>
		<reference ref_id="CVE-2011-4096" ref_url="https://www.suse.com/security/cve/CVE-2011-4096/" source="CVE"/>
		<reference ref_id="CVE-2012-5643" ref_url="https://www.suse.com/security/cve/CVE-2012-5643/" source="CVE"/>
		<reference ref_id="CVE-2013-0188" ref_url="https://www.suse.com/security/cve/CVE-2013-0188/" source="CVE"/>
		<reference ref_id="CVE-2013-4115" ref_url="https://www.suse.com/security/cve/CVE-2013-4115/" source="CVE"/>
		<reference ref_id="CVE-2014-0128" ref_url="https://www.suse.com/security/cve/CVE-2014-0128/" source="CVE"/>
		<reference ref_id="CVE-2014-6270" ref_url="https://www.suse.com/security/cve/CVE-2014-6270/" source="CVE"/>
		<reference ref_id="CVE-2014-7141" ref_url="https://www.suse.com/security/cve/CVE-2014-7141/" source="CVE"/>
		<reference ref_id="CVE-2014-7142" ref_url="https://www.suse.com/security/cve/CVE-2014-7142/" source="CVE"/>
		<reference ref_id="CVE-2015-5400" ref_url="https://www.suse.com/security/cve/CVE-2015-5400/" source="CVE"/>
		<reference ref_id="CVE-2016-2390" ref_url="https://www.suse.com/security/cve/CVE-2016-2390/" source="CVE"/>
		<reference ref_id="CVE-2016-2569" ref_url="https://www.suse.com/security/cve/CVE-2016-2569/" source="CVE"/>
		<reference ref_id="CVE-2016-2570" ref_url="https://www.suse.com/security/cve/CVE-2016-2570/" source="CVE"/>
		<reference ref_id="CVE-2016-2571" ref_url="https://www.suse.com/security/cve/CVE-2016-2571/" source="CVE"/>
		<reference ref_id="CVE-2016-2572" ref_url="https://www.suse.com/security/cve/CVE-2016-2572/" source="CVE"/>
		<reference ref_id="CVE-2016-3947" ref_url="https://www.suse.com/security/cve/CVE-2016-3947/" source="CVE"/>
		<reference ref_id="CVE-2016-3948" ref_url="https://www.suse.com/security/cve/CVE-2016-3948/" source="CVE"/>
		<reference ref_id="CVE-2016-4051" ref_url="https://www.suse.com/security/cve/CVE-2016-4051/" source="CVE"/>
		<reference ref_id="CVE-2016-4052" ref_url="https://www.suse.com/security/cve/CVE-2016-4052/" source="CVE"/>
		<reference ref_id="CVE-2016-4053" ref_url="https://www.suse.com/security/cve/CVE-2016-4053/" source="CVE"/>
		<reference ref_id="CVE-2016-4054" ref_url="https://www.suse.com/security/cve/CVE-2016-4054/" source="CVE"/>
		<reference ref_id="CVE-2016-4553" ref_url="https://www.suse.com/security/cve/CVE-2016-4553/" source="CVE"/>
		<reference ref_id="CVE-2016-4554" ref_url="https://www.suse.com/security/cve/CVE-2016-4554/" source="CVE"/>
		<reference ref_id="CVE-2016-4555" ref_url="https://www.suse.com/security/cve/CVE-2016-4555/" source="CVE"/>
		<reference ref_id="CVE-2016-4556" ref_url="https://www.suse.com/security/cve/CVE-2016-4556/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002212.html" source="SUSE-SU"/>
		<description>


This update for squid3 fixes the following issues:

- Multiple issues in pinger ICMP processing.  (CVE-2014-7141, CVE-2014-7142) 

- CVE-2016-3947: Buffer overrun issue in pinger
    ICMPv6 processing. (bsc#973782)

-  CVE-2016-4554: fix header smuggling issue in HTTP Request processing (bsc#979010)

- Fix multiple Denial of Service issues in HTTP Response processing.
    (CVE-2016-2569, CVE-2016-2570, CVE-2016-2571, CVE-2016-2572,
     bsc#968392, bsc#968393, bsc#968394, bsc#968395)
- Regression caused by the DoS fixes above (bsc#993299)

- CVE-2016-3948: Fix denial of service in HTTP Response processing (bsc#973783)

- CVE-2016-4051: fixes buffer overflow in cachemgr.cgi (bsc#976553)

- CVE-2016-4052, CVE-2016-4053, CVE-2016-4054:
  * fixes multiple issues in ESI processing (bsc#976556)

- CVE-2016-4556: fixes double free vulnerability in Esi.cc (bsc#979008)

- CVE-2015-5400: Improper Protection of Alternate Path (bsc#938715)

- CVE-2014-6270: fix off-by-one in snmp subsystem (bsc#895773)

- Memory leak in squid3 when using external_acl (bsc#976708)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-16"/>
	<updated date="2016-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/895773">SUSE bug 895773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902197">SUSE bug 902197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938715">SUSE bug 938715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963539">SUSE bug 963539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967011">SUSE bug 967011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968392">SUSE bug 968392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968393">SUSE bug 968393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968394">SUSE bug 968394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968395">SUSE bug 968395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973782">SUSE bug 973782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973783">SUSE bug 973783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976553">SUSE bug 976553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976556">SUSE bug 976556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976708">SUSE bug 976708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979008">SUSE bug 979008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979009">SUSE bug 979009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979010">SUSE bug 979010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979011">SUSE bug 979011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993299">SUSE bug 993299</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3205/">CVE-2011-3205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3205">CVE-2011-3205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4096/">CVE-2011-4096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4096">CVE-2011-4096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5643/">CVE-2012-5643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5643">CVE-2012-5643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0188/">CVE-2013-0188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0188">CVE-2013-0188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4115/">CVE-2013-4115 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4115">CVE-2013-4115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0128/">CVE-2014-0128 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0128">CVE-2014-0128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6270/">CVE-2014-6270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6270">CVE-2014-6270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7141/">CVE-2014-7141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7141">CVE-2014-7141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7142/">CVE-2014-7142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7142">CVE-2014-7142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5400/">CVE-2015-5400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5400">CVE-2015-5400 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2390/">CVE-2016-2390 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2390">CVE-2016-2390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2569/">CVE-2016-2569 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2569">CVE-2016-2569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2570/">CVE-2016-2570 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2570">CVE-2016-2570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2571/">CVE-2016-2571 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2571">CVE-2016-2571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2572/">CVE-2016-2572 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2572">CVE-2016-2572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3947/">CVE-2016-3947 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3947">CVE-2016-3947 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3948/">CVE-2016-3948 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3948">CVE-2016-3948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4051/">CVE-2016-4051 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4051">CVE-2016-4051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4052/">CVE-2016-4052 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4052">CVE-2016-4052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4053/">CVE-2016-4053 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4053">CVE-2016-4053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4054/">CVE-2016-4054 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4054">CVE-2016-4054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4553/">CVE-2016-4553 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4553">CVE-2016-4553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4554/">CVE-2016-4554 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4554">CVE-2016-4554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4555/">CVE-2016-4555 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4555">CVE-2016-4555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4556/">CVE-2016-4556 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4556">CVE-2016-4556 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586297" comment="squid3-3.1.23-8.16.30.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586297" comment="squid3-3.1.23-8.16.30.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220419" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1016168" ref_url="https://bugzilla.suse.com/1016168" source="BUGZILLA"/>
		<reference ref_id="949942" ref_url="https://bugzilla.suse.com/949942" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9749" ref_url="https://www.suse.com/security/cve/CVE-2014-9749/" source="CVE"/>
		<reference ref_id="CVE-2016-10002" ref_url="https://www.suse.com/security/cve/CVE-2016-10002/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002553.html" source="SUSE-SU"/>
		<description>

This update for squid3 fixes the following issues:

- CVE-2016-10002: Fixed incorrect processing of responses to If-None-Modified HTTP conditional requests. This allowed responses containing private data to clients it should not have reached (bsc#1016168)
- CVE-2014-9749: Prevent nonce replay in Digest authentication, preventing the reuse of stale auth tokens (bsc#949942)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1016168">SUSE bug 1016168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949942">SUSE bug 949942</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9749/">CVE-2014-9749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9749">CVE-2014-9749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10002/">CVE-2016-10002 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10002">CVE-2016-10002 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586298" comment="squid3-3.1.23-8.16.36.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586298" comment="squid3-3.1.23-8.16.36.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220420" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1077003" ref_url="https://bugzilla.suse.com/1077003" source="BUGZILLA"/>
		<reference ref_id="1077006" ref_url="https://bugzilla.suse.com/1077006" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000024" ref_url="https://www.suse.com/security/cve/CVE-2018-1000024/" source="CVE"/>
		<reference ref_id="CVE-2018-1000027" ref_url="https://www.suse.com/security/cve/CVE-2018-1000027/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003826.html" source="SUSE-SU"/>
		<description>
This update for squid3 fixes the following issues:

Security issues fixed:

- CVE-2018-1000024: DoS fix caused by incorrect pointer handling when processing ESI
  responses. This affects the default custom esi_parser (bsc#1077003).
- CVE-2018-1000027: DoS fix caused by incorrect pointer handing whien processing ESI
  responses or downloading intermediate CA certificates (bsc#1077006).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-21"/>
	<updated date="2018-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077003">SUSE bug 1077003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077006">SUSE bug 1077006</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000024/">CVE-2018-1000024 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000024">CVE-2018-1000024 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000027/">CVE-2018-1000027 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000027">CVE-2018-1000027 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586299" comment="squid3-3.1.23-8.16.37.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586299" comment="squid3-3.1.23-8.16.37.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220421" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1090089" ref_url="https://bugzilla.suse.com/1090089" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1172" ref_url="https://www.suse.com/security/cve/CVE-2018-1172/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004069.html" source="SUSE-SU"/>
		<description>
This update for squid3 fixes the following issues:

- CVE-2018-1172: Fixed a DoS caused by incorrect handling of ESI responses. (bsc#1090089, SQUID-2018:3)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090089">SUSE bug 1090089</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1172/">CVE-2018-1172 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1172">CVE-2018-1172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586300" comment="squid3-3.1.23-8.16.37.6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586300" comment="squid3-3.1.23-8.16.37.6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220422" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1113668" ref_url="https://bugzilla.suse.com/1113668" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19131" ref_url="https://www.suse.com/security/cve/CVE-2018-19131/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004861.html" source="SUSE-SU"/>
		<description>
This update for squid3 fixes the following issues:

Security issue fixed:

- CVE-2018-19131: Fixed Cross-Site-Scripting vulnerability in the TLS error handling (bsc#1113668).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-16"/>
	<updated date="2018-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1113668">SUSE bug 1113668</bugzilla>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19131/">CVE-2018-19131 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19131">CVE-2018-19131 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586301" comment="squid3-3.1.23-8.16.37.9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586301" comment="squid3-3.1.23-8.16.37.9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220423" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1140738" ref_url="https://bugzilla.suse.com/1140738" source="BUGZILLA"/>
		<reference ref_id="1141329" ref_url="https://bugzilla.suse.com/1141329" source="BUGZILLA"/>
		<reference ref_id="1141332" ref_url="https://bugzilla.suse.com/1141332" source="BUGZILLA"/>
		<reference ref_id="1156323" ref_url="https://bugzilla.suse.com/1156323" source="BUGZILLA"/>
		<reference ref_id="1156324" ref_url="https://bugzilla.suse.com/1156324" source="BUGZILLA"/>
		<reference ref_id="1156326" ref_url="https://bugzilla.suse.com/1156326" source="BUGZILLA"/>
		<reference ref_id="1156328" ref_url="https://bugzilla.suse.com/1156328" source="BUGZILLA"/>
		<reference ref_id="1156329" ref_url="https://bugzilla.suse.com/1156329" source="BUGZILLA"/>
		<reference ref_id="1162687" ref_url="https://bugzilla.suse.com/1162687" source="BUGZILLA"/>
		<reference ref_id="1162689" ref_url="https://bugzilla.suse.com/1162689" source="BUGZILLA"/>
		<reference ref_id="1162691" ref_url="https://bugzilla.suse.com/1162691" source="BUGZILLA"/>
		<reference ref_id="1167373" ref_url="https://bugzilla.suse.com/1167373" source="BUGZILLA"/>
		<reference ref_id="1169659" ref_url="https://bugzilla.suse.com/1169659" source="BUGZILLA"/>
		<reference ref_id="1170313" ref_url="https://bugzilla.suse.com/1170313" source="BUGZILLA"/>
		<reference ref_id="1170423" ref_url="https://bugzilla.suse.com/1170423" source="BUGZILLA"/>
		<reference ref_id="1173304" ref_url="https://bugzilla.suse.com/1173304" source="BUGZILLA"/>
		<reference ref_id="1173455" ref_url="https://bugzilla.suse.com/1173455" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12519" ref_url="https://www.suse.com/security/cve/CVE-2019-12519/" source="CVE"/>
		<reference ref_id="CVE-2019-12520" ref_url="https://www.suse.com/security/cve/CVE-2019-12520/" source="CVE"/>
		<reference ref_id="CVE-2019-12521" ref_url="https://www.suse.com/security/cve/CVE-2019-12521/" source="CVE"/>
		<reference ref_id="CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523/" source="CVE"/>
		<reference ref_id="CVE-2019-12524" ref_url="https://www.suse.com/security/cve/CVE-2019-12524/" source="CVE"/>
		<reference ref_id="CVE-2019-12525" ref_url="https://www.suse.com/security/cve/CVE-2019-12525/" source="CVE"/>
		<reference ref_id="CVE-2019-12526" ref_url="https://www.suse.com/security/cve/CVE-2019-12526/" source="CVE"/>
		<reference ref_id="CVE-2019-12528" ref_url="https://www.suse.com/security/cve/CVE-2019-12528/" source="CVE"/>
		<reference ref_id="CVE-2019-12529" ref_url="https://www.suse.com/security/cve/CVE-2019-12529/" source="CVE"/>
		<reference ref_id="CVE-2019-13345" ref_url="https://www.suse.com/security/cve/CVE-2019-13345/" source="CVE"/>
		<reference ref_id="CVE-2019-18676" ref_url="https://www.suse.com/security/cve/CVE-2019-18676/" source="CVE"/>
		<reference ref_id="CVE-2019-18677" ref_url="https://www.suse.com/security/cve/CVE-2019-18677/" source="CVE"/>
		<reference ref_id="CVE-2019-18678" ref_url="https://www.suse.com/security/cve/CVE-2019-18678/" source="CVE"/>
		<reference ref_id="CVE-2019-18679" ref_url="https://www.suse.com/security/cve/CVE-2019-18679/" source="CVE"/>
		<reference ref_id="CVE-2019-18860" ref_url="https://www.suse.com/security/cve/CVE-2019-18860/" source="CVE"/>
		<reference ref_id="CVE-2020-11945" ref_url="https://www.suse.com/security/cve/CVE-2020-11945/" source="CVE"/>
		<reference ref_id="CVE-2020-14059" ref_url="https://www.suse.com/security/cve/CVE-2020-14059/" source="CVE"/>
		<reference ref_id="CVE-2020-15049" ref_url="https://www.suse.com/security/cve/CVE-2020-15049/" source="CVE"/>
		<reference ref_id="CVE-2020-8449" ref_url="https://www.suse.com/security/cve/CVE-2020-8449/" source="CVE"/>
		<reference ref_id="CVE-2020-8450" ref_url="https://www.suse.com/security/cve/CVE-2020-8450/" source="CVE"/>
		<reference ref_id="CVE-2020-8517" ref_url="https://www.suse.com/security/cve/CVE-2020-8517/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<description>
This update for squid3 fixes the following issues:

- Fixed a Cache Poisoning and Request Smuggling
  attack (CVE-2020-15049, bsc#1173455)
- Fixed incorrect buffer handling that can
  result in cache poisoning, remote execution, and
  denial of service attacks when processing ESI responses
  (CVE-2019-12519, CVE-2019-12521, bsc#1169659)

- Fixed handling of hostname in
  cachemgr.cgi (CVE-2019-18860, bsc#1167373)
- Fixed a potential remote execution vulnerability
  when using HTTP Digest Authentication (CVE-2020-11945, bsc#1170313)
- Fixed a potential ACL bypass, cache-bypass
  and cross-site scripting attack when processing invalid HTTP
  Request messages (CVE-2019-12520, CVE-2019-12524, bsc#1170423)
- Fixed a potential denial of service when
  processing TLS certificates during HTTPS connections
  (CVE-2020-14059, bsc#1173304)

- Fixed a potential denial of service associated
  with incorrect buffer management of HTTP Basic Authentication
  credentials (bsc#1141329, CVE-2019-12529)
- Fixed an incorrect buffer management resulting
  in vulnerability to a denial of service during processing of
  HTTP Digest Authentication credentials (bsc#1141332, CVE-2019-12525)
- Fix XSS via user_name or auth parameter
  in cachemgr.cgi (bsc#1140738, CVE-2019-13345)
- Fixed a potential code execution vulnerability
  (CVE-2019-12526, bsc#1156326)
- Fixed HTTP Request Splitting in HTTP
  message processing and information disclosure in
  HTTP Digest Authentication
  (CVE-2019-18678, CVE-2019-18679, bsc#1156323, bsc#1156324)
- Fixed a security issue allowing a remote
  client ability to cause use a buffer overflow when squid is
  acting as reverse-proxy.
  (CVE-2020-8449, CVE-2020-8450, bsc#1162687)
- Fixed a security issue allowing for information
  disclosure in FTP gateway (CVE-2019-12528, bsc#1162689)
- Fixed a security issue in ext_lm_group_acl
  when processing NTLM Authentication credentials.
  (CVE-2020-8517, bsc#1162691)

- Fixed Cross-Site Request Forgery in
  HTTP Request processing (CVE-2019-18677, bsc#1156328)

- Disable urn parsing and parsing of
  unknown schemes (bsc#1156329, CVE-2019-12523, CVE-2019-18676)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-24"/>
	<updated date="2020-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140738">SUSE bug 1140738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141329">SUSE bug 1141329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141332">SUSE bug 1141332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156323">SUSE bug 1156323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156324">SUSE bug 1156324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156326">SUSE bug 1156326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156328">SUSE bug 1156328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156329">SUSE bug 1156329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162687">SUSE bug 1162687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162689">SUSE bug 1162689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162691">SUSE bug 1162691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167373">SUSE bug 1167373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169659">SUSE bug 1169659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170313">SUSE bug 1170313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170423">SUSE bug 1170423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173304">SUSE bug 1173304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173455">SUSE bug 1173455</bugzilla>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-12519/">CVE-2019-12519 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12519">CVE-2019-12519 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12520/">CVE-2019-12520 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12520">CVE-2019-12520 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12521/">CVE-2019-12521 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12521">CVE-2019-12521 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12523">CVE-2019-12523 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12524/">CVE-2019-12524 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12524">CVE-2019-12524 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12525/">CVE-2019-12525 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12525">CVE-2019-12525 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12526/">CVE-2019-12526 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12526">CVE-2019-12526 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12528/">CVE-2019-12528 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12528">CVE-2019-12528 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12529/">CVE-2019-12529 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12529">CVE-2019-12529 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13345/">CVE-2019-13345 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13345">CVE-2019-13345 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18676/">CVE-2019-18676 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18676">CVE-2019-18676 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18677/">CVE-2019-18677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18677">CVE-2019-18677 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18678/">CVE-2019-18678 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18678">CVE-2019-18678 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18679/">CVE-2019-18679 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18679">CVE-2019-18679 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18860/">CVE-2019-18860 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18860">CVE-2019-18860 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11945/">CVE-2020-11945 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11945">CVE-2020-11945 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14059/">CVE-2020-14059 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14059">CVE-2020-14059 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15049/">CVE-2020-15049 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15049">CVE-2020-15049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8449/">CVE-2020-8449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8449">CVE-2020-8449 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8450/">CVE-2020-8450 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8450">CVE-2020-8450 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8517/">CVE-2020-8517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8517">CVE-2020-8517 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586302" comment="squid3-3.1.23-8.16.37.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220424" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1175664" ref_url="https://bugzilla.suse.com/1175664" source="BUGZILLA"/>
		<reference ref_id="1175665" ref_url="https://bugzilla.suse.com/1175665" source="BUGZILLA"/>
		<reference ref_id="1175671" ref_url="https://bugzilla.suse.com/1175671" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810/" source="CVE"/>
		<reference ref_id="CVE-2020-15811" ref_url="https://www.suse.com/security/cve/CVE-2020-15811/" source="CVE"/>
		<reference ref_id="CVE-2020-24606" ref_url="https://www.suse.com/security/cve/CVE-2020-24606/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008129.html" source="SUSE-SU"/>
		<description>
This update for squid3 fixes the following issues:

- CVE-2020-15811: Fixed an HTTP request splitting vulnerability (bsc#1175665).
- CVE-2020-24606: Fixed a DoS vulnerability when processing Cache Digest Responses (bsc#1175671).
- CVE-2020-15810: Fixed an HTTP request smuggling vulnerability (bsc#1175664).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-30"/>
	<updated date="2020-12-30"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1175664">SUSE bug 1175664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175665">SUSE bug 1175665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175671">SUSE bug 1175671</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15810">CVE-2020-15810 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15811/">CVE-2020-15811 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15811">CVE-2020-15811 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24606/">CVE-2020-24606 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24606">CVE-2020-24606 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586303" comment="squid3-3.1.23-8.16.37.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220425" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1183436" ref_url="https://bugzilla.suse.com/1183436" source="BUGZILLA"/>
		<reference ref_id="1185921" ref_url="https://bugzilla.suse.com/1185921" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25097" ref_url="https://www.suse.com/security/cve/CVE-2020-25097/" source="CVE"/>
		<reference ref_id="CVE-2021-28651" ref_url="https://www.suse.com/security/cve/CVE-2021-28651/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010444.html" source="SUSE-SU"/>
		<description>
This update for squid3 fixes the following issues:

- CVE-2021-28651: Fixed a denial of service issue when processing URN
  resource identifiers (bsc#1185921).
- CVE-2020-25097: Fixed an HTTP request smuggling issue (bsc#1183436).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183436">SUSE bug 1183436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185921">SUSE bug 1185921</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25097/">CVE-2020-25097 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25097">CVE-2020-25097 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28651/">CVE-2021-28651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28651">CVE-2021-28651 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671880" comment="squid3-3.1.23-8.16.37.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220426" version="1" class="patch">
	<metadata>
		<title>Security update for squidGuard (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="985612" ref_url="https://bugzilla.suse.com/985612" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8936" ref_url="https://www.suse.com/security/cve/CVE-2015-8936/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002327.html" source="SUSE-SU"/>
		<description>
squidGuard was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-8936: Reflected cross site scripting vulnerability because of insufficient escaping (bsc#985612).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-12"/>
	<updated date="2016-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/985612">SUSE bug 985612</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8936/">CVE-2015-8936 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8936">CVE-2015-8936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586304" comment="squidGuard-1.4-13.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586305" comment="squidGuard-doc-1.4-13.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586304" comment="squidGuard-1.4-13.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586305" comment="squidGuard-doc-1.4-13.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220427" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="933591" ref_url="https://bugzilla.suse.com/933591" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4171" ref_url="https://www.suse.com/security/cve/CVE-2015-4171/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001641.html" source="SUSE-SU"/>
		<description>
strongswan was updated to fix one security issue.
	  
This security issue was fixed:
- CVE-2015-4171: A problem that could enable rogue servers to gain user credentials from a client in certain IKEv2 setups. (bsc#933591)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-14"/>
	<updated date="2015-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/933591">SUSE bug 933591</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4171/">CVE-2015-4171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4171">CVE-2015-4171 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586306" comment="strongswan-4.4.0-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586307" comment="strongswan-doc-4.4.0-6.29.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586306" comment="strongswan-4.4.0-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586307" comment="strongswan-doc-4.4.0-6.29.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220428" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="953817" ref_url="https://bugzilla.suse.com/953817" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8023" ref_url="https://www.suse.com/security/cve/CVE-2015-8023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001715.html" source="SUSE-SU"/>
		<description>
The strongswan package was updated to fix the following security issue:

- CVE-2015-8023: Fixed an authentication bypass vulnerability in the eap-mschapv2 plugin (bsc#953817).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-03"/>
	<updated date="2015-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/953817">SUSE bug 953817</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8023/">CVE-2015-8023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8023">CVE-2015-8023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581490" comment="strongswan-4.4.0-6.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581491" comment="strongswan-doc-4.4.0-6.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581490" comment="strongswan-4.4.0-6.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581491" comment="strongswan-doc-4.4.0-6.32.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220429" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1039514" ref_url="https://bugzilla.suse.com/1039514" source="BUGZILLA"/>
		<reference ref_id="1039515" ref_url="https://bugzilla.suse.com/1039515" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9022" ref_url="https://www.suse.com/security/cve/CVE-2017-9022/" source="CVE"/>
		<reference ref_id="CVE-2017-9023" ref_url="https://www.suse.com/security/cve/CVE-2017-9023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002933.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2017-9022: Insufficient Input Validation in gmp Plugin leads to Denial of service (bsc#1039514)
- CVE-2017-9023: Incorrect x509 ASN.1 parser error handling could lead to Denial of service  (bsc#1039515)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-01"/>
	<updated date="2017-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1039514">SUSE bug 1039514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039515">SUSE bug 1039515</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9022/">CVE-2017-9022 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9022">CVE-2017-9022 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9023/">CVE-2017-9023 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9023">CVE-2017-9023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586308" comment="strongswan-4.4.0-6.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586309" comment="strongswan-doc-4.4.0-6.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586308" comment="strongswan-4.4.0-6.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586309" comment="strongswan-doc-4.4.0-6.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220430" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1051222" ref_url="https://bugzilla.suse.com/1051222" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11185" ref_url="https://www.suse.com/security/cve/CVE-2017-11185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003167.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2017-11185: Specific RSA signatures passed to the gmp plugin for verification can
cause a null-pointer dereference and it may lead to a denial of service (bsc#1051222) 

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-29"/>
	<updated date="2017-08-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1051222">SUSE bug 1051222</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11185/">CVE-2017-11185 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11185">CVE-2017-11185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586310" comment="strongswan-4.4.0-6.36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586311" comment="strongswan-doc-4.4.0-6.36.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586310" comment="strongswan-4.4.0-6.36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586311" comment="strongswan-doc-4.4.0-6.36.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220431" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1191435" ref_url="https://bugzilla.suse.com/1191435" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41991" ref_url="https://www.suse.com/security/cve/CVE-2021-41991/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009612.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-19"/>
	<updated date="2021-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191435">SUSE bug 1191435</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41991/">CVE-2021-41991 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41991">CVE-2021-41991 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652842" comment="strongswan-4.4.0-6.36.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652843" comment="strongswan-doc-4.4.0-6.36.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220432" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1107874" ref_url="https://bugzilla.suse.com/1107874" source="BUGZILLA"/>
		<reference ref_id="1109845" ref_url="https://bugzilla.suse.com/1109845" source="BUGZILLA"/>
		<reference ref_id="1194471" ref_url="https://bugzilla.suse.com/1194471" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16151" ref_url="https://www.suse.com/security/cve/CVE-2018-16151/" source="CVE"/>
		<reference ref_id="CVE-2018-16152" ref_url="https://www.suse.com/security/cve/CVE-2018-16152/" source="CVE"/>
		<reference ref_id="CVE-2018-17540" ref_url="https://www.suse.com/security/cve/CVE-2018-17540/" source="CVE"/>
		<reference ref_id="CVE-2021-45079" ref_url="https://www.suse.com/security/cve/CVE-2021-45079/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010262.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:
	  
- CVE-2018-16151: Fixed flaws in gmp plugin that could lead to authorization bypass. (bsc#1107874)
- CVE-2018-16152: Fixed flaws in gmp plugin that could lead to authorization bypass. (bsc#1107874)
- CVE-2018-17540: Fixed insufficient input validation in gmp plugin. (bsc#1109845)
- CVE-2021-45079: Fixed authentication bypass in EAP authentication. (bsc#1194471)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109845">SUSE bug 1109845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194471">SUSE bug 1194471</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16151/">CVE-2018-16151 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16151">CVE-2018-16151 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16152/">CVE-2018-16152 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16152">CVE-2018-16152 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17540/">CVE-2018-17540 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17540">CVE-2018-17540 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45079/">CVE-2021-45079 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45079">CVE-2021-45079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664949" comment="strongswan-4.4.0-6.36.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664950" comment="strongswan-doc-4.4.0-6.36.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220433" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1007501" ref_url="https://bugzilla.suse.com/1007501" source="BUGZILLA"/>
		<reference ref_id="1007766" ref_url="https://bugzilla.suse.com/1007766" source="BUGZILLA"/>
		<reference ref_id="1008043" ref_url="https://bugzilla.suse.com/1008043" source="BUGZILLA"/>
		<reference ref_id="948973" ref_url="https://bugzilla.suse.com/948973" source="BUGZILLA"/>
		<reference ref_id="966755" ref_url="https://bugzilla.suse.com/966755" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7032" ref_url="https://www.suse.com/security/cve/CVE-2016-7032/" source="CVE"/>
		<reference ref_id="CVE-2016-7076" ref_url="https://www.suse.com/security/cve/CVE-2016-7076/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002413.html" source="SUSE-SU"/>
		<description>

This update for sudo fixes the following issues:

- Fix two security vulnerabilities that allowed users to bypass
  sudo's NOEXEC functionality:
  * noexec bypass via system() and popen() [CVE-2016-7032, bsc#1007766]
  * noexec bypass via wordexp() [CVE-2016-7076, bsc#1007501]

- The SSSD plugin would occasionally crash sudo with an 'internal error'.
  This issue has been fixed. [bsc#948973]

- The SSSD plugin would occasionally apply @netgroups rules from LDAP to all
  users rather than the @netgroup. This issue is now fixed. [bsc#966755]

- When the SSSD plugin was used and a local user ran sudo, an e-mail used to be
  sent to administrator because SSSD did not support sudo rules for local
  users. This message did not signify an error, however, it was only noise.
  [bsc#1008043]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-23"/>
	<updated date="2016-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007501">SUSE bug 1007501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007766">SUSE bug 1007766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008043">SUSE bug 1008043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948973">SUSE bug 948973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966755">SUSE bug 966755</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7032/">CVE-2016-7032 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7032">CVE-2016-7032 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7076/">CVE-2016-7076 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7076">CVE-2016-7076 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586312" comment="sudo-1.7.6p2-0.29.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586312" comment="sudo-1.7.6p2-0.29.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220434" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1153674" ref_url="https://bugzilla.suse.com/1153674" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006032.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

- CVE-2019-14287: Fixed an issue where a user with sudo privileges that allowed them to run commands with an arbitrary uid, could run commands as root, despite being forbidden to do so in sudoers (bsc#1153674).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-18"/>
	<updated date="2019-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153674">SUSE bug 1153674</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14287">CVE-2019-14287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586313" comment="sudo-1.7.6p2-0.30.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220435" version="1" class="patch">
	<metadata>
		<title>Security update for supportutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="980670" ref_url="https://bugzilla.suse.com/980670" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1602" ref_url="https://www.suse.com/security/cve/CVE-2016-1602/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002102.html" source="SUSE-SU"/>
		<description>
supportutils was updated to fix one security issue.

This security issue was fixed:
- CVE-2016-1602: Code injection and privilege escalation via unescaped filenames (bsc#980670).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-07"/>
	<updated date="2016-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/980670">SUSE bug 980670</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1602/">CVE-2016-1602 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1602">CVE-2016-1602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581495" comment="supportutils-1.20-121.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581495" comment="supportutils-1.20-121.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220436" version="1" class="patch">
	<metadata>
		<title>Security update for supportutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1117751" ref_url="https://bugzilla.suse.com/1117751" source="BUGZILLA"/>
		<reference ref_id="1118460" ref_url="https://bugzilla.suse.com/1118460" source="BUGZILLA"/>
		<reference ref_id="1118462" ref_url="https://bugzilla.suse.com/1118462" source="BUGZILLA"/>
		<reference ref_id="1118463" ref_url="https://bugzilla.suse.com/1118463" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19636" ref_url="https://www.suse.com/security/cve/CVE-2018-19636/" source="CVE"/>
		<reference ref_id="CVE-2018-19638" ref_url="https://www.suse.com/security/cve/CVE-2018-19638/" source="CVE"/>
		<reference ref_id="CVE-2018-19639" ref_url="https://www.suse.com/security/cve/CVE-2018-19639/" source="CVE"/>
		<reference ref_id="CVE-2018-19640" ref_url="https://www.suse.com/security/cve/CVE-2018-19640/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005187.html" source="SUSE-SU"/>
		<description>
This update for supportutils fixes the following issues:

Security vulnerabilities fixed:

- CVE-2018-19636: Local root exploit via inclusion of attacker controlled shell script (bsc#1117751)
- CVE-2018-19640: Users can kill arbitrary processes (bsc#1118463)
- CVE-2018-19638: User can overwrite arbitrary log files in support tar (bsc#1118460)
- CVE-2018-19639: Code execution if run with -v (bsc#1118462)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-12"/>
	<updated date="2019-03-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117751">SUSE bug 1117751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118460">SUSE bug 1118460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118462">SUSE bug 1118462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118463">SUSE bug 1118463</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19636/">CVE-2018-19636 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19636">CVE-2018-19636 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19638/">CVE-2018-19638 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19638">CVE-2018-19638 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19639/">CVE-2018-19639 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19639">CVE-2018-19639 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19640/">CVE-2018-19640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19640">CVE-2018-19640 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569231" comment="supportutils-1.20-122.9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569231" comment="supportutils-1.20-122.9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220437" version="1" class="patch">
	<metadata>
		<title>Security update for syslog-ng (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1169385" ref_url="https://bugzilla.suse.com/1169385" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8019" ref_url="https://www.suse.com/security/cve/CVE-2020-8019/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006818.html" source="SUSE-SU"/>
		<description>
This update for syslog-ng fixes the following issues:

- CVE-2020-8019: Fixed a local privilege escalation during package update (bsc#1169385).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-14"/>
	<updated date="2020-05-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169385">SUSE bug 1169385</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8019/">CVE-2020-8019 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8019">CVE-2020-8019 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586314" comment="syslog-ng-2.0.9-27.34.40.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220438" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1007188" ref_url="https://bugzilla.suse.com/1007188" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6321" ref_url="https://www.suse.com/security/cve/CVE-2016-6321/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002416.html" source="SUSE-SU"/>
		<description>

This update for tar fixes the following issues:

- Fix the POINTYFEATHER vulnerability - GNU tar archiver can be tricked
  into extracting files and directories in the given destination, regardless
  of the path name(s) specified on the command line [bsc#1007188]
  [CVE-2016-6321]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-24"/>
	<updated date="2016-11-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007188">SUSE bug 1007188</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6321/">CVE-2016-6321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6321">CVE-2016-6321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586315" comment="tar-1.26-1.2.10.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586315" comment="tar-1.26-1.2.10.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220439" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1120610" ref_url="https://bugzilla.suse.com/1120610" source="BUGZILLA"/>
		<reference ref_id="1130496" ref_url="https://bugzilla.suse.com/1130496" source="BUGZILLA"/>
		<reference ref_id="1152736" ref_url="https://bugzilla.suse.com/1152736" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20482" ref_url="https://www.suse.com/security/cve/CVE-2018-20482/" source="CVE"/>
		<reference ref_id="CVE-2019-9923" ref_url="https://www.suse.com/security/cve/CVE-2019-9923/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006107.html" source="SUSE-SU"/>
		<description>
This update for tar to version 1.27.1 fixes the following issues:

tar 1.27.1 brings following changes (jsc#ECO-339)

* Sparse files with large data
* No backticks in quoting
* --owner and --group names and numbers
* Support for POSIX ACLs, extended attributes and SELinux context.
* Passing command line arguments to external commands.
* New configure option --enable-gcc-warnings, intended for debugging.
* New warning control option --warning=[no-]record-size
* New command line option --keep-directory-symlink
* Fix unquoting of file names obtained via the -T option.
* Fix GNU long link header timestamp (backward compatibility).

Security issues fixed:

- CVE-2019-9923: Fixed a denial of service while parsing certain archives with malformed extended headers in pax_decode_header() (bsc#1130496).
- CVE-2018-20482: Fixed a denial of service when the '--sparse' option mishandles file shrinkage during read access (bsc#1120610).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-11"/>
	<updated date="2019-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120610">SUSE bug 1120610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130496">SUSE bug 1130496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152736">SUSE bug 1152736</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20482/">CVE-2018-20482 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20482">CVE-2018-20482 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9923/">CVE-2019-9923 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9923">CVE-2019-9923 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586316" comment="tar-1.27.1-14.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220440" version="1" class="patch">
	<metadata>
		<title>Recommended update for tboot (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1057555" ref_url="https://bugzilla.suse.com/1057555" source="BUGZILLA"/>
		<reference ref_id="889339" ref_url="https://bugzilla.suse.com/889339" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5118" ref_url="https://www.suse.com/security/cve/CVE-2014-5118/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003421.html" source="SUSE-SU"/>
		<description>
This update for tboot provides the following fix:

Security issue fixed:

- CVE-2014-5118: tboot: bypass of measured boot (bsc#889339)

Bug fixes:

- Fixed failed trusted boot on some systems like Intel Xeon 'Purley 8s' processors. The
  following error message showed: 'TBOOT: wait-for-sipi loop timed-out'. Booting continued
  but 'TXT measured launch' was wrongly reported as FALSE. (bsc#1057555)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-29"/>
	<updated date="2017-11-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1057555">SUSE bug 1057555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889339">SUSE bug 889339</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5118/">CVE-2014-5118 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-5118">CVE-2014-5118 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586317" comment="tboot-20120115_1.7.0-0.5.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586317" comment="tboot-20120115_1.7.0-0.5.5.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220441" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1020940" ref_url="https://bugzilla.suse.com/1020940" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7922" ref_url="https://www.suse.com/security/cve/CVE-2016-7922/" source="CVE"/>
		<reference ref_id="CVE-2016-7923" ref_url="https://www.suse.com/security/cve/CVE-2016-7923/" source="CVE"/>
		<reference ref_id="CVE-2016-7925" ref_url="https://www.suse.com/security/cve/CVE-2016-7925/" source="CVE"/>
		<reference ref_id="CVE-2016-7926" ref_url="https://www.suse.com/security/cve/CVE-2016-7926/" source="CVE"/>
		<reference ref_id="CVE-2016-7927" ref_url="https://www.suse.com/security/cve/CVE-2016-7927/" source="CVE"/>
		<reference ref_id="CVE-2016-7928" ref_url="https://www.suse.com/security/cve/CVE-2016-7928/" source="CVE"/>
		<reference ref_id="CVE-2016-7931" ref_url="https://www.suse.com/security/cve/CVE-2016-7931/" source="CVE"/>
		<reference ref_id="CVE-2016-7934" ref_url="https://www.suse.com/security/cve/CVE-2016-7934/" source="CVE"/>
		<reference ref_id="CVE-2016-7935" ref_url="https://www.suse.com/security/cve/CVE-2016-7935/" source="CVE"/>
		<reference ref_id="CVE-2016-7936" ref_url="https://www.suse.com/security/cve/CVE-2016-7936/" source="CVE"/>
		<reference ref_id="CVE-2016-7937" ref_url="https://www.suse.com/security/cve/CVE-2016-7937/" source="CVE"/>
		<reference ref_id="CVE-2016-7939" ref_url="https://www.suse.com/security/cve/CVE-2016-7939/" source="CVE"/>
		<reference ref_id="CVE-2016-7940" ref_url="https://www.suse.com/security/cve/CVE-2016-7940/" source="CVE"/>
		<reference ref_id="CVE-2016-7973" ref_url="https://www.suse.com/security/cve/CVE-2016-7973/" source="CVE"/>
		<reference ref_id="CVE-2016-7974" ref_url="https://www.suse.com/security/cve/CVE-2016-7974/" source="CVE"/>
		<reference ref_id="CVE-2016-7975" ref_url="https://www.suse.com/security/cve/CVE-2016-7975/" source="CVE"/>
		<reference ref_id="CVE-2016-7983" ref_url="https://www.suse.com/security/cve/CVE-2016-7983/" source="CVE"/>
		<reference ref_id="CVE-2016-7984" ref_url="https://www.suse.com/security/cve/CVE-2016-7984/" source="CVE"/>
		<reference ref_id="CVE-2016-7992" ref_url="https://www.suse.com/security/cve/CVE-2016-7992/" source="CVE"/>
		<reference ref_id="CVE-2016-7993" ref_url="https://www.suse.com/security/cve/CVE-2016-7993/" source="CVE"/>
		<reference ref_id="CVE-2016-8574" ref_url="https://www.suse.com/security/cve/CVE-2016-8574/" source="CVE"/>
		<reference ref_id="CVE-2017-5202" ref_url="https://www.suse.com/security/cve/CVE-2017-5202/" source="CVE"/>
		<reference ref_id="CVE-2017-5203" ref_url="https://www.suse.com/security/cve/CVE-2017-5203/" source="CVE"/>
		<reference ref_id="CVE-2017-5204" ref_url="https://www.suse.com/security/cve/CVE-2017-5204/" source="CVE"/>
		<reference ref_id="CVE-2017-5483" ref_url="https://www.suse.com/security/cve/CVE-2017-5483/" source="CVE"/>
		<reference ref_id="CVE-2017-5484" ref_url="https://www.suse.com/security/cve/CVE-2017-5484/" source="CVE"/>
		<reference ref_id="CVE-2017-5485" ref_url="https://www.suse.com/security/cve/CVE-2017-5485/" source="CVE"/>
		<reference ref_id="CVE-2017-5486" ref_url="https://www.suse.com/security/cve/CVE-2017-5486/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<description>

This update for tcpdump fixes the following issues:

Security issues fixed (bsc#1020940):
- CVE-2016-7922: Corrected buffer overflow in AH parser print-ah.c:ah_print().
- CVE-2016-7923: Corrected buffer overflow in ARP parser print-arp.c:arp_print().
- CVE-2016-7925: Corrected buffer overflow in compressed SLIP parser print-sl.c:sl_if_print().
- CVE-2016-7926: Corrected buffer overflow in the Ethernet parser print-ether.c:ethertype_print().
- CVE-2016-7927: Corrected buffer overflow in the IEEE 802.11 parser print-802_11.c:ieee802_11_radio_print().
- CVE-2016-7928: Corrected buffer overflow in the IPComp parser print-ipcomp.c:ipcomp_print().
- CVE-2016-7931: Corrected buffer overflow in the MPLS parser print-mpls.c:mpls_print().
- CVE-2016-7936: Corrected buffer overflow in the UDP parser print-udp.c:udp_print().
- CVE-2016-7934,CVE-2016-7935,CVE-2016-7937: Corrected segmentation faults in function udp_print(). 
- CVE-2016-7939: Corrected buffer overflows in GRE parser print-gre.c:(multiple functions).
- CVE-2016-7940: Corrected buffer overflows in STP parser print-stp.c:(multiple functions).
- CVE-2016-7973: Corrected buffer overflow in AppleTalk parser print-atalk.c.
- CVE-2016-7974: Corrected buffer overflow in IP parser print-ip.c:(multiple functions).
- CVE-2016-7975: Corrected buffer overflow in TCP parser print-tcp.c:tcp_print().
- CVE-2016-7983,CVE-2016-7984: Corrected buffer overflow in TFTP parser print-tftp.c:tftp_print().
- CVE-2016-7992: Corrected buffer overflow in Classical IP over ATM parser print-cip.c.
- CVE-2016-7993: Corrected buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, etc.).
- CVE-2016-8574: Corrected buffer overflow in FRF.15 parser print-fr.c:frf15_print().
- CVE-2017-5202: Corrected buffer overflow in ISO CLNS parser print-isoclns.c:clnp_print().
- CVE-2017-5203: Corrected buffer overflow in BOOTP parser print-bootp.c:bootp_print().
- CVE-2017-5204: Corrected buffer overflow in IPv6 parser print-ip6.c:ip6_print().
- CVE-2017-5483: Corrected buffer overflow in SNMP parser print-snmp.c:asn1_parse().
- CVE-2017-5484: Corrected buffer overflow in ATM parser print-atm.c:sig_print().
- CVE-2017-5485: Corrected buffer overflow in ISO CLNS parser addrtoname.c:lookup_nsap().
- CVE-2017-5486: Corrected buffer overflow in ISO CLNS parser print-isoclns.c:clnp_print().
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-10"/>
	<updated date="2017-03-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7922/">CVE-2016-7922 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7922">CVE-2016-7922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7923/">CVE-2016-7923 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7923">CVE-2016-7923 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7925/">CVE-2016-7925 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7925">CVE-2016-7925 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7926/">CVE-2016-7926 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7926">CVE-2016-7926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7927/">CVE-2016-7927 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7927">CVE-2016-7927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7928/">CVE-2016-7928 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7928">CVE-2016-7928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7931/">CVE-2016-7931 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7931">CVE-2016-7931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7934/">CVE-2016-7934 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7934">CVE-2016-7934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7935/">CVE-2016-7935 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7935">CVE-2016-7935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7936/">CVE-2016-7936 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7936">CVE-2016-7936 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7937/">CVE-2016-7937 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7937">CVE-2016-7937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7939/">CVE-2016-7939 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7939">CVE-2016-7939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7940/">CVE-2016-7940 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7940">CVE-2016-7940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7973/">CVE-2016-7973 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7973">CVE-2016-7973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7974/">CVE-2016-7974 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7974">CVE-2016-7974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7975/">CVE-2016-7975 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7975">CVE-2016-7975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7983/">CVE-2016-7983 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7983">CVE-2016-7983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7984/">CVE-2016-7984 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7984">CVE-2016-7984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7992/">CVE-2016-7992 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7992">CVE-2016-7992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7993/">CVE-2016-7993 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7993">CVE-2016-7993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8574/">CVE-2016-8574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8574">CVE-2016-8574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5202/">CVE-2017-5202 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5202">CVE-2017-5202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5203/">CVE-2017-5203 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5203">CVE-2017-5203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5204/">CVE-2017-5204 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5204">CVE-2017-5204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5483/">CVE-2017-5483 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5483">CVE-2017-5483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5484/">CVE-2017-5484 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5484">CVE-2017-5484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5485/">CVE-2017-5485 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5485">CVE-2017-5485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5486/">CVE-2017-5486 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5486">CVE-2017-5486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586318" comment="tcpdump-3.9.8-1.29.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586318" comment="tcpdump-3.9.8-1.29.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220442" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1047873" ref_url="https://bugzilla.suse.com/1047873" source="BUGZILLA"/>
		<reference ref_id="1057247" ref_url="https://bugzilla.suse.com/1057247" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11108" ref_url="https://www.suse.com/security/cve/CVE-2017-11108/" source="CVE"/>
		<reference ref_id="CVE-2017-11541" ref_url="https://www.suse.com/security/cve/CVE-2017-11541/" source="CVE"/>
		<reference ref_id="CVE-2017-11542" ref_url="https://www.suse.com/security/cve/CVE-2017-11542/" source="CVE"/>
		<reference ref_id="CVE-2017-11543" ref_url="https://www.suse.com/security/cve/CVE-2017-11543/" source="CVE"/>
		<reference ref_id="CVE-2017-13011" ref_url="https://www.suse.com/security/cve/CVE-2017-13011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003283.html" source="SUSE-SU"/>
		<description>
This update for tcpdump fixes the following issues:

Security issues fixed:

- CVE-2017-11108: Crafted input allowed remote DoS (bsc#1047873)
- CVE-2017-11541: Prevent a heap-based buffer over-read in the lldp_print function in print-lldp.c, related to util-print.c (bsc#1057247).
- CVE-2017-11542: Prevent a heap-based buffer over-read in the pimv1_print function in print-pim.c (bsc#1057247).
- CVE-2017-11543: Prevent a buffer overflow in the sliplink_print function in print-sl.c (bsc#1057247).
- CVE-2017-13011: Several protocol parsers in tcpdump could have caused a buffer overflow in util-print.c:bittok2str_internal() (bsc#1057247).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-10"/>
	<updated date="2017-10-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047873">SUSE bug 1047873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11108/">CVE-2017-11108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11108">CVE-2017-11108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11541/">CVE-2017-11541 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11541">CVE-2017-11541 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11542/">CVE-2017-11542 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11542">CVE-2017-11542 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11543/">CVE-2017-11543 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11543">CVE-2017-11543 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13011/">CVE-2017-13011 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13011">CVE-2017-13011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586319" comment="tcpdump-3.9.8-1.30.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586319" comment="tcpdump-3.9.8-1.30.5.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220443" version="1" class="patch">
	<metadata>
		<title>Recommended update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1094241" ref_url="https://bugzilla.suse.com/1094241" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7975" ref_url="https://www.suse.com/security/cve/CVE-2016-7975/" source="CVE"/>
		<reference ref_id="SUSE-RU-2018:3087-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-October/009539.html" source="SUSE-SU"/>
		<description>
This update for tcpdump provides the following fix:

- The original fix for CVE-2016-7975 was using a variable before declaring it. Fix this
  by moving the declaration before any usage. (bsc#1094241, CVE-2016-7975)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-09"/>
	<updated date="2018-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094241">SUSE bug 1094241</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7975/">CVE-2016-7975 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7975">CVE-2016-7975 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594222" comment="tcpdump-3.9.8-1.30.8.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594222" comment="tcpdump-3.9.8-1.30.8.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220444" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1057247" ref_url="https://bugzilla.suse.com/1057247" source="BUGZILLA"/>
		<reference ref_id="1153098" ref_url="https://bugzilla.suse.com/1153098" source="BUGZILLA"/>
		<reference ref_id="1153332" ref_url="https://bugzilla.suse.com/1153332" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12893" ref_url="https://www.suse.com/security/cve/CVE-2017-12893/" source="CVE"/>
		<reference ref_id="CVE-2017-12894" ref_url="https://www.suse.com/security/cve/CVE-2017-12894/" source="CVE"/>
		<reference ref_id="CVE-2017-12896" ref_url="https://www.suse.com/security/cve/CVE-2017-12896/" source="CVE"/>
		<reference ref_id="CVE-2017-12897" ref_url="https://www.suse.com/security/cve/CVE-2017-12897/" source="CVE"/>
		<reference ref_id="CVE-2017-12898" ref_url="https://www.suse.com/security/cve/CVE-2017-12898/" source="CVE"/>
		<reference ref_id="CVE-2017-12899" ref_url="https://www.suse.com/security/cve/CVE-2017-12899/" source="CVE"/>
		<reference ref_id="CVE-2017-12900" ref_url="https://www.suse.com/security/cve/CVE-2017-12900/" source="CVE"/>
		<reference ref_id="CVE-2017-12901" ref_url="https://www.suse.com/security/cve/CVE-2017-12901/" source="CVE"/>
		<reference ref_id="CVE-2017-12902" ref_url="https://www.suse.com/security/cve/CVE-2017-12902/" source="CVE"/>
		<reference ref_id="CVE-2017-12985" ref_url="https://www.suse.com/security/cve/CVE-2017-12985/" source="CVE"/>
		<reference ref_id="CVE-2017-12986" ref_url="https://www.suse.com/security/cve/CVE-2017-12986/" source="CVE"/>
		<reference ref_id="CVE-2017-12987" ref_url="https://www.suse.com/security/cve/CVE-2017-12987/" source="CVE"/>
		<reference ref_id="CVE-2017-12988" ref_url="https://www.suse.com/security/cve/CVE-2017-12988/" source="CVE"/>
		<reference ref_id="CVE-2017-12991" ref_url="https://www.suse.com/security/cve/CVE-2017-12991/" source="CVE"/>
		<reference ref_id="CVE-2017-12992" ref_url="https://www.suse.com/security/cve/CVE-2017-12992/" source="CVE"/>
		<reference ref_id="CVE-2017-12993" ref_url="https://www.suse.com/security/cve/CVE-2017-12993/" source="CVE"/>
		<reference ref_id="CVE-2017-12995" ref_url="https://www.suse.com/security/cve/CVE-2017-12995/" source="CVE"/>
		<reference ref_id="CVE-2017-12996" ref_url="https://www.suse.com/security/cve/CVE-2017-12996/" source="CVE"/>
		<reference ref_id="CVE-2017-12998" ref_url="https://www.suse.com/security/cve/CVE-2017-12998/" source="CVE"/>
		<reference ref_id="CVE-2017-12999" ref_url="https://www.suse.com/security/cve/CVE-2017-12999/" source="CVE"/>
		<reference ref_id="CVE-2017-13001" ref_url="https://www.suse.com/security/cve/CVE-2017-13001/" source="CVE"/>
		<reference ref_id="CVE-2017-13002" ref_url="https://www.suse.com/security/cve/CVE-2017-13002/" source="CVE"/>
		<reference ref_id="CVE-2017-13003" ref_url="https://www.suse.com/security/cve/CVE-2017-13003/" source="CVE"/>
		<reference ref_id="CVE-2017-13004" ref_url="https://www.suse.com/security/cve/CVE-2017-13004/" source="CVE"/>
		<reference ref_id="CVE-2017-13005" ref_url="https://www.suse.com/security/cve/CVE-2017-13005/" source="CVE"/>
		<reference ref_id="CVE-2017-13006" ref_url="https://www.suse.com/security/cve/CVE-2017-13006/" source="CVE"/>
		<reference ref_id="CVE-2017-13008" ref_url="https://www.suse.com/security/cve/CVE-2017-13008/" source="CVE"/>
		<reference ref_id="CVE-2017-13009" ref_url="https://www.suse.com/security/cve/CVE-2017-13009/" source="CVE"/>
		<reference ref_id="CVE-2017-13010" ref_url="https://www.suse.com/security/cve/CVE-2017-13010/" source="CVE"/>
		<reference ref_id="CVE-2017-13012" ref_url="https://www.suse.com/security/cve/CVE-2017-13012/" source="CVE"/>
		<reference ref_id="CVE-2017-13013" ref_url="https://www.suse.com/security/cve/CVE-2017-13013/" source="CVE"/>
		<reference ref_id="CVE-2017-13014" ref_url="https://www.suse.com/security/cve/CVE-2017-13014/" source="CVE"/>
		<reference ref_id="CVE-2017-13016" ref_url="https://www.suse.com/security/cve/CVE-2017-13016/" source="CVE"/>
		<reference ref_id="CVE-2017-13017" ref_url="https://www.suse.com/security/cve/CVE-2017-13017/" source="CVE"/>
		<reference ref_id="CVE-2017-13018" ref_url="https://www.suse.com/security/cve/CVE-2017-13018/" source="CVE"/>
		<reference ref_id="CVE-2017-13019" ref_url="https://www.suse.com/security/cve/CVE-2017-13019/" source="CVE"/>
		<reference ref_id="CVE-2017-13021" ref_url="https://www.suse.com/security/cve/CVE-2017-13021/" source="CVE"/>
		<reference ref_id="CVE-2017-13022" ref_url="https://www.suse.com/security/cve/CVE-2017-13022/" source="CVE"/>
		<reference ref_id="CVE-2017-13023" ref_url="https://www.suse.com/security/cve/CVE-2017-13023/" source="CVE"/>
		<reference ref_id="CVE-2017-13024" ref_url="https://www.suse.com/security/cve/CVE-2017-13024/" source="CVE"/>
		<reference ref_id="CVE-2017-13025" ref_url="https://www.suse.com/security/cve/CVE-2017-13025/" source="CVE"/>
		<reference ref_id="CVE-2017-13027" ref_url="https://www.suse.com/security/cve/CVE-2017-13027/" source="CVE"/>
		<reference ref_id="CVE-2017-13028" ref_url="https://www.suse.com/security/cve/CVE-2017-13028/" source="CVE"/>
		<reference ref_id="CVE-2017-13029" ref_url="https://www.suse.com/security/cve/CVE-2017-13029/" source="CVE"/>
		<reference ref_id="CVE-2017-13030" ref_url="https://www.suse.com/security/cve/CVE-2017-13030/" source="CVE"/>
		<reference ref_id="CVE-2017-13031" ref_url="https://www.suse.com/security/cve/CVE-2017-13031/" source="CVE"/>
		<reference ref_id="CVE-2017-13032" ref_url="https://www.suse.com/security/cve/CVE-2017-13032/" source="CVE"/>
		<reference ref_id="CVE-2017-13034" ref_url="https://www.suse.com/security/cve/CVE-2017-13034/" source="CVE"/>
		<reference ref_id="CVE-2017-13035" ref_url="https://www.suse.com/security/cve/CVE-2017-13035/" source="CVE"/>
		<reference ref_id="CVE-2017-13036" ref_url="https://www.suse.com/security/cve/CVE-2017-13036/" source="CVE"/>
		<reference ref_id="CVE-2017-13037" ref_url="https://www.suse.com/security/cve/CVE-2017-13037/" source="CVE"/>
		<reference ref_id="CVE-2017-13038" ref_url="https://www.suse.com/security/cve/CVE-2017-13038/" source="CVE"/>
		<reference ref_id="CVE-2017-13041" ref_url="https://www.suse.com/security/cve/CVE-2017-13041/" source="CVE"/>
		<reference ref_id="CVE-2017-13047" ref_url="https://www.suse.com/security/cve/CVE-2017-13047/" source="CVE"/>
		<reference ref_id="CVE-2017-13048" ref_url="https://www.suse.com/security/cve/CVE-2017-13048/" source="CVE"/>
		<reference ref_id="CVE-2017-13049" ref_url="https://www.suse.com/security/cve/CVE-2017-13049/" source="CVE"/>
		<reference ref_id="CVE-2017-13051" ref_url="https://www.suse.com/security/cve/CVE-2017-13051/" source="CVE"/>
		<reference ref_id="CVE-2017-13053" ref_url="https://www.suse.com/security/cve/CVE-2017-13053/" source="CVE"/>
		<reference ref_id="CVE-2017-13055" ref_url="https://www.suse.com/security/cve/CVE-2017-13055/" source="CVE"/>
		<reference ref_id="CVE-2017-13687" ref_url="https://www.suse.com/security/cve/CVE-2017-13687/" source="CVE"/>
		<reference ref_id="CVE-2017-13688" ref_url="https://www.suse.com/security/cve/CVE-2017-13688/" source="CVE"/>
		<reference ref_id="CVE-2017-13689" ref_url="https://www.suse.com/security/cve/CVE-2017-13689/" source="CVE"/>
		<reference ref_id="CVE-2017-13725" ref_url="https://www.suse.com/security/cve/CVE-2017-13725/" source="CVE"/>
		<reference ref_id="CVE-2018-10103" ref_url="https://www.suse.com/security/cve/CVE-2018-10103/" source="CVE"/>
		<reference ref_id="CVE-2018-10105" ref_url="https://www.suse.com/security/cve/CVE-2018-10105/" source="CVE"/>
		<reference ref_id="CVE-2018-14461" ref_url="https://www.suse.com/security/cve/CVE-2018-14461/" source="CVE"/>
		<reference ref_id="CVE-2018-14462" ref_url="https://www.suse.com/security/cve/CVE-2018-14462/" source="CVE"/>
		<reference ref_id="CVE-2018-14463" ref_url="https://www.suse.com/security/cve/CVE-2018-14463/" source="CVE"/>
		<reference ref_id="CVE-2018-14464" ref_url="https://www.suse.com/security/cve/CVE-2018-14464/" source="CVE"/>
		<reference ref_id="CVE-2018-14465" ref_url="https://www.suse.com/security/cve/CVE-2018-14465/" source="CVE"/>
		<reference ref_id="CVE-2018-14466" ref_url="https://www.suse.com/security/cve/CVE-2018-14466/" source="CVE"/>
		<reference ref_id="CVE-2018-14467" ref_url="https://www.suse.com/security/cve/CVE-2018-14467/" source="CVE"/>
		<reference ref_id="CVE-2018-14468" ref_url="https://www.suse.com/security/cve/CVE-2018-14468/" source="CVE"/>
		<reference ref_id="CVE-2018-14469" ref_url="https://www.suse.com/security/cve/CVE-2018-14469/" source="CVE"/>
		<reference ref_id="CVE-2018-14881" ref_url="https://www.suse.com/security/cve/CVE-2018-14881/" source="CVE"/>
		<reference ref_id="CVE-2018-14882" ref_url="https://www.suse.com/security/cve/CVE-2018-14882/" source="CVE"/>
		<reference ref_id="CVE-2018-16229" ref_url="https://www.suse.com/security/cve/CVE-2018-16229/" source="CVE"/>
		<reference ref_id="CVE-2018-16230" ref_url="https://www.suse.com/security/cve/CVE-2018-16230/" source="CVE"/>
		<reference ref_id="CVE-2018-16300" ref_url="https://www.suse.com/security/cve/CVE-2018-16300/" source="CVE"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="CVE-2018-16451" ref_url="https://www.suse.com/security/cve/CVE-2018-16451/" source="CVE"/>
		<reference ref_id="CVE-2018-16452" ref_url="https://www.suse.com/security/cve/CVE-2018-16452/" source="CVE"/>
		<reference ref_id="CVE-2019-15166" ref_url="https://www.suse.com/security/cve/CVE-2019-15166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<description>
This update for tcpdump fixes the following issues:

Security issues fixed:

- CVE-2017-12995: Fixed an infinite loop in the DNS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12893: Fixed a buffer over-read in the SMB/CIFS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12894: Fixed a buffer over-read in several protocol parsers that allowed remote DoS (bsc#1057247).
- CVE-2017-12896: Fixed a buffer over-read in the ISAKMP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12897: Fixed a buffer over-read in the ISO CLNS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12898: Fixed a buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12899: Fixed a buffer over-read in the DECnet parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12900: Fixed a buffer over-read in the in several protocol parsers that allowed remote DoS (bsc#1057247).
- CVE-2017-12901: Fixed a buffer over-read in the EIGRP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12902: Fixed a buffer over-read in the Zephyr parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12985: Fixed a buffer over-read in the IPv6 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12986: Fixed a buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12987: Fixed a buffer over-read in the 802.11 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12988: Fixed a buffer over-read in the telnet parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12991: Fixed a buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12992: Fixed a buffer over-read in the RIPng parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12993: Fixed a buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12996: Fixed a buffer over-read in the PIMv2 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12998: Fixed a buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12999: Fixed a buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13001: Fixed a buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13002: Fixed a buffer over-read in the AODV parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13003: Fixed a buffer over-read in the LMP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13004: Fixed a buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13005: Fixed a buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13006: Fixed a buffer over-read in the L2TP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13008: Fixed a buffer over-read in the IEEE 802.11 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13009: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13010: Fixed a buffer over-read in the BEEP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13012: Fixed a buffer over-read in the ICMP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13013: Fixed a buffer over-read in the ARP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13014: Fixed a buffer over-read in the White Board protocol parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13016: Fixed a buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13017: Fixed a buffer over-read in the DHCPv6 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13018: Fixed a buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13019: Fixed a buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13021: Fixed a buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13022: Fixed a buffer over-read in the IP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13023: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13024: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13025: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13027: Fixed a buffer over-read in the LLDP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13028: Fixed a buffer over-read in the BOOTP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13029: Fixed a buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13030: Fixed a buffer over-read in the PIM parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13031: Fixed a buffer over-read in the IPv6 fragmentation header parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13032: Fixed a buffer over-read in the RADIUS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13034: Fixed a buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13035: Fixed a buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13036: Fixed a buffer over-read in the OSPFv3 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13037: Fixed a buffer over-read in the IP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13038: Fixed a buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13041: Fixed a buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13047: Fixed a buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13048: Fixed a buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13049: Fixed a buffer over-read in the Rx protocol parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13051: Fixed a buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13053: Fixed a buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13055: Fixed a buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13687: Fixed a buffer over-read in the Cisco HDLC parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13688: Fixed a buffer over-read in the OLSR parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13689: Fixed a buffer over-read in the IKEv1 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13725: Fixed a buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247).
- CVE-2018-10103: Fixed a mishandling of the printing of SMB data (bsc#1153098).
- CVE-2018-10105: Fixed a mishandling of the printing of SMB data (bsc#1153098).
- CVE-2018-14461: Fixed a buffer over-read in print-ldp.c:ldp_tlv_print (bsc#1153098).
- CVE-2018-14462: Fixed a buffer over-read in print-icmp.c:icmp_print (bsc#1153098).
- CVE-2018-14463: Fixed a buffer over-read in print-vrrp.c:vrrp_print (bsc#1153098).
- CVE-2018-14464: Fixed a buffer over-read in print-lmp.c:lmp_print_data_link_subobjs (bsc#1153098).
- CVE-2018-14465: Fixed a buffer over-read in print-rsvp.c:rsvp_obj_print (bsc#1153098).
- CVE-2018-14466: Fixed a buffer over-read in print-rx.c:rx_cache_find (bsc#1153098).
- CVE-2018-14467: Fixed a buffer over-read in print-bgp.c:bgp_capabilities_print (bsc#1153098).
- CVE-2018-14468: Fixed a buffer over-read in print-fr.c:mfr_print (bsc#1153098).
- CVE-2018-14469: Fixed a buffer over-read in print-isakmp.c:ikev1_n_print (bsc#1153098).
- CVE-2018-14881: Fixed a buffer over-read in the BGP parser (bsc#1153098).
- CVE-2018-14882: Fixed a buffer over-read in the ICMPv6 parser (bsc#1153098).
- CVE-2018-16229: Fixed a buffer over-read in the DCCP parser (bsc#1153098).
- CVE-2018-16230: Fixed a buffer over-read in the BGP parser in print-bgp.c:bgp_attr_print (bsc#1153098).
- CVE-2018-16300: Fixed an unlimited recursion in the BGP parser that allowed denial-of-service by stack consumption (bsc#1153098).
- CVE-2018-16301: Fixed a buffer overflow (bsc#1153332 bsc#1153098).
- CVE-2018-16451: Fixed several buffer over-reads in print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN (bsc#1153098).
- CVE-2018-16452: Fixed a stack exhaustion in smbutil.c:smb_fdata (bsc#1153098).
- CVE-2019-15166: Fixed a bounds check in lmp_print_data_link_subobjs (bsc#1153098).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153332">SUSE bug 1153332</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12893/">CVE-2017-12893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12893">CVE-2017-12893 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12894/">CVE-2017-12894 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12894">CVE-2017-12894 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12896/">CVE-2017-12896 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12896">CVE-2017-12896 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12897/">CVE-2017-12897 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12897">CVE-2017-12897 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12898/">CVE-2017-12898 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12898">CVE-2017-12898 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12899/">CVE-2017-12899 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12899">CVE-2017-12899 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12900/">CVE-2017-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12900">CVE-2017-12900 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12901/">CVE-2017-12901 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12901">CVE-2017-12901 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12902/">CVE-2017-12902 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12902">CVE-2017-12902 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12985/">CVE-2017-12985 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12985">CVE-2017-12985 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12986/">CVE-2017-12986 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12986">CVE-2017-12986 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12987/">CVE-2017-12987 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12987">CVE-2017-12987 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12988/">CVE-2017-12988 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12988">CVE-2017-12988 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12991/">CVE-2017-12991 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12991">CVE-2017-12991 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12992/">CVE-2017-12992 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12992">CVE-2017-12992 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12993/">CVE-2017-12993 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12993">CVE-2017-12993 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12995/">CVE-2017-12995 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12995">CVE-2017-12995 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12996/">CVE-2017-12996 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12996">CVE-2017-12996 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12998/">CVE-2017-12998 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12998">CVE-2017-12998 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12999/">CVE-2017-12999 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12999">CVE-2017-12999 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13001/">CVE-2017-13001 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13001">CVE-2017-13001 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13002/">CVE-2017-13002 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13002">CVE-2017-13002 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13003/">CVE-2017-13003 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13003">CVE-2017-13003 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13004/">CVE-2017-13004 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13004">CVE-2017-13004 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13005/">CVE-2017-13005 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13005">CVE-2017-13005 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13006/">CVE-2017-13006 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13006">CVE-2017-13006 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13008/">CVE-2017-13008 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13008">CVE-2017-13008 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13009/">CVE-2017-13009 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13009">CVE-2017-13009 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13010/">CVE-2017-13010 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13010">CVE-2017-13010 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13012/">CVE-2017-13012 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13012">CVE-2017-13012 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13013/">CVE-2017-13013 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13013">CVE-2017-13013 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13014/">CVE-2017-13014 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13014">CVE-2017-13014 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13016/">CVE-2017-13016 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13016">CVE-2017-13016 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13017/">CVE-2017-13017 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13017">CVE-2017-13017 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13018/">CVE-2017-13018 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13018">CVE-2017-13018 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13019/">CVE-2017-13019 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13019">CVE-2017-13019 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13021/">CVE-2017-13021 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13021">CVE-2017-13021 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13022/">CVE-2017-13022 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13022">CVE-2017-13022 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13023/">CVE-2017-13023 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13023">CVE-2017-13023 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13024/">CVE-2017-13024 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13024">CVE-2017-13024 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13025/">CVE-2017-13025 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13025">CVE-2017-13025 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13027/">CVE-2017-13027 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13027">CVE-2017-13027 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13028/">CVE-2017-13028 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13028">CVE-2017-13028 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13029/">CVE-2017-13029 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13029">CVE-2017-13029 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13030/">CVE-2017-13030 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13030">CVE-2017-13030 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13031/">CVE-2017-13031 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13031">CVE-2017-13031 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13032/">CVE-2017-13032 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13032">CVE-2017-13032 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13034/">CVE-2017-13034 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13034">CVE-2017-13034 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13035/">CVE-2017-13035 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13035">CVE-2017-13035 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13036/">CVE-2017-13036 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13036">CVE-2017-13036 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13037/">CVE-2017-13037 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13037">CVE-2017-13037 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13038/">CVE-2017-13038 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13038">CVE-2017-13038 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13041/">CVE-2017-13041 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13041">CVE-2017-13041 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13047/">CVE-2017-13047 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13047">CVE-2017-13047 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13048/">CVE-2017-13048 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13048">CVE-2017-13048 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13049/">CVE-2017-13049 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13049">CVE-2017-13049 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13051/">CVE-2017-13051 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13051">CVE-2017-13051 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13053/">CVE-2017-13053 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13053">CVE-2017-13053 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13055/">CVE-2017-13055 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13055">CVE-2017-13055 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13687/">CVE-2017-13687 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13687">CVE-2017-13687 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13688/">CVE-2017-13688 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13688">CVE-2017-13688 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13689/">CVE-2017-13689 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13689">CVE-2017-13689 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13725/">CVE-2017-13725 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13725">CVE-2017-13725 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10103/">CVE-2018-10103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10103">CVE-2018-10103 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10105/">CVE-2018-10105 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10105">CVE-2018-10105 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14461/">CVE-2018-14461 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14461">CVE-2018-14461 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14462/">CVE-2018-14462 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14462">CVE-2018-14462 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14463/">CVE-2018-14463 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14463">CVE-2018-14463 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14464/">CVE-2018-14464 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14464">CVE-2018-14464 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14465/">CVE-2018-14465 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14465">CVE-2018-14465 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14466/">CVE-2018-14466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14466">CVE-2018-14466 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14467/">CVE-2018-14467 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14467">CVE-2018-14467 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14468/">CVE-2018-14468 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14468">CVE-2018-14468 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14469/">CVE-2018-14469 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14469">CVE-2018-14469 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14881/">CVE-2018-14881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14881">CVE-2018-14881 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14882/">CVE-2018-14882 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14882">CVE-2018-14882 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16229/">CVE-2018-16229 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16229">CVE-2018-16229 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16230/">CVE-2018-16230 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16230">CVE-2018-16230 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16300/">CVE-2018-16300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16300">CVE-2018-16300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16301">CVE-2018-16301 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16451/">CVE-2018-16451 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16451">CVE-2018-16451 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16452/">CVE-2018-16452 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16452">CVE-2018-16452 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15166/">CVE-2019-15166 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15166">CVE-2019-15166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586320" comment="tcpdump-3.9.8-1.30.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220445" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1195825" ref_url="https://bugzilla.suse.com/1195825" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010249.html" source="SUSE-SU"/>
		<description>
This update for tcpdump fixes the following issues:

- CVE-2018-16301: Fixed segfault when handling large files (bsc#1195825).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195825">SUSE bug 1195825</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16301">CVE-2018-16301 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668245" comment="tcpdump-3.9.8-1.30.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220446" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="914890" ref_url="https://bugzilla.suse.com/914890" source="BUGZILLA"/>
		<reference ref_id="916927" ref_url="https://bugzilla.suse.com/916927" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127/" source="CVE"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129/" source="CVE"/>
		<reference ref_id="CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130/" source="CVE"/>
		<reference ref_id="CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001546.html" source="SUSE-SU"/>
		<description>
tiff was updated to fix six security issues found by fuzzing initiatives.

These security issues were fixed:
- CVE-2014-8127: Out-of-bounds write (bnc#914890).
- CVE-2014-8128: Out-of-bounds write (bnc#914890).
- CVE-2014-8129: Out-of-bounds write (bnc#914890).
- CVE-2014-8130: Out-of-bounds write (bnc#914890).
- CVE-2014-9655: Access of uninitialized memory (bnc#916927).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-12"/>
	<updated date="2015-08-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916927">SUSE bug 916927</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8127">CVE-2014-8127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8128">CVE-2014-8128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8129">CVE-2014-8129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8130">CVE-2014-8130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9655">CVE-2014-9655 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581498" comment="libtiff3-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581499" comment="libtiff3-32bit-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581500" comment="libtiff3-x86-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581501" comment="tiff-3.8.2-141.160.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581498" comment="libtiff3-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581499" comment="libtiff3-32bit-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581500" comment="libtiff3-x86-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581501" comment="tiff-3.8.2-141.160.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220447" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="960341" ref_url="https://bugzilla.suse.com/960341" source="BUGZILLA"/>
		<reference ref_id="964225" ref_url="https://bugzilla.suse.com/964225" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2015-8781" ref_url="https://www.suse.com/security/cve/CVE-2015-8781/" source="CVE"/>
		<reference ref_id="CVE-2015-8782" ref_url="https://www.suse.com/security/cve/CVE-2015-8782/" source="CVE"/>
		<reference ref_id="CVE-2015-8783" ref_url="https://www.suse.com/security/cve/CVE-2015-8783/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001854.html" source="SUSE-SU"/>
		<description>

This update for tiff fixes the following issues:

- CVE-2015-8781, CVE-2015-8782, CVE-2015-8783: Out-of-bounds writes for invalid images (bsc#964225)
- CVE-2015-7554: Out-of-bounds Write in the thumbnail and tiffcmp tools (bsc#960341)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964225">SUSE bug 964225</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7554">CVE-2015-7554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8781/">CVE-2015-8781 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8781">CVE-2015-8781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8782/">CVE-2015-8782 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8782">CVE-2015-8782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8783/">CVE-2015-8783 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8783">CVE-2015-8783 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586321" comment="libtiff3-3.8.2-141.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586322" comment="libtiff3-32bit-3.8.2-141.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586323" comment="libtiff3-x86-3.8.2-141.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586324" comment="tiff-3.8.2-141.163.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586321" comment="libtiff3-3.8.2-141.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586322" comment="libtiff3-32bit-3.8.2-141.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586323" comment="libtiff3-x86-3.8.2-141.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586324" comment="tiff-3.8.2-141.163.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220448" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="973340" ref_url="https://bugzilla.suse.com/973340" source="BUGZILLA"/>
		<reference ref_id="974449" ref_url="https://bugzilla.suse.com/974449" source="BUGZILLA"/>
		<reference ref_id="974614" ref_url="https://bugzilla.suse.com/974614" source="BUGZILLA"/>
		<reference ref_id="974618" ref_url="https://bugzilla.suse.com/974618" source="BUGZILLA"/>
		<reference ref_id="975069" ref_url="https://bugzilla.suse.com/975069" source="BUGZILLA"/>
		<reference ref_id="984808" ref_url="https://bugzilla.suse.com/984808" source="BUGZILLA"/>
		<reference ref_id="984831" ref_url="https://bugzilla.suse.com/984831" source="BUGZILLA"/>
		<reference ref_id="984837" ref_url="https://bugzilla.suse.com/984837" source="BUGZILLA"/>
		<reference ref_id="984842" ref_url="https://bugzilla.suse.com/984842" source="BUGZILLA"/>
		<reference ref_id="987351" ref_url="https://bugzilla.suse.com/987351" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3186" ref_url="https://www.suse.com/security/cve/CVE-2016-3186/" source="CVE"/>
		<reference ref_id="CVE-2016-3622" ref_url="https://www.suse.com/security/cve/CVE-2016-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-3623" ref_url="https://www.suse.com/security/cve/CVE-2016-3623/" source="CVE"/>
		<reference ref_id="CVE-2016-3945" ref_url="https://www.suse.com/security/cve/CVE-2016-3945/" source="CVE"/>
		<reference ref_id="CVE-2016-3990" ref_url="https://www.suse.com/security/cve/CVE-2016-3990/" source="CVE"/>
		<reference ref_id="CVE-2016-5314" ref_url="https://www.suse.com/security/cve/CVE-2016-5314/" source="CVE"/>
		<reference ref_id="CVE-2016-5316" ref_url="https://www.suse.com/security/cve/CVE-2016-5316/" source="CVE"/>
		<reference ref_id="CVE-2016-5317" ref_url="https://www.suse.com/security/cve/CVE-2016-5317/" source="CVE"/>
		<reference ref_id="CVE-2016-5320" ref_url="https://www.suse.com/security/cve/CVE-2016-5320/" source="CVE"/>
		<reference ref_id="CVE-2016-5875" ref_url="https://www.suse.com/security/cve/CVE-2016-5875/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002331.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2016-3622: Specially crafted TIFF images could trigger a crash in tiff2rgba (bsc#974449)
- Various out-of-bound write vulnerabilities with unspecified impact (MSVR 35093, MSVR 35094, MSVR 35095, MSVR 35096, MSVR 35097, MSVR 35098)
- CVE-2016-5314: Specially crafted TIFF images could trigger a crash that could result in DoS (bsc#984831)
- CVE-2016-5316: Specially crafted TIFF images could trigger a crash in the rgb2ycbcr tool, leading to Doa (bsc#984837)
- CVE-2016-5317: Specially crafted TIFF images could trigger a crash through an out of bound write (bsc#984842)
- CVE-2016-5320: Specially crafted TIFF images could trigger a crash or potentially allow remote code execution when using the rgb2ycbcr command (bsc#984808)
- CVE-2016-5875: Specially crafted TIFF images could trigger could allow arbitrary code execution (bsc#987351)
- CVE-2016-3623: Specially crafted TIFF images could trigger a crash in rgb2ycbcr (bsc#974618)
- CVE-2016-3945: Specially crafted TIFF images could trigger a crash or allow for arbitrary command execution via tiff2rgba (bsc#974614)
- CVE-2016-3990: Specially crafted TIFF images could trigger a crash or allow for arbitrary command execution (bsc#975069)
- CVE-2016-3186: Specially crafted TIFF imaged could trigger a crash in the gif2tiff command via a buffer overflow (bsc#973340)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-13"/>
	<updated date="2016-10-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/973340">SUSE bug 973340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974449">SUSE bug 974449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974614">SUSE bug 974614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974618">SUSE bug 974618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975069">SUSE bug 975069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984808">SUSE bug 984808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984831">SUSE bug 984831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984837">SUSE bug 984837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984842">SUSE bug 984842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987351">SUSE bug 987351</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3186/">CVE-2016-3186 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3186">CVE-2016-3186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3622/">CVE-2016-3622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3622">CVE-2016-3622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3623/">CVE-2016-3623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3623">CVE-2016-3623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3945/">CVE-2016-3945 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3945">CVE-2016-3945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3990/">CVE-2016-3990 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3990">CVE-2016-3990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5314/">CVE-2016-5314 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5314">CVE-2016-5314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5316/">CVE-2016-5316 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5316">CVE-2016-5316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5317/">CVE-2016-5317 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5317">CVE-2016-5317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5320/">CVE-2016-5320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-5320">CVE-2016-5320 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5875/">CVE-2016-5875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-5875">CVE-2016-5875 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586325" comment="libtiff3-3.8.2-141.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586326" comment="libtiff3-32bit-3.8.2-141.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586327" comment="libtiff3-x86-3.8.2-141.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586328" comment="tiff-3.8.2-141.168.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586325" comment="libtiff3-3.8.2-141.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586326" comment="libtiff3-32bit-3.8.2-141.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586327" comment="libtiff3-x86-3.8.2-141.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586328" comment="tiff-3.8.2-141.168.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220449" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1007280" ref_url="https://bugzilla.suse.com/1007280" source="BUGZILLA"/>
		<reference ref_id="1011107" ref_url="https://bugzilla.suse.com/1011107" source="BUGZILLA"/>
		<reference ref_id="1011845" ref_url="https://bugzilla.suse.com/1011845" source="BUGZILLA"/>
		<reference ref_id="1017688" ref_url="https://bugzilla.suse.com/1017688" source="BUGZILLA"/>
		<reference ref_id="1017690" ref_url="https://bugzilla.suse.com/1017690" source="BUGZILLA"/>
		<reference ref_id="1017691" ref_url="https://bugzilla.suse.com/1017691" source="BUGZILLA"/>
		<reference ref_id="1017692" ref_url="https://bugzilla.suse.com/1017692" source="BUGZILLA"/>
		<reference ref_id="1031255" ref_url="https://bugzilla.suse.com/1031255" source="BUGZILLA"/>
		<reference ref_id="1046077" ref_url="https://bugzilla.suse.com/1046077" source="BUGZILLA"/>
		<reference ref_id="1048937" ref_url="https://bugzilla.suse.com/1048937" source="BUGZILLA"/>
		<reference ref_id="1074318" ref_url="https://bugzilla.suse.com/1074318" source="BUGZILLA"/>
		<reference ref_id="960341" ref_url="https://bugzilla.suse.com/960341" source="BUGZILLA"/>
		<reference ref_id="983436" ref_url="https://bugzilla.suse.com/983436" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2016-10095" ref_url="https://www.suse.com/security/cve/CVE-2016-10095/" source="CVE"/>
		<reference ref_id="CVE-2016-10268" ref_url="https://www.suse.com/security/cve/CVE-2016-10268/" source="CVE"/>
		<reference ref_id="CVE-2016-3945" ref_url="https://www.suse.com/security/cve/CVE-2016-3945/" source="CVE"/>
		<reference ref_id="CVE-2016-5318" ref_url="https://www.suse.com/security/cve/CVE-2016-5318/" source="CVE"/>
		<reference ref_id="CVE-2016-5652" ref_url="https://www.suse.com/security/cve/CVE-2016-5652/" source="CVE"/>
		<reference ref_id="CVE-2016-9453" ref_url="https://www.suse.com/security/cve/CVE-2016-9453/" source="CVE"/>
		<reference ref_id="CVE-2016-9536" ref_url="https://www.suse.com/security/cve/CVE-2016-9536/" source="CVE"/>
		<reference ref_id="CVE-2017-11335" ref_url="https://www.suse.com/security/cve/CVE-2017-11335/" source="CVE"/>
		<reference ref_id="CVE-2017-17973" ref_url="https://www.suse.com/security/cve/CVE-2017-17973/" source="CVE"/>
		<reference ref_id="CVE-2017-9935" ref_url="https://www.suse.com/security/cve/CVE-2017-9935/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003984.html" source="SUSE-SU"/>
		<description>

  
This update for tiff fixes the following issues:

- CVE-2016-9453: The t2p_readwrite_pdf_image_tile function allowed remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a JPEG file with a TIFFTAG_JPEGTABLES of length one (bsc#1011107).
- CVE-2016-5652: An exploitable heap-based buffer overflow existed in the handling of TIFF images in the TIFF2PDF tool. A crafted TIFF document can lead to a heap-based buffer overflow resulting in remote code execution. Vulnerability can be triggered via a saved TIFF file delivered by other means (bsc#1007280).
- CVE-2017-11335: There is a heap based buffer overflow in tools/tiff2pdf.c via a PlanarConfig=Contig image, which caused a more than one hundred bytes out-of-bounds write (related to the ZIPDecode function in tif_zip.c). A crafted input may lead to a remote denial of service attack or an arbitrary code execution attack (bsc#1048937).
- CVE-2016-9536: tools/tiff2pdf.c had an out-of-bounds write vulnerabilities in heap allocated buffers in t2p_process_jpeg_strip(). Reported as MSVR 35098, aka 't2p_process_jpeg_strip heap-buffer-overflow.'  (bsc#1011845)
- CVE-2017-9935: In LibTIFF, there was a heap-based buffer overflow in the t2p_write_pdf function in tools/tiff2pdf.c. This heap overflow could lead to different damages. For example, a crafted TIFF document can lead to an out-of-bounds read in TIFFCleanup, an invalid free in TIFFClose or t2p_free, memory corruption in t2p_readwrite_pdf_image, or a double free in t2p_free. Given these possibilities, it probably could cause arbitrary code execution (bsc#1046077).
- CVE-2017-17973: There is a heap-based use-after-free in the t2p_writeproc function in tiff2pdf.c. (bsc#1074318)
- CVE-2015-7554: The _TIFFVGetField function in tif_dir.c allowed attackers to cause a denial of service (invalid memory write and crash) or possibly have unspecified other impact via crafted field data in an extension tag in a TIFF image (bsc#960341).
- CVE-2016-5318: Stack-based buffer overflow in the _TIFFVGetField function allowed remote attackers to crash the application via a crafted tiff (bsc#983436).
- CVE-2016-10095: Stack-based buffer overflow in the _TIFFVGetField function in tif_dir.c allowed remote attackers to cause a denial of service (crash) via a crafted TIFF file (bsc#1017690,).
- CVE-2016-10268: tools/tiffcp.c allowed remote attackers to cause a denial of service (integer underflow and heap-based buffer under-read) or possibly have unspecified other impact via a crafted TIFF image, related to 'READ of size 78490' and libtiff/tif_unix.c:115:23 (bsc#1031255)
- An overlapping of memcpy parameters was fixed which could lead to content corruption (bsc#1017691).
- Fixed an invalid memory read which could lead to a crash (bsc#1017692).
- Fixed a NULL pointer dereference in TIFFReadRawData (tiffinfo.c) that could crash the decoder (bsc#1017688).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-09"/>
	<updated date="2018-05-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007280">SUSE bug 1007280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011107">SUSE bug 1011107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011845">SUSE bug 1011845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017688">SUSE bug 1017688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017691">SUSE bug 1017691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017692">SUSE bug 1017692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031255">SUSE bug 1031255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046077">SUSE bug 1046077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048937">SUSE bug 1048937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074318">SUSE bug 1074318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983436">SUSE bug 983436</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7554">CVE-2015-7554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10095/">CVE-2016-10095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10095">CVE-2016-10095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10268/">CVE-2016-10268 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10268">CVE-2016-10268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3945/">CVE-2016-3945 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3945">CVE-2016-3945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5318/">CVE-2016-5318 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5318">CVE-2016-5318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5652/">CVE-2016-5652 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5652">CVE-2016-5652 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9453/">CVE-2016-9453 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9453">CVE-2016-9453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9536/">CVE-2016-9536 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9536">CVE-2016-9536 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11335/">CVE-2017-11335 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11335">CVE-2017-11335 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17973/">CVE-2017-17973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17973">CVE-2017-17973 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9935/">CVE-2017-9935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9935">CVE-2017-9935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586329" comment="libtiff3-3.8.2-141.169.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586330" comment="libtiff3-32bit-3.8.2-141.169.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586331" comment="libtiff3-x86-3.8.2-141.169.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586332" comment="tiff-3.8.2-141.169.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586329" comment="libtiff3-3.8.2-141.169.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586330" comment="libtiff3-32bit-3.8.2-141.169.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586331" comment="libtiff3-x86-3.8.2-141.169.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586332" comment="tiff-3.8.2-141.169.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220450" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1017694" ref_url="https://bugzilla.suse.com/1017694" source="BUGZILLA"/>
		<reference ref_id="1031250" ref_url="https://bugzilla.suse.com/1031250" source="BUGZILLA"/>
		<reference ref_id="1031254" ref_url="https://bugzilla.suse.com/1031254" source="BUGZILLA"/>
		<reference ref_id="1033109" ref_url="https://bugzilla.suse.com/1033109" source="BUGZILLA"/>
		<reference ref_id="1033111" ref_url="https://bugzilla.suse.com/1033111" source="BUGZILLA"/>
		<reference ref_id="1033112" ref_url="https://bugzilla.suse.com/1033112" source="BUGZILLA"/>
		<reference ref_id="1033113" ref_url="https://bugzilla.suse.com/1033113" source="BUGZILLA"/>
		<reference ref_id="1033120" ref_url="https://bugzilla.suse.com/1033120" source="BUGZILLA"/>
		<reference ref_id="1033126" ref_url="https://bugzilla.suse.com/1033126" source="BUGZILLA"/>
		<reference ref_id="1033127" ref_url="https://bugzilla.suse.com/1033127" source="BUGZILLA"/>
		<reference ref_id="1033129" ref_url="https://bugzilla.suse.com/1033129" source="BUGZILLA"/>
		<reference ref_id="1074317" ref_url="https://bugzilla.suse.com/1074317" source="BUGZILLA"/>
		<reference ref_id="984808" ref_url="https://bugzilla.suse.com/984808" source="BUGZILLA"/>
		<reference ref_id="984809" ref_url="https://bugzilla.suse.com/984809" source="BUGZILLA"/>
		<reference ref_id="984831" ref_url="https://bugzilla.suse.com/984831" source="BUGZILLA"/>
		<reference ref_id="987351" ref_url="https://bugzilla.suse.com/987351" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10267" ref_url="https://www.suse.com/security/cve/CVE-2016-10267/" source="CVE"/>
		<reference ref_id="CVE-2016-10269" ref_url="https://www.suse.com/security/cve/CVE-2016-10269/" source="CVE"/>
		<reference ref_id="CVE-2016-10270" ref_url="https://www.suse.com/security/cve/CVE-2016-10270/" source="CVE"/>
		<reference ref_id="CVE-2016-5314" ref_url="https://www.suse.com/security/cve/CVE-2016-5314/" source="CVE"/>
		<reference ref_id="CVE-2016-5315" ref_url="https://www.suse.com/security/cve/CVE-2016-5315/" source="CVE"/>
		<reference ref_id="CVE-2017-18013" ref_url="https://www.suse.com/security/cve/CVE-2017-18013/" source="CVE"/>
		<reference ref_id="CVE-2017-7593" ref_url="https://www.suse.com/security/cve/CVE-2017-7593/" source="CVE"/>
		<reference ref_id="CVE-2017-7595" ref_url="https://www.suse.com/security/cve/CVE-2017-7595/" source="CVE"/>
		<reference ref_id="CVE-2017-7596" ref_url="https://www.suse.com/security/cve/CVE-2017-7596/" source="CVE"/>
		<reference ref_id="CVE-2017-7597" ref_url="https://www.suse.com/security/cve/CVE-2017-7597/" source="CVE"/>
		<reference ref_id="CVE-2017-7599" ref_url="https://www.suse.com/security/cve/CVE-2017-7599/" source="CVE"/>
		<reference ref_id="CVE-2017-7600" ref_url="https://www.suse.com/security/cve/CVE-2017-7600/" source="CVE"/>
		<reference ref_id="CVE-2017-7601" ref_url="https://www.suse.com/security/cve/CVE-2017-7601/" source="CVE"/>
		<reference ref_id="CVE-2017-7602" ref_url="https://www.suse.com/security/cve/CVE-2017-7602/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

Security issues fixed:

- CVE-2016-5315: The setByteArray function in tif_dir.c allowed remote attackers to cause a denial of service (out-of-bounds read) via a crafted tiff image.  (bsc#984809)
- CVE-2016-10267: LibTIFF allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_ojpeg.c:816:8.  (bsc#1017694)
- CVE-2016-10269: LibTIFF allowed remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to 'READ of size 512' and libtiff/tif_unix.c:340:2.  (bsc#1031254)
- CVE-2016-10270: LibTIFF allowed remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to 'READ of size 8' and libtiff/tif_read.c:523:22.  (bsc#1031250)
- CVE-2017-18013: In LibTIFF, there was a Null-Pointer Dereference in the tif_print.c TIFFPrintDirectory function, as demonstrated by a tiffinfo crash.  (bsc#1074317)
- CVE-2017-7593: tif_read.c did not ensure that tif_rawdata is properly initialized, which might have allowed remote attackers to obtain sensitive information from process memory via a crafted image.  (bsc#1033129)
- CVE-2017-7595: The JPEGSetupEncode function in tiff_jpeg.c allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image.  (bsc#1033127)
- CVE-2017-7596: LibTIFF had an 'outside the range of representable values of type float' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033126)
- CVE-2017-7597: tif_dirread.c had an 'outside the range of representable values of type float' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033120)
- CVE-2017-7599: LibTIFF had an 'outside the range of representable values of type short' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033113)
- CVE-2017-7600: LibTIFF had an 'outside the range of representable values of type unsigned char' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033112)
- CVE-2017-7601: LibTIFF had a 'shift exponent too large for 64-bit type long' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033111)
- CVE-2017-7602: LibTIFF had a signed integer overflow, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033109)
- Multiple divide by zero issues
- CVE-2016-5314: Buffer overflow in the PixarLogDecode function in tif_pixarlog.c allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.  (bsc#987351 bsc#984808 bsc#984831)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-30"/>
	<updated date="2018-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017694">SUSE bug 1017694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031250">SUSE bug 1031250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031254">SUSE bug 1031254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033109">SUSE bug 1033109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033111">SUSE bug 1033111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033112">SUSE bug 1033112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033113">SUSE bug 1033113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033120">SUSE bug 1033120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033126">SUSE bug 1033126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033127">SUSE bug 1033127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033129">SUSE bug 1033129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074317">SUSE bug 1074317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984808">SUSE bug 984808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984809">SUSE bug 984809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984831">SUSE bug 984831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987351">SUSE bug 987351</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10267/">CVE-2016-10267 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10267">CVE-2016-10267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10269/">CVE-2016-10269 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10269">CVE-2016-10269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10270/">CVE-2016-10270 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10270">CVE-2016-10270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5314/">CVE-2016-5314 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5314">CVE-2016-5314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5315/">CVE-2016-5315 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5315">CVE-2016-5315 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18013/">CVE-2017-18013 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18013">CVE-2017-18013 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7593/">CVE-2017-7593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7593">CVE-2017-7593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7595/">CVE-2017-7595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7595">CVE-2017-7595 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7596/">CVE-2017-7596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7596">CVE-2017-7596 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7597/">CVE-2017-7597 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7597">CVE-2017-7597 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7599/">CVE-2017-7599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7599">CVE-2017-7599 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7600/">CVE-2017-7600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7600">CVE-2017-7600 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7601/">CVE-2017-7601 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7601">CVE-2017-7601 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7602/">CVE-2017-7602 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7602">CVE-2017-7602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586333" comment="libtiff3-3.8.2-141.169.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586334" comment="libtiff3-32bit-3.8.2-141.169.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586335" comment="libtiff3-x86-3.8.2-141.169.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586336" comment="tiff-3.8.2-141.169.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586333" comment="libtiff3-3.8.2-141.169.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586334" comment="libtiff3-32bit-3.8.2-141.169.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586335" comment="libtiff3-x86-3.8.2-141.169.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586336" comment="tiff-3.8.2-141.169.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220451" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1007276" ref_url="https://bugzilla.suse.com/1007276" source="BUGZILLA"/>
		<reference ref_id="1011839" ref_url="https://bugzilla.suse.com/1011839" source="BUGZILLA"/>
		<reference ref_id="1011846" ref_url="https://bugzilla.suse.com/1011846" source="BUGZILLA"/>
		<reference ref_id="1017689" ref_url="https://bugzilla.suse.com/1017689" source="BUGZILLA"/>
		<reference ref_id="1017690" ref_url="https://bugzilla.suse.com/1017690" source="BUGZILLA"/>
		<reference ref_id="1019611" ref_url="https://bugzilla.suse.com/1019611" source="BUGZILLA"/>
		<reference ref_id="1031263" ref_url="https://bugzilla.suse.com/1031263" source="BUGZILLA"/>
		<reference ref_id="1082332" ref_url="https://bugzilla.suse.com/1082332" source="BUGZILLA"/>
		<reference ref_id="1082825" ref_url="https://bugzilla.suse.com/1082825" source="BUGZILLA"/>
		<reference ref_id="1086408" ref_url="https://bugzilla.suse.com/1086408" source="BUGZILLA"/>
		<reference ref_id="974621" ref_url="https://bugzilla.suse.com/974621" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2016-10095" ref_url="https://www.suse.com/security/cve/CVE-2016-10095/" source="CVE"/>
		<reference ref_id="CVE-2016-10266" ref_url="https://www.suse.com/security/cve/CVE-2016-10266/" source="CVE"/>
		<reference ref_id="CVE-2016-3632" ref_url="https://www.suse.com/security/cve/CVE-2016-3632/" source="CVE"/>
		<reference ref_id="CVE-2016-5318" ref_url="https://www.suse.com/security/cve/CVE-2016-5318/" source="CVE"/>
		<reference ref_id="CVE-2016-8331" ref_url="https://www.suse.com/security/cve/CVE-2016-8331/" source="CVE"/>
		<reference ref_id="CVE-2016-9535" ref_url="https://www.suse.com/security/cve/CVE-2016-9535/" source="CVE"/>
		<reference ref_id="CVE-2016-9540" ref_url="https://www.suse.com/security/cve/CVE-2016-9540/" source="CVE"/>
		<reference ref_id="CVE-2017-11613" ref_url="https://www.suse.com/security/cve/CVE-2017-11613/" source="CVE"/>
		<reference ref_id="CVE-2017-5225" ref_url="https://www.suse.com/security/cve/CVE-2017-5225/" source="CVE"/>
		<reference ref_id="CVE-2018-7456" ref_url="https://www.suse.com/security/cve/CVE-2018-7456/" source="CVE"/>
		<reference ref_id="CVE-2018-8905" ref_url="https://www.suse.com/security/cve/CVE-2018-8905/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following security issues:

- CVE-2017-5225: Prevent heap buffer overflow in the tools/tiffcp that could
  have caused DoS or code execution via a crafted BitsPerSample value
  (bsc#1019611)
- CVE-2018-7456: Prevent a NULL Pointer dereference in the function
  TIFFPrintDirectory when using the tiffinfo tool to print crafted TIFF
  information, a different vulnerability than CVE-2017-18013 (bsc#1082825)
- CVE-2017-11613: Prevent denial of service in the TIFFOpen function. During
  the TIFFOpen process, td_imagelength is not checked. The value of
  td_imagelength can be directly controlled by an input file. In the
  ChopUpSingleUncompressedStrip function, the _TIFFCheckMalloc function is called
  based on td_imagelength. If the value of td_imagelength is set close to the
  amount of system memory, it will hang the system or trigger the OOM killer
  (bsc#1082332)
- CVE-2016-10266: Prevent remote attackers to cause a denial of service
  (divide-by-zero error and application crash) via a crafted TIFF image, related
  to libtiff/tif_read.c:351:22 (bsc#1031263)
- CVE-2018-8905: Prevent heap-based buffer overflow in the function
  LZWDecodeCompat via a crafted TIFF file (bsc#1086408)
- CVE-2016-9540: Prevent out-of-bounds write on tiled images with odd tile
  width versus image width (bsc#1011839).
- CVE-2016-9535: tif_predict.h and tif_predict.c had assertions that could have
  lead to assertion failures in debug mode, or buffer overflows in release mode,
  when dealing with unusual tile size like YCbCr with subsampling (bsc#1011846).
- CVE-2016-9535: tif_predict.h and tif_predict.c had assertions that could have
  lead to assertion failures in debug mode, or buffer overflows in release mode,
  when dealing with unusual tile size like YCbCr with subsampling (bsc#1011846).
- Removed assert in readSeparateTilesIntoBuffer() function (bsc#1017689).
- CVE-2016-10095: Prevent stack-based buffer overflow in the _TIFFVGetField
  function that allowed remote attackers to cause a denial of service (crash) via
  a crafted TIFF file (bsc#1017690).
- CVE-2016-8331: Prevent remote code execution because of incorrect handling of
  TIFF images. A crafted TIFF document could have lead to a type confusion
  vulnerability resulting in remote code execution. This vulnerability could have
  been be triggered via a TIFF file delivered to the application using LibTIFF's
  tag extension functionality (bsc#1007276).
- CVE-2016-3632: The _TIFFVGetField function allowed remote attackers to cause
  a denial of service (out-of-bounds write) or execute arbitrary code via a
  crafted TIFF image (bsc#974621).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-28"/>
	<updated date="2018-06-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007276">SUSE bug 1007276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011839">SUSE bug 1011839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011846">SUSE bug 1011846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017689">SUSE bug 1017689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019611">SUSE bug 1019611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031263">SUSE bug 1031263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082332">SUSE bug 1082332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082825">SUSE bug 1082825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086408">SUSE bug 1086408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974621">SUSE bug 974621</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8128">CVE-2014-8128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7554">CVE-2015-7554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10095/">CVE-2016-10095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10095">CVE-2016-10095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10266/">CVE-2016-10266 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10266">CVE-2016-10266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3632/">CVE-2016-3632 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3632">CVE-2016-3632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5318/">CVE-2016-5318 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5318">CVE-2016-5318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8331/">CVE-2016-8331 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8331">CVE-2016-8331 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9535/">CVE-2016-9535 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9535">CVE-2016-9535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9540/">CVE-2016-9540 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9540">CVE-2016-9540 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11613/">CVE-2017-11613 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11613">CVE-2017-11613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5225/">CVE-2017-5225 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5225">CVE-2017-5225 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7456/">CVE-2018-7456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7456">CVE-2018-7456 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-8905/">CVE-2018-8905 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8905">CVE-2018-8905 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586337" comment="libtiff3-3.8.2-141.169.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586338" comment="libtiff3-32bit-3.8.2-141.169.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586339" comment="libtiff3-x86-3.8.2-141.169.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586340" comment="tiff-3.8.2-141.169.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586337" comment="libtiff3-3.8.2-141.169.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586338" comment="libtiff3-32bit-3.8.2-141.169.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586339" comment="libtiff3-x86-3.8.2-141.169.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586340" comment="tiff-3.8.2-141.169.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220452" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1074186" ref_url="https://bugzilla.suse.com/1074186" source="BUGZILLA"/>
		<reference ref_id="1092480" ref_url="https://bugzilla.suse.com/1092480" source="BUGZILLA"/>
		<reference ref_id="960589" ref_url="https://bugzilla.suse.com/960589" source="BUGZILLA"/>
		<reference ref_id="983440" ref_url="https://bugzilla.suse.com/983440" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8668" ref_url="https://www.suse.com/security/cve/CVE-2015-8668/" source="CVE"/>
		<reference ref_id="CVE-2016-5319" ref_url="https://www.suse.com/security/cve/CVE-2016-5319/" source="CVE"/>
		<reference ref_id="CVE-2017-17942" ref_url="https://www.suse.com/security/cve/CVE-2017-17942/" source="CVE"/>
		<reference ref_id="CVE-2018-10779" ref_url="https://www.suse.com/security/cve/CVE-2018-10779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004543.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

The following security vulnerabilities were addressed:

- CVE-2015-8668: Fixed a heap-based buffer overflow in the PackBitsPreEncode
  function in tif_packbits.c in bmp2tiff, which allowed remote attackers to
  execute arbitrary code or cause a denial of service via a large width field
  in a specially crafted BMP image. (bsc#960589)
- CVE-2018-10779: Fixed a heap-based buffer over-read in TIFFWriteScanline() in
  tif_write.c (bsc#1092480)
- CVE-2017-17942: Fixed a heap-based buffer overflow in the function
  PackBitsEncode in tif_packbits.c. (bsc#1074186)
- CVE-2016-5319: Fixed a beap-based buffer overflow in bmp2tiff (bsc#983440)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-10"/>
	<updated date="2018-09-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074186">SUSE bug 1074186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092480">SUSE bug 1092480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960589">SUSE bug 960589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983440">SUSE bug 983440</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8668/">CVE-2015-8668 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8668">CVE-2015-8668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5319/">CVE-2016-5319 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5319">CVE-2016-5319 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17942/">CVE-2017-17942 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17942">CVE-2017-17942 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10779/">CVE-2018-10779 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10779">CVE-2018-10779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586341" comment="libtiff3-3.8.2-141.169.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586342" comment="libtiff3-32bit-3.8.2-141.169.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586343" comment="libtiff3-x86-3.8.2-141.169.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586344" comment="tiff-3.8.2-141.169.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586341" comment="libtiff3-3.8.2-141.169.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586342" comment="libtiff3-32bit-3.8.2-141.169.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586343" comment="libtiff3-x86-3.8.2-141.169.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586344" comment="tiff-3.8.2-141.169.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220453" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1106853" ref_url="https://bugzilla.suse.com/1106853" source="BUGZILLA"/>
		<reference ref_id="1108627" ref_url="https://bugzilla.suse.com/1108627" source="BUGZILLA"/>
		<reference ref_id="1108637" ref_url="https://bugzilla.suse.com/1108637" source="BUGZILLA"/>
		<reference ref_id="1110358" ref_url="https://bugzilla.suse.com/1110358" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11613" ref_url="https://www.suse.com/security/cve/CVE-2017-11613/" source="CVE"/>
		<reference ref_id="CVE-2017-9935" ref_url="https://www.suse.com/security/cve/CVE-2017-9935/" source="CVE"/>
		<reference ref_id="CVE-2018-16335" ref_url="https://www.suse.com/security/cve/CVE-2018-16335/" source="CVE"/>
		<reference ref_id="CVE-2018-17100" ref_url="https://www.suse.com/security/cve/CVE-2018-17100/" source="CVE"/>
		<reference ref_id="CVE-2018-17101" ref_url="https://www.suse.com/security/cve/CVE-2018-17101/" source="CVE"/>
		<reference ref_id="CVE-2018-17795" ref_url="https://www.suse.com/security/cve/CVE-2018-17795/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004784.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2018-17100: There is a int32 overflow in multiply_ms in tools/ppm2tiff.c, which can cause a denial of service (crash) or possibly have unspecified other impact via a crafted image file. (bsc#1108637)
- CVE-2018-17101: There are two out-of-bounds writes in cpTags in tools/tiff2bw.c and tools/pal2rgb.c, which can cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image file. (bsc#1108627)
- CVE-2018-17795: The function t2p_write_pdf in tiff2pdf.c allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, a similar issue to CVE-2017-9935. (bsc#1110358)
- CVE-2018-16335: newoffsets handling in ChopUpSingleUncompressedStrip in tif_dirread.c allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf. This is a different vulnerability than CVE-2018-15209. (bsc#1106853)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-24"/>
	<updated date="2018-10-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106853">SUSE bug 1106853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108627">SUSE bug 1108627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108637">SUSE bug 1108637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110358">SUSE bug 1110358</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11613/">CVE-2017-11613 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11613">CVE-2017-11613 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9935/">CVE-2017-9935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9935">CVE-2017-9935 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16335/">CVE-2018-16335 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16335">CVE-2018-16335 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17100/">CVE-2018-17100 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17100">CVE-2018-17100 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-17101/">CVE-2018-17101 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17101">CVE-2018-17101 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17795/">CVE-2018-17795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17795">CVE-2018-17795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586345" comment="libtiff3-3.8.2-141.169.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586346" comment="libtiff3-32bit-3.8.2-141.169.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586347" comment="libtiff3-x86-3.8.2-141.169.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586348" comment="tiff-3.8.2-141.169.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586345" comment="libtiff3-3.8.2-141.169.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586346" comment="libtiff3-32bit-3.8.2-141.169.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586347" comment="libtiff3-x86-3.8.2-141.169.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586348" comment="tiff-3.8.2-141.169.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220454" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1010163" ref_url="https://bugzilla.suse.com/1010163" source="BUGZILLA"/>
		<reference ref_id="1014461" ref_url="https://bugzilla.suse.com/1014461" source="BUGZILLA"/>
		<reference ref_id="1040080" ref_url="https://bugzilla.suse.com/1040080" source="BUGZILLA"/>
		<reference ref_id="1040322" ref_url="https://bugzilla.suse.com/1040322" source="BUGZILLA"/>
		<reference ref_id="1074186" ref_url="https://bugzilla.suse.com/1074186" source="BUGZILLA"/>
		<reference ref_id="1099257" ref_url="https://bugzilla.suse.com/1099257" source="BUGZILLA"/>
		<reference ref_id="1113672" ref_url="https://bugzilla.suse.com/1113672" source="BUGZILLA"/>
		<reference ref_id="974446" ref_url="https://bugzilla.suse.com/974446" source="BUGZILLA"/>
		<reference ref_id="974447" ref_url="https://bugzilla.suse.com/974447" source="BUGZILLA"/>
		<reference ref_id="974448" ref_url="https://bugzilla.suse.com/974448" source="BUGZILLA"/>
		<reference ref_id="983440" ref_url="https://bugzilla.suse.com/983440" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8870" ref_url="https://www.suse.com/security/cve/CVE-2015-8870/" source="CVE"/>
		<reference ref_id="CVE-2016-3619" ref_url="https://www.suse.com/security/cve/CVE-2016-3619/" source="CVE"/>
		<reference ref_id="CVE-2016-3620" ref_url="https://www.suse.com/security/cve/CVE-2016-3620/" source="CVE"/>
		<reference ref_id="CVE-2016-3621" ref_url="https://www.suse.com/security/cve/CVE-2016-3621/" source="CVE"/>
		<reference ref_id="CVE-2016-5319" ref_url="https://www.suse.com/security/cve/CVE-2016-5319/" source="CVE"/>
		<reference ref_id="CVE-2016-9273" ref_url="https://www.suse.com/security/cve/CVE-2016-9273/" source="CVE"/>
		<reference ref_id="CVE-2017-17942" ref_url="https://www.suse.com/security/cve/CVE-2017-17942/" source="CVE"/>
		<reference ref_id="CVE-2017-9117" ref_url="https://www.suse.com/security/cve/CVE-2017-9117/" source="CVE"/>
		<reference ref_id="CVE-2017-9147" ref_url="https://www.suse.com/security/cve/CVE-2017-9147/" source="CVE"/>
		<reference ref_id="CVE-2018-12900" ref_url="https://www.suse.com/security/cve/CVE-2018-12900/" source="CVE"/>
		<reference ref_id="CVE-2018-18661" ref_url="https://www.suse.com/security/cve/CVE-2018-18661/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004880.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

Security issues fixed:

- CVE-2018-18661: Fixed NULL pointer dereference in the function LZWDecode in the file tif_lzw.c (bsc#1113672).
- CVE-2018-12900: Fixed heap-based buffer overflow in the cpSeparateBufToContigBuf (bsc#1099257).
- CVE-2017-9147: Fixed invalid read in the _TIFFVGetField function in tif_dir.c, that allowed remote attackers to cause a DoS via acrafted TIFF file (bsc#1040322). 
- CVE-2017-9117: Fixed BMP images processing that was verified without biWidth and biHeight values (bsc#1040080).
- CVE-2017-17942: Fixed issue in the function PackBitsEncode that could have led to a heap overflow and caused a DoS (bsc#1074186).
- CVE-2016-9273: Fixed heap-based buffer overflow issue (bsc#1010163).
- CVE-2016-5319: Fixed heap-based buffer overflow in PackBitsEncode (bsc#983440).
- CVE-2016-3621: Fixed out-of-bounds read in the bmp2tiff tool (lzw packing) (bsc#974448).
- CVE-2016-3620: Fixed out-of-bounds read in the bmp2tiff tool (zip packing) (bsc#974447)
- CVE-2016-3619: Fixed out-of-bounds read in the bmp2tiff tool (none packing) (bsc#974446)
- CVE-2015-8870: Fixed integer overflow in tools/bmp2tiff.c that allowed remote attackers to causea DOS (bsc#1014461).

Non-security issues fixed:

- asan_build: build ASAN included
- debug_build: build more suitable for debugging
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-23"/>
	<updated date="2018-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010163">SUSE bug 1010163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014461">SUSE bug 1014461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040080">SUSE bug 1040080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040322">SUSE bug 1040322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074186">SUSE bug 1074186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099257">SUSE bug 1099257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113672">SUSE bug 1113672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974446">SUSE bug 974446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974447">SUSE bug 974447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974448">SUSE bug 974448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983440">SUSE bug 983440</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8870/">CVE-2015-8870 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8870">CVE-2015-8870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3619/">CVE-2016-3619 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3619">CVE-2016-3619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3620/">CVE-2016-3620 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3620">CVE-2016-3620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3621/">CVE-2016-3621 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3621">CVE-2016-3621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5319/">CVE-2016-5319 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5319">CVE-2016-5319 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9273/">CVE-2016-9273 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9273">CVE-2016-9273 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17942/">CVE-2017-17942 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17942">CVE-2017-17942 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9117/">CVE-2017-9117 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9117">CVE-2017-9117 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9147/">CVE-2017-9147 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9147">CVE-2017-9147 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12900/">CVE-2018-12900 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12900">CVE-2018-12900 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18661/">CVE-2018-18661 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18661">CVE-2018-18661 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586349" comment="libtiff3-3.8.2-141.169.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586350" comment="libtiff3-32bit-3.8.2-141.169.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586351" comment="libtiff3-x86-3.8.2-141.169.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586352" comment="tiff-3.8.2-141.169.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586349" comment="libtiff3-3.8.2-141.169.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586350" comment="libtiff3-32bit-3.8.2-141.169.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586351" comment="libtiff3-x86-3.8.2-141.169.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586352" comment="tiff-3.8.2-141.169.22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220455" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1017693" ref_url="https://bugzilla.suse.com/1017693" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10092" ref_url="https://www.suse.com/security/cve/CVE-2016-10092/" source="CVE"/>
		<reference ref_id="CVE-2016-10093" ref_url="https://www.suse.com/security/cve/CVE-2016-10093/" source="CVE"/>
		<reference ref_id="CVE-2016-10094" ref_url="https://www.suse.com/security/cve/CVE-2016-10094/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004962.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:                                             
                                                                                     
Security issues fixed:                                                                         
                                                                                                                               
- CVE-2016-10094: Fixed heap-based buffer overflow in the _tiffWriteProc function (bsc#1017693).                   
- CVE-2016-10093: Fixed heap-based buffer overflow in the _TIFFmemcpy function (bsc#1017693).      
- CVE-2016-10092: Fixed heap-based buffer overflow in the TIFFReverseBits function (bsc#1017693).          
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017693">SUSE bug 1017693</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10092/">CVE-2016-10092 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10092">CVE-2016-10092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10093/">CVE-2016-10093 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10093">CVE-2016-10093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10094/">CVE-2016-10094 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10094">CVE-2016-10094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586353" comment="libtiff3-3.8.2-141.169.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586354" comment="libtiff3-32bit-3.8.2-141.169.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586355" comment="libtiff3-x86-3.8.2-141.169.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586356" comment="tiff-3.8.2-141.169.26.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586353" comment="libtiff3-3.8.2-141.169.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586354" comment="libtiff3-32bit-3.8.2-141.169.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586355" comment="libtiff3-x86-3.8.2-141.169.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586356" comment="tiff-3.8.2-141.169.26.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220456" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1121626" ref_url="https://bugzilla.suse.com/1121626" source="BUGZILLA"/>
		<reference ref_id="983268" ref_url="https://bugzilla.suse.com/983268" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5102" ref_url="https://www.suse.com/security/cve/CVE-2016-5102/" source="CVE"/>
		<reference ref_id="CVE-2019-6128" ref_url="https://www.suse.com/security/cve/CVE-2019-6128/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005277.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issue:

Security vulnerabilities fixed:

- CVE-2016-5102: Fixed a buffer overflow in readgifimage() (bsc#983268)
- CVE-2019-6128: Fixed a memory leak in the TIFFFdOpen function in tif_unix.c (bsc#1121626)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1121626">SUSE bug 1121626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983268">SUSE bug 983268</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5102/">CVE-2016-5102 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5102">CVE-2016-5102 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6128/">CVE-2019-6128 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6128">CVE-2019-6128 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586357" comment="libtiff3-3.8.2-141.169.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586358" comment="libtiff3-32bit-3.8.2-141.169.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586359" comment="libtiff3-x86-3.8.2-141.169.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586360" comment="tiff-3.8.2-141.169.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586357" comment="libtiff3-3.8.2-141.169.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586358" comment="libtiff3-32bit-3.8.2-141.169.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586359" comment="libtiff3-x86-3.8.2-141.169.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586360" comment="tiff-3.8.2-141.169.31.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220457" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1156749" ref_url="https://bugzilla.suse.com/1156749" source="BUGZILLA"/>
		<reference ref_id="1156754" ref_url="https://bugzilla.suse.com/1156754" source="BUGZILLA"/>
		<reference ref_id="1182808" ref_url="https://bugzilla.suse.com/1182808" source="BUGZILLA"/>
		<reference ref_id="1182809" ref_url="https://bugzilla.suse.com/1182809" source="BUGZILLA"/>
		<reference ref_id="1182811" ref_url="https://bugzilla.suse.com/1182811" source="BUGZILLA"/>
		<reference ref_id="1182812" ref_url="https://bugzilla.suse.com/1182812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8665" ref_url="https://www.suse.com/security/cve/CVE-2015-8665/" source="CVE"/>
		<reference ref_id="CVE-2015-8683" ref_url="https://www.suse.com/security/cve/CVE-2015-8683/" source="CVE"/>
		<reference ref_id="CVE-2020-35521" ref_url="https://www.suse.com/security/cve/CVE-2020-35521/" source="CVE"/>
		<reference ref_id="CVE-2020-35522" ref_url="https://www.suse.com/security/cve/CVE-2020-35522/" source="CVE"/>
		<reference ref_id="CVE-2020-35523" ref_url="https://www.suse.com/security/cve/CVE-2020-35523/" source="CVE"/>
		<reference ref_id="CVE-2020-35524" ref_url="https://www.suse.com/security/cve/CVE-2020-35524/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010250.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2015-8683: Fixed out-of-bounds when reading CIE Lab image format files (bsc#1156754).
- CVE-2015-8665: Fixed out-of-bounds read in tif_getimage.c (bsc#1156749).
- CVE-2020-35521: Fixed memory allocation failure in tif_read.c (bsc#1182808).
- CVE-2020-35522: Fixed memory allocation failure in tif_pixarlog.c (bsc#1182809).
- CVE-2020-35523: Fixed integer overflow in tif_getimage.c (bsc#1182811).
- CVE-2020-35524: Fixed heap-based buffer overflow in TIFF2PDF tool (bsc#1182812).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156749">SUSE bug 1156749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156754">SUSE bug 1156754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182808">SUSE bug 1182808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182809">SUSE bug 1182809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182811">SUSE bug 1182811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182812">SUSE bug 1182812</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8665/">CVE-2015-8665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8665">CVE-2015-8665 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8683/">CVE-2015-8683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8683">CVE-2015-8683 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35521/">CVE-2020-35521 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35521">CVE-2020-35521 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35522/">CVE-2020-35522 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35522">CVE-2020-35522 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35523/">CVE-2020-35523 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35523">CVE-2020-35523 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35524/">CVE-2020-35524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35524">CVE-2020-35524 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666467" comment="libtiff3-3.8.2-141.169.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666468" comment="libtiff3-32bit-3.8.2-141.169.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666469" comment="tiff-3.8.2-141.169.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220458" version="1" class="patch">
	<metadata>
		<title>Security update for tightvnc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1155442" ref_url="https://bugzilla.suse.com/1155442" source="BUGZILLA"/>
		<reference ref_id="1155452" ref_url="https://bugzilla.suse.com/1155452" source="BUGZILLA"/>
		<reference ref_id="1155472" ref_url="https://bugzilla.suse.com/1155472" source="BUGZILLA"/>
		<reference ref_id="1155476" ref_url="https://bugzilla.suse.com/1155476" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15678" ref_url="https://www.suse.com/security/cve/CVE-2019-15678/" source="CVE"/>
		<reference ref_id="CVE-2019-15679" ref_url="https://www.suse.com/security/cve/CVE-2019-15679/" source="CVE"/>
		<reference ref_id="CVE-2019-15680" ref_url="https://www.suse.com/security/cve/CVE-2019-15680/" source="CVE"/>
		<reference ref_id="CVE-2019-8287" ref_url="https://www.suse.com/security/cve/CVE-2019-8287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006203.html" source="SUSE-SU"/>
		<description>
This update for tightvnc fixes the following issues:

- CVE-2019-15679: Fixed a heap buffer overflow in InitialiseRFBConnection 
  which might lead to code execution (bsc#1155476). 
- CVE-2019-8287: Fixed a global buffer overflow in HandleCoRREBBPmay which 
  might lead to code execution (bsc#1155472).
- CVE-2019-15680: Fixed a null pointer dereference in HandleZlibBPP which 
  could have led to denial of service (bsc#1155452).
- CVE-2019-15678: Fixed a heap buffer overflow in rfbServerCutText handler 
  (bsc#1155442).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-29"/>
	<updated date="2019-11-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155442">SUSE bug 1155442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155452">SUSE bug 1155452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155472">SUSE bug 1155472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155476">SUSE bug 1155476</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15678/">CVE-2019-15678 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15678">CVE-2019-15678 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15679/">CVE-2019-15679 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15679">CVE-2019-15679 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15680/">CVE-2019-15680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15680">CVE-2019-15680 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8287/">CVE-2019-8287 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8287">CVE-2019-8287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586361" comment="tightvnc-1.3.9-81.15.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220459" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="988489" ref_url="https://bugzilla.suse.com/988489" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5388" ref_url="https://www.suse.com/security/cve/CVE-2016-5388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002253.html" source="SUSE-SU"/>
		<description>

This update for tomcat6 fixes the following issue:

- CVE-2016-5388 Setting HTTP_PROXY environment variable via Proxy header (bsc#988489)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-02"/>
	<updated date="2016-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5388/">CVE-2016-5388 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5388">CVE-2016-5388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575263" comment="tomcat6-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575264" comment="tomcat6-admin-webapps-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575265" comment="tomcat6-docs-webapp-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575266" comment="tomcat6-javadoc-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575267" comment="tomcat6-jsp-2_1-api-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575268" comment="tomcat6-lib-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575269" comment="tomcat6-servlet-2_5-api-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575270" comment="tomcat6-webapps-6.0.45-0.53.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575263" comment="tomcat6-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575264" comment="tomcat6-admin-webapps-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575265" comment="tomcat6-docs-webapp-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575266" comment="tomcat6-javadoc-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575267" comment="tomcat6-jsp-2_1-api-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575268" comment="tomcat6-lib-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575269" comment="tomcat6-servlet-2_5-api-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575270" comment="tomcat6-webapps-6.0.45-0.53.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220460" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="906152" ref_url="https://bugzilla.suse.com/906152" source="BUGZILLA"/>
		<reference ref_id="917127" ref_url="https://bugzilla.suse.com/917127" source="BUGZILLA"/>
		<reference ref_id="926762" ref_url="https://bugzilla.suse.com/926762" source="BUGZILLA"/>
		<reference ref_id="931442" ref_url="https://bugzilla.suse.com/931442" source="BUGZILLA"/>
		<reference ref_id="932698" ref_url="https://bugzilla.suse.com/932698" source="BUGZILLA"/>
		<reference ref_id="934219" ref_url="https://bugzilla.suse.com/934219" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0227" ref_url="https://www.suse.com/security/cve/CVE-2014-0227/" source="CVE"/>
		<reference ref_id="CVE-2014-0230" ref_url="https://www.suse.com/security/cve/CVE-2014-0230/" source="CVE"/>
		<reference ref_id="CVE-2014-7810" ref_url="https://www.suse.com/security/cve/CVE-2014-7810/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001594.html" source="SUSE-SU"/>
		<description>
This update for Tomcat fixes the following security issues:

- CVE-2014-7810: Security manager bypass via EL expressions. (bsc#931442)
It was found that the expression language resolver evaluated expressions within a
privileged code section. A malicious web application could have used this flaw to
bypass security manager protections.

- CVE-2014-0227: Limited DoS in chunked transfer encoding input filter. (bsc#917127)
It was discovered that the ChunkedInputFilter implementation did not fail subsequent
attempts to read input early enough. A remote attacker could have used this flaw to
perform a denial of service attack, by streaming an unlimited quantity of data,
leading to consumption of server resources.

- CVE-2014-0230: Non-persistent DoS attack by feeding data by aborting an upload
It was possible for a remote attacker to trigger a non-persistent DoS attack by
feeding data by aborting an upload. (bsc#926762)

Additionally, the following non-security issues have been fixed:

- Fix rights of all files within /usr/share/tomcat6/bin. (bsc#906152)
- Don't overwrite /var/run/tomcat6.pid when Tomcat is already running. (bsc#934219)
- Miscellaneous fixes and improvements to Tomcat's init script. (bsc#932698)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-11"/>
	<updated date="2015-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/906152">SUSE bug 906152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917127">SUSE bug 917127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926762">SUSE bug 926762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931442">SUSE bug 931442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932698">SUSE bug 932698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934219">SUSE bug 934219</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0227/">CVE-2014-0227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0227">CVE-2014-0227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0230/">CVE-2014-0230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0230">CVE-2014-0230 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7810/">CVE-2014-7810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7810">CVE-2014-7810 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586362" comment="tomcat6-6.0.41-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586363" comment="tomcat6-admin-webapps-6.0.41-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586364" comment="tomcat6-docs-webapp-6.0.41-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586365" comment="tomcat6-javadoc-6.0.41-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586366" comment="tomcat6-jsp-2_1-api-6.0.41-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586367" comment="tomcat6-lib-6.0.41-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586368" comment="tomcat6-servlet-2_5-api-6.0.41-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586369" comment="tomcat6-webapps-6.0.41-0.47.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586362" comment="tomcat6-6.0.41-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586363" comment="tomcat6-admin-webapps-6.0.41-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586364" comment="tomcat6-docs-webapp-6.0.41-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586365" comment="tomcat6-javadoc-6.0.41-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586366" comment="tomcat6-jsp-2_1-api-6.0.41-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586367" comment="tomcat6-lib-6.0.41-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586368" comment="tomcat6-servlet-2_5-api-6.0.41-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586369" comment="tomcat6-webapps-6.0.41-0.47.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220461" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="934219" ref_url="https://bugzilla.suse.com/934219" source="BUGZILLA"/>
		<reference ref_id="967815" ref_url="https://bugzilla.suse.com/967815" source="BUGZILLA"/>
		<reference ref_id="967964" ref_url="https://bugzilla.suse.com/967964" source="BUGZILLA"/>
		<reference ref_id="967965" ref_url="https://bugzilla.suse.com/967965" source="BUGZILLA"/>
		<reference ref_id="967967" ref_url="https://bugzilla.suse.com/967967" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5174" ref_url="https://www.suse.com/security/cve/CVE-2015-5174/" source="CVE"/>
		<reference ref_id="CVE-2015-5345" ref_url="https://www.suse.com/security/cve/CVE-2015-5345/" source="CVE"/>
		<reference ref_id="CVE-2016-0706" ref_url="https://www.suse.com/security/cve/CVE-2016-0706/" source="CVE"/>
		<reference ref_id="CVE-2016-0714" ref_url="https://www.suse.com/security/cve/CVE-2016-0714/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001960.html" source="SUSE-SU"/>
		<description>

This update for tomcat6 fixes the following issues:

The version was updated from 6.0.41 to 6.0.45.

Security issues fixed:

* CVE-2015-5174: Directory traversal vulnerability in RequestUtil.java
  in Apache Tomcat allowed remote authenticated users to bypass intended
  SecurityManager restrictions and list a parent directory via a /.. (slash
  dot dot) in a pathname used by a web application in a getResource,
  getResourceAsStream, or getResourcePaths call, as demonstrated by the
  $CATALINA_BASE/webapps directory.  (bsc#967967)
* CVE-2015-5345: The Mapper component in Apache Tomcat processes redirects
  before considering security constraints and Filters, which allowed remote
  attackers to determine the existence of a directory via a URL that lacks
  a trailing / (slash) character. (bsc#967965)
* CVE-2016-0706: Apache Tomcat did not place
  org.apache.catalina.manager.StatusManagerServlet on the
  org/apache/catalina/core/RestrictedServlets.properties list, which
  allowed remote authenticated users to bypass intended SecurityManager
  restrictions and read arbitrary HTTP requests, and consequently discover
  session ID values, via a crafted web application.  (bsc#967815)
* CVE-2016-0714: The session-persistence implementation in Apache Tomcat
  mishandled session attributes, which allowed remote authenticated users
  to bypass intended SecurityManager restrictions and execute arbitrary
  code in a privileged context via a web application that places a crafted
  object in a session. (bsc#967964)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-21"/>
	<updated date="2016-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/934219">SUSE bug 934219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967815">SUSE bug 967815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967964">SUSE bug 967964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967965">SUSE bug 967965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967967">SUSE bug 967967</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5174/">CVE-2015-5174 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5174">CVE-2015-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5345/">CVE-2015-5345 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5345">CVE-2015-5345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0706/">CVE-2016-0706 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0706">CVE-2016-0706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0714/">CVE-2016-0714 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0714">CVE-2016-0714 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575279" comment="tomcat6-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575280" comment="tomcat6-admin-webapps-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575281" comment="tomcat6-docs-webapp-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575282" comment="tomcat6-javadoc-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575283" comment="tomcat6-jsp-2_1-api-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575284" comment="tomcat6-lib-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575285" comment="tomcat6-servlet-2_5-api-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575286" comment="tomcat6-webapps-6.0.45-0.50.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575279" comment="tomcat6-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575280" comment="tomcat6-admin-webapps-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575281" comment="tomcat6-docs-webapp-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575282" comment="tomcat6-javadoc-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575283" comment="tomcat6-jsp-2_1-api-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575284" comment="tomcat6-lib-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575285" comment="tomcat6-servlet-2_5-api-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575286" comment="tomcat6-webapps-6.0.45-0.50.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220462" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1007853" ref_url="https://bugzilla.suse.com/1007853" source="BUGZILLA"/>
		<reference ref_id="1007854" ref_url="https://bugzilla.suse.com/1007854" source="BUGZILLA"/>
		<reference ref_id="1007855" ref_url="https://bugzilla.suse.com/1007855" source="BUGZILLA"/>
		<reference ref_id="1007857" ref_url="https://bugzilla.suse.com/1007857" source="BUGZILLA"/>
		<reference ref_id="1007858" ref_url="https://bugzilla.suse.com/1007858" source="BUGZILLA"/>
		<reference ref_id="1011805" ref_url="https://bugzilla.suse.com/1011805" source="BUGZILLA"/>
		<reference ref_id="1011812" ref_url="https://bugzilla.suse.com/1011812" source="BUGZILLA"/>
		<reference ref_id="1015119" ref_url="https://bugzilla.suse.com/1015119" source="BUGZILLA"/>
		<reference ref_id="1033448" ref_url="https://bugzilla.suse.com/1033448" source="BUGZILLA"/>
		<reference ref_id="1036642" ref_url="https://bugzilla.suse.com/1036642" source="BUGZILLA"/>
		<reference ref_id="988489" ref_url="https://bugzilla.suse.com/988489" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0762" ref_url="https://www.suse.com/security/cve/CVE-2016-0762/" source="CVE"/>
		<reference ref_id="CVE-2016-5018" ref_url="https://www.suse.com/security/cve/CVE-2016-5018/" source="CVE"/>
		<reference ref_id="CVE-2016-5388" ref_url="https://www.suse.com/security/cve/CVE-2016-5388/" source="CVE"/>
		<reference ref_id="CVE-2016-6794" ref_url="https://www.suse.com/security/cve/CVE-2016-6794/" source="CVE"/>
		<reference ref_id="CVE-2016-6796" ref_url="https://www.suse.com/security/cve/CVE-2016-6796/" source="CVE"/>
		<reference ref_id="CVE-2016-6797" ref_url="https://www.suse.com/security/cve/CVE-2016-6797/" source="CVE"/>
		<reference ref_id="CVE-2016-6816" ref_url="https://www.suse.com/security/cve/CVE-2016-6816/" source="CVE"/>
		<reference ref_id="CVE-2016-8735" ref_url="https://www.suse.com/security/cve/CVE-2016-8735/" source="CVE"/>
		<reference ref_id="CVE-2016-8745" ref_url="https://www.suse.com/security/cve/CVE-2016-8745/" source="CVE"/>
		<reference ref_id="CVE-2017-5647" ref_url="https://www.suse.com/security/cve/CVE-2017-5647/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002968.html" source="SUSE-SU"/>
		<description>
This update for tomcat6 fixes the following issues:

Tomcat was updated to version 6.0.53:

The full changelog is:
  http://tomcat.apache.org/tomcat-6.0-doc/changelog.html

Security issues fixed:

- CVE-2017-5647: A bug in the handling of pipelined requests could lead to information disclosure (bsc#1036642)
- CVE-2016-8745: Regression in the error handling methods could lead to information disclosure (bsc#1015119) 
- CVE-2016-8735: Remote code execution vulnerability in JmxRemoteLifecycleListener (bsc#1011805)
- CVE-2016-6816: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests (bsc#1011812)
- CVE-2016-6797: Unrestricted Access to Global Resources (bsc#1007853)
- CVE-2016-6796: Manager Bypass (bsc#1007858)
- CVE-2016-6794: System Property Disclosure (bsc#1007857)
- CVE-2016-5018: Security Manager Bypass (bsc#1007855)
- CVE-2016-0762: Realm Timing Attack (bsc#1007854)
- CVE-2016-5388: an arbitrary HTTP_PROXY environment variable might allow remote attackers to redirect  outbound HTTP traffic (bsc#988489)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-21"/>
	<updated date="2017-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1007853">SUSE bug 1007853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007854">SUSE bug 1007854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007855">SUSE bug 1007855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007857">SUSE bug 1007857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007858">SUSE bug 1007858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011805">SUSE bug 1011805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011812">SUSE bug 1011812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015119">SUSE bug 1015119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033448">SUSE bug 1033448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036642">SUSE bug 1036642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0762/">CVE-2016-0762 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0762">CVE-2016-0762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5018/">CVE-2016-5018 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5018">CVE-2016-5018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5388/">CVE-2016-5388 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5388">CVE-2016-5388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6794/">CVE-2016-6794 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6794">CVE-2016-6794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6796/">CVE-2016-6796 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6796">CVE-2016-6796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6797/">CVE-2016-6797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6797">CVE-2016-6797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6816/">CVE-2016-6816 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6816">CVE-2016-6816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8735/">CVE-2016-8735 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8735">CVE-2016-8735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8745/">CVE-2016-8745 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8745">CVE-2016-8745 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5647/">CVE-2017-5647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5647">CVE-2017-5647 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569238" comment="tomcat6-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569239" comment="tomcat6-admin-webapps-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569240" comment="tomcat6-docs-webapp-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569241" comment="tomcat6-javadoc-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569242" comment="tomcat6-jsp-2_1-api-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569243" comment="tomcat6-lib-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569244" comment="tomcat6-servlet-2_5-api-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569245" comment="tomcat6-webapps-6.0.53-0.56.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569238" comment="tomcat6-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569239" comment="tomcat6-admin-webapps-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569240" comment="tomcat6-docs-webapp-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569241" comment="tomcat6-javadoc-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569242" comment="tomcat6-jsp-2_1-api-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569243" comment="tomcat6-lib-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569244" comment="tomcat6-servlet-2_5-api-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569245" comment="tomcat6-webapps-6.0.53-0.56.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220463" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1042910" ref_url="https://bugzilla.suse.com/1042910" source="BUGZILLA"/>
		<reference ref_id="1082480" ref_url="https://bugzilla.suse.com/1082480" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5664" ref_url="https://www.suse.com/security/cve/CVE-2017-5664/" source="CVE"/>
		<reference ref_id="CVE-2018-1304" ref_url="https://www.suse.com/security/cve/CVE-2018-1304/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004231.html" source="SUSE-SU"/>
		<description>
This update for tomcat6 fixes the following security issues:

- : The error page mechanism of the Java Servlet Specification
  requires that, when an error occurs and an error page is configured for the
  error that occurred, the original request and response are forwarded to the
  error page. This means that the request is presented to the error page with the
  original HTTP method. If the error page is a static file, expected behaviour is
  to serve content of the file as if processing a GET request, regardless of the
  actual HTTP method. The Default Servlet in Tomcat did not do this. Depending on
  the original request this could lead to unexpected and undesirable results for
  static error pages including, if the DefaultServlet is configured to permit
  writes, the replacement or removal of the custom error page (bsc#1042910).
- : The URL pattern of '' was not correctly handled when used as
  part of a security constraint definition. This caused the constraint to be
  ignored. It was possible for unauthorised users to gain access to web
  application resources that should have been protected. Only security
  constraints with a URL pattern of the empty string were affected (bsc#1082480).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-29"/>
	<updated date="2018-06-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042910">SUSE bug 1042910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082480">SUSE bug 1082480</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5664/">CVE-2017-5664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5664">CVE-2017-5664 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1304/">CVE-2018-1304 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1304">CVE-2018-1304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575287" comment="tomcat6-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575288" comment="tomcat6-admin-webapps-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575289" comment="tomcat6-docs-webapp-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575290" comment="tomcat6-javadoc-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575291" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575292" comment="tomcat6-lib-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575293" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575294" comment="tomcat6-webapps-6.0.53-0.57.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575287" comment="tomcat6-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575288" comment="tomcat6-admin-webapps-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575289" comment="tomcat6-docs-webapp-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575290" comment="tomcat6-javadoc-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575291" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575292" comment="tomcat6-lib-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575293" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575294" comment="tomcat6-webapps-6.0.53-0.57.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220464" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1110850" ref_url="https://bugzilla.suse.com/1110850" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11784" ref_url="https://www.suse.com/security/cve/CVE-2018-11784/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004904.html" source="SUSE-SU"/>
		<description>
This update for tomcat6 fixes the following issue:

Security issue fixed:

- CVE-2018-11784: Fixed problem with specially crafted URLs that could be used to cause a redirect to any URI of an attackers choise (bsc#1110850).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-28"/>
	<updated date="2018-11-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1110850">SUSE bug 1110850</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-11784/">CVE-2018-11784 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11784">CVE-2018-11784 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575295" comment="tomcat6-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575296" comment="tomcat6-admin-webapps-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575297" comment="tomcat6-docs-webapp-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575298" comment="tomcat6-javadoc-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575299" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575300" comment="tomcat6-lib-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575301" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575302" comment="tomcat6-webapps-6.0.53-0.57.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575295" comment="tomcat6-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575296" comment="tomcat6-admin-webapps-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575297" comment="tomcat6-docs-webapp-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575298" comment="tomcat6-javadoc-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575299" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575300" comment="tomcat6-lib-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575301" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575302" comment="tomcat6-webapps-6.0.53-0.57.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220465" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1164692" ref_url="https://bugzilla.suse.com/1164692" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006646.html" source="SUSE-SU"/>
		<description>
This update for tomcat6 fixes the following issues:

- CVE-2020-1938: Fixed a file contents disclosure vulnerability (bsc#1164692).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-27"/>
	<updated date="2020-03-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1164692">SUSE bug 1164692</bugzilla>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1938">CVE-2020-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569246" comment="tomcat6-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569247" comment="tomcat6-admin-webapps-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569248" comment="tomcat6-docs-webapp-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569249" comment="tomcat6-javadoc-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569250" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569251" comment="tomcat6-lib-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569252" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569253" comment="tomcat6-webapps-6.0.53-0.57.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220466" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1136085" ref_url="https://bugzilla.suse.com/1136085" source="BUGZILLA"/>
		<reference ref_id="1159723" ref_url="https://bugzilla.suse.com/1159723" source="BUGZILLA"/>
		<reference ref_id="1171928" ref_url="https://bugzilla.suse.com/1171928" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0221" ref_url="https://www.suse.com/security/cve/CVE-2019-0221/" source="CVE"/>
		<reference ref_id="CVE-2019-12418" ref_url="https://www.suse.com/security/cve/CVE-2019-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-9484" ref_url="https://www.suse.com/security/cve/CVE-2020-9484/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006850.html" source="SUSE-SU"/>
		<description>
This update for tomcat6 fixes the following issues:

CVE-2020-9484 (bsc#1171928)
Apache Tomcat Remote Code Execution via session persistence

If an attacker was able to control the contents and name of a file on a
server configured to use the PersistenceManager, then the attacker could
have triggered a remote code execution via deserialization of the file under
their control.

CVE-2019-12418 (bsc#1159723)
Local privilege escalation by manipulating the RMI registry and performing a man-in-the-middle attack

When Tomcat is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files was able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface.
The attacker could then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.

CVE-2019-0221 (bsc#1136085)
The SSI printenv command echoed user provided data without escaping, which
made it vulnerable to XSS.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-22"/>
	<updated date="2020-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136085">SUSE bug 1136085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159723">SUSE bug 1159723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171928">SUSE bug 1171928</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0221/">CVE-2019-0221 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0221">CVE-2019-0221 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12418/">CVE-2019-12418 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12418">CVE-2019-12418 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9484/">CVE-2020-9484 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9484">CVE-2020-9484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569254" comment="tomcat6-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569255" comment="tomcat6-admin-webapps-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569256" comment="tomcat6-docs-webapp-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569257" comment="tomcat6-javadoc-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569258" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569259" comment="tomcat6-lib-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569260" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569261" comment="tomcat6-webapps-6.0.53-0.57.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220467" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1059554" ref_url="https://bugzilla.suse.com/1059554" source="BUGZILLA"/>
		<reference ref_id="1180947" ref_url="https://bugzilla.suse.com/1180947" source="BUGZILLA"/>
		<reference ref_id="1182909" ref_url="https://bugzilla.suse.com/1182909" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12617" ref_url="https://www.suse.com/security/cve/CVE-2017-12617/" source="CVE"/>
		<reference ref_id="CVE-2021-24122" ref_url="https://www.suse.com/security/cve/CVE-2021-24122/" source="CVE"/>
		<reference ref_id="CVE-2021-25329" ref_url="https://www.suse.com/security/cve/CVE-2021-25329/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008669.html" source="SUSE-SU"/>
		<description>
This update for tomcat6 fixes the following issues:

- CVE-2021-25329: Fixed completely CVE-2020-9484 (bsc#1182909).
- CVE-2021-24122: Fixed an information disclosure (bsc#1180947).
- CVE-2017-12617: Fixed a file inclusion vulnerability through a crafted request (bsc#1059554).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-21"/>
	<updated date="2021-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059554">SUSE bug 1059554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180947">SUSE bug 1180947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182909">SUSE bug 1182909</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12617/">CVE-2017-12617 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12617">CVE-2017-12617 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-24122/">CVE-2021-24122 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24122">CVE-2021-24122 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25329/">CVE-2021-25329 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25329">CVE-2021-25329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569262" comment="tomcat6-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569263" comment="tomcat6-admin-webapps-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569264" comment="tomcat6-docs-webapp-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569265" comment="tomcat6-javadoc-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569266" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569267" comment="tomcat6-lib-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569268" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569269" comment="tomcat6-webapps-6.0.53-0.57.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220468" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1069257" ref_url="https://bugzilla.suse.com/1069257" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16899" ref_url="https://www.suse.com/security/cve/CVE-2017-16899/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003636.html" source="SUSE-SU"/>
		<description>
This update for transfig fixes the following issues:

Security issue fixed:

- CVE-2017-16899: Fix array index error in the fig2dev program (bsc#1069257).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1069257">SUSE bug 1069257</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16899/">CVE-2017-16899 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16899">CVE-2017-16899 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586370" comment="transfig-3.2.5-160.3.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586370" comment="transfig-3.2.5-160.3.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220469" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1136882" ref_url="https://bugzilla.suse.com/1136882" source="BUGZILLA"/>
		<reference ref_id="1143650" ref_url="https://bugzilla.suse.com/1143650" source="BUGZILLA"/>
		<reference ref_id="1159130" ref_url="https://bugzilla.suse.com/1159130" source="BUGZILLA"/>
		<reference ref_id="1159293" ref_url="https://bugzilla.suse.com/1159293" source="BUGZILLA"/>
		<reference ref_id="1161698" ref_url="https://bugzilla.suse.com/1161698" source="BUGZILLA"/>
		<reference ref_id="1186329" ref_url="https://bugzilla.suse.com/1186329" source="BUGZILLA"/>
		<reference ref_id="1189325" ref_url="https://bugzilla.suse.com/1189325" source="BUGZILLA"/>
		<reference ref_id="1189343" ref_url="https://bugzilla.suse.com/1189343" source="BUGZILLA"/>
		<reference ref_id="1189345" ref_url="https://bugzilla.suse.com/1189345" source="BUGZILLA"/>
		<reference ref_id="1189346" ref_url="https://bugzilla.suse.com/1189346" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14275" ref_url="https://www.suse.com/security/cve/CVE-2019-14275/" source="CVE"/>
		<reference ref_id="CVE-2019-19555" ref_url="https://www.suse.com/security/cve/CVE-2019-19555/" source="CVE"/>
		<reference ref_id="CVE-2019-19746" ref_url="https://www.suse.com/security/cve/CVE-2019-19746/" source="CVE"/>
		<reference ref_id="CVE-2019-19797" ref_url="https://www.suse.com/security/cve/CVE-2019-19797/" source="CVE"/>
		<reference ref_id="CVE-2020-21680" ref_url="https://www.suse.com/security/cve/CVE-2020-21680/" source="CVE"/>
		<reference ref_id="CVE-2020-21681" ref_url="https://www.suse.com/security/cve/CVE-2020-21681/" source="CVE"/>
		<reference ref_id="CVE-2020-21682" ref_url="https://www.suse.com/security/cve/CVE-2020-21682/" source="CVE"/>
		<reference ref_id="CVE-2020-21683" ref_url="https://www.suse.com/security/cve/CVE-2020-21683/" source="CVE"/>
		<reference ref_id="CVE-2021-3561" ref_url="https://www.suse.com/security/cve/CVE-2021-3561/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009541.html" source="SUSE-SU"/>
		<description>
This update for transfig fixes the following issues:

- CVE-2021-3561: Fixed global buffer overflow in fig2dev/read.c in function read_colordef() (bsc#1186329).
- CVE-2019-19797: Fixed out-of-bounds write in read_colordef in read.c (bsc#1159293).
- CVE-2019-19746: Fixed segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type (bsc#1159130).
- CVE-2019-19555: Fixed stack-based buffer overflow because of an incorrect sscanf (bsc#1161698).
- CVE-2019-14275: Fixed stack-based buffer overflow in the calc_arrow function in bound.c (bsc#1143650).
- CVE-2020-21680: Fixed a stack-based buffer overflow in the put_arrow() component in genpict2e.c (bsc#1189343).
- CVE-2020-21681: Fixed a global buffer overflow in the set_color component in genge.c (bsc#1189345).
- CVE-2020-21682: Fixed a global buffer overflow in the set_fill component in genge.c (bsc#1189346).
- CVE-2020-21683: Fixed a global buffer overflow in the shade_or_tint_name_after_declare_color in genpstricks.c (bsc#1189325).

- Do hardening via compile and linker flags 
- Fixed last added upstream commit (boo#1136882)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136882">SUSE bug 1136882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143650">SUSE bug 1143650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159130">SUSE bug 1159130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159293">SUSE bug 1159293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161698">SUSE bug 1161698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186329">SUSE bug 1186329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189325">SUSE bug 1189325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189343">SUSE bug 1189343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189345">SUSE bug 1189345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189346">SUSE bug 1189346</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14275/">CVE-2019-14275 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14275">CVE-2019-14275 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19555/">CVE-2019-19555 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19555">CVE-2019-19555 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19746/">CVE-2019-19746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19746">CVE-2019-19746 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19797/">CVE-2019-19797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19797">CVE-2019-19797 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21680/">CVE-2020-21680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21680">CVE-2020-21680 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21681/">CVE-2020-21681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21681">CVE-2020-21681 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21682/">CVE-2020-21682 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21682">CVE-2020-21682 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21683/">CVE-2020-21683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21683">CVE-2020-21683 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3561/">CVE-2021-3561 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3561">CVE-2021-3561 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651177" comment="transfig-3.2.8a-1.160.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220470" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1190607" ref_url="https://bugzilla.suse.com/1190607" source="BUGZILLA"/>
		<reference ref_id="1190611" ref_url="https://bugzilla.suse.com/1190611" source="BUGZILLA"/>
		<reference ref_id="1190612" ref_url="https://bugzilla.suse.com/1190612" source="BUGZILLA"/>
		<reference ref_id="1190615" ref_url="https://bugzilla.suse.com/1190615" source="BUGZILLA"/>
		<reference ref_id="1190616" ref_url="https://bugzilla.suse.com/1190616" source="BUGZILLA"/>
		<reference ref_id="1190617" ref_url="https://bugzilla.suse.com/1190617" source="BUGZILLA"/>
		<reference ref_id="1190618" ref_url="https://bugzilla.suse.com/1190618" source="BUGZILLA"/>
		<reference ref_id="1192019" ref_url="https://bugzilla.suse.com/1192019" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-21529" ref_url="https://www.suse.com/security/cve/CVE-2020-21529/" source="CVE"/>
		<reference ref_id="CVE-2020-21530" ref_url="https://www.suse.com/security/cve/CVE-2020-21530/" source="CVE"/>
		<reference ref_id="CVE-2020-21531" ref_url="https://www.suse.com/security/cve/CVE-2020-21531/" source="CVE"/>
		<reference ref_id="CVE-2020-21532" ref_url="https://www.suse.com/security/cve/CVE-2020-21532/" source="CVE"/>
		<reference ref_id="CVE-2020-21533" ref_url="https://www.suse.com/security/cve/CVE-2020-21533/" source="CVE"/>
		<reference ref_id="CVE-2020-21534" ref_url="https://www.suse.com/security/cve/CVE-2020-21534/" source="CVE"/>
		<reference ref_id="CVE-2020-21535" ref_url="https://www.suse.com/security/cve/CVE-2020-21535/" source="CVE"/>
		<reference ref_id="CVE-2021-32280" ref_url="https://www.suse.com/security/cve/CVE-2021-32280/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009686.html" source="SUSE-SU"/>
		<description>
This update for transfig fixes the following issues:

Update to fig2dev version 3.2.8 Patchlevel 8b (Aug 2021)

- bsc#1190618, CVE-2020-21529: stack buffer overflow in the bezier_spline function in genepic.c.
- bsc#1190615, CVE-2020-21530: segmentation fault in the read_objects function in read.c.
- bsc#1190617, CVE-2020-21531: global buffer overflow in the conv_pattern_index function in gencgm.c.
- bsc#1190616, CVE-2020-21532: global buffer overflow in the setfigfont function in genepic.c.
- bsc#1190612, CVE-2020-21533: stack buffer overflow in the read_textobject function in read.c.
- bsc#1190611, CVE-2020-21534: global buffer overflow in the get_line function in read.c.
- bsc#1190607, CVE-2020-21535: segmentation fault in the gencgm_start function in gencgm.c.
- bsc#1192019, CVE-2021-32280: NULL pointer dereference in compute_closed_spline() in trans_spline.c
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-02"/>
	<updated date="2021-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190607">SUSE bug 1190607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190611">SUSE bug 1190611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190612">SUSE bug 1190612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190615">SUSE bug 1190615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190616">SUSE bug 1190616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190617">SUSE bug 1190617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190618">SUSE bug 1190618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192019">SUSE bug 1192019</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21529/">CVE-2020-21529 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21529">CVE-2020-21529 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21530/">CVE-2020-21530 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21530">CVE-2020-21530 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21531/">CVE-2020-21531 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21531">CVE-2020-21531 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21532/">CVE-2020-21532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21532">CVE-2020-21532 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21533/">CVE-2020-21533 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21533">CVE-2020-21533 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21534/">CVE-2020-21534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21534">CVE-2020-21534 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21535/">CVE-2020-21535 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21535">CVE-2020-21535 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32280/">CVE-2021-32280 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32280">CVE-2021-32280 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653707" comment="transfig-3.2.8b-160.16.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220471" version="1" class="patch">
	<metadata>
		<title>Security update for unrar (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1045315" ref_url="https://bugzilla.suse.com/1045315" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003000.html" source="SUSE-SU"/>
		<description>
This update for unrar fixes the following issues:

- CVE-2012-6706: decoding malicious RAR files could have lead to memory corruption or code execution. (bsc#1045315).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-03"/>
	<updated date="2017-07-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045315">SUSE bug 1045315</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6706">CVE-2012-6706 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586371" comment="unrar-3.80.2-4.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586371" comment="unrar-3.80.2-4.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220472" version="1" class="patch">
	<metadata>
		<title>Security update for unrar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1046882" ref_url="https://bugzilla.suse.com/1046882" source="BUGZILLA"/>
		<reference ref_id="1054038" ref_url="https://bugzilla.suse.com/1054038" source="BUGZILLA"/>
		<reference ref_id="513804" ref_url="https://bugzilla.suse.com/513804" source="BUGZILLA"/>
		<reference ref_id="693890" ref_url="https://bugzilla.suse.com/693890" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="CVE-2017-12938" ref_url="https://www.suse.com/security/cve/CVE-2017-12938/" source="CVE"/>
		<reference ref_id="CVE-2017-12940" ref_url="https://www.suse.com/security/cve/CVE-2017-12940/" source="CVE"/>
		<reference ref_id="CVE-2017-12941" ref_url="https://www.suse.com/security/cve/CVE-2017-12941/" source="CVE"/>
		<reference ref_id="CVE-2017-12942" ref_url="https://www.suse.com/security/cve/CVE-2017-12942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003863.html" source="SUSE-SU"/>
		<description>
This update for unrar to version 5.6.1 fixes several issues.

These security issues were fixed:

- CVE-2017-12938: Prevent remote attackers to bypass a directory-traversal
  protection mechanism via vectors involving a symlink to the . directory, a
  symlink to the .. directory, and a regular file (bsc#1054038).
- CVE-2017-12940: Prevent out-of-bounds read in the EncodeFileName::Decode call
  within the Archive::ReadHeader15 function (bsc#1054038).
- CVE-2017-12941: Prevent an out-of-bounds read in the Unpack::Unpack20
  function (bsc#1054038).
- CVE-2017-12942: Prevent a buffer overflow in the Unpack::LongLZ function
  (bsc#1054038).

These non-security issues were fixed:

- Added extraction support for .LZ archives created by Lzip compressor
- Enable unpacking of files in ZIP archives compressed with XZ algorithm and
  encrypted with AES
- Added support for PAX extended headers inside of TAR archive
- If RAR recovery volumes (.rev files) are present in the same folder as usual
  RAR volumes, archive test command verifies .rev contents after completing
  testing .rar files
- By default unrar skips symbolic links with absolute paths in link target when
  extracting unless -ola command line switch is specified
- Added support for AES-NI CPU instructions 
- Support for a new RAR 5.0 archiving format
- Wildcard exclusion mask for folders
- Added libunrar* and libunrar*-devel subpackages (bsc#513804)
- Prevent conditional jumps depending on uninitialised values (bsc#1046882)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046882">SUSE bug 1046882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054038">SUSE bug 1054038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/513804">SUSE bug 513804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693890">SUSE bug 693890</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6706">CVE-2012-6706 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12938/">CVE-2017-12938 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12938">CVE-2017-12938 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12940/">CVE-2017-12940 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12940">CVE-2017-12940 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12941/">CVE-2017-12941 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12941">CVE-2017-12941 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12942/">CVE-2017-12942 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12942">CVE-2017-12942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586372" comment="unrar-5.6.1-5.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586372" comment="unrar-5.6.1-5.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220473" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1013992" ref_url="https://bugzilla.suse.com/1013992" source="BUGZILLA"/>
		<reference ref_id="1013993" ref_url="https://bugzilla.suse.com/1013993" source="BUGZILLA"/>
		<reference ref_id="950110" ref_url="https://bugzilla.suse.com/950110" source="BUGZILLA"/>
		<reference ref_id="950111" ref_url="https://bugzilla.suse.com/950111" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9913" ref_url="https://www.suse.com/security/cve/CVE-2014-9913/" source="CVE"/>
		<reference ref_id="CVE-2015-7696" ref_url="https://www.suse.com/security/cve/CVE-2015-7696/" source="CVE"/>
		<reference ref_id="CVE-2015-7697" ref_url="https://www.suse.com/security/cve/CVE-2015-7697/" source="CVE"/>
		<reference ref_id="CVE-2016-9844" ref_url="https://www.suse.com/security/cve/CVE-2016-9844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002686.html" source="SUSE-SU"/>
		<description>
This update for unzip fixes the following issues:

- CVE-2014-9913: Specially crafted zip files could trigger invalid memory writes possibly resulting in DoS or corruption (bsc#1013993)
- CVE-2015-7696: Specially crafted zip files with password protection could trigger a crash and lead to denial of service (bsc#950110)
- CVE-2015-7697: Specially crafted zip files could trigger an endless loop and lead to denial of service (bsc#950111)
- CVE-2016-9844: Specially crafted zip files could trigger invalid memory writes possibly resulting in DoS or corruption (bsc#1013992)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-06"/>
	<updated date="2017-03-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013992">SUSE bug 1013992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013993">SUSE bug 1013993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950110">SUSE bug 950110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950111">SUSE bug 950111</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9913/">CVE-2014-9913 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9913">CVE-2014-9913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7696/">CVE-2015-7696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7696">CVE-2015-7696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7697/">CVE-2015-7697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7697">CVE-2015-7697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9844/">CVE-2016-9844 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9844">CVE-2016-9844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586373" comment="unzip-6.00-11.17.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586373" comment="unzip-6.00-11.17.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220474" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1080074" ref_url="https://bugzilla.suse.com/1080074" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000035" ref_url="https://www.suse.com/security/cve/CVE-2018-1000035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003738.html" source="SUSE-SU"/>
		<description>
This update for unzip fixes the following issues:

- CVE-2018-1000035: Fixed a heap-based buffer overflow in password protected ZIP archives (bsc#1080074)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1080074">SUSE bug 1080074</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000035/">CVE-2018-1000035 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000035">CVE-2018-1000035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586374" comment="unzip-6.00-11.18.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586374" comment="unzip-6.00-11.18.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220475" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1110194" ref_url="https://bugzilla.suse.com/1110194" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18384" ref_url="https://www.suse.com/security/cve/CVE-2018-18384/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005218.html" source="SUSE-SU"/>
		<description>
This update for unzip fixes the following issues:

- CVE-2018-18384: Fixed a buffer overflow when listing archives (bsc#1110194)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-21"/>
	<updated date="2019-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1110194">SUSE bug 1110194</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18384/">CVE-2018-18384 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18384">CVE-2018-18384 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586375" comment="unzip-6.00-11.18.8.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586375" comment="unzip-6.00-11.18.8.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220476" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1010685" ref_url="https://bugzilla.suse.com/1010685" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1248" ref_url="https://www.suse.com/security/cve/CVE-2016-1248/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002427.html" source="SUSE-SU"/>
		<description>

This update for vim fixes the following security issues:

- Fixed CVE-2016-1248, an arbitrary command execution vulnerability
  (bsc#1010685)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-29"/>
	<updated date="2016-11-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010685">SUSE bug 1010685</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1248/">CVE-2016-1248 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1248">CVE-2016-1248 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586376" comment="gvim-7.2-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586377" comment="vim-7.2-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586378" comment="vim-base-7.2-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586379" comment="vim-data-7.2-8.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586376" comment="gvim-7.2-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586377" comment="vim-7.2-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586378" comment="vim-base-7.2-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586379" comment="vim-data-7.2-8.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220477" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1024724" ref_url="https://bugzilla.suse.com/1024724" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5953" ref_url="https://www.suse.com/security/cve/CVE-2017-5953/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003007.html" source="SUSE-SU"/>
		<description>

This update for vim fixes the following issues:

- CVE-2017-5953: Fixed a possible overflow with corrupted spell file (bsc#1024724)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-04"/>
	<updated date="2017-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024724">SUSE bug 1024724</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5953/">CVE-2017-5953 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5953">CVE-2017-5953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586380" comment="gvim-7.2-8.20.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586381" comment="vim-7.2-8.20.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586382" comment="vim-base-7.2-8.20.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586383" comment="vim-data-7.2-8.20.8 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586380" comment="gvim-7.2-8.20.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586381" comment="vim-7.2-8.20.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586382" comment="vim-base-7.2-8.20.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586383" comment="vim-data-7.2-8.20.8 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220478" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1137443" ref_url="https://bugzilla.suse.com/1137443" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12735" ref_url="https://www.suse.com/security/cve/CVE-2019-12735/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005546.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:
	  
Security issue fixed: 

- CVE-2019-12735: Fixed a potential arbitrary code execution vulnerability in getchar.c (bsc#1137443).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-11"/>
	<updated date="2019-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137443">SUSE bug 1137443</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12735/">CVE-2019-12735 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12735">CVE-2019-12735 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586384" comment="gvim-7.2-8.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586385" comment="vim-7.2-8.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586386" comment="vim-base-7.2-8.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586387" comment="vim-data-7.2-8.21.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220479" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1172225" ref_url="https://bugzilla.suse.com/1172225" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20807" ref_url="https://www.suse.com/security/cve/CVE-2019-20807/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006887.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

- CVE-2019-20807: Fixed an issue where escaping from the restrictive mode of vim
  was possible using interfaces (bsc#1172225). 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172225">SUSE bug 1172225</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-20807/">CVE-2019-20807 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20807">CVE-2019-20807 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586388" comment="gvim-7.2-8.21.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586389" comment="vim-7.2-8.21.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586390" comment="vim-base-7.2-8.21.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586391" comment="vim-data-7.2-8.21.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220480" version="1" class="patch">
	<metadata>
		<title>Security update for w3m (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1011269" ref_url="https://bugzilla.suse.com/1011269" source="BUGZILLA"/>
		<reference ref_id="1011270" ref_url="https://bugzilla.suse.com/1011270" source="BUGZILLA"/>
		<reference ref_id="1011271" ref_url="https://bugzilla.suse.com/1011271" source="BUGZILLA"/>
		<reference ref_id="1011272" ref_url="https://bugzilla.suse.com/1011272" source="BUGZILLA"/>
		<reference ref_id="1011283" ref_url="https://bugzilla.suse.com/1011283" source="BUGZILLA"/>
		<reference ref_id="1011284" ref_url="https://bugzilla.suse.com/1011284" source="BUGZILLA"/>
		<reference ref_id="1011285" ref_url="https://bugzilla.suse.com/1011285" source="BUGZILLA"/>
		<reference ref_id="1011286" ref_url="https://bugzilla.suse.com/1011286" source="BUGZILLA"/>
		<reference ref_id="1011287" ref_url="https://bugzilla.suse.com/1011287" source="BUGZILLA"/>
		<reference ref_id="1011288" ref_url="https://bugzilla.suse.com/1011288" source="BUGZILLA"/>
		<reference ref_id="1011289" ref_url="https://bugzilla.suse.com/1011289" source="BUGZILLA"/>
		<reference ref_id="1011290" ref_url="https://bugzilla.suse.com/1011290" source="BUGZILLA"/>
		<reference ref_id="1011291" ref_url="https://bugzilla.suse.com/1011291" source="BUGZILLA"/>
		<reference ref_id="1011292" ref_url="https://bugzilla.suse.com/1011292" source="BUGZILLA"/>
		<reference ref_id="1011293" ref_url="https://bugzilla.suse.com/1011293" source="BUGZILLA"/>
		<reference ref_id="1012020" ref_url="https://bugzilla.suse.com/1012020" source="BUGZILLA"/>
		<reference ref_id="1012021" ref_url="https://bugzilla.suse.com/1012021" source="BUGZILLA"/>
		<reference ref_id="1012022" ref_url="https://bugzilla.suse.com/1012022" source="BUGZILLA"/>
		<reference ref_id="1012023" ref_url="https://bugzilla.suse.com/1012023" source="BUGZILLA"/>
		<reference ref_id="1012024" ref_url="https://bugzilla.suse.com/1012024" source="BUGZILLA"/>
		<reference ref_id="1012025" ref_url="https://bugzilla.suse.com/1012025" source="BUGZILLA"/>
		<reference ref_id="1012026" ref_url="https://bugzilla.suse.com/1012026" source="BUGZILLA"/>
		<reference ref_id="1012027" ref_url="https://bugzilla.suse.com/1012027" source="BUGZILLA"/>
		<reference ref_id="1012028" ref_url="https://bugzilla.suse.com/1012028" source="BUGZILLA"/>
		<reference ref_id="1012029" ref_url="https://bugzilla.suse.com/1012029" source="BUGZILLA"/>
		<reference ref_id="1012030" ref_url="https://bugzilla.suse.com/1012030" source="BUGZILLA"/>
		<reference ref_id="1012031" ref_url="https://bugzilla.suse.com/1012031" source="BUGZILLA"/>
		<reference ref_id="1012032" ref_url="https://bugzilla.suse.com/1012032" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2074" ref_url="https://www.suse.com/security/cve/CVE-2010-2074/" source="CVE"/>
		<reference ref_id="CVE-2016-9422" ref_url="https://www.suse.com/security/cve/CVE-2016-9422/" source="CVE"/>
		<reference ref_id="CVE-2016-9423" ref_url="https://www.suse.com/security/cve/CVE-2016-9423/" source="CVE"/>
		<reference ref_id="CVE-2016-9424" ref_url="https://www.suse.com/security/cve/CVE-2016-9424/" source="CVE"/>
		<reference ref_id="CVE-2016-9425" ref_url="https://www.suse.com/security/cve/CVE-2016-9425/" source="CVE"/>
		<reference ref_id="CVE-2016-9434" ref_url="https://www.suse.com/security/cve/CVE-2016-9434/" source="CVE"/>
		<reference ref_id="CVE-2016-9435" ref_url="https://www.suse.com/security/cve/CVE-2016-9435/" source="CVE"/>
		<reference ref_id="CVE-2016-9436" ref_url="https://www.suse.com/security/cve/CVE-2016-9436/" source="CVE"/>
		<reference ref_id="CVE-2016-9437" ref_url="https://www.suse.com/security/cve/CVE-2016-9437/" source="CVE"/>
		<reference ref_id="CVE-2016-9438" ref_url="https://www.suse.com/security/cve/CVE-2016-9438/" source="CVE"/>
		<reference ref_id="CVE-2016-9439" ref_url="https://www.suse.com/security/cve/CVE-2016-9439/" source="CVE"/>
		<reference ref_id="CVE-2016-9440" ref_url="https://www.suse.com/security/cve/CVE-2016-9440/" source="CVE"/>
		<reference ref_id="CVE-2016-9441" ref_url="https://www.suse.com/security/cve/CVE-2016-9441/" source="CVE"/>
		<reference ref_id="CVE-2016-9442" ref_url="https://www.suse.com/security/cve/CVE-2016-9442/" source="CVE"/>
		<reference ref_id="CVE-2016-9443" ref_url="https://www.suse.com/security/cve/CVE-2016-9443/" source="CVE"/>
		<reference ref_id="CVE-2016-9621" ref_url="https://www.suse.com/security/cve/CVE-2016-9621/" source="CVE"/>
		<reference ref_id="CVE-2016-9622" ref_url="https://www.suse.com/security/cve/CVE-2016-9622/" source="CVE"/>
		<reference ref_id="CVE-2016-9623" ref_url="https://www.suse.com/security/cve/CVE-2016-9623/" source="CVE"/>
		<reference ref_id="CVE-2016-9624" ref_url="https://www.suse.com/security/cve/CVE-2016-9624/" source="CVE"/>
		<reference ref_id="CVE-2016-9625" ref_url="https://www.suse.com/security/cve/CVE-2016-9625/" source="CVE"/>
		<reference ref_id="CVE-2016-9626" ref_url="https://www.suse.com/security/cve/CVE-2016-9626/" source="CVE"/>
		<reference ref_id="CVE-2016-9627" ref_url="https://www.suse.com/security/cve/CVE-2016-9627/" source="CVE"/>
		<reference ref_id="CVE-2016-9628" ref_url="https://www.suse.com/security/cve/CVE-2016-9628/" source="CVE"/>
		<reference ref_id="CVE-2016-9629" ref_url="https://www.suse.com/security/cve/CVE-2016-9629/" source="CVE"/>
		<reference ref_id="CVE-2016-9630" ref_url="https://www.suse.com/security/cve/CVE-2016-9630/" source="CVE"/>
		<reference ref_id="CVE-2016-9631" ref_url="https://www.suse.com/security/cve/CVE-2016-9631/" source="CVE"/>
		<reference ref_id="CVE-2016-9632" ref_url="https://www.suse.com/security/cve/CVE-2016-9632/" source="CVE"/>
		<reference ref_id="CVE-2016-9633" ref_url="https://www.suse.com/security/cve/CVE-2016-9633/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<description>

This update for w3m fixes the following issues:

- update to debian git version (bsc#1011293)
  addressed security issues:
         CVE-2016-9621: w3m: global-buffer-overflow write (bsc#1012020)
         CVE-2016-9622: w3m: null deref (bsc#1012021)
         CVE-2016-9623: w3m: null deref (bsc#1012022)
         CVE-2016-9624: w3m: near-null deref (bsc#1012023)
         CVE-2016-9625: w3m: stack overflow (bsc#1012024)
         CVE-2016-9626: w3m: stack overflow (bsc#1012025)
         CVE-2016-9627: w3m: heap overflow read + deref (bsc#1012026)
         CVE-2016-9628: w3m: null deref (bsc#1012027)
         CVE-2016-9629: w3m: null deref (bsc#1012028)
         CVE-2016-9630: w3m: global-buffer-overflow read (bsc#1012029)
         CVE-2016-9631: w3m: null deref (bsc#1012030)
         CVE-2016-9632: w3m: global-buffer-overflow read (bsc#1012031)
         CVE-2016-9633: w3m: OOM (bsc#1012032)
         CVE-2016-9434: w3m: null deref (bsc#1011283)
         CVE-2016-9435: w3m: use uninit value (bsc#1011284)
         CVE-2016-9436: w3m: use uninit value (bsc#1011285)
         CVE-2016-9437: w3m: write to rodata (bsc#1011286)
         CVE-2016-9438: w3m: null deref (bsc#1011287)
         CVE-2016-9439: w3m: stack overflow (bsc#1011288)
         CVE-2016-9440: w3m: near-null deref (bsc#1011289)
         CVE-2016-9441: w3m: near-null deref (bsc#1011290)
         CVE-2016-9442: w3m: potential heap buffer corruption (bsc#1011291)
         CVE-2016-9443: w3m: null deref (bsc#1011292)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-07"/>
	<updated date="2016-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011269">SUSE bug 1011269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011270">SUSE bug 1011270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011271">SUSE bug 1011271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011272">SUSE bug 1011272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011283">SUSE bug 1011283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011284">SUSE bug 1011284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011285">SUSE bug 1011285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011286">SUSE bug 1011286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011287">SUSE bug 1011287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011288">SUSE bug 1011288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011289">SUSE bug 1011289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011290">SUSE bug 1011290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011291">SUSE bug 1011291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011292">SUSE bug 1011292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012020">SUSE bug 1012020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012021">SUSE bug 1012021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012022">SUSE bug 1012022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012023">SUSE bug 1012023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012024">SUSE bug 1012024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012025">SUSE bug 1012025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012026">SUSE bug 1012026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012027">SUSE bug 1012027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012028">SUSE bug 1012028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012029">SUSE bug 1012029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012030">SUSE bug 1012030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012031">SUSE bug 1012031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012032">SUSE bug 1012032</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2074/">CVE-2010-2074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2074">CVE-2010-2074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9422/">CVE-2016-9422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9422">CVE-2016-9422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9423/">CVE-2016-9423 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9423">CVE-2016-9423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9424/">CVE-2016-9424 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9424">CVE-2016-9424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9425/">CVE-2016-9425 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9425">CVE-2016-9425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9434/">CVE-2016-9434 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9434">CVE-2016-9434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9435/">CVE-2016-9435 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9435">CVE-2016-9435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9436/">CVE-2016-9436 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9436">CVE-2016-9436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9437/">CVE-2016-9437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9437">CVE-2016-9437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9438/">CVE-2016-9438 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9438">CVE-2016-9438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9439/">CVE-2016-9439 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9439">CVE-2016-9439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9440/">CVE-2016-9440 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9440">CVE-2016-9440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9441/">CVE-2016-9441 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9441">CVE-2016-9441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9442/">CVE-2016-9442 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9442">CVE-2016-9442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9443/">CVE-2016-9443 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9443">CVE-2016-9443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9621/">CVE-2016-9621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-9621">CVE-2016-9621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9622/">CVE-2016-9622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9622">CVE-2016-9622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9623/">CVE-2016-9623 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9623">CVE-2016-9623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9624/">CVE-2016-9624 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9624">CVE-2016-9624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9625/">CVE-2016-9625 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9625">CVE-2016-9625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9626/">CVE-2016-9626 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9626">CVE-2016-9626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9627/">CVE-2016-9627 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9627">CVE-2016-9627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9628/">CVE-2016-9628 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9628">CVE-2016-9628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9629/">CVE-2016-9629 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9629">CVE-2016-9629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9630/">CVE-2016-9630 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9630">CVE-2016-9630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9631/">CVE-2016-9631 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9631">CVE-2016-9631 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9632/">CVE-2016-9632 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9632">CVE-2016-9632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9633/">CVE-2016-9633 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9633">CVE-2016-9633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586392" comment="w3m-0.5.3.git20161120-4.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586392" comment="w3m-0.5.3.git20161120-4.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220481" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1021483" ref_url="https://bugzilla.suse.com/1021483" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10169" ref_url="https://www.suse.com/security/cve/CVE-2016-10169/" source="CVE"/>
		<reference ref_id="CVE-2016-10170" ref_url="https://www.suse.com/security/cve/CVE-2016-10170/" source="CVE"/>
		<reference ref_id="CVE-2016-10171" ref_url="https://www.suse.com/security/cve/CVE-2016-10171/" source="CVE"/>
		<reference ref_id="CVE-2016-10172" ref_url="https://www.suse.com/security/cve/CVE-2016-10172/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003787.html" source="SUSE-SU"/>
		<description>
This update for wavpack fixes the following issues:

- CVE-2016-10169 CVE-2016-10170 CVE-2016-10171 CVE-2016-10172: Make sure upper and lower boundaries make sense, to avoid out of bounds memory reads that could lead to crashes or disclosing memory. (bsc#1021483)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-05"/>
	<updated date="2018-03-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1021483">SUSE bug 1021483</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10169/">CVE-2016-10169 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10169">CVE-2016-10169 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10170/">CVE-2016-10170 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10170">CVE-2016-10170 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10171/">CVE-2016-10171 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10171">CVE-2016-10171 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10172/">CVE-2016-10172 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10172">CVE-2016-10172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586393" comment="libwavpack1-4.50.1-1.27.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586393" comment="libwavpack1-4.50.1-1.27.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220482" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1120930" ref_url="https://bugzilla.suse.com/1120930" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19840" ref_url="https://www.suse.com/security/cve/CVE-2018-19840/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005251.html" source="SUSE-SU"/>
		<description>
This update for wavpack fixes the following issues:

Security issues fixed:

- CVE-2018-19840: Fixed a denial-of-service in the WavpackPackInit function from pack_utils.c (bsc#1120930)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120930">SUSE bug 1120930</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19840/">CVE-2018-19840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19840">CVE-2018-19840 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586394" comment="libwavpack1-4.50.1-1.30.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586394" comment="libwavpack1-4.50.1-1.30.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220483" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1180414" ref_url="https://bugzilla.suse.com/1180414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35738" ref_url="https://www.suse.com/security/cve/CVE-2020-35738/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008521.html" source="SUSE-SU"/>
		<description>
This update for wavpack fixes the following issues:

- CVE-2020-35738: Fixed an out-of-bounds write in WavpackPackSamples (bsc#1180414). 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-19"/>
	<updated date="2021-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180414">SUSE bug 1180414</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35738/">CVE-2020-35738 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35738">CVE-2020-35738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586395" comment="libwavpack1-4.50.1-1.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220484" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="958342" ref_url="https://bugzilla.suse.com/958342" source="BUGZILLA"/>
		<reference ref_id="984060" ref_url="https://bugzilla.suse.com/984060" source="BUGZILLA"/>
		<reference ref_id="995964" ref_url="https://bugzilla.suse.com/995964" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4971" ref_url="https://www.suse.com/security/cve/CVE-2016-4971/" source="CVE"/>
		<reference ref_id="CVE-2016-7098" ref_url="https://www.suse.com/security/cve/CVE-2016-7098/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002286.html" source="SUSE-SU"/>
		<description>

This update for wget fixes the following issues:

- CVE-2016-4971: A HTTP to FTP redirection file name confusion vulnerability was fixed.
  (bsc#984060).

- CVE-2016-7098: A potential race condition was fixed by creating files with .tmp ext
  and making them accessible to the current user only. (bsc#995964)

Bug fixed:
- Wget failed with basicauth: Failed writing HTTP request: Bad file descriptor
  (bsc#958342)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-23"/>
	<updated date="2016-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958342">SUSE bug 958342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984060">SUSE bug 984060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995964">SUSE bug 995964</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4971/">CVE-2016-4971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4971">CVE-2016-4971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7098/">CVE-2016-7098 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7098">CVE-2016-7098 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586396" comment="wget-1.11.4-1.32.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586396" comment="wget-1.11.4-1.32.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220485" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1028301" ref_url="https://bugzilla.suse.com/1028301" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6508" ref_url="https://www.suse.com/security/cve/CVE-2017-6508/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002739.html" source="SUSE-SU"/>
		<description>

This update for wget fixes the following issues:

Security issue fixed:
- CVE-2017-6508: (url_parse): Reject control characters in host part of URL (bsc#1028301).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-22"/>
	<updated date="2017-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1028301">SUSE bug 1028301</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6508/">CVE-2017-6508 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6508">CVE-2017-6508 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586397" comment="wget-1.11.4-1.40.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586397" comment="wget-1.11.4-1.40.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220486" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1092061" ref_url="https://bugzilla.suse.com/1092061" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0494" ref_url="https://www.suse.com/security/cve/CVE-2018-0494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004071.html" source="SUSE-SU"/>
		<description>
This update for wget fixes the following issues:

- CVE-2018-0494: Fixed Cookie injection vulnerability by checking for
  and joining continuation lines. (bsc#1092061)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092061">SUSE bug 1092061</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0494/">CVE-2018-0494 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0494">CVE-2018-0494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586398" comment="wget-1.11.4-1.41.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586398" comment="wget-1.11.4-1.41.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220487" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="935158" ref_url="https://bugzilla.suse.com/935158" source="BUGZILLA"/>
		<reference ref_id="941500" ref_url="https://bugzilla.suse.com/941500" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813/" source="CVE"/>
		<reference ref_id="CVE-2015-4652" ref_url="https://www.suse.com/security/cve/CVE-2015-4652/" source="CVE"/>
		<reference ref_id="CVE-2015-6241" ref_url="https://www.suse.com/security/cve/CVE-2015-6241/" source="CVE"/>
		<reference ref_id="CVE-2015-6242" ref_url="https://www.suse.com/security/cve/CVE-2015-6242/" source="CVE"/>
		<reference ref_id="CVE-2015-6243" ref_url="https://www.suse.com/security/cve/CVE-2015-6243/" source="CVE"/>
		<reference ref_id="CVE-2015-6244" ref_url="https://www.suse.com/security/cve/CVE-2015-6244/" source="CVE"/>
		<reference ref_id="CVE-2015-6245" ref_url="https://www.suse.com/security/cve/CVE-2015-6245/" source="CVE"/>
		<reference ref_id="CVE-2015-6246" ref_url="https://www.suse.com/security/cve/CVE-2015-6246/" source="CVE"/>
		<reference ref_id="CVE-2015-6247" ref_url="https://www.suse.com/security/cve/CVE-2015-6247/" source="CVE"/>
		<reference ref_id="CVE-2015-6248" ref_url="https://www.suse.com/security/cve/CVE-2015-6248/" source="CVE"/>
		<reference ref_id="CVE-2015-6249" ref_url="https://www.suse.com/security/cve/CVE-2015-6249/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<description>

Wireshark has been updated to 1.12.7. (FATE#319388)

The following vulnerabilities have been fixed:
* Wireshark could crash when adding an item to the protocol tree. wnpa-sec-2015-21 CVE-2015-6241
* Wireshark could attempt to free invalid memory. wnpa-sec-2015-22 CVE-2015-6242
* Wireshark could crash when searching for a protocol dissector. wnpa-sec-2015-23 CVE-2015-6243
* The ZigBee dissector could crash. wnpa-sec-2015-24 CVE-2015-6244
* The GSM RLC/MAC dissector could go into an infinite loop. wnpa-sec-2015-25 CVE-2015-6245
* The WaveAgent dissector could crash. wnpa-sec-2015-26 CVE-2015-6246
* The OpenFlow dissector could go into an infinite loop. wnpa-sec-2015-27 CVE-2015-6247
* Wireshark could crash due to invalid ptvcursor length checking. wnpa-sec-2015-28 CVE-2015-6248
* The WCCP dissector could crash. wnpa-sec-2015-29 CVE-2015-6249
* Further bug fixes and updated protocol support as listed in:
    https://www.wireshark.org/docs/relnotes/wireshark-1.12.7.html 

Also a fix from 1.12.6 in GSM DTAP was backported. (bnc#935158 CVE-2015-4652)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-16"/>
	<updated date="2015-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935158">SUSE bug 935158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3813">CVE-2015-3813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4652/">CVE-2015-4652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4652">CVE-2015-4652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6241/">CVE-2015-6241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6241">CVE-2015-6241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6242/">CVE-2015-6242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6242">CVE-2015-6242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6243/">CVE-2015-6243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6243">CVE-2015-6243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6244/">CVE-2015-6244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6244">CVE-2015-6244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6245/">CVE-2015-6245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6245">CVE-2015-6245 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6246/">CVE-2015-6246 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6246">CVE-2015-6246 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6247/">CVE-2015-6247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6247">CVE-2015-6247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6248/">CVE-2015-6248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6248">CVE-2015-6248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6249/">CVE-2015-6249 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6249">CVE-2015-6249 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581534" comment="wireshark-1.12.7-0.5.3 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581534" comment="wireshark-1.12.7-0.5.3 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220488" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="950437" ref_url="https://bugzilla.suse.com/950437" source="BUGZILLA"/>
		<reference ref_id="960382" ref_url="https://bugzilla.suse.com/960382" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7830" ref_url="https://www.suse.com/security/cve/CVE-2015-7830/" source="CVE"/>
		<reference ref_id="CVE-2015-8711" ref_url="https://www.suse.com/security/cve/CVE-2015-8711/" source="CVE"/>
		<reference ref_id="CVE-2015-8712" ref_url="https://www.suse.com/security/cve/CVE-2015-8712/" source="CVE"/>
		<reference ref_id="CVE-2015-8713" ref_url="https://www.suse.com/security/cve/CVE-2015-8713/" source="CVE"/>
		<reference ref_id="CVE-2015-8714" ref_url="https://www.suse.com/security/cve/CVE-2015-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-8715" ref_url="https://www.suse.com/security/cve/CVE-2015-8715/" source="CVE"/>
		<reference ref_id="CVE-2015-8716" ref_url="https://www.suse.com/security/cve/CVE-2015-8716/" source="CVE"/>
		<reference ref_id="CVE-2015-8717" ref_url="https://www.suse.com/security/cve/CVE-2015-8717/" source="CVE"/>
		<reference ref_id="CVE-2015-8718" ref_url="https://www.suse.com/security/cve/CVE-2015-8718/" source="CVE"/>
		<reference ref_id="CVE-2015-8719" ref_url="https://www.suse.com/security/cve/CVE-2015-8719/" source="CVE"/>
		<reference ref_id="CVE-2015-8720" ref_url="https://www.suse.com/security/cve/CVE-2015-8720/" source="CVE"/>
		<reference ref_id="CVE-2015-8721" ref_url="https://www.suse.com/security/cve/CVE-2015-8721/" source="CVE"/>
		<reference ref_id="CVE-2015-8722" ref_url="https://www.suse.com/security/cve/CVE-2015-8722/" source="CVE"/>
		<reference ref_id="CVE-2015-8723" ref_url="https://www.suse.com/security/cve/CVE-2015-8723/" source="CVE"/>
		<reference ref_id="CVE-2015-8724" ref_url="https://www.suse.com/security/cve/CVE-2015-8724/" source="CVE"/>
		<reference ref_id="CVE-2015-8725" ref_url="https://www.suse.com/security/cve/CVE-2015-8725/" source="CVE"/>
		<reference ref_id="CVE-2015-8726" ref_url="https://www.suse.com/security/cve/CVE-2015-8726/" source="CVE"/>
		<reference ref_id="CVE-2015-8727" ref_url="https://www.suse.com/security/cve/CVE-2015-8727/" source="CVE"/>
		<reference ref_id="CVE-2015-8728" ref_url="https://www.suse.com/security/cve/CVE-2015-8728/" source="CVE"/>
		<reference ref_id="CVE-2015-8729" ref_url="https://www.suse.com/security/cve/CVE-2015-8729/" source="CVE"/>
		<reference ref_id="CVE-2015-8730" ref_url="https://www.suse.com/security/cve/CVE-2015-8730/" source="CVE"/>
		<reference ref_id="CVE-2015-8731" ref_url="https://www.suse.com/security/cve/CVE-2015-8731/" source="CVE"/>
		<reference ref_id="CVE-2015-8732" ref_url="https://www.suse.com/security/cve/CVE-2015-8732/" source="CVE"/>
		<reference ref_id="CVE-2015-8733" ref_url="https://www.suse.com/security/cve/CVE-2015-8733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<description>

This update contains Wireshark 1.12.9 and fixes the following issues:

* CVE-2015-7830: pcapng file parser could crash while copying an interface filter (bsc#950437)
* CVE-2015-8711: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate conversation data, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
* CVE-2015-8712: The dissect_hsdsch_channel_info function in epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not validate the number of PDUs, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8713: epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not properly reserve memory for channel ID mappings, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.
* CVE-2015-8714: The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8715: epan/dissectors/packet-alljoyn.c in the AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does not check for empty arguments, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
* CVE-2015-8716: The init_t38_info_conv function in epan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x before 1.12.9 does not ensure that a conversation exists, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8717: The dissect_sdp function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.12.x before 1.12.9 does not prevent use of a negative media count, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8718: Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the 'Match MSG/RES packets for async NLM' option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8719: The dissect_dns_answer function in epan/dissectors/packet-dns.c in the DNS dissector in Wireshark 1.12.x before 1.12.9 mishandles the EDNS0 Client Subnet option, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8720: The dissect_ber_GeneralizedTime function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8721: Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression.
* CVE-2015-8722: epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the frame pointer, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
* CVE-2015-8723: The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted
* CVE-2015-8724: The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not verify the WPA broadcast key length, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8725: The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
* CVE-2015-8726: wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
* CVE-2015-8727: The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not properly maintain request-key data, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.
* CVE-2015-8728: The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function, which allows remote attackers to cause a denial of service (buffer overflow and application crash) via a crafted packet.
* CVE-2015-8729: The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
* CVE-2015-8730: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet.
* CVE-2015-8731: The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8732: The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8733: The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-13"/>
	<updated date="2016-01-13"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/950437">SUSE bug 950437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7830/">CVE-2015-7830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7830">CVE-2015-7830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8711/">CVE-2015-8711 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8711">CVE-2015-8711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8712/">CVE-2015-8712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8712">CVE-2015-8712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8713/">CVE-2015-8713 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8713">CVE-2015-8713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8714/">CVE-2015-8714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8714">CVE-2015-8714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8715/">CVE-2015-8715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8715">CVE-2015-8715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8716/">CVE-2015-8716 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8716">CVE-2015-8716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8717/">CVE-2015-8717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8717">CVE-2015-8717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8718/">CVE-2015-8718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8718">CVE-2015-8718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8719/">CVE-2015-8719 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8719">CVE-2015-8719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8720/">CVE-2015-8720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8720">CVE-2015-8720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8721/">CVE-2015-8721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8721">CVE-2015-8721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8722/">CVE-2015-8722 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8722">CVE-2015-8722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8723/">CVE-2015-8723 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8723">CVE-2015-8723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8724/">CVE-2015-8724 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8724">CVE-2015-8724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8725/">CVE-2015-8725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8725">CVE-2015-8725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8726/">CVE-2015-8726 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8726">CVE-2015-8726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8727/">CVE-2015-8727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8727">CVE-2015-8727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8728/">CVE-2015-8728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8728">CVE-2015-8728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8729/">CVE-2015-8729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8729">CVE-2015-8729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8730/">CVE-2015-8730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8730">CVE-2015-8730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8731/">CVE-2015-8731 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8731">CVE-2015-8731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8732/">CVE-2015-8732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8732">CVE-2015-8732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8733/">CVE-2015-8733 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8733">CVE-2015-8733 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581535" comment="wireshark-1.12.9-0.12.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581535" comment="wireshark-1.12.9-0.12.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220489" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="968565" ref_url="https://bugzilla.suse.com/968565" source="BUGZILLA"/>
		<reference ref_id="976944" ref_url="https://bugzilla.suse.com/976944" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2523" ref_url="https://www.suse.com/security/cve/CVE-2016-2523/" source="CVE"/>
		<reference ref_id="CVE-2016-2530" ref_url="https://www.suse.com/security/cve/CVE-2016-2530/" source="CVE"/>
		<reference ref_id="CVE-2016-2531" ref_url="https://www.suse.com/security/cve/CVE-2016-2531/" source="CVE"/>
		<reference ref_id="CVE-2016-2532" ref_url="https://www.suse.com/security/cve/CVE-2016-2532/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002069.html" source="SUSE-SU"/>
		<description>
This update to Wireshark 1 12.11 fixes a number issues in protocol dissectors that could have allowed a remote attacker to crash Wireshark or cause excessive CPU usage through specially crafted packages inserted into the network or a capture file.

- The PKTC dissector could crash (wnpa-sec-2016-22)
- The PKTC dissector could crash (wnpa-sec-2016-23)
- The IAX2 dissector could go into an infinite loop (wnpa-sec-2016-24)
- Wireshark and TShark could exhaust the stack (wnpa-sec-2016-25) 
- The GSM CBCH dissector could crash (wnpa-sec-2016-26)
- The NCP dissector could crash (wnpa-sec-2016-28)
- CVE-2016-2523: DNP dissector infinite loop (wnpa-sec-2016-03)
- CVE-2016-2530: RSL dissector crash (wnpa-sec-2016-10)
- CVE-2016-2531: RSL dissector crash (wnpa-sec-2016-10)
- CVE-2016-2532: LLRP dissector crash (wnpa-sec-2016-11)
- GSM A-bis OML dissector crash (wnpa-sec-2016-14)
- ASN.1 BER dissector crash (wnpa-sec-2016-15)
- ASN.1 BER dissector crash (wnpa-sec-2016-18) 

Also containsfurther bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-1.12.11.html 
https://www.wireshark.org/docs/relnotes/wireshark-1.12.10.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-18"/>
	<updated date="2016-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/968565">SUSE bug 968565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976944">SUSE bug 976944</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2523/">CVE-2016-2523 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2523">CVE-2016-2523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2530/">CVE-2016-2530 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2530">CVE-2016-2530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2531/">CVE-2016-2531 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2531">CVE-2016-2531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2532/">CVE-2016-2532 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2532">CVE-2016-2532 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586399" comment="wireshark-1.12.11-0.18.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586399" comment="wireshark-1.12.11-0.18.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220490" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="983671" ref_url="https://bugzilla.suse.com/983671" source="BUGZILLA"/>
		<reference ref_id="991012" ref_url="https://bugzilla.suse.com/991012" source="BUGZILLA"/>
		<reference ref_id="991013" ref_url="https://bugzilla.suse.com/991013" source="BUGZILLA"/>
		<reference ref_id="991015" ref_url="https://bugzilla.suse.com/991015" source="BUGZILLA"/>
		<reference ref_id="991016" ref_url="https://bugzilla.suse.com/991016" source="BUGZILLA"/>
		<reference ref_id="991017" ref_url="https://bugzilla.suse.com/991017" source="BUGZILLA"/>
		<reference ref_id="991018" ref_url="https://bugzilla.suse.com/991018" source="BUGZILLA"/>
		<reference ref_id="991019" ref_url="https://bugzilla.suse.com/991019" source="BUGZILLA"/>
		<reference ref_id="991020" ref_url="https://bugzilla.suse.com/991020" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5350" ref_url="https://www.suse.com/security/cve/CVE-2016-5350/" source="CVE"/>
		<reference ref_id="CVE-2016-5351" ref_url="https://www.suse.com/security/cve/CVE-2016-5351/" source="CVE"/>
		<reference ref_id="CVE-2016-5352" ref_url="https://www.suse.com/security/cve/CVE-2016-5352/" source="CVE"/>
		<reference ref_id="CVE-2016-5353" ref_url="https://www.suse.com/security/cve/CVE-2016-5353/" source="CVE"/>
		<reference ref_id="CVE-2016-5354" ref_url="https://www.suse.com/security/cve/CVE-2016-5354/" source="CVE"/>
		<reference ref_id="CVE-2016-5355" ref_url="https://www.suse.com/security/cve/CVE-2016-5355/" source="CVE"/>
		<reference ref_id="CVE-2016-5356" ref_url="https://www.suse.com/security/cve/CVE-2016-5356/" source="CVE"/>
		<reference ref_id="CVE-2016-5357" ref_url="https://www.suse.com/security/cve/CVE-2016-5357/" source="CVE"/>
		<reference ref_id="CVE-2016-5358" ref_url="https://www.suse.com/security/cve/CVE-2016-5358/" source="CVE"/>
		<reference ref_id="CVE-2016-5359" ref_url="https://www.suse.com/security/cve/CVE-2016-5359/" source="CVE"/>
		<reference ref_id="CVE-2016-6504" ref_url="https://www.suse.com/security/cve/CVE-2016-6504/" source="CVE"/>
		<reference ref_id="CVE-2016-6505" ref_url="https://www.suse.com/security/cve/CVE-2016-6505/" source="CVE"/>
		<reference ref_id="CVE-2016-6506" ref_url="https://www.suse.com/security/cve/CVE-2016-6506/" source="CVE"/>
		<reference ref_id="CVE-2016-6507" ref_url="https://www.suse.com/security/cve/CVE-2016-6507/" source="CVE"/>
		<reference ref_id="CVE-2016-6508" ref_url="https://www.suse.com/security/cve/CVE-2016-6508/" source="CVE"/>
		<reference ref_id="CVE-2016-6509" ref_url="https://www.suse.com/security/cve/CVE-2016-6509/" source="CVE"/>
		<reference ref_id="CVE-2016-6510" ref_url="https://www.suse.com/security/cve/CVE-2016-6510/" source="CVE"/>
		<reference ref_id="CVE-2016-6511" ref_url="https://www.suse.com/security/cve/CVE-2016-6511/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<description>

This update to wireshark 1.12.13 fixes the following issues:

 - CVE-2016-6504: wireshark: NDS dissector crash (bsc#991012)
 - CVE-2016-6505: wireshark: PacketBB dissector could divide by zero (bsc#991013)
 - CVE-2016-6506: wireshark: WSP infinite loop (bsc#991015)
 - CVE-2016-6507: wireshark: MMSE infinite loop (bsc#991016)
 - CVE-2016-6508: wireshark: RLC long loop (bsc#991017)
 - CVE-2016-6509: wireshark: LDSS dissector crash (bsc#991018)
 - CVE-2016-6510: wireshark: RLC dissector crash (bsc#991019)
 - CVE-2016-6511: wireshark: OpenFlow long loop (bnc991020)
 - CVE-2016-5350: SPOOLS infinite loop (bsc#983671)
 - CVE-2016-5351: IEEE 802.11 dissector crash (bsc#983671)
 - CVE-2016-5352: IEEE 802.11 dissector crash, different from wpna-sec-2016-30 (bsc#983671)
 - CVE-2016-5353: UMTS FP crash (bsc#983671)
 - CVE-2016-5354: USB dissector crash (bsc#983671)
 - CVE-2016-5355: Toshiba file parser crash (bsc#983671)
 - CVE-2016-5356: CoSine file parser crash (bsc#983671)
 - CVE-2016-5357: NetScreen file parser crash (bsc#983671)
 - CVE-2016-5358: Ethernet dissector crash (bsc#983671)
 - CVE-2016-5359: WBXML infinite loop (bsc#983671)

For more details please see:
  https://www.wireshark.org/docs/relnotes/wireshark-1.12.12.html
  https://www.wireshark.org/docs/relnotes/wireshark-1.12.13.html

		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-02"/>
	<updated date="2016-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991012">SUSE bug 991012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991013">SUSE bug 991013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991015">SUSE bug 991015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991016">SUSE bug 991016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991017">SUSE bug 991017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991018">SUSE bug 991018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991019">SUSE bug 991019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991020">SUSE bug 991020</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5350/">CVE-2016-5350 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5350">CVE-2016-5350 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5351/">CVE-2016-5351 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5351">CVE-2016-5351 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5352/">CVE-2016-5352 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5352">CVE-2016-5352 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5353/">CVE-2016-5353 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5353">CVE-2016-5353 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5354/">CVE-2016-5354 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5354">CVE-2016-5354 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5355/">CVE-2016-5355 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5355">CVE-2016-5355 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5356/">CVE-2016-5356 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5356">CVE-2016-5356 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5357/">CVE-2016-5357 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5357">CVE-2016-5357 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5358/">CVE-2016-5358 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5358">CVE-2016-5358 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5359/">CVE-2016-5359 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5359">CVE-2016-5359 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6504/">CVE-2016-6504 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6504">CVE-2016-6504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6505/">CVE-2016-6505 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6505">CVE-2016-6505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6506/">CVE-2016-6506 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6506">CVE-2016-6506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6507/">CVE-2016-6507 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6507">CVE-2016-6507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6508/">CVE-2016-6508 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6508">CVE-2016-6508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6509/">CVE-2016-6509 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6509">CVE-2016-6509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6510/">CVE-2016-6510 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6510">CVE-2016-6510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6511/">CVE-2016-6511 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6511">CVE-2016-6511 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586400" comment="wireshark-1.12.13-0.23.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586400" comment="wireshark-1.12.13-0.23.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220491" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1002981" ref_url="https://bugzilla.suse.com/1002981" source="BUGZILLA"/>
		<reference ref_id="1010735" ref_url="https://bugzilla.suse.com/1010735" source="BUGZILLA"/>
		<reference ref_id="1010740" ref_url="https://bugzilla.suse.com/1010740" source="BUGZILLA"/>
		<reference ref_id="1010752" ref_url="https://bugzilla.suse.com/1010752" source="BUGZILLA"/>
		<reference ref_id="1010754" ref_url="https://bugzilla.suse.com/1010754" source="BUGZILLA"/>
		<reference ref_id="1010911" ref_url="https://bugzilla.suse.com/1010911" source="BUGZILLA"/>
		<reference ref_id="1021739" ref_url="https://bugzilla.suse.com/1021739" source="BUGZILLA"/>
		<reference ref_id="1025913" ref_url="https://bugzilla.suse.com/1025913" source="BUGZILLA"/>
		<reference ref_id="1027998" ref_url="https://bugzilla.suse.com/1027998" source="BUGZILLA"/>
		<reference ref_id="1033936" ref_url="https://bugzilla.suse.com/1033936" source="BUGZILLA"/>
		<reference ref_id="1033937" ref_url="https://bugzilla.suse.com/1033937" source="BUGZILLA"/>
		<reference ref_id="1033938" ref_url="https://bugzilla.suse.com/1033938" source="BUGZILLA"/>
		<reference ref_id="1033939" ref_url="https://bugzilla.suse.com/1033939" source="BUGZILLA"/>
		<reference ref_id="1033940" ref_url="https://bugzilla.suse.com/1033940" source="BUGZILLA"/>
		<reference ref_id="1033941" ref_url="https://bugzilla.suse.com/1033941" source="BUGZILLA"/>
		<reference ref_id="1033942" ref_url="https://bugzilla.suse.com/1033942" source="BUGZILLA"/>
		<reference ref_id="1033943" ref_url="https://bugzilla.suse.com/1033943" source="BUGZILLA"/>
		<reference ref_id="1033944" ref_url="https://bugzilla.suse.com/1033944" source="BUGZILLA"/>
		<reference ref_id="1033945" ref_url="https://bugzilla.suse.com/1033945" source="BUGZILLA"/>
		<reference ref_id="998761" ref_url="https://bugzilla.suse.com/998761" source="BUGZILLA"/>
		<reference ref_id="998762" ref_url="https://bugzilla.suse.com/998762" source="BUGZILLA"/>
		<reference ref_id="998763" ref_url="https://bugzilla.suse.com/998763" source="BUGZILLA"/>
		<reference ref_id="998800" ref_url="https://bugzilla.suse.com/998800" source="BUGZILLA"/>
		<reference ref_id="998963" ref_url="https://bugzilla.suse.com/998963" source="BUGZILLA"/>
		<reference ref_id="998964" ref_url="https://bugzilla.suse.com/998964" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7175" ref_url="https://www.suse.com/security/cve/CVE-2016-7175/" source="CVE"/>
		<reference ref_id="CVE-2016-7176" ref_url="https://www.suse.com/security/cve/CVE-2016-7176/" source="CVE"/>
		<reference ref_id="CVE-2016-7177" ref_url="https://www.suse.com/security/cve/CVE-2016-7177/" source="CVE"/>
		<reference ref_id="CVE-2016-7178" ref_url="https://www.suse.com/security/cve/CVE-2016-7178/" source="CVE"/>
		<reference ref_id="CVE-2016-7179" ref_url="https://www.suse.com/security/cve/CVE-2016-7179/" source="CVE"/>
		<reference ref_id="CVE-2016-7180" ref_url="https://www.suse.com/security/cve/CVE-2016-7180/" source="CVE"/>
		<reference ref_id="CVE-2016-9373" ref_url="https://www.suse.com/security/cve/CVE-2016-9373/" source="CVE"/>
		<reference ref_id="CVE-2016-9374" ref_url="https://www.suse.com/security/cve/CVE-2016-9374/" source="CVE"/>
		<reference ref_id="CVE-2016-9375" ref_url="https://www.suse.com/security/cve/CVE-2016-9375/" source="CVE"/>
		<reference ref_id="CVE-2016-9376" ref_url="https://www.suse.com/security/cve/CVE-2016-9376/" source="CVE"/>
		<reference ref_id="CVE-2017-5596" ref_url="https://www.suse.com/security/cve/CVE-2017-5596/" source="CVE"/>
		<reference ref_id="CVE-2017-5597" ref_url="https://www.suse.com/security/cve/CVE-2017-5597/" source="CVE"/>
		<reference ref_id="CVE-2017-6014" ref_url="https://www.suse.com/security/cve/CVE-2017-6014/" source="CVE"/>
		<reference ref_id="CVE-2017-7700" ref_url="https://www.suse.com/security/cve/CVE-2017-7700/" source="CVE"/>
		<reference ref_id="CVE-2017-7701" ref_url="https://www.suse.com/security/cve/CVE-2017-7701/" source="CVE"/>
		<reference ref_id="CVE-2017-7702" ref_url="https://www.suse.com/security/cve/CVE-2017-7702/" source="CVE"/>
		<reference ref_id="CVE-2017-7703" ref_url="https://www.suse.com/security/cve/CVE-2017-7703/" source="CVE"/>
		<reference ref_id="CVE-2017-7704" ref_url="https://www.suse.com/security/cve/CVE-2017-7704/" source="CVE"/>
		<reference ref_id="CVE-2017-7705" ref_url="https://www.suse.com/security/cve/CVE-2017-7705/" source="CVE"/>
		<reference ref_id="CVE-2017-7745" ref_url="https://www.suse.com/security/cve/CVE-2017-7745/" source="CVE"/>
		<reference ref_id="CVE-2017-7746" ref_url="https://www.suse.com/security/cve/CVE-2017-7746/" source="CVE"/>
		<reference ref_id="CVE-2017-7747" ref_url="https://www.suse.com/security/cve/CVE-2017-7747/" source="CVE"/>
		<reference ref_id="CVE-2017-7748" ref_url="https://www.suse.com/security/cve/CVE-2017-7748/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<description>

Wireshark was updated to version 2.0.12, which brings several new features, enhancements
and bug fixes.

These security issues were fixed:

- CVE-2017-7700: In Wireshark the NetScaler file parser could go into an infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by ensuring a nonzero record size (bsc#1033936).
- CVE-2017-7701: In Wireshark the BGP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-bgp.c by using a different integer data type (bsc#1033937).
- CVE-2017-7702: In Wireshark the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding length validation (bsc#1033938).
- CVE-2017-7703: In Wireshark the IMAP dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-imap.c by calculating a line's end correctly (bsc#1033939).
- CVE-2017-7704: In Wireshark the DOF dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dof.c by using a different integer data type and adjusting a return value (bsc#1033940).
- CVE-2017-7705: In Wireshark the RPC over RDMA dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-rpcrdma.c by correctly checking for going beyond the maximum offset (bsc#1033941).
- CVE-2017-7745: In Wireshark the SIGCOMP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-sigcomp.c by correcting a memory-size check (bsc#1033942).
- CVE-2017-7746: In Wireshark the SLSK dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-slsk.c by adding checks for the remaining length (bsc#1033943).
- CVE-2017-7747: In Wireshark the PacketBB dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-packetbb.c by restricting additions to the protocol tree (bsc#1033944).
- CVE-2017-7748: In Wireshark the WSP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wsp.c by adding a length check (bsc#1033945).
- CVE-2016-7179: Stack-based buffer overflow in epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#998963).
- CVE-2016-9376: In Wireshark the OpenFlow dissector could crash with memory exhaustion, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-openflow_v5.c by ensuring that certain length values were sufficiently large (bsc#1010735).
- CVE-2016-9375: In Wireshark the DTN dissector could go into an infinite loop, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dtn.c by checking whether SDNV evaluation was successful (bsc#1010740).
- CVE-2016-9374: In Wireshark the AllJoyn dissector could crash with a buffer over-read, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-alljoyn.c by ensuring that a length variable properly tracked the state of a signature variable (bsc#1010752).
- CVE-2016-9373: In Wireshark the DCERPC dissector could crash with a use-after-free, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dcerpc-nt.c and epan/dissectors/packet-dcerpc-spoolss.c by using the wmem file scope for private strings (bsc#1010754).
- CVE-2016-7175: epan/dissectors/packet-qnet6.c in the QNX6 QNET dissector in Wireshark mishandled MAC address data, which allowed remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet (bsc#998761).
- CVE-2016-7176: epan/dissectors/packet-h225.c in the H.225 dissector in Wireshark called snprintf with one of its input buffers as the output buffer, which allowed remote attackers to cause a denial of service (copy overlap and application crash) via a crafted packet (bsc#998762).
- CVE-2016-7177: epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark did not restrict the number of channels, which allowed remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet (bsc#998763).
- CVE-2016-7180: epan/dissectors/packet-ipmi-trace.c in the IPMI trace dissector in Wireshark did not properly consider whether a string is constant, which allowed remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet (bsc#998800).
- CVE-2016-7178: epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark did not ensure that memory is allocated for certain data structures, which allowed remote attackers to cause a denial of service (invalid write access and application crash) via a crafted packet (bsc#998964).
- CVE-2017-6014: In Wireshark a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory (bsc#1025913).
- CVE-2017-5596: In Wireshark the ASTERIX dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-asterix.c by changing a data type to avoid an integer overflow (bsc#1021739).
- CVE-2017-5597: In Wireshark the DHCPv6 dissector could go into a large loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dhcpv6.c by changing a data type to avoid an integer overflow (bsc#1021739).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-04"/>
	<updated date="2017-05-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002981">SUSE bug 1002981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010735">SUSE bug 1010735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010740">SUSE bug 1010740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010752">SUSE bug 1010752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010754">SUSE bug 1010754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010911">SUSE bug 1010911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021739">SUSE bug 1021739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025913">SUSE bug 1025913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027998">SUSE bug 1027998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033936">SUSE bug 1033936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033937">SUSE bug 1033937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033938">SUSE bug 1033938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033939">SUSE bug 1033939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033940">SUSE bug 1033940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033941">SUSE bug 1033941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033942">SUSE bug 1033942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033943">SUSE bug 1033943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033944">SUSE bug 1033944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033945">SUSE bug 1033945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998761">SUSE bug 998761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998762">SUSE bug 998762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998763">SUSE bug 998763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998800">SUSE bug 998800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998963">SUSE bug 998963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998964">SUSE bug 998964</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7175/">CVE-2016-7175 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7175">CVE-2016-7175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7176/">CVE-2016-7176 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7176">CVE-2016-7176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7177/">CVE-2016-7177 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7177">CVE-2016-7177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7178/">CVE-2016-7178 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7178">CVE-2016-7178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7179/">CVE-2016-7179 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7179">CVE-2016-7179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7180/">CVE-2016-7180 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7180">CVE-2016-7180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9373/">CVE-2016-9373 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9373">CVE-2016-9373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9374/">CVE-2016-9374 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9374">CVE-2016-9374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9375/">CVE-2016-9375 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9375">CVE-2016-9375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9376/">CVE-2016-9376 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9376">CVE-2016-9376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5596/">CVE-2017-5596 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5596">CVE-2017-5596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5597/">CVE-2017-5597 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5597">CVE-2017-5597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6014/">CVE-2017-6014 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6014">CVE-2017-6014 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7700/">CVE-2017-7700 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7700">CVE-2017-7700 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7701/">CVE-2017-7701 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7701">CVE-2017-7701 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7702/">CVE-2017-7702 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7702">CVE-2017-7702 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7703/">CVE-2017-7703 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7703">CVE-2017-7703 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7704/">CVE-2017-7704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7704">CVE-2017-7704 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7705/">CVE-2017-7705 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7705">CVE-2017-7705 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7745/">CVE-2017-7745 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7745">CVE-2017-7745 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7746/">CVE-2017-7746 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7746">CVE-2017-7746 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7747/">CVE-2017-7747 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7747">CVE-2017-7747 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7748/">CVE-2017-7748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7748">CVE-2017-7748 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586401" comment="wireshark-2.0.12-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586402" comment="wireshark-gtk-2.0.12-36.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586401" comment="wireshark-2.0.12-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586402" comment="wireshark-gtk-2.0.12-36.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220492" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1042298" ref_url="https://bugzilla.suse.com/1042298" source="BUGZILLA"/>
		<reference ref_id="1042299" ref_url="https://bugzilla.suse.com/1042299" source="BUGZILLA"/>
		<reference ref_id="1042300" ref_url="https://bugzilla.suse.com/1042300" source="BUGZILLA"/>
		<reference ref_id="1042301" ref_url="https://bugzilla.suse.com/1042301" source="BUGZILLA"/>
		<reference ref_id="1042302" ref_url="https://bugzilla.suse.com/1042302" source="BUGZILLA"/>
		<reference ref_id="1042303" ref_url="https://bugzilla.suse.com/1042303" source="BUGZILLA"/>
		<reference ref_id="1042304" ref_url="https://bugzilla.suse.com/1042304" source="BUGZILLA"/>
		<reference ref_id="1042305" ref_url="https://bugzilla.suse.com/1042305" source="BUGZILLA"/>
		<reference ref_id="1042306" ref_url="https://bugzilla.suse.com/1042306" source="BUGZILLA"/>
		<reference ref_id="1042307" ref_url="https://bugzilla.suse.com/1042307" source="BUGZILLA"/>
		<reference ref_id="1042308" ref_url="https://bugzilla.suse.com/1042308" source="BUGZILLA"/>
		<reference ref_id="1042309" ref_url="https://bugzilla.suse.com/1042309" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9343" ref_url="https://www.suse.com/security/cve/CVE-2017-9343/" source="CVE"/>
		<reference ref_id="CVE-2017-9344" ref_url="https://www.suse.com/security/cve/CVE-2017-9344/" source="CVE"/>
		<reference ref_id="CVE-2017-9345" ref_url="https://www.suse.com/security/cve/CVE-2017-9345/" source="CVE"/>
		<reference ref_id="CVE-2017-9346" ref_url="https://www.suse.com/security/cve/CVE-2017-9346/" source="CVE"/>
		<reference ref_id="CVE-2017-9347" ref_url="https://www.suse.com/security/cve/CVE-2017-9347/" source="CVE"/>
		<reference ref_id="CVE-2017-9348" ref_url="https://www.suse.com/security/cve/CVE-2017-9348/" source="CVE"/>
		<reference ref_id="CVE-2017-9349" ref_url="https://www.suse.com/security/cve/CVE-2017-9349/" source="CVE"/>
		<reference ref_id="CVE-2017-9350" ref_url="https://www.suse.com/security/cve/CVE-2017-9350/" source="CVE"/>
		<reference ref_id="CVE-2017-9351" ref_url="https://www.suse.com/security/cve/CVE-2017-9351/" source="CVE"/>
		<reference ref_id="CVE-2017-9352" ref_url="https://www.suse.com/security/cve/CVE-2017-9352/" source="CVE"/>
		<reference ref_id="CVE-2017-9353" ref_url="https://www.suse.com/security/cve/CVE-2017-9353/" source="CVE"/>
		<reference ref_id="CVE-2017-9354" ref_url="https://www.suse.com/security/cve/CVE-2017-9354/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002975.html" source="SUSE-SU"/>
		<description>
The network analysis tool wireshark was updated to version 2.0.13 to fix the following issues:

* CVE-2017-9352: Bazaar dissector infinite loop (wnpa-sec-2017-22) (bsc#1042304)
* CVE-2017-9348: DOF dissector read overflow (wnpa-sec-2017-23) (bsc#1042303)
* CVE-2017-9351: DHCP dissector read overflow (wnpa-sec-2017-24) (bsc#1042302)
* CVE-2017-9346: SoulSeek dissector infinite loop (wnpa-sec-2017-25) (bsc#1042301)
* CVE-2017-9345: DNS dissector infinite loop (wnpa-sec-2017-26) (bsc#1042300)
* CVE-2017-9349: DICOM dissector infinite loop (wnpa-sec-2017-27) (bsc#1042305)
* CVE-2017-9350: openSAFETY dissector memory exh.. (wnpa-sec-2017-28) (bsc#1042299)
* CVE-2017-9344: BT L2CAP dissector divide by zero (wnpa-sec-2017-29) (bsc#1042298)
* CVE-2017-9343: MSNIP dissector crash (wnpa-sec-2017-30) (bsc#1042309)
* CVE-2017-9347: ROS dissector crash (wnpa-sec-2017-31) (bsc#1042308)
* CVE-2017-9354: RGMP dissector crash (wnpa-sec-2017-32) (bsc#1042307)
* CVE-2017-9353: wireshark: IPv6 dissector crash (wnpa-sec-2017-33) (bsc#1042306)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-23"/>
	<updated date="2017-06-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042298">SUSE bug 1042298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042299">SUSE bug 1042299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042300">SUSE bug 1042300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042301">SUSE bug 1042301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042302">SUSE bug 1042302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042303">SUSE bug 1042303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042304">SUSE bug 1042304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042305">SUSE bug 1042305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042306">SUSE bug 1042306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042307">SUSE bug 1042307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042308">SUSE bug 1042308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042309">SUSE bug 1042309</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9343/">CVE-2017-9343 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9343">CVE-2017-9343 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9344/">CVE-2017-9344 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9344">CVE-2017-9344 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9345/">CVE-2017-9345 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9345">CVE-2017-9345 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9346/">CVE-2017-9346 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9346">CVE-2017-9346 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9347/">CVE-2017-9347 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9347">CVE-2017-9347 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9348/">CVE-2017-9348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9348">CVE-2017-9348 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9349/">CVE-2017-9349 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9349">CVE-2017-9349 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9350/">CVE-2017-9350 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9350">CVE-2017-9350 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9351/">CVE-2017-9351 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9351">CVE-2017-9351 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9352/">CVE-2017-9352 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9352">CVE-2017-9352 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9353/">CVE-2017-9353 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9353">CVE-2017-9353 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9354/">CVE-2017-9354 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9354">CVE-2017-9354 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586403" comment="wireshark-2.0.13-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586404" comment="wireshark-gtk-2.0.13-39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586403" comment="wireshark-2.0.13-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586404" comment="wireshark-gtk-2.0.13-39.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220493" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1049255" ref_url="https://bugzilla.suse.com/1049255" source="BUGZILLA"/>
		<reference ref_id="1049621" ref_url="https://bugzilla.suse.com/1049621" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11406" ref_url="https://www.suse.com/security/cve/CVE-2017-11406/" source="CVE"/>
		<reference ref_id="CVE-2017-11407" ref_url="https://www.suse.com/security/cve/CVE-2017-11407/" source="CVE"/>
		<reference ref_id="CVE-2017-11408" ref_url="https://www.suse.com/security/cve/CVE-2017-11408/" source="CVE"/>
		<reference ref_id="CVE-2017-11410" ref_url="https://www.suse.com/security/cve/CVE-2017-11410/" source="CVE"/>
		<reference ref_id="CVE-2017-11411" ref_url="https://www.suse.com/security/cve/CVE-2017-11411/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003078.html" source="SUSE-SU"/>
		<description>
This wireshark update to version 2.2.8 fixes the following issues:

Security issues fixed:
- CVE-2017-11411: The openSAFETY dissectorcould crash or exhaust system memory because of missing
  length validation. (bsc#1049621)
- CVE-2017-11410: The WBXML dissector could go into an infinite loop. (bsc#1049255)
- CVE-2017-11408: The AMQP dissector could crash. (bsc#1049255)
- CVE-2017-11407: The MQ dissector could crash. (bsc#1049255)
- CVE-2017-11406: The DOCSIS dissector could go into an infinite loop. (bsc#1049255)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-03"/>
	<updated date="2017-08-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049621">SUSE bug 1049621</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11406/">CVE-2017-11406 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11406">CVE-2017-11406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11407/">CVE-2017-11407 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11407">CVE-2017-11407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11408/">CVE-2017-11408 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11408">CVE-2017-11408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11410/">CVE-2017-11410 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11410">CVE-2017-11410 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11411/">CVE-2017-11411 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11411">CVE-2017-11411 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586405" comment="wireshark-2.0.14-40.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586406" comment="wireshark-gtk-2.0.14-40.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586405" comment="wireshark-2.0.14-40.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586406" comment="wireshark-gtk-2.0.14-40.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220494" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1044417" ref_url="https://bugzilla.suse.com/1044417" source="BUGZILLA"/>
		<reference ref_id="1045341" ref_url="https://bugzilla.suse.com/1045341" source="BUGZILLA"/>
		<reference ref_id="1056248" ref_url="https://bugzilla.suse.com/1056248" source="BUGZILLA"/>
		<reference ref_id="1056249" ref_url="https://bugzilla.suse.com/1056249" source="BUGZILLA"/>
		<reference ref_id="1056251" ref_url="https://bugzilla.suse.com/1056251" source="BUGZILLA"/>
		<reference ref_id="1062645" ref_url="https://bugzilla.suse.com/1062645" source="BUGZILLA"/>
		<reference ref_id="1070727" ref_url="https://bugzilla.suse.com/1070727" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13765" ref_url="https://www.suse.com/security/cve/CVE-2017-13765/" source="CVE"/>
		<reference ref_id="CVE-2017-13766" ref_url="https://www.suse.com/security/cve/CVE-2017-13766/" source="CVE"/>
		<reference ref_id="CVE-2017-13767" ref_url="https://www.suse.com/security/cve/CVE-2017-13767/" source="CVE"/>
		<reference ref_id="CVE-2017-15191" ref_url="https://www.suse.com/security/cve/CVE-2017-15191/" source="CVE"/>
		<reference ref_id="CVE-2017-15192" ref_url="https://www.suse.com/security/cve/CVE-2017-15192/" source="CVE"/>
		<reference ref_id="CVE-2017-15193" ref_url="https://www.suse.com/security/cve/CVE-2017-15193/" source="CVE"/>
		<reference ref_id="CVE-2017-17083" ref_url="https://www.suse.com/security/cve/CVE-2017-17083/" source="CVE"/>
		<reference ref_id="CVE-2017-17084" ref_url="https://www.suse.com/security/cve/CVE-2017-17084/" source="CVE"/>
		<reference ref_id="CVE-2017-17085" ref_url="https://www.suse.com/security/cve/CVE-2017-17085/" source="CVE"/>
		<reference ref_id="CVE-2017-9617" ref_url="https://www.suse.com/security/cve/CVE-2017-9617/" source="CVE"/>
		<reference ref_id="CVE-2017-9766" ref_url="https://www.suse.com/security/cve/CVE-2017-9766/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003581.html" source="SUSE-SU"/>
		<description>

  
This update for wireshark to version 2.2.11 fixes several issues.

These security issues were fixed:

- CVE-2017-13767: The MSDP dissector could have gone into an infinite loop.
  This was addressed by adding length validation (bsc#1056248)
- CVE-2017-13766: The Profinet I/O dissector could have crash with an
  out-of-bounds write. This was addressed by adding string validation
  (bsc#1056249)
- CVE-2017-13765: The IrCOMM dissector had a buffer over-read and application
  crash. This was addressed by adding length validation (bsc#1056251)
- CVE-2017-9766: PROFINET IO data with a high recursion depth allowed remote
  attackers to cause a denial of service (stack exhaustion) in the
  dissect_IODWriteReq function (bsc#1045341)
- CVE-2017-9617: Deeply nested DAAP data may have cause stack exhaustion
  (uncontrolled recursion) in the dissect_daap_one_tag function in the DAAP
  dissector (bsc#1044417)
- CVE-2017-15192: The BT ATT dissector could crash. This was addressed
  in epan/dissectors/packet-btatt.c by considering a case where not all
  of the BTATT packets have the same encapsulation level. (bsc#1062645)
- CVE-2017-15193: The MBIM dissector could crash or exhaust system
  memory. This was addressed in epan/dissectors/packet-mbim.c by changing
  the memory-allocation approach. (bsc#1062645)
- CVE-2017-15191: The DMP dissector could crash. This was addressed in
  epan/dissectors/packet-dmp.c by validating a string length. (bsc#1062645)
- CVE-2017-17083: NetBIOS dissector could crash. This was addressed in
  epan/dissectors/packet-netbios.c by ensuring that write operations are
  bounded by the beginning of a buffer. (bsc#1070727)
- CVE-2017-17084: IWARP_MPA dissector could crash. This was addressed
  in epan/dissectors/packet-iwarp-mpa.c by validating a ULPDU
  length. (bsc#1070727)
- CVE-2017-17085: the CIP Safety dissector could crash. This was
  addressed in epan/dissectors/packet-cipsafety.c by validating the packet
  length. (bsc#1070727)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-09"/>
	<updated date="2018-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1044417">SUSE bug 1044417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045341">SUSE bug 1045341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056248">SUSE bug 1056248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056249">SUSE bug 1056249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056251">SUSE bug 1056251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062645">SUSE bug 1062645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070727">SUSE bug 1070727</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-13765/">CVE-2017-13765 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13765">CVE-2017-13765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-13766/">CVE-2017-13766 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13766">CVE-2017-13766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-13767/">CVE-2017-13767 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13767">CVE-2017-13767 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15191/">CVE-2017-15191 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15191">CVE-2017-15191 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15192/">CVE-2017-15192 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15192">CVE-2017-15192 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15193/">CVE-2017-15193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15193">CVE-2017-15193 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17083/">CVE-2017-17083 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17083">CVE-2017-17083 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17084/">CVE-2017-17084 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17084">CVE-2017-17084 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17085/">CVE-2017-17085 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17085">CVE-2017-17085 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9617/">CVE-2017-9617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9617">CVE-2017-9617 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9766/">CVE-2017-9766 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9766">CVE-2017-9766 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565487" comment="libsmi-0.4.5-2.7.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586407" comment="libwireshark8-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586408" comment="libwiretap6-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586409" comment="libwscodecs1-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586410" comment="libwsutil7-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565492" comment="portaudio-19-234.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586411" comment="wireshark-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586412" comment="wireshark-gtk-2.2.11-40.14.5 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565487" comment="libsmi-0.4.5-2.7.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586407" comment="libwireshark8-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586408" comment="libwiretap6-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586409" comment="libwscodecs1-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586410" comment="libwsutil7-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565492" comment="portaudio-19-234.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586411" comment="wireshark-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586412" comment="wireshark-gtk-2.2.11-40.14.5 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220495" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1074171" ref_url="https://bugzilla.suse.com/1074171" source="BUGZILLA"/>
		<reference ref_id="1075737" ref_url="https://bugzilla.suse.com/1075737" source="BUGZILLA"/>
		<reference ref_id="1075738" ref_url="https://bugzilla.suse.com/1075738" source="BUGZILLA"/>
		<reference ref_id="1075739" ref_url="https://bugzilla.suse.com/1075739" source="BUGZILLA"/>
		<reference ref_id="1075748" ref_url="https://bugzilla.suse.com/1075748" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17935" ref_url="https://www.suse.com/security/cve/CVE-2017-17935/" source="CVE"/>
		<reference ref_id="CVE-2018-5334" ref_url="https://www.suse.com/security/cve/CVE-2018-5334/" source="CVE"/>
		<reference ref_id="CVE-2018-5335" ref_url="https://www.suse.com/security/cve/CVE-2018-5335/" source="CVE"/>
		<reference ref_id="CVE-2018-5336" ref_url="https://www.suse.com/security/cve/CVE-2018-5336/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003621.html" source="SUSE-SU"/>
		<description>
This update for wireshark to version 2.2.12 fixes the following issues:

- CVE-2018-5334: IxVeriWave file could crash (bsc#1075737)
- CVE-2018-5335: WCP dissector could crash (bsc#1075738)
- CVE-2018-5336: Multiple dissector crashes (bsc#1075739)
- CVE-2017-17935: Incorrect handling of '\n' in file_read_line function could
  have lead to denial of service (bsc#1074171)

This release no longer enables the Linux kernel BPF JIT compiler via the
net.core.bpf_jit_enable sysctl, as this would make systems more vulnerable
to Spectre variant 1 CVE-2017-5753 - (bsc#1075748)

Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-2.2.12.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-23"/>
	<updated date="2018-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074171">SUSE bug 1074171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075737">SUSE bug 1075737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075738">SUSE bug 1075738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075739">SUSE bug 1075739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075748">SUSE bug 1075748</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17935/">CVE-2017-17935 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17935">CVE-2017-17935 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5334/">CVE-2018-5334 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5334">CVE-2018-5334 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5335/">CVE-2018-5335 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5335">CVE-2018-5335 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5336/">CVE-2018-5336 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5336">CVE-2018-5336 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586413" comment="libwireshark8-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586414" comment="libwiretap6-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586415" comment="libwscodecs1-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586416" comment="libwsutil7-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586417" comment="wireshark-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586418" comment="wireshark-gtk-2.2.12-40.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586413" comment="libwireshark8-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586414" comment="libwiretap6-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586415" comment="libwscodecs1-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586416" comment="libwsutil7-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586417" comment="wireshark-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586418" comment="wireshark-gtk-2.2.12-40.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220496" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1077080" ref_url="https://bugzilla.suse.com/1077080" source="BUGZILLA"/>
		<reference ref_id="1082692" ref_url="https://bugzilla.suse.com/1082692" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17997" ref_url="https://www.suse.com/security/cve/CVE-2017-17997/" source="CVE"/>
		<reference ref_id="CVE-2018-7320" ref_url="https://www.suse.com/security/cve/CVE-2018-7320/" source="CVE"/>
		<reference ref_id="CVE-2018-7321" ref_url="https://www.suse.com/security/cve/CVE-2018-7321/" source="CVE"/>
		<reference ref_id="CVE-2018-7322" ref_url="https://www.suse.com/security/cve/CVE-2018-7322/" source="CVE"/>
		<reference ref_id="CVE-2018-7323" ref_url="https://www.suse.com/security/cve/CVE-2018-7323/" source="CVE"/>
		<reference ref_id="CVE-2018-7324" ref_url="https://www.suse.com/security/cve/CVE-2018-7324/" source="CVE"/>
		<reference ref_id="CVE-2018-7325" ref_url="https://www.suse.com/security/cve/CVE-2018-7325/" source="CVE"/>
		<reference ref_id="CVE-2018-7326" ref_url="https://www.suse.com/security/cve/CVE-2018-7326/" source="CVE"/>
		<reference ref_id="CVE-2018-7327" ref_url="https://www.suse.com/security/cve/CVE-2018-7327/" source="CVE"/>
		<reference ref_id="CVE-2018-7328" ref_url="https://www.suse.com/security/cve/CVE-2018-7328/" source="CVE"/>
		<reference ref_id="CVE-2018-7329" ref_url="https://www.suse.com/security/cve/CVE-2018-7329/" source="CVE"/>
		<reference ref_id="CVE-2018-7330" ref_url="https://www.suse.com/security/cve/CVE-2018-7330/" source="CVE"/>
		<reference ref_id="CVE-2018-7331" ref_url="https://www.suse.com/security/cve/CVE-2018-7331/" source="CVE"/>
		<reference ref_id="CVE-2018-7332" ref_url="https://www.suse.com/security/cve/CVE-2018-7332/" source="CVE"/>
		<reference ref_id="CVE-2018-7333" ref_url="https://www.suse.com/security/cve/CVE-2018-7333/" source="CVE"/>
		<reference ref_id="CVE-2018-7334" ref_url="https://www.suse.com/security/cve/CVE-2018-7334/" source="CVE"/>
		<reference ref_id="CVE-2018-7335" ref_url="https://www.suse.com/security/cve/CVE-2018-7335/" source="CVE"/>
		<reference ref_id="CVE-2018-7336" ref_url="https://www.suse.com/security/cve/CVE-2018-7336/" source="CVE"/>
		<reference ref_id="CVE-2018-7337" ref_url="https://www.suse.com/security/cve/CVE-2018-7337/" source="CVE"/>
		<reference ref_id="CVE-2018-7417" ref_url="https://www.suse.com/security/cve/CVE-2018-7417/" source="CVE"/>
		<reference ref_id="CVE-2018-7418" ref_url="https://www.suse.com/security/cve/CVE-2018-7418/" source="CVE"/>
		<reference ref_id="CVE-2018-7419" ref_url="https://www.suse.com/security/cve/CVE-2018-7419/" source="CVE"/>
		<reference ref_id="CVE-2018-7420" ref_url="https://www.suse.com/security/cve/CVE-2018-7420/" source="CVE"/>
		<reference ref_id="CVE-2018-7421" ref_url="https://www.suse.com/security/cve/CVE-2018-7421/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Security issue fixed (bsc#1082692):

- CVE-2018-7335: The IEEE 802.11 dissector could crash (wnpa-sec-2018-05)
- CVE-2018-7321: thrift long dissector loop (dissect_thrift_map)
- CVE-2018-7322: DICOM: inifinite loop (dissect_dcm_tag) 
- CVE-2018-7323: WCCP: very long loop (dissect_wccp2_alternate_mask_value_set_element) 
- CVE-2018-7324: SCCP: infinite loop (dissect_sccp_optional_parameters) 
- CVE-2018-7325: RPKI-Router Protocol: infinite loop (dissect_rpkirtr_pdu) 
- CVE-2018-7326: LLTD: infinite loop (dissect_lltd_tlv) 
- CVE-2018-7327: openflow_v6: infinite loop (dissect_openflow_bundle_control_v6) 
- CVE-2018-7328: USB-DARWIN: long loop (dissect_darwin_usb_iso_transfer) 
- CVE-2018-7329: S7COMM: infinite loop (s7comm_decode_ud_cpu_alarm_main) 
- CVE-2018-7330: thread_meshcop: infinite loop (get_chancount) 
- CVE-2018-7331: GTP: infinite loop (dissect_gprscdr_GGSNPDPRecord, dissect_ber_set) 
- CVE-2018-7332: RELOAD: infinite loop (dissect_statans) 
- CVE-2018-7333: RPCoRDMA: infinite loop in get_write_list_chunk_count
- CVE-2018-7421: Multiple dissectors could go into large infinite loops (wnpa-sec-2018-06)
- CVE-2018-7334: The UMTS MAC dissector could crash (wnpa-sec-2018-07)
- CVE-2018-7337: The DOCSIS dissector could crash (wnpa-sec-2018-08)
- CVE-2018-7336: The FCP dissector could crash (wnpa-sec-2018-09)
- CVE-2018-7320: The SIGCOMP dissector could crash (wnpa-sec-2018-10)
- CVE-2018-7420: The pcapng file parser could crash (wnpa-sec-2018-11)
- CVE-2018-7417: The IPMI dissector could crash (wnpa-sec-2018-12)
- CVE-2018-7418: The SIGCOMP dissector could crash (wnpa-sec-2018-13)
- CVE-2018-7419: The NBAP disssector could crash (wnpa-sec-2018-14)
- CVE-2017-17997: Misuse of NULL pointer in MRDISC dissector (bsc#1077080).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077080">SUSE bug 1077080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17997/">CVE-2017-17997 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17997">CVE-2017-17997 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7320/">CVE-2018-7320 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7320">CVE-2018-7320 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7321/">CVE-2018-7321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7321">CVE-2018-7321 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7322/">CVE-2018-7322 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7322">CVE-2018-7322 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7323/">CVE-2018-7323 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7323">CVE-2018-7323 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7324/">CVE-2018-7324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7324">CVE-2018-7324 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7325/">CVE-2018-7325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7325">CVE-2018-7325 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7326/">CVE-2018-7326 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7326">CVE-2018-7326 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7327/">CVE-2018-7327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7327">CVE-2018-7327 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7328/">CVE-2018-7328 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7328">CVE-2018-7328 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7329/">CVE-2018-7329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7329">CVE-2018-7329 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7330/">CVE-2018-7330 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7330">CVE-2018-7330 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7331/">CVE-2018-7331 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7331">CVE-2018-7331 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7332/">CVE-2018-7332 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7332">CVE-2018-7332 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7333/">CVE-2018-7333 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7333">CVE-2018-7333 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7334/">CVE-2018-7334 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7334">CVE-2018-7334 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7335/">CVE-2018-7335 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7335">CVE-2018-7335 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7336/">CVE-2018-7336 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7336">CVE-2018-7336 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7337/">CVE-2018-7337 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7337">CVE-2018-7337 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7417/">CVE-2018-7417 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7417">CVE-2018-7417 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7418/">CVE-2018-7418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7418">CVE-2018-7418 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7419/">CVE-2018-7419 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7419">CVE-2018-7419 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7420/">CVE-2018-7420 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7420">CVE-2018-7420 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7421/">CVE-2018-7421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7421">CVE-2018-7421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586419" comment="libwireshark8-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586420" comment="libwiretap6-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586421" comment="libwscodecs1-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586422" comment="libwsutil7-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586423" comment="wireshark-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586424" comment="wireshark-gtk-2.2.13-40.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586419" comment="libwireshark8-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586420" comment="libwiretap6-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586421" comment="libwscodecs1-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586422" comment="libwsutil7-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586423" comment="wireshark-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586424" comment="wireshark-gtk-2.2.13-40.22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220497" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1088200" ref_url="https://bugzilla.suse.com/1088200" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-9256" ref_url="https://www.suse.com/security/cve/CVE-2018-9256/" source="CVE"/>
		<reference ref_id="CVE-2018-9259" ref_url="https://www.suse.com/security/cve/CVE-2018-9259/" source="CVE"/>
		<reference ref_id="CVE-2018-9260" ref_url="https://www.suse.com/security/cve/CVE-2018-9260/" source="CVE"/>
		<reference ref_id="CVE-2018-9261" ref_url="https://www.suse.com/security/cve/CVE-2018-9261/" source="CVE"/>
		<reference ref_id="CVE-2018-9262" ref_url="https://www.suse.com/security/cve/CVE-2018-9262/" source="CVE"/>
		<reference ref_id="CVE-2018-9263" ref_url="https://www.suse.com/security/cve/CVE-2018-9263/" source="CVE"/>
		<reference ref_id="CVE-2018-9264" ref_url="https://www.suse.com/security/cve/CVE-2018-9264/" source="CVE"/>
		<reference ref_id="CVE-2018-9265" ref_url="https://www.suse.com/security/cve/CVE-2018-9265/" source="CVE"/>
		<reference ref_id="CVE-2018-9266" ref_url="https://www.suse.com/security/cve/CVE-2018-9266/" source="CVE"/>
		<reference ref_id="CVE-2018-9267" ref_url="https://www.suse.com/security/cve/CVE-2018-9267/" source="CVE"/>
		<reference ref_id="CVE-2018-9268" ref_url="https://www.suse.com/security/cve/CVE-2018-9268/" source="CVE"/>
		<reference ref_id="CVE-2018-9269" ref_url="https://www.suse.com/security/cve/CVE-2018-9269/" source="CVE"/>
		<reference ref_id="CVE-2018-9270" ref_url="https://www.suse.com/security/cve/CVE-2018-9270/" source="CVE"/>
		<reference ref_id="CVE-2018-9271" ref_url="https://www.suse.com/security/cve/CVE-2018-9271/" source="CVE"/>
		<reference ref_id="CVE-2018-9272" ref_url="https://www.suse.com/security/cve/CVE-2018-9272/" source="CVE"/>
		<reference ref_id="CVE-2018-9273" ref_url="https://www.suse.com/security/cve/CVE-2018-9273/" source="CVE"/>
		<reference ref_id="CVE-2018-9274" ref_url="https://www.suse.com/security/cve/CVE-2018-9274/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003899.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

- Update to wireshark 2.2.14, fix such issues:
  * bsc#1088200 VUL-0: wireshark: multiple vulnerabilities
    fixed in 2.2.14, 2.4.6
  * CVE-2018-9256: LWAPP dissector crash
  * CVE-2018-9260: IEEE 802.15.4 dissector crash
  * CVE-2018-9261: NBAP dissector crash
  * CVE-2018-9262: VLAN dissector crash
  * CVE-2018-9263: Kerberos dissector crash
  * CVE-2018-9264: ADB dissector crash
  * CVE-2018-9265: tn3270 dissector has a memory leak
  * CVE-2018-9266: ISUP dissector memory leak
  * CVE-2018-9267: LAPD dissector memory leak
  * CVE-2018-9268: SMB2 dissector memory leak
  * CVE-2018-9269: GIOP dissector memory leak
  * CVE-2018-9270: OIDS dissector memory leak
  * CVE-2018-9271: multipart dissector memory leak
  * CVE-2018-9272: h223 dissector memory leak
  * CVE-2018-9273: pcp dissector memory leak
  * CVE-2018-9274: failure message memory leak
  * CVE-2018-9259: MP4 dissector crash
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-19"/>
	<updated date="2018-04-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9256/">CVE-2018-9256 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9256">CVE-2018-9256 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9259/">CVE-2018-9259 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9259">CVE-2018-9259 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9260/">CVE-2018-9260 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9260">CVE-2018-9260 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9261/">CVE-2018-9261 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9261">CVE-2018-9261 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9262/">CVE-2018-9262 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9262">CVE-2018-9262 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9263/">CVE-2018-9263 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9263">CVE-2018-9263 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9264/">CVE-2018-9264 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9264">CVE-2018-9264 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9265/">CVE-2018-9265 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9265">CVE-2018-9265 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9266/">CVE-2018-9266 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9266">CVE-2018-9266 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9267/">CVE-2018-9267 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9267">CVE-2018-9267 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9268/">CVE-2018-9268 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9268">CVE-2018-9268 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9269/">CVE-2018-9269 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9269">CVE-2018-9269 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9270/">CVE-2018-9270 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9270">CVE-2018-9270 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9271/">CVE-2018-9271 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9271">CVE-2018-9271 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9272/">CVE-2018-9272 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9272">CVE-2018-9272 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9273/">CVE-2018-9273 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9273">CVE-2018-9273 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9274/">CVE-2018-9274 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9274">CVE-2018-9274 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586425" comment="libwireshark8-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586426" comment="libwiretap6-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586427" comment="libwscodecs1-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586428" comment="libwsutil7-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586429" comment="wireshark-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586430" comment="wireshark-gtk-2.2.14-40.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586425" comment="libwireshark8-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586426" comment="libwiretap6-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586427" comment="libwscodecs1-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586428" comment="libwsutil7-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586429" comment="wireshark-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586430" comment="wireshark-gtk-2.2.14-40.25.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220498" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1094301" ref_url="https://bugzilla.suse.com/1094301" source="BUGZILLA"/>
		<reference ref_id="1101776" ref_url="https://bugzilla.suse.com/1101776" source="BUGZILLA"/>
		<reference ref_id="1101777" ref_url="https://bugzilla.suse.com/1101777" source="BUGZILLA"/>
		<reference ref_id="1101786" ref_url="https://bugzilla.suse.com/1101786" source="BUGZILLA"/>
		<reference ref_id="1101788" ref_url="https://bugzilla.suse.com/1101788" source="BUGZILLA"/>
		<reference ref_id="1101791" ref_url="https://bugzilla.suse.com/1101791" source="BUGZILLA"/>
		<reference ref_id="1101794" ref_url="https://bugzilla.suse.com/1101794" source="BUGZILLA"/>
		<reference ref_id="1101800" ref_url="https://bugzilla.suse.com/1101800" source="BUGZILLA"/>
		<reference ref_id="1101802" ref_url="https://bugzilla.suse.com/1101802" source="BUGZILLA"/>
		<reference ref_id="1101804" ref_url="https://bugzilla.suse.com/1101804" source="BUGZILLA"/>
		<reference ref_id="1101810" ref_url="https://bugzilla.suse.com/1101810" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11354" ref_url="https://www.suse.com/security/cve/CVE-2018-11354/" source="CVE"/>
		<reference ref_id="CVE-2018-11355" ref_url="https://www.suse.com/security/cve/CVE-2018-11355/" source="CVE"/>
		<reference ref_id="CVE-2018-11356" ref_url="https://www.suse.com/security/cve/CVE-2018-11356/" source="CVE"/>
		<reference ref_id="CVE-2018-11357" ref_url="https://www.suse.com/security/cve/CVE-2018-11357/" source="CVE"/>
		<reference ref_id="CVE-2018-11358" ref_url="https://www.suse.com/security/cve/CVE-2018-11358/" source="CVE"/>
		<reference ref_id="CVE-2018-11359" ref_url="https://www.suse.com/security/cve/CVE-2018-11359/" source="CVE"/>
		<reference ref_id="CVE-2018-11360" ref_url="https://www.suse.com/security/cve/CVE-2018-11360/" source="CVE"/>
		<reference ref_id="CVE-2018-11361" ref_url="https://www.suse.com/security/cve/CVE-2018-11361/" source="CVE"/>
		<reference ref_id="CVE-2018-11362" ref_url="https://www.suse.com/security/cve/CVE-2018-11362/" source="CVE"/>
		<reference ref_id="CVE-2018-14339" ref_url="https://www.suse.com/security/cve/CVE-2018-14339/" source="CVE"/>
		<reference ref_id="CVE-2018-14340" ref_url="https://www.suse.com/security/cve/CVE-2018-14340/" source="CVE"/>
		<reference ref_id="CVE-2018-14341" ref_url="https://www.suse.com/security/cve/CVE-2018-14341/" source="CVE"/>
		<reference ref_id="CVE-2018-14342" ref_url="https://www.suse.com/security/cve/CVE-2018-14342/" source="CVE"/>
		<reference ref_id="CVE-2018-14343" ref_url="https://www.suse.com/security/cve/CVE-2018-14343/" source="CVE"/>
		<reference ref_id="CVE-2018-14344" ref_url="https://www.suse.com/security/cve/CVE-2018-14344/" source="CVE"/>
		<reference ref_id="CVE-2018-14367" ref_url="https://www.suse.com/security/cve/CVE-2018-14367/" source="CVE"/>
		<reference ref_id="CVE-2018-14368" ref_url="https://www.suse.com/security/cve/CVE-2018-14368/" source="CVE"/>
		<reference ref_id="CVE-2018-14369" ref_url="https://www.suse.com/security/cve/CVE-2018-14369/" source="CVE"/>
		<reference ref_id="CVE-2018-14370" ref_url="https://www.suse.com/security/cve/CVE-2018-14370/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Security issues fixed:

- bsc#1094301: Wireshark security update to 2.6.1, 2.4.7, 2.2.15
- CVE-2018-14339: MMSE dissector infinite loop (wnpa-sec-2018-38, bsc#1101810)
- CVE-2018-14341: DICOM dissector crash (wnpa-sec-2018-39, bsc#1101776)
- CVE-2018-14343: ASN.1 BER dissector crash (wnpa-sec-2018-37, bsc#1101786)
- CVE-2018-14344: ISMP dissector crash (wnpa-sec-2018-35, bsc#1101788)
- CVE-2018-14340: Multiple dissectors could crash (wnpa-sec-2018-36, bsc#1101804)
- CVE-2018-14342: BGP dissector large loop (wnpa-sec-2018-34, bsc#1101777)
- CVE-2018-14370: IEEE 802.11 dissector crash (wnpa-sec-2018-43, bsc#1101802)
- CVE-2018-14369: HTTP2 dissector crash (wnpa-sec-2018-41, bsc#1101800)
- CVE-2018-14367: CoAP dissector crash (wnpa-sec-2018-42, bsc#1101791)
- CVE-2018-14368: Bazaar dissector infinite loop (wnpa-sec-2018-40, bsc#1101794)
- CVE-2018-11355: Fix RTCP dissector crash (bsc#1094301).
- CVE-2018-11362: Fix LDSS dissector crash (bsc#1094301).
- CVE-2018-11361: Fix IEEE 802.11 dissector crash (bsc#1094301).
- CVE-2018-11360: Fix GSM A DTAP dissector crash (bsc#1094301).
- CVE-2018-11358: Fix Q.931 dissector crash (bsc#1094301).
- CVE-2018-11359: Fix multiple dissectors crashs (bsc#1094301).
- CVE-2018-11356: Fix DNS dissector crash (bsc#1094301).
- CVE-2018-11357: Fix multiple dissectors that could consume excessive memory (bsc#1094301).
- CVE-2018-11354: Fix IEEE 1905.1a dissector crash (bsc#1094301).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101776">SUSE bug 1101776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101777">SUSE bug 1101777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101786">SUSE bug 1101786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101788">SUSE bug 1101788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101791">SUSE bug 1101791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101794">SUSE bug 1101794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101800">SUSE bug 1101800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101802">SUSE bug 1101802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101804">SUSE bug 1101804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101810">SUSE bug 1101810</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11354/">CVE-2018-11354 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11354">CVE-2018-11354 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11355/">CVE-2018-11355 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11355">CVE-2018-11355 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11356/">CVE-2018-11356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11356">CVE-2018-11356 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11357/">CVE-2018-11357 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11357">CVE-2018-11357 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11358/">CVE-2018-11358 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11358">CVE-2018-11358 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11359/">CVE-2018-11359 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11359">CVE-2018-11359 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11360/">CVE-2018-11360 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11360">CVE-2018-11360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11361/">CVE-2018-11361 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11361">CVE-2018-11361 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11362/">CVE-2018-11362 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11362">CVE-2018-11362 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14339/">CVE-2018-14339 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14339">CVE-2018-14339 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14340/">CVE-2018-14340 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14340">CVE-2018-14340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14341/">CVE-2018-14341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14341">CVE-2018-14341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14342/">CVE-2018-14342 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14342">CVE-2018-14342 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14343/">CVE-2018-14343 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14343">CVE-2018-14343 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14344/">CVE-2018-14344 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14344">CVE-2018-14344 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14367/">CVE-2018-14367 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14367">CVE-2018-14367 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14368/">CVE-2018-14368 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14368">CVE-2018-14368 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14369/">CVE-2018-14369 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14369">CVE-2018-14369 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14370/">CVE-2018-14370 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14370">CVE-2018-14370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586431" comment="libwireshark8-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586432" comment="libwiretap6-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586433" comment="libwscodecs1-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586434" comment="libwsutil7-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586435" comment="wireshark-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586436" comment="wireshark-gtk-2.2.16-40.28.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586431" comment="libwireshark8-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586432" comment="libwiretap6-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586433" comment="libwscodecs1-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586434" comment="libwsutil7-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586435" comment="wireshark-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586436" comment="wireshark-gtk-2.2.16-40.28.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220499" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1106514" ref_url="https://bugzilla.suse.com/1106514" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16056" ref_url="https://www.suse.com/security/cve/CVE-2018-16056/" source="CVE"/>
		<reference ref_id="CVE-2018-16057" ref_url="https://www.suse.com/security/cve/CVE-2018-16057/" source="CVE"/>
		<reference ref_id="CVE-2018-16058" ref_url="https://www.suse.com/security/cve/CVE-2018-16058/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004604.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Update wireshark to version 2.2.17 (bsc#1106514):

Security issues fixed:

- CVE-2018-16058: Bluetooth AVDTP dissector crash (wnpa-sec-2018-44)
- CVE-2018-16056: Bluetooth Attribute Protocol dissector crash (wnpa-sec-2018-45)
- CVE-2018-16057: Radiotap dissector crash (wnpa-sec-2018-46)

Further bug fixes and updated protocol support as listed in:
  https://www.wireshark.org/docs/relnotes/wireshark-2.2.17.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-26"/>
	<updated date="2018-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106514">SUSE bug 1106514</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16056/">CVE-2018-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16056">CVE-2018-16056 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16057/">CVE-2018-16057 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16057">CVE-2018-16057 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16058/">CVE-2018-16058 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16058">CVE-2018-16058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586437" comment="libwireshark8-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586438" comment="libwiretap6-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586439" comment="libwscodecs1-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586440" comment="libwsutil7-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586441" comment="wireshark-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586442" comment="wireshark-gtk-2.2.17-40.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586437" comment="libwireshark8-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586438" comment="libwiretap6-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586439" comment="libwscodecs1-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586440" comment="libwsutil7-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586441" comment="wireshark-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586442" comment="wireshark-gtk-2.2.17-40.31.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220500" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="930077" ref_url="https://bugzilla.suse.com/930077" source="BUGZILLA"/>
		<reference ref_id="930078" ref_url="https://bugzilla.suse.com/930078" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4141" ref_url="https://www.suse.com/security/cve/CVE-2015-4141/" source="CVE"/>
		<reference ref_id="CVE-2015-4142" ref_url="https://www.suse.com/security/cve/CVE-2015-4142/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001725.html" source="SUSE-SU"/>
		<description>
wpa_supplicant was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-4142: Integer underflow in the WMM Action frame parser in hostapd and wpa_supplicant, when used for AP mode MLME/SME functionality, allowed remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read (bsc#930078).
- CVE-2015-4141: The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), allowed remote attackers to cause a denial of service (crash) via a negative chunk length, which triggered an out-of-bounds read or heap-based buffer overflow (bsc#930077).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/930077">SUSE bug 930077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930078">SUSE bug 930078</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4141/">CVE-2015-4141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4141">CVE-2015-4141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4142/">CVE-2015-4142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4142">CVE-2015-4142 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581537" comment="wpa_supplicant-0.7.1-6.17.4 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581537" comment="wpa_supplicant-0.7.1-6.17.4 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220501" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1056061" ref_url="https://bugzilla.suse.com/1056061" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078/" source="CVE"/>
		<reference ref_id="CVE-2017-13079" ref_url="https://www.suse.com/security/cve/CVE-2017-13079/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="CVE-2017-13087" ref_url="https://www.suse.com/security/cve/CVE-2017-13087/" source="CVE"/>
		<reference ref_id="CVE-2017-13088" ref_url="https://www.suse.com/security/cve/CVE-2017-13088/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003304.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- Several vulnerabilities in standard conforming implementations of the WPA2
  protocol have been discovered and published under the code name KRACK. This
  update remedies those issues in a backwards compatible manner, i.e. the
  updated wpa_supplicant can interface properly with both vulnerable and
  patched implementations of WPA2, but an attacker won't be able to exploit the
  KRACK weaknesses in those connections anymore even if the other party is
  still vulnerable. [bsc#1056061, CVE-2017-13078, CVE-2017-13079,
  CVE-2017-13080, CVE-2017-13081, CVE-2017-13087, CVE-2017-13088]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-17"/>
	<updated date="2017-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13078">CVE-2017-13078 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13079/">CVE-2017-13079 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13079">CVE-2017-13079 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13081">CVE-2017-13081 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13087/">CVE-2017-13087 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13087">CVE-2017-13087 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13088/">CVE-2017-13088 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13088">CVE-2017-13088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586443" comment="wpa_supplicant-0.7.1-6.18.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586443" comment="wpa_supplicant-0.7.1-6.18.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220502" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="915323" ref_url="https://bugzilla.suse.com/915323" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0210" ref_url="https://www.suse.com/security/cve/CVE-2015-0210/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004183.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

Security issue fixed:

- CVE-2015-0210: Fix broken certificate subject check (bsc#915323.)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-12"/>
	<updated date="2018-06-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0210/">CVE-2015-0210 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0210">CVE-2015-0210 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586444" comment="wpa_supplicant-0.7.1-6.18.6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586444" comment="wpa_supplicant-0.7.1-6.18.6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220503" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="925466" ref_url="https://bugzilla.suse.com/925466" source="BUGZILLA"/>
		<reference ref_id="935634" ref_url="https://bugzilla.suse.com/935634" source="BUGZILLA"/>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3259" ref_url="https://www.suse.com/security/cve/CVE-2015-3259/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001509.html" source="SUSE-SU"/>
		<description>
xen was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-3259: xl command line config handling stack overflow (bsc#935634, XSA-137).
- CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344).

This non-security issue was fixed:
- Kdump did not work in a XEN environment (bsc#925466).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-17"/>
	<updated date="2015-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/925466">SUSE bug 925466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935634">SUSE bug 935634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3259/">CVE-2015-3259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3259">CVE-2015-3259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5154">CVE-2015-5154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567451" comment="xen-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567452" comment="xen-doc-html-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567453" comment="xen-kmp-default-4.4.2_10_3.0.101_63-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567454" comment="xen-kmp-pae-4.4.2_10_3.0.101_63-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567455" comment="xen-libs-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567456" comment="xen-libs-32bit-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567457" comment="xen-tools-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567458" comment="xen-tools-domU-4.4.2_10-5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567451" comment="xen-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567452" comment="xen-doc-html-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567453" comment="xen-kmp-default-4.4.2_10_3.0.101_63-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567454" comment="xen-kmp-pae-4.4.2_10_3.0.101_63-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567455" comment="xen-libs-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567456" comment="xen-libs-32bit-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567457" comment="xen-tools-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567458" comment="xen-tools-domU-4.4.2_10-5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220504" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="901488" ref_url="https://bugzilla.suse.com/901488" source="BUGZILLA"/>
		<reference ref_id="907514" ref_url="https://bugzilla.suse.com/907514" source="BUGZILLA"/>
		<reference ref_id="910258" ref_url="https://bugzilla.suse.com/910258" source="BUGZILLA"/>
		<reference ref_id="918984" ref_url="https://bugzilla.suse.com/918984" source="BUGZILLA"/>
		<reference ref_id="923967" ref_url="https://bugzilla.suse.com/923967" source="BUGZILLA"/>
		<reference ref_id="932267" ref_url="https://bugzilla.suse.com/932267" source="BUGZILLA"/>
		<reference ref_id="944463" ref_url="https://bugzilla.suse.com/944463" source="BUGZILLA"/>
		<reference ref_id="944697" ref_url="https://bugzilla.suse.com/944697" source="BUGZILLA"/>
		<reference ref_id="945167" ref_url="https://bugzilla.suse.com/945167" source="BUGZILLA"/>
		<reference ref_id="947165" ref_url="https://bugzilla.suse.com/947165" source="BUGZILLA"/>
		<reference ref_id="949138" ref_url="https://bugzilla.suse.com/949138" source="BUGZILLA"/>
		<reference ref_id="949549" ref_url="https://bugzilla.suse.com/949549" source="BUGZILLA"/>
		<reference ref_id="950367" ref_url="https://bugzilla.suse.com/950367" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001665.html" source="SUSE-SU"/>
		<description>
xen was updated to version 4.4.3 to fix nine security issues.

These security issues were fixed:
- CVE-2015-4037: The slirp_smb function in net/slirp.c created temporary files with predictable names, which allowed local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program (bsc#932267).
- CVE-2014-0222: Integer overflow in the qcow_open function allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests (bsc#950367).
- CVE-2015-7311: libxl in Xen did not properly handle the readonly flag on disks when using the qemu-xen device model, which allowed local guest users to write to a read-only disk image (bsc#947165).
- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).
- CVE-2015-6815: With e1000 NIC emulation support it was possible to enter an infinite loop (bsc#944697).
- CVE-2015-7969: Leak of main per-domain vcpu pointer array leading to denial of service (bsc#950703).
- CVE-2015-7969: Leak of per-domain profiling- related vcpu pointer array leading to denial of service (bsc#950705).
- CVE-2015-7971: Some pmu and profiling hypercalls log without rate limiting (bsc#950706).

These non-security issues were fixed:
- bsc#907514: Bus fatal error: SLES 12 sudden reboot has been observed
- bsc#910258: SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC
- bsc#918984: Bus fatal error: SLES11-SP4 sudden reboot has been observed
- bsc#923967: Partner-L3: Bus fatal error: SLES11-SP3 sudden reboot has been observed
- bnc#901488: Intel ixgbe driver assigns rx/tx queues per core resulting in irq problems on servers with a large amount of CPU cores
- bsc#945167: Running command: xl pci-assignable-add 03:10.1 secondly show errors
- bsc#949138: Setting vcpu affinity under Xen causes libvirtd abort
- bsc#949549: xm create hangs when maxmen value is enclosed in quotes
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-29"/>
	<updated date="2015-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901488">SUSE bug 901488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907514">SUSE bug 907514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910258">SUSE bug 910258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918984">SUSE bug 918984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923967">SUSE bug 923967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944463">SUSE bug 944463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944697">SUSE bug 944697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945167">SUSE bug 945167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947165">SUSE bug 947165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949138">SUSE bug 949138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949549">SUSE bug 949549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0222">CVE-2014-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4037">CVE-2015-4037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5239">CVE-2015-5239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6815">CVE-2015-6815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7311">CVE-2015-7311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7835">CVE-2015-7835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7969">CVE-2015-7969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7971">CVE-2015-7971 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567459" comment="xen-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567460" comment="xen-doc-html-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567461" comment="xen-kmp-default-4.4.3_02_3.0.101_65-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567462" comment="xen-kmp-pae-4.4.3_02_3.0.101_65-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567463" comment="xen-libs-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567464" comment="xen-libs-32bit-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567465" comment="xen-tools-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567466" comment="xen-tools-domU-4.4.3_02-26.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567459" comment="xen-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567460" comment="xen-doc-html-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567461" comment="xen-kmp-default-4.4.3_02_3.0.101_65-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567462" comment="xen-kmp-pae-4.4.3_02_3.0.101_65-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567463" comment="xen-libs-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567464" comment="xen-libs-32bit-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567465" comment="xen-tools-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567466" comment="xen-tools-domU-4.4.3_02-26.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220505" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="864391" ref_url="https://bugzilla.suse.com/864391" source="BUGZILLA"/>
		<reference ref_id="864655" ref_url="https://bugzilla.suse.com/864655" source="BUGZILLA"/>
		<reference ref_id="864673" ref_url="https://bugzilla.suse.com/864673" source="BUGZILLA"/>
		<reference ref_id="864678" ref_url="https://bugzilla.suse.com/864678" source="BUGZILLA"/>
		<reference ref_id="864682" ref_url="https://bugzilla.suse.com/864682" source="BUGZILLA"/>
		<reference ref_id="864769" ref_url="https://bugzilla.suse.com/864769" source="BUGZILLA"/>
		<reference ref_id="864805" ref_url="https://bugzilla.suse.com/864805" source="BUGZILLA"/>
		<reference ref_id="864811" ref_url="https://bugzilla.suse.com/864811" source="BUGZILLA"/>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="897654" ref_url="https://bugzilla.suse.com/897654" source="BUGZILLA"/>
		<reference ref_id="901508" ref_url="https://bugzilla.suse.com/901508" source="BUGZILLA"/>
		<reference ref_id="902737" ref_url="https://bugzilla.suse.com/902737" source="BUGZILLA"/>
		<reference ref_id="924018" ref_url="https://bugzilla.suse.com/924018" source="BUGZILLA"/>
		<reference ref_id="928393" ref_url="https://bugzilla.suse.com/928393" source="BUGZILLA"/>
		<reference ref_id="945404" ref_url="https://bugzilla.suse.com/945404" source="BUGZILLA"/>
		<reference ref_id="945989" ref_url="https://bugzilla.suse.com/945989" source="BUGZILLA"/>
		<reference ref_id="954872" ref_url="https://bugzilla.suse.com/954872" source="BUGZILLA"/>
		<reference ref_id="956829" ref_url="https://bugzilla.suse.com/956829" source="BUGZILLA"/>
		<reference ref_id="957162" ref_url="https://bugzilla.suse.com/957162" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="958007" ref_url="https://bugzilla.suse.com/958007" source="BUGZILLA"/>
		<reference ref_id="958009" ref_url="https://bugzilla.suse.com/958009" source="BUGZILLA"/>
		<reference ref_id="958491" ref_url="https://bugzilla.suse.com/958491" source="BUGZILLA"/>
		<reference ref_id="958523" ref_url="https://bugzilla.suse.com/958523" source="BUGZILLA"/>
		<reference ref_id="958917" ref_url="https://bugzilla.suse.com/958917" source="BUGZILLA"/>
		<reference ref_id="959005" ref_url="https://bugzilla.suse.com/959005" source="BUGZILLA"/>
		<reference ref_id="959387" ref_url="https://bugzilla.suse.com/959387" source="BUGZILLA"/>
		<reference ref_id="959695" ref_url="https://bugzilla.suse.com/959695" source="BUGZILLA"/>
		<reference ref_id="959928" ref_url="https://bugzilla.suse.com/959928" source="BUGZILLA"/>
		<reference ref_id="960334" ref_url="https://bugzilla.suse.com/960334" source="BUGZILLA"/>
		<reference ref_id="960707" ref_url="https://bugzilla.suse.com/960707" source="BUGZILLA"/>
		<reference ref_id="960725" ref_url="https://bugzilla.suse.com/960725" source="BUGZILLA"/>
		<reference ref_id="960835" ref_url="https://bugzilla.suse.com/960835" source="BUGZILLA"/>
		<reference ref_id="960861" ref_url="https://bugzilla.suse.com/960861" source="BUGZILLA"/>
		<reference ref_id="960862" ref_url="https://bugzilla.suse.com/960862" source="BUGZILLA"/>
		<reference ref_id="961332" ref_url="https://bugzilla.suse.com/961332" source="BUGZILLA"/>
		<reference ref_id="961358" ref_url="https://bugzilla.suse.com/961358" source="BUGZILLA"/>
		<reference ref_id="961691" ref_url="https://bugzilla.suse.com/961691" source="BUGZILLA"/>
		<reference ref_id="962320" ref_url="https://bugzilla.suse.com/962320" source="BUGZILLA"/>
		<reference ref_id="963782" ref_url="https://bugzilla.suse.com/963782" source="BUGZILLA"/>
		<reference ref_id="963923" ref_url="https://bugzilla.suse.com/963923" source="BUGZILLA"/>
		<reference ref_id="964413" ref_url="https://bugzilla.suse.com/964413" source="BUGZILLA"/>
		<reference ref_id="965315" ref_url="https://bugzilla.suse.com/965315" source="BUGZILLA"/>
		<reference ref_id="965317" ref_url="https://bugzilla.suse.com/965317" source="BUGZILLA"/>
		<reference ref_id="967012" ref_url="https://bugzilla.suse.com/967012" source="BUGZILLA"/>
		<reference ref_id="967013" ref_url="https://bugzilla.suse.com/967013" source="BUGZILLA"/>
		<reference ref_id="967630" ref_url="https://bugzilla.suse.com/967630" source="BUGZILLA"/>
		<reference ref_id="967969" ref_url="https://bugzilla.suse.com/967969" source="BUGZILLA"/>
		<reference ref_id="969121" ref_url="https://bugzilla.suse.com/969121" source="BUGZILLA"/>
		<reference ref_id="969122" ref_url="https://bugzilla.suse.com/969122" source="BUGZILLA"/>
		<reference ref_id="969350" ref_url="https://bugzilla.suse.com/969350" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4527" ref_url="https://www.suse.com/security/cve/CVE-2013-4527/" source="CVE"/>
		<reference ref_id="CVE-2013-4529" ref_url="https://www.suse.com/security/cve/CVE-2013-4529/" source="CVE"/>
		<reference ref_id="CVE-2013-4530" ref_url="https://www.suse.com/security/cve/CVE-2013-4530/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3689" ref_url="https://www.suse.com/security/cve/CVE-2014-3689/" source="CVE"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2014-9718" ref_url="https://www.suse.com/security/cve/CVE-2014-9718/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554/" source="CVE"/>
		<reference ref_id="CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2015-8817" ref_url="https://www.suse.com/security/cve/CVE-2015-8817/" source="CVE"/>
		<reference ref_id="CVE-2015-8818" ref_url="https://www.suse.com/security/cve/CVE-2015-8818/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1570" ref_url="https://www.suse.com/security/cve/CVE-2016-1570/" source="CVE"/>
		<reference ref_id="CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270/" source="CVE"/>
		<reference ref_id="CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392/" source="CVE"/>
		<reference ref_id="CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<description>
xen was updated to fix 47 security issues.

These security issues were fixed:
- CVE-2013-4527: Buffer overflow in hw/timer/hpet.c might have allowed remote attackers to execute arbitrary code via vectors related to the number of timers (bnc#864673).
- CVE-2013-4529: Buffer overflow in hw/pci/pcie_aer.c allowed remote attackers to cause a denial of service and possibly execute arbitrary code via a large log_num value in a savevm image (bnc#864678).
- CVE-2013-4530: Buffer overflow in hw/ssi/pl022.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via crafted tx_fifo_head and rx_fifo_head values in a savevm image (bnc#864682).
- CVE-2013-4533: Buffer overflow in the pxa2xx_ssp_load function in hw/arm/pxa2xx.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted s-&gt;rx_level value in a savevm image (bsc#864655).
- CVE-2013-4534: Buffer overflow in hw/intc/openpic.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via vectors related to IRQDest elements (bsc#864811).
- CVE-2013-4537: The ssi_sd_transfer function in hw/sd/ssi-sd.c allowed remote attackers to execute arbitrary code via a crafted arglen value in a savevm image (bsc#864391).
- CVE-2013-4538: Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c allowed remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image (bsc#864769).
- CVE-2013-4539: Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c might have allowed remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image (bsc#864805).
- CVE-2014-0222: Integer overflow in the qcow_open function in block/qcow.c allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2014-3640: The sosendto function in slirp/udp.c allowed local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket (bsc#897654).
- CVE-2014-3689: The vmware-vga driver (hw/display/vmware_vga.c) allowed local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling (bsc#901508).
- CVE-2014-7815: The set_pixel_format function in ui/vnc.c allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value (bsc#902737).
- CVE-2014-9718: The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality had multiple interpretations of a function's return value, which allowed guest OS users to cause a host OS denial of service (memory consumption or infinite loop, and system crash) via a PRDT with zero complete sectors, related to the bmdma_prepare_buf and ahci_dma_prepare_buf functions (bsc#928393).
- CVE-2015-1779: The VNC websocket frame decoder allowed remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section (bsc#924018).
- CVE-2015-5278: Infinite loop in ne2000_receive() function (bsc#945989).
- CVE-2015-6855: hw/ide/core.c did not properly restrict the commands accepted by an ATAPI device, which allowed guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash (bsc#945404).
- CVE-2015-7512: Buffer overflow in the pcnet_receive function in hw/net/pcnet.c, when a guest NIC has a larger MTU, allowed remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet (bsc#957162).
- CVE-2015-7549: pci: NULL pointer dereference issue (bsc#958917).
- CVE-2015-8345: eepro100: infinite loop in processing command block list (bsc#956829).
- CVE-2015-8504: VNC: floating point exception (bsc#958491).
- CVE-2015-8550: Paravirtualized drivers were incautious about shared memory contents (XSA-155) (bsc#957988).
- CVE-2015-8554: qemu-dm buffer overrun in MSI-X handling (XSA-164) (bsc#958007).
- CVE-2015-8555: Information leak in legacy x86 FPU/XMM initialization (XSA-165) (bsc#958009).
- CVE-2015-8558: Infinite loop in ehci_advance_state resulted in DoS (bsc#959005).
- CVE-2015-8567: vmxnet3: host memory leakage (bsc#959387).
- CVE-2015-8568: vmxnet3: host memory leakage (bsc#959387).
- CVE-2015-8613: SCSI: stack based buffer overflow in megasas_ctrl_get_info (bsc#961358).
- CVE-2015-8619: Stack based OOB write in hmp_sendkey routine (bsc#960334).
- CVE-2015-8743: ne2000: OOB memory access in ioport r/w functions (bsc#960725).
- CVE-2015-8744: vmxnet3: Incorrect l2 header validation lead to a crash via assert(2) call (bsc#960835).
- CVE-2015-8745: Reading IMR registers lead to a crash via assert(2) call (bsc#960707).
- CVE-2015-8817: OOB access in address_space_rw lead to segmentation fault (I) (bsc#969121).
- CVE-2015-8818: OOB access in address_space_rw lead to segmentation fault (II) (bsc#969122).
- CVE-2016-1568: AHCI use-after-free vulnerability in aio port commands (bsc#961332).
- CVE-2016-1570: The PV superpage functionality in arch/x86/mm.c allowed local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2) MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3) unknown vectors related to page table updates (bsc#960861).
- CVE-2016-1571: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) (bsc#960862).
- CVE-2016-1714: nvram: OOB r/w access in processing firmware configurations (bsc#961691).
- CVE-2016-1922: NULL pointer dereference in vapic_write() (bsc#962320).
- CVE-2016-1981: e1000 infinite loop in start_xmit and e1000_receive_iov routines (bsc#963782).
- CVE-2016-2198: EHCI NULL pointer dereference in ehci_caps_write (bsc#964413).
- CVE-2016-2270: Xen allowed local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings (bsc#965315).
- CVE-2016-2271: VMX when using an Intel or Cyrix CPU, allowed local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP (bsc#965317).
- CVE-2016-2391: usb: multiple eof_timers in ohci module lead to NULL pointer dereference (bsc#967013).
- CVE-2016-2392: NULL pointer dereference in remote NDIS control message handling (bsc#967012).
- CVE-2016-2538: Integer overflow in remote NDIS control message handling (bsc#967969).
- CVE-2016-2841: ne2000: Infinite loop in ne2000_receive (bsc#969350).
- XSA-166: ioreq handling possibly susceptible to multiple read issue (bsc#958523).

These non-security issues were fixed:
- bsc#954872: script block-dmmd not working as expected 
- bsc#963923: domain weights not honored when sched-credit tslice is reduced
- bsc#959695: Missing docs for xen
- bsc#967630: Discrepancy in reported memory size with correction XSA-153 for xend
- bsc#959928: When DomU is in state running xm domstate returned nothing
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-05"/>
	<updated date="2016-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/864391">SUSE bug 864391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864655">SUSE bug 864655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864673">SUSE bug 864673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864678">SUSE bug 864678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864682">SUSE bug 864682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864769">SUSE bug 864769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864805">SUSE bug 864805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864811">SUSE bug 864811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897654">SUSE bug 897654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901508">SUSE bug 901508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902737">SUSE bug 902737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924018">SUSE bug 924018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928393">SUSE bug 928393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945404">SUSE bug 945404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945989">SUSE bug 945989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954872">SUSE bug 954872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956829">SUSE bug 956829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957162">SUSE bug 957162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958007">SUSE bug 958007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958009">SUSE bug 958009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958491">SUSE bug 958491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958523">SUSE bug 958523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958917">SUSE bug 958917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959005">SUSE bug 959005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959387">SUSE bug 959387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959695">SUSE bug 959695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959928">SUSE bug 959928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960334">SUSE bug 960334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960707">SUSE bug 960707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960725">SUSE bug 960725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960835">SUSE bug 960835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960861">SUSE bug 960861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960862">SUSE bug 960862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961332">SUSE bug 961332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961358">SUSE bug 961358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961691">SUSE bug 961691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962320">SUSE bug 962320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963782">SUSE bug 963782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963923">SUSE bug 963923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964413">SUSE bug 964413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965315">SUSE bug 965315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965317">SUSE bug 965317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967012">SUSE bug 967012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967013">SUSE bug 967013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967630">SUSE bug 967630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967969">SUSE bug 967969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969121">SUSE bug 969121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969122">SUSE bug 969122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969350">SUSE bug 969350</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4527/">CVE-2013-4527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4527">CVE-2013-4527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4529/">CVE-2013-4529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4529">CVE-2013-4529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4530/">CVE-2013-4530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4530">CVE-2013-4530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4533">CVE-2013-4533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4534">CVE-2013-4534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4537">CVE-2013-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4538">CVE-2013-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4539">CVE-2013-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0222">CVE-2014-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3640">CVE-2014-3640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3689/">CVE-2014-3689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3689">CVE-2014-3689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7815">CVE-2014-7815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9718/">CVE-2014-9718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9718">CVE-2014-9718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1779">CVE-2015-1779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5278">CVE-2015-5278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6855">CVE-2015-6855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7512">CVE-2015-7512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7549">CVE-2015-7549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8345">CVE-2015-8345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8504">CVE-2015-8504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8550">CVE-2015-8550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8554">CVE-2015-8554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8555">CVE-2015-8555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8558">CVE-2015-8558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8567">CVE-2015-8567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8568">CVE-2015-8568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8613">CVE-2015-8613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8619">CVE-2015-8619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8743">CVE-2015-8743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8744">CVE-2015-8744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8745">CVE-2015-8745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8817/">CVE-2015-8817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8817">CVE-2015-8817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8818/">CVE-2015-8818 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8818">CVE-2015-8818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1568">CVE-2016-1568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1570/">CVE-2016-1570 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1570">CVE-2016-1570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1571">CVE-2016-1571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1714">CVE-2016-1714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1922">CVE-2016-1922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1981">CVE-2016-1981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2198">CVE-2016-2198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2270">CVE-2016-2270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2271">CVE-2016-2271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2391">CVE-2016-2391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2392">CVE-2016-2392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2538">CVE-2016-2538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2841">CVE-2016-2841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220506" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="954872" ref_url="https://bugzilla.suse.com/954872" source="BUGZILLA"/>
		<reference ref_id="955399" ref_url="https://bugzilla.suse.com/955399" source="BUGZILLA"/>
		<reference ref_id="957986" ref_url="https://bugzilla.suse.com/957986" source="BUGZILLA"/>
		<reference ref_id="958848" ref_url="https://bugzilla.suse.com/958848" source="BUGZILLA"/>
		<reference ref_id="961600" ref_url="https://bugzilla.suse.com/961600" source="BUGZILLA"/>
		<reference ref_id="963161" ref_url="https://bugzilla.suse.com/963161" source="BUGZILLA"/>
		<reference ref_id="964427" ref_url="https://bugzilla.suse.com/964427" source="BUGZILLA"/>
		<reference ref_id="967630" ref_url="https://bugzilla.suse.com/967630" source="BUGZILLA"/>
		<reference ref_id="973188" ref_url="https://bugzilla.suse.com/973188" source="BUGZILLA"/>
		<reference ref_id="974038" ref_url="https://bugzilla.suse.com/974038" source="BUGZILLA"/>
		<reference ref_id="974912" ref_url="https://bugzilla.suse.com/974912" source="BUGZILLA"/>
		<reference ref_id="975130" ref_url="https://bugzilla.suse.com/975130" source="BUGZILLA"/>
		<reference ref_id="975138" ref_url="https://bugzilla.suse.com/975138" source="BUGZILLA"/>
		<reference ref_id="975907" ref_url="https://bugzilla.suse.com/975907" source="BUGZILLA"/>
		<reference ref_id="976058" ref_url="https://bugzilla.suse.com/976058" source="BUGZILLA"/>
		<reference ref_id="976111" ref_url="https://bugzilla.suse.com/976111" source="BUGZILLA"/>
		<reference ref_id="978164" ref_url="https://bugzilla.suse.com/978164" source="BUGZILLA"/>
		<reference ref_id="978295" ref_url="https://bugzilla.suse.com/978295" source="BUGZILLA"/>
		<reference ref_id="978413" ref_url="https://bugzilla.suse.com/978413" source="BUGZILLA"/>
		<reference ref_id="979035" ref_url="https://bugzilla.suse.com/979035" source="BUGZILLA"/>
		<reference ref_id="979620" ref_url="https://bugzilla.suse.com/979620" source="BUGZILLA"/>
		<reference ref_id="979670" ref_url="https://bugzilla.suse.com/979670" source="BUGZILLA"/>
		<reference ref_id="980716" ref_url="https://bugzilla.suse.com/980716" source="BUGZILLA"/>
		<reference ref_id="980724" ref_url="https://bugzilla.suse.com/980724" source="BUGZILLA"/>
		<reference ref_id="981264" ref_url="https://bugzilla.suse.com/981264" source="BUGZILLA"/>
		<reference ref_id="981276" ref_url="https://bugzilla.suse.com/981276" source="BUGZILLA"/>
		<reference ref_id="982024" ref_url="https://bugzilla.suse.com/982024" source="BUGZILLA"/>
		<reference ref_id="982025" ref_url="https://bugzilla.suse.com/982025" source="BUGZILLA"/>
		<reference ref_id="982026" ref_url="https://bugzilla.suse.com/982026" source="BUGZILLA"/>
		<reference ref_id="982224" ref_url="https://bugzilla.suse.com/982224" source="BUGZILLA"/>
		<reference ref_id="982225" ref_url="https://bugzilla.suse.com/982225" source="BUGZILLA"/>
		<reference ref_id="982286" ref_url="https://bugzilla.suse.com/982286" source="BUGZILLA"/>
		<reference ref_id="982695" ref_url="https://bugzilla.suse.com/982695" source="BUGZILLA"/>
		<reference ref_id="982960" ref_url="https://bugzilla.suse.com/982960" source="BUGZILLA"/>
		<reference ref_id="983973" ref_url="https://bugzilla.suse.com/983973" source="BUGZILLA"/>
		<reference ref_id="983984" ref_url="https://bugzilla.suse.com/983984" source="BUGZILLA"/>
		<reference ref_id="985503" ref_url="https://bugzilla.suse.com/985503" source="BUGZILLA"/>
		<reference ref_id="986586" ref_url="https://bugzilla.suse.com/986586" source="BUGZILLA"/>
		<reference ref_id="988675" ref_url="https://bugzilla.suse.com/988675" source="BUGZILLA"/>
		<reference ref_id="989235" ref_url="https://bugzilla.suse.com/989235" source="BUGZILLA"/>
		<reference ref_id="990843" ref_url="https://bugzilla.suse.com/990843" source="BUGZILLA"/>
		<reference ref_id="990923" ref_url="https://bugzilla.suse.com/990923" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3672" ref_url="https://www.suse.com/security/cve/CVE-2014-3672/" source="CVE"/>
		<reference ref_id="CVE-2016-3158" ref_url="https://www.suse.com/security/cve/CVE-2016-3158/" source="CVE"/>
		<reference ref_id="CVE-2016-3159" ref_url="https://www.suse.com/security/cve/CVE-2016-3159/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3960" ref_url="https://www.suse.com/security/cve/CVE-2016-3960/" source="CVE"/>
		<reference ref_id="CVE-2016-4001" ref_url="https://www.suse.com/security/cve/CVE-2016-4001/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4020" ref_url="https://www.suse.com/security/cve/CVE-2016-4020/" source="CVE"/>
		<reference ref_id="CVE-2016-4037" ref_url="https://www.suse.com/security/cve/CVE-2016-4037/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-4453" ref_url="https://www.suse.com/security/cve/CVE-2016-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-4454" ref_url="https://www.suse.com/security/cve/CVE-2016-4454/" source="CVE"/>
		<reference ref_id="CVE-2016-4952" ref_url="https://www.suse.com/security/cve/CVE-2016-4952/" source="CVE"/>
		<reference ref_id="CVE-2016-4962" ref_url="https://www.suse.com/security/cve/CVE-2016-4962/" source="CVE"/>
		<reference ref_id="CVE-2016-4963" ref_url="https://www.suse.com/security/cve/CVE-2016-4963/" source="CVE"/>
		<reference ref_id="CVE-2016-5105" ref_url="https://www.suse.com/security/cve/CVE-2016-5105/" source="CVE"/>
		<reference ref_id="CVE-2016-5106" ref_url="https://www.suse.com/security/cve/CVE-2016-5106/" source="CVE"/>
		<reference ref_id="CVE-2016-5107" ref_url="https://www.suse.com/security/cve/CVE-2016-5107/" source="CVE"/>
		<reference ref_id="CVE-2016-5126" ref_url="https://www.suse.com/security/cve/CVE-2016-5126/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5337" ref_url="https://www.suse.com/security/cve/CVE-2016-5337/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403/" source="CVE"/>
		<reference ref_id="CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002217.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the several issues.

These security issues were fixed:
- CVE-2014-3672: The qemu implementation in libvirt Xen allowed local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr (bsc#981264).
- CVE-2016-3158: The xrstor function did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188).
- CVE-2016-3159: The fpu_fxrstor function in arch/x86/i387.c did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188).
- CVE-2016-3710: The VGA module improperly performed bounds checking on banked access to video memory, which allowed local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the 'Dark Portal' issue (bsc#978164).
- CVE-2016-3960: Integer overflow in the x86 shadow pagetable code allowed local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping (bsc#974038).
- CVE-2016-4001: Buffer overflow in the stellaris_enet_receive function, when the Stellaris ethernet controller is configured to accept large packets, allowed remote attackers to cause a denial of service (QEMU crash) via a large packet (bsc#975130).
- CVE-2016-4002: Buffer overflow in the mipsnet_receive function, when the guest NIC is configured to accept large packets, allowed remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes (bsc#975138).
- CVE-2016-4020: The patch_instruction function did not initialize the imm32 variable, which allowed local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR) (bsc#975907).
- CVE-2016-4037: The ehci_advance_state function in hw/usb/hcd-ehci.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list (bsc#976111).
- CVE-2016-4439: The esp_reg_write function in the 53C9X Fast SCSI Controller (FSC) support did not properly check command buffer length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the host via unspecified vectors (bsc#980716).
- CVE-2016-4441: The get_cmd function in the 53C9X Fast SCSI Controller (FSC) support did not properly check DMA length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command (bsc#980724).
- CVE-2016-4453: The vmsvga_fifo_run function allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982225).
- CVE-2016-4454: The vmsvga_fifo_read_raw function allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggered an out-of-bounds read (bsc#982224).
- CVE-2016-4952: Out-of-bounds access issue in pvsci_ring_init_msg/data routines (bsc#981276).
- CVE-2016-4962: The libxl device-handling allowed local OS guest administrators to cause a denial of service (resource consumption or management facility confusion) or gain host OS privileges by manipulating information in guest controlled areas of xenstore (bsc#979620).
- CVE-2016-4963: The libxl device-handling allowed local guest OS users with access to the driver domain to cause a denial of service (management tool confusion) by manipulating information in the backend directories in xenstore (bsc#979670).
- CVE-2016-5105: Stack information leakage while reading configuration (bsc#982024).
- CVE-2016-5106: Out-of-bounds write while setting controller properties (bsc#982025).
- CVE-2016-5107: Out-of-bounds read in megasas_lookup_frame() function (bsc#982026).
- CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982286).
- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c might have allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982960).
- CVE-2016-5337: The megasas_ctrl_get_info function allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983973).
- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the host via vectors related to the information transfer buffer (bsc#983984).
- CVE-2016-6258: Potential privilege escalation in PV guests (XSA-182) (bsc#988675).
- bsc#978295: x86 software guest page walk PS bit handling flaw (XSA-176)
- CVE-2016-5403: virtio: unbounded memory allocation on host via guest leading to DoS (XSA-184) (bsc#990923)
- CVE-2016-6351: scsi: esp: OOB write access in esp_do_dma (bsc#990843)

These non-security issues were fixed:
- bsc#954872: Script block-dmmd not working as expected - libxl: error: libxl_dm.c
- bsc#957986: Indirect descriptors are not compatible with Amazon block backend
- bsc#958848: HVM guest crash at /usr/src/packages/BUILD/xen-4.4.2-testing/obj/default/balloon/balloon.c:407
- bsc#961600: Poor performance when Xen HVM domU configured with max memory greater than current memory
- bsc#963161: Windows VM getting stuck during load while a VF is assigned to it after upgrading to latest maintenance updates
- bsc#964427: Discarding device blocks: failed - Input/output error
- bsc#976058: Xen error running simple HVM guest (Post Alpha 2 xen+qemu)
- bsc#982695: qemu fails to boot HVM guest from xvda
- bsc#986586: Out of memory (oom) during boot on 'modprobe xenblk' (non xen kernel)
- bsc#967630: Discrepancy in reported memory size with correction XSA-153 for xend. Additional memory adjustment made.
- bsc#974912: Persistent performance drop after live-migration using xend tool stack
- bsc#979035: Restore xm migrate fixes for bsc#955399/ bsc#955399
- bsc#989235: xen dom0 xm create command only searched /etc/xen instead of /etc/xen/vm
- Live Migration SLES 11 SP3 to SP4 on AMD: 'xc: error: Couldn't set extended vcpu0 info'
- bsc#985503: Fixed vif-route
- bsc#978413: PV guest upgrade from SLES11 SP4 to SLES 12 SP2 alpha3 failed
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-18"/>
	<updated date="2016-08-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/954872">SUSE bug 954872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955399">SUSE bug 955399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957986">SUSE bug 957986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958848">SUSE bug 958848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961600">SUSE bug 961600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963161">SUSE bug 963161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964427">SUSE bug 964427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967630">SUSE bug 967630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973188">SUSE bug 973188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974038">SUSE bug 974038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974912">SUSE bug 974912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975130">SUSE bug 975130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975138">SUSE bug 975138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975907">SUSE bug 975907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976058">SUSE bug 976058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976111">SUSE bug 976111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978164">SUSE bug 978164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978295">SUSE bug 978295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978413">SUSE bug 978413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979035">SUSE bug 979035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979620">SUSE bug 979620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979670">SUSE bug 979670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980716">SUSE bug 980716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980724">SUSE bug 980724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981264">SUSE bug 981264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981276">SUSE bug 981276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982024">SUSE bug 982024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982025">SUSE bug 982025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982026">SUSE bug 982026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982224">SUSE bug 982224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982225">SUSE bug 982225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982286">SUSE bug 982286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982695">SUSE bug 982695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982960">SUSE bug 982960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983973">SUSE bug 983973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983984">SUSE bug 983984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985503">SUSE bug 985503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986586">SUSE bug 986586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988675">SUSE bug 988675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989235">SUSE bug 989235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990843">SUSE bug 990843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990923">SUSE bug 990923</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3672/">CVE-2014-3672 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3672">CVE-2014-3672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3158/">CVE-2016-3158 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3158">CVE-2016-3158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3159/">CVE-2016-3159 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3159">CVE-2016-3159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3710">CVE-2016-3710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3960/">CVE-2016-3960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3960">CVE-2016-3960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4001/">CVE-2016-4001 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4001">CVE-2016-4001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4002">CVE-2016-4002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4020/">CVE-2016-4020 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4020">CVE-2016-4020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4037/">CVE-2016-4037 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4037">CVE-2016-4037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4439">CVE-2016-4439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4441">CVE-2016-4441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4453/">CVE-2016-4453 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4453">CVE-2016-4453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4454/">CVE-2016-4454 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4454">CVE-2016-4454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4952/">CVE-2016-4952 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4952">CVE-2016-4952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4962/">CVE-2016-4962 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4962">CVE-2016-4962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4963/">CVE-2016-4963 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4963">CVE-2016-4963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5105/">CVE-2016-5105 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5105">CVE-2016-5105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5106/">CVE-2016-5106 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5106">CVE-2016-5106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5107/">CVE-2016-5107 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5107">CVE-2016-5107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5126/">CVE-2016-5126 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5126">CVE-2016-5126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5238">CVE-2016-5238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5337/">CVE-2016-5337 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5337">CVE-2016-5337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5338">CVE-2016-5338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5403">CVE-2016-5403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6258">CVE-2016-6258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6351">CVE-2016-6351 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586445" comment="xen-4.4.4_07-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586446" comment="xen-doc-html-4.4.4_07-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586447" comment="xen-kmp-default-4.4.4_07_3.0.101_77-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586448" comment="xen-kmp-pae-4.4.4_07_3.0.101_77-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586449" comment="xen-libs-4.4.4_07-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586450" comment="xen-libs-32bit-4.4.4_07-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586451" comment="xen-tools-4.4.4_07-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586452" comment="xen-tools-domU-4.4.4_07-37.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586445" comment="xen-4.4.4_07-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586446" comment="xen-doc-html-4.4.4_07-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586447" comment="xen-kmp-default-4.4.4_07_3.0.101_77-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586448" comment="xen-kmp-pae-4.4.4_07_3.0.101_77-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586449" comment="xen-libs-4.4.4_07-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586450" comment="xen-libs-32bit-4.4.4_07-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586451" comment="xen-tools-4.4.4_07-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586452" comment="xen-tools-domU-4.4.4_07-37.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220507" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="966467" ref_url="https://bugzilla.suse.com/966467" source="BUGZILLA"/>
		<reference ref_id="970135" ref_url="https://bugzilla.suse.com/970135" source="BUGZILLA"/>
		<reference ref_id="971949" ref_url="https://bugzilla.suse.com/971949" source="BUGZILLA"/>
		<reference ref_id="988675" ref_url="https://bugzilla.suse.com/988675" source="BUGZILLA"/>
		<reference ref_id="990970" ref_url="https://bugzilla.suse.com/990970" source="BUGZILLA"/>
		<reference ref_id="991934" ref_url="https://bugzilla.suse.com/991934" source="BUGZILLA"/>
		<reference ref_id="992224" ref_url="https://bugzilla.suse.com/992224" source="BUGZILLA"/>
		<reference ref_id="993507" ref_url="https://bugzilla.suse.com/993507" source="BUGZILLA"/>
		<reference ref_id="994136" ref_url="https://bugzilla.suse.com/994136" source="BUGZILLA"/>
		<reference ref_id="994421" ref_url="https://bugzilla.suse.com/994421" source="BUGZILLA"/>
		<reference ref_id="994625" ref_url="https://bugzilla.suse.com/994625" source="BUGZILLA"/>
		<reference ref_id="994761" ref_url="https://bugzilla.suse.com/994761" source="BUGZILLA"/>
		<reference ref_id="994772" ref_url="https://bugzilla.suse.com/994772" source="BUGZILLA"/>
		<reference ref_id="994775" ref_url="https://bugzilla.suse.com/994775" source="BUGZILLA"/>
		<reference ref_id="995785" ref_url="https://bugzilla.suse.com/995785" source="BUGZILLA"/>
		<reference ref_id="995789" ref_url="https://bugzilla.suse.com/995789" source="BUGZILLA"/>
		<reference ref_id="995792" ref_url="https://bugzilla.suse.com/995792" source="BUGZILLA"/>
		<reference ref_id="997731" ref_url="https://bugzilla.suse.com/997731" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258/" source="CVE"/>
		<reference ref_id="CVE-2016-6833" ref_url="https://www.suse.com/security/cve/CVE-2016-6833/" source="CVE"/>
		<reference ref_id="CVE-2016-6834" ref_url="https://www.suse.com/security/cve/CVE-2016-6834/" source="CVE"/>
		<reference ref_id="CVE-2016-6835" ref_url="https://www.suse.com/security/cve/CVE-2016-6835/" source="CVE"/>
		<reference ref_id="CVE-2016-6836" ref_url="https://www.suse.com/security/cve/CVE-2016-6836/" source="CVE"/>
		<reference ref_id="CVE-2016-6888" ref_url="https://www.suse.com/security/cve/CVE-2016-6888/" source="CVE"/>
		<reference ref_id="CVE-2016-7092" ref_url="https://www.suse.com/security/cve/CVE-2016-7092/" source="CVE"/>
		<reference ref_id="CVE-2016-7093" ref_url="https://www.suse.com/security/cve/CVE-2016-7093/" source="CVE"/>
		<reference ref_id="CVE-2016-7094" ref_url="https://www.suse.com/security/cve/CVE-2016-7094/" source="CVE"/>
		<reference ref_id="CVE-2016-7154" ref_url="https://www.suse.com/security/cve/CVE-2016-7154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002325.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:
- CVE-2016-7092: The get_page_from_l3e function in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables (bsc#995785)
- CVE-2016-7093: Xen allowed local HVM guest OS administrators to overwrite hypervisor memory and consequently gain host OS privileges by leveraging mishandling of instruction pointer truncation during emulation (bsc#995789)
- CVE-2016-7094: Buffer overflow in Xen allowed local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update (bsc#995792)
- CVE-2016-7154: Use-after-free vulnerability in the FIFO event channel code in Xen allowed local guest OS administrators to cause a denial of service (host crash) and possibly execute arbitrary code or obtain sensitive information via an invalid guest frame number (bsc#997731)
- CVE-2016-6836: VMWARE VMXNET3 NIC device allowed privileged user inside the guest to leak information. It occured while processing transmit(tx) queue, when it reaches the end of packet (bsc#994761)
- CVE-2016-6888: A integer overflow int the VMWARE VMXNET3 NIC device support, during the initialisation of new packets in the device, could have allowed a privileged user inside guest to crash the Qemu instance resulting in DoS (bsc#994772)
- CVE-2016-6833: A use-after-free issue in the VMWARE VMXNET3 NIC device support allowed privileged user inside guest to crash the Qemu instance resulting in DoS (bsc#994775)
- CVE-2016-6835: Buffer overflow in the VMWARE VMXNET3 NIC device support, causing an OOB read access (bsc#994625)
- CVE-2016-6834: A infinite loop during packet fragmentation in the VMWARE VMXNET3 NIC device support allowed privileged user inside guest to crash the Qemu instance resulting in DoS (bsc#994421)
- CVE-2016-6258: The PV pagetable code in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries (bsc#988675)

These non-security issues were fixed:
- bsc#993507: virsh detach-disk failing to detach disk
- bsc#991934: Xen hypervisor crash in csched_acct
- bsc#992224: During boot of Xen Hypervisor, Failed to get contiguous memory for DMA
- bsc#970135: New virtualization project clock test randomly fails on Xen 
- bsc#994136: Unplug also SCSI disks in qemu-xen-traditional for upstream unplug protocol
- bsc#994136: xen_platform: unplug also SCSI disks in qemu-xen
- bsc#971949: xl: Support (by ignoring) xl migrate --live. xl migrations are always live
- bsc#990970: Add PMU support for Intel E7-8867 v4 (fam=6, model=79)
- bsc#966467: Live Migration SLES 11 SP3 to SP4 on AMD
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-12"/>
	<updated date="2016-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/966467">SUSE bug 966467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970135">SUSE bug 970135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971949">SUSE bug 971949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988675">SUSE bug 988675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990970">SUSE bug 990970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991934">SUSE bug 991934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992224">SUSE bug 992224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993507">SUSE bug 993507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994136">SUSE bug 994136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994421">SUSE bug 994421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994625">SUSE bug 994625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994761">SUSE bug 994761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994772">SUSE bug 994772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994775">SUSE bug 994775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995785">SUSE bug 995785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995789">SUSE bug 995789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995792">SUSE bug 995792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997731">SUSE bug 997731</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6258">CVE-2016-6258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6833/">CVE-2016-6833 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6833">CVE-2016-6833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6834/">CVE-2016-6834 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6834">CVE-2016-6834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6835/">CVE-2016-6835 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6835">CVE-2016-6835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6836/">CVE-2016-6836 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6836">CVE-2016-6836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6888/">CVE-2016-6888 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6888">CVE-2016-6888 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7092/">CVE-2016-7092 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7092">CVE-2016-7092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7093/">CVE-2016-7093 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7093">CVE-2016-7093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7094/">CVE-2016-7094 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7094">CVE-2016-7094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7154/">CVE-2016-7154 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7154">CVE-2016-7154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586453" comment="xen-4.4.4_08-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586454" comment="xen-doc-html-4.4.4_08-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586455" comment="xen-kmp-default-4.4.4_08_3.0.101_80-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586456" comment="xen-kmp-pae-4.4.4_08_3.0.101_80-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586457" comment="xen-libs-4.4.4_08-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586458" comment="xen-libs-32bit-4.4.4_08-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586459" comment="xen-tools-4.4.4_08-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586460" comment="xen-tools-domU-4.4.4_08-40.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586453" comment="xen-4.4.4_08-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586454" comment="xen-doc-html-4.4.4_08-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586455" comment="xen-kmp-default-4.4.4_08_3.0.101_80-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586456" comment="xen-kmp-pae-4.4.4_08_3.0.101_80-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586457" comment="xen-libs-4.4.4_08-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586458" comment="xen-libs-32bit-4.4.4_08-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586459" comment="xen-tools-4.4.4_08-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586460" comment="xen-tools-domU-4.4.4_08-40.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220508" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1000106" ref_url="https://bugzilla.suse.com/1000106" source="BUGZILLA"/>
		<reference ref_id="1000893" ref_url="https://bugzilla.suse.com/1000893" source="BUGZILLA"/>
		<reference ref_id="1003030" ref_url="https://bugzilla.suse.com/1003030" source="BUGZILLA"/>
		<reference ref_id="1003032" ref_url="https://bugzilla.suse.com/1003032" source="BUGZILLA"/>
		<reference ref_id="1004016" ref_url="https://bugzilla.suse.com/1004016" source="BUGZILLA"/>
		<reference ref_id="1005004" ref_url="https://bugzilla.suse.com/1005004" source="BUGZILLA"/>
		<reference ref_id="1005005" ref_url="https://bugzilla.suse.com/1005005" source="BUGZILLA"/>
		<reference ref_id="1007157" ref_url="https://bugzilla.suse.com/1007157" source="BUGZILLA"/>
		<reference ref_id="1007160" ref_url="https://bugzilla.suse.com/1007160" source="BUGZILLA"/>
		<reference ref_id="1009100" ref_url="https://bugzilla.suse.com/1009100" source="BUGZILLA"/>
		<reference ref_id="1009103" ref_url="https://bugzilla.suse.com/1009103" source="BUGZILLA"/>
		<reference ref_id="1009104" ref_url="https://bugzilla.suse.com/1009104" source="BUGZILLA"/>
		<reference ref_id="1009107" ref_url="https://bugzilla.suse.com/1009107" source="BUGZILLA"/>
		<reference ref_id="1009109" ref_url="https://bugzilla.suse.com/1009109" source="BUGZILLA"/>
		<reference ref_id="1009111" ref_url="https://bugzilla.suse.com/1009111" source="BUGZILLA"/>
		<reference ref_id="1011652" ref_url="https://bugzilla.suse.com/1011652" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7777" ref_url="https://www.suse.com/security/cve/CVE-2016-7777/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-8576" ref_url="https://www.suse.com/security/cve/CVE-2016-8576/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8909" ref_url="https://www.suse.com/security/cve/CVE-2016-8909/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9379" ref_url="https://www.suse.com/security/cve/CVE-2016-9379/" source="CVE"/>
		<reference ref_id="CVE-2016-9380" ref_url="https://www.suse.com/security/cve/CVE-2016-9380/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9382" ref_url="https://www.suse.com/security/cve/CVE-2016-9382/" source="CVE"/>
		<reference ref_id="CVE-2016-9383" ref_url="https://www.suse.com/security/cve/CVE-2016-9383/" source="CVE"/>
		<reference ref_id="CVE-2016-9385" ref_url="https://www.suse.com/security/cve/CVE-2016-9385/" source="CVE"/>
		<reference ref_id="CVE-2016-9386" ref_url="https://www.suse.com/security/cve/CVE-2016-9386/" source="CVE"/>
		<reference ref_id="CVE-2016-9637" ref_url="https://www.suse.com/security/cve/CVE-2016-9637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002492.html" source="SUSE-SU"/>
		<description>

This update for xen fixes several issues.

These security issues were fixed:

- CVE-2016-9637: ioport array overflow allowing a malicious guest administrator can escalate their privilege to that of the host (bsc#1011652)
- CVE-2016-9386: x86 null segments were not always treated as unusable allowing an unprivileged guest user program to elevate its privilege to that of the guest operating system. Exploit of this vulnerability is easy on Intel and more complicated on AMD (bsc#1009100)
- CVE-2016-9382: x86 task switch to VM86 mode was mis-handled, allowing a unprivileged guest process to escalate its privilege to that of the guest operating system on AMD hardware. On Intel hardware a malicious unprivileged guest process can crash the guest (bsc#1009103)
- CVE-2016-9385: x86 segment base write emulation lacked canonical address checks, allowing a malicious guest administrator to crash the host (bsc#1009104)
- CVE-2016-9383: The x86 64-bit bit test instruction emulation was broken, allowing a guest to modify arbitrary memory leading to arbitray code execution (bsc#1009107)
- CVE-2016-9381: Improper processing of shared rings allowing guest administrators take over the qemu process, elevating their privilege to that of the qemu process (bsc#1009109)
- CVE-2016-9380: Delimiter injection vulnerabilities in pygrub allowed  guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111)
- CVE-2016-9379: Delimiter injection vulnerabilities in pygrub allowed guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111)
- CVE-2016-7777: Xen did not properly honor CR0.TS and CR0.EM, which allowed local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it (bsc#1000106)
- CVE-2016-8910: The rtl8139_cplus_transmit function in hw/net/rtl8139.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count (bsc#1007157)
- CVE-2016-8909: The intel_hda_xfer function in hw/audio/intel-hda.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position (bsc#1007160)
- CVE-2016-8667: The rc4030_write function in hw/dma/rc4030.c in allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value (bsc#1005004)
- CVE-2016-8669: The serial_update_parameters function in hw/char/serial.c allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base (bsc#1005005)
- CVE-2016-8576: The xhci_ring_fetch function in hw/usb/hcd-xhci.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit the number of link Transfer Request Blocks (TRB) to process (bsc#1004016)
- CVE-2016-7908: The mcf_fec_do_tx function in hw/net/mcf_fec.c did not properly limit the buffer descriptor count when transmitting packets, which allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags (bsc#1003030)
- CVE-2016-7909: The pcnet_rdra_addr function in hw/net/pcnet.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0 (bsc#1003032)

This non-security issue wasfixed:
- bsc#1000893: virsh setmem didn't allow to set current guest memory to max limit

This update also delivers man-pages-supplement since some of the man-pages in there
are now contained in the xen package itself.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-16"/>
	<updated date="2016-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000106">SUSE bug 1000106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000893">SUSE bug 1000893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003030">SUSE bug 1003030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003032">SUSE bug 1003032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004016">SUSE bug 1004016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005004">SUSE bug 1005004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005005">SUSE bug 1005005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007157">SUSE bug 1007157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007160">SUSE bug 1007160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009100">SUSE bug 1009100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009103">SUSE bug 1009103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009104">SUSE bug 1009104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009107">SUSE bug 1009107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009109">SUSE bug 1009109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009111">SUSE bug 1009111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011652">SUSE bug 1011652</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7777/">CVE-2016-7777 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7777">CVE-2016-7777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7908">CVE-2016-7908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7909">CVE-2016-7909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8576/">CVE-2016-8576 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8576">CVE-2016-8576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8667">CVE-2016-8667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8669">CVE-2016-8669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8909/">CVE-2016-8909 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8909">CVE-2016-8909 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8910">CVE-2016-8910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9379/">CVE-2016-9379 at SUSE</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9379">CVE-2016-9379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9380/">CVE-2016-9380 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9380">CVE-2016-9380 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9381">CVE-2016-9381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9382/">CVE-2016-9382 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9382">CVE-2016-9382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9383/">CVE-2016-9383 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9383">CVE-2016-9383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9385/">CVE-2016-9385 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9385">CVE-2016-9385 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9386/">CVE-2016-9386 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9386">CVE-2016-9386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9637/">CVE-2016-9637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9637">CVE-2016-9637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586461" comment="xen-4.4.4_10-43.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586462" comment="xen-doc-html-4.4.4_10-43.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586463" comment="xen-kmp-default-4.4.4_10_3.0.101_88-43.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586464" comment="xen-kmp-pae-4.4.4_10_3.0.101_88-43.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586465" comment="xen-libs-4.4.4_10-43.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586466" comment="xen-libs-32bit-4.4.4_10-43.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586467" comment="xen-tools-4.4.4_10-43.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586468" comment="xen-tools-domU-4.4.4_10-43.5 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586461" comment="xen-4.4.4_10-43.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586462" comment="xen-doc-html-4.4.4_10-43.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586463" comment="xen-kmp-default-4.4.4_10_3.0.101_88-43.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586464" comment="xen-kmp-pae-4.4.4_10_3.0.101_88-43.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586465" comment="xen-libs-4.4.4_10-43.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586466" comment="xen-libs-32bit-4.4.4_10-43.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586467" comment="xen-tools-4.4.4_10-43.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586468" comment="xen-tools-domU-4.4.4_10-43.5 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220509" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1012651" ref_url="https://bugzilla.suse.com/1012651" source="BUGZILLA"/>
		<reference ref_id="1014298" ref_url="https://bugzilla.suse.com/1014298" source="BUGZILLA"/>
		<reference ref_id="1016340" ref_url="https://bugzilla.suse.com/1016340" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10013" ref_url="https://www.suse.com/security/cve/CVE-2016-10013/" source="CVE"/>
		<reference ref_id="CVE-2016-10024" ref_url="https://www.suse.com/security/cve/CVE-2016-10024/" source="CVE"/>
		<reference ref_id="CVE-2016-9932" ref_url="https://www.suse.com/security/cve/CVE-2016-9932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002510.html" source="SUSE-SU"/>
		<description>

This update for xen fixes the following issues:

- A Mishandling of SYSCALL singlestep during emulation which could
  have lead to privilege escalation. (XSA-204, bsc#1016340, CVE-2016-10013)
  - CMPXCHG8B emulation failed to ignore operand size override which could have
  lead to information disclosure. (XSA-200, bsc#1012651, CVE-2016-9932)
  - PV guests may have been able to mask interrupts causing a Denial of Service.
  (XSA-202, bsc#1014298, CVE-2016-10024)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-21"/>
	<updated date="2016-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012651">SUSE bug 1012651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014298">SUSE bug 1014298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016340">SUSE bug 1016340</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10013/">CVE-2016-10013 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10013">CVE-2016-10013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10024/">CVE-2016-10024 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10024">CVE-2016-10024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9932/">CVE-2016-9932 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9932">CVE-2016-9932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586469" comment="xen-4.4.4_12-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586470" comment="xen-doc-html-4.4.4_12-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586471" comment="xen-kmp-default-4.4.4_12_3.0.101_91-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586472" comment="xen-kmp-pae-4.4.4_12_3.0.101_91-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586473" comment="xen-libs-4.4.4_12-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586474" comment="xen-libs-32bit-4.4.4_12-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586475" comment="xen-tools-4.4.4_12-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586476" comment="xen-tools-domU-4.4.4_12-46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586469" comment="xen-4.4.4_12-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586470" comment="xen-doc-html-4.4.4_12-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586471" comment="xen-kmp-default-4.4.4_12_3.0.101_91-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586472" comment="xen-kmp-pae-4.4.4_12_3.0.101_91-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586473" comment="xen-libs-4.4.4_12-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586474" comment="xen-libs-32bit-4.4.4_12-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586475" comment="xen-tools-4.4.4_12-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586476" comment="xen-tools-domU-4.4.4_12-46.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220510" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1000195" ref_url="https://bugzilla.suse.com/1000195" source="BUGZILLA"/>
		<reference ref_id="1002496" ref_url="https://bugzilla.suse.com/1002496" source="BUGZILLA"/>
		<reference ref_id="1013657" ref_url="https://bugzilla.suse.com/1013657" source="BUGZILLA"/>
		<reference ref_id="1013668" ref_url="https://bugzilla.suse.com/1013668" source="BUGZILLA"/>
		<reference ref_id="1014490" ref_url="https://bugzilla.suse.com/1014490" source="BUGZILLA"/>
		<reference ref_id="1014507" ref_url="https://bugzilla.suse.com/1014507" source="BUGZILLA"/>
		<reference ref_id="1015169" ref_url="https://bugzilla.suse.com/1015169" source="BUGZILLA"/>
		<reference ref_id="1016340" ref_url="https://bugzilla.suse.com/1016340" source="BUGZILLA"/>
		<reference ref_id="1022627" ref_url="https://bugzilla.suse.com/1022627" source="BUGZILLA"/>
		<reference ref_id="1022871" ref_url="https://bugzilla.suse.com/1022871" source="BUGZILLA"/>
		<reference ref_id="1023004" ref_url="https://bugzilla.suse.com/1023004" source="BUGZILLA"/>
		<reference ref_id="1024183" ref_url="https://bugzilla.suse.com/1024183" source="BUGZILLA"/>
		<reference ref_id="1024186" ref_url="https://bugzilla.suse.com/1024186" source="BUGZILLA"/>
		<reference ref_id="1024307" ref_url="https://bugzilla.suse.com/1024307" source="BUGZILLA"/>
		<reference ref_id="1024834" ref_url="https://bugzilla.suse.com/1024834" source="BUGZILLA"/>
		<reference ref_id="1025188" ref_url="https://bugzilla.suse.com/1025188" source="BUGZILLA"/>
		<reference ref_id="907805" ref_url="https://bugzilla.suse.com/907805" source="BUGZILLA"/>
		<reference ref_id="987002" ref_url="https://bugzilla.suse.com/987002" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155/" source="CVE"/>
		<reference ref_id="CVE-2016-9101" ref_url="https://www.suse.com/security/cve/CVE-2016-9101/" source="CVE"/>
		<reference ref_id="CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776/" source="CVE"/>
		<reference ref_id="CVE-2016-9907" ref_url="https://www.suse.com/security/cve/CVE-2016-9907/" source="CVE"/>
		<reference ref_id="CVE-2016-9911" ref_url="https://www.suse.com/security/cve/CVE-2016-9911/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-5579" ref_url="https://www.suse.com/security/cve/CVE-2017-5579/" source="CVE"/>
		<reference ref_id="CVE-2017-5856" ref_url="https://www.suse.com/security/cve/CVE-2017-5856/" source="CVE"/>
		<reference ref_id="CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898/" source="CVE"/>
		<reference ref_id="CVE-2017-5973" ref_url="https://www.suse.com/security/cve/CVE-2017-5973/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002690.html" source="SUSE-SU"/>
		<description>

This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-5973: A infinite loop while doing control transfer in xhci_kick_epctx allowed privileged user inside the guest to crash the host process resulting in DoS (bsc#1025188)
- CVE-2016-10155: The virtual hardware watchdog 'wdt_i6300esb' was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1024183)
- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024834)
- CVE-2017-5856: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a memory leakage issue allowing a privileged user to leak host memory resulting in DoS (bsc#1024186)
- CVE-2017-5898: The CCID Card device emulator support was vulnerable to an integer overflow flaw allowing a privileged user to crash the Qemu process on the host resulting in DoS (bsc#1024307)
- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)
- CVE-2014-8106: A heap-based buffer overflow in the Cirrus VGA emulator allowed local guest users to execute arbitrary code via vectors related to blit regions (bsc#907805)
- CVE-2017-5579: The 16550A UART serial device emulation support was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1022627)
- CVE-2016-9907: The USB redirector usb-guest support was vulnerable to a memory leakage flaw when destroying the USB redirector in 'usbredir_handle_destroy'.  A guest user/process could have used this issue to leak host memory, resulting in DoS for a host (bsc#1014490)
- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in 'ehci_init_transfer'. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014507)
- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)
- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)
- CVE-2016-9101: A memory leak in hw/net/eepro100.c allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device (bsc#1013668)
- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013657)
- A malicious guest could have, by frequently rebooting over extended periods of time, run the host system out of memory, resulting in a Denial of Service (DoS) (bsc#1022871)

These non-security issues were fixed:

- bsc#1000195: Prevent panic on CPU0 while booting on SLES 11 SP3
- bsc#1002496: Added support for reloading clvm in block-dmmd block-dmmd
- bsc#987002: Prevent crash of domU' after they were migrated from SP3 HV to SP4
 		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-09"/>
	<updated date="2017-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000195">SUSE bug 1000195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002496">SUSE bug 1002496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013657">SUSE bug 1013657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013668">SUSE bug 1013668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014490">SUSE bug 1014490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014507">SUSE bug 1014507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015169">SUSE bug 1015169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016340">SUSE bug 1016340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022627">SUSE bug 1022627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022871">SUSE bug 1022871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024183">SUSE bug 1024183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024186">SUSE bug 1024186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024307">SUSE bug 1024307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024834">SUSE bug 1024834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025188">SUSE bug 1025188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907805">SUSE bug 907805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987002">SUSE bug 987002</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8106">CVE-2014-8106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10155">CVE-2016-10155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9101/">CVE-2016-9101 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9101">CVE-2016-9101 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9776">CVE-2016-9776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9907/">CVE-2016-9907 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9907">CVE-2016-9907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9911/">CVE-2016-9911 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9911">CVE-2016-9911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9921">CVE-2016-9921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9922">CVE-2016-9922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2615">CVE-2017-2615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2620">CVE-2017-2620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5579/">CVE-2017-5579 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5579">CVE-2017-5579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5856/">CVE-2017-5856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5856">CVE-2017-5856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5898">CVE-2017-5898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5973/">CVE-2017-5973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5973">CVE-2017-5973 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586477" comment="xen-4.4.4_14-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586478" comment="xen-doc-html-4.4.4_14-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586479" comment="xen-kmp-default-4.4.4_14_3.0.101_94-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586480" comment="xen-kmp-pae-4.4.4_14_3.0.101_94-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586481" comment="xen-libs-4.4.4_14-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586482" comment="xen-libs-32bit-4.4.4_14-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586483" comment="xen-tools-4.4.4_14-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586484" comment="xen-tools-domU-4.4.4_14-51.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586477" comment="xen-4.4.4_14-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586478" comment="xen-doc-html-4.4.4_14-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586479" comment="xen-kmp-default-4.4.4_14_3.0.101_94-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586480" comment="xen-kmp-pae-4.4.4_14_3.0.101_94-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586481" comment="xen-libs-4.4.4_14-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586482" comment="xen-libs-32bit-4.4.4_14-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586483" comment="xen-tools-4.4.4_14-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586484" comment="xen-tools-domU-4.4.4_14-51.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220511" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1022555" ref_url="https://bugzilla.suse.com/1022555" source="BUGZILLA"/>
		<reference ref_id="1026636" ref_url="https://bugzilla.suse.com/1026636" source="BUGZILLA"/>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1027570" ref_url="https://bugzilla.suse.com/1027570" source="BUGZILLA"/>
		<reference ref_id="1028235" ref_url="https://bugzilla.suse.com/1028235" source="BUGZILLA"/>
		<reference ref_id="1028655" ref_url="https://bugzilla.suse.com/1028655" source="BUGZILLA"/>
		<reference ref_id="1029827" ref_url="https://bugzilla.suse.com/1029827" source="BUGZILLA"/>
		<reference ref_id="1030144" ref_url="https://bugzilla.suse.com/1030144" source="BUGZILLA"/>
		<reference ref_id="1030442" ref_url="https://bugzilla.suse.com/1030442" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9603" ref_url="https://www.suse.com/security/cve/CVE-2016-9603/" source="CVE"/>
		<reference ref_id="CVE-2017-2633" ref_url="https://www.suse.com/security/cve/CVE-2017-2633/" source="CVE"/>
		<reference ref_id="CVE-2017-6414" ref_url="https://www.suse.com/security/cve/CVE-2017-6414/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-7228" ref_url="https://www.suse.com/security/cve/CVE-2017-7228/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002822.html" source="SUSE-SU"/>
		<description>

This update for xen fixes the following issues:

These security issues were fixed:

- CVE-2017-7228: Broken check in memory_exchange() permited PV guest breakout (bsc#1030442).
- XSA-206: Unprivileged guests issuing writes to xenstore were able to stall progress of the control domain or driver domain, possibly leading to a Denial of Service (DoS) of the entire host (bsc#1030144).
- CVE-2016-9603: A privileged user within the guest VM can cause a heap overflow in the device model process, potentially escalating their privileges to that of the device model process (bsc#1028655).
- CVE-2017-6414: Memory leak in the vcard_apdu_new function in card_7816.c in libcacard allowed local guest OS users to cause a denial of service (host memory consumption) via vectors related to allocating a new APDU object (bsc#1027570).
- CVE-2017-6505: The ohci_service_ed_list function in hw/usb/hcd-ohci.c allowed local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors (bsc#1028235).
- CVE-2017-2633: The VNC display driver support was vulnerable to an out-of-bounds memory access issue. A user/process inside guest could use this flaw to cause DoS (bsc#1026636).

These non-security issues were fixed:

- bsc#1022555: Timeout in 'execution of /etc/xen/scripts/block add'
- bsc#1029827: Forward port xenstored
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-20"/>
	<updated date="2017-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1022555">SUSE bug 1022555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026636">SUSE bug 1026636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027570">SUSE bug 1027570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028235">SUSE bug 1028235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028655">SUSE bug 1028655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029827">SUSE bug 1029827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030144">SUSE bug 1030144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030442">SUSE bug 1030442</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9603/">CVE-2016-9603 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9603">CVE-2016-9603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2633/">CVE-2017-2633 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2633">CVE-2017-2633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6414/">CVE-2017-6414 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6414">CVE-2017-6414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6505">CVE-2017-6505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7228/">CVE-2017-7228 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7228">CVE-2017-7228 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586485" comment="xen-4.4.4_16-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586486" comment="xen-doc-html-4.4.4_16-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586487" comment="xen-kmp-default-4.4.4_16_3.0.101_97-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586488" comment="xen-kmp-pae-4.4.4_16_3.0.101_97-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586489" comment="xen-libs-4.4.4_16-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586490" comment="xen-libs-32bit-4.4.4_16-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586491" comment="xen-tools-4.4.4_16-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586492" comment="xen-tools-domU-4.4.4_16-54.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586485" comment="xen-4.4.4_16-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586486" comment="xen-doc-html-4.4.4_16-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586487" comment="xen-kmp-default-4.4.4_16_3.0.101_97-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586488" comment="xen-kmp-pae-4.4.4_16_3.0.101_97-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586489" comment="xen-libs-4.4.4_16-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586490" comment="xen-libs-32bit-4.4.4_16-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586491" comment="xen-tools-4.4.4_16-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586492" comment="xen-tools-domU-4.4.4_16-54.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220512" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1028655" ref_url="https://bugzilla.suse.com/1028655" source="BUGZILLA"/>
		<reference ref_id="1029827" ref_url="https://bugzilla.suse.com/1029827" source="BUGZILLA"/>
		<reference ref_id="1030144" ref_url="https://bugzilla.suse.com/1030144" source="BUGZILLA"/>
		<reference ref_id="1034843" ref_url="https://bugzilla.suse.com/1034843" source="BUGZILLA"/>
		<reference ref_id="1034844" ref_url="https://bugzilla.suse.com/1034844" source="BUGZILLA"/>
		<reference ref_id="1034845" ref_url="https://bugzilla.suse.com/1034845" source="BUGZILLA"/>
		<reference ref_id="1034994" ref_url="https://bugzilla.suse.com/1034994" source="BUGZILLA"/>
		<reference ref_id="1035483" ref_url="https://bugzilla.suse.com/1035483" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9603" ref_url="https://www.suse.com/security/cve/CVE-2016-9603/" source="CVE"/>
		<reference ref_id="CVE-2017-7718" ref_url="https://www.suse.com/security/cve/CVE-2017-7718/" source="CVE"/>
		<reference ref_id="CVE-2017-7980" ref_url="https://www.suse.com/security/cve/CVE-2017-7980/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002836.html" source="SUSE-SU"/>
		<description>

This update for xen fixes several issues.

These security issues were fixed:

- A malicious 64-bit PV guest may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks by placing a IRET hypercall in the middle of a multicall batch (XSA-213, bsc#1034843)
- A malicious pair of guests may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks because of a missing check when transfering pages via GNTTABOP_transfer (XSA-214, bsc#1034844).
- CVE-2017-7718: hw/display/cirrus_vga_rop.h allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions (bsc#1034994).
- CVE-2016-9603: A privileged user within the guest VM could have caused a heap overflow in the device model process, potentially escalating their privileges to that of the device model process (bsc#1028655)

These non-security issues were fixed:

- bsc#1029827: Additional xenstore patch
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-02"/>
	<updated date="2017-05-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1028655">SUSE bug 1028655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029827">SUSE bug 1029827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030144">SUSE bug 1030144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034843">SUSE bug 1034843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034844">SUSE bug 1034844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034845">SUSE bug 1034845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034994">SUSE bug 1034994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035483">SUSE bug 1035483</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9603/">CVE-2016-9603 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9603">CVE-2016-9603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7718/">CVE-2017-7718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7718">CVE-2017-7718 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7980/">CVE-2017-7980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7980">CVE-2017-7980 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586493" comment="xen-4.4.4_18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586494" comment="xen-doc-html-4.4.4_18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586495" comment="xen-kmp-default-4.4.4_18_3.0.101_97-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586496" comment="xen-kmp-pae-4.4.4_18_3.0.101_97-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586497" comment="xen-libs-4.4.4_18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586498" comment="xen-libs-32bit-4.4.4_18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586499" comment="xen-tools-4.4.4_18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586500" comment="xen-tools-domU-4.4.4_18-57.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586493" comment="xen-4.4.4_18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586494" comment="xen-doc-html-4.4.4_18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586495" comment="xen-kmp-default-4.4.4_18_3.0.101_97-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586496" comment="xen-kmp-pae-4.4.4_18_3.0.101_97-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586497" comment="xen-libs-4.4.4_18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586498" comment="xen-libs-32bit-4.4.4_18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586499" comment="xen-tools-4.4.4_18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586500" comment="xen-tools-domU-4.4.4_18-57.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220513" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1014136" ref_url="https://bugzilla.suse.com/1014136" source="BUGZILLA"/>
		<reference ref_id="1026236" ref_url="https://bugzilla.suse.com/1026236" source="BUGZILLA"/>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1031460" ref_url="https://bugzilla.suse.com/1031460" source="BUGZILLA"/>
		<reference ref_id="1032148" ref_url="https://bugzilla.suse.com/1032148" source="BUGZILLA"/>
		<reference ref_id="1034845" ref_url="https://bugzilla.suse.com/1034845" source="BUGZILLA"/>
		<reference ref_id="1036470" ref_url="https://bugzilla.suse.com/1036470" source="BUGZILLA"/>
		<reference ref_id="1037243" ref_url="https://bugzilla.suse.com/1037243" source="BUGZILLA"/>
		<reference ref_id="1042160" ref_url="https://bugzilla.suse.com/1042160" source="BUGZILLA"/>
		<reference ref_id="1042863" ref_url="https://bugzilla.suse.com/1042863" source="BUGZILLA"/>
		<reference ref_id="1042882" ref_url="https://bugzilla.suse.com/1042882" source="BUGZILLA"/>
		<reference ref_id="1042893" ref_url="https://bugzilla.suse.com/1042893" source="BUGZILLA"/>
		<reference ref_id="1042915" ref_url="https://bugzilla.suse.com/1042915" source="BUGZILLA"/>
		<reference ref_id="1042924" ref_url="https://bugzilla.suse.com/1042924" source="BUGZILLA"/>
		<reference ref_id="1042931" ref_url="https://bugzilla.suse.com/1042931" source="BUGZILLA"/>
		<reference ref_id="1042938" ref_url="https://bugzilla.suse.com/1042938" source="BUGZILLA"/>
		<reference ref_id="1043074" ref_url="https://bugzilla.suse.com/1043074" source="BUGZILLA"/>
		<reference ref_id="1043297" ref_url="https://bugzilla.suse.com/1043297" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8112" ref_url="https://www.suse.com/security/cve/CVE-2017-8112/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-8905" ref_url="https://www.suse.com/security/cve/CVE-2017-8905/" source="CVE"/>
		<reference ref_id="CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330/" source="CVE"/>
		<reference ref_id="CVE-2017-9374" ref_url="https://www.suse.com/security/cve/CVE-2017-9374/" source="CVE"/>
		<reference ref_id="CVE-2017-9503" ref_url="https://www.suse.com/security/cve/CVE-2017-9503/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003003.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- blkif responses leaked backend stack data, which allowed unprivileged guest to obtain sensitive information from the host or other guests (XSA-216, bsc#1042863)
- Page transfer might have allowed PV guest to elevate privilege (XSA-217, bsc#1042882)
- Races in the grant table unmap code allowed for informations leaks and potentially privilege escalation (XSA-218, bsc#1042893)
- Insufficient reference counts during shadow emulation allowed a malicious pair of guest to elevate their privileges to the privileges that XEN runs under (XSA-219, bsc#1042915)
- Stale P2M mappings due to insufficient error checking allowed malicious guest to leak information or elevate privileges (XSA-222, bsc#1042931)
- Grant table operations mishandled reference counts allowing malicious guests to escape (XSA-224, bsc#1042938)
- CVE-2017-9330: USB OHCI Emulation in qemu allowed local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value (bsc#1042160)
- CVE-2017-8309: Memory leak in the audio/audio.c allowed remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture (bsc#1037243)
- CVE-2017-8905: Xen a failsafe callback, which might have allowed PV guest OS users to execute arbitrary code on the host OS (XSA-215, bsc#1034845).
- CVE-2017-9503: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a null pointer dereference issue which allowed a privileged user inside guest to crash the Qemu process on the host resulting in DoS (bsc#1043297)
- CVE-2017-9374: Missing free of 's-&gt;ipacket', causes a host memory leak, allowing for DoS (bsc#1043074)
- CVE-2017-8112: hw/scsi/vmw_pvscsi.c allowed local guest OS privileged users to cause a denial of service (infinite loop and CPU consumption) via the message ring page count (bsc#1036470)
- Missing NULL pointer check in event channel poll allows guests to DoS the host (XSA-221, bsc#1042924)
	
These non-security issues were fixed:

- bsc#1032148: Ensure that time doesn't goes backwards during live migration of HVM domU
- bsc#1031460: Fixed DomU Live Migration 
- bsc#1014136: Fixed kdump SLES12-SP2
- bsc#1026236: Equalized paravirtualized vs. fully virtualized migration speed
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-04"/>
	<updated date="2017-07-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014136">SUSE bug 1014136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026236">SUSE bug 1026236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031460">SUSE bug 1031460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032148">SUSE bug 1032148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034845">SUSE bug 1034845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036470">SUSE bug 1036470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037243">SUSE bug 1037243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042160">SUSE bug 1042160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042863">SUSE bug 1042863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042882">SUSE bug 1042882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042893">SUSE bug 1042893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042915">SUSE bug 1042915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042924">SUSE bug 1042924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042931">SUSE bug 1042931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042938">SUSE bug 1042938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043074">SUSE bug 1043074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043297">SUSE bug 1043297</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8112/">CVE-2017-8112 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8112">CVE-2017-8112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8309">CVE-2017-8309 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8905/">CVE-2017-8905 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8905">CVE-2017-8905 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9330">CVE-2017-9330 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9374/">CVE-2017-9374 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9374">CVE-2017-9374 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9503/">CVE-2017-9503 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9503">CVE-2017-9503 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586501" comment="xen-4.4.4_20-60.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586502" comment="xen-doc-html-4.4.4_20-60.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586503" comment="xen-kmp-default-4.4.4_20_3.0.101_104-60.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586504" comment="xen-kmp-pae-4.4.4_20_3.0.101_104-60.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586505" comment="xen-libs-4.4.4_20-60.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586506" comment="xen-libs-32bit-4.4.4_20-60.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586507" comment="xen-tools-4.4.4_20-60.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586508" comment="xen-tools-domU-4.4.4_20-60.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586501" comment="xen-4.4.4_20-60.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586502" comment="xen-doc-html-4.4.4_20-60.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586503" comment="xen-kmp-default-4.4.4_20_3.0.101_104-60.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586504" comment="xen-kmp-pae-4.4.4_20_3.0.101_104-60.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586505" comment="xen-libs-4.4.4_20-60.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586506" comment="xen-libs-32bit-4.4.4_20-60.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586507" comment="xen-tools-4.4.4_20-60.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586508" comment="xen-tools-domU-4.4.4_20-60.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220514" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1032598" ref_url="https://bugzilla.suse.com/1032598" source="BUGZILLA"/>
		<reference ref_id="1037413" ref_url="https://bugzilla.suse.com/1037413" source="BUGZILLA"/>
		<reference ref_id="1046637" ref_url="https://bugzilla.suse.com/1046637" source="BUGZILLA"/>
		<reference ref_id="1047675" ref_url="https://bugzilla.suse.com/1047675" source="BUGZILLA"/>
		<reference ref_id="1048920" ref_url="https://bugzilla.suse.com/1048920" source="BUGZILLA"/>
		<reference ref_id="1049578" ref_url="https://bugzilla.suse.com/1049578" source="BUGZILLA"/>
		<reference ref_id="1051787" ref_url="https://bugzilla.suse.com/1051787" source="BUGZILLA"/>
		<reference ref_id="1051788" ref_url="https://bugzilla.suse.com/1051788" source="BUGZILLA"/>
		<reference ref_id="1052686" ref_url="https://bugzilla.suse.com/1052686" source="BUGZILLA"/>
		<reference ref_id="1056278" ref_url="https://bugzilla.suse.com/1056278" source="BUGZILLA"/>
		<reference ref_id="1056281" ref_url="https://bugzilla.suse.com/1056281" source="BUGZILLA"/>
		<reference ref_id="1056282" ref_url="https://bugzilla.suse.com/1056282" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-10806" ref_url="https://www.suse.com/security/cve/CVE-2017-10806/" source="CVE"/>
		<reference ref_id="CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-12135" ref_url="https://www.suse.com/security/cve/CVE-2017-12135/" source="CVE"/>
		<reference ref_id="CVE-2017-12137" ref_url="https://www.suse.com/security/cve/CVE-2017-12137/" source="CVE"/>
		<reference ref_id="CVE-2017-12855" ref_url="https://www.suse.com/security/cve/CVE-2017-12855/" source="CVE"/>
		<reference ref_id="CVE-2017-14316" ref_url="https://www.suse.com/security/cve/CVE-2017-14316/" source="CVE"/>
		<reference ref_id="CVE-2017-14317" ref_url="https://www.suse.com/security/cve/CVE-2017-14317/" source="CVE"/>
		<reference ref_id="CVE-2017-14319" ref_url="https://www.suse.com/security/cve/CVE-2017-14319/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003213.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-12135: Unbounded recursion in grant table code allowed a malicious
  guest to crash the host or potentially escalate privileges/leak information
  (XSA-226, bsc#1051787).
- CVE-2017-12137: Incorrectly-aligned updates to pagetables allowed for
  privilege escalation (XSA-227, bsc#1051788).
- CVE-2017-11334: The address_space_write_continue function in exec.c allowed
  local guest OS privileged users to cause a denial of service (out-of-bounds
  access and guest instance crash) by leveraging use of qemu_map_ram_ptr to
  access guest ram block area (bsc#1048920).
- CVE-2017-11434: The dhcp_decode function in slirp/bootp.c allowed local guest
  OS users to cause a denial of service (out-of-bounds read) via a crafted DHCP
  options string (bsc#1049578).
- CVE-2017-10806: Stack-based buffer overflow in hw/usb/redirect.c allowed
  local guest OS users to cause a denial of service via vectors related to
  logging debug messages (bsc#1047675).
- CVE-2017-10664: qemu-nbd did not ignore SIGPIPE, which allowed remote
  attackers to cause a denial of service (daemon crash) by disconnecting during
  a server-to-client reply attempt (bsc#1046637).
- CVE-2017-12855: Premature clearing of GTF_writing / GTF_reading lead to
  potentially leaking sensitive information (XSA-230, bsc#1052686).
- CVE-2017-14316: Missing bound check in function `alloc_heap_pages` for an
  internal array allowed attackers using crafted hypercalls to execute
  arbitrary code within Xen (XSA-231, bsc#1056278)
- CVE-2017-14317: A race in cxenstored may have cause a double-free allowind for
  DoS of the xenstored daemon (XSA-233, bsc#1056281).
- CVE-2017-14319: An error while handling grant mappings allowed malicious or
  buggy x86 PV guest to escalate its privileges or crash the hypervisor (XSA-234,
  bsc#1056282).

This non-security issue was fixed:

- bsc#1032598: Prevent removal of NVME devices
- bsc#1037413: Support for newer intel cpu's, mwait-idle driver and skylake
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-13"/>
	<updated date="2017-09-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032598">SUSE bug 1032598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037413">SUSE bug 1037413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046637">SUSE bug 1046637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047675">SUSE bug 1047675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048920">SUSE bug 1048920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049578">SUSE bug 1049578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051787">SUSE bug 1051787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051788">SUSE bug 1051788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052686">SUSE bug 1052686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056278">SUSE bug 1056278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056281">SUSE bug 1056281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056282">SUSE bug 1056282</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10664">CVE-2017-10664 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10806/">CVE-2017-10806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10806">CVE-2017-10806 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11334">CVE-2017-11334 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11434">CVE-2017-11434 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12135/">CVE-2017-12135 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12135">CVE-2017-12135 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12137/">CVE-2017-12137 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12137">CVE-2017-12137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12855/">CVE-2017-12855 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12855">CVE-2017-12855 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14316/">CVE-2017-14316 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14316">CVE-2017-14316 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14317/">CVE-2017-14317 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14317">CVE-2017-14317 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14319/">CVE-2017-14319 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14319">CVE-2017-14319 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586509" comment="xen-4.4.4_22-61.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586510" comment="xen-doc-html-4.4.4_22-61.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586511" comment="xen-kmp-default-4.4.4_22_3.0.101_108.7-61.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586512" comment="xen-kmp-pae-4.4.4_22_3.0.101_108.7-61.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586513" comment="xen-libs-4.4.4_22-61.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586514" comment="xen-libs-32bit-4.4.4_22-61.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586515" comment="xen-tools-4.4.4_22-61.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586516" comment="xen-tools-domU-4.4.4_22-61.9.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586509" comment="xen-4.4.4_22-61.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586510" comment="xen-doc-html-4.4.4_22-61.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586511" comment="xen-kmp-default-4.4.4_22_3.0.101_108.7-61.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586512" comment="xen-kmp-pae-4.4.4_22_3.0.101_108.7-61.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586513" comment="xen-libs-4.4.4_22-61.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586514" comment="xen-libs-32bit-4.4.4_22-61.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586515" comment="xen-tools-4.4.4_22-61.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586516" comment="xen-tools-domU-4.4.4_22-61.9.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220515" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1059777" ref_url="https://bugzilla.suse.com/1059777" source="BUGZILLA"/>
		<reference ref_id="1061076" ref_url="https://bugzilla.suse.com/1061076" source="BUGZILLA"/>
		<reference ref_id="1061080" ref_url="https://bugzilla.suse.com/1061080" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1061082" ref_url="https://bugzilla.suse.com/1061082" source="BUGZILLA"/>
		<reference ref_id="1061084" ref_url="https://bugzilla.suse.com/1061084" source="BUGZILLA"/>
		<reference ref_id="1061086" ref_url="https://bugzilla.suse.com/1061086" source="BUGZILLA"/>
		<reference ref_id="1061087" ref_url="https://bugzilla.suse.com/1061087" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15588" ref_url="https://www.suse.com/security/cve/CVE-2017-15588/" source="CVE"/>
		<reference ref_id="CVE-2017-15589" ref_url="https://www.suse.com/security/cve/CVE-2017-15589/" source="CVE"/>
		<reference ref_id="CVE-2017-15590" ref_url="https://www.suse.com/security/cve/CVE-2017-15590/" source="CVE"/>
		<reference ref_id="CVE-2017-15592" ref_url="https://www.suse.com/security/cve/CVE-2017-15592/" source="CVE"/>
		<reference ref_id="CVE-2017-15593" ref_url="https://www.suse.com/security/cve/CVE-2017-15593/" source="CVE"/>
		<reference ref_id="CVE-2017-15594" ref_url="https://www.suse.com/security/cve/CVE-2017-15594/" source="CVE"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003348.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues:

These security issues were fixed:

- CVE-2017-5526: The ES1370 audio device emulation support was vulnerable to a
  memory leakage issue allowing a privileged user inside the guest to cause a DoS
  and/or potentially crash the Qemu process on the host (bsc#1059777)
- CVE-2017-15593: Missing cleanup in the page type system allowed a malicious or
  buggy PV guest to cause DoS (XSA-242 bsc#1061084)
- CVE-2017-15592: A problem in the shadow pagetable code allowed a malicious or
  buggy HVM guest to cause DoS or cause hypervisor memory corruption potentially
  allowing the guest to escalate its privilege (XSA-243 bsc#1061086)
- CVE-2017-15594: Problematic handling of the selector fields in the Interrupt
  Descriptor Table (IDT) allowed a malicious or buggy x86 PV guest to escalate
  its privileges or cause DoS (XSA-244 bsc#1061087)
- CVE-2017-15589: Intercepted I/O write operations with less than a full machine
  word's worth of data were not properly handled, which allowed a malicious
  unprivileged x86 HVM guest to obtain sensitive information from the host or
  other guests (XSA-239 bsc#1061080)
- CVE-2017-15595: In certain configurations of linear page tables a stack overflow
  might have occured that allowed a malicious or buggy PV guest to cause DoS and
  potentially privilege escalation and information leaks (XSA-240 bsc#1061081)
- CVE-2017-15588: Under certain conditions x86 PV guests could have caused the
  hypervisor to miss a necessary TLB flush for a page. This allowed a malicious
  x86 PV guest to access all of system memory, allowing for privilege escalation,
  DoS, and information leaks (XSA-241 bsc#1061082)
- CVE-2017-15590: Multiple issues existed with the setup of PCI MSI interrupts
  that allowed a malicious or buggy guest to cause DoS and potentially privilege
  escalation and information leaks (XSA-237 bsc#1061076)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-20"/>
	<updated date="2017-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059777">SUSE bug 1059777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061076">SUSE bug 1061076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061080">SUSE bug 1061080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061082">SUSE bug 1061082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061084">SUSE bug 1061084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061086">SUSE bug 1061086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061087">SUSE bug 1061087</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15588/">CVE-2017-15588 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15588">CVE-2017-15588 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15589/">CVE-2017-15589 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15589">CVE-2017-15589 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15590/">CVE-2017-15590 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15590">CVE-2017-15590 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15592/">CVE-2017-15592 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15592">CVE-2017-15592 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15593/">CVE-2017-15593 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15593">CVE-2017-15593 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15594/">CVE-2017-15594 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15594">CVE-2017-15594 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15595">CVE-2017-15595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5526">CVE-2017-5526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586517" comment="xen-4.4.4_24-61.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586518" comment="xen-doc-html-4.4.4_24-61.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586519" comment="xen-kmp-default-4.4.4_24_3.0.101_108.10-61.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586520" comment="xen-kmp-pae-4.4.4_24_3.0.101_108.10-61.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586521" comment="xen-libs-4.4.4_24-61.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586522" comment="xen-libs-32bit-4.4.4_24-61.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586523" comment="xen-tools-4.4.4_24-61.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586524" comment="xen-tools-domU-4.4.4_24-61.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586517" comment="xen-4.4.4_24-61.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586518" comment="xen-doc-html-4.4.4_24-61.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586519" comment="xen-kmp-default-4.4.4_24_3.0.101_108.10-61.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586520" comment="xen-kmp-pae-4.4.4_24_3.0.101_108.10-61.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586521" comment="xen-libs-4.4.4_24-61.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586522" comment="xen-libs-32bit-4.4.4_24-61.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586523" comment="xen-tools-4.4.4_24-61.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586524" comment="xen-tools-domU-4.4.4_24-61.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220516" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1055047" ref_url="https://bugzilla.suse.com/1055047" source="BUGZILLA"/>
		<reference ref_id="1056336" ref_url="https://bugzilla.suse.com/1056336" source="BUGZILLA"/>
		<reference ref_id="1061075" ref_url="https://bugzilla.suse.com/1061075" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1061086" ref_url="https://bugzilla.suse.com/1061086" source="BUGZILLA"/>
		<reference ref_id="1063123" ref_url="https://bugzilla.suse.com/1063123" source="BUGZILLA"/>
		<reference ref_id="1068187" ref_url="https://bugzilla.suse.com/1068187" source="BUGZILLA"/>
		<reference ref_id="1068191" ref_url="https://bugzilla.suse.com/1068191" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-15592" ref_url="https://www.suse.com/security/cve/CVE-2017-15592/" source="CVE"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-15597" ref_url="https://www.suse.com/security/cve/CVE-2017-15597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003485.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- bsc#1068187: Failure to recognize errors in the Populate on Demand (PoD) code
  allowed for DoS (XSA-246)
- bsc#1068191: Missing p2m error checking in PoD code allowed unprivileged guests
  to retain a writable mapping of freed memory leading to information leaks,
  privilege escalation or DoS (XSA-247).
- CVE-2017-15289: The mode4and5 write functions allowed local OS guest privileged
  users to cause a denial of service (out-of-bounds write access and Qemu process
  crash) via vectors related to dst calculation (bsc#1063123)
- CVE-2017-15597: A grant copy operation being done on a grant of a dying domain
  allowed a malicious guest administrator to corrupt hypervisor memory, allowing
  for DoS or potentially privilege escalation and information leaks (bsc#1061075).
- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS (unbounded
  recursion, stack consumption, and hypervisor crash) or possibly gain privileges
  via crafted page-table stacking (bsc#1061081).
- CVE-2017-15592: x86 HVM guest OS users were able to cause a DoS (hypervisor
  crash) or possibly gain privileges because self-linear shadow mappings were
  mishandled for translated guests (bsc#1061086).
- CVE-2017-13672: The VGA display emulator support allowed local guest OS
  privileged users to cause a denial of service (out-of-bounds read and QEMU
  process crash) via vectors involving display update (bsc#1056336)

This non-security issue was fixed:

- bsc#1055047: Fixed --initrd-inject option in virt-install
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-08"/>
	<updated date="2017-12-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1055047">SUSE bug 1055047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056336">SUSE bug 1056336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061075">SUSE bug 1061075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061086">SUSE bug 1061086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063123">SUSE bug 1063123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068187">SUSE bug 1068187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068191">SUSE bug 1068191</bugzilla>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13672">CVE-2017-13672 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15289">CVE-2017-15289 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15592/">CVE-2017-15592 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15592">CVE-2017-15592 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15595">CVE-2017-15595 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15597/">CVE-2017-15597 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15597">CVE-2017-15597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586525" comment="xen-4.4.4_26-61.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586526" comment="xen-doc-html-4.4.4_26-61.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586527" comment="xen-kmp-default-4.4.4_26_3.0.101_108.13-61.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586528" comment="xen-kmp-pae-4.4.4_26_3.0.101_108.13-61.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586529" comment="xen-libs-4.4.4_26-61.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586530" comment="xen-libs-32bit-4.4.4_26-61.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586531" comment="xen-tools-4.4.4_26-61.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586532" comment="xen-tools-domU-4.4.4_26-61.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586525" comment="xen-4.4.4_26-61.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586526" comment="xen-doc-html-4.4.4_26-61.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586527" comment="xen-kmp-default-4.4.4_26_3.0.101_108.13-61.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586528" comment="xen-kmp-pae-4.4.4_26_3.0.101_108.13-61.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586529" comment="xen-libs-4.4.4_26-61.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586530" comment="xen-libs-32bit-4.4.4_26-61.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586531" comment="xen-tools-4.4.4_26-61.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586532" comment="xen-tools-domU-4.4.4_26-61.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220517" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1031382" ref_url="https://bugzilla.suse.com/1031382" source="BUGZILLA"/>
		<reference ref_id="1035442" ref_url="https://bugzilla.suse.com/1035442" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1070158" ref_url="https://bugzilla.suse.com/1070158" source="BUGZILLA"/>
		<reference ref_id="1070159" ref_url="https://bugzilla.suse.com/1070159" source="BUGZILLA"/>
		<reference ref_id="1070160" ref_url="https://bugzilla.suse.com/1070160" source="BUGZILLA"/>
		<reference ref_id="1070163" ref_url="https://bugzilla.suse.com/1070163" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1076116" ref_url="https://bugzilla.suse.com/1076116" source="BUGZILLA"/>
		<reference ref_id="1076180" ref_url="https://bugzilla.suse.com/1076180" source="BUGZILLA"/>
		<reference ref_id="1080635" ref_url="https://bugzilla.suse.com/1080635" source="BUGZILLA"/>
		<reference ref_id="1080662" ref_url="https://bugzilla.suse.com/1080662" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-17563" ref_url="https://www.suse.com/security/cve/CVE-2017-17563/" source="CVE"/>
		<reference ref_id="CVE-2017-17564" ref_url="https://www.suse.com/security/cve/CVE-2017-17564/" source="CVE"/>
		<reference ref_id="CVE-2017-17565" ref_url="https://www.suse.com/security/cve/CVE-2017-17565/" source="CVE"/>
		<reference ref_id="CVE-2017-17566" ref_url="https://www.suse.com/security/cve/CVE-2017-17566/" source="CVE"/>
		<reference ref_id="CVE-2017-18030" ref_url="https://www.suse.com/security/cve/CVE-2017-18030/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-5683" ref_url="https://www.suse.com/security/cve/CVE-2018-5683/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003795.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

This new feature was included:

- add script and sysv service to watch for vcpu online/offline events in a HVM domU

These security issues were fixed:

- CVE-2017-5753, CVE-2017-5715, CVE-2017-5754: Prevent information leaks via
  side effects of speculative execution, aka 'Spectre' and 'Meltdown' attacks
  (bsc#1074562, bsc#1068032)
- CVE-2018-5683: The vga_draw_text function allowed local OS guest privileged
  users to cause a denial of service (out-of-bounds read and QEMU process crash)
  by leveraging improper memory address validation (bsc#1076116).
- CVE-2017-18030: The cirrus_invalidate_region function allowed local OS guest
  privileged users to cause a denial of service (out-of-bounds array access and
  QEMU process crash) via vectors related to negative pitch (bsc#1076180).
- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS (unbounded
  recursion, stack consumption, and hypervisor crash) or possibly gain privileges
  via crafted page-table stacking (bsc#1061081)
- CVE-2017-17566: Prevent PV guest OS users to cause a denial of service (host
  OS crash) or gain host OS privileges in shadow mode by mapping a certain
  auxiliary page (bsc#1070158).
- CVE-2017-17563: Prevent guest OS users to cause a denial of service (host OS
  crash) or gain host OS privileges by leveraging an incorrect mask for
  reference-count overflow checking in shadow mode (bsc#1070159).
- CVE-2017-17564: Prevent guest OS users to cause a denial of service (host OS
  crash) or gain host OS privileges by leveraging incorrect error handling for
  reference counting in shadow mode (bsc#1070160).
- CVE-2017-17565: Prevent PV guest OS users to cause a denial of service (host
  OS crash) if shadow mode and log-dirty mode are in place, because of an
  incorrect assertion related to M2P (bsc#1070163).
- Added missing intermediate preemption checks for guest requesting removal of
  memory. This allowed malicious guest administrator to cause denial of service
  due to the high cost of this operation (bsc#1080635).
- Because of XEN not returning the proper error messages when transitioning
  grant tables from v2 to v1 a malicious guest was able to cause DoS or
  potentially allowed for privilege escalation as well as information leaks
  (bsc#1080662).

These non-security issues were fixed:

- bsc#1035442: Increased the value of LIBXL_DESTROY_TIMEOUT from 10 to 100
  seconds. If many domUs shutdown in parallel the backends couldn't keep up
- bsc#1031382: Prevent VMs from crashing when migrating between dom0 hosts in
  case read() returns zero on the receiver side.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-08"/>
	<updated date="2018-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031382">SUSE bug 1031382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035442">SUSE bug 1035442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070158">SUSE bug 1070158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070159">SUSE bug 1070159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070160">SUSE bug 1070160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070163">SUSE bug 1070163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076116">SUSE bug 1076116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076180">SUSE bug 1076180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080635">SUSE bug 1080635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080662">SUSE bug 1080662</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15595">CVE-2017-15595 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17563/">CVE-2017-17563 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17563">CVE-2017-17563 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17564/">CVE-2017-17564 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17564">CVE-2017-17564 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17565/">CVE-2017-17565 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17565">CVE-2017-17565 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17566/">CVE-2017-17566 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17566">CVE-2017-17566 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18030/">CVE-2017-18030 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18030">CVE-2017-18030 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5754">CVE-2017-5754 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5683/">CVE-2018-5683 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5683">CVE-2018-5683 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586533" comment="xen-4.4.4_28-61.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586534" comment="xen-doc-html-4.4.4_28-61.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586535" comment="xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586536" comment="xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586537" comment="xen-libs-4.4.4_28-61.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586538" comment="xen-libs-32bit-4.4.4_28-61.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586539" comment="xen-tools-4.4.4_28-61.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586540" comment="xen-tools-domU-4.4.4_28-61.23.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586533" comment="xen-4.4.4_28-61.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586534" comment="xen-doc-html-4.4.4_28-61.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586535" comment="xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586536" comment="xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586537" comment="xen-libs-4.4.4_28-61.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586538" comment="xen-libs-32bit-4.4.4_28-61.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586539" comment="xen-tools-4.4.4_28-61.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586540" comment="xen-tools-domU-4.4.4_28-61.23.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220518" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1035442" ref_url="https://bugzilla.suse.com/1035442" source="BUGZILLA"/>
		<reference ref_id="1057493" ref_url="https://bugzilla.suse.com/1057493" source="BUGZILLA"/>
		<reference ref_id="1072834" ref_url="https://bugzilla.suse.com/1072834" source="BUGZILLA"/>
		<reference ref_id="1083292" ref_url="https://bugzilla.suse.com/1083292" source="BUGZILLA"/>
		<reference ref_id="1086107" ref_url="https://bugzilla.suse.com/1086107" source="BUGZILLA"/>
		<reference ref_id="1089152" ref_url="https://bugzilla.suse.com/1089152" source="BUGZILLA"/>
		<reference ref_id="1089635" ref_url="https://bugzilla.suse.com/1089635" source="BUGZILLA"/>
		<reference ref_id="1090820" ref_url="https://bugzilla.suse.com/1090820" source="BUGZILLA"/>
		<reference ref_id="1090822" ref_url="https://bugzilla.suse.com/1090822" source="BUGZILLA"/>
		<reference ref_id="1090823" ref_url="https://bugzilla.suse.com/1090823" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10471" ref_url="https://www.suse.com/security/cve/CVE-2018-10471/" source="CVE"/>
		<reference ref_id="CVE-2018-10472" ref_url="https://www.suse.com/security/cve/CVE-2018-10472/" source="CVE"/>
		<reference ref_id="CVE-2018-7550" ref_url="https://www.suse.com/security/cve/CVE-2018-7550/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003986.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2018-8897: Prevent mishandling of debug exceptions on x86 (XSA-260, bsc#1090820)
- Handle HPET timers in IO-APIC mode correctly to prevent malicious or buggy
  HVM guests from causing a hypervisor crash or potentially privilege
  escalation/information leaks (XSA-261, bsc#1090822)
- Prevent unbounded loop, induced by qemu allowing an attacker to permanently
  keep a physical CPU core busy (XSA-262, bsc#1090823)
- CVE-2018-10472: x86 HVM guest OS users (in certain configurations) were able
  to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction
  with specifying the target file as the backing file of a snapshot
  (bsc#1089152).
- CVE-2018-10471: x86 PV guest OS users were able to cause a denial of service
  (out-of-bounds zero write and hypervisor crash) via unexpected INT 80
  processing, because of an incorrect fix for CVE-2017-5754 (bsc#1089635).
- CVE-2018-7550: The load_multiboot function allowed local guest OS users to
  execute arbitrary code on the host via a mh_load_end_addr value greater than
  mh_bss_end_addr, which triggers an out-of-bounds read or write memory access
  (bsc#1083292).

These non-security issues were fixed:

- bsc#1072834: Prevent unchecked MSR access error
- bsc#1035442: Increase the value of LIBXL_DESTROY_TIMEOUT from 10 to 100
  seconds, allowing for more domUs to be shutdown in parallel
- bsc#1057493: Prevent DomU crash

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-09"/>
	<updated date="2018-05-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035442">SUSE bug 1035442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057493">SUSE bug 1057493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072834">SUSE bug 1072834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083292">SUSE bug 1083292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086107">SUSE bug 1086107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089152">SUSE bug 1089152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089635">SUSE bug 1089635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090820">SUSE bug 1090820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090822">SUSE bug 1090822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090823">SUSE bug 1090823</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10471/">CVE-2018-10471 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10471">CVE-2018-10471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10472/">CVE-2018-10472 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10472">CVE-2018-10472 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7550/">CVE-2018-7550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7550">CVE-2018-7550 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8897">CVE-2018-8897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586541" comment="xen-4.4.4_30-61.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586542" comment="xen-doc-html-4.4.4_30-61.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586543" comment="xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586544" comment="xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586545" comment="xen-libs-4.4.4_30-61.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586546" comment="xen-libs-32bit-4.4.4_30-61.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586547" comment="xen-tools-4.4.4_30-61.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586548" comment="xen-tools-domU-4.4.4_30-61.26.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586541" comment="xen-4.4.4_30-61.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586542" comment="xen-doc-html-4.4.4_30-61.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586543" comment="xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586544" comment="xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586545" comment="xen-libs-4.4.4_30-61.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586546" comment="xen-libs-32bit-4.4.4_30-61.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586547" comment="xen-tools-4.4.4_30-61.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586548" comment="xen-tools-domU-4.4.4_30-61.26.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220519" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1092631" ref_url="https://bugzilla.suse.com/1092631" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004168.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2018-3639: Prevent attackers with local user access from extracting information via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bsc#1092631).
- CVE-2017-5753,CVE-2017-5715,CVE-2017-5754: Improved Spectre v2 mitigations (bsc#1074562).

bsc#1027519
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-08"/>
	<updated date="2018-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092631">SUSE bug 1092631</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5754">CVE-2017-5754 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586549" comment="xen-4.4.4_32-61.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586550" comment="xen-doc-html-4.4.4_32-61.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586551" comment="xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586552" comment="xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586553" comment="xen-libs-4.4.4_32-61.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586554" comment="xen-libs-32bit-4.4.4_32-61.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586555" comment="xen-tools-4.4.4_32-61.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586556" comment="xen-tools-domU-4.4.4_32-61.29.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586549" comment="xen-4.4.4_32-61.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586550" comment="xen-doc-html-4.4.4_32-61.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586551" comment="xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586552" comment="xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586553" comment="xen-libs-4.4.4_32-61.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586554" comment="xen-libs-32bit-4.4.4_32-61.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586555" comment="xen-tools-4.4.4_32-61.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586556" comment="xen-tools-domU-4.4.4_32-61.29.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220520" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1079730" ref_url="https://bugzilla.suse.com/1079730" source="BUGZILLA"/>
		<reference ref_id="1095242" ref_url="https://bugzilla.suse.com/1095242" source="BUGZILLA"/>
		<reference ref_id="1096224" ref_url="https://bugzilla.suse.com/1096224" source="BUGZILLA"/>
		<reference ref_id="1097521" ref_url="https://bugzilla.suse.com/1097521" source="BUGZILLA"/>
		<reference ref_id="1097522" ref_url="https://bugzilla.suse.com/1097522" source="BUGZILLA"/>
		<reference ref_id="1098744" ref_url="https://bugzilla.suse.com/1098744" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617/" source="CVE"/>
		<reference ref_id="CVE-2018-12891" ref_url="https://www.suse.com/security/cve/CVE-2018-12891/" source="CVE"/>
		<reference ref_id="CVE-2018-12893" ref_url="https://www.suse.com/security/cve/CVE-2018-12893/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004294.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed:

- CVE-2018-12617: Fix integer overflow that causes segmentation fault in qmp_guest_file_read() with g_malloc() (bsc#1098744).
- CVE-2018-3665: Fix Lazy FP Save/Restore issue (XSA-267) (bsc#1095242).
- CVE-2018-11806: Fix heap buffer overflow while reassembling fragmented datagrams (bsc#1096224).
- CVE-2018-12891: Fix possible Denial of Service (DoS) via certain PV MMU operations that affect the entire host (XSA-264) (bsc#1097521).
- CVE-2018-12893: Fix crash/Denial of Service (DoS) via safety check (XSA-265) (bsc#1097522).

Bug fixes:

- bsc#1079730: Fix failed 'write' lock.
- bsc#1027519: Add upstream patches from January.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-23"/>
	<updated date="2018-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079730">SUSE bug 1079730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095242">SUSE bug 1095242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096224">SUSE bug 1096224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097521">SUSE bug 1097521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097522">SUSE bug 1097522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098744">SUSE bug 1098744</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11806">CVE-2018-11806 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12617">CVE-2018-12617 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12891/">CVE-2018-12891 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12891">CVE-2018-12891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12893/">CVE-2018-12893 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12893">CVE-2018-12893 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3665">CVE-2018-3665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586557" comment="xen-4.4.4_34-61.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586558" comment="xen-doc-html-4.4.4_34-61.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586559" comment="xen-kmp-default-4.4.4_34_3.0.101_108.57-61.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586560" comment="xen-kmp-pae-4.4.4_34_3.0.101_108.57-61.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586561" comment="xen-libs-4.4.4_34-61.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586562" comment="xen-libs-32bit-4.4.4_34-61.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586563" comment="xen-tools-4.4.4_34-61.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586564" comment="xen-tools-domU-4.4.4_34-61.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586557" comment="xen-4.4.4_34-61.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586558" comment="xen-doc-html-4.4.4_34-61.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586559" comment="xen-kmp-default-4.4.4_34_3.0.101_108.57-61.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586560" comment="xen-kmp-pae-4.4.4_34_3.0.101_108.57-61.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586561" comment="xen-libs-4.4.4_34-61.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586562" comment="xen-libs-32bit-4.4.4_34-61.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586563" comment="xen-tools-4.4.4_34-61.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586564" comment="xen-tools-domU-4.4.4_34-61.32.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220521" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1091107" ref_url="https://bugzilla.suse.com/1091107" source="BUGZILLA"/>
		<reference ref_id="1092631" ref_url="https://bugzilla.suse.com/1092631" source="BUGZILLA"/>
		<reference ref_id="1101684" ref_url="https://bugzilla.suse.com/1101684" source="BUGZILLA"/>
		<reference ref_id="1102116" ref_url="https://bugzilla.suse.com/1102116" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004492.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

This security issue was fixed:

- CVE-2018-3646: Systems with microprocessors utilizing speculative execution
  and address translations may have allowed unauthorized disclosure of
  information residing in the L1 data cache to an attacker with local user access
  with guest OS privilege via a terminal page fault and a side-channel analysis
  (bsc#1091107, bsc#1027519).

These non-security issues were fixed:

- bsc#1102116: SSBD is not virtualized for guests
- bsc#1092631: Preserve the xl dmesg output after boot for determining what speculative mitigations have been detected by the hypervisor.
- bsc#1101684: Make xen able to disable the visibility of the new CPU flags.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-22"/>
	<updated date="2018-08-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092631">SUSE bug 1092631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101684">SUSE bug 1101684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102116">SUSE bug 1102116</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3646">CVE-2018-3646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586565" comment="xen-4.4.4_36-61.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586566" comment="xen-doc-html-4.4.4_36-61.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586567" comment="xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586568" comment="xen-kmp-pae-4.4.4_36_3.0.101_108.68-61.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586569" comment="xen-libs-4.4.4_36-61.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586570" comment="xen-libs-32bit-4.4.4_36-61.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586571" comment="xen-tools-4.4.4_36-61.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586572" comment="xen-tools-domU-4.4.4_36-61.37.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586565" comment="xen-4.4.4_36-61.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586566" comment="xen-doc-html-4.4.4_36-61.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586567" comment="xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586568" comment="xen-kmp-pae-4.4.4_36_3.0.101_108.68-61.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586569" comment="xen-libs-4.4.4_36-61.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586570" comment="xen-libs-32bit-4.4.4_36-61.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586571" comment="xen-tools-4.4.4_36-61.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586572" comment="xen-tools-domU-4.4.4_36-61.37.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220522" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1031382" ref_url="https://bugzilla.suse.com/1031382" source="BUGZILLA"/>
		<reference ref_id="1056336" ref_url="https://bugzilla.suse.com/1056336" source="BUGZILLA"/>
		<reference ref_id="1105528" ref_url="https://bugzilla.suse.com/1105528" source="BUGZILLA"/>
		<reference ref_id="1108940" ref_url="https://bugzilla.suse.com/1108940" source="BUGZILLA"/>
		<reference ref_id="1110924" ref_url="https://bugzilla.suse.com/1110924" source="BUGZILLA"/>
		<reference ref_id="1111007" ref_url="https://bugzilla.suse.com/1111007" source="BUGZILLA"/>
		<reference ref_id="1111011" ref_url="https://bugzilla.suse.com/1111011" source="BUGZILLA"/>
		<reference ref_id="1111014" ref_url="https://bugzilla.suse.com/1111014" source="BUGZILLA"/>
		<reference ref_id="1112188" ref_url="https://bugzilla.suse.com/1112188" source="BUGZILLA"/>
		<reference ref_id="1114423" ref_url="https://bugzilla.suse.com/1114423" source="BUGZILLA"/>
		<reference ref_id="1114988" ref_url="https://bugzilla.suse.com/1114988" source="BUGZILLA"/>
		<reference ref_id="1115040" ref_url="https://bugzilla.suse.com/1115040" source="BUGZILLA"/>
		<reference ref_id="1115045" ref_url="https://bugzilla.suse.com/1115045" source="BUGZILLA"/>
		<reference ref_id="1115047" ref_url="https://bugzilla.suse.com/1115047" source="BUGZILLA"/>
		<reference ref_id="1117756" ref_url="https://bugzilla.suse.com/1117756" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2018-10839" ref_url="https://www.suse.com/security/cve/CVE-2018-10839/" source="CVE"/>
		<reference ref_id="CVE-2018-17958" ref_url="https://www.suse.com/security/cve/CVE-2018-17958/" source="CVE"/>
		<reference ref_id="CVE-2018-17962" ref_url="https://www.suse.com/security/cve/CVE-2018-17962/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-18438" ref_url="https://www.suse.com/security/cve/CVE-2018-18438/" source="CVE"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="CVE-2018-19665" ref_url="https://www.suse.com/security/cve/CVE-2018-19665/" source="CVE"/>
		<reference ref_id="CVE-2018-19961" ref_url="https://www.suse.com/security/cve/CVE-2018-19961/" source="CVE"/>
		<reference ref_id="CVE-2018-19962" ref_url="https://www.suse.com/security/cve/CVE-2018-19962/" source="CVE"/>
		<reference ref_id="CVE-2018-19965" ref_url="https://www.suse.com/security/cve/CVE-2018-19965/" source="CVE"/>
		<reference ref_id="CVE-2018-19966" ref_url="https://www.suse.com/security/cve/CVE-2018-19966/" source="CVE"/>
		<reference ref_id="CVE-2018-19967" ref_url="https://www.suse.com/security/cve/CVE-2018-19967/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security vulnerabilities fixed:

- CVE-2018-19961, CVE-2018-19962: Fixed an issue related to insufficient TLB
  flushing with AMD IOMMUs, which potentially allowed a guest to escalate its
  privileges, may cause a Denial of Service (DoS) affecting the entire host, or
  may be able to access data it is not supposed to access. (XSA-275)
  (bsc#1115040)
- CVE-2018-19965: Fixed an issue related to the INVPCID instruction in case
  non-canonical addresses are accessed, which may allow a guest to cause Xen to
  crash, resulting in a Denial of Service (DoS) affecting the entire host.
  (XSA-279) (bsc#1115045)
- CVE-2018-19966: Fixed an issue related to a previous fix for XSA-240, which
  conflicted with shadow paging and allowed a guest to cause Xen to crash,
  resulting in a Denial of Service (DoS) (XSA-280) (bsc#1115047)
- CVE-2018-19967: Fixed HLE constructs that allowed guests to lock up the host,
  resulting in a Denial of Service (DoS). (XSA-282) (bsc#1114988)
- CVE-2018-19665: Fixed an integer overflow resulting in memory corruption in
  various Bluetooth functions, allowing this to crash qemu process resulting in
  Denial of Service (DoS). (bsc#1117756).
- CVE-2018-18849: Fixed an out of bounds memory access in the LSI53C895A SCSI
  host bus adapter emulation, which allowed a user and/or process to crash the
  qemu process resulting in a Denial of Service (DoS). (bsc#1114423)
- Fixed an integer overflow in ccid_card_vscard_read(), which allowed for
  memory corruption. (bsc#1112188)
- CVE-2017-13672: Fixed an out of bounds read access during display update
  (bsc#1056336)
- CVE-2018-17958: Fixed an integer overflow leading to a buffer overflow in the
  rtl8139 component (bsc#1111007)
- CVE-2018-17962: Fixed an integer overflow leading to a buffer overflow in the
  pcnet component (bsc#1111011)
- CVE-2018-17963: Fixed an integer overflow in relation to large packet sizes,
  leading to a denial of service (DoS). (bsc#1111014)
- CVE-2018-10839: Fixed an integer overflow leading to a buffer overflow in
  the ne2000 component (bsc#1110924)

Other bugs fixed:

- Fixed an issue related to a domU hang on SLE12-SP3 HV (bsc#1108940)
- Upstream bug fixes (bsc#1027519)
- Fixed crashing VMs when migrating between dom0 hosts (bsc#1031382)
- Fixed an issue with xpti=no-dom0 not working as expected (bsc#1105528)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-02"/>
	<updated date="2019-01-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031382">SUSE bug 1031382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056336">SUSE bug 1056336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105528">SUSE bug 1105528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108940">SUSE bug 1108940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110924">SUSE bug 1110924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111007">SUSE bug 1111007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111011">SUSE bug 1111011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111014">SUSE bug 1111014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112188">SUSE bug 1112188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114423">SUSE bug 1114423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114988">SUSE bug 1114988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115040">SUSE bug 1115040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115045">SUSE bug 1115045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115047">SUSE bug 1115047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117756">SUSE bug 1117756</bugzilla>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13672">CVE-2017-13672 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10839/">CVE-2018-10839 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10839">CVE-2018-10839 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17958/">CVE-2018-17958 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17958">CVE-2018-17958 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17962/">CVE-2018-17962 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17962">CVE-2018-17962 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17963">CVE-2018-17963 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18438/">CVE-2018-18438 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18438">CVE-2018-18438 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18849">CVE-2018-18849 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19665/">CVE-2018-19665 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19665">CVE-2018-19665 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19961/">CVE-2018-19961 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19961">CVE-2018-19961 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19962/">CVE-2018-19962 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19962">CVE-2018-19962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19965/">CVE-2018-19965 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19965">CVE-2018-19965 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19966/">CVE-2018-19966 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19966">CVE-2018-19966 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19967/">CVE-2018-19967 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19967">CVE-2018-19967 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586573" comment="xen-4.4.4_38-61.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586574" comment="xen-doc-html-4.4.4_38-61.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586575" comment="xen-kmp-default-4.4.4_38_3.0.101_108.84-61.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586576" comment="xen-kmp-pae-4.4.4_38_3.0.101_108.84-61.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586577" comment="xen-libs-4.4.4_38-61.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586578" comment="xen-libs-32bit-4.4.4_38-61.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586579" comment="xen-tools-4.4.4_38-61.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586580" comment="xen-tools-domU-4.4.4_38-61.40.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586573" comment="xen-4.4.4_38-61.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586574" comment="xen-doc-html-4.4.4_38-61.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586575" comment="xen-kmp-default-4.4.4_38_3.0.101_108.84-61.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586576" comment="xen-kmp-pae-4.4.4_38_3.0.101_108.84-61.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586577" comment="xen-libs-4.4.4_38-61.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586578" comment="xen-libs-32bit-4.4.4_38-61.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586579" comment="xen-tools-4.4.4_38-61.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586580" comment="xen-tools-domU-4.4.4_38-61.40.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220523" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1031382" ref_url="https://bugzilla.suse.com/1031382" source="BUGZILLA"/>
		<reference ref_id="1123157" ref_url="https://bugzilla.suse.com/1123157" source="BUGZILLA"/>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1126198" ref_url="https://bugzilla.suse.com/1126198" source="BUGZILLA"/>
		<reference ref_id="1126201" ref_url="https://bugzilla.suse.com/1126201" source="BUGZILLA"/>
		<reference ref_id="1127400" ref_url="https://bugzilla.suse.com/1127400" source="BUGZILLA"/>
		<reference ref_id="1129623" ref_url="https://bugzilla.suse.com/1129623" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005274.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed: 

- Fixed multiple access violations introduced by XENMEM_exchange hypercall which could allow 
  a single PV guest to leak arbitrary amounts of memory, leading to a denial of service (bsc#1126192).
- Fixed an issue which could allow a malicious unprivileged guest userspace process to escalate its privilege 
  to that of other userspace processes in the same guest and potentially thereby to that 
  of the guest operating system (bsc#1126201).
- Fixed an issue which could allow an untrusted PV domain with access to a physical device to DMA into its own 
  pagetables leading to privilege escalation (bsc#1126195).
- Fixed an issue which could allow a malicious or buggy x86 PV guest kernels can mount a Denial of Service
  attack affecting the whole system (bsc#1126196).
- CVE-2019-6778: Fixed a heap buffer overflow in tcp_emu() found in slirp (bsc#1123157).
- Fixed an issue which could allow malicious PV guests may cause a host crash or 
  gain access to data pertaining to other guests.Additionally, vulnerable configurations 
  are likely to be unstable even in the absence of an attack (bsc#1126198).
- Fixed an issue which could allow malicious 64bit PV guests to cause a host crash (bsc#1127400).
- Fixed an issue which could allow malicious or buggy guests with passed through PCI devices to  be able to 
  escalate their privileges, crash the host, or access data belonging to other guests. Additionally memory 
  leaks were also possible (bsc#1126140).
- Fixed a race condition issue which could allow malicious PV guests to escalate their privilege to that 
  of the hypervisor (bsc#1126141).
- CVE-2019-9824: Fixed an information leak in SLiRP networking implementation which could allow a user/process 
  to read uninitialised stack memory contents (bsc#1129623).

Other issues fixed: 

- Fixed an issue where VMs crashing when migrating between dom0 hosts (bsc#1031382).
- Upstream bug fixes (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031382">SUSE bug 1031382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123157">SUSE bug 1123157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126198">SUSE bug 1126198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126201">SUSE bug 1126201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127400">SUSE bug 1127400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129623">SUSE bug 1129623</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6778">CVE-2019-6778 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9824">CVE-2019-9824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586581" comment="xen-4.4.4_40-61.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586582" comment="xen-doc-html-4.4.4_40-61.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586583" comment="xen-kmp-default-4.4.4_40_3.0.101_108.87-61.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586584" comment="xen-kmp-pae-4.4.4_40_3.0.101_108.87-61.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586585" comment="xen-libs-4.4.4_40-61.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586586" comment="xen-libs-32bit-4.4.4_40-61.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586587" comment="xen-tools-4.4.4_40-61.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586588" comment="xen-tools-domU-4.4.4_40-61.43.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586581" comment="xen-4.4.4_40-61.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586582" comment="xen-doc-html-4.4.4_40-61.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586583" comment="xen-kmp-default-4.4.4_40_3.0.101_108.87-61.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586584" comment="xen-kmp-pae-4.4.4_40_3.0.101_108.87-61.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586585" comment="xen-libs-4.4.4_40-61.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586586" comment="xen-libs-32bit-4.4.4_40-61.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586587" comment="xen-tools-4.4.4_40-61.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586588" comment="xen-tools-domU-4.4.4_40-61.43.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220524" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1130680" ref_url="https://bugzilla.suse.com/1130680" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005492.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Sampling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the XEN Hypervisor adjustments, that additionally also use CPU Microcode updates.

The mitigation can be controlled via the 'mds' commandline option, see the documentation.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Other fixes:

- CVE-2018-20815: Fixed a heap buffer overflow while loading device tree blob (bsc#1130680).
- Added upstream bug fix (bsc#1027519).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-24"/>
	<updated date="2019-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130680">SUSE bug 1130680</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20815">CVE-2018-20815 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586589" comment="xen-4.4.4_40-61.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586590" comment="xen-doc-html-4.4.4_40-61.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586591" comment="xen-kmp-default-4.4.4_40_3.0.101_108.90-61.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586592" comment="xen-kmp-pae-4.4.4_40_3.0.101_108.90-61.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586593" comment="xen-libs-4.4.4_40-61.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586594" comment="xen-libs-32bit-4.4.4_40-61.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586595" comment="xen-tools-4.4.4_40-61.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586596" comment="xen-tools-domU-4.4.4_40-61.46.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220525" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1126198" ref_url="https://bugzilla.suse.com/1126198" source="BUGZILLA"/>
		<reference ref_id="1126201" ref_url="https://bugzilla.suse.com/1126201" source="BUGZILLA"/>
		<reference ref_id="1127400" ref_url="https://bugzilla.suse.com/1127400" source="BUGZILLA"/>
		<reference ref_id="1135905" ref_url="https://bugzilla.suse.com/1135905" source="BUGZILLA"/>
		<reference ref_id="1143797" ref_url="https://bugzilla.suse.com/1143797" source="BUGZILLA"/>
		<reference ref_id="1145652" ref_url="https://bugzilla.suse.com/1145652" source="BUGZILLA"/>
		<reference ref_id="1146874" ref_url="https://bugzilla.suse.com/1146874" source="BUGZILLA"/>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12067" ref_url="https://www.suse.com/security/cve/CVE-2019-12067/" source="CVE"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-12155" ref_url="https://www.suse.com/security/cve/CVE-2019-12155/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-17340" ref_url="https://www.suse.com/security/cve/CVE-2019-17340/" source="CVE"/>
		<reference ref_id="CVE-2019-17341" ref_url="https://www.suse.com/security/cve/CVE-2019-17341/" source="CVE"/>
		<reference ref_id="CVE-2019-17342" ref_url="https://www.suse.com/security/cve/CVE-2019-17342/" source="CVE"/>
		<reference ref_id="CVE-2019-17343" ref_url="https://www.suse.com/security/cve/CVE-2019-17343/" source="CVE"/>
		<reference ref_id="CVE-2019-17344" ref_url="https://www.suse.com/security/cve/CVE-2019-17344/" source="CVE"/>
		<reference ref_id="CVE-2019-17346" ref_url="https://www.suse.com/security/cve/CVE-2019-17346/" source="CVE"/>
		<reference ref_id="CVE-2019-17347" ref_url="https://www.suse.com/security/cve/CVE-2019-17347/" source="CVE"/>
		<reference ref_id="CVE-2019-17348" ref_url="https://www.suse.com/security/cve/CVE-2019-17348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2019-15890: Fixed a use-after-free in SLiRP networking implementation of QEMU emulator
  which could have led to Denial of Service (bsc#1149813).
- CVE-2019-12068: Fixed an issue in lsi which could lead to an infinite loop and denial of 
  service (bsc#1146874).
- CVE-2019-14378: Fixed a heap buffer overflow in SLiRp networking implementation of QEMU 
  emulator which could have led to execution of  arbitrary code with privileges of the 
  QEMU process (bsc#1143797).
- CVE-2019-12067: Fixed a null pointer dereference which could have led to denial of service (bsc#1145652).
- CVE-2019-12155: Fixed a null pointer dereference in QXL VGA card emulator of QEMU which
  could have led to denial of service (bsc#1135905).
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-24"/>
	<updated date="2019-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126198">SUSE bug 1126198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126201">SUSE bug 1126201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127400">SUSE bug 1127400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135905">SUSE bug 1135905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143797">SUSE bug 1143797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145652">SUSE bug 1145652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146874">SUSE bug 1146874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12067/">CVE-2019-12067 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12067">CVE-2019-12067 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12068">CVE-2019-12068 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12155/">CVE-2019-12155 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12155">CVE-2019-12155 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14378">CVE-2019-14378 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15890">CVE-2019-15890 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17340/">CVE-2019-17340 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17340">CVE-2019-17340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17341/">CVE-2019-17341 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17341">CVE-2019-17341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17342/">CVE-2019-17342 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17342">CVE-2019-17342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17343/">CVE-2019-17343 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17343">CVE-2019-17343 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17344/">CVE-2019-17344 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17344">CVE-2019-17344 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17346/">CVE-2019-17346 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17346">CVE-2019-17346 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17347/">CVE-2019-17347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17347">CVE-2019-17347 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17348/">CVE-2019-17348 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17348">CVE-2019-17348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586597" comment="xen-4.4.4_40-61.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586598" comment="xen-doc-html-4.4.4_40-61.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586599" comment="xen-kmp-default-4.4.4_40_3.0.101_108.101-61.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586600" comment="xen-kmp-pae-4.4.4_40_3.0.101_108.101-61.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586601" comment="xen-libs-4.4.4_40-61.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586602" comment="xen-libs-32bit-4.4.4_40-61.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586603" comment="xen-tools-4.4.4_40-61.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586604" comment="xen-tools-domU-4.4.4_40-61.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220526" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1152497" ref_url="https://bugzilla.suse.com/1152497" source="BUGZILLA"/>
		<reference ref_id="1154448" ref_url="https://bugzilla.suse.com/1154448" source="BUGZILLA"/>
		<reference ref_id="1154456" ref_url="https://bugzilla.suse.com/1154456" source="BUGZILLA"/>
		<reference ref_id="1154458" ref_url="https://bugzilla.suse.com/1154458" source="BUGZILLA"/>
		<reference ref_id="1154461" ref_url="https://bugzilla.suse.com/1154461" source="BUGZILLA"/>
		<reference ref_id="1155945" ref_url="https://bugzilla.suse.com/1155945" source="BUGZILLA"/>
		<reference ref_id="1157888" ref_url="https://bugzilla.suse.com/1157888" source="BUGZILLA"/>
		<reference ref_id="1158004" ref_url="https://bugzilla.suse.com/1158004" source="BUGZILLA"/>
		<reference ref_id="1158005" ref_url="https://bugzilla.suse.com/1158005" source="BUGZILLA"/>
		<reference ref_id="1158006" ref_url="https://bugzilla.suse.com/1158006" source="BUGZILLA"/>
		<reference ref_id="1158007" ref_url="https://bugzilla.suse.com/1158007" source="BUGZILLA"/>
		<reference ref_id="1161181" ref_url="https://bugzilla.suse.com/1161181" source="BUGZILLA"/>
		<reference ref_id="1163019" ref_url="https://bugzilla.suse.com/1163019" source="BUGZILLA"/>
		<reference ref_id="1168140" ref_url="https://bugzilla.suse.com/1168140" source="BUGZILLA"/>
		<reference ref_id="1169392" ref_url="https://bugzilla.suse.com/1169392" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-18420" ref_url="https://www.suse.com/security/cve/CVE-2019-18420/" source="CVE"/>
		<reference ref_id="CVE-2019-18421" ref_url="https://www.suse.com/security/cve/CVE-2019-18421/" source="CVE"/>
		<reference ref_id="CVE-2019-18424" ref_url="https://www.suse.com/security/cve/CVE-2019-18424/" source="CVE"/>
		<reference ref_id="CVE-2019-18425" ref_url="https://www.suse.com/security/cve/CVE-2019-18425/" source="CVE"/>
		<reference ref_id="CVE-2019-19577" ref_url="https://www.suse.com/security/cve/CVE-2019-19577/" source="CVE"/>
		<reference ref_id="CVE-2019-19578" ref_url="https://www.suse.com/security/cve/CVE-2019-19578/" source="CVE"/>
		<reference ref_id="CVE-2019-19579" ref_url="https://www.suse.com/security/cve/CVE-2019-19579/" source="CVE"/>
		<reference ref_id="CVE-2019-19580" ref_url="https://www.suse.com/security/cve/CVE-2019-19580/" source="CVE"/>
		<reference ref_id="CVE-2019-19583" ref_url="https://www.suse.com/security/cve/CVE-2019-19583/" source="CVE"/>
		<reference ref_id="CVE-2020-11740" ref_url="https://www.suse.com/security/cve/CVE-2020-11740/" source="CVE"/>
		<reference ref_id="CVE-2020-11741" ref_url="https://www.suse.com/security/cve/CVE-2020-11741/" source="CVE"/>
		<reference ref_id="CVE-2020-11742" ref_url="https://www.suse.com/security/cve/CVE-2020-11742/" source="CVE"/>
		<reference ref_id="CVE-2020-7211" ref_url="https://www.suse.com/security/cve/CVE-2020-7211/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- bsc#1174543 - secure boot related fixes
- bsc#1163019 - CVE-2020-8608: potential OOB access due to unsafe snprintf() usages
- bsc#1169392 - CVE-2020-11742: Bad continuation handling in GNTTABOP_copy
- bsc#1168140 - CVE-2020-11740, CVE-2020-11741: multiple xenoprof issues
- bsc#1161181 - CVE-2020-7211: potential directory traversal using relative paths via tftp server on Windows host
- bsc#1157888 - CVE-2019-19579: Device quarantine for alternate pci assignment methods
- bsc#1158004 - CVE-2019-19583: VMX: VMentry failure with debug exceptions and blocked states
- bsc#1158005 - CVE-2019-19578: Linear pagetable use / entry miscounts
- bsc#1158006 - CVE-2019-19580: Further issues with restartable PV type change operations
- bsc#1158007 - CVE-2019-19577: dynamic height for the IOMMU pagetables 
- bsc#1154448 - CVE-2019-18420: VCPUOP_initialise DoS
- bsc#1154456 - CVE-2019-18425: missing descriptor table limit checking in x86 PV emulation
- bsc#1154458 - CVE-2019-18421: Issues with restartable PV type change operations
- bsc#1154461 - CVE-2019-18424: passed through PCI devices may corrupt host memory after deassignment
- bsc#1155945 - CVE-2018-12207: Machine Check Error Avoidance on Page Size Change (aka IFU issue)
- bsc#1152497 - CVE-2019-11135: TSX Asynchronous Abort (TAA) issue
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-04"/>
	<updated date="2020-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152497">SUSE bug 1152497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154448">SUSE bug 1154448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154456">SUSE bug 1154456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154458">SUSE bug 1154458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154461">SUSE bug 1154461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155945">SUSE bug 1155945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157888">SUSE bug 1157888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158004">SUSE bug 1158004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158005">SUSE bug 1158005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158006">SUSE bug 1158006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158007">SUSE bug 1158007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161181">SUSE bug 1161181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168140">SUSE bug 1168140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169392">SUSE bug 1169392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12207">CVE-2018-12207 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18420/">CVE-2019-18420 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18420">CVE-2019-18420 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18421/">CVE-2019-18421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18421">CVE-2019-18421 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18424/">CVE-2019-18424 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18424">CVE-2019-18424 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18425/">CVE-2019-18425 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18425">CVE-2019-18425 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19577/">CVE-2019-19577 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19577">CVE-2019-19577 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19578/">CVE-2019-19578 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19578">CVE-2019-19578 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19579/">CVE-2019-19579 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19579">CVE-2019-19579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19580/">CVE-2019-19580 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19580">CVE-2019-19580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19583/">CVE-2019-19583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19583">CVE-2019-19583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11740/">CVE-2020-11740 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11740">CVE-2020-11740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11741/">CVE-2020-11741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11741">CVE-2020-11741 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11742/">CVE-2020-11742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11742">CVE-2020-11742 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-7211/">CVE-2020-7211 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7211">CVE-2020-7211 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586605" comment="xen-4.4.4_42-61.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586606" comment="xen-doc-html-4.4.4_42-61.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586607" comment="xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586608" comment="xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586609" comment="xen-libs-4.4.4_42-61.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586610" comment="xen-libs-32bit-4.4.4_42-61.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586611" comment="xen-tools-4.4.4_42-61.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586612" comment="xen-tools-domU-4.4.4_42-61.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220527" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1172205" ref_url="https://bugzilla.suse.com/1172205" source="BUGZILLA"/>
		<reference ref_id="1173378" ref_url="https://bugzilla.suse.com/1173378" source="BUGZILLA"/>
		<reference ref_id="1173380" ref_url="https://bugzilla.suse.com/1173380" source="BUGZILLA"/>
		<reference ref_id="1175534" ref_url="https://bugzilla.suse.com/1175534" source="BUGZILLA"/>
		<reference ref_id="1176343" ref_url="https://bugzilla.suse.com/1176343" source="BUGZILLA"/>
		<reference ref_id="1176344" ref_url="https://bugzilla.suse.com/1176344" source="BUGZILLA"/>
		<reference ref_id="1176345" ref_url="https://bugzilla.suse.com/1176345" source="BUGZILLA"/>
		<reference ref_id="1176346" ref_url="https://bugzilla.suse.com/1176346" source="BUGZILLA"/>
		<reference ref_id="1176347" ref_url="https://bugzilla.suse.com/1176347" source="BUGZILLA"/>
		<reference ref_id="1176348" ref_url="https://bugzilla.suse.com/1176348" source="BUGZILLA"/>
		<reference ref_id="1176350" ref_url="https://bugzilla.suse.com/1176350" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-15565" ref_url="https://www.suse.com/security/cve/CVE-2020-15565/" source="CVE"/>
		<reference ref_id="CVE-2020-15567" ref_url="https://www.suse.com/security/cve/CVE-2020-15567/" source="CVE"/>
		<reference ref_id="CVE-2020-25595" ref_url="https://www.suse.com/security/cve/CVE-2020-25595/" source="CVE"/>
		<reference ref_id="CVE-2020-25596" ref_url="https://www.suse.com/security/cve/CVE-2020-25596/" source="CVE"/>
		<reference ref_id="CVE-2020-25597" ref_url="https://www.suse.com/security/cve/CVE-2020-25597/" source="CVE"/>
		<reference ref_id="CVE-2020-25600" ref_url="https://www.suse.com/security/cve/CVE-2020-25600/" source="CVE"/>
		<reference ref_id="CVE-2020-25601" ref_url="https://www.suse.com/security/cve/CVE-2020-25601/" source="CVE"/>
		<reference ref_id="CVE-2020-25603" ref_url="https://www.suse.com/security/cve/CVE-2020-25603/" source="CVE"/>
		<reference ref_id="CVE-2020-25604" ref_url="https://www.suse.com/security/cve/CVE-2020-25604/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-0543: Fixed a leak of Special Register Buffer Data Sampling (SRBDS) aka 'CrossTalk' (bsc#1172205,XSA-320)
- CVE-2020-14364: Fixed an out-of-bounds read/write access while processing usb packets (bsc#1175534).
- CVE-2020-15565: Fixed an issue cache write (bsc#1173378,XSA-321).
- CVE-2020-15567: Fixed an issue with non-atomic  modification of live EPT PTE (bsc#1173380,XSA-328)
- CVE-2020-25595: Fixed an issue where PCI passthrough code was reading back hardware registers (bsc#1176344,XSA-337)
- CVE-2020-25596: Fixed a potential denial of service in x86 pv guest kernel via SYSENTER (bsc#1176345,XSA-339)
- CVE-2020-25597: Fixed an issue where a valid event channels may not turn invalid (bsc#1176346,XSA-338)
- CVE-2020-25600: Fixed out of bounds event channels available to 32-bit x86 domains (bsc#1176348,XSA-342)
- CVE-2020-25601: Fixed an issue due to lack of preemption in evtchn_reset() / evtchn_destroy() (bsc#1176350,XSA-344)	  
- CVE-2020-25603: Fixed an issue due to  missing barriers when accessing/allocating an event channel (bsc#1176347,XSA-340)
- CVE-2020-25604: Fixed a race condition when migrating timers between x86 
  HVM vCPU-s (bsc#1176343,XSA-336)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-22"/>
	<updated date="2020-10-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172205">SUSE bug 1172205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173378">SUSE bug 1173378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173380">SUSE bug 1173380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176343">SUSE bug 1176343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176344">SUSE bug 1176344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176345">SUSE bug 1176345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176346">SUSE bug 1176346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176347">SUSE bug 1176347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176348">SUSE bug 1176348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176350">SUSE bug 1176350</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15565/">CVE-2020-15565 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15565">CVE-2020-15565 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15567/">CVE-2020-15567 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15567">CVE-2020-15567 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25595/">CVE-2020-25595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25595">CVE-2020-25595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25596/">CVE-2020-25596 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25596">CVE-2020-25596 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25597/">CVE-2020-25597 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25597">CVE-2020-25597 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25600/">CVE-2020-25600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25600">CVE-2020-25600 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25601/">CVE-2020-25601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25601">CVE-2020-25601 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25603/">CVE-2020-25603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25603">CVE-2020-25603 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25604/">CVE-2020-25604 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25604">CVE-2020-25604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586613" comment="xen-4.4.4_44-61.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586614" comment="xen-doc-html-4.4.4_44-61.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586615" comment="xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586616" comment="xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586617" comment="xen-libs-4.4.4_44-61.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586618" comment="xen-libs-32bit-4.4.4_44-61.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586619" comment="xen-tools-4.4.4_44-61.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586620" comment="xen-tools-domU-4.4.4_44-61.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220528" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1177409" ref_url="https://bugzilla.suse.com/1177409" source="BUGZILLA"/>
		<reference ref_id="1177412" ref_url="https://bugzilla.suse.com/1177412" source="BUGZILLA"/>
		<reference ref_id="1177413" ref_url="https://bugzilla.suse.com/1177413" source="BUGZILLA"/>
		<reference ref_id="1177414" ref_url="https://bugzilla.suse.com/1177414" source="BUGZILLA"/>
		<reference ref_id="1178591" ref_url="https://bugzilla.suse.com/1178591" source="BUGZILLA"/>
		<reference ref_id="1178935" ref_url="https://bugzilla.suse.com/1178935" source="BUGZILLA"/>
		<reference ref_id="1178963" ref_url="https://bugzilla.suse.com/1178963" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-27670" ref_url="https://www.suse.com/security/cve/CVE-2020-27670/" source="CVE"/>
		<reference ref_id="CVE-2020-27671" ref_url="https://www.suse.com/security/cve/CVE-2020-27671/" source="CVE"/>
		<reference ref_id="CVE-2020-27672" ref_url="https://www.suse.com/security/cve/CVE-2020-27672/" source="CVE"/>
		<reference ref_id="CVE-2020-27674" ref_url="https://www.suse.com/security/cve/CVE-2020-27674/" source="CVE"/>
		<reference ref_id="CVE-2020-28368" ref_url="https://www.suse.com/security/cve/CVE-2020-28368/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007936.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- bsc#1178963 - stack corruption from XSA-346 change (XSA-355) 
- bsc#1178935 - CVE-2020-25723: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c
- bsc#1177409 - CVE-2020-27674: x86 PV guest INVLPG-like flushes may leave stale TLB entries (XSA-286)
- bsc#1177412 - CVE-2020-27672: Race condition in Xen mapping code (XSA-345)
- bsc#1177413 - CVE-2020-27671: undue deferral of IOMMU TLB flushes (XSA-346)
- bsc#1177414 - CVE-2020-27670: unsafe AMD IOMMU page table updates (XSA-347)
- bsc#1178591 - CVE-2020-28368: Intel RAPL sidechannel attack aka PLATYPUS attack aka XSA-351
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-08"/>
	<updated date="2020-12-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177409">SUSE bug 1177409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177412">SUSE bug 1177412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177413">SUSE bug 1177413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177414">SUSE bug 1177414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178935">SUSE bug 1178935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178963">SUSE bug 1178963</bugzilla>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25723">CVE-2020-25723 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27670/">CVE-2020-27670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27670">CVE-2020-27670 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27671/">CVE-2020-27671 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27671">CVE-2020-27671 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27672/">CVE-2020-27672 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27672">CVE-2020-27672 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27674/">CVE-2020-27674 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27674">CVE-2020-27674 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28368/">CVE-2020-28368 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28368">CVE-2020-28368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586621" comment="xen-4.4.4_46-61.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586622" comment="xen-doc-html-4.4.4_46-61.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586623" comment="xen-kmp-default-4.4.4_46_3.0.101_108.117-61.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586624" comment="xen-kmp-pae-4.4.4_46_3.0.101_108.117-61.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586625" comment="xen-libs-4.4.4_46-61.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586626" comment="xen-libs-32bit-4.4.4_46-61.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586627" comment="xen-tools-4.4.4_46-61.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586628" comment="xen-tools-domU-4.4.4_46-61.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220529" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1179477" ref_url="https://bugzilla.suse.com/1179477" source="BUGZILLA"/>
		<reference ref_id="1179496" ref_url="https://bugzilla.suse.com/1179496" source="BUGZILLA"/>
		<reference ref_id="1179498" ref_url="https://bugzilla.suse.com/1179498" source="BUGZILLA"/>
		<reference ref_id="1179501" ref_url="https://bugzilla.suse.com/1179501" source="BUGZILLA"/>
		<reference ref_id="1179502" ref_url="https://bugzilla.suse.com/1179502" source="BUGZILLA"/>
		<reference ref_id="1179506" ref_url="https://bugzilla.suse.com/1179506" source="BUGZILLA"/>
		<reference ref_id="1179514" ref_url="https://bugzilla.suse.com/1179514" source="BUGZILLA"/>
		<reference ref_id="1179516" ref_url="https://bugzilla.suse.com/1179516" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29480" ref_url="https://www.suse.com/security/cve/CVE-2020-29480/" source="CVE"/>
		<reference ref_id="CVE-2020-29481" ref_url="https://www.suse.com/security/cve/CVE-2020-29481/" source="CVE"/>
		<reference ref_id="CVE-2020-29483" ref_url="https://www.suse.com/security/cve/CVE-2020-29483/" source="CVE"/>
		<reference ref_id="CVE-2020-29484" ref_url="https://www.suse.com/security/cve/CVE-2020-29484/" source="CVE"/>
		<reference ref_id="CVE-2020-29566" ref_url="https://www.suse.com/security/cve/CVE-2020-29566/" source="CVE"/>
		<reference ref_id="CVE-2020-29570" ref_url="https://www.suse.com/security/cve/CVE-2020-29570/" source="CVE"/>
		<reference ref_id="CVE-2020-29571" ref_url="https://www.suse.com/security/cve/CVE-2020-29571/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-29480: Fixed an issue which could have allowed leak of non-sensitive data to administrator guests (bsc#117949 XSA-115).
- CVE-2020-29481: Fixed an issue which could have allowd to new domains to inherit existing node permissions (bsc#1179498 XSA-322). 
- CVE-2020-29483: Fixed an issue where guests could disturb domain cleanup (bsc#1179502 XSA-325).
- CVE-2020-29484: Fixed an issue where guests could crash xenstored via watchs (bsc#1179501 XSA-324). 
- CVE-2020-29566: Fixed an undue recursion in x86 HVM context switch code (bsc#1179506 XSA-348).
- CVE-2020-29570: Fixed an issue where FIFO event channels control block related ordering (bsc#1179514 XSA-358).
- CVE-2020-29571: Fixed an issue where FIFO event channels control structure ordering (bsc#1179516 XSA-359).
- CVE-2020-29130: Fixed an out-of-bounds access while processing ARP packets (bsc#1179477). 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-16"/>
	<updated date="2020-12-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179496">SUSE bug 1179496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179498">SUSE bug 1179498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179501">SUSE bug 1179501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179502">SUSE bug 1179502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179506">SUSE bug 1179506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179514">SUSE bug 1179514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179516">SUSE bug 1179516</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29130">CVE-2020-29130 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29480/">CVE-2020-29480 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29480">CVE-2020-29480 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29481/">CVE-2020-29481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29481">CVE-2020-29481 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29483/">CVE-2020-29483 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29483">CVE-2020-29483 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29484/">CVE-2020-29484 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29484">CVE-2020-29484 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29566/">CVE-2020-29566 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29566">CVE-2020-29566 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29570/">CVE-2020-29570 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29570">CVE-2020-29570 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29571/">CVE-2020-29571 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29571">CVE-2020-29571 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586629" comment="xen-4.4.4_48-61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586630" comment="xen-doc-html-4.4.4_48-61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586631" comment="xen-kmp-default-4.4.4_48_3.0.101_108.117-61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586632" comment="xen-kmp-pae-4.4.4_48_3.0.101_108.117-61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586633" comment="xen-libs-4.4.4_48-61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586634" comment="xen-libs-32bit-4.4.4_48-61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586635" comment="xen-tools-4.4.4_48-61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586636" comment="xen-tools-domU-4.4.4_48-61.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220530" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1182155" ref_url="https://bugzilla.suse.com/1182155" source="BUGZILLA"/>
		<reference ref_id="1182846" ref_url="https://bugzilla.suse.com/1182846" source="BUGZILLA"/>
		<reference ref_id="1182975" ref_url="https://bugzilla.suse.com/1182975" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-3419" ref_url="https://www.suse.com/security/cve/CVE-2021-3419/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008656.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-3419: Fixed a stack overflow induced by infinite recursion issue (bsc#1182975).
- CVE-2021-20257: Fixed an infinite loop in the e1000 NIC emulator (bsc#1182846)
- xenstored crashing with segfault (bsc#1182155).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-19"/>
	<updated date="2021-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182155">SUSE bug 1182155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182846">SUSE bug 1182846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182975">SUSE bug 1182975</bugzilla>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3419/">CVE-2021-3419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3419">CVE-2021-3419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586637" comment="xen-4.4.4_48-61.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586638" comment="xen-doc-html-4.4.4_48-61.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586639" comment="xen-kmp-default-4.4.4_48_3.0.101_108.123-61.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586640" comment="xen-kmp-pae-4.4.4_48_3.0.101_108.123-61.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586641" comment="xen-libs-4.4.4_48-61.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586642" comment="xen-libs-32bit-4.4.4_48-61.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586643" comment="xen-tools-4.4.4_48-61.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586644" comment="xen-tools-domU-4.4.4_48-61.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220531" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1182654" ref_url="https://bugzilla.suse.com/1182654" source="BUGZILLA"/>
		<reference ref_id="1186013" ref_url="https://bugzilla.suse.com/1186013" source="BUGZILLA"/>
		<reference ref_id="1186429" ref_url="https://bugzilla.suse.com/1186429" source="BUGZILLA"/>
		<reference ref_id="1186433" ref_url="https://bugzilla.suse.com/1186433" source="BUGZILLA"/>
		<reference ref_id="1186434" ref_url="https://bugzilla.suse.com/1186434" source="BUGZILLA"/>
		<reference ref_id="1187369" ref_url="https://bugzilla.suse.com/1187369" source="BUGZILLA"/>
		<reference ref_id="1187376" ref_url="https://bugzilla.suse.com/1187376" source="BUGZILLA"/>
		<reference ref_id="1187378" ref_url="https://bugzilla.suse.com/1187378" source="BUGZILLA"/>
		<reference ref_id="1189150" ref_url="https://bugzilla.suse.com/1189150" source="BUGZILLA"/>
		<reference ref_id="1189376" ref_url="https://bugzilla.suse.com/1189376" source="BUGZILLA"/>
		<reference ref_id="1189378" ref_url="https://bugzilla.suse.com/1189378" source="BUGZILLA"/>
		<reference ref_id="1189632" ref_url="https://bugzilla.suse.com/1189632" source="BUGZILLA"/>
		<reference ref_id="1192526" ref_url="https://bugzilla.suse.com/1192526" source="BUGZILLA"/>
		<reference ref_id="1192554" ref_url="https://bugzilla.suse.com/1192554" source="BUGZILLA"/>
		<reference ref_id="1192555" ref_url="https://bugzilla.suse.com/1192555" source="BUGZILLA"/>
		<reference ref_id="1192559" ref_url="https://bugzilla.suse.com/1192559" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0089" ref_url="https://www.suse.com/security/cve/CVE-2021-0089/" source="CVE"/>
		<reference ref_id="CVE-2021-20255" ref_url="https://www.suse.com/security/cve/CVE-2021-20255/" source="CVE"/>
		<reference ref_id="CVE-2021-28690" ref_url="https://www.suse.com/security/cve/CVE-2021-28690/" source="CVE"/>
		<reference ref_id="CVE-2021-28692" ref_url="https://www.suse.com/security/cve/CVE-2021-28692/" source="CVE"/>
		<reference ref_id="CVE-2021-28697" ref_url="https://www.suse.com/security/cve/CVE-2021-28697/" source="CVE"/>
		<reference ref_id="CVE-2021-28698" ref_url="https://www.suse.com/security/cve/CVE-2021-28698/" source="CVE"/>
		<reference ref_id="CVE-2021-28701" ref_url="https://www.suse.com/security/cve/CVE-2021-28701/" source="CVE"/>
		<reference ref_id="CVE-2021-28703" ref_url="https://www.suse.com/security/cve/CVE-2021-28703/" source="CVE"/>
		<reference ref_id="CVE-2021-28705" ref_url="https://www.suse.com/security/cve/CVE-2021-28705/" source="CVE"/>
		<reference ref_id="CVE-2021-28706" ref_url="https://www.suse.com/security/cve/CVE-2021-28706/" source="CVE"/>
		<reference ref_id="CVE-2021-28709" ref_url="https://www.suse.com/security/cve/CVE-2021-28709/" source="CVE"/>
		<reference ref_id="CVE-2021-3527" ref_url="https://www.suse.com/security/cve/CVE-2021-3527/" source="CVE"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="CVE-2021-3595" ref_url="https://www.suse.com/security/cve/CVE-2021-3595/" source="CVE"/>
		<reference ref_id="CVE-2021-3682" ref_url="https://www.suse.com/security/cve/CVE-2021-3682/" source="CVE"/>
		<reference ref_id="CVE-2021-3930" ref_url="https://www.suse.com/security/cve/CVE-2021-3930/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-0089: Fixed Speculative Code Store Bypass (XSA-375) (bsc#1186433).
- CVE-2021-20255: Fixed stack overflow via infinite recursion in eepro100 (bsc#1182654).
- CVE-2021-28690: Fixed x86 TSX Async Abort protections not restored after S3 (XSA-377) (bsc#1186434).
- CVE-2021-28692: Fixed inappropriate x86 IOMMU timeout detection / handling (XSA-373) (bsc#1186429).
- CVE-2021-28697: Fixed grant table v2 status pages may remain accessible after de-allocation (XSA-379) (bsc#1189376).
- CVE-2021-28698: Fixed long running loops in grant table handling. (XSA-380) (bsc#1189378).
- CVE-2021-28701: Fixed race condition in XENMAPSPACE_grant_table handling (XSA-384) (bsc#1189632).
- CVE-2021-28703: Fixed grant table v2 status pages may remain accessible after de-allocation (take two) (XSA-387) (bsc#1192555).
- CVE-2021-28705, CVE-2021-28709: Fixed issues with partially successful P2M updates on x86 (XSA-389) (bsc#1192559).
- CVE-2021-28706: Fixed guests may exceed their designated memory limit (XSA-385) (bsc#1192554).
- CVE-2021-3527: Fixed unbounded stack allocation in usbredir (bsc#1186013).
- CVE-2021-3592: Fixed invalid pointer initialization may lead to information disclosure in slirp (bootp) (bsc#1187369).
- CVE-2021-3594: Fixed invalid pointer initialization may lead to information disclosure in slirp (udp) (bsc#1187378).
- CVE-2021-3595: Fixed invalid pointer initialization may lead to information disclosure in slirp (tftp) (bsc#1187376).
- CVE-2021-3682: Fixed free call on invalid pointer in usbredir bufp_alloc (bsc#1189150).
- CVE-2021-3930: Fixed off-by-one error in mode_sense_page() in hw/scsi/scsi-disk.c (bsc#1192526).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182654">SUSE bug 1182654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186013">SUSE bug 1186013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186429">SUSE bug 1186429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186433">SUSE bug 1186433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186434">SUSE bug 1186434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187369">SUSE bug 1187369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187376">SUSE bug 1187376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187378">SUSE bug 1187378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189150">SUSE bug 1189150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189376">SUSE bug 1189376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189378">SUSE bug 1189378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189632">SUSE bug 1189632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192526">SUSE bug 1192526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192554">SUSE bug 1192554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192555">SUSE bug 1192555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192559">SUSE bug 1192559</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0089/">CVE-2021-0089 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0089">CVE-2021-0089 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20255/">CVE-2021-20255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20255">CVE-2021-20255 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28690/">CVE-2021-28690 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28690">CVE-2021-28690 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-28692/">CVE-2021-28692 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28692">CVE-2021-28692 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28697/">CVE-2021-28697 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28697">CVE-2021-28697 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28698/">CVE-2021-28698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28698">CVE-2021-28698 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28701/">CVE-2021-28701 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28701">CVE-2021-28701 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28703/">CVE-2021-28703 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28703">CVE-2021-28703 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28705/">CVE-2021-28705 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28705">CVE-2021-28705 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28706/">CVE-2021-28706 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28706">CVE-2021-28706 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28709/">CVE-2021-28709 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28709">CVE-2021-28709 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3527/">CVE-2021-3527 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3527">CVE-2021-3527 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3592">CVE-2021-3592 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3594">CVE-2021-3594 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3595/">CVE-2021-3595 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3595">CVE-2021-3595 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3682/">CVE-2021-3682 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3682">CVE-2021-3682 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3930/">CVE-2021-3930 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3930">CVE-2021-3930 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658848" comment="xen-4.4.4_50-61.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658849" comment="xen-doc-html-4.4.4_50-61.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658850" comment="xen-kmp-default-4.4.4_50_3.0.101_108.129-61.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658851" comment="xen-kmp-pae-4.4.4_50_3.0.101_108.129-61.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658852" comment="xen-libs-4.4.4_50-61.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658853" comment="xen-libs-32bit-4.4.4_50-61.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658854" comment="xen-tools-4.4.4_50-61.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658855" comment="xen-tools-domU-4.4.4_50-61.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220532" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1194581" ref_url="https://bugzilla.suse.com/1194581" source="BUGZILLA"/>
		<reference ref_id="1194588" ref_url="https://bugzilla.suse.com/1194588" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23034" ref_url="https://www.suse.com/security/cve/CVE-2022-23034/" source="CVE"/>
		<reference ref_id="CVE-2022-23035" ref_url="https://www.suse.com/security/cve/CVE-2022-23035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010240.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-23034: Fixed possible DoS by a PV guest Xen while unmapping a grant. (XSA-394) (bsc#1194581)
- CVE-2022-23035: Fixed insufficient cleanup of passed-through device IRQs. (XSA-395) (bsc#1194588)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194581">SUSE bug 1194581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194588">SUSE bug 1194588</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23034/">CVE-2022-23034 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23034">CVE-2022-23034 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23035/">CVE-2022-23035 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23035">CVE-2022-23035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666470" comment="xen-4.4.4_52-61.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666471" comment="xen-doc-html-4.4.4_52-61.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666472" comment="xen-kmp-default-4.4.4_52_3.0.101_108.132-61.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666473" comment="xen-kmp-pae-4.4.4_52_3.0.101_108.132-61.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666474" comment="xen-libs-4.4.4_52-61.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666475" comment="xen-libs-32bit-4.4.4_52-61.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666476" comment="xen-tools-4.4.4_52-61.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666477" comment="xen-tools-domU-4.4.4_52-61.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220533" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="947165" ref_url="https://bugzilla.suse.com/947165" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950704" ref_url="https://bugzilla.suse.com/950704" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="951845" ref_url="https://bugzilla.suse.com/951845" source="BUGZILLA"/>
		<reference ref_id="954018" ref_url="https://bugzilla.suse.com/954018" source="BUGZILLA"/>
		<reference ref_id="954405" ref_url="https://bugzilla.suse.com/954405" source="BUGZILLA"/>
		<reference ref_id="955399" ref_url="https://bugzilla.suse.com/955399" source="BUGZILLA"/>
		<reference ref_id="956408" ref_url="https://bugzilla.suse.com/956408" source="BUGZILLA"/>
		<reference ref_id="956409" ref_url="https://bugzilla.suse.com/956409" source="BUGZILLA"/>
		<reference ref_id="956411" ref_url="https://bugzilla.suse.com/956411" source="BUGZILLA"/>
		<reference ref_id="956592" ref_url="https://bugzilla.suse.com/956592" source="BUGZILLA"/>
		<reference ref_id="956832" ref_url="https://bugzilla.suse.com/956832" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340/" source="CVE"/>
		<reference ref_id="CVE-2015-8341" ref_url="https://www.suse.com/security/cve/CVE-2015-8341/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<description>

      This update fixes the following security issues:

- bsc#955399 -  Fix xm migrate --log_progress.
  Due to logic error progress was not logged when requested.

- bsc#956832 -  CVE-2015-8345: xen: qemu: net: eepro100:
  infinite loop in processing command block list

- bsc#956592 -  xen: virtual PMU is unsupported (XSA-163)

- bsc#956408 -  CVE-2015-8339, CVE-2015-8340: xen:
  XENMEM_exchange error handling issues (XSA-159)

- bsc#956409 -  CVE-2015-8341: xen: libxl leak of pv kernel
  and initrd on error (XSA-160)

- bsc#956411 -  CVE-2015-7504: xen: heap buffer overflow
  vulnerability in pcnet emulator (XSA-162)

- bsc#947165 -  CVE-2015-7311: xen: libxl fails to honour
  readonly flag on disks with qemu-xen (xsa-142)

- bsc#955399 -  Fix xm migrate --live.  The options were not passed
  due to a merge error. As a result the migration was not live,
  instead the suspended guest was migrated.

- bsc#954405 -  CVE-2015-8104: Xen: guest to host DoS by
  triggering an infinite loop in microcode via #DB exception

- bsc#954018 -  CVE-2015-5307: xen: x86: CPU lockup during
  fault delivery (XSA-156)


- bsc#950704 -  CVE-2015-7970: xen: x86: Long latency
  populate-on-demand operation is not preemptible (XSA-150)

- bsc#951845 -  CVE-2015-7972: xen: x86: populate-on-demand
  balloon size inaccuracy can crash guests (XSA-153)

- Drop 5604f239-x86-PV-properly-populate-descriptor-tables.patch

- bsc#950703 -  CVE-2015-7969: xen: leak of main per-domain
  vcpu pointer array (DoS) (XSA-149)

- bsc#950705 -  CVE-2015-7969: xen: x86: leak of per-domain
  profiling-related vcpu pointer array (DoS) (XSA-151)

- bsc#950706 -  CVE-2015-7971: xen: x86: some pmu and
  profiling hypercalls log without rate limiting (XSA-152)		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-22"/>
	<updated date="2015-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/947165">SUSE bug 947165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950704">SUSE bug 950704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951845">SUSE bug 951845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954018">SUSE bug 954018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955399">SUSE bug 955399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956409">SUSE bug 956409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956411">SUSE bug 956411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956592">SUSE bug 956592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956832">SUSE bug 956832</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5307">CVE-2015-5307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7311">CVE-2015-7311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7504">CVE-2015-7504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7835">CVE-2015-7835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7969">CVE-2015-7969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7970">CVE-2015-7970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7971">CVE-2015-7971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7972">CVE-2015-7972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8104">CVE-2015-8104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8339">CVE-2015-8339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8340">CVE-2015-8340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8341/">CVE-2015-8341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8341">CVE-2015-8341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8345">CVE-2015-8345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567475" comment="xen-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567476" comment="xen-doc-html-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567477" comment="xen-kmp-default-4.4.3_06_3.0.101_65-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567478" comment="xen-kmp-pae-4.4.3_06_3.0.101_65-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567479" comment="xen-libs-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567480" comment="xen-libs-32bit-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567481" comment="xen-tools-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567482" comment="xen-tools-domU-4.4.3_06-29.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567475" comment="xen-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567476" comment="xen-doc-html-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567477" comment="xen-kmp-default-4.4.3_06_3.0.101_65-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567478" comment="xen-kmp-pae-4.4.3_06_3.0.101_65-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567479" comment="xen-libs-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567480" comment="xen-libs-32bit-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567481" comment="xen-tools-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567482" comment="xen-tools-domU-4.4.3_06-29.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220534" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1047536" ref_url="https://bugzilla.suse.com/1047536" source="BUGZILLA"/>
		<reference ref_id="814241" ref_url="https://bugzilla.suse.com/814241" source="BUGZILLA"/>
		<reference ref_id="879138" ref_url="https://bugzilla.suse.com/879138" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003302.html" source="SUSE-SU"/>
		<description>
xerces-j2 was updated to fix several issues.

This security issue was fixed:

- bsc#814241: Prevent possible DoS through very long attribute names

This non-security issue was fixed:

- Prevent StackOverflowError when applying a pattern restriction on long strings
  while trying to validate an XML file against a schema (bsc#1047536, bsc#879138)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-17"/>
	<updated date="2017-10-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047536">SUSE bug 1047536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814241">SUSE bug 814241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879138">SUSE bug 879138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575659" comment="xerces-j2-2.8.1-238.29.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565556" comment="xerces-j2-xml-apis-2.8.1-238.29.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565557" comment="xerces-j2-xml-resolver-2.8.1-238.29.5.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575659" comment="xerces-j2-2.8.1-238.29.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565556" comment="xerces-j2-xml-apis-2.8.1-238.29.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565557" comment="xerces-j2-xml-resolver-2.8.1-238.29.5.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220535" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1195108" ref_url="https://bugzilla.suse.com/1195108" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010256.html" source="SUSE-SU"/>
		<description>
This update for xerces-j2 fixes the following issues:

- CVE-2022-23437: Fixed infinite loop within Apache XercesJ xml parser (bsc#1195108).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195108">SUSE bug 1195108</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23437">CVE-2022-23437 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667942" comment="xerces-j2-2.8.1-238.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667943" comment="xerces-j2-xml-apis-2.8.1-238.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667944" comment="xerces-j2-xml-resolver-2.8.1-238.29.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220536" version="1" class="patch">
	<metadata>
		<title>Security update for xfsprogs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="911866" ref_url="https://bugzilla.suse.com/911866" source="BUGZILLA"/>
		<reference ref_id="939367" ref_url="https://bugzilla.suse.com/939367" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2150" ref_url="https://www.suse.com/security/cve/CVE-2012-2150/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001764.html" source="SUSE-SU"/>
		<description>
xfsprogs was updated to fix one security vulnerability and several bugs.

- Handle unwanted data disclosure in xfs_metadump (bsc#939367, CVE-2012-2150)
- Fix segfault during xfs_repair run (bsc#911866)
- Fix definition of leaf attribute block to avoid gcc optimization xfsprogs-fix-leaf-block-definition
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-28"/>
	<updated date="2015-12-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/911866">SUSE bug 911866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939367">SUSE bug 939367</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2150/">CVE-2012-2150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2150">CVE-2012-2150 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581773" comment="xfsprogs-3.1.8-0.7.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581773" comment="xfsprogs-3.1.8-0.7.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220537" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libICE (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1025068" ref_url="https://bugzilla.suse.com/1025068" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2626" ref_url="https://www.suse.com/security/cve/CVE-2017-2626/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003026.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-libICE fixes the following issues:

- CVE-2017-2626: Creation of the ICE auth session cookies used insufficient randomness, making these cookies
  predictable. A more random generation method has been implemented. (boo#1025068)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-12"/>
	<updated date="2017-07-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025068">SUSE bug 1025068</bugzilla>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-2626/">CVE-2017-2626 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2626">CVE-2017-2626 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586645" comment="xorg-x11-libICE-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586646" comment="xorg-x11-libICE-32bit-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586647" comment="xorg-x11-libICE-x86-7.4-3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586645" comment="xorg-x11-libICE-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586646" comment="xorg-x11-libICE-32bit-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586647" comment="xorg-x11-libICE-x86-7.4-3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220538" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="927220" ref_url="https://bugzilla.suse.com/927220" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7439" ref_url="https://www.suse.com/security/cve/CVE-2013-7439/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001521.html" source="SUSE-SU"/>
		<description>
xorg-x11-libX11 was updated to fix one security issue.

This security issue was fixed:
- CVE-2013-7439: Multiple off-by-one errors in the (1) MakeBigReq and (2) SetReqLen macros in include/X11/Xlibint.h in X11R6.x and libX11 before 1.6.0 allowed remote attackers to have unspecified impact via a crafted request, which triggered a buffer overflow (bsc#927220).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-17"/>
	<updated date="2015-07-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/927220">SUSE bug 927220</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7439/">CVE-2013-7439 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7439">CVE-2013-7439 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581778" comment="xorg-x11-libX11-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581779" comment="xorg-x11-libX11-32bit-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581780" comment="xorg-x11-libX11-x86-7.4-5.11.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581778" comment="xorg-x11-libX11-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581779" comment="xorg-x11-libX11-32bit-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581780" comment="xorg-x11-libX11-x86-7.4-5.11.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220539" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1002991" ref_url="https://bugzilla.suse.com/1002991" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7942" ref_url="https://www.suse.com/security/cve/CVE-2016-7942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002455.html" source="SUSE-SU"/>
		<description>

This update for xorg-x11-libX11 fixes the following issues:

  - plug a memory leak (bsc#1002991, CVE-2016-7942)
  - insufficient validation of data from the X server can cause
    out of boundary memory read (XGetImage()) or write (XListFonts())
    (bsc#1002991, CVE-2016-7942)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-08"/>
	<updated date="2016-12-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002991">SUSE bug 1002991</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7942/">CVE-2016-7942 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7942">CVE-2016-7942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586648" comment="xorg-x11-libX11-7.4-5.11.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586649" comment="xorg-x11-libX11-32bit-7.4-5.11.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586650" comment="xorg-x11-libX11-x86-7.4-5.11.65.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586648" comment="xorg-x11-libX11-7.4-5.11.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586649" comment="xorg-x11-libX11-32bit-7.4-5.11.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586650" comment="xorg-x11-libX11-x86-7.4-5.11.65.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220540" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1019642" ref_url="https://bugzilla.suse.com/1019642" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002689.html" source="SUSE-SU"/>
		<description>

This update for xorg-x11-libX11 fixes the following issues:

- a regression introduced by the security fix for CVE-2013-1997
  (bnc#824294). Keyboard mappings for special characters on Non-English
  keyboards might have been broken. (bnc#1019642)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-09"/>
	<updated date="2017-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1019642">SUSE bug 1019642</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1997">CVE-2013-1997 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586651" comment="xorg-x11-libX11-7.4-5.11.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586652" comment="xorg-x11-libX11-32bit-7.4-5.11.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586653" comment="xorg-x11-libX11-x86-7.4-5.11.68.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586651" comment="xorg-x11-libX11-7.4-5.11.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586652" comment="xorg-x11-libX11-32bit-7.4-5.11.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586653" comment="xorg-x11-libX11-x86-7.4-5.11.68.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220541" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1102062" ref_url="https://bugzilla.suse.com/1102062" source="BUGZILLA"/>
		<reference ref_id="1102068" ref_url="https://bugzilla.suse.com/1102068" source="BUGZILLA"/>
		<reference ref_id="1102073" ref_url="https://bugzilla.suse.com/1102073" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14598" ref_url="https://www.suse.com/security/cve/CVE-2018-14598/" source="CVE"/>
		<reference ref_id="CVE-2018-14599" ref_url="https://www.suse.com/security/cve/CVE-2018-14599/" source="CVE"/>
		<reference ref_id="CVE-2018-14600" ref_url="https://www.suse.com/security/cve/CVE-2018-14600/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004622.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- CVE-2018-14599: The function XListExtensions was vulnerable to an off-by-one
  error caused by malicious server responses, leading to DoS or possibly
  unspecified other impact (bsc#1102062)
- CVE-2018-14600: The function XListExtensions interpreted a variable as signed
  instead of unsigned, resulting in an out-of-bounds write (of up to 128 bytes),
  leading to DoS or remote code execution (bsc#1102068)
- CVE-2018-14598: A malicious server could have sent a reply in which the first
  string overflows, causing a variable to be set to NULL that will be freed later
  on, leading to DoS (segmentation fault) (bsc#1102073)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-28"/>
	<updated date="2018-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1102062">SUSE bug 1102062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102068">SUSE bug 1102068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102073">SUSE bug 1102073</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14598/">CVE-2018-14598 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14598">CVE-2018-14598 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14599/">CVE-2018-14599 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14599">CVE-2018-14599 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14600/">CVE-2018-14600 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14600">CVE-2018-14600 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586654" comment="xorg-x11-libX11-7.4-5.11.72.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586655" comment="xorg-x11-libX11-32bit-7.4-5.11.72.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586656" comment="xorg-x11-libX11-x86-7.4-5.11.72.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586654" comment="xorg-x11-libX11-7.4-5.11.72.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586655" comment="xorg-x11-libX11-32bit-7.4-5.11.72.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586656" comment="xorg-x11-libX11-x86-7.4-5.11.72.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220542" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007226.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-05"/>
	<updated date="2020-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14344">CVE-2020-14344 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586657" comment="xorg-x11-libX11-7.4-5.11.72.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586658" comment="xorg-x11-libX11-32bit-7.4-5.11.72.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220543" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007247.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-11"/>
	<updated date="2020-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14344">CVE-2020-14344 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586659" comment="xorg-x11-libX11-7.4-5.11.72.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586660" comment="xorg-x11-libX11-32bit-7.4-5.11.72.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220544" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1186643" ref_url="https://bugzilla.suse.com/1186643" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009017.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- Regression in the fix for CVE-2021-31535, causing segfaults for xforms applications like fdesign (bsc#1186643).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-15"/>
	<updated date="2021-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186643">SUSE bug 1186643</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31535">CVE-2021-31535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586661" comment="xorg-x11-libX11-7.4-5.11.72.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586662" comment="xorg-x11-libX11-32bit-7.4-5.11.72.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220545" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXdmcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1025046" ref_url="https://bugzilla.suse.com/1025046" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2625" ref_url="https://www.suse.com/security/cve/CVE-2017-2625/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003035.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-libXdmcp fixes the following issues:

- CVE-2017-2625: The generation of session key in XDM using libXdmcp might have used weak entropy, making
  the session keys predictable (bsc#1025046)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-14"/>
	<updated date="2017-07-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025046">SUSE bug 1025046</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2625/">CVE-2017-2625 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2625">CVE-2017-2625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586663" comment="xorg-x11-libXdmcp-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586664" comment="xorg-x11-libXdmcp-32bit-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586665" comment="xorg-x11-libXdmcp-x86-7.4-3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586663" comment="xorg-x11-libXdmcp-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586664" comment="xorg-x11-libXdmcp-32bit-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586665" comment="xorg-x11-libXdmcp-x86-7.4-3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220546" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXfixes (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1002995" ref_url="https://bugzilla.suse.com/1002995" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7944" ref_url="https://www.suse.com/security/cve/CVE-2016-7944/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002491.html" source="SUSE-SU"/>
		<description>

This update for xorg-x11-libXfixes fixes the following issues:

  - insufficient validation of data from the X server can cause an
    integer overflow on 32 bit architectures (bsc#1002995, CVE-2016-7944)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-16"/>
	<updated date="2016-12-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002995">SUSE bug 1002995</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7944/">CVE-2016-7944 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7944">CVE-2016-7944 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586666" comment="xorg-x11-libXfixes-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586667" comment="xorg-x11-libXfixes-32bit-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586668" comment="xorg-x11-libXfixes-x86-7.4-1.20.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586666" comment="xorg-x11-libXfixes-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586667" comment="xorg-x11-libXfixes-32bit-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586668" comment="xorg-x11-libXfixes-x86-7.4-1.20.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220547" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXpm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1021315" ref_url="https://bugzilla.suse.com/1021315" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10164" ref_url="https://www.suse.com/security/cve/CVE-2016-10164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002646.html" source="SUSE-SU"/>
		<description>

This update for xorg-x11-libXpm fixes the following security issue:

- A heap overflow in XPM handling could be used by attackers supplying
  XPM files to  crash or potentially execute code. (bsc#1021315)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1021315">SUSE bug 1021315</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10164/">CVE-2016-10164 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10164">CVE-2016-10164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586669" comment="xorg-x11-libXpm-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586670" comment="xorg-x11-libXpm-32bit-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586671" comment="xorg-x11-libXpm-x86-7.4-3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586669" comment="xorg-x11-libXpm-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586670" comment="xorg-x11-libXpm-32bit-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586671" comment="xorg-x11-libXpm-x86-7.4-3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220548" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXrender (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1003002" ref_url="https://bugzilla.suse.com/1003002" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7949" ref_url="https://www.suse.com/security/cve/CVE-2016-7949/" source="CVE"/>
		<reference ref_id="CVE-2016-7950" ref_url="https://www.suse.com/security/cve/CVE-2016-7950/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002481.html" source="SUSE-SU"/>
		<description>

This update for xorg-x11-libXrender fixes the following issues:

  - insufficient validation of data from the X server can cause out
    of boundary memory writes (bsc#1003002, CVE-2016-7949, CVE-2016-7950)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-13"/>
	<updated date="2016-12-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003002">SUSE bug 1003002</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7949/">CVE-2016-7949 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7949">CVE-2016-7949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7950/">CVE-2016-7950 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7950">CVE-2016-7950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586672" comment="xorg-x11-libXrender-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586673" comment="xorg-x11-libXrender-32bit-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586674" comment="xorg-x11-libXrender-x86-7.4-1.20.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586672" comment="xorg-x11-libXrender-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586673" comment="xorg-x11-libXrender-32bit-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586674" comment="xorg-x11-libXrender-x86-7.4-1.20.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220549" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXv (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1003017" ref_url="https://bugzilla.suse.com/1003017" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5407" ref_url="https://www.suse.com/security/cve/CVE-2016-5407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002477.html" source="SUSE-SU"/>
		<description>

This update for xorg-x11-libXv fixes the following issues:

  - insufficient validation of data from the X server can cause
    memory corruption (bsc#1003017, CVE-2016-5407)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-13"/>
	<updated date="2016-12-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003017">SUSE bug 1003017</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5407/">CVE-2016-5407 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5407">CVE-2016-5407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586675" comment="xorg-x11-libXv-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586676" comment="xorg-x11-libXv-32bit-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586677" comment="xorg-x11-libXv-x86-7.4-1.20.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586675" comment="xorg-x11-libXv-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586676" comment="xorg-x11-libXv-32bit-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586677" comment="xorg-x11-libXv-x86-7.4-1.20.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220550" version="1" class="patch">
	<metadata>
		<title>Recommended update for xorg-x11-libs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="958383" ref_url="https://bugzilla.suse.com/958383" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1804" ref_url="https://www.suse.com/security/cve/CVE-2015-1804/" source="CVE"/>
		<reference ref_id="SUSE-RU-2015:2393-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-December/003924.html" source="SUSE-SU"/>
		<description>

This update for xorg-x11-libs fixes the following issues: 

- The original fix for CVE-2015-1804 prevented DWIDTH to be negative. However, the
  spec states that 'DWIDTH [...] is a vector indicating the position of the next
  glyph's origin relative to the origin of this glyph'. Consequently, negative 
  DWIDTH values should be allowed. (bsc#958383)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-29"/>
	<updated date="2015-12-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958383">SUSE bug 958383</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1804/">CVE-2015-1804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1804">CVE-2015-1804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009593935" comment="xorg-x11-libs-7.4-8.26.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593936" comment="xorg-x11-libs-32bit-7.4-8.26.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593937" comment="xorg-x11-libs-x86-7.4-8.26.46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009593935" comment="xorg-x11-libs-7.4-8.26.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593936" comment="xorg-x11-libs-32bit-7.4-8.26.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593937" comment="xorg-x11-libs-x86-7.4-8.26.46.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220551" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1002998" ref_url="https://bugzilla.suse.com/1002998" source="BUGZILLA"/>
		<reference ref_id="1003000" ref_url="https://bugzilla.suse.com/1003000" source="BUGZILLA"/>
		<reference ref_id="1003012" ref_url="https://bugzilla.suse.com/1003012" source="BUGZILLA"/>
		<reference ref_id="1003023" ref_url="https://bugzilla.suse.com/1003023" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7945" ref_url="https://www.suse.com/security/cve/CVE-2016-7945/" source="CVE"/>
		<reference ref_id="CVE-2016-7946" ref_url="https://www.suse.com/security/cve/CVE-2016-7946/" source="CVE"/>
		<reference ref_id="CVE-2016-7947" ref_url="https://www.suse.com/security/cve/CVE-2016-7947/" source="CVE"/>
		<reference ref_id="CVE-2016-7948" ref_url="https://www.suse.com/security/cve/CVE-2016-7948/" source="CVE"/>
		<reference ref_id="CVE-2016-7951" ref_url="https://www.suse.com/security/cve/CVE-2016-7951/" source="CVE"/>
		<reference ref_id="CVE-2016-7952" ref_url="https://www.suse.com/security/cve/CVE-2016-7952/" source="CVE"/>
		<reference ref_id="CVE-2016-7953" ref_url="https://www.suse.com/security/cve/CVE-2016-7953/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002495.html" source="SUSE-SU"/>
		<description>

This update for xorg-x11-libs fixes the following issues:

  - insufficient validation of data from the X server can cause a
    one byte buffer read underrun (bsc#1003023, CVE-2016-7953)
  - insufficient validation of data from the X server can cause out
    of boundary memory access or endless loops (Denial of Service)
    (bsc#1003012, CVE-2016-7951, CVE-2016-7952)
  - insufficient validation of data from the X server can cause out
    of boundary memory writes (bsc#1003000, CVE-2016-7947, CVE-2016-7948)
  - insufficient validation of data from the X server can cause out
    of boundary memory access or endless loops (Denial of Service).
    (bsc#1002998, CVE-2016-7945, CVE-2016-7946)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-16"/>
	<updated date="2016-12-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002998">SUSE bug 1002998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003000">SUSE bug 1003000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003012">SUSE bug 1003012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003023">SUSE bug 1003023</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7945/">CVE-2016-7945 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7945">CVE-2016-7945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7946/">CVE-2016-7946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7946">CVE-2016-7946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7947/">CVE-2016-7947 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7947">CVE-2016-7947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7948/">CVE-2016-7948 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7948">CVE-2016-7948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7951/">CVE-2016-7951 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7951">CVE-2016-7951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7952/">CVE-2016-7952 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7952">CVE-2016-7952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7953/">CVE-2016-7953 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7953">CVE-2016-7953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586678" comment="xorg-x11-libs-7.4-8.26.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586679" comment="xorg-x11-libs-32bit-7.4-8.26.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586680" comment="xorg-x11-libs-x86-7.4-8.26.49.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586678" comment="xorg-x11-libs-7.4-8.26.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586679" comment="xorg-x11-libs-32bit-7.4-8.26.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586680" comment="xorg-x11-libs-x86-7.4-8.26.49.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220552" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1049692" ref_url="https://bugzilla.suse.com/1049692" source="BUGZILLA"/>
		<reference ref_id="1050459" ref_url="https://bugzilla.suse.com/1050459" source="BUGZILLA"/>
		<reference ref_id="1054285" ref_url="https://bugzilla.suse.com/1054285" source="BUGZILLA"/>
		<reference ref_id="1065386" ref_url="https://bugzilla.suse.com/1065386" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13720" ref_url="https://www.suse.com/security/cve/CVE-2017-13720/" source="CVE"/>
		<reference ref_id="CVE-2017-13722" ref_url="https://www.suse.com/security/cve/CVE-2017-13722/" source="CVE"/>
		<reference ref_id="CVE-2017-16612" ref_url="https://www.suse.com/security/cve/CVE-2017-16612/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003648.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-libs fixes several issues.

These security issues were fixed:

- CVE-2017-16612: Heap overflows due to an integer overflow while parsing images and a signedness issue while parsing comments (bsc#1065386).
- CVE-2017-13720: Improper check for end of string in PatterMatch caused invalid reads (bsc#1054285)
- CVE-2017-13722: Malformed PCF file could have caused DoS or leak information (bsc#1049692)
- Prevent the X server from accessing arbitrary files as root. It is not possible to leak information, but special files can be touched allowing for causing side effects (bsc#1050459)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049692">SUSE bug 1049692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050459">SUSE bug 1050459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054285">SUSE bug 1054285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065386">SUSE bug 1065386</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-13720/">CVE-2017-13720 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13720">CVE-2017-13720 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13722/">CVE-2017-13722 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13722">CVE-2017-13722 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16612/">CVE-2017-16612 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16612">CVE-2017-16612 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586681" comment="xorg-x11-libs-7.4-8.26.50.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586682" comment="xorg-x11-libs-32bit-7.4-8.26.50.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586683" comment="xorg-x11-libs-x86-7.4-8.26.50.5.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586681" comment="xorg-x11-libs-7.4-8.26.50.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586682" comment="xorg-x11-libs-32bit-7.4-8.26.50.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586683" comment="xorg-x11-libs-x86-7.4-8.26.50.5.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220553" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1103511" ref_url="https://bugzilla.suse.com/1103511" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9262" ref_url="https://www.suse.com/security/cve/CVE-2015-9262/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004579.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-libs fixes the following security issue:

- CVE-2015-9262: _XcursorThemeInherits allowed remote attackers to cause denial
  of service or potentially code execution via a one-byte heap overflow
  (bsc#1103511)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-21"/>
	<updated date="2018-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103511">SUSE bug 1103511</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-9262/">CVE-2015-9262 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9262">CVE-2015-9262 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586684" comment="xorg-x11-libs-7.4-8.26.50.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586685" comment="xorg-x11-libs-32bit-7.4-8.26.50.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586686" comment="xorg-x11-libs-x86-7.4-8.26.50.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586684" comment="xorg-x11-libs-7.4-8.26.50.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586685" comment="xorg-x11-libs-32bit-7.4-8.26.50.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586686" comment="xorg-x11-libs-x86-7.4-8.26.50.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220554" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1019649" ref_url="https://bugzilla.suse.com/1019649" source="BUGZILLA"/>
		<reference ref_id="1025029" ref_url="https://bugzilla.suse.com/1025029" source="BUGZILLA"/>
		<reference ref_id="1025035" ref_url="https://bugzilla.suse.com/1025035" source="BUGZILLA"/>
		<reference ref_id="1025084" ref_url="https://bugzilla.suse.com/1025084" source="BUGZILLA"/>
		<reference ref_id="981044" ref_url="https://bugzilla.suse.com/981044" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2624" ref_url="https://www.suse.com/security/cve/CVE-2017-2624/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

Security issues:

- CVE-2017-2624: Prevent timing attack against MIT cookie. (bsc#1025029, CVE-2017-2624)

Non security issues:

- Use arc4random to generate cookies. (bsc#1025084)
- XDrawArc performance improvement (bsc#1019649)
- Fix byte swapping for gradeint stops (bsc#981044).
- Remove unused function with use-after-free issue. (bsc#1025035)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-30"/>
	<updated date="2017-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1019649">SUSE bug 1019649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025029">SUSE bug 1025029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025035">SUSE bug 1025035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025084">SUSE bug 1025084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981044">SUSE bug 981044</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-2624/">CVE-2017-2624 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2624">CVE-2017-2624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586687" comment="xorg-x11-Xvnc-7.4-27.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586688" comment="xorg-x11-server-7.4-27.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586689" comment="xorg-x11-server-extra-7.4-27.118.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586687" comment="xorg-x11-Xvnc-7.4-27.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586688" comment="xorg-x11-server-7.4-27.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586689" comment="xorg-x11-server-extra-7.4-27.118.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220555" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1035283" ref_url="https://bugzilla.suse.com/1035283" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10971" ref_url="https://www.suse.com/security/cve/CVE-2017-10971/" source="CVE"/>
		<reference ref_id="CVE-2017-10972" ref_url="https://www.suse.com/security/cve/CVE-2017-10972/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003027.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2017-10971: Fix endianess handling of GenericEvent to prevent a stack overflow by clients. (bnc#1035283)
- Make sure the type of all events to be sent by ProcXSendExtensionEvent are in the
  allowed range.
- CVE-2017-10972: Initialize the xEvent eventT with zeros to avoid information leakage.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-12"/>
	<updated date="2017-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1035283">SUSE bug 1035283</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10971/">CVE-2017-10971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10971">CVE-2017-10971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10972/">CVE-2017-10972 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10972">CVE-2017-10972 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586690" comment="xorg-x11-Xvnc-7.4-27.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586691" comment="xorg-x11-server-7.4-27.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586692" comment="xorg-x11-server-extra-7.4-27.121.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586690" comment="xorg-x11-Xvnc-7.4-27.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586691" comment="xorg-x11-server-7.4-27.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586692" comment="xorg-x11-server-extra-7.4-27.121.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220556" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1025084" ref_url="https://bugzilla.suse.com/1025084" source="BUGZILLA"/>
		<reference ref_id="1051150" ref_url="https://bugzilla.suse.com/1051150" source="BUGZILLA"/>
		<reference ref_id="1063034" ref_url="https://bugzilla.suse.com/1063034" source="BUGZILLA"/>
		<reference ref_id="1063035" ref_url="https://bugzilla.suse.com/1063035" source="BUGZILLA"/>
		<reference ref_id="1063037" ref_url="https://bugzilla.suse.com/1063037" source="BUGZILLA"/>
		<reference ref_id="1063038" ref_url="https://bugzilla.suse.com/1063038" source="BUGZILLA"/>
		<reference ref_id="1063039" ref_url="https://bugzilla.suse.com/1063039" source="BUGZILLA"/>
		<reference ref_id="1063040" ref_url="https://bugzilla.suse.com/1063040" source="BUGZILLA"/>
		<reference ref_id="1063041" ref_url="https://bugzilla.suse.com/1063041" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12176" ref_url="https://www.suse.com/security/cve/CVE-2017-12176/" source="CVE"/>
		<reference ref_id="CVE-2017-12177" ref_url="https://www.suse.com/security/cve/CVE-2017-12177/" source="CVE"/>
		<reference ref_id="CVE-2017-12178" ref_url="https://www.suse.com/security/cve/CVE-2017-12178/" source="CVE"/>
		<reference ref_id="CVE-2017-12179" ref_url="https://www.suse.com/security/cve/CVE-2017-12179/" source="CVE"/>
		<reference ref_id="CVE-2017-12180" ref_url="https://www.suse.com/security/cve/CVE-2017-12180/" source="CVE"/>
		<reference ref_id="CVE-2017-12181" ref_url="https://www.suse.com/security/cve/CVE-2017-12181/" source="CVE"/>
		<reference ref_id="CVE-2017-12182" ref_url="https://www.suse.com/security/cve/CVE-2017-12182/" source="CVE"/>
		<reference ref_id="CVE-2017-12183" ref_url="https://www.suse.com/security/cve/CVE-2017-12183/" source="CVE"/>
		<reference ref_id="CVE-2017-12184" ref_url="https://www.suse.com/security/cve/CVE-2017-12184/" source="CVE"/>
		<reference ref_id="CVE-2017-12185" ref_url="https://www.suse.com/security/cve/CVE-2017-12185/" source="CVE"/>
		<reference ref_id="CVE-2017-12186" ref_url="https://www.suse.com/security/cve/CVE-2017-12186/" source="CVE"/>
		<reference ref_id="CVE-2017-12187" ref_url="https://www.suse.com/security/cve/CVE-2017-12187/" source="CVE"/>
		<reference ref_id="CVE-2017-13723" ref_url="https://www.suse.com/security/cve/CVE-2017-13723/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003399.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server provides several fixes.

These security issues were fixed:

- CVE-2017-13723: Prevent local DoS via unusual characters in XkbAtomText and
  XkbStringText (bsc#1051150).
- Improve the entropy when generating random data used in X.org server authorization
  cookies generation by using getentropy() and getrandom() when available (bsc#1025084)
- CVE-2017-12184,CVE-2017-12185,CVE-2017-12186,CVE-2017-12187: Fixed
  unvalidated lengths in multiple extensions (bsc#1063034)
- CVE-2017-12183: Fixed some unvalidated lengths in the XFIXES
  extension. (bsc#1063035)
- CVE-2017-12180,CVE-2017-12181,CVE-2017-12182: Fixed various unvalidated
  lengths in the XFree86-VidMode/XFree86-DGA/XFree86-DRI extensions
  (bsc#1063037)
- CVE-2017-12179: Fixed an integer overflow and unvalidated length in
  (S)ProcXIBarrierReleasePointer in Xi (bsc#1063038)
- CVE-2017-12178: Fixed a wrong extra length check in
  ProcXIChangeHierarchy in Xi (bsc#1063039)
- CVE-2017-12177: Fixed an unvalidated variable-length request in
  ProcDbeGetVisualInfo (bsc#1063040)
- CVE-2017-12176: Fixed an unvalidated extra length in
  ProcEstablishConnection (bsc#1063041)


		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-16"/>
	<updated date="2017-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025084">SUSE bug 1025084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051150">SUSE bug 1051150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063034">SUSE bug 1063034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063035">SUSE bug 1063035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063037">SUSE bug 1063037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063038">SUSE bug 1063038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063039">SUSE bug 1063039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063040">SUSE bug 1063040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063041">SUSE bug 1063041</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12176/">CVE-2017-12176 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12176">CVE-2017-12176 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12177/">CVE-2017-12177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12177">CVE-2017-12177 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12178/">CVE-2017-12178 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12178">CVE-2017-12178 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12179/">CVE-2017-12179 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12179">CVE-2017-12179 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12180/">CVE-2017-12180 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12180">CVE-2017-12180 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12181/">CVE-2017-12181 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12181">CVE-2017-12181 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12182/">CVE-2017-12182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12182">CVE-2017-12182 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12183/">CVE-2017-12183 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12183">CVE-2017-12183 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12184/">CVE-2017-12184 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12184">CVE-2017-12184 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12185/">CVE-2017-12185 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12185">CVE-2017-12185 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12186/">CVE-2017-12186 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12186">CVE-2017-12186 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12187/">CVE-2017-12187 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12187">CVE-2017-12187 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13723/">CVE-2017-13723 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13723">CVE-2017-13723 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586693" comment="xorg-x11-Xvnc-7.4-27.122.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586694" comment="xorg-x11-server-7.4-27.122.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586695" comment="xorg-x11-server-extra-7.4-27.122.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586693" comment="xorg-x11-Xvnc-7.4-27.122.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586694" comment="xorg-x11-server-7.4-27.122.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586695" comment="xorg-x11-server-extra-7.4-27.122.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220557" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1078383" ref_url="https://bugzilla.suse.com/1078383" source="BUGZILLA"/>
		<reference ref_id="1111697" ref_url="https://bugzilla.suse.com/1111697" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14665" ref_url="https://www.suse.com/security/cve/CVE-2018-14665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004793.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server provides the following fix:

Security issue fixed:

- CVE-2018-14665: Local attackers could overwrite system files in any directory using the -logfile option and gain privileges (bsc#1111697)

Non security issues fixed:

- Do not write past the allocated buffer. (bsc#1078383)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1078383">SUSE bug 1078383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111697">SUSE bug 1111697</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14665/">CVE-2018-14665 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14665">CVE-2018-14665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586696" comment="xorg-x11-Xvnc-7.4-27.122.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586697" comment="xorg-x11-server-7.4-27.122.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586698" comment="xorg-x11-server-extra-7.4-27.122.21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586696" comment="xorg-x11-Xvnc-7.4-27.122.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586697" comment="xorg-x11-server-7.4-27.122.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586698" comment="xorg-x11-server-extra-7.4-27.122.21.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220558" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1174633" ref_url="https://bugzilla.suse.com/1174633" source="BUGZILLA"/>
		<reference ref_id="1174635" ref_url="https://bugzilla.suse.com/1174635" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14345" ref_url="https://www.suse.com/security/cve/CVE-2020-14345/" source="CVE"/>
		<reference ref_id="CVE-2020-14347" ref_url="https://www.suse.com/security/cve/CVE-2020-14347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007300.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14347: Leak of uninitialized heap memory from the X server to clients on pixmap allocation (bsc#1174633, ZDI-CAN-11426).
- CVE-2020-14345: XKB out-of-bounds access privilege escalation vulnerability (bsc#1174635, ZDI-CAN-11428).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174633">SUSE bug 1174633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14345/">CVE-2020-14345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14345">CVE-2020-14345 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14347/">CVE-2020-14347 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14347">CVE-2020-14347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586699" comment="xorg-x11-Xvnc-7.4-27.122.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586700" comment="xorg-x11-server-7.4-27.122.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586701" comment="xorg-x11-server-extra-7.4-27.122.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220559" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1174910" ref_url="https://bugzilla.suse.com/1174910" source="BUGZILLA"/>
		<reference ref_id="1174913" ref_url="https://bugzilla.suse.com/1174913" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14361" ref_url="https://www.suse.com/security/cve/CVE-2020-14361/" source="CVE"/>
		<reference ref_id="CVE-2020-14362" ref_url="https://www.suse.com/security/cve/CVE-2020-14362/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007320.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14361: Fix XkbSelectEvents() integer underflow (bsc#1174910 ZDI-CAN-11573).
- CVE-2020-14362: Fix XRecordRegisterClients() Integer underflow (bsc#1174913 ZDI-CAN-11574).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-01"/>
	<updated date="2020-09-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14361/">CVE-2020-14361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14361">CVE-2020-14361 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14362/">CVE-2020-14362 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14362">CVE-2020-14362 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586702" comment="xorg-x11-Xvnc-7.4-27.122.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586703" comment="xorg-x11-server-7.4-27.122.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586704" comment="xorg-x11-server-extra-7.4-27.122.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220560" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1174908" ref_url="https://bugzilla.suse.com/1174908" source="BUGZILLA"/>
		<reference ref_id="1177596" ref_url="https://bugzilla.suse.com/1177596" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14360" ref_url="https://www.suse.com/security/cve/CVE-2020-14360/" source="CVE"/>
		<reference ref_id="CVE-2020-25712" ref_url="https://www.suse.com/security/cve/CVE-2020-25712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007902.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-25712: Fixed a heap-based buffer overflow which could have led to privilege escalation (bsc#1177596).
- CVE-2020-14360: Fixed an out of bounds memory accesses on too short request which could lead to denial of service (bsc#1174908).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-01"/>
	<updated date="2020-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14360/">CVE-2020-14360 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14360">CVE-2020-14360 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25712/">CVE-2020-25712 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25712">CVE-2020-25712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586705" comment="xorg-x11-Xvnc-7.4-27.122.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586706" comment="xorg-x11-server-7.4-27.122.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586707" comment="xorg-x11-server-extra-7.4-27.122.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220561" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1180128" ref_url="https://bugzilla.suse.com/1180128" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3472" ref_url="https://www.suse.com/security/cve/CVE-2021-3472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008626.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-3472: XChangeFeedbackControl Integer Underflow Privilege Escalation (bsc#1180128)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-13"/>
	<updated date="2021-04-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180128">SUSE bug 1180128</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3472/">CVE-2021-3472 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3472">CVE-2021-3472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586708" comment="xorg-x11-Xvnc-7.4-27.122.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586709" comment="xorg-x11-server-7.4-27.122.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586710" comment="xorg-x11-server-extra-7.4-27.122.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220562" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1193030" ref_url="https://bugzilla.suse.com/1193030" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4008" ref_url="https://www.suse.com/security/cve/CVE-2021-4008/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009901.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-4008: Fixed Privilege Escalation Vulnerability via Out-Of-Bounds Access in SProcRenderCompositeGlyphs (bsc#1193030).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193030">SUSE bug 1193030</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4008/">CVE-2021-4008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4008">CVE-2021-4008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659915" comment="xorg-x11-Xvnc-7.4-27.122.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659916" comment="xorg-x11-server-7.4-27.122.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659917" comment="xorg-x11-server-extra-7.4-27.122.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220563" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1190489" ref_url="https://bugzilla.suse.com/1190489" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009924.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-4011: The handlers for the RecordCreateContext and RecordRegisterClients
  requests of the Record extension do not properly validate the request
  length leading to out of bounds memory write. (bsc#1190489)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-20"/>
	<updated date="2021-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190489">SUSE bug 1190489</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4011">CVE-2021-4011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660950" comment="xorg-x11-Xvnc-7.4-27.122.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660951" comment="xorg-x11-server-7.4-27.122.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660952" comment="xorg-x11-server-extra-7.4-27.122.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220564" version="1" class="patch">
	<metadata>
		<title>Security update for xscreensaver (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="952062" ref_url="https://bugzilla.suse.com/952062" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8025" ref_url="https://www.suse.com/security/cve/CVE-2015-8025/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001686.html" source="SUSE-SU"/>
		<description>
The xscreensaver package was updated to fix the following security and non security issues:

- CVE-2015-8025: Fixed a crash when hot-swapping monitors while locked (bsc#952062).
- Added xscreensaver-in_signal_handler_p.patch needed for fix of signal handling.
- Refresh xscreensaver-stars.patch.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-20"/>
	<updated date="2015-11-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952062">SUSE bug 952062</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8025/">CVE-2015-8025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8025">CVE-2015-8025 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581822" comment="xscreensaver-5.07-6.36.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581822" comment="xscreensaver-5.07-6.36.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220565" version="1" class="patch">
	<metadata>
		<title>Security update for xterm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1182091" ref_url="https://bugzilla.suse.com/1182091" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27135" ref_url="https://www.suse.com/security/cve/CVE-2021-27135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009009.html" source="SUSE-SU"/>
		<description>
This update for xterm fixes the following issues:

- CVE-2021-27135: Fixed buffer-overflow when clicking on selected utf8 text. (bsc#1182091)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-14"/>
	<updated date="2021-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182091">SUSE bug 1182091</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27135/">CVE-2021-27135 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27135">CVE-2021-27135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586711" comment="xterm-238-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220566" version="1" class="patch">
	<metadata>
		<title>Security update for xz (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010689.html" source="SUSE-SU"/>
		<description>
This update for xz fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679347" comment="liblzma5-5.0.3-0.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679348" comment="liblzma5-32bit-5.0.3-0.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679349" comment="xz-5.0.3-0.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679350" comment="xz-lang-5.0.3-0.12.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220567" version="1" class="patch">
	<metadata>
		<title>Security update for yast2-storage (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="937942" ref_url="https://bugzilla.suse.com/937942" source="BUGZILLA"/>
		<reference ref_id="984245" ref_url="https://bugzilla.suse.com/984245" source="BUGZILLA"/>
		<reference ref_id="986971" ref_url="https://bugzilla.suse.com/986971" source="BUGZILLA"/>
		<reference ref_id="996208" ref_url="https://bugzilla.suse.com/996208" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5746" ref_url="https://www.suse.com/security/cve/CVE-2016-5746/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002284.html" source="SUSE-SU"/>
		<description>

This update for yast2-storage provides the following fixes:

Security issues fixed:
- Use standard IPC, and not temporary files, to pass passwords between processes.
  (bsc#986971, CVE-2016-5746)

Non security bugs fixed:
- Fix usage of complete multipath disk as LVM physical volume. (bsc#984245)
- Load the correct multipath module (dm-multipath). (bsc#937942)
- Improve message for creating volumes with a filesystem but without a mount point.
  (bsc#996208)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-23"/>
	<updated date="2016-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/937942">SUSE bug 937942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984245">SUSE bug 984245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986971">SUSE bug 986971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996208">SUSE bug 996208</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5746/">CVE-2016-5746 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5746">CVE-2016-5746 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586712" comment="yast2-storage-2.17.161-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586713" comment="yast2-storage-lib-2.17.161-5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586712" comment="yast2-storage-2.17.161-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586713" comment="yast2-storage-lib-2.17.161-5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220568" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1003577" ref_url="https://bugzilla.suse.com/1003577" source="BUGZILLA"/>
		<reference ref_id="1003579" ref_url="https://bugzilla.suse.com/1003579" source="BUGZILLA"/>
		<reference ref_id="1003580" ref_url="https://bugzilla.suse.com/1003580" source="BUGZILLA"/>
		<reference ref_id="1013882" ref_url="https://bugzilla.suse.com/1013882" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002506.html" source="SUSE-SU"/>
		<description>

This update for zlib fixes the following issues:

  * Incompatible declarations for external linkage function deflate (bnc#1003577)
  * CVE-2016-9842: Undefined Left Shift of Negative Number (bnc#1003580) 
  * CVE-2016-9840 CVE-2016-9841: Out-of-bounds pointer arithmetic in inftrees.c (bnc#1003579)
  * CVE-2016-9843: Big-endian out-of-bounds pointer
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-21"/>
	<updated date="2016-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003577">SUSE bug 1003577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003579">SUSE bug 1003579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003580">SUSE bug 1003580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9840">CVE-2016-9840 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9841">CVE-2016-9841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9842">CVE-2016-9842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9843">CVE-2016-9843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586714" comment="zlib-1.2.7-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586715" comment="zlib-32bit-1.2.7-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586716" comment="zlib-x86-1.2.7-0.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586714" comment="zlib-1.2.7-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586715" comment="zlib-32bit-1.2.7-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586716" comment="zlib-x86-1.2.7-0.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220569" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1197459" ref_url="https://bugzilla.suse.com/1197459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010584.html" source="SUSE-SU"/>
		<description>
This update for zlib fixes the following issues:

- CVE-2018-25032: Fixed memory corruption on deflate (bsc#1197459).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-01"/>
	<updated date="2022-04-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197459">SUSE bug 1197459</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677181" comment="zlib-1.2.7-0.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677182" comment="zlib-32bit-1.2.7-0.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677953" comment="zlib-devel-1.2.7-0.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677954" comment="zlib-devel-32bit-1.2.7-0.17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220570" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1089030" ref_url="https://bugzilla.suse.com/1089030" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1100" ref_url="https://www.suse.com/security/cve/CVE-2018-1100/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003952.html" source="SUSE-SU"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2018-1100: Fixed a buffer overflow in
  utils.c:checkmailpath() that could lead to local arbitrary code
  execution ( bsc#1089030)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-20"/>
	<updated date="2018-04-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089030">SUSE bug 1089030</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1100/">CVE-2018-1100 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1100">CVE-2018-1100 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586717" comment="zsh-4.3.6-67.9.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586717" comment="zsh-4.3.6-67.9.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220571" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1082885" ref_url="https://bugzilla.suse.com/1082885" source="BUGZILLA"/>
		<reference ref_id="1082975" ref_url="https://bugzilla.suse.com/1082975" source="BUGZILLA"/>
		<reference ref_id="1082977" ref_url="https://bugzilla.suse.com/1082977" source="BUGZILLA"/>
		<reference ref_id="1082991" ref_url="https://bugzilla.suse.com/1082991" source="BUGZILLA"/>
		<reference ref_id="1082998" ref_url="https://bugzilla.suse.com/1082998" source="BUGZILLA"/>
		<reference ref_id="1083002" ref_url="https://bugzilla.suse.com/1083002" source="BUGZILLA"/>
		<reference ref_id="1083250" ref_url="https://bugzilla.suse.com/1083250" source="BUGZILLA"/>
		<reference ref_id="1084656" ref_url="https://bugzilla.suse.com/1084656" source="BUGZILLA"/>
		<reference ref_id="1087026" ref_url="https://bugzilla.suse.com/1087026" source="BUGZILLA"/>
		<reference ref_id="1107294" ref_url="https://bugzilla.suse.com/1107294" source="BUGZILLA"/>
		<reference ref_id="1107296" ref_url="https://bugzilla.suse.com/1107296" source="BUGZILLA"/>
		<reference ref_id="1163882" ref_url="https://bugzilla.suse.com/1163882" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-10070" ref_url="https://www.suse.com/security/cve/CVE-2014-10070/" source="CVE"/>
		<reference ref_id="CVE-2014-10071" ref_url="https://www.suse.com/security/cve/CVE-2014-10071/" source="CVE"/>
		<reference ref_id="CVE-2014-10072" ref_url="https://www.suse.com/security/cve/CVE-2014-10072/" source="CVE"/>
		<reference ref_id="CVE-2016-10714" ref_url="https://www.suse.com/security/cve/CVE-2016-10714/" source="CVE"/>
		<reference ref_id="CVE-2017-18205" ref_url="https://www.suse.com/security/cve/CVE-2017-18205/" source="CVE"/>
		<reference ref_id="CVE-2017-18206" ref_url="https://www.suse.com/security/cve/CVE-2017-18206/" source="CVE"/>
		<reference ref_id="CVE-2018-0502" ref_url="https://www.suse.com/security/cve/CVE-2018-0502/" source="CVE"/>
		<reference ref_id="CVE-2018-1071" ref_url="https://www.suse.com/security/cve/CVE-2018-1071/" source="CVE"/>
		<reference ref_id="CVE-2018-1083" ref_url="https://www.suse.com/security/cve/CVE-2018-1083/" source="CVE"/>
		<reference ref_id="CVE-2018-13259" ref_url="https://www.suse.com/security/cve/CVE-2018-13259/" source="CVE"/>
		<reference ref_id="CVE-2018-7549" ref_url="https://www.suse.com/security/cve/CVE-2018-7549/" source="CVE"/>
		<reference ref_id="CVE-2019-20044" ref_url="https://www.suse.com/security/cve/CVE-2019-20044/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2019-20044: Fixed an insecure dropping of privileges when unsetting
  the PRIVILEGED option (bsc#1163882).
- CVE-2018-13259: Fixed an unexpected truncation of long shebang lines (bsc#1107294).
- CVE-2018-7549: Fixed a crash when an empty hash table (bsc#1082991).
- CVE-2018-1083: Fixed a stack-based buffer overflow when using tab completion
  on directories with long names (bsc#1087026).
- CVE-2018-1071: Fixed a stack-based buffer overflow when executing certain
  commands (bsc#1084656).
- CVE-2018-0502: Fixed a mishandling of shebang lines (bsc#1107296).
- CVE-2017-18206: Fixed a buffer overflow related to symlink processing (bsc#1083002).
- CVE-2017-18205: Fixed an application crash when using cd with no
  arguments (bsc#1082998).
- CVE-2016-10714: Fixed a potential application crash when handling maximum
  length paths (bsc#1083250).
- CVE-2014-10072: Fixed a buffer overflow when scanning very long directory
  paths for symbolic links (bsc#1082975).
- CVE-2014-10071: Fixed a buffer overflow when redirecting output to a long
  file descriptor (bsc#1082977).
- CVE-2014-10070: Fixed a privilege escalation vulnerability via environment
  variables (bsc#1082885).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082885">SUSE bug 1082885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082975">SUSE bug 1082975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082977">SUSE bug 1082977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082991">SUSE bug 1082991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082998">SUSE bug 1082998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083002">SUSE bug 1083002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083250">SUSE bug 1083250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084656">SUSE bug 1084656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087026">SUSE bug 1087026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107294">SUSE bug 1107294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107296">SUSE bug 1107296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163882">SUSE bug 1163882</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-10070/">CVE-2014-10070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-10070">CVE-2014-10070 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-10071/">CVE-2014-10071 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-10071">CVE-2014-10071 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-10072/">CVE-2014-10072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-10072">CVE-2014-10072 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10714/">CVE-2016-10714 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10714">CVE-2016-10714 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18205/">CVE-2017-18205 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18205">CVE-2017-18205 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18206/">CVE-2017-18206 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18206">CVE-2017-18206 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-0502/">CVE-2018-0502 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0502">CVE-2018-0502 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1071/">CVE-2018-1071 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1071">CVE-2018-1071 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1083/">CVE-2018-1083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1083">CVE-2018-1083 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13259/">CVE-2018-13259 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13259">CVE-2018-13259 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7549/">CVE-2018-7549 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7549">CVE-2018-7549 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20044/">CVE-2019-20044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20044">CVE-2019-20044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671297" comment="zsh-4.3.6-67.9.8.1 is installed"/>
	</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988310" version="1" comment="LibVNCServer is &lt;0.9.1-154.24 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060800" version="1" comment="sles-release is ==11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988311" version="1" comment="MozillaFirefox is &lt;3.5.9-0.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988312" version="1" comment="MozillaFirefox-translations is &lt;3.5.9-0.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988313" version="1" comment="NetworkManager is &lt;0.7.0.r4359-15.22.49 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988314" version="1" comment="NetworkManager-glib is &lt;0.7.0.r4359-15.22.49 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988315" version="1" comment="NetworkManager-gnome is &lt;0.7.0.r1053-11.16.61 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988316" version="1" comment="OpenEXR is &lt;1.6.1-83.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988317" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988318" version="1" comment="OpenEXR-x86 is &lt;1.6.1-83.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988319" version="1" comment="PackageKit is &lt;0.3.14-2.12.105 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988320" version="1" comment="PackageKit-lang is &lt;0.3.14-2.12.105 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988321" version="1" comment="hal is &lt;0.5.12-23.40.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988322" version="1" comment="hal-32bit is &lt;0.5.12-23.40.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988323" version="1" comment="hal-doc is &lt;0.5.12-23.40.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988324" version="1" comment="hal-x86 is &lt;0.5.12-23.40.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988325" version="1" comment="libpackagekit-glib10 is &lt;0.3.14-2.12.105 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988326" version="1" comment="yast2-core is &lt;2.17.35-0.2.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988327" version="1" comment="PolicyKit is &lt;0.9-14.34.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988328" version="1" comment="PolicyKit-32bit is &lt;0.9-14.34.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988329" version="1" comment="PolicyKit-doc is &lt;0.9-14.34.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988330" version="1" comment="PolicyKit-x86 is &lt;0.9-14.34.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988331" version="1" comment="amavisd-new is &lt;2.6.2-1.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988332" version="1" comment="apache2 is &lt;2.2.10-2.24.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988333" version="1" comment="apache2-doc is &lt;2.2.10-2.24.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988334" version="1" comment="apache2-example-pages is &lt;2.2.10-2.24.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988335" version="1" comment="apache2-prefork is &lt;2.2.10-2.24.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988336" version="1" comment="apache2-utils is &lt;2.2.10-2.24.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988337" version="1" comment="apache2-worker is &lt;2.2.10-2.24.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988338" version="1" comment="apache2-mod_perl is &lt;2.0.4-40.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988339" version="1" comment="apache2-mod_php5 is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988340" version="1" comment="php5 is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988341" version="1" comment="php5-bcmath is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988342" version="1" comment="php5-bz2 is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988343" version="1" comment="php5-calendar is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988344" version="1" comment="php5-ctype is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988345" version="1" comment="php5-curl is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988346" version="1" comment="php5-dba is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988347" version="1" comment="php5-dbase is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988348" version="1" comment="php5-dom is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988349" version="1" comment="php5-exif is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988350" version="1" comment="php5-fastcgi is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988351" version="1" comment="php5-ftp is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988352" version="1" comment="php5-gd is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988353" version="1" comment="php5-gettext is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988354" version="1" comment="php5-gmp is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988355" version="1" comment="php5-hash is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988356" version="1" comment="php5-iconv is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988357" version="1" comment="php5-json is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988358" version="1" comment="php5-ldap is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988359" version="1" comment="php5-mbstring is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988360" version="1" comment="php5-mcrypt is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988361" version="1" comment="php5-mysql is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988362" version="1" comment="php5-odbc is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988363" version="1" comment="php5-openssl is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988364" version="1" comment="php5-pcntl is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988365" version="1" comment="php5-pdo is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988366" version="1" comment="php5-pear is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988367" version="1" comment="php5-pgsql is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988368" version="1" comment="php5-pspell is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988369" version="1" comment="php5-shmop is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988370" version="1" comment="php5-snmp is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988371" version="1" comment="php5-soap is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988372" version="1" comment="php5-suhosin is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988373" version="1" comment="php5-sysvmsg is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988374" version="1" comment="php5-sysvsem is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988375" version="1" comment="php5-sysvshm is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988376" version="1" comment="php5-tokenizer is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988377" version="1" comment="php5-wddx is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988378" version="1" comment="php5-xmlreader is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988379" version="1" comment="php5-xmlrpc is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988380" version="1" comment="php5-xmlwriter is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988381" version="1" comment="php5-xsl is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988382" version="1" comment="php5-zip is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988383" version="1" comment="php5-zlib is &lt;5.2.6-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988384" version="1" comment="avahi is &lt;0.6.23-11.19.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988385" version="1" comment="avahi-lang is &lt;0.6.23-11.19.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988386" version="1" comment="avahi-utils is &lt;0.6.23-11.19.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988387" version="1" comment="libavahi-client3 is &lt;0.6.23-11.19.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988388" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-11.19.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988389" version="1" comment="libavahi-client3-x86 is &lt;0.6.23-11.19.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988390" version="1" comment="libavahi-common3 is &lt;0.6.23-11.19.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988391" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-11.19.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988392" version="1" comment="libavahi-common3-x86 is &lt;0.6.23-11.19.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988393" version="1" comment="libavahi-core5 is &lt;0.6.23-11.19.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988394" version="1" comment="libdns_sd is &lt;0.6.23-11.19.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988395" version="1" comment="libdns_sd-32bit is &lt;0.6.23-11.19.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988396" version="1" comment="libdns_sd-x86 is &lt;0.6.23-11.19.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988397" version="1" comment="bind is &lt;9.5.0P2-20.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988398" version="1" comment="bind-chrootenv is &lt;9.5.0P2-20.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988399" version="1" comment="bind-doc is &lt;9.5.0P2-20.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988400" version="1" comment="bind-libs is &lt;9.5.0P2-20.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988401" version="1" comment="bind-libs-32bit is &lt;9.5.0P2-20.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988402" version="1" comment="bind-libs-x86 is &lt;9.5.0P2-20.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988403" version="1" comment="bind-utils is &lt;9.5.0P2-20.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988404" version="1" comment="boost-license is &lt;1.36.0-11.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988405" version="1" comment="libboost_program_options1_36_0 is &lt;1.36.0-11.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988406" version="1" comment="libboost_regex1_36_0 is &lt;1.36.0-11.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988407" version="1" comment="libboost_signals1_36_0 is &lt;1.36.0-11.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988408" version="1" comment="bzip2 is &lt;1.0.5-34.246 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988409" version="1" comment="bzip2-doc is &lt;1.0.5-34.246 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988410" version="1" comment="libbz2-1 is &lt;1.0.5-34.246 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988411" version="1" comment="libbz2-1-32bit is &lt;1.0.5-34.246 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988412" version="1" comment="libbz2-1-x86 is &lt;1.0.5-34.246 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988413" version="1" comment="cifs-mount is &lt;3.4.3-1.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988414" version="1" comment="ldapsmb is &lt;1.34b-11.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988415" version="1" comment="libsmbclient0 is &lt;3.4.3-1.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988416" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-1.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988417" version="1" comment="libsmbclient0-x86 is &lt;3.4.3-1.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988418" version="1" comment="libtalloc1 is &lt;3.4.3-1.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988419" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988420" version="1" comment="libtalloc1-x86 is &lt;3.4.3-1.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988421" version="1" comment="libtdb1 is &lt;3.4.3-1.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988422" version="1" comment="libtdb1-32bit is &lt;3.4.3-1.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988423" version="1" comment="libtdb1-x86 is &lt;3.4.3-1.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988424" version="1" comment="libwbclient0 is &lt;3.4.3-1.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988425" version="1" comment="libwbclient0-32bit is &lt;3.4.3-1.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988426" version="1" comment="libwbclient0-x86 is &lt;3.4.3-1.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988427" version="1" comment="samba is &lt;3.4.3-1.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988428" version="1" comment="samba-32bit is &lt;3.4.3-1.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988429" version="1" comment="samba-client is &lt;3.4.3-1.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988430" version="1" comment="samba-client-32bit is &lt;3.4.3-1.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988431" version="1" comment="samba-client-x86 is &lt;3.4.3-1.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988432" version="1" comment="samba-krb-printing is &lt;3.4.3-1.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988433" version="1" comment="samba-winbind is &lt;3.4.3-1.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988434" version="1" comment="samba-winbind-32bit is &lt;3.4.3-1.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988435" version="1" comment="samba-winbind-x86 is &lt;3.4.3-1.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988436" version="1" comment="samba-x86 is &lt;3.4.3-1.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988437" version="1" comment="clamav is &lt;0.96-0.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988438" version="1" comment="coolkey is &lt;1.1.0-22.24 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988439" version="1" comment="cron is &lt;4.1-194.24.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988440" version="1" comment="cups is &lt;1.3.9-8.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988441" version="1" comment="cups-client is &lt;1.3.9-8.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988442" version="1" comment="cups-libs is &lt;1.3.9-8.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988443" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988444" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988445" version="1" comment="curl is &lt;7.19.0-11.24.25 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988446" version="1" comment="libcurl4 is &lt;7.19.0-11.24.25 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988447" version="1" comment="libcurl4-32bit is &lt;7.19.0-11.24.25 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988448" version="1" comment="libcurl4-x86 is &lt;7.19.0-11.24.25 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988449" version="1" comment="cyrus-imapd is &lt;2.3.11-60.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988450" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988451" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988452" version="1" comment="dbus-1 is &lt;1.2.10-3.11.29 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988453" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.11.29 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988454" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.11.33 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988455" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.11.29 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988456" version="1" comment="dhcp is &lt;3.1.3.ESV-0.3.38 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988457" version="1" comment="dhcp-client is &lt;3.1.3.ESV-0.3.38 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988458" version="1" comment="dhcp-relay is &lt;3.1.3.ESV-0.3.38 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988459" version="1" comment="dhcp-server is &lt;3.1.3.ESV-0.3.38 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988460" version="1" comment="e2fsprogs is &lt;1.41.9-2.1.51 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988461" version="1" comment="libcom_err2 is &lt;1.41.9-2.1.51 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988462" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.1.51 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988463" version="1" comment="libcom_err2-x86 is &lt;1.41.9-2.1.51 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988464" version="1" comment="libext2fs2 is &lt;1.41.9-2.1.51 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988465" version="1" comment="emacs is &lt;22.3-4.32.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988466" version="1" comment="emacs-el is &lt;22.3-4.32.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988467" version="1" comment="emacs-info is &lt;22.3-4.32.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988468" version="1" comment="emacs-nox is &lt;22.3-4.32.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988469" version="1" comment="emacs-x11 is &lt;22.3-4.32.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988470" version="1" comment="enscript is &lt;1.6.4-152.17.55 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988471" version="1" comment="evince is &lt;2.28.2-0.2.68 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988472" version="1" comment="evince-doc is &lt;2.28.2-0.2.68 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988473" version="1" comment="evince-lang is &lt;2.28.2-0.2.68 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988474" version="1" comment="evolution-data-server is &lt;2.28.2-0.10.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988475" version="1" comment="evolution-data-server-32bit is &lt;2.28.2-0.10.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988476" version="1" comment="evolution-data-server-lang is &lt;2.28.2-0.10.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988477" version="1" comment="evolution-data-server-x86 is &lt;2.28.2-0.10.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988478" version="1" comment="expat is &lt;2.0.1-88.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988479" version="1" comment="libexpat1 is &lt;2.0.1-88.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988480" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988481" version="1" comment="libexpat1-x86 is &lt;2.0.1-88.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988482" version="1" comment="fetchmail is &lt;6.3.8.90-13.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988483" version="1" comment="fetchmailconf is &lt;6.3.8.90-13.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988484" version="1" comment="file is &lt;4.24-43.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988485" version="1" comment="file-32bit is &lt;4.24-43.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988486" version="1" comment="file-x86 is &lt;4.24-43.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988487" version="1" comment="findutils is &lt;4.4.0-38.24.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988488" version="1" comment="findutils-locate is &lt;4.4.0-38.24.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988489" version="1" comment="freeradius-server is &lt;2.1.1-7.7.19.77 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988490" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.7.19.77 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988491" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.7.19.77 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988492" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.7.19.77 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988493" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.7.19.77 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988494" version="1" comment="freetype2 is &lt;2.3.7-25.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988495" version="1" comment="freetype2-32bit is &lt;2.3.7-25.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988496" version="1" comment="freetype2-x86 is &lt;2.3.7-25.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988497" version="1" comment="ft2demos is &lt;2.3.7-25.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988498" version="1" comment="fuse is &lt;2.7.2-61.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988499" version="1" comment="libfuse2 is &lt;2.7.2-61.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988500" version="1" comment="fvwm2 is &lt;2.5.26-1.25 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988501" version="1" comment="g3utils is &lt;1.1.36-26.31 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988502" version="1" comment="mgetty is &lt;1.1.36-26.31 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988503" version="1" comment="gd is &lt;2.0.36.RC1-52.18 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988504" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.27.31 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988505" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.27.31 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988506" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.27.31 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988507" version="1" comment="ghostscript-library is &lt;8.62-32.27.31 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988508" version="1" comment="ghostscript-omni is &lt;8.62-32.27.31 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988509" version="1" comment="ghostscript-x11 is &lt;8.62-32.27.31 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988510" version="1" comment="libgimpprint is &lt;4.2.7-32.27.31 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988511" version="1" comment="glib2 is &lt;2.22.5-0.2.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988512" version="1" comment="glib2-doc is &lt;2.22.5-0.2.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988513" version="1" comment="glib2-lang is &lt;2.22.5-0.2.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988514" version="1" comment="libgio-2_0-0 is &lt;2.22.5-0.2.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988515" version="1" comment="libgio-2_0-0-32bit is &lt;2.22.5-0.2.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988516" version="1" comment="libgio-2_0-0-x86 is &lt;2.22.5-0.2.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988517" version="1" comment="libglib-2_0-0 is &lt;2.22.5-0.2.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988518" version="1" comment="libglib-2_0-0-32bit is &lt;2.22.5-0.2.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988519" version="1" comment="libglib-2_0-0-x86 is &lt;2.22.5-0.2.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988520" version="1" comment="libgmodule-2_0-0 is &lt;2.22.5-0.2.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988521" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.22.5-0.2.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988522" version="1" comment="libgmodule-2_0-0-x86 is &lt;2.22.5-0.2.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988523" version="1" comment="libgobject-2_0-0 is &lt;2.22.5-0.2.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988524" version="1" comment="libgobject-2_0-0-32bit is &lt;2.22.5-0.2.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988525" version="1" comment="libgobject-2_0-0-x86 is &lt;2.22.5-0.2.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988526" version="1" comment="libgthread-2_0-0 is &lt;2.22.5-0.2.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988527" version="1" comment="libgthread-2_0-0-32bit is &lt;2.22.5-0.2.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988528" version="1" comment="libgthread-2_0-0-x86 is &lt;2.22.5-0.2.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988529" version="1" comment="gmime is &lt;2.2.23-1.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988530" version="1" comment="gmime-2_4 is &lt;2.4.8-1.2.55 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988531" version="1" comment="gmime-doc is &lt;2.2.23-1.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988532" version="1" comment="libgmime-2_0-3 is &lt;2.2.23-1.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988533" version="1" comment="libgmime-2_4-2 is &lt;2.4.8-1.2.55 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988534" version="1" comment="gnome-screensaver is &lt;2.28.3-0.4.30 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988535" version="1" comment="gnome-screensaver-lang is &lt;2.28.3-0.4.30 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988536" version="1" comment="gnutls is &lt;2.4.1-24.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988537" version="1" comment="libgnutls26 is &lt;2.4.1-24.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988538" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988539" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988540" version="1" comment="gpg2 is &lt;2.0.9-25.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988541" version="1" comment="gpg2-lang is &lt;2.0.9-25.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988542" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.25-1.1.133 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988543" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.25-1.1.133 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988544" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.25-1.1.133 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988545" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.25-1.1.133 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988546" version="1" comment="gstreamer-0_10-plugins-base-x86 is &lt;0.10.25-1.1.133 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988547" version="1" comment="libgstapp-0_10-0 is &lt;0.10.25-1.1.133 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988548" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.25-1.1.133 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988549" version="1" comment="libgstapp-0_10-0-x86 is &lt;0.10.25-1.1.133 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988550" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.25-1.1.133 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988551" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.25-1.1.133 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988552" version="1" comment="libgstinterfaces-0_10-0-x86 is &lt;0.10.25-1.1.133 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988553" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.17-1.1.126 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988554" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.17-1.1.126 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988555" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.17-1.1.126 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988556" version="1" comment="gtk2 is &lt;2.18.9-0.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988557" version="1" comment="gtk2-32bit is &lt;2.18.9-0.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988558" version="1" comment="gtk2-doc is &lt;2.18.9-0.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988559" version="1" comment="gtk2-lang is &lt;2.18.9-0.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988560" version="1" comment="gtk2-x86 is &lt;2.18.9-0.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988561" version="1" comment="gvim is &lt;7.2-8.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988562" version="1" comment="vim is &lt;7.2-8.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988563" version="1" comment="vim-base is &lt;7.2-8.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988564" version="1" comment="vim-data is &lt;7.2-8.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988565" version="1" comment="gzip is &lt;1.3.12-69.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988566" version="1" comment="hplip is &lt;3.9.8-3.4.30 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988567" version="1" comment="hplip-hpijs is &lt;3.9.8-3.4.30 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988568" version="1" comment="ipsec-tools is &lt;0.7.3-1.1.93 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988569" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.3-1.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988570" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.3-1.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988571" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.3-1.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988572" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr7.0-1.6.21 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988573" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr7.0-1.6.21 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988574" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr7.0-1.6.21 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988575" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr7.0-1.6.21 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988576" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr7.0-1.6.21 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988577" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.8.35 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988578" version="1" comment="kdebase4-wallpapers is &lt;4.3.5-0.8.40 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988579" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.8.35 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988580" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.8.35 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988581" version="1" comment="kdm is &lt;4.3.5-0.8.35 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988582" version="1" comment="kwin is &lt;4.3.5-0.8.35 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988583" version="1" comment="kdebase3-runtime is &lt;3.5.10-20.31 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988584" version="1" comment="kdebase3-runtime-32bit is &lt;3.5.10-20.31 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988585" version="1" comment="kdebase3-runtime-x86 is &lt;3.5.10-20.31 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988586" version="1" comment="kdelibs3 is &lt;3.5.10-23.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988587" version="1" comment="kdelibs3-32bit is &lt;3.5.10-23.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988588" version="1" comment="kdelibs3-default-style is &lt;3.5.10-23.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988589" version="1" comment="kdelibs3-default-style-32bit is &lt;3.5.10-23.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988590" version="1" comment="kdelibs3-default-style-x86 is &lt;3.5.10-23.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988591" version="1" comment="kdelibs3-x86 is &lt;3.5.10-23.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988592" version="1" comment="kdelibs4 is &lt;4.3.5-0.2.46 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988593" version="1" comment="kdelibs4-core is &lt;4.3.5-0.2.46 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988594" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.2.46 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988595" version="1" comment="libkde4 is &lt;4.3.5-0.2.46 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988596" version="1" comment="libkde4-32bit is &lt;4.3.5-0.2.46 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988597" version="1" comment="libkde4-x86 is &lt;4.3.5-0.2.46 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988598" version="1" comment="libkdecore4 is &lt;4.3.5-0.2.46 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988599" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.2.46 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988600" version="1" comment="libkdecore4-x86 is &lt;4.3.5-0.2.46 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988601" version="1" comment="kernel-default is &lt;2.6.32.12-0.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988602" version="1" comment="kernel-default-base is &lt;2.6.32.12-0.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988604" version="1" comment="kernel-default-man is &lt;2.6.32.12-0.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988605" version="1" comment="kernel-pae is &lt;2.6.32.12-0.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988606" version="1" comment="kernel-pae-base is &lt;2.6.32.12-0.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988608" version="1" comment="kernel-ppc64 is &lt;2.6.32.12-0.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988609" version="1" comment="kernel-ppc64-base is &lt;2.6.32.12-0.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988611" version="1" comment="kernel-source is &lt;2.6.32.12-0.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988612" version="1" comment="kernel-syms is &lt;2.6.32.12-0.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988613" version="1" comment="kernel-trace is &lt;2.6.32.12-0.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988614" version="1" comment="kernel-trace-base is &lt;2.6.32.12-0.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988616" version="1" comment="kernel-xen is &lt;2.6.32.12-0.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988617" version="1" comment="kernel-xen-base is &lt;2.6.32.12-0.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988619" version="1" comment="krb5 is &lt;1.6.3-133.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988620" version="1" comment="krb5-32bit is &lt;1.6.3-133.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988621" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988622" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988623" version="1" comment="krb5-client is &lt;1.6.3-133.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988624" version="1" comment="krb5-server is &lt;1.6.3-133.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988625" version="1" comment="krb5-x86 is &lt;1.6.3-133.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988626" version="1" comment="krb5-doc is &lt;1.6.3-133.21 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988627" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988628" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988629" version="1" comment="kvm is &lt;0.12.3-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988630" version="1" comment="lcms is &lt;1.17-77.14.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988631" version="1" comment="liblcms1 is &lt;1.17-77.14.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988632" version="1" comment="liblcms1-32bit is &lt;1.17-77.14.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988633" version="1" comment="liblcms1-x86 is &lt;1.17-77.14.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988634" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988635" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988636" version="1" comment="libQtWebKit4 is &lt;4.6.2-1.6.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988637" version="1" comment="libQtWebKit4-32bit is &lt;4.6.2-1.6.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988638" version="1" comment="libQtWebKit4-x86 is &lt;4.6.2-1.6.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988639" version="1" comment="libqt4 is &lt;4.6.2-1.6.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988640" version="1" comment="libqt4-32bit is &lt;4.6.2-1.6.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988641" version="1" comment="libqt4-qt3support is &lt;4.6.2-1.6.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988642" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.2-1.6.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988643" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.2-1.6.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988644" version="1" comment="libqt4-sql is &lt;4.6.2-1.6.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988645" version="1" comment="libqt4-sql-32bit is &lt;4.6.2-1.6.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988646" version="1" comment="libqt4-sql-mysql is &lt;4.6.2-1.6.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988647" version="1" comment="libqt4-sql-sqlite is &lt;4.6.2-1.6.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988648" version="1" comment="libqt4-sql-x86 is &lt;4.6.2-1.6.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988649" version="1" comment="libqt4-x11 is &lt;4.6.2-1.6.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988650" version="1" comment="libqt4-x11-32bit is &lt;4.6.2-1.6.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988651" version="1" comment="libqt4-x11-x86 is &lt;4.6.2-1.6.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988652" version="1" comment="libqt4-x86 is &lt;4.6.2-1.6.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988653" version="1" comment="qt4-x11-tools is &lt;4.6.2-1.6.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988654" version="1" comment="libadns1 is &lt;1.4-73.21 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988655" version="1" comment="libapr-util1 is &lt;1.3.4-12.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988656" version="1" comment="libapr-util1-32bit is &lt;1.3.4-12.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988657" version="1" comment="libapr1 is &lt;1.3.3-11.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988658" version="1" comment="libapr1-32bit is &lt;1.3.3-11.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988659" version="1" comment="libarchive2 is &lt;2.5.5-5.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988660" version="1" comment="libdrm is &lt;2.4.17-0.3.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988661" version="1" comment="libdrm-32bit is &lt;2.4.17-0.3.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988662" version="1" comment="libdrm-x86 is &lt;2.4.17-0.3.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988663" version="1" comment="libexif is &lt;0.6.17-2.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988664" version="1" comment="libexif-32bit is &lt;0.6.17-2.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988665" version="1" comment="libexif-x86 is &lt;0.6.17-2.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988666" version="1" comment="libexiv2-4 is &lt;0.17.1-31.20 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988667" version="1" comment="libgtop is &lt;2.28.0-1.2.20 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988668" version="1" comment="libgtop-2_0-7 is &lt;2.28.0-1.2.20 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988669" version="1" comment="libgtop-doc is &lt;2.28.0-1.2.20 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988670" version="1" comment="libgtop-lang is &lt;2.28.0-1.2.20 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988671" version="1" comment="libicu is &lt;4.0-7.24.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988672" version="1" comment="libicu-32bit is &lt;4.0-7.24.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988673" version="1" comment="libicu-doc is &lt;4.0-7.24.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988674" version="1" comment="libicu-x86 is &lt;4.0-7.24.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988675" version="1" comment="libltdl7 is &lt;2.2.6-2.131.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988676" version="1" comment="libltdl7-32bit is &lt;2.2.6-2.131.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988677" version="1" comment="libltdl7-x86 is &lt;2.2.6-2.131.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988678" version="1" comment="libtool is &lt;2.2.6-2.131.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988679" version="1" comment="libtool-32bit is &lt;2.2.6-2.131.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988680" version="1" comment="libtool-x86 is &lt;2.2.6-2.131.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988681" version="1" comment="libmusicbrainz4 is &lt;2.1.5-5.18 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988682" version="1" comment="libmysqlclient15 is &lt;5.0.67-13.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988683" version="1" comment="libmysqlclient15-32bit is &lt;5.0.67-13.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988684" version="1" comment="libmysqlclient15-x86 is &lt;5.0.67-13.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988685" version="1" comment="libmysqlclient_r15 is &lt;5.0.67-13.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988686" version="1" comment="mysql is &lt;5.0.67-13.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988687" version="1" comment="mysql-Max is &lt;5.0.67-13.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988688" version="1" comment="mysql-client is &lt;5.0.67-13.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988689" version="1" comment="libneon27 is &lt;0.28.3-2.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988690" version="1" comment="libneon27-32bit is &lt;0.28.3-2.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988691" version="1" comment="libneon27-x86 is &lt;0.28.3-2.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988692" version="1" comment="neon is &lt;0.28.3-2.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988693" version="1" comment="libnetpbm10 is &lt;10.26.44-101.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988694" version="1" comment="libnetpbm10-32bit is &lt;10.26.44-101.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988695" version="1" comment="libnetpbm10-x86 is &lt;10.26.44-101.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988696" version="1" comment="netpbm is &lt;10.26.44-101.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988697" version="1" comment="libopensc2 is &lt;0.11.6-5.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988698" version="1" comment="libopensc2-32bit is &lt;0.11.6-5.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988699" version="1" comment="libopensc2-x86 is &lt;0.11.6-5.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988700" version="1" comment="opensc is &lt;0.11.6-5.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988701" version="1" comment="opensc-32bit is &lt;0.11.6-5.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988702" version="1" comment="opensc-x86 is &lt;0.11.6-5.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988703" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.27.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988704" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.27.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988705" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8h-30.27.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988706" version="1" comment="openssl is &lt;0.9.8h-30.27.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988707" version="1" comment="openssl-doc is &lt;0.9.8h-30.27.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988708" version="1" comment="libpng12-0 is &lt;1.2.31-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988709" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988710" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988711" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.2.44 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988712" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.2.44 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988713" version="1" comment="libpoppler5 is &lt;0.12.3-1.2.44 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988714" version="1" comment="poppler-tools is &lt;0.12.3-1.2.44 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988715" version="1" comment="libpulse-browse0 is &lt;0.9.21-1.5.26 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988716" version="1" comment="libpulse-mainloop-glib0 is &lt;0.9.21-1.5.26 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988717" version="1" comment="libpulse0 is &lt;0.9.21-1.5.26 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988718" version="1" comment="libpulse0-32bit is &lt;0.9.21-1.5.26 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988719" version="1" comment="libpulse0-x86 is &lt;0.9.21-1.5.26 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988720" version="1" comment="pulseaudio is &lt;0.9.21-1.5.26 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988721" version="1" comment="pulseaudio-esound-compat is &lt;0.9.21-1.5.26 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988722" version="1" comment="pulseaudio-gdm-hooks is &lt;0.9.21-1.5.26 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988723" version="1" comment="pulseaudio-lang is &lt;0.9.21-1.5.26 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988724" version="1" comment="pulseaudio-module-x11 is &lt;0.9.21-1.5.26 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988725" version="1" comment="pulseaudio-module-zeroconf is &lt;0.9.21-1.5.26 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988726" version="1" comment="pulseaudio-utils is &lt;0.9.21-1.5.26 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988727" version="1" comment="libpython2_6-1_0 is &lt;2.6.0-8.9.20 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988728" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.0-8.9.20 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988729" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.0-8.9.20 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988730" version="1" comment="python-base is &lt;2.6.0-8.9.20 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988731" version="1" comment="python-base-32bit is &lt;2.6.0-8.9.20 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988732" version="1" comment="python-base-x86 is &lt;2.6.0-8.9.20 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988733" version="1" comment="python-xml is &lt;2.6.0-8.9.20 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988734" version="1" comment="pyxml is &lt;0.8.4-194.23.38 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988735" version="1" comment="librpcsecgss is &lt;0.18-1.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988736" version="1" comment="libtirpc1 is &lt;0.2.1-1.2.16 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988737" version="1" comment="libsamplerate is &lt;0.1.4-1.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988738" version="1" comment="libsamplerate-32bit is &lt;0.1.4-1.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988739" version="1" comment="libsamplerate-x86 is &lt;0.1.4-1.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988740" version="1" comment="libsndfile is &lt;1.0.20-2.1.46 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988741" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.1.46 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988742" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.1.46 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988743" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988744" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988745" version="1" comment="libsnmp15-x86 is &lt;5.4.2.1-8.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988746" version="1" comment="net-snmp is &lt;5.4.2.1-8.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988747" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988748" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988749" version="1" comment="libsoup-2_4-1 is &lt;2.28.2-0.1.151 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988750" version="1" comment="libsoup-2_4-1-32bit is &lt;2.28.2-0.1.151 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988751" version="1" comment="libsoup-2_4-1-x86 is &lt;2.28.2-0.1.151 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988752" version="1" comment="libtiff3 is &lt;3.8.2-141.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988753" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988754" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988755" version="1" comment="tiff is &lt;3.8.2-141.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988756" version="1" comment="libvirt is &lt;0.7.6-1.9.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988757" version="1" comment="libvirt-doc is &lt;0.7.6-1.9.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988758" version="1" comment="libvirt-python is &lt;0.7.6-1.9.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988759" version="1" comment="libvorbis is &lt;1.2.0-79.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988760" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988761" version="1" comment="libvorbis-doc is &lt;1.2.0-79.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988762" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988763" version="1" comment="libxml2 is &lt;2.7.6-0.1.37 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988764" version="1" comment="libxml2-32bit is &lt;2.7.6-0.1.37 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988765" version="1" comment="libxml2-doc is &lt;2.7.6-0.1.37 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988766" version="1" comment="libxml2-x86 is &lt;2.7.6-0.1.37 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988767" version="1" comment="libxslt is &lt;1.1.24-19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988768" version="1" comment="libxslt-32bit is &lt;1.1.24-19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988769" version="1" comment="libxslt-x86 is &lt;1.1.24-19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988770" version="1" comment="log4net is &lt;1.2.10-1.36 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988771" version="1" comment="mailman is &lt;2.1.12-0.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988772" version="1" comment="man is &lt;2.5.2-17.16 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988773" version="1" comment="mono-core is &lt;2.0.1-1.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988774" version="1" comment="mono-data is &lt;2.0.1-1.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988775" version="1" comment="mono-data-postgresql is &lt;2.0.1-1.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988776" version="1" comment="mono-data-sqlite is &lt;2.0.1-1.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988777" version="1" comment="mono-locale-extras is &lt;2.0.1-1.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988778" version="1" comment="mono-nunit is &lt;2.0.1-1.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988779" version="1" comment="mono-web is &lt;2.0.1-1.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988780" version="1" comment="mono-winforms is &lt;2.0.1-1.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988781" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.19-0.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988782" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.19-0.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988783" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.19-0.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988784" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.19-0.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988785" version="1" comment="mozilla-xulrunner190-x86 is &lt;1.9.0.19-0.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988786" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.9-1.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988787" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.9-1.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988788" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.9-1.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988789" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.9-1.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988790" version="1" comment="mozilla-xulrunner191-x86 is &lt;1.9.1.9-1.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988791" version="1" comment="mutt is &lt;1.5.17-42.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988792" version="1" comment="nagios is &lt;3.0.6-1.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988793" version="1" comment="nagios-www is &lt;3.0.6-1.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988794" version="1" comment="nagios-plugins is &lt;1.4.13-1.35 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988795" version="1" comment="nagios-plugins-extras is &lt;1.4.13-1.35 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988796" version="1" comment="ntp is &lt;4.2.4p8-1.3.28 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988797" version="1" comment="ntp-doc is &lt;4.2.4p8-1.3.28 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988798" version="1" comment="openssh is &lt;5.1p1-41.31.36 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988799" version="1" comment="openssh-askpass is &lt;5.1p1-41.31.36 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988800" version="1" comment="openswan is &lt;2.6.16-1.34.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988801" version="1" comment="openswan-doc is &lt;2.6.16-1.34.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988802" version="1" comment="openvpn is &lt;2.0.9-143.31 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988803" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.31 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988804" version="1" comment="pam is &lt;1.0.4-0.5.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988805" version="1" comment="pam-32bit is &lt;1.0.4-0.5.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988806" version="1" comment="pam-doc is &lt;1.0.4-0.5.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988807" version="1" comment="pam-x86 is &lt;1.0.4-0.5.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988808" version="1" comment="pam_krb5 is &lt;2.3.1-47.10.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988809" version="1" comment="pam_krb5-32bit is &lt;2.3.1-47.10.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988810" version="1" comment="pam_krb5-x86 is &lt;2.3.1-47.10.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988811" version="1" comment="pam_ldap is &lt;184-147.20 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988812" version="1" comment="pam_ldap-32bit is &lt;184-147.20 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988813" version="1" comment="pam_ldap-x86 is &lt;184-147.20 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988814" version="1" comment="pam_mount is &lt;0.47-13.13.65 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988815" version="1" comment="pam_mount-32bit is &lt;0.47-13.13.65 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988816" version="1" comment="pam_mount-x86 is &lt;0.47-13.13.65 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988817" version="1" comment="perl is &lt;5.10.0-64.47.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988818" version="1" comment="perl-32bit is &lt;5.10.0-64.47.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988819" version="1" comment="perl-base is &lt;5.10.0-64.47.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988820" version="1" comment="perl-doc is &lt;5.10.0-64.47.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988821" version="1" comment="perl-x86 is &lt;5.10.0-64.47.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988822" version="1" comment="perl-HTML-Parser is &lt;3.56-1.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988823" version="1" comment="perl-Tk is &lt;804.028-50.24 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988824" version="1" comment="perl-spamassassin is &lt;3.2.5-26.22.18 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988825" version="1" comment="spamassassin is &lt;3.2.5-26.22.18 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988826" version="1" comment="postgresql is &lt;8.3.9-0.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988827" version="1" comment="postgresql-contrib is &lt;8.3.9-0.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988828" version="1" comment="postgresql-docs is &lt;8.3.9-0.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988829" version="1" comment="postgresql-libs is &lt;8.3.9-0.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988830" version="1" comment="postgresql-libs-32bit is &lt;8.3.9-0.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988831" version="1" comment="postgresql-libs-x86 is &lt;8.3.9-0.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988832" version="1" comment="postgresql-server is &lt;8.3.9-0.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988833" version="1" comment="puppet is &lt;0.24.8-1.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988834" version="1" comment="puppet-server is &lt;0.24.8-1.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988835" version="1" comment="python is &lt;2.6.0-8.9.28 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988836" version="1" comment="python-32bit is &lt;2.6.0-8.9.28 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988837" version="1" comment="python-curses is &lt;2.6.0-8.9.28 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988838" version="1" comment="python-demo is &lt;2.6.0-8.9.28 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988839" version="1" comment="python-gdbm is &lt;2.6.0-8.9.28 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988840" version="1" comment="python-idle is &lt;2.6.0-8.9.28 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988841" version="1" comment="python-tk is &lt;2.6.0-8.9.28 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988842" version="1" comment="python-x86 is &lt;2.6.0-8.9.28 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988843" version="1" comment="qt3 is &lt;3.3.8b-88.21 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988844" version="1" comment="qt3-32bit is &lt;3.3.8b-88.21 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988845" version="1" comment="qt3-x86 is &lt;3.3.8b-88.21 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988846" version="1" comment="quagga is &lt;0.99.15-0.1.55 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988847" version="1" comment="rsync is &lt;3.0.4-2.33.82 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988848" version="1" comment="ruby is &lt;1.8.7.p72-5.24.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988849" version="1" comment="ruby-doc-html is &lt;1.8.7.p72-5.24.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988850" version="1" comment="ruby-tk is &lt;1.8.7.p72-5.24.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988851" version="1" comment="squid is &lt;2.7.STABLE5-2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988852" version="1" comment="star is &lt;1.5final-28.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988853" version="1" comment="sudo is &lt;1.6.9p17-21.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988854" version="1" comment="syslog-ng is &lt;2.0.9-27.27.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988855" version="1" comment="sysstat is &lt;8.1.5-7.9.56 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988856" version="1" comment="sysstat-isag is &lt;8.1.5-7.9.56 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988857" version="1" comment="systemtap is &lt;1.0-0.15.16 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988858" version="1" comment="systemtap-client is &lt;1.0-0.15.16 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988859" version="1" comment="systemtap-server is &lt;1.0-0.15.16 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988860" version="1" comment="tar is &lt;1.20-23.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988861" version="1" comment="unrar is &lt;3.80.2-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988862" version="1" comment="unzip is &lt;5.52-142.23.43 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988863" version="1" comment="w3m is &lt;0.5.2-132.1.37 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988864" version="1" comment="wget is &lt;1.11.4-1.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988865" version="1" comment="wireshark is &lt;1.0.5-1.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988866" version="1" comment="xdg-utils is &lt;1.0.2-36.18 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988867" version="1" comment="xen is &lt;4.0.0_21091_04-0.2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988868" version="1" comment="xen-doc-html is &lt;4.0.0_21091_04-0.2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988869" version="1" comment="xen-doc-pdf is &lt;4.0.0_21091_04-0.2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988870" version="1" comment="xen-kmp-default is &lt;4.0.0_21091_04_2.6.32.12_0.7-0.2.6 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988871" version="1" comment="xen-kmp-pae is &lt;4.0.0_21091_04_2.6.32.12_0.7-0.2.6 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988872" version="1" comment="xen-libs is &lt;4.0.0_21091_04-0.2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988873" version="1" comment="xen-tools is &lt;4.0.0_21091_04-0.2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988874" version="1" comment="xen-tools-domU is &lt;4.0.0_21091_04-0.2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988875" version="1" comment="xorg-x11 is &lt;7.4-9.24.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988876" version="1" comment="xorg-x11-xauth is &lt;7.4-9.24.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988877" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.19.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988878" version="1" comment="xorg-x11-server is &lt;7.4-27.19.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988879" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.19.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988880" version="1" comment="xpdf-tools is &lt;3.02-138.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988881" version="1" comment="xterm is &lt;238-1.16 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988882" version="1" comment="zoo is &lt;2.10-911.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073673" version="1" comment="sles-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988883" version="1" comment="MozillaFirefox is &lt;10.0-0.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988884" version="1" comment="MozillaFirefox-translations is &lt;10.0-0.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988885" version="1" comment="NetworkManager is &lt;0.7.1_git20090811-3.20.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988886" version="1" comment="NetworkManager-glib is &lt;0.7.1_git20090811-3.20.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988887" version="1" comment="NetworkManager-gnome is &lt;0.7.1-5.22.28 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988888" version="1" comment="PackageKit is &lt;0.3.14-2.23.126 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988889" version="1" comment="PackageKit-lang is &lt;0.3.14-2.23.126 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988890" version="1" comment="hal is &lt;0.5.12-23.58.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988891" version="1" comment="hal-32bit is &lt;0.5.12-23.58.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988892" version="1" comment="hal-doc is &lt;0.5.12-23.58.21 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988893" version="1" comment="hal-x86 is &lt;0.5.12-23.58.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988894" version="1" comment="libpackagekit-glib10 is &lt;0.3.14-2.23.126 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988895" version="1" comment="PolicyKit is &lt;0.9-14.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988896" version="1" comment="PolicyKit-32bit is &lt;0.9-14.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988897" version="1" comment="PolicyKit-doc is &lt;0.9-14.39.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988898" version="1" comment="PolicyKit-x86 is &lt;0.9-14.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988899" version="1" comment="aaa_base is &lt;11-6.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988900" version="1" comment="acpid is &lt;1.0.6-91.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988901" version="1" comment="amavisd-new is &lt;2.7.0-18.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988902" version="1" comment="apache2 is &lt;2.2.12-1.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988903" version="1" comment="apache2-doc is &lt;2.2.12-1.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988904" version="1" comment="apache2-example-pages is &lt;2.2.12-1.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988905" version="1" comment="apache2-prefork is &lt;2.2.12-1.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988906" version="1" comment="apache2-utils is &lt;2.2.12-1.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988907" version="1" comment="apache2-worker is &lt;2.2.12-1.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988908" version="1" comment="apache2-mod_jk is &lt;1.2.26-1.30.110 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988909" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988910" version="1" comment="php5 is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988911" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988912" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988913" version="1" comment="php5-calendar is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988914" version="1" comment="php5-ctype is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988915" version="1" comment="php5-curl is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988916" version="1" comment="php5-dba is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988917" version="1" comment="php5-dbase is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988918" version="1" comment="php5-dom is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988919" version="1" comment="php5-exif is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988920" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988921" version="1" comment="php5-ftp is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988922" version="1" comment="php5-gd is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988923" version="1" comment="php5-gettext is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988924" version="1" comment="php5-gmp is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988925" version="1" comment="php5-hash is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988926" version="1" comment="php5-iconv is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988927" version="1" comment="php5-json is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988928" version="1" comment="php5-ldap is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988929" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988930" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988931" version="1" comment="php5-mysql is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988932" version="1" comment="php5-odbc is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988933" version="1" comment="php5-openssl is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988934" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988935" version="1" comment="php5-pdo is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988936" version="1" comment="php5-pear is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988937" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988938" version="1" comment="php5-pspell is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988939" version="1" comment="php5-shmop is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988940" version="1" comment="php5-snmp is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988941" version="1" comment="php5-soap is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988942" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988943" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988944" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988945" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988946" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988947" version="1" comment="php5-wddx is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988948" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988949" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988950" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988951" version="1" comment="php5-xsl is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988952" version="1" comment="php5-zip is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988953" version="1" comment="php5-zlib is &lt;5.2.14-0.7.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988954" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988955" version="1" comment="php53 is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988956" version="1" comment="php53-bcmath is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988957" version="1" comment="php53-bz2 is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988958" version="1" comment="php53-calendar is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988959" version="1" comment="php53-ctype is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988960" version="1" comment="php53-curl is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988961" version="1" comment="php53-dba is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988962" version="1" comment="php53-dom is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988963" version="1" comment="php53-exif is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988964" version="1" comment="php53-fastcgi is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988965" version="1" comment="php53-fileinfo is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988966" version="1" comment="php53-ftp is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988967" version="1" comment="php53-gd is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988968" version="1" comment="php53-gettext is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988969" version="1" comment="php53-gmp is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988970" version="1" comment="php53-iconv is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988971" version="1" comment="php53-intl is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988972" version="1" comment="php53-json is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988973" version="1" comment="php53-ldap is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988974" version="1" comment="php53-mbstring is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988975" version="1" comment="php53-mcrypt is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988976" version="1" comment="php53-mysql is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988977" version="1" comment="php53-odbc is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988978" version="1" comment="php53-openssl is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988979" version="1" comment="php53-pcntl is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988980" version="1" comment="php53-pdo is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988981" version="1" comment="php53-pear is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988982" version="1" comment="php53-pgsql is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988983" version="1" comment="php53-pspell is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988984" version="1" comment="php53-shmop is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988985" version="1" comment="php53-snmp is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988986" version="1" comment="php53-soap is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988987" version="1" comment="php53-suhosin is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988988" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988989" version="1" comment="php53-sysvsem is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988990" version="1" comment="php53-sysvshm is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988991" version="1" comment="php53-tokenizer is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988992" version="1" comment="php53-wddx is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988993" version="1" comment="php53-xmlreader is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988994" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988995" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988996" version="1" comment="php53-xsl is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988997" version="1" comment="php53-zip is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988998" version="1" comment="php53-zlib is &lt;5.3.8-0.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988999" version="1" comment="bind is &lt;9.6ESVR5P1-0.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989000" version="1" comment="bind-chrootenv is &lt;9.6ESVR5P1-0.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989001" version="1" comment="bind-doc is &lt;9.6ESVR5P1-0.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989002" version="1" comment="bind-libs is &lt;9.6ESVR5P1-0.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989003" version="1" comment="bind-libs-32bit is &lt;9.6ESVR5P1-0.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989004" version="1" comment="bind-libs-x86 is &lt;9.6ESVR5P1-0.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989005" version="1" comment="bind-utils is &lt;9.6ESVR5P1-0.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989006" version="1" comment="bzip2 is &lt;1.0.5-34.253.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989007" version="1" comment="bzip2-doc is &lt;1.0.5-34.253.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989008" version="1" comment="libbz2-1 is &lt;1.0.5-34.253.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989009" version="1" comment="libbz2-1-32bit is &lt;1.0.5-34.253.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989010" version="1" comment="libbz2-1-x86 is &lt;1.0.5-34.253.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989011" version="1" comment="cifs-utils is &lt;5.1-0.4.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989012" version="1" comment="clamav is &lt;0.97.3-0.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989013" version="1" comment="cron is &lt;4.1-194.199.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989014" version="1" comment="cups is &lt;1.3.9-8.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989015" version="1" comment="cups-client is &lt;1.3.9-8.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989016" version="1" comment="cups-libs is &lt;1.3.9-8.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989017" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989018" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989019" version="1" comment="curl is &lt;7.19.7-1.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989020" version="1" comment="libcurl4 is &lt;7.19.7-1.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989021" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989022" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989023" version="1" comment="cyrus-imapd is &lt;2.3.11-60.65.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989024" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.65.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989025" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.65.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989026" version="1" comment="dbus-1 is &lt;1.2.10-3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989027" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989028" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989029" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989030" version="1" comment="dbus-1-glib is &lt;0.76-34.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989031" version="1" comment="dbus-1-glib-32bit is &lt;0.76-34.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989032" version="1" comment="dbus-1-glib-x86 is &lt;0.76-34.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989033" version="1" comment="dhcp is &lt;4.2.3.P2-0.7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989034" version="1" comment="dhcp-client is &lt;4.2.3.P2-0.7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989035" version="1" comment="dhcp-relay is &lt;4.2.3.P2-0.7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989036" version="1" comment="dhcp-server is &lt;4.2.3.P2-0.7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989037" version="1" comment="dhcpcd is &lt;3.2.3-44.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989038" version="1" comment="dhcpv6 is &lt;1.0.22-3.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989039" version="1" comment="e2fsprogs is &lt;1.41.9-2.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989040" version="1" comment="libcom_err2 is &lt;1.41.9-2.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989041" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989042" version="1" comment="libcom_err2-x86 is &lt;1.41.9-2.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989043" version="1" comment="libext2fs2 is &lt;1.41.9-2.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989044" version="1" comment="ecryptfs-utils is &lt;61-1.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989045" version="1" comment="ecryptfs-utils-32bit is &lt;61-1.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989046" version="1" comment="ecryptfs-utils-x86 is &lt;61-1.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989047" version="1" comment="ed is &lt;0.2-1001.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989048" version="1" comment="emacs is &lt;22.3-4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989049" version="1" comment="emacs-el is &lt;22.3-4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989050" version="1" comment="emacs-info is &lt;22.3-4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989051" version="1" comment="emacs-nox is &lt;22.3-4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989052" version="1" comment="emacs-x11 is &lt;22.3-4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989053" version="1" comment="enscript is &lt;1.6.4-152.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989054" version="1" comment="evince is &lt;2.28.2-0.7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989055" version="1" comment="evince-doc is &lt;2.28.2-0.7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989056" version="1" comment="evince-lang is &lt;2.28.2-0.7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989057" version="1" comment="evolution-data-server is &lt;2.28.2-0.26.33.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989058" version="1" comment="evolution-data-server-32bit is &lt;2.28.2-0.26.33.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989059" version="1" comment="evolution-data-server-lang is &lt;2.28.2-0.26.33.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989060" version="1" comment="evolution-data-server-x86 is &lt;2.28.2-0.26.33.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989061" version="1" comment="fetchmail is &lt;6.3.8.90-13.20.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989062" version="1" comment="fetchmailconf is &lt;6.3.8.90-13.20.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989063" version="1" comment="file is &lt;4.24-43.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989064" version="1" comment="file-32bit is &lt;4.24-43.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989065" version="1" comment="file-x86 is &lt;4.24-43.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989066" version="1" comment="findutils is &lt;4.4.0-38.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989067" version="1" comment="findutils-locate is &lt;4.4.0-38.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989068" version="1" comment="foomatic-filters is &lt;3.0.2-269.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989069" version="1" comment="freeradius-server is &lt;2.1.1-7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989070" version="1" comment="freetype2 is &lt;2.3.7-25.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989071" version="1" comment="freetype2-32bit is &lt;2.3.7-25.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989072" version="1" comment="freetype2-x86 is &lt;2.3.7-25.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989073" version="1" comment="fuse is &lt;2.7.2-61.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989074" version="1" comment="libfuse2 is &lt;2.7.2-61.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989075" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989076" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989077" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989078" version="1" comment="ghostscript-library is &lt;8.62-32.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989079" version="1" comment="ghostscript-omni is &lt;8.62-32.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989080" version="1" comment="ghostscript-x11 is &lt;8.62-32.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989081" version="1" comment="libgimpprint is &lt;4.2.7-32.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989082" version="1" comment="glibc is &lt;2.11.3-17.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989083" version="1" comment="glibc-32bit is &lt;2.11.3-17.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989084" version="1" comment="glibc-devel is &lt;2.11.3-17.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989085" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989086" version="1" comment="glibc-html is &lt;2.11.3-17.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989087" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989088" version="1" comment="glibc-info is &lt;2.11.3-17.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989089" version="1" comment="glibc-locale is &lt;2.11.3-17.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989090" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989091" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989092" version="1" comment="glibc-profile is &lt;2.11.3-17.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989093" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989094" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989095" version="1" comment="glibc-x86 is &lt;2.11.3-17.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989096" version="1" comment="nscd is &lt;2.11.3-17.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989097" version="1" comment="gmime is &lt;2.2.23-1.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989098" version="1" comment="gmime-doc is &lt;2.2.23-1.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989099" version="1" comment="libgmime-2_0-3 is &lt;2.2.23-1.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989100" version="1" comment="gnome-screensaver is &lt;2.28.3-0.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989101" version="1" comment="gnome-screensaver-lang is &lt;2.28.3-0.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989102" version="1" comment="gnutls is &lt;2.4.1-24.39.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989103" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989104" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989105" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989106" version="1" comment="gpg2 is &lt;2.0.9-25.33.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989107" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989108" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.35-5.15.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989109" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.35-5.15.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989110" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.35-5.15.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989111" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.35-5.15.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989112" version="1" comment="gstreamer-0_10-plugins-base-x86 is &lt;0.10.35-5.15.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989113" version="1" comment="libgstapp-0_10-0 is &lt;0.10.35-5.15.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989114" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.35-5.15.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989115" version="1" comment="libgstapp-0_10-0-x86 is &lt;0.10.35-5.15.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989116" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.35-5.15.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989117" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.35-5.15.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989118" version="1" comment="libgstinterfaces-0_10-0-x86 is &lt;0.10.35-5.15.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989119" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.30-5.8.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989120" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.30-5.8.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989121" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.30-5.8.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989122" version="1" comment="gtk2 is &lt;2.18.9-0.21.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989123" version="1" comment="gtk2-32bit is &lt;2.18.9-0.21.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989124" version="1" comment="gtk2-doc is &lt;2.18.9-0.21.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989125" version="1" comment="gtk2-lang is &lt;2.18.9-0.21.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989126" version="1" comment="gtk2-x86 is &lt;2.18.9-0.21.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989127" version="1" comment="gvim is &lt;7.2-8.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989128" version="1" comment="vim is &lt;7.2-8.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989129" version="1" comment="vim-base is &lt;7.2-8.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989130" version="1" comment="vim-data is &lt;7.2-8.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989131" version="1" comment="hplip is &lt;3.11.10-0.6.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989132" version="1" comment="hplip-hpijs is &lt;3.11.10-0.6.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989133" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.10-0.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989134" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.10-0.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989135" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.10-0.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989136" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr9.3-0.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989137" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr9.3-0.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989138" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr9.3-0.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989139" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr9.3-0.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989140" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr9.3-0.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989141" version="1" comment="kbd is &lt;1.14.1-16.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989142" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.10.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989143" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.10.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989144" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.10.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989145" version="1" comment="kdm is &lt;4.3.5-0.10.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989146" version="1" comment="kwin is &lt;4.3.5-0.10.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989147" version="1" comment="kdelibs4 is &lt;4.3.5-0.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989148" version="1" comment="kdelibs4-core is &lt;4.3.5-0.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989149" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989150" version="1" comment="libkde4 is &lt;4.3.5-0.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989151" version="1" comment="libkde4-32bit is &lt;4.3.5-0.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989152" version="1" comment="libkde4-x86 is &lt;4.3.5-0.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989153" version="1" comment="libkdecore4 is &lt;4.3.5-0.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989154" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989155" version="1" comment="libkdecore4-x86 is &lt;4.3.5-0.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989156" version="1" comment="kdenetwork4-filesharing is &lt;4.3.5-0.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989157" version="1" comment="kget is &lt;4.3.5-0.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989158" version="1" comment="kopete is &lt;4.3.5-0.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989159" version="1" comment="krdc is &lt;4.3.5-0.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989160" version="1" comment="krfb is &lt;4.3.5-0.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989161" version="1" comment="kernel-default is &lt;3.0.13-0.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989162" version="1" comment="kernel-default-base is &lt;3.0.13-0.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989164" version="1" comment="kernel-default-man is &lt;3.0.13-0.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989165" version="1" comment="kernel-pae is &lt;3.0.13-0.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989166" version="1" comment="kernel-pae-base is &lt;3.0.13-0.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989168" version="1" comment="kernel-ppc64 is &lt;3.0.13-0.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989169" version="1" comment="kernel-ppc64-base is &lt;3.0.13-0.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989171" version="1" comment="kernel-source is &lt;3.0.13-0.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989172" version="1" comment="kernel-syms is &lt;3.0.13-0.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989173" version="1" comment="kernel-trace is &lt;3.0.13-0.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989174" version="1" comment="kernel-trace-base is &lt;3.0.13-0.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989176" version="1" comment="kernel-xen is &lt;3.0.13-0.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989177" version="1" comment="kernel-xen-base is &lt;3.0.13-0.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989179" version="1" comment="krb5 is &lt;1.6.3-133.48.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989180" version="1" comment="krb5-32bit is &lt;1.6.3-133.48.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989181" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.48.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989182" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.48.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989183" version="1" comment="krb5-client is &lt;1.6.3-133.48.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989184" version="1" comment="krb5-server is &lt;1.6.3-133.48.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989185" version="1" comment="krb5-x86 is &lt;1.6.3-133.48.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989186" version="1" comment="kvm is &lt;0.15.1-0.17.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989187" version="1" comment="ldapsmb is &lt;1.34b-12.18.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989188" version="1" comment="libldb1 is &lt;3.6.3-0.18.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989189" version="1" comment="libsmbclient0 is &lt;3.6.3-0.18.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989190" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.18.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989191" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.18.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989192" version="1" comment="libtalloc2 is &lt;3.6.3-0.18.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989193" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.18.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989194" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.18.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989195" version="1" comment="libtdb1 is &lt;3.6.3-0.18.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989196" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.18.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989197" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.18.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989198" version="1" comment="libtevent0 is &lt;3.6.3-0.18.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989199" version="1" comment="libwbclient0 is &lt;3.6.3-0.18.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989200" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.18.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989201" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.18.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989202" version="1" comment="samba is &lt;3.6.3-0.18.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989203" version="1" comment="samba-32bit is &lt;3.6.3-0.18.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989204" version="1" comment="samba-client is &lt;3.6.3-0.18.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989205" version="1" comment="samba-client-32bit is &lt;3.6.3-0.18.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989206" version="1" comment="samba-client-x86 is &lt;3.6.3-0.18.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989207" version="1" comment="samba-krb-printing is &lt;3.6.3-0.18.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989208" version="1" comment="samba-winbind is &lt;3.6.3-0.18.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989209" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.18.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989210" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.18.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989211" version="1" comment="samba-x86 is &lt;3.6.3-0.18.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989212" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989213" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989214" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989215" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989216" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989217" version="1" comment="libqt4 is &lt;4.6.3-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989218" version="1" comment="libqt4-32bit is &lt;4.6.3-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989219" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989220" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989221" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989222" version="1" comment="libqt4-sql is &lt;4.6.3-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989223" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989224" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989225" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989226" version="1" comment="libqt4-x11 is &lt;4.6.3-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989227" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989228" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989229" version="1" comment="libqt4-x86 is &lt;4.6.3-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989230" version="1" comment="libapr-util1 is &lt;1.3.4-12.22.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989231" version="1" comment="libapr-util1-32bit is &lt;1.3.4-12.22.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989232" version="1" comment="libapr1 is &lt;1.3.3-11.18.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989233" version="1" comment="libapr1-32bit is &lt;1.3.3-11.18.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989234" version="1" comment="libcap-progs is &lt;2.11-2.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989235" version="1" comment="libcap2 is &lt;2.11-2.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989236" version="1" comment="libcap2-32bit is &lt;2.11-2.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989237" version="1" comment="libcap2-x86 is &lt;2.11-2.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989238" version="1" comment="libcgroup1 is &lt;0.34-2.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989239" version="1" comment="libdrm is &lt;2.4.27-0.6.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989240" version="1" comment="libdrm-32bit is &lt;2.4.27-0.6.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989241" version="1" comment="libdrm-x86 is &lt;2.4.27-0.6.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989242" version="1" comment="libfreebl3 is &lt;3.13.1-0.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989243" version="1" comment="libfreebl3-32bit is &lt;3.13.1-0.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989244" version="1" comment="libfreebl3-x86 is &lt;3.13.1-0.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989245" version="1" comment="mozilla-nss is &lt;3.13.1-0.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989246" version="1" comment="mozilla-nss-32bit is &lt;3.13.1-0.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989247" version="1" comment="mozilla-nss-tools is &lt;3.13.1-0.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989248" version="1" comment="mozilla-nss-x86 is &lt;3.13.1-0.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989249" version="1" comment="libgdiplus0 is &lt;2.6.7-0.5.76 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989250" version="1" comment="libgnomesu is &lt;1.0.0-307.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989251" version="1" comment="libgnomesu-lang is &lt;1.0.0-307.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989252" version="1" comment="libgnomesu0 is &lt;1.0.0-307.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989253" version="1" comment="libicu is &lt;4.0-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989254" version="1" comment="libicu-32bit is &lt;4.0-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989255" version="1" comment="libicu-doc is &lt;4.0-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989256" version="1" comment="libmysqlclient15 is &lt;5.0.94-0.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989257" version="1" comment="libmysqlclient15-32bit is &lt;5.0.94-0.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989258" version="1" comment="libmysqlclient15-x86 is &lt;5.0.94-0.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989259" version="1" comment="libmysqlclient_r15 is &lt;5.0.94-0.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989260" version="1" comment="mysql is &lt;5.0.94-0.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989261" version="1" comment="mysql-Max is &lt;5.0.94-0.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989262" version="1" comment="mysql-client is &lt;5.0.94-0.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989263" version="1" comment="mysql-tools is &lt;5.0.94-0.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989264" version="1" comment="libneon27 is &lt;0.29.6-6.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989265" version="1" comment="libneon27-32bit is &lt;0.29.6-6.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989266" version="1" comment="libneon27-x86 is &lt;0.29.6-6.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989267" version="1" comment="libnewt0_52 is &lt;0.52.10-1.35.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989268" version="1" comment="newt is &lt;0.52.10-1.35.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989269" version="1" comment="python-newt is &lt;0.52.10-1.35.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989270" version="1" comment="libopensc2 is &lt;0.11.6-5.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989271" version="1" comment="libopensc2-32bit is &lt;0.11.6-5.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989272" version="1" comment="libopensc2-x86 is &lt;0.11.6-5.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989273" version="1" comment="opensc is &lt;0.11.6-5.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989274" version="1" comment="opensc-32bit is &lt;0.11.6-5.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989275" version="1" comment="opensc-x86 is &lt;0.11.6-5.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989276" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989277" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989278" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989279" version="1" comment="openssl is &lt;0.9.8j-0.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989280" version="1" comment="openssl-doc is &lt;0.9.8j-0.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989281" version="1" comment="libpng12-0 is &lt;1.2.31-5.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989282" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989283" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989284" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989285" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989286" version="1" comment="libpoppler5 is &lt;0.12.3-1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989287" version="1" comment="poppler-tools is &lt;0.12.3-1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989288" version="1" comment="libpulse-browse0 is &lt;0.9.23-0.7.128 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989289" version="1" comment="libpulse-mainloop-glib0 is &lt;0.9.23-0.7.128 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989290" version="1" comment="libpulse0 is &lt;0.9.23-0.7.128 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989291" version="1" comment="libpulse0-32bit is &lt;0.9.23-0.7.128 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989292" version="1" comment="libpulse0-x86 is &lt;0.9.23-0.7.128 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989293" version="1" comment="pulseaudio is &lt;0.9.23-0.7.128 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989294" version="1" comment="pulseaudio-esound-compat is &lt;0.9.23-0.7.128 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989295" version="1" comment="pulseaudio-gdm-hooks is &lt;0.9.23-0.7.128 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989296" version="1" comment="pulseaudio-lang is &lt;0.9.23-0.7.128 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989297" version="1" comment="pulseaudio-module-x11 is &lt;0.9.23-0.7.128 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989298" version="1" comment="pulseaudio-module-zeroconf is &lt;0.9.23-0.7.128 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989299" version="1" comment="pulseaudio-utils is &lt;0.9.23-0.7.128 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989300" version="1" comment="libpython2_6-1_0 is &lt;2.6.0-8.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989301" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.0-8.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989302" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.0-8.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989303" version="1" comment="python-base is &lt;2.6.0-8.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989304" version="1" comment="python-base-32bit is &lt;2.6.0-8.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989305" version="1" comment="python-base-x86 is &lt;2.6.0-8.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989306" version="1" comment="python-xml is &lt;2.6.0-8.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989307" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989308" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989309" version="1" comment="libtirpc1 is &lt;0.2.1-1.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989310" version="1" comment="librsvg is &lt;2.26.0-2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989311" version="1" comment="librsvg-32bit is &lt;2.26.0-2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989312" version="1" comment="librsvg-x86 is &lt;2.26.0-2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989313" version="1" comment="rsvg-view is &lt;2.26.0-2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989314" version="1" comment="libsndfile is &lt;1.0.20-2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989315" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989316" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989317" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989318" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989319" version="1" comment="libsnmp15-x86 is &lt;5.4.2.1-8.12.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989320" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989321" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989322" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989323" version="1" comment="libsoup-2_4-1 is &lt;2.32.2-4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989324" version="1" comment="libsoup-2_4-1-32bit is &lt;2.32.2-4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989325" version="1" comment="libsoup-2_4-1-x86 is &lt;2.32.2-4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989326" version="1" comment="libtiff3 is &lt;3.8.2-141.142.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989327" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.142.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989328" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.142.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989329" version="1" comment="tiff is &lt;3.8.2-141.142.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989330" version="1" comment="libvirt is &lt;0.9.6-0.13.42 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989331" version="1" comment="libvirt-client is &lt;0.9.6-0.13.42 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989332" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.13.42 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989333" version="1" comment="libvirt-doc is &lt;0.9.6-0.13.42 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989334" version="1" comment="libvirt-python is &lt;0.9.6-0.13.42 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989335" version="1" comment="libvorbis is &lt;1.2.0-79.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989336" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989337" version="1" comment="libvorbis-doc is &lt;1.2.0-79.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989338" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989339" version="1" comment="libxcrypt is &lt;3.0.3-0.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989340" version="1" comment="libxcrypt-32bit is &lt;3.0.3-0.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989341" version="1" comment="libxcrypt-x86 is &lt;3.0.3-0.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989342" version="1" comment="pam-modules is &lt;11-1.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989343" version="1" comment="pam-modules-32bit is &lt;11-1.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989344" version="1" comment="pam-modules-x86 is &lt;11-1.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989345" version="1" comment="pwdutils is &lt;3.2.15-0.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989346" version="1" comment="pwdutils-plugin-audit is &lt;3.2.15-0.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989347" version="1" comment="libxml2 is &lt;2.7.6-0.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989348" version="1" comment="libxml2-32bit is &lt;2.7.6-0.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989349" version="1" comment="libxml2-doc is &lt;2.7.6-0.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989350" version="1" comment="libxml2-x86 is &lt;2.7.6-0.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989351" version="1" comment="libzip1 is &lt;0.9-1.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989352" version="1" comment="logrotate is &lt;3.7.7-10.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989353" version="1" comment="logwatch is &lt;7.3.6-65.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989354" version="1" comment="lvm2 is &lt;2.02.84-3.25.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989355" version="1" comment="mailman is &lt;2.1.14-9.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989356" version="1" comment="mipv6d is &lt;2.0.2.umip.0.4-8.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989357" version="1" comment="mono-core is &lt;2.6.7-0.7.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989358" version="1" comment="mono-data is &lt;2.6.7-0.7.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989359" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.7.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989360" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.7.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989361" version="1" comment="mono-locale-extras is &lt;2.6.7-0.7.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989362" version="1" comment="mono-nunit is &lt;2.6.7-0.7.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989363" version="1" comment="mono-web is &lt;2.6.7-0.7.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989364" version="1" comment="mono-winforms is &lt;2.6.7-0.7.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989365" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.24-0.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989366" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.24-0.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989367" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.24-0.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989368" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.24-0.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989369" version="1" comment="mozilla-xulrunner192-x86 is &lt;1.9.2.24-0.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989370" version="1" comment="nagios is &lt;3.0.6-1.25.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989371" version="1" comment="nagios-www is &lt;3.0.6-1.25.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989372" version="1" comment="ntp is &lt;4.2.4p8-1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989373" version="1" comment="ntp-doc is &lt;4.2.4p8-1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989374" version="1" comment="ofed is &lt;1.5.2-0.22.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989375" version="1" comment="ofed-doc is &lt;1.5.2-0.22.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989376" version="1" comment="ofed-kmp-default is &lt;1.5.2_3.0.13_0.27-0.22.23 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989377" version="1" comment="ofed-kmp-pae is &lt;1.5.2_3.0.13_0.27-0.22.23 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989378" version="1" comment="ofed-kmp-ppc64 is &lt;1.5.2_3.0.13_0.27-0.22.23 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989379" version="1" comment="ofed-kmp-trace is &lt;1.5.2_3.0.13_0.27-0.22.23 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989380" version="1" comment="openslp is &lt;1.2.0-172.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989381" version="1" comment="openslp-32bit is &lt;1.2.0-172.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989382" version="1" comment="openslp-server is &lt;1.2.0-172.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989383" version="1" comment="openslp-x86 is &lt;1.2.0-172.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989384" version="1" comment="openssh is &lt;5.1p1-41.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989385" version="1" comment="openssh-askpass is &lt;5.1p1-41.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989386" version="1" comment="openswan is &lt;2.6.16-1.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989387" version="1" comment="openswan-doc is &lt;2.6.16-1.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989388" version="1" comment="opie is &lt;2.4-662.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989389" version="1" comment="opie-32bit is &lt;2.4-662.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989390" version="1" comment="opie-x86 is &lt;2.4-662.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989391" version="1" comment="pam is &lt;1.1.5-0.10.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989392" version="1" comment="pam-32bit is &lt;1.1.5-0.10.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989393" version="1" comment="pam-doc is &lt;1.1.5-0.10.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989394" version="1" comment="pam-x86 is &lt;1.1.5-0.10.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989395" version="1" comment="pango is &lt;1.26.2-1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989396" version="1" comment="pango-32bit is &lt;1.26.2-1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989397" version="1" comment="pango-doc is &lt;1.26.2-1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989398" version="1" comment="pango-x86 is &lt;1.26.2-1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989399" version="1" comment="pcsc-ccid is &lt;1.3.8-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989400" version="1" comment="pcsc-lite is &lt;1.4.102-1.37.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989401" version="1" comment="pcsc-lite-32bit is &lt;1.4.102-1.37.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989402" version="1" comment="pcsc-lite-x86 is &lt;1.4.102-1.37.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989403" version="1" comment="perl is &lt;5.10.0-64.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989404" version="1" comment="perl-32bit is &lt;5.10.0-64.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989405" version="1" comment="perl-base is &lt;5.10.0-64.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989406" version="1" comment="perl-doc is &lt;5.10.0-64.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989407" version="1" comment="perl-x86 is &lt;5.10.0-64.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989408" version="1" comment="perl-libwww-perl is &lt;5.816-2.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989409" version="1" comment="perl-spamassassin is &lt;3.3.1-10.8.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989410" version="1" comment="spamassassin is &lt;3.3.1-10.8.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989411" version="1" comment="postgresql is &lt;8.3.14-0.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989412" version="1" comment="postgresql-contrib is &lt;8.3.14-0.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989413" version="1" comment="postgresql-docs is &lt;8.3.14-0.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989414" version="1" comment="postgresql-libs is &lt;8.3.14-0.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989415" version="1" comment="postgresql-libs-32bit is &lt;8.3.14-0.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989416" version="1" comment="postgresql-libs-x86 is &lt;8.3.14-0.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989417" version="1" comment="postgresql-server is &lt;8.3.14-0.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989418" version="1" comment="puppet is &lt;2.6.12-0.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989419" version="1" comment="puppet-server is &lt;2.6.12-0.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989420" version="1" comment="pure-ftpd is &lt;1.0.22-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989421" version="1" comment="python is &lt;2.6.0-8.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989422" version="1" comment="python-32bit is &lt;2.6.0-8.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989423" version="1" comment="python-curses is &lt;2.6.0-8.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989424" version="1" comment="python-demo is &lt;2.6.0-8.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989425" version="1" comment="python-gdbm is &lt;2.6.0-8.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989426" version="1" comment="python-idle is &lt;2.6.0-8.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989427" version="1" comment="python-tk is &lt;2.6.0-8.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989428" version="1" comment="python-x86 is &lt;2.6.0-8.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989429" version="1" comment="python-sssd-config is &lt;1.5.11-0.9.96 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989430" version="1" comment="sssd is &lt;1.5.11-0.9.96 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989431" version="1" comment="sssd-32bit is &lt;1.5.11-0.9.96 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989432" version="1" comment="sssd-tools is &lt;1.5.11-0.9.96 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989433" version="1" comment="quagga is &lt;0.99.15-0.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989434" version="1" comment="radvd is &lt;1.1-1.24.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989435" version="1" comment="rsync is &lt;3.0.4-2.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989436" version="1" comment="rsyslog is &lt;5.8.7-0.5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989437" version="1" comment="rsyslog-diag-tools is &lt;5.8.7-0.5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989438" version="1" comment="rsyslog-doc is &lt;5.8.7-0.5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989439" version="1" comment="rsyslog-module-gssapi is &lt;5.8.7-0.5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989440" version="1" comment="rsyslog-module-gtls is &lt;5.8.7-0.5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989441" version="1" comment="rsyslog-module-mysql is &lt;5.8.7-0.5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989442" version="1" comment="rsyslog-module-pgsql is &lt;5.8.7-0.5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989443" version="1" comment="rsyslog-module-relp is &lt;5.8.7-0.5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989444" version="1" comment="rsyslog-module-snmp is &lt;5.8.7-0.5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989445" version="1" comment="rsyslog-module-udpspoof is &lt;5.8.7-0.5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989446" version="1" comment="ruby is &lt;1.8.7.p357-0.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989447" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989448" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989449" version="1" comment="squid is &lt;2.7.STABLE5-2.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989450" version="1" comment="squid3 is &lt;3.1.12-8.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989451" version="1" comment="squidGuard is &lt;1.4-13.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989452" version="1" comment="squidGuard-doc is &lt;1.4-13.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989453" version="1" comment="star is &lt;1.5final-28.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989454" version="1" comment="sudo is &lt;1.7.6p2-0.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989455" version="1" comment="sysconfig is &lt;0.71.47-0.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989456" version="1" comment="syslog-ng is &lt;2.0.9-27.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989457" version="1" comment="sysstat is &lt;8.1.5-7.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989458" version="1" comment="sysstat-isag is &lt;8.1.5-7.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989459" version="1" comment="system-config-printer is &lt;1.0.8-9.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989460" version="1" comment="system-config-printer-lang is &lt;1.0.8-9.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989461" version="1" comment="systemtap is &lt;1.5-0.7.54 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989462" version="1" comment="systemtap-server is &lt;1.5-0.7.54 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989463" version="1" comment="t1lib is &lt;5.1.1-100.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989464" version="1" comment="tar is &lt;1.26-1.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989465" version="1" comment="tftp is &lt;0.48-101.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989466" version="1" comment="tgt is &lt;0.9.10-0.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989467" version="1" comment="tomcat6 is &lt;6.0.18-20.35.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989468" version="1" comment="tomcat6-admin-webapps is &lt;6.0.18-20.35.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989469" version="1" comment="tomcat6-docs-webapp is &lt;6.0.18-20.35.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989470" version="1" comment="tomcat6-javadoc is &lt;6.0.18-20.35.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989471" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.18-20.35.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989472" version="1" comment="tomcat6-lib is &lt;6.0.18-20.35.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989473" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.18-20.35.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989474" version="1" comment="tomcat6-webapps is &lt;6.0.18-20.35.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989475" version="1" comment="unzip is &lt;6.00-11.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989476" version="1" comment="vte is &lt;0.22.5-0.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989477" version="1" comment="vte-doc is &lt;0.22.5-0.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989478" version="1" comment="vte-lang is &lt;0.22.5-0.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989479" version="1" comment="w3m is &lt;0.5.2-132.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989480" version="1" comment="wireshark is &lt;1.4.10-0.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989481" version="1" comment="xen is &lt;4.1.2_14-0.5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989482" version="1" comment="xen-doc-html is &lt;4.1.2_14-0.5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989483" version="1" comment="xen-doc-pdf is &lt;4.1.2_14-0.5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989484" version="1" comment="xen-kmp-default is &lt;4.1.2_14_3.0.13_0.27-0.5.5 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989485" version="1" comment="xen-kmp-pae is &lt;4.1.2_14_3.0.13_0.27-0.5.5 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989486" version="1" comment="xen-libs is &lt;4.1.2_14-0.5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989487" version="1" comment="xen-libs-32bit is &lt;4.1.2_14-0.5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989488" version="1" comment="xen-tools is &lt;4.1.2_14-0.5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989489" version="1" comment="xen-tools-domU is &lt;4.1.2_14-0.5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989490" version="1" comment="xorg-x11 is &lt;7.4-9.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989491" version="1" comment="xorg-x11-xauth is &lt;7.4-9.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989492" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.60.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989493" version="1" comment="xorg-x11-server is &lt;7.4-27.60.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989494" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.60.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989495" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989496" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989497" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989498" version="1" comment="yast2 is &lt;2.17.119-0.5.25 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989499" version="1" comment="yast2-core is &lt;2.17.44-0.5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077550" version="1" comment="sles-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989500" version="1" comment="Mesa is &lt;9.0.3-0.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989501" version="1" comment="Mesa-32bit is &lt;9.0.3-0.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989502" version="1" comment="Mesa-x86 is &lt;9.0.3-0.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989503" version="1" comment="MozillaFirefox is &lt;17.0.4esr-0.10.42 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989504" version="1" comment="MozillaFirefox-translations is &lt;17.0.4esr-0.10.42 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989505" version="1" comment="NetworkManager is &lt;0.7.1_git20090811-3.28.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989506" version="1" comment="NetworkManager-glib is &lt;0.7.1_git20090811-3.28.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989507" version="1" comment="PackageKit is &lt;0.3.14-2.28.46 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989508" version="1" comment="PackageKit-lang is &lt;0.3.14-2.28.46 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989509" version="1" comment="hal is &lt;0.5.12-23.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989510" version="1" comment="hal-32bit is &lt;0.5.12-23.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989511" version="1" comment="hal-doc is &lt;0.5.12-23.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989512" version="1" comment="hal-x86 is &lt;0.5.12-23.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989513" version="1" comment="libpackagekit-glib10 is &lt;0.3.14-2.28.46 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989514" version="1" comment="PolicyKit is &lt;0.9-14.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989515" version="1" comment="PolicyKit-32bit is &lt;0.9-14.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989516" version="1" comment="PolicyKit-x86 is &lt;0.9-14.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989517" version="1" comment="aaa_base is &lt;11-6.90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989518" version="1" comment="acpid is &lt;1.0.6-91.25.20 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989519" version="1" comment="ant is &lt;1.7.1-20.9.53 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989520" version="1" comment="ant-trax is &lt;1.7.1-16.9.65 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989521" version="1" comment="apache2 is &lt;2.2.12-1.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989522" version="1" comment="apache2-doc is &lt;2.2.12-1.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989523" version="1" comment="apache2-example-pages is &lt;2.2.12-1.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989524" version="1" comment="apache2-prefork is &lt;2.2.12-1.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989525" version="1" comment="apache2-utils is &lt;2.2.12-1.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989526" version="1" comment="apache2-worker is &lt;2.2.12-1.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989527" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989528" version="1" comment="php53 is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989529" version="1" comment="php53-bcmath is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989530" version="1" comment="php53-bz2 is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989531" version="1" comment="php53-calendar is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989532" version="1" comment="php53-ctype is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989533" version="1" comment="php53-curl is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989534" version="1" comment="php53-dba is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989535" version="1" comment="php53-dom is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989536" version="1" comment="php53-exif is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989537" version="1" comment="php53-fastcgi is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989538" version="1" comment="php53-fileinfo is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989539" version="1" comment="php53-ftp is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989540" version="1" comment="php53-gd is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989541" version="1" comment="php53-gettext is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989542" version="1" comment="php53-gmp is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989543" version="1" comment="php53-iconv is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989544" version="1" comment="php53-intl is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989545" version="1" comment="php53-json is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989546" version="1" comment="php53-ldap is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989547" version="1" comment="php53-mbstring is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989548" version="1" comment="php53-mcrypt is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989549" version="1" comment="php53-mysql is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989550" version="1" comment="php53-odbc is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989551" version="1" comment="php53-openssl is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989552" version="1" comment="php53-pcntl is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989553" version="1" comment="php53-pdo is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989554" version="1" comment="php53-pear is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989555" version="1" comment="php53-pgsql is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989556" version="1" comment="php53-pspell is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989557" version="1" comment="php53-shmop is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989558" version="1" comment="php53-snmp is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989559" version="1" comment="php53-soap is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989560" version="1" comment="php53-suhosin is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989561" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989562" version="1" comment="php53-sysvsem is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989563" version="1" comment="php53-sysvshm is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989564" version="1" comment="php53-tokenizer is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989565" version="1" comment="php53-wddx is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989566" version="1" comment="php53-xmlreader is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989567" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989568" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989569" version="1" comment="php53-xsl is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989570" version="1" comment="php53-zip is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989571" version="1" comment="php53-zlib is &lt;5.3.17-0.13.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989572" version="1" comment="apache2-mod_security2 is &lt;2.7.1-0.2.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989573" version="1" comment="ark is &lt;4.3.5-0.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989574" version="1" comment="kcalc is &lt;4.3.5-0.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989575" version="1" comment="kcharselect is &lt;4.3.5-0.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989576" version="1" comment="kdessh is &lt;4.3.5-0.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989577" version="1" comment="kdf is &lt;4.3.5-0.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989578" version="1" comment="kfloppy is &lt;4.3.5-0.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989579" version="1" comment="kgpg is &lt;4.3.5-0.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989580" version="1" comment="ktimer is &lt;4.3.5-0.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989581" version="1" comment="kwalletmanager is &lt;4.3.5-0.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989582" version="1" comment="kwikdisk is &lt;4.3.5-0.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989583" version="1" comment="okteta is &lt;4.3.5-0.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989584" version="1" comment="avahi is &lt;0.6.23-11.30.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989585" version="1" comment="avahi-lang is &lt;0.6.23-11.30.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989586" version="1" comment="avahi-utils is &lt;0.6.23-11.30.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989587" version="1" comment="libavahi-client3 is &lt;0.6.23-11.30.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989588" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-11.30.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989589" version="1" comment="libavahi-client3-x86 is &lt;0.6.23-11.30.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989590" version="1" comment="libavahi-common3 is &lt;0.6.23-11.30.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989591" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-11.30.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989592" version="1" comment="libavahi-common3-x86 is &lt;0.6.23-11.30.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989593" version="1" comment="libavahi-core5 is &lt;0.6.23-11.30.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989594" version="1" comment="libdns_sd is &lt;0.6.23-11.30.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989595" version="1" comment="libdns_sd-32bit is &lt;0.6.23-11.30.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989596" version="1" comment="libdns_sd-x86 is &lt;0.6.23-11.30.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989597" version="1" comment="bind is &lt;9.6ESVR7P4-0.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989598" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P4-0.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989599" version="1" comment="bind-doc is &lt;9.6ESVR7P4-0.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989600" version="1" comment="bind-libs is &lt;9.6ESVR7P4-0.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989601" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P4-0.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989602" version="1" comment="bind-libs-x86 is &lt;9.6ESVR7P4-0.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989603" version="1" comment="bind-utils is &lt;9.6ESVR7P4-0.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989604" version="1" comment="boost-license is &lt;1.36.0-12.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989605" version="1" comment="libboost_program_options1_36_0 is &lt;1.36.0-12.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989606" version="1" comment="libboost_regex1_36_0 is &lt;1.36.0-12.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989607" version="1" comment="libboost_signals1_36_0 is &lt;1.36.0-12.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989608" version="1" comment="libboost_thread1_36_0 is &lt;1.36.0-12.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989609" version="1" comment="cifs-utils is &lt;5.1-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989610" version="1" comment="clamav is &lt;0.97.7-0.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989611" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.24.36 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989612" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.24.36 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989613" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.24.36 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989614" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.26-0.24.36 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989615" version="1" comment="openldap2 is &lt;2.4.26-0.24.36 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989616" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.24.36 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989617" version="1" comment="openldap2-client is &lt;2.4.26-0.24.36 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989618" version="1" comment="cron is &lt;4.1-194.207.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989619" version="1" comment="cups is &lt;1.3.9-8.46.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989620" version="1" comment="cups-client is &lt;1.3.9-8.46.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989621" version="1" comment="cups-libs is &lt;1.3.9-8.46.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989622" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989623" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.46.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989624" version="1" comment="curl is &lt;7.19.7-1.26.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989625" version="1" comment="libcurl4 is &lt;7.19.7-1.26.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989626" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.26.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989627" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.26.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989628" version="1" comment="cvs is &lt;1.12.12-144.23.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989629" version="1" comment="cvs-doc is &lt;1.12.12-144.23.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989630" version="1" comment="dbus-1 is &lt;1.2.10-3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989631" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989632" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989633" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989634" version="1" comment="dhcp is &lt;4.2.4.P2-0.16.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989635" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.16.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989636" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.16.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989637" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.16.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989638" version="1" comment="dhcpcd is &lt;3.2.3-44.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989639" version="1" comment="e2fsprogs is &lt;1.41.9-2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989640" version="1" comment="libcom_err2 is &lt;1.41.9-2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989641" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989642" version="1" comment="libcom_err2-x86 is &lt;1.41.9-2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989643" version="1" comment="libext2fs2 is &lt;1.41.9-2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989644" version="1" comment="ecryptfs-utils is &lt;61-1.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989645" version="1" comment="ecryptfs-utils-32bit is &lt;61-1.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989646" version="1" comment="ecryptfs-utils-x86 is &lt;61-1.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989647" version="1" comment="evolution-data-server is &lt;2.28.2-0.29.24 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989648" version="1" comment="evolution-data-server-32bit is &lt;2.28.2-0.29.24 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989649" version="1" comment="evolution-data-server-lang is &lt;2.28.2-0.29.24 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989650" version="1" comment="evolution-data-server-x86 is &lt;2.28.2-0.29.24 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989651" version="1" comment="expat is &lt;2.0.1-88.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989652" version="1" comment="libexpat1 is &lt;2.0.1-88.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989653" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989654" version="1" comment="libexpat1-x86 is &lt;2.0.1-88.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989655" version="1" comment="file is &lt;4.24-43.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989656" version="1" comment="file-32bit is &lt;4.24-43.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989657" version="1" comment="file-x86 is &lt;4.24-43.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989658" version="1" comment="freeradius-server is &lt;2.1.1-7.16.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989659" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.16.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989660" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.16.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989661" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.16.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989662" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.16.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989663" version="1" comment="freetype2 is &lt;2.3.7-25.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989664" version="1" comment="freetype2-32bit is &lt;2.3.7-25.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989665" version="1" comment="freetype2-x86 is &lt;2.3.7-25.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989666" version="1" comment="ft2demos is &lt;2.3.7-25.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989667" version="1" comment="fuse is &lt;2.8.7-0.9.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989668" version="1" comment="libfuse2 is &lt;2.8.7-0.9.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989669" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989670" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989671" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989672" version="1" comment="ghostscript-library is &lt;8.62-32.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989673" version="1" comment="ghostscript-omni is &lt;8.62-32.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989674" version="1" comment="ghostscript-x11 is &lt;8.62-32.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989675" version="1" comment="libgimpprint is &lt;4.2.7-32.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989676" version="1" comment="glib2 is &lt;2.22.5-0.8.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989677" version="1" comment="glib2-doc is &lt;2.22.5-0.8.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989678" version="1" comment="glib2-lang is &lt;2.22.5-0.8.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989679" version="1" comment="libgio-2_0-0 is &lt;2.22.5-0.8.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989680" version="1" comment="libgio-2_0-0-32bit is &lt;2.22.5-0.8.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989681" version="1" comment="libgio-2_0-0-x86 is &lt;2.22.5-0.8.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989682" version="1" comment="libglib-2_0-0 is &lt;2.22.5-0.8.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989683" version="1" comment="libglib-2_0-0-32bit is &lt;2.22.5-0.8.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989684" version="1" comment="libglib-2_0-0-x86 is &lt;2.22.5-0.8.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989685" version="1" comment="libgmodule-2_0-0 is &lt;2.22.5-0.8.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989686" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.22.5-0.8.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989687" version="1" comment="libgmodule-2_0-0-x86 is &lt;2.22.5-0.8.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989688" version="1" comment="libgobject-2_0-0 is &lt;2.22.5-0.8.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989689" version="1" comment="libgobject-2_0-0-32bit is &lt;2.22.5-0.8.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989690" version="1" comment="libgobject-2_0-0-x86 is &lt;2.22.5-0.8.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989691" version="1" comment="libgthread-2_0-0 is &lt;2.22.5-0.8.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989692" version="1" comment="libgthread-2_0-0-32bit is &lt;2.22.5-0.8.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989693" version="1" comment="libgthread-2_0-0-x86 is &lt;2.22.5-0.8.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989694" version="1" comment="glibc is &lt;2.11.3-17.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989695" version="1" comment="glibc-32bit is &lt;2.11.3-17.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989696" version="1" comment="glibc-devel is &lt;2.11.3-17.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989697" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989698" version="1" comment="glibc-html is &lt;2.11.3-17.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989699" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989700" version="1" comment="glibc-info is &lt;2.11.3-17.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989701" version="1" comment="glibc-locale is &lt;2.11.3-17.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989702" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989703" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989704" version="1" comment="glibc-profile is &lt;2.11.3-17.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989705" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989706" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989707" version="1" comment="glibc-x86 is &lt;2.11.3-17.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989708" version="1" comment="nscd is &lt;2.11.3-17.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989709" version="1" comment="gnome-screensaver is &lt;2.28.3-0.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989710" version="1" comment="gnome-screensaver-lang is &lt;2.28.3-0.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989711" version="1" comment="gnutls is &lt;2.4.1-24.39.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989712" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989713" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989714" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989715" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989716" version="1" comment="gpg2 is &lt;2.0.9-25.33.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989717" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989718" version="1" comment="gtk2 is &lt;2.18.9-0.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989719" version="1" comment="gtk2-32bit is &lt;2.18.9-0.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989720" version="1" comment="gtk2-doc is &lt;2.18.9-0.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989721" version="1" comment="gtk2-lang is &lt;2.18.9-0.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989722" version="1" comment="gtk2-x86 is &lt;2.18.9-0.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989723" version="1" comment="guestfs-data is &lt;1.20.4-0.14.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989724" version="1" comment="guestfs-tools is &lt;1.20.4-0.14.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989725" version="1" comment="guestfsd is &lt;1.20.4-0.14.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989726" version="1" comment="libguestfs0 is &lt;1.20.4-0.14.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989727" version="1" comment="gzip is &lt;1.3.12-69.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989728" version="1" comment="hyper-v is &lt;5-0.7.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989729" version="1" comment="ibutils is &lt;1.5.7-0.7.31 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989730" version="1" comment="ibutils-32bit is &lt;1.5.7-0.7.31 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989731" version="1" comment="jakarta-commons-httpclient3 is &lt;3.0.1-253.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989732" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr13.1-0.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989733" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr13.1-0.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989734" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr13.1-0.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989735" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr13.1-0.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989736" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr13.1-0.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989737" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr4.1-0.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989738" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr4.1-0.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989739" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr4.1-0.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989740" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr4.1-0.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989741" version="1" comment="jpeg is &lt;6b-879.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989742" version="1" comment="libjpeg is &lt;6.2.0-879.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989743" version="1" comment="libjpeg-32bit is &lt;6.2.0-879.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989744" version="1" comment="libjpeg-x86 is &lt;6.2.0-879.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989745" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.12.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989746" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.12.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989747" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.12.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989748" version="1" comment="kdm is &lt;4.3.5-0.12.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989749" version="1" comment="kwin is &lt;4.3.5-0.12.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989750" version="1" comment="kdelibs4 is &lt;4.3.5-0.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989751" version="1" comment="kdelibs4-core is &lt;4.3.5-0.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989752" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989753" version="1" comment="libkde4 is &lt;4.3.5-0.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989754" version="1" comment="libkde4-32bit is &lt;4.3.5-0.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989755" version="1" comment="libkde4-x86 is &lt;4.3.5-0.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989756" version="1" comment="libkdecore4 is &lt;4.3.5-0.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989757" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989758" version="1" comment="libkdecore4-x86 is &lt;4.3.5-0.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989759" version="1" comment="kernel-default is &lt;3.0.76-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989760" version="1" comment="kernel-default-base is &lt;3.0.76-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989762" version="1" comment="kernel-default-man is &lt;3.0.76-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989763" version="1" comment="kernel-pae is &lt;3.0.76-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989764" version="1" comment="kernel-pae-base is &lt;3.0.76-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989766" version="1" comment="kernel-ppc64 is &lt;3.0.76-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989767" version="1" comment="kernel-ppc64-base is &lt;3.0.76-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989769" version="1" comment="kernel-source is &lt;3.0.76-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989770" version="1" comment="kernel-syms is &lt;3.0.76-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989771" version="1" comment="kernel-trace is &lt;3.0.76-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989772" version="1" comment="kernel-trace-base is &lt;3.0.76-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989774" version="1" comment="kernel-xen is &lt;3.0.76-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989775" version="1" comment="kernel-xen-base is &lt;3.0.76-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989777" version="1" comment="krb5 is &lt;1.6.3-133.49.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989778" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989779" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989780" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989781" version="1" comment="krb5-client is &lt;1.6.3-133.49.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989782" version="1" comment="krb5-server is &lt;1.6.3-133.49.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989783" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989784" version="1" comment="krb5-doc is &lt;1.6.3-133.49.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989785" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989786" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989787" version="1" comment="kvm is &lt;1.4.1-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989788" version="1" comment="ldapsmb is &lt;1.34b-12.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989789" version="1" comment="libldb1 is &lt;3.6.3-0.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989790" version="1" comment="libsmbclient0 is &lt;3.6.3-0.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989791" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989792" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989793" version="1" comment="libtalloc2 is &lt;3.6.3-0.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989794" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989795" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989796" version="1" comment="libtdb1 is &lt;3.6.3-0.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989797" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989798" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989799" version="1" comment="libtevent0 is &lt;3.6.3-0.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989800" version="1" comment="libwbclient0 is &lt;3.6.3-0.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989801" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989802" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989803" version="1" comment="samba is &lt;3.6.3-0.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989804" version="1" comment="samba-32bit is &lt;3.6.3-0.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989805" version="1" comment="samba-client is &lt;3.6.3-0.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989806" version="1" comment="samba-client-32bit is &lt;3.6.3-0.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989807" version="1" comment="samba-client-x86 is &lt;3.6.3-0.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989808" version="1" comment="samba-krb-printing is &lt;3.6.3-0.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989809" version="1" comment="samba-winbind is &lt;3.6.3-0.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989810" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989811" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989812" version="1" comment="samba-x86 is &lt;3.6.3-0.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989813" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989814" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989815" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.25.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989816" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.25.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989817" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.25.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989818" version="1" comment="libqt4 is &lt;4.6.3-5.25.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989819" version="1" comment="libqt4-32bit is &lt;4.6.3-5.25.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989820" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.25.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989821" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.25.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989822" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.25.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989823" version="1" comment="libqt4-sql is &lt;4.6.3-5.25.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989824" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.25.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989825" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.25.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989826" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.25.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989827" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.25.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989828" version="1" comment="libqt4-x11 is &lt;4.6.3-5.25.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989829" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.25.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989830" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.25.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989831" version="1" comment="libqt4-x86 is &lt;4.6.3-5.25.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989832" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.25.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989833" version="1" comment="libapr1 is &lt;1.3.3-11.18.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989834" version="1" comment="libapr1-32bit is &lt;1.3.3-11.18.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989835" version="1" comment="libcgroup1 is &lt;0.37.1-5.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989836" version="1" comment="libdrm is &lt;2.4.41-0.8.46 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989837" version="1" comment="libdrm-32bit is &lt;2.4.41-0.8.46 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989838" version="1" comment="libdrm-x86 is &lt;2.4.41-0.8.46 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989839" version="1" comment="libecpg6 is &lt;9.1.9-0.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989840" version="1" comment="libpq5 is &lt;9.1.9-0.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989841" version="1" comment="libpq5-32bit is &lt;9.1.9-0.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989842" version="1" comment="postgresql91 is &lt;9.1.9-0.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989843" version="1" comment="postgresql91-contrib is &lt;9.1.9-0.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989844" version="1" comment="postgresql91-docs is &lt;9.1.9-0.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989845" version="1" comment="postgresql91-server is &lt;9.1.9-0.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989846" version="1" comment="libexif is &lt;0.6.17-2.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989847" version="1" comment="libexif-32bit is &lt;0.6.17-2.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989848" version="1" comment="libexif-x86 is &lt;0.6.17-2.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989849" version="1" comment="libfreebl3 is &lt;3.14.3-0.11.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989850" version="1" comment="libfreebl3-32bit is &lt;3.14.3-0.11.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989851" version="1" comment="libfreebl3-x86 is &lt;3.14.3-0.11.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989852" version="1" comment="libsoftokn3 is &lt;3.14.3-0.11.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989853" version="1" comment="libsoftokn3-32bit is &lt;3.14.3-0.11.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989854" version="1" comment="libsoftokn3-x86 is &lt;3.14.3-0.11.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989855" version="1" comment="mozilla-nss is &lt;3.14.3-0.11.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989856" version="1" comment="mozilla-nss-32bit is &lt;3.14.3-0.11.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989857" version="1" comment="mozilla-nss-tools is &lt;3.14.3-0.11.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989858" version="1" comment="mozilla-nss-x86 is &lt;3.14.3-0.11.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989859" version="1" comment="libgtop is &lt;2.28.0-1.9.24 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989860" version="1" comment="libgtop-2_0-7 is &lt;2.28.0-1.9.24 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989861" version="1" comment="libgtop-doc is &lt;2.28.0-1.9.24 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989862" version="1" comment="libgtop-lang is &lt;2.28.0-1.9.24 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989863" version="1" comment="libicu is &lt;4.0-7.26.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989864" version="1" comment="libicu-32bit is &lt;4.0-7.26.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989865" version="1" comment="libicu-doc is &lt;4.0-7.26.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989866" version="1" comment="libicu-x86 is &lt;4.0-7.26.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989867" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989868" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989869" version="1" comment="libmysqlclient15-x86 is &lt;5.0.96-0.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989870" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989871" version="1" comment="mysql is &lt;5.5.31-0.7.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989872" version="1" comment="mysql-client is &lt;5.5.31-0.7.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989873" version="1" comment="mysql-tools is &lt;5.5.31-0.7.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989874" version="1" comment="libnewt0_52 is &lt;0.52.10-1.35.113 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989875" version="1" comment="newt is &lt;0.52.10-1.35.113 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989876" version="1" comment="python-newt is &lt;0.52.10-1.35.113 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989877" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989878" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989879" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989880" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989881" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989882" version="1" comment="openssl is &lt;0.9.8j-0.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989883" version="1" comment="openssl-doc is &lt;0.9.8j-0.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989884" version="1" comment="libotr2 is &lt;3.2.0-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989885" version="1" comment="libpng12-0 is &lt;1.2.31-5.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989886" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989887" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989888" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989889" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989890" version="1" comment="libpoppler5 is &lt;0.12.3-1.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989891" version="1" comment="poppler-tools is &lt;0.12.3-1.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989892" version="1" comment="libproxy0 is &lt;0.3.1-2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989893" version="1" comment="libproxy0-32bit is &lt;0.3.1-2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989894" version="1" comment="libproxy0-config-gnome is &lt;0.3.1-2.6.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989895" version="1" comment="libproxy0-config-kde4 is &lt;0.3.1-2.6.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989896" version="1" comment="libproxy0-networkmanager is &lt;0.3.1-2.6.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989897" version="1" comment="libproxy0-x86 is &lt;0.3.1-2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989898" version="1" comment="libpython2_6-1_0 is &lt;2.6.8-0.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989899" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.8-0.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989900" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.8-0.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989901" version="1" comment="python-base is &lt;2.6.8-0.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989902" version="1" comment="python-base-32bit is &lt;2.6.8-0.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989903" version="1" comment="python-base-x86 is &lt;2.6.8-0.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989904" version="1" comment="python-xml is &lt;2.6.8-0.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989905" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989906" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989907" version="1" comment="libsnmp15-x86 is &lt;5.4.2.1-8.12.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989908" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989909" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989910" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989911" version="1" comment="libsoup-2_4-1 is &lt;2.32.2-4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989912" version="1" comment="libsoup-2_4-1-32bit is &lt;2.32.2-4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989913" version="1" comment="libsoup-2_4-1-x86 is &lt;2.32.2-4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989914" version="1" comment="libsss_idmap0 is &lt;1.9.4-0.12.24 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989915" version="1" comment="python-sssd-config is &lt;1.9.4-0.12.24 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989916" version="1" comment="sssd is &lt;1.9.4-0.12.24 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989917" version="1" comment="sssd-32bit is &lt;1.9.4-0.12.24 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989918" version="1" comment="sssd-tools is &lt;1.9.4-0.12.24 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989919" version="1" comment="libtiff3 is &lt;3.8.2-141.152.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989920" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.152.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989921" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.152.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989922" version="1" comment="tiff is &lt;3.8.2-141.152.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989923" version="1" comment="libtspi1 is &lt;0.3.10-0.9.50 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989924" version="1" comment="libtspi1-32bit is &lt;0.3.10-0.9.50 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989925" version="1" comment="libtspi1-x86 is &lt;0.3.10-0.9.50 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989926" version="1" comment="trousers is &lt;0.3.10-0.9.50 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989927" version="1" comment="libupsclient1 is &lt;2.6.2-0.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989928" version="1" comment="nut is &lt;2.6.2-0.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989929" version="1" comment="nut-classic is &lt;2.6.2-0.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989930" version="1" comment="nut-drivers-net is &lt;2.6.2-0.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989931" version="1" comment="libvirt is &lt;1.0.5.1-0.7.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989932" version="1" comment="libvirt-client is &lt;1.0.5.1-0.7.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989933" version="1" comment="libvirt-client-32bit is &lt;1.0.5.1-0.7.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989934" version="1" comment="libvirt-doc is &lt;1.0.5.1-0.7.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989935" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.1-0.7.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989936" version="1" comment="libvirt-python is &lt;1.0.5.1-0.7.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989937" version="1" comment="libvorbis is &lt;1.2.0-79.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989938" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989939" version="1" comment="libvorbis-doc is &lt;1.2.0-79.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989940" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989941" version="1" comment="libxml2 is &lt;2.7.6-0.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989942" version="1" comment="libxml2-32bit is &lt;2.7.6-0.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989943" version="1" comment="libxml2-doc is &lt;2.7.6-0.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989944" version="1" comment="libxml2-x86 is &lt;2.7.6-0.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989945" version="1" comment="libxslt is &lt;1.1.24-19.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989946" version="1" comment="libxslt-32bit is &lt;1.1.24-19.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989947" version="1" comment="libxslt-x86 is &lt;1.1.24-19.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989948" version="1" comment="logrotate is &lt;3.7.7-10.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989949" version="1" comment="lvm2 is &lt;2.02.98-0.25.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989950" version="1" comment="mailman is &lt;2.1.14-9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989951" version="1" comment="mono-core is &lt;2.6.7-0.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989952" version="1" comment="mono-data is &lt;2.6.7-0.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989953" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989954" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989955" version="1" comment="mono-locale-extras is &lt;2.6.7-0.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989956" version="1" comment="mono-nunit is &lt;2.6.7-0.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989957" version="1" comment="mono-web is &lt;2.6.7-0.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989958" version="1" comment="mono-winforms is &lt;2.6.7-0.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989959" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.27-0.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989960" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.27-0.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989961" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.27-0.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989962" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.27-0.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989963" version="1" comment="mozilla-xulrunner192-x86 is &lt;1.9.2.27-0.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989964" version="1" comment="nagios is &lt;3.0.6-1.25.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989965" version="1" comment="nagios-www is &lt;3.0.6-1.25.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989966" version="1" comment="nagios-plugins is &lt;1.4.16-0.11.35 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989967" version="1" comment="nagios-plugins-extras is &lt;1.4.16-0.11.35 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989968" version="1" comment="nfs-client is &lt;1.2.3-18.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989969" version="1" comment="ntp is &lt;4.2.4p8-1.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989970" version="1" comment="ntp-doc is &lt;4.2.4p8-1.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989971" version="1" comment="ofed is &lt;1.5.4.1-0.11.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989972" version="1" comment="ofed-doc is &lt;1.5.4.1-0.11.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989973" version="1" comment="ofed-kmp-default is &lt;1.5.4.1_3.0.76_0.11-0.11.5 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989974" version="1" comment="ofed-kmp-pae is &lt;1.5.4.1_3.0.76_0.11-0.11.5 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989975" version="1" comment="ofed-kmp-ppc64 is &lt;1.5.4.1_3.0.76_0.11-0.11.5 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989976" version="1" comment="ofed-kmp-trace is &lt;1.5.4.1_3.0.76_0.11-0.11.5 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989977" version="1" comment="openCryptoki is &lt;2.4.2-0.9.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989978" version="1" comment="openCryptoki-32bit is &lt;2.4.2-0.9.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989979" version="1" comment="openCryptoki-64bit is &lt;2.4.2-0.9.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989980" version="1" comment="openssh is &lt;6.2p2-0.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989981" version="1" comment="openssh-askpass is &lt;6.2p2-0.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989982" version="1" comment="openvpn is &lt;2.0.9-143.38.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989983" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.38.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989984" version="1" comment="pam_krb5 is &lt;2.3.1-47.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989985" version="1" comment="pam_krb5-32bit is &lt;2.3.1-47.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989986" version="1" comment="pam_krb5-x86 is &lt;2.3.1-47.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989987" version="1" comment="pam_mount is &lt;0.47-13.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989988" version="1" comment="pam_mount-32bit is &lt;0.47-13.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989989" version="1" comment="pam_mount-x86 is &lt;0.47-13.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989990" version="1" comment="perl is &lt;5.10.0-64.67.52 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989991" version="1" comment="perl-32bit is &lt;5.10.0-64.67.52 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989992" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.67.52 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989993" version="1" comment="perl-Test-Simple is &lt;0.72-0.67.52 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989994" version="1" comment="perl-base is &lt;5.10.0-64.67.52 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989995" version="1" comment="perl-doc is &lt;5.10.0-64.67.52 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989996" version="1" comment="perl-x86 is &lt;5.10.0-64.67.52 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989997" version="1" comment="postgresql is &lt;8.3.23-0.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989998" version="1" comment="postgresql-contrib is &lt;8.3.23-0.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009989999" version="1" comment="postgresql-docs is &lt;8.3.23-0.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990000" version="1" comment="postgresql-server is &lt;8.3.23-0.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990001" version="1" comment="puppet is &lt;2.6.18-0.4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990002" version="1" comment="puppet-server is &lt;2.6.18-0.4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990003" version="1" comment="pure-ftpd is &lt;1.0.22-3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990004" version="1" comment="python is &lt;2.6.8-0.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990005" version="1" comment="python-32bit is &lt;2.6.8-0.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990006" version="1" comment="python-curses is &lt;2.6.8-0.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990007" version="1" comment="python-demo is &lt;2.6.8-0.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990008" version="1" comment="python-gdbm is &lt;2.6.8-0.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990009" version="1" comment="python-idle is &lt;2.6.8-0.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990010" version="1" comment="python-tk is &lt;2.6.8-0.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990011" version="1" comment="python-x86 is &lt;2.6.8-0.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990012" version="1" comment="python-pam is &lt;0.5.0-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990013" version="1" comment="quagga is &lt;0.99.15-0.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990014" version="1" comment="rsync is &lt;3.0.4-2.47.28 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990015" version="1" comment="rsyslog is &lt;5.10.1-0.7.49 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990016" version="1" comment="rsyslog-diag-tools is &lt;5.10.1-0.7.49 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990017" version="1" comment="rsyslog-doc is &lt;5.10.1-0.7.49 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990018" version="1" comment="rsyslog-module-gssapi is &lt;5.10.1-0.7.49 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990019" version="1" comment="rsyslog-module-gtls is &lt;5.10.1-0.7.49 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990020" version="1" comment="rsyslog-module-mysql is &lt;5.10.1-0.7.49 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990021" version="1" comment="rsyslog-module-pgsql is &lt;5.10.1-0.7.49 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990022" version="1" comment="rsyslog-module-relp is &lt;5.10.1-0.7.49 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990023" version="1" comment="rsyslog-module-snmp is &lt;5.10.1-0.7.49 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990024" version="1" comment="rsyslog-module-udpspoof is &lt;5.10.1-0.7.49 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990025" version="1" comment="ruby is &lt;1.8.7.p357-0.9.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990026" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990027" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990028" version="1" comment="sblim-sfcb is &lt;1.3.11-0.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990029" version="1" comment="socat is &lt;1.7.0.0-1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990030" version="1" comment="squid is &lt;2.7.STABLE5-2.12.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990031" version="1" comment="squid3 is &lt;3.1.12-8.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990032" version="1" comment="star is &lt;1.5final-28.23.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990033" version="1" comment="stunnel is &lt;4.54-0.9.24 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990034" version="1" comment="sudo is &lt;1.7.6p2-0.17.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990035" version="1" comment="sysconfig is &lt;0.71.61-0.11.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990036" version="1" comment="syslog-ng is &lt;2.0.9-27.34.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990037" version="1" comment="sysstat is &lt;8.1.5-7.45.24 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990038" version="1" comment="sysstat-isag is &lt;8.1.5-7.45.24 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990039" version="1" comment="system-config-printer is &lt;1.0.8-9.23.44 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990040" version="1" comment="system-config-printer-lang is &lt;1.0.8-9.23.44 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990041" version="1" comment="systemtap is &lt;1.5-0.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990042" version="1" comment="systemtap-server is &lt;1.5-0.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990043" version="1" comment="t1lib is &lt;5.1.1-100.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990044" version="1" comment="taglib is &lt;1.5-19.23.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990045" version="1" comment="taglib-32bit is &lt;1.5-19.23.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990046" version="1" comment="taglib-x86 is &lt;1.5-19.23.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990047" version="1" comment="tftp is &lt;0.48-101.31.27 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990048" version="1" comment="tgt is &lt;0.9.10-0.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990049" version="1" comment="tomcat6 is &lt;6.0.18-20.35.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990050" version="1" comment="tomcat6-admin-webapps is &lt;6.0.18-20.35.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990051" version="1" comment="tomcat6-docs-webapp is &lt;6.0.18-20.35.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990052" version="1" comment="tomcat6-javadoc is &lt;6.0.18-20.35.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990053" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.18-20.35.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990054" version="1" comment="tomcat6-lib is &lt;6.0.18-20.35.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990055" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.18-20.35.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990056" version="1" comment="tomcat6-webapps is &lt;6.0.18-20.35.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990057" version="1" comment="unixODBC_23 is &lt;2.3.1-0.9.40 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990058" version="1" comment="virt-utils is &lt;1.2.1-0.7.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990059" version="1" comment="wireshark is &lt;1.8.6-0.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990060" version="1" comment="x3270 is &lt;3.3.12-517.12.34 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990061" version="1" comment="xen is &lt;4.2.2_04-0.7.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990062" version="1" comment="xen-doc-html is &lt;4.2.2_04-0.7.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990063" version="1" comment="xen-doc-pdf is &lt;4.2.2_04-0.7.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990064" version="1" comment="xen-kmp-default is &lt;4.2.2_04_3.0.76_0.11-0.7.5 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990065" version="1" comment="xen-kmp-pae is &lt;4.2.2_04_3.0.76_0.11-0.7.5 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990066" version="1" comment="xen-libs is &lt;4.2.2_04-0.7.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990067" version="1" comment="xen-libs-32bit is &lt;4.2.2_04-0.7.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990068" version="1" comment="xen-tools is &lt;4.2.2_04-0.7.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990069" version="1" comment="xen-tools-domU is &lt;4.2.2_04-0.7.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990070" version="1" comment="xorg-x11 is &lt;7.4-9.62.46 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990071" version="1" comment="xorg-x11-xauth is &lt;7.4-9.62.46 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990072" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.81.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990073" version="1" comment="xorg-x11-server is &lt;7.4-27.81.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990074" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.81.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990075" version="1" comment="xorg-x11-libxcb is &lt;7.4-1.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990076" version="1" comment="xorg-x11-libxcb-32bit is &lt;7.4-1.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990077" version="1" comment="xorg-x11-libxcb-x86 is &lt;7.4-1.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990078" version="1" comment="xorg-x11-server-dmx is &lt;7.3.99-17.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990079" version="1" comment="xorg-x11-server-rdp is &lt;7.3.99-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990080" version="1" comment="yast2 is &lt;2.17.129-0.7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990081" version="1" comment="yast2-core is &lt;2.17.45-0.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117413" version="1" comment="sles-release is ==11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990082" version="1" comment="Mesa is &lt;9.0.3-0.28.29.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990083" version="1" comment="Mesa-32bit is &lt;9.0.3-0.28.29.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990084" version="1" comment="Mesa-x86 is &lt;9.0.3-0.28.29.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990085" version="1" comment="MozillaFirefox is &lt;31.7.0esr-0.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990086" version="1" comment="MozillaFirefox-translations is &lt;31.7.0esr-0.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990087" version="1" comment="PackageKit is &lt;0.3.14-2.30.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990088" version="1" comment="PackageKit-lang is &lt;0.3.14-2.30.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990089" version="1" comment="hal is &lt;0.5.12-23.76.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990090" version="1" comment="hal-32bit is &lt;0.5.12-23.76.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990091" version="1" comment="hal-doc is &lt;0.5.12-23.76.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990092" version="1" comment="hal-x86 is &lt;0.5.12-23.76.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990093" version="1" comment="libpackagekit-glib10 is &lt;0.3.14-2.30.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990094" version="1" comment="PolicyKit is &lt;0.9-14.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990095" version="1" comment="PolicyKit-32bit is &lt;0.9-14.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990096" version="1" comment="PolicyKit-doc is &lt;0.9-14.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990097" version="1" comment="PolicyKit-x86 is &lt;0.9-14.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990098" version="1" comment="a2ps is &lt;4.13-1326.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990099" version="1" comment="aaa_base is &lt;11-6.105.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990100" version="1" comment="ant is &lt;1.7.1-20.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990101" version="1" comment="ant-trax is &lt;1.7.1-16.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990102" version="1" comment="apache2 is &lt;2.2.12-1.51.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990103" version="1" comment="apache2-doc is &lt;2.2.12-1.51.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990104" version="1" comment="apache2-example-pages is &lt;2.2.12-1.51.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990105" version="1" comment="apache2-prefork is &lt;2.2.12-1.51.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990106" version="1" comment="apache2-utils is &lt;2.2.12-1.51.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990107" version="1" comment="apache2-worker is &lt;2.2.12-1.51.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990108" version="1" comment="apache2-mod_jk is &lt;1.2.40-0.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990109" version="1" comment="apache2-mod_nss is &lt;1.0.8-0.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990110" version="1" comment="apache2-mod_perl is &lt;2.0.4-40.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990111" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990112" version="1" comment="php53 is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990113" version="1" comment="php53-bcmath is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990114" version="1" comment="php53-bz2 is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990115" version="1" comment="php53-calendar is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990116" version="1" comment="php53-ctype is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990117" version="1" comment="php53-curl is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990118" version="1" comment="php53-dba is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990119" version="1" comment="php53-dom is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990120" version="1" comment="php53-exif is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990121" version="1" comment="php53-fastcgi is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990122" version="1" comment="php53-fileinfo is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990123" version="1" comment="php53-ftp is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990124" version="1" comment="php53-gd is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990125" version="1" comment="php53-gettext is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990126" version="1" comment="php53-gmp is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990127" version="1" comment="php53-iconv is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990128" version="1" comment="php53-intl is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990129" version="1" comment="php53-json is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990130" version="1" comment="php53-ldap is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990131" version="1" comment="php53-mbstring is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990132" version="1" comment="php53-mcrypt is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990133" version="1" comment="php53-mysql is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990134" version="1" comment="php53-odbc is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990135" version="1" comment="php53-openssl is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990136" version="1" comment="php53-pcntl is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990137" version="1" comment="php53-pdo is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990138" version="1" comment="php53-pear is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990139" version="1" comment="php53-pgsql is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990140" version="1" comment="php53-pspell is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990141" version="1" comment="php53-shmop is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990142" version="1" comment="php53-snmp is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990143" version="1" comment="php53-soap is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990144" version="1" comment="php53-suhosin is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990145" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990146" version="1" comment="php53-sysvsem is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990147" version="1" comment="php53-sysvshm is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990148" version="1" comment="php53-tokenizer is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990149" version="1" comment="php53-wddx is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990150" version="1" comment="php53-xmlreader is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990151" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990152" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990153" version="1" comment="php53-xsl is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990154" version="1" comment="php53-zip is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990155" version="1" comment="php53-zlib is &lt;5.3.17-0.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990156" version="1" comment="apache2-mod_security2 is &lt;2.7.1-0.2.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990157" version="1" comment="augeas is &lt;0.9.0-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990158" version="1" comment="augeas-lenses is &lt;0.9.0-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990159" version="1" comment="libaugeas0 is &lt;0.9.0-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990160" version="1" comment="automake is &lt;1.10.1-4.131.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990161" version="1" comment="avahi is &lt;0.6.23-11.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990162" version="1" comment="avahi-lang is &lt;0.6.23-11.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990163" version="1" comment="avahi-utils is &lt;0.6.23-11.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990164" version="1" comment="libavahi-client3 is &lt;0.6.23-11.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990165" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-11.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990166" version="1" comment="libavahi-client3-x86 is &lt;0.6.23-11.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990167" version="1" comment="libavahi-common3 is &lt;0.6.23-11.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990168" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-11.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990169" version="1" comment="libavahi-common3-x86 is &lt;0.6.23-11.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990170" version="1" comment="libavahi-core5 is &lt;0.6.23-11.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990171" version="1" comment="libdns_sd is &lt;0.6.23-11.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990172" version="1" comment="libdns_sd-32bit is &lt;0.6.23-11.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990173" version="1" comment="libdns_sd-x86 is &lt;0.6.23-11.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990174" version="1" comment="bash is &lt;3.2-147.27.35 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990175" version="1" comment="bash-doc is &lt;3.2-147.27.35 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990176" version="1" comment="bash-x86 is &lt;3.2-147.27.35 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990177" version="1" comment="libreadline5 is &lt;5.2-147.27.35 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990178" version="1" comment="libreadline5-32bit is &lt;5.2-147.27.35 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990179" version="1" comment="libreadline5-x86 is &lt;5.2-147.27.35 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990180" version="1" comment="readline-doc is &lt;5.2-147.27.35 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990181" version="1" comment="bind is &lt;9.9.6P1-0.5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990182" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990183" version="1" comment="bind-doc is &lt;9.9.6P1-0.5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990184" version="1" comment="bind-libs is &lt;9.9.6P1-0.5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990185" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990186" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990187" version="1" comment="bind-utils is &lt;9.9.6P1-0.5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990188" version="1" comment="binutils is &lt;2.24-3.62 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990189" version="1" comment="boost-license is &lt;1.36.0-12.6.49 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990190" version="1" comment="boost-license1_49_0 is &lt;1.49.0-0.13.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990191" version="1" comment="libboost_program_options1_36_0 is &lt;1.36.0-12.6.49 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990192" version="1" comment="libboost_regex1_36_0 is &lt;1.36.0-12.6.49 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990193" version="1" comment="libboost_signals1_36_0 is &lt;1.36.0-12.6.49 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990194" version="1" comment="libboost_system1_49_0 is &lt;1.49.0-0.13.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990195" version="1" comment="libboost_thread1_36_0 is &lt;1.36.0-12.6.49 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990196" version="1" comment="libboost_thread1_49_0 is &lt;1.49.0-0.13.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990197" version="1" comment="cifs-utils is &lt;5.1-0.14.46 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990198" version="1" comment="clamav is &lt;0.98.7-0.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990199" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990200" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990201" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990202" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.26-0.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990203" version="1" comment="openldap2 is &lt;2.4.26-0.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990204" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990205" version="1" comment="openldap2-client is &lt;2.4.26-0.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990206" version="1" comment="coreutils is &lt;8.12-6.25.32.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990207" version="1" comment="coreutils-lang is &lt;8.12-6.25.32.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990208" version="1" comment="coreutils-x86 is &lt;8.12-6.25.32.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990209" version="1" comment="cpio is &lt;2.9-75.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990210" version="1" comment="cpio-lang is &lt;2.9-75.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990211" version="1" comment="cron is &lt;4.1-194.211.213.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990212" version="1" comment="cups is &lt;1.3.9-8.46.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990213" version="1" comment="cups-client is &lt;1.3.9-8.46.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990214" version="1" comment="cups-libs is &lt;1.3.9-8.46.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990215" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990216" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.46.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990217" version="1" comment="curl is &lt;7.19.7-1.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990218" version="1" comment="libcurl4 is &lt;7.19.7-1.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990219" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990220" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990221" version="1" comment="davfs2 is &lt;1.5.2-1.36 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990222" version="1" comment="dbus-1 is &lt;1.2.10-3.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990223" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990224" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990225" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990226" version="1" comment="dhcp is &lt;4.2.4.P2-0.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990227" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990228" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990229" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990230" version="1" comment="dnsmasq is &lt;2.71-0.14.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990231" version="1" comment="e2fsprogs is &lt;1.41.9-2.14.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990232" version="1" comment="libcom_err2 is &lt;1.41.9-2.14.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990233" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.14.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990234" version="1" comment="libcom_err2-x86 is &lt;1.41.9-2.14.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990235" version="1" comment="libext2fs2 is &lt;1.41.9-2.14.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990236" version="1" comment="elfutils is &lt;0.152-4.9.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990237" version="1" comment="libasm1 is &lt;0.152-4.9.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990238" version="1" comment="libasm1-32bit is &lt;0.152-4.9.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990239" version="1" comment="libdw1 is &lt;0.152-4.9.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990240" version="1" comment="libdw1-32bit is &lt;0.152-4.9.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990241" version="1" comment="libdw1-x86 is &lt;0.152-4.9.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990242" version="1" comment="libebl1 is &lt;0.152-4.9.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990243" version="1" comment="libebl1-32bit is &lt;0.152-4.9.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990244" version="1" comment="libebl1-x86 is &lt;0.152-4.9.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990245" version="1" comment="libelf1 is &lt;0.152-4.9.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990246" version="1" comment="libelf1-32bit is &lt;0.152-4.9.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990247" version="1" comment="libelf1-x86 is &lt;0.152-4.9.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990248" version="1" comment="emacs is &lt;22.3-4.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990249" version="1" comment="emacs-el is &lt;22.3-4.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990250" version="1" comment="emacs-info is &lt;22.3-4.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990251" version="1" comment="emacs-nox is &lt;22.3-4.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990252" version="1" comment="emacs-x11 is &lt;22.3-4.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990253" version="1" comment="evolution-data-server is &lt;2.28.2-0.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990254" version="1" comment="evolution-data-server-32bit is &lt;2.28.2-0.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990255" version="1" comment="evolution-data-server-lang is &lt;2.28.2-0.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990256" version="1" comment="evolution-data-server-x86 is &lt;2.28.2-0.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990257" version="1" comment="fastjar is &lt;0.95-1.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990258" version="1" comment="file is &lt;4.24-43.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990259" version="1" comment="file-32bit is &lt;4.24-43.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990260" version="1" comment="file-x86 is &lt;4.24-43.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990261" version="1" comment="freeradius-server is &lt;2.1.1-7.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990262" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990263" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990264" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990265" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990266" version="1" comment="freetype2 is &lt;2.3.7-25.35.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990267" version="1" comment="freetype2-32bit is &lt;2.3.7-25.35.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990268" version="1" comment="freetype2-x86 is &lt;2.3.7-25.35.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990269" version="1" comment="ft2demos is &lt;2.3.7-25.35.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990270" version="1" comment="fuse is &lt;2.8.7-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990271" version="1" comment="libfuse2 is &lt;2.8.7-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990272" version="1" comment="gd is &lt;2.0.36.RC1-52.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990273" version="1" comment="glib2 is &lt;2.22.5-0.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990274" version="1" comment="glib2-doc is &lt;2.22.5-0.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990275" version="1" comment="glib2-lang is &lt;2.22.5-0.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990276" version="1" comment="libgio-2_0-0 is &lt;2.22.5-0.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990277" version="1" comment="libgio-2_0-0-32bit is &lt;2.22.5-0.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990278" version="1" comment="libgio-2_0-0-x86 is &lt;2.22.5-0.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990279" version="1" comment="libglib-2_0-0 is &lt;2.22.5-0.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990280" version="1" comment="libglib-2_0-0-32bit is &lt;2.22.5-0.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990281" version="1" comment="libglib-2_0-0-x86 is &lt;2.22.5-0.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990282" version="1" comment="libgmodule-2_0-0 is &lt;2.22.5-0.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990283" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.22.5-0.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990284" version="1" comment="libgmodule-2_0-0-x86 is &lt;2.22.5-0.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990285" version="1" comment="libgobject-2_0-0 is &lt;2.22.5-0.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990286" version="1" comment="libgobject-2_0-0-32bit is &lt;2.22.5-0.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990287" version="1" comment="libgobject-2_0-0-x86 is &lt;2.22.5-0.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990288" version="1" comment="libgthread-2_0-0 is &lt;2.22.5-0.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990289" version="1" comment="libgthread-2_0-0-32bit is &lt;2.22.5-0.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990290" version="1" comment="libgthread-2_0-0-x86 is &lt;2.22.5-0.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990291" version="1" comment="glibc is &lt;2.11.3-17.84.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990292" version="1" comment="glibc-32bit is &lt;2.11.3-17.84.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990293" version="1" comment="glibc-devel is &lt;2.11.3-17.84.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990294" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.84.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990295" version="1" comment="glibc-html is &lt;2.11.3-17.84.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990296" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.84.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990297" version="1" comment="glibc-info is &lt;2.11.3-17.84.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990298" version="1" comment="glibc-locale is &lt;2.11.3-17.84.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990299" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.84.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990300" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.84.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990301" version="1" comment="glibc-profile is &lt;2.11.3-17.84.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990302" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.84.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990303" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.84.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990304" version="1" comment="glibc-x86 is &lt;2.11.3-17.84.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990305" version="1" comment="nscd is &lt;2.11.3-17.84.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990306" version="1" comment="gnome-screensaver is &lt;2.28.3-0.39.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990307" version="1" comment="gnome-screensaver-lang is &lt;2.28.3-0.39.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990308" version="1" comment="gnutls is &lt;2.4.1-24.39.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990309" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990310" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990311" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990312" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990313" version="1" comment="gpg2 is &lt;2.0.9-25.33.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990314" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990315" version="1" comment="gpgme is &lt;1.1.6-25.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990316" version="1" comment="libgpgme11 is &lt;1.1.6-25.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990317" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.30-5.12.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990318" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.30-5.12.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990319" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.30-5.12.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990320" version="1" comment="guestfs-data is &lt;1.20.12-0.18.70 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990321" version="1" comment="guestfs-tools is &lt;1.20.12-0.18.70 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990322" version="1" comment="guestfsd is &lt;1.20.12-0.18.70 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990323" version="1" comment="libguestfs0 is &lt;1.20.12-0.18.70 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990324" version="1" comment="hplip is &lt;3.11.10-0.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990325" version="1" comment="hplip-hpijs is &lt;3.11.10-0.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990326" version="1" comment="hyper-v is &lt;6-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990327" version="1" comment="ibutils is &lt;1.5.7-0.15.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990328" version="1" comment="ibutils-32bit is &lt;1.5.7-0.15.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990329" version="1" comment="ipsec-tools is &lt;0.7.3-1.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990330" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-1.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990331" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-1.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990332" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990333" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990334" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990335" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990336" version="1" comment="kbd is &lt;1.14.1-16.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990337" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.12.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990338" version="1" comment="kdebase4-wallpapers is &lt;4.3.5-0.11.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990339" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.12.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990340" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.12.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990341" version="1" comment="kdm is &lt;4.3.5-0.12.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990342" version="1" comment="kwin is &lt;4.3.5-0.12.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990343" version="1" comment="kdebase4-runtime is &lt;4.3.5-0.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990344" version="1" comment="kdelibs4 is &lt;4.3.5-0.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990345" version="1" comment="kdelibs4-core is &lt;4.3.5-0.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990346" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990347" version="1" comment="libkde4 is &lt;4.3.5-0.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990348" version="1" comment="libkde4-32bit is &lt;4.3.5-0.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990349" version="1" comment="libkde4-x86 is &lt;4.3.5-0.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990350" version="1" comment="libkdecore4 is &lt;4.3.5-0.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990351" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990352" version="1" comment="libkdecore4-x86 is &lt;4.3.5-0.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990353" version="1" comment="kdirstat is &lt;2.4.4-255.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990354" version="1" comment="kernel-default is &lt;3.0.101-63.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990355" version="1" comment="kernel-default-base is &lt;3.0.101-63.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990357" version="1" comment="kernel-default-man is &lt;3.0.101-63.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990358" version="1" comment="kernel-pae is &lt;3.0.101-63.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990359" version="1" comment="kernel-pae-base is &lt;3.0.101-63.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990361" version="1" comment="kernel-ppc64 is &lt;3.0.101-63.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990362" version="1" comment="kernel-ppc64-base is &lt;3.0.101-63.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990364" version="1" comment="kernel-source is &lt;3.0.101-63.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990365" version="1" comment="kernel-syms is &lt;3.0.101-63.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990366" version="1" comment="kernel-trace is &lt;3.0.101-63.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990367" version="1" comment="kernel-trace-base is &lt;3.0.101-63.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990369" version="1" comment="kernel-xen is &lt;3.0.101-63.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990370" version="1" comment="kernel-xen-base is &lt;3.0.101-63.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990372" version="1" comment="krb5 is &lt;1.6.3-133.49.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990373" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990374" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990375" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990376" version="1" comment="krb5-client is &lt;1.6.3-133.49.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990377" version="1" comment="krb5-server is &lt;1.6.3-133.49.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990378" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990379" version="1" comment="krb5-doc is &lt;1.6.3-133.49.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990380" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990381" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990382" version="1" comment="kvm is &lt;1.4.2-30.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990383" version="1" comment="lcms is &lt;1.17-77.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990384" version="1" comment="liblcms1 is &lt;1.17-77.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990385" version="1" comment="liblcms1-32bit is &lt;1.17-77.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990386" version="1" comment="liblcms1-x86 is &lt;1.17-77.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990387" version="1" comment="ldapsmb is &lt;1.34b-12.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990388" version="1" comment="libldb1 is &lt;3.6.3-0.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990389" version="1" comment="libsmbclient0 is &lt;3.6.3-0.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990390" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990391" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990392" version="1" comment="libtalloc2 is &lt;3.6.3-0.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990393" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990394" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990395" version="1" comment="libtdb1 is &lt;3.6.3-0.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990396" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990397" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990398" version="1" comment="libtevent0 is &lt;3.6.3-0.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990399" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990400" version="1" comment="libwbclient0 is &lt;3.6.3-0.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990401" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990402" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990403" version="1" comment="samba is &lt;3.6.3-0.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990404" version="1" comment="samba-32bit is &lt;3.6.3-0.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990405" version="1" comment="samba-client is &lt;3.6.3-0.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990406" version="1" comment="samba-client-32bit is &lt;3.6.3-0.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990407" version="1" comment="samba-client-x86 is &lt;3.6.3-0.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990408" version="1" comment="samba-krb-printing is &lt;3.6.3-0.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990409" version="1" comment="samba-winbind is &lt;3.6.3-0.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990410" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990411" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990412" version="1" comment="samba-x86 is &lt;3.6.3-0.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990413" version="1" comment="libFLAC++6 is &lt;1.2.1-68.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990414" version="1" comment="libFLAC8 is &lt;1.2.1-68.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990415" version="1" comment="libFLAC8-32bit is &lt;1.2.1-68.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990416" version="1" comment="libFLAC8-x86 is &lt;1.2.1-68.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990417" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990418" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990419" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.34.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990420" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.34.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990421" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.34.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990422" version="1" comment="libqt4 is &lt;4.6.3-5.34.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990423" version="1" comment="libqt4-32bit is &lt;4.6.3-5.34.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990424" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.34.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990425" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.34.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990426" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.34.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990427" version="1" comment="libqt4-sql is &lt;4.6.3-5.34.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990428" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.34.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990429" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.34.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990430" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.34.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990431" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.34.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990432" version="1" comment="libqt4-x11 is &lt;4.6.3-5.34.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990433" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.34.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990434" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.34.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990435" version="1" comment="libqt4-x86 is &lt;4.6.3-5.34.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990436" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.34.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990437" version="1" comment="libapr-util1 is &lt;1.3.4-12.22.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990438" version="1" comment="libapr-util1-32bit is &lt;1.3.4-12.22.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990439" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.3.4-12.22.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990440" version="1" comment="libapr1 is &lt;1.3.3-11.18.19.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990441" version="1" comment="libapr1-32bit is &lt;1.3.3-11.18.19.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990442" version="1" comment="libblkid1 is &lt;2.19.1-6.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990443" version="1" comment="libblkid1-32bit is &lt;2.19.1-6.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990444" version="1" comment="libblkid1-x86 is &lt;2.19.1-6.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990445" version="1" comment="libuuid1 is &lt;2.19.1-6.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990446" version="1" comment="libuuid1-32bit is &lt;2.19.1-6.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990447" version="1" comment="libuuid1-x86 is &lt;2.19.1-6.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990448" version="1" comment="util-linux is &lt;2.19.1-6.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990449" version="1" comment="util-linux-lang is &lt;2.19.1-6.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990450" version="1" comment="uuid-runtime is &lt;2.19.1-6.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990451" version="1" comment="libcgroup1 is &lt;0.41.rc1-2.34 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990452" version="1" comment="libdrm is &lt;2.4.52-0.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990453" version="1" comment="libdrm-32bit is &lt;2.4.52-0.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990454" version="1" comment="libdrm-x86 is &lt;2.4.52-0.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990455" version="1" comment="libecpg6 is &lt;9.4.4-0.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990456" version="1" comment="libpq5 is &lt;9.4.4-0.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990457" version="1" comment="libpq5-32bit is &lt;9.4.4-0.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990458" version="1" comment="postgresql94 is &lt;9.4.4-0.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990459" version="1" comment="postgresql94-contrib is &lt;9.4.4-0.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990460" version="1" comment="postgresql94-docs is &lt;9.4.4-0.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990461" version="1" comment="postgresql94-server is &lt;9.4.4-0.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990462" version="1" comment="libevent-1_4-2 is &lt;1.4.5-24.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990463" version="1" comment="libfreebl3 is &lt;3.17.3-0.8.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990464" version="1" comment="libfreebl3-32bit is &lt;3.17.3-0.8.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990465" version="1" comment="libfreebl3-x86 is &lt;3.17.3-0.8.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990466" version="1" comment="libsoftokn3 is &lt;3.17.3-0.8.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990467" version="1" comment="libsoftokn3-32bit is &lt;3.17.3-0.8.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990468" version="1" comment="libsoftokn3-x86 is &lt;3.17.3-0.8.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990469" version="1" comment="mozilla-nss is &lt;3.17.3-0.8.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990470" version="1" comment="mozilla-nss-32bit is &lt;3.17.3-0.8.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990471" version="1" comment="mozilla-nss-tools is &lt;3.17.3-0.8.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990472" version="1" comment="mozilla-nss-x86 is &lt;3.17.3-0.8.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990473" version="1" comment="libgcc_s1 is &lt;4.8.3+r212056-2.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990474" version="1" comment="libgcc_s1-32bit is &lt;4.8.3+r212056-2.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990475" version="1" comment="libgcc_s1-x86 is &lt;4.8.3+r212056-2.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990476" version="1" comment="libgfortran3 is &lt;4.8.3+r212056-2.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990477" version="1" comment="libgomp1 is &lt;4.8.3+r212056-2.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990478" version="1" comment="libgomp1-32bit is &lt;4.8.3+r212056-2.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990479" version="1" comment="libquadmath0 is &lt;4.8.3+r212056-2.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990480" version="1" comment="libstdc++6 is &lt;4.8.3+r212056-2.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990481" version="1" comment="libstdc++6-32bit is &lt;4.8.3+r212056-2.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990482" version="1" comment="libstdc++6-x86 is &lt;4.8.3+r212056-2.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990483" version="1" comment="libgcrypt11 is &lt;1.5.0-0.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990484" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990485" version="1" comment="libgcrypt11-x86 is &lt;1.5.0-0.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990486" version="1" comment="libgtop is &lt;2.28.0-1.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990487" version="1" comment="libgtop-2_0-7 is &lt;2.28.0-1.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990488" version="1" comment="libgtop-doc is &lt;2.28.0-1.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990489" version="1" comment="libgtop-lang is &lt;2.28.0-1.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990490" version="1" comment="libjasper is &lt;1.900.1-134.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990491" version="1" comment="libjasper-32bit is &lt;1.900.1-134.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990492" version="1" comment="libjasper-x86 is &lt;1.900.1-134.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990493" version="1" comment="libksba is &lt;1.0.4-1.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990494" version="1" comment="liblzo2-2 is &lt;2.03-12.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990495" version="1" comment="liblzo2-2-32bit is &lt;2.03-12.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990496" version="1" comment="liblzo2-2-x86 is &lt;2.03-12.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990497" version="1" comment="libmpfr1 is &lt;2.3.2-3.118.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990498" version="1" comment="libmpfr1-32bit is &lt;2.3.2-3.118.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990499" version="1" comment="libmpfr1-x86 is &lt;2.3.2-3.118.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990500" version="1" comment="libmspack0 is &lt;0.0.20060920alpha-74.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990501" version="1" comment="libmysql55client18 is &lt;5.5.43-0.7.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990502" version="1" comment="libmysql55client18-32bit is &lt;5.5.43-0.7.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990503" version="1" comment="libmysql55client18-x86 is &lt;5.5.43-0.7.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990504" version="1" comment="libmysql55client_r18 is &lt;5.5.43-0.7.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990505" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.43-0.7.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990506" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.43-0.7.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990507" version="1" comment="mysql is &lt;5.5.43-0.7.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990508" version="1" comment="mysql-client is &lt;5.5.43-0.7.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990509" version="1" comment="mysql-tools is &lt;5.5.43-0.7.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990510" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.6.20 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990511" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.6.20 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990512" version="1" comment="libmysqlclient15-x86 is &lt;5.0.96-0.6.20 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990513" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.6.20 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990514" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990515" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990516" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990517" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990518" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990519" version="1" comment="openssl is &lt;0.9.8j-0.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990520" version="1" comment="openssl-doc is &lt;0.9.8j-0.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990521" version="1" comment="libpixman-1-0 is &lt;0.24.4-0.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990522" version="1" comment="libpixman-1-0-32bit is &lt;0.24.4-0.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990523" version="1" comment="libpixman-1-0-x86 is &lt;0.24.4-0.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990524" version="1" comment="libpng12-0 is &lt;1.2.31-5.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990525" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990526" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990527" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990528" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990529" version="1" comment="libpoppler5 is &lt;0.12.3-1.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990530" version="1" comment="poppler-tools is &lt;0.12.3-1.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990531" version="1" comment="libpulse-browse0 is &lt;0.9.23-0.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990532" version="1" comment="libpulse-mainloop-glib0 is &lt;0.9.23-0.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990533" version="1" comment="libpulse-mainloop-glib0-32bit is &lt;0.9.23-0.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990534" version="1" comment="libpulse-mainloop-glib0-x86 is &lt;0.9.23-0.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990535" version="1" comment="libpulse0 is &lt;0.9.23-0.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990536" version="1" comment="libpulse0-32bit is &lt;0.9.23-0.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990537" version="1" comment="libpulse0-x86 is &lt;0.9.23-0.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990538" version="1" comment="pulseaudio is &lt;0.9.23-0.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990539" version="1" comment="pulseaudio-esound-compat is &lt;0.9.23-0.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990540" version="1" comment="pulseaudio-gdm-hooks is &lt;0.9.23-0.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990541" version="1" comment="pulseaudio-lang is &lt;0.9.23-0.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990542" version="1" comment="pulseaudio-module-x11 is &lt;0.9.23-0.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990543" version="1" comment="pulseaudio-module-zeroconf is &lt;0.9.23-0.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990544" version="1" comment="pulseaudio-utils is &lt;0.9.23-0.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990545" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990546" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990547" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-0.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990548" version="1" comment="python-base is &lt;2.6.9-0.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990549" version="1" comment="python-base-32bit is &lt;2.6.9-0.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990550" version="1" comment="python-base-x86 is &lt;2.6.9-0.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990551" version="1" comment="python-xml is &lt;2.6.9-0.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990552" version="1" comment="libtirpc1 is &lt;0.2.1-1.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990553" version="1" comment="libsndfile is &lt;1.0.20-2.6.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990554" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.6.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990555" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.6.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990556" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990557" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990558" version="1" comment="libsnmp15-x86 is &lt;5.4.2.1-8.12.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990559" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990560" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990561" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990562" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990563" version="1" comment="libsss_idmap0 is &lt;1.9.4-0.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990564" version="1" comment="python-sssd-config is &lt;1.9.4-0.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990565" version="1" comment="sssd is &lt;1.9.4-0.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990566" version="1" comment="sssd-32bit is &lt;1.9.4-0.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990567" version="1" comment="sssd-tools is &lt;1.9.4-0.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990568" version="1" comment="libtasn1 is &lt;1.5-1.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990569" version="1" comment="libtasn1-3 is &lt;1.5-1.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990570" version="1" comment="libtasn1-3-32bit is &lt;1.5-1.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990571" version="1" comment="libtasn1-3-x86 is &lt;1.5-1.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990572" version="1" comment="libtevent0-x86 is &lt;3.6.3-0.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990573" version="1" comment="libtiff3 is &lt;3.8.2-141.154.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990574" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.154.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990575" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.154.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990576" version="1" comment="tiff is &lt;3.8.2-141.154.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990577" version="1" comment="libtspi1 is &lt;0.3.10-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990578" version="1" comment="libtspi1-32bit is &lt;0.3.10-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990579" version="1" comment="libtspi1-x86 is &lt;0.3.10-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990580" version="1" comment="trousers is &lt;0.3.10-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990581" version="1" comment="libvirt is &lt;1.2.5-3.76 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990582" version="1" comment="libvirt-client is &lt;1.2.5-3.76 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990583" version="1" comment="libvirt-client-32bit is &lt;1.2.5-3.76 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990584" version="1" comment="libvirt-doc is &lt;1.2.5-3.76 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990585" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-3.76 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990586" version="1" comment="libwsman1 is &lt;2.2.3-0.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990587" version="1" comment="openwsman-client is &lt;2.2.3-0.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990588" version="1" comment="openwsman-server is &lt;2.2.3-0.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990589" version="1" comment="suseRegister is &lt;1.4-1.38.24 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990590" version="1" comment="pam-modules is &lt;11-1.25.26 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990591" version="1" comment="pam-modules-32bit is &lt;11-1.25.26 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990592" version="1" comment="pam-modules-x86 is &lt;11-1.25.26 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990593" version="1" comment="pwdutils is &lt;3.2.15-0.17.28 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990594" version="1" comment="pwdutils-plugin-audit is &lt;3.2.15-0.17.28 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990595" version="1" comment="libxml2 is &lt;2.7.6-0.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990596" version="1" comment="libxml2-32bit is &lt;2.7.6-0.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990597" version="1" comment="libxml2-doc is &lt;2.7.6-0.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990598" version="1" comment="libxml2-x86 is &lt;2.7.6-0.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990599" version="1" comment="libxslt is &lt;1.1.24-19.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990600" version="1" comment="libxslt-32bit is &lt;1.1.24-19.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990601" version="1" comment="libxslt-x86 is &lt;1.1.24-19.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990602" version="1" comment="logrotate is &lt;3.7.7-10.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990603" version="1" comment="logwatch is &lt;7.3.6-65.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990604" version="1" comment="lvm2 is &lt;2.02.98-0.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990605" version="1" comment="lxc is &lt;0.8.0-0.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990606" version="1" comment="mailx is &lt;12.5-1.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990607" version="1" comment="mono-core is &lt;2.6.7-0.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990608" version="1" comment="mono-data is &lt;2.6.7-0.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990609" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990610" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990611" version="1" comment="mono-locale-extras is &lt;2.6.7-0.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990612" version="1" comment="mono-nunit is &lt;2.6.7-0.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990613" version="1" comment="mono-web is &lt;2.6.7-0.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990614" version="1" comment="mono-winforms is &lt;2.6.7-0.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990615" version="1" comment="mozilla-nspr is &lt;4.10.7-0.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990616" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-0.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990617" version="1" comment="mozilla-nspr-x86 is &lt;4.10.7-0.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990618" version="1" comment="mutt is &lt;1.5.17-42.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990619" version="1" comment="nagios is &lt;3.0.6-1.25.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990620" version="1" comment="nagios-www is &lt;3.0.6-1.25.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990621" version="1" comment="nagios-nrpe is &lt;2.12-24.4.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990622" version="1" comment="nagios-nrpe-doc is &lt;2.12-24.4.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990623" version="1" comment="nagios-plugins-nrpe is &lt;2.12-24.4.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990624" version="1" comment="nagios-plugins is &lt;1.4.16-0.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990625" version="1" comment="nagios-plugins-extras is &lt;1.4.16-0.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990626" version="1" comment="nfs-client is &lt;1.2.3-18.38.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990627" version="1" comment="nfs-doc is &lt;1.2.3-18.38.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990628" version="1" comment="nfs-kernel-server is &lt;1.2.3-18.38.43.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990629" version="1" comment="ntp is &lt;4.2.8p2-2.18 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990630" version="1" comment="ntp-doc is &lt;4.2.8p2-2.18 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990631" version="1" comment="ofed is &lt;1.5.4.1-20.26 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990632" version="1" comment="ofed-doc is &lt;1.5.4.1-20.26 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990633" version="1" comment="ofed-kmp-default is &lt;1.5.4.1_3.0.101_63-20.26 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990634" version="1" comment="ofed-kmp-pae is &lt;1.5.4.1_3.0.101_63-20.26 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990635" version="1" comment="ofed-kmp-ppc64 is &lt;1.5.4.1_3.0.101_63-20.26 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990636" version="1" comment="ofed-kmp-trace is &lt;1.5.4.1_3.0.101_63-20.26 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990637" version="1" comment="openCryptoki is &lt;3.2-0.11.26 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990638" version="1" comment="openCryptoki-32bit is &lt;3.2-0.11.26 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990639" version="1" comment="openCryptoki-64bit is &lt;3.2-0.11.26 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990640" version="1" comment="openslp is &lt;1.2.0-172.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990641" version="1" comment="openslp-32bit is &lt;1.2.0-172.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990642" version="1" comment="openslp-server is &lt;1.2.0-172.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990643" version="1" comment="openslp-x86 is &lt;1.2.0-172.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990644" version="1" comment="openssh is &lt;6.6p1-4.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990645" version="1" comment="openssh-fips is &lt;6.6p1-4.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990646" version="1" comment="openvpn is &lt;2.0.9-143.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990647" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990648" version="1" comment="pam is &lt;1.1.5-0.15.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990649" version="1" comment="pam-32bit is &lt;1.1.5-0.15.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990650" version="1" comment="pam-doc is &lt;1.1.5-0.15.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990651" version="1" comment="pam-x86 is &lt;1.1.5-0.15.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990652" version="1" comment="perl is &lt;5.10.0-64.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990653" version="1" comment="perl-32bit is &lt;5.10.0-64.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990654" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990655" version="1" comment="perl-Test-Simple is &lt;0.72-0.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990656" version="1" comment="perl-base is &lt;5.10.0-64.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990657" version="1" comment="perl-doc is &lt;5.10.0-64.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990658" version="1" comment="perl-x86 is &lt;5.10.0-64.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990659" version="1" comment="popt is &lt;1.7-37.63.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990660" version="1" comment="popt-32bit is &lt;1.7-37.63.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990661" version="1" comment="popt-x86 is &lt;1.7-37.63.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990662" version="1" comment="rpm is &lt;4.4.2.3-37.63.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990663" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.63.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990664" version="1" comment="rpm-x86 is &lt;4.4.2.3-37.63.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990665" version="1" comment="powerpc-utils is &lt;1.2.22-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990666" version="1" comment="ppc64-diag is &lt;2.6.7-1.31 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990667" version="1" comment="ppp is &lt;2.4.5.git-2.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990668" version="1" comment="procmail is &lt;3.22-240.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990669" version="1" comment="puppet is &lt;2.7.26-0.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990670" version="1" comment="puppet-server is &lt;2.7.26-0.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990671" version="1" comment="pure-ftpd is &lt;1.0.22-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990672" version="1" comment="python is &lt;2.6.9-0.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990673" version="1" comment="python-32bit is &lt;2.6.9-0.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990674" version="1" comment="python-curses is &lt;2.6.9-0.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990675" version="1" comment="python-demo is &lt;2.6.9-0.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990676" version="1" comment="python-gdbm is &lt;2.6.9-0.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990677" version="1" comment="python-idle is &lt;2.6.9-0.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990678" version="1" comment="python-tk is &lt;2.6.9-0.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990679" version="1" comment="python-x86 is &lt;2.6.9-0.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990680" version="1" comment="python-imaging is &lt;1.1.6-168.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990681" version="1" comment="python-lxml is &lt;2.3.6-0.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990682" version="1" comment="python-pywbem is &lt;0.7-6.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990683" version="1" comment="quagga is &lt;0.99.15-0.14.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990684" version="1" comment="radvd is &lt;1.1-1.24.8.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990685" version="1" comment="rsyslog is &lt;5.10.1-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990686" version="1" comment="rsyslog-diag-tools is &lt;5.10.1-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990687" version="1" comment="rsyslog-doc is &lt;5.10.1-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990688" version="1" comment="rsyslog-module-gssapi is &lt;5.10.1-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990689" version="1" comment="rsyslog-module-gtls is &lt;5.10.1-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990690" version="1" comment="rsyslog-module-mysql is &lt;5.10.1-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990691" version="1" comment="rsyslog-module-pgsql is &lt;5.10.1-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990692" version="1" comment="rsyslog-module-relp is &lt;5.10.1-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990693" version="1" comment="rsyslog-module-snmp is &lt;5.10.1-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990694" version="1" comment="rsyslog-module-udpspoof is &lt;5.10.1-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990695" version="1" comment="ruby is &lt;1.8.7.p357-0.9.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990696" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990697" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990698" version="1" comment="sblim-sfcb is &lt;1.3.11-0.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990699" version="1" comment="sendmail is &lt;8.14.3-50.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990700" version="1" comment="shim is &lt;0.7.318.81ee561d-0.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990701" version="1" comment="squid is &lt;2.7.STABLE5-2.12.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990702" version="1" comment="squid3 is &lt;3.1.12-8.16.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990703" version="1" comment="star is &lt;1.5final-28.23.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990704" version="1" comment="strongswan is &lt;4.4.0-6.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990705" version="1" comment="strongswan-doc is &lt;4.4.0-6.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990706" version="1" comment="sudo is &lt;1.7.6p2-0.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990707" version="1" comment="sysconfig is &lt;0.71.61-0.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990708" version="1" comment="sysstat is &lt;8.1.5-7.50.25 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990709" version="1" comment="sysstat-isag is &lt;8.1.5-7.50.25 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990710" version="1" comment="tar is &lt;1.26-1.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990711" version="1" comment="tcpdump is &lt;3.9.8-1.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990712" version="1" comment="tomcat6 is &lt;6.0.41-0.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990713" version="1" comment="tomcat6-admin-webapps is &lt;6.0.41-0.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990714" version="1" comment="tomcat6-docs-webapp is &lt;6.0.41-0.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990715" version="1" comment="tomcat6-javadoc is &lt;6.0.41-0.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990716" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.41-0.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990717" version="1" comment="tomcat6-lib is &lt;6.0.41-0.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990718" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.41-0.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990719" version="1" comment="tomcat6-webapps is &lt;6.0.41-0.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990720" version="1" comment="unzip is &lt;6.00-11.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990721" version="1" comment="vino is &lt;2.28.1-2.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990722" version="1" comment="vino-lang is &lt;2.28.1-2.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990723" version="1" comment="virt-utils is &lt;1.2.1-10.41 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990724" version="1" comment="vsftpd is &lt;2.0.7-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990725" version="1" comment="wget is &lt;1.11.4-1.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990726" version="1" comment="wireshark is &lt;1.10.13-0.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990727" version="1" comment="wpa_supplicant is &lt;0.7.1-6.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990728" version="1" comment="xalan-j2 is &lt;2.7.0-217.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990729" version="1" comment="xen is &lt;4.4.2_08-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990730" version="1" comment="xen-doc-html is &lt;4.4.2_08-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990731" version="1" comment="xen-kmp-default is &lt;4.4.2_08_3.0.101_63-1.7 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990732" version="1" comment="xen-kmp-pae is &lt;4.4.2_08_3.0.101_63-1.7 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990733" version="1" comment="xen-libs is &lt;4.4.2_08-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990734" version="1" comment="xen-libs-32bit is &lt;4.4.2_08-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990735" version="1" comment="xen-tools is &lt;4.4.2_08-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990736" version="1" comment="xen-tools-domU is &lt;4.4.2_08-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990737" version="1" comment="xinetd is &lt;2.3.14-130.133.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990738" version="1" comment="xorg-x11 is &lt;7.4-9.65.46 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990739" version="1" comment="xorg-x11-xauth is &lt;7.4-9.65.46 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990740" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.105.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990741" version="1" comment="xorg-x11-server is &lt;7.4-27.105.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990742" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.105.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990743" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.11.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990744" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.11.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990745" version="1" comment="xorg-x11-libX11-x86 is &lt;7.4-5.11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990746" version="1" comment="xorg-x11-libXext is &lt;7.4-1.18.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990747" version="1" comment="xorg-x11-libXext-32bit is &lt;7.4-1.18.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990748" version="1" comment="xorg-x11-libXext-x86 is &lt;7.4-1.18.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990749" version="1" comment="xorg-x11-libXfixes is &lt;7.4-1.16.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990750" version="1" comment="xorg-x11-libXfixes-32bit is &lt;7.4-1.16.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990751" version="1" comment="xorg-x11-libXfixes-x86 is &lt;7.4-1.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990752" version="1" comment="xorg-x11-libXp is &lt;7.4-1.18.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990753" version="1" comment="xorg-x11-libXp-32bit is &lt;7.4-1.18.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990754" version="1" comment="xorg-x11-libXp-x86 is &lt;7.4-1.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990755" version="1" comment="xorg-x11-libXrender is &lt;7.4-1.16.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990756" version="1" comment="xorg-x11-libXrender-32bit is &lt;7.4-1.16.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990757" version="1" comment="xorg-x11-libXrender-x86 is &lt;7.4-1.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990758" version="1" comment="xorg-x11-libXt is &lt;7.4-1.19.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990759" version="1" comment="xorg-x11-libXt-32bit is &lt;7.4-1.19.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990760" version="1" comment="xorg-x11-libXt-x86 is &lt;7.4-1.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990761" version="1" comment="xorg-x11-libXv is &lt;7.4-1.16.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990762" version="1" comment="xorg-x11-libXv-32bit is &lt;7.4-1.16.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990763" version="1" comment="xorg-x11-libXv-x86 is &lt;7.4-1.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990764" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990765" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990766" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990767" version="1" comment="xorg-x11-server-rdp is &lt;7.3.99-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990768" version="1" comment="yast2 is &lt;2.17.140-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990769" version="1" comment="yast2-core is &lt;2.17.46-0.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990770" version="1" comment="curl-openssl1 is &lt;7.19.7-1.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990771" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990772" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117400" version="1" comment="sles-release is &gt;=11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990773" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-0.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990774" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-0.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990775" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.28.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990776" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.28.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990777" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990778" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990779" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990780" version="1" comment="openssl1 is &lt;1.0.1g-0.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990781" version="1" comment="openssl1-doc is &lt;1.0.1g-0.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990782" version="1" comment="libslp1-openssl1 is &lt;1.2.0-172.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990783" version="1" comment="libsnmp15-openssl1 is &lt;5.4.2.1-8.12.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990784" version="1" comment="libsnmp15-openssl1-32bit is &lt;5.4.2.1-8.12.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990785" version="1" comment="mailx-openssl1 is &lt;12.5-1.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990786" version="1" comment="openssh-openssl1 is &lt;6.6p1-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990787" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990788" version="1" comment="openvpn-openssl1 is &lt;2.3.2-0.10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990789" version="1" comment="openvpn-openssl1-down-root-plugin is &lt;2.3.2-0.10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990790" version="1" comment="sblim-sfcb-openssl1 is &lt;1.3.11-0.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990791" version="1" comment="stunnel-openssl1 is &lt;4.54-0.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990792" version="1" comment="vsftpd-openssl1 is &lt;2.0.7-4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990793" version="1" comment="wget-openssl1 is &lt;1.11.4-1.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990794" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990795" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990796" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990797" version="1" comment="openssl1 is &lt;1.0.1g-0.58.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990798" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990799" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990800" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990801" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990802" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990803" version="1" comment="openssl is &lt;0.9.8j-0.106.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990804" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990805" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990806" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990807" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990808" version="1" comment="openssl1 is &lt;1.0.1g-0.58.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990809" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990810" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990811" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990812" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990813" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990814" version="1" comment="openssl is &lt;0.9.8j-0.106.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990815" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990816" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990817" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990818" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990819" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990820" version="1" comment="openssl is &lt;0.9.8j-0.106.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990821" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990822" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990823" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990824" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990825" version="1" comment="openssl1 is &lt;1.0.1g-0.58.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990826" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990827" version="1" comment="kernel-default is &lt;3.0.101-108.141.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990828" version="1" comment="kernel-default-base is &lt;3.0.101-108.141.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990830" version="1" comment="kernel-ec2 is &lt;3.0.101-108.141.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990831" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.141.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990833" version="1" comment="kernel-source is &lt;3.0.101-108.141.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990834" version="1" comment="kernel-syms is &lt;3.0.101-108.141.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990835" version="1" comment="kernel-trace is &lt;3.0.101-108.141.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990836" version="1" comment="kernel-trace-base is &lt;3.0.101-108.141.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990838" version="1" comment="kernel-xen is &lt;3.0.101-108.141.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990839" version="1" comment="kernel-xen-base is &lt;3.0.101-108.141.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990841" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990842" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990843" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990844" version="1" comment="openssl1 is &lt;1.0.1g-0.58.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990845" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990846" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990847" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990848" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990849" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990850" version="1" comment="openssl is &lt;0.9.8j-0.106.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990851" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990852" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990853" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990854" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990855" version="1" comment="openssl1 is &lt;1.0.1g-0.58.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990856" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990857" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990858" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990859" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990860" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990861" version="1" comment="openssl is &lt;0.9.8j-0.106.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990862" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990863" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990864" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990865" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990866" version="1" comment="openssl1 is &lt;1.0.1g-0.58.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990867" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990868" version="1" comment="kernel-default is &lt;3.0.101-108.144.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990869" version="1" comment="kernel-default-base is &lt;3.0.101-108.144.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990871" version="1" comment="kernel-ec2 is &lt;3.0.101-108.144.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990872" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.144.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990874" version="1" comment="kernel-source is &lt;3.0.101-108.144.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990875" version="1" comment="kernel-syms is &lt;3.0.101-108.144.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990876" version="1" comment="kernel-trace is &lt;3.0.101-108.144.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990877" version="1" comment="kernel-trace-base is &lt;3.0.101-108.144.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990879" version="1" comment="kernel-xen is &lt;3.0.101-108.144.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990880" version="1" comment="kernel-xen-base is &lt;3.0.101-108.144.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990882" version="1" comment="kernel-default is &lt;3.0.101-108.147.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990883" version="1" comment="kernel-default-base is &lt;3.0.101-108.147.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990885" version="1" comment="kernel-ec2 is &lt;3.0.101-108.147.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990886" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.147.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990888" version="1" comment="kernel-source is &lt;3.0.101-108.147.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990889" version="1" comment="kernel-syms is &lt;3.0.101-108.147.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990890" version="1" comment="kernel-trace is &lt;3.0.101-108.147.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990891" version="1" comment="kernel-trace-base is &lt;3.0.101-108.147.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990893" version="1" comment="kernel-xen is &lt;3.0.101-108.147.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990894" version="1" comment="kernel-xen-base is &lt;3.0.101-108.147.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990896" version="1" comment="kernel-default is &lt;3.0.101-108.138.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990897" version="1" comment="kernel-default-base is &lt;3.0.101-108.138.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990899" version="1" comment="kernel-ec2 is &lt;3.0.101-108.138.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990900" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.138.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990902" version="1" comment="kernel-source is &lt;3.0.101-108.138.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990903" version="1" comment="kernel-syms is &lt;3.0.101-108.138.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990904" version="1" comment="kernel-trace is &lt;3.0.101-108.138.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990905" version="1" comment="kernel-trace-base is &lt;3.0.101-108.138.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990907" version="1" comment="kernel-xen is &lt;3.0.101-108.138.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990908" version="1" comment="kernel-xen-base is &lt;3.0.101-108.138.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990910" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990911" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990912" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990913" version="1" comment="openssl1 is &lt;1.0.1g-0.58.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990914" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990915" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990916" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990917" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990918" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990919" version="1" comment="openssl is &lt;0.9.8j-0.106.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990920" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990921" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990922" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990923" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990924" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990925" version="1" comment="openssl is &lt;0.9.8j-0.106.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990926" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990927" version="1" comment="kernel-default is &lt;3.0.101-108.150.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990928" version="1" comment="kernel-default-base is &lt;3.0.101-108.150.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990930" version="1" comment="kernel-ec2 is &lt;3.0.101-108.150.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990931" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.150.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990933" version="1" comment="kernel-source is &lt;3.0.101-108.150.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990934" version="1" comment="kernel-syms is &lt;3.0.101-108.150.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990935" version="1" comment="kernel-trace is &lt;3.0.101-108.150.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990936" version="1" comment="kernel-trace-base is &lt;3.0.101-108.150.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990938" version="1" comment="kernel-xen is &lt;3.0.101-108.150.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990939" version="1" comment="kernel-xen-base is &lt;3.0.101-108.150.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990941" version="1" comment="kernel-default is &lt;3.0.101-108.153.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990942" version="1" comment="kernel-default-base is &lt;3.0.101-108.153.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990944" version="1" comment="kernel-ec2 is &lt;3.0.101-108.153.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990945" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.153.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990947" version="1" comment="kernel-source is &lt;3.0.101-108.153.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990948" version="1" comment="kernel-syms is &lt;3.0.101-108.153.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990949" version="1" comment="kernel-trace is &lt;3.0.101-108.153.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990950" version="1" comment="kernel-trace-base is &lt;3.0.101-108.153.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990952" version="1" comment="kernel-xen is &lt;3.0.101-108.153.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990953" version="1" comment="kernel-xen-base is &lt;3.0.101-108.153.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990955" version="1" comment="glibc is &lt;2.11.3-17.110.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990956" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990957" version="1" comment="glibc-devel is &lt;2.11.3-17.110.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990958" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990959" version="1" comment="glibc-html is &lt;2.11.3-17.110.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990960" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990961" version="1" comment="glibc-info is &lt;2.11.3-17.110.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990962" version="1" comment="glibc-locale is &lt;2.11.3-17.110.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990963" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990964" version="1" comment="glibc-profile is &lt;2.11.3-17.110.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990965" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990966" version="1" comment="nscd is &lt;2.11.3-17.110.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990967" version="1" comment="kernel-default is &lt;3.0.101-108.156.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990968" version="1" comment="kernel-default-base is &lt;3.0.101-108.156.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990970" version="1" comment="kernel-ec2 is &lt;3.0.101-108.156.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990971" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.156.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990973" version="1" comment="kernel-source is &lt;3.0.101-108.156.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990974" version="1" comment="kernel-syms is &lt;3.0.101-108.156.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990975" version="1" comment="kernel-trace is &lt;3.0.101-108.156.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990976" version="1" comment="kernel-trace-base is &lt;3.0.101-108.156.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990978" version="1" comment="kernel-xen is &lt;3.0.101-108.156.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990979" version="1" comment="kernel-xen-base is &lt;3.0.101-108.156.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990981" version="1" comment="kernel-default is &lt;3.0.101-108.159.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990982" version="1" comment="kernel-default-base is &lt;3.0.101-108.159.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990984" version="1" comment="kernel-ec2 is &lt;3.0.101-108.159.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990985" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.159.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990987" version="1" comment="kernel-source is &lt;3.0.101-108.159.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990988" version="1" comment="kernel-syms is &lt;3.0.101-108.159.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990989" version="1" comment="kernel-trace is &lt;3.0.101-108.159.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990990" version="1" comment="kernel-trace-base is &lt;3.0.101-108.159.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990992" version="1" comment="kernel-xen is &lt;3.0.101-108.159.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990993" version="1" comment="kernel-xen-base is &lt;3.0.101-108.159.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990995" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990996" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990997" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990998" version="1" comment="openssl1 is &lt;1.0.1g-0.58.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009990999" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991000" version="1" comment="kernel-default is &lt;3.0.101-108.162.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991001" version="1" comment="kernel-default-base is &lt;3.0.101-108.162.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991003" version="1" comment="kernel-ec2 is &lt;3.0.101-108.162.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991004" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.162.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991006" version="1" comment="kernel-source is &lt;3.0.101-108.162.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991007" version="1" comment="kernel-syms is &lt;3.0.101-108.162.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991008" version="1" comment="kernel-trace is &lt;3.0.101-108.162.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991009" version="1" comment="kernel-trace-base is &lt;3.0.101-108.162.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991011" version="1" comment="kernel-xen is &lt;3.0.101-108.162.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991012" version="1" comment="kernel-xen-base is &lt;3.0.101-108.162.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991014" version="1" comment="kernel-default is &lt;3.0.101-108.165.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991015" version="1" comment="kernel-default-base is &lt;3.0.101-108.165.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991017" version="1" comment="kernel-ec2 is &lt;3.0.101-108.165.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991018" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.165.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991020" version="1" comment="kernel-source is &lt;3.0.101-108.165.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991021" version="1" comment="kernel-syms is &lt;3.0.101-108.165.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991022" version="1" comment="kernel-trace is &lt;3.0.101-108.165.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991023" version="1" comment="kernel-trace-base is &lt;3.0.101-108.165.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991025" version="1" comment="kernel-xen is &lt;3.0.101-108.165.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991026" version="1" comment="kernel-xen-base is &lt;3.0.101-108.165.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991028" version="1" comment="kernel-default is &lt;3.0.101-108.168.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991029" version="1" comment="kernel-default-base is &lt;3.0.101-108.168.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991031" version="1" comment="kernel-ec2 is &lt;3.0.101-108.168.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991032" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.168.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991034" version="1" comment="kernel-source is &lt;3.0.101-108.168.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991035" version="1" comment="kernel-syms is &lt;3.0.101-108.168.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991036" version="1" comment="kernel-trace is &lt;3.0.101-108.168.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991037" version="1" comment="kernel-trace-base is &lt;3.0.101-108.168.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991039" version="1" comment="kernel-xen is &lt;3.0.101-108.168.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991040" version="1" comment="kernel-xen-base is &lt;3.0.101-108.168.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991042" version="1" comment="kernel-default is &lt;3.0.101-108.171.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991043" version="1" comment="kernel-default-base is &lt;3.0.101-108.171.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991045" version="1" comment="kernel-ec2 is &lt;3.0.101-108.171.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991046" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.171.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991048" version="1" comment="kernel-source is &lt;3.0.101-108.171.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991049" version="1" comment="kernel-syms is &lt;3.0.101-108.171.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991050" version="1" comment="kernel-trace is &lt;3.0.101-108.171.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991051" version="1" comment="kernel-trace-base is &lt;3.0.101-108.171.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991053" version="1" comment="kernel-xen is &lt;3.0.101-108.171.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991054" version="1" comment="kernel-xen-base is &lt;3.0.101-108.171.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991056" version="1" comment="glibc is &lt;2.11.3-17.110.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991057" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991058" version="1" comment="glibc-devel is &lt;2.11.3-17.110.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991059" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991060" version="1" comment="glibc-html is &lt;2.11.3-17.110.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991061" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991062" version="1" comment="glibc-info is &lt;2.11.3-17.110.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991063" version="1" comment="glibc-locale is &lt;2.11.3-17.110.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991064" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991065" version="1" comment="glibc-profile is &lt;2.11.3-17.110.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991066" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991067" version="1" comment="nscd is &lt;2.11.3-17.110.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991068" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991069" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991070" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991071" version="1" comment="openssl1 is &lt;1.0.1g-0.58.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991072" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991073" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991074" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991075" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991076" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991077" version="1" comment="openssl is &lt;0.9.8j-0.106.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991078" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991079" version="1" comment="microcode_ctl is &lt;1.17-102.83.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991080" version="1" comment="kernel-default is &lt;3.0.101-108.174.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991081" version="1" comment="kernel-default-base is &lt;3.0.101-108.174.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991083" version="1" comment="kernel-ec2 is &lt;3.0.101-108.174.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991084" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.174.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991086" version="1" comment="kernel-source is &lt;3.0.101-108.174.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991087" version="1" comment="kernel-syms is &lt;3.0.101-108.174.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991088" version="1" comment="kernel-trace is &lt;3.0.101-108.174.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991089" version="1" comment="kernel-trace-base is &lt;3.0.101-108.174.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991091" version="1" comment="kernel-xen is &lt;3.0.101-108.174.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991092" version="1" comment="kernel-xen-base is &lt;3.0.101-108.174.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991094" version="1" comment="microcode_ctl is &lt;1.17-102.83.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991095" version="1" comment="kernel-default is &lt;3.0.101-108.183.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991096" version="1" comment="kernel-default-base is &lt;3.0.101-108.183.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991098" version="1" comment="kernel-ec2 is &lt;3.0.101-108.183.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991099" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.183.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991101" version="1" comment="kernel-source is &lt;3.0.101-108.183.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991102" version="1" comment="kernel-syms is &lt;3.0.101-108.183.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991103" version="1" comment="kernel-trace is &lt;3.0.101-108.183.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991104" version="1" comment="kernel-trace-base is &lt;3.0.101-108.183.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991106" version="1" comment="kernel-xen is &lt;3.0.101-108.183.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991107" version="1" comment="kernel-xen-base is &lt;3.0.101-108.183.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007709" version="1" comment="kernel-default is &lt;3.0.101-108.186.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007710" version="1" comment="kernel-default-base is &lt;3.0.101-108.186.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007712" version="1" comment="kernel-ec2 is &lt;3.0.101-108.186.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007713" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.186.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007715" version="1" comment="kernel-source is &lt;3.0.101-108.186.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007716" version="1" comment="kernel-syms is &lt;3.0.101-108.186.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007717" version="1" comment="kernel-trace is &lt;3.0.101-108.186.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007718" version="1" comment="kernel-trace-base is &lt;3.0.101-108.186.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007720" version="1" comment="kernel-xen is &lt;3.0.101-108.186.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007721" version="1" comment="kernel-xen-base is &lt;3.0.101-108.186.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014439" version="1" comment="kernel-default is &lt;3.0.101-108.189.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014440" version="1" comment="kernel-default-base is &lt;3.0.101-108.189.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018635" version="1" comment="kernel-docs is &lt;3.0.101-108.189.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014442" version="1" comment="kernel-ec2 is &lt;3.0.101-108.189.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014443" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.189.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014445" version="1" comment="kernel-source is &lt;3.0.101-108.189.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014446" version="1" comment="kernel-syms is &lt;3.0.101-108.189.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014447" version="1" comment="kernel-trace is &lt;3.0.101-108.189.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014448" version="1" comment="kernel-trace-base is &lt;3.0.101-108.189.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014450" version="1" comment="kernel-xen is &lt;3.0.101-108.189.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014451" version="1" comment="kernel-xen-base is &lt;3.0.101-108.189.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017384" version="1" comment="microcode_ctl is &lt;1.17-102.83.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022499" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022500" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022501" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022502" version="1" comment="openssl1 is &lt;1.0.1g-0.58.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022503" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032349" version="1" comment="kernel-default is &lt;3.0.101-108.192.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032350" version="1" comment="kernel-default-base is &lt;3.0.101-108.192.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032352" version="1" comment="kernel-docs is &lt;3.0.101-108.192.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032353" version="1" comment="kernel-ec2 is &lt;3.0.101-108.192.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032354" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.192.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032356" version="1" comment="kernel-source is &lt;3.0.101-108.192.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032357" version="1" comment="kernel-syms is &lt;3.0.101-108.192.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032358" version="1" comment="kernel-trace is &lt;3.0.101-108.192.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032359" version="1" comment="kernel-trace-base is &lt;3.0.101-108.192.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032361" version="1" comment="kernel-xen is &lt;3.0.101-108.192.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032362" version="1" comment="kernel-xen-base is &lt;3.0.101-108.192.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034906" version="1" comment="kernel-default is &lt;3.0.101-108.195.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034907" version="1" comment="kernel-default-base is &lt;3.0.101-108.195.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034909" version="1" comment="kernel-docs is &lt;3.0.101-108.195.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034910" version="1" comment="kernel-ec2 is &lt;3.0.101-108.195.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034911" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.195.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034913" version="1" comment="kernel-source is &lt;3.0.101-108.195.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034914" version="1" comment="kernel-syms is &lt;3.0.101-108.195.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034915" version="1" comment="kernel-trace is &lt;3.0.101-108.195.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034916" version="1" comment="kernel-trace-base is &lt;3.0.101-108.195.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034918" version="1" comment="kernel-xen is &lt;3.0.101-108.195.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034919" version="1" comment="kernel-xen-base is &lt;3.0.101-108.195.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991109" version="1" comment="kernel-default is &lt;3.0.101-108.177.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991110" version="1" comment="kernel-default-base is &lt;3.0.101-108.177.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991112" version="1" comment="kernel-ec2 is &lt;3.0.101-108.177.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991113" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.177.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991115" version="1" comment="kernel-source is &lt;3.0.101-108.177.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991116" version="1" comment="kernel-syms is &lt;3.0.101-108.177.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991117" version="1" comment="kernel-trace is &lt;3.0.101-108.177.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991118" version="1" comment="kernel-trace-base is &lt;3.0.101-108.177.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991120" version="1" comment="kernel-xen is &lt;3.0.101-108.177.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991121" version="1" comment="kernel-xen-base is &lt;3.0.101-108.177.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052003" version="1" comment="kernel-default is &lt;3.0.101-108.204.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052004" version="1" comment="kernel-default-base is &lt;3.0.101-108.204.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052005" version="1" comment="kernel-docs is &lt;3.0.101-108.204.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052006" version="1" comment="kernel-ec2 is &lt;3.0.101-108.204.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052007" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.204.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052008" version="1" comment="kernel-source is &lt;3.0.101-108.204.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052009" version="1" comment="kernel-syms is &lt;3.0.101-108.204.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052010" version="1" comment="kernel-trace is &lt;3.0.101-108.204.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052011" version="1" comment="kernel-trace-base is &lt;3.0.101-108.204.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052012" version="1" comment="kernel-xen is &lt;3.0.101-108.204.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052013" version="1" comment="kernel-xen-base is &lt;3.0.101-108.204.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041035" version="1" comment="kernel-default is &lt;3.0.101-108.198.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041036" version="1" comment="kernel-default-base is &lt;3.0.101-108.198.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041038" version="1" comment="kernel-docs is &lt;3.0.101-108.198.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041039" version="1" comment="kernel-ec2 is &lt;3.0.101-108.198.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041040" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.198.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041042" version="1" comment="kernel-source is &lt;3.0.101-108.198.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041043" version="1" comment="kernel-syms is &lt;3.0.101-108.198.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041044" version="1" comment="kernel-trace is &lt;3.0.101-108.198.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041045" version="1" comment="kernel-trace-base is &lt;3.0.101-108.198.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041047" version="1" comment="kernel-xen is &lt;3.0.101-108.198.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041048" version="1" comment="kernel-xen-base is &lt;3.0.101-108.198.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991123" version="1" comment="kernel-default is &lt;3.0.101-108.180.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991124" version="1" comment="kernel-default-base is &lt;3.0.101-108.180.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042146" version="1" comment="kernel-docs is &lt;3.0.101-108.180.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991126" version="1" comment="kernel-ec2 is &lt;3.0.101-108.180.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991127" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.180.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991129" version="1" comment="kernel-source is &lt;3.0.101-108.180.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991130" version="1" comment="kernel-syms is &lt;3.0.101-108.180.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991131" version="1" comment="kernel-trace is &lt;3.0.101-108.180.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991132" version="1" comment="kernel-trace-base is &lt;3.0.101-108.180.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991134" version="1" comment="kernel-xen is &lt;3.0.101-108.180.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991135" version="1" comment="kernel-xen-base is &lt;3.0.101-108.180.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043851" version="1" comment="libopenssl1-devel is &lt;1.0.1g-58.90.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043852" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-58.90.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043853" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-58.90.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043854" version="1" comment="openssl1 is &lt;1.0.1g-58.90.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043855" version="1" comment="openssl1-doc is &lt;1.0.1g-58.90.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046019" version="1" comment="microcode_ctl is &lt;1.17-102.83.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046020" version="1" comment="kernel-default is &lt;3.0.101-108.201.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046021" version="1" comment="kernel-default-base is &lt;3.0.101-108.201.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046023" version="1" comment="kernel-docs is &lt;3.0.101-108.201.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046024" version="1" comment="kernel-ec2 is &lt;3.0.101-108.201.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046025" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.201.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046027" version="1" comment="kernel-source is &lt;3.0.101-108.201.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046028" version="1" comment="kernel-syms is &lt;3.0.101-108.201.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046029" version="1" comment="kernel-trace is &lt;3.0.101-108.201.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046030" version="1" comment="kernel-trace-base is &lt;3.0.101-108.201.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046032" version="1" comment="kernel-xen is &lt;3.0.101-108.201.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046033" version="1" comment="kernel-xen-base is &lt;3.0.101-108.201.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562788" version="1" comment="python-Jinja2 is &lt;2.6-2.19.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562789" version="1" comment="python-azure-agent is &lt;2.2.45-28.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657130" version="1" comment="clamav-openssl1 is &lt;0.103.4-0.20.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664011" version="1" comment="clamav-openssl1 is &lt;0.103.5-0.20.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592450" version="1" comment="cyrus-sasl-openssl1 is &lt;2.1.22-0.27.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592451" version="1" comment="cyrus-sasl-openssl1-32bit is &lt;2.1.22-0.27.6 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592452" version="1" comment="cyrus-sasl-openssl1-crammd5 is &lt;2.1.22-0.27.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592453" version="1" comment="cyrus-sasl-openssl1-digestmd5 is &lt;2.1.22-0.27.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592454" version="1" comment="cyrus-sasl-openssl1-gssapi is &lt;2.1.22-0.27.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592455" version="1" comment="cyrus-sasl-openssl1-ntlm is &lt;2.1.22-0.27.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592456" version="1" comment="cyrus-sasl-openssl1-otp is &lt;2.1.22-0.27.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592457" version="1" comment="cyrus-sasl-openssl1-plain is &lt;2.1.22-0.27.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592458" version="1" comment="cyrus-sasl-openssl1-x86 is &lt;2.1.22-0.27.6 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592463" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-0.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592464" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-0.38.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592459" version="1" comment="libcurl4-openssl1-x86 is &lt;7.19.7-0.38.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592460" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.28.8 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592461" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.28.8 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592462" version="1" comment="libldap-openssl1-2_4-2-x86 is &lt;2.4.26-0.28.8 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565590" version="1" comment="curl-openssl1 is &lt;7.19.7-1.61.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565591" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.61.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565592" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.61.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565593" version="1" comment="libcurl4-openssl1-x86 is &lt;7.19.7-1.61.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565594" version="1" comment="curl-openssl1 is &lt;7.19.7-1.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565595" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565596" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.64.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565597" version="1" comment="libcurl4-openssl1-x86 is &lt;7.19.7-1.64.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565598" version="1" comment="curl-openssl1 is &lt;7.19.7-1.69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565599" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565600" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.69.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565601" version="1" comment="libcurl4-openssl1-x86 is &lt;7.19.7-1.69.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565602" version="1" comment="curl-openssl1 is &lt;7.19.7-1.70.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565603" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.70.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565604" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.70.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565605" version="1" comment="libcurl4-openssl1-x86 is &lt;7.19.7-1.70.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565606" version="1" comment="curl-openssl1 is &lt;7.19.7-1.70.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565607" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.70.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565608" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.70.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565609" version="1" comment="libcurl4-openssl1-x86 is &lt;7.19.7-1.70.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565610" version="1" comment="curl-openssl1 is &lt;7.19.7-1.70.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565611" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.70.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565612" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.70.13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565613" version="1" comment="curl-openssl1 is &lt;7.37.0-70.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565614" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565615" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.27.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565616" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.27.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565617" version="1" comment="curl-openssl1 is &lt;7.37.0-70.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565618" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565619" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565620" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.30.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565621" version="1" comment="curl-openssl1 is &lt;7.37.0-70.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565622" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565623" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565624" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.33.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565625" version="1" comment="curl-openssl1 is &lt;7.37.0-70.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565626" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565627" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.38.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565628" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.38.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565629" version="1" comment="curl-openssl1 is &lt;7.37.0-70.41.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565630" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.41.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565631" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.41.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565632" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.41.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565633" version="1" comment="curl-openssl1 is &lt;7.37.0-70.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565634" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565635" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.44.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565636" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.44.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565637" version="1" comment="curl-openssl1 is &lt;7.37.0-70.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565638" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565639" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.47.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565640" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.47.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565641" version="1" comment="curl-openssl1 is &lt;7.37.0-70.52.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565642" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.52.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565643" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.52.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565644" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.52.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565645" version="1" comment="curl-openssl1 is &lt;7.37.0-70.57.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565646" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.57.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565647" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.57.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565648" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.57.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565649" version="1" comment="curl-openssl1 is &lt;7.37.0-70.60.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565650" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.60.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565651" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.60.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565652" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.60.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565653" version="1" comment="curl-openssl1 is &lt;7.37.0-70.63.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565654" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.63.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565655" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.63.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565656" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.63.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565657" version="1" comment="curl-openssl1 is &lt;7.37.0-70.66.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565658" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.66.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565659" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.66.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565660" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.66.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626165" version="1" comment="curl-openssl1 is &lt;7.37.0-70.71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626166" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626167" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.71.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626168" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.71.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633933" version="1" comment="curl-openssl1 is &lt;7.37.0-70.74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633934" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633935" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.74.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633936" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.74.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565661" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-0.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565662" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-0.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565663" version="1" comment="libcurl4-openssl1-x86 is &lt;7.19.7-0.40.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565664" version="1" comment="cyrus-sasl-openssl1 is &lt;2.1.22-182.26.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565665" version="1" comment="cyrus-sasl-openssl1-32bit is &lt;2.1.22-182.26.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565666" version="1" comment="cyrus-sasl-openssl1-crammd5 is &lt;2.1.22-182.26.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565667" version="1" comment="cyrus-sasl-openssl1-crammd5-32bit is &lt;2.1.22-182.26.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565668" version="1" comment="cyrus-sasl-openssl1-crammd5-x86 is &lt;2.1.22-182.26.4.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565669" version="1" comment="cyrus-sasl-openssl1-digestmd5 is &lt;2.1.22-182.26.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565670" version="1" comment="cyrus-sasl-openssl1-digestmd5-32bit is &lt;2.1.22-182.26.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565671" version="1" comment="cyrus-sasl-openssl1-digestmd5-x86 is &lt;2.1.22-182.26.4.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565672" version="1" comment="cyrus-sasl-openssl1-gssapi is &lt;2.1.22-182.26.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565673" version="1" comment="cyrus-sasl-openssl1-gssapi-32bit is &lt;2.1.22-182.26.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565674" version="1" comment="cyrus-sasl-openssl1-gssapi-x86 is &lt;2.1.22-182.26.4.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565675" version="1" comment="cyrus-sasl-openssl1-ntlm is &lt;2.1.22-182.26.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565676" version="1" comment="cyrus-sasl-openssl1-otp is &lt;2.1.22-182.26.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565677" version="1" comment="cyrus-sasl-openssl1-otp-32bit is &lt;2.1.22-182.26.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565678" version="1" comment="cyrus-sasl-openssl1-otp-x86 is &lt;2.1.22-182.26.4.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565679" version="1" comment="cyrus-sasl-openssl1-plain is &lt;2.1.22-182.26.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565680" version="1" comment="cyrus-sasl-openssl1-plain-32bit is &lt;2.1.22-182.26.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565681" version="1" comment="cyrus-sasl-openssl1-plain-x86 is &lt;2.1.22-182.26.4.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565682" version="1" comment="cyrus-sasl-openssl1-x86 is &lt;2.1.22-182.26.4.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669432" version="1" comment="cyrus-sasl-openssl1 is &lt;2.1.22-182.26.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669433" version="1" comment="cyrus-sasl-openssl1-32bit is &lt;2.1.22-182.26.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669434" version="1" comment="cyrus-sasl-openssl1-crammd5 is &lt;2.1.22-182.26.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669435" version="1" comment="cyrus-sasl-openssl1-crammd5-32bit is &lt;2.1.22-182.26.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669436" version="1" comment="cyrus-sasl-openssl1-crammd5-x86 is &lt;2.1.22-182.26.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669437" version="1" comment="cyrus-sasl-openssl1-digestmd5 is &lt;2.1.22-182.26.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669438" version="1" comment="cyrus-sasl-openssl1-digestmd5-32bit is &lt;2.1.22-182.26.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669439" version="1" comment="cyrus-sasl-openssl1-digestmd5-x86 is &lt;2.1.22-182.26.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669440" version="1" comment="cyrus-sasl-openssl1-gssapi is &lt;2.1.22-182.26.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669441" version="1" comment="cyrus-sasl-openssl1-gssapi-32bit is &lt;2.1.22-182.26.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669442" version="1" comment="cyrus-sasl-openssl1-gssapi-x86 is &lt;2.1.22-182.26.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669443" version="1" comment="cyrus-sasl-openssl1-ntlm is &lt;2.1.22-182.26.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669444" version="1" comment="cyrus-sasl-openssl1-otp is &lt;2.1.22-182.26.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669445" version="1" comment="cyrus-sasl-openssl1-otp-32bit is &lt;2.1.22-182.26.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669446" version="1" comment="cyrus-sasl-openssl1-otp-x86 is &lt;2.1.22-182.26.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669447" version="1" comment="cyrus-sasl-openssl1-plain is &lt;2.1.22-182.26.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669448" version="1" comment="cyrus-sasl-openssl1-plain-32bit is &lt;2.1.22-182.26.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669449" version="1" comment="cyrus-sasl-openssl1-plain-x86 is &lt;2.1.22-182.26.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669450" version="1" comment="cyrus-sasl-openssl1-x86 is &lt;2.1.22-182.26.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565683" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565684" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565685" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.22.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565686" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.22.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565687" version="1" comment="openssl1 is &lt;1.0.1g-0.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565688" version="1" comment="openssl1-doc is &lt;1.0.1g-0.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565689" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565690" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565691" version="1" comment="libldap-openssl1-2_4-2-x86 is &lt;2.4.26-0.35.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565692" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.74.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565693" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.74.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565694" version="1" comment="libldap-openssl1-2_4-2-x86 is &lt;2.4.26-0.74.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565695" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.74.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565696" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.74.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565697" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.74.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565698" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.74.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565699" version="1" comment="libldap-openssl1-2_4-2-x86 is &lt;2.4.26-0.74.9.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565700" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.74.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565701" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.74.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565702" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.74.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565703" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.74.13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565704" version="1" comment="libldap-openssl1-2_4-2-x86 is &lt;2.4.26-0.74.13.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565705" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.74.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565706" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.74.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565707" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.74.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565708" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.74.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565709" version="1" comment="libldap-openssl1-2_4-2-x86 is &lt;2.4.26-0.74.16.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565710" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.74.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565711" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.74.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565712" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.74.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565713" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.74.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565714" version="1" comment="libldap-openssl1-2_4-2-x86 is &lt;2.4.26-0.74.19.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565715" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.74.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565716" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.74.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565717" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.74.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565718" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.74.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565719" version="1" comment="libldap-openssl1-2_4-2-x86 is &lt;2.4.26-0.74.26.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565720" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.74.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565721" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.74.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565722" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.30.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565723" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.30.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565724" version="1" comment="libldap-openssl1-2_4-2-x86 is &lt;2.4.26-0.30.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565725" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.62.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565726" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.62.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565727" version="1" comment="libldap-openssl1-2_4-2-x86 is &lt;2.4.26-0.62.3 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565728" version="1" comment="libslp1-openssl1 is &lt;1.2.0-172.27.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565729" version="1" comment="openssh-openssl1 is &lt;6.6p1-10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565730" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565731" version="1" comment="openssh-openssl1 is &lt;6.6p1-15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565732" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565733" version="1" comment="openssh-openssl1 is &lt;6.6p1-18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565734" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565735" version="1" comment="openssh-openssl1 is &lt;6.6p1-19.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565736" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-19.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565737" version="1" comment="openssh-openssl1 is &lt;6.6p1-19.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565738" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-19.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659156" version="1" comment="openssh-openssl1 is &lt;6.6p1-19.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659157" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-19.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593850" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593851" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593852" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593853" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.32.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593854" version="1" comment="openssl1 is &lt;1.0.1g-0.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593855" version="1" comment="openssl1-doc is &lt;1.0.1g-0.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565739" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565740" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565741" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565742" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.35.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565743" version="1" comment="openssl1 is &lt;1.0.1g-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565744" version="1" comment="openssl1-doc is &lt;1.0.1g-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565745" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565746" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565747" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565748" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.40.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565749" version="1" comment="openssl1 is &lt;1.0.1g-0.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565750" version="1" comment="openssl1-doc is &lt;1.0.1g-0.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565751" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565752" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565753" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.47.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565754" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.47.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565755" version="1" comment="openssl1 is &lt;1.0.1g-0.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565756" version="1" comment="openssl1-doc is &lt;1.0.1g-0.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565757" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.52.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565758" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.52.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565759" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.52.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565760" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.52.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565761" version="1" comment="openssl1 is &lt;1.0.1g-0.52.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565762" version="1" comment="openssl1-doc is &lt;1.0.1g-0.52.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565763" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.57.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565764" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.57.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565765" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.57.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565766" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.57.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565767" version="1" comment="openssl1 is &lt;1.0.1g-0.57.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565768" version="1" comment="openssl1-doc is &lt;1.0.1g-0.57.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565769" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565770" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565771" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565772" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565773" version="1" comment="openssl1 is &lt;1.0.1g-0.58.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565774" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565775" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565776" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565777" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565778" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.9.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565779" version="1" comment="openssl1 is &lt;1.0.1g-0.58.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565780" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565781" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565782" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565783" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565784" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565785" version="1" comment="openssl1 is &lt;1.0.1g-0.58.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565786" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565787" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565788" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565789" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565790" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565791" version="1" comment="openssl1 is &lt;1.0.1g-0.58.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565792" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565793" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565794" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565795" version="1" comment="openssl1 is &lt;1.0.1g-0.58.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565796" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565797" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565798" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565799" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565800" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.21.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565801" version="1" comment="openssl1 is &lt;1.0.1g-0.58.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565802" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565803" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565804" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565805" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.24.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565806" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.24.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565807" version="1" comment="openssl1 is &lt;1.0.1g-0.58.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565808" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565809" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.27.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565810" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.27.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565811" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.27.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565812" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.27.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565813" version="1" comment="openssl1 is &lt;1.0.1g-0.58.27.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565814" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.27.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565815" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565816" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565817" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565818" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.30.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565819" version="1" comment="openssl1 is &lt;1.0.1g-0.58.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565820" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565821" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565822" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565823" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565824" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.33.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565825" version="1" comment="openssl1 is &lt;1.0.1g-0.58.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565826" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631729" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.36.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631730" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.36.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631731" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.36.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631732" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.36.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631733" version="1" comment="openssl1 is &lt;1.0.1g-0.58.36.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631734" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.36.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632537" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632538" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632539" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632540" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632541" version="1" comment="openssl1 is &lt;1.0.1g-0.58.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632542" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673386" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673387" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673388" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.42.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673389" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.42.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673390" version="1" comment="openssl1 is &lt;1.0.1g-0.58.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673391" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565827" version="1" comment="openvpn-openssl1 is &lt;2.3.2-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565828" version="1" comment="openvpn-openssl1-down-root-plugin is &lt;2.3.2-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565829" version="1" comment="openvpn-openssl1 is &lt;2.3.2-0.10.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565830" version="1" comment="openvpn-openssl1-down-root-plugin is &lt;2.3.2-0.10.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565831" version="1" comment="openvpn-openssl1 is &lt;2.3.2-0.10.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565832" version="1" comment="openvpn-openssl1-down-root-plugin is &lt;2.3.2-0.10.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565833" version="1" comment="openvpn-openssl1 is &lt;2.3.2-0.10.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565834" version="1" comment="openvpn-openssl1-down-root-plugin is &lt;2.3.2-0.10.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676886" version="1" comment="openvpn-openssl1 is &lt;2.3.2-0.10.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676887" version="1" comment="openvpn-openssl1-down-root-plugin is &lt;2.3.2-0.10.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565835" version="1" comment="sblim-sfcb-openssl1 is &lt;1.3.11-0.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565836" version="1" comment="wget-openssl1 is &lt;1.11.4-1.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565837" version="1" comment="wget-openssl1 is &lt;1.11.4-1.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565838" version="1" comment="wget-openssl1 is &lt;1.11.4-1.41.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565900" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565901" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258808" version="1" comment="SLES_SAP-release is ==11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569626" version="1" comment="java-1_4_2-ibm-sap is &lt;1.4.2_sr13.13-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569627" version="1" comment="java-1_4_2-ibm-sap-devel is &lt;1.4.2_sr13.13-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258809" version="1" comment="SLES_SAP-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569628" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566374" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569629" version="1" comment="sap_suse_cluster_connector is &lt;1.0.0-0.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569630" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566372" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258810" version="1" comment="SLES_SAP-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593856" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593832" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569631" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569632" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569633" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569634" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569635" version="1" comment="clamsap is &lt;0.98.9-0.7.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258811" version="1" comment="SLES_SAP-release is ==11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593857" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.33.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593858" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.33.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569636" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.36.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569637" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.36.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569638" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.41.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569639" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.41.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569640" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.44.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569641" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.44.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569642" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.47.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569643" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.47.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569644" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.50.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569645" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.50.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569646" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.51.5.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569647" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.51.5.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569648" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.51.8.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569649" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.51.8.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569650" version="1" comment="lighttpd-mod_cml is &lt;1.4.20-2.58.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569651" version="1" comment="lighttpd-mod_magnet is &lt;1.4.20-2.58.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569652" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.20-2.58.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569653" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.20-2.58.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569654" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.20-2.58.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569655" version="1" comment="lighttpd-mod_webdav is &lt;1.4.20-2.58.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569656" version="1" comment="rhn-virtualization-common is &lt;5.4.15-0.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569657" version="1" comment="rhn-virtualization-host is &lt;5.4.15-0.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569658" version="1" comment="rhncfg is &lt;5.9.33-0.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569659" version="1" comment="rhncfg-actions is &lt;5.9.33-0.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569660" version="1" comment="rhncfg-client is &lt;5.9.33-0.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569661" version="1" comment="rhncfg-management is &lt;5.9.33-0.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569662" version="1" comment="koan is &lt;2.0.10-0.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591535" version="1" comment="libzypp is &lt;6.39.0-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569663" version="1" comment="rhnmd is &lt;5.3.7-0.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569664" version="1" comment="spacewalk-backend-libs is &lt;1.2.74-0.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569665" version="1" comment="spacewalk-certs-tools is &lt;1.2.2-0.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569666" version="1" comment="spacewalk-backend-libs is &lt;1.2.74-0.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594223" version="1" comment="osa-common is &lt;5.11.64.3-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594224" version="1" comment="osad is &lt;5.11.64.3-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594225" version="1" comment="salt is &lt;2015.8.12-27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594226" version="1" comment="salt-doc is &lt;2015.8.12-27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594227" version="1" comment="salt-minion is &lt;2015.8.12-27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594228" version="1" comment="spacewalk-backend-libs is &lt;2.5.24.7-16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594229" version="1" comment="supportutils-plugin-susemanager-client is &lt;3.0.5-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569667" version="1" comment="rhnlib is &lt;2.5.84.4-8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569668" version="1" comment="spacecmd is &lt;2.5.5.5-14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569669" version="1" comment="spacewalk-backend-libs is &lt;2.5.24.9-24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569670" version="1" comment="spacewalk-check is &lt;2.5.13.8-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569671" version="1" comment="spacewalk-client-setup is &lt;2.5.13.8-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569672" version="1" comment="spacewalk-client-tools is &lt;2.5.13.8-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569673" version="1" comment="mgr-cfg is &lt;4.0.9-5.6.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569674" version="1" comment="mgr-cfg-actions is &lt;4.0.9-5.6.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569675" version="1" comment="mgr-cfg-client is &lt;4.0.9-5.6.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569676" version="1" comment="mgr-cfg-management is &lt;4.0.9-5.6.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569677" version="1" comment="mgr-daemon is &lt;4.0.7-5.8.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569678" version="1" comment="mgr-osad is &lt;4.0.9-5.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569679" version="1" comment="mgr-virtualization-host is &lt;4.0.8-5.8.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569680" version="1" comment="python2-mgr-cfg is &lt;4.0.9-5.6.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569681" version="1" comment="python2-mgr-cfg-actions is &lt;4.0.9-5.6.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569682" version="1" comment="python2-mgr-cfg-client is &lt;4.0.9-5.6.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569683" version="1" comment="python2-mgr-cfg-management is &lt;4.0.9-5.6.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569684" version="1" comment="python2-mgr-osa-common is &lt;4.0.9-5.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569685" version="1" comment="python2-mgr-osad is &lt;4.0.9-5.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569686" version="1" comment="python2-mgr-virtualization-common is &lt;4.0.8-5.8.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569687" version="1" comment="python2-mgr-virtualization-host is &lt;4.0.8-5.8.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569688" version="1" comment="python2-rhnlib is &lt;4.0.11-12.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569689" version="1" comment="spacecmd is &lt;4.0.14-18.51.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569690" version="1" comment="spacewalk-backend-libs is &lt;4.0.25-28.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569691" version="1" comment="spacewalk-remote-utils is &lt;4.0.5-6.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569692" version="1" comment="koan is &lt;2.2.2-0.68.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569693" version="1" comment="mgr-daemon is &lt;4.1.3-5.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569694" version="1" comment="python2-spacewalk-check is &lt;4.1.7-27.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569695" version="1" comment="python2-spacewalk-client-setup is &lt;4.1.7-27.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569696" version="1" comment="python2-spacewalk-client-tools is &lt;4.1.7-27.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569697" version="1" comment="salt is &lt;2016.11.10-43.63.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569698" version="1" comment="salt-doc is &lt;2016.11.10-43.63.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569699" version="1" comment="salt-minion is &lt;2016.11.10-43.63.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569700" version="1" comment="spacecmd is &lt;4.1.8-18.72.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569701" version="1" comment="spacewalk-check is &lt;4.1.7-27.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569702" version="1" comment="spacewalk-client-setup is &lt;4.1.7-27.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569703" version="1" comment="spacewalk-client-tools is &lt;4.1.7-27.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569704" version="1" comment="golang-github-wrouesnel-postgres_exporter is &lt;0.4.7-5.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569705" version="1" comment="mgr-cfg is &lt;4.2.2-5.15.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569706" version="1" comment="mgr-cfg-actions is &lt;4.2.2-5.15.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569707" version="1" comment="mgr-cfg-client is &lt;4.2.2-5.15.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569708" version="1" comment="mgr-cfg-management is &lt;4.2.2-5.15.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569709" version="1" comment="mgr-custom-info is &lt;4.2.1-5.9.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569710" version="1" comment="mgr-daemon is &lt;4.2.7-5.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569711" version="1" comment="mgr-osad is &lt;4.2.5-5.27.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569712" version="1" comment="mgr-push is &lt;4.2.2-5.9.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569713" version="1" comment="mgr-virtualization-host is &lt;4.2.1-5.17.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569714" version="1" comment="python2-mgr-cfg is &lt;4.2.2-5.15.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569715" version="1" comment="python2-mgr-cfg-actions is &lt;4.2.2-5.15.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569716" version="1" comment="python2-mgr-cfg-client is &lt;4.2.2-5.15.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569717" version="1" comment="python2-mgr-cfg-management is &lt;4.2.2-5.15.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569718" version="1" comment="python2-mgr-osa-common is &lt;4.2.5-5.27.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569719" version="1" comment="python2-mgr-osad is &lt;4.2.5-5.27.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569720" version="1" comment="python2-mgr-push is &lt;4.2.2-5.9.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569721" version="1" comment="python2-mgr-virtualization-common is &lt;4.2.1-5.17.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569722" version="1" comment="python2-mgr-virtualization-host is &lt;4.2.1-5.17.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569723" version="1" comment="python2-rhnlib is &lt;4.2.3-12.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569724" version="1" comment="python2-spacewalk-check is &lt;4.2.10-27.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569725" version="1" comment="python2-spacewalk-client-setup is &lt;4.2.10-27.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569726" version="1" comment="python2-spacewalk-client-tools is &lt;4.2.10-27.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569727" version="1" comment="python2-spacewalk-koan is &lt;4.2.3-9.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569728" version="1" comment="python2-spacewalk-oscap is &lt;4.2.1-6.15.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569729" version="1" comment="python2-suseRegisterInfo is &lt;4.2.3-6.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569730" version="1" comment="python2-uyuni-common-libs is &lt;4.2.3-5.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569731" version="1" comment="salt is &lt;2016.11.10-43.75.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569732" version="1" comment="salt-doc is &lt;2016.11.10-43.75.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569733" version="1" comment="salt-minion is &lt;2016.11.10-43.75.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569734" version="1" comment="spacecmd is &lt;4.2.8-18.84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569735" version="1" comment="spacewalk-check is &lt;4.2.10-27.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569736" version="1" comment="spacewalk-client-setup is &lt;4.2.10-27.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569737" version="1" comment="spacewalk-client-tools is &lt;4.2.10-27.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569738" version="1" comment="spacewalk-koan is &lt;4.2.3-9.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569739" version="1" comment="spacewalk-oscap is &lt;4.2.1-6.15.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569740" version="1" comment="spacewalk-remote-utils is &lt;4.2.1-6.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569741" version="1" comment="supportutils-plugin-susemanager-client is &lt;4.2.2-9.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569742" version="1" comment="suseRegisterInfo is &lt;4.2.3-6.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651453" version="1" comment="python2-spacewalk-check is &lt;4.2.14-27.59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651454" version="1" comment="python2-spacewalk-client-setup is &lt;4.2.14-27.59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651455" version="1" comment="python2-spacewalk-client-tools is &lt;4.2.14-27.59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651456" version="1" comment="salt is &lt;2016.11.10-43.84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651457" version="1" comment="salt-doc is &lt;2016.11.10-43.84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651458" version="1" comment="salt-minion is &lt;2016.11.10-43.84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651459" version="1" comment="spacecmd is &lt;4.2.13-18.93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651460" version="1" comment="spacewalk-check is &lt;4.2.14-27.59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651461" version="1" comment="spacewalk-client-setup is &lt;4.2.14-27.59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651462" version="1" comment="spacewalk-client-tools is &lt;4.2.14-27.59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569743" version="1" comment="koan is &lt;2.2.2-0.68.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569744" version="1" comment="koan is &lt;2.2.2-0.68.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668399" version="1" comment="koan is &lt;2.2.2-0.68.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569745" version="1" comment="python-pycrypto is &lt;2.6.1-5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569746" version="1" comment="salt is &lt;2016.11.4-43.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569747" version="1" comment="salt-doc is &lt;2016.11.4-43.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569748" version="1" comment="salt-minion is &lt;2016.11.4-43.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569749" version="1" comment="salt is &lt;2016.11.4-43.10.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569750" version="1" comment="salt-doc is &lt;2016.11.4-43.10.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569751" version="1" comment="salt-minion is &lt;2016.11.4-43.10.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569752" version="1" comment="salt is &lt;2016.11.10-43.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569753" version="1" comment="salt-doc is &lt;2016.11.10-43.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569754" version="1" comment="salt-minion is &lt;2016.11.10-43.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569755" version="1" comment="salt is &lt;2016.11.10-43.69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569756" version="1" comment="salt-doc is &lt;2016.11.10-43.69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569757" version="1" comment="salt-minion is &lt;2016.11.10-43.69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569758" version="1" comment="salt is &lt;2016.11.4-42.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569759" version="1" comment="salt-doc is &lt;2016.11.4-42.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569760" version="1" comment="salt-minion is &lt;2016.11.4-42.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569761" version="1" comment="libzmq3 is &lt;4.0.4-3.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569779" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569780" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032105" version="1" comment="sles-release is ==11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258684" version="1" comment="SUSE_SLES_SAP-release is ==11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569781" version="1" comment="MozillaFirefox is &lt;3.0.10-1.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569782" version="1" comment="MozillaFirefox-branding-SLED is &lt;3.5-1.1.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569783" version="1" comment="MozillaFirefox-translations is &lt;3.0.10-1.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569784" version="1" comment="gconf2 is &lt;2.24.0-7.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569785" version="1" comment="gconf2-32bit is &lt;2.24.0-7.5 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569786" version="1" comment="gconf2-x86 is &lt;2.24.0-7.5 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569787" version="1" comment="libfreebl3 is &lt;3.12.3.1-1.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569788" version="1" comment="libfreebl3-32bit is &lt;3.12.3.1-1.2.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569789" version="1" comment="libfreebl3-x86 is &lt;3.12.3.1-1.2.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569790" version="1" comment="libidl is &lt;0.8.11-2.14 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569791" version="1" comment="libidl-32bit is &lt;0.8.11-2.14 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569792" version="1" comment="libidl-x86 is &lt;0.8.11-2.14 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569793" version="1" comment="mozilla-nspr is &lt;4.8-1.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569794" version="1" comment="mozilla-nspr-32bit is &lt;4.8-1.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569795" version="1" comment="mozilla-nspr-x86 is &lt;4.8-1.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569796" version="1" comment="mozilla-nss is &lt;3.12.3.1-1.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569797" version="1" comment="mozilla-nss-32bit is &lt;3.12.3.1-1.2.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569798" version="1" comment="mozilla-nss-tools is &lt;3.12.3.1-1.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569799" version="1" comment="mozilla-nss-x86 is &lt;3.12.3.1-1.2.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569800" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.10-1.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569801" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.10-1.1.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569802" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.10-1.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569803" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.10-1.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569804" version="1" comment="mozilla-xulrunner190-x86 is &lt;1.9.0.10-1.1.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569805" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.11-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569806" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.11-0.1.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569807" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.11-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569808" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.11-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569809" version="1" comment="mozilla-xulrunner191-x86 is &lt;1.9.1.11-0.1.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569810" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.12-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569811" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.12-0.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569812" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.12-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569813" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.12-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569814" version="1" comment="mozilla-xulrunner192-x86 is &lt;1.9.2.12-0.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569815" version="1" comment="orbit2 is &lt;2.14.16-2.16 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569816" version="1" comment="orbit2-32bit is &lt;2.14.16-2.16 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569817" version="1" comment="orbit2-x86 is &lt;2.14.16-2.16 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569818" version="1" comment="NetworkManager is &lt;0.7.0.r4359-15.9.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569819" version="1" comment="NetworkManager-glib is &lt;0.7.0.r4359-15.9.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569820" version="1" comment="NetworkManager-gnome is &lt;0.7.0.r1053-11.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569821" version="1" comment="OpenEXR is &lt;1.6.1-83.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569822" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569823" version="1" comment="OpenEXR-x86 is &lt;1.6.1-83.17.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569824" version="1" comment="procps is &lt;3.2.7-151.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569825" version="1" comment="acl is &lt;2.2.47-30.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569826" version="1" comment="libacl is &lt;2.2.47-30.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569827" version="1" comment="libacl-32bit is &lt;2.2.47-30.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569828" version="1" comment="libacl-x86 is &lt;2.2.47-30.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569829" version="1" comment="apache2 is &lt;2.2.10-2.23.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569830" version="1" comment="apache2-doc is &lt;2.2.10-2.23.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569831" version="1" comment="apache2-example-pages is &lt;2.2.10-2.23.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569832" version="1" comment="apache2-prefork is &lt;2.2.10-2.23.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569833" version="1" comment="apache2-utils is &lt;2.2.10-2.23.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569834" version="1" comment="apache2-worker is &lt;2.2.10-2.23.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569835" version="1" comment="apache2-mod_php5 is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569836" version="1" comment="php5 is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569837" version="1" comment="php5-bcmath is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569838" version="1" comment="php5-bz2 is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569839" version="1" comment="php5-calendar is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569840" version="1" comment="php5-ctype is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569841" version="1" comment="php5-curl is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569842" version="1" comment="php5-dba is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569843" version="1" comment="php5-dbase is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569844" version="1" comment="php5-dom is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569845" version="1" comment="php5-exif is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569846" version="1" comment="php5-fastcgi is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569847" version="1" comment="php5-ftp is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569848" version="1" comment="php5-gd is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569849" version="1" comment="php5-gettext is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569850" version="1" comment="php5-gmp is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569851" version="1" comment="php5-hash is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569852" version="1" comment="php5-iconv is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569853" version="1" comment="php5-json is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569854" version="1" comment="php5-ldap is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569855" version="1" comment="php5-mbstring is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569856" version="1" comment="php5-mcrypt is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569857" version="1" comment="php5-mysql is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569858" version="1" comment="php5-odbc is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569859" version="1" comment="php5-openssl is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569860" version="1" comment="php5-pcntl is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569861" version="1" comment="php5-pdo is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569862" version="1" comment="php5-pear is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569863" version="1" comment="php5-pgsql is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569864" version="1" comment="php5-pspell is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569865" version="1" comment="php5-shmop is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569866" version="1" comment="php5-snmp is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569867" version="1" comment="php5-soap is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569868" version="1" comment="php5-suhosin is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569869" version="1" comment="php5-sysvmsg is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569870" version="1" comment="php5-sysvsem is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569871" version="1" comment="php5-sysvshm is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569872" version="1" comment="php5-tokenizer is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569873" version="1" comment="php5-wddx is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569874" version="1" comment="php5-xmlreader is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569875" version="1" comment="php5-xmlrpc is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569876" version="1" comment="php5-xmlwriter is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569877" version="1" comment="php5-xsl is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569878" version="1" comment="php5-zip is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569879" version="1" comment="php5-zlib is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569880" version="1" comment="avahi is &lt;0.6.23-11.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569881" version="1" comment="avahi-lang is &lt;0.6.23-11.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569882" version="1" comment="libavahi-client3 is &lt;0.6.23-11.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569883" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-11.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569884" version="1" comment="libavahi-client3-x86 is &lt;0.6.23-11.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569885" version="1" comment="libavahi-common3 is &lt;0.6.23-11.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569886" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-11.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569887" version="1" comment="libavahi-common3-x86 is &lt;0.6.23-11.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569888" version="1" comment="libavahi-core5 is &lt;0.6.23-11.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569889" version="1" comment="libdns_sd is &lt;0.6.23-11.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569890" version="1" comment="libdns_sd-32bit is &lt;0.6.23-11.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569891" version="1" comment="libdns_sd-x86 is &lt;0.6.23-11.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991137" version="1" comment="bind is &lt;9.5.0P2-20.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991138" version="1" comment="bind-chrootenv is &lt;9.5.0P2-20.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991139" version="1" comment="bind-doc is &lt;9.5.0P2-20.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991140" version="1" comment="bind-libs is &lt;9.5.0P2-20.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991141" version="1" comment="bind-libs-32bit is &lt;9.5.0P2-20.2.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991142" version="1" comment="bind-libs-x86 is &lt;9.5.0P2-20.2.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991143" version="1" comment="bind-utils is &lt;9.5.0P2-20.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991144" version="1" comment="mono-core is &lt;2.0.1-1.18.1 for i586,ia64,ppc,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991145" version="1" comment="mono-data is &lt;2.0.1-1.18.1 for i586,ia64,ppc,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991146" version="1" comment="mono-data-postgresql is &lt;2.0.1-1.18.1 for i586,ia64,ppc,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991147" version="1" comment="mono-data-sqlite is &lt;2.0.1-1.18.1 for i586,ia64,ppc,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991148" version="1" comment="mono-locale-extras is &lt;2.0.1-1.18.1 for i586,ia64,ppc,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991149" version="1" comment="mono-nunit is &lt;2.0.1-1.18.1 for i586,ia64,ppc,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991150" version="1" comment="mono-web is &lt;2.0.1-1.18.1 for i586,ia64,ppc,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991151" version="1" comment="mono-winforms is &lt;2.0.1-1.18.1 for i586,ia64,ppc,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569892" version="1" comment="bzip2 is &lt;1.0.5-34.253.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569893" version="1" comment="bzip2-doc is &lt;1.0.5-34.253.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569894" version="1" comment="libbz2-1 is &lt;1.0.5-34.253.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569895" version="1" comment="libbz2-1-32bit is &lt;1.0.5-34.253.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569896" version="1" comment="libbz2-1-x86 is &lt;1.0.5-34.253.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569897" version="1" comment="cifs-mount is &lt;3.2.7-11.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569898" version="1" comment="ldapsmb is &lt;1.34b-11.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569899" version="1" comment="libsmbclient0 is &lt;3.2.7-11.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569900" version="1" comment="libsmbclient0-32bit is &lt;3.2.7-11.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569901" version="1" comment="libsmbclient0-x86 is &lt;3.2.7-11.21.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569902" version="1" comment="libtalloc1 is &lt;3.2.7-11.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569903" version="1" comment="libtalloc1-32bit is &lt;3.2.7-11.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569904" version="1" comment="libtalloc1-x86 is &lt;3.2.7-11.21.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569905" version="1" comment="libtdb1 is &lt;3.2.7-11.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569906" version="1" comment="libtdb1-32bit is &lt;3.2.7-11.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569907" version="1" comment="libtdb1-x86 is &lt;3.2.7-11.21.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569908" version="1" comment="libwbclient0 is &lt;3.2.7-11.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569909" version="1" comment="libwbclient0-32bit is &lt;3.2.7-11.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569910" version="1" comment="libwbclient0-x86 is &lt;3.2.7-11.21.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569911" version="1" comment="samba is &lt;3.2.7-11.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569912" version="1" comment="samba-32bit is &lt;3.2.7-11.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569913" version="1" comment="samba-client is &lt;3.2.7-11.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569914" version="1" comment="samba-client-32bit is &lt;3.2.7-11.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569915" version="1" comment="samba-client-x86 is &lt;3.2.7-11.21.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569916" version="1" comment="samba-krb-printing is &lt;3.2.7-11.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569917" version="1" comment="samba-winbind is &lt;3.2.7-11.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569918" version="1" comment="samba-winbind-32bit is &lt;3.2.7-11.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569919" version="1" comment="samba-winbind-x86 is &lt;3.2.7-11.21.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569920" version="1" comment="samba-x86 is &lt;3.2.7-11.21.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569921" version="1" comment="clamav is &lt;0.95.1-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569922" version="1" comment="libgcc43 is &lt;4.3.3_20081022-11.18 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569923" version="1" comment="libgcc43-32bit is &lt;4.3.3_20081022-11.18 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569924" version="1" comment="libgcc43-x86 is &lt;4.3.3_20081022-11.18 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569925" version="1" comment="libstdc++43 is &lt;4.3.3_20081022-11.18 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569926" version="1" comment="libstdc++43-32bit is &lt;4.3.3_20081022-11.18 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569927" version="1" comment="libstdc++43-x86 is &lt;4.3.3_20081022-11.18 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569928" version="1" comment="cpio is &lt;2.9-75.27.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569929" version="1" comment="cpio-lang is &lt;2.9-75.27.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569930" version="1" comment="cron is &lt;4.1-194.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569931" version="1" comment="cups is &lt;1.3.9-8.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569932" version="1" comment="cups-client is &lt;1.3.9-8.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569933" version="1" comment="cups-libs is &lt;1.3.9-8.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569934" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569935" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569936" version="1" comment="curl is &lt;7.19.0-11.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569937" version="1" comment="keyutils-libs is &lt;1.2-107.22 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569938" version="1" comment="keyutils-libs-32bit is &lt;1.2-107.22 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569939" version="1" comment="keyutils-libs-x86 is &lt;1.2-107.22 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569940" version="1" comment="libcurl4 is &lt;7.19.0-11.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569941" version="1" comment="libcurl4-32bit is &lt;7.19.0-11.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569942" version="1" comment="libcurl4-x86 is &lt;7.19.0-11.21.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569943" version="1" comment="libidn is &lt;1.10-3.18 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569944" version="1" comment="libidn-32bit is &lt;1.10-3.18 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569945" version="1" comment="libidn-x86 is &lt;1.10-3.18 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569946" version="1" comment="cyrus-imapd is &lt;2.3.11-60.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569947" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569948" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569949" version="1" comment="cyrus-sasl is &lt;2.1.22-182.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569950" version="1" comment="cyrus-sasl-32bit is &lt;2.1.22-182.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569951" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.22-182.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569952" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.22-182.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569953" version="1" comment="cyrus-sasl-crammd5-x86 is &lt;2.1.22-182.20.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569954" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.22-182.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569955" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.22-182.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569956" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.22-182.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569957" version="1" comment="cyrus-sasl-gssapi-x86 is &lt;2.1.22-182.20.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569958" version="1" comment="cyrus-sasl-otp is &lt;2.1.22-182.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569959" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.22-182.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569960" version="1" comment="cyrus-sasl-otp-x86 is &lt;2.1.22-182.20.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569961" version="1" comment="cyrus-sasl-plain is &lt;2.1.22-182.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569962" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.22-182.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569963" version="1" comment="cyrus-sasl-plain-x86 is &lt;2.1.22-182.20.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569964" version="1" comment="cyrus-sasl-x86 is &lt;2.1.22-182.20.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569965" version="1" comment="dbus-1 is &lt;1.2.10-3.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569966" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569967" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.9.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569968" version="1" comment="dbus-1-glib is &lt;0.76-34.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569969" version="1" comment="dbus-1-glib-32bit is &lt;0.76-34.10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569970" version="1" comment="dbus-1-glib-x86 is &lt;0.76-34.10.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569971" version="1" comment="dhcp-client is &lt;3.1.1-7.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569972" version="1" comment="dnsmasq is &lt;2.45-12.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569973" version="1" comment="wireshark is &lt;1.0.5-1.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569974" version="1" comment="evolution-data-server is &lt;2.24.1.1-11.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569975" version="1" comment="evolution-data-server-32bit is &lt;2.24.1.1-11.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569976" version="1" comment="evolution-data-server-lang is &lt;2.24.1.1-11.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569977" version="1" comment="evolution-data-server-x86 is &lt;2.24.1.1-11.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569978" version="1" comment="gtkhtml2 is &lt;3.24.1.1-3.23.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569979" version="1" comment="gtkhtml2-lang is &lt;3.24.1.1-3.23.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569980" version="1" comment="evolution-data-server is &lt;2.24.1.1-11.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569981" version="1" comment="evolution-data-server-32bit is &lt;2.24.1.1-11.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569982" version="1" comment="evolution-data-server-lang is &lt;2.24.1.1-11.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569983" version="1" comment="evolution-data-server-x86 is &lt;2.24.1.1-11.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569984" version="1" comment="expat is &lt;2.0.1-88.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569985" version="1" comment="libexpat1 is &lt;2.0.1-88.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569986" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569987" version="1" comment="libexpat1-x86 is &lt;2.0.1-88.26.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569988" version="1" comment="fetchmail is &lt;6.3.8.90-13.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569989" version="1" comment="fetchmailconf is &lt;6.3.8.90-13.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569990" version="1" comment="cdparanoia is &lt;IIIalpha9.8-691.22 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569991" version="1" comment="cdparanoia-32bit is &lt;IIIalpha9.8-691.22 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569992" version="1" comment="cdparanoia-x86 is &lt;IIIalpha9.8-691.22 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569993" version="1" comment="desktop-file-utils is &lt;0.15-1.29 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569994" version="1" comment="fam is &lt;2.7.0-130.21 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569995" version="1" comment="fam-32bit is &lt;2.7.0-130.21 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569996" version="1" comment="fam-x86 is &lt;2.7.0-130.21 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569997" version="1" comment="gnome-vfs2 is &lt;2.24.0-7.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569998" version="1" comment="gnome-vfs2-32bit is &lt;2.24.0-7.4 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569999" version="1" comment="gnome-vfs2-x86 is &lt;2.24.0-7.4 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570000" version="1" comment="gstreamer-0_10 is &lt;0.10.21-3.20 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570001" version="1" comment="libogg0 is &lt;1.1.3-87.12 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570002" version="1" comment="libogg0-32bit is &lt;1.1.3-87.12 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570003" version="1" comment="libogg0-x86 is &lt;1.1.3-87.12 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570004" version="1" comment="liboil is &lt;0.3.15-3.10 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570005" version="1" comment="liboil-32bit is &lt;0.3.15-3.10 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570006" version="1" comment="liboil-x86 is &lt;0.3.15-3.10 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570007" version="1" comment="freetype2 is &lt;2.3.7-25.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570008" version="1" comment="freetype2-32bit is &lt;2.3.7-25.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570009" version="1" comment="freetype2-x86 is &lt;2.3.7-25.9.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570010" version="1" comment="fuse is &lt;2.7.2-61.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570011" version="1" comment="libfuse2 is &lt;2.7.2-61.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991152" version="1" comment="gdm is &lt;2.24.0-24.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991153" version="1" comment="gdm-branding-upstream is &lt;2.24.0-24.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991154" version="1" comment="gdm-lang is &lt;2.24.0-24.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570012" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570013" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570014" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570015" version="1" comment="ghostscript-library is &lt;8.62-32.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570016" version="1" comment="ghostscript-omni is &lt;8.62-32.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570017" version="1" comment="ghostscript-x11 is &lt;8.62-32.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570018" version="1" comment="libgimpprint is &lt;4.2.7-32.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570019" version="1" comment="glib2 is &lt;2.18.2-7.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570020" version="1" comment="glib2-doc is &lt;2.18.2-7.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570021" version="1" comment="glib2-lang is &lt;2.18.2-7.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570022" version="1" comment="libgio-2_0-0 is &lt;2.18.2-7.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570023" version="1" comment="libgio-2_0-0-32bit is &lt;2.18.2-7.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570024" version="1" comment="libgio-2_0-0-x86 is &lt;2.18.2-7.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570025" version="1" comment="libglib-2_0-0 is &lt;2.18.2-7.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570026" version="1" comment="libglib-2_0-0-32bit is &lt;2.18.2-7.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570027" version="1" comment="libglib-2_0-0-x86 is &lt;2.18.2-7.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570028" version="1" comment="libgmodule-2_0-0 is &lt;2.18.2-7.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570029" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.18.2-7.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570030" version="1" comment="libgmodule-2_0-0-x86 is &lt;2.18.2-7.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570031" version="1" comment="libgobject-2_0-0 is &lt;2.18.2-7.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570032" version="1" comment="libgobject-2_0-0-32bit is &lt;2.18.2-7.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570033" version="1" comment="libgobject-2_0-0-x86 is &lt;2.18.2-7.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570034" version="1" comment="libgthread-2_0-0 is &lt;2.18.2-7.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570035" version="1" comment="libgthread-2_0-0-32bit is &lt;2.18.2-7.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570036" version="1" comment="libgthread-2_0-0-x86 is &lt;2.18.2-7.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570037" version="1" comment="glibc is &lt;2.9-13.11.1 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570038" version="1" comment="glibc-32bit is &lt;2.9-13.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570039" version="1" comment="glibc-devel is &lt;2.9-13.11.1 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570040" version="1" comment="glibc-devel-32bit is &lt;2.9-13.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570041" version="1" comment="glibc-html is &lt;2.9-13.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570042" version="1" comment="glibc-i18ndata is &lt;2.9-13.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570043" version="1" comment="glibc-info is &lt;2.9-13.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570044" version="1" comment="glibc-locale is &lt;2.9-13.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570045" version="1" comment="glibc-locale-32bit is &lt;2.9-13.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570046" version="1" comment="glibc-locale-x86 is &lt;2.9-13.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570047" version="1" comment="glibc-profile is &lt;2.9-13.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570048" version="1" comment="glibc-profile-32bit is &lt;2.9-13.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570049" version="1" comment="glibc-profile-x86 is &lt;2.9-13.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570050" version="1" comment="glibc-x86 is &lt;2.9-13.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570051" version="1" comment="nscd is &lt;2.9-13.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570052" version="1" comment="gmime is &lt;2.2.23-1.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570053" version="1" comment="gmime-doc is &lt;2.2.23-1.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570054" version="1" comment="libgmime-2_0-3 is &lt;2.2.23-1.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570055" version="1" comment="gnome-screensaver is &lt;2.24.0-14.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570056" version="1" comment="gnome-screensaver-lang is &lt;2.24.0-14.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570057" version="1" comment="gnutls is &lt;2.4.1-24.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570058" version="1" comment="libgnutls26 is &lt;2.4.1-24.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570059" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570060" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.16.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991155" version="1" comment="gpg2 is &lt;2.0.9-25.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991156" version="1" comment="gpg2-lang is &lt;2.0.9-25.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587805" version="1" comment="libgcrypt11 is &lt;1.4.1-6.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587806" version="1" comment="libgcrypt11-32bit is &lt;1.4.1-6.7 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587807" version="1" comment="libgcrypt11-x86 is &lt;1.4.1-6.7 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587808" version="1" comment="libgpg-error0 is &lt;1.6-8.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587809" version="1" comment="libgpg-error0-32bit is &lt;1.6-8.6 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587810" version="1" comment="libgpg-error0-x86 is &lt;1.6-8.6 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587811" version="1" comment="libksba is &lt;1.0.4-1.16 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570061" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.21-2.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570062" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.21-2.36.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570063" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.21-2.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570064" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.21-2.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570065" version="1" comment="gstreamer-0_10-plugins-base-x86 is &lt;0.10.21-2.36.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570066" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.21-2.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570067" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.21-2.36.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570068" version="1" comment="libgstinterfaces-0_10-0-x86 is &lt;0.10.21-2.36.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570069" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.10-4.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570070" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.10-4.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570071" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.10-4.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570072" version="1" comment="gzip is &lt;1.3.12-69.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570073" version="1" comment="libicu is &lt;4.0-7.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570074" version="1" comment="libicu-32bit is &lt;4.0-7.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570075" version="1" comment="libicu-doc is &lt;4.0-7.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570076" version="1" comment="ipsec-tools is &lt;0.7.1-10.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570077" version="1" comment="iscsitarget is &lt;0.4.15-94.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570078" version="1" comment="iscsitarget-kmp-default is &lt;0.4.15_2.6.27.48_0.6-94.14.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570079" version="1" comment="iscsitarget-kmp-pae is &lt;0.4.15_2.6.27.48_0.6-94.14.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570080" version="1" comment="iscsitarget-kmp-ppc64 is &lt;0.4.15_2.6.27.48_0.6-94.14.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570081" version="1" comment="iscsitarget-kmp-vmi is &lt;0.4.15_2.6.27.48_0.6-94.14.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570082" version="1" comment="iscsitarget-kmp-xen is &lt;0.4.15_2.6.27.48_0.6-94.14.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570083" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570084" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13-0.1.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570085" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13-0.1.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570086" version="1" comment="java-1_5_0-bea is &lt;1.5.0.13.1.2-0.1.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570087" version="1" comment="java-1_5_0-bea-console is &lt;1.5.0.13.1.2-0.1.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570088" version="1" comment="java-1_5_0-bea-fonts is &lt;1.5.0.13.1.2-0.1.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570089" version="1" comment="java-1_5_0-bea-jdbc is &lt;1.5.0.13.1.2-0.1.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570090" version="1" comment="java-1_6_0-ibm is &lt;1.6.0-124.6.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570091" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0-124.6.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570092" version="1" comment="java-1_6_0-ibm-alsa-x86 is &lt;1.6.0-124.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570093" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0-124.6.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570094" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0-124.6.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570095" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0-124.6.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570096" version="1" comment="java-1_6_0-ibm-x86 is &lt;1.6.0-124.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991157" version="1" comment="kde4-akonadi is &lt;4.1.3-9.14.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991158" version="1" comment="kde4-akregator is &lt;4.1.3-9.14.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991159" version="1" comment="kde4-kaddressbook is &lt;4.1.3-9.14.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991160" version="1" comment="kde4-kalarm is &lt;4.1.3-9.14.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991161" version="1" comment="kde4-kjots is &lt;4.1.3-9.14.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991162" version="1" comment="kde4-kmail is &lt;4.1.3-9.14.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991163" version="1" comment="kde4-knode is &lt;4.1.3-9.14.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991164" version="1" comment="kde4-knotes is &lt;4.1.3-9.14.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991165" version="1" comment="kde4-kontact is &lt;4.1.3-9.14.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991166" version="1" comment="kde4-korganizer is &lt;4.1.3-9.14.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991167" version="1" comment="kde4-ktimetracker is &lt;4.1.3-9.14.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991168" version="1" comment="kde4-ktnef is &lt;4.1.3-9.14.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991169" version="1" comment="kdepim4 is &lt;4.1.3-9.14.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991170" version="1" comment="kdepim4-wizards is &lt;4.1.3-9.14.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570111" version="1" comment="kdepimlibs4 is &lt;4.1.3-9.28.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570112" version="1" comment="libakonadi4 is &lt;4.1.3-9.28.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991171" version="1" comment="libkdepim4 is &lt;4.1.3-9.14.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570114" version="1" comment="libkdepimlibs4 is &lt;4.1.3-9.28.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570115" version="1" comment="kde4-gwenview is &lt;4.1.3-7.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570116" version="1" comment="kde4-kcolorchooser is &lt;4.1.3-7.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570117" version="1" comment="kde4-kruler is &lt;4.1.3-7.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570118" version="1" comment="kde4-ksnapshot is &lt;4.1.3-7.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570119" version="1" comment="kde4-okular is &lt;4.1.3-7.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570120" version="1" comment="libkipi5 is &lt;4.1.3-7.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570121" version="1" comment="kde4-kdm is &lt;4.1.3-18.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570122" version="1" comment="kde4-kgreeter-plugins is &lt;4.1.3-18.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570123" version="1" comment="kde4-kwin is &lt;4.1.3-18.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570124" version="1" comment="kdebase4-workspace is &lt;4.1.3-18.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570125" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.1.3-18.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570126" version="1" comment="kde4-kget is &lt;4.1.3-7.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570127" version="1" comment="kde4-knewsticker is &lt;4.1.3-7.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570128" version="1" comment="kde4-kopete is &lt;4.1.3-7.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570129" version="1" comment="kde4-krdc is &lt;4.1.3-7.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570130" version="1" comment="kde4-krfb is &lt;4.1.3-7.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570131" version="1" comment="kdenetwork4-filesharing is &lt;4.1.3-7.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570132" version="1" comment="kdelibs3 is &lt;3.5.10-23.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570133" version="1" comment="kdelibs3-32bit is &lt;3.5.10-23.30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570134" version="1" comment="kdelibs3-default-style is &lt;3.5.10-23.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570135" version="1" comment="kdelibs3-default-style-32bit is &lt;3.5.10-23.30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570136" version="1" comment="kdelibs3-default-style-x86 is &lt;3.5.10-23.30.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570137" version="1" comment="kdelibs3-x86 is &lt;3.5.10-23.30.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570138" version="1" comment="kdelibs4 is &lt;4.1.3-8.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570139" version="1" comment="kdelibs4-core is &lt;4.1.3-8.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570140" version="1" comment="libkde4 is &lt;4.1.3-8.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570141" version="1" comment="libkde4-32bit is &lt;4.1.3-8.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570142" version="1" comment="libkde4-x86 is &lt;4.1.3-8.21.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570143" version="1" comment="libkdecore4 is &lt;4.1.3-8.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570144" version="1" comment="libkdecore4-32bit is &lt;4.1.3-8.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570145" version="1" comment="libkdecore4-x86 is &lt;4.1.3-8.21.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570146" version="1" comment="kdelibs4 is &lt;4.1.3-8.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570147" version="1" comment="kdelibs4-core is &lt;4.1.3-8.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570148" version="1" comment="libkde4 is &lt;4.1.3-8.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570149" version="1" comment="libkde4-32bit is &lt;4.1.3-8.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570150" version="1" comment="libkde4-x86 is &lt;4.1.3-8.18.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570151" version="1" comment="libkdecore4 is &lt;4.1.3-8.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570152" version="1" comment="libkdecore4-32bit is &lt;4.1.3-8.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570153" version="1" comment="libkdecore4-x86 is &lt;4.1.3-8.18.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570154" version="1" comment="utempter is &lt;0.5.5-106.18 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570155" version="1" comment="utempter-32bit is &lt;0.5.5-106.18 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570156" version="1" comment="utempter-x86 is &lt;0.5.5-106.18 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570157" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.27.23_0.1-7.1.7 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570158" version="1" comment="ext4dev-kmp-pae is &lt;0_2.6.27.23_0.1-7.1.7 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570159" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.27.23_0.1-7.1.7 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570160" version="1" comment="ext4dev-kmp-vmi is &lt;0_2.6.27.23_0.1-7.1.7 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570161" version="1" comment="ext4dev-kmp-xen is &lt;0_2.6.27.23_0.1-7.1.7 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570162" version="1" comment="iscsitarget-kmp-default is &lt;0.4.15_2.6.27.54_0.2-94.14.8 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570163" version="1" comment="kernel-default is &lt;2.6.27.23-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570164" version="1" comment="kernel-default-base is &lt;2.6.27.23-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570165" version="1" comment="kernel-default-man is &lt;2.6.27.23-0.1.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570166" version="1" comment="kernel-kdump is &lt;2.6.27.23-0.1.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570167" version="1" comment="kernel-pae is &lt;2.6.27.23-0.1.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570168" version="1" comment="kernel-pae-base is &lt;2.6.27.23-0.1.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570169" version="1" comment="kernel-ppc64 is &lt;2.6.27.23-0.1.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570170" version="1" comment="kernel-ppc64-base is &lt;2.6.27.23-0.1.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570171" version="1" comment="kernel-source is &lt;2.6.27.23-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570172" version="1" comment="kernel-syms is &lt;2.6.27.23-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570173" version="1" comment="kernel-vmi is &lt;2.6.27.23-0.1.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570174" version="1" comment="kernel-vmi-base is &lt;2.6.27.23-0.1.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570175" version="1" comment="kernel-xen is &lt;2.6.27.23-0.1.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570176" version="1" comment="kernel-xen-base is &lt;2.6.27.23-0.1.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570177" version="1" comment="oracleasm-kmp-default is &lt;2.0.5_2.6.27.54_0.2-7.9.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570178" version="1" comment="krb5 is &lt;1.6.3-133.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570179" version="1" comment="krb5-32bit is &lt;1.6.3-133.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570180" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570181" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570182" version="1" comment="krb5-client is &lt;1.6.3-133.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570183" version="1" comment="krb5-server is &lt;1.6.3-133.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570184" version="1" comment="krb5-x86 is &lt;1.6.3-133.25.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570185" version="1" comment="kvm is &lt;78.0.10.6-0.3.1 for i586,ia64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570186" version="1" comment="kvm-kmp-default is &lt;78.2.6.30.1_2.6.27.37_0.1-0.7.1 for i586,ia64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570187" version="1" comment="kvm-kmp-pae is &lt;78.2.6.30.1_2.6.27.37_0.1-0.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570188" version="1" comment="lcms is &lt;1.17-77.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570189" version="1" comment="liblcms1 is &lt;1.17-77.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570190" version="1" comment="liblcms1-32bit is &lt;1.17-77.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570191" version="1" comment="liblcms1-x86 is &lt;1.17-77.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570192" version="1" comment="libHX13 is &lt;1.23-4.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570193" version="1" comment="libHX13-32bit is &lt;1.23-4.1.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570194" version="1" comment="libHX13-x86 is &lt;1.23-4.1.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570195" version="1" comment="libapr-util1 is &lt;1.3.4-12.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570196" version="1" comment="libapr-util1-32bit is &lt;1.3.4-12.19.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570197" version="1" comment="libapr1 is &lt;1.3.3-11.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570198" version="1" comment="libapr1-32bit is &lt;1.3.3-11.16.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570199" version="1" comment="libesmtp is &lt;1.0.4-157.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570200" version="1" comment="libfreebl3 is &lt;3.12.8-1.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570201" version="1" comment="libfreebl3-32bit is &lt;3.12.8-1.2.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570202" version="1" comment="libfreebl3-x86 is &lt;3.12.8-1.2.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570203" version="1" comment="mozilla-nspr is &lt;4.8.6-1.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570204" version="1" comment="mozilla-nspr-32bit is &lt;4.8.6-1.2.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570205" version="1" comment="mozilla-nspr-x86 is &lt;4.8.6-1.2.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570206" version="1" comment="mozilla-nss is &lt;3.12.8-1.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570207" version="1" comment="mozilla-nss-32bit is &lt;3.12.8-1.2.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570208" version="1" comment="mozilla-nss-tools is &lt;3.12.8-1.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570209" version="1" comment="mozilla-nss-x86 is &lt;3.12.8-1.2.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570210" version="1" comment="zlib is &lt;1.2.3-106.34 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570211" version="1" comment="zlib-32bit is &lt;1.2.3-106.34 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570212" version="1" comment="zlib-x86 is &lt;1.2.3-106.34 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570213" version="1" comment="libgdiplus0 is &lt;2.0-11.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570214" version="1" comment="libldap-2_4-2 is &lt;2.4.12-7.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570215" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.12-7.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570216" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.12-7.19.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570217" version="1" comment="openldap2 is &lt;2.4.12-7.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570218" version="1" comment="openldap2-back-meta is &lt;2.4.12-7.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570219" version="1" comment="openldap2-client is &lt;2.4.12-7.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570220" version="1" comment="libltdl7 is &lt;2.2.6-2.131.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570221" version="1" comment="libltdl7-32bit is &lt;2.2.6-2.131.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570222" version="1" comment="libltdl7-x86 is &lt;2.2.6-2.131.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570223" version="1" comment="libtool is &lt;2.2.6-2.131.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570224" version="1" comment="libtool-32bit is &lt;2.2.6-2.131.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570225" version="1" comment="libtool-x86 is &lt;2.2.6-2.131.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570226" version="1" comment="libmysqlclient15 is &lt;5.0.67-13.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570227" version="1" comment="libmysqlclient15-32bit is &lt;5.0.67-13.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570228" version="1" comment="libmysqlclient15-x86 is &lt;5.0.67-13.26.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570229" version="1" comment="libmysqlclient_r15 is &lt;5.0.67-13.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570230" version="1" comment="mysql is &lt;5.0.67-13.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570231" version="1" comment="mysql-Max is &lt;5.0.67-13.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570232" version="1" comment="mysql-client is &lt;5.0.67-13.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570233" version="1" comment="libneon27 is &lt;0.28.3-2.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570234" version="1" comment="libneon27-32bit is &lt;0.28.3-2.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570235" version="1" comment="libneon27-x86 is &lt;0.28.3-2.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570236" version="1" comment="neon is &lt;0.28.3-2.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570237" version="1" comment="libnetpbm10 is &lt;10.26.44-101.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570238" version="1" comment="libnetpbm10-32bit is &lt;10.26.44-101.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570239" version="1" comment="libnetpbm10-x86 is &lt;10.26.44-101.9.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570240" version="1" comment="netpbm is &lt;10.26.44-101.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570241" version="1" comment="libopensc2 is &lt;0.11.6-5.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570242" version="1" comment="libopensc2-32bit is &lt;0.11.6-5.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570243" version="1" comment="libopensc2-x86 is &lt;0.11.6-5.25.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570244" version="1" comment="opensc is &lt;0.11.6-5.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570245" version="1" comment="opensc-32bit is &lt;0.11.6-5.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570246" version="1" comment="opensc-x86 is &lt;0.11.6-5.25.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570247" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570248" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570249" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8h-30.13.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570250" version="1" comment="openssl is &lt;0.9.8h-30.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570251" version="1" comment="openssl-doc is &lt;0.9.8h-30.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570252" version="1" comment="libpng12-0 is &lt;1.2.31-5.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570253" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570254" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570255" version="1" comment="libpng12-0 is &lt;1.2.31-5.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570256" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570257" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.18.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570258" version="1" comment="libpoppler-glib4 is &lt;0.10.1-1.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570259" version="1" comment="libpoppler-qt4-3 is &lt;0.10.1-1.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570260" version="1" comment="libpoppler4 is &lt;0.10.1-1.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570261" version="1" comment="poppler-tools is &lt;0.10.1-1.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570262" version="1" comment="libpoppler4 is &lt;0.10.1-1.30.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570263" version="1" comment="libpython2_6-1_0 is &lt;2.6.0-8.8.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570264" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.0-8.8.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570265" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.0-8.8.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570266" version="1" comment="python is &lt;2.6.0-8.9.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570267" version="1" comment="python-32bit is &lt;2.6.0-8.9.6.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570268" version="1" comment="python-base is &lt;2.6.0-8.8.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570269" version="1" comment="python-base-32bit is &lt;2.6.0-8.8.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570270" version="1" comment="python-base-x86 is &lt;2.6.0-8.8.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570271" version="1" comment="python-curses is &lt;2.6.0-8.9.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570272" version="1" comment="python-demo is &lt;2.6.0-8.9.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570273" version="1" comment="python-gdbm is &lt;2.6.0-8.9.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570274" version="1" comment="python-idle is &lt;2.6.0-8.9.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570275" version="1" comment="python-tk is &lt;2.6.0-8.9.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570276" version="1" comment="python-x86 is &lt;2.6.0-8.9.6.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570277" version="1" comment="python-xml is &lt;2.6.0-8.8.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991172" version="1" comment="libqt4 is &lt;4.4.3-12.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587134" version="1" comment="libqt4-32bit is &lt;4.4.3-12.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991173" version="1" comment="libqt4-qt3support is &lt;4.4.3-12.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587136" version="1" comment="libqt4-qt3support-32bit is &lt;4.4.3-12.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587137" version="1" comment="libqt4-qt3support-x86 is &lt;4.4.3-12.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991174" version="1" comment="libqt4-sql is &lt;4.4.3-12.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587139" version="1" comment="libqt4-sql-32bit is &lt;4.4.3-12.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991175" version="1" comment="libqt4-sql-sqlite is &lt;4.4.3-12.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587141" version="1" comment="libqt4-sql-x86 is &lt;4.4.3-12.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991176" version="1" comment="libqt4-x11 is &lt;4.4.3-12.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587143" version="1" comment="libqt4-x11-32bit is &lt;4.4.3-12.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587144" version="1" comment="libqt4-x11-x86 is &lt;4.4.3-12.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587145" version="1" comment="libqt4-x86 is &lt;4.4.3-12.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570278" version="1" comment="libsndfile is &lt;1.0.17-172.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570279" version="1" comment="libsndfile-32bit is &lt;1.0.17-172.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570280" version="1" comment="libsndfile-x86 is &lt;1.0.17-172.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570281" version="1" comment="libtheora0 is &lt;1.0.beta2-6.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570282" version="1" comment="libtheora0-32bit is &lt;1.0.beta2-6.1.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570283" version="1" comment="libtheora0-x86 is &lt;1.0.beta2-6.1.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570284" version="1" comment="libtiff3 is &lt;3.8.2-141.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570285" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570286" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570287" version="1" comment="tiff is &lt;3.8.2-141.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570288" version="1" comment="libtiff3 is &lt;3.8.2-141.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570289" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570290" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570291" version="1" comment="libvolume_id1 is &lt;128-13.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570292" version="1" comment="udev is &lt;128-13.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570293" version="1" comment="libvirt is &lt;0.4.6-14.63.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570294" version="1" comment="libvirt-doc is &lt;0.4.6-14.63.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570295" version="1" comment="libvirt-python is &lt;0.4.6-14.63.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570296" version="1" comment="libvorbis is &lt;1.2.0-79.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570297" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570298" version="1" comment="libvorbis-doc is &lt;1.2.0-79.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570299" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.13.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570300" version="1" comment="libxml2 is &lt;2.7.1-10.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570301" version="1" comment="libxml2-32bit is &lt;2.7.1-10.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570302" version="1" comment="libxml2-doc is &lt;2.7.1-10.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570303" version="1" comment="libxml2-x86 is &lt;2.7.1-10.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570304" version="1" comment="lvm2 is &lt;2.02.39-18.26.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570305" version="1" comment="mipv6d is &lt;2.0.2-2.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570306" version="1" comment="mozilla-nspr is &lt;4.8.2-1.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570307" version="1" comment="mozilla-nspr-32bit is &lt;4.8.2-1.1.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570308" version="1" comment="mozilla-nspr-x86 is &lt;4.8.2-1.1.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570309" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.9-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570310" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.9-0.1.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570311" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.9-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570312" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.9-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570313" version="1" comment="mozilla-xulrunner190-x86 is &lt;1.9.0.9-0.1.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570314" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.15-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570315" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.15-0.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570316" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.15-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570317" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.15-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570318" version="1" comment="mozilla-xulrunner191-x86 is &lt;1.9.1.15-0.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570319" version="1" comment="mutt is &lt;1.5.17-42.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570320" version="1" comment="nagios is &lt;3.0.6-1.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570321" version="1" comment="nagios-www is &lt;3.0.6-1.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570322" version="1" comment="ntp is &lt;4.2.4p6-1.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570323" version="1" comment="ntp-doc is &lt;4.2.4p6-1.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570324" version="1" comment="open-iscsi is &lt;2.0.870-26.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570325" version="1" comment="openslp is &lt;1.2.0-172.10.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570326" version="1" comment="openslp-32bit is &lt;1.2.0-172.10.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570327" version="1" comment="openslp-server is &lt;1.2.0-172.10.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570328" version="1" comment="openslp-x86 is &lt;1.2.0-172.10.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570329" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570330" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570331" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8h-30.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570332" version="1" comment="openssl is &lt;0.9.8h-30.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570333" version="1" comment="openssl-doc is &lt;0.9.8h-30.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570334" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570335" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570336" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8h-30.18.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570337" version="1" comment="openssl is &lt;0.9.8h-30.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570338" version="1" comment="openssl-doc is &lt;0.9.8h-30.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570339" version="1" comment="openswan is &lt;2.6.16-1.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570340" version="1" comment="openswan-doc is &lt;2.6.16-1.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570341" version="1" comment="pango is &lt;1.22.1-3.17.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570342" version="1" comment="pango-32bit is &lt;1.22.1-3.17.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570343" version="1" comment="pango-doc is &lt;1.22.1-3.17.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570344" version="1" comment="pango-x86 is &lt;1.22.1-3.17.3 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570345" version="1" comment="pcsc-lite is &lt;1.4.102-1.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570346" version="1" comment="pcsc-lite-32bit is &lt;1.4.102-1.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570347" version="1" comment="pcsc-lite-x86 is &lt;1.4.102-1.31.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570348" version="1" comment="perl is &lt;5.10.0-64.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570349" version="1" comment="perl-32bit is &lt;5.10.0-64.43.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570350" version="1" comment="perl-base is &lt;5.10.0-64.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570351" version="1" comment="perl-doc is &lt;5.10.0-64.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570352" version="1" comment="perl-x86 is &lt;5.10.0-64.43.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570353" version="1" comment="perl-HTML-Parser is &lt;3.56-1.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570354" version="1" comment="perl-IO-Socket-SSL is &lt;1.16-3.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991177" version="1" comment="popt is &lt;1.7-37.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991178" version="1" comment="popt-32bit is &lt;1.7-37.10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991179" version="1" comment="popt-x86 is &lt;1.7-37.10.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991180" version="1" comment="rpm is &lt;4.4.2.3-37.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991181" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991182" version="1" comment="rpm-x86 is &lt;4.4.2.3-37.10.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570355" version="1" comment="postgresql is &lt;8.3.7-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570356" version="1" comment="postgresql-contrib is &lt;8.3.7-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570357" version="1" comment="postgresql-docs is &lt;8.3.7-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570358" version="1" comment="postgresql-libs is &lt;8.3.7-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570359" version="1" comment="postgresql-libs-32bit is &lt;8.3.7-0.1.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570360" version="1" comment="postgresql-libs-x86 is &lt;8.3.7-0.1.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570361" version="1" comment="postgresql-server is &lt;8.3.7-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991183" version="1" comment="puppet is &lt;0.24.8-1.3.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991184" version="1" comment="puppet-server is &lt;0.24.8-1.3.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587448" version="1" comment="pwdutils is &lt;3.2.2-2.19 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570362" version="1" comment="pyxml is &lt;0.8.4-194.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570363" version="1" comment="quagga is &lt;0.99.10-17.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570364" version="1" comment="sendmail is &lt;8.14.3-50.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570365" version="1" comment="ruby is &lt;1.8.7.p72-5.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570366" version="1" comment="ruby-doc-html is &lt;1.8.7.p72-5.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570367" version="1" comment="ruby-tk is &lt;1.8.7.p72-5.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570368" version="1" comment="squid is &lt;2.7.STABLE5-2.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570369" version="1" comment="strongswan is &lt;4.2.8-1.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570370" version="1" comment="strongswan-doc is &lt;4.2.8-1.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570371" version="1" comment="sudo is &lt;1.6.9p17-21.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570372" version="1" comment="systemtap is &lt;0.7.1-42.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570373" version="1" comment="tar is &lt;1.20-23.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570374" version="1" comment="tgt is &lt;0.9.0-1.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570375" version="1" comment="w3m is &lt;0.5.2-128.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586786" version="1" comment="websphere-as_ce is &lt;2.1.1.2-2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570377" version="1" comment="wget is &lt;1.11.4-1.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570378" version="1" comment="wireshark is &lt;1.0.5-1.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570379" version="1" comment="libcmpiutil is &lt;0.5-15.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570380" version="1" comment="libvirt is &lt;0.4.6-14.60.16 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570381" version="1" comment="libvirt-cim is &lt;0.5.2-8.47.85 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570382" version="1" comment="libvirt-doc is &lt;0.4.6-14.60.16 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570383" version="1" comment="libvirt-python is &lt;0.4.6-14.60.16 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570384" version="1" comment="virt-manager is &lt;0.5.3-66.42.13 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570385" version="1" comment="virt-viewer is &lt;0.0.3-3.57.13 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570386" version="1" comment="vm-install is &lt;0.3.27-0.1.15 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570387" version="1" comment="xen is &lt;3.3.1_18546_24-0.3.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570388" version="1" comment="xen-doc-html is &lt;3.3.1_18546_24-0.3.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570389" version="1" comment="xen-doc-pdf is &lt;3.3.1_18546_24-0.3.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570390" version="1" comment="xen-kmp-default is &lt;3.3.1_18546_24_2.6.27.45_0.3-0.3.7 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570391" version="1" comment="xen-kmp-pae is &lt;3.3.1_18546_24_2.6.27.45_0.3-0.3.7 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570392" version="1" comment="xen-libs is &lt;3.3.1_18546_24-0.3.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570393" version="1" comment="xen-tools is &lt;3.3.1_18546_24-0.3.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570394" version="1" comment="xen-tools-domU is &lt;3.3.1_18546_24-0.3.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570395" version="1" comment="xerces-j2 is &lt;2.8.1-238.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570396" version="1" comment="xerces-j2-xml-apis is &lt;2.8.1-238.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570397" version="1" comment="xerces-j2-xml-resolver is &lt;2.8.1-238.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570398" version="1" comment="xpdf-tools is &lt;3.02-138.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570399" version="1" comment="yast2-ldap-server is &lt;2.17.21-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991185" version="1" comment="ConsoleKit is &lt;0.2.10-64.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991186" version="1" comment="ConsoleKit-32bit is &lt;0.2.10-64.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991187" version="1" comment="ConsoleKit-x11 is &lt;0.2.10-64.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570404" version="1" comment="MozillaFirefox is &lt;24.6.0esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570405" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.4.10.24 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570406" version="1" comment="MozillaFirefox-translations is &lt;24.6.0esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570407" version="1" comment="libfreebl3 is &lt;3.16.1-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570408" version="1" comment="libfreebl3-32bit is &lt;3.16.1-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570409" version="1" comment="mozilla-nspr is &lt;4.10.6-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570410" version="1" comment="mozilla-nspr-32bit is &lt;4.10.6-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570411" version="1" comment="mozilla-nss is &lt;3.16.1-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570412" version="1" comment="mozilla-nss-32bit is &lt;3.16.1-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570413" version="1" comment="mozilla-nss-tools is &lt;3.16.1-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991188" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991189" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570416" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570417" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570418" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570419" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570420" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570421" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570422" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570423" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570424" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570425" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570426" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570427" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570428" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570429" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570430" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570431" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594210" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594211" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570432" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570433" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570434" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570435" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570436" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570437" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570438" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570439" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570440" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570441" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570442" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570443" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570444" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570445" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570446" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570447" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570448" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570449" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570450" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570451" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570452" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570453" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570454" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570455" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570456" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570457" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570458" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570459" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570460" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570461" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570462" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570463" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570464" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570465" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570466" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570467" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570468" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.109.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570469" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.109.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570470" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.112.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570471" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.112.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570472" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570473" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570474" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.122.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570475" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.122.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570476" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.125.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570477" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.125.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570478" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.128.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570479" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.128.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570480" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.135.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570481" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.135.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570482" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.140.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570483" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.140.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570484" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.143.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570485" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.143.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570486" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.146.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570487" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.146.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570488" version="1" comment="LibVNCServer is &lt;0.9.1-159.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570489" version="1" comment="LibVNCServer is &lt;0.9.1-160.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570490" version="1" comment="LibVNCServer is &lt;0.9.1-160.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570491" version="1" comment="LibVNCServer is &lt;0.9.1-160.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570492" version="1" comment="LibVNCServer is &lt;0.9.1-160.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570493" version="1" comment="LibVNCServer is &lt;0.9.1-160.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570494" version="1" comment="LibVNCServer is &lt;0.9.1-160.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991190" version="1" comment="Mesa is &lt;7.7-5.12.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991191" version="1" comment="Mesa-32bit is &lt;7.7-5.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570495" version="1" comment="Mesa is &lt;7.7-5.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570496" version="1" comment="Mesa-32bit is &lt;7.7-5.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991192" version="1" comment="MozillaFirefox is &lt;17.0.9esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991193" version="1" comment="MozillaFirefox-translations is &lt;17.0.9esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991194" version="1" comment="libfreebl3 is &lt;3.13.5-0.4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991195" version="1" comment="libfreebl3-32bit is &lt;3.13.5-0.4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991196" version="1" comment="mozilla-nspr is &lt;4.9.1-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991197" version="1" comment="mozilla-nspr-32bit is &lt;4.9.1-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991198" version="1" comment="mozilla-nss is &lt;3.13.5-0.4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991199" version="1" comment="mozilla-nss-32bit is &lt;3.13.5-0.4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991200" version="1" comment="mozilla-nss-tools is &lt;3.13.5-0.4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991201" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.11-0.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991202" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.11-0.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991203" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.11-0.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991204" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.11-0.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991205" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.24-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991206" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.24-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991207" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.24-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991208" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.24-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570514" version="1" comment="MozillaFirefox is &lt;38.5.0esr-28.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570515" version="1" comment="MozillaFirefox-translations is &lt;38.5.0esr-28.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570516" version="1" comment="MozillaFirefox is &lt;38.8.0esr-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570517" version="1" comment="MozillaFirefox-translations is &lt;38.8.0esr-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570518" version="1" comment="MozillaFirefox is &lt;45.3.0esr-48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570519" version="1" comment="MozillaFirefox-branding-SLED is &lt;45.0-20.38 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570520" version="1" comment="MozillaFirefox-translations is &lt;45.3.0esr-48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570521" version="1" comment="firefox-fontconfig is &lt;2.11.0-4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570522" version="1" comment="libfreebl3 is &lt;3.21.1-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570523" version="1" comment="libfreebl3-32bit is &lt;3.21.1-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570524" version="1" comment="mozilla-nspr is &lt;4.12-25.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570525" version="1" comment="mozilla-nspr-32bit is &lt;4.12-25.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570526" version="1" comment="mozilla-nss is &lt;3.21.1-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570527" version="1" comment="mozilla-nss-32bit is &lt;3.21.1-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570528" version="1" comment="mozilla-nss-tools is &lt;3.21.1-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570529" version="1" comment="MozillaFirefox is &lt;45.4.0esr-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570530" version="1" comment="MozillaFirefox-translations is &lt;45.4.0esr-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570531" version="1" comment="MozillaFirefox is &lt;45.6.0esr-66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570532" version="1" comment="MozillaFirefox-translations is &lt;45.6.0esr-66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570533" version="1" comment="MozillaFirefox is &lt;45.7.0esr-69.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570534" version="1" comment="MozillaFirefox-translations is &lt;45.7.0esr-69.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570535" version="1" comment="MozillaFirefox is &lt;45.8.0esr-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570536" version="1" comment="MozillaFirefox-translations is &lt;45.8.0esr-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570537" version="1" comment="MozillaFirefox is &lt;45.9.0esr-77.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570538" version="1" comment="MozillaFirefox-translations is &lt;45.9.0esr-77.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570539" version="1" comment="libfreebl3 is &lt;3.29.5-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570540" version="1" comment="libfreebl3-32bit is &lt;3.29.5-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570541" version="1" comment="mozilla-nspr is &lt;4.13.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570542" version="1" comment="mozilla-nspr-32bit is &lt;4.13.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570543" version="1" comment="mozilla-nss is &lt;3.29.5-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570544" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570545" version="1" comment="mozilla-nss-tools is &lt;3.29.5-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570546" version="1" comment="MozillaFirefox is &lt;52.3.0esr-78.4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570547" version="1" comment="MozillaFirefox-branding-SLED is &lt;52-21.3.28 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570548" version="1" comment="MozillaFirefox-translations is &lt;52.3.0esr-78.4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570549" version="1" comment="firefox-libffi4 is &lt;5.3.1+r233831-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570550" version="1" comment="firefox-libgcc_s1 is &lt;5.3.1+r233831-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570551" version="1" comment="firefox-libstdc++6 is &lt;5.3.1+r233831-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570552" version="1" comment="MozillaFirefox is &lt;52.5.0esr-78.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570553" version="1" comment="MozillaFirefox-translations is &lt;52.5.0esr-78.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570554" version="1" comment="MozillaFirefox is &lt;52.6.0esr-78.13.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570555" version="1" comment="MozillaFirefox-translations is &lt;52.6.0esr-78.13.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570556" version="1" comment="MozillaFirefox is &lt;52.7.3esr-78.20.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570557" version="1" comment="MozillaFirefox-translations is &lt;52.7.3esr-78.20.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570558" version="1" comment="MozillaFirefox is &lt;52.8.0esr-78.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570559" version="1" comment="MozillaFirefox-translations is &lt;52.8.0esr-78.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570560" version="1" comment="MozillaFirefox is &lt;52.8.1esr-78.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570561" version="1" comment="MozillaFirefox-translations is &lt;52.8.1esr-78.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570562" version="1" comment="MozillaFirefox is &lt;52.9.0esr-78.32.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570563" version="1" comment="MozillaFirefox-translations is &lt;52.9.0esr-78.32.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570564" version="1" comment="MozillaFirefox is &lt;60.8.0esr-78.43.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570565" version="1" comment="MozillaFirefox-translations-common is &lt;60.8.0esr-78.43.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570566" version="1" comment="MozillaFirefox-translations-other is &lt;60.8.0esr-78.43.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570567" version="1" comment="MozillaFirefox is &lt;68.3.0-78.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570568" version="1" comment="MozillaFirefox-translations-common is &lt;68.3.0-78.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570569" version="1" comment="MozillaFirefox-translations-other is &lt;68.3.0-78.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570570" version="1" comment="libfreebl3 is &lt;3.47.1-38.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570571" version="1" comment="libfreebl3-32bit is &lt;3.47.1-38.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570572" version="1" comment="libsoftokn3 is &lt;3.47.1-38.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570573" version="1" comment="libsoftokn3-32bit is &lt;3.47.1-38.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570574" version="1" comment="mozilla-nspr is &lt;4.23-29.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570575" version="1" comment="mozilla-nspr-32bit is &lt;4.23-29.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570576" version="1" comment="mozilla-nss is &lt;3.47.1-38.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570577" version="1" comment="mozilla-nss-32bit is &lt;3.47.1-38.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570578" version="1" comment="mozilla-nss-certs is &lt;3.47.1-38.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570579" version="1" comment="mozilla-nss-certs-32bit is &lt;3.47.1-38.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570580" version="1" comment="mozilla-nss-tools is &lt;3.47.1-38.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570581" version="1" comment="MozillaFirefox is &lt;68.4.1-78.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570582" version="1" comment="MozillaFirefox-translations-common is &lt;68.4.1-78.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570583" version="1" comment="MozillaFirefox-translations-other is &lt;68.4.1-78.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570584" version="1" comment="MozillaFirefox is &lt;68.5.0-78.61.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570585" version="1" comment="MozillaFirefox-translations-common is &lt;68.5.0-78.61.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570586" version="1" comment="MozillaFirefox-translations-other is &lt;68.5.0-78.61.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570587" version="1" comment="MozillaFirefox is &lt;68.6.0-78.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570588" version="1" comment="MozillaFirefox-translations-common is &lt;68.6.0-78.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570589" version="1" comment="MozillaFirefox-translations-other is &lt;68.6.0-78.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570590" version="1" comment="MozillaFirefox is &lt;68.6.1-78.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570591" version="1" comment="MozillaFirefox-translations-common is &lt;68.6.1-78.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570592" version="1" comment="MozillaFirefox-translations-other is &lt;68.6.1-78.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570593" version="1" comment="MozillaFirefox is &lt;68.7.0-78.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570594" version="1" comment="MozillaFirefox-translations-common is &lt;68.7.0-78.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570595" version="1" comment="MozillaFirefox-translations-other is &lt;68.7.0-78.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570596" version="1" comment="MozillaFirefox is &lt;68.8.0-78.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570597" version="1" comment="MozillaFirefox-translations-common is &lt;68.8.0-78.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570598" version="1" comment="MozillaFirefox-translations-other is &lt;68.8.0-78.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570599" version="1" comment="MozillaFirefox is &lt;68.9.0-78.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570600" version="1" comment="MozillaFirefox-translations-common is &lt;68.9.0-78.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570601" version="1" comment="MozillaFirefox-translations-other is &lt;68.9.0-78.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570602" version="1" comment="MozillaFirefox is &lt;78.0.1-78.80.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570603" version="1" comment="MozillaFirefox-branding-SLED is &lt;78-21.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570604" version="1" comment="MozillaFirefox-translations-common is &lt;78.0.1-78.80.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570605" version="1" comment="MozillaFirefox-translations-other is &lt;78.0.1-78.80.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570606" version="1" comment="MozillaFirefox is &lt;78.1.0-78.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570607" version="1" comment="MozillaFirefox-translations-common is &lt;78.1.0-78.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570608" version="1" comment="MozillaFirefox-translations-other is &lt;78.1.0-78.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570609" version="1" comment="MozillaFirefox is &lt;78.2.0-78.90.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570610" version="1" comment="MozillaFirefox-translations-common is &lt;78.2.0-78.90.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570611" version="1" comment="MozillaFirefox-translations-other is &lt;78.2.0-78.90.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570612" version="1" comment="MozillaFirefox is &lt;78.3.0-78.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570613" version="1" comment="MozillaFirefox-translations-common is &lt;78.3.0-78.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570614" version="1" comment="MozillaFirefox-translations-other is &lt;78.3.0-78.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570615" version="1" comment="MozillaFirefox is &lt;78.4.0-78.99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570616" version="1" comment="MozillaFirefox-translations-common is &lt;78.4.0-78.99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570617" version="1" comment="MozillaFirefox-translations-other is &lt;78.4.0-78.99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570618" version="1" comment="MozillaFirefox is &lt;78.4.1-78.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570619" version="1" comment="MozillaFirefox-translations-common is &lt;78.4.1-78.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570620" version="1" comment="MozillaFirefox-translations-other is &lt;78.4.1-78.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570621" version="1" comment="MozillaFirefox is &lt;78.5.0-78.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570622" version="1" comment="MozillaFirefox-translations-common is &lt;78.5.0-78.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570623" version="1" comment="MozillaFirefox-translations-other is &lt;78.5.0-78.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570624" version="1" comment="MozillaFirefox is &lt;78.6.0-78.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570625" version="1" comment="MozillaFirefox-translations-common is &lt;78.6.0-78.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570626" version="1" comment="MozillaFirefox-translations-other is &lt;78.6.0-78.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570627" version="1" comment="MozillaFirefox is &lt;78.6.1-78.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570628" version="1" comment="MozillaFirefox-translations-common is &lt;78.6.1-78.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570629" version="1" comment="MozillaFirefox-translations-other is &lt;78.6.1-78.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570630" version="1" comment="MozillaFirefox is &lt;78.7.0-78.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570631" version="1" comment="MozillaFirefox-translations-common is &lt;78.7.0-78.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570632" version="1" comment="MozillaFirefox-translations-other is &lt;78.7.0-78.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570633" version="1" comment="MozillaFirefox is &lt;78.7.1-78.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570634" version="1" comment="MozillaFirefox-translations-common is &lt;78.7.1-78.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570635" version="1" comment="MozillaFirefox-translations-other is &lt;78.7.1-78.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570636" version="1" comment="MozillaFirefox is &lt;78.8.0-78.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570637" version="1" comment="MozillaFirefox-translations-common is &lt;78.8.0-78.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570638" version="1" comment="MozillaFirefox-translations-other is &lt;78.8.0-78.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570639" version="1" comment="MozillaFirefox is &lt;78.9.0-78.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570640" version="1" comment="MozillaFirefox-translations-common is &lt;78.9.0-78.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570641" version="1" comment="MozillaFirefox-translations-other is &lt;78.9.0-78.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570642" version="1" comment="MozillaFirefox is &lt;78.10.0-78.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570643" version="1" comment="MozillaFirefox-translations-common is &lt;78.10.0-78.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570644" version="1" comment="MozillaFirefox-translations-other is &lt;78.10.0-78.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570645" version="1" comment="MozillaFirefox is &lt;78.11.0-78.131.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570646" version="1" comment="MozillaFirefox-translations-common is &lt;78.11.0-78.131.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570647" version="1" comment="MozillaFirefox-translations-other is &lt;78.11.0-78.131.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625243" version="1" comment="MozillaFirefox is &lt;78.12.0-78.134.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625244" version="1" comment="MozillaFirefox-translations-common is &lt;78.12.0-78.134.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625245" version="1" comment="MozillaFirefox-translations-other is &lt;78.12.0-78.134.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630646" version="1" comment="MozillaFirefox is &lt;78.13.0-78.137.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630647" version="1" comment="MozillaFirefox-translations-common is &lt;78.13.0-78.137.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630648" version="1" comment="MozillaFirefox-translations-other is &lt;78.13.0-78.137.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634730" version="1" comment="MozillaFirefox is &lt;78.14.0-78.140.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634731" version="1" comment="MozillaFirefox-translations-common is &lt;78.14.0-78.140.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634732" version="1" comment="MozillaFirefox-translations-other is &lt;78.14.0-78.140.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654421" version="1" comment="MozillaFirefox is &lt;91.3.0-78.151.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654422" version="1" comment="MozillaFirefox-translations-common is &lt;91.3.0-78.151.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654423" version="1" comment="MozillaFirefox-translations-other is &lt;91.3.0-78.151.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659367" version="1" comment="MozillaFirefox is &lt;91.4.0-78.154.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659368" version="1" comment="MozillaFirefox-translations-common is &lt;91.4.0-78.154.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659369" version="1" comment="MozillaFirefox-translations-other is &lt;91.4.0-78.154.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663814" version="1" comment="MozillaFirefox is &lt;91.5.0-78.159.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663815" version="1" comment="MozillaFirefox-translations-common is &lt;91.5.0-78.159.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663816" version="1" comment="MozillaFirefox-translations-other is &lt;91.5.0-78.159.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663817" version="1" comment="libfreebl3 is &lt;3.68.2-38.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663818" version="1" comment="libfreebl3-32bit is &lt;3.68.2-38.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663819" version="1" comment="libsoftokn3 is &lt;3.68.2-38.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663820" version="1" comment="libsoftokn3-32bit is &lt;3.68.2-38.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663821" version="1" comment="mozilla-nss is &lt;3.68.2-38.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663822" version="1" comment="mozilla-nss-32bit is &lt;3.68.2-38.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663823" version="1" comment="mozilla-nss-certs is &lt;3.68.2-38.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663824" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68.2-38.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663825" version="1" comment="mozilla-nss-tools is &lt;3.68.2-38.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668898" version="1" comment="MozillaFirefox is &lt;91.6.0-78.162.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668899" version="1" comment="MozillaFirefox-translations-common is &lt;91.6.0-78.162.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668900" version="1" comment="MozillaFirefox-translations-other is &lt;91.6.0-78.162.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672457" version="1" comment="MozillaFirefox is &lt;91.7.0-78.167.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672458" version="1" comment="MozillaFirefox-translations-common is &lt;91.7.0-78.167.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672459" version="1" comment="MozillaFirefox-translations-other is &lt;91.7.0-78.167.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678509" version="1" comment="MozillaFirefox is &lt;91.8.0-78.170.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678510" version="1" comment="MozillaFirefox-translations-common is &lt;91.8.0-78.170.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678511" version="1" comment="MozillaFirefox-translations-other is &lt;91.8.0-78.170.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570648" version="1" comment="MozillaFirefox is &lt;24.5.0esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570649" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.4.10.14 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570650" version="1" comment="MozillaFirefox-translations is &lt;24.5.0esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570651" version="1" comment="libfreebl3 is &lt;3.16-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570652" version="1" comment="libfreebl3-32bit is &lt;3.16-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570653" version="1" comment="mozilla-nspr is &lt;4.10.4-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570654" version="1" comment="mozilla-nspr-32bit is &lt;4.10.4-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570655" version="1" comment="mozilla-nss is &lt;3.16-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570656" version="1" comment="mozilla-nss-32bit is &lt;3.16-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570657" version="1" comment="mozilla-nss-tools is &lt;3.16-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570658" version="1" comment="MozillaFirefox is &lt;31.6.0esr-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570659" version="1" comment="MozillaFirefox-translations is &lt;31.6.0esr-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570660" version="1" comment="mozilla-nspr is &lt;4.10.8-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566345" version="1" comment="mozilla-nspr-32bit is &lt;4.10.8-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652557" version="1" comment="MozillaFirefox is &lt;91.2.0-78.143.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652558" version="1" comment="MozillaFirefox-branding-SLED is &lt;91-21.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652559" version="1" comment="MozillaFirefox-translations-common is &lt;91.2.0-78.143.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652560" version="1" comment="MozillaFirefox-translations-other is &lt;91.2.0-78.143.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991209" version="1" comment="NetworkManager is &lt;0.7.1_git20090811-3.9.9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991210" version="1" comment="NetworkManager-glib is &lt;0.7.1_git20090811-3.9.9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991211" version="1" comment="NetworkManager-gnome is &lt;0.7.1-5.15.7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991212" version="1" comment="wpa_supplicant is &lt;0.6.9-4.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991213" version="1" comment="NetworkManager-gnome is &lt;0.7.1-5.15.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570666" version="1" comment="NetworkManager-kde4 is &lt;0.9.svn1043876-1.3.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570667" version="1" comment="NetworkManager-kde4-lang is &lt;0.9.svn1043876-1.3.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570668" version="1" comment="NetworkManager-kde4-libs is &lt;0.9.svn1043876-1.3.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570669" version="1" comment="NetworkManager-openvpn-kde4 is &lt;0.9.svn1043876-1.3.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570670" version="1" comment="NetworkManager-pptp-kde4 is &lt;0.9.svn1043876-1.3.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570671" version="1" comment="plasmoid-networkmanagement is &lt;0.9.svn1043876-1.3.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570672" version="1" comment="OpenEXR is &lt;1.6.1-83.17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564202" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570673" version="1" comment="OpenEXR is &lt;1.6.1-83.17.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570674" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570675" version="1" comment="OpenEXR is &lt;1.6.1-83.17.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570676" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570677" version="1" comment="OpenEXR is &lt;1.6.1-83.17.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570678" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570679" version="1" comment="OpenEXR is &lt;1.6.1-83.17.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570680" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570681" version="1" comment="OpenEXR is &lt;1.6.1-83.17.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570682" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570683" version="1" comment="OpenEXR is &lt;1.6.1-83.17.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570684" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657133" version="1" comment="OpenEXR is &lt;1.6.1-83.17.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657134" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991214" version="1" comment="libpython2_6-1_0 is &lt;2.6.0-8.9.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570686" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.0-8.9.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570687" version="1" comment="SDL is &lt;1.2.13-106.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564204" version="1" comment="SDL-32bit is &lt;1.2.13-106.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570688" version="1" comment="SDL is &lt;1.2.13-106.14.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570689" version="1" comment="SDL-32bit is &lt;1.2.13-106.14.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679743" version="1" comment="SDL is &lt;1.2.13-106.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679744" version="1" comment="SDL-32bit is &lt;1.2.13-106.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570690" version="1" comment="SuSEfirewall2 is &lt;3.6_SVNr208-2.18.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991215" version="1" comment="a2ps is &lt;4.13-1326.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991216" version="1" comment="aaa_base is &lt;11-6.46.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570691" version="1" comment="libadns1 is &lt;1.4-75.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664250" version="1" comment="aide is &lt;0.13.1-40.16.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570692" version="1" comment="amanda is &lt;2.5.2.1-188.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570693" version="1" comment="ant is &lt;1.7.0-200.26.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570694" version="1" comment="ant-trax is &lt;1.7.0-200.26.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991217" version="1" comment="apache2 is &lt;2.2.12-1.46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991218" version="1" comment="apache2-doc is &lt;2.2.12-1.46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991219" version="1" comment="apache2-example-pages is &lt;2.2.12-1.46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991220" version="1" comment="apache2-prefork is &lt;2.2.12-1.46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991221" version="1" comment="apache2-utils is &lt;2.2.12-1.46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991222" version="1" comment="apache2-worker is &lt;2.2.12-1.46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570701" version="1" comment="apache2 is &lt;2.2.12-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570702" version="1" comment="apache2-doc is &lt;2.2.12-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570703" version="1" comment="apache2-example-pages is &lt;2.2.12-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570704" version="1" comment="apache2-prefork is &lt;2.2.12-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570705" version="1" comment="apache2-utils is &lt;2.2.12-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570706" version="1" comment="apache2-worker is &lt;2.2.12-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570707" version="1" comment="apache2 is &lt;2.2.12-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570708" version="1" comment="apache2-doc is &lt;2.2.12-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570709" version="1" comment="apache2-example-pages is &lt;2.2.12-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570710" version="1" comment="apache2-prefork is &lt;2.2.12-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570711" version="1" comment="apache2-utils is &lt;2.2.12-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570712" version="1" comment="apache2-worker is &lt;2.2.12-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570713" version="1" comment="apache2 is &lt;2.2.12-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570714" version="1" comment="apache2-doc is &lt;2.2.12-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570715" version="1" comment="apache2-example-pages is &lt;2.2.12-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570716" version="1" comment="apache2-prefork is &lt;2.2.12-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570717" version="1" comment="apache2-utils is &lt;2.2.12-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570718" version="1" comment="apache2-worker is &lt;2.2.12-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570719" version="1" comment="apache2 is &lt;2.2.34-70.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570720" version="1" comment="apache2-doc is &lt;2.2.34-70.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570721" version="1" comment="apache2-example-pages is &lt;2.2.34-70.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570722" version="1" comment="apache2-prefork is &lt;2.2.34-70.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570723" version="1" comment="apache2-utils is &lt;2.2.34-70.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570724" version="1" comment="apache2-worker is &lt;2.2.34-70.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570725" version="1" comment="apache2 is &lt;2.2.34-70.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570726" version="1" comment="apache2-doc is &lt;2.2.34-70.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570727" version="1" comment="apache2-example-pages is &lt;2.2.34-70.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570728" version="1" comment="apache2-prefork is &lt;2.2.34-70.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570729" version="1" comment="apache2-utils is &lt;2.2.34-70.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570730" version="1" comment="apache2-worker is &lt;2.2.34-70.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570731" version="1" comment="apache2 is &lt;2.2.34-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570732" version="1" comment="apache2-doc is &lt;2.2.34-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570733" version="1" comment="apache2-example-pages is &lt;2.2.34-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570734" version="1" comment="apache2-prefork is &lt;2.2.34-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570735" version="1" comment="apache2-utils is &lt;2.2.34-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570736" version="1" comment="apache2-worker is &lt;2.2.34-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570737" version="1" comment="apache2 is &lt;2.2.34-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570738" version="1" comment="apache2-doc is &lt;2.2.34-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570739" version="1" comment="apache2-example-pages is &lt;2.2.34-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570740" version="1" comment="apache2-prefork is &lt;2.2.34-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570741" version="1" comment="apache2-utils is &lt;2.2.34-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570742" version="1" comment="apache2-worker is &lt;2.2.34-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570743" version="1" comment="apache2 is &lt;2.2.34-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570744" version="1" comment="apache2-doc is &lt;2.2.34-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570745" version="1" comment="apache2-example-pages is &lt;2.2.34-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570746" version="1" comment="apache2-prefork is &lt;2.2.34-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570747" version="1" comment="apache2-utils is &lt;2.2.34-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570748" version="1" comment="apache2-worker is &lt;2.2.34-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570749" version="1" comment="apache2 is &lt;2.2.34-70.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570750" version="1" comment="apache2-doc is &lt;2.2.34-70.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570751" version="1" comment="apache2-example-pages is &lt;2.2.34-70.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570752" version="1" comment="apache2-prefork is &lt;2.2.34-70.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570753" version="1" comment="apache2-utils is &lt;2.2.34-70.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570754" version="1" comment="apache2-worker is &lt;2.2.34-70.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570755" version="1" comment="apache2 is &lt;2.2.34-70.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570756" version="1" comment="apache2-doc is &lt;2.2.34-70.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570757" version="1" comment="apache2-example-pages is &lt;2.2.34-70.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570758" version="1" comment="apache2-prefork is &lt;2.2.34-70.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570759" version="1" comment="apache2-utils is &lt;2.2.34-70.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570760" version="1" comment="apache2-worker is &lt;2.2.34-70.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570761" version="1" comment="apache2 is &lt;2.2.34-70.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570762" version="1" comment="apache2-doc is &lt;2.2.34-70.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570763" version="1" comment="apache2-example-pages is &lt;2.2.34-70.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570764" version="1" comment="apache2-prefork is &lt;2.2.34-70.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570765" version="1" comment="apache2-utils is &lt;2.2.34-70.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570766" version="1" comment="apache2-worker is &lt;2.2.34-70.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633944" version="1" comment="apache2 is &lt;2.2.34-70.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633945" version="1" comment="apache2-doc is &lt;2.2.34-70.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633946" version="1" comment="apache2-example-pages is &lt;2.2.34-70.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633947" version="1" comment="apache2-prefork is &lt;2.2.34-70.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633948" version="1" comment="apache2-utils is &lt;2.2.34-70.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633949" version="1" comment="apache2-worker is &lt;2.2.34-70.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673620" version="1" comment="apache2 is &lt;2.2.34-70.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673621" version="1" comment="apache2-doc is &lt;2.2.34-70.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673622" version="1" comment="apache2-example-pages is &lt;2.2.34-70.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673623" version="1" comment="apache2-prefork is &lt;2.2.34-70.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673624" version="1" comment="apache2-utils is &lt;2.2.34-70.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673625" version="1" comment="apache2-worker is &lt;2.2.34-70.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991223" version="1" comment="apache2 is &lt;2.2.12-1.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991224" version="1" comment="apache2-doc is &lt;2.2.12-1.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991225" version="1" comment="apache2-example-pages is &lt;2.2.12-1.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991226" version="1" comment="apache2-prefork is &lt;2.2.12-1.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991227" version="1" comment="apache2-utils is &lt;2.2.12-1.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991228" version="1" comment="apache2-worker is &lt;2.2.12-1.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991229" version="1" comment="libapr1 is &lt;1.3.3-11.18.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570775" version="1" comment="apache2-mod_jk is &lt;1.2.40-0.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991230" version="1" comment="apache2-mod_nss is &lt;1.0.8-0.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570776" version="1" comment="apache2-mod_nss is &lt;1.0.14-0.4.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570777" version="1" comment="apache2-mod_perl is &lt;2.0.4-40.63.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991231" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991232" version="1" comment="php5 is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991233" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991234" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991235" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991236" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991237" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991238" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991239" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991240" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991241" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991242" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991243" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991244" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991245" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991246" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991247" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991248" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991249" version="1" comment="php5-json is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991250" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991251" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991252" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991253" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991254" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991255" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991256" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991257" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991258" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991259" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991260" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991261" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991262" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991263" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991264" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991265" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991266" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991267" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991268" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991269" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991270" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991271" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991272" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991273" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991274" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991275" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991276" version="1" comment="apache2-mod_python is &lt;3.3.1-147.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570824" version="1" comment="apport is &lt;0.114-12.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570825" version="1" comment="apport-crashdb-sle is &lt;0.114-0.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570826" version="1" comment="apport-gtk is &lt;0.114-12.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570827" version="1" comment="apport is &lt;0.114-12.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570828" version="1" comment="apport-crashdb-sle is &lt;0.114-0.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570829" version="1" comment="apport-gtk is &lt;0.114-12.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570830" version="1" comment="apport is &lt;0.114-12.8.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570831" version="1" comment="apport-crashdb-sle is &lt;0.114-0.8.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570832" version="1" comment="apport-gtk is &lt;0.114-12.8.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991277" version="1" comment="ark is &lt;4.3.5-0.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991278" version="1" comment="kcalc is &lt;4.3.5-0.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991279" version="1" comment="kcharselect is &lt;4.3.5-0.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991280" version="1" comment="kdessh is &lt;4.3.5-0.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991281" version="1" comment="kdf is &lt;4.3.5-0.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991282" version="1" comment="kfloppy is &lt;4.3.5-0.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991283" version="1" comment="kgpg is &lt;4.3.5-0.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991284" version="1" comment="ktimer is &lt;4.3.5-0.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991285" version="1" comment="kwalletmanager is &lt;4.3.5-0.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991286" version="1" comment="kwikdisk is &lt;4.3.5-0.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991287" version="1" comment="okteta is &lt;4.3.5-0.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991288" version="1" comment="arpwatch is &lt;2.1a15-131.23.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009616451" version="1" comment="arpwatch is &lt;2.1a15-131.23.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570845" version="1" comment="aspell is &lt;0.60.6-26.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570846" version="1" comment="aspell-32bit is &lt;0.60.6-26.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570847" version="1" comment="aspell-ispell is &lt;0.60.6-26.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570848" version="1" comment="aspell is &lt;0.60.6-26.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570849" version="1" comment="aspell-32bit is &lt;0.60.6-26.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570850" version="1" comment="aspell-ispell is &lt;0.60.6-26.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627833" version="1" comment="aspell is &lt;0.60.6-26.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627834" version="1" comment="aspell-32bit is &lt;0.60.6-26.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627835" version="1" comment="aspell-ispell is &lt;0.60.6-26.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570851" version="1" comment="atftp is &lt;0.7.0-135.16.16.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633873" version="1" comment="atftp is &lt;0.7.0-135.16.16.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667670" version="1" comment="atftp is &lt;0.7.0-135.16.16.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570852" version="1" comment="audiofile is &lt;0.2.6-142.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570853" version="1" comment="audiofile-32bit is &lt;0.2.6-142.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991289" version="1" comment="augeas is &lt;0.8.1-7.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991290" version="1" comment="augeas-lenses is &lt;0.8.1-7.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991291" version="1" comment="libaugeas0 is &lt;0.8.1-7.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570854" version="1" comment="augeas is &lt;0.8.1-7.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570855" version="1" comment="augeas-lenses is &lt;0.8.1-7.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570856" version="1" comment="libaugeas0 is &lt;0.8.1-7.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570857" version="1" comment="augeas is &lt;0.8.1-7.23.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570858" version="1" comment="augeas-lenses is &lt;0.8.1-7.23.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570859" version="1" comment="libaugeas0 is &lt;0.8.1-7.23.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570860" version="1" comment="automake is &lt;1.10.1-4.131.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570861" version="1" comment="avahi is &lt;0.6.23-11.25.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570862" version="1" comment="avahi-lang is &lt;0.6.23-11.25.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570863" version="1" comment="avahi-utils is &lt;0.6.23-11.25.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570864" version="1" comment="libavahi-client3 is &lt;0.6.23-11.25.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570865" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-11.25.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570866" version="1" comment="libavahi-common3 is &lt;0.6.23-11.25.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570867" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-11.25.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570868" version="1" comment="libavahi-core5 is &lt;0.6.23-11.25.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570869" version="1" comment="libdns_sd is &lt;0.6.23-11.25.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570870" version="1" comment="libdns_sd-32bit is &lt;0.6.23-11.25.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570871" version="1" comment="avahi is &lt;0.6.23-11.25.25.6.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570872" version="1" comment="avahi-lang is &lt;0.6.23-11.25.25.6.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570873" version="1" comment="avahi-utils is &lt;0.6.23-11.25.25.6.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570874" version="1" comment="libavahi-client3 is &lt;0.6.23-11.25.25.6.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570875" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-11.25.25.6.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570876" version="1" comment="libavahi-common3 is &lt;0.6.23-11.25.25.6.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570877" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-11.25.25.6.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570878" version="1" comment="libavahi-core5 is &lt;0.6.23-11.25.25.6.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570879" version="1" comment="libdns_sd is &lt;0.6.23-11.25.25.6.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570880" version="1" comment="libdns_sd-32bit is &lt;0.6.23-11.25.25.6.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570881" version="1" comment="avahi is &lt;0.6.23-11.25.25.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570882" version="1" comment="avahi-lang is &lt;0.6.23-11.25.25.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570883" version="1" comment="avahi-utils is &lt;0.6.23-11.25.25.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570884" version="1" comment="libavahi-client3 is &lt;0.6.23-11.25.25.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570885" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-11.25.25.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570886" version="1" comment="libavahi-common3 is &lt;0.6.23-11.25.25.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570887" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-11.25.25.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570888" version="1" comment="libavahi-core5 is &lt;0.6.23-11.25.25.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570889" version="1" comment="libdns_sd is &lt;0.6.23-11.25.25.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570890" version="1" comment="libdns_sd-32bit is &lt;0.6.23-11.25.25.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570891" version="1" comment="axis is &lt;1.4-236.38.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570892" version="1" comment="axis is &lt;1.4-236.38.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991292" version="1" comment="bash is &lt;3.2-147.14.22.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991293" version="1" comment="bash-doc is &lt;3.2-147.14.22.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991294" version="1" comment="libreadline5 is &lt;5.2-147.14.22.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991295" version="1" comment="libreadline5-32bit is &lt;5.2-147.14.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991296" version="1" comment="readline-doc is &lt;5.2-147.14.22.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570900" version="1" comment="bash is &lt;3.2-148.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570901" version="1" comment="bash-doc is &lt;3.2-148.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570902" version="1" comment="libreadline5 is &lt;5.2-148.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570903" version="1" comment="libreadline5-32bit is &lt;5.2-148.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570904" version="1" comment="readline-doc is &lt;5.2-148.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991297" version="1" comment="bind is &lt;9.6ESVR10P2-0.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991298" version="1" comment="bind-chrootenv is &lt;9.6ESVR10P2-0.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991299" version="1" comment="bind-doc is &lt;9.6ESVR10P2-0.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991300" version="1" comment="bind-libs is &lt;9.6ESVR10P2-0.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991301" version="1" comment="bind-libs-32bit is &lt;9.6ESVR10P2-0.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991302" version="1" comment="bind-utils is &lt;9.6ESVR10P2-0.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570912" version="1" comment="bind is &lt;9.6ESVR11W1-0.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570913" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570914" version="1" comment="bind-devel is &lt;9.6ESVR11W1-0.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570915" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570916" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570917" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570918" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570919" version="1" comment="bind is &lt;9.6ESVR11W1-0.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570920" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570921" version="1" comment="bind-devel is &lt;9.6ESVR11W1-0.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570922" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570923" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570924" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570925" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570926" version="1" comment="bind is &lt;9.6ESVR11W1-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570927" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570928" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570929" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570930" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570931" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570932" version="1" comment="bind is &lt;9.6ESVR11W1-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570933" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570934" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570935" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570936" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570937" version="1" comment="bind is &lt;9.6ESVR11W1-0.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570938" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570939" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570940" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570941" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570942" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570943" version="1" comment="bind is &lt;9.6ESVR11W1-0.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570944" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570945" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570946" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570947" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570948" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570949" version="1" comment="bind is &lt;9.6ESVR11W1-0.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570950" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570951" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570952" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570953" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570954" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570955" version="1" comment="bind is &lt;9.6ESVR11W1-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570956" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570957" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570958" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570959" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570960" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570961" version="1" comment="bind is &lt;9.6ESVR11W1-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570962" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570963" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570964" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570965" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570966" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570967" version="1" comment="bind is &lt;9.6ESVR11W1-0.31.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570968" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.31.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570969" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.31.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570970" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.31.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570971" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.31.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570972" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.31.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570973" version="1" comment="bind is &lt;9.6ESVR11W1-0.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570974" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570975" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570976" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570977" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570978" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570979" version="1" comment="bind is &lt;9.6ESVR11W1-0.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570980" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570981" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570982" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570983" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570984" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570985" version="1" comment="bind is &lt;9.6ESVR11W1-0.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570986" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570987" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570988" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570989" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570990" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570991" version="1" comment="bind is &lt;9.6ESVR11W1-0.31.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570992" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.31.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570993" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.31.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570994" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.31.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570995" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.31.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570996" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.31.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654149" version="1" comment="bind is &lt;9.6ESVR11W1-0.31.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654150" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.31.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654151" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.31.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654152" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.31.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654153" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.31.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654154" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.31.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593493" version="1" comment="binutils is &lt;2.24-0.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570997" version="1" comment="bluez is &lt;4.51-1.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570998" version="1" comment="libbluetooth3 is &lt;4.51-1.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991303" version="1" comment="boost-license is &lt;1.36.0-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991304" version="1" comment="libboost_program_options1_36_0 is &lt;1.36.0-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991305" version="1" comment="libboost_regex1_36_0 is &lt;1.36.0-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991306" version="1" comment="libboost_signals1_36_0 is &lt;1.36.0-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571003" version="1" comment="libarchive2 is &lt;2.5.5-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571004" version="1" comment="libarchive2 is &lt;2.5.5-10.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991307" version="1" comment="mono-core is &lt;2.0.1-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991308" version="1" comment="mono-data is &lt;2.0.1-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991309" version="1" comment="mono-data-postgresql is &lt;2.0.1-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991310" version="1" comment="mono-data-sqlite is &lt;2.0.1-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991311" version="1" comment="mono-locale-extras is &lt;2.0.1-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991312" version="1" comment="mono-nunit is &lt;2.0.1-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991313" version="1" comment="mono-web is &lt;2.0.1-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991314" version="1" comment="mono-winforms is &lt;2.0.1-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991315" version="1" comment="bzip2 is &lt;1.0.5-34.253.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991316" version="1" comment="bzip2-doc is &lt;1.0.5-34.253.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991317" version="1" comment="libbz2-1 is &lt;1.0.5-34.253.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991318" version="1" comment="libbz2-1-32bit is &lt;1.0.5-34.253.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571013" version="1" comment="bzip2 is &lt;1.0.5-34.256.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571014" version="1" comment="bzip2-doc is &lt;1.0.5-34.256.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571015" version="1" comment="libbz2-1 is &lt;1.0.5-34.256.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571016" version="1" comment="libbz2-1-32bit is &lt;1.0.5-34.256.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571017" version="1" comment="bzip2 is &lt;1.0.5-34.256.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571018" version="1" comment="bzip2-doc is &lt;1.0.5-34.256.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571019" version="1" comment="libbz2-1 is &lt;1.0.5-34.256.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571020" version="1" comment="libbz2-1-32bit is &lt;1.0.5-34.256.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571021" version="1" comment="cairo is &lt;1.8.8-2.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571022" version="1" comment="cairo-32bit is &lt;1.8.8-2.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571023" version="1" comment="cairo-doc is &lt;1.8.8-2.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633398" version="1" comment="cairo is &lt;1.8.8-2.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633399" version="1" comment="cairo-32bit is &lt;1.8.8-2.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633400" version="1" comment="cairo-doc is &lt;1.8.8-2.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991319" version="1" comment="cifs-mount is &lt;3.4.3-1.54.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991320" version="1" comment="ldapsmb is &lt;1.34b-11.28.54.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991321" version="1" comment="libsmbclient0 is &lt;3.4.3-1.54.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991322" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-1.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991323" version="1" comment="libtalloc1 is &lt;3.4.3-1.54.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991324" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991325" version="1" comment="libtdb1 is &lt;3.4.3-1.54.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991326" version="1" comment="libtdb1-32bit is &lt;3.4.3-1.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991327" version="1" comment="libwbclient0 is &lt;3.4.3-1.54.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991328" version="1" comment="libwbclient0-32bit is &lt;3.4.3-1.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991329" version="1" comment="samba is &lt;3.4.3-1.54.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991330" version="1" comment="samba-32bit is &lt;3.4.3-1.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991331" version="1" comment="samba-client is &lt;3.4.3-1.54.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991332" version="1" comment="samba-client-32bit is &lt;3.4.3-1.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587980" version="1" comment="samba-doc is &lt;3.4.3-1.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991333" version="1" comment="samba-krb-printing is &lt;3.4.3-1.54.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991334" version="1" comment="samba-winbind is &lt;3.4.3-1.54.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991335" version="1" comment="samba-winbind-32bit is &lt;3.4.3-1.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991336" version="1" comment="clamav is &lt;0.98.3-0.11.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571025" version="1" comment="clamav is &lt;0.99.2-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571026" version="1" comment="clamav is &lt;0.99.3-0.20.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571027" version="1" comment="clamav is &lt;0.99.4-0.20.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571028" version="1" comment="clamav is &lt;0.100.1-0.20.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571029" version="1" comment="clamav is &lt;0.100.2-0.20.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571030" version="1" comment="clamav is &lt;0.100.3-0.20.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571031" version="1" comment="clamav is &lt;0.100.3-0.20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571032" version="1" comment="clamav is &lt;0.100.3-0.20.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571033" version="1" comment="clamav is &lt;0.103.0-0.20.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571034" version="1" comment="clamav is &lt;0.103.2-0.20.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657135" version="1" comment="clamav is &lt;0.103.4-0.20.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657136" version="1" comment="clamav-openssl1 is &lt;0.103.4-0.20.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664013" version="1" comment="clamav is &lt;0.103.5-0.20.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664014" version="1" comment="clamav-openssl1 is &lt;0.103.5-0.20.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991337" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991338" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991339" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991340" version="1" comment="openldap2 is &lt;2.4.26-0.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991341" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991342" version="1" comment="openldap2-client is &lt;2.4.26-0.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991343" version="1" comment="coreutils is &lt;6.12-32.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991344" version="1" comment="coreutils-lang is &lt;6.12-32.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571035" version="1" comment="coreutils is &lt;6.12-32.41.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571036" version="1" comment="coreutils-lang is &lt;6.12-32.41.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991345" version="1" comment="cpio is &lt;2.9-75.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991346" version="1" comment="cpio-lang is &lt;2.9-75.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571037" version="1" comment="cpio is &lt;2.9-75.81.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571038" version="1" comment="cpio-lang is &lt;2.9-75.81.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630756" version="1" comment="cpio is &lt;2.9-75.81.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630757" version="1" comment="cpio-lang is &lt;2.9-75.81.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631548" version="1" comment="cpio is &lt;2.9-75.81.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631549" version="1" comment="cpio-lang is &lt;2.9-75.81.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571039" version="1" comment="cracklib is &lt;2.8.12-56.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571040" version="1" comment="cracklib-32bit is &lt;2.8.12-56.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571041" version="1" comment="cron is &lt;4.1-194.211.213.3.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571042" version="1" comment="ctags is &lt;2013.10.2-0.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991347" version="1" comment="cups is &lt;1.3.9-8.46.52.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991348" version="1" comment="cups-client is &lt;1.3.9-8.46.52.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991349" version="1" comment="cups-libs is &lt;1.3.9-8.46.52.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991350" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.52.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571048" version="1" comment="cups is &lt;1.3.9-8.46.56.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571049" version="1" comment="cups-client is &lt;1.3.9-8.46.56.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571050" version="1" comment="cups-libs is &lt;1.3.9-8.46.56.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571051" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.56.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571052" version="1" comment="cups is &lt;1.3.9-8.46.56.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571053" version="1" comment="cups-client is &lt;1.3.9-8.46.56.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571054" version="1" comment="cups-libs is &lt;1.3.9-8.46.56.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571055" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.56.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571056" version="1" comment="cups is &lt;1.3.9-8.46.56.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571057" version="1" comment="cups-client is &lt;1.3.9-8.46.56.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571058" version="1" comment="cups-libs is &lt;1.3.9-8.46.56.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571059" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.56.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571060" version="1" comment="cups is &lt;1.3.9-8.46.56.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571061" version="1" comment="cups-client is &lt;1.3.9-8.46.56.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571062" version="1" comment="cups-libs is &lt;1.3.9-8.46.56.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571063" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.56.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571064" version="1" comment="cups is &lt;1.3.9-8.46.56.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571065" version="1" comment="cups-client is &lt;1.3.9-8.46.56.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571066" version="1" comment="cups-libs is &lt;1.3.9-8.46.56.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571067" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.56.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991351" version="1" comment="curl is &lt;7.19.7-1.20.33.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991352" version="1" comment="libcurl4 is &lt;7.19.7-1.20.33.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991353" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571068" version="1" comment="curl is &lt;7.19.7-1.20.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571069" version="1" comment="libcurl4 is &lt;7.19.7-1.20.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571070" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571071" version="1" comment="curl is &lt;7.19.7-1.20.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571072" version="1" comment="libcurl4 is &lt;7.19.7-1.20.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571073" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571074" version="1" comment="curl is &lt;7.19.7-1.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571075" version="1" comment="curl-openssl1 is &lt;7.19.7-1.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571076" version="1" comment="libcurl4 is &lt;7.19.7-1.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571077" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571078" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571079" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571080" version="1" comment="curl is &lt;7.19.7-1.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571081" version="1" comment="curl-openssl1 is &lt;7.19.7-1.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571082" version="1" comment="libcurl4 is &lt;7.19.7-1.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571083" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571084" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571085" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571086" version="1" comment="curl is &lt;7.19.7-1.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571087" version="1" comment="curl-openssl1 is &lt;7.19.7-1.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571088" version="1" comment="libcurl4 is &lt;7.19.7-1.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571089" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571090" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571091" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571092" version="1" comment="curl is &lt;7.19.7-1.70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571093" version="1" comment="curl-openssl1 is &lt;7.19.7-1.70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571094" version="1" comment="libcurl4 is &lt;7.19.7-1.70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571095" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571096" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571097" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571098" version="1" comment="curl is &lt;7.19.7-1.70.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571099" version="1" comment="curl-openssl1 is &lt;7.19.7-1.70.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571100" version="1" comment="libcurl4 is &lt;7.19.7-1.70.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571101" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.70.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571102" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.70.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571103" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.70.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571104" version="1" comment="curl is &lt;7.19.7-1.70.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571105" version="1" comment="curl-openssl1 is &lt;7.19.7-1.70.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571106" version="1" comment="libcurl4 is &lt;7.19.7-1.70.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571107" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.70.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571108" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.70.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571109" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.70.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571110" version="1" comment="curl is &lt;7.37.0-70.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571111" version="1" comment="curl-openssl1 is &lt;7.37.0-70.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571112" version="1" comment="libcurl4 is &lt;7.37.0-70.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571113" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571114" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571115" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571116" version="1" comment="curl is &lt;7.37.0-70.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571117" version="1" comment="curl-openssl1 is &lt;7.37.0-70.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571118" version="1" comment="libcurl4 is &lt;7.37.0-70.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571119" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571120" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571121" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571122" version="1" comment="curl is &lt;7.37.0-70.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571123" version="1" comment="curl-openssl1 is &lt;7.37.0-70.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571124" version="1" comment="libcurl4 is &lt;7.37.0-70.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571125" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571126" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571127" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571128" version="1" comment="curl is &lt;7.37.0-70.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571129" version="1" comment="curl-openssl1 is &lt;7.37.0-70.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571130" version="1" comment="libcurl4 is &lt;7.37.0-70.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571131" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571132" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571133" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571134" version="1" comment="curl is &lt;7.37.0-70.41.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571135" version="1" comment="curl-openssl1 is &lt;7.37.0-70.41.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571136" version="1" comment="libcurl4 is &lt;7.37.0-70.41.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571137" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.41.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571138" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.41.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571139" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.41.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571140" version="1" comment="curl is &lt;7.37.0-70.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571141" version="1" comment="curl-openssl1 is &lt;7.37.0-70.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571142" version="1" comment="libcurl4 is &lt;7.37.0-70.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571143" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571144" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571145" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571146" version="1" comment="curl is &lt;7.37.0-70.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571147" version="1" comment="curl-openssl1 is &lt;7.37.0-70.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571148" version="1" comment="libcurl4 is &lt;7.37.0-70.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571149" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571150" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571151" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571152" version="1" comment="curl is &lt;7.37.0-70.52.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571153" version="1" comment="curl-openssl1 is &lt;7.37.0-70.52.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571154" version="1" comment="libcurl4 is &lt;7.37.0-70.52.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571155" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.52.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571156" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.52.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571157" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.52.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571158" version="1" comment="curl is &lt;7.37.0-70.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571159" version="1" comment="curl-openssl1 is &lt;7.37.0-70.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571160" version="1" comment="libcurl4 is &lt;7.37.0-70.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571161" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571162" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571163" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571164" version="1" comment="curl is &lt;7.37.0-70.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571165" version="1" comment="curl-openssl1 is &lt;7.37.0-70.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571166" version="1" comment="libcurl4 is &lt;7.37.0-70.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571167" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571168" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571169" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571170" version="1" comment="curl is &lt;7.37.0-70.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571171" version="1" comment="curl-openssl1 is &lt;7.37.0-70.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571172" version="1" comment="libcurl4 is &lt;7.37.0-70.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571173" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571174" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571175" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571176" version="1" comment="curl is &lt;7.37.0-70.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571177" version="1" comment="curl-openssl1 is &lt;7.37.0-70.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571178" version="1" comment="libcurl4 is &lt;7.37.0-70.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571179" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571180" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571181" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626169" version="1" comment="curl is &lt;7.37.0-70.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626170" version="1" comment="curl-openssl1 is &lt;7.37.0-70.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626171" version="1" comment="libcurl4 is &lt;7.37.0-70.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626172" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626173" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626174" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633950" version="1" comment="curl is &lt;7.37.0-70.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633951" version="1" comment="curl-openssl1 is &lt;7.37.0-70.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633952" version="1" comment="libcurl4 is &lt;7.37.0-70.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633953" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633954" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633955" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991354" version="1" comment="cvs is &lt;1.12.12-144.23.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991355" version="1" comment="cvs-doc is &lt;1.12.12-144.23.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571184" version="1" comment="cvs is &lt;1.12.12-144.23.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571185" version="1" comment="cvs-doc is &lt;1.12.12-144.23.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991356" version="1" comment="cyrus-imapd is &lt;2.3.11-60.65.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991357" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.65.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991358" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.65.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571189" version="1" comment="cyrus-imapd is &lt;2.3.11-60.65.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571190" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.65.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571191" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.65.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571192" version="1" comment="cyrus-imapd is &lt;2.3.11-60.65.71.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571193" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.65.71.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571194" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.65.71.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632634" version="1" comment="cyrus-imapd is &lt;2.3.11-60.65.71.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632635" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.65.71.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632636" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.65.71.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571195" version="1" comment="cyrus-sasl-openssl1 is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571196" version="1" comment="cyrus-sasl-openssl1-32bit is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571197" version="1" comment="cyrus-sasl-openssl1-crammd5 is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571198" version="1" comment="cyrus-sasl-openssl1-crammd5-32bit is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571199" version="1" comment="cyrus-sasl-openssl1-digestmd5 is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571200" version="1" comment="cyrus-sasl-openssl1-digestmd5-32bit is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571201" version="1" comment="cyrus-sasl-openssl1-gssapi is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571202" version="1" comment="cyrus-sasl-openssl1-gssapi-32bit is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571203" version="1" comment="cyrus-sasl-openssl1-ntlm is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571204" version="1" comment="cyrus-sasl-openssl1-otp is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571205" version="1" comment="cyrus-sasl-openssl1-otp-32bit is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571206" version="1" comment="cyrus-sasl-openssl1-plain is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571207" version="1" comment="cyrus-sasl-openssl1-plain-32bit is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571208" version="1" comment="cyrus-sasl is &lt;2.1.22-182.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571209" version="1" comment="cyrus-sasl-32bit is &lt;2.1.22-182.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571210" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.22-182.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571211" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.22-182.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571212" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.22-182.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571213" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.22-182.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571214" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.22-182.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571215" version="1" comment="cyrus-sasl-otp is &lt;2.1.22-182.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571216" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.22-182.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571217" version="1" comment="cyrus-sasl-plain is &lt;2.1.22-182.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571218" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.22-182.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669459" version="1" comment="cyrus-sasl is &lt;2.1.22-182.20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669460" version="1" comment="cyrus-sasl-32bit is &lt;2.1.22-182.20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669461" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.22-182.20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669462" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.22-182.20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669463" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.22-182.20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669464" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.22-182.20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669465" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.22-182.20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669466" version="1" comment="cyrus-sasl-otp is &lt;2.1.22-182.20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669467" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.22-182.20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669468" version="1" comment="cyrus-sasl-plain is &lt;2.1.22-182.20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669469" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.22-182.20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669470" version="1" comment="cyrus-sasl-openssl1 is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669471" version="1" comment="cyrus-sasl-openssl1-32bit is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669472" version="1" comment="cyrus-sasl-openssl1-crammd5 is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669473" version="1" comment="cyrus-sasl-openssl1-crammd5-32bit is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669474" version="1" comment="cyrus-sasl-openssl1-digestmd5 is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669475" version="1" comment="cyrus-sasl-openssl1-digestmd5-32bit is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669476" version="1" comment="cyrus-sasl-openssl1-gssapi is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669477" version="1" comment="cyrus-sasl-openssl1-gssapi-32bit is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669478" version="1" comment="cyrus-sasl-openssl1-ntlm is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669479" version="1" comment="cyrus-sasl-openssl1-otp is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669480" version="1" comment="cyrus-sasl-openssl1-otp-32bit is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669481" version="1" comment="cyrus-sasl-openssl1-plain is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669482" version="1" comment="cyrus-sasl-openssl1-plain-32bit is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991359" version="1" comment="dbus-1 is &lt;1.2.10-3.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991360" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991361" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571219" version="1" comment="dbus-1 is &lt;1.2.10-3.34.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571220" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.34.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571221" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.34.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991362" version="1" comment="dbus-1-glib is &lt;0.76-34.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991363" version="1" comment="dbus-1-glib-32bit is &lt;0.76-34.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991364" version="1" comment="dhcp is &lt;3.1.3.ESV-0.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991365" version="1" comment="dhcp-client is &lt;3.1.3.ESV-0.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991366" version="1" comment="dhcp-relay is &lt;3.1.3.ESV-0.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991367" version="1" comment="dhcp-server is &lt;3.1.3.ESV-0.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571226" version="1" comment="dhcp is &lt;3.1.3.ESV-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571227" version="1" comment="dhcp-client is &lt;3.1.3.ESV-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571228" version="1" comment="dhcp-relay is &lt;3.1.3.ESV-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571229" version="1" comment="dhcp-server is &lt;3.1.3.ESV-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571230" version="1" comment="dhcp is &lt;3.1.3.ESV-0.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571231" version="1" comment="dhcp-client is &lt;3.1.3.ESV-0.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571232" version="1" comment="dhcp-relay is &lt;3.1.3.ESV-0.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571233" version="1" comment="dhcp-server is &lt;3.1.3.ESV-0.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571234" version="1" comment="dhcp is &lt;3.1.3.ESV-0.23.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571235" version="1" comment="dhcp-client is &lt;3.1.3.ESV-0.23.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571236" version="1" comment="dhcp-relay is &lt;3.1.3.ESV-0.23.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571237" version="1" comment="dhcp-server is &lt;3.1.3.ESV-0.23.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991368" version="1" comment="dhcpcd is &lt;3.2.3-44.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571239" version="1" comment="dhcpcd is &lt;3.2.3-45.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991369" version="1" comment="dhcpv6 is &lt;1.0.22-3.21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571241" version="1" comment="libdjvulibre21 is &lt;3.5.21-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571242" version="1" comment="libdjvulibre21 is &lt;3.5.21-3.6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571243" version="1" comment="libdjvulibre21 is &lt;3.5.21-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571244" version="1" comment="libdjvulibre21 is &lt;3.5.21-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624088" version="1" comment="libdjvulibre21 is &lt;3.5.21-3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627836" version="1" comment="libdjvulibre21 is &lt;3.5.21-3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571245" version="1" comment="dnsmasq is &lt;2.45-12.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571246" version="1" comment="dnsmasq is &lt;2.45-12.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571247" version="1" comment="e2fsprogs is &lt;1.41.9-2.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571248" version="1" comment="libblkid1 is &lt;2.16-6.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571249" version="1" comment="libcom_err2 is &lt;1.41.9-2.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571250" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571251" version="1" comment="libext2fs2 is &lt;1.41.9-2.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571252" version="1" comment="libuuid1 is &lt;2.16-6.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571253" version="1" comment="libuuid1-32bit is &lt;2.16-6.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571254" version="1" comment="uuid-runtime is &lt;2.16-6.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571255" version="1" comment="e2fsprogs is &lt;1.41.9-2.6.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571256" version="1" comment="libcom_err2 is &lt;1.41.9-2.6.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571257" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.6.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571258" version="1" comment="libext2fs2 is &lt;1.41.9-2.6.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991370" version="1" comment="ecryptfs-utils is &lt;61-1.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991371" version="1" comment="ecryptfs-utils-32bit is &lt;61-1.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571262" version="1" comment="ecryptfs-utils is &lt;61-1.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566408" version="1" comment="ecryptfs-utils-32bit is &lt;61-1.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991372" version="1" comment="ed is &lt;0.2-1001.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571264" version="1" comment="ed is &lt;0.2-1001.30.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009430164" version="1" comment="elfutils is &lt;0.137-8.24.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009099347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009430165" version="1" comment="libasm1 is &lt;0.137-8.24.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009099347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009430166" version="1" comment="libasm1-32bit is &lt;0.137-8.24.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009099347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009430167" version="1" comment="libdw1 is &lt;0.137-8.24.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009099347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009430168" version="1" comment="libdw1-32bit is &lt;0.137-8.24.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009099347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009430169" version="1" comment="libebl1 is &lt;0.137-8.24.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009099347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009430170" version="1" comment="libebl1-32bit is &lt;0.137-8.24.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009099347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009430171" version="1" comment="libelf1 is &lt;0.137-8.24.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009099347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009430172" version="1" comment="libelf1-32bit is &lt;0.137-8.24.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009099347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571265" version="1" comment="elfutils is &lt;0.137-8.24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571266" version="1" comment="libasm1 is &lt;0.137-8.24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571267" version="1" comment="libasm1-32bit is &lt;0.137-8.24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571268" version="1" comment="libdw1 is &lt;0.137-8.24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571269" version="1" comment="libdw1-32bit is &lt;0.137-8.24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571270" version="1" comment="libebl1 is &lt;0.137-8.24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571271" version="1" comment="libebl1-32bit is &lt;0.137-8.24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571272" version="1" comment="libelf1 is &lt;0.137-8.24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571273" version="1" comment="libelf1-32bit is &lt;0.137-8.24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991373" version="1" comment="emacs is &lt;22.3-4.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991374" version="1" comment="emacs-el is &lt;22.3-4.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991375" version="1" comment="emacs-info is &lt;22.3-4.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991376" version="1" comment="emacs-nox is &lt;22.3-4.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991377" version="1" comment="emacs-x11 is &lt;22.3-4.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571274" version="1" comment="emacs is &lt;22.3-42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571275" version="1" comment="emacs-el is &lt;22.3-42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571276" version="1" comment="emacs-info is &lt;22.3-42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571277" version="1" comment="emacs-nox is &lt;22.3-42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571278" version="1" comment="emacs-x11 is &lt;22.3-42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991378" version="1" comment="evince is &lt;2.28.2-0.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991379" version="1" comment="evince-doc is &lt;2.28.2-0.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991380" version="1" comment="evince-lang is &lt;2.28.2-0.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571282" version="1" comment="evince is &lt;2.28.2-0.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571283" version="1" comment="evince-doc is &lt;2.28.2-0.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571284" version="1" comment="evince-lang is &lt;2.28.2-0.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571285" version="1" comment="evince is &lt;2.28.2-0.7.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571286" version="1" comment="evince-doc is &lt;2.28.2-0.7.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571287" version="1" comment="evince-lang is &lt;2.28.2-0.7.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571288" version="1" comment="libexempi3 is &lt;2.0.2-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991381" version="1" comment="expat is &lt;2.0.1-88.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991382" version="1" comment="libexpat1 is &lt;2.0.1-88.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991383" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571293" version="1" comment="expat is &lt;2.0.1-88.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571294" version="1" comment="libexpat1 is &lt;2.0.1-88.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571295" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571296" version="1" comment="expat is &lt;2.0.1-88.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571297" version="1" comment="libexpat1 is &lt;2.0.1-88.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571298" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571299" version="1" comment="expat is &lt;2.0.1-88.42.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571300" version="1" comment="libexpat1 is &lt;2.0.1-88.42.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571301" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571302" version="1" comment="expat is &lt;2.0.1-88.42.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571303" version="1" comment="libexpat1 is &lt;2.0.1-88.42.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571304" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571305" version="1" comment="expat is &lt;2.0.1-88.42.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571306" version="1" comment="libexpat1 is &lt;2.0.1-88.42.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571307" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664120" version="1" comment="expat is &lt;2.0.1-88.42.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664121" version="1" comment="libexpat1 is &lt;2.0.1-88.42.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664122" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666458" version="1" comment="expat is &lt;2.0.1-88.42.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666459" version="1" comment="libexpat1 is &lt;2.0.1-88.42.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666460" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669483" version="1" comment="expat is &lt;2.0.1-88.42.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669484" version="1" comment="libexpat1 is &lt;2.0.1-88.42.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669485" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671290" version="1" comment="expat is &lt;2.0.1-88.42.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671291" version="1" comment="libexpat1 is &lt;2.0.1-88.42.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671292" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571308" version="1" comment="facter is &lt;1.6.18-0.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571309" version="1" comment="fastjar is &lt;0.95-1.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991384" version="1" comment="fetchmail is &lt;6.3.8.90-13.20.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991385" version="1" comment="fetchmailconf is &lt;6.3.8.90-13.20.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571310" version="1" comment="fetchmail is &lt;6.3.8.90-13.20.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571311" version="1" comment="fetchmailconf is &lt;6.3.8.90-13.20.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627042" version="1" comment="fetchmail is &lt;6.3.8.90-13.20.22.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627043" version="1" comment="fetchmailconf is &lt;6.3.8.90-13.20.22.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991386" version="1" comment="file is &lt;4.24-43.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566423" version="1" comment="file-32bit is &lt;4.24-43.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571312" version="1" comment="file-roller is &lt;2.28.2-0.3.3.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571313" version="1" comment="file-roller-lang is &lt;2.28.2-0.3.3.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991387" version="1" comment="MozillaFirefox is &lt;10.0-0.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991388" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.7.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991389" version="1" comment="MozillaFirefox-translations is &lt;10.0-0.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991390" version="1" comment="mozilla-kde4-integration is &lt;0.6.3-5.6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991391" version="1" comment="MozillaFirefox is &lt;10.0.4-0.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991392" version="1" comment="MozillaFirefox-translations is &lt;10.0.4-0.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991393" version="1" comment="libfreebl3 is &lt;3.13.4-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991394" version="1" comment="libfreebl3-32bit is &lt;3.13.4-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991395" version="1" comment="mozilla-nss is &lt;3.13.4-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991396" version="1" comment="mozilla-nss-32bit is &lt;3.13.4-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991397" version="1" comment="mozilla-nss-tools is &lt;3.13.4-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991398" version="1" comment="MozillaFirefox is &lt;10.0.6-0.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991399" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.7.70 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991400" version="1" comment="MozillaFirefox-translations is &lt;10.0.6-0.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571330" version="1" comment="MozillaFirefox is &lt;10.0.7-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571331" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.7.79 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571332" version="1" comment="MozillaFirefox-translations is &lt;10.0.7-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571333" version="1" comment="libfreebl3 is &lt;3.13.6-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565923" version="1" comment="libfreebl3-32bit is &lt;3.13.6-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571334" version="1" comment="mozilla-nspr is &lt;4.9.2-0.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565925" version="1" comment="mozilla-nspr-32bit is &lt;4.9.2-0.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571335" version="1" comment="mozilla-nss is &lt;3.13.6-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565927" version="1" comment="mozilla-nss-32bit is &lt;3.13.6-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571336" version="1" comment="mozilla-nss-tools is &lt;3.13.6-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571337" version="1" comment="MozillaFirefox is &lt;10.0.9-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571338" version="1" comment="MozillaFirefox-translations is &lt;10.0.9-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571339" version="1" comment="MozillaFirefox is &lt;10.0.10-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571340" version="1" comment="MozillaFirefox-translations is &lt;10.0.10-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571341" version="1" comment="mozilla-nspr is &lt;4.9.3-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565935" version="1" comment="mozilla-nspr-32bit is &lt;4.9.3-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571342" version="1" comment="MozillaFirefox is &lt;10.0.11-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571343" version="1" comment="MozillaFirefox-translations is &lt;10.0.11-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571344" version="1" comment="libfreebl3 is &lt;3.14-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565939" version="1" comment="libfreebl3-32bit is &lt;3.14-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571345" version="1" comment="mozilla-nss is &lt;3.14-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565941" version="1" comment="mozilla-nss-32bit is &lt;3.14-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571346" version="1" comment="mozilla-nss-tools is &lt;3.14-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571347" version="1" comment="MozillaFirefox is &lt;10.0.12-0.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571348" version="1" comment="MozillaFirefox-translations is &lt;10.0.12-0.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571349" version="1" comment="libfreebl3 is &lt;3.14.1-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565946" version="1" comment="libfreebl3-32bit is &lt;3.14.1-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571350" version="1" comment="mozilla-nspr is &lt;4.9.4-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565948" version="1" comment="mozilla-nspr-32bit is &lt;4.9.4-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571351" version="1" comment="mozilla-nss is &lt;3.14.1-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565950" version="1" comment="mozilla-nss-32bit is &lt;3.14.1-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571352" version="1" comment="mozilla-nss-tools is &lt;3.14.1-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590759" version="1" comment="MozillaFirefox is &lt;17.0.3esr-0.4.2.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590760" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590761" version="1" comment="MozillaFirefox-translations is &lt;17.0.3esr-0.4.2.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571356" version="1" comment="libfreebl3 is &lt;3.14.1-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571357" version="1" comment="libfreebl3-32bit is &lt;3.14.1-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590762" version="1" comment="mozilla-nspr is &lt;4.9.5-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590325" version="1" comment="mozilla-nspr-32bit is &lt;4.9.5-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590763" version="1" comment="mozilla-nss is &lt;3.14.2-0.4.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590326" version="1" comment="mozilla-nss-32bit is &lt;3.14.2-0.4.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590764" version="1" comment="mozilla-nss-tools is &lt;3.14.2-0.4.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571363" version="1" comment="MozillaFirefox is &lt;17.0.4esr-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571364" version="1" comment="MozillaFirefox-translations is &lt;17.0.4esr-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571365" version="1" comment="MozillaFirefox is &lt;17.0.5esr-0.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571366" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571367" version="1" comment="MozillaFirefox-translations is &lt;17.0.5esr-0.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571368" version="1" comment="libfreebl3 is &lt;3.14.3-0.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565972" version="1" comment="libfreebl3-32bit is &lt;3.14.3-0.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571369" version="1" comment="mozilla-nspr is &lt;4.9.6-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565974" version="1" comment="mozilla-nspr-32bit is &lt;4.9.6-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571370" version="1" comment="mozilla-nss is &lt;3.14.3-0.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565976" version="1" comment="mozilla-nss-32bit is &lt;3.14.3-0.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571371" version="1" comment="mozilla-nss-tools is &lt;3.14.3-0.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571372" version="1" comment="MozillaFirefox is &lt;17.0.6esr-0.4.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571373" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.20 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571374" version="1" comment="MozillaFirefox-translations is &lt;17.0.6esr-0.4.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571375" version="1" comment="libfreebl3 is &lt;3.14.3-0.4.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571376" version="1" comment="libfreebl3-32bit is &lt;3.14.3-0.4.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571377" version="1" comment="mozilla-nspr is &lt;4.9.6-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571378" version="1" comment="mozilla-nspr-32bit is &lt;4.9.6-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571379" version="1" comment="mozilla-nss is &lt;3.14.3-0.4.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571380" version="1" comment="mozilla-nss-32bit is &lt;3.14.3-0.4.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571381" version="1" comment="mozilla-nss-tools is &lt;3.14.3-0.4.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571382" version="1" comment="MozillaFirefox is &lt;17.0.7esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571383" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.31 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571384" version="1" comment="MozillaFirefox-translations is &lt;17.0.7esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571385" version="1" comment="MozillaFirefox is &lt;17.0.10esr-0.4.2.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571386" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.60 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571387" version="1" comment="MozillaFirefox-translations is &lt;17.0.10esr-0.4.2.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592823" version="1" comment="MozillaFirefox is &lt;24.3.0esr-0.4.2.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592824" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.4.10.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592825" version="1" comment="MozillaFirefox-translations is &lt;24.3.0esr-0.4.2.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571391" version="1" comment="firefox-libgcc_s1 is &lt;4.7.2_20130108-0.16.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571392" version="1" comment="firefox-libstdc++6 is &lt;4.7.2_20130108-0.16.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571393" version="1" comment="libfreebl3 is &lt;3.15.4-0.4.2.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571394" version="1" comment="libfreebl3-32bit is &lt;3.15.4-0.4.2.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571395" version="1" comment="mozilla-nspr is &lt;4.10.2-0.3.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571396" version="1" comment="mozilla-nspr-32bit is &lt;4.10.2-0.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571397" version="1" comment="mozilla-nss is &lt;3.15.4-0.4.2.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571398" version="1" comment="mozilla-nss-32bit is &lt;3.15.4-0.4.2.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571399" version="1" comment="mozilla-nss-tools is &lt;3.15.4-0.4.2.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571400" version="1" comment="MozillaFirefox is &lt;24.4.0esr-0.5.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571401" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.4.10.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571402" version="1" comment="MozillaFirefox-translations is &lt;24.4.0esr-0.5.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571403" version="1" comment="mozilla-nspr is &lt;4.10.4-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566332" version="1" comment="mozilla-nspr-32bit is &lt;4.10.4-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571404" version="1" comment="MozillaFirefox is &lt;24.7.0esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571405" version="1" comment="MozillaFirefox-translations is &lt;24.7.0esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571406" version="1" comment="libfreebl3 is &lt;3.16.2-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571407" version="1" comment="libfreebl3-32bit is &lt;3.16.2-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571408" version="1" comment="mozilla-nss is &lt;3.16.2-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571409" version="1" comment="mozilla-nss-32bit is &lt;3.16.2-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571410" version="1" comment="mozilla-nss-tools is &lt;3.16.2-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571411" version="1" comment="MozillaFirefox is &lt;24.8.0esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571412" version="1" comment="MozillaFirefox-translations is &lt;24.8.0esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571413" version="1" comment="libfreebl3 is &lt;3.16.4-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571414" version="1" comment="libfreebl3-32bit is &lt;3.16.4-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571415" version="1" comment="mozilla-nspr is &lt;4.10.7-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571416" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571417" version="1" comment="mozilla-nss is &lt;3.16.4-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571418" version="1" comment="mozilla-nss-32bit is &lt;3.16.4-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571419" version="1" comment="mozilla-nss-tools is &lt;3.16.4-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571420" version="1" comment="MozillaFirefox is &lt;31.3.0esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571421" version="1" comment="MozillaFirefox-translations is &lt;31.3.0esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571422" version="1" comment="MozillaFirefox is &lt;31.4.0esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571423" version="1" comment="MozillaFirefox-translations is &lt;31.4.0esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571424" version="1" comment="libfreebl3 is &lt;3.17.3-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571425" version="1" comment="libfreebl3-32bit is &lt;3.17.3-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571426" version="1" comment="mozilla-nss is &lt;3.17.3-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571427" version="1" comment="mozilla-nss-32bit is &lt;3.17.3-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571428" version="1" comment="mozilla-nss-tools is &lt;3.17.3-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571429" version="1" comment="MozillaFirefox is &lt;31.5.3esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571430" version="1" comment="MozillaFirefox-translations is &lt;31.5.3esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571431" version="1" comment="MozillaFirefox is &lt;31.7.0esr-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571432" version="1" comment="MozillaFirefox-translations is &lt;31.7.0esr-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571433" version="1" comment="MozillaFirefox is &lt;38.2.1esr-17.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571434" version="1" comment="MozillaFirefox-translations is &lt;38.2.1esr-17.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571435" version="1" comment="MozillaFirefox is &lt;38.3.0esr-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571436" version="1" comment="MozillaFirefox-translations is &lt;38.3.0esr-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571437" version="1" comment="mozilla-nspr is &lt;4.10.9-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566485" version="1" comment="mozilla-nspr-32bit is &lt;4.10.9-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571438" version="1" comment="MozillaFirefox is &lt;38.4.0esr-25.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571439" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-12.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571440" version="1" comment="MozillaFirefox-translations is &lt;38.4.0esr-25.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571441" version="1" comment="libfreebl3 is &lt;3.19.2.1-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571442" version="1" comment="libfreebl3-32bit is &lt;3.19.2.1-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571443" version="1" comment="mozilla-nspr is &lt;4.10.10-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566496" version="1" comment="mozilla-nspr-32bit is &lt;4.10.10-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571444" version="1" comment="mozilla-nss is &lt;3.19.2.1-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571445" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.1-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571446" version="1" comment="mozilla-nss-tools is &lt;3.19.2.1-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571447" version="1" comment="MozillaFirefox is &lt;38.7.0esr-36.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571448" version="1" comment="MozillaFirefox-translations is &lt;38.7.0esr-36.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571449" version="1" comment="libfreebl3 is &lt;3.20.2-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571450" version="1" comment="libfreebl3-32bit is &lt;3.20.2-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571451" version="1" comment="mozilla-nspr is &lt;4.12-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571452" version="1" comment="mozilla-nspr-32bit is &lt;4.12-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571453" version="1" comment="mozilla-nss is &lt;3.20.2-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571454" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571455" version="1" comment="mozilla-nss-tools is &lt;3.20.2-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571456" version="1" comment="MozillaFirefox is &lt;52.4.0esr-78.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571457" version="1" comment="MozillaFirefox-translations is &lt;52.4.0esr-78.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571458" version="1" comment="libfreebl3 is &lt;3.29.5-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571459" version="1" comment="libfreebl3-32bit is &lt;3.29.5-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571460" version="1" comment="mozilla-nss is &lt;3.29.5-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571461" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571462" version="1" comment="mozilla-nss-tools is &lt;3.29.5-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571463" version="1" comment="MozillaFirefox is &lt;60.9.0esr-78.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571464" version="1" comment="MozillaFirefox-translations-common is &lt;60.9.0esr-78.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571465" version="1" comment="MozillaFirefox-translations-other is &lt;60.9.0esr-78.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571466" version="1" comment="firefox-gio-branding-upstream is &lt;2.54.3-2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571467" version="1" comment="firefox-glib2-lang is &lt;2.54.3-2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571468" version="1" comment="firefox-glib2-tools is &lt;2.54.3-2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571469" version="1" comment="firefox-gtk3-branding-upstream is &lt;3.10.9-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571470" version="1" comment="firefox-gtk3-data is &lt;3.10.9-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571471" version="1" comment="firefox-gtk3-immodule-amharic is &lt;3.10.9-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571472" version="1" comment="firefox-gtk3-immodule-inuktitut is &lt;3.10.9-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571473" version="1" comment="firefox-gtk3-immodule-multipress is &lt;3.10.9-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571474" version="1" comment="firefox-gtk3-immodule-thai is &lt;3.10.9-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571475" version="1" comment="firefox-gtk3-immodule-vietnamese is &lt;3.10.9-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571476" version="1" comment="firefox-gtk3-immodule-xim is &lt;3.10.9-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571477" version="1" comment="firefox-gtk3-immodules-tigrigna is &lt;3.10.9-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571478" version="1" comment="firefox-gtk3-lang is &lt;3.10.9-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571479" version="1" comment="firefox-gtk3-tools is &lt;3.10.9-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571480" version="1" comment="firefox-libgtk-3-0 is &lt;3.10.9-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571481" version="1" comment="libfirefox-gio-2_0-0 is &lt;2.54.3-2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571482" version="1" comment="libfirefox-glib-2_0-0 is &lt;2.54.3-2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571483" version="1" comment="libfirefox-gmodule-2_0-0 is &lt;2.54.3-2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571484" version="1" comment="libfirefox-gobject-2_0-0 is &lt;2.54.3-2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571485" version="1" comment="libfirefox-gthread-2_0-0 is &lt;2.54.3-2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571486" version="1" comment="MozillaFirefox is &lt;68.2.0-78.51.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571487" version="1" comment="MozillaFirefox-branding-SLED is &lt;68-21.9.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571488" version="1" comment="MozillaFirefox-translations-common is &lt;68.2.0-78.51.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571489" version="1" comment="MozillaFirefox-translations-other is &lt;68.2.0-78.51.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571490" version="1" comment="firefox-atk-lang is &lt;2.26.1-2.8.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571491" version="1" comment="firefox-gdk-pixbuf-lang is &lt;2.36.11-2.8.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571492" version="1" comment="firefox-gdk-pixbuf-query-loaders is &lt;2.36.11-2.8.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571493" version="1" comment="firefox-gdk-pixbuf-thumbnailer is &lt;2.36.11-2.8.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571494" version="1" comment="firefox-gio-branding-upstream is &lt;2.54.3-2.14.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571495" version="1" comment="firefox-glib2-lang is &lt;2.54.3-2.14.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571496" version="1" comment="firefox-glib2-tools is &lt;2.54.3-2.14.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571497" version="1" comment="firefox-gtk3-branding-upstream is &lt;3.10.9-2.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571498" version="1" comment="firefox-gtk3-data is &lt;3.10.9-2.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571499" version="1" comment="firefox-gtk3-immodule-amharic is &lt;3.10.9-2.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571500" version="1" comment="firefox-gtk3-immodule-inuktitut is &lt;3.10.9-2.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571501" version="1" comment="firefox-gtk3-immodule-multipress is &lt;3.10.9-2.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571502" version="1" comment="firefox-gtk3-immodule-thai is &lt;3.10.9-2.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571503" version="1" comment="firefox-gtk3-immodule-vietnamese is &lt;3.10.9-2.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571504" version="1" comment="firefox-gtk3-immodule-xim is &lt;3.10.9-2.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571505" version="1" comment="firefox-gtk3-immodules-tigrigna is &lt;3.10.9-2.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571506" version="1" comment="firefox-gtk3-lang is &lt;3.10.9-2.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571507" version="1" comment="firefox-gtk3-tools is &lt;3.10.9-2.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571508" version="1" comment="firefox-libatk-1_0-0 is &lt;2.26.1-2.8.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571509" version="1" comment="firefox-libcairo-gobject2 is &lt;1.15.10-2.13.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571510" version="1" comment="firefox-libcairo2 is &lt;1.15.10-2.13.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571511" version="1" comment="firefox-libffi4 is &lt;5.3.1+r233831-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571512" version="1" comment="firefox-libffi7 is &lt;3.2.1.git259-2.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571513" version="1" comment="firefox-libgdk_pixbuf-2_0-0 is &lt;2.36.11-2.8.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571514" version="1" comment="firefox-libgtk-3-0 is &lt;3.10.9-2.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571515" version="1" comment="firefox-libharfbuzz0 is &lt;1.7.5-2.7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571516" version="1" comment="firefox-libpango-1_0-0 is &lt;1.40.14-2.7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571517" version="1" comment="libfirefox-gio-2_0-0 is &lt;2.54.3-2.14.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571518" version="1" comment="libfirefox-glib-2_0-0 is &lt;2.54.3-2.14.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571519" version="1" comment="libfirefox-gmodule-2_0-0 is &lt;2.54.3-2.14.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571520" version="1" comment="libfirefox-gobject-2_0-0 is &lt;2.54.3-2.14.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571521" version="1" comment="libfirefox-gthread-2_0-0 is &lt;2.54.3-2.14.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571522" version="1" comment="libfreebl3 is &lt;3.45-38.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571523" version="1" comment="libfreebl3-32bit is &lt;3.45-38.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571524" version="1" comment="libsoftokn3 is &lt;3.45-38.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571525" version="1" comment="libsoftokn3-32bit is &lt;3.45-38.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571526" version="1" comment="mozilla-nspr is &lt;4.21-29.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571527" version="1" comment="mozilla-nspr-32bit is &lt;4.21-29.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571528" version="1" comment="mozilla-nss is &lt;3.45-38.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571529" version="1" comment="mozilla-nss-32bit is &lt;3.45-38.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571530" version="1" comment="mozilla-nss-certs is &lt;3.45-38.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571531" version="1" comment="mozilla-nss-certs-32bit is &lt;3.45-38.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571532" version="1" comment="mozilla-nss-tools is &lt;3.45-38.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571533" version="1" comment="MozillaFirefox is &lt;60.7.0esr-78.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571534" version="1" comment="MozillaFirefox-branding-SLED is &lt;60-21.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571535" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.0esr-78.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571536" version="1" comment="MozillaFirefox-translations-other is &lt;60.7.0esr-78.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571537" version="1" comment="firefox-at-spi2-core is &lt;2.10.2-2.6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571538" version="1" comment="firefox-at-spi2-core-lang is &lt;2.10.2-2.6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571539" version="1" comment="firefox-atk-lang is &lt;2.26.1-2.5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571540" version="1" comment="firefox-dbus-1-glib is &lt;0.76-34.2.4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571541" version="1" comment="firefox-gdk-pixbuf-lang is &lt;2.36.11-2.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571542" version="1" comment="firefox-gdk-pixbuf-query-loaders is &lt;2.36.11-2.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571543" version="1" comment="firefox-gdk-pixbuf-thumbnailer is &lt;2.36.11-2.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571544" version="1" comment="firefox-gio-branding-upstream is &lt;2.54.3-2.4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571545" version="1" comment="firefox-glib2-lang is &lt;2.54.3-2.4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571546" version="1" comment="firefox-glib2-tools is &lt;2.54.3-2.4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571547" version="1" comment="firefox-gtk3-branding-upstream is &lt;3.10.9-2.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571548" version="1" comment="firefox-gtk3-data is &lt;3.10.9-2.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571549" version="1" comment="firefox-gtk3-immodule-amharic is &lt;3.10.9-2.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571550" version="1" comment="firefox-gtk3-immodule-inuktitut is &lt;3.10.9-2.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571551" version="1" comment="firefox-gtk3-immodule-multipress is &lt;3.10.9-2.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571552" version="1" comment="firefox-gtk3-immodule-thai is &lt;3.10.9-2.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571553" version="1" comment="firefox-gtk3-immodule-vietnamese is &lt;3.10.9-2.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571554" version="1" comment="firefox-gtk3-immodule-xim is &lt;3.10.9-2.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571555" version="1" comment="firefox-gtk3-immodules-tigrigna is &lt;3.10.9-2.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571556" version="1" comment="firefox-gtk3-lang is &lt;3.10.9-2.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571557" version="1" comment="firefox-gtk3-tools is &lt;3.10.9-2.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571558" version="1" comment="firefox-libatk-1_0-0 is &lt;2.26.1-2.5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571559" version="1" comment="firefox-libatk-bridge-2_0-0 is &lt;2.10.2-2.6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571560" version="1" comment="firefox-libatspi0 is &lt;2.10.2-2.6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571561" version="1" comment="firefox-libcairo-gobject2 is &lt;1.15.10-2.8.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571562" version="1" comment="firefox-libcairo2 is &lt;1.15.10-2.8.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571563" version="1" comment="firefox-libfreetype6 is &lt;2.9-2.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571564" version="1" comment="firefox-libgdk_pixbuf-2_0-0 is &lt;2.36.11-2.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571565" version="1" comment="firefox-libgtk-3-0 is &lt;3.10.9-2.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571566" version="1" comment="firefox-libharfbuzz0 is &lt;1.7.5-2.4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571567" version="1" comment="firefox-libpango-1_0-0 is &lt;1.40.14-2.4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571568" version="1" comment="firefox-libpixman-1-0 is &lt;0.34.0-2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571569" version="1" comment="libfirefox-gio-2_0-0 is &lt;2.54.3-2.4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571570" version="1" comment="libfirefox-glib-2_0-0 is &lt;2.54.3-2.4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571571" version="1" comment="libfirefox-gmodule-2_0-0 is &lt;2.54.3-2.4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571572" version="1" comment="libfirefox-gobject-2_0-0 is &lt;2.54.3-2.4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571573" version="1" comment="libfirefox-gthread-2_0-0 is &lt;2.54.3-2.4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571574" version="1" comment="libfreebl3 is &lt;3.41.1-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571575" version="1" comment="libfreebl3-32bit is &lt;3.41.1-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571576" version="1" comment="libsoftokn3 is &lt;3.41.1-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571577" version="1" comment="libsoftokn3-32bit is &lt;3.41.1-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571578" version="1" comment="mozilla-nspr is &lt;4.20-29.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571579" version="1" comment="mozilla-nspr-32bit is &lt;4.20-29.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571580" version="1" comment="mozilla-nss is &lt;3.41.1-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571581" version="1" comment="mozilla-nss-32bit is &lt;3.41.1-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571582" version="1" comment="mozilla-nss-certs is &lt;3.41.1-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571583" version="1" comment="mozilla-nss-certs-32bit is &lt;3.41.1-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571584" version="1" comment="mozilla-nss-tools is &lt;3.41.1-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571585" version="1" comment="MozillaFirefox is &lt;31.2.0esr-0.11.11.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571586" version="1" comment="MozillaFirefox-branding-SLED is &lt;31.0-0.5.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571587" version="1" comment="MozillaFirefox-translations is &lt;31.2.0esr-0.11.11.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571588" version="1" comment="libfreebl3 is &lt;3.17.2-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571589" version="1" comment="libfreebl3-32bit is &lt;3.17.2-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571590" version="1" comment="mozilla-nspr is &lt;4.10.7-0.3.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571591" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-0.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571592" version="1" comment="mozilla-nss is &lt;3.17.2-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571593" version="1" comment="mozilla-nss-32bit is &lt;3.17.2-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571594" version="1" comment="mozilla-nss-tools is &lt;3.17.2-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571595" version="1" comment="libFLAC++6 is &lt;1.2.1-68.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571596" version="1" comment="libFLAC8 is &lt;1.2.1-68.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566534" version="1" comment="libFLAC8-32bit is &lt;1.2.1-68.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671852" version="1" comment="libFLAC++6 is &lt;1.2.1-68.17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671853" version="1" comment="libFLAC8 is &lt;1.2.1-68.17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671854" version="1" comment="libFLAC8-32bit is &lt;1.2.1-68.17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991401" version="1" comment="foomatic-filters is &lt;3.0.2-269.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571598" version="1" comment="foomatic-filters is &lt;3.0.2-269.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991402" version="1" comment="freeradius-server is &lt;2.1.1-7.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991403" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991404" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991405" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991406" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571599" version="1" comment="freeradius-server is &lt;2.1.1-7.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571600" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571601" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571602" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571603" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571604" version="1" comment="freeradius-server is &lt;2.1.1-7.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571605" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571606" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571607" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571608" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571609" version="1" comment="freeradius-server is &lt;2.1.1-7.25.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571610" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.25.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571611" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.25.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571612" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.25.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571613" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.25.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991407" version="1" comment="freetype2 is &lt;2.3.7-25.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565990" version="1" comment="freetype2-32bit is &lt;2.3.7-25.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991408" version="1" comment="ft2demos is &lt;2.3.7-25.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571618" version="1" comment="freetype2 is &lt;2.3.7-25.41.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571619" version="1" comment="freetype2-32bit is &lt;2.3.7-25.41.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571620" version="1" comment="ft2demos is &lt;2.3.7-25.41.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571621" version="1" comment="freetype2 is &lt;2.3.7-25.45.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571622" version="1" comment="freetype2-32bit is &lt;2.3.7-25.45.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571623" version="1" comment="ft2demos is &lt;2.3.7-25.45.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571624" version="1" comment="freetype2 is &lt;2.3.7-25.45.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571625" version="1" comment="freetype2-32bit is &lt;2.3.7-25.45.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571626" version="1" comment="ft2demos is &lt;2.3.7-25.45.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571627" version="1" comment="freetype2 is &lt;2.3.7-25.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566567" version="1" comment="freetype2-32bit is &lt;2.3.7-25.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571628" version="1" comment="ft2demos is &lt;2.3.7-25.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593597" version="1" comment="freetype2 is &lt;2.3.7-25.35.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593595" version="1" comment="freetype2-32bit is &lt;2.3.7-25.35.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593598" version="1" comment="ft2demos is &lt;2.3.7-25.35.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991409" version="1" comment="fuse is &lt;2.7.2-61.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991410" version="1" comment="libfuse2 is &lt;2.7.2-61.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571629" version="1" comment="fuse is &lt;2.7.2-61.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571630" version="1" comment="libfuse2 is &lt;2.7.2-61.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571631" version="1" comment="cpp43 is &lt;4.3.4_20091019-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571632" version="1" comment="gcc43 is &lt;4.3.4_20091019-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571633" version="1" comment="gcc43-32bit is &lt;4.3.4_20091019-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571634" version="1" comment="gcc43-c++ is &lt;4.3.4_20091019-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571635" version="1" comment="gcc43-fortran is &lt;4.3.4_20091019-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571636" version="1" comment="gcc43-fortran-32bit is &lt;4.3.4_20091019-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571637" version="1" comment="gcc43-info is &lt;4.3.4_20091019-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571638" version="1" comment="gcc43-locale is &lt;4.3.4_20091019-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571639" version="1" comment="libstdc++43-devel is &lt;4.3.4_20091019-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571640" version="1" comment="libstdc++43-devel-32bit is &lt;4.3.4_20091019-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571641" version="1" comment="libstdc++43-doc is &lt;4.3.4_20091019-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571642" version="1" comment="cpp43 is &lt;4.3.4_20091019-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571643" version="1" comment="gcc43 is &lt;4.3.4_20091019-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571644" version="1" comment="gcc43-32bit is &lt;4.3.4_20091019-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571645" version="1" comment="gcc43-c++ is &lt;4.3.4_20091019-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571646" version="1" comment="gcc43-fortran is &lt;4.3.4_20091019-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571647" version="1" comment="gcc43-fortran-32bit is &lt;4.3.4_20091019-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571648" version="1" comment="gcc43-info is &lt;4.3.4_20091019-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571649" version="1" comment="gcc43-locale is &lt;4.3.4_20091019-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571650" version="1" comment="libstdc++43-devel is &lt;4.3.4_20091019-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571651" version="1" comment="libstdc++43-devel-32bit is &lt;4.3.4_20091019-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571652" version="1" comment="libstdc++43-doc is &lt;4.3.4_20091019-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571653" version="1" comment="cpp48 is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571654" version="1" comment="gcc48 is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571655" version="1" comment="gcc48-32bit is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571656" version="1" comment="gcc48-c++ is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571657" version="1" comment="gcc48-fortran is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571658" version="1" comment="gcc48-fortran-32bit is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571659" version="1" comment="gcc48-info is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571660" version="1" comment="gcc48-locale is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571661" version="1" comment="libasan0 is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571662" version="1" comment="libasan0-32bit is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571663" version="1" comment="libatomic1 is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571664" version="1" comment="libatomic1-32bit is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571665" version="1" comment="libgcc_s1 is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571666" version="1" comment="libgcc_s1-32bit is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571667" version="1" comment="libgfortran3 is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571668" version="1" comment="libgfortran3-32bit is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571669" version="1" comment="libgomp1 is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571670" version="1" comment="libgomp1-32bit is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571671" version="1" comment="libitm1 is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571672" version="1" comment="libitm1-32bit is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571673" version="1" comment="libmpfr4 is &lt;3.1.2-3.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571674" version="1" comment="libquadmath0 is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571675" version="1" comment="libquadmath0-32bit is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571676" version="1" comment="libstdc++48-devel is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571677" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571678" version="1" comment="libstdc++6 is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571679" version="1" comment="libstdc++6-32bit is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571680" version="1" comment="libtsan0 is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678381" version="1" comment="cpp48 is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678382" version="1" comment="gcc48 is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678383" version="1" comment="gcc48-32bit is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678384" version="1" comment="gcc48-c++ is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678385" version="1" comment="gcc48-fortran is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678386" version="1" comment="gcc48-fortran-32bit is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678387" version="1" comment="gcc48-info is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678388" version="1" comment="gcc48-locale is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678389" version="1" comment="libasan0 is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678390" version="1" comment="libasan0-32bit is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678391" version="1" comment="libatomic1 is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678392" version="1" comment="libatomic1-32bit is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678393" version="1" comment="libgcc_s1 is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678394" version="1" comment="libgcc_s1-32bit is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678395" version="1" comment="libgfortran3 is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678396" version="1" comment="libgfortran3-32bit is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678397" version="1" comment="libgomp1 is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678398" version="1" comment="libgomp1-32bit is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678399" version="1" comment="libitm1 is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678400" version="1" comment="libitm1-32bit is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678401" version="1" comment="libquadmath0 is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678402" version="1" comment="libquadmath0-32bit is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678403" version="1" comment="libstdc++48-devel is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678404" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678405" version="1" comment="libstdc++6 is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678406" version="1" comment="libstdc++6-32bit is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678407" version="1" comment="libtsan0 is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571681" version="1" comment="gd is &lt;2.0.36.RC1-52.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571682" version="1" comment="gd is &lt;2.0.36.RC1-52.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571683" version="1" comment="gd is &lt;2.0.36.RC1-52.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571684" version="1" comment="gd is &lt;2.0.36.RC1-52.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571685" version="1" comment="gd is &lt;2.0.36.RC1-52.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571686" version="1" comment="gd is &lt;2.0.36.RC1-52.33.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571687" version="1" comment="gd is &lt;2.0.36.RC1-52.33.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991411" version="1" comment="gdm is &lt;2.24.0-24.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991412" version="1" comment="gdm-branding-upstream is &lt;2.24.0-24.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991413" version="1" comment="gdm-lang is &lt;2.24.0-24.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571688" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571689" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571690" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571691" version="1" comment="ghostscript-library is &lt;8.62-32.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571692" version="1" comment="ghostscript-omni is &lt;8.62-32.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571693" version="1" comment="ghostscript-x11 is &lt;8.62-32.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571694" version="1" comment="libgimpprint is &lt;4.2.7-32.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991414" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991415" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991416" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991417" version="1" comment="ghostscript-library is &lt;8.62-32.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991418" version="1" comment="ghostscript-omni is &lt;8.62-32.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991419" version="1" comment="ghostscript-x11 is &lt;8.62-32.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991420" version="1" comment="libgimpprint is &lt;4.2.7-32.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571695" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571696" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571697" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571698" version="1" comment="ghostscript-library is &lt;8.62-32.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571699" version="1" comment="ghostscript-omni is &lt;8.62-32.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571700" version="1" comment="ghostscript-x11 is &lt;8.62-32.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571701" version="1" comment="libgimpprint is &lt;4.2.7-32.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571702" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571703" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571704" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571705" version="1" comment="ghostscript-library is &lt;8.62-32.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571706" version="1" comment="ghostscript-omni is &lt;8.62-32.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571707" version="1" comment="ghostscript-x11 is &lt;8.62-32.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571708" version="1" comment="libgimpprint is &lt;4.2.7-32.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571709" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571710" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571711" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571712" version="1" comment="ghostscript-library is &lt;8.62-32.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571713" version="1" comment="ghostscript-omni is &lt;8.62-32.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571714" version="1" comment="ghostscript-x11 is &lt;8.62-32.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571715" version="1" comment="libgimpprint is &lt;4.2.7-32.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571716" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.47.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571717" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.47.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571718" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.47.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571719" version="1" comment="ghostscript-library is &lt;8.62-32.47.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571720" version="1" comment="ghostscript-omni is &lt;8.62-32.47.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571721" version="1" comment="ghostscript-x11 is &lt;8.62-32.47.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571722" version="1" comment="libgimpprint is &lt;4.2.7-32.47.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571723" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.47.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571724" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.47.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571725" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.47.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571726" version="1" comment="ghostscript-library is &lt;8.62-32.47.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571727" version="1" comment="ghostscript-omni is &lt;8.62-32.47.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571728" version="1" comment="ghostscript-x11 is &lt;8.62-32.47.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571729" version="1" comment="libgimpprint is &lt;4.2.7-32.47.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571730" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.47.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571731" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.47.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571732" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.47.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571733" version="1" comment="ghostscript-library is &lt;8.62-32.47.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571734" version="1" comment="ghostscript-omni is &lt;8.62-32.47.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571735" version="1" comment="ghostscript-x11 is &lt;8.62-32.47.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571736" version="1" comment="libgimpprint is &lt;4.2.7-32.47.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571737" version="1" comment="ghostscript-fonts-other is &lt;8.62-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571738" version="1" comment="ghostscript-fonts-rus is &lt;8.62-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571739" version="1" comment="ghostscript-fonts-std is &lt;8.62-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571740" version="1" comment="ghostscript-library is &lt;8.62-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571741" version="1" comment="ghostscript-omni is &lt;8.62-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571742" version="1" comment="ghostscript-x11 is &lt;8.62-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571743" version="1" comment="libgimpprint is &lt;4.2.7-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571744" version="1" comment="giflib is &lt;4.1.6-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566573" version="1" comment="giflib-32bit is &lt;4.1.6-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571745" version="1" comment="giflib-progs is &lt;4.1.6-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571746" version="1" comment="giflib is &lt;4.1.6-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571747" version="1" comment="giflib-32bit is &lt;4.1.6-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571748" version="1" comment="giflib-progs is &lt;4.1.6-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571749" version="1" comment="glib2 is &lt;2.22.5-0.8.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571750" version="1" comment="glib2-doc is &lt;2.22.5-0.8.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571751" version="1" comment="glib2-lang is &lt;2.22.5-0.8.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571752" version="1" comment="libgio-2_0-0 is &lt;2.22.5-0.8.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571753" version="1" comment="libgio-2_0-0-32bit is &lt;2.22.5-0.8.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571754" version="1" comment="libglib-2_0-0 is &lt;2.22.5-0.8.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571755" version="1" comment="libglib-2_0-0-32bit is &lt;2.22.5-0.8.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571756" version="1" comment="libgmodule-2_0-0 is &lt;2.22.5-0.8.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571757" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.22.5-0.8.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571758" version="1" comment="libgobject-2_0-0 is &lt;2.22.5-0.8.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571759" version="1" comment="libgobject-2_0-0-32bit is &lt;2.22.5-0.8.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571760" version="1" comment="libgthread-2_0-0 is &lt;2.22.5-0.8.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571761" version="1" comment="libgthread-2_0-0-32bit is &lt;2.22.5-0.8.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571762" version="1" comment="glib2 is &lt;2.22.5-0.8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571763" version="1" comment="glib2-doc is &lt;2.22.5-0.8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571764" version="1" comment="glib2-lang is &lt;2.22.5-0.8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571765" version="1" comment="libgio-2_0-0 is &lt;2.22.5-0.8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571766" version="1" comment="libgio-2_0-0-32bit is &lt;2.22.5-0.8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571767" version="1" comment="libglib-2_0-0 is &lt;2.22.5-0.8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571768" version="1" comment="libglib-2_0-0-32bit is &lt;2.22.5-0.8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571769" version="1" comment="libgmodule-2_0-0 is &lt;2.22.5-0.8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571770" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.22.5-0.8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571771" version="1" comment="libgobject-2_0-0 is &lt;2.22.5-0.8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571772" version="1" comment="libgobject-2_0-0-32bit is &lt;2.22.5-0.8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571773" version="1" comment="libgthread-2_0-0 is &lt;2.22.5-0.8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571774" version="1" comment="libgthread-2_0-0-32bit is &lt;2.22.5-0.8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672765" version="1" comment="glib2 is &lt;2.22.5-0.8.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672766" version="1" comment="glib2-doc is &lt;2.22.5-0.8.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672767" version="1" comment="glib2-lang is &lt;2.22.5-0.8.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672768" version="1" comment="libgio-2_0-0 is &lt;2.22.5-0.8.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672769" version="1" comment="libgio-2_0-0-32bit is &lt;2.22.5-0.8.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672770" version="1" comment="libglib-2_0-0 is &lt;2.22.5-0.8.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672771" version="1" comment="libglib-2_0-0-32bit is &lt;2.22.5-0.8.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672772" version="1" comment="libgmodule-2_0-0 is &lt;2.22.5-0.8.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672773" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.22.5-0.8.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672774" version="1" comment="libgobject-2_0-0 is &lt;2.22.5-0.8.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672775" version="1" comment="libgobject-2_0-0-32bit is &lt;2.22.5-0.8.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672776" version="1" comment="libgthread-2_0-0 is &lt;2.22.5-0.8.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672777" version="1" comment="libgthread-2_0-0-32bit is &lt;2.22.5-0.8.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991421" version="1" comment="glibc is &lt;2.11.1-0.58.1 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991422" version="1" comment="glibc-32bit is &lt;2.11.1-0.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991423" version="1" comment="glibc-devel is &lt;2.11.1-0.58.1 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991424" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991425" version="1" comment="glibc-html is &lt;2.11.1-0.58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991426" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991427" version="1" comment="glibc-info is &lt;2.11.1-0.58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991428" version="1" comment="glibc-locale is &lt;2.11.1-0.58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991429" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991430" version="1" comment="glibc-profile is &lt;2.11.1-0.58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991431" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587382" version="1" comment="libxcrypt is &lt;3.0.3-0.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587383" version="1" comment="libxcrypt-32bit is &lt;3.0.3-0.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991432" version="1" comment="nscd is &lt;2.11.1-0.58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587385" version="1" comment="pam-modules is &lt;11-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587386" version="1" comment="pam-modules-32bit is &lt;11-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587387" version="1" comment="pwdutils is &lt;3.2.8-0.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587388" version="1" comment="pwdutils-plugin-audit is &lt;3.2.8-0.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571775" version="1" comment="glibc is &lt;2.11.1-0.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571776" version="1" comment="glibc-32bit is &lt;2.11.1-0.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571777" version="1" comment="glibc-devel is &lt;2.11.1-0.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571778" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571779" version="1" comment="glibc-html is &lt;2.11.1-0.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571780" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571781" version="1" comment="glibc-info is &lt;2.11.1-0.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571782" version="1" comment="glibc-locale is &lt;2.11.1-0.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571783" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571784" version="1" comment="glibc-profile is &lt;2.11.1-0.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571785" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571786" version="1" comment="nscd is &lt;2.11.1-0.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571787" version="1" comment="glibc is &lt;2.11.1-0.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571788" version="1" comment="glibc-32bit is &lt;2.11.1-0.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571789" version="1" comment="glibc-devel is &lt;2.11.1-0.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571790" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571791" version="1" comment="glibc-html is &lt;2.11.1-0.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571792" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571793" version="1" comment="glibc-info is &lt;2.11.1-0.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571794" version="1" comment="glibc-locale is &lt;2.11.1-0.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571795" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571796" version="1" comment="glibc-profile is &lt;2.11.1-0.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571797" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571798" version="1" comment="nscd is &lt;2.11.1-0.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571799" version="1" comment="glibc is &lt;2.11.1-0.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571800" version="1" comment="glibc-32bit is &lt;2.11.1-0.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571801" version="1" comment="glibc-devel is &lt;2.11.1-0.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571802" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571803" version="1" comment="glibc-html is &lt;2.11.1-0.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571804" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571805" version="1" comment="glibc-info is &lt;2.11.1-0.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571806" version="1" comment="glibc-locale is &lt;2.11.1-0.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571807" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571808" version="1" comment="glibc-profile is &lt;2.11.1-0.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571809" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571810" version="1" comment="nscd is &lt;2.11.1-0.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571811" version="1" comment="glibc is &lt;2.11.1-0.80.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571812" version="1" comment="glibc-32bit is &lt;2.11.1-0.80.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571813" version="1" comment="glibc-devel is &lt;2.11.1-0.80.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571814" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.80.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571815" version="1" comment="glibc-html is &lt;2.11.1-0.80.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571816" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.80.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571817" version="1" comment="glibc-info is &lt;2.11.1-0.80.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571818" version="1" comment="glibc-locale is &lt;2.11.1-0.80.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571819" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.80.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571820" version="1" comment="glibc-profile is &lt;2.11.1-0.80.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571821" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.80.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571822" version="1" comment="nscd is &lt;2.11.1-0.80.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571823" version="1" comment="glibc is &lt;2.11.1-0.80.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571824" version="1" comment="glibc-32bit is &lt;2.11.1-0.80.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571825" version="1" comment="glibc-devel is &lt;2.11.1-0.80.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571826" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.80.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571827" version="1" comment="glibc-html is &lt;2.11.1-0.80.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571828" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.80.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571829" version="1" comment="glibc-info is &lt;2.11.1-0.80.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571830" version="1" comment="glibc-locale is &lt;2.11.1-0.80.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571831" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.80.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571832" version="1" comment="glibc-profile is &lt;2.11.1-0.80.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571833" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.80.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571834" version="1" comment="nscd is &lt;2.11.1-0.80.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571835" version="1" comment="glibc is &lt;2.11.1-0.80.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571836" version="1" comment="glibc-32bit is &lt;2.11.1-0.80.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571837" version="1" comment="glibc-devel is &lt;2.11.1-0.80.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571838" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.80.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571839" version="1" comment="glibc-html is &lt;2.11.1-0.80.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571840" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.80.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571841" version="1" comment="glibc-info is &lt;2.11.1-0.80.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571842" version="1" comment="glibc-locale is &lt;2.11.1-0.80.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571843" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.80.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571844" version="1" comment="glibc-profile is &lt;2.11.1-0.80.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571845" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.80.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571846" version="1" comment="nscd is &lt;2.11.1-0.80.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571847" version="1" comment="glibc is &lt;2.11.1-0.80.12.846 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571848" version="1" comment="glibc-32bit is &lt;2.11.1-0.80.12.846 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571849" version="1" comment="glibc-devel is &lt;2.11.1-0.80.12.846 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571850" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.80.12.846 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571851" version="1" comment="glibc-html is &lt;2.11.1-0.80.12.846 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571852" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.80.12.846 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571853" version="1" comment="glibc-info is &lt;2.11.1-0.80.12.846 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571854" version="1" comment="glibc-locale is &lt;2.11.1-0.80.12.846 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571855" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.80.12.846 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571856" version="1" comment="glibc-profile is &lt;2.11.1-0.80.12.846 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571857" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.80.12.846 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571858" version="1" comment="nscd is &lt;2.11.1-0.80.12.846 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571859" version="1" comment="glibc is &lt;2.11.1-0.80.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571860" version="1" comment="glibc-32bit is &lt;2.11.1-0.80.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571861" version="1" comment="glibc-devel is &lt;2.11.1-0.80.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571862" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.80.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571863" version="1" comment="glibc-html is &lt;2.11.1-0.80.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571864" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.80.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571865" version="1" comment="glibc-info is &lt;2.11.1-0.80.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571866" version="1" comment="glibc-locale is &lt;2.11.1-0.80.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571867" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.80.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571868" version="1" comment="glibc-profile is &lt;2.11.1-0.80.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571869" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.80.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571870" version="1" comment="nscd is &lt;2.11.1-0.80.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571871" version="1" comment="glibc is &lt;2.11.1-0.80.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571872" version="1" comment="glibc-32bit is &lt;2.11.1-0.80.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571873" version="1" comment="glibc-devel is &lt;2.11.1-0.80.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571874" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.80.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571875" version="1" comment="glibc-html is &lt;2.11.1-0.80.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571876" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.80.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571877" version="1" comment="glibc-info is &lt;2.11.1-0.80.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571878" version="1" comment="glibc-locale is &lt;2.11.1-0.80.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571879" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.80.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571880" version="1" comment="glibc-profile is &lt;2.11.1-0.80.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571881" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.80.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571882" version="1" comment="nscd is &lt;2.11.1-0.80.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673626" version="1" comment="glibc is &lt;2.11.1-0.80.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673627" version="1" comment="glibc-32bit is &lt;2.11.1-0.80.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673628" version="1" comment="glibc-devel is &lt;2.11.1-0.80.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673629" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.80.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673630" version="1" comment="glibc-html is &lt;2.11.1-0.80.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673631" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.80.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673632" version="1" comment="glibc-info is &lt;2.11.1-0.80.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673633" version="1" comment="glibc-locale is &lt;2.11.1-0.80.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673634" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.80.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673635" version="1" comment="glibc-profile is &lt;2.11.1-0.80.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673636" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.80.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673637" version="1" comment="nscd is &lt;2.11.1-0.80.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658238" version="1" comment="gmp is &lt;4.2.3-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658239" version="1" comment="gmp-32bit is &lt;4.2.3-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571906" version="1" comment="gnome-session is &lt;2.28.0-3.11.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571907" version="1" comment="gnome-session-lang is &lt;2.28.0-3.11.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571908" version="1" comment="gnuplot is &lt;4.2.3-7.3.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991433" version="1" comment="gnutls is &lt;2.4.1-24.39.51.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991434" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.53.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991435" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.51.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991436" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.51.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571914" version="1" comment="gnutls is &lt;2.4.1-24.39.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571915" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566606" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571916" version="1" comment="gnutls is &lt;2.4.1-24.39.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571917" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566609" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571918" version="1" comment="gnutls is &lt;2.4.1-24.39.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571919" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571920" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571921" version="1" comment="gnutls is &lt;2.4.1-24.39.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571922" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571923" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571924" version="1" comment="gnutls is &lt;2.4.1-24.39.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571925" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571926" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991437" version="1" comment="gpg2 is &lt;2.0.9-25.33.39.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991438" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.39.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571927" version="1" comment="gpg2 is &lt;2.0.9-25.33.41.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571928" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.41.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571929" version="1" comment="gpg2 is &lt;2.0.9-25.33.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571930" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571931" version="1" comment="gpg2 is &lt;2.0.9-25.33.42.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571932" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.42.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571933" version="1" comment="gpgme is &lt;1.1.6-25.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571934" version="1" comment="libgpgme11 is &lt;1.1.6-25.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571935" version="1" comment="graphviz is &lt;2.20.2-8.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571936" version="1" comment="graphviz-gd is &lt;2.20.2-8.3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571937" version="1" comment="graphviz-gnome is &lt;2.20.2-8.3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571938" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.25-1.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571939" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.25-1.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571940" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.25-1.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571941" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.25-1.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571942" version="1" comment="libgstapp-0_10-0 is &lt;0.10.25-1.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571943" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.25-1.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571944" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.25-1.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571945" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.25-1.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991439" version="1" comment="gtk2 is &lt;2.18.9-0.20.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991440" version="1" comment="gtk2-32bit is &lt;2.18.9-0.20.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991441" version="1" comment="gtk2-doc is &lt;2.18.9-0.20.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991442" version="1" comment="gtk2-lang is &lt;2.18.9-0.20.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571951" version="1" comment="gtk2 is &lt;2.18.9-0.20.21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571952" version="1" comment="gtk2-32bit is &lt;2.18.9-0.20.21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571953" version="1" comment="gtk2-doc is &lt;2.18.9-0.20.21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571954" version="1" comment="gtk2-lang is &lt;2.18.9-0.20.21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571955" version="1" comment="gtk2 is &lt;2.18.9-0.20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571956" version="1" comment="gtk2-32bit is &lt;2.18.9-0.20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571957" version="1" comment="gtk2-doc is &lt;2.18.9-0.20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571958" version="1" comment="gtk2-lang is &lt;2.18.9-0.20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571959" version="1" comment="gtk2 is &lt;2.18.9-0.20.27.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571960" version="1" comment="gtk2-32bit is &lt;2.18.9-0.20.27.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571961" version="1" comment="gtk2-doc is &lt;2.18.9-0.20.27.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571962" version="1" comment="gtk2-lang is &lt;2.18.9-0.20.27.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571963" version="1" comment="gtk2 is &lt;2.18.9-0.20.27.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571964" version="1" comment="gtk2-32bit is &lt;2.18.9-0.20.27.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571965" version="1" comment="gtk2-doc is &lt;2.18.9-0.20.27.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571966" version="1" comment="gtk2-lang is &lt;2.18.9-0.20.27.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571967" version="1" comment="guile is &lt;1.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991443" version="1" comment="gwenview is &lt;4.3.5-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991444" version="1" comment="kcolorchooser is &lt;4.3.5-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991445" version="1" comment="kruler is &lt;4.3.5-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991446" version="1" comment="ksnapshot is &lt;4.3.5-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991447" version="1" comment="libkexiv2-7 is &lt;4.3.5-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991448" version="1" comment="libkipi6 is &lt;4.3.5-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991449" version="1" comment="okular is &lt;4.3.5-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991450" version="1" comment="hplip is &lt;3.11.10-0.6.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991451" version="1" comment="hplip-hpijs is &lt;3.11.10-0.6.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571977" version="1" comment="hunspell is &lt;1.2.7-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571978" version="1" comment="hunspell-32bit is &lt;1.2.7-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571979" version="1" comment="hunspell-tools is &lt;1.2.7-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991452" version="1" comment="ibutils is &lt;1.5.4-0.7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991453" version="1" comment="ibutils-32bit is &lt;1.5.4-0.7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991454" version="1" comment="libicu is &lt;4.0-7.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571981" version="1" comment="libicu-32bit is &lt;4.0-7.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991455" version="1" comment="libicu-doc is &lt;4.0-7.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571983" version="1" comment="libicu is &lt;4.0-43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564562" version="1" comment="libicu-32bit is &lt;4.0-43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571984" version="1" comment="libicu-doc is &lt;4.0-43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571985" version="1" comment="libicu is &lt;4.0-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564566" version="1" comment="libicu-32bit is &lt;4.0-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571986" version="1" comment="libicu-doc is &lt;4.0-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593714" version="1" comment="libicu is &lt;4.0-47.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593715" version="1" comment="libicu-32bit is &lt;4.0-47.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593716" version="1" comment="libicu-doc is &lt;4.0-47.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571987" version="1" comment="libicu is &lt;4.0-47.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564570" version="1" comment="libicu-32bit is &lt;4.0-47.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571988" version="1" comment="libicu-doc is &lt;4.0-47.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571989" version="1" comment="inn is &lt;2.4.2-170.21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571990" version="1" comment="inn is &lt;2.4.2-170.21.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571991" version="1" comment="inn is &lt;2.4.2-170.21.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571992" version="1" comment="inst-source-utils is &lt;2012.10.4-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571993" version="1" comment="ipsec-tools is &lt;0.7.3-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571994" version="1" comment="ipsec-tools is &lt;0.7.3-1.38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991456" version="1" comment="iscsitarget is &lt;1.4.19-0.9.11.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991457" version="1" comment="iscsitarget-kmp-default is &lt;1.4.19_2.6.32.54_0.3-0.9.11.6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991458" version="1" comment="iscsitarget-kmp-trace is &lt;1.4.19_2.6.32.54_0.3-0.9.11.6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991459" version="1" comment="iscsitarget-kmp-xen is &lt;1.4.19_2.6.32.54_0.3-0.9.11.6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571995" version="1" comment="jakarta-commons-collections is &lt;3.2.2-88.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571996" version="1" comment="jakarta-commons-collections-javadoc is &lt;3.2.2-88.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571997" version="1" comment="jakarta-commons-collections-tomcat5 is &lt;3.2.2-88.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571998" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-1.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571999" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-1.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567995" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-1.37.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567996" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-1.37.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572000" version="1" comment="jakarta-commons-httpclient3 is &lt;3.0.1-253.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572001" version="1" comment="jakarta-taglibs-standard is &lt;1.1.1-234.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572002" version="1" comment="jakarta-taglibs-standard-javadoc is &lt;1.1.1-234.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991460" version="1" comment="libjasper is &lt;1.900.1-134.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991461" version="1" comment="libjasper-32bit is &lt;1.900.1-134.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572006" version="1" comment="libjasper is &lt;1.900.14-134.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572007" version="1" comment="libjasper-32bit is &lt;1.900.14-134.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572008" version="1" comment="libjasper is &lt;1.900.14-134.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572009" version="1" comment="libjasper-32bit is &lt;1.900.14-134.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572010" version="1" comment="libjasper is &lt;1.900.14-134.33.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572011" version="1" comment="libjasper-32bit is &lt;1.900.14-134.33.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572012" version="1" comment="libjasper is &lt;1.900.14-134.33.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572013" version="1" comment="libjasper-32bit is &lt;1.900.14-134.33.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572014" version="1" comment="libjasper is &lt;1.900.14-134.33.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572015" version="1" comment="libjasper-32bit is &lt;1.900.14-134.33.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572016" version="1" comment="libjasper is &lt;1.900.14-134.33.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572017" version="1" comment="libjasper-32bit is &lt;1.900.14-134.33.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668400" version="1" comment="libjasper is &lt;1.900.14-134.33.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668401" version="1" comment="libjasper-32bit is &lt;1.900.14-134.33.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991462" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.18-0.4.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576217" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.18-0.4.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576218" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.18-0.4.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991463" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.2-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589396" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.0-0.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991464" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.2-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991465" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.2-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578118" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.2-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572026" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.7-10.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572027" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.7-10.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572028" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.7-10.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572029" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.7-10.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572030" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.7-10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572031" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.20-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572032" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.20-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572033" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.20-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572034" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.20-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572035" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.25-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572036" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.25-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572037" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.25-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572038" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.25-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572039" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.30-75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572040" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.30-75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572041" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.30-75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572042" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.30-75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572043" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.35-78.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572044" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.35-78.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572045" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.35-78.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572046" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.35-78.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572047" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.41-81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572048" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.41-81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572049" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.41-81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572050" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.41-81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572051" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.45-84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572052" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.45-84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572053" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.45-84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572054" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.45-84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572055" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.50-85.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572056" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.50-85.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572057" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.50-85.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572058" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.50-85.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572059" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.15-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572060" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.15-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572061" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.15-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572062" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.15-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991466" version="1" comment="jpeg is &lt;6b-879.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991467" version="1" comment="libjpeg is &lt;6.2.0-879.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991468" version="1" comment="libjpeg-32bit is &lt;6.2.0-879.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572067" version="1" comment="jpeg is &lt;6b-879.12.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572068" version="1" comment="libjpeg is &lt;6.2.0-879.12.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572069" version="1" comment="libjpeg-32bit is &lt;6.2.0-879.12.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572070" version="1" comment="jpeg is &lt;6b-879.12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572071" version="1" comment="libjpeg is &lt;6.2.0-879.12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572072" version="1" comment="libjpeg-32bit is &lt;6.2.0-879.12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572073" version="1" comment="jpeg is &lt;6b-879.12.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572074" version="1" comment="libjpeg is &lt;6.2.0-879.12.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572075" version="1" comment="libjpeg-32bit is &lt;6.2.0-879.12.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991469" version="1" comment="kbd is &lt;1.14.1-16.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572076" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.12.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566653" version="1" comment="kdebase4-wallpapers is &lt;4.3.5-0.11.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572077" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.12.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572078" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.12.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572079" version="1" comment="kdm is &lt;4.3.5-0.12.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572080" version="1" comment="kwin is &lt;4.3.5-0.12.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991470" version="1" comment="kdenetwork4-filesharing is &lt;4.3.5-0.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991471" version="1" comment="kget is &lt;4.3.5-0.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991472" version="1" comment="kopete is &lt;4.3.5-0.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991473" version="1" comment="krdc is &lt;4.3.5-0.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991474" version="1" comment="krfb is &lt;4.3.5-0.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566658" version="1" comment="kde4-l10n-ar is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572086" version="1" comment="kde4-l10n-bg is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572087" version="1" comment="kde4-l10n-ca is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566659" version="1" comment="kde4-l10n-cs is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572088" version="1" comment="kde4-l10n-csb is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566660" version="1" comment="kde4-l10n-da is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566663" version="1" comment="kde4-l10n-de is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572089" version="1" comment="kde4-l10n-el is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566664" version="1" comment="kde4-l10n-en_GB is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566665" version="1" comment="kde4-l10n-es is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572090" version="1" comment="kde4-l10n-et is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572091" version="1" comment="kde4-l10n-eu is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572092" version="1" comment="kde4-l10n-fi is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566668" version="1" comment="kde4-l10n-fr is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572093" version="1" comment="kde4-l10n-ga is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572094" version="1" comment="kde4-l10n-gl is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572095" version="1" comment="kde4-l10n-hi is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566671" version="1" comment="kde4-l10n-hu is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572096" version="1" comment="kde4-l10n-is is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566672" version="1" comment="kde4-l10n-it is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566675" version="1" comment="kde4-l10n-ja is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572097" version="1" comment="kde4-l10n-kk is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572098" version="1" comment="kde4-l10n-km is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566676" version="1" comment="kde4-l10n-ko is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572099" version="1" comment="kde4-l10n-ku is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572100" version="1" comment="kde4-l10n-lt is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572101" version="1" comment="kde4-l10n-lv is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572102" version="1" comment="kde4-l10n-mk is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572103" version="1" comment="kde4-l10n-ml is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566677" version="1" comment="kde4-l10n-nb is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572104" version="1" comment="kde4-l10n-nds is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566678" version="1" comment="kde4-l10n-nl is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572105" version="1" comment="kde4-l10n-nn is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572106" version="1" comment="kde4-l10n-pa is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566681" version="1" comment="kde4-l10n-pl is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566684" version="1" comment="kde4-l10n-pt is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566685" version="1" comment="kde4-l10n-pt_BR is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572107" version="1" comment="kde4-l10n-ro is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566688" version="1" comment="kde4-l10n-ru is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572108" version="1" comment="kde4-l10n-sl is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566691" version="1" comment="kde4-l10n-sv is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572109" version="1" comment="kde4-l10n-th is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572110" version="1" comment="kde4-l10n-tr is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572111" version="1" comment="kde4-l10n-uk is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572112" version="1" comment="kde4-l10n-wa is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566694" version="1" comment="kde4-l10n-zh_CN is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566695" version="1" comment="kde4-l10n-zh_TW is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572113" version="1" comment="kdebase4-runtime is &lt;4.3.5-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572114" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.12.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566699" version="1" comment="kdebase4-wallpapers is &lt;4.3.5-0.11.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572115" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.12.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572116" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.12.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572117" version="1" comment="kdm is &lt;4.3.5-0.12.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572118" version="1" comment="kwin is &lt;4.3.5-0.12.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572119" version="1" comment="kdelibs3 is &lt;3.5.10-23.30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564597" version="1" comment="kdelibs3-32bit is &lt;3.5.10-23.30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572120" version="1" comment="kdelibs3-default-style is &lt;3.5.10-23.30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564601" version="1" comment="kdelibs3-default-style-32bit is &lt;3.5.10-23.30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991475" version="1" comment="kdelibs4 is &lt;4.3.5-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991476" version="1" comment="kdelibs4-core is &lt;4.3.5-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991477" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991478" version="1" comment="libkde4 is &lt;4.3.5-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562953" version="1" comment="libkde4-32bit is &lt;4.3.5-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991479" version="1" comment="libkdecore4 is &lt;4.3.5-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562955" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572130" version="1" comment="kdirstat is &lt;2.4.4-255.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991480" version="1" comment="kdump is &lt;0.7.8-1.33.35.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991481" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.54_0.3-0.3.73 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588296" version="1" comment="btrfs-kmp-pae is &lt;0_2.6.32.59_0.13-0.3.163 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991482" version="1" comment="btrfs-kmp-xen is &lt;0_2.6.32.54_0.3-0.3.73 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991483" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.54_0.3-7.9.40 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588299" version="1" comment="ext4dev-kmp-pae is &lt;0_2.6.32.59_0.13-7.9.130 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991484" version="1" comment="ext4dev-kmp-trace is &lt;0_2.6.32.54_0.3-7.9.40 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991485" version="1" comment="ext4dev-kmp-xen is &lt;0_2.6.32.54_0.3-7.9.40 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991486" version="1" comment="hyper-v-kmp-default is &lt;0_2.6.32.54_0.3-0.18.3 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588302" version="1" comment="hyper-v-kmp-pae is &lt;0_2.6.32.59_0.13-0.18.39 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991487" version="1" comment="hyper-v-kmp-trace is &lt;0_2.6.32.54_0.3-0.18.3 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991488" version="1" comment="kernel-default is &lt;2.6.32.54-0.7.TDC.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991489" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.7.TDC.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587617" version="1" comment="kernel-default-man is &lt;2.6.32.59-0.15.2 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991491" version="1" comment="kernel-ec2 is &lt;2.6.32.54-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991492" version="1" comment="kernel-ec2-base is &lt;2.6.32.54-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588546" version="1" comment="kernel-pae is &lt;2.6.32.59-0.15.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588547" version="1" comment="kernel-pae-base is &lt;2.6.32.59-0.15.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991493" version="1" comment="kernel-source is &lt;2.6.32.54-0.7.TDC.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991494" version="1" comment="kernel-syms is &lt;2.6.32.54-0.7.TDC.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991495" version="1" comment="kernel-trace is &lt;2.6.32.54-0.7.TDC.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991496" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.7.TDC.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991498" version="1" comment="kernel-xen is &lt;2.6.32.54-0.7.TDC.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991499" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.7.TDC.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572165" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_16_2.6.32.59_0.15-0.5.26 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572166" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_16_2.6.32.59_0.15-0.5.26 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572167" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_16_2.6.32.59_0.15-0.5.26 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991501" version="1" comment="kernel-default is &lt;2.6.32.54-0.55.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991502" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.55.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991504" version="1" comment="kernel-source is &lt;2.6.32.54-0.55.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991505" version="1" comment="kernel-syms is &lt;2.6.32.54-0.55.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991506" version="1" comment="kernel-trace is &lt;2.6.32.54-0.55.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991507" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.55.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991509" version="1" comment="kernel-xen is &lt;2.6.32.54-0.55.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991510" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.55.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991512" version="1" comment="kernel-default is &lt;2.6.32.54-0.65.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991513" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.65.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991515" version="1" comment="kernel-source is &lt;2.6.32.54-0.65.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991516" version="1" comment="kernel-syms is &lt;2.6.32.54-0.65.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991517" version="1" comment="kernel-trace is &lt;2.6.32.54-0.65.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991518" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.65.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991520" version="1" comment="kernel-xen is &lt;2.6.32.54-0.65.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991521" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.65.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991523" version="1" comment="kernel-default is &lt;2.6.32.54-0.9.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991524" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.9.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991526" version="1" comment="kernel-source is &lt;2.6.32.54-0.9.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991527" version="1" comment="kernel-syms is &lt;2.6.32.54-0.9.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991528" version="1" comment="kernel-trace is &lt;2.6.32.54-0.9.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991529" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.9.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991531" version="1" comment="kernel-xen is &lt;2.6.32.54-0.9.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991532" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.9.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991534" version="1" comment="kernel-default is &lt;2.6.32.54-0.11.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991535" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.11.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991537" version="1" comment="kernel-source is &lt;2.6.32.54-0.11.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991538" version="1" comment="kernel-syms is &lt;2.6.32.54-0.11.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991539" version="1" comment="kernel-trace is &lt;2.6.32.54-0.11.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991540" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.11.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991542" version="1" comment="kernel-xen is &lt;2.6.32.54-0.11.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991543" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.11.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991545" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_10_2.6.32.54_0.11.TDC-0.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991546" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_10_2.6.32.54_0.11.TDC-0.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991547" version="1" comment="kernel-default is &lt;2.6.32.54-0.13.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991548" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.13.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991550" version="1" comment="kernel-source is &lt;2.6.32.54-0.13.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991551" version="1" comment="kernel-syms is &lt;2.6.32.54-0.13.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991552" version="1" comment="kernel-trace is &lt;2.6.32.54-0.13.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991553" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.13.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991555" version="1" comment="kernel-xen is &lt;2.6.32.54-0.13.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991556" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.13.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991558" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_12_2.6.32.54_0.13.TDC-0.3.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991559" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_12_2.6.32.54_0.13.TDC-0.3.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991560" version="1" comment="kernel-default is &lt;2.6.32.54-0.21.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991561" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.21.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991563" version="1" comment="kernel-source is &lt;2.6.32.54-0.21.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991564" version="1" comment="kernel-syms is &lt;2.6.32.54-0.21.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991565" version="1" comment="kernel-trace is &lt;2.6.32.54-0.21.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991566" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.21.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991568" version="1" comment="kernel-xen is &lt;2.6.32.54-0.21.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991569" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.21.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991571" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_12_2.6.32.54_0.21.TDC-0.3.11 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991572" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_12_2.6.32.54_0.21.TDC-0.3.11 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991573" version="1" comment="kernel-default is &lt;2.6.32.54-0.23.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991574" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.23.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991576" version="1" comment="kernel-source is &lt;2.6.32.54-0.23.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991577" version="1" comment="kernel-syms is &lt;2.6.32.54-0.23.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991578" version="1" comment="kernel-trace is &lt;2.6.32.54-0.23.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991579" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.23.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991581" version="1" comment="kernel-xen is &lt;2.6.32.54-0.23.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991582" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.23.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991584" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_12_2.6.32.54_0.23.TDC-0.3.13 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991585" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_12_2.6.32.54_0.23.TDC-0.3.13 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991586" version="1" comment="kernel-default is &lt;2.6.32.54-0.25.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991587" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.25.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991589" version="1" comment="kernel-source is &lt;2.6.32.54-0.25.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991590" version="1" comment="kernel-syms is &lt;2.6.32.54-0.25.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991591" version="1" comment="kernel-trace is &lt;2.6.32.54-0.25.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991592" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.25.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991594" version="1" comment="kernel-xen is &lt;2.6.32.54-0.25.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991595" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.25.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991597" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_12_2.6.32.54_0.25.TDC-0.5.5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991598" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_12_2.6.32.54_0.25.TDC-0.5.5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991599" version="1" comment="kernel-default is &lt;2.6.32.54-0.29.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991600" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.29.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991602" version="1" comment="kernel-source is &lt;2.6.32.54-0.29.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991603" version="1" comment="kernel-syms is &lt;2.6.32.54-0.29.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991604" version="1" comment="kernel-trace is &lt;2.6.32.54-0.29.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991605" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.29.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991607" version="1" comment="kernel-xen is &lt;2.6.32.54-0.29.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991608" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.29.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991610" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_12_2.6.32.54_0.29.TDC-0.5.11 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991611" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_12_2.6.32.54_0.29.TDC-0.5.11 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991612" version="1" comment="kernel-default is &lt;2.6.32.54-0.31.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991613" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.31.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991615" version="1" comment="kernel-source is &lt;2.6.32.54-0.31.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991616" version="1" comment="kernel-syms is &lt;2.6.32.54-0.31.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991617" version="1" comment="kernel-trace is &lt;2.6.32.54-0.31.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991618" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.31.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991620" version="1" comment="kernel-xen is &lt;2.6.32.54-0.31.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991621" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.31.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991623" version="1" comment="kernel-default is &lt;2.6.32.54-0.33.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991624" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.33.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991626" version="1" comment="kernel-source is &lt;2.6.32.54-0.33.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991627" version="1" comment="kernel-syms is &lt;2.6.32.54-0.33.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991628" version="1" comment="kernel-trace is &lt;2.6.32.54-0.33.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991629" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.33.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991631" version="1" comment="kernel-xen is &lt;2.6.32.54-0.33.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991632" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.33.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991634" version="1" comment="kernel-default is &lt;2.6.32.54-0.35.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991635" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.35.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991637" version="1" comment="kernel-source is &lt;2.6.32.54-0.35.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991638" version="1" comment="kernel-syms is &lt;2.6.32.54-0.35.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991639" version="1" comment="kernel-trace is &lt;2.6.32.54-0.35.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991640" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.35.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991642" version="1" comment="kernel-xen is &lt;2.6.32.54-0.35.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991643" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.35.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991645" version="1" comment="kernel-default is &lt;2.6.32.54-0.37.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991646" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.37.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991648" version="1" comment="kernel-source is &lt;2.6.32.54-0.37.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991649" version="1" comment="kernel-syms is &lt;2.6.32.54-0.37.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991650" version="1" comment="kernel-trace is &lt;2.6.32.54-0.37.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991651" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.37.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991653" version="1" comment="kernel-xen is &lt;2.6.32.54-0.37.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991654" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.37.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991656" version="1" comment="kernel-default is &lt;2.6.32.54-0.39.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991657" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.39.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991659" version="1" comment="kernel-source is &lt;2.6.32.54-0.39.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991660" version="1" comment="kernel-syms is &lt;2.6.32.54-0.39.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991661" version="1" comment="kernel-trace is &lt;2.6.32.54-0.39.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991662" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.39.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991664" version="1" comment="kernel-xen is &lt;2.6.32.54-0.39.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991665" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.39.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991667" version="1" comment="kernel-default is &lt;2.6.32.54-0.41.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991668" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.41.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991670" version="1" comment="kernel-source is &lt;2.6.32.54-0.41.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991671" version="1" comment="kernel-syms is &lt;2.6.32.54-0.41.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991672" version="1" comment="kernel-trace is &lt;2.6.32.54-0.41.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991673" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.41.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991675" version="1" comment="kernel-xen is &lt;2.6.32.54-0.41.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991676" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.41.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991678" version="1" comment="kernel-default is &lt;2.6.32.54-0.43.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991679" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.43.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991681" version="1" comment="kernel-source is &lt;2.6.32.54-0.43.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991682" version="1" comment="kernel-syms is &lt;2.6.32.54-0.43.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991683" version="1" comment="kernel-trace is &lt;2.6.32.54-0.43.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991684" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.43.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991686" version="1" comment="kernel-xen is &lt;2.6.32.54-0.43.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991687" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.43.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991689" version="1" comment="kernel-default is &lt;2.6.32.54-0.45.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991690" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.45.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991692" version="1" comment="kernel-source is &lt;2.6.32.54-0.45.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991693" version="1" comment="kernel-syms is &lt;2.6.32.54-0.45.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991694" version="1" comment="kernel-trace is &lt;2.6.32.54-0.45.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991695" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.45.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991697" version="1" comment="kernel-xen is &lt;2.6.32.54-0.45.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991698" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.45.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991700" version="1" comment="kernel-default is &lt;2.6.32.54-0.47.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991701" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.47.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991703" version="1" comment="kernel-source is &lt;2.6.32.54-0.47.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991704" version="1" comment="kernel-syms is &lt;2.6.32.54-0.47.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991705" version="1" comment="kernel-trace is &lt;2.6.32.54-0.47.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991706" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.47.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991708" version="1" comment="kernel-xen is &lt;2.6.32.54-0.47.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991709" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.47.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991711" version="1" comment="kernel-default is &lt;2.6.32.54-0.49.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991712" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.49.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991714" version="1" comment="kernel-source is &lt;2.6.32.54-0.49.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991715" version="1" comment="kernel-syms is &lt;2.6.32.54-0.49.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991716" version="1" comment="kernel-trace is &lt;2.6.32.54-0.49.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991717" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.49.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991719" version="1" comment="kernel-xen is &lt;2.6.32.54-0.49.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991720" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.49.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991722" version="1" comment="kernel-default is &lt;2.6.32.54-0.53.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991723" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.53.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991725" version="1" comment="kernel-source is &lt;2.6.32.54-0.53.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991726" version="1" comment="kernel-syms is &lt;2.6.32.54-0.53.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991727" version="1" comment="kernel-trace is &lt;2.6.32.54-0.53.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991728" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.53.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991730" version="1" comment="kernel-xen is &lt;2.6.32.54-0.53.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991731" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.53.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991733" version="1" comment="kernel-default is &lt;2.6.32.54-0.59.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991734" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.59.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991736" version="1" comment="kernel-source is &lt;2.6.32.54-0.59.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991737" version="1" comment="kernel-syms is &lt;2.6.32.54-0.59.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991738" version="1" comment="kernel-trace is &lt;2.6.32.54-0.59.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991739" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.59.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991741" version="1" comment="kernel-xen is &lt;2.6.32.54-0.59.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991742" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.59.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991744" version="1" comment="kernel-default is &lt;2.6.32.54-0.68.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991745" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.68.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991747" version="1" comment="kernel-source is &lt;2.6.32.54-0.68.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991748" version="1" comment="kernel-syms is &lt;2.6.32.54-0.68.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991749" version="1" comment="kernel-trace is &lt;2.6.32.54-0.68.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991750" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.68.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991752" version="1" comment="kernel-xen is &lt;2.6.32.54-0.68.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991753" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.68.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991755" version="1" comment="kernel-default is &lt;2.6.32.54-0.73.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991756" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.73.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991758" version="1" comment="kernel-source is &lt;2.6.32.54-0.73.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991759" version="1" comment="kernel-syms is &lt;2.6.32.54-0.73.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991760" version="1" comment="kernel-trace is &lt;2.6.32.54-0.73.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991761" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.73.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991763" version="1" comment="kernel-xen is &lt;2.6.32.54-0.73.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991764" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.73.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991766" version="1" comment="kernel-default is &lt;2.6.32.54-0.76.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991767" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.76.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991769" version="1" comment="kernel-source is &lt;2.6.32.54-0.76.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991770" version="1" comment="kernel-syms is &lt;2.6.32.54-0.76.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991771" version="1" comment="kernel-trace is &lt;2.6.32.54-0.76.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991772" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.76.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991774" version="1" comment="kernel-xen is &lt;2.6.32.54-0.76.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991775" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.76.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991777" version="1" comment="kernel-default is &lt;2.6.32.54-0.79.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991778" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.79.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991780" version="1" comment="kernel-source is &lt;2.6.32.54-0.79.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991781" version="1" comment="kernel-syms is &lt;2.6.32.54-0.79.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991782" version="1" comment="kernel-trace is &lt;2.6.32.54-0.79.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991783" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.79.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991785" version="1" comment="kernel-xen is &lt;2.6.32.54-0.79.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991786" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.79.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991788" version="1" comment="kernel-default is &lt;2.6.32.54-0.82.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991789" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.82.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991791" version="1" comment="kernel-source is &lt;2.6.32.54-0.82.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991792" version="1" comment="kernel-syms is &lt;2.6.32.54-0.82.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991793" version="1" comment="kernel-trace is &lt;2.6.32.54-0.82.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991794" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.82.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991796" version="1" comment="kernel-xen is &lt;2.6.32.54-0.82.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991797" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.82.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991799" version="1" comment="kernel-default is &lt;2.6.32.54-0.85.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991800" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.85.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991802" version="1" comment="kernel-source is &lt;2.6.32.54-0.85.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991803" version="1" comment="kernel-syms is &lt;2.6.32.54-0.85.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991804" version="1" comment="kernel-trace is &lt;2.6.32.54-0.85.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991805" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.85.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991807" version="1" comment="kernel-xen is &lt;2.6.32.54-0.85.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991808" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.85.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991810" version="1" comment="kernel-default is &lt;2.6.32.54-0.88.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991811" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.88.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991813" version="1" comment="kernel-source is &lt;2.6.32.54-0.88.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991814" version="1" comment="kernel-syms is &lt;2.6.32.54-0.88.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991815" version="1" comment="kernel-trace is &lt;2.6.32.54-0.88.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991816" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.88.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991818" version="1" comment="kernel-xen is &lt;2.6.32.54-0.88.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991819" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.88.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991821" version="1" comment="kernel-default is &lt;2.6.32.54-0.94.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991822" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.94.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991824" version="1" comment="kernel-source is &lt;2.6.32.54-0.94.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991825" version="1" comment="kernel-syms is &lt;2.6.32.54-0.94.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991826" version="1" comment="kernel-trace is &lt;2.6.32.54-0.94.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991827" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.94.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991829" version="1" comment="kernel-xen is &lt;2.6.32.54-0.94.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991830" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.94.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991832" version="1" comment="kernel-default is &lt;2.6.32.54-0.100.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991833" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.100.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991835" version="1" comment="kernel-source is &lt;2.6.32.54-0.100.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991836" version="1" comment="kernel-syms is &lt;2.6.32.54-0.100.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991837" version="1" comment="kernel-trace is &lt;2.6.32.54-0.100.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991838" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.100.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991840" version="1" comment="kernel-xen is &lt;2.6.32.54-0.100.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991841" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.100.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991843" version="1" comment="kernel-default is &lt;2.6.32.54-0.103.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991844" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.103.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991846" version="1" comment="kernel-source is &lt;2.6.32.54-0.103.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991847" version="1" comment="kernel-syms is &lt;2.6.32.54-0.103.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991848" version="1" comment="kernel-trace is &lt;2.6.32.54-0.103.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991849" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.103.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991851" version="1" comment="kernel-xen is &lt;2.6.32.54-0.103.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991852" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.103.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991854" version="1" comment="kernel-default is &lt;2.6.32.54-0.106.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991855" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.106.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991857" version="1" comment="kernel-source is &lt;2.6.32.54-0.106.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991858" version="1" comment="kernel-syms is &lt;2.6.32.54-0.106.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991859" version="1" comment="kernel-trace is &lt;2.6.32.54-0.106.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991860" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.106.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991862" version="1" comment="kernel-xen is &lt;2.6.32.54-0.106.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991863" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.106.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991865" version="1" comment="kernel-default is &lt;2.6.32.54-0.109.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991866" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.109.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991868" version="1" comment="kernel-source is &lt;2.6.32.54-0.109.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991869" version="1" comment="kernel-syms is &lt;2.6.32.54-0.109.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991870" version="1" comment="kernel-trace is &lt;2.6.32.54-0.109.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991871" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.109.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991873" version="1" comment="kernel-xen is &lt;2.6.32.54-0.109.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991874" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.109.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991876" version="1" comment="kernel-default is &lt;2.6.32.54-0.112.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991877" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.112.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991879" version="1" comment="kernel-source is &lt;2.6.32.54-0.112.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991880" version="1" comment="kernel-syms is &lt;2.6.32.54-0.112.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991881" version="1" comment="kernel-trace is &lt;2.6.32.54-0.112.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991882" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.112.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991884" version="1" comment="kernel-xen is &lt;2.6.32.54-0.112.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991885" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.112.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991887" version="1" comment="kernel-default is &lt;2.6.32.54-0.116.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991888" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.116.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991890" version="1" comment="kernel-source is &lt;2.6.32.54-0.116.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991891" version="1" comment="kernel-syms is &lt;2.6.32.54-0.116.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991892" version="1" comment="kernel-trace is &lt;2.6.32.54-0.116.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991893" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.116.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991895" version="1" comment="kernel-xen is &lt;2.6.32.54-0.116.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991896" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.116.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991898" version="1" comment="kernel-default is &lt;2.6.32.54-0.119.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991899" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.119.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991901" version="1" comment="kernel-source is &lt;2.6.32.54-0.119.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991902" version="1" comment="kernel-syms is &lt;2.6.32.54-0.119.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991903" version="1" comment="kernel-trace is &lt;2.6.32.54-0.119.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991904" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.119.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991906" version="1" comment="kernel-xen is &lt;2.6.32.54-0.119.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991907" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.119.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991909" version="1" comment="kernel-default is &lt;2.6.32.54-0.122.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991910" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.122.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991912" version="1" comment="kernel-source is &lt;2.6.32.54-0.122.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991913" version="1" comment="kernel-syms is &lt;2.6.32.54-0.122.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991914" version="1" comment="kernel-trace is &lt;2.6.32.54-0.122.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991915" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.122.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991917" version="1" comment="kernel-xen is &lt;2.6.32.54-0.122.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991918" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.122.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991920" version="1" comment="kernel-default is &lt;2.6.32.54-0.130.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991921" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.130.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991923" version="1" comment="kernel-source is &lt;2.6.32.54-0.130.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991924" version="1" comment="kernel-syms is &lt;2.6.32.54-0.130.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991925" version="1" comment="kernel-trace is &lt;2.6.32.54-0.130.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991926" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.130.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991928" version="1" comment="kernel-xen is &lt;2.6.32.54-0.130.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991929" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.130.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991931" version="1" comment="xen is &lt;4.0.3_21548_18-53.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991932" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-53.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991933" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-53.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991934" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.130.TDC-53.16.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991935" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.130.TDC-53.16.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991936" version="1" comment="xen-libs is &lt;4.0.3_21548_18-53.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991937" version="1" comment="xen-tools is &lt;4.0.3_21548_18-53.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991938" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-53.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991939" version="1" comment="kernel-default is &lt;2.6.32.54-0.133.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991940" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.133.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991942" version="1" comment="kernel-source is &lt;2.6.32.54-0.133.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991943" version="1" comment="kernel-syms is &lt;2.6.32.54-0.133.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991944" version="1" comment="kernel-trace is &lt;2.6.32.54-0.133.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991945" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.133.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991947" version="1" comment="kernel-xen is &lt;2.6.32.54-0.133.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991948" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.133.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991950" version="1" comment="kernel-default is &lt;2.6.32.54-0.136.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991951" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.136.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991953" version="1" comment="kernel-source is &lt;2.6.32.54-0.136.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991954" version="1" comment="kernel-syms is &lt;2.6.32.54-0.136.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991955" version="1" comment="kernel-trace is &lt;2.6.32.54-0.136.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991956" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.136.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991958" version="1" comment="kernel-xen is &lt;2.6.32.54-0.136.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991959" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.136.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991961" version="1" comment="kernel-default is &lt;2.6.32.54-0.139.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991962" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.139.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991964" version="1" comment="kernel-source is &lt;2.6.32.54-0.139.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991965" version="1" comment="kernel-syms is &lt;2.6.32.54-0.139.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991966" version="1" comment="kernel-trace is &lt;2.6.32.54-0.139.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991967" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.139.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991969" version="1" comment="kernel-xen is &lt;2.6.32.54-0.139.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991970" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.139.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991972" version="1" comment="kernel-default is &lt;2.6.32.54-0.145.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991973" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.145.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991975" version="1" comment="kernel-source is &lt;2.6.32.54-0.145.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991976" version="1" comment="kernel-syms is &lt;2.6.32.54-0.145.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991977" version="1" comment="kernel-trace is &lt;2.6.32.54-0.145.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991978" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.145.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991980" version="1" comment="kernel-xen is &lt;2.6.32.54-0.145.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991981" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.145.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991983" version="1" comment="kernel-ec2 is &lt;2.6.32.24-0.2.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991984" version="1" comment="kernel-ec2-base is &lt;2.6.32.24-0.2.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991985" version="1" comment="kernel-default is &lt;2.6.32.54-0.91.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991986" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.91.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991988" version="1" comment="kernel-source is &lt;2.6.32.54-0.91.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991989" version="1" comment="kernel-syms is &lt;2.6.32.54-0.91.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991990" version="1" comment="kernel-trace is &lt;2.6.32.54-0.91.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991991" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.91.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991993" version="1" comment="kernel-xen is &lt;2.6.32.54-0.91.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991994" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.91.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991996" version="1" comment="kernel-default is &lt;2.6.32.54-0.97.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991997" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.97.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009991999" version="1" comment="kernel-source is &lt;2.6.32.54-0.97.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992000" version="1" comment="kernel-syms is &lt;2.6.32.54-0.97.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992001" version="1" comment="kernel-trace is &lt;2.6.32.54-0.97.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992002" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.97.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992004" version="1" comment="kernel-xen is &lt;2.6.32.54-0.97.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992005" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.97.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992007" version="1" comment="kernel-default is &lt;2.6.32.54-0.155.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992008" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.155.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992010" version="1" comment="kernel-source is &lt;2.6.32.54-0.155.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992011" version="1" comment="kernel-syms is &lt;2.6.32.54-0.155.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992012" version="1" comment="kernel-trace is &lt;2.6.32.54-0.155.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992013" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.155.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992015" version="1" comment="kernel-xen is &lt;2.6.32.54-0.155.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992016" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.155.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992018" version="1" comment="kernel-default is &lt;2.6.32.54-0.158.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992019" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.158.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992021" version="1" comment="kernel-source is &lt;2.6.32.54-0.158.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992022" version="1" comment="kernel-syms is &lt;2.6.32.54-0.158.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992023" version="1" comment="kernel-trace is &lt;2.6.32.54-0.158.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992024" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.158.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992026" version="1" comment="kernel-xen is &lt;2.6.32.54-0.158.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992027" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.158.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992029" version="1" comment="kernel-default is &lt;2.6.32.54-0.161.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992030" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.161.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992032" version="1" comment="kernel-source is &lt;2.6.32.54-0.161.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992033" version="1" comment="kernel-syms is &lt;2.6.32.54-0.161.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992034" version="1" comment="kernel-trace is &lt;2.6.32.54-0.161.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992035" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.161.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992037" version="1" comment="kernel-xen is &lt;2.6.32.54-0.161.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992038" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.161.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992040" version="1" comment="kernel-default is &lt;2.6.32.54-0.164.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992041" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.164.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992043" version="1" comment="kernel-source is &lt;2.6.32.54-0.164.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992044" version="1" comment="kernel-syms is &lt;2.6.32.54-0.164.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992045" version="1" comment="kernel-trace is &lt;2.6.32.54-0.164.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992046" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.164.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992048" version="1" comment="kernel-xen is &lt;2.6.32.54-0.164.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992049" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.164.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992051" version="1" comment="kernel-default is &lt;2.6.32.54-0.169.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992052" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.169.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992054" version="1" comment="kernel-source is &lt;2.6.32.54-0.169.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992055" version="1" comment="kernel-syms is &lt;2.6.32.54-0.169.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992056" version="1" comment="kernel-trace is &lt;2.6.32.54-0.169.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992057" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.169.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992059" version="1" comment="kernel-xen is &lt;2.6.32.54-0.169.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992060" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.169.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992062" version="1" comment="kernel-default is &lt;2.6.32.54-0.172.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992063" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.172.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992065" version="1" comment="kernel-source is &lt;2.6.32.54-0.172.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992066" version="1" comment="kernel-syms is &lt;2.6.32.54-0.172.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992067" version="1" comment="kernel-trace is &lt;2.6.32.54-0.172.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992068" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.172.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992070" version="1" comment="kernel-xen is &lt;2.6.32.54-0.172.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992071" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.172.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992073" version="1" comment="kernel-default is &lt;2.6.32.54-0.175.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992074" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.175.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992076" version="1" comment="kernel-source is &lt;2.6.32.54-0.175.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992077" version="1" comment="kernel-syms is &lt;2.6.32.54-0.175.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992078" version="1" comment="kernel-trace is &lt;2.6.32.54-0.175.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992079" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.175.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992081" version="1" comment="kernel-xen is &lt;2.6.32.54-0.175.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992082" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.175.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992084" version="1" comment="kernel-default is &lt;2.6.32.54-0.178.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992085" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.178.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992087" version="1" comment="kernel-source is &lt;2.6.32.54-0.178.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992088" version="1" comment="kernel-syms is &lt;2.6.32.54-0.178.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992089" version="1" comment="kernel-trace is &lt;2.6.32.54-0.178.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992090" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.178.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992092" version="1" comment="kernel-xen is &lt;2.6.32.54-0.178.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992093" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.178.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992095" version="1" comment="kernel-default is &lt;2.6.32.54-0.181.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992096" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.181.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992098" version="1" comment="kernel-source is &lt;2.6.32.54-0.181.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992099" version="1" comment="kernel-syms is &lt;2.6.32.54-0.181.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992100" version="1" comment="kernel-trace is &lt;2.6.32.54-0.181.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992101" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.181.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992103" version="1" comment="kernel-xen is &lt;2.6.32.54-0.181.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992104" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.181.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992106" version="1" comment="kernel-default is &lt;2.6.32.54-0.142.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992107" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.142.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992109" version="1" comment="kernel-source is &lt;2.6.32.54-0.142.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992110" version="1" comment="kernel-syms is &lt;2.6.32.54-0.142.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992111" version="1" comment="kernel-trace is &lt;2.6.32.54-0.142.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992112" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.142.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992114" version="1" comment="kernel-xen is &lt;2.6.32.54-0.142.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992115" version="1" comment="kernel-xen-base is &lt;2.6.32.54-0.142.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992117" version="1" comment="krb5 is &lt;1.6.3-133.49.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566761" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992118" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992119" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992120" version="1" comment="krb5-client is &lt;1.6.3-133.49.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572175" version="1" comment="krb5-doc is &lt;1.6.3-133.49.62.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572176" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572177" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992121" version="1" comment="krb5-server is &lt;1.6.3-133.49.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572180" version="1" comment="krb5 is &lt;1.6.3-133.49.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566764" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572181" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572182" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572183" version="1" comment="krb5-client is &lt;1.6.3-133.49.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572184" version="1" comment="krb5-doc is &lt;1.6.3-133.49.97.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572185" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.97.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572186" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.97.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572187" version="1" comment="krb5-server is &lt;1.6.3-133.49.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572188" version="1" comment="krb5 is &lt;1.6.3-133.49.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566767" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572189" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572190" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572191" version="1" comment="krb5-client is &lt;1.6.3-133.49.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572192" version="1" comment="krb5-server is &lt;1.6.3-133.49.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572193" version="1" comment="krb5 is &lt;1.6.3-133.49.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567384" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572194" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572195" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572196" version="1" comment="krb5-client is &lt;1.6.3-133.49.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572197" version="1" comment="krb5-server is &lt;1.6.3-133.49.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572198" version="1" comment="krb5 is &lt;1.6.3-133.49.109.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572199" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.109.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572200" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.109.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572201" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.109.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572202" version="1" comment="krb5-client is &lt;1.6.3-133.49.109.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572203" version="1" comment="krb5-server is &lt;1.6.3-133.49.109.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572204" version="1" comment="krb5 is &lt;1.8.6-133.49.121.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572205" version="1" comment="krb5-32bit is &lt;1.8.6-133.49.121.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572206" version="1" comment="krb5-apps-clients is &lt;1.8.6-133.49.121.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572207" version="1" comment="krb5-apps-servers is &lt;1.8.6-133.49.121.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572208" version="1" comment="krb5-client is &lt;1.8.6-133.49.121.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572209" version="1" comment="krb5-devel is &lt;1.8.6-133.49.121.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572210" version="1" comment="krb5-devel-32bit is &lt;1.8.6-133.49.121.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572211" version="1" comment="krb5-doc is &lt;1.8.6-133.49.121.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572212" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.8.6-133.49.121.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572213" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.8.6-133.49.121.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572214" version="1" comment="krb5-server is &lt;1.8.6-133.49.121.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572215" version="1" comment="krb5 is &lt;1.8.6-133.49.125.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572216" version="1" comment="krb5-32bit is &lt;1.8.6-133.49.125.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572217" version="1" comment="krb5-apps-clients is &lt;1.8.6-133.49.125.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572218" version="1" comment="krb5-apps-servers is &lt;1.8.6-133.49.125.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572219" version="1" comment="krb5-client is &lt;1.8.6-133.49.125.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572220" version="1" comment="krb5-devel is &lt;1.8.6-133.49.125.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572221" version="1" comment="krb5-devel-32bit is &lt;1.8.6-133.49.125.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572222" version="1" comment="krb5-doc is &lt;1.8.6-133.49.125.11.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572223" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.8.6-133.49.125.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572224" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.8.6-133.49.125.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572225" version="1" comment="krb5-server is &lt;1.8.6-133.49.125.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572226" version="1" comment="krb5 is &lt;1.8.6-133.49.125.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572227" version="1" comment="krb5-32bit is &lt;1.8.6-133.49.125.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572228" version="1" comment="krb5-apps-clients is &lt;1.8.6-133.49.125.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572229" version="1" comment="krb5-apps-servers is &lt;1.8.6-133.49.125.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572230" version="1" comment="krb5-client is &lt;1.8.6-133.49.125.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572231" version="1" comment="krb5-devel is &lt;1.8.6-133.49.125.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572232" version="1" comment="krb5-devel-32bit is &lt;1.8.6-133.49.125.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572233" version="1" comment="krb5-doc is &lt;1.8.6-133.49.125.16.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572234" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.8.6-133.49.125.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572235" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.8.6-133.49.125.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572236" version="1" comment="krb5-server is &lt;1.8.6-133.49.125.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572237" version="1" comment="krb5 is &lt;1.8.6-133.49.125.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572238" version="1" comment="krb5-32bit is &lt;1.8.6-133.49.125.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572239" version="1" comment="krb5-apps-clients is &lt;1.8.6-133.49.125.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572240" version="1" comment="krb5-apps-servers is &lt;1.8.6-133.49.125.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572241" version="1" comment="krb5-client is &lt;1.8.6-133.49.125.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572242" version="1" comment="krb5-devel is &lt;1.8.6-133.49.125.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572243" version="1" comment="krb5-devel-32bit is &lt;1.8.6-133.49.125.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572244" version="1" comment="krb5-doc is &lt;1.8.6-133.49.125.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572245" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.8.6-133.49.125.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572246" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.8.6-133.49.125.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572247" version="1" comment="krb5-server is &lt;1.8.6-133.49.125.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572248" version="1" comment="krb5 is &lt;1.6.3-133.49.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566770" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572249" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572250" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572251" version="1" comment="krb5-client is &lt;1.6.3-133.49.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572252" version="1" comment="krb5-doc is &lt;1.6.3-133.49.64.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572253" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572254" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572255" version="1" comment="krb5-server is &lt;1.6.3-133.49.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572256" version="1" comment="krb5 is &lt;1.6.3-133.49.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566773" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572257" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572258" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572259" version="1" comment="krb5-client is &lt;1.6.3-133.49.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572260" version="1" comment="krb5-doc is &lt;1.6.3-133.49.66.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572261" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572262" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572263" version="1" comment="krb5-server is &lt;1.6.3-133.49.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572264" version="1" comment="krb5 is &lt;1.6.3-133.49.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566776" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572265" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572266" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572267" version="1" comment="krb5-client is &lt;1.6.3-133.49.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572268" version="1" comment="krb5-doc is &lt;1.6.3-133.49.68.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572269" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572270" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572271" version="1" comment="krb5-server is &lt;1.6.3-133.49.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589768" version="1" comment="kvm is &lt;0.12.5-1.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572273" version="1" comment="kvm is &lt;0.12.5-1.30.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626551" version="1" comment="kvm is &lt;0.12.5-1.31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630649" version="1" comment="kvm is &lt;0.12.5-1.31.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572274" version="1" comment="lcms is &lt;1.17-77.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572275" version="1" comment="liblcms1 is &lt;1.17-77.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566061" version="1" comment="liblcms1-32bit is &lt;1.17-77.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572276" version="1" comment="less is &lt;424b-10.24.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572277" version="1" comment="lha is &lt;1.14.0.894-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992122" version="1" comment="libHX13 is &lt;1.23-4.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992123" version="1" comment="libHX13-32bit is &lt;1.23-4.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992124" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.20.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992125" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.20.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992126" version="1" comment="libqt4 is &lt;4.6.3-5.20.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992127" version="1" comment="libqt4-32bit is &lt;4.6.3-5.20.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992128" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.20.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992129" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.20.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992130" version="1" comment="libqt4-sql is &lt;4.6.3-5.20.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992131" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.20.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992132" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.20.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992133" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.20.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992134" version="1" comment="libqt4-x11 is &lt;4.6.3-5.20.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992135" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.20.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992136" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.20.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992137" version="1" comment="libapr-util1 is &lt;1.3.4-12.22.21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992138" version="1" comment="libapr1 is &lt;1.3.3-11.18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572282" version="1" comment="libapr-util1 is &lt;1.3.4-12.22.23.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572283" version="1" comment="libapr1 is &lt;1.3.3-11.18.19.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992139" version="1" comment="libblkid1 is &lt;2.16-6.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992140" version="1" comment="libuuid1 is &lt;2.16-6.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992141" version="1" comment="libuuid1-32bit is &lt;2.16-6.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992142" version="1" comment="util-linux is &lt;2.16-6.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992143" version="1" comment="util-linux-lang is &lt;2.16-6.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992144" version="1" comment="uuid-runtime is &lt;2.16-6.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670907" version="1" comment="libcaca is &lt;0.99.beta13b-49.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681248" version="1" comment="libcaca is &lt;0.99.beta13b-49.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992145" version="1" comment="libcap-progs is &lt;2.11-2.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992146" version="1" comment="libcap2 is &lt;2.11-2.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992147" version="1" comment="libcap2-32bit is &lt;2.11-2.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630423" version="1" comment="libcares2 is &lt;1.7.4-7.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572288" version="1" comment="libcdio7 is &lt;0.80-8.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572289" version="1" comment="libcdio7-32bit is &lt;0.80-8.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572290" version="1" comment="libcdio_cdda0 is &lt;0.80-8.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572291" version="1" comment="libcdio_paranoia0 is &lt;0.80-8.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992148" version="1" comment="libcgroup1 is &lt;0.37.1-5.14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572292" version="1" comment="libcgroup1 is &lt;0.37.1-5.19.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572293" version="1" comment="libcroco-0_6-3 is &lt;0.6.1-122.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572294" version="1" comment="libcroco-0_6-3-32bit is &lt;0.6.1-122.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631918" version="1" comment="libcroco-0_6-3 is &lt;0.6.1-122.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631919" version="1" comment="libcroco-0_6-3-32bit is &lt;0.6.1-122.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572295" version="1" comment="db-doc is &lt;4.5.20-97.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572296" version="1" comment="db-utils is &lt;4.5.20-97.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572297" version="1" comment="db-utils-doc is &lt;4.5.20-97.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572298" version="1" comment="libdb-4_5 is &lt;4.5.20-97.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572299" version="1" comment="libdb-4_5-32bit is &lt;4.5.20-97.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592414" version="1" comment="libecpg6 is &lt;9.1.12-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592415" version="1" comment="libpq5 is &lt;9.1.12-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591139" version="1" comment="libpq5-32bit is &lt;9.1.12-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592416" version="1" comment="postgresql91 is &lt;9.1.12-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592417" version="1" comment="postgresql91-contrib is &lt;9.1.12-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592418" version="1" comment="postgresql91-docs is &lt;9.1.12-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592419" version="1" comment="postgresql91-server is &lt;9.1.12-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629508" version="1" comment="libesmtp is &lt;1.0.4-157.18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572307" version="1" comment="libevent-1_4-2 is &lt;1.4.5-24.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572308" version="1" comment="libevent-1_4-2 is &lt;1.4.5-24.24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992149" version="1" comment="libexif is &lt;0.6.17-2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992150" version="1" comment="libexif-32bit is &lt;0.6.17-2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572312" version="1" comment="libexif is &lt;0.6.17-2.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572313" version="1" comment="libexif-32bit is &lt;0.6.17-2.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572314" version="1" comment="libexif is &lt;0.6.17-2.14.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572315" version="1" comment="libexif-32bit is &lt;0.6.17-2.14.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576466" version="1" comment="libfreebl3 is &lt;3.16.5-0.4.2.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576467" version="1" comment="libfreebl3-32bit is &lt;3.16.5-0.4.2.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992151" version="1" comment="mozilla-nspr is &lt;4.8.6-1.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992152" version="1" comment="mozilla-nspr-32bit is &lt;4.8.6-1.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576468" version="1" comment="mozilla-nss is &lt;3.16.5-0.4.2.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576469" version="1" comment="mozilla-nss-32bit is &lt;3.16.5-0.4.2.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576471" version="1" comment="mozilla-nss-tools is &lt;3.16.5-0.4.2.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572316" version="1" comment="libgcrypt11 is &lt;1.4.1-6.10.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572317" version="1" comment="libgcrypt11-32bit is &lt;1.4.1-6.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572318" version="1" comment="libgcrypt11 is &lt;1.4.1-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572319" version="1" comment="libgcrypt11-32bit is &lt;1.4.1-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572320" version="1" comment="libgcrypt11 is &lt;1.4.1-6.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572321" version="1" comment="libgcrypt11-32bit is &lt;1.4.1-6.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572322" version="1" comment="libgcrypt11 is &lt;1.4.1-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572323" version="1" comment="libgcrypt11-32bit is &lt;1.4.1-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572324" version="1" comment="libgcrypt11 is &lt;1.4.1-6.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572325" version="1" comment="libgcrypt11-32bit is &lt;1.4.1-6.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572326" version="1" comment="libgcrypt11 is &lt;1.4.1-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572327" version="1" comment="libgcrypt11-32bit is &lt;1.4.1-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572328" version="1" comment="libgcrypt11 is &lt;1.4.1-6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572329" version="1" comment="libgcrypt11-32bit is &lt;1.4.1-6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992153" version="1" comment="libgdiplus0 is &lt;2.0-11.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992154" version="1" comment="libgnomesu is &lt;1.0.0-307.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992155" version="1" comment="libgnomesu-lang is &lt;1.0.0-307.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992156" version="1" comment="libgnomesu0 is &lt;1.0.0-307.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992157" version="1" comment="libgssglue1 is &lt;0.1-20.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572334" version="1" comment="libical0 is &lt;0.43-1.2.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572335" version="1" comment="libical0-32bit is &lt;0.43-1.2.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572336" version="1" comment="libidn is &lt;1.10-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572337" version="1" comment="libidn-32bit is &lt;1.10-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572338" version="1" comment="libidn is &lt;1.10-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572339" version="1" comment="libidn-32bit is &lt;1.10-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572340" version="1" comment="libjasper is &lt;1.900.1-134.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566826" version="1" comment="libjasper-32bit is &lt;1.900.1-134.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572341" version="1" comment="libksba is &lt;1.0.4-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572342" version="1" comment="libksba is &lt;1.0.4-1.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572343" version="1" comment="libksba is &lt;1.0.4-1.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992158" version="1" comment="libldap-2_4-2 is &lt;2.4.20-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992159" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.20-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992160" version="1" comment="openldap2 is &lt;2.4.20-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992161" version="1" comment="openldap2-back-meta is &lt;2.4.20-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992162" version="1" comment="openldap2-client is &lt;2.4.20-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572350" version="1" comment="liblouis is &lt;1.7.0-1.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572351" version="1" comment="liblouis0 is &lt;1.7.0-1.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572352" version="1" comment="python-louis is &lt;1.7.0-1.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572353" version="1" comment="liblouis is &lt;1.7.0-1.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572354" version="1" comment="liblouis0 is &lt;1.7.0-1.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572355" version="1" comment="python-louis is &lt;1.7.0-1.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572356" version="1" comment="liblouis is &lt;1.7.0-1.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572357" version="1" comment="liblouis0 is &lt;1.7.0-1.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572358" version="1" comment="python-louis is &lt;1.7.0-1.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572359" version="1" comment="liblouis is &lt;1.7.0-1.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572360" version="1" comment="liblouis0 is &lt;1.7.0-1.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572361" version="1" comment="python-louis is &lt;1.7.0-1.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572362" version="1" comment="liblouis is &lt;1.7.0-1.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572363" version="1" comment="liblouis0 is &lt;1.7.0-1.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572364" version="1" comment="python-louis is &lt;1.7.0-1.3.19.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572365" version="1" comment="liblzo2-2 is &lt;2.03-12.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572366" version="1" comment="liblzo2-2-32bit is &lt;2.03-12.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572367" version="1" comment="libmpfr1 is &lt;2.3.2-3.118.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563448" version="1" comment="libmpfr1-32bit is &lt;2.3.2-3.118.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572368" version="1" comment="libmspack0 is &lt;0.0.20060920alpha-74.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572369" version="1" comment="libmspack0 is &lt;0.0.20060920alpha-74.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572370" version="1" comment="libmspack0 is &lt;0.0.20060920alpha-74.11.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572371" version="1" comment="libmspack0 is &lt;0.0.20060920alpha-74.11.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992163" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992164" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992165" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992166" version="1" comment="mysql is &lt;5.0.96-0.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992167" version="1" comment="mysql-Max is &lt;5.0.96-0.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992168" version="1" comment="mysql-client is &lt;5.0.96-0.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992169" version="1" comment="mysql-tools is &lt;5.0.96-0.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572380" version="1" comment="libnl is &lt;1.1-49.22.6.3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572381" version="1" comment="libnl-32bit is &lt;1.1-49.22.6.3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992170" version="1" comment="libopensc2 is &lt;0.11.6-5.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992171" version="1" comment="libopensc2-32bit is &lt;0.11.6-5.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992172" version="1" comment="opensc is &lt;0.11.6-5.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992173" version="1" comment="opensc-32bit is &lt;0.11.6-5.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572388" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.66.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992174" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.66.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992175" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.66.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992176" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.66.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992177" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.66.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992178" version="1" comment="openssl is &lt;0.9.8j-0.66.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992179" version="1" comment="openssl-doc is &lt;0.9.8j-0.66.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572397" version="1" comment="libotr2 is &lt;3.2.0-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572398" version="1" comment="libotr2 is &lt;3.2.0-10.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992180" version="1" comment="libpciaccess0 is &lt;7.4-8.26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992181" version="1" comment="libpciaccess0-32bit is &lt;7.4-8.26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992182" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992183" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572405" version="1" comment="libpixman-1-0 is &lt;0.16.0-1.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566118" version="1" comment="libpixman-1-0-32bit is &lt;0.16.0-1.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992184" version="1" comment="libpng12-0 is &lt;1.2.31-5.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566850" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992185" version="1" comment="libpng12-0 is &lt;1.2.31-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992186" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572412" version="1" comment="libpng12-0 is &lt;1.2.31-5.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566852" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572413" version="1" comment="libpng12-0 is &lt;1.2.31-5.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566854" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572414" version="1" comment="libpng12-0 is &lt;1.2.31-5.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572415" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572416" version="1" comment="libpng12-0 is &lt;1.2.31-5.44.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572417" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.44.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992187" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992188" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992189" version="1" comment="libpoppler5 is &lt;0.12.3-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992190" version="1" comment="poppler-tools is &lt;0.12.3-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572422" version="1" comment="libproxy0 is &lt;0.3.1-2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566124" version="1" comment="libproxy0-32bit is &lt;0.3.1-2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572423" version="1" comment="libproxy0-config-gnome is &lt;0.3.1-2.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572424" version="1" comment="libproxy0-config-kde4 is &lt;0.3.1-2.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572425" version="1" comment="libproxy0-networkmanager is &lt;0.3.1-2.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572426" version="1" comment="libpulse-browse0 is &lt;0.9.21-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572427" version="1" comment="libpulse-mainloop-glib0 is &lt;0.9.21-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572428" version="1" comment="libpulse0 is &lt;0.9.21-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572429" version="1" comment="libpulse0-32bit is &lt;0.9.21-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572430" version="1" comment="pulseaudio is &lt;0.9.21-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572431" version="1" comment="pulseaudio-esound-compat is &lt;0.9.21-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572432" version="1" comment="pulseaudio-gdm-hooks is &lt;0.9.21-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572433" version="1" comment="pulseaudio-lang is &lt;0.9.21-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572434" version="1" comment="pulseaudio-module-x11 is &lt;0.9.21-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572435" version="1" comment="pulseaudio-module-zeroconf is &lt;0.9.21-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572436" version="1" comment="pulseaudio-utils is &lt;0.9.21-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992191" version="1" comment="libpython2_6-1_0 is &lt;2.6.8-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992192" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.8-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992193" version="1" comment="python is &lt;2.6.8-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992194" version="1" comment="python-32bit is &lt;2.6.8-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992195" version="1" comment="python-base is &lt;2.6.8-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992196" version="1" comment="python-base-32bit is &lt;2.6.8-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992197" version="1" comment="python-curses is &lt;2.6.8-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992198" version="1" comment="python-demo is &lt;2.6.8-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992199" version="1" comment="python-gdbm is &lt;2.6.8-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992200" version="1" comment="python-idle is &lt;2.6.8-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992201" version="1" comment="python-tk is &lt;2.6.8-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992202" version="1" comment="python-xml is &lt;2.6.8-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572437" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.20.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572438" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.20.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572439" version="1" comment="libqt4 is &lt;4.6.3-5.20.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572440" version="1" comment="libqt4-32bit is &lt;4.6.3-5.20.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572441" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.20.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572442" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.20.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572443" version="1" comment="libqt4-sql is &lt;4.6.3-5.20.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572444" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.20.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572445" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.20.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572446" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.20.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572447" version="1" comment="libqt4-x11 is &lt;4.6.3-5.20.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572448" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.20.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572449" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.20.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992203" version="1" comment="libraptor1 is &lt;1.4.18-28.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992204" version="1" comment="libneon27 is &lt;0.29.6-6.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572452" version="1" comment="libneon27-32bit is &lt;0.29.6-6.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992205" version="1" comment="librsvg is &lt;2.26.0-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992206" version="1" comment="librsvg-32bit is &lt;2.26.0-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992207" version="1" comment="rsvg-view is &lt;2.26.0-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572457" version="1" comment="librsvg is &lt;2.26.0-2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566910" version="1" comment="librsvg-32bit is &lt;2.26.0-2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572458" version="1" comment="rsvg-view is &lt;2.26.0-2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572459" version="1" comment="libcroco-0_6-3 is &lt;0.6.1-122.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572460" version="1" comment="libcroco-0_6-3-32bit is &lt;0.6.1-122.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572461" version="1" comment="librsvg is &lt;2.26.0-2.6.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572462" version="1" comment="librsvg-32bit is &lt;2.26.0-2.6.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572463" version="1" comment="rsvg-view is &lt;2.26.0-2.6.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572464" version="1" comment="libsamplerate is &lt;0.1.4-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572465" version="1" comment="libsamplerate-32bit is &lt;0.1.4-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992208" version="1" comment="libsndfile is &lt;1.0.20-2.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992209" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572469" version="1" comment="libsndfile is &lt;1.0.20-2.10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566915" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572470" version="1" comment="libsndfile is &lt;1.0.20-2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572471" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572472" version="1" comment="libsndfile is &lt;1.0.20-2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572473" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572474" version="1" comment="libsndfile is &lt;1.0.20-2.19.7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572475" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.19.7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572476" version="1" comment="libsndfile is &lt;1.0.20-2.19.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572477" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.19.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626760" version="1" comment="libsndfile is &lt;1.0.20-2.19.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626761" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.19.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662523" version="1" comment="libsndfile is &lt;1.0.20-2.19.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662524" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.19.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992210" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563659" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992211" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992212" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992213" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992214" version="1" comment="libsoup-2_4-1 is &lt;2.28.2-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992215" version="1" comment="libsoup-2_4-1-32bit is &lt;2.28.2-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572487" version="1" comment="libsoup-2_4-1 is &lt;2.28.2-0.3.3.39 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572488" version="1" comment="libsoup-2_4-1-32bit is &lt;2.28.2-0.3.3.39 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992216" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572489" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572490" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.12.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572491" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.12.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572492" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.12.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572493" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.12.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572494" version="1" comment="libtasn1 is &lt;1.5-1.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572495" version="1" comment="libtasn1-3 is &lt;1.5-1.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566923" version="1" comment="libtasn1-3-32bit is &lt;1.5-1.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572496" version="1" comment="libtasn1 is &lt;1.5-1.35.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572497" version="1" comment="libtasn1-3 is &lt;1.5-1.35.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572498" version="1" comment="libtasn1-3-32bit is &lt;1.5-1.35.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572499" version="1" comment="libtcnative-1-0 is &lt;1.3.3-12.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572500" version="1" comment="tomcat6 is &lt;6.0.41-0.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572501" version="1" comment="tomcat6-admin-webapps is &lt;6.0.41-0.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572502" version="1" comment="tomcat6-docs-webapp is &lt;6.0.41-0.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572503" version="1" comment="tomcat6-javadoc is &lt;6.0.41-0.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572504" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.41-0.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572505" version="1" comment="tomcat6-lib is &lt;6.0.41-0.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572506" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.41-0.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572507" version="1" comment="tomcat6-webapps is &lt;6.0.41-0.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572508" version="1" comment="libtcnative-1-0 is &lt;1.3.3-12.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572509" version="1" comment="libtcnative-1-0 is &lt;1.3.4-12.5.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992217" version="1" comment="libtiff3 is &lt;3.8.2-141.154.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566132" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.154.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992218" version="1" comment="tiff is &lt;3.8.2-141.154.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572514" version="1" comment="libtirpc1 is &lt;0.2.1-1.12.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572515" version="1" comment="rpcbind is &lt;0.1.6+git20080930-8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572516" version="1" comment="libtirpc1 is &lt;0.2.1-1.13.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572517" version="1" comment="libtirpc1 is &lt;0.2.1-1.13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572518" version="1" comment="libunwind is &lt;0.98.6-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572519" version="1" comment="libunwind-devel is &lt;0.98.6-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992219" version="1" comment="libupsclient1 is &lt;2.6.2-0.2.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992220" version="1" comment="nut is &lt;2.6.2-0.2.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992221" version="1" comment="nut-classic is &lt;2.6.2-0.2.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992222" version="1" comment="nut-drivers-net is &lt;2.6.2-0.2.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992223" version="1" comment="libvirt is &lt;0.7.6-1.31.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992224" version="1" comment="libvirt-doc is &lt;0.7.6-1.31.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992225" version="1" comment="libvirt-python is &lt;0.7.6-1.31.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572524" version="1" comment="LibVNCServer is &lt;0.9.1-156.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992226" version="1" comment="libvorbis is &lt;1.2.0-79.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992227" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992228" version="1" comment="libvorbis-doc is &lt;1.2.0-79.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572529" version="1" comment="libvorbis is &lt;1.2.0-79.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572530" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572531" version="1" comment="libvorbis-doc is &lt;1.2.0-79.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572532" version="1" comment="libvorbis is &lt;1.2.0-79.20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572533" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572534" version="1" comment="libvorbis-doc is &lt;1.2.0-79.20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572535" version="1" comment="libvorbis is &lt;1.2.0-79.20.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572536" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.20.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572537" version="1" comment="libvorbis-doc is &lt;1.2.0-79.20.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572538" version="1" comment="libvorbis is &lt;1.2.0-79.20.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572539" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.20.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572540" version="1" comment="libvorbis-doc is &lt;1.2.0-79.20.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572541" version="1" comment="libwsman1 is &lt;2.2.3-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572542" version="1" comment="openwsman-client is &lt;2.2.3-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572543" version="1" comment="openwsman-server is &lt;2.2.3-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992229" version="1" comment="libxcrypt is &lt;3.0.3-0.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992230" version="1" comment="libxcrypt-32bit is &lt;3.0.3-0.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992231" version="1" comment="libxml2 is &lt;2.7.6-0.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992232" version="1" comment="libxml2-32bit is &lt;2.7.6-0.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992233" version="1" comment="libxml2-doc is &lt;2.7.6-0.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588203" version="1" comment="libxml2-python is &lt;2.7.6-0.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572552" version="1" comment="libxml2 is &lt;2.7.6-0.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572553" version="1" comment="libxml2-32bit is &lt;2.7.6-0.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572554" version="1" comment="libxml2-doc is &lt;2.7.6-0.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572555" version="1" comment="libxml2-python is &lt;2.7.6-0.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572556" version="1" comment="libxml2 is &lt;2.7.6-0.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572557" version="1" comment="libxml2-32bit is &lt;2.7.6-0.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572558" version="1" comment="libxml2-doc is &lt;2.7.6-0.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572559" version="1" comment="libxml2-python is &lt;2.7.6-0.44.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992234" version="1" comment="libxml2 is &lt;2.7.6-0.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992235" version="1" comment="libxml2-32bit is &lt;2.7.6-0.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992236" version="1" comment="libxml2-doc is &lt;2.7.6-0.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992237" version="1" comment="libxml2-python is &lt;2.7.6-0.47.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572560" version="1" comment="libxml2 is &lt;2.7.6-0.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572561" version="1" comment="libxml2-32bit is &lt;2.7.6-0.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572562" version="1" comment="libxml2-doc is &lt;2.7.6-0.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572563" version="1" comment="libxml2-python is &lt;2.7.6-0.50.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572564" version="1" comment="libxml2 is &lt;2.7.6-0.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572565" version="1" comment="libxml2-32bit is &lt;2.7.6-0.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572566" version="1" comment="libxml2-doc is &lt;2.7.6-0.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572567" version="1" comment="libxml2-python is &lt;2.7.6-0.64.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572568" version="1" comment="libxml2 is &lt;2.7.6-0.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572569" version="1" comment="libxml2-32bit is &lt;2.7.6-0.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572570" version="1" comment="libxml2-doc is &lt;2.7.6-0.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572571" version="1" comment="libxml2-python is &lt;2.7.6-0.69.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572572" version="1" comment="libxml2 is &lt;2.7.6-0.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572573" version="1" comment="libxml2-32bit is &lt;2.7.6-0.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572574" version="1" comment="libxml2-doc is &lt;2.7.6-0.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572575" version="1" comment="libxml2-python is &lt;2.7.6-0.76.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572576" version="1" comment="libxml2 is &lt;2.7.6-0.77.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572577" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572578" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572579" version="1" comment="libxml2-python is &lt;2.7.6-0.77.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572580" version="1" comment="libxml2 is &lt;2.7.6-0.77.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572581" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572582" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572583" version="1" comment="libxml2-python is &lt;2.7.6-0.77.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572584" version="1" comment="libxml2 is &lt;2.7.6-0.77.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572585" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572586" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572587" version="1" comment="libxml2-python is &lt;2.7.6-0.77.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572588" version="1" comment="libxml2 is &lt;2.7.6-0.77.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572589" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572590" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572591" version="1" comment="libxml2-python is &lt;2.7.6-0.77.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572592" version="1" comment="libxml2 is &lt;2.7.6-0.77.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572593" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572594" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572595" version="1" comment="libxml2-python is &lt;2.7.6-0.77.27.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572596" version="1" comment="libxml2 is &lt;2.7.6-0.77.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572597" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572598" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572599" version="1" comment="libxml2-python is &lt;2.7.6-0.77.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572600" version="1" comment="libxml2 is &lt;2.7.6-0.77.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572601" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572602" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572603" version="1" comment="libxml2-python is &lt;2.7.6-0.77.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572604" version="1" comment="libxml2 is &lt;2.7.6-0.77.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572605" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572606" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572607" version="1" comment="libxml2-python is &lt;2.7.6-0.77.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572608" version="1" comment="libxml2 is &lt;2.7.6-0.77.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572609" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572610" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572611" version="1" comment="libxml2-python is &lt;2.7.6-0.77.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670908" version="1" comment="libxml2 is &lt;2.7.6-0.77.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670909" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670910" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670911" version="1" comment="libxml2-python is &lt;2.7.6-0.77.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572612" version="1" comment="libxml2 is &lt;2.7.6-0.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566940" version="1" comment="libxml2-32bit is &lt;2.7.6-0.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572613" version="1" comment="libxml2-doc is &lt;2.7.6-0.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572614" version="1" comment="libxml2-python is &lt;2.7.6-0.34.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572615" version="1" comment="libxml2 is &lt;2.7.6-0.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566943" version="1" comment="libxml2-32bit is &lt;2.7.6-0.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572616" version="1" comment="libxml2-doc is &lt;2.7.6-0.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572617" version="1" comment="libxml2-python is &lt;2.7.6-0.37.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992238" version="1" comment="libxslt is &lt;1.1.24-19.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566147" version="1" comment="libxslt-32bit is &lt;1.1.24-19.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572621" version="1" comment="libxslt is &lt;1.1.24-19.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572622" version="1" comment="libxslt-32bit is &lt;1.1.24-19.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572623" version="1" comment="libxslt is &lt;1.1.24-19.34.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572624" version="1" comment="libxslt-32bit is &lt;1.1.24-19.34.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572625" version="1" comment="libxslt is &lt;1.1.24-19.34.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572626" version="1" comment="libxslt-32bit is &lt;1.1.24-19.34.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992239" version="1" comment="libzip1 is &lt;0.9-1.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992240" version="1" comment="libzypp is &lt;6.39.0-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568460" version="1" comment="log4j is &lt;1.2.15-26.32.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660155" version="1" comment="log4j is &lt;1.2.15-26.32.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664707" version="1" comment="log4j is &lt;1.2.15-26.32.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992241" version="1" comment="logrotate is &lt;3.7.7-10.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992242" version="1" comment="logwatch is &lt;7.3.6-65.72.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992243" version="1" comment="lvm2 is &lt;2.02.39-18.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992244" version="1" comment="mailman is &lt;2.1.14-9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572629" version="1" comment="mailman is &lt;2.1.15-9.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572630" version="1" comment="mailman is &lt;2.1.15-9.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572631" version="1" comment="mailman is &lt;2.1.15-9.6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572632" version="1" comment="mailman is &lt;2.1.15-9.6.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572633" version="1" comment="mailman is &lt;2.1.15-9.6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572634" version="1" comment="mailman is &lt;2.1.15-9.6.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572635" version="1" comment="mailman is &lt;2.1.15-9.6.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992245" version="1" comment="mailx is &lt;12.5-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992246" version="1" comment="man-pages is &lt;3.15-2.20.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572636" version="1" comment="MozillaFirefox is &lt;45.5.1esr-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572637" version="1" comment="MozillaFirefox-translations is &lt;45.5.1esr-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572638" version="1" comment="libfreebl3 is &lt;3.21.3-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572639" version="1" comment="libfreebl3-32bit is &lt;3.21.3-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572640" version="1" comment="mozilla-nss is &lt;3.21.3-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572641" version="1" comment="mozilla-nss-32bit is &lt;3.21.3-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572642" version="1" comment="mozilla-nss-tools is &lt;3.21.3-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572643" version="1" comment="g3utils is &lt;1.1.36-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572644" version="1" comment="mgetty is &lt;1.1.36-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572645" version="1" comment="g3utils is &lt;1.1.36-28.6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572646" version="1" comment="mgetty is &lt;1.1.36-28.6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572647" version="1" comment="microcode_ctl is &lt;1.17-102.57.64.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572648" version="1" comment="microcode_ctl is &lt;1.17-102.57.64.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572649" version="1" comment="microcode_ctl is &lt;1.17-102.57.64.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572650" version="1" comment="microcode_ctl is &lt;1.17-102.57.64.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572651" version="1" comment="microcode_ctl is &lt;1.17-102.57.64.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572652" version="1" comment="microcode_ctl is &lt;1.17-102.57.64.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572653" version="1" comment="minicom is &lt;2.3-27.24.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992247" version="1" comment="mipv6d is &lt;2.0.2-2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572654" version="1" comment="mono-core is &lt;2.0.1-1.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572655" version="1" comment="mono-data is &lt;2.0.1-1.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572656" version="1" comment="mono-data-postgresql is &lt;2.0.1-1.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572657" version="1" comment="mono-data-sqlite is &lt;2.0.1-1.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572658" version="1" comment="mono-locale-extras is &lt;2.0.1-1.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572659" version="1" comment="mono-nunit is &lt;2.0.1-1.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572660" version="1" comment="mono-web is &lt;2.0.1-1.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572661" version="1" comment="mono-winforms is &lt;2.0.1-1.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572662" version="1" comment="MozillaFirefox is &lt;38.6.1esr-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572663" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-15.58 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572664" version="1" comment="MozillaFirefox-translations is &lt;38.6.1esr-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572665" version="1" comment="libfreebl3 is &lt;3.20.2-17.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572666" version="1" comment="libfreebl3-32bit is &lt;3.20.2-17.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572667" version="1" comment="mozilla-nss is &lt;3.20.2-17.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572668" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-17.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572669" version="1" comment="mozilla-nss-tools is &lt;3.20.2-17.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572670" version="1" comment="MozillaFirefox is &lt;38.2.0esr-10.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572671" version="1" comment="MozillaFirefox-branding-SLED is &lt;31.0-0.5.7.11 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572672" version="1" comment="MozillaFirefox-translations is &lt;38.2.0esr-10.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572673" version="1" comment="firefox-libgcc_s1 is &lt;4.7.2_20130108-0.37.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572674" version="1" comment="firefox-libstdc++6 is &lt;4.7.2_20130108-0.37.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572675" version="1" comment="libfreebl3 is &lt;3.19.2.0-0.7.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572676" version="1" comment="libfreebl3-32bit is &lt;3.19.2.0-0.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572677" version="1" comment="mozilla-nss is &lt;3.19.2.0-0.7.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572678" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.0-0.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572679" version="1" comment="mozilla-nss-devel is &lt;3.19.2.0-0.7.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572680" version="1" comment="mozilla-nss-tools is &lt;3.19.2.0-0.7.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572681" version="1" comment="mozilla-nspr is &lt;4.10.8-0.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572682" version="1" comment="mozilla-nspr-32bit is &lt;4.10.8-0.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572683" version="1" comment="mozilla-nspr-devel is &lt;4.10.8-0.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659163" version="1" comment="libfreebl3 is &lt;3.68.1-38.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659164" version="1" comment="libfreebl3-32bit is &lt;3.68.1-38.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659165" version="1" comment="libsoftokn3 is &lt;3.68.1-38.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659166" version="1" comment="libsoftokn3-32bit is &lt;3.68.1-38.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659167" version="1" comment="mozilla-nss is &lt;3.68.1-38.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659168" version="1" comment="mozilla-nss-32bit is &lt;3.68.1-38.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659169" version="1" comment="mozilla-nss-certs is &lt;3.68.1-38.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659170" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68.1-38.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659171" version="1" comment="mozilla-nss-tools is &lt;3.68.1-38.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572684" version="1" comment="libfreebl3 is &lt;3.15.2-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572685" version="1" comment="libfreebl3-32bit is &lt;3.15.2-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572686" version="1" comment="mozilla-nspr is &lt;4.10.1-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572687" version="1" comment="mozilla-nspr-32bit is &lt;4.10.1-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572688" version="1" comment="mozilla-nss is &lt;3.15.2-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572689" version="1" comment="mozilla-nss-32bit is &lt;3.15.2-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572690" version="1" comment="mozilla-nss-tools is &lt;3.15.2-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572691" version="1" comment="libfreebl3 is &lt;3.53.1-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572692" version="1" comment="libfreebl3-32bit is &lt;3.53.1-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572693" version="1" comment="libsoftokn3 is &lt;3.53.1-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572694" version="1" comment="libsoftokn3-32bit is &lt;3.53.1-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572695" version="1" comment="mozilla-nspr is &lt;4.25-29.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572696" version="1" comment="mozilla-nspr-32bit is &lt;4.25-29.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572697" version="1" comment="mozilla-nss is &lt;3.53.1-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572698" version="1" comment="mozilla-nss-32bit is &lt;3.53.1-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572699" version="1" comment="mozilla-nss-certs is &lt;3.53.1-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572700" version="1" comment="mozilla-nss-certs-32bit is &lt;3.53.1-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572701" version="1" comment="mozilla-nss-tools is &lt;3.53.1-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634778" version="1" comment="libfreebl3 is &lt;3.68-38.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634779" version="1" comment="libfreebl3-32bit is &lt;3.68-38.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634780" version="1" comment="libsoftokn3 is &lt;3.68-38.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634781" version="1" comment="libsoftokn3-32bit is &lt;3.68-38.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634782" version="1" comment="mozilla-nspr is &lt;4.32-29.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634783" version="1" comment="mozilla-nspr-32bit is &lt;4.32-29.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634784" version="1" comment="mozilla-nss is &lt;3.68-38.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634785" version="1" comment="mozilla-nss-32bit is &lt;3.68-38.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634786" version="1" comment="mozilla-nss-certs is &lt;3.68-38.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634787" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68-38.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634788" version="1" comment="mozilla-nss-tools is &lt;3.68-38.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992248" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.19-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992249" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.19-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992250" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.19-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992251" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.19-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992252" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.27-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992253" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.27-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992254" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.27-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992255" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.27-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572712" version="1" comment="mutt is &lt;1.5.17-42.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572713" version="1" comment="mutt is &lt;1.5.17-42.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572714" version="1" comment="mutt is &lt;1.5.17-42.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572715" version="1" comment="mutt is &lt;1.5.17-42.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572716" version="1" comment="mutt is &lt;1.5.17-42.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680095" version="1" comment="mutt is &lt;1.5.17-42.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572717" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.8.10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572718" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.8.10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572719" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.8.10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572720" version="1" comment="mysql is &lt;5.0.96-0.8.10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572721" version="1" comment="mysql-Max is &lt;5.0.96-0.8.10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572722" version="1" comment="mysql-client is &lt;5.0.96-0.8.10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572723" version="1" comment="mysql-tools is &lt;5.0.96-0.8.10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992256" version="1" comment="nagios is &lt;3.0.6-1.25.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992257" version="1" comment="nagios-www is &lt;3.0.6-1.25.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572724" version="1" comment="nagios is &lt;3.0.6-1.25.36.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572725" version="1" comment="nagios-www is &lt;3.0.6-1.25.36.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992258" version="1" comment="nagios-nrpe is &lt;2.12-24.4.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992259" version="1" comment="nagios-nrpe-doc is &lt;2.12-24.4.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992260" version="1" comment="nagios-plugins-nrpe is &lt;2.12-24.4.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572726" version="1" comment="nagios-nrpe is &lt;2.12-24.4.10.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572727" version="1" comment="nagios-nrpe-doc is &lt;2.12-24.4.10.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572728" version="1" comment="nagios-plugins-nrpe is &lt;2.12-24.4.10.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572729" version="1" comment="nautilus is &lt;2.28.4-1.16.21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572730" version="1" comment="nautilus-32bit is &lt;2.28.4-1.16.21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572731" version="1" comment="nautilus-lang is &lt;2.28.4-1.16.21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572732" version="1" comment="libncurses5 is &lt;5.6-92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572733" version="1" comment="libncurses5-32bit is &lt;5.6-92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572734" version="1" comment="libncurses6 is &lt;5.6-92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572735" version="1" comment="libncurses6-32bit is &lt;5.6-92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572736" version="1" comment="ncurses-devel is &lt;5.6-92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565005" version="1" comment="ncurses-devel-32bit is &lt;5.6-92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572737" version="1" comment="ncurses-utils is &lt;5.6-92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572738" version="1" comment="tack is &lt;5.6-92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572739" version="1" comment="terminfo is &lt;5.6-92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572740" version="1" comment="terminfo-base is &lt;5.6-92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572741" version="1" comment="libncurses5 is &lt;5.6-93.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572742" version="1" comment="libncurses5-32bit is &lt;5.6-93.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572743" version="1" comment="libncurses6 is &lt;5.6-93.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572744" version="1" comment="libncurses6-32bit is &lt;5.6-93.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572745" version="1" comment="ncurses-devel is &lt;5.6-93.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565008" version="1" comment="ncurses-devel-32bit is &lt;5.6-93.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572746" version="1" comment="ncurses-utils is &lt;5.6-93.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572747" version="1" comment="tack is &lt;5.6-93.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572748" version="1" comment="terminfo is &lt;5.6-93.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572749" version="1" comment="terminfo-base is &lt;5.6-93.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572750" version="1" comment="libncurses5 is &lt;5.6-93.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572751" version="1" comment="libncurses5-32bit is &lt;5.6-93.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572752" version="1" comment="libncurses6 is &lt;5.6-93.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572753" version="1" comment="libncurses6-32bit is &lt;5.6-93.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572754" version="1" comment="ncurses-devel is &lt;5.6-93.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565011" version="1" comment="ncurses-devel-32bit is &lt;5.6-93.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572755" version="1" comment="ncurses-utils is &lt;5.6-93.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572756" version="1" comment="tack is &lt;5.6-93.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572757" version="1" comment="terminfo is &lt;5.6-93.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572758" version="1" comment="terminfo-base is &lt;5.6-93.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572759" version="1" comment="libncurses5 is &lt;5.6-93.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572760" version="1" comment="libncurses5-32bit is &lt;5.6-93.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572761" version="1" comment="libncurses6 is &lt;5.6-93.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572762" version="1" comment="libncurses6-32bit is &lt;5.6-93.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572763" version="1" comment="ncurses-devel is &lt;5.6-93.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565014" version="1" comment="ncurses-devel-32bit is &lt;5.6-93.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572764" version="1" comment="ncurses-utils is &lt;5.6-93.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572765" version="1" comment="tack is &lt;5.6-93.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572766" version="1" comment="terminfo is &lt;5.6-93.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572767" version="1" comment="terminfo-base is &lt;5.6-93.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572768" version="1" comment="libncurses5 is &lt;5.6-93.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572769" version="1" comment="libncurses5-32bit is &lt;5.6-93.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572770" version="1" comment="libncurses6 is &lt;5.6-93.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572771" version="1" comment="libncurses6-32bit is &lt;5.6-93.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572772" version="1" comment="ncurses-devel is &lt;5.6-93.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572773" version="1" comment="ncurses-devel-32bit is &lt;5.6-93.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572774" version="1" comment="ncurses-utils is &lt;5.6-93.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572775" version="1" comment="tack is &lt;5.6-93.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572776" version="1" comment="terminfo is &lt;5.6-93.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572777" version="1" comment="terminfo-base is &lt;5.6-93.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572778" version="1" comment="libncurses5 is &lt;5.6-93.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572779" version="1" comment="libncurses5-32bit is &lt;5.6-93.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572780" version="1" comment="libncurses6 is &lt;5.6-93.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572781" version="1" comment="libncurses6-32bit is &lt;5.6-93.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572782" version="1" comment="ncurses-devel is &lt;5.6-93.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572783" version="1" comment="ncurses-devel-32bit is &lt;5.6-93.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572784" version="1" comment="ncurses-utils is &lt;5.6-93.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572785" version="1" comment="tack is &lt;5.6-93.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572786" version="1" comment="terminfo is &lt;5.6-93.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572787" version="1" comment="terminfo-base is &lt;5.6-93.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652290" version="1" comment="libncurses5 is &lt;5.6-93.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652291" version="1" comment="libncurses5-32bit is &lt;5.6-93.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652292" version="1" comment="libncurses6 is &lt;5.6-93.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652293" version="1" comment="libncurses6-32bit is &lt;5.6-93.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652294" version="1" comment="ncurses-devel is &lt;5.6-93.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652295" version="1" comment="ncurses-devel-32bit is &lt;5.6-93.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652296" version="1" comment="ncurses-utils is &lt;5.6-93.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652297" version="1" comment="tack is &lt;5.6-93.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652298" version="1" comment="terminfo is &lt;5.6-93.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652299" version="1" comment="terminfo-base is &lt;5.6-93.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572788" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563731" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572789" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572790" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572791" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572792" version="1" comment="libnetpbm10 is &lt;10.26.44-101.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572793" version="1" comment="libnetpbm10-32bit is &lt;10.26.44-101.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572794" version="1" comment="netpbm is &lt;10.26.44-101.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572795" version="1" comment="libnetpbm10 is &lt;10.26.44-101.15.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572796" version="1" comment="libnetpbm10-32bit is &lt;10.26.44-101.15.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572797" version="1" comment="netpbm is &lt;10.26.44-101.15.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992261" version="1" comment="nfs-client is &lt;1.2.1-2.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992262" version="1" comment="nfs-doc is &lt;1.2.1-2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992263" version="1" comment="nfs-kernel-server is &lt;1.2.1-2.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572798" version="1" comment="nmap is &lt;4.75-1.30.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572799" version="1" comment="libfreebl3 is &lt;3.15.3-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572800" version="1" comment="libfreebl3-32bit is &lt;3.15.3-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572801" version="1" comment="mozilla-nspr is &lt;4.10.2-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572802" version="1" comment="mozilla-nspr-32bit is &lt;4.10.2-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572803" version="1" comment="mozilla-nss is &lt;3.15.3-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572804" version="1" comment="mozilla-nss-32bit is &lt;3.15.3-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572805" version="1" comment="mozilla-nss-tools is &lt;3.15.3-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572806" version="1" comment="libfreebl3 is &lt;3.15.3.1-0.4.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566163" version="1" comment="libfreebl3-32bit is &lt;3.15.3.1-0.4.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572807" version="1" comment="mozilla-nss is &lt;3.15.3.1-0.4.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566165" version="1" comment="mozilla-nss-32bit is &lt;3.15.3.1-0.4.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572808" version="1" comment="mozilla-nss-tools is &lt;3.15.3.1-0.4.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992264" version="1" comment="libfreebl3 is &lt;3.12.11-3.2.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992265" version="1" comment="libfreebl3-32bit is &lt;3.12.11-3.2.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992266" version="1" comment="mozilla-nspr is &lt;4.8.9-1.2.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992267" version="1" comment="mozilla-nspr-32bit is &lt;4.8.9-1.2.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992268" version="1" comment="mozilla-nss is &lt;3.12.11-3.2.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992269" version="1" comment="mozilla-nss-32bit is &lt;3.12.11-3.2.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992270" version="1" comment="mozilla-nss-tools is &lt;3.12.11-3.2.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992271" version="1" comment="ntp is &lt;4.2.4p8-1.24.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992272" version="1" comment="ntp-doc is &lt;4.2.4p8-1.24.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572819" version="1" comment="ntp is &lt;4.2.8p6-41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572820" version="1" comment="ntp-doc is &lt;4.2.8p6-41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572821" version="1" comment="yast2-ntp-client is &lt;2.17.14.1-1.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572822" version="1" comment="ntp is &lt;4.2.8p7-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572823" version="1" comment="ntp-doc is &lt;4.2.8p7-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572824" version="1" comment="libtasn1 is &lt;1.5-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572825" version="1" comment="libtasn1-3 is &lt;1.5-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572826" version="1" comment="libtasn1-3-32bit is &lt;1.5-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572827" version="1" comment="ntp is &lt;4.2.8p8-47.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572828" version="1" comment="ntp-doc is &lt;4.2.8p8-47.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572829" version="1" comment="ntp is &lt;4.2.8p9-48.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572830" version="1" comment="ntp-doc is &lt;4.2.8p9-48.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572831" version="1" comment="ntp is &lt;4.2.8p10-48.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572832" version="1" comment="ntp-doc is &lt;4.2.8p10-48.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572833" version="1" comment="ntp is &lt;4.2.8p11-48.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572834" version="1" comment="ntp-doc is &lt;4.2.8p11-48.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572835" version="1" comment="ntp is &lt;4.2.8p12-48.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572836" version="1" comment="ntp-doc is &lt;4.2.8p12-48.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572837" version="1" comment="ntp is &lt;4.2.8p13-48.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572838" version="1" comment="ntp-doc is &lt;4.2.8p13-48.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572839" version="1" comment="ntp is &lt;4.2.8p15-48.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572840" version="1" comment="ntp-doc is &lt;4.2.8p15-48.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992273" version="1" comment="cxgb3-firmware is &lt;1.5.2-0.9.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992274" version="1" comment="ofed is &lt;1.5.2-0.9.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992275" version="1" comment="ofed-doc is &lt;1.5.2-0.9.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992276" version="1" comment="ofed-kmp-default is &lt;1.5.2_2.6.32.46_0.3-0.9.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572847" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.17.31.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572848" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.17.31.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572849" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.17.31.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572850" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.17.31.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572851" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.17.31.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572852" version="1" comment="openldap2 is &lt;2.4.26-0.17.31.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572853" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.17.31.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572854" version="1" comment="openldap2-client is &lt;2.4.26-0.17.31.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572855" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.17.31.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572856" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.17.31.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572857" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.17.31.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572858" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.17.31.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572859" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.17.31.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572860" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.17.31.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572861" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.17.31.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572862" version="1" comment="openldap2 is &lt;2.4.26-0.17.31.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572863" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.17.31.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572864" version="1" comment="openldap2-client is &lt;2.4.26-0.17.31.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572865" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.17.31.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572866" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.17.31.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572867" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.17.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572868" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.17.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572869" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.17.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572870" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.17.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572871" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.17.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572872" version="1" comment="openldap2 is &lt;2.4.26-0.17.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572873" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.17.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572874" version="1" comment="openldap2-client is &lt;2.4.26-0.17.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572875" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.17.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572876" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.17.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572877" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.17.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572878" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.17.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572879" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.17.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572880" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.17.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572881" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.17.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572882" version="1" comment="openldap2 is &lt;2.4.26-0.17.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572883" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.17.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572884" version="1" comment="openldap2-client is &lt;2.4.26-0.17.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572885" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.17.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572886" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.17.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572887" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.17.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572888" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.17.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572889" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.17.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572890" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.17.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572891" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.17.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572892" version="1" comment="openldap2 is &lt;2.4.26-0.17.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572893" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.17.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572894" version="1" comment="openldap2-client is &lt;2.4.26-0.17.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572895" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.17.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572896" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.17.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572897" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.17.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572898" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.17.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572899" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.17.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572900" version="1" comment="openldap2 is &lt;2.4.26-0.17.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572901" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.17.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572902" version="1" comment="openldap2-client is &lt;2.4.26-0.17.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572903" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.17.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572904" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.17.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572905" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.17.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572906" version="1" comment="openldap2 is &lt;2.4.26-0.17.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572907" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.17.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572908" version="1" comment="openldap2-client is &lt;2.4.26-0.17.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572909" version="1" comment="libopensc2 is &lt;0.11.6-5.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572910" version="1" comment="libopensc2-32bit is &lt;0.11.6-5.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572911" version="1" comment="opensc is &lt;0.11.6-5.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572912" version="1" comment="opensc-32bit is &lt;0.11.6-5.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572913" version="1" comment="libopensc2 is &lt;0.11.6-5.27.6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572914" version="1" comment="libopensc2-32bit is &lt;0.11.6-5.27.6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572915" version="1" comment="opensc is &lt;0.11.6-5.27.6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572916" version="1" comment="opensc-32bit is &lt;0.11.6-5.27.6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572917" version="1" comment="libopensc2 is &lt;0.11.6-5.27.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572918" version="1" comment="libopensc2-32bit is &lt;0.11.6-5.27.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572919" version="1" comment="opensc is &lt;0.11.6-5.27.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572920" version="1" comment="opensc-32bit is &lt;0.11.6-5.27.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653634" version="1" comment="libopensc2 is &lt;0.11.6-5.27.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653635" version="1" comment="libopensc2-32bit is &lt;0.11.6-5.27.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653636" version="1" comment="opensc is &lt;0.11.6-5.27.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653637" version="1" comment="opensc-32bit is &lt;0.11.6-5.27.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992277" version="1" comment="openslp is &lt;1.2.0-172.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992278" version="1" comment="openslp-32bit is &lt;1.2.0-172.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992279" version="1" comment="openslp-server is &lt;1.2.0-172.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572921" version="1" comment="libslp1-openssl1 is &lt;1.2.0-172.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572922" version="1" comment="libslp1-openssl1-32bit is &lt;1.2.0-172.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572923" version="1" comment="openslp is &lt;1.2.0-172.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572924" version="1" comment="openslp-32bit is &lt;1.2.0-172.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572925" version="1" comment="openslp-server is &lt;1.2.0-172.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992280" version="1" comment="openssh is &lt;5.1p1-41.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992281" version="1" comment="openssh-askpass is &lt;5.1p1-41.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992282" version="1" comment="openssh-askpass-gnome is &lt;5.1p1-41.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572929" version="1" comment="openssh is &lt;5.1p1-41.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572930" version="1" comment="openssh-askpass is &lt;5.1p1-41.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572931" version="1" comment="openssh-askpass-gnome is &lt;5.1p1-41.69.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572932" version="1" comment="openssh is &lt;5.1p1-41.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572933" version="1" comment="openssh-askpass is &lt;5.1p1-41.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572934" version="1" comment="openssh-askpass-gnome is &lt;5.1p1-41.74.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572935" version="1" comment="openssh is &lt;5.1p1-41.79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572936" version="1" comment="openssh-askpass is &lt;5.1p1-41.79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572937" version="1" comment="openssh-askpass-gnome is &lt;5.1p1-41.79.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572938" version="1" comment="openssh is &lt;5.1p1-41.80.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572939" version="1" comment="openssh-askpass is &lt;1.2.4.1-3.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572940" version="1" comment="openssh-openssl1 is &lt;6.6p1-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572941" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572942" version="1" comment="openssh is &lt;6.6p1-80.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572943" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-80.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572944" version="1" comment="openssh-openssl1 is &lt;6.6p1-80.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572945" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-80.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572946" version="1" comment="openssh is &lt;6.6p1-80.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572947" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-80.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572948" version="1" comment="openssh-openssl1 is &lt;6.6p1-80.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572949" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-80.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572950" version="1" comment="openssh is &lt;5.1p1-41.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572951" version="1" comment="openssh-askpass is &lt;5.1p1-41.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572952" version="1" comment="openssh-askpass-gnome is &lt;5.1p1-41.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572953" version="1" comment="openssh-openssl1 is &lt;6.6p1-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572954" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593836" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.74.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593837" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.74.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593838" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.74.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593839" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.74.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593840" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.74.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593841" version="1" comment="openssl is &lt;0.9.8j-0.74.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593842" version="1" comment="openssl-doc is &lt;0.9.8j-0.74.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572955" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567025" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572956" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572957" version="1" comment="openssl is &lt;0.9.8j-0.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572958" version="1" comment="openssl-doc is &lt;0.9.8j-0.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572959" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567421" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572960" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572961" version="1" comment="openssl is &lt;0.9.8j-0.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572962" version="1" comment="openssl-doc is &lt;0.9.8j-0.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572963" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572964" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572965" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572966" version="1" comment="openssl is &lt;0.9.8j-0.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572967" version="1" comment="openssl-doc is &lt;0.9.8j-0.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572968" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572969" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572970" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572971" version="1" comment="openssl is &lt;0.9.8j-0.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572972" version="1" comment="openssl-doc is &lt;0.9.8j-0.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572973" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572974" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572975" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572976" version="1" comment="openssl is &lt;0.9.8j-0.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572977" version="1" comment="openssl-doc is &lt;0.9.8j-0.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572978" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572979" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572980" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572981" version="1" comment="openssl is &lt;0.9.8j-0.106.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572982" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572983" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572984" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572985" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572986" version="1" comment="openssl is &lt;0.9.8j-0.106.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572987" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572988" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572989" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572990" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572991" version="1" comment="openssl is &lt;0.9.8j-0.106.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572992" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572993" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572994" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572995" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572996" version="1" comment="openssl is &lt;0.9.8j-0.106.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572997" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572998" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572999" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573000" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573001" version="1" comment="openssl is &lt;0.9.8j-0.106.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573002" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573003" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573004" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573005" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573006" version="1" comment="openssl is &lt;0.9.8j-0.106.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573007" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573008" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573009" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573010" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573011" version="1" comment="openssl is &lt;0.9.8j-0.106.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573012" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573013" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573014" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573015" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573016" version="1" comment="openssl is &lt;0.9.8j-0.106.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573017" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573018" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573019" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573020" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573021" version="1" comment="openssl is &lt;0.9.8j-0.106.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573022" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573023" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573024" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573025" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573026" version="1" comment="openssl is &lt;0.9.8j-0.106.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573027" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631740" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631741" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631742" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631743" version="1" comment="openssl is &lt;0.9.8j-0.106.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631744" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632461" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632462" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632463" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632464" version="1" comment="openssl is &lt;0.9.8j-0.106.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632465" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673400" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673401" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673402" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673403" version="1" comment="openssl is &lt;0.9.8j-0.106.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673404" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567027" version="1" comment="openssl-certs is &lt;1.97-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573028" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573029" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573030" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573031" version="1" comment="openssl1 is &lt;1.0.1g-0.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573032" version="1" comment="openssl1-doc is &lt;1.0.1g-0.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573033" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573034" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573035" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573036" version="1" comment="openssl1 is &lt;1.0.1g-0.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573037" version="1" comment="openssl1-doc is &lt;1.0.1g-0.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573038" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573039" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573040" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573041" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573042" version="1" comment="openssl1 is &lt;1.0.1g-0.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573043" version="1" comment="openssl1-doc is &lt;1.0.1g-0.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573044" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573045" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573046" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573047" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573048" version="1" comment="openssl1 is &lt;1.0.1g-0.58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573049" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573050" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573051" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573052" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573053" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573054" version="1" comment="openssl1 is &lt;1.0.1g-0.58.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573055" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573056" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573057" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573058" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573059" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573060" version="1" comment="openssl1 is &lt;1.0.1g-0.58.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573061" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573062" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573063" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573064" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573065" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573066" version="1" comment="openssl1 is &lt;1.0.1g-0.58.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573067" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573068" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573069" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573070" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573071" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573072" version="1" comment="openssl1 is &lt;1.0.1g-0.58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573073" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573074" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573075" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573076" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573077" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573078" version="1" comment="openssl1 is &lt;1.0.1g-0.58.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573079" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573080" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573081" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573082" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573083" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573084" version="1" comment="openssl1 is &lt;1.0.1g-0.58.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573085" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573086" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573087" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573088" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573089" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573090" version="1" comment="openssl1 is &lt;1.0.1g-0.58.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573091" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573092" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573093" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573094" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573095" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573096" version="1" comment="openssl1 is &lt;1.0.1g-0.58.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573097" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573098" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573099" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573100" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573101" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573102" version="1" comment="openssl1 is &lt;1.0.1g-0.58.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573103" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631745" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631746" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631747" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631748" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631749" version="1" comment="openssl1 is &lt;1.0.1g-0.58.36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631750" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632543" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632544" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632545" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632546" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632547" version="1" comment="openssl1 is &lt;1.0.1g-0.58.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632548" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673405" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673406" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673407" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673408" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673409" version="1" comment="openssl1 is &lt;1.0.1g-0.58.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673410" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992283" version="1" comment="openswan is &lt;2.6.16-1.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992284" version="1" comment="openswan-doc is &lt;2.6.16-1.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573106" version="1" comment="openvpn is &lt;2.0.9-143.33.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573107" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.33.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573108" version="1" comment="openvpn is &lt;2.0.9-143.35.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573109" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.35.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573110" version="1" comment="openvpn is &lt;2.0.9-143.35.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573111" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.35.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573112" version="1" comment="openvpn is &lt;2.0.9-143.35.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573113" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.35.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573114" version="1" comment="openvpn is &lt;2.0.9-143.35.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573115" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.35.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573116" version="1" comment="libwsman1 is &lt;2.2.3-0.16.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573117" version="1" comment="openwsman-client is &lt;2.2.3-0.16.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573118" version="1" comment="openwsman-server is &lt;2.2.3-0.16.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992285" version="1" comment="opie is &lt;2.4-662.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992286" version="1" comment="opie-32bit is &lt;2.4-662.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992287" version="1" comment="permissions is &lt;2011.6.28-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573123" version="1" comment="orca is &lt;2.28.3-0.5.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573124" version="1" comment="orca-lang is &lt;2.28.3-0.5.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992288" version="1" comment="pam is &lt;1.0.4-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992289" version="1" comment="pam-32bit is &lt;1.0.4-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992290" version="1" comment="pam-doc is &lt;1.0.4-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573125" version="1" comment="pam is &lt;1.0.4-0.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573126" version="1" comment="pam-32bit is &lt;1.0.4-0.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573127" version="1" comment="pam-doc is &lt;1.0.4-0.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573128" version="1" comment="pam-modules is &lt;11-1.22.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573129" version="1" comment="pam-modules-32bit is &lt;11-1.22.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573130" version="1" comment="pam_pkcs11 is &lt;0.6.0-141.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573131" version="1" comment="pam_pkcs11-32bit is &lt;0.6.0-141.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992291" version="1" comment="pango is &lt;1.26.2-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992292" version="1" comment="pango-32bit is &lt;1.26.2-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992293" version="1" comment="pango-doc is &lt;1.26.2-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573136" version="1" comment="patch is &lt;2.5.9-252.22.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992294" version="1" comment="pcsc-ccid is &lt;1.3.8-3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992295" version="1" comment="pcsc-lite is &lt;1.4.102-1.37.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992296" version="1" comment="pcsc-lite-32bit is &lt;1.4.102-1.37.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992297" version="1" comment="pcsc-lite is &lt;1.4.102-1.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992298" version="1" comment="pcsc-lite-32bit is &lt;1.4.102-1.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992299" version="1" comment="perf is &lt;2.6.32.46-2.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992300" version="1" comment="perl is &lt;5.10.0-64.61.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992301" version="1" comment="perl-32bit is &lt;5.10.0-64.61.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992302" version="1" comment="perl-base is &lt;5.10.0-64.61.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992303" version="1" comment="perl-doc is &lt;5.10.0-64.61.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573150" version="1" comment="perl is &lt;5.10.0-64.61.63.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573151" version="1" comment="perl-32bit is &lt;5.10.0-64.61.63.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573152" version="1" comment="perl-base is &lt;5.10.0-64.61.63.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573153" version="1" comment="perl-doc is &lt;5.10.0-64.61.63.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573154" version="1" comment="perl-Archive-Zip is &lt;1.24-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992304" version="1" comment="perl-Config-General is &lt;2.33-2.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573156" version="1" comment="perl-Convert-ASN1 is &lt;0.22-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573157" version="1" comment="perl-DBD-mysql is &lt;4.008-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573158" version="1" comment="perl-DBD-mysql is &lt;4.008-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573159" version="1" comment="perl-DBD-mysql is &lt;4.008-10.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573160" version="1" comment="perl-DBI is &lt;1.607-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573161" version="1" comment="perl-DBI is &lt;1.607-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573162" version="1" comment="perl-PlRPC is &lt;0.2019-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573163" version="1" comment="perl-XML-LibXML is &lt;1.66-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992305" version="1" comment="perl-libwww-perl is &lt;5.816-2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573164" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573165" version="1" comment="php5 is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573166" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573167" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573168" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573169" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573170" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573171" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573172" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573173" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573174" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573175" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573176" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573177" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573178" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573179" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573180" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573181" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573182" version="1" comment="php5-json is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573183" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573184" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573185" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573186" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573187" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573188" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573189" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573190" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573191" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573192" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573193" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573194" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573195" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573196" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573197" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573198" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573199" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573200" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573201" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573202" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573203" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573204" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573205" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573206" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573207" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573208" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573209" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573210" version="1" comment="php5 is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573211" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573212" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573213" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573214" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573215" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573216" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573217" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573218" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573219" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573220" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573221" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573222" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573223" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573224" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573225" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573226" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573227" version="1" comment="php5-json is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573228" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573229" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573230" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573231" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573232" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573233" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573234" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573235" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573236" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573237" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573238" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573239" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573240" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573241" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573242" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573243" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573244" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573245" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573246" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573247" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573248" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573249" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573250" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573251" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573252" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573253" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573254" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573255" version="1" comment="php5 is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573256" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573257" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573258" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573259" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573260" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573261" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573262" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573263" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573264" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573265" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573266" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573267" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573268" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573269" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573270" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573271" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573272" version="1" comment="php5-json is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573273" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573274" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573275" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573276" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573277" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573278" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573279" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573280" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573281" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573282" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573283" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573284" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573285" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573286" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573287" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573288" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573289" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573290" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573291" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573292" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573293" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573294" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573295" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573296" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573297" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573298" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573299" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573300" version="1" comment="php5 is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573301" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573302" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573303" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573304" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573305" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573306" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573307" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573308" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573309" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573310" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573311" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573312" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573313" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573314" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573315" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573316" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573317" version="1" comment="php5-json is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573318" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573319" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573320" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573321" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573322" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573323" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573324" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573325" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573326" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573327" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573328" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573329" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573330" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573331" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573332" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573333" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573334" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573335" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573336" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573337" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573338" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573339" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573340" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573341" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573342" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573343" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573344" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573345" version="1" comment="php5 is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573346" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573347" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573348" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573349" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573350" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573351" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573352" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573353" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573354" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573355" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573356" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573357" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573358" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573359" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573360" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573361" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573362" version="1" comment="php5-json is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573363" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573364" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573365" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573366" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573367" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573368" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573369" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573370" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573371" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573372" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573373" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573374" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573375" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573376" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573377" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573378" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573379" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573380" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573381" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573382" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573383" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573384" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573385" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573386" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573387" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573388" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573389" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573390" version="1" comment="php5 is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573391" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573392" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573393" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573394" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573395" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573396" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573397" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573398" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573399" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573400" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573401" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573402" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573403" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573404" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573405" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573406" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573407" version="1" comment="php5-json is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573408" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573409" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573410" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573411" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573412" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573413" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573414" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573415" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573416" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573417" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573418" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573419" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573420" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573421" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573422" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573423" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573424" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573425" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573426" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573427" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573428" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573429" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573430" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573431" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573432" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573433" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573434" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573435" version="1" comment="php5 is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573436" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573437" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573438" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573439" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573440" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573441" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573442" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573443" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573444" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573445" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573446" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573447" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573448" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573449" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573450" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573451" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573452" version="1" comment="php5-json is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573453" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573454" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573455" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573456" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573457" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573458" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573459" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573460" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573461" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573462" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573463" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573464" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573465" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573466" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573467" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573468" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573469" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573470" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573471" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573472" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573473" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573474" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573475" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573476" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573477" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573478" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573479" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573480" version="1" comment="php5 is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573481" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573482" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573483" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573484" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573485" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573486" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573487" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573488" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573489" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573490" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573491" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573492" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573493" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573494" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573495" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573496" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573497" version="1" comment="php5-json is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573498" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573499" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573500" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573501" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573502" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573503" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573504" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573505" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573506" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573507" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573508" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573509" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573510" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573511" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573512" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573513" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573514" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573515" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573516" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573517" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573518" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573519" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573520" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573521" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573522" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573523" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573524" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573525" version="1" comment="php5 is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573526" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573527" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573528" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573529" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573530" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573531" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573532" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573533" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573534" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573535" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573536" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573537" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573538" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573539" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573540" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573541" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573542" version="1" comment="php5-json is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573543" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573544" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573545" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573546" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573547" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573548" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573549" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573550" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573551" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573552" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573553" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573554" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573555" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573556" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573557" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573558" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573559" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573560" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573561" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573562" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573563" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573564" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573565" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573566" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573567" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573568" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573569" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573570" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573571" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573572" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573573" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573574" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573575" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573576" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573577" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573578" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573579" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573580" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573581" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573582" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573583" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573584" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573585" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573586" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573587" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573588" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573589" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573590" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573591" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573592" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573593" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573594" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573595" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573596" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573597" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573598" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573599" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573600" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573601" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573602" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573603" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573604" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573605" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573606" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573607" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573608" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573609" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573610" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573611" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573612" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573613" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573614" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573615" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573616" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573617" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573618" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573619" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573620" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573621" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573622" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573623" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573624" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573625" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573626" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573627" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573628" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573629" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573630" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573631" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573632" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573633" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573634" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573635" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573636" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573637" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573638" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573639" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573640" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573641" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573642" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573643" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573644" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573645" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573646" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573647" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573648" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573649" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573650" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573651" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573652" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573653" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573654" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573655" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573656" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573657" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573658" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573659" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573660" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573661" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573662" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573663" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573664" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573665" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573666" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573667" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573668" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573669" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573670" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573671" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573672" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573673" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573674" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573675" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573676" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573677" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573678" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573679" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573680" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573681" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573682" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573683" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573684" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573685" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573686" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573687" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573688" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573689" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573690" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573691" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573692" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573693" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573694" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573695" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573696" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573697" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573698" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573699" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573700" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573701" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573702" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573703" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573704" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573705" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573706" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573707" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573708" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573709" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573710" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573711" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573712" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573713" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573714" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573715" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573716" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573717" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573718" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573719" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573720" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573721" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573722" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573723" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573724" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573725" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573726" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573727" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573728" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573729" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573730" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573731" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573732" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573733" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573734" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573735" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573736" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573737" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573738" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573739" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573740" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573741" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573742" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573743" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573744" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573745" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573746" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573747" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573748" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573749" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573750" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573751" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573752" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573753" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573754" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573755" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573756" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573757" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573758" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573759" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573760" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573761" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573762" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573763" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573764" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573765" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573766" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573767" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573768" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573769" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573770" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573771" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573772" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573773" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573774" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573775" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573776" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573777" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573778" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573779" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573780" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573781" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573782" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573783" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573784" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573785" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573786" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573787" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573788" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573789" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573790" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573791" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573792" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573793" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573794" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573795" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573796" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573797" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573798" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573799" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573800" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573801" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573802" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573803" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573804" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573805" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573806" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573807" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573808" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573809" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573810" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573811" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573812" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573813" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573814" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573815" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573816" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573817" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573818" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573819" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573820" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573821" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573822" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573823" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573824" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573825" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573826" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573827" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573828" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573829" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573830" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573831" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573832" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573833" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573834" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573835" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573836" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573837" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573838" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573839" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573840" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573841" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573842" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573843" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573844" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573845" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573846" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573847" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573848" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573849" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573850" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573851" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573852" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573853" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573854" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573855" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573856" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573857" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573858" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573859" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573860" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573861" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573862" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573863" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573864" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573865" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573866" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573867" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573868" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573869" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573870" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573871" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573872" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573873" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573874" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573875" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573876" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573877" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573878" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573879" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573880" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573881" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573882" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573883" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573884" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573885" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573886" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573887" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573888" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573889" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573890" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573891" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573892" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573893" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573894" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573895" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573896" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573897" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573898" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573899" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573900" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573901" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573902" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573903" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573904" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573905" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573906" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573907" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573908" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573909" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573910" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573911" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573912" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573913" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573914" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573915" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573916" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573917" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573918" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573919" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573920" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573921" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573922" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573923" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573924" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573925" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573926" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573927" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573928" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573929" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573930" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573931" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573932" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573933" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573934" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573935" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573936" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573937" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573938" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573939" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573940" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573941" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573942" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573943" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573944" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573945" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573946" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573947" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573948" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573949" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573950" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573951" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573952" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573953" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573954" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573955" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573956" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573957" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573958" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573959" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573960" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573961" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573962" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573963" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573964" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573965" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573966" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573967" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573968" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573969" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573970" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573971" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573972" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573973" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573974" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573975" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573976" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573977" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573978" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573979" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573980" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573981" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573982" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573983" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573984" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573985" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573986" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573987" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573988" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573989" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573990" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573991" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573992" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573993" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573994" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573995" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573996" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573997" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573998" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573999" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574000" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574001" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574002" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574003" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574004" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574005" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574006" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574007" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574008" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574009" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574010" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574011" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574012" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574013" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574014" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574015" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574016" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574017" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574018" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574019" version="1" comment="apache2-mod_php5 is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574020" version="1" comment="php5 is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574021" version="1" comment="php5-bcmath is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574022" version="1" comment="php5-bz2 is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574023" version="1" comment="php5-calendar is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574024" version="1" comment="php5-ctype is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574025" version="1" comment="php5-curl is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574026" version="1" comment="php5-dba is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574027" version="1" comment="php5-dbase is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574028" version="1" comment="php5-dom is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574029" version="1" comment="php5-exif is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574030" version="1" comment="php5-fastcgi is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574031" version="1" comment="php5-ftp is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574032" version="1" comment="php5-gd is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574033" version="1" comment="php5-gettext is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574034" version="1" comment="php5-gmp is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574035" version="1" comment="php5-hash is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574036" version="1" comment="php5-iconv is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574037" version="1" comment="php5-json is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574038" version="1" comment="php5-ldap is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574039" version="1" comment="php5-mbstring is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574040" version="1" comment="php5-mcrypt is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574041" version="1" comment="php5-mysql is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574042" version="1" comment="php5-odbc is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574043" version="1" comment="php5-openssl is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574044" version="1" comment="php5-pcntl is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574045" version="1" comment="php5-pdo is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574046" version="1" comment="php5-pear is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574047" version="1" comment="php5-pgsql is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574048" version="1" comment="php5-pspell is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574049" version="1" comment="php5-shmop is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574050" version="1" comment="php5-snmp is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574051" version="1" comment="php5-soap is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574052" version="1" comment="php5-suhosin is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574053" version="1" comment="php5-sysvmsg is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574054" version="1" comment="php5-sysvsem is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574055" version="1" comment="php5-sysvshm is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574056" version="1" comment="php5-tokenizer is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574057" version="1" comment="php5-wddx is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574058" version="1" comment="php5-xmlreader is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574059" version="1" comment="php5-xmlrpc is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574060" version="1" comment="php5-xmlwriter is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574061" version="1" comment="php5-xsl is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574062" version="1" comment="php5-zip is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574063" version="1" comment="php5-zlib is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574064" version="1" comment="apache2-mod_php5 is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574065" version="1" comment="php5 is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574066" version="1" comment="php5-bcmath is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574067" version="1" comment="php5-bz2 is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574068" version="1" comment="php5-calendar is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574069" version="1" comment="php5-ctype is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574070" version="1" comment="php5-curl is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574071" version="1" comment="php5-dba is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574072" version="1" comment="php5-dbase is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574073" version="1" comment="php5-dom is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574074" version="1" comment="php5-exif is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574075" version="1" comment="php5-fastcgi is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574076" version="1" comment="php5-ftp is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574077" version="1" comment="php5-gd is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574078" version="1" comment="php5-gettext is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574079" version="1" comment="php5-gmp is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574080" version="1" comment="php5-hash is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574081" version="1" comment="php5-iconv is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574082" version="1" comment="php5-json is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574083" version="1" comment="php5-ldap is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574084" version="1" comment="php5-mbstring is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574085" version="1" comment="php5-mcrypt is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574086" version="1" comment="php5-mysql is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574087" version="1" comment="php5-odbc is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574088" version="1" comment="php5-openssl is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574089" version="1" comment="php5-pcntl is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574090" version="1" comment="php5-pdo is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574091" version="1" comment="php5-pear is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574092" version="1" comment="php5-pgsql is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574093" version="1" comment="php5-pspell is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574094" version="1" comment="php5-shmop is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574095" version="1" comment="php5-snmp is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574096" version="1" comment="php5-soap is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574097" version="1" comment="php5-suhosin is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574098" version="1" comment="php5-sysvmsg is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574099" version="1" comment="php5-sysvsem is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574100" version="1" comment="php5-sysvshm is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574101" version="1" comment="php5-tokenizer is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574102" version="1" comment="php5-wddx is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574103" version="1" comment="php5-xmlreader is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574104" version="1" comment="php5-xmlrpc is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574105" version="1" comment="php5-xmlwriter is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574106" version="1" comment="php5-xsl is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574107" version="1" comment="php5-zip is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574108" version="1" comment="php5-zlib is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574109" version="1" comment="apache2-mod_php5 is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574110" version="1" comment="php5 is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574111" version="1" comment="php5-bcmath is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574112" version="1" comment="php5-bz2 is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574113" version="1" comment="php5-calendar is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574114" version="1" comment="php5-ctype is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574115" version="1" comment="php5-curl is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574116" version="1" comment="php5-dba is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574117" version="1" comment="php5-dbase is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574118" version="1" comment="php5-dom is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574119" version="1" comment="php5-exif is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574120" version="1" comment="php5-fastcgi is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574121" version="1" comment="php5-ftp is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574122" version="1" comment="php5-gd is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574123" version="1" comment="php5-gettext is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574124" version="1" comment="php5-gmp is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574125" version="1" comment="php5-hash is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574126" version="1" comment="php5-iconv is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574127" version="1" comment="php5-json is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574128" version="1" comment="php5-ldap is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574129" version="1" comment="php5-mbstring is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574130" version="1" comment="php5-mcrypt is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574131" version="1" comment="php5-mysql is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574132" version="1" comment="php5-odbc is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574133" version="1" comment="php5-openssl is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574134" version="1" comment="php5-pcntl is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574135" version="1" comment="php5-pdo is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574136" version="1" comment="php5-pear is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574137" version="1" comment="php5-pgsql is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574138" version="1" comment="php5-pspell is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574139" version="1" comment="php5-shmop is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574140" version="1" comment="php5-snmp is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574141" version="1" comment="php5-soap is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574142" version="1" comment="php5-suhosin is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574143" version="1" comment="php5-sysvmsg is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574144" version="1" comment="php5-sysvsem is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574145" version="1" comment="php5-sysvshm is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574146" version="1" comment="php5-tokenizer is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574147" version="1" comment="php5-wddx is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574148" version="1" comment="php5-xmlreader is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574149" version="1" comment="php5-xmlrpc is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574150" version="1" comment="php5-xmlwriter is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574151" version="1" comment="php5-xsl is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574152" version="1" comment="php5-zip is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574153" version="1" comment="php5-zlib is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574154" version="1" comment="apache2-mod_php5 is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574155" version="1" comment="php5 is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574156" version="1" comment="php5-bcmath is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574157" version="1" comment="php5-bz2 is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574158" version="1" comment="php5-calendar is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574159" version="1" comment="php5-ctype is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574160" version="1" comment="php5-curl is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574161" version="1" comment="php5-dba is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574162" version="1" comment="php5-dbase is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574163" version="1" comment="php5-dom is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574164" version="1" comment="php5-exif is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574165" version="1" comment="php5-fastcgi is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574166" version="1" comment="php5-ftp is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574167" version="1" comment="php5-gd is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574168" version="1" comment="php5-gettext is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574169" version="1" comment="php5-gmp is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574170" version="1" comment="php5-hash is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574171" version="1" comment="php5-iconv is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574172" version="1" comment="php5-json is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574173" version="1" comment="php5-ldap is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574174" version="1" comment="php5-mbstring is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574175" version="1" comment="php5-mcrypt is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574176" version="1" comment="php5-mysql is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574177" version="1" comment="php5-odbc is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574178" version="1" comment="php5-openssl is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574179" version="1" comment="php5-pcntl is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574180" version="1" comment="php5-pdo is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574181" version="1" comment="php5-pear is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574182" version="1" comment="php5-pgsql is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574183" version="1" comment="php5-pspell is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574184" version="1" comment="php5-shmop is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574185" version="1" comment="php5-snmp is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574186" version="1" comment="php5-soap is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574187" version="1" comment="php5-suhosin is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574188" version="1" comment="php5-sysvmsg is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574189" version="1" comment="php5-sysvsem is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574190" version="1" comment="php5-sysvshm is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574191" version="1" comment="php5-tokenizer is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574192" version="1" comment="php5-wddx is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574193" version="1" comment="php5-xmlreader is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574194" version="1" comment="php5-xmlrpc is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574195" version="1" comment="php5-xmlwriter is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574196" version="1" comment="php5-xsl is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574197" version="1" comment="php5-zip is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574198" version="1" comment="php5-zlib is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574199" version="1" comment="apache2-mod_php5 is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574200" version="1" comment="php5 is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574201" version="1" comment="php5-bcmath is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574202" version="1" comment="php5-bz2 is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574203" version="1" comment="php5-calendar is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574204" version="1" comment="php5-ctype is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574205" version="1" comment="php5-curl is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574206" version="1" comment="php5-dba is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574207" version="1" comment="php5-dbase is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574208" version="1" comment="php5-dom is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574209" version="1" comment="php5-exif is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574210" version="1" comment="php5-fastcgi is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574211" version="1" comment="php5-ftp is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574212" version="1" comment="php5-gd is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574213" version="1" comment="php5-gettext is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574214" version="1" comment="php5-gmp is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574215" version="1" comment="php5-hash is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574216" version="1" comment="php5-iconv is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574217" version="1" comment="php5-json is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574218" version="1" comment="php5-ldap is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574219" version="1" comment="php5-mbstring is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574220" version="1" comment="php5-mcrypt is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574221" version="1" comment="php5-mysql is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574222" version="1" comment="php5-odbc is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574223" version="1" comment="php5-openssl is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574224" version="1" comment="php5-pcntl is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574225" version="1" comment="php5-pdo is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574226" version="1" comment="php5-pear is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574227" version="1" comment="php5-pgsql is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574228" version="1" comment="php5-pspell is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574229" version="1" comment="php5-shmop is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574230" version="1" comment="php5-snmp is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574231" version="1" comment="php5-soap is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574232" version="1" comment="php5-suhosin is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574233" version="1" comment="php5-sysvmsg is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574234" version="1" comment="php5-sysvsem is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574235" version="1" comment="php5-sysvshm is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574236" version="1" comment="php5-tokenizer is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574237" version="1" comment="php5-wddx is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574238" version="1" comment="php5-xmlreader is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574239" version="1" comment="php5-xmlrpc is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574240" version="1" comment="php5-xmlwriter is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574241" version="1" comment="php5-xsl is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574242" version="1" comment="php5-zip is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574243" version="1" comment="php5-zlib is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574244" version="1" comment="apache2-mod_php5 is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574245" version="1" comment="php5 is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574246" version="1" comment="php5-bcmath is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574247" version="1" comment="php5-bz2 is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574248" version="1" comment="php5-calendar is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574249" version="1" comment="php5-ctype is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574250" version="1" comment="php5-curl is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574251" version="1" comment="php5-dba is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574252" version="1" comment="php5-dbase is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574253" version="1" comment="php5-dom is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574254" version="1" comment="php5-exif is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574255" version="1" comment="php5-fastcgi is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574256" version="1" comment="php5-ftp is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574257" version="1" comment="php5-gd is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574258" version="1" comment="php5-gettext is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574259" version="1" comment="php5-gmp is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574260" version="1" comment="php5-hash is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574261" version="1" comment="php5-iconv is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574262" version="1" comment="php5-json is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574263" version="1" comment="php5-ldap is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574264" version="1" comment="php5-mbstring is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574265" version="1" comment="php5-mcrypt is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574266" version="1" comment="php5-mysql is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574267" version="1" comment="php5-odbc is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574268" version="1" comment="php5-openssl is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574269" version="1" comment="php5-pcntl is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574270" version="1" comment="php5-pdo is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574271" version="1" comment="php5-pear is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574272" version="1" comment="php5-pgsql is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574273" version="1" comment="php5-pspell is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574274" version="1" comment="php5-shmop is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574275" version="1" comment="php5-snmp is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574276" version="1" comment="php5-soap is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574277" version="1" comment="php5-suhosin is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574278" version="1" comment="php5-sysvmsg is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574279" version="1" comment="php5-sysvsem is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574280" version="1" comment="php5-sysvshm is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574281" version="1" comment="php5-tokenizer is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574282" version="1" comment="php5-wddx is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574283" version="1" comment="php5-xmlreader is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574284" version="1" comment="php5-xmlrpc is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574285" version="1" comment="php5-xmlwriter is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574286" version="1" comment="php5-xsl is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574287" version="1" comment="php5-zip is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574288" version="1" comment="php5-zlib is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574289" version="1" comment="apache2-mod_php5 is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574290" version="1" comment="php5 is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574291" version="1" comment="php5-bcmath is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574292" version="1" comment="php5-bz2 is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574293" version="1" comment="php5-calendar is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574294" version="1" comment="php5-ctype is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574295" version="1" comment="php5-curl is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574296" version="1" comment="php5-dba is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574297" version="1" comment="php5-dbase is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574298" version="1" comment="php5-dom is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574299" version="1" comment="php5-exif is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574300" version="1" comment="php5-fastcgi is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574301" version="1" comment="php5-ftp is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574302" version="1" comment="php5-gd is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574303" version="1" comment="php5-gettext is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574304" version="1" comment="php5-gmp is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574305" version="1" comment="php5-hash is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574306" version="1" comment="php5-iconv is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574307" version="1" comment="php5-json is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574308" version="1" comment="php5-ldap is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574309" version="1" comment="php5-mbstring is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574310" version="1" comment="php5-mcrypt is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574311" version="1" comment="php5-mysql is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574312" version="1" comment="php5-odbc is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574313" version="1" comment="php5-openssl is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574314" version="1" comment="php5-pcntl is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574315" version="1" comment="php5-pdo is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574316" version="1" comment="php5-pear is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574317" version="1" comment="php5-pgsql is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574318" version="1" comment="php5-pspell is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574319" version="1" comment="php5-shmop is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574320" version="1" comment="php5-snmp is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574321" version="1" comment="php5-soap is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574322" version="1" comment="php5-suhosin is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574323" version="1" comment="php5-sysvmsg is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574324" version="1" comment="php5-sysvsem is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574325" version="1" comment="php5-sysvshm is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574326" version="1" comment="php5-tokenizer is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574327" version="1" comment="php5-wddx is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574328" version="1" comment="php5-xmlreader is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574329" version="1" comment="php5-xmlrpc is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574330" version="1" comment="php5-xmlwriter is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574331" version="1" comment="php5-xsl is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574332" version="1" comment="php5-zip is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574333" version="1" comment="php5-zlib is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574334" version="1" comment="apache2-mod_php5 is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574335" version="1" comment="php5 is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574336" version="1" comment="php5-bcmath is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574337" version="1" comment="php5-bz2 is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574338" version="1" comment="php5-calendar is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574339" version="1" comment="php5-ctype is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574340" version="1" comment="php5-curl is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574341" version="1" comment="php5-dba is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574342" version="1" comment="php5-dbase is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574343" version="1" comment="php5-dom is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574344" version="1" comment="php5-exif is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574345" version="1" comment="php5-fastcgi is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574346" version="1" comment="php5-ftp is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574347" version="1" comment="php5-gd is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574348" version="1" comment="php5-gettext is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574349" version="1" comment="php5-gmp is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574350" version="1" comment="php5-hash is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574351" version="1" comment="php5-iconv is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574352" version="1" comment="php5-json is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574353" version="1" comment="php5-ldap is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574354" version="1" comment="php5-mbstring is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574355" version="1" comment="php5-mcrypt is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574356" version="1" comment="php5-mysql is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574357" version="1" comment="php5-odbc is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574358" version="1" comment="php5-openssl is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574359" version="1" comment="php5-pcntl is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574360" version="1" comment="php5-pdo is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574361" version="1" comment="php5-pear is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574362" version="1" comment="php5-pgsql is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574363" version="1" comment="php5-pspell is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574364" version="1" comment="php5-shmop is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574365" version="1" comment="php5-snmp is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574366" version="1" comment="php5-soap is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574367" version="1" comment="php5-suhosin is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574368" version="1" comment="php5-sysvmsg is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574369" version="1" comment="php5-sysvsem is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574370" version="1" comment="php5-sysvshm is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574371" version="1" comment="php5-tokenizer is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574372" version="1" comment="php5-wddx is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574373" version="1" comment="php5-xmlreader is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574374" version="1" comment="php5-xmlrpc is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574375" version="1" comment="php5-xmlwriter is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574376" version="1" comment="php5-xsl is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574377" version="1" comment="php5-zip is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574378" version="1" comment="php5-zlib is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627044" version="1" comment="apache2-mod_php5 is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627045" version="1" comment="php5 is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627046" version="1" comment="php5-bcmath is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627047" version="1" comment="php5-bz2 is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627048" version="1" comment="php5-calendar is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627049" version="1" comment="php5-ctype is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627050" version="1" comment="php5-curl is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627051" version="1" comment="php5-dba is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627052" version="1" comment="php5-dbase is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627053" version="1" comment="php5-dom is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627054" version="1" comment="php5-exif is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627055" version="1" comment="php5-fastcgi is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627056" version="1" comment="php5-ftp is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627057" version="1" comment="php5-gd is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627058" version="1" comment="php5-gettext is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627059" version="1" comment="php5-gmp is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627060" version="1" comment="php5-hash is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627061" version="1" comment="php5-iconv is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627062" version="1" comment="php5-json is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627063" version="1" comment="php5-ldap is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627064" version="1" comment="php5-mbstring is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627065" version="1" comment="php5-mcrypt is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627066" version="1" comment="php5-mysql is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627067" version="1" comment="php5-odbc is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627068" version="1" comment="php5-openssl is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627069" version="1" comment="php5-pcntl is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627070" version="1" comment="php5-pdo is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627071" version="1" comment="php5-pear is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627072" version="1" comment="php5-pgsql is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627073" version="1" comment="php5-pspell is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627074" version="1" comment="php5-shmop is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627075" version="1" comment="php5-snmp is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627076" version="1" comment="php5-soap is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627077" version="1" comment="php5-suhosin is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627078" version="1" comment="php5-sysvmsg is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627079" version="1" comment="php5-sysvsem is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627080" version="1" comment="php5-sysvshm is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627081" version="1" comment="php5-tokenizer is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627082" version="1" comment="php5-wddx is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627083" version="1" comment="php5-xmlreader is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627084" version="1" comment="php5-xmlrpc is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627085" version="1" comment="php5-xmlwriter is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627086" version="1" comment="php5-xsl is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627087" version="1" comment="php5-zip is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627088" version="1" comment="php5-zlib is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574379" version="1" comment="libpixman-1-0 is &lt;0.16.0-2.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574380" version="1" comment="libpixman-1-0-32bit is &lt;0.16.0-2.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574381" version="1" comment="policycoreutils is &lt;2.0.79-4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574382" version="1" comment="policycoreutils is &lt;2.0.79-4.9.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574383" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574384" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574385" version="1" comment="libpoppler5 is &lt;0.12.3-1.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574386" version="1" comment="poppler-tools is &lt;0.12.3-1.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574387" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574388" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574389" version="1" comment="libpoppler5 is &lt;0.12.3-1.13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574390" version="1" comment="poppler-tools is &lt;0.12.3-1.13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992306" version="1" comment="popt is &lt;1.7-37.29.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992307" version="1" comment="popt-32bit is &lt;1.7-37.29.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992308" version="1" comment="rpm is &lt;4.4.2.3-37.29.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992309" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.29.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574396" version="1" comment="rpm-python is &lt;4.4.2.3-37.29.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992310" version="1" comment="postfix is &lt;2.5.6-5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992311" version="1" comment="postfix-doc is &lt;2.5.6-5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992312" version="1" comment="postfix-mysql is &lt;2.5.6-5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574398" version="1" comment="libecpg6 is &lt;9.4.5-0.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574399" version="1" comment="libpq5 is &lt;9.4.5-0.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567046" version="1" comment="libpq5-32bit is &lt;9.4.5-0.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574400" version="1" comment="postgresql94 is &lt;9.4.5-0.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574401" version="1" comment="postgresql94-contrib is &lt;9.4.5-0.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574402" version="1" comment="postgresql94-docs is &lt;9.4.5-0.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574403" version="1" comment="postgresql94-server is &lt;9.4.5-0.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992313" version="1" comment="postgresql is &lt;8.3.23-0.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992314" version="1" comment="postgresql-contrib is &lt;8.3.23-0.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992315" version="1" comment="postgresql-docs is &lt;8.3.23-0.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574407" version="1" comment="postgresql-init is &lt;9.1-0.6.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992316" version="1" comment="postgresql-libs is &lt;8.3.18-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992317" version="1" comment="postgresql-libs-32bit is &lt;8.3.18-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992318" version="1" comment="postgresql-server is &lt;8.3.23-0.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574412" version="1" comment="postgresql-init is &lt;9.4-0.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574413" version="1" comment="libecpg6 is &lt;10.6-0.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574414" version="1" comment="libpq5 is &lt;10.6-0.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574415" version="1" comment="libpq5-32bit is &lt;10.6-0.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574416" version="1" comment="postgresql-init is &lt;10-0.8.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574417" version="1" comment="postgresql10 is &lt;10.6-0.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574418" version="1" comment="postgresql10-contrib is &lt;10.6-0.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574419" version="1" comment="postgresql10-docs is &lt;10.6-0.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574420" version="1" comment="postgresql10-server is &lt;10.6-0.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574421" version="1" comment="libecpg6 is &lt;10.8-0.2.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574422" version="1" comment="libpq5 is &lt;10.8-0.2.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574423" version="1" comment="libpq5-32bit is &lt;10.8-0.2.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574424" version="1" comment="postgresql10 is &lt;10.8-0.2.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574425" version="1" comment="postgresql10-contrib is &lt;10.8-0.2.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574426" version="1" comment="postgresql10-docs is &lt;10.8-0.2.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574427" version="1" comment="postgresql10-server is &lt;10.8-0.2.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574428" version="1" comment="libecpg6 is &lt;10.9-0.2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574429" version="1" comment="libpq5 is &lt;10.9-0.2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574430" version="1" comment="libpq5-32bit is &lt;10.9-0.2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574431" version="1" comment="postgresql10 is &lt;10.9-0.2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574432" version="1" comment="postgresql10-contrib is &lt;10.9-0.2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574433" version="1" comment="postgresql10-docs is &lt;10.9-0.2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574434" version="1" comment="postgresql10-server is &lt;10.9-0.2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574435" version="1" comment="libecpg6 is &lt;10.10-0.2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574436" version="1" comment="libpq5 is &lt;10.10-0.2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574437" version="1" comment="libpq5-32bit is &lt;10.10-0.2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574438" version="1" comment="postgresql10 is &lt;10.10-0.2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574439" version="1" comment="postgresql10-contrib is &lt;10.10-0.2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574440" version="1" comment="postgresql10-devel is &lt;10.10-0.2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574441" version="1" comment="postgresql10-docs is &lt;10.10-0.2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574442" version="1" comment="postgresql10-server is &lt;10.10-0.2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574443" version="1" comment="libecpg6 is &lt;10.12-0.2.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574444" version="1" comment="libpq5 is &lt;10.12-0.2.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574445" version="1" comment="libpq5-32bit is &lt;10.12-0.2.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574446" version="1" comment="postgresql10 is &lt;10.12-0.2.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574447" version="1" comment="postgresql10-contrib is &lt;10.12-0.2.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574448" version="1" comment="postgresql10-devel is &lt;10.12-0.2.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574449" version="1" comment="postgresql10-docs is &lt;10.12-0.2.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574450" version="1" comment="postgresql10-server is &lt;10.12-0.2.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574451" version="1" comment="libecpg6 is &lt;10.14-0.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574452" version="1" comment="libpq5 is &lt;10.14-0.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574453" version="1" comment="libpq5-32bit is &lt;10.14-0.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574454" version="1" comment="postgresql10 is &lt;10.14-0.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574455" version="1" comment="postgresql10-contrib is &lt;10.14-0.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574456" version="1" comment="postgresql10-devel is &lt;10.14-0.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574457" version="1" comment="postgresql10-docs is &lt;10.14-0.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574458" version="1" comment="postgresql10-server is &lt;10.14-0.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574459" version="1" comment="libecpg6 is &lt;10.15-0.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574460" version="1" comment="libpq5 is &lt;10.15-0.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574461" version="1" comment="libpq5-32bit is &lt;10.15-0.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574462" version="1" comment="postgresql10 is &lt;10.15-0.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574463" version="1" comment="postgresql10-contrib is &lt;10.15-0.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574464" version="1" comment="postgresql10-devel is &lt;10.15-0.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574465" version="1" comment="postgresql10-docs is &lt;10.15-0.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574466" version="1" comment="postgresql10-server is &lt;10.15-0.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574467" version="1" comment="libecpg6 is &lt;10.17-0.2.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574468" version="1" comment="libpq5 is &lt;10.17-0.2.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574469" version="1" comment="libpq5-32bit is &lt;10.17-0.2.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574470" version="1" comment="postgresql10 is &lt;10.17-0.2.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574471" version="1" comment="postgresql10-contrib is &lt;10.17-0.2.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574472" version="1" comment="postgresql10-devel is &lt;10.17-0.2.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574473" version="1" comment="postgresql10-docs is &lt;10.17-0.2.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574474" version="1" comment="postgresql10-server is &lt;10.17-0.2.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656585" version="1" comment="libecpg6 is &lt;10.19-0.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656586" version="1" comment="libpq5 is &lt;10.19-0.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656587" version="1" comment="libpq5-32bit is &lt;10.19-0.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656588" version="1" comment="postgresql10 is &lt;10.19-0.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656589" version="1" comment="postgresql10-contrib is &lt;10.19-0.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656590" version="1" comment="postgresql10-devel is &lt;10.19-0.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656591" version="1" comment="postgresql10-docs is &lt;10.19-0.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656592" version="1" comment="postgresql10-server is &lt;10.19-0.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574475" version="1" comment="libecpg6 is &lt;9.1.15-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574476" version="1" comment="libpq5 is &lt;9.1.15-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567051" version="1" comment="libpq5-32bit is &lt;9.1.15-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574477" version="1" comment="postgresql91 is &lt;9.1.15-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574478" version="1" comment="postgresql91-contrib is &lt;9.1.15-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574479" version="1" comment="postgresql91-docs is &lt;9.1.15-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574480" version="1" comment="postgresql91-server is &lt;9.1.15-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574481" version="1" comment="postgresql91 is &lt;9.1.18-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574482" version="1" comment="postgresql91-contrib is &lt;9.1.18-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574483" version="1" comment="postgresql91-docs is &lt;9.1.18-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574484" version="1" comment="postgresql91-server is &lt;9.1.18-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574485" version="1" comment="postgresql91 is &lt;9.1.19-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574486" version="1" comment="postgresql91-contrib is &lt;9.1.19-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574487" version="1" comment="postgresql91-docs is &lt;9.1.19-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574488" version="1" comment="postgresql91-server is &lt;9.1.19-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574489" version="1" comment="libecpg6 is &lt;9.4.6-0.14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574490" version="1" comment="libpq5 is &lt;9.4.6-0.14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567425" version="1" comment="libpq5-32bit is &lt;9.4.6-0.14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574491" version="1" comment="postgresql94 is &lt;9.4.6-0.14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574492" version="1" comment="postgresql94-contrib is &lt;9.4.6-0.14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574493" version="1" comment="postgresql94-docs is &lt;9.4.6-0.14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574494" version="1" comment="postgresql94-server is &lt;9.4.6-0.14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574495" version="1" comment="libecpg6 is &lt;9.4.9-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574496" version="1" comment="libpq5 is &lt;9.4.9-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574497" version="1" comment="libpq5-32bit is &lt;9.4.9-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574498" version="1" comment="postgresql94 is &lt;9.4.9-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574499" version="1" comment="postgresql94-contrib is &lt;9.4.9-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574500" version="1" comment="postgresql94-docs is &lt;9.4.9-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574501" version="1" comment="postgresql94-server is &lt;9.4.9-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574502" version="1" comment="libecpg6 is &lt;9.4.12-0.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574503" version="1" comment="libpq5 is &lt;9.4.12-0.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574504" version="1" comment="libpq5-32bit is &lt;9.4.12-0.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574505" version="1" comment="postgresql94 is &lt;9.4.12-0.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574506" version="1" comment="postgresql94-contrib is &lt;9.4.12-0.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574507" version="1" comment="postgresql94-docs is &lt;9.4.12-0.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574508" version="1" comment="postgresql94-server is &lt;9.4.12-0.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574509" version="1" comment="libecpg6 is &lt;9.4.13-0.23.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574510" version="1" comment="libpq5 is &lt;9.4.13-0.23.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574511" version="1" comment="libpq5-32bit is &lt;9.4.13-0.23.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574512" version="1" comment="postgresql94 is &lt;9.4.13-0.23.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574513" version="1" comment="postgresql94-contrib is &lt;9.4.13-0.23.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574514" version="1" comment="postgresql94-docs is &lt;9.4.13-0.23.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574515" version="1" comment="postgresql94-server is &lt;9.4.13-0.23.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574516" version="1" comment="libecpg6 is &lt;9.4.15-0.23.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574517" version="1" comment="libpq5 is &lt;9.4.15-0.23.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574518" version="1" comment="libpq5-32bit is &lt;9.4.15-0.23.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574519" version="1" comment="postgresql94 is &lt;9.4.15-0.23.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574520" version="1" comment="postgresql94-contrib is &lt;9.4.15-0.23.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574521" version="1" comment="postgresql94-docs is &lt;9.4.15-0.23.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574522" version="1" comment="postgresql94-server is &lt;9.4.15-0.23.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574523" version="1" comment="libecpg6 is &lt;9.4.16-0.23.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574524" version="1" comment="libpq5 is &lt;9.4.16-0.23.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574525" version="1" comment="libpq5-32bit is &lt;9.4.16-0.23.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574526" version="1" comment="postgresql94 is &lt;9.4.16-0.23.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574527" version="1" comment="postgresql94-contrib is &lt;9.4.16-0.23.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574528" version="1" comment="postgresql94-docs is &lt;9.4.16-0.23.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574529" version="1" comment="postgresql94-server is &lt;9.4.16-0.23.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574530" version="1" comment="libecpg6 is &lt;9.4.17-0.23.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574531" version="1" comment="libpq5 is &lt;9.4.17-0.23.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574532" version="1" comment="libpq5-32bit is &lt;9.4.17-0.23.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574533" version="1" comment="postgresql94 is &lt;9.4.17-0.23.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574534" version="1" comment="postgresql94-contrib is &lt;9.4.17-0.23.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574535" version="1" comment="postgresql94-docs is &lt;9.4.17-0.23.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574536" version="1" comment="postgresql94-server is &lt;9.4.17-0.23.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574537" version="1" comment="libecpg6 is &lt;9.4.19-0.23.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574538" version="1" comment="libpq5 is &lt;9.4.19-0.23.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574539" version="1" comment="libpq5-32bit is &lt;9.4.19-0.23.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574540" version="1" comment="postgresql94 is &lt;9.4.19-0.23.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574541" version="1" comment="postgresql94-contrib is &lt;9.4.19-0.23.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574542" version="1" comment="postgresql94-docs is &lt;9.4.19-0.23.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574543" version="1" comment="postgresql94-server is &lt;9.4.19-0.23.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574544" version="1" comment="postgresql94 is &lt;9.4.24-0.23.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574545" version="1" comment="postgresql94-contrib is &lt;9.4.24-0.23.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574546" version="1" comment="postgresql94-devel is &lt;9.4.24-0.23.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574547" version="1" comment="postgresql94-docs is &lt;9.4.24-0.23.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574548" version="1" comment="postgresql94-server is &lt;9.4.24-0.23.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992319" version="1" comment="ppp is &lt;2.4.5.git-2.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574549" version="1" comment="ppp is &lt;2.4.5.git-2.31.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574550" version="1" comment="ppp is &lt;2.4.5.git-2.32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574551" version="1" comment="procmail is &lt;3.22-240.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574552" version="1" comment="procmail is &lt;3.22-240.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992320" version="1" comment="puppet is &lt;2.6.18-0.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992321" version="1" comment="puppet-server is &lt;2.6.18-0.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992322" version="1" comment="pwdutils is &lt;3.2.8-0.2.35 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574556" version="1" comment="puppet is &lt;2.7.26-0.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574557" version="1" comment="puppet-server is &lt;2.7.26-0.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574558" version="1" comment="puppet is &lt;2.7.26-0.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574559" version="1" comment="puppet-server is &lt;2.7.26-0.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992323" version="1" comment="pure-ftpd is &lt;1.0.22-3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574560" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574561" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574562" version="1" comment="python is &lt;2.6.9-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565245" version="1" comment="python-32bit is &lt;2.6.9-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574563" version="1" comment="python-base is &lt;2.6.9-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574564" version="1" comment="python-base-32bit is &lt;2.6.9-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574565" version="1" comment="python-curses is &lt;2.6.9-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574566" version="1" comment="python-demo is &lt;2.6.9-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565248" version="1" comment="python-doc is &lt;2.6-8.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565249" version="1" comment="python-doc-pdf is &lt;2.6-8.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574567" version="1" comment="python-gdbm is &lt;2.6.9-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574568" version="1" comment="python-idle is &lt;2.6.9-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574569" version="1" comment="python-tk is &lt;2.6.9-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574570" version="1" comment="python-xml is &lt;2.6.9-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574571" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574572" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574573" version="1" comment="python is &lt;2.6.9-40.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565253" version="1" comment="python-32bit is &lt;2.6.9-40.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574574" version="1" comment="python-base is &lt;2.6.9-40.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574575" version="1" comment="python-base-32bit is &lt;2.6.9-40.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574576" version="1" comment="python-curses is &lt;2.6.9-40.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574577" version="1" comment="python-demo is &lt;2.6.9-40.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565256" version="1" comment="python-doc is &lt;2.6-8.40.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565257" version="1" comment="python-doc-pdf is &lt;2.6-8.40.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574578" version="1" comment="python-gdbm is &lt;2.6.9-40.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574579" version="1" comment="python-idle is &lt;2.6.9-40.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574580" version="1" comment="python-tk is &lt;2.6.9-40.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574581" version="1" comment="python-xml is &lt;2.6.9-40.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574582" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574583" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574584" version="1" comment="python is &lt;2.6.9-40.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565261" version="1" comment="python-32bit is &lt;2.6.9-40.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574585" version="1" comment="python-base is &lt;2.6.9-40.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574586" version="1" comment="python-base-32bit is &lt;2.6.9-40.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574587" version="1" comment="python-curses is &lt;2.6.9-40.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574588" version="1" comment="python-demo is &lt;2.6.9-40.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565264" version="1" comment="python-doc is &lt;2.6-8.40.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565265" version="1" comment="python-doc-pdf is &lt;2.6-8.40.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574589" version="1" comment="python-gdbm is &lt;2.6.9-40.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574590" version="1" comment="python-idle is &lt;2.6.9-40.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574591" version="1" comment="python-tk is &lt;2.6.9-40.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574592" version="1" comment="python-xml is &lt;2.6.9-40.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574593" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574594" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574595" version="1" comment="python is &lt;2.6.9-40.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565269" version="1" comment="python-32bit is &lt;2.6.9-40.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574596" version="1" comment="python-base is &lt;2.6.9-40.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574597" version="1" comment="python-base-32bit is &lt;2.6.9-40.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574598" version="1" comment="python-curses is &lt;2.6.9-40.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574599" version="1" comment="python-demo is &lt;2.6.9-40.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565272" version="1" comment="python-doc is &lt;2.6-8.40.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565273" version="1" comment="python-doc-pdf is &lt;2.6-8.40.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574600" version="1" comment="python-gdbm is &lt;2.6.9-40.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574601" version="1" comment="python-idle is &lt;2.6.9-40.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574602" version="1" comment="python-tk is &lt;2.6.9-40.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574603" version="1" comment="python-xml is &lt;2.6.9-40.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574604" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574605" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574606" version="1" comment="python is &lt;2.6.9-40.21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565277" version="1" comment="python-32bit is &lt;2.6.9-40.21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574607" version="1" comment="python-base is &lt;2.6.9-40.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574608" version="1" comment="python-base-32bit is &lt;2.6.9-40.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574609" version="1" comment="python-curses is &lt;2.6.9-40.21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574610" version="1" comment="python-demo is &lt;2.6.9-40.21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565280" version="1" comment="python-doc is &lt;2.6-8.40.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565281" version="1" comment="python-doc-pdf is &lt;2.6-8.40.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574611" version="1" comment="python-gdbm is &lt;2.6.9-40.21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574612" version="1" comment="python-idle is &lt;2.6.9-40.21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574613" version="1" comment="python-tk is &lt;2.6.9-40.21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574614" version="1" comment="python-xml is &lt;2.6.9-40.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574615" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574616" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574617" version="1" comment="python is &lt;2.6.9-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574618" version="1" comment="python-32bit is &lt;2.6.9-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574619" version="1" comment="python-base is &lt;2.6.9-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574620" version="1" comment="python-base-32bit is &lt;2.6.9-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574621" version="1" comment="python-curses is &lt;2.6.9-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574622" version="1" comment="python-demo is &lt;2.6.9-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569038" version="1" comment="python-doc is &lt;2.6-8.40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569039" version="1" comment="python-doc-pdf is &lt;2.6-8.40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574623" version="1" comment="python-gdbm is &lt;2.6.9-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574624" version="1" comment="python-idle is &lt;2.6.9-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574625" version="1" comment="python-tk is &lt;2.6.9-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574626" version="1" comment="python-xml is &lt;2.6.9-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574627" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574628" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574629" version="1" comment="python is &lt;2.6.9-40.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574630" version="1" comment="python-32bit is &lt;2.6.9-40.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574631" version="1" comment="python-base is &lt;2.6.9-40.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574632" version="1" comment="python-base-32bit is &lt;2.6.9-40.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574633" version="1" comment="python-curses is &lt;2.6.9-40.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574634" version="1" comment="python-demo is &lt;2.6.9-40.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569049" version="1" comment="python-doc is &lt;2.6-8.40.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569050" version="1" comment="python-doc-pdf is &lt;2.6-8.40.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574635" version="1" comment="python-gdbm is &lt;2.6.9-40.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574636" version="1" comment="python-idle is &lt;2.6.9-40.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574637" version="1" comment="python-tk is &lt;2.6.9-40.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574638" version="1" comment="python-xml is &lt;2.6.9-40.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574639" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574640" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574641" version="1" comment="python is &lt;2.6.9-40.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574642" version="1" comment="python-32bit is &lt;2.6.9-40.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574643" version="1" comment="python-base is &lt;2.6.9-40.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574644" version="1" comment="python-base-32bit is &lt;2.6.9-40.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574645" version="1" comment="python-curses is &lt;2.6.9-40.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574646" version="1" comment="python-demo is &lt;2.6.9-40.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569060" version="1" comment="python-doc is &lt;2.6-8.40.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569061" version="1" comment="python-doc-pdf is &lt;2.6-8.40.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574647" version="1" comment="python-gdbm is &lt;2.6.9-40.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574648" version="1" comment="python-idle is &lt;2.6.9-40.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574649" version="1" comment="python-tk is &lt;2.6.9-40.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574650" version="1" comment="python-xml is &lt;2.6.9-40.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574651" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574652" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574653" version="1" comment="python is &lt;2.6.9-40.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574654" version="1" comment="python-32bit is &lt;2.6.9-40.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574655" version="1" comment="python-base is &lt;2.6.9-40.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574656" version="1" comment="python-base-32bit is &lt;2.6.9-40.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574657" version="1" comment="python-curses is &lt;2.6.9-40.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574658" version="1" comment="python-demo is &lt;2.6.9-40.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569071" version="1" comment="python-doc is &lt;2.6-8.40.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569072" version="1" comment="python-doc-pdf is &lt;2.6-8.40.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574659" version="1" comment="python-gdbm is &lt;2.6.9-40.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574660" version="1" comment="python-idle is &lt;2.6.9-40.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574661" version="1" comment="python-tk is &lt;2.6.9-40.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574662" version="1" comment="python-xml is &lt;2.6.9-40.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574663" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574664" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574665" version="1" comment="python is &lt;2.6.9-40.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574666" version="1" comment="python-32bit is &lt;2.6.9-40.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574667" version="1" comment="python-base is &lt;2.6.9-40.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574668" version="1" comment="python-base-32bit is &lt;2.6.9-40.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574669" version="1" comment="python-curses is &lt;2.6.9-40.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574670" version="1" comment="python-demo is &lt;2.6.9-40.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574671" version="1" comment="python-doc is &lt;2.6-8.40.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574672" version="1" comment="python-doc-pdf is &lt;2.6-8.40.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574673" version="1" comment="python-gdbm is &lt;2.6.9-40.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574674" version="1" comment="python-idle is &lt;2.6.9-40.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574675" version="1" comment="python-tk is &lt;2.6.9-40.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574676" version="1" comment="python-xml is &lt;2.6.9-40.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574677" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574678" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574679" version="1" comment="python is &lt;2.6.9-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574680" version="1" comment="python-32bit is &lt;2.6.9-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574681" version="1" comment="python-base is &lt;2.6.9-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574682" version="1" comment="python-base-32bit is &lt;2.6.9-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574683" version="1" comment="python-curses is &lt;2.6.9-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574684" version="1" comment="python-demo is &lt;2.6.9-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574685" version="1" comment="python-doc is &lt;2.6-8.40.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574686" version="1" comment="python-doc-pdf is &lt;2.6-8.40.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574687" version="1" comment="python-gdbm is &lt;2.6.9-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574688" version="1" comment="python-idle is &lt;2.6.9-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574689" version="1" comment="python-tk is &lt;2.6.9-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574690" version="1" comment="python-xml is &lt;2.6.9-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574691" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574692" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574693" version="1" comment="python is &lt;2.6.9-40.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574694" version="1" comment="python-32bit is &lt;2.6.9-40.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574695" version="1" comment="python-base is &lt;2.6.9-40.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574696" version="1" comment="python-base-32bit is &lt;2.6.9-40.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574697" version="1" comment="python-curses is &lt;2.6.9-40.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574698" version="1" comment="python-demo is &lt;2.6.9-40.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569082" version="1" comment="python-doc is &lt;2.6-8.40.48.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569083" version="1" comment="python-doc-pdf is &lt;2.6-8.40.48.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574699" version="1" comment="python-gdbm is &lt;2.6.9-40.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574700" version="1" comment="python-idle is &lt;2.6.9-40.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574701" version="1" comment="python-tk is &lt;2.6.9-40.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574702" version="1" comment="python-xml is &lt;2.6.9-40.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631986" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631987" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631988" version="1" comment="python is &lt;2.6.9-40.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631989" version="1" comment="python-32bit is &lt;2.6.9-40.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631990" version="1" comment="python-base is &lt;2.6.9-40.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631991" version="1" comment="python-base-32bit is &lt;2.6.9-40.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631992" version="1" comment="python-curses is &lt;2.6.9-40.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631993" version="1" comment="python-demo is &lt;2.6.9-40.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631994" version="1" comment="python-doc is &lt;2.6-8.40.53.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631995" version="1" comment="python-doc-pdf is &lt;2.6-8.40.53.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631996" version="1" comment="python-gdbm is &lt;2.6.9-40.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631997" version="1" comment="python-idle is &lt;2.6.9-40.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631998" version="1" comment="python-tk is &lt;2.6.9-40.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631999" version="1" comment="python-xml is &lt;2.6.9-40.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651289" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651290" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651291" version="1" comment="python is &lt;2.6.9-40.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651292" version="1" comment="python-32bit is &lt;2.6.9-40.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651293" version="1" comment="python-base is &lt;2.6.9-40.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651294" version="1" comment="python-base-32bit is &lt;2.6.9-40.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651295" version="1" comment="python-curses is &lt;2.6.9-40.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651296" version="1" comment="python-demo is &lt;2.6.9-40.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651297" version="1" comment="python-doc is &lt;2.6-8.40.58.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651298" version="1" comment="python-doc-pdf is &lt;2.6-8.40.58.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651299" version="1" comment="python-gdbm is &lt;2.6.9-40.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651300" version="1" comment="python-idle is &lt;2.6.9-40.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651301" version="1" comment="python-tk is &lt;2.6.9-40.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651302" version="1" comment="python-xml is &lt;2.6.9-40.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574717" version="1" comment="libpython2_6-1_0 is &lt;2.6.8-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566178" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.8-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574718" version="1" comment="python is &lt;2.6.8-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563122" version="1" comment="python-32bit is &lt;2.6.8-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574719" version="1" comment="python-base is &lt;2.6.8-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566181" version="1" comment="python-base-32bit is &lt;2.6.8-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574720" version="1" comment="python-curses is &lt;2.6.8-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574721" version="1" comment="python-demo is &lt;2.6.8-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574722" version="1" comment="python-gdbm is &lt;2.6.8-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574723" version="1" comment="python-idle is &lt;2.6.8-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574724" version="1" comment="python-tk is &lt;2.6.8-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574725" version="1" comment="python-xml is &lt;2.6.8-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574726" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567066" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574727" version="1" comment="python is &lt;2.6.9-0.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563781" version="1" comment="python-32bit is &lt;2.6.9-0.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574728" version="1" comment="python-base is &lt;2.6.9-0.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567069" version="1" comment="python-base-32bit is &lt;2.6.9-0.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574729" version="1" comment="python-curses is &lt;2.6.9-0.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574730" version="1" comment="python-demo is &lt;2.6.9-0.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563784" version="1" comment="python-doc is &lt;2.6-8.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563785" version="1" comment="python-doc-pdf is &lt;2.6-8.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574731" version="1" comment="python-gdbm is &lt;2.6.9-0.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574732" version="1" comment="python-idle is &lt;2.6.9-0.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574733" version="1" comment="python-tk is &lt;2.6.9-0.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574734" version="1" comment="python-xml is &lt;2.6.9-0.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574735" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567074" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574736" version="1" comment="python is &lt;2.6.9-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563789" version="1" comment="python-32bit is &lt;2.6.9-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574737" version="1" comment="python-base is &lt;2.6.9-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567077" version="1" comment="python-base-32bit is &lt;2.6.9-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574738" version="1" comment="python-curses is &lt;2.6.9-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574739" version="1" comment="python-demo is &lt;2.6.9-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563792" version="1" comment="python-doc is &lt;2.6-8.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563793" version="1" comment="python-doc-pdf is &lt;2.6-8.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574740" version="1" comment="python-gdbm is &lt;2.6.9-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574741" version="1" comment="python-idle is &lt;2.6.9-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574742" version="1" comment="python-tk is &lt;2.6.9-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574743" version="1" comment="python-xml is &lt;2.6.9-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574744" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567082" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574745" version="1" comment="python is &lt;2.6.9-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563797" version="1" comment="python-32bit is &lt;2.6.9-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574746" version="1" comment="python-base is &lt;2.6.9-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567085" version="1" comment="python-base-32bit is &lt;2.6.9-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574747" version="1" comment="python-curses is &lt;2.6.9-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574748" version="1" comment="python-demo is &lt;2.6.9-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563800" version="1" comment="python-doc is &lt;2.6-8.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563801" version="1" comment="python-doc-pdf is &lt;2.6-8.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574749" version="1" comment="python-gdbm is &lt;2.6.9-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574750" version="1" comment="python-idle is &lt;2.6.9-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574751" version="1" comment="python-tk is &lt;2.6.9-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574752" version="1" comment="python-xml is &lt;2.6.9-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574753" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574754" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574755" version="1" comment="python is &lt;2.6.9-0.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574756" version="1" comment="python-32bit is &lt;2.6.9-0.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574757" version="1" comment="python-base is &lt;2.6.9-0.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574758" version="1" comment="python-base-32bit is &lt;2.6.9-0.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574759" version="1" comment="python-curses is &lt;2.6.9-0.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574760" version="1" comment="python-demo is &lt;2.6.9-0.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574761" version="1" comment="python-devel is &lt;2.6.9-0.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563808" version="1" comment="python-doc is &lt;2.6-8.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563809" version="1" comment="python-doc-pdf is &lt;2.6-8.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574762" version="1" comment="python-gdbm is &lt;2.6.9-0.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574763" version="1" comment="python-idle is &lt;2.6.9-0.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574764" version="1" comment="python-tk is &lt;2.6.9-0.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574765" version="1" comment="python-xml is &lt;2.6.9-0.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574766" version="1" comment="python-imaging is &lt;1.1.6-168.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992324" version="1" comment="python-lxml is &lt;2.1.2-1.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574767" version="1" comment="python-numpy is &lt;1.3.0-1.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992325" version="1" comment="python-pam is &lt;0.5.0-3.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992326" version="1" comment="python-pywbem is &lt;0.7-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992327" version="1" comment="libpython2_6-1_0 is &lt;2.6.8-0.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992328" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.8-0.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992329" version="1" comment="python is &lt;2.6.8-0.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992330" version="1" comment="python-32bit is &lt;2.6.8-0.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992331" version="1" comment="python-base is &lt;2.6.8-0.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992332" version="1" comment="python-base-32bit is &lt;2.6.8-0.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992333" version="1" comment="python-curses is &lt;2.6.8-0.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992334" version="1" comment="python-demo is &lt;2.6.8-0.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574779" version="1" comment="python-doc is &lt;2.6-8.13.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574780" version="1" comment="python-doc-pdf is &lt;2.6-8.13.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992335" version="1" comment="python-gdbm is &lt;2.6.8-0.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992336" version="1" comment="python-idle is &lt;2.6.8-0.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992337" version="1" comment="python-tk is &lt;2.6.8-0.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992338" version="1" comment="python-xml is &lt;2.6.8-0.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574786" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574787" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574788" version="1" comment="python27 is &lt;2.7.9-6.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574789" version="1" comment="python27-32bit is &lt;2.7.9-6.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574790" version="1" comment="python27-base is &lt;2.7.9-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574791" version="1" comment="python27-base-32bit is &lt;2.7.9-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574792" version="1" comment="python27-curses is &lt;2.7.9-6.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574793" version="1" comment="python27-demo is &lt;2.7.9-6.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574794" version="1" comment="python27-devel is &lt;2.7.9-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574795" version="1" comment="python27-doc is &lt;2.7.9-6.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574796" version="1" comment="python27-doc-pdf is &lt;2.7.9-6.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574797" version="1" comment="python27-gdbm is &lt;2.7.9-6.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574798" version="1" comment="python27-idle is &lt;2.7.9-6.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574799" version="1" comment="python27-tk is &lt;2.7.9-6.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574800" version="1" comment="python27-xml is &lt;2.7.9-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574801" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574802" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574803" version="1" comment="python27 is &lt;2.7.9-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574804" version="1" comment="python27-32bit is &lt;2.7.9-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574805" version="1" comment="python27-base is &lt;2.7.9-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574806" version="1" comment="python27-base-32bit is &lt;2.7.9-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574807" version="1" comment="python27-curses is &lt;2.7.9-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574808" version="1" comment="python27-demo is &lt;2.7.9-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574809" version="1" comment="python27-devel is &lt;2.7.9-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574810" version="1" comment="python27-doc is &lt;2.7.9-6.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574811" version="1" comment="python27-doc-pdf is &lt;2.7.9-6.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574812" version="1" comment="python27-gdbm is &lt;2.7.9-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574813" version="1" comment="python27-idle is &lt;2.7.9-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574814" version="1" comment="python27-tk is &lt;2.7.9-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574815" version="1" comment="python27-xml is &lt;2.7.9-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574816" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574817" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574818" version="1" comment="python27 is &lt;2.7.9-6.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574819" version="1" comment="python27-32bit is &lt;2.7.9-6.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574820" version="1" comment="python27-base is &lt;2.7.9-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574821" version="1" comment="python27-base-32bit is &lt;2.7.9-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574822" version="1" comment="python27-curses is &lt;2.7.9-6.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574823" version="1" comment="python27-demo is &lt;2.7.9-6.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574824" version="1" comment="python27-devel is &lt;2.7.9-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574825" version="1" comment="python27-doc is &lt;2.7.9-6.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574826" version="1" comment="python27-doc-pdf is &lt;2.7.9-6.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574827" version="1" comment="python27-gdbm is &lt;2.7.9-6.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574828" version="1" comment="python27-idle is &lt;2.7.9-6.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574829" version="1" comment="python27-tk is &lt;2.7.9-6.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574830" version="1" comment="python27-xml is &lt;2.7.9-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574831" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-6.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574832" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-6.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574833" version="1" comment="python27 is &lt;2.7.9-6.17.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574834" version="1" comment="python27-32bit is &lt;2.7.9-6.17.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574835" version="1" comment="python27-base is &lt;2.7.9-6.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574836" version="1" comment="python27-base-32bit is &lt;2.7.9-6.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574837" version="1" comment="python27-curses is &lt;2.7.9-6.17.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574838" version="1" comment="python27-demo is &lt;2.7.9-6.17.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574839" version="1" comment="python27-devel is &lt;2.7.9-6.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574840" version="1" comment="python27-doc is &lt;2.7.9-6.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574841" version="1" comment="python27-doc-pdf is &lt;2.7.9-6.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574842" version="1" comment="python27-gdbm is &lt;2.7.9-6.17.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574843" version="1" comment="python27-idle is &lt;2.7.9-6.17.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574844" version="1" comment="python27-tk is &lt;2.7.9-6.17.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574845" version="1" comment="python27-xml is &lt;2.7.9-6.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574846" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574847" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574848" version="1" comment="python27 is &lt;2.7.9-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574849" version="1" comment="python27-32bit is &lt;2.7.9-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574850" version="1" comment="python27-base is &lt;2.7.9-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574851" version="1" comment="python27-base-32bit is &lt;2.7.9-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574852" version="1" comment="python27-curses is &lt;2.7.9-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574853" version="1" comment="python27-demo is &lt;2.7.9-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574854" version="1" comment="python27-devel is &lt;2.7.9-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574855" version="1" comment="python27-doc is &lt;2.7.9-6.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574856" version="1" comment="python27-doc-pdf is &lt;2.7.9-6.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574857" version="1" comment="python27-gdbm is &lt;2.7.9-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574858" version="1" comment="python27-idle is &lt;2.7.9-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574859" version="1" comment="python27-tk is &lt;2.7.9-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574860" version="1" comment="python27-xml is &lt;2.7.9-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574861" version="1" comment="libpython2_7-1_0 is &lt;2.7.16-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574862" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.16-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574863" version="1" comment="python27 is &lt;2.7.16-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574864" version="1" comment="python27-32bit is &lt;2.7.16-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574865" version="1" comment="python27-base is &lt;2.7.16-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574866" version="1" comment="python27-base-32bit is &lt;2.7.16-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574867" version="1" comment="python27-curses is &lt;2.7.16-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574868" version="1" comment="python27-demo is &lt;2.7.16-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574869" version="1" comment="python27-devel is &lt;2.7.16-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574870" version="1" comment="python27-doc is &lt;2.7.16-6.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574871" version="1" comment="python27-doc-pdf is &lt;2.7.16-6.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574872" version="1" comment="python27-gdbm is &lt;2.7.16-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574873" version="1" comment="python27-idle is &lt;2.7.16-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574874" version="1" comment="python27-tk is &lt;2.7.16-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574875" version="1" comment="python27-xml is &lt;2.7.16-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574876" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574877" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574878" version="1" comment="python-rpm-macros is &lt;20190408.32abece-2.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574879" version="1" comment="python27 is &lt;2.7.17-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574880" version="1" comment="python27-32bit is &lt;2.7.17-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574881" version="1" comment="python27-base is &lt;2.7.17-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574882" version="1" comment="python27-base-32bit is &lt;2.7.17-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574883" version="1" comment="python27-curses is &lt;2.7.17-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574884" version="1" comment="python27-demo is &lt;2.7.17-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574885" version="1" comment="python27-devel is &lt;2.7.17-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574886" version="1" comment="python27-doc is &lt;2.7.17-6.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574887" version="1" comment="python27-doc-pdf is &lt;2.7.17-6.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574888" version="1" comment="python27-gdbm is &lt;2.7.17-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574889" version="1" comment="python27-idle is &lt;2.7.17-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574890" version="1" comment="python27-tk is &lt;2.7.17-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574891" version="1" comment="python27-xml is &lt;2.7.17-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574892" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-6.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574893" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-6.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574894" version="1" comment="python27 is &lt;2.7.17-6.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574895" version="1" comment="python27-32bit is &lt;2.7.17-6.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574896" version="1" comment="python27-base is &lt;2.7.17-6.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574897" version="1" comment="python27-base-32bit is &lt;2.7.17-6.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574898" version="1" comment="python27-curses is &lt;2.7.17-6.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574899" version="1" comment="python27-demo is &lt;2.7.17-6.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574900" version="1" comment="python27-devel is &lt;2.7.17-6.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574901" version="1" comment="python27-doc is &lt;2.7.17-6.55.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574902" version="1" comment="python27-doc-pdf is &lt;2.7.17-6.55.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574903" version="1" comment="python27-gdbm is &lt;2.7.17-6.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574904" version="1" comment="python27-idle is &lt;2.7.17-6.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574905" version="1" comment="python27-tk is &lt;2.7.17-6.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574906" version="1" comment="python27-xml is &lt;2.7.17-6.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574907" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-6.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574908" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-6.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574909" version="1" comment="python27 is &lt;2.7.17-6.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574910" version="1" comment="python27-32bit is &lt;2.7.17-6.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574911" version="1" comment="python27-base is &lt;2.7.17-6.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574912" version="1" comment="python27-base-32bit is &lt;2.7.17-6.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574913" version="1" comment="python27-curses is &lt;2.7.17-6.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574914" version="1" comment="python27-demo is &lt;2.7.17-6.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574915" version="1" comment="python27-devel is &lt;2.7.17-6.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574916" version="1" comment="python27-doc is &lt;2.7.17-6.58.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574917" version="1" comment="python27-doc-pdf is &lt;2.7.17-6.58.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574918" version="1" comment="python27-gdbm is &lt;2.7.17-6.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574919" version="1" comment="python27-idle is &lt;2.7.17-6.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574920" version="1" comment="python27-tk is &lt;2.7.17-6.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574921" version="1" comment="python27-xml is &lt;2.7.17-6.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574922" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-6.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574923" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-6.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574924" version="1" comment="python27 is &lt;2.7.17-6.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574925" version="1" comment="python27-32bit is &lt;2.7.17-6.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574926" version="1" comment="python27-base is &lt;2.7.17-6.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574927" version="1" comment="python27-base-32bit is &lt;2.7.17-6.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574928" version="1" comment="python27-curses is &lt;2.7.17-6.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574929" version="1" comment="python27-demo is &lt;2.7.17-6.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574930" version="1" comment="python27-devel is &lt;2.7.17-6.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574931" version="1" comment="python27-doc is &lt;2.7.17-6.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574932" version="1" comment="python27-doc-pdf is &lt;2.7.17-6.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574933" version="1" comment="python27-gdbm is &lt;2.7.17-6.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574934" version="1" comment="python27-idle is &lt;2.7.17-6.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574935" version="1" comment="python27-tk is &lt;2.7.17-6.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574936" version="1" comment="python27-xml is &lt;2.7.17-6.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574937" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-6.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574938" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-6.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574939" version="1" comment="python27 is &lt;2.7.18-6.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574940" version="1" comment="python27-32bit is &lt;2.7.18-6.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574941" version="1" comment="python27-base is &lt;2.7.18-6.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574942" version="1" comment="python27-base-32bit is &lt;2.7.18-6.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574943" version="1" comment="python27-curses is &lt;2.7.18-6.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574944" version="1" comment="python27-demo is &lt;2.7.18-6.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574945" version="1" comment="python27-devel is &lt;2.7.18-6.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574946" version="1" comment="python27-doc is &lt;2.7.18-6.66.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574947" version="1" comment="python27-doc-pdf is &lt;2.7.18-6.66.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574948" version="1" comment="python27-gdbm is &lt;2.7.18-6.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574949" version="1" comment="python27-idle is &lt;2.7.18-6.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574950" version="1" comment="python27-tk is &lt;2.7.18-6.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574951" version="1" comment="python27-xml is &lt;2.7.18-6.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634733" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-6.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634734" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-6.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634735" version="1" comment="python27 is &lt;2.7.18-6.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634736" version="1" comment="python27-32bit is &lt;2.7.18-6.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634737" version="1" comment="python27-base is &lt;2.7.18-6.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634738" version="1" comment="python27-base-32bit is &lt;2.7.18-6.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634739" version="1" comment="python27-curses is &lt;2.7.18-6.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634740" version="1" comment="python27-demo is &lt;2.7.18-6.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634741" version="1" comment="python27-devel is &lt;2.7.18-6.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634742" version="1" comment="python27-doc is &lt;2.7.18-6.71.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634743" version="1" comment="python27-doc-pdf is &lt;2.7.18-6.71.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634744" version="1" comment="python27-gdbm is &lt;2.7.18-6.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634745" version="1" comment="python27-idle is &lt;2.7.18-6.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634746" version="1" comment="python27-tk is &lt;2.7.18-6.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634747" version="1" comment="python27-xml is &lt;2.7.18-6.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668229" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-6.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668230" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-6.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668231" version="1" comment="python27 is &lt;2.7.18-6.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668232" version="1" comment="python27-32bit is &lt;2.7.18-6.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668233" version="1" comment="python27-base is &lt;2.7.18-6.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668234" version="1" comment="python27-base-32bit is &lt;2.7.18-6.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668235" version="1" comment="python27-curses is &lt;2.7.18-6.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668236" version="1" comment="python27-demo is &lt;2.7.18-6.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668237" version="1" comment="python27-devel is &lt;2.7.18-6.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668238" version="1" comment="python27-doc is &lt;2.7.18-6.74.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668239" version="1" comment="python27-doc-pdf is &lt;2.7.18-6.74.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668240" version="1" comment="python27-gdbm is &lt;2.7.18-6.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668241" version="1" comment="python27-idle is &lt;2.7.18-6.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668242" version="1" comment="python27-tk is &lt;2.7.18-6.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668243" version="1" comment="python27-xml is &lt;2.7.18-6.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677044" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-6.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677045" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-6.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677046" version="1" comment="python27 is &lt;2.7.18-6.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677047" version="1" comment="python27-32bit is &lt;2.7.18-6.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677048" version="1" comment="python27-base is &lt;2.7.18-6.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677049" version="1" comment="python27-base-32bit is &lt;2.7.18-6.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677050" version="1" comment="python27-curses is &lt;2.7.18-6.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677051" version="1" comment="python27-demo is &lt;2.7.18-6.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677052" version="1" comment="python27-devel is &lt;2.7.18-6.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677053" version="1" comment="python27-doc is &lt;2.7.18-6.77.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677054" version="1" comment="python27-doc-pdf is &lt;2.7.18-6.77.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677055" version="1" comment="python27-gdbm is &lt;2.7.18-6.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677056" version="1" comment="python27-idle is &lt;2.7.18-6.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677057" version="1" comment="python27-tk is &lt;2.7.18-6.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677058" version="1" comment="python27-xml is &lt;2.7.18-6.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574952" version="1" comment="libpython2_7-1_0 is &lt;2.7.16-6.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574953" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.16-6.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574954" version="1" comment="python27 is &lt;2.7.16-6.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574955" version="1" comment="python27-32bit is &lt;2.7.16-6.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574956" version="1" comment="python27-base is &lt;2.7.16-6.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574957" version="1" comment="python27-base-32bit is &lt;2.7.16-6.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574958" version="1" comment="python27-curses is &lt;2.7.16-6.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574959" version="1" comment="python27-demo is &lt;2.7.16-6.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574960" version="1" comment="python27-devel is &lt;2.7.16-6.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574961" version="1" comment="python27-doc is &lt;2.7.16-6.29.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574962" version="1" comment="python27-doc-pdf is &lt;2.7.16-6.29.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574963" version="1" comment="python27-gdbm is &lt;2.7.16-6.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574964" version="1" comment="python27-idle is &lt;2.7.16-6.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574965" version="1" comment="python27-setuptools is &lt;18.0.1-4.2.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574966" version="1" comment="python27-tk is &lt;2.7.16-6.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574967" version="1" comment="python27-xml is &lt;2.7.16-6.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992339" version="1" comment="quagga is &lt;0.99.15-0.14.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574969" version="1" comment="quagga is &lt;0.99.15-0.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574970" version="1" comment="quagga is &lt;0.99.15-0.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574971" version="1" comment="quagga is &lt;0.99.15-0.24.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574972" version="1" comment="quagga is &lt;0.99.15-0.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574973" version="1" comment="quagga is &lt;0.99.15-0.30.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992340" version="1" comment="quota is &lt;3.16-50.36.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992341" version="1" comment="quota-nfs is &lt;3.16-50.36.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992342" version="1" comment="radvd is &lt;1.1-1.24.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574977" version="1" comment="sendmail is &lt;8.14.3-50.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992343" version="1" comment="rsync is &lt;3.0.4-2.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574978" version="1" comment="rsync is &lt;3.0.4-2.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574979" version="1" comment="rsync is &lt;3.0.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574980" version="1" comment="rsync is &lt;3.0.4-2.48.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574981" version="1" comment="rsync is &lt;3.0.4-2.48.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992344" version="1" comment="rsyslog is &lt;3.18.3-7.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992345" version="1" comment="ruby is &lt;1.8.7.p357-0.9.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992346" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992347" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574982" version="1" comment="ruby is &lt;1.8.7.p357-0.9.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574983" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574984" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992348" version="1" comment="ruby is &lt;1.8.7.p357-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992349" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992350" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574988" version="1" comment="rzsz is &lt;0.12.21~rc-936.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992351" version="1" comment="cifs-mount is &lt;3.4.3-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992352" version="1" comment="ldapsmb is &lt;1.34b-11.28.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992353" version="1" comment="libsmbclient0 is &lt;3.4.3-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992354" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992355" version="1" comment="libtalloc1 is &lt;3.4.3-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992356" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992357" version="1" comment="libtdb1 is &lt;3.4.3-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992358" version="1" comment="libtdb1-32bit is &lt;3.4.3-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992359" version="1" comment="libwbclient0 is &lt;3.4.3-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992360" version="1" comment="libwbclient0-32bit is &lt;3.4.3-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992361" version="1" comment="samba is &lt;3.4.3-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992362" version="1" comment="samba-32bit is &lt;3.4.3-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992363" version="1" comment="samba-client is &lt;3.4.3-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992364" version="1" comment="samba-client-32bit is &lt;3.4.3-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992365" version="1" comment="samba-doc is &lt;3.4.3-1.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992366" version="1" comment="samba-krb-printing is &lt;3.4.3-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992367" version="1" comment="samba-winbind is &lt;3.4.3-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992368" version="1" comment="samba-winbind-32bit is &lt;3.4.3-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574989" version="1" comment="cifs-mount is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574990" version="1" comment="ldapsmb is &lt;1.34b-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574991" version="1" comment="libsmbclient0 is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574992" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574993" version="1" comment="libtalloc1 is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574994" version="1" comment="libtalloc1-32bit is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574995" version="1" comment="libtdb1 is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574996" version="1" comment="libtdb1-32bit is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574997" version="1" comment="libwbclient0 is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574998" version="1" comment="libwbclient0-32bit is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574999" version="1" comment="samba is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575000" version="1" comment="samba-32bit is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575001" version="1" comment="samba-client is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575002" version="1" comment="samba-client-32bit is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575003" version="1" comment="samba-krb-printing is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575004" version="1" comment="samba-winbind is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575005" version="1" comment="samba-winbind-32bit is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575006" version="1" comment="cifs-mount is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575007" version="1" comment="ldapsmb is &lt;1.34b-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575008" version="1" comment="libsmbclient0 is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575009" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575010" version="1" comment="libtalloc1 is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575011" version="1" comment="libtalloc1-32bit is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575012" version="1" comment="libtdb1 is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575013" version="1" comment="libtdb1-32bit is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575014" version="1" comment="libwbclient0 is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575015" version="1" comment="libwbclient0-32bit is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575016" version="1" comment="samba is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575017" version="1" comment="samba-32bit is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575018" version="1" comment="samba-client is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575019" version="1" comment="samba-client-32bit is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575020" version="1" comment="samba-krb-printing is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575021" version="1" comment="samba-winbind is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575022" version="1" comment="samba-winbind-32bit is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575023" version="1" comment="cifs-mount is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575024" version="1" comment="ldapsmb is &lt;1.34b-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575025" version="1" comment="libsmbclient0 is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575026" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575027" version="1" comment="libtalloc1 is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575028" version="1" comment="libtalloc1-32bit is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575029" version="1" comment="libtdb1 is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575030" version="1" comment="libtdb1-32bit is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575031" version="1" comment="libwbclient0 is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575032" version="1" comment="libwbclient0-32bit is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575033" version="1" comment="samba is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575034" version="1" comment="samba-32bit is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575035" version="1" comment="samba-client is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575036" version="1" comment="samba-client-32bit is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575037" version="1" comment="samba-krb-printing is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575038" version="1" comment="samba-winbind is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575039" version="1" comment="samba-winbind-32bit is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575040" version="1" comment="cifs-mount is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575041" version="1" comment="ldapsmb is &lt;1.34b-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575042" version="1" comment="libsmbclient0 is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575043" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575044" version="1" comment="libtalloc1 is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575045" version="1" comment="libtalloc1-32bit is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575046" version="1" comment="libtdb1 is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575047" version="1" comment="libtdb1-32bit is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575048" version="1" comment="libwbclient0 is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575049" version="1" comment="libwbclient0-32bit is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575050" version="1" comment="samba is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575051" version="1" comment="samba-32bit is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575052" version="1" comment="samba-client is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575053" version="1" comment="samba-client-32bit is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575054" version="1" comment="samba-krb-printing is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575055" version="1" comment="samba-winbind is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575056" version="1" comment="samba-winbind-32bit is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575057" version="1" comment="cifs-mount is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575058" version="1" comment="ldapsmb is &lt;1.34b-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575059" version="1" comment="libsmbclient0 is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575060" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575061" version="1" comment="libtalloc1 is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575062" version="1" comment="libtalloc1-32bit is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575063" version="1" comment="libtdb1 is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575064" version="1" comment="libtdb1-32bit is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575065" version="1" comment="libwbclient0 is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575066" version="1" comment="libwbclient0-32bit is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575067" version="1" comment="samba is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575068" version="1" comment="samba-32bit is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575069" version="1" comment="samba-client is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575070" version="1" comment="samba-client-32bit is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575071" version="1" comment="samba-krb-printing is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575072" version="1" comment="samba-winbind is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575073" version="1" comment="samba-winbind-32bit is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575074" version="1" comment="cifs-mount is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575075" version="1" comment="ldapsmb is &lt;1.34b-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575076" version="1" comment="libsmbclient0 is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575077" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575078" version="1" comment="libtalloc1 is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575079" version="1" comment="libtalloc1-32bit is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575080" version="1" comment="libtdb1 is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575081" version="1" comment="libtdb1-32bit is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575082" version="1" comment="libwbclient0 is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575083" version="1" comment="libwbclient0-32bit is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575084" version="1" comment="samba is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575085" version="1" comment="samba-32bit is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575086" version="1" comment="samba-client is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575087" version="1" comment="samba-client-32bit is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575088" version="1" comment="samba-krb-printing is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575089" version="1" comment="samba-winbind is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575090" version="1" comment="samba-winbind-32bit is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575091" version="1" comment="cifs-mount is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575092" version="1" comment="ldapsmb is &lt;1.34b-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575093" version="1" comment="libsmbclient0 is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575094" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575095" version="1" comment="libtalloc1 is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575096" version="1" comment="libtalloc1-32bit is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575097" version="1" comment="libtdb1 is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575098" version="1" comment="libtdb1-32bit is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575099" version="1" comment="libwbclient0 is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575100" version="1" comment="libwbclient0-32bit is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575101" version="1" comment="samba is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575102" version="1" comment="samba-32bit is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575103" version="1" comment="samba-client is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575104" version="1" comment="samba-client-32bit is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575105" version="1" comment="samba-krb-printing is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575106" version="1" comment="samba-winbind is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575107" version="1" comment="samba-winbind-32bit is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575108" version="1" comment="cifs-mount is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575109" version="1" comment="ldapsmb is &lt;1.34b-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575110" version="1" comment="libsmbclient0 is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575111" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575112" version="1" comment="libtalloc1 is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575113" version="1" comment="libtalloc1-32bit is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575114" version="1" comment="libtdb1 is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575115" version="1" comment="libtdb1-32bit is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575116" version="1" comment="libwbclient0 is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575117" version="1" comment="libwbclient0-32bit is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575118" version="1" comment="samba is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575119" version="1" comment="samba-32bit is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575120" version="1" comment="samba-client is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575121" version="1" comment="samba-client-32bit is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575122" version="1" comment="samba-krb-printing is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575123" version="1" comment="samba-winbind is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575124" version="1" comment="samba-winbind-32bit is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575125" version="1" comment="cifs-mount is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575126" version="1" comment="ldapsmb is &lt;1.34b-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575127" version="1" comment="libsmbclient0 is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575128" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575129" version="1" comment="libtalloc1 is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575130" version="1" comment="libtalloc1-32bit is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575131" version="1" comment="libtdb1 is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575132" version="1" comment="libtdb1-32bit is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575133" version="1" comment="libwbclient0 is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575134" version="1" comment="libwbclient0-32bit is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575135" version="1" comment="samba is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575136" version="1" comment="samba-32bit is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575137" version="1" comment="samba-client is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575138" version="1" comment="samba-client-32bit is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575139" version="1" comment="samba-krb-printing is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575140" version="1" comment="samba-winbind is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575141" version="1" comment="samba-winbind-32bit is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575142" version="1" comment="cifs-mount is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575143" version="1" comment="ldapsmb is &lt;1.34b-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575144" version="1" comment="libsmbclient0 is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575145" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575146" version="1" comment="libtalloc1 is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575147" version="1" comment="libtalloc1-32bit is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575148" version="1" comment="libtdb1 is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575149" version="1" comment="libtdb1-32bit is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575150" version="1" comment="libwbclient0 is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575151" version="1" comment="libwbclient0-32bit is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575152" version="1" comment="samba is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575153" version="1" comment="samba-32bit is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575154" version="1" comment="samba-client is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575155" version="1" comment="samba-client-32bit is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575156" version="1" comment="samba-krb-printing is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575157" version="1" comment="samba-winbind is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575158" version="1" comment="samba-winbind-32bit is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575159" version="1" comment="cifs-mount is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575160" version="1" comment="ldapsmb is &lt;1.34b-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575161" version="1" comment="libsmbclient0 is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575162" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575163" version="1" comment="libtalloc1 is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575164" version="1" comment="libtalloc1-32bit is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575165" version="1" comment="libtdb1 is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575166" version="1" comment="libtdb1-32bit is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575167" version="1" comment="libwbclient0 is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575168" version="1" comment="libwbclient0-32bit is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575169" version="1" comment="samba is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575170" version="1" comment="samba-32bit is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575171" version="1" comment="samba-client is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575172" version="1" comment="samba-client-32bit is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575173" version="1" comment="samba-krb-printing is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575174" version="1" comment="samba-winbind is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575175" version="1" comment="samba-winbind-32bit is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672778" version="1" comment="cifs-mount is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672779" version="1" comment="ldapsmb is &lt;1.34b-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672780" version="1" comment="libsmbclient0 is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672781" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672782" version="1" comment="libtalloc1 is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672783" version="1" comment="libtalloc1-32bit is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672784" version="1" comment="libtdb1 is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672785" version="1" comment="libtdb1-32bit is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672786" version="1" comment="libwbclient0 is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672787" version="1" comment="libwbclient0-32bit is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672788" version="1" comment="samba is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672789" version="1" comment="samba-32bit is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672790" version="1" comment="samba-client is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672791" version="1" comment="samba-client-32bit is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672792" version="1" comment="samba-krb-printing is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672793" version="1" comment="samba-winbind is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672794" version="1" comment="samba-winbind-32bit is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575176" version="1" comment="sane-backends is &lt;1.0.20-7.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992369" version="1" comment="sblim-sfcb is &lt;1.3.7-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575177" version="1" comment="sblim-sfcb is &lt;1.3.7-0.21.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575178" version="1" comment="screen is &lt;4.0.2-162.19.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992370" version="1" comment="socat is &lt;1.7.0.0-1.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575180" version="1" comment="socat is &lt;1.7.0.0-1.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992371" version="1" comment="curl is &lt;7.19.7-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992372" version="1" comment="libcurl4 is &lt;7.19.7-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992373" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992374" version="1" comment="libzypp is &lt;6.37.5-0.5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992375" version="1" comment="perl-satsolver is &lt;0.14.19-0.3.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992376" version="1" comment="python-satsolver is &lt;0.14.19-0.3.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992377" version="1" comment="satsolver-tools is &lt;0.14.19-0.3.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992378" version="1" comment="yast2-packager is &lt;2.17.78.3-0.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992379" version="1" comment="yast2-pkg-bindings is &lt;2.17.45.5-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588764" version="1" comment="yast2-wagon is &lt;2.17.17.8-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992380" version="1" comment="zypper is &lt;1.3.16-0.3.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656593" version="1" comment="libspeex is &lt;1.1.99.91-16.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656594" version="1" comment="libspeex-32bit is &lt;1.1.99.91-16.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575181" version="1" comment="libsqlite3-0 is &lt;3.6.4-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575182" version="1" comment="libsqlite3-0-32bit is &lt;3.6.4-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575183" version="1" comment="sqlite3 is &lt;3.6.4-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575184" version="1" comment="libsqlite3-0 is &lt;3.6.4-4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575185" version="1" comment="libsqlite3-0-32bit is &lt;3.6.4-4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575186" version="1" comment="sqlite3 is &lt;3.6.4-4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992381" version="1" comment="squid is &lt;2.7.STABLE5-2.12.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575188" version="1" comment="squid is &lt;2.7.STABLE5-2.12.24.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575189" version="1" comment="squid is &lt;2.7.STABLE5-2.12.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575190" version="1" comment="squid is &lt;2.7.STABLE5-2.12.30.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670261" version="1" comment="squid is &lt;2.7.STABLE5-2.12.30.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992382" version="1" comment="squid3 is &lt;3.1.12-8.16.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575192" version="1" comment="squid3 is &lt;3.1.23-8.16.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575193" version="1" comment="squid3 is &lt;3.1.23-8.16.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575194" version="1" comment="squid3 is &lt;3.1.23-8.16.37.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575195" version="1" comment="squid3 is &lt;3.1.23-8.16.37.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575196" version="1" comment="squid3 is &lt;3.1.23-8.16.37.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575197" version="1" comment="squid3 is &lt;3.1.23-8.16.37.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575198" version="1" comment="squid3 is &lt;3.1.23-8.16.37.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671855" version="1" comment="squid3 is &lt;3.1.23-8.16.37.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575199" version="1" comment="squidGuard is &lt;1.4-13.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575200" version="1" comment="squidGuard-doc is &lt;1.4-13.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992383" version="1" comment="strongswan is &lt;4.4.0-6.25.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992384" version="1" comment="strongswan-doc is &lt;4.4.0-6.25.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575203" version="1" comment="strongswan is &lt;4.4.0-6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575204" version="1" comment="strongswan-doc is &lt;4.4.0-6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575205" version="1" comment="strongswan is &lt;4.4.0-6.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575206" version="1" comment="strongswan-doc is &lt;4.4.0-6.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575207" version="1" comment="strongswan is &lt;4.4.0-6.36.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575208" version="1" comment="strongswan-doc is &lt;4.4.0-6.36.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575209" version="1" comment="strongswan is &lt;4.4.0-6.36.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575210" version="1" comment="strongswan-doc is &lt;4.4.0-6.36.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652840" version="1" comment="strongswan is &lt;4.4.0-6.36.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652841" version="1" comment="strongswan-doc is &lt;4.4.0-6.36.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664947" version="1" comment="strongswan is &lt;4.4.0-6.36.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664948" version="1" comment="strongswan-doc is &lt;4.4.0-6.36.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992385" version="1" comment="stunnel is &lt;4.36-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992386" version="1" comment="sudo is &lt;1.7.6p2-0.2.14.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575212" version="1" comment="sudo is &lt;1.7.6p2-0.2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575213" version="1" comment="sudo is &lt;1.7.6p2-0.2.21.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992387" version="1" comment="supportutils is &lt;1.20-0.28.61.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992388" version="1" comment="sysconfig is &lt;0.71.31-0.9.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575214" version="1" comment="syslog-ng is &lt;2.0.9-27.34.40.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992389" version="1" comment="system-config-printer is &lt;1.0.8-9.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992390" version="1" comment="system-config-printer-lang is &lt;1.0.8-9.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575215" version="1" comment="system-config-printer is &lt;1.0.8-9.18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575216" version="1" comment="system-config-printer-lang is &lt;1.0.8-9.18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992391" version="1" comment="t1lib is &lt;5.1.1-100.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992392" version="1" comment="taglib is &lt;1.5-19.23.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992393" version="1" comment="taglib-32bit is &lt;1.5-19.23.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575221" version="1" comment="tar is &lt;1.26-1.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575222" version="1" comment="tar is &lt;1.27.1-14.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575223" version="1" comment="tar is &lt;1.27.1-14.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575224" version="1" comment="tcpdump is &lt;3.9.8-1.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575225" version="1" comment="tcpdump is &lt;3.9.8-1.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575226" version="1" comment="tcpdump is &lt;3.9.8-1.30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594221" version="1" comment="tcpdump is &lt;3.9.8-1.30.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575227" version="1" comment="tcpdump is &lt;3.9.8-1.30.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575228" version="1" comment="tcpdump is &lt;3.9.8-1.30.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668244" version="1" comment="tcpdump is &lt;3.9.8-1.30.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992394" version="1" comment="tftp is &lt;0.48-101.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992395" version="1" comment="tgt is &lt;0.9.10-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575231" version="1" comment="libtiff3 is &lt;3.8.2-141.160.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567154" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.160.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575232" version="1" comment="tiff is &lt;3.8.2-141.160.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575233" version="1" comment="libtiff3 is &lt;3.8.2-141.163.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567450" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.163.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575234" version="1" comment="tiff is &lt;3.8.2-141.163.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575235" version="1" comment="libtiff3 is &lt;3.8.2-141.168.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575236" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.168.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575237" version="1" comment="tiff is &lt;3.8.2-141.168.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575238" version="1" comment="libtiff3 is &lt;3.8.2-141.169.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575239" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575240" version="1" comment="tiff is &lt;3.8.2-141.169.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575241" version="1" comment="libtiff3 is &lt;3.8.2-141.169.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575242" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575243" version="1" comment="tiff is &lt;3.8.2-141.169.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575244" version="1" comment="libtiff3 is &lt;3.8.2-141.169.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575245" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575246" version="1" comment="tiff is &lt;3.8.2-141.169.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575247" version="1" comment="libtiff3 is &lt;3.8.2-141.169.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575248" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575249" version="1" comment="tiff is &lt;3.8.2-141.169.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575250" version="1" comment="libtiff3 is &lt;3.8.2-141.169.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575251" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575252" version="1" comment="tiff is &lt;3.8.2-141.169.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575253" version="1" comment="libtiff3 is &lt;3.8.2-141.169.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575254" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575255" version="1" comment="tiff is &lt;3.8.2-141.169.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575256" version="1" comment="libtiff3 is &lt;3.8.2-141.169.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575257" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575258" version="1" comment="tiff is &lt;3.8.2-141.169.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575259" version="1" comment="libtiff3 is &lt;3.8.2-141.169.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575260" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575261" version="1" comment="tiff is &lt;3.8.2-141.169.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666461" version="1" comment="libtiff3 is &lt;3.8.2-141.169.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666462" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666463" version="1" comment="tiff is &lt;3.8.2-141.169.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575262" version="1" comment="tightvnc is &lt;1.3.9-81.15.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575263" version="1" comment="tomcat6 is &lt;6.0.45-0.53.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575264" version="1" comment="tomcat6-admin-webapps is &lt;6.0.45-0.53.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575265" version="1" comment="tomcat6-docs-webapp is &lt;6.0.45-0.53.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575266" version="1" comment="tomcat6-javadoc is &lt;6.0.45-0.53.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575267" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.45-0.53.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575268" version="1" comment="tomcat6-lib is &lt;6.0.45-0.53.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575269" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.45-0.53.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575270" version="1" comment="tomcat6-webapps is &lt;6.0.45-0.53.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576962" version="1" comment="tomcat6 is &lt;6.0.18-20.35.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576963" version="1" comment="tomcat6-admin-webapps is &lt;6.0.18-20.35.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576964" version="1" comment="tomcat6-docs-webapp is &lt;6.0.18-20.35.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576965" version="1" comment="tomcat6-javadoc is &lt;6.0.18-20.35.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576966" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.18-20.35.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576967" version="1" comment="tomcat6-lib is &lt;6.0.18-20.35.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576968" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.18-20.35.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576969" version="1" comment="tomcat6-webapps is &lt;6.0.18-20.35.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575279" version="1" comment="tomcat6 is &lt;6.0.45-0.50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575280" version="1" comment="tomcat6-admin-webapps is &lt;6.0.45-0.50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575281" version="1" comment="tomcat6-docs-webapp is &lt;6.0.45-0.50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575282" version="1" comment="tomcat6-javadoc is &lt;6.0.45-0.50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575283" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.45-0.50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575284" version="1" comment="tomcat6-lib is &lt;6.0.45-0.50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575285" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.45-0.50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575286" version="1" comment="tomcat6-webapps is &lt;6.0.45-0.50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569238" version="1" comment="tomcat6 is &lt;6.0.53-0.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569239" version="1" comment="tomcat6-admin-webapps is &lt;6.0.53-0.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569240" version="1" comment="tomcat6-docs-webapp is &lt;6.0.53-0.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569241" version="1" comment="tomcat6-javadoc is &lt;6.0.53-0.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569242" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.53-0.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569243" version="1" comment="tomcat6-lib is &lt;6.0.53-0.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569244" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.53-0.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569245" version="1" comment="tomcat6-webapps is &lt;6.0.53-0.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575287" version="1" comment="tomcat6 is &lt;6.0.53-0.57.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575288" version="1" comment="tomcat6-admin-webapps is &lt;6.0.53-0.57.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575289" version="1" comment="tomcat6-docs-webapp is &lt;6.0.53-0.57.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575290" version="1" comment="tomcat6-javadoc is &lt;6.0.53-0.57.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575291" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.53-0.57.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575292" version="1" comment="tomcat6-lib is &lt;6.0.53-0.57.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575293" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.53-0.57.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575294" version="1" comment="tomcat6-webapps is &lt;6.0.53-0.57.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575295" version="1" comment="tomcat6 is &lt;6.0.53-0.57.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575296" version="1" comment="tomcat6-admin-webapps is &lt;6.0.53-0.57.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575297" version="1" comment="tomcat6-docs-webapp is &lt;6.0.53-0.57.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575298" version="1" comment="tomcat6-javadoc is &lt;6.0.53-0.57.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575299" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.53-0.57.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575300" version="1" comment="tomcat6-lib is &lt;6.0.53-0.57.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575301" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.53-0.57.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575302" version="1" comment="tomcat6-webapps is &lt;6.0.53-0.57.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569246" version="1" comment="tomcat6 is &lt;6.0.53-0.57.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569247" version="1" comment="tomcat6-admin-webapps is &lt;6.0.53-0.57.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569248" version="1" comment="tomcat6-docs-webapp is &lt;6.0.53-0.57.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569249" version="1" comment="tomcat6-javadoc is &lt;6.0.53-0.57.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569250" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.53-0.57.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569251" version="1" comment="tomcat6-lib is &lt;6.0.53-0.57.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569252" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.53-0.57.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569253" version="1" comment="tomcat6-webapps is &lt;6.0.53-0.57.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569254" version="1" comment="tomcat6 is &lt;6.0.53-0.57.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569255" version="1" comment="tomcat6-admin-webapps is &lt;6.0.53-0.57.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569256" version="1" comment="tomcat6-docs-webapp is &lt;6.0.53-0.57.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569257" version="1" comment="tomcat6-javadoc is &lt;6.0.53-0.57.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569258" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.53-0.57.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569259" version="1" comment="tomcat6-lib is &lt;6.0.53-0.57.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569260" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.53-0.57.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569261" version="1" comment="tomcat6-webapps is &lt;6.0.53-0.57.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569262" version="1" comment="tomcat6 is &lt;6.0.53-0.57.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569263" version="1" comment="tomcat6-admin-webapps is &lt;6.0.53-0.57.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569264" version="1" comment="tomcat6-docs-webapp is &lt;6.0.53-0.57.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569265" version="1" comment="tomcat6-javadoc is &lt;6.0.53-0.57.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569266" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.53-0.57.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569267" version="1" comment="tomcat6-lib is &lt;6.0.53-0.57.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569268" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.53-0.57.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569269" version="1" comment="tomcat6-webapps is &lt;6.0.53-0.57.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575303" version="1" comment="transfig is &lt;3.2.5-160.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575304" version="1" comment="transfig is &lt;3.2.5-160.6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651176" version="1" comment="transfig is &lt;3.2.8a-1.160.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653706" version="1" comment="transfig is &lt;3.2.8b-160.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575305" version="1" comment="unrar is &lt;3.80.2-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575306" version="1" comment="unrar is &lt;5.6.1-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575307" version="1" comment="unzip is &lt;5.52-142.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575308" version="1" comment="unzip is &lt;5.52-142.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575309" version="1" comment="unzip is &lt;5.52-142.34.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575310" version="1" comment="unzip is &lt;5.52-142.34.8.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669728" version="1" comment="unzip is &lt;5.52-142.34.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992396" version="1" comment="fuse is &lt;2.7.2-61.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992397" version="1" comment="libblkid1 is &lt;2.16-6.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992398" version="1" comment="libfuse2 is &lt;2.7.2-61.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992399" version="1" comment="libuuid1 is &lt;2.16-6.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992400" version="1" comment="libuuid1-32bit is &lt;2.16-6.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992401" version="1" comment="util-linux is &lt;2.16-6.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992402" version="1" comment="util-linux-lang is &lt;2.16-6.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992403" version="1" comment="uuid-runtime is &lt;2.16-6.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575320" version="1" comment="gvim is &lt;7.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575321" version="1" comment="vim is &lt;7.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575322" version="1" comment="vim-base is &lt;7.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575323" version="1" comment="vim-data is &lt;7.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575324" version="1" comment="gvim is &lt;7.2-13.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575325" version="1" comment="vim is &lt;7.2-13.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575326" version="1" comment="vim-base is &lt;7.2-13.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575327" version="1" comment="vim-data is &lt;7.2-13.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575328" version="1" comment="gvim is &lt;7.2-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575329" version="1" comment="vim is &lt;7.2-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575330" version="1" comment="vim-base is &lt;7.2-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575331" version="1" comment="vim-data is &lt;7.2-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575332" version="1" comment="gvim is &lt;7.2-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575333" version="1" comment="vim is &lt;7.2-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575334" version="1" comment="vim-base is &lt;7.2-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575335" version="1" comment="vim-data is &lt;7.2-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992404" version="1" comment="vino is &lt;2.28.1-2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992405" version="1" comment="vino-lang is &lt;2.28.1-2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575338" version="1" comment="vino is &lt;2.28.1-2.5.3.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575339" version="1" comment="vino-lang is &lt;2.28.1-2.5.3.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992406" version="1" comment="vsftpd is &lt;2.0.7-4.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992407" version="1" comment="vte is &lt;0.22.5-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992408" version="1" comment="vte-doc is &lt;0.22.5-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992409" version="1" comment="vte-lang is &lt;0.22.5-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992410" version="1" comment="w3m is &lt;0.5.2-132.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575344" version="1" comment="w3m is &lt;0.5.3.git20161120-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575345" version="1" comment="w3m is &lt;0.5.3.git20161120-5.3.37 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575346" version="1" comment="libwavpack1 is &lt;4.50.1-1.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575347" version="1" comment="libwavpack1 is &lt;4.50.1-1.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575348" version="1" comment="libwavpack1 is &lt;4.50.1-1.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575349" version="1" comment="wget is &lt;1.11.4-1.19.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575350" version="1" comment="wget is &lt;1.11.4-1.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575351" version="1" comment="wget-openssl1 is &lt;1.11.4-1.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575352" version="1" comment="wget is &lt;1.11.4-1.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575353" version="1" comment="wget-openssl1 is &lt;1.11.4-1.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575354" version="1" comment="wget is &lt;1.11.4-1.41.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575355" version="1" comment="wget-openssl1 is &lt;1.11.4-1.41.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992411" version="1" comment="wireshark is &lt;1.10.11-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575357" version="1" comment="wireshark is &lt;1.12.7-0.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575358" version="1" comment="wireshark is &lt;1.12.9-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575359" version="1" comment="wireshark is &lt;1.12.11-0.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575360" version="1" comment="wireshark is &lt;1.12.13-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575361" version="1" comment="libcares2 is &lt;1.7.4-7.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575362" version="1" comment="wireshark is &lt;2.0.12-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575363" version="1" comment="wireshark-gtk is &lt;2.0.12-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575364" version="1" comment="wireshark is &lt;2.0.13-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575365" version="1" comment="wireshark-gtk is &lt;2.0.13-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575366" version="1" comment="wireshark is &lt;2.0.14-40.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575367" version="1" comment="wireshark-gtk is &lt;2.0.14-40.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575368" version="1" comment="libjack0 is &lt;0.109.2-67.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575369" version="1" comment="libsmi is &lt;0.4.5-2.7.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575370" version="1" comment="libwireshark8 is &lt;2.2.11-40.14.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575371" version="1" comment="libwiretap6 is &lt;2.2.11-40.14.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575372" version="1" comment="libwscodecs1 is &lt;2.2.11-40.14.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575373" version="1" comment="libwsutil7 is &lt;2.2.11-40.14.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575374" version="1" comment="portaudio is &lt;19-234.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575375" version="1" comment="wireshark is &lt;2.2.11-40.14.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575376" version="1" comment="wireshark-gtk is &lt;2.2.11-40.14.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575377" version="1" comment="libwireshark8 is &lt;2.2.12-40.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575378" version="1" comment="libwiretap6 is &lt;2.2.12-40.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575379" version="1" comment="libwscodecs1 is &lt;2.2.12-40.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575380" version="1" comment="libwsutil7 is &lt;2.2.12-40.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575381" version="1" comment="wireshark is &lt;2.2.12-40.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575382" version="1" comment="wireshark-gtk is &lt;2.2.12-40.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575383" version="1" comment="libwireshark8 is &lt;2.2.13-40.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575384" version="1" comment="libwiretap6 is &lt;2.2.13-40.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575385" version="1" comment="libwscodecs1 is &lt;2.2.13-40.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575386" version="1" comment="libwsutil7 is &lt;2.2.13-40.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575387" version="1" comment="wireshark is &lt;2.2.13-40.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575388" version="1" comment="wireshark-gtk is &lt;2.2.13-40.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575389" version="1" comment="libwireshark8 is &lt;2.2.14-40.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575390" version="1" comment="libwiretap6 is &lt;2.2.14-40.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575391" version="1" comment="libwscodecs1 is &lt;2.2.14-40.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575392" version="1" comment="libwsutil7 is &lt;2.2.14-40.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575393" version="1" comment="wireshark is &lt;2.2.14-40.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575394" version="1" comment="wireshark-gtk is &lt;2.2.14-40.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575395" version="1" comment="libwireshark8 is &lt;2.2.16-40.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575396" version="1" comment="libwiretap6 is &lt;2.2.16-40.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575397" version="1" comment="libwscodecs1 is &lt;2.2.16-40.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575398" version="1" comment="libwsutil7 is &lt;2.2.16-40.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575399" version="1" comment="wireshark is &lt;2.2.16-40.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575400" version="1" comment="wireshark-gtk is &lt;2.2.16-40.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575401" version="1" comment="libwireshark8 is &lt;2.2.17-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575402" version="1" comment="libwiretap6 is &lt;2.2.17-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575403" version="1" comment="libwscodecs1 is &lt;2.2.17-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575404" version="1" comment="libwsutil7 is &lt;2.2.17-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575405" version="1" comment="wireshark is &lt;2.2.17-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575406" version="1" comment="wireshark-gtk is &lt;2.2.17-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575407" version="1" comment="wpa_supplicant is &lt;0.6.9-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567162" version="1" comment="xalan-j2 is &lt;2.7.0-217.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590281" version="1" comment="xen is &lt;4.0.3_21548_12-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590282" version="1" comment="xen-doc-html is &lt;4.0.3_21548_12-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590283" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_12-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590284" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_12_2.6.32.54_0.11.TDC-0.3.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575412" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.21.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590285" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_12_2.6.32.54_0.11.TDC-0.3.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590286" version="1" comment="xen-libs is &lt;4.0.3_21548_12-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590287" version="1" comment="xen-tools is &lt;4.0.3_21548_12-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590288" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_12-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575417" version="1" comment="xen is &lt;4.0.3_21548_18-29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575418" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575419" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575420" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.59_0.19-29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575421" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_18_2.6.32.59_0.19-29.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575422" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.59_0.19-29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575423" version="1" comment="xen-libs is &lt;4.0.3_21548_18-29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575424" version="1" comment="xen-tools is &lt;4.0.3_21548_18-29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575425" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575426" version="1" comment="xen is &lt;4.0.3_21548_18-27.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575427" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-27.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575428" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-27.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575429" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.68.TDC-27.6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575430" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.68.TDC-27.6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575431" version="1" comment="xen-libs is &lt;4.0.3_21548_18-27.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575432" version="1" comment="xen-tools is &lt;4.0.3_21548_18-27.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575433" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-27.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575434" version="1" comment="xen is &lt;4.0.3_21548_18-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575435" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575436" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575437" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.68.TDC-30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575438" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.68.TDC-30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575439" version="1" comment="xen-libs is &lt;4.0.3_21548_18-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575440" version="1" comment="xen-tools is &lt;4.0.3_21548_18-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575441" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575442" version="1" comment="xen is &lt;4.0.3_21548_18-36.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575443" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-36.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575444" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-36.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575445" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.85.TDC-36.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575446" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.85.TDC-36.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575447" version="1" comment="xen-libs is &lt;4.0.3_21548_18-36.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575448" version="1" comment="xen-tools is &lt;4.0.3_21548_18-36.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575449" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-36.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575450" version="1" comment="xen is &lt;4.0.3_21548_18-41.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575451" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-41.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575452" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-41.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575453" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.94.TDC-41.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575454" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.94.TDC-41.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575455" version="1" comment="xen-libs is &lt;4.0.3_21548_18-41.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575456" version="1" comment="xen-tools is &lt;4.0.3_21548_18-41.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575457" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-41.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575458" version="1" comment="xen is &lt;4.0.3_21548_18-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575459" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575460" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575461" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.97.TDC-44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575462" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.97.TDC-44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575463" version="1" comment="xen-libs is &lt;4.0.3_21548_18-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575464" version="1" comment="xen-tools is &lt;4.0.3_21548_18-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575465" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575466" version="1" comment="xen is &lt;4.0.3_21548_18-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575467" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575468" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575469" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.103.TDC-49.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575470" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.103.TDC-49.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575471" version="1" comment="xen-libs is &lt;4.0.3_21548_18-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575472" version="1" comment="xen-tools is &lt;4.0.3_21548_18-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575473" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575474" version="1" comment="xen is &lt;4.0.3_21548_18-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575475" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575476" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575477" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.103.TDC-52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575478" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.103.TDC-52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575479" version="1" comment="xen-libs is &lt;4.0.3_21548_18-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575480" version="1" comment="xen-tools is &lt;4.0.3_21548_18-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575481" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575482" version="1" comment="xen is &lt;4.0.3_21548_18-53.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575483" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-53.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575484" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-53.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575485" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.112.TDC-53.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575486" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.112.TDC-53.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575487" version="1" comment="xen-libs is &lt;4.0.3_21548_18-53.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575488" version="1" comment="xen-tools is &lt;4.0.3_21548_18-53.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575489" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-53.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575490" version="1" comment="xen is &lt;4.0.3_21548_18-53.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575491" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-53.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575492" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-53.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575493" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.112.TDC-53.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575494" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.112.TDC-53.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575495" version="1" comment="xen-libs is &lt;4.0.3_21548_18-53.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575496" version="1" comment="xen-tools is &lt;4.0.3_21548_18-53.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575497" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-53.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575498" version="1" comment="xen is &lt;4.0.3_21548_18-53.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575499" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-53.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575500" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-53.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575501" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.116.TDC-53.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575502" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.116.TDC-53.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575503" version="1" comment="xen-libs is &lt;4.0.3_21548_18-53.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575504" version="1" comment="xen-tools is &lt;4.0.3_21548_18-53.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575505" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-53.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575506" version="1" comment="xen is &lt;4.0.3_21548_18-53.14.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575507" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-53.14.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575508" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-53.14.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575509" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.122.TDC-53.14.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575510" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.122.TDC-53.14.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575511" version="1" comment="xen-libs is &lt;4.0.3_21548_18-53.14.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575512" version="1" comment="xen-tools is &lt;4.0.3_21548_18-53.14.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575513" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-53.14.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575514" version="1" comment="xen is &lt;4.0.3_21548_18-53.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575515" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-53.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575516" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-53.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575517" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.133.TDC-53.19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575518" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.133.TDC-53.19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575519" version="1" comment="xen-libs is &lt;4.0.3_21548_18-53.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575520" version="1" comment="xen-tools is &lt;4.0.3_21548_18-53.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575521" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-53.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575522" version="1" comment="xen is &lt;4.0.3_21548_20-53.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575523" version="1" comment="xen-doc-html is &lt;4.0.3_21548_20-53.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575524" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_20-53.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575525" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_20_2.6.32.54_0.172.TDC-53.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575526" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_20_2.6.32.54_0.172.TDC-53.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575527" version="1" comment="xen-libs is &lt;4.0.3_21548_20-53.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575528" version="1" comment="xen-tools is &lt;4.0.3_21548_20-53.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575529" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_20-53.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575530" version="1" comment="xen is &lt;4.0.3_21548_20-53.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575531" version="1" comment="xen-doc-html is &lt;4.0.3_21548_20-53.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575532" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_20-53.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575533" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_20_2.6.32.54_0.178.TDC-53.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575534" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_20_2.6.32.54_0.178.TDC-53.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575535" version="1" comment="xen-libs is &lt;4.0.3_21548_20-53.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575536" version="1" comment="xen-tools is &lt;4.0.3_21548_20-53.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575537" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_20-53.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992412" version="1" comment="libvirt is &lt;0.7.6-1.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992413" version="1" comment="libvirt-doc is &lt;0.7.6-1.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992414" version="1" comment="libvirt-python is &lt;0.7.6-1.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992415" version="1" comment="vm-install is &lt;0.4.30-0.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992416" version="1" comment="xen is &lt;4.0.1_21326_08-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992417" version="1" comment="xen-doc-html is &lt;4.0.1_21326_08-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992418" version="1" comment="xen-doc-pdf is &lt;4.0.1_21326_08-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992419" version="1" comment="xen-kmp-default is &lt;4.0.1_21326_08_2.6.32.36_0.5-0.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992420" version="1" comment="xen-libs is &lt;4.0.1_21326_08-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992421" version="1" comment="xen-tools is &lt;4.0.1_21326_08-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992422" version="1" comment="xen-tools-domU is &lt;4.0.1_21326_08-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992423" version="1" comment="vm-install is &lt;0.4.31-0.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992424" version="1" comment="xen is &lt;4.0.2_21511_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992425" version="1" comment="xen-doc-html is &lt;4.0.2_21511_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992426" version="1" comment="xen-doc-pdf is &lt;4.0.2_21511_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992427" version="1" comment="xen-kmp-default is &lt;4.0.2_21511_02_2.6.32.43_0.4-0.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992428" version="1" comment="xen-libs is &lt;4.0.2_21511_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992429" version="1" comment="xen-tools is &lt;4.0.2_21511_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992430" version="1" comment="xen-tools-domU is &lt;4.0.2_21511_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992431" version="1" comment="libvirt is &lt;0.7.6-1.27.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992432" version="1" comment="libvirt-doc is &lt;0.7.6-1.27.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992433" version="1" comment="libvirt-python is &lt;0.7.6-1.27.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992434" version="1" comment="vm-install is &lt;0.4.32-0.3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992435" version="1" comment="xen is &lt;4.0.2_21511_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992436" version="1" comment="xen-doc-html is &lt;4.0.2_21511_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992437" version="1" comment="xen-doc-pdf is &lt;4.0.2_21511_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992438" version="1" comment="xen-kmp-default is &lt;4.0.2_21511_04_2.6.32.46_0.3-0.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992439" version="1" comment="xen-libs is &lt;4.0.2_21511_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992440" version="1" comment="xen-tools is &lt;4.0.2_21511_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992441" version="1" comment="xen-tools-domU is &lt;4.0.2_21511_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992442" version="1" comment="libvirt is &lt;0.7.6-1.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992443" version="1" comment="libvirt-doc is &lt;0.7.6-1.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992444" version="1" comment="libvirt-python is &lt;0.7.6-1.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992445" version="1" comment="virt-utils is &lt;1.1.3-1.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992446" version="1" comment="xen is &lt;4.0.3_21548_02-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992447" version="1" comment="xen-doc-html is &lt;4.0.3_21548_02-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992448" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_02-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992449" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_02_2.6.32.54_0.3-0.5.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992450" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_02_2.6.32.54_0.3-0.5.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992451" version="1" comment="xen-libs is &lt;4.0.3_21548_02-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992452" version="1" comment="xen-tools is &lt;4.0.3_21548_02-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992453" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_02-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992454" version="1" comment="xen is &lt;4.0.3_21548_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992455" version="1" comment="xen-doc-html is &lt;4.0.3_21548_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992456" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992457" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_04_2.6.32.59_0.5-0.9.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992458" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_04_2.6.32.59_0.5-0.9.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992459" version="1" comment="xen-libs is &lt;4.0.3_21548_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992460" version="1" comment="xen-tools is &lt;4.0.3_21548_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992461" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992462" version="1" comment="vm-install is &lt;0.4.34-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992463" version="1" comment="xen is &lt;4.0.3_21548_08-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992464" version="1" comment="xen-doc-html is &lt;4.0.3_21548_08-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992465" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_08-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992466" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_08_2.6.32.59_0.7-0.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992467" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_08_2.6.32.59_0.7-0.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992468" version="1" comment="xen-libs is &lt;4.0.3_21548_08-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992469" version="1" comment="xen-tools is &lt;4.0.3_21548_08-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992470" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_08-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575591" version="1" comment="xen is &lt;4.0.3_21548_10-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575592" version="1" comment="xen-doc-html is &lt;4.0.3_21548_10-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575593" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_10-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575594" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_10_2.6.32.59_0.7-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575595" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_10_2.6.32.59_0.7-0.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575596" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_10_2.6.32.59_0.7-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575597" version="1" comment="xen-libs is &lt;4.0.3_21548_10-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575598" version="1" comment="xen-tools is &lt;4.0.3_21548_10-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575599" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_10-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575600" version="1" comment="xen is &lt;4.0.3_21548_11-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575601" version="1" comment="xen-doc-html is &lt;4.0.3_21548_11-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575602" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_11-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575603" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_11_2.6.32.54_0.11.TDC-0.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575604" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_11_2.6.32.54_0.11.TDC-0.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575605" version="1" comment="xen-libs is &lt;4.0.3_21548_11-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575606" version="1" comment="xen-tools is &lt;4.0.3_21548_11-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575607" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_11-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575608" version="1" comment="xen is &lt;4.0.3_21548_14-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575609" version="1" comment="xen-doc-html is &lt;4.0.3_21548_14-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575610" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_14-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575611" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_14_2.6.32.54_0.31.TDC-0.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575612" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_14_2.6.32.54_0.31.TDC-0.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575613" version="1" comment="xen-libs is &lt;4.0.3_21548_14-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575614" version="1" comment="xen-tools is &lt;4.0.3_21548_14-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575615" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_14-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591430" version="1" comment="xen is &lt;4.0.3_21548_16-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591431" version="1" comment="xen-doc-html is &lt;4.0.3_21548_16-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591432" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_16-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591433" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_16_2.6.32.54_0.33.TDC-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575620" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_16_2.6.32.59_0.9-0.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591434" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_16_2.6.32.54_0.33.TDC-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591435" version="1" comment="xen-libs is &lt;4.0.3_21548_16-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591436" version="1" comment="xen-tools is &lt;4.0.3_21548_16-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591437" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_16-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575625" version="1" comment="xen is &lt;4.0.3_21548_18-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575626" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575627" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575628" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.45.TDC-0.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575629" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.45.TDC-0.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575630" version="1" comment="xen-libs is &lt;4.0.3_21548_18-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575631" version="1" comment="xen-tools is &lt;4.0.3_21548_18-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575632" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593940" version="1" comment="xen is &lt;4.0.3_21548_18-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593941" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593942" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593943" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.55.TDC-0.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575637" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.15.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593944" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.55.TDC-0.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593945" version="1" comment="xen-libs is &lt;4.0.3_21548_18-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593946" version="1" comment="xen-tools is &lt;4.0.3_21548_18-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593947" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594039" version="1" comment="xen is &lt;4.0.3_21548_18-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594040" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594041" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594042" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575646" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.25.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594043" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594044" version="1" comment="xen-libs is &lt;4.0.3_21548_18-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594045" version="1" comment="xen-tools is &lt;4.0.3_21548_18-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594046" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575651" version="1" comment="xen is &lt;4.0.3_21548_18-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575652" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575653" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575654" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.73.TDC-33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575655" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.73.TDC-33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575656" version="1" comment="xen-libs is &lt;4.0.3_21548_18-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575657" version="1" comment="xen-tools is &lt;4.0.3_21548_18-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575658" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575659" version="1" comment="xerces-j2 is &lt;2.8.1-238.29.5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565556" version="1" comment="xerces-j2-xml-apis is &lt;2.8.1-238.29.5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565557" version="1" comment="xerces-j2-xml-resolver is &lt;2.8.1-238.29.5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667942" version="1" comment="xerces-j2 is &lt;2.8.1-238.29.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667943" version="1" comment="xerces-j2-xml-apis is &lt;2.8.1-238.29.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667944" version="1" comment="xerces-j2-xml-resolver is &lt;2.8.1-238.29.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577073" version="1" comment="xinetd is &lt;2.3.14-130.133.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992471" version="1" comment="xorg-x11 is &lt;7.4-9.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992472" version="1" comment="xorg-x11-xauth is &lt;7.4-9.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992473" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.68.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992474" version="1" comment="xorg-x11-server is &lt;7.4-27.40.68.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992475" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.68.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592637" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.42.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592638" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575662" version="1" comment="xorg-x11-libICE is &lt;7.4-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575663" version="1" comment="xorg-x11-libICE-32bit is &lt;7.4-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992476" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.11.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992477" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575664" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575665" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575666" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575667" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575668" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575669" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575670" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.72.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575671" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.72.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575672" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.72.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575673" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.72.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575674" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.72.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575675" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.72.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575676" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.72.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575677" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.72.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575678" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.72.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575679" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.72.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575680" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.72.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575681" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.72.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575682" version="1" comment="xorg-x11-libXdmcp is &lt;7.4-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565566" version="1" comment="xorg-x11-libXdmcp-32bit is &lt;7.4-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591187" version="1" comment="xorg-x11-libXext is &lt;7.4-1.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591188" version="1" comment="xorg-x11-libXext-32bit is &lt;7.4-1.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591189" version="1" comment="xorg-x11-libXfixes is &lt;7.4-1.16.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591190" version="1" comment="xorg-x11-libXfixes-32bit is &lt;7.4-1.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575687" version="1" comment="xorg-x11-libXfixes is &lt;7.4-1.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575688" version="1" comment="xorg-x11-libXfixes-32bit is &lt;7.4-1.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591220" version="1" comment="xorg-x11-libXp is &lt;7.4-1.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591221" version="1" comment="xorg-x11-libXp-32bit is &lt;7.4-1.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575691" version="1" comment="xorg-x11-libXpm is &lt;7.4-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575692" version="1" comment="xorg-x11-libXpm-32bit is &lt;7.4-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591206" version="1" comment="xorg-x11-libXrender is &lt;7.4-1.16.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591207" version="1" comment="xorg-x11-libXrender-32bit is &lt;7.4-1.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575695" version="1" comment="xorg-x11-libXrender is &lt;7.4-1.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575696" version="1" comment="xorg-x11-libXrender-32bit is &lt;7.4-1.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591214" version="1" comment="xorg-x11-libXt is &lt;7.4-1.19.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591215" version="1" comment="xorg-x11-libXt-32bit is &lt;7.4-1.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591208" version="1" comment="xorg-x11-libXv is &lt;7.4-1.16.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591209" version="1" comment="xorg-x11-libXv-32bit is &lt;7.4-1.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575701" version="1" comment="xorg-x11-libXv is &lt;7.4-1.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575702" version="1" comment="xorg-x11-libXv-32bit is &lt;7.4-1.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593934" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593933" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575703" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575704" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575705" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.50.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575706" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.50.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575707" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.50.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575708" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.50.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591222" version="1" comment="xorg-x11-libxcb is &lt;7.4-1.22.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591223" version="1" comment="xorg-x11-libxcb-32bit is &lt;7.4-1.22.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575711" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575712" version="1" comment="xorg-x11-server is &lt;7.4-27.40.78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575713" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575714" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.79.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575715" version="1" comment="xorg-x11-server is &lt;7.4-27.40.79.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575716" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.79.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575717" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.79.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575718" version="1" comment="xorg-x11-server is &lt;7.4-27.40.79.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575719" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.79.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575720" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.79.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575721" version="1" comment="xorg-x11-server is &lt;7.4-27.40.79.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575722" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.79.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575723" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.79.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575724" version="1" comment="xorg-x11-server is &lt;7.4-27.40.79.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575725" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.79.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575726" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.79.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575727" version="1" comment="xorg-x11-server is &lt;7.4-27.40.79.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575728" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.79.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575729" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.79.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575730" version="1" comment="xorg-x11-server is &lt;7.4-27.40.79.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575731" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.79.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659909" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.79.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659910" version="1" comment="xorg-x11-server is &lt;7.4-27.40.79.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659911" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.79.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660156" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.79.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660157" version="1" comment="xorg-x11-server is &lt;7.4-27.40.79.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660158" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.79.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992478" version="1" comment="xorg-x11-server-dmx is &lt;7.3.99-17.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992479" version="1" comment="libpciaccess0 is &lt;7.4_0.11.0-0.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992480" version="1" comment="libpciaccess0-32bit is &lt;7.4_0.11.0-0.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992481" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992482" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992483" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992484" version="1" comment="xorg-x11-server is &lt;7.4-27.40.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992485" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992486" version="1" comment="xpdf-tools is &lt;3.02-138.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992487" version="1" comment="xpdf-tools is &lt;3.02-138.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575744" version="1" comment="xscreensaver is &lt;5.07-6.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575745" version="1" comment="xterm is &lt;238-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679343" version="1" comment="liblzma5 is &lt;5.0.3-0.12.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679344" version="1" comment="liblzma5-32bit is &lt;5.0.3-0.12.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679345" version="1" comment="xz is &lt;5.0.3-0.12.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679346" version="1" comment="xz-lang is &lt;5.0.3-0.12.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992488" version="1" comment="yast2-core is &lt;2.17.35.4-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575746" version="1" comment="yast2-storage is &lt;2.17.99.5-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575747" version="1" comment="yast2-storage-lib is &lt;2.17.99.5-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575748" version="1" comment="zlib is &lt;1.2.7-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575749" version="1" comment="zlib-32bit is &lt;1.2.7-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575750" version="1" comment="zlib-devel is &lt;1.2.7-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575751" version="1" comment="zlib-devel-32bit is &lt;1.2.7-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677059" version="1" comment="zlib is &lt;1.2.7-0.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677060" version="1" comment="zlib-32bit is &lt;1.2.7-0.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677061" version="1" comment="zlib-devel is &lt;1.2.7-0.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677062" version="1" comment="zlib-devel-32bit is &lt;1.2.7-0.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575752" version="1" comment="zsh is &lt;4.3.6-67.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671293" version="1" comment="zsh is &lt;4.3.6-67.9.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992489" version="1" comment="zypper is &lt;1.3.21-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575771" version="1" comment="mozilla-nspr-devel is &lt;4.10.6-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575772" version="1" comment="mozilla-nss-devel is &lt;3.16.1-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575773" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575774" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575775" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.34.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575776" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575777" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.37.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575778" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.37.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575779" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.40.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575780" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.40.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575781" version="1" comment="Mesa is &lt;7.11.2-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575782" version="1" comment="Mesa-32bit is &lt;7.11.2-0.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575783" version="1" comment="Mesa-x86 is &lt;7.11.2-0.9.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575784" version="1" comment="MozillaFirefox is &lt;17.0.9esr-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575785" version="1" comment="MozillaFirefox-translations is &lt;17.0.9esr-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575786" version="1" comment="MozillaFirefox is &lt;38.5.0esr-28.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575787" version="1" comment="MozillaFirefox-translations is &lt;38.5.0esr-28.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575788" version="1" comment="MozillaFirefox is &lt;38.8.0esr-40.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575789" version="1" comment="MozillaFirefox-translations is &lt;38.8.0esr-40.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575790" version="1" comment="MozillaFirefox is &lt;45.3.0esr-48.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575791" version="1" comment="MozillaFirefox-branding-SLED is &lt;45.0-20.38 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575792" version="1" comment="MozillaFirefox-translations is &lt;45.3.0esr-48.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575793" version="1" comment="firefox-fontconfig is &lt;2.11.0-4.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575794" version="1" comment="libfreebl3 is &lt;3.21.1-26.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575795" version="1" comment="libfreebl3-32bit is &lt;3.21.1-26.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575796" version="1" comment="mozilla-nspr is &lt;4.12-25.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575797" version="1" comment="mozilla-nspr-32bit is &lt;4.12-25.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575798" version="1" comment="mozilla-nspr-devel is &lt;4.12-25.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575799" version="1" comment="mozilla-nss is &lt;3.21.1-26.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575800" version="1" comment="mozilla-nss-32bit is &lt;3.21.1-26.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575801" version="1" comment="mozilla-nss-devel is &lt;3.21.1-26.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575802" version="1" comment="mozilla-nss-tools is &lt;3.21.1-26.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575803" version="1" comment="MozillaFirefox is &lt;45.4.0esr-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575804" version="1" comment="MozillaFirefox-translations is &lt;45.4.0esr-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575805" version="1" comment="MozillaFirefox is &lt;45.6.0esr-66.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575806" version="1" comment="MozillaFirefox-translations is &lt;45.6.0esr-66.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575807" version="1" comment="mozilla-nspr-devel is &lt;4.10.4-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575808" version="1" comment="mozilla-nss-devel is &lt;3.16-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575809" version="1" comment="xen is &lt;4.1.6_08-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575810" version="1" comment="xen-devel is &lt;4.1.6_08-17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575811" version="1" comment="xen-doc-html is &lt;4.1.6_08-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575812" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575813" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.29-17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575814" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.29-17.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575815" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.29-17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575816" version="1" comment="xen-libs is &lt;4.1.6_08-17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575817" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575818" version="1" comment="xen-tools is &lt;4.1.6_08-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575819" version="1" comment="xen-tools-domU is &lt;4.1.6_08-17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589459" version="1" comment="ant is &lt;1.7.0-200.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589460" version="1" comment="ant-trax is &lt;1.7.0-200.26.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992490" version="1" comment="apache2 is &lt;2.2.12-1.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992491" version="1" comment="apache2-doc is &lt;2.2.12-1.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992492" version="1" comment="apache2-example-pages is &lt;2.2.12-1.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992493" version="1" comment="apache2-prefork is &lt;2.2.12-1.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992494" version="1" comment="apache2-utils is &lt;2.2.12-1.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992495" version="1" comment="apache2-worker is &lt;2.2.12-1.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575820" version="1" comment="apache2-mod_nss is &lt;1.0.8-0.4.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575821" version="1" comment="apache2-mod_nss is &lt;1.0.14-0.4.25.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575822" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575823" version="1" comment="php5 is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575824" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575825" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575826" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575827" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575828" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575829" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575830" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575831" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575832" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575833" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575834" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575835" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575836" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575837" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575838" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575839" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575840" version="1" comment="php5-json is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575841" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575842" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575843" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575844" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575845" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575846" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575847" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575848" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575849" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575850" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575851" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575852" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575853" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575854" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575855" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575856" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575857" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575858" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575859" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575860" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575861" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575862" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575863" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575864" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575865" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575866" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575867" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575868" version="1" comment="php53 is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575869" version="1" comment="php53-bcmath is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575870" version="1" comment="php53-bz2 is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575871" version="1" comment="php53-calendar is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575872" version="1" comment="php53-ctype is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575873" version="1" comment="php53-curl is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575874" version="1" comment="php53-dba is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575875" version="1" comment="php53-dom is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575876" version="1" comment="php53-exif is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575877" version="1" comment="php53-fastcgi is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575878" version="1" comment="php53-fileinfo is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575879" version="1" comment="php53-ftp is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575880" version="1" comment="php53-gd is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575881" version="1" comment="php53-gettext is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575882" version="1" comment="php53-gmp is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575883" version="1" comment="php53-iconv is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575884" version="1" comment="php53-intl is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575885" version="1" comment="php53-json is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575886" version="1" comment="php53-ldap is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575887" version="1" comment="php53-mbstring is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575888" version="1" comment="php53-mcrypt is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575889" version="1" comment="php53-mysql is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575890" version="1" comment="php53-odbc is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575891" version="1" comment="php53-openssl is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575892" version="1" comment="php53-pcntl is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575893" version="1" comment="php53-pdo is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575894" version="1" comment="php53-pear is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575895" version="1" comment="php53-pgsql is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575896" version="1" comment="php53-pspell is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575897" version="1" comment="php53-shmop is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575898" version="1" comment="php53-snmp is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575899" version="1" comment="php53-soap is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575900" version="1" comment="php53-suhosin is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575901" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575902" version="1" comment="php53-sysvsem is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575903" version="1" comment="php53-sysvshm is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575904" version="1" comment="php53-tokenizer is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575905" version="1" comment="php53-wddx is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575906" version="1" comment="php53-xmlreader is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575907" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575908" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575909" version="1" comment="php53-xsl is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575910" version="1" comment="php53-zip is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575911" version="1" comment="php53-zlib is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575912" version="1" comment="automake is &lt;1.10.1-4.131.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992496" version="1" comment="bash is &lt;3.2-147.14.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992497" version="1" comment="bash-doc is &lt;3.2-147.14.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992498" version="1" comment="bash-x86 is &lt;3.2-147.14.18.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992499" version="1" comment="libreadline5 is &lt;5.2-147.14.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992500" version="1" comment="libreadline5-32bit is &lt;5.2-147.14.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992501" version="1" comment="libreadline5-x86 is &lt;5.2-147.14.18.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992502" version="1" comment="readline-doc is &lt;5.2-147.14.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575913" version="1" comment="bind is &lt;9.9.4P2-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575914" version="1" comment="bind-chrootenv is &lt;9.9.4P2-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575915" version="1" comment="bind-devel is &lt;9.9.6P1-0.5.5 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575916" version="1" comment="bind-doc is &lt;9.9.4P2-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575917" version="1" comment="bind-libs is &lt;9.9.4P2-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575918" version="1" comment="bind-libs-32bit is &lt;9.9.4P2-0.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575919" version="1" comment="bind-libs-x86 is &lt;9.9.4P2-0.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575920" version="1" comment="bind-utils is &lt;9.9.4P2-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575921" version="1" comment="bind is &lt;9.9.6P1-0.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575922" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575923" version="1" comment="bind-devel is &lt;9.9.6P1-0.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575924" version="1" comment="bind-doc is &lt;9.9.6P1-0.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575925" version="1" comment="bind-libs is &lt;9.9.6P1-0.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575926" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575927" version="1" comment="bind-utils is &lt;9.9.6P1-0.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575928" version="1" comment="bind is &lt;9.9.6P1-0.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575929" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575930" version="1" comment="bind-devel is &lt;9.9.6P1-0.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575931" version="1" comment="bind-doc is &lt;9.9.6P1-0.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575932" version="1" comment="bind-libs is &lt;9.9.6P1-0.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575933" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575934" version="1" comment="bind-utils is &lt;9.9.6P1-0.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575935" version="1" comment="bind is &lt;9.9.6P1-0.19.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575936" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.19.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575937" version="1" comment="bind-devel is &lt;9.9.6P1-0.19.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575938" version="1" comment="bind-doc is &lt;9.9.6P1-0.19.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575939" version="1" comment="bind-libs is &lt;9.9.6P1-0.19.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575940" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575941" version="1" comment="bind-utils is &lt;9.9.6P1-0.19.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575942" version="1" comment="bind is &lt;9.9.6P1-0.22.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575943" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.22.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575944" version="1" comment="bind-devel is &lt;9.9.6P1-0.22.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575945" version="1" comment="bind-doc is &lt;9.9.6P1-0.22.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575946" version="1" comment="bind-libs is &lt;9.9.6P1-0.22.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575947" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575948" version="1" comment="bind-utils is &lt;9.9.6P1-0.22.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575949" version="1" comment="bind is &lt;9.9.6P1-0.25.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575950" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.25.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575951" version="1" comment="bind-devel is &lt;9.9.6P1-0.25.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575952" version="1" comment="bind-doc is &lt;9.9.6P1-0.25.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575953" version="1" comment="bind-libs is &lt;9.9.6P1-0.25.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575954" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575955" version="1" comment="bind-utils is &lt;9.9.6P1-0.25.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575956" version="1" comment="bind is &lt;9.9.6P1-0.30.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575957" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.30.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575958" version="1" comment="bind-devel is &lt;9.9.6P1-0.30.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575959" version="1" comment="bind-doc is &lt;9.9.6P1-0.30.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575960" version="1" comment="bind-libs is &lt;9.9.6P1-0.30.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575961" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575962" version="1" comment="bind-utils is &lt;9.9.6P1-0.30.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575963" version="1" comment="bind is &lt;9.9.6P1-0.33.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575964" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.33.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575965" version="1" comment="bind-devel is &lt;9.9.6P1-0.33.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575966" version="1" comment="bind-doc is &lt;9.9.6P1-0.33.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575967" version="1" comment="bind-libs is &lt;9.9.6P1-0.33.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575968" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575969" version="1" comment="bind-utils is &lt;9.9.6P1-0.33.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575970" version="1" comment="bind is &lt;9.9.6P1-0.36.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575971" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.36.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575972" version="1" comment="bind-devel is &lt;9.9.6P1-0.36.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575973" version="1" comment="bind-doc is &lt;9.9.6P1-0.36.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575974" version="1" comment="bind-libs is &lt;9.9.6P1-0.36.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575975" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575976" version="1" comment="bind-utils is &lt;9.9.6P1-0.36.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575977" version="1" comment="libarchive2 is &lt;2.5.5-9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575978" version="1" comment="mono-core is &lt;2.6.7-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575979" version="1" comment="mono-data is &lt;2.6.7-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575980" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575981" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575982" version="1" comment="mono-locale-extras is &lt;2.6.7-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575983" version="1" comment="mono-nunit is &lt;2.6.7-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575984" version="1" comment="mono-web is &lt;2.6.7-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575985" version="1" comment="mono-winforms is &lt;2.6.7-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575986" version="1" comment="ldapsmb is &lt;1.34b-12.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575987" version="1" comment="libldb1 is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575988" version="1" comment="libsmbclient0 is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575989" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.33.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575990" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.33.39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575991" version="1" comment="libtalloc1 is &lt;3.4.3-1.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575992" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.50.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575993" version="1" comment="libtalloc1-x86 is &lt;3.4.3-1.50.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575994" version="1" comment="libtalloc2 is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575995" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.33.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575996" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.33.39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575997" version="1" comment="libtdb1 is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575998" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.33.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575999" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.33.39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576000" version="1" comment="libtevent0 is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576001" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.33.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576002" version="1" comment="libwbclient0 is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576003" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.33.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576004" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.33.39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576005" version="1" comment="samba is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576006" version="1" comment="samba-32bit is &lt;3.6.3-0.33.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576007" version="1" comment="samba-client is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576008" version="1" comment="samba-client-32bit is &lt;3.6.3-0.33.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576009" version="1" comment="samba-client-x86 is &lt;3.6.3-0.33.39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565895" version="1" comment="samba-doc is &lt;3.6.3-0.33.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576010" version="1" comment="samba-krb-printing is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576011" version="1" comment="samba-winbind is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576012" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.33.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576013" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.33.39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576014" version="1" comment="samba-x86 is &lt;3.6.3-0.33.39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992503" version="1" comment="cifs-utils is &lt;5.1-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576015" version="1" comment="clamav is &lt;0.97.8-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576016" version="1" comment="coreutils is &lt;8.12-6.25.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576017" version="1" comment="coreutils-lang is &lt;8.12-6.25.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576018" version="1" comment="coreutils-x86 is &lt;8.12-6.25.29.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576019" version="1" comment="cups is &lt;1.3.9-8.46.48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576020" version="1" comment="cups-client is &lt;1.3.9-8.46.48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576021" version="1" comment="cups-libs is &lt;1.3.9-8.46.48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576022" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.48.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576023" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.46.48.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576024" version="1" comment="curl is &lt;7.19.7-1.20.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576025" version="1" comment="libcurl4 is &lt;7.19.7-1.20.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576026" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576027" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.20.31.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992504" version="1" comment="dbus-1 is &lt;1.2.10-3.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588264" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.27.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588265" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589999" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.27.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576028" version="1" comment="dhcp is &lt;4.2.4.P2-0.11.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576029" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.11.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576030" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.11.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576031" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.11.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576032" version="1" comment="dhcp is &lt;4.2.4.P2-0.11.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576033" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.11.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576034" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.11.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576035" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.11.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576036" version="1" comment="dhcpcd is &lt;3.2.3-45.5.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588870" version="1" comment="evolution-data-server is &lt;2.28.2-0.29.24 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588871" version="1" comment="evolution-data-server-32bit is &lt;2.28.2-0.29.24 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588872" version="1" comment="evolution-data-server-lang is &lt;2.28.2-0.29.24 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588873" version="1" comment="evolution-data-server-x86 is &lt;2.28.2-0.29.24 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576037" version="1" comment="fastjar is &lt;0.95-1.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576038" version="1" comment="MozillaFirefox is &lt;10.0.7-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576039" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.7.80 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576040" version="1" comment="MozillaFirefox-translations is &lt;10.0.7-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576041" version="1" comment="libfreebl3 is &lt;3.13.6-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576042" version="1" comment="libfreebl3-32bit is &lt;3.13.6-0.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576043" version="1" comment="libfreebl3-x86 is &lt;3.13.6-0.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576044" version="1" comment="mozilla-nspr is &lt;4.9.2-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576045" version="1" comment="mozilla-nspr-32bit is &lt;4.9.2-0.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576046" version="1" comment="mozilla-nspr-x86 is &lt;4.9.2-0.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576047" version="1" comment="mozilla-nss is &lt;3.13.6-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576048" version="1" comment="mozilla-nss-32bit is &lt;3.13.6-0.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576049" version="1" comment="mozilla-nss-tools is &lt;3.13.6-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576050" version="1" comment="mozilla-nss-x86 is &lt;3.13.6-0.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576051" version="1" comment="MozillaFirefox is &lt;10.0.9-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576052" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.7.85 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576053" version="1" comment="MozillaFirefox-translations is &lt;10.0.9-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576054" version="1" comment="MozillaFirefox is &lt;10.0.10-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576055" version="1" comment="MozillaFirefox-translations is &lt;10.0.10-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576056" version="1" comment="mozilla-nspr is &lt;4.9.3-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576057" version="1" comment="mozilla-nspr-32bit is &lt;4.9.3-0.2.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576058" version="1" comment="mozilla-nspr-x86 is &lt;4.9.3-0.2.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576059" version="1" comment="MozillaFirefox is &lt;10.0.11-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576060" version="1" comment="MozillaFirefox-translations is &lt;10.0.11-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576061" version="1" comment="libfreebl3 is &lt;3.14-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576062" version="1" comment="libfreebl3-32bit is &lt;3.14-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576063" version="1" comment="libfreebl3-x86 is &lt;3.14-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576064" version="1" comment="mozilla-nss is &lt;3.14-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576065" version="1" comment="mozilla-nss-32bit is &lt;3.14-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576066" version="1" comment="mozilla-nss-tools is &lt;3.14-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576067" version="1" comment="mozilla-nss-x86 is &lt;3.14-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576068" version="1" comment="MozillaFirefox is &lt;10.0.12-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576069" version="1" comment="MozillaFirefox-translations is &lt;10.0.12-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576070" version="1" comment="libfreebl3 is &lt;3.14.1-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576071" version="1" comment="libfreebl3-32bit is &lt;3.14.1-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576072" version="1" comment="libfreebl3-x86 is &lt;3.14.1-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576073" version="1" comment="mozilla-nspr is &lt;4.9.4-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576074" version="1" comment="mozilla-nspr-32bit is &lt;4.9.4-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576075" version="1" comment="mozilla-nspr-x86 is &lt;4.9.4-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576076" version="1" comment="mozilla-nss is &lt;3.14.1-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576077" version="1" comment="mozilla-nss-32bit is &lt;3.14.1-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576078" version="1" comment="mozilla-nss-tools is &lt;3.14.1-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576079" version="1" comment="mozilla-nss-x86 is &lt;3.14.1-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576080" version="1" comment="MozillaFirefox is &lt;17.0.4esr-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576081" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576082" version="1" comment="MozillaFirefox-translations is &lt;17.0.4esr-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576083" version="1" comment="libfreebl3 is &lt;3.14.2-0.4.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576084" version="1" comment="libfreebl3-32bit is &lt;3.14.2-0.4.3.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576085" version="1" comment="libfreebl3-x86 is &lt;3.14.2-0.4.3.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576086" version="1" comment="mozilla-nspr is &lt;4.9.5-0.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576087" version="1" comment="mozilla-nspr-32bit is &lt;4.9.5-0.3.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576088" version="1" comment="mozilla-nspr-x86 is &lt;4.9.5-0.3.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576089" version="1" comment="mozilla-nss is &lt;3.14.2-0.4.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576090" version="1" comment="mozilla-nss-32bit is &lt;3.14.2-0.4.3.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576091" version="1" comment="mozilla-nss-tools is &lt;3.14.2-0.4.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576092" version="1" comment="mozilla-nss-x86 is &lt;3.14.2-0.4.3.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576093" version="1" comment="MozillaFirefox is &lt;17.0.5esr-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576094" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.17 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576095" version="1" comment="MozillaFirefox-translations is &lt;17.0.5esr-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576096" version="1" comment="libfreebl3 is &lt;3.14.3-0.4.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576097" version="1" comment="libfreebl3-32bit is &lt;3.14.3-0.4.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576098" version="1" comment="libfreebl3-x86 is &lt;3.14.3-0.4.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576099" version="1" comment="mozilla-nspr is &lt;4.9.6-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576100" version="1" comment="mozilla-nspr-32bit is &lt;4.9.6-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576101" version="1" comment="mozilla-nspr-x86 is &lt;4.9.6-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576102" version="1" comment="mozilla-nss is &lt;3.14.3-0.4.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576103" version="1" comment="mozilla-nss-32bit is &lt;3.14.3-0.4.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576104" version="1" comment="mozilla-nss-tools is &lt;3.14.3-0.4.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576105" version="1" comment="mozilla-nss-x86 is &lt;3.14.3-0.4.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576106" version="1" comment="MozillaFirefox is &lt;17.0.6esr-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576107" version="1" comment="MozillaFirefox-translations is &lt;17.0.6esr-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576108" version="1" comment="MozillaFirefox is &lt;17.0.7esr-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576109" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.31 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576110" version="1" comment="MozillaFirefox-translations is &lt;17.0.7esr-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576111" version="1" comment="MozillaFirefox is &lt;17.0.10esr-0.4.2.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576112" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.62 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576113" version="1" comment="MozillaFirefox-translations is &lt;17.0.10esr-0.4.2.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571388" version="1" comment="MozillaFirefox is &lt;24.3.0esr-0.4.2.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571389" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.4.10.4 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571390" version="1" comment="MozillaFirefox-translations is &lt;24.3.0esr-0.4.2.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576114" version="1" comment="mozilla-nss-devel is &lt;3.16.2-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576115" version="1" comment="mozilla-nspr-devel is &lt;4.10.7-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576116" version="1" comment="mozilla-nss-devel is &lt;3.16.4-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576117" version="1" comment="mozilla-nss-devel is &lt;3.17.3-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576118" version="1" comment="MozillaFirefox is &lt;38.3.0esr-20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576119" version="1" comment="MozillaFirefox-translations is &lt;38.3.0esr-20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576120" version="1" comment="mozilla-nspr is &lt;4.10.9-11.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576121" version="1" comment="mozilla-nspr-32bit is &lt;4.10.9-11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576122" version="1" comment="mozilla-nspr-devel is &lt;4.10.9-11.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576123" version="1" comment="MozillaFirefox is &lt;38.4.0esr-25.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576124" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-12.19 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576125" version="1" comment="MozillaFirefox-translations is &lt;38.4.0esr-25.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576126" version="1" comment="libfreebl3 is &lt;3.19.2.1-12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576127" version="1" comment="libfreebl3-32bit is &lt;3.19.2.1-12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576128" version="1" comment="mozilla-nspr is &lt;4.10.10-16.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576129" version="1" comment="mozilla-nspr-32bit is &lt;4.10.10-16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576130" version="1" comment="mozilla-nspr-devel is &lt;4.10.10-16.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576131" version="1" comment="mozilla-nss is &lt;3.19.2.1-12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576132" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.1-12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576133" version="1" comment="mozilla-nss-devel is &lt;3.19.2.1-12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576134" version="1" comment="mozilla-nss-tools is &lt;3.19.2.1-12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576135" version="1" comment="MozillaFirefox is &lt;38.7.0esr-36.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576136" version="1" comment="MozillaFirefox-translations is &lt;38.7.0esr-36.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576137" version="1" comment="libfreebl3 is &lt;3.20.2-20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576138" version="1" comment="libfreebl3-32bit is &lt;3.20.2-20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576139" version="1" comment="mozilla-nspr is &lt;4.12-19.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576140" version="1" comment="mozilla-nspr-32bit is &lt;4.12-19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576141" version="1" comment="mozilla-nspr-devel is &lt;4.12-19.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576142" version="1" comment="mozilla-nss is &lt;3.20.2-20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576143" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576144" version="1" comment="mozilla-nss-devel is &lt;3.20.2-20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576145" version="1" comment="mozilla-nss-tools is &lt;3.20.2-20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576146" version="1" comment="mozilla-nspr-devel is &lt;4.10.7-0.3.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576147" version="1" comment="mozilla-nss-devel is &lt;3.17.2-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576148" version="1" comment="freeradius-server is &lt;2.1.1-7.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576149" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576150" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576151" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576152" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576153" version="1" comment="freetype2 is &lt;2.3.7-25.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576154" version="1" comment="freetype2-32bit is &lt;2.3.7-25.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576155" version="1" comment="freetype2-x86 is &lt;2.3.7-25.32.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576156" version="1" comment="ft2demos is &lt;2.3.7-25.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576157" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576158" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576159" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576160" version="1" comment="ghostscript-library is &lt;8.62-32.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576161" version="1" comment="ghostscript-omni is &lt;8.62-32.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576162" version="1" comment="ghostscript-x11 is &lt;8.62-32.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576163" version="1" comment="libgimpprint is &lt;4.2.7-32.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576164" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.38.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576165" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.38.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576166" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.38.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576167" version="1" comment="ghostscript-library is &lt;8.62-32.38.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576168" version="1" comment="ghostscript-omni is &lt;8.62-32.38.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576169" version="1" comment="ghostscript-x11 is &lt;8.62-32.38.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576170" version="1" comment="libgimpprint is &lt;4.2.7-32.38.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576171" version="1" comment="glibc is &lt;2.11.3-17.45.49.1 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576172" version="1" comment="glibc-32bit is &lt;2.11.3-17.45.49.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576173" version="1" comment="glibc-devel is &lt;2.11.3-17.45.49.1 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576174" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.45.49.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576175" version="1" comment="glibc-html is &lt;2.11.3-17.45.49.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576176" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.45.49.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576177" version="1" comment="glibc-info is &lt;2.11.3-17.45.49.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576178" version="1" comment="glibc-locale is &lt;2.11.3-17.45.49.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576179" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.45.49.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576180" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.45.49.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576181" version="1" comment="glibc-profile is &lt;2.11.3-17.45.49.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576182" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.45.49.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576183" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.45.49.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576184" version="1" comment="glibc-x86 is &lt;2.11.3-17.45.49.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576185" version="1" comment="nscd is &lt;2.11.3-17.45.49.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576186" version="1" comment="glibc is &lt;2.11.3-17.45.66.1 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576187" version="1" comment="glibc-32bit is &lt;2.11.3-17.45.66.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576188" version="1" comment="glibc-devel is &lt;2.11.3-17.45.66.1 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576189" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.45.66.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576190" version="1" comment="glibc-html is &lt;2.11.3-17.45.66.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576191" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.45.66.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576192" version="1" comment="glibc-info is &lt;2.11.3-17.45.66.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576193" version="1" comment="glibc-locale is &lt;2.11.3-17.45.66.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576194" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.45.66.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576195" version="1" comment="glibc-profile is &lt;2.11.3-17.45.66.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576196" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.45.66.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576197" version="1" comment="nscd is &lt;2.11.3-17.45.66.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576198" version="1" comment="gnutls is &lt;2.4.1-24.39.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562931" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576199" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576200" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.47.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576201" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.47.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576202" version="1" comment="gpg2 is &lt;2.0.9-25.33.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576203" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576204" version="1" comment="gtk2 is &lt;2.18.9-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576205" version="1" comment="gtk2-32bit is &lt;2.18.9-0.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576206" version="1" comment="gtk2-doc is &lt;2.18.9-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576207" version="1" comment="gtk2-lang is &lt;2.18.9-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576208" version="1" comment="gtk2-x86 is &lt;2.18.9-0.23.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576209" version="1" comment="hplip is &lt;3.11.10-0.6.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576210" version="1" comment="hplip-hpijs is &lt;3.11.10-0.6.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992505" version="1" comment="hyper-v is &lt;4-0.13.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992506" version="1" comment="ibutils is &lt;1.5.4-0.7.9.1 for i586,ia64,ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992507" version="1" comment="ibutils-32bit is &lt;1.5.4-0.7.9.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576211" version="1" comment="libicu is &lt;4.0-7.26.15 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576212" version="1" comment="libicu-32bit is &lt;4.0-7.26.15 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576213" version="1" comment="libicu-doc is &lt;4.0-7.26.15 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576214" version="1" comment="libicu-x86 is &lt;4.0-7.26.15 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576215" version="1" comment="inn is &lt;2.4.2-170.21.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992508" version="1" comment="inst-source-utils is &lt;2012.12.12-0.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576216" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.18-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576219" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr15.0-0.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576220" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr15.0-0.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576221" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.0-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576222" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr15.0-0.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576223" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr15.0-0.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576224" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr15.0-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576225" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.7-10.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576226" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.20-49.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576227" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.20-49.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576228" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.20-49.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576229" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.20-49.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576230" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.20-49.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576231" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.20-49.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576232" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.25-69.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576233" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.25-69.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576234" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.25-69.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576235" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.25-69.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576236" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.25-69.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576237" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.25-69.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576238" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.30-75.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567999" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.30-75.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576239" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.30-75.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576240" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.30-75.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576241" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.30-75.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576242" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.30-75.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576243" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.35-78.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568005" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.35-78.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576244" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.35-78.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576245" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.35-78.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576246" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.35-78.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576247" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.35-78.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576248" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.15-46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576249" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.15-46.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576250" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.15-46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576251" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.15-46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576252" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.15-46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576253" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.15-46.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576254" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr6.0-0.7.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576255" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr6.0-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576256" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr7.0-0.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576257" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr6.0-0.7.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576258" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr6.0-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576259" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.10-9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576260" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.10-9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576261" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.10-9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576262" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.10-9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576263" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.10-9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576264" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.20-42.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576265" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.20-42.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576266" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.20-42.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576267" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.20-42.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576268" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.20-42.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576269" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.30-45.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576270" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.30-45.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576271" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.30-45.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576272" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.30-45.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576273" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.30-45.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576274" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.40-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576275" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.40-52.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576276" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.40-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576277" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.40-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576278" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.40-52.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576279" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.50-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576280" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.50-55.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576281" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.50-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576282" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.50-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576283" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.50-55.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576284" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.60-58.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576285" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.60-58.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576286" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.60-58.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576287" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.60-58.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576288" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.60-58.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576289" version="1" comment="kdelibs4 is &lt;4.3.5-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576290" version="1" comment="kdelibs4-core is &lt;4.3.5-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562952" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576291" version="1" comment="libkde4 is &lt;4.3.5-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576292" version="1" comment="libkde4-32bit is &lt;4.3.5-0.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576293" version="1" comment="libkde4-x86 is &lt;4.3.5-0.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576294" version="1" comment="libkdecore4 is &lt;4.3.5-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576295" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576296" version="1" comment="libkdecore4-x86 is &lt;4.3.5-0.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576297" version="1" comment="kernel-default is &lt;3.0.101-0.7.17.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576298" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.17.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576300" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.17.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576301" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576302" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566038" version="1" comment="kernel-pae is &lt;3.0.101-0.7.17.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566039" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.17.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576304" version="1" comment="kernel-ppc64 is &lt;3.0.101-0.7.17.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576305" version="1" comment="kernel-ppc64-base is &lt;3.0.101-0.7.17.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576307" version="1" comment="kernel-source is &lt;3.0.101-0.7.17.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576308" version="1" comment="kernel-syms is &lt;3.0.101-0.7.17.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576309" version="1" comment="kernel-trace is &lt;3.0.101-0.7.17.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576310" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.17.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566048" version="1" comment="kernel-xen is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566049" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566052" version="1" comment="xen-kmp-default is &lt;4.1.6_04_3.0.101_0.7.17-0.5.16 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566053" version="1" comment="xen-kmp-pae is &lt;4.1.6_04_3.0.101_0.7.17-0.5.16 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566054" version="1" comment="xen-kmp-trace is &lt;4.1.6_04_3.0.101_0.7.17-0.5.16 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576312" version="1" comment="kernel-default is &lt;3.0.101-0.7.47.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576313" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.47.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576315" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.47.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576316" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.47.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576317" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.47.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576319" version="1" comment="kernel-pae is &lt;3.0.101-0.7.47.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576320" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.47.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576322" version="1" comment="kernel-source is &lt;3.0.101-0.7.47.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576323" version="1" comment="kernel-syms is &lt;3.0.101-0.7.47.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576324" version="1" comment="kernel-trace is &lt;3.0.101-0.7.47.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576325" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.47.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576327" version="1" comment="kernel-xen is &lt;3.0.101-0.7.47.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576328" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.47.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576330" version="1" comment="kernel-default is &lt;3.0.101-0.7.53.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576331" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.53.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576333" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.53.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576334" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.53.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576335" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.53.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576337" version="1" comment="kernel-pae is &lt;3.0.101-0.7.53.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576338" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.53.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576340" version="1" comment="kernel-source is &lt;3.0.101-0.7.53.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576341" version="1" comment="kernel-syms is &lt;3.0.101-0.7.53.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576342" version="1" comment="kernel-trace is &lt;3.0.101-0.7.53.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576343" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.53.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576345" version="1" comment="kernel-xen is &lt;3.0.101-0.7.53.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576346" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.53.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576348" version="1" comment="kernel-default is &lt;3.0.101-0.7.37.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576349" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.37.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576351" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.37.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576352" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.37.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576353" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.37.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576355" version="1" comment="kernel-pae is &lt;3.0.101-0.7.37.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576356" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.37.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576358" version="1" comment="kernel-source is &lt;3.0.101-0.7.37.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576359" version="1" comment="kernel-syms is &lt;3.0.101-0.7.37.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576360" version="1" comment="kernel-trace is &lt;3.0.101-0.7.37.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576361" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.37.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576363" version="1" comment="kernel-xen is &lt;3.0.101-0.7.37.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576364" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.37.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576366" version="1" comment="kernel-default is &lt;3.0.101-0.7.40.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576367" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.40.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576369" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.40.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576370" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576371" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576373" version="1" comment="kernel-pae is &lt;3.0.101-0.7.40.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576374" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.40.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576376" version="1" comment="kernel-source is &lt;3.0.101-0.7.40.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576377" version="1" comment="kernel-syms is &lt;3.0.101-0.7.40.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576378" version="1" comment="kernel-trace is &lt;3.0.101-0.7.40.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576379" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.40.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576381" version="1" comment="kernel-xen is &lt;3.0.101-0.7.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576382" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576384" version="1" comment="kernel-default is &lt;3.0.101-0.7.44.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576385" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.44.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576387" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.44.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576388" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.44.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576389" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.44.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576391" version="1" comment="kernel-pae is &lt;3.0.101-0.7.44.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576392" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.44.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576394" version="1" comment="kernel-source is &lt;3.0.101-0.7.44.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576395" version="1" comment="kernel-syms is &lt;3.0.101-0.7.44.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576396" version="1" comment="kernel-trace is &lt;3.0.101-0.7.44.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576397" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.44.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576399" version="1" comment="kernel-xen is &lt;3.0.101-0.7.44.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576400" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.44.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576402" version="1" comment="krb5 is &lt;1.6.3-133.49.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576403" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.58.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576404" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576405" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576406" version="1" comment="krb5-client is &lt;1.6.3-133.49.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576407" version="1" comment="krb5-doc is &lt;1.6.3-133.49.58.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576408" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576409" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576410" version="1" comment="krb5-server is &lt;1.6.3-133.49.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576411" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.58.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566058" version="1" comment="kvm is &lt;0.15.1-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576412" version="1" comment="kvm is &lt;0.15.1-0.32.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576413" version="1" comment="lcms is &lt;1.17-77.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576414" version="1" comment="liblcms1 is &lt;1.17-77.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576415" version="1" comment="liblcms1-32bit is &lt;1.17-77.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576416" version="1" comment="liblcms1-x86 is &lt;1.17-77.16.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576417" version="1" comment="ldapsmb is &lt;1.34b-12.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576418" version="1" comment="libldb1 is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576419" version="1" comment="libsmbclient0 is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576420" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.24.4 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576421" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.24.4 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576422" version="1" comment="libtalloc2 is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576423" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.24.4 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576424" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.24.4 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576425" version="1" comment="libtdb1 is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576426" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.24.4 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576427" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.24.4 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576428" version="1" comment="libtevent0 is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576429" version="1" comment="libwbclient0 is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576430" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.24.4 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576431" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.24.4 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576432" version="1" comment="samba is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576433" version="1" comment="samba-32bit is &lt;3.6.3-0.24.4 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576434" version="1" comment="samba-client is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576435" version="1" comment="samba-client-32bit is &lt;3.6.3-0.24.4 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576436" version="1" comment="samba-client-x86 is &lt;3.6.3-0.24.4 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566078" version="1" comment="samba-doc is &lt;3.6.3-0.24.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576437" version="1" comment="samba-krb-printing is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576438" version="1" comment="samba-winbind is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576439" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.24.4 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576440" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.24.4 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576441" version="1" comment="samba-x86 is &lt;3.6.3-0.24.4 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576442" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.20.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562975" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.20.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562976" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.20.23.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576443" version="1" comment="libqt4 is &lt;4.6.3-5.20.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576444" version="1" comment="libqt4-32bit is &lt;4.6.3-5.20.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576445" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.20.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576446" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.20.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576447" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.20.23.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576448" version="1" comment="libqt4-sql is &lt;4.6.3-5.20.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576449" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.20.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576450" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.20.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576451" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.20.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576452" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.20.23.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576453" version="1" comment="libqt4-x11 is &lt;4.6.3-5.20.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576454" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.20.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576455" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.20.23.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576456" version="1" comment="libqt4-x86 is &lt;4.6.3-5.20.23.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576457" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.20.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576458" version="1" comment="libecpg6 is &lt;9.1.9-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576459" version="1" comment="libpq5 is &lt;9.1.9-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576460" version="1" comment="libpq5-32bit is &lt;9.1.9-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576461" version="1" comment="libpq5-x86 is &lt;9.1.9-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576462" version="1" comment="postgresql91 is &lt;9.1.9-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576463" version="1" comment="postgresql91-contrib is &lt;9.1.9-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576464" version="1" comment="postgresql91-docs is &lt;9.1.9-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576465" version="1" comment="postgresql91-server is &lt;9.1.9-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576470" version="1" comment="mozilla-nss-devel is &lt;3.16.5-0.4.2.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576472" version="1" comment="libgcrypt11 is &lt;1.5.0-0.15.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576473" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.15.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576474" version="1" comment="libgcrypt11-x86 is &lt;1.5.0-0.15.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576475" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576476" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576477" version="1" comment="libmysqlclient15-x86 is &lt;5.0.96-0.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576478" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576479" version="1" comment="mysql is &lt;5.0.96-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576480" version="1" comment="mysql-Max is &lt;5.0.96-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576481" version="1" comment="mysql-client is &lt;5.0.96-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576482" version="1" comment="mysql-tools is &lt;5.0.96-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576483" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576484" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.50.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576485" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576486" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.50.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576487" version="1" comment="libopenssl0_9_8-hmac-x86 is &lt;0.9.8j-0.50.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576488" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.50.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576489" version="1" comment="openssl is &lt;0.9.8j-0.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576490" version="1" comment="openssl-doc is &lt;0.9.8j-0.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576491" version="1" comment="libotr2 is &lt;3.2.0-10.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576492" version="1" comment="permissions is &lt;2013.1.7-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576493" version="1" comment="libpixman-1-0 is &lt;0.16.0-1.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576494" version="1" comment="libpixman-1-0-32bit is &lt;0.16.0-1.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576495" version="1" comment="libpixman-1-0-x86 is &lt;0.16.0-1.4.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576496" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576497" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576498" version="1" comment="libpoppler5 is &lt;0.12.3-1.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576499" version="1" comment="poppler-tools is &lt;0.12.3-1.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576500" version="1" comment="libproxy0 is &lt;0.3.1-2.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576501" version="1" comment="libproxy0-32bit is &lt;0.3.1-2.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576502" version="1" comment="libproxy0-config-gnome is &lt;0.3.1-2.6.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576503" version="1" comment="libproxy0-config-kde4 is &lt;0.3.1-2.6.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576504" version="1" comment="libproxy0-networkmanager is &lt;0.3.1-2.6.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576505" version="1" comment="libproxy0-x86 is &lt;0.3.1-2.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992509" version="1" comment="libsoup-2_4-1 is &lt;2.32.2-4.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992510" version="1" comment="libsoup-2_4-1-32bit is &lt;2.32.2-4.13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589563" version="1" comment="libsoup-2_4-1-x86 is &lt;2.32.2-4.13.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576506" version="1" comment="libtiff3 is &lt;3.8.2-141.154.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576507" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.154.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576508" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.154.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576509" version="1" comment="tiff is &lt;3.8.2-141.154.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589099" version="1" comment="libtspi1 is &lt;0.3.7-3.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589100" version="1" comment="libtspi1-32bit is &lt;0.3.7-3.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589101" version="1" comment="libtspi1-x86 is &lt;0.3.7-3.9.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589102" version="1" comment="trousers is &lt;0.3.7-3.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576510" version="1" comment="libvirt is &lt;0.9.6-0.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576511" version="1" comment="libvirt-client is &lt;0.9.6-0.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576512" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.29.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576513" version="1" comment="libvirt-doc is &lt;0.9.6-0.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576514" version="1" comment="libvirt-python is &lt;0.9.6-0.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566138" version="1" comment="libvirt is &lt;0.9.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566139" version="1" comment="libvirt-client is &lt;0.9.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566140" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566141" version="1" comment="libvirt-doc is &lt;0.9.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566142" version="1" comment="libvirt-python is &lt;0.9.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576515" version="1" comment="libxml2 is &lt;2.7.6-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576516" version="1" comment="libxml2-32bit is &lt;2.7.6-0.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576517" version="1" comment="libxml2-doc is &lt;2.7.6-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576518" version="1" comment="libxml2-python is &lt;2.7.6-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576519" version="1" comment="libxml2-x86 is &lt;2.7.6-0.25.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576520" version="1" comment="libxml2 is &lt;2.7.6-0.44.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576521" version="1" comment="libxml2-32bit is &lt;2.7.6-0.44.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576522" version="1" comment="libxml2-doc is &lt;2.7.6-0.44.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576523" version="1" comment="libxml2-python is &lt;2.7.6-0.44.4 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576524" version="1" comment="libxslt is &lt;1.1.24-19.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576525" version="1" comment="libxslt-32bit is &lt;1.1.24-19.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576526" version="1" comment="libxslt-x86 is &lt;1.1.24-19.23.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591536" version="1" comment="libzypp is &lt;9.16.1-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576527" version="1" comment="MozillaFirefox is &lt;45.5.1esr-63.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576528" version="1" comment="MozillaFirefox-translations is &lt;45.5.1esr-63.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576529" version="1" comment="libfreebl3 is &lt;3.21.3-30.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576530" version="1" comment="libfreebl3-32bit is &lt;3.21.3-30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576531" version="1" comment="mozilla-nss is &lt;3.21.3-30.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576532" version="1" comment="mozilla-nss-32bit is &lt;3.21.3-30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576533" version="1" comment="mozilla-nss-devel is &lt;3.21.3-30.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576534" version="1" comment="mozilla-nss-tools is &lt;3.21.3-30.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576535" version="1" comment="MozillaFirefox is &lt;38.6.1esr-33.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576536" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-15.58 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576537" version="1" comment="MozillaFirefox-translations is &lt;38.6.1esr-33.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576538" version="1" comment="libfreebl3 is &lt;3.20.2-17.5 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576539" version="1" comment="libfreebl3-32bit is &lt;3.20.2-17.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576540" version="1" comment="mozilla-nss is &lt;3.20.2-17.5 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576541" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-17.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576542" version="1" comment="mozilla-nss-devel is &lt;3.20.2-17.5 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576543" version="1" comment="mozilla-nss-tools is &lt;3.20.2-17.5 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576544" version="1" comment="libfreebl3 is &lt;3.15.2-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576545" version="1" comment="libfreebl3-32bit is &lt;3.15.2-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576546" version="1" comment="libfreebl3-x86 is &lt;3.15.2-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576547" version="1" comment="mozilla-nspr is &lt;4.10.1-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576548" version="1" comment="mozilla-nspr-32bit is &lt;4.10.1-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576549" version="1" comment="mozilla-nspr-x86 is &lt;4.10.1-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576550" version="1" comment="mozilla-nss is &lt;3.15.2-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576551" version="1" comment="mozilla-nss-32bit is &lt;3.15.2-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576552" version="1" comment="mozilla-nss-tools is &lt;3.15.2-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576553" version="1" comment="mozilla-nss-x86 is &lt;3.15.2-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576554" version="1" comment="nagios is &lt;3.0.6-1.25.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576555" version="1" comment="nagios-www is &lt;3.0.6-1.25.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576556" version="1" comment="nagios-nrpe is &lt;2.12-24.4.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576557" version="1" comment="nagios-nrpe-doc is &lt;2.12-24.4.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576558" version="1" comment="nagios-plugins-nrpe is &lt;2.12-24.4.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992511" version="1" comment="nfs-client is &lt;1.2.3-18.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992512" version="1" comment="nfs-doc is &lt;1.2.3-18.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992513" version="1" comment="nfs-kernel-server is &lt;1.2.3-18.33.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576559" version="1" comment="libfreebl3 is &lt;3.15.3-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576560" version="1" comment="libfreebl3-32bit is &lt;3.15.3-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576561" version="1" comment="libfreebl3-x86 is &lt;3.15.3-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576562" version="1" comment="mozilla-nspr is &lt;4.10.2-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576563" version="1" comment="mozilla-nspr-32bit is &lt;4.10.2-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576564" version="1" comment="mozilla-nspr-x86 is &lt;4.10.2-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576565" version="1" comment="mozilla-nss is &lt;3.15.3-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576566" version="1" comment="mozilla-nss-32bit is &lt;3.15.3-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576567" version="1" comment="mozilla-nss-tools is &lt;3.15.3-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576568" version="1" comment="mozilla-nss-x86 is &lt;3.15.3-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576569" version="1" comment="libfreebl3 is &lt;3.15.3.1-0.4.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576570" version="1" comment="libfreebl3-32bit is &lt;3.15.3.1-0.4.2.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576571" version="1" comment="libfreebl3-x86 is &lt;3.15.3.1-0.4.2.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576572" version="1" comment="mozilla-nss is &lt;3.15.3.1-0.4.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576573" version="1" comment="mozilla-nss-32bit is &lt;3.15.3.1-0.4.2.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576574" version="1" comment="mozilla-nss-tools is &lt;3.15.3.1-0.4.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576575" version="1" comment="mozilla-nss-x86 is &lt;3.15.3.1-0.4.2.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992514" version="1" comment="ntp is &lt;4.2.4p8-1.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992515" version="1" comment="ntp-doc is &lt;4.2.4p8-1.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576576" version="1" comment="ntp is &lt;4.2.8p6-41.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576577" version="1" comment="ntp-doc is &lt;4.2.8p6-41.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576578" version="1" comment="ntp is &lt;4.2.8p7-44.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576579" version="1" comment="ntp-doc is &lt;4.2.8p7-44.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576580" version="1" comment="ntp is &lt;4.2.8p8-47.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576581" version="1" comment="ntp-doc is &lt;4.2.8p8-47.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576582" version="1" comment="ntp is &lt;4.2.8p9-48.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576583" version="1" comment="ntp-doc is &lt;4.2.8p9-48.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992516" version="1" comment="openCryptoki is &lt;2.4-0.13.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992517" version="1" comment="openCryptoki-32bit is &lt;2.4-0.13.1 for i586,ppc,s390" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992518" version="1" comment="openCryptoki-64bit is &lt;2.4-0.13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576584" version="1" comment="openssh is &lt;5.1p1-41.57.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576585" version="1" comment="openssh-askpass is &lt;5.1p1-41.57.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576586" version="1" comment="openssh is &lt;5.1p1-41.69.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576587" version="1" comment="openssh-askpass is &lt;5.1p1-41.69.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576588" version="1" comment="openssh-askpass-gnome is &lt;5.1p1-41.69.4 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576589" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.80.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576590" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.80.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576591" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.80.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576592" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.80.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576593" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.80.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576594" version="1" comment="openssl is &lt;0.9.8j-0.80.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576595" version="1" comment="openssl-doc is &lt;0.9.8j-0.80.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576596" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576597" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576598" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.89.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576599" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576600" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.89.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576601" version="1" comment="openssl is &lt;0.9.8j-0.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576602" version="1" comment="openssl-doc is &lt;0.9.8j-0.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576603" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.97.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576604" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.97.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576605" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.97.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576606" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.97.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576607" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.97.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576608" version="1" comment="openssl is &lt;0.9.8j-0.97.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576609" version="1" comment="openssl-doc is &lt;0.9.8j-0.97.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576610" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.102.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576611" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.102.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576612" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.102.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576613" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.102.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576614" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.102.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576615" version="1" comment="openssl is &lt;0.9.8j-0.102.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576616" version="1" comment="openssl-doc is &lt;0.9.8j-0.102.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566169" version="1" comment="openssl-certs is &lt;1.95-0.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576617" version="1" comment="openswan is &lt;2.6.16-1.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576618" version="1" comment="openswan-doc is &lt;2.6.16-1.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576619" version="1" comment="openvpn is &lt;2.0.9-143.33.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576620" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.33.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576621" version="1" comment="perl is &lt;5.10.0-64.61.61.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576622" version="1" comment="perl-32bit is &lt;5.10.0-64.61.61.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576623" version="1" comment="perl-base is &lt;5.10.0-64.61.61.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576624" version="1" comment="perl-doc is &lt;5.10.0-64.61.61.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576625" version="1" comment="perl-x86 is &lt;5.10.0-64.61.61.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576626" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576627" version="1" comment="php5 is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576628" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576629" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576630" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576631" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576632" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576633" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576634" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576635" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576636" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576637" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576638" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576639" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576640" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576641" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576642" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576643" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576644" version="1" comment="php5-json is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576645" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576646" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576647" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576648" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576649" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576650" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576651" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576652" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576653" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576654" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576655" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576656" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576657" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576658" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576659" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576660" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576661" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576662" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576663" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576664" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576665" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576666" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576667" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576668" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576669" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576670" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576671" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576672" version="1" comment="php5 is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576673" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576674" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576675" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576676" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576677" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576678" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576679" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576680" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576681" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576682" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576683" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576684" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576685" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576686" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576687" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576688" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576689" version="1" comment="php5-json is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576690" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576691" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576692" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576693" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576694" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576695" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576696" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576697" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576698" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576699" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576700" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576701" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576702" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576703" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576704" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576705" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576706" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576707" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576708" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576709" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576710" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576711" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576712" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576713" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576714" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576715" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576716" version="1" comment="apache2-mod_php53 is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576717" version="1" comment="php53 is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576718" version="1" comment="php53-bcmath is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576719" version="1" comment="php53-bz2 is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576720" version="1" comment="php53-calendar is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576721" version="1" comment="php53-ctype is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576722" version="1" comment="php53-curl is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576723" version="1" comment="php53-dba is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576724" version="1" comment="php53-dom is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576725" version="1" comment="php53-exif is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576726" version="1" comment="php53-fastcgi is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576727" version="1" comment="php53-fileinfo is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576728" version="1" comment="php53-ftp is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576729" version="1" comment="php53-gd is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576730" version="1" comment="php53-gettext is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576731" version="1" comment="php53-gmp is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576732" version="1" comment="php53-iconv is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576733" version="1" comment="php53-intl is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576734" version="1" comment="php53-json is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576735" version="1" comment="php53-ldap is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576736" version="1" comment="php53-mbstring is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576737" version="1" comment="php53-mcrypt is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576738" version="1" comment="php53-mysql is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576739" version="1" comment="php53-odbc is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576740" version="1" comment="php53-openssl is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576741" version="1" comment="php53-pcntl is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576742" version="1" comment="php53-pdo is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576743" version="1" comment="php53-pear is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576744" version="1" comment="php53-pgsql is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576745" version="1" comment="php53-pspell is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576746" version="1" comment="php53-shmop is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576747" version="1" comment="php53-snmp is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576748" version="1" comment="php53-soap is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576749" version="1" comment="php53-suhosin is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576750" version="1" comment="php53-sysvmsg is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576751" version="1" comment="php53-sysvsem is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576752" version="1" comment="php53-sysvshm is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576753" version="1" comment="php53-tokenizer is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576754" version="1" comment="php53-wddx is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576755" version="1" comment="php53-xmlreader is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576756" version="1" comment="php53-xmlrpc is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576757" version="1" comment="php53-xmlwriter is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576758" version="1" comment="php53-xsl is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576759" version="1" comment="php53-zip is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576760" version="1" comment="php53-zlib is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576761" version="1" comment="apache2-mod_php53 is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576762" version="1" comment="php53 is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576763" version="1" comment="php53-bcmath is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576764" version="1" comment="php53-bz2 is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576765" version="1" comment="php53-calendar is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576766" version="1" comment="php53-ctype is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576767" version="1" comment="php53-curl is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576768" version="1" comment="php53-dba is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576769" version="1" comment="php53-dom is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576770" version="1" comment="php53-exif is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576771" version="1" comment="php53-fastcgi is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576772" version="1" comment="php53-fileinfo is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576773" version="1" comment="php53-ftp is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576774" version="1" comment="php53-gd is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576775" version="1" comment="php53-gettext is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576776" version="1" comment="php53-gmp is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576777" version="1" comment="php53-iconv is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576778" version="1" comment="php53-intl is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576779" version="1" comment="php53-json is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576780" version="1" comment="php53-ldap is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576781" version="1" comment="php53-mbstring is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576782" version="1" comment="php53-mcrypt is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576783" version="1" comment="php53-mysql is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576784" version="1" comment="php53-odbc is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576785" version="1" comment="php53-openssl is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576786" version="1" comment="php53-pcntl is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576787" version="1" comment="php53-pdo is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576788" version="1" comment="php53-pear is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576789" version="1" comment="php53-pgsql is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576790" version="1" comment="php53-pspell is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576791" version="1" comment="php53-shmop is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576792" version="1" comment="php53-snmp is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576793" version="1" comment="php53-soap is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576794" version="1" comment="php53-suhosin is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576795" version="1" comment="php53-sysvmsg is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576796" version="1" comment="php53-sysvsem is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576797" version="1" comment="php53-sysvshm is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576798" version="1" comment="php53-tokenizer is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576799" version="1" comment="php53-wddx is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576800" version="1" comment="php53-xmlreader is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576801" version="1" comment="php53-xmlrpc is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576802" version="1" comment="php53-xmlwriter is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576803" version="1" comment="php53-xsl is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576804" version="1" comment="php53-zip is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576805" version="1" comment="php53-zlib is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576806" version="1" comment="apache2-mod_php53 is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576807" version="1" comment="php53 is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576808" version="1" comment="php53-bcmath is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576809" version="1" comment="php53-bz2 is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576810" version="1" comment="php53-calendar is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576811" version="1" comment="php53-ctype is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576812" version="1" comment="php53-curl is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576813" version="1" comment="php53-dba is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576814" version="1" comment="php53-dom is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576815" version="1" comment="php53-exif is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576816" version="1" comment="php53-fastcgi is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576817" version="1" comment="php53-fileinfo is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576818" version="1" comment="php53-ftp is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576819" version="1" comment="php53-gd is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576820" version="1" comment="php53-gettext is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576821" version="1" comment="php53-gmp is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576822" version="1" comment="php53-iconv is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576823" version="1" comment="php53-intl is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576824" version="1" comment="php53-json is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576825" version="1" comment="php53-ldap is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576826" version="1" comment="php53-mbstring is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576827" version="1" comment="php53-mcrypt is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576828" version="1" comment="php53-mysql is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576829" version="1" comment="php53-odbc is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576830" version="1" comment="php53-openssl is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576831" version="1" comment="php53-pcntl is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576832" version="1" comment="php53-pdo is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576833" version="1" comment="php53-pear is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576834" version="1" comment="php53-pgsql is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576835" version="1" comment="php53-pspell is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576836" version="1" comment="php53-shmop is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576837" version="1" comment="php53-snmp is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576838" version="1" comment="php53-soap is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576839" version="1" comment="php53-suhosin is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576840" version="1" comment="php53-sysvmsg is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576841" version="1" comment="php53-sysvsem is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576842" version="1" comment="php53-sysvshm is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576843" version="1" comment="php53-tokenizer is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576844" version="1" comment="php53-wddx is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576845" version="1" comment="php53-xmlreader is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576846" version="1" comment="php53-xmlrpc is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576847" version="1" comment="php53-xmlwriter is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576848" version="1" comment="php53-xsl is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576849" version="1" comment="php53-zip is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576850" version="1" comment="php53-zlib is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992519" version="1" comment="popt is &lt;1.7-37.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992520" version="1" comment="popt-32bit is &lt;1.7-37.56.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589041" version="1" comment="popt-x86 is &lt;1.7-37.56.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992521" version="1" comment="rpm is &lt;4.4.2.3-37.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992522" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.56.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589044" version="1" comment="rpm-x86 is &lt;4.4.2.3-37.56.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576851" version="1" comment="postgresql is &lt;8.3.23-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576852" version="1" comment="postgresql-contrib is &lt;8.3.23-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576853" version="1" comment="postgresql-docs is &lt;8.3.23-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576854" version="1" comment="postgresql-server is &lt;8.3.23-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576855" version="1" comment="puppet is &lt;2.6.18-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576856" version="1" comment="puppet-server is &lt;2.6.18-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576857" version="1" comment="libpython2_6-1_0 is &lt;2.6.8-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576858" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.8-0.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576859" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.8-0.23.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576860" version="1" comment="python is &lt;2.6.8-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576861" version="1" comment="python-32bit is &lt;2.6.8-0.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576862" version="1" comment="python-base is &lt;2.6.8-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576863" version="1" comment="python-base-32bit is &lt;2.6.8-0.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576864" version="1" comment="python-base-x86 is &lt;2.6.8-0.23.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576865" version="1" comment="python-curses is &lt;2.6.8-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576866" version="1" comment="python-demo is &lt;2.6.8-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576867" version="1" comment="python-gdbm is &lt;2.6.8-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576868" version="1" comment="python-idle is &lt;2.6.8-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576869" version="1" comment="python-tk is &lt;2.6.8-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576870" version="1" comment="python-x86 is &lt;2.6.8-0.23.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576871" version="1" comment="python-xml is &lt;2.6.8-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576872" version="1" comment="quagga is &lt;0.99.15-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992523" version="1" comment="quota is &lt;3.16-50.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992524" version="1" comment="quota-nfs is &lt;3.16-50.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576873" version="1" comment="ruby is &lt;1.8.7.p357-0.9.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563135" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563139" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576874" version="1" comment="ldapsmb is &lt;1.34b-45.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576875" version="1" comment="libldb1 is &lt;3.6.3-45.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576876" version="1" comment="libsmbclient0 is &lt;3.6.3-45.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576877" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-45.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576878" version="1" comment="libtalloc2 is &lt;3.6.3-45.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576879" version="1" comment="libtalloc2-32bit is &lt;3.6.3-45.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576880" version="1" comment="libtdb1 is &lt;3.6.3-45.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576881" version="1" comment="libtdb1-32bit is &lt;3.6.3-45.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576882" version="1" comment="libtevent0 is &lt;3.6.3-45.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576883" version="1" comment="libtevent0-32bit is &lt;3.6.3-45.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576884" version="1" comment="libwbclient0 is &lt;3.6.3-45.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576885" version="1" comment="libwbclient0-32bit is &lt;3.6.3-45.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576886" version="1" comment="samba is &lt;3.6.3-45.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576887" version="1" comment="samba-32bit is &lt;3.6.3-45.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576888" version="1" comment="samba-client is &lt;3.6.3-45.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576889" version="1" comment="samba-client-32bit is &lt;3.6.3-45.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576890" version="1" comment="samba-doc is &lt;3.6.3-45.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576891" version="1" comment="samba-krb-printing is &lt;3.6.3-45.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576892" version="1" comment="samba-winbind is &lt;3.6.3-45.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576893" version="1" comment="samba-winbind-32bit is &lt;3.6.3-45.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576894" version="1" comment="ldapsmb is &lt;1.34b-48.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576895" version="1" comment="libldb1 is &lt;3.6.3-48.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576896" version="1" comment="libsmbclient0 is &lt;3.6.3-48.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576897" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-48.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576898" version="1" comment="libtalloc2 is &lt;3.6.3-48.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576899" version="1" comment="libtalloc2-32bit is &lt;3.6.3-48.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576900" version="1" comment="libtdb1 is &lt;3.6.3-48.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576901" version="1" comment="libtdb1-32bit is &lt;3.6.3-48.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576902" version="1" comment="libtevent0 is &lt;3.6.3-48.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576903" version="1" comment="libtevent0-32bit is &lt;3.6.3-48.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576904" version="1" comment="libwbclient0 is &lt;3.6.3-48.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576905" version="1" comment="libwbclient0-32bit is &lt;3.6.3-48.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576906" version="1" comment="samba is &lt;3.6.3-48.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576907" version="1" comment="samba-32bit is &lt;3.6.3-48.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576908" version="1" comment="samba-client is &lt;3.6.3-48.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576909" version="1" comment="samba-client-32bit is &lt;3.6.3-48.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576910" version="1" comment="samba-doc is &lt;3.6.3-48.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576911" version="1" comment="samba-krb-printing is &lt;3.6.3-48.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576912" version="1" comment="samba-winbind is &lt;3.6.3-48.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576913" version="1" comment="samba-winbind-32bit is &lt;3.6.3-48.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576914" version="1" comment="ldapsmb is &lt;1.34b-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576915" version="1" comment="libldb1 is &lt;3.6.3-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576916" version="1" comment="libsmbclient0 is &lt;3.6.3-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576917" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576918" version="1" comment="libtalloc2 is &lt;3.6.3-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576919" version="1" comment="libtalloc2-32bit is &lt;3.6.3-52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576920" version="1" comment="libtdb1 is &lt;3.6.3-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576921" version="1" comment="libtdb1-32bit is &lt;3.6.3-52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576922" version="1" comment="libtevent0 is &lt;3.6.3-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576923" version="1" comment="libtevent0-32bit is &lt;3.6.3-52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576924" version="1" comment="libwbclient0 is &lt;3.6.3-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576925" version="1" comment="libwbclient0-32bit is &lt;3.6.3-52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576926" version="1" comment="samba is &lt;3.6.3-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576927" version="1" comment="samba-32bit is &lt;3.6.3-52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576928" version="1" comment="samba-client is &lt;3.6.3-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576929" version="1" comment="samba-client-32bit is &lt;3.6.3-52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576930" version="1" comment="samba-doc is &lt;3.6.3-52.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576931" version="1" comment="samba-krb-printing is &lt;3.6.3-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576932" version="1" comment="samba-winbind is &lt;3.6.3-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576933" version="1" comment="samba-winbind-32bit is &lt;3.6.3-52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576934" version="1" comment="ldapsmb is &lt;1.34b-56.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576935" version="1" comment="libldb1 is &lt;3.6.3-56.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576936" version="1" comment="libsmbclient0 is &lt;3.6.3-56.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576937" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576938" version="1" comment="libtalloc2 is &lt;3.6.3-56.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576939" version="1" comment="libtalloc2-32bit is &lt;3.6.3-56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576940" version="1" comment="libtdb1 is &lt;3.6.3-56.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576941" version="1" comment="libtdb1-32bit is &lt;3.6.3-56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576942" version="1" comment="libtevent0 is &lt;3.6.3-56.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576943" version="1" comment="libtevent0-32bit is &lt;3.6.3-56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576944" version="1" comment="libwbclient0 is &lt;3.6.3-56.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576945" version="1" comment="libwbclient0-32bit is &lt;3.6.3-56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576946" version="1" comment="samba is &lt;3.6.3-56.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576947" version="1" comment="samba-32bit is &lt;3.6.3-56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576948" version="1" comment="samba-client is &lt;3.6.3-56.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576949" version="1" comment="samba-client-32bit is &lt;3.6.3-56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576950" version="1" comment="samba-doc is &lt;3.6.3-56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576951" version="1" comment="samba-krb-printing is &lt;3.6.3-56.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576952" version="1" comment="samba-winbind is &lt;3.6.3-56.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576953" version="1" comment="samba-winbind-32bit is &lt;3.6.3-56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992525" version="1" comment="sblim-sfcb is &lt;1.3.11-0.23.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576954" version="1" comment="squid is &lt;2.7.STABLE5-2.12.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576955" version="1" comment="squid3 is &lt;3.1.12-8.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576956" version="1" comment="strongswan is &lt;4.4.0-6.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576957" version="1" comment="strongswan-doc is &lt;4.4.0-6.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576958" version="1" comment="stunnel is &lt;4.36-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576959" version="1" comment="sudo is &lt;1.7.6p2-0.2.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576960" version="1" comment="systemtap is &lt;1.5-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576961" version="1" comment="systemtap-server is &lt;1.5-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576970" version="1" comment="vino is &lt;2.28.1-2.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576971" version="1" comment="vino-lang is &lt;2.28.1-2.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589917" version="1" comment="vm-install is &lt;0.5.14-0.5.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576972" version="1" comment="wireshark is &lt;1.8.12-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566193" version="1" comment="xen is &lt;4.1.4_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576973" version="1" comment="xen-devel is &lt;4.1.6_08-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566194" version="1" comment="xen-doc-html is &lt;4.1.4_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566195" version="1" comment="xen-doc-pdf is &lt;4.1.4_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566196" version="1" comment="xen-kmp-default is &lt;4.1.4_02_3.0.58_0.6.6-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566197" version="1" comment="xen-kmp-pae is &lt;4.1.4_02_3.0.58_0.6.6-0.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566198" version="1" comment="xen-kmp-trace is &lt;4.1.4_02_3.0.58_0.6.6-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566199" version="1" comment="xen-libs is &lt;4.1.4_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566200" version="1" comment="xen-libs-32bit is &lt;4.1.4_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566201" version="1" comment="xen-tools is &lt;4.1.4_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566202" version="1" comment="xen-tools-domU is &lt;4.1.4_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576974" version="1" comment="xen is &lt;4.1.6_08-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576975" version="1" comment="xen-devel is &lt;4.1.6_08-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576976" version="1" comment="xen-doc-html is &lt;4.1.6_08-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576977" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576978" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.23-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576979" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.23-0.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576980" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.23-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576981" version="1" comment="xen-libs is &lt;4.1.6_08-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576982" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576983" version="1" comment="xen-tools is &lt;4.1.6_08-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576984" version="1" comment="xen-tools-domU is &lt;4.1.6_08-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576985" version="1" comment="xen is &lt;4.1.6_08-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576986" version="1" comment="xen-devel is &lt;4.1.6_08-20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576987" version="1" comment="xen-doc-html is &lt;4.1.6_08-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576988" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576989" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.37-20.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576990" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.37-20.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576991" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.37-20.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576992" version="1" comment="xen-libs is &lt;4.1.6_08-20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576993" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576994" version="1" comment="xen-tools is &lt;4.1.6_08-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576995" version="1" comment="xen-tools-domU is &lt;4.1.6_08-20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576996" version="1" comment="xen is &lt;4.1.6_08-26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576997" version="1" comment="xen-devel is &lt;4.1.6_08-26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576998" version="1" comment="xen-doc-html is &lt;4.1.6_08-26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576999" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577000" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.37-26.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577001" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.37-26.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577002" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.37-26.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577003" version="1" comment="xen-libs is &lt;4.1.6_08-26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577004" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577005" version="1" comment="xen-tools is &lt;4.1.6_08-26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577006" version="1" comment="xen-tools-domU is &lt;4.1.6_08-26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577007" version="1" comment="xen is &lt;4.1.6_08-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577008" version="1" comment="xen-devel is &lt;4.1.6_08-29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577009" version="1" comment="xen-doc-html is &lt;4.1.6_08-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577010" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577011" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.40-29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577012" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.40-29.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577013" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.40-29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577014" version="1" comment="xen-libs is &lt;4.1.6_08-29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577015" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577016" version="1" comment="xen-tools is &lt;4.1.6_08-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577017" version="1" comment="xen-tools-domU is &lt;4.1.6_08-29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577018" version="1" comment="xen is &lt;4.1.6_08-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577019" version="1" comment="xen-devel is &lt;4.1.6_08-32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577020" version="1" comment="xen-doc-html is &lt;4.1.6_08-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577021" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577022" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.44-32.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577023" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.44-32.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577024" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.44-32.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577025" version="1" comment="xen-libs is &lt;4.1.6_08-32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577026" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577027" version="1" comment="xen-tools is &lt;4.1.6_08-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577028" version="1" comment="xen-tools-domU is &lt;4.1.6_08-32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589049" version="1" comment="libvirt is &lt;0.9.6-0.15.71 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589050" version="1" comment="libvirt-client is &lt;0.9.6-0.15.71 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589051" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.15.71 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589052" version="1" comment="libvirt-doc is &lt;0.9.6-0.15.71 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589053" version="1" comment="libvirt-python is &lt;0.9.6-0.15.71 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589054" version="1" comment="virt-manager is &lt;0.9.0-3.17.26 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589055" version="1" comment="virt-utils is &lt;1.1.7-0.11.15 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589056" version="1" comment="vm-install is &lt;0.5.9-0.7.13 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589057" version="1" comment="xen is &lt;4.1.2_18-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589058" version="1" comment="xen-doc-html is &lt;4.1.2_18-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589059" version="1" comment="xen-doc-pdf is &lt;4.1.2_18-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589060" version="1" comment="xen-kmp-default is &lt;4.1.2_18_3.0.31_0.9-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589061" version="1" comment="xen-kmp-pae is &lt;4.1.2_18_3.0.31_0.9-0.9.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589062" version="1" comment="xen-kmp-trace is &lt;4.1.2_18_3.0.31_0.9-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589063" version="1" comment="xen-libs is &lt;4.1.2_18-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589064" version="1" comment="xen-libs-32bit is &lt;4.1.2_18-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589065" version="1" comment="xen-tools is &lt;4.1.2_18-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589066" version="1" comment="xen-tools-domU is &lt;4.1.2_18-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589067" version="1" comment="yast2-vm is &lt;2.17.10-0.5.42 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566203" version="1" comment="libvirt is &lt;0.9.6-0.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566204" version="1" comment="libvirt-client is &lt;0.9.6-0.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566205" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566206" version="1" comment="libvirt-doc is &lt;0.9.6-0.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566207" version="1" comment="libvirt-python is &lt;0.9.6-0.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566208" version="1" comment="virt-manager is &lt;0.9.0-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566209" version="1" comment="vm-install is &lt;0.5.10-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566210" version="1" comment="xen is &lt;4.1.2_20-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566211" version="1" comment="xen-doc-html is &lt;4.1.2_20-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566212" version="1" comment="xen-doc-pdf is &lt;4.1.2_20-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566213" version="1" comment="xen-kmp-default is &lt;4.1.2_20_3.0.38_0.5-0.5.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566214" version="1" comment="xen-kmp-trace is &lt;4.1.2_20_3.0.38_0.5-0.5.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566215" version="1" comment="xen-libs is &lt;4.1.2_20-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566216" version="1" comment="xen-libs-32bit is &lt;4.1.2_20-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566217" version="1" comment="xen-tools is &lt;4.1.2_20-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566218" version="1" comment="xen-tools-domU is &lt;4.1.2_20-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566219" version="1" comment="vm-install is &lt;0.5.12-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566220" version="1" comment="xen is &lt;4.1.3_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566221" version="1" comment="xen-doc-html is &lt;4.1.3_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566222" version="1" comment="xen-doc-pdf is &lt;4.1.3_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566223" version="1" comment="xen-kmp-default is &lt;4.1.3_02_3.0.38_0.5-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566224" version="1" comment="xen-kmp-trace is &lt;4.1.3_02_3.0.38_0.5-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566225" version="1" comment="xen-libs is &lt;4.1.3_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566226" version="1" comment="xen-libs-32bit is &lt;4.1.3_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566227" version="1" comment="xen-tools is &lt;4.1.3_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566228" version="1" comment="xen-tools-domU is &lt;4.1.3_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566229" version="1" comment="xen is &lt;4.1.3_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566230" version="1" comment="xen-doc-html is &lt;4.1.3_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566231" version="1" comment="xen-doc-pdf is &lt;4.1.3_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566232" version="1" comment="xen-kmp-default is &lt;4.1.3_04_3.0.42_0.7-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566233" version="1" comment="xen-kmp-pae is &lt;4.1.3_04_3.0.42_0.7-0.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566234" version="1" comment="xen-kmp-trace is &lt;4.1.3_04_3.0.42_0.7-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566235" version="1" comment="xen-libs is &lt;4.1.3_04-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566236" version="1" comment="xen-libs-32bit is &lt;4.1.3_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566237" version="1" comment="xen-tools is &lt;4.1.3_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566238" version="1" comment="xen-tools-domU is &lt;4.1.3_04-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566239" version="1" comment="xen is &lt;4.1.5_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566240" version="1" comment="xen-doc-html is &lt;4.1.5_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566241" version="1" comment="xen-doc-pdf is &lt;4.1.5_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566242" version="1" comment="xen-kmp-default is &lt;4.1.5_02_3.0.74_0.6.10-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566243" version="1" comment="xen-kmp-pae is &lt;4.1.5_02_3.0.74_0.6.10-0.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566244" version="1" comment="xen-kmp-trace is &lt;4.1.5_02_3.0.74_0.6.10-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566245" version="1" comment="xen-libs is &lt;4.1.5_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566246" version="1" comment="xen-libs-32bit is &lt;4.1.5_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566247" version="1" comment="xen-tools is &lt;4.1.5_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566248" version="1" comment="xen-tools-domU is &lt;4.1.5_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566249" version="1" comment="xen is &lt;4.1.6_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566250" version="1" comment="xen-doc-html is &lt;4.1.6_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566251" version="1" comment="xen-doc-pdf is &lt;4.1.6_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566252" version="1" comment="xen-kmp-default is &lt;4.1.6_02_3.0.93_0.5-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566253" version="1" comment="xen-kmp-pae is &lt;4.1.6_02_3.0.93_0.5-0.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566254" version="1" comment="xen-kmp-trace is &lt;4.1.6_02_3.0.93_0.5-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566255" version="1" comment="xen-libs is &lt;4.1.6_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566256" version="1" comment="xen-libs-32bit is &lt;4.1.6_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566257" version="1" comment="xen-tools is &lt;4.1.6_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566258" version="1" comment="xen-tools-domU is &lt;4.1.6_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566259" version="1" comment="xen is &lt;4.1.6_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566260" version="1" comment="xen-doc-html is &lt;4.1.6_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566261" version="1" comment="xen-doc-pdf is &lt;4.1.6_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566262" version="1" comment="xen-kmp-default is &lt;4.1.6_04_3.0.101_0.5-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566263" version="1" comment="xen-kmp-pae is &lt;4.1.6_04_3.0.101_0.5-0.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566264" version="1" comment="xen-kmp-trace is &lt;4.1.6_04_3.0.101_0.5-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566265" version="1" comment="xen-libs is &lt;4.1.6_04-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566266" version="1" comment="xen-libs-32bit is &lt;4.1.6_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566267" version="1" comment="xen-tools is &lt;4.1.6_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566268" version="1" comment="xen-tools-domU is &lt;4.1.6_04-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577029" version="1" comment="xen is &lt;4.1.6_06-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577030" version="1" comment="xen-devel is &lt;4.1.6_06-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577031" version="1" comment="xen-doc-html is &lt;4.1.6_06-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577032" version="1" comment="xen-doc-pdf is &lt;4.1.6_06-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577033" version="1" comment="xen-kmp-default is &lt;4.1.6_06_3.0.101_0.7.17-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577034" version="1" comment="xen-kmp-pae is &lt;4.1.6_06_3.0.101_0.7.17-0.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577035" version="1" comment="xen-kmp-trace is &lt;4.1.6_06_3.0.101_0.7.17-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577036" version="1" comment="xen-libs is &lt;4.1.6_06-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577037" version="1" comment="xen-libs-32bit is &lt;4.1.6_06-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577038" version="1" comment="xen-tools is &lt;4.1.6_06-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577039" version="1" comment="xen-tools-domU is &lt;4.1.6_06-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577040" version="1" comment="xen is &lt;4.1.6_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577041" version="1" comment="xen-devel is &lt;4.1.6_08-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577042" version="1" comment="xen-doc-html is &lt;4.1.6_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577043" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577044" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.29-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577045" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.29-0.9.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577046" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.29-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577047" version="1" comment="xen-libs is &lt;4.1.6_08-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577048" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577049" version="1" comment="xen-tools is &lt;4.1.6_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577050" version="1" comment="xen-tools-domU is &lt;4.1.6_08-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577051" version="1" comment="xen is &lt;4.1.6_08-0.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577052" version="1" comment="xen-devel is &lt;4.1.6_08-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577053" version="1" comment="xen-doc-html is &lt;4.1.6_08-0.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577054" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-0.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577055" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.29-0.13.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577056" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.29-0.13.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577057" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.29-0.13.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577058" version="1" comment="xen-libs is &lt;4.1.6_08-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577059" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-0.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577060" version="1" comment="xen-tools is &lt;4.1.6_08-0.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577061" version="1" comment="xen-tools-domU is &lt;4.1.6_08-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577062" version="1" comment="xen is &lt;4.1.6_08-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577063" version="1" comment="xen-devel is &lt;4.1.6_08-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577064" version="1" comment="xen-doc-html is &lt;4.1.6_08-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577065" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577066" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.37-23.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577067" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.37-23.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577068" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.37-23.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577069" version="1" comment="xen-libs is &lt;4.1.6_08-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577070" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577071" version="1" comment="xen-tools is &lt;4.1.6_08-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577072" version="1" comment="xen-tools-domU is &lt;4.1.6_08-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577074" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.70.76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577075" version="1" comment="xorg-x11-server is &lt;7.4-27.70.76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577076" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.70.76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577077" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577078" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577079" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.40.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577080" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577081" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577082" version="1" comment="xorg-x11-libX11-x86 is &lt;7.4-5.11.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577083" version="1" comment="xorg-x11-libXext is &lt;7.4-1.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577084" version="1" comment="xorg-x11-libXext-32bit is &lt;7.4-1.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577085" version="1" comment="xorg-x11-libXext-x86 is &lt;7.4-1.18.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577086" version="1" comment="xorg-x11-libXfixes is &lt;7.4-1.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577087" version="1" comment="xorg-x11-libXfixes-32bit is &lt;7.4-1.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577088" version="1" comment="xorg-x11-libXfixes-x86 is &lt;7.4-1.16.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577089" version="1" comment="xorg-x11-libXp is &lt;7.4-1.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577090" version="1" comment="xorg-x11-libXp-32bit is &lt;7.4-1.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577091" version="1" comment="xorg-x11-libXp-x86 is &lt;7.4-1.18.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577092" version="1" comment="xorg-x11-libXrender is &lt;7.4-1.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577093" version="1" comment="xorg-x11-libXrender-32bit is &lt;7.4-1.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577094" version="1" comment="xorg-x11-libXrender-x86 is &lt;7.4-1.16.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577095" version="1" comment="xorg-x11-libXt is &lt;7.4-1.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577096" version="1" comment="xorg-x11-libXt-32bit is &lt;7.4-1.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577097" version="1" comment="xorg-x11-libXt-x86 is &lt;7.4-1.19.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577098" version="1" comment="xorg-x11-libXv is &lt;7.4-1.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577099" version="1" comment="xorg-x11-libXv-32bit is &lt;7.4-1.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577100" version="1" comment="xorg-x11-libXv-x86 is &lt;7.4-1.16.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577101" version="1" comment="xorg-x11-libxcb is &lt;7.4-1.22.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577102" version="1" comment="xorg-x11-libxcb-32bit is &lt;7.4-1.22.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577103" version="1" comment="xorg-x11-libxcb-x86 is &lt;7.4-1.22.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992526" version="1" comment="xorg-x11-server-rdp is &lt;7.3.99-3.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992527" version="1" comment="yast2-network is &lt;2.17.182.12-0.5.11 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577104" version="1" comment="zypper is &lt;1.6.166-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577105" version="1" comment="zypper-log is &lt;1.6.166-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992528" version="1" comment="MozillaFirefox is &lt;102.10.0-72.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992529" version="1" comment="MozillaFirefox-translations-common is &lt;102.10.0-72.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992530" version="1" comment="MozillaFirefox-translations-other is &lt;102.10.0-72.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577106" version="1" comment="MozillaFirefox is &lt;24.6.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577107" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.48 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577108" version="1" comment="MozillaFirefox-translations is &lt;24.6.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577109" version="1" comment="libfreebl3 is &lt;3.16.1-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577110" version="1" comment="libfreebl3-32bit is &lt;3.16.1-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577111" version="1" comment="libfreebl3-x86 is &lt;3.16.1-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577112" version="1" comment="libsoftokn3 is &lt;3.16.1-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577113" version="1" comment="libsoftokn3-32bit is &lt;3.16.1-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577114" version="1" comment="libsoftokn3-x86 is &lt;3.16.1-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577115" version="1" comment="mozilla-nspr is &lt;4.10.6-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577116" version="1" comment="mozilla-nspr-32bit is &lt;4.10.6-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577117" version="1" comment="mozilla-nspr-x86 is &lt;4.10.6-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577118" version="1" comment="mozilla-nss is &lt;3.16.1-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577119" version="1" comment="mozilla-nss-32bit is &lt;3.16.1-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577120" version="1" comment="mozilla-nss-tools is &lt;3.16.1-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577121" version="1" comment="mozilla-nss-x86 is &lt;3.16.1-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577122" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577123" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684102" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.149.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684103" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.149.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992531" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.154.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992532" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.154.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992533" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.157.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992534" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.157.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577124" version="1" comment="LibVNCServer is &lt;0.9.1-160.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992535" version="1" comment="LibVNCServer is &lt;0.9.1-160.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992536" version="1" comment="Mesa is &lt;9.0.3-0.27.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591120" version="1" comment="Mesa-32bit is &lt;9.0.3-0.27.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591121" version="1" comment="Mesa-x86 is &lt;9.0.3-0.27.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577125" version="1" comment="Mesa is &lt;9.0.3-0.29.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577126" version="1" comment="Mesa-32bit is &lt;9.0.3-0.29.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577127" version="1" comment="MozillaFirefox is &lt;17.0.9esr-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577128" version="1" comment="MozillaFirefox-translations is &lt;17.0.9esr-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577129" version="1" comment="MozillaFirefox is &lt;31.8.0esr-0.13.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577130" version="1" comment="MozillaFirefox-translations is &lt;31.8.0esr-0.13.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577131" version="1" comment="MozillaFirefox is &lt;38.5.0esr-28.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577132" version="1" comment="MozillaFirefox-translations is &lt;38.5.0esr-28.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577133" version="1" comment="MozillaFirefox is &lt;38.6.1esr-34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577134" version="1" comment="MozillaFirefox-translations is &lt;38.6.1esr-34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577135" version="1" comment="MozillaFirefox is &lt;38.8.0esr-40.5 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577136" version="1" comment="MozillaFirefox-translations is &lt;38.8.0esr-40.5 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577137" version="1" comment="libfreebl3 is &lt;3.20.2-30.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577138" version="1" comment="libfreebl3-32bit is &lt;3.20.2-30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577139" version="1" comment="libsoftokn3 is &lt;3.20.2-30.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577140" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577141" version="1" comment="mozilla-nspr is &lt;4.12-26.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577142" version="1" comment="mozilla-nspr-32bit is &lt;4.12-26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577143" version="1" comment="mozilla-nss is &lt;3.20.2-30.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577144" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577145" version="1" comment="mozilla-nss-tools is &lt;3.20.2-30.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577146" version="1" comment="MozillaFirefox is &lt;45.2.0esr-45.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577147" version="1" comment="MozillaFirefox-branding-SLED is &lt;45.0-23.10 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577148" version="1" comment="MozillaFirefox-translations is &lt;45.2.0esr-45.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577149" version="1" comment="firefox-fontconfig is &lt;2.11.0-2.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577150" version="1" comment="libfreebl3 is &lt;3.21.1-35.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577151" version="1" comment="libfreebl3-32bit is &lt;3.21.1-35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577152" version="1" comment="libsoftokn3 is &lt;3.21.1-35.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577153" version="1" comment="libsoftokn3-32bit is &lt;3.21.1-35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577154" version="1" comment="mozilla-nspr is &lt;4.12-29.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577155" version="1" comment="mozilla-nspr-32bit is &lt;4.12-29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577156" version="1" comment="mozilla-nss is &lt;3.21.1-35.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577157" version="1" comment="mozilla-nss-32bit is &lt;3.21.1-35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577158" version="1" comment="mozilla-nss-tools is &lt;3.21.1-35.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577159" version="1" comment="MozillaFirefox is &lt;45.3.0esr-50.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577160" version="1" comment="MozillaFirefox-translations is &lt;45.3.0esr-50.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577161" version="1" comment="MozillaFirefox is &lt;45.4.0esr-53.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577162" version="1" comment="MozillaFirefox-translations is &lt;45.4.0esr-53.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577163" version="1" comment="MozillaFirefox is &lt;45.6.0esr-62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577164" version="1" comment="MozillaFirefox-translations is &lt;45.6.0esr-62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577165" version="1" comment="MozillaFirefox is &lt;45.7.0esr-65.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577166" version="1" comment="MozillaFirefox-translations is &lt;45.7.0esr-65.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577167" version="1" comment="MozillaFirefox is &lt;45.8.0esr-68.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577168" version="1" comment="MozillaFirefox-translations is &lt;45.8.0esr-68.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577169" version="1" comment="MozillaFirefox is &lt;45.9.0esr-71.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577170" version="1" comment="MozillaFirefox-translations is &lt;45.9.0esr-71.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577171" version="1" comment="libfreebl3 is &lt;3.29.5-46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577172" version="1" comment="libfreebl3-32bit is &lt;3.29.5-46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577173" version="1" comment="libsoftokn3 is &lt;3.29.5-46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577174" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577175" version="1" comment="mozilla-nspr is &lt;4.13.1-32.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577176" version="1" comment="mozilla-nspr-32bit is &lt;4.13.1-32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577177" version="1" comment="mozilla-nss is &lt;3.29.5-46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577178" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577179" version="1" comment="mozilla-nss-tools is &lt;3.29.5-46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577180" version="1" comment="MozillaFirefox is &lt;52.2.0esr-72.5.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577181" version="1" comment="MozillaFirefox-branding-SLED is &lt;52-24.3.44 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577182" version="1" comment="MozillaFirefox-translations is &lt;52.2.0esr-72.5.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577183" version="1" comment="firefox-libffi4 is &lt;5.3.1+r233831-7.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577184" version="1" comment="firefox-libstdc++6 is &lt;5.3.1+r233831-7.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577185" version="1" comment="libfreebl3 is &lt;3.29.5-47.3.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577186" version="1" comment="libfreebl3-32bit is &lt;3.29.5-47.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577187" version="1" comment="libsoftokn3 is &lt;3.29.5-47.3.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577188" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-47.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577189" version="1" comment="mozilla-nss is &lt;3.29.5-47.3.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577190" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-47.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577191" version="1" comment="mozilla-nss-tools is &lt;3.29.5-47.3.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577192" version="1" comment="MozillaFirefox is &lt;52.3.0esr-72.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577193" version="1" comment="MozillaFirefox-branding-SLED is &lt;52-24.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577194" version="1" comment="MozillaFirefox-translations is &lt;52.3.0esr-72.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577195" version="1" comment="MozillaFirefox is &lt;52.5.0esr-72.17.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577196" version="1" comment="MozillaFirefox-translations is &lt;52.5.0esr-72.17.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577197" version="1" comment="MozillaFirefox is &lt;52.6.0esr-72.20.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577198" version="1" comment="MozillaFirefox-translations is &lt;52.6.0esr-72.20.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577199" version="1" comment="MozillaFirefox is &lt;52.7.3esr-72.27.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577200" version="1" comment="MozillaFirefox-translations is &lt;52.7.3esr-72.27.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577201" version="1" comment="MozillaFirefox is &lt;52.8.0esr-72.32.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577202" version="1" comment="MozillaFirefox-translations is &lt;52.8.0esr-72.32.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577203" version="1" comment="MozillaFirefox is &lt;52.8.1esr-72.35.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577204" version="1" comment="MozillaFirefox-translations is &lt;52.8.1esr-72.35.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577205" version="1" comment="MozillaFirefox is &lt;52.9.0esr-72.38.6 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577206" version="1" comment="MozillaFirefox-translations is &lt;52.9.0esr-72.38.6 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681447" version="1" comment="MozillaFirefox is &lt;91.9.0-78.175.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681448" version="1" comment="MozillaFirefox-translations-common is &lt;91.9.0-78.175.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681449" version="1" comment="MozillaFirefox-translations-other is &lt;91.9.0-78.175.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684104" version="1" comment="MozillaFirefox is &lt;91.9.0-78.179.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684105" version="1" comment="MozillaFirefox-translations-common is &lt;91.9.0-78.179.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684106" version="1" comment="MozillaFirefox-translations-other is &lt;91.9.0-78.179.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992537" version="1" comment="MozillaFirefox is &lt;91.9.1-78.182.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992538" version="1" comment="MozillaFirefox-translations-common is &lt;91.9.1-78.182.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992539" version="1" comment="MozillaFirefox-translations-other is &lt;91.9.1-78.182.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992540" version="1" comment="MozillaFirefox is &lt;91.10.0-78.185.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992541" version="1" comment="MozillaFirefox-translations-common is &lt;91.10.0-78.185.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992542" version="1" comment="MozillaFirefox-translations-other is &lt;91.10.0-78.185.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992543" version="1" comment="MozillaFirefox is &lt;91.11.0-78.190.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992544" version="1" comment="MozillaFirefox-translations-common is &lt;91.11.0-78.190.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992545" version="1" comment="MozillaFirefox-translations-other is &lt;91.11.0-78.190.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992546" version="1" comment="MozillaFirefox is &lt;91.12.0-78.195.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992547" version="1" comment="MozillaFirefox-translations-common is &lt;91.12.0-78.195.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992548" version="1" comment="MozillaFirefox-translations-other is &lt;91.12.0-78.195.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992549" version="1" comment="MozillaFirefox is &lt;91.13.0-78.198.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992550" version="1" comment="MozillaFirefox-translations-common is &lt;91.13.0-78.198.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992551" version="1" comment="MozillaFirefox-translations-other is &lt;91.13.0-78.198.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992552" version="1" comment="MozillaFirefox is &lt;102.2.0-72.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992553" version="1" comment="MozillaFirefox-branding-SLED is &lt;102-24.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992554" version="1" comment="MozillaFirefox-translations-common is &lt;102.2.0-72.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992555" version="1" comment="MozillaFirefox-translations-other is &lt;102.2.0-72.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992556" version="1" comment="MozillaFirefox is &lt;102.3.0-72.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992557" version="1" comment="MozillaFirefox-translations-common is &lt;102.3.0-72.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992558" version="1" comment="MozillaFirefox-translations-other is &lt;102.3.0-72.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992559" version="1" comment="MozillaFirefox is &lt;102.4.0-72.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992560" version="1" comment="MozillaFirefox-translations-common is &lt;102.4.0-72.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992561" version="1" comment="MozillaFirefox-translations-other is &lt;102.4.0-72.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992562" version="1" comment="MozillaFirefox is &lt;102.5.0-72.52.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992563" version="1" comment="MozillaFirefox-translations-common is &lt;102.5.0-72.52.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992564" version="1" comment="MozillaFirefox-translations-other is &lt;102.5.0-72.52.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992565" version="1" comment="firefox-gtk3-branding-upstream is &lt;3.14.9-2.26.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992566" version="1" comment="firefox-gtk3-data is &lt;3.14.9-2.26.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992567" version="1" comment="firefox-gtk3-immodule-amharic is &lt;3.14.9-2.26.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992568" version="1" comment="firefox-gtk3-immodule-inuktitut is &lt;3.14.9-2.26.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992569" version="1" comment="firefox-gtk3-immodule-multipress is &lt;3.14.9-2.26.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992570" version="1" comment="firefox-gtk3-immodule-thai is &lt;3.14.9-2.26.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992571" version="1" comment="firefox-gtk3-immodule-vietnamese is &lt;3.14.9-2.26.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992572" version="1" comment="firefox-gtk3-immodule-xim is &lt;3.14.9-2.26.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992573" version="1" comment="firefox-gtk3-immodules-tigrigna is &lt;3.14.9-2.26.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992574" version="1" comment="firefox-gtk3-lang is &lt;3.14.9-2.26.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992575" version="1" comment="firefox-gtk3-tools is &lt;3.14.9-2.26.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992576" version="1" comment="firefox-libgtk-3-0 is &lt;3.14.9-2.26.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992577" version="1" comment="MozillaFirefox is &lt;102.6.0-72.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992578" version="1" comment="MozillaFirefox-translations-common is &lt;102.6.0-72.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992579" version="1" comment="MozillaFirefox-translations-other is &lt;102.6.0-72.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992580" version="1" comment="MozillaFirefox is &lt;102.9.0-72.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992581" version="1" comment="MozillaFirefox-translations-common is &lt;102.9.0-72.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992582" version="1" comment="MozillaFirefox-translations-other is &lt;102.9.0-72.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992583" version="1" comment="MozillaFirefox is &lt;102.11.0-72.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992584" version="1" comment="MozillaFirefox-translations-common is &lt;102.11.0-72.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992585" version="1" comment="MozillaFirefox-translations-other is &lt;102.11.0-72.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577207" version="1" comment="MozillaFirefox is &lt;24.5.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577208" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.36 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577209" version="1" comment="MozillaFirefox-translations is &lt;24.5.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577210" version="1" comment="libfreebl3 is &lt;3.16-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577211" version="1" comment="libfreebl3-32bit is &lt;3.16-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577212" version="1" comment="libfreebl3-x86 is &lt;3.16-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577213" version="1" comment="libsoftokn3 is &lt;3.16-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577214" version="1" comment="libsoftokn3-32bit is &lt;3.16-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577215" version="1" comment="libsoftokn3-x86 is &lt;3.16-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577216" version="1" comment="mozilla-nspr is &lt;4.10.4-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577217" version="1" comment="mozilla-nspr-32bit is &lt;4.10.4-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577218" version="1" comment="mozilla-nspr-x86 is &lt;4.10.4-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577219" version="1" comment="mozilla-nss is &lt;3.16-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577220" version="1" comment="mozilla-nss-32bit is &lt;3.16-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577221" version="1" comment="mozilla-nss-tools is &lt;3.16-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577222" version="1" comment="mozilla-nss-x86 is &lt;3.16-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577223" version="1" comment="MozillaFirefox is &lt;31.6.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577224" version="1" comment="MozillaFirefox-translations is &lt;31.6.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577225" version="1" comment="MozillaFirefox is &lt;31.8.0esr-0.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577226" version="1" comment="MozillaFirefox-translations is &lt;31.8.0esr-0.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577227" version="1" comment="libfreebl3 is &lt;3.19.2_CKBI_1.98-0.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577228" version="1" comment="libfreebl3-32bit is &lt;3.19.2_CKBI_1.98-0.10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577229" version="1" comment="libfreebl3-x86 is &lt;3.19.2_CKBI_1.98-0.10.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577230" version="1" comment="libsoftokn3 is &lt;3.19.2_CKBI_1.98-0.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577231" version="1" comment="libsoftokn3-32bit is &lt;3.19.2_CKBI_1.98-0.10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577232" version="1" comment="libsoftokn3-x86 is &lt;3.19.2_CKBI_1.98-0.10.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577233" version="1" comment="mozilla-nspr is &lt;4.10.8-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577234" version="1" comment="mozilla-nspr-32bit is &lt;4.10.8-0.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577235" version="1" comment="mozilla-nspr-x86 is &lt;4.10.8-0.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577236" version="1" comment="mozilla-nss is &lt;3.19.2_CKBI_1.98-0.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577237" version="1" comment="mozilla-nss-32bit is &lt;3.19.2_CKBI_1.98-0.10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577238" version="1" comment="mozilla-nss-tools is &lt;3.19.2_CKBI_1.98-0.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577239" version="1" comment="mozilla-nss-x86 is &lt;3.19.2_CKBI_1.98-0.10.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577240" version="1" comment="MozillaFirefox is &lt;38.7.0esr-37.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577241" version="1" comment="MozillaFirefox-translations is &lt;38.7.0esr-37.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577242" version="1" comment="libfreebl3 is &lt;3.20.2-28.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577243" version="1" comment="libfreebl3-32bit is &lt;3.20.2-28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577244" version="1" comment="libsoftokn3 is &lt;3.20.2-28.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577245" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577246" version="1" comment="mozilla-nspr is &lt;4.12-24.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577247" version="1" comment="mozilla-nspr-32bit is &lt;4.12-24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577248" version="1" comment="mozilla-nss is &lt;3.20.2-28.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577249" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577250" version="1" comment="mozilla-nss-tools is &lt;3.20.2-28.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992586" version="1" comment="SDL is &lt;1.2.13-106.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992587" version="1" comment="SDL-32bit is &lt;1.2.13-106.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577251" version="1" comment="a2ps is &lt;4.13-1326.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992588" version="1" comment="amanda is &lt;2.5.2.1-188.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992589" version="1" comment="amanda is &lt;2.5.2.1-188.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577252" version="1" comment="ansible is &lt;2.2.0.0-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577253" version="1" comment="ansible is &lt;2.2.0.0-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577254" version="1" comment="ansible is &lt;2.3.2.0-11.5.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577255" version="1" comment="libyaml-0-2 is &lt;0.1.3-0.10.22.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577256" version="1" comment="python-Jinja2 is &lt;2.6-2.19.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577257" version="1" comment="python-PyYAML is &lt;3.10-0.15.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577258" version="1" comment="python-ecdsa is &lt;0.10-0.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577259" version="1" comment="python-paramiko is &lt;1.13.1-0.3.2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577260" version="1" comment="python-pycrypto is &lt;2.6-0.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577261" version="1" comment="ansible is &lt;2.9.9-11.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577262" version="1" comment="python-coverage is &lt;3.6-0.11.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577263" version="1" comment="python-passlib is &lt;1.6.1-0.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577264" version="1" comment="ansible is &lt;2.9.9-11.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577265" version="1" comment="ansible is &lt;2.9.14-11.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577266" version="1" comment="ansible is &lt;2.9.22-11.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659370" version="1" comment="ansible is &lt;2.9.27-11.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564215" version="1" comment="ant is &lt;1.7.1-20.11.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564232" version="1" comment="ant-trax is &lt;1.7.1-16.11.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677827" version="1" comment="ant is &lt;1.7.1-20.11.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677828" version="1" comment="ant-trax is &lt;1.7.1-16.11.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992590" version="1" comment="apache2 is &lt;2.2.12-1.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992591" version="1" comment="apache2-doc is &lt;2.2.12-1.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992592" version="1" comment="apache2-example-pages is &lt;2.2.12-1.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992593" version="1" comment="apache2-prefork is &lt;2.2.12-1.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992594" version="1" comment="apache2-utils is &lt;2.2.12-1.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992595" version="1" comment="apache2-worker is &lt;2.2.12-1.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577267" version="1" comment="apache2 is &lt;2.2.12-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577268" version="1" comment="apache2-doc is &lt;2.2.12-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577269" version="1" comment="apache2-example-pages is &lt;2.2.12-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577270" version="1" comment="apache2-prefork is &lt;2.2.12-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577271" version="1" comment="apache2-utils is &lt;2.2.12-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577272" version="1" comment="apache2-worker is &lt;2.2.12-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577273" version="1" comment="apache2 is &lt;2.2.34-70.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577274" version="1" comment="apache2-devel is &lt;2.2.34-70.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577275" version="1" comment="apache2-doc is &lt;2.2.34-70.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577276" version="1" comment="apache2-example-pages is &lt;2.2.34-70.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577277" version="1" comment="apache2-prefork is &lt;2.2.34-70.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577278" version="1" comment="apache2-utils is &lt;2.2.34-70.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577279" version="1" comment="apache2-worker is &lt;2.2.34-70.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992596" version="1" comment="apache2 is &lt;2.2.34-70.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992597" version="1" comment="apache2-doc is &lt;2.2.34-70.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992598" version="1" comment="apache2-example-pages is &lt;2.2.34-70.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992599" version="1" comment="apache2-prefork is &lt;2.2.34-70.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992600" version="1" comment="apache2-utils is &lt;2.2.34-70.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992601" version="1" comment="apache2-worker is &lt;2.2.34-70.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992602" version="1" comment="apache2 is &lt;2.2.34-70.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992603" version="1" comment="apache2-doc is &lt;2.2.34-70.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992604" version="1" comment="apache2-example-pages is &lt;2.2.34-70.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992605" version="1" comment="apache2-prefork is &lt;2.2.34-70.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992606" version="1" comment="apache2-utils is &lt;2.2.34-70.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992607" version="1" comment="apache2-worker is &lt;2.2.34-70.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992608" version="1" comment="apache2 is &lt;2.2.34-70.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992609" version="1" comment="apache2-doc is &lt;2.2.34-70.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992610" version="1" comment="apache2-example-pages is &lt;2.2.34-70.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992611" version="1" comment="apache2-prefork is &lt;2.2.34-70.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992612" version="1" comment="apache2-utils is &lt;2.2.34-70.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992613" version="1" comment="apache2-worker is &lt;2.2.34-70.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992614" version="1" comment="apache2 is &lt;2.2.34-70.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992615" version="1" comment="apache2-doc is &lt;2.2.34-70.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992616" version="1" comment="apache2-example-pages is &lt;2.2.34-70.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992617" version="1" comment="apache2-prefork is &lt;2.2.34-70.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992618" version="1" comment="apache2-utils is &lt;2.2.34-70.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992619" version="1" comment="apache2-worker is &lt;2.2.34-70.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992620" version="1" comment="apache2-mod_nss is &lt;1.0.8-0.4.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577280" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577281" version="1" comment="php53 is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577282" version="1" comment="php53-bcmath is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577283" version="1" comment="php53-bz2 is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577284" version="1" comment="php53-calendar is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577285" version="1" comment="php53-ctype is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577286" version="1" comment="php53-curl is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577287" version="1" comment="php53-dba is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577288" version="1" comment="php53-dom is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577289" version="1" comment="php53-exif is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577290" version="1" comment="php53-fastcgi is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577291" version="1" comment="php53-fileinfo is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577292" version="1" comment="php53-ftp is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577293" version="1" comment="php53-gd is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577294" version="1" comment="php53-gettext is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577295" version="1" comment="php53-gmp is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577296" version="1" comment="php53-iconv is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577297" version="1" comment="php53-intl is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577298" version="1" comment="php53-json is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577299" version="1" comment="php53-ldap is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577300" version="1" comment="php53-mbstring is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577301" version="1" comment="php53-mcrypt is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577302" version="1" comment="php53-mysql is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577303" version="1" comment="php53-odbc is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577304" version="1" comment="php53-openssl is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577305" version="1" comment="php53-pcntl is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577306" version="1" comment="php53-pdo is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577307" version="1" comment="php53-pear is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577308" version="1" comment="php53-pgsql is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577309" version="1" comment="php53-pspell is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577310" version="1" comment="php53-shmop is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577311" version="1" comment="php53-snmp is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577312" version="1" comment="php53-soap is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577313" version="1" comment="php53-suhosin is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577314" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577315" version="1" comment="php53-sysvsem is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577316" version="1" comment="php53-sysvshm is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577317" version="1" comment="php53-tokenizer is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577318" version="1" comment="php53-wddx is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577319" version="1" comment="php53-xmlreader is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577320" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577321" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577322" version="1" comment="php53-xsl is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577323" version="1" comment="php53-zip is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577324" version="1" comment="php53-zlib is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577325" version="1" comment="apache2-mod_security2 is &lt;2.7.1-0.2.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992621" version="1" comment="apache2-mod_security2 is &lt;2.7.1-0.2.18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577326" version="1" comment="atftp is &lt;0.7.0-135.23.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633874" version="1" comment="atftp is &lt;0.7.0-135.23.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667671" version="1" comment="atftp is &lt;0.7.0-135.23.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577327" version="1" comment="augeas is &lt;0.9.0-3.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577328" version="1" comment="augeas-lenses is &lt;0.9.0-3.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577329" version="1" comment="libaugeas0 is &lt;0.9.0-3.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577330" version="1" comment="augeas is &lt;0.9.0-3.17.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577331" version="1" comment="augeas-lenses is &lt;0.9.0-3.17.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577332" version="1" comment="libaugeas0 is &lt;0.9.0-3.17.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577333" version="1" comment="augeas is &lt;0.9.0-3.21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577334" version="1" comment="augeas-lenses is &lt;0.9.0-3.21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577335" version="1" comment="libaugeas0 is &lt;0.9.0-3.21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577336" version="1" comment="avahi is &lt;0.6.23-35.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577337" version="1" comment="avahi-lang is &lt;0.6.23-35.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577338" version="1" comment="avahi-utils is &lt;0.6.23-35.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577339" version="1" comment="libavahi-client3 is &lt;0.6.23-35.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577340" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-35.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577341" version="1" comment="libavahi-common3 is &lt;0.6.23-35.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577342" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-35.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577343" version="1" comment="libavahi-core5 is &lt;0.6.23-35.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577344" version="1" comment="libavahi-glib1 is &lt;0.6.23-35.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577345" version="1" comment="libavahi-glib1-32bit is &lt;0.6.23-35.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577346" version="1" comment="libdns_sd is &lt;0.6.23-35.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577347" version="1" comment="libdns_sd-32bit is &lt;0.6.23-35.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577348" version="1" comment="avahi is &lt;0.6.23-35.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577349" version="1" comment="avahi-lang is &lt;0.6.23-35.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577350" version="1" comment="avahi-utils is &lt;0.6.23-35.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577351" version="1" comment="libavahi-client3 is &lt;0.6.23-35.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577352" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-35.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577353" version="1" comment="libavahi-common3 is &lt;0.6.23-35.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577354" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-35.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577355" version="1" comment="libavahi-core5 is &lt;0.6.23-35.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577356" version="1" comment="libavahi-glib1 is &lt;0.6.23-35.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577357" version="1" comment="libavahi-glib1-32bit is &lt;0.6.23-35.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577358" version="1" comment="libdns_sd is &lt;0.6.23-35.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577359" version="1" comment="libdns_sd-32bit is &lt;0.6.23-35.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577360" version="1" comment="avahi is &lt;0.6.23-35.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577361" version="1" comment="avahi-lang is &lt;0.6.23-35.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577362" version="1" comment="avahi-utils is &lt;0.6.23-35.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577363" version="1" comment="libavahi-client3 is &lt;0.6.23-35.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577364" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-35.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577365" version="1" comment="libavahi-common3 is &lt;0.6.23-35.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577366" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-35.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577367" version="1" comment="libavahi-core5 is &lt;0.6.23-35.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577368" version="1" comment="libavahi-glib1 is &lt;0.6.23-35.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577369" version="1" comment="libavahi-glib1-32bit is &lt;0.6.23-35.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577370" version="1" comment="libdns_sd is &lt;0.6.23-35.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577371" version="1" comment="libdns_sd-32bit is &lt;0.6.23-35.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577372" version="1" comment="avahi is &lt;0.6.23-35.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577373" version="1" comment="avahi-lang is &lt;0.6.23-35.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577374" version="1" comment="avahi-utils is &lt;0.6.23-35.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577375" version="1" comment="libavahi-client3 is &lt;0.6.23-35.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577376" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-35.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577377" version="1" comment="libavahi-common3 is &lt;0.6.23-35.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577378" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-35.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577379" version="1" comment="libavahi-core5 is &lt;0.6.23-35.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577380" version="1" comment="libavahi-glib1 is &lt;0.6.23-35.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577381" version="1" comment="libavahi-glib1-32bit is &lt;0.6.23-35.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577382" version="1" comment="libdns_sd is &lt;0.6.23-35.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577383" version="1" comment="libdns_sd-32bit is &lt;0.6.23-35.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992622" version="1" comment="avahi is &lt;0.6.23-35.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992623" version="1" comment="avahi-lang is &lt;0.6.23-35.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992624" version="1" comment="avahi-utils is &lt;0.6.23-35.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992625" version="1" comment="libavahi-client3 is &lt;0.6.23-35.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992626" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-35.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992627" version="1" comment="libavahi-common3 is &lt;0.6.23-35.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992628" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-35.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992629" version="1" comment="libavahi-core5 is &lt;0.6.23-35.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992630" version="1" comment="libavahi-glib1 is &lt;0.6.23-35.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992631" version="1" comment="libavahi-glib1-32bit is &lt;0.6.23-35.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992632" version="1" comment="libdns_sd is &lt;0.6.23-35.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992633" version="1" comment="libdns_sd-32bit is &lt;0.6.23-35.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577384" version="1" comment="axis is &lt;1.4-236.236.44.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577385" version="1" comment="axis is &lt;1.4-236.236.44.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577386" version="1" comment="bash is &lt;3.2-147.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577387" version="1" comment="bash-doc is &lt;3.2-147.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577388" version="1" comment="bash-x86 is &lt;3.2-147.22.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577389" version="1" comment="libreadline5 is &lt;5.2-147.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577390" version="1" comment="libreadline5-32bit is &lt;5.2-147.22.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577391" version="1" comment="libreadline5-x86 is &lt;5.2-147.22.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577392" version="1" comment="readline-doc is &lt;5.2-147.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577393" version="1" comment="bash is &lt;3.2-147.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577394" version="1" comment="bash-doc is &lt;3.2-147.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577395" version="1" comment="libreadline5 is &lt;5.2-147.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577396" version="1" comment="libreadline5-32bit is &lt;5.2-147.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577397" version="1" comment="readline-doc is &lt;5.2-147.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577398" version="1" comment="bash is &lt;3.2-147.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577399" version="1" comment="bash-doc is &lt;3.2-147.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577400" version="1" comment="libreadline5 is &lt;5.2-147.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577401" version="1" comment="libreadline5-32bit is &lt;5.2-147.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577402" version="1" comment="readline-doc is &lt;5.2-147.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992634" version="1" comment="bcel is &lt;5.1-276.26.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577403" version="1" comment="bind is &lt;9.9.6P1-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577404" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577405" version="1" comment="bind-doc is &lt;9.9.6P1-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577406" version="1" comment="bind-libs is &lt;9.9.6P1-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577407" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577408" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577409" version="1" comment="bind-utils is &lt;9.9.6P1-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577410" version="1" comment="bind is &lt;9.9.6P1-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577411" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577412" version="1" comment="bind-doc is &lt;9.9.6P1-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577413" version="1" comment="bind-libs is &lt;9.9.6P1-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577414" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577415" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577416" version="1" comment="bind-utils is &lt;9.9.6P1-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577417" version="1" comment="bind is &lt;9.9.6P1-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577418" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577419" version="1" comment="bind-doc is &lt;9.9.6P1-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577420" version="1" comment="bind-libs is &lt;9.9.6P1-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577421" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577422" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.19.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577423" version="1" comment="bind-utils is &lt;9.9.6P1-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577424" version="1" comment="bind is &lt;9.9.6P1-0.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577425" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577426" version="1" comment="bind-doc is &lt;9.9.6P1-0.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577427" version="1" comment="bind-libs is &lt;9.9.6P1-0.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577428" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.22.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577429" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.22.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577430" version="1" comment="bind-utils is &lt;9.9.6P1-0.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577431" version="1" comment="bind is &lt;9.9.6P1-0.39.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577432" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.39.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577433" version="1" comment="bind-doc is &lt;9.9.6P1-0.39.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577434" version="1" comment="bind-libs is &lt;9.9.6P1-0.39.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577435" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577436" version="1" comment="bind-utils is &lt;9.9.6P1-0.39.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577437" version="1" comment="bind is &lt;9.9.6P1-0.44.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577438" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.44.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577439" version="1" comment="bind-devel is &lt;9.9.6P1-0.44.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577440" version="1" comment="bind-doc is &lt;9.9.6P1-0.44.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577441" version="1" comment="bind-libs is &lt;9.9.6P1-0.44.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577442" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.44.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577443" version="1" comment="bind-utils is &lt;9.9.6P1-0.44.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577444" version="1" comment="bind is &lt;9.9.6P1-0.47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577445" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577446" version="1" comment="bind-devel is &lt;9.9.6P1-0.47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577447" version="1" comment="bind-doc is &lt;9.9.6P1-0.47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577448" version="1" comment="bind-libs is &lt;9.9.6P1-0.47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577449" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577450" version="1" comment="bind-utils is &lt;9.9.6P1-0.47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577451" version="1" comment="bind is &lt;9.9.6P1-0.50.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577452" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.50.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577453" version="1" comment="bind-devel is &lt;9.9.6P1-0.50.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577454" version="1" comment="bind-doc is &lt;9.9.6P1-0.50.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577455" version="1" comment="bind-libs is &lt;9.9.6P1-0.50.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577456" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577457" version="1" comment="bind-utils is &lt;9.9.6P1-0.50.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577458" version="1" comment="bind is &lt;9.9.6P1-0.51.7.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577459" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.7.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577460" version="1" comment="bind-devel is &lt;9.9.6P1-0.51.7.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577461" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.7.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577462" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.7.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577463" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.51.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577464" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.7.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577465" version="1" comment="bind is &lt;9.9.6P1-0.51.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577466" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577467" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577468" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577469" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.51.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577470" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577471" version="1" comment="bind is &lt;9.9.6P1-0.51.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577472" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577473" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577474" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577475" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.51.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577476" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577477" version="1" comment="bind is &lt;9.9.6P1-0.51.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577478" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577479" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577480" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577481" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.51.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577482" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577483" version="1" comment="bind is &lt;9.9.6P1-0.51.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577484" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577485" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577486" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577487" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.51.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577488" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654155" version="1" comment="bind is &lt;9.9.6P1-0.51.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654156" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654157" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654158" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654159" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.51.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654160" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683753" version="1" comment="bind is &lt;9.9.6P1-0.51.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683754" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683755" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683756" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683757" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.51.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683758" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992635" version="1" comment="bind is &lt;9.9.6P1-0.51.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992636" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992637" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992638" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992639" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.51.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992640" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577489" version="1" comment="binutils is &lt;2.23.1-0.23.15 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577490" version="1" comment="bluez is &lt;4.99-0.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577491" version="1" comment="libbluetooth3 is &lt;4.99-0.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992641" version="1" comment="bluez is &lt;4.99-0.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992642" version="1" comment="libbluetooth3 is &lt;4.99-0.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992643" version="1" comment="bluez is &lt;4.99-0.9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992644" version="1" comment="libbluetooth3 is &lt;4.99-0.9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992645" version="1" comment="bluez is &lt;4.99-0.9.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992646" version="1" comment="libbluetooth3 is &lt;4.99-0.9.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992647" version="1" comment="bluez is &lt;4.99-0.9.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992648" version="1" comment="libbluetooth3 is &lt;4.99-0.9.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992649" version="1" comment="mono-core is &lt;2.6.7-0.11.2 for i586,ia64,ppc,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992650" version="1" comment="mono-data is &lt;2.6.7-0.11.2 for i586,ia64,ppc,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992651" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.11.2 for i586,ia64,ppc,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992652" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.11.2 for i586,ia64,ppc,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992653" version="1" comment="mono-locale-extras is &lt;2.6.7-0.11.2 for i586,ia64,ppc,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992654" version="1" comment="mono-nunit is &lt;2.6.7-0.11.2 for i586,ia64,ppc,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992655" version="1" comment="mono-web is &lt;2.6.7-0.11.2 for i586,ia64,ppc,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992656" version="1" comment="mono-winforms is &lt;2.6.7-0.11.2 for i586,ia64,ppc,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577492" version="1" comment="bzip2 is &lt;1.0.6-257.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577493" version="1" comment="bzip2-doc is &lt;1.0.6-257.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577494" version="1" comment="libbz2-1 is &lt;1.0.6-257.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577495" version="1" comment="libbz2-1-32bit is &lt;1.0.6-257.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577496" version="1" comment="libbz2-devel is &lt;1.0.6-257.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577497" version="1" comment="bzip2 is &lt;1.0.6-257.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577498" version="1" comment="bzip2-doc is &lt;1.0.6-257.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577499" version="1" comment="libbz2-1 is &lt;1.0.6-257.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577500" version="1" comment="libbz2-1-32bit is &lt;1.0.6-257.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577501" version="1" comment="libbz2-devel is &lt;1.0.6-257.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992657" version="1" comment="ldapsmb is &lt;1.34b-12.54.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992658" version="1" comment="libldb1 is &lt;3.6.3-0.54.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992659" version="1" comment="libsmbclient0 is &lt;3.6.3-0.54.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590399" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.54.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590400" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.54.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992660" version="1" comment="libtalloc2 is &lt;3.6.3-0.54.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590402" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.54.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590403" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.54.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992661" version="1" comment="libtdb1 is &lt;3.6.3-0.54.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590405" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.54.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590406" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.54.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992662" version="1" comment="libtevent0 is &lt;3.6.3-0.54.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590408" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.54.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992663" version="1" comment="libwbclient0 is &lt;3.6.3-0.54.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590410" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.54.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590411" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.54.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992664" version="1" comment="samba is &lt;3.6.3-0.54.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590413" version="1" comment="samba-32bit is &lt;3.6.3-0.54.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992665" version="1" comment="samba-client is &lt;3.6.3-0.54.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590415" version="1" comment="samba-client-32bit is &lt;3.6.3-0.54.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590416" version="1" comment="samba-client-x86 is &lt;3.6.3-0.54.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992666" version="1" comment="samba-doc is &lt;3.6.3-0.54.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992667" version="1" comment="samba-krb-printing is &lt;3.6.3-0.54.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992668" version="1" comment="samba-winbind is &lt;3.6.3-0.54.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590419" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.54.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590420" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.54.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590421" version="1" comment="samba-x86 is &lt;3.6.3-0.54.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577502" version="1" comment="cifs-utils is &lt;5.1-0.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681249" version="1" comment="cifs-utils is &lt;5.1-0.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992669" version="1" comment="cifs-utils is &lt;5.1-0.14.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992670" version="1" comment="clamav is &lt;0.98.3-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577503" version="1" comment="clamav is &lt;0.99.2-0.19.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577504" version="1" comment="clamav is &lt;0.99.3-0.20.3.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577505" version="1" comment="clamav is &lt;0.99.4-0.20.7.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577506" version="1" comment="clamav is &lt;0.100.1-0.20.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577507" version="1" comment="clamav is &lt;0.100.2-0.20.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682693" version="1" comment="clamav is &lt;0.103.6-0.20.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682694" version="1" comment="clamav-openssl1 is &lt;0.103.6-0.20.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992671" version="1" comment="clamav is &lt;0.103.7-0.20.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992672" version="1" comment="clamav-openssl1 is &lt;0.103.7-0.20.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992673" version="1" comment="clamav is &lt;0.103.8-0.20.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992674" version="1" comment="clamav-openssl1 is &lt;0.103.8-0.20.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577508" version="1" comment="rhnlib is &lt;2.5.69.8-11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577509" version="1" comment="suseRegisterInfo is &lt;2.1.12-14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577510" version="1" comment="cloud-init is &lt;19.4-3.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577511" version="1" comment="cloud-init-config-suse is &lt;19.4-3.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577512" version="1" comment="cloud-init-doc is &lt;19.4-3.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992675" version="1" comment="cloud-init is &lt;19.4-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992676" version="1" comment="cloud-init-config-suse is &lt;19.4-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992677" version="1" comment="cloud-init-doc is &lt;19.4-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592443" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.28.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592444" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.28.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592445" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.28.5 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592446" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.26-0.28.5 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592447" version="1" comment="openldap2 is &lt;2.4.26-0.28.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592448" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.28.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592449" version="1" comment="openldap2-client is &lt;2.4.26-0.28.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992678" version="1" comment="coreutils is &lt;8.12-6.25.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992679" version="1" comment="coreutils-lang is &lt;8.12-6.25.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590678" version="1" comment="coreutils-x86 is &lt;8.12-6.25.31.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577513" version="1" comment="coreutils is &lt;8.12-6.25.33.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577514" version="1" comment="coreutils-lang is &lt;8.12-6.25.33.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577515" version="1" comment="coreutils is &lt;8.12-6.25.33.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577516" version="1" comment="coreutils-lang is &lt;8.12-6.25.33.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577517" version="1" comment="cpio is &lt;2.9-75.78.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577518" version="1" comment="cpio-lang is &lt;2.9-75.78.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992680" version="1" comment="ctags is &lt;2013.10.2-0.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577519" version="1" comment="cups is &lt;1.3.9-8.46.52.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577520" version="1" comment="cups-client is &lt;1.3.9-8.46.52.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577521" version="1" comment="cups-libs is &lt;1.3.9-8.46.52.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577522" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.52.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577523" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.46.52.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577524" version="1" comment="curl is &lt;7.19.7-1.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577525" version="1" comment="libcurl4 is &lt;7.19.7-1.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577526" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.38.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577527" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.38.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577528" version="1" comment="curl is &lt;7.19.7-1.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577529" version="1" comment="libcurl4 is &lt;7.19.7-1.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577530" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.46.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577531" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.46.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577532" version="1" comment="curl is &lt;7.19.7-1.61.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577533" version="1" comment="libcurl4 is &lt;7.19.7-1.61.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577534" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577535" version="1" comment="curl is &lt;7.37.0-70.27.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577536" version="1" comment="libcurl4 is &lt;7.37.0-70.27.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577537" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577538" version="1" comment="libcurl-devel is &lt;7.37.0-70.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577539" version="1" comment="libcurl-devel is &lt;7.37.0-70.41.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577540" version="1" comment="libcurl-devel is &lt;7.37.0-70.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577541" version="1" comment="libcurl-devel is &lt;7.37.0-70.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577542" version="1" comment="libcurl-devel is &lt;7.37.0-70.52.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577543" version="1" comment="libcurl-devel is &lt;7.37.0-70.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577544" version="1" comment="libcurl-devel is &lt;7.37.0-70.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577545" version="1" comment="libcurl-devel is &lt;7.37.0-70.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577546" version="1" comment="libcurl-devel is &lt;7.37.0-70.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626175" version="1" comment="libcurl-devel is &lt;7.37.0-70.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633956" version="1" comment="libcurl-devel is &lt;7.37.0-70.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682695" version="1" comment="curl is &lt;7.37.0-70.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682696" version="1" comment="curl-openssl1 is &lt;7.37.0-70.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682697" version="1" comment="libcurl-devel is &lt;7.37.0-70.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682698" version="1" comment="libcurl4 is &lt;7.37.0-70.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682699" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682700" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682701" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992681" version="1" comment="curl is &lt;7.37.0-70.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992682" version="1" comment="curl-openssl1 is &lt;7.37.0-70.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992683" version="1" comment="libcurl-devel is &lt;7.37.0-70.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992684" version="1" comment="libcurl4 is &lt;7.37.0-70.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992685" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992686" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992687" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992688" version="1" comment="curl is &lt;7.37.0-70.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992689" version="1" comment="curl-openssl1 is &lt;7.37.0-70.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992690" version="1" comment="libcurl-devel is &lt;7.37.0-70.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992691" version="1" comment="libcurl4 is &lt;7.37.0-70.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992692" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992693" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992694" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992695" version="1" comment="curl is &lt;7.37.0-70.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992696" version="1" comment="curl-openssl1 is &lt;7.37.0-70.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992697" version="1" comment="libcurl-devel is &lt;7.37.0-70.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992698" version="1" comment="libcurl4 is &lt;7.37.0-70.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992699" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992700" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992701" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992702" version="1" comment="curl is &lt;7.37.0-70.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992703" version="1" comment="curl-openssl1 is &lt;7.37.0-70.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992704" version="1" comment="libcurl-devel is &lt;7.37.0-70.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992705" version="1" comment="libcurl4 is &lt;7.37.0-70.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992706" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992707" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992708" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992709" version="1" comment="curl is &lt;7.37.0-70.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992710" version="1" comment="curl-openssl1 is &lt;7.37.0-70.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992711" version="1" comment="libcurl-devel is &lt;7.37.0-70.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992712" version="1" comment="libcurl4 is &lt;7.37.0-70.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992713" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992714" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992715" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992716" version="1" comment="curl is &lt;7.37.0-70.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992717" version="1" comment="curl-openssl1 is &lt;7.37.0-70.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992718" version="1" comment="libcurl-devel is &lt;7.37.0-70.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992719" version="1" comment="libcurl4 is &lt;7.37.0-70.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992720" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992721" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992722" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992723" version="1" comment="curl is &lt;7.37.0-70.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992724" version="1" comment="curl-openssl1 is &lt;7.37.0-70.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992725" version="1" comment="libcurl-devel is &lt;7.37.0-70.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992726" version="1" comment="libcurl4 is &lt;7.37.0-70.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992727" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992728" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992729" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577547" version="1" comment="curl is &lt;7.19.7-1.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577548" version="1" comment="libcurl4 is &lt;7.19.7-1.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577549" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577550" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.40.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577551" version="1" comment="cyrus-sasl is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577552" version="1" comment="cyrus-sasl-32bit is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577553" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577554" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577555" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577556" version="1" comment="cyrus-sasl-digestmd5-32bit is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577557" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577558" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577559" version="1" comment="cyrus-sasl-otp is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577560" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577561" version="1" comment="cyrus-sasl-plain is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577562" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577563" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577564" version="1" comment="cyrus-sasl-sqlauxprop is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577565" version="1" comment="cyrus-sasl-sqlauxprop-32bit is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669486" version="1" comment="cyrus-sasl is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669487" version="1" comment="cyrus-sasl-32bit is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669488" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669489" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669490" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669491" version="1" comment="cyrus-sasl-digestmd5-32bit is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669492" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669493" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669494" version="1" comment="cyrus-sasl-otp is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669495" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669496" version="1" comment="cyrus-sasl-plain is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669497" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669498" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669499" version="1" comment="cyrus-sasl-sqlauxprop is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669500" version="1" comment="cyrus-sasl-sqlauxprop-32bit is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577566" version="1" comment="dbus-1 is &lt;1.2.10-3.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577567" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577568" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577569" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.31.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992730" version="1" comment="dbus-1 is &lt;1.2.10-3.34.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992731" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.34.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992732" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.34.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577570" version="1" comment="dhcp is &lt;4.2.4.P2-0.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577571" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577572" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577573" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577574" version="1" comment="dhcp is &lt;4.2.4.P2-0.27.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577575" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.27.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577576" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.27.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577577" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.27.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577578" version="1" comment="dhcp is &lt;4.2.4.P2-0.28.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577579" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.28.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577580" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.28.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577581" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.28.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577582" version="1" comment="dhcp is &lt;4.2.4.P2-0.28.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577583" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.28.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577584" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.28.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577585" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.28.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577586" version="1" comment="dhcp is &lt;4.2.4.P2-0.28.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577587" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.28.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577588" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.28.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577589" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.28.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992733" version="1" comment="dhcp is &lt;4.2.4.P2-0.28.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992734" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.28.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992735" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.28.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992736" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.28.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577590" version="1" comment="dhcpcd is &lt;3.2.3-45.5.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992737" version="1" comment="dnsmasq is &lt;2.71-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577591" version="1" comment="dnsmasq is &lt;2.71-0.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577592" version="1" comment="dnsmasq is &lt;2.78-0.16.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577593" version="1" comment="dnsmasq is &lt;2.78-0.16.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577594" version="1" comment="dnsmasq is &lt;2.78-0.16.11.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577595" version="1" comment="dnsmasq is &lt;2.78-0.16.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679569" version="1" comment="dnsmasq is &lt;2.78-0.16.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992738" version="1" comment="dnsmasq is &lt;2.78-0.16.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577596" version="1" comment="dosfstools is &lt;2.11-121.31.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577597" version="1" comment="e2fsprogs is &lt;1.41.9-2.10.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577598" version="1" comment="libblkid1 is &lt;2.19.1-6.62.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577599" version="1" comment="libblkid1-32bit is &lt;2.19.1-6.62.7 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577600" version="1" comment="libblkid1-x86 is &lt;2.19.1-6.62.7 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577601" version="1" comment="libcom_err2 is &lt;1.41.9-2.10.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577602" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.10.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577603" version="1" comment="libcom_err2-x86 is &lt;1.41.9-2.10.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577604" version="1" comment="libext2fs2 is &lt;1.41.9-2.10.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577605" version="1" comment="libuuid1 is &lt;2.19.1-6.62.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577606" version="1" comment="libuuid1-32bit is &lt;2.19.1-6.62.7 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577607" version="1" comment="libuuid1-x86 is &lt;2.19.1-6.62.7 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577608" version="1" comment="uuid-runtime is &lt;2.19.1-6.62.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577609" version="1" comment="e2fsprogs is &lt;1.41.9-2.11.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577610" version="1" comment="libcom_err2 is &lt;1.41.9-2.11.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577611" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.11.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577612" version="1" comment="libext2fs2 is &lt;1.41.9-2.11.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577613" version="1" comment="ecryptfs-utils is &lt;61-1.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577614" version="1" comment="ecryptfs-utils-32bit is &lt;61-1.35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577615" version="1" comment="ecryptfs-utils-x86 is &lt;61-1.35.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577616" version="1" comment="elfutils is &lt;0.152-4.9.17 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577617" version="1" comment="libasm1 is &lt;0.152-4.9.17 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577618" version="1" comment="libasm1-32bit is &lt;0.152-4.9.17 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577619" version="1" comment="libdw1 is &lt;0.152-4.9.17 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577620" version="1" comment="libdw1-32bit is &lt;0.152-4.9.17 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577621" version="1" comment="libdw1-x86 is &lt;0.152-4.9.17 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577622" version="1" comment="libebl1 is &lt;0.152-4.9.17 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577623" version="1" comment="libebl1-32bit is &lt;0.152-4.9.17 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577624" version="1" comment="libebl1-x86 is &lt;0.152-4.9.17 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577625" version="1" comment="libelf1 is &lt;0.152-4.9.17 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577626" version="1" comment="libelf1-32bit is &lt;0.152-4.9.17 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577627" version="1" comment="libelf1-x86 is &lt;0.152-4.9.17 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577628" version="1" comment="elfutils is &lt;0.152-4.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577629" version="1" comment="libasm1 is &lt;0.152-4.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577630" version="1" comment="libasm1-32bit is &lt;0.152-4.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577631" version="1" comment="libdw1 is &lt;0.152-4.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577632" version="1" comment="libdw1-32bit is &lt;0.152-4.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577633" version="1" comment="libebl1 is &lt;0.152-4.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577634" version="1" comment="libebl1-32bit is &lt;0.152-4.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577635" version="1" comment="libelf1 is &lt;0.152-4.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577636" version="1" comment="libelf1-32bit is &lt;0.152-4.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577637" version="1" comment="emacs is &lt;22.3-4.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577638" version="1" comment="emacs-el is &lt;22.3-4.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577639" version="1" comment="emacs-info is &lt;22.3-4.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577640" version="1" comment="emacs-nox is &lt;22.3-4.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577641" version="1" comment="emacs-x11 is &lt;22.3-4.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577642" version="1" comment="emacs is &lt;22.3-42.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577643" version="1" comment="emacs-el is &lt;22.3-42.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577644" version="1" comment="emacs-info is &lt;22.3-42.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577645" version="1" comment="emacs-nox is &lt;22.3-42.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577646" version="1" comment="emacs-x11 is &lt;22.3-42.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992739" version="1" comment="emacs is &lt;22.3-42.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992740" version="1" comment="emacs-el is &lt;22.3-42.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992741" version="1" comment="emacs-info is &lt;22.3-42.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992742" version="1" comment="emacs-nox is &lt;22.3-42.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992743" version="1" comment="emacs-x11 is &lt;22.3-42.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992744" version="1" comment="emacs is &lt;22.3-42.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992745" version="1" comment="emacs-el is &lt;22.3-42.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992746" version="1" comment="emacs-info is &lt;22.3-42.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992747" version="1" comment="emacs-nox is &lt;22.3-42.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992748" version="1" comment="emacs-x11 is &lt;22.3-42.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577647" version="1" comment="evolution-data-server is &lt;2.28.2-0.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577648" version="1" comment="evolution-data-server-32bit is &lt;2.28.2-0.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577649" version="1" comment="evolution-data-server-lang is &lt;2.28.2-0.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577650" version="1" comment="evolution-data-server-x86 is &lt;2.28.2-0.32.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577651" version="1" comment="evolution-data-server is &lt;2.28.2-0.32.3.109 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577652" version="1" comment="evolution-data-server-32bit is &lt;2.28.2-0.32.3.109 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577653" version="1" comment="evolution-data-server-lang is &lt;2.28.2-0.32.3.109 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992749" version="1" comment="libexiv2-4 is &lt;0.17.1-33.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992750" version="1" comment="libexiv2-4 is &lt;0.17.1-33.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992751" version="1" comment="libexiv2-4 is &lt;0.17.1-33.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992752" version="1" comment="expat is &lt;2.0.1-88.42.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992753" version="1" comment="libexpat1 is &lt;2.0.1-88.42.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992754" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992755" version="1" comment="expat is &lt;2.0.1-88.42.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992756" version="1" comment="libexpat1 is &lt;2.0.1-88.42.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992757" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577654" version="1" comment="file is &lt;4.24-43.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577655" version="1" comment="file-32bit is &lt;4.24-43.27.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577656" version="1" comment="file-x86 is &lt;4.24-43.27.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577657" version="1" comment="file-roller is &lt;2.28.2-0.10.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577658" version="1" comment="file-roller-lang is &lt;2.28.2-0.10.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577659" version="1" comment="MozillaFirefox is &lt;17.0.7esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577660" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577661" version="1" comment="MozillaFirefox-translations is &lt;17.0.7esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577662" version="1" comment="MozillaFirefox is &lt;17.0.10esr-0.7.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577663" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.12.41 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577664" version="1" comment="MozillaFirefox-translations is &lt;17.0.10esr-0.7.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577665" version="1" comment="MozillaFirefox is &lt;24.3.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577666" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.14 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577667" version="1" comment="MozillaFirefox-translations is &lt;24.3.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577668" version="1" comment="libfreebl3 is &lt;3.15.4-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577669" version="1" comment="libfreebl3-32bit is &lt;3.15.4-0.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577670" version="1" comment="libfreebl3-x86 is &lt;3.15.4-0.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577671" version="1" comment="libsoftokn3 is &lt;3.15.4-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577672" version="1" comment="libsoftokn3-32bit is &lt;3.15.4-0.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577673" version="1" comment="libsoftokn3-x86 is &lt;3.15.4-0.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577674" version="1" comment="mozilla-nss is &lt;3.15.4-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577675" version="1" comment="mozilla-nss-32bit is &lt;3.15.4-0.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577676" version="1" comment="mozilla-nss-tools is &lt;3.15.4-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577677" version="1" comment="mozilla-nss-x86 is &lt;3.15.4-0.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577678" version="1" comment="MozillaFirefox is &lt;24.4.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577679" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.23 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577680" version="1" comment="MozillaFirefox-translations is &lt;24.4.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577681" version="1" comment="MozillaFirefox is &lt;24.7.0esr-0.8.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577682" version="1" comment="MozillaFirefox-translations is &lt;24.7.0esr-0.8.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577683" version="1" comment="libfreebl3 is &lt;3.16.2-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577684" version="1" comment="libfreebl3-32bit is &lt;3.16.2-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577685" version="1" comment="libfreebl3-x86 is &lt;3.16.2-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577686" version="1" comment="libsoftokn3 is &lt;3.16.2-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577687" version="1" comment="libsoftokn3-32bit is &lt;3.16.2-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577688" version="1" comment="libsoftokn3-x86 is &lt;3.16.2-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577689" version="1" comment="mozilla-nss is &lt;3.16.2-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577690" version="1" comment="mozilla-nss-32bit is &lt;3.16.2-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577691" version="1" comment="mozilla-nss-tools is &lt;3.16.2-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577692" version="1" comment="mozilla-nss-x86 is &lt;3.16.2-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577693" version="1" comment="MozillaFirefox is &lt;24.8.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577694" version="1" comment="MozillaFirefox-translations is &lt;24.8.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577695" version="1" comment="libfreebl3 is &lt;3.16.4-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577696" version="1" comment="libfreebl3-32bit is &lt;3.16.4-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577697" version="1" comment="libfreebl3-x86 is &lt;3.16.4-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577698" version="1" comment="libsoftokn3 is &lt;3.16.4-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577699" version="1" comment="libsoftokn3-32bit is &lt;3.16.4-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577700" version="1" comment="libsoftokn3-x86 is &lt;3.16.4-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577701" version="1" comment="mozilla-nspr is &lt;4.10.7-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577702" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577703" version="1" comment="mozilla-nspr-x86 is &lt;4.10.7-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577704" version="1" comment="mozilla-nss is &lt;3.16.4-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577705" version="1" comment="mozilla-nss-32bit is &lt;3.16.4-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577706" version="1" comment="mozilla-nss-tools is &lt;3.16.4-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577707" version="1" comment="mozilla-nss-x86 is &lt;3.16.4-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577708" version="1" comment="MozillaFirefox is &lt;31.3.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577709" version="1" comment="MozillaFirefox-translations is &lt;31.3.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577710" version="1" comment="MozillaFirefox is &lt;31.4.0esr-0.8.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577711" version="1" comment="MozillaFirefox-translations is &lt;31.4.0esr-0.8.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577712" version="1" comment="libfreebl3 is &lt;3.17.3-0.8.11 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577713" version="1" comment="libfreebl3-32bit is &lt;3.17.3-0.8.11 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577714" version="1" comment="libfreebl3-x86 is &lt;3.17.3-0.8.11 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577715" version="1" comment="libsoftokn3 is &lt;3.17.3-0.8.11 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577716" version="1" comment="libsoftokn3-32bit is &lt;3.17.3-0.8.11 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577717" version="1" comment="libsoftokn3-x86 is &lt;3.17.3-0.8.11 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577718" version="1" comment="mozilla-nss is &lt;3.17.3-0.8.11 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577719" version="1" comment="mozilla-nss-32bit is &lt;3.17.3-0.8.11 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577720" version="1" comment="mozilla-nss-tools is &lt;3.17.3-0.8.11 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577721" version="1" comment="mozilla-nss-x86 is &lt;3.17.3-0.8.11 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577722" version="1" comment="MozillaFirefox is &lt;31.5.3esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577723" version="1" comment="MozillaFirefox-translations is &lt;31.5.3esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577724" version="1" comment="MozillaFirefox is &lt;31.7.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577725" version="1" comment="MozillaFirefox-translations is &lt;31.7.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577726" version="1" comment="mozilla-nspr is &lt;4.10.9-11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577727" version="1" comment="mozilla-nspr-32bit is &lt;4.10.9-11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577728" version="1" comment="mozilla-nspr-x86 is &lt;4.10.9-11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577729" version="1" comment="MozillaFirefox is &lt;38.3.0esr-22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577730" version="1" comment="MozillaFirefox-translations is &lt;38.3.0esr-22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577731" version="1" comment="MozillaFirefox is &lt;38.4.0esr-25.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577732" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-15.31 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577734" version="1" comment="MozillaFirefox-translations is &lt;38.4.0esr-25.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577735" version="1" comment="libfreebl3 is &lt;3.19.2.1-19.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577736" version="1" comment="libfreebl3-32bit is &lt;3.19.2.1-19.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577737" version="1" comment="libfreebl3-x86 is &lt;3.19.2.1-19.3 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577738" version="1" comment="libsoftokn3 is &lt;3.19.2.1-19.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577739" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.1-19.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577740" version="1" comment="libsoftokn3-x86 is &lt;3.19.2.1-19.3 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577741" version="1" comment="mozilla-nspr is &lt;4.10.10-16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577742" version="1" comment="mozilla-nspr-32bit is &lt;4.10.10-16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577743" version="1" comment="mozilla-nspr-x86 is &lt;4.10.10-16.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577744" version="1" comment="mozilla-nss is &lt;3.19.2.1-19.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577745" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.1-19.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577746" version="1" comment="mozilla-nss-tools is &lt;3.19.2.1-19.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577747" version="1" comment="mozilla-nss-x86 is &lt;3.19.2.1-19.3 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577748" version="1" comment="MozillaFirefox is &lt;52.4.0esr-72.13.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577749" version="1" comment="MozillaFirefox-translations is &lt;52.4.0esr-72.13.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577750" version="1" comment="libfreebl3 is &lt;3.29.5-47.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577751" version="1" comment="libfreebl3-32bit is &lt;3.29.5-47.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577752" version="1" comment="libsoftokn3 is &lt;3.29.5-47.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577753" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-47.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577754" version="1" comment="mozilla-nss is &lt;3.29.5-47.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577755" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-47.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577756" version="1" comment="mozilla-nss-tools is &lt;3.29.5-47.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992758" version="1" comment="firefox-libharfbuzz0 is &lt;1.7.5-2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577757" version="1" comment="MozillaFirefox is &lt;24.2.0esr-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577758" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577759" version="1" comment="MozillaFirefox-translations is &lt;24.2.0esr-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577760" version="1" comment="libfreebl3 is &lt;3.15.3.1-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577761" version="1" comment="libfreebl3-32bit is &lt;3.15.3.1-0.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577762" version="1" comment="libfreebl3-x86 is &lt;3.15.3.1-0.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577763" version="1" comment="libsoftokn3 is &lt;3.15.3.1-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577764" version="1" comment="libsoftokn3-32bit is &lt;3.15.3.1-0.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577765" version="1" comment="libsoftokn3-x86 is &lt;3.15.3.1-0.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577766" version="1" comment="mozilla-nss is &lt;3.15.3.1-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577767" version="1" comment="mozilla-nss-32bit is &lt;3.15.3.1-0.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577768" version="1" comment="mozilla-nss-tools is &lt;3.15.3.1-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577769" version="1" comment="mozilla-nss-x86 is &lt;3.15.3.1-0.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577770" version="1" comment="MozillaFirefox is &lt;31.2.0esr-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577771" version="1" comment="MozillaFirefox-branding-SLED is &lt;31.0-0.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577773" version="1" comment="MozillaFirefox-translations is &lt;31.2.0esr-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577774" version="1" comment="libfreebl3 is &lt;3.17.2-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577775" version="1" comment="libfreebl3-32bit is &lt;3.17.2-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577776" version="1" comment="libfreebl3-x86 is &lt;3.17.2-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577777" version="1" comment="libsoftokn3 is &lt;3.17.2-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577778" version="1" comment="libsoftokn3-32bit is &lt;3.17.2-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577779" version="1" comment="libsoftokn3-x86 is &lt;3.17.2-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577780" version="1" comment="mozilla-nspr is &lt;4.10.7-0.3.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577781" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-0.3.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577782" version="1" comment="mozilla-nspr-x86 is &lt;4.10.7-0.3.3 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577783" version="1" comment="mozilla-nss is &lt;3.17.2-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577784" version="1" comment="mozilla-nss-32bit is &lt;3.17.2-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577785" version="1" comment="mozilla-nss-tools is &lt;3.17.2-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577786" version="1" comment="mozilla-nss-x86 is &lt;3.17.2-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577787" version="1" comment="MozillaFirefox is &lt;38.2.1esr-19.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577788" version="1" comment="MozillaFirefox-branding-SLED is &lt;31.0-0.12.51 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577790" version="1" comment="MozillaFirefox-translations is &lt;38.2.1esr-19.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577791" version="1" comment="libfreebl3 is &lt;3.19.2.0-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577792" version="1" comment="libfreebl3-32bit is &lt;3.19.2.0-0.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577793" version="1" comment="libfreebl3-x86 is &lt;3.19.2.0-0.16.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577794" version="1" comment="libsoftokn3 is &lt;3.19.2.0-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577795" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.0-0.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577796" version="1" comment="libsoftokn3-x86 is &lt;3.19.2.0-0.16.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577797" version="1" comment="mozilla-nss is &lt;3.19.2.0-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577798" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.0-0.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577799" version="1" comment="mozilla-nss-tools is &lt;3.19.2.0-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577800" version="1" comment="mozilla-nss-x86 is &lt;3.19.2.0-0.16.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577801" version="1" comment="libFLAC++6 is &lt;1.2.1-68.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577802" version="1" comment="libFLAC8 is &lt;1.2.1-68.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577803" version="1" comment="libFLAC8-32bit is &lt;1.2.1-68.17.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577804" version="1" comment="libFLAC8-x86 is &lt;1.2.1-68.17.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577805" version="1" comment="fontconfig is &lt;2.6.0-10.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577806" version="1" comment="fontconfig-32bit is &lt;2.6.0-10.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577807" version="1" comment="foomatic-filters is &lt;3.0.2-269.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577808" version="1" comment="freeradius-server is &lt;2.1.1-7.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577809" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577810" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577811" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577812" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992759" version="1" comment="freeradius-server is &lt;2.1.1-7.25.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992760" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.25.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992761" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.25.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992762" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.25.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992763" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.25.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679676" version="1" comment="freetype2 is &lt;2.3.7-25.45.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679677" version="1" comment="freetype2-32bit is &lt;2.3.7-25.45.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679678" version="1" comment="ft2demos is &lt;2.3.7-25.45.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577813" version="1" comment="freetype2 is &lt;2.3.7-25.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577814" version="1" comment="freetype2-32bit is &lt;2.3.7-25.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577815" version="1" comment="freetype2-x86 is &lt;2.3.7-25.34.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577816" version="1" comment="ft2demos is &lt;2.3.7-25.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593599" version="1" comment="freetype2 is &lt;2.3.7-25.35.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593600" version="1" comment="freetype2-32bit is &lt;2.3.7-25.35.36.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593601" version="1" comment="freetype2-x86 is &lt;2.3.7-25.35.36.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593602" version="1" comment="ft2demos is &lt;2.3.7-25.35.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992764" version="1" comment="fribidi is &lt;0.10.9-59.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992765" version="1" comment="fribidi-32bit is &lt;0.10.9-59.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577817" version="1" comment="fuse is &lt;2.8.7-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577818" version="1" comment="libfuse2 is &lt;2.8.7-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577819" version="1" comment="fuse is &lt;2.8.7-0.11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577820" version="1" comment="libfuse2 is &lt;2.8.7-0.11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577821" version="1" comment="cpp43 is &lt;4.3.4_20091019-37.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577822" version="1" comment="gcc43 is &lt;4.3.4_20091019-37.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577823" version="1" comment="gcc43-32bit is &lt;4.3.4_20091019-37.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577824" version="1" comment="gcc43-c++ is &lt;4.3.4_20091019-37.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577825" version="1" comment="gcc43-fortran is &lt;4.3.4_20091019-37.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577826" version="1" comment="gcc43-fortran-32bit is &lt;4.3.4_20091019-37.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577827" version="1" comment="gcc43-info is &lt;4.3.4_20091019-37.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577828" version="1" comment="gcc43-locale is &lt;4.3.4_20091019-37.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577829" version="1" comment="libstdc++43-devel is &lt;4.3.4_20091019-37.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577830" version="1" comment="libstdc++43-devel-32bit is &lt;4.3.4_20091019-37.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577831" version="1" comment="cpp43 is &lt;4.3.4_20091019-37.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577832" version="1" comment="gcc43 is &lt;4.3.4_20091019-37.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577833" version="1" comment="gcc43-32bit is &lt;4.3.4_20091019-37.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577834" version="1" comment="gcc43-c++ is &lt;4.3.4_20091019-37.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577835" version="1" comment="gcc43-fortran is &lt;4.3.4_20091019-37.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577836" version="1" comment="gcc43-fortran-32bit is &lt;4.3.4_20091019-37.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577837" version="1" comment="gcc43-info is &lt;4.3.4_20091019-37.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577838" version="1" comment="gcc43-locale is &lt;4.3.4_20091019-37.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577839" version="1" comment="libstdc++43-devel is &lt;4.3.4_20091019-37.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577840" version="1" comment="libstdc++43-devel-32bit is &lt;4.3.4_20091019-37.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577841" version="1" comment="gd is &lt;2.0.36.RC1-52.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577842" version="1" comment="gdb is &lt;7.5.1-0.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577843" version="1" comment="gdb is &lt;7.5.1-0.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577844" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577845" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577846" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577847" version="1" comment="ghostscript-library is &lt;8.62-32.46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577848" version="1" comment="ghostscript-omni is &lt;8.62-32.46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577849" version="1" comment="ghostscript-x11 is &lt;8.62-32.46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577850" version="1" comment="libgimpprint is &lt;4.2.7-32.46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577851" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.47.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577852" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.47.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577853" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.47.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577854" version="1" comment="ghostscript-library is &lt;8.62-32.47.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577855" version="1" comment="ghostscript-omni is &lt;8.62-32.47.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577856" version="1" comment="ghostscript-x11 is &lt;8.62-32.47.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577857" version="1" comment="libgimpprint is &lt;4.2.7-32.47.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992766" version="1" comment="ghostscript-fonts-other is &lt;8.62-47.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992767" version="1" comment="ghostscript-fonts-rus is &lt;8.62-47.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992768" version="1" comment="ghostscript-fonts-std is &lt;8.62-47.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992769" version="1" comment="ghostscript-library is &lt;8.62-47.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992770" version="1" comment="ghostscript-omni is &lt;8.62-47.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992771" version="1" comment="ghostscript-x11 is &lt;8.62-47.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992772" version="1" comment="libgimpprint is &lt;4.2.7-47.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992773" version="1" comment="ghostscript-fonts-other is &lt;8.62-47.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992774" version="1" comment="ghostscript-fonts-rus is &lt;8.62-47.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992775" version="1" comment="ghostscript-fonts-std is &lt;8.62-47.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992776" version="1" comment="ghostscript-library is &lt;8.62-47.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992777" version="1" comment="ghostscript-omni is &lt;8.62-47.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992778" version="1" comment="ghostscript-x11 is &lt;8.62-47.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992779" version="1" comment="libgimpprint is &lt;4.2.7-47.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577858" version="1" comment="giflib is &lt;4.1.6-13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577859" version="1" comment="giflib-32bit is &lt;4.1.6-13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577860" version="1" comment="giflib-progs is &lt;4.1.6-13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577861" version="1" comment="giflib-x86 is &lt;4.1.6-13.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577862" version="1" comment="glibc is &lt;2.11.3-17.72.14 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577863" version="1" comment="glibc-32bit is &lt;2.11.3-17.72.14 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577864" version="1" comment="glibc-devel is &lt;2.11.3-17.72.14 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577865" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.72.14 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577866" version="1" comment="glibc-html is &lt;2.11.3-17.72.14 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577867" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.72.14 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577868" version="1" comment="glibc-info is &lt;2.11.3-17.72.14 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577869" version="1" comment="glibc-locale is &lt;2.11.3-17.72.14 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577870" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.72.14 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577871" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.72.14 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577872" version="1" comment="glibc-profile is &lt;2.11.3-17.72.14 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577873" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.72.14 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577874" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.72.14 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577875" version="1" comment="glibc-x86 is &lt;2.11.3-17.72.14 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577876" version="1" comment="nscd is &lt;2.11.3-17.72.14 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577877" version="1" comment="glibc is &lt;2.11.3-17.87.3 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577878" version="1" comment="glibc-32bit is &lt;2.11.3-17.87.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577879" version="1" comment="glibc-devel is &lt;2.11.3-17.87.3 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577880" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.87.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577881" version="1" comment="glibc-html is &lt;2.11.3-17.87.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577882" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.87.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577883" version="1" comment="glibc-info is &lt;2.11.3-17.87.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577884" version="1" comment="glibc-locale is &lt;2.11.3-17.87.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577885" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.87.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577886" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.87.3 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577887" version="1" comment="glibc-profile is &lt;2.11.3-17.87.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577888" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.87.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577889" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.87.3 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577890" version="1" comment="glibc-x86 is &lt;2.11.3-17.87.3 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577891" version="1" comment="nscd is &lt;2.11.3-17.87.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577892" version="1" comment="glibc is &lt;2.11.3-17.95.2 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577893" version="1" comment="glibc-32bit is &lt;2.11.3-17.95.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577894" version="1" comment="glibc-devel is &lt;2.11.3-17.95.2 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577895" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.95.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577896" version="1" comment="glibc-html is &lt;2.11.3-17.95.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577897" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.95.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577898" version="1" comment="glibc-info is &lt;2.11.3-17.95.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577899" version="1" comment="glibc-locale is &lt;2.11.3-17.95.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577900" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.95.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577901" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.95.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577902" version="1" comment="glibc-profile is &lt;2.11.3-17.95.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577903" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.95.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577904" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.95.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577905" version="1" comment="glibc-x86 is &lt;2.11.3-17.95.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577906" version="1" comment="nscd is &lt;2.11.3-17.95.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577907" version="1" comment="glibc is &lt;2.11.3-17.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577908" version="1" comment="glibc-32bit is &lt;2.11.3-17.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577909" version="1" comment="glibc-devel is &lt;2.11.3-17.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577910" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577911" version="1" comment="glibc-html is &lt;2.11.3-17.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577912" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577913" version="1" comment="glibc-info is &lt;2.11.3-17.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577914" version="1" comment="glibc-locale is &lt;2.11.3-17.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577915" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577916" version="1" comment="glibc-profile is &lt;2.11.3-17.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577917" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577918" version="1" comment="nscd is &lt;2.11.3-17.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577919" version="1" comment="glibc is &lt;2.11.3-17.109.1 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577920" version="1" comment="glibc-32bit is &lt;2.11.3-17.109.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577921" version="1" comment="glibc-devel is &lt;2.11.3-17.109.1 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577922" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.109.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577923" version="1" comment="glibc-html is &lt;2.11.3-17.109.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577924" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.109.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577925" version="1" comment="glibc-info is &lt;2.11.3-17.109.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577926" version="1" comment="glibc-locale is &lt;2.11.3-17.109.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577927" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.109.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577928" version="1" comment="glibc-profile is &lt;2.11.3-17.109.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577929" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.109.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577930" version="1" comment="nscd is &lt;2.11.3-17.109.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577931" version="1" comment="glibc is &lt;2.11.3-17.110.3.1 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577932" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577933" version="1" comment="glibc-devel is &lt;2.11.3-17.110.3.1 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577934" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577935" version="1" comment="glibc-html is &lt;2.11.3-17.110.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577936" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577937" version="1" comment="glibc-info is &lt;2.11.3-17.110.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577938" version="1" comment="glibc-locale is &lt;2.11.3-17.110.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577939" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577940" version="1" comment="glibc-profile is &lt;2.11.3-17.110.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577941" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577942" version="1" comment="nscd is &lt;2.11.3-17.110.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577943" version="1" comment="glibc is &lt;2.11.3-17.110.6.2 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577944" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577945" version="1" comment="glibc-devel is &lt;2.11.3-17.110.6.2 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577946" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577947" version="1" comment="glibc-html is &lt;2.11.3-17.110.6.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577948" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.6.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577949" version="1" comment="glibc-info is &lt;2.11.3-17.110.6.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577950" version="1" comment="glibc-locale is &lt;2.11.3-17.110.6.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577951" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577952" version="1" comment="glibc-profile is &lt;2.11.3-17.110.6.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577953" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577954" version="1" comment="nscd is &lt;2.11.3-17.110.6.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577955" version="1" comment="glibc is &lt;2.11.3-17.110.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577956" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577957" version="1" comment="glibc-devel is &lt;2.11.3-17.110.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577958" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577959" version="1" comment="glibc-html is &lt;2.11.3-17.110.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577960" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577961" version="1" comment="glibc-info is &lt;2.11.3-17.110.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577962" version="1" comment="glibc-locale is &lt;2.11.3-17.110.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577963" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577964" version="1" comment="glibc-profile is &lt;2.11.3-17.110.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577965" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577966" version="1" comment="nscd is &lt;2.11.3-17.110.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577967" version="1" comment="glibc is &lt;2.11.3-17.110.14.1 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577968" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577969" version="1" comment="glibc-devel is &lt;2.11.3-17.110.14.1 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577970" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577971" version="1" comment="glibc-html is &lt;2.11.3-17.110.14.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577972" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.14.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577973" version="1" comment="glibc-info is &lt;2.11.3-17.110.14.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577974" version="1" comment="glibc-locale is &lt;2.11.3-17.110.14.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577975" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577976" version="1" comment="glibc-profile is &lt;2.11.3-17.110.14.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577977" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577978" version="1" comment="nscd is &lt;2.11.3-17.110.14.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577979" version="1" comment="glibc is &lt;2.11.3-17.110.19.2 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577980" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.19.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577981" version="1" comment="glibc-devel is &lt;2.11.3-17.110.19.2 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577982" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.19.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577983" version="1" comment="glibc-html is &lt;2.11.3-17.110.19.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577984" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.19.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577985" version="1" comment="glibc-info is &lt;2.11.3-17.110.19.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577986" version="1" comment="glibc-locale is &lt;2.11.3-17.110.19.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577987" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.19.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577988" version="1" comment="glibc-profile is &lt;2.11.3-17.110.19.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577989" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.19.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577990" version="1" comment="nscd is &lt;2.11.3-17.110.19.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577991" version="1" comment="glibc is &lt;2.11.3-17.110.24.2 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577992" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.24.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577993" version="1" comment="glibc-devel is &lt;2.11.3-17.110.24.2 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577994" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.24.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577995" version="1" comment="glibc-html is &lt;2.11.3-17.110.24.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577996" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.24.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577997" version="1" comment="glibc-info is &lt;2.11.3-17.110.24.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577998" version="1" comment="glibc-locale is &lt;2.11.3-17.110.24.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577999" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.24.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578000" version="1" comment="glibc-profile is &lt;2.11.3-17.110.24.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578001" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.24.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578002" version="1" comment="nscd is &lt;2.11.3-17.110.24.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578003" version="1" comment="glibc is &lt;2.11.3-17.110.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578004" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578005" version="1" comment="glibc-devel is &lt;2.11.3-17.110.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578006" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578007" version="1" comment="glibc-html is &lt;2.11.3-17.110.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578008" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578009" version="1" comment="glibc-info is &lt;2.11.3-17.110.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578010" version="1" comment="glibc-locale is &lt;2.11.3-17.110.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578011" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578012" version="1" comment="glibc-profile is &lt;2.11.3-17.110.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578013" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578014" version="1" comment="nscd is &lt;2.11.3-17.110.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578015" version="1" comment="glibc is &lt;2.11.3-17.110.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578016" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578017" version="1" comment="glibc-devel is &lt;2.11.3-17.110.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578018" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578019" version="1" comment="glibc-html is &lt;2.11.3-17.110.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578020" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578021" version="1" comment="glibc-info is &lt;2.11.3-17.110.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578022" version="1" comment="glibc-locale is &lt;2.11.3-17.110.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578023" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578024" version="1" comment="glibc-profile is &lt;2.11.3-17.110.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578025" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578026" version="1" comment="nscd is &lt;2.11.3-17.110.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634748" version="1" comment="glibc is &lt;2.11.3-17.110.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634749" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634750" version="1" comment="glibc-devel is &lt;2.11.3-17.110.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634751" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634752" version="1" comment="glibc-html is &lt;2.11.3-17.110.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634753" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634754" version="1" comment="glibc-info is &lt;2.11.3-17.110.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634755" version="1" comment="glibc-locale is &lt;2.11.3-17.110.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634756" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634757" version="1" comment="glibc-profile is &lt;2.11.3-17.110.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634758" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634759" version="1" comment="nscd is &lt;2.11.3-17.110.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673411" version="1" comment="glibc is &lt;2.11.3-17.110.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673412" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673413" version="1" comment="glibc-devel is &lt;2.11.3-17.110.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673414" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673415" version="1" comment="glibc-html is &lt;2.11.3-17.110.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673416" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673417" version="1" comment="glibc-info is &lt;2.11.3-17.110.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673418" version="1" comment="glibc-locale is &lt;2.11.3-17.110.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673419" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673420" version="1" comment="glibc-profile is &lt;2.11.3-17.110.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673421" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673422" version="1" comment="nscd is &lt;2.11.3-17.110.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992780" version="1" comment="glibc is &lt;2.11.3-17.110.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992781" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992782" version="1" comment="glibc-devel is &lt;2.11.3-17.110.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992783" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992784" version="1" comment="glibc-html is &lt;2.11.3-17.110.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992785" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992786" version="1" comment="glibc-info is &lt;2.11.3-17.110.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992787" version="1" comment="glibc-locale is &lt;2.11.3-17.110.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992788" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992789" version="1" comment="glibc-profile is &lt;2.11.3-17.110.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992790" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992791" version="1" comment="nscd is &lt;2.11.3-17.110.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992792" version="1" comment="glibc is &lt;2.11.3-17.110.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992793" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992794" version="1" comment="glibc-devel is &lt;2.11.3-17.110.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992795" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992796" version="1" comment="glibc-html is &lt;2.11.3-17.110.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992797" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992798" version="1" comment="glibc-info is &lt;2.11.3-17.110.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992799" version="1" comment="glibc-locale is &lt;2.11.3-17.110.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992800" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992801" version="1" comment="glibc-profile is &lt;2.11.3-17.110.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992802" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992803" version="1" comment="nscd is &lt;2.11.3-17.110.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578027" version="1" comment="gnutls is &lt;2.4.1-24.39.51.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563356" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.51.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578028" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.51.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578029" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.51.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578030" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.51.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578031" version="1" comment="gnutls is &lt;2.4.1-24.39.57.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563359" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.57.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578032" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.57.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578033" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.57.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578034" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.57.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578035" version="1" comment="gnutls is &lt;2.4.1-24.39.60.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563362" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.60.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578036" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.60.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578037" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.60.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578038" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.60.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578039" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578040" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578041" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578042" version="1" comment="gpg2 is &lt;2.0.9-25.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578043" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578044" version="1" comment="gpg2 is &lt;2.0.9-25.33.41.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578045" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.41.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578046" version="1" comment="gpg2 is &lt;2.0.9-25.33.42.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578047" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.42.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992804" version="1" comment="gpg2 is &lt;2.0.9-25.33.42.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992805" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.42.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578048" version="1" comment="gpgme is &lt;1.1.6-25.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578049" version="1" comment="libgpgme11 is &lt;1.1.6-25.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679679" version="1" comment="grep is &lt;2.7-5.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566616" version="1" comment="grub2-x86_64-efi is &lt;2.00-0.49.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566617" version="1" comment="grub2-x86_64-xen is &lt;2.00-0.49.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578050" version="1" comment="grub2-x86_64-efi is &lt;2.00-0.53.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578051" version="1" comment="grub2-x86_64-xen is &lt;2.00-0.53.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578052" version="1" comment="grub2-x86_64-efi is &lt;2.00-0.53.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578053" version="1" comment="grub2-x86_64-xen is &lt;2.00-0.53.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578054" version="1" comment="grub2-x86_64-efi is &lt;2.02-0.53.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578055" version="1" comment="grub2-x86_64-xen is &lt;2.02-0.53.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992806" version="1" comment="grub2-x86_64-efi is &lt;2.02-0.53.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992807" version="1" comment="grub2-x86_64-xen is &lt;2.02-0.53.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992808" version="1" comment="grub2-x86_64-efi is &lt;2.02-0.53.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992809" version="1" comment="grub2-x86_64-xen is &lt;2.02-0.53.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992810" version="1" comment="grub2-x86_64-efi is &lt;2.02-0.53.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992811" version="1" comment="grub2-x86_64-xen is &lt;2.02-0.53.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578056" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.35-5.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578057" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.35-5.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578058" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.35-5.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578059" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.35-5.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578060" version="1" comment="libgstapp-0_10-0 is &lt;0.10.35-5.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578061" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.35-5.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578062" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.35-5.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578063" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.35-5.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578064" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.35-5.18.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578065" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.35-5.18.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578066" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.35-5.18.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578067" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.35-5.18.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578068" version="1" comment="libgstapp-0_10-0 is &lt;0.10.35-5.18.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578069" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.35-5.18.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578070" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.35-5.18.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578071" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.35-5.18.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578072" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.30-5.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578073" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.30-5.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578074" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.30-5.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992812" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.30-5.15.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992813" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.30-5.15.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992814" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.30-5.15.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578075" version="1" comment="gtk2 is &lt;2.18.9-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578076" version="1" comment="gtk2-32bit is &lt;2.18.9-0.35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578077" version="1" comment="gtk2-doc is &lt;2.18.9-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578078" version="1" comment="gtk2-lang is &lt;2.18.9-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578079" version="1" comment="gtk2-x86 is &lt;2.18.9-0.35.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578080" version="1" comment="gtk2 is &lt;2.18.9-0.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578081" version="1" comment="gtk2-32bit is &lt;2.18.9-0.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578082" version="1" comment="gtk2-doc is &lt;2.18.9-0.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578083" version="1" comment="gtk2-lang is &lt;2.18.9-0.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578084" version="1" comment="gtk2-x86 is &lt;2.18.9-0.39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578085" version="1" comment="gtk2 is &lt;2.18.9-0.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578086" version="1" comment="gtk2-32bit is &lt;2.18.9-0.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578087" version="1" comment="gtk2-doc is &lt;2.18.9-0.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578088" version="1" comment="gtk2-lang is &lt;2.18.9-0.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578089" version="1" comment="gtk2 is &lt;2.18.9-0.45.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578090" version="1" comment="gtk2-32bit is &lt;2.18.9-0.45.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578091" version="1" comment="gtk2-doc is &lt;2.18.9-0.45.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578092" version="1" comment="gtk2-lang is &lt;2.18.9-0.45.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578093" version="1" comment="gtk2 is &lt;2.18.9-0.45.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578094" version="1" comment="gtk2-32bit is &lt;2.18.9-0.45.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578095" version="1" comment="gtk2-doc is &lt;2.18.9-0.45.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578096" version="1" comment="gtk2-lang is &lt;2.18.9-0.45.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578097" version="1" comment="guestfs-data is &lt;1.20.4-0.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578098" version="1" comment="guestfs-tools is &lt;1.20.4-0.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578099" version="1" comment="guestfsd is &lt;1.20.4-0.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578100" version="1" comment="libguestfs0 is &lt;1.20.4-0.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683759" version="1" comment="gzip is &lt;1.3.12-69.23.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992815" version="1" comment="ibutils is &lt;1.5.7-0.11.1 for i586,ia64,ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591130" version="1" comment="ibutils-32bit is &lt;1.5.7-0.11.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578101" version="1" comment="libicu is &lt;4.0-7.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578102" version="1" comment="libicu-32bit is &lt;4.0-7.28.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578103" version="1" comment="libicu-doc is &lt;4.0-7.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578104" version="1" comment="libicu-x86 is &lt;4.0-7.28.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578105" version="1" comment="libicu is &lt;4.0-38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564558" version="1" comment="libicu-32bit is &lt;4.0-38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578106" version="1" comment="libicu-doc is &lt;4.0-38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992816" version="1" comment="libicu is &lt;4.0-47.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992817" version="1" comment="libicu-32bit is &lt;4.0-47.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992818" version="1" comment="libicu-doc is &lt;4.0-47.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578107" version="1" comment="intel-SINIT is &lt;1-0.81.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578108" version="1" comment="ipsec-tools is &lt;0.7.3-1.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578109" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-1.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578110" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-1.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992819" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-1.37.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992820" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-1.37.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578111" version="1" comment="libjasper is &lt;1.900.1-134.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578112" version="1" comment="libjasper-32bit is &lt;1.900.1-134.17.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578113" version="1" comment="libjasper-x86 is &lt;1.900.1-134.17.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680672" version="1" comment="libjasper is &lt;1.900.14-134.33.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680673" version="1" comment="libjasper-32bit is &lt;1.900.14-134.33.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992821" version="1" comment="libjasper is &lt;1.900.14-134.33.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992822" version="1" comment="libjasper-32bit is &lt;1.900.14-134.33.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578114" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.2-0.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578115" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.2-0.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578116" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.2-0.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578117" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.2-0.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578119" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.7-10.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578120" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.7-10.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578121" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.7-10.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578122" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.20-51.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578123" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.20-51.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578124" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.20-51.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578125" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.20-51.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578126" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.20-51.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578127" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.20-51.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578128" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.45-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568011" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.45-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578129" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.45-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578130" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.45-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578131" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.45-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578132" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.45-84.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578133" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.50-85.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568017" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.50-85.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578134" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.50-85.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578135" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.50-85.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578136" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.50-85.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578137" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.50-85.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578138" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.15-46.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578139" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.15-46.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578140" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.15-46.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578141" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr8.0-0.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578142" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr8.0-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578143" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr8.0-0.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578144" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr8.0-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578145" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.10-9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578146" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.10-9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578147" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.20-42.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578148" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.20-42.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578149" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.30-45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578150" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.30-45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578151" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.30-45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578152" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.30-45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578153" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.30-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578154" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.30-47.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578155" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.30-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578156" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.30-47.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578157" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.1-61.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578158" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.1-61.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578159" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.1-61.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578160" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.1-61.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578161" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.1-61.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578162" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.5-64.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578163" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.5-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578164" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.5-64.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578165" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.5-64.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578166" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.5-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578167" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.10-65.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578168" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.10-65.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578169" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.10-65.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578170" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.10-65.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578171" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.15-65.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578172" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.15-65.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578173" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.15-65.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578174" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.15-65.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578175" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.15-65.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578176" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.20-65.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578177" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.20-65.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578178" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.20-65.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578179" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.20-65.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578180" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.20-65.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578181" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.25-65.25.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578182" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.25-65.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578183" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.25-65.25.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578184" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.25-65.25.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578185" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.25-65.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578186" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.30-65.28.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578187" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.30-65.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578188" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.30-65.28.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578189" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.30-65.28.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578190" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.30-65.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578191" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.35-65.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578192" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.35-65.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578193" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.35-65.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578194" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.35-65.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578195" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.35-65.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578196" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.40-65.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578197" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.40-65.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578198" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.40-65.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578199" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.40-65.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578200" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.45-65.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578201" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.45-65.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578202" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.45-65.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578203" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.45-65.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578204" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.50-65.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578205" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.50-65.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578206" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.50-65.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578207" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.50-65.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578208" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.55-65.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578209" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.55-65.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578210" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.55-65.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578211" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.55-65.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578212" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.60-65.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578213" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.60-65.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578214" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.60-65.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578215" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.60-65.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578216" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.65-65.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578217" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.65-65.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578218" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.65-65.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578219" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.65-65.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578220" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.70-65.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578221" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.70-65.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578222" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.70-65.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578223" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.70-65.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578224" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.75-65.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578225" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.75-65.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578226" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.75-65.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578227" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.75-65.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578228" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.80-65.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578229" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.80-65.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578230" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.80-65.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578231" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.80-65.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674103" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr11.5-65.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674104" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr11.5-65.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674105" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr11.5-65.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674106" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr11.5-65.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992823" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr11.10-65.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992824" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr11.10-65.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992825" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr11.10-65.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992826" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr11.10-65.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992827" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr11.15-65.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992828" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr11.15-65.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992829" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr11.15-65.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992830" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr11.15-65.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992831" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr11.15-65.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992832" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr11.15-65.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992833" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr11.15-65.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992834" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr11.15-65.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662525" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr11.0-65.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662526" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr11.0-65.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662527" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr11.0-65.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662528" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr11.0-65.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578232" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.12.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578233" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.12.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578234" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.12.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578235" version="1" comment="kdm is &lt;4.3.5-0.12.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578236" version="1" comment="kwin is &lt;4.3.5-0.12.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578237" version="1" comment="kdebase4-runtime is &lt;4.3.5-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578238" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.12.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578239" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.12.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578240" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.12.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578241" version="1" comment="kdm is &lt;4.3.5-0.12.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578242" version="1" comment="kwin is &lt;4.3.5-0.12.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578243" version="1" comment="kdelibs4 is &lt;4.3.5-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578244" version="1" comment="kdelibs4-core is &lt;4.3.5-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563392" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578245" version="1" comment="libkde4 is &lt;4.3.5-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578246" version="1" comment="libkde4-32bit is &lt;4.3.5-0.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578247" version="1" comment="libkde4-x86 is &lt;4.3.5-0.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578248" version="1" comment="libkdecore4 is &lt;4.3.5-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578249" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578250" version="1" comment="libkdecore4-x86 is &lt;4.3.5-0.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578251" version="1" comment="kdirstat is &lt;2.4.4-255.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578252" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.55.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578253" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.55.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578254" version="1" comment="kernel-default is &lt;3.0.101-0.40.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578255" version="1" comment="kernel-default-base is &lt;3.0.101-0.40.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578257" version="1" comment="kernel-default-man is &lt;3.0.101-0.40.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578258" version="1" comment="kernel-ec2 is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578259" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566714" version="1" comment="kernel-pae is &lt;3.0.101-0.40.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566715" version="1" comment="kernel-pae-base is &lt;3.0.101-0.40.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578261" version="1" comment="kernel-ppc64 is &lt;3.0.101-0.40.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578262" version="1" comment="kernel-ppc64-base is &lt;3.0.101-0.40.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578264" version="1" comment="kernel-source is &lt;3.0.101-0.40.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578265" version="1" comment="kernel-syms is &lt;3.0.101-0.40.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578266" version="1" comment="kernel-trace is &lt;3.0.101-0.40.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578267" version="1" comment="kernel-trace-base is &lt;3.0.101-0.40.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566721" version="1" comment="kernel-xen is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566722" version="1" comment="kernel-xen-base is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566725" version="1" comment="xen-kmp-default is &lt;4.2.4_04_3.0.101_0.40-0.7.3 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566726" version="1" comment="xen-kmp-pae is &lt;4.2.4_04_3.0.101_0.40-0.7.3 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578269" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.86.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578270" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.86.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578272" version="1" comment="kernel-default is &lt;3.0.101-0.47.86.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578273" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.86.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578275" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.86.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578276" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.86.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578277" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.86.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568113" version="1" comment="kernel-pae is &lt;3.0.101-0.47.86.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568114" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.86.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578279" version="1" comment="kernel-source is &lt;3.0.101-0.47.86.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578280" version="1" comment="kernel-syms is &lt;3.0.101-0.47.86.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578281" version="1" comment="kernel-trace is &lt;3.0.101-0.47.86.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578282" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.86.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578284" version="1" comment="kernel-xen is &lt;3.0.101-0.47.86.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578285" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.86.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578287" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.93.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578288" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.93.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578290" version="1" comment="kernel-default is &lt;3.0.101-0.47.93.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578291" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.93.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578293" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.93.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578294" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.93.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578295" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.93.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568130" version="1" comment="kernel-pae is &lt;3.0.101-0.47.93.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568131" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.93.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578297" version="1" comment="kernel-source is &lt;3.0.101-0.47.93.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578298" version="1" comment="kernel-syms is &lt;3.0.101-0.47.93.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578299" version="1" comment="kernel-trace is &lt;3.0.101-0.47.93.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578300" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.93.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578302" version="1" comment="kernel-xen is &lt;3.0.101-0.47.93.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578303" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.93.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578305" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.99.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578306" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.99.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578308" version="1" comment="kernel-default is &lt;3.0.101-0.47.99.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578309" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.99.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578311" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.99.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578312" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.99.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578313" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.99.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568147" version="1" comment="kernel-pae is &lt;3.0.101-0.47.99.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568148" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.99.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578315" version="1" comment="kernel-source is &lt;3.0.101-0.47.99.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578316" version="1" comment="kernel-syms is &lt;3.0.101-0.47.99.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578317" version="1" comment="kernel-trace is &lt;3.0.101-0.47.99.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578318" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.99.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578320" version="1" comment="kernel-xen is &lt;3.0.101-0.47.99.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578321" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.99.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578323" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.102.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578324" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.102.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578326" version="1" comment="kernel-default is &lt;3.0.101-0.47.102.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578327" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.102.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578329" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.102.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578330" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.102.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578331" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.102.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568164" version="1" comment="kernel-pae is &lt;3.0.101-0.47.102.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568165" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.102.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578333" version="1" comment="kernel-source is &lt;3.0.101-0.47.102.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578334" version="1" comment="kernel-syms is &lt;3.0.101-0.47.102.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578335" version="1" comment="kernel-trace is &lt;3.0.101-0.47.102.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578336" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.102.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578338" version="1" comment="kernel-xen is &lt;3.0.101-0.47.102.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578339" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.102.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578341" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.105.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578342" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.105.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578344" version="1" comment="kernel-default is &lt;3.0.101-0.47.105.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578345" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.105.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578347" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.105.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578348" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.105.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578349" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.105.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568181" version="1" comment="kernel-pae is &lt;3.0.101-0.47.105.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568182" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.105.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578351" version="1" comment="kernel-source is &lt;3.0.101-0.47.105.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578352" version="1" comment="kernel-syms is &lt;3.0.101-0.47.105.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578353" version="1" comment="kernel-trace is &lt;3.0.101-0.47.105.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578354" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.105.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578356" version="1" comment="kernel-xen is &lt;3.0.101-0.47.105.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578357" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.105.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578359" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578360" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578362" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.8.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578363" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.8.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578365" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.8.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578366" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578367" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568198" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.8.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568199" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.8.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578369" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.8.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578370" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.8.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578371" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.8.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578372" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.8.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578374" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578375" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578377" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578378" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578380" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.50.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578381" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.50.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578383" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.50.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578384" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.50.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578385" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.50.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568215" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.50.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568216" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.50.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578387" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.50.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578388" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.50.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578389" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.50.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578390" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.50.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578392" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.50.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578393" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.50.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992835" version="1" comment="kernel-default is &lt;3.0.101-0.53.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992836" version="1" comment="kernel-default-base is &lt;3.0.101-0.53.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992838" version="1" comment="kernel-source is &lt;3.0.101-0.53.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992839" version="1" comment="kernel-syms is &lt;3.0.101-0.53.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992840" version="1" comment="kernel-trace is &lt;3.0.101-0.53.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992841" version="1" comment="kernel-trace-base is &lt;3.0.101-0.53.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992843" version="1" comment="kernel-xen is &lt;3.0.101-0.53.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992844" version="1" comment="kernel-xen-base is &lt;3.0.101-0.53.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992846" version="1" comment="kernel-default is &lt;3.0.101-0.63.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992847" version="1" comment="kernel-default-base is &lt;3.0.101-0.63.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992849" version="1" comment="kernel-source is &lt;3.0.101-0.63.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992850" version="1" comment="kernel-syms is &lt;3.0.101-0.63.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992851" version="1" comment="kernel-trace is &lt;3.0.101-0.63.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992852" version="1" comment="kernel-trace-base is &lt;3.0.101-0.63.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992854" version="1" comment="kernel-xen is &lt;3.0.101-0.63.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992855" version="1" comment="kernel-xen-base is &lt;3.0.101-0.63.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578395" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.67.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578396" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.67.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578397" version="1" comment="kernel-default is &lt;3.0.101-0.47.67.2 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578398" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.67.2 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578400" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.67.2 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578401" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578402" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566732" version="1" comment="kernel-pae is &lt;3.0.101-0.47.67.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566733" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.67.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578404" version="1" comment="kernel-ppc64 is &lt;3.0.101-0.47.67.2 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578405" version="1" comment="kernel-ppc64-base is &lt;3.0.101-0.47.67.2 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578407" version="1" comment="kernel-source is &lt;3.0.101-0.47.67.2 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578408" version="1" comment="kernel-syms is &lt;3.0.101-0.47.67.2 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578409" version="1" comment="kernel-trace is &lt;3.0.101-0.47.67.2 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578410" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.67.2 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566739" version="1" comment="kernel-xen is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566740" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992857" version="1" comment="kernel-default is &lt;3.0.101-0.66.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992858" version="1" comment="kernel-default-base is &lt;3.0.101-0.66.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992860" version="1" comment="kernel-source is &lt;3.0.101-0.66.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992861" version="1" comment="kernel-syms is &lt;3.0.101-0.66.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992862" version="1" comment="kernel-trace is &lt;3.0.101-0.66.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992863" version="1" comment="kernel-trace-base is &lt;3.0.101-0.66.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992865" version="1" comment="kernel-xen is &lt;3.0.101-0.66.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992866" version="1" comment="kernel-xen-base is &lt;3.0.101-0.66.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992868" version="1" comment="kernel-default is &lt;3.0.101-0.69.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992869" version="1" comment="kernel-default-base is &lt;3.0.101-0.69.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992871" version="1" comment="kernel-ec2 is &lt;3.0.101-0.69.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992872" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.69.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992874" version="1" comment="kernel-source is &lt;3.0.101-0.69.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992875" version="1" comment="kernel-syms is &lt;3.0.101-0.69.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992876" version="1" comment="kernel-trace is &lt;3.0.101-0.69.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992877" version="1" comment="kernel-trace-base is &lt;3.0.101-0.69.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992879" version="1" comment="kernel-xen is &lt;3.0.101-0.69.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992880" version="1" comment="kernel-xen-base is &lt;3.0.101-0.69.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992882" version="1" comment="kernel-default is &lt;3.0.101-0.72.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992883" version="1" comment="kernel-default-base is &lt;3.0.101-0.72.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992885" version="1" comment="kernel-ec2 is &lt;3.0.101-0.72.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992886" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.72.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992888" version="1" comment="kernel-source is &lt;3.0.101-0.72.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992889" version="1" comment="kernel-syms is &lt;3.0.101-0.72.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992890" version="1" comment="kernel-trace is &lt;3.0.101-0.72.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992891" version="1" comment="kernel-trace-base is &lt;3.0.101-0.72.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992893" version="1" comment="kernel-xen is &lt;3.0.101-0.72.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992894" version="1" comment="kernel-xen-base is &lt;3.0.101-0.72.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992896" version="1" comment="kernel-default is &lt;3.0.101-0.77.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992897" version="1" comment="kernel-default-base is &lt;3.0.101-0.77.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992899" version="1" comment="kernel-ec2 is &lt;3.0.101-0.77.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992900" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.77.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992902" version="1" comment="kernel-source is &lt;3.0.101-0.77.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992903" version="1" comment="kernel-syms is &lt;3.0.101-0.77.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992904" version="1" comment="kernel-trace is &lt;3.0.101-0.77.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992905" version="1" comment="kernel-trace-base is &lt;3.0.101-0.77.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992907" version="1" comment="kernel-xen is &lt;3.0.101-0.77.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992908" version="1" comment="kernel-xen-base is &lt;3.0.101-0.77.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992910" version="1" comment="kernel-default is &lt;3.0.101-0.80.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992911" version="1" comment="kernel-default-base is &lt;3.0.101-0.80.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992913" version="1" comment="kernel-ec2 is &lt;3.0.101-0.80.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992914" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.80.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992916" version="1" comment="kernel-source is &lt;3.0.101-0.80.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992917" version="1" comment="kernel-syms is &lt;3.0.101-0.80.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992918" version="1" comment="kernel-trace is &lt;3.0.101-0.80.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992919" version="1" comment="kernel-trace-base is &lt;3.0.101-0.80.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992921" version="1" comment="kernel-xen is &lt;3.0.101-0.80.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992922" version="1" comment="kernel-xen-base is &lt;3.0.101-0.80.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578412" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578413" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578415" version="1" comment="kernel-default is &lt;3.0.101-0.47.79.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578416" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.79.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578418" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.79.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578419" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.79.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578420" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.79.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578422" version="1" comment="kernel-pae is &lt;3.0.101-0.47.79.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578423" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.79.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578425" version="1" comment="kernel-source is &lt;3.0.101-0.47.79.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578426" version="1" comment="kernel-syms is &lt;3.0.101-0.47.79.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578427" version="1" comment="kernel-trace is &lt;3.0.101-0.47.79.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578428" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.79.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578430" version="1" comment="kernel-xen is &lt;3.0.101-0.47.79.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578431" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.79.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992924" version="1" comment="kernel-default is &lt;3.0.101-0.83.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992925" version="1" comment="kernel-default-base is &lt;3.0.101-0.83.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992927" version="1" comment="kernel-ec2 is &lt;3.0.101-0.83.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992928" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.83.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992930" version="1" comment="kernel-source is &lt;3.0.101-0.83.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992931" version="1" comment="kernel-syms is &lt;3.0.101-0.83.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992932" version="1" comment="kernel-trace is &lt;3.0.101-0.83.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992933" version="1" comment="kernel-trace-base is &lt;3.0.101-0.83.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992935" version="1" comment="kernel-xen is &lt;3.0.101-0.83.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992936" version="1" comment="kernel-xen-base is &lt;3.0.101-0.83.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992938" version="1" comment="kernel-default is &lt;3.0.101-0.93.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992939" version="1" comment="kernel-default-base is &lt;3.0.101-0.93.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992941" version="1" comment="kernel-ec2 is &lt;3.0.101-0.93.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992942" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.93.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992944" version="1" comment="kernel-source is &lt;3.0.101-0.93.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992945" version="1" comment="kernel-syms is &lt;3.0.101-0.93.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992946" version="1" comment="kernel-trace is &lt;3.0.101-0.93.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992947" version="1" comment="kernel-trace-base is &lt;3.0.101-0.93.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992949" version="1" comment="kernel-xen is &lt;3.0.101-0.93.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992950" version="1" comment="kernel-xen-base is &lt;3.0.101-0.93.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992952" version="1" comment="kernel-default is &lt;3.0.101-0.96.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992953" version="1" comment="kernel-default-base is &lt;3.0.101-0.96.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992955" version="1" comment="kernel-ec2 is &lt;3.0.101-0.96.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992956" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.96.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992958" version="1" comment="kernel-source is &lt;3.0.101-0.96.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992959" version="1" comment="kernel-syms is &lt;3.0.101-0.96.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992960" version="1" comment="kernel-trace is &lt;3.0.101-0.96.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992961" version="1" comment="kernel-trace-base is &lt;3.0.101-0.96.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992963" version="1" comment="kernel-xen is &lt;3.0.101-0.96.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992964" version="1" comment="kernel-xen-base is &lt;3.0.101-0.96.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992966" version="1" comment="kernel-default is &lt;3.0.101-0.101.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992967" version="1" comment="kernel-default-base is &lt;3.0.101-0.101.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992969" version="1" comment="kernel-ec2 is &lt;3.0.101-0.101.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992970" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.101.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992972" version="1" comment="kernel-source is &lt;3.0.101-0.101.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992973" version="1" comment="kernel-syms is &lt;3.0.101-0.101.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992974" version="1" comment="kernel-trace is &lt;3.0.101-0.101.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992975" version="1" comment="kernel-trace-base is &lt;3.0.101-0.101.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992977" version="1" comment="kernel-xen is &lt;3.0.101-0.101.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992978" version="1" comment="kernel-xen-base is &lt;3.0.101-0.101.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992980" version="1" comment="kernel-default is &lt;3.0.101-0.104.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992981" version="1" comment="kernel-default-base is &lt;3.0.101-0.104.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992983" version="1" comment="kernel-ec2 is &lt;3.0.101-0.104.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992984" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.104.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992986" version="1" comment="kernel-source is &lt;3.0.101-0.104.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992987" version="1" comment="kernel-syms is &lt;3.0.101-0.104.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992988" version="1" comment="kernel-trace is &lt;3.0.101-0.104.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992989" version="1" comment="kernel-trace-base is &lt;3.0.101-0.104.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992991" version="1" comment="kernel-xen is &lt;3.0.101-0.104.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992992" version="1" comment="kernel-xen-base is &lt;3.0.101-0.104.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992994" version="1" comment="kernel-default is &lt;3.0.101-0.107.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992995" version="1" comment="kernel-default-base is &lt;3.0.101-0.107.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992997" version="1" comment="kernel-ec2 is &lt;3.0.101-0.107.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009992998" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.107.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993000" version="1" comment="kernel-source is &lt;3.0.101-0.107.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993001" version="1" comment="kernel-syms is &lt;3.0.101-0.107.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993002" version="1" comment="kernel-trace is &lt;3.0.101-0.107.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993003" version="1" comment="kernel-trace-base is &lt;3.0.101-0.107.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993005" version="1" comment="kernel-xen is &lt;3.0.101-0.107.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993006" version="1" comment="kernel-xen-base is &lt;3.0.101-0.107.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993008" version="1" comment="kernel-default is &lt;3.0.101-0.113.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993009" version="1" comment="kernel-default-base is &lt;3.0.101-0.113.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993011" version="1" comment="kernel-ec2 is &lt;3.0.101-0.113.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993012" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.113.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993014" version="1" comment="kernel-source is &lt;3.0.101-0.113.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993015" version="1" comment="kernel-syms is &lt;3.0.101-0.113.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993016" version="1" comment="kernel-trace is &lt;3.0.101-0.113.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993017" version="1" comment="kernel-trace-base is &lt;3.0.101-0.113.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993019" version="1" comment="kernel-xen is &lt;3.0.101-0.113.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993020" version="1" comment="kernel-xen-base is &lt;3.0.101-0.113.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578433" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578434" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578436" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.11.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578437" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.11.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578439" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.11.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578440" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.11.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578441" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.11.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568232" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.11.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568233" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.11.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578443" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.11.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578444" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.11.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578445" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.11.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578446" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.11.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578448" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.11.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578449" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.11.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993022" version="1" comment="kernel-default is &lt;3.0.101-0.116.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993023" version="1" comment="kernel-default-base is &lt;3.0.101-0.116.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993025" version="1" comment="kernel-ec2 is &lt;3.0.101-0.116.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993026" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.116.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993028" version="1" comment="kernel-source is &lt;3.0.101-0.116.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993029" version="1" comment="kernel-syms is &lt;3.0.101-0.116.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993030" version="1" comment="kernel-trace is &lt;3.0.101-0.116.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993031" version="1" comment="kernel-trace-base is &lt;3.0.101-0.116.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993033" version="1" comment="kernel-xen is &lt;3.0.101-0.116.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993034" version="1" comment="kernel-xen-base is &lt;3.0.101-0.116.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993036" version="1" comment="kernel-default is &lt;3.0.101-0.119.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993037" version="1" comment="kernel-default-base is &lt;3.0.101-0.119.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993039" version="1" comment="kernel-ec2 is &lt;3.0.101-0.119.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993040" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.119.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993042" version="1" comment="kernel-source is &lt;3.0.101-0.119.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993043" version="1" comment="kernel-syms is &lt;3.0.101-0.119.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993044" version="1" comment="kernel-trace is &lt;3.0.101-0.119.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993045" version="1" comment="kernel-trace-base is &lt;3.0.101-0.119.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993047" version="1" comment="kernel-xen is &lt;3.0.101-0.119.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993048" version="1" comment="kernel-xen-base is &lt;3.0.101-0.119.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993050" version="1" comment="kernel-default is &lt;3.0.101-0.122.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993051" version="1" comment="kernel-default-base is &lt;3.0.101-0.122.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993053" version="1" comment="kernel-ec2 is &lt;3.0.101-0.122.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993054" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.122.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993056" version="1" comment="kernel-source is &lt;3.0.101-0.122.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993057" version="1" comment="kernel-syms is &lt;3.0.101-0.122.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993058" version="1" comment="kernel-trace is &lt;3.0.101-0.122.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993059" version="1" comment="kernel-trace-base is &lt;3.0.101-0.122.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993061" version="1" comment="kernel-xen is &lt;3.0.101-0.122.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993062" version="1" comment="kernel-xen-base is &lt;3.0.101-0.122.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993064" version="1" comment="kernel-default is &lt;3.0.101-0.125.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993065" version="1" comment="kernel-default-base is &lt;3.0.101-0.125.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993067" version="1" comment="kernel-ec2 is &lt;3.0.101-0.125.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993068" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.125.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993070" version="1" comment="kernel-source is &lt;3.0.101-0.125.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993071" version="1" comment="kernel-syms is &lt;3.0.101-0.125.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993072" version="1" comment="kernel-trace is &lt;3.0.101-0.125.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993073" version="1" comment="kernel-trace-base is &lt;3.0.101-0.125.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993075" version="1" comment="kernel-xen is &lt;3.0.101-0.125.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993076" version="1" comment="kernel-xen-base is &lt;3.0.101-0.125.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993078" version="1" comment="kernel-default is &lt;3.0.101-0.126.5.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993079" version="1" comment="kernel-default-base is &lt;3.0.101-0.126.5.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993081" version="1" comment="kernel-ec2 is &lt;3.0.101-0.126.5.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993082" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.126.5.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993084" version="1" comment="kernel-source is &lt;3.0.101-0.126.5.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993085" version="1" comment="kernel-syms is &lt;3.0.101-0.126.5.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993086" version="1" comment="kernel-trace is &lt;3.0.101-0.126.5.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993087" version="1" comment="kernel-trace-base is &lt;3.0.101-0.126.5.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993089" version="1" comment="kernel-xen is &lt;3.0.101-0.126.5.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993090" version="1" comment="kernel-xen-base is &lt;3.0.101-0.126.5.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993092" version="1" comment="kernel-default is &lt;3.0.101-0.132.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993093" version="1" comment="kernel-default-base is &lt;3.0.101-0.132.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993095" version="1" comment="kernel-ec2 is &lt;3.0.101-0.132.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993096" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.132.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993098" version="1" comment="kernel-source is &lt;3.0.101-0.132.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993099" version="1" comment="kernel-syms is &lt;3.0.101-0.132.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993100" version="1" comment="kernel-trace is &lt;3.0.101-0.132.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993101" version="1" comment="kernel-trace-base is &lt;3.0.101-0.132.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993103" version="1" comment="kernel-xen is &lt;3.0.101-0.132.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993104" version="1" comment="kernel-xen-base is &lt;3.0.101-0.132.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993106" version="1" comment="kernel-default is &lt;3.0.101-0.139.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993107" version="1" comment="kernel-default-base is &lt;3.0.101-0.139.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993109" version="1" comment="kernel-ec2 is &lt;3.0.101-0.139.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993110" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.139.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993112" version="1" comment="kernel-source is &lt;3.0.101-0.139.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993113" version="1" comment="kernel-syms is &lt;3.0.101-0.139.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993114" version="1" comment="kernel-trace is &lt;3.0.101-0.139.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993115" version="1" comment="kernel-trace-base is &lt;3.0.101-0.139.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993117" version="1" comment="kernel-xen is &lt;3.0.101-0.139.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993118" version="1" comment="kernel-xen-base is &lt;3.0.101-0.139.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993120" version="1" comment="kernel-default is &lt;3.0.101-0.142.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993121" version="1" comment="kernel-default-base is &lt;3.0.101-0.142.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993123" version="1" comment="kernel-ec2 is &lt;3.0.101-0.142.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993124" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.142.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993126" version="1" comment="kernel-source is &lt;3.0.101-0.142.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993127" version="1" comment="kernel-syms is &lt;3.0.101-0.142.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993128" version="1" comment="kernel-trace is &lt;3.0.101-0.142.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993129" version="1" comment="kernel-trace-base is &lt;3.0.101-0.142.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993131" version="1" comment="kernel-xen is &lt;3.0.101-0.142.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993132" version="1" comment="kernel-xen-base is &lt;3.0.101-0.142.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993134" version="1" comment="kernel-default is &lt;3.0.101-0.145.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993135" version="1" comment="kernel-default-base is &lt;3.0.101-0.145.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993137" version="1" comment="kernel-ec2 is &lt;3.0.101-0.145.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993138" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.145.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993140" version="1" comment="kernel-source is &lt;3.0.101-0.145.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993141" version="1" comment="kernel-syms is &lt;3.0.101-0.145.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993142" version="1" comment="kernel-trace is &lt;3.0.101-0.145.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993143" version="1" comment="kernel-trace-base is &lt;3.0.101-0.145.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993145" version="1" comment="kernel-xen is &lt;3.0.101-0.145.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993146" version="1" comment="kernel-xen-base is &lt;3.0.101-0.145.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993148" version="1" comment="kernel-default is &lt;3.0.101-0.150.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993149" version="1" comment="kernel-default-base is &lt;3.0.101-0.150.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993151" version="1" comment="kernel-ec2 is &lt;3.0.101-0.150.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993152" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.150.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993154" version="1" comment="kernel-source is &lt;3.0.101-0.150.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993155" version="1" comment="kernel-syms is &lt;3.0.101-0.150.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993156" version="1" comment="kernel-trace is &lt;3.0.101-0.150.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993157" version="1" comment="kernel-trace-base is &lt;3.0.101-0.150.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993159" version="1" comment="kernel-xen is &lt;3.0.101-0.150.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993160" version="1" comment="kernel-xen-base is &lt;3.0.101-0.150.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578451" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.14.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578452" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.14.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578454" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.14.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578455" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.14.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578456" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.14.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578457" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.14.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578458" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.14.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578460" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578461" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578463" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.19.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578464" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.19.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578466" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.19.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578467" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.19.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578468" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.19.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568249" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.19.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568250" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.19.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578470" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.19.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578471" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.19.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578472" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.19.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578473" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.19.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578475" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.19.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578476" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.19.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993162" version="1" comment="kernel-default is &lt;3.0.101-0.153.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993163" version="1" comment="kernel-default-base is &lt;3.0.101-0.153.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993165" version="1" comment="kernel-ec2 is &lt;3.0.101-0.153.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993166" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.153.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993168" version="1" comment="kernel-source is &lt;3.0.101-0.153.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993169" version="1" comment="kernel-syms is &lt;3.0.101-0.153.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993170" version="1" comment="kernel-trace is &lt;3.0.101-0.153.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993171" version="1" comment="kernel-trace-base is &lt;3.0.101-0.153.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993173" version="1" comment="kernel-xen is &lt;3.0.101-0.153.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993174" version="1" comment="kernel-xen-base is &lt;3.0.101-0.153.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993176" version="1" comment="kernel-default is &lt;3.0.101-0.156.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993177" version="1" comment="kernel-default-base is &lt;3.0.101-0.156.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993179" version="1" comment="kernel-ec2 is &lt;3.0.101-0.156.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993180" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.156.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993182" version="1" comment="kernel-source is &lt;3.0.101-0.156.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993183" version="1" comment="kernel-syms is &lt;3.0.101-0.156.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993184" version="1" comment="kernel-trace is &lt;3.0.101-0.156.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993185" version="1" comment="kernel-trace-base is &lt;3.0.101-0.156.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993187" version="1" comment="kernel-xen is &lt;3.0.101-0.156.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993188" version="1" comment="kernel-xen-base is &lt;3.0.101-0.156.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993190" version="1" comment="kernel-default is &lt;3.0.101-0.163.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993191" version="1" comment="kernel-default-base is &lt;3.0.101-0.163.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993193" version="1" comment="kernel-ec2 is &lt;3.0.101-0.163.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993194" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.163.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993196" version="1" comment="kernel-source is &lt;3.0.101-0.163.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993197" version="1" comment="kernel-syms is &lt;3.0.101-0.163.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993198" version="1" comment="kernel-trace is &lt;3.0.101-0.163.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993199" version="1" comment="kernel-trace-base is &lt;3.0.101-0.163.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993201" version="1" comment="kernel-xen is &lt;3.0.101-0.163.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993202" version="1" comment="kernel-xen-base is &lt;3.0.101-0.163.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993204" version="1" comment="kernel-default is &lt;3.0.101-0.166.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993205" version="1" comment="kernel-default-base is &lt;3.0.101-0.166.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993207" version="1" comment="kernel-ec2 is &lt;3.0.101-0.166.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993208" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.166.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993210" version="1" comment="kernel-source is &lt;3.0.101-0.166.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993211" version="1" comment="kernel-syms is &lt;3.0.101-0.166.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993212" version="1" comment="kernel-trace is &lt;3.0.101-0.166.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993213" version="1" comment="kernel-trace-base is &lt;3.0.101-0.166.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993215" version="1" comment="kernel-xen is &lt;3.0.101-0.166.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993216" version="1" comment="kernel-xen-base is &lt;3.0.101-0.166.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578478" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578479" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578481" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.29.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578482" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.29.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578484" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.29.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578485" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578486" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568266" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.29.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568267" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.29.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578488" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.29.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578489" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.29.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578490" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.29.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578491" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.29.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578493" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578494" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993218" version="1" comment="kernel-default is &lt;3.0.101-0.169.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993219" version="1" comment="kernel-default-base is &lt;3.0.101-0.169.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993221" version="1" comment="kernel-ec2 is &lt;3.0.101-0.169.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993222" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.169.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993224" version="1" comment="kernel-source is &lt;3.0.101-0.169.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993225" version="1" comment="kernel-syms is &lt;3.0.101-0.169.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993226" version="1" comment="kernel-trace is &lt;3.0.101-0.169.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993227" version="1" comment="kernel-trace-base is &lt;3.0.101-0.169.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993229" version="1" comment="kernel-xen is &lt;3.0.101-0.169.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993230" version="1" comment="kernel-xen-base is &lt;3.0.101-0.169.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993232" version="1" comment="kernel-default is &lt;3.0.101-0.174.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993233" version="1" comment="kernel-default-base is &lt;3.0.101-0.174.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993235" version="1" comment="kernel-ec2 is &lt;3.0.101-0.174.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993236" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.174.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993238" version="1" comment="kernel-source is &lt;3.0.101-0.174.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993239" version="1" comment="kernel-syms is &lt;3.0.101-0.174.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993240" version="1" comment="kernel-trace is &lt;3.0.101-0.174.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993241" version="1" comment="kernel-trace-base is &lt;3.0.101-0.174.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993243" version="1" comment="kernel-xen is &lt;3.0.101-0.174.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993244" version="1" comment="kernel-xen-base is &lt;3.0.101-0.174.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993246" version="1" comment="kernel-default is &lt;3.0.101-0.181.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993247" version="1" comment="kernel-default-base is &lt;3.0.101-0.181.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993249" version="1" comment="kernel-ec2 is &lt;3.0.101-0.181.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993250" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.181.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993252" version="1" comment="kernel-source is &lt;3.0.101-0.181.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993253" version="1" comment="kernel-syms is &lt;3.0.101-0.181.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993254" version="1" comment="kernel-trace is &lt;3.0.101-0.181.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993255" version="1" comment="kernel-trace-base is &lt;3.0.101-0.181.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993257" version="1" comment="kernel-xen is &lt;3.0.101-0.181.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993258" version="1" comment="kernel-xen-base is &lt;3.0.101-0.181.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578496" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.43.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578497" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.43.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578499" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.43.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578500" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.43.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578502" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.43.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578503" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.43.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578504" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.43.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568283" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.43.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568284" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.43.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578506" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.43.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578507" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.43.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578508" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.43.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578509" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.43.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578511" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.43.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578512" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.43.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993260" version="1" comment="kernel-default is &lt;3.0.101-0.184.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993261" version="1" comment="kernel-default-base is &lt;3.0.101-0.184.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993263" version="1" comment="kernel-ec2 is &lt;3.0.101-0.184.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993264" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.184.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993266" version="1" comment="kernel-source is &lt;3.0.101-0.184.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993267" version="1" comment="kernel-syms is &lt;3.0.101-0.184.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993268" version="1" comment="kernel-trace is &lt;3.0.101-0.184.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993269" version="1" comment="kernel-trace-base is &lt;3.0.101-0.184.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993271" version="1" comment="kernel-xen is &lt;3.0.101-0.184.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993272" version="1" comment="kernel-xen-base is &lt;3.0.101-0.184.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993274" version="1" comment="kernel-default is &lt;3.0.101-0.190.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993275" version="1" comment="kernel-default-base is &lt;3.0.101-0.190.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993277" version="1" comment="kernel-ec2 is &lt;3.0.101-0.190.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993278" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.190.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993280" version="1" comment="kernel-source is &lt;3.0.101-0.190.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993281" version="1" comment="kernel-syms is &lt;3.0.101-0.190.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993282" version="1" comment="kernel-trace is &lt;3.0.101-0.190.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993283" version="1" comment="kernel-trace-base is &lt;3.0.101-0.190.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993285" version="1" comment="kernel-xen is &lt;3.0.101-0.190.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993286" version="1" comment="kernel-xen-base is &lt;3.0.101-0.190.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578514" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578515" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578517" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.59.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578518" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.59.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578520" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.59.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578521" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.59.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578522" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.59.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568300" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.59.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568301" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.59.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578524" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.59.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578525" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.59.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578526" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.59.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578527" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.59.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578529" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.59.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578530" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.59.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993288" version="1" comment="kernel-default is &lt;3.0.101-0.195.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993289" version="1" comment="kernel-default-base is &lt;3.0.101-0.195.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993291" version="1" comment="kernel-ec2 is &lt;3.0.101-0.195.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993292" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.195.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993294" version="1" comment="kernel-source is &lt;3.0.101-0.195.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993295" version="1" comment="kernel-syms is &lt;3.0.101-0.195.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993296" version="1" comment="kernel-trace is &lt;3.0.101-0.195.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993297" version="1" comment="kernel-trace-base is &lt;3.0.101-0.195.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993299" version="1" comment="kernel-xen is &lt;3.0.101-0.195.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993300" version="1" comment="kernel-xen-base is &lt;3.0.101-0.195.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589756" version="1" comment="iscsitarget-kmp-bigsmp is &lt;1.4.20_3.0.101_0.35-0.38.63 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993302" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993303" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589765" version="1" comment="ofed-kmp-bigsmp is &lt;1.5.4.1_3.0.101_0.35-0.13.69 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589766" version="1" comment="oracleasm-kmp-bigsmp is &lt;2.0.5_3.0.101_0.35-7.39.71 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578532" version="1" comment="iscsitarget-kmp-bigsmp is &lt;1.4.20_3.0.101_0.40-0.38.83 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578533" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578534" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578535" version="1" comment="ofed-kmp-bigsmp is &lt;1.5.4.1_3.0.101_0.40-0.13.89 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578536" version="1" comment="oracleasm-kmp-bigsmp is &lt;2.0.5_3.0.101_0.40-7.39.89 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578537" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578538" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578540" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.35.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578541" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.35.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578543" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.35.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578544" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578545" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568317" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.35.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568318" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.35.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578547" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.35.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578548" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.35.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578549" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.35.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578550" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.35.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578552" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578553" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578555" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.71.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578556" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.71.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578557" version="1" comment="kernel-default is &lt;3.0.101-0.47.71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578558" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578560" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.71.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578561" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578562" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566749" version="1" comment="kernel-pae is &lt;3.0.101-0.47.71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566750" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578564" version="1" comment="kernel-ppc64 is &lt;3.0.101-0.47.71.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578565" version="1" comment="kernel-ppc64-base is &lt;3.0.101-0.47.71.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578567" version="1" comment="kernel-source is &lt;3.0.101-0.47.71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578568" version="1" comment="kernel-syms is &lt;3.0.101-0.47.71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578569" version="1" comment="kernel-trace is &lt;3.0.101-0.47.71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578570" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566756" version="1" comment="kernel-xen is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566757" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578572" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.90.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578573" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.90.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578575" version="1" comment="kernel-default is &lt;3.0.101-0.47.90.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578576" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.90.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578578" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.90.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578579" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.90.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578580" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.90.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568334" version="1" comment="kernel-pae is &lt;3.0.101-0.47.90.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568335" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.90.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578582" version="1" comment="kernel-source is &lt;3.0.101-0.47.90.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578583" version="1" comment="kernel-syms is &lt;3.0.101-0.47.90.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578584" version="1" comment="kernel-trace is &lt;3.0.101-0.47.90.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578585" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.90.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578587" version="1" comment="kernel-xen is &lt;3.0.101-0.47.90.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578588" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.90.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578590" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578591" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578593" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.5.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578594" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.5.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578596" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.5.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578597" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578598" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568351" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568352" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578600" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.5.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578601" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.5.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578602" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.5.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578603" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.5.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578605" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578606" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578608" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.56.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578609" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.56.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578611" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.56.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578612" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.56.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578614" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.56.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578615" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.56.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578616" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.56.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568368" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.56.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568369" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.56.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578618" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.56.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578619" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.56.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578620" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.56.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578621" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.56.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578623" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.56.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578624" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.56.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993305" version="1" comment="kernel-default is &lt;3.0.101-0.200.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993306" version="1" comment="kernel-default-base is &lt;3.0.101-0.200.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993308" version="1" comment="kernel-ec2 is &lt;3.0.101-0.200.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993309" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.200.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993311" version="1" comment="kernel-source is &lt;3.0.101-0.200.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993312" version="1" comment="kernel-syms is &lt;3.0.101-0.200.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993313" version="1" comment="kernel-trace is &lt;3.0.101-0.200.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993314" version="1" comment="kernel-trace-base is &lt;3.0.101-0.200.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993316" version="1" comment="kernel-xen is &lt;3.0.101-0.200.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993317" version="1" comment="kernel-xen-base is &lt;3.0.101-0.200.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993319" version="1" comment="xen is &lt;4.2.5_21-47.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993320" version="1" comment="xen-doc-html is &lt;4.2.5_21-47.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993321" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-47.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993322" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.200.TDC-47.34.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993323" version="1" comment="xen-libs is &lt;4.2.5_21-47.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993324" version="1" comment="xen-tools is &lt;4.2.5_21-47.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993325" version="1" comment="xen-tools-domU is &lt;4.2.5_21-47.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993326" version="1" comment="kernel-default is &lt;3.0.101-0.207.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993327" version="1" comment="kernel-default-base is &lt;3.0.101-0.207.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993329" version="1" comment="kernel-ec2 is &lt;3.0.101-0.207.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993330" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.207.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993332" version="1" comment="kernel-source is &lt;3.0.101-0.207.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993333" version="1" comment="kernel-syms is &lt;3.0.101-0.207.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993334" version="1" comment="kernel-trace is &lt;3.0.101-0.207.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993335" version="1" comment="kernel-trace-base is &lt;3.0.101-0.207.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993337" version="1" comment="kernel-xen is &lt;3.0.101-0.207.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993338" version="1" comment="kernel-xen-base is &lt;3.0.101-0.207.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993340" version="1" comment="kernel-default is &lt;3.0.101-0.210.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993341" version="1" comment="kernel-default-base is &lt;3.0.101-0.210.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993343" version="1" comment="kernel-ec2 is &lt;3.0.101-0.210.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993344" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.210.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993346" version="1" comment="kernel-source is &lt;3.0.101-0.210.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993347" version="1" comment="kernel-syms is &lt;3.0.101-0.210.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993348" version="1" comment="kernel-trace is &lt;3.0.101-0.210.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993349" version="1" comment="kernel-trace-base is &lt;3.0.101-0.210.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993351" version="1" comment="kernel-xen is &lt;3.0.101-0.210.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993352" version="1" comment="kernel-xen-base is &lt;3.0.101-0.210.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993354" version="1" comment="kernel-default is &lt;3.0.101-0.213.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993355" version="1" comment="kernel-default-base is &lt;3.0.101-0.213.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993357" version="1" comment="kernel-ec2 is &lt;3.0.101-0.213.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993358" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.213.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993360" version="1" comment="kernel-source is &lt;3.0.101-0.213.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993361" version="1" comment="kernel-syms is &lt;3.0.101-0.213.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993362" version="1" comment="kernel-trace is &lt;3.0.101-0.213.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993363" version="1" comment="kernel-trace-base is &lt;3.0.101-0.213.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993365" version="1" comment="kernel-xen is &lt;3.0.101-0.213.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993366" version="1" comment="kernel-xen-base is &lt;3.0.101-0.213.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993368" version="1" comment="kernel-default is &lt;3.0.101-0.216.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993369" version="1" comment="kernel-default-base is &lt;3.0.101-0.216.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993371" version="1" comment="kernel-ec2 is &lt;3.0.101-0.216.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993372" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.216.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993374" version="1" comment="kernel-source is &lt;3.0.101-0.216.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993375" version="1" comment="kernel-syms is &lt;3.0.101-0.216.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993376" version="1" comment="kernel-trace is &lt;3.0.101-0.216.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993377" version="1" comment="kernel-trace-base is &lt;3.0.101-0.216.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993379" version="1" comment="kernel-xen is &lt;3.0.101-0.216.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993380" version="1" comment="kernel-xen-base is &lt;3.0.101-0.216.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993382" version="1" comment="kernel-default is &lt;3.0.101-0.219.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993383" version="1" comment="kernel-default-base is &lt;3.0.101-0.219.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993385" version="1" comment="kernel-ec2 is &lt;3.0.101-0.219.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993386" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.219.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993388" version="1" comment="kernel-source is &lt;3.0.101-0.219.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993389" version="1" comment="kernel-syms is &lt;3.0.101-0.219.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993390" version="1" comment="kernel-trace is &lt;3.0.101-0.219.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993391" version="1" comment="kernel-trace-base is &lt;3.0.101-0.219.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993393" version="1" comment="kernel-xen is &lt;3.0.101-0.219.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993394" version="1" comment="kernel-xen-base is &lt;3.0.101-0.219.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993396" version="1" comment="kernel-default is &lt;3.0.101-0.222.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993397" version="1" comment="kernel-default-base is &lt;3.0.101-0.222.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993399" version="1" comment="kernel-ec2 is &lt;3.0.101-0.222.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993400" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.222.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993402" version="1" comment="kernel-source is &lt;3.0.101-0.222.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993403" version="1" comment="kernel-syms is &lt;3.0.101-0.222.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993404" version="1" comment="kernel-trace is &lt;3.0.101-0.222.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993405" version="1" comment="kernel-trace-base is &lt;3.0.101-0.222.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993407" version="1" comment="kernel-xen is &lt;3.0.101-0.222.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993408" version="1" comment="kernel-xen-base is &lt;3.0.101-0.222.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993410" version="1" comment="kernel-default is &lt;3.0.101-0.230.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993411" version="1" comment="kernel-default-base is &lt;3.0.101-0.230.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993413" version="1" comment="kernel-ec2 is &lt;3.0.101-0.230.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993414" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.230.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993416" version="1" comment="kernel-source is &lt;3.0.101-0.230.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993417" version="1" comment="kernel-syms is &lt;3.0.101-0.230.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993418" version="1" comment="kernel-trace is &lt;3.0.101-0.230.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993419" version="1" comment="kernel-trace-base is &lt;3.0.101-0.230.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993421" version="1" comment="kernel-xen is &lt;3.0.101-0.230.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993422" version="1" comment="kernel-xen-base is &lt;3.0.101-0.230.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993424" version="1" comment="kernel-default is &lt;3.0.101-0.235.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993425" version="1" comment="kernel-default-base is &lt;3.0.101-0.235.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993427" version="1" comment="kernel-ec2 is &lt;3.0.101-0.235.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993428" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.235.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993430" version="1" comment="kernel-source is &lt;3.0.101-0.235.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993431" version="1" comment="kernel-syms is &lt;3.0.101-0.235.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993432" version="1" comment="kernel-trace is &lt;3.0.101-0.235.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993433" version="1" comment="kernel-trace-base is &lt;3.0.101-0.235.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993435" version="1" comment="kernel-xen is &lt;3.0.101-0.235.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993436" version="1" comment="kernel-xen-base is &lt;3.0.101-0.235.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993438" version="1" comment="kernel-default is &lt;3.0.101-0.238.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993439" version="1" comment="kernel-default-base is &lt;3.0.101-0.238.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993441" version="1" comment="kernel-ec2 is &lt;3.0.101-0.238.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993442" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.238.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993444" version="1" comment="kernel-source is &lt;3.0.101-0.238.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993445" version="1" comment="kernel-syms is &lt;3.0.101-0.238.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993446" version="1" comment="kernel-trace is &lt;3.0.101-0.238.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993447" version="1" comment="kernel-trace-base is &lt;3.0.101-0.238.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993449" version="1" comment="kernel-xen is &lt;3.0.101-0.238.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993450" version="1" comment="kernel-xen-base is &lt;3.0.101-0.238.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993452" version="1" comment="kernel-default is &lt;3.0.101-0.241.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993453" version="1" comment="kernel-default-base is &lt;3.0.101-0.241.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993455" version="1" comment="kernel-ec2 is &lt;3.0.101-0.241.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993456" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.241.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993458" version="1" comment="kernel-source is &lt;3.0.101-0.241.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993459" version="1" comment="kernel-syms is &lt;3.0.101-0.241.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993460" version="1" comment="kernel-trace is &lt;3.0.101-0.241.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993461" version="1" comment="kernel-trace-base is &lt;3.0.101-0.241.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993463" version="1" comment="kernel-xen is &lt;3.0.101-0.241.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993464" version="1" comment="kernel-xen-base is &lt;3.0.101-0.241.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993466" version="1" comment="kernel-default is &lt;3.0.101-0.244.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993467" version="1" comment="kernel-default-base is &lt;3.0.101-0.244.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993469" version="1" comment="kernel-ec2 is &lt;3.0.101-0.244.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993470" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.244.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993472" version="1" comment="kernel-source is &lt;3.0.101-0.244.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993473" version="1" comment="kernel-syms is &lt;3.0.101-0.244.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993474" version="1" comment="kernel-trace is &lt;3.0.101-0.244.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993475" version="1" comment="kernel-trace-base is &lt;3.0.101-0.244.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993477" version="1" comment="kernel-xen is &lt;3.0.101-0.244.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993478" version="1" comment="kernel-xen-base is &lt;3.0.101-0.244.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993480" version="1" comment="kernel-default is &lt;3.0.101-0.247.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993481" version="1" comment="kernel-default-base is &lt;3.0.101-0.247.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993483" version="1" comment="kernel-ec2 is &lt;3.0.101-0.247.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993484" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.247.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993486" version="1" comment="kernel-source is &lt;3.0.101-0.247.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993487" version="1" comment="kernel-syms is &lt;3.0.101-0.247.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993488" version="1" comment="kernel-trace is &lt;3.0.101-0.247.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993489" version="1" comment="kernel-trace-base is &lt;3.0.101-0.247.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993491" version="1" comment="kernel-xen is &lt;3.0.101-0.247.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993492" version="1" comment="kernel-xen-base is &lt;3.0.101-0.247.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993494" version="1" comment="iscsitarget is &lt;1.4.20-0.40.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993495" version="1" comment="iscsitarget-kmp-default is &lt;1.4.20_3.0.101_0.250.TDC-0.40.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993496" version="1" comment="iscsitarget-kmp-trace is &lt;1.4.20_3.0.101_0.250.TDC-0.40.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993497" version="1" comment="iscsitarget-kmp-xen is &lt;1.4.20_3.0.101_0.250.TDC-0.40.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993498" version="1" comment="kernel-default is &lt;3.0.101-0.250.TDC.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993499" version="1" comment="kernel-default-base is &lt;3.0.101-0.250.TDC.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993501" version="1" comment="kernel-ec2 is &lt;3.0.101-0.250.TDC.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993502" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.250.TDC.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993504" version="1" comment="kernel-source is &lt;3.0.101-0.250.TDC.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993505" version="1" comment="kernel-syms is &lt;3.0.101-0.250.TDC.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993506" version="1" comment="kernel-trace is &lt;3.0.101-0.250.TDC.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993507" version="1" comment="kernel-trace-base is &lt;3.0.101-0.250.TDC.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993509" version="1" comment="kernel-xen is &lt;3.0.101-0.250.TDC.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993510" version="1" comment="kernel-xen-base is &lt;3.0.101-0.250.TDC.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993512" version="1" comment="kernel-default is &lt;3.0.101-0.253.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993513" version="1" comment="kernel-default-base is &lt;3.0.101-0.253.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993515" version="1" comment="kernel-ec2 is &lt;3.0.101-0.253.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993516" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.253.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993518" version="1" comment="kernel-source is &lt;3.0.101-0.253.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993519" version="1" comment="kernel-syms is &lt;3.0.101-0.253.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993520" version="1" comment="kernel-trace is &lt;3.0.101-0.253.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993521" version="1" comment="kernel-trace-base is &lt;3.0.101-0.253.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993523" version="1" comment="kernel-xen is &lt;3.0.101-0.253.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993524" version="1" comment="kernel-xen-base is &lt;3.0.101-0.253.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993526" version="1" comment="kernel-default is &lt;3.0.101-0.258.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993527" version="1" comment="kernel-default-base is &lt;3.0.101-0.258.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993529" version="1" comment="kernel-ec2 is &lt;3.0.101-0.258.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993530" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.258.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993532" version="1" comment="kernel-source is &lt;3.0.101-0.258.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993533" version="1" comment="kernel-syms is &lt;3.0.101-0.258.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993534" version="1" comment="kernel-trace is &lt;3.0.101-0.258.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993535" version="1" comment="kernel-trace-base is &lt;3.0.101-0.258.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993537" version="1" comment="kernel-xen is &lt;3.0.101-0.258.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993538" version="1" comment="kernel-xen-base is &lt;3.0.101-0.258.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993540" version="1" comment="kernel-default is &lt;3.0.101-0.261.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993541" version="1" comment="kernel-default-base is &lt;3.0.101-0.261.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993543" version="1" comment="kernel-ec2 is &lt;3.0.101-0.261.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993544" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.261.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993546" version="1" comment="kernel-source is &lt;3.0.101-0.261.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993547" version="1" comment="kernel-syms is &lt;3.0.101-0.261.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993548" version="1" comment="kernel-trace is &lt;3.0.101-0.261.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993549" version="1" comment="kernel-trace-base is &lt;3.0.101-0.261.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993551" version="1" comment="kernel-xen is &lt;3.0.101-0.261.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993552" version="1" comment="kernel-xen-base is &lt;3.0.101-0.261.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993554" version="1" comment="kernel-default is &lt;3.0.101-0.266.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993555" version="1" comment="kernel-default-base is &lt;3.0.101-0.266.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993557" version="1" comment="kernel-ec2 is &lt;3.0.101-0.266.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993558" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.266.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993560" version="1" comment="kernel-source is &lt;3.0.101-0.266.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993561" version="1" comment="kernel-syms is &lt;3.0.101-0.266.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993562" version="1" comment="kernel-trace is &lt;3.0.101-0.266.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993563" version="1" comment="kernel-trace-base is &lt;3.0.101-0.266.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993565" version="1" comment="kernel-xen is &lt;3.0.101-0.266.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993566" version="1" comment="kernel-xen-base is &lt;3.0.101-0.266.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993568" version="1" comment="kernel-default is &lt;3.0.101-0.269.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993569" version="1" comment="kernel-default-base is &lt;3.0.101-0.269.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993571" version="1" comment="kernel-ec2 is &lt;3.0.101-0.269.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993572" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.269.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993574" version="1" comment="kernel-source is &lt;3.0.101-0.269.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993575" version="1" comment="kernel-syms is &lt;3.0.101-0.269.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993576" version="1" comment="kernel-trace is &lt;3.0.101-0.269.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993577" version="1" comment="kernel-trace-base is &lt;3.0.101-0.269.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993579" version="1" comment="kernel-xen is &lt;3.0.101-0.269.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993580" version="1" comment="kernel-xen-base is &lt;3.0.101-0.269.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578626" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578627" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578629" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.22.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578630" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.22.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578632" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.22.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578633" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.22.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578634" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.22.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568385" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.22.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568386" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.22.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578636" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.22.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578637" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.22.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578638" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.22.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578639" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.22.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578641" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.22.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578642" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.22.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993582" version="1" comment="kernel-default is &lt;3.0.101-0.187.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993583" version="1" comment="kernel-default-base is &lt;3.0.101-0.187.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993585" version="1" comment="kernel-ec2 is &lt;3.0.101-0.187.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993586" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.187.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993588" version="1" comment="kernel-source is &lt;3.0.101-0.187.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993589" version="1" comment="kernel-syms is &lt;3.0.101-0.187.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993590" version="1" comment="kernel-trace is &lt;3.0.101-0.187.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993591" version="1" comment="kernel-trace-base is &lt;3.0.101-0.187.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993593" version="1" comment="kernel-xen is &lt;3.0.101-0.187.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993594" version="1" comment="kernel-xen-base is &lt;3.0.101-0.187.TDC.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578644" version="1" comment="krb5 is &lt;1.6.3-133.49.62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578645" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.62.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578646" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578647" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578648" version="1" comment="krb5-client is &lt;1.6.3-133.49.62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578649" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578650" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578651" version="1" comment="krb5-server is &lt;1.6.3-133.49.62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578652" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.62.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578653" version="1" comment="krb5 is &lt;1.6.3-133.49.97.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578654" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.97.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578655" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.97.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578656" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.97.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578657" version="1" comment="krb5-client is &lt;1.6.3-133.49.97.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578658" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.97.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578659" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.97.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578660" version="1" comment="krb5-server is &lt;1.6.3-133.49.97.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578661" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.97.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578662" version="1" comment="krb5 is &lt;1.6.3-133.49.103.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578663" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.103.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578664" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.103.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578665" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.103.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578666" version="1" comment="krb5-client is &lt;1.6.3-133.49.103.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578667" version="1" comment="krb5-server is &lt;1.6.3-133.49.103.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578668" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.103.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993596" version="1" comment="krb5 is &lt;1.8.6-133.49.125.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993597" version="1" comment="krb5-32bit is &lt;1.8.6-133.49.125.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993598" version="1" comment="krb5-apps-clients is &lt;1.8.6-133.49.125.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993599" version="1" comment="krb5-apps-servers is &lt;1.8.6-133.49.125.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993600" version="1" comment="krb5-client is &lt;1.8.6-133.49.125.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993601" version="1" comment="krb5-devel is &lt;1.8.6-133.49.125.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993602" version="1" comment="krb5-devel-32bit is &lt;1.8.6-133.49.125.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993603" version="1" comment="krb5-doc is &lt;1.8.6-133.49.125.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993604" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.8.6-133.49.125.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993605" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.8.6-133.49.125.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993606" version="1" comment="krb5-server is &lt;1.8.6-133.49.125.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578669" version="1" comment="krb5 is &lt;1.6.3-133.49.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578670" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.64.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578671" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578672" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578673" version="1" comment="krb5-client is &lt;1.6.3-133.49.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578674" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578675" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578676" version="1" comment="krb5-server is &lt;1.6.3-133.49.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578677" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.64.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578678" version="1" comment="krb5 is &lt;1.6.3-133.49.66.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578679" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.66.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578680" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.66.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578681" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.66.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578682" version="1" comment="krb5-client is &lt;1.6.3-133.49.66.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578683" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.66.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578684" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.66.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578685" version="1" comment="krb5-server is &lt;1.6.3-133.49.66.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578686" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.66.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578687" version="1" comment="krb5 is &lt;1.6.3-133.49.68.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578688" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.68.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578689" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.68.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578690" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.68.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578691" version="1" comment="krb5-client is &lt;1.6.3-133.49.68.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578692" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.68.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578693" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.68.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578694" version="1" comment="krb5-server is &lt;1.6.3-133.49.68.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578695" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.68.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578696" version="1" comment="kvm is &lt;1.4.2-0.17.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578697" version="1" comment="kvm is &lt;1.4.2-0.22.34.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578698" version="1" comment="kvm is &lt;1.4.2-37.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578699" version="1" comment="kvm is &lt;1.4.2-46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578700" version="1" comment="kvm is &lt;1.4.2-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578701" version="1" comment="kvm is &lt;1.4.2-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578702" version="1" comment="kvm is &lt;1.4.2-53.11.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578703" version="1" comment="kvm is &lt;1.4.2-53.14.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578704" version="1" comment="kvm is &lt;1.4.2-53.17.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578705" version="1" comment="kvm is &lt;1.4.2-53.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578706" version="1" comment="kvm is &lt;1.4.2-53.23.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578707" version="1" comment="kvm is &lt;1.4.2-53.26.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578708" version="1" comment="kvm is &lt;1.4.2-53.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578709" version="1" comment="kvm is &lt;1.4.2-53.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578710" version="1" comment="kvm is &lt;1.4.2-53.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578711" version="1" comment="kvm is &lt;1.4.2-53.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626873" version="1" comment="kvm is &lt;1.4.2-53.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630650" version="1" comment="kvm is &lt;1.4.2-53.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578712" version="1" comment="kvm is &lt;1.4.2-0.21.4 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578713" version="1" comment="libvirt is &lt;1.0.5.9-0.19.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578714" version="1" comment="libvirt-client is &lt;1.0.5.9-0.19.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578715" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-0.19.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578716" version="1" comment="libvirt-doc is &lt;1.0.5.9-0.19.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578717" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-0.19.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578718" version="1" comment="libvirt-python is &lt;1.0.5.9-0.19.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578719" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563420" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.29.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563421" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.29.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578720" version="1" comment="libqt4 is &lt;4.6.3-5.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578721" version="1" comment="libqt4-32bit is &lt;4.6.3-5.29.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578722" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578723" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.29.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578724" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.29.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578725" version="1" comment="libqt4-sql is &lt;4.6.3-5.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578726" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.29.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578727" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578728" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578729" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.29.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578730" version="1" comment="libqt4-x11 is &lt;4.6.3-5.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578731" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.29.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578732" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.29.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578733" version="1" comment="libqt4-x86 is &lt;4.6.3-5.29.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578734" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578735" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.3.4-12.22.23.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993607" version="1" comment="libapr-util1 is &lt;1.3.4-12.22.23.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993608" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.3.4-12.22.23.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993609" version="1" comment="libblkid1 is &lt;2.19.1-6.54.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993610" version="1" comment="libblkid1-32bit is &lt;2.19.1-6.54.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993611" version="1" comment="libblkid1-x86 is &lt;2.19.1-6.54.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993612" version="1" comment="libuuid1 is &lt;2.19.1-6.54.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993613" version="1" comment="libuuid1-32bit is &lt;2.19.1-6.54.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993614" version="1" comment="libuuid1-x86 is &lt;2.19.1-6.54.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993615" version="1" comment="util-linux is &lt;2.19.1-6.54.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993616" version="1" comment="util-linux-lang is &lt;2.19.1-6.54.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993617" version="1" comment="uuid-runtime is &lt;2.19.1-6.54.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578736" version="1" comment="libcap-ng-utils is &lt;0.6.3-1.9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578737" version="1" comment="libcap-ng0 is &lt;0.6.3-1.9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578738" version="1" comment="libcap-ng0-32bit is &lt;0.6.3-1.9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578739" version="1" comment="libcares2 is &lt;1.7.4-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630424" version="1" comment="libcares2 is &lt;1.7.4-7.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578740" version="1" comment="libecpg6 is &lt;9.1.12-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578741" version="1" comment="libpq5 is &lt;9.1.12-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578742" version="1" comment="libpq5-32bit is &lt;9.1.12-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578743" version="1" comment="postgresql91 is &lt;9.1.12-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578744" version="1" comment="postgresql91-contrib is &lt;9.1.12-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578745" version="1" comment="postgresql91-docs is &lt;9.1.12-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578746" version="1" comment="postgresql91-server is &lt;9.1.12-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578747" version="1" comment="libevent-1_4-2 is &lt;1.4.5-24.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993618" version="1" comment="libexif is &lt;0.6.17-2.14.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993619" version="1" comment="libexif-32bit is &lt;0.6.17-2.14.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578748" version="1" comment="libfreebl3 is &lt;3.16.5-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578749" version="1" comment="libfreebl3-32bit is &lt;3.16.5-0.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578750" version="1" comment="libfreebl3-x86 is &lt;3.16.5-0.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578751" version="1" comment="libsoftokn3 is &lt;3.16.5-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578752" version="1" comment="libsoftokn3-32bit is &lt;3.16.5-0.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578753" version="1" comment="libsoftokn3-x86 is &lt;3.16.5-0.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578754" version="1" comment="mozilla-nss is &lt;3.16.5-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578755" version="1" comment="mozilla-nss-32bit is &lt;3.16.5-0.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578756" version="1" comment="mozilla-nss-tools is &lt;3.16.5-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578757" version="1" comment="mozilla-nss-x86 is &lt;3.16.5-0.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578758" version="1" comment="libgcrypt11 is &lt;1.5.0-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578759" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578760" version="1" comment="libgcrypt11-x86 is &lt;1.5.0-0.19.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578761" version="1" comment="libgcrypt11 is &lt;1.5.0-0.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578762" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578763" version="1" comment="libgcrypt11 is &lt;1.5.0-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578764" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578765" version="1" comment="libgcrypt11 is &lt;1.5.0-0.26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578766" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578767" version="1" comment="libgcrypt11 is &lt;1.5.0-0.26.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578768" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.26.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578769" version="1" comment="libgcrypt11 is &lt;1.5.0-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578770" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.17.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578771" version="1" comment="libgcrypt11-x86 is &lt;1.5.0-0.17.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578772" version="1" comment="libical0 is &lt;0.43-1.10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578773" version="1" comment="libical0-32bit is &lt;0.43-1.10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578774" version="1" comment="libjasper is &lt;1.900.1-134.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578775" version="1" comment="libjasper-32bit is &lt;1.900.1-134.13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578776" version="1" comment="libjasper-x86 is &lt;1.900.1-134.13.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578777" version="1" comment="libksba is &lt;1.0.4-1.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578778" version="1" comment="libksba is &lt;1.0.4-1.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993620" version="1" comment="libksba is &lt;1.0.4-1.26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993621" version="1" comment="libksba is &lt;1.0.4-1.26.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578779" version="1" comment="liblzo2-2 is &lt;2.03-12.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578780" version="1" comment="liblzo2-2-32bit is &lt;2.03-12.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578781" version="1" comment="liblzo2-2-x86 is &lt;2.03-12.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578782" version="1" comment="libmpfr1 is &lt;2.3.2-3.118.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578783" version="1" comment="libmpfr1-32bit is &lt;2.3.2-3.118.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578784" version="1" comment="libmpfr1-x86 is &lt;2.3.2-3.118.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578785" version="1" comment="libmspack0 is &lt;0.0.20060920alpha-74.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578786" version="1" comment="libmspack0 is &lt;0.0.20060920alpha-74.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578787" version="1" comment="libmysql55client18 is &lt;5.5.39-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578788" version="1" comment="libmysql55client18-32bit is &lt;5.5.39-0.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578789" version="1" comment="libmysql55client18-x86 is &lt;5.5.39-0.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578790" version="1" comment="libmysql55client_r18 is &lt;5.5.39-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578791" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.6.13 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578792" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.6.13 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578793" version="1" comment="libmysqlclient15-x86 is &lt;5.0.96-0.6.13 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578794" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.6.13 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578795" version="1" comment="mysql is &lt;5.5.39-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578796" version="1" comment="mysql-client is &lt;5.5.39-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578797" version="1" comment="mysql-tools is &lt;5.5.39-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578798" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.66.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578799" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.66.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578800" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.66.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578801" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.66.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578802" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.66.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578803" version="1" comment="openssl is &lt;0.9.8j-0.66.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578804" version="1" comment="openssl-doc is &lt;0.9.8j-0.66.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578805" version="1" comment="libpixman-1-0 is &lt;0.24.4-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578806" version="1" comment="libpixman-1-0-32bit is &lt;0.24.4-0.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578807" version="1" comment="libpixman-1-0-x86 is &lt;0.24.4-0.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578808" version="1" comment="libpng12-0 is &lt;1.2.31-5.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578809" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578810" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.33.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578811" version="1" comment="libpng12-0 is &lt;1.2.31-5.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578812" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578813" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.35.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578814" version="1" comment="libpng12-0 is &lt;1.2.31-5.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578815" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.38.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578816" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.38.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578817" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578818" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578819" version="1" comment="libpoppler5 is &lt;0.12.3-1.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578820" version="1" comment="poppler-tools is &lt;0.12.3-1.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578821" version="1" comment="libpulse-browse0 is &lt;0.9.23-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578822" version="1" comment="libpulse-mainloop-glib0 is &lt;0.9.23-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578823" version="1" comment="libpulse0 is &lt;0.9.23-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578824" version="1" comment="libpulse0-32bit is &lt;0.9.23-0.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578825" version="1" comment="libpulse0-x86 is &lt;0.9.23-0.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578826" version="1" comment="pulseaudio is &lt;0.9.23-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578827" version="1" comment="pulseaudio-esound-compat is &lt;0.9.23-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578828" version="1" comment="pulseaudio-gdm-hooks is &lt;0.9.23-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578829" version="1" comment="pulseaudio-lang is &lt;0.9.23-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578830" version="1" comment="pulseaudio-module-x11 is &lt;0.9.23-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578831" version="1" comment="pulseaudio-module-zeroconf is &lt;0.9.23-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578832" version="1" comment="pulseaudio-utils is &lt;0.9.23-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578833" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578834" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578835" version="1" comment="libqt4 is &lt;4.6.3-5.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578836" version="1" comment="libqt4-32bit is &lt;4.6.3-5.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578837" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578838" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578839" version="1" comment="libqt4-sql is &lt;4.6.3-5.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578840" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578841" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578842" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578843" version="1" comment="libqt4-x11 is &lt;4.6.3-5.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578844" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578845" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578846" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.42.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578847" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.42.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578848" version="1" comment="libqt4 is &lt;4.6.3-5.42.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578849" version="1" comment="libqt4-32bit is &lt;4.6.3-5.42.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578850" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.42.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578851" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.42.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578852" version="1" comment="libqt4-sql is &lt;4.6.3-5.42.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578853" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.42.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578854" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.42.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578855" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.42.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578856" version="1" comment="libqt4-x11 is &lt;4.6.3-5.42.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578857" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.42.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578858" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.42.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578859" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563473" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563474" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.32.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578860" version="1" comment="libqt4 is &lt;4.6.3-5.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578861" version="1" comment="libqt4-32bit is &lt;4.6.3-5.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578862" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578863" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578864" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.32.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578865" version="1" comment="libqt4-sql is &lt;4.6.3-5.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578866" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578867" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578868" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578869" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.32.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578870" version="1" comment="libqt4-x11 is &lt;4.6.3-5.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578871" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578872" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.32.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578873" version="1" comment="libqt4-x86 is &lt;4.6.3-5.32.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578874" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578875" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.34.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563489" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.34.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563490" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.34.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578876" version="1" comment="libqt4 is &lt;4.6.3-5.34.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578877" version="1" comment="libqt4-32bit is &lt;4.6.3-5.34.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578878" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.34.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578879" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.34.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578880" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.34.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578881" version="1" comment="libqt4-sql is &lt;4.6.3-5.34.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578882" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.34.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578883" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.34.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578884" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.34.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578885" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.34.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578886" version="1" comment="libqt4-x11 is &lt;4.6.3-5.34.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578887" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.34.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578888" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.34.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578889" version="1" comment="libqt4-x86 is &lt;4.6.3-5.34.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578890" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.34.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578891" version="1" comment="librsvg is &lt;2.26.0-2.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578892" version="1" comment="librsvg-32bit is &lt;2.26.0-2.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578893" version="1" comment="librsvg-x86 is &lt;2.26.0-2.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578894" version="1" comment="rsvg-view is &lt;2.26.0-2.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578895" version="1" comment="libsndfile is &lt;1.0.20-2.6.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578896" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.6.5 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578897" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.6.5 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578898" version="1" comment="libsndfile is &lt;1.0.20-2.10.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578899" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.10.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578900" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.10.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578901" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578902" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.22.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578903" version="1" comment="libsnmp15-x86 is &lt;5.4.2.1-8.12.22.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578904" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578905" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578906" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578907" version="1" comment="libsoup-2_4-1 is &lt;2.32.2-4.16.3.37 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578908" version="1" comment="libsoup-2_4-1-32bit is &lt;2.32.2-4.16.3.37 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578909" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578910" version="1" comment="libtasn1 is &lt;1.5-1.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578911" version="1" comment="libtasn1-3 is &lt;1.5-1.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578912" version="1" comment="libtasn1-3-32bit is &lt;1.5-1.28.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578913" version="1" comment="libtasn1-3-x86 is &lt;1.5-1.28.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993622" version="1" comment="libtasn1 is &lt;1.5-1.35.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993623" version="1" comment="libtasn1-3 is &lt;1.5-1.35.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993624" version="1" comment="libtasn1-3-32bit is &lt;1.5-1.35.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578914" version="1" comment="libtirpc1 is &lt;0.2.1-1.12.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578915" version="1" comment="rpcbind is &lt;0.1.6+git20080930-6.27.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578916" version="1" comment="libvirt is &lt;1.0.5.9-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578917" version="1" comment="libvirt-client is &lt;1.0.5.9-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578918" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-0.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578919" version="1" comment="libvirt-doc is &lt;1.0.5.9-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578920" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578921" version="1" comment="libvirt-python is &lt;1.0.5.9-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578922" version="1" comment="libvirt is &lt;1.0.5.9-21.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578923" version="1" comment="libvirt-client is &lt;1.0.5.9-21.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578924" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-21.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578925" version="1" comment="libvirt-doc is &lt;1.0.5.9-21.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578926" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-21.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578927" version="1" comment="libvirt-python is &lt;1.0.5.9-21.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578928" version="1" comment="libvirt is &lt;1.0.5.9-21.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578929" version="1" comment="libvirt-client is &lt;1.0.5.9-21.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578930" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-21.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578931" version="1" comment="libvirt-doc is &lt;1.0.5.9-21.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578932" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-21.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578933" version="1" comment="libvirt-python is &lt;1.0.5.9-21.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578934" version="1" comment="libvirt is &lt;1.0.5.9-21.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578935" version="1" comment="libvirt-client is &lt;1.0.5.9-21.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578936" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-21.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578937" version="1" comment="libvirt-doc is &lt;1.0.5.9-21.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578938" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-21.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578939" version="1" comment="libvirt-python is &lt;1.0.5.9-21.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578940" version="1" comment="libvirt is &lt;1.0.5.9-21.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578941" version="1" comment="libvirt-client is &lt;1.0.5.9-21.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578942" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-21.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578943" version="1" comment="libvirt-doc is &lt;1.0.5.9-21.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578944" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-21.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578945" version="1" comment="libvirt-python is &lt;1.0.5.9-21.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578946" version="1" comment="libvirt is &lt;1.0.5.9-21.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578947" version="1" comment="libvirt-client is &lt;1.0.5.9-21.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578948" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-21.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578949" version="1" comment="libvirt-doc is &lt;1.0.5.9-21.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578950" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-21.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578951" version="1" comment="libvirt-python is &lt;1.0.5.9-21.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578952" version="1" comment="libvirt is &lt;1.0.5.9-21.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578953" version="1" comment="libvirt-client is &lt;1.0.5.9-21.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578954" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-21.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578955" version="1" comment="libvirt-doc is &lt;1.0.5.9-21.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578956" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-21.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578957" version="1" comment="libvirt-python is &lt;1.0.5.9-21.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681450" version="1" comment="libvirt is &lt;1.0.5.9-21.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681451" version="1" comment="libvirt-client is &lt;1.0.5.9-21.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681452" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-21.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681453" version="1" comment="libvirt-doc is &lt;1.0.5.9-21.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681454" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-21.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681455" version="1" comment="libvirt-python is &lt;1.0.5.9-21.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578958" version="1" comment="LibVNCServer is &lt;0.9.1-156.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578959" version="1" comment="libwsman1 is &lt;2.2.3-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578960" version="1" comment="openwsman-client is &lt;2.2.3-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578961" version="1" comment="openwsman-server is &lt;2.2.3-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578962" version="1" comment="libxml2 is &lt;2.7.6-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578963" version="1" comment="libxml2-32bit is &lt;2.7.6-0.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578964" version="1" comment="libxml2-doc is &lt;2.7.6-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578965" version="1" comment="libxml2-python is &lt;2.7.6-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578966" version="1" comment="libxml2-x86 is &lt;2.7.6-0.31.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578967" version="1" comment="libxml2 is &lt;2.7.6-0.69.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578968" version="1" comment="libxml2-32bit is &lt;2.7.6-0.69.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578969" version="1" comment="libxml2-doc is &lt;2.7.6-0.69.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578970" version="1" comment="libxml2-python is &lt;2.7.6-0.69.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682702" version="1" comment="libxml2 is &lt;2.7.6-0.77.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682703" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682704" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682705" version="1" comment="libxml2-python is &lt;2.7.6-0.77.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993625" version="1" comment="libxml2 is &lt;2.7.6-0.77.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993626" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993627" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993628" version="1" comment="libxml2-python is &lt;2.7.6-0.77.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993629" version="1" comment="libxml2 is &lt;2.7.6-0.77.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993630" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993631" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993632" version="1" comment="libxml2-python is &lt;2.7.6-0.77.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578971" version="1" comment="libxml2 is &lt;2.7.6-0.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578972" version="1" comment="libxml2-32bit is &lt;2.7.6-0.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578973" version="1" comment="libxml2-doc is &lt;2.7.6-0.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578974" version="1" comment="libxml2-python is &lt;2.7.6-0.34.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578975" version="1" comment="libxml2-x86 is &lt;2.7.6-0.34.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578976" version="1" comment="libxml2 is &lt;2.7.6-0.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578977" version="1" comment="libxml2-32bit is &lt;2.7.6-0.37.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578978" version="1" comment="libxml2-doc is &lt;2.7.6-0.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578979" version="1" comment="libxml2-python is &lt;2.7.6-0.37.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578980" version="1" comment="libxml2-x86 is &lt;2.7.6-0.37.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993633" version="1" comment="libxslt is &lt;1.1.24-19.34.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993634" version="1" comment="libxslt-32bit is &lt;1.1.24-19.34.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993635" version="1" comment="libyajl1 is &lt;1.0.11-6.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993636" version="1" comment="libyajl1-32bit is &lt;1.0.11-6.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591537" version="1" comment="libzypp is &lt;9.37.1-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578981" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.96.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578982" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.96.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578984" version="1" comment="kernel-default is &lt;3.0.101-0.47.96.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578985" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.96.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578987" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.96.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578988" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.96.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578989" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.96.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568449" version="1" comment="kernel-pae is &lt;3.0.101-0.47.96.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568450" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.96.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578991" version="1" comment="kernel-source is &lt;3.0.101-0.47.96.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578992" version="1" comment="kernel-syms is &lt;3.0.101-0.47.96.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578993" version="1" comment="kernel-trace is &lt;3.0.101-0.47.96.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578994" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.96.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578996" version="1" comment="kernel-xen is &lt;3.0.101-0.47.96.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578997" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.96.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993637" version="1" comment="lldpad is &lt;0.9.45-0.13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993638" version="1" comment="log4net is &lt;1.2.10-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993639" version="1" comment="logrotate is &lt;3.7.7-10.30.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993640" version="1" comment="liblua5_1 is &lt;5.1.4-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578999" version="1" comment="lxc is &lt;0.8.0-0.21.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579000" version="1" comment="lxc is &lt;0.8.0-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579001" version="1" comment="mailman is &lt;2.1.15-9.6.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993641" version="1" comment="mailman is &lt;2.1.15-9.6.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993642" version="1" comment="mailx is &lt;12.5-1.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579002" version="1" comment="MozillaFirefox is &lt;45.5.1esr-59.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579003" version="1" comment="MozillaFirefox-translations is &lt;45.5.1esr-59.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579004" version="1" comment="libfreebl3 is &lt;3.21.3-39.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579005" version="1" comment="libfreebl3-32bit is &lt;3.21.3-39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579006" version="1" comment="libsoftokn3 is &lt;3.21.3-39.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579007" version="1" comment="libsoftokn3-32bit is &lt;3.21.3-39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579008" version="1" comment="mozilla-nss is &lt;3.21.3-39.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579009" version="1" comment="mozilla-nss-32bit is &lt;3.21.3-39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579010" version="1" comment="mozilla-nss-tools is &lt;3.21.3-39.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579011" version="1" comment="microcode_ctl is &lt;1.17-102.83.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579012" version="1" comment="microcode_ctl is &lt;1.17-102.83.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579013" version="1" comment="microcode_ctl is &lt;1.17-102.83.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579014" version="1" comment="microcode_ctl is &lt;1.17-102.83.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579015" version="1" comment="microcode_ctl is &lt;1.17-102.83.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579016" version="1" comment="microcode_ctl is &lt;1.17-102.83.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579017" version="1" comment="microcode_ctl is &lt;1.17-102.83.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579018" version="1" comment="microcode_ctl is &lt;1.17-102.83.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579019" version="1" comment="microcode_ctl is &lt;1.17-102.83.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579020" version="1" comment="microcode_ctl is &lt;1.17-102.83.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579021" version="1" comment="microcode_ctl is &lt;1.17-102.83.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579022" version="1" comment="microcode_ctl is &lt;1.17-102.83.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579023" version="1" comment="microcode_ctl is &lt;1.17-102.83.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683760" version="1" comment="microcode_ctl is &lt;1.17-102.83.75.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993643" version="1" comment="microcode_ctl is &lt;1.17-102.83.78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993644" version="1" comment="mokutil is &lt;0.1.0-0.23.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993645" version="1" comment="mono-core is &lt;2.6.7-0.16.1 for ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993646" version="1" comment="mono-data is &lt;2.6.7-0.16.1 for ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993647" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.16.1 for ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993648" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.16.1 for ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993649" version="1" comment="mono-locale-extras is &lt;2.6.7-0.16.1 for ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993650" version="1" comment="mono-nunit is &lt;2.6.7-0.16.1 for ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993651" version="1" comment="mono-web is &lt;2.6.7-0.16.1 for ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993652" version="1" comment="mono-winforms is &lt;2.6.7-0.16.1 for ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579032" version="1" comment="mono-core is &lt;2.6.7-0.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579033" version="1" comment="mono-data is &lt;2.6.7-0.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579034" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579035" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579036" version="1" comment="mono-locale-extras is &lt;2.6.7-0.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579037" version="1" comment="mono-nunit is &lt;2.6.7-0.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579038" version="1" comment="mono-web is &lt;2.6.7-0.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579039" version="1" comment="mono-winforms is &lt;2.6.7-0.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579040" version="1" comment="MozillaFirefox is &lt;38.6.0esr-31.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579041" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-18.24 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579042" version="1" comment="MozillaFirefox-translations is &lt;38.6.0esr-31.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579043" version="1" comment="libfreebl3 is &lt;3.20.2-25.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579044" version="1" comment="libfreebl3-32bit is &lt;3.20.2-25.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579045" version="1" comment="libfreebl3-x86 is &lt;3.20.2-25.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579046" version="1" comment="libsoftokn3 is &lt;3.20.2-25.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579047" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-25.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579048" version="1" comment="libsoftokn3-x86 is &lt;3.20.2-25.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579049" version="1" comment="mozilla-nss is &lt;3.20.2-25.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579050" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-25.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579051" version="1" comment="mozilla-nss-tools is &lt;3.20.2-25.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579052" version="1" comment="mozilla-nss-x86 is &lt;3.20.2-25.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579053" version="1" comment="mozilla-nspr is &lt;4.10.8-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579054" version="1" comment="mozilla-nspr-32bit is &lt;4.10.8-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579055" version="1" comment="mozilla-nspr-x86 is &lt;4.10.8-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993653" version="1" comment="libfreebl3 is &lt;3.79-47.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993654" version="1" comment="libfreebl3-32bit is &lt;3.79-47.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993655" version="1" comment="libsoftokn3 is &lt;3.79-47.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993656" version="1" comment="libsoftokn3-32bit is &lt;3.79-47.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993657" version="1" comment="mozilla-nspr is &lt;4.34-33.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993658" version="1" comment="mozilla-nspr-32bit is &lt;4.34-33.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993659" version="1" comment="mozilla-nss is &lt;3.79-47.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993660" version="1" comment="mozilla-nss-32bit is &lt;3.79-47.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993661" version="1" comment="mozilla-nss-certs is &lt;3.79-47.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993662" version="1" comment="mozilla-nss-certs-32bit is &lt;3.79-47.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993663" version="1" comment="mozilla-nss-tools is &lt;3.79-47.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579056" version="1" comment="libfreebl3 is &lt;3.19.2.2-22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579057" version="1" comment="libfreebl3-32bit is &lt;3.19.2.2-22.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579058" version="1" comment="libfreebl3-x86 is &lt;3.19.2.2-22.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579059" version="1" comment="libsoftokn3 is &lt;3.19.2.2-22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579060" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.2-22.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579061" version="1" comment="libsoftokn3-x86 is &lt;3.19.2.2-22.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579062" version="1" comment="mozilla-nss is &lt;3.19.2.2-22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579063" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.2-22.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579064" version="1" comment="mozilla-nss-tools is &lt;3.19.2.2-22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579065" version="1" comment="mozilla-nss-x86 is &lt;3.19.2.2-22.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659172" version="1" comment="libfreebl3 is &lt;3.68.1-47.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659173" version="1" comment="libfreebl3-32bit is &lt;3.68.1-47.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659174" version="1" comment="libsoftokn3 is &lt;3.68.1-47.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659175" version="1" comment="libsoftokn3-32bit is &lt;3.68.1-47.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659176" version="1" comment="mozilla-nss is &lt;3.68.1-47.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659177" version="1" comment="mozilla-nss-32bit is &lt;3.68.1-47.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659178" version="1" comment="mozilla-nss-certs is &lt;3.68.1-47.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659179" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68.1-47.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659180" version="1" comment="mozilla-nss-tools is &lt;3.68.1-47.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678408" version="1" comment="libfreebl3 is &lt;3.68.3-47.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678409" version="1" comment="libfreebl3-32bit is &lt;3.68.3-47.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678410" version="1" comment="libsoftokn3 is &lt;3.68.3-47.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678411" version="1" comment="libsoftokn3-32bit is &lt;3.68.3-47.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678412" version="1" comment="mozilla-nss is &lt;3.68.3-47.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678413" version="1" comment="mozilla-nss-32bit is &lt;3.68.3-47.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678414" version="1" comment="mozilla-nss-certs is &lt;3.68.3-47.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678415" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68.3-47.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678416" version="1" comment="mozilla-nss-tools is &lt;3.68.3-47.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993664" version="1" comment="libfreebl3 is &lt;3.68.4-47.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993665" version="1" comment="libfreebl3-32bit is &lt;3.68.4-47.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993666" version="1" comment="libsoftokn3 is &lt;3.68.4-47.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993667" version="1" comment="libsoftokn3-32bit is &lt;3.68.4-47.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993668" version="1" comment="mozilla-nss is &lt;3.68.4-47.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993669" version="1" comment="mozilla-nss-32bit is &lt;3.68.4-47.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993670" version="1" comment="mozilla-nss-certs is &lt;3.68.4-47.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993671" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68.4-47.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993672" version="1" comment="mozilla-nss-tools is &lt;3.68.4-47.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993673" version="1" comment="MozillaFirefox is &lt;102.7.0-72.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993674" version="1" comment="MozillaFirefox-translations-common is &lt;102.7.0-72.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993675" version="1" comment="MozillaFirefox-translations-other is &lt;102.7.0-72.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993676" version="1" comment="libfreebl3 is &lt;3.79.3-47.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993677" version="1" comment="libfreebl3-32bit is &lt;3.79.3-47.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993678" version="1" comment="libsoftokn3 is &lt;3.79.3-47.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993679" version="1" comment="libsoftokn3-32bit is &lt;3.79.3-47.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993680" version="1" comment="mozilla-nss is &lt;3.79.3-47.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993681" version="1" comment="mozilla-nss-32bit is &lt;3.79.3-47.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993682" version="1" comment="mozilla-nss-certs is &lt;3.79.3-47.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993683" version="1" comment="mozilla-nss-certs-32bit is &lt;3.79.3-47.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993684" version="1" comment="mozilla-nss-tools is &lt;3.79.3-47.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993685" version="1" comment="MozillaFirefox is &lt;102.8.0-72.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993686" version="1" comment="MozillaFirefox-translations-common is &lt;102.8.0-72.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993687" version="1" comment="MozillaFirefox-translations-other is &lt;102.8.0-72.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993688" version="1" comment="libfreebl3 is &lt;3.79.4-47.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993689" version="1" comment="libfreebl3-32bit is &lt;3.79.4-47.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993690" version="1" comment="libsoftokn3 is &lt;3.79.4-47.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993691" version="1" comment="libsoftokn3-32bit is &lt;3.79.4-47.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993692" version="1" comment="mozilla-nss is &lt;3.79.4-47.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993693" version="1" comment="mozilla-nss-32bit is &lt;3.79.4-47.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993694" version="1" comment="mozilla-nss-certs is &lt;3.79.4-47.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993695" version="1" comment="mozilla-nss-certs-32bit is &lt;3.79.4-47.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993696" version="1" comment="mozilla-nss-tools is &lt;3.79.4-47.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579066" version="1" comment="libfreebl3 is &lt;3.15.2-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579067" version="1" comment="libfreebl3-32bit is &lt;3.15.2-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579068" version="1" comment="libfreebl3-x86 is &lt;3.15.2-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579069" version="1" comment="libsoftokn3 is &lt;3.15.2-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579070" version="1" comment="libsoftokn3-32bit is &lt;3.15.2-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579071" version="1" comment="libsoftokn3-x86 is &lt;3.15.2-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579072" version="1" comment="mozilla-nss is &lt;3.15.2-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579073" version="1" comment="mozilla-nss-32bit is &lt;3.15.2-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579074" version="1" comment="mozilla-nss-tools is &lt;3.15.2-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579075" version="1" comment="mozilla-nss-x86 is &lt;3.15.2-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634789" version="1" comment="libfreebl3 is &lt;3.68-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634790" version="1" comment="libfreebl3-32bit is &lt;3.68-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634791" version="1" comment="libsoftokn3 is &lt;3.68-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634792" version="1" comment="libsoftokn3-32bit is &lt;3.68-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634793" version="1" comment="mozilla-nspr is &lt;4.32-33.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634794" version="1" comment="mozilla-nspr-32bit is &lt;4.32-33.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634795" version="1" comment="mozilla-nss is &lt;3.68-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634796" version="1" comment="mozilla-nss-32bit is &lt;3.68-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634797" version="1" comment="mozilla-nss-certs is &lt;3.68-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634798" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634799" version="1" comment="mozilla-nss-tools is &lt;3.68-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579076" version="1" comment="mutt is &lt;1.5.17-42.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579077" version="1" comment="mutt is &lt;1.5.17-42.43.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579078" version="1" comment="libmysql55client18 is &lt;5.5.45-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579079" version="1" comment="libmysql55client18-32bit is &lt;5.5.45-0.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579080" version="1" comment="libmysql55client18-x86 is &lt;5.5.45-0.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579081" version="1" comment="libmysql55client_r18 is &lt;5.5.45-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579082" version="1" comment="mysql is &lt;5.5.45-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579083" version="1" comment="mysql-client is &lt;5.5.45-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579084" version="1" comment="mysql-tools is &lt;5.5.45-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579085" version="1" comment="libmysql55client18 is &lt;5.5.46-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579086" version="1" comment="libmysql55client18-32bit is &lt;5.5.46-0.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579087" version="1" comment="libmysql55client18-x86 is &lt;5.5.46-0.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579088" version="1" comment="libmysql55client_r18 is &lt;5.5.46-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579089" version="1" comment="mysql is &lt;5.5.46-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579090" version="1" comment="mysql-client is &lt;5.5.46-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579091" version="1" comment="mysql-tools is &lt;5.5.46-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579092" version="1" comment="libmysql55client18 is &lt;5.5.47-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579093" version="1" comment="libmysql55client18-32bit is &lt;5.5.47-0.17.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579094" version="1" comment="libmysql55client18-x86 is &lt;5.5.47-0.17.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579095" version="1" comment="libmysql55client_r18 is &lt;5.5.47-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579096" version="1" comment="mysql is &lt;5.5.47-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579097" version="1" comment="mysql-client is &lt;5.5.47-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579098" version="1" comment="mysql-tools is &lt;5.5.47-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579099" version="1" comment="libmysql55client18 is &lt;5.5.49-0.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579100" version="1" comment="libmysql55client18-32bit is &lt;5.5.49-0.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579101" version="1" comment="libmysql55client_r18 is &lt;5.5.49-0.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579102" version="1" comment="mysql is &lt;5.5.49-0.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579103" version="1" comment="mysql-client is &lt;5.5.49-0.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579104" version="1" comment="mysql-tools is &lt;5.5.49-0.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579105" version="1" comment="libmysql55client18 is &lt;5.5.52-0.27.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579106" version="1" comment="libmysql55client18-32bit is &lt;5.5.52-0.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579107" version="1" comment="libmysql55client_r18 is &lt;5.5.52-0.27.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579108" version="1" comment="mysql is &lt;5.5.52-0.27.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579109" version="1" comment="mysql-client is &lt;5.5.52-0.27.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579110" version="1" comment="mysql-tools is &lt;5.5.52-0.27.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579111" version="1" comment="libmysql55client18 is &lt;5.5.53-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579112" version="1" comment="libmysql55client18-32bit is &lt;5.5.53-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579113" version="1" comment="libmysql55client_r18 is &lt;5.5.53-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579114" version="1" comment="mysql is &lt;5.5.53-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579115" version="1" comment="mysql-client is &lt;5.5.53-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579116" version="1" comment="mysql-tools is &lt;5.5.53-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579117" version="1" comment="libmysql55client18 is &lt;5.5.54-0.35.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579118" version="1" comment="libmysql55client18-32bit is &lt;5.5.54-0.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579119" version="1" comment="libmysql55client_r18 is &lt;5.5.54-0.35.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579120" version="1" comment="mysql is &lt;5.5.54-0.35.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579121" version="1" comment="mysql-client is &lt;5.5.54-0.35.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579122" version="1" comment="mysql-tools is &lt;5.5.54-0.35.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579123" version="1" comment="libmysql55client18 is &lt;5.5.55-0.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579124" version="1" comment="libmysql55client18-32bit is &lt;5.5.55-0.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579125" version="1" comment="libmysql55client_r18 is &lt;5.5.55-0.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579126" version="1" comment="mysql is &lt;5.5.55-0.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579127" version="1" comment="mysql-client is &lt;5.5.55-0.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579128" version="1" comment="mysql-tools is &lt;5.5.55-0.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579129" version="1" comment="libmysql55client18 is &lt;5.5.57-0.39.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579130" version="1" comment="libmysql55client18-32bit is &lt;5.5.57-0.39.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579131" version="1" comment="libmysql55client_r18 is &lt;5.5.57-0.39.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579132" version="1" comment="mysql is &lt;5.5.57-0.39.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579133" version="1" comment="mysql-client is &lt;5.5.57-0.39.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579134" version="1" comment="mysql-tools is &lt;5.5.57-0.39.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579135" version="1" comment="libmysql55client18 is &lt;5.5.58-0.39.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579136" version="1" comment="libmysql55client18-32bit is &lt;5.5.58-0.39.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579137" version="1" comment="libmysql55client_r18 is &lt;5.5.58-0.39.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579138" version="1" comment="mysql is &lt;5.5.58-0.39.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579139" version="1" comment="mysql-client is &lt;5.5.58-0.39.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579140" version="1" comment="mysql-tools is &lt;5.5.58-0.39.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579141" version="1" comment="libmysql55client18 is &lt;5.5.59-0.39.9.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579142" version="1" comment="libmysql55client18-32bit is &lt;5.5.59-0.39.9.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579143" version="1" comment="libmysql55client_r18 is &lt;5.5.59-0.39.9.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579144" version="1" comment="mysql is &lt;5.5.59-0.39.9.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579145" version="1" comment="mysql-client is &lt;5.5.59-0.39.9.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579146" version="1" comment="mysql-tools is &lt;5.5.59-0.39.9.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579147" version="1" comment="libmysql55client18 is &lt;5.5.60-0.39.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579148" version="1" comment="libmysql55client18-32bit is &lt;5.5.60-0.39.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579149" version="1" comment="libmysql55client_r18 is &lt;5.5.60-0.39.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579150" version="1" comment="mysql is &lt;5.5.60-0.39.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579151" version="1" comment="mysql-client is &lt;5.5.60-0.39.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579152" version="1" comment="mysql-tools is &lt;5.5.60-0.39.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579153" version="1" comment="libmysql55client18 is &lt;5.5.61-0.39.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579154" version="1" comment="libmysql55client18-32bit is &lt;5.5.61-0.39.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579155" version="1" comment="libmysql55client_r18 is &lt;5.5.61-0.39.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579156" version="1" comment="mysql is &lt;5.5.61-0.39.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579157" version="1" comment="mysql-client is &lt;5.5.61-0.39.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579158" version="1" comment="mysql-tools is &lt;5.5.61-0.39.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579159" version="1" comment="libmysql55client18 is &lt;5.5.62-0.39.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579160" version="1" comment="libmysql55client18-32bit is &lt;5.5.62-0.39.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579161" version="1" comment="libmysql55client_r18 is &lt;5.5.62-0.39.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579162" version="1" comment="mysql is &lt;5.5.62-0.39.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579163" version="1" comment="mysql-client is &lt;5.5.62-0.39.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579164" version="1" comment="mysql-tools is &lt;5.5.62-0.39.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579165" version="1" comment="nagios is &lt;3.0.6-1.25.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579166" version="1" comment="nagios-www is &lt;3.0.6-1.25.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993697" version="1" comment="nagios is &lt;3.0.6-1.25.36.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993698" version="1" comment="nagios-www is &lt;3.0.6-1.25.36.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579167" version="1" comment="nagios-nrpe is &lt;2.12-24.4.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579168" version="1" comment="nagios-nrpe-doc is &lt;2.12-24.4.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579169" version="1" comment="nagios-plugins-nrpe is &lt;2.12-24.4.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579170" version="1" comment="nagios-plugins is &lt;1.4.16-0.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579171" version="1" comment="nagios-plugins-extras is &lt;1.4.16-0.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993699" version="1" comment="libncurses5 is &lt;5.6-93.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993700" version="1" comment="libncurses5-32bit is &lt;5.6-93.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993701" version="1" comment="libncurses6 is &lt;5.6-93.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993702" version="1" comment="libncurses6-32bit is &lt;5.6-93.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993703" version="1" comment="ncurses-devel is &lt;5.6-93.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993704" version="1" comment="ncurses-devel-32bit is &lt;5.6-93.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993705" version="1" comment="ncurses-utils is &lt;5.6-93.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993706" version="1" comment="tack is &lt;5.6-93.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993707" version="1" comment="terminfo is &lt;5.6-93.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993708" version="1" comment="terminfo-base is &lt;5.6-93.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579172" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579173" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.24.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579174" version="1" comment="libsnmp15-x86 is &lt;5.4.2.1-8.12.24.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579175" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579176" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579177" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993709" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.32.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993710" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.32.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993711" version="1" comment="libsnmp15-openssl1 is &lt;5.4.2.1-8.12.32.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993712" version="1" comment="libsnmp15-openssl1-32bit is &lt;5.4.2.1-8.12.32.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993713" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.32.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993714" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.32.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993715" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.32.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579178" version="1" comment="libfreebl3 is &lt;3.15.3-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579179" version="1" comment="libfreebl3-32bit is &lt;3.15.3-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579180" version="1" comment="libfreebl3-x86 is &lt;3.15.3-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579181" version="1" comment="libsoftokn3 is &lt;3.15.3-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579182" version="1" comment="libsoftokn3-32bit is &lt;3.15.3-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579183" version="1" comment="libsoftokn3-x86 is &lt;3.15.3-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579184" version="1" comment="mozilla-nss is &lt;3.15.3-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579185" version="1" comment="mozilla-nss-32bit is &lt;3.15.3-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579186" version="1" comment="mozilla-nss-tools is &lt;3.15.3-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579187" version="1" comment="mozilla-nss-x86 is &lt;3.15.3-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993716" version="1" comment="ntp is &lt;4.2.4p8-1.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993717" version="1" comment="ntp-doc is &lt;4.2.4p8-1.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579188" version="1" comment="ntp is &lt;4.2.8p12-48.21.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579189" version="1" comment="ntp-doc is &lt;4.2.8p12-48.21.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993718" version="1" comment="open-iscsi is &lt;2.0.873-0.41.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579190" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579191" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579192" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579193" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.26-0.35.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579194" version="1" comment="openldap2 is &lt;2.4.26-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579195" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579196" version="1" comment="openldap2-client is &lt;2.4.26-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579197" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.74.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579198" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.74.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579199" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.74.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579200" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.74.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579201" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.74.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579202" version="1" comment="openldap2 is &lt;2.4.26-0.74.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579203" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.74.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579204" version="1" comment="openldap2-client is &lt;2.4.26-0.74.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579205" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.74.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579206" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.74.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579207" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.74.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579208" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.74.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579209" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.74.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579210" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.74.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579211" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.74.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579212" version="1" comment="openldap2 is &lt;2.4.26-0.74.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579213" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.74.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579214" version="1" comment="openldap2-client is &lt;2.4.26-0.74.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579215" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.74.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579216" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.74.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579217" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.74.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579218" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.74.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579219" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.74.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579220" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.74.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579221" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.74.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579222" version="1" comment="openldap2 is &lt;2.4.26-0.74.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579223" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.74.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579224" version="1" comment="openldap2-client is &lt;2.4.26-0.74.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579225" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.74.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579226" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.74.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579227" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.74.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579228" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.74.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579229" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.74.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579230" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.74.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579231" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.74.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579232" version="1" comment="openldap2 is &lt;2.4.26-0.74.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579233" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.74.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579234" version="1" comment="openldap2-client is &lt;2.4.26-0.74.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579235" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.74.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579236" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.74.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579237" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.74.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579238" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.74.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579239" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.74.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579240" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.74.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579241" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.74.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579242" version="1" comment="openldap2 is &lt;2.4.26-0.74.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579243" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.74.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579244" version="1" comment="openldap2-client is &lt;2.4.26-0.74.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579245" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.74.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579246" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.74.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579247" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.74.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579248" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.74.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579249" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.74.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579250" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.74.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579251" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.74.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579252" version="1" comment="openldap2 is &lt;2.4.26-0.74.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579253" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.74.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579254" version="1" comment="openldap2-client is &lt;2.4.26-0.74.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579255" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.74.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579256" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.74.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682706" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.74.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682707" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.74.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682708" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.74.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682709" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.74.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682710" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.74.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682711" version="1" comment="openldap2 is &lt;2.4.26-0.74.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682712" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.74.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682713" version="1" comment="openldap2-client is &lt;2.4.26-0.74.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682714" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.74.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682715" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.74.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579257" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579258" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579259" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579260" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.26-0.30.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579261" version="1" comment="openldap2 is &lt;2.4.26-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579262" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579263" version="1" comment="openldap2-client is &lt;2.4.26-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579264" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.62.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579265" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.62.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579266" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.62.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579267" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.26-0.62.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579268" version="1" comment="openldap2 is &lt;2.4.26-0.62.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579269" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.62.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579270" version="1" comment="openldap2-client is &lt;2.4.26-0.62.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579271" version="1" comment="openslp is &lt;1.2.0-172.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579272" version="1" comment="openslp-32bit is &lt;1.2.0-172.24.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579273" version="1" comment="openslp-server is &lt;1.2.0-172.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579274" version="1" comment="openslp-x86 is &lt;1.2.0-172.24.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579275" version="1" comment="openslp is &lt;1.2.0-172.27.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579276" version="1" comment="openslp-32bit is &lt;1.2.0-172.27.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579277" version="1" comment="openslp-server is &lt;1.2.0-172.27.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579278" version="1" comment="openssh is &lt;6.2p2-0.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579279" version="1" comment="openssh-askpass is &lt;6.2p2-0.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579280" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579281" version="1" comment="openssh is &lt;6.2p2-0.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579282" version="1" comment="openssh-askpass is &lt;6.2p2-0.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579283" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.21.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579284" version="1" comment="openssh is &lt;6.2p2-0.33.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579285" version="1" comment="openssh-askpass is &lt;6.2p2-0.33.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579286" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.33.5 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579287" version="1" comment="openssh is &lt;6.2p2-0.40.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579288" version="1" comment="openssh-askpass is &lt;6.2p2-0.40.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579289" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.40.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579290" version="1" comment="openssh is &lt;6.2p2-0.41.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579291" version="1" comment="openssh-askpass is &lt;6.2p2-0.41.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579292" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.41.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579293" version="1" comment="openssh is &lt;6.6p1-41.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579294" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-41.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579295" version="1" comment="openssh-openssl1 is &lt;6.6p1-41.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579296" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-41.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579297" version="1" comment="openssh is &lt;6.6p1-41.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579298" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-41.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579299" version="1" comment="openssh-openssl1 is &lt;6.6p1-41.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579300" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-41.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993719" version="1" comment="openssh is &lt;6.6p1-41.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993720" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-41.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993721" version="1" comment="openssh-openssl1 is &lt;6.6p1-41.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993722" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-41.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579301" version="1" comment="openssh is &lt;6.2p2-0.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579302" version="1" comment="openssh-askpass is &lt;6.2p2-0.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579303" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.24.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579304" version="1" comment="openssh-openssl1 is &lt;6.6p1-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579305" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579306" version="1" comment="openssh-openssl1 is &lt;6.6p1-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579307" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579308" version="1" comment="openssh-openssl1 is &lt;6.6p1-19.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579309" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-19.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579310" version="1" comment="openssh-openssl1 is &lt;6.6p1-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579311" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593843" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593844" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.74.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593845" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593846" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.74.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593847" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.74.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593848" version="1" comment="openssl is &lt;0.9.8j-0.74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593849" version="1" comment="openssl-doc is &lt;0.9.8j-0.74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579312" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.80.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579313" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.80.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579314" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.80.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579315" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.80.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579316" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.80.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579317" version="1" comment="openssl is &lt;0.9.8j-0.80.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579318" version="1" comment="openssl-doc is &lt;0.9.8j-0.80.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579319" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.105.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579320" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.105.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579321" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.105.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579322" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.105.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579323" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.105.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579324" version="1" comment="openssl is &lt;0.9.8j-0.105.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579325" version="1" comment="openssl-doc is &lt;0.9.8j-0.105.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579326" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579327" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.106.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579328" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579329" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579330" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579331" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579332" version="1" comment="openssl is &lt;0.9.8j-0.106.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579333" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579334" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579335" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.106.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579336" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579337" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579338" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579339" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579340" version="1" comment="openssl is &lt;0.9.8j-0.106.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579341" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579342" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579343" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579344" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579345" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579346" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579347" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631751" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632466" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673423" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993723" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993724" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993725" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993726" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993727" version="1" comment="openssl is &lt;0.9.8j-0.106.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993728" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993729" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993730" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993731" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993732" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993733" version="1" comment="openssl is &lt;0.9.8j-0.106.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993734" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993735" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993736" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993737" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993738" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993739" version="1" comment="openssl1 is &lt;1.0.1g-0.58.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993740" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993741" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993742" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993743" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993744" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993745" version="1" comment="openssl is &lt;0.9.8j-0.106.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993746" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993747" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993748" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993749" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993750" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993751" version="1" comment="openssl1 is &lt;1.0.1g-0.58.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993752" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993753" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993754" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993755" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993756" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993757" version="1" comment="openssl1 is &lt;1.0.1g-0.58.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993758" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993759" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993760" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993761" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009236518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579348" version="1" comment="openvpn is &lt;2.0.9-143.40.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579349" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.40.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579350" version="1" comment="openvpn is &lt;2.0.9-143.46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579351" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579352" version="1" comment="openvpn is &lt;2.0.9-143.47.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579353" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.47.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993762" version="1" comment="openvpn is &lt;2.0.9-143.47.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993763" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.47.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579354" version="1" comment="openvpn-openssl1 is &lt;2.3.2-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579355" version="1" comment="openvpn-openssl1-down-root-plugin is &lt;2.3.2-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579356" version="1" comment="openvpn-openssl1 is &lt;2.3.2-0.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579357" version="1" comment="openvpn-openssl1-down-root-plugin is &lt;2.3.2-0.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579358" version="1" comment="openvpn-openssl1 is &lt;2.3.2-0.10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579359" version="1" comment="openvpn-openssl1-down-root-plugin is &lt;2.3.2-0.10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579360" version="1" comment="openvpn-openssl1 is &lt;2.3.2-0.10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579361" version="1" comment="openvpn-openssl1-down-root-plugin is &lt;2.3.2-0.10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676888" version="1" comment="openvpn-openssl1 is &lt;2.3.2-0.10.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676889" version="1" comment="openvpn-openssl1-down-root-plugin is &lt;2.3.2-0.10.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579362" version="1" comment="orca is &lt;2.28.3-0.5.10 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579363" version="1" comment="orca-lang is &lt;2.28.3-0.5.10 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624197" version="1" comment="p7zip is &lt;9.20.1-4.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579364" version="1" comment="pam is &lt;1.1.5-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579365" version="1" comment="pam-32bit is &lt;1.1.5-0.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579366" version="1" comment="pam-doc is &lt;1.1.5-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579367" version="1" comment="pam-x86 is &lt;1.1.5-0.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579368" version="1" comment="pam is &lt;1.1.5-0.12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579369" version="1" comment="pam-32bit is &lt;1.1.5-0.12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579370" version="1" comment="pam-doc is &lt;1.1.5-0.12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993764" version="1" comment="pam_radius is &lt;1.3.16-180.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993765" version="1" comment="pam_radius-32bit is &lt;1.3.16-180.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579371" version="1" comment="patch is &lt;2.5.9-252.22.7.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579372" version="1" comment="perl is &lt;5.10.0-64.70.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579373" version="1" comment="perl-32bit is &lt;5.10.0-64.70.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579374" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.70.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579375" version="1" comment="perl-Test-Simple is &lt;0.72-0.70.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579376" version="1" comment="perl-base is &lt;5.10.0-64.70.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579377" version="1" comment="perl-doc is &lt;5.10.0-64.70.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579378" version="1" comment="perl-x86 is &lt;5.10.0-64.70.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579379" version="1" comment="perl is &lt;5.10.0-64.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579380" version="1" comment="perl-32bit is &lt;5.10.0-64.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579381" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579382" version="1" comment="perl-Test-Simple is &lt;0.72-0.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579383" version="1" comment="perl-base is &lt;5.10.0-64.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579384" version="1" comment="perl-doc is &lt;5.10.0-64.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579385" version="1" comment="perl is &lt;5.10.0-64.81.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579386" version="1" comment="perl-32bit is &lt;5.10.0-64.81.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579387" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.81.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579388" version="1" comment="perl-Test-Simple is &lt;0.72-0.81.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579389" version="1" comment="perl-base is &lt;5.10.0-64.81.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579390" version="1" comment="perl-doc is &lt;5.10.0-64.81.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579391" version="1" comment="perl is &lt;5.10.0-64.81.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579392" version="1" comment="perl-32bit is &lt;5.10.0-64.81.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579393" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.81.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579394" version="1" comment="perl-Test-Simple is &lt;0.72-0.81.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579395" version="1" comment="perl-base is &lt;5.10.0-64.81.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579396" version="1" comment="perl-doc is &lt;5.10.0-64.81.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579397" version="1" comment="perl is &lt;5.10.0-64.81.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579398" version="1" comment="perl-32bit is &lt;5.10.0-64.81.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579399" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.81.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579400" version="1" comment="perl-Test-Simple is &lt;0.72-0.81.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579401" version="1" comment="perl-base is &lt;5.10.0-64.81.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579402" version="1" comment="perl-doc is &lt;5.10.0-64.81.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993766" version="1" comment="perl is &lt;5.10.0-64.81.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993767" version="1" comment="perl-32bit is &lt;5.10.0-64.81.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993768" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.81.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993769" version="1" comment="perl-Test-Simple is &lt;0.72-0.81.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993770" version="1" comment="perl-base is &lt;5.10.0-64.81.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993771" version="1" comment="perl-doc is &lt;5.10.0-64.81.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579403" version="1" comment="perl-XML-LibXML is &lt;1.66-3.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579404" version="1" comment="permissions is &lt;2013.1.7-0.6.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594269" version="1" comment="permissions is &lt;2013.1.7-0.6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993772" version="1" comment="permissions is &lt;2013.1.7-0.6.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579405" version="1" comment="apache2-mod_php53 is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579406" version="1" comment="php53 is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579407" version="1" comment="php53-bcmath is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579408" version="1" comment="php53-bz2 is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579409" version="1" comment="php53-calendar is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579410" version="1" comment="php53-ctype is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579411" version="1" comment="php53-curl is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579412" version="1" comment="php53-dba is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579413" version="1" comment="php53-dom is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579414" version="1" comment="php53-exif is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579415" version="1" comment="php53-fastcgi is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579416" version="1" comment="php53-fileinfo is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579417" version="1" comment="php53-ftp is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579418" version="1" comment="php53-gd is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579419" version="1" comment="php53-gettext is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579420" version="1" comment="php53-gmp is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579421" version="1" comment="php53-iconv is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579422" version="1" comment="php53-intl is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579423" version="1" comment="php53-json is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579424" version="1" comment="php53-ldap is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579425" version="1" comment="php53-mbstring is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579426" version="1" comment="php53-mcrypt is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579427" version="1" comment="php53-mysql is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579428" version="1" comment="php53-odbc is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579429" version="1" comment="php53-openssl is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579430" version="1" comment="php53-pcntl is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579431" version="1" comment="php53-pdo is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579432" version="1" comment="php53-pear is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579433" version="1" comment="php53-pgsql is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579434" version="1" comment="php53-pspell is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579435" version="1" comment="php53-shmop is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579436" version="1" comment="php53-snmp is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579437" version="1" comment="php53-soap is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579438" version="1" comment="php53-suhosin is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579439" version="1" comment="php53-sysvmsg is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579440" version="1" comment="php53-sysvsem is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579441" version="1" comment="php53-sysvshm is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579442" version="1" comment="php53-tokenizer is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579443" version="1" comment="php53-wddx is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579444" version="1" comment="php53-xmlreader is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579445" version="1" comment="php53-xmlrpc is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579446" version="1" comment="php53-xmlwriter is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579447" version="1" comment="php53-xsl is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579448" version="1" comment="php53-zip is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579449" version="1" comment="php53-zlib is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579450" version="1" comment="apache2-mod_php53 is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579451" version="1" comment="php53 is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579452" version="1" comment="php53-bcmath is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579453" version="1" comment="php53-bz2 is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579454" version="1" comment="php53-calendar is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579455" version="1" comment="php53-ctype is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579456" version="1" comment="php53-curl is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579457" version="1" comment="php53-dba is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579458" version="1" comment="php53-dom is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579459" version="1" comment="php53-exif is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579460" version="1" comment="php53-fastcgi is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579461" version="1" comment="php53-fileinfo is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579462" version="1" comment="php53-ftp is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579463" version="1" comment="php53-gd is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579464" version="1" comment="php53-gettext is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579465" version="1" comment="php53-gmp is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579466" version="1" comment="php53-iconv is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579467" version="1" comment="php53-intl is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579468" version="1" comment="php53-json is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579469" version="1" comment="php53-ldap is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579470" version="1" comment="php53-mbstring is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579471" version="1" comment="php53-mcrypt is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579472" version="1" comment="php53-mysql is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579473" version="1" comment="php53-odbc is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579474" version="1" comment="php53-openssl is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579475" version="1" comment="php53-pcntl is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579476" version="1" comment="php53-pdo is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579477" version="1" comment="php53-pear is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579478" version="1" comment="php53-pgsql is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579479" version="1" comment="php53-pspell is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579480" version="1" comment="php53-shmop is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579481" version="1" comment="php53-snmp is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579482" version="1" comment="php53-soap is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579483" version="1" comment="php53-suhosin is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579484" version="1" comment="php53-sysvmsg is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579485" version="1" comment="php53-sysvsem is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579486" version="1" comment="php53-sysvshm is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579487" version="1" comment="php53-tokenizer is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579488" version="1" comment="php53-wddx is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579489" version="1" comment="php53-xmlreader is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579490" version="1" comment="php53-xmlrpc is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579491" version="1" comment="php53-xmlwriter is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579492" version="1" comment="php53-xsl is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579493" version="1" comment="php53-zip is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579494" version="1" comment="php53-zlib is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579495" version="1" comment="apache2-mod_php53 is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579496" version="1" comment="php53 is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579497" version="1" comment="php53-bcmath is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579498" version="1" comment="php53-bz2 is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579499" version="1" comment="php53-calendar is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579500" version="1" comment="php53-ctype is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579501" version="1" comment="php53-curl is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579502" version="1" comment="php53-dba is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579503" version="1" comment="php53-dom is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579504" version="1" comment="php53-exif is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579505" version="1" comment="php53-fastcgi is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579506" version="1" comment="php53-fileinfo is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579507" version="1" comment="php53-ftp is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579508" version="1" comment="php53-gd is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579509" version="1" comment="php53-gettext is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579510" version="1" comment="php53-gmp is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579511" version="1" comment="php53-iconv is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579512" version="1" comment="php53-intl is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579513" version="1" comment="php53-json is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579514" version="1" comment="php53-ldap is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579515" version="1" comment="php53-mbstring is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579516" version="1" comment="php53-mcrypt is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579517" version="1" comment="php53-mysql is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579518" version="1" comment="php53-odbc is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579519" version="1" comment="php53-openssl is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579520" version="1" comment="php53-pcntl is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579521" version="1" comment="php53-pdo is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579522" version="1" comment="php53-pear is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579523" version="1" comment="php53-pgsql is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579524" version="1" comment="php53-pspell is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579525" version="1" comment="php53-shmop is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579526" version="1" comment="php53-snmp is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579527" version="1" comment="php53-soap is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579528" version="1" comment="php53-suhosin is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579529" version="1" comment="php53-sysvmsg is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579530" version="1" comment="php53-sysvsem is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579531" version="1" comment="php53-sysvshm is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579532" version="1" comment="php53-tokenizer is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579533" version="1" comment="php53-wddx is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579534" version="1" comment="php53-xmlreader is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579535" version="1" comment="php53-xmlrpc is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579536" version="1" comment="php53-xmlwriter is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579537" version="1" comment="php53-xsl is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579538" version="1" comment="php53-zip is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579539" version="1" comment="php53-zlib is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579540" version="1" comment="apache2-mod_php53 is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579541" version="1" comment="php53 is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579542" version="1" comment="php53-bcmath is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579543" version="1" comment="php53-bz2 is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579544" version="1" comment="php53-calendar is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579545" version="1" comment="php53-ctype is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579546" version="1" comment="php53-curl is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579547" version="1" comment="php53-dba is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579548" version="1" comment="php53-dom is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579549" version="1" comment="php53-exif is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579550" version="1" comment="php53-fastcgi is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579551" version="1" comment="php53-fileinfo is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579552" version="1" comment="php53-ftp is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579553" version="1" comment="php53-gd is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579554" version="1" comment="php53-gettext is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579555" version="1" comment="php53-gmp is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579556" version="1" comment="php53-iconv is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579557" version="1" comment="php53-intl is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579558" version="1" comment="php53-json is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579559" version="1" comment="php53-ldap is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579560" version="1" comment="php53-mbstring is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579561" version="1" comment="php53-mcrypt is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579562" version="1" comment="php53-mysql is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579563" version="1" comment="php53-odbc is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579564" version="1" comment="php53-openssl is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579565" version="1" comment="php53-pcntl is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579566" version="1" comment="php53-pdo is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579567" version="1" comment="php53-pear is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579568" version="1" comment="php53-pgsql is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579569" version="1" comment="php53-pspell is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579570" version="1" comment="php53-shmop is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579571" version="1" comment="php53-snmp is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579572" version="1" comment="php53-soap is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579573" version="1" comment="php53-suhosin is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579574" version="1" comment="php53-sysvmsg is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579575" version="1" comment="php53-sysvsem is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579576" version="1" comment="php53-sysvshm is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579577" version="1" comment="php53-tokenizer is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579578" version="1" comment="php53-wddx is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579579" version="1" comment="php53-xmlreader is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579580" version="1" comment="php53-xmlrpc is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579581" version="1" comment="php53-xmlwriter is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579582" version="1" comment="php53-xsl is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579583" version="1" comment="php53-zip is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579584" version="1" comment="php53-zlib is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579585" version="1" comment="apache2-mod_php53 is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579586" version="1" comment="php53 is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579587" version="1" comment="php53-bcmath is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579588" version="1" comment="php53-bz2 is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579589" version="1" comment="php53-calendar is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579590" version="1" comment="php53-ctype is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579591" version="1" comment="php53-curl is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579592" version="1" comment="php53-dba is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579593" version="1" comment="php53-dom is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579594" version="1" comment="php53-exif is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579595" version="1" comment="php53-fastcgi is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579596" version="1" comment="php53-fileinfo is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579597" version="1" comment="php53-ftp is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579598" version="1" comment="php53-gd is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579599" version="1" comment="php53-gettext is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579600" version="1" comment="php53-gmp is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579601" version="1" comment="php53-iconv is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579602" version="1" comment="php53-intl is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579603" version="1" comment="php53-json is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579604" version="1" comment="php53-ldap is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579605" version="1" comment="php53-mbstring is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579606" version="1" comment="php53-mcrypt is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579607" version="1" comment="php53-mysql is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579608" version="1" comment="php53-odbc is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579609" version="1" comment="php53-openssl is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579610" version="1" comment="php53-pcntl is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579611" version="1" comment="php53-pdo is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579612" version="1" comment="php53-pear is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579613" version="1" comment="php53-pgsql is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579614" version="1" comment="php53-pspell is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579615" version="1" comment="php53-shmop is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579616" version="1" comment="php53-snmp is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579617" version="1" comment="php53-soap is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579618" version="1" comment="php53-suhosin is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579619" version="1" comment="php53-sysvmsg is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579620" version="1" comment="php53-sysvsem is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579621" version="1" comment="php53-sysvshm is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579622" version="1" comment="php53-tokenizer is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579623" version="1" comment="php53-wddx is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579624" version="1" comment="php53-xmlreader is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579625" version="1" comment="php53-xmlrpc is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579626" version="1" comment="php53-xmlwriter is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579627" version="1" comment="php53-xsl is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579628" version="1" comment="php53-zip is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579629" version="1" comment="php53-zlib is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579630" version="1" comment="apache2-mod_php53 is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579631" version="1" comment="php53 is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579632" version="1" comment="php53-bcmath is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579633" version="1" comment="php53-bz2 is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579634" version="1" comment="php53-calendar is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579635" version="1" comment="php53-ctype is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579636" version="1" comment="php53-curl is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579637" version="1" comment="php53-dba is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579638" version="1" comment="php53-dom is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579639" version="1" comment="php53-exif is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579640" version="1" comment="php53-fastcgi is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579641" version="1" comment="php53-fileinfo is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579642" version="1" comment="php53-ftp is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579643" version="1" comment="php53-gd is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579644" version="1" comment="php53-gettext is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579645" version="1" comment="php53-gmp is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579646" version="1" comment="php53-iconv is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579647" version="1" comment="php53-intl is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579648" version="1" comment="php53-json is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579649" version="1" comment="php53-ldap is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579650" version="1" comment="php53-mbstring is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579651" version="1" comment="php53-mcrypt is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579652" version="1" comment="php53-mysql is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579653" version="1" comment="php53-odbc is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579654" version="1" comment="php53-openssl is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579655" version="1" comment="php53-pcntl is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579656" version="1" comment="php53-pdo is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579657" version="1" comment="php53-pear is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579658" version="1" comment="php53-pgsql is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579659" version="1" comment="php53-pspell is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579660" version="1" comment="php53-shmop is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579661" version="1" comment="php53-snmp is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579662" version="1" comment="php53-soap is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579663" version="1" comment="php53-suhosin is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579664" version="1" comment="php53-sysvmsg is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579665" version="1" comment="php53-sysvsem is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579666" version="1" comment="php53-sysvshm is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579667" version="1" comment="php53-tokenizer is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579668" version="1" comment="php53-wddx is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579669" version="1" comment="php53-xmlreader is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579670" version="1" comment="php53-xmlrpc is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579671" version="1" comment="php53-xmlwriter is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579672" version="1" comment="php53-xsl is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579673" version="1" comment="php53-zip is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579674" version="1" comment="php53-zlib is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579675" version="1" comment="apache2-mod_php53 is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579676" version="1" comment="php53 is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579677" version="1" comment="php53-bcmath is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579678" version="1" comment="php53-bz2 is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579679" version="1" comment="php53-calendar is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579680" version="1" comment="php53-ctype is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579681" version="1" comment="php53-curl is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579682" version="1" comment="php53-dba is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579683" version="1" comment="php53-dom is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579684" version="1" comment="php53-exif is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579685" version="1" comment="php53-fastcgi is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579686" version="1" comment="php53-fileinfo is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579687" version="1" comment="php53-ftp is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579688" version="1" comment="php53-gd is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579689" version="1" comment="php53-gettext is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579690" version="1" comment="php53-gmp is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579691" version="1" comment="php53-iconv is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579692" version="1" comment="php53-intl is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579693" version="1" comment="php53-json is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579694" version="1" comment="php53-ldap is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579695" version="1" comment="php53-mbstring is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579696" version="1" comment="php53-mcrypt is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579697" version="1" comment="php53-mysql is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579698" version="1" comment="php53-odbc is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579699" version="1" comment="php53-openssl is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579700" version="1" comment="php53-pcntl is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579701" version="1" comment="php53-pdo is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579702" version="1" comment="php53-pear is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579703" version="1" comment="php53-pgsql is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579704" version="1" comment="php53-pspell is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579705" version="1" comment="php53-shmop is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579706" version="1" comment="php53-snmp is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579707" version="1" comment="php53-soap is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579708" version="1" comment="php53-suhosin is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579709" version="1" comment="php53-sysvmsg is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579710" version="1" comment="php53-sysvsem is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579711" version="1" comment="php53-sysvshm is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579712" version="1" comment="php53-tokenizer is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579713" version="1" comment="php53-wddx is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579714" version="1" comment="php53-xmlreader is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579715" version="1" comment="php53-xmlrpc is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579716" version="1" comment="php53-xmlwriter is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579717" version="1" comment="php53-xsl is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579718" version="1" comment="php53-zip is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579719" version="1" comment="php53-zlib is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579720" version="1" comment="apache2-mod_php53 is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579721" version="1" comment="php53 is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579722" version="1" comment="php53-bcmath is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579723" version="1" comment="php53-bz2 is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579724" version="1" comment="php53-calendar is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579725" version="1" comment="php53-ctype is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579726" version="1" comment="php53-curl is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579727" version="1" comment="php53-dba is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579728" version="1" comment="php53-dom is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579729" version="1" comment="php53-exif is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579730" version="1" comment="php53-fastcgi is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579731" version="1" comment="php53-fileinfo is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579732" version="1" comment="php53-ftp is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579733" version="1" comment="php53-gd is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579734" version="1" comment="php53-gettext is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579735" version="1" comment="php53-gmp is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579736" version="1" comment="php53-iconv is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579737" version="1" comment="php53-intl is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579738" version="1" comment="php53-json is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579739" version="1" comment="php53-ldap is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579740" version="1" comment="php53-mbstring is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579741" version="1" comment="php53-mcrypt is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579742" version="1" comment="php53-mysql is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579743" version="1" comment="php53-odbc is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579744" version="1" comment="php53-openssl is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579745" version="1" comment="php53-pcntl is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579746" version="1" comment="php53-pdo is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579747" version="1" comment="php53-pear is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579748" version="1" comment="php53-pgsql is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579749" version="1" comment="php53-pspell is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579750" version="1" comment="php53-shmop is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579751" version="1" comment="php53-snmp is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579752" version="1" comment="php53-soap is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579753" version="1" comment="php53-suhosin is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579754" version="1" comment="php53-sysvmsg is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579755" version="1" comment="php53-sysvsem is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579756" version="1" comment="php53-sysvshm is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579757" version="1" comment="php53-tokenizer is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579758" version="1" comment="php53-wddx is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579759" version="1" comment="php53-xmlreader is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579760" version="1" comment="php53-xmlrpc is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579761" version="1" comment="php53-xmlwriter is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579762" version="1" comment="php53-xsl is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579763" version="1" comment="php53-zip is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579764" version="1" comment="php53-zlib is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579765" version="1" comment="apache2-mod_php53 is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579766" version="1" comment="php53 is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579767" version="1" comment="php53-bcmath is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579768" version="1" comment="php53-bz2 is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579769" version="1" comment="php53-calendar is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579770" version="1" comment="php53-ctype is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579771" version="1" comment="php53-curl is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579772" version="1" comment="php53-dba is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579773" version="1" comment="php53-dom is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579774" version="1" comment="php53-exif is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579775" version="1" comment="php53-fastcgi is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579776" version="1" comment="php53-fileinfo is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579777" version="1" comment="php53-ftp is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579778" version="1" comment="php53-gd is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579779" version="1" comment="php53-gettext is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579780" version="1" comment="php53-gmp is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579781" version="1" comment="php53-iconv is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579782" version="1" comment="php53-intl is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579783" version="1" comment="php53-json is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579784" version="1" comment="php53-ldap is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579785" version="1" comment="php53-mbstring is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579786" version="1" comment="php53-mcrypt is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579787" version="1" comment="php53-mysql is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579788" version="1" comment="php53-odbc is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579789" version="1" comment="php53-openssl is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579790" version="1" comment="php53-pcntl is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579791" version="1" comment="php53-pdo is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579792" version="1" comment="php53-pear is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579793" version="1" comment="php53-pgsql is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579794" version="1" comment="php53-pspell is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579795" version="1" comment="php53-shmop is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579796" version="1" comment="php53-snmp is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579797" version="1" comment="php53-soap is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579798" version="1" comment="php53-suhosin is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579799" version="1" comment="php53-sysvmsg is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579800" version="1" comment="php53-sysvsem is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579801" version="1" comment="php53-sysvshm is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579802" version="1" comment="php53-tokenizer is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579803" version="1" comment="php53-wddx is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579804" version="1" comment="php53-xmlreader is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579805" version="1" comment="php53-xmlrpc is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579806" version="1" comment="php53-xmlwriter is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579807" version="1" comment="php53-xsl is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579808" version="1" comment="php53-zip is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579809" version="1" comment="php53-zlib is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579810" version="1" comment="apache2-mod_php53 is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579811" version="1" comment="php53 is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579812" version="1" comment="php53-bcmath is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579813" version="1" comment="php53-bz2 is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579814" version="1" comment="php53-calendar is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579815" version="1" comment="php53-ctype is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579816" version="1" comment="php53-curl is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579817" version="1" comment="php53-dba is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579818" version="1" comment="php53-dom is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579819" version="1" comment="php53-exif is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579820" version="1" comment="php53-fastcgi is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579821" version="1" comment="php53-fileinfo is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579822" version="1" comment="php53-ftp is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579823" version="1" comment="php53-gd is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579824" version="1" comment="php53-gettext is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579825" version="1" comment="php53-gmp is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579826" version="1" comment="php53-iconv is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579827" version="1" comment="php53-intl is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579828" version="1" comment="php53-json is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579829" version="1" comment="php53-ldap is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579830" version="1" comment="php53-mbstring is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579831" version="1" comment="php53-mcrypt is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579832" version="1" comment="php53-mysql is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579833" version="1" comment="php53-odbc is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579834" version="1" comment="php53-openssl is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579835" version="1" comment="php53-pcntl is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579836" version="1" comment="php53-pdo is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579837" version="1" comment="php53-pear is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579838" version="1" comment="php53-pgsql is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579839" version="1" comment="php53-pspell is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579840" version="1" comment="php53-shmop is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579841" version="1" comment="php53-snmp is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579842" version="1" comment="php53-soap is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579843" version="1" comment="php53-suhosin is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579844" version="1" comment="php53-sysvmsg is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579845" version="1" comment="php53-sysvsem is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579846" version="1" comment="php53-sysvshm is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579847" version="1" comment="php53-tokenizer is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579848" version="1" comment="php53-wddx is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579849" version="1" comment="php53-xmlreader is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579850" version="1" comment="php53-xmlrpc is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579851" version="1" comment="php53-xmlwriter is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579852" version="1" comment="php53-xsl is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579853" version="1" comment="php53-zip is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579854" version="1" comment="php53-zlib is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579855" version="1" comment="apache2-mod_php53 is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579856" version="1" comment="php53 is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579857" version="1" comment="php53-bcmath is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579858" version="1" comment="php53-bz2 is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579859" version="1" comment="php53-calendar is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579860" version="1" comment="php53-ctype is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579861" version="1" comment="php53-curl is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579862" version="1" comment="php53-dba is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579863" version="1" comment="php53-dom is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579864" version="1" comment="php53-exif is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579865" version="1" comment="php53-fastcgi is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579866" version="1" comment="php53-fileinfo is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579867" version="1" comment="php53-ftp is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579868" version="1" comment="php53-gd is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579869" version="1" comment="php53-gettext is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579870" version="1" comment="php53-gmp is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579871" version="1" comment="php53-iconv is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579872" version="1" comment="php53-intl is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579873" version="1" comment="php53-json is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579874" version="1" comment="php53-ldap is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579875" version="1" comment="php53-mbstring is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579876" version="1" comment="php53-mcrypt is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579877" version="1" comment="php53-mysql is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579878" version="1" comment="php53-odbc is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579879" version="1" comment="php53-openssl is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579880" version="1" comment="php53-pcntl is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579881" version="1" comment="php53-pdo is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579882" version="1" comment="php53-pear is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579883" version="1" comment="php53-pgsql is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579884" version="1" comment="php53-pspell is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579885" version="1" comment="php53-shmop is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579886" version="1" comment="php53-snmp is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579887" version="1" comment="php53-soap is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579888" version="1" comment="php53-suhosin is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579889" version="1" comment="php53-sysvmsg is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579890" version="1" comment="php53-sysvsem is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579891" version="1" comment="php53-sysvshm is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579892" version="1" comment="php53-tokenizer is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579893" version="1" comment="php53-wddx is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579894" version="1" comment="php53-xmlreader is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579895" version="1" comment="php53-xmlrpc is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579896" version="1" comment="php53-xmlwriter is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579897" version="1" comment="php53-xsl is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579898" version="1" comment="php53-zip is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579899" version="1" comment="php53-zlib is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579900" version="1" comment="apache2-mod_php53 is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579901" version="1" comment="php53 is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579902" version="1" comment="php53-bcmath is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579903" version="1" comment="php53-bz2 is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579904" version="1" comment="php53-calendar is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579905" version="1" comment="php53-ctype is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579906" version="1" comment="php53-curl is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579907" version="1" comment="php53-dba is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579908" version="1" comment="php53-dom is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579909" version="1" comment="php53-exif is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579910" version="1" comment="php53-fastcgi is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579911" version="1" comment="php53-fileinfo is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579912" version="1" comment="php53-ftp is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579913" version="1" comment="php53-gd is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579914" version="1" comment="php53-gettext is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579915" version="1" comment="php53-gmp is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579916" version="1" comment="php53-iconv is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579917" version="1" comment="php53-intl is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579918" version="1" comment="php53-json is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579919" version="1" comment="php53-ldap is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579920" version="1" comment="php53-mbstring is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579921" version="1" comment="php53-mcrypt is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579922" version="1" comment="php53-mysql is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579923" version="1" comment="php53-odbc is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579924" version="1" comment="php53-openssl is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579925" version="1" comment="php53-pcntl is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579926" version="1" comment="php53-pdo is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579927" version="1" comment="php53-pear is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579928" version="1" comment="php53-pgsql is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579929" version="1" comment="php53-pspell is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579930" version="1" comment="php53-shmop is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579931" version="1" comment="php53-snmp is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579932" version="1" comment="php53-soap is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579933" version="1" comment="php53-suhosin is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579934" version="1" comment="php53-sysvmsg is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579935" version="1" comment="php53-sysvsem is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579936" version="1" comment="php53-sysvshm is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579937" version="1" comment="php53-tokenizer is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579938" version="1" comment="php53-wddx is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579939" version="1" comment="php53-xmlreader is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579940" version="1" comment="php53-xmlrpc is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579941" version="1" comment="php53-xmlwriter is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579942" version="1" comment="php53-xsl is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579943" version="1" comment="php53-zip is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579944" version="1" comment="php53-zlib is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579945" version="1" comment="apache2-mod_php53 is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579946" version="1" comment="php53 is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579947" version="1" comment="php53-bcmath is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579948" version="1" comment="php53-bz2 is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579949" version="1" comment="php53-calendar is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579950" version="1" comment="php53-ctype is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579951" version="1" comment="php53-curl is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579952" version="1" comment="php53-dba is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579953" version="1" comment="php53-dom is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579954" version="1" comment="php53-exif is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579955" version="1" comment="php53-fastcgi is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579956" version="1" comment="php53-fileinfo is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579957" version="1" comment="php53-ftp is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579958" version="1" comment="php53-gd is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579959" version="1" comment="php53-gettext is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579960" version="1" comment="php53-gmp is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579961" version="1" comment="php53-iconv is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579962" version="1" comment="php53-intl is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579963" version="1" comment="php53-json is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579964" version="1" comment="php53-ldap is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579965" version="1" comment="php53-mbstring is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579966" version="1" comment="php53-mcrypt is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579967" version="1" comment="php53-mysql is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579968" version="1" comment="php53-odbc is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579969" version="1" comment="php53-openssl is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579970" version="1" comment="php53-pcntl is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579971" version="1" comment="php53-pdo is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579972" version="1" comment="php53-pear is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579973" version="1" comment="php53-pgsql is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579974" version="1" comment="php53-pspell is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579975" version="1" comment="php53-shmop is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579976" version="1" comment="php53-snmp is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579977" version="1" comment="php53-soap is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579978" version="1" comment="php53-suhosin is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579979" version="1" comment="php53-sysvmsg is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579980" version="1" comment="php53-sysvsem is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579981" version="1" comment="php53-sysvshm is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579982" version="1" comment="php53-tokenizer is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579983" version="1" comment="php53-wddx is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579984" version="1" comment="php53-xmlreader is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579985" version="1" comment="php53-xmlrpc is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579986" version="1" comment="php53-xmlwriter is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579987" version="1" comment="php53-xsl is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579988" version="1" comment="php53-zip is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579989" version="1" comment="php53-zlib is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579990" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579991" version="1" comment="php53 is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579992" version="1" comment="php53-bcmath is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579993" version="1" comment="php53-bz2 is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579994" version="1" comment="php53-calendar is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579995" version="1" comment="php53-ctype is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579996" version="1" comment="php53-curl is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579997" version="1" comment="php53-dba is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579998" version="1" comment="php53-dom is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579999" version="1" comment="php53-exif is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580000" version="1" comment="php53-fastcgi is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580001" version="1" comment="php53-fileinfo is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580002" version="1" comment="php53-ftp is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580003" version="1" comment="php53-gd is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580004" version="1" comment="php53-gettext is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580005" version="1" comment="php53-gmp is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580006" version="1" comment="php53-iconv is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580007" version="1" comment="php53-intl is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580008" version="1" comment="php53-json is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580009" version="1" comment="php53-ldap is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580010" version="1" comment="php53-mbstring is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580011" version="1" comment="php53-mcrypt is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580012" version="1" comment="php53-mysql is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580013" version="1" comment="php53-odbc is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580014" version="1" comment="php53-openssl is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580015" version="1" comment="php53-pcntl is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580016" version="1" comment="php53-pdo is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580017" version="1" comment="php53-pear is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580018" version="1" comment="php53-pgsql is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580019" version="1" comment="php53-pspell is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580020" version="1" comment="php53-shmop is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580021" version="1" comment="php53-snmp is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580022" version="1" comment="php53-soap is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580023" version="1" comment="php53-suhosin is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580024" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580025" version="1" comment="php53-sysvsem is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580026" version="1" comment="php53-sysvshm is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580027" version="1" comment="php53-tokenizer is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580028" version="1" comment="php53-wddx is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580029" version="1" comment="php53-xmlreader is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580030" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580031" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580032" version="1" comment="php53-xsl is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580033" version="1" comment="php53-zip is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580034" version="1" comment="php53-zlib is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580035" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580036" version="1" comment="php53 is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580037" version="1" comment="php53-bcmath is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580038" version="1" comment="php53-bz2 is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580039" version="1" comment="php53-calendar is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580040" version="1" comment="php53-ctype is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580041" version="1" comment="php53-curl is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580042" version="1" comment="php53-dba is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580043" version="1" comment="php53-dom is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580044" version="1" comment="php53-exif is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580045" version="1" comment="php53-fastcgi is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580046" version="1" comment="php53-fileinfo is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580047" version="1" comment="php53-ftp is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580048" version="1" comment="php53-gd is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580049" version="1" comment="php53-gettext is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580050" version="1" comment="php53-gmp is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580051" version="1" comment="php53-iconv is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580052" version="1" comment="php53-intl is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580053" version="1" comment="php53-json is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580054" version="1" comment="php53-ldap is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580055" version="1" comment="php53-mbstring is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580056" version="1" comment="php53-mcrypt is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580057" version="1" comment="php53-mysql is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580058" version="1" comment="php53-odbc is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580059" version="1" comment="php53-openssl is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580060" version="1" comment="php53-pcntl is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580061" version="1" comment="php53-pdo is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580062" version="1" comment="php53-pear is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580063" version="1" comment="php53-pgsql is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580064" version="1" comment="php53-pspell is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580065" version="1" comment="php53-shmop is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580066" version="1" comment="php53-snmp is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580067" version="1" comment="php53-soap is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580068" version="1" comment="php53-suhosin is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580069" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580070" version="1" comment="php53-sysvsem is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580071" version="1" comment="php53-sysvshm is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580072" version="1" comment="php53-tokenizer is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580073" version="1" comment="php53-wddx is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580074" version="1" comment="php53-xmlreader is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580075" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580076" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580077" version="1" comment="php53-xsl is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580078" version="1" comment="php53-zip is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580079" version="1" comment="php53-zlib is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580080" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580081" version="1" comment="php53 is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580082" version="1" comment="php53-bcmath is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580083" version="1" comment="php53-bz2 is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580084" version="1" comment="php53-calendar is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580085" version="1" comment="php53-ctype is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580086" version="1" comment="php53-curl is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580087" version="1" comment="php53-dba is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580088" version="1" comment="php53-dom is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580089" version="1" comment="php53-exif is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580090" version="1" comment="php53-fastcgi is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580091" version="1" comment="php53-fileinfo is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580092" version="1" comment="php53-ftp is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580093" version="1" comment="php53-gd is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580094" version="1" comment="php53-gettext is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580095" version="1" comment="php53-gmp is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580096" version="1" comment="php53-iconv is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580097" version="1" comment="php53-intl is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580098" version="1" comment="php53-json is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580099" version="1" comment="php53-ldap is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580100" version="1" comment="php53-mbstring is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580101" version="1" comment="php53-mcrypt is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580102" version="1" comment="php53-mysql is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580103" version="1" comment="php53-odbc is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580104" version="1" comment="php53-openssl is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580105" version="1" comment="php53-pcntl is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580106" version="1" comment="php53-pdo is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580107" version="1" comment="php53-pear is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580108" version="1" comment="php53-pgsql is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580109" version="1" comment="php53-pspell is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580110" version="1" comment="php53-shmop is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580111" version="1" comment="php53-snmp is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580112" version="1" comment="php53-soap is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580113" version="1" comment="php53-suhosin is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580114" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580115" version="1" comment="php53-sysvsem is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580116" version="1" comment="php53-sysvshm is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580117" version="1" comment="php53-tokenizer is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580118" version="1" comment="php53-wddx is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580119" version="1" comment="php53-xmlreader is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580120" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580121" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580122" version="1" comment="php53-xsl is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580123" version="1" comment="php53-zip is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580124" version="1" comment="php53-zlib is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580125" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580126" version="1" comment="php53 is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580127" version="1" comment="php53-bcmath is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580128" version="1" comment="php53-bz2 is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580129" version="1" comment="php53-calendar is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580130" version="1" comment="php53-ctype is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580131" version="1" comment="php53-curl is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580132" version="1" comment="php53-dba is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580133" version="1" comment="php53-dom is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580134" version="1" comment="php53-exif is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580135" version="1" comment="php53-fastcgi is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580136" version="1" comment="php53-fileinfo is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580137" version="1" comment="php53-ftp is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580138" version="1" comment="php53-gd is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580139" version="1" comment="php53-gettext is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580140" version="1" comment="php53-gmp is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580141" version="1" comment="php53-iconv is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580142" version="1" comment="php53-intl is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580143" version="1" comment="php53-json is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580144" version="1" comment="php53-ldap is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580145" version="1" comment="php53-mbstring is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580146" version="1" comment="php53-mcrypt is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580147" version="1" comment="php53-mysql is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580148" version="1" comment="php53-odbc is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580149" version="1" comment="php53-openssl is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580150" version="1" comment="php53-pcntl is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580151" version="1" comment="php53-pdo is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580152" version="1" comment="php53-pear is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580153" version="1" comment="php53-pgsql is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580154" version="1" comment="php53-pspell is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580155" version="1" comment="php53-shmop is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580156" version="1" comment="php53-snmp is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580157" version="1" comment="php53-soap is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580158" version="1" comment="php53-suhosin is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580159" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580160" version="1" comment="php53-sysvsem is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580161" version="1" comment="php53-sysvshm is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580162" version="1" comment="php53-tokenizer is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580163" version="1" comment="php53-wddx is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580164" version="1" comment="php53-xmlreader is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580165" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580166" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580167" version="1" comment="php53-xsl is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580168" version="1" comment="php53-zip is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580169" version="1" comment="php53-zlib is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580170" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580171" version="1" comment="php53 is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580172" version="1" comment="php53-bcmath is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580173" version="1" comment="php53-bz2 is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580174" version="1" comment="php53-calendar is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580175" version="1" comment="php53-ctype is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580176" version="1" comment="php53-curl is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580177" version="1" comment="php53-dba is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580178" version="1" comment="php53-dom is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580179" version="1" comment="php53-exif is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580180" version="1" comment="php53-fastcgi is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580181" version="1" comment="php53-fileinfo is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580182" version="1" comment="php53-ftp is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580183" version="1" comment="php53-gd is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580184" version="1" comment="php53-gettext is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580185" version="1" comment="php53-gmp is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580186" version="1" comment="php53-iconv is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580187" version="1" comment="php53-intl is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580188" version="1" comment="php53-json is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580189" version="1" comment="php53-ldap is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580190" version="1" comment="php53-mbstring is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580191" version="1" comment="php53-mcrypt is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580192" version="1" comment="php53-mysql is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580193" version="1" comment="php53-odbc is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580194" version="1" comment="php53-openssl is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580195" version="1" comment="php53-pcntl is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580196" version="1" comment="php53-pdo is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580197" version="1" comment="php53-pear is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580198" version="1" comment="php53-pgsql is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580199" version="1" comment="php53-pspell is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580200" version="1" comment="php53-shmop is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580201" version="1" comment="php53-snmp is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580202" version="1" comment="php53-soap is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580203" version="1" comment="php53-suhosin is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580204" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580205" version="1" comment="php53-sysvsem is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580206" version="1" comment="php53-sysvshm is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580207" version="1" comment="php53-tokenizer is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580208" version="1" comment="php53-wddx is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580209" version="1" comment="php53-xmlreader is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580210" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580211" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580212" version="1" comment="php53-xsl is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580213" version="1" comment="php53-zip is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580214" version="1" comment="php53-zlib is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580215" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580216" version="1" comment="php53 is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580217" version="1" comment="php53-bcmath is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580218" version="1" comment="php53-bz2 is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580219" version="1" comment="php53-calendar is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580220" version="1" comment="php53-ctype is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580221" version="1" comment="php53-curl is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580222" version="1" comment="php53-dba is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580223" version="1" comment="php53-dom is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580224" version="1" comment="php53-exif is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580225" version="1" comment="php53-fastcgi is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580226" version="1" comment="php53-fileinfo is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580227" version="1" comment="php53-ftp is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580228" version="1" comment="php53-gd is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580229" version="1" comment="php53-gettext is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580230" version="1" comment="php53-gmp is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580231" version="1" comment="php53-iconv is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580232" version="1" comment="php53-intl is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580233" version="1" comment="php53-json is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580234" version="1" comment="php53-ldap is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580235" version="1" comment="php53-mbstring is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580236" version="1" comment="php53-mcrypt is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580237" version="1" comment="php53-mysql is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580238" version="1" comment="php53-odbc is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580239" version="1" comment="php53-openssl is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580240" version="1" comment="php53-pcntl is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580241" version="1" comment="php53-pdo is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580242" version="1" comment="php53-pear is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580243" version="1" comment="php53-pgsql is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580244" version="1" comment="php53-pspell is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580245" version="1" comment="php53-shmop is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580246" version="1" comment="php53-snmp is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580247" version="1" comment="php53-soap is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580248" version="1" comment="php53-suhosin is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580249" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580250" version="1" comment="php53-sysvsem is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580251" version="1" comment="php53-sysvshm is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580252" version="1" comment="php53-tokenizer is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580253" version="1" comment="php53-wddx is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580254" version="1" comment="php53-xmlreader is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580255" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580256" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580257" version="1" comment="php53-xsl is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580258" version="1" comment="php53-zip is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580259" version="1" comment="php53-zlib is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580260" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580261" version="1" comment="php53 is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580262" version="1" comment="php53-bcmath is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580263" version="1" comment="php53-bz2 is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580264" version="1" comment="php53-calendar is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580265" version="1" comment="php53-ctype is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580266" version="1" comment="php53-curl is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580267" version="1" comment="php53-dba is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580268" version="1" comment="php53-dom is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580269" version="1" comment="php53-exif is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580270" version="1" comment="php53-fastcgi is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580271" version="1" comment="php53-fileinfo is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580272" version="1" comment="php53-ftp is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580273" version="1" comment="php53-gd is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580274" version="1" comment="php53-gettext is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580275" version="1" comment="php53-gmp is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580276" version="1" comment="php53-iconv is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580277" version="1" comment="php53-intl is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580278" version="1" comment="php53-json is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580279" version="1" comment="php53-ldap is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580280" version="1" comment="php53-mbstring is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580281" version="1" comment="php53-mcrypt is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580282" version="1" comment="php53-mysql is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580283" version="1" comment="php53-odbc is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580284" version="1" comment="php53-openssl is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580285" version="1" comment="php53-pcntl is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580286" version="1" comment="php53-pdo is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580287" version="1" comment="php53-pear is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580288" version="1" comment="php53-pgsql is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580289" version="1" comment="php53-pspell is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580290" version="1" comment="php53-shmop is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580291" version="1" comment="php53-snmp is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580292" version="1" comment="php53-soap is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580293" version="1" comment="php53-suhosin is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580294" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580295" version="1" comment="php53-sysvsem is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580296" version="1" comment="php53-sysvshm is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580297" version="1" comment="php53-tokenizer is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580298" version="1" comment="php53-wddx is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580299" version="1" comment="php53-xmlreader is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580300" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580301" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580302" version="1" comment="php53-xsl is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580303" version="1" comment="php53-zip is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580304" version="1" comment="php53-zlib is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580305" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580306" version="1" comment="php53 is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580307" version="1" comment="php53-bcmath is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580308" version="1" comment="php53-bz2 is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580309" version="1" comment="php53-calendar is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580310" version="1" comment="php53-ctype is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580311" version="1" comment="php53-curl is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580312" version="1" comment="php53-dba is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580313" version="1" comment="php53-dom is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580314" version="1" comment="php53-exif is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580315" version="1" comment="php53-fastcgi is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580316" version="1" comment="php53-fileinfo is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580317" version="1" comment="php53-ftp is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580318" version="1" comment="php53-gd is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580319" version="1" comment="php53-gettext is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580320" version="1" comment="php53-gmp is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580321" version="1" comment="php53-iconv is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580322" version="1" comment="php53-intl is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580323" version="1" comment="php53-json is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580324" version="1" comment="php53-ldap is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580325" version="1" comment="php53-mbstring is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580326" version="1" comment="php53-mcrypt is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580327" version="1" comment="php53-mysql is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580328" version="1" comment="php53-odbc is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580329" version="1" comment="php53-openssl is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580330" version="1" comment="php53-pcntl is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580331" version="1" comment="php53-pdo is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580332" version="1" comment="php53-pear is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580333" version="1" comment="php53-pgsql is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580334" version="1" comment="php53-pspell is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580335" version="1" comment="php53-shmop is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580336" version="1" comment="php53-snmp is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580337" version="1" comment="php53-soap is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580338" version="1" comment="php53-suhosin is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580339" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580340" version="1" comment="php53-sysvsem is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580341" version="1" comment="php53-sysvshm is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580342" version="1" comment="php53-tokenizer is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580343" version="1" comment="php53-wddx is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580344" version="1" comment="php53-xmlreader is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580345" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580346" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580347" version="1" comment="php53-xsl is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580348" version="1" comment="php53-zip is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580349" version="1" comment="php53-zlib is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580350" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580351" version="1" comment="php53 is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580352" version="1" comment="php53-bcmath is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580353" version="1" comment="php53-bz2 is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580354" version="1" comment="php53-calendar is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580355" version="1" comment="php53-ctype is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580356" version="1" comment="php53-curl is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580357" version="1" comment="php53-dba is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580358" version="1" comment="php53-dom is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580359" version="1" comment="php53-exif is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580360" version="1" comment="php53-fastcgi is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580361" version="1" comment="php53-fileinfo is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580362" version="1" comment="php53-ftp is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580363" version="1" comment="php53-gd is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580364" version="1" comment="php53-gettext is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580365" version="1" comment="php53-gmp is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580366" version="1" comment="php53-iconv is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580367" version="1" comment="php53-intl is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580368" version="1" comment="php53-json is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580369" version="1" comment="php53-ldap is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580370" version="1" comment="php53-mbstring is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580371" version="1" comment="php53-mcrypt is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580372" version="1" comment="php53-mysql is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580373" version="1" comment="php53-odbc is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580374" version="1" comment="php53-openssl is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580375" version="1" comment="php53-pcntl is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580376" version="1" comment="php53-pdo is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580377" version="1" comment="php53-pear is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580378" version="1" comment="php53-pgsql is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580379" version="1" comment="php53-pspell is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580380" version="1" comment="php53-shmop is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580381" version="1" comment="php53-snmp is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580382" version="1" comment="php53-soap is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580383" version="1" comment="php53-suhosin is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580384" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580385" version="1" comment="php53-sysvsem is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580386" version="1" comment="php53-sysvshm is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580387" version="1" comment="php53-tokenizer is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580388" version="1" comment="php53-wddx is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580389" version="1" comment="php53-xmlreader is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580390" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580391" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580392" version="1" comment="php53-xsl is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580393" version="1" comment="php53-zip is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580394" version="1" comment="php53-zlib is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580395" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580396" version="1" comment="php53 is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580397" version="1" comment="php53-bcmath is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580398" version="1" comment="php53-bz2 is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580399" version="1" comment="php53-calendar is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580400" version="1" comment="php53-ctype is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580401" version="1" comment="php53-curl is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580402" version="1" comment="php53-dba is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580403" version="1" comment="php53-dom is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580404" version="1" comment="php53-exif is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580405" version="1" comment="php53-fastcgi is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580406" version="1" comment="php53-fileinfo is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580407" version="1" comment="php53-ftp is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580408" version="1" comment="php53-gd is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580409" version="1" comment="php53-gettext is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580410" version="1" comment="php53-gmp is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580411" version="1" comment="php53-iconv is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580412" version="1" comment="php53-intl is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580413" version="1" comment="php53-json is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580414" version="1" comment="php53-ldap is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580415" version="1" comment="php53-mbstring is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580416" version="1" comment="php53-mcrypt is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580417" version="1" comment="php53-mysql is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580418" version="1" comment="php53-odbc is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580419" version="1" comment="php53-openssl is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580420" version="1" comment="php53-pcntl is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580421" version="1" comment="php53-pdo is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580422" version="1" comment="php53-pear is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580423" version="1" comment="php53-pgsql is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580424" version="1" comment="php53-pspell is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580425" version="1" comment="php53-shmop is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580426" version="1" comment="php53-snmp is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580427" version="1" comment="php53-soap is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580428" version="1" comment="php53-suhosin is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580429" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580430" version="1" comment="php53-sysvsem is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580431" version="1" comment="php53-sysvshm is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580432" version="1" comment="php53-tokenizer is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580433" version="1" comment="php53-wddx is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580434" version="1" comment="php53-xmlreader is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580435" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580436" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580437" version="1" comment="php53-xsl is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580438" version="1" comment="php53-zip is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580439" version="1" comment="php53-zlib is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580440" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580441" version="1" comment="php53 is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580442" version="1" comment="php53-bcmath is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580443" version="1" comment="php53-bz2 is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580444" version="1" comment="php53-calendar is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580445" version="1" comment="php53-ctype is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580446" version="1" comment="php53-curl is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580447" version="1" comment="php53-dba is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580448" version="1" comment="php53-dom is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580449" version="1" comment="php53-exif is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580450" version="1" comment="php53-fastcgi is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580451" version="1" comment="php53-fileinfo is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580452" version="1" comment="php53-ftp is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580453" version="1" comment="php53-gd is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580454" version="1" comment="php53-gettext is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580455" version="1" comment="php53-gmp is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580456" version="1" comment="php53-iconv is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580457" version="1" comment="php53-intl is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580458" version="1" comment="php53-json is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580459" version="1" comment="php53-ldap is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580460" version="1" comment="php53-mbstring is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580461" version="1" comment="php53-mcrypt is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580462" version="1" comment="php53-mysql is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580463" version="1" comment="php53-odbc is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580464" version="1" comment="php53-openssl is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580465" version="1" comment="php53-pcntl is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580466" version="1" comment="php53-pdo is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580467" version="1" comment="php53-pear is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580468" version="1" comment="php53-pgsql is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580469" version="1" comment="php53-pspell is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580470" version="1" comment="php53-shmop is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580471" version="1" comment="php53-snmp is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580472" version="1" comment="php53-soap is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580473" version="1" comment="php53-suhosin is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580474" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580475" version="1" comment="php53-sysvsem is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580476" version="1" comment="php53-sysvshm is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580477" version="1" comment="php53-tokenizer is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580478" version="1" comment="php53-wddx is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580479" version="1" comment="php53-xmlreader is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580480" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580481" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580482" version="1" comment="php53-xsl is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580483" version="1" comment="php53-zip is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580484" version="1" comment="php53-zlib is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580485" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580486" version="1" comment="php53 is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580487" version="1" comment="php53-bcmath is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580488" version="1" comment="php53-bz2 is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580489" version="1" comment="php53-calendar is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580490" version="1" comment="php53-ctype is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580491" version="1" comment="php53-curl is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580492" version="1" comment="php53-dba is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580493" version="1" comment="php53-dom is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580494" version="1" comment="php53-exif is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580495" version="1" comment="php53-fastcgi is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580496" version="1" comment="php53-fileinfo is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580497" version="1" comment="php53-ftp is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580498" version="1" comment="php53-gd is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580499" version="1" comment="php53-gettext is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580500" version="1" comment="php53-gmp is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580501" version="1" comment="php53-iconv is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580502" version="1" comment="php53-intl is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580503" version="1" comment="php53-json is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580504" version="1" comment="php53-ldap is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580505" version="1" comment="php53-mbstring is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580506" version="1" comment="php53-mcrypt is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580507" version="1" comment="php53-mysql is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580508" version="1" comment="php53-odbc is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580509" version="1" comment="php53-openssl is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580510" version="1" comment="php53-pcntl is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580511" version="1" comment="php53-pdo is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580512" version="1" comment="php53-pear is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580513" version="1" comment="php53-pgsql is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580514" version="1" comment="php53-pspell is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580515" version="1" comment="php53-shmop is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580516" version="1" comment="php53-snmp is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580517" version="1" comment="php53-soap is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580518" version="1" comment="php53-suhosin is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580519" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580520" version="1" comment="php53-sysvsem is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580521" version="1" comment="php53-sysvshm is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580522" version="1" comment="php53-tokenizer is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580523" version="1" comment="php53-wddx is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580524" version="1" comment="php53-xmlreader is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580525" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580526" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580527" version="1" comment="php53-xsl is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580528" version="1" comment="php53-zip is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580529" version="1" comment="php53-zlib is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580530" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580531" version="1" comment="php53 is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580532" version="1" comment="php53-bcmath is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580533" version="1" comment="php53-bz2 is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580534" version="1" comment="php53-calendar is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580535" version="1" comment="php53-ctype is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580536" version="1" comment="php53-curl is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580537" version="1" comment="php53-dba is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580538" version="1" comment="php53-dom is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580539" version="1" comment="php53-exif is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580540" version="1" comment="php53-fastcgi is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580541" version="1" comment="php53-fileinfo is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580542" version="1" comment="php53-ftp is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580543" version="1" comment="php53-gd is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580544" version="1" comment="php53-gettext is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580545" version="1" comment="php53-gmp is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580546" version="1" comment="php53-iconv is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580547" version="1" comment="php53-intl is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580548" version="1" comment="php53-json is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580549" version="1" comment="php53-ldap is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580550" version="1" comment="php53-mbstring is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580551" version="1" comment="php53-mcrypt is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580552" version="1" comment="php53-mysql is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580553" version="1" comment="php53-odbc is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580554" version="1" comment="php53-openssl is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580555" version="1" comment="php53-pcntl is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580556" version="1" comment="php53-pdo is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580557" version="1" comment="php53-pear is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580558" version="1" comment="php53-pgsql is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580559" version="1" comment="php53-pspell is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580560" version="1" comment="php53-shmop is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580561" version="1" comment="php53-snmp is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580562" version="1" comment="php53-soap is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580563" version="1" comment="php53-suhosin is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580564" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580565" version="1" comment="php53-sysvsem is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580566" version="1" comment="php53-sysvshm is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580567" version="1" comment="php53-tokenizer is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580568" version="1" comment="php53-wddx is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580569" version="1" comment="php53-xmlreader is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580570" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580571" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580572" version="1" comment="php53-xsl is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580573" version="1" comment="php53-zip is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580574" version="1" comment="php53-zlib is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580575" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580576" version="1" comment="php53 is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580577" version="1" comment="php53-bcmath is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580578" version="1" comment="php53-bz2 is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580579" version="1" comment="php53-calendar is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580580" version="1" comment="php53-ctype is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580581" version="1" comment="php53-curl is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580582" version="1" comment="php53-dba is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580583" version="1" comment="php53-dom is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580584" version="1" comment="php53-exif is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580585" version="1" comment="php53-fastcgi is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580586" version="1" comment="php53-fileinfo is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580587" version="1" comment="php53-ftp is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580588" version="1" comment="php53-gd is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580589" version="1" comment="php53-gettext is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580590" version="1" comment="php53-gmp is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580591" version="1" comment="php53-iconv is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580592" version="1" comment="php53-intl is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580593" version="1" comment="php53-json is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580594" version="1" comment="php53-ldap is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580595" version="1" comment="php53-mbstring is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580596" version="1" comment="php53-mcrypt is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580597" version="1" comment="php53-mysql is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580598" version="1" comment="php53-odbc is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580599" version="1" comment="php53-openssl is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580600" version="1" comment="php53-pcntl is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580601" version="1" comment="php53-pdo is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580602" version="1" comment="php53-pear is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580603" version="1" comment="php53-pgsql is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580604" version="1" comment="php53-pspell is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580605" version="1" comment="php53-shmop is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580606" version="1" comment="php53-snmp is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580607" version="1" comment="php53-soap is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580608" version="1" comment="php53-suhosin is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580609" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580610" version="1" comment="php53-sysvsem is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580611" version="1" comment="php53-sysvshm is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580612" version="1" comment="php53-tokenizer is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580613" version="1" comment="php53-wddx is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580614" version="1" comment="php53-xmlreader is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580615" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580616" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580617" version="1" comment="php53-xsl is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580618" version="1" comment="php53-zip is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580619" version="1" comment="php53-zlib is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580620" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580621" version="1" comment="php53 is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580622" version="1" comment="php53-bcmath is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580623" version="1" comment="php53-bz2 is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580624" version="1" comment="php53-calendar is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580625" version="1" comment="php53-ctype is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580626" version="1" comment="php53-curl is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580627" version="1" comment="php53-dba is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580628" version="1" comment="php53-dom is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580629" version="1" comment="php53-exif is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580630" version="1" comment="php53-fastcgi is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580631" version="1" comment="php53-fileinfo is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580632" version="1" comment="php53-ftp is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580633" version="1" comment="php53-gd is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580634" version="1" comment="php53-gettext is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580635" version="1" comment="php53-gmp is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580636" version="1" comment="php53-iconv is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580637" version="1" comment="php53-intl is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580638" version="1" comment="php53-json is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580639" version="1" comment="php53-ldap is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580640" version="1" comment="php53-mbstring is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580641" version="1" comment="php53-mcrypt is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580642" version="1" comment="php53-mysql is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580643" version="1" comment="php53-odbc is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580644" version="1" comment="php53-openssl is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580645" version="1" comment="php53-pcntl is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580646" version="1" comment="php53-pdo is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580647" version="1" comment="php53-pear is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580648" version="1" comment="php53-pgsql is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580649" version="1" comment="php53-pspell is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580650" version="1" comment="php53-shmop is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580651" version="1" comment="php53-snmp is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580652" version="1" comment="php53-soap is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580653" version="1" comment="php53-suhosin is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580654" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580655" version="1" comment="php53-sysvsem is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580656" version="1" comment="php53-sysvshm is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580657" version="1" comment="php53-tokenizer is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580658" version="1" comment="php53-wddx is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580659" version="1" comment="php53-xmlreader is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580660" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580661" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580662" version="1" comment="php53-xsl is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580663" version="1" comment="php53-zip is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580664" version="1" comment="php53-zlib is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580665" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580666" version="1" comment="php53 is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580667" version="1" comment="php53-bcmath is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580668" version="1" comment="php53-bz2 is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580669" version="1" comment="php53-calendar is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580670" version="1" comment="php53-ctype is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580671" version="1" comment="php53-curl is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580672" version="1" comment="php53-dba is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580673" version="1" comment="php53-dom is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580674" version="1" comment="php53-exif is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580675" version="1" comment="php53-fastcgi is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580676" version="1" comment="php53-fileinfo is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580677" version="1" comment="php53-ftp is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580678" version="1" comment="php53-gd is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580679" version="1" comment="php53-gettext is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580680" version="1" comment="php53-gmp is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580681" version="1" comment="php53-iconv is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580682" version="1" comment="php53-intl is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580683" version="1" comment="php53-json is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580684" version="1" comment="php53-ldap is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580685" version="1" comment="php53-mbstring is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580686" version="1" comment="php53-mcrypt is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580687" version="1" comment="php53-mysql is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580688" version="1" comment="php53-odbc is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580689" version="1" comment="php53-openssl is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580690" version="1" comment="php53-pcntl is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580691" version="1" comment="php53-pdo is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580692" version="1" comment="php53-pear is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580693" version="1" comment="php53-pgsql is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580694" version="1" comment="php53-pspell is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580695" version="1" comment="php53-shmop is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580696" version="1" comment="php53-snmp is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580697" version="1" comment="php53-soap is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580698" version="1" comment="php53-suhosin is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580699" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580700" version="1" comment="php53-sysvsem is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580701" version="1" comment="php53-sysvshm is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580702" version="1" comment="php53-tokenizer is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580703" version="1" comment="php53-wddx is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580704" version="1" comment="php53-xmlreader is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580705" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580706" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580707" version="1" comment="php53-xsl is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580708" version="1" comment="php53-zip is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580709" version="1" comment="php53-zlib is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580710" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580711" version="1" comment="php53 is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580712" version="1" comment="php53-bcmath is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580713" version="1" comment="php53-bz2 is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580714" version="1" comment="php53-calendar is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580715" version="1" comment="php53-ctype is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580716" version="1" comment="php53-curl is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580717" version="1" comment="php53-dba is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580718" version="1" comment="php53-dom is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580719" version="1" comment="php53-exif is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580720" version="1" comment="php53-fastcgi is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580721" version="1" comment="php53-fileinfo is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580722" version="1" comment="php53-ftp is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580723" version="1" comment="php53-gd is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580724" version="1" comment="php53-gettext is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580725" version="1" comment="php53-gmp is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580726" version="1" comment="php53-iconv is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580727" version="1" comment="php53-intl is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580728" version="1" comment="php53-json is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580729" version="1" comment="php53-ldap is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580730" version="1" comment="php53-mbstring is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580731" version="1" comment="php53-mcrypt is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580732" version="1" comment="php53-mysql is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580733" version="1" comment="php53-odbc is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580734" version="1" comment="php53-openssl is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580735" version="1" comment="php53-pcntl is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580736" version="1" comment="php53-pdo is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580737" version="1" comment="php53-pear is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580738" version="1" comment="php53-pgsql is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580739" version="1" comment="php53-pspell is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580740" version="1" comment="php53-shmop is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580741" version="1" comment="php53-snmp is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580742" version="1" comment="php53-soap is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580743" version="1" comment="php53-suhosin is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580744" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580745" version="1" comment="php53-sysvsem is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580746" version="1" comment="php53-sysvshm is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580747" version="1" comment="php53-tokenizer is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580748" version="1" comment="php53-wddx is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580749" version="1" comment="php53-xmlreader is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580750" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580751" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580752" version="1" comment="php53-xsl is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580753" version="1" comment="php53-zip is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580754" version="1" comment="php53-zlib is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580755" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580756" version="1" comment="php53 is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580757" version="1" comment="php53-bcmath is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580758" version="1" comment="php53-bz2 is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580759" version="1" comment="php53-calendar is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580760" version="1" comment="php53-ctype is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580761" version="1" comment="php53-curl is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580762" version="1" comment="php53-dba is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580763" version="1" comment="php53-dom is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580764" version="1" comment="php53-exif is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580765" version="1" comment="php53-fastcgi is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580766" version="1" comment="php53-fileinfo is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580767" version="1" comment="php53-ftp is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580768" version="1" comment="php53-gd is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580769" version="1" comment="php53-gettext is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580770" version="1" comment="php53-gmp is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580771" version="1" comment="php53-iconv is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580772" version="1" comment="php53-intl is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580773" version="1" comment="php53-json is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580774" version="1" comment="php53-ldap is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580775" version="1" comment="php53-mbstring is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580776" version="1" comment="php53-mcrypt is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580777" version="1" comment="php53-mysql is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580778" version="1" comment="php53-odbc is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580779" version="1" comment="php53-openssl is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580780" version="1" comment="php53-pcntl is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580781" version="1" comment="php53-pdo is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580782" version="1" comment="php53-pear is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580783" version="1" comment="php53-pgsql is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580784" version="1" comment="php53-pspell is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580785" version="1" comment="php53-shmop is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580786" version="1" comment="php53-snmp is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580787" version="1" comment="php53-soap is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580788" version="1" comment="php53-suhosin is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580789" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580790" version="1" comment="php53-sysvsem is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580791" version="1" comment="php53-sysvshm is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580792" version="1" comment="php53-tokenizer is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580793" version="1" comment="php53-wddx is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580794" version="1" comment="php53-xmlreader is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580795" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580796" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580797" version="1" comment="php53-xsl is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580798" version="1" comment="php53-zip is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580799" version="1" comment="php53-zlib is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580800" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580801" version="1" comment="php53 is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580802" version="1" comment="php53-bcmath is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580803" version="1" comment="php53-bz2 is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580804" version="1" comment="php53-calendar is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580805" version="1" comment="php53-ctype is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580806" version="1" comment="php53-curl is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580807" version="1" comment="php53-dba is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580808" version="1" comment="php53-dom is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580809" version="1" comment="php53-exif is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580810" version="1" comment="php53-fastcgi is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580811" version="1" comment="php53-fileinfo is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580812" version="1" comment="php53-ftp is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580813" version="1" comment="php53-gd is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580814" version="1" comment="php53-gettext is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580815" version="1" comment="php53-gmp is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580816" version="1" comment="php53-iconv is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580817" version="1" comment="php53-intl is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580818" version="1" comment="php53-json is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580819" version="1" comment="php53-ldap is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580820" version="1" comment="php53-mbstring is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580821" version="1" comment="php53-mcrypt is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580822" version="1" comment="php53-mysql is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580823" version="1" comment="php53-odbc is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580824" version="1" comment="php53-openssl is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580825" version="1" comment="php53-pcntl is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580826" version="1" comment="php53-pdo is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580827" version="1" comment="php53-pear is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580828" version="1" comment="php53-pgsql is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580829" version="1" comment="php53-pspell is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580830" version="1" comment="php53-shmop is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580831" version="1" comment="php53-snmp is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580832" version="1" comment="php53-soap is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580833" version="1" comment="php53-suhosin is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580834" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580835" version="1" comment="php53-sysvsem is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580836" version="1" comment="php53-sysvshm is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580837" version="1" comment="php53-tokenizer is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580838" version="1" comment="php53-wddx is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580839" version="1" comment="php53-xmlreader is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580840" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580841" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580842" version="1" comment="php53-xsl is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580843" version="1" comment="php53-zip is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580844" version="1" comment="php53-zlib is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580845" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580846" version="1" comment="php53 is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580847" version="1" comment="php53-bcmath is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580848" version="1" comment="php53-bz2 is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580849" version="1" comment="php53-calendar is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580850" version="1" comment="php53-ctype is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580851" version="1" comment="php53-curl is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580852" version="1" comment="php53-dba is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580853" version="1" comment="php53-dom is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580854" version="1" comment="php53-exif is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580855" version="1" comment="php53-fastcgi is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580856" version="1" comment="php53-fileinfo is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580857" version="1" comment="php53-ftp is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580858" version="1" comment="php53-gd is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580859" version="1" comment="php53-gettext is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580860" version="1" comment="php53-gmp is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580861" version="1" comment="php53-iconv is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580862" version="1" comment="php53-intl is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580863" version="1" comment="php53-json is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580864" version="1" comment="php53-ldap is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580865" version="1" comment="php53-mbstring is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580866" version="1" comment="php53-mcrypt is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580867" version="1" comment="php53-mysql is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580868" version="1" comment="php53-odbc is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580869" version="1" comment="php53-openssl is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580870" version="1" comment="php53-pcntl is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580871" version="1" comment="php53-pdo is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580872" version="1" comment="php53-pear is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580873" version="1" comment="php53-pgsql is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580874" version="1" comment="php53-pspell is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580875" version="1" comment="php53-shmop is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580876" version="1" comment="php53-snmp is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580877" version="1" comment="php53-soap is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580878" version="1" comment="php53-suhosin is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580879" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580880" version="1" comment="php53-sysvsem is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580881" version="1" comment="php53-sysvshm is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580882" version="1" comment="php53-tokenizer is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580883" version="1" comment="php53-wddx is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580884" version="1" comment="php53-xmlreader is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580885" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580886" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580887" version="1" comment="php53-xsl is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580888" version="1" comment="php53-zip is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580889" version="1" comment="php53-zlib is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580890" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580891" version="1" comment="php53 is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580892" version="1" comment="php53-bcmath is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580893" version="1" comment="php53-bz2 is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580894" version="1" comment="php53-calendar is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580895" version="1" comment="php53-ctype is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580896" version="1" comment="php53-curl is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580897" version="1" comment="php53-dba is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580898" version="1" comment="php53-dom is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580899" version="1" comment="php53-exif is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580900" version="1" comment="php53-fastcgi is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580901" version="1" comment="php53-fileinfo is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580902" version="1" comment="php53-ftp is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580903" version="1" comment="php53-gd is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580904" version="1" comment="php53-gettext is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580905" version="1" comment="php53-gmp is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580906" version="1" comment="php53-iconv is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580907" version="1" comment="php53-intl is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580908" version="1" comment="php53-json is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580909" version="1" comment="php53-ldap is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580910" version="1" comment="php53-mbstring is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580911" version="1" comment="php53-mcrypt is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580912" version="1" comment="php53-mysql is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580913" version="1" comment="php53-odbc is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580914" version="1" comment="php53-openssl is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580915" version="1" comment="php53-pcntl is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580916" version="1" comment="php53-pdo is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580917" version="1" comment="php53-pear is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580918" version="1" comment="php53-pgsql is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580919" version="1" comment="php53-pspell is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580920" version="1" comment="php53-shmop is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580921" version="1" comment="php53-snmp is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580922" version="1" comment="php53-soap is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580923" version="1" comment="php53-suhosin is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580924" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580925" version="1" comment="php53-sysvsem is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580926" version="1" comment="php53-sysvshm is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580927" version="1" comment="php53-tokenizer is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580928" version="1" comment="php53-wddx is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580929" version="1" comment="php53-xmlreader is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580930" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580931" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580932" version="1" comment="php53-xsl is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580933" version="1" comment="php53-zip is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580934" version="1" comment="php53-zlib is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627089" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627090" version="1" comment="php53 is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627091" version="1" comment="php53-bcmath is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627092" version="1" comment="php53-bz2 is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627093" version="1" comment="php53-calendar is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627094" version="1" comment="php53-ctype is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627095" version="1" comment="php53-curl is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627096" version="1" comment="php53-dba is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627097" version="1" comment="php53-dom is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627098" version="1" comment="php53-exif is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627099" version="1" comment="php53-fastcgi is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627100" version="1" comment="php53-fileinfo is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627101" version="1" comment="php53-ftp is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627102" version="1" comment="php53-gd is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627103" version="1" comment="php53-gettext is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627104" version="1" comment="php53-gmp is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627105" version="1" comment="php53-iconv is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627106" version="1" comment="php53-intl is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627107" version="1" comment="php53-json is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627108" version="1" comment="php53-ldap is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627109" version="1" comment="php53-mbstring is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627110" version="1" comment="php53-mcrypt is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627111" version="1" comment="php53-mysql is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627112" version="1" comment="php53-odbc is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627113" version="1" comment="php53-openssl is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627114" version="1" comment="php53-pcntl is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627115" version="1" comment="php53-pdo is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627116" version="1" comment="php53-pear is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627117" version="1" comment="php53-pgsql is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627118" version="1" comment="php53-pspell is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627119" version="1" comment="php53-shmop is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627120" version="1" comment="php53-snmp is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627121" version="1" comment="php53-soap is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627122" version="1" comment="php53-suhosin is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627123" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627124" version="1" comment="php53-sysvsem is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627125" version="1" comment="php53-sysvshm is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627126" version="1" comment="php53-tokenizer is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627127" version="1" comment="php53-wddx is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627128" version="1" comment="php53-xmlreader is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627129" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627130" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627131" version="1" comment="php53-xsl is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627132" version="1" comment="php53-zip is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627133" version="1" comment="php53-zlib is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632089" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632090" version="1" comment="php53 is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632091" version="1" comment="php53-bcmath is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632092" version="1" comment="php53-bz2 is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632093" version="1" comment="php53-calendar is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632094" version="1" comment="php53-ctype is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632095" version="1" comment="php53-curl is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632096" version="1" comment="php53-dba is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632097" version="1" comment="php53-dom is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632098" version="1" comment="php53-exif is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632099" version="1" comment="php53-fastcgi is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632100" version="1" comment="php53-fileinfo is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632101" version="1" comment="php53-ftp is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632102" version="1" comment="php53-gd is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632103" version="1" comment="php53-gettext is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632104" version="1" comment="php53-gmp is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632105" version="1" comment="php53-iconv is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632106" version="1" comment="php53-intl is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632107" version="1" comment="php53-json is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632108" version="1" comment="php53-ldap is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632109" version="1" comment="php53-mbstring is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632110" version="1" comment="php53-mcrypt is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632111" version="1" comment="php53-mysql is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632112" version="1" comment="php53-odbc is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632113" version="1" comment="php53-openssl is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632114" version="1" comment="php53-pcntl is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632115" version="1" comment="php53-pdo is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632116" version="1" comment="php53-pear is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632117" version="1" comment="php53-pgsql is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632118" version="1" comment="php53-pspell is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632119" version="1" comment="php53-shmop is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632120" version="1" comment="php53-snmp is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632121" version="1" comment="php53-soap is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632122" version="1" comment="php53-suhosin is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632123" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632124" version="1" comment="php53-sysvsem is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632125" version="1" comment="php53-sysvshm is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632126" version="1" comment="php53-tokenizer is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632127" version="1" comment="php53-wddx is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632128" version="1" comment="php53-xmlreader is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632129" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632130" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632131" version="1" comment="php53-xsl is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632132" version="1" comment="php53-zip is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632133" version="1" comment="php53-zlib is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658692" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658693" version="1" comment="php53 is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658694" version="1" comment="php53-bcmath is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658695" version="1" comment="php53-bz2 is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658696" version="1" comment="php53-calendar is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658697" version="1" comment="php53-ctype is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658698" version="1" comment="php53-curl is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658699" version="1" comment="php53-dba is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658700" version="1" comment="php53-dom is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658701" version="1" comment="php53-exif is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658702" version="1" comment="php53-fastcgi is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658703" version="1" comment="php53-fileinfo is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658704" version="1" comment="php53-ftp is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658705" version="1" comment="php53-gd is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658706" version="1" comment="php53-gettext is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658707" version="1" comment="php53-gmp is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658708" version="1" comment="php53-iconv is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658709" version="1" comment="php53-intl is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658710" version="1" comment="php53-json is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658711" version="1" comment="php53-ldap is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658712" version="1" comment="php53-mbstring is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658713" version="1" comment="php53-mcrypt is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658714" version="1" comment="php53-mysql is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658715" version="1" comment="php53-odbc is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658716" version="1" comment="php53-openssl is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658717" version="1" comment="php53-pcntl is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658718" version="1" comment="php53-pdo is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658719" version="1" comment="php53-pear is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658720" version="1" comment="php53-pgsql is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658721" version="1" comment="php53-pspell is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658722" version="1" comment="php53-shmop is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658723" version="1" comment="php53-snmp is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658724" version="1" comment="php53-soap is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658725" version="1" comment="php53-suhosin is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658726" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658727" version="1" comment="php53-sysvsem is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658728" version="1" comment="php53-sysvshm is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658729" version="1" comment="php53-tokenizer is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658730" version="1" comment="php53-wddx is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658731" version="1" comment="php53-xmlreader is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658732" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658733" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658734" version="1" comment="php53-xsl is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658735" version="1" comment="php53-zip is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658736" version="1" comment="php53-zlib is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668128" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668129" version="1" comment="php53 is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668130" version="1" comment="php53-bcmath is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668131" version="1" comment="php53-bz2 is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668132" version="1" comment="php53-calendar is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668133" version="1" comment="php53-ctype is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668134" version="1" comment="php53-curl is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668135" version="1" comment="php53-dba is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668136" version="1" comment="php53-dom is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668137" version="1" comment="php53-exif is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668138" version="1" comment="php53-fastcgi is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668139" version="1" comment="php53-fileinfo is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668140" version="1" comment="php53-ftp is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668141" version="1" comment="php53-gd is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668142" version="1" comment="php53-gettext is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668143" version="1" comment="php53-gmp is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668144" version="1" comment="php53-iconv is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668145" version="1" comment="php53-intl is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668146" version="1" comment="php53-json is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668147" version="1" comment="php53-ldap is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668148" version="1" comment="php53-mbstring is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668149" version="1" comment="php53-mcrypt is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668150" version="1" comment="php53-mysql is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668151" version="1" comment="php53-odbc is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668152" version="1" comment="php53-openssl is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668153" version="1" comment="php53-pcntl is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668154" version="1" comment="php53-pdo is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668155" version="1" comment="php53-pear is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668156" version="1" comment="php53-pgsql is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668157" version="1" comment="php53-pspell is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668158" version="1" comment="php53-shmop is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668159" version="1" comment="php53-snmp is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668160" version="1" comment="php53-soap is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668161" version="1" comment="php53-suhosin is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668162" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668163" version="1" comment="php53-sysvsem is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668164" version="1" comment="php53-sysvshm is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668165" version="1" comment="php53-tokenizer is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668166" version="1" comment="php53-wddx is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668167" version="1" comment="php53-xmlreader is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668168" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668169" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668170" version="1" comment="php53-xsl is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668171" version="1" comment="php53-zip is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668172" version="1" comment="php53-zlib is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993773" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993774" version="1" comment="php53 is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993775" version="1" comment="php53-bcmath is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993776" version="1" comment="php53-bz2 is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993777" version="1" comment="php53-calendar is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993778" version="1" comment="php53-ctype is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993779" version="1" comment="php53-curl is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993780" version="1" comment="php53-dba is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993781" version="1" comment="php53-dom is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993782" version="1" comment="php53-exif is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993783" version="1" comment="php53-fastcgi is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993784" version="1" comment="php53-fileinfo is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993785" version="1" comment="php53-ftp is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993786" version="1" comment="php53-gd is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993787" version="1" comment="php53-gettext is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993788" version="1" comment="php53-gmp is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993789" version="1" comment="php53-iconv is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993790" version="1" comment="php53-intl is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993791" version="1" comment="php53-json is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993792" version="1" comment="php53-ldap is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993793" version="1" comment="php53-mbstring is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993794" version="1" comment="php53-mcrypt is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993795" version="1" comment="php53-mysql is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993796" version="1" comment="php53-odbc is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993797" version="1" comment="php53-openssl is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993798" version="1" comment="php53-pcntl is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993799" version="1" comment="php53-pdo is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993800" version="1" comment="php53-pear is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993801" version="1" comment="php53-pgsql is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993802" version="1" comment="php53-pspell is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993803" version="1" comment="php53-shmop is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993804" version="1" comment="php53-snmp is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993805" version="1" comment="php53-soap is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993806" version="1" comment="php53-suhosin is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993807" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993808" version="1" comment="php53-sysvsem is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993809" version="1" comment="php53-sysvshm is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993810" version="1" comment="php53-tokenizer is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993811" version="1" comment="php53-wddx is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993812" version="1" comment="php53-xmlreader is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993813" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993814" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993815" version="1" comment="php53-xsl is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993816" version="1" comment="php53-zip is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993817" version="1" comment="php53-zlib is &lt;5.3.17-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993818" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993819" version="1" comment="php53 is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993820" version="1" comment="php53-bcmath is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993821" version="1" comment="php53-bz2 is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993822" version="1" comment="php53-calendar is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993823" version="1" comment="php53-ctype is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993824" version="1" comment="php53-curl is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993825" version="1" comment="php53-dba is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993826" version="1" comment="php53-dom is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993827" version="1" comment="php53-exif is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993828" version="1" comment="php53-fastcgi is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993829" version="1" comment="php53-fileinfo is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993830" version="1" comment="php53-ftp is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993831" version="1" comment="php53-gd is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993832" version="1" comment="php53-gettext is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993833" version="1" comment="php53-gmp is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993834" version="1" comment="php53-iconv is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993835" version="1" comment="php53-intl is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993836" version="1" comment="php53-json is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993837" version="1" comment="php53-ldap is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993838" version="1" comment="php53-mbstring is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993839" version="1" comment="php53-mcrypt is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993840" version="1" comment="php53-mysql is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993841" version="1" comment="php53-odbc is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993842" version="1" comment="php53-openssl is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993843" version="1" comment="php53-pcntl is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993844" version="1" comment="php53-pdo is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993845" version="1" comment="php53-pear is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993846" version="1" comment="php53-pgsql is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993847" version="1" comment="php53-pspell is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993848" version="1" comment="php53-shmop is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993849" version="1" comment="php53-snmp is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993850" version="1" comment="php53-soap is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993851" version="1" comment="php53-suhosin is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993852" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993853" version="1" comment="php53-sysvsem is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993854" version="1" comment="php53-sysvshm is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993855" version="1" comment="php53-tokenizer is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993856" version="1" comment="php53-wddx is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993857" version="1" comment="php53-xmlreader is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993858" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993859" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993860" version="1" comment="php53-xsl is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993861" version="1" comment="php53-zip is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993862" version="1" comment="php53-zlib is &lt;5.3.17-112.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993863" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993864" version="1" comment="php53 is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993865" version="1" comment="php53-bcmath is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993866" version="1" comment="php53-bz2 is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993867" version="1" comment="php53-calendar is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993868" version="1" comment="php53-ctype is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993869" version="1" comment="php53-curl is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993870" version="1" comment="php53-dba is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993871" version="1" comment="php53-dom is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993872" version="1" comment="php53-exif is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993873" version="1" comment="php53-fastcgi is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993874" version="1" comment="php53-fileinfo is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993875" version="1" comment="php53-ftp is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993876" version="1" comment="php53-gd is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993877" version="1" comment="php53-gettext is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993878" version="1" comment="php53-gmp is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993879" version="1" comment="php53-iconv is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993880" version="1" comment="php53-intl is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993881" version="1" comment="php53-json is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993882" version="1" comment="php53-ldap is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993883" version="1" comment="php53-mbstring is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993884" version="1" comment="php53-mcrypt is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993885" version="1" comment="php53-mysql is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993886" version="1" comment="php53-odbc is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993887" version="1" comment="php53-openssl is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993888" version="1" comment="php53-pcntl is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993889" version="1" comment="php53-pdo is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993890" version="1" comment="php53-pear is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993891" version="1" comment="php53-pgsql is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993892" version="1" comment="php53-pspell is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993893" version="1" comment="php53-shmop is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993894" version="1" comment="php53-snmp is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993895" version="1" comment="php53-soap is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993896" version="1" comment="php53-suhosin is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993897" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993898" version="1" comment="php53-sysvsem is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993899" version="1" comment="php53-sysvshm is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993900" version="1" comment="php53-tokenizer is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993901" version="1" comment="php53-wddx is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993902" version="1" comment="php53-xmlreader is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993903" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993904" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993905" version="1" comment="php53-xsl is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993906" version="1" comment="php53-zip is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993907" version="1" comment="php53-zlib is &lt;5.3.17-112.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993908" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993909" version="1" comment="php53 is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993910" version="1" comment="php53-bcmath is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993911" version="1" comment="php53-bz2 is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993912" version="1" comment="php53-calendar is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993913" version="1" comment="php53-ctype is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993914" version="1" comment="php53-curl is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993915" version="1" comment="php53-dba is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993916" version="1" comment="php53-dom is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993917" version="1" comment="php53-exif is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993918" version="1" comment="php53-fastcgi is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993919" version="1" comment="php53-fileinfo is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993920" version="1" comment="php53-ftp is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993921" version="1" comment="php53-gd is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993922" version="1" comment="php53-gettext is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993923" version="1" comment="php53-gmp is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993924" version="1" comment="php53-iconv is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993925" version="1" comment="php53-intl is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993926" version="1" comment="php53-json is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993927" version="1" comment="php53-ldap is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993928" version="1" comment="php53-mbstring is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993929" version="1" comment="php53-mcrypt is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993930" version="1" comment="php53-mysql is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993931" version="1" comment="php53-odbc is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993932" version="1" comment="php53-openssl is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993933" version="1" comment="php53-pcntl is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993934" version="1" comment="php53-pdo is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993935" version="1" comment="php53-pear is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993936" version="1" comment="php53-pgsql is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993937" version="1" comment="php53-pspell is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993938" version="1" comment="php53-shmop is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993939" version="1" comment="php53-snmp is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993940" version="1" comment="php53-soap is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993941" version="1" comment="php53-suhosin is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993942" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993943" version="1" comment="php53-sysvsem is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993944" version="1" comment="php53-sysvshm is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993945" version="1" comment="php53-tokenizer is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993946" version="1" comment="php53-wddx is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993947" version="1" comment="php53-xmlreader is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993948" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993949" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993950" version="1" comment="php53-xsl is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993951" version="1" comment="php53-zip is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993952" version="1" comment="php53-zlib is &lt;5.3.17-112.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993953" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993954" version="1" comment="php53 is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993955" version="1" comment="php53-bcmath is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993956" version="1" comment="php53-bz2 is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993957" version="1" comment="php53-calendar is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993958" version="1" comment="php53-ctype is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993959" version="1" comment="php53-curl is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993960" version="1" comment="php53-dba is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993961" version="1" comment="php53-dom is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993962" version="1" comment="php53-exif is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993963" version="1" comment="php53-fastcgi is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993964" version="1" comment="php53-fileinfo is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993965" version="1" comment="php53-ftp is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993966" version="1" comment="php53-gd is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993967" version="1" comment="php53-gettext is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993968" version="1" comment="php53-gmp is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993969" version="1" comment="php53-iconv is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993970" version="1" comment="php53-intl is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993971" version="1" comment="php53-json is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993972" version="1" comment="php53-ldap is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993973" version="1" comment="php53-mbstring is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993974" version="1" comment="php53-mcrypt is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993975" version="1" comment="php53-mysql is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993976" version="1" comment="php53-odbc is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993977" version="1" comment="php53-openssl is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993978" version="1" comment="php53-pcntl is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993979" version="1" comment="php53-pdo is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993980" version="1" comment="php53-pear is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993981" version="1" comment="php53-pgsql is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993982" version="1" comment="php53-pspell is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993983" version="1" comment="php53-shmop is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993984" version="1" comment="php53-snmp is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993985" version="1" comment="php53-soap is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993986" version="1" comment="php53-suhosin is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993987" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993988" version="1" comment="php53-sysvsem is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993989" version="1" comment="php53-sysvshm is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993990" version="1" comment="php53-tokenizer is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993991" version="1" comment="php53-wddx is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993992" version="1" comment="php53-xmlreader is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993993" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993994" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993995" version="1" comment="php53-xsl is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993996" version="1" comment="php53-zip is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993997" version="1" comment="php53-zlib is &lt;5.3.17-112.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580935" version="1" comment="libpixman-1-0 is &lt;0.24.4-0.15.3.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580936" version="1" comment="libpixman-1-0-32bit is &lt;0.24.4-0.15.3.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993998" version="1" comment="libpixman-1-0 is &lt;0.24.4-0.15.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009993999" version="1" comment="libpixman-1-0-32bit is &lt;0.24.4-0.15.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681124" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.13.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681125" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.13.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681126" version="1" comment="libpoppler5 is &lt;0.12.3-1.13.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681127" version="1" comment="poppler-tools is &lt;0.12.3-1.13.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994000" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.13.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994001" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.13.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994002" version="1" comment="libpoppler5 is &lt;0.12.3-1.13.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994003" version="1" comment="poppler-tools is &lt;0.12.3-1.13.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580937" version="1" comment="popt is &lt;1.7-37.60.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580938" version="1" comment="popt-32bit is &lt;1.7-37.60.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580939" version="1" comment="popt-x86 is &lt;1.7-37.60.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580940" version="1" comment="rpm is &lt;4.4.2.3-37.60.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563770" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.60.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563773" version="1" comment="rpm-x86 is &lt;4.4.2.3-37.60.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580941" version="1" comment="libecpg6 is &lt;9.4.5-0.8.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580942" version="1" comment="libpq5 is &lt;9.4.5-0.8.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580943" version="1" comment="libpq5-32bit is &lt;9.4.5-0.8.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580944" version="1" comment="postgresql94 is &lt;9.4.5-0.8.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580945" version="1" comment="postgresql94-contrib is &lt;9.4.5-0.8.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580946" version="1" comment="postgresql94-docs is &lt;9.4.5-0.8.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580947" version="1" comment="postgresql94-server is &lt;9.4.5-0.8.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994004" version="1" comment="postgresql-jdbc is &lt;9.1-0.2.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994005" version="1" comment="postgresql-jdbc is &lt;9.1-0.2.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994006" version="1" comment="libecpg6 is &lt;10.21-0.2.42.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994007" version="1" comment="libpq5 is &lt;10.21-0.2.42.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994008" version="1" comment="libpq5-32bit is &lt;10.21-0.2.42.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994009" version="1" comment="postgresql10 is &lt;10.21-0.2.42.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994010" version="1" comment="postgresql10-contrib is &lt;10.21-0.2.42.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994011" version="1" comment="postgresql10-devel is &lt;10.21-0.2.42.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994012" version="1" comment="postgresql10-docs is &lt;10.21-0.2.42.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994013" version="1" comment="postgresql10-server is &lt;10.21-0.2.42.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994014" version="1" comment="libecpg6 is &lt;10.22-0.2.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994015" version="1" comment="libpq5 is &lt;10.22-0.2.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994016" version="1" comment="libpq5-32bit is &lt;10.22-0.2.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994017" version="1" comment="postgresql10 is &lt;10.22-0.2.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994018" version="1" comment="postgresql10-contrib is &lt;10.22-0.2.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994019" version="1" comment="postgresql10-devel is &lt;10.22-0.2.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994020" version="1" comment="postgresql10-docs is &lt;10.22-0.2.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994021" version="1" comment="postgresql10-server is &lt;10.22-0.2.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580948" version="1" comment="libecpg6 is &lt;9.1.15-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580949" version="1" comment="libpq5 is &lt;9.1.15-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580950" version="1" comment="libpq5-32bit is &lt;9.1.15-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580951" version="1" comment="postgresql91 is &lt;9.1.15-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580952" version="1" comment="postgresql91-contrib is &lt;9.1.15-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580953" version="1" comment="postgresql91-docs is &lt;9.1.15-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580954" version="1" comment="postgresql91-server is &lt;9.1.15-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580955" version="1" comment="postgresql91 is &lt;9.1.18-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580956" version="1" comment="postgresql91-contrib is &lt;9.1.18-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580957" version="1" comment="postgresql91-docs is &lt;9.1.18-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580958" version="1" comment="postgresql91-server is &lt;9.1.18-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580959" version="1" comment="postgresql91 is &lt;9.1.19-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580960" version="1" comment="postgresql91-contrib is &lt;9.1.19-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580961" version="1" comment="postgresql91-docs is &lt;9.1.19-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580962" version="1" comment="postgresql91-server is &lt;9.1.19-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580963" version="1" comment="libecpg6 is &lt;9.4.13-0.23.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580964" version="1" comment="libpq5 is &lt;9.4.13-0.23.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580965" version="1" comment="libpq5-32bit is &lt;9.4.13-0.23.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580966" version="1" comment="postgresql94 is &lt;9.4.13-0.23.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580967" version="1" comment="postgresql94-contrib is &lt;9.4.13-0.23.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580968" version="1" comment="postgresql94-docs is &lt;9.4.13-0.23.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580969" version="1" comment="postgresql94-server is &lt;9.4.13-0.23.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580970" version="1" comment="powerpc-utils is &lt;1.2.16-0.13.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580971" version="1" comment="ppc64-diag is &lt;2.6.1-0.14.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580972" version="1" comment="ppp is &lt;2.4.5.git-2.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580973" version="1" comment="procmail is &lt;3.22-240.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580974" version="1" comment="procps is &lt;3.2.7-152.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580975" version="1" comment="puppet is &lt;2.6.18-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580976" version="1" comment="puppet-server is &lt;2.6.18-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994022" version="1" comment="pure-ftpd is &lt;1.0.22-3.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994023" version="1" comment="pure-ftpd is &lt;1.0.43-30.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994024" version="1" comment="pure-ftpd is &lt;1.0.43-30.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580977" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580978" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580979" version="1" comment="python is &lt;2.6.9-40.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580980" version="1" comment="python-32bit is &lt;2.6.9-40.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580981" version="1" comment="python-base is &lt;2.6.9-40.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580982" version="1" comment="python-base-32bit is &lt;2.6.9-40.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580983" version="1" comment="python-curses is &lt;2.6.9-40.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580984" version="1" comment="python-demo is &lt;2.6.9-40.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580985" version="1" comment="python-gdbm is &lt;2.6.9-40.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580986" version="1" comment="python-idle is &lt;2.6.9-40.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580987" version="1" comment="python-tk is &lt;2.6.9-40.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580988" version="1" comment="python-xml is &lt;2.6.9-40.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994025" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994026" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994027" version="1" comment="python is &lt;2.6.9-40.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994028" version="1" comment="python-32bit is &lt;2.6.9-40.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994029" version="1" comment="python-base is &lt;2.6.9-40.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994030" version="1" comment="python-base-32bit is &lt;2.6.9-40.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994031" version="1" comment="python-curses is &lt;2.6.9-40.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994032" version="1" comment="python-demo is &lt;2.6.9-40.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994033" version="1" comment="python-doc is &lt;2.6-8.40.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994034" version="1" comment="python-doc-pdf is &lt;2.6-8.40.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994035" version="1" comment="python-gdbm is &lt;2.6.9-40.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994036" version="1" comment="python-idle is &lt;2.6.9-40.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994037" version="1" comment="python-tk is &lt;2.6.9-40.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994038" version="1" comment="python-xml is &lt;2.6.9-40.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994039" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994040" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994041" version="1" comment="python is &lt;2.6.9-40.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994042" version="1" comment="python-32bit is &lt;2.6.9-40.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994043" version="1" comment="python-base is &lt;2.6.9-40.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994044" version="1" comment="python-base-32bit is &lt;2.6.9-40.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994045" version="1" comment="python-curses is &lt;2.6.9-40.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994046" version="1" comment="python-demo is &lt;2.6.9-40.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994047" version="1" comment="python-doc is &lt;2.6-8.40.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994048" version="1" comment="python-doc-pdf is &lt;2.6-8.40.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994049" version="1" comment="python-gdbm is &lt;2.6.9-40.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994050" version="1" comment="python-idle is &lt;2.6.9-40.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994051" version="1" comment="python-tk is &lt;2.6.9-40.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994052" version="1" comment="python-xml is &lt;2.6.9-40.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994053" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994054" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994055" version="1" comment="python is &lt;2.6.9-40.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994056" version="1" comment="python-32bit is &lt;2.6.9-40.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994057" version="1" comment="python-base is &lt;2.6.9-40.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994058" version="1" comment="python-base-32bit is &lt;2.6.9-40.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994059" version="1" comment="python-curses is &lt;2.6.9-40.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994060" version="1" comment="python-demo is &lt;2.6.9-40.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994061" version="1" comment="python-doc is &lt;2.6-8.40.71.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994062" version="1" comment="python-doc-pdf is &lt;2.6-8.40.71.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994063" version="1" comment="python-gdbm is &lt;2.6.9-40.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994064" version="1" comment="python-idle is &lt;2.6.9-40.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994065" version="1" comment="python-tk is &lt;2.6.9-40.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994066" version="1" comment="python-xml is &lt;2.6.9-40.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994067" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994068" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994069" version="1" comment="python is &lt;2.6.9-40.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994070" version="1" comment="python-32bit is &lt;2.6.9-40.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994071" version="1" comment="python-base is &lt;2.6.9-40.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994072" version="1" comment="python-base-32bit is &lt;2.6.9-40.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994073" version="1" comment="python-curses is &lt;2.6.9-40.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994074" version="1" comment="python-demo is &lt;2.6.9-40.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994075" version="1" comment="python-doc is &lt;2.6-8.40.74.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994076" version="1" comment="python-doc-pdf is &lt;2.6-8.40.74.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994077" version="1" comment="python-gdbm is &lt;2.6.9-40.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994078" version="1" comment="python-idle is &lt;2.6.9-40.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994079" version="1" comment="python-tk is &lt;2.6.9-40.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994080" version="1" comment="python-xml is &lt;2.6.9-40.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994081" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994082" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994083" version="1" comment="python is &lt;2.6.9-40.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994084" version="1" comment="python-32bit is &lt;2.6.9-40.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994085" version="1" comment="python-base is &lt;2.6.9-40.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994086" version="1" comment="python-base-32bit is &lt;2.6.9-40.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994087" version="1" comment="python-curses is &lt;2.6.9-40.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994088" version="1" comment="python-demo is &lt;2.6.9-40.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994089" version="1" comment="python-doc is &lt;2.6-8.40.77.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994090" version="1" comment="python-doc-pdf is &lt;2.6-8.40.77.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994091" version="1" comment="python-gdbm is &lt;2.6.9-40.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994092" version="1" comment="python-idle is &lt;2.6.9-40.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994093" version="1" comment="python-tk is &lt;2.6.9-40.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994094" version="1" comment="python-xml is &lt;2.6.9-40.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580989" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580990" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580991" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-0.33.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580992" version="1" comment="python is &lt;2.6.9-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580993" version="1" comment="python-32bit is &lt;2.6.9-0.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580994" version="1" comment="python-base is &lt;2.6.9-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580995" version="1" comment="python-base-32bit is &lt;2.6.9-0.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580996" version="1" comment="python-base-x86 is &lt;2.6.9-0.33.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580997" version="1" comment="python-curses is &lt;2.6.9-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580998" version="1" comment="python-demo is &lt;2.6.9-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580999" version="1" comment="python-gdbm is &lt;2.6.9-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581000" version="1" comment="python-idle is &lt;2.6.9-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581001" version="1" comment="python-tk is &lt;2.6.9-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581002" version="1" comment="python-x86 is &lt;2.6.9-0.33.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581003" version="1" comment="python-xml is &lt;2.6.9-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581004" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581005" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581006" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-0.25.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581007" version="1" comment="python is &lt;2.6.9-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581008" version="1" comment="python-32bit is &lt;2.6.9-0.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581009" version="1" comment="python-base is &lt;2.6.9-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581010" version="1" comment="python-base-32bit is &lt;2.6.9-0.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581011" version="1" comment="python-base-x86 is &lt;2.6.9-0.25.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581012" version="1" comment="python-curses is &lt;2.6.9-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581013" version="1" comment="python-demo is &lt;2.6.9-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581014" version="1" comment="python-gdbm is &lt;2.6.9-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581015" version="1" comment="python-idle is &lt;2.6.9-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581016" version="1" comment="python-tk is &lt;2.6.9-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581017" version="1" comment="python-x86 is &lt;2.6.9-0.25.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581018" version="1" comment="python-xml is &lt;2.6.9-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581019" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581020" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.27.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581021" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-0.27.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581022" version="1" comment="python is &lt;2.6.9-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581023" version="1" comment="python-32bit is &lt;2.6.9-0.27.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581024" version="1" comment="python-base is &lt;2.6.9-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581025" version="1" comment="python-base-32bit is &lt;2.6.9-0.27.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581026" version="1" comment="python-base-x86 is &lt;2.6.9-0.27.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581027" version="1" comment="python-curses is &lt;2.6.9-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581028" version="1" comment="python-demo is &lt;2.6.9-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581029" version="1" comment="python-gdbm is &lt;2.6.9-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581030" version="1" comment="python-idle is &lt;2.6.9-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581031" version="1" comment="python-tk is &lt;2.6.9-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581032" version="1" comment="python-x86 is &lt;2.6.9-0.27.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581033" version="1" comment="python-xml is &lt;2.6.9-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581034" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581035" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581036" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-0.31.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581037" version="1" comment="python is &lt;2.6.9-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581038" version="1" comment="python-32bit is &lt;2.6.9-0.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581039" version="1" comment="python-base is &lt;2.6.9-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581040" version="1" comment="python-base-32bit is &lt;2.6.9-0.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581041" version="1" comment="python-base-x86 is &lt;2.6.9-0.31.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581042" version="1" comment="python-curses is &lt;2.6.9-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581043" version="1" comment="python-demo is &lt;2.6.9-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581044" version="1" comment="python-gdbm is &lt;2.6.9-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581045" version="1" comment="python-idle is &lt;2.6.9-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581046" version="1" comment="python-tk is &lt;2.6.9-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581047" version="1" comment="python-x86 is &lt;2.6.9-0.31.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581048" version="1" comment="python-xml is &lt;2.6.9-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581049" version="1" comment="python-Jinja2 is &lt;2.6-2.19.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994095" version="1" comment="python-PyYAML is &lt;3.10-0.15.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581050" version="1" comment="python-httplib2 is &lt;0.19.0-14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581051" version="1" comment="python-imaging is &lt;1.1.6-168.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563816" version="1" comment="python-lxml is &lt;2.3.6-0.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994096" version="1" comment="python-lxml is &lt;2.3.6-0.13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994097" version="1" comment="python-lxml is &lt;2.3.6-0.13.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581052" version="1" comment="python-paramiko is &lt;1.13.1-0.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581053" version="1" comment="python-paramiko is &lt;1.13.1-0.3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659259" version="1" comment="python-pip is &lt;1.4.1-0.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581054" version="1" comment="python-pycrypto is &lt;2.6-0.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994098" version="1" comment="python-pywbem is &lt;0.7-6.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994099" version="1" comment="python-setuptools is &lt;0.6c11-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994100" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-6.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994101" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-6.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994102" version="1" comment="python27 is &lt;2.7.18-6.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994103" version="1" comment="python27-32bit is &lt;2.7.18-6.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994104" version="1" comment="python27-base is &lt;2.7.18-6.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994105" version="1" comment="python27-base-32bit is &lt;2.7.18-6.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994106" version="1" comment="python27-curses is &lt;2.7.18-6.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994107" version="1" comment="python27-demo is &lt;2.7.18-6.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994108" version="1" comment="python27-devel is &lt;2.7.18-6.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994109" version="1" comment="python27-doc is &lt;2.7.18-6.80.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994110" version="1" comment="python27-doc-pdf is &lt;2.7.18-6.80.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994111" version="1" comment="python27-gdbm is &lt;2.7.18-6.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994112" version="1" comment="python27-idle is &lt;2.7.18-6.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994113" version="1" comment="python27-tk is &lt;2.7.18-6.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994114" version="1" comment="python27-xml is &lt;2.7.18-6.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994115" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-6.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994116" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-6.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994117" version="1" comment="python27 is &lt;2.7.18-6.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994118" version="1" comment="python27-32bit is &lt;2.7.18-6.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994119" version="1" comment="python27-base is &lt;2.7.18-6.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994120" version="1" comment="python27-base-32bit is &lt;2.7.18-6.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994121" version="1" comment="python27-curses is &lt;2.7.18-6.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994122" version="1" comment="python27-demo is &lt;2.7.18-6.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994123" version="1" comment="python27-devel is &lt;2.7.18-6.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994124" version="1" comment="python27-doc is &lt;2.7.18-6.83.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994125" version="1" comment="python27-doc-pdf is &lt;2.7.18-6.83.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994126" version="1" comment="python27-gdbm is &lt;2.7.18-6.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994127" version="1" comment="python27-idle is &lt;2.7.18-6.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994128" version="1" comment="python27-tk is &lt;2.7.18-6.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994129" version="1" comment="python27-xml is &lt;2.7.18-6.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994130" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-6.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994131" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-6.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994132" version="1" comment="python27 is &lt;2.7.18-6.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994133" version="1" comment="python27-32bit is &lt;2.7.18-6.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994134" version="1" comment="python27-base is &lt;2.7.18-6.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994135" version="1" comment="python27-base-32bit is &lt;2.7.18-6.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994136" version="1" comment="python27-curses is &lt;2.7.18-6.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994137" version="1" comment="python27-demo is &lt;2.7.18-6.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994138" version="1" comment="python27-devel is &lt;2.7.18-6.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994139" version="1" comment="python27-doc is &lt;2.7.18-6.88.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994140" version="1" comment="python27-doc-pdf is &lt;2.7.18-6.88.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994141" version="1" comment="python27-gdbm is &lt;2.7.18-6.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994142" version="1" comment="python27-idle is &lt;2.7.18-6.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994143" version="1" comment="python27-tk is &lt;2.7.18-6.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994144" version="1" comment="python27-xml is &lt;2.7.18-6.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581055" version="1" comment="python27-Jinja2 is &lt;2.7.2-2.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581056" version="1" comment="python27-ecdsa is &lt;0.13.3-0.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581057" version="1" comment="python27-boto3 is &lt;1.9.213-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581058" version="1" comment="python27-botocore is &lt;1.12.213-3.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581059" version="1" comment="python27-s3transfer is &lt;0.2.1-3.6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581060" version="1" comment="python27-urllib3 is &lt;1.24-0.3.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994145" version="1" comment="python27-setuptools is &lt;18.0.1-4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581061" version="1" comment="cloud-init is &lt;18.5-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581062" version="1" comment="cloud-init-config-suse is &lt;18.5-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581063" version="1" comment="cloud-init-doc is &lt;18.5-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581064" version="1" comment="growpart is &lt;0.30-3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581065" version="1" comment="python27-Cheetah is &lt;2.4.4-0.3.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581066" version="1" comment="python27-Jinja2 is &lt;2.7.2-2.3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581067" version="1" comment="python27-MarkupSafe is &lt;0.18-3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581068" version="1" comment="python27-PrettyTable is &lt;0.7.2-0.3.3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581069" version="1" comment="python27-PyJWT is &lt;1.4.2-3.3.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581070" version="1" comment="python27-PyYAML is &lt;3.10-0.3.3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581071" version="1" comment="python27-argparse is &lt;1.2.1-2.3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581072" version="1" comment="python27-blinker is &lt;1.4-3.3.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581073" version="1" comment="python27-boto3 is &lt;1.7.42-3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581074" version="1" comment="python27-botocore is &lt;1.10.57-3.3.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581075" version="1" comment="python27-cffi is &lt;1.5.2-3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581076" version="1" comment="python27-configobj is &lt;5.0.6-1.3.3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581077" version="1" comment="python27-cryptography is &lt;1.3.1-3.5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581078" version="1" comment="python27-dateutil is &lt;2.1-3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581079" version="1" comment="python27-docutils is &lt;0.11-0.3.3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581080" version="1" comment="python27-ecdsa is &lt;0.10-0.3.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581081" version="1" comment="python27-enum34 is &lt;1.1.3-3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581082" version="1" comment="python27-futures is &lt;3.0.2-3.3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581083" version="1" comment="python27-httplib2 is &lt;0.9.2-3.3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581084" version="1" comment="python27-idna is &lt;2.0-3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581085" version="1" comment="python27-ipaddress is &lt;1.0.18-3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581086" version="1" comment="python27-jmespath is &lt;0.9.2-3.3.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581087" version="1" comment="python27-jsonpatch is &lt;1.1-0.3.3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581088" version="1" comment="python27-jsonpointer is &lt;1.0-0.3.3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581089" version="1" comment="python27-jsonschema is &lt;2.4.0-3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581090" version="1" comment="python27-lockfile is &lt;0.9.1-2.3.3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581091" version="1" comment="python27-oauth is &lt;1.0.1-3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581092" version="1" comment="python27-oauthlib is &lt;0.7.2-3.3.13 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581093" version="1" comment="python27-paramiko is &lt;1.13.1-0.3.3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581094" version="1" comment="python27-ply is &lt;3.4-3.3.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581095" version="1" comment="python27-pyasn1 is &lt;0.1.9-3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581096" version="1" comment="python27-pyasn1-modules is &lt;0.0.5-3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581097" version="1" comment="python27-pycparser is &lt;2.10-3.3.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581098" version="1" comment="python27-pycrypto is &lt;2.6-0.3.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581099" version="1" comment="python27-pyserial is &lt;2.7-3.3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581100" version="1" comment="python27-pytest is &lt;2.5.1-0.3.4.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581101" version="1" comment="python27-python-daemon is &lt;1.5.5-3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581102" version="1" comment="python27-requests is &lt;2.0.1-0.3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581103" version="1" comment="python27-s3transfer is &lt;0.1.13-3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581104" version="1" comment="python27-simplejson is &lt;3.8.2-3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581105" version="1" comment="python27-six is &lt;1.7.2-0.3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581106" version="1" comment="quagga is &lt;0.99.15-0.30.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994146" version="1" comment="libraptor1 is &lt;1.4.18-28.23.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581107" version="1" comment="sendmail is &lt;8.14.3-50.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581108" version="1" comment="rpcbind is &lt;0.1.6+git20080930-6.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994147" version="1" comment="popt is &lt;1.7-37.64.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994148" version="1" comment="popt-32bit is &lt;1.7-37.64.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994149" version="1" comment="rpm is &lt;4.4.2.3-37.64.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994150" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.64.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994151" version="1" comment="rpm-python is &lt;4.4.2.3-37.64.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581109" version="1" comment="rsync is &lt;3.0.4-2.49.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581110" version="1" comment="rsync is &lt;3.0.4-2.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581111" version="1" comment="rsync is &lt;3.0.4-2.53.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581112" version="1" comment="rsync is &lt;3.0.4-2.53.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581113" version="1" comment="rsyslog is &lt;5.10.1-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581114" version="1" comment="rsyslog-diag-tools is &lt;5.10.1-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581115" version="1" comment="rsyslog-doc is &lt;5.10.1-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581116" version="1" comment="rsyslog-module-gssapi is &lt;5.10.1-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581117" version="1" comment="rsyslog-module-gtls is &lt;5.10.1-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581118" version="1" comment="rsyslog-module-mysql is &lt;5.10.1-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581119" version="1" comment="rsyslog-module-pgsql is &lt;5.10.1-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581120" version="1" comment="rsyslog-module-relp is &lt;5.10.1-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581121" version="1" comment="rsyslog-module-snmp is &lt;5.10.1-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581122" version="1" comment="rsyslog-module-udpspoof is &lt;5.10.1-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581123" version="1" comment="rsyslog is &lt;5.10.1-0.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581124" version="1" comment="rsyslog-diag-tools is &lt;5.10.1-0.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581125" version="1" comment="rsyslog-doc is &lt;5.10.1-0.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581126" version="1" comment="rsyslog-module-gssapi is &lt;5.10.1-0.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581127" version="1" comment="rsyslog-module-gtls is &lt;5.10.1-0.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581128" version="1" comment="rsyslog-module-mysql is &lt;5.10.1-0.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581129" version="1" comment="rsyslog-module-pgsql is &lt;5.10.1-0.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581130" version="1" comment="rsyslog-module-relp is &lt;5.10.1-0.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581131" version="1" comment="rsyslog-module-snmp is &lt;5.10.1-0.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581132" version="1" comment="rsyslog-module-udpspoof is &lt;5.10.1-0.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581133" version="1" comment="ruby is &lt;1.8.7.p357-0.9.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563826" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563830" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994152" version="1" comment="ruby is &lt;1.8.7.p357-0.9.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994153" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994154" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581134" version="1" comment="ldapsmb is &lt;1.34b-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581135" version="1" comment="libldb1 is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581136" version="1" comment="libsmbclient0 is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567431" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581137" version="1" comment="libtalloc2 is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567433" version="1" comment="libtalloc2-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581138" version="1" comment="libtdb1 is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567435" version="1" comment="libtdb1-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581139" version="1" comment="libtevent0 is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567437" version="1" comment="libtevent0-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581140" version="1" comment="libwbclient0 is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567439" version="1" comment="libwbclient0-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581141" version="1" comment="samba is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567441" version="1" comment="samba-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581142" version="1" comment="samba-client is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567443" version="1" comment="samba-client-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567444" version="1" comment="samba-doc is &lt;3.6.3-67.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581143" version="1" comment="samba-krb-printing is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581144" version="1" comment="samba-winbind is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567447" version="1" comment="samba-winbind-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581145" version="1" comment="ldapsmb is &lt;1.34b-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581146" version="1" comment="libldb1 is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581147" version="1" comment="libsmbclient0 is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581148" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-76.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581149" version="1" comment="libtalloc2 is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581150" version="1" comment="libtalloc2-32bit is &lt;3.6.3-76.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581151" version="1" comment="libtdb1 is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581152" version="1" comment="libtdb1-32bit is &lt;3.6.3-76.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581153" version="1" comment="libtevent0 is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581154" version="1" comment="libtevent0-32bit is &lt;3.6.3-76.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581155" version="1" comment="libwbclient0 is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581156" version="1" comment="libwbclient0-32bit is &lt;3.6.3-76.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581157" version="1" comment="samba is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581158" version="1" comment="samba-32bit is &lt;3.6.3-76.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581159" version="1" comment="samba-client is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581160" version="1" comment="samba-client-32bit is &lt;3.6.3-76.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581161" version="1" comment="samba-doc is &lt;3.6.3-76.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581162" version="1" comment="samba-krb-printing is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581163" version="1" comment="samba-winbind is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581164" version="1" comment="samba-winbind-32bit is &lt;3.6.3-76.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581165" version="1" comment="ldapsmb is &lt;1.34b-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581166" version="1" comment="libldb1 is &lt;3.6.3-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581167" version="1" comment="libsmbclient0 is &lt;3.6.3-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581168" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-84.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581169" version="1" comment="libtalloc2 is &lt;3.6.3-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581170" version="1" comment="libtalloc2-32bit is &lt;3.6.3-84.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581171" version="1" comment="libtdb1 is &lt;3.6.3-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581172" version="1" comment="libtdb1-32bit is &lt;3.6.3-84.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581173" version="1" comment="libtevent0 is &lt;3.6.3-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581174" version="1" comment="libtevent0-32bit is &lt;3.6.3-84.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581175" version="1" comment="libwbclient0 is &lt;3.6.3-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581176" version="1" comment="libwbclient0-32bit is &lt;3.6.3-84.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581177" version="1" comment="samba is &lt;3.6.3-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581178" version="1" comment="samba-32bit is &lt;3.6.3-84.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581179" version="1" comment="samba-client is &lt;3.6.3-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581180" version="1" comment="samba-client-32bit is &lt;3.6.3-84.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569099" version="1" comment="samba-doc is &lt;3.6.3-84.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581181" version="1" comment="samba-krb-printing is &lt;3.6.3-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581182" version="1" comment="samba-winbind is &lt;3.6.3-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581183" version="1" comment="samba-winbind-32bit is &lt;3.6.3-84.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581184" version="1" comment="ldapsmb is &lt;1.34b-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581185" version="1" comment="libldb1 is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581186" version="1" comment="libsmbclient0 is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581187" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581188" version="1" comment="libtalloc2 is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581189" version="1" comment="libtalloc2-32bit is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581190" version="1" comment="libtdb1 is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581191" version="1" comment="libtdb1-32bit is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581192" version="1" comment="libtevent0 is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581193" version="1" comment="libtevent0-32bit is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581194" version="1" comment="libwbclient0 is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581195" version="1" comment="libwbclient0-32bit is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581196" version="1" comment="samba is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581197" version="1" comment="samba-32bit is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581198" version="1" comment="samba-client is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581199" version="1" comment="samba-client-32bit is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581200" version="1" comment="samba-doc is &lt;3.6.3-87.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581201" version="1" comment="samba-krb-printing is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581202" version="1" comment="samba-winbind is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581203" version="1" comment="samba-winbind-32bit is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581204" version="1" comment="ldapsmb is &lt;1.34b-90.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581205" version="1" comment="libldb1 is &lt;3.6.3-90.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581206" version="1" comment="libsmbclient0 is &lt;3.6.3-90.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581207" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-90.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581208" version="1" comment="libtalloc2 is &lt;3.6.3-90.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581209" version="1" comment="libtalloc2-32bit is &lt;3.6.3-90.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581210" version="1" comment="libtdb1 is &lt;3.6.3-90.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581211" version="1" comment="libtdb1-32bit is &lt;3.6.3-90.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581212" version="1" comment="libtevent0 is &lt;3.6.3-90.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581213" version="1" comment="libtevent0-32bit is &lt;3.6.3-90.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581214" version="1" comment="libwbclient0 is &lt;3.6.3-90.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581215" version="1" comment="libwbclient0-32bit is &lt;3.6.3-90.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581216" version="1" comment="samba is &lt;3.6.3-90.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581217" version="1" comment="samba-32bit is &lt;3.6.3-90.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581218" version="1" comment="samba-client is &lt;3.6.3-90.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581219" version="1" comment="samba-client-32bit is &lt;3.6.3-90.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569111" version="1" comment="samba-doc is &lt;3.6.3-90.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581220" version="1" comment="samba-krb-printing is &lt;3.6.3-90.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581221" version="1" comment="samba-winbind is &lt;3.6.3-90.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581222" version="1" comment="samba-winbind-32bit is &lt;3.6.3-90.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581223" version="1" comment="ldapsmb is &lt;1.34b-93.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581224" version="1" comment="libldb1 is &lt;3.6.3-93.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581225" version="1" comment="libsmbclient0 is &lt;3.6.3-93.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581226" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-93.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581227" version="1" comment="libtalloc2 is &lt;3.6.3-93.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581228" version="1" comment="libtalloc2-32bit is &lt;3.6.3-93.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581229" version="1" comment="libtdb1 is &lt;3.6.3-93.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581230" version="1" comment="libtdb1-32bit is &lt;3.6.3-93.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581231" version="1" comment="libtevent0 is &lt;3.6.3-93.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581232" version="1" comment="libtevent0-32bit is &lt;3.6.3-93.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581233" version="1" comment="libwbclient0 is &lt;3.6.3-93.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581234" version="1" comment="libwbclient0-32bit is &lt;3.6.3-93.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581235" version="1" comment="samba is &lt;3.6.3-93.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581236" version="1" comment="samba-32bit is &lt;3.6.3-93.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581237" version="1" comment="samba-client is &lt;3.6.3-93.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581238" version="1" comment="samba-client-32bit is &lt;3.6.3-93.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569123" version="1" comment="samba-doc is &lt;3.6.3-93.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581239" version="1" comment="samba-krb-printing is &lt;3.6.3-93.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581240" version="1" comment="samba-winbind is &lt;3.6.3-93.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581241" version="1" comment="samba-winbind-32bit is &lt;3.6.3-93.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581242" version="1" comment="ldapsmb is &lt;1.34b-94.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581243" version="1" comment="libldb1 is &lt;3.6.3-94.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581244" version="1" comment="libsmbclient0 is &lt;3.6.3-94.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581245" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581246" version="1" comment="libtalloc2 is &lt;3.6.3-94.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581247" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581248" version="1" comment="libtdb1 is &lt;3.6.3-94.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581249" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581250" version="1" comment="libtevent0 is &lt;3.6.3-94.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581251" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581252" version="1" comment="libwbclient0 is &lt;3.6.3-94.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581253" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581254" version="1" comment="samba is &lt;3.6.3-94.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581255" version="1" comment="samba-32bit is &lt;3.6.3-94.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581256" version="1" comment="samba-client is &lt;3.6.3-94.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581257" version="1" comment="samba-client-32bit is &lt;3.6.3-94.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569135" version="1" comment="samba-doc is &lt;3.6.3-94.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581258" version="1" comment="samba-krb-printing is &lt;3.6.3-94.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581259" version="1" comment="samba-winbind is &lt;3.6.3-94.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581260" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581261" version="1" comment="ldapsmb is &lt;1.34b-94.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581262" version="1" comment="libldb1 is &lt;3.6.3-94.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581263" version="1" comment="libsmbclient0 is &lt;3.6.3-94.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581264" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581265" version="1" comment="libtalloc2 is &lt;3.6.3-94.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581266" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581267" version="1" comment="libtdb1 is &lt;3.6.3-94.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581268" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581269" version="1" comment="libtevent0 is &lt;3.6.3-94.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581270" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581271" version="1" comment="libwbclient0 is &lt;3.6.3-94.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581272" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581273" version="1" comment="samba is &lt;3.6.3-94.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581274" version="1" comment="samba-32bit is &lt;3.6.3-94.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581275" version="1" comment="samba-client is &lt;3.6.3-94.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581276" version="1" comment="samba-client-32bit is &lt;3.6.3-94.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569147" version="1" comment="samba-doc is &lt;3.6.3-94.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581277" version="1" comment="samba-krb-printing is &lt;3.6.3-94.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581278" version="1" comment="samba-winbind is &lt;3.6.3-94.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581279" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581280" version="1" comment="ldapsmb is &lt;1.34b-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581281" version="1" comment="libldb1 is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581282" version="1" comment="libsmbclient0 is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581283" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581284" version="1" comment="libtalloc2 is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581285" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581286" version="1" comment="libtdb1 is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581287" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581288" version="1" comment="libtevent0 is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581289" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581290" version="1" comment="libwbclient0 is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581291" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581292" version="1" comment="samba is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581293" version="1" comment="samba-32bit is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581294" version="1" comment="samba-client is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581295" version="1" comment="samba-client-32bit is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581296" version="1" comment="samba-doc is &lt;3.6.3-94.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581297" version="1" comment="samba-krb-printing is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581298" version="1" comment="samba-winbind is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581299" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581300" version="1" comment="ldapsmb is &lt;1.34b-94.14.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581301" version="1" comment="libldb1 is &lt;3.6.3-94.14.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581302" version="1" comment="libsmbclient0 is &lt;3.6.3-94.14.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581303" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.14.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581304" version="1" comment="libtalloc2 is &lt;3.6.3-94.14.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581305" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.14.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581306" version="1" comment="libtdb1 is &lt;3.6.3-94.14.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581307" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.14.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581308" version="1" comment="libtevent0 is &lt;3.6.3-94.14.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581309" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.14.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581310" version="1" comment="libwbclient0 is &lt;3.6.3-94.14.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581311" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.14.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581312" version="1" comment="samba is &lt;3.6.3-94.14.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581313" version="1" comment="samba-32bit is &lt;3.6.3-94.14.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581314" version="1" comment="samba-client is &lt;3.6.3-94.14.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581315" version="1" comment="samba-client-32bit is &lt;3.6.3-94.14.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569159" version="1" comment="samba-doc is &lt;3.6.3-94.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581316" version="1" comment="samba-krb-printing is &lt;3.6.3-94.14.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581317" version="1" comment="samba-winbind is &lt;3.6.3-94.14.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581318" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.14.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581319" version="1" comment="ldapsmb is &lt;1.34b-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581320" version="1" comment="libldb1 is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581321" version="1" comment="libsmbclient0 is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581322" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581323" version="1" comment="libtalloc2 is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581324" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581325" version="1" comment="libtdb1 is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581326" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581327" version="1" comment="libtevent0 is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581328" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581329" version="1" comment="libwbclient0 is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581330" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581331" version="1" comment="samba is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581332" version="1" comment="samba-32bit is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581333" version="1" comment="samba-client is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581334" version="1" comment="samba-client-32bit is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569171" version="1" comment="samba-doc is &lt;3.6.3-94.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581335" version="1" comment="samba-krb-printing is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581336" version="1" comment="samba-winbind is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581337" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581338" version="1" comment="ldapsmb is &lt;1.34b-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581339" version="1" comment="libldb1 is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581340" version="1" comment="libsmbclient0 is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581341" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581342" version="1" comment="libtalloc2 is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581343" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581344" version="1" comment="libtdb1 is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581345" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581346" version="1" comment="libtevent0 is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581347" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581348" version="1" comment="libwbclient0 is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581349" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581350" version="1" comment="samba is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581351" version="1" comment="samba-32bit is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581352" version="1" comment="samba-client is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581353" version="1" comment="samba-client-32bit is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569183" version="1" comment="samba-doc is &lt;3.6.3-94.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581354" version="1" comment="samba-krb-printing is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581355" version="1" comment="samba-winbind is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581356" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581357" version="1" comment="ldapsmb is &lt;1.34b-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581358" version="1" comment="libldb1 is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581359" version="1" comment="libsmbclient0 is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581360" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581361" version="1" comment="libtalloc2 is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581362" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581363" version="1" comment="libtdb1 is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581364" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581365" version="1" comment="libtevent0 is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581366" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581367" version="1" comment="libwbclient0 is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581368" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581369" version="1" comment="samba is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581370" version="1" comment="samba-32bit is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581371" version="1" comment="samba-client is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581372" version="1" comment="samba-client-32bit is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569195" version="1" comment="samba-doc is &lt;3.6.3-94.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581373" version="1" comment="samba-krb-printing is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581374" version="1" comment="samba-winbind is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581375" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581376" version="1" comment="ldapsmb is &lt;1.34b-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581377" version="1" comment="libldb1 is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581378" version="1" comment="libsmbclient0 is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581379" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581380" version="1" comment="libtalloc2 is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581381" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581382" version="1" comment="libtdb1 is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581383" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581384" version="1" comment="libtevent0 is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581385" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581386" version="1" comment="libwbclient0 is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581387" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581388" version="1" comment="samba is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581389" version="1" comment="samba-32bit is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581390" version="1" comment="samba-client is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581391" version="1" comment="samba-client-32bit is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569207" version="1" comment="samba-doc is &lt;3.6.3-94.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581392" version="1" comment="samba-krb-printing is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581393" version="1" comment="samba-winbind is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581394" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581395" version="1" comment="ldapsmb is &lt;1.34b-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581396" version="1" comment="libldb1 is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581397" version="1" comment="libsmbclient0 is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581398" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581399" version="1" comment="libtalloc2 is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581400" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581401" version="1" comment="libtdb1 is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581402" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581403" version="1" comment="libtevent0 is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581404" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581405" version="1" comment="libwbclient0 is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581406" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581407" version="1" comment="samba is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581408" version="1" comment="samba-32bit is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581409" version="1" comment="samba-client is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581410" version="1" comment="samba-client-32bit is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569219" version="1" comment="samba-doc is &lt;3.6.3-94.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581411" version="1" comment="samba-krb-printing is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581412" version="1" comment="samba-winbind is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581413" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655320" version="1" comment="ldapsmb is &lt;1.34b-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655321" version="1" comment="libldb1 is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655322" version="1" comment="libsmbclient0 is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655323" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655324" version="1" comment="libtalloc2 is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655325" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655326" version="1" comment="libtdb1 is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655327" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655328" version="1" comment="libtevent0 is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655329" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655330" version="1" comment="libwbclient0 is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655331" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655332" version="1" comment="samba is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655333" version="1" comment="samba-32bit is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655334" version="1" comment="samba-client is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655335" version="1" comment="samba-client-32bit is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655336" version="1" comment="samba-doc is &lt;3.6.3-94.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655337" version="1" comment="samba-krb-printing is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655338" version="1" comment="samba-winbind is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655339" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994155" version="1" comment="ldapsmb is &lt;1.34b-94.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994156" version="1" comment="libldb1 is &lt;3.6.3-94.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994157" version="1" comment="libsmbclient0 is &lt;3.6.3-94.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994158" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994159" version="1" comment="libtalloc2 is &lt;3.6.3-94.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994160" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994161" version="1" comment="libtdb1 is &lt;3.6.3-94.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994162" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994163" version="1" comment="libtevent0 is &lt;3.6.3-94.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994164" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994165" version="1" comment="libwbclient0 is &lt;3.6.3-94.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994166" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994167" version="1" comment="samba is &lt;3.6.3-94.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994168" version="1" comment="samba-32bit is &lt;3.6.3-94.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994169" version="1" comment="samba-client is &lt;3.6.3-94.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994170" version="1" comment="samba-client-32bit is &lt;3.6.3-94.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994171" version="1" comment="samba-doc is &lt;3.6.3-94.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994172" version="1" comment="samba-krb-printing is &lt;3.6.3-94.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994173" version="1" comment="samba-winbind is &lt;3.6.3-94.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994174" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994175" version="1" comment="ldapsmb is &lt;1.34b-94.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994176" version="1" comment="libldb1 is &lt;3.6.3-94.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994177" version="1" comment="libsmbclient0 is &lt;3.6.3-94.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994178" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994179" version="1" comment="libtalloc2 is &lt;3.6.3-94.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994180" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994181" version="1" comment="libtdb1 is &lt;3.6.3-94.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994182" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994183" version="1" comment="libtevent0 is &lt;3.6.3-94.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994184" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994185" version="1" comment="libwbclient0 is &lt;3.6.3-94.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994186" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994187" version="1" comment="samba is &lt;3.6.3-94.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994188" version="1" comment="samba-32bit is &lt;3.6.3-94.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994189" version="1" comment="samba-client is &lt;3.6.3-94.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994190" version="1" comment="samba-client-32bit is &lt;3.6.3-94.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994191" version="1" comment="samba-doc is &lt;3.6.3-94.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994192" version="1" comment="samba-krb-printing is &lt;3.6.3-94.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994193" version="1" comment="samba-winbind is &lt;3.6.3-94.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994194" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581414" version="1" comment="ldapsmb is &lt;1.34b-12.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581415" version="1" comment="libldb1 is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581416" version="1" comment="libsmbclient0 is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581417" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.56.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581418" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.56.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581419" version="1" comment="libtalloc2 is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581420" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.56.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581421" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.56.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581422" version="1" comment="libtdb1 is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581423" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.56.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581424" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.56.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581425" version="1" comment="libtevent0 is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581426" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.56.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581427" version="1" comment="libwbclient0 is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581428" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.56.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581429" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.56.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581430" version="1" comment="samba is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581431" version="1" comment="samba-32bit is &lt;3.6.3-0.56.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581432" version="1" comment="samba-client is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581433" version="1" comment="samba-client-32bit is &lt;3.6.3-0.56.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581434" version="1" comment="samba-client-x86 is &lt;3.6.3-0.56.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567120" version="1" comment="samba-doc is &lt;3.6.3-0.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581435" version="1" comment="samba-krb-printing is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581436" version="1" comment="samba-winbind is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581437" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.56.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581438" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.56.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581439" version="1" comment="samba-x86 is &lt;3.6.3-0.56.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581440" version="1" comment="ldapsmb is &lt;1.34b-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581441" version="1" comment="libldb1 is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581442" version="1" comment="libsmbclient0 is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581443" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-64.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581444" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-64.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581445" version="1" comment="libtalloc2 is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581446" version="1" comment="libtalloc2-32bit is &lt;3.6.3-64.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581447" version="1" comment="libtalloc2-x86 is &lt;3.6.3-64.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581448" version="1" comment="libtdb1 is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581449" version="1" comment="libtdb1-32bit is &lt;3.6.3-64.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581450" version="1" comment="libtdb1-x86 is &lt;3.6.3-64.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581451" version="1" comment="libtevent0 is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581452" version="1" comment="libtevent0-32bit is &lt;3.6.3-64.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581453" version="1" comment="libwbclient0 is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581454" version="1" comment="libwbclient0-32bit is &lt;3.6.3-64.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581455" version="1" comment="libwbclient0-x86 is &lt;3.6.3-64.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581456" version="1" comment="samba is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581457" version="1" comment="samba-32bit is &lt;3.6.3-64.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581458" version="1" comment="samba-client is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581459" version="1" comment="samba-client-32bit is &lt;3.6.3-64.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581460" version="1" comment="samba-client-x86 is &lt;3.6.3-64.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567140" version="1" comment="samba-doc is &lt;3.6.3-64.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581461" version="1" comment="samba-krb-printing is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581462" version="1" comment="samba-winbind is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581463" version="1" comment="samba-winbind-32bit is &lt;3.6.3-64.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581464" version="1" comment="samba-winbind-x86 is &lt;3.6.3-64.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581465" version="1" comment="samba-x86 is &lt;3.6.3-64.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581466" version="1" comment="sblim-sfcb is &lt;1.3.11-0.25.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581467" version="1" comment="sblim-sfcb is &lt;1.3.11-0.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581468" version="1" comment="sblim-sfcb-openssl1 is &lt;1.3.11-0.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581469" version="1" comment="shim is &lt;15+git47-12.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581470" version="1" comment="shim is &lt;15.4-12.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994195" version="1" comment="shim is &lt;15.7-12.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994196" version="1" comment="shim is &lt;15.7-12.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563876" version="1" comment="gnu-efi is &lt;3.0u-0.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567145" version="1" comment="shim is &lt;0.7.318.81ee561d-0.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994197" version="1" comment="perl-spamassassin is &lt;3.3.1-10.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994198" version="1" comment="spamassassin is &lt;3.3.1-10.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581471" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581472" version="1" comment="libsqlite3-0-32bit is &lt;3.7.6.3-1.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581473" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581474" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581475" version="1" comment="libsqlite3-0-32bit is &lt;3.7.6.3-1.4.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581476" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581477" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581478" version="1" comment="libsqlite3-0-32bit is &lt;3.7.6.3-1.4.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581479" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581480" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581481" version="1" comment="libsqlite3-0-32bit is &lt;3.7.6.3-1.4.7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581482" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581483" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581484" version="1" comment="libsqlite3-0-32bit is &lt;3.7.6.3-1.4.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581485" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626552" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.7.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626553" version="1" comment="libsqlite3-0-32bit is &lt;3.7.6.3-1.4.7.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626554" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.7.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581486" version="1" comment="squid is &lt;2.7.STABLE5-2.12.24.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994199" version="1" comment="squid is &lt;4.17-33.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581487" version="1" comment="squid3 is &lt;3.1.12-8.16.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581488" version="1" comment="strongswan is &lt;4.4.0-6.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581489" version="1" comment="strongswan-doc is &lt;4.4.0-6.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581490" version="1" comment="strongswan is &lt;4.4.0-6.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581491" version="1" comment="strongswan-doc is &lt;4.4.0-6.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581492" version="1" comment="sudo is &lt;1.7.6p2-0.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581493" version="1" comment="sudo is &lt;1.7.6p2-0.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581494" version="1" comment="sudo is &lt;1.7.6p2-0.30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581495" version="1" comment="supportutils is &lt;1.20-121.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569231" version="1" comment="supportutils is &lt;1.20-122.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994200" version="1" comment="supportutils is &lt;1.21-122.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994201" version="1" comment="suseRegister is &lt;1.4-1.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994202" version="1" comment="tar is &lt;1.27.1-14.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581496" version="1" comment="tboot is &lt;20120115_1.7.0-0.5.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581497" version="1" comment="tcpdump is &lt;3.9.8-1.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994203" version="1" comment="telnet is &lt;1.2-134.24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994204" version="1" comment="telnet-server is &lt;1.2-134.24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581498" version="1" comment="libtiff3 is &lt;3.8.2-141.160.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581499" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.160.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581500" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.160.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581501" version="1" comment="tiff is &lt;3.8.2-141.160.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683272" version="1" comment="libtiff3 is &lt;3.8.2-141.169.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683273" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683274" version="1" comment="tiff is &lt;3.8.2-141.169.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994205" version="1" comment="libtiff3 is &lt;3.8.2-141.169.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994206" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994207" version="1" comment="tiff is &lt;3.8.2-141.169.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994208" version="1" comment="libtiff3 is &lt;3.8.2-141.169.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994209" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994210" version="1" comment="tiff is &lt;3.8.2-141.169.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994211" version="1" comment="tomcat6 is &lt;6.0.53-0.57.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994212" version="1" comment="tomcat6-admin-webapps is &lt;6.0.53-0.57.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994213" version="1" comment="tomcat6-docs-webapp is &lt;6.0.53-0.57.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994214" version="1" comment="tomcat6-javadoc is &lt;6.0.53-0.57.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994215" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.53-0.57.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994216" version="1" comment="tomcat6-lib is &lt;6.0.53-0.57.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994217" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.53-0.57.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994218" version="1" comment="tomcat6-webapps is &lt;6.0.53-0.57.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581502" version="1" comment="libtcnative-1-0 is &lt;1.3.3-12.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994219" version="1" comment="libtspi1 is &lt;0.3.10-0.11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994220" version="1" comment="libtspi1-32bit is &lt;0.3.10-0.11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994221" version="1" comment="trousers is &lt;0.3.10-0.11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581503" version="1" comment="unrar is &lt;3.80.2-4.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683761" version="1" comment="unrar is &lt;5.6.1-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581504" version="1" comment="unzip is &lt;6.00-11.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581505" version="1" comment="unzip is &lt;6.00-11.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581506" version="1" comment="unzip is &lt;6.00-11.18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581507" version="1" comment="unzip is &lt;6.00-11.18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670262" version="1" comment="unzip is &lt;6.00-11.18.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994222" version="1" comment="unzip is &lt;6.00-11.18.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581508" version="1" comment="libblkid1 is &lt;2.19.1-6.62.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581509" version="1" comment="libblkid1-32bit is &lt;2.19.1-6.62.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581510" version="1" comment="libuuid1 is &lt;2.19.1-6.62.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581511" version="1" comment="libuuid1-32bit is &lt;2.19.1-6.62.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581512" version="1" comment="util-linux is &lt;2.19.1-6.62.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581513" version="1" comment="util-linux-lang is &lt;2.19.1-6.62.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581514" version="1" comment="uuid-runtime is &lt;2.19.1-6.62.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581515" version="1" comment="gvim is &lt;7.2-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581516" version="1" comment="vim is &lt;7.2-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581517" version="1" comment="vim-base is &lt;7.2-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581518" version="1" comment="vim-data is &lt;7.2-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581519" version="1" comment="gvim is &lt;7.2-8.20.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581520" version="1" comment="vim is &lt;7.2-8.20.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581521" version="1" comment="vim-base is &lt;7.2-8.20.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581522" version="1" comment="vim-data is &lt;7.2-8.20.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581523" version="1" comment="gvim is &lt;7.2-8.21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581524" version="1" comment="vim is &lt;7.2-8.21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581525" version="1" comment="vim-base is &lt;7.2-8.21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581526" version="1" comment="vim-data is &lt;7.2-8.21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581527" version="1" comment="gvim is &lt;7.2-8.21.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581528" version="1" comment="vim is &lt;7.2-8.21.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581529" version="1" comment="vim-base is &lt;7.2-8.21.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581530" version="1" comment="vim-data is &lt;7.2-8.21.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994223" version="1" comment="vsftpd is &lt;2.0.7-4.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994224" version="1" comment="w3m is &lt;0.5.3.git20161120-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994225" version="1" comment="libwavpack1 is &lt;4.50.1-1.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581531" version="1" comment="wget is &lt;1.11.4-1.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581532" version="1" comment="wget is &lt;1.11.4-1.32.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581533" version="1" comment="wireshark is &lt;1.10.11-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581534" version="1" comment="wireshark is &lt;1.12.7-0.5.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581535" version="1" comment="wireshark is &lt;1.12.9-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581536" version="1" comment="wpa_supplicant is &lt;0.7.1-6.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581537" version="1" comment="wpa_supplicant is &lt;0.7.1-6.17.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581538" version="1" comment="wpa_supplicant is &lt;0.7.1-6.18.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581539" version="1" comment="wpa_supplicant is &lt;0.7.1-6.18.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581540" version="1" comment="wpa_supplicant is &lt;0.7.1-6.18.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567163" version="1" comment="xen is &lt;4.2.5_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567164" version="1" comment="xen-doc-html is &lt;4.2.5_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567165" version="1" comment="xen-doc-pdf is &lt;4.2.5_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567166" version="1" comment="xen-kmp-default is &lt;4.2.5_06_3.0.101_0.47.52-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567167" version="1" comment="xen-kmp-pae is &lt;4.2.5_06_3.0.101_0.47.52-0.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567168" version="1" comment="xen-libs is &lt;4.2.5_06-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567169" version="1" comment="xen-libs-32bit is &lt;4.2.5_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567170" version="1" comment="xen-tools is &lt;4.2.5_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567171" version="1" comment="xen-tools-domU is &lt;4.2.5_06-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567172" version="1" comment="xen is &lt;4.2.5_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567173" version="1" comment="xen-doc-html is &lt;4.2.5_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567174" version="1" comment="xen-doc-pdf is &lt;4.2.5_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567175" version="1" comment="xen-kmp-default is &lt;4.2.5_02_3.0.101_0.40-0.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567176" version="1" comment="xen-libs is &lt;4.2.5_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567177" version="1" comment="xen-libs-32bit is &lt;4.2.5_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567178" version="1" comment="xen-tools is &lt;4.2.5_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567179" version="1" comment="xen-tools-domU is &lt;4.2.5_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567180" version="1" comment="xen is &lt;4.2.5_12-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567181" version="1" comment="xen-doc-html is &lt;4.2.5_12-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567182" version="1" comment="xen-doc-pdf is &lt;4.2.5_12-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567183" version="1" comment="xen-kmp-default is &lt;4.2.5_12_3.0.101_0.47.55-15.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567184" version="1" comment="xen-kmp-pae is &lt;4.2.5_12_3.0.101_0.47.55-15.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567185" version="1" comment="xen-libs is &lt;4.2.5_12-15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567186" version="1" comment="xen-libs-32bit is &lt;4.2.5_12-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567187" version="1" comment="xen-tools is &lt;4.2.5_12-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567188" version="1" comment="xen-tools-domU is &lt;4.2.5_12-15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567189" version="1" comment="xen is &lt;4.2.5_14-18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567190" version="1" comment="xen-doc-html is &lt;4.2.5_14-18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567191" version="1" comment="xen-doc-pdf is &lt;4.2.5_14-18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567192" version="1" comment="xen-kmp-default is &lt;4.2.5_14_3.0.101_0.47.67-18.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567193" version="1" comment="xen-kmp-pae is &lt;4.2.5_14_3.0.101_0.47.67-18.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567194" version="1" comment="xen-libs is &lt;4.2.5_14-18.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567195" version="1" comment="xen-libs-32bit is &lt;4.2.5_14-18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567196" version="1" comment="xen-tools is &lt;4.2.5_14-18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567197" version="1" comment="xen-tools-domU is &lt;4.2.5_14-18.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581541" version="1" comment="xen is &lt;4.2.5_20-24.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581542" version="1" comment="xen-doc-html is &lt;4.2.5_20-24.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581543" version="1" comment="xen-doc-pdf is &lt;4.2.5_20-24.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581544" version="1" comment="xen-kmp-default is &lt;4.2.5_20_3.0.101_0.47.79-24.9 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581545" version="1" comment="xen-kmp-pae is &lt;4.2.5_20_3.0.101_0.47.79-24.9 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581546" version="1" comment="xen-libs is &lt;4.2.5_20-24.9 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581547" version="1" comment="xen-libs-32bit is &lt;4.2.5_20-24.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581548" version="1" comment="xen-tools is &lt;4.2.5_20-24.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581549" version="1" comment="xen-tools-domU is &lt;4.2.5_20-24.9 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581550" version="1" comment="xen is &lt;4.2.5_21-27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581551" version="1" comment="xen-doc-html is &lt;4.2.5_21-27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581552" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581553" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.86-27.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569288" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.86-27.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581554" version="1" comment="xen-libs is &lt;4.2.5_21-27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581555" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581556" version="1" comment="xen-tools is &lt;4.2.5_21-27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581557" version="1" comment="xen-tools-domU is &lt;4.2.5_21-27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581558" version="1" comment="xen is &lt;4.2.5_21-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581559" version="1" comment="xen-doc-html is &lt;4.2.5_21-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581560" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581561" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.90-30.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569292" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.90-30.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581562" version="1" comment="xen-libs is &lt;4.2.5_21-30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581563" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581564" version="1" comment="xen-tools is &lt;4.2.5_21-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581565" version="1" comment="xen-tools-domU is &lt;4.2.5_21-30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581566" version="1" comment="xen is &lt;4.2.5_21-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581567" version="1" comment="xen-doc-html is &lt;4.2.5_21-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581568" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581569" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.113.TDC-31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581570" version="1" comment="xen-libs is &lt;4.2.5_21-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581571" version="1" comment="xen-tools is &lt;4.2.5_21-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581572" version="1" comment="xen-tools-domU is &lt;4.2.5_21-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581573" version="1" comment="xen is &lt;4.2.5_21-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581574" version="1" comment="xen-doc-html is &lt;4.2.5_21-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581575" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581576" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.96-35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569296" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.96-35.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581577" version="1" comment="xen-libs is &lt;4.2.5_21-35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581578" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581579" version="1" comment="xen-tools is &lt;4.2.5_21-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581580" version="1" comment="xen-tools-domU is &lt;4.2.5_21-35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581581" version="1" comment="xen is &lt;4.2.5_21-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581582" version="1" comment="xen-doc-html is &lt;4.2.5_21-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581583" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581584" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.116.TDC-37.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581585" version="1" comment="xen-libs is &lt;4.2.5_21-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581586" version="1" comment="xen-tools is &lt;4.2.5_21-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581587" version="1" comment="xen-tools-domU is &lt;4.2.5_21-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581588" version="1" comment="xen is &lt;4.2.5_21-38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581589" version="1" comment="xen-doc-html is &lt;4.2.5_21-38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581590" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581591" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.99-38.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569300" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.99-38.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581592" version="1" comment="xen-libs is &lt;4.2.5_21-38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581593" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581594" version="1" comment="xen-tools is &lt;4.2.5_21-38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581595" version="1" comment="xen-tools-domU is &lt;4.2.5_21-38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581596" version="1" comment="xen is &lt;4.2.5_21-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581597" version="1" comment="xen-doc-html is &lt;4.2.5_21-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581598" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581599" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.119.TDC-40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581600" version="1" comment="xen-libs is &lt;4.2.5_21-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581601" version="1" comment="xen-tools is &lt;4.2.5_21-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581602" version="1" comment="xen-tools-domU is &lt;4.2.5_21-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581603" version="1" comment="xen is &lt;4.2.5_21-43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581604" version="1" comment="xen-doc-html is &lt;4.2.5_21-43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581605" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581606" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.119.TDC-43.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581607" version="1" comment="xen-libs is &lt;4.2.5_21-43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581608" version="1" comment="xen-tools is &lt;4.2.5_21-43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581609" version="1" comment="xen-tools-domU is &lt;4.2.5_21-43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581610" version="1" comment="xen is &lt;4.2.5_21-41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581611" version="1" comment="xen-doc-html is &lt;4.2.5_21-41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581612" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581613" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.99-41.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569304" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.99-41.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581614" version="1" comment="xen-libs is &lt;4.2.5_21-41.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581615" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581616" version="1" comment="xen-tools is &lt;4.2.5_21-41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581617" version="1" comment="xen-tools-domU is &lt;4.2.5_21-41.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581618" version="1" comment="xen is &lt;4.2.5_21-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581619" version="1" comment="xen-doc-html is &lt;4.2.5_21-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581620" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581621" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.102-44.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569308" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.102-44.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581622" version="1" comment="xen-libs is &lt;4.2.5_21-44.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581623" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581624" version="1" comment="xen-tools is &lt;4.2.5_21-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581625" version="1" comment="xen-tools-domU is &lt;4.2.5_21-44.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581626" version="1" comment="xen is &lt;4.2.5_21-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581627" version="1" comment="xen-doc-html is &lt;4.2.5_21-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581628" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581629" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.122.TDC-46.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581630" version="1" comment="xen-libs is &lt;4.2.5_21-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581631" version="1" comment="xen-tools is &lt;4.2.5_21-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581632" version="1" comment="xen-tools-domU is &lt;4.2.5_21-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581633" version="1" comment="xen is &lt;4.2.5_21-47.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581634" version="1" comment="xen-doc-html is &lt;4.2.5_21-47.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581635" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-47.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581636" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.125.TDC-47.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581637" version="1" comment="xen-libs is &lt;4.2.5_21-47.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581638" version="1" comment="xen-tools is &lt;4.2.5_21-47.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581639" version="1" comment="xen-tools-domU is &lt;4.2.5_21-47.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581640" version="1" comment="xen is &lt;4.2.5_21-45.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581641" version="1" comment="xen-doc-html is &lt;4.2.5_21-45.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581642" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-45.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581643" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.105-45.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569312" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.105-45.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581644" version="1" comment="xen-libs is &lt;4.2.5_21-45.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581645" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-45.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581646" version="1" comment="xen-tools is &lt;4.2.5_21-45.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581647" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581648" version="1" comment="xen is &lt;4.2.5_21-47.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581649" version="1" comment="xen-doc-html is &lt;4.2.5_21-47.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581650" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-47.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581651" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.126.5.TDC-47.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581652" version="1" comment="xen-libs is &lt;4.2.5_21-47.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581653" version="1" comment="xen-tools is &lt;4.2.5_21-47.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581654" version="1" comment="xen-tools-domU is &lt;4.2.5_21-47.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581655" version="1" comment="xen is &lt;4.2.5_21-45.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581656" version="1" comment="xen-doc-html is &lt;4.2.5_21-45.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581657" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-45.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581658" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.105-45.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569316" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.105-45.8.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581659" version="1" comment="xen-libs is &lt;4.2.5_21-45.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581660" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-45.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581661" version="1" comment="xen-tools is &lt;4.2.5_21-45.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581662" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581663" version="1" comment="xen is &lt;4.2.5_21-45.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581664" version="1" comment="xen-doc-html is &lt;4.2.5_21-45.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581665" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-45.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581666" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.106.5-45.11.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569320" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.106.5-45.11.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581667" version="1" comment="xen-libs is &lt;4.2.5_21-45.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581668" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-45.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581669" version="1" comment="xen-tools is &lt;4.2.5_21-45.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581670" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581671" version="1" comment="xen is &lt;4.2.5_21-47.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581672" version="1" comment="xen-doc-html is &lt;4.2.5_21-47.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581673" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-47.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581674" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.132.TDC-47.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581675" version="1" comment="xen-libs is &lt;4.2.5_21-47.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581676" version="1" comment="xen-tools is &lt;4.2.5_21-47.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581677" version="1" comment="xen-tools-domU is &lt;4.2.5_21-47.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581678" version="1" comment="xen is &lt;4.2.5_21-45.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581679" version="1" comment="xen-doc-html is &lt;4.2.5_21-45.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581680" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-45.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581681" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.106.8-45.16.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569324" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.106.8-45.16.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581682" version="1" comment="xen-libs is &lt;4.2.5_21-45.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581683" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-45.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581684" version="1" comment="xen-tools is &lt;4.2.5_21-45.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581685" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581686" version="1" comment="xen is &lt;4.2.5_21-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581687" version="1" comment="xen-doc-html is &lt;4.2.5_21-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581688" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581689" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.139.TDC-47.16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581690" version="1" comment="xen-libs is &lt;4.2.5_21-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581691" version="1" comment="xen-tools is &lt;4.2.5_21-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581692" version="1" comment="xen-tools-domU is &lt;4.2.5_21-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581693" version="1" comment="xen is &lt;4.2.5_21-47.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581694" version="1" comment="xen-doc-html is &lt;4.2.5_21-47.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581695" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-47.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581696" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.150.TDC-47.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581697" version="1" comment="xen-libs is &lt;4.2.5_21-47.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581698" version="1" comment="xen-tools is &lt;4.2.5_21-47.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581699" version="1" comment="xen-tools-domU is &lt;4.2.5_21-47.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581700" version="1" comment="xen is &lt;4.2.5_21-45.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581701" version="1" comment="xen-doc-html is &lt;4.2.5_21-45.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581702" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-45.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581703" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.106.14-45.19.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569328" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.106.14-45.19.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581704" version="1" comment="xen-libs is &lt;4.2.5_21-45.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581705" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-45.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581706" version="1" comment="xen-tools is &lt;4.2.5_21-45.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581707" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581708" version="1" comment="xen is &lt;4.2.5_21-45.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581709" version="1" comment="xen-doc-html is &lt;4.2.5_21-45.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581710" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-45.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581711" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.106.19-45.22.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569332" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.106.19-45.22.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581712" version="1" comment="xen-libs is &lt;4.2.5_21-45.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581713" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-45.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581714" version="1" comment="xen-tools is &lt;4.2.5_21-45.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581715" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581716" version="1" comment="xen is &lt;4.2.5_21-47.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581717" version="1" comment="xen-doc-html is &lt;4.2.5_21-47.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581718" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-47.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581719" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.156.TDC-47.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581720" version="1" comment="xen-libs is &lt;4.2.5_21-47.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581721" version="1" comment="xen-tools is &lt;4.2.5_21-47.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581722" version="1" comment="xen-tools-domU is &lt;4.2.5_21-47.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581723" version="1" comment="xen is &lt;4.2.5_21-47.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581724" version="1" comment="xen-doc-html is &lt;4.2.5_21-47.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581725" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-47.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581726" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.181.TDC-47.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581727" version="1" comment="xen-libs is &lt;4.2.5_21-47.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581728" version="1" comment="xen-tools is &lt;4.2.5_21-47.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581729" version="1" comment="xen-tools-domU is &lt;4.2.5_21-47.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581730" version="1" comment="xen is &lt;4.2.5_21-45.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581731" version="1" comment="xen-doc-html is &lt;4.2.5_21-45.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581732" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-45.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581733" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.106.43-45.25.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569336" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.106.43-45.25.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581734" version="1" comment="xen-libs is &lt;4.2.5_21-45.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581735" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-45.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581736" version="1" comment="xen-tools is &lt;4.2.5_21-45.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581737" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581738" version="1" comment="xen is &lt;4.2.5_21-47.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581739" version="1" comment="xen-doc-html is &lt;4.2.5_21-47.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581740" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-47.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581741" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.190.TDC-47.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581742" version="1" comment="xen-libs is &lt;4.2.5_21-47.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581743" version="1" comment="xen-tools is &lt;4.2.5_21-47.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581744" version="1" comment="xen-tools-domU is &lt;4.2.5_21-47.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581745" version="1" comment="xen is &lt;4.2.5_21-47.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581746" version="1" comment="xen-doc-html is &lt;4.2.5_21-47.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581747" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-47.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581748" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.219.TDC-47.37.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581749" version="1" comment="xen-libs is &lt;4.2.5_21-47.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581750" version="1" comment="xen-tools is &lt;4.2.5_21-47.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581751" version="1" comment="xen-tools-domU is &lt;4.2.5_21-47.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581752" version="1" comment="xen is &lt;4.2.5_22-47.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581753" version="1" comment="xen-doc-html is &lt;4.2.5_22-47.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581754" version="1" comment="xen-doc-pdf is &lt;4.2.5_22-47.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581755" version="1" comment="xen-kmp-default is &lt;4.2.5_22_3.0.101_0.238.TDC-47.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581756" version="1" comment="xen-libs is &lt;4.2.5_22-47.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581757" version="1" comment="xen-tools is &lt;4.2.5_22-47.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581758" version="1" comment="xen-tools-domU is &lt;4.2.5_22-47.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581759" version="1" comment="xen is &lt;4.2.5_24-47.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581760" version="1" comment="xen-doc-html is &lt;4.2.5_24-47.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581761" version="1" comment="xen-doc-pdf is &lt;4.2.5_24-47.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581762" version="1" comment="xen-kmp-default is &lt;4.2.5_24_3.0.101_0.238.TDC-47.43.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581763" version="1" comment="xen-libs is &lt;4.2.5_24-47.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581764" version="1" comment="xen-tools is &lt;4.2.5_24-47.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581765" version="1" comment="xen-tools-domU is &lt;4.2.5_24-47.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581766" version="1" comment="xen is &lt;4.2.5_26-47.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581767" version="1" comment="xen-doc-html is &lt;4.2.5_26-47.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581768" version="1" comment="xen-doc-pdf is &lt;4.2.5_26-47.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581769" version="1" comment="xen-kmp-default is &lt;4.2.5_26_3.0.101_0.241.TDC-47.46.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581770" version="1" comment="xen-libs is &lt;4.2.5_26-47.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581771" version="1" comment="xen-tools is &lt;4.2.5_26-47.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581772" version="1" comment="xen-tools-domU is &lt;4.2.5_26-47.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994226" version="1" comment="xen is &lt;4.2.5_28-47.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994227" version="1" comment="xen-doc-html is &lt;4.2.5_28-47.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994228" version="1" comment="xen-doc-pdf is &lt;4.2.5_28-47.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994229" version="1" comment="xen-kmp-default is &lt;4.2.5_28_3.0.101_0.253.TDC-47.49.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994230" version="1" comment="xen-libs is &lt;4.2.5_28-47.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994231" version="1" comment="xen-tools is &lt;4.2.5_28-47.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994232" version="1" comment="xen-tools-domU is &lt;4.2.5_28-47.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994233" version="1" comment="xen is &lt;4.2.5_30-47.52.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994234" version="1" comment="xen-doc-html is &lt;4.2.5_30-47.52.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994235" version="1" comment="xen-doc-pdf is &lt;4.2.5_30-47.52.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994236" version="1" comment="xen-kmp-default is &lt;4.2.5_30_3.0.101_0.258.TDC-47.52.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994237" version="1" comment="xen-libs is &lt;4.2.5_30-47.52.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994238" version="1" comment="xen-tools is &lt;4.2.5_30-47.52.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994239" version="1" comment="xen-tools-domU is &lt;4.2.5_30-47.52.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994240" version="1" comment="xen is &lt;4.2.5_32-47.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994241" version="1" comment="xen-doc-html is &lt;4.2.5_32-47.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994242" version="1" comment="xen-doc-pdf is &lt;4.2.5_32-47.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994243" version="1" comment="xen-kmp-default is &lt;4.2.5_32_3.0.101_0.258.TDC-47.55.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994244" version="1" comment="xen-libs is &lt;4.2.5_32-47.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994245" version="1" comment="xen-tools is &lt;4.2.5_32-47.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994246" version="1" comment="xen-tools-domU is &lt;4.2.5_32-47.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994247" version="1" comment="xen is &lt;4.2.5_34-47.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994248" version="1" comment="xen-doc-html is &lt;4.2.5_34-47.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994249" version="1" comment="xen-doc-pdf is &lt;4.2.5_34-47.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994250" version="1" comment="xen-kmp-default is &lt;4.2.5_34_3.0.101_0.261.TDC-47.58.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994251" version="1" comment="xen-libs is &lt;4.2.5_34-47.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994252" version="1" comment="xen-tools is &lt;4.2.5_34-47.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994253" version="1" comment="xen-tools-domU is &lt;4.2.5_34-47.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994254" version="1" comment="xen is &lt;4.2.5_36-47.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994255" version="1" comment="xen-doc-html is &lt;4.2.5_36-47.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994256" version="1" comment="xen-doc-pdf is &lt;4.2.5_36-47.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994257" version="1" comment="xen-kmp-default is &lt;4.2.5_36_3.0.101_0.261.TDC-47.63.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994258" version="1" comment="xen-libs is &lt;4.2.5_36-47.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994259" version="1" comment="xen-tools is &lt;4.2.5_36-47.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994260" version="1" comment="xen-tools-domU is &lt;4.2.5_36-47.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994261" version="1" comment="xen is &lt;4.2.5_38-47.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994262" version="1" comment="xen-doc-html is &lt;4.2.5_38-47.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994263" version="1" comment="xen-doc-pdf is &lt;4.2.5_38-47.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994264" version="1" comment="xen-kmp-default is &lt;4.2.5_38_3.0.101_0.266.TDC-47.66.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994265" version="1" comment="xen-libs is &lt;4.2.5_38-47.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994266" version="1" comment="xen-tools is &lt;4.2.5_38-47.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994267" version="1" comment="xen-tools-domU is &lt;4.2.5_38-47.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567198" version="1" comment="xen is &lt;4.2.2_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567199" version="1" comment="xen-doc-html is &lt;4.2.2_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567200" version="1" comment="xen-doc-pdf is &lt;4.2.2_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567201" version="1" comment="xen-kmp-default is &lt;4.2.2_06_3.0.82_0.7-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567202" version="1" comment="xen-kmp-pae is &lt;4.2.2_06_3.0.82_0.7-0.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567203" version="1" comment="xen-libs is &lt;4.2.2_06-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567204" version="1" comment="xen-libs-32bit is &lt;4.2.2_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567205" version="1" comment="xen-tools is &lt;4.2.2_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567206" version="1" comment="xen-tools-domU is &lt;4.2.2_06-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567207" version="1" comment="xen is &lt;4.2.3_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567208" version="1" comment="xen-doc-html is &lt;4.2.3_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567209" version="1" comment="xen-doc-pdf is &lt;4.2.3_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567210" version="1" comment="xen-kmp-default is &lt;4.2.3_02_3.0.93_0.8-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567211" version="1" comment="xen-kmp-pae is &lt;4.2.3_02_3.0.93_0.8-0.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567212" version="1" comment="xen-libs is &lt;4.2.3_02-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567213" version="1" comment="xen-libs-32bit is &lt;4.2.3_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567214" version="1" comment="xen-tools is &lt;4.2.3_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567215" version="1" comment="xen-tools-domU is &lt;4.2.3_02-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567216" version="1" comment="xen is &lt;4.2.3_08-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567217" version="1" comment="xen-doc-html is &lt;4.2.3_08-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567218" version="1" comment="xen-doc-pdf is &lt;4.2.3_08-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567219" version="1" comment="xen-kmp-default is &lt;4.2.3_08_3.0.101_0.8-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567220" version="1" comment="xen-kmp-pae is &lt;4.2.3_08_3.0.101_0.8-0.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567221" version="1" comment="xen-libs is &lt;4.2.3_08-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567222" version="1" comment="xen-libs-32bit is &lt;4.2.3_08-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567223" version="1" comment="xen-tools is &lt;4.2.3_08-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567224" version="1" comment="xen-tools-domU is &lt;4.2.3_08-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567225" version="1" comment="xen is &lt;4.2.4_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567226" version="1" comment="xen-doc-html is &lt;4.2.4_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567227" version="1" comment="xen-doc-pdf is &lt;4.2.4_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567228" version="1" comment="xen-kmp-default is &lt;4.2.4_02_3.0.101_0.15-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567229" version="1" comment="xen-kmp-pae is &lt;4.2.4_02_3.0.101_0.15-0.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567230" version="1" comment="xen-libs is &lt;4.2.4_02-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567231" version="1" comment="xen-libs-32bit is &lt;4.2.4_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567232" version="1" comment="xen-tools is &lt;4.2.4_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567233" version="1" comment="xen-tools-domU is &lt;4.2.4_02-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567234" version="1" comment="xen is &lt;4.2.4_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567235" version="1" comment="xen-doc-html is &lt;4.2.4_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567236" version="1" comment="xen-doc-pdf is &lt;4.2.4_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567237" version="1" comment="xen-kmp-default is &lt;4.2.4_04_3.0.101_0.40-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567238" version="1" comment="xen-kmp-pae is &lt;4.2.4_04_3.0.101_0.40-0.9.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567239" version="1" comment="xen-libs is &lt;4.2.4_04-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567240" version="1" comment="xen-libs-32bit is &lt;4.2.4_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567241" version="1" comment="xen-tools is &lt;4.2.4_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567242" version="1" comment="xen-tools-domU is &lt;4.2.4_04-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567243" version="1" comment="xen is &lt;4.2.5_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567244" version="1" comment="xen-doc-html is &lt;4.2.5_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567245" version="1" comment="xen-doc-pdf is &lt;4.2.5_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567246" version="1" comment="xen-kmp-default is &lt;4.2.5_04_3.0.101_0.47.52-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567247" version="1" comment="xen-kmp-pae is &lt;4.2.5_04_3.0.101_0.47.52-0.9.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567248" version="1" comment="xen-libs is &lt;4.2.5_04-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567249" version="1" comment="xen-libs-32bit is &lt;4.2.5_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567250" version="1" comment="xen-tools is &lt;4.2.5_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567251" version="1" comment="xen-tools-domU is &lt;4.2.5_04-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567252" version="1" comment="xen is &lt;4.2.5_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567253" version="1" comment="xen-doc-html is &lt;4.2.5_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567254" version="1" comment="xen-doc-pdf is &lt;4.2.5_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567255" version="1" comment="xen-kmp-default is &lt;4.2.5_08_3.0.101_0.47.55-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567256" version="1" comment="xen-kmp-pae is &lt;4.2.5_08_3.0.101_0.47.55-0.9.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567257" version="1" comment="xen-libs is &lt;4.2.5_08-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567258" version="1" comment="xen-libs-32bit is &lt;4.2.5_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567259" version="1" comment="xen-tools is &lt;4.2.5_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567260" version="1" comment="xen-tools-domU is &lt;4.2.5_08-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567261" version="1" comment="xen is &lt;4.2.5_18-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567262" version="1" comment="xen-doc-html is &lt;4.2.5_18-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567263" version="1" comment="xen-doc-pdf is &lt;4.2.5_18-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567264" version="1" comment="xen-kmp-default is &lt;4.2.5_18_3.0.101_0.47.71-21.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567265" version="1" comment="xen-kmp-pae is &lt;4.2.5_18_3.0.101_0.47.71-21.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567266" version="1" comment="xen-libs is &lt;4.2.5_18-21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567267" version="1" comment="xen-libs-32bit is &lt;4.2.5_18-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567268" version="1" comment="xen-tools is &lt;4.2.5_18-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567269" version="1" comment="xen-tools-domU is &lt;4.2.5_18-21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581773" version="1" comment="xfsprogs is &lt;3.1.8-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581774" version="1" comment="xinetd is &lt;2.3.14-130.133.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994268" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.97.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994269" version="1" comment="xorg-x11-server is &lt;7.4-27.97.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994270" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.97.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581775" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581776" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.42.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581777" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.42.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581778" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581779" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581780" version="1" comment="xorg-x11-libX11-x86 is &lt;7.4-5.11.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581781" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.72.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581782" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.72.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994271" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.72.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994272" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.72.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994273" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.72.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994274" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.72.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581783" version="1" comment="xorg-x11-libXext is &lt;7.4-1.18.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581784" version="1" comment="xorg-x11-libXext-32bit is &lt;7.4-1.18.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581785" version="1" comment="xorg-x11-libXext-x86 is &lt;7.4-1.18.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581786" version="1" comment="xorg-x11-libXfixes is &lt;7.4-1.16.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581787" version="1" comment="xorg-x11-libXfixes-32bit is &lt;7.4-1.16.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581788" version="1" comment="xorg-x11-libXfixes-x86 is &lt;7.4-1.16.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994275" version="1" comment="xorg-x11-libXpm is &lt;7.4-4.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994276" version="1" comment="xorg-x11-libXpm-32bit is &lt;7.4-4.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581789" version="1" comment="xorg-x11-libXrender is &lt;7.4-1.16.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581790" version="1" comment="xorg-x11-libXrender-32bit is &lt;7.4-1.16.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581791" version="1" comment="xorg-x11-libXrender-x86 is &lt;7.4-1.16.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581792" version="1" comment="xorg-x11-libXt is &lt;7.4-1.19.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581793" version="1" comment="xorg-x11-libXt-32bit is &lt;7.4-1.19.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581794" version="1" comment="xorg-x11-libXt-x86 is &lt;7.4-1.19.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581795" version="1" comment="xorg-x11-libXv is &lt;7.4-1.16.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581796" version="1" comment="xorg-x11-libXv-32bit is &lt;7.4-1.16.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581797" version="1" comment="xorg-x11-libXv-x86 is &lt;7.4-1.16.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593935" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593936" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.46.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593937" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.46.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581798" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.118.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581799" version="1" comment="xorg-x11-server is &lt;7.4-27.118.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581800" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.118.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581801" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.121.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581802" version="1" comment="xorg-x11-server is &lt;7.4-27.121.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581803" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.121.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581804" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581805" version="1" comment="xorg-x11-server is &lt;7.4-27.122.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581806" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581807" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.21.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581808" version="1" comment="xorg-x11-server is &lt;7.4-27.122.21.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581809" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.21.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581810" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581811" version="1" comment="xorg-x11-server is &lt;7.4-27.122.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581812" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581813" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581814" version="1" comment="xorg-x11-server is &lt;7.4-27.122.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581815" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581816" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581817" version="1" comment="xorg-x11-server is &lt;7.4-27.122.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581818" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581819" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581820" version="1" comment="xorg-x11-server is &lt;7.4-27.122.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581821" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659912" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659913" version="1" comment="xorg-x11-server is &lt;7.4-27.122.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659914" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660947" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660948" version="1" comment="xorg-x11-server is &lt;7.4-27.122.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660949" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994277" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994278" version="1" comment="xorg-x11-server is &lt;7.4-27.122.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994279" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994280" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994281" version="1" comment="xorg-x11-server is &lt;7.4-27.122.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994282" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994283" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994284" version="1" comment="xorg-x11-server is &lt;7.4-27.122.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994285" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994286" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994287" version="1" comment="xorg-x11-server is &lt;7.4-27.122.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994288" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994289" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994290" version="1" comment="xorg-x11-server is &lt;7.4-27.122.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994291" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994292" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994293" version="1" comment="xorg-x11-server is &lt;7.4-27.122.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994294" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994295" version="1" comment="xrdp is &lt;0.4.1-28.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994296" version="1" comment="xrdp is &lt;0.4.1-28.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581822" version="1" comment="xscreensaver is &lt;5.07-6.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994297" version="1" comment="xscreensaver is &lt;5.07-6.37.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994298" version="1" comment="xterm is &lt;238-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581823" version="1" comment="yast2-storage is &lt;2.17.147.1-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581824" version="1" comment="yast2-storage-lib is &lt;2.17.147.1-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581825" version="1" comment="zlib is &lt;1.2.7-0.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581826" version="1" comment="zlib-32bit is &lt;1.2.7-0.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677179" version="1" comment="zlib is &lt;1.2.7-0.17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677180" version="1" comment="zlib-32bit is &lt;1.2.7-0.17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677951" version="1" comment="zlib-devel is &lt;1.2.7-0.17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677952" version="1" comment="zlib-devel-32bit is &lt;1.2.7-0.17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994299" version="1" comment="zlib is &lt;1.2.7-0.17.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994300" version="1" comment="zlib-32bit is &lt;1.2.7-0.17.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994301" version="1" comment="zlib-devel is &lt;1.2.7-0.17.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009994302" version="1" comment="zlib-devel-32bit is &lt;1.2.7-0.17.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581827" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581828" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581829" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581830" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.37.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581831" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581832" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581833" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581834" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.45.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581835" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581836" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.48.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581837" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.54.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581838" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.54.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581839" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.60.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581840" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.60.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581841" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.65.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581842" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.65.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594212" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.70.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594213" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.70.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581843" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.77.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581844" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.77.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581845" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.5.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581846" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.5.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581847" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581848" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581849" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581850" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581851" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581852" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.17.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581853" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581854" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.22.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581855" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581856" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.29.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581857" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581858" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581859" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581860" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.37.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581861" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581862" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581863" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581864" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.45.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581865" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581866" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.56.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581867" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581868" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.59.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581869" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581870" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.74.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581871" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.79.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581872" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.79.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581873" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.92.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581874" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.92.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581875" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.135.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581876" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.135.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581877" version="1" comment="LibVNCServer is &lt;0.9.1-159.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581878" version="1" comment="LibVNCServer is &lt;0.9.1-160.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581879" version="1" comment="LibVNCServer is &lt;0.9.1-160.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581880" version="1" comment="LibVNCServer is &lt;0.9.1-160.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581881" version="1" comment="LibVNCServer is &lt;0.9.1-160.14.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581882" version="1" comment="LibVNCServer is &lt;0.9.1-160.19.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581883" version="1" comment="LibVNCServer is &lt;0.9.1-160.22.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581884" version="1" comment="MozillaFirefox is &lt;38.6.1esr-34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581885" version="1" comment="MozillaFirefox-translations is &lt;38.6.1esr-34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581886" version="1" comment="MozillaFirefox is &lt;38.8.0esr-40.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581887" version="1" comment="MozillaFirefox-translations is &lt;38.8.0esr-40.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581888" version="1" comment="libfreebl3 is &lt;3.20.2-30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581889" version="1" comment="libfreebl3-32bit is &lt;3.20.2-30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581890" version="1" comment="libfreebl3-x86 is &lt;3.20.2-30.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581891" version="1" comment="libsoftokn3 is &lt;3.20.2-30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581892" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581893" version="1" comment="libsoftokn3-x86 is &lt;3.20.2-30.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581894" version="1" comment="mozilla-nspr is &lt;4.12-26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581895" version="1" comment="mozilla-nspr-32bit is &lt;4.12-26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581896" version="1" comment="mozilla-nspr-x86 is &lt;4.12-26.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581897" version="1" comment="mozilla-nss is &lt;3.20.2-30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581898" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581899" version="1" comment="mozilla-nss-tools is &lt;3.20.2-30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581900" version="1" comment="mozilla-nss-x86 is &lt;3.20.2-30.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581901" version="1" comment="MozillaFirefox is &lt;45.2.0esr-45.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581902" version="1" comment="MozillaFirefox-branding-SLED is &lt;45.0-23.10 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581903" version="1" comment="MozillaFirefox-translations is &lt;45.2.0esr-45.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581904" version="1" comment="firefox-fontconfig is &lt;2.11.0-2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581905" version="1" comment="libfreebl3 is &lt;3.21.1-35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581906" version="1" comment="libfreebl3-32bit is &lt;3.21.1-35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581907" version="1" comment="libfreebl3-x86 is &lt;3.21.1-35.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581908" version="1" comment="libsoftokn3 is &lt;3.21.1-35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581909" version="1" comment="libsoftokn3-32bit is &lt;3.21.1-35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581910" version="1" comment="libsoftokn3-x86 is &lt;3.21.1-35.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581911" version="1" comment="mozilla-nspr is &lt;4.12-29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581912" version="1" comment="mozilla-nspr-32bit is &lt;4.12-29.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581913" version="1" comment="mozilla-nspr-x86 is &lt;4.12-29.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581914" version="1" comment="mozilla-nss is &lt;3.21.1-35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581915" version="1" comment="mozilla-nss-32bit is &lt;3.21.1-35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581916" version="1" comment="mozilla-nss-tools is &lt;3.21.1-35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581917" version="1" comment="mozilla-nss-x86 is &lt;3.21.1-35.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581918" version="1" comment="MozillaFirefox is &lt;45.3.0esr-50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581919" version="1" comment="MozillaFirefox-translations is &lt;45.3.0esr-50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581920" version="1" comment="MozillaFirefox is &lt;45.4.0esr-53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581921" version="1" comment="MozillaFirefox-translations is &lt;45.4.0esr-53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581922" version="1" comment="MozillaFirefox is &lt;45.6.0esr-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581923" version="1" comment="MozillaFirefox-translations is &lt;45.6.0esr-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581924" version="1" comment="MozillaFirefox is &lt;45.7.0esr-65.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581925" version="1" comment="MozillaFirefox-translations is &lt;45.7.0esr-65.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581926" version="1" comment="MozillaFirefox is &lt;45.8.0esr-68.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581927" version="1" comment="MozillaFirefox-translations is &lt;45.8.0esr-68.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581928" version="1" comment="MozillaFirefox is &lt;45.9.0esr-71.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581929" version="1" comment="MozillaFirefox-translations is &lt;45.9.0esr-71.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581930" version="1" comment="libfreebl3 is &lt;3.29.5-46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581931" version="1" comment="libfreebl3-32bit is &lt;3.29.5-46.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581932" version="1" comment="libfreebl3-x86 is &lt;3.29.5-46.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581933" version="1" comment="libsoftokn3 is &lt;3.29.5-46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581934" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-46.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581935" version="1" comment="libsoftokn3-x86 is &lt;3.29.5-46.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581936" version="1" comment="mozilla-nspr is &lt;4.13.1-32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581937" version="1" comment="mozilla-nspr-32bit is &lt;4.13.1-32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581938" version="1" comment="mozilla-nspr-x86 is &lt;4.13.1-32.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581939" version="1" comment="mozilla-nss is &lt;3.29.5-46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581940" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-46.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581941" version="1" comment="mozilla-nss-tools is &lt;3.29.5-46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581942" version="1" comment="mozilla-nss-x86 is &lt;3.29.5-46.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581943" version="1" comment="MozillaFirefox is &lt;52.2.0esr-72.5.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581944" version="1" comment="MozillaFirefox-branding-SLED is &lt;52-24.3.44 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581945" version="1" comment="MozillaFirefox-translations is &lt;52.2.0esr-72.5.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581946" version="1" comment="firefox-libffi4 is &lt;5.3.1+r233831-7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581947" version="1" comment="firefox-libstdc++6 is &lt;5.3.1+r233831-7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581948" version="1" comment="libfreebl3 is &lt;3.29.5-47.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581949" version="1" comment="libfreebl3-32bit is &lt;3.29.5-47.3.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581950" version="1" comment="libfreebl3-x86 is &lt;3.29.5-47.3.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581951" version="1" comment="libsoftokn3 is &lt;3.29.5-47.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581952" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-47.3.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581953" version="1" comment="libsoftokn3-x86 is &lt;3.29.5-47.3.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581954" version="1" comment="mozilla-nss is &lt;3.29.5-47.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581955" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-47.3.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581956" version="1" comment="mozilla-nss-tools is &lt;3.29.5-47.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581957" version="1" comment="mozilla-nss-x86 is &lt;3.29.5-47.3.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581958" version="1" comment="MozillaFirefox is &lt;52.3.0esr-72.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581959" version="1" comment="MozillaFirefox-branding-SLED is &lt;52-24.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581960" version="1" comment="MozillaFirefox-translations is &lt;52.3.0esr-72.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581961" version="1" comment="MozillaFirefox is &lt;52.5.0esr-72.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581962" version="1" comment="MozillaFirefox-translations is &lt;52.5.0esr-72.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581963" version="1" comment="MozillaFirefox is &lt;52.6.0esr-72.20.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581964" version="1" comment="MozillaFirefox-translations is &lt;52.6.0esr-72.20.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581965" version="1" comment="MozillaFirefox is &lt;52.7.3esr-72.27.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581966" version="1" comment="MozillaFirefox-translations is &lt;52.7.3esr-72.27.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581967" version="1" comment="MozillaFirefox is &lt;52.8.0esr-72.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581968" version="1" comment="MozillaFirefox-translations is &lt;52.8.0esr-72.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581969" version="1" comment="MozillaFirefox is &lt;52.8.1esr-72.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581970" version="1" comment="MozillaFirefox-translations is &lt;52.8.1esr-72.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581971" version="1" comment="MozillaFirefox is &lt;52.9.0esr-72.38.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581972" version="1" comment="MozillaFirefox-translations is &lt;52.9.0esr-72.38.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581973" version="1" comment="mozilla-nspr-devel is &lt;4.23-29.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581974" version="1" comment="mozilla-nss-devel is &lt;3.47.1-38.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581975" version="1" comment="MozillaFirefox is &lt;38.7.0esr-37.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581976" version="1" comment="MozillaFirefox-translations is &lt;38.7.0esr-37.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581977" version="1" comment="libfreebl3 is &lt;3.20.2-28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581978" version="1" comment="libfreebl3-32bit is &lt;3.20.2-28.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581979" version="1" comment="libfreebl3-x86 is &lt;3.20.2-28.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581980" version="1" comment="libsoftokn3 is &lt;3.20.2-28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581981" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-28.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581982" version="1" comment="libsoftokn3-x86 is &lt;3.20.2-28.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581983" version="1" comment="mozilla-nspr is &lt;4.12-24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581984" version="1" comment="mozilla-nspr-32bit is &lt;4.12-24.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581985" version="1" comment="mozilla-nspr-x86 is &lt;4.12-24.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581986" version="1" comment="mozilla-nss is &lt;3.20.2-28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581987" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-28.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581988" version="1" comment="mozilla-nss-tools is &lt;3.20.2-28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581989" version="1" comment="mozilla-nss-x86 is &lt;3.20.2-28.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581990" version="1" comment="NetworkManager-kde4 is &lt;0.9.svn1043876-1.3.15 for i586,ia64,ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581991" version="1" comment="NetworkManager-kde4-lang is &lt;0.9.svn1043876-1.3.15 for i586,ia64,ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581992" version="1" comment="NetworkManager-kde4-libs is &lt;0.9.svn1043876-1.3.15 for i586,ia64,ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581993" version="1" comment="NetworkManager-openvpn-kde4 is &lt;0.9.svn1043876-1.3.15 for i586,ia64,ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581994" version="1" comment="NetworkManager-pptp-kde4 is &lt;0.9.svn1043876-1.3.15 for i586,ia64,ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581995" version="1" comment="plasmoid-networkmanagement is &lt;0.9.svn1043876-1.3.15 for i586,ia64,ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581996" version="1" comment="OpenEXR is &lt;1.6.1-83.17.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581997" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581998" version="1" comment="OpenEXR-x86 is &lt;1.6.1-83.17.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581999" version="1" comment="OpenEXR is &lt;1.6.1-83.17.25.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582000" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657137" version="1" comment="OpenEXR is &lt;1.6.1-83.17.30.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657138" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582001" version="1" comment="SDL is &lt;1.2.13-106.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582002" version="1" comment="SDL-32bit is &lt;1.2.13-106.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582003" version="1" comment="SDL-x86 is &lt;1.2.13-106.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679745" version="1" comment="SDL is &lt;1.2.13-106.21.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679746" version="1" comment="SDL-32bit is &lt;1.2.13-106.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567300" version="1" comment="xen is &lt;4.4.2_12-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567301" version="1" comment="xen-doc-html is &lt;4.4.2_12-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567302" version="1" comment="xen-kmp-default is &lt;4.4.2_12_3.0.101_63-23.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567303" version="1" comment="xen-kmp-pae is &lt;4.4.2_12_3.0.101_63-23.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567304" version="1" comment="xen-libs is &lt;4.4.2_12-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567305" version="1" comment="xen-libs-32bit is &lt;4.4.2_12-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567306" version="1" comment="xen-tools is &lt;4.4.2_12-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567307" version="1" comment="xen-tools-domU is &lt;4.4.2_12-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582004" version="1" comment="libadns1 is &lt;1.4-75.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664251" version="1" comment="aide is &lt;0.13.1-40.16.6.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582005" version="1" comment="amanda is &lt;2.5.2.1-188.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582006" version="1" comment="apache2 is &lt;2.2.12-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582007" version="1" comment="apache2-doc is &lt;2.2.12-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582008" version="1" comment="apache2-example-pages is &lt;2.2.12-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582009" version="1" comment="apache2-prefork is &lt;2.2.12-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582010" version="1" comment="apache2-utils is &lt;2.2.12-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582011" version="1" comment="apache2-worker is &lt;2.2.12-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582012" version="1" comment="apache2 is &lt;2.2.12-69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582013" version="1" comment="apache2-doc is &lt;2.2.12-69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582014" version="1" comment="apache2-example-pages is &lt;2.2.12-69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582015" version="1" comment="apache2-prefork is &lt;2.2.12-69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582016" version="1" comment="apache2-utils is &lt;2.2.12-69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582017" version="1" comment="apache2-worker is &lt;2.2.12-69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582018" version="1" comment="apache2 is &lt;2.2.34-70.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582019" version="1" comment="apache2-doc is &lt;2.2.34-70.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582020" version="1" comment="apache2-example-pages is &lt;2.2.34-70.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582021" version="1" comment="apache2-prefork is &lt;2.2.34-70.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582022" version="1" comment="apache2-utils is &lt;2.2.34-70.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582023" version="1" comment="apache2-worker is &lt;2.2.34-70.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582024" version="1" comment="apache2 is &lt;2.2.34-70.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582025" version="1" comment="apache2-doc is &lt;2.2.34-70.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582026" version="1" comment="apache2-example-pages is &lt;2.2.34-70.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582027" version="1" comment="apache2-prefork is &lt;2.2.34-70.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582028" version="1" comment="apache2-utils is &lt;2.2.34-70.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582029" version="1" comment="apache2-worker is &lt;2.2.34-70.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582030" version="1" comment="apache2 is &lt;2.2.34-70.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582031" version="1" comment="apache2-doc is &lt;2.2.34-70.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582032" version="1" comment="apache2-example-pages is &lt;2.2.34-70.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582033" version="1" comment="apache2-prefork is &lt;2.2.34-70.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582034" version="1" comment="apache2-utils is &lt;2.2.34-70.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582035" version="1" comment="apache2-worker is &lt;2.2.34-70.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582036" version="1" comment="apache2 is &lt;2.2.34-70.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582037" version="1" comment="apache2-doc is &lt;2.2.34-70.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582038" version="1" comment="apache2-example-pages is &lt;2.2.34-70.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582039" version="1" comment="apache2-prefork is &lt;2.2.34-70.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582040" version="1" comment="apache2-utils is &lt;2.2.34-70.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582041" version="1" comment="apache2-worker is &lt;2.2.34-70.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582042" version="1" comment="apache2 is &lt;2.2.34-70.27.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582043" version="1" comment="apache2-doc is &lt;2.2.34-70.27.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582044" version="1" comment="apache2-example-pages is &lt;2.2.34-70.27.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582045" version="1" comment="apache2-prefork is &lt;2.2.34-70.27.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582046" version="1" comment="apache2-utils is &lt;2.2.34-70.27.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582047" version="1" comment="apache2-worker is &lt;2.2.34-70.27.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582048" version="1" comment="apache2 is &lt;2.2.34-70.35.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582049" version="1" comment="apache2-doc is &lt;2.2.34-70.35.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582050" version="1" comment="apache2-example-pages is &lt;2.2.34-70.35.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582051" version="1" comment="apache2-prefork is &lt;2.2.34-70.35.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582052" version="1" comment="apache2-utils is &lt;2.2.34-70.35.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582053" version="1" comment="apache2-worker is &lt;2.2.34-70.35.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633957" version="1" comment="apache2 is &lt;2.2.34-70.38.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633958" version="1" comment="apache2-doc is &lt;2.2.34-70.38.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633959" version="1" comment="apache2-example-pages is &lt;2.2.34-70.38.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633960" version="1" comment="apache2-prefork is &lt;2.2.34-70.38.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633961" version="1" comment="apache2-utils is &lt;2.2.34-70.38.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633962" version="1" comment="apache2-worker is &lt;2.2.34-70.38.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673638" version="1" comment="apache2 is &lt;2.2.34-70.41.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673639" version="1" comment="apache2-doc is &lt;2.2.34-70.41.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673640" version="1" comment="apache2-example-pages is &lt;2.2.34-70.41.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673641" version="1" comment="apache2-prefork is &lt;2.2.34-70.41.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673642" version="1" comment="apache2-utils is &lt;2.2.34-70.41.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673643" version="1" comment="apache2-worker is &lt;2.2.34-70.41.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582054" version="1" comment="apache2-mod_jk is &lt;1.2.40-0.2.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582055" version="1" comment="apache2-mod_nss is &lt;1.0.14-0.4.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582056" version="1" comment="apache2-mod_perl is &lt;2.0.4-40.63.3.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582057" version="1" comment="apport is &lt;0.114-12.8.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582058" version="1" comment="apport-crashdb-sle is &lt;0.114-0.8.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582059" version="1" comment="apport-gtk is &lt;0.114-12.8.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009616452" version="1" comment="arpwatch is &lt;2.1a15-131.23.2.6.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627837" version="1" comment="aspell is &lt;0.60.6-26.36.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627838" version="1" comment="aspell-32bit is &lt;0.60.6-26.36.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627839" version="1" comment="aspell-ispell is &lt;0.60.6-26.36.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582060" version="1" comment="atftp is &lt;0.7.0-135.23.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582061" version="1" comment="audiofile is &lt;0.2.6-142.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582062" version="1" comment="audiofile-32bit is &lt;0.2.6-142.17.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582063" version="1" comment="audiofile-x86 is &lt;0.2.6-142.17.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582064" version="1" comment="augeas is &lt;0.9.0-3.21.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582065" version="1" comment="augeas-lenses is &lt;0.9.0-3.21.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582066" version="1" comment="libaugeas0 is &lt;0.9.0-3.21.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582067" version="1" comment="avahi is &lt;0.6.23-35.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582068" version="1" comment="avahi-lang is &lt;0.6.23-35.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582069" version="1" comment="avahi-utils is &lt;0.6.23-35.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582070" version="1" comment="libavahi-client3 is &lt;0.6.23-35.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582071" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-35.6.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582072" version="1" comment="libavahi-client3-x86 is &lt;0.6.23-35.6.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582073" version="1" comment="libavahi-common3 is &lt;0.6.23-35.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582074" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-35.6.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582075" version="1" comment="libavahi-common3-x86 is &lt;0.6.23-35.6.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582076" version="1" comment="libavahi-core5 is &lt;0.6.23-35.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582077" version="1" comment="libavahi-glib1 is &lt;0.6.23-35.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582078" version="1" comment="libavahi-glib1-32bit is &lt;0.6.23-35.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582079" version="1" comment="libavahi-glib1-x86 is &lt;0.6.23-35.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582080" version="1" comment="libdns_sd is &lt;0.6.23-35.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582081" version="1" comment="libdns_sd-32bit is &lt;0.6.23-35.6.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582082" version="1" comment="libdns_sd-x86 is &lt;0.6.23-35.6.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582083" version="1" comment="bash is &lt;3.2-147.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582084" version="1" comment="bash-doc is &lt;3.2-147.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582085" version="1" comment="bash-x86 is &lt;3.2-147.29.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582086" version="1" comment="libreadline5 is &lt;5.2-147.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582087" version="1" comment="libreadline5-32bit is &lt;5.2-147.29.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582088" version="1" comment="libreadline5-x86 is &lt;5.2-147.29.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582089" version="1" comment="readline-doc is &lt;5.2-147.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582090" version="1" comment="bash is &lt;3.2-147.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582091" version="1" comment="bash-doc is &lt;3.2-147.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582092" version="1" comment="bash-x86 is &lt;3.2-147.35.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582093" version="1" comment="libreadline5 is &lt;5.2-147.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582094" version="1" comment="libreadline5-32bit is &lt;5.2-147.35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582095" version="1" comment="libreadline5-x86 is &lt;5.2-147.35.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582096" version="1" comment="readline-doc is &lt;5.2-147.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582097" version="1" comment="bind is &lt;9.9.6P1-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582098" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582099" version="1" comment="bind-doc is &lt;9.9.6P1-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582100" version="1" comment="bind-libs is &lt;9.9.6P1-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582101" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582102" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.25.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582103" version="1" comment="bind-utils is &lt;9.9.6P1-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582104" version="1" comment="bind is &lt;9.9.6P1-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582105" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582106" version="1" comment="bind-doc is &lt;9.9.6P1-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582107" version="1" comment="bind-libs is &lt;9.9.6P1-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582108" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582109" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.30.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582110" version="1" comment="bind-utils is &lt;9.9.6P1-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582111" version="1" comment="bind is &lt;9.9.6P1-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582112" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582113" version="1" comment="bind-doc is &lt;9.9.6P1-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582114" version="1" comment="bind-libs is &lt;9.9.6P1-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582115" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582116" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.33.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582117" version="1" comment="bind-utils is &lt;9.9.6P1-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582118" version="1" comment="bind is &lt;9.9.6P1-0.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582119" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582120" version="1" comment="bind-doc is &lt;9.9.6P1-0.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582121" version="1" comment="bind-libs is &lt;9.9.6P1-0.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582122" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.36.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582123" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.36.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582124" version="1" comment="bind-utils is &lt;9.9.6P1-0.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582125" version="1" comment="bind is &lt;9.9.6P1-0.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582126" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582127" version="1" comment="bind-doc is &lt;9.9.6P1-0.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582128" version="1" comment="bind-libs is &lt;9.9.6P1-0.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582129" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582130" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582131" version="1" comment="bind-utils is &lt;9.9.6P1-0.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582132" version="1" comment="bind is &lt;9.9.6P1-0.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582133" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582134" version="1" comment="bind-doc is &lt;9.9.6P1-0.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582135" version="1" comment="bind-libs is &lt;9.9.6P1-0.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582136" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.44.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582137" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.44.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582138" version="1" comment="bind-utils is &lt;9.9.6P1-0.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582139" version="1" comment="bind is &lt;9.9.6P1-0.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582140" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582141" version="1" comment="bind-doc is &lt;9.9.6P1-0.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582142" version="1" comment="bind-libs is &lt;9.9.6P1-0.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582143" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.47.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582144" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.47.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582145" version="1" comment="bind-utils is &lt;9.9.6P1-0.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582146" version="1" comment="bind is &lt;9.9.6P1-0.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582147" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582148" version="1" comment="bind-doc is &lt;9.9.6P1-0.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582149" version="1" comment="bind-libs is &lt;9.9.6P1-0.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582150" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.50.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582151" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.50.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582152" version="1" comment="bind-utils is &lt;9.9.6P1-0.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582153" version="1" comment="bind is &lt;9.9.6P1-0.51.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582154" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582155" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582156" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582157" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.51.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582158" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582159" version="1" comment="bind is &lt;9.9.6P1-0.51.15.4 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582160" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.15.4 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582161" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.15.4 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582162" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.15.4 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582163" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.51.15.4 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582164" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.15.4 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582165" version="1" comment="bind is &lt;9.9.6P1-0.51.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582166" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582167" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582168" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582169" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.51.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582170" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582171" version="1" comment="bind is &lt;9.9.6P1-0.51.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582172" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582173" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582174" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582175" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.51.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582176" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582177" version="1" comment="bind is &lt;9.9.6P1-0.51.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582178" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582179" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582180" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582181" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.51.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582182" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582183" version="1" comment="libarchive2 is &lt;2.5.5-9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582184" version="1" comment="bzip2 is &lt;1.0.5-34.256.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582185" version="1" comment="bzip2-doc is &lt;1.0.5-34.256.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582186" version="1" comment="libbz2-1 is &lt;1.0.5-34.256.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582187" version="1" comment="libbz2-1-32bit is &lt;1.0.5-34.256.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582188" version="1" comment="bzip2 is &lt;1.0.5-34.256.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582189" version="1" comment="bzip2-doc is &lt;1.0.5-34.256.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582190" version="1" comment="libbz2-1 is &lt;1.0.5-34.256.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582191" version="1" comment="libbz2-1-32bit is &lt;1.0.5-34.256.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582192" version="1" comment="cairo is &lt;1.8.8-2.3.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582193" version="1" comment="cairo-32bit is &lt;1.8.8-2.3.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582194" version="1" comment="cairo-doc is &lt;1.8.8-2.3.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582195" version="1" comment="cairo-x86 is &lt;1.8.8-2.3.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681250" version="1" comment="cifs-utils is &lt;5.1-0.16.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582196" version="1" comment="clamav is &lt;0.99.2-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582197" version="1" comment="clamav is &lt;0.99.3-0.20.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582198" version="1" comment="clamav is &lt;0.99.4-0.20.7.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582199" version="1" comment="clamav is &lt;0.100.1-0.20.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582200" version="1" comment="clamav is &lt;0.100.2-0.20.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582201" version="1" comment="clamav is &lt;0.100.3-0.20.21.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582202" version="1" comment="clamav is &lt;0.100.3-0.20.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582203" version="1" comment="clamav is &lt;0.100.3-0.20.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582204" version="1" comment="clamav is &lt;0.103.0-0.20.32.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582205" version="1" comment="clamav is &lt;0.103.2-0.20.35.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657139" version="1" comment="clamav is &lt;0.103.4-0.20.41.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664015" version="1" comment="clamav is &lt;0.103.5-0.20.44.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582206" version="1" comment="rhnlib is &lt;2.5.69.8-11.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582207" version="1" comment="suseRegisterInfo is &lt;2.1.12-14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582208" version="1" comment="coreutils is &lt;8.12-6.25.33.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582209" version="1" comment="coreutils-lang is &lt;8.12-6.25.33.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582210" version="1" comment="coreutils-x86 is &lt;8.12-6.25.33.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630758" version="1" comment="cpio is &lt;2.9-75.81.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630759" version="1" comment="cpio-lang is &lt;2.9-75.81.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631550" version="1" comment="cpio is &lt;2.9-75.81.14.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631551" version="1" comment="cpio-lang is &lt;2.9-75.81.14.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582211" version="1" comment="cracklib is &lt;2.8.12-56.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582212" version="1" comment="cracklib-32bit is &lt;2.8.12-56.13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582213" version="1" comment="cracklib-x86 is &lt;2.8.12-56.13.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582214" version="1" comment="crash is &lt;7.0.9-30.3.28 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582215" version="1" comment="crash-eppic is &lt;7.0.9-30.3.28 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582216" version="1" comment="cups is &lt;1.3.9-8.46.56.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582217" version="1" comment="cups-client is &lt;1.3.9-8.46.56.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582218" version="1" comment="cups-libs is &lt;1.3.9-8.46.56.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582219" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.56.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582220" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.46.56.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582221" version="1" comment="cups is &lt;1.3.9-8.46.56.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582222" version="1" comment="cups-client is &lt;1.3.9-8.46.56.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582223" version="1" comment="cups-libs is &lt;1.3.9-8.46.56.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582224" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.56.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582225" version="1" comment="cups is &lt;1.3.9-8.46.56.11.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582226" version="1" comment="cups-client is &lt;1.3.9-8.46.56.11.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582227" version="1" comment="cups-libs is &lt;1.3.9-8.46.56.11.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582228" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.56.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582229" version="1" comment="cups is &lt;1.3.9-8.46.56.18.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582230" version="1" comment="cups-client is &lt;1.3.9-8.46.56.18.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582231" version="1" comment="cups-libs is &lt;1.3.9-8.46.56.18.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582232" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.56.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582233" version="1" comment="curl is &lt;7.19.7-1.61.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582234" version="1" comment="libcurl4 is &lt;7.19.7-1.61.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582235" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.61.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582236" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.61.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582237" version="1" comment="curl is &lt;7.19.7-1.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582238" version="1" comment="libcurl4 is &lt;7.19.7-1.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582239" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.64.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582240" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.64.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582241" version="1" comment="curl is &lt;7.19.7-1.69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582242" version="1" comment="libcurl4 is &lt;7.19.7-1.69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582243" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.69.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582244" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.69.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582245" version="1" comment="curl is &lt;7.19.7-1.70.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582246" version="1" comment="libcurl4 is &lt;7.19.7-1.70.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582247" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.70.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582248" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.70.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582249" version="1" comment="curl is &lt;7.19.7-1.70.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582250" version="1" comment="libcurl4 is &lt;7.19.7-1.70.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582251" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.70.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582252" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.70.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582253" version="1" comment="curl is &lt;7.19.7-1.70.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582254" version="1" comment="libcurl4 is &lt;7.19.7-1.70.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582255" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.70.13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582256" version="1" comment="curl is &lt;7.37.0-70.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582257" version="1" comment="libcurl4 is &lt;7.37.0-70.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582258" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.27.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582259" version="1" comment="libcurl4-x86 is &lt;7.37.0-70.27.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582260" version="1" comment="curl is &lt;7.37.0-70.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582261" version="1" comment="libcurl4 is &lt;7.37.0-70.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582262" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582263" version="1" comment="libcurl4-x86 is &lt;7.37.0-70.30.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582264" version="1" comment="curl is &lt;7.37.0-70.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582265" version="1" comment="libcurl4 is &lt;7.37.0-70.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582266" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582267" version="1" comment="libcurl4-x86 is &lt;7.37.0-70.33.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582268" version="1" comment="curl is &lt;7.37.0-70.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582269" version="1" comment="libcurl4 is &lt;7.37.0-70.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582270" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.38.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582271" version="1" comment="libcurl4-x86 is &lt;7.37.0-70.38.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582272" version="1" comment="curl is &lt;7.37.0-70.41.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582273" version="1" comment="libcurl4 is &lt;7.37.0-70.41.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582274" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.41.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582275" version="1" comment="curl is &lt;7.37.0-70.44.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582276" version="1" comment="libcurl4 is &lt;7.37.0-70.44.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582277" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.44.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582278" version="1" comment="curl is &lt;7.37.0-70.47.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582279" version="1" comment="libcurl4 is &lt;7.37.0-70.47.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582280" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.47.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582281" version="1" comment="curl is &lt;7.37.0-70.66.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582282" version="1" comment="libcurl4 is &lt;7.37.0-70.66.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582283" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.66.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582284" version="1" comment="cvs is &lt;1.12.12-144.23.5.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582285" version="1" comment="cvs-doc is &lt;1.12.12-144.23.5.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582286" version="1" comment="cyrus-imapd is &lt;2.3.11-60.65.67.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582287" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.65.67.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582288" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.65.67.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582289" version="1" comment="cyrus-sasl is &lt;2.1.22-182.26.4.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582290" version="1" comment="cyrus-sasl-32bit is &lt;2.1.22-182.26.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582291" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.22-182.26.4.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582292" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.22-182.26.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582293" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.22-182.26.4.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582294" version="1" comment="cyrus-sasl-digestmd5-32bit is &lt;2.1.22-182.26.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582295" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.22-182.26.4.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582296" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.22-182.26.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582297" version="1" comment="cyrus-sasl-otp is &lt;2.1.22-182.26.4.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582298" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.22-182.26.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582299" version="1" comment="cyrus-sasl-plain is &lt;2.1.22-182.26.4.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582300" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.22-182.26.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582301" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.22-182.26.4.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582302" version="1" comment="cyrus-sasl-sqlauxprop is &lt;2.1.22-182.26.4.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582303" version="1" comment="cyrus-sasl-sqlauxprop-32bit is &lt;2.1.22-182.26.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669501" version="1" comment="cyrus-sasl is &lt;2.1.22-182.26.7.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669502" version="1" comment="cyrus-sasl-32bit is &lt;2.1.22-182.26.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669503" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.22-182.26.7.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669504" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.22-182.26.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669505" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.22-182.26.7.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669506" version="1" comment="cyrus-sasl-digestmd5-32bit is &lt;2.1.22-182.26.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669507" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.22-182.26.7.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669508" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.22-182.26.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669509" version="1" comment="cyrus-sasl-otp is &lt;2.1.22-182.26.7.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669510" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.22-182.26.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669511" version="1" comment="cyrus-sasl-plain is &lt;2.1.22-182.26.7.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669512" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.22-182.26.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669513" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.22-182.26.7.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669514" version="1" comment="cyrus-sasl-sqlauxprop is &lt;2.1.22-182.26.7.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669515" version="1" comment="cyrus-sasl-sqlauxprop-32bit is &lt;2.1.22-182.26.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582304" version="1" comment="dbus-1 is &lt;1.2.10-3.34.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582305" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.34.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582306" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.34.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582307" version="1" comment="dhcp is &lt;4.2.4.P2-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582308" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582309" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582310" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582311" version="1" comment="dhcp is &lt;4.2.4.P2-0.28.5.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582312" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.28.5.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582313" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.28.5.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582314" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.28.5.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582315" version="1" comment="dhcp is &lt;4.2.4.P2-0.28.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582316" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.28.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582317" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.28.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582318" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.28.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582319" version="1" comment="dhcp is &lt;4.2.4.P2-0.28.12.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582320" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.28.12.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582321" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.28.12.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582322" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.28.12.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582323" version="1" comment="libdjvulibre21 is &lt;3.5.21-3.9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582324" version="1" comment="libdjvulibre21 is &lt;3.5.21-3.12.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624089" version="1" comment="libdjvulibre21 is &lt;3.5.21-3.15.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627840" version="1" comment="libdjvulibre21 is &lt;3.5.21-3.18.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582325" version="1" comment="dnsmasq is &lt;2.71-0.16.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582326" version="1" comment="dnsmasq is &lt;2.78-0.17.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582327" version="1" comment="dnsmasq is &lt;2.78-0.17.10.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582328" version="1" comment="dnsmasq is &lt;2.78-0.17.15.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679570" version="1" comment="dnsmasq is &lt;2.78-0.17.18.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582329" version="1" comment="dosfstools is &lt;3.0.26-3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582330" version="1" comment="ed is &lt;0.2-1001.30.3.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582331" version="1" comment="emacs is &lt;22.3-42.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582332" version="1" comment="emacs-el is &lt;22.3-42.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582333" version="1" comment="emacs-info is &lt;22.3-42.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582334" version="1" comment="emacs-nox is &lt;22.3-42.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582335" version="1" comment="emacs-x11 is &lt;22.3-42.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582336" version="1" comment="evince is &lt;2.28.2-0.7.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582337" version="1" comment="evince-doc is &lt;2.28.2-0.7.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582338" version="1" comment="evince-lang is &lt;2.28.2-0.7.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582339" version="1" comment="evince is &lt;2.28.2-0.7.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582340" version="1" comment="evince-doc is &lt;2.28.2-0.7.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582341" version="1" comment="evince-lang is &lt;2.28.2-0.7.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582342" version="1" comment="libexempi3 is &lt;2.0.2-4.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582343" version="1" comment="expat is &lt;2.0.1-88.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582344" version="1" comment="libexpat1 is &lt;2.0.1-88.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582345" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.38.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582346" version="1" comment="libexpat1-x86 is &lt;2.0.1-88.38.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582347" version="1" comment="expat is &lt;2.0.1-88.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582348" version="1" comment="libexpat1 is &lt;2.0.1-88.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582349" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.41.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582350" version="1" comment="libexpat1-x86 is &lt;2.0.1-88.41.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582351" version="1" comment="expat is &lt;2.0.1-88.42.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582352" version="1" comment="libexpat1 is &lt;2.0.1-88.42.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582353" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.3.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582354" version="1" comment="libexpat1-x86 is &lt;2.0.1-88.42.3.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664123" version="1" comment="expat is &lt;2.0.1-88.42.12.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664124" version="1" comment="libexpat1 is &lt;2.0.1-88.42.12.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664125" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666464" version="1" comment="expat is &lt;2.0.1-88.42.15.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666465" version="1" comment="libexpat1 is &lt;2.0.1-88.42.15.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666466" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669850" version="1" comment="expat is &lt;2.0.1-88.42.18.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669851" version="1" comment="libexpat1 is &lt;2.0.1-88.42.18.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669852" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671294" version="1" comment="expat is &lt;2.0.1-88.42.22.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671295" version="1" comment="libexpat1 is &lt;2.0.1-88.42.22.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671296" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.22.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582355" version="1" comment="fetchmail is &lt;6.3.8.90-13.20.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582356" version="1" comment="fetchmailconf is &lt;6.3.8.90-13.20.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582357" version="1" comment="MozillaFirefox is &lt;52.4.0esr-72.13.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582358" version="1" comment="MozillaFirefox-translations is &lt;52.4.0esr-72.13.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582359" version="1" comment="libfreebl3 is &lt;3.29.5-47.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582360" version="1" comment="libfreebl3-32bit is &lt;3.29.5-47.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582361" version="1" comment="libfreebl3-x86 is &lt;3.29.5-47.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582362" version="1" comment="libsoftokn3 is &lt;3.29.5-47.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582363" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-47.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582364" version="1" comment="libsoftokn3-x86 is &lt;3.29.5-47.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582365" version="1" comment="mozilla-nss is &lt;3.29.5-47.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582366" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-47.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582367" version="1" comment="mozilla-nss-tools is &lt;3.29.5-47.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582368" version="1" comment="mozilla-nss-x86 is &lt;3.29.5-47.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582369" version="1" comment="firefox-gio-branding-upstream is &lt;2.54.3-2.11.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582370" version="1" comment="firefox-glib2-lang is &lt;2.54.3-2.11.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582371" version="1" comment="firefox-glib2-tools is &lt;2.54.3-2.11.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582372" version="1" comment="firefox-gtk3-branding-upstream is &lt;3.10.9-2.12.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582373" version="1" comment="firefox-gtk3-data is &lt;3.10.9-2.12.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582374" version="1" comment="firefox-gtk3-immodule-amharic is &lt;3.10.9-2.12.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582375" version="1" comment="firefox-gtk3-immodule-inuktitut is &lt;3.10.9-2.12.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582376" version="1" comment="firefox-gtk3-immodule-multipress is &lt;3.10.9-2.12.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582377" version="1" comment="firefox-gtk3-immodule-thai is &lt;3.10.9-2.12.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582378" version="1" comment="firefox-gtk3-immodule-vietnamese is &lt;3.10.9-2.12.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582379" version="1" comment="firefox-gtk3-immodule-xim is &lt;3.10.9-2.12.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582380" version="1" comment="firefox-gtk3-immodules-tigrigna is &lt;3.10.9-2.12.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582381" version="1" comment="firefox-gtk3-lang is &lt;3.10.9-2.12.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582382" version="1" comment="firefox-gtk3-tools is &lt;3.10.9-2.12.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582383" version="1" comment="firefox-libgtk-3-0 is &lt;3.10.9-2.12.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582384" version="1" comment="libfirefox-gio-2_0-0 is &lt;2.54.3-2.11.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582385" version="1" comment="libfirefox-glib-2_0-0 is &lt;2.54.3-2.11.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582386" version="1" comment="libfirefox-gmodule-2_0-0 is &lt;2.54.3-2.11.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582387" version="1" comment="libfirefox-gobject-2_0-0 is &lt;2.54.3-2.11.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582388" version="1" comment="libfirefox-gthread-2_0-0 is &lt;2.54.3-2.11.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582389" version="1" comment="mozilla-nspr-devel is &lt;4.21-29.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582390" version="1" comment="mozilla-nss-devel is &lt;3.45-38.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582391" version="1" comment="firefox-at-spi2-core is &lt;2.10.2-2.6.5 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582392" version="1" comment="firefox-at-spi2-core-lang is &lt;2.10.2-2.6.5 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582393" version="1" comment="firefox-atk-lang is &lt;2.26.1-2.5.5 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582394" version="1" comment="firefox-dbus-1-glib is &lt;0.76-34.2.4.5 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582395" version="1" comment="firefox-gdk-pixbuf-lang is &lt;2.36.11-2.5.4 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582396" version="1" comment="firefox-gdk-pixbuf-query-loaders is &lt;2.36.11-2.5.4 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582397" version="1" comment="firefox-gdk-pixbuf-thumbnailer is &lt;2.36.11-2.5.4 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582398" version="1" comment="firefox-gio-branding-upstream is &lt;2.54.3-2.4.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582399" version="1" comment="firefox-glib2-lang is &lt;2.54.3-2.4.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582400" version="1" comment="firefox-glib2-tools is &lt;2.54.3-2.4.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582401" version="1" comment="firefox-gtk3-branding-upstream is &lt;3.10.9-2.8.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582402" version="1" comment="firefox-gtk3-data is &lt;3.10.9-2.8.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582403" version="1" comment="firefox-gtk3-immodule-amharic is &lt;3.10.9-2.8.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582404" version="1" comment="firefox-gtk3-immodule-inuktitut is &lt;3.10.9-2.8.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582405" version="1" comment="firefox-gtk3-immodule-multipress is &lt;3.10.9-2.8.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582406" version="1" comment="firefox-gtk3-immodule-thai is &lt;3.10.9-2.8.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582407" version="1" comment="firefox-gtk3-immodule-vietnamese is &lt;3.10.9-2.8.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582408" version="1" comment="firefox-gtk3-immodule-xim is &lt;3.10.9-2.8.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582409" version="1" comment="firefox-gtk3-immodules-tigrigna is &lt;3.10.9-2.8.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582410" version="1" comment="firefox-gtk3-lang is &lt;3.10.9-2.8.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582411" version="1" comment="firefox-gtk3-tools is &lt;3.10.9-2.8.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582412" version="1" comment="firefox-libatk-1_0-0 is &lt;2.26.1-2.5.5 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582413" version="1" comment="firefox-libatk-bridge-2_0-0 is &lt;2.10.2-2.6.5 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582414" version="1" comment="firefox-libatspi0 is &lt;2.10.2-2.6.5 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582415" version="1" comment="firefox-libcairo-gobject2 is &lt;1.15.10-2.8.7 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582416" version="1" comment="firefox-libcairo2 is &lt;1.15.10-2.8.7 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582417" version="1" comment="firefox-libfreetype6 is &lt;2.9-2.4.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582418" version="1" comment="firefox-libgcc_s1 is &lt;5.3.1+r233831-10.1 for i586,ppc64,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582419" version="1" comment="firefox-libgdk_pixbuf-2_0-0 is &lt;2.36.11-2.5.4 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582420" version="1" comment="firefox-libgtk-3-0 is &lt;3.10.9-2.8.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582421" version="1" comment="firefox-libharfbuzz0 is &lt;1.7.5-2.4.5 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582422" version="1" comment="firefox-libpango-1_0-0 is &lt;1.40.14-2.4.5 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582423" version="1" comment="firefox-libpixman-1-0 is &lt;0.34.0-2.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582424" version="1" comment="firefox-libstdc++6 is &lt;5.3.1+r233831-10.1 for i586,ppc64,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582425" version="1" comment="libfirefox-gio-2_0-0 is &lt;2.54.3-2.4.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582426" version="1" comment="libfirefox-glib-2_0-0 is &lt;2.54.3-2.4.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582427" version="1" comment="libfirefox-gmodule-2_0-0 is &lt;2.54.3-2.4.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582428" version="1" comment="libfirefox-gobject-2_0-0 is &lt;2.54.3-2.4.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582429" version="1" comment="libfirefox-gthread-2_0-0 is &lt;2.54.3-2.4.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582430" version="1" comment="libfreebl3 is &lt;3.41.1-38.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582431" version="1" comment="libfreebl3-32bit is &lt;3.41.1-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582432" version="1" comment="libsoftokn3 is &lt;3.41.1-38.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582433" version="1" comment="libsoftokn3-32bit is &lt;3.41.1-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582434" version="1" comment="mozilla-nspr is &lt;4.20-29.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582435" version="1" comment="mozilla-nspr-32bit is &lt;4.20-29.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582436" version="1" comment="mozilla-nspr-devel is &lt;4.20-29.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582437" version="1" comment="mozilla-nss is &lt;3.41.1-38.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582438" version="1" comment="mozilla-nss-32bit is &lt;3.41.1-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582439" version="1" comment="mozilla-nss-certs is &lt;3.41.1-38.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582440" version="1" comment="mozilla-nss-certs-32bit is &lt;3.41.1-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582441" version="1" comment="mozilla-nss-devel is &lt;3.41.1-38.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582442" version="1" comment="mozilla-nss-tools is &lt;3.41.1-38.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582443" version="1" comment="fontconfig is &lt;2.6.0-10.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582444" version="1" comment="fontconfig-32bit is &lt;2.6.0-10.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582445" version="1" comment="fontconfig-x86 is &lt;2.6.0-10.19.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582446" version="1" comment="freeradius-server is &lt;2.1.1-7.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582447" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582448" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582449" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582450" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582451" version="1" comment="freeradius-server is &lt;2.1.1-7.25.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582452" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.25.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582453" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.25.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582454" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.25.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582455" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.25.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582456" version="1" comment="freetype2 is &lt;2.3.7-25.41.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582457" version="1" comment="freetype2-32bit is &lt;2.3.7-25.41.4 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582458" version="1" comment="freetype2-x86 is &lt;2.3.7-25.41.4 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582459" version="1" comment="ft2demos is &lt;2.3.7-25.41.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582460" version="1" comment="freetype2 is &lt;2.3.7-25.45.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582461" version="1" comment="freetype2-32bit is &lt;2.3.7-25.45.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582462" version="1" comment="freetype2-x86 is &lt;2.3.7-25.45.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582463" version="1" comment="ft2demos is &lt;2.3.7-25.45.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582464" version="1" comment="freetype2 is &lt;2.3.7-25.45.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582465" version="1" comment="freetype2-32bit is &lt;2.3.7-25.45.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582466" version="1" comment="freetype2-x86 is &lt;2.3.7-25.45.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582467" version="1" comment="ft2demos is &lt;2.3.7-25.45.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582468" version="1" comment="fuse is &lt;2.8.7-0.11.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582469" version="1" comment="libfuse2 is &lt;2.8.7-0.11.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564367" version="1" comment="cpp43 is &lt;4.3.4_20091019-37.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582470" version="1" comment="gcc43 is &lt;4.3.4_20091019-37.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582471" version="1" comment="gcc43-32bit is &lt;4.3.4_20091019-37.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582472" version="1" comment="gcc43-c++ is &lt;4.3.4_20091019-37.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582473" version="1" comment="gcc43-info is &lt;4.3.4_20091019-37.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582474" version="1" comment="gcc43-locale is &lt;4.3.4_20091019-37.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582475" version="1" comment="libstdc++43-devel is &lt;4.3.4_20091019-37.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582476" version="1" comment="libstdc++43-devel-32bit is &lt;4.3.4_20091019-37.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564377" version="1" comment="cpp43 is &lt;4.3.4_20091019-37.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582477" version="1" comment="gcc43 is &lt;4.3.4_20091019-37.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582478" version="1" comment="gcc43-32bit is &lt;4.3.4_20091019-37.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582479" version="1" comment="gcc43-c++ is &lt;4.3.4_20091019-37.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582480" version="1" comment="gcc43-info is &lt;4.3.4_20091019-37.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582481" version="1" comment="gcc43-locale is &lt;4.3.4_20091019-37.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582482" version="1" comment="libstdc++43-devel is &lt;4.3.4_20091019-37.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582483" version="1" comment="libstdc++43-devel-32bit is &lt;4.3.4_20091019-37.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582484" version="1" comment="libatomic1 is &lt;5.3.1+r233831-10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582485" version="1" comment="libatomic1-32bit is &lt;5.3.1+r233831-10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582486" version="1" comment="libffi4 is &lt;5.3.1+r233831-10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582487" version="1" comment="libffi4-32bit is &lt;5.3.1+r233831-10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582488" version="1" comment="libgcc_s1 is &lt;5.3.1+r233831-10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582489" version="1" comment="libgcc_s1-32bit is &lt;5.3.1+r233831-10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582490" version="1" comment="libgfortran3 is &lt;5.3.1+r233831-10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582491" version="1" comment="libgfortran3-32bit is &lt;5.3.1+r233831-10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582492" version="1" comment="libgomp1 is &lt;5.3.1+r233831-10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582493" version="1" comment="libgomp1-32bit is &lt;5.3.1+r233831-10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582494" version="1" comment="libquadmath0 is &lt;5.3.1+r233831-10.1 for i586,ia64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567327" version="1" comment="libquadmath0-32bit is &lt;5.3.1+r233831-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582495" version="1" comment="libstdc++6 is &lt;5.3.1+r233831-10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582496" version="1" comment="libstdc++6-32bit is &lt;5.3.1+r233831-10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582497" version="1" comment="libstdc++6-locale is &lt;5.3.1+r233831-10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589938" version="1" comment="binutils is &lt;2.25.0-5.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589939" version="1" comment="gdb is &lt;7.9.1-3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589940" version="1" comment="gdb-x86 is &lt;7.9.1-3.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589941" version="1" comment="libatomic1 is &lt;5.2.1+r226025-2.4 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589942" version="1" comment="libatomic1-32bit is &lt;5.2.1+r226025-2.4 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589943" version="1" comment="libffi4 is &lt;5.2.1+r226025-2.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589944" version="1" comment="libffi4-32bit is &lt;5.2.1+r226025-2.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589945" version="1" comment="libgcc_s1 is &lt;5.2.1+r226025-2.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589946" version="1" comment="libgcc_s1-32bit is &lt;5.2.1+r226025-2.4 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589947" version="1" comment="libgfortran3 is &lt;5.2.1+r226025-2.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589948" version="1" comment="libgfortran3-32bit is &lt;5.2.1+r226025-2.4 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589949" version="1" comment="libgomp1 is &lt;5.2.1+r226025-2.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589950" version="1" comment="libgomp1-32bit is &lt;5.2.1+r226025-2.4 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589951" version="1" comment="libquadmath0 is &lt;5.2.1+r226025-2.4 for i586,ia64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589934" version="1" comment="libquadmath0-32bit is &lt;5.2.1+r226025-2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589952" version="1" comment="libstdc++6 is &lt;5.2.1+r226025-2.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589953" version="1" comment="libstdc++6-32bit is &lt;5.2.1+r226025-2.4 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589954" version="1" comment="libstdc++6-locale is &lt;5.2.1+r226025-2.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582498" version="1" comment="gd is &lt;2.0.36.RC1-52.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582499" version="1" comment="gd is &lt;2.0.36.RC1-52.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582500" version="1" comment="gd is &lt;2.0.36.RC1-52.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582501" version="1" comment="gd is &lt;2.0.36.RC1-52.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582502" version="1" comment="gd is &lt;2.0.36.RC1-52.33.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582503" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582504" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582505" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582506" version="1" comment="ghostscript-library is &lt;8.62-32.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582507" version="1" comment="ghostscript-omni is &lt;8.62-32.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582508" version="1" comment="ghostscript-x11 is &lt;8.62-32.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582509" version="1" comment="libgimpprint is &lt;4.2.7-32.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582510" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582511" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582512" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582513" version="1" comment="ghostscript-library is &lt;8.62-32.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582514" version="1" comment="ghostscript-omni is &lt;8.62-32.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582515" version="1" comment="ghostscript-x11 is &lt;8.62-32.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582516" version="1" comment="libgimpprint is &lt;4.2.7-32.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582517" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582518" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582519" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582520" version="1" comment="ghostscript-library is &lt;8.62-32.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582521" version="1" comment="ghostscript-omni is &lt;8.62-32.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582522" version="1" comment="ghostscript-x11 is &lt;8.62-32.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582523" version="1" comment="libgimpprint is &lt;4.2.7-32.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582524" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582525" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582526" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582527" version="1" comment="ghostscript-library is &lt;8.62-32.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582528" version="1" comment="ghostscript-omni is &lt;8.62-32.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582529" version="1" comment="ghostscript-x11 is &lt;8.62-32.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582530" version="1" comment="libgimpprint is &lt;4.2.7-32.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582531" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.47.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582532" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.47.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582533" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.47.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582534" version="1" comment="ghostscript-library is &lt;8.62-32.47.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582535" version="1" comment="ghostscript-omni is &lt;8.62-32.47.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582536" version="1" comment="ghostscript-x11 is &lt;8.62-32.47.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582537" version="1" comment="libgimpprint is &lt;4.2.7-32.47.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582538" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.47.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582539" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.47.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582540" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.47.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582541" version="1" comment="ghostscript-library is &lt;8.62-32.47.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582542" version="1" comment="ghostscript-omni is &lt;8.62-32.47.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582543" version="1" comment="ghostscript-x11 is &lt;8.62-32.47.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582544" version="1" comment="libgimpprint is &lt;4.2.7-32.47.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582545" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.47.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582546" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.47.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582547" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.47.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582548" version="1" comment="ghostscript-library is &lt;8.62-32.47.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582549" version="1" comment="ghostscript-omni is &lt;8.62-32.47.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582550" version="1" comment="ghostscript-x11 is &lt;8.62-32.47.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582551" version="1" comment="libgimpprint is &lt;4.2.7-32.47.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582552" version="1" comment="ghostscript-fonts-other is &lt;8.62-47.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582553" version="1" comment="ghostscript-fonts-rus is &lt;8.62-47.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582554" version="1" comment="ghostscript-fonts-std is &lt;8.62-47.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582555" version="1" comment="ghostscript-library is &lt;8.62-47.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582556" version="1" comment="ghostscript-omni is &lt;8.62-47.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582557" version="1" comment="ghostscript-x11 is &lt;8.62-47.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582558" version="1" comment="libgimpprint is &lt;4.2.7-47.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582559" version="1" comment="giflib is &lt;4.1.6-21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582560" version="1" comment="giflib-32bit is &lt;4.1.6-21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582561" version="1" comment="giflib-progs is &lt;4.1.6-21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582562" version="1" comment="giflib-x86 is &lt;4.1.6-21.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582563" version="1" comment="glib2 is &lt;2.22.5-0.8.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582564" version="1" comment="glib2-doc is &lt;2.22.5-0.8.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582565" version="1" comment="glib2-lang is &lt;2.22.5-0.8.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582566" version="1" comment="libgio-2_0-0 is &lt;2.22.5-0.8.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582567" version="1" comment="libgio-2_0-0-32bit is &lt;2.22.5-0.8.36.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582568" version="1" comment="libgio-2_0-0-x86 is &lt;2.22.5-0.8.36.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582569" version="1" comment="libglib-2_0-0 is &lt;2.22.5-0.8.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582570" version="1" comment="libglib-2_0-0-32bit is &lt;2.22.5-0.8.36.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582571" version="1" comment="libglib-2_0-0-x86 is &lt;2.22.5-0.8.36.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582572" version="1" comment="libgmodule-2_0-0 is &lt;2.22.5-0.8.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582573" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.22.5-0.8.36.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582574" version="1" comment="libgmodule-2_0-0-x86 is &lt;2.22.5-0.8.36.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582575" version="1" comment="libgobject-2_0-0 is &lt;2.22.5-0.8.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582576" version="1" comment="libgobject-2_0-0-32bit is &lt;2.22.5-0.8.36.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582577" version="1" comment="libgobject-2_0-0-x86 is &lt;2.22.5-0.8.36.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582578" version="1" comment="libgthread-2_0-0 is &lt;2.22.5-0.8.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582579" version="1" comment="libgthread-2_0-0-32bit is &lt;2.22.5-0.8.36.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582580" version="1" comment="libgthread-2_0-0-x86 is &lt;2.22.5-0.8.36.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582581" version="1" comment="glib2 is &lt;2.22.5-0.8.39.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582582" version="1" comment="glib2-doc is &lt;2.22.5-0.8.39.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582583" version="1" comment="glib2-lang is &lt;2.22.5-0.8.39.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582584" version="1" comment="libgio-2_0-0 is &lt;2.22.5-0.8.39.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582585" version="1" comment="libgio-2_0-0-32bit is &lt;2.22.5-0.8.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582586" version="1" comment="libglib-2_0-0 is &lt;2.22.5-0.8.39.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582587" version="1" comment="libglib-2_0-0-32bit is &lt;2.22.5-0.8.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582588" version="1" comment="libgmodule-2_0-0 is &lt;2.22.5-0.8.39.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582589" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.22.5-0.8.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582590" version="1" comment="libgobject-2_0-0 is &lt;2.22.5-0.8.39.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582591" version="1" comment="libgobject-2_0-0-32bit is &lt;2.22.5-0.8.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582592" version="1" comment="libgthread-2_0-0 is &lt;2.22.5-0.8.39.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582593" version="1" comment="libgthread-2_0-0-32bit is &lt;2.22.5-0.8.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582594" version="1" comment="glibc is &lt;2.11.3-17.102.1 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582595" version="1" comment="glibc-32bit is &lt;2.11.3-17.102.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582596" version="1" comment="glibc-devel is &lt;2.11.3-17.102.1 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582597" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.102.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582598" version="1" comment="glibc-html is &lt;2.11.3-17.102.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582599" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.102.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582600" version="1" comment="glibc-info is &lt;2.11.3-17.102.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582601" version="1" comment="glibc-locale is &lt;2.11.3-17.102.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582602" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.102.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582603" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.102.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582604" version="1" comment="glibc-profile is &lt;2.11.3-17.102.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582605" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.102.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582606" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.102.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582607" version="1" comment="glibc-x86 is &lt;2.11.3-17.102.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582608" version="1" comment="nscd is &lt;2.11.3-17.102.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582609" version="1" comment="glibc is &lt;2.11.3-17.109.1 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582610" version="1" comment="glibc-32bit is &lt;2.11.3-17.109.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582611" version="1" comment="glibc-devel is &lt;2.11.3-17.109.1 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582612" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.109.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582613" version="1" comment="glibc-html is &lt;2.11.3-17.109.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582614" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.109.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582615" version="1" comment="glibc-info is &lt;2.11.3-17.109.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582616" version="1" comment="glibc-locale is &lt;2.11.3-17.109.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582617" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.109.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582618" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.109.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582619" version="1" comment="glibc-profile is &lt;2.11.3-17.109.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582620" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.109.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582621" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.109.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582622" version="1" comment="glibc-x86 is &lt;2.11.3-17.109.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582623" version="1" comment="nscd is &lt;2.11.3-17.109.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582624" version="1" comment="glibc is &lt;2.11.3-17.110.3.1 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582625" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582626" version="1" comment="glibc-devel is &lt;2.11.3-17.110.3.1 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582627" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582628" version="1" comment="glibc-html is &lt;2.11.3-17.110.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582629" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582630" version="1" comment="glibc-info is &lt;2.11.3-17.110.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582631" version="1" comment="glibc-locale is &lt;2.11.3-17.110.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582632" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582633" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.110.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582634" version="1" comment="glibc-profile is &lt;2.11.3-17.110.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582635" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582636" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.110.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582637" version="1" comment="glibc-x86 is &lt;2.11.3-17.110.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582638" version="1" comment="nscd is &lt;2.11.3-17.110.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582639" version="1" comment="glibc is &lt;2.11.3-17.110.6.2 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582640" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.6.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582641" version="1" comment="glibc-devel is &lt;2.11.3-17.110.6.2 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582642" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.6.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582643" version="1" comment="glibc-html is &lt;2.11.3-17.110.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582644" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582645" version="1" comment="glibc-info is &lt;2.11.3-17.110.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582646" version="1" comment="glibc-locale is &lt;2.11.3-17.110.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582647" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.6.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582648" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.110.6.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582649" version="1" comment="glibc-profile is &lt;2.11.3-17.110.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582650" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.6.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582651" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.110.6.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582652" version="1" comment="glibc-x86 is &lt;2.11.3-17.110.6.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582653" version="1" comment="nscd is &lt;2.11.3-17.110.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582654" version="1" comment="glibc is &lt;2.11.3-17.110.9.2 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582655" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.9.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582656" version="1" comment="glibc-devel is &lt;2.11.3-17.110.9.2 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582657" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.9.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582658" version="1" comment="glibc-html is &lt;2.11.3-17.110.9.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582659" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.9.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582660" version="1" comment="glibc-info is &lt;2.11.3-17.110.9.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582661" version="1" comment="glibc-locale is &lt;2.11.3-17.110.9.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582662" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.9.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582663" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.110.9.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582664" version="1" comment="glibc-profile is &lt;2.11.3-17.110.9.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582665" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.9.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582666" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.110.9.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582667" version="1" comment="glibc-x86 is &lt;2.11.3-17.110.9.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582668" version="1" comment="nscd is &lt;2.11.3-17.110.9.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582669" version="1" comment="glibc is &lt;2.11.3-17.110.14.1 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582670" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582671" version="1" comment="glibc-devel is &lt;2.11.3-17.110.14.1 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582672" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582673" version="1" comment="glibc-html is &lt;2.11.3-17.110.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582674" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582675" version="1" comment="glibc-info is &lt;2.11.3-17.110.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582676" version="1" comment="glibc-locale is &lt;2.11.3-17.110.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582677" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582678" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.110.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582679" version="1" comment="glibc-profile is &lt;2.11.3-17.110.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582680" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582681" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.110.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582682" version="1" comment="glibc-x86 is &lt;2.11.3-17.110.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582683" version="1" comment="nscd is &lt;2.11.3-17.110.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582684" version="1" comment="glibc is &lt;2.11.3-17.110.19.2 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582685" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.19.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582686" version="1" comment="glibc-devel is &lt;2.11.3-17.110.19.2 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582687" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.19.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582688" version="1" comment="glibc-html is &lt;2.11.3-17.110.19.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582689" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.19.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582690" version="1" comment="glibc-info is &lt;2.11.3-17.110.19.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582691" version="1" comment="glibc-locale is &lt;2.11.3-17.110.19.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582692" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.19.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582693" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.110.19.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582694" version="1" comment="glibc-profile is &lt;2.11.3-17.110.19.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582695" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.19.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582696" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.110.19.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582697" version="1" comment="glibc-x86 is &lt;2.11.3-17.110.19.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582698" version="1" comment="nscd is &lt;2.11.3-17.110.19.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582699" version="1" comment="glibc is &lt;2.11.3-17.110.24.2 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582700" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.24.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582701" version="1" comment="glibc-devel is &lt;2.11.3-17.110.24.2 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582702" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.24.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582703" version="1" comment="glibc-html is &lt;2.11.3-17.110.24.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582704" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.24.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582705" version="1" comment="glibc-info is &lt;2.11.3-17.110.24.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582706" version="1" comment="glibc-locale is &lt;2.11.3-17.110.24.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582707" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.24.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582708" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.110.24.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582709" version="1" comment="glibc-profile is &lt;2.11.3-17.110.24.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582710" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.24.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582711" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.110.24.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582712" version="1" comment="glibc-x86 is &lt;2.11.3-17.110.24.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582713" version="1" comment="nscd is &lt;2.11.3-17.110.24.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582714" version="1" comment="glibc is &lt;2.11.3-17.110.33.1 for i586,i686,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582715" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582716" version="1" comment="glibc-devel is &lt;2.11.3-17.110.33.1 for i586,i686,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582717" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582718" version="1" comment="glibc-html is &lt;2.11.3-17.110.33.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582719" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.33.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582720" version="1" comment="glibc-info is &lt;2.11.3-17.110.33.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582721" version="1" comment="glibc-locale is &lt;2.11.3-17.110.33.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582722" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582723" version="1" comment="glibc-profile is &lt;2.11.3-17.110.33.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582724" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582725" version="1" comment="nscd is &lt;2.11.3-17.110.33.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634760" version="1" comment="glibc is &lt;2.11.3-17.110.37.1 for i586,i686,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634761" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.37.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634762" version="1" comment="glibc-devel is &lt;2.11.3-17.110.37.1 for i586,i686,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634763" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.37.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634764" version="1" comment="glibc-html is &lt;2.11.3-17.110.37.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634765" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.37.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634766" version="1" comment="glibc-info is &lt;2.11.3-17.110.37.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634767" version="1" comment="glibc-locale is &lt;2.11.3-17.110.37.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634768" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.37.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634769" version="1" comment="glibc-profile is &lt;2.11.3-17.110.37.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634770" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.37.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634771" version="1" comment="nscd is &lt;2.11.3-17.110.37.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673424" version="1" comment="glibc is &lt;2.11.3-17.110.40.1 for i586,i686,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673425" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673426" version="1" comment="glibc-devel is &lt;2.11.3-17.110.40.1 for i586,i686,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673427" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673428" version="1" comment="glibc-html is &lt;2.11.3-17.110.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673429" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673430" version="1" comment="glibc-info is &lt;2.11.3-17.110.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673431" version="1" comment="glibc-locale is &lt;2.11.3-17.110.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673432" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673433" version="1" comment="glibc-profile is &lt;2.11.3-17.110.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673434" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673435" version="1" comment="nscd is &lt;2.11.3-17.110.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582726" version="1" comment="gnome-session is &lt;2.28.0-3.11.12.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582727" version="1" comment="gnome-session-lang is &lt;2.28.0-3.11.12.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582728" version="1" comment="gnutls is &lt;2.4.1-24.39.67.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564541" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.67.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582729" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.67.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582730" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.67.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582731" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.67.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582732" version="1" comment="gnutls is &lt;2.4.1-24.39.70.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564544" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.70.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582733" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.70.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582734" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.70.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582735" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.70.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582736" version="1" comment="gpg2 is &lt;2.0.9-25.33.42.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582737" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.42.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567331" version="1" comment="grub2-x86_64-efi is &lt;2.00-0.54.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567332" version="1" comment="grub2-x86_64-xen is &lt;2.00-0.54.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582738" version="1" comment="grub2-x86_64-efi is &lt;2.00-0.66.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582739" version="1" comment="grub2-x86_64-xen is &lt;2.00-0.66.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582740" version="1" comment="grub2-x86_64-efi is &lt;2.00-0.66.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582741" version="1" comment="grub2-x86_64-xen is &lt;2.00-0.66.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582742" version="1" comment="grub2-x86_64-efi is &lt;2.00-0.66.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582743" version="1" comment="grub2-x86_64-xen is &lt;2.00-0.66.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582744" version="1" comment="grub2-x86_64-efi is &lt;2.02-0.66.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582745" version="1" comment="grub2-x86_64-xen is &lt;2.02-0.66.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582746" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.35-5.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582747" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.35-5.17.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582748" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.35-5.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582749" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.35-5.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582750" version="1" comment="gstreamer-0_10-plugins-base-x86 is &lt;0.10.35-5.17.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582751" version="1" comment="libgstapp-0_10-0 is &lt;0.10.35-5.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582752" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.35-5.17.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582753" version="1" comment="libgstapp-0_10-0-x86 is &lt;0.10.35-5.17.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582754" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.35-5.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582755" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.35-5.17.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582756" version="1" comment="libgstinterfaces-0_10-0-x86 is &lt;0.10.35-5.17.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582757" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.35-5.18.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582758" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.35-5.18.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582759" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.35-5.18.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582760" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.35-5.18.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582761" version="1" comment="libgstapp-0_10-0 is &lt;0.10.35-5.18.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582762" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.35-5.18.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582763" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.35-5.18.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582764" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.35-5.18.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582765" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.30-5.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582766" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.30-5.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582767" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.30-5.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582768" version="1" comment="gtk2 is &lt;2.18.9-0.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582769" version="1" comment="gtk2-32bit is &lt;2.18.9-0.44.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582770" version="1" comment="gtk2-doc is &lt;2.18.9-0.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582771" version="1" comment="gtk2-lang is &lt;2.18.9-0.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582772" version="1" comment="gtk2-x86 is &lt;2.18.9-0.44.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582773" version="1" comment="gtk2 is &lt;2.18.9-0.45.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582774" version="1" comment="gtk2-32bit is &lt;2.18.9-0.45.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582775" version="1" comment="gtk2-doc is &lt;2.18.9-0.45.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582776" version="1" comment="gtk2-lang is &lt;2.18.9-0.45.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582777" version="1" comment="gtk2-x86 is &lt;2.18.9-0.45.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582778" version="1" comment="gtk2 is &lt;2.18.9-0.45.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582779" version="1" comment="gtk2-32bit is &lt;2.18.9-0.45.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582780" version="1" comment="gtk2-doc is &lt;2.18.9-0.45.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582781" version="1" comment="gtk2-lang is &lt;2.18.9-0.45.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582782" version="1" comment="gtk2-x86 is &lt;2.18.9-0.45.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582783" version="1" comment="guile is &lt;1.8.5-24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582784" version="1" comment="libicu is &lt;4.0-7.30.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582785" version="1" comment="libicu-32bit is &lt;4.0-7.30.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582786" version="1" comment="libicu-doc is &lt;4.0-7.30.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582787" version="1" comment="libicu-x86 is &lt;4.0-7.30.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582788" version="1" comment="libicu is &lt;4.0-38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582789" version="1" comment="libicu-32bit is &lt;4.0-38.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582790" version="1" comment="libicu-doc is &lt;4.0-38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582791" version="1" comment="libicu-x86 is &lt;4.0-38.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582792" version="1" comment="libicu is &lt;4.0-43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582793" version="1" comment="libicu-32bit is &lt;4.0-43.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582794" version="1" comment="libicu-doc is &lt;4.0-43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582795" version="1" comment="libicu-x86 is &lt;4.0-43.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582796" version="1" comment="libicu is &lt;4.0-46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582797" version="1" comment="libicu-32bit is &lt;4.0-46.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582798" version="1" comment="libicu-doc is &lt;4.0-46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582799" version="1" comment="libicu-x86 is &lt;4.0-46.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593717" version="1" comment="libicu is &lt;4.0-47.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593718" version="1" comment="libicu-32bit is &lt;4.0-47.3.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593719" version="1" comment="libicu-doc is &lt;4.0-47.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593720" version="1" comment="libicu-x86 is &lt;4.0-47.3.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582800" version="1" comment="libicu is &lt;4.0-47.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582801" version="1" comment="libicu-32bit is &lt;4.0-47.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582802" version="1" comment="libicu-doc is &lt;4.0-47.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582803" version="1" comment="libicu-x86 is &lt;4.0-47.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582804" version="1" comment="inn is &lt;2.4.2-170.21.3.6.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582805" version="1" comment="ipmitool is &lt;1.8.15-0.30.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582806" version="1" comment="ipsec-tools is &lt;0.7.3-1.38.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582807" version="1" comment="libjasper is &lt;1.900.14-134.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582808" version="1" comment="libjasper-32bit is &lt;1.900.14-134.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582809" version="1" comment="libjasper-x86 is &lt;1.900.14-134.25.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582810" version="1" comment="libjasper is &lt;1.900.14-134.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582811" version="1" comment="libjasper-32bit is &lt;1.900.14-134.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582812" version="1" comment="libjasper-x86 is &lt;1.900.14-134.32.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582813" version="1" comment="libjasper is &lt;1.900.14-134.33.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582814" version="1" comment="libjasper-32bit is &lt;1.900.14-134.33.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582815" version="1" comment="libjasper-x86 is &lt;1.900.14-134.33.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582816" version="1" comment="libjasper is &lt;1.900.14-134.33.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582817" version="1" comment="libjasper-32bit is &lt;1.900.14-134.33.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582818" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.10-3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582819" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.10-3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582820" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.10-3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582821" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.10-3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582822" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.20-6.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582823" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.20-6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582824" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.20-6.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582825" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.20-6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582826" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.30-9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582827" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.30-9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582828" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.30-9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582829" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.30-9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582830" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.40-13.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582831" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.40-13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582832" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.40-13.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582833" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.40-13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582834" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.60-19.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582835" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.60-19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582836" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.60-19.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582837" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.60-19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582838" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.1-22.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582839" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.1-22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582840" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.1-22.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582841" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.1-22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582842" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.5-25.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582843" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.5-25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582844" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.5-25.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582845" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.5-25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582846" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.10-26.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582847" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.10-26.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582848" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.10-26.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582849" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.10-26.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582850" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.15-26.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582851" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.15-26.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582852" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.15-26.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582853" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.15-26.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582854" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.20-26.13.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582855" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.20-26.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582856" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.20-26.13.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582857" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.20-26.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582858" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.25-26.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582859" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.25-26.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582860" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.25-26.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582861" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.25-26.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582862" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.30-26.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582863" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.30-26.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582864" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.30-26.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582865" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.30-26.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582866" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.35-26.32.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582867" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.35-26.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582868" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.35-26.32.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582869" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.35-26.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582870" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.40-26.36.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582871" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.40-26.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582872" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.40-26.36.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582873" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.40-26.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582874" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.45-26.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582875" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.45-26.40.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582876" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.45-26.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582877" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.45-26.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582878" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.45-26.40.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582879" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.50-26.44.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582880" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.50-26.44.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582881" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.50-26.44.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582882" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.50-26.44.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582883" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.50-26.44.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582884" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.55-26.47.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582885" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.55-26.47.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582886" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.55-26.47.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582887" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.55-26.47.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582888" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.55-26.47.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582889" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.60-26.50.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582890" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.60-26.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582891" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.60-26.50.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582892" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.60-26.50.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582893" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.60-26.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582894" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.65-26.55.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582895" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.65-26.55.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582896" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.65-26.55.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582897" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.65-26.55.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582898" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.65-26.55.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582899" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.70-26.58.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582900" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.70-26.58.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582901" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.70-26.58.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582902" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.70-26.58.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582903" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.70-26.58.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582904" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.75-26.62.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582905" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.75-26.62.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582906" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.75-26.62.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582907" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.75-26.62.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582908" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.75-26.62.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582909" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.80-26.65.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582910" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.80-26.65.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582911" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.80-26.65.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582912" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.80-26.65.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582913" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.80-26.65.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662529" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr5.0-26.68.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662530" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr5.0-26.68.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662531" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr5.0-26.68.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662532" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr5.0-26.68.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662533" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr5.0-26.68.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674107" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr5.5-26.71.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674108" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr5.5-26.71.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674109" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr5.5-26.71.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674110" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr5.5-26.71.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674111" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr5.5-26.71.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582914" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.50-16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582915" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.50-16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582916" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.50-16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582917" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.50-16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582918" version="1" comment="jpeg is &lt;6b-879.12.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582919" version="1" comment="libjpeg is &lt;6.2.0-879.12.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582920" version="1" comment="libjpeg-32bit is &lt;6.2.0-879.12.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582921" version="1" comment="libjpeg-x86 is &lt;6.2.0-879.12.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582922" version="1" comment="kdelibs3 is &lt;3.5.10-23.30.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582923" version="1" comment="kdelibs3-32bit is &lt;3.5.10-23.30.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582924" version="1" comment="kdelibs3-default-style is &lt;3.5.10-23.30.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582925" version="1" comment="kdelibs3-default-style-32bit is &lt;3.5.10-23.30.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582926" version="1" comment="kdelibs3-default-style-x86 is &lt;3.5.10-23.30.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582927" version="1" comment="kdelibs3-x86 is &lt;3.5.10-23.30.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582928" version="1" comment="kernel-default is &lt;3.0.101-80.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582929" version="1" comment="kernel-default-base is &lt;3.0.101-80.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582931" version="1" comment="kernel-default-man is &lt;3.0.101-80.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582932" version="1" comment="kernel-ec2 is &lt;3.0.101-80.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582933" version="1" comment="kernel-ec2-base is &lt;3.0.101-80.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582935" version="1" comment="kernel-pae is &lt;3.0.101-80.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582936" version="1" comment="kernel-pae-base is &lt;3.0.101-80.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582938" version="1" comment="kernel-ppc64 is &lt;3.0.101-80.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582939" version="1" comment="kernel-ppc64-base is &lt;3.0.101-80.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582941" version="1" comment="kernel-source is &lt;3.0.101-80.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582942" version="1" comment="kernel-syms is &lt;3.0.101-80.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582943" version="1" comment="kernel-trace is &lt;3.0.101-80.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582944" version="1" comment="kernel-trace-base is &lt;3.0.101-80.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582946" version="1" comment="kernel-xen is &lt;3.0.101-80.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582947" version="1" comment="kernel-xen-base is &lt;3.0.101-80.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582949" version="1" comment="kernel-bigmem is &lt;3.0.101-88.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582950" version="1" comment="kernel-bigmem-base is &lt;3.0.101-88.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582952" version="1" comment="kernel-default is &lt;3.0.101-88.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582953" version="1" comment="kernel-default-base is &lt;3.0.101-88.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582955" version="1" comment="kernel-default-man is &lt;3.0.101-88.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582956" version="1" comment="kernel-ec2 is &lt;3.0.101-88.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582957" version="1" comment="kernel-ec2-base is &lt;3.0.101-88.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582959" version="1" comment="kernel-pae is &lt;3.0.101-88.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582960" version="1" comment="kernel-pae-base is &lt;3.0.101-88.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582962" version="1" comment="kernel-ppc64 is &lt;3.0.101-88.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582963" version="1" comment="kernel-ppc64-base is &lt;3.0.101-88.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582965" version="1" comment="kernel-source is &lt;3.0.101-88.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582966" version="1" comment="kernel-syms is &lt;3.0.101-88.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582967" version="1" comment="kernel-trace is &lt;3.0.101-88.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582968" version="1" comment="kernel-trace-base is &lt;3.0.101-88.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582970" version="1" comment="kernel-xen is &lt;3.0.101-88.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582971" version="1" comment="kernel-xen-base is &lt;3.0.101-88.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582973" version="1" comment="kernel-bigmem is &lt;3.0.101-94.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582974" version="1" comment="kernel-bigmem-base is &lt;3.0.101-94.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582976" version="1" comment="kernel-default is &lt;3.0.101-94.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582977" version="1" comment="kernel-default-base is &lt;3.0.101-94.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582979" version="1" comment="kernel-default-man is &lt;3.0.101-94.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582980" version="1" comment="kernel-ec2 is &lt;3.0.101-94.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582981" version="1" comment="kernel-ec2-base is &lt;3.0.101-94.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582983" version="1" comment="kernel-pae is &lt;3.0.101-94.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582984" version="1" comment="kernel-pae-base is &lt;3.0.101-94.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582986" version="1" comment="kernel-ppc64 is &lt;3.0.101-94.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582987" version="1" comment="kernel-ppc64-base is &lt;3.0.101-94.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582989" version="1" comment="kernel-source is &lt;3.0.101-94.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582990" version="1" comment="kernel-syms is &lt;3.0.101-94.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582991" version="1" comment="kernel-trace is &lt;3.0.101-94.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582992" version="1" comment="kernel-trace-base is &lt;3.0.101-94.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582994" version="1" comment="kernel-xen is &lt;3.0.101-94.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582995" version="1" comment="kernel-xen-base is &lt;3.0.101-94.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582997" version="1" comment="kernel-bigmem is &lt;3.0.101-97.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582998" version="1" comment="kernel-bigmem-base is &lt;3.0.101-97.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583000" version="1" comment="kernel-default is &lt;3.0.101-97.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583001" version="1" comment="kernel-default-base is &lt;3.0.101-97.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583003" version="1" comment="kernel-default-man is &lt;3.0.101-97.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583004" version="1" comment="kernel-ec2 is &lt;3.0.101-97.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583005" version="1" comment="kernel-ec2-base is &lt;3.0.101-97.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583007" version="1" comment="kernel-pae is &lt;3.0.101-97.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583008" version="1" comment="kernel-pae-base is &lt;3.0.101-97.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583010" version="1" comment="kernel-ppc64 is &lt;3.0.101-97.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583011" version="1" comment="kernel-ppc64-base is &lt;3.0.101-97.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583013" version="1" comment="kernel-source is &lt;3.0.101-97.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583014" version="1" comment="kernel-syms is &lt;3.0.101-97.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583015" version="1" comment="kernel-trace is &lt;3.0.101-97.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583016" version="1" comment="kernel-trace-base is &lt;3.0.101-97.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583018" version="1" comment="kernel-xen is &lt;3.0.101-97.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583019" version="1" comment="kernel-xen-base is &lt;3.0.101-97.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583021" version="1" comment="kernel-bigmem is &lt;3.0.101-104.2 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583022" version="1" comment="kernel-bigmem-base is &lt;3.0.101-104.2 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583024" version="1" comment="kernel-default is &lt;3.0.101-104.2 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583025" version="1" comment="kernel-default-base is &lt;3.0.101-104.2 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583027" version="1" comment="kernel-default-man is &lt;3.0.101-104.2 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583028" version="1" comment="kernel-ec2 is &lt;3.0.101-104.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583029" version="1" comment="kernel-ec2-base is &lt;3.0.101-104.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583031" version="1" comment="kernel-pae is &lt;3.0.101-104.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583032" version="1" comment="kernel-pae-base is &lt;3.0.101-104.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583034" version="1" comment="kernel-ppc64 is &lt;3.0.101-104.2 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583035" version="1" comment="kernel-ppc64-base is &lt;3.0.101-104.2 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583037" version="1" comment="kernel-source is &lt;3.0.101-104.2 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583038" version="1" comment="kernel-syms is &lt;3.0.101-104.2 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583039" version="1" comment="kernel-trace is &lt;3.0.101-104.2 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583040" version="1" comment="kernel-trace-base is &lt;3.0.101-104.2 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583042" version="1" comment="kernel-xen is &lt;3.0.101-104.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583043" version="1" comment="kernel-xen-base is &lt;3.0.101-104.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583045" version="1" comment="kernel-bigmem is &lt;3.0.101-108.7.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583046" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.7.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583048" version="1" comment="kernel-default is &lt;3.0.101-108.7.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583049" version="1" comment="kernel-default-base is &lt;3.0.101-108.7.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583051" version="1" comment="kernel-default-man is &lt;3.0.101-108.7.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583052" version="1" comment="kernel-ec2 is &lt;3.0.101-108.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583053" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583055" version="1" comment="kernel-pae is &lt;3.0.101-108.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583056" version="1" comment="kernel-pae-base is &lt;3.0.101-108.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583058" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.7.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583059" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.7.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583061" version="1" comment="kernel-source is &lt;3.0.101-108.7.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583062" version="1" comment="kernel-syms is &lt;3.0.101-108.7.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583063" version="1" comment="kernel-trace is &lt;3.0.101-108.7.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583064" version="1" comment="kernel-trace-base is &lt;3.0.101-108.7.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583066" version="1" comment="kernel-xen is &lt;3.0.101-108.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583067" version="1" comment="kernel-xen-base is &lt;3.0.101-108.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583069" version="1" comment="kernel-bigmem is &lt;3.0.101-108.13.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583070" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.13.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583072" version="1" comment="kernel-default is &lt;3.0.101-108.13.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583073" version="1" comment="kernel-default-base is &lt;3.0.101-108.13.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583075" version="1" comment="kernel-default-man is &lt;3.0.101-108.13.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583076" version="1" comment="kernel-ec2 is &lt;3.0.101-108.13.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583077" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.13.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583079" version="1" comment="kernel-pae is &lt;3.0.101-108.13.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583080" version="1" comment="kernel-pae-base is &lt;3.0.101-108.13.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583082" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.13.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583083" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.13.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583085" version="1" comment="kernel-source is &lt;3.0.101-108.13.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583086" version="1" comment="kernel-syms is &lt;3.0.101-108.13.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583087" version="1" comment="kernel-trace is &lt;3.0.101-108.13.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583088" version="1" comment="kernel-trace-base is &lt;3.0.101-108.13.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583090" version="1" comment="kernel-xen is &lt;3.0.101-108.13.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583091" version="1" comment="kernel-xen-base is &lt;3.0.101-108.13.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583093" version="1" comment="kernel-bigmem is &lt;3.0.101-108.71.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583094" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.71.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583096" version="1" comment="kernel-default is &lt;3.0.101-108.71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583097" version="1" comment="kernel-default-base is &lt;3.0.101-108.71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583099" version="1" comment="kernel-default-man is &lt;3.0.101-108.71.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583100" version="1" comment="kernel-ec2 is &lt;3.0.101-108.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583101" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583103" version="1" comment="kernel-pae is &lt;3.0.101-108.71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583104" version="1" comment="kernel-pae-base is &lt;3.0.101-108.71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583106" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.71.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583107" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.71.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583109" version="1" comment="kernel-source is &lt;3.0.101-108.71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583110" version="1" comment="kernel-syms is &lt;3.0.101-108.71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583111" version="1" comment="kernel-trace is &lt;3.0.101-108.71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583112" version="1" comment="kernel-trace-base is &lt;3.0.101-108.71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583114" version="1" comment="kernel-xen is &lt;3.0.101-108.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583115" version="1" comment="kernel-xen-base is &lt;3.0.101-108.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657593" version="1" comment="kernel-bigmem is &lt;3.0.101-108.132.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657594" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.132.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657596" version="1" comment="kernel-default is &lt;3.0.101-108.132.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657597" version="1" comment="kernel-default-base is &lt;3.0.101-108.132.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657599" version="1" comment="kernel-default-man is &lt;3.0.101-108.132.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657600" version="1" comment="kernel-ec2 is &lt;3.0.101-108.132.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657601" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.132.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657603" version="1" comment="kernel-pae is &lt;3.0.101-108.132.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657604" version="1" comment="kernel-pae-base is &lt;3.0.101-108.132.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657606" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.132.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657607" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.132.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657609" version="1" comment="kernel-source is &lt;3.0.101-108.132.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657610" version="1" comment="kernel-syms is &lt;3.0.101-108.132.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657611" version="1" comment="kernel-trace is &lt;3.0.101-108.132.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657612" version="1" comment="kernel-trace-base is &lt;3.0.101-108.132.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657614" version="1" comment="kernel-xen is &lt;3.0.101-108.132.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657615" version="1" comment="kernel-xen-base is &lt;3.0.101-108.132.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671856" version="1" comment="kernel-bigmem is &lt;3.0.101-108.135.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671857" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.135.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671859" version="1" comment="kernel-default is &lt;3.0.101-108.135.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671860" version="1" comment="kernel-default-base is &lt;3.0.101-108.135.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671862" version="1" comment="kernel-default-man is &lt;3.0.101-108.135.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671863" version="1" comment="kernel-ec2 is &lt;3.0.101-108.135.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671864" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.135.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671866" version="1" comment="kernel-pae is &lt;3.0.101-108.135.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671867" version="1" comment="kernel-pae-base is &lt;3.0.101-108.135.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671869" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.135.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671870" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.135.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671872" version="1" comment="kernel-source is &lt;3.0.101-108.135.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671873" version="1" comment="kernel-syms is &lt;3.0.101-108.135.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671874" version="1" comment="kernel-trace is &lt;3.0.101-108.135.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671875" version="1" comment="kernel-trace-base is &lt;3.0.101-108.135.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671877" version="1" comment="kernel-xen is &lt;3.0.101-108.135.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671878" version="1" comment="kernel-xen-base is &lt;3.0.101-108.135.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583117" version="1" comment="kernel-default is &lt;3.0.101-65.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583118" version="1" comment="kernel-default-base is &lt;3.0.101-65.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583120" version="1" comment="kernel-default-man is &lt;3.0.101-65.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583121" version="1" comment="kernel-ec2 is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583122" version="1" comment="kernel-ec2-base is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567342" version="1" comment="kernel-pae is &lt;3.0.101-65.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567343" version="1" comment="kernel-pae-base is &lt;3.0.101-65.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583124" version="1" comment="kernel-ppc64 is &lt;3.0.101-65.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583125" version="1" comment="kernel-ppc64-base is &lt;3.0.101-65.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583127" version="1" comment="kernel-source is &lt;3.0.101-65.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583128" version="1" comment="kernel-syms is &lt;3.0.101-65.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583129" version="1" comment="kernel-trace is &lt;3.0.101-65.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583130" version="1" comment="kernel-trace-base is &lt;3.0.101-65.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567349" version="1" comment="kernel-xen is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567350" version="1" comment="kernel-xen-base is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583132" version="1" comment="kernel-default is &lt;3.0.101-71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583133" version="1" comment="kernel-default-base is &lt;3.0.101-71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583135" version="1" comment="kernel-default-man is &lt;3.0.101-71.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583136" version="1" comment="kernel-ec2 is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583137" version="1" comment="kernel-ec2-base is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567357" version="1" comment="kernel-pae is &lt;3.0.101-71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567358" version="1" comment="kernel-pae-base is &lt;3.0.101-71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583139" version="1" comment="kernel-ppc64 is &lt;3.0.101-71.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583140" version="1" comment="kernel-ppc64-base is &lt;3.0.101-71.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583142" version="1" comment="kernel-source is &lt;3.0.101-71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583143" version="1" comment="kernel-syms is &lt;3.0.101-71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583144" version="1" comment="kernel-trace is &lt;3.0.101-71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583145" version="1" comment="kernel-trace-base is &lt;3.0.101-71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567364" version="1" comment="kernel-xen is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567365" version="1" comment="kernel-xen-base is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583147" version="1" comment="kernel-bigmem is &lt;3.0.101-108.18.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583148" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.18.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583150" version="1" comment="kernel-default is &lt;3.0.101-108.18.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583151" version="1" comment="kernel-default-base is &lt;3.0.101-108.18.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583153" version="1" comment="kernel-default-man is &lt;3.0.101-108.18.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583154" version="1" comment="kernel-ec2 is &lt;3.0.101-108.18.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583155" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.18.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583157" version="1" comment="kernel-pae is &lt;3.0.101-108.18.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583158" version="1" comment="kernel-pae-base is &lt;3.0.101-108.18.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583160" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.18.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583161" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.18.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583163" version="1" comment="kernel-source is &lt;3.0.101-108.18.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583164" version="1" comment="kernel-syms is &lt;3.0.101-108.18.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583165" version="1" comment="kernel-trace is &lt;3.0.101-108.18.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583166" version="1" comment="kernel-trace-base is &lt;3.0.101-108.18.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583168" version="1" comment="kernel-xen is &lt;3.0.101-108.18.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583169" version="1" comment="kernel-xen-base is &lt;3.0.101-108.18.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583171" version="1" comment="kernel-bigmem is &lt;3.0.101-108.21.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583172" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.21.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583174" version="1" comment="kernel-default is &lt;3.0.101-108.21.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583175" version="1" comment="kernel-default-base is &lt;3.0.101-108.21.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583177" version="1" comment="kernel-default-man is &lt;3.0.101-108.21.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583178" version="1" comment="kernel-ec2 is &lt;3.0.101-108.21.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583179" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.21.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583181" version="1" comment="kernel-pae is &lt;3.0.101-108.21.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583182" version="1" comment="kernel-pae-base is &lt;3.0.101-108.21.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583184" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.21.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583185" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.21.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583187" version="1" comment="kernel-source is &lt;3.0.101-108.21.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583188" version="1" comment="kernel-syms is &lt;3.0.101-108.21.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583189" version="1" comment="kernel-trace is &lt;3.0.101-108.21.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583190" version="1" comment="kernel-trace-base is &lt;3.0.101-108.21.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583192" version="1" comment="kernel-xen is &lt;3.0.101-108.21.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583193" version="1" comment="kernel-xen-base is &lt;3.0.101-108.21.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583195" version="1" comment="kernel-default is &lt;3.0.101-108.24.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583196" version="1" comment="kernel-default-base is &lt;3.0.101-108.24.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583198" version="1" comment="kernel-default-man is &lt;3.0.101-108.24.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583199" version="1" comment="kernel-source is &lt;3.0.101-108.24.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583200" version="1" comment="kernel-syms is &lt;3.0.101-108.24.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583201" version="1" comment="kernel-trace is &lt;3.0.101-108.24.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583202" version="1" comment="kernel-trace-base is &lt;3.0.101-108.24.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583204" version="1" comment="kernel-bigmem is &lt;3.0.101-108.35.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583205" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.35.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583207" version="1" comment="kernel-default is &lt;3.0.101-108.35.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583208" version="1" comment="kernel-default-base is &lt;3.0.101-108.35.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583210" version="1" comment="kernel-default-man is &lt;3.0.101-108.35.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583211" version="1" comment="kernel-ec2 is &lt;3.0.101-108.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583212" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583214" version="1" comment="kernel-pae is &lt;3.0.101-108.35.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583215" version="1" comment="kernel-pae-base is &lt;3.0.101-108.35.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583217" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.35.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583218" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.35.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583220" version="1" comment="kernel-source is &lt;3.0.101-108.35.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583221" version="1" comment="kernel-syms is &lt;3.0.101-108.35.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583222" version="1" comment="kernel-trace is &lt;3.0.101-108.35.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583223" version="1" comment="kernel-trace-base is &lt;3.0.101-108.35.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583225" version="1" comment="kernel-xen is &lt;3.0.101-108.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583226" version="1" comment="kernel-xen-base is &lt;3.0.101-108.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583228" version="1" comment="kernel-bigmem is &lt;3.0.101-108.48.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583229" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.48.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583231" version="1" comment="kernel-default is &lt;3.0.101-108.48.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583232" version="1" comment="kernel-default-base is &lt;3.0.101-108.48.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583234" version="1" comment="kernel-default-man is &lt;3.0.101-108.48.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583235" version="1" comment="kernel-ec2 is &lt;3.0.101-108.48.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583236" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.48.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583238" version="1" comment="kernel-pae is &lt;3.0.101-108.48.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583239" version="1" comment="kernel-pae-base is &lt;3.0.101-108.48.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583241" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.48.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583242" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.48.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583244" version="1" comment="kernel-source is &lt;3.0.101-108.48.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583245" version="1" comment="kernel-syms is &lt;3.0.101-108.48.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583246" version="1" comment="kernel-trace is &lt;3.0.101-108.48.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583247" version="1" comment="kernel-trace-base is &lt;3.0.101-108.48.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583249" version="1" comment="kernel-xen is &lt;3.0.101-108.48.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583250" version="1" comment="kernel-xen-base is &lt;3.0.101-108.48.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583252" version="1" comment="kernel-bigmem is &lt;3.0.101-108.52.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583253" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.52.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583255" version="1" comment="kernel-default is &lt;3.0.101-108.52.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583256" version="1" comment="kernel-default-base is &lt;3.0.101-108.52.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583258" version="1" comment="kernel-default-man is &lt;3.0.101-108.52.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583259" version="1" comment="kernel-ec2 is &lt;3.0.101-108.52.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583260" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.52.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583262" version="1" comment="kernel-pae is &lt;3.0.101-108.52.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583263" version="1" comment="kernel-pae-base is &lt;3.0.101-108.52.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583265" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.52.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583266" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.52.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583268" version="1" comment="kernel-source is &lt;3.0.101-108.52.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583269" version="1" comment="kernel-syms is &lt;3.0.101-108.52.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583270" version="1" comment="kernel-trace is &lt;3.0.101-108.52.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583271" version="1" comment="kernel-trace-base is &lt;3.0.101-108.52.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583273" version="1" comment="kernel-xen is &lt;3.0.101-108.52.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583274" version="1" comment="kernel-xen-base is &lt;3.0.101-108.52.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583276" version="1" comment="kernel-bigmem is &lt;3.0.101-108.68.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583277" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.68.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583279" version="1" comment="kernel-default is &lt;3.0.101-108.68.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583280" version="1" comment="kernel-default-base is &lt;3.0.101-108.68.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583282" version="1" comment="kernel-default-man is &lt;3.0.101-108.68.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583283" version="1" comment="kernel-ec2 is &lt;3.0.101-108.68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583284" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583286" version="1" comment="kernel-pae is &lt;3.0.101-108.68.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583287" version="1" comment="kernel-pae-base is &lt;3.0.101-108.68.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583289" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.68.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583290" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.68.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583292" version="1" comment="kernel-source is &lt;3.0.101-108.68.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583293" version="1" comment="kernel-syms is &lt;3.0.101-108.68.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583294" version="1" comment="kernel-trace is &lt;3.0.101-108.68.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583295" version="1" comment="kernel-trace-base is &lt;3.0.101-108.68.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583297" version="1" comment="kernel-xen is &lt;3.0.101-108.68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583298" version="1" comment="kernel-xen-base is &lt;3.0.101-108.68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583300" version="1" comment="kernel-bigmem is &lt;3.0.101-108.77.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583301" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.77.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583303" version="1" comment="kernel-default is &lt;3.0.101-108.77.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583304" version="1" comment="kernel-default-base is &lt;3.0.101-108.77.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583306" version="1" comment="kernel-default-man is &lt;3.0.101-108.77.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583307" version="1" comment="kernel-ec2 is &lt;3.0.101-108.77.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583308" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.77.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583310" version="1" comment="kernel-pae is &lt;3.0.101-108.77.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583311" version="1" comment="kernel-pae-base is &lt;3.0.101-108.77.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583313" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.77.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583314" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.77.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583316" version="1" comment="kernel-source is &lt;3.0.101-108.77.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583317" version="1" comment="kernel-syms is &lt;3.0.101-108.77.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583318" version="1" comment="kernel-trace is &lt;3.0.101-108.77.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583319" version="1" comment="kernel-trace-base is &lt;3.0.101-108.77.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583321" version="1" comment="kernel-xen is &lt;3.0.101-108.77.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583322" version="1" comment="kernel-xen-base is &lt;3.0.101-108.77.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583324" version="1" comment="kernel-bigmem is &lt;3.0.101-108.87.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583325" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.87.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583327" version="1" comment="kernel-default is &lt;3.0.101-108.87.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583328" version="1" comment="kernel-default-base is &lt;3.0.101-108.87.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583330" version="1" comment="kernel-default-man is &lt;3.0.101-108.87.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583331" version="1" comment="kernel-ec2 is &lt;3.0.101-108.87.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583332" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.87.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583334" version="1" comment="kernel-pae is &lt;3.0.101-108.87.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583335" version="1" comment="kernel-pae-base is &lt;3.0.101-108.87.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583337" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.87.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583338" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.87.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583340" version="1" comment="kernel-source is &lt;3.0.101-108.87.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583341" version="1" comment="kernel-syms is &lt;3.0.101-108.87.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583342" version="1" comment="kernel-trace is &lt;3.0.101-108.87.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583343" version="1" comment="kernel-trace-base is &lt;3.0.101-108.87.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583345" version="1" comment="kernel-xen is &lt;3.0.101-108.87.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583346" version="1" comment="kernel-xen-base is &lt;3.0.101-108.87.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583348" version="1" comment="kernel-bigmem is &lt;3.0.101-108.90.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583349" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.90.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583351" version="1" comment="kernel-default is &lt;3.0.101-108.90.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583352" version="1" comment="kernel-default-base is &lt;3.0.101-108.90.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583354" version="1" comment="kernel-default-man is &lt;3.0.101-108.90.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583355" version="1" comment="kernel-ec2 is &lt;3.0.101-108.90.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583356" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.90.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583358" version="1" comment="kernel-pae is &lt;3.0.101-108.90.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583359" version="1" comment="kernel-pae-base is &lt;3.0.101-108.90.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583361" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.90.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583362" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.90.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583364" version="1" comment="kernel-source is &lt;3.0.101-108.90.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583365" version="1" comment="kernel-syms is &lt;3.0.101-108.90.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583366" version="1" comment="kernel-trace is &lt;3.0.101-108.90.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583367" version="1" comment="kernel-trace-base is &lt;3.0.101-108.90.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583369" version="1" comment="kernel-xen is &lt;3.0.101-108.90.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583370" version="1" comment="kernel-xen-base is &lt;3.0.101-108.90.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583372" version="1" comment="kernel-firmware is &lt;20110923-0.59.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583373" version="1" comment="kernel-default is &lt;3.0.101-68.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583374" version="1" comment="kernel-default-base is &lt;3.0.101-68.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583376" version="1" comment="kernel-default-man is &lt;3.0.101-68.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583377" version="1" comment="kernel-ec2 is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583378" version="1" comment="kernel-ec2-base is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567372" version="1" comment="kernel-pae is &lt;3.0.101-68.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567373" version="1" comment="kernel-pae-base is &lt;3.0.101-68.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583380" version="1" comment="kernel-ppc64 is &lt;3.0.101-68.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583381" version="1" comment="kernel-ppc64-base is &lt;3.0.101-68.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583383" version="1" comment="kernel-source is &lt;3.0.101-68.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583384" version="1" comment="kernel-syms is &lt;3.0.101-68.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583385" version="1" comment="kernel-trace is &lt;3.0.101-68.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583386" version="1" comment="kernel-trace-base is &lt;3.0.101-68.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567379" version="1" comment="kernel-xen is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567380" version="1" comment="kernel-xen-base is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583388" version="1" comment="kernel-default is &lt;3.0.101-77.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583389" version="1" comment="kernel-default-base is &lt;3.0.101-77.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583391" version="1" comment="kernel-default-man is &lt;3.0.101-77.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583392" version="1" comment="kernel-ec2 is &lt;3.0.101-77.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583393" version="1" comment="kernel-ec2-base is &lt;3.0.101-77.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583395" version="1" comment="kernel-pae is &lt;3.0.101-77.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583396" version="1" comment="kernel-pae-base is &lt;3.0.101-77.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583398" version="1" comment="kernel-ppc64 is &lt;3.0.101-77.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583399" version="1" comment="kernel-ppc64-base is &lt;3.0.101-77.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583401" version="1" comment="kernel-source is &lt;3.0.101-77.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583402" version="1" comment="kernel-syms is &lt;3.0.101-77.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583403" version="1" comment="kernel-trace is &lt;3.0.101-77.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583404" version="1" comment="kernel-trace-base is &lt;3.0.101-77.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583406" version="1" comment="kernel-xen is &lt;3.0.101-77.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583407" version="1" comment="kernel-xen-base is &lt;3.0.101-77.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583409" version="1" comment="kernel-default is &lt;3.0.101-84.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583410" version="1" comment="kernel-default-base is &lt;3.0.101-84.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583412" version="1" comment="kernel-default-man is &lt;3.0.101-84.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583413" version="1" comment="kernel-ec2 is &lt;3.0.101-84.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583414" version="1" comment="kernel-ec2-base is &lt;3.0.101-84.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583416" version="1" comment="kernel-pae is &lt;3.0.101-84.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583417" version="1" comment="kernel-pae-base is &lt;3.0.101-84.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583419" version="1" comment="kernel-ppc64 is &lt;3.0.101-84.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583420" version="1" comment="kernel-ppc64-base is &lt;3.0.101-84.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583422" version="1" comment="kernel-source is &lt;3.0.101-84.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583423" version="1" comment="kernel-syms is &lt;3.0.101-84.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583424" version="1" comment="kernel-trace is &lt;3.0.101-84.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583425" version="1" comment="kernel-trace-base is &lt;3.0.101-84.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583427" version="1" comment="kernel-xen is &lt;3.0.101-84.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583428" version="1" comment="kernel-xen-base is &lt;3.0.101-84.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583430" version="1" comment="kernel-bigmem is &lt;3.0.101-107.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583431" version="1" comment="kernel-bigmem-base is &lt;3.0.101-107.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583433" version="1" comment="kernel-default is &lt;3.0.101-107.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583434" version="1" comment="kernel-default-base is &lt;3.0.101-107.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583436" version="1" comment="kernel-default-man is &lt;3.0.101-107.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583437" version="1" comment="kernel-ec2 is &lt;3.0.101-107.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583438" version="1" comment="kernel-ec2-base is &lt;3.0.101-107.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583440" version="1" comment="kernel-pae is &lt;3.0.101-107.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583441" version="1" comment="kernel-pae-base is &lt;3.0.101-107.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583443" version="1" comment="kernel-ppc64 is &lt;3.0.101-107.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583444" version="1" comment="kernel-ppc64-base is &lt;3.0.101-107.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583446" version="1" comment="kernel-source is &lt;3.0.101-107.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583447" version="1" comment="kernel-syms is &lt;3.0.101-107.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583448" version="1" comment="kernel-trace is &lt;3.0.101-107.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583449" version="1" comment="kernel-trace-base is &lt;3.0.101-107.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583451" version="1" comment="kernel-xen is &lt;3.0.101-107.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583452" version="1" comment="kernel-xen-base is &lt;3.0.101-107.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583454" version="1" comment="kernel-bigmem is &lt;3.0.101-108.10.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583455" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.10.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583457" version="1" comment="kernel-default is &lt;3.0.101-108.10.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583458" version="1" comment="kernel-default-base is &lt;3.0.101-108.10.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583460" version="1" comment="kernel-default-man is &lt;3.0.101-108.10.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583461" version="1" comment="kernel-ec2 is &lt;3.0.101-108.10.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583462" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.10.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583464" version="1" comment="kernel-pae is &lt;3.0.101-108.10.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583465" version="1" comment="kernel-pae-base is &lt;3.0.101-108.10.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583467" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.10.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583468" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.10.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583470" version="1" comment="kernel-source is &lt;3.0.101-108.10.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583471" version="1" comment="kernel-syms is &lt;3.0.101-108.10.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583472" version="1" comment="kernel-trace is &lt;3.0.101-108.10.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583473" version="1" comment="kernel-trace-base is &lt;3.0.101-108.10.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583475" version="1" comment="kernel-xen is &lt;3.0.101-108.10.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583476" version="1" comment="kernel-xen-base is &lt;3.0.101-108.10.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583478" version="1" comment="kernel-bigmem is &lt;3.0.101-108.57.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583479" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.57.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583481" version="1" comment="kernel-default is &lt;3.0.101-108.57.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583482" version="1" comment="kernel-default-base is &lt;3.0.101-108.57.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583484" version="1" comment="kernel-default-man is &lt;3.0.101-108.57.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583485" version="1" comment="kernel-ec2 is &lt;3.0.101-108.57.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583486" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.57.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583488" version="1" comment="kernel-pae is &lt;3.0.101-108.57.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583489" version="1" comment="kernel-pae-base is &lt;3.0.101-108.57.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583491" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.57.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583492" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.57.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583494" version="1" comment="kernel-source is &lt;3.0.101-108.57.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583495" version="1" comment="kernel-syms is &lt;3.0.101-108.57.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583496" version="1" comment="kernel-trace is &lt;3.0.101-108.57.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583497" version="1" comment="kernel-trace-base is &lt;3.0.101-108.57.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583499" version="1" comment="kernel-xen is &lt;3.0.101-108.57.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583500" version="1" comment="kernel-xen-base is &lt;3.0.101-108.57.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583502" version="1" comment="kernel-bigmem is &lt;3.0.101-108.60.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583503" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.60.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583505" version="1" comment="kernel-default is &lt;3.0.101-108.60.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583506" version="1" comment="kernel-default-base is &lt;3.0.101-108.60.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583508" version="1" comment="kernel-default-man is &lt;3.0.101-108.60.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583509" version="1" comment="kernel-ec2 is &lt;3.0.101-108.60.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583510" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.60.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583512" version="1" comment="kernel-pae is &lt;3.0.101-108.60.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583513" version="1" comment="kernel-pae-base is &lt;3.0.101-108.60.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583515" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.60.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583516" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.60.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583518" version="1" comment="kernel-source is &lt;3.0.101-108.60.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583519" version="1" comment="kernel-syms is &lt;3.0.101-108.60.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583520" version="1" comment="kernel-trace is &lt;3.0.101-108.60.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583521" version="1" comment="kernel-trace-base is &lt;3.0.101-108.60.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583523" version="1" comment="kernel-xen is &lt;3.0.101-108.60.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583524" version="1" comment="kernel-xen-base is &lt;3.0.101-108.60.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583526" version="1" comment="kernel-bigmem is &lt;3.0.101-108.81.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583527" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.81.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583529" version="1" comment="kernel-default is &lt;3.0.101-108.81.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583530" version="1" comment="kernel-default-base is &lt;3.0.101-108.81.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583532" version="1" comment="kernel-default-man is &lt;3.0.101-108.81.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583533" version="1" comment="kernel-ec2 is &lt;3.0.101-108.81.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583534" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.81.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583536" version="1" comment="kernel-pae is &lt;3.0.101-108.81.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583537" version="1" comment="kernel-pae-base is &lt;3.0.101-108.81.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583539" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.81.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583540" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.81.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583542" version="1" comment="kernel-source is &lt;3.0.101-108.81.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583543" version="1" comment="kernel-syms is &lt;3.0.101-108.81.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583544" version="1" comment="kernel-trace is &lt;3.0.101-108.81.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583545" version="1" comment="kernel-trace-base is &lt;3.0.101-108.81.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583547" version="1" comment="kernel-xen is &lt;3.0.101-108.81.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583548" version="1" comment="kernel-xen-base is &lt;3.0.101-108.81.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583550" version="1" comment="kernel-bigmem is &lt;3.0.101-108.95.2 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583551" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.95.2 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583553" version="1" comment="kernel-default is &lt;3.0.101-108.95.2 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583554" version="1" comment="kernel-default-base is &lt;3.0.101-108.95.2 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583556" version="1" comment="kernel-default-man is &lt;3.0.101-108.95.2 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583557" version="1" comment="kernel-ec2 is &lt;3.0.101-108.95.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583558" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.95.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583560" version="1" comment="kernel-pae is &lt;3.0.101-108.95.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583561" version="1" comment="kernel-pae-base is &lt;3.0.101-108.95.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583563" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.95.2 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583564" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.95.2 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583566" version="1" comment="kernel-source is &lt;3.0.101-108.95.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583567" version="1" comment="kernel-syms is &lt;3.0.101-108.95.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583568" version="1" comment="kernel-trace is &lt;3.0.101-108.95.2 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583569" version="1" comment="kernel-trace-base is &lt;3.0.101-108.95.2 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583571" version="1" comment="kernel-xen is &lt;3.0.101-108.95.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583572" version="1" comment="kernel-xen-base is &lt;3.0.101-108.95.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583574" version="1" comment="kernel-bigmem is &lt;3.0.101-108.98.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583575" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.98.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583577" version="1" comment="kernel-default is &lt;3.0.101-108.98.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583578" version="1" comment="kernel-default-base is &lt;3.0.101-108.98.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583580" version="1" comment="kernel-default-man is &lt;3.0.101-108.98.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583581" version="1" comment="kernel-ec2 is &lt;3.0.101-108.98.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583582" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.98.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583584" version="1" comment="kernel-pae is &lt;3.0.101-108.98.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583585" version="1" comment="kernel-pae-base is &lt;3.0.101-108.98.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583587" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.98.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583588" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.98.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583590" version="1" comment="kernel-source is &lt;3.0.101-108.98.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583591" version="1" comment="kernel-syms is &lt;3.0.101-108.98.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583592" version="1" comment="kernel-trace is &lt;3.0.101-108.98.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583593" version="1" comment="kernel-trace-base is &lt;3.0.101-108.98.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583595" version="1" comment="kernel-xen is &lt;3.0.101-108.98.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583596" version="1" comment="kernel-xen-base is &lt;3.0.101-108.98.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583598" version="1" comment="kernel-bigmem is &lt;3.0.101-108.101.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583599" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.101.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583601" version="1" comment="kernel-default is &lt;3.0.101-108.101.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583602" version="1" comment="kernel-default-base is &lt;3.0.101-108.101.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583604" version="1" comment="kernel-default-man is &lt;3.0.101-108.101.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583605" version="1" comment="kernel-ec2 is &lt;3.0.101-108.101.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583606" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.101.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583608" version="1" comment="kernel-pae is &lt;3.0.101-108.101.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583609" version="1" comment="kernel-pae-base is &lt;3.0.101-108.101.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583611" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.101.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583612" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.101.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583614" version="1" comment="kernel-source is &lt;3.0.101-108.101.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583615" version="1" comment="kernel-syms is &lt;3.0.101-108.101.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583616" version="1" comment="kernel-trace is &lt;3.0.101-108.101.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583617" version="1" comment="kernel-trace-base is &lt;3.0.101-108.101.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583619" version="1" comment="kernel-xen is &lt;3.0.101-108.101.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583620" version="1" comment="kernel-xen-base is &lt;3.0.101-108.101.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583622" version="1" comment="kernel-bigmem is &lt;3.0.101-108.108.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583623" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.108.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583625" version="1" comment="kernel-default is &lt;3.0.101-108.108.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583626" version="1" comment="kernel-default-base is &lt;3.0.101-108.108.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583628" version="1" comment="kernel-default-man is &lt;3.0.101-108.108.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583629" version="1" comment="kernel-ec2 is &lt;3.0.101-108.108.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583630" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.108.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583632" version="1" comment="kernel-pae is &lt;3.0.101-108.108.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583633" version="1" comment="kernel-pae-base is &lt;3.0.101-108.108.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583635" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.108.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583636" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.108.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583638" version="1" comment="kernel-source is &lt;3.0.101-108.108.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583639" version="1" comment="kernel-syms is &lt;3.0.101-108.108.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583640" version="1" comment="kernel-trace is &lt;3.0.101-108.108.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583641" version="1" comment="kernel-trace-base is &lt;3.0.101-108.108.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583643" version="1" comment="kernel-xen is &lt;3.0.101-108.108.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583644" version="1" comment="kernel-xen-base is &lt;3.0.101-108.108.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583646" version="1" comment="kernel-bigmem is &lt;3.0.101-108.111.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583647" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.111.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583649" version="1" comment="kernel-default is &lt;3.0.101-108.111.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583650" version="1" comment="kernel-default-base is &lt;3.0.101-108.111.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583652" version="1" comment="kernel-default-man is &lt;3.0.101-108.111.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583653" version="1" comment="kernel-ec2 is &lt;3.0.101-108.111.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583654" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.111.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583656" version="1" comment="kernel-pae is &lt;3.0.101-108.111.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583657" version="1" comment="kernel-pae-base is &lt;3.0.101-108.111.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583659" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.111.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583660" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.111.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583662" version="1" comment="kernel-source is &lt;3.0.101-108.111.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583663" version="1" comment="kernel-syms is &lt;3.0.101-108.111.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583664" version="1" comment="kernel-trace is &lt;3.0.101-108.111.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583665" version="1" comment="kernel-trace-base is &lt;3.0.101-108.111.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583667" version="1" comment="kernel-xen is &lt;3.0.101-108.111.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583668" version="1" comment="kernel-xen-base is &lt;3.0.101-108.111.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583670" version="1" comment="kernel-bigmem is &lt;3.0.101-108.114.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583671" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.114.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583673" version="1" comment="kernel-default is &lt;3.0.101-108.114.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583674" version="1" comment="kernel-default-base is &lt;3.0.101-108.114.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583676" version="1" comment="kernel-default-man is &lt;3.0.101-108.114.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583677" version="1" comment="kernel-ec2 is &lt;3.0.101-108.114.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583678" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.114.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583680" version="1" comment="kernel-pae is &lt;3.0.101-108.114.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583681" version="1" comment="kernel-pae-base is &lt;3.0.101-108.114.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583683" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.114.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583684" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.114.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583686" version="1" comment="kernel-source is &lt;3.0.101-108.114.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583687" version="1" comment="kernel-syms is &lt;3.0.101-108.114.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583688" version="1" comment="kernel-trace is &lt;3.0.101-108.114.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583689" version="1" comment="kernel-trace-base is &lt;3.0.101-108.114.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583691" version="1" comment="kernel-xen is &lt;3.0.101-108.114.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583692" version="1" comment="kernel-xen-base is &lt;3.0.101-108.114.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583694" version="1" comment="kernel-bigmem is &lt;3.0.101-108.117.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583695" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.117.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583697" version="1" comment="kernel-default is &lt;3.0.101-108.117.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583698" version="1" comment="kernel-default-base is &lt;3.0.101-108.117.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583700" version="1" comment="kernel-default-man is &lt;3.0.101-108.117.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583701" version="1" comment="kernel-ec2 is &lt;3.0.101-108.117.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583702" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.117.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583704" version="1" comment="kernel-pae is &lt;3.0.101-108.117.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583705" version="1" comment="kernel-pae-base is &lt;3.0.101-108.117.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583707" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.117.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583708" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.117.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583710" version="1" comment="kernel-source is &lt;3.0.101-108.117.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583711" version="1" comment="kernel-syms is &lt;3.0.101-108.117.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583712" version="1" comment="kernel-trace is &lt;3.0.101-108.117.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583713" version="1" comment="kernel-trace-base is &lt;3.0.101-108.117.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583715" version="1" comment="kernel-xen is &lt;3.0.101-108.117.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583716" version="1" comment="kernel-xen-base is &lt;3.0.101-108.117.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583718" version="1" comment="kernel-bigmem is &lt;3.0.101-108.120.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583719" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.120.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583721" version="1" comment="kernel-default is &lt;3.0.101-108.120.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583722" version="1" comment="kernel-default-base is &lt;3.0.101-108.120.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583724" version="1" comment="kernel-default-man is &lt;3.0.101-108.120.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583725" version="1" comment="kernel-ec2 is &lt;3.0.101-108.120.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583726" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.120.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583728" version="1" comment="kernel-pae is &lt;3.0.101-108.120.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583729" version="1" comment="kernel-pae-base is &lt;3.0.101-108.120.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583731" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.120.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583732" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.120.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583734" version="1" comment="kernel-source is &lt;3.0.101-108.120.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583735" version="1" comment="kernel-syms is &lt;3.0.101-108.120.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583736" version="1" comment="kernel-trace is &lt;3.0.101-108.120.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583737" version="1" comment="kernel-trace-base is &lt;3.0.101-108.120.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583739" version="1" comment="kernel-xen is &lt;3.0.101-108.120.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583740" version="1" comment="kernel-xen-base is &lt;3.0.101-108.120.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594244" version="1" comment="kernel-bigmem is &lt;3.0.101-108.123.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594245" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.123.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594247" version="1" comment="kernel-default is &lt;3.0.101-108.123.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594248" version="1" comment="kernel-default-base is &lt;3.0.101-108.123.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594250" version="1" comment="kernel-default-man is &lt;3.0.101-108.123.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594251" version="1" comment="kernel-ec2 is &lt;3.0.101-108.123.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594252" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.123.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594254" version="1" comment="kernel-pae is &lt;3.0.101-108.123.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594255" version="1" comment="kernel-pae-base is &lt;3.0.101-108.123.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594257" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.123.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594258" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.123.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594260" version="1" comment="kernel-source is &lt;3.0.101-108.123.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594261" version="1" comment="kernel-syms is &lt;3.0.101-108.123.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594262" version="1" comment="kernel-trace is &lt;3.0.101-108.123.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594263" version="1" comment="kernel-trace-base is &lt;3.0.101-108.123.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594265" version="1" comment="kernel-xen is &lt;3.0.101-108.123.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594266" version="1" comment="kernel-xen-base is &lt;3.0.101-108.123.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583742" version="1" comment="kernel-bigmem is &lt;3.0.101-108.126.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583743" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.126.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583745" version="1" comment="kernel-default is &lt;3.0.101-108.126.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583746" version="1" comment="kernel-default-base is &lt;3.0.101-108.126.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583748" version="1" comment="kernel-default-man is &lt;3.0.101-108.126.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583749" version="1" comment="kernel-ec2 is &lt;3.0.101-108.126.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583750" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.126.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583752" version="1" comment="kernel-pae is &lt;3.0.101-108.126.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583753" version="1" comment="kernel-pae-base is &lt;3.0.101-108.126.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583755" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.126.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583756" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.126.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583758" version="1" comment="kernel-source is &lt;3.0.101-108.126.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583759" version="1" comment="kernel-syms is &lt;3.0.101-108.126.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583760" version="1" comment="kernel-trace is &lt;3.0.101-108.126.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583761" version="1" comment="kernel-trace-base is &lt;3.0.101-108.126.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583763" version="1" comment="kernel-xen is &lt;3.0.101-108.126.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583764" version="1" comment="kernel-xen-base is &lt;3.0.101-108.126.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624243" version="1" comment="kernel-bigmem is &lt;3.0.101-108.129.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624244" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.129.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624246" version="1" comment="kernel-default is &lt;3.0.101-108.129.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624247" version="1" comment="kernel-default-base is &lt;3.0.101-108.129.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624249" version="1" comment="kernel-default-man is &lt;3.0.101-108.129.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624250" version="1" comment="kernel-ec2 is &lt;3.0.101-108.129.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624251" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.129.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624253" version="1" comment="kernel-pae is &lt;3.0.101-108.129.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624254" version="1" comment="kernel-pae-base is &lt;3.0.101-108.129.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624256" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.129.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624257" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.129.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624259" version="1" comment="kernel-source is &lt;3.0.101-108.129.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624260" version="1" comment="kernel-syms is &lt;3.0.101-108.129.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624261" version="1" comment="kernel-trace is &lt;3.0.101-108.129.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624262" version="1" comment="kernel-trace-base is &lt;3.0.101-108.129.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624264" version="1" comment="kernel-xen is &lt;3.0.101-108.129.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624265" version="1" comment="kernel-xen-base is &lt;3.0.101-108.129.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583766" version="1" comment="kernel-bigmem is &lt;3.0.101-108.38.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583767" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.38.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583769" version="1" comment="kernel-default is &lt;3.0.101-108.38.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583770" version="1" comment="kernel-default-base is &lt;3.0.101-108.38.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583772" version="1" comment="kernel-default-man is &lt;3.0.101-108.38.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583773" version="1" comment="kernel-ec2 is &lt;3.0.101-108.38.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583774" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.38.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583776" version="1" comment="kernel-pae is &lt;3.0.101-108.38.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583777" version="1" comment="kernel-pae-base is &lt;3.0.101-108.38.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583779" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.38.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583780" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.38.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583782" version="1" comment="kernel-source is &lt;3.0.101-108.38.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583783" version="1" comment="kernel-syms is &lt;3.0.101-108.38.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583784" version="1" comment="kernel-trace is &lt;3.0.101-108.38.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583785" version="1" comment="kernel-trace-base is &lt;3.0.101-108.38.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583787" version="1" comment="kernel-xen is &lt;3.0.101-108.38.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583788" version="1" comment="kernel-xen-base is &lt;3.0.101-108.38.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583790" version="1" comment="kernel-bigmem is &lt;3.0.101-108.41.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583791" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.41.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583793" version="1" comment="kernel-default is &lt;3.0.101-108.41.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583794" version="1" comment="kernel-default-base is &lt;3.0.101-108.41.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583796" version="1" comment="kernel-default-man is &lt;3.0.101-108.41.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583797" version="1" comment="kernel-ec2 is &lt;3.0.101-108.41.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583798" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.41.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583800" version="1" comment="kernel-pae is &lt;3.0.101-108.41.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583801" version="1" comment="kernel-pae-base is &lt;3.0.101-108.41.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583803" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.41.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583804" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.41.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583806" version="1" comment="kernel-source is &lt;3.0.101-108.41.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583807" version="1" comment="kernel-syms is &lt;3.0.101-108.41.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583808" version="1" comment="kernel-trace is &lt;3.0.101-108.41.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583809" version="1" comment="kernel-trace-base is &lt;3.0.101-108.41.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583811" version="1" comment="kernel-xen is &lt;3.0.101-108.41.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583812" version="1" comment="kernel-xen-base is &lt;3.0.101-108.41.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583814" version="1" comment="iscsitarget is &lt;1.4.20-0.43.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583815" version="1" comment="iscsitarget-kmp-bigmem is &lt;1.4.20_3.0.101_108.52-0.43.2.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583816" version="1" comment="iscsitarget-kmp-default is &lt;1.4.20_3.0.101_108.52-0.43.2.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583817" version="1" comment="iscsitarget-kmp-pae is &lt;1.4.20_3.0.101_108.52-0.43.2.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583818" version="1" comment="iscsitarget-kmp-ppc64 is &lt;1.4.20_3.0.101_108.52-0.43.2.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583819" version="1" comment="iscsitarget-kmp-trace is &lt;1.4.20_3.0.101_108.52-0.43.2.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583820" version="1" comment="iscsitarget-kmp-xen is &lt;1.4.20_3.0.101_108.52-0.43.2.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583821" version="1" comment="ofed is &lt;1.5.4.1-22.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583822" version="1" comment="ofed-doc is &lt;1.5.4.1-22.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583823" version="1" comment="ofed-kmp-bigmem is &lt;1.5.4.1_3.0.101_108.52-22.3.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583824" version="1" comment="ofed-kmp-default is &lt;1.5.4.1_3.0.101_108.52-22.3.1 for i586,ia64,ppc64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583825" version="1" comment="ofed-kmp-pae is &lt;1.5.4.1_3.0.101_108.52-22.3.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583826" version="1" comment="ofed-kmp-ppc64 is &lt;1.5.4.1_3.0.101_108.52-22.3.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583827" version="1" comment="ofed-kmp-trace is &lt;1.5.4.1_3.0.101_108.52-22.3.1 for i586,ia64,ppc64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583828" version="1" comment="iscsitarget is &lt;1.4.20-0.43.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583829" version="1" comment="iscsitarget-kmp-bigmem is &lt;1.4.20_3.0.101_108.87-0.43.7.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583830" version="1" comment="iscsitarget-kmp-default is &lt;1.4.20_3.0.101_108.87-0.43.7.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583831" version="1" comment="iscsitarget-kmp-pae is &lt;1.4.20_3.0.101_108.87-0.43.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583832" version="1" comment="iscsitarget-kmp-ppc64 is &lt;1.4.20_3.0.101_108.87-0.43.7.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583833" version="1" comment="iscsitarget-kmp-trace is &lt;1.4.20_3.0.101_108.87-0.43.7.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583834" version="1" comment="iscsitarget-kmp-xen is &lt;1.4.20_3.0.101_108.87-0.43.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583835" version="1" comment="ofed is &lt;1.5.4.1-22.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583836" version="1" comment="ofed-doc is &lt;1.5.4.1-22.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583837" version="1" comment="ofed-kmp-bigmem is &lt;1.5.4.1_3.0.101_108.87-22.6.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583838" version="1" comment="ofed-kmp-default is &lt;1.5.4.1_3.0.101_108.87-22.6.1 for i586,ia64,ppc64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583839" version="1" comment="ofed-kmp-pae is &lt;1.5.4.1_3.0.101_108.87-22.6.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583840" version="1" comment="ofed-kmp-ppc64 is &lt;1.5.4.1_3.0.101_108.87-22.6.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583841" version="1" comment="ofed-kmp-trace is &lt;1.5.4.1_3.0.101_108.87-22.6.1 for i586,ia64,ppc64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583842" version="1" comment="oracleasm is &lt;2.0.5-7.44.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583843" version="1" comment="oracleasm-kmp-bigmem is &lt;2.0.5_3.0.101_108.87-7.44.2.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583844" version="1" comment="oracleasm-kmp-default is &lt;2.0.5_3.0.101_108.87-7.44.2.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583845" version="1" comment="oracleasm-kmp-pae is &lt;2.0.5_3.0.101_108.87-7.44.2.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583846" version="1" comment="oracleasm-kmp-ppc64 is &lt;2.0.5_3.0.101_108.87-7.44.2.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583847" version="1" comment="oracleasm-kmp-trace is &lt;2.0.5_3.0.101_108.87-7.44.2.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583848" version="1" comment="oracleasm-kmp-xen is &lt;2.0.5_3.0.101_108.87-7.44.2.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583849" version="1" comment="krb5 is &lt;1.6.3-133.49.106.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583850" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.106.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583851" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.106.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583852" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.106.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583853" version="1" comment="krb5-client is &lt;1.6.3-133.49.106.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583854" version="1" comment="krb5-server is &lt;1.6.3-133.49.106.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583855" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.106.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583856" version="1" comment="krb5 is &lt;1.6.3-133.49.109.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583857" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.109.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583858" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.109.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583859" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.109.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583860" version="1" comment="krb5-client is &lt;1.6.3-133.49.109.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583861" version="1" comment="krb5-server is &lt;1.6.3-133.49.109.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583862" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.109.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583863" version="1" comment="krb5 is &lt;1.6.3-133.49.113.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583864" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.113.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583865" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.113.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583866" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.113.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583867" version="1" comment="krb5-client is &lt;1.6.3-133.49.113.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583868" version="1" comment="krb5-server is &lt;1.6.3-133.49.113.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583869" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.113.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583870" version="1" comment="kvm is &lt;1.4.2-32.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583871" version="1" comment="kvm is &lt;1.4.2-35.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583872" version="1" comment="kvm is &lt;1.4.2-44.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583873" version="1" comment="kvm is &lt;1.4.2-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583874" version="1" comment="kvm is &lt;1.4.2-50.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583875" version="1" comment="kvm is &lt;1.4.2-59.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583876" version="1" comment="kvm is &lt;1.4.2-60.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583877" version="1" comment="kvm is &lt;1.4.2-60.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583878" version="1" comment="kvm is &lt;1.4.2-60.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583879" version="1" comment="kvm is &lt;1.4.2-60.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583880" version="1" comment="kvm is &lt;1.4.2-60.15.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583881" version="1" comment="kvm is &lt;1.4.2-60.18.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583882" version="1" comment="kvm is &lt;1.4.2-60.21.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583883" version="1" comment="kvm is &lt;1.4.2-60.24.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583884" version="1" comment="kvm is &lt;1.4.2-60.27.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583885" version="1" comment="kvm is &lt;1.4.2-60.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583886" version="1" comment="kvm is &lt;1.4.2-60.34.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626555" version="1" comment="kvm is &lt;1.4.2-60.37.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583887" version="1" comment="lha is &lt;1.14.0.894-3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583888" version="1" comment="libapr-util1 is &lt;1.3.4-12.22.23.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583889" version="1" comment="libapr-util1-32bit is &lt;1.3.4-12.22.23.3.2 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583890" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.3.4-12.22.23.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583891" version="1" comment="libapr1 is &lt;1.3.3-11.18.19.13.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583892" version="1" comment="libapr1-32bit is &lt;1.3.3-11.18.19.13.2 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670912" version="1" comment="libcaca is &lt;0.99.beta13b-49.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583893" version="1" comment="libcap-ng-utils is &lt;0.6.3-1.9.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583894" version="1" comment="libcap-ng0 is &lt;0.6.3-1.9.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583895" version="1" comment="libcap-ng0-32bit is &lt;0.6.3-1.9.6 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583896" version="1" comment="libcares2 is &lt;1.7.4-7.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630425" version="1" comment="libcares2 is &lt;1.7.4-7.10.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583897" version="1" comment="libcgroup1 is &lt;0.41.rc1-7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631920" version="1" comment="libcroco-0_6-3 is &lt;0.6.1-122.9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631921" version="1" comment="libcroco-0_6-3-32bit is &lt;0.6.1-122.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583898" version="1" comment="db-doc is &lt;4.5.20-97.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583899" version="1" comment="db-utils is &lt;4.5.20-97.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583900" version="1" comment="db-utils-doc is &lt;4.5.20-97.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583901" version="1" comment="libdb-4_5 is &lt;4.5.20-97.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583902" version="1" comment="libdb-4_5-32bit is &lt;4.5.20-97.5 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583903" version="1" comment="libdb-4_5-x86 is &lt;4.5.20-97.5 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629509" version="1" comment="libesmtp is &lt;1.0.4-157.18.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583904" version="1" comment="libevent-1_4-2 is &lt;1.4.5-24.24.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583905" version="1" comment="libexif is &lt;0.6.17-2.14.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583906" version="1" comment="libexif-32bit is &lt;0.6.17-2.14.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583907" version="1" comment="libexif-x86 is &lt;0.6.17-2.14.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583908" version="1" comment="libexif is &lt;0.6.17-2.14.7.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583909" version="1" comment="libexif-32bit is &lt;0.6.17-2.14.7.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583910" version="1" comment="libgcrypt11 is &lt;1.5.0-0.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583911" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.22.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583912" version="1" comment="libgcrypt11-x86 is &lt;1.5.0-0.22.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583913" version="1" comment="libgcrypt11 is &lt;1.5.0-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583914" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583915" version="1" comment="libgcrypt11-x86 is &lt;1.5.0-0.25.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583916" version="1" comment="libgcrypt11 is &lt;1.5.0-0.26.6.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583917" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.26.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583918" version="1" comment="libical0 is &lt;0.43-1.10.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564664" version="1" comment="libical0-32bit is &lt;0.43-1.10.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583919" version="1" comment="libidn is &lt;1.10-6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583920" version="1" comment="libidn-32bit is &lt;1.10-6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583921" version="1" comment="libidn-x86 is &lt;1.10-6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583922" version="1" comment="libidn is &lt;1.10-7.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583923" version="1" comment="libidn-32bit is &lt;1.10-7.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583924" version="1" comment="libidn-x86 is &lt;1.10-7.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583925" version="1" comment="libksba is &lt;1.0.4-1.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583926" version="1" comment="liblouis is &lt;1.7.0-1.3.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583927" version="1" comment="liblouis0 is &lt;1.7.0-1.3.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583928" version="1" comment="python-louis is &lt;1.7.0-1.3.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583929" version="1" comment="liblouis is &lt;1.7.0-1.3.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583930" version="1" comment="liblouis0 is &lt;1.7.0-1.3.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583931" version="1" comment="python-louis is &lt;1.7.0-1.3.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583932" version="1" comment="liblouis is &lt;1.7.0-1.3.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583933" version="1" comment="liblouis0 is &lt;1.7.0-1.3.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583934" version="1" comment="python-louis is &lt;1.7.0-1.3.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583935" version="1" comment="liblouis is &lt;1.7.0-1.3.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583936" version="1" comment="liblouis0 is &lt;1.7.0-1.3.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583937" version="1" comment="python-louis is &lt;1.7.0-1.3.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583938" version="1" comment="libmspack0 is &lt;0.0.20060920alpha-74.11.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583939" version="1" comment="libotr2 is &lt;3.2.0-10.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583940" version="1" comment="libpng12-0 is &lt;1.2.31-5.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583941" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.43.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583942" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.43.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583943" version="1" comment="libsamplerate is &lt;0.1.4-3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583944" version="1" comment="libsamplerate-32bit is &lt;0.1.4-3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583945" version="1" comment="libsamplerate-x86 is &lt;0.1.4-3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583946" version="1" comment="libsndfile is &lt;1.0.20-2.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583947" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583948" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.13.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583949" version="1" comment="libsndfile is &lt;1.0.20-2.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583950" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583951" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.18.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583952" version="1" comment="libsndfile is &lt;1.0.20-2.19.7.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583953" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.19.7.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583954" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.19.7.3 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583955" version="1" comment="libsndfile is &lt;1.0.20-2.19.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583956" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.19.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583957" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.19.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626762" version="1" comment="libsndfile is &lt;1.0.20-2.19.15.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626763" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.19.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662534" version="1" comment="libsndfile is &lt;1.0.20-2.19.18.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662535" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.19.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583958" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583959" version="1" comment="libssh2-1 is &lt;1.4.3-17.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583960" version="1" comment="libssh2-1 is &lt;1.4.3-17.6.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583961" version="1" comment="libssh2-1 is &lt;1.4.3-17.9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583962" version="1" comment="libssh2-1 is &lt;1.4.3-17.12.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583963" version="1" comment="libtcnative-1-0 is &lt;1.3.3-12.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583964" version="1" comment="libtcnative-1-0 is &lt;1.3.4-12.5.5.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583965" version="1" comment="libtirpc1 is &lt;0.2.1-1.12.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583966" version="1" comment="rpcbind is &lt;0.1.6+git20080930-6.27.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583967" version="1" comment="libtirpc1 is &lt;0.2.1-1.13.3.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583968" version="1" comment="libtirpc1 is &lt;0.2.1-1.13.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583969" version="1" comment="libvirt is &lt;1.2.5-12.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583970" version="1" comment="libvirt-client is &lt;1.2.5-12.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583971" version="1" comment="libvirt-client-32bit is &lt;1.2.5-12.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583972" version="1" comment="libvirt-doc is &lt;1.2.5-12.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583973" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-12.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583974" version="1" comment="libvirt is &lt;1.2.5-15.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583975" version="1" comment="libvirt-client is &lt;1.2.5-15.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583976" version="1" comment="libvirt-client-32bit is &lt;1.2.5-15.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583977" version="1" comment="libvirt-doc is &lt;1.2.5-15.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583978" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-15.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583979" version="1" comment="perl-Sys-Virt is &lt;1.2.5-4.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583980" version="1" comment="libvirt is &lt;1.2.5-23.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583981" version="1" comment="libvirt-client is &lt;1.2.5-23.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583982" version="1" comment="libvirt-client-32bit is &lt;1.2.5-23.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583983" version="1" comment="libvirt-doc is &lt;1.2.5-23.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583984" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-23.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583985" version="1" comment="libvirt is &lt;1.2.5-23.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583986" version="1" comment="libvirt-client is &lt;1.2.5-23.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583987" version="1" comment="libvirt-client-32bit is &lt;1.2.5-23.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583988" version="1" comment="libvirt-doc is &lt;1.2.5-23.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583989" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-23.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583990" version="1" comment="libvirt is &lt;1.2.5-23.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583991" version="1" comment="libvirt-client is &lt;1.2.5-23.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583992" version="1" comment="libvirt-client-32bit is &lt;1.2.5-23.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583993" version="1" comment="libvirt-doc is &lt;1.2.5-23.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583994" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-23.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583995" version="1" comment="libvirt is &lt;1.2.5-23.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583996" version="1" comment="libvirt-client is &lt;1.2.5-23.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583997" version="1" comment="libvirt-client-32bit is &lt;1.2.5-23.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583998" version="1" comment="libvirt-doc is &lt;1.2.5-23.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583999" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-23.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584000" version="1" comment="libvirt is &lt;1.2.5-23.24.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584001" version="1" comment="libvirt-client is &lt;1.2.5-23.24.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584002" version="1" comment="libvirt-client-32bit is &lt;1.2.5-23.24.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584003" version="1" comment="libvirt-doc is &lt;1.2.5-23.24.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584004" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-23.24.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584005" version="1" comment="libvirt-python is &lt;1.2.5-3.3.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584006" version="1" comment="libvorbis is &lt;1.2.0-79.20.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584007" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.20.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584008" version="1" comment="libvorbis-doc is &lt;1.2.0-79.20.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584009" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.20.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584010" version="1" comment="libvorbis is &lt;1.2.0-79.20.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584011" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.20.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584012" version="1" comment="libvorbis-doc is &lt;1.2.0-79.20.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584013" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.20.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584014" version="1" comment="libvorbis is &lt;1.2.0-79.20.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584015" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.20.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584016" version="1" comment="libvorbis-doc is &lt;1.2.0-79.20.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584017" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.20.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584018" version="1" comment="libvorbis is &lt;1.2.0-79.20.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584019" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.20.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584020" version="1" comment="libvorbis-doc is &lt;1.2.0-79.20.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584021" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.20.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584022" version="1" comment="libxml2 is &lt;2.7.6-0.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584023" version="1" comment="libxml2-32bit is &lt;2.7.6-0.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584024" version="1" comment="libxml2-doc is &lt;2.7.6-0.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584025" version="1" comment="libxml2-python is &lt;2.7.6-0.40.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584026" version="1" comment="libxml2-x86 is &lt;2.7.6-0.40.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584027" version="1" comment="libxml2 is &lt;2.7.6-0.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584028" version="1" comment="libxml2-32bit is &lt;2.7.6-0.44.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584029" version="1" comment="libxml2-doc is &lt;2.7.6-0.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584030" version="1" comment="libxml2-python is &lt;2.7.6-0.44.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584031" version="1" comment="libxml2-x86 is &lt;2.7.6-0.44.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592527" version="1" comment="libxml2 is &lt;2.7.6-0.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592528" version="1" comment="libxml2-32bit is &lt;2.7.6-0.47.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592529" version="1" comment="libxml2-doc is &lt;2.7.6-0.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592530" version="1" comment="libxml2-python is &lt;2.7.6-0.47.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592531" version="1" comment="libxml2-x86 is &lt;2.7.6-0.47.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584032" version="1" comment="libxml2 is &lt;2.7.6-0.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584033" version="1" comment="libxml2-32bit is &lt;2.7.6-0.50.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584034" version="1" comment="libxml2-doc is &lt;2.7.6-0.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584035" version="1" comment="libxml2-python is &lt;2.7.6-0.50.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584036" version="1" comment="libxml2-x86 is &lt;2.7.6-0.50.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584037" version="1" comment="libxml2 is &lt;2.7.6-0.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584038" version="1" comment="libxml2-32bit is &lt;2.7.6-0.64.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584039" version="1" comment="libxml2-doc is &lt;2.7.6-0.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584040" version="1" comment="libxml2-python is &lt;2.7.6-0.64.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584041" version="1" comment="libxml2-x86 is &lt;2.7.6-0.64.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584042" version="1" comment="libxml2 is &lt;2.7.6-0.69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584043" version="1" comment="libxml2-32bit is &lt;2.7.6-0.69.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584044" version="1" comment="libxml2-doc is &lt;2.7.6-0.69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584045" version="1" comment="libxml2-python is &lt;2.7.6-0.69.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584046" version="1" comment="libxml2-x86 is &lt;2.7.6-0.69.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584047" version="1" comment="libxml2 is &lt;2.7.6-0.76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584048" version="1" comment="libxml2-32bit is &lt;2.7.6-0.76.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584049" version="1" comment="libxml2-doc is &lt;2.7.6-0.76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584050" version="1" comment="libxml2-python is &lt;2.7.6-0.76.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584051" version="1" comment="libxml2-x86 is &lt;2.7.6-0.76.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584052" version="1" comment="libxml2 is &lt;2.7.6-0.77.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584053" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.3.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584054" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584055" version="1" comment="libxml2-python is &lt;2.7.6-0.77.3.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584056" version="1" comment="libxml2-x86 is &lt;2.7.6-0.77.3.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584057" version="1" comment="libxml2 is &lt;2.7.6-0.77.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584058" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584059" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584060" version="1" comment="libxml2-python is &lt;2.7.6-0.77.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584061" version="1" comment="libxml2-x86 is &lt;2.7.6-0.77.10.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584062" version="1" comment="libxml2 is &lt;2.7.6-0.77.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584063" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584064" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584065" version="1" comment="libxml2-python is &lt;2.7.6-0.77.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584066" version="1" comment="libxml2-x86 is &lt;2.7.6-0.77.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584067" version="1" comment="libxml2 is &lt;2.7.6-0.77.18.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584068" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584069" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.18.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584070" version="1" comment="libxml2-python is &lt;2.7.6-0.77.18.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584071" version="1" comment="libxml2 is &lt;2.7.6-0.77.36.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584072" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.36.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584073" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.36.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584074" version="1" comment="libxml2-python is &lt;2.7.6-0.77.36.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670913" version="1" comment="libxml2 is &lt;2.7.6-0.77.43.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670914" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.43.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670915" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.43.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670916" version="1" comment="libxml2-python is &lt;2.7.6-0.77.43.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584075" version="1" comment="libxslt is &lt;1.1.24-19.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584076" version="1" comment="libxslt-32bit is &lt;1.1.24-19.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584077" version="1" comment="libxslt-x86 is &lt;1.1.24-19.33.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584078" version="1" comment="kernel-bigmem is &lt;3.0.101-91.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584079" version="1" comment="kernel-bigmem-base is &lt;3.0.101-91.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584081" version="1" comment="kernel-default is &lt;3.0.101-91.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584082" version="1" comment="kernel-default-base is &lt;3.0.101-91.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584084" version="1" comment="kernel-default-man is &lt;3.0.101-91.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584085" version="1" comment="kernel-ec2 is &lt;3.0.101-91.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584086" version="1" comment="kernel-ec2-base is &lt;3.0.101-91.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584088" version="1" comment="kernel-pae is &lt;3.0.101-91.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584089" version="1" comment="kernel-pae-base is &lt;3.0.101-91.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584091" version="1" comment="kernel-ppc64 is &lt;3.0.101-91.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584092" version="1" comment="kernel-ppc64-base is &lt;3.0.101-91.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584094" version="1" comment="kernel-source is &lt;3.0.101-91.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584095" version="1" comment="kernel-syms is &lt;3.0.101-91.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584096" version="1" comment="kernel-trace is &lt;3.0.101-91.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584097" version="1" comment="kernel-trace-base is &lt;3.0.101-91.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584099" version="1" comment="kernel-xen is &lt;3.0.101-91.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584100" version="1" comment="kernel-xen-base is &lt;3.0.101-91.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584102" version="1" comment="kernel-bigmem is &lt;3.0.101-100.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584103" version="1" comment="kernel-bigmem-base is &lt;3.0.101-100.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584105" version="1" comment="kernel-default is &lt;3.0.101-100.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584106" version="1" comment="kernel-default-base is &lt;3.0.101-100.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584108" version="1" comment="kernel-default-man is &lt;3.0.101-100.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584109" version="1" comment="kernel-ec2 is &lt;3.0.101-100.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584110" version="1" comment="kernel-ec2-base is &lt;3.0.101-100.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584112" version="1" comment="kernel-pae is &lt;3.0.101-100.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584113" version="1" comment="kernel-pae-base is &lt;3.0.101-100.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584115" version="1" comment="kernel-ppc64 is &lt;3.0.101-100.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584116" version="1" comment="kernel-ppc64-base is &lt;3.0.101-100.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584118" version="1" comment="kernel-source is &lt;3.0.101-100.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584119" version="1" comment="kernel-syms is &lt;3.0.101-100.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584120" version="1" comment="kernel-trace is &lt;3.0.101-100.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584121" version="1" comment="kernel-trace-base is &lt;3.0.101-100.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584123" version="1" comment="kernel-xen is &lt;3.0.101-100.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584124" version="1" comment="kernel-xen-base is &lt;3.0.101-100.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584126" version="1" comment="mailman is &lt;2.1.15-9.6.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584127" version="1" comment="mailman is &lt;2.1.15-9.6.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584128" version="1" comment="mailman is &lt;2.1.15-9.6.12.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584129" version="1" comment="mailman is &lt;2.1.15-9.6.15.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584130" version="1" comment="mailman is &lt;2.1.15-9.6.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584131" version="1" comment="mailman is &lt;2.1.15-9.6.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584132" version="1" comment="MozillaFirefox is &lt;45.5.1esr-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584133" version="1" comment="MozillaFirefox-translations is &lt;45.5.1esr-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584134" version="1" comment="libfreebl3 is &lt;3.21.3-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584135" version="1" comment="libfreebl3-32bit is &lt;3.21.3-39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584136" version="1" comment="libfreebl3-x86 is &lt;3.21.3-39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584137" version="1" comment="libsoftokn3 is &lt;3.21.3-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584138" version="1" comment="libsoftokn3-32bit is &lt;3.21.3-39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584139" version="1" comment="libsoftokn3-x86 is &lt;3.21.3-39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584140" version="1" comment="mozilla-nss is &lt;3.21.3-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584141" version="1" comment="mozilla-nss-32bit is &lt;3.21.3-39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584142" version="1" comment="mozilla-nss-tools is &lt;3.21.3-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584143" version="1" comment="mozilla-nss-x86 is &lt;3.21.3-39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584144" version="1" comment="g3utils is &lt;1.1.36-28.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584145" version="1" comment="mgetty is &lt;1.1.36-28.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584146" version="1" comment="microcode_ctl is &lt;1.17-102.83.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584147" version="1" comment="microcode_ctl is &lt;1.17-102.83.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584148" version="1" comment="microcode_ctl is &lt;1.17-102.83.41.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584149" version="1" comment="microcode_ctl is &lt;1.17-102.83.47.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584150" version="1" comment="microcode_ctl is &lt;1.17-102.83.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584151" version="1" comment="microcode_ctl is &lt;1.17-102.83.53.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584152" version="1" comment="microcode_ctl is &lt;1.17-102.83.59.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584153" version="1" comment="microcode_ctl is &lt;1.17-102.83.62.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584154" version="1" comment="microcode_ctl is &lt;1.17-102.83.71.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584155" version="1" comment="minicom is &lt;2.3-27.24.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579024" version="1" comment="mono-core is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579025" version="1" comment="mono-data is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579026" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579027" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579028" version="1" comment="mono-locale-extras is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579029" version="1" comment="mono-nunit is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579030" version="1" comment="mono-web is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579031" version="1" comment="mono-winforms is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584156" version="1" comment="mono-core is &lt;2.6.7-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584157" version="1" comment="mono-data is &lt;2.6.7-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584158" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584159" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584160" version="1" comment="mono-locale-extras is &lt;2.6.7-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584161" version="1" comment="mono-nunit is &lt;2.6.7-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584162" version="1" comment="mono-web is &lt;2.6.7-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584163" version="1" comment="mono-winforms is &lt;2.6.7-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659260" version="1" comment="libfreebl3 is &lt;3.68.1-47.19.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659261" version="1" comment="libfreebl3-32bit is &lt;3.68.1-47.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659262" version="1" comment="libsoftokn3 is &lt;3.68.1-47.19.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659263" version="1" comment="libsoftokn3-32bit is &lt;3.68.1-47.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659264" version="1" comment="mozilla-nss is &lt;3.68.1-47.19.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659265" version="1" comment="mozilla-nss-32bit is &lt;3.68.1-47.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659266" version="1" comment="mozilla-nss-certs is &lt;3.68.1-47.19.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659267" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68.1-47.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659268" version="1" comment="mozilla-nss-devel is &lt;3.68.1-47.19.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659269" version="1" comment="mozilla-nss-tools is &lt;3.68.1-47.19.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678417" version="1" comment="libfreebl3 is &lt;3.68.3-47.25.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678418" version="1" comment="libfreebl3-32bit is &lt;3.68.3-47.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678419" version="1" comment="libsoftokn3 is &lt;3.68.3-47.25.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678420" version="1" comment="libsoftokn3-32bit is &lt;3.68.3-47.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678421" version="1" comment="mozilla-nss is &lt;3.68.3-47.25.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678422" version="1" comment="mozilla-nss-32bit is &lt;3.68.3-47.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678423" version="1" comment="mozilla-nss-certs is &lt;3.68.3-47.25.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678424" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68.3-47.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678425" version="1" comment="mozilla-nss-devel is &lt;3.68.3-47.25.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678426" version="1" comment="mozilla-nss-tools is &lt;3.68.3-47.25.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584164" version="1" comment="libfreebl3 is &lt;3.53.1-38.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584165" version="1" comment="libsoftokn3 is &lt;3.53.1-38.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584166" version="1" comment="mozilla-nspr is &lt;4.25-29.12.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584167" version="1" comment="mozilla-nspr-32bit is &lt;4.25-29.12.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584168" version="1" comment="mozilla-nspr-devel is &lt;4.25-29.12.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584169" version="1" comment="mozilla-nss is &lt;3.53.1-38.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584170" version="1" comment="mozilla-nss-certs is &lt;3.53.1-38.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584171" version="1" comment="mozilla-nss-devel is &lt;3.53.1-38.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584172" version="1" comment="mozilla-nss-tools is &lt;3.53.1-38.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634800" version="1" comment="libfreebl3 is &lt;3.68-47.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634801" version="1" comment="libfreebl3-32bit is &lt;3.68-47.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634802" version="1" comment="libsoftokn3 is &lt;3.68-47.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634803" version="1" comment="libsoftokn3-32bit is &lt;3.68-47.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634804" version="1" comment="mozilla-nspr is &lt;4.32-33.6.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634805" version="1" comment="mozilla-nspr-32bit is &lt;4.32-33.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634806" version="1" comment="mozilla-nspr-devel is &lt;4.32-33.6.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634807" version="1" comment="mozilla-nss is &lt;3.68-47.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634808" version="1" comment="mozilla-nss-32bit is &lt;3.68-47.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634809" version="1" comment="mozilla-nss-certs is &lt;3.68-47.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634810" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68-47.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634811" version="1" comment="mozilla-nss-devel is &lt;3.68-47.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634812" version="1" comment="mozilla-nss-tools is &lt;3.68-47.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584173" version="1" comment="mutt is &lt;1.5.17-42.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584174" version="1" comment="mutt is &lt;1.5.17-42.51.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584175" version="1" comment="mutt is &lt;1.5.17-42.56.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563722" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.45-0.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563723" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.45-0.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563724" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.46-0.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563725" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.46-0.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563726" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.47-0.17.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563727" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.47-0.17.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584176" version="1" comment="libmysql55client18 is &lt;5.5.49-0.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584177" version="1" comment="libmysql55client18-32bit is &lt;5.5.49-0.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584178" version="1" comment="libmysql55client18-x86 is &lt;5.5.49-0.20.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584179" version="1" comment="libmysql55client_r18 is &lt;5.5.49-0.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564974" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.49-0.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564975" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.49-0.20.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584180" version="1" comment="mysql is &lt;5.5.49-0.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584181" version="1" comment="mysql-client is &lt;5.5.49-0.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584182" version="1" comment="mysql-tools is &lt;5.5.49-0.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584183" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.8.10.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584184" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.8.10.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584185" version="1" comment="libmysqlclient15-x86 is &lt;5.0.96-0.8.10.3 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584186" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.8.10.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584187" version="1" comment="libmysql55client18 is &lt;5.5.52-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584188" version="1" comment="libmysql55client18-32bit is &lt;5.5.52-0.27.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584189" version="1" comment="libmysql55client18-x86 is &lt;5.5.52-0.27.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584190" version="1" comment="libmysql55client_r18 is &lt;5.5.52-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564979" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.52-0.27.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564980" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.52-0.27.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584191" version="1" comment="mysql is &lt;5.5.52-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584192" version="1" comment="mysql-client is &lt;5.5.52-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584193" version="1" comment="mysql-tools is &lt;5.5.52-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584194" version="1" comment="libmysql55client18 is &lt;5.5.53-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584195" version="1" comment="libmysql55client18-32bit is &lt;5.5.53-0.30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584196" version="1" comment="libmysql55client18-x86 is &lt;5.5.53-0.30.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584197" version="1" comment="libmysql55client_r18 is &lt;5.5.53-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564981" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.53-0.30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564982" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.53-0.30.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584198" version="1" comment="mysql is &lt;5.5.53-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584199" version="1" comment="mysql-client is &lt;5.5.53-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584200" version="1" comment="mysql-tools is &lt;5.5.53-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584201" version="1" comment="libmysql55client18 is &lt;5.5.54-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584202" version="1" comment="libmysql55client18-32bit is &lt;5.5.54-0.35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584203" version="1" comment="libmysql55client18-x86 is &lt;5.5.54-0.35.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584204" version="1" comment="libmysql55client_r18 is &lt;5.5.54-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564983" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.54-0.35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564984" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.54-0.35.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584205" version="1" comment="mysql is &lt;5.5.54-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584206" version="1" comment="mysql-client is &lt;5.5.54-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584207" version="1" comment="mysql-tools is &lt;5.5.54-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584208" version="1" comment="libmysql55client18 is &lt;5.5.55-0.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584209" version="1" comment="libmysql55client18-32bit is &lt;5.5.55-0.38.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584210" version="1" comment="libmysql55client18-x86 is &lt;5.5.55-0.38.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584211" version="1" comment="libmysql55client_r18 is &lt;5.5.55-0.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564985" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.55-0.38.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564986" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.55-0.38.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584212" version="1" comment="mysql is &lt;5.5.55-0.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584213" version="1" comment="mysql-client is &lt;5.5.55-0.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584214" version="1" comment="mysql-tools is &lt;5.5.55-0.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584215" version="1" comment="libmysql55client18 is &lt;5.5.57-0.39.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584216" version="1" comment="libmysql55client18-32bit is &lt;5.5.57-0.39.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584217" version="1" comment="libmysql55client18-x86 is &lt;5.5.57-0.39.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584218" version="1" comment="libmysql55client_r18 is &lt;5.5.57-0.39.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564987" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.57-0.39.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564988" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.57-0.39.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584219" version="1" comment="mysql is &lt;5.5.57-0.39.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584220" version="1" comment="mysql-client is &lt;5.5.57-0.39.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584221" version="1" comment="mysql-tools is &lt;5.5.57-0.39.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584222" version="1" comment="libmysql55client18 is &lt;5.5.58-0.39.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584223" version="1" comment="libmysql55client18-32bit is &lt;5.5.58-0.39.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584224" version="1" comment="libmysql55client18-x86 is &lt;5.5.58-0.39.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584225" version="1" comment="libmysql55client_r18 is &lt;5.5.58-0.39.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564989" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.58-0.39.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564990" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.58-0.39.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584226" version="1" comment="mysql is &lt;5.5.58-0.39.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584227" version="1" comment="mysql-client is &lt;5.5.58-0.39.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584228" version="1" comment="mysql-tools is &lt;5.5.58-0.39.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584229" version="1" comment="libmysql55client18 is &lt;5.5.59-0.39.9.8 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584230" version="1" comment="libmysql55client18-32bit is &lt;5.5.59-0.39.9.8 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584231" version="1" comment="libmysql55client18-x86 is &lt;5.5.59-0.39.9.8 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584232" version="1" comment="libmysql55client_r18 is &lt;5.5.59-0.39.9.8 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564991" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.59-0.39.9.8 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564992" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.59-0.39.9.8 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584233" version="1" comment="mysql is &lt;5.5.59-0.39.9.8 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584234" version="1" comment="mysql-client is &lt;5.5.59-0.39.9.8 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584235" version="1" comment="mysql-tools is &lt;5.5.59-0.39.9.8 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584236" version="1" comment="libmysql55client18 is &lt;5.5.60-0.39.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584237" version="1" comment="libmysql55client18-32bit is &lt;5.5.60-0.39.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584238" version="1" comment="libmysql55client18-x86 is &lt;5.5.60-0.39.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584239" version="1" comment="libmysql55client_r18 is &lt;5.5.60-0.39.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564993" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.60-0.39.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564994" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.60-0.39.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584240" version="1" comment="mysql is &lt;5.5.60-0.39.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584241" version="1" comment="mysql-client is &lt;5.5.60-0.39.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584242" version="1" comment="mysql-tools is &lt;5.5.60-0.39.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584243" version="1" comment="libmysql55client18 is &lt;5.5.61-0.39.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584244" version="1" comment="libmysql55client18-32bit is &lt;5.5.61-0.39.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584245" version="1" comment="libmysql55client18-x86 is &lt;5.5.61-0.39.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584246" version="1" comment="libmysql55client_r18 is &lt;5.5.61-0.39.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564995" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.61-0.39.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564996" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.61-0.39.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584247" version="1" comment="mysql is &lt;5.5.61-0.39.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584248" version="1" comment="mysql-client is &lt;5.5.61-0.39.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584249" version="1" comment="mysql-tools is &lt;5.5.61-0.39.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584250" version="1" comment="libmysql55client18 is &lt;5.5.62-0.39.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584251" version="1" comment="libmysql55client18-32bit is &lt;5.5.62-0.39.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584252" version="1" comment="libmysql55client18-x86 is &lt;5.5.62-0.39.18.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584253" version="1" comment="libmysql55client_r18 is &lt;5.5.62-0.39.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564997" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.62-0.39.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564998" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.62-0.39.18.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584254" version="1" comment="mysql is &lt;5.5.62-0.39.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584255" version="1" comment="mysql-client is &lt;5.5.62-0.39.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584256" version="1" comment="mysql-tools is &lt;5.5.62-0.39.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584257" version="1" comment="nagios is &lt;3.0.6-1.25.36.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584258" version="1" comment="nagios-www is &lt;3.0.6-1.25.36.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584259" version="1" comment="nagios-nrpe is &lt;2.12-24.4.10.3.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584260" version="1" comment="nagios-nrpe-doc is &lt;2.12-24.4.10.3.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584261" version="1" comment="nagios-plugins-nrpe is &lt;2.12-24.4.10.3.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584262" version="1" comment="nautilus is &lt;2.28.4-1.16.21.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584263" version="1" comment="nautilus-32bit is &lt;2.28.4-1.16.21.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584264" version="1" comment="nautilus-lang is &lt;2.28.4-1.16.21.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584265" version="1" comment="nautilus-x86 is &lt;2.28.4-1.16.21.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584266" version="1" comment="libncurses5 is &lt;5.6-92.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584267" version="1" comment="libncurses5-32bit is &lt;5.6-92.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584268" version="1" comment="libncurses5-x86 is &lt;5.6-92.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584269" version="1" comment="libncurses6 is &lt;5.6-92.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584270" version="1" comment="libncurses6-32bit is &lt;5.6-92.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584271" version="1" comment="libncurses6-x86 is &lt;5.6-92.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584272" version="1" comment="ncurses-devel is &lt;5.6-92.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584273" version="1" comment="ncurses-devel-32bit is &lt;5.6-92.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584274" version="1" comment="ncurses-utils is &lt;5.6-92.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584275" version="1" comment="tack is &lt;5.6-92.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584276" version="1" comment="terminfo is &lt;5.6-92.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584277" version="1" comment="terminfo-base is &lt;5.6-92.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584278" version="1" comment="libncurses5 is &lt;5.6-93.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584279" version="1" comment="libncurses5-32bit is &lt;5.6-93.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584280" version="1" comment="libncurses5-x86 is &lt;5.6-93.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584281" version="1" comment="libncurses6 is &lt;5.6-93.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584282" version="1" comment="libncurses6-32bit is &lt;5.6-93.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584283" version="1" comment="libncurses6-x86 is &lt;5.6-93.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584284" version="1" comment="ncurses-devel is &lt;5.6-93.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584285" version="1" comment="ncurses-devel-32bit is &lt;5.6-93.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584286" version="1" comment="ncurses-utils is &lt;5.6-93.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584287" version="1" comment="tack is &lt;5.6-93.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584288" version="1" comment="terminfo is &lt;5.6-93.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584289" version="1" comment="terminfo-base is &lt;5.6-93.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584290" version="1" comment="libncurses5 is &lt;5.6-93.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584291" version="1" comment="libncurses5-32bit is &lt;5.6-93.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584292" version="1" comment="libncurses5-x86 is &lt;5.6-93.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584293" version="1" comment="libncurses6 is &lt;5.6-93.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584294" version="1" comment="libncurses6-32bit is &lt;5.6-93.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584295" version="1" comment="libncurses6-x86 is &lt;5.6-93.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584296" version="1" comment="ncurses-devel is &lt;5.6-93.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584297" version="1" comment="ncurses-devel-32bit is &lt;5.6-93.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584298" version="1" comment="ncurses-utils is &lt;5.6-93.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584299" version="1" comment="tack is &lt;5.6-93.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584300" version="1" comment="terminfo is &lt;5.6-93.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584301" version="1" comment="terminfo-base is &lt;5.6-93.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584302" version="1" comment="libncurses5 is &lt;5.6-93.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584303" version="1" comment="libncurses5-32bit is &lt;5.6-93.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584304" version="1" comment="libncurses5-x86 is &lt;5.6-93.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584305" version="1" comment="libncurses6 is &lt;5.6-93.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584306" version="1" comment="libncurses6-32bit is &lt;5.6-93.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584307" version="1" comment="libncurses6-x86 is &lt;5.6-93.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584308" version="1" comment="ncurses-devel is &lt;5.6-93.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584309" version="1" comment="ncurses-devel-32bit is &lt;5.6-93.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584310" version="1" comment="ncurses-utils is &lt;5.6-93.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584311" version="1" comment="tack is &lt;5.6-93.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584312" version="1" comment="terminfo is &lt;5.6-93.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584313" version="1" comment="terminfo-base is &lt;5.6-93.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584314" version="1" comment="libnetpbm10 is &lt;10.26.44-101.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584315" version="1" comment="libnetpbm10-32bit is &lt;10.26.44-101.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584316" version="1" comment="libnetpbm10-x86 is &lt;10.26.44-101.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584317" version="1" comment="netpbm is &lt;10.26.44-101.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584318" version="1" comment="libnetpbm10 is &lt;10.26.44-101.15.5.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584319" version="1" comment="libnetpbm10-32bit is &lt;10.26.44-101.15.5.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584320" version="1" comment="netpbm is &lt;10.26.44-101.15.5.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584321" version="1" comment="ntp is &lt;4.2.8p4-5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584322" version="1" comment="ntp-doc is &lt;4.2.8p4-5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584323" version="1" comment="ntp is &lt;4.2.8p6-8.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584324" version="1" comment="ntp-doc is &lt;4.2.8p6-8.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584325" version="1" comment="ntp is &lt;4.2.8p7-11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584326" version="1" comment="ntp-doc is &lt;4.2.8p7-11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584327" version="1" comment="ntp is &lt;4.2.8p8-14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584328" version="1" comment="ntp-doc is &lt;4.2.8p8-14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584329" version="1" comment="libtasn1 is &lt;1.5-1.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584330" version="1" comment="libtasn1-3 is &lt;1.5-1.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584331" version="1" comment="libtasn1-3-32bit is &lt;1.5-1.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584332" version="1" comment="libtasn1-3-x86 is &lt;1.5-1.34.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584333" version="1" comment="ntp is &lt;4.2.8p9-57.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584334" version="1" comment="ntp-doc is &lt;4.2.8p9-57.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584335" version="1" comment="ntp is &lt;4.2.8p10-63.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584336" version="1" comment="ntp-doc is &lt;4.2.8p10-63.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584337" version="1" comment="ntp is &lt;4.2.8p11-64.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584338" version="1" comment="ntp-doc is &lt;4.2.8p11-64.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584339" version="1" comment="ntp is &lt;4.2.8p12-64.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584340" version="1" comment="ntp-doc is &lt;4.2.8p12-64.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584341" version="1" comment="ntp is &lt;4.2.8p13-64.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584342" version="1" comment="ntp-doc is &lt;4.2.8p13-64.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584343" version="1" comment="ntp is &lt;4.2.8p15-64.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584344" version="1" comment="ntp-doc is &lt;4.2.8p15-64.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584345" version="1" comment="libvmtools0 is &lt;10.1.0-7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584346" version="1" comment="open-vm-tools is &lt;10.1.0-7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584347" version="1" comment="open-vm-tools-desktop is &lt;10.1.0-7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584348" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.74.9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584349" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.74.9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584350" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.74.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584351" version="1" comment="openldap2 is &lt;2.4.26-0.74.9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584352" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.74.9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584353" version="1" comment="openldap2-client is &lt;2.4.26-0.74.9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584354" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.74.13.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584355" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.74.13.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584356" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.74.13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584357" version="1" comment="openldap2 is &lt;2.4.26-0.74.13.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584358" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.74.13.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584359" version="1" comment="openldap2-client is &lt;2.4.26-0.74.13.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584360" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.74.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584361" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.74.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584362" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.74.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584363" version="1" comment="openldap2 is &lt;2.4.26-0.74.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584364" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.74.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584365" version="1" comment="openldap2-client is &lt;2.4.26-0.74.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584366" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.74.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584367" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.74.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584368" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.74.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584369" version="1" comment="openldap2 is &lt;2.4.26-0.74.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584370" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.74.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584371" version="1" comment="openldap2-client is &lt;2.4.26-0.74.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584372" version="1" comment="libopensc2 is &lt;0.11.6-5.27.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584373" version="1" comment="libopensc2-32bit is &lt;0.11.6-5.27.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584374" version="1" comment="libopensc2-x86 is &lt;0.11.6-5.27.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584375" version="1" comment="opensc is &lt;0.11.6-5.27.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584376" version="1" comment="opensc-32bit is &lt;0.11.6-5.27.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584377" version="1" comment="opensc-x86 is &lt;0.11.6-5.27.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653638" version="1" comment="libopensc2 is &lt;0.11.6-5.27.14.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653639" version="1" comment="libopensc2-32bit is &lt;0.11.6-5.27.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653640" version="1" comment="opensc is &lt;0.11.6-5.27.14.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653641" version="1" comment="opensc-32bit is &lt;0.11.6-5.27.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584378" version="1" comment="openslp is &lt;1.2.0-172.27.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584379" version="1" comment="openslp-32bit is &lt;1.2.0-172.27.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584380" version="1" comment="openslp-server is &lt;1.2.0-172.27.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584381" version="1" comment="openslp-x86 is &lt;1.2.0-172.27.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584382" version="1" comment="openssh is &lt;6.6p1-13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584383" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-13.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584384" version="1" comment="openssh-fips is &lt;6.6p1-13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584385" version="1" comment="openssh-helpers is &lt;6.6p1-13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584386" version="1" comment="openssh is &lt;6.6p1-21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584387" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-21.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584388" version="1" comment="openssh-fips is &lt;6.6p1-21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584389" version="1" comment="openssh-helpers is &lt;6.6p1-21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584390" version="1" comment="openssh is &lt;6.6p1-28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584391" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-28.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584392" version="1" comment="openssh-fips is &lt;6.6p1-28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584393" version="1" comment="openssh-helpers is &lt;6.6p1-28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584394" version="1" comment="openssh is &lt;6.6p1-35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584395" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-35.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584396" version="1" comment="openssh-fips is &lt;6.6p1-35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584397" version="1" comment="openssh-helpers is &lt;6.6p1-35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584398" version="1" comment="openssh is &lt;6.6p1-36.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584399" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-36.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584400" version="1" comment="openssh-fips is &lt;6.6p1-36.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584401" version="1" comment="openssh-helpers is &lt;6.6p1-36.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584402" version="1" comment="openssh is &lt;6.6p1-36.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584403" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-36.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584404" version="1" comment="openssh-fips is &lt;6.6p1-36.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584405" version="1" comment="openssh-helpers is &lt;6.6p1-36.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584406" version="1" comment="openssh is &lt;6.6p1-36.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584407" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-36.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584408" version="1" comment="openssh-fips is &lt;6.6p1-36.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584409" version="1" comment="openssh-helpers is &lt;6.6p1-36.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584410" version="1" comment="openssh is &lt;6.6p1-36.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584411" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-36.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584412" version="1" comment="openssh-fips is &lt;6.6p1-36.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584413" version="1" comment="openssh-helpers is &lt;6.6p1-36.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658399" version="1" comment="openssh is &lt;6.6p1-36.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658400" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-36.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658401" version="1" comment="openssh-fips is &lt;6.6p1-36.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658402" version="1" comment="openssh-helpers is &lt;6.6p1-36.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584414" version="1" comment="openssh is &lt;6.6p1-16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584415" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-16.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584416" version="1" comment="openssh-fips is &lt;6.6p1-16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584417" version="1" comment="openssh-helpers is &lt;6.6p1-16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584418" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.89.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584419" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.89.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584420" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.89.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584421" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.89.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584422" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.89.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584423" version="1" comment="openssl is &lt;0.9.8j-0.89.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584424" version="1" comment="openssl-doc is &lt;0.9.8j-0.89.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584425" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.97.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584426" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.97.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584427" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.97.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584428" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.97.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584429" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.97.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584430" version="1" comment="openssl is &lt;0.9.8j-0.97.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584431" version="1" comment="openssl-doc is &lt;0.9.8j-0.97.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584432" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.102.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584433" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.102.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584434" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.102.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584435" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.102.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584436" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.102.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584437" version="1" comment="openssl is &lt;0.9.8j-0.102.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584438" version="1" comment="openssl-doc is &lt;0.9.8j-0.102.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584439" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.105.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584440" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.105.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584441" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.105.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584442" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.105.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584443" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.105.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584444" version="1" comment="openssl is &lt;0.9.8j-0.105.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584445" version="1" comment="openssl-doc is &lt;0.9.8j-0.105.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584446" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584447" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584448" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584449" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584450" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.106.9.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584451" version="1" comment="openssl is &lt;0.9.8j-0.106.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584452" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584453" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584454" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584455" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584456" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584457" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.106.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584458" version="1" comment="openssl is &lt;0.9.8j-0.106.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584459" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584460" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584461" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584462" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584463" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584464" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.106.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584465" version="1" comment="openssl is &lt;0.9.8j-0.106.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584466" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584467" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584468" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584469" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584470" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584471" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.106.18.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584472" version="1" comment="openssl is &lt;0.9.8j-0.106.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584473" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584474" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.21.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584475" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584476" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.21.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584477" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584478" version="1" comment="openssl is &lt;0.9.8j-0.106.21.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584479" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.21.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584480" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.25.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584481" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584482" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.25.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584483" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584484" version="1" comment="openssl is &lt;0.9.8j-0.106.25.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584485" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.25.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584486" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.28.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584487" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.28.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584488" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.28.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584489" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.28.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584490" version="1" comment="openssl is &lt;0.9.8j-0.106.28.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584491" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.28.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584492" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584493" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584494" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584495" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584496" version="1" comment="openssl is &lt;0.9.8j-0.106.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584497" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584498" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584499" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584500" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584501" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584502" version="1" comment="openssl is &lt;0.9.8j-0.106.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584503" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584504" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.37.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584505" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.37.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584506" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.37.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584507" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.37.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584508" version="1" comment="openssl is &lt;0.9.8j-0.106.37.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584509" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.37.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631752" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631753" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631754" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631755" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631756" version="1" comment="openssl is &lt;0.9.8j-0.106.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631757" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632467" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.43.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632468" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.43.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632469" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.43.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632470" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.43.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632471" version="1" comment="openssl is &lt;0.9.8j-0.106.43.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632472" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.43.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673436" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.46.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673437" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.46.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673438" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.46.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673439" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.46.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673440" version="1" comment="openssl is &lt;0.9.8j-0.106.46.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673441" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.46.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584510" version="1" comment="openvpn is &lt;2.0.9-143.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584511" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584512" version="1" comment="openvpn is &lt;2.0.9-143.47.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584513" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.47.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584514" version="1" comment="libwsman1 is &lt;2.2.3-0.16.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584515" version="1" comment="openwsman-client is &lt;2.2.3-0.16.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584516" version="1" comment="openwsman-server is &lt;2.2.3-0.16.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584517" version="1" comment="pam is &lt;1.1.5-0.17.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584518" version="1" comment="pam-32bit is &lt;1.1.5-0.17.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584519" version="1" comment="pam-doc is &lt;1.1.5-0.17.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584520" version="1" comment="pam-x86 is &lt;1.1.5-0.17.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584521" version="1" comment="pam-modules is &lt;11-1.27.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584522" version="1" comment="pam-modules-32bit is &lt;11-1.27.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584523" version="1" comment="pam-modules-x86 is &lt;11-1.27.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584524" version="1" comment="pam_pkcs11 is &lt;0.6.0-141.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584525" version="1" comment="pam_pkcs11-32bit is &lt;0.6.0-141.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584526" version="1" comment="pam_pkcs11-x86 is &lt;0.6.0-141.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584527" version="1" comment="patch is &lt;2.5.9-252.22.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584528" version="1" comment="perl is &lt;5.10.0-64.80.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584529" version="1" comment="perl-32bit is &lt;5.10.0-64.80.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584530" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.80.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584531" version="1" comment="perl-Test-Simple is &lt;0.72-0.80.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584532" version="1" comment="perl-base is &lt;5.10.0-64.80.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584533" version="1" comment="perl-doc is &lt;5.10.0-64.80.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584534" version="1" comment="perl-x86 is &lt;5.10.0-64.80.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584535" version="1" comment="perl is &lt;5.10.0-64.81.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584536" version="1" comment="perl-32bit is &lt;5.10.0-64.81.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584537" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.81.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584538" version="1" comment="perl-Test-Simple is &lt;0.72-0.81.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584539" version="1" comment="perl-base is &lt;5.10.0-64.81.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584540" version="1" comment="perl-doc is &lt;5.10.0-64.81.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584541" version="1" comment="perl-x86 is &lt;5.10.0-64.81.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584542" version="1" comment="perl is &lt;5.10.0-64.81.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584543" version="1" comment="perl-32bit is &lt;5.10.0-64.81.10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584544" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.81.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584545" version="1" comment="perl-Test-Simple is &lt;0.72-0.81.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584546" version="1" comment="perl-base is &lt;5.10.0-64.81.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584547" version="1" comment="perl-doc is &lt;5.10.0-64.81.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584548" version="1" comment="perl-x86 is &lt;5.10.0-64.81.10.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584549" version="1" comment="perl is &lt;5.10.0-64.81.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584550" version="1" comment="perl-32bit is &lt;5.10.0-64.81.13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584551" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.81.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584552" version="1" comment="perl-Test-Simple is &lt;0.72-0.81.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584553" version="1" comment="perl-base is &lt;5.10.0-64.81.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584554" version="1" comment="perl-doc is &lt;5.10.0-64.81.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584555" version="1" comment="perl-x86 is &lt;5.10.0-64.81.13.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584556" version="1" comment="perl-Archive-Zip is &lt;1.24-4.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584557" version="1" comment="perl-DBD-mysql is &lt;4.008-6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584558" version="1" comment="perl-DBD-mysql is &lt;4.008-9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584559" version="1" comment="perl-DBD-mysql is &lt;4.008-10.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584560" version="1" comment="perl-DBI is &lt;1.607-3.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584561" version="1" comment="perl-DBI is &lt;1.607-3.6.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584562" version="1" comment="perl-XML-LibXML is &lt;1.66-3.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584563" version="1" comment="permissions is &lt;2013.1.7-0.6.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594270" version="1" comment="permissions is &lt;2013.1.7-0.6.12.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584564" version="1" comment="apache2-mod_php53 is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584565" version="1" comment="php53 is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584566" version="1" comment="php53-bcmath is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584567" version="1" comment="php53-bz2 is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584568" version="1" comment="php53-calendar is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584569" version="1" comment="php53-ctype is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584570" version="1" comment="php53-curl is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584571" version="1" comment="php53-dba is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584572" version="1" comment="php53-dom is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584573" version="1" comment="php53-exif is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584574" version="1" comment="php53-fastcgi is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584575" version="1" comment="php53-fileinfo is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584576" version="1" comment="php53-ftp is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584577" version="1" comment="php53-gd is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584578" version="1" comment="php53-gettext is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584579" version="1" comment="php53-gmp is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584580" version="1" comment="php53-iconv is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584581" version="1" comment="php53-intl is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584582" version="1" comment="php53-json is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584583" version="1" comment="php53-ldap is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584584" version="1" comment="php53-mbstring is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584585" version="1" comment="php53-mcrypt is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584586" version="1" comment="php53-mysql is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584587" version="1" comment="php53-odbc is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584588" version="1" comment="php53-openssl is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584589" version="1" comment="php53-pcntl is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584590" version="1" comment="php53-pdo is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584591" version="1" comment="php53-pear is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584592" version="1" comment="php53-pgsql is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584593" version="1" comment="php53-pspell is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584594" version="1" comment="php53-shmop is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584595" version="1" comment="php53-snmp is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584596" version="1" comment="php53-soap is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584597" version="1" comment="php53-suhosin is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584598" version="1" comment="php53-sysvmsg is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584599" version="1" comment="php53-sysvsem is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584600" version="1" comment="php53-sysvshm is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584601" version="1" comment="php53-tokenizer is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584602" version="1" comment="php53-wddx is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584603" version="1" comment="php53-xmlreader is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584604" version="1" comment="php53-xmlrpc is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584605" version="1" comment="php53-xmlwriter is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584606" version="1" comment="php53-xsl is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584607" version="1" comment="php53-zip is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584608" version="1" comment="php53-zlib is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584609" version="1" comment="apache2-mod_php53 is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584610" version="1" comment="php53 is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584611" version="1" comment="php53-bcmath is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584612" version="1" comment="php53-bz2 is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584613" version="1" comment="php53-calendar is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584614" version="1" comment="php53-ctype is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584615" version="1" comment="php53-curl is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584616" version="1" comment="php53-dba is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584617" version="1" comment="php53-dom is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584618" version="1" comment="php53-exif is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584619" version="1" comment="php53-fastcgi is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584620" version="1" comment="php53-fileinfo is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584621" version="1" comment="php53-ftp is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584622" version="1" comment="php53-gd is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584623" version="1" comment="php53-gettext is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584624" version="1" comment="php53-gmp is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584625" version="1" comment="php53-iconv is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584626" version="1" comment="php53-intl is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584627" version="1" comment="php53-json is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584628" version="1" comment="php53-ldap is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584629" version="1" comment="php53-mbstring is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584630" version="1" comment="php53-mcrypt is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584631" version="1" comment="php53-mysql is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584632" version="1" comment="php53-odbc is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584633" version="1" comment="php53-openssl is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584634" version="1" comment="php53-pcntl is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584635" version="1" comment="php53-pdo is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584636" version="1" comment="php53-pear is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584637" version="1" comment="php53-pgsql is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584638" version="1" comment="php53-pspell is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584639" version="1" comment="php53-shmop is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584640" version="1" comment="php53-snmp is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584641" version="1" comment="php53-soap is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584642" version="1" comment="php53-suhosin is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584643" version="1" comment="php53-sysvmsg is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584644" version="1" comment="php53-sysvsem is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584645" version="1" comment="php53-sysvshm is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584646" version="1" comment="php53-tokenizer is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584647" version="1" comment="php53-wddx is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584648" version="1" comment="php53-xmlreader is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584649" version="1" comment="php53-xmlrpc is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584650" version="1" comment="php53-xmlwriter is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584651" version="1" comment="php53-xsl is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584652" version="1" comment="php53-zip is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584653" version="1" comment="php53-zlib is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584654" version="1" comment="apache2-mod_php53 is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584655" version="1" comment="php53 is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584656" version="1" comment="php53-bcmath is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584657" version="1" comment="php53-bz2 is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584658" version="1" comment="php53-calendar is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584659" version="1" comment="php53-ctype is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584660" version="1" comment="php53-curl is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584661" version="1" comment="php53-dba is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584662" version="1" comment="php53-dom is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584663" version="1" comment="php53-exif is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584664" version="1" comment="php53-fastcgi is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584665" version="1" comment="php53-fileinfo is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584666" version="1" comment="php53-ftp is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584667" version="1" comment="php53-gd is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584668" version="1" comment="php53-gettext is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584669" version="1" comment="php53-gmp is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584670" version="1" comment="php53-iconv is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584671" version="1" comment="php53-intl is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584672" version="1" comment="php53-json is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584673" version="1" comment="php53-ldap is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584674" version="1" comment="php53-mbstring is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584675" version="1" comment="php53-mcrypt is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584676" version="1" comment="php53-mysql is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584677" version="1" comment="php53-odbc is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584678" version="1" comment="php53-openssl is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584679" version="1" comment="php53-pcntl is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584680" version="1" comment="php53-pdo is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584681" version="1" comment="php53-pear is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584682" version="1" comment="php53-pgsql is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584683" version="1" comment="php53-pspell is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584684" version="1" comment="php53-shmop is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584685" version="1" comment="php53-snmp is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584686" version="1" comment="php53-soap is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584687" version="1" comment="php53-suhosin is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584688" version="1" comment="php53-sysvmsg is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584689" version="1" comment="php53-sysvsem is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584690" version="1" comment="php53-sysvshm is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584691" version="1" comment="php53-tokenizer is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584692" version="1" comment="php53-wddx is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584693" version="1" comment="php53-xmlreader is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584694" version="1" comment="php53-xmlrpc is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584695" version="1" comment="php53-xmlwriter is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584696" version="1" comment="php53-xsl is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584697" version="1" comment="php53-zip is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584698" version="1" comment="php53-zlib is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584699" version="1" comment="apache2-mod_php53 is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584700" version="1" comment="php53 is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584701" version="1" comment="php53-bcmath is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584702" version="1" comment="php53-bz2 is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584703" version="1" comment="php53-calendar is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584704" version="1" comment="php53-ctype is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584705" version="1" comment="php53-curl is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584706" version="1" comment="php53-dba is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584707" version="1" comment="php53-dom is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584708" version="1" comment="php53-exif is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584709" version="1" comment="php53-fastcgi is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584710" version="1" comment="php53-fileinfo is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584711" version="1" comment="php53-ftp is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584712" version="1" comment="php53-gd is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584713" version="1" comment="php53-gettext is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584714" version="1" comment="php53-gmp is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584715" version="1" comment="php53-iconv is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584716" version="1" comment="php53-intl is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584717" version="1" comment="php53-json is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584718" version="1" comment="php53-ldap is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584719" version="1" comment="php53-mbstring is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584720" version="1" comment="php53-mcrypt is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584721" version="1" comment="php53-mysql is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584722" version="1" comment="php53-odbc is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584723" version="1" comment="php53-openssl is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584724" version="1" comment="php53-pcntl is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584725" version="1" comment="php53-pdo is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584726" version="1" comment="php53-pear is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584727" version="1" comment="php53-pgsql is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584728" version="1" comment="php53-pspell is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584729" version="1" comment="php53-shmop is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584730" version="1" comment="php53-snmp is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584731" version="1" comment="php53-soap is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584732" version="1" comment="php53-suhosin is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584733" version="1" comment="php53-sysvmsg is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584734" version="1" comment="php53-sysvsem is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584735" version="1" comment="php53-sysvshm is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584736" version="1" comment="php53-tokenizer is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584737" version="1" comment="php53-wddx is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584738" version="1" comment="php53-xmlreader is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584739" version="1" comment="php53-xmlrpc is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584740" version="1" comment="php53-xmlwriter is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584741" version="1" comment="php53-xsl is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584742" version="1" comment="php53-zip is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584743" version="1" comment="php53-zlib is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584744" version="1" comment="apache2-mod_php53 is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584745" version="1" comment="php53 is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584746" version="1" comment="php53-bcmath is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584747" version="1" comment="php53-bz2 is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584748" version="1" comment="php53-calendar is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584749" version="1" comment="php53-ctype is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584750" version="1" comment="php53-curl is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584751" version="1" comment="php53-dba is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584752" version="1" comment="php53-dom is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584753" version="1" comment="php53-exif is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584754" version="1" comment="php53-fastcgi is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584755" version="1" comment="php53-fileinfo is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584756" version="1" comment="php53-ftp is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584757" version="1" comment="php53-gd is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584758" version="1" comment="php53-gettext is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584759" version="1" comment="php53-gmp is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584760" version="1" comment="php53-iconv is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584761" version="1" comment="php53-intl is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584762" version="1" comment="php53-json is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584763" version="1" comment="php53-ldap is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584764" version="1" comment="php53-mbstring is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584765" version="1" comment="php53-mcrypt is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584766" version="1" comment="php53-mysql is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584767" version="1" comment="php53-odbc is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584768" version="1" comment="php53-openssl is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584769" version="1" comment="php53-pcntl is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584770" version="1" comment="php53-pdo is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584771" version="1" comment="php53-pear is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584772" version="1" comment="php53-pgsql is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584773" version="1" comment="php53-pspell is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584774" version="1" comment="php53-shmop is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584775" version="1" comment="php53-snmp is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584776" version="1" comment="php53-soap is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584777" version="1" comment="php53-suhosin is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584778" version="1" comment="php53-sysvmsg is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584779" version="1" comment="php53-sysvsem is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584780" version="1" comment="php53-sysvshm is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584781" version="1" comment="php53-tokenizer is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584782" version="1" comment="php53-wddx is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584783" version="1" comment="php53-xmlreader is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584784" version="1" comment="php53-xmlrpc is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584785" version="1" comment="php53-xmlwriter is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584786" version="1" comment="php53-xsl is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584787" version="1" comment="php53-zip is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584788" version="1" comment="php53-zlib is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584789" version="1" comment="apache2-mod_php53 is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584790" version="1" comment="php53 is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584791" version="1" comment="php53-bcmath is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584792" version="1" comment="php53-bz2 is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584793" version="1" comment="php53-calendar is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584794" version="1" comment="php53-ctype is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584795" version="1" comment="php53-curl is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584796" version="1" comment="php53-dba is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584797" version="1" comment="php53-dom is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584798" version="1" comment="php53-exif is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584799" version="1" comment="php53-fastcgi is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584800" version="1" comment="php53-fileinfo is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584801" version="1" comment="php53-ftp is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584802" version="1" comment="php53-gd is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584803" version="1" comment="php53-gettext is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584804" version="1" comment="php53-gmp is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584805" version="1" comment="php53-iconv is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584806" version="1" comment="php53-intl is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584807" version="1" comment="php53-json is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584808" version="1" comment="php53-ldap is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584809" version="1" comment="php53-mbstring is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584810" version="1" comment="php53-mcrypt is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584811" version="1" comment="php53-mysql is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584812" version="1" comment="php53-odbc is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584813" version="1" comment="php53-openssl is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584814" version="1" comment="php53-pcntl is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584815" version="1" comment="php53-pdo is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584816" version="1" comment="php53-pear is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584817" version="1" comment="php53-pgsql is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584818" version="1" comment="php53-pspell is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584819" version="1" comment="php53-shmop is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584820" version="1" comment="php53-snmp is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584821" version="1" comment="php53-soap is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584822" version="1" comment="php53-suhosin is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584823" version="1" comment="php53-sysvmsg is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584824" version="1" comment="php53-sysvsem is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584825" version="1" comment="php53-sysvshm is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584826" version="1" comment="php53-tokenizer is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584827" version="1" comment="php53-wddx is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584828" version="1" comment="php53-xmlreader is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584829" version="1" comment="php53-xmlrpc is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584830" version="1" comment="php53-xmlwriter is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584831" version="1" comment="php53-xsl is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584832" version="1" comment="php53-zip is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584833" version="1" comment="php53-zlib is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584834" version="1" comment="apache2-mod_php53 is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584835" version="1" comment="php53 is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584836" version="1" comment="php53-bcmath is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584837" version="1" comment="php53-bz2 is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584838" version="1" comment="php53-calendar is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584839" version="1" comment="php53-ctype is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584840" version="1" comment="php53-curl is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584841" version="1" comment="php53-dba is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584842" version="1" comment="php53-dom is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584843" version="1" comment="php53-exif is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584844" version="1" comment="php53-fastcgi is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584845" version="1" comment="php53-fileinfo is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584846" version="1" comment="php53-ftp is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584847" version="1" comment="php53-gd is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584848" version="1" comment="php53-gettext is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584849" version="1" comment="php53-gmp is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584850" version="1" comment="php53-iconv is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584851" version="1" comment="php53-intl is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584852" version="1" comment="php53-json is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584853" version="1" comment="php53-ldap is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584854" version="1" comment="php53-mbstring is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584855" version="1" comment="php53-mcrypt is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584856" version="1" comment="php53-mysql is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584857" version="1" comment="php53-odbc is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584858" version="1" comment="php53-openssl is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584859" version="1" comment="php53-pcntl is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584860" version="1" comment="php53-pdo is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584861" version="1" comment="php53-pear is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584862" version="1" comment="php53-pgsql is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584863" version="1" comment="php53-pspell is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584864" version="1" comment="php53-shmop is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584865" version="1" comment="php53-snmp is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584866" version="1" comment="php53-soap is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584867" version="1" comment="php53-suhosin is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584868" version="1" comment="php53-sysvmsg is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584869" version="1" comment="php53-sysvsem is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584870" version="1" comment="php53-sysvshm is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584871" version="1" comment="php53-tokenizer is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584872" version="1" comment="php53-wddx is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584873" version="1" comment="php53-xmlreader is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584874" version="1" comment="php53-xmlrpc is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584875" version="1" comment="php53-xmlwriter is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584876" version="1" comment="php53-xsl is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584877" version="1" comment="php53-zip is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584878" version="1" comment="php53-zlib is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584879" version="1" comment="apache2-mod_php53 is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584880" version="1" comment="php53 is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584881" version="1" comment="php53-bcmath is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584882" version="1" comment="php53-bz2 is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584883" version="1" comment="php53-calendar is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584884" version="1" comment="php53-ctype is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584885" version="1" comment="php53-curl is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584886" version="1" comment="php53-dba is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584887" version="1" comment="php53-dom is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584888" version="1" comment="php53-exif is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584889" version="1" comment="php53-fastcgi is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584890" version="1" comment="php53-fileinfo is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584891" version="1" comment="php53-ftp is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584892" version="1" comment="php53-gd is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584893" version="1" comment="php53-gettext is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584894" version="1" comment="php53-gmp is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584895" version="1" comment="php53-iconv is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584896" version="1" comment="php53-intl is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584897" version="1" comment="php53-json is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584898" version="1" comment="php53-ldap is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584899" version="1" comment="php53-mbstring is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584900" version="1" comment="php53-mcrypt is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584901" version="1" comment="php53-mysql is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584902" version="1" comment="php53-odbc is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584903" version="1" comment="php53-openssl is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584904" version="1" comment="php53-pcntl is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584905" version="1" comment="php53-pdo is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584906" version="1" comment="php53-pear is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584907" version="1" comment="php53-pgsql is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584908" version="1" comment="php53-pspell is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584909" version="1" comment="php53-shmop is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584910" version="1" comment="php53-snmp is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584911" version="1" comment="php53-soap is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584912" version="1" comment="php53-suhosin is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584913" version="1" comment="php53-sysvmsg is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584914" version="1" comment="php53-sysvsem is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584915" version="1" comment="php53-sysvshm is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584916" version="1" comment="php53-tokenizer is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584917" version="1" comment="php53-wddx is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584918" version="1" comment="php53-xmlreader is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584919" version="1" comment="php53-xmlrpc is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584920" version="1" comment="php53-xmlwriter is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584921" version="1" comment="php53-xsl is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584922" version="1" comment="php53-zip is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584923" version="1" comment="php53-zlib is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584924" version="1" comment="apache2-mod_php53 is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584925" version="1" comment="php53 is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584926" version="1" comment="php53-bcmath is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584927" version="1" comment="php53-bz2 is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584928" version="1" comment="php53-calendar is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584929" version="1" comment="php53-ctype is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584930" version="1" comment="php53-curl is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584931" version="1" comment="php53-dba is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584932" version="1" comment="php53-dom is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584933" version="1" comment="php53-exif is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584934" version="1" comment="php53-fastcgi is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584935" version="1" comment="php53-fileinfo is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584936" version="1" comment="php53-ftp is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584937" version="1" comment="php53-gd is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584938" version="1" comment="php53-gettext is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584939" version="1" comment="php53-gmp is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584940" version="1" comment="php53-iconv is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584941" version="1" comment="php53-intl is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584942" version="1" comment="php53-json is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584943" version="1" comment="php53-ldap is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584944" version="1" comment="php53-mbstring is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584945" version="1" comment="php53-mcrypt is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584946" version="1" comment="php53-mysql is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584947" version="1" comment="php53-odbc is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584948" version="1" comment="php53-openssl is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584949" version="1" comment="php53-pcntl is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584950" version="1" comment="php53-pdo is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584951" version="1" comment="php53-pear is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584952" version="1" comment="php53-pgsql is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584953" version="1" comment="php53-pspell is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584954" version="1" comment="php53-shmop is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584955" version="1" comment="php53-snmp is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584956" version="1" comment="php53-soap is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584957" version="1" comment="php53-suhosin is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584958" version="1" comment="php53-sysvmsg is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584959" version="1" comment="php53-sysvsem is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584960" version="1" comment="php53-sysvshm is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584961" version="1" comment="php53-tokenizer is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584962" version="1" comment="php53-wddx is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584963" version="1" comment="php53-xmlreader is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584964" version="1" comment="php53-xmlrpc is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584965" version="1" comment="php53-xmlwriter is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584966" version="1" comment="php53-xsl is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584967" version="1" comment="php53-zip is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584968" version="1" comment="php53-zlib is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584969" version="1" comment="apache2-mod_php53 is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584970" version="1" comment="php53 is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584971" version="1" comment="php53-bcmath is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584972" version="1" comment="php53-bz2 is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584973" version="1" comment="php53-calendar is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584974" version="1" comment="php53-ctype is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584975" version="1" comment="php53-curl is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584976" version="1" comment="php53-dba is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584977" version="1" comment="php53-dom is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584978" version="1" comment="php53-exif is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584979" version="1" comment="php53-fastcgi is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584980" version="1" comment="php53-fileinfo is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584981" version="1" comment="php53-ftp is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584982" version="1" comment="php53-gd is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584983" version="1" comment="php53-gettext is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584984" version="1" comment="php53-gmp is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584985" version="1" comment="php53-iconv is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584986" version="1" comment="php53-intl is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584987" version="1" comment="php53-json is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584988" version="1" comment="php53-ldap is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584989" version="1" comment="php53-mbstring is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584990" version="1" comment="php53-mcrypt is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584991" version="1" comment="php53-mysql is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584992" version="1" comment="php53-odbc is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584993" version="1" comment="php53-openssl is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584994" version="1" comment="php53-pcntl is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584995" version="1" comment="php53-pdo is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584996" version="1" comment="php53-pear is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584997" version="1" comment="php53-pgsql is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584998" version="1" comment="php53-pspell is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584999" version="1" comment="php53-shmop is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585000" version="1" comment="php53-snmp is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585001" version="1" comment="php53-soap is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585002" version="1" comment="php53-suhosin is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585003" version="1" comment="php53-sysvmsg is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585004" version="1" comment="php53-sysvsem is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585005" version="1" comment="php53-sysvshm is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585006" version="1" comment="php53-tokenizer is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585007" version="1" comment="php53-wddx is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585008" version="1" comment="php53-xmlreader is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585009" version="1" comment="php53-xmlrpc is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585010" version="1" comment="php53-xmlwriter is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585011" version="1" comment="php53-xsl is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585012" version="1" comment="php53-zip is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585013" version="1" comment="php53-zlib is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585014" version="1" comment="apache2-mod_php53 is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585015" version="1" comment="php53 is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585016" version="1" comment="php53-bcmath is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585017" version="1" comment="php53-bz2 is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585018" version="1" comment="php53-calendar is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585019" version="1" comment="php53-ctype is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585020" version="1" comment="php53-curl is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585021" version="1" comment="php53-dba is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585022" version="1" comment="php53-dom is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585023" version="1" comment="php53-exif is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585024" version="1" comment="php53-fastcgi is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585025" version="1" comment="php53-fileinfo is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585026" version="1" comment="php53-ftp is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585027" version="1" comment="php53-gd is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585028" version="1" comment="php53-gettext is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585029" version="1" comment="php53-gmp is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585030" version="1" comment="php53-iconv is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585031" version="1" comment="php53-intl is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585032" version="1" comment="php53-json is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585033" version="1" comment="php53-ldap is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585034" version="1" comment="php53-mbstring is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585035" version="1" comment="php53-mcrypt is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585036" version="1" comment="php53-mysql is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585037" version="1" comment="php53-odbc is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585038" version="1" comment="php53-openssl is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585039" version="1" comment="php53-pcntl is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585040" version="1" comment="php53-pdo is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585041" version="1" comment="php53-pear is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585042" version="1" comment="php53-pgsql is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585043" version="1" comment="php53-pspell is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585044" version="1" comment="php53-shmop is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585045" version="1" comment="php53-snmp is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585046" version="1" comment="php53-soap is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585047" version="1" comment="php53-suhosin is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585048" version="1" comment="php53-sysvmsg is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585049" version="1" comment="php53-sysvsem is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585050" version="1" comment="php53-sysvshm is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585051" version="1" comment="php53-tokenizer is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585052" version="1" comment="php53-wddx is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585053" version="1" comment="php53-xmlreader is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585054" version="1" comment="php53-xmlrpc is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585055" version="1" comment="php53-xmlwriter is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585056" version="1" comment="php53-xsl is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585057" version="1" comment="php53-zip is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585058" version="1" comment="php53-zlib is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585059" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585060" version="1" comment="php53 is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585061" version="1" comment="php53-bcmath is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585062" version="1" comment="php53-bz2 is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585063" version="1" comment="php53-calendar is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585064" version="1" comment="php53-ctype is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585065" version="1" comment="php53-curl is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585066" version="1" comment="php53-dba is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585067" version="1" comment="php53-dom is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585068" version="1" comment="php53-exif is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585069" version="1" comment="php53-fastcgi is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585070" version="1" comment="php53-fileinfo is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585071" version="1" comment="php53-ftp is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585072" version="1" comment="php53-gd is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585073" version="1" comment="php53-gettext is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585074" version="1" comment="php53-gmp is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585075" version="1" comment="php53-iconv is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585076" version="1" comment="php53-intl is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585077" version="1" comment="php53-json is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585078" version="1" comment="php53-ldap is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585079" version="1" comment="php53-mbstring is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585080" version="1" comment="php53-mcrypt is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585081" version="1" comment="php53-mysql is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585082" version="1" comment="php53-odbc is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585083" version="1" comment="php53-openssl is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585084" version="1" comment="php53-pcntl is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585085" version="1" comment="php53-pdo is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585086" version="1" comment="php53-pear is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585087" version="1" comment="php53-pgsql is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585088" version="1" comment="php53-pspell is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585089" version="1" comment="php53-shmop is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585090" version="1" comment="php53-snmp is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585091" version="1" comment="php53-soap is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585092" version="1" comment="php53-suhosin is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585093" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585094" version="1" comment="php53-sysvsem is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585095" version="1" comment="php53-sysvshm is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585096" version="1" comment="php53-tokenizer is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585097" version="1" comment="php53-wddx is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585098" version="1" comment="php53-xmlreader is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585099" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585100" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585101" version="1" comment="php53-xsl is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585102" version="1" comment="php53-zip is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585103" version="1" comment="php53-zlib is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585104" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585105" version="1" comment="php53 is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585106" version="1" comment="php53-bcmath is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585107" version="1" comment="php53-bz2 is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585108" version="1" comment="php53-calendar is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585109" version="1" comment="php53-ctype is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585110" version="1" comment="php53-curl is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585111" version="1" comment="php53-dba is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585112" version="1" comment="php53-dom is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585113" version="1" comment="php53-exif is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585114" version="1" comment="php53-fastcgi is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585115" version="1" comment="php53-fileinfo is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585116" version="1" comment="php53-ftp is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585117" version="1" comment="php53-gd is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585118" version="1" comment="php53-gettext is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585119" version="1" comment="php53-gmp is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585120" version="1" comment="php53-iconv is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585121" version="1" comment="php53-intl is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585122" version="1" comment="php53-json is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585123" version="1" comment="php53-ldap is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585124" version="1" comment="php53-mbstring is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585125" version="1" comment="php53-mcrypt is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585126" version="1" comment="php53-mysql is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585127" version="1" comment="php53-odbc is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585128" version="1" comment="php53-openssl is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585129" version="1" comment="php53-pcntl is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585130" version="1" comment="php53-pdo is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585131" version="1" comment="php53-pear is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585132" version="1" comment="php53-pgsql is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585133" version="1" comment="php53-pspell is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585134" version="1" comment="php53-shmop is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585135" version="1" comment="php53-snmp is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585136" version="1" comment="php53-soap is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585137" version="1" comment="php53-suhosin is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585138" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585139" version="1" comment="php53-sysvsem is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585140" version="1" comment="php53-sysvshm is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585141" version="1" comment="php53-tokenizer is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585142" version="1" comment="php53-wddx is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585143" version="1" comment="php53-xmlreader is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585144" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585145" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585146" version="1" comment="php53-xsl is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585147" version="1" comment="php53-zip is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585148" version="1" comment="php53-zlib is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585149" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585150" version="1" comment="php53 is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585151" version="1" comment="php53-bcmath is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585152" version="1" comment="php53-bz2 is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585153" version="1" comment="php53-calendar is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585154" version="1" comment="php53-ctype is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585155" version="1" comment="php53-curl is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585156" version="1" comment="php53-dba is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585157" version="1" comment="php53-dom is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585158" version="1" comment="php53-exif is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585159" version="1" comment="php53-fastcgi is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585160" version="1" comment="php53-fileinfo is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585161" version="1" comment="php53-ftp is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585162" version="1" comment="php53-gd is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585163" version="1" comment="php53-gettext is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585164" version="1" comment="php53-gmp is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585165" version="1" comment="php53-iconv is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585166" version="1" comment="php53-intl is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585167" version="1" comment="php53-json is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585168" version="1" comment="php53-ldap is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585169" version="1" comment="php53-mbstring is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585170" version="1" comment="php53-mcrypt is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585171" version="1" comment="php53-mysql is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585172" version="1" comment="php53-odbc is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585173" version="1" comment="php53-openssl is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585174" version="1" comment="php53-pcntl is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585175" version="1" comment="php53-pdo is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585176" version="1" comment="php53-pear is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585177" version="1" comment="php53-pgsql is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585178" version="1" comment="php53-pspell is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585179" version="1" comment="php53-shmop is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585180" version="1" comment="php53-snmp is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585181" version="1" comment="php53-soap is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585182" version="1" comment="php53-suhosin is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585183" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585184" version="1" comment="php53-sysvsem is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585185" version="1" comment="php53-sysvshm is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585186" version="1" comment="php53-tokenizer is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585187" version="1" comment="php53-wddx is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585188" version="1" comment="php53-xmlreader is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585189" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585190" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585191" version="1" comment="php53-xsl is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585192" version="1" comment="php53-zip is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585193" version="1" comment="php53-zlib is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585194" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585195" version="1" comment="php53 is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585196" version="1" comment="php53-bcmath is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585197" version="1" comment="php53-bz2 is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585198" version="1" comment="php53-calendar is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585199" version="1" comment="php53-ctype is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585200" version="1" comment="php53-curl is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585201" version="1" comment="php53-dba is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585202" version="1" comment="php53-dom is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585203" version="1" comment="php53-exif is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585204" version="1" comment="php53-fastcgi is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585205" version="1" comment="php53-fileinfo is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585206" version="1" comment="php53-ftp is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585207" version="1" comment="php53-gd is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585208" version="1" comment="php53-gettext is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585209" version="1" comment="php53-gmp is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585210" version="1" comment="php53-iconv is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585211" version="1" comment="php53-intl is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585212" version="1" comment="php53-json is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585213" version="1" comment="php53-ldap is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585214" version="1" comment="php53-mbstring is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585215" version="1" comment="php53-mcrypt is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585216" version="1" comment="php53-mysql is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585217" version="1" comment="php53-odbc is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585218" version="1" comment="php53-openssl is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585219" version="1" comment="php53-pcntl is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585220" version="1" comment="php53-pdo is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585221" version="1" comment="php53-pear is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585222" version="1" comment="php53-pgsql is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585223" version="1" comment="php53-pspell is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585224" version="1" comment="php53-shmop is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585225" version="1" comment="php53-snmp is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585226" version="1" comment="php53-soap is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585227" version="1" comment="php53-suhosin is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585228" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585229" version="1" comment="php53-sysvsem is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585230" version="1" comment="php53-sysvshm is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585231" version="1" comment="php53-tokenizer is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585232" version="1" comment="php53-wddx is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585233" version="1" comment="php53-xmlreader is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585234" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585235" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585236" version="1" comment="php53-xsl is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585237" version="1" comment="php53-zip is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585238" version="1" comment="php53-zlib is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585239" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585240" version="1" comment="php53 is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585241" version="1" comment="php53-bcmath is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585242" version="1" comment="php53-bz2 is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585243" version="1" comment="php53-calendar is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585244" version="1" comment="php53-ctype is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585245" version="1" comment="php53-curl is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585246" version="1" comment="php53-dba is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585247" version="1" comment="php53-dom is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585248" version="1" comment="php53-exif is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585249" version="1" comment="php53-fastcgi is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585250" version="1" comment="php53-fileinfo is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585251" version="1" comment="php53-ftp is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585252" version="1" comment="php53-gd is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585253" version="1" comment="php53-gettext is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585254" version="1" comment="php53-gmp is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585255" version="1" comment="php53-iconv is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585256" version="1" comment="php53-intl is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585257" version="1" comment="php53-json is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585258" version="1" comment="php53-ldap is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585259" version="1" comment="php53-mbstring is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585260" version="1" comment="php53-mcrypt is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585261" version="1" comment="php53-mysql is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585262" version="1" comment="php53-odbc is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585263" version="1" comment="php53-openssl is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585264" version="1" comment="php53-pcntl is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585265" version="1" comment="php53-pdo is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585266" version="1" comment="php53-pear is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585267" version="1" comment="php53-pgsql is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585268" version="1" comment="php53-pspell is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585269" version="1" comment="php53-shmop is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585270" version="1" comment="php53-snmp is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585271" version="1" comment="php53-soap is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585272" version="1" comment="php53-suhosin is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585273" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585274" version="1" comment="php53-sysvsem is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585275" version="1" comment="php53-sysvshm is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585276" version="1" comment="php53-tokenizer is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585277" version="1" comment="php53-wddx is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585278" version="1" comment="php53-xmlreader is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585279" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585280" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585281" version="1" comment="php53-xsl is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585282" version="1" comment="php53-zip is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585283" version="1" comment="php53-zlib is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585284" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585285" version="1" comment="php53 is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585286" version="1" comment="php53-bcmath is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585287" version="1" comment="php53-bz2 is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585288" version="1" comment="php53-calendar is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585289" version="1" comment="php53-ctype is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585290" version="1" comment="php53-curl is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585291" version="1" comment="php53-dba is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585292" version="1" comment="php53-dom is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585293" version="1" comment="php53-exif is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585294" version="1" comment="php53-fastcgi is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585295" version="1" comment="php53-fileinfo is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585296" version="1" comment="php53-ftp is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585297" version="1" comment="php53-gd is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585298" version="1" comment="php53-gettext is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585299" version="1" comment="php53-gmp is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585300" version="1" comment="php53-iconv is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585301" version="1" comment="php53-intl is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585302" version="1" comment="php53-json is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585303" version="1" comment="php53-ldap is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585304" version="1" comment="php53-mbstring is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585305" version="1" comment="php53-mcrypt is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585306" version="1" comment="php53-mysql is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585307" version="1" comment="php53-odbc is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585308" version="1" comment="php53-openssl is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585309" version="1" comment="php53-pcntl is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585310" version="1" comment="php53-pdo is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585311" version="1" comment="php53-pear is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585312" version="1" comment="php53-pgsql is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585313" version="1" comment="php53-pspell is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585314" version="1" comment="php53-shmop is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585315" version="1" comment="php53-snmp is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585316" version="1" comment="php53-soap is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585317" version="1" comment="php53-suhosin is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585318" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585319" version="1" comment="php53-sysvsem is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585320" version="1" comment="php53-sysvshm is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585321" version="1" comment="php53-tokenizer is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585322" version="1" comment="php53-wddx is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585323" version="1" comment="php53-xmlreader is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585324" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585325" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585326" version="1" comment="php53-xsl is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585327" version="1" comment="php53-zip is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585328" version="1" comment="php53-zlib is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585329" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585330" version="1" comment="php53 is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585331" version="1" comment="php53-bcmath is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585332" version="1" comment="php53-bz2 is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585333" version="1" comment="php53-calendar is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585334" version="1" comment="php53-ctype is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585335" version="1" comment="php53-curl is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585336" version="1" comment="php53-dba is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585337" version="1" comment="php53-dom is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585338" version="1" comment="php53-exif is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585339" version="1" comment="php53-fastcgi is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585340" version="1" comment="php53-fileinfo is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585341" version="1" comment="php53-ftp is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585342" version="1" comment="php53-gd is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585343" version="1" comment="php53-gettext is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585344" version="1" comment="php53-gmp is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585345" version="1" comment="php53-iconv is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585346" version="1" comment="php53-intl is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585347" version="1" comment="php53-json is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585348" version="1" comment="php53-ldap is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585349" version="1" comment="php53-mbstring is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585350" version="1" comment="php53-mcrypt is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585351" version="1" comment="php53-mysql is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585352" version="1" comment="php53-odbc is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585353" version="1" comment="php53-openssl is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585354" version="1" comment="php53-pcntl is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585355" version="1" comment="php53-pdo is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585356" version="1" comment="php53-pear is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585357" version="1" comment="php53-pgsql is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585358" version="1" comment="php53-pspell is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585359" version="1" comment="php53-shmop is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585360" version="1" comment="php53-snmp is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585361" version="1" comment="php53-soap is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585362" version="1" comment="php53-suhosin is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585363" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585364" version="1" comment="php53-sysvsem is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585365" version="1" comment="php53-sysvshm is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585366" version="1" comment="php53-tokenizer is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585367" version="1" comment="php53-wddx is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585368" version="1" comment="php53-xmlreader is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585369" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585370" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585371" version="1" comment="php53-xsl is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585372" version="1" comment="php53-zip is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585373" version="1" comment="php53-zlib is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585374" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585375" version="1" comment="php53 is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585376" version="1" comment="php53-bcmath is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585377" version="1" comment="php53-bz2 is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585378" version="1" comment="php53-calendar is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585379" version="1" comment="php53-ctype is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585380" version="1" comment="php53-curl is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585381" version="1" comment="php53-dba is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585382" version="1" comment="php53-dom is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585383" version="1" comment="php53-exif is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585384" version="1" comment="php53-fastcgi is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585385" version="1" comment="php53-fileinfo is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585386" version="1" comment="php53-ftp is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585387" version="1" comment="php53-gd is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585388" version="1" comment="php53-gettext is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585389" version="1" comment="php53-gmp is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585390" version="1" comment="php53-iconv is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585391" version="1" comment="php53-intl is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585392" version="1" comment="php53-json is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585393" version="1" comment="php53-ldap is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585394" version="1" comment="php53-mbstring is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585395" version="1" comment="php53-mcrypt is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585396" version="1" comment="php53-mysql is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585397" version="1" comment="php53-odbc is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585398" version="1" comment="php53-openssl is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585399" version="1" comment="php53-pcntl is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585400" version="1" comment="php53-pdo is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585401" version="1" comment="php53-pear is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585402" version="1" comment="php53-pgsql is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585403" version="1" comment="php53-pspell is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585404" version="1" comment="php53-shmop is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585405" version="1" comment="php53-snmp is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585406" version="1" comment="php53-soap is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585407" version="1" comment="php53-suhosin is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585408" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585409" version="1" comment="php53-sysvsem is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585410" version="1" comment="php53-sysvshm is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585411" version="1" comment="php53-tokenizer is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585412" version="1" comment="php53-wddx is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585413" version="1" comment="php53-xmlreader is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585414" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585415" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585416" version="1" comment="php53-xsl is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585417" version="1" comment="php53-zip is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585418" version="1" comment="php53-zlib is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585419" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585420" version="1" comment="php53 is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585421" version="1" comment="php53-bcmath is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585422" version="1" comment="php53-bz2 is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585423" version="1" comment="php53-calendar is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585424" version="1" comment="php53-ctype is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585425" version="1" comment="php53-curl is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585426" version="1" comment="php53-dba is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585427" version="1" comment="php53-dom is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585428" version="1" comment="php53-exif is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585429" version="1" comment="php53-fastcgi is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585430" version="1" comment="php53-fileinfo is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585431" version="1" comment="php53-ftp is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585432" version="1" comment="php53-gd is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585433" version="1" comment="php53-gettext is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585434" version="1" comment="php53-gmp is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585435" version="1" comment="php53-iconv is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585436" version="1" comment="php53-intl is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585437" version="1" comment="php53-json is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585438" version="1" comment="php53-ldap is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585439" version="1" comment="php53-mbstring is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585440" version="1" comment="php53-mcrypt is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585441" version="1" comment="php53-mysql is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585442" version="1" comment="php53-odbc is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585443" version="1" comment="php53-openssl is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585444" version="1" comment="php53-pcntl is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585445" version="1" comment="php53-pdo is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585446" version="1" comment="php53-pear is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585447" version="1" comment="php53-pgsql is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585448" version="1" comment="php53-pspell is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585449" version="1" comment="php53-shmop is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585450" version="1" comment="php53-snmp is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585451" version="1" comment="php53-soap is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585452" version="1" comment="php53-suhosin is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585453" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585454" version="1" comment="php53-sysvsem is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585455" version="1" comment="php53-sysvshm is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585456" version="1" comment="php53-tokenizer is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585457" version="1" comment="php53-wddx is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585458" version="1" comment="php53-xmlreader is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585459" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585460" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585461" version="1" comment="php53-xsl is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585462" version="1" comment="php53-zip is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585463" version="1" comment="php53-zlib is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585464" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585465" version="1" comment="php53 is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585466" version="1" comment="php53-bcmath is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585467" version="1" comment="php53-bz2 is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585468" version="1" comment="php53-calendar is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585469" version="1" comment="php53-ctype is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585470" version="1" comment="php53-curl is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585471" version="1" comment="php53-dba is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585472" version="1" comment="php53-dom is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585473" version="1" comment="php53-exif is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585474" version="1" comment="php53-fastcgi is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585475" version="1" comment="php53-fileinfo is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585476" version="1" comment="php53-ftp is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585477" version="1" comment="php53-gd is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585478" version="1" comment="php53-gettext is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585479" version="1" comment="php53-gmp is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585480" version="1" comment="php53-iconv is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585481" version="1" comment="php53-intl is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585482" version="1" comment="php53-json is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585483" version="1" comment="php53-ldap is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585484" version="1" comment="php53-mbstring is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585485" version="1" comment="php53-mcrypt is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585486" version="1" comment="php53-mysql is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585487" version="1" comment="php53-odbc is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585488" version="1" comment="php53-openssl is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585489" version="1" comment="php53-pcntl is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585490" version="1" comment="php53-pdo is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585491" version="1" comment="php53-pear is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585492" version="1" comment="php53-pgsql is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585493" version="1" comment="php53-pspell is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585494" version="1" comment="php53-shmop is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585495" version="1" comment="php53-snmp is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585496" version="1" comment="php53-soap is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585497" version="1" comment="php53-suhosin is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585498" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585499" version="1" comment="php53-sysvsem is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585500" version="1" comment="php53-sysvshm is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585501" version="1" comment="php53-tokenizer is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585502" version="1" comment="php53-wddx is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585503" version="1" comment="php53-xmlreader is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585504" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585505" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585506" version="1" comment="php53-xsl is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585507" version="1" comment="php53-zip is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585508" version="1" comment="php53-zlib is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585509" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585510" version="1" comment="php53 is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585511" version="1" comment="php53-bcmath is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585512" version="1" comment="php53-bz2 is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585513" version="1" comment="php53-calendar is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585514" version="1" comment="php53-ctype is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585515" version="1" comment="php53-curl is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585516" version="1" comment="php53-dba is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585517" version="1" comment="php53-dom is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585518" version="1" comment="php53-exif is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585519" version="1" comment="php53-fastcgi is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585520" version="1" comment="php53-fileinfo is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585521" version="1" comment="php53-ftp is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585522" version="1" comment="php53-gd is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585523" version="1" comment="php53-gettext is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585524" version="1" comment="php53-gmp is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585525" version="1" comment="php53-iconv is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585526" version="1" comment="php53-intl is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585527" version="1" comment="php53-json is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585528" version="1" comment="php53-ldap is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585529" version="1" comment="php53-mbstring is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585530" version="1" comment="php53-mcrypt is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585531" version="1" comment="php53-mysql is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585532" version="1" comment="php53-odbc is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585533" version="1" comment="php53-openssl is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585534" version="1" comment="php53-pcntl is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585535" version="1" comment="php53-pdo is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585536" version="1" comment="php53-pear is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585537" version="1" comment="php53-pgsql is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585538" version="1" comment="php53-pspell is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585539" version="1" comment="php53-shmop is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585540" version="1" comment="php53-snmp is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585541" version="1" comment="php53-soap is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585542" version="1" comment="php53-suhosin is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585543" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585544" version="1" comment="php53-sysvsem is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585545" version="1" comment="php53-sysvshm is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585546" version="1" comment="php53-tokenizer is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585547" version="1" comment="php53-wddx is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585548" version="1" comment="php53-xmlreader is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585549" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585550" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585551" version="1" comment="php53-xsl is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585552" version="1" comment="php53-zip is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585553" version="1" comment="php53-zlib is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585554" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585555" version="1" comment="php53 is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585556" version="1" comment="php53-bcmath is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585557" version="1" comment="php53-bz2 is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585558" version="1" comment="php53-calendar is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585559" version="1" comment="php53-ctype is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585560" version="1" comment="php53-curl is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585561" version="1" comment="php53-dba is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585562" version="1" comment="php53-dom is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585563" version="1" comment="php53-exif is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585564" version="1" comment="php53-fastcgi is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585565" version="1" comment="php53-fileinfo is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585566" version="1" comment="php53-ftp is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585567" version="1" comment="php53-gd is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585568" version="1" comment="php53-gettext is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585569" version="1" comment="php53-gmp is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585570" version="1" comment="php53-iconv is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585571" version="1" comment="php53-intl is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585572" version="1" comment="php53-json is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585573" version="1" comment="php53-ldap is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585574" version="1" comment="php53-mbstring is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585575" version="1" comment="php53-mcrypt is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585576" version="1" comment="php53-mysql is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585577" version="1" comment="php53-odbc is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585578" version="1" comment="php53-openssl is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585579" version="1" comment="php53-pcntl is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585580" version="1" comment="php53-pdo is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585581" version="1" comment="php53-pear is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585582" version="1" comment="php53-pgsql is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585583" version="1" comment="php53-pspell is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585584" version="1" comment="php53-shmop is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585585" version="1" comment="php53-snmp is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585586" version="1" comment="php53-soap is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585587" version="1" comment="php53-suhosin is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585588" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585589" version="1" comment="php53-sysvsem is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585590" version="1" comment="php53-sysvshm is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585591" version="1" comment="php53-tokenizer is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585592" version="1" comment="php53-wddx is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585593" version="1" comment="php53-xmlreader is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585594" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585595" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585596" version="1" comment="php53-xsl is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585597" version="1" comment="php53-zip is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585598" version="1" comment="php53-zlib is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585599" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585600" version="1" comment="php53 is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585601" version="1" comment="php53-bcmath is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585602" version="1" comment="php53-bz2 is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585603" version="1" comment="php53-calendar is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585604" version="1" comment="php53-ctype is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585605" version="1" comment="php53-curl is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585606" version="1" comment="php53-dba is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585607" version="1" comment="php53-dom is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585608" version="1" comment="php53-exif is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585609" version="1" comment="php53-fastcgi is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585610" version="1" comment="php53-fileinfo is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585611" version="1" comment="php53-ftp is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585612" version="1" comment="php53-gd is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585613" version="1" comment="php53-gettext is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585614" version="1" comment="php53-gmp is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585615" version="1" comment="php53-iconv is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585616" version="1" comment="php53-intl is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585617" version="1" comment="php53-json is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585618" version="1" comment="php53-ldap is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585619" version="1" comment="php53-mbstring is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585620" version="1" comment="php53-mcrypt is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585621" version="1" comment="php53-mysql is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585622" version="1" comment="php53-odbc is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585623" version="1" comment="php53-openssl is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585624" version="1" comment="php53-pcntl is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585625" version="1" comment="php53-pdo is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585626" version="1" comment="php53-pear is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585627" version="1" comment="php53-pgsql is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585628" version="1" comment="php53-pspell is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585629" version="1" comment="php53-shmop is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585630" version="1" comment="php53-snmp is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585631" version="1" comment="php53-soap is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585632" version="1" comment="php53-suhosin is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585633" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585634" version="1" comment="php53-sysvsem is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585635" version="1" comment="php53-sysvshm is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585636" version="1" comment="php53-tokenizer is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585637" version="1" comment="php53-wddx is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585638" version="1" comment="php53-xmlreader is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585639" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585640" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585641" version="1" comment="php53-xsl is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585642" version="1" comment="php53-zip is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585643" version="1" comment="php53-zlib is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585644" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585645" version="1" comment="php53 is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585646" version="1" comment="php53-bcmath is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585647" version="1" comment="php53-bz2 is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585648" version="1" comment="php53-calendar is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585649" version="1" comment="php53-ctype is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585650" version="1" comment="php53-curl is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585651" version="1" comment="php53-dba is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585652" version="1" comment="php53-dom is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585653" version="1" comment="php53-exif is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585654" version="1" comment="php53-fastcgi is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585655" version="1" comment="php53-fileinfo is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585656" version="1" comment="php53-ftp is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585657" version="1" comment="php53-gd is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585658" version="1" comment="php53-gettext is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585659" version="1" comment="php53-gmp is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585660" version="1" comment="php53-iconv is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585661" version="1" comment="php53-intl is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585662" version="1" comment="php53-json is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585663" version="1" comment="php53-ldap is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585664" version="1" comment="php53-mbstring is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585665" version="1" comment="php53-mcrypt is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585666" version="1" comment="php53-mysql is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585667" version="1" comment="php53-odbc is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585668" version="1" comment="php53-openssl is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585669" version="1" comment="php53-pcntl is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585670" version="1" comment="php53-pdo is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585671" version="1" comment="php53-pear is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585672" version="1" comment="php53-pgsql is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585673" version="1" comment="php53-pspell is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585674" version="1" comment="php53-shmop is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585675" version="1" comment="php53-snmp is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585676" version="1" comment="php53-soap is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585677" version="1" comment="php53-suhosin is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585678" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585679" version="1" comment="php53-sysvsem is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585680" version="1" comment="php53-sysvshm is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585681" version="1" comment="php53-tokenizer is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585682" version="1" comment="php53-wddx is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585683" version="1" comment="php53-xmlreader is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585684" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585685" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585686" version="1" comment="php53-xsl is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585687" version="1" comment="php53-zip is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585688" version="1" comment="php53-zlib is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585689" version="1" comment="policycoreutils is &lt;2.0.79-4.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585690" version="1" comment="policycoreutils is &lt;2.0.79-4.9.3.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585691" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585692" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585693" version="1" comment="libpoppler5 is &lt;0.12.3-1.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585694" version="1" comment="poppler-tools is &lt;0.12.3-1.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585695" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.13.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585696" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.13.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585697" version="1" comment="libpoppler5 is &lt;0.12.3-1.13.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585698" version="1" comment="poppler-tools is &lt;0.12.3-1.13.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585699" version="1" comment="libecpg6 is &lt;9.4.6-0.14.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585700" version="1" comment="libpq5 is &lt;9.4.6-0.14.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585701" version="1" comment="libpq5-32bit is &lt;9.4.6-0.14.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585702" version="1" comment="postgresql94 is &lt;9.4.6-0.14.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585703" version="1" comment="postgresql94-contrib is &lt;9.4.6-0.14.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585704" version="1" comment="postgresql94-docs is &lt;9.4.6-0.14.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585705" version="1" comment="postgresql94-server is &lt;9.4.6-0.14.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585706" version="1" comment="libecpg6 is &lt;9.4.9-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585707" version="1" comment="libpq5 is &lt;9.4.9-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585708" version="1" comment="libpq5-32bit is &lt;9.4.9-0.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585709" version="1" comment="postgresql94 is &lt;9.4.9-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585710" version="1" comment="postgresql94-contrib is &lt;9.4.9-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585711" version="1" comment="postgresql94-docs is &lt;9.4.9-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585712" version="1" comment="postgresql94-server is &lt;9.4.9-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585713" version="1" comment="libecpg6 is &lt;9.4.12-0.22.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585714" version="1" comment="libpq5 is &lt;9.4.12-0.22.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585715" version="1" comment="libpq5-32bit is &lt;9.4.12-0.22.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585716" version="1" comment="postgresql94 is &lt;9.4.12-0.22.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585717" version="1" comment="postgresql94-contrib is &lt;9.4.12-0.22.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585718" version="1" comment="postgresql94-docs is &lt;9.4.12-0.22.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585719" version="1" comment="postgresql94-server is &lt;9.4.12-0.22.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585720" version="1" comment="libecpg6 is &lt;9.4.13-0.23.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585721" version="1" comment="libpq5 is &lt;9.4.13-0.23.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585722" version="1" comment="libpq5-32bit is &lt;9.4.13-0.23.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585723" version="1" comment="postgresql94 is &lt;9.4.13-0.23.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585724" version="1" comment="postgresql94-contrib is &lt;9.4.13-0.23.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585725" version="1" comment="postgresql94-docs is &lt;9.4.13-0.23.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585726" version="1" comment="postgresql94-server is &lt;9.4.13-0.23.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585727" version="1" comment="libecpg6 is &lt;9.4.15-0.23.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585728" version="1" comment="libpq5 is &lt;9.4.15-0.23.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585729" version="1" comment="libpq5-32bit is &lt;9.4.15-0.23.10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585730" version="1" comment="postgresql94 is &lt;9.4.15-0.23.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585731" version="1" comment="postgresql94-contrib is &lt;9.4.15-0.23.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585732" version="1" comment="postgresql94-docs is &lt;9.4.15-0.23.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585733" version="1" comment="postgresql94-server is &lt;9.4.15-0.23.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585734" version="1" comment="libecpg6 is &lt;9.4.16-0.23.13.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585735" version="1" comment="libpq5 is &lt;9.4.16-0.23.13.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585736" version="1" comment="libpq5-32bit is &lt;9.4.16-0.23.13.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585737" version="1" comment="postgresql94 is &lt;9.4.16-0.23.13.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585738" version="1" comment="postgresql94-contrib is &lt;9.4.16-0.23.13.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585739" version="1" comment="postgresql94-docs is &lt;9.4.16-0.23.13.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585740" version="1" comment="postgresql94-server is &lt;9.4.16-0.23.13.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585741" version="1" comment="libecpg6 is &lt;9.4.17-0.23.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585742" version="1" comment="libpq5 is &lt;9.4.17-0.23.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585743" version="1" comment="libpq5-32bit is &lt;9.4.17-0.23.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585744" version="1" comment="postgresql94 is &lt;9.4.17-0.23.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585745" version="1" comment="postgresql94-contrib is &lt;9.4.17-0.23.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585746" version="1" comment="postgresql94-docs is &lt;9.4.17-0.23.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585747" version="1" comment="postgresql94-server is &lt;9.4.17-0.23.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585748" version="1" comment="libecpg6 is &lt;9.4.19-0.23.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585749" version="1" comment="libpq5 is &lt;9.4.19-0.23.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585750" version="1" comment="libpq5-32bit is &lt;9.4.19-0.23.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585751" version="1" comment="postgresql94 is &lt;9.4.19-0.23.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585752" version="1" comment="postgresql94-contrib is &lt;9.4.19-0.23.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585753" version="1" comment="postgresql94-docs is &lt;9.4.19-0.23.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585754" version="1" comment="postgresql94-server is &lt;9.4.19-0.23.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585755" version="1" comment="ppp is &lt;2.4.5.git-2.31.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585756" version="1" comment="ppp is &lt;2.4.5.git-2.32.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585757" version="1" comment="procmail is &lt;3.22-240.8.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585758" version="1" comment="procps is &lt;3.2.7-152.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585759" version="1" comment="puppet is &lt;2.7.26-0.5.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585760" version="1" comment="puppet-server is &lt;2.7.26-0.5.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585761" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585762" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585763" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585764" version="1" comment="python is &lt;2.6.9-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585765" version="1" comment="python-32bit is &lt;2.6.9-39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585766" version="1" comment="python-base is &lt;2.6.9-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585767" version="1" comment="python-base-32bit is &lt;2.6.9-39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585768" version="1" comment="python-base-x86 is &lt;2.6.9-39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585769" version="1" comment="python-curses is &lt;2.6.9-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585770" version="1" comment="python-demo is &lt;2.6.9-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585771" version="1" comment="python-gdbm is &lt;2.6.9-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585772" version="1" comment="python-idle is &lt;2.6.9-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585773" version="1" comment="python-tk is &lt;2.6.9-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585774" version="1" comment="python-x86 is &lt;2.6.9-39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585775" version="1" comment="python-xml is &lt;2.6.9-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585776" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585777" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585778" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-40.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585779" version="1" comment="python is &lt;2.6.9-40.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585780" version="1" comment="python-32bit is &lt;2.6.9-40.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585781" version="1" comment="python-base is &lt;2.6.9-40.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585782" version="1" comment="python-base-32bit is &lt;2.6.9-40.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585783" version="1" comment="python-base-x86 is &lt;2.6.9-40.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585784" version="1" comment="python-curses is &lt;2.6.9-40.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585785" version="1" comment="python-demo is &lt;2.6.9-40.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585786" version="1" comment="python-gdbm is &lt;2.6.9-40.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585787" version="1" comment="python-idle is &lt;2.6.9-40.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585788" version="1" comment="python-tk is &lt;2.6.9-40.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585789" version="1" comment="python-x86 is &lt;2.6.9-40.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585790" version="1" comment="python-xml is &lt;2.6.9-40.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585791" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585792" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.6.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585793" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-40.6.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585794" version="1" comment="python is &lt;2.6.9-40.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585795" version="1" comment="python-32bit is &lt;2.6.9-40.6.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585796" version="1" comment="python-base is &lt;2.6.9-40.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585797" version="1" comment="python-base-32bit is &lt;2.6.9-40.6.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585798" version="1" comment="python-base-x86 is &lt;2.6.9-40.6.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585799" version="1" comment="python-curses is &lt;2.6.9-40.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585800" version="1" comment="python-demo is &lt;2.6.9-40.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585801" version="1" comment="python-gdbm is &lt;2.6.9-40.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585802" version="1" comment="python-idle is &lt;2.6.9-40.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585803" version="1" comment="python-tk is &lt;2.6.9-40.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585804" version="1" comment="python-x86 is &lt;2.6.9-40.6.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585805" version="1" comment="python-xml is &lt;2.6.9-40.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585806" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585807" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585808" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-40.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585809" version="1" comment="python is &lt;2.6.9-40.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585810" version="1" comment="python-32bit is &lt;2.6.9-40.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585811" version="1" comment="python-base is &lt;2.6.9-40.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585812" version="1" comment="python-base-32bit is &lt;2.6.9-40.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585813" version="1" comment="python-base-x86 is &lt;2.6.9-40.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585814" version="1" comment="python-curses is &lt;2.6.9-40.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585815" version="1" comment="python-demo is &lt;2.6.9-40.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585816" version="1" comment="python-gdbm is &lt;2.6.9-40.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585817" version="1" comment="python-idle is &lt;2.6.9-40.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585818" version="1" comment="python-tk is &lt;2.6.9-40.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585819" version="1" comment="python-x86 is &lt;2.6.9-40.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585820" version="1" comment="python-xml is &lt;2.6.9-40.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585821" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585822" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585823" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-40.21.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585824" version="1" comment="python is &lt;2.6.9-40.21.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585825" version="1" comment="python-32bit is &lt;2.6.9-40.21.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585826" version="1" comment="python-base is &lt;2.6.9-40.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585827" version="1" comment="python-base-32bit is &lt;2.6.9-40.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585828" version="1" comment="python-base-x86 is &lt;2.6.9-40.21.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585829" version="1" comment="python-curses is &lt;2.6.9-40.21.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585830" version="1" comment="python-demo is &lt;2.6.9-40.21.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585831" version="1" comment="python-gdbm is &lt;2.6.9-40.21.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585832" version="1" comment="python-idle is &lt;2.6.9-40.21.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585833" version="1" comment="python-tk is &lt;2.6.9-40.21.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585834" version="1" comment="python-x86 is &lt;2.6.9-40.21.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585835" version="1" comment="python-xml is &lt;2.6.9-40.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585836" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.24.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585837" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.24.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585838" version="1" comment="python is &lt;2.6.9-40.24.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585839" version="1" comment="python-32bit is &lt;2.6.9-40.24.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585840" version="1" comment="python-base is &lt;2.6.9-40.24.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585841" version="1" comment="python-base-32bit is &lt;2.6.9-40.24.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585842" version="1" comment="python-curses is &lt;2.6.9-40.24.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585843" version="1" comment="python-demo is &lt;2.6.9-40.24.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585844" version="1" comment="python-gdbm is &lt;2.6.9-40.24.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585845" version="1" comment="python-idle is &lt;2.6.9-40.24.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585846" version="1" comment="python-tk is &lt;2.6.9-40.24.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585847" version="1" comment="python-xml is &lt;2.6.9-40.24.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585848" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585849" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.29.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585850" version="1" comment="python is &lt;2.6.9-40.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585851" version="1" comment="python-32bit is &lt;2.6.9-40.29.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585852" version="1" comment="python-base is &lt;2.6.9-40.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585853" version="1" comment="python-base-32bit is &lt;2.6.9-40.29.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585854" version="1" comment="python-curses is &lt;2.6.9-40.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585855" version="1" comment="python-demo is &lt;2.6.9-40.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585856" version="1" comment="python-gdbm is &lt;2.6.9-40.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585857" version="1" comment="python-idle is &lt;2.6.9-40.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585858" version="1" comment="python-tk is &lt;2.6.9-40.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585859" version="1" comment="python-xml is &lt;2.6.9-40.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585860" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.32.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585861" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585862" version="1" comment="python is &lt;2.6.9-40.32.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585863" version="1" comment="python-32bit is &lt;2.6.9-40.32.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585864" version="1" comment="python-base is &lt;2.6.9-40.32.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585865" version="1" comment="python-base-32bit is &lt;2.6.9-40.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585866" version="1" comment="python-curses is &lt;2.6.9-40.32.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585867" version="1" comment="python-demo is &lt;2.6.9-40.32.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585868" version="1" comment="python-gdbm is &lt;2.6.9-40.32.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585869" version="1" comment="python-idle is &lt;2.6.9-40.32.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585870" version="1" comment="python-tk is &lt;2.6.9-40.32.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585871" version="1" comment="python-xml is &lt;2.6.9-40.32.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585872" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.35.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585873" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585874" version="1" comment="python is &lt;2.6.9-40.35.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585875" version="1" comment="python-32bit is &lt;2.6.9-40.35.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585876" version="1" comment="python-base is &lt;2.6.9-40.35.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585877" version="1" comment="python-base-32bit is &lt;2.6.9-40.35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585878" version="1" comment="python-curses is &lt;2.6.9-40.35.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585879" version="1" comment="python-demo is &lt;2.6.9-40.35.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585880" version="1" comment="python-gdbm is &lt;2.6.9-40.35.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585881" version="1" comment="python-idle is &lt;2.6.9-40.35.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585882" version="1" comment="python-tk is &lt;2.6.9-40.35.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585883" version="1" comment="python-xml is &lt;2.6.9-40.35.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585884" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.48.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585885" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.48.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585886" version="1" comment="python is &lt;2.6.9-40.48.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585887" version="1" comment="python-32bit is &lt;2.6.9-40.48.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585888" version="1" comment="python-base is &lt;2.6.9-40.48.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585889" version="1" comment="python-base-32bit is &lt;2.6.9-40.48.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585890" version="1" comment="python-curses is &lt;2.6.9-40.48.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585891" version="1" comment="python-demo is &lt;2.6.9-40.48.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585892" version="1" comment="python-gdbm is &lt;2.6.9-40.48.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585893" version="1" comment="python-idle is &lt;2.6.9-40.48.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585894" version="1" comment="python-tk is &lt;2.6.9-40.48.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585895" version="1" comment="python-xml is &lt;2.6.9-40.48.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585896" version="1" comment="python-numpy is &lt;1.8.0-6.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585897" version="1" comment="quagga is &lt;0.99.15-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585898" version="1" comment="quagga is &lt;0.99.15-0.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585899" version="1" comment="quagga is &lt;0.99.15-0.24.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585900" version="1" comment="quagga is &lt;0.99.15-0.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585901" version="1" comment="quagga is &lt;0.99.15-0.30.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585902" version="1" comment="rsync is &lt;3.0.4-2.52.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585903" version="1" comment="rsync is &lt;3.0.4-2.53.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585904" version="1" comment="rsync is &lt;3.0.4-2.53.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585905" version="1" comment="ruby is &lt;1.8.7.p357-0.9.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565297" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565301" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585906" version="1" comment="rzsz is &lt;0.12.21~rc-936.3.1 for i586,ia64,ppc64,s390,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585907" version="1" comment="ldapsmb is &lt;1.34b-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585908" version="1" comment="libldb1 is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585909" version="1" comment="libsmbclient0 is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585910" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-67.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585911" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-67.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585912" version="1" comment="libtalloc2 is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585913" version="1" comment="libtalloc2-32bit is &lt;3.6.3-67.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585914" version="1" comment="libtalloc2-x86 is &lt;3.6.3-67.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585915" version="1" comment="libtdb1 is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585916" version="1" comment="libtdb1-32bit is &lt;3.6.3-67.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585917" version="1" comment="libtdb1-x86 is &lt;3.6.3-67.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585918" version="1" comment="libtevent0 is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585919" version="1" comment="libtevent0-32bit is &lt;3.6.3-67.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585920" version="1" comment="libtevent0-x86 is &lt;3.6.3-67.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585921" version="1" comment="libwbclient0 is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585922" version="1" comment="libwbclient0-32bit is &lt;3.6.3-67.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585923" version="1" comment="libwbclient0-x86 is &lt;3.6.3-67.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585924" version="1" comment="samba is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585925" version="1" comment="samba-32bit is &lt;3.6.3-67.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585926" version="1" comment="samba-client is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585927" version="1" comment="samba-client-32bit is &lt;3.6.3-67.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585928" version="1" comment="samba-client-x86 is &lt;3.6.3-67.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585929" version="1" comment="samba-krb-printing is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585930" version="1" comment="samba-winbind is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585931" version="1" comment="samba-winbind-32bit is &lt;3.6.3-67.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585932" version="1" comment="samba-winbind-x86 is &lt;3.6.3-67.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585933" version="1" comment="samba-x86 is &lt;3.6.3-67.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585934" version="1" comment="ldapsmb is &lt;1.34b-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585935" version="1" comment="libldb1 is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585936" version="1" comment="libsmbclient0 is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585937" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-76.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585938" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-76.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585939" version="1" comment="libtalloc2 is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585940" version="1" comment="libtalloc2-32bit is &lt;3.6.3-76.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585941" version="1" comment="libtalloc2-x86 is &lt;3.6.3-76.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585942" version="1" comment="libtdb1 is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585943" version="1" comment="libtdb1-32bit is &lt;3.6.3-76.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585944" version="1" comment="libtdb1-x86 is &lt;3.6.3-76.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585945" version="1" comment="libtevent0 is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585946" version="1" comment="libtevent0-32bit is &lt;3.6.3-76.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585947" version="1" comment="libtevent0-x86 is &lt;3.6.3-76.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585948" version="1" comment="libwbclient0 is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585949" version="1" comment="libwbclient0-32bit is &lt;3.6.3-76.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585950" version="1" comment="libwbclient0-x86 is &lt;3.6.3-76.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585951" version="1" comment="samba is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585952" version="1" comment="samba-32bit is &lt;3.6.3-76.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585953" version="1" comment="samba-client is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585954" version="1" comment="samba-client-32bit is &lt;3.6.3-76.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585955" version="1" comment="samba-client-x86 is &lt;3.6.3-76.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585956" version="1" comment="samba-krb-printing is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585957" version="1" comment="samba-winbind is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585958" version="1" comment="samba-winbind-32bit is &lt;3.6.3-76.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585959" version="1" comment="samba-winbind-x86 is &lt;3.6.3-76.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585960" version="1" comment="samba-x86 is &lt;3.6.3-76.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585961" version="1" comment="ldapsmb is &lt;1.34b-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585962" version="1" comment="libldb1 is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585963" version="1" comment="libsmbclient0 is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585964" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-84.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585965" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-84.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585966" version="1" comment="libtalloc2 is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585967" version="1" comment="libtalloc2-32bit is &lt;3.6.3-84.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585968" version="1" comment="libtalloc2-x86 is &lt;3.6.3-84.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585969" version="1" comment="libtdb1 is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585970" version="1" comment="libtdb1-32bit is &lt;3.6.3-84.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585971" version="1" comment="libtdb1-x86 is &lt;3.6.3-84.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585972" version="1" comment="libtevent0 is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585973" version="1" comment="libtevent0-32bit is &lt;3.6.3-84.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585974" version="1" comment="libtevent0-x86 is &lt;3.6.3-84.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585975" version="1" comment="libwbclient0 is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585976" version="1" comment="libwbclient0-32bit is &lt;3.6.3-84.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585977" version="1" comment="libwbclient0-x86 is &lt;3.6.3-84.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585978" version="1" comment="samba is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585979" version="1" comment="samba-32bit is &lt;3.6.3-84.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585980" version="1" comment="samba-client is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585981" version="1" comment="samba-client-32bit is &lt;3.6.3-84.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585982" version="1" comment="samba-client-x86 is &lt;3.6.3-84.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585983" version="1" comment="samba-krb-printing is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585984" version="1" comment="samba-winbind is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585985" version="1" comment="samba-winbind-32bit is &lt;3.6.3-84.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585986" version="1" comment="samba-winbind-x86 is &lt;3.6.3-84.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585987" version="1" comment="samba-x86 is &lt;3.6.3-84.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585988" version="1" comment="ldapsmb is &lt;1.34b-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585989" version="1" comment="libldb1 is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585990" version="1" comment="libsmbclient0 is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585991" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-87.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585992" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-87.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585993" version="1" comment="libtalloc2 is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585994" version="1" comment="libtalloc2-32bit is &lt;3.6.3-87.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585995" version="1" comment="libtalloc2-x86 is &lt;3.6.3-87.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585996" version="1" comment="libtdb1 is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585997" version="1" comment="libtdb1-32bit is &lt;3.6.3-87.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585998" version="1" comment="libtdb1-x86 is &lt;3.6.3-87.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585999" version="1" comment="libtevent0 is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586000" version="1" comment="libtevent0-32bit is &lt;3.6.3-87.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586001" version="1" comment="libtevent0-x86 is &lt;3.6.3-87.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586002" version="1" comment="libwbclient0 is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586003" version="1" comment="libwbclient0-32bit is &lt;3.6.3-87.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586004" version="1" comment="libwbclient0-x86 is &lt;3.6.3-87.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586005" version="1" comment="samba is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586006" version="1" comment="samba-32bit is &lt;3.6.3-87.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586007" version="1" comment="samba-client is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586008" version="1" comment="samba-client-32bit is &lt;3.6.3-87.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586009" version="1" comment="samba-client-x86 is &lt;3.6.3-87.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586010" version="1" comment="samba-krb-printing is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586011" version="1" comment="samba-winbind is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586012" version="1" comment="samba-winbind-32bit is &lt;3.6.3-87.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586013" version="1" comment="samba-winbind-x86 is &lt;3.6.3-87.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586014" version="1" comment="samba-x86 is &lt;3.6.3-87.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586015" version="1" comment="ldapsmb is &lt;1.34b-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586016" version="1" comment="libldb1 is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586017" version="1" comment="libsmbclient0 is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586018" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-90.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586019" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-90.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586020" version="1" comment="libtalloc2 is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586021" version="1" comment="libtalloc2-32bit is &lt;3.6.3-90.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586022" version="1" comment="libtalloc2-x86 is &lt;3.6.3-90.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586023" version="1" comment="libtdb1 is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586024" version="1" comment="libtdb1-32bit is &lt;3.6.3-90.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586025" version="1" comment="libtdb1-x86 is &lt;3.6.3-90.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586026" version="1" comment="libtevent0 is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586027" version="1" comment="libtevent0-32bit is &lt;3.6.3-90.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586028" version="1" comment="libtevent0-x86 is &lt;3.6.3-90.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586029" version="1" comment="libwbclient0 is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586030" version="1" comment="libwbclient0-32bit is &lt;3.6.3-90.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586031" version="1" comment="libwbclient0-x86 is &lt;3.6.3-90.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586032" version="1" comment="samba is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586033" version="1" comment="samba-32bit is &lt;3.6.3-90.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586034" version="1" comment="samba-client is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586035" version="1" comment="samba-client-32bit is &lt;3.6.3-90.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586036" version="1" comment="samba-client-x86 is &lt;3.6.3-90.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586037" version="1" comment="samba-krb-printing is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586038" version="1" comment="samba-winbind is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586039" version="1" comment="samba-winbind-32bit is &lt;3.6.3-90.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586040" version="1" comment="samba-winbind-x86 is &lt;3.6.3-90.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586041" version="1" comment="samba-x86 is &lt;3.6.3-90.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586042" version="1" comment="ldapsmb is &lt;1.34b-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586043" version="1" comment="libldb1 is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586044" version="1" comment="libsmbclient0 is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586045" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-93.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586046" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-93.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586047" version="1" comment="libtalloc2 is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586048" version="1" comment="libtalloc2-32bit is &lt;3.6.3-93.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586049" version="1" comment="libtalloc2-x86 is &lt;3.6.3-93.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586050" version="1" comment="libtdb1 is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586051" version="1" comment="libtdb1-32bit is &lt;3.6.3-93.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586052" version="1" comment="libtdb1-x86 is &lt;3.6.3-93.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586053" version="1" comment="libtevent0 is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586054" version="1" comment="libtevent0-32bit is &lt;3.6.3-93.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586055" version="1" comment="libtevent0-x86 is &lt;3.6.3-93.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586056" version="1" comment="libwbclient0 is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586057" version="1" comment="libwbclient0-32bit is &lt;3.6.3-93.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586058" version="1" comment="libwbclient0-x86 is &lt;3.6.3-93.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586059" version="1" comment="samba is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586060" version="1" comment="samba-32bit is &lt;3.6.3-93.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586061" version="1" comment="samba-client is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586062" version="1" comment="samba-client-32bit is &lt;3.6.3-93.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586063" version="1" comment="samba-client-x86 is &lt;3.6.3-93.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586064" version="1" comment="samba-krb-printing is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586065" version="1" comment="samba-winbind is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586066" version="1" comment="samba-winbind-32bit is &lt;3.6.3-93.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586067" version="1" comment="samba-winbind-x86 is &lt;3.6.3-93.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586068" version="1" comment="samba-x86 is &lt;3.6.3-93.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586069" version="1" comment="ldapsmb is &lt;1.34b-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586070" version="1" comment="libldb1 is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586071" version="1" comment="libsmbclient0 is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586072" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586073" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-94.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586074" version="1" comment="libtalloc2 is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586075" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586076" version="1" comment="libtalloc2-x86 is &lt;3.6.3-94.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586077" version="1" comment="libtdb1 is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586078" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586079" version="1" comment="libtdb1-x86 is &lt;3.6.3-94.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586080" version="1" comment="libtevent0 is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586081" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586082" version="1" comment="libtevent0-x86 is &lt;3.6.3-94.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586083" version="1" comment="libwbclient0 is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586084" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586085" version="1" comment="libwbclient0-x86 is &lt;3.6.3-94.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586086" version="1" comment="samba is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586087" version="1" comment="samba-32bit is &lt;3.6.3-94.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586088" version="1" comment="samba-client is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586089" version="1" comment="samba-client-32bit is &lt;3.6.3-94.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586090" version="1" comment="samba-client-x86 is &lt;3.6.3-94.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586091" version="1" comment="samba-krb-printing is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586092" version="1" comment="samba-winbind is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586093" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586094" version="1" comment="samba-winbind-x86 is &lt;3.6.3-94.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586095" version="1" comment="samba-x86 is &lt;3.6.3-94.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586096" version="1" comment="ldapsmb is &lt;1.34b-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586097" version="1" comment="libldb1 is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586098" version="1" comment="libsmbclient0 is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586099" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586100" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-94.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586101" version="1" comment="libtalloc2 is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586102" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586103" version="1" comment="libtalloc2-x86 is &lt;3.6.3-94.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586104" version="1" comment="libtdb1 is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586105" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586106" version="1" comment="libtdb1-x86 is &lt;3.6.3-94.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586107" version="1" comment="libtevent0 is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586108" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586109" version="1" comment="libtevent0-x86 is &lt;3.6.3-94.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586110" version="1" comment="libwbclient0 is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586111" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586112" version="1" comment="libwbclient0-x86 is &lt;3.6.3-94.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586113" version="1" comment="samba is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586114" version="1" comment="samba-32bit is &lt;3.6.3-94.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586115" version="1" comment="samba-client is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586116" version="1" comment="samba-client-32bit is &lt;3.6.3-94.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586117" version="1" comment="samba-client-x86 is &lt;3.6.3-94.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586118" version="1" comment="samba-krb-printing is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586119" version="1" comment="samba-winbind is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586120" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586121" version="1" comment="samba-winbind-x86 is &lt;3.6.3-94.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586122" version="1" comment="samba-x86 is &lt;3.6.3-94.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586123" version="1" comment="ldapsmb is &lt;1.34b-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586124" version="1" comment="libldb1 is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586125" version="1" comment="libsmbclient0 is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586126" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586127" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-94.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586128" version="1" comment="libtalloc2 is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586129" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586130" version="1" comment="libtalloc2-x86 is &lt;3.6.3-94.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586131" version="1" comment="libtdb1 is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586132" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586133" version="1" comment="libtdb1-x86 is &lt;3.6.3-94.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586134" version="1" comment="libtevent0 is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586135" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586136" version="1" comment="libtevent0-x86 is &lt;3.6.3-94.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586137" version="1" comment="libwbclient0 is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586138" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586139" version="1" comment="libwbclient0-x86 is &lt;3.6.3-94.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586140" version="1" comment="samba is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586141" version="1" comment="samba-32bit is &lt;3.6.3-94.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586142" version="1" comment="samba-client is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586143" version="1" comment="samba-client-32bit is &lt;3.6.3-94.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586144" version="1" comment="samba-client-x86 is &lt;3.6.3-94.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586145" version="1" comment="samba-krb-printing is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586146" version="1" comment="samba-winbind is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586147" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586148" version="1" comment="samba-winbind-x86 is &lt;3.6.3-94.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586149" version="1" comment="samba-x86 is &lt;3.6.3-94.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586150" version="1" comment="ldapsmb is &lt;1.34b-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586151" version="1" comment="libldb1 is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586152" version="1" comment="libsmbclient0 is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586153" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.14.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586154" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-94.14.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586155" version="1" comment="libtalloc2 is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586156" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.14.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586157" version="1" comment="libtalloc2-x86 is &lt;3.6.3-94.14.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586158" version="1" comment="libtdb1 is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586159" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.14.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586160" version="1" comment="libtdb1-x86 is &lt;3.6.3-94.14.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586161" version="1" comment="libtevent0 is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586162" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.14.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586163" version="1" comment="libtevent0-x86 is &lt;3.6.3-94.14.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586164" version="1" comment="libwbclient0 is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586165" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.14.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586166" version="1" comment="libwbclient0-x86 is &lt;3.6.3-94.14.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586167" version="1" comment="samba is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586168" version="1" comment="samba-32bit is &lt;3.6.3-94.14.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586169" version="1" comment="samba-client is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586170" version="1" comment="samba-client-32bit is &lt;3.6.3-94.14.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586171" version="1" comment="samba-client-x86 is &lt;3.6.3-94.14.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586172" version="1" comment="samba-krb-printing is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586173" version="1" comment="samba-winbind is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586174" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.14.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586175" version="1" comment="samba-winbind-x86 is &lt;3.6.3-94.14.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586176" version="1" comment="samba-x86 is &lt;3.6.3-94.14.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586177" version="1" comment="ldapsmb is &lt;1.34b-94.19.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586178" version="1" comment="libldb1 is &lt;3.6.3-94.19.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586179" version="1" comment="libsmbclient0 is &lt;3.6.3-94.19.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586180" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.19.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586181" version="1" comment="libtalloc2 is &lt;3.6.3-94.19.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586182" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.19.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586183" version="1" comment="libtdb1 is &lt;3.6.3-94.19.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586184" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.19.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586185" version="1" comment="libtevent0 is &lt;3.6.3-94.19.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586186" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.19.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586187" version="1" comment="libwbclient0 is &lt;3.6.3-94.19.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586188" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.19.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586189" version="1" comment="samba is &lt;3.6.3-94.19.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586190" version="1" comment="samba-32bit is &lt;3.6.3-94.19.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586191" version="1" comment="samba-client is &lt;3.6.3-94.19.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586192" version="1" comment="samba-client-32bit is &lt;3.6.3-94.19.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586193" version="1" comment="samba-krb-printing is &lt;3.6.3-94.19.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586194" version="1" comment="samba-winbind is &lt;3.6.3-94.19.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586195" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.19.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586196" version="1" comment="ldapsmb is &lt;1.34b-94.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586197" version="1" comment="libldb1 is &lt;3.6.3-94.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586198" version="1" comment="libsmbclient0 is &lt;3.6.3-94.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586199" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586200" version="1" comment="libtalloc2 is &lt;3.6.3-94.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586201" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586202" version="1" comment="libtdb1 is &lt;3.6.3-94.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586203" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586204" version="1" comment="libtevent0 is &lt;3.6.3-94.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586205" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586206" version="1" comment="libwbclient0 is &lt;3.6.3-94.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586207" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586208" version="1" comment="samba is &lt;3.6.3-94.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586209" version="1" comment="samba-32bit is &lt;3.6.3-94.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586210" version="1" comment="samba-client is &lt;3.6.3-94.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586211" version="1" comment="samba-client-32bit is &lt;3.6.3-94.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586212" version="1" comment="samba-krb-printing is &lt;3.6.3-94.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586213" version="1" comment="samba-winbind is &lt;3.6.3-94.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586214" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586215" version="1" comment="ldapsmb is &lt;1.34b-94.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586216" version="1" comment="libldb1 is &lt;3.6.3-94.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586217" version="1" comment="libsmbclient0 is &lt;3.6.3-94.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586218" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586219" version="1" comment="libtalloc2 is &lt;3.6.3-94.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586220" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586221" version="1" comment="libtdb1 is &lt;3.6.3-94.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586222" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586223" version="1" comment="libtevent0 is &lt;3.6.3-94.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586224" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586225" version="1" comment="libwbclient0 is &lt;3.6.3-94.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586226" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586227" version="1" comment="samba is &lt;3.6.3-94.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586228" version="1" comment="samba-32bit is &lt;3.6.3-94.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586229" version="1" comment="samba-client is &lt;3.6.3-94.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586230" version="1" comment="samba-client-32bit is &lt;3.6.3-94.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586231" version="1" comment="samba-krb-printing is &lt;3.6.3-94.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586232" version="1" comment="samba-winbind is &lt;3.6.3-94.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586233" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586234" version="1" comment="ldapsmb is &lt;1.34b-94.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586235" version="1" comment="libldb1 is &lt;3.6.3-94.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586236" version="1" comment="libsmbclient0 is &lt;3.6.3-94.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586237" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586238" version="1" comment="libtalloc2 is &lt;3.6.3-94.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586239" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586240" version="1" comment="libtdb1 is &lt;3.6.3-94.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586241" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586242" version="1" comment="libtevent0 is &lt;3.6.3-94.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586243" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586244" version="1" comment="libwbclient0 is &lt;3.6.3-94.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586245" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586246" version="1" comment="samba is &lt;3.6.3-94.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586247" version="1" comment="samba-32bit is &lt;3.6.3-94.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586248" version="1" comment="samba-client is &lt;3.6.3-94.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586249" version="1" comment="samba-client-32bit is &lt;3.6.3-94.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586250" version="1" comment="samba-krb-printing is &lt;3.6.3-94.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586251" version="1" comment="samba-winbind is &lt;3.6.3-94.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586252" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586253" version="1" comment="ldapsmb is &lt;1.34b-94.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586254" version="1" comment="libldb1 is &lt;3.6.3-94.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586255" version="1" comment="libsmbclient0 is &lt;3.6.3-94.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586256" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586257" version="1" comment="libtalloc2 is &lt;3.6.3-94.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586258" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586259" version="1" comment="libtdb1 is &lt;3.6.3-94.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586260" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586261" version="1" comment="libtevent0 is &lt;3.6.3-94.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586262" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586263" version="1" comment="libwbclient0 is &lt;3.6.3-94.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586264" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586265" version="1" comment="samba is &lt;3.6.3-94.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586266" version="1" comment="samba-32bit is &lt;3.6.3-94.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586267" version="1" comment="samba-client is &lt;3.6.3-94.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586268" version="1" comment="samba-client-32bit is &lt;3.6.3-94.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586269" version="1" comment="samba-krb-printing is &lt;3.6.3-94.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586270" version="1" comment="samba-winbind is &lt;3.6.3-94.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586271" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586272" version="1" comment="libtevent0-x86 is &lt;3.6.3-64.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586273" version="1" comment="sane-backends is &lt;1.0.20-7.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586274" version="1" comment="sblim-sfcb is &lt;1.3.11-0.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586275" version="1" comment="socat is &lt;1.7.0.0-1.18.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586276" version="1" comment="libspice-server1 is &lt;0.12.4-5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586277" version="1" comment="libspice-server1 is &lt;0.12.4-8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586278" version="1" comment="libspice-server1 is &lt;0.12.4-11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586279" version="1" comment="libspice-server1 is &lt;0.12.4-15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586280" version="1" comment="libspice-server1 is &lt;0.12.4-18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586281" version="1" comment="libspice-server1 is &lt;0.12.4-21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586282" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586283" version="1" comment="libsqlite3-0-32bit is &lt;3.7.6.3-1.4.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586284" version="1" comment="libsqlite3-0-x86 is &lt;3.7.6.3-1.4.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586285" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586286" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.7.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586287" version="1" comment="libsqlite3-0-32bit is &lt;3.7.6.3-1.4.7.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586288" version="1" comment="libsqlite3-0-x86 is &lt;3.7.6.3-1.4.7.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586289" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.7.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586290" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.7.9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586291" version="1" comment="libsqlite3-0-32bit is &lt;3.7.6.3-1.4.7.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586292" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.7.9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586293" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.7.12.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586294" version="1" comment="libsqlite3-0-32bit is &lt;3.7.6.3-1.4.7.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586295" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.7.12.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626556" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.7.15.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626557" version="1" comment="libsqlite3-0-32bit is &lt;3.7.6.3-1.4.7.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626558" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.7.15.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586296" version="1" comment="squid is &lt;2.7.STABLE5-2.12.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670263" version="1" comment="squid is &lt;2.7.STABLE5-2.12.30.6.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586297" version="1" comment="squid3 is &lt;3.1.23-8.16.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586298" version="1" comment="squid3 is &lt;3.1.23-8.16.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586299" version="1" comment="squid3 is &lt;3.1.23-8.16.37.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586300" version="1" comment="squid3 is &lt;3.1.23-8.16.37.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586301" version="1" comment="squid3 is &lt;3.1.23-8.16.37.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586302" version="1" comment="squid3 is &lt;3.1.23-8.16.37.12.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586303" version="1" comment="squid3 is &lt;3.1.23-8.16.37.15.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671880" version="1" comment="squid3 is &lt;3.1.23-8.16.37.18.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586304" version="1" comment="squidGuard is &lt;1.4-13.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586305" version="1" comment="squidGuard-doc is &lt;1.4-13.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586306" version="1" comment="strongswan is &lt;4.4.0-6.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586307" version="1" comment="strongswan-doc is &lt;4.4.0-6.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586308" version="1" comment="strongswan is &lt;4.4.0-6.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586309" version="1" comment="strongswan-doc is &lt;4.4.0-6.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586310" version="1" comment="strongswan is &lt;4.4.0-6.36.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586311" version="1" comment="strongswan-doc is &lt;4.4.0-6.36.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652842" version="1" comment="strongswan is &lt;4.4.0-6.36.9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652843" version="1" comment="strongswan-doc is &lt;4.4.0-6.36.9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664949" version="1" comment="strongswan is &lt;4.4.0-6.36.12.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664950" version="1" comment="strongswan-doc is &lt;4.4.0-6.36.12.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586312" version="1" comment="sudo is &lt;1.7.6p2-0.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586313" version="1" comment="sudo is &lt;1.7.6p2-0.30.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586314" version="1" comment="syslog-ng is &lt;2.0.9-27.34.40.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586315" version="1" comment="tar is &lt;1.26-1.2.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586316" version="1" comment="tar is &lt;1.27.1-14.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586317" version="1" comment="tboot is &lt;20120115_1.7.0-0.5.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586318" version="1" comment="tcpdump is &lt;3.9.8-1.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586319" version="1" comment="tcpdump is &lt;3.9.8-1.30.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594222" version="1" comment="tcpdump is &lt;3.9.8-1.30.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586320" version="1" comment="tcpdump is &lt;3.9.8-1.30.13.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668245" version="1" comment="tcpdump is &lt;3.9.8-1.30.19.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586321" version="1" comment="libtiff3 is &lt;3.8.2-141.163.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586322" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.163.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586323" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.163.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586324" version="1" comment="tiff is &lt;3.8.2-141.163.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586325" version="1" comment="libtiff3 is &lt;3.8.2-141.168.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586326" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.168.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586327" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.168.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586328" version="1" comment="tiff is &lt;3.8.2-141.168.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586329" version="1" comment="libtiff3 is &lt;3.8.2-141.169.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586330" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586331" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.169.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586332" version="1" comment="tiff is &lt;3.8.2-141.169.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586333" version="1" comment="libtiff3 is &lt;3.8.2-141.169.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586334" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586335" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.169.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586336" version="1" comment="tiff is &lt;3.8.2-141.169.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586337" version="1" comment="libtiff3 is &lt;3.8.2-141.169.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586338" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586339" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.169.9.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586340" version="1" comment="tiff is &lt;3.8.2-141.169.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586341" version="1" comment="libtiff3 is &lt;3.8.2-141.169.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586342" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586343" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.169.16.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586344" version="1" comment="tiff is &lt;3.8.2-141.169.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586345" version="1" comment="libtiff3 is &lt;3.8.2-141.169.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586346" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586347" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.169.19.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586348" version="1" comment="tiff is &lt;3.8.2-141.169.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586349" version="1" comment="libtiff3 is &lt;3.8.2-141.169.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586350" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.22.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586351" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.169.22.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586352" version="1" comment="tiff is &lt;3.8.2-141.169.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586353" version="1" comment="libtiff3 is &lt;3.8.2-141.169.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586354" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586355" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.169.26.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586356" version="1" comment="tiff is &lt;3.8.2-141.169.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586357" version="1" comment="libtiff3 is &lt;3.8.2-141.169.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586358" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586359" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.169.31.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586360" version="1" comment="tiff is &lt;3.8.2-141.169.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666467" version="1" comment="libtiff3 is &lt;3.8.2-141.169.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666468" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666469" version="1" comment="tiff is &lt;3.8.2-141.169.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586361" version="1" comment="tightvnc is &lt;1.3.9-81.15.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586362" version="1" comment="tomcat6 is &lt;6.0.41-0.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586363" version="1" comment="tomcat6-admin-webapps is &lt;6.0.41-0.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586364" version="1" comment="tomcat6-docs-webapp is &lt;6.0.41-0.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586365" version="1" comment="tomcat6-javadoc is &lt;6.0.41-0.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586366" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.41-0.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586367" version="1" comment="tomcat6-lib is &lt;6.0.41-0.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586368" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.41-0.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586369" version="1" comment="tomcat6-webapps is &lt;6.0.41-0.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586370" version="1" comment="transfig is &lt;3.2.5-160.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651177" version="1" comment="transfig is &lt;3.2.8a-1.160.13.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653707" version="1" comment="transfig is &lt;3.2.8b-160.16.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586371" version="1" comment="unrar is &lt;3.80.2-4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586372" version="1" comment="unrar is &lt;5.6.1-5.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586373" version="1" comment="unzip is &lt;6.00-11.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586374" version="1" comment="unzip is &lt;6.00-11.18.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586375" version="1" comment="unzip is &lt;6.00-11.18.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586376" version="1" comment="gvim is &lt;7.2-8.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586377" version="1" comment="vim is &lt;7.2-8.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586378" version="1" comment="vim-base is &lt;7.2-8.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586379" version="1" comment="vim-data is &lt;7.2-8.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586380" version="1" comment="gvim is &lt;7.2-8.20.8 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586381" version="1" comment="vim is &lt;7.2-8.20.8 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586382" version="1" comment="vim-base is &lt;7.2-8.20.8 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586383" version="1" comment="vim-data is &lt;7.2-8.20.8 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586384" version="1" comment="gvim is &lt;7.2-8.21.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586385" version="1" comment="vim is &lt;7.2-8.21.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586386" version="1" comment="vim-base is &lt;7.2-8.21.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586387" version="1" comment="vim-data is &lt;7.2-8.21.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586388" version="1" comment="gvim is &lt;7.2-8.21.6.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586389" version="1" comment="vim is &lt;7.2-8.21.6.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586390" version="1" comment="vim-base is &lt;7.2-8.21.6.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586391" version="1" comment="vim-data is &lt;7.2-8.21.6.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586392" version="1" comment="w3m is &lt;0.5.3.git20161120-4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586393" version="1" comment="libwavpack1 is &lt;4.50.1-1.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586394" version="1" comment="libwavpack1 is &lt;4.50.1-1.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586395" version="1" comment="libwavpack1 is &lt;4.50.1-1.33.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586396" version="1" comment="wget is &lt;1.11.4-1.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586397" version="1" comment="wget is &lt;1.11.4-1.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586398" version="1" comment="wget is &lt;1.11.4-1.41.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586399" version="1" comment="wireshark is &lt;1.12.11-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586400" version="1" comment="wireshark is &lt;1.12.13-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586401" version="1" comment="wireshark is &lt;2.0.12-36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586402" version="1" comment="wireshark-gtk is &lt;2.0.12-36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586403" version="1" comment="wireshark is &lt;2.0.13-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586404" version="1" comment="wireshark-gtk is &lt;2.0.13-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586405" version="1" comment="wireshark is &lt;2.0.14-40.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586406" version="1" comment="wireshark-gtk is &lt;2.0.14-40.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565487" version="1" comment="libsmi is &lt;0.4.5-2.7.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586407" version="1" comment="libwireshark8 is &lt;2.2.11-40.14.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586408" version="1" comment="libwiretap6 is &lt;2.2.11-40.14.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586409" version="1" comment="libwscodecs1 is &lt;2.2.11-40.14.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586410" version="1" comment="libwsutil7 is &lt;2.2.11-40.14.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565492" version="1" comment="portaudio is &lt;19-234.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586411" version="1" comment="wireshark is &lt;2.2.11-40.14.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586412" version="1" comment="wireshark-gtk is &lt;2.2.11-40.14.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586413" version="1" comment="libwireshark8 is &lt;2.2.12-40.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586414" version="1" comment="libwiretap6 is &lt;2.2.12-40.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586415" version="1" comment="libwscodecs1 is &lt;2.2.12-40.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586416" version="1" comment="libwsutil7 is &lt;2.2.12-40.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586417" version="1" comment="wireshark is &lt;2.2.12-40.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586418" version="1" comment="wireshark-gtk is &lt;2.2.12-40.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586419" version="1" comment="libwireshark8 is &lt;2.2.13-40.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586420" version="1" comment="libwiretap6 is &lt;2.2.13-40.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586421" version="1" comment="libwscodecs1 is &lt;2.2.13-40.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586422" version="1" comment="libwsutil7 is &lt;2.2.13-40.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586423" version="1" comment="wireshark is &lt;2.2.13-40.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586424" version="1" comment="wireshark-gtk is &lt;2.2.13-40.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586425" version="1" comment="libwireshark8 is &lt;2.2.14-40.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586426" version="1" comment="libwiretap6 is &lt;2.2.14-40.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586427" version="1" comment="libwscodecs1 is &lt;2.2.14-40.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586428" version="1" comment="libwsutil7 is &lt;2.2.14-40.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586429" version="1" comment="wireshark is &lt;2.2.14-40.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586430" version="1" comment="wireshark-gtk is &lt;2.2.14-40.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586431" version="1" comment="libwireshark8 is &lt;2.2.16-40.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586432" version="1" comment="libwiretap6 is &lt;2.2.16-40.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586433" version="1" comment="libwscodecs1 is &lt;2.2.16-40.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586434" version="1" comment="libwsutil7 is &lt;2.2.16-40.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586435" version="1" comment="wireshark is &lt;2.2.16-40.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586436" version="1" comment="wireshark-gtk is &lt;2.2.16-40.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586437" version="1" comment="libwireshark8 is &lt;2.2.17-40.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586438" version="1" comment="libwiretap6 is &lt;2.2.17-40.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586439" version="1" comment="libwscodecs1 is &lt;2.2.17-40.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586440" version="1" comment="libwsutil7 is &lt;2.2.17-40.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586441" version="1" comment="wireshark is &lt;2.2.17-40.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586442" version="1" comment="wireshark-gtk is &lt;2.2.17-40.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586443" version="1" comment="wpa_supplicant is &lt;0.7.1-6.18.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586444" version="1" comment="wpa_supplicant is &lt;0.7.1-6.18.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567451" version="1" comment="xen is &lt;4.4.2_10-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567452" version="1" comment="xen-doc-html is &lt;4.4.2_10-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567453" version="1" comment="xen-kmp-default is &lt;4.4.2_10_3.0.101_63-5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567454" version="1" comment="xen-kmp-pae is &lt;4.4.2_10_3.0.101_63-5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567455" version="1" comment="xen-libs is &lt;4.4.2_10-5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567456" version="1" comment="xen-libs-32bit is &lt;4.4.2_10-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567457" version="1" comment="xen-tools is &lt;4.4.2_10-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567458" version="1" comment="xen-tools-domU is &lt;4.4.2_10-5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567459" version="1" comment="xen is &lt;4.4.3_02-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567460" version="1" comment="xen-doc-html is &lt;4.4.3_02-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567461" version="1" comment="xen-kmp-default is &lt;4.4.3_02_3.0.101_65-26.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567462" version="1" comment="xen-kmp-pae is &lt;4.4.3_02_3.0.101_65-26.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567463" version="1" comment="xen-libs is &lt;4.4.3_02-26.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567464" version="1" comment="xen-libs-32bit is &lt;4.4.3_02-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567465" version="1" comment="xen-tools is &lt;4.4.3_02-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567466" version="1" comment="xen-tools-domU is &lt;4.4.3_02-26.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567467" version="1" comment="xen is &lt;4.4.4_02-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567468" version="1" comment="xen-doc-html is &lt;4.4.4_02-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567469" version="1" comment="xen-kmp-default is &lt;4.4.4_02_3.0.101_68-32.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567470" version="1" comment="xen-kmp-pae is &lt;4.4.4_02_3.0.101_68-32.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567471" version="1" comment="xen-libs is &lt;4.4.4_02-32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567472" version="1" comment="xen-libs-32bit is &lt;4.4.4_02-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567473" version="1" comment="xen-tools is &lt;4.4.4_02-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567474" version="1" comment="xen-tools-domU is &lt;4.4.4_02-32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586445" version="1" comment="xen is &lt;4.4.4_07-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586446" version="1" comment="xen-doc-html is &lt;4.4.4_07-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586447" version="1" comment="xen-kmp-default is &lt;4.4.4_07_3.0.101_77-37.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586448" version="1" comment="xen-kmp-pae is &lt;4.4.4_07_3.0.101_77-37.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586449" version="1" comment="xen-libs is &lt;4.4.4_07-37.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586450" version="1" comment="xen-libs-32bit is &lt;4.4.4_07-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586451" version="1" comment="xen-tools is &lt;4.4.4_07-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586452" version="1" comment="xen-tools-domU is &lt;4.4.4_07-37.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586453" version="1" comment="xen is &lt;4.4.4_08-40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586454" version="1" comment="xen-doc-html is &lt;4.4.4_08-40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586455" version="1" comment="xen-kmp-default is &lt;4.4.4_08_3.0.101_80-40.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586456" version="1" comment="xen-kmp-pae is &lt;4.4.4_08_3.0.101_80-40.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586457" version="1" comment="xen-libs is &lt;4.4.4_08-40.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586458" version="1" comment="xen-libs-32bit is &lt;4.4.4_08-40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586459" version="1" comment="xen-tools is &lt;4.4.4_08-40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586460" version="1" comment="xen-tools-domU is &lt;4.4.4_08-40.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586461" version="1" comment="xen is &lt;4.4.4_10-43.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586462" version="1" comment="xen-doc-html is &lt;4.4.4_10-43.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586463" version="1" comment="xen-kmp-default is &lt;4.4.4_10_3.0.101_88-43.5 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586464" version="1" comment="xen-kmp-pae is &lt;4.4.4_10_3.0.101_88-43.5 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586465" version="1" comment="xen-libs is &lt;4.4.4_10-43.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586466" version="1" comment="xen-libs-32bit is &lt;4.4.4_10-43.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586467" version="1" comment="xen-tools is &lt;4.4.4_10-43.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586468" version="1" comment="xen-tools-domU is &lt;4.4.4_10-43.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586469" version="1" comment="xen is &lt;4.4.4_12-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586470" version="1" comment="xen-doc-html is &lt;4.4.4_12-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586471" version="1" comment="xen-kmp-default is &lt;4.4.4_12_3.0.101_91-46.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586472" version="1" comment="xen-kmp-pae is &lt;4.4.4_12_3.0.101_91-46.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586473" version="1" comment="xen-libs is &lt;4.4.4_12-46.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586474" version="1" comment="xen-libs-32bit is &lt;4.4.4_12-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586475" version="1" comment="xen-tools is &lt;4.4.4_12-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586476" version="1" comment="xen-tools-domU is &lt;4.4.4_12-46.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586477" version="1" comment="xen is &lt;4.4.4_14-51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586478" version="1" comment="xen-doc-html is &lt;4.4.4_14-51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586479" version="1" comment="xen-kmp-default is &lt;4.4.4_14_3.0.101_94-51.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586480" version="1" comment="xen-kmp-pae is &lt;4.4.4_14_3.0.101_94-51.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586481" version="1" comment="xen-libs is &lt;4.4.4_14-51.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586482" version="1" comment="xen-libs-32bit is &lt;4.4.4_14-51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586483" version="1" comment="xen-tools is &lt;4.4.4_14-51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586484" version="1" comment="xen-tools-domU is &lt;4.4.4_14-51.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586485" version="1" comment="xen is &lt;4.4.4_16-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586486" version="1" comment="xen-doc-html is &lt;4.4.4_16-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586487" version="1" comment="xen-kmp-default is &lt;4.4.4_16_3.0.101_97-54.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586488" version="1" comment="xen-kmp-pae is &lt;4.4.4_16_3.0.101_97-54.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586489" version="1" comment="xen-libs is &lt;4.4.4_16-54.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586490" version="1" comment="xen-libs-32bit is &lt;4.4.4_16-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586491" version="1" comment="xen-tools is &lt;4.4.4_16-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586492" version="1" comment="xen-tools-domU is &lt;4.4.4_16-54.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586493" version="1" comment="xen is &lt;4.4.4_18-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586494" version="1" comment="xen-doc-html is &lt;4.4.4_18-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586495" version="1" comment="xen-kmp-default is &lt;4.4.4_18_3.0.101_97-57.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586496" version="1" comment="xen-kmp-pae is &lt;4.4.4_18_3.0.101_97-57.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586497" version="1" comment="xen-libs is &lt;4.4.4_18-57.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586498" version="1" comment="xen-libs-32bit is &lt;4.4.4_18-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586499" version="1" comment="xen-tools is &lt;4.4.4_18-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586500" version="1" comment="xen-tools-domU is &lt;4.4.4_18-57.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586501" version="1" comment="xen is &lt;4.4.4_20-60.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586502" version="1" comment="xen-doc-html is &lt;4.4.4_20-60.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586503" version="1" comment="xen-kmp-default is &lt;4.4.4_20_3.0.101_104-60.3 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586504" version="1" comment="xen-kmp-pae is &lt;4.4.4_20_3.0.101_104-60.3 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586505" version="1" comment="xen-libs is &lt;4.4.4_20-60.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586506" version="1" comment="xen-libs-32bit is &lt;4.4.4_20-60.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586507" version="1" comment="xen-tools is &lt;4.4.4_20-60.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586508" version="1" comment="xen-tools-domU is &lt;4.4.4_20-60.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586509" version="1" comment="xen is &lt;4.4.4_22-61.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586510" version="1" comment="xen-doc-html is &lt;4.4.4_22-61.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586511" version="1" comment="xen-kmp-default is &lt;4.4.4_22_3.0.101_108.7-61.9.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586512" version="1" comment="xen-kmp-pae is &lt;4.4.4_22_3.0.101_108.7-61.9.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586513" version="1" comment="xen-libs is &lt;4.4.4_22-61.9.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586514" version="1" comment="xen-libs-32bit is &lt;4.4.4_22-61.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586515" version="1" comment="xen-tools is &lt;4.4.4_22-61.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586516" version="1" comment="xen-tools-domU is &lt;4.4.4_22-61.9.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586517" version="1" comment="xen is &lt;4.4.4_24-61.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586518" version="1" comment="xen-doc-html is &lt;4.4.4_24-61.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586519" version="1" comment="xen-kmp-default is &lt;4.4.4_24_3.0.101_108.10-61.12.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586520" version="1" comment="xen-kmp-pae is &lt;4.4.4_24_3.0.101_108.10-61.12.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586521" version="1" comment="xen-libs is &lt;4.4.4_24-61.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586522" version="1" comment="xen-libs-32bit is &lt;4.4.4_24-61.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586523" version="1" comment="xen-tools is &lt;4.4.4_24-61.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586524" version="1" comment="xen-tools-domU is &lt;4.4.4_24-61.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586525" version="1" comment="xen is &lt;4.4.4_26-61.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586526" version="1" comment="xen-doc-html is &lt;4.4.4_26-61.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586527" version="1" comment="xen-kmp-default is &lt;4.4.4_26_3.0.101_108.13-61.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586528" version="1" comment="xen-kmp-pae is &lt;4.4.4_26_3.0.101_108.13-61.17.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586529" version="1" comment="xen-libs is &lt;4.4.4_26-61.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586530" version="1" comment="xen-libs-32bit is &lt;4.4.4_26-61.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586531" version="1" comment="xen-tools is &lt;4.4.4_26-61.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586532" version="1" comment="xen-tools-domU is &lt;4.4.4_26-61.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586533" version="1" comment="xen is &lt;4.4.4_28-61.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586534" version="1" comment="xen-doc-html is &lt;4.4.4_28-61.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586535" version="1" comment="xen-kmp-default is &lt;4.4.4_28_3.0.101_108.35-61.23.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586536" version="1" comment="xen-kmp-pae is &lt;4.4.4_28_3.0.101_108.35-61.23.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586537" version="1" comment="xen-libs is &lt;4.4.4_28-61.23.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586538" version="1" comment="xen-libs-32bit is &lt;4.4.4_28-61.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586539" version="1" comment="xen-tools is &lt;4.4.4_28-61.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586540" version="1" comment="xen-tools-domU is &lt;4.4.4_28-61.23.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586541" version="1" comment="xen is &lt;4.4.4_30-61.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586542" version="1" comment="xen-doc-html is &lt;4.4.4_30-61.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586543" version="1" comment="xen-kmp-default is &lt;4.4.4_30_3.0.101_108.38-61.26.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586544" version="1" comment="xen-kmp-pae is &lt;4.4.4_30_3.0.101_108.38-61.26.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586545" version="1" comment="xen-libs is &lt;4.4.4_30-61.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586546" version="1" comment="xen-libs-32bit is &lt;4.4.4_30-61.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586547" version="1" comment="xen-tools is &lt;4.4.4_30-61.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586548" version="1" comment="xen-tools-domU is &lt;4.4.4_30-61.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586549" version="1" comment="xen is &lt;4.4.4_32-61.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586550" version="1" comment="xen-doc-html is &lt;4.4.4_32-61.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586551" version="1" comment="xen-kmp-default is &lt;4.4.4_32_3.0.101_108.52-61.29.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586552" version="1" comment="xen-kmp-pae is &lt;4.4.4_32_3.0.101_108.52-61.29.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586553" version="1" comment="xen-libs is &lt;4.4.4_32-61.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586554" version="1" comment="xen-libs-32bit is &lt;4.4.4_32-61.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586555" version="1" comment="xen-tools is &lt;4.4.4_32-61.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586556" version="1" comment="xen-tools-domU is &lt;4.4.4_32-61.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586557" version="1" comment="xen is &lt;4.4.4_34-61.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586558" version="1" comment="xen-doc-html is &lt;4.4.4_34-61.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586559" version="1" comment="xen-kmp-default is &lt;4.4.4_34_3.0.101_108.57-61.32.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586560" version="1" comment="xen-kmp-pae is &lt;4.4.4_34_3.0.101_108.57-61.32.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586561" version="1" comment="xen-libs is &lt;4.4.4_34-61.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586562" version="1" comment="xen-libs-32bit is &lt;4.4.4_34-61.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586563" version="1" comment="xen-tools is &lt;4.4.4_34-61.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586564" version="1" comment="xen-tools-domU is &lt;4.4.4_34-61.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586565" version="1" comment="xen is &lt;4.4.4_36-61.37.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586566" version="1" comment="xen-doc-html is &lt;4.4.4_36-61.37.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586567" version="1" comment="xen-kmp-default is &lt;4.4.4_36_3.0.101_108.68-61.37.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586568" version="1" comment="xen-kmp-pae is &lt;4.4.4_36_3.0.101_108.68-61.37.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586569" version="1" comment="xen-libs is &lt;4.4.4_36-61.37.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586570" version="1" comment="xen-libs-32bit is &lt;4.4.4_36-61.37.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586571" version="1" comment="xen-tools is &lt;4.4.4_36-61.37.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586572" version="1" comment="xen-tools-domU is &lt;4.4.4_36-61.37.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586573" version="1" comment="xen is &lt;4.4.4_38-61.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586574" version="1" comment="xen-doc-html is &lt;4.4.4_38-61.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586575" version="1" comment="xen-kmp-default is &lt;4.4.4_38_3.0.101_108.84-61.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586576" version="1" comment="xen-kmp-pae is &lt;4.4.4_38_3.0.101_108.84-61.40.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586577" version="1" comment="xen-libs is &lt;4.4.4_38-61.40.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586578" version="1" comment="xen-libs-32bit is &lt;4.4.4_38-61.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586579" version="1" comment="xen-tools is &lt;4.4.4_38-61.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586580" version="1" comment="xen-tools-domU is &lt;4.4.4_38-61.40.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586581" version="1" comment="xen is &lt;4.4.4_40-61.43.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586582" version="1" comment="xen-doc-html is &lt;4.4.4_40-61.43.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586583" version="1" comment="xen-kmp-default is &lt;4.4.4_40_3.0.101_108.87-61.43.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586584" version="1" comment="xen-kmp-pae is &lt;4.4.4_40_3.0.101_108.87-61.43.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586585" version="1" comment="xen-libs is &lt;4.4.4_40-61.43.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586586" version="1" comment="xen-libs-32bit is &lt;4.4.4_40-61.43.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586587" version="1" comment="xen-tools is &lt;4.4.4_40-61.43.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586588" version="1" comment="xen-tools-domU is &lt;4.4.4_40-61.43.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586589" version="1" comment="xen is &lt;4.4.4_40-61.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586590" version="1" comment="xen-doc-html is &lt;4.4.4_40-61.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586591" version="1" comment="xen-kmp-default is &lt;4.4.4_40_3.0.101_108.90-61.46.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586592" version="1" comment="xen-kmp-pae is &lt;4.4.4_40_3.0.101_108.90-61.46.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586593" version="1" comment="xen-libs is &lt;4.4.4_40-61.46.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586594" version="1" comment="xen-libs-32bit is &lt;4.4.4_40-61.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586595" version="1" comment="xen-tools is &lt;4.4.4_40-61.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586596" version="1" comment="xen-tools-domU is &lt;4.4.4_40-61.46.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586597" version="1" comment="xen is &lt;4.4.4_40-61.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586598" version="1" comment="xen-doc-html is &lt;4.4.4_40-61.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586599" version="1" comment="xen-kmp-default is &lt;4.4.4_40_3.0.101_108.101-61.49.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586600" version="1" comment="xen-kmp-pae is &lt;4.4.4_40_3.0.101_108.101-61.49.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586601" version="1" comment="xen-libs is &lt;4.4.4_40-61.49.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586602" version="1" comment="xen-libs-32bit is &lt;4.4.4_40-61.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586603" version="1" comment="xen-tools is &lt;4.4.4_40-61.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586604" version="1" comment="xen-tools-domU is &lt;4.4.4_40-61.49.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586605" version="1" comment="xen is &lt;4.4.4_42-61.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586606" version="1" comment="xen-doc-html is &lt;4.4.4_42-61.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586607" version="1" comment="xen-kmp-default is &lt;4.4.4_42_3.0.101_108.114-61.52.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586608" version="1" comment="xen-kmp-pae is &lt;4.4.4_42_3.0.101_108.114-61.52.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586609" version="1" comment="xen-libs is &lt;4.4.4_42-61.52.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586610" version="1" comment="xen-libs-32bit is &lt;4.4.4_42-61.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586611" version="1" comment="xen-tools is &lt;4.4.4_42-61.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586612" version="1" comment="xen-tools-domU is &lt;4.4.4_42-61.52.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586613" version="1" comment="xen is &lt;4.4.4_44-61.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586614" version="1" comment="xen-doc-html is &lt;4.4.4_44-61.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586615" version="1" comment="xen-kmp-default is &lt;4.4.4_44_3.0.101_108.117-61.55.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586616" version="1" comment="xen-kmp-pae is &lt;4.4.4_44_3.0.101_108.117-61.55.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586617" version="1" comment="xen-libs is &lt;4.4.4_44-61.55.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586618" version="1" comment="xen-libs-32bit is &lt;4.4.4_44-61.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586619" version="1" comment="xen-tools is &lt;4.4.4_44-61.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586620" version="1" comment="xen-tools-domU is &lt;4.4.4_44-61.55.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586621" version="1" comment="xen is &lt;4.4.4_46-61.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586622" version="1" comment="xen-doc-html is &lt;4.4.4_46-61.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586623" version="1" comment="xen-kmp-default is &lt;4.4.4_46_3.0.101_108.117-61.58.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586624" version="1" comment="xen-kmp-pae is &lt;4.4.4_46_3.0.101_108.117-61.58.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586625" version="1" comment="xen-libs is &lt;4.4.4_46-61.58.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586626" version="1" comment="xen-libs-32bit is &lt;4.4.4_46-61.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586627" version="1" comment="xen-tools is &lt;4.4.4_46-61.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586628" version="1" comment="xen-tools-domU is &lt;4.4.4_46-61.58.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586629" version="1" comment="xen is &lt;4.4.4_48-61.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586630" version="1" comment="xen-doc-html is &lt;4.4.4_48-61.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586631" version="1" comment="xen-kmp-default is &lt;4.4.4_48_3.0.101_108.117-61.61.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586632" version="1" comment="xen-kmp-pae is &lt;4.4.4_48_3.0.101_108.117-61.61.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586633" version="1" comment="xen-libs is &lt;4.4.4_48-61.61.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586634" version="1" comment="xen-libs-32bit is &lt;4.4.4_48-61.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586635" version="1" comment="xen-tools is &lt;4.4.4_48-61.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586636" version="1" comment="xen-tools-domU is &lt;4.4.4_48-61.61.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586637" version="1" comment="xen is &lt;4.4.4_48-61.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586638" version="1" comment="xen-doc-html is &lt;4.4.4_48-61.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586639" version="1" comment="xen-kmp-default is &lt;4.4.4_48_3.0.101_108.123-61.64.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586640" version="1" comment="xen-kmp-pae is &lt;4.4.4_48_3.0.101_108.123-61.64.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586641" version="1" comment="xen-libs is &lt;4.4.4_48-61.64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586642" version="1" comment="xen-libs-32bit is &lt;4.4.4_48-61.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586643" version="1" comment="xen-tools is &lt;4.4.4_48-61.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586644" version="1" comment="xen-tools-domU is &lt;4.4.4_48-61.64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658848" version="1" comment="xen is &lt;4.4.4_50-61.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658849" version="1" comment="xen-doc-html is &lt;4.4.4_50-61.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658850" version="1" comment="xen-kmp-default is &lt;4.4.4_50_3.0.101_108.129-61.67.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658851" version="1" comment="xen-kmp-pae is &lt;4.4.4_50_3.0.101_108.129-61.67.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658852" version="1" comment="xen-libs is &lt;4.4.4_50-61.67.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658853" version="1" comment="xen-libs-32bit is &lt;4.4.4_50-61.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658854" version="1" comment="xen-tools is &lt;4.4.4_50-61.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658855" version="1" comment="xen-tools-domU is &lt;4.4.4_50-61.67.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666470" version="1" comment="xen is &lt;4.4.4_52-61.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666471" version="1" comment="xen-doc-html is &lt;4.4.4_52-61.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666472" version="1" comment="xen-kmp-default is &lt;4.4.4_52_3.0.101_108.132-61.70.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666473" version="1" comment="xen-kmp-pae is &lt;4.4.4_52_3.0.101_108.132-61.70.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666474" version="1" comment="xen-libs is &lt;4.4.4_52-61.70.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666475" version="1" comment="xen-libs-32bit is &lt;4.4.4_52-61.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666476" version="1" comment="xen-tools is &lt;4.4.4_52-61.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666477" version="1" comment="xen-tools-domU is &lt;4.4.4_52-61.70.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567475" version="1" comment="xen is &lt;4.4.3_06-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567476" version="1" comment="xen-doc-html is &lt;4.4.3_06-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567477" version="1" comment="xen-kmp-default is &lt;4.4.3_06_3.0.101_65-29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567478" version="1" comment="xen-kmp-pae is &lt;4.4.3_06_3.0.101_65-29.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567479" version="1" comment="xen-libs is &lt;4.4.3_06-29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567480" version="1" comment="xen-libs-32bit is &lt;4.4.3_06-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567481" version="1" comment="xen-tools is &lt;4.4.3_06-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567482" version="1" comment="xen-tools-domU is &lt;4.4.3_06-29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586645" version="1" comment="xorg-x11-libICE is &lt;7.4-3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586646" version="1" comment="xorg-x11-libICE-32bit is &lt;7.4-3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586647" version="1" comment="xorg-x11-libICE-x86 is &lt;7.4-3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586648" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.65.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586649" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.65.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586650" version="1" comment="xorg-x11-libX11-x86 is &lt;7.4-5.11.65.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586651" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.68.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586652" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.68.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586653" version="1" comment="xorg-x11-libX11-x86 is &lt;7.4-5.11.68.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586654" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.72.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586655" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.72.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586656" version="1" comment="xorg-x11-libX11-x86 is &lt;7.4-5.11.72.9.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586657" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.72.15.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586658" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.72.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586659" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.72.18.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586660" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.72.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586661" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.72.27.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586662" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.72.27.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586663" version="1" comment="xorg-x11-libXdmcp is &lt;7.4-3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586664" version="1" comment="xorg-x11-libXdmcp-32bit is &lt;7.4-3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586665" version="1" comment="xorg-x11-libXdmcp-x86 is &lt;7.4-3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586666" version="1" comment="xorg-x11-libXfixes is &lt;7.4-1.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586667" version="1" comment="xorg-x11-libXfixes-32bit is &lt;7.4-1.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586668" version="1" comment="xorg-x11-libXfixes-x86 is &lt;7.4-1.20.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586669" version="1" comment="xorg-x11-libXpm is &lt;7.4-3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586670" version="1" comment="xorg-x11-libXpm-32bit is &lt;7.4-3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586671" version="1" comment="xorg-x11-libXpm-x86 is &lt;7.4-3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586672" version="1" comment="xorg-x11-libXrender is &lt;7.4-1.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586673" version="1" comment="xorg-x11-libXrender-32bit is &lt;7.4-1.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586674" version="1" comment="xorg-x11-libXrender-x86 is &lt;7.4-1.20.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586675" version="1" comment="xorg-x11-libXv is &lt;7.4-1.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586676" version="1" comment="xorg-x11-libXv-32bit is &lt;7.4-1.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586677" version="1" comment="xorg-x11-libXv-x86 is &lt;7.4-1.20.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586678" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.49.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586679" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.49.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586680" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.49.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586681" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.50.5.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586682" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.50.5.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586683" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.50.5.3 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586684" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.50.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586685" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.50.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586686" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.50.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586687" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.118.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586688" version="1" comment="xorg-x11-server is &lt;7.4-27.118.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586689" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.118.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586690" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.121.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586691" version="1" comment="xorg-x11-server is &lt;7.4-27.121.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586692" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.121.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586693" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586694" version="1" comment="xorg-x11-server is &lt;7.4-27.122.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586695" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586696" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586697" version="1" comment="xorg-x11-server is &lt;7.4-27.122.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586698" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586699" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586700" version="1" comment="xorg-x11-server is &lt;7.4-27.122.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586701" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586702" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586703" version="1" comment="xorg-x11-server is &lt;7.4-27.122.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586704" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586705" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.37.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586706" version="1" comment="xorg-x11-server is &lt;7.4-27.122.37.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586707" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.37.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586708" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586709" version="1" comment="xorg-x11-server is &lt;7.4-27.122.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586710" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659915" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.43.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659916" version="1" comment="xorg-x11-server is &lt;7.4-27.122.43.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659917" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.43.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660950" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.46.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660951" version="1" comment="xorg-x11-server is &lt;7.4-27.122.46.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660952" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.46.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586711" version="1" comment="xterm is &lt;238-3.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679347" version="1" comment="liblzma5 is &lt;5.0.3-0.12.7.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679348" version="1" comment="liblzma5-32bit is &lt;5.0.3-0.12.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679349" version="1" comment="xz is &lt;5.0.3-0.12.7.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679350" version="1" comment="xz-lang is &lt;5.0.3-0.12.7.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586712" version="1" comment="yast2-storage is &lt;2.17.161-5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586713" version="1" comment="yast2-storage-lib is &lt;2.17.161-5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586714" version="1" comment="zlib is &lt;1.2.7-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586715" version="1" comment="zlib-32bit is &lt;1.2.7-0.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586716" version="1" comment="zlib-x86 is &lt;1.2.7-0.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677181" version="1" comment="zlib is &lt;1.2.7-0.17.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677182" version="1" comment="zlib-32bit is &lt;1.2.7-0.17.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677953" version="1" comment="zlib-devel is &lt;1.2.7-0.17.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677954" version="1" comment="zlib-devel-32bit is &lt;1.2.7-0.17.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586717" version="1" comment="zsh is &lt;4.3.6-67.9.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671297" version="1" comment="zsh is &lt;4.3.6-67.9.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157975"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibVNCServer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sles-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PolicyKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PolicyKit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PolicyKit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PolicyKit-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amavisd-new</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-example-pages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-prefork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-hash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-suhosin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-wddx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-core5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-chrootenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-license</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_program_options1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_regex1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_signals1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-mount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldapsmb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-krb-printing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coolkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Cyrus-IMAP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Cyrus-SIEVE-managesieve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-relay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>enscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmailconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>findutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>findutils-locate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-dialupadmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ft2demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfuse2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fvwm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>g3utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgetty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-rus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-std</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-library</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-omni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime-2_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmime-2_0-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmime-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-screensaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-screensaver-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls26-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls26-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-0_10-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinterfaces-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinterfaces-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinterfaces-0_10-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-good-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-good-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-hpijs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsec-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kgreeter-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-wallpapers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-ksysguardd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-runtime-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-runtime-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-default-style</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-default-style-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-default-style-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ppc64-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-apps-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-apps-servers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-kdb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-pkinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt4-x11-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libadns1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-2_0-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmusicbrainz4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient15-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-Max</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon27-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon27-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm10-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netpbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopensc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopensc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopensc2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-browse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-esound-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-gdm-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-zeroconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_6-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_6-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_6-1_0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pyxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librpcsecgss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamplerate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamplerate-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamplerate-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp15-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SNMP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snmp-mibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-locale-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-nunit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-winforms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-gnomevfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-gnomevfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-www</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-plugins-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-auth-pam-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ldap-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ldap-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_mount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_mount-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_mount-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-HTML-Parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>puppet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>puppet-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gdbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>star</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-ng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysstat-isag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unrar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>w3m</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-domU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-xauth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xpdf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zoo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acpid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_jk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php53</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-mcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-pspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-suhosin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-wddx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcpcd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcpv6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>foomatic-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-i18ndata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork4-filesharing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kopete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krdc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdiplus0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnewt0_52</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-newt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-view</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwdutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwdutils-plugin-audit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logrotate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lvm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mipv6d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opie-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opie-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-ccid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-libwww-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pure-ftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sssd-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>radvd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-diag-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gtls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-relp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-udpspoof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squidGuard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squidGuard-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>t1lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tgt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-jsp-2_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-servlet-2_5-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-trax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_security2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcalc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcharselect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdessh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kfloppy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgpg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ktimer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwalletmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwikdisk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>okteta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-libldap-2_3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cvs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-extra26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyper-v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibutils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-httpclient3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-ibm-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-ibm-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-config-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-config-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-networkmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtspi1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtspi1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtspi1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trousers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupsclient1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-classic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-drivers-net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-lock-sanlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-Build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Test-Simple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sblim-sfcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>socat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stunnel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC_23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>x3270</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libxcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libxcb-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libxcb-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-dmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-rdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>a2ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-lenses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaugeas0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>automake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-license1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_system1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>davfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fastjar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpgme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-fileupload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-fileupload-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdirstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-dbd-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uuid-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-1_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt11-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client18-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client_r18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client_r18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client_r18-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suseRegister</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-nrpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-nrpe-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-plugins-nrpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-kernel-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powerpc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppc64-diag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-imaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pywbem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vsftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xinetd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXext-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXext-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXfixes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXfixes-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXfixes-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXp-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXrender</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXrender-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXrender-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXt-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXv-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXv-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-openssl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-openssl1-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-openssl1-2_4-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslp1-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp15-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp15-openssl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailx-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-openssl1-helpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-openssl1-down-root-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sblim-sfcb-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stunnel-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vsftpd-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>microcode_ctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-azure-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-crammd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-digestmd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-ntlm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-openssl1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-openssl1-2_4-2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-crammd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-crammd5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-digestmd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-digestmd5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-gssapi-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-gssapi-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-otp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-otp-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-plain-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-plain-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SLES_SAP-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm-sap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm-sap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sap_suse_cluster_connector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamsap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_cml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_magnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_mysql_vhost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_trigger_b4_dl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_webdav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhn-virtualization-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhn-virtualization-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhncfg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhncfg-actions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhncfg-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhncfg-management</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhnmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-backend-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-certs-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osa-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-minion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>supportutils-plugin-susemanager-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhnlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacecmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-check</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-client-setup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-client-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-cfg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-cfg-actions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-cfg-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-cfg-management</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-osad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-virtualization-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-cfg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-cfg-actions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-cfg-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-cfg-management</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-osa-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-osad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-virtualization-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-virtualization-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-rhnlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-remote-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-spacewalk-check</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-spacewalk-client-setup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-spacewalk-client-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-wrouesnel-postgres_exporter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-custom-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-push</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-push</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-spacewalk-koan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-spacewalk-oscap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-suseRegisterInfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-uyuni-common-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-koan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-oscap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suseRegisterInfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pycrypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzmq3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SUSE_SLES_SAP-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-SLED</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gconf2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gconf2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gconf2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidl-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orbit2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orbit2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orbit2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libacl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libacl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libacl-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc43</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc43-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc43-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++43</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++43-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++43-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keyutils-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keyutils-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keyutils-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtkhtml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtkhtml2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cdparanoia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cdparanoia-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cdparanoia-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>desktop-file-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fam-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libogg0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libogg0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libogg0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboil-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboil-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpg-error0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpg-error0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpg-error0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-vmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-bea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-bea-console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-bea-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-bea-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-alsa-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-akonadi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-akregator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kaddressbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kalarm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kjots</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-knode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-knotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kontact</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-korganizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-ktimetracker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-ktnef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdepim4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdepim4-wizards</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdepimlibs4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libakonadi4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdepim4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdepimlibs4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-gwenview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kcolorchooser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kruler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-ksnapshot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-okular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkipi5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kwin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-knewsticker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kopete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-krdc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-krfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>utempter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>utempter-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>utempter-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-vmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vmi-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvm-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvm-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX13-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX13-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libesmtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtheora0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtheora0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtheora0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvolume_id1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-IO-Socket-SSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>websphere-as_ce</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcmpiutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-cim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-viewer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vm-install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-xml-apis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-xml-resolver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-ldap-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ConsoleKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ConsoleKit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ConsoleKit-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-fontconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libffi4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libgcc_s1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libstdc++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-kde4-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-kde4-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-openvpn-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-pptp-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasmoid-networkmanagement</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SuSEfirewall2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amanda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apport-crashdb-sle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apport-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arpwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell-ispell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>axis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbluetooth3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdjvulibre21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexempi3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>facter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-roller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-roller-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-kde4-integration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gio-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-glib2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-glib2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-immodule-amharic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-immodule-inuktitut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-immodule-multipress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-immodule-thai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-immodule-vietnamese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-immodule-xim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-immodules-tigrigna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libgtk-3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfirefox-gio-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfirefox-glib-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfirefox-gmodule-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfirefox-gobject-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfirefox-gthread-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-atk-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gdk-pixbuf-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gdk-pixbuf-query-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gdk-pixbuf-thumbnailer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libatk-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libcairo-gobject2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libcairo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libffi7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libgdk_pixbuf-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libharfbuzz0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libpango-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-at-spi2-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-at-spi2-core-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-dbus-1-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libatk-bridge-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libatspi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libfreetype6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libpixman-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp43</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-fortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-fortran-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++43-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++43-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++43-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-fortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-fortran-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++48-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++48-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-session-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnuplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gwenview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcolorchooser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kruler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ksnapshot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkexiv2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkipi6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>okular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inst-source-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-collections</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-collections-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-collections-tomcat5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-taglibs-standard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-taglibs-standard-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-csb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-en_GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-eu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-hi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-is</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-kk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-km</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ku</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-lt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-lv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-mk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-th</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-wa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-zh_CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-zh_TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>btrfs-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>btrfs-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>btrfs-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyper-v-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyper-v-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyper-v-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>less</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lha</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio_cdda0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio_paranoia0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-0_6-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-0_6-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>db-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>db-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>db-utils-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssglue1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-louis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpciaccess0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpciaccess0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtcnative-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpcbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>man-pages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minicom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-ntp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cxgb3-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslp1-openssl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permissions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orca-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_pkcs11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_pkcs11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Archive-Zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Config-General</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Convert-ASN1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBD-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PlRPC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-XML-LibXML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-init</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-numpy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-gdbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quota</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quota-nfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rzsz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>screen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-satsolver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-satsolver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>satsolver-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-packager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-pkg-bindings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-wagon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspeex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspeex-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>supportutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tightvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwavpack1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjack0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwscodecs1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>portaudio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libICE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libICE-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXdmcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXdmcp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXpm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzma5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzma5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-storage-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-hmac-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-vm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-PyYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ecdsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-paramiko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-coverage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-passlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init-config-suse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-saslauthd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-sqlauxprop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-sqlauxprop-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dosfstools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fribidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fribidi-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>intel-SINIT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigsmp-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyajl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyajl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lldpad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mokutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p7zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_radius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_radius-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-httplib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-Jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-ecdsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-boto3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-botocore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-s3transfer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>growpart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-Cheetah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-MarkupSafe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-PrettyTable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-PyJWT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-PyYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-argparse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-blinker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-cffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-configobj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-dateutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-docutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-enum34</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-futures</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-httplib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-idna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-ipaddress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-jmespath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-jsonpatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-jsonpointer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-jsonschema</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-lockfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-oauth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-oauthlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-paramiko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-ply</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-pyasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-pyasn1-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-pycparser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-pycrypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-pyserial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-pytest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-python-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-simplejson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-six</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnu-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tboot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telnet-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-eppic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipmitool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigmem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigmem-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-bigmem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-bigmem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-bigmem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Sys-Virt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-helpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_pkcs11-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-server1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libICE-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXdmcp-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXpm-x86</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-154.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11.1</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.9-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0.r4359-15.22.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0.r1053-11.16.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.14-2.12.105</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.12-23.40.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.12-23.40.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.35-0.2.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9-14.34.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9-14.34.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.10-2.24.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.4-40.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.6-50.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.19.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.5.0P2-20.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.36.0-11.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.246</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-11.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.96-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-22.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-194.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.0-11.24.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.11.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.11.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3.ESV-0.3.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.1.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3-4.32.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.4-152.17.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.2.68</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.10.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.8.90-13.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.24-43.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-38.24.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.7.19.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.2-61.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.26-1.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.36-26.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.27.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.27.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.2.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.23-1.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.8-1.2.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.3-0.4.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.25-1.1.133</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.17-1.1.126</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-8.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.12-69.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-3.4.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.3-1.1.93</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.3-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr7.0-1.6.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.8.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.8.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.10-20.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.10-23.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.2.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.12-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-77.14.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.2-1.6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.2-1.6.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.2-1.6.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-73.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-5.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.17-0.3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.17.1-31.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.0-1.2.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.24.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-2.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.5-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.67-13.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.3-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.27.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.2.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.21-1.5.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.9.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.4-194.23.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.2.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.4-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.1.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.1.151</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.6-1.9.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.1.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-1.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.12-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-17.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0.19-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1.9-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.13-1.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.3.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.31.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.34.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-0.5.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-47.10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:184-147.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.47-13.13.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.47.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.56-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:804.028-50.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-26.22.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.9-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.8-1.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.9.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.8b-88.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.1.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.33.82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7.p72-5.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5final-28.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.9p17-21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-27.27.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.5-7.9.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-0.15.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20-23.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.80.2-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.52-142.23.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.2-132.1.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-1.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-36.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0_21091_04-0.2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0_21091_04_2.6.32.12_0.7-0.2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-9.24.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.19.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.02-138.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:238-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-911.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11.2</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1_git20090811-3.20.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-5.22.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.14-2.23.126</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.12-23.58.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.12-23.58.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9-14.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9-14.39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-6.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-91.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-18.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.26-1.30.110</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.19.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR5P1-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.253.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1-0.4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.97.3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-194.199.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.65.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.76-34.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3.P2-0.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-44.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.22-3.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:61-1.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2-1001.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3-4.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.4-152.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.26.33.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.8.90-13.20.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.24-43.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-38.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-269.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.2-61.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.23-1.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.3-0.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.35-5.15.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.30-5.8.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.21.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-8.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.10-0.6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.10-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr9.3-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-16.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.13-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.48.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.1-0.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-12.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.22.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.22.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.18.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.34-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.27-0.6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.1-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.5.76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-307.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.94-0.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.29.6-6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.52.10-1.35.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.23-0.7.128</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.2-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.13.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-1.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.15-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.7-10.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.6-65.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02.84-3.25.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.14-9.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2.umip.0.4-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.7.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2.24-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2.24-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-0.22.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.13_0.27-0.22.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4-662.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.10.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.2-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.8-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.102-1.37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.816-2.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1-10.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.14-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.12-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.22-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.11-0.9.96</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-1.24.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.7-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.12-8.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-13.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5final-28.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.71.47-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-27.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.5-7.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-9.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-0.7.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-100.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26-1.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.48-101.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.10-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.18-20.35.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-11.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.5-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.2-132.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.10-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.2_14-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.2_14_3.0.13_0.27-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-9.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.60.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.119-0.5.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.44-0.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11.3</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.3-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.4esr-0.10.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1_git20090811-3.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.14-2.28.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.12-23.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9-14.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-6.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-91.25.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-20.9.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-16.9.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.13.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-0.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.30.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P4-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.36.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.97.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.24.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.24.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-194.207.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.26.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.12-144.23.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.16.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-44.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:61-1.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.29.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.24-43.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.16.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.7-0.9.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.3-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-0.14.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.12-69.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5-0.7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.7-0.7.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-253.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr13.1-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr4.1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6b-879.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-879.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.76-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-12.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.25.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.25.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.18.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.37.1-5.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-0.8.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.9-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.3-0.11.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.0-1.9.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.26.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.31-0.7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.52.10-1.35.113</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.2-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.4-0.12.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.152.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.10-0.9.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-0.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.1-0.7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.7-10.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02.98-0.25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.14-9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2.27-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.16-0.11.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-18.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4.1-0.11.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.76_0.11-0.11.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-0.9.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.38.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-47.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.47-13.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.67.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.67.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.72-0.67.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.23-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.22-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.47.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.1-0.7.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.11-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.0-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.12-8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5final-28.23.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.54-0.9.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.17.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.71.61-0.11.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-27.34.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.5-7.45.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-9.23.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-100.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-19.23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.48-101.31.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.10-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.18-20.35.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-0.9.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-0.7.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.12-517.12.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2_04-0.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2_04_3.0.76_0.11-0.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-9.62.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.81.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.99-17.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.99-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.129-0.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.45-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11.4</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.3-0.28.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.7.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.14-2.30.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.12-23.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9-14.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13-1326.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-6.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-20.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-16.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.51.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.40-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-0.4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.4-40.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-0.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-4.131.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-147.27.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.27.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24-3.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.36.0-12.6.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.49.0-0.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1-0.14.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.98.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.12-6.25.32.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-75.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-194.211.213.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-1.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.71-0.14.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.152-4.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3-4.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.95-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.24-43.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.35.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.7-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.3-0.39.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.6-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.30-5.12.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.12-0.18.70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.10-0.6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.7-0.15.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.3-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-1.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-16.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.11.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-255.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-30.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-77.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-12.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-68.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.22.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.18.19.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-2.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.52-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.4-0.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.5-24.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.3-0.8.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.3+r212056-2.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.0-1.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.03-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-3.118.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-3.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20060920alpha-74.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.43-0.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.23-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.4-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.10-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-3.76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.3-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-1.38.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-1.25.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.15-0.17.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.7-10.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.6-65.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02.98-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0-0.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-24.4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.16-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-18.38.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p2-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4.1-20.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_63-20.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-0.11.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.15.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.72-0.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-37.63.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.63.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.22-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-1.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5.git-2.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22-240.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.26-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.22-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.6-168.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.6-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-6.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.14.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-1.24.8.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.1-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.11-0.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.3-50.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.318.81ee561d-0.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.12-8.16.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5final-28.23.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.71.61-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.5-7.50.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26-1.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.41-0.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-10.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.7-4.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.13-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-217.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_08-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_08_3.0.101_63-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.14-130.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-9.65.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.11.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.99-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.140-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.46-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-0.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.28.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-1.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.11-0.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.54-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.7-4.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.159.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.162.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.171.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.174.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.186.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.189.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.189.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.192.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.192.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.195.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.195.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.177.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.204.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.204.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.198.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.198.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.180.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.180.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-58.90.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.201.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.201.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-2.19.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.45-28.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.4-0.20.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.5-0.20.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-0.27.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-0.27.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-0.27.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-0.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-0.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-0.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.28.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.28.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.28.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.26.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.26.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.26.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.26.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.26.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.26.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.62.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.62.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.62.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-19.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.11-0.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.41.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.13-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.98.9-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.51.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.51.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20-2.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.15-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.33-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.10-0.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.39.0-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.7-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.74-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.74-0.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.11.64.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2015.8.12-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.24.7-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.5-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.84.4-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5.5-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.24.9-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.13.8-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-5.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.7-5.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-5.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.8-5.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.11-12.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.14-18.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.25-28.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.5-6.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2-0.68.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3-5.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.7-27.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2016.11.10-43.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.8-18.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.7-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2-5.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-5.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-5.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-5.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2-5.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-5.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-12.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.10-27.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-9.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-6.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-6.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2016.11.10-43.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8-18.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-6.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2-9.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.14-27.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2016.11.10-43.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.13-18.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2-0.68.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2-0.68.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2-0.68.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2016.11.4-43.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2016.11.4-43.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2016.11.10-43.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2016.11.10-43.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2016.11.4-42.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.10-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5-1.1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.3.1-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.3.1-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.3.1-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.11-2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.11-2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.11-2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0.10-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0.10-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0.10-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1.11-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1.11-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1.11-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2.12-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2.12-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2.12-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.16-2.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.16-2.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.16-2.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0.r4359-15.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0.r1053-11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.7-151.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.47-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.47-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.47-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.10-2.23.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.6-50.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.5.0P2-20.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.5.0P2-20.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.5.0P2-20.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.253.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.253.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.253.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.7-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.7-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.7-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.95.1-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3_20081022-11.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3_20081022-11.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3_20081022-11.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-75.27.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-194.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.0-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-107.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-107.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-107.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.0-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.0-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-3.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-3.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-3.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.76-34.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.76-34.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.76-34.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-7.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.45-12.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.1.1-11.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.1.1-11.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.1.1-11.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.24.1.1-3.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.1.1-11.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.1.1-11.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.1.1-11.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.8.90-13.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:IIIalpha9.8-691.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:IIIalpha9.8-691.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:IIIalpha9.8-691.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15-1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-130.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-130.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-130.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.21-3.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-87.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-87.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-87.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.15-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.15-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.15-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.2-61.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-24.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.2-7.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.2-7.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.2-7.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-13.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-13.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-13.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-13.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.23-1.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-14.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-6.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-6.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-6.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.21-2.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.21-2.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.21-2.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.10-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.12-69.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-10.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.15-94.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.15_2.6.27.48_0.6-94.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.15_2.6.27.48_0.6-94.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.15_2.6.27.48_0.6-94.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.15_2.6.27.48_0.6-94.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0.13.1.2-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-124.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-124.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-124.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3-9.14.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3-9.28.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3-7.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3-18.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.10-23.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.10-23.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.10-23.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3-8.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3-8.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3-8.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3-8.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3-8.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3-8.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.5-106.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.5-106.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.5-106.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.23_0.1-7.1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.23_0.1-7.1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.23_0.1-7.1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.23_0.1-7.1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.15_2.6.27.54_0.2-94.14.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.27.23-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.27.23-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.27.23-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.27.23-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.27.23-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.5_2.6.27.54_0.2-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.0.10.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.2.6.30.1_2.6.27.37_0.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:78.2.6.30.1_2.6.27.37_0.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-77.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-77.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-77.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23-4.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23-4.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23-4.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-157.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.8-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.8-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.8-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.6-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.6-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.6-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-106.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-106.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-106.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-11.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.12-7.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.12-7.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.12-7.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-2.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-2.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-2.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.67-13.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.67-13.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.67-13.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.3-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.3-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.3-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.1-1.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.1-1.30.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.9.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.9.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.9.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3-12.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3-12.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3-12.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.17-172.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.17-172.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.17-172.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.beta2-6.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.beta2-6.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.beta2-6.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128-13.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.6-14.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02.39-18.26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.2-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.2-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.2-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0.9-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0.9-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0.9-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1.15-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1.15-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1.15-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4p6-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.870-26.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.10.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.10.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.10.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-3.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-3.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-3.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.102-1.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.102-1.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.102-1.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.56-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-37.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-37.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-37.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.7-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.7-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.7-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.8-1.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-2.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.4-194.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.10-17.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.3-50.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7.p72-5.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8-1.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.9p17-21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-42.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20-23.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.2-128.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1.2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-1.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5-15.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.6-14.60.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.2-8.47.85</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3-66.42.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.3-3.57.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.27-0.1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1_18546_24-0.3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1_18546_24_2.6.27.45_0.3-0.3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1_18546_24_2.6.27.45_0.3-0.3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-238.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.02-138.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.21-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.10-64.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.6.0esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.4.10.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.122.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.125.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.128.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.140.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.143.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.146.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-159.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.7-5.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.7-5.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.7-5.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.9esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.5-0.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1.11-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2.24-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.5.0esr-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.8.0esr-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.3.0esr-48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.0-20.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.0-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.1-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.4.0esr-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.6.0esr-66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.7.0esr-69.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.8.0esr-74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.9.0esr-77.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.3.0esr-78.4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52-21.3.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.5.0esr-78.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.6.0esr-78.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.7.3esr-78.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.0esr-78.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.1esr-78.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.9.0esr-78.32.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.8.0esr-78.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.3.0-78.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.47.1-38.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.23-29.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.4.1-78.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.5.0-78.61.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.0-78.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.1-78.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.7.0-78.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.8.0-78.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.9.0-78.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.0.1-78.80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78-21.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.1.0-78.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.2.0-78.90.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.3.0-78.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.0-78.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.1-78.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.5.0-78.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.0-78.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.1-78.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.7.0-78.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.7.1-78.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.8.0-78.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.9.0-78.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.10.0-78.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.11.0-78.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.12.0-78.134.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.13.0-78.137.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.14.0-78.140.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.3.0-78.151.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.4.0-78.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.5.0-78.159.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.2-38.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.0-78.162.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.7.0-78.167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.8.0-78.170.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.5.0esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.4.10.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.6.0esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.2.0-78.143.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91-21.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1_git20090811-3.9.9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-5.15.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.9-4.5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-5.15.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.svn1043876-1.3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.9.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-106.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-106.14.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-106.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6_SVNr208-2.18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13-1326.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-6.46.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-75.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.1-40.16.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2.1-188.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-200.26.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.18.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.40-0.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-0.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.14-0.4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.4-40.63.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1-147.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.114-12.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.114-0.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.114-12.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.114-0.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.114-12.8.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.114-0.8.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1a15-131.23.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1a15-131.23.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.6-26.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.6-26.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.6-26.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-135.16.16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-135.16.16.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-135.16.16.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-142.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.1-7.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.1-7.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.1-7.23.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-4.131.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.25.25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.25.25.6.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.25.25.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-236.38.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-236.38.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-147.14.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.14.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.14.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-148.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-148.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR10P2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR10P2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.31.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.31.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.31.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.31.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.31.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.31.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24-0.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.51-1.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.36.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-10.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-1.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.253.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.256.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.256.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.8-2.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.8-2.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-11.28.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.98.3-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.2-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.3-0.20.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.4-0.20.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.1-0.20.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.2-0.20.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-0.20.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-0.20.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-0.20.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.0-0.20.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.2-0.20.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.4-0.20.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.5-0.20.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12-32.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12-32.41.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-75.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-75.81.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-75.81.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-75.81.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.12-56.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-194.211.213.3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2013.10.2-0.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.12-144.23.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.12-144.23.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.65.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.65.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.65.71.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.65.71.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.26.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.26.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.34.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.76-34.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3.ESV-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3.ESV-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3.ESV-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3.ESV-0.23.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-44.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-45.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.22-3.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-3.6.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.45-12.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.45-12.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16-6.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.6.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:61-1.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:61-1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2-1001.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2-1001.30.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009099347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.137-8.24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.137-8.24.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3-4.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3-42.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.18-0.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.95-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.8.90-13.20.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.8.90-13.20.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.8.90-13.20.22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.24-43.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.3.3.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.3-5.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.4-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.4-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.6-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.7.70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.7.79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.6-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.9-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.10-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.11-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.12-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.3esr-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.2-0.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.2-0.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.4esr-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.5esr-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.3-0.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.6esr-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.3-0.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.3-0.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.7esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.10esr-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3.0esr-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.4.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.2_20130108-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.4-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.4-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.2-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.2-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.4.0esr-0.5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.4.10.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.7.0esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.8.0esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.3.0esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.4.0esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.3-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.3-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.5.3esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.7.0esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.2.1esr-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.3.0esr-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.9-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.4.0esr-25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38-12.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.10-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.7.0esr-36.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.4.0esr-78.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-38.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.9.0esr-78.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.54.3-2.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.9-2.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.2.0-78.51.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68-21.9.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.1-2.8.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.11-2.8.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.54.3-2.14.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.9-2.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.10-2.13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.1.git259-2.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-2.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.14-2.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.45-38.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.21-29.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.0esr-78.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60-21.6.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.2-2.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.1-2.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.76-34.2.4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.11-2.5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.54.3-2.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.9-2.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.10-2.8.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-2.4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.14-2.4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.34.0-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.41.1-38.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.20-29.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.2.0esr-0.11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.0-0.5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-68.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-68.17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-269.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-269.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.25.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.41.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.45.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.35.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.2-61.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.2-61.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-5.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.33.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.33.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-24.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.47.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.47.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.47.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.47.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.47.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.47.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-47.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-47.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.80.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.80.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.80.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.80.12.846</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.80.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.80.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.80.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.0-3.11.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-7.3.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.42.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.42.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.6-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.2-8.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.2-8.3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.25-1.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.20.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.20.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.20.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.20.27.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.20.27.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.5-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.10-0.6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-0.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-47.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-47.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-170.21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-170.21.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-170.21.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2012.10.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.3-1.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.3-1.38.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.19-0.9.11.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.19_2.6.32.54_0.3-0.9.11.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-88.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-1.37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-253.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-234.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.33.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.33.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.33.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.33.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.18-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.18-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.0-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.7-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.7-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.7-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.20-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.25-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.30-75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.35-78.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.41-81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.45-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.50-85.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.15-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6b-879.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-879.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6b-879.12.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-879.12.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6b-879.12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-879.12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6b-879.12.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-879.12.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-16.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.11.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.11.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.10-23.30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-255.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.8-1.33.35.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.54_0.3-0.3.73</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.13-0.3.163</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.54_0.3-0.3.73</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.54_0.3-7.9.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.13-7.9.130</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.54_0.3-7.9.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.54_0.3-0.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.13-0.18.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.7.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.59-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.59-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.7.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_16_2.6.32.59_0.15-0.5.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_16_2.6.32.59_0.15-0.5.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.55.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.65.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.9.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.11.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_10_2.6.32.54_0.11.TDC-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.13.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_12_2.6.32.54_0.13.TDC-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.21.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_12_2.6.32.54_0.21.TDC-0.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.23.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_12_2.6.32.54_0.23.TDC-0.3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.25.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_12_2.6.32.54_0.25.TDC-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.29.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_12_2.6.32.54_0.29.TDC-0.5.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.31.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.33.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.35.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.37.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.39.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.41.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.43.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.45.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.47.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.49.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.53.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.59.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.68.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.73.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.76.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.79.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.82.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.85.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.88.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.94.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.100.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.103.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.106.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.109.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.112.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.116.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.119.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.122.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.130.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-53.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.130.TDC-53.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.133.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.136.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.139.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.145.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.24-0.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.91.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.97.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.155.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.158.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.161.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.164.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.169.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.172.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.175.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.178.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.181.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.142.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.97.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.97.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6-133.49.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6-133.49.121.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6-133.49.125.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6-133.49.125.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6-133.49.125.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6-133.49.125.16.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6-133.49.125.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6-133.49.125.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.68.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.5-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.5-1.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.5-1.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.5-1.31.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-77.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:424b-10.24.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0.894-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23-4.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.20.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.22.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.18.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.22.23.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.18.19.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16-6.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta13b-49.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta13b-49.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-7.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.80-8.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.37.1-5.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.37.1-5.19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-122.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-122.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.20-97.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.12-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.12-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-157.18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.5-24.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.5-24.24.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.14.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.5-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.5-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.6-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-6.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-6.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-6.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-6.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-6.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-6.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-6.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-11.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-307.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1-20.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.43-1.2.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.20-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.3.19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.03-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.03-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-3.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20060920alpha-74.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20060920alpha-74.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20060920alpha-74.11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20060920alpha-74.11.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-49.22.6.3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-10.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.44.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.21-1.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.20.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.18-28.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.29.6-6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-122.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-2.6.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.3.3.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.12.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.12.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.12.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.35.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-12.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.41-0.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-12.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.5.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.6+git20080930-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.13.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.13.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.98.6-28.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-0.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.6-1.31.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.3-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.40.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.44.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.50.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.64.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.69.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.76.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.27.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.34.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.37.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.34.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.34.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.39.0-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-26.32.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-26.32.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-26.32.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.7-10.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.6-65.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02.39-18.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.14-9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15-2.20.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.5.1esr-63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.3-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.36-28.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.36-28.6.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.57.64.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.57.64.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.57.64.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.57.64.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.57.64.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.57.64.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3-27.24.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-1.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.6.1esr-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38-15.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-17.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.2.0esr-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.0-0.5.7.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.2_20130108-0.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.0-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.0-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.1-38.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-38.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25-29.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68-38.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.32-29.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1.19-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2.27-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.8.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.36.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-24.4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-24.4.10.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-1.16.21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.15.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-2.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-2.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.75-1.30.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.11-3.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.9-1.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p6-41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.14.1-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p7-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p8-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p9-48.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p10-48.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p11-48.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p12-48.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p13-48.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p15-48.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-0.9.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2_2.6.32.46_0.3-0.9.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.17.31.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.17.31.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.17.31.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.17.31.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.17.31.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.17.31.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.17.31.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.17.31.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.17.31.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.17.31.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.17.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.17.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.17.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.17.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.27.6.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.27.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.27.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.69.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.74.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.79.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.79.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.80.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4.1-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-80.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-80.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.97-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.35.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.35.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.35.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.35.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.3-0.16.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4-662.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2011.6.28-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.3-0.5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-0.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-1.22.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-141.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.2-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-252.22.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.8-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.102-1.37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.102-1.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.46-2.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.61.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.61.63.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.33-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.008-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.008-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.008-10.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.607-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.607-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2019-32.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.66-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.816-2.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.110.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-111.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-111.51.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-111.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-111.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-111.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-111.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-111.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-111.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-111.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-2.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.79-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.79-4.9.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.13.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-37.29.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.29.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.29.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.6-5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.5-0.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.23-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1-0.6.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.18-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4-0.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.6-0.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10-0.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.8-0.2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-0.2.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.10-0.2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.12-0.2.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.14-0.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.15-0.2.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.17-0.2.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.19-0.2.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.15-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.18-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.19-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.9-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.12-0.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.13-0.23.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.15-0.23.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.16-0.23.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.17-0.23.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.19-0.23.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.24-0.23.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5.git-2.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5.git-2.31.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5.git-2.32.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22-240.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22-240.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8-0.2.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.26-0.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.26-0.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.22-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.6-168.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-1.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-6.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.16-6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.16-6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-6.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20190408.32abece-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-6.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-6.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-6.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-6.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-6.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-6.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-6.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-6.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-6.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-6.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-6.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-6.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-6.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-6.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-6.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.16-6.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.16-6.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.0.1-4.2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.30.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16-50.36.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-1.24.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.3-50.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.48.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.48.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18.3-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.21~rc-936.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-11.28.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-56.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-56.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-70.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-70.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-70.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-70.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-70.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-70.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-70.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-70.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-70.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-70.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-70.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-70.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-70.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-70.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.7-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.7-0.21.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-162.19.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.0-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.0-1.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.37.5-0.5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.19-0.3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.78.3-0.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.45.5-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.17.8-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.16-0.3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.99.91-16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.4-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.4-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.30.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.30.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.12-8.16.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-13.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.36.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.36.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.36.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.36.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.36-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.2.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.2.21.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20-0.28.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.71.31-0.9.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-27.34.40.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-9.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-9.18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-100.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-19.23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26-1.2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.1-14.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.1-14.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.30.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.30.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.30.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.30.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.48-101.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.10-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-81.15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.45-0.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.18-20.35.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.45-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.53-0.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.53-0.57.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.53-0.57.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.53-0.57.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.53-0.57.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.53-0.57.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-160.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-160.6.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8a-1.160.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8b-160.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.80.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.52-142.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.52-142.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.52-142.34.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.52-142.34.8.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.52-142.34.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.2-61.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16-6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-13.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.5.3.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.7-4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.5-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.2-132.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3.git20161120-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3.git20161120-5.3.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.50.1-1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.50.1-1.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.50.1-1.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.41.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.11-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.7-0.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.9-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.11-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.13-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-7.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.12-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.13-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-40.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.109.2-67.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.5-2.7.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.11-40.14.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19-234.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-40.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.13-40.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.14-40.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.16-40.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.17-40.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.9-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-217.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_12-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_12_2.6.32.54_0.11.TDC-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.19-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.19-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.19-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-27.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.68.TDC-27.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.68.TDC-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-36.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.85.TDC-36.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-41.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.94.TDC-41.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.97.TDC-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.103.TDC-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.103.TDC-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-53.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.112.TDC-53.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-53.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.112.TDC-53.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-53.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.116.TDC-53.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-53.14.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.122.TDC-53.14.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-53.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.133.TDC-53.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_20-53.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_20_2.6.32.54_0.172.TDC-53.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_20-53.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_20_2.6.32.54_0.178.TDC-53.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.6-1.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.30-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.1_21326_08-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.1_21326_08_2.6.32.36_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.31-0.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2_21511_02-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2_21511_02_2.6.32.43_0.4-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.6-1.27.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.32-0.3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2_21511_04-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2_21511_04_2.6.32.46_0.3-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.6-1.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_02-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_02_2.6.32.54_0.3-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_04-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_04_2.6.32.59_0.5-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.34-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_08-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_08_2.6.32.59_0.7-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_10-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_10_2.6.32.59_0.7-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_10_2.6.32.59_0.7-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_11-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_11_2.6.32.54_0.11.TDC-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_14-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_14_2.6.32.54_0.31.TDC-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_16-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_16_2.6.32.54_0.33.TDC-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_16_2.6.32.59_0.9-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.45.TDC-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.55.TDC-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.19-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.19-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.73.TDC-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-238.29.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-238.29.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.14-130.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-9.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.50.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.50.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.22.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.22.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.79.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.79.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.79.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.79.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.79.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.79.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.79.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.79.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.99-17.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4_0.11.0-0.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.02-138.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.02-138.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.07-6.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:238-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3-0.12.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.35.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.99.5-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.6-67.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.6-67.9.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.21-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.11.2-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.11.2-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.11.2-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.9esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.5.0esr-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.8.0esr-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.3.0esr-48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.0-20.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.0-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.1-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.1-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.4.0esr-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.6.0esr-66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.29-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.29-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-200.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-200.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-0.4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.14-0.4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-4.131.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-147.14.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-147.14.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.14.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.14.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.14.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4P2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4P2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4P2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-12.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.97.8-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.12-6.25.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.12-6.25.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.11.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-45.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.29.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.29.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.29.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.95-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.7.80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.6-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.6-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.6-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.9-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.7.85</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.10-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.11-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.12-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.4esr-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.2-0.4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.2-0.4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.2-0.4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.5esr-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.3-0.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.3-0.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.3-0.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.6esr-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.7esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.10esr-0.4.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3.0esr-0.4.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.4.10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.3.0esr-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.9-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.9-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.4.0esr-25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38-12.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.10-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.10-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.7.0esr-36.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.10-0.6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4-0.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-0.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-0.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.26.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.26.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.26.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-170.21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2012.12.12-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.18-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr15.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr15.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.0-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr15.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.20-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.20-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.20-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.25-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.25-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.25-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.30-75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.30-75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.30-75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.35-78.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.35-78.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.35-78.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.15-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.15-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.15-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr6.0-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr6.0-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr7.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.10-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.10-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.20-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.20-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.30-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.30-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.40-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.40-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.50-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.50-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.60-58.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.60-58.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_04_3.0.101_0.7.17-0.5.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_04_3.0.101_0.7.17-0.5.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.1-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.1-0.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-77.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-77.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-77.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-12.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.20.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.20.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.20.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.9-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.9-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.9-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2013.1.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.2-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.2-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.2-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.7-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.7-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.7-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.44.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.5.1esr-63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.3-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.3-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.6.1esr-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38-15.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-17.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-17.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-24.4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-18.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p6-41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p7-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p8-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p9-48.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc|s390)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.69.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.95-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.61.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.61.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.61.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-37.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-37.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-37.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.23-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16-50.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.11-0.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.12-8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.36-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.14-0.5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.12-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.4_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.4_02_3.0.58_0.6.6-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.4_02_3.0.58_0.6.6-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.4_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.23-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.23-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.37-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.37-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.37-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.37-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.40-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.40-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.44-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.44-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.15.71</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.15.71</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.17.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.7-0.11.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.9-0.7.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.2_18-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.2_18_3.0.31_0.9-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.2_18_3.0.31_0.9-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.2_18-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.10-0.5.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.10-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.2_20-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.2_20_3.0.38_0.5-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.12-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_02_3.0.38_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_04-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_04_3.0.42_0.7-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_04_3.0.42_0.7-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_04-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.5_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.5_02_3.0.74_0.6.10-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.5_02_3.0.74_0.6.10-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.5_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_02_3.0.93_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_02_3.0.93_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_04-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_04_3.0.101_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_04_3.0.101_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_04-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_06-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_06-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_06_3.0.101_0.7.17-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_06_3.0.101_0.7.17-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.29-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.29-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.29-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.29-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.37-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.37-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.70.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.22.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.22.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.22.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.99-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.182.12-0.5.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.166-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.10.0-72.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.6.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.7.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.1-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.1-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.1-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.149.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.154.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.3-0.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.3-0.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.3-0.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.3-0.29.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.9esr-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.8.0esr-0.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.5.0esr-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.6.1esr-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.8.0esr-40.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.2.0esr-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.0-23.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.1-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.1-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.3.0esr-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.4.0esr-53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.6.0esr-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.7.0esr-65.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.8.0esr-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.9.0esr-71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.2.0esr-72.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52-24.3.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-47.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-47.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.3.0esr-72.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52-24.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.5.0esr-72.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.6.0esr-72.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.7.3esr-72.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.0esr-72.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.1esr-72.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.9.0esr-72.38.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.0-78.175.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.0-78.179.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.1-78.182.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.10.0-78.185.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.11.0-78.190.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.12.0-78.195.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.13.0-78.198.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.2.0-72.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102-24.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.3.0-72.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.4.0-72.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.5.0-72.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.9-2.26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.6.0-72.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.9.0-72.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.11.0-72.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.5.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.7.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.6.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.8.0esr-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2_CKBI_1.98-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2_CKBI_1.98-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2_CKBI_1.98-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.7.0esr-37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-106.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13-1326.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2.1-188.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2.1-188.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2.0-11.5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.3-0.10.22.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-2.19.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10-0.15.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10-0.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-0.3.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-0.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.9-11.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6-0.11.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-0.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.9-11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.14-11.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.22-11.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.27-11.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-20.11.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-16.11.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-20.11.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-16.11.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-0.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-0.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-0.2.18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-135.23.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-135.23.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-135.23.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-35.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-35.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-35.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-35.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-35.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-35.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-236.236.44.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-236.236.44.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-147.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-147.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-147.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-147.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1-276.26.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.15.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.23.1-0.23.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.99-0.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.99-0.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.99-0.9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.99-0.9.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.99-0.9.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-257.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-257.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-12.54.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.54.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.54.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.54.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.54.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1-0.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1-0.14.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.98.3-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.2-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.3-0.20.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.4-0.20.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.1-0.20.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.2-0.20.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.6-0.20.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.7-0.20.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.8-0.20.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.69.8-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.12-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.4-3.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.4-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.28.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.28.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.28.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.28.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.12-6.25.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.12-6.25.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.12-6.25.33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.12-6.25.33.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-75.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2013.10.2-0.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.34.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.28.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.28.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.28.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.28.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-45.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.71-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.71-0.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-0.16.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-0.16.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-0.16.11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-0.16.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-0.16.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-0.16.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-121.31.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.62.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.62.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.62.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.11.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:61-1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:61-1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:61-1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.152-4.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.152-4.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.152-4.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.152-4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3-4.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3-42.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3-42.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3-42.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.32.3.109</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.17.1-33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.17.1-33.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.17.1-33.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.24-43.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.24-43.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.24-43.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.10.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.7esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.10esr-0.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.12.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.7.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.4-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.4-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.4-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.4.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.7.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.7.0esr-0.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.8.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.4-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.4-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.4-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.3.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.4.0esr-0.8.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.3-0.8.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.3-0.8.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.3-0.8.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.5.3esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.7.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.9-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.9-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.9-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.3.0esr-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.4.0esr-25.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38-15.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.10-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.10-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.10-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.4.0esr-72.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-47.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-47.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.2.0esr-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.2.0esr-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.0-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.2.1esr-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.0-0.12.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.0-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.0-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.0-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-68.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-68.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-68.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-10.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-269.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.25.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.45.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.35.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.35.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.35.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.9-59.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.7-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.7-0.11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-37.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-37.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-37.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.1-0.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.1-0.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.47.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.47.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-47.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-47.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-47.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-47.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.72.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.72.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.72.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.72.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.87.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.87.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.87.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.87.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.42.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.42.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.6-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7-5.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.00-0.49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.00-0.53.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.00-0.53.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.53.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.53.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.53.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.53.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.35-5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.35-5.18.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.30-5.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.30-5.15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.45.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.12-69.23.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.7-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.7-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-47.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1-0.81.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.3-1.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-1.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-1.37.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.33.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.33.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.7-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.20-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.20-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.20-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.45-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.45-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.45-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.50-85.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.50-85.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.50-85.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.15-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr8.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr8.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.10-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.20-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.30-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.30-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.30-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.1-61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.1-61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.5-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.5-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.10-65.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.15-65.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.15-65.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.20-65.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.20-65.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.25-65.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.25-65.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.30-65.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.30-65.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.35-65.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.35-65.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.40-65.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.45-65.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.50-65.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.55-65.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.60-65.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.65-65.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.70-65.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.75-65.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.80-65.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr11.5-65.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr11.10-65.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr11.15-65.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr11.15-65.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr11.0-65.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-255.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_04_3.0.101_0.40-0.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_04_3.0.101_0.40-0.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.53.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.63.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.66.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.69.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.72.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.77.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009236999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.80.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.83.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.93.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.96.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.101.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.104.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.107.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.113.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.116.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.119.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.122.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.125.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.126.5.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.132.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.139.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.142.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.145.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.150.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.153.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.156.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.163.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.166.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.169.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.174.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.181.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.184.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.190.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.195.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_0.35-0.38.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_0.35-0.13.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.5_3.0.101_0.35-7.39.71</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_0.40-0.38.83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_0.40-0.13.89</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.5_3.0.101_0.40-7.39.89</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.200.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-47.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.200.TDC-47.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.207.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.210.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.213.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.216.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.219.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.222.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.230.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.235.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.238.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.241.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.244.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.247.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20-0.40.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_0.250.TDC-0.40.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.250.TDC.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.253.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.258.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.261.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.266.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.269.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.187.TDC.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.97.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6-133.49.125.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6-133.49.125.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.22.34.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.21.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.22.23.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.3-1.9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-7.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.12-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.12-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.5-24.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.14.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.5-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.5-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.5-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.26.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.26.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.43-1.10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.26.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.26.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.03-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.03-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.03-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-3.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-3.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-3.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20060920alpha-74.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20060920alpha-74.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.39-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.39-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.39-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.23-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.23-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.23-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.42.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.42.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.2-4.16.3.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.35.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.6+git20080930-6.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-21.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-21.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-21.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-21.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-21.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-21.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-21.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-21.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-21.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.3-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.69.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.34.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.37.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.34.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.11-6.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.37.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.45-0.13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.7-10.30.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0-0.21.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.5.1esr-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.3-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.3-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.75.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.0-0.23.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.6.0esr-31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38-18.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.79-47.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.34-33.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.2-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.2-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.2-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.1-47.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.3-47.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.4-47.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.7.0-72.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.79.3-47.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.8.0-72.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.79.4-47.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68-47.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.32-33.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.45-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.45-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.45-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.46-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.46-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.46-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.47-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.47-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.47-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.49-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.52-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.52-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.53-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.54-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.54-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.55-0.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.57-0.39.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.58-0.39.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.58-0.39.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.59-0.39.9.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.60-0.39.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.61-0.39.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.62-0.39.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.62-0.39.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.36.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-24.4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.16-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.32.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p12-48.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.873-0.41.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.74.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.74.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.74.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.74.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.74.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.74.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.74.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.33.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.40.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.41.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-41.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-41.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-41.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.40.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.47.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.47.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.3-0.5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.20.1-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.16-180.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-252.22.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.72-0.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.72-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.81.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.72-0.81.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.81.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.72-0.81.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.81.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.72-0.81.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.81.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.72-0.81.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.66-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2013.1.7-0.6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2013.1.7-0.6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2013.1.7-0.6.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-79.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-111.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.63.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.99.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-0.15.3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-0.15.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.13.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.13.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.5-0.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.5-0.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1-0.2.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1-0.2.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.21-0.2.42.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.22-0.2.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.15-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.15-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.18-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.19-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.13-0.23.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.13-0.23.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.16-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5.git-2.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22-240.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.7-152.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.22-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.43-30.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.43-30.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-2.19.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10-0.15.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.0-14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.6-168.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.6-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.6-0.13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.6-0.13.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-0.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-0.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-0.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-0.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-6.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6c11-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-6.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-6.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-6.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-6.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-6.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-6.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.2-2.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.3-0.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.213-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.213-3.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-3.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24-0.3.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.0.1-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.5-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.30-3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-0.3.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.2-2.3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.2-0.3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-3.3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10-0.3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-2.3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.42-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.57-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.6-1.3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-3.5.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11-0.3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10-0.3.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.2-3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.18-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.2-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-0.3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-0.3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-2.3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.2-3.3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-0.3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4-3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.9-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.5-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-0.3.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7-3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1-0.3.4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.5-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-0.3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.13-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.2-0.3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.30.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.18-28.23.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.3-50.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.6+git20080930-6.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-37.64.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.64.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.53.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.53.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.1-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.1-0.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-76.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-12.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.11-0.25.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.11-0.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15+git47-12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.4-12.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.7-12.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.7-12.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0u-0.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.318.81ee561d-0.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1-10.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17-33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.12-8.16.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20-121.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20-122.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21-122.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-1.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.1-14.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20120115_1.7.0-0.5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-134.24.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.53-0.57.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-12.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.10-0.11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.80.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-11.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-11.18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-11.18.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-11.18.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-11.18.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.62.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-8.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-8.20.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-8.21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-8.21.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.7-4.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3.git20161120-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.50.1-1.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.11-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.7-0.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.9-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.17.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.18.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.18.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_06-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_06_3.0.101_0.47.52-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_06_3.0.101_0.47.52-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_06-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_02-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_02_3.0.101_0.40-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_12-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_12_3.0.101_0.47.55-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_12_3.0.101_0.47.55-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_12-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_14-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_14_3.0.101_0.47.67-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_14_3.0.101_0.47.67-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_14-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_20-24.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_20_3.0.101_0.47.79-24.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_20_3.0.101_0.47.79-24.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_20-24.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.86-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.86-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.90-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.90-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.113.TDC-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.96-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.96-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.116.TDC-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.99-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.99-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.119.TDC-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.119.TDC-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.99-41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.99-41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.102-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.102-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.122.TDC-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-47.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.125.TDC-47.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.105-45.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.105-45.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-47.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.126.5.TDC-47.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.105-45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.105-45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.5-45.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.5-45.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-47.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.132.TDC-47.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.8-45.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.8-45.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-47.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.139.TDC-47.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-47.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.150.TDC-47.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.14-45.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.14-45.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.19-45.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.19-45.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-47.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.156.TDC-47.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-47.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.181.TDC-47.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.43-45.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.43-45.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-47.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.190.TDC-47.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-47.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.219.TDC-47.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_22-47.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_22_3.0.101_0.238.TDC-47.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_24-47.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_24_3.0.101_0.238.TDC-47.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_26-47.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_26_3.0.101_0.241.TDC-47.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_28-47.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_28_3.0.101_0.253.TDC-47.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_30-47.52.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_30_3.0.101_0.258.TDC-47.52.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_32-47.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_32_3.0.101_0.258.TDC-47.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_34-47.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_34_3.0.101_0.261.TDC-47.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_36-47.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_36_3.0.101_0.261.TDC-47.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_38-47.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_38_3.0.101_0.266.TDC-47.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2_06-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2_06_3.0.82_0.7-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2_06_3.0.82_0.7-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2_06-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_02-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_02_3.0.93_0.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_02_3.0.93_0.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_02-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_08-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_08_3.0.101_0.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_08_3.0.101_0.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_08-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_02-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_02_3.0.101_0.15-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_02_3.0.101_0.15-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_02-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_04-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_04_3.0.101_0.40-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_04_3.0.101_0.40-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_04-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_04-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_04_3.0.101_0.47.52-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_04_3.0.101_0.47.52-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_04-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_08-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_08_3.0.101_0.47.55-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_08_3.0.101_0.47.55-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_08-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_18-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_18_3.0.101_0.47.71-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_18_3.0.101_0.47.71-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_18-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.14-130.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.1-28.26.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.1-28.26.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.07-6.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.07-6.37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:238-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.147.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.17.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-159.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.6.1esr-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.8.0esr-40.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.2.0esr-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.0-23.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.1-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.1-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.1-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.3.0esr-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.4.0esr-53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.6.0esr-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.7.0esr-65.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.8.0esr-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.9.0esr-71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.2.0esr-72.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52-24.3.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-47.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-47.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-47.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.3.0esr-72.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52-24.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.5.0esr-72.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.6.0esr-72.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.7.3esr-72.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.0esr-72.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.1esr-72.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.9.0esr-72.38.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.7.0esr-37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.svn1043876-1.3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-106.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-106.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-106.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-106.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-106.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_12-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_12_3.0.101_63-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_12_3.0.101_63-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_12-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-75.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.1-40.16.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2.1-188.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.40-0.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.14-0.4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.4-40.63.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.114-12.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.114-0.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1a15-131.23.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.6-26.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.6-26.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-135.23.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-142.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-142.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-142.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-35.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-35.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-35.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-35.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-35.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-35.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-147.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-147.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-147.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-147.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.15.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.15.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.256.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.256.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.256.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.256.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.8-2.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.8-2.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.8-2.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1-0.16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.2-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.3-0.20.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.4-0.20.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.1-0.20.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.2-0.20.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-0.20.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-0.20.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-0.20.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.0-0.20.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.2-0.20.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.4-0.20.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.5-0.20.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.69.8-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.12-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.12-6.25.33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.12-6.25.33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-75.81.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-75.81.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.12-56.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.12-56.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.12-56.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.9-30.3.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.12-144.23.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.65.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.26.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.26.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.34.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.34.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.28.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.28.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.28.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.71-0.16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-0.17.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-0.17.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-0.17.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-0.17.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.26-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2-1001.30.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3-42.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.8.90-13.20.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.4.0esr-72.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-47.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-47.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-47.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.54.3-2.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.9-2.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.2-2.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.1-2.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.76-34.2.4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.11-2.5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.54.3-2.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.9-2.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.10-2.8.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-2.4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.14-2.4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.34.0-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.41.1-38.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.41.1-38.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.20-29.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.20-29.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-10.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-10.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-10.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.41.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.41.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.41.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.45.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.45.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.45.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.7-0.11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-37.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-37.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25.0-5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.9.1-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.9.1-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.1+r226025-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.1+r226025-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.1+r226025-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.1+r226025-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.1+r226025-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.33.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.47.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.47.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.47.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.47.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.47.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.47.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-47.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-47.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.0-3.11.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.42.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.00-0.54.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.00-0.66.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.00-0.66.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.00-0.66.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.66.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.35-5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.35-5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.35-5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.35-5.18.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.35-5.18.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.30-5.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.45.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.45.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.45.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.5-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-47.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-47.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-47.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-47.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-47.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-47.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-170.21.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.15-0.30.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.3-1.38.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.33.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.33.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.10-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.10-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.20-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.20-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.30-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.30-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.40-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.40-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.60-19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.60-19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.1-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.1-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.5-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.5-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.10-26.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.10-26.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.15-26.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.15-26.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.20-26.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.20-26.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.25-26.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.25-26.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.30-26.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.30-26.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.35-26.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.35-26.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.40-26.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.40-26.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.45-26.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.45-26.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.50-26.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.50-26.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.55-26.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.55-26.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.60-26.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.60-26.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.65-26.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.65-26.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.70-26.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.70-26.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.75-26.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.75-26.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.80-26.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.80-26.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr5.0-26.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr5.0-26.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr5.5-26.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr5.5-26.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.50-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.50-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6b-879.12.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-879.12.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-879.12.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-879.12.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.10-23.30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.10-23.30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.10-23.30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-104.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-104.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-104.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-104.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-104.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.132.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.132.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.132.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.132.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.132.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20110923-0.59.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20-0.43.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_108.52-0.43.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_108.52-0.43.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_108.52-0.43.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_108.52-0.43.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4.1-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_108.52-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_108.52-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_108.52-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20-0.43.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_108.87-0.43.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_108.87-0.43.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_108.87-0.43.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_108.87-0.43.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4.1-22.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_108.87-22.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_108.87-22.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_108.87-22.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.5-7.44.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.5_3.0.101_108.87-7.44.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.5_3.0.101_108.87-7.44.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.5_3.0.101_108.87-7.44.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.5_3.0.101_108.87-7.44.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.113.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.113.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.113.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0.894-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.22.23.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.22.23.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.18.19.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.18.19.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta13b-49.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.3-1.9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.3-1.9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-7.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-122.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-122.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.20-97.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.20-97.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.20-97.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-157.18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.5-24.24.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.14.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.14.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.26.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.26.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.43-1.10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.43-1.10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20060920alpha-74.11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-10.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-17.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-17.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-17.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-12.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.5.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.6+git20080930-6.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.13.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.13.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.40.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.44.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.50.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.64.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.69.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.76.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.5.1esr-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.3-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.3-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.3-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.36-28.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3-27.24.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.1-47.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.1-47.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.3-47.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.3-47.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-38.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25-29.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25-29.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68-47.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68-47.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.32-33.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.32-33.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.49-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.49-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.49-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.8.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.8.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.8.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.52-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.52-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.52-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.53-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.53-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.53-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.54-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.54-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.54-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.55-0.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.55-0.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.55-0.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.57-0.39.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.57-0.39.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.57-0.39.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.58-0.39.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.58-0.39.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.58-0.39.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.59-0.39.9.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.59-0.39.9.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.59-0.39.9.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.60-0.39.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.60-0.39.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.60-0.39.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.61-0.39.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.61-0.39.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.61-0.39.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.62-0.39.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.62-0.39.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.62-0.39.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.36.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-24.4.10.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-1.16.21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-1.16.21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-1.16.21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.15.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.15.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p4-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p6-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p7-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p9-57.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p10-63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p11-64.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p12-64.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p13-64.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p15-64.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.74.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.74.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.74.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.74.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.27.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.27.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-35.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-36.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-36.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-36.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-36.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-36.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-16.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.47.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.3-0.16.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-1.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-1.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-1.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-141.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-141.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-141.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-252.22.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.72-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.81.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.72-0.81.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.81.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.72-0.81.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.81.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.72-0.81.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.008-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.008-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.008-10.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.607-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.607-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.66-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2013.1.7-0.6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2013.1.7-0.6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-79.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-111.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.99.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.79-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.79-4.9.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.13.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.9-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.9-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.12-0.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.12-0.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.13-0.23.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.13-0.23.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.15-0.23.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.15-0.23.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.16-0.23.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.16-0.23.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.17-0.23.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.17-0.23.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.19-0.23.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.19-0.23.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5.git-2.31.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5.git-2.32.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22-240.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.7-152.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.26-0.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.30.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.53.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.53.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.21~rc-936.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.0-1.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.4-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.4-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.4-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.4-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.4-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.4-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.30.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-13.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.36.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.36.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.36.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-27.34.40.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26-1.2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.1-14.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20120115_1.7.0-0.5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.30.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.30.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.30.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-81.15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.41-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-160.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8a-1.160.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8b-160.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.80.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-11.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-11.18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-11.18.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-8.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-8.20.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-8.21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-8.21.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3.git20161120-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.50.1-1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.50.1-1.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.50.1-1.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.11-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.13-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.12-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.13-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-40.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.5-2.7.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.11-40.14.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19-234.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-40.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.13-40.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.14-40.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.16-40.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.17-40.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.18.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_10-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_10_3.0.101_63-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_10_3.0.101_63-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_10-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_02-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_02_3.0.101_65-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_02_3.0.101_65-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_02-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_02-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_02_3.0.101_68-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_02_3.0.101_68-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_02-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_07-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_07_3.0.101_77-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_07_3.0.101_77-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_07-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_08-40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_08_3.0.101_80-40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_08_3.0.101_80-40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_08-40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_10-43.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_10_3.0.101_88-43.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_10_3.0.101_88-43.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_10-43.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_12-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_12_3.0.101_91-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_12_3.0.101_91-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_12-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_14-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_14_3.0.101_94-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_14_3.0.101_94-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_14-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_16-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_16_3.0.101_97-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_16_3.0.101_97-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_16-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_18-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_18_3.0.101_97-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_18_3.0.101_97-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_18-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_20-60.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_20_3.0.101_104-60.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_20_3.0.101_104-60.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_20-60.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_22-61.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_22_3.0.101_108.7-61.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_22_3.0.101_108.7-61.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_22-61.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_24-61.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_24_3.0.101_108.10-61.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_24_3.0.101_108.10-61.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_24-61.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_26-61.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_26_3.0.101_108.13-61.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_26_3.0.101_108.13-61.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_26-61.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_28-61.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_28_3.0.101_108.35-61.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_28_3.0.101_108.35-61.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_28-61.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_30-61.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_30_3.0.101_108.38-61.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_30_3.0.101_108.38-61.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_30-61.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_32-61.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_32_3.0.101_108.52-61.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_32_3.0.101_108.52-61.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_32-61.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_34-61.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_34_3.0.101_108.57-61.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_34_3.0.101_108.57-61.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_34-61.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_36-61.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_36_3.0.101_108.68-61.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_36_3.0.101_108.68-61.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_36-61.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_38-61.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_38_3.0.101_108.84-61.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_38_3.0.101_108.84-61.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_38-61.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_40-61.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_40_3.0.101_108.87-61.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_40_3.0.101_108.87-61.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_40-61.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_40-61.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_40_3.0.101_108.90-61.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_40_3.0.101_108.90-61.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_40-61.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_40-61.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_40_3.0.101_108.101-61.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_40_3.0.101_108.101-61.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_40-61.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_42-61.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_42_3.0.101_108.114-61.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_42_3.0.101_108.114-61.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_42-61.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_44-61.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_44_3.0.101_108.117-61.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_44_3.0.101_108.117-61.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_44-61.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_46-61.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_46_3.0.101_108.117-61.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_46_3.0.101_108.117-61.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_46-61.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_48-61.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_48_3.0.101_108.117-61.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_48_3.0.101_108.117-61.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_48-61.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_48-61.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_48_3.0.101_108.123-61.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_48_3.0.101_108.123-61.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_48-61.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_50-61.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_50_3.0.101_108.129-61.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_50_3.0.101_108.129-61.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_50-61.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_52-61.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_52_3.0.101_108.132-61.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_52_3.0.101_108.132-61.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_52-61.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_06-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_06_3.0.101_65-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_06_3.0.101_65-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_06-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.50.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.50.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.50.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.50.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.50.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.50.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:238-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3-0.12.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3-0.12.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.161-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.6-67.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.6-67.9.8.1</evr>
  </rpminfo_state>
</states>
</oval_definitions>
